diff --git a/centos/README.md b/centos/README.md new file mode 100644 index 0000000..cfcd59d --- /dev/null +++ b/centos/README.md @@ -0,0 +1,55 @@ +# Widevine License SDK README + +## For c++ SDK users + +* Header Files + + The current set of all cc header files are found in the sub directories + included in the repo. + + Current list of header files: + + ``` + 1. common/status.h + 2. sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h + 3. sdk/external/cpp/wvpl/common/wvpl_sdk_session.h + 4. sdk/external/cpp/wvpl/common/wvpl_types.h + 5. sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h + 6. sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h + 7. util/error_space.h + ``` + +* Bazel build and test tool. + + All SDK builds and example code were created using Bazel. + + All example code has been tested using Bazel and the BUILD rules are + included as part of a complete and working example. + + To learn more about Bazel, please see: https://bazel.build + + > NOTE: Example code is released as being functional under Bazel. \ + > Please use this code and BUILD rules as an example of necessary files \ + > and dependencies if using another build system. + +* c++ Example Code + + The c++ example code can be found in: + + ``` + sdk/examples/license_server_sdk/cpp + ``` + + To run the c++ example code, bazel must be installed on your local system. + + ``` + # Copy the SDK .so file to the example directory. + cp libwvpl_license_sdk.so sdk/examples/license_server_sdk/cpp + + # Run the examples. + bazel run sdk/examples/license_server_sdk/cpp:wvpl_license_sdk_example + bazel run sdk/examples/license_server_sdk/cpp:wvpl_license_sdk_using_dsp_example + ``` + +* For more info please see + https://developers.google.com/widevine/drm/server/sdk/license diff --git a/centos/WORKSPACE b/centos/WORKSPACE new file mode 100644 index 0000000..542545b --- /dev/null +++ b/centos/WORKSPACE @@ -0,0 +1,10 @@ +# Copyright 2021 Google LLC +# License SDK Copybara Release WORKSPACE. +workspace(name = "license_server_sdk") +load("@bazel_tools//tools/build_defs/repo:git.bzl", "git_repository") + +git_repository( + name = "abseil_repo", + tag = "20211102.0", + remote = "https://github.com/abseil/abseil-cpp.git", +) diff --git a/centos/common/BUILD b/centos/common/BUILD new file mode 100644 index 0000000..191de70 --- /dev/null +++ b/centos/common/BUILD @@ -0,0 +1,18 @@ +######################################## +## Copyright 2022 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package( + default_visibility = ["//visibility:public"], +) + +filegroup( + name = "exported_sdk_header_files", + srcs = [ + "status.h", + ], +) diff --git a/centos/common/status.h b/centos/common/status.h new file mode 100755 index 0000000..d8a0d43 --- /dev/null +++ b/centos/common/status.h @@ -0,0 +1,139 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_COMMON_STATUS_H_ +#define VIDEO_WIDEVINE_EXPORT_COMMON_STATUS_H_ + +#include +#include +#include +#include + +#include "absl/base/attributes.h" +#include "absl/strings/string_view.h" +#include "util/error_space.h" + +namespace video_widevine { +namespace error { + +#if ABSL_HAVE_CPP_ATTRIBUTE(nodiscard) +enum [[nodiscard]] StatusCode : uint8_t { +#else +enum ABSL_MUST_USE_RESULT StatusCode : uint8_t { +#endif + // Success. + OK = 0, + + // Client specified an invalid argument. + INVALID_ARGUMENT = 3, + + // Some requested entity (e.g., file or directory) was not found. + NOT_FOUND = 5, + + // Some entity that we attempted to create (e.g., file or directory) + // already exists. + ALREADY_EXISTS = 6, + + // The caller does not have permission to execute the specified + // operation. PERMISSION_DENIED must not be used for rejections + // caused by exhausting some resource (use RESOURCE_EXHAUSTED + // instead for those errors). + PERMISSION_DENIED = 7, + + // The operation was rejected because the system is not in a state + // required for the operation's execution. For example, the directory + // to be deleted is non-empty, an rmdir operation is applied to + // a non-directory, etc. + FAILED_PRECONDITION = 9, + + // Operation is not implemented or not supported/enabled in this service. + UNIMPLEMENTED = 12, + + // Internal errors. Means some invariants expected by underlying + // system has been broken. If you see one of these errors, + // something is very broken. + INTERNAL = 13, + + // Operation is not implemented or not supported/enabled in this service. + UNAVAILABLE = 14, + + // Unrecoverable data loss or corruption. + DATA_LOSS = 15, + + // The request does not have valid authentication credentials for the + // operation. + UNAUTHENTICATED = 16, + + // Number of generic (non license related) errors. + NUM_ERRORS, +}; + +} // namespace error + +#if ABSL_HAVE_CPP_ATTRIBUTE(nodiscard) +class [[nodiscard]] Status { +#else +class ABSL_MUST_USE_RESULT Status { +#endif + public: + + Status() = default; + + ~Status() = default; + + explicit Status(error::StatusCode c) : status_code_(c) {} + + Status(error::StatusCode c, absl::string_view error_message) + : status_code_(c), error_message_(std::string(error_message)) {} + + Status(const util::ErrorSpace* e, error::StatusCode c, + absl::string_view error_message) + : error_space_(e), + status_code_(c), + error_message_(std::string(error_message)) {} + + Status(const util::ErrorSpace* e, int error, + absl::string_view error_message) + : error_space_(e), + status_code_(error), + error_message_(std::string(error_message)) {} + + Status(const Status& other) = default; + + bool ok() const { return status_code_ == error::OK; } + const util::ErrorSpace* error_space() const { return error_space_; } + static const util::ErrorSpace* canonical_space(); + std::string ToString() const; + std::string error_message() const { return error_message_; } + int error_code() const { return status_code_; } + + private: + const util::ErrorSpace* error_space_ = canonical_space(); + int status_code_ = error::OK; + std::string error_message_; +}; + +inline Status OkStatus() { return Status(); } + +inline bool operator==(const Status& s1, const Status& s2) { + return s1.error_space() == s2.error_space() && + s1.error_code() == s2.error_code() && + s1.error_message() == s2.error_message(); +} +inline bool operator!=(const Status& s1, const Status& s2) { + return !(s1 == s2); +} + +// Prints a human-readable representation of 'x' to 'os'. +std::ostream& operator<<(std::ostream& os, const Status& x); + +#define CHECK_OK(expression) CHECK(expression.ok()) << expression.ToString() + +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_COMMON_STATUS_H_ diff --git a/centos/javadoc/allclasses-index.html b/centos/javadoc/allclasses-index.html new file mode 100644 index 0000000..8f67c18 --- /dev/null +++ b/centos/javadoc/allclasses-index.html @@ -0,0 +1,741 @@ + + + + + +All Classes + + + + + + + + + + + + + + +
+ +
+
+
+

All Classes

+
+
+ +
+
+
+ +
+ + diff --git a/centos/javadoc/allclasses.html b/centos/javadoc/allclasses.html new file mode 100644 index 0000000..0ea5310 --- /dev/null +++ b/centos/javadoc/allclasses.html @@ -0,0 +1,123 @@ + + + + + +All Classes + + + + + + + + + + + + +

All Classes

+
+ +
+ + diff --git a/centos/javadoc/allpackages-index.html b/centos/javadoc/allpackages-index.html new file mode 100644 index 0000000..46fe6d2 --- /dev/null +++ b/centos/javadoc/allpackages-index.html @@ -0,0 +1,162 @@ + + + + + +All Packages + + + + + + + + + + + + + + +
+ +
+
+
+

All Packages

+
+
+ +
+
+
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.AnalogOutputCapabilities.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.AnalogOutputCapabilities.html new file mode 100644 index 0000000..cc17b4c --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.AnalogOutputCapabilities.html @@ -0,0 +1,405 @@ + + + + + +WvPLAnalogOutputCapabilities.AnalogOutputCapabilities + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLAnalogOutputCapabilities.AnalogOutputCapabilities

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLAnalogOutputCapabilities.AnalogOutputCapabilities[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLAnalogOutputCapabilities.AnalogOutputCapabilities c : WvPLAnalogOutputCapabilities.AnalogOutputCapabilities.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLAnalogOutputCapabilities.AnalogOutputCapabilities valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.html new file mode 100644 index 0000000..2069b58 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAnalogOutputCapabilities.html @@ -0,0 +1,335 @@ + + + + + +WvPLAnalogOutputCapabilities + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLAnalogOutputCapabilities

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLAnalogOutputCapabilities
    +extends java.lang.Object
    +
    AnalogOutputCapabilities enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAuthenticateBitstreamConfigOption.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAuthenticateBitstreamConfigOption.html new file mode 100644 index 0000000..a1a40e5 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLAuthenticateBitstreamConfigOption.html @@ -0,0 +1,525 @@ + + + + + +WvPLAuthenticateBitstreamConfigOption + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLAuthenticateBitstreamConfigOption

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLAuthenticateBitstreamConfigOption
    +extends java.lang.Object
    +
    Configuration option of Authenticate Bitstream method for DeCENC mitigation.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Summary

      + + + + + + + + + + + + +
      Fields 
      Modifier and TypeFieldDescription
      protected longpeer 
      +
    • +
    +
    + +
    + +
    + +
    + +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLAuthenticateBitstreamConfigOption

        +
        public WvPLAuthenticateBitstreamConfigOption()
        +
        Constructs a new WvPLAuthenticateBitstreamConfigOption,
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setAuthenticationKeyIv

        +
        public void setAuthenticationKeyIv​(byte[] authenticationKeyIv)
        +
      • +
      + + + +
        +
      • +

        setAuthenticationKey

        +
        public void setAuthenticationKey​(byte[] authenticationKey)
        +
      • +
      + + + +
        +
      • +

        getAuthenticationKeyIv

        +
        public byte[] getAuthenticationKeyIv()
        +
      • +
      + + + +
        +
      • +

        getAuthenticationKey

        +
        public byte[] getAuthenticationKey()
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseEnvironment.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseEnvironment.html new file mode 100644 index 0000000..d588caa --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseEnvironment.html @@ -0,0 +1,867 @@ + + + + + +WvPLBaseEnvironment + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLBaseEnvironment<T>

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment<T>
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    Direct Known Subclasses:
    +
    WvPLEnvironment
    +
    +
    +
    public abstract class WvPLBaseEnvironment<T>
    +extends java.lang.Object
    +
    Abstract base class for all WvPL Environment APIs. + +

    Defines a common set of environment APIs. Provides a base class for WvPL SDK environments.

    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLBaseEnvironment

        +
        public WvPLBaseEnvironment()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        createSession

        +
        public abstract T createSession​(byte[] request)
        +                         throws WvPLStatusException
        +
        Creates a session. Use the session to handle license requests.
        +
        +
        Parameters:
        +
        request - license request from a CDM.
        +
        Returns:
        +
        WvPLBaseSession with the active session.
        +
        Throws:
        +
        WvPLStatusException - if session creation fails.
        +
        +
      • +
      + + + + + +
        +
      • +

        destroySession

        +
        public abstract void destroySession​(T wvplSession)
        +                             throws java.io.IOException
        +
        Destroys a previous session.
        +
        +
        Parameters:
        +
        wvplSession - the active session to destroy.
        +
        Throws:
        +
        java.io.IOException - unable to release session resources before closing.
        +
        +
      • +
      + + + +
        +
      • +

        generateDeviceStatusListRequest

        +
        public abstract byte[] generateDeviceStatusListRequest()
        +                                                throws WvPLStatusException
        +
        Returns a device status list request to be used in getting a DCSL.
        +
        +
        Returns:
        +
        byte[] including the device status list request or null upon failure.
        +
        Throws:
        +
        WvPLStatusException - upon failure.
        +
        +
      • +
      + + + +
        +
      • +

        setDeviceCertificateStatusList

        +
        public abstract WvPLStatus setDeviceCertificateStatusList​(byte[] signedCertificateStatusList)
        +                                                   throws WvPLStatusException
        +
        Sets the device certificate status list.
        +
        +
        Parameters:
        +
        signedCertificateStatusList - the bytes of the device certificate status list.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        Throws:
        +
        WvPLStatusException - upon failure.
        +
        +
      • +
      + + + +
        +
      • +

        setIndividualDeviceRevocationList

        +
        public abstract WvPLStatus setIndividualDeviceRevocationList​(byte[] individualDeviceRevocationList)
        +                                                      throws WvPLStatusException
        +
        Sets the individual device revocation list.
        +
        +
        Parameters:
        +
        individualDeviceRevocationList - the individual device revocation list.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        Throws:
        +
        WvPLStatusException - upon failure.
        +
        +
      • +
      + + + +
        +
      • +

        setServiceCertificate

        +
        public abstract WvPLStatus setServiceCertificate​(byte[] certificate,
        +                                                 byte[] privateKey,
        +                                                 byte[] passPhrase)
        +
        Sets a service certificate.
        +
        +
        Parameters:
        +
        certificate - a service certificate.
        +
        privateKey - the service certificate's private key.
        +
        passPhrase - the service certificate's pass phrase.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        +
      • +
      + + + +
        +
      • +

        setEncryptedProviderKeyConfig

        +
        public abstract WvPLStatus setEncryptedProviderKeyConfig​(byte[] encryptedProviderKeyConfig)
        +
        Sets an encrypted provider key config.
        +
        +
        Parameters:
        +
        encryptedProviderKeyConfig - an encrypted provider key config.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        +
      • +
      + + + +
        +
      • +

        setProviderKeyConfig

        +
        public abstract WvPLStatus setProviderKeyConfig​(byte[] encryptedProviderKeyConfig)
        +
        Deprecated, use setEncryptedProviderKeyConfig() instead.
        +
      • +
      + + + +
        +
      • +

        allowRevokedDevices

        +
        public abstract void allowRevokedDevices​(java.lang.String systemIdList)
        +                                  throws WvPLStatusException
        +
        Enable delivery of licenses to revoked client devices.
        +
        +
        Parameters:
        +
        systemIdList - is a comma separated list of systems Ids to allow even if revoked.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        isRevokedDeviceAllowed

        +
        public abstract boolean isRevokedDeviceAllowed​(long systemId)
        +                                        throws WvPLStatusException
        +
        Returns true if the system ID is allowed to receive a license, even if revoked.
        +
        +
        Parameters:
        +
        systemId - the systemID
        +
        Returns:
        +
        boolean true if the revoked systemID is allowed to receive a license.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        setCustomDeviceSecurityProfiles

        +
        public abstract WvPLStatus setCustomDeviceSecurityProfiles​(byte[] signedDeviceSecurityProfiles)
        +
        Sets the custom device security profile list.
        +
        +
        Parameters:
        +
        signedDeviceSecurityProfiles - the bytes of serialized signed device security profiles.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        +
      • +
      + + + +
        +
      • +

        getCustomDeviceSecurityProfileOwners

        +
        public abstract java.util.Vector<java.lang.String> getCustomDeviceSecurityProfileOwners()
        +                                                                                 throws WvPLStatusException
        +
        Retrieves owners for custom device security profiles.
        +
        +
        Returns:
        +
        Vector of owners for custom device security profiles.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        getCustomDeviceSecurityProfileNames

        +
        public abstract java.util.Vector<java.lang.String> getCustomDeviceSecurityProfileNames​(java.lang.String owner)
        +                                                                                throws WvPLStatusException
        +
        Retrieves the custom device security profile names associated with the owner.
        +
        +
        Parameters:
        +
        owner - the owner name
        +
        Returns:
        +
        Vector of custom device security profiles names.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        getCustomDeviceSecurityProfiles

        +
        public abstract java.util.Vector<WvPLDeviceSecurityProfile> getCustomDeviceSecurityProfiles​(java.lang.String owner)
        +                                                                                     throws WvPLStatusException
        +
        Retrieves custom device security profiles associated with the owner.
        +
        +
        Parameters:
        +
        owner - the owner name
        +
        Returns:
        +
        Vector of custom device security profiles
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        getDefaultDeviceSecurityProfileNames

        +
        public abstract java.util.Vector<java.lang.String> getDefaultDeviceSecurityProfileNames()
        +                                                                                 throws WvPLStatusException
        +
        Retrieves the default device security profile names.
        +
        +
        Returns:
        +
        Vector of default device security profile names.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getRequestAsString

        +
        public abstract java.lang.String getRequestAsString​(byte[] request)
        +                                             throws WvPLStatusException
        +
        Translates the license request from the CDM to a human-readable message, useful for debugging.
        +
        +
        Parameters:
        +
        request - the license request from the Widevine CDM
        +
        Returns:
        +
        the license request as a String
        +
        Throws:
        +
        WvPLStatusException - upon parse request failure
        +
        +
      • +
      + + + +
        +
      • +

        getSdkVersionString

        +
        public abstract java.lang.String getSdkVersionString()
        +
        Returns version of the SDK library.
        +
        +
        Returns:
        +
        version string
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseKey.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseKey.html new file mode 100644 index 0000000..7ed2b70 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseKey.html @@ -0,0 +1,594 @@ + + + + + +WvPLBaseKey + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLBaseKey

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLBaseKey
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    Direct Known Subclasses:
    +
    WvPLKey
    +
    +
    +
    public abstract class WvPLBaseKey
    +extends java.lang.Object
    +
    Abstract base class for WvPL Keys. + +

    Defines common WvPLBaseKey API methods. Provides a base class for WvPL keys.

    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLBaseKey

        +
        public WvPLBaseKey()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setOutputProtection

        +
        public abstract void setOutputProtection​(WvPLOutputProtection outputProtection)
        +
        Sets the WvPLOutputProtection for this content key.
        +
        +
        Parameters:
        +
        outputProtection - the WvPLOutputProtection object
        +
        +
      • +
      + + + + + + + +
        +
      • +

        setRequestedOutputProtection

        +
        public abstract void setRequestedOutputProtection​(WvPLOutputProtection requestedOutputProtection)
        +
        Sets the requested output protection for this content key.
        +
        +
        Parameters:
        +
        requestedOutputProtection - the WvPLOutputProtection object
        +
        +
      • +
      + + + +
        +
      • +

        getRequestedOutputProtection

        +
        public abstract WvPLOutputProtection getRequestedOutputProtection()
        +
        Returns the requested output protection for this content key.
        +
        +
        Returns:
        +
        an WvPLOutputProtection object.
        +
        +
      • +
      + + + +
        +
      • +

        setTrackType

        +
        public abstract void setTrackType​(WvPLTrackType.TrackType trackType)
        +
        Sets the track type from WvPLTrackType for this key.
        +
        +
        Parameters:
        +
        trackType - a WvPLTrackType.TrackType.
        +
        +
      • +
      + + + +
        +
      • +

        getTrackType

        +
        public abstract WvPLTrackType.TrackType getTrackType()
        +
        Returns the WvPLTrackType enumeration for this key.
        +
        +
        Returns:
        +
        an enumeration from WvPLTrackType.TrackType
        +
        +
      • +
      + + + +
        +
      • +

        setKeyType

        +
        public abstract void setKeyType​(WvPLKeyType.KeyType keyType)
        +
        Sets the key type from WvPLKeyType for this key.
        +
        +
        Parameters:
        +
        keyType - a WvPLKeyType.KeyType.
        +
        +
      • +
      + + + +
        +
      • +

        getKeyType

        +
        public abstract WvPLKeyType.KeyType getKeyType()
        +
        Returns the WvPLKeyType enumeration for this key.
        +
        +
        Returns:
        +
        an enumeration from WvPLKeyType.KeyType
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseSession.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseSession.html new file mode 100644 index 0000000..94f103a --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBaseSession.html @@ -0,0 +1,900 @@ + + + + + +WvPLBaseSession + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLBaseSession<T extends WvPLBaseKey>

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLBaseSession<T>
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    Direct Known Subclasses:
    +
    WvPLSession
    +
    +
    +
    public abstract class WvPLBaseSession<T extends WvPLBaseKey>
    +extends java.lang.Object
    +
    Abstract base class for WvPL sessions with generic WvPLKey type T. + +

    Defines common session API methods. Provides a base class for WvPL sessions.

    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLBaseSession

        +
        public WvPLBaseSession()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + +
        +
      • +

        addKey

        +
        public abstract WvPLStatus addKey​(T key)
        +
        Add a key to the license.
        +
        +
        Parameters:
        +
        key - WvPLBaseSession generic key object containing key information.
        +
        Returns:
        +
        WvPLStatus
        +
        +
      • +
      + + + + + +
        +
      • +

        filterKey

        +
        public abstract WvPLCapabilityStatus filterKey​(T key)
        +
        Conditionally add key to the license if the device can satisfy the output requirements.
        +
        +
        Parameters:
        +
        key - WvPLKey object containing key information.
        +
        Returns:
        +
        WvPLCapabilityStatus object containing details about the status of the device's + capability. CAPABILITY_OK indicates the key was successfully added.
        +
        +
      • +
      + + + +
        +
      • +

        getKeys

        +
        public abstract java.util.List<T> getKeys()
        +
        Get a list of keys in generic type which extends WvPLBaseKey.
        +
        +
        Returns:
        +
        a list of keys in type T.
        +
        +
      • +
      + + + +
        +
      • +

        setPolicy

        +
        public abstract void setPolicy​(WvPLPlaybackPolicy policy)
        +
        Sets the license policy.
        +
        +
        Parameters:
        +
        policy - WvPLPlaybackPolicy object containing policy information
        +
        +
      • +
      + + + +
        +
      • +

        setAllowUnverifiedPlatform

        +
        public abstract void setAllowUnverifiedPlatform​(boolean allowUnverifiedPlatform)
        +                                         throws WvPLStatusException
        +
        Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_UNVERIFIED.
        +
        +
        Parameters:
        +
        allowUnverifiedPlatform - allow unverified platform.
        +
        Throws:
        +
        WvPLStatusException - if unable to setAllowUnverifiedPlatform.
        +
        +
      • +
      + + + +
        +
      • +

        setAllowTamperedPlatform

        +
        public abstract void setAllowTamperedPlatform​(boolean allowTamperedPlatform)
        +                                       throws WvPLStatusException
        +
        Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_TAMPERED.
        +
        +
        Parameters:
        +
        allowTamperedPlatform - allow Tampered platform.
        +
        Throws:
        +
        WvPLStatusException - if unable to setAllowTamperedPlatform.
        +
        +
      • +
      + + + +
        +
      • +

        setRejectUnknownMakeModel

        +
        public abstract void setRejectUnknownMakeModel​(boolean rejectUnknownMakeModel)
        +                                        throws WvPLStatusException
        +
        If set to false, SDK can reject licensing behaviors to unknown make model. Default value is + false.
        +
        +
        Parameters:
        +
        rejectUnknownMakeModel - reject unknown make model.
        +
        Throws:
        +
        WvPLStatusException - if unable to setRejectUnknownMakeModel.
        +
        +
      • +
      + + + +
        +
      • +

        getRejectUnknownMakeModel

        +
        public abstract boolean getRejectUnknownMakeModel()
        +                                           throws WvPLStatusException
        +
        Retrieves the setting of whether unknown make model is rejected.
        +
        +
        Returns:
        +
        boolean sdk rejects unknown make model or not.
        +
        Throws:
        +
        WvPLStatusException - if unable to getRejectUnknownMakeModel.
        +
        +
      • +
      + + + +
        +
      • +

        getPolicy

        +
        public abstract WvPLPlaybackPolicy getPolicy()
        +
        Returns the license policy.
        +
        +
        Returns:
        +
        WvPLPlaybackPolicy containing policy information
        +
        +
      • +
      + + + +
        +
      • +

        getContentId

        +
        public abstract byte[] getContentId()
        +                             throws WvPLStatusException
        +
        Returns the content id from the license request.
        +
        +
        Returns:
        +
        byte[] content id.
        +
        Throws:
        +
        WvPLStatusException - upon error.
        +
        +
      • +
      + + + +
        +
      • +

        setSessionInit

        +
        public abstract void setSessionInit​(WvPLSessionInit sessionInit)
        +
        Sets the license session init.
        +
        +
        Parameters:
        +
        sessionInit - WvPLSessionInit the session init fields.
        +
        +
      • +
      + + + +
        +
      • +

        getSessionInit

        +
        public abstract WvPLSessionInit getSessionInit()
        +
        Returns the license session init.
        +
        +
        Returns:
        +
        WvPLSessionInit containing session init fields.
        +
        +
      • +
      + + + +
        +
      • +

        getClientInfo

        +
        public abstract WvPLClientInfo getClientInfo()
        +                                      throws WvPLStatusException
        +
        Returns the wvpl client info.
        +
        +
        Returns:
        +
        WvPLClientInfo containing client information.
        +
        Throws:
        +
        WvPLStatusException - if retrieval of client information from license request fails.
        +
        +
      • +
      + + + + + + + + + + + + + + + +
        +
      • +

        verifyPlatform

        +
        public abstract WvPLPlatformVerificationStatus verifyPlatform()
        +                                                       throws WvPLStatusException
        +
        Verifies the platform. Only meaningful for devices with + WvPLDeviceSecurityLevel.DeviceSecurityLevel = DEVICE_LEVEL_2 OR DEVICE_LEVEL_3. Devices with + WvPLDeviceSecurityLevel.DeviceSecurityLevel = DEVICE_LEVEL_1 are verified by default.
        +
        +
        Returns:
        +
        WvPLPlatformVerificationStatus
        +
        Throws:
        +
        WvPLStatusException - if unable to verify platform.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getQualifiedDefaultDeviceSecurityProfiles

        +
        public abstract java.util.Vector<java.lang.String> getQualifiedDefaultDeviceSecurityProfiles()
        +                                                                                      throws WvPLStatusException
        +
        Return the names of the qualified default device security profiles.
        +
        +
        Returns:
        +
        a vector of the qualified default device security profiles by their names.
        +
        Throws:
        +
        WvPLStatusException - if the retrieval of the device security profiles failed
        +
        +
      • +
      + + + +
        +
      • +

        getQualifiedCustomDeviceSecurityProfiles

        +
        public abstract java.util.Vector<java.lang.String> getQualifiedCustomDeviceSecurityProfiles​(java.lang.String customDeviceSecurityProfilesOwnerName)
        +                                                                                     throws WvPLStatusException
        +
        Return the names of the qualified custom device security profiles.
        +
        +
        Parameters:
        +
        customDeviceSecurityProfilesOwnerName - the owner of the custom device security profiles.
        +
        Returns:
        +
        a vector of the qualified custom device security profiles by their names.
        +
        Throws:
        +
        WvPLStatusException - if the retrieval of the device security profiles failed
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBrowserRequirement.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBrowserRequirement.html new file mode 100644 index 0000000..5542437 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLBrowserRequirement.html @@ -0,0 +1,288 @@ + + + + + +WvPLBrowserRequirement + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLBrowserRequirement

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLBrowserRequirement
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLBrowserRequirement
    +extends java.lang.Object
    +
    Models BrowserRequirement
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getPlatformVerificationStatuses

        +
        public java.util.List<WvPLPlatformVerificationStatus.PlatformVerificationStatus> getPlatformVerificationStatuses()
        +
        Retrieves the required platform verification status based on VMP and remote // attestation.
        +
        +
        Returns:
        +
        the platform verification status
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.DeviceCapabilityStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.DeviceCapabilityStatus.html new file mode 100644 index 0000000..3212221 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.DeviceCapabilityStatus.html @@ -0,0 +1,524 @@ + + + + + +WvPLCapabilityStatus.DeviceCapabilityStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLCapabilityStatus.DeviceCapabilityStatus

+
+
+ +
+ +
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.html new file mode 100644 index 0000000..233a800 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCapabilityStatus.html @@ -0,0 +1,457 @@ + + + + + +WvPLCapabilityStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLCapabilityStatus

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLCapabilityStatus
    +extends java.lang.Object
    +
    Actual vs. required output capabilities of a device.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.CertificateKeyType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.CertificateKeyType.html new file mode 100644 index 0000000..5eb83cd --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.CertificateKeyType.html @@ -0,0 +1,379 @@ + + + + + +WvPLCertificateKeyType.CertificateKeyType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLCertificateKeyType.CertificateKeyType

+
+
+ +
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Enum Constant Summary

      + + + + + + + + + + + + + + +
      Enum Constants 
      Enum ConstantDescription
      RSA_2048 
      RSA_3072 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLCertificateKeyType.CertificateKeyTypevalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLCertificateKeyType.CertificateKeyType[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLCertificateKeyType.CertificateKeyType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLCertificateKeyType.CertificateKeyType c : WvPLCertificateKeyType.CertificateKeyType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLCertificateKeyType.CertificateKeyType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.html new file mode 100644 index 0000000..d75abb6 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCertificateKeyType.html @@ -0,0 +1,335 @@ + + + + + +WvPLCertificateKeyType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLCertificateKeyType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLCertificateKeyType
    +extends java.lang.Object
    +
    CertificateKeyType enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.Cgms.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.Cgms.html new file mode 100644 index 0000000..4a069f1 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.Cgms.html @@ -0,0 +1,405 @@ + + + + + +WvPLCgms.Cgms + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLCgms.Cgms

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • java.lang.Enum<WvPLCgms.Cgms>
    • +
    • +
        +
      • com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
      • +
      +
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Serializable, java.lang.Comparable<WvPLCgms.Cgms>
    +
    +
    +
    Enclosing class:
    +
    WvPLCgms
    +
    +
    +
    public static enum WvPLCgms.Cgms
    +extends java.lang.Enum<WvPLCgms.Cgms>
    +
    Analog Copy protection enums definition
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLCgms.CgmsvalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLCgms.Cgms[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLCgms.Cgms[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLCgms.Cgms c : WvPLCgms.Cgms.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLCgms.Cgms valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.html new file mode 100644 index 0000000..60fcee3 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLCgms.html @@ -0,0 +1,335 @@ + + + + + +WvPLCgms + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLCgms

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLCgms
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLCgms
    +extends java.lang.Object
    +
    Class that wraps the analog copy protection enums.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLCgms.Cgms +
      Analog Copy protection enums definition
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLCgms​(WvPLCgms.Cgms cgms) +
      Constructor for the enum wrapping class.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      WvPLCgms.CgmsgetCgms() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLCgms

        +
        public WvPLCgms​(WvPLCgms.Cgms cgms)
        +
        Constructor for the enum wrapping class.
        +
        +
        Parameters:
        +
        cgms - Cgms setting
        +
        +
      • +
      +
    • +
    +
    + +
    + +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientCapabilities.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientCapabilities.html new file mode 100644 index 0000000..8450801 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientCapabilities.html @@ -0,0 +1,572 @@ + + + + + +WvPLClientCapabilities + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLClientCapabilities

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLClientCapabilities
    +extends java.lang.Object
    +
    Represents the client capabilities in the license request sent from the Proxy SDK or WvPL License + Server SDK.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getMaxHdcpVersion

        +
        public WvPLHdcp.HDCP getMaxHdcpVersion()
        +
        Returns the WvPLHdcp for max HDCP version.
        +
        +
        Returns:
        +
        an enumeration from WvPLHdcp.HDCP.
        +
        +
      • +
      + + + +
        +
      • +

        getOemCryptoApiVersion

        +
        public long getOemCryptoApiVersion()
        +
        Returns the OEM Crypto API Version.
        +
        +
        Returns:
        +
        OEM Crypto API Version.
        +
        +
      • +
      + + + +
        +
      • +

        getSrmVersion

        +
        public long getSrmVersion()
        +
        Retrieves the Srm Version.
        +
        +
        Returns:
        +
        the Srm Version.
        +
        +
      • +
      + + + +
        +
      • +

        getResourceRatingTier

        +
        public long getResourceRatingTier()
        +
        Retrieves the resource rating tier.
        +
        +
        Returns:
        +
        the resource rating tier.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getCanDisableAnalogOutput

        +
        public boolean getCanDisableAnalogOutput()
        +
        Retrieves the setting as to whether the device can disable its analog output.
        +
        +
        Returns:
        +
        the setting as to whether the device can disable its analog output.
        +
        +
      • +
      + + + +
        +
      • +

        getCanUpdateSrm

        +
        public boolean getCanUpdateSrm()
        +
        Retrieves the setting as to be capable of updating SRM data.
        +
        +
        Returns:
        +
        the setting as to whether the device is capable of updating SRM data.
        +
        +
      • +
      + + + +
        +
      • +

        getAntiRollbackUsageTable

        +
        public boolean getAntiRollbackUsageTable()
        +
        Retrieves the setting as to whether the key must only be used if the client supports anti + rollback of the user table.
        +
        +
        Returns:
        +
        the setting as to whether the key must only be used if the client supports anti + rollback of the user table.
        +
        +
      • +
      + + + +
        +
      • +

        getVideoResolutionConstraints

        +
        public boolean getVideoResolutionConstraints()
        +
        Retrieves the setting as to whether the video resolution of the content being decrypted/decoded + falls within one of the specified ranges.
        +
        +
        Returns:
        +
        the setting as to whether the video resolution of the content being decrypted/decoded + falls within one of the specified ranges.
        +
        +
      • +
      + + + +
        +
      • +

        getSessionToken

        +
        public boolean getSessionToken()
        +
        Retrieves the setting as to whether client session contains a token.
        +
        +
        Returns:
        +
        the setting as to whether client session contains a token.
        +
        +
      • +
      + + + +
        +
      • +

        getClientToken

        +
        public boolean getClientToken()
        +
        Retrieves the setting as to whether client token generated by the content provider.
        +
        +
        Returns:
        +
        the setting as to whether the client token generated by the content provider.
        +
        +
      • +
      + + + +
        +
      • +

        getSupportedCertificateKeyType

        +
        public java.util.List<WvPLCertificateKeyType> getSupportedCertificateKeyType()
        +
        Retrieves WvPLCertificateKeyType list.
        +
        +
        Returns:
        +
        the list of WvPLCertificateKeyType.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getInitialRenewalDelayBase

        +
        public boolean getInitialRenewalDelayBase()
        +
        Retrieves the setting as to whether the initial renewal delay base feature is supported on the + device.
        +
        +
        Returns:
        +
        the initial renewal delay base support setting on the device
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientInfo.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientInfo.html new file mode 100644 index 0000000..7c7d87f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClientInfo.html @@ -0,0 +1,401 @@ + + + + + +WvPLClientInfo + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLClientInfo

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLClientInfo
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLClientInfo
    +extends java.lang.Object
    +
    Represents the client identification in the license request sent from the Widevine CDM. + WvPLClientInfo is returned as a result of calling getClientInfo() on the WvPLProxySession object. + Use the access methods getMaxHdcpVersion(), getOemCryptoApiVersion(), getProviderClientToken(), + getNamesValues(), getClientCapabilities() to access ClientIdentification details. Since + getNamesValues() returns a map, iterate over this map to access ClientIdentification Name/Value + details.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getMaxHdcpVersion

        +
        public WvPLHdcp.HDCP getMaxHdcpVersion()
        +
        Returns the WvPLHdcp for max HDCP version.
        +
        +
        Returns:
        +
        an enumeration from WvPLHdcp.HDCP
        +
        +
      • +
      + + + +
        +
      • +

        getOemCryptoApiVersion

        +
        public int getOemCryptoApiVersion()
        +
        Returns the OEM Crypto API Version.
        +
        +
        Returns:
        +
        OEM Crypto API Version.
        +
        +
      • +
      + + + +
        +
      • +

        getProviderClientToken

        +
        public java.lang.String getProviderClientToken()
        +
        Retrieves the provider client token set by the provider.
        +
        +
        Returns:
        +
        String the provider client token
        +
        +
      • +
      + + + +
        +
      • +

        getCdmVersion

        +
        public java.lang.String getCdmVersion()
        +
        Retrieves the Widevine Client Decryption Module (CDM) version.
        +
        +
        Returns:
        +
        String the Widevine CDM version.
        +
        +
      • +
      + + + +
        +
      • +

        getNamesValues

        +
        public java.util.Map<java.lang.String,​java.lang.String> getNamesValues()
        +
        Retrieves the names/values present in the ClientIdentification.
        +
        +
        Returns:
        +
        a map of names/values present in the ClientIdentification.
        +
        +
      • +
      + + + + + + + + +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.ClockSecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.ClockSecurityLevel.html new file mode 100644 index 0000000..8faf3d4 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.ClockSecurityLevel.html @@ -0,0 +1,405 @@ + + + + + +WvPLClockSecurityLevel.ClockSecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLClockSecurityLevel.ClockSecurityLevel

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLClockSecurityLevel.ClockSecurityLevel[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLClockSecurityLevel.ClockSecurityLevel c : WvPLClockSecurityLevel.ClockSecurityLevel.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLClockSecurityLevel.ClockSecurityLevel valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.html new file mode 100644 index 0000000..dd2b1a7 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLClockSecurityLevel.html @@ -0,0 +1,335 @@ + + + + + +WvPLClockSecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLClockSecurityLevel

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLClockSecurityLevel
    +extends java.lang.Object
    +
    ClockSecurityLevel enum wrapper.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDcslInfo.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDcslInfo.html new file mode 100644 index 0000000..c3266e1 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDcslInfo.html @@ -0,0 +1,324 @@ + + + + + +WvPLDcslInfo + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDcslInfo

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDcslInfo
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDcslInfo
    +extends java.lang.Object
    +
    WvPL DcslInfo class that models the DCSL information.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLDcslInfo() 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      longgetCreationTimeSeconds() +
      Returns the creation time of the DcslInfo.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDcslInfo

        +
        public WvPLDcslInfo()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getCreationTimeSeconds

        +
        public long getCreationTimeSeconds()
        +
        Returns the creation time of the DcslInfo.
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigation.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigation.html new file mode 100644 index 0000000..0114b0f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigation.html @@ -0,0 +1,525 @@ + + + + + +WvPLDecencMitigation + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDecencMitigation

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLDecencMitigation
    +extends java.lang.Object
    +
    Represents the DeCENC mitigation options that can be specified by the content provider.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDecencMitigation

        +
        public WvPLDecencMitigation()
        +
        Constructs a new WvPLDecencMitigationOption.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + + + + + + + + + + + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationConfigOption.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationConfigOption.html new file mode 100644 index 0000000..702a6c4 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationConfigOption.html @@ -0,0 +1,497 @@ + + + + + +WvPLDecencMitigationConfigOption + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDecencMitigationConfigOption

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLDecencMitigationConfigOption
    +extends java.lang.Object
    +
    Configuration option of Decenc Mitigation.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDecencMitigationConfigOption

        +
        public WvPLDecencMitigationConfigOption()
        +
        Constructs a new WvPLDecencMitigationConfigOption,
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + + + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.DecencMitigationOption.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.DecencMitigationOption.html new file mode 100644 index 0000000..cfec7fa --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.DecencMitigationOption.html @@ -0,0 +1,431 @@ + + + + + +WvPLDecencMitigationOption.DecencMitigationOption + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDecencMitigationOption.DecencMitigationOption

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLDecencMitigationOption.DecencMitigationOption[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLDecencMitigationOption.DecencMitigationOption c : WvPLDecencMitigationOption.DecencMitigationOption.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLDecencMitigationOption.DecencMitigationOption valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.html new file mode 100644 index 0000000..b8e4652 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDecencMitigationOption.html @@ -0,0 +1,244 @@ + + + + + +WvPLDecencMitigationOption + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDecencMitigationOption

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDecencMitigationOption
    +extends java.lang.Object
    +
    Wraps DecencMitigationOption enumeration.
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceInfo.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceInfo.html new file mode 100644 index 0000000..f7df5bd --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceInfo.html @@ -0,0 +1,949 @@ + + + + + +WvPLDeviceInfo + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceInfo

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceInfo
    +extends java.lang.Object
    +
    Represents the device info in the License SDK for the device requesting the license.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDeviceInfo

        +
        public WvPLDeviceInfo()
        +
        Constructs a new WvPLDeviceInfo
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setSystemId

        +
        public void setSystemId​(long systemId)
        +
        Sets the systemId for the device.
        +
        +
        Parameters:
        +
        systemId - the systemId value
        +
        +
      • +
      + + + +
        +
      • +

        getSystemId

        +
        public long getSystemId()
        +
        Retrieves the systemId for the device.
        +
        +
        Returns:
        +
        the systemId for the device
        +
        +
      • +
      + + + +
        +
      • +

        setSoc

        +
        public void setSoc​(java.lang.String soc)
        +
        Sets the soc (system-on-chip) for the device.
        +
        +
        Parameters:
        +
        soc - the system on chip for the device
        +
        +
      • +
      + + + +
        +
      • +

        getSoc

        +
        public java.lang.String getSoc()
        +
        Retrieves the soc (system-on-chip) for the device.
        +
        +
        Returns:
        +
        the system on chip for the device
        +
        +
      • +
      + + + +
        +
      • +

        setManufacturer

        +
        public void setManufacturer​(java.lang.String manufacturer)
        +
        Sets the device make (manufacturer).
        +
        +
        Parameters:
        +
        manufacturer - the manufacturer of the device
        +
        +
      • +
      + + + +
        +
      • +

        getManufacturer

        +
        public java.lang.String getManufacturer()
        +
        Retrieves the device make (manufacturer).
        +
        +
        Returns:
        +
        the manufacturer of the device
        +
        +
      • +
      + + + +
        +
      • +

        setModel

        +
        public void setModel​(java.lang.String model)
        +
        Sets the device model.
        +
        +
        Parameters:
        +
        model - the model of the device
        +
        +
      • +
      + + + +
        +
      • +

        getModel

        +
        public java.lang.String getModel()
        +
        Retrieves the device model.
        +
        +
        Returns:
        +
        the model of the device
        +
        +
      • +
      + + + +
        +
      • +

        setDeviceType

        +
        public void setDeviceType​(java.lang.String type)
        +
        Sets the type of device.
        +
        +
        Parameters:
        +
        type - the device type
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceType

        +
        public java.lang.String getDeviceType()
        +
        Retrieves the type of device.
        +
        +
        Returns:
        +
        the device type
        +
        +
      • +
      + + + +
        +
      • +

        setPlatform

        +
        public void setPlatform​(WvPLDevicePlatform.Platform platform)
        +
        Sets the platform of the device.
        +
        +
        Parameters:
        +
        platform - the platform of the device
        +
        +
      • +
      + + + + + + + + + + + + + + + +
        +
      • +

        setTestDevice

        +
        public void setTestDevice​(boolean testDevice)
        +
        Sets a boolean 'true' to mark the device as a test device (default = false)
        +
        +
        Parameters:
        +
        testDevice - the boolean value to mark the device as a test device
        +
        +
      • +
      + + + +
        +
      • +

        getTestDevice

        +
        public boolean getTestDevice()
        +
        Retrieves the setting as to whether the device is a test device.
        +
        +
        Returns:
        +
        the setting as to whether the device is a test device
        +
        +
      • +
      + + + +
        +
      • +

        setDrmCertificateSerialNumber

        +
        public void setDrmCertificateSerialNumber​(byte[] drmCertificateSerialNumber)
        +
        Sets the 128-bit globally unique serial number of DRM device certificate.
        +
        +
        Parameters:
        +
        drmCertificateSerialNumber - the device certificate serial number
        +
        +
      • +
      + + + +
        +
      • +

        getDrmCertificateSerialNumber

        +
        public byte[] getDrmCertificateSerialNumber()
        +
        Retrieves the 128-bit globally unique serial number of the certificate.
        +
        +
        Returns:
        +
        the device certificate serial number
        +
        +
      • +
      + + + +
        +
      • +

        setServiceId

        +
        public void setServiceId​(java.lang.String serviceId)
        +
        Sets the service identifier (web origin) for the provider which owns the certificate.
        +
        +
        Parameters:
        +
        serviceId - the service identifier
        +
        +
      • +
      + + + +
        +
      • +

        getServiceId

        +
        public java.lang.String getServiceId()
        +
        Retrieves the service identifier (web origin) for the provider which owns the certificate.
        +
        +
        Returns:
        +
        the service identifier
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        addModelInfo

        +
        public void addModelInfo​(WvPLDeviceModelInfo modelInfo)
        +
        Add ModelInfo to WvPLDeviceInfo.
        +
        +
        Parameters:
        +
        modelInfo - the device model info as WvPLDeviceModelInfo
        +
        +
      • +
      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelInfo.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelInfo.html new file mode 100644 index 0000000..2a6cdea --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelInfo.html @@ -0,0 +1,351 @@ + + + + + +WvPLDeviceModelInfo + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceModelInfo

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLDeviceModelInfo
    +extends java.lang.Object
    +
    Device model information for the device making a license request.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      java.lang.StringgetManufacturer() +
      Manufacturer or make of the device making the license request.
      +
      java.lang.StringgetModel() +
      Model or brand of the device making the license request.
      +
      WvPLDeviceModelStatus.DeviceModelStatusgetModelStatus() +
      Device Model Status of the device making the license request.
      +
      longgetModelYear() +
      Model launch year of the device making the license request.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getManufacturer

        +
        public java.lang.String getManufacturer()
        +
        Manufacturer or make of the device making the license request.
        +
        +
        Returns:
        +
        String
        +
        +
      • +
      + + + +
        +
      • +

        getModel

        +
        public java.lang.String getModel()
        +
        Model or brand of the device making the license request.
        +
        +
        Returns:
        +
        String
        +
        +
      • +
      + + + +
        +
      • +

        getModelYear

        +
        public long getModelYear()
        +
        Model launch year of the device making the license request.
        +
        +
        Returns:
        +
        long
        +
        +
      • +
      + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.DeviceModelStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.DeviceModelStatus.html new file mode 100644 index 0000000..d32f4c8 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.DeviceModelStatus.html @@ -0,0 +1,432 @@ + + + + + +WvPLDeviceModelStatus.DeviceModelStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDeviceModelStatus.DeviceModelStatus

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLDeviceModelStatus.DeviceModelStatus[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLDeviceModelStatus.DeviceModelStatus c : WvPLDeviceModelStatus.DeviceModelStatus.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLDeviceModelStatus.DeviceModelStatus valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceModelStatus

        +
        public int getDeviceModelStatus()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.html new file mode 100644 index 0000000..bd23c81 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceModelStatus.html @@ -0,0 +1,335 @@ + + + + + +WvPLDeviceModelStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceModelStatus

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceModelStatus
    +extends java.lang.Object
    +
    DeviceModelStatus enum wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.Platform.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.Platform.html new file mode 100644 index 0000000..be0f51d --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.Platform.html @@ -0,0 +1,613 @@ + + + + + +WvPLDevicePlatform.Platform + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDevicePlatform.Platform

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.html new file mode 100644 index 0000000..6ebb380 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDevicePlatform.html @@ -0,0 +1,335 @@ + + + + + +WvPLDevicePlatform + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDevicePlatform

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDevicePlatform
    +extends java.lang.Object
    +
    WvPLDevicePlatform class definition.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDevicePlatform

        +
        public WvPLDevicePlatform​(WvPLDevicePlatform.Platform devicePlatform)
        +
        Constructor for the enum wrapping class.
        +
        +
        Parameters:
        +
        devicePlatform - Platform setting
        +
        +
      • +
      +
    • +
    +
    + +
    + +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.DeviceSecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.DeviceSecurityLevel.html new file mode 100644 index 0000000..f614d8e --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.DeviceSecurityLevel.html @@ -0,0 +1,405 @@ + + + + + +WvPLDeviceSecurityLevel.DeviceSecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDeviceSecurityLevel.DeviceSecurityLevel

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLDeviceSecurityLevel.DeviceSecurityLevel[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLDeviceSecurityLevel.DeviceSecurityLevel c : WvPLDeviceSecurityLevel.DeviceSecurityLevel.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLDeviceSecurityLevel.DeviceSecurityLevel valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.html new file mode 100644 index 0000000..f382493 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityLevel.html @@ -0,0 +1,335 @@ + + + + + +WvPLDeviceSecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceSecurityLevel

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceSecurityLevel
    +extends java.lang.Object
    +
    WvPLDeviceSecurityLevel class definition.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityProfile.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityProfile.html new file mode 100644 index 0000000..c940103 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceSecurityProfile.html @@ -0,0 +1,416 @@ + + + + + +WvPLDeviceSecurityProfile + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceSecurityProfile

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceSecurityProfile
    +extends java.lang.Object
    +
    Models DeviceSecurityProfile
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods Deprecated Methods 
      Modifier and TypeMethodDescription
      com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfileControlTimegetControlTime() +
      Retrieves the control time.
      +
      java.util.List<com.google.video.widevine.sdk.wvpl.WvPLDeviceException>getExceptions() +
      Retrieves the list of device exceptions
      +
      com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfileLevel.DeviceSecurityProfileLevelgetLevel() +
      Deprecated.
      +
      java.lang.StringgetName() +
      Retrieves the name of the device security profile.
      +
      com.google.video.widevine.sdk.wvpl.WvPLOutputRequirementgetOutputRequirement() +
      Retrieves the output requirement.
      +
      java.lang.StringgetOwner() +
      Retrieves the name of the owner of the device security profile.
      +
      WvPLSecurityRequirementgetSecurityRequirement() +
      Retrieves the security requirement.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getName

        +
        public java.lang.String getName()
        +
        Retrieves the name of the device security profile.
        +
        +
        Returns:
        +
        the name of the device security profile as a String
        +
        +
      • +
      + + + +
        +
      • +

        getLevel

        +
        @Deprecated
        +public com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfileLevel.DeviceSecurityProfileLevel getLevel()
        +
        Deprecated.
        +
        Retrieves the device security profile level.
        +
        +
        Returns:
        +
        the level of the device security profile as WvPLDeviceSecurityProfileLevel.DeviceSecurityProfileLevel
        +
        +
      • +
      + + + +
        +
      • +

        getOutputRequirement

        +
        public com.google.video.widevine.sdk.wvpl.WvPLOutputRequirement getOutputRequirement()
        +
        Retrieves the output requirement.
        +
        +
        Returns:
        +
        the output requirement as a WvPLOutputRequirement
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getOwner

        +
        public java.lang.String getOwner()
        +
        Retrieves the name of the owner of the device security profile.
        +
        +
        Returns:
        +
        the owner of the device security profile as a string
        +
        +
      • +
      + + + +
        +
      • +

        getExceptions

        +
        public java.util.List<com.google.video.widevine.sdk.wvpl.WvPLDeviceException> getExceptions()
        +
        Retrieves the list of device exceptions
        +
        +
        Returns:
        +
        a list of device exceptions as WvPLDeviceException
        +
        +
      • +
      + + + +
        +
      • +

        getControlTime

        +
        public com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfileControlTime getControlTime()
        +
        Retrieves the control time.
        +
        +
        Returns:
        +
        control time as a WvPLDeviceSecurityProfileControlTime
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.DeviceState.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.DeviceState.html new file mode 100644 index 0000000..414586c --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.DeviceState.html @@ -0,0 +1,485 @@ + + + + + +WvPLDeviceState.DeviceState + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDeviceState.DeviceState

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLDeviceState.DeviceState[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLDeviceState.DeviceState c : WvPLDeviceState.DeviceState.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLDeviceState.DeviceState valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceState

        +
        public int getDeviceState()
        +
      • +
      + + + + +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.html new file mode 100644 index 0000000..304ccbe --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceState.html @@ -0,0 +1,353 @@ + + + + + +WvPLDeviceState + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceState

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceState
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceState
    +extends java.lang.Object
    +
    Class shows Device status such as RELEASED or REVOKED.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDeviceState

        +
        public WvPLDeviceState​(WvPLDeviceState.DeviceState deviceState)
        +
        Constructor for the enum wrapping class.
        +
        +
        Parameters:
        +
        deviceState - DeviceState setting
        +
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.DeviceStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.DeviceStatus.html new file mode 100644 index 0000000..c3e2229 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.DeviceStatus.html @@ -0,0 +1,432 @@ + + + + + +WvPLDeviceStatus.DeviceStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLDeviceStatus.DeviceStatus

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLDeviceStatus.DeviceStatus[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLDeviceStatus.DeviceStatus c : WvPLDeviceStatus.DeviceStatus.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLDeviceStatus.DeviceStatus valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceStatus

        +
        public int getDeviceStatus()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.html new file mode 100644 index 0000000..563ad06 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatus.html @@ -0,0 +1,336 @@ + + + + + +WvPLDeviceStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceStatus

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLDeviceStatus
    +extends java.lang.Object
    +
    DeviceStatus enums wrapping class. Represents the status of the device. This would be mappable + from the DeviceCertificateStatusList (DCSL).
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatusOptions.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatusOptions.html new file mode 100644 index 0000000..cbf13ff --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDeviceStatusOptions.html @@ -0,0 +1,680 @@ + + + + + +WvPLDeviceStatusOptions + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDeviceStatusOptions

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLDeviceStatusOptions
    +extends java.lang.Object
    +
    DeviceStatusOptions represents the options for the device based on it's system_id status of the + device. Can be used when generating a license as part of SessionInit.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Summary

      + + + + + + + + + + + + +
      Fields 
      Modifier and TypeFieldDescription
      protected longpeer 
      +
    • +
    +
    + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      voidclose() +
      Releases resources for C++ peer.
      +
      protected voiddestroyPeer() 
      voidfinalize() +
      Calls close() to release resources for C++ peer in case that was not already done.
      +
      booleangetAllowPreReleaseSystemId() +
      Returns the option for allowiing re-release system Id.
      +
      booleangetAllowRevokedIndividualDevice() +
      Returns the option for allowiing individually revoked device..
      +
      booleangetAllowRevokedSystemId() +
      Returns the option for allowing revoked system Id.
      +
      booleangetAllowTestOnlySystemId() +
      Returns the option for allowing test_only system Id.
      +
      booleangetAllowUnknownSystemId() +
      Returns the option for allowing unknown system Id.
      +
      protected longgetPeer() +
      Get the C++ peer
      +
      protected voidinitializePeer() 
      protected voidresetPeer() +
      reset the C++ peer
      +
      voidsetAllowPreReleaseSystemId​(boolean allowPreReleaseSystemId) +
      Sets the allow pre-release system id option.
      +
      voidsetAllowRevokedIndividualDevice​(boolean allowRevokedIndividualDevice) +
      Sets the allowing individually revoked device.
      +
      voidsetAllowRevokedSystemId​(boolean allowRevokedSystemId) +
      Sets the allow revoked system id option.
      +
      voidsetAllowUnknownSystemId​(boolean allowUnknownSystemId) +
      Sets the allow unknown system id option.
      +
      voidsetTestOnlySystemId​(boolean allowTestOnlySystemId) +
      Sets the allow test_only system id option.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLDeviceStatusOptions

        +
        public WvPLDeviceStatusOptions()
        +
        Constructor
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setAllowUnknownSystemId

        +
        public void setAllowUnknownSystemId​(boolean allowUnknownSystemId)
        +
        Sets the allow unknown system id option.
        +
        +
        Parameters:
        +
        allowUnknownSystemId - option.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowUnknownSystemId

        +
        public boolean getAllowUnknownSystemId()
        +
        Returns the option for allowing unknown system Id.
        +
        +
        Returns:
        +
        allowUnknownSystemId option.
        +
        +
      • +
      + + + +
        +
      • +

        setAllowRevokedSystemId

        +
        public void setAllowRevokedSystemId​(boolean allowRevokedSystemId)
        +
        Sets the allow revoked system id option.
        +
        +
        Parameters:
        +
        allowRevokedSystemId - option.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowRevokedSystemId

        +
        public boolean getAllowRevokedSystemId()
        +
        Returns the option for allowing revoked system Id.
        +
        +
        Returns:
        +
        allowRevokedSystemId option.
        +
        +
      • +
      + + + +
        +
      • +

        setTestOnlySystemId

        +
        public void setTestOnlySystemId​(boolean allowTestOnlySystemId)
        +
        Sets the allow test_only system id option.
        +
        +
        Parameters:
        +
        allowTestOnlySystemId - option.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowTestOnlySystemId

        +
        public boolean getAllowTestOnlySystemId()
        +
        Returns the option for allowing test_only system Id.
        +
        +
        Returns:
        +
        allowTestOnlySystemId option.
        +
        +
      • +
      + + + +
        +
      • +

        setAllowPreReleaseSystemId

        +
        public void setAllowPreReleaseSystemId​(boolean allowPreReleaseSystemId)
        +
        Sets the allow pre-release system id option.
        +
        +
        Parameters:
        +
        allowPreReleaseSystemId - option.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowPreReleaseSystemId

        +
        public boolean getAllowPreReleaseSystemId()
        +
        Returns the option for allowiing re-release system Id.
        +
        +
        Returns:
        +
        allowPreReleaseSystemId option.
        +
        +
      • +
      + + + +
        +
      • +

        setAllowRevokedIndividualDevice

        +
        public void setAllowRevokedIndividualDevice​(boolean allowRevokedIndividualDevice)
        +
        Sets the allowing individually revoked device.
        +
        +
        Parameters:
        +
        allowRevokedIndividualDevice - option.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowRevokedIndividualDevice

        +
        public boolean getAllowRevokedIndividualDevice()
        +
        Returns the option for allowiing individually revoked device..
        +
        +
        Returns:
        +
        allowRevokedIndividualDevice option.
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDrmInfo.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDrmInfo.html new file mode 100644 index 0000000..5fafb78 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLDrmInfo.html @@ -0,0 +1,484 @@ + + + + + +WvPLDrmInfo + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLDrmInfo

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLDrmInfo
    +extends java.lang.Object
    +
    Provides DrmInfo for the associated WvPLSession and WvPLProxySession.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setRequestModelInfo

        +
        public void setRequestModelInfo​(WvPLDeviceModelInfo requestModelInfo)
        +
      • +
      + + + + + + + +
        +
      • +

        getSystemId

        +
        public long getSystemId()
        +
        The systemId of the App-specific DRM device certificate making the license request.
        +
        +
        Returns:
        +
        long
        +
        +
      • +
      + + + +
        +
      • +

        getOutputRequirement

        +
        public com.google.video.widevine.sdk.wvpl.WvPLOutputRequirement getOutputRequirement()
        +
        The output requirement specified for the license request.
        +
        +
        Returns:
        +
        WvPLOutputRequirement
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getDeviceState

        +
        public WvPLDeviceState getDeviceState()
        +
        The device state for the Device Security Profile used for the license request.
        +
        +
        Returns:
        +
        WvPLDeviceState
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceName

        +
        public java.lang.String getDeviceName()
        +
        Get deviceName as specified in WvPLClientInfo.
        +
        +
        Returns:
        +
        deviceName
        +
        +
      • +
      + + + +
        +
      • +

        getProductInfo

        +
        public com.google.video.widevine.sdk.wvpl.WvPLProductInfo getProductInfo()
        +
        Get productInfo as specified in WvPLClientInfo}.
        +
        +
        Returns:
        +
        productInfo
        +
        +
      • +
      + + + +
        +
      • +

        getPlatform

        +
        public java.lang.String getPlatform()
        +
        Get platform as specified in WvPLDeviceInfo.
        +
        +
        Returns:
        +
        platform
        +
        +
      • +
      + + + +
        +
      • +

        getDeviceType

        +
        public java.lang.String getDeviceType()
        +
        Get deviceType as specified in WvPLDeviceInfo.
        +
        +
        Returns:
        +
        deviceType
        +
        +
      • +
      + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.EncryptionScheme.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.EncryptionScheme.html new file mode 100644 index 0000000..2706efa --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.EncryptionScheme.html @@ -0,0 +1,392 @@ + + + + + +WvPLEncryptionScheme.EncryptionScheme + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLEncryptionScheme.EncryptionScheme

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLEncryptionScheme.EncryptionScheme[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLEncryptionScheme.EncryptionScheme c : WvPLEncryptionScheme.EncryptionScheme.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLEncryptionScheme.EncryptionScheme valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.html new file mode 100644 index 0000000..6048a2e --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEncryptionScheme.html @@ -0,0 +1,245 @@ + + + + + +WvPLEncryptionScheme + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLEncryptionScheme

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme
    • +
    +
  • +
+
+
    +
  • +
    +
    @CheckReturnValue
    +public class WvPLEncryptionScheme
    +extends java.lang.Object
    +
    Wraps EncryptionScheme enumeration
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEntitledKey.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEntitledKey.html new file mode 100644 index 0000000..c441ce7 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEntitledKey.html @@ -0,0 +1,373 @@ + + + + + +WvPLEntitledKey + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLEntitledKey

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLEntitledKey
    +extends java.lang.Object
    +
    Models a Widevine entitled key for licensing. This object is retrieved as part of + WvPLWidevinePsshData.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      byte[]getEntitlementKeyId() +
      Returns the entitlement key identifier, the key identifier associated with an entitlement key.
      +
      byte[]getEntitlementKeyIv() +
      Returns the entitlement key IV.
      +
      intgetEntitlementKeySize() +
      Returns the entitlement key size in bytes.
      +
      byte[]getKeyBytes() +
      Retrieves the entitled key.
      +
      byte[]getKeyId() +
      Retrieves the entitled key ID.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getEntitlementKeyId

        +
        public byte[] getEntitlementKeyId()
        +
        Returns the entitlement key identifier, the key identifier associated with an entitlement key.
        +
        +
        Returns:
        +
        the entitlement key identifier
        +
        +
      • +
      + + + +
        +
      • +

        getKeyBytes

        +
        public byte[] getKeyBytes()
        +
        Retrieves the entitled key.
        +
        +
        Returns:
        +
        the entitled key
        +
        +
      • +
      + + + +
        +
      • +

        getKeyId

        +
        public byte[] getKeyId()
        +
        Retrieves the entitled key ID.
        +
        +
        Returns:
        +
        the entitled key identifier
        +
        +
      • +
      + + + +
        +
      • +

        getEntitlementKeyIv

        +
        public byte[] getEntitlementKeyIv()
        +
        Returns the entitlement key IV.
        +
        +
        Returns:
        +
        the entitlement key IV
        +
        +
      • +
      + + + +
        +
      • +

        getEntitlementKeySize

        +
        public int getEntitlementKeySize()
        +
        Returns the entitlement key size in bytes.
        +
        +
        Returns:
        +
        the entitlement key size
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEnvironment.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEnvironment.html new file mode 100644 index 0000000..db6afc2 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLEnvironment.html @@ -0,0 +1,1253 @@ + + + + + +WvPLEnvironment + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLEnvironment

+
+
+ +
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLEnvironment
    +extends WvPLBaseEnvironment<WvPLSession>
    +
    Generate a Widevine environment object. The environment object is used to create widevine + sessions. WvEnvironment is used to hold data and spans the lifetime of a session. Sessions will + not get generated if the initial call to setDeviceCertificateStatusList() is not successful. + +
    
    + Map<String, String> configValues = new HashMap<String, String>();
    +
    + Map<Integer, String> preProvKeys = new HashMap<Integer, String>();
    + preProvKeys.put(100, "f7008b38acc00ec68c732ac665c55c65");
    +
    + WvPLEnvironment env = new WvPLEnvironment(config);
    +
    + // Load previsioning keys
    + env.setPreProvisioningKeys(preProvKeys);
    +
    + // Load the service certificate.
    + byte[] serviceCert = someFunctionToLoadDrmServiceCertificate();
    + // Load the service certificate private key.
    + byte[] privateKey = someFunctionToLoadPrivateKey();
    + // Load the pass phrase
    + byte[] passPhrase = someFunctionToLoadPassPhrase();
    +
    + WvPLStatus status;
    + status = env.setServiceCertificate(serviceCert, privateKey, passPhrase);
    +
    + // Fetch certificate status list.
    + byte[] certStatusList = loadCertStatusList();
    + status = env.setDeviceCertificateStatusList(cert_status_list);
    +
    + byte[] licenseRequest = someFunctionToFetchLicenseRequest();
    + // Create session
    + try {
    +   WvPLSession session = env.createSession(licenseRequest);
    +   ...
    +   env.destroySession(session);
    +   env.close();
    + } catch (WvPLStatusException e) {
    +   byte[] serviceCertificateResponse = env.generateErrorResponse(e.getStatus());
    +   if (serviceCertificateResponse != null) {
    +     // Send serviceCertificateResponse to CDM
    +     ...
    +   }
    + }
    + 
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLEnvironment

        +
        public WvPLEnvironment​(java.util.Map<java.lang.String,​java.lang.String> configValues)
        +
        Constructs WvPLEnviroment. + +

        Config Values + +

          +
        • device_certificate_expiration: number of seconds before certificate list expires +
        • allow_unknown_device: true/false +
        +
        +
        Parameters:
        +
        configValues - map constaining configuration values
        +
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + +
        +
      • +

        createSessionWithOptions

        +
        public WvPLSession createSessionWithOptions​(byte[] request,
        +                                            WvPLSessionCreateOptions sessionCreateOptions)
        +                                     throws WvPLStatusException
        +
        Creates a WvPLSession with license request and options.
        +
        +
        Parameters:
        +
        request - license request from CDM
        +
        sessionCreateOptions - options in creating a session.
        +
        Returns:
        +
        WvPLSession
        +
        Throws:
        +
        WvPLStatusException - if session creation fails
        +
        +
      • +
      + + + +
        +
      • +

        setAutoSetProviderSessionToken

        +
        public void setAutoSetProviderSessionToken​(boolean autoSetProviderSessionToken)
        +                                    throws WvPLStatusException
        +
        If set to 'true', the provider session token may be automatically set in the license. The + default is 'true'.
        +
        +
        Parameters:
        +
        autoSetProviderSessionToken - the setting as to whether the provider session token is + automatically set, if it has not been set by the content provider.
        +
        Throws:
        +
        WvPLStatusException - if the session is not valid.
        +
        +
      • +
      + + + +
        +
      • +

        getAutoSetProviderSessionToken

        +
        public boolean getAutoSetProviderSessionToken()
        +                                       throws WvPLStatusException
        +
        Retrieve the setting as to whether the provider session may be automatically set in the + license.
        +
        +
        Returns:
        +
        boolean setting as to whether the provider session token is automatically set, if it + has not been set by the content provider.
        +
        Throws:
        +
        WvPLStatusException - if the session is not valid.
        +
        +
      • +
      + + + +
        +
      • +

        generateErrorResponse

        +
        public byte[] generateErrorResponse​(WvPLStatus status)
        +
        Generates a service certificate response if the WvPLStatus code is + SERVICE_CERTIFICATE_REQUEST_MESSAGE.
        +
        +
        Parameters:
        +
        status - WvPLStatus to inspect
        +
        Returns:
        +
        byte[] containing the service certificate request or null, if error
        +
        +
      • +
      + + + +
        +
      • +

        updateWithCertificates

        +
        @Deprecated
        +public WvPLStatus updateWithCertificates​(byte[] certList)
        +                                  throws java.lang.Exception
        + +
        Updates the certificate status list.
        +
        +
        Parameters:
        +
        certList - certificate status list
        +
        Returns:
        +
        WvPLStatus
        +
        Throws:
        +
        java.lang.Exception
        +
        Since:
        +
        mid-Q3 2021
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        setServiceCertificate

        +
        public WvPLStatus setServiceCertificate​(byte[] certificate,
        +                                        byte[] privateKey,
        +                                        byte[] passPhrase)
        +
        Sets the service certificate.
        +
        +
        Specified by:
        +
        setServiceCertificate in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        certificate - service certificate
        +
        privateKey - service certificate private key
        +
        passPhrase - service certificate pass phrase
        +
        Returns:
        +
        WvPLStatus
        +
        +
      • +
      + + + +
        +
      • +

        setEncryptedProviderKeyConfig

        +
        public WvPLStatus setEncryptedProviderKeyConfig​(byte[] encryptedProviderKeyConfig)
        +
        Sets an encrypted provider key config.
        +
        +
        Specified by:
        +
        setEncryptedProviderKeyConfig in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        encryptedProviderKeyConfig - an encrypted provider key config.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        setDevicesToHandleOEMCryptoVersionInKCB

        +
        public void setDevicesToHandleOEMCryptoVersionInKCB​(java.lang.String systemIds)
        +
        Specify a comma separated list of system Ids that can support having OEMCrypto version, as + specified in the license request, reflected back in the Key Control Block(KCB). Otherwise, only + 'kctl' or 'kc09' is returned in the Key Control Block.
        +
        +
        Parameters:
        +
        systemIds - comma separated list of system Ids.
        +
        +
      • +
      + + + +
        +
      • +

        setPreProvisioningKeys

        +
        public WvPLStatus setPreProvisioningKeys​(java.util.Map<java.lang.Integer,​java.lang.String> keys)
        +
        Sets the pre provisioning keys.
        +
        +
        Parameters:
        +
        keys - map containing system_id and key
        +
        Returns:
        +
        WvPLStatus
        +
        +
      • +
      + + + +
        +
      • +

        getStatsAsBytes

        +
        public byte[] getStatsAsBytes​(boolean flushData)
        +
        Retrieve license counter stats as bytes. If flushData is set, the internal license counters are + reset, else the internal license counters will continue to accumulate stats. signature is an + out parameter that will be populated with a signature for the returned byte array. The return + value is a representation of video_widevine_server.sdk.SignedDeviceLicenseCounterRequest in + bytes.
        +
        +
        Parameters:
        +
        flushData - flush or clear the data
        +
        Returns:
        +
        byte[] containing the license counter stats.
        +
        +
      • +
      + + + +
        +
      • +

        getStatsAsString

        +
        public java.lang.String getStatsAsString​(boolean flushData)
        +
        Retrieve license counter stats as a string. If flushData is set, the internal license counters + are reset, else the internal license counters will continue to accumulate stats. The return + value is a a std::string representation of video_widevine_server.sdk.DeviceLicenseCounterRequest.
        +
        +
        Parameters:
        +
        flushData - flush or clear the data
        +
        Returns:
        +
        a std::string containing the license counter stats.
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        isRevokedDeviceAllowed

        +
        public boolean isRevokedDeviceAllowed​(long systemId)
        +                               throws WvPLStatusException
        +
        Returns true if the system ID is allowed to receive a license, even if revoked.
        +
        +
        Specified by:
        +
        isRevokedDeviceAllowed in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        systemId - the systemID
        +
        Returns:
        +
        boolean true if the revoked systemID is allowed to receive a license.
        +
        Throws:
        +
        WvPLStatusException - upon failure
        +
        +
      • +
      + + + +
        +
      • +

        setCustomDeviceSecurityProfiles

        +
        public WvPLStatus setCustomDeviceSecurityProfiles​(byte[] signedDeviceSecurityProfiles)
        +
        Sets the custom device security profile list.
        +
        +
        Specified by:
        +
        setCustomDeviceSecurityProfiles in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        signedDeviceSecurityProfiles - the bytes of the signed device security profiles.
        +
        Returns:
        +
        WvPLStatus containing the return status of the operation.
        +
        +
      • +
      + + + + + + + + + + + + + + + +
        +
      • +

        getDefaultDeviceSecurityProfileNames

        +
        @Deprecated
        +public java.util.Vector<java.lang.String> getDefaultDeviceSecurityProfileNames()
        +                                                                        throws WvPLStatusException
        +
        Deprecated. +
        use getCustomDeviceSecurityProfileNames() instead after loading the custom DSPs in + the Environment class.
        +
        +
        Retrieves the default device security profile names.
        +
        +
        Specified by:
        +
        getDefaultDeviceSecurityProfileNames in class WvPLBaseEnvironment<WvPLSession>
        +
        Returns:
        +
        Vector of default device security profile names.
        +
        Throws:
        +
        WvPLStatusException - upon failure.
        +
        Since:
        +
        end of Q1 2025
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getRequestAsString

        +
        public java.lang.String getRequestAsString​(byte[] request)
        +                                    throws WvPLStatusException
        +
        Retrieves the license request from the Widevine CDM as a base64-encoded string. This + base64-encoded std::string can be used to parse this request via the Widevine Integration Console + diagnostics.
        +
        +
        Specified by:
        +
        getRequestAsString in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        request - the license request from the Widevine CDM
        +
        Returns:
        +
        the base64-encoded license request as a String
        +
        Throws:
        +
        WvPLStatusException - upon parse request failure
        +
        +
      • +
      + + + +
        +
      • +

        destroySession

        +
        public void destroySession​(WvPLSession wvplSession)
        +                    throws java.io.IOException
        +
        Destroy a previously created session. Performs the same functionality as WvPLSession.close(), + except that this call can delete the WvPLSession passed in as a param. Only one of this + WvPLEnvironment.destroySession(...) OR WvPLSession.close(...) must be called on the same + WvPLSession object.
        +
        +
        Specified by:
        +
        destroySession in class WvPLBaseEnvironment<WvPLSession>
        +
        Parameters:
        +
        wvplSession - the active session to destroy.
        +
        Throws:
        +
        java.io.IOException - unable to release session resources before closing.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        initializePeer

        +
        public void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.HDCP.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.HDCP.html new file mode 100644 index 0000000..d2380ba --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.HDCP.html @@ -0,0 +1,458 @@ + + + + + +WvPLHdcp.HDCP + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLHdcp.HDCP

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • java.lang.Enum<WvPLHdcp.HDCP>
    • +
    • +
        +
      • com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
      • +
      +
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Serializable, java.lang.Comparable<WvPLHdcp.HDCP>
    +
    +
    +
    Enclosing class:
    +
    WvPLHdcp
    +
    +
    +
    public static enum WvPLHdcp.HDCP
    +extends java.lang.Enum<WvPLHdcp.HDCP>
    +
    HDCP enum values.
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      intgetHDCP() 
      static WvPLHdcp.HDCPvalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLHdcp.HDCP[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLHdcp.HDCP[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLHdcp.HDCP c : WvPLHdcp.HDCP.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLHdcp.HDCP valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getHDCP

        +
        public int getHDCP()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.html new file mode 100644 index 0000000..e7c91e1 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLHdcp.html @@ -0,0 +1,335 @@ + + + + + +WvPLHdcp + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLHdcp

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLHdcp
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLHdcp
    +extends java.lang.Object
    +
    HDCP enums wrapping class.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLHdcp.HDCP +
      HDCP enum values.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLHdcp​(WvPLHdcp.HDCP hdcp) +
      Constructor for the enum wrapping class.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      WvPLHdcp.HDCPgetHDCP() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLHdcp

        +
        public WvPLHdcp​(WvPLHdcp.HDCP hdcp)
        +
        Constructor for the enum wrapping class.
        +
        +
        Parameters:
        +
        hdcp -
        +
        +
      • +
      +
    • +
    +
    + +
    + +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKey.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKey.html new file mode 100644 index 0000000..54b1b7f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKey.html @@ -0,0 +1,1082 @@ + + + + + +WvPLKey + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLKey

+
+
+ +
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLKey
    +extends WvPLBaseKey
    +
    A sub class which inherits from WvPLBaseKey. WvPLKey class represents a WvPLKey which + encapsulates the content key. The content key uses the output protection WvPLOutputProtection and this content key is used to encrypt and decrypt the content.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLKey

        +
        public WvPLKey()
        +
        Creates a new WvPLKey.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setKeyId

        +
        public void setKeyId​(byte[] keyId)
        +
        Sets an unique key identifier for this content key.
        +
        +
        Parameters:
        +
        keyId - unique key identifier
        +
        +
      • +
      + + + +
        +
      • +

        getKeyId

        +
        public byte[] getKeyId()
        +
        Returns the key identifier for this content key.
        +
        +
        Returns:
        +
        key identifier as a byte array
        +
        +
      • +
      + + + +
        +
      • +

        setKeyBytes

        +
        public void setKeyBytes​(byte[] keyBytes)
        +
        Sets the key to be used for encrypting and decrypting the content.
        +
        +
        Parameters:
        +
        keyBytes - key for encrypting and decrypting the content
        +
        +
      • +
      + + + +
        +
      • +

        getKeyBytes

        +
        public byte[] getKeyBytes()
        +
        Returns the key that is used for encrypting and decrypting the content.
        +
        +
        Returns:
        +
        the key as a byte array
        +
        +
      • +
      + + + +
        +
      • +

        setWrappingKey

        +
        public void setWrappingKey​(byte[] wrappingKey)
        +
        Sets the wrapping key to be used for encrypting 'keyBytes'.
        +
        +
        Parameters:
        +
        wrappingKey - key for encrypting the 'keyBytes'
        +
        +
      • +
      + + + +
        +
      • +

        getWrappingKey

        +
        public byte[] getWrappingKey()
        +
        Returns the key that is used for encrypting 'keyBytes'.
        +
        +
        Returns:
        +
        the wrapping key
        +
        +
      • +
      + + + +
        +
      • +

        addVideoResolutionConstraint

        +
        public void addVideoResolutionConstraint​(WvPLVideoResolutionConstraint videoResolutionConstraint)
        +
        Sets a WvPLVideoResolutionConstraint on the output protection.
        +
        +
        Parameters:
        +
        videoResolutionConstraint - the video resolution constraint to be set.
        +
        +
      • +
      + + + +
        +
      • +

        getVideoResolutionConstraint

        +
        public java.util.List<WvPLVideoResolutionConstraint> getVideoResolutionConstraint()
        +
        Retrieves the list of video resolution constraints.
        +
        +
        Returns:
        +
        the list of video resolution constraints
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        hasOutputProtection

        +
        public boolean hasOutputProtection()
        +
        Returns whether the WvPLOutputProtection for this content key is set.
        +
        +
        Returns:
        +
        whether the WvPLOutputProtection for this content key is set.
        +
        +
      • +
      + + + +
        +
      • +

        setRequestedOutputProtection

        +
        public void setRequestedOutputProtection​(WvPLOutputProtection requestedOutputProtection)
        +
        Sets the requested output protection for this content key.
        +
        +
        Specified by:
        +
        setRequestedOutputProtection in class WvPLBaseKey
        +
        Parameters:
        +
        requestedOutputProtection - the WvPLOutputProtection object
        +
        +
      • +
      + + + + + + + +
        +
      • +

        hasRequestedOutputProtection

        +
        public boolean hasRequestedOutputProtection()
        +
        Returns whether the requested WvPLOutputProtection for this content key is set.
        +
        +
        Returns:
        +
        whether the requested WvPLOutputProtection for this content key is set.
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        hasTrackType

        +
        public boolean hasTrackType()
        +
        Returns whether the WvPLTrackType enumeration for this key is set.
        +
        +
        Returns:
        +
        whether the WvPLTrackType for this key is set.
        +
        +
      • +
      + + + +
        +
      • +

        setOperatorSessionKeyPermissions

        +
        public void setOperatorSessionKeyPermissions​(WvPLOperatorSessionKeyPermissions permissions)
        +
        Sets the operator session key permissions.
        +
        +
        Parameters:
        +
        permissions - a WvPLOperatorSessionKeyPermissions.
        +
        +
      • +
      + + + +
        +
      • +

        getOperatorSessionKeyPermissions

        +
        public WvPLOperatorSessionKeyPermissions getOperatorSessionKeyPermissions()
        +
        Returns the operator session key permissions.
        +
        +
        Returns:
        +
        a WvPLOperatorSessionKeyPermissions.
        +
        +
      • +
      + + + + + + + + + + + + + + + + + + + +
        +
      • +

        setRequiredProfile

        +
        public void setRequiredProfile​(byte[] requiredProfile)
        +
        Sets the required device security profile for this key.
        +
        +
        Parameters:
        +
        requiredProfile - name of required device security profile..
        +
        +
      • +
      + + + +
        +
      • +

        getRequiredProfile

        +
        public byte[] getRequiredProfile()
        +
        Returns the required profile for this key.
        +
        +
        Returns:
        +
        requiredProfile
        +
        +
      • +
      + + + +
        +
      • +

        setContentOwner

        +
        public void setContentOwner​(byte[] contentOwner)
        +
        Sets the content owner.
        +
        +
        Parameters:
        +
        contentOwner - used to find device security profiles.
        +
        +
      • +
      + + + +
        +
      • +

        getContentOwner

        +
        public byte[] getContentOwner()
        +
        Returns the content owner.
        +
        +
        Returns:
        +
        contentOwner
        +
        +
      • +
      + + + +
        +
      • +

        setDecencMitigation

        +
        public void setDecencMitigation​(WvPLDecencMitigation decencMitigation)
        +
        Sets the DeCENC Mitigation option.
        +
        +
        Parameters:
        +
        decencMitigation - DeCENC Mitigation option.
        +
        +
      • +
      + + + +
        +
      • +

        getDecencMitigation

        +
        public WvPLDecencMitigation getDecencMitigation()
        +
        Returns the DeCENC Mitigation option.
        +
        +
        Returns:
        +
        DeCENC Mitigation option.
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.KeyCategory.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.KeyCategory.html new file mode 100644 index 0000000..920bd04 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.KeyCategory.html @@ -0,0 +1,379 @@ + + + + + +WvPLKeyCategory.KeyCategory + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLKeyCategory.KeyCategory

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLKeyCategory.KeyCategoryvalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLKeyCategory.KeyCategory[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLKeyCategory.KeyCategory[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLKeyCategory.KeyCategory c : WvPLKeyCategory.KeyCategory.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLKeyCategory.KeyCategory valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.html new file mode 100644 index 0000000..ed8e875 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategory.html @@ -0,0 +1,244 @@ + + + + + +WvPLKeyCategory + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLKeyCategory

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLKeyCategory
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLKeyCategory
    +extends java.lang.Object
    +
    Wraps WvPLKeyCategory enumeration.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLKeyCategory.KeyCategory +
      WvPLKeyCategory enumeration definitions
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategorySpec.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategorySpec.html new file mode 100644 index 0000000..b33b791 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyCategorySpec.html @@ -0,0 +1,526 @@ + + + + + +WvPLKeyCategorySpec + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLKeyCategorySpec

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLKeyCategorySpec
    +extends java.lang.Object
    +
    WvPLKeyCategory class represents the key category for a WvPLKey. It indiates if a WvPLKey is + created for single content or a group of contents.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLKeyCategorySpec

        +
        public WvPLKeyCategorySpec()
        +
        Constructs a new WvPLKeyCategorySpec,
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + + + + + +
        +
      • +

        setContentOrGroupId

        +
        public void setContentOrGroupId​(byte[] contentOrGroupId)
        +
      • +
      + + + +
        +
      • +

        getContentOrGroupId

        +
        public byte[] getContentOrGroupId()
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.KeyType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.KeyType.html new file mode 100644 index 0000000..bdafee4 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.KeyType.html @@ -0,0 +1,444 @@ + + + + + +WvPLKeyType.KeyType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLKeyType.KeyType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • java.lang.Enum<WvPLKeyType.KeyType>
    • +
    • +
        +
      • com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
      • +
      +
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Serializable, java.lang.Comparable<WvPLKeyType.KeyType>
    +
    +
    +
    Enclosing class:
    +
    WvPLKeyType
    +
    +
    +
    public static enum WvPLKeyType.KeyType
    +extends java.lang.Enum<WvPLKeyType.KeyType>
    +
    KeyType enumeration definitions
    +
  • +
+
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLKeyType.KeyType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLKeyType.KeyType c : WvPLKeyType.KeyType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLKeyType.KeyType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.html new file mode 100644 index 0000000..3c2e5e2 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLKeyType.html @@ -0,0 +1,290 @@ + + + + + +WvPLKeyType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLKeyType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLKeyType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLKeyType
    +extends java.lang.Object
    +
    Wraps KeyType enumeration. WvPLKeyType.KeyType is used on the keys used for generating a license.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLKeyType.KeyType +
      KeyType enumeration definitions
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLKeyType() 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLKeyType

        +
        public WvPLKeyType()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.LicenseCategory.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.LicenseCategory.html new file mode 100644 index 0000000..e42bec5 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.LicenseCategory.html @@ -0,0 +1,392 @@ + + + + + +WvPLLicenseCategory.LicenseCategory + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLLicenseCategory.LicenseCategory

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLLicenseCategory.LicenseCategory[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLLicenseCategory.LicenseCategory c : WvPLLicenseCategory.LicenseCategory.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLLicenseCategory.LicenseCategory valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.html new file mode 100644 index 0000000..3fe0f4b --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategory.html @@ -0,0 +1,244 @@ + + + + + +WvPLLicenseCategory + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLLicenseCategory

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLLicenseCategory
    +extends java.lang.Object
    +
    Wraps WvPLLicenseCategory enumeration.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLLicenseCategory.LicenseCategory +
      WvPLLicenseCategory enumeration definitions
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategorySpec.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategorySpec.html new file mode 100644 index 0000000..f083df6 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseCategorySpec.html @@ -0,0 +1,527 @@ + + + + + +WvPLLicenseCategorySpec + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLLicenseCategorySpec

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLLicenseCategorySpec
    +extends java.lang.Object
    +
    WvPLLicenseCategory class represents the License category for a WvPLLicense. It indicates if a + license is created for single content or multiple contents (combination of single contents plus a + group of contents) or a group of contents.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLLicenseCategorySpec

        +
        public WvPLLicenseCategorySpec()
        +
        Constructs a new WvPLLicenseCategorySpec,
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + + + + + +
        +
      • +

        setContentOrGroupId

        +
        public void setContentOrGroupId​(byte[] contentOrGroupId)
        +
      • +
      + + + +
        +
      • +

        getContentOrGroupId

        +
        public byte[] getContentOrGroupId()
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseIdentification.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseIdentification.html new file mode 100644 index 0000000..505e1a3 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseIdentification.html @@ -0,0 +1,488 @@ + + + + + +WvPLLicenseIdentification + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLLicenseIdentification

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLLicenseIdentification
    +extends java.lang.Object
    +
    Represents licenseIdentification over its lifetime with an updated version.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLLicenseIdentification

        +
        public WvPLLicenseIdentification()
        +
        Constructs a new WvPLLicenseIdentification
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setRequestId

        +
        public void setRequestId​(byte[] requestId)
        +
      • +
      + + + +
        +
      • +

        getRequestId

        +
        public byte[] getRequestId()
        +
      • +
      + + + +
        +
      • +

        setSessionId

        +
        public void setSessionId​(byte[] sessionId)
        +
      • +
      + + + +
        +
      • +

        getSessionId

        +
        public byte[] getSessionId()
        +
      • +
      + + + +
        +
      • +

        setProviderSessionToken

        +
        public void setProviderSessionToken​(byte[] providerSessionToken)
        +
      • +
      + + + +
        +
      • +

        getProviderSessionToken

        +
        public byte[] getProviderSessionToken()
        +
      • +
      + + + +
        +
      • +

        setPurchaseId

        +
        public void setPurchaseId​(byte[] type)
        +
      • +
      + + + +
        +
      • +

        getPurchaseId

        +
        public byte[] getPurchaseId()
        +
      • +
      + + + +
        +
      • +

        setVersion

        +
        public void setVersion​(long version)
        +
      • +
      + + + +
        +
      • +

        getVersion

        +
        public long getVersion()
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.LicenseRequestType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.LicenseRequestType.html new file mode 100644 index 0000000..9b24f88 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.LicenseRequestType.html @@ -0,0 +1,405 @@ + + + + + +WvPLLicenseRequestType.LicenseRequestType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLLicenseRequestType.LicenseRequestType

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLLicenseRequestType.LicenseRequestType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLLicenseRequestType.LicenseRequestType c : WvPLLicenseRequestType.LicenseRequestType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLLicenseRequestType.LicenseRequestType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.html new file mode 100644 index 0000000..65bc6cc --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseRequestType.html @@ -0,0 +1,335 @@ + + + + + +WvPLLicenseRequestType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLLicenseRequestType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLLicenseRequestType
    +extends java.lang.Object
    +
    LicenseRequestType enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.LicenseType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.LicenseType.html new file mode 100644 index 0000000..da420cc --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.LicenseType.html @@ -0,0 +1,408 @@ + + + + + +WvPLLicenseType.LicenseType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLLicenseType.LicenseType

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Serializable, java.lang.Comparable<WvPLLicenseType.LicenseType>
    +
    +
    +
    Enclosing class:
    +
    WvPLLicenseType
    +
    +
    +
    public static enum WvPLLicenseType.LicenseType
    +extends java.lang.Enum<WvPLLicenseType.LicenseType>
    +
    LicenseType enum values. + +

    AUTOMATIC : The type of license used in the request and response between the client and the + server.

    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLLicenseType.LicenseTypevalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLLicenseType.LicenseType[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLLicenseType.LicenseType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLLicenseType.LicenseType c : WvPLLicenseType.LicenseType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLLicenseType.LicenseType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.html new file mode 100644 index 0000000..947a446 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLLicenseType.html @@ -0,0 +1,335 @@ + + + + + +WvPLLicenseType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLLicenseType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLLicenseType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLLicenseType
    +extends java.lang.Object
    +
    LicenseType enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.MessageType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.MessageType.html new file mode 100644 index 0000000..eaf1e82 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.MessageType.html @@ -0,0 +1,405 @@ + + + + + +WvPLMessageType.MessageType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLMessageType.MessageType

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLMessageType.MessageType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLMessageType.MessageType c : WvPLMessageType.MessageType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLMessageType.MessageType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.html new file mode 100644 index 0000000..9584dc1 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLMessageType.html @@ -0,0 +1,335 @@ + + + + + +WvPLMessageType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLMessageType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLMessageType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLMessageType
    +extends java.lang.Object
    +
    MessageType enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOperatorSessionKeyPermissions.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOperatorSessionKeyPermissions.html new file mode 100644 index 0000000..97a6156 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOperatorSessionKeyPermissions.html @@ -0,0 +1,634 @@ + + + + + +WvPLOperatorSessionKeyPermissions + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLOperatorSessionKeyPermissions

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public final class WvPLOperatorSessionKeyPermissions
    +extends java.lang.Object
    +
    Operator Session Key Permissions
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLOperatorSessionKeyPermissions

        +
        public WvPLOperatorSessionKeyPermissions()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setAllowEncrypt

        +
        public void setAllowEncrypt​(boolean flag)
        +
      • +
      + + + +
        +
      • +

        getAllowEncrypt

        +
        public boolean getAllowEncrypt()
        +
      • +
      + + + +
        +
      • +

        hasAllowEncrypt

        +
        public boolean hasAllowEncrypt()
        +
      • +
      + + + +
        +
      • +

        setAllowDecrypt

        +
        public void setAllowDecrypt​(boolean flag)
        +
      • +
      + + + +
        +
      • +

        getAllowDecrypt

        +
        public boolean getAllowDecrypt()
        +
      • +
      + + + +
        +
      • +

        hasAllowDecrypt

        +
        public boolean hasAllowDecrypt()
        +
      • +
      + + + +
        +
      • +

        setAllowSign

        +
        public void setAllowSign​(boolean flag)
        +
      • +
      + + + +
        +
      • +

        getAllowSign

        +
        public boolean getAllowSign()
        +
      • +
      + + + +
        +
      • +

        hasAllowSign

        +
        public boolean hasAllowSign()
        +
      • +
      + + + +
        +
      • +

        setAllowSignatureVerify

        +
        public void setAllowSignatureVerify​(boolean flag)
        +
      • +
      + + + +
        +
      • +

        getAllowSignatureVerify

        +
        public boolean getAllowSignatureVerify()
        +
      • +
      + + + +
        +
      • +

        hasAllowSignatureVerify

        +
        public boolean hasAllowSignatureVerify()
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOutputProtection.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOutputProtection.html new file mode 100644 index 0000000..3c9a05d --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLOutputProtection.html @@ -0,0 +1,892 @@ + + + + + +WvPLOutputProtection + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLOutputProtection

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLOutputProtection
    +extends java.lang.Object
    +
    Specifies output protection for the content. Output protection is set per key.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Summary

      + + + + + + + + + + + + +
      Fields 
      Modifier and TypeFieldDescription
      protected longpeer 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLOutputProtection() +
      Constructs a new WvPLOutputProtection,
      +
      +
    • +
    +
    + +
    + +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLOutputProtection

        +
        public WvPLOutputProtection()
        +
        Constructs a new WvPLOutputProtection,
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setHdcp

        +
        public void setHdcp​(WvPLHdcp.HDCP hdcp)
        +
        Sets a value from WvPLHdcp for a key that requires HDCP.
        +
        +
        Parameters:
        +
        hdcp - enumerated value from WvPLHdcp.HDCP
        +
        +
      • +
      + + + +
        +
      • +

        getHdcp

        +
        public WvPLHdcp.HDCP getHdcp()
        +
        Returns the WvPLHdcp value for the key that is using this output protection.
        +
        +
        Returns:
        +
        an enumeration from WvPLHdcp.HDCP
        +
        +
      • +
      + + + +
        +
      • +

        hasHdcp

        +
        public boolean hasHdcp()
        +
        Returns whether the WvPLHdcp value for the key that is using this output protection was + set.
        +
        +
        Returns:
        +
        a boolean representing whether the WvPLHdcp value for the key that is using + this output protection was set.
        +
        +
      • +
      + + + +
        +
      • +

        setSecuredataPath

        +
        public void setSecuredataPath​(boolean secureDataPath)
        +
        Sets the secure data path on the device.
        +
        +
        Parameters:
        +
        secureDataPath - boolean value representing if secure data path is set.
        +
        +
      • +
      + + + +
        +
      • +

        getSecuredataPath

        +
        public boolean getSecuredataPath()
        +
        Returns true if the secure data path on the device was set.
        +
        +
        Returns:
        +
        a boolean, depending on whether the secure data path was set.
        +
        +
      • +
      + + + +
        +
      • +

        hasSecuredataPath

        +
        public boolean hasSecuredataPath()
        +
        Returns whether the secure data path on the device was set.
        +
        +
        Returns:
        +
        a boolean representing whether the secure data path on the device was set.
        +
        +
      • +
      + + + +
        +
      • +

        setSecurityLevel

        +
        public void setSecurityLevel​(WvPLSecurityLevel.SecurityLevel securityLevel)
        +
        Sets the security level robustness as defined by Widevine.
        +
        +
        Parameters:
        +
        securityLevel - the security level
        +
        +
      • +
      + + + +
        +
      • +

        getSecurityLevel

        +
        public WvPLSecurityLevel.SecurityLevel getSecurityLevel()
        +
        Retrieves the security level robustness defined by Widevine.
        +
        +
        Returns:
        +
        the security level
        +
        +
      • +
      + + + +
        +
      • +

        setDisableAnalogOutput

        +
        public void setDisableAnalogOutput​(boolean disableAnalogOutput)
        +
        If set to true, analog output is disabled.
        +
        +
        Parameters:
        +
        disableAnalogOutput -
        +
        +
      • +
      + + + +
        +
      • +

        getDisableAnalogOutput

        +
        public boolean getDisableAnalogOutput()
        +
        Retrieves the status of analog output.
        +
        +
        Returns:
        +
        the analog output level
        +
        +
      • +
      + + + +
        +
      • +

        hasDisableAnalogOutput

        +
        public boolean hasDisableAnalogOutput()
        +
        Returns whether disable analog output was set.
        +
        +
        Returns:
        +
        a boolean representing whether disable analog output was set.
        +
        +
      • +
      + + + +
        +
      • +

        setDisableDigitalOutput

        +
        public void setDisableDigitalOutput​(boolean disableDigitalOutput)
        +
        If set to true, digital output is disabled.
        +
        +
        Parameters:
        +
        disableDigitalOutput -
        +
        +
      • +
      + + + +
        +
      • +

        getDisableDigitalOutput

        +
        public boolean getDisableDigitalOutput()
        +
        Retrieves the status of digital output.
        +
        +
        Returns:
        +
        the digital output level
        +
        +
      • +
      + + + +
        +
      • +

        hasDisableDigitalOutput

        +
        public boolean hasDisableDigitalOutput()
        +
        Returns whether disable digital output was set.
        +
        +
        Returns:
        +
        a boolean representing whether disable digital output was set.
        +
        +
      • +
      + + + +
        +
      • +

        setCgms

        +
        public void setCgms​(WvPLCgms.Cgms cgms)
        +
        Sets the CGMS-A analog output WvPLCgms
        +
        +
        Parameters:
        +
        cgms - the analog output enum
        +
        +
      • +
      + + + +
        +
      • +

        getCgms

        +
        public WvPLCgms.Cgms getCgms()
        +
        Retrieves the CGMS-A analog output WvPLCgms
        +
        +
        Returns:
        +
        the CGMS-A analog output enum
        +
        +
      • +
      + + + +
        +
      • +

        hasCgms

        +
        public boolean hasCgms()
        +
        Returns whether the CGMS-A analog output WvPLCgms was set.
        +
        +
        Returns:
        +
        a boolean representing whether the CGMS-A analog output WvPLCgms was set.
        +
        +
      • +
      + + + +
        +
      • +

        setAllowRecord

        +
        public void setAllowRecord​(boolean allowRecord)
        +
        If set to true, it indicates digital video recording (DVR) is allowed.
        +
        +
        Parameters:
        +
        allowRecord - if record is allowed
        +
        +
      • +
      + + + +
        +
      • +

        getAllowRecord

        +
        public boolean getAllowRecord()
        +
        Retrieves the status of allow record.
        +
        +
        Returns:
        +
        status of allow record
        +
        +
      • +
      + + + +
        +
      • +

        hasAllowRecord

        +
        public boolean hasAllowRecord()
        +
        Returns whether the digital video recording (DVR) is allowed was set.
        +
        +
        Returns:
        +
        a boolean representing whether the digital video recording (DVR) is allowed was set.
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.PlatformVerificationStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.PlatformVerificationStatus.html new file mode 100644 index 0000000..acd72e6 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.PlatformVerificationStatus.html @@ -0,0 +1,431 @@ + + + + + +WvPLPlatformVerificationStatus.PlatformVerificationStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLPlatformVerificationStatus.PlatformVerificationStatus

+
+
+ +
+ +
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.html new file mode 100644 index 0000000..ce98ef9 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlatformVerificationStatus.html @@ -0,0 +1,360 @@ + + + + + +WvPLPlatformVerificationStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLPlatformVerificationStatus

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLPlatformVerificationStatus
    +extends java.lang.Object
    +
    Wraps PlatformVerificationStatus enumeration
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlaybackPolicy.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlaybackPolicy.html new file mode 100644 index 0000000..bb868ce --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLPlaybackPolicy.html @@ -0,0 +1,1448 @@ + + + + + +WvPLPlaybackPolicy + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLPlaybackPolicy

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLPlaybackPolicy
    +extends java.lang.Object
    +
    Represents the playback attributes for the acquired license and all the keys.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Summary

      + + + + + + + + + + + + +
      Fields 
      Modifier and TypeFieldDescription
      protected longpeer 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLPlaybackPolicy() +
      Constructs a new WvPLPlaybackPolicy.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      voidclose() +
      Releases resources for C++ peer.
      +
      protected voiddestroyPeer() 
      voidfinalize() +
      Calls close() to release resources for C++ peer in case that was not already done.
      +
      booleangetAlwaysIncludeClientId() +
      Returns true if client identification is to be included in the following RENEWAL and/or + RELEASE license requests sent by the client.
      +
      booleangetCanPersist() +
      Returns true if the license is to be persisted for offline use.
      +
      booleangetCanPlay() +
      Returns true if this content can be played back.
      +
      booleangetCanRenew() +
      Returns true if the license can be renewed.
      +
      WvPLTimerDelayBase.TimerDelayBasegetInitialRenewalDelayBase() +
      Returns the initial renewal delay base setting.
      +
      longgetLicenseDurationSeconds() +
      Returns the license window in seconds.
      +
      protected longgetPeer() +
      Get the C++ peer
      +
      longgetPlaybackDurationSeconds() +
      Returns the viewing window in seconds.
      +
      longgetRenewalIntervalSeconds() +
      Returns the license renewal interval time in seconds.
      +
      longgetRenewalRecoveryDurationSeconds() +
      Returns the continuing playback time in seconds after license renewal fails.
      +
      longgetRenewalRetryIntervalSeconds() +
      Returns the delay in seconds between license renewal attempts.
      +
      java.lang.StringgetRenewalUrl() +
      Returns the url location where license renewal requests are to be sent.
      +
      booleangetRenewWithUsage() +
      Returns true if the license is to be sent for renewal when usage is started.
      +
      longgetRentalDurationSeconds() +
      Returns the rental window in seconds.
      +
      booleangetSoftEnforcePlaybackDuration() +
      Returns true if the playback will continue until the end of the content being played + back, even if playback duration has expired.
      +
      booleangetSoftEnforceRentalDuration() +
      Returns true if the playback will continue until the end of the content being played + back, even if rental duration has expired.
      +
      booleanhasAlwaysIncludeClientId() +
      Returns whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client was set.
      +
      booleanhasCanPersist() +
      Returns whether the license is to be persisted for offline use was set.
      +
      booleanhasCanPlay() +
      Returns whether this content can be played back was set.
      +
      booleanhasCanRenew() +
      Returns whether the license can be renewed was set.
      +
      booleanhasInitialRenewalDelayBase() +
      Returns whether the initial renewal delay base setting was set.
      +
      booleanhasLicenseDurationSeconds() +
      Returns whether the license window was set.
      +
      booleanhasPlaybackDurationSeconds() +
      Returns whether the viewing window was set.
      +
      booleanhasRenewalIntervalSeconds() +
      Returns whether the license renewal interval time was set.
      +
      booleanhasRenewalRecoveryDurationSeconds() +
      Returns whether the continuing playback time was set.
      +
      booleanhasRenewalRetryIntervalSeconds() +
      Returns whether the delay in seconds between license renewal attempts was set.
      +
      booleanhasRenewalUrl() +
      Returns whether the url location where license renewal requests are to be sent was set.
      +
      booleanhasRenewWithUsage() +
      Returns whether the license is to be sent for renewal when usage is started was set.
      +
      booleanhasRentalDurationSeconds() +
      Returns whether the rental window was set.
      +
      booleanhasSoftEnforcePlaybackDuration() +
      Returns whether the playback will continue until the end of the content being played back, even + if playback duration has expired was set.
      +
      booleanhasSoftEnforceRentalDuration() +
      Returns whether the playback will continue until the end of the content being played back, even + if rental duration has expired was set.
      +
      protected voidinitializePeer() 
      protected voidresetPeer() +
      reset the C++ peer
      +
      voidsetAlwaysIncludeClientId​(boolean alwaysIncludeClientId) +
      Sets whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client.
      +
      voidsetCanPersist​(boolean canPersist) +
      Sets whether the license may be persisted to non-volatile storage.
      +
      voidsetCanPlay​(boolean canPlay) +
      Sets whether this content can be played back.
      +
      voidsetCanRenew​(boolean canRenew) +
      Sets whether the license can be renewed.
      +
      voidsetInitialRenewalDelayBase​(WvPLTimerDelayBase.TimerDelayBase timerDelayBase) +
      Sets the initial renewal delay base.
      +
      voidsetLicenseDurationSeconds​(long licenseDurationSeconds) +
      Set the license window in seconds.
      +
      voidsetPlaybackDurationSeconds​(long playbackDurationSeconds) +
      Sets the viewing window in seconds.
      +
      voidsetRenewalIntervalSeconds​(long renewalIntervalSeconds) +
      Sets the time in seconds after start at which license renewal is first attempted.
      +
      voidsetRenewalRecoveryDurationSeconds​(long renewalRecoveryDurationSeconds) +
      Sets the time in seconds for which playback continues after a license renewal attempt fails.
      +
      voidsetRenewalRetryIntervalSeconds​(long renewalRetryIntervalSeconds) +
      Sets the delay in seconds between renewal attempts when license renewal fails.
      +
      voidsetRenewalUrl​(java.lang.String renewalUrl) +
      Sets the url location to which license renewal requests are to be sent.
      +
      voidsetRenewWithUsage​(boolean renewWithUsage) +
      Sets whether the license is to be sent for renewal when usage is started.
      +
      voidsetRentalDurationSeconds​(long rentalDurationSeconds) +
      Sets the rental window in seconds.
      +
      voidsetSoftEnforcePlaybackDuration​(boolean softEnforcePlaybackDuration) +
      Sets whether playback will continue to end of the content being played back, even if playback + duration has expired.
      +
      voidsetSoftEnforceRentalDuration​(boolean softEnforceRentalDuration) +
      Sets whether playback will continue to end of the content being played back, even if rental + duration has expired.
      +
      java.lang.StringtoString() 
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLPlaybackPolicy

        +
        public WvPLPlaybackPolicy()
        +
        Constructs a new WvPLPlaybackPolicy.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setLicenseDurationSeconds

        +
        public void setLicenseDurationSeconds​(long licenseDurationSeconds)
        +
        Set the license window in seconds. This is the window of time for which the license can be used + from the time the license is granted.
        +
        +
        Parameters:
        +
        licenseDurationSeconds - license window in seconds
        +
        +
      • +
      + + + +
        +
      • +

        getLicenseDurationSeconds

        +
        public long getLicenseDurationSeconds()
        +
        Returns the license window in seconds.
        +
        +
        Returns:
        +
        a long value representing the license window in seconds.
        +
        +
      • +
      + + + +
        +
      • +

        hasLicenseDurationSeconds

        +
        public boolean hasLicenseDurationSeconds()
        +
        Returns whether the license window was set.
        +
        +
        Returns:
        +
        a boolean representing whether the license window was set.
        +
        +
      • +
      + + + +
        +
      • +

        setPlaybackDurationSeconds

        +
        public void setPlaybackDurationSeconds​(long playbackDurationSeconds)
        +
        Sets the viewing window in seconds. This is the window of time for which the license can be + used once the playback of the content starts.
        +
        +
        Parameters:
        +
        playbackDurationSeconds - viewing window in seconds
        +
        +
      • +
      + + + +
        +
      • +

        getPlaybackDurationSeconds

        +
        public long getPlaybackDurationSeconds()
        +
        Returns the viewing window in seconds.
        +
        +
        Returns:
        +
        a long value representing the viewing window in seconds.
        +
        +
      • +
      + + + +
        +
      • +

        hasPlaybackDurationSeconds

        +
        public boolean hasPlaybackDurationSeconds()
        +
        Returns whether the viewing window was set.
        +
        +
        Returns:
        +
        a boolean representing whether the viewing window was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRentalDurationSeconds

        +
        public void setRentalDurationSeconds​(long rentalDurationSeconds)
        +
        Sets the rental window in seconds. This is the window of time for which the content is + available to be used, after renting.
        +
        +
        Parameters:
        +
        rentalDurationSeconds - rental window in seconds
        +
        +
      • +
      + + + +
        +
      • +

        getRentalDurationSeconds

        +
        public long getRentalDurationSeconds()
        +
        Returns the rental window in seconds.
        +
        +
        Returns:
        +
        a long value representing the rental window in seconds.
        +
        +
      • +
      + + + +
        +
      • +

        hasRentalDurationSeconds

        +
        public boolean hasRentalDurationSeconds()
        +
        Returns whether the rental window was set.
        +
        +
        Returns:
        +
        a boolean representing whether the rental window was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRenewalIntervalSeconds

        +
        public void setRenewalIntervalSeconds​(long renewalIntervalSeconds)
        +
        Sets the time in seconds after start at which license renewal is first attempted.
        +
        +
        Parameters:
        +
        renewalIntervalSeconds - duration in seconds when license renewal is first attempted
        +
        +
      • +
      + + + +
        +
      • +

        getRenewalIntervalSeconds

        +
        public long getRenewalIntervalSeconds()
        +
        Returns the license renewal interval time in seconds.
        +
        +
        Returns:
        +
        a long value representing the license renewal interval time.
        +
        +
      • +
      + + + +
        +
      • +

        hasRenewalIntervalSeconds

        +
        public boolean hasRenewalIntervalSeconds()
        +
        Returns whether the license renewal interval time was set.
        +
        +
        Returns:
        +
        a boolean representing whether the license renewal interval time was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRenewalRecoveryDurationSeconds

        +
        public void setRenewalRecoveryDurationSeconds​(long renewalRecoveryDurationSeconds)
        +
        Sets the time in seconds for which playback continues after a license renewal attempt fails.
        +
        +
        Parameters:
        +
        renewalRecoveryDurationSeconds - playback continue time in seconds
        +
        +
      • +
      + + + +
        +
      • +

        getRenewalRecoveryDurationSeconds

        +
        public long getRenewalRecoveryDurationSeconds()
        +
        Returns the continuing playback time in seconds after license renewal fails.
        +
        +
        Returns:
        +
        a long value representing the continuing playback time in seconds after license renewal + fails.
        +
        +
      • +
      + + + +
        +
      • +

        hasRenewalRecoveryDurationSeconds

        +
        public boolean hasRenewalRecoveryDurationSeconds()
        +
        Returns whether the continuing playback time was set.
        +
        +
        Returns:
        +
        a boolean representing whether the continuing playback time was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRenewalRetryIntervalSeconds

        +
        public void setRenewalRetryIntervalSeconds​(long renewalRetryIntervalSeconds)
        +
        Sets the delay in seconds between renewal attempts when license renewal fails.
        +
        +
        Parameters:
        +
        renewalRetryIntervalSeconds - delay in seconds between license renewal attempts
        +
        +
      • +
      + + + +
        +
      • +

        getRenewalRetryIntervalSeconds

        +
        public long getRenewalRetryIntervalSeconds()
        +
        Returns the delay in seconds between license renewal attempts.
        +
        +
        Returns:
        +
        a long value representing the delay in seconds between license renewal attempts.
        +
        +
      • +
      + + + +
        +
      • +

        hasRenewalRetryIntervalSeconds

        +
        public boolean hasRenewalRetryIntervalSeconds()
        +
        Returns whether the delay in seconds between license renewal attempts was set.
        +
        +
        Returns:
        +
        a boolean representing whether the delay in seconds between license renewal attempts + was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRenewWithUsage

        +
        public void setRenewWithUsage​(boolean renewWithUsage)
        +
        Sets whether the license is to be sent for renewal when usage is started.
        +
        +
        Parameters:
        +
        renewWithUsage - boolean if license is to be sent for renewal when usage is started
        +
        +
      • +
      + + + +
        +
      • +

        getRenewWithUsage

        +
        public boolean getRenewWithUsage()
        +
        Returns true if the license is to be sent for renewal when usage is started.
        +
        +
        Returns:
        +
        a boolean representing if the license is to be sent for renewal when usage is started.
        +
        +
      • +
      + + + +
        +
      • +

        hasRenewWithUsage

        +
        public boolean hasRenewWithUsage()
        +
        Returns whether the license is to be sent for renewal when usage is started was set.
        +
        +
        Returns:
        +
        a boolean representing whether the license is to be sent for renewal when usage is + started was set.
        +
        +
      • +
      + + + +
        +
      • +

        setCanPersist

        +
        public void setCanPersist​(boolean canPersist)
        +
        Sets whether the license may be persisted to non-volatile storage.
        +
        +
        Parameters:
        +
        canPersist - boolean representing if the license may be persisted to non-volatile storage
        +
        +
      • +
      + + + +
        +
      • +

        getCanPersist

        +
        public boolean getCanPersist()
        +
        Returns true if the license is to be persisted for offline use.
        +
        +
        Returns:
        +
        a boolean representing if the license is to be persisted for offline use.
        +
        +
      • +
      + + + +
        +
      • +

        hasCanPersist

        +
        public boolean hasCanPersist()
        +
        Returns whether the license is to be persisted for offline use was set.
        +
        +
        Returns:
        +
        a boolean representing whether the license is to be persisted for offline use was set.
        +
        +
      • +
      + + + +
        +
      • +

        setCanRenew

        +
        public void setCanRenew​(boolean canRenew)
        +
        Sets whether the license can be renewed.
        +
        +
        Parameters:
        +
        canRenew - boolean representing if license can be renewed
        +
        +
      • +
      + + + +
        +
      • +

        getCanRenew

        +
        public boolean getCanRenew()
        +
        Returns true if the license can be renewed.
        +
        +
        Returns:
        +
        a boolean representing if the license can be renewed.
        +
        +
      • +
      + + + +
        +
      • +

        hasCanRenew

        +
        public boolean hasCanRenew()
        +
        Returns whether the license can be renewed was set.
        +
        +
        Returns:
        +
        a boolean representing whether the license can be renewed was set.
        +
        +
      • +
      + + + +
        +
      • +

        setCanPlay

        +
        public void setCanPlay​(boolean canPlay)
        +
        Sets whether this content can be played back.
        +
        +
        Parameters:
        +
        canPlay - boolean representing if content can be played back
        +
        +
      • +
      + + + +
        +
      • +

        getCanPlay

        +
        public boolean getCanPlay()
        +
        Returns true if this content can be played back.
        +
        +
        Returns:
        +
        a boolean representing if this content can be played back.
        +
        +
      • +
      + + + +
        +
      • +

        hasCanPlay

        +
        public boolean hasCanPlay()
        +
        Returns whether this content can be played back was set.
        +
        +
        Returns:
        +
        a boolean representing whether this content can be played back was set.
        +
        +
      • +
      + + + +
        +
      • +

        setRenewalUrl

        +
        public void setRenewalUrl​(java.lang.String renewalUrl)
        +
        Sets the url location to which license renewal requests are to be sent.
        +
        +
        Parameters:
        +
        renewalUrl - url location to which license renewal requests are to be sent
        +
        +
      • +
      + + + +
        +
      • +

        getRenewalUrl

        +
        public java.lang.String getRenewalUrl()
        +
        Returns the url location where license renewal requests are to be sent.
        +
        +
        Returns:
        +
        a std::string containing the license renewal url.
        +
        +
      • +
      + + + +
        +
      • +

        hasRenewalUrl

        +
        public boolean hasRenewalUrl()
        +
        Returns whether the url location where license renewal requests are to be sent was set.
        +
        +
        Returns:
        +
        a boolean representing whether the url location where license renewal requests are to + be sent was set.
        +
        +
      • +
      + + + +
        +
      • +

        setSoftEnforcePlaybackDuration

        +
        public void setSoftEnforcePlaybackDuration​(boolean softEnforcePlaybackDuration)
        +
        Sets whether playback will continue to end of the content being played back, even if playback + duration has expired.
        +
        +
        Parameters:
        +
        softEnforcePlaybackDuration - boolean if playback will continue to end until the end of + the content being played back, even if playback duration has expired.
        +
        +
      • +
      + + + +
        +
      • +

        getSoftEnforcePlaybackDuration

        +
        public boolean getSoftEnforcePlaybackDuration()
        +
        Returns true if the playback will continue until the end of the content being played + back, even if playback duration has expired.
        +
        +
        Returns:
        +
        a boolean if the playback will continue until the end of the content being played back, + even if playback duration has expired.
        +
        +
      • +
      + + + +
        +
      • +

        hasSoftEnforcePlaybackDuration

        +
        public boolean hasSoftEnforcePlaybackDuration()
        +
        Returns whether the playback will continue until the end of the content being played back, even + if playback duration has expired was set.
        +
        +
        Returns:
        +
        a boolean representing whether the playback will continue until the end of the content + being played back, even if playback duration has expired was set.
        +
        +
      • +
      + + + +
        +
      • +

        setAlwaysIncludeClientId

        +
        public void setAlwaysIncludeClientId​(boolean alwaysIncludeClientId)
        +
        Sets whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client.
        +
        +
        Parameters:
        +
        alwaysIncludeClientId - boolean if client identification is to be included in the + following RENEWAL and/or RELEASE license requests from the client.
        +
        +
      • +
      + + + +
        +
      • +

        getAlwaysIncludeClientId

        +
        public boolean getAlwaysIncludeClientId()
        +
        Returns true if client identification is to be included in the following RENEWAL and/or + RELEASE license requests sent by the client.
        +
        +
        Returns:
        +
        a boolean if client identification is to be included in the following RENEWAL and/or + RELEASE license requests sent by the client.
        +
        +
      • +
      + + + +
        +
      • +

        hasAlwaysIncludeClientId

        +
        public boolean hasAlwaysIncludeClientId()
        +
        Returns whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client was set.
        +
        +
        Returns:
        +
        a boolean representing whether client identification is to be included in the following + RENEWAL and/or RELEASE license requests sent by the client was set.
        +
        +
      • +
      + + + +
        +
      • +

        setSoftEnforceRentalDuration

        +
        public void setSoftEnforceRentalDuration​(boolean softEnforceRentalDuration)
        +
        Sets whether playback will continue to end of the content being played back, even if rental + duration has expired. If set to true, playback will continue.
        +
        +
        Parameters:
        +
        softEnforceRentalDuration - boolean if playback will continue to end until the end of the + content being played back, even if rental duration has expired.
        +
        +
      • +
      + + + +
        +
      • +

        getSoftEnforceRentalDuration

        +
        public boolean getSoftEnforceRentalDuration()
        +
        Returns true if the playback will continue until the end of the content being played + back, even if rental duration has expired.
        +
        +
        Returns:
        +
        a boolean if the playback will continue until the end of the content being played back, + even if rental duration has expired.
        +
        +
      • +
      + + + +
        +
      • +

        hasSoftEnforceRentalDuration

        +
        public boolean hasSoftEnforceRentalDuration()
        +
        Returns whether the playback will continue until the end of the content being played back, even + if rental duration has expired was set.
        +
        +
        Returns:
        +
        a boolean representing whether the playback will continue until the end of the content + being played back, even if rental duration has expired was set.
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        hasInitialRenewalDelayBase

        +
        public boolean hasInitialRenewalDelayBase()
        +
        Returns whether the initial renewal delay base setting was set.
        +
        +
        Returns:
        +
        a boolean representing whether the initial renewal delay base setting was set.
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.ProtectionScheme.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.ProtectionScheme.html new file mode 100644 index 0000000..f9e2b34 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.ProtectionScheme.html @@ -0,0 +1,418 @@ + + + + + +WvPLProtectionScheme.ProtectionScheme + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLProtectionScheme.ProtectionScheme

+
+
+ +
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLProtectionScheme.ProtectionSchemevalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLProtectionScheme.ProtectionScheme[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLProtectionScheme.ProtectionScheme[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLProtectionScheme.ProtectionScheme c : WvPLProtectionScheme.ProtectionScheme.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLProtectionScheme.ProtectionScheme valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.html new file mode 100644 index 0000000..e693273 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProtectionScheme.html @@ -0,0 +1,245 @@ + + + + + +WvPLProtectionScheme + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLProtectionScheme

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme
    • +
    +
  • +
+
+
    +
  • +
    +
    @CheckReturnValue
    +public final class WvPLProtectionScheme
    +extends java.lang.Object
    +
    Wraps ProtectionScheme enumeration
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.ProvisioningMethod.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.ProvisioningMethod.html new file mode 100644 index 0000000..e1d7a2f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.ProvisioningMethod.html @@ -0,0 +1,522 @@ + + + + + +WvPLProvisioningMethod.ProvisioningMethod + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLProvisioningMethod.ProvisioningMethod

+
+
+ +
+ +
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.html new file mode 100644 index 0000000..f349f57 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningMethod.html @@ -0,0 +1,335 @@ + + + + + +WvPLProvisioningMethod + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLProvisioningMethod

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLProvisioningMethod
    +extends java.lang.Object
    +
    ProvisioningMethod enum wrapper.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.ProvisioningVersion.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.ProvisioningVersion.html new file mode 100644 index 0000000..7d6b1d8 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.ProvisioningVersion.html @@ -0,0 +1,418 @@ + + + + + +WvPLProvisioningVersion.ProvisioningVersion + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLProvisioningVersion.ProvisioningVersion

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLProvisioningVersion.ProvisioningVersion[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLProvisioningVersion.ProvisioningVersion c : WvPLProvisioningVersion.ProvisioningVersion.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLProvisioningVersion.ProvisioningVersion valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.html new file mode 100644 index 0000000..4265086 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLProvisioningVersion.html @@ -0,0 +1,335 @@ + + + + + +WvPLProvisioningVersion + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLProvisioningVersion

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLProvisioningVersion
    +extends java.lang.Object
    +
    ProvisioningVersion enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLRequestType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLRequestType.html new file mode 100644 index 0000000..b38c716 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLRequestType.html @@ -0,0 +1,395 @@ + + + + + +WvPLRequestType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLRequestType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLRequestType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLRequestType
    +extends java.lang.Object
    +
    WvPLRequestType enums wrapping class.
    +
  • +
+
+
+ +
+
+ +
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.SecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.SecurityLevel.html new file mode 100644 index 0000000..5eccd79 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.SecurityLevel.html @@ -0,0 +1,431 @@ + + + + + +WvPLSecurityLevel.SecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLSecurityLevel.SecurityLevel

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLSecurityLevel.SecurityLevel[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLSecurityLevel.SecurityLevel c : WvPLSecurityLevel.SecurityLevel.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLSecurityLevel.SecurityLevel valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.html new file mode 100644 index 0000000..c796023 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityLevel.html @@ -0,0 +1,290 @@ + + + + + +WvPLSecurityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSecurityLevel

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLSecurityLevel
    +extends java.lang.Object
    +
    WvPLSecurityLevel class definition.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLSecurityLevel.SecurityLevel +
      Security level enums definition.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLSecurityLevel() 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLSecurityLevel

        +
        public WvPLSecurityLevel()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityRequirement.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityRequirement.html new file mode 100644 index 0000000..f1e46c9 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSecurityRequirement.html @@ -0,0 +1,409 @@ + + + + + +WvPLSecurityRequirement + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSecurityRequirement

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLSecurityRequirement
    +extends java.lang.Object
    +
    Security requirement for the Widevine Security Profile.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getOemCryptoAPIMajorVersion

        +
        public int getOemCryptoAPIMajorVersion()
        +
        oemCryptoApiMajorVersion for the device making the license request.
        +
        +
        Returns:
        +
        int
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getResourceRatingTier

        +
        public int getResourceRatingTier()
        +
        Resource Rating Tier for the device making the license request.
        +
        +
        Returns:
        +
        int
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getVerifiedMakeModel

        +
        public boolean getVerifiedMakeModel()
        +
        Verified make model (i.e. the device manufacturer has verified the make model information).
        +
        +
        Returns:
        +
        boolean
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSession.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSession.html new file mode 100644 index 0000000..3519d5f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSession.html @@ -0,0 +1,1293 @@ + + + + + +WvPLSession + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSession

+
+
+ +
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLSession
    +extends WvPLBaseSession<WvPLKey>
    +
    Once a WvPLEnvironment object is successfully initialized, generate a Widevine session object for + each license request. createSession() parses the request and validates the request by verifying + the signature. If successful, a session object is created. Once a Widevine session object is + successfully created, setup the session object with the policy and keys. Call AddKey() multiple + times for each key. + +
    
    + WvPLEnvironment env = = new WvPLEnvironment(...);
    + ...
    + WvPLSession session = env.createSession(licenseRequest);
    +
    + byte[] contentId = null;
    + try {
    +   contentId = session.getContentId();
    + } catch(WvPLStatusException e) {
    +   WvPLStatus status = e.getStatus();
    +   // Handle error
    + }
    + // Set policy
    + WvPLPlaybackPolicy policy = new WvPLPlaybackPolicy();
    + policy.setLicenseDurationSeconds(10000000L);
    + session.setPolicy(policy);
    +
    + // Add key
    + WvPLKey key = new WvPLKey();
    + key.setKeyId(someFunctionToLoadKeyId());
    + key.setKeyBytes(someFunctionToLoadKeyBytes());
    + WvPLStatus status = session.addKey(key);
    + List<WvPLKey> wvplKeys = session.getKeys();
    +
    + // Generate license
    + try {
    +   byte[] license = session.generateLicense();
    + } catch(WvPLStatusException e) {
    +   WvPLStatus status = e.getStatus();
    +   // Handle error
    + }
    + key.close();
    + policy.close();
    + ...
    + 
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        init

        +
        public boolean init​(long ptr)
        +
        Initialized only from the JNI when the session is built.
        +
        +
        Parameters:
        +
        ptr - the pointer to the C++ session
        +
        Returns:
        +
        true if the session was constructed successfully, else false.
        +
        +
      • +
      + + + +
        +
      • +

        addKey

        +
        public WvPLStatus addKey​(WvPLKey key)
        +
        Add a key to the license.
        +
        +
        Specified by:
        +
        addKey in class WvPLBaseSession<WvPLKey>
        +
        Parameters:
        +
        key - WvPLKey object containing key information.
        +
        Returns:
        +
        WvPLStatus
        +
        +
      • +
      + + + +
        +
      • +

        filterKey

        +
        public WvPLCapabilityStatus filterKey​(WvPLKey key)
        +
        Conditionally add key to the license if the device can satisfy the output requirements.
        +
        +
        Specified by:
        +
        filterKey in class WvPLBaseSession<WvPLKey>
        +
        Parameters:
        +
        key - WvPLKey object containing key information.
        +
        Returns:
        +
        WvPLCapabilityStatus object containing details about the status of the device's + capability. CAPABILITY_OK indicates the key was successfully added.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        generateLicense

        +
        public byte[] generateLicense()
        +                       throws WvPLStatusException
        +
        Generates a license response.
        +
        +
        Returns:
        +
        byte[] license response
        +
        Throws:
        +
        WvPLStatusException - if license generation fails
        +
        +
      • +
      + + + + + + + +
        +
      • +

        getSessionState

        +
        public WvPLSessionState getSessionState()
        +
        Gets the session state.
        +
        +
        Returns:
        +
        WvPLSessionState object containing session state information
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        hasSdkSession

        +
        public boolean hasSdkSession()
        +
        Return true if Session has sdk session.
        +
        +
        Returns:
        +
        true or false
        +
        +
      • +
      + + + +
        +
      • +

        getVersionString

        +
        @Deprecated
        +public static java.lang.String getVersionString()
        +
        Deprecated. +
        use WvPLEnvironment.getSdkVersionString() instead
        +
        +
        Returns version of the library.
        +
        +
        Returns:
        +
        version string
        +
        Since:
        +
        end of Q3 2024
        +
        +
      • +
      + + + +
        +
      • +

        getProvisionedDeviceInfo

        +
        @Deprecated
        +public WvPLDeviceInfo getProvisionedDeviceInfo()
        +                                        throws WvPLStatusException
        +
        Deprecated. +
        use getDeviceInfo instead (b/193921795)
        +
        +
        Returns the provisioned device info.
        +
        +
        Returns:
        +
        WvPLDeviceInfo containing device information
        +
        Throws:
        +
        WvPLStatusException
        +
        Since:
        +
        end of Q3 2021
        +
        +
      • +
      + + + + + + + + + + + +
        +
      • +

        setSessionInit

        +
        public void setSessionInit​(WvPLSessionInit sessionInit)
        +
        Sets the license session init.
        +
        +
        Specified by:
        +
        setSessionInit in class WvPLBaseSession<WvPLKey>
        +
        Parameters:
        +
        sessionInit - WvPLSessionInit the session init fields.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        remoteAttestationVerified

        +
        public boolean remoteAttestationVerified()
        +
        Get the remote attestation status.
        +
        +
        Returns:
        +
        true if remote attestation was verified.
        +
        +
      • +
      + + + +
        +
      • +

        remoteAttestationCertSerialNumber

        +
        public byte[] remoteAttestationCertSerialNumber()
        +                                         throws WvPLStatusException
        +
        Returns the serial number for the client's remote attestation certificate.
        +
        +
        Returns:
        +
        serial number
        +
        Throws:
        +
        WvPLStatusException - if unable to get remote attestation cert serial number.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        verifyPlatform

        +
        public WvPLPlatformVerificationStatus verifyPlatform()
        +                                              throws WvPLStatusException
        +
        Verifies the platform. Only meaningful for devices with + WvPLDeviceSecurityLevel.DeviceSecurityLevel = DEVICE_LEVEL_2 OR DEVICE_LEVEL_3. Devices with + WvPLDeviceSecurityLevel.DeviceSecurityLevel = DEVICE_LEVEL_1 are verified by default.
        +
        +
        Specified by:
        +
        verifyPlatform in class WvPLBaseSession<WvPLKey>
        +
        Returns:
        +
        WvPLPlatformVerificationStatus
        +
        Throws:
        +
        WvPLStatusException - if unable to verify platform.
        +
        +
      • +
      + + + +
        +
      • +

        isChromeCDM

        +
        public boolean isChromeCDM()
        +
        Returns the boolean setting if the CDM on the device requesting the license is a ChromeCDM.
        +
        +
        Returns:
        +
        boolean indicating if the CDM on the device requesting the license is a ChromeCDM
        +
        +
      • +
      + + + + + + + + + + + + + + + + + + + +
        +
      • +

        setRejectUnknownMakeModel

        +
        public void setRejectUnknownMakeModel​(boolean rejectUnknownMakeModel)
        +                               throws WvPLStatusException
        +
        If set to false, SDK can reject licensing behaviors to unknown make model. Default value is + false.
        +
        +
        Specified by:
        +
        setRejectUnknownMakeModel in class WvPLBaseSession<WvPLKey>
        +
        Parameters:
        +
        rejectUnknownMakeModel - reject unknown make model.
        +
        Throws:
        +
        WvPLStatusException - if unable to setRejectUnknownMakeModel.
        +
        +
      • +
      + + + + + + + + + + + + + + + + + + + +
        +
      • +

        getQualifiedDefaultDeviceSecurityProfiles

        +
        @Deprecated
        +public java.util.Vector<java.lang.String> getQualifiedDefaultDeviceSecurityProfiles()
        +                                                                             throws WvPLStatusException
        +
        Deprecated. +
        use getQualifiedCustomDeviceSecurityProfiles() instead after loading the custom + DSPs in the Environment class.
        +
        +
        Return the names of the qualified default device security profiles
        +
        +
        Specified by:
        +
        getQualifiedDefaultDeviceSecurityProfiles in class WvPLBaseSession<WvPLKey>
        +
        Returns:
        +
        a vector of the qualified default device security profiles by their names
        +
        Throws:
        +
        WvPLStatusException - if the retrieval of the device security profiles failed
        +
        Since:
        +
        end of Q1 2025
        +
        +
      • +
      + + + +
        +
      • +

        getQualifiedCustomDeviceSecurityProfiles

        +
        public java.util.Vector<java.lang.String> getQualifiedCustomDeviceSecurityProfiles​(java.lang.String customDeviceSecurityProfilesOwnerName)
        +                                                                            throws WvPLStatusException
        +
        Return the names of the qualified custom device security profiles.
        +
        +
        Specified by:
        +
        getQualifiedCustomDeviceSecurityProfiles in class WvPLBaseSession<WvPLKey>
        +
        Parameters:
        +
        customDeviceSecurityProfilesOwnerName - the owner of the custom device security profiles.
        +
        Returns:
        +
        a vector of the qualified custom device security profiles by their names.
        +
        Throws:
        +
        WvPLStatusException - if the retrieval of the device security profiles failed
        +
        +
      • +
      + + + +
        +
      • +

        getLicenseRequest

        +
        public byte[] getLicenseRequest()
        +
        Return LicenseRequest proto in serialized byte array format
        +
        +
        Returns:
        +
        LicenseRequest proto in serialized byte array format
        +
        +
      • +
      + + + +
        +
      • +

        setIsExternalLicenseRequest

        +
        protected void setIsExternalLicenseRequest​(boolean value)
        +
      • +
      + + + +
        +
      • +

        isExternalLicenseRequest

        +
        protected boolean isExternalLicenseRequest()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionCreateOptions.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionCreateOptions.html new file mode 100644 index 0000000..8acc988 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionCreateOptions.html @@ -0,0 +1,491 @@ + + + + + +WvPLSessionCreateOptions + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSessionCreateOptions

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLSessionCreateOptions
    +extends java.lang.Object
    +
    Options class to provide settings that would be used when creating a WvPLSession.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Summary

      + + + + + + + + + + + + +
      Fields 
      Modifier and TypeFieldDescription
      protected longpeer 
      +
    • +
    +
    + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      voidclose() +
      Releases resources for C++ peer.
      +
      protected voiddestroyPeer() 
      voidfinalize() +
      Calls close() to release resources for C++ peer in case that was not already done.
      +
      booleangetAllowRevokedDevice() +
      Returns setting for whether revoked devices are allowed.
      +
      protected longgetPeer() +
      Get the C++ peer
      +
      protected voidinitializePeer() 
      protected voidresetPeer() +
      reset the C++ peer
      +
      voidsetAllowRevokedDevice​(boolean allowRevokedDevice) +
      Set whether to create a session for a revoked device.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLSessionCreateOptions

        +
        public WvPLSessionCreateOptions()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setAllowRevokedDevice

        +
        public void setAllowRevokedDevice​(boolean allowRevokedDevice)
        +
        Set whether to create a session for a revoked device.
        +
        +
        Parameters:
        +
        allowRevokedDevice - setting as to whether a session is to be created for a revoked + device.
        +
        +
      • +
      + + + +
        +
      • +

        getAllowRevokedDevice

        +
        public boolean getAllowRevokedDevice()
        +
        Returns setting for whether revoked devices are allowed.
        +
        +
        Returns:
        +
        setting for whether revoked devices are allowed
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionInit.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionInit.html new file mode 100644 index 0000000..5caa89c --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionInit.html @@ -0,0 +1,1001 @@ + + + + + +WvPLSessionInit + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSessionInit

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSessionInit
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Closeable, java.lang.AutoCloseable
    +
    +
    +
    public class WvPLSessionInit
    +extends java.lang.Object
    +
    Specifies session initialization params for WvPLSession.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Field Detail

      + + + +
        +
      • +

        peer

        +
        protected long peer
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLSessionInit

        +
        public WvPLSessionInit()
        +
        Constructor that does not set the WvPLSessionInit fields.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setSessionId

        +
        public void setSessionId​(java.lang.String sessionId)
        +
        Sets the identifier for the session.
        +
        +
        Parameters:
        +
        sessionId - identifier for the session.
        +
        +
      • +
      + + + +
        +
      • +

        getSessionId

        +
        public java.lang.String getSessionId()
        +
        Returns the identifier for the session.
        +
        +
        Returns:
        +
        sessionId identifier for the session.
        +
        +
      • +
      + + + +
        +
      • +

        setPurchaseId

        +
        public void setPurchaseId​(java.lang.String purchaseId)
        +
        Sets the purchase identifier for the session.
        +
        +
        Parameters:
        +
        purchaseId - purchase identifier for the session.
        +
        +
      • +
      + + + +
        +
      • +

        getPurchaseId

        +
        public java.lang.String getPurchaseId()
        +
        Returns the purchase identifier for the session.
        +
        +
        Returns:
        +
        purchaseId purchase identifier for the session.
        +
        +
      • +
      + + + +
        +
      • +

        setMasterSigningKey

        +
        @Deprecated
        +public void setMasterSigningKey​(java.lang.String masterSigningKey)
        +
        Deprecated. +
        use setMasterSigningKey(byte[] masterSigningKeyBytes) instead
        +
        +
        Set master signing key in string.
        +
        +
        Since:
        +
        end of Q1, 2019
        +
        +
      • +
      + + + +
        +
      • +

        setMasterSigningKey

        +
        public void setMasterSigningKey​(byte[] masterSigningKeyBytes)
        +
        Sets the master signing key for the session. Master signing keys has to be 16 bytes in length.
        +
        +
        Parameters:
        +
        masterSigningKeyBytes - the master signing key.
        +
        +
      • +
      + + + +
        +
      • +

        getMasterSigningKey

        +
        public byte[] getMasterSigningKey()
        +
        Returns the master signing key in byte array for the session.
        +
        +
        Returns:
        +
        masterSigningKeyBytes the master signing key.
        +
        +
      • +
      + + + +
        +
      • +

        setLicenseStartTime

        +
        public void setLicenseStartTime​(long licenseStartTime)
        +
        Sets the license start time for the session.
        +
        +
        Parameters:
        +
        licenseStartTime - the license start time.
        +
        +
      • +
      + + + +
        +
      • +

        getLicenseStartTime

        +
        public long getLicenseStartTime()
        +
        Returns the license start time for the session.
        +
        +
        Returns:
        +
        licenseStartTime the license start time.
        +
        +
      • +
      + + + +
        +
      • +

        setProviderClientToken

        +
        public void setProviderClientToken​(java.lang.String providerClientToken)
        +
        Sets the provider client token for the session.
        +
        +
        Parameters:
        +
        providerClientToken - the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        getProviderClientToken

        +
        public java.lang.String getProviderClientToken()
        +
        Returns the provider client token for the session.
        +
        +
        Returns:
        +
        the providerClientToken the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        setProviderSessionToken

        +
        public void setProviderSessionToken​(java.lang.String providerSessionToken)
        +
        Sets the provider session token for the session.
        +
        +
        Parameters:
        +
        providerSessionToken - the provider session token.
        +
        +
      • +
      + + + +
        +
      • +

        getProviderSessionToken

        +
        public java.lang.String getProviderSessionToken()
        +
        Returns the provider session token for the session.
        +
        +
        Returns:
        +
        providerSessionToken the provider session token.
        +
        +
      • +
      + + + +
        +
      • +

        setOverrideProviderClientToken

        +
        public void setOverrideProviderClientToken​(boolean overrideProviderClientToken)
        +
        Sets an override for the provider client token.
        +
        +
        Parameters:
        +
        overrideProviderClientToken - override setting for the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        getOverrideProviderClientToken

        +
        public boolean getOverrideProviderClientToken()
        +
        Returns the setting for the override provider client token.
        +
        +
        Returns:
        +
        overrideProviderClientToken override setting for the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        setOverrideOemCryptoApiVersion

        +
        public void setOverrideOemCryptoApiVersion​(java.lang.String overrideOemCryptoApiVersion)
        +
        Sets an override for the oem crypto api version.
        +
        +
        Parameters:
        +
        overrideOemCryptoApiVersion - override setting for the oem crypto api version.
        +
        +
      • +
      + + + +
        +
      • +

        getOverrideOemCryptoApiVersion

        +
        public java.lang.String getOverrideOemCryptoApiVersion()
        +
        Returns the override oem crypto api version for the session.
        +
        +
        Returns:
        +
        overrideOemCryptoApiVersion the override oem crypto api version.
        +
        +
      • +
      + + + +
        +
      • +

        setLicenseCategorySpec

        +
        public void setLicenseCategorySpec​(WvPLLicenseCategorySpec licenseCategorySpec)
        +
        Sets the WvPLLicenseCategorySpec for this license.
        +
        +
        Parameters:
        +
        licenseCategorySpec - the WvPLKeyCategorySpec object
        +
        +
      • +
      + + + + + + + +
        +
      • +

        setOverrideDeviceRevocation

        +
        public void setOverrideDeviceRevocation​(boolean overrideDeviceRevocation)
        +
        Sets an override for device revocation.
        +
        +
        Parameters:
        +
        overrideDeviceRevocation - override setting for device revocation.
        +
        +
      • +
      + + + +
        +
      • +

        getOverrideDeviceRevocation

        +
        public boolean getOverrideDeviceRevocation()
        +
        Returns the override setting for device revocation.
        +
        +
        Returns:
        +
        overrideProviderClientToken override setting for the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        setDeviceStatusOptions

        +
        public void setDeviceStatusOptions​(WvPLDeviceStatusOptions deviceStatusOptions)
        +
        Sets the WvPLDeviceStatusOptions for this license.
        +
        +
        Parameters:
        +
        deviceStatusOptions - the WvPLDeviceStatusOptions object
        +
        +
      • +
      + + + + + + + +
        +
      • +

        setSecureDataPathHwDecodeEnabled

        +
        public void setSecureDataPathHwDecodeEnabled​(boolean secureDataPathHwDecodeEnabled)
        +
        Sets the secure data path for any non-audio key that uses HW_SECURE_DECODE Key Policy.
        +
        +
        Parameters:
        +
        secureDataPathHwDecodeEnabled - secure data path setting for the HW_SECURE_DECODE Key + Policy security level. If set to 'true', this secure data path is set.
        +
        +
      • +
      + + + +
        +
      • +

        getSecureDataPathHwDecodeEnabled

        +
        public boolean getSecureDataPathHwDecodeEnabled()
        +
        Returns the setting for the secure data path for any non-audio keys.
        +
        +
        Returns:
        +
        boolean secure data path setting for any non-audio keys.
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        initializePeer

        +
        protected void initializePeer()
        +
      • +
      + + + +
        +
      • +

        destroyPeer

        +
        protected void destroyPeer()
        +
      • +
      + + + +
        +
      • +

        close

        +
        public void close()
        +           throws java.io.IOException
        +
        Releases resources for C++ peer. Must be called when object goes out of scope.
        +
        +
        Specified by:
        +
        close in interface java.lang.AutoCloseable
        +
        Specified by:
        +
        close in interface java.io.Closeable
        +
        Throws:
        +
        java.io.IOException
        +
        +
      • +
      + + + +
        +
      • +

        finalize

        +
        public void finalize()
        +
        Calls close() to release resources for C++ peer in case that was not already done.
        +
        +
        Overrides:
        +
        finalize in class java.lang.Object
        +
        +
      • +
      + + + +
        +
      • +

        getPeer

        +
        protected long getPeer()
        +
        Get the C++ peer
        +
        +
        Returns:
        +
        a long value representing the C++ peer
        +
        +
      • +
      + + + +
        +
      • +

        resetPeer

        +
        protected void resetPeer()
        +
        reset the C++ peer
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionState.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionState.html new file mode 100644 index 0000000..c99ddc0 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionState.html @@ -0,0 +1,493 @@ + + + + + +WvPLSessionState + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSessionState

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSessionState
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLSessionState
    +extends java.lang.Object
    +
    Specifies session cache params for WvPLSession.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLSessionState

        +
        public WvPLSessionState()
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setSigningKey

        +
        public void setSigningKey​(byte[] signingKey)
        +
        Sets the signing key for the session in byte array.Signing keys has to be 64 bytes in length.
        +
        +
        Parameters:
        +
        signingKey - the signing key.
        +
        +
      • +
      + + + +
        +
      • +

        getSigningKey

        +
        public byte[] getSigningKey()
        +
        Returns the signing key in byte array for the session.
        +
        +
        Returns:
        +
        signingKey the signing key.
        +
        +
      • +
      + + + +
        +
      • +

        setLicenseId

        +
        public void setLicenseId​(WvPLLicenseIdentification licenseId)
        +
        Sets WvPLLicenseIdentificationwhich propagated from LicenseRequest to License, + incrementing version with each iteration
        +
        +
        Parameters:
        +
        licenseId - the license identification information.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        setProviderClientToken

        +
        public void setProviderClientToken​(byte[] providerClientToken)
        +
        Sets the provider client token for the session in byte array.
        +
        +
        Parameters:
        +
        providerClientToken - the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        getProviderClientToken

        +
        public byte[] getProviderClientToken()
        +
        Returns the provider client token for the session in byte array.
        +
        +
        Returns:
        +
        the providerClientToken the provider client token.
        +
        +
      • +
      + + + +
        +
      • +

        getLicenseCounter

        +
        public long getLicenseCounter()
        +
      • +
      + + + +
        +
      • +

        getKeyboxSystemId

        +
        public long getKeyboxSystemId()
        +
      • +
      + + + +
        +
      • +

        setLicenseCounter

        +
        public void setLicenseCounter​(long licenseCounter)
        +
      • +
      + + + +
        +
      • +

        setKeyboxSystemId

        +
        public void setKeyboxSystemId​(long keyboxSystemId)
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionUsage.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionUsage.html new file mode 100644 index 0000000..e31cdb6 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLSessionUsage.html @@ -0,0 +1,365 @@ + + + + + +WvPLSessionUsage + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLSessionUsage

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLSessionUsage
    +extends java.lang.Object
    +
    Session usage information
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getLicenseUsed

        +
        public boolean getLicenseUsed()
        +
      • +
      + + + +
        +
      • +

        getLicenseReleased

        +
        public boolean getLicenseReleased()
        +
      • +
      + + + + + + + +
        +
      • +

        getSecondsSinceLicenseReceived

        +
        public long getSecondsSinceLicenseReceived()
        +
      • +
      + + + +
        +
      • +

        getSecondsSinceFirstDecrypt

        +
        public long getSecondsSinceFirstDecrypt()
        +
      • +
      + + + +
        +
      • +

        getSecondsSinceLastDecrypt

        +
        public long getSecondsSinceLastDecrypt()
        +
      • +
      + + + +
        +
      • +

        getProviderSessionToken

        +
        public java.lang.String getProviderSessionToken()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.StatusCode.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.StatusCode.html new file mode 100644 index 0000000..2afffdc --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.StatusCode.html @@ -0,0 +1,1914 @@ + + + + + +WvPLStatus.StatusCode + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLStatus.StatusCode

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • java.lang.Enum<WvPLStatus.StatusCode>
    • +
    • +
        +
      • com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
      • +
      +
    • +
    +
  • +
+
+ +
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.html new file mode 100644 index 0000000..105f1a1 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatus.html @@ -0,0 +1,376 @@ + + + + + +WvPLStatus + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLStatus

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLStatus
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLStatus
    +extends java.lang.Object
    +
    Models the status codes in protos/public/errors.proto.
    +
  • +
+
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + + + + + +
        +
      • +

        getMessage

        +
        public java.lang.String getMessage()
        +
      • +
      + + + +
        +
      • +

        getNumericCode

        +
        public int getNumericCode()
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatusException.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatusException.html new file mode 100644 index 0000000..6dd5893 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLStatusException.html @@ -0,0 +1,350 @@ + + + + + +WvPLStatusException + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLStatusException

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • java.lang.Throwable
    • +
    • +
        +
      • java.lang.Exception
      • +
      • +
          +
        • com.google.video.widevine.sdk.wvpl.WvPLStatusException
        • +
        +
      • +
      +
    • +
    +
  • +
+
+
    +
  • +
    +
    All Implemented Interfaces:
    +
    java.io.Serializable
    +
    +
    +
    public class WvPLStatusException
    +extends java.lang.Exception
    +
    Exception thrown when WvPLStatus is not OK. Contains the error status. + +
    
    + try {
    + ...
    + } catch (WvPLStatusException e) {
    +   WvPLStatus status = e.getStatus();
    + }
    + 
    +
    +
    See Also:
    +
    Serialized Form
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLStatusException​(WvPLStatus status) +
      Constructs exception with status information.
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + +
      All Methods Instance Methods Concrete Methods 
      Modifier and TypeMethodDescription
      WvPLStatusgetStatus() +
      Returns the WvPLStatus.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Throwable

        +addSuppressed, fillInStackTrace, getCause, getLocalizedMessage, getMessage, getStackTrace, getSuppressed, initCause, printStackTrace, printStackTrace, printStackTrace, setStackTrace, toString
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLStatusException

        +
        public WvPLStatusException​(WvPLStatus status)
        +
        Constructs exception with status information.
        +
        +
        Parameters:
        +
        status - WvPLStatus to store
        +
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getStatus

        +
        public WvPLStatus getStatus()
        +
        Returns the WvPLStatus.
        +
        +
        Returns:
        +
        WvPLStatus
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.TimerDelayBase.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.TimerDelayBase.html new file mode 100644 index 0000000..d0741f9 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.TimerDelayBase.html @@ -0,0 +1,405 @@ + + + + + +WvPLTimerDelayBase.TimerDelayBase + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLTimerDelayBase.TimerDelayBase

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLTimerDelayBase.TimerDelayBase[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLTimerDelayBase.TimerDelayBase c : WvPLTimerDelayBase.TimerDelayBase.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLTimerDelayBase.TimerDelayBase valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.html new file mode 100644 index 0000000..4e7049c --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTimerDelayBase.html @@ -0,0 +1,331 @@ + + + + + +WvPLTimerDelayBase + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLTimerDelayBase

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLTimerDelayBase
    +extends java.lang.Object
    +
    WvPLTimerDelayBase class definition.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.TrackType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.TrackType.html new file mode 100644 index 0000000..ccb1682 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.TrackType.html @@ -0,0 +1,431 @@ + + + + + +WvPLTrackType.TrackType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLTrackType.TrackType

+
+
+
    +
  • java.lang.Object
  • +
  • + +
  • +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      + + + + + + + + + + + + + + + + + +
      All Methods Static Methods Concrete Methods 
      Modifier and TypeMethodDescription
      static WvPLTrackType.TrackTypevalueOf​(java.lang.String name) +
      Returns the enum constant of this type with the specified name.
      +
      static WvPLTrackType.TrackType[]values() +
      Returns an array containing the constants of this enum type, in +the order they are declared.
      +
      +
        +
      • + + +

        Methods inherited from class java.lang.Enum

        +clone, compareTo, equals, finalize, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
      • +
      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +getClass, notify, notifyAll, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLTrackType.TrackType[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLTrackType.TrackType c : WvPLTrackType.TrackType.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLTrackType.TrackType valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.html new file mode 100644 index 0000000..8a25a16 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLTrackType.html @@ -0,0 +1,290 @@ + + + + + +WvPLTrackType + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLTrackType

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLTrackType
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLTrackType
    +extends java.lang.Object
    +
    Wraps TrackType enumeration
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Nested Class Summary

      + + + + + + + + + + + + +
      Nested Classes 
      Modifier and TypeClassDescription
      static class WvPLTrackType.TrackType +
      TrackType enumeration definitions
      +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLTrackType() 
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLTrackType

        +
        public WvPLTrackType()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.VerificationLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.VerificationLevel.html new file mode 100644 index 0000000..daff1fd --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.VerificationLevel.html @@ -0,0 +1,405 @@ + + + + + +WvPLVerificationLevel.VerificationLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLVerificationLevel.VerificationLevel

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLVerificationLevel.VerificationLevel[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLVerificationLevel.VerificationLevel c : WvPLVerificationLevel.VerificationLevel.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLVerificationLevel.VerificationLevel valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.html new file mode 100644 index 0000000..1b76723 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVerificationLevel.html @@ -0,0 +1,335 @@ + + + + + +WvPLVerificationLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLVerificationLevel

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLVerificationLevel
    +extends java.lang.Object
    +
    VerificationLevel enum wrapper.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.VideoFeatureKeySet.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.VideoFeatureKeySet.html new file mode 100644 index 0000000..0b0eb8e --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.VideoFeatureKeySet.html @@ -0,0 +1,419 @@ + + + + + +WvPLVideoFeatureKeySet.VideoFeatureKeySet + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLVideoFeatureKeySet.VideoFeatureKeySet

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLVideoFeatureKeySet.VideoFeatureKeySet[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLVideoFeatureKeySet.VideoFeatureKeySet c : WvPLVideoFeatureKeySet.VideoFeatureKeySet.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLVideoFeatureKeySet.VideoFeatureKeySet valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getVideoFeatureKeySet

        +
        public int getVideoFeatureKeySet()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.html new file mode 100644 index 0000000..7cf19e6 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoFeatureKeySet.html @@ -0,0 +1,244 @@ + + + + + +WvPLVideoFeatureKeySet + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLVideoFeatureKeySet

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLVideoFeatureKeySet
    +extends java.lang.Object
    +
    Class that wraps the video feature key set enums WvPLVideoFeatureKeySet.
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoResolutionConstraint.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoResolutionConstraint.html new file mode 100644 index 0000000..05fb9d3 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVideoResolutionConstraint.html @@ -0,0 +1,438 @@ + + + + + +WvPLVideoResolutionConstraint + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLVideoResolutionConstraint

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLVideoResolutionConstraint
    +extends java.lang.Object
    +
    Specifies the video resolution constraints for content.
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Summary

      + + + + + + + + + + +
      Constructors 
      ConstructorDescription
      WvPLVideoResolutionConstraint() +
      Constructs a new WvPLVideoResolutionConstraint.
      +
      +
    • +
    +
    + +
    + +
    +
  • +
+
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLVideoResolutionConstraint

        +
        public WvPLVideoResolutionConstraint()
        +
        Constructs a new WvPLVideoResolutionConstraint.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        setMinResolutionPixels

        +
        public void setMinResolutionPixels​(long pixels)
        +
        Sets the minimum resolution in pixels.
        +
        +
        Parameters:
        +
        pixels - the resolution in pixels
        +
        +
      • +
      + + + +
        +
      • +

        getMinResolutionPixels

        +
        public long getMinResolutionPixels()
        +
        Retrieves the minimum resolution in pixels.
        +
        +
        Returns:
        +
        the minimum resolution
        +
        +
      • +
      + + + +
        +
      • +

        setMaxResolutionPixels

        +
        public void setMaxResolutionPixels​(long pixels)
        +
        Sets the maximum resolution in pixels.
        +
        +
        Parameters:
        +
        pixels - the resolution in pixels
        +
        +
      • +
      + + + +
        +
      • +

        getMaxResolutionPixels

        +
        public long getMaxResolutionPixels()
        +
        Retrieves the maximum resolution in pixels.
        +
        +
        Returns:
        +
        the max resolution
        +
        +
      • +
      + + + +
        +
      • +

        setHdcp

        +
        public void setHdcp​(WvPLHdcp.HDCP hdcp)
        +
        Sets a value from WvPLHdcp for the output protection, and in turn, the key + that will use this video constraint resolution.
        +
        +
        Parameters:
        +
        hdcp - enumerated value from WvPLHdcp.HDCP
        +
        +
      • +
      + + + +
        +
      • +

        getHdcp

        +
        public WvPLHdcp.HDCP getHdcp()
        +
        Retrieves the WvPLHdcp value for this video constraint resolution.
        +
        +
        Returns:
        +
        an enumeration from WvPLHdcp.HDCP
        +
        +
      • +
      + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.VulnerabilityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.VulnerabilityLevel.html new file mode 100644 index 0000000..b4a2b0b --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.VulnerabilityLevel.html @@ -0,0 +1,445 @@ + + + + + +WvPLVulnerabilityLevel.VulnerabilityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLVulnerabilityLevel.VulnerabilityLevel

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLVulnerabilityLevel.VulnerabilityLevel[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLVulnerabilityLevel.VulnerabilityLevel c : WvPLVulnerabilityLevel.VulnerabilityLevel.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLVulnerabilityLevel.VulnerabilityLevel valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      + + + +
        +
      • +

        getVulnerabilityLevel

        +
        public int getVulnerabilityLevel()
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.html new file mode 100644 index 0000000..9c04e0f --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLVulnerabilityLevel.html @@ -0,0 +1,335 @@ + + + + + +WvPLVulnerabilityLevel + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLVulnerabilityLevel

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLVulnerabilityLevel
    +extends java.lang.Object
    +
    VulnerabilityLevel enum wrapper.
    +
  • +
+
+
+ +
+
+ +
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.WatermarkingSupport.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.WatermarkingSupport.html new file mode 100644 index 0000000..77c935d --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.WatermarkingSupport.html @@ -0,0 +1,405 @@ + + + + + +WvPLWatermarkingSupport.WatermarkingSupport + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Enum WvPLWatermarkingSupport.WatermarkingSupport

+
+
+ +
+ +
+
+ +
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        values

        +
        public static WvPLWatermarkingSupport.WatermarkingSupport[] values()
        +
        Returns an array containing the constants of this enum type, in +the order they are declared. This method may be used to iterate +over the constants as follows: +
        +for (WvPLWatermarkingSupport.WatermarkingSupport c : WvPLWatermarkingSupport.WatermarkingSupport.values())
        +    System.out.println(c);
        +
        +
        +
        Returns:
        +
        an array containing the constants of this enum type, in the order they are declared
        +
        +
      • +
      + + + +
        +
      • +

        valueOf

        +
        public static WvPLWatermarkingSupport.WatermarkingSupport valueOf​(java.lang.String name)
        +
        Returns the enum constant of this type with the specified name. +The string must match exactly an identifier used to declare an +enum constant in this type. (Extraneous whitespace characters are +not permitted.)
        +
        +
        Parameters:
        +
        name - the name of the enum constant to be returned.
        +
        Returns:
        +
        the enum constant with the specified name
        +
        Throws:
        +
        java.lang.IllegalArgumentException - if this enum type has no constant with the specified name
        +
        java.lang.NullPointerException - if the argument is null
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ + + + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.html new file mode 100644 index 0000000..c7c3de0 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWatermarkingSupport.html @@ -0,0 +1,244 @@ + + + + + +WvPLWatermarkingSupport + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLWatermarkingSupport

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport
    • +
    +
  • +
+
+
    +
  • +
    +
    public final class WvPLWatermarkingSupport
    +extends java.lang.Object
    +
    WvPLWatermarkingSupport class definition.
    +
  • +
+
+
+
    +
  • + +
    + +
    + +
    +
      +
    • + + +

      Method Summary

      +
        +
      • + + +

        Methods inherited from class java.lang.Object

        +clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWidevinePsshData.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWidevinePsshData.html new file mode 100644 index 0000000..53c9df4 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/WvPLWidevinePsshData.html @@ -0,0 +1,464 @@ + + + + + +WvPLWidevinePsshData + + + + + + + + + + + + + + +
+ +
+ +
+
+ +

Class WvPLWidevinePsshData

+
+
+
    +
  • java.lang.Object
  • +
  • +
      +
    • com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
    • +
    +
  • +
+
+
    +
  • +
    +
    public class WvPLWidevinePsshData
    +extends java.lang.Object
    +
    Defines the 'pssh' box for Common Encryption (CENC).
    +
  • +
+
+
+ +
+
+
    +
  • + +
    +
      +
    • + + +

      Constructor Detail

      + + + +
        +
      • +

        WvPLWidevinePsshData

        +
        public WvPLWidevinePsshData()
        +
        Constructor. This should only be called from the JNI where the WvPLWidevinePsshData is built.
        +
      • +
      +
    • +
    +
    + +
    +
      +
    • + + +

      Method Detail

      + + + +
        +
      • +

        getEntitlementRotationEnabled

        +
        public boolean getEntitlementRotationEnabled()
        +
      • +
      + + + +
        +
      • +

        entitlementPeriodIndex

        +
        public int entitlementPeriodIndex()
        +
      • +
      + + + +
        +
      • +

        getContentId

        +
        public byte[] getContentId()
        +
        Returns the content identifier.
        +
        +
        Returns:
        +
        the content identifier
        +
        +
      • +
      + + + +
        +
      • +

        getKeyIds

        +
        public java.util.List<byte[]> getKeyIds()
        +
        Returns the key identifiers.
        +
        +
        Returns:
        +
        a list of key identifiers
        +
        +
      • +
      + + + +
        +
      • +

        getGroupIds

        +
        public java.util.List<byte[]> getGroupIds()
        +
        Returns the group identifiers.
        +
        +
        Returns:
        +
        a list of group identifiers
        +
        +
      • +
      + + + +
        +
      • +

        getEntitledKeys

        +
        public java.util.List<WvPLEntitledKey> getEntitledKeys()
        +
        Returns the entitled keys.
        +
        +
        Returns:
        +
        a list of entitled keys WvPLEntitledKey
        +
        +
      • +
      + + + +
        +
      • +

        getVideoFeature

        +
        public java.lang.String getVideoFeature()
        +
        Returns the video feature information.
        +
        +
        Returns:
        +
        the video feature identifier.
        +
        +
      • +
      + + + + + + + +
        +
      • +

        toString

        +
        public java.lang.String toString()
        +
        +
        Overrides:
        +
        toString in class java.lang.Object
        +
        +
      • +
      +
    • +
    +
    +
  • +
+
+
+
+ +
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-summary.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-summary.html new file mode 100644 index 0000000..82f228a --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-summary.html @@ -0,0 +1,759 @@ + + + + + +com.google.video.widevine.sdk.wvpl + + + + + + + + + + + + + + +
+ +
+
+
+

Package com.google.video.widevine.sdk.wvpl

+
+
+ +
+
+
+ +
+ + diff --git a/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-tree.html b/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-tree.html new file mode 100644 index 0000000..69ee2e8 --- /dev/null +++ b/centos/javadoc/com/google/video/widevine/sdk/wvpl/package-tree.html @@ -0,0 +1,280 @@ + + + + + +com.google.video.widevine.sdk.wvpl Class Hierarchy + + + + + + + + + + + + + + +
+ +
+
+
+

Hierarchy For Package com.google.video.widevine.sdk.wvpl

+
+
+
+

Class Hierarchy

+ +
+
+

Enum Hierarchy

+ +
+
+
+
+ +
+ + diff --git a/centos/javadoc/constant-values.html b/centos/javadoc/constant-values.html new file mode 100644 index 0000000..80caa68 --- /dev/null +++ b/centos/javadoc/constant-values.html @@ -0,0 +1,146 @@ + + + + + +Constant Field Values + + + + + + + + + + + + + + +
+ +
+
+
+

Constant Field Values

+
+

Contents

+
+
+
+
+ +
+ + diff --git a/centos/javadoc/deprecated-list.html b/centos/javadoc/deprecated-list.html new file mode 100644 index 0000000..bb1559e --- /dev/null +++ b/centos/javadoc/deprecated-list.html @@ -0,0 +1,213 @@ + + + + + +Deprecated List + + + + + + + + + + + + + + +
+ +
+
+
+

Deprecated API

+

Contents

+ +
+
+ + + +
+
+
+ +
+ + diff --git a/centos/javadoc/element-list b/centos/javadoc/element-list new file mode 100644 index 0000000..3a6dca1 --- /dev/null +++ b/centos/javadoc/element-list @@ -0,0 +1 @@ +com.google.video.widevine.sdk.wvpl diff --git a/centos/javadoc/help-doc.html b/centos/javadoc/help-doc.html new file mode 100644 index 0000000..294811b --- /dev/null +++ b/centos/javadoc/help-doc.html @@ -0,0 +1,264 @@ + + + + + +API Help + + + + + + + + + + + + + + +
+ +
+
+
+

How This API Document Is Organized

+
This API (Application Programming Interface) document has pages corresponding to the items in the navigation bar, described as follows.
+
+
+
    +
  • +
    +

    Package

    +

    Each package has a page that contains a list of its classes and interfaces, with a summary for each. These pages may contain six categories:

    +
      +
    • Interfaces
    • +
    • Classes
    • +
    • Enums
    • +
    • Exceptions
    • +
    • Errors
    • +
    • Annotation Types
    • +
    +
    +
  • +
  • +
    +

    Class or Interface

    +

    Each class, interface, nested class and nested interface has its own separate page. Each of these pages has three sections consisting of a class/interface description, summary tables, and detailed member descriptions:

    +
      +
    • Class Inheritance Diagram
    • +
    • Direct Subclasses
    • +
    • All Known Subinterfaces
    • +
    • All Known Implementing Classes
    • +
    • Class or Interface Declaration
    • +
    • Class or Interface Description
    • +
    +
    +
      +
    • Nested Class Summary
    • +
    • Field Summary
    • +
    • Property Summary
    • +
    • Constructor Summary
    • +
    • Method Summary
    • +
    +
    +
      +
    • Field Detail
    • +
    • Property Detail
    • +
    • Constructor Detail
    • +
    • Method Detail
    • +
    +

    Each summary entry contains the first sentence from the detailed description for that item. The summary entries are alphabetical, while the detailed descriptions are in the order they appear in the source code. This preserves the logical groupings established by the programmer.

    +
    +
  • +
  • +
    +

    Annotation Type

    +

    Each annotation type has its own separate page with the following sections:

    +
      +
    • Annotation Type Declaration
    • +
    • Annotation Type Description
    • +
    • Required Element Summary
    • +
    • Optional Element Summary
    • +
    • Element Detail
    • +
    +
    +
  • +
  • +
    +

    Enum

    +

    Each enum has its own separate page with the following sections:

    +
      +
    • Enum Declaration
    • +
    • Enum Description
    • +
    • Enum Constant Summary
    • +
    • Enum Constant Detail
    • +
    +
    +
  • +
  • +
    +

    Tree (Class Hierarchy)

    +

    There is a Class Hierarchy page for all packages, plus a hierarchy for each package. Each hierarchy page contains a list of classes and a list of interfaces. Classes are organized by inheritance structure starting with java.lang.Object. Interfaces do not inherit from java.lang.Object.

    +
      +
    • When viewing the Overview page, clicking on "Tree" displays the hierarchy for all packages.
    • +
    • When viewing a particular package, class or interface page, clicking on "Tree" displays the hierarchy for only that package.
    • +
    +
    +
  • +
  • +
    +

    Deprecated API

    +

    The Deprecated API page lists all of the API that have been deprecated. A deprecated API is not recommended for use, generally due to improvements, and a replacement API is usually given. Deprecated APIs may be removed in future implementations.

    +
    +
  • +
  • +
    +

    Index

    +

    The Index contains an alphabetic index of all classes, interfaces, constructors, methods, and fields, as well as lists of all packages and all classes.

    +
    +
  • +
  • +
    +

    All Classes

    +

    The All Classes link shows all classes and interfaces except non-static nested types.

    +
    +
  • +
  • +
    +

    Serialized Form

    +

    Each serializable or externalizable class has a description of its serialization fields and methods. This information is of interest to re-implementors, not to developers using the API. While there is no link in the navigation bar, you can get to this information by going to any serialized class and clicking "Serialized Form" in the "See also" section of the class description.

    +
    +
  • +
  • +
    +

    Constant Field Values

    +

    The Constant Field Values page lists the static final fields and their values.

    +
    +
  • +
  • +
    +

    Search

    +

    You can search for definitions of modules, packages, types, fields, methods and other terms defined in the API, using some or all of the name. "Camel-case" abbreviations are supported: for example, "InpStr" will find "InputStream" and "InputStreamReader".

    +
    +
  • +
+
+This help file applies to API documentation generated by the standard doclet.
+
+
+ +
+ + diff --git a/centos/javadoc/index-all.html b/centos/javadoc/index-all.html new file mode 100644 index 0000000..f6b8180 --- /dev/null +++ b/centos/javadoc/index-all.html @@ -0,0 +1,3422 @@ + + + + + +Index + + + + + + + + + + + + + + +
+ +
+
+
A C D E F G H I K L M N O P R S T U V W 
All Classes All Packages + + +

A

+
+
addKey(WvPLKey) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Add a key to the license.
+
+
addKey(T) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Add a key to the license.
+
+
addModelInfo(WvPLDeviceModelInfo) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Add ModelInfo to WvPLDeviceInfo.
+
+
addVideoResolutionConstraint(WvPLVideoResolutionConstraint) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets a WvPLVideoResolutionConstraint on the output protection.
+
+
AES128_CBC - com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme.EncryptionScheme
+
 
+
AES128_CTR - com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme.EncryptionScheme
+
 
+
allowRevokedDevices(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Enable delivery of licenses to revoked client devices.
+
+
allowRevokedDevices(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Enable delivery of licenses to revoked client devices.
+
+
ALREADY_EXISTS - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
ANALOG_OUTPUT_NONE - com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
 
+
ANALOG_OUTPUT_SUPPORTED - com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
 
+
ANALOG_OUTPUT_SUPPORTS_CGMS_A - com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
 
+
ANALOG_OUTPUT_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
 
+
ATSC_PROFILE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
AUDIO - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
AUTOMATIC - com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
 
+
+ + + +

C

+
+
CAPABILITY_ANALOG_OUTPUT - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_ANTI_ROLLBACK - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_DIGITAL_OUTPUT - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_HDCP - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_OEMCRYPTO_VERSION - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_OK - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_RESOURCE_RATING - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_SECURE_DATA_PATH - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_SECURITY_LEVEL - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CAPABILITY_UNQUALIFIED_PROFILE - com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
CBC1 - com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
 
+
CBCS - com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
 
+
CENC - com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
 
+
CENS - com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
 
+
CERT_CHAIN_NOT_SELECTED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
CERTIFICATE_STATUS_LIST_NOT_FOUND - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
CGMS_NONE - com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
 
+
com.google.video.widevine.sdk.wvpl - package com.google.video.widevine.sdk.wvpl
+
 
+
CONTENT - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
CONTENT_INFO_ENTRY_EMPTY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
COPY_FREE - com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
 
+
COPY_NEVER - com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
 
+
COPY_ONCE - com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
 
+
CREATE_RSA_PUBLIC_KEY_FAILED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
createSession(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Creates a session.
+
+
createSession(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Creates a WvPLSession.
+
+
createSessionWithOptions(byte[], WvPLSessionCreateOptions) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Creates a WvPLSession with license request and options.
+
+
+ + + +

D

+
+
DECENC_MITIGATION_OPTION_ANY - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DECENC_MITIGATION_OPTION_AUTHENTICATE_BITSTREAM - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DECENC_MITIGATION_OPTION_NONE - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DECENC_MITIGATION_OPTION_RESTRICT_DECODING - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DECENC_MITIGATION_OPTION_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DECENC_MITIGATION_OPTION_VALIDATE_BITSTREAM - com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
 
+
DELETED - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
+
 
+
destroyPeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
 
+
destroySession(WvPLSession) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Destroy a previously created session.
+
+
destroySession(T) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Destroys a previous session.
+
+
DEVELOPMENT_CERTIFICATE_NOT_ALLOWED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DEVICE_CAPABILITIES_TOO_LOW - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DEVICE_CERTIFICATE_REVOKED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DEVICE_CERTIFICATE_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DEVICE_LEVEL_1 - com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
 
+
DEVICE_LEVEL_2 - com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
 
+
DEVICE_LEVEL_3 - com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
 
+
DEVICE_LEVEL_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
 
+
DEVICE_NOT_SUPPORTED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DEVICE_STATE_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
DRM_DEVICE_CERTIFICATE_ECC_KEYGEN_FAILED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DRM_DEVICE_CERTIFICATE_EMPTY_SERIAL_NUMBER - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DRM_DEVICE_CERTIFICATE_EXPIRED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
DRM_DEVICE_CERTIFICATE_SERIAL_NUMBER_REVOKED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

E

+
+
EMPTY_GLOBAL_INDIVIDUAL_DEVICE_REVOCATION_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
EMPTY_GROUP_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
ENCRYPT_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
ENCRYPTED_PROVIDER_KEY_CONFIG_PARSE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
ENCRYPTION_SCHEME_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme.EncryptionScheme
+
 
+
ENTITLEMENT - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
entitlementPeriodIndex() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
 
+
EXPIRED_CERTIFICATE_STATUS_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
EXPIRED_INDIVIDUAL_DEVICE_REVOCATION_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
EXTERNAL_LICENSE_REQUEST - com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
 
+
EXTERNAL_LICENSE_REQUEST_PARSE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
EXTERNAL_LICENSE_REQUEST_TYPE_UNDEFINED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

F

+
+
FACTORY_DRM_GROUP_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
FACTORY_KEYBOX - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
FACTORY_OEM_DEVICE_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
FACTORY_OEM_GROUP_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
FAILED_TO_PARSE_INDIVIDUAL_DEVICE_REVOCATION_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
filterKey(WvPLKey) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Conditionally add key to the license if the device can satisfy the output requirements.
+
+
filterKey(T) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Conditionally add key to the license if the device can satisfy the output requirements.
+
+
findCode(int) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
findDeviceState(int) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
FIRST_DECRYPT - com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
 
+
+ + + +

G

+
+
generateDeviceStatusListRequest() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Returns a device status list request to be used in getting a DCSL.
+
+
generateDeviceStatusListRequest() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Returns the device status list request to be sent to the SDK.
+
+
generateErrorResponse(WvPLStatus) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Generates a service certificate response if the WvPLStatus code is + SERVICE_CERTIFICATE_REQUEST_MESSAGE.
+
+
generateLicense() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Generates a license response.
+
+
getAllowDecrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
getAllowEncrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
getAllowPreReleaseSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Returns the option for allowiing re-release system Id.
+
+
getAllowRecord() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Retrieves the status of allow record.
+
+
getAllowRevokedDevice() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
+
+
Returns setting for whether revoked devices are allowed.
+
+
getAllowRevokedIndividualDevice() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Returns the option for allowiing individually revoked device..
+
+
getAllowRevokedSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Returns the option for allowing revoked system Id.
+
+
getAllowSign() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
getAllowSignatureVerify() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
getAllowTamperedPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Retrieves the setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is PLATFORM_TAMPERED.
+
+
getAllowTestOnlySystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Returns the option for allowing test_only system Id.
+
+
getAllowUnknownSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Returns the option for allowing unknown system Id.
+
+
getAllowUnverifiedPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Retrieves the setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is PLATFORM_UNVERIFIED.
+
+
getAlwaysIncludeClientId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if client identification is to be included in the following RENEWAL and/or + RELEASE license requests sent by the client.
+
+
getAnalogOutputCapabilities() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities
+
 
+
getAnalogOutputCapabilities() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the WvPLAnalogOutputCapabilities analog capabilities of the device.
+
+
getAntiRollbackUsageTable() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether the key must only be used if the client supports anti + rollback of the user table.
+
+
getAuthenticateBitstreamConfigOption() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
 
+
getAuthenticationKey() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
getAuthenticationKeyIv() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
getAutoSetProviderSessionToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieve the setting as to whether the provider session may be automatically set in the + license.
+
+
getBrowserRequirement() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
 
+
getCanDisableAnalogOutput() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether the device can disable its analog output.
+
+
getCanPersist() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if the license is to be persisted for offline use.
+
+
getCanPlay() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if this content can be played back.
+
+
getCanRenew() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if the license can be renewed.
+
+
getCanUpdateSrm() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to be capable of updating SRM data.
+
+
getCapabilityStatus() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
getCdmVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Retrieves the Widevine Client Decryption Module (CDM) version.
+
+
getCertificateKeyType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType
+
 
+
getCgms() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCgms
+
 
+
getCgms() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Retrieves the CGMS-A analog output WvPLCgms
+
+
getClientCapabilities() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
+
Returns the WvPLClientCapabilities actual capabilities for the device.
+
+
getClientCapabilities() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+ +
+
getClientInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Returns the wvpl client info.
+
+
getClientInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the wvpl client info.
+
+
getClientToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether client token generated by the content provider.
+
+
getClockSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel
+
 
+
getClockSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getContentId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Returns the content id from the license request.
+
+
getContentId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the content id from the license request.
+
+
getContentId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Returns the content identifier.
+
+
getContentOrGroupId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
getContentOrGroupId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
getContentOwner() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the content owner.
+
+
getControlTime() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the control time.
+
+
getCreationTimeSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDcslInfo
+
+
Returns the creation time of the DcslInfo.
+
+
getCustomDeviceSecurityProfileNames(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Retrieves the custom device security profile names associated with the owner.
+
+
getCustomDeviceSecurityProfileNames(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieves the custom device security profile names associated with the owner.
+
+
getCustomDeviceSecurityProfileOwners() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Retrieves owners for custom device security profiles.
+
+
getCustomDeviceSecurityProfileOwners() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieves owners for custom device security profiles.
+
+
getCustomDeviceSecurityProfiles(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Retrieves custom device security profiles associated with the owner.
+
+
getCustomDeviceSecurityProfiles(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieves custom device security profiles associated with the owner.
+
+
getDcslInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
 
+
getDecencMitigation() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the DeCENC Mitigation option.
+
+
getDecencMitigationConfigOption() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
getDecencMitigationOption() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
getDefaultDeviceSecurityProfile(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Retrieves the specified default device security profile.
+
+
getDefaultDeviceSecurityProfile(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Deprecated. +
use getCustomDeviceSecurityProfiles() instead after loading the custom DSPs in the + Environment class.
+
+
+
getDefaultDeviceSecurityProfileNames() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Retrieves the default device security profile names.
+
+
getDefaultDeviceSecurityProfileNames() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Deprecated. +
use getCustomDeviceSecurityProfileNames() instead after loading the custom DSPs in + the Environment class.
+
+
+
getDeviceInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Return the device information.
+
+
getDeviceInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return the device information.
+
+
getDeviceModelStatus() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
getDeviceModelStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus
+
 
+
getDeviceName() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
Get deviceName as specified in WvPLClientInfo.
+
+
getDevicePlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform
+
 
+
getDeviceSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the WvPLDeviceSecurityLevel.DeviceSecurityLevel for the device.
+
+
getDeviceSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel
+
 
+
getDeviceSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
DeviceSecurityLevel for the device making the license request.
+
+
getDeviceState() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
getDeviceState() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceState
+
 
+
getDeviceState() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
The device state for the Device Security Profile used for the license request.
+
+
getDeviceStates() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
Get the device state list for the device.
+
+
getDeviceStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the device status, which is mapping of the same from the + DeviceCertificateStatusList(DCSL)
+
+
getDeviceStatus() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
getDeviceStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus
+
 
+
getDeviceStatusOptions() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the WvPLDeviceStatusOptions for this license.
+
+
getDeviceType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the type of device.
+
+
getDeviceType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
Get deviceType as specified in WvPLDeviceInfo.
+
+
getDisableAnalogOutput() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Retrieves the status of analog output.
+
+
getDisableDigitalOutput() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Retrieves the status of digital output.
+
+
getDrmCertificateSerialNumber() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the 128-bit globally unique serial number of the certificate.
+
+
getDrmInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Return the DRM information.
+
+
getDrmInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return the DRM information.
+
+
getEncryptionScheme() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the WvPLEncryptionScheme enumeration for this key.
+
+
getEntitledKeys() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Returns the entitled keys.
+
+
getEntitlementKeyId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
+
Returns the entitlement key identifier, the key identifier associated with an entitlement key.
+
+
getEntitlementKeyIv() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
+
Returns the entitlement key IV.
+
+
getEntitlementKeySize() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
+
Returns the entitlement key size in bytes.
+
+
getEntitlementRotationEnabled() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
 
+
getExceptions() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the list of device exceptions
+
+
getGroupIds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Returns the group identifiers.
+
+
getHdcp() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns the WvPLHdcp value for the key that is using this output protection.
+
+
getHdcp() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Retrieves the WvPLHdcp value for this video constraint resolution.
+
+
getHDCP() - Method in class com.google.video.widevine.sdk.wvpl.WvPLHdcp
+
 
+
getHDCP() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
getInitialRenewalDelayBase() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether the initial renewal delay base feature is supported on the + device.
+
+
getInitialRenewalDelayBase() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the initial renewal delay base setting.
+
+
getKeyboxSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
getKeyBytes() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
+
Retrieves the entitled key.
+
+
getKeyBytes() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the key that is used for encrypting and decrypting the content.
+
+
getKeyCategory() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
getKeyId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
+
Retrieves the entitled key ID.
+
+
getKeyId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the key identifier for this content key.
+
+
getKeyIds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Returns the key identifiers.
+
+
getKeys() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Get a list of keys in generic type which extends WvPLBaseKey.
+
+
getKeys() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Get a list of keys.
+
+
getKeyType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Returns the WvPLKeyType enumeration for this key.
+
+
getKeyType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the WvPLKeyType enumeration for this key.
+
+
getLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Deprecated.
+
+
getLicenseCategory() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
getLicenseCategorySpec() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the WvPLLicenseCategorySpec for this license.
+
+
getLicenseCounter() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
getLicenseDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the license window in seconds.
+
+
getLicenseId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Returns WvPLLicenseIdentification which propagated from LicenseRequest to License, + incrementing version with each iteration.
+
+
getLicenseReleased() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getLicenseRequest() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return LicenseRequest proto in serialized byte array format
+
+
getLicenseRequestType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType
+
 
+
getLicenseRequestType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
+
Returns the WvPLLicenseRequestType for license request type.
+
+
getLicenseStartTime() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the license start time for the session.
+
+
getLicenseType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
+
Retrieves the type of the license from WvPLLicenseType, default value is Streaming.
+
+
getLicenseType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseType
+
 
+
getLicenseType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
+
Returns the WvPLLicenseType for license type.
+
+
getLicenseUsed() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getManufacturer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the device make (manufacturer).
+
+
getManufacturer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
+
+
Manufacturer or make of the device making the license request.
+
+
getMasterSigningKey() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the master signing key in byte array for the session.
+
+
getMaxHdcpVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Returns the WvPLHdcp for max HDCP version.
+
+
getMaxHdcpVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Returns the WvPLHdcp for max HDCP version.
+
+
getMaxResolutionPixels() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Retrieves the maximum resolution in pixels.
+
+
getMessage() - Method in class com.google.video.widevine.sdk.wvpl.WvPLStatus
+
 
+
getMessageType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLMessageType
+
 
+
getMessageType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
+
Returns the WvPLMessageType for message type.
+
+
getMinResolutionPixels() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Retrieves the minimum resolution in pixels.
+
+
getModel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the device model.
+
+
getModel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
+
+
Model or brand of the device making the license request.
+
+
getModelInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Gets a list of WvPLDeviceModelInfo
+
+
getModelStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
+
+
Device Model Status of the device making the license request.
+
+
getModelYear() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
+
+
Model launch year of the device making the license request.
+
+
getName() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the name of the device security profile.
+
+
getNamesValues() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Retrieves the names/values present in the ClientIdentification.
+
+
getNumericCode() - Method in class com.google.video.widevine.sdk.wvpl.WvPLStatus
+
 
+
getOemCryptoAPIMajorVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
oemCryptoApiMajorVersion for the device making the license request.
+
+
getOemCryptoApiVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Returns the OEM Crypto API Version.
+
+
getOemCryptoApiVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Returns the OEM Crypto API Version.
+
+
getOperatorSessionKeyPermissions() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the operator session key permissions.
+
+
getOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Returns the WvPLOutputProtection for this content key.
+
+
getOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the WvPLOutputProtection for this content key.
+
+
getOutputRequirement() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the output requirement.
+
+
getOutputRequirement() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
The output requirement specified for the license request.
+
+
getOverrideDeviceRevocation() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the override setting for device revocation.
+
+
getOverrideOemCryptoApiVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the override oem crypto api version for the session.
+
+
getOverrideProviderClientToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the setting for the override provider client token.
+
+
getOwner() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the name of the owner of the device security profile.
+
+
getPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the platform of device.
+
+
getPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
Get platform as specified in WvPLDeviceInfo.
+
+
getPlatformVerificationStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus
+
+ +
+
getPlatformVerificationStatuses() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBrowserRequirement
+
+
Retrieves the required platform verification status based on VMP and remote // attestation.
+
+
getPlaybackDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the viewing window in seconds.
+
+
getPolicy() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Returns the license policy.
+
+
getPolicy() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the license policy.
+
+
getProductInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
Get productInfo as specified in WvPLClientInfo}.
+
+
getProtectionScheme() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+ +
+
getProviderClientToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Retrieves the provider client token set by the provider.
+
+
getProviderClientToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the provider client token for the session.
+
+
getProviderClientToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Returns the provider client token for the session in byte array.
+
+
getProviderSessionToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
getProviderSessionToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the provider session token for the session.
+
+
getProviderSessionToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getProvisionedDeviceInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Deprecated. +
use getDeviceInfo instead (b/193921795)
+
+
+
getProvisioningMethod() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the WvPLProvisioningMethod.ProvisioningMethod for the device.
+
+
getProvisioningMethod() - Method in class com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod
+
 
+
getProvisioningVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientInfo
+
+
Returns the WvPLProvisioningVersion for provisioning version.
+
+
getProvisioningVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion
+
 
+
getPsshData() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Returns the WvPLWidevinePsshData.
+
+
getPsshData() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the WvPLWidevinePsshData.
+
+
getPurchaseId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
getPurchaseId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the purchase identifier for the session.
+
+
getQualifiedCustomDeviceSecurityProfiles(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Return the names of the qualified custom device security profiles.
+
+
getQualifiedCustomDeviceSecurityProfiles(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return the names of the qualified custom device security profiles.
+
+
getQualifiedDefaultDeviceSecurityProfiles() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Return the names of the qualified default device security profiles.
+
+
getQualifiedDefaultDeviceSecurityProfiles() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Deprecated. +
use getQualifiedCustomDeviceSecurityProfiles() instead after loading the custom + DSPs in the Environment class.
+
+
+
getRejectUnknownMakeModel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Retrieves the setting of whether unknown make model is rejected.
+
+
getRejectUnknownMakeModel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Retrieves the setting of whether unknown make model is rejected.
+
+
getRenewalIntervalSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the license renewal interval time in seconds.
+
+
getRenewalRecoveryDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the continuing playback time in seconds after license renewal fails.
+
+
getRenewalRetryIntervalSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the delay in seconds between license renewal attempts.
+
+
getRenewalUrl() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the url location where license renewal requests are to be sent.
+
+
getRenewWithUsage() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if the license is to be sent for renewal when usage is started.
+
+
getRentalDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns the rental window in seconds.
+
+
getRequestAsString(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Translates the license request from the CDM to a human-readable message, useful for debugging.
+
+
getRequestAsString(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieves the license request from the Widevine CDM as a base64-encoded string.
+
+
getRequestedOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Returns the requested output protection for this content key.
+
+
getRequestedOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the requested output protection for this content key.
+
+
getRequestId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
getRequestModelInfo() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
The model of the device making the license request.
+
+
getRequestType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Return the request type information as represented in WvPLRequestType
+
+
getRequestType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return the request type information as represented in WvPLRequestType
+
+
getRequiredOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
+
Returns the WvPLOutputProtection required output protection for the device.
+
+
getRequiredProfile() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the required profile for this key.
+
+
getResourceRatingTier() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the resource rating tier.
+
+
getResourceRatingTier() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
Resource Rating Tier for the device making the license request.
+
+
getSdkVersionString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Returns version of the SDK library.
+
+
getSdkVersionString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Returns version of the SDK library.
+
+
getSecondsSinceFirstDecrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getSecondsSinceLastDecrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getSecondsSinceLicenseReceived() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
getSecuredataPath() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns true if the secure data path on the device was set.
+
+
getSecureDataPathHwDecodeEnabled() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the setting for the secure data path for any non-audio keys.
+
+
getSecurityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Retrieves the security level robustness defined by Widevine.
+
+
getSecurityRequirement() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
+
Retrieves the security requirement.
+
+
getSecurityRequirement() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
The security requirement for the Device Security Profile used for the license request.
+
+
getServiceId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the service identifier (web origin) for the provider which owns the certificate.
+
+
getSessionId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
getSessionId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Returns the identifier for the session.
+
+
getSessionInit() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Returns the license session init.
+
+
getSessionInit() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the license session init.
+
+
getSessionState() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Gets the session state.
+
+
getSessionToken() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether client session contains a token.
+
+
getSessionUsage() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Gets the session usage.
+
+
getSigningKey() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Returns the signing key in byte array for the session.
+
+
getSoc() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the soc (system-on-chip) for the device.
+
+
getSoftEnforcePlaybackDuration() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if the playback will continue until the end of the content being played + back, even if playback duration has expired.
+
+
getSoftEnforceRentalDuration() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns true if the playback will continue until the end of the content being played + back, even if rental duration has expired.
+
+
getSrmVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the Srm Version.
+
+
getStatsAsBytes(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieve license counter stats as bytes.
+
+
getStatsAsString(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Retrieve license counter stats as a string.
+
+
getStatus() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
+
Returns the WvPLCapabilityStatus.DeviceCapabilityStatus status indicating whether the device satisifes the + security requirements.
+
+
getStatus() - Method in exception com.google.video.widevine.sdk.wvpl.WvPLStatusException
+
+
Returns the WvPLStatus.
+
+
getStatusCode() - Method in class com.google.video.widevine.sdk.wvpl.WvPLStatus
+
 
+
getSupportedCertificateKeyType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves WvPLCertificateKeyType list.
+
+
getSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the systemId for the device.
+
+
getSystemId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
+
The systemId of the App-specific DRM device certificate making the license request.
+
+
getTestDevice() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the setting as to whether the device is a test device.
+
+
getTimerDelayBase() - Method in class com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase
+
 
+
getTrackType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Returns the WvPLTrackType enumeration for this key.
+
+
getTrackType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the WvPLTrackType enumeration for this key.
+
+
getVerificationLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the WvPLVerificationLevel.VerificationLevel for the device.
+
+
getVerificationLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel
+
 
+
getVerifiedMakeModel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
Verified make model (i.e.
+
+
getVersion() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
getVersionString() - Static method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Deprecated. +
use WvPLEnvironment.getSdkVersionString() instead
+
+
+
getVideoFeature() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Returns the video feature information.
+
+
getVideoFeatureKeySet() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
 
+
getVideoResolutionConstraint() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Retrieves the list of video resolution constraints.
+
+
getVideoResolutionConstraints() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the setting as to whether the video resolution of the content being decrypted/decoded + falls within one of the specified ranges.
+
+
getVulnerabilityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Retrieves the WvPLVulnerabilityLevel.VulnerabilityLevel for the device.
+
+
getVulnerabilityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
+
Vulnerability level for the device security profile used by the device making the license + request.
+
+
getVulnerabilityLevel() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel
+
 
+
getVulnerabilityLevel() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
getWatermarkingSupport() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
+
Retrieves the WvPLWatermarkingSupport.WatermarkingSupport watermarking support on the + device.
+
+
getWrappingKey() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns the key that is used for encrypting 'keyBytes'.
+
+
GROUP_KEY - com.google.video.widevine.sdk.wvpl.WvPLKeyCategory.KeyCategory
+
 
+
GROUP_LICENSE - com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory.LicenseCategory
+
 
+
+ + + +

H

+
+
hasAllowDecrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
hasAllowEncrypt() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
hasAllowRecord() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether the digital video recording (DVR) is allowed was set.
+
+
hasAllowSign() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
hasAllowSignatureVerify() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
hasAlwaysIncludeClientId() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client was set.
+
+
hasCanPersist() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the license is to be persisted for offline use was set.
+
+
hasCanPlay() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether this content can be played back was set.
+
+
hasCanRenew() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the license can be renewed was set.
+
+
hasCgms() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether the CGMS-A analog output WvPLCgms was set.
+
+
hasDisableAnalogOutput() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether disable analog output was set.
+
+
hasDisableDigitalOutput() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether disable digital output was set.
+
+
hasHdcp() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether the WvPLHdcp value for the key that is using this output protection was + set.
+
+
hasInitialRenewalDelayBase() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the initial renewal delay base setting was set.
+
+
hasLicenseDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the license window was set.
+
+
hasOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns whether the WvPLOutputProtection for this content key is set.
+
+
hasPlaybackDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the viewing window was set.
+
+
hasRenewalIntervalSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the license renewal interval time was set.
+
+
hasRenewalRecoveryDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the continuing playback time was set.
+
+
hasRenewalRetryIntervalSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the delay in seconds between license renewal attempts was set.
+
+
hasRenewalUrl() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the url location where license renewal requests are to be sent was set.
+
+
hasRenewWithUsage() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the license is to be sent for renewal when usage is started was set.
+
+
hasRentalDurationSeconds() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the rental window was set.
+
+
hasRequestedOutputProtection() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns whether the requested WvPLOutputProtection for this content key is set.
+
+
hasSdkSession() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Return true if Session has sdk session.
+
+
hasSecuredataPath() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Returns whether the secure data path on the device was set.
+
+
hasSoftEnforcePlaybackDuration() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the playback will continue until the end of the content being played back, even + if playback duration has expired was set.
+
+
hasSoftEnforceRentalDuration() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Returns whether the playback will continue until the end of the content being played back, even + if rental duration has expired was set.
+
+
hasTrackType() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Returns whether the WvPLTrackType enumeration for this key is set.
+
+
HDCP_NO_DIGITAL_OUTPUT - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_NONE - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_V1 - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_V2 - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_V2_1 - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_V2_2 - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HDCP_V2_3 - com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
 
+
HW_SECURE_ALL - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
HW_SECURE_CLOCK - com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
 
+
HW_SECURE_CRYPTO - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
HW_SECURE_DECODE - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
+ + + +

I

+
+
IN_TESTING - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
init(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Initialized only from the JNI when the session is built.
+
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
+
 
+
initializePeer() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
 
+
INSECURE_CLOCK - com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
 
+
INTERNAL - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_ARGUMENT - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_CENC_INIT_DATA - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_CERT_ALGORITHM - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_CERTIFICATE_STATUS_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_CLIENT_CERT_TYPE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_CONTENT_ID_TYPE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_DEVICE_SECURITY_PROFILE_LIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_DRM_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_ENCRYPTED_CLIENT_IDENTIFICATION - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_ENCRYPTED_LICENSE_CHALLENGE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_ENCRYPTED_PROVIDER_KEY_CONFIG - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_INDIVIDUAL_DEVICE_REVOCATION_LIST_SIGNATURE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_KEY_CONTROL_NONCE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_KEY_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_KEY_TYPE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_KEYBOX_TOKEN - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_MASTER_SIGNING_KEY_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_MESSAGE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_MESSAGE_TYPE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_OFFLINE_CAN_PERSIST - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_PARAMETER - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_PROVIDER_SESSION_TOKEN_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_PSSH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_RELEASE_CAN_PLAY_VALUE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_RENEWAL_SIGNATURE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_RENEWAL_SIGNING_KEY_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SERVICE_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SERVICE_PRIVATE_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SERVICE_PUBLIC_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SESSION_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SESSION_USAGE_SIGNATURE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SESSION_USAGE_TABLE_ENTRY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SIGNATURE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SIGNED_DEVICE_SECURITY_PROFILES - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SIGNING_KEY_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SRM_LOCATION - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SRM_SIGNATURE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_SRM_SIZE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
INVALID_WIDEVINE_PSSH_DATA - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
isChromeCDM() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the boolean setting if the CDM on the device requesting the license is a ChromeCDM.
+
+
isExternalLicenseRequest() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
 
+
isRevokedDeviceAllowed(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Returns true if the system ID is allowed to receive a license, even if revoked.
+
+
isRevokedDeviceAllowed(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Returns true if the system ID is allowed to receive a license, even if revoked.
+
+
+ + + +

K

+
+
KEYBOX_DECRYPT_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
KEYBOX_TOKEN_KEYS_NOT_INITIALIZED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
KEYCONTROL_GENERATION_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

L

+
+
LICENSE_LOAD - com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
 
+
LICENSE_REQUEST - com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
 
+
LICENSE_REQUEST_PARSE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
LICENSE_START - com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
 
+
LICENSE_TYPE_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
 
+
+ + + +

M

+
+
MISSING_CLIENT_CERT - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_CLIENT_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_CONTENT_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_ENCRYPTION_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_EVEN_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_EVEN_KEY_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_GROUP_MASTER_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_GROUP_MASTER_KEY_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_INIT_DATA - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_LICENSE_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_PRE_PROV_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_PROVIDER - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_PROVIDER_IV - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_PROVIDER_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_REMOTE_ATTESTATION_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_RENEWAL_SIGNING_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_RSA_PUBLIC_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MISSING_SIGNING_KEY - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
MODEL_STATUS_REJECTED - com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
MODEL_STATUS_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
MODEL_STATUS_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
MODEL_STATUS_UNVERIFIED - com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
MODEL_STATUS_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
 
+
MULTI_CONTENT_LICENSE - com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory.LicenseCategory
+
 
+
MULTIPLE_CLIENT_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

N

+
+
NEW - com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
 
+
NOT_FOUND - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

O

+
+
OEM_CONTENT - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
OEM_ENTITLEMENT - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
OFFLINE - com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
 
+
ok() - Method in enum com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
 
+
ok() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
+
Returns the boolean status indicating whether the device can meet the specified + security requirements.
+
+
OK - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
OPERATOR_SESSION - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
OTA_ANDROID_ATTESTATION_KEYBOX - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_DRM_DEVICE_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_DRM_DEVICE_CERTIFICATE_DRM_REPROVISIONING - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_KEYBOX - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_OEM_DEVICE_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_OEM_DEVICE_CERTIFICATE_PROVISIONING_4 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_OEM_DEVICE_CERTIFICATE_SIGMA_210 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
OTA_OEM_GROUP_CERTIFICATE - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
+ + + +

P

+
+
PERMISSION_DENIED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
PLATFORM_ANDROID - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_CHROME_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_CHROMECAST - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_FIRE_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_FUCHSIA - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_HARDWARE_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_IOS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_IPAD_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_KAIOS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_LINUX - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_MAC_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_NO_VERIFICATION - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_OTHER - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_PLAYSTATION - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_RDK - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_ROKU - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_SECURE_STORAGE_SOFTWARE_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_SOFTWARE_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_TAMPERED - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_TIZEN - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_TV_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_UNVERIFIED - com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
 
+
PLATFORM_WEB_OS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_WINDOWS - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PLATFORM_XBOX - com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
 
+
PRE_RELEASE - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
PRE_RELEASE_CERTIFICATE_NOT_ALLOWED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
PROTECTION_SCHEME_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
 
+
PROVIDER_ECM_VERIFIER_PUBLIC_KEY - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
PROVIDER_ID_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
PROVISIONING_1_0 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
 
+
PROVISIONING_2_0 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
 
+
PROVISIONING_3_0 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
 
+
PROVISIONING_4_0 - com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
 
+
PROVISIONING_METHOD_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
 
+
PROVISIONING_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
 
+
PUBLIC_KEY_AND_PRIVATE_KEY_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
+ + + +

R

+
+
RELEASE - com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
 
+
RELEASED - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
REMOTE_ATTESTATION_FAILED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
remoteAttestationCertSerialNumber() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Returns the serial number for the client's remote attestation certificate.
+
+
remoteAttestationVerified() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Get the remote attestation status.
+
+
RENEWAL - com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
 
+
RENEWAL_LICENSE_ID_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
RENEWAL_WITH_CONTENT_KEYS_NOT_ALLOWED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
REQUEST_TYPE_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
 
+
REVOKED - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
REVOKED_LICENSING - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
ROOT_CERTIFICATE_NOT_SET - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
RSA_2048 - com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType.CertificateKeyType
+
 
+
RSA_3072 - com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType.CertificateKeyType
+
 
+
+ + + +

S

+
+
SECURE_CLOCK - com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
 
+
SECURE_TIMER - com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
 
+
SECURITY_LEVEL_UNDEFINED - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
SERVICE_CERTIFICATE_NOT_FOUND - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SERVICE_CERTIFICATE_NOT_SET - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SERVICE_CERTIFICATE_REQUEST - com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
 
+
SERVICE_CERTIFICATE_REQUEST_MESSAGE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SERVICE_PRIVATE_KEY_DECRYPT_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SESSION_ID_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SESSION_STATE_PARSE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
setAllowDecrypt(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
setAllowEncrypt(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
setAllowPreReleaseSystemId(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Sets the allow pre-release system id option.
+
+
setAllowRecord(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
If set to true, it indicates digital video recording (DVR) is allowed.
+
+
setAllowRevokedDevice(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
+
+
Set whether to create a session for a revoked device.
+
+
setAllowRevokedIndividualDevice(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Sets the allowing individually revoked device.
+
+
setAllowRevokedSystemId(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Sets the allow revoked system id option.
+
+
setAllowSign(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
setAllowSignatureVerify(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
setAllowTamperedPlatform(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_TAMPERED.
+
+
setAllowTamperedPlatform(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_TAMPERED.
+
+
setAllowUnknownSystemId(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Sets the allow unknown system id option.
+
+
setAllowUnverifiedPlatform(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_UNVERIFIED.
+
+
setAllowUnverifiedPlatform(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Setting that allows licenses to be generated even if WvPLPlatformVerificationStatus is + PLATFORM_UNVERIFIED.
+
+
setAlwaysIncludeClientId(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether client identification is to be included in the following RENEWAL and/or RELEASE + license requests sent by the client.
+
+
setAuthenticateBitstreamConfigOption(WvPLAuthenticateBitstreamConfigOption) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
 
+
setAuthenticationKey(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
setAuthenticationKeyIv(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
setAutoSetProviderSessionToken(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
If set to 'true', the provider session token may be automatically set in the license.
+
+
setCanPersist(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether the license may be persisted to non-volatile storage.
+
+
setCanPlay(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether this content can be played back.
+
+
setCanRenew(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether the license can be renewed.
+
+
setCgms(WvPLCgms.Cgms) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Sets the CGMS-A analog output WvPLCgms
+
+
setContentOrGroupId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
setContentOrGroupId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
setContentOwner(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the content owner.
+
+
setCustomDeviceSecurityProfiles(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Sets the custom device security profile list.
+
+
setCustomDeviceSecurityProfiles(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets the custom device security profile list.
+
+
setDecencMitigation(WvPLDecencMitigation) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the DeCENC Mitigation option.
+
+
setDecencMitigationConfigOption(WvPLDecencMitigationConfigOption) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
setDecencMitigationOption(WvPLDecencMitigationOption.DecencMitigationOption) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
setDeviceCertificateStatusList(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Sets the device certificate status list.
+
+
setDeviceCertificateStatusList(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets the device certificate status list.
+
+
setDeviceSecurityLevel(WvPLDeviceSecurityLevel.DeviceSecurityLevel) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+ +
+
setDeviceStatus(WvPLDeviceStatus.DeviceStatus) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the device status, which is mapping of the same from the DeviceCertificateStatusList(DCSL)
+
+
setDeviceStatusOptions(WvPLDeviceStatusOptions) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the WvPLDeviceStatusOptions for this license.
+
+
setDevicesToHandleOEMCryptoVersionInKCB(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Specify a comma separated list of system Ids that can support having OEMCrypto version, as + specified in the license request, reflected back in the Key Control Block(KCB).
+
+
setDeviceType(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the type of device.
+
+
setDisableAnalogOutput(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
If set to true, analog output is disabled.
+
+
setDisableDigitalOutput(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
If set to true, digital output is disabled.
+
+
setDrmCertificateSerialNumber(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the 128-bit globally unique serial number of DRM device certificate.
+
+
setEncryptedProviderKeyConfig(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Sets an encrypted provider key config.
+
+
setEncryptedProviderKeyConfig(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets an encrypted provider key config.
+
+
setEncryptionScheme(WvPLEncryptionScheme.EncryptionScheme) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the encryption scheme from WvPLEncryptionScheme for data using this key.
+
+
setHdcp(WvPLHdcp.HDCP) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Sets a value from WvPLHdcp for a key that requires HDCP.
+
+
setHdcp(WvPLHdcp.HDCP) - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Sets a value from WvPLHdcp for the output protection, and in turn, the key + that will use this video constraint resolution.
+
+
setIndividualDeviceRevocationList(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Sets the individual device revocation list.
+
+
setIndividualDeviceRevocationList(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets the individual device revocation list.
+
+
setInitialRenewalDelayBase(WvPLTimerDelayBase.TimerDelayBase) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the initial renewal delay base.
+
+
setIsExternalLicenseRequest(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
 
+
setKeyboxSystemId(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
setKeyBytes(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the key to be used for encrypting and decrypting the content.
+
+
setKeyCategory(WvPLKeyCategory.KeyCategory) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
setKeyId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets an unique key identifier for this content key.
+
+
setKeyType(WvPLKeyType.KeyType) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Sets the key type from WvPLKeyType for this key.
+
+
setKeyType(WvPLKeyType.KeyType) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the key type from WvPLKeyType for this key.
+
+
setLicenseCategory(WvPLLicenseCategory.LicenseCategory) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
setLicenseCategorySpec(WvPLLicenseCategorySpec) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the WvPLLicenseCategorySpec for this license.
+
+
setLicenseCounter(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
setLicenseDurationSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Set the license window in seconds.
+
+
setLicenseId(WvPLLicenseIdentification) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Sets WvPLLicenseIdentificationwhich propagated from LicenseRequest to License, + incrementing version with each iteration
+
+
setLicenseStartTime(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the license start time for the session.
+
+
setLicenseType(WvPLLicenseType.LicenseType) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
+
Sets the type of the license from WvPLLicenseType, default value is Streaming.
+
+
setManufacturer(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the device make (manufacturer).
+
+
setMasterSigningKey(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the master signing key for the session.
+
+
setMasterSigningKey(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Deprecated. +
use setMasterSigningKey(byte[] masterSigningKeyBytes) instead
+
+
+
setMaxResolutionPixels(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Sets the maximum resolution in pixels.
+
+
setMinResolutionPixels(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Sets the minimum resolution in pixels.
+
+
setModel(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the device model.
+
+
setOperatorSessionKeyPermissions(WvPLOperatorSessionKeyPermissions) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the operator session key permissions.
+
+
setOutputProtection(WvPLOutputProtection) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Sets the WvPLOutputProtection for this content key.
+
+
setOutputProtection(WvPLOutputProtection) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the WvPLOutputProtection for this content key.
+
+
setOverrideDeviceRevocation(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets an override for device revocation.
+
+
setOverrideOemCryptoApiVersion(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets an override for the oem crypto api version.
+
+
setOverrideProviderClientToken(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets an override for the provider client token.
+
+
setPlatform(WvPLDevicePlatform.Platform) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the platform of the device.
+
+
setPlaybackDurationSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the viewing window in seconds.
+
+
setPolicy(WvPLPlaybackPolicy) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Sets the license policy.
+
+
setPolicy(WvPLPlaybackPolicy) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Sets the license policy.
+
+
setPreProvisioningKeys(Map<Integer, String>) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets the pre provisioning keys.
+
+
setProviderClientToken(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Sets the provider client token for the session in byte array.
+
+
setProviderClientToken(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the provider client token for the session.
+
+
setProviderKeyConfig(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Deprecated, use setEncryptedProviderKeyConfig() instead.
+
+
setProviderKeyConfig(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Deprecated, use setEncryptedProviderKeyConfig() instead.
+
+
setProviderSessionToken(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
setProviderSessionToken(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the provider session token for the session.
+
+
setProvisioningMethod(WvPLProvisioningMethod.ProvisioningMethod) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+ +
+
setPurchaseId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
setPurchaseId(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the purchase identifier for the session.
+
+
setRejectUnknownMakeModel(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
If set to false, SDK can reject licensing behaviors to unknown make model.
+
+
setRejectUnknownMakeModel(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
If set to false, SDK can reject licensing behaviors to unknown make model.
+
+
setRenewalIntervalSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the time in seconds after start at which license renewal is first attempted.
+
+
setRenewalRecoveryDurationSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the time in seconds for which playback continues after a license renewal attempt fails.
+
+
setRenewalRetryIntervalSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the delay in seconds between renewal attempts when license renewal fails.
+
+
setRenewalUrl(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the url location to which license renewal requests are to be sent.
+
+
setRenewWithUsage(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether the license is to be sent for renewal when usage is started.
+
+
setRentalDurationSeconds(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets the rental window in seconds.
+
+
setRequestedOutputProtection(WvPLOutputProtection) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Sets the requested output protection for this content key.
+
+
setRequestedOutputProtection(WvPLOutputProtection) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the requested output protection for this content key.
+
+
setRequestId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
setRequestModelInfo(WvPLDeviceModelInfo) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
 
+
setRequiredOutputProtection(WvPLOutputProtection) - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
 
+
setRequiredProfile(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the required device security profile for this key.
+
+
setSecuredataPath(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Sets the secure data path on the device.
+
+
setSecureDataPathHwDecodeEnabled(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the secure data path for any non-audio key that uses HW_SECURE_DECODE Key Policy.
+
+
setSecurityLevel(WvPLSecurityLevel.SecurityLevel) - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Sets the security level robustness as defined by Widevine.
+
+
setServiceCertificate(byte[], byte[], byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
+
Sets a service certificate.
+
+
setServiceCertificate(byte[], byte[], byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Sets the service certificate.
+
+
setServiceId(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the service identifier (web origin) for the provider which owns the certificate.
+
+
setSessionId(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
setSessionId(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Sets the identifier for the session.
+
+
setSessionInit(WvPLSessionInit) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Sets the license session init.
+
+
setSessionInit(WvPLSessionInit) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Sets the license session init.
+
+
setSigningKey(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
+
Sets the signing key for the session in byte array.Signing keys has to be 64 bytes in length.
+
+
setSoc(String) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the soc (system-on-chip) for the device.
+
+
setSoftEnforcePlaybackDuration(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether playback will continue to end of the content being played back, even if playback + duration has expired.
+
+
setSoftEnforceRentalDuration(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Sets whether playback will continue to end of the content being played back, even if rental + duration has expired.
+
+
setStatus(WvPLCapabilityStatus.DeviceCapabilityStatus) - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
+
Set the WvPLCapabilityStatus.DeviceCapabilityStatus status indicating whether the device satisifes the + security requirements.
+
+
setSystemId(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets the systemId for the device.
+
+
setTestDevice(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Sets a boolean 'true' to mark the device as a test device (default = false)
+
+
setTestOnlySystemId(boolean) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Sets the allow test_only system id option.
+
+
setTrackType(WvPLTrackType.TrackType) - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
+
Sets the track type from WvPLTrackType for this key.
+
+
setTrackType(WvPLTrackType.TrackType) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the track type from WvPLTrackType for this key.
+
+
setVerificationLevel(WvPLVerificationLevel.VerificationLevel) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+ +
+
setVersion(long) - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
setVulnerabilityLevel(WvPLVulnerabilityLevel.VulnerabilityLevel) - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+ +
+
setWrappingKey(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Sets the wrapping key to be used for encrypting 'keyBytes'.
+
+
SIGNATURE_VERIFICATION_FAILED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SIGNED_MESSAGE_PARSE_ERROR - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SIGNER_PROVIDER_ID_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SIGNING_KEY_EXPIRED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
SINGLE_CONTENT_KEY_DEFAULT - com.google.video.widevine.sdk.wvpl.WvPLKeyCategory.KeyCategory
+
 
+
SINGLE_CONTENT_LICENSE_DEFAULT - com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory.LicenseCategory
+
 
+
STATUS_IN_TESTING - com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
STATUS_RELEASED - com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
STATUS_REVOKED - com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
STATUS_TEST_ONLY - com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
STATUS_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
 
+
STREAMING - com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
 
+
SW_SECURE_CRYPTO - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
SW_SECURE_DECODE - com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
 
+
+ + + +

T

+
+
TEST_ONLY - com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
 
+
TIMER_DELAY_BASE_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
 
+
TOKEN_HASH_MISMATCH - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBrowserRequirement
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLClientCapabilities
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDcslInfo
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelInfo
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityProfile
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceState
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLDrmInfo
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLEntitledKey
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSecurityRequirement
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSessionUsage
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLStatus
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
 
+
toString() - Method in class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
 
+
TRACK_TYPE_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
+ + + +

U

+
+
UNABLE_TO_SERIALIZE_SESSION_STATE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNABLE_TO_SERIALIZE_SIGNED_MESSAGE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNAVAILABLE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNIMPLEMENTED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
 
+
UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNKNOWN_INIT_DATA_TYPE - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNKNOWN_KEY - com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
 
+
UNKNOWN_MAKE_MODEL - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNSUPPORTED_PSSH_VERSION - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
UNSUPPORTED_SYSTEM_ID - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
updateWithCertificates(byte[]) - Method in class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+ +
+
+ + + +

V

+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType.CertificateKeyType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme.EncryptionScheme
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLKeyCategory.KeyCategory
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory.LicenseCategory
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
+
Returns the enum constant of this type with the specified name.
+
+
valueOf(String) - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
+
Returns the enum constant of this type with the specified name.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities.AnalogOutputCapabilities
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus.DeviceCapabilityStatus
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType.CertificateKeyType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLCgms.Cgms
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel.ClockSecurityLevel
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationOption.DecencMitigationOption
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus.DeviceModelStatus
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform.Platform
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel.DeviceSecurityLevel
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceState.DeviceState
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus.DeviceStatus
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLEncryptionScheme.EncryptionScheme
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLHdcp.HDCP
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLKeyCategory.KeyCategory
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLKeyType.KeyType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseCategory.LicenseCategory
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType.LicenseRequestType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLLicenseType.LicenseType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLMessageType.MessageType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus.PlatformVerificationStatus
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProtectionScheme.ProtectionScheme
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod.ProvisioningMethod
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion.ProvisioningVersion
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel.SecurityLevel
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase.TimerDelayBase
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
values() - Static method in enum com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
+
Returns an array containing the constants of this enum type, in +the order they are declared.
+
+
VERIFICATION_LEVEL_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
 
+
VERIFICATION_LEVEL_UNVERIFIED - com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
 
+
VERIFICATION_LEVEL_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
 
+
VERIFICATION_LEVEL_VERIFIED_GTS - com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel.VerificationLevel
+
 
+
verifyPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
+
Verifies the platform.
+
+
verifyPlatform() - Method in class com.google.video.widevine.sdk.wvpl.WvPLSession
+
+
Verifies the platform.
+
+
VF_EXCLUDED - com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
 
+
VF_INCLUDED - com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
 
+
VF_ONLY - com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
 
+
VF_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLVideoFeatureKeySet.VideoFeatureKeySet
+
 
+
VIDEO_HD - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
VIDEO_SD - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
VIDEO_UHD1 - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
VIDEO_UHD2 - com.google.video.widevine.sdk.wvpl.WvPLTrackType.TrackType
+
 
+
VMP_ERROR_PLATFORM_NOT_VERIFIED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
VMP_ERROR_PLATFORM_TAMPERED - com.google.video.widevine.sdk.wvpl.WvPLStatus.StatusCode
+
 
+
VULNERABILITY_LEVEL_CRITICAL - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
VULNERABILITY_LEVEL_HIGH - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
VULNERABILITY_LEVEL_LOW - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
VULNERABILITY_LEVEL_MEDIUM - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
VULNERABILITY_LEVEL_NONE - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
VULNERABILITY_LEVEL_UNSPECIFIED - com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel.VulnerabilityLevel
+
 
+
+ + + +

W

+
+
WATERMARKING_ALWAYS_ON - com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
 
+
WATERMARKING_CONFIGURABLE - com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
 
+
WATERMARKING_NOT_SUPPORTED - com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
 
+
WATERMARKING_SUPPORT_UNKNOWN - com.google.video.widevine.sdk.wvpl.WvPLWatermarkingSupport.WatermarkingSupport
+
 
+
WvPLAnalogOutputCapabilities - Class in com.google.video.widevine.sdk.wvpl
+
+
AnalogOutputCapabilities enums wrapping class.
+
+
WvPLAnalogOutputCapabilities(WvPLAnalogOutputCapabilities.AnalogOutputCapabilities) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLAnalogOutputCapabilities
+
+
Constructor for the enum wrapping class.
+
+
WvPLAnalogOutputCapabilities.AnalogOutputCapabilities - Enum in com.google.video.widevine.sdk.wvpl
+
+
AnalogOutputCapabilities enums values.
+
+
WvPLAuthenticateBitstreamConfigOption - Class in com.google.video.widevine.sdk.wvpl
+
+
Configuration option of Authenticate Bitstream method for DeCENC mitigation.
+
+
WvPLAuthenticateBitstreamConfigOption() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLAuthenticateBitstreamConfigOption
+
+
Constructs a new WvPLAuthenticateBitstreamConfigOption,
+
+
WvPLBaseEnvironment<T> - Class in com.google.video.widevine.sdk.wvpl
+
+
Abstract base class for all WvPL Environment APIs.
+
+
WvPLBaseEnvironment() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment
+
 
+
WvPLBaseKey - Class in com.google.video.widevine.sdk.wvpl
+
+
Abstract base class for WvPL Keys.
+
+
WvPLBaseKey() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLBaseKey
+
 
+
WvPLBaseSession<T extends WvPLBaseKey> - Class in com.google.video.widevine.sdk.wvpl
+
+
Abstract base class for WvPL sessions with generic WvPLKey type T.
+
+
WvPLBaseSession() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLBaseSession
+
 
+
WvPLBrowserRequirement - Class in com.google.video.widevine.sdk.wvpl
+
+
Models BrowserRequirement
+
+
WvPLCapabilityStatus - Class in com.google.video.widevine.sdk.wvpl
+
+
Actual vs.
+
+
WvPLCapabilityStatus(WvPLCapabilityStatus.DeviceCapabilityStatus) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLCapabilityStatus
+
 
+
WvPLCapabilityStatus.DeviceCapabilityStatus - Enum in com.google.video.widevine.sdk.wvpl
+
+
DeviceCapability enum values.
+
+
WvPLCertificateKeyType - Class in com.google.video.widevine.sdk.wvpl
+
+
CertificateKeyType enums wrapping class.
+
+
WvPLCertificateKeyType(WvPLCertificateKeyType.CertificateKeyType) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLCertificateKeyType
+
+
Constructor for the enum wrapping class.
+
+
WvPLCertificateKeyType.CertificateKeyType - Enum in com.google.video.widevine.sdk.wvpl
+
+
CertificateKeyType enums values.
+
+
WvPLCgms - Class in com.google.video.widevine.sdk.wvpl
+
+
Class that wraps the analog copy protection enums.
+
+
WvPLCgms(WvPLCgms.Cgms) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLCgms
+
+
Constructor for the enum wrapping class.
+
+
WvPLCgms.Cgms - Enum in com.google.video.widevine.sdk.wvpl
+
+
Analog Copy protection enums definition
+
+
WvPLClientCapabilities - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents the client capabilities in the license request sent from the Proxy SDK or WvPL License + Server SDK.
+
+
WvPLClientInfo - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents the client identification in the license request sent from the Widevine CDM.
+
+
WvPLClockSecurityLevel - Class in com.google.video.widevine.sdk.wvpl
+
+
ClockSecurityLevel enum wrapper.
+
+
WvPLClockSecurityLevel(WvPLClockSecurityLevel.ClockSecurityLevel) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLClockSecurityLevel
+
+
Constructor for the enum wrapping class.
+
+
WvPLClockSecurityLevel.ClockSecurityLevel - Enum in com.google.video.widevine.sdk.wvpl
+
+
Clock security level enums definition.
+
+
WvPLDcslInfo - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPL DcslInfo class that models the DCSL information.
+
+
WvPLDcslInfo() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDcslInfo
+
 
+
WvPLDecencMitigation - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents the DeCENC mitigation options that can be specified by the content provider.
+
+
WvPLDecencMitigation() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigation
+
+
Constructs a new WvPLDecencMitigationOption.
+
+
WvPLDecencMitigationConfigOption - Class in com.google.video.widevine.sdk.wvpl
+
+
Configuration option of Decenc Mitigation.
+
+
WvPLDecencMitigationConfigOption() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDecencMitigationConfigOption
+
+
Constructs a new WvPLDecencMitigationConfigOption,
+
+
WvPLDecencMitigationOption - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps DecencMitigationOption enumeration.
+
+
WvPLDecencMitigationOption.DecencMitigationOption - Enum in com.google.video.widevine.sdk.wvpl
+
+
DecencMitigationOption enumeration.
+
+
WvPLDeviceInfo - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents the device info in the License SDK for the device requesting the license.
+
+
WvPLDeviceInfo() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceInfo
+
+
Constructs a new WvPLDeviceInfo
+
+
WvPLDeviceModelInfo - Class in com.google.video.widevine.sdk.wvpl
+
+
Device model information for the device making a license request.
+
+
WvPLDeviceModelStatus - Class in com.google.video.widevine.sdk.wvpl
+
+
DeviceModelStatus enum wrapping class.
+
+
WvPLDeviceModelStatus(WvPLDeviceModelStatus.DeviceModelStatus) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceModelStatus
+
+
Constructor for the enum wrapping class.
+
+
WvPLDeviceModelStatus.DeviceModelStatus - Enum in com.google.video.widevine.sdk.wvpl
+
+
DeviceModelStatus enum values.
+
+
WvPLDevicePlatform - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLDevicePlatform class definition.
+
+
WvPLDevicePlatform(WvPLDevicePlatform.Platform) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDevicePlatform
+
+
Constructor for the enum wrapping class.
+
+
WvPLDevicePlatform.Platform - Enum in com.google.video.widevine.sdk.wvpl
+
+
Device Security level enums definition.
+
+
WvPLDeviceSecurityLevel - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLDeviceSecurityLevel class definition.
+
+
WvPLDeviceSecurityLevel(WvPLDeviceSecurityLevel.DeviceSecurityLevel) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceSecurityLevel
+
+
Constructor for the enum wrapping class.
+
+
WvPLDeviceSecurityLevel.DeviceSecurityLevel - Enum in com.google.video.widevine.sdk.wvpl
+
+
Device Security level enums definition.
+
+
WvPLDeviceSecurityProfile - Class in com.google.video.widevine.sdk.wvpl
+
+
Models DeviceSecurityProfile
+
+
WvPLDeviceState - Class in com.google.video.widevine.sdk.wvpl
+
+
Class shows Device status such as RELEASED or REVOKED.
+
+
WvPLDeviceState(WvPLDeviceState.DeviceState) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceState
+
+
Constructor for the enum wrapping class.
+
+
WvPLDeviceState.DeviceState - Enum in com.google.video.widevine.sdk.wvpl
+
+
Device status such as RELEASED or REVOKED
+
+
WvPLDeviceStatus - Class in com.google.video.widevine.sdk.wvpl
+
+
DeviceStatus enums wrapping class.
+
+
WvPLDeviceStatus(WvPLDeviceStatus.DeviceStatus) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatus
+
+
Constructor for the enum wrapping class.
+
+
WvPLDeviceStatus.DeviceStatus - Enum in com.google.video.widevine.sdk.wvpl
+
+
DeviceStatus enum values.
+
+
WvPLDeviceStatusOptions - Class in com.google.video.widevine.sdk.wvpl
+
+
DeviceStatusOptions represents the options for the device based on it's system_id status of the + device.
+
+
WvPLDeviceStatusOptions() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLDeviceStatusOptions
+
+
Constructor
+
+
WvPLDrmInfo - Class in com.google.video.widevine.sdk.wvpl
+
+
Provides DrmInfo for the associated WvPLSession and WvPLProxySession.
+
+
WvPLEncryptionScheme - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps EncryptionScheme enumeration
+
+
WvPLEncryptionScheme.EncryptionScheme - Enum in com.google.video.widevine.sdk.wvpl
+
+
EncryptionScheme enumerations available per WvPLKey
+
+
WvPLEntitledKey - Class in com.google.video.widevine.sdk.wvpl
+
+
Models a Widevine entitled key for licensing.
+
+
WvPLEnvironment - Class in com.google.video.widevine.sdk.wvpl
+
+
Generate a Widevine environment object.
+
+
WvPLEnvironment(Map<String, String>) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLEnvironment
+
+
Constructs WvPLEnviroment.
+
+
WvPLHdcp - Class in com.google.video.widevine.sdk.wvpl
+
+
HDCP enums wrapping class.
+
+
WvPLHdcp(WvPLHdcp.HDCP) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLHdcp
+
+
Constructor for the enum wrapping class.
+
+
WvPLHdcp.HDCP - Enum in com.google.video.widevine.sdk.wvpl
+
+
HDCP enum values.
+
+
WvPLKey - Class in com.google.video.widevine.sdk.wvpl
+
+
A sub class which inherits from WvPLBaseKey.
+
+
WvPLKey() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLKey
+
+
Creates a new WvPLKey.
+
+
WvPLKeyCategory - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps WvPLKeyCategory enumeration.
+
+
WvPLKeyCategory.KeyCategory - Enum in com.google.video.widevine.sdk.wvpl
+
+
WvPLKeyCategory enumeration definitions
+
+
WvPLKeyCategorySpec - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLKeyCategory class represents the key category for a WvPLKey.
+
+
WvPLKeyCategorySpec() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLKeyCategorySpec
+
+
Constructs a new WvPLKeyCategorySpec,
+
+
WvPLKeyType - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps KeyType enumeration.
+
+
WvPLKeyType() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLKeyType
+
 
+
WvPLKeyType.KeyType - Enum in com.google.video.widevine.sdk.wvpl
+
+
KeyType enumeration definitions
+
+
WvPLLicenseCategory - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps WvPLLicenseCategory enumeration.
+
+
WvPLLicenseCategory.LicenseCategory - Enum in com.google.video.widevine.sdk.wvpl
+
+
WvPLLicenseCategory enumeration definitions
+
+
WvPLLicenseCategorySpec - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLLicenseCategory class represents the License category for a WvPLLicense.
+
+
WvPLLicenseCategorySpec() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLLicenseCategorySpec
+
+
Constructs a new WvPLLicenseCategorySpec,
+
+
WvPLLicenseIdentification - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents licenseIdentification over its lifetime with an updated version.
+
+
WvPLLicenseIdentification() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLLicenseIdentification
+
+
Constructs a new WvPLLicenseIdentification
+
+
WvPLLicenseRequestType - Class in com.google.video.widevine.sdk.wvpl
+
+
LicenseRequestType enums wrapping class.
+
+
WvPLLicenseRequestType(WvPLLicenseRequestType.LicenseRequestType) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLLicenseRequestType
+
+
Constructor for the enum wrapping class.
+
+
WvPLLicenseRequestType.LicenseRequestType - Enum in com.google.video.widevine.sdk.wvpl
+
+
LicenseType enum values.
+
+
WvPLLicenseType - Class in com.google.video.widevine.sdk.wvpl
+
+
LicenseType enums wrapping class.
+
+
WvPLLicenseType(WvPLLicenseType.LicenseType) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLLicenseType
+
+
Constructor for the enum wrapping class.
+
+
WvPLLicenseType.LicenseType - Enum in com.google.video.widevine.sdk.wvpl
+
+
LicenseType enum values.
+
+
WvPLMessageType - Class in com.google.video.widevine.sdk.wvpl
+
+
MessageType enums wrapping class.
+
+
WvPLMessageType(WvPLMessageType.MessageType) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLMessageType
+
+
Constructor for the enum wrapping class.
+
+
WvPLMessageType.MessageType - Enum in com.google.video.widevine.sdk.wvpl
+
+
The MessageType enums.
+
+
WvPLOperatorSessionKeyPermissions - Class in com.google.video.widevine.sdk.wvpl
+
+
Operator Session Key Permissions
+
+
WvPLOperatorSessionKeyPermissions() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLOperatorSessionKeyPermissions
+
 
+
WvPLOutputProtection - Class in com.google.video.widevine.sdk.wvpl
+
+
Specifies output protection for the content.
+
+
WvPLOutputProtection() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLOutputProtection
+
+
Constructs a new WvPLOutputProtection,
+
+
WvPLPlatformVerificationStatus - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps PlatformVerificationStatus enumeration
+
+
WvPLPlatformVerificationStatus(WvPLPlatformVerificationStatus.PlatformVerificationStatus) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLPlatformVerificationStatus
+
+
Constructor for the enum wrapping class.
+
+
WvPLPlatformVerificationStatus.PlatformVerificationStatus - Enum in com.google.video.widevine.sdk.wvpl
+
+
PlatformVerificationStatus enumeration definitions
+
+
WvPLPlaybackPolicy - Class in com.google.video.widevine.sdk.wvpl
+
+
Represents the playback attributes for the acquired license and all the keys.
+
+
WvPLPlaybackPolicy() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLPlaybackPolicy
+
+
Constructs a new WvPLPlaybackPolicy.
+
+
WvPLProtectionScheme - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps ProtectionScheme enumeration
+
+
WvPLProtectionScheme.ProtectionScheme - Enum in com.google.video.widevine.sdk.wvpl
+
+
ProtectionScheme enumerations available via WvPLWidevinePsshData
+
+
WvPLProvisioningMethod - Class in com.google.video.widevine.sdk.wvpl
+
+
ProvisioningMethod enum wrapper.
+
+
WvPLProvisioningMethod(WvPLProvisioningMethod.ProvisioningMethod) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLProvisioningMethod
+
+
Constructor for the enum wrapping class.
+
+
WvPLProvisioningMethod.ProvisioningMethod - Enum in com.google.video.widevine.sdk.wvpl
+
+
Provisioning method enums definition.
+
+
WvPLProvisioningVersion - Class in com.google.video.widevine.sdk.wvpl
+
+
ProvisioningVersion enums wrapping class.
+
+
WvPLProvisioningVersion(WvPLProvisioningVersion.ProvisioningVersion) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLProvisioningVersion
+
+
Constructor for the enum wrapping class.
+
+
WvPLProvisioningVersion.ProvisioningVersion - Enum in com.google.video.widevine.sdk.wvpl
+
+
ProvisioningVersion enums values.
+
+
WvPLRequestType - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLRequestType enums wrapping class.
+
+
WvPLRequestType() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
+
Constructor.
+
+
WvPLRequestType(WvPLMessageType.MessageType, WvPLLicenseRequestType.LicenseRequestType, WvPLLicenseType.LicenseType) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLRequestType
+
+
Constructor that is to be called from the JNI for CENC license requests and from Java for Moho + license requests
+
+
WvPLSecurityLevel - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLSecurityLevel class definition.
+
+
WvPLSecurityLevel() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLSecurityLevel
+
 
+
WvPLSecurityLevel.SecurityLevel - Enum in com.google.video.widevine.sdk.wvpl
+
+
Security level enums definition.
+
+
WvPLSecurityRequirement - Class in com.google.video.widevine.sdk.wvpl
+
+
Security requirement for the Widevine Security Profile.
+
+
WvPLSession - Class in com.google.video.widevine.sdk.wvpl
+
+
Once a WvPLEnvironment object is successfully initialized, generate a Widevine session object for + each license request.
+
+
WvPLSessionCreateOptions - Class in com.google.video.widevine.sdk.wvpl
+
+
Options class to provide settings that would be used when creating a WvPLSession.
+
+
WvPLSessionCreateOptions() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLSessionCreateOptions
+
 
+
WvPLSessionInit - Class in com.google.video.widevine.sdk.wvpl
+
+
Specifies session initialization params for WvPLSession.
+
+
WvPLSessionInit() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLSessionInit
+
+
Constructor that does not set the WvPLSessionInit fields.
+
+
WvPLSessionState - Class in com.google.video.widevine.sdk.wvpl
+
+
Specifies session cache params for WvPLSession.
+
+
WvPLSessionState() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLSessionState
+
 
+
WvPLSessionUsage - Class in com.google.video.widevine.sdk.wvpl
+
+
Session usage information
+
+
WvPLStatus - Class in com.google.video.widevine.sdk.wvpl
+
+
Models the status codes in protos/public/errors.proto.
+
+
WvPLStatus(WvPLStatus.StatusCode, String) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLStatus
+
 
+
WvPLStatus.StatusCode - Enum in com.google.video.widevine.sdk.wvpl
+
+
StatusCode for WvPLStatus.
+
+
WvPLStatusException - Exception in com.google.video.widevine.sdk.wvpl
+
+
Exception thrown when WvPLStatus is not OK.
+
+
WvPLStatusException(WvPLStatus) - Constructor for exception com.google.video.widevine.sdk.wvpl.WvPLStatusException
+
+
Constructs exception with status information.
+
+
WvPLTimerDelayBase - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLTimerDelayBase class definition.
+
+
WvPLTimerDelayBase(WvPLTimerDelayBase.TimerDelayBase) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLTimerDelayBase
+
+
Constructor for the enum wrapping class.
+
+
WvPLTimerDelayBase.TimerDelayBase - Enum in com.google.video.widevine.sdk.wvpl
+
+
TimerDelayBase enums definition.
+
+
WvPLTrackType - Class in com.google.video.widevine.sdk.wvpl
+
+
Wraps TrackType enumeration
+
+
WvPLTrackType() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLTrackType
+
 
+
WvPLTrackType.TrackType - Enum in com.google.video.widevine.sdk.wvpl
+
+
TrackType enumeration definitions
+
+
WvPLVerificationLevel - Class in com.google.video.widevine.sdk.wvpl
+
+
VerificationLevel enum wrapper.
+
+
WvPLVerificationLevel(WvPLVerificationLevel.VerificationLevel) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLVerificationLevel
+
+
Constructor for the enum wrapping class.
+
+
WvPLVerificationLevel.VerificationLevel - Enum in com.google.video.widevine.sdk.wvpl
+
+
Verification level enums definition.
+
+
WvPLVideoFeatureKeySet - Class in com.google.video.widevine.sdk.wvpl
+
+
Class that wraps the video feature key set enums WvPLVideoFeatureKeySet.
+
+
WvPLVideoFeatureKeySet.VideoFeatureKeySet - Enum in com.google.video.widevine.sdk.wvpl
+
+
Video feature key set enums definition
+
+
WvPLVideoResolutionConstraint - Class in com.google.video.widevine.sdk.wvpl
+
+
Specifies the video resolution constraints for content.
+
+
WvPLVideoResolutionConstraint() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLVideoResolutionConstraint
+
+
Constructs a new WvPLVideoResolutionConstraint.
+
+
WvPLVulnerabilityLevel - Class in com.google.video.widevine.sdk.wvpl
+
+
VulnerabilityLevel enum wrapper.
+
+
WvPLVulnerabilityLevel(WvPLVulnerabilityLevel.VulnerabilityLevel) - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLVulnerabilityLevel
+
+
Constructor for the enum wrapping class.
+
+
WvPLVulnerabilityLevel.VulnerabilityLevel - Enum in com.google.video.widevine.sdk.wvpl
+
+
Vulnerability level enums definition.
+
+
WvPLWatermarkingSupport - Class in com.google.video.widevine.sdk.wvpl
+
+
WvPLWatermarkingSupport class definition.
+
+
WvPLWatermarkingSupport.WatermarkingSupport - Enum in com.google.video.widevine.sdk.wvpl
+
+
Watermarking support enums definition.
+
+
WvPLWidevinePsshData - Class in com.google.video.widevine.sdk.wvpl
+
+
Defines the 'pssh' box for Common Encryption (CENC).
+
+
WvPLWidevinePsshData() - Constructor for class com.google.video.widevine.sdk.wvpl.WvPLWidevinePsshData
+
+
Constructor.
+
+
+A C D E F G H I K L M N O P R S T U V W 
All Classes All Packages
+
+
+ +
+ + diff --git a/centos/javadoc/index.html b/centos/javadoc/index.html new file mode 100644 index 0000000..2da185d --- /dev/null +++ b/centos/javadoc/index.html @@ -0,0 +1,23 @@ + + + + + +Generated Documentation (Untitled) + + + + + + + +
+ +

com/google/video/widevine/sdk/wvpl/package-summary.html

+
+ + diff --git a/centos/javadoc/jquery/external/jquery/jquery.js b/centos/javadoc/jquery/external/jquery/jquery.js new file mode 100644 index 0000000..5093733 --- /dev/null +++ b/centos/javadoc/jquery/external/jquery/jquery.js @@ -0,0 +1,10872 @@ +/*! + * jQuery JavaScript Library v3.5.1 + * https://jquery.com/ + * + * Includes Sizzle.js + * https://sizzlejs.com/ + * + * Copyright JS Foundation and other contributors + * Released under the MIT license + * https://jquery.org/license + * + * Date: 2020-05-04T22:49Z + */ +( function( global, factory ) { + + "use strict"; + + if ( typeof module === "object" && typeof module.exports === "object" ) { + + // For CommonJS and CommonJS-like environments where a proper `window` + // is present, execute the factory and get jQuery. + // For environments that do not have a `window` with a `document` + // (such as Node.js), expose a factory as module.exports. + // This accentuates the need for the creation of a real `window`. + // e.g. var jQuery = require("jquery")(window); + // See ticket #14549 for more info. + module.exports = global.document ? + factory( global, true ) : + function( w ) { + if ( !w.document ) { + throw new Error( "jQuery requires a window with a document" ); + } + return factory( w ); + }; + } else { + factory( global ); + } + +// Pass this if window is not defined yet +} )( typeof window !== "undefined" ? window : this, function( window, noGlobal ) { + +// Edge <= 12 - 13+, Firefox <=18 - 45+, IE 10 - 11, Safari 5.1 - 9+, iOS 6 - 9.1 +// throw exceptions when non-strict code (e.g., ASP.NET 4.5) accesses strict mode +// arguments.callee.caller (trac-13335). But as of jQuery 3.0 (2016), strict mode should be common +// enough that all such attempts are guarded in a try block. +"use strict"; + +var arr = []; + +var getProto = Object.getPrototypeOf; + +var slice = arr.slice; + +var flat = arr.flat ? function( array ) { + return arr.flat.call( array ); +} : function( array ) { + return arr.concat.apply( [], array ); +}; + + +var push = arr.push; + +var indexOf = arr.indexOf; + +var class2type = {}; + +var toString = class2type.toString; + +var hasOwn = class2type.hasOwnProperty; + +var fnToString = hasOwn.toString; + +var ObjectFunctionString = fnToString.call( Object ); + +var support = {}; + +var isFunction = function isFunction( obj ) { + + // Support: Chrome <=57, Firefox <=52 + // In some browsers, typeof returns "function" for HTML elements + // (i.e., `typeof document.createElement( "object" ) === "function"`). + // We don't want to classify *any* DOM node as a function. + return typeof obj === "function" && typeof obj.nodeType !== "number"; + }; + + +var isWindow = function isWindow( obj ) { + return obj != null && obj === obj.window; + }; + + +var document = window.document; + + + + var preservedScriptAttributes = { + type: true, + src: true, + nonce: true, + noModule: true + }; + + function DOMEval( code, node, doc ) { + doc = doc || document; + + var i, val, + script = doc.createElement( "script" ); + + script.text = code; + if ( node ) { + for ( i in preservedScriptAttributes ) { + + // Support: Firefox 64+, Edge 18+ + // Some browsers don't support the "nonce" property on scripts. + // On the other hand, just using `getAttribute` is not enough as + // the `nonce` attribute is reset to an empty string whenever it + // becomes browsing-context connected. + // See https://github.com/whatwg/html/issues/2369 + // See https://html.spec.whatwg.org/#nonce-attributes + // The `node.getAttribute` check was added for the sake of + // `jQuery.globalEval` so that it can fake a nonce-containing node + // via an object. + val = node[ i ] || node.getAttribute && node.getAttribute( i ); + if ( val ) { + script.setAttribute( i, val ); + } + } + } + doc.head.appendChild( script ).parentNode.removeChild( script ); + } + + +function toType( obj ) { + if ( obj == null ) { + return obj + ""; + } + + // Support: Android <=2.3 only (functionish RegExp) + return typeof obj === "object" || typeof obj === "function" ? + class2type[ toString.call( obj ) ] || "object" : + typeof obj; +} +/* global Symbol */ +// Defining this global in .eslintrc.json would create a danger of using the global +// unguarded in another place, it seems safer to define global only for this module + + + +var + version = "3.5.1", + + // Define a local copy of jQuery + jQuery = function( selector, context ) { + + // The jQuery object is actually just the init constructor 'enhanced' + // Need init if jQuery is called (just allow error to be thrown if not included) + return new jQuery.fn.init( selector, context ); + }; + +jQuery.fn = jQuery.prototype = { + + // The current version of jQuery being used + jquery: version, + + constructor: jQuery, + + // The default length of a jQuery object is 0 + length: 0, + + toArray: function() { + return slice.call( this ); + }, + + // Get the Nth element in the matched element set OR + // Get the whole matched element set as a clean array + get: function( num ) { + + // Return all the elements in a clean array + if ( num == null ) { + return slice.call( this ); + } + + // Return just the one element from the set + return num < 0 ? this[ num + this.length ] : this[ num ]; + }, + + // Take an array of elements and push it onto the stack + // (returning the new matched element set) + pushStack: function( elems ) { + + // Build a new jQuery matched element set + var ret = jQuery.merge( this.constructor(), elems ); + + // Add the old object onto the stack (as a reference) + ret.prevObject = this; + + // Return the newly-formed element set + return ret; + }, + + // Execute a callback for every element in the matched set. + each: function( callback ) { + return jQuery.each( this, callback ); + }, + + map: function( callback ) { + return this.pushStack( jQuery.map( this, function( elem, i ) { + return callback.call( elem, i, elem ); + } ) ); + }, + + slice: function() { + return this.pushStack( slice.apply( this, arguments ) ); + }, + + first: function() { + return this.eq( 0 ); + }, + + last: function() { + return this.eq( -1 ); + }, + + even: function() { + return this.pushStack( jQuery.grep( this, function( _elem, i ) { + return ( i + 1 ) % 2; + } ) ); + }, + + odd: function() { + return this.pushStack( jQuery.grep( this, function( _elem, i ) { + return i % 2; + } ) ); + }, + + eq: function( i ) { + var len = this.length, + j = +i + ( i < 0 ? len : 0 ); + return this.pushStack( j >= 0 && j < len ? [ this[ j ] ] : [] ); + }, + + end: function() { + return this.prevObject || this.constructor(); + }, + + // For internal use only. + // Behaves like an Array's method, not like a jQuery method. + push: push, + sort: arr.sort, + splice: arr.splice +}; + +jQuery.extend = jQuery.fn.extend = function() { + var options, name, src, copy, copyIsArray, clone, + target = arguments[ 0 ] || {}, + i = 1, + length = arguments.length, + deep = false; + + // Handle a deep copy situation + if ( typeof target === "boolean" ) { + deep = target; + + // Skip the boolean and the target + target = arguments[ i ] || {}; + i++; + } + + // Handle case when target is a string or something (possible in deep copy) + if ( typeof target !== "object" && !isFunction( target ) ) { + target = {}; + } + + // Extend jQuery itself if only one argument is passed + if ( i === length ) { + target = this; + i--; + } + + for ( ; i < length; i++ ) { + + // Only deal with non-null/undefined values + if ( ( options = arguments[ i ] ) != null ) { + + // Extend the base object + for ( name in options ) { + copy = options[ name ]; + + // Prevent Object.prototype pollution + // Prevent never-ending loop + if ( name === "__proto__" || target === copy ) { + continue; + } + + // Recurse if we're merging plain objects or arrays + if ( deep && copy && ( jQuery.isPlainObject( copy ) || + ( copyIsArray = Array.isArray( copy ) ) ) ) { + src = target[ name ]; + + // Ensure proper type for the source value + if ( copyIsArray && !Array.isArray( src ) ) { + clone = []; + } else if ( !copyIsArray && !jQuery.isPlainObject( src ) ) { + clone = {}; + } else { + clone = src; + } + copyIsArray = false; + + // Never move original objects, clone them + target[ name ] = jQuery.extend( deep, clone, copy ); + + // Don't bring in undefined values + } else if ( copy !== undefined ) { + target[ name ] = copy; + } + } + } + } + + // Return the modified object + return target; +}; + +jQuery.extend( { + + // Unique for each copy of jQuery on the page + expando: "jQuery" + ( version + Math.random() ).replace( /\D/g, "" ), + + // Assume jQuery is ready without the ready module + isReady: true, + + error: function( msg ) { + throw new Error( msg ); + }, + + noop: function() {}, + + isPlainObject: function( obj ) { + var proto, Ctor; + + // Detect obvious negatives + // Use toString instead of jQuery.type to catch host objects + if ( !obj || toString.call( obj ) !== "[object Object]" ) { + return false; + } + + proto = getProto( obj ); + + // Objects with no prototype (e.g., `Object.create( null )`) are plain + if ( !proto ) { + return true; + } + + // Objects with prototype are plain iff they were constructed by a global Object function + Ctor = hasOwn.call( proto, "constructor" ) && proto.constructor; + return typeof Ctor === "function" && fnToString.call( Ctor ) === ObjectFunctionString; + }, + + isEmptyObject: function( obj ) { + var name; + + for ( name in obj ) { + return false; + } + return true; + }, + + // Evaluates a script in a provided context; falls back to the global one + // if not specified. + globalEval: function( code, options, doc ) { + DOMEval( code, { nonce: options && options.nonce }, doc ); + }, + + each: function( obj, callback ) { + var length, i = 0; + + if ( isArrayLike( obj ) ) { + length = obj.length; + for ( ; i < length; i++ ) { + if ( callback.call( obj[ i ], i, obj[ i ] ) === false ) { + break; + } + } + } else { + for ( i in obj ) { + if ( callback.call( obj[ i ], i, obj[ i ] ) === false ) { + break; + } + } + } + + return obj; + }, + + // results is for internal usage only + makeArray: function( arr, results ) { + var ret = results || []; + + if ( arr != null ) { + if ( isArrayLike( Object( arr ) ) ) { + jQuery.merge( ret, + typeof arr === "string" ? + [ arr ] : arr + ); + } else { + push.call( ret, arr ); + } + } + + return ret; + }, + + inArray: function( elem, arr, i ) { + return arr == null ? -1 : indexOf.call( arr, elem, i ); + }, + + // Support: Android <=4.0 only, PhantomJS 1 only + // push.apply(_, arraylike) throws on ancient WebKit + merge: function( first, second ) { + var len = +second.length, + j = 0, + i = first.length; + + for ( ; j < len; j++ ) { + first[ i++ ] = second[ j ]; + } + + first.length = i; + + return first; + }, + + grep: function( elems, callback, invert ) { + var callbackInverse, + matches = [], + i = 0, + length = elems.length, + callbackExpect = !invert; + + // Go through the array, only saving the items + // that pass the validator function + for ( ; i < length; i++ ) { + callbackInverse = !callback( elems[ i ], i ); + if ( callbackInverse !== callbackExpect ) { + matches.push( elems[ i ] ); + } + } + + return matches; + }, + + // arg is for internal usage only + map: function( elems, callback, arg ) { + var length, value, + i = 0, + ret = []; + + // Go through the array, translating each of the items to their new values + if ( isArrayLike( elems ) ) { + length = elems.length; + for ( ; i < length; i++ ) { + value = callback( elems[ i ], i, arg ); + + if ( value != null ) { + ret.push( value ); + } + } + + // Go through every key on the object, + } else { + for ( i in elems ) { + value = callback( elems[ i ], i, arg ); + + if ( value != null ) { + ret.push( value ); + } + } + } + + // Flatten any nested arrays + return flat( ret ); + }, + + // A global GUID counter for objects + guid: 1, + + // jQuery.support is not used in Core but other projects attach their + // properties to it so it needs to exist. + support: support +} ); + +if ( typeof Symbol === "function" ) { + jQuery.fn[ Symbol.iterator ] = arr[ Symbol.iterator ]; +} + +// Populate the class2type map +jQuery.each( "Boolean Number String Function Array Date RegExp Object Error Symbol".split( " " ), +function( _i, name ) { + class2type[ "[object " + name + "]" ] = name.toLowerCase(); +} ); + +function isArrayLike( obj ) { + + // Support: real iOS 8.2 only (not reproducible in simulator) + // `in` check used to prevent JIT error (gh-2145) + // hasOwn isn't used here due to false negatives + // regarding Nodelist length in IE + var length = !!obj && "length" in obj && obj.length, + type = toType( obj ); + + if ( isFunction( obj ) || isWindow( obj ) ) { + return false; + } + + return type === "array" || length === 0 || + typeof length === "number" && length > 0 && ( length - 1 ) in obj; +} +var Sizzle = +/*! + * Sizzle CSS Selector Engine v2.3.5 + * https://sizzlejs.com/ + * + * Copyright JS Foundation and other contributors + * Released under the MIT license + * https://js.foundation/ + * + * Date: 2020-03-14 + */ +( function( window ) { +var i, + support, + Expr, + getText, + isXML, + tokenize, + compile, + select, + outermostContext, + sortInput, + hasDuplicate, + + // Local document vars + setDocument, + document, + docElem, + documentIsHTML, + rbuggyQSA, + rbuggyMatches, + matches, + contains, + + // Instance-specific data + expando = "sizzle" + 1 * new Date(), + preferredDoc = window.document, + dirruns = 0, + done = 0, + classCache = createCache(), + tokenCache = createCache(), + compilerCache = createCache(), + nonnativeSelectorCache = createCache(), + sortOrder = function( a, b ) { + if ( a === b ) { + hasDuplicate = true; + } + return 0; + }, + + // Instance methods + hasOwn = ( {} ).hasOwnProperty, + arr = [], + pop = arr.pop, + pushNative = arr.push, + push = arr.push, + slice = arr.slice, + + // Use a stripped-down indexOf as it's faster than native + // https://jsperf.com/thor-indexof-vs-for/5 + indexOf = function( list, elem ) { + var i = 0, + len = list.length; + for ( ; i < len; i++ ) { + if ( list[ i ] === elem ) { + return i; + } + } + return -1; + }, + + booleans = "checked|selected|async|autofocus|autoplay|controls|defer|disabled|hidden|" + + "ismap|loop|multiple|open|readonly|required|scoped", + + // Regular expressions + + // http://www.w3.org/TR/css3-selectors/#whitespace + whitespace = "[\\x20\\t\\r\\n\\f]", + + // https://www.w3.org/TR/css-syntax-3/#ident-token-diagram + identifier = "(?:\\\\[\\da-fA-F]{1,6}" + whitespace + + "?|\\\\[^\\r\\n\\f]|[\\w-]|[^\0-\\x7f])+", + + // Attribute selectors: http://www.w3.org/TR/selectors/#attribute-selectors + attributes = "\\[" + whitespace + "*(" + identifier + ")(?:" + whitespace + + + // Operator (capture 2) + "*([*^$|!~]?=)" + whitespace + + + // "Attribute values must be CSS identifiers [capture 5] + // or strings [capture 3 or capture 4]" + "*(?:'((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\"|(" + identifier + "))|)" + + whitespace + "*\\]", + + pseudos = ":(" + identifier + ")(?:\\((" + + + // To reduce the number of selectors needing tokenize in the preFilter, prefer arguments: + // 1. quoted (capture 3; capture 4 or capture 5) + "('((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\")|" + + + // 2. simple (capture 6) + "((?:\\\\.|[^\\\\()[\\]]|" + attributes + ")*)|" + + + // 3. anything else (capture 2) + ".*" + + ")\\)|)", + + // Leading and non-escaped trailing whitespace, capturing some non-whitespace characters preceding the latter + rwhitespace = new RegExp( whitespace + "+", "g" ), + rtrim = new RegExp( "^" + whitespace + "+|((?:^|[^\\\\])(?:\\\\.)*)" + + whitespace + "+$", "g" ), + + rcomma = new RegExp( "^" + whitespace + "*," + whitespace + "*" ), + rcombinators = new RegExp( "^" + whitespace + "*([>+~]|" + whitespace + ")" + whitespace + + "*" ), + rdescend = new RegExp( whitespace + "|>" ), + + rpseudo = new RegExp( pseudos ), + ridentifier = new RegExp( "^" + identifier + "$" ), + + matchExpr = { + "ID": new RegExp( "^#(" + identifier + ")" ), + "CLASS": new RegExp( "^\\.(" + identifier + ")" ), + "TAG": new RegExp( "^(" + identifier + "|[*])" ), + "ATTR": new RegExp( "^" + attributes ), + "PSEUDO": new RegExp( "^" + pseudos ), + "CHILD": new RegExp( "^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\(" + + whitespace + "*(even|odd|(([+-]|)(\\d*)n|)" + whitespace + "*(?:([+-]|)" + + whitespace + "*(\\d+)|))" + whitespace + "*\\)|)", "i" ), + "bool": new RegExp( "^(?:" + booleans + ")$", "i" ), + + // For use in libraries implementing .is() + // We use this for POS matching in `select` + "needsContext": new RegExp( "^" + whitespace + + "*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\(" + whitespace + + "*((?:-\\d)?\\d*)" + whitespace + "*\\)|)(?=[^-]|$)", "i" ) + }, + + rhtml = /HTML$/i, + rinputs = /^(?:input|select|textarea|button)$/i, + rheader = /^h\d$/i, + + rnative = /^[^{]+\{\s*\[native \w/, + + // Easily-parseable/retrievable ID or TAG or CLASS selectors + rquickExpr = /^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/, + + rsibling = /[+~]/, + + // CSS escapes + // http://www.w3.org/TR/CSS21/syndata.html#escaped-characters + runescape = new RegExp( "\\\\[\\da-fA-F]{1,6}" + whitespace + "?|\\\\([^\\r\\n\\f])", "g" ), + funescape = function( escape, nonHex ) { + var high = "0x" + escape.slice( 1 ) - 0x10000; + + return nonHex ? + + // Strip the backslash prefix from a non-hex escape sequence + nonHex : + + // Replace a hexadecimal escape sequence with the encoded Unicode code point + // Support: IE <=11+ + // For values outside the Basic Multilingual Plane (BMP), manually construct a + // surrogate pair + high < 0 ? + String.fromCharCode( high + 0x10000 ) : + String.fromCharCode( high >> 10 | 0xD800, high & 0x3FF | 0xDC00 ); + }, + + // CSS string/identifier serialization + // https://drafts.csswg.org/cssom/#common-serializing-idioms + rcssescape = /([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g, + fcssescape = function( ch, asCodePoint ) { + if ( asCodePoint ) { + + // U+0000 NULL becomes U+FFFD REPLACEMENT CHARACTER + if ( ch === "\0" ) { + return "\uFFFD"; + } + + // Control characters and (dependent upon position) numbers get escaped as code points + return ch.slice( 0, -1 ) + "\\" + + ch.charCodeAt( ch.length - 1 ).toString( 16 ) + " "; + } + + // Other potentially-special ASCII characters get backslash-escaped + return "\\" + ch; + }, + + // Used for iframes + // See setDocument() + // Removing the function wrapper causes a "Permission Denied" + // error in IE + unloadHandler = function() { + setDocument(); + }, + + inDisabledFieldset = addCombinator( + function( elem ) { + return elem.disabled === true && elem.nodeName.toLowerCase() === "fieldset"; + }, + { dir: "parentNode", next: "legend" } + ); + +// Optimize for push.apply( _, NodeList ) +try { + push.apply( + ( arr = slice.call( preferredDoc.childNodes ) ), + preferredDoc.childNodes + ); + + // Support: Android<4.0 + // Detect silently failing push.apply + // eslint-disable-next-line no-unused-expressions + arr[ preferredDoc.childNodes.length ].nodeType; +} catch ( e ) { + push = { apply: arr.length ? + + // Leverage slice if possible + function( target, els ) { + pushNative.apply( target, slice.call( els ) ); + } : + + // Support: IE<9 + // Otherwise append directly + function( target, els ) { + var j = target.length, + i = 0; + + // Can't trust NodeList.length + while ( ( target[ j++ ] = els[ i++ ] ) ) {} + target.length = j - 1; + } + }; +} + +function Sizzle( selector, context, results, seed ) { + var m, i, elem, nid, match, groups, newSelector, + newContext = context && context.ownerDocument, + + // nodeType defaults to 9, since context defaults to document + nodeType = context ? context.nodeType : 9; + + results = results || []; + + // Return early from calls with invalid selector or context + if ( typeof selector !== "string" || !selector || + nodeType !== 1 && nodeType !== 9 && nodeType !== 11 ) { + + return results; + } + + // Try to shortcut find operations (as opposed to filters) in HTML documents + if ( !seed ) { + setDocument( context ); + context = context || document; + + if ( documentIsHTML ) { + + // If the selector is sufficiently simple, try using a "get*By*" DOM method + // (excepting DocumentFragment context, where the methods don't exist) + if ( nodeType !== 11 && ( match = rquickExpr.exec( selector ) ) ) { + + // ID selector + if ( ( m = match[ 1 ] ) ) { + + // Document context + if ( nodeType === 9 ) { + if ( ( elem = context.getElementById( m ) ) ) { + + // Support: IE, Opera, Webkit + // TODO: identify versions + // getElementById can match elements by name instead of ID + if ( elem.id === m ) { + results.push( elem ); + return results; + } + } else { + return results; + } + + // Element context + } else { + + // Support: IE, Opera, Webkit + // TODO: identify versions + // getElementById can match elements by name instead of ID + if ( newContext && ( elem = newContext.getElementById( m ) ) && + contains( context, elem ) && + elem.id === m ) { + + results.push( elem ); + return results; + } + } + + // Type selector + } else if ( match[ 2 ] ) { + push.apply( results, context.getElementsByTagName( selector ) ); + return results; + + // Class selector + } else if ( ( m = match[ 3 ] ) && support.getElementsByClassName && + context.getElementsByClassName ) { + + push.apply( results, context.getElementsByClassName( m ) ); + return results; + } + } + + // Take advantage of querySelectorAll + if ( support.qsa && + !nonnativeSelectorCache[ selector + " " ] && + ( !rbuggyQSA || !rbuggyQSA.test( selector ) ) && + + // Support: IE 8 only + // Exclude object elements + ( nodeType !== 1 || context.nodeName.toLowerCase() !== "object" ) ) { + + newSelector = selector; + newContext = context; + + // qSA considers elements outside a scoping root when evaluating child or + // descendant combinators, which is not what we want. + // In such cases, we work around the behavior by prefixing every selector in the + // list with an ID selector referencing the scope context. + // The technique has to be used as well when a leading combinator is used + // as such selectors are not recognized by querySelectorAll. + // Thanks to Andrew Dupont for this technique. + if ( nodeType === 1 && + ( rdescend.test( selector ) || rcombinators.test( selector ) ) ) { + + // Expand context for sibling selectors + newContext = rsibling.test( selector ) && testContext( context.parentNode ) || + context; + + // We can use :scope instead of the ID hack if the browser + // supports it & if we're not changing the context. + if ( newContext !== context || !support.scope ) { + + // Capture the context ID, setting it first if necessary + if ( ( nid = context.getAttribute( "id" ) ) ) { + nid = nid.replace( rcssescape, fcssescape ); + } else { + context.setAttribute( "id", ( nid = expando ) ); + } + } + + // Prefix every selector in the list + groups = tokenize( selector ); + i = groups.length; + while ( i-- ) { + groups[ i ] = ( nid ? "#" + nid : ":scope" ) + " " + + toSelector( groups[ i ] ); + } + newSelector = groups.join( "," ); + } + + try { + push.apply( results, + newContext.querySelectorAll( newSelector ) + ); + return results; + } catch ( qsaError ) { + nonnativeSelectorCache( selector, true ); + } finally { + if ( nid === expando ) { + context.removeAttribute( "id" ); + } + } + } + } + } + + // All others + return select( selector.replace( rtrim, "$1" ), context, results, seed ); +} + +/** + * Create key-value caches of limited size + * @returns {function(string, object)} Returns the Object data after storing it on itself with + * property name the (space-suffixed) string and (if the cache is larger than Expr.cacheLength) + * deleting the oldest entry + */ +function createCache() { + var keys = []; + + function cache( key, value ) { + + // Use (key + " ") to avoid collision with native prototype properties (see Issue #157) + if ( keys.push( key + " " ) > Expr.cacheLength ) { + + // Only keep the most recent entries + delete cache[ keys.shift() ]; + } + return ( cache[ key + " " ] = value ); + } + return cache; +} + +/** + * Mark a function for special use by Sizzle + * @param {Function} fn The function to mark + */ +function markFunction( fn ) { + fn[ expando ] = true; + return fn; +} + +/** + * Support testing using an element + * @param {Function} fn Passed the created element and returns a boolean result + */ +function assert( fn ) { + var el = document.createElement( "fieldset" ); + + try { + return !!fn( el ); + } catch ( e ) { + return false; + } finally { + + // Remove from its parent by default + if ( el.parentNode ) { + el.parentNode.removeChild( el ); + } + + // release memory in IE + el = null; + } +} + +/** + * Adds the same handler for all of the specified attrs + * @param {String} attrs Pipe-separated list of attributes + * @param {Function} handler The method that will be applied + */ +function addHandle( attrs, handler ) { + var arr = attrs.split( "|" ), + i = arr.length; + + while ( i-- ) { + Expr.attrHandle[ arr[ i ] ] = handler; + } +} + +/** + * Checks document order of two siblings + * @param {Element} a + * @param {Element} b + * @returns {Number} Returns less than 0 if a precedes b, greater than 0 if a follows b + */ +function siblingCheck( a, b ) { + var cur = b && a, + diff = cur && a.nodeType === 1 && b.nodeType === 1 && + a.sourceIndex - b.sourceIndex; + + // Use IE sourceIndex if available on both nodes + if ( diff ) { + return diff; + } + + // Check if b follows a + if ( cur ) { + while ( ( cur = cur.nextSibling ) ) { + if ( cur === b ) { + return -1; + } + } + } + + return a ? 1 : -1; +} + +/** + * Returns a function to use in pseudos for input types + * @param {String} type + */ +function createInputPseudo( type ) { + return function( elem ) { + var name = elem.nodeName.toLowerCase(); + return name === "input" && elem.type === type; + }; +} + +/** + * Returns a function to use in pseudos for buttons + * @param {String} type + */ +function createButtonPseudo( type ) { + return function( elem ) { + var name = elem.nodeName.toLowerCase(); + return ( name === "input" || name === "button" ) && elem.type === type; + }; +} + +/** + * Returns a function to use in pseudos for :enabled/:disabled + * @param {Boolean} disabled true for :disabled; false for :enabled + */ +function createDisabledPseudo( disabled ) { + + // Known :disabled false positives: fieldset[disabled] > legend:nth-of-type(n+2) :can-disable + return function( elem ) { + + // Only certain elements can match :enabled or :disabled + // https://html.spec.whatwg.org/multipage/scripting.html#selector-enabled + // https://html.spec.whatwg.org/multipage/scripting.html#selector-disabled + if ( "form" in elem ) { + + // Check for inherited disabledness on relevant non-disabled elements: + // * listed form-associated elements in a disabled fieldset + // https://html.spec.whatwg.org/multipage/forms.html#category-listed + // https://html.spec.whatwg.org/multipage/forms.html#concept-fe-disabled + // * option elements in a disabled optgroup + // https://html.spec.whatwg.org/multipage/forms.html#concept-option-disabled + // All such elements have a "form" property. + if ( elem.parentNode && elem.disabled === false ) { + + // Option elements defer to a parent optgroup if present + if ( "label" in elem ) { + if ( "label" in elem.parentNode ) { + return elem.parentNode.disabled === disabled; + } else { + return elem.disabled === disabled; + } + } + + // Support: IE 6 - 11 + // Use the isDisabled shortcut property to check for disabled fieldset ancestors + return elem.isDisabled === disabled || + + // Where there is no isDisabled, check manually + /* jshint -W018 */ + elem.isDisabled !== !disabled && + inDisabledFieldset( elem ) === disabled; + } + + return elem.disabled === disabled; + + // Try to winnow out elements that can't be disabled before trusting the disabled property. + // Some victims get caught in our net (label, legend, menu, track), but it shouldn't + // even exist on them, let alone have a boolean value. + } else if ( "label" in elem ) { + return elem.disabled === disabled; + } + + // Remaining elements are neither :enabled nor :disabled + return false; + }; +} + +/** + * Returns a function to use in pseudos for positionals + * @param {Function} fn + */ +function createPositionalPseudo( fn ) { + return markFunction( function( argument ) { + argument = +argument; + return markFunction( function( seed, matches ) { + var j, + matchIndexes = fn( [], seed.length, argument ), + i = matchIndexes.length; + + // Match elements found at the specified indexes + while ( i-- ) { + if ( seed[ ( j = matchIndexes[ i ] ) ] ) { + seed[ j ] = !( matches[ j ] = seed[ j ] ); + } + } + } ); + } ); +} + +/** + * Checks a node for validity as a Sizzle context + * @param {Element|Object=} context + * @returns {Element|Object|Boolean} The input node if acceptable, otherwise a falsy value + */ +function testContext( context ) { + return context && typeof context.getElementsByTagName !== "undefined" && context; +} + +// Expose support vars for convenience +support = Sizzle.support = {}; + +/** + * Detects XML nodes + * @param {Element|Object} elem An element or a document + * @returns {Boolean} True iff elem is a non-HTML XML node + */ +isXML = Sizzle.isXML = function( elem ) { + var namespace = elem.namespaceURI, + docElem = ( elem.ownerDocument || elem ).documentElement; + + // Support: IE <=8 + // Assume HTML when documentElement doesn't yet exist, such as inside loading iframes + // https://bugs.jquery.com/ticket/4833 + return !rhtml.test( namespace || docElem && docElem.nodeName || "HTML" ); +}; + +/** + * Sets document-related variables once based on the current document + * @param {Element|Object} [doc] An element or document object to use to set the document + * @returns {Object} Returns the current document + */ +setDocument = Sizzle.setDocument = function( node ) { + var hasCompare, subWindow, + doc = node ? node.ownerDocument || node : preferredDoc; + + // Return early if doc is invalid or already selected + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( doc == document || doc.nodeType !== 9 || !doc.documentElement ) { + return document; + } + + // Update global variables + document = doc; + docElem = document.documentElement; + documentIsHTML = !isXML( document ); + + // Support: IE 9 - 11+, Edge 12 - 18+ + // Accessing iframe documents after unload throws "permission denied" errors (jQuery #13936) + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( preferredDoc != document && + ( subWindow = document.defaultView ) && subWindow.top !== subWindow ) { + + // Support: IE 11, Edge + if ( subWindow.addEventListener ) { + subWindow.addEventListener( "unload", unloadHandler, false ); + + // Support: IE 9 - 10 only + } else if ( subWindow.attachEvent ) { + subWindow.attachEvent( "onunload", unloadHandler ); + } + } + + // Support: IE 8 - 11+, Edge 12 - 18+, Chrome <=16 - 25 only, Firefox <=3.6 - 31 only, + // Safari 4 - 5 only, Opera <=11.6 - 12.x only + // IE/Edge & older browsers don't support the :scope pseudo-class. + // Support: Safari 6.0 only + // Safari 6.0 supports :scope but it's an alias of :root there. + support.scope = assert( function( el ) { + docElem.appendChild( el ).appendChild( document.createElement( "div" ) ); + return typeof el.querySelectorAll !== "undefined" && + !el.querySelectorAll( ":scope fieldset div" ).length; + } ); + + /* Attributes + ---------------------------------------------------------------------- */ + + // Support: IE<8 + // Verify that getAttribute really returns attributes and not properties + // (excepting IE8 booleans) + support.attributes = assert( function( el ) { + el.className = "i"; + return !el.getAttribute( "className" ); + } ); + + /* getElement(s)By* + ---------------------------------------------------------------------- */ + + // Check if getElementsByTagName("*") returns only elements + support.getElementsByTagName = assert( function( el ) { + el.appendChild( document.createComment( "" ) ); + return !el.getElementsByTagName( "*" ).length; + } ); + + // Support: IE<9 + support.getElementsByClassName = rnative.test( document.getElementsByClassName ); + + // Support: IE<10 + // Check if getElementById returns elements by name + // The broken getElementById methods don't pick up programmatically-set names, + // so use a roundabout getElementsByName test + support.getById = assert( function( el ) { + docElem.appendChild( el ).id = expando; + return !document.getElementsByName || !document.getElementsByName( expando ).length; + } ); + + // ID filter and find + if ( support.getById ) { + Expr.filter[ "ID" ] = function( id ) { + var attrId = id.replace( runescape, funescape ); + return function( elem ) { + return elem.getAttribute( "id" ) === attrId; + }; + }; + Expr.find[ "ID" ] = function( id, context ) { + if ( typeof context.getElementById !== "undefined" && documentIsHTML ) { + var elem = context.getElementById( id ); + return elem ? [ elem ] : []; + } + }; + } else { + Expr.filter[ "ID" ] = function( id ) { + var attrId = id.replace( runescape, funescape ); + return function( elem ) { + var node = typeof elem.getAttributeNode !== "undefined" && + elem.getAttributeNode( "id" ); + return node && node.value === attrId; + }; + }; + + // Support: IE 6 - 7 only + // getElementById is not reliable as a find shortcut + Expr.find[ "ID" ] = function( id, context ) { + if ( typeof context.getElementById !== "undefined" && documentIsHTML ) { + var node, i, elems, + elem = context.getElementById( id ); + + if ( elem ) { + + // Verify the id attribute + node = elem.getAttributeNode( "id" ); + if ( node && node.value === id ) { + return [ elem ]; + } + + // Fall back on getElementsByName + elems = context.getElementsByName( id ); + i = 0; + while ( ( elem = elems[ i++ ] ) ) { + node = elem.getAttributeNode( "id" ); + if ( node && node.value === id ) { + return [ elem ]; + } + } + } + + return []; + } + }; + } + + // Tag + Expr.find[ "TAG" ] = support.getElementsByTagName ? + function( tag, context ) { + if ( typeof context.getElementsByTagName !== "undefined" ) { + return context.getElementsByTagName( tag ); + + // DocumentFragment nodes don't have gEBTN + } else if ( support.qsa ) { + return context.querySelectorAll( tag ); + } + } : + + function( tag, context ) { + var elem, + tmp = [], + i = 0, + + // By happy coincidence, a (broken) gEBTN appears on DocumentFragment nodes too + results = context.getElementsByTagName( tag ); + + // Filter out possible comments + if ( tag === "*" ) { + while ( ( elem = results[ i++ ] ) ) { + if ( elem.nodeType === 1 ) { + tmp.push( elem ); + } + } + + return tmp; + } + return results; + }; + + // Class + Expr.find[ "CLASS" ] = support.getElementsByClassName && function( className, context ) { + if ( typeof context.getElementsByClassName !== "undefined" && documentIsHTML ) { + return context.getElementsByClassName( className ); + } + }; + + /* QSA/matchesSelector + ---------------------------------------------------------------------- */ + + // QSA and matchesSelector support + + // matchesSelector(:active) reports false when true (IE9/Opera 11.5) + rbuggyMatches = []; + + // qSa(:focus) reports false when true (Chrome 21) + // We allow this because of a bug in IE8/9 that throws an error + // whenever `document.activeElement` is accessed on an iframe + // So, we allow :focus to pass through QSA all the time to avoid the IE error + // See https://bugs.jquery.com/ticket/13378 + rbuggyQSA = []; + + if ( ( support.qsa = rnative.test( document.querySelectorAll ) ) ) { + + // Build QSA regex + // Regex strategy adopted from Diego Perini + assert( function( el ) { + + var input; + + // Select is set to empty string on purpose + // This is to test IE's treatment of not explicitly + // setting a boolean content attribute, + // since its presence should be enough + // https://bugs.jquery.com/ticket/12359 + docElem.appendChild( el ).innerHTML = "" + + ""; + + // Support: IE8, Opera 11-12.16 + // Nothing should be selected when empty strings follow ^= or $= or *= + // The test attribute must be unknown in Opera but "safe" for WinRT + // https://msdn.microsoft.com/en-us/library/ie/hh465388.aspx#attribute_section + if ( el.querySelectorAll( "[msallowcapture^='']" ).length ) { + rbuggyQSA.push( "[*^$]=" + whitespace + "*(?:''|\"\")" ); + } + + // Support: IE8 + // Boolean attributes and "value" are not treated correctly + if ( !el.querySelectorAll( "[selected]" ).length ) { + rbuggyQSA.push( "\\[" + whitespace + "*(?:value|" + booleans + ")" ); + } + + // Support: Chrome<29, Android<4.4, Safari<7.0+, iOS<7.0+, PhantomJS<1.9.8+ + if ( !el.querySelectorAll( "[id~=" + expando + "-]" ).length ) { + rbuggyQSA.push( "~=" ); + } + + // Support: IE 11+, Edge 15 - 18+ + // IE 11/Edge don't find elements on a `[name='']` query in some cases. + // Adding a temporary attribute to the document before the selection works + // around the issue. + // Interestingly, IE 10 & older don't seem to have the issue. + input = document.createElement( "input" ); + input.setAttribute( "name", "" ); + el.appendChild( input ); + if ( !el.querySelectorAll( "[name='']" ).length ) { + rbuggyQSA.push( "\\[" + whitespace + "*name" + whitespace + "*=" + + whitespace + "*(?:''|\"\")" ); + } + + // Webkit/Opera - :checked should return selected option elements + // http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked + // IE8 throws error here and will not see later tests + if ( !el.querySelectorAll( ":checked" ).length ) { + rbuggyQSA.push( ":checked" ); + } + + // Support: Safari 8+, iOS 8+ + // https://bugs.webkit.org/show_bug.cgi?id=136851 + // In-page `selector#id sibling-combinator selector` fails + if ( !el.querySelectorAll( "a#" + expando + "+*" ).length ) { + rbuggyQSA.push( ".#.+[+~]" ); + } + + // Support: Firefox <=3.6 - 5 only + // Old Firefox doesn't throw on a badly-escaped identifier. + el.querySelectorAll( "\\\f" ); + rbuggyQSA.push( "[\\r\\n\\f]" ); + } ); + + assert( function( el ) { + el.innerHTML = "" + + ""; + + // Support: Windows 8 Native Apps + // The type and name attributes are restricted during .innerHTML assignment + var input = document.createElement( "input" ); + input.setAttribute( "type", "hidden" ); + el.appendChild( input ).setAttribute( "name", "D" ); + + // Support: IE8 + // Enforce case-sensitivity of name attribute + if ( el.querySelectorAll( "[name=d]" ).length ) { + rbuggyQSA.push( "name" + whitespace + "*[*^$|!~]?=" ); + } + + // FF 3.5 - :enabled/:disabled and hidden elements (hidden elements are still enabled) + // IE8 throws error here and will not see later tests + if ( el.querySelectorAll( ":enabled" ).length !== 2 ) { + rbuggyQSA.push( ":enabled", ":disabled" ); + } + + // Support: IE9-11+ + // IE's :disabled selector does not pick up the children of disabled fieldsets + docElem.appendChild( el ).disabled = true; + if ( el.querySelectorAll( ":disabled" ).length !== 2 ) { + rbuggyQSA.push( ":enabled", ":disabled" ); + } + + // Support: Opera 10 - 11 only + // Opera 10-11 does not throw on post-comma invalid pseudos + el.querySelectorAll( "*,:x" ); + rbuggyQSA.push( ",.*:" ); + } ); + } + + if ( ( support.matchesSelector = rnative.test( ( matches = docElem.matches || + docElem.webkitMatchesSelector || + docElem.mozMatchesSelector || + docElem.oMatchesSelector || + docElem.msMatchesSelector ) ) ) ) { + + assert( function( el ) { + + // Check to see if it's possible to do matchesSelector + // on a disconnected node (IE 9) + support.disconnectedMatch = matches.call( el, "*" ); + + // This should fail with an exception + // Gecko does not error, returns false instead + matches.call( el, "[s!='']:x" ); + rbuggyMatches.push( "!=", pseudos ); + } ); + } + + rbuggyQSA = rbuggyQSA.length && new RegExp( rbuggyQSA.join( "|" ) ); + rbuggyMatches = rbuggyMatches.length && new RegExp( rbuggyMatches.join( "|" ) ); + + /* Contains + ---------------------------------------------------------------------- */ + hasCompare = rnative.test( docElem.compareDocumentPosition ); + + // Element contains another + // Purposefully self-exclusive + // As in, an element does not contain itself + contains = hasCompare || rnative.test( docElem.contains ) ? + function( a, b ) { + var adown = a.nodeType === 9 ? a.documentElement : a, + bup = b && b.parentNode; + return a === bup || !!( bup && bup.nodeType === 1 && ( + adown.contains ? + adown.contains( bup ) : + a.compareDocumentPosition && a.compareDocumentPosition( bup ) & 16 + ) ); + } : + function( a, b ) { + if ( b ) { + while ( ( b = b.parentNode ) ) { + if ( b === a ) { + return true; + } + } + } + return false; + }; + + /* Sorting + ---------------------------------------------------------------------- */ + + // Document order sorting + sortOrder = hasCompare ? + function( a, b ) { + + // Flag for duplicate removal + if ( a === b ) { + hasDuplicate = true; + return 0; + } + + // Sort on method existence if only one input has compareDocumentPosition + var compare = !a.compareDocumentPosition - !b.compareDocumentPosition; + if ( compare ) { + return compare; + } + + // Calculate position if both inputs belong to the same document + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + compare = ( a.ownerDocument || a ) == ( b.ownerDocument || b ) ? + a.compareDocumentPosition( b ) : + + // Otherwise we know they are disconnected + 1; + + // Disconnected nodes + if ( compare & 1 || + ( !support.sortDetached && b.compareDocumentPosition( a ) === compare ) ) { + + // Choose the first element that is related to our preferred document + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( a == document || a.ownerDocument == preferredDoc && + contains( preferredDoc, a ) ) { + return -1; + } + + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( b == document || b.ownerDocument == preferredDoc && + contains( preferredDoc, b ) ) { + return 1; + } + + // Maintain original order + return sortInput ? + ( indexOf( sortInput, a ) - indexOf( sortInput, b ) ) : + 0; + } + + return compare & 4 ? -1 : 1; + } : + function( a, b ) { + + // Exit early if the nodes are identical + if ( a === b ) { + hasDuplicate = true; + return 0; + } + + var cur, + i = 0, + aup = a.parentNode, + bup = b.parentNode, + ap = [ a ], + bp = [ b ]; + + // Parentless nodes are either documents or disconnected + if ( !aup || !bup ) { + + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + /* eslint-disable eqeqeq */ + return a == document ? -1 : + b == document ? 1 : + /* eslint-enable eqeqeq */ + aup ? -1 : + bup ? 1 : + sortInput ? + ( indexOf( sortInput, a ) - indexOf( sortInput, b ) ) : + 0; + + // If the nodes are siblings, we can do a quick check + } else if ( aup === bup ) { + return siblingCheck( a, b ); + } + + // Otherwise we need full lists of their ancestors for comparison + cur = a; + while ( ( cur = cur.parentNode ) ) { + ap.unshift( cur ); + } + cur = b; + while ( ( cur = cur.parentNode ) ) { + bp.unshift( cur ); + } + + // Walk down the tree looking for a discrepancy + while ( ap[ i ] === bp[ i ] ) { + i++; + } + + return i ? + + // Do a sibling check if the nodes have a common ancestor + siblingCheck( ap[ i ], bp[ i ] ) : + + // Otherwise nodes in our document sort first + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + /* eslint-disable eqeqeq */ + ap[ i ] == preferredDoc ? -1 : + bp[ i ] == preferredDoc ? 1 : + /* eslint-enable eqeqeq */ + 0; + }; + + return document; +}; + +Sizzle.matches = function( expr, elements ) { + return Sizzle( expr, null, null, elements ); +}; + +Sizzle.matchesSelector = function( elem, expr ) { + setDocument( elem ); + + if ( support.matchesSelector && documentIsHTML && + !nonnativeSelectorCache[ expr + " " ] && + ( !rbuggyMatches || !rbuggyMatches.test( expr ) ) && + ( !rbuggyQSA || !rbuggyQSA.test( expr ) ) ) { + + try { + var ret = matches.call( elem, expr ); + + // IE 9's matchesSelector returns false on disconnected nodes + if ( ret || support.disconnectedMatch || + + // As well, disconnected nodes are said to be in a document + // fragment in IE 9 + elem.document && elem.document.nodeType !== 11 ) { + return ret; + } + } catch ( e ) { + nonnativeSelectorCache( expr, true ); + } + } + + return Sizzle( expr, document, null, [ elem ] ).length > 0; +}; + +Sizzle.contains = function( context, elem ) { + + // Set document vars if needed + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( ( context.ownerDocument || context ) != document ) { + setDocument( context ); + } + return contains( context, elem ); +}; + +Sizzle.attr = function( elem, name ) { + + // Set document vars if needed + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( ( elem.ownerDocument || elem ) != document ) { + setDocument( elem ); + } + + var fn = Expr.attrHandle[ name.toLowerCase() ], + + // Don't get fooled by Object.prototype properties (jQuery #13807) + val = fn && hasOwn.call( Expr.attrHandle, name.toLowerCase() ) ? + fn( elem, name, !documentIsHTML ) : + undefined; + + return val !== undefined ? + val : + support.attributes || !documentIsHTML ? + elem.getAttribute( name ) : + ( val = elem.getAttributeNode( name ) ) && val.specified ? + val.value : + null; +}; + +Sizzle.escape = function( sel ) { + return ( sel + "" ).replace( rcssescape, fcssescape ); +}; + +Sizzle.error = function( msg ) { + throw new Error( "Syntax error, unrecognized expression: " + msg ); +}; + +/** + * Document sorting and removing duplicates + * @param {ArrayLike} results + */ +Sizzle.uniqueSort = function( results ) { + var elem, + duplicates = [], + j = 0, + i = 0; + + // Unless we *know* we can detect duplicates, assume their presence + hasDuplicate = !support.detectDuplicates; + sortInput = !support.sortStable && results.slice( 0 ); + results.sort( sortOrder ); + + if ( hasDuplicate ) { + while ( ( elem = results[ i++ ] ) ) { + if ( elem === results[ i ] ) { + j = duplicates.push( i ); + } + } + while ( j-- ) { + results.splice( duplicates[ j ], 1 ); + } + } + + // Clear input after sorting to release objects + // See https://github.com/jquery/sizzle/pull/225 + sortInput = null; + + return results; +}; + +/** + * Utility function for retrieving the text value of an array of DOM nodes + * @param {Array|Element} elem + */ +getText = Sizzle.getText = function( elem ) { + var node, + ret = "", + i = 0, + nodeType = elem.nodeType; + + if ( !nodeType ) { + + // If no nodeType, this is expected to be an array + while ( ( node = elem[ i++ ] ) ) { + + // Do not traverse comment nodes + ret += getText( node ); + } + } else if ( nodeType === 1 || nodeType === 9 || nodeType === 11 ) { + + // Use textContent for elements + // innerText usage removed for consistency of new lines (jQuery #11153) + if ( typeof elem.textContent === "string" ) { + return elem.textContent; + } else { + + // Traverse its children + for ( elem = elem.firstChild; elem; elem = elem.nextSibling ) { + ret += getText( elem ); + } + } + } else if ( nodeType === 3 || nodeType === 4 ) { + return elem.nodeValue; + } + + // Do not include comment or processing instruction nodes + + return ret; +}; + +Expr = Sizzle.selectors = { + + // Can be adjusted by the user + cacheLength: 50, + + createPseudo: markFunction, + + match: matchExpr, + + attrHandle: {}, + + find: {}, + + relative: { + ">": { dir: "parentNode", first: true }, + " ": { dir: "parentNode" }, + "+": { dir: "previousSibling", first: true }, + "~": { dir: "previousSibling" } + }, + + preFilter: { + "ATTR": function( match ) { + match[ 1 ] = match[ 1 ].replace( runescape, funescape ); + + // Move the given value to match[3] whether quoted or unquoted + match[ 3 ] = ( match[ 3 ] || match[ 4 ] || + match[ 5 ] || "" ).replace( runescape, funescape ); + + if ( match[ 2 ] === "~=" ) { + match[ 3 ] = " " + match[ 3 ] + " "; + } + + return match.slice( 0, 4 ); + }, + + "CHILD": function( match ) { + + /* matches from matchExpr["CHILD"] + 1 type (only|nth|...) + 2 what (child|of-type) + 3 argument (even|odd|\d*|\d*n([+-]\d+)?|...) + 4 xn-component of xn+y argument ([+-]?\d*n|) + 5 sign of xn-component + 6 x of xn-component + 7 sign of y-component + 8 y of y-component + */ + match[ 1 ] = match[ 1 ].toLowerCase(); + + if ( match[ 1 ].slice( 0, 3 ) === "nth" ) { + + // nth-* requires argument + if ( !match[ 3 ] ) { + Sizzle.error( match[ 0 ] ); + } + + // numeric x and y parameters for Expr.filter.CHILD + // remember that false/true cast respectively to 0/1 + match[ 4 ] = +( match[ 4 ] ? + match[ 5 ] + ( match[ 6 ] || 1 ) : + 2 * ( match[ 3 ] === "even" || match[ 3 ] === "odd" ) ); + match[ 5 ] = +( ( match[ 7 ] + match[ 8 ] ) || match[ 3 ] === "odd" ); + + // other types prohibit arguments + } else if ( match[ 3 ] ) { + Sizzle.error( match[ 0 ] ); + } + + return match; + }, + + "PSEUDO": function( match ) { + var excess, + unquoted = !match[ 6 ] && match[ 2 ]; + + if ( matchExpr[ "CHILD" ].test( match[ 0 ] ) ) { + return null; + } + + // Accept quoted arguments as-is + if ( match[ 3 ] ) { + match[ 2 ] = match[ 4 ] || match[ 5 ] || ""; + + // Strip excess characters from unquoted arguments + } else if ( unquoted && rpseudo.test( unquoted ) && + + // Get excess from tokenize (recursively) + ( excess = tokenize( unquoted, true ) ) && + + // advance to the next closing parenthesis + ( excess = unquoted.indexOf( ")", unquoted.length - excess ) - unquoted.length ) ) { + + // excess is a negative index + match[ 0 ] = match[ 0 ].slice( 0, excess ); + match[ 2 ] = unquoted.slice( 0, excess ); + } + + // Return only captures needed by the pseudo filter method (type and argument) + return match.slice( 0, 3 ); + } + }, + + filter: { + + "TAG": function( nodeNameSelector ) { + var nodeName = nodeNameSelector.replace( runescape, funescape ).toLowerCase(); + return nodeNameSelector === "*" ? + function() { + return true; + } : + function( elem ) { + return elem.nodeName && elem.nodeName.toLowerCase() === nodeName; + }; + }, + + "CLASS": function( className ) { + var pattern = classCache[ className + " " ]; + + return pattern || + ( pattern = new RegExp( "(^|" + whitespace + + ")" + className + "(" + whitespace + "|$)" ) ) && classCache( + className, function( elem ) { + return pattern.test( + typeof elem.className === "string" && elem.className || + typeof elem.getAttribute !== "undefined" && + elem.getAttribute( "class" ) || + "" + ); + } ); + }, + + "ATTR": function( name, operator, check ) { + return function( elem ) { + var result = Sizzle.attr( elem, name ); + + if ( result == null ) { + return operator === "!="; + } + if ( !operator ) { + return true; + } + + result += ""; + + /* eslint-disable max-len */ + + return operator === "=" ? result === check : + operator === "!=" ? result !== check : + operator === "^=" ? check && result.indexOf( check ) === 0 : + operator === "*=" ? check && result.indexOf( check ) > -1 : + operator === "$=" ? check && result.slice( -check.length ) === check : + operator === "~=" ? ( " " + result.replace( rwhitespace, " " ) + " " ).indexOf( check ) > -1 : + operator === "|=" ? result === check || result.slice( 0, check.length + 1 ) === check + "-" : + false; + /* eslint-enable max-len */ + + }; + }, + + "CHILD": function( type, what, _argument, first, last ) { + var simple = type.slice( 0, 3 ) !== "nth", + forward = type.slice( -4 ) !== "last", + ofType = what === "of-type"; + + return first === 1 && last === 0 ? + + // Shortcut for :nth-*(n) + function( elem ) { + return !!elem.parentNode; + } : + + function( elem, _context, xml ) { + var cache, uniqueCache, outerCache, node, nodeIndex, start, + dir = simple !== forward ? "nextSibling" : "previousSibling", + parent = elem.parentNode, + name = ofType && elem.nodeName.toLowerCase(), + useCache = !xml && !ofType, + diff = false; + + if ( parent ) { + + // :(first|last|only)-(child|of-type) + if ( simple ) { + while ( dir ) { + node = elem; + while ( ( node = node[ dir ] ) ) { + if ( ofType ? + node.nodeName.toLowerCase() === name : + node.nodeType === 1 ) { + + return false; + } + } + + // Reverse direction for :only-* (if we haven't yet done so) + start = dir = type === "only" && !start && "nextSibling"; + } + return true; + } + + start = [ forward ? parent.firstChild : parent.lastChild ]; + + // non-xml :nth-child(...) stores cache data on `parent` + if ( forward && useCache ) { + + // Seek `elem` from a previously-cached index + + // ...in a gzip-friendly way + node = parent; + outerCache = node[ expando ] || ( node[ expando ] = {} ); + + // Support: IE <9 only + // Defend against cloned attroperties (jQuery gh-1709) + uniqueCache = outerCache[ node.uniqueID ] || + ( outerCache[ node.uniqueID ] = {} ); + + cache = uniqueCache[ type ] || []; + nodeIndex = cache[ 0 ] === dirruns && cache[ 1 ]; + diff = nodeIndex && cache[ 2 ]; + node = nodeIndex && parent.childNodes[ nodeIndex ]; + + while ( ( node = ++nodeIndex && node && node[ dir ] || + + // Fallback to seeking `elem` from the start + ( diff = nodeIndex = 0 ) || start.pop() ) ) { + + // When found, cache indexes on `parent` and break + if ( node.nodeType === 1 && ++diff && node === elem ) { + uniqueCache[ type ] = [ dirruns, nodeIndex, diff ]; + break; + } + } + + } else { + + // Use previously-cached element index if available + if ( useCache ) { + + // ...in a gzip-friendly way + node = elem; + outerCache = node[ expando ] || ( node[ expando ] = {} ); + + // Support: IE <9 only + // Defend against cloned attroperties (jQuery gh-1709) + uniqueCache = outerCache[ node.uniqueID ] || + ( outerCache[ node.uniqueID ] = {} ); + + cache = uniqueCache[ type ] || []; + nodeIndex = cache[ 0 ] === dirruns && cache[ 1 ]; + diff = nodeIndex; + } + + // xml :nth-child(...) + // or :nth-last-child(...) or :nth(-last)?-of-type(...) + if ( diff === false ) { + + // Use the same loop as above to seek `elem` from the start + while ( ( node = ++nodeIndex && node && node[ dir ] || + ( diff = nodeIndex = 0 ) || start.pop() ) ) { + + if ( ( ofType ? + node.nodeName.toLowerCase() === name : + node.nodeType === 1 ) && + ++diff ) { + + // Cache the index of each encountered element + if ( useCache ) { + outerCache = node[ expando ] || + ( node[ expando ] = {} ); + + // Support: IE <9 only + // Defend against cloned attroperties (jQuery gh-1709) + uniqueCache = outerCache[ node.uniqueID ] || + ( outerCache[ node.uniqueID ] = {} ); + + uniqueCache[ type ] = [ dirruns, diff ]; + } + + if ( node === elem ) { + break; + } + } + } + } + } + + // Incorporate the offset, then check against cycle size + diff -= last; + return diff === first || ( diff % first === 0 && diff / first >= 0 ); + } + }; + }, + + "PSEUDO": function( pseudo, argument ) { + + // pseudo-class names are case-insensitive + // http://www.w3.org/TR/selectors/#pseudo-classes + // Prioritize by case sensitivity in case custom pseudos are added with uppercase letters + // Remember that setFilters inherits from pseudos + var args, + fn = Expr.pseudos[ pseudo ] || Expr.setFilters[ pseudo.toLowerCase() ] || + Sizzle.error( "unsupported pseudo: " + pseudo ); + + // The user may use createPseudo to indicate that + // arguments are needed to create the filter function + // just as Sizzle does + if ( fn[ expando ] ) { + return fn( argument ); + } + + // But maintain support for old signatures + if ( fn.length > 1 ) { + args = [ pseudo, pseudo, "", argument ]; + return Expr.setFilters.hasOwnProperty( pseudo.toLowerCase() ) ? + markFunction( function( seed, matches ) { + var idx, + matched = fn( seed, argument ), + i = matched.length; + while ( i-- ) { + idx = indexOf( seed, matched[ i ] ); + seed[ idx ] = !( matches[ idx ] = matched[ i ] ); + } + } ) : + function( elem ) { + return fn( elem, 0, args ); + }; + } + + return fn; + } + }, + + pseudos: { + + // Potentially complex pseudos + "not": markFunction( function( selector ) { + + // Trim the selector passed to compile + // to avoid treating leading and trailing + // spaces as combinators + var input = [], + results = [], + matcher = compile( selector.replace( rtrim, "$1" ) ); + + return matcher[ expando ] ? + markFunction( function( seed, matches, _context, xml ) { + var elem, + unmatched = matcher( seed, null, xml, [] ), + i = seed.length; + + // Match elements unmatched by `matcher` + while ( i-- ) { + if ( ( elem = unmatched[ i ] ) ) { + seed[ i ] = !( matches[ i ] = elem ); + } + } + } ) : + function( elem, _context, xml ) { + input[ 0 ] = elem; + matcher( input, null, xml, results ); + + // Don't keep the element (issue #299) + input[ 0 ] = null; + return !results.pop(); + }; + } ), + + "has": markFunction( function( selector ) { + return function( elem ) { + return Sizzle( selector, elem ).length > 0; + }; + } ), + + "contains": markFunction( function( text ) { + text = text.replace( runescape, funescape ); + return function( elem ) { + return ( elem.textContent || getText( elem ) ).indexOf( text ) > -1; + }; + } ), + + // "Whether an element is represented by a :lang() selector + // is based solely on the element's language value + // being equal to the identifier C, + // or beginning with the identifier C immediately followed by "-". + // The matching of C against the element's language value is performed case-insensitively. + // The identifier C does not have to be a valid language name." + // http://www.w3.org/TR/selectors/#lang-pseudo + "lang": markFunction( function( lang ) { + + // lang value must be a valid identifier + if ( !ridentifier.test( lang || "" ) ) { + Sizzle.error( "unsupported lang: " + lang ); + } + lang = lang.replace( runescape, funescape ).toLowerCase(); + return function( elem ) { + var elemLang; + do { + if ( ( elemLang = documentIsHTML ? + elem.lang : + elem.getAttribute( "xml:lang" ) || elem.getAttribute( "lang" ) ) ) { + + elemLang = elemLang.toLowerCase(); + return elemLang === lang || elemLang.indexOf( lang + "-" ) === 0; + } + } while ( ( elem = elem.parentNode ) && elem.nodeType === 1 ); + return false; + }; + } ), + + // Miscellaneous + "target": function( elem ) { + var hash = window.location && window.location.hash; + return hash && hash.slice( 1 ) === elem.id; + }, + + "root": function( elem ) { + return elem === docElem; + }, + + "focus": function( elem ) { + return elem === document.activeElement && + ( !document.hasFocus || document.hasFocus() ) && + !!( elem.type || elem.href || ~elem.tabIndex ); + }, + + // Boolean properties + "enabled": createDisabledPseudo( false ), + "disabled": createDisabledPseudo( true ), + + "checked": function( elem ) { + + // In CSS3, :checked should return both checked and selected elements + // http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked + var nodeName = elem.nodeName.toLowerCase(); + return ( nodeName === "input" && !!elem.checked ) || + ( nodeName === "option" && !!elem.selected ); + }, + + "selected": function( elem ) { + + // Accessing this property makes selected-by-default + // options in Safari work properly + if ( elem.parentNode ) { + // eslint-disable-next-line no-unused-expressions + elem.parentNode.selectedIndex; + } + + return elem.selected === true; + }, + + // Contents + "empty": function( elem ) { + + // http://www.w3.org/TR/selectors/#empty-pseudo + // :empty is negated by element (1) or content nodes (text: 3; cdata: 4; entity ref: 5), + // but not by others (comment: 8; processing instruction: 7; etc.) + // nodeType < 6 works because attributes (2) do not appear as children + for ( elem = elem.firstChild; elem; elem = elem.nextSibling ) { + if ( elem.nodeType < 6 ) { + return false; + } + } + return true; + }, + + "parent": function( elem ) { + return !Expr.pseudos[ "empty" ]( elem ); + }, + + // Element/input types + "header": function( elem ) { + return rheader.test( elem.nodeName ); + }, + + "input": function( elem ) { + return rinputs.test( elem.nodeName ); + }, + + "button": function( elem ) { + var name = elem.nodeName.toLowerCase(); + return name === "input" && elem.type === "button" || name === "button"; + }, + + "text": function( elem ) { + var attr; + return elem.nodeName.toLowerCase() === "input" && + elem.type === "text" && + + // Support: IE<8 + // New HTML5 attribute values (e.g., "search") appear with elem.type === "text" + ( ( attr = elem.getAttribute( "type" ) ) == null || + attr.toLowerCase() === "text" ); + }, + + // Position-in-collection + "first": createPositionalPseudo( function() { + return [ 0 ]; + } ), + + "last": createPositionalPseudo( function( _matchIndexes, length ) { + return [ length - 1 ]; + } ), + + "eq": createPositionalPseudo( function( _matchIndexes, length, argument ) { + return [ argument < 0 ? argument + length : argument ]; + } ), + + "even": createPositionalPseudo( function( matchIndexes, length ) { + var i = 0; + for ( ; i < length; i += 2 ) { + matchIndexes.push( i ); + } + return matchIndexes; + } ), + + "odd": createPositionalPseudo( function( matchIndexes, length ) { + var i = 1; + for ( ; i < length; i += 2 ) { + matchIndexes.push( i ); + } + return matchIndexes; + } ), + + "lt": createPositionalPseudo( function( matchIndexes, length, argument ) { + var i = argument < 0 ? + argument + length : + argument > length ? + length : + argument; + for ( ; --i >= 0; ) { + matchIndexes.push( i ); + } + return matchIndexes; + } ), + + "gt": createPositionalPseudo( function( matchIndexes, length, argument ) { + var i = argument < 0 ? argument + length : argument; + for ( ; ++i < length; ) { + matchIndexes.push( i ); + } + return matchIndexes; + } ) + } +}; + +Expr.pseudos[ "nth" ] = Expr.pseudos[ "eq" ]; + +// Add button/input type pseudos +for ( i in { radio: true, checkbox: true, file: true, password: true, image: true } ) { + Expr.pseudos[ i ] = createInputPseudo( i ); +} +for ( i in { submit: true, reset: true } ) { + Expr.pseudos[ i ] = createButtonPseudo( i ); +} + +// Easy API for creating new setFilters +function setFilters() {} +setFilters.prototype = Expr.filters = Expr.pseudos; +Expr.setFilters = new setFilters(); + +tokenize = Sizzle.tokenize = function( selector, parseOnly ) { + var matched, match, tokens, type, + soFar, groups, preFilters, + cached = tokenCache[ selector + " " ]; + + if ( cached ) { + return parseOnly ? 0 : cached.slice( 0 ); + } + + soFar = selector; + groups = []; + preFilters = Expr.preFilter; + + while ( soFar ) { + + // Comma and first run + if ( !matched || ( match = rcomma.exec( soFar ) ) ) { + if ( match ) { + + // Don't consume trailing commas as valid + soFar = soFar.slice( match[ 0 ].length ) || soFar; + } + groups.push( ( tokens = [] ) ); + } + + matched = false; + + // Combinators + if ( ( match = rcombinators.exec( soFar ) ) ) { + matched = match.shift(); + tokens.push( { + value: matched, + + // Cast descendant combinators to space + type: match[ 0 ].replace( rtrim, " " ) + } ); + soFar = soFar.slice( matched.length ); + } + + // Filters + for ( type in Expr.filter ) { + if ( ( match = matchExpr[ type ].exec( soFar ) ) && ( !preFilters[ type ] || + ( match = preFilters[ type ]( match ) ) ) ) { + matched = match.shift(); + tokens.push( { + value: matched, + type: type, + matches: match + } ); + soFar = soFar.slice( matched.length ); + } + } + + if ( !matched ) { + break; + } + } + + // Return the length of the invalid excess + // if we're just parsing + // Otherwise, throw an error or return tokens + return parseOnly ? + soFar.length : + soFar ? + Sizzle.error( selector ) : + + // Cache the tokens + tokenCache( selector, groups ).slice( 0 ); +}; + +function toSelector( tokens ) { + var i = 0, + len = tokens.length, + selector = ""; + for ( ; i < len; i++ ) { + selector += tokens[ i ].value; + } + return selector; +} + +function addCombinator( matcher, combinator, base ) { + var dir = combinator.dir, + skip = combinator.next, + key = skip || dir, + checkNonElements = base && key === "parentNode", + doneName = done++; + + return combinator.first ? + + // Check against closest ancestor/preceding element + function( elem, context, xml ) { + while ( ( elem = elem[ dir ] ) ) { + if ( elem.nodeType === 1 || checkNonElements ) { + return matcher( elem, context, xml ); + } + } + return false; + } : + + // Check against all ancestor/preceding elements + function( elem, context, xml ) { + var oldCache, uniqueCache, outerCache, + newCache = [ dirruns, doneName ]; + + // We can't set arbitrary data on XML nodes, so they don't benefit from combinator caching + if ( xml ) { + while ( ( elem = elem[ dir ] ) ) { + if ( elem.nodeType === 1 || checkNonElements ) { + if ( matcher( elem, context, xml ) ) { + return true; + } + } + } + } else { + while ( ( elem = elem[ dir ] ) ) { + if ( elem.nodeType === 1 || checkNonElements ) { + outerCache = elem[ expando ] || ( elem[ expando ] = {} ); + + // Support: IE <9 only + // Defend against cloned attroperties (jQuery gh-1709) + uniqueCache = outerCache[ elem.uniqueID ] || + ( outerCache[ elem.uniqueID ] = {} ); + + if ( skip && skip === elem.nodeName.toLowerCase() ) { + elem = elem[ dir ] || elem; + } else if ( ( oldCache = uniqueCache[ key ] ) && + oldCache[ 0 ] === dirruns && oldCache[ 1 ] === doneName ) { + + // Assign to newCache so results back-propagate to previous elements + return ( newCache[ 2 ] = oldCache[ 2 ] ); + } else { + + // Reuse newcache so results back-propagate to previous elements + uniqueCache[ key ] = newCache; + + // A match means we're done; a fail means we have to keep checking + if ( ( newCache[ 2 ] = matcher( elem, context, xml ) ) ) { + return true; + } + } + } + } + } + return false; + }; +} + +function elementMatcher( matchers ) { + return matchers.length > 1 ? + function( elem, context, xml ) { + var i = matchers.length; + while ( i-- ) { + if ( !matchers[ i ]( elem, context, xml ) ) { + return false; + } + } + return true; + } : + matchers[ 0 ]; +} + +function multipleContexts( selector, contexts, results ) { + var i = 0, + len = contexts.length; + for ( ; i < len; i++ ) { + Sizzle( selector, contexts[ i ], results ); + } + return results; +} + +function condense( unmatched, map, filter, context, xml ) { + var elem, + newUnmatched = [], + i = 0, + len = unmatched.length, + mapped = map != null; + + for ( ; i < len; i++ ) { + if ( ( elem = unmatched[ i ] ) ) { + if ( !filter || filter( elem, context, xml ) ) { + newUnmatched.push( elem ); + if ( mapped ) { + map.push( i ); + } + } + } + } + + return newUnmatched; +} + +function setMatcher( preFilter, selector, matcher, postFilter, postFinder, postSelector ) { + if ( postFilter && !postFilter[ expando ] ) { + postFilter = setMatcher( postFilter ); + } + if ( postFinder && !postFinder[ expando ] ) { + postFinder = setMatcher( postFinder, postSelector ); + } + return markFunction( function( seed, results, context, xml ) { + var temp, i, elem, + preMap = [], + postMap = [], + preexisting = results.length, + + // Get initial elements from seed or context + elems = seed || multipleContexts( + selector || "*", + context.nodeType ? [ context ] : context, + [] + ), + + // Prefilter to get matcher input, preserving a map for seed-results synchronization + matcherIn = preFilter && ( seed || !selector ) ? + condense( elems, preMap, preFilter, context, xml ) : + elems, + + matcherOut = matcher ? + + // If we have a postFinder, or filtered seed, or non-seed postFilter or preexisting results, + postFinder || ( seed ? preFilter : preexisting || postFilter ) ? + + // ...intermediate processing is necessary + [] : + + // ...otherwise use results directly + results : + matcherIn; + + // Find primary matches + if ( matcher ) { + matcher( matcherIn, matcherOut, context, xml ); + } + + // Apply postFilter + if ( postFilter ) { + temp = condense( matcherOut, postMap ); + postFilter( temp, [], context, xml ); + + // Un-match failing elements by moving them back to matcherIn + i = temp.length; + while ( i-- ) { + if ( ( elem = temp[ i ] ) ) { + matcherOut[ postMap[ i ] ] = !( matcherIn[ postMap[ i ] ] = elem ); + } + } + } + + if ( seed ) { + if ( postFinder || preFilter ) { + if ( postFinder ) { + + // Get the final matcherOut by condensing this intermediate into postFinder contexts + temp = []; + i = matcherOut.length; + while ( i-- ) { + if ( ( elem = matcherOut[ i ] ) ) { + + // Restore matcherIn since elem is not yet a final match + temp.push( ( matcherIn[ i ] = elem ) ); + } + } + postFinder( null, ( matcherOut = [] ), temp, xml ); + } + + // Move matched elements from seed to results to keep them synchronized + i = matcherOut.length; + while ( i-- ) { + if ( ( elem = matcherOut[ i ] ) && + ( temp = postFinder ? indexOf( seed, elem ) : preMap[ i ] ) > -1 ) { + + seed[ temp ] = !( results[ temp ] = elem ); + } + } + } + + // Add elements to results, through postFinder if defined + } else { + matcherOut = condense( + matcherOut === results ? + matcherOut.splice( preexisting, matcherOut.length ) : + matcherOut + ); + if ( postFinder ) { + postFinder( null, results, matcherOut, xml ); + } else { + push.apply( results, matcherOut ); + } + } + } ); +} + +function matcherFromTokens( tokens ) { + var checkContext, matcher, j, + len = tokens.length, + leadingRelative = Expr.relative[ tokens[ 0 ].type ], + implicitRelative = leadingRelative || Expr.relative[ " " ], + i = leadingRelative ? 1 : 0, + + // The foundational matcher ensures that elements are reachable from top-level context(s) + matchContext = addCombinator( function( elem ) { + return elem === checkContext; + }, implicitRelative, true ), + matchAnyContext = addCombinator( function( elem ) { + return indexOf( checkContext, elem ) > -1; + }, implicitRelative, true ), + matchers = [ function( elem, context, xml ) { + var ret = ( !leadingRelative && ( xml || context !== outermostContext ) ) || ( + ( checkContext = context ).nodeType ? + matchContext( elem, context, xml ) : + matchAnyContext( elem, context, xml ) ); + + // Avoid hanging onto element (issue #299) + checkContext = null; + return ret; + } ]; + + for ( ; i < len; i++ ) { + if ( ( matcher = Expr.relative[ tokens[ i ].type ] ) ) { + matchers = [ addCombinator( elementMatcher( matchers ), matcher ) ]; + } else { + matcher = Expr.filter[ tokens[ i ].type ].apply( null, tokens[ i ].matches ); + + // Return special upon seeing a positional matcher + if ( matcher[ expando ] ) { + + // Find the next relative operator (if any) for proper handling + j = ++i; + for ( ; j < len; j++ ) { + if ( Expr.relative[ tokens[ j ].type ] ) { + break; + } + } + return setMatcher( + i > 1 && elementMatcher( matchers ), + i > 1 && toSelector( + + // If the preceding token was a descendant combinator, insert an implicit any-element `*` + tokens + .slice( 0, i - 1 ) + .concat( { value: tokens[ i - 2 ].type === " " ? "*" : "" } ) + ).replace( rtrim, "$1" ), + matcher, + i < j && matcherFromTokens( tokens.slice( i, j ) ), + j < len && matcherFromTokens( ( tokens = tokens.slice( j ) ) ), + j < len && toSelector( tokens ) + ); + } + matchers.push( matcher ); + } + } + + return elementMatcher( matchers ); +} + +function matcherFromGroupMatchers( elementMatchers, setMatchers ) { + var bySet = setMatchers.length > 0, + byElement = elementMatchers.length > 0, + superMatcher = function( seed, context, xml, results, outermost ) { + var elem, j, matcher, + matchedCount = 0, + i = "0", + unmatched = seed && [], + setMatched = [], + contextBackup = outermostContext, + + // We must always have either seed elements or outermost context + elems = seed || byElement && Expr.find[ "TAG" ]( "*", outermost ), + + // Use integer dirruns iff this is the outermost matcher + dirrunsUnique = ( dirruns += contextBackup == null ? 1 : Math.random() || 0.1 ), + len = elems.length; + + if ( outermost ) { + + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + outermostContext = context == document || context || outermost; + } + + // Add elements passing elementMatchers directly to results + // Support: IE<9, Safari + // Tolerate NodeList properties (IE: "length"; Safari: ) matching elements by id + for ( ; i !== len && ( elem = elems[ i ] ) != null; i++ ) { + if ( byElement && elem ) { + j = 0; + + // Support: IE 11+, Edge 17 - 18+ + // IE/Edge sometimes throw a "Permission denied" error when strict-comparing + // two documents; shallow comparisons work. + // eslint-disable-next-line eqeqeq + if ( !context && elem.ownerDocument != document ) { + setDocument( elem ); + xml = !documentIsHTML; + } + while ( ( matcher = elementMatchers[ j++ ] ) ) { + if ( matcher( elem, context || document, xml ) ) { + results.push( elem ); + break; + } + } + if ( outermost ) { + dirruns = dirrunsUnique; + } + } + + // Track unmatched elements for set filters + if ( bySet ) { + + // They will have gone through all possible matchers + if ( ( elem = !matcher && elem ) ) { + matchedCount--; + } + + // Lengthen the array for every element, matched or not + if ( seed ) { + unmatched.push( elem ); + } + } + } + + // `i` is now the count of elements visited above, and adding it to `matchedCount` + // makes the latter nonnegative. + matchedCount += i; + + // Apply set filters to unmatched elements + // NOTE: This can be skipped if there are no unmatched elements (i.e., `matchedCount` + // equals `i`), unless we didn't visit _any_ elements in the above loop because we have + // no element matchers and no seed. + // Incrementing an initially-string "0" `i` allows `i` to remain a string only in that + // case, which will result in a "00" `matchedCount` that differs from `i` but is also + // numerically zero. + if ( bySet && i !== matchedCount ) { + j = 0; + while ( ( matcher = setMatchers[ j++ ] ) ) { + matcher( unmatched, setMatched, context, xml ); + } + + if ( seed ) { + + // Reintegrate element matches to eliminate the need for sorting + if ( matchedCount > 0 ) { + while ( i-- ) { + if ( !( unmatched[ i ] || setMatched[ i ] ) ) { + setMatched[ i ] = pop.call( results ); + } + } + } + + // Discard index placeholder values to get only actual matches + setMatched = condense( setMatched ); + } + + // Add matches to results + push.apply( results, setMatched ); + + // Seedless set matches succeeding multiple successful matchers stipulate sorting + if ( outermost && !seed && setMatched.length > 0 && + ( matchedCount + setMatchers.length ) > 1 ) { + + Sizzle.uniqueSort( results ); + } + } + + // Override manipulation of globals by nested matchers + if ( outermost ) { + dirruns = dirrunsUnique; + outermostContext = contextBackup; + } + + return unmatched; + }; + + return bySet ? + markFunction( superMatcher ) : + superMatcher; +} + +compile = Sizzle.compile = function( selector, match /* Internal Use Only */ ) { + var i, + setMatchers = [], + elementMatchers = [], + cached = compilerCache[ selector + " " ]; + + if ( !cached ) { + + // Generate a function of recursive functions that can be used to check each element + if ( !match ) { + match = tokenize( selector ); + } + i = match.length; + while ( i-- ) { + cached = matcherFromTokens( match[ i ] ); + if ( cached[ expando ] ) { + setMatchers.push( cached ); + } else { + elementMatchers.push( cached ); + } + } + + // Cache the compiled function + cached = compilerCache( + selector, + matcherFromGroupMatchers( elementMatchers, setMatchers ) + ); + + // Save selector and tokenization + cached.selector = selector; + } + return cached; +}; + +/** + * A low-level selection function that works with Sizzle's compiled + * selector functions + * @param {String|Function} selector A selector or a pre-compiled + * selector function built with Sizzle.compile + * @param {Element} context + * @param {Array} [results] + * @param {Array} [seed] A set of elements to match against + */ +select = Sizzle.select = function( selector, context, results, seed ) { + var i, tokens, token, type, find, + compiled = typeof selector === "function" && selector, + match = !seed && tokenize( ( selector = compiled.selector || selector ) ); + + results = results || []; + + // Try to minimize operations if there is only one selector in the list and no seed + // (the latter of which guarantees us context) + if ( match.length === 1 ) { + + // Reduce context if the leading compound selector is an ID + tokens = match[ 0 ] = match[ 0 ].slice( 0 ); + if ( tokens.length > 2 && ( token = tokens[ 0 ] ).type === "ID" && + context.nodeType === 9 && documentIsHTML && Expr.relative[ tokens[ 1 ].type ] ) { + + context = ( Expr.find[ "ID" ]( token.matches[ 0 ] + .replace( runescape, funescape ), context ) || [] )[ 0 ]; + if ( !context ) { + return results; + + // Precompiled matchers will still verify ancestry, so step up a level + } else if ( compiled ) { + context = context.parentNode; + } + + selector = selector.slice( tokens.shift().value.length ); + } + + // Fetch a seed set for right-to-left matching + i = matchExpr[ "needsContext" ].test( selector ) ? 0 : tokens.length; + while ( i-- ) { + token = tokens[ i ]; + + // Abort if we hit a combinator + if ( Expr.relative[ ( type = token.type ) ] ) { + break; + } + if ( ( find = Expr.find[ type ] ) ) { + + // Search, expanding context for leading sibling combinators + if ( ( seed = find( + token.matches[ 0 ].replace( runescape, funescape ), + rsibling.test( tokens[ 0 ].type ) && testContext( context.parentNode ) || + context + ) ) ) { + + // If seed is empty or no tokens remain, we can return early + tokens.splice( i, 1 ); + selector = seed.length && toSelector( tokens ); + if ( !selector ) { + push.apply( results, seed ); + return results; + } + + break; + } + } + } + } + + // Compile and execute a filtering function if one is not provided + // Provide `match` to avoid retokenization if we modified the selector above + ( compiled || compile( selector, match ) )( + seed, + context, + !documentIsHTML, + results, + !context || rsibling.test( selector ) && testContext( context.parentNode ) || context + ); + return results; +}; + +// One-time assignments + +// Sort stability +support.sortStable = expando.split( "" ).sort( sortOrder ).join( "" ) === expando; + +// Support: Chrome 14-35+ +// Always assume duplicates if they aren't passed to the comparison function +support.detectDuplicates = !!hasDuplicate; + +// Initialize against the default document +setDocument(); + +// Support: Webkit<537.32 - Safari 6.0.3/Chrome 25 (fixed in Chrome 27) +// Detached nodes confoundingly follow *each other* +support.sortDetached = assert( function( el ) { + + // Should return 1, but returns 4 (following) + return el.compareDocumentPosition( document.createElement( "fieldset" ) ) & 1; +} ); + +// Support: IE<8 +// Prevent attribute/property "interpolation" +// https://msdn.microsoft.com/en-us/library/ms536429%28VS.85%29.aspx +if ( !assert( function( el ) { + el.innerHTML = ""; + return el.firstChild.getAttribute( "href" ) === "#"; +} ) ) { + addHandle( "type|href|height|width", function( elem, name, isXML ) { + if ( !isXML ) { + return elem.getAttribute( name, name.toLowerCase() === "type" ? 1 : 2 ); + } + } ); +} + +// Support: IE<9 +// Use defaultValue in place of getAttribute("value") +if ( !support.attributes || !assert( function( el ) { + el.innerHTML = ""; + el.firstChild.setAttribute( "value", "" ); + return el.firstChild.getAttribute( "value" ) === ""; +} ) ) { + addHandle( "value", function( elem, _name, isXML ) { + if ( !isXML && elem.nodeName.toLowerCase() === "input" ) { + return elem.defaultValue; + } + } ); +} + +// Support: IE<9 +// Use getAttributeNode to fetch booleans when getAttribute lies +if ( !assert( function( el ) { + return el.getAttribute( "disabled" ) == null; +} ) ) { + addHandle( booleans, function( elem, name, isXML ) { + var val; + if ( !isXML ) { + return elem[ name ] === true ? name.toLowerCase() : + ( val = elem.getAttributeNode( name ) ) && val.specified ? + val.value : + null; + } + } ); +} + +return Sizzle; + +} )( window ); + + + +jQuery.find = Sizzle; +jQuery.expr = Sizzle.selectors; + +// Deprecated +jQuery.expr[ ":" ] = jQuery.expr.pseudos; +jQuery.uniqueSort = jQuery.unique = Sizzle.uniqueSort; +jQuery.text = Sizzle.getText; +jQuery.isXMLDoc = Sizzle.isXML; +jQuery.contains = Sizzle.contains; +jQuery.escapeSelector = Sizzle.escape; + + + + +var dir = function( elem, dir, until ) { + var matched = [], + truncate = until !== undefined; + + while ( ( elem = elem[ dir ] ) && elem.nodeType !== 9 ) { + if ( elem.nodeType === 1 ) { + if ( truncate && jQuery( elem ).is( until ) ) { + break; + } + matched.push( elem ); + } + } + return matched; +}; + + +var siblings = function( n, elem ) { + var matched = []; + + for ( ; n; n = n.nextSibling ) { + if ( n.nodeType === 1 && n !== elem ) { + matched.push( n ); + } + } + + return matched; +}; + + +var rneedsContext = jQuery.expr.match.needsContext; + + + +function nodeName( elem, name ) { + + return elem.nodeName && elem.nodeName.toLowerCase() === name.toLowerCase(); + +}; +var rsingleTag = ( /^<([a-z][^\/\0>:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i ); + + + +// Implement the identical functionality for filter and not +function winnow( elements, qualifier, not ) { + if ( isFunction( qualifier ) ) { + return jQuery.grep( elements, function( elem, i ) { + return !!qualifier.call( elem, i, elem ) !== not; + } ); + } + + // Single element + if ( qualifier.nodeType ) { + return jQuery.grep( elements, function( elem ) { + return ( elem === qualifier ) !== not; + } ); + } + + // Arraylike of elements (jQuery, arguments, Array) + if ( typeof qualifier !== "string" ) { + return jQuery.grep( elements, function( elem ) { + return ( indexOf.call( qualifier, elem ) > -1 ) !== not; + } ); + } + + // Filtered directly for both simple and complex selectors + return jQuery.filter( qualifier, elements, not ); +} + +jQuery.filter = function( expr, elems, not ) { + var elem = elems[ 0 ]; + + if ( not ) { + expr = ":not(" + expr + ")"; + } + + if ( elems.length === 1 && elem.nodeType === 1 ) { + return jQuery.find.matchesSelector( elem, expr ) ? [ elem ] : []; + } + + return jQuery.find.matches( expr, jQuery.grep( elems, function( elem ) { + return elem.nodeType === 1; + } ) ); +}; + +jQuery.fn.extend( { + find: function( selector ) { + var i, ret, + len = this.length, + self = this; + + if ( typeof selector !== "string" ) { + return this.pushStack( jQuery( selector ).filter( function() { + for ( i = 0; i < len; i++ ) { + if ( jQuery.contains( self[ i ], this ) ) { + return true; + } + } + } ) ); + } + + ret = this.pushStack( [] ); + + for ( i = 0; i < len; i++ ) { + jQuery.find( selector, self[ i ], ret ); + } + + return len > 1 ? jQuery.uniqueSort( ret ) : ret; + }, + filter: function( selector ) { + return this.pushStack( winnow( this, selector || [], false ) ); + }, + not: function( selector ) { + return this.pushStack( winnow( this, selector || [], true ) ); + }, + is: function( selector ) { + return !!winnow( + this, + + // If this is a positional/relative selector, check membership in the returned set + // so $("p:first").is("p:last") won't return true for a doc with two "p". + typeof selector === "string" && rneedsContext.test( selector ) ? + jQuery( selector ) : + selector || [], + false + ).length; + } +} ); + + +// Initialize a jQuery object + + +// A central reference to the root jQuery(document) +var rootjQuery, + + // A simple way to check for HTML strings + // Prioritize #id over to avoid XSS via location.hash (#9521) + // Strict HTML recognition (#11290: must start with <) + // Shortcut simple #id case for speed + rquickExpr = /^(?:\s*(<[\w\W]+>)[^>]*|#([\w-]+))$/, + + init = jQuery.fn.init = function( selector, context, root ) { + var match, elem; + + // HANDLE: $(""), $(null), $(undefined), $(false) + if ( !selector ) { + return this; + } + + // Method init() accepts an alternate rootjQuery + // so migrate can support jQuery.sub (gh-2101) + root = root || rootjQuery; + + // Handle HTML strings + if ( typeof selector === "string" ) { + if ( selector[ 0 ] === "<" && + selector[ selector.length - 1 ] === ">" && + selector.length >= 3 ) { + + // Assume that strings that start and end with <> are HTML and skip the regex check + match = [ null, selector, null ]; + + } else { + match = rquickExpr.exec( selector ); + } + + // Match html or make sure no context is specified for #id + if ( match && ( match[ 1 ] || !context ) ) { + + // HANDLE: $(html) -> $(array) + if ( match[ 1 ] ) { + context = context instanceof jQuery ? context[ 0 ] : context; + + // Option to run scripts is true for back-compat + // Intentionally let the error be thrown if parseHTML is not present + jQuery.merge( this, jQuery.parseHTML( + match[ 1 ], + context && context.nodeType ? context.ownerDocument || context : document, + true + ) ); + + // HANDLE: $(html, props) + if ( rsingleTag.test( match[ 1 ] ) && jQuery.isPlainObject( context ) ) { + for ( match in context ) { + + // Properties of context are called as methods if possible + if ( isFunction( this[ match ] ) ) { + this[ match ]( context[ match ] ); + + // ...and otherwise set as attributes + } else { + this.attr( match, context[ match ] ); + } + } + } + + return this; + + // HANDLE: $(#id) + } else { + elem = document.getElementById( match[ 2 ] ); + + if ( elem ) { + + // Inject the element directly into the jQuery object + this[ 0 ] = elem; + this.length = 1; + } + return this; + } + + // HANDLE: $(expr, $(...)) + } else if ( !context || context.jquery ) { + return ( context || root ).find( selector ); + + // HANDLE: $(expr, context) + // (which is just equivalent to: $(context).find(expr) + } else { + return this.constructor( context ).find( selector ); + } + + // HANDLE: $(DOMElement) + } else if ( selector.nodeType ) { + this[ 0 ] = selector; + this.length = 1; + return this; + + // HANDLE: $(function) + // Shortcut for document ready + } else if ( isFunction( selector ) ) { + return root.ready !== undefined ? + root.ready( selector ) : + + // Execute immediately if ready is not present + selector( jQuery ); + } + + return jQuery.makeArray( selector, this ); + }; + +// Give the init function the jQuery prototype for later instantiation +init.prototype = jQuery.fn; + +// Initialize central reference +rootjQuery = jQuery( document ); + + +var rparentsprev = /^(?:parents|prev(?:Until|All))/, + + // Methods guaranteed to produce a unique set when starting from a unique set + guaranteedUnique = { + children: true, + contents: true, + next: true, + prev: true + }; + +jQuery.fn.extend( { + has: function( target ) { + var targets = jQuery( target, this ), + l = targets.length; + + return this.filter( function() { + var i = 0; + for ( ; i < l; i++ ) { + if ( jQuery.contains( this, targets[ i ] ) ) { + return true; + } + } + } ); + }, + + closest: function( selectors, context ) { + var cur, + i = 0, + l = this.length, + matched = [], + targets = typeof selectors !== "string" && jQuery( selectors ); + + // Positional selectors never match, since there's no _selection_ context + if ( !rneedsContext.test( selectors ) ) { + for ( ; i < l; i++ ) { + for ( cur = this[ i ]; cur && cur !== context; cur = cur.parentNode ) { + + // Always skip document fragments + if ( cur.nodeType < 11 && ( targets ? + targets.index( cur ) > -1 : + + // Don't pass non-elements to Sizzle + cur.nodeType === 1 && + jQuery.find.matchesSelector( cur, selectors ) ) ) { + + matched.push( cur ); + break; + } + } + } + } + + return this.pushStack( matched.length > 1 ? jQuery.uniqueSort( matched ) : matched ); + }, + + // Determine the position of an element within the set + index: function( elem ) { + + // No argument, return index in parent + if ( !elem ) { + return ( this[ 0 ] && this[ 0 ].parentNode ) ? this.first().prevAll().length : -1; + } + + // Index in selector + if ( typeof elem === "string" ) { + return indexOf.call( jQuery( elem ), this[ 0 ] ); + } + + // Locate the position of the desired element + return indexOf.call( this, + + // If it receives a jQuery object, the first element is used + elem.jquery ? elem[ 0 ] : elem + ); + }, + + add: function( selector, context ) { + return this.pushStack( + jQuery.uniqueSort( + jQuery.merge( this.get(), jQuery( selector, context ) ) + ) + ); + }, + + addBack: function( selector ) { + return this.add( selector == null ? + this.prevObject : this.prevObject.filter( selector ) + ); + } +} ); + +function sibling( cur, dir ) { + while ( ( cur = cur[ dir ] ) && cur.nodeType !== 1 ) {} + return cur; +} + +jQuery.each( { + parent: function( elem ) { + var parent = elem.parentNode; + return parent && parent.nodeType !== 11 ? parent : null; + }, + parents: function( elem ) { + return dir( elem, "parentNode" ); + }, + parentsUntil: function( elem, _i, until ) { + return dir( elem, "parentNode", until ); + }, + next: function( elem ) { + return sibling( elem, "nextSibling" ); + }, + prev: function( elem ) { + return sibling( elem, "previousSibling" ); + }, + nextAll: function( elem ) { + return dir( elem, "nextSibling" ); + }, + prevAll: function( elem ) { + return dir( elem, "previousSibling" ); + }, + nextUntil: function( elem, _i, until ) { + return dir( elem, "nextSibling", until ); + }, + prevUntil: function( elem, _i, until ) { + return dir( elem, "previousSibling", until ); + }, + siblings: function( elem ) { + return siblings( ( elem.parentNode || {} ).firstChild, elem ); + }, + children: function( elem ) { + return siblings( elem.firstChild ); + }, + contents: function( elem ) { + if ( elem.contentDocument != null && + + // Support: IE 11+ + // elements with no `data` attribute has an object + // `contentDocument` with a `null` prototype. + getProto( elem.contentDocument ) ) { + + return elem.contentDocument; + } + + // Support: IE 9 - 11 only, iOS 7 only, Android Browser <=4.3 only + // Treat the template element as a regular one in browsers that + // don't support it. + if ( nodeName( elem, "template" ) ) { + elem = elem.content || elem; + } + + return jQuery.merge( [], elem.childNodes ); + } +}, function( name, fn ) { + jQuery.fn[ name ] = function( until, selector ) { + var matched = jQuery.map( this, fn, until ); + + if ( name.slice( -5 ) !== "Until" ) { + selector = until; + } + + if ( selector && typeof selector === "string" ) { + matched = jQuery.filter( selector, matched ); + } + + if ( this.length > 1 ) { + + // Remove duplicates + if ( !guaranteedUnique[ name ] ) { + jQuery.uniqueSort( matched ); + } + + // Reverse order for parents* and prev-derivatives + if ( rparentsprev.test( name ) ) { + matched.reverse(); + } + } + + return this.pushStack( matched ); + }; +} ); +var rnothtmlwhite = ( /[^\x20\t\r\n\f]+/g ); + + + +// Convert String-formatted options into Object-formatted ones +function createOptions( options ) { + var object = {}; + jQuery.each( options.match( rnothtmlwhite ) || [], function( _, flag ) { + object[ flag ] = true; + } ); + return object; +} + +/* + * Create a callback list using the following parameters: + * + * options: an optional list of space-separated options that will change how + * the callback list behaves or a more traditional option object + * + * By default a callback list will act like an event callback list and can be + * "fired" multiple times. + * + * Possible options: + * + * once: will ensure the callback list can only be fired once (like a Deferred) + * + * memory: will keep track of previous values and will call any callback added + * after the list has been fired right away with the latest "memorized" + * values (like a Deferred) + * + * unique: will ensure a callback can only be added once (no duplicate in the list) + * + * stopOnFalse: interrupt callings when a callback returns false + * + */ +jQuery.Callbacks = function( options ) { + + // Convert options from String-formatted to Object-formatted if needed + // (we check in cache first) + options = typeof options === "string" ? + createOptions( options ) : + jQuery.extend( {}, options ); + + var // Flag to know if list is currently firing + firing, + + // Last fire value for non-forgettable lists + memory, + + // Flag to know if list was already fired + fired, + + // Flag to prevent firing + locked, + + // Actual callback list + list = [], + + // Queue of execution data for repeatable lists + queue = [], + + // Index of currently firing callback (modified by add/remove as needed) + firingIndex = -1, + + // Fire callbacks + fire = function() { + + // Enforce single-firing + locked = locked || options.once; + + // Execute callbacks for all pending executions, + // respecting firingIndex overrides and runtime changes + fired = firing = true; + for ( ; queue.length; firingIndex = -1 ) { + memory = queue.shift(); + while ( ++firingIndex < list.length ) { + + // Run callback and check for early termination + if ( list[ firingIndex ].apply( memory[ 0 ], memory[ 1 ] ) === false && + options.stopOnFalse ) { + + // Jump to end and forget the data so .add doesn't re-fire + firingIndex = list.length; + memory = false; + } + } + } + + // Forget the data if we're done with it + if ( !options.memory ) { + memory = false; + } + + firing = false; + + // Clean up if we're done firing for good + if ( locked ) { + + // Keep an empty list if we have data for future add calls + if ( memory ) { + list = []; + + // Otherwise, this object is spent + } else { + list = ""; + } + } + }, + + // Actual Callbacks object + self = { + + // Add a callback or a collection of callbacks to the list + add: function() { + if ( list ) { + + // If we have memory from a past run, we should fire after adding + if ( memory && !firing ) { + firingIndex = list.length - 1; + queue.push( memory ); + } + + ( function add( args ) { + jQuery.each( args, function( _, arg ) { + if ( isFunction( arg ) ) { + if ( !options.unique || !self.has( arg ) ) { + list.push( arg ); + } + } else if ( arg && arg.length && toType( arg ) !== "string" ) { + + // Inspect recursively + add( arg ); + } + } ); + } )( arguments ); + + if ( memory && !firing ) { + fire(); + } + } + return this; + }, + + // Remove a callback from the list + remove: function() { + jQuery.each( arguments, function( _, arg ) { + var index; + while ( ( index = jQuery.inArray( arg, list, index ) ) > -1 ) { + list.splice( index, 1 ); + + // Handle firing indexes + if ( index <= firingIndex ) { + firingIndex--; + } + } + } ); + return this; + }, + + // Check if a given callback is in the list. + // If no argument is given, return whether or not list has callbacks attached. + has: function( fn ) { + return fn ? + jQuery.inArray( fn, list ) > -1 : + list.length > 0; + }, + + // Remove all callbacks from the list + empty: function() { + if ( list ) { + list = []; + } + return this; + }, + + // Disable .fire and .add + // Abort any current/pending executions + // Clear all callbacks and values + disable: function() { + locked = queue = []; + list = memory = ""; + return this; + }, + disabled: function() { + return !list; + }, + + // Disable .fire + // Also disable .add unless we have memory (since it would have no effect) + // Abort any pending executions + lock: function() { + locked = queue = []; + if ( !memory && !firing ) { + list = memory = ""; + } + return this; + }, + locked: function() { + return !!locked; + }, + + // Call all callbacks with the given context and arguments + fireWith: function( context, args ) { + if ( !locked ) { + args = args || []; + args = [ context, args.slice ? args.slice() : args ]; + queue.push( args ); + if ( !firing ) { + fire(); + } + } + return this; + }, + + // Call all the callbacks with the given arguments + fire: function() { + self.fireWith( this, arguments ); + return this; + }, + + // To know if the callbacks have already been called at least once + fired: function() { + return !!fired; + } + }; + + return self; +}; + + +function Identity( v ) { + return v; +} +function Thrower( ex ) { + throw ex; +} + +function adoptValue( value, resolve, reject, noValue ) { + var method; + + try { + + // Check for promise aspect first to privilege synchronous behavior + if ( value && isFunction( ( method = value.promise ) ) ) { + method.call( value ).done( resolve ).fail( reject ); + + // Other thenables + } else if ( value && isFunction( ( method = value.then ) ) ) { + method.call( value, resolve, reject ); + + // Other non-thenables + } else { + + // Control `resolve` arguments by letting Array#slice cast boolean `noValue` to integer: + // * false: [ value ].slice( 0 ) => resolve( value ) + // * true: [ value ].slice( 1 ) => resolve() + resolve.apply( undefined, [ value ].slice( noValue ) ); + } + + // For Promises/A+, convert exceptions into rejections + // Since jQuery.when doesn't unwrap thenables, we can skip the extra checks appearing in + // Deferred#then to conditionally suppress rejection. + } catch ( value ) { + + // Support: Android 4.0 only + // Strict mode functions invoked without .call/.apply get global-object context + reject.apply( undefined, [ value ] ); + } +} + +jQuery.extend( { + + Deferred: function( func ) { + var tuples = [ + + // action, add listener, callbacks, + // ... .then handlers, argument index, [final state] + [ "notify", "progress", jQuery.Callbacks( "memory" ), + jQuery.Callbacks( "memory" ), 2 ], + [ "resolve", "done", jQuery.Callbacks( "once memory" ), + jQuery.Callbacks( "once memory" ), 0, "resolved" ], + [ "reject", "fail", jQuery.Callbacks( "once memory" ), + jQuery.Callbacks( "once memory" ), 1, "rejected" ] + ], + state = "pending", + promise = { + state: function() { + return state; + }, + always: function() { + deferred.done( arguments ).fail( arguments ); + return this; + }, + "catch": function( fn ) { + return promise.then( null, fn ); + }, + + // Keep pipe for back-compat + pipe: function( /* fnDone, fnFail, fnProgress */ ) { + var fns = arguments; + + return jQuery.Deferred( function( newDefer ) { + jQuery.each( tuples, function( _i, tuple ) { + + // Map tuples (progress, done, fail) to arguments (done, fail, progress) + var fn = isFunction( fns[ tuple[ 4 ] ] ) && fns[ tuple[ 4 ] ]; + + // deferred.progress(function() { bind to newDefer or newDefer.notify }) + // deferred.done(function() { bind to newDefer or newDefer.resolve }) + // deferred.fail(function() { bind to newDefer or newDefer.reject }) + deferred[ tuple[ 1 ] ]( function() { + var returned = fn && fn.apply( this, arguments ); + if ( returned && isFunction( returned.promise ) ) { + returned.promise() + .progress( newDefer.notify ) + .done( newDefer.resolve ) + .fail( newDefer.reject ); + } else { + newDefer[ tuple[ 0 ] + "With" ]( + this, + fn ? [ returned ] : arguments + ); + } + } ); + } ); + fns = null; + } ).promise(); + }, + then: function( onFulfilled, onRejected, onProgress ) { + var maxDepth = 0; + function resolve( depth, deferred, handler, special ) { + return function() { + var that = this, + args = arguments, + mightThrow = function() { + var returned, then; + + // Support: Promises/A+ section 2.3.3.3.3 + // https://promisesaplus.com/#point-59 + // Ignore double-resolution attempts + if ( depth < maxDepth ) { + return; + } + + returned = handler.apply( that, args ); + + // Support: Promises/A+ section 2.3.1 + // https://promisesaplus.com/#point-48 + if ( returned === deferred.promise() ) { + throw new TypeError( "Thenable self-resolution" ); + } + + // Support: Promises/A+ sections 2.3.3.1, 3.5 + // https://promisesaplus.com/#point-54 + // https://promisesaplus.com/#point-75 + // Retrieve `then` only once + then = returned && + + // Support: Promises/A+ section 2.3.4 + // https://promisesaplus.com/#point-64 + // Only check objects and functions for thenability + ( typeof returned === "object" || + typeof returned === "function" ) && + returned.then; + + // Handle a returned thenable + if ( isFunction( then ) ) { + + // Special processors (notify) just wait for resolution + if ( special ) { + then.call( + returned, + resolve( maxDepth, deferred, Identity, special ), + resolve( maxDepth, deferred, Thrower, special ) + ); + + // Normal processors (resolve) also hook into progress + } else { + + // ...and disregard older resolution values + maxDepth++; + + then.call( + returned, + resolve( maxDepth, deferred, Identity, special ), + resolve( maxDepth, deferred, Thrower, special ), + resolve( maxDepth, deferred, Identity, + deferred.notifyWith ) + ); + } + + // Handle all other returned values + } else { + + // Only substitute handlers pass on context + // and multiple values (non-spec behavior) + if ( handler !== Identity ) { + that = undefined; + args = [ returned ]; + } + + // Process the value(s) + // Default process is resolve + ( special || deferred.resolveWith )( that, args ); + } + }, + + // Only normal processors (resolve) catch and reject exceptions + process = special ? + mightThrow : + function() { + try { + mightThrow(); + } catch ( e ) { + + if ( jQuery.Deferred.exceptionHook ) { + jQuery.Deferred.exceptionHook( e, + process.stackTrace ); + } + + // Support: Promises/A+ section 2.3.3.3.4.1 + // https://promisesaplus.com/#point-61 + // Ignore post-resolution exceptions + if ( depth + 1 >= maxDepth ) { + + // Only substitute handlers pass on context + // and multiple values (non-spec behavior) + if ( handler !== Thrower ) { + that = undefined; + args = [ e ]; + } + + deferred.rejectWith( that, args ); + } + } + }; + + // Support: Promises/A+ section 2.3.3.3.1 + // https://promisesaplus.com/#point-57 + // Re-resolve promises immediately to dodge false rejection from + // subsequent errors + if ( depth ) { + process(); + } else { + + // Call an optional hook to record the stack, in case of exception + // since it's otherwise lost when execution goes async + if ( jQuery.Deferred.getStackHook ) { + process.stackTrace = jQuery.Deferred.getStackHook(); + } + window.setTimeout( process ); + } + }; + } + + return jQuery.Deferred( function( newDefer ) { + + // progress_handlers.add( ... ) + tuples[ 0 ][ 3 ].add( + resolve( + 0, + newDefer, + isFunction( onProgress ) ? + onProgress : + Identity, + newDefer.notifyWith + ) + ); + + // fulfilled_handlers.add( ... ) + tuples[ 1 ][ 3 ].add( + resolve( + 0, + newDefer, + isFunction( onFulfilled ) ? + onFulfilled : + Identity + ) + ); + + // rejected_handlers.add( ... ) + tuples[ 2 ][ 3 ].add( + resolve( + 0, + newDefer, + isFunction( onRejected ) ? + onRejected : + Thrower + ) + ); + } ).promise(); + }, + + // Get a promise for this deferred + // If obj is provided, the promise aspect is added to the object + promise: function( obj ) { + return obj != null ? jQuery.extend( obj, promise ) : promise; + } + }, + deferred = {}; + + // Add list-specific methods + jQuery.each( tuples, function( i, tuple ) { + var list = tuple[ 2 ], + stateString = tuple[ 5 ]; + + // promise.progress = list.add + // promise.done = list.add + // promise.fail = list.add + promise[ tuple[ 1 ] ] = list.add; + + // Handle state + if ( stateString ) { + list.add( + function() { + + // state = "resolved" (i.e., fulfilled) + // state = "rejected" + state = stateString; + }, + + // rejected_callbacks.disable + // fulfilled_callbacks.disable + tuples[ 3 - i ][ 2 ].disable, + + // rejected_handlers.disable + // fulfilled_handlers.disable + tuples[ 3 - i ][ 3 ].disable, + + // progress_callbacks.lock + tuples[ 0 ][ 2 ].lock, + + // progress_handlers.lock + tuples[ 0 ][ 3 ].lock + ); + } + + // progress_handlers.fire + // fulfilled_handlers.fire + // rejected_handlers.fire + list.add( tuple[ 3 ].fire ); + + // deferred.notify = function() { deferred.notifyWith(...) } + // deferred.resolve = function() { deferred.resolveWith(...) } + // deferred.reject = function() { deferred.rejectWith(...) } + deferred[ tuple[ 0 ] ] = function() { + deferred[ tuple[ 0 ] + "With" ]( this === deferred ? undefined : this, arguments ); + return this; + }; + + // deferred.notifyWith = list.fireWith + // deferred.resolveWith = list.fireWith + // deferred.rejectWith = list.fireWith + deferred[ tuple[ 0 ] + "With" ] = list.fireWith; + } ); + + // Make the deferred a promise + promise.promise( deferred ); + + // Call given func if any + if ( func ) { + func.call( deferred, deferred ); + } + + // All done! + return deferred; + }, + + // Deferred helper + when: function( singleValue ) { + var + + // count of uncompleted subordinates + remaining = arguments.length, + + // count of unprocessed arguments + i = remaining, + + // subordinate fulfillment data + resolveContexts = Array( i ), + resolveValues = slice.call( arguments ), + + // the master Deferred + master = jQuery.Deferred(), + + // subordinate callback factory + updateFunc = function( i ) { + return function( value ) { + resolveContexts[ i ] = this; + resolveValues[ i ] = arguments.length > 1 ? slice.call( arguments ) : value; + if ( !( --remaining ) ) { + master.resolveWith( resolveContexts, resolveValues ); + } + }; + }; + + // Single- and empty arguments are adopted like Promise.resolve + if ( remaining <= 1 ) { + adoptValue( singleValue, master.done( updateFunc( i ) ).resolve, master.reject, + !remaining ); + + // Use .then() to unwrap secondary thenables (cf. gh-3000) + if ( master.state() === "pending" || + isFunction( resolveValues[ i ] && resolveValues[ i ].then ) ) { + + return master.then(); + } + } + + // Multiple arguments are aggregated like Promise.all array elements + while ( i-- ) { + adoptValue( resolveValues[ i ], updateFunc( i ), master.reject ); + } + + return master.promise(); + } +} ); + + +// These usually indicate a programmer mistake during development, +// warn about them ASAP rather than swallowing them by default. +var rerrorNames = /^(Eval|Internal|Range|Reference|Syntax|Type|URI)Error$/; + +jQuery.Deferred.exceptionHook = function( error, stack ) { + + // Support: IE 8 - 9 only + // Console exists when dev tools are open, which can happen at any time + if ( window.console && window.console.warn && error && rerrorNames.test( error.name ) ) { + window.console.warn( "jQuery.Deferred exception: " + error.message, error.stack, stack ); + } +}; + + + + +jQuery.readyException = function( error ) { + window.setTimeout( function() { + throw error; + } ); +}; + + + + +// The deferred used on DOM ready +var readyList = jQuery.Deferred(); + +jQuery.fn.ready = function( fn ) { + + readyList + .then( fn ) + + // Wrap jQuery.readyException in a function so that the lookup + // happens at the time of error handling instead of callback + // registration. + .catch( function( error ) { + jQuery.readyException( error ); + } ); + + return this; +}; + +jQuery.extend( { + + // Is the DOM ready to be used? Set to true once it occurs. + isReady: false, + + // A counter to track how many items to wait for before + // the ready event fires. See #6781 + readyWait: 1, + + // Handle when the DOM is ready + ready: function( wait ) { + + // Abort if there are pending holds or we're already ready + if ( wait === true ? --jQuery.readyWait : jQuery.isReady ) { + return; + } + + // Remember that the DOM is ready + jQuery.isReady = true; + + // If a normal DOM Ready event fired, decrement, and wait if need be + if ( wait !== true && --jQuery.readyWait > 0 ) { + return; + } + + // If there are functions bound, to execute + readyList.resolveWith( document, [ jQuery ] ); + } +} ); + +jQuery.ready.then = readyList.then; + +// The ready event handler and self cleanup method +function completed() { + document.removeEventListener( "DOMContentLoaded", completed ); + window.removeEventListener( "load", completed ); + jQuery.ready(); +} + +// Catch cases where $(document).ready() is called +// after the browser event has already occurred. +// Support: IE <=9 - 10 only +// Older IE sometimes signals "interactive" too soon +if ( document.readyState === "complete" || + ( document.readyState !== "loading" && !document.documentElement.doScroll ) ) { + + // Handle it asynchronously to allow scripts the opportunity to delay ready + window.setTimeout( jQuery.ready ); + +} else { + + // Use the handy event callback + document.addEventListener( "DOMContentLoaded", completed ); + + // A fallback to window.onload, that will always work + window.addEventListener( "load", completed ); +} + + + + +// Multifunctional method to get and set values of a collection +// The value/s can optionally be executed if it's a function +var access = function( elems, fn, key, value, chainable, emptyGet, raw ) { + var i = 0, + len = elems.length, + bulk = key == null; + + // Sets many values + if ( toType( key ) === "object" ) { + chainable = true; + for ( i in key ) { + access( elems, fn, i, key[ i ], true, emptyGet, raw ); + } + + // Sets one value + } else if ( value !== undefined ) { + chainable = true; + + if ( !isFunction( value ) ) { + raw = true; + } + + if ( bulk ) { + + // Bulk operations run against the entire set + if ( raw ) { + fn.call( elems, value ); + fn = null; + + // ...except when executing function values + } else { + bulk = fn; + fn = function( elem, _key, value ) { + return bulk.call( jQuery( elem ), value ); + }; + } + } + + if ( fn ) { + for ( ; i < len; i++ ) { + fn( + elems[ i ], key, raw ? + value : + value.call( elems[ i ], i, fn( elems[ i ], key ) ) + ); + } + } + } + + if ( chainable ) { + return elems; + } + + // Gets + if ( bulk ) { + return fn.call( elems ); + } + + return len ? fn( elems[ 0 ], key ) : emptyGet; +}; + + +// Matches dashed string for camelizing +var rmsPrefix = /^-ms-/, + rdashAlpha = /-([a-z])/g; + +// Used by camelCase as callback to replace() +function fcamelCase( _all, letter ) { + return letter.toUpperCase(); +} + +// Convert dashed to camelCase; used by the css and data modules +// Support: IE <=9 - 11, Edge 12 - 15 +// Microsoft forgot to hump their vendor prefix (#9572) +function camelCase( string ) { + return string.replace( rmsPrefix, "ms-" ).replace( rdashAlpha, fcamelCase ); +} +var acceptData = function( owner ) { + + // Accepts only: + // - Node + // - Node.ELEMENT_NODE + // - Node.DOCUMENT_NODE + // - Object + // - Any + return owner.nodeType === 1 || owner.nodeType === 9 || !( +owner.nodeType ); +}; + + + + +function Data() { + this.expando = jQuery.expando + Data.uid++; +} + +Data.uid = 1; + +Data.prototype = { + + cache: function( owner ) { + + // Check if the owner object already has a cache + var value = owner[ this.expando ]; + + // If not, create one + if ( !value ) { + value = {}; + + // We can accept data for non-element nodes in modern browsers, + // but we should not, see #8335. + // Always return an empty object. + if ( acceptData( owner ) ) { + + // If it is a node unlikely to be stringify-ed or looped over + // use plain assignment + if ( owner.nodeType ) { + owner[ this.expando ] = value; + + // Otherwise secure it in a non-enumerable property + // configurable must be true to allow the property to be + // deleted when data is removed + } else { + Object.defineProperty( owner, this.expando, { + value: value, + configurable: true + } ); + } + } + } + + return value; + }, + set: function( owner, data, value ) { + var prop, + cache = this.cache( owner ); + + // Handle: [ owner, key, value ] args + // Always use camelCase key (gh-2257) + if ( typeof data === "string" ) { + cache[ camelCase( data ) ] = value; + + // Handle: [ owner, { properties } ] args + } else { + + // Copy the properties one-by-one to the cache object + for ( prop in data ) { + cache[ camelCase( prop ) ] = data[ prop ]; + } + } + return cache; + }, + get: function( owner, key ) { + return key === undefined ? + this.cache( owner ) : + + // Always use camelCase key (gh-2257) + owner[ this.expando ] && owner[ this.expando ][ camelCase( key ) ]; + }, + access: function( owner, key, value ) { + + // In cases where either: + // + // 1. No key was specified + // 2. A string key was specified, but no value provided + // + // Take the "read" path and allow the get method to determine + // which value to return, respectively either: + // + // 1. The entire cache object + // 2. The data stored at the key + // + if ( key === undefined || + ( ( key && typeof key === "string" ) && value === undefined ) ) { + + return this.get( owner, key ); + } + + // When the key is not a string, or both a key and value + // are specified, set or extend (existing objects) with either: + // + // 1. An object of properties + // 2. A key and value + // + this.set( owner, key, value ); + + // Since the "set" path can have two possible entry points + // return the expected data based on which path was taken[*] + return value !== undefined ? value : key; + }, + remove: function( owner, key ) { + var i, + cache = owner[ this.expando ]; + + if ( cache === undefined ) { + return; + } + + if ( key !== undefined ) { + + // Support array or space separated string of keys + if ( Array.isArray( key ) ) { + + // If key is an array of keys... + // We always set camelCase keys, so remove that. + key = key.map( camelCase ); + } else { + key = camelCase( key ); + + // If a key with the spaces exists, use it. + // Otherwise, create an array by matching non-whitespace + key = key in cache ? + [ key ] : + ( key.match( rnothtmlwhite ) || [] ); + } + + i = key.length; + + while ( i-- ) { + delete cache[ key[ i ] ]; + } + } + + // Remove the expando if there's no more data + if ( key === undefined || jQuery.isEmptyObject( cache ) ) { + + // Support: Chrome <=35 - 45 + // Webkit & Blink performance suffers when deleting properties + // from DOM nodes, so set to undefined instead + // https://bugs.chromium.org/p/chromium/issues/detail?id=378607 (bug restricted) + if ( owner.nodeType ) { + owner[ this.expando ] = undefined; + } else { + delete owner[ this.expando ]; + } + } + }, + hasData: function( owner ) { + var cache = owner[ this.expando ]; + return cache !== undefined && !jQuery.isEmptyObject( cache ); + } +}; +var dataPriv = new Data(); + +var dataUser = new Data(); + + + +// Implementation Summary +// +// 1. Enforce API surface and semantic compatibility with 1.9.x branch +// 2. Improve the module's maintainability by reducing the storage +// paths to a single mechanism. +// 3. Use the same single mechanism to support "private" and "user" data. +// 4. _Never_ expose "private" data to user code (TODO: Drop _data, _removeData) +// 5. Avoid exposing implementation details on user objects (eg. expando properties) +// 6. Provide a clear path for implementation upgrade to WeakMap in 2014 + +var rbrace = /^(?:\{[\w\W]*\}|\[[\w\W]*\])$/, + rmultiDash = /[A-Z]/g; + +function getData( data ) { + if ( data === "true" ) { + return true; + } + + if ( data === "false" ) { + return false; + } + + if ( data === "null" ) { + return null; + } + + // Only convert to a number if it doesn't change the string + if ( data === +data + "" ) { + return +data; + } + + if ( rbrace.test( data ) ) { + return JSON.parse( data ); + } + + return data; +} + +function dataAttr( elem, key, data ) { + var name; + + // If nothing was found internally, try to fetch any + // data from the HTML5 data-* attribute + if ( data === undefined && elem.nodeType === 1 ) { + name = "data-" + key.replace( rmultiDash, "-$&" ).toLowerCase(); + data = elem.getAttribute( name ); + + if ( typeof data === "string" ) { + try { + data = getData( data ); + } catch ( e ) {} + + // Make sure we set the data so it isn't changed later + dataUser.set( elem, key, data ); + } else { + data = undefined; + } + } + return data; +} + +jQuery.extend( { + hasData: function( elem ) { + return dataUser.hasData( elem ) || dataPriv.hasData( elem ); + }, + + data: function( elem, name, data ) { + return dataUser.access( elem, name, data ); + }, + + removeData: function( elem, name ) { + dataUser.remove( elem, name ); + }, + + // TODO: Now that all calls to _data and _removeData have been replaced + // with direct calls to dataPriv methods, these can be deprecated. + _data: function( elem, name, data ) { + return dataPriv.access( elem, name, data ); + }, + + _removeData: function( elem, name ) { + dataPriv.remove( elem, name ); + } +} ); + +jQuery.fn.extend( { + data: function( key, value ) { + var i, name, data, + elem = this[ 0 ], + attrs = elem && elem.attributes; + + // Gets all values + if ( key === undefined ) { + if ( this.length ) { + data = dataUser.get( elem ); + + if ( elem.nodeType === 1 && !dataPriv.get( elem, "hasDataAttrs" ) ) { + i = attrs.length; + while ( i-- ) { + + // Support: IE 11 only + // The attrs elements can be null (#14894) + if ( attrs[ i ] ) { + name = attrs[ i ].name; + if ( name.indexOf( "data-" ) === 0 ) { + name = camelCase( name.slice( 5 ) ); + dataAttr( elem, name, data[ name ] ); + } + } + } + dataPriv.set( elem, "hasDataAttrs", true ); + } + } + + return data; + } + + // Sets multiple values + if ( typeof key === "object" ) { + return this.each( function() { + dataUser.set( this, key ); + } ); + } + + return access( this, function( value ) { + var data; + + // The calling jQuery object (element matches) is not empty + // (and therefore has an element appears at this[ 0 ]) and the + // `value` parameter was not undefined. An empty jQuery object + // will result in `undefined` for elem = this[ 0 ] which will + // throw an exception if an attempt to read a data cache is made. + if ( elem && value === undefined ) { + + // Attempt to get data from the cache + // The key will always be camelCased in Data + data = dataUser.get( elem, key ); + if ( data !== undefined ) { + return data; + } + + // Attempt to "discover" the data in + // HTML5 custom data-* attrs + data = dataAttr( elem, key ); + if ( data !== undefined ) { + return data; + } + + // We tried really hard, but the data doesn't exist. + return; + } + + // Set the data... + this.each( function() { + + // We always store the camelCased key + dataUser.set( this, key, value ); + } ); + }, null, value, arguments.length > 1, null, true ); + }, + + removeData: function( key ) { + return this.each( function() { + dataUser.remove( this, key ); + } ); + } +} ); + + +jQuery.extend( { + queue: function( elem, type, data ) { + var queue; + + if ( elem ) { + type = ( type || "fx" ) + "queue"; + queue = dataPriv.get( elem, type ); + + // Speed up dequeue by getting out quickly if this is just a lookup + if ( data ) { + if ( !queue || Array.isArray( data ) ) { + queue = dataPriv.access( elem, type, jQuery.makeArray( data ) ); + } else { + queue.push( data ); + } + } + return queue || []; + } + }, + + dequeue: function( elem, type ) { + type = type || "fx"; + + var queue = jQuery.queue( elem, type ), + startLength = queue.length, + fn = queue.shift(), + hooks = jQuery._queueHooks( elem, type ), + next = function() { + jQuery.dequeue( elem, type ); + }; + + // If the fx queue is dequeued, always remove the progress sentinel + if ( fn === "inprogress" ) { + fn = queue.shift(); + startLength--; + } + + if ( fn ) { + + // Add a progress sentinel to prevent the fx queue from being + // automatically dequeued + if ( type === "fx" ) { + queue.unshift( "inprogress" ); + } + + // Clear up the last queue stop function + delete hooks.stop; + fn.call( elem, next, hooks ); + } + + if ( !startLength && hooks ) { + hooks.empty.fire(); + } + }, + + // Not public - generate a queueHooks object, or return the current one + _queueHooks: function( elem, type ) { + var key = type + "queueHooks"; + return dataPriv.get( elem, key ) || dataPriv.access( elem, key, { + empty: jQuery.Callbacks( "once memory" ).add( function() { + dataPriv.remove( elem, [ type + "queue", key ] ); + } ) + } ); + } +} ); + +jQuery.fn.extend( { + queue: function( type, data ) { + var setter = 2; + + if ( typeof type !== "string" ) { + data = type; + type = "fx"; + setter--; + } + + if ( arguments.length < setter ) { + return jQuery.queue( this[ 0 ], type ); + } + + return data === undefined ? + this : + this.each( function() { + var queue = jQuery.queue( this, type, data ); + + // Ensure a hooks for this queue + jQuery._queueHooks( this, type ); + + if ( type === "fx" && queue[ 0 ] !== "inprogress" ) { + jQuery.dequeue( this, type ); + } + } ); + }, + dequeue: function( type ) { + return this.each( function() { + jQuery.dequeue( this, type ); + } ); + }, + clearQueue: function( type ) { + return this.queue( type || "fx", [] ); + }, + + // Get a promise resolved when queues of a certain type + // are emptied (fx is the type by default) + promise: function( type, obj ) { + var tmp, + count = 1, + defer = jQuery.Deferred(), + elements = this, + i = this.length, + resolve = function() { + if ( !( --count ) ) { + defer.resolveWith( elements, [ elements ] ); + } + }; + + if ( typeof type !== "string" ) { + obj = type; + type = undefined; + } + type = type || "fx"; + + while ( i-- ) { + tmp = dataPriv.get( elements[ i ], type + "queueHooks" ); + if ( tmp && tmp.empty ) { + count++; + tmp.empty.add( resolve ); + } + } + resolve(); + return defer.promise( obj ); + } +} ); +var pnum = ( /[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/ ).source; + +var rcssNum = new RegExp( "^(?:([+-])=|)(" + pnum + ")([a-z%]*)$", "i" ); + + +var cssExpand = [ "Top", "Right", "Bottom", "Left" ]; + +var documentElement = document.documentElement; + + + + var isAttached = function( elem ) { + return jQuery.contains( elem.ownerDocument, elem ); + }, + composed = { composed: true }; + + // Support: IE 9 - 11+, Edge 12 - 18+, iOS 10.0 - 10.2 only + // Check attachment across shadow DOM boundaries when possible (gh-3504) + // Support: iOS 10.0-10.2 only + // Early iOS 10 versions support `attachShadow` but not `getRootNode`, + // leading to errors. We need to check for `getRootNode`. + if ( documentElement.getRootNode ) { + isAttached = function( elem ) { + return jQuery.contains( elem.ownerDocument, elem ) || + elem.getRootNode( composed ) === elem.ownerDocument; + }; + } +var isHiddenWithinTree = function( elem, el ) { + + // isHiddenWithinTree might be called from jQuery#filter function; + // in that case, element will be second argument + elem = el || elem; + + // Inline style trumps all + return elem.style.display === "none" || + elem.style.display === "" && + + // Otherwise, check computed style + // Support: Firefox <=43 - 45 + // Disconnected elements can have computed display: none, so first confirm that elem is + // in the document. + isAttached( elem ) && + + jQuery.css( elem, "display" ) === "none"; + }; + + + +function adjustCSS( elem, prop, valueParts, tween ) { + var adjusted, scale, + maxIterations = 20, + currentValue = tween ? + function() { + return tween.cur(); + } : + function() { + return jQuery.css( elem, prop, "" ); + }, + initial = currentValue(), + unit = valueParts && valueParts[ 3 ] || ( jQuery.cssNumber[ prop ] ? "" : "px" ), + + // Starting value computation is required for potential unit mismatches + initialInUnit = elem.nodeType && + ( jQuery.cssNumber[ prop ] || unit !== "px" && +initial ) && + rcssNum.exec( jQuery.css( elem, prop ) ); + + if ( initialInUnit && initialInUnit[ 3 ] !== unit ) { + + // Support: Firefox <=54 + // Halve the iteration target value to prevent interference from CSS upper bounds (gh-2144) + initial = initial / 2; + + // Trust units reported by jQuery.css + unit = unit || initialInUnit[ 3 ]; + + // Iteratively approximate from a nonzero starting point + initialInUnit = +initial || 1; + + while ( maxIterations-- ) { + + // Evaluate and update our best guess (doubling guesses that zero out). + // Finish if the scale equals or crosses 1 (making the old*new product non-positive). + jQuery.style( elem, prop, initialInUnit + unit ); + if ( ( 1 - scale ) * ( 1 - ( scale = currentValue() / initial || 0.5 ) ) <= 0 ) { + maxIterations = 0; + } + initialInUnit = initialInUnit / scale; + + } + + initialInUnit = initialInUnit * 2; + jQuery.style( elem, prop, initialInUnit + unit ); + + // Make sure we update the tween properties later on + valueParts = valueParts || []; + } + + if ( valueParts ) { + initialInUnit = +initialInUnit || +initial || 0; + + // Apply relative offset (+=/-=) if specified + adjusted = valueParts[ 1 ] ? + initialInUnit + ( valueParts[ 1 ] + 1 ) * valueParts[ 2 ] : + +valueParts[ 2 ]; + if ( tween ) { + tween.unit = unit; + tween.start = initialInUnit; + tween.end = adjusted; + } + } + return adjusted; +} + + +var defaultDisplayMap = {}; + +function getDefaultDisplay( elem ) { + var temp, + doc = elem.ownerDocument, + nodeName = elem.nodeName, + display = defaultDisplayMap[ nodeName ]; + + if ( display ) { + return display; + } + + temp = doc.body.appendChild( doc.createElement( nodeName ) ); + display = jQuery.css( temp, "display" ); + + temp.parentNode.removeChild( temp ); + + if ( display === "none" ) { + display = "block"; + } + defaultDisplayMap[ nodeName ] = display; + + return display; +} + +function showHide( elements, show ) { + var display, elem, + values = [], + index = 0, + length = elements.length; + + // Determine new display value for elements that need to change + for ( ; index < length; index++ ) { + elem = elements[ index ]; + if ( !elem.style ) { + continue; + } + + display = elem.style.display; + if ( show ) { + + // Since we force visibility upon cascade-hidden elements, an immediate (and slow) + // check is required in this first loop unless we have a nonempty display value (either + // inline or about-to-be-restored) + if ( display === "none" ) { + values[ index ] = dataPriv.get( elem, "display" ) || null; + if ( !values[ index ] ) { + elem.style.display = ""; + } + } + if ( elem.style.display === "" && isHiddenWithinTree( elem ) ) { + values[ index ] = getDefaultDisplay( elem ); + } + } else { + if ( display !== "none" ) { + values[ index ] = "none"; + + // Remember what we're overwriting + dataPriv.set( elem, "display", display ); + } + } + } + + // Set the display of the elements in a second loop to avoid constant reflow + for ( index = 0; index < length; index++ ) { + if ( values[ index ] != null ) { + elements[ index ].style.display = values[ index ]; + } + } + + return elements; +} + +jQuery.fn.extend( { + show: function() { + return showHide( this, true ); + }, + hide: function() { + return showHide( this ); + }, + toggle: function( state ) { + if ( typeof state === "boolean" ) { + return state ? this.show() : this.hide(); + } + + return this.each( function() { + if ( isHiddenWithinTree( this ) ) { + jQuery( this ).show(); + } else { + jQuery( this ).hide(); + } + } ); + } +} ); +var rcheckableType = ( /^(?:checkbox|radio)$/i ); + +var rtagName = ( /<([a-z][^\/\0>\x20\t\r\n\f]*)/i ); + +var rscriptType = ( /^$|^module$|\/(?:java|ecma)script/i ); + + + +( function() { + var fragment = document.createDocumentFragment(), + div = fragment.appendChild( document.createElement( "div" ) ), + input = document.createElement( "input" ); + + // Support: Android 4.0 - 4.3 only + // Check state lost if the name is set (#11217) + // Support: Windows Web Apps (WWA) + // `name` and `type` must use .setAttribute for WWA (#14901) + input.setAttribute( "type", "radio" ); + input.setAttribute( "checked", "checked" ); + input.setAttribute( "name", "t" ); + + div.appendChild( input ); + + // Support: Android <=4.1 only + // Older WebKit doesn't clone checked state correctly in fragments + support.checkClone = div.cloneNode( true ).cloneNode( true ).lastChild.checked; + + // Support: IE <=11 only + // Make sure textarea (and checkbox) defaultValue is properly cloned + div.innerHTML = ""; + support.noCloneChecked = !!div.cloneNode( true ).lastChild.defaultValue; + + // Support: IE <=9 only + // IE <=9 replaces "; + support.option = !!div.lastChild; +} )(); + + +// We have to close these tags to support XHTML (#13200) +var wrapMap = { + + // XHTML parsers do not magically insert elements in the + // same way that tag soup parsers do. So we cannot shorten + // this by omitting or other required elements. + thead: [ 1, "", "
" ], + col: [ 2, "", "
" ], + tr: [ 2, "", "
" ], + td: [ 3, "", "
" ], + + _default: [ 0, "", "" ] +}; + +wrapMap.tbody = wrapMap.tfoot = wrapMap.colgroup = wrapMap.caption = wrapMap.thead; +wrapMap.th = wrapMap.td; + +// Support: IE <=9 only +if ( !support.option ) { + wrapMap.optgroup = wrapMap.option = [ 1, "" ]; +} + + +function getAll( context, tag ) { + + // Support: IE <=9 - 11 only + // Use typeof to avoid zero-argument method invocation on host objects (#15151) + var ret; + + if ( typeof context.getElementsByTagName !== "undefined" ) { + ret = context.getElementsByTagName( tag || "*" ); + + } else if ( typeof context.querySelectorAll !== "undefined" ) { + ret = context.querySelectorAll( tag || "*" ); + + } else { + ret = []; + } + + if ( tag === undefined || tag && nodeName( context, tag ) ) { + return jQuery.merge( [ context ], ret ); + } + + return ret; +} + + +// Mark scripts as having already been evaluated +function setGlobalEval( elems, refElements ) { + var i = 0, + l = elems.length; + + for ( ; i < l; i++ ) { + dataPriv.set( + elems[ i ], + "globalEval", + !refElements || dataPriv.get( refElements[ i ], "globalEval" ) + ); + } +} + + +var rhtml = /<|&#?\w+;/; + +function buildFragment( elems, context, scripts, selection, ignored ) { + var elem, tmp, tag, wrap, attached, j, + fragment = context.createDocumentFragment(), + nodes = [], + i = 0, + l = elems.length; + + for ( ; i < l; i++ ) { + elem = elems[ i ]; + + if ( elem || elem === 0 ) { + + // Add nodes directly + if ( toType( elem ) === "object" ) { + + // Support: Android <=4.0 only, PhantomJS 1 only + // push.apply(_, arraylike) throws on ancient WebKit + jQuery.merge( nodes, elem.nodeType ? [ elem ] : elem ); + + // Convert non-html into a text node + } else if ( !rhtml.test( elem ) ) { + nodes.push( context.createTextNode( elem ) ); + + // Convert html into DOM nodes + } else { + tmp = tmp || fragment.appendChild( context.createElement( "div" ) ); + + // Deserialize a standard representation + tag = ( rtagName.exec( elem ) || [ "", "" ] )[ 1 ].toLowerCase(); + wrap = wrapMap[ tag ] || wrapMap._default; + tmp.innerHTML = wrap[ 1 ] + jQuery.htmlPrefilter( elem ) + wrap[ 2 ]; + + // Descend through wrappers to the right content + j = wrap[ 0 ]; + while ( j-- ) { + tmp = tmp.lastChild; + } + + // Support: Android <=4.0 only, PhantomJS 1 only + // push.apply(_, arraylike) throws on ancient WebKit + jQuery.merge( nodes, tmp.childNodes ); + + // Remember the top-level container + tmp = fragment.firstChild; + + // Ensure the created nodes are orphaned (#12392) + tmp.textContent = ""; + } + } + } + + // Remove wrapper from fragment + fragment.textContent = ""; + + i = 0; + while ( ( elem = nodes[ i++ ] ) ) { + + // Skip elements already in the context collection (trac-4087) + if ( selection && jQuery.inArray( elem, selection ) > -1 ) { + if ( ignored ) { + ignored.push( elem ); + } + continue; + } + + attached = isAttached( elem ); + + // Append to fragment + tmp = getAll( fragment.appendChild( elem ), "script" ); + + // Preserve script evaluation history + if ( attached ) { + setGlobalEval( tmp ); + } + + // Capture executables + if ( scripts ) { + j = 0; + while ( ( elem = tmp[ j++ ] ) ) { + if ( rscriptType.test( elem.type || "" ) ) { + scripts.push( elem ); + } + } + } + } + + return fragment; +} + + +var + rkeyEvent = /^key/, + rmouseEvent = /^(?:mouse|pointer|contextmenu|drag|drop)|click/, + rtypenamespace = /^([^.]*)(?:\.(.+)|)/; + +function returnTrue() { + return true; +} + +function returnFalse() { + return false; +} + +// Support: IE <=9 - 11+ +// focus() and blur() are asynchronous, except when they are no-op. +// So expect focus to be synchronous when the element is already active, +// and blur to be synchronous when the element is not already active. +// (focus and blur are always synchronous in other supported browsers, +// this just defines when we can count on it). +function expectSync( elem, type ) { + return ( elem === safeActiveElement() ) === ( type === "focus" ); +} + +// Support: IE <=9 only +// Accessing document.activeElement can throw unexpectedly +// https://bugs.jquery.com/ticket/13393 +function safeActiveElement() { + try { + return document.activeElement; + } catch ( err ) { } +} + +function on( elem, types, selector, data, fn, one ) { + var origFn, type; + + // Types can be a map of types/handlers + if ( typeof types === "object" ) { + + // ( types-Object, selector, data ) + if ( typeof selector !== "string" ) { + + // ( types-Object, data ) + data = data || selector; + selector = undefined; + } + for ( type in types ) { + on( elem, type, selector, data, types[ type ], one ); + } + return elem; + } + + if ( data == null && fn == null ) { + + // ( types, fn ) + fn = selector; + data = selector = undefined; + } else if ( fn == null ) { + if ( typeof selector === "string" ) { + + // ( types, selector, fn ) + fn = data; + data = undefined; + } else { + + // ( types, data, fn ) + fn = data; + data = selector; + selector = undefined; + } + } + if ( fn === false ) { + fn = returnFalse; + } else if ( !fn ) { + return elem; + } + + if ( one === 1 ) { + origFn = fn; + fn = function( event ) { + + // Can use an empty set, since event contains the info + jQuery().off( event ); + return origFn.apply( this, arguments ); + }; + + // Use same guid so caller can remove using origFn + fn.guid = origFn.guid || ( origFn.guid = jQuery.guid++ ); + } + return elem.each( function() { + jQuery.event.add( this, types, fn, data, selector ); + } ); +} + +/* + * Helper functions for managing events -- not part of the public interface. + * Props to Dean Edwards' addEvent library for many of the ideas. + */ +jQuery.event = { + + global: {}, + + add: function( elem, types, handler, data, selector ) { + + var handleObjIn, eventHandle, tmp, + events, t, handleObj, + special, handlers, type, namespaces, origType, + elemData = dataPriv.get( elem ); + + // Only attach events to objects that accept data + if ( !acceptData( elem ) ) { + return; + } + + // Caller can pass in an object of custom data in lieu of the handler + if ( handler.handler ) { + handleObjIn = handler; + handler = handleObjIn.handler; + selector = handleObjIn.selector; + } + + // Ensure that invalid selectors throw exceptions at attach time + // Evaluate against documentElement in case elem is a non-element node (e.g., document) + if ( selector ) { + jQuery.find.matchesSelector( documentElement, selector ); + } + + // Make sure that the handler has a unique ID, used to find/remove it later + if ( !handler.guid ) { + handler.guid = jQuery.guid++; + } + + // Init the element's event structure and main handler, if this is the first + if ( !( events = elemData.events ) ) { + events = elemData.events = Object.create( null ); + } + if ( !( eventHandle = elemData.handle ) ) { + eventHandle = elemData.handle = function( e ) { + + // Discard the second event of a jQuery.event.trigger() and + // when an event is called after a page has unloaded + return typeof jQuery !== "undefined" && jQuery.event.triggered !== e.type ? + jQuery.event.dispatch.apply( elem, arguments ) : undefined; + }; + } + + // Handle multiple events separated by a space + types = ( types || "" ).match( rnothtmlwhite ) || [ "" ]; + t = types.length; + while ( t-- ) { + tmp = rtypenamespace.exec( types[ t ] ) || []; + type = origType = tmp[ 1 ]; + namespaces = ( tmp[ 2 ] || "" ).split( "." ).sort(); + + // There *must* be a type, no attaching namespace-only handlers + if ( !type ) { + continue; + } + + // If event changes its type, use the special event handlers for the changed type + special = jQuery.event.special[ type ] || {}; + + // If selector defined, determine special event api type, otherwise given type + type = ( selector ? special.delegateType : special.bindType ) || type; + + // Update special based on newly reset type + special = jQuery.event.special[ type ] || {}; + + // handleObj is passed to all event handlers + handleObj = jQuery.extend( { + type: type, + origType: origType, + data: data, + handler: handler, + guid: handler.guid, + selector: selector, + needsContext: selector && jQuery.expr.match.needsContext.test( selector ), + namespace: namespaces.join( "." ) + }, handleObjIn ); + + // Init the event handler queue if we're the first + if ( !( handlers = events[ type ] ) ) { + handlers = events[ type ] = []; + handlers.delegateCount = 0; + + // Only use addEventListener if the special events handler returns false + if ( !special.setup || + special.setup.call( elem, data, namespaces, eventHandle ) === false ) { + + if ( elem.addEventListener ) { + elem.addEventListener( type, eventHandle ); + } + } + } + + if ( special.add ) { + special.add.call( elem, handleObj ); + + if ( !handleObj.handler.guid ) { + handleObj.handler.guid = handler.guid; + } + } + + // Add to the element's handler list, delegates in front + if ( selector ) { + handlers.splice( handlers.delegateCount++, 0, handleObj ); + } else { + handlers.push( handleObj ); + } + + // Keep track of which events have ever been used, for event optimization + jQuery.event.global[ type ] = true; + } + + }, + + // Detach an event or set of events from an element + remove: function( elem, types, handler, selector, mappedTypes ) { + + var j, origCount, tmp, + events, t, handleObj, + special, handlers, type, namespaces, origType, + elemData = dataPriv.hasData( elem ) && dataPriv.get( elem ); + + if ( !elemData || !( events = elemData.events ) ) { + return; + } + + // Once for each type.namespace in types; type may be omitted + types = ( types || "" ).match( rnothtmlwhite ) || [ "" ]; + t = types.length; + while ( t-- ) { + tmp = rtypenamespace.exec( types[ t ] ) || []; + type = origType = tmp[ 1 ]; + namespaces = ( tmp[ 2 ] || "" ).split( "." ).sort(); + + // Unbind all events (on this namespace, if provided) for the element + if ( !type ) { + for ( type in events ) { + jQuery.event.remove( elem, type + types[ t ], handler, selector, true ); + } + continue; + } + + special = jQuery.event.special[ type ] || {}; + type = ( selector ? special.delegateType : special.bindType ) || type; + handlers = events[ type ] || []; + tmp = tmp[ 2 ] && + new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" ); + + // Remove matching events + origCount = j = handlers.length; + while ( j-- ) { + handleObj = handlers[ j ]; + + if ( ( mappedTypes || origType === handleObj.origType ) && + ( !handler || handler.guid === handleObj.guid ) && + ( !tmp || tmp.test( handleObj.namespace ) ) && + ( !selector || selector === handleObj.selector || + selector === "**" && handleObj.selector ) ) { + handlers.splice( j, 1 ); + + if ( handleObj.selector ) { + handlers.delegateCount--; + } + if ( special.remove ) { + special.remove.call( elem, handleObj ); + } + } + } + + // Remove generic event handler if we removed something and no more handlers exist + // (avoids potential for endless recursion during removal of special event handlers) + if ( origCount && !handlers.length ) { + if ( !special.teardown || + special.teardown.call( elem, namespaces, elemData.handle ) === false ) { + + jQuery.removeEvent( elem, type, elemData.handle ); + } + + delete events[ type ]; + } + } + + // Remove data and the expando if it's no longer used + if ( jQuery.isEmptyObject( events ) ) { + dataPriv.remove( elem, "handle events" ); + } + }, + + dispatch: function( nativeEvent ) { + + var i, j, ret, matched, handleObj, handlerQueue, + args = new Array( arguments.length ), + + // Make a writable jQuery.Event from the native event object + event = jQuery.event.fix( nativeEvent ), + + handlers = ( + dataPriv.get( this, "events" ) || Object.create( null ) + )[ event.type ] || [], + special = jQuery.event.special[ event.type ] || {}; + + // Use the fix-ed jQuery.Event rather than the (read-only) native event + args[ 0 ] = event; + + for ( i = 1; i < arguments.length; i++ ) { + args[ i ] = arguments[ i ]; + } + + event.delegateTarget = this; + + // Call the preDispatch hook for the mapped type, and let it bail if desired + if ( special.preDispatch && special.preDispatch.call( this, event ) === false ) { + return; + } + + // Determine handlers + handlerQueue = jQuery.event.handlers.call( this, event, handlers ); + + // Run delegates first; they may want to stop propagation beneath us + i = 0; + while ( ( matched = handlerQueue[ i++ ] ) && !event.isPropagationStopped() ) { + event.currentTarget = matched.elem; + + j = 0; + while ( ( handleObj = matched.handlers[ j++ ] ) && + !event.isImmediatePropagationStopped() ) { + + // If the event is namespaced, then each handler is only invoked if it is + // specially universal or its namespaces are a superset of the event's. + if ( !event.rnamespace || handleObj.namespace === false || + event.rnamespace.test( handleObj.namespace ) ) { + + event.handleObj = handleObj; + event.data = handleObj.data; + + ret = ( ( jQuery.event.special[ handleObj.origType ] || {} ).handle || + handleObj.handler ).apply( matched.elem, args ); + + if ( ret !== undefined ) { + if ( ( event.result = ret ) === false ) { + event.preventDefault(); + event.stopPropagation(); + } + } + } + } + } + + // Call the postDispatch hook for the mapped type + if ( special.postDispatch ) { + special.postDispatch.call( this, event ); + } + + return event.result; + }, + + handlers: function( event, handlers ) { + var i, handleObj, sel, matchedHandlers, matchedSelectors, + handlerQueue = [], + delegateCount = handlers.delegateCount, + cur = event.target; + + // Find delegate handlers + if ( delegateCount && + + // Support: IE <=9 + // Black-hole SVG instance trees (trac-13180) + cur.nodeType && + + // Support: Firefox <=42 + // Suppress spec-violating clicks indicating a non-primary pointer button (trac-3861) + // https://www.w3.org/TR/DOM-Level-3-Events/#event-type-click + // Support: IE 11 only + // ...but not arrow key "clicks" of radio inputs, which can have `button` -1 (gh-2343) + !( event.type === "click" && event.button >= 1 ) ) { + + for ( ; cur !== this; cur = cur.parentNode || this ) { + + // Don't check non-elements (#13208) + // Don't process clicks on disabled elements (#6911, #8165, #11382, #11764) + if ( cur.nodeType === 1 && !( event.type === "click" && cur.disabled === true ) ) { + matchedHandlers = []; + matchedSelectors = {}; + for ( i = 0; i < delegateCount; i++ ) { + handleObj = handlers[ i ]; + + // Don't conflict with Object.prototype properties (#13203) + sel = handleObj.selector + " "; + + if ( matchedSelectors[ sel ] === undefined ) { + matchedSelectors[ sel ] = handleObj.needsContext ? + jQuery( sel, this ).index( cur ) > -1 : + jQuery.find( sel, this, null, [ cur ] ).length; + } + if ( matchedSelectors[ sel ] ) { + matchedHandlers.push( handleObj ); + } + } + if ( matchedHandlers.length ) { + handlerQueue.push( { elem: cur, handlers: matchedHandlers } ); + } + } + } + } + + // Add the remaining (directly-bound) handlers + cur = this; + if ( delegateCount < handlers.length ) { + handlerQueue.push( { elem: cur, handlers: handlers.slice( delegateCount ) } ); + } + + return handlerQueue; + }, + + addProp: function( name, hook ) { + Object.defineProperty( jQuery.Event.prototype, name, { + enumerable: true, + configurable: true, + + get: isFunction( hook ) ? + function() { + if ( this.originalEvent ) { + return hook( this.originalEvent ); + } + } : + function() { + if ( this.originalEvent ) { + return this.originalEvent[ name ]; + } + }, + + set: function( value ) { + Object.defineProperty( this, name, { + enumerable: true, + configurable: true, + writable: true, + value: value + } ); + } + } ); + }, + + fix: function( originalEvent ) { + return originalEvent[ jQuery.expando ] ? + originalEvent : + new jQuery.Event( originalEvent ); + }, + + special: { + load: { + + // Prevent triggered image.load events from bubbling to window.load + noBubble: true + }, + click: { + + // Utilize native event to ensure correct state for checkable inputs + setup: function( data ) { + + // For mutual compressibility with _default, replace `this` access with a local var. + // `|| data` is dead code meant only to preserve the variable through minification. + var el = this || data; + + // Claim the first handler + if ( rcheckableType.test( el.type ) && + el.click && nodeName( el, "input" ) ) { + + // dataPriv.set( el, "click", ... ) + leverageNative( el, "click", returnTrue ); + } + + // Return false to allow normal processing in the caller + return false; + }, + trigger: function( data ) { + + // For mutual compressibility with _default, replace `this` access with a local var. + // `|| data` is dead code meant only to preserve the variable through minification. + var el = this || data; + + // Force setup before triggering a click + if ( rcheckableType.test( el.type ) && + el.click && nodeName( el, "input" ) ) { + + leverageNative( el, "click" ); + } + + // Return non-false to allow normal event-path propagation + return true; + }, + + // For cross-browser consistency, suppress native .click() on links + // Also prevent it if we're currently inside a leveraged native-event stack + _default: function( event ) { + var target = event.target; + return rcheckableType.test( target.type ) && + target.click && nodeName( target, "input" ) && + dataPriv.get( target, "click" ) || + nodeName( target, "a" ); + } + }, + + beforeunload: { + postDispatch: function( event ) { + + // Support: Firefox 20+ + // Firefox doesn't alert if the returnValue field is not set. + if ( event.result !== undefined && event.originalEvent ) { + event.originalEvent.returnValue = event.result; + } + } + } + } +}; + +// Ensure the presence of an event listener that handles manually-triggered +// synthetic events by interrupting progress until reinvoked in response to +// *native* events that it fires directly, ensuring that state changes have +// already occurred before other listeners are invoked. +function leverageNative( el, type, expectSync ) { + + // Missing expectSync indicates a trigger call, which must force setup through jQuery.event.add + if ( !expectSync ) { + if ( dataPriv.get( el, type ) === undefined ) { + jQuery.event.add( el, type, returnTrue ); + } + return; + } + + // Register the controller as a special universal handler for all event namespaces + dataPriv.set( el, type, false ); + jQuery.event.add( el, type, { + namespace: false, + handler: function( event ) { + var notAsync, result, + saved = dataPriv.get( this, type ); + + if ( ( event.isTrigger & 1 ) && this[ type ] ) { + + // Interrupt processing of the outer synthetic .trigger()ed event + // Saved data should be false in such cases, but might be a leftover capture object + // from an async native handler (gh-4350) + if ( !saved.length ) { + + // Store arguments for use when handling the inner native event + // There will always be at least one argument (an event object), so this array + // will not be confused with a leftover capture object. + saved = slice.call( arguments ); + dataPriv.set( this, type, saved ); + + // Trigger the native event and capture its result + // Support: IE <=9 - 11+ + // focus() and blur() are asynchronous + notAsync = expectSync( this, type ); + this[ type ](); + result = dataPriv.get( this, type ); + if ( saved !== result || notAsync ) { + dataPriv.set( this, type, false ); + } else { + result = {}; + } + if ( saved !== result ) { + + // Cancel the outer synthetic event + event.stopImmediatePropagation(); + event.preventDefault(); + return result.value; + } + + // If this is an inner synthetic event for an event with a bubbling surrogate + // (focus or blur), assume that the surrogate already propagated from triggering the + // native event and prevent that from happening again here. + // This technically gets the ordering wrong w.r.t. to `.trigger()` (in which the + // bubbling surrogate propagates *after* the non-bubbling base), but that seems + // less bad than duplication. + } else if ( ( jQuery.event.special[ type ] || {} ).delegateType ) { + event.stopPropagation(); + } + + // If this is a native event triggered above, everything is now in order + // Fire an inner synthetic event with the original arguments + } else if ( saved.length ) { + + // ...and capture the result + dataPriv.set( this, type, { + value: jQuery.event.trigger( + + // Support: IE <=9 - 11+ + // Extend with the prototype to reset the above stopImmediatePropagation() + jQuery.extend( saved[ 0 ], jQuery.Event.prototype ), + saved.slice( 1 ), + this + ) + } ); + + // Abort handling of the native event + event.stopImmediatePropagation(); + } + } + } ); +} + +jQuery.removeEvent = function( elem, type, handle ) { + + // This "if" is needed for plain objects + if ( elem.removeEventListener ) { + elem.removeEventListener( type, handle ); + } +}; + +jQuery.Event = function( src, props ) { + + // Allow instantiation without the 'new' keyword + if ( !( this instanceof jQuery.Event ) ) { + return new jQuery.Event( src, props ); + } + + // Event object + if ( src && src.type ) { + this.originalEvent = src; + this.type = src.type; + + // Events bubbling up the document may have been marked as prevented + // by a handler lower down the tree; reflect the correct value. + this.isDefaultPrevented = src.defaultPrevented || + src.defaultPrevented === undefined && + + // Support: Android <=2.3 only + src.returnValue === false ? + returnTrue : + returnFalse; + + // Create target properties + // Support: Safari <=6 - 7 only + // Target should not be a text node (#504, #13143) + this.target = ( src.target && src.target.nodeType === 3 ) ? + src.target.parentNode : + src.target; + + this.currentTarget = src.currentTarget; + this.relatedTarget = src.relatedTarget; + + // Event type + } else { + this.type = src; + } + + // Put explicitly provided properties onto the event object + if ( props ) { + jQuery.extend( this, props ); + } + + // Create a timestamp if incoming event doesn't have one + this.timeStamp = src && src.timeStamp || Date.now(); + + // Mark it as fixed + this[ jQuery.expando ] = true; +}; + +// jQuery.Event is based on DOM3 Events as specified by the ECMAScript Language Binding +// https://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html +jQuery.Event.prototype = { + constructor: jQuery.Event, + isDefaultPrevented: returnFalse, + isPropagationStopped: returnFalse, + isImmediatePropagationStopped: returnFalse, + isSimulated: false, + + preventDefault: function() { + var e = this.originalEvent; + + this.isDefaultPrevented = returnTrue; + + if ( e && !this.isSimulated ) { + e.preventDefault(); + } + }, + stopPropagation: function() { + var e = this.originalEvent; + + this.isPropagationStopped = returnTrue; + + if ( e && !this.isSimulated ) { + e.stopPropagation(); + } + }, + stopImmediatePropagation: function() { + var e = this.originalEvent; + + this.isImmediatePropagationStopped = returnTrue; + + if ( e && !this.isSimulated ) { + e.stopImmediatePropagation(); + } + + this.stopPropagation(); + } +}; + +// Includes all common event props including KeyEvent and MouseEvent specific props +jQuery.each( { + altKey: true, + bubbles: true, + cancelable: true, + changedTouches: true, + ctrlKey: true, + detail: true, + eventPhase: true, + metaKey: true, + pageX: true, + pageY: true, + shiftKey: true, + view: true, + "char": true, + code: true, + charCode: true, + key: true, + keyCode: true, + button: true, + buttons: true, + clientX: true, + clientY: true, + offsetX: true, + offsetY: true, + pointerId: true, + pointerType: true, + screenX: true, + screenY: true, + targetTouches: true, + toElement: true, + touches: true, + + which: function( event ) { + var button = event.button; + + // Add which for key events + if ( event.which == null && rkeyEvent.test( event.type ) ) { + return event.charCode != null ? event.charCode : event.keyCode; + } + + // Add which for click: 1 === left; 2 === middle; 3 === right + if ( !event.which && button !== undefined && rmouseEvent.test( event.type ) ) { + if ( button & 1 ) { + return 1; + } + + if ( button & 2 ) { + return 3; + } + + if ( button & 4 ) { + return 2; + } + + return 0; + } + + return event.which; + } +}, jQuery.event.addProp ); + +jQuery.each( { focus: "focusin", blur: "focusout" }, function( type, delegateType ) { + jQuery.event.special[ type ] = { + + // Utilize native event if possible so blur/focus sequence is correct + setup: function() { + + // Claim the first handler + // dataPriv.set( this, "focus", ... ) + // dataPriv.set( this, "blur", ... ) + leverageNative( this, type, expectSync ); + + // Return false to allow normal processing in the caller + return false; + }, + trigger: function() { + + // Force setup before trigger + leverageNative( this, type ); + + // Return non-false to allow normal event-path propagation + return true; + }, + + delegateType: delegateType + }; +} ); + +// Create mouseenter/leave events using mouseover/out and event-time checks +// so that event delegation works in jQuery. +// Do the same for pointerenter/pointerleave and pointerover/pointerout +// +// Support: Safari 7 only +// Safari sends mouseenter too often; see: +// https://bugs.chromium.org/p/chromium/issues/detail?id=470258 +// for the description of the bug (it existed in older Chrome versions as well). +jQuery.each( { + mouseenter: "mouseover", + mouseleave: "mouseout", + pointerenter: "pointerover", + pointerleave: "pointerout" +}, function( orig, fix ) { + jQuery.event.special[ orig ] = { + delegateType: fix, + bindType: fix, + + handle: function( event ) { + var ret, + target = this, + related = event.relatedTarget, + handleObj = event.handleObj; + + // For mouseenter/leave call the handler if related is outside the target. + // NB: No relatedTarget if the mouse left/entered the browser window + if ( !related || ( related !== target && !jQuery.contains( target, related ) ) ) { + event.type = handleObj.origType; + ret = handleObj.handler.apply( this, arguments ); + event.type = fix; + } + return ret; + } + }; +} ); + +jQuery.fn.extend( { + + on: function( types, selector, data, fn ) { + return on( this, types, selector, data, fn ); + }, + one: function( types, selector, data, fn ) { + return on( this, types, selector, data, fn, 1 ); + }, + off: function( types, selector, fn ) { + var handleObj, type; + if ( types && types.preventDefault && types.handleObj ) { + + // ( event ) dispatched jQuery.Event + handleObj = types.handleObj; + jQuery( types.delegateTarget ).off( + handleObj.namespace ? + handleObj.origType + "." + handleObj.namespace : + handleObj.origType, + handleObj.selector, + handleObj.handler + ); + return this; + } + if ( typeof types === "object" ) { + + // ( types-object [, selector] ) + for ( type in types ) { + this.off( type, selector, types[ type ] ); + } + return this; + } + if ( selector === false || typeof selector === "function" ) { + + // ( types [, fn] ) + fn = selector; + selector = undefined; + } + if ( fn === false ) { + fn = returnFalse; + } + return this.each( function() { + jQuery.event.remove( this, types, fn, selector ); + } ); + } +} ); + + +var + + // Support: IE <=10 - 11, Edge 12 - 13 only + // In IE/Edge using regex groups here causes severe slowdowns. + // See https://connect.microsoft.com/IE/feedback/details/1736512/ + rnoInnerhtml = /\s*$/g; + +// Prefer a tbody over its parent table for containing new rows +function manipulationTarget( elem, content ) { + if ( nodeName( elem, "table" ) && + nodeName( content.nodeType !== 11 ? content : content.firstChild, "tr" ) ) { + + return jQuery( elem ).children( "tbody" )[ 0 ] || elem; + } + + return elem; +} + +// Replace/restore the type attribute of script elements for safe DOM manipulation +function disableScript( elem ) { + elem.type = ( elem.getAttribute( "type" ) !== null ) + "/" + elem.type; + return elem; +} +function restoreScript( elem ) { + if ( ( elem.type || "" ).slice( 0, 5 ) === "true/" ) { + elem.type = elem.type.slice( 5 ); + } else { + elem.removeAttribute( "type" ); + } + + return elem; +} + +function cloneCopyEvent( src, dest ) { + var i, l, type, pdataOld, udataOld, udataCur, events; + + if ( dest.nodeType !== 1 ) { + return; + } + + // 1. Copy private data: events, handlers, etc. + if ( dataPriv.hasData( src ) ) { + pdataOld = dataPriv.get( src ); + events = pdataOld.events; + + if ( events ) { + dataPriv.remove( dest, "handle events" ); + + for ( type in events ) { + for ( i = 0, l = events[ type ].length; i < l; i++ ) { + jQuery.event.add( dest, type, events[ type ][ i ] ); + } + } + } + } + + // 2. Copy user data + if ( dataUser.hasData( src ) ) { + udataOld = dataUser.access( src ); + udataCur = jQuery.extend( {}, udataOld ); + + dataUser.set( dest, udataCur ); + } +} + +// Fix IE bugs, see support tests +function fixInput( src, dest ) { + var nodeName = dest.nodeName.toLowerCase(); + + // Fails to persist the checked state of a cloned checkbox or radio button. + if ( nodeName === "input" && rcheckableType.test( src.type ) ) { + dest.checked = src.checked; + + // Fails to return the selected option to the default selected state when cloning options + } else if ( nodeName === "input" || nodeName === "textarea" ) { + dest.defaultValue = src.defaultValue; + } +} + +function domManip( collection, args, callback, ignored ) { + + // Flatten any nested arrays + args = flat( args ); + + var fragment, first, scripts, hasScripts, node, doc, + i = 0, + l = collection.length, + iNoClone = l - 1, + value = args[ 0 ], + valueIsFunction = isFunction( value ); + + // We can't cloneNode fragments that contain checked, in WebKit + if ( valueIsFunction || + ( l > 1 && typeof value === "string" && + !support.checkClone && rchecked.test( value ) ) ) { + return collection.each( function( index ) { + var self = collection.eq( index ); + if ( valueIsFunction ) { + args[ 0 ] = value.call( this, index, self.html() ); + } + domManip( self, args, callback, ignored ); + } ); + } + + if ( l ) { + fragment = buildFragment( args, collection[ 0 ].ownerDocument, false, collection, ignored ); + first = fragment.firstChild; + + if ( fragment.childNodes.length === 1 ) { + fragment = first; + } + + // Require either new content or an interest in ignored elements to invoke the callback + if ( first || ignored ) { + scripts = jQuery.map( getAll( fragment, "script" ), disableScript ); + hasScripts = scripts.length; + + // Use the original fragment for the last item + // instead of the first because it can end up + // being emptied incorrectly in certain situations (#8070). + for ( ; i < l; i++ ) { + node = fragment; + + if ( i !== iNoClone ) { + node = jQuery.clone( node, true, true ); + + // Keep references to cloned scripts for later restoration + if ( hasScripts ) { + + // Support: Android <=4.0 only, PhantomJS 1 only + // push.apply(_, arraylike) throws on ancient WebKit + jQuery.merge( scripts, getAll( node, "script" ) ); + } + } + + callback.call( collection[ i ], node, i ); + } + + if ( hasScripts ) { + doc = scripts[ scripts.length - 1 ].ownerDocument; + + // Reenable scripts + jQuery.map( scripts, restoreScript ); + + // Evaluate executable scripts on first document insertion + for ( i = 0; i < hasScripts; i++ ) { + node = scripts[ i ]; + if ( rscriptType.test( node.type || "" ) && + !dataPriv.access( node, "globalEval" ) && + jQuery.contains( doc, node ) ) { + + if ( node.src && ( node.type || "" ).toLowerCase() !== "module" ) { + + // Optional AJAX dependency, but won't run scripts if not present + if ( jQuery._evalUrl && !node.noModule ) { + jQuery._evalUrl( node.src, { + nonce: node.nonce || node.getAttribute( "nonce" ) + }, doc ); + } + } else { + DOMEval( node.textContent.replace( rcleanScript, "" ), node, doc ); + } + } + } + } + } + } + + return collection; +} + +function remove( elem, selector, keepData ) { + var node, + nodes = selector ? jQuery.filter( selector, elem ) : elem, + i = 0; + + for ( ; ( node = nodes[ i ] ) != null; i++ ) { + if ( !keepData && node.nodeType === 1 ) { + jQuery.cleanData( getAll( node ) ); + } + + if ( node.parentNode ) { + if ( keepData && isAttached( node ) ) { + setGlobalEval( getAll( node, "script" ) ); + } + node.parentNode.removeChild( node ); + } + } + + return elem; +} + +jQuery.extend( { + htmlPrefilter: function( html ) { + return html; + }, + + clone: function( elem, dataAndEvents, deepDataAndEvents ) { + var i, l, srcElements, destElements, + clone = elem.cloneNode( true ), + inPage = isAttached( elem ); + + // Fix IE cloning issues + if ( !support.noCloneChecked && ( elem.nodeType === 1 || elem.nodeType === 11 ) && + !jQuery.isXMLDoc( elem ) ) { + + // We eschew Sizzle here for performance reasons: https://jsperf.com/getall-vs-sizzle/2 + destElements = getAll( clone ); + srcElements = getAll( elem ); + + for ( i = 0, l = srcElements.length; i < l; i++ ) { + fixInput( srcElements[ i ], destElements[ i ] ); + } + } + + // Copy the events from the original to the clone + if ( dataAndEvents ) { + if ( deepDataAndEvents ) { + srcElements = srcElements || getAll( elem ); + destElements = destElements || getAll( clone ); + + for ( i = 0, l = srcElements.length; i < l; i++ ) { + cloneCopyEvent( srcElements[ i ], destElements[ i ] ); + } + } else { + cloneCopyEvent( elem, clone ); + } + } + + // Preserve script evaluation history + destElements = getAll( clone, "script" ); + if ( destElements.length > 0 ) { + setGlobalEval( destElements, !inPage && getAll( elem, "script" ) ); + } + + // Return the cloned set + return clone; + }, + + cleanData: function( elems ) { + var data, elem, type, + special = jQuery.event.special, + i = 0; + + for ( ; ( elem = elems[ i ] ) !== undefined; i++ ) { + if ( acceptData( elem ) ) { + if ( ( data = elem[ dataPriv.expando ] ) ) { + if ( data.events ) { + for ( type in data.events ) { + if ( special[ type ] ) { + jQuery.event.remove( elem, type ); + + // This is a shortcut to avoid jQuery.event.remove's overhead + } else { + jQuery.removeEvent( elem, type, data.handle ); + } + } + } + + // Support: Chrome <=35 - 45+ + // Assign undefined instead of using delete, see Data#remove + elem[ dataPriv.expando ] = undefined; + } + if ( elem[ dataUser.expando ] ) { + + // Support: Chrome <=35 - 45+ + // Assign undefined instead of using delete, see Data#remove + elem[ dataUser.expando ] = undefined; + } + } + } + } +} ); + +jQuery.fn.extend( { + detach: function( selector ) { + return remove( this, selector, true ); + }, + + remove: function( selector ) { + return remove( this, selector ); + }, + + text: function( value ) { + return access( this, function( value ) { + return value === undefined ? + jQuery.text( this ) : + this.empty().each( function() { + if ( this.nodeType === 1 || this.nodeType === 11 || this.nodeType === 9 ) { + this.textContent = value; + } + } ); + }, null, value, arguments.length ); + }, + + append: function() { + return domManip( this, arguments, function( elem ) { + if ( this.nodeType === 1 || this.nodeType === 11 || this.nodeType === 9 ) { + var target = manipulationTarget( this, elem ); + target.appendChild( elem ); + } + } ); + }, + + prepend: function() { + return domManip( this, arguments, function( elem ) { + if ( this.nodeType === 1 || this.nodeType === 11 || this.nodeType === 9 ) { + var target = manipulationTarget( this, elem ); + target.insertBefore( elem, target.firstChild ); + } + } ); + }, + + before: function() { + return domManip( this, arguments, function( elem ) { + if ( this.parentNode ) { + this.parentNode.insertBefore( elem, this ); + } + } ); + }, + + after: function() { + return domManip( this, arguments, function( elem ) { + if ( this.parentNode ) { + this.parentNode.insertBefore( elem, this.nextSibling ); + } + } ); + }, + + empty: function() { + var elem, + i = 0; + + for ( ; ( elem = this[ i ] ) != null; i++ ) { + if ( elem.nodeType === 1 ) { + + // Prevent memory leaks + jQuery.cleanData( getAll( elem, false ) ); + + // Remove any remaining nodes + elem.textContent = ""; + } + } + + return this; + }, + + clone: function( dataAndEvents, deepDataAndEvents ) { + dataAndEvents = dataAndEvents == null ? false : dataAndEvents; + deepDataAndEvents = deepDataAndEvents == null ? dataAndEvents : deepDataAndEvents; + + return this.map( function() { + return jQuery.clone( this, dataAndEvents, deepDataAndEvents ); + } ); + }, + + html: function( value ) { + return access( this, function( value ) { + var elem = this[ 0 ] || {}, + i = 0, + l = this.length; + + if ( value === undefined && elem.nodeType === 1 ) { + return elem.innerHTML; + } + + // See if we can take a shortcut and just use innerHTML + if ( typeof value === "string" && !rnoInnerhtml.test( value ) && + !wrapMap[ ( rtagName.exec( value ) || [ "", "" ] )[ 1 ].toLowerCase() ] ) { + + value = jQuery.htmlPrefilter( value ); + + try { + for ( ; i < l; i++ ) { + elem = this[ i ] || {}; + + // Remove element nodes and prevent memory leaks + if ( elem.nodeType === 1 ) { + jQuery.cleanData( getAll( elem, false ) ); + elem.innerHTML = value; + } + } + + elem = 0; + + // If using innerHTML throws an exception, use the fallback method + } catch ( e ) {} + } + + if ( elem ) { + this.empty().append( value ); + } + }, null, value, arguments.length ); + }, + + replaceWith: function() { + var ignored = []; + + // Make the changes, replacing each non-ignored context element with the new content + return domManip( this, arguments, function( elem ) { + var parent = this.parentNode; + + if ( jQuery.inArray( this, ignored ) < 0 ) { + jQuery.cleanData( getAll( this ) ); + if ( parent ) { + parent.replaceChild( elem, this ); + } + } + + // Force callback invocation + }, ignored ); + } +} ); + +jQuery.each( { + appendTo: "append", + prependTo: "prepend", + insertBefore: "before", + insertAfter: "after", + replaceAll: "replaceWith" +}, function( name, original ) { + jQuery.fn[ name ] = function( selector ) { + var elems, + ret = [], + insert = jQuery( selector ), + last = insert.length - 1, + i = 0; + + for ( ; i <= last; i++ ) { + elems = i === last ? this : this.clone( true ); + jQuery( insert[ i ] )[ original ]( elems ); + + // Support: Android <=4.0 only, PhantomJS 1 only + // .get() because push.apply(_, arraylike) throws on ancient WebKit + push.apply( ret, elems.get() ); + } + + return this.pushStack( ret ); + }; +} ); +var rnumnonpx = new RegExp( "^(" + pnum + ")(?!px)[a-z%]+$", "i" ); + +var getStyles = function( elem ) { + + // Support: IE <=11 only, Firefox <=30 (#15098, #14150) + // IE throws on elements created in popups + // FF meanwhile throws on frame elements through "defaultView.getComputedStyle" + var view = elem.ownerDocument.defaultView; + + if ( !view || !view.opener ) { + view = window; + } + + return view.getComputedStyle( elem ); + }; + +var swap = function( elem, options, callback ) { + var ret, name, + old = {}; + + // Remember the old values, and insert the new ones + for ( name in options ) { + old[ name ] = elem.style[ name ]; + elem.style[ name ] = options[ name ]; + } + + ret = callback.call( elem ); + + // Revert the old values + for ( name in options ) { + elem.style[ name ] = old[ name ]; + } + + return ret; +}; + + +var rboxStyle = new RegExp( cssExpand.join( "|" ), "i" ); + + + +( function() { + + // Executing both pixelPosition & boxSizingReliable tests require only one layout + // so they're executed at the same time to save the second computation. + function computeStyleTests() { + + // This is a singleton, we need to execute it only once + if ( !div ) { + return; + } + + container.style.cssText = "position:absolute;left:-11111px;width:60px;" + + "margin-top:1px;padding:0;border:0"; + div.style.cssText = + "position:relative;display:block;box-sizing:border-box;overflow:scroll;" + + "margin:auto;border:1px;padding:1px;" + + "width:60%;top:1%"; + documentElement.appendChild( container ).appendChild( div ); + + var divStyle = window.getComputedStyle( div ); + pixelPositionVal = divStyle.top !== "1%"; + + // Support: Android 4.0 - 4.3 only, Firefox <=3 - 44 + reliableMarginLeftVal = roundPixelMeasures( divStyle.marginLeft ) === 12; + + // Support: Android 4.0 - 4.3 only, Safari <=9.1 - 10.1, iOS <=7.0 - 9.3 + // Some styles come back with percentage values, even though they shouldn't + div.style.right = "60%"; + pixelBoxStylesVal = roundPixelMeasures( divStyle.right ) === 36; + + // Support: IE 9 - 11 only + // Detect misreporting of content dimensions for box-sizing:border-box elements + boxSizingReliableVal = roundPixelMeasures( divStyle.width ) === 36; + + // Support: IE 9 only + // Detect overflow:scroll screwiness (gh-3699) + // Support: Chrome <=64 + // Don't get tricked when zoom affects offsetWidth (gh-4029) + div.style.position = "absolute"; + scrollboxSizeVal = roundPixelMeasures( div.offsetWidth / 3 ) === 12; + + documentElement.removeChild( container ); + + // Nullify the div so it wouldn't be stored in the memory and + // it will also be a sign that checks already performed + div = null; + } + + function roundPixelMeasures( measure ) { + return Math.round( parseFloat( measure ) ); + } + + var pixelPositionVal, boxSizingReliableVal, scrollboxSizeVal, pixelBoxStylesVal, + reliableTrDimensionsVal, reliableMarginLeftVal, + container = document.createElement( "div" ), + div = document.createElement( "div" ); + + // Finish early in limited (non-browser) environments + if ( !div.style ) { + return; + } + + // Support: IE <=9 - 11 only + // Style of cloned element affects source element cloned (#8908) + div.style.backgroundClip = "content-box"; + div.cloneNode( true ).style.backgroundClip = ""; + support.clearCloneStyle = div.style.backgroundClip === "content-box"; + + jQuery.extend( support, { + boxSizingReliable: function() { + computeStyleTests(); + return boxSizingReliableVal; + }, + pixelBoxStyles: function() { + computeStyleTests(); + return pixelBoxStylesVal; + }, + pixelPosition: function() { + computeStyleTests(); + return pixelPositionVal; + }, + reliableMarginLeft: function() { + computeStyleTests(); + return reliableMarginLeftVal; + }, + scrollboxSize: function() { + computeStyleTests(); + return scrollboxSizeVal; + }, + + // Support: IE 9 - 11+, Edge 15 - 18+ + // IE/Edge misreport `getComputedStyle` of table rows with width/height + // set in CSS while `offset*` properties report correct values. + // Behavior in IE 9 is more subtle than in newer versions & it passes + // some versions of this test; make sure not to make it pass there! + reliableTrDimensions: function() { + var table, tr, trChild, trStyle; + if ( reliableTrDimensionsVal == null ) { + table = document.createElement( "table" ); + tr = document.createElement( "tr" ); + trChild = document.createElement( "div" ); + + table.style.cssText = "position:absolute;left:-11111px"; + tr.style.height = "1px"; + trChild.style.height = "9px"; + + documentElement + .appendChild( table ) + .appendChild( tr ) + .appendChild( trChild ); + + trStyle = window.getComputedStyle( tr ); + reliableTrDimensionsVal = parseInt( trStyle.height ) > 3; + + documentElement.removeChild( table ); + } + return reliableTrDimensionsVal; + } + } ); +} )(); + + +function curCSS( elem, name, computed ) { + var width, minWidth, maxWidth, ret, + + // Support: Firefox 51+ + // Retrieving style before computed somehow + // fixes an issue with getting wrong values + // on detached elements + style = elem.style; + + computed = computed || getStyles( elem ); + + // getPropertyValue is needed for: + // .css('filter') (IE 9 only, #12537) + // .css('--customProperty) (#3144) + if ( computed ) { + ret = computed.getPropertyValue( name ) || computed[ name ]; + + if ( ret === "" && !isAttached( elem ) ) { + ret = jQuery.style( elem, name ); + } + + // A tribute to the "awesome hack by Dean Edwards" + // Android Browser returns percentage for some values, + // but width seems to be reliably pixels. + // This is against the CSSOM draft spec: + // https://drafts.csswg.org/cssom/#resolved-values + if ( !support.pixelBoxStyles() && rnumnonpx.test( ret ) && rboxStyle.test( name ) ) { + + // Remember the original values + width = style.width; + minWidth = style.minWidth; + maxWidth = style.maxWidth; + + // Put in the new values to get a computed value out + style.minWidth = style.maxWidth = style.width = ret; + ret = computed.width; + + // Revert the changed values + style.width = width; + style.minWidth = minWidth; + style.maxWidth = maxWidth; + } + } + + return ret !== undefined ? + + // Support: IE <=9 - 11 only + // IE returns zIndex value as an integer. + ret + "" : + ret; +} + + +function addGetHookIf( conditionFn, hookFn ) { + + // Define the hook, we'll check on the first run if it's really needed. + return { + get: function() { + if ( conditionFn() ) { + + // Hook not needed (or it's not possible to use it due + // to missing dependency), remove it. + delete this.get; + return; + } + + // Hook needed; redefine it so that the support test is not executed again. + return ( this.get = hookFn ).apply( this, arguments ); + } + }; +} + + +var cssPrefixes = [ "Webkit", "Moz", "ms" ], + emptyStyle = document.createElement( "div" ).style, + vendorProps = {}; + +// Return a vendor-prefixed property or undefined +function vendorPropName( name ) { + + // Check for vendor prefixed names + var capName = name[ 0 ].toUpperCase() + name.slice( 1 ), + i = cssPrefixes.length; + + while ( i-- ) { + name = cssPrefixes[ i ] + capName; + if ( name in emptyStyle ) { + return name; + } + } +} + +// Return a potentially-mapped jQuery.cssProps or vendor prefixed property +function finalPropName( name ) { + var final = jQuery.cssProps[ name ] || vendorProps[ name ]; + + if ( final ) { + return final; + } + if ( name in emptyStyle ) { + return name; + } + return vendorProps[ name ] = vendorPropName( name ) || name; +} + + +var + + // Swappable if display is none or starts with table + // except "table", "table-cell", or "table-caption" + // See here for display values: https://developer.mozilla.org/en-US/docs/CSS/display + rdisplayswap = /^(none|table(?!-c[ea]).+)/, + rcustomProp = /^--/, + cssShow = { position: "absolute", visibility: "hidden", display: "block" }, + cssNormalTransform = { + letterSpacing: "0", + fontWeight: "400" + }; + +function setPositiveNumber( _elem, value, subtract ) { + + // Any relative (+/-) values have already been + // normalized at this point + var matches = rcssNum.exec( value ); + return matches ? + + // Guard against undefined "subtract", e.g., when used as in cssHooks + Math.max( 0, matches[ 2 ] - ( subtract || 0 ) ) + ( matches[ 3 ] || "px" ) : + value; +} + +function boxModelAdjustment( elem, dimension, box, isBorderBox, styles, computedVal ) { + var i = dimension === "width" ? 1 : 0, + extra = 0, + delta = 0; + + // Adjustment may not be necessary + if ( box === ( isBorderBox ? "border" : "content" ) ) { + return 0; + } + + for ( ; i < 4; i += 2 ) { + + // Both box models exclude margin + if ( box === "margin" ) { + delta += jQuery.css( elem, box + cssExpand[ i ], true, styles ); + } + + // If we get here with a content-box, we're seeking "padding" or "border" or "margin" + if ( !isBorderBox ) { + + // Add padding + delta += jQuery.css( elem, "padding" + cssExpand[ i ], true, styles ); + + // For "border" or "margin", add border + if ( box !== "padding" ) { + delta += jQuery.css( elem, "border" + cssExpand[ i ] + "Width", true, styles ); + + // But still keep track of it otherwise + } else { + extra += jQuery.css( elem, "border" + cssExpand[ i ] + "Width", true, styles ); + } + + // If we get here with a border-box (content + padding + border), we're seeking "content" or + // "padding" or "margin" + } else { + + // For "content", subtract padding + if ( box === "content" ) { + delta -= jQuery.css( elem, "padding" + cssExpand[ i ], true, styles ); + } + + // For "content" or "padding", subtract border + if ( box !== "margin" ) { + delta -= jQuery.css( elem, "border" + cssExpand[ i ] + "Width", true, styles ); + } + } + } + + // Account for positive content-box scroll gutter when requested by providing computedVal + if ( !isBorderBox && computedVal >= 0 ) { + + // offsetWidth/offsetHeight is a rounded sum of content, padding, scroll gutter, and border + // Assuming integer scroll gutter, subtract the rest and round down + delta += Math.max( 0, Math.ceil( + elem[ "offset" + dimension[ 0 ].toUpperCase() + dimension.slice( 1 ) ] - + computedVal - + delta - + extra - + 0.5 + + // If offsetWidth/offsetHeight is unknown, then we can't determine content-box scroll gutter + // Use an explicit zero to avoid NaN (gh-3964) + ) ) || 0; + } + + return delta; +} + +function getWidthOrHeight( elem, dimension, extra ) { + + // Start with computed style + var styles = getStyles( elem ), + + // To avoid forcing a reflow, only fetch boxSizing if we need it (gh-4322). + // Fake content-box until we know it's needed to know the true value. + boxSizingNeeded = !support.boxSizingReliable() || extra, + isBorderBox = boxSizingNeeded && + jQuery.css( elem, "boxSizing", false, styles ) === "border-box", + valueIsBorderBox = isBorderBox, + + val = curCSS( elem, dimension, styles ), + offsetProp = "offset" + dimension[ 0 ].toUpperCase() + dimension.slice( 1 ); + + // Support: Firefox <=54 + // Return a confounding non-pixel value or feign ignorance, as appropriate. + if ( rnumnonpx.test( val ) ) { + if ( !extra ) { + return val; + } + val = "auto"; + } + + + // Support: IE 9 - 11 only + // Use offsetWidth/offsetHeight for when box sizing is unreliable. + // In those cases, the computed value can be trusted to be border-box. + if ( ( !support.boxSizingReliable() && isBorderBox || + + // Support: IE 10 - 11+, Edge 15 - 18+ + // IE/Edge misreport `getComputedStyle` of table rows with width/height + // set in CSS while `offset*` properties report correct values. + // Interestingly, in some cases IE 9 doesn't suffer from this issue. + !support.reliableTrDimensions() && nodeName( elem, "tr" ) || + + // Fall back to offsetWidth/offsetHeight when value is "auto" + // This happens for inline elements with no explicit setting (gh-3571) + val === "auto" || + + // Support: Android <=4.1 - 4.3 only + // Also use offsetWidth/offsetHeight for misreported inline dimensions (gh-3602) + !parseFloat( val ) && jQuery.css( elem, "display", false, styles ) === "inline" ) && + + // Make sure the element is visible & connected + elem.getClientRects().length ) { + + isBorderBox = jQuery.css( elem, "boxSizing", false, styles ) === "border-box"; + + // Where available, offsetWidth/offsetHeight approximate border box dimensions. + // Where not available (e.g., SVG), assume unreliable box-sizing and interpret the + // retrieved value as a content box dimension. + valueIsBorderBox = offsetProp in elem; + if ( valueIsBorderBox ) { + val = elem[ offsetProp ]; + } + } + + // Normalize "" and auto + val = parseFloat( val ) || 0; + + // Adjust for the element's box model + return ( val + + boxModelAdjustment( + elem, + dimension, + extra || ( isBorderBox ? "border" : "content" ), + valueIsBorderBox, + styles, + + // Provide the current computed size to request scroll gutter calculation (gh-3589) + val + ) + ) + "px"; +} + +jQuery.extend( { + + // Add in style property hooks for overriding the default + // behavior of getting and setting a style property + cssHooks: { + opacity: { + get: function( elem, computed ) { + if ( computed ) { + + // We should always get a number back from opacity + var ret = curCSS( elem, "opacity" ); + return ret === "" ? "1" : ret; + } + } + } + }, + + // Don't automatically add "px" to these possibly-unitless properties + cssNumber: { + "animationIterationCount": true, + "columnCount": true, + "fillOpacity": true, + "flexGrow": true, + "flexShrink": true, + "fontWeight": true, + "gridArea": true, + "gridColumn": true, + "gridColumnEnd": true, + "gridColumnStart": true, + "gridRow": true, + "gridRowEnd": true, + "gridRowStart": true, + "lineHeight": true, + "opacity": true, + "order": true, + "orphans": true, + "widows": true, + "zIndex": true, + "zoom": true + }, + + // Add in properties whose names you wish to fix before + // setting or getting the value + cssProps: {}, + + // Get and set the style property on a DOM Node + style: function( elem, name, value, extra ) { + + // Don't set styles on text and comment nodes + if ( !elem || elem.nodeType === 3 || elem.nodeType === 8 || !elem.style ) { + return; + } + + // Make sure that we're working with the right name + var ret, type, hooks, + origName = camelCase( name ), + isCustomProp = rcustomProp.test( name ), + style = elem.style; + + // Make sure that we're working with the right name. We don't + // want to query the value if it is a CSS custom property + // since they are user-defined. + if ( !isCustomProp ) { + name = finalPropName( origName ); + } + + // Gets hook for the prefixed version, then unprefixed version + hooks = jQuery.cssHooks[ name ] || jQuery.cssHooks[ origName ]; + + // Check if we're setting a value + if ( value !== undefined ) { + type = typeof value; + + // Convert "+=" or "-=" to relative numbers (#7345) + if ( type === "string" && ( ret = rcssNum.exec( value ) ) && ret[ 1 ] ) { + value = adjustCSS( elem, name, ret ); + + // Fixes bug #9237 + type = "number"; + } + + // Make sure that null and NaN values aren't set (#7116) + if ( value == null || value !== value ) { + return; + } + + // If a number was passed in, add the unit (except for certain CSS properties) + // The isCustomProp check can be removed in jQuery 4.0 when we only auto-append + // "px" to a few hardcoded values. + if ( type === "number" && !isCustomProp ) { + value += ret && ret[ 3 ] || ( jQuery.cssNumber[ origName ] ? "" : "px" ); + } + + // background-* props affect original clone's values + if ( !support.clearCloneStyle && value === "" && name.indexOf( "background" ) === 0 ) { + style[ name ] = "inherit"; + } + + // If a hook was provided, use that value, otherwise just set the specified value + if ( !hooks || !( "set" in hooks ) || + ( value = hooks.set( elem, value, extra ) ) !== undefined ) { + + if ( isCustomProp ) { + style.setProperty( name, value ); + } else { + style[ name ] = value; + } + } + + } else { + + // If a hook was provided get the non-computed value from there + if ( hooks && "get" in hooks && + ( ret = hooks.get( elem, false, extra ) ) !== undefined ) { + + return ret; + } + + // Otherwise just get the value from the style object + return style[ name ]; + } + }, + + css: function( elem, name, extra, styles ) { + var val, num, hooks, + origName = camelCase( name ), + isCustomProp = rcustomProp.test( name ); + + // Make sure that we're working with the right name. We don't + // want to modify the value if it is a CSS custom property + // since they are user-defined. + if ( !isCustomProp ) { + name = finalPropName( origName ); + } + + // Try prefixed name followed by the unprefixed name + hooks = jQuery.cssHooks[ name ] || jQuery.cssHooks[ origName ]; + + // If a hook was provided get the computed value from there + if ( hooks && "get" in hooks ) { + val = hooks.get( elem, true, extra ); + } + + // Otherwise, if a way to get the computed value exists, use that + if ( val === undefined ) { + val = curCSS( elem, name, styles ); + } + + // Convert "normal" to computed value + if ( val === "normal" && name in cssNormalTransform ) { + val = cssNormalTransform[ name ]; + } + + // Make numeric if forced or a qualifier was provided and val looks numeric + if ( extra === "" || extra ) { + num = parseFloat( val ); + return extra === true || isFinite( num ) ? num || 0 : val; + } + + return val; + } +} ); + +jQuery.each( [ "height", "width" ], function( _i, dimension ) { + jQuery.cssHooks[ dimension ] = { + get: function( elem, computed, extra ) { + if ( computed ) { + + // Certain elements can have dimension info if we invisibly show them + // but it must have a current display style that would benefit + return rdisplayswap.test( jQuery.css( elem, "display" ) ) && + + // Support: Safari 8+ + // Table columns in Safari have non-zero offsetWidth & zero + // getBoundingClientRect().width unless display is changed. + // Support: IE <=11 only + // Running getBoundingClientRect on a disconnected node + // in IE throws an error. + ( !elem.getClientRects().length || !elem.getBoundingClientRect().width ) ? + swap( elem, cssShow, function() { + return getWidthOrHeight( elem, dimension, extra ); + } ) : + getWidthOrHeight( elem, dimension, extra ); + } + }, + + set: function( elem, value, extra ) { + var matches, + styles = getStyles( elem ), + + // Only read styles.position if the test has a chance to fail + // to avoid forcing a reflow. + scrollboxSizeBuggy = !support.scrollboxSize() && + styles.position === "absolute", + + // To avoid forcing a reflow, only fetch boxSizing if we need it (gh-3991) + boxSizingNeeded = scrollboxSizeBuggy || extra, + isBorderBox = boxSizingNeeded && + jQuery.css( elem, "boxSizing", false, styles ) === "border-box", + subtract = extra ? + boxModelAdjustment( + elem, + dimension, + extra, + isBorderBox, + styles + ) : + 0; + + // Account for unreliable border-box dimensions by comparing offset* to computed and + // faking a content-box to get border and padding (gh-3699) + if ( isBorderBox && scrollboxSizeBuggy ) { + subtract -= Math.ceil( + elem[ "offset" + dimension[ 0 ].toUpperCase() + dimension.slice( 1 ) ] - + parseFloat( styles[ dimension ] ) - + boxModelAdjustment( elem, dimension, "border", false, styles ) - + 0.5 + ); + } + + // Convert to pixels if value adjustment is needed + if ( subtract && ( matches = rcssNum.exec( value ) ) && + ( matches[ 3 ] || "px" ) !== "px" ) { + + elem.style[ dimension ] = value; + value = jQuery.css( elem, dimension ); + } + + return setPositiveNumber( elem, value, subtract ); + } + }; +} ); + +jQuery.cssHooks.marginLeft = addGetHookIf( support.reliableMarginLeft, + function( elem, computed ) { + if ( computed ) { + return ( parseFloat( curCSS( elem, "marginLeft" ) ) || + elem.getBoundingClientRect().left - + swap( elem, { marginLeft: 0 }, function() { + return elem.getBoundingClientRect().left; + } ) + ) + "px"; + } + } +); + +// These hooks are used by animate to expand properties +jQuery.each( { + margin: "", + padding: "", + border: "Width" +}, function( prefix, suffix ) { + jQuery.cssHooks[ prefix + suffix ] = { + expand: function( value ) { + var i = 0, + expanded = {}, + + // Assumes a single number if not a string + parts = typeof value === "string" ? value.split( " " ) : [ value ]; + + for ( ; i < 4; i++ ) { + expanded[ prefix + cssExpand[ i ] + suffix ] = + parts[ i ] || parts[ i - 2 ] || parts[ 0 ]; + } + + return expanded; + } + }; + + if ( prefix !== "margin" ) { + jQuery.cssHooks[ prefix + suffix ].set = setPositiveNumber; + } +} ); + +jQuery.fn.extend( { + css: function( name, value ) { + return access( this, function( elem, name, value ) { + var styles, len, + map = {}, + i = 0; + + if ( Array.isArray( name ) ) { + styles = getStyles( elem ); + len = name.length; + + for ( ; i < len; i++ ) { + map[ name[ i ] ] = jQuery.css( elem, name[ i ], false, styles ); + } + + return map; + } + + return value !== undefined ? + jQuery.style( elem, name, value ) : + jQuery.css( elem, name ); + }, name, value, arguments.length > 1 ); + } +} ); + + +function Tween( elem, options, prop, end, easing ) { + return new Tween.prototype.init( elem, options, prop, end, easing ); +} +jQuery.Tween = Tween; + +Tween.prototype = { + constructor: Tween, + init: function( elem, options, prop, end, easing, unit ) { + this.elem = elem; + this.prop = prop; + this.easing = easing || jQuery.easing._default; + this.options = options; + this.start = this.now = this.cur(); + this.end = end; + this.unit = unit || ( jQuery.cssNumber[ prop ] ? "" : "px" ); + }, + cur: function() { + var hooks = Tween.propHooks[ this.prop ]; + + return hooks && hooks.get ? + hooks.get( this ) : + Tween.propHooks._default.get( this ); + }, + run: function( percent ) { + var eased, + hooks = Tween.propHooks[ this.prop ]; + + if ( this.options.duration ) { + this.pos = eased = jQuery.easing[ this.easing ]( + percent, this.options.duration * percent, 0, 1, this.options.duration + ); + } else { + this.pos = eased = percent; + } + this.now = ( this.end - this.start ) * eased + this.start; + + if ( this.options.step ) { + this.options.step.call( this.elem, this.now, this ); + } + + if ( hooks && hooks.set ) { + hooks.set( this ); + } else { + Tween.propHooks._default.set( this ); + } + return this; + } +}; + +Tween.prototype.init.prototype = Tween.prototype; + +Tween.propHooks = { + _default: { + get: function( tween ) { + var result; + + // Use a property on the element directly when it is not a DOM element, + // or when there is no matching style property that exists. + if ( tween.elem.nodeType !== 1 || + tween.elem[ tween.prop ] != null && tween.elem.style[ tween.prop ] == null ) { + return tween.elem[ tween.prop ]; + } + + // Passing an empty string as a 3rd parameter to .css will automatically + // attempt a parseFloat and fallback to a string if the parse fails. + // Simple values such as "10px" are parsed to Float; + // complex values such as "rotate(1rad)" are returned as-is. + result = jQuery.css( tween.elem, tween.prop, "" ); + + // Empty strings, null, undefined and "auto" are converted to 0. + return !result || result === "auto" ? 0 : result; + }, + set: function( tween ) { + + // Use step hook for back compat. + // Use cssHook if its there. + // Use .style if available and use plain properties where available. + if ( jQuery.fx.step[ tween.prop ] ) { + jQuery.fx.step[ tween.prop ]( tween ); + } else if ( tween.elem.nodeType === 1 && ( + jQuery.cssHooks[ tween.prop ] || + tween.elem.style[ finalPropName( tween.prop ) ] != null ) ) { + jQuery.style( tween.elem, tween.prop, tween.now + tween.unit ); + } else { + tween.elem[ tween.prop ] = tween.now; + } + } + } +}; + +// Support: IE <=9 only +// Panic based approach to setting things on disconnected nodes +Tween.propHooks.scrollTop = Tween.propHooks.scrollLeft = { + set: function( tween ) { + if ( tween.elem.nodeType && tween.elem.parentNode ) { + tween.elem[ tween.prop ] = tween.now; + } + } +}; + +jQuery.easing = { + linear: function( p ) { + return p; + }, + swing: function( p ) { + return 0.5 - Math.cos( p * Math.PI ) / 2; + }, + _default: "swing" +}; + +jQuery.fx = Tween.prototype.init; + +// Back compat <1.8 extension point +jQuery.fx.step = {}; + + + + +var + fxNow, inProgress, + rfxtypes = /^(?:toggle|show|hide)$/, + rrun = /queueHooks$/; + +function schedule() { + if ( inProgress ) { + if ( document.hidden === false && window.requestAnimationFrame ) { + window.requestAnimationFrame( schedule ); + } else { + window.setTimeout( schedule, jQuery.fx.interval ); + } + + jQuery.fx.tick(); + } +} + +// Animations created synchronously will run synchronously +function createFxNow() { + window.setTimeout( function() { + fxNow = undefined; + } ); + return ( fxNow = Date.now() ); +} + +// Generate parameters to create a standard animation +function genFx( type, includeWidth ) { + var which, + i = 0, + attrs = { height: type }; + + // If we include width, step value is 1 to do all cssExpand values, + // otherwise step value is 2 to skip over Left and Right + includeWidth = includeWidth ? 1 : 0; + for ( ; i < 4; i += 2 - includeWidth ) { + which = cssExpand[ i ]; + attrs[ "margin" + which ] = attrs[ "padding" + which ] = type; + } + + if ( includeWidth ) { + attrs.opacity = attrs.width = type; + } + + return attrs; +} + +function createTween( value, prop, animation ) { + var tween, + collection = ( Animation.tweeners[ prop ] || [] ).concat( Animation.tweeners[ "*" ] ), + index = 0, + length = collection.length; + for ( ; index < length; index++ ) { + if ( ( tween = collection[ index ].call( animation, prop, value ) ) ) { + + // We're done with this property + return tween; + } + } +} + +function defaultPrefilter( elem, props, opts ) { + var prop, value, toggle, hooks, oldfire, propTween, restoreDisplay, display, + isBox = "width" in props || "height" in props, + anim = this, + orig = {}, + style = elem.style, + hidden = elem.nodeType && isHiddenWithinTree( elem ), + dataShow = dataPriv.get( elem, "fxshow" ); + + // Queue-skipping animations hijack the fx hooks + if ( !opts.queue ) { + hooks = jQuery._queueHooks( elem, "fx" ); + if ( hooks.unqueued == null ) { + hooks.unqueued = 0; + oldfire = hooks.empty.fire; + hooks.empty.fire = function() { + if ( !hooks.unqueued ) { + oldfire(); + } + }; + } + hooks.unqueued++; + + anim.always( function() { + + // Ensure the complete handler is called before this completes + anim.always( function() { + hooks.unqueued--; + if ( !jQuery.queue( elem, "fx" ).length ) { + hooks.empty.fire(); + } + } ); + } ); + } + + // Detect show/hide animations + for ( prop in props ) { + value = props[ prop ]; + if ( rfxtypes.test( value ) ) { + delete props[ prop ]; + toggle = toggle || value === "toggle"; + if ( value === ( hidden ? "hide" : "show" ) ) { + + // Pretend to be hidden if this is a "show" and + // there is still data from a stopped show/hide + if ( value === "show" && dataShow && dataShow[ prop ] !== undefined ) { + hidden = true; + + // Ignore all other no-op show/hide data + } else { + continue; + } + } + orig[ prop ] = dataShow && dataShow[ prop ] || jQuery.style( elem, prop ); + } + } + + // Bail out if this is a no-op like .hide().hide() + propTween = !jQuery.isEmptyObject( props ); + if ( !propTween && jQuery.isEmptyObject( orig ) ) { + return; + } + + // Restrict "overflow" and "display" styles during box animations + if ( isBox && elem.nodeType === 1 ) { + + // Support: IE <=9 - 11, Edge 12 - 15 + // Record all 3 overflow attributes because IE does not infer the shorthand + // from identically-valued overflowX and overflowY and Edge just mirrors + // the overflowX value there. + opts.overflow = [ style.overflow, style.overflowX, style.overflowY ]; + + // Identify a display type, preferring old show/hide data over the CSS cascade + restoreDisplay = dataShow && dataShow.display; + if ( restoreDisplay == null ) { + restoreDisplay = dataPriv.get( elem, "display" ); + } + display = jQuery.css( elem, "display" ); + if ( display === "none" ) { + if ( restoreDisplay ) { + display = restoreDisplay; + } else { + + // Get nonempty value(s) by temporarily forcing visibility + showHide( [ elem ], true ); + restoreDisplay = elem.style.display || restoreDisplay; + display = jQuery.css( elem, "display" ); + showHide( [ elem ] ); + } + } + + // Animate inline elements as inline-block + if ( display === "inline" || display === "inline-block" && restoreDisplay != null ) { + if ( jQuery.css( elem, "float" ) === "none" ) { + + // Restore the original display value at the end of pure show/hide animations + if ( !propTween ) { + anim.done( function() { + style.display = restoreDisplay; + } ); + if ( restoreDisplay == null ) { + display = style.display; + restoreDisplay = display === "none" ? "" : display; + } + } + style.display = "inline-block"; + } + } + } + + if ( opts.overflow ) { + style.overflow = "hidden"; + anim.always( function() { + style.overflow = opts.overflow[ 0 ]; + style.overflowX = opts.overflow[ 1 ]; + style.overflowY = opts.overflow[ 2 ]; + } ); + } + + // Implement show/hide animations + propTween = false; + for ( prop in orig ) { + + // General show/hide setup for this element animation + if ( !propTween ) { + if ( dataShow ) { + if ( "hidden" in dataShow ) { + hidden = dataShow.hidden; + } + } else { + dataShow = dataPriv.access( elem, "fxshow", { display: restoreDisplay } ); + } + + // Store hidden/visible for toggle so `.stop().toggle()` "reverses" + if ( toggle ) { + dataShow.hidden = !hidden; + } + + // Show elements before animating them + if ( hidden ) { + showHide( [ elem ], true ); + } + + /* eslint-disable no-loop-func */ + + anim.done( function() { + + /* eslint-enable no-loop-func */ + + // The final step of a "hide" animation is actually hiding the element + if ( !hidden ) { + showHide( [ elem ] ); + } + dataPriv.remove( elem, "fxshow" ); + for ( prop in orig ) { + jQuery.style( elem, prop, orig[ prop ] ); + } + } ); + } + + // Per-property setup + propTween = createTween( hidden ? dataShow[ prop ] : 0, prop, anim ); + if ( !( prop in dataShow ) ) { + dataShow[ prop ] = propTween.start; + if ( hidden ) { + propTween.end = propTween.start; + propTween.start = 0; + } + } + } +} + +function propFilter( props, specialEasing ) { + var index, name, easing, value, hooks; + + // camelCase, specialEasing and expand cssHook pass + for ( index in props ) { + name = camelCase( index ); + easing = specialEasing[ name ]; + value = props[ index ]; + if ( Array.isArray( value ) ) { + easing = value[ 1 ]; + value = props[ index ] = value[ 0 ]; + } + + if ( index !== name ) { + props[ name ] = value; + delete props[ index ]; + } + + hooks = jQuery.cssHooks[ name ]; + if ( hooks && "expand" in hooks ) { + value = hooks.expand( value ); + delete props[ name ]; + + // Not quite $.extend, this won't overwrite existing keys. + // Reusing 'index' because we have the correct "name" + for ( index in value ) { + if ( !( index in props ) ) { + props[ index ] = value[ index ]; + specialEasing[ index ] = easing; + } + } + } else { + specialEasing[ name ] = easing; + } + } +} + +function Animation( elem, properties, options ) { + var result, + stopped, + index = 0, + length = Animation.prefilters.length, + deferred = jQuery.Deferred().always( function() { + + // Don't match elem in the :animated selector + delete tick.elem; + } ), + tick = function() { + if ( stopped ) { + return false; + } + var currentTime = fxNow || createFxNow(), + remaining = Math.max( 0, animation.startTime + animation.duration - currentTime ), + + // Support: Android 2.3 only + // Archaic crash bug won't allow us to use `1 - ( 0.5 || 0 )` (#12497) + temp = remaining / animation.duration || 0, + percent = 1 - temp, + index = 0, + length = animation.tweens.length; + + for ( ; index < length; index++ ) { + animation.tweens[ index ].run( percent ); + } + + deferred.notifyWith( elem, [ animation, percent, remaining ] ); + + // If there's more to do, yield + if ( percent < 1 && length ) { + return remaining; + } + + // If this was an empty animation, synthesize a final progress notification + if ( !length ) { + deferred.notifyWith( elem, [ animation, 1, 0 ] ); + } + + // Resolve the animation and report its conclusion + deferred.resolveWith( elem, [ animation ] ); + return false; + }, + animation = deferred.promise( { + elem: elem, + props: jQuery.extend( {}, properties ), + opts: jQuery.extend( true, { + specialEasing: {}, + easing: jQuery.easing._default + }, options ), + originalProperties: properties, + originalOptions: options, + startTime: fxNow || createFxNow(), + duration: options.duration, + tweens: [], + createTween: function( prop, end ) { + var tween = jQuery.Tween( elem, animation.opts, prop, end, + animation.opts.specialEasing[ prop ] || animation.opts.easing ); + animation.tweens.push( tween ); + return tween; + }, + stop: function( gotoEnd ) { + var index = 0, + + // If we are going to the end, we want to run all the tweens + // otherwise we skip this part + length = gotoEnd ? animation.tweens.length : 0; + if ( stopped ) { + return this; + } + stopped = true; + for ( ; index < length; index++ ) { + animation.tweens[ index ].run( 1 ); + } + + // Resolve when we played the last frame; otherwise, reject + if ( gotoEnd ) { + deferred.notifyWith( elem, [ animation, 1, 0 ] ); + deferred.resolveWith( elem, [ animation, gotoEnd ] ); + } else { + deferred.rejectWith( elem, [ animation, gotoEnd ] ); + } + return this; + } + } ), + props = animation.props; + + propFilter( props, animation.opts.specialEasing ); + + for ( ; index < length; index++ ) { + result = Animation.prefilters[ index ].call( animation, elem, props, animation.opts ); + if ( result ) { + if ( isFunction( result.stop ) ) { + jQuery._queueHooks( animation.elem, animation.opts.queue ).stop = + result.stop.bind( result ); + } + return result; + } + } + + jQuery.map( props, createTween, animation ); + + if ( isFunction( animation.opts.start ) ) { + animation.opts.start.call( elem, animation ); + } + + // Attach callbacks from options + animation + .progress( animation.opts.progress ) + .done( animation.opts.done, animation.opts.complete ) + .fail( animation.opts.fail ) + .always( animation.opts.always ); + + jQuery.fx.timer( + jQuery.extend( tick, { + elem: elem, + anim: animation, + queue: animation.opts.queue + } ) + ); + + return animation; +} + +jQuery.Animation = jQuery.extend( Animation, { + + tweeners: { + "*": [ function( prop, value ) { + var tween = this.createTween( prop, value ); + adjustCSS( tween.elem, prop, rcssNum.exec( value ), tween ); + return tween; + } ] + }, + + tweener: function( props, callback ) { + if ( isFunction( props ) ) { + callback = props; + props = [ "*" ]; + } else { + props = props.match( rnothtmlwhite ); + } + + var prop, + index = 0, + length = props.length; + + for ( ; index < length; index++ ) { + prop = props[ index ]; + Animation.tweeners[ prop ] = Animation.tweeners[ prop ] || []; + Animation.tweeners[ prop ].unshift( callback ); + } + }, + + prefilters: [ defaultPrefilter ], + + prefilter: function( callback, prepend ) { + if ( prepend ) { + Animation.prefilters.unshift( callback ); + } else { + Animation.prefilters.push( callback ); + } + } +} ); + +jQuery.speed = function( speed, easing, fn ) { + var opt = speed && typeof speed === "object" ? jQuery.extend( {}, speed ) : { + complete: fn || !fn && easing || + isFunction( speed ) && speed, + duration: speed, + easing: fn && easing || easing && !isFunction( easing ) && easing + }; + + // Go to the end state if fx are off + if ( jQuery.fx.off ) { + opt.duration = 0; + + } else { + if ( typeof opt.duration !== "number" ) { + if ( opt.duration in jQuery.fx.speeds ) { + opt.duration = jQuery.fx.speeds[ opt.duration ]; + + } else { + opt.duration = jQuery.fx.speeds._default; + } + } + } + + // Normalize opt.queue - true/undefined/null -> "fx" + if ( opt.queue == null || opt.queue === true ) { + opt.queue = "fx"; + } + + // Queueing + opt.old = opt.complete; + + opt.complete = function() { + if ( isFunction( opt.old ) ) { + opt.old.call( this ); + } + + if ( opt.queue ) { + jQuery.dequeue( this, opt.queue ); + } + }; + + return opt; +}; + +jQuery.fn.extend( { + fadeTo: function( speed, to, easing, callback ) { + + // Show any hidden elements after setting opacity to 0 + return this.filter( isHiddenWithinTree ).css( "opacity", 0 ).show() + + // Animate to the value specified + .end().animate( { opacity: to }, speed, easing, callback ); + }, + animate: function( prop, speed, easing, callback ) { + var empty = jQuery.isEmptyObject( prop ), + optall = jQuery.speed( speed, easing, callback ), + doAnimation = function() { + + // Operate on a copy of prop so per-property easing won't be lost + var anim = Animation( this, jQuery.extend( {}, prop ), optall ); + + // Empty animations, or finishing resolves immediately + if ( empty || dataPriv.get( this, "finish" ) ) { + anim.stop( true ); + } + }; + doAnimation.finish = doAnimation; + + return empty || optall.queue === false ? + this.each( doAnimation ) : + this.queue( optall.queue, doAnimation ); + }, + stop: function( type, clearQueue, gotoEnd ) { + var stopQueue = function( hooks ) { + var stop = hooks.stop; + delete hooks.stop; + stop( gotoEnd ); + }; + + if ( typeof type !== "string" ) { + gotoEnd = clearQueue; + clearQueue = type; + type = undefined; + } + if ( clearQueue ) { + this.queue( type || "fx", [] ); + } + + return this.each( function() { + var dequeue = true, + index = type != null && type + "queueHooks", + timers = jQuery.timers, + data = dataPriv.get( this ); + + if ( index ) { + if ( data[ index ] && data[ index ].stop ) { + stopQueue( data[ index ] ); + } + } else { + for ( index in data ) { + if ( data[ index ] && data[ index ].stop && rrun.test( index ) ) { + stopQueue( data[ index ] ); + } + } + } + + for ( index = timers.length; index--; ) { + if ( timers[ index ].elem === this && + ( type == null || timers[ index ].queue === type ) ) { + + timers[ index ].anim.stop( gotoEnd ); + dequeue = false; + timers.splice( index, 1 ); + } + } + + // Start the next in the queue if the last step wasn't forced. + // Timers currently will call their complete callbacks, which + // will dequeue but only if they were gotoEnd. + if ( dequeue || !gotoEnd ) { + jQuery.dequeue( this, type ); + } + } ); + }, + finish: function( type ) { + if ( type !== false ) { + type = type || "fx"; + } + return this.each( function() { + var index, + data = dataPriv.get( this ), + queue = data[ type + "queue" ], + hooks = data[ type + "queueHooks" ], + timers = jQuery.timers, + length = queue ? queue.length : 0; + + // Enable finishing flag on private data + data.finish = true; + + // Empty the queue first + jQuery.queue( this, type, [] ); + + if ( hooks && hooks.stop ) { + hooks.stop.call( this, true ); + } + + // Look for any active animations, and finish them + for ( index = timers.length; index--; ) { + if ( timers[ index ].elem === this && timers[ index ].queue === type ) { + timers[ index ].anim.stop( true ); + timers.splice( index, 1 ); + } + } + + // Look for any animations in the old queue and finish them + for ( index = 0; index < length; index++ ) { + if ( queue[ index ] && queue[ index ].finish ) { + queue[ index ].finish.call( this ); + } + } + + // Turn off finishing flag + delete data.finish; + } ); + } +} ); + +jQuery.each( [ "toggle", "show", "hide" ], function( _i, name ) { + var cssFn = jQuery.fn[ name ]; + jQuery.fn[ name ] = function( speed, easing, callback ) { + return speed == null || typeof speed === "boolean" ? + cssFn.apply( this, arguments ) : + this.animate( genFx( name, true ), speed, easing, callback ); + }; +} ); + +// Generate shortcuts for custom animations +jQuery.each( { + slideDown: genFx( "show" ), + slideUp: genFx( "hide" ), + slideToggle: genFx( "toggle" ), + fadeIn: { opacity: "show" }, + fadeOut: { opacity: "hide" }, + fadeToggle: { opacity: "toggle" } +}, function( name, props ) { + jQuery.fn[ name ] = function( speed, easing, callback ) { + return this.animate( props, speed, easing, callback ); + }; +} ); + +jQuery.timers = []; +jQuery.fx.tick = function() { + var timer, + i = 0, + timers = jQuery.timers; + + fxNow = Date.now(); + + for ( ; i < timers.length; i++ ) { + timer = timers[ i ]; + + // Run the timer and safely remove it when done (allowing for external removal) + if ( !timer() && timers[ i ] === timer ) { + timers.splice( i--, 1 ); + } + } + + if ( !timers.length ) { + jQuery.fx.stop(); + } + fxNow = undefined; +}; + +jQuery.fx.timer = function( timer ) { + jQuery.timers.push( timer ); + jQuery.fx.start(); +}; + +jQuery.fx.interval = 13; +jQuery.fx.start = function() { + if ( inProgress ) { + return; + } + + inProgress = true; + schedule(); +}; + +jQuery.fx.stop = function() { + inProgress = null; +}; + +jQuery.fx.speeds = { + slow: 600, + fast: 200, + + // Default speed + _default: 400 +}; + + +// Based off of the plugin by Clint Helfers, with permission. +// https://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/ +jQuery.fn.delay = function( time, type ) { + time = jQuery.fx ? jQuery.fx.speeds[ time ] || time : time; + type = type || "fx"; + + return this.queue( type, function( next, hooks ) { + var timeout = window.setTimeout( next, time ); + hooks.stop = function() { + window.clearTimeout( timeout ); + }; + } ); +}; + + +( function() { + var input = document.createElement( "input" ), + select = document.createElement( "select" ), + opt = select.appendChild( document.createElement( "option" ) ); + + input.type = "checkbox"; + + // Support: Android <=4.3 only + // Default value for a checkbox should be "on" + support.checkOn = input.value !== ""; + + // Support: IE <=11 only + // Must access selectedIndex to make default options select + support.optSelected = opt.selected; + + // Support: IE <=11 only + // An input loses its value after becoming a radio + input = document.createElement( "input" ); + input.value = "t"; + input.type = "radio"; + support.radioValue = input.value === "t"; +} )(); + + +var boolHook, + attrHandle = jQuery.expr.attrHandle; + +jQuery.fn.extend( { + attr: function( name, value ) { + return access( this, jQuery.attr, name, value, arguments.length > 1 ); + }, + + removeAttr: function( name ) { + return this.each( function() { + jQuery.removeAttr( this, name ); + } ); + } +} ); + +jQuery.extend( { + attr: function( elem, name, value ) { + var ret, hooks, + nType = elem.nodeType; + + // Don't get/set attributes on text, comment and attribute nodes + if ( nType === 3 || nType === 8 || nType === 2 ) { + return; + } + + // Fallback to prop when attributes are not supported + if ( typeof elem.getAttribute === "undefined" ) { + return jQuery.prop( elem, name, value ); + } + + // Attribute hooks are determined by the lowercase version + // Grab necessary hook if one is defined + if ( nType !== 1 || !jQuery.isXMLDoc( elem ) ) { + hooks = jQuery.attrHooks[ name.toLowerCase() ] || + ( jQuery.expr.match.bool.test( name ) ? boolHook : undefined ); + } + + if ( value !== undefined ) { + if ( value === null ) { + jQuery.removeAttr( elem, name ); + return; + } + + if ( hooks && "set" in hooks && + ( ret = hooks.set( elem, value, name ) ) !== undefined ) { + return ret; + } + + elem.setAttribute( name, value + "" ); + return value; + } + + if ( hooks && "get" in hooks && ( ret = hooks.get( elem, name ) ) !== null ) { + return ret; + } + + ret = jQuery.find.attr( elem, name ); + + // Non-existent attributes return null, we normalize to undefined + return ret == null ? undefined : ret; + }, + + attrHooks: { + type: { + set: function( elem, value ) { + if ( !support.radioValue && value === "radio" && + nodeName( elem, "input" ) ) { + var val = elem.value; + elem.setAttribute( "type", value ); + if ( val ) { + elem.value = val; + } + return value; + } + } + } + }, + + removeAttr: function( elem, value ) { + var name, + i = 0, + + // Attribute names can contain non-HTML whitespace characters + // https://html.spec.whatwg.org/multipage/syntax.html#attributes-2 + attrNames = value && value.match( rnothtmlwhite ); + + if ( attrNames && elem.nodeType === 1 ) { + while ( ( name = attrNames[ i++ ] ) ) { + elem.removeAttribute( name ); + } + } + } +} ); + +// Hooks for boolean attributes +boolHook = { + set: function( elem, value, name ) { + if ( value === false ) { + + // Remove boolean attributes when set to false + jQuery.removeAttr( elem, name ); + } else { + elem.setAttribute( name, name ); + } + return name; + } +}; + +jQuery.each( jQuery.expr.match.bool.source.match( /\w+/g ), function( _i, name ) { + var getter = attrHandle[ name ] || jQuery.find.attr; + + attrHandle[ name ] = function( elem, name, isXML ) { + var ret, handle, + lowercaseName = name.toLowerCase(); + + if ( !isXML ) { + + // Avoid an infinite loop by temporarily removing this function from the getter + handle = attrHandle[ lowercaseName ]; + attrHandle[ lowercaseName ] = ret; + ret = getter( elem, name, isXML ) != null ? + lowercaseName : + null; + attrHandle[ lowercaseName ] = handle; + } + return ret; + }; +} ); + + + + +var rfocusable = /^(?:input|select|textarea|button)$/i, + rclickable = /^(?:a|area)$/i; + +jQuery.fn.extend( { + prop: function( name, value ) { + return access( this, jQuery.prop, name, value, arguments.length > 1 ); + }, + + removeProp: function( name ) { + return this.each( function() { + delete this[ jQuery.propFix[ name ] || name ]; + } ); + } +} ); + +jQuery.extend( { + prop: function( elem, name, value ) { + var ret, hooks, + nType = elem.nodeType; + + // Don't get/set properties on text, comment and attribute nodes + if ( nType === 3 || nType === 8 || nType === 2 ) { + return; + } + + if ( nType !== 1 || !jQuery.isXMLDoc( elem ) ) { + + // Fix name and attach hooks + name = jQuery.propFix[ name ] || name; + hooks = jQuery.propHooks[ name ]; + } + + if ( value !== undefined ) { + if ( hooks && "set" in hooks && + ( ret = hooks.set( elem, value, name ) ) !== undefined ) { + return ret; + } + + return ( elem[ name ] = value ); + } + + if ( hooks && "get" in hooks && ( ret = hooks.get( elem, name ) ) !== null ) { + return ret; + } + + return elem[ name ]; + }, + + propHooks: { + tabIndex: { + get: function( elem ) { + + // Support: IE <=9 - 11 only + // elem.tabIndex doesn't always return the + // correct value when it hasn't been explicitly set + // https://web.archive.org/web/20141116233347/http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/ + // Use proper attribute retrieval(#12072) + var tabindex = jQuery.find.attr( elem, "tabindex" ); + + if ( tabindex ) { + return parseInt( tabindex, 10 ); + } + + if ( + rfocusable.test( elem.nodeName ) || + rclickable.test( elem.nodeName ) && + elem.href + ) { + return 0; + } + + return -1; + } + } + }, + + propFix: { + "for": "htmlFor", + "class": "className" + } +} ); + +// Support: IE <=11 only +// Accessing the selectedIndex property +// forces the browser to respect setting selected +// on the option +// The getter ensures a default option is selected +// when in an optgroup +// eslint rule "no-unused-expressions" is disabled for this code +// since it considers such accessions noop +if ( !support.optSelected ) { + jQuery.propHooks.selected = { + get: function( elem ) { + + /* eslint no-unused-expressions: "off" */ + + var parent = elem.parentNode; + if ( parent && parent.parentNode ) { + parent.parentNode.selectedIndex; + } + return null; + }, + set: function( elem ) { + + /* eslint no-unused-expressions: "off" */ + + var parent = elem.parentNode; + if ( parent ) { + parent.selectedIndex; + + if ( parent.parentNode ) { + parent.parentNode.selectedIndex; + } + } + } + }; +} + +jQuery.each( [ + "tabIndex", + "readOnly", + "maxLength", + "cellSpacing", + "cellPadding", + "rowSpan", + "colSpan", + "useMap", + "frameBorder", + "contentEditable" +], function() { + jQuery.propFix[ this.toLowerCase() ] = this; +} ); + + + + + // Strip and collapse whitespace according to HTML spec + // https://infra.spec.whatwg.org/#strip-and-collapse-ascii-whitespace + function stripAndCollapse( value ) { + var tokens = value.match( rnothtmlwhite ) || []; + return tokens.join( " " ); + } + + +function getClass( elem ) { + return elem.getAttribute && elem.getAttribute( "class" ) || ""; +} + +function classesToArray( value ) { + if ( Array.isArray( value ) ) { + return value; + } + if ( typeof value === "string" ) { + return value.match( rnothtmlwhite ) || []; + } + return []; +} + +jQuery.fn.extend( { + addClass: function( value ) { + var classes, elem, cur, curValue, clazz, j, finalValue, + i = 0; + + if ( isFunction( value ) ) { + return this.each( function( j ) { + jQuery( this ).addClass( value.call( this, j, getClass( this ) ) ); + } ); + } + + classes = classesToArray( value ); + + if ( classes.length ) { + while ( ( elem = this[ i++ ] ) ) { + curValue = getClass( elem ); + cur = elem.nodeType === 1 && ( " " + stripAndCollapse( curValue ) + " " ); + + if ( cur ) { + j = 0; + while ( ( clazz = classes[ j++ ] ) ) { + if ( cur.indexOf( " " + clazz + " " ) < 0 ) { + cur += clazz + " "; + } + } + + // Only assign if different to avoid unneeded rendering. + finalValue = stripAndCollapse( cur ); + if ( curValue !== finalValue ) { + elem.setAttribute( "class", finalValue ); + } + } + } + } + + return this; + }, + + removeClass: function( value ) { + var classes, elem, cur, curValue, clazz, j, finalValue, + i = 0; + + if ( isFunction( value ) ) { + return this.each( function( j ) { + jQuery( this ).removeClass( value.call( this, j, getClass( this ) ) ); + } ); + } + + if ( !arguments.length ) { + return this.attr( "class", "" ); + } + + classes = classesToArray( value ); + + if ( classes.length ) { + while ( ( elem = this[ i++ ] ) ) { + curValue = getClass( elem ); + + // This expression is here for better compressibility (see addClass) + cur = elem.nodeType === 1 && ( " " + stripAndCollapse( curValue ) + " " ); + + if ( cur ) { + j = 0; + while ( ( clazz = classes[ j++ ] ) ) { + + // Remove *all* instances + while ( cur.indexOf( " " + clazz + " " ) > -1 ) { + cur = cur.replace( " " + clazz + " ", " " ); + } + } + + // Only assign if different to avoid unneeded rendering. + finalValue = stripAndCollapse( cur ); + if ( curValue !== finalValue ) { + elem.setAttribute( "class", finalValue ); + } + } + } + } + + return this; + }, + + toggleClass: function( value, stateVal ) { + var type = typeof value, + isValidValue = type === "string" || Array.isArray( value ); + + if ( typeof stateVal === "boolean" && isValidValue ) { + return stateVal ? this.addClass( value ) : this.removeClass( value ); + } + + if ( isFunction( value ) ) { + return this.each( function( i ) { + jQuery( this ).toggleClass( + value.call( this, i, getClass( this ), stateVal ), + stateVal + ); + } ); + } + + return this.each( function() { + var className, i, self, classNames; + + if ( isValidValue ) { + + // Toggle individual class names + i = 0; + self = jQuery( this ); + classNames = classesToArray( value ); + + while ( ( className = classNames[ i++ ] ) ) { + + // Check each className given, space separated list + if ( self.hasClass( className ) ) { + self.removeClass( className ); + } else { + self.addClass( className ); + } + } + + // Toggle whole class name + } else if ( value === undefined || type === "boolean" ) { + className = getClass( this ); + if ( className ) { + + // Store className if set + dataPriv.set( this, "__className__", className ); + } + + // If the element has a class name or if we're passed `false`, + // then remove the whole classname (if there was one, the above saved it). + // Otherwise bring back whatever was previously saved (if anything), + // falling back to the empty string if nothing was stored. + if ( this.setAttribute ) { + this.setAttribute( "class", + className || value === false ? + "" : + dataPriv.get( this, "__className__" ) || "" + ); + } + } + } ); + }, + + hasClass: function( selector ) { + var className, elem, + i = 0; + + className = " " + selector + " "; + while ( ( elem = this[ i++ ] ) ) { + if ( elem.nodeType === 1 && + ( " " + stripAndCollapse( getClass( elem ) ) + " " ).indexOf( className ) > -1 ) { + return true; + } + } + + return false; + } +} ); + + + + +var rreturn = /\r/g; + +jQuery.fn.extend( { + val: function( value ) { + var hooks, ret, valueIsFunction, + elem = this[ 0 ]; + + if ( !arguments.length ) { + if ( elem ) { + hooks = jQuery.valHooks[ elem.type ] || + jQuery.valHooks[ elem.nodeName.toLowerCase() ]; + + if ( hooks && + "get" in hooks && + ( ret = hooks.get( elem, "value" ) ) !== undefined + ) { + return ret; + } + + ret = elem.value; + + // Handle most common string cases + if ( typeof ret === "string" ) { + return ret.replace( rreturn, "" ); + } + + // Handle cases where value is null/undef or number + return ret == null ? "" : ret; + } + + return; + } + + valueIsFunction = isFunction( value ); + + return this.each( function( i ) { + var val; + + if ( this.nodeType !== 1 ) { + return; + } + + if ( valueIsFunction ) { + val = value.call( this, i, jQuery( this ).val() ); + } else { + val = value; + } + + // Treat null/undefined as ""; convert numbers to string + if ( val == null ) { + val = ""; + + } else if ( typeof val === "number" ) { + val += ""; + + } else if ( Array.isArray( val ) ) { + val = jQuery.map( val, function( value ) { + return value == null ? "" : value + ""; + } ); + } + + hooks = jQuery.valHooks[ this.type ] || jQuery.valHooks[ this.nodeName.toLowerCase() ]; + + // If set returns undefined, fall back to normal setting + if ( !hooks || !( "set" in hooks ) || hooks.set( this, val, "value" ) === undefined ) { + this.value = val; + } + } ); + } +} ); + +jQuery.extend( { + valHooks: { + option: { + get: function( elem ) { + + var val = jQuery.find.attr( elem, "value" ); + return val != null ? + val : + + // Support: IE <=10 - 11 only + // option.text throws exceptions (#14686, #14858) + // Strip and collapse whitespace + // https://html.spec.whatwg.org/#strip-and-collapse-whitespace + stripAndCollapse( jQuery.text( elem ) ); + } + }, + select: { + get: function( elem ) { + var value, option, i, + options = elem.options, + index = elem.selectedIndex, + one = elem.type === "select-one", + values = one ? null : [], + max = one ? index + 1 : options.length; + + if ( index < 0 ) { + i = max; + + } else { + i = one ? index : 0; + } + + // Loop through all the selected options + for ( ; i < max; i++ ) { + option = options[ i ]; + + // Support: IE <=9 only + // IE8-9 doesn't update selected after form reset (#2551) + if ( ( option.selected || i === index ) && + + // Don't return options that are disabled or in a disabled optgroup + !option.disabled && + ( !option.parentNode.disabled || + !nodeName( option.parentNode, "optgroup" ) ) ) { + + // Get the specific value for the option + value = jQuery( option ).val(); + + // We don't need an array for one selects + if ( one ) { + return value; + } + + // Multi-Selects return an array + values.push( value ); + } + } + + return values; + }, + + set: function( elem, value ) { + var optionSet, option, + options = elem.options, + values = jQuery.makeArray( value ), + i = options.length; + + while ( i-- ) { + option = options[ i ]; + + /* eslint-disable no-cond-assign */ + + if ( option.selected = + jQuery.inArray( jQuery.valHooks.option.get( option ), values ) > -1 + ) { + optionSet = true; + } + + /* eslint-enable no-cond-assign */ + } + + // Force browsers to behave consistently when non-matching value is set + if ( !optionSet ) { + elem.selectedIndex = -1; + } + return values; + } + } + } +} ); + +// Radios and checkboxes getter/setter +jQuery.each( [ "radio", "checkbox" ], function() { + jQuery.valHooks[ this ] = { + set: function( elem, value ) { + if ( Array.isArray( value ) ) { + return ( elem.checked = jQuery.inArray( jQuery( elem ).val(), value ) > -1 ); + } + } + }; + if ( !support.checkOn ) { + jQuery.valHooks[ this ].get = function( elem ) { + return elem.getAttribute( "value" ) === null ? "on" : elem.value; + }; + } +} ); + + + + +// Return jQuery for attributes-only inclusion + + +support.focusin = "onfocusin" in window; + + +var rfocusMorph = /^(?:focusinfocus|focusoutblur)$/, + stopPropagationCallback = function( e ) { + e.stopPropagation(); + }; + +jQuery.extend( jQuery.event, { + + trigger: function( event, data, elem, onlyHandlers ) { + + var i, cur, tmp, bubbleType, ontype, handle, special, lastElement, + eventPath = [ elem || document ], + type = hasOwn.call( event, "type" ) ? event.type : event, + namespaces = hasOwn.call( event, "namespace" ) ? event.namespace.split( "." ) : []; + + cur = lastElement = tmp = elem = elem || document; + + // Don't do events on text and comment nodes + if ( elem.nodeType === 3 || elem.nodeType === 8 ) { + return; + } + + // focus/blur morphs to focusin/out; ensure we're not firing them right now + if ( rfocusMorph.test( type + jQuery.event.triggered ) ) { + return; + } + + if ( type.indexOf( "." ) > -1 ) { + + // Namespaced trigger; create a regexp to match event type in handle() + namespaces = type.split( "." ); + type = namespaces.shift(); + namespaces.sort(); + } + ontype = type.indexOf( ":" ) < 0 && "on" + type; + + // Caller can pass in a jQuery.Event object, Object, or just an event type string + event = event[ jQuery.expando ] ? + event : + new jQuery.Event( type, typeof event === "object" && event ); + + // Trigger bitmask: & 1 for native handlers; & 2 for jQuery (always true) + event.isTrigger = onlyHandlers ? 2 : 3; + event.namespace = namespaces.join( "." ); + event.rnamespace = event.namespace ? + new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" ) : + null; + + // Clean up the event in case it is being reused + event.result = undefined; + if ( !event.target ) { + event.target = elem; + } + + // Clone any incoming data and prepend the event, creating the handler arg list + data = data == null ? + [ event ] : + jQuery.makeArray( data, [ event ] ); + + // Allow special events to draw outside the lines + special = jQuery.event.special[ type ] || {}; + if ( !onlyHandlers && special.trigger && special.trigger.apply( elem, data ) === false ) { + return; + } + + // Determine event propagation path in advance, per W3C events spec (#9951) + // Bubble up to document, then to window; watch for a global ownerDocument var (#9724) + if ( !onlyHandlers && !special.noBubble && !isWindow( elem ) ) { + + bubbleType = special.delegateType || type; + if ( !rfocusMorph.test( bubbleType + type ) ) { + cur = cur.parentNode; + } + for ( ; cur; cur = cur.parentNode ) { + eventPath.push( cur ); + tmp = cur; + } + + // Only add window if we got to document (e.g., not plain obj or detached DOM) + if ( tmp === ( elem.ownerDocument || document ) ) { + eventPath.push( tmp.defaultView || tmp.parentWindow || window ); + } + } + + // Fire handlers on the event path + i = 0; + while ( ( cur = eventPath[ i++ ] ) && !event.isPropagationStopped() ) { + lastElement = cur; + event.type = i > 1 ? + bubbleType : + special.bindType || type; + + // jQuery handler + handle = ( + dataPriv.get( cur, "events" ) || Object.create( null ) + )[ event.type ] && + dataPriv.get( cur, "handle" ); + if ( handle ) { + handle.apply( cur, data ); + } + + // Native handler + handle = ontype && cur[ ontype ]; + if ( handle && handle.apply && acceptData( cur ) ) { + event.result = handle.apply( cur, data ); + if ( event.result === false ) { + event.preventDefault(); + } + } + } + event.type = type; + + // If nobody prevented the default action, do it now + if ( !onlyHandlers && !event.isDefaultPrevented() ) { + + if ( ( !special._default || + special._default.apply( eventPath.pop(), data ) === false ) && + acceptData( elem ) ) { + + // Call a native DOM method on the target with the same name as the event. + // Don't do default actions on window, that's where global variables be (#6170) + if ( ontype && isFunction( elem[ type ] ) && !isWindow( elem ) ) { + + // Don't re-trigger an onFOO event when we call its FOO() method + tmp = elem[ ontype ]; + + if ( tmp ) { + elem[ ontype ] = null; + } + + // Prevent re-triggering of the same event, since we already bubbled it above + jQuery.event.triggered = type; + + if ( event.isPropagationStopped() ) { + lastElement.addEventListener( type, stopPropagationCallback ); + } + + elem[ type ](); + + if ( event.isPropagationStopped() ) { + lastElement.removeEventListener( type, stopPropagationCallback ); + } + + jQuery.event.triggered = undefined; + + if ( tmp ) { + elem[ ontype ] = tmp; + } + } + } + } + + return event.result; + }, + + // Piggyback on a donor event to simulate a different one + // Used only for `focus(in | out)` events + simulate: function( type, elem, event ) { + var e = jQuery.extend( + new jQuery.Event(), + event, + { + type: type, + isSimulated: true + } + ); + + jQuery.event.trigger( e, null, elem ); + } + +} ); + +jQuery.fn.extend( { + + trigger: function( type, data ) { + return this.each( function() { + jQuery.event.trigger( type, data, this ); + } ); + }, + triggerHandler: function( type, data ) { + var elem = this[ 0 ]; + if ( elem ) { + return jQuery.event.trigger( type, data, elem, true ); + } + } +} ); + + +// Support: Firefox <=44 +// Firefox doesn't have focus(in | out) events +// Related ticket - https://bugzilla.mozilla.org/show_bug.cgi?id=687787 +// +// Support: Chrome <=48 - 49, Safari <=9.0 - 9.1 +// focus(in | out) events fire after focus & blur events, +// which is spec violation - http://www.w3.org/TR/DOM-Level-3-Events/#events-focusevent-event-order +// Related ticket - https://bugs.chromium.org/p/chromium/issues/detail?id=449857 +if ( !support.focusin ) { + jQuery.each( { focus: "focusin", blur: "focusout" }, function( orig, fix ) { + + // Attach a single capturing handler on the document while someone wants focusin/focusout + var handler = function( event ) { + jQuery.event.simulate( fix, event.target, jQuery.event.fix( event ) ); + }; + + jQuery.event.special[ fix ] = { + setup: function() { + + // Handle: regular nodes (via `this.ownerDocument`), window + // (via `this.document`) & document (via `this`). + var doc = this.ownerDocument || this.document || this, + attaches = dataPriv.access( doc, fix ); + + if ( !attaches ) { + doc.addEventListener( orig, handler, true ); + } + dataPriv.access( doc, fix, ( attaches || 0 ) + 1 ); + }, + teardown: function() { + var doc = this.ownerDocument || this.document || this, + attaches = dataPriv.access( doc, fix ) - 1; + + if ( !attaches ) { + doc.removeEventListener( orig, handler, true ); + dataPriv.remove( doc, fix ); + + } else { + dataPriv.access( doc, fix, attaches ); + } + } + }; + } ); +} +var location = window.location; + +var nonce = { guid: Date.now() }; + +var rquery = ( /\?/ ); + + + +// Cross-browser xml parsing +jQuery.parseXML = function( data ) { + var xml; + if ( !data || typeof data !== "string" ) { + return null; + } + + // Support: IE 9 - 11 only + // IE throws on parseFromString with invalid input. + try { + xml = ( new window.DOMParser() ).parseFromString( data, "text/xml" ); + } catch ( e ) { + xml = undefined; + } + + if ( !xml || xml.getElementsByTagName( "parsererror" ).length ) { + jQuery.error( "Invalid XML: " + data ); + } + return xml; +}; + + +var + rbracket = /\[\]$/, + rCRLF = /\r?\n/g, + rsubmitterTypes = /^(?:submit|button|image|reset|file)$/i, + rsubmittable = /^(?:input|select|textarea|keygen)/i; + +function buildParams( prefix, obj, traditional, add ) { + var name; + + if ( Array.isArray( obj ) ) { + + // Serialize array item. + jQuery.each( obj, function( i, v ) { + if ( traditional || rbracket.test( prefix ) ) { + + // Treat each array item as a scalar. + add( prefix, v ); + + } else { + + // Item is non-scalar (array or object), encode its numeric index. + buildParams( + prefix + "[" + ( typeof v === "object" && v != null ? i : "" ) + "]", + v, + traditional, + add + ); + } + } ); + + } else if ( !traditional && toType( obj ) === "object" ) { + + // Serialize object item. + for ( name in obj ) { + buildParams( prefix + "[" + name + "]", obj[ name ], traditional, add ); + } + + } else { + + // Serialize scalar item. + add( prefix, obj ); + } +} + +// Serialize an array of form elements or a set of +// key/values into a query string +jQuery.param = function( a, traditional ) { + var prefix, + s = [], + add = function( key, valueOrFunction ) { + + // If value is a function, invoke it and use its return value + var value = isFunction( valueOrFunction ) ? + valueOrFunction() : + valueOrFunction; + + s[ s.length ] = encodeURIComponent( key ) + "=" + + encodeURIComponent( value == null ? "" : value ); + }; + + if ( a == null ) { + return ""; + } + + // If an array was passed in, assume that it is an array of form elements. + if ( Array.isArray( a ) || ( a.jquery && !jQuery.isPlainObject( a ) ) ) { + + // Serialize the form elements + jQuery.each( a, function() { + add( this.name, this.value ); + } ); + + } else { + + // If traditional, encode the "old" way (the way 1.3.2 or older + // did it), otherwise encode params recursively. + for ( prefix in a ) { + buildParams( prefix, a[ prefix ], traditional, add ); + } + } + + // Return the resulting serialization + return s.join( "&" ); +}; + +jQuery.fn.extend( { + serialize: function() { + return jQuery.param( this.serializeArray() ); + }, + serializeArray: function() { + return this.map( function() { + + // Can add propHook for "elements" to filter or add form elements + var elements = jQuery.prop( this, "elements" ); + return elements ? jQuery.makeArray( elements ) : this; + } ) + .filter( function() { + var type = this.type; + + // Use .is( ":disabled" ) so that fieldset[disabled] works + return this.name && !jQuery( this ).is( ":disabled" ) && + rsubmittable.test( this.nodeName ) && !rsubmitterTypes.test( type ) && + ( this.checked || !rcheckableType.test( type ) ); + } ) + .map( function( _i, elem ) { + var val = jQuery( this ).val(); + + if ( val == null ) { + return null; + } + + if ( Array.isArray( val ) ) { + return jQuery.map( val, function( val ) { + return { name: elem.name, value: val.replace( rCRLF, "\r\n" ) }; + } ); + } + + return { name: elem.name, value: val.replace( rCRLF, "\r\n" ) }; + } ).get(); + } +} ); + + +var + r20 = /%20/g, + rhash = /#.*$/, + rantiCache = /([?&])_=[^&]*/, + rheaders = /^(.*?):[ \t]*([^\r\n]*)$/mg, + + // #7653, #8125, #8152: local protocol detection + rlocalProtocol = /^(?:about|app|app-storage|.+-extension|file|res|widget):$/, + rnoContent = /^(?:GET|HEAD)$/, + rprotocol = /^\/\//, + + /* Prefilters + * 1) They are useful to introduce custom dataTypes (see ajax/jsonp.js for an example) + * 2) These are called: + * - BEFORE asking for a transport + * - AFTER param serialization (s.data is a string if s.processData is true) + * 3) key is the dataType + * 4) the catchall symbol "*" can be used + * 5) execution will start with transport dataType and THEN continue down to "*" if needed + */ + prefilters = {}, + + /* Transports bindings + * 1) key is the dataType + * 2) the catchall symbol "*" can be used + * 3) selection will start with transport dataType and THEN go to "*" if needed + */ + transports = {}, + + // Avoid comment-prolog char sequence (#10098); must appease lint and evade compression + allTypes = "*/".concat( "*" ), + + // Anchor tag for parsing the document origin + originAnchor = document.createElement( "a" ); + originAnchor.href = location.href; + +// Base "constructor" for jQuery.ajaxPrefilter and jQuery.ajaxTransport +function addToPrefiltersOrTransports( structure ) { + + // dataTypeExpression is optional and defaults to "*" + return function( dataTypeExpression, func ) { + + if ( typeof dataTypeExpression !== "string" ) { + func = dataTypeExpression; + dataTypeExpression = "*"; + } + + var dataType, + i = 0, + dataTypes = dataTypeExpression.toLowerCase().match( rnothtmlwhite ) || []; + + if ( isFunction( func ) ) { + + // For each dataType in the dataTypeExpression + while ( ( dataType = dataTypes[ i++ ] ) ) { + + // Prepend if requested + if ( dataType[ 0 ] === "+" ) { + dataType = dataType.slice( 1 ) || "*"; + ( structure[ dataType ] = structure[ dataType ] || [] ).unshift( func ); + + // Otherwise append + } else { + ( structure[ dataType ] = structure[ dataType ] || [] ).push( func ); + } + } + } + }; +} + +// Base inspection function for prefilters and transports +function inspectPrefiltersOrTransports( structure, options, originalOptions, jqXHR ) { + + var inspected = {}, + seekingTransport = ( structure === transports ); + + function inspect( dataType ) { + var selected; + inspected[ dataType ] = true; + jQuery.each( structure[ dataType ] || [], function( _, prefilterOrFactory ) { + var dataTypeOrTransport = prefilterOrFactory( options, originalOptions, jqXHR ); + if ( typeof dataTypeOrTransport === "string" && + !seekingTransport && !inspected[ dataTypeOrTransport ] ) { + + options.dataTypes.unshift( dataTypeOrTransport ); + inspect( dataTypeOrTransport ); + return false; + } else if ( seekingTransport ) { + return !( selected = dataTypeOrTransport ); + } + } ); + return selected; + } + + return inspect( options.dataTypes[ 0 ] ) || !inspected[ "*" ] && inspect( "*" ); +} + +// A special extend for ajax options +// that takes "flat" options (not to be deep extended) +// Fixes #9887 +function ajaxExtend( target, src ) { + var key, deep, + flatOptions = jQuery.ajaxSettings.flatOptions || {}; + + for ( key in src ) { + if ( src[ key ] !== undefined ) { + ( flatOptions[ key ] ? target : ( deep || ( deep = {} ) ) )[ key ] = src[ key ]; + } + } + if ( deep ) { + jQuery.extend( true, target, deep ); + } + + return target; +} + +/* Handles responses to an ajax request: + * - finds the right dataType (mediates between content-type and expected dataType) + * - returns the corresponding response + */ +function ajaxHandleResponses( s, jqXHR, responses ) { + + var ct, type, finalDataType, firstDataType, + contents = s.contents, + dataTypes = s.dataTypes; + + // Remove auto dataType and get content-type in the process + while ( dataTypes[ 0 ] === "*" ) { + dataTypes.shift(); + if ( ct === undefined ) { + ct = s.mimeType || jqXHR.getResponseHeader( "Content-Type" ); + } + } + + // Check if we're dealing with a known content-type + if ( ct ) { + for ( type in contents ) { + if ( contents[ type ] && contents[ type ].test( ct ) ) { + dataTypes.unshift( type ); + break; + } + } + } + + // Check to see if we have a response for the expected dataType + if ( dataTypes[ 0 ] in responses ) { + finalDataType = dataTypes[ 0 ]; + } else { + + // Try convertible dataTypes + for ( type in responses ) { + if ( !dataTypes[ 0 ] || s.converters[ type + " " + dataTypes[ 0 ] ] ) { + finalDataType = type; + break; + } + if ( !firstDataType ) { + firstDataType = type; + } + } + + // Or just use first one + finalDataType = finalDataType || firstDataType; + } + + // If we found a dataType + // We add the dataType to the list if needed + // and return the corresponding response + if ( finalDataType ) { + if ( finalDataType !== dataTypes[ 0 ] ) { + dataTypes.unshift( finalDataType ); + } + return responses[ finalDataType ]; + } +} + +/* Chain conversions given the request and the original response + * Also sets the responseXXX fields on the jqXHR instance + */ +function ajaxConvert( s, response, jqXHR, isSuccess ) { + var conv2, current, conv, tmp, prev, + converters = {}, + + // Work with a copy of dataTypes in case we need to modify it for conversion + dataTypes = s.dataTypes.slice(); + + // Create converters map with lowercased keys + if ( dataTypes[ 1 ] ) { + for ( conv in s.converters ) { + converters[ conv.toLowerCase() ] = s.converters[ conv ]; + } + } + + current = dataTypes.shift(); + + // Convert to each sequential dataType + while ( current ) { + + if ( s.responseFields[ current ] ) { + jqXHR[ s.responseFields[ current ] ] = response; + } + + // Apply the dataFilter if provided + if ( !prev && isSuccess && s.dataFilter ) { + response = s.dataFilter( response, s.dataType ); + } + + prev = current; + current = dataTypes.shift(); + + if ( current ) { + + // There's only work to do if current dataType is non-auto + if ( current === "*" ) { + + current = prev; + + // Convert response if prev dataType is non-auto and differs from current + } else if ( prev !== "*" && prev !== current ) { + + // Seek a direct converter + conv = converters[ prev + " " + current ] || converters[ "* " + current ]; + + // If none found, seek a pair + if ( !conv ) { + for ( conv2 in converters ) { + + // If conv2 outputs current + tmp = conv2.split( " " ); + if ( tmp[ 1 ] === current ) { + + // If prev can be converted to accepted input + conv = converters[ prev + " " + tmp[ 0 ] ] || + converters[ "* " + tmp[ 0 ] ]; + if ( conv ) { + + // Condense equivalence converters + if ( conv === true ) { + conv = converters[ conv2 ]; + + // Otherwise, insert the intermediate dataType + } else if ( converters[ conv2 ] !== true ) { + current = tmp[ 0 ]; + dataTypes.unshift( tmp[ 1 ] ); + } + break; + } + } + } + } + + // Apply converter (if not an equivalence) + if ( conv !== true ) { + + // Unless errors are allowed to bubble, catch and return them + if ( conv && s.throws ) { + response = conv( response ); + } else { + try { + response = conv( response ); + } catch ( e ) { + return { + state: "parsererror", + error: conv ? e : "No conversion from " + prev + " to " + current + }; + } + } + } + } + } + } + + return { state: "success", data: response }; +} + +jQuery.extend( { + + // Counter for holding the number of active queries + active: 0, + + // Last-Modified header cache for next request + lastModified: {}, + etag: {}, + + ajaxSettings: { + url: location.href, + type: "GET", + isLocal: rlocalProtocol.test( location.protocol ), + global: true, + processData: true, + async: true, + contentType: "application/x-www-form-urlencoded; charset=UTF-8", + + /* + timeout: 0, + data: null, + dataType: null, + username: null, + password: null, + cache: null, + throws: false, + traditional: false, + headers: {}, + */ + + accepts: { + "*": allTypes, + text: "text/plain", + html: "text/html", + xml: "application/xml, text/xml", + json: "application/json, text/javascript" + }, + + contents: { + xml: /\bxml\b/, + html: /\bhtml/, + json: /\bjson\b/ + }, + + responseFields: { + xml: "responseXML", + text: "responseText", + json: "responseJSON" + }, + + // Data converters + // Keys separate source (or catchall "*") and destination types with a single space + converters: { + + // Convert anything to text + "* text": String, + + // Text to html (true = no transformation) + "text html": true, + + // Evaluate text as a json expression + "text json": JSON.parse, + + // Parse text as xml + "text xml": jQuery.parseXML + }, + + // For options that shouldn't be deep extended: + // you can add your own custom options here if + // and when you create one that shouldn't be + // deep extended (see ajaxExtend) + flatOptions: { + url: true, + context: true + } + }, + + // Creates a full fledged settings object into target + // with both ajaxSettings and settings fields. + // If target is omitted, writes into ajaxSettings. + ajaxSetup: function( target, settings ) { + return settings ? + + // Building a settings object + ajaxExtend( ajaxExtend( target, jQuery.ajaxSettings ), settings ) : + + // Extending ajaxSettings + ajaxExtend( jQuery.ajaxSettings, target ); + }, + + ajaxPrefilter: addToPrefiltersOrTransports( prefilters ), + ajaxTransport: addToPrefiltersOrTransports( transports ), + + // Main method + ajax: function( url, options ) { + + // If url is an object, simulate pre-1.5 signature + if ( typeof url === "object" ) { + options = url; + url = undefined; + } + + // Force options to be an object + options = options || {}; + + var transport, + + // URL without anti-cache param + cacheURL, + + // Response headers + responseHeadersString, + responseHeaders, + + // timeout handle + timeoutTimer, + + // Url cleanup var + urlAnchor, + + // Request state (becomes false upon send and true upon completion) + completed, + + // To know if global events are to be dispatched + fireGlobals, + + // Loop variable + i, + + // uncached part of the url + uncached, + + // Create the final options object + s = jQuery.ajaxSetup( {}, options ), + + // Callbacks context + callbackContext = s.context || s, + + // Context for global events is callbackContext if it is a DOM node or jQuery collection + globalEventContext = s.context && + ( callbackContext.nodeType || callbackContext.jquery ) ? + jQuery( callbackContext ) : + jQuery.event, + + // Deferreds + deferred = jQuery.Deferred(), + completeDeferred = jQuery.Callbacks( "once memory" ), + + // Status-dependent callbacks + statusCode = s.statusCode || {}, + + // Headers (they are sent all at once) + requestHeaders = {}, + requestHeadersNames = {}, + + // Default abort message + strAbort = "canceled", + + // Fake xhr + jqXHR = { + readyState: 0, + + // Builds headers hashtable if needed + getResponseHeader: function( key ) { + var match; + if ( completed ) { + if ( !responseHeaders ) { + responseHeaders = {}; + while ( ( match = rheaders.exec( responseHeadersString ) ) ) { + responseHeaders[ match[ 1 ].toLowerCase() + " " ] = + ( responseHeaders[ match[ 1 ].toLowerCase() + " " ] || [] ) + .concat( match[ 2 ] ); + } + } + match = responseHeaders[ key.toLowerCase() + " " ]; + } + return match == null ? null : match.join( ", " ); + }, + + // Raw string + getAllResponseHeaders: function() { + return completed ? responseHeadersString : null; + }, + + // Caches the header + setRequestHeader: function( name, value ) { + if ( completed == null ) { + name = requestHeadersNames[ name.toLowerCase() ] = + requestHeadersNames[ name.toLowerCase() ] || name; + requestHeaders[ name ] = value; + } + return this; + }, + + // Overrides response content-type header + overrideMimeType: function( type ) { + if ( completed == null ) { + s.mimeType = type; + } + return this; + }, + + // Status-dependent callbacks + statusCode: function( map ) { + var code; + if ( map ) { + if ( completed ) { + + // Execute the appropriate callbacks + jqXHR.always( map[ jqXHR.status ] ); + } else { + + // Lazy-add the new callbacks in a way that preserves old ones + for ( code in map ) { + statusCode[ code ] = [ statusCode[ code ], map[ code ] ]; + } + } + } + return this; + }, + + // Cancel the request + abort: function( statusText ) { + var finalText = statusText || strAbort; + if ( transport ) { + transport.abort( finalText ); + } + done( 0, finalText ); + return this; + } + }; + + // Attach deferreds + deferred.promise( jqXHR ); + + // Add protocol if not provided (prefilters might expect it) + // Handle falsy url in the settings object (#10093: consistency with old signature) + // We also use the url parameter if available + s.url = ( ( url || s.url || location.href ) + "" ) + .replace( rprotocol, location.protocol + "//" ); + + // Alias method option to type as per ticket #12004 + s.type = options.method || options.type || s.method || s.type; + + // Extract dataTypes list + s.dataTypes = ( s.dataType || "*" ).toLowerCase().match( rnothtmlwhite ) || [ "" ]; + + // A cross-domain request is in order when the origin doesn't match the current origin. + if ( s.crossDomain == null ) { + urlAnchor = document.createElement( "a" ); + + // Support: IE <=8 - 11, Edge 12 - 15 + // IE throws exception on accessing the href property if url is malformed, + // e.g. http://example.com:80x/ + try { + urlAnchor.href = s.url; + + // Support: IE <=8 - 11 only + // Anchor's host property isn't correctly set when s.url is relative + urlAnchor.href = urlAnchor.href; + s.crossDomain = originAnchor.protocol + "//" + originAnchor.host !== + urlAnchor.protocol + "//" + urlAnchor.host; + } catch ( e ) { + + // If there is an error parsing the URL, assume it is crossDomain, + // it can be rejected by the transport if it is invalid + s.crossDomain = true; + } + } + + // Convert data if not already a string + if ( s.data && s.processData && typeof s.data !== "string" ) { + s.data = jQuery.param( s.data, s.traditional ); + } + + // Apply prefilters + inspectPrefiltersOrTransports( prefilters, s, options, jqXHR ); + + // If request was aborted inside a prefilter, stop there + if ( completed ) { + return jqXHR; + } + + // We can fire global events as of now if asked to + // Don't fire events if jQuery.event is undefined in an AMD-usage scenario (#15118) + fireGlobals = jQuery.event && s.global; + + // Watch for a new set of requests + if ( fireGlobals && jQuery.active++ === 0 ) { + jQuery.event.trigger( "ajaxStart" ); + } + + // Uppercase the type + s.type = s.type.toUpperCase(); + + // Determine if request has content + s.hasContent = !rnoContent.test( s.type ); + + // Save the URL in case we're toying with the If-Modified-Since + // and/or If-None-Match header later on + // Remove hash to simplify url manipulation + cacheURL = s.url.replace( rhash, "" ); + + // More options handling for requests with no content + if ( !s.hasContent ) { + + // Remember the hash so we can put it back + uncached = s.url.slice( cacheURL.length ); + + // If data is available and should be processed, append data to url + if ( s.data && ( s.processData || typeof s.data === "string" ) ) { + cacheURL += ( rquery.test( cacheURL ) ? "&" : "?" ) + s.data; + + // #9682: remove data so that it's not used in an eventual retry + delete s.data; + } + + // Add or update anti-cache param if needed + if ( s.cache === false ) { + cacheURL = cacheURL.replace( rantiCache, "$1" ); + uncached = ( rquery.test( cacheURL ) ? "&" : "?" ) + "_=" + ( nonce.guid++ ) + + uncached; + } + + // Put hash and anti-cache on the URL that will be requested (gh-1732) + s.url = cacheURL + uncached; + + // Change '%20' to '+' if this is encoded form body content (gh-2658) + } else if ( s.data && s.processData && + ( s.contentType || "" ).indexOf( "application/x-www-form-urlencoded" ) === 0 ) { + s.data = s.data.replace( r20, "+" ); + } + + // Set the If-Modified-Since and/or If-None-Match header, if in ifModified mode. + if ( s.ifModified ) { + if ( jQuery.lastModified[ cacheURL ] ) { + jqXHR.setRequestHeader( "If-Modified-Since", jQuery.lastModified[ cacheURL ] ); + } + if ( jQuery.etag[ cacheURL ] ) { + jqXHR.setRequestHeader( "If-None-Match", jQuery.etag[ cacheURL ] ); + } + } + + // Set the correct header, if data is being sent + if ( s.data && s.hasContent && s.contentType !== false || options.contentType ) { + jqXHR.setRequestHeader( "Content-Type", s.contentType ); + } + + // Set the Accepts header for the server, depending on the dataType + jqXHR.setRequestHeader( + "Accept", + s.dataTypes[ 0 ] && s.accepts[ s.dataTypes[ 0 ] ] ? + s.accepts[ s.dataTypes[ 0 ] ] + + ( s.dataTypes[ 0 ] !== "*" ? ", " + allTypes + "; q=0.01" : "" ) : + s.accepts[ "*" ] + ); + + // Check for headers option + for ( i in s.headers ) { + jqXHR.setRequestHeader( i, s.headers[ i ] ); + } + + // Allow custom headers/mimetypes and early abort + if ( s.beforeSend && + ( s.beforeSend.call( callbackContext, jqXHR, s ) === false || completed ) ) { + + // Abort if not done already and return + return jqXHR.abort(); + } + + // Aborting is no longer a cancellation + strAbort = "abort"; + + // Install callbacks on deferreds + completeDeferred.add( s.complete ); + jqXHR.done( s.success ); + jqXHR.fail( s.error ); + + // Get transport + transport = inspectPrefiltersOrTransports( transports, s, options, jqXHR ); + + // If no transport, we auto-abort + if ( !transport ) { + done( -1, "No Transport" ); + } else { + jqXHR.readyState = 1; + + // Send global event + if ( fireGlobals ) { + globalEventContext.trigger( "ajaxSend", [ jqXHR, s ] ); + } + + // If request was aborted inside ajaxSend, stop there + if ( completed ) { + return jqXHR; + } + + // Timeout + if ( s.async && s.timeout > 0 ) { + timeoutTimer = window.setTimeout( function() { + jqXHR.abort( "timeout" ); + }, s.timeout ); + } + + try { + completed = false; + transport.send( requestHeaders, done ); + } catch ( e ) { + + // Rethrow post-completion exceptions + if ( completed ) { + throw e; + } + + // Propagate others as results + done( -1, e ); + } + } + + // Callback for when everything is done + function done( status, nativeStatusText, responses, headers ) { + var isSuccess, success, error, response, modified, + statusText = nativeStatusText; + + // Ignore repeat invocations + if ( completed ) { + return; + } + + completed = true; + + // Clear timeout if it exists + if ( timeoutTimer ) { + window.clearTimeout( timeoutTimer ); + } + + // Dereference transport for early garbage collection + // (no matter how long the jqXHR object will be used) + transport = undefined; + + // Cache response headers + responseHeadersString = headers || ""; + + // Set readyState + jqXHR.readyState = status > 0 ? 4 : 0; + + // Determine if successful + isSuccess = status >= 200 && status < 300 || status === 304; + + // Get response data + if ( responses ) { + response = ajaxHandleResponses( s, jqXHR, responses ); + } + + // Use a noop converter for missing script + if ( !isSuccess && jQuery.inArray( "script", s.dataTypes ) > -1 ) { + s.converters[ "text script" ] = function() {}; + } + + // Convert no matter what (that way responseXXX fields are always set) + response = ajaxConvert( s, response, jqXHR, isSuccess ); + + // If successful, handle type chaining + if ( isSuccess ) { + + // Set the If-Modified-Since and/or If-None-Match header, if in ifModified mode. + if ( s.ifModified ) { + modified = jqXHR.getResponseHeader( "Last-Modified" ); + if ( modified ) { + jQuery.lastModified[ cacheURL ] = modified; + } + modified = jqXHR.getResponseHeader( "etag" ); + if ( modified ) { + jQuery.etag[ cacheURL ] = modified; + } + } + + // if no content + if ( status === 204 || s.type === "HEAD" ) { + statusText = "nocontent"; + + // if not modified + } else if ( status === 304 ) { + statusText = "notmodified"; + + // If we have data, let's convert it + } else { + statusText = response.state; + success = response.data; + error = response.error; + isSuccess = !error; + } + } else { + + // Extract error from statusText and normalize for non-aborts + error = statusText; + if ( status || !statusText ) { + statusText = "error"; + if ( status < 0 ) { + status = 0; + } + } + } + + // Set data for the fake xhr object + jqXHR.status = status; + jqXHR.statusText = ( nativeStatusText || statusText ) + ""; + + // Success/Error + if ( isSuccess ) { + deferred.resolveWith( callbackContext, [ success, statusText, jqXHR ] ); + } else { + deferred.rejectWith( callbackContext, [ jqXHR, statusText, error ] ); + } + + // Status-dependent callbacks + jqXHR.statusCode( statusCode ); + statusCode = undefined; + + if ( fireGlobals ) { + globalEventContext.trigger( isSuccess ? "ajaxSuccess" : "ajaxError", + [ jqXHR, s, isSuccess ? success : error ] ); + } + + // Complete + completeDeferred.fireWith( callbackContext, [ jqXHR, statusText ] ); + + if ( fireGlobals ) { + globalEventContext.trigger( "ajaxComplete", [ jqXHR, s ] ); + + // Handle the global AJAX counter + if ( !( --jQuery.active ) ) { + jQuery.event.trigger( "ajaxStop" ); + } + } + } + + return jqXHR; + }, + + getJSON: function( url, data, callback ) { + return jQuery.get( url, data, callback, "json" ); + }, + + getScript: function( url, callback ) { + return jQuery.get( url, undefined, callback, "script" ); + } +} ); + +jQuery.each( [ "get", "post" ], function( _i, method ) { + jQuery[ method ] = function( url, data, callback, type ) { + + // Shift arguments if data argument was omitted + if ( isFunction( data ) ) { + type = type || callback; + callback = data; + data = undefined; + } + + // The url can be an options object (which then must have .url) + return jQuery.ajax( jQuery.extend( { + url: url, + type: method, + dataType: type, + data: data, + success: callback + }, jQuery.isPlainObject( url ) && url ) ); + }; +} ); + +jQuery.ajaxPrefilter( function( s ) { + var i; + for ( i in s.headers ) { + if ( i.toLowerCase() === "content-type" ) { + s.contentType = s.headers[ i ] || ""; + } + } +} ); + + +jQuery._evalUrl = function( url, options, doc ) { + return jQuery.ajax( { + url: url, + + // Make this explicit, since user can override this through ajaxSetup (#11264) + type: "GET", + dataType: "script", + cache: true, + async: false, + global: false, + + // Only evaluate the response if it is successful (gh-4126) + // dataFilter is not invoked for failure responses, so using it instead + // of the default converter is kludgy but it works. + converters: { + "text script": function() {} + }, + dataFilter: function( response ) { + jQuery.globalEval( response, options, doc ); + } + } ); +}; + + +jQuery.fn.extend( { + wrapAll: function( html ) { + var wrap; + + if ( this[ 0 ] ) { + if ( isFunction( html ) ) { + html = html.call( this[ 0 ] ); + } + + // The elements to wrap the target around + wrap = jQuery( html, this[ 0 ].ownerDocument ).eq( 0 ).clone( true ); + + if ( this[ 0 ].parentNode ) { + wrap.insertBefore( this[ 0 ] ); + } + + wrap.map( function() { + var elem = this; + + while ( elem.firstElementChild ) { + elem = elem.firstElementChild; + } + + return elem; + } ).append( this ); + } + + return this; + }, + + wrapInner: function( html ) { + if ( isFunction( html ) ) { + return this.each( function( i ) { + jQuery( this ).wrapInner( html.call( this, i ) ); + } ); + } + + return this.each( function() { + var self = jQuery( this ), + contents = self.contents(); + + if ( contents.length ) { + contents.wrapAll( html ); + + } else { + self.append( html ); + } + } ); + }, + + wrap: function( html ) { + var htmlIsFunction = isFunction( html ); + + return this.each( function( i ) { + jQuery( this ).wrapAll( htmlIsFunction ? html.call( this, i ) : html ); + } ); + }, + + unwrap: function( selector ) { + this.parent( selector ).not( "body" ).each( function() { + jQuery( this ).replaceWith( this.childNodes ); + } ); + return this; + } +} ); + + +jQuery.expr.pseudos.hidden = function( elem ) { + return !jQuery.expr.pseudos.visible( elem ); +}; +jQuery.expr.pseudos.visible = function( elem ) { + return !!( elem.offsetWidth || elem.offsetHeight || elem.getClientRects().length ); +}; + + + + +jQuery.ajaxSettings.xhr = function() { + try { + return new window.XMLHttpRequest(); + } catch ( e ) {} +}; + +var xhrSuccessStatus = { + + // File protocol always yields status code 0, assume 200 + 0: 200, + + // Support: IE <=9 only + // #1450: sometimes IE returns 1223 when it should be 204 + 1223: 204 + }, + xhrSupported = jQuery.ajaxSettings.xhr(); + +support.cors = !!xhrSupported && ( "withCredentials" in xhrSupported ); +support.ajax = xhrSupported = !!xhrSupported; + +jQuery.ajaxTransport( function( options ) { + var callback, errorCallback; + + // Cross domain only allowed if supported through XMLHttpRequest + if ( support.cors || xhrSupported && !options.crossDomain ) { + return { + send: function( headers, complete ) { + var i, + xhr = options.xhr(); + + xhr.open( + options.type, + options.url, + options.async, + options.username, + options.password + ); + + // Apply custom fields if provided + if ( options.xhrFields ) { + for ( i in options.xhrFields ) { + xhr[ i ] = options.xhrFields[ i ]; + } + } + + // Override mime type if needed + if ( options.mimeType && xhr.overrideMimeType ) { + xhr.overrideMimeType( options.mimeType ); + } + + // X-Requested-With header + // For cross-domain requests, seeing as conditions for a preflight are + // akin to a jigsaw puzzle, we simply never set it to be sure. + // (it can always be set on a per-request basis or even using ajaxSetup) + // For same-domain requests, won't change header if already provided. + if ( !options.crossDomain && !headers[ "X-Requested-With" ] ) { + headers[ "X-Requested-With" ] = "XMLHttpRequest"; + } + + // Set headers + for ( i in headers ) { + xhr.setRequestHeader( i, headers[ i ] ); + } + + // Callback + callback = function( type ) { + return function() { + if ( callback ) { + callback = errorCallback = xhr.onload = + xhr.onerror = xhr.onabort = xhr.ontimeout = + xhr.onreadystatechange = null; + + if ( type === "abort" ) { + xhr.abort(); + } else if ( type === "error" ) { + + // Support: IE <=9 only + // On a manual native abort, IE9 throws + // errors on any property access that is not readyState + if ( typeof xhr.status !== "number" ) { + complete( 0, "error" ); + } else { + complete( + + // File: protocol always yields status 0; see #8605, #14207 + xhr.status, + xhr.statusText + ); + } + } else { + complete( + xhrSuccessStatus[ xhr.status ] || xhr.status, + xhr.statusText, + + // Support: IE <=9 only + // IE9 has no XHR2 but throws on binary (trac-11426) + // For XHR2 non-text, let the caller handle it (gh-2498) + ( xhr.responseType || "text" ) !== "text" || + typeof xhr.responseText !== "string" ? + { binary: xhr.response } : + { text: xhr.responseText }, + xhr.getAllResponseHeaders() + ); + } + } + }; + }; + + // Listen to events + xhr.onload = callback(); + errorCallback = xhr.onerror = xhr.ontimeout = callback( "error" ); + + // Support: IE 9 only + // Use onreadystatechange to replace onabort + // to handle uncaught aborts + if ( xhr.onabort !== undefined ) { + xhr.onabort = errorCallback; + } else { + xhr.onreadystatechange = function() { + + // Check readyState before timeout as it changes + if ( xhr.readyState === 4 ) { + + // Allow onerror to be called first, + // but that will not handle a native abort + // Also, save errorCallback to a variable + // as xhr.onerror cannot be accessed + window.setTimeout( function() { + if ( callback ) { + errorCallback(); + } + } ); + } + }; + } + + // Create the abort callback + callback = callback( "abort" ); + + try { + + // Do send the request (this may raise an exception) + xhr.send( options.hasContent && options.data || null ); + } catch ( e ) { + + // #14683: Only rethrow if this hasn't been notified as an error yet + if ( callback ) { + throw e; + } + } + }, + + abort: function() { + if ( callback ) { + callback(); + } + } + }; + } +} ); + + + + +// Prevent auto-execution of scripts when no explicit dataType was provided (See gh-2432) +jQuery.ajaxPrefilter( function( s ) { + if ( s.crossDomain ) { + s.contents.script = false; + } +} ); + +// Install script dataType +jQuery.ajaxSetup( { + accepts: { + script: "text/javascript, application/javascript, " + + "application/ecmascript, application/x-ecmascript" + }, + contents: { + script: /\b(?:java|ecma)script\b/ + }, + converters: { + "text script": function( text ) { + jQuery.globalEval( text ); + return text; + } + } +} ); + +// Handle cache's special case and crossDomain +jQuery.ajaxPrefilter( "script", function( s ) { + if ( s.cache === undefined ) { + s.cache = false; + } + if ( s.crossDomain ) { + s.type = "GET"; + } +} ); + +// Bind script tag hack transport +jQuery.ajaxTransport( "script", function( s ) { + + // This transport only deals with cross domain or forced-by-attrs requests + if ( s.crossDomain || s.scriptAttrs ) { + var script, callback; + return { + send: function( _, complete ) { + script = jQuery( "\r\n"; + +// inject VBScript +document.write(IEBinaryToArray_ByteStr_Script); + +global.JSZipUtils._getBinaryFromXHR = function (xhr) { + var binary = xhr.responseBody; + var byteMapping = {}; + for ( var i = 0; i < 256; i++ ) { + for ( var j = 0; j < 256; j++ ) { + byteMapping[ String.fromCharCode( i + (j << 8) ) ] = + String.fromCharCode(i) + String.fromCharCode(j); + } + } + var rawBytes = IEBinaryToArray_ByteStr(binary); + var lastChr = IEBinaryToArray_ByteStr_Last(binary); + return rawBytes.replace(/[\s\S]/g, function( match ) { + return byteMapping[match]; + }) + lastChr; +}; + +// enforcing Stuk's coding style +// vim: set shiftwidth=4 softtabstop=4: + +},{}]},{},[1]) +; diff --git a/centos/javadoc/jquery/jszip-utils/dist/jszip-utils-ie.min.js b/centos/javadoc/jquery/jszip-utils/dist/jszip-utils-ie.min.js new file mode 100644 index 0000000..93d8bc8 --- /dev/null +++ b/centos/javadoc/jquery/jszip-utils/dist/jszip-utils-ie.min.js @@ -0,0 +1,10 @@ +/*! + +JSZipUtils - A collection of cross-browser utilities to go along with JSZip. + + +(c) 2014 Stuart Knightley, David Duponchel +Dual licenced under the MIT license or GPLv3. See https://raw.github.com/Stuk/jszip-utils/master/LICENSE.markdown. + +*/ +!function a(b,c,d){function e(g,h){if(!c[g]){if(!b[g]){var i="function"==typeof require&&require;if(!h&&i)return i(g,!0);if(f)return f(g,!0);throw new Error("Cannot find module '"+g+"'")}var j=c[g]={exports:{}};b[g][0].call(j.exports,function(a){var c=b[g][1][a];return e(c?c:a)},j,j.exports,a,b,c,d)}return c[g].exports}for(var f="function"==typeof require&&require,g=0;g\r\n";document.write(b),a.JSZipUtils._getBinaryFromXHR=function(a){for(var b=a.responseBody,c={},d=0;256>d;d++)for(var e=0;256>e;e++)c[String.fromCharCode(d+(e<<8))]=String.fromCharCode(d)+String.fromCharCode(e);var f=IEBinaryToArray_ByteStr(b),g=IEBinaryToArray_ByteStr_Last(b);return f.replace(/[\s\S]/g,function(a){return c[a]})+g}},{}]},{},[1]); diff --git a/centos/javadoc/jquery/jszip-utils/dist/jszip-utils.js b/centos/javadoc/jquery/jszip-utils/dist/jszip-utils.js new file mode 100644 index 0000000..775895e --- /dev/null +++ b/centos/javadoc/jquery/jszip-utils/dist/jszip-utils.js @@ -0,0 +1,118 @@ +/*! + +JSZipUtils - A collection of cross-browser utilities to go along with JSZip. + + +(c) 2014 Stuart Knightley, David Duponchel +Dual licenced under the MIT license or GPLv3. See https://raw.github.com/Stuk/jszip-utils/master/LICENSE.markdown. + +*/ +!function(e){"object"==typeof exports?module.exports=e():"function"==typeof define&&define.amd?define(e):"undefined"!=typeof window?window.JSZipUtils=e():"undefined"!=typeof global?global.JSZipUtils=e():"undefined"!=typeof self&&(self.JSZipUtils=e())}(function(){var define,module,exports;return (function e(t,n,r){function s(o,u){if(!n[o]){if(!t[o]){var a=typeof require=="function"&&require;if(!u&&a)return a(o,!0);if(i)return i(o,!0);throw new Error("Cannot find module '"+o+"'")}var f=n[o]={exports:{}};t[o][0].call(f.exports,function(e){var n=t[o][1][e];return s(n?n:e)},f,f.exports,e,t,n,r)}return n[o].exports}var i=typeof require=="function"&&require;for(var o=0;o + +(c) 2014 Stuart Knightley, David Duponchel +Dual licenced under the MIT license or GPLv3. See https://raw.github.com/Stuk/jszip-utils/master/LICENSE.markdown. + +*/ +!function(a){"object"==typeof exports?module.exports=a():"function"==typeof define&&define.amd?define(a):"undefined"!=typeof window?window.JSZipUtils=a():"undefined"!=typeof global?global.JSZipUtils=a():"undefined"!=typeof self&&(self.JSZipUtils=a())}(function(){return function a(b,c,d){function e(g,h){if(!c[g]){if(!b[g]){var i="function"==typeof require&&require;if(!h&&i)return i(g,!0);if(f)return f(g,!0);throw new Error("Cannot find module '"+g+"'")}var j=c[g]={exports:{}};b[g][0].call(j.exports,function(a){var c=b[g][1][a];return e(c?c:a)},j,j.exports,a,b,c,d)}return c[g].exports}for(var f="function"==typeof require&&require,g=0;g + +(c) 2009-2016 Stuart Knightley +Dual licenced under the MIT license or GPLv3. See https://raw.github.com/Stuk/jszip/master/LICENSE.markdown. + +JSZip uses the library pako released under the MIT license : +https://github.com/nodeca/pako/blob/master/LICENSE +*/ + +(function(f){if(typeof exports==="object"&&typeof module!=="undefined"){module.exports=f()}else if(typeof define==="function"&&define.amd){define([],f)}else{var g;if(typeof window!=="undefined"){g=window}else if(typeof global!=="undefined"){g=global}else if(typeof self!=="undefined"){g=self}else{g=this}g.JSZip = f()}})(function(){var define,module,exports;return (function e(t,n,r){function s(o,u){if(!n[o]){if(!t[o]){var a=typeof require=="function"&&require;if(!u&&a)return a(o,!0);if(i)return i(o,!0);var f=new Error("Cannot find module '"+o+"'");throw f.code="MODULE_NOT_FOUND",f}var l=n[o]={exports:{}};t[o][0].call(l.exports,function(e){var n=t[o][1][e];return s(n?n:e)},l,l.exports,e,t,n,r)}return n[o].exports}var i=typeof require=="function"&&require;for(var o=0;o> 2; + enc2 = ((chr1 & 3) << 4) | (chr2 >> 4); + enc3 = remainingBytes > 1 ? (((chr2 & 15) << 2) | (chr3 >> 6)) : 64; + enc4 = remainingBytes > 2 ? (chr3 & 63) : 64; + + output.push(_keyStr.charAt(enc1) + _keyStr.charAt(enc2) + _keyStr.charAt(enc3) + _keyStr.charAt(enc4)); + + } + + return output.join(""); +}; + +// public method for decoding +exports.decode = function(input) { + var chr1, chr2, chr3; + var enc1, enc2, enc3, enc4; + var i = 0, resultIndex = 0; + + var dataUrlPrefix = "data:"; + + if (input.substr(0, dataUrlPrefix.length) === dataUrlPrefix) { + // This is a common error: people give a data url + // (data:image/png;base64,iVBOR...) with a {base64: true} and + // wonders why things don't work. + // We can detect that the string input looks like a data url but we + // *can't* be sure it is one: removing everything up to the comma would + // be too dangerous. + throw new Error("Invalid base64 input, it looks like a data url."); + } + + input = input.replace(/[^A-Za-z0-9\+\/\=]/g, ""); + + var totalLength = input.length * 3 / 4; + if(input.charAt(input.length - 1) === _keyStr.charAt(64)) { + totalLength--; + } + if(input.charAt(input.length - 2) === _keyStr.charAt(64)) { + totalLength--; + } + if (totalLength % 1 !== 0) { + // totalLength is not an integer, the length does not match a valid + // base64 content. That can happen if: + // - the input is not a base64 content + // - the input is *almost* a base64 content, with a extra chars at the + // beginning or at the end + // - the input uses a base64 variant (base64url for example) + throw new Error("Invalid base64 input, bad content length."); + } + var output; + if (support.uint8array) { + output = new Uint8Array(totalLength|0); + } else { + output = new Array(totalLength|0); + } + + while (i < input.length) { + + enc1 = _keyStr.indexOf(input.charAt(i++)); + enc2 = _keyStr.indexOf(input.charAt(i++)); + enc3 = _keyStr.indexOf(input.charAt(i++)); + enc4 = _keyStr.indexOf(input.charAt(i++)); + + chr1 = (enc1 << 2) | (enc2 >> 4); + chr2 = ((enc2 & 15) << 4) | (enc3 >> 2); + chr3 = ((enc3 & 3) << 6) | enc4; + + output[resultIndex++] = chr1; + + if (enc3 !== 64) { + output[resultIndex++] = chr2; + } + if (enc4 !== 64) { + output[resultIndex++] = chr3; + } + + } + + return output; +}; + +},{"./support":30,"./utils":32}],2:[function(require,module,exports){ +'use strict'; + +var external = require("./external"); +var DataWorker = require('./stream/DataWorker'); +var Crc32Probe = require('./stream/Crc32Probe'); +var DataLengthProbe = require('./stream/DataLengthProbe'); + +/** + * Represent a compressed object, with everything needed to decompress it. + * @constructor + * @param {number} compressedSize the size of the data compressed. + * @param {number} uncompressedSize the size of the data after decompression. + * @param {number} crc32 the crc32 of the decompressed file. + * @param {object} compression the type of compression, see lib/compressions.js. + * @param {String|ArrayBuffer|Uint8Array|Buffer} data the compressed data. + */ +function CompressedObject(compressedSize, uncompressedSize, crc32, compression, data) { + this.compressedSize = compressedSize; + this.uncompressedSize = uncompressedSize; + this.crc32 = crc32; + this.compression = compression; + this.compressedContent = data; +} + +CompressedObject.prototype = { + /** + * Create a worker to get the uncompressed content. + * @return {GenericWorker} the worker. + */ + getContentWorker: function () { + var worker = new DataWorker(external.Promise.resolve(this.compressedContent)) + .pipe(this.compression.uncompressWorker()) + .pipe(new DataLengthProbe("data_length")); + + var that = this; + worker.on("end", function () { + if (this.streamInfo['data_length'] !== that.uncompressedSize) { + throw new Error("Bug : uncompressed data size mismatch"); + } + }); + return worker; + }, + /** + * Create a worker to get the compressed content. + * @return {GenericWorker} the worker. + */ + getCompressedWorker: function () { + return new DataWorker(external.Promise.resolve(this.compressedContent)) + .withStreamInfo("compressedSize", this.compressedSize) + .withStreamInfo("uncompressedSize", this.uncompressedSize) + .withStreamInfo("crc32", this.crc32) + .withStreamInfo("compression", this.compression) + ; + } +}; + +/** + * Chain the given worker with other workers to compress the content with the + * given compression. + * @param {GenericWorker} uncompressedWorker the worker to pipe. + * @param {Object} compression the compression object. + * @param {Object} compressionOptions the options to use when compressing. + * @return {GenericWorker} the new worker compressing the content. + */ +CompressedObject.createWorkerFrom = function (uncompressedWorker, compression, compressionOptions) { + return uncompressedWorker + .pipe(new Crc32Probe()) + .pipe(new DataLengthProbe("uncompressedSize")) + .pipe(compression.compressWorker(compressionOptions)) + .pipe(new DataLengthProbe("compressedSize")) + .withStreamInfo("compression", compression); +}; + +module.exports = CompressedObject; + +},{"./external":6,"./stream/Crc32Probe":25,"./stream/DataLengthProbe":26,"./stream/DataWorker":27}],3:[function(require,module,exports){ +'use strict'; + +var GenericWorker = require("./stream/GenericWorker"); + +exports.STORE = { + magic: "\x00\x00", + compressWorker : function (compressionOptions) { + return new GenericWorker("STORE compression"); + }, + uncompressWorker : function () { + return new GenericWorker("STORE decompression"); + } +}; +exports.DEFLATE = require('./flate'); + +},{"./flate":7,"./stream/GenericWorker":28}],4:[function(require,module,exports){ +'use strict'; + +var utils = require('./utils'); + +/** + * The following functions come from pako, from pako/lib/zlib/crc32.js + * released under the MIT license, see pako https://github.com/nodeca/pako/ + */ + +// Use ordinary array, since untyped makes no boost here +function makeTable() { + var c, table = []; + + for(var n =0; n < 256; n++){ + c = n; + for(var k =0; k < 8; k++){ + c = ((c&1) ? (0xEDB88320 ^ (c >>> 1)) : (c >>> 1)); + } + table[n] = c; + } + + return table; +} + +// Create table on load. Just 255 signed longs. Not a problem. +var crcTable = makeTable(); + + +function crc32(crc, buf, len, pos) { + var t = crcTable, end = pos + len; + + crc = crc ^ (-1); + + for (var i = pos; i < end; i++ ) { + crc = (crc >>> 8) ^ t[(crc ^ buf[i]) & 0xFF]; + } + + return (crc ^ (-1)); // >>> 0; +} + +// That's all for the pako functions. + +/** + * Compute the crc32 of a string. + * This is almost the same as the function crc32, but for strings. Using the + * same function for the two use cases leads to horrible performances. + * @param {Number} crc the starting value of the crc. + * @param {String} str the string to use. + * @param {Number} len the length of the string. + * @param {Number} pos the starting position for the crc32 computation. + * @return {Number} the computed crc32. + */ +function crc32str(crc, str, len, pos) { + var t = crcTable, end = pos + len; + + crc = crc ^ (-1); + + for (var i = pos; i < end; i++ ) { + crc = (crc >>> 8) ^ t[(crc ^ str.charCodeAt(i)) & 0xFF]; + } + + return (crc ^ (-1)); // >>> 0; +} + +module.exports = function crc32wrapper(input, crc) { + if (typeof input === "undefined" || !input.length) { + return 0; + } + + var isArray = utils.getTypeOf(input) !== "string"; + + if(isArray) { + return crc32(crc|0, input, input.length, 0); + } else { + return crc32str(crc|0, input, input.length, 0); + } +}; + +},{"./utils":32}],5:[function(require,module,exports){ +'use strict'; +exports.base64 = false; +exports.binary = false; +exports.dir = false; +exports.createFolders = true; +exports.date = null; +exports.compression = null; +exports.compressionOptions = null; +exports.comment = null; +exports.unixPermissions = null; +exports.dosPermissions = null; + +},{}],6:[function(require,module,exports){ +/* global Promise */ +'use strict'; + +// load the global object first: +// - it should be better integrated in the system (unhandledRejection in node) +// - the environment may have a custom Promise implementation (see zone.js) +var ES6Promise = null; +if (typeof Promise !== "undefined") { + ES6Promise = Promise; +} else { + ES6Promise = require("lie"); +} + +/** + * Let the user use/change some implementations. + */ +module.exports = { + Promise: ES6Promise +}; + +},{"lie":37}],7:[function(require,module,exports){ +'use strict'; +var USE_TYPEDARRAY = (typeof Uint8Array !== 'undefined') && (typeof Uint16Array !== 'undefined') && (typeof Uint32Array !== 'undefined'); + +var pako = require("pako"); +var utils = require("./utils"); +var GenericWorker = require("./stream/GenericWorker"); + +var ARRAY_TYPE = USE_TYPEDARRAY ? "uint8array" : "array"; + +exports.magic = "\x08\x00"; + +/** + * Create a worker that uses pako to inflate/deflate. + * @constructor + * @param {String} action the name of the pako function to call : either "Deflate" or "Inflate". + * @param {Object} options the options to use when (de)compressing. + */ +function FlateWorker(action, options) { + GenericWorker.call(this, "FlateWorker/" + action); + + this._pako = null; + this._pakoAction = action; + this._pakoOptions = options; + // the `meta` object from the last chunk received + // this allow this worker to pass around metadata + this.meta = {}; +} + +utils.inherits(FlateWorker, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +FlateWorker.prototype.processChunk = function (chunk) { + this.meta = chunk.meta; + if (this._pako === null) { + this._createPako(); + } + this._pako.push(utils.transformTo(ARRAY_TYPE, chunk.data), false); +}; + +/** + * @see GenericWorker.flush + */ +FlateWorker.prototype.flush = function () { + GenericWorker.prototype.flush.call(this); + if (this._pako === null) { + this._createPako(); + } + this._pako.push([], true); +}; +/** + * @see GenericWorker.cleanUp + */ +FlateWorker.prototype.cleanUp = function () { + GenericWorker.prototype.cleanUp.call(this); + this._pako = null; +}; + +/** + * Create the _pako object. + * TODO: lazy-loading this object isn't the best solution but it's the + * quickest. The best solution is to lazy-load the worker list. See also the + * issue #446. + */ +FlateWorker.prototype._createPako = function () { + this._pako = new pako[this._pakoAction]({ + raw: true, + level: this._pakoOptions.level || -1 // default compression + }); + var self = this; + this._pako.onData = function(data) { + self.push({ + data : data, + meta : self.meta + }); + }; +}; + +exports.compressWorker = function (compressionOptions) { + return new FlateWorker("Deflate", compressionOptions); +}; +exports.uncompressWorker = function () { + return new FlateWorker("Inflate", {}); +}; + +},{"./stream/GenericWorker":28,"./utils":32,"pako":38}],8:[function(require,module,exports){ +'use strict'; + +var utils = require('../utils'); +var GenericWorker = require('../stream/GenericWorker'); +var utf8 = require('../utf8'); +var crc32 = require('../crc32'); +var signature = require('../signature'); + +/** + * Transform an integer into a string in hexadecimal. + * @private + * @param {number} dec the number to convert. + * @param {number} bytes the number of bytes to generate. + * @returns {string} the result. + */ +var decToHex = function(dec, bytes) { + var hex = "", i; + for (i = 0; i < bytes; i++) { + hex += String.fromCharCode(dec & 0xff); + dec = dec >>> 8; + } + return hex; +}; + +/** + * Generate the UNIX part of the external file attributes. + * @param {Object} unixPermissions the unix permissions or null. + * @param {Boolean} isDir true if the entry is a directory, false otherwise. + * @return {Number} a 32 bit integer. + * + * adapted from http://unix.stackexchange.com/questions/14705/the-zip-formats-external-file-attribute : + * + * TTTTsstrwxrwxrwx0000000000ADVSHR + * ^^^^____________________________ file type, see zipinfo.c (UNX_*) + * ^^^_________________________ setuid, setgid, sticky + * ^^^^^^^^^________________ permissions + * ^^^^^^^^^^______ not used ? + * ^^^^^^ DOS attribute bits : Archive, Directory, Volume label, System file, Hidden, Read only + */ +var generateUnixExternalFileAttr = function (unixPermissions, isDir) { + + var result = unixPermissions; + if (!unixPermissions) { + // I can't use octal values in strict mode, hence the hexa. + // 040775 => 0x41fd + // 0100664 => 0x81b4 + result = isDir ? 0x41fd : 0x81b4; + } + return (result & 0xFFFF) << 16; +}; + +/** + * Generate the DOS part of the external file attributes. + * @param {Object} dosPermissions the dos permissions or null. + * @param {Boolean} isDir true if the entry is a directory, false otherwise. + * @return {Number} a 32 bit integer. + * + * Bit 0 Read-Only + * Bit 1 Hidden + * Bit 2 System + * Bit 3 Volume Label + * Bit 4 Directory + * Bit 5 Archive + */ +var generateDosExternalFileAttr = function (dosPermissions, isDir) { + + // the dir flag is already set for compatibility + return (dosPermissions || 0) & 0x3F; +}; + +/** + * Generate the various parts used in the construction of the final zip file. + * @param {Object} streamInfo the hash with information about the compressed file. + * @param {Boolean} streamedContent is the content streamed ? + * @param {Boolean} streamingEnded is the stream finished ? + * @param {number} offset the current offset from the start of the zip file. + * @param {String} platform let's pretend we are this platform (change platform dependents fields) + * @param {Function} encodeFileName the function to encode the file name / comment. + * @return {Object} the zip parts. + */ +var generateZipParts = function(streamInfo, streamedContent, streamingEnded, offset, platform, encodeFileName) { + var file = streamInfo['file'], + compression = streamInfo['compression'], + useCustomEncoding = encodeFileName !== utf8.utf8encode, + encodedFileName = utils.transformTo("string", encodeFileName(file.name)), + utfEncodedFileName = utils.transformTo("string", utf8.utf8encode(file.name)), + comment = file.comment, + encodedComment = utils.transformTo("string", encodeFileName(comment)), + utfEncodedComment = utils.transformTo("string", utf8.utf8encode(comment)), + useUTF8ForFileName = utfEncodedFileName.length !== file.name.length, + useUTF8ForComment = utfEncodedComment.length !== comment.length, + dosTime, + dosDate, + extraFields = "", + unicodePathExtraField = "", + unicodeCommentExtraField = "", + dir = file.dir, + date = file.date; + + + var dataInfo = { + crc32 : 0, + compressedSize : 0, + uncompressedSize : 0 + }; + + // if the content is streamed, the sizes/crc32 are only available AFTER + // the end of the stream. + if (!streamedContent || streamingEnded) { + dataInfo.crc32 = streamInfo['crc32']; + dataInfo.compressedSize = streamInfo['compressedSize']; + dataInfo.uncompressedSize = streamInfo['uncompressedSize']; + } + + var bitflag = 0; + if (streamedContent) { + // Bit 3: the sizes/crc32 are set to zero in the local header. + // The correct values are put in the data descriptor immediately + // following the compressed data. + bitflag |= 0x0008; + } + if (!useCustomEncoding && (useUTF8ForFileName || useUTF8ForComment)) { + // Bit 11: Language encoding flag (EFS). + bitflag |= 0x0800; + } + + + var extFileAttr = 0; + var versionMadeBy = 0; + if (dir) { + // dos or unix, we set the dos dir flag + extFileAttr |= 0x00010; + } + if(platform === "UNIX") { + versionMadeBy = 0x031E; // UNIX, version 3.0 + extFileAttr |= generateUnixExternalFileAttr(file.unixPermissions, dir); + } else { // DOS or other, fallback to DOS + versionMadeBy = 0x0014; // DOS, version 2.0 + extFileAttr |= generateDosExternalFileAttr(file.dosPermissions, dir); + } + + // date + // @see http://www.delorie.com/djgpp/doc/rbinter/it/52/13.html + // @see http://www.delorie.com/djgpp/doc/rbinter/it/65/16.html + // @see http://www.delorie.com/djgpp/doc/rbinter/it/66/16.html + + dosTime = date.getUTCHours(); + dosTime = dosTime << 6; + dosTime = dosTime | date.getUTCMinutes(); + dosTime = dosTime << 5; + dosTime = dosTime | date.getUTCSeconds() / 2; + + dosDate = date.getUTCFullYear() - 1980; + dosDate = dosDate << 4; + dosDate = dosDate | (date.getUTCMonth() + 1); + dosDate = dosDate << 5; + dosDate = dosDate | date.getUTCDate(); + + if (useUTF8ForFileName) { + // set the unicode path extra field. unzip needs at least one extra + // field to correctly handle unicode path, so using the path is as good + // as any other information. This could improve the situation with + // other archive managers too. + // This field is usually used without the utf8 flag, with a non + // unicode path in the header (winrar, winzip). This helps (a bit) + // with the messy Windows' default compressed folders feature but + // breaks on p7zip which doesn't seek the unicode path extra field. + // So for now, UTF-8 everywhere ! + unicodePathExtraField = + // Version + decToHex(1, 1) + + // NameCRC32 + decToHex(crc32(encodedFileName), 4) + + // UnicodeName + utfEncodedFileName; + + extraFields += + // Info-ZIP Unicode Path Extra Field + "\x75\x70" + + // size + decToHex(unicodePathExtraField.length, 2) + + // content + unicodePathExtraField; + } + + if(useUTF8ForComment) { + + unicodeCommentExtraField = + // Version + decToHex(1, 1) + + // CommentCRC32 + decToHex(crc32(encodedComment), 4) + + // UnicodeName + utfEncodedComment; + + extraFields += + // Info-ZIP Unicode Path Extra Field + "\x75\x63" + + // size + decToHex(unicodeCommentExtraField.length, 2) + + // content + unicodeCommentExtraField; + } + + var header = ""; + + // version needed to extract + header += "\x0A\x00"; + // general purpose bit flag + header += decToHex(bitflag, 2); + // compression method + header += compression.magic; + // last mod file time + header += decToHex(dosTime, 2); + // last mod file date + header += decToHex(dosDate, 2); + // crc-32 + header += decToHex(dataInfo.crc32, 4); + // compressed size + header += decToHex(dataInfo.compressedSize, 4); + // uncompressed size + header += decToHex(dataInfo.uncompressedSize, 4); + // file name length + header += decToHex(encodedFileName.length, 2); + // extra field length + header += decToHex(extraFields.length, 2); + + + var fileRecord = signature.LOCAL_FILE_HEADER + header + encodedFileName + extraFields; + + var dirRecord = signature.CENTRAL_FILE_HEADER + + // version made by (00: DOS) + decToHex(versionMadeBy, 2) + + // file header (common to file and central directory) + header + + // file comment length + decToHex(encodedComment.length, 2) + + // disk number start + "\x00\x00" + + // internal file attributes TODO + "\x00\x00" + + // external file attributes + decToHex(extFileAttr, 4) + + // relative offset of local header + decToHex(offset, 4) + + // file name + encodedFileName + + // extra field + extraFields + + // file comment + encodedComment; + + return { + fileRecord: fileRecord, + dirRecord: dirRecord + }; +}; + +/** + * Generate the EOCD record. + * @param {Number} entriesCount the number of entries in the zip file. + * @param {Number} centralDirLength the length (in bytes) of the central dir. + * @param {Number} localDirLength the length (in bytes) of the local dir. + * @param {String} comment the zip file comment as a binary string. + * @param {Function} encodeFileName the function to encode the comment. + * @return {String} the EOCD record. + */ +var generateCentralDirectoryEnd = function (entriesCount, centralDirLength, localDirLength, comment, encodeFileName) { + var dirEnd = ""; + var encodedComment = utils.transformTo("string", encodeFileName(comment)); + + // end of central dir signature + dirEnd = signature.CENTRAL_DIRECTORY_END + + // number of this disk + "\x00\x00" + + // number of the disk with the start of the central directory + "\x00\x00" + + // total number of entries in the central directory on this disk + decToHex(entriesCount, 2) + + // total number of entries in the central directory + decToHex(entriesCount, 2) + + // size of the central directory 4 bytes + decToHex(centralDirLength, 4) + + // offset of start of central directory with respect to the starting disk number + decToHex(localDirLength, 4) + + // .ZIP file comment length + decToHex(encodedComment.length, 2) + + // .ZIP file comment + encodedComment; + + return dirEnd; +}; + +/** + * Generate data descriptors for a file entry. + * @param {Object} streamInfo the hash generated by a worker, containing information + * on the file entry. + * @return {String} the data descriptors. + */ +var generateDataDescriptors = function (streamInfo) { + var descriptor = ""; + descriptor = signature.DATA_DESCRIPTOR + + // crc-32 4 bytes + decToHex(streamInfo['crc32'], 4) + + // compressed size 4 bytes + decToHex(streamInfo['compressedSize'], 4) + + // uncompressed size 4 bytes + decToHex(streamInfo['uncompressedSize'], 4); + + return descriptor; +}; + + +/** + * A worker to concatenate other workers to create a zip file. + * @param {Boolean} streamFiles `true` to stream the content of the files, + * `false` to accumulate it. + * @param {String} comment the comment to use. + * @param {String} platform the platform to use, "UNIX" or "DOS". + * @param {Function} encodeFileName the function to encode file names and comments. + */ +function ZipFileWorker(streamFiles, comment, platform, encodeFileName) { + GenericWorker.call(this, "ZipFileWorker"); + // The number of bytes written so far. This doesn't count accumulated chunks. + this.bytesWritten = 0; + // The comment of the zip file + this.zipComment = comment; + // The platform "generating" the zip file. + this.zipPlatform = platform; + // the function to encode file names and comments. + this.encodeFileName = encodeFileName; + // Should we stream the content of the files ? + this.streamFiles = streamFiles; + // If `streamFiles` is false, we will need to accumulate the content of the + // files to calculate sizes / crc32 (and write them *before* the content). + // This boolean indicates if we are accumulating chunks (it will change a lot + // during the lifetime of this worker). + this.accumulate = false; + // The buffer receiving chunks when accumulating content. + this.contentBuffer = []; + // The list of generated directory records. + this.dirRecords = []; + // The offset (in bytes) from the beginning of the zip file for the current source. + this.currentSourceOffset = 0; + // The total number of entries in this zip file. + this.entriesCount = 0; + // the name of the file currently being added, null when handling the end of the zip file. + // Used for the emitted metadata. + this.currentFile = null; + + + + this._sources = []; +} +utils.inherits(ZipFileWorker, GenericWorker); + +/** + * @see GenericWorker.push + */ +ZipFileWorker.prototype.push = function (chunk) { + + var currentFilePercent = chunk.meta.percent || 0; + var entriesCount = this.entriesCount; + var remainingFiles = this._sources.length; + + if(this.accumulate) { + this.contentBuffer.push(chunk); + } else { + this.bytesWritten += chunk.data.length; + + GenericWorker.prototype.push.call(this, { + data : chunk.data, + meta : { + currentFile : this.currentFile, + percent : entriesCount ? (currentFilePercent + 100 * (entriesCount - remainingFiles - 1)) / entriesCount : 100 + } + }); + } +}; + +/** + * The worker started a new source (an other worker). + * @param {Object} streamInfo the streamInfo object from the new source. + */ +ZipFileWorker.prototype.openedSource = function (streamInfo) { + this.currentSourceOffset = this.bytesWritten; + this.currentFile = streamInfo['file'].name; + + var streamedContent = this.streamFiles && !streamInfo['file'].dir; + + // don't stream folders (because they don't have any content) + if(streamedContent) { + var record = generateZipParts(streamInfo, streamedContent, false, this.currentSourceOffset, this.zipPlatform, this.encodeFileName); + this.push({ + data : record.fileRecord, + meta : {percent:0} + }); + } else { + // we need to wait for the whole file before pushing anything + this.accumulate = true; + } +}; + +/** + * The worker finished a source (an other worker). + * @param {Object} streamInfo the streamInfo object from the finished source. + */ +ZipFileWorker.prototype.closedSource = function (streamInfo) { + this.accumulate = false; + var streamedContent = this.streamFiles && !streamInfo['file'].dir; + var record = generateZipParts(streamInfo, streamedContent, true, this.currentSourceOffset, this.zipPlatform, this.encodeFileName); + + this.dirRecords.push(record.dirRecord); + if(streamedContent) { + // after the streamed file, we put data descriptors + this.push({ + data : generateDataDescriptors(streamInfo), + meta : {percent:100} + }); + } else { + // the content wasn't streamed, we need to push everything now + // first the file record, then the content + this.push({ + data : record.fileRecord, + meta : {percent:0} + }); + while(this.contentBuffer.length) { + this.push(this.contentBuffer.shift()); + } + } + this.currentFile = null; +}; + +/** + * @see GenericWorker.flush + */ +ZipFileWorker.prototype.flush = function () { + + var localDirLength = this.bytesWritten; + for(var i = 0; i < this.dirRecords.length; i++) { + this.push({ + data : this.dirRecords[i], + meta : {percent:100} + }); + } + var centralDirLength = this.bytesWritten - localDirLength; + + var dirEnd = generateCentralDirectoryEnd(this.dirRecords.length, centralDirLength, localDirLength, this.zipComment, this.encodeFileName); + + this.push({ + data : dirEnd, + meta : {percent:100} + }); +}; + +/** + * Prepare the next source to be read. + */ +ZipFileWorker.prototype.prepareNextSource = function () { + this.previous = this._sources.shift(); + this.openedSource(this.previous.streamInfo); + if (this.isPaused) { + this.previous.pause(); + } else { + this.previous.resume(); + } +}; + +/** + * @see GenericWorker.registerPrevious + */ +ZipFileWorker.prototype.registerPrevious = function (previous) { + this._sources.push(previous); + var self = this; + + previous.on('data', function (chunk) { + self.processChunk(chunk); + }); + previous.on('end', function () { + self.closedSource(self.previous.streamInfo); + if(self._sources.length) { + self.prepareNextSource(); + } else { + self.end(); + } + }); + previous.on('error', function (e) { + self.error(e); + }); + return this; +}; + +/** + * @see GenericWorker.resume + */ +ZipFileWorker.prototype.resume = function () { + if(!GenericWorker.prototype.resume.call(this)) { + return false; + } + + if (!this.previous && this._sources.length) { + this.prepareNextSource(); + return true; + } + if (!this.previous && !this._sources.length && !this.generatedError) { + this.end(); + return true; + } +}; + +/** + * @see GenericWorker.error + */ +ZipFileWorker.prototype.error = function (e) { + var sources = this._sources; + if(!GenericWorker.prototype.error.call(this, e)) { + return false; + } + for(var i = 0; i < sources.length; i++) { + try { + sources[i].error(e); + } catch(e) { + // the `error` exploded, nothing to do + } + } + return true; +}; + +/** + * @see GenericWorker.lock + */ +ZipFileWorker.prototype.lock = function () { + GenericWorker.prototype.lock.call(this); + var sources = this._sources; + for(var i = 0; i < sources.length; i++) { + sources[i].lock(); + } +}; + +module.exports = ZipFileWorker; + +},{"../crc32":4,"../signature":23,"../stream/GenericWorker":28,"../utf8":31,"../utils":32}],9:[function(require,module,exports){ +'use strict'; + +var compressions = require('../compressions'); +var ZipFileWorker = require('./ZipFileWorker'); + +/** + * Find the compression to use. + * @param {String} fileCompression the compression defined at the file level, if any. + * @param {String} zipCompression the compression defined at the load() level. + * @return {Object} the compression object to use. + */ +var getCompression = function (fileCompression, zipCompression) { + + var compressionName = fileCompression || zipCompression; + var compression = compressions[compressionName]; + if (!compression) { + throw new Error(compressionName + " is not a valid compression method !"); + } + return compression; +}; + +/** + * Create a worker to generate a zip file. + * @param {JSZip} zip the JSZip instance at the right root level. + * @param {Object} options to generate the zip file. + * @param {String} comment the comment to use. + */ +exports.generateWorker = function (zip, options, comment) { + + var zipFileWorker = new ZipFileWorker(options.streamFiles, comment, options.platform, options.encodeFileName); + var entriesCount = 0; + try { + + zip.forEach(function (relativePath, file) { + entriesCount++; + var compression = getCompression(file.options.compression, options.compression); + var compressionOptions = file.options.compressionOptions || options.compressionOptions || {}; + var dir = file.dir, date = file.date; + + file._compressWorker(compression, compressionOptions) + .withStreamInfo("file", { + name : relativePath, + dir : dir, + date : date, + comment : file.comment || "", + unixPermissions : file.unixPermissions, + dosPermissions : file.dosPermissions + }) + .pipe(zipFileWorker); + }); + zipFileWorker.entriesCount = entriesCount; + } catch (e) { + zipFileWorker.error(e); + } + + return zipFileWorker; +}; + +},{"../compressions":3,"./ZipFileWorker":8}],10:[function(require,module,exports){ +'use strict'; + +/** + * Representation a of zip file in js + * @constructor + */ +function JSZip() { + // if this constructor is used without `new`, it adds `new` before itself: + if(!(this instanceof JSZip)) { + return new JSZip(); + } + + if(arguments.length) { + throw new Error("The constructor with parameters has been removed in JSZip 3.0, please check the upgrade guide."); + } + + // object containing the files : + // { + // "folder/" : {...}, + // "folder/data.txt" : {...} + // } + // NOTE: we use a null prototype because we do not + // want filenames like "toString" coming from a zip file + // to overwrite methods and attributes in a normal Object. + this.files = Object.create(null); + + this.comment = null; + + // Where we are in the hierarchy + this.root = ""; + this.clone = function() { + var newObj = new JSZip(); + for (var i in this) { + if (typeof this[i] !== "function") { + newObj[i] = this[i]; + } + } + return newObj; + }; +} +JSZip.prototype = require('./object'); +JSZip.prototype.loadAsync = require('./load'); +JSZip.support = require('./support'); +JSZip.defaults = require('./defaults'); + +// TODO find a better way to handle this version, +// a require('package.json').version doesn't work with webpack, see #327 +JSZip.version = "3.7.1"; + +JSZip.loadAsync = function (content, options) { + return new JSZip().loadAsync(content, options); +}; + +JSZip.external = require("./external"); +module.exports = JSZip; + +},{"./defaults":5,"./external":6,"./load":11,"./object":15,"./support":30}],11:[function(require,module,exports){ +'use strict'; +var utils = require('./utils'); +var external = require("./external"); +var utf8 = require('./utf8'); +var ZipEntries = require('./zipEntries'); +var Crc32Probe = require('./stream/Crc32Probe'); +var nodejsUtils = require("./nodejsUtils"); + +/** + * Check the CRC32 of an entry. + * @param {ZipEntry} zipEntry the zip entry to check. + * @return {Promise} the result. + */ +function checkEntryCRC32(zipEntry) { + return new external.Promise(function (resolve, reject) { + var worker = zipEntry.decompressed.getContentWorker().pipe(new Crc32Probe()); + worker.on("error", function (e) { + reject(e); + }) + .on("end", function () { + if (worker.streamInfo.crc32 !== zipEntry.decompressed.crc32) { + reject(new Error("Corrupted zip : CRC32 mismatch")); + } else { + resolve(); + } + }) + .resume(); + }); +} + +module.exports = function (data, options) { + var zip = this; + options = utils.extend(options || {}, { + base64: false, + checkCRC32: false, + optimizedBinaryString: false, + createFolders: false, + decodeFileName: utf8.utf8decode + }); + + if (nodejsUtils.isNode && nodejsUtils.isStream(data)) { + return external.Promise.reject(new Error("JSZip can't accept a stream when loading a zip file.")); + } + + return utils.prepareContent("the loaded zip file", data, true, options.optimizedBinaryString, options.base64) + .then(function (data) { + var zipEntries = new ZipEntries(options); + zipEntries.load(data); + return zipEntries; + }).then(function checkCRC32(zipEntries) { + var promises = [external.Promise.resolve(zipEntries)]; + var files = zipEntries.files; + if (options.checkCRC32) { + for (var i = 0; i < files.length; i++) { + promises.push(checkEntryCRC32(files[i])); + } + } + return external.Promise.all(promises); + }).then(function addFiles(results) { + var zipEntries = results.shift(); + var files = zipEntries.files; + for (var i = 0; i < files.length; i++) { + var input = files[i]; + zip.file(input.fileNameStr, input.decompressed, { + binary: true, + optimizedBinaryString: true, + date: input.date, + dir: input.dir, + comment: input.fileCommentStr.length ? input.fileCommentStr : null, + unixPermissions: input.unixPermissions, + dosPermissions: input.dosPermissions, + createFolders: options.createFolders + }); + } + if (zipEntries.zipComment.length) { + zip.comment = zipEntries.zipComment; + } + + return zip; + }); +}; + +},{"./external":6,"./nodejsUtils":14,"./stream/Crc32Probe":25,"./utf8":31,"./utils":32,"./zipEntries":33}],12:[function(require,module,exports){ +"use strict"; + +var utils = require('../utils'); +var GenericWorker = require('../stream/GenericWorker'); + +/** + * A worker that use a nodejs stream as source. + * @constructor + * @param {String} filename the name of the file entry for this stream. + * @param {Readable} stream the nodejs stream. + */ +function NodejsStreamInputAdapter(filename, stream) { + GenericWorker.call(this, "Nodejs stream input adapter for " + filename); + this._upstreamEnded = false; + this._bindStream(stream); +} + +utils.inherits(NodejsStreamInputAdapter, GenericWorker); + +/** + * Prepare the stream and bind the callbacks on it. + * Do this ASAP on node 0.10 ! A lazy binding doesn't always work. + * @param {Stream} stream the nodejs stream to use. + */ +NodejsStreamInputAdapter.prototype._bindStream = function (stream) { + var self = this; + this._stream = stream; + stream.pause(); + stream + .on("data", function (chunk) { + self.push({ + data: chunk, + meta : { + percent : 0 + } + }); + }) + .on("error", function (e) { + if(self.isPaused) { + this.generatedError = e; + } else { + self.error(e); + } + }) + .on("end", function () { + if(self.isPaused) { + self._upstreamEnded = true; + } else { + self.end(); + } + }); +}; +NodejsStreamInputAdapter.prototype.pause = function () { + if(!GenericWorker.prototype.pause.call(this)) { + return false; + } + this._stream.pause(); + return true; +}; +NodejsStreamInputAdapter.prototype.resume = function () { + if(!GenericWorker.prototype.resume.call(this)) { + return false; + } + + if(this._upstreamEnded) { + this.end(); + } else { + this._stream.resume(); + } + + return true; +}; + +module.exports = NodejsStreamInputAdapter; + +},{"../stream/GenericWorker":28,"../utils":32}],13:[function(require,module,exports){ +'use strict'; + +var Readable = require('readable-stream').Readable; + +var utils = require('../utils'); +utils.inherits(NodejsStreamOutputAdapter, Readable); + +/** +* A nodejs stream using a worker as source. +* @see the SourceWrapper in http://nodejs.org/api/stream.html +* @constructor +* @param {StreamHelper} helper the helper wrapping the worker +* @param {Object} options the nodejs stream options +* @param {Function} updateCb the update callback. +*/ +function NodejsStreamOutputAdapter(helper, options, updateCb) { + Readable.call(this, options); + this._helper = helper; + + var self = this; + helper.on("data", function (data, meta) { + if (!self.push(data)) { + self._helper.pause(); + } + if(updateCb) { + updateCb(meta); + } + }) + .on("error", function(e) { + self.emit('error', e); + }) + .on("end", function () { + self.push(null); + }); +} + + +NodejsStreamOutputAdapter.prototype._read = function() { + this._helper.resume(); +}; + +module.exports = NodejsStreamOutputAdapter; + +},{"../utils":32,"readable-stream":16}],14:[function(require,module,exports){ +'use strict'; + +module.exports = { + /** + * True if this is running in Nodejs, will be undefined in a browser. + * In a browser, browserify won't include this file and the whole module + * will be resolved an empty object. + */ + isNode : typeof Buffer !== "undefined", + /** + * Create a new nodejs Buffer from an existing content. + * @param {Object} data the data to pass to the constructor. + * @param {String} encoding the encoding to use. + * @return {Buffer} a new Buffer. + */ + newBufferFrom: function(data, encoding) { + if (Buffer.from && Buffer.from !== Uint8Array.from) { + return Buffer.from(data, encoding); + } else { + if (typeof data === "number") { + // Safeguard for old Node.js versions. On newer versions, + // Buffer.from(number) / Buffer(number, encoding) already throw. + throw new Error("The \"data\" argument must not be a number"); + } + return new Buffer(data, encoding); + } + }, + /** + * Create a new nodejs Buffer with the specified size. + * @param {Integer} size the size of the buffer. + * @return {Buffer} a new Buffer. + */ + allocBuffer: function (size) { + if (Buffer.alloc) { + return Buffer.alloc(size); + } else { + var buf = new Buffer(size); + buf.fill(0); + return buf; + } + }, + /** + * Find out if an object is a Buffer. + * @param {Object} b the object to test. + * @return {Boolean} true if the object is a Buffer, false otherwise. + */ + isBuffer : function(b){ + return Buffer.isBuffer(b); + }, + + isStream : function (obj) { + return obj && + typeof obj.on === "function" && + typeof obj.pause === "function" && + typeof obj.resume === "function"; + } +}; + +},{}],15:[function(require,module,exports){ +'use strict'; +var utf8 = require('./utf8'); +var utils = require('./utils'); +var GenericWorker = require('./stream/GenericWorker'); +var StreamHelper = require('./stream/StreamHelper'); +var defaults = require('./defaults'); +var CompressedObject = require('./compressedObject'); +var ZipObject = require('./zipObject'); +var generate = require("./generate"); +var nodejsUtils = require("./nodejsUtils"); +var NodejsStreamInputAdapter = require("./nodejs/NodejsStreamInputAdapter"); + + +/** + * Add a file in the current folder. + * @private + * @param {string} name the name of the file + * @param {String|ArrayBuffer|Uint8Array|Buffer} data the data of the file + * @param {Object} originalOptions the options of the file + * @return {Object} the new file. + */ +var fileAdd = function(name, data, originalOptions) { + // be sure sub folders exist + var dataType = utils.getTypeOf(data), + parent; + + + /* + * Correct options. + */ + + var o = utils.extend(originalOptions || {}, defaults); + o.date = o.date || new Date(); + if (o.compression !== null) { + o.compression = o.compression.toUpperCase(); + } + + if (typeof o.unixPermissions === "string") { + o.unixPermissions = parseInt(o.unixPermissions, 8); + } + + // UNX_IFDIR 0040000 see zipinfo.c + if (o.unixPermissions && (o.unixPermissions & 0x4000)) { + o.dir = true; + } + // Bit 4 Directory + if (o.dosPermissions && (o.dosPermissions & 0x0010)) { + o.dir = true; + } + + if (o.dir) { + name = forceTrailingSlash(name); + } + if (o.createFolders && (parent = parentFolder(name))) { + folderAdd.call(this, parent, true); + } + + var isUnicodeString = dataType === "string" && o.binary === false && o.base64 === false; + if (!originalOptions || typeof originalOptions.binary === "undefined") { + o.binary = !isUnicodeString; + } + + + var isCompressedEmpty = (data instanceof CompressedObject) && data.uncompressedSize === 0; + + if (isCompressedEmpty || o.dir || !data || data.length === 0) { + o.base64 = false; + o.binary = true; + data = ""; + o.compression = "STORE"; + dataType = "string"; + } + + /* + * Convert content to fit. + */ + + var zipObjectContent = null; + if (data instanceof CompressedObject || data instanceof GenericWorker) { + zipObjectContent = data; + } else if (nodejsUtils.isNode && nodejsUtils.isStream(data)) { + zipObjectContent = new NodejsStreamInputAdapter(name, data); + } else { + zipObjectContent = utils.prepareContent(name, data, o.binary, o.optimizedBinaryString, o.base64); + } + + var object = new ZipObject(name, zipObjectContent, o); + this.files[name] = object; + /* + TODO: we can't throw an exception because we have async promises + (we can have a promise of a Date() for example) but returning a + promise is useless because file(name, data) returns the JSZip + object for chaining. Should we break that to allow the user + to catch the error ? + + return external.Promise.resolve(zipObjectContent) + .then(function () { + return object; + }); + */ +}; + +/** + * Find the parent folder of the path. + * @private + * @param {string} path the path to use + * @return {string} the parent folder, or "" + */ +var parentFolder = function (path) { + if (path.slice(-1) === '/') { + path = path.substring(0, path.length - 1); + } + var lastSlash = path.lastIndexOf('/'); + return (lastSlash > 0) ? path.substring(0, lastSlash) : ""; +}; + +/** + * Returns the path with a slash at the end. + * @private + * @param {String} path the path to check. + * @return {String} the path with a trailing slash. + */ +var forceTrailingSlash = function(path) { + // Check the name ends with a / + if (path.slice(-1) !== "/") { + path += "/"; // IE doesn't like substr(-1) + } + return path; +}; + +/** + * Add a (sub) folder in the current folder. + * @private + * @param {string} name the folder's name + * @param {boolean=} [createFolders] If true, automatically create sub + * folders. Defaults to false. + * @return {Object} the new folder. + */ +var folderAdd = function(name, createFolders) { + createFolders = (typeof createFolders !== 'undefined') ? createFolders : defaults.createFolders; + + name = forceTrailingSlash(name); + + // Does this folder already exist? + if (!this.files[name]) { + fileAdd.call(this, name, null, { + dir: true, + createFolders: createFolders + }); + } + return this.files[name]; +}; + +/** +* Cross-window, cross-Node-context regular expression detection +* @param {Object} object Anything +* @return {Boolean} true if the object is a regular expression, +* false otherwise +*/ +function isRegExp(object) { + return Object.prototype.toString.call(object) === "[object RegExp]"; +} + +// return the actual prototype of JSZip +var out = { + /** + * @see loadAsync + */ + load: function() { + throw new Error("This method has been removed in JSZip 3.0, please check the upgrade guide."); + }, + + + /** + * Call a callback function for each entry at this folder level. + * @param {Function} cb the callback function: + * function (relativePath, file) {...} + * It takes 2 arguments : the relative path and the file. + */ + forEach: function(cb) { + var filename, relativePath, file; + /* jshint ignore:start */ + // ignore warning about unwanted properties because this.files is a null prototype object + for (filename in this.files) { + file = this.files[filename]; + relativePath = filename.slice(this.root.length, filename.length); + if (relativePath && filename.slice(0, this.root.length) === this.root) { // the file is in the current root + cb(relativePath, file); // TODO reverse the parameters ? need to be clean AND consistent with the filter search fn... + } + } + /* jshint ignore:end */ + }, + + /** + * Filter nested files/folders with the specified function. + * @param {Function} search the predicate to use : + * function (relativePath, file) {...} + * It takes 2 arguments : the relative path and the file. + * @return {Array} An array of matching elements. + */ + filter: function(search) { + var result = []; + this.forEach(function (relativePath, entry) { + if (search(relativePath, entry)) { // the file matches the function + result.push(entry); + } + + }); + return result; + }, + + /** + * Add a file to the zip file, or search a file. + * @param {string|RegExp} name The name of the file to add (if data is defined), + * the name of the file to find (if no data) or a regex to match files. + * @param {String|ArrayBuffer|Uint8Array|Buffer} data The file data, either raw or base64 encoded + * @param {Object} o File options + * @return {JSZip|Object|Array} this JSZip object (when adding a file), + * a file (when searching by string) or an array of files (when searching by regex). + */ + file: function(name, data, o) { + if (arguments.length === 1) { + if (isRegExp(name)) { + var regexp = name; + return this.filter(function(relativePath, file) { + return !file.dir && regexp.test(relativePath); + }); + } + else { // text + var obj = this.files[this.root + name]; + if (obj && !obj.dir) { + return obj; + } else { + return null; + } + } + } + else { // more than one argument : we have data ! + name = this.root + name; + fileAdd.call(this, name, data, o); + } + return this; + }, + + /** + * Add a directory to the zip file, or search. + * @param {String|RegExp} arg The name of the directory to add, or a regex to search folders. + * @return {JSZip} an object with the new directory as the root, or an array containing matching folders. + */ + folder: function(arg) { + if (!arg) { + return this; + } + + if (isRegExp(arg)) { + return this.filter(function(relativePath, file) { + return file.dir && arg.test(relativePath); + }); + } + + // else, name is a new folder + var name = this.root + arg; + var newFolder = folderAdd.call(this, name); + + // Allow chaining by returning a new object with this folder as the root + var ret = this.clone(); + ret.root = newFolder.name; + return ret; + }, + + /** + * Delete a file, or a directory and all sub-files, from the zip + * @param {string} name the name of the file to delete + * @return {JSZip} this JSZip object + */ + remove: function(name) { + name = this.root + name; + var file = this.files[name]; + if (!file) { + // Look for any folders + if (name.slice(-1) !== "/") { + name += "/"; + } + file = this.files[name]; + } + + if (file && !file.dir) { + // file + delete this.files[name]; + } else { + // maybe a folder, delete recursively + var kids = this.filter(function(relativePath, file) { + return file.name.slice(0, name.length) === name; + }); + for (var i = 0; i < kids.length; i++) { + delete this.files[kids[i].name]; + } + } + + return this; + }, + + /** + * Generate the complete zip file + * @param {Object} options the options to generate the zip file : + * - compression, "STORE" by default. + * - type, "base64" by default. Values are : string, base64, uint8array, arraybuffer, blob. + * @return {String|Uint8Array|ArrayBuffer|Buffer|Blob} the zip file + */ + generate: function(options) { + throw new Error("This method has been removed in JSZip 3.0, please check the upgrade guide."); + }, + + /** + * Generate the complete zip file as an internal stream. + * @param {Object} options the options to generate the zip file : + * - compression, "STORE" by default. + * - type, "base64" by default. Values are : string, base64, uint8array, arraybuffer, blob. + * @return {StreamHelper} the streamed zip file. + */ + generateInternalStream: function(options) { + var worker, opts = {}; + try { + opts = utils.extend(options || {}, { + streamFiles: false, + compression: "STORE", + compressionOptions : null, + type: "", + platform: "DOS", + comment: null, + mimeType: 'application/zip', + encodeFileName: utf8.utf8encode + }); + + opts.type = opts.type.toLowerCase(); + opts.compression = opts.compression.toUpperCase(); + + // "binarystring" is preferred but the internals use "string". + if(opts.type === "binarystring") { + opts.type = "string"; + } + + if (!opts.type) { + throw new Error("No output type specified."); + } + + utils.checkSupport(opts.type); + + // accept nodejs `process.platform` + if( + opts.platform === 'darwin' || + opts.platform === 'freebsd' || + opts.platform === 'linux' || + opts.platform === 'sunos' + ) { + opts.platform = "UNIX"; + } + if (opts.platform === 'win32') { + opts.platform = "DOS"; + } + + var comment = opts.comment || this.comment || ""; + worker = generate.generateWorker(this, opts, comment); + } catch (e) { + worker = new GenericWorker("error"); + worker.error(e); + } + return new StreamHelper(worker, opts.type || "string", opts.mimeType); + }, + /** + * Generate the complete zip file asynchronously. + * @see generateInternalStream + */ + generateAsync: function(options, onUpdate) { + return this.generateInternalStream(options).accumulate(onUpdate); + }, + /** + * Generate the complete zip file asynchronously. + * @see generateInternalStream + */ + generateNodeStream: function(options, onUpdate) { + options = options || {}; + if (!options.type) { + options.type = "nodebuffer"; + } + return this.generateInternalStream(options).toNodejsStream(onUpdate); + } +}; +module.exports = out; + +},{"./compressedObject":2,"./defaults":5,"./generate":9,"./nodejs/NodejsStreamInputAdapter":12,"./nodejsUtils":14,"./stream/GenericWorker":28,"./stream/StreamHelper":29,"./utf8":31,"./utils":32,"./zipObject":35}],16:[function(require,module,exports){ +/* + * This file is used by module bundlers (browserify/webpack/etc) when + * including a stream implementation. We use "readable-stream" to get a + * consistent behavior between nodejs versions but bundlers often have a shim + * for "stream". Using this shim greatly improve the compatibility and greatly + * reduce the final size of the bundle (only one stream implementation, not + * two). + */ +module.exports = require("stream"); + +},{"stream":undefined}],17:[function(require,module,exports){ +'use strict'; +var DataReader = require('./DataReader'); +var utils = require('../utils'); + +function ArrayReader(data) { + DataReader.call(this, data); + for(var i = 0; i < this.data.length; i++) { + data[i] = data[i] & 0xFF; + } +} +utils.inherits(ArrayReader, DataReader); +/** + * @see DataReader.byteAt + */ +ArrayReader.prototype.byteAt = function(i) { + return this.data[this.zero + i]; +}; +/** + * @see DataReader.lastIndexOfSignature + */ +ArrayReader.prototype.lastIndexOfSignature = function(sig) { + var sig0 = sig.charCodeAt(0), + sig1 = sig.charCodeAt(1), + sig2 = sig.charCodeAt(2), + sig3 = sig.charCodeAt(3); + for (var i = this.length - 4; i >= 0; --i) { + if (this.data[i] === sig0 && this.data[i + 1] === sig1 && this.data[i + 2] === sig2 && this.data[i + 3] === sig3) { + return i - this.zero; + } + } + + return -1; +}; +/** + * @see DataReader.readAndCheckSignature + */ +ArrayReader.prototype.readAndCheckSignature = function (sig) { + var sig0 = sig.charCodeAt(0), + sig1 = sig.charCodeAt(1), + sig2 = sig.charCodeAt(2), + sig3 = sig.charCodeAt(3), + data = this.readData(4); + return sig0 === data[0] && sig1 === data[1] && sig2 === data[2] && sig3 === data[3]; +}; +/** + * @see DataReader.readData + */ +ArrayReader.prototype.readData = function(size) { + this.checkOffset(size); + if(size === 0) { + return []; + } + var result = this.data.slice(this.zero + this.index, this.zero + this.index + size); + this.index += size; + return result; +}; +module.exports = ArrayReader; + +},{"../utils":32,"./DataReader":18}],18:[function(require,module,exports){ +'use strict'; +var utils = require('../utils'); + +function DataReader(data) { + this.data = data; // type : see implementation + this.length = data.length; + this.index = 0; + this.zero = 0; +} +DataReader.prototype = { + /** + * Check that the offset will not go too far. + * @param {string} offset the additional offset to check. + * @throws {Error} an Error if the offset is out of bounds. + */ + checkOffset: function(offset) { + this.checkIndex(this.index + offset); + }, + /** + * Check that the specified index will not be too far. + * @param {string} newIndex the index to check. + * @throws {Error} an Error if the index is out of bounds. + */ + checkIndex: function(newIndex) { + if (this.length < this.zero + newIndex || newIndex < 0) { + throw new Error("End of data reached (data length = " + this.length + ", asked index = " + (newIndex) + "). Corrupted zip ?"); + } + }, + /** + * Change the index. + * @param {number} newIndex The new index. + * @throws {Error} if the new index is out of the data. + */ + setIndex: function(newIndex) { + this.checkIndex(newIndex); + this.index = newIndex; + }, + /** + * Skip the next n bytes. + * @param {number} n the number of bytes to skip. + * @throws {Error} if the new index is out of the data. + */ + skip: function(n) { + this.setIndex(this.index + n); + }, + /** + * Get the byte at the specified index. + * @param {number} i the index to use. + * @return {number} a byte. + */ + byteAt: function(i) { + // see implementations + }, + /** + * Get the next number with a given byte size. + * @param {number} size the number of bytes to read. + * @return {number} the corresponding number. + */ + readInt: function(size) { + var result = 0, + i; + this.checkOffset(size); + for (i = this.index + size - 1; i >= this.index; i--) { + result = (result << 8) + this.byteAt(i); + } + this.index += size; + return result; + }, + /** + * Get the next string with a given byte size. + * @param {number} size the number of bytes to read. + * @return {string} the corresponding string. + */ + readString: function(size) { + return utils.transformTo("string", this.readData(size)); + }, + /** + * Get raw data without conversion, bytes. + * @param {number} size the number of bytes to read. + * @return {Object} the raw data, implementation specific. + */ + readData: function(size) { + // see implementations + }, + /** + * Find the last occurrence of a zip signature (4 bytes). + * @param {string} sig the signature to find. + * @return {number} the index of the last occurrence, -1 if not found. + */ + lastIndexOfSignature: function(sig) { + // see implementations + }, + /** + * Read the signature (4 bytes) at the current position and compare it with sig. + * @param {string} sig the expected signature + * @return {boolean} true if the signature matches, false otherwise. + */ + readAndCheckSignature: function(sig) { + // see implementations + }, + /** + * Get the next date. + * @return {Date} the date. + */ + readDate: function() { + var dostime = this.readInt(4); + return new Date(Date.UTC( + ((dostime >> 25) & 0x7f) + 1980, // year + ((dostime >> 21) & 0x0f) - 1, // month + (dostime >> 16) & 0x1f, // day + (dostime >> 11) & 0x1f, // hour + (dostime >> 5) & 0x3f, // minute + (dostime & 0x1f) << 1)); // second + } +}; +module.exports = DataReader; + +},{"../utils":32}],19:[function(require,module,exports){ +'use strict'; +var Uint8ArrayReader = require('./Uint8ArrayReader'); +var utils = require('../utils'); + +function NodeBufferReader(data) { + Uint8ArrayReader.call(this, data); +} +utils.inherits(NodeBufferReader, Uint8ArrayReader); + +/** + * @see DataReader.readData + */ +NodeBufferReader.prototype.readData = function(size) { + this.checkOffset(size); + var result = this.data.slice(this.zero + this.index, this.zero + this.index + size); + this.index += size; + return result; +}; +module.exports = NodeBufferReader; + +},{"../utils":32,"./Uint8ArrayReader":21}],20:[function(require,module,exports){ +'use strict'; +var DataReader = require('./DataReader'); +var utils = require('../utils'); + +function StringReader(data) { + DataReader.call(this, data); +} +utils.inherits(StringReader, DataReader); +/** + * @see DataReader.byteAt + */ +StringReader.prototype.byteAt = function(i) { + return this.data.charCodeAt(this.zero + i); +}; +/** + * @see DataReader.lastIndexOfSignature + */ +StringReader.prototype.lastIndexOfSignature = function(sig) { + return this.data.lastIndexOf(sig) - this.zero; +}; +/** + * @see DataReader.readAndCheckSignature + */ +StringReader.prototype.readAndCheckSignature = function (sig) { + var data = this.readData(4); + return sig === data; +}; +/** + * @see DataReader.readData + */ +StringReader.prototype.readData = function(size) { + this.checkOffset(size); + // this will work because the constructor applied the "& 0xff" mask. + var result = this.data.slice(this.zero + this.index, this.zero + this.index + size); + this.index += size; + return result; +}; +module.exports = StringReader; + +},{"../utils":32,"./DataReader":18}],21:[function(require,module,exports){ +'use strict'; +var ArrayReader = require('./ArrayReader'); +var utils = require('../utils'); + +function Uint8ArrayReader(data) { + ArrayReader.call(this, data); +} +utils.inherits(Uint8ArrayReader, ArrayReader); +/** + * @see DataReader.readData + */ +Uint8ArrayReader.prototype.readData = function(size) { + this.checkOffset(size); + if(size === 0) { + // in IE10, when using subarray(idx, idx), we get the array [0x00] instead of []. + return new Uint8Array(0); + } + var result = this.data.subarray(this.zero + this.index, this.zero + this.index + size); + this.index += size; + return result; +}; +module.exports = Uint8ArrayReader; + +},{"../utils":32,"./ArrayReader":17}],22:[function(require,module,exports){ +'use strict'; + +var utils = require('../utils'); +var support = require('../support'); +var ArrayReader = require('./ArrayReader'); +var StringReader = require('./StringReader'); +var NodeBufferReader = require('./NodeBufferReader'); +var Uint8ArrayReader = require('./Uint8ArrayReader'); + +/** + * Create a reader adapted to the data. + * @param {String|ArrayBuffer|Uint8Array|Buffer} data the data to read. + * @return {DataReader} the data reader. + */ +module.exports = function (data) { + var type = utils.getTypeOf(data); + utils.checkSupport(type); + if (type === "string" && !support.uint8array) { + return new StringReader(data); + } + if (type === "nodebuffer") { + return new NodeBufferReader(data); + } + if (support.uint8array) { + return new Uint8ArrayReader(utils.transformTo("uint8array", data)); + } + return new ArrayReader(utils.transformTo("array", data)); +}; + +},{"../support":30,"../utils":32,"./ArrayReader":17,"./NodeBufferReader":19,"./StringReader":20,"./Uint8ArrayReader":21}],23:[function(require,module,exports){ +'use strict'; +exports.LOCAL_FILE_HEADER = "PK\x03\x04"; +exports.CENTRAL_FILE_HEADER = "PK\x01\x02"; +exports.CENTRAL_DIRECTORY_END = "PK\x05\x06"; +exports.ZIP64_CENTRAL_DIRECTORY_LOCATOR = "PK\x06\x07"; +exports.ZIP64_CENTRAL_DIRECTORY_END = "PK\x06\x06"; +exports.DATA_DESCRIPTOR = "PK\x07\x08"; + +},{}],24:[function(require,module,exports){ +'use strict'; + +var GenericWorker = require('./GenericWorker'); +var utils = require('../utils'); + +/** + * A worker which convert chunks to a specified type. + * @constructor + * @param {String} destType the destination type. + */ +function ConvertWorker(destType) { + GenericWorker.call(this, "ConvertWorker to " + destType); + this.destType = destType; +} +utils.inherits(ConvertWorker, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +ConvertWorker.prototype.processChunk = function (chunk) { + this.push({ + data : utils.transformTo(this.destType, chunk.data), + meta : chunk.meta + }); +}; +module.exports = ConvertWorker; + +},{"../utils":32,"./GenericWorker":28}],25:[function(require,module,exports){ +'use strict'; + +var GenericWorker = require('./GenericWorker'); +var crc32 = require('../crc32'); +var utils = require('../utils'); + +/** + * A worker which calculate the crc32 of the data flowing through. + * @constructor + */ +function Crc32Probe() { + GenericWorker.call(this, "Crc32Probe"); + this.withStreamInfo("crc32", 0); +} +utils.inherits(Crc32Probe, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +Crc32Probe.prototype.processChunk = function (chunk) { + this.streamInfo.crc32 = crc32(chunk.data, this.streamInfo.crc32 || 0); + this.push(chunk); +}; +module.exports = Crc32Probe; + +},{"../crc32":4,"../utils":32,"./GenericWorker":28}],26:[function(require,module,exports){ +'use strict'; + +var utils = require('../utils'); +var GenericWorker = require('./GenericWorker'); + +/** + * A worker which calculate the total length of the data flowing through. + * @constructor + * @param {String} propName the name used to expose the length + */ +function DataLengthProbe(propName) { + GenericWorker.call(this, "DataLengthProbe for " + propName); + this.propName = propName; + this.withStreamInfo(propName, 0); +} +utils.inherits(DataLengthProbe, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +DataLengthProbe.prototype.processChunk = function (chunk) { + if(chunk) { + var length = this.streamInfo[this.propName] || 0; + this.streamInfo[this.propName] = length + chunk.data.length; + } + GenericWorker.prototype.processChunk.call(this, chunk); +}; +module.exports = DataLengthProbe; + + +},{"../utils":32,"./GenericWorker":28}],27:[function(require,module,exports){ +'use strict'; + +var utils = require('../utils'); +var GenericWorker = require('./GenericWorker'); + +// the size of the generated chunks +// TODO expose this as a public variable +var DEFAULT_BLOCK_SIZE = 16 * 1024; + +/** + * A worker that reads a content and emits chunks. + * @constructor + * @param {Promise} dataP the promise of the data to split + */ +function DataWorker(dataP) { + GenericWorker.call(this, "DataWorker"); + var self = this; + this.dataIsReady = false; + this.index = 0; + this.max = 0; + this.data = null; + this.type = ""; + + this._tickScheduled = false; + + dataP.then(function (data) { + self.dataIsReady = true; + self.data = data; + self.max = data && data.length || 0; + self.type = utils.getTypeOf(data); + if(!self.isPaused) { + self._tickAndRepeat(); + } + }, function (e) { + self.error(e); + }); +} + +utils.inherits(DataWorker, GenericWorker); + +/** + * @see GenericWorker.cleanUp + */ +DataWorker.prototype.cleanUp = function () { + GenericWorker.prototype.cleanUp.call(this); + this.data = null; +}; + +/** + * @see GenericWorker.resume + */ +DataWorker.prototype.resume = function () { + if(!GenericWorker.prototype.resume.call(this)) { + return false; + } + + if (!this._tickScheduled && this.dataIsReady) { + this._tickScheduled = true; + utils.delay(this._tickAndRepeat, [], this); + } + return true; +}; + +/** + * Trigger a tick a schedule an other call to this function. + */ +DataWorker.prototype._tickAndRepeat = function() { + this._tickScheduled = false; + if(this.isPaused || this.isFinished) { + return; + } + this._tick(); + if(!this.isFinished) { + utils.delay(this._tickAndRepeat, [], this); + this._tickScheduled = true; + } +}; + +/** + * Read and push a chunk. + */ +DataWorker.prototype._tick = function() { + + if(this.isPaused || this.isFinished) { + return false; + } + + var size = DEFAULT_BLOCK_SIZE; + var data = null, nextIndex = Math.min(this.max, this.index + size); + if (this.index >= this.max) { + // EOF + return this.end(); + } else { + switch(this.type) { + case "string": + data = this.data.substring(this.index, nextIndex); + break; + case "uint8array": + data = this.data.subarray(this.index, nextIndex); + break; + case "array": + case "nodebuffer": + data = this.data.slice(this.index, nextIndex); + break; + } + this.index = nextIndex; + return this.push({ + data : data, + meta : { + percent : this.max ? this.index / this.max * 100 : 0 + } + }); + } +}; + +module.exports = DataWorker; + +},{"../utils":32,"./GenericWorker":28}],28:[function(require,module,exports){ +'use strict'; + +/** + * A worker that does nothing but passing chunks to the next one. This is like + * a nodejs stream but with some differences. On the good side : + * - it works on IE 6-9 without any issue / polyfill + * - it weights less than the full dependencies bundled with browserify + * - it forwards errors (no need to declare an error handler EVERYWHERE) + * + * A chunk is an object with 2 attributes : `meta` and `data`. The former is an + * object containing anything (`percent` for example), see each worker for more + * details. The latter is the real data (String, Uint8Array, etc). + * + * @constructor + * @param {String} name the name of the stream (mainly used for debugging purposes) + */ +function GenericWorker(name) { + // the name of the worker + this.name = name || "default"; + // an object containing metadata about the workers chain + this.streamInfo = {}; + // an error which happened when the worker was paused + this.generatedError = null; + // an object containing metadata to be merged by this worker into the general metadata + this.extraStreamInfo = {}; + // true if the stream is paused (and should not do anything), false otherwise + this.isPaused = true; + // true if the stream is finished (and should not do anything), false otherwise + this.isFinished = false; + // true if the stream is locked to prevent further structure updates (pipe), false otherwise + this.isLocked = false; + // the event listeners + this._listeners = { + 'data':[], + 'end':[], + 'error':[] + }; + // the previous worker, if any + this.previous = null; +} + +GenericWorker.prototype = { + /** + * Push a chunk to the next workers. + * @param {Object} chunk the chunk to push + */ + push : function (chunk) { + this.emit("data", chunk); + }, + /** + * End the stream. + * @return {Boolean} true if this call ended the worker, false otherwise. + */ + end : function () { + if (this.isFinished) { + return false; + } + + this.flush(); + try { + this.emit("end"); + this.cleanUp(); + this.isFinished = true; + } catch (e) { + this.emit("error", e); + } + return true; + }, + /** + * End the stream with an error. + * @param {Error} e the error which caused the premature end. + * @return {Boolean} true if this call ended the worker with an error, false otherwise. + */ + error : function (e) { + if (this.isFinished) { + return false; + } + + if(this.isPaused) { + this.generatedError = e; + } else { + this.isFinished = true; + + this.emit("error", e); + + // in the workers chain exploded in the middle of the chain, + // the error event will go downward but we also need to notify + // workers upward that there has been an error. + if(this.previous) { + this.previous.error(e); + } + + this.cleanUp(); + } + return true; + }, + /** + * Add a callback on an event. + * @param {String} name the name of the event (data, end, error) + * @param {Function} listener the function to call when the event is triggered + * @return {GenericWorker} the current object for chainability + */ + on : function (name, listener) { + this._listeners[name].push(listener); + return this; + }, + /** + * Clean any references when a worker is ending. + */ + cleanUp : function () { + this.streamInfo = this.generatedError = this.extraStreamInfo = null; + this._listeners = []; + }, + /** + * Trigger an event. This will call registered callback with the provided arg. + * @param {String} name the name of the event (data, end, error) + * @param {Object} arg the argument to call the callback with. + */ + emit : function (name, arg) { + if (this._listeners[name]) { + for(var i = 0; i < this._listeners[name].length; i++) { + this._listeners[name][i].call(this, arg); + } + } + }, + /** + * Chain a worker with an other. + * @param {Worker} next the worker receiving events from the current one. + * @return {worker} the next worker for chainability + */ + pipe : function (next) { + return next.registerPrevious(this); + }, + /** + * Same as `pipe` in the other direction. + * Using an API with `pipe(next)` is very easy. + * Implementing the API with the point of view of the next one registering + * a source is easier, see the ZipFileWorker. + * @param {Worker} previous the previous worker, sending events to this one + * @return {Worker} the current worker for chainability + */ + registerPrevious : function (previous) { + if (this.isLocked) { + throw new Error("The stream '" + this + "' has already been used."); + } + + // sharing the streamInfo... + this.streamInfo = previous.streamInfo; + // ... and adding our own bits + this.mergeStreamInfo(); + this.previous = previous; + var self = this; + previous.on('data', function (chunk) { + self.processChunk(chunk); + }); + previous.on('end', function () { + self.end(); + }); + previous.on('error', function (e) { + self.error(e); + }); + return this; + }, + /** + * Pause the stream so it doesn't send events anymore. + * @return {Boolean} true if this call paused the worker, false otherwise. + */ + pause : function () { + if(this.isPaused || this.isFinished) { + return false; + } + this.isPaused = true; + + if(this.previous) { + this.previous.pause(); + } + return true; + }, + /** + * Resume a paused stream. + * @return {Boolean} true if this call resumed the worker, false otherwise. + */ + resume : function () { + if(!this.isPaused || this.isFinished) { + return false; + } + this.isPaused = false; + + // if true, the worker tried to resume but failed + var withError = false; + if(this.generatedError) { + this.error(this.generatedError); + withError = true; + } + if(this.previous) { + this.previous.resume(); + } + + return !withError; + }, + /** + * Flush any remaining bytes as the stream is ending. + */ + flush : function () {}, + /** + * Process a chunk. This is usually the method overridden. + * @param {Object} chunk the chunk to process. + */ + processChunk : function(chunk) { + this.push(chunk); + }, + /** + * Add a key/value to be added in the workers chain streamInfo once activated. + * @param {String} key the key to use + * @param {Object} value the associated value + * @return {Worker} the current worker for chainability + */ + withStreamInfo : function (key, value) { + this.extraStreamInfo[key] = value; + this.mergeStreamInfo(); + return this; + }, + /** + * Merge this worker's streamInfo into the chain's streamInfo. + */ + mergeStreamInfo : function () { + for(var key in this.extraStreamInfo) { + if (!this.extraStreamInfo.hasOwnProperty(key)) { + continue; + } + this.streamInfo[key] = this.extraStreamInfo[key]; + } + }, + + /** + * Lock the stream to prevent further updates on the workers chain. + * After calling this method, all calls to pipe will fail. + */ + lock: function () { + if (this.isLocked) { + throw new Error("The stream '" + this + "' has already been used."); + } + this.isLocked = true; + if (this.previous) { + this.previous.lock(); + } + }, + + /** + * + * Pretty print the workers chain. + */ + toString : function () { + var me = "Worker " + this.name; + if (this.previous) { + return this.previous + " -> " + me; + } else { + return me; + } + } +}; + +module.exports = GenericWorker; + +},{}],29:[function(require,module,exports){ +'use strict'; + +var utils = require('../utils'); +var ConvertWorker = require('./ConvertWorker'); +var GenericWorker = require('./GenericWorker'); +var base64 = require('../base64'); +var support = require("../support"); +var external = require("../external"); + +var NodejsStreamOutputAdapter = null; +if (support.nodestream) { + try { + NodejsStreamOutputAdapter = require('../nodejs/NodejsStreamOutputAdapter'); + } catch(e) {} +} + +/** + * Apply the final transformation of the data. If the user wants a Blob for + * example, it's easier to work with an U8intArray and finally do the + * ArrayBuffer/Blob conversion. + * @param {String} type the name of the final type + * @param {String|Uint8Array|Buffer} content the content to transform + * @param {String} mimeType the mime type of the content, if applicable. + * @return {String|Uint8Array|ArrayBuffer|Buffer|Blob} the content in the right format. + */ +function transformZipOutput(type, content, mimeType) { + switch(type) { + case "blob" : + return utils.newBlob(utils.transformTo("arraybuffer", content), mimeType); + case "base64" : + return base64.encode(content); + default : + return utils.transformTo(type, content); + } +} + +/** + * Concatenate an array of data of the given type. + * @param {String} type the type of the data in the given array. + * @param {Array} dataArray the array containing the data chunks to concatenate + * @return {String|Uint8Array|Buffer} the concatenated data + * @throws Error if the asked type is unsupported + */ +function concat (type, dataArray) { + var i, index = 0, res = null, totalLength = 0; + for(i = 0; i < dataArray.length; i++) { + totalLength += dataArray[i].length; + } + switch(type) { + case "string": + return dataArray.join(""); + case "array": + return Array.prototype.concat.apply([], dataArray); + case "uint8array": + res = new Uint8Array(totalLength); + for(i = 0; i < dataArray.length; i++) { + res.set(dataArray[i], index); + index += dataArray[i].length; + } + return res; + case "nodebuffer": + return Buffer.concat(dataArray); + default: + throw new Error("concat : unsupported type '" + type + "'"); + } +} + +/** + * Listen a StreamHelper, accumulate its content and concatenate it into a + * complete block. + * @param {StreamHelper} helper the helper to use. + * @param {Function} updateCallback a callback called on each update. Called + * with one arg : + * - the metadata linked to the update received. + * @return Promise the promise for the accumulation. + */ +function accumulate(helper, updateCallback) { + return new external.Promise(function (resolve, reject){ + var dataArray = []; + var chunkType = helper._internalType, + resultType = helper._outputType, + mimeType = helper._mimeType; + helper + .on('data', function (data, meta) { + dataArray.push(data); + if(updateCallback) { + updateCallback(meta); + } + }) + .on('error', function(err) { + dataArray = []; + reject(err); + }) + .on('end', function (){ + try { + var result = transformZipOutput(resultType, concat(chunkType, dataArray), mimeType); + resolve(result); + } catch (e) { + reject(e); + } + dataArray = []; + }) + .resume(); + }); +} + +/** + * An helper to easily use workers outside of JSZip. + * @constructor + * @param {Worker} worker the worker to wrap + * @param {String} outputType the type of data expected by the use + * @param {String} mimeType the mime type of the content, if applicable. + */ +function StreamHelper(worker, outputType, mimeType) { + var internalType = outputType; + switch(outputType) { + case "blob": + case "arraybuffer": + internalType = "uint8array"; + break; + case "base64": + internalType = "string"; + break; + } + + try { + // the type used internally + this._internalType = internalType; + // the type used to output results + this._outputType = outputType; + // the mime type + this._mimeType = mimeType; + utils.checkSupport(internalType); + this._worker = worker.pipe(new ConvertWorker(internalType)); + // the last workers can be rewired without issues but we need to + // prevent any updates on previous workers. + worker.lock(); + } catch(e) { + this._worker = new GenericWorker("error"); + this._worker.error(e); + } +} + +StreamHelper.prototype = { + /** + * Listen a StreamHelper, accumulate its content and concatenate it into a + * complete block. + * @param {Function} updateCb the update callback. + * @return Promise the promise for the accumulation. + */ + accumulate : function (updateCb) { + return accumulate(this, updateCb); + }, + /** + * Add a listener on an event triggered on a stream. + * @param {String} evt the name of the event + * @param {Function} fn the listener + * @return {StreamHelper} the current helper. + */ + on : function (evt, fn) { + var self = this; + + if(evt === "data") { + this._worker.on(evt, function (chunk) { + fn.call(self, chunk.data, chunk.meta); + }); + } else { + this._worker.on(evt, function () { + utils.delay(fn, arguments, self); + }); + } + return this; + }, + /** + * Resume the flow of chunks. + * @return {StreamHelper} the current helper. + */ + resume : function () { + utils.delay(this._worker.resume, [], this._worker); + return this; + }, + /** + * Pause the flow of chunks. + * @return {StreamHelper} the current helper. + */ + pause : function () { + this._worker.pause(); + return this; + }, + /** + * Return a nodejs stream for this helper. + * @param {Function} updateCb the update callback. + * @return {NodejsStreamOutputAdapter} the nodejs stream. + */ + toNodejsStream : function (updateCb) { + utils.checkSupport("nodestream"); + if (this._outputType !== "nodebuffer") { + // an object stream containing blob/arraybuffer/uint8array/string + // is strange and I don't know if it would be useful. + // I you find this comment and have a good usecase, please open a + // bug report ! + throw new Error(this._outputType + " is not supported by this method"); + } + + return new NodejsStreamOutputAdapter(this, { + objectMode : this._outputType !== "nodebuffer" + }, updateCb); + } +}; + + +module.exports = StreamHelper; + +},{"../base64":1,"../external":6,"../nodejs/NodejsStreamOutputAdapter":13,"../support":30,"../utils":32,"./ConvertWorker":24,"./GenericWorker":28}],30:[function(require,module,exports){ +'use strict'; + +exports.base64 = true; +exports.array = true; +exports.string = true; +exports.arraybuffer = typeof ArrayBuffer !== "undefined" && typeof Uint8Array !== "undefined"; +exports.nodebuffer = typeof Buffer !== "undefined"; +// contains true if JSZip can read/generate Uint8Array, false otherwise. +exports.uint8array = typeof Uint8Array !== "undefined"; + +if (typeof ArrayBuffer === "undefined") { + exports.blob = false; +} +else { + var buffer = new ArrayBuffer(0); + try { + exports.blob = new Blob([buffer], { + type: "application/zip" + }).size === 0; + } + catch (e) { + try { + var Builder = self.BlobBuilder || self.WebKitBlobBuilder || self.MozBlobBuilder || self.MSBlobBuilder; + var builder = new Builder(); + builder.append(buffer); + exports.blob = builder.getBlob('application/zip').size === 0; + } + catch (e) { + exports.blob = false; + } + } +} + +try { + exports.nodestream = !!require('readable-stream').Readable; +} catch(e) { + exports.nodestream = false; +} + +},{"readable-stream":16}],31:[function(require,module,exports){ +'use strict'; + +var utils = require('./utils'); +var support = require('./support'); +var nodejsUtils = require('./nodejsUtils'); +var GenericWorker = require('./stream/GenericWorker'); + +/** + * The following functions come from pako, from pako/lib/utils/strings + * released under the MIT license, see pako https://github.com/nodeca/pako/ + */ + +// Table with utf8 lengths (calculated by first byte of sequence) +// Note, that 5 & 6-byte values and some 4-byte values can not be represented in JS, +// because max possible codepoint is 0x10ffff +var _utf8len = new Array(256); +for (var i=0; i<256; i++) { + _utf8len[i] = (i >= 252 ? 6 : i >= 248 ? 5 : i >= 240 ? 4 : i >= 224 ? 3 : i >= 192 ? 2 : 1); +} +_utf8len[254]=_utf8len[254]=1; // Invalid sequence start + +// convert string to array (typed, when possible) +var string2buf = function (str) { + var buf, c, c2, m_pos, i, str_len = str.length, buf_len = 0; + + // count binary size + for (m_pos = 0; m_pos < str_len; m_pos++) { + c = str.charCodeAt(m_pos); + if ((c & 0xfc00) === 0xd800 && (m_pos+1 < str_len)) { + c2 = str.charCodeAt(m_pos+1); + if ((c2 & 0xfc00) === 0xdc00) { + c = 0x10000 + ((c - 0xd800) << 10) + (c2 - 0xdc00); + m_pos++; + } + } + buf_len += c < 0x80 ? 1 : c < 0x800 ? 2 : c < 0x10000 ? 3 : 4; + } + + // allocate buffer + if (support.uint8array) { + buf = new Uint8Array(buf_len); + } else { + buf = new Array(buf_len); + } + + // convert + for (i=0, m_pos = 0; i < buf_len; m_pos++) { + c = str.charCodeAt(m_pos); + if ((c & 0xfc00) === 0xd800 && (m_pos+1 < str_len)) { + c2 = str.charCodeAt(m_pos+1); + if ((c2 & 0xfc00) === 0xdc00) { + c = 0x10000 + ((c - 0xd800) << 10) + (c2 - 0xdc00); + m_pos++; + } + } + if (c < 0x80) { + /* one byte */ + buf[i++] = c; + } else if (c < 0x800) { + /* two bytes */ + buf[i++] = 0xC0 | (c >>> 6); + buf[i++] = 0x80 | (c & 0x3f); + } else if (c < 0x10000) { + /* three bytes */ + buf[i++] = 0xE0 | (c >>> 12); + buf[i++] = 0x80 | (c >>> 6 & 0x3f); + buf[i++] = 0x80 | (c & 0x3f); + } else { + /* four bytes */ + buf[i++] = 0xf0 | (c >>> 18); + buf[i++] = 0x80 | (c >>> 12 & 0x3f); + buf[i++] = 0x80 | (c >>> 6 & 0x3f); + buf[i++] = 0x80 | (c & 0x3f); + } + } + + return buf; +}; + +// Calculate max possible position in utf8 buffer, +// that will not break sequence. If that's not possible +// - (very small limits) return max size as is. +// +// buf[] - utf8 bytes array +// max - length limit (mandatory); +var utf8border = function(buf, max) { + var pos; + + max = max || buf.length; + if (max > buf.length) { max = buf.length; } + + // go back from last position, until start of sequence found + pos = max-1; + while (pos >= 0 && (buf[pos] & 0xC0) === 0x80) { pos--; } + + // Fuckup - very small and broken sequence, + // return max, because we should return something anyway. + if (pos < 0) { return max; } + + // If we came to start of buffer - that means vuffer is too small, + // return max too. + if (pos === 0) { return max; } + + return (pos + _utf8len[buf[pos]] > max) ? pos : max; +}; + +// convert array to string +var buf2string = function (buf) { + var str, i, out, c, c_len; + var len = buf.length; + + // Reserve max possible length (2 words per char) + // NB: by unknown reasons, Array is significantly faster for + // String.fromCharCode.apply than Uint16Array. + var utf16buf = new Array(len*2); + + for (out=0, i=0; i 4) { utf16buf[out++] = 0xfffd; i += c_len-1; continue; } + + // apply mask on first byte + c &= c_len === 2 ? 0x1f : c_len === 3 ? 0x0f : 0x07; + // join the rest + while (c_len > 1 && i < len) { + c = (c << 6) | (buf[i++] & 0x3f); + c_len--; + } + + // terminated by end of string? + if (c_len > 1) { utf16buf[out++] = 0xfffd; continue; } + + if (c < 0x10000) { + utf16buf[out++] = c; + } else { + c -= 0x10000; + utf16buf[out++] = 0xd800 | ((c >> 10) & 0x3ff); + utf16buf[out++] = 0xdc00 | (c & 0x3ff); + } + } + + // shrinkBuf(utf16buf, out) + if (utf16buf.length !== out) { + if(utf16buf.subarray) { + utf16buf = utf16buf.subarray(0, out); + } else { + utf16buf.length = out; + } + } + + // return String.fromCharCode.apply(null, utf16buf); + return utils.applyFromCharCode(utf16buf); +}; + + +// That's all for the pako functions. + + +/** + * Transform a javascript string into an array (typed if possible) of bytes, + * UTF-8 encoded. + * @param {String} str the string to encode + * @return {Array|Uint8Array|Buffer} the UTF-8 encoded string. + */ +exports.utf8encode = function utf8encode(str) { + if (support.nodebuffer) { + return nodejsUtils.newBufferFrom(str, "utf-8"); + } + + return string2buf(str); +}; + + +/** + * Transform a bytes array (or a representation) representing an UTF-8 encoded + * string into a javascript string. + * @param {Array|Uint8Array|Buffer} buf the data de decode + * @return {String} the decoded string. + */ +exports.utf8decode = function utf8decode(buf) { + if (support.nodebuffer) { + return utils.transformTo("nodebuffer", buf).toString("utf-8"); + } + + buf = utils.transformTo(support.uint8array ? "uint8array" : "array", buf); + + return buf2string(buf); +}; + +/** + * A worker to decode utf8 encoded binary chunks into string chunks. + * @constructor + */ +function Utf8DecodeWorker() { + GenericWorker.call(this, "utf-8 decode"); + // the last bytes if a chunk didn't end with a complete codepoint. + this.leftOver = null; +} +utils.inherits(Utf8DecodeWorker, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +Utf8DecodeWorker.prototype.processChunk = function (chunk) { + + var data = utils.transformTo(support.uint8array ? "uint8array" : "array", chunk.data); + + // 1st step, re-use what's left of the previous chunk + if (this.leftOver && this.leftOver.length) { + if(support.uint8array) { + var previousData = data; + data = new Uint8Array(previousData.length + this.leftOver.length); + data.set(this.leftOver, 0); + data.set(previousData, this.leftOver.length); + } else { + data = this.leftOver.concat(data); + } + this.leftOver = null; + } + + var nextBoundary = utf8border(data); + var usableData = data; + if (nextBoundary !== data.length) { + if (support.uint8array) { + usableData = data.subarray(0, nextBoundary); + this.leftOver = data.subarray(nextBoundary, data.length); + } else { + usableData = data.slice(0, nextBoundary); + this.leftOver = data.slice(nextBoundary, data.length); + } + } + + this.push({ + data : exports.utf8decode(usableData), + meta : chunk.meta + }); +}; + +/** + * @see GenericWorker.flush + */ +Utf8DecodeWorker.prototype.flush = function () { + if(this.leftOver && this.leftOver.length) { + this.push({ + data : exports.utf8decode(this.leftOver), + meta : {} + }); + this.leftOver = null; + } +}; +exports.Utf8DecodeWorker = Utf8DecodeWorker; + +/** + * A worker to endcode string chunks into utf8 encoded binary chunks. + * @constructor + */ +function Utf8EncodeWorker() { + GenericWorker.call(this, "utf-8 encode"); +} +utils.inherits(Utf8EncodeWorker, GenericWorker); + +/** + * @see GenericWorker.processChunk + */ +Utf8EncodeWorker.prototype.processChunk = function (chunk) { + this.push({ + data : exports.utf8encode(chunk.data), + meta : chunk.meta + }); +}; +exports.Utf8EncodeWorker = Utf8EncodeWorker; + +},{"./nodejsUtils":14,"./stream/GenericWorker":28,"./support":30,"./utils":32}],32:[function(require,module,exports){ +'use strict'; + +var support = require('./support'); +var base64 = require('./base64'); +var nodejsUtils = require('./nodejsUtils'); +var setImmediate = require('set-immediate-shim'); +var external = require("./external"); + + +/** + * Convert a string that pass as a "binary string": it should represent a byte + * array but may have > 255 char codes. Be sure to take only the first byte + * and returns the byte array. + * @param {String} str the string to transform. + * @return {Array|Uint8Array} the string in a binary format. + */ +function string2binary(str) { + var result = null; + if (support.uint8array) { + result = new Uint8Array(str.length); + } else { + result = new Array(str.length); + } + return stringToArrayLike(str, result); +} + +/** + * Create a new blob with the given content and the given type. + * @param {String|ArrayBuffer} part the content to put in the blob. DO NOT use + * an Uint8Array because the stock browser of android 4 won't accept it (it + * will be silently converted to a string, "[object Uint8Array]"). + * + * Use only ONE part to build the blob to avoid a memory leak in IE11 / Edge: + * when a large amount of Array is used to create the Blob, the amount of + * memory consumed is nearly 100 times the original data amount. + * + * @param {String} type the mime type of the blob. + * @return {Blob} the created blob. + */ +exports.newBlob = function(part, type) { + exports.checkSupport("blob"); + + try { + // Blob constructor + return new Blob([part], { + type: type + }); + } + catch (e) { + + try { + // deprecated, browser only, old way + var Builder = self.BlobBuilder || self.WebKitBlobBuilder || self.MozBlobBuilder || self.MSBlobBuilder; + var builder = new Builder(); + builder.append(part); + return builder.getBlob(type); + } + catch (e) { + + // well, fuck ?! + throw new Error("Bug : can't construct the Blob."); + } + } + + +}; +/** + * The identity function. + * @param {Object} input the input. + * @return {Object} the same input. + */ +function identity(input) { + return input; +} + +/** + * Fill in an array with a string. + * @param {String} str the string to use. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} array the array to fill in (will be mutated). + * @return {Array|ArrayBuffer|Uint8Array|Buffer} the updated array. + */ +function stringToArrayLike(str, array) { + for (var i = 0; i < str.length; ++i) { + array[i] = str.charCodeAt(i) & 0xFF; + } + return array; +} + +/** + * An helper for the function arrayLikeToString. + * This contains static information and functions that + * can be optimized by the browser JIT compiler. + */ +var arrayToStringHelper = { + /** + * Transform an array of int into a string, chunk by chunk. + * See the performances notes on arrayLikeToString. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} array the array to transform. + * @param {String} type the type of the array. + * @param {Integer} chunk the chunk size. + * @return {String} the resulting string. + * @throws Error if the chunk is too big for the stack. + */ + stringifyByChunk: function(array, type, chunk) { + var result = [], k = 0, len = array.length; + // shortcut + if (len <= chunk) { + return String.fromCharCode.apply(null, array); + } + while (k < len) { + if (type === "array" || type === "nodebuffer") { + result.push(String.fromCharCode.apply(null, array.slice(k, Math.min(k + chunk, len)))); + } + else { + result.push(String.fromCharCode.apply(null, array.subarray(k, Math.min(k + chunk, len)))); + } + k += chunk; + } + return result.join(""); + }, + /** + * Call String.fromCharCode on every item in the array. + * This is the naive implementation, which generate A LOT of intermediate string. + * This should be used when everything else fail. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} array the array to transform. + * @return {String} the result. + */ + stringifyByChar: function(array){ + var resultStr = ""; + for(var i = 0; i < array.length; i++) { + resultStr += String.fromCharCode(array[i]); + } + return resultStr; + }, + applyCanBeUsed : { + /** + * true if the browser accepts to use String.fromCharCode on Uint8Array + */ + uint8array : (function () { + try { + return support.uint8array && String.fromCharCode.apply(null, new Uint8Array(1)).length === 1; + } catch (e) { + return false; + } + })(), + /** + * true if the browser accepts to use String.fromCharCode on nodejs Buffer. + */ + nodebuffer : (function () { + try { + return support.nodebuffer && String.fromCharCode.apply(null, nodejsUtils.allocBuffer(1)).length === 1; + } catch (e) { + return false; + } + })() + } +}; + +/** + * Transform an array-like object to a string. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} array the array to transform. + * @return {String} the result. + */ +function arrayLikeToString(array) { + // Performances notes : + // -------------------- + // String.fromCharCode.apply(null, array) is the fastest, see + // see http://jsperf.com/converting-a-uint8array-to-a-string/2 + // but the stack is limited (and we can get huge arrays !). + // + // result += String.fromCharCode(array[i]); generate too many strings ! + // + // This code is inspired by http://jsperf.com/arraybuffer-to-string-apply-performance/2 + // TODO : we now have workers that split the work. Do we still need that ? + var chunk = 65536, + type = exports.getTypeOf(array), + canUseApply = true; + if (type === "uint8array") { + canUseApply = arrayToStringHelper.applyCanBeUsed.uint8array; + } else if (type === "nodebuffer") { + canUseApply = arrayToStringHelper.applyCanBeUsed.nodebuffer; + } + + if (canUseApply) { + while (chunk > 1) { + try { + return arrayToStringHelper.stringifyByChunk(array, type, chunk); + } catch (e) { + chunk = Math.floor(chunk / 2); + } + } + } + + // no apply or chunk error : slow and painful algorithm + // default browser on android 4.* + return arrayToStringHelper.stringifyByChar(array); +} + +exports.applyFromCharCode = arrayLikeToString; + + +/** + * Copy the data from an array-like to an other array-like. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} arrayFrom the origin array. + * @param {Array|ArrayBuffer|Uint8Array|Buffer} arrayTo the destination array which will be mutated. + * @return {Array|ArrayBuffer|Uint8Array|Buffer} the updated destination array. + */ +function arrayLikeToArrayLike(arrayFrom, arrayTo) { + for (var i = 0; i < arrayFrom.length; i++) { + arrayTo[i] = arrayFrom[i]; + } + return arrayTo; +} + +// a matrix containing functions to transform everything into everything. +var transform = {}; + +// string to ? +transform["string"] = { + "string": identity, + "array": function(input) { + return stringToArrayLike(input, new Array(input.length)); + }, + "arraybuffer": function(input) { + return transform["string"]["uint8array"](input).buffer; + }, + "uint8array": function(input) { + return stringToArrayLike(input, new Uint8Array(input.length)); + }, + "nodebuffer": function(input) { + return stringToArrayLike(input, nodejsUtils.allocBuffer(input.length)); + } +}; + +// array to ? +transform["array"] = { + "string": arrayLikeToString, + "array": identity, + "arraybuffer": function(input) { + return (new Uint8Array(input)).buffer; + }, + "uint8array": function(input) { + return new Uint8Array(input); + }, + "nodebuffer": function(input) { + return nodejsUtils.newBufferFrom(input); + } +}; + +// arraybuffer to ? +transform["arraybuffer"] = { + "string": function(input) { + return arrayLikeToString(new Uint8Array(input)); + }, + "array": function(input) { + return arrayLikeToArrayLike(new Uint8Array(input), new Array(input.byteLength)); + }, + "arraybuffer": identity, + "uint8array": function(input) { + return new Uint8Array(input); + }, + "nodebuffer": function(input) { + return nodejsUtils.newBufferFrom(new Uint8Array(input)); + } +}; + +// uint8array to ? +transform["uint8array"] = { + "string": arrayLikeToString, + "array": function(input) { + return arrayLikeToArrayLike(input, new Array(input.length)); + }, + "arraybuffer": function(input) { + return input.buffer; + }, + "uint8array": identity, + "nodebuffer": function(input) { + return nodejsUtils.newBufferFrom(input); + } +}; + +// nodebuffer to ? +transform["nodebuffer"] = { + "string": arrayLikeToString, + "array": function(input) { + return arrayLikeToArrayLike(input, new Array(input.length)); + }, + "arraybuffer": function(input) { + return transform["nodebuffer"]["uint8array"](input).buffer; + }, + "uint8array": function(input) { + return arrayLikeToArrayLike(input, new Uint8Array(input.length)); + }, + "nodebuffer": identity +}; + +/** + * Transform an input into any type. + * The supported output type are : string, array, uint8array, arraybuffer, nodebuffer. + * If no output type is specified, the unmodified input will be returned. + * @param {String} outputType the output type. + * @param {String|Array|ArrayBuffer|Uint8Array|Buffer} input the input to convert. + * @throws {Error} an Error if the browser doesn't support the requested output type. + */ +exports.transformTo = function(outputType, input) { + if (!input) { + // undefined, null, etc + // an empty string won't harm. + input = ""; + } + if (!outputType) { + return input; + } + exports.checkSupport(outputType); + var inputType = exports.getTypeOf(input); + var result = transform[inputType][outputType](input); + return result; +}; + +/** + * Return the type of the input. + * The type will be in a format valid for JSZip.utils.transformTo : string, array, uint8array, arraybuffer. + * @param {Object} input the input to identify. + * @return {String} the (lowercase) type of the input. + */ +exports.getTypeOf = function(input) { + if (typeof input === "string") { + return "string"; + } + if (Object.prototype.toString.call(input) === "[object Array]") { + return "array"; + } + if (support.nodebuffer && nodejsUtils.isBuffer(input)) { + return "nodebuffer"; + } + if (support.uint8array && input instanceof Uint8Array) { + return "uint8array"; + } + if (support.arraybuffer && input instanceof ArrayBuffer) { + return "arraybuffer"; + } +}; + +/** + * Throw an exception if the type is not supported. + * @param {String} type the type to check. + * @throws {Error} an Error if the browser doesn't support the requested type. + */ +exports.checkSupport = function(type) { + var supported = support[type.toLowerCase()]; + if (!supported) { + throw new Error(type + " is not supported by this platform"); + } +}; + +exports.MAX_VALUE_16BITS = 65535; +exports.MAX_VALUE_32BITS = -1; // well, "\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF" is parsed as -1 + +/** + * Prettify a string read as binary. + * @param {string} str the string to prettify. + * @return {string} a pretty string. + */ +exports.pretty = function(str) { + var res = '', + code, i; + for (i = 0; i < (str || "").length; i++) { + code = str.charCodeAt(i); + res += '\\x' + (code < 16 ? "0" : "") + code.toString(16).toUpperCase(); + } + return res; +}; + +/** + * Defer the call of a function. + * @param {Function} callback the function to call asynchronously. + * @param {Array} args the arguments to give to the callback. + */ +exports.delay = function(callback, args, self) { + setImmediate(function () { + callback.apply(self || null, args || []); + }); +}; + +/** + * Extends a prototype with an other, without calling a constructor with + * side effects. Inspired by nodejs' `utils.inherits` + * @param {Function} ctor the constructor to augment + * @param {Function} superCtor the parent constructor to use + */ +exports.inherits = function (ctor, superCtor) { + var Obj = function() {}; + Obj.prototype = superCtor.prototype; + ctor.prototype = new Obj(); +}; + +/** + * Merge the objects passed as parameters into a new one. + * @private + * @param {...Object} var_args All objects to merge. + * @return {Object} a new object with the data of the others. + */ +exports.extend = function() { + var result = {}, i, attr; + for (i = 0; i < arguments.length; i++) { // arguments is not enumerable in some browsers + for (attr in arguments[i]) { + if (arguments[i].hasOwnProperty(attr) && typeof result[attr] === "undefined") { + result[attr] = arguments[i][attr]; + } + } + } + return result; +}; + +/** + * Transform arbitrary content into a Promise. + * @param {String} name a name for the content being processed. + * @param {Object} inputData the content to process. + * @param {Boolean} isBinary true if the content is not an unicode string + * @param {Boolean} isOptimizedBinaryString true if the string content only has one byte per character. + * @param {Boolean} isBase64 true if the string content is encoded with base64. + * @return {Promise} a promise in a format usable by JSZip. + */ +exports.prepareContent = function(name, inputData, isBinary, isOptimizedBinaryString, isBase64) { + + // if inputData is already a promise, this flatten it. + var promise = external.Promise.resolve(inputData).then(function(data) { + + + var isBlob = support.blob && (data instanceof Blob || ['[object File]', '[object Blob]'].indexOf(Object.prototype.toString.call(data)) !== -1); + + if (isBlob && typeof FileReader !== "undefined") { + return new external.Promise(function (resolve, reject) { + var reader = new FileReader(); + + reader.onload = function(e) { + resolve(e.target.result); + }; + reader.onerror = function(e) { + reject(e.target.error); + }; + reader.readAsArrayBuffer(data); + }); + } else { + return data; + } + }); + + return promise.then(function(data) { + var dataType = exports.getTypeOf(data); + + if (!dataType) { + return external.Promise.reject( + new Error("Can't read the data of '" + name + "'. Is it " + + "in a supported JavaScript type (String, Blob, ArrayBuffer, etc) ?") + ); + } + // special case : it's way easier to work with Uint8Array than with ArrayBuffer + if (dataType === "arraybuffer") { + data = exports.transformTo("uint8array", data); + } else if (dataType === "string") { + if (isBase64) { + data = base64.decode(data); + } + else if (isBinary) { + // optimizedBinaryString === true means that the file has already been filtered with a 0xFF mask + if (isOptimizedBinaryString !== true) { + // this is a string, not in a base64 format. + // Be sure that this is a correct "binary string" + data = string2binary(data); + } + } + } + return data; + }); +}; + +},{"./base64":1,"./external":6,"./nodejsUtils":14,"./support":30,"set-immediate-shim":54}],33:[function(require,module,exports){ +'use strict'; +var readerFor = require('./reader/readerFor'); +var utils = require('./utils'); +var sig = require('./signature'); +var ZipEntry = require('./zipEntry'); +var utf8 = require('./utf8'); +var support = require('./support'); +// class ZipEntries {{{ +/** + * All the entries in the zip file. + * @constructor + * @param {Object} loadOptions Options for loading the stream. + */ +function ZipEntries(loadOptions) { + this.files = []; + this.loadOptions = loadOptions; +} +ZipEntries.prototype = { + /** + * Check that the reader is on the specified signature. + * @param {string} expectedSignature the expected signature. + * @throws {Error} if it is an other signature. + */ + checkSignature: function(expectedSignature) { + if (!this.reader.readAndCheckSignature(expectedSignature)) { + this.reader.index -= 4; + var signature = this.reader.readString(4); + throw new Error("Corrupted zip or bug: unexpected signature " + "(" + utils.pretty(signature) + ", expected " + utils.pretty(expectedSignature) + ")"); + } + }, + /** + * Check if the given signature is at the given index. + * @param {number} askedIndex the index to check. + * @param {string} expectedSignature the signature to expect. + * @return {boolean} true if the signature is here, false otherwise. + */ + isSignature: function(askedIndex, expectedSignature) { + var currentIndex = this.reader.index; + this.reader.setIndex(askedIndex); + var signature = this.reader.readString(4); + var result = signature === expectedSignature; + this.reader.setIndex(currentIndex); + return result; + }, + /** + * Read the end of the central directory. + */ + readBlockEndOfCentral: function() { + this.diskNumber = this.reader.readInt(2); + this.diskWithCentralDirStart = this.reader.readInt(2); + this.centralDirRecordsOnThisDisk = this.reader.readInt(2); + this.centralDirRecords = this.reader.readInt(2); + this.centralDirSize = this.reader.readInt(4); + this.centralDirOffset = this.reader.readInt(4); + + this.zipCommentLength = this.reader.readInt(2); + // warning : the encoding depends of the system locale + // On a linux machine with LANG=en_US.utf8, this field is utf8 encoded. + // On a windows machine, this field is encoded with the localized windows code page. + var zipComment = this.reader.readData(this.zipCommentLength); + var decodeParamType = support.uint8array ? "uint8array" : "array"; + // To get consistent behavior with the generation part, we will assume that + // this is utf8 encoded unless specified otherwise. + var decodeContent = utils.transformTo(decodeParamType, zipComment); + this.zipComment = this.loadOptions.decodeFileName(decodeContent); + }, + /** + * Read the end of the Zip 64 central directory. + * Not merged with the method readEndOfCentral : + * The end of central can coexist with its Zip64 brother, + * I don't want to read the wrong number of bytes ! + */ + readBlockZip64EndOfCentral: function() { + this.zip64EndOfCentralSize = this.reader.readInt(8); + this.reader.skip(4); + // this.versionMadeBy = this.reader.readString(2); + // this.versionNeeded = this.reader.readInt(2); + this.diskNumber = this.reader.readInt(4); + this.diskWithCentralDirStart = this.reader.readInt(4); + this.centralDirRecordsOnThisDisk = this.reader.readInt(8); + this.centralDirRecords = this.reader.readInt(8); + this.centralDirSize = this.reader.readInt(8); + this.centralDirOffset = this.reader.readInt(8); + + this.zip64ExtensibleData = {}; + var extraDataSize = this.zip64EndOfCentralSize - 44, + index = 0, + extraFieldId, + extraFieldLength, + extraFieldValue; + while (index < extraDataSize) { + extraFieldId = this.reader.readInt(2); + extraFieldLength = this.reader.readInt(4); + extraFieldValue = this.reader.readData(extraFieldLength); + this.zip64ExtensibleData[extraFieldId] = { + id: extraFieldId, + length: extraFieldLength, + value: extraFieldValue + }; + } + }, + /** + * Read the end of the Zip 64 central directory locator. + */ + readBlockZip64EndOfCentralLocator: function() { + this.diskWithZip64CentralDirStart = this.reader.readInt(4); + this.relativeOffsetEndOfZip64CentralDir = this.reader.readInt(8); + this.disksCount = this.reader.readInt(4); + if (this.disksCount > 1) { + throw new Error("Multi-volumes zip are not supported"); + } + }, + /** + * Read the local files, based on the offset read in the central part. + */ + readLocalFiles: function() { + var i, file; + for (i = 0; i < this.files.length; i++) { + file = this.files[i]; + this.reader.setIndex(file.localHeaderOffset); + this.checkSignature(sig.LOCAL_FILE_HEADER); + file.readLocalPart(this.reader); + file.handleUTF8(); + file.processAttributes(); + } + }, + /** + * Read the central directory. + */ + readCentralDir: function() { + var file; + + this.reader.setIndex(this.centralDirOffset); + while (this.reader.readAndCheckSignature(sig.CENTRAL_FILE_HEADER)) { + file = new ZipEntry({ + zip64: this.zip64 + }, this.loadOptions); + file.readCentralPart(this.reader); + this.files.push(file); + } + + if (this.centralDirRecords !== this.files.length) { + if (this.centralDirRecords !== 0 && this.files.length === 0) { + // We expected some records but couldn't find ANY. + // This is really suspicious, as if something went wrong. + throw new Error("Corrupted zip or bug: expected " + this.centralDirRecords + " records in central dir, got " + this.files.length); + } else { + // We found some records but not all. + // Something is wrong but we got something for the user: no error here. + // console.warn("expected", this.centralDirRecords, "records in central dir, got", this.files.length); + } + } + }, + /** + * Read the end of central directory. + */ + readEndOfCentral: function() { + var offset = this.reader.lastIndexOfSignature(sig.CENTRAL_DIRECTORY_END); + if (offset < 0) { + // Check if the content is a truncated zip or complete garbage. + // A "LOCAL_FILE_HEADER" is not required at the beginning (auto + // extractible zip for example) but it can give a good hint. + // If an ajax request was used without responseType, we will also + // get unreadable data. + var isGarbage = !this.isSignature(0, sig.LOCAL_FILE_HEADER); + + if (isGarbage) { + throw new Error("Can't find end of central directory : is this a zip file ? " + + "If it is, see https://stuk.github.io/jszip/documentation/howto/read_zip.html"); + } else { + throw new Error("Corrupted zip: can't find end of central directory"); + } + + } + this.reader.setIndex(offset); + var endOfCentralDirOffset = offset; + this.checkSignature(sig.CENTRAL_DIRECTORY_END); + this.readBlockEndOfCentral(); + + + /* extract from the zip spec : + 4) If one of the fields in the end of central directory + record is too small to hold required data, the field + should be set to -1 (0xFFFF or 0xFFFFFFFF) and the + ZIP64 format record should be created. + 5) The end of central directory record and the + Zip64 end of central directory locator record must + reside on the same disk when splitting or spanning + an archive. + */ + if (this.diskNumber === utils.MAX_VALUE_16BITS || this.diskWithCentralDirStart === utils.MAX_VALUE_16BITS || this.centralDirRecordsOnThisDisk === utils.MAX_VALUE_16BITS || this.centralDirRecords === utils.MAX_VALUE_16BITS || this.centralDirSize === utils.MAX_VALUE_32BITS || this.centralDirOffset === utils.MAX_VALUE_32BITS) { + this.zip64 = true; + + /* + Warning : the zip64 extension is supported, but ONLY if the 64bits integer read from + the zip file can fit into a 32bits integer. This cannot be solved : JavaScript represents + all numbers as 64-bit double precision IEEE 754 floating point numbers. + So, we have 53bits for integers and bitwise operations treat everything as 32bits. + see https://developer.mozilla.org/en-US/docs/JavaScript/Reference/Operators/Bitwise_Operators + and http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-262.pdf section 8.5 + */ + + // should look for a zip64 EOCD locator + offset = this.reader.lastIndexOfSignature(sig.ZIP64_CENTRAL_DIRECTORY_LOCATOR); + if (offset < 0) { + throw new Error("Corrupted zip: can't find the ZIP64 end of central directory locator"); + } + this.reader.setIndex(offset); + this.checkSignature(sig.ZIP64_CENTRAL_DIRECTORY_LOCATOR); + this.readBlockZip64EndOfCentralLocator(); + + // now the zip64 EOCD record + if (!this.isSignature(this.relativeOffsetEndOfZip64CentralDir, sig.ZIP64_CENTRAL_DIRECTORY_END)) { + // console.warn("ZIP64 end of central directory not where expected."); + this.relativeOffsetEndOfZip64CentralDir = this.reader.lastIndexOfSignature(sig.ZIP64_CENTRAL_DIRECTORY_END); + if (this.relativeOffsetEndOfZip64CentralDir < 0) { + throw new Error("Corrupted zip: can't find the ZIP64 end of central directory"); + } + } + this.reader.setIndex(this.relativeOffsetEndOfZip64CentralDir); + this.checkSignature(sig.ZIP64_CENTRAL_DIRECTORY_END); + this.readBlockZip64EndOfCentral(); + } + + var expectedEndOfCentralDirOffset = this.centralDirOffset + this.centralDirSize; + if (this.zip64) { + expectedEndOfCentralDirOffset += 20; // end of central dir 64 locator + expectedEndOfCentralDirOffset += 12 /* should not include the leading 12 bytes */ + this.zip64EndOfCentralSize; + } + + var extraBytes = endOfCentralDirOffset - expectedEndOfCentralDirOffset; + + if (extraBytes > 0) { + // console.warn(extraBytes, "extra bytes at beginning or within zipfile"); + if (this.isSignature(endOfCentralDirOffset, sig.CENTRAL_FILE_HEADER)) { + // The offsets seem wrong, but we have something at the specified offset. + // So… we keep it. + } else { + // the offset is wrong, update the "zero" of the reader + // this happens if data has been prepended (crx files for example) + this.reader.zero = extraBytes; + } + } else if (extraBytes < 0) { + throw new Error("Corrupted zip: missing " + Math.abs(extraBytes) + " bytes."); + } + }, + prepareReader: function(data) { + this.reader = readerFor(data); + }, + /** + * Read a zip file and create ZipEntries. + * @param {String|ArrayBuffer|Uint8Array|Buffer} data the binary string representing a zip file. + */ + load: function(data) { + this.prepareReader(data); + this.readEndOfCentral(); + this.readCentralDir(); + this.readLocalFiles(); + } +}; +// }}} end of ZipEntries +module.exports = ZipEntries; + +},{"./reader/readerFor":22,"./signature":23,"./support":30,"./utf8":31,"./utils":32,"./zipEntry":34}],34:[function(require,module,exports){ +'use strict'; +var readerFor = require('./reader/readerFor'); +var utils = require('./utils'); +var CompressedObject = require('./compressedObject'); +var crc32fn = require('./crc32'); +var utf8 = require('./utf8'); +var compressions = require('./compressions'); +var support = require('./support'); + +var MADE_BY_DOS = 0x00; +var MADE_BY_UNIX = 0x03; + +/** + * Find a compression registered in JSZip. + * @param {string} compressionMethod the method magic to find. + * @return {Object|null} the JSZip compression object, null if none found. + */ +var findCompression = function(compressionMethod) { + for (var method in compressions) { + if (!compressions.hasOwnProperty(method)) { + continue; + } + if (compressions[method].magic === compressionMethod) { + return compressions[method]; + } + } + return null; +}; + +// class ZipEntry {{{ +/** + * An entry in the zip file. + * @constructor + * @param {Object} options Options of the current file. + * @param {Object} loadOptions Options for loading the stream. + */ +function ZipEntry(options, loadOptions) { + this.options = options; + this.loadOptions = loadOptions; +} +ZipEntry.prototype = { + /** + * say if the file is encrypted. + * @return {boolean} true if the file is encrypted, false otherwise. + */ + isEncrypted: function() { + // bit 1 is set + return (this.bitFlag & 0x0001) === 0x0001; + }, + /** + * say if the file has utf-8 filename/comment. + * @return {boolean} true if the filename/comment is in utf-8, false otherwise. + */ + useUTF8: function() { + // bit 11 is set + return (this.bitFlag & 0x0800) === 0x0800; + }, + /** + * Read the local part of a zip file and add the info in this object. + * @param {DataReader} reader the reader to use. + */ + readLocalPart: function(reader) { + var compression, localExtraFieldsLength; + + // we already know everything from the central dir ! + // If the central dir data are false, we are doomed. + // On the bright side, the local part is scary : zip64, data descriptors, both, etc. + // The less data we get here, the more reliable this should be. + // Let's skip the whole header and dash to the data ! + reader.skip(22); + // in some zip created on windows, the filename stored in the central dir contains \ instead of /. + // Strangely, the filename here is OK. + // I would love to treat these zip files as corrupted (see http://www.info-zip.org/FAQ.html#backslashes + // or APPNOTE#4.4.17.1, "All slashes MUST be forward slashes '/'") but there are a lot of bad zip generators... + // Search "unzip mismatching "local" filename continuing with "central" filename version" on + // the internet. + // + // I think I see the logic here : the central directory is used to display + // content and the local directory is used to extract the files. Mixing / and \ + // may be used to display \ to windows users and use / when extracting the files. + // Unfortunately, this lead also to some issues : http://seclists.org/fulldisclosure/2009/Sep/394 + this.fileNameLength = reader.readInt(2); + localExtraFieldsLength = reader.readInt(2); // can't be sure this will be the same as the central dir + // the fileName is stored as binary data, the handleUTF8 method will take care of the encoding. + this.fileName = reader.readData(this.fileNameLength); + reader.skip(localExtraFieldsLength); + + if (this.compressedSize === -1 || this.uncompressedSize === -1) { + throw new Error("Bug or corrupted zip : didn't get enough information from the central directory " + "(compressedSize === -1 || uncompressedSize === -1)"); + } + + compression = findCompression(this.compressionMethod); + if (compression === null) { // no compression found + throw new Error("Corrupted zip : compression " + utils.pretty(this.compressionMethod) + " unknown (inner file : " + utils.transformTo("string", this.fileName) + ")"); + } + this.decompressed = new CompressedObject(this.compressedSize, this.uncompressedSize, this.crc32, compression, reader.readData(this.compressedSize)); + }, + + /** + * Read the central part of a zip file and add the info in this object. + * @param {DataReader} reader the reader to use. + */ + readCentralPart: function(reader) { + this.versionMadeBy = reader.readInt(2); + reader.skip(2); + // this.versionNeeded = reader.readInt(2); + this.bitFlag = reader.readInt(2); + this.compressionMethod = reader.readString(2); + this.date = reader.readDate(); + this.crc32 = reader.readInt(4); + this.compressedSize = reader.readInt(4); + this.uncompressedSize = reader.readInt(4); + var fileNameLength = reader.readInt(2); + this.extraFieldsLength = reader.readInt(2); + this.fileCommentLength = reader.readInt(2); + this.diskNumberStart = reader.readInt(2); + this.internalFileAttributes = reader.readInt(2); + this.externalFileAttributes = reader.readInt(4); + this.localHeaderOffset = reader.readInt(4); + + if (this.isEncrypted()) { + throw new Error("Encrypted zip are not supported"); + } + + // will be read in the local part, see the comments there + reader.skip(fileNameLength); + this.readExtraFields(reader); + this.parseZIP64ExtraField(reader); + this.fileComment = reader.readData(this.fileCommentLength); + }, + + /** + * Parse the external file attributes and get the unix/dos permissions. + */ + processAttributes: function () { + this.unixPermissions = null; + this.dosPermissions = null; + var madeBy = this.versionMadeBy >> 8; + + // Check if we have the DOS directory flag set. + // We look for it in the DOS and UNIX permissions + // but some unknown platform could set it as a compatibility flag. + this.dir = this.externalFileAttributes & 0x0010 ? true : false; + + if(madeBy === MADE_BY_DOS) { + // first 6 bits (0 to 5) + this.dosPermissions = this.externalFileAttributes & 0x3F; + } + + if(madeBy === MADE_BY_UNIX) { + this.unixPermissions = (this.externalFileAttributes >> 16) & 0xFFFF; + // the octal permissions are in (this.unixPermissions & 0x01FF).toString(8); + } + + // fail safe : if the name ends with a / it probably means a folder + if (!this.dir && this.fileNameStr.slice(-1) === '/') { + this.dir = true; + } + }, + + /** + * Parse the ZIP64 extra field and merge the info in the current ZipEntry. + * @param {DataReader} reader the reader to use. + */ + parseZIP64ExtraField: function(reader) { + + if (!this.extraFields[0x0001]) { + return; + } + + // should be something, preparing the extra reader + var extraReader = readerFor(this.extraFields[0x0001].value); + + // I really hope that these 64bits integer can fit in 32 bits integer, because js + // won't let us have more. + if (this.uncompressedSize === utils.MAX_VALUE_32BITS) { + this.uncompressedSize = extraReader.readInt(8); + } + if (this.compressedSize === utils.MAX_VALUE_32BITS) { + this.compressedSize = extraReader.readInt(8); + } + if (this.localHeaderOffset === utils.MAX_VALUE_32BITS) { + this.localHeaderOffset = extraReader.readInt(8); + } + if (this.diskNumberStart === utils.MAX_VALUE_32BITS) { + this.diskNumberStart = extraReader.readInt(4); + } + }, + /** + * Read the central part of a zip file and add the info in this object. + * @param {DataReader} reader the reader to use. + */ + readExtraFields: function(reader) { + var end = reader.index + this.extraFieldsLength, + extraFieldId, + extraFieldLength, + extraFieldValue; + + if (!this.extraFields) { + this.extraFields = {}; + } + + while (reader.index + 4 < end) { + extraFieldId = reader.readInt(2); + extraFieldLength = reader.readInt(2); + extraFieldValue = reader.readData(extraFieldLength); + + this.extraFields[extraFieldId] = { + id: extraFieldId, + length: extraFieldLength, + value: extraFieldValue + }; + } + + reader.setIndex(end); + }, + /** + * Apply an UTF8 transformation if needed. + */ + handleUTF8: function() { + var decodeParamType = support.uint8array ? "uint8array" : "array"; + if (this.useUTF8()) { + this.fileNameStr = utf8.utf8decode(this.fileName); + this.fileCommentStr = utf8.utf8decode(this.fileComment); + } else { + var upath = this.findExtraFieldUnicodePath(); + if (upath !== null) { + this.fileNameStr = upath; + } else { + // ASCII text or unsupported code page + var fileNameByteArray = utils.transformTo(decodeParamType, this.fileName); + this.fileNameStr = this.loadOptions.decodeFileName(fileNameByteArray); + } + + var ucomment = this.findExtraFieldUnicodeComment(); + if (ucomment !== null) { + this.fileCommentStr = ucomment; + } else { + // ASCII text or unsupported code page + var commentByteArray = utils.transformTo(decodeParamType, this.fileComment); + this.fileCommentStr = this.loadOptions.decodeFileName(commentByteArray); + } + } + }, + + /** + * Find the unicode path declared in the extra field, if any. + * @return {String} the unicode path, null otherwise. + */ + findExtraFieldUnicodePath: function() { + var upathField = this.extraFields[0x7075]; + if (upathField) { + var extraReader = readerFor(upathField.value); + + // wrong version + if (extraReader.readInt(1) !== 1) { + return null; + } + + // the crc of the filename changed, this field is out of date. + if (crc32fn(this.fileName) !== extraReader.readInt(4)) { + return null; + } + + return utf8.utf8decode(extraReader.readData(upathField.length - 5)); + } + return null; + }, + + /** + * Find the unicode comment declared in the extra field, if any. + * @return {String} the unicode comment, null otherwise. + */ + findExtraFieldUnicodeComment: function() { + var ucommentField = this.extraFields[0x6375]; + if (ucommentField) { + var extraReader = readerFor(ucommentField.value); + + // wrong version + if (extraReader.readInt(1) !== 1) { + return null; + } + + // the crc of the comment changed, this field is out of date. + if (crc32fn(this.fileComment) !== extraReader.readInt(4)) { + return null; + } + + return utf8.utf8decode(extraReader.readData(ucommentField.length - 5)); + } + return null; + } +}; +module.exports = ZipEntry; + +},{"./compressedObject":2,"./compressions":3,"./crc32":4,"./reader/readerFor":22,"./support":30,"./utf8":31,"./utils":32}],35:[function(require,module,exports){ +'use strict'; + +var StreamHelper = require('./stream/StreamHelper'); +var DataWorker = require('./stream/DataWorker'); +var utf8 = require('./utf8'); +var CompressedObject = require('./compressedObject'); +var GenericWorker = require('./stream/GenericWorker'); + +/** + * A simple object representing a file in the zip file. + * @constructor + * @param {string} name the name of the file + * @param {String|ArrayBuffer|Uint8Array|Buffer} data the data + * @param {Object} options the options of the file + */ +var ZipObject = function(name, data, options) { + this.name = name; + this.dir = options.dir; + this.date = options.date; + this.comment = options.comment; + this.unixPermissions = options.unixPermissions; + this.dosPermissions = options.dosPermissions; + + this._data = data; + this._dataBinary = options.binary; + // keep only the compression + this.options = { + compression : options.compression, + compressionOptions : options.compressionOptions + }; +}; + +ZipObject.prototype = { + /** + * Create an internal stream for the content of this object. + * @param {String} type the type of each chunk. + * @return StreamHelper the stream. + */ + internalStream: function (type) { + var result = null, outputType = "string"; + try { + if (!type) { + throw new Error("No output type specified."); + } + outputType = type.toLowerCase(); + var askUnicodeString = outputType === "string" || outputType === "text"; + if (outputType === "binarystring" || outputType === "text") { + outputType = "string"; + } + result = this._decompressWorker(); + + var isUnicodeString = !this._dataBinary; + + if (isUnicodeString && !askUnicodeString) { + result = result.pipe(new utf8.Utf8EncodeWorker()); + } + if (!isUnicodeString && askUnicodeString) { + result = result.pipe(new utf8.Utf8DecodeWorker()); + } + } catch (e) { + result = new GenericWorker("error"); + result.error(e); + } + + return new StreamHelper(result, outputType, ""); + }, + + /** + * Prepare the content in the asked type. + * @param {String} type the type of the result. + * @param {Function} onUpdate a function to call on each internal update. + * @return Promise the promise of the result. + */ + async: function (type, onUpdate) { + return this.internalStream(type).accumulate(onUpdate); + }, + + /** + * Prepare the content as a nodejs stream. + * @param {String} type the type of each chunk. + * @param {Function} onUpdate a function to call on each internal update. + * @return Stream the stream. + */ + nodeStream: function (type, onUpdate) { + return this.internalStream(type || "nodebuffer").toNodejsStream(onUpdate); + }, + + /** + * Return a worker for the compressed content. + * @private + * @param {Object} compression the compression object to use. + * @param {Object} compressionOptions the options to use when compressing. + * @return Worker the worker. + */ + _compressWorker: function (compression, compressionOptions) { + if ( + this._data instanceof CompressedObject && + this._data.compression.magic === compression.magic + ) { + return this._data.getCompressedWorker(); + } else { + var result = this._decompressWorker(); + if(!this._dataBinary) { + result = result.pipe(new utf8.Utf8EncodeWorker()); + } + return CompressedObject.createWorkerFrom(result, compression, compressionOptions); + } + }, + /** + * Return a worker for the decompressed content. + * @private + * @return Worker the worker. + */ + _decompressWorker : function () { + if (this._data instanceof CompressedObject) { + return this._data.getContentWorker(); + } else if (this._data instanceof GenericWorker) { + return this._data; + } else { + return new DataWorker(this._data); + } + } +}; + +var removedMethods = ["asText", "asBinary", "asNodeBuffer", "asUint8Array", "asArrayBuffer"]; +var removedFn = function () { + throw new Error("This method has been removed in JSZip 3.0, please check the upgrade guide."); +}; + +for(var i = 0; i < removedMethods.length; i++) { + ZipObject.prototype[removedMethods[i]] = removedFn; +} +module.exports = ZipObject; + +},{"./compressedObject":2,"./stream/DataWorker":27,"./stream/GenericWorker":28,"./stream/StreamHelper":29,"./utf8":31}],36:[function(require,module,exports){ +(function (global){ +'use strict'; +var Mutation = global.MutationObserver || global.WebKitMutationObserver; + +var scheduleDrain; + +{ + if (Mutation) { + var called = 0; + var observer = new Mutation(nextTick); + var element = global.document.createTextNode(''); + observer.observe(element, { + characterData: true + }); + scheduleDrain = function () { + element.data = (called = ++called % 2); + }; + } else if (!global.setImmediate && typeof global.MessageChannel !== 'undefined') { + var channel = new global.MessageChannel(); + channel.port1.onmessage = nextTick; + scheduleDrain = function () { + channel.port2.postMessage(0); + }; + } else if ('document' in global && 'onreadystatechange' in global.document.createElement('script')) { + scheduleDrain = function () { + + // Create a + + + + + + + + + +
+ +
+
+
+

Hierarchy For All Packages

+Package Hierarchies: + +
+
+
+

Class Hierarchy

+ +
+
+

Enum Hierarchy

+ +
+
+
+
+ +
+ + diff --git a/centos/javadoc/package-search-index.js b/centos/javadoc/package-search-index.js new file mode 100644 index 0000000..4d963b4 --- /dev/null +++ b/centos/javadoc/package-search-index.js @@ -0,0 +1 @@ +packageSearchIndex = [{"l":"All Packages","url":"allpackages-index.html"},{"l":"com.google.video.widevine.sdk.wvpl"}] \ No newline at end of file diff --git a/centos/javadoc/package-search-index.zip b/centos/javadoc/package-search-index.zip new file mode 100644 index 0000000..33339ab Binary files /dev/null and b/centos/javadoc/package-search-index.zip differ diff --git a/centos/javadoc/resources/glass.png b/centos/javadoc/resources/glass.png new file mode 100644 index 0000000..a7f591f Binary files /dev/null and b/centos/javadoc/resources/glass.png differ diff --git a/centos/javadoc/resources/x.png b/centos/javadoc/resources/x.png new file mode 100644 index 0000000..30548a7 Binary files /dev/null and b/centos/javadoc/resources/x.png differ diff --git a/centos/javadoc/script.js b/centos/javadoc/script.js new file mode 100644 index 0000000..7dc93c4 --- /dev/null +++ b/centos/javadoc/script.js @@ -0,0 +1,149 @@ +/* + * Copyright (c) 2013, 2018, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2 only, as + * published by the Free Software Foundation. Oracle designates this + * particular file as subject to the "Classpath" exception as provided + * by Oracle in the LICENSE file that accompanied this code. + * + * This code is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License + * version 2 for more details (a copy is included in the LICENSE file that + * accompanied this code). + * + * You should have received a copy of the GNU General Public License version + * 2 along with this work; if not, write to the Free Software Foundation, + * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. + * + * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA + * or visit www.oracle.com if you need additional information or have any + * questions. + */ + +var moduleSearchIndex; +var packageSearchIndex; +var typeSearchIndex; +var memberSearchIndex; +var tagSearchIndex; +function loadScripts(doc, tag) { + createElem(doc, tag, 'jquery/jszip/dist/jszip.js'); + createElem(doc, tag, 'jquery/jszip-utils/dist/jszip-utils.js'); + if (window.navigator.userAgent.indexOf('MSIE ') > 0 || window.navigator.userAgent.indexOf('Trident/') > 0 || + window.navigator.userAgent.indexOf('Edge/') > 0) { + createElem(doc, tag, 'jquery/jszip-utils/dist/jszip-utils-ie.js'); + } + createElem(doc, tag, 'search.js'); + + $.get(pathtoroot + "module-search-index.zip") + .done(function() { + JSZipUtils.getBinaryContent(pathtoroot + "module-search-index.zip", function(e, data) { + JSZip.loadAsync(data).then(function(zip){ + zip.file("module-search-index.json").async("text").then(function(content){ + moduleSearchIndex = JSON.parse(content); + }); + }); + }); + }); + $.get(pathtoroot + "package-search-index.zip") + .done(function() { + JSZipUtils.getBinaryContent(pathtoroot + "package-search-index.zip", function(e, data) { + JSZip.loadAsync(data).then(function(zip){ + zip.file("package-search-index.json").async("text").then(function(content){ + packageSearchIndex = JSON.parse(content); + }); + }); + }); + }); + $.get(pathtoroot + "type-search-index.zip") + .done(function() { + JSZipUtils.getBinaryContent(pathtoroot + "type-search-index.zip", function(e, data) { + JSZip.loadAsync(data).then(function(zip){ + zip.file("type-search-index.json").async("text").then(function(content){ + typeSearchIndex = JSON.parse(content); + }); + }); + }); + }); + $.get(pathtoroot + "member-search-index.zip") + .done(function() { + JSZipUtils.getBinaryContent(pathtoroot + "member-search-index.zip", function(e, data) { + JSZip.loadAsync(data).then(function(zip){ + zip.file("member-search-index.json").async("text").then(function(content){ + memberSearchIndex = JSON.parse(content); + }); + }); + }); + }); + $.get(pathtoroot + "tag-search-index.zip") + .done(function() { + JSZipUtils.getBinaryContent(pathtoroot + "tag-search-index.zip", function(e, data) { + JSZip.loadAsync(data).then(function(zip){ + zip.file("tag-search-index.json").async("text").then(function(content){ + tagSearchIndex = JSON.parse(content); + }); + }); + }); + }); + if (!moduleSearchIndex) { + createElem(doc, tag, 'module-search-index.js'); + } + if (!packageSearchIndex) { + createElem(doc, tag, 'package-search-index.js'); + } + if (!typeSearchIndex) { + createElem(doc, tag, 'type-search-index.js'); + } + if (!memberSearchIndex) { + createElem(doc, tag, 'member-search-index.js'); + } + if (!tagSearchIndex) { + createElem(doc, tag, 'tag-search-index.js'); + } + $(window).resize(function() { + $('.navPadding').css('padding-top', $('.fixedNav').css("height")); + }); +} + +function createElem(doc, tag, path) { + var script = doc.createElement(tag); + var scriptElement = doc.getElementsByTagName(tag)[0]; + script.src = pathtoroot + path; + scriptElement.parentNode.insertBefore(script, scriptElement); +} + +function show(type) { + count = 0; + for (var key in data) { + var row = document.getElementById(key); + if ((data[key] & type) !== 0) { + row.style.display = ''; + row.className = (count++ % 2) ? rowColor : altColor; + } + else + row.style.display = 'none'; + } + updateTabs(type); +} + +function updateTabs(type) { + for (var value in tabs) { + var sNode = document.getElementById(tabs[value][0]); + var spanNode = sNode.firstChild; + if (value == type) { + sNode.className = activeTableTab; + spanNode.innerHTML = tabs[value][1]; + } + else { + sNode.className = tableTab; + spanNode.innerHTML = "" + tabs[value][1] + ""; + } + } +} + +function updateModuleFrame(pFrame, cFrame) { + top.packageFrame.location = pFrame; + top.classFrame.location = cFrame; +} diff --git a/centos/javadoc/search.js b/centos/javadoc/search.js new file mode 100644 index 0000000..b773531 --- /dev/null +++ b/centos/javadoc/search.js @@ -0,0 +1,326 @@ +/* + * Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2 only, as + * published by the Free Software Foundation. Oracle designates this + * particular file as subject to the "Classpath" exception as provided + * by Oracle in the LICENSE file that accompanied this code. + * + * This code is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License + * version 2 for more details (a copy is included in the LICENSE file that + * accompanied this code). + * + * You should have received a copy of the GNU General Public License version + * 2 along with this work; if not, write to the Free Software Foundation, + * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. + * + * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA + * or visit www.oracle.com if you need additional information or have any + * questions. + */ + +var noResult = {l: "No results found"}; +var catModules = "Modules"; +var catPackages = "Packages"; +var catTypes = "Types"; +var catMembers = "Members"; +var catSearchTags = "SearchTags"; +var highlight = "$&"; +var camelCaseRegexp = ""; +var secondaryMatcher = ""; +function getHighlightedText(item) { + var ccMatcher = new RegExp(camelCaseRegexp); + var label = item.replace(ccMatcher, highlight); + if (label === item) { + label = item.replace(secondaryMatcher, highlight); + } + return label; +} +function getURLPrefix(ui) { + var urlPrefix=""; + if (useModuleDirectories) { + var slash = "/"; + if (ui.item.category === catModules) { + return ui.item.l + slash; + } else if (ui.item.category === catPackages && ui.item.m) { + return ui.item.m + slash; + } else if ((ui.item.category === catTypes && ui.item.p) || ui.item.category === catMembers) { + $.each(packageSearchIndex, function(index, item) { + if (ui.item.p == item.l) { + urlPrefix = item.m + slash; + } + }); + return urlPrefix; + } else { + return urlPrefix; + } + } + return urlPrefix; +} +var watermark = 'Search'; +$(function() { + $("#search").val(''); + $("#search").prop("disabled", false); + $("#reset").prop("disabled", false); + $("#search").val(watermark).addClass('watermark'); + $("#search").blur(function() { + if ($(this).val().length == 0) { + $(this).val(watermark).addClass('watermark'); + } + }); + $("#search").on('click keydown', function() { + if ($(this).val() == watermark) { + $(this).val('').removeClass('watermark'); + } + }); + $("#reset").click(function() { + $("#search").val(''); + $("#search").focus(); + }); + $("#search").focus(); + $("#search")[0].setSelectionRange(0, 0); +}); +$.widget("custom.catcomplete", $.ui.autocomplete, { + _create: function() { + this._super(); + this.widget().menu("option", "items", "> :not(.ui-autocomplete-category)"); + }, + _renderMenu: function(ul, items) { + var rMenu = this, + currentCategory = ""; + rMenu.menu.bindings = $(); + $.each(items, function(index, item) { + var li; + if (item.l !== noResult.l && item.category !== currentCategory) { + ul.append("
  • " + item.category + "
  • "); + currentCategory = item.category; + } + li = rMenu._renderItemData(ul, item); + if (item.category) { + li.attr("aria-label", item.category + " : " + item.l); + li.attr("class", "resultItem"); + } else { + li.attr("aria-label", item.l); + li.attr("class", "resultItem"); + } + }); + }, + _renderItem: function(ul, item) { + var label = ""; + if (item.category === catModules) { + label = getHighlightedText(item.l); + } else if (item.category === catPackages) { + label = (item.m) + ? getHighlightedText(item.m + "/" + item.l) + : getHighlightedText(item.l); + } else if (item.category === catTypes) { + label = (item.p) + ? getHighlightedText(item.p + "." + item.l) + : getHighlightedText(item.l); + } else if (item.category === catMembers) { + label = getHighlightedText(item.p + "." + (item.c + "." + item.l)); + } else if (item.category === catSearchTags) { + label = getHighlightedText(item.l); + } else { + label = item.l; + } + var li = $("
  • ").appendTo(ul); + var div = $("
    ").appendTo(li); + if (item.category === catSearchTags) { + if (item.d) { + div.html(label + " (" + item.h + ")
    " + + item.d + "
    "); + } else { + div.html(label + " (" + item.h + ")"); + } + } else { + div.html(label); + } + return li; + } +}); +$(function() { + $("#search").catcomplete({ + minLength: 1, + delay: 100, + source: function(request, response) { + var result = new Array(); + var presult = new Array(); + var tresult = new Array(); + var mresult = new Array(); + var tgresult = new Array(); + var secondaryresult = new Array(); + var displayCount = 0; + var exactMatcher = new RegExp("^" + $.ui.autocomplete.escapeRegex(request.term) + "$", "i"); + camelCaseRegexp = ($.ui.autocomplete.escapeRegex(request.term)).split(/(?=[A-Z])/).join("([a-z0-9_$]*?)"); + var camelCaseMatcher = new RegExp("^" + camelCaseRegexp); + secondaryMatcher = new RegExp($.ui.autocomplete.escapeRegex(request.term), "i"); + + // Return the nested innermost name from the specified object + function nestedName(e) { + return e.l.substring(e.l.lastIndexOf(".") + 1); + } + + function concatResults(a1, a2) { + a1 = a1.concat(a2); + a2.length = 0; + return a1; + } + + if (moduleSearchIndex) { + var mdleCount = 0; + $.each(moduleSearchIndex, function(index, item) { + item.category = catModules; + if (exactMatcher.test(item.l)) { + result.push(item); + mdleCount++; + } else if (camelCaseMatcher.test(item.l)) { + result.push(item); + } else if (secondaryMatcher.test(item.l)) { + secondaryresult.push(item); + } + }); + displayCount = mdleCount; + result = concatResults(result, secondaryresult); + } + if (packageSearchIndex) { + var pCount = 0; + var pkg = ""; + $.each(packageSearchIndex, function(index, item) { + item.category = catPackages; + pkg = (item.m) + ? (item.m + "/" + item.l) + : item.l; + if (exactMatcher.test(item.l)) { + presult.push(item); + pCount++; + } else if (camelCaseMatcher.test(pkg)) { + presult.push(item); + } else if (secondaryMatcher.test(pkg)) { + secondaryresult.push(item); + } + }); + result = result.concat(concatResults(presult, secondaryresult)); + displayCount = (pCount > displayCount) ? pCount : displayCount; + } + if (typeSearchIndex) { + var tCount = 0; + $.each(typeSearchIndex, function(index, item) { + item.category = catTypes; + var s = nestedName(item); + if (exactMatcher.test(s)) { + tresult.push(item); + tCount++; + } else if (camelCaseMatcher.test(s)) { + tresult.push(item); + } else if (secondaryMatcher.test(item.p + "." + item.l)) { + secondaryresult.push(item); + } + }); + result = result.concat(concatResults(tresult, secondaryresult)); + displayCount = (tCount > displayCount) ? tCount : displayCount; + } + if (memberSearchIndex) { + var mCount = 0; + $.each(memberSearchIndex, function(index, item) { + item.category = catMembers; + var s = nestedName(item); + if (exactMatcher.test(s)) { + mresult.push(item); + mCount++; + } else if (camelCaseMatcher.test(s)) { + mresult.push(item); + } else if (secondaryMatcher.test(item.c + "." + item.l)) { + secondaryresult.push(item); + } + }); + result = result.concat(concatResults(mresult, secondaryresult)); + displayCount = (mCount > displayCount) ? mCount : displayCount; + } + if (tagSearchIndex) { + var tgCount = 0; + $.each(tagSearchIndex, function(index, item) { + item.category = catSearchTags; + if (exactMatcher.test(item.l)) { + tgresult.push(item); + tgCount++; + } else if (secondaryMatcher.test(item.l)) { + secondaryresult.push(item); + } + }); + result = result.concat(concatResults(tgresult, secondaryresult)); + displayCount = (tgCount > displayCount) ? tgCount : displayCount; + } + displayCount = (displayCount > 500) ? displayCount : 500; + var counter = function() { + var count = {Modules: 0, Packages: 0, Types: 0, Members: 0, SearchTags: 0}; + var f = function(item) { + count[item.category] += 1; + return (count[item.category] <= displayCount); + }; + return f; + }(); + response(result.filter(counter)); + }, + response: function(event, ui) { + if (!ui.content.length) { + ui.content.push(noResult); + } else { + $("#search").empty(); + } + }, + autoFocus: true, + position: { + collision: "flip" + }, + select: function(event, ui) { + if (ui.item.l !== noResult.l) { + var url = getURLPrefix(ui); + if (ui.item.category === catModules) { + if (useModuleDirectories) { + url += "module-summary.html"; + } else { + url = ui.item.l + "-summary.html"; + } + } else if (ui.item.category === catPackages) { + if (ui.item.url) { + url = ui.item.url; + } else { + url += ui.item.l.replace(/\./g, '/') + "/package-summary.html"; + } + } else if (ui.item.category === catTypes) { + if (ui.item.url) { + url = ui.item.url; + } else if (ui.item.p === "") { + url += ui.item.l + ".html"; + } else { + url += ui.item.p.replace(/\./g, '/') + "/" + ui.item.l + ".html"; + } + } else if (ui.item.category === catMembers) { + if (ui.item.p === "") { + url += ui.item.c + ".html" + "#"; + } else { + url += ui.item.p.replace(/\./g, '/') + "/" + ui.item.c + ".html" + "#"; + } + if (ui.item.url) { + url += ui.item.url; + } else { + url += ui.item.l; + } + } else if (ui.item.category === catSearchTags) { + url += ui.item.u; + } + if (top !== window) { + parent.classFrame.location = pathtoroot + url; + } else { + window.location.href = pathtoroot + url; + } + $("#search").focus(); + } + } + }); +}); diff --git a/centos/javadoc/serialized-form.html b/centos/javadoc/serialized-form.html new file mode 100644 index 0000000..0950f2e --- /dev/null +++ b/centos/javadoc/serialized-form.html @@ -0,0 +1,170 @@ + + + + + +Serialized Form + + + + + + + + + + + + + + +
    + +
    +
    +
    +

    Serialized Form

    +
    +
    + +
    +
    +
    + +
    + + diff --git a/centos/javadoc/stylesheet.css b/centos/javadoc/stylesheet.css new file mode 100644 index 0000000..fa24676 --- /dev/null +++ b/centos/javadoc/stylesheet.css @@ -0,0 +1,906 @@ +/* + * Javadoc style sheet + */ + +@import url('resources/fonts/dejavu.css'); + +/* + * Styles for individual HTML elements. + * + * These are styles that are specific to individual HTML elements. Changing them affects the style of a particular + * HTML element throughout the page. + */ + +body { + background-color:#ffffff; + color:#353833; + font-family:'DejaVu Sans', Arial, Helvetica, sans-serif; + font-size:14px; + margin:0; + padding:0; + height:100%; + width:100%; +} +iframe { + margin:0; + padding:0; + height:100%; + width:100%; + overflow-y:scroll; + border:none; +} +a:link, a:visited { + text-decoration:none; + color:#4A6782; +} +a[href]:hover, a[href]:focus { + text-decoration:none; + color:#bb7a2a; +} +a[name] { + color:#353833; +} +a[name]:before, a[name]:target, a[id]:before, a[id]:target { + content:""; + display:inline-block; + position:relative; + padding-top:129px; + margin-top:-129px; +} +pre { + font-family:'DejaVu Sans Mono', monospace; + font-size:14px; +} +h1 { + font-size:20px; +} +h2 { + font-size:18px; +} +h3 { + font-size:16px; + font-style:italic; +} +h4 { + font-size:13px; +} +h5 { + font-size:12px; +} +h6 { + font-size:11px; +} +ul { + list-style-type:disc; +} +code, tt { + font-family:'DejaVu Sans Mono', monospace; + font-size:14px; + padding-top:4px; + margin-top:8px; + line-height:1.4em; +} +dt code { + font-family:'DejaVu Sans Mono', monospace; + font-size:14px; + padding-top:4px; +} +table tr td dt code { + font-family:'DejaVu Sans Mono', monospace; + font-size:14px; + vertical-align:top; + padding-top:4px; +} +sup { + font-size:8px; +} + +/* + * Styles for HTML generated by javadoc. + * + * These are style classes that are used by the standard doclet to generate HTML documentation. + */ + +/* + * Styles for document title and copyright. + */ +.clear { + clear:both; + height:0px; + overflow:hidden; +} +.aboutLanguage { + float:right; + padding:0px 21px; + font-size:11px; + z-index:200; + margin-top:-9px; +} +.legalCopy { + margin-left:.5em; +} +.bar a, .bar a:link, .bar a:visited, .bar a:active { + color:#FFFFFF; + text-decoration:none; +} +.bar a:hover, .bar a:focus { + color:#bb7a2a; +} +.tab { + background-color:#0066FF; + color:#ffffff; + padding:8px; + width:5em; + font-weight:bold; +} +/* + * Styles for navigation bar. + */ +.bar { + background-color:#4D7A97; + color:#FFFFFF; + padding:.8em .5em .4em .8em; + height:auto;/*height:1.8em;*/ + font-size:11px; + margin:0; +} +.navPadding { + padding-top: 107px; +} +.fixedNav { + position:fixed; + width:100%; + z-index:999; + background-color:#ffffff; +} +.topNav { + background-color:#4D7A97; + color:#FFFFFF; + float:left; + padding:0; + width:100%; + clear:right; + height:2.8em; + padding-top:10px; + overflow:hidden; + font-size:12px; +} +.bottomNav { + margin-top:10px; + background-color:#4D7A97; + color:#FFFFFF; + float:left; + padding:0; + width:100%; + clear:right; + height:2.8em; + padding-top:10px; + overflow:hidden; + font-size:12px; +} +.subNav { + background-color:#dee3e9; + float:left; + width:100%; + overflow:hidden; + font-size:12px; +} +.subNav div { + clear:left; + float:left; + padding:0 0 5px 6px; + text-transform:uppercase; +} +ul.navList, ul.subNavList { + float:left; + margin:0 25px 0 0; + padding:0; +} +ul.navList li{ + list-style:none; + float:left; + padding: 5px 6px; + text-transform:uppercase; +} +ul.navListSearch { + float:right; + margin:0 0 0 0; + padding:0; +} +ul.navListSearch li { + list-style:none; + float:right; + padding: 5px 6px; + text-transform:uppercase; +} +ul.navListSearch li label { + position:relative; + right:-16px; +} +ul.subNavList li { + list-style:none; + float:left; +} +.topNav a:link, .topNav a:active, .topNav a:visited, .bottomNav a:link, .bottomNav a:active, .bottomNav a:visited { + color:#FFFFFF; + text-decoration:none; + text-transform:uppercase; +} +.topNav a:hover, .bottomNav a:hover { + text-decoration:none; + color:#bb7a2a; + text-transform:uppercase; +} +.navBarCell1Rev { + background-color:#F8981D; + color:#253441; + margin: auto 5px; +} +.skipNav { + position:absolute; + top:auto; + left:-9999px; + overflow:hidden; +} +/* + * Styles for page header and footer. + */ +.header, .footer { + clear:both; + margin:0 20px; + padding:5px 0 0 0; +} +.indexNav { + position:relative; + font-size:12px; + background-color:#dee3e9; +} +.indexNav ul { + margin-top:0; + padding:5px; +} +.indexNav ul li { + display:inline; + list-style-type:none; + padding-right:10px; + text-transform:uppercase; +} +.indexNav h1 { + font-size:13px; +} +.title { + color:#2c4557; + margin:10px 0; +} +.subTitle { + margin:5px 0 0 0; +} +.header ul { + margin:0 0 15px 0; + padding:0; +} +.footer ul { + margin:20px 0 5px 0; +} +.header ul li, .footer ul li { + list-style:none; + font-size:13px; +} +/* + * Styles for headings. + */ +div.details ul.blockList ul.blockList ul.blockList li.blockList h4, div.details ul.blockList ul.blockList ul.blockListLast li.blockList h4 { + background-color:#dee3e9; + border:1px solid #d0d9e0; + margin:0 0 6px -8px; + padding:7px 5px; +} +ul.blockList ul.blockList ul.blockList li.blockList h3 { + background-color:#dee3e9; + border:1px solid #d0d9e0; + margin:0 0 6px -8px; + padding:7px 5px; +} +ul.blockList ul.blockList li.blockList h3 { + padding:0; + margin:15px 0; +} +ul.blockList li.blockList h2 { + padding:0px 0 20px 0; +} +/* + * Styles for page layout containers. + */ +.contentContainer, .sourceContainer, .classUseContainer, .serializedFormContainer, .constantValuesContainer, +.allClassesContainer, .allPackagesContainer { + clear:both; + padding:10px 20px; + position:relative; +} +.indexContainer { + margin:10px; + position:relative; + font-size:12px; +} +.indexContainer h2 { + font-size:13px; + padding:0 0 3px 0; +} +.indexContainer ul { + margin:0; + padding:0; +} +.indexContainer ul li { + list-style:none; + padding-top:2px; +} +.contentContainer .description dl dt, .contentContainer .details dl dt, .serializedFormContainer dl dt { + font-size:12px; + font-weight:bold; + margin:10px 0 0 0; + color:#4E4E4E; +} +.contentContainer .description dl dd, .contentContainer .details dl dd, .serializedFormContainer dl dd { + margin:5px 0 10px 0px; + font-size:14px; + font-family:'DejaVu Serif', Georgia, "Times New Roman", Times, serif; +} +.serializedFormContainer dl.nameValue dt { + margin-left:1px; + font-size:1.1em; + display:inline; + font-weight:bold; +} +.serializedFormContainer dl.nameValue dd { + margin:0 0 0 1px; + font-size:1.1em; + display:inline; +} +/* + * Styles for lists. + */ +li.circle { + list-style:circle; +} +ul.horizontal li { + display:inline; + font-size:0.9em; +} +ul.inheritance { + margin:0; + padding:0; +} +ul.inheritance li { + display:inline; + list-style:none; +} +ul.inheritance li ul.inheritance { + margin-left:15px; + padding-left:15px; + padding-top:1px; +} +ul.blockList, ul.blockListLast { + margin:10px 0 10px 0; + padding:0; +} +ul.blockList li.blockList, ul.blockListLast li.blockList { + list-style:none; + margin-bottom:15px; + line-height:1.4; +} +ul.blockList ul.blockList li.blockList, ul.blockList ul.blockListLast li.blockList { + padding:0px 20px 5px 10px; + border:1px solid #ededed; + background-color:#f8f8f8; +} +ul.blockList ul.blockList ul.blockList li.blockList, ul.blockList ul.blockList ul.blockListLast li.blockList { + padding:0 0 5px 8px; + background-color:#ffffff; + border:none; +} +ul.blockList ul.blockList ul.blockList ul.blockList li.blockList { + margin-left:0; + padding-left:0; + padding-bottom:15px; + border:none; +} +ul.blockList ul.blockList ul.blockList ul.blockList li.blockListLast { + list-style:none; + border-bottom:none; + padding-bottom:0; +} +table tr td dl, table tr td dl dt, table tr td dl dd { + margin-top:0; + margin-bottom:1px; +} +/* + * Styles for tables. + */ +.overviewSummary, .memberSummary, .typeSummary, .useSummary, .constantsSummary, .deprecatedSummary, +.requiresSummary, .packagesSummary, .providesSummary, .usesSummary { + width:100%; + border-spacing:0; + border-left:1px solid #EEE; + border-right:1px solid #EEE; + border-bottom:1px solid #EEE; +} +.overviewSummary, .memberSummary, .requiresSummary, .packagesSummary, .providesSummary, .usesSummary { + padding:0px; +} +.overviewSummary caption, .memberSummary caption, .typeSummary caption, +.useSummary caption, .constantsSummary caption, .deprecatedSummary caption, +.requiresSummary caption, .packagesSummary caption, .providesSummary caption, .usesSummary caption { + position:relative; + text-align:left; + background-repeat:no-repeat; + color:#253441; + font-weight:bold; + clear:none; + overflow:hidden; + padding:0px; + padding-top:10px; + padding-left:1px; + margin:0px; + white-space:pre; +} +.overviewSummary caption a:link, .memberSummary caption a:link, .typeSummary caption a:link, +.constantsSummary caption a:link, .deprecatedSummary caption a:link, +.requiresSummary caption a:link, .packagesSummary caption a:link, .providesSummary caption a:link, +.usesSummary caption a:link, +.overviewSummary caption a:hover, .memberSummary caption a:hover, .typeSummary caption a:hover, +.constantsSummary caption a:hover, .deprecatedSummary caption a:hover, +.requiresSummary caption a:hover, .packagesSummary caption a:hover, .providesSummary caption a:hover, +.usesSummary caption a:hover, +.overviewSummary caption a:active, .memberSummary caption a:active, .typeSummary caption a:active, +.constantsSummary caption a:active, .deprecatedSummary caption a:active, +.requiresSummary caption a:active, .packagesSummary caption a:active, .providesSummary caption a:active, +.usesSummary caption a:active, +.overviewSummary caption a:visited, .memberSummary caption a:visited, .typeSummary caption a:visited, +.constantsSummary caption a:visited, .deprecatedSummary caption a:visited, +.requiresSummary caption a:visited, .packagesSummary caption a:visited, .providesSummary caption a:visited, +.usesSummary caption a:visited { + color:#FFFFFF; +} +.useSummary caption a:link, .useSummary caption a:hover, .useSummary caption a:active, +.useSummary caption a:visited { + color:#1f389c; +} +.overviewSummary caption span, .memberSummary caption span, .typeSummary caption span, +.useSummary caption span, .constantsSummary caption span, .deprecatedSummary caption span, +.requiresSummary caption span, .packagesSummary caption span, .providesSummary caption span, +.usesSummary caption span { + white-space:nowrap; + padding-top:5px; + padding-left:12px; + padding-right:12px; + padding-bottom:7px; + display:inline-block; + float:left; + background-color:#F8981D; + border: none; + height:16px; +} +.memberSummary caption span.activeTableTab span, .packagesSummary caption span.activeTableTab span, +.overviewSummary caption span.activeTableTab span, .typeSummary caption span.activeTableTab span { + white-space:nowrap; + padding-top:5px; + padding-left:12px; + padding-right:12px; + margin-right:3px; + display:inline-block; + float:left; + background-color:#F8981D; + height:16px; +} +.memberSummary caption span.tableTab span, .packagesSummary caption span.tableTab span, +.overviewSummary caption span.tableTab span, .typeSummary caption span.tableTab span { + white-space:nowrap; + padding-top:5px; + padding-left:12px; + padding-right:12px; + margin-right:3px; + display:inline-block; + float:left; + background-color:#4D7A97; + height:16px; +} +.memberSummary caption span.tableTab, .memberSummary caption span.activeTableTab, +.packagesSummary caption span.tableTab, .packagesSummary caption span.activeTableTab, +.overviewSummary caption span.tableTab, .overviewSummary caption span.activeTableTab, +.typeSummary caption span.tableTab, .typeSummary caption span.activeTableTab { + padding-top:0px; + padding-left:0px; + padding-right:0px; + background-image:none; + float:none; + display:inline; +} +.overviewSummary .tabEnd, .memberSummary .tabEnd, .typeSummary .tabEnd, +.useSummary .tabEnd, .constantsSummary .tabEnd, .deprecatedSummary .tabEnd, +.requiresSummary .tabEnd, .packagesSummary .tabEnd, .providesSummary .tabEnd, .usesSummary .tabEnd { + display:none; + width:5px; + position:relative; + float:left; + background-color:#F8981D; +} +.memberSummary .activeTableTab .tabEnd, .packagesSummary .activeTableTab .tabEnd, +.overviewSummary .activeTableTab .tabEnd, .typeSummary .activeTableTab .tabEnd { + display:none; + width:5px; + margin-right:3px; + position:relative; + float:left; + background-color:#F8981D; +} +.memberSummary .tableTab .tabEnd, .packagesSummary .tableTab .tabEnd, +.overviewSummary .tableTab .tabEnd, .typeSummary .tableTab .tabEnd { + display:none; + width:5px; + margin-right:3px; + position:relative; + background-color:#4D7A97; + float:left; +} +.rowColor th, .altColor th { + font-weight:normal; +} +.overviewSummary td, .memberSummary td, .typeSummary td, +.useSummary td, .constantsSummary td, .deprecatedSummary td, +.requiresSummary td, .packagesSummary td, .providesSummary td, .usesSummary td { + text-align:left; + padding:0px 0px 12px 10px; +} +th.colFirst, th.colSecond, th.colLast, th.colConstructorName, th.colDeprecatedItemName, .useSummary th, +.constantsSummary th, .packagesSummary th, td.colFirst, td.colSecond, td.colLast, .useSummary td, +.constantsSummary td { + vertical-align:top; + padding-right:0px; + padding-top:8px; + padding-bottom:3px; +} +th.colFirst, th.colSecond, th.colLast, th.colConstructorName, th.colDeprecatedItemName, .constantsSummary th, +.packagesSummary th { + background:#dee3e9; + text-align:left; + padding:8px 3px 3px 7px; +} +td.colFirst, th.colFirst { + font-size:13px; +} +td.colSecond, th.colSecond, td.colLast, th.colConstructorName, th.colDeprecatedItemName, th.colLast { + font-size:13px; +} +.constantsSummary th, .packagesSummary th { + font-size:13px; +} +.providesSummary th.colFirst, .providesSummary th.colLast, .providesSummary td.colFirst, +.providesSummary td.colLast { + white-space:normal; + font-size:13px; +} +.overviewSummary td.colFirst, .overviewSummary th.colFirst, +.requiresSummary td.colFirst, .requiresSummary th.colFirst, +.packagesSummary td.colFirst, .packagesSummary td.colSecond, .packagesSummary th.colFirst, .packagesSummary th, +.usesSummary td.colFirst, .usesSummary th.colFirst, +.providesSummary td.colFirst, .providesSummary th.colFirst, +.memberSummary td.colFirst, .memberSummary th.colFirst, +.memberSummary td.colSecond, .memberSummary th.colSecond, .memberSummary th.colConstructorName, +.typeSummary td.colFirst, .typeSummary th.colFirst { + vertical-align:top; +} +.packagesSummary th.colLast, .packagesSummary td.colLast { + white-space:normal; +} +td.colFirst a:link, td.colFirst a:visited, +td.colSecond a:link, td.colSecond a:visited, +th.colFirst a:link, th.colFirst a:visited, +th.colSecond a:link, th.colSecond a:visited, +th.colConstructorName a:link, th.colConstructorName a:visited, +th.colDeprecatedItemName a:link, th.colDeprecatedItemName a:visited, +.constantValuesContainer td a:link, .constantValuesContainer td a:visited, +.allClassesContainer td a:link, .allClassesContainer td a:visited, +.allPackagesContainer td a:link, .allPackagesContainer td a:visited { + font-weight:bold; +} +.tableSubHeadingColor { + background-color:#EEEEFF; +} +.altColor, .altColor th { + background-color:#FFFFFF; +} +.rowColor, .rowColor th { + background-color:#EEEEEF; +} +/* + * Styles for contents. + */ +.description pre { + margin-top:0; +} +.deprecatedContent { + margin:0; + padding:10px 0; +} +.docSummary { + padding:0; +} +ul.blockList ul.blockList ul.blockList li.blockList h3 { + font-style:normal; +} +div.block { + font-size:14px; + font-family:'DejaVu Serif', Georgia, "Times New Roman", Times, serif; +} +td.colLast div { + padding-top:0px; +} +td.colLast a { + padding-bottom:3px; +} +/* + * Styles for formatting effect. + */ +.sourceLineNo { + color:green; + padding:0 30px 0 0; +} +h1.hidden { + visibility:hidden; + overflow:hidden; + font-size:10px; +} +.block { + display:block; + margin:3px 10px 2px 0px; + color:#474747; +} +.deprecatedLabel, .descfrmTypeLabel, .implementationLabel, .memberNameLabel, .memberNameLink, +.moduleLabelInPackage, .moduleLabelInType, .overrideSpecifyLabel, .packageLabelInType, +.packageHierarchyLabel, .paramLabel, .returnLabel, .seeLabel, .simpleTagLabel, +.throwsLabel, .typeNameLabel, .typeNameLink, .searchTagLink { + font-weight:bold; +} +.deprecationComment, .emphasizedPhrase, .interfaceName { + font-style:italic; +} +.deprecationBlock { + font-size:14px; + font-family:'DejaVu Serif', Georgia, "Times New Roman", Times, serif; + border-style:solid; + border-width:thin; + border-radius:10px; + padding:10px; + margin-bottom:10px; + margin-right:10px; + display:inline-block; +} +div.block div.deprecationComment, div.block div.block span.emphasizedPhrase, +div.block div.block span.interfaceName { + font-style:normal; +} +div.contentContainer ul.blockList li.blockList h2 { + padding-bottom:0px; +} +/* + * Styles for IFRAME. + */ +.mainContainer { + margin:0 auto; + padding:0; + height:100%; + width:100%; + position:fixed; + top:0; + left:0; +} +.leftContainer { + height:100%; + position:fixed; + width:320px; +} +.leftTop { + position:relative; + float:left; + width:315px; + top:0; + left:0; + height:30%; + border-right:6px solid #ccc; + border-bottom:6px solid #ccc; +} +.leftBottom { + position:relative; + float:left; + width:315px; + bottom:0; + left:0; + height:70%; + border-right:6px solid #ccc; + border-top:1px solid #000; +} +.rightContainer { + position:absolute; + left:320px; + top:0; + bottom:0; + height:100%; + right:0; + border-left:1px solid #000; +} +.rightIframe { + margin:0; + padding:0; + height:100%; + right:30px; + width:100%; + overflow:visible; + margin-bottom:30px; +} +/* + * Styles specific to HTML5 elements. + */ +main, nav, header, footer, section { + display:block; +} +/* + * Styles for javadoc search. + */ +.ui-autocomplete-category { + font-weight:bold; + font-size:15px; + padding:7px 0 7px 3px; + background-color:#4D7A97; + color:#FFFFFF; +} +.resultItem { + font-size:13px; +} +.ui-autocomplete { + max-height:85%; + max-width:65%; + overflow-y:scroll; + overflow-x:scroll; + white-space:nowrap; + box-shadow: 0 3px 6px rgba(0,0,0,0.16), 0 3px 6px rgba(0,0,0,0.23); +} +ul.ui-autocomplete { + position:fixed; + z-index:999999; +} +ul.ui-autocomplete li { + float:left; + clear:both; + width:100%; +} +.resultHighlight { + font-weight:bold; +} +#search { + background-image:url('resources/glass.png'); + background-size:13px; + background-repeat:no-repeat; + background-position:2px 3px; + padding-left:20px; + position:relative; + right:-18px; +} +#reset { + background-color: rgb(255,255,255); + background-image:url('resources/x.png'); + background-position:center; + background-repeat:no-repeat; + background-size:12px; + border:0 none; + width:16px; + height:17px; + position:relative; + left:-4px; + top:-4px; + font-size:0px; +} +.watermark { + color:#545454; +} +.searchTagDescResult { + font-style:italic; + font-size:11px; +} +.searchTagHolderResult { + font-style:italic; + font-size:12px; +} +.searchTagResult:before, .searchTagResult:target { + color:red; +} +.moduleGraph span { + display:none; + position:absolute; +} +.moduleGraph:hover span { + display:block; + margin: -100px 0 0 100px; + z-index: 1; +} +.methodSignature { + white-space:normal; +} + +/* + * Styles for user-provided tables. + * + * borderless: + * No borders, vertical margins, styled caption. + * This style is provided for use with existing doc comments. + * In general, borderless tables should not be used for layout purposes. + * + * plain: + * Plain borders around table and cells, vertical margins, styled caption. + * Best for small tables or for complex tables for tables with cells that span + * rows and columns, when the "striped" style does not work well. + * + * striped: + * Borders around the table and vertical borders between cells, striped rows, + * vertical margins, styled caption. + * Best for tables that have a header row, and a body containing a series of simple rows. + */ + +table.borderless, +table.plain, +table.striped { + margin-top: 10px; + margin-bottom: 10px; +} +table.borderless > caption, +table.plain > caption, +table.striped > caption { + font-weight: bold; + font-size: smaller; +} +table.borderless th, table.borderless td, +table.plain th, table.plain td, +table.striped th, table.striped td { + padding: 2px 5px; +} +table.borderless, +table.borderless > thead > tr > th, table.borderless > tbody > tr > th, table.borderless > tr > th, +table.borderless > thead > tr > td, table.borderless > tbody > tr > td, table.borderless > tr > td { + border: none; +} +table.borderless > thead > tr, table.borderless > tbody > tr, table.borderless > tr { + background-color: transparent; +} +table.plain { + border-collapse: collapse; + border: 1px solid black; +} +table.plain > thead > tr, table.plain > tbody tr, table.plain > tr { + background-color: transparent; +} +table.plain > thead > tr > th, table.plain > tbody > tr > th, table.plain > tr > th, +table.plain > thead > tr > td, table.plain > tbody > tr > td, table.plain > tr > td { + border: 1px solid black; +} +table.striped { + border-collapse: collapse; + border: 1px solid black; +} +table.striped > thead { + background-color: #E3E3E3; +} +table.striped > thead > tr > th, table.striped > thead > tr > td { + border: 1px solid black; +} +table.striped > tbody > tr:nth-child(even) { + background-color: #EEE +} +table.striped > tbody > tr:nth-child(odd) { + background-color: #FFF +} +table.striped > tbody > tr > th, table.striped > tbody > tr > td { + border-left: 1px solid black; + border-right: 1px solid black; +} +table.striped > tbody > tr > th { + font-weight: normal; +} diff --git a/centos/javadoc/type-search-index.js b/centos/javadoc/type-search-index.js new file mode 100644 index 0000000..65d99ad --- /dev/null +++ b/centos/javadoc/type-search-index.js @@ -0,0 +1 @@ +typeSearchIndex = [{"l":"All Classes","url":"allclasses-index.html"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLAnalogOutputCapabilities.AnalogOutputCapabilities"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCertificateKeyType.CertificateKeyType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCgms.Cgms"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLClockSecurityLevel.ClockSecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDecencMitigationOption.DecencMitigationOption"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCapabilityStatus.DeviceCapabilityStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceModelStatus.DeviceModelStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceSecurityLevel.DeviceSecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceState.DeviceState"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceStatus.DeviceStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLEncryptionScheme.EncryptionScheme"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLHdcp.HDCP"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKeyCategory.KeyCategory"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKeyType.KeyType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseCategory.LicenseCategory"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseRequestType.LicenseRequestType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseType.LicenseType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLMessageType.MessageType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDevicePlatform.Platform"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLPlatformVerificationStatus.PlatformVerificationStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProtectionScheme.ProtectionScheme"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProvisioningMethod.ProvisioningMethod"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProvisioningVersion.ProvisioningVersion"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSecurityLevel.SecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLStatus.StatusCode"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLTimerDelayBase.TimerDelayBase"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLTrackType.TrackType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVerificationLevel.VerificationLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVideoFeatureKeySet.VideoFeatureKeySet"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVulnerabilityLevel.VulnerabilityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLWatermarkingSupport.WatermarkingSupport"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLAnalogOutputCapabilities"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLAuthenticateBitstreamConfigOption"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLBaseEnvironment"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLBaseKey"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLBaseSession"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLBrowserRequirement"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCapabilityStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCertificateKeyType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLCgms"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLClientCapabilities"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLClientInfo"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLClockSecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDcslInfo"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDecencMitigation"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDecencMitigationConfigOption"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDecencMitigationOption"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceInfo"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceModelInfo"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceModelStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDevicePlatform"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceSecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceSecurityProfile"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceState"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDeviceStatusOptions"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLDrmInfo"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLEncryptionScheme"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLEntitledKey"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLEnvironment"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLHdcp"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKey"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKeyCategory"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKeyCategorySpec"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLKeyType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseCategory"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseCategorySpec"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseIdentification"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseRequestType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLLicenseType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLMessageType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLOperatorSessionKeyPermissions"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLOutputProtection"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLPlatformVerificationStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLPlaybackPolicy"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProtectionScheme"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProvisioningMethod"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLProvisioningVersion"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLRequestType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSecurityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSecurityRequirement"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSession"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSessionCreateOptions"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSessionInit"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSessionState"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLSessionUsage"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLStatus"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLStatusException"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLTimerDelayBase"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLTrackType"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVerificationLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVideoFeatureKeySet"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVideoResolutionConstraint"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLVulnerabilityLevel"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLWatermarkingSupport"},{"p":"com.google.video.widevine.sdk.wvpl","l":"WvPLWidevinePsshData"}] \ No newline at end of file diff --git a/centos/javadoc/type-search-index.zip b/centos/javadoc/type-search-index.zip new file mode 100644 index 0000000..7f67821 Binary files /dev/null and b/centos/javadoc/type-search-index.zip differ diff --git a/centos/libcore.jar b/centos/libcore.jar new file mode 100755 index 0000000..a244a0d Binary files /dev/null and b/centos/libcore.jar differ diff --git a/centos/libexported_wvpl_license_server_sdk_proto-speed.jar b/centos/libexported_wvpl_license_server_sdk_proto-speed.jar new file mode 100755 index 0000000..f337055 Binary files /dev/null and b/centos/libexported_wvpl_license_server_sdk_proto-speed.jar differ diff --git a/centos/libplay_ready_impl.jar b/centos/libplay_ready_impl.jar new file mode 100755 index 0000000..d268117 Binary files /dev/null and b/centos/libplay_ready_impl.jar differ diff --git a/centos/libplayready_lib.jar b/centos/libplayready_lib.jar new file mode 100755 index 0000000..315157e Binary files /dev/null and b/centos/libplayready_lib.jar differ diff --git a/centos/libplayready_rmsdk.so b/centos/libplayready_rmsdk.so new file mode 100755 index 0000000..cfc5cc4 Binary files /dev/null and b/centos/libplayready_rmsdk.so differ diff --git a/centos/libsdk_utils.jar b/centos/libsdk_utils.jar new file mode 100755 index 0000000..cd3581e Binary files /dev/null and b/centos/libsdk_utils.jar differ diff --git a/centos/libwidevine_license_wvpl_sdk_lib.jar b/centos/libwidevine_license_wvpl_sdk_lib.jar new file mode 100755 index 0000000..ecf156f Binary files /dev/null and b/centos/libwidevine_license_wvpl_sdk_lib.jar differ diff --git a/centos/libwidevine_playready_revocation_constants.jar b/centos/libwidevine_playready_revocation_constants.jar new file mode 100755 index 0000000..a075782 Binary files /dev/null and b/centos/libwidevine_playready_revocation_constants.jar differ diff --git a/centos/libwvpl_license_sdk.so b/centos/libwvpl_license_sdk.so new file mode 100755 index 0000000..87999b8 Binary files /dev/null and b/centos/libwvpl_license_sdk.so differ diff --git a/centos/libwvpl_playready_utils.jar b/centos/libwvpl_playready_utils.jar new file mode 100755 index 0000000..fe0a240 Binary files /dev/null and b/centos/libwvpl_playready_utils.jar differ diff --git a/centos/libwvpl_utils.jar b/centos/libwvpl_utils.jar new file mode 100755 index 0000000..ff79481 Binary files /dev/null and b/centos/libwvpl_utils.jar differ diff --git a/centos/processed_protobuf-java-3.25.0.jar b/centos/processed_protobuf-java-3.25.0.jar new file mode 100755 index 0000000..cb15535 Binary files /dev/null and b/centos/processed_protobuf-java-3.25.0.jar differ diff --git a/centos/protos/public/device_certificate_status.proto b/centos/protos/public/device_certificate_status.proto new file mode 100644 index 0000000..25d6475 --- /dev/null +++ b/centos/protos/public/device_certificate_status.proto @@ -0,0 +1,232 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +// + +// + + + +syntax = "proto2"; + +package video_widevine; + +import "protos/public/hash_algorithm.proto"; +import "protos/public/provisioned_device_info.proto"; + +option java_outer_classname = "DeviceCertificateStatusProtos"; +option java_package = "com.google.video.widevine.protos"; + + + +message DeviceCertificateStatus { + reserved 8; + enum DeprecatedStatus { + DEPRECATED_VALID = 0; + DEPRECATED_REVOKED = 1; + } + enum Status { + STATUS_UNKNOWN = 0; + STATUS_IN_TESTING = 10; + STATUS_RELEASED = 20; + STATUS_TEST_ONLY = 30; + STATUS_REVOKED = 40; + } + + message RevokedIdentifiers { + + repeated bytes revoked_certificate_serial_numbers = 1; + + + + + + + repeated bytes revoked_unique_id_hashes = 2; + } + + + + optional bytes drm_serial_number = 1; + + + optional DeprecatedStatus deprecated_status = 2 [default = DEPRECATED_VALID]; + + + optional ProvisionedDeviceInfo device_info = 4; + + + optional bytes oem_serial_number = 5; + + optional Status status = 6 [default = STATUS_UNKNOWN]; + + + optional RevokedIdentifiers revoked_identifiers = 7; +} + +message ImpactAnalysisReport { + + + message ImpactAnalysis { + enum DeviceStatusOperation { + DEVICE_STATUS_OPERATION_UNSPECIFIED = 0; + + DEVICE_STATUS_UPDATE = 1; + + DEVICE_STATUS_REVOKE = 2; + + DEVICE_STATUS_INDIVIDUAL_DEVICE_REVOKE = 3; + + DEVICE_STATUS_REMOVED = 4; + } + + enum DeviceStatusImpact { + + DEVICE_STATUS_IMPACT_UNSPECIFIED = 0; + + + DEVICE_STATUS_IMPACT_NONE = 1; + + + DEVICE_STATUS_IMPACT_LOW = 2; + + + DEVICE_STATUS_IMPACT_MEDIUM = 3; + + + DEVICE_STATUS_IMPACT_HIGH = 4; + + + + DEVICE_STATUS_IMPACT_UNABLE_TO_OBTAIN = 5; + } + + + + enum DeviceCertificateStatusMetadataOperation { + DEVICE_CERTIFICATE_STATUS_METADATA_OPERATION_UNSPECIFIED = 0; + + DEVICE_CERTIFICATE_STATUS_METADATA_OPERATION_UPDATE = 1; + + DEVICE_CERTIFICATE_STATUS_METADATA_OPERATION_REMOVE = 2; + + DEVICE_CERTIFICATE_STATUS_METADATA_OPERATION_ADD = 3; + } + + + + + message DeviceCertificateStatusMetadataFieldUpdates { + + + optional string metadata_field_name = 1; + + optional DeviceCertificateStatusMetadataOperation metadata_operation = 2; + } + + + message DeviceCertificateStatusDelta { + + repeated string delta = 1; + } + + message ImpactAnalysisMetrics { + + + + + optional float impact_value = 1; + + + + optional uint64 number_of_requests = 2; + + optional uint32 request_duration_days = 3; + } + + + optional uint32 system_id = 1; + + optional DeviceStatusImpact impact = 2; + + optional DeviceStatusOperation operation = 3; + + optional uint32 operation_time_seconds = 4; + + optional ImpactAnalysisMetrics impact_analysis_metrics = 5; + + + + optional DeviceCertificateStatus.RevokedIdentifiers + newly_revoked_identifiers = 6; + + + repeated DeviceCertificateStatusMetadataFieldUpdates + metadata_field_updates = 7; + + + + optional DeviceCertificateStatusDelta device_certificate_status_delta = 8; + } + + + + + optional uint32 prev_dcsl_creation_time_seconds = 1; + + + repeated ImpactAnalysis impact_analysis = 2; +} + + + +message DeviceCertificateStatusList { + + optional uint32 creation_time_seconds = 1; + + repeated DeviceCertificateStatus certificate_status = 2; + + + optional ImpactAnalysisReport impact_analysis_report = 3; +} + + + +message PublishedDevicesList { + + optional uint32 creation_time_seconds = 1; + + repeated DeviceCertificateStatus device_certificate_status = 2; + + + optional ImpactAnalysisReport impact_analysis_report = 3; +} + + + +message SignedDeviceCertificateStatusList { + + optional bytes certificate_status_list = 1; + + + optional bytes signature = 2; + + optional HashAlgorithmProto hash_algorithm = 3; +} + +message DeviceStatusOptions { + + optional bool allow_unknown_system_id = 1 [default = false]; + + optional bool allow_revoked_system_id = 2 [default = false]; + + optional bool allow_test_only_system_id = 3 [default = false]; + + optional bool allow_pre_release_system_id = 4 [default = true]; + + optional bool allow_revoked_individual_device = 5 [default = false]; +} diff --git a/centos/protos/public/device_common.proto b/centos/protos/public/device_common.proto new file mode 100644 index 0000000..2073b91 --- /dev/null +++ b/centos/protos/public/device_common.proto @@ -0,0 +1,405 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +// + + + + + +syntax = "proto3"; + +package video_widevine; + +import "google/protobuf/descriptor.proto"; + +option java_package = "com.google.video.widevine.protos"; + + +message DeviceModel { + + + + + + + + + + enum ModelStatus { + MODEL_STATUS_UNSPECIFIED = 0; + MODEL_STATUS_VERIFIED = 1; + MODEL_STATUS_UNVERIFIED = 2; + MODEL_STATUS_UNKNOWN = 4; + MODEL_STATUS_REJECTED = 3; + } + + message ModelStatistics { + double percent_license_requests_last_7_days = 1; + double percent_license_requests_last_30_days = 2; + double percent_license_requests_last_90_days = 3; + + } + + + string manufacturer = 1; + + string model_name = 2; + + uint32 model_year = 3; + + ModelStatus status = 4; + + ModelStatistics model_statistics = 5; +} + + + + + +// + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +// + + +// + + + + + + + + + + + +// + + +enum DeviceState { + DEVICE_STATE_UNKNOWN = 0; + IN_TESTING = 1; + RELEASED = 2; + DELETED = 3; + TEST_ONLY = 4; + REVOKED = 5; + PRE_RELEASE = 6; + REVOKED_LICENSING = 7; +} + + +enum DeviceType { + DEVICE_TYPE_UNSPECIFIED = 0; + DEVICE_TYPE_PHONE = 1; + DEVICE_TYPE_TV = 2; + DEVICE_TYPE_TABLET = 3; + DEVICE_TYPE_GAMING_CONSOLE = 4; + DEVICE_TYPE_SET_TOP_BOX = 5; + DEVICE_TYPE_VIDEO_DONGLE = 6; + DEVICE_TYPE_PC = 7; + DEVICE_TYPE_AUTO = 8; + DEVICE_TYPE_WEARABLE = 9; + DEVICE_TYPE_CONNECTED_AUDIO_DEVICE = 10; + DEVICE_TYPE_SMART_DISPLAY = 11; + + DEVICE_TYPE_SOC = 12; + DEVICE_TYPE_OTHER = 13; + DEVICE_TYPE_HEADSET = 14; +} + + +enum Platform { + PLATFORM_UNSPECIFIED = 0; + PLATFORM_CHROMECAST = 1; + PLATFORM_FUCHSIA = 2; + PLATFORM_IOS = 3; + PLATFORM_IPAD_OS = 4; + PLATFORM_TV_OS = 5; + PLATFORM_ANDROID = 6; + PLATFORM_WINDOWS = 7; + PLATFORM_CHROME_OS = 8; + PLATFORM_MAC_OS = 9; + PLATFORM_LINUX = 10; + PLATFORM_WEB_OS = 11; + PLATFORM_TIZEN = 12; + PLATFORM_FIRE_OS = 13; + PLATFORM_ROKU = 14; + PLATFORM_PLAYSTATION = 15; + PLATFORM_XBOX = 16; + PLATFORM_KAIOS = 17; + PLATFORM_RDK = 18; + PLATFORM_OTHER = 19; +} + + + + +enum OsOptionalSupport { + OS_OPTIONAL_SUPPORT_UNSPECIFIED = 0; + YES_TEE = 1; + YES_REE = 2; + NO_SUPPORT = 3; +} + + + + +enum HdcpVersion { + HDCP_VERSION_UNSPECIFIED = 0; + HDCP_V1 = 1; + HDCP_V2 = 2; + HDCP_V2_1 = 3; + HDCP_V2_2 = 4; + HDCP_V2_3 = 5; + + + HDCP_V1_0 = 6; + HDCP_V1_1 = 7; + HDCP_V1_2 = 8; + HDCP_V1_3 = 9; + HDCP_V1_4 = 10; +} + + +enum DeviceSecurityLevel { + SECURITY_LEVEL_UNSPECIFIED = 0; + LEVEL_1 = 1; + LEVEL_2 = 2; + LEVEL_3 = 3; +} + + + + + + +enum CertificateKeyType { + + + + CERTIFICATE_KEY_TYPE_UNSPECIFIED = 0; + + CERTIFICATE_KEY_TYPE_RSA = 1; + + CERTIFICATE_KEY_TYPE_RSA_EULER = 2; + + CERTIFICATE_KEY_TYPE_EC = 3; +} + + + + + + + +enum KeyboxVersion { + KEYBOX_VERSION_UNSPECIFIED = 0; + + KEYBOX_VERSION_2 = 2; + KEYBOX_VERSION_3 = 3; + KEYBOX_VERSION_2_OR_3 = 4; + KEYBOX_VERSION_4 = 5; +} + + + + + +enum RSAKeySize { + RSA_KEY_SIZE_UNSPECIFIED = 0; + RSA_KEY_SIZE_1024 = 1; + RSA_KEY_SIZE_2048 = 2; + RSA_KEY_SIZE_3072 = 3; + RSA_KEY_SIZE_4096 = 4; +} + + + +enum VulnerabilityLevel { + VULNERABILITY_LEVEL_UNSPECIFIED = 0; + VULNERABILITY_LEVEL_NONE = 1; + VULNERABILITY_LEVEL_LOW = 2; + VULNERABILITY_LEVEL_MEDIUM = 3; + VULNERABILITY_LEVEL_HIGH = 4; + VULNERABILITY_LEVEL_CRITICAL = 5; +} + + +message VulnerabilityInfo { + + string description = 1; + + uint64 buganizer_number = 2; + + VulnerabilityLevel vulnerability_level = 3; +} + + +enum VerificationLevel { + VERIFICATION_LEVEL_UNSPECIFIED = 0; + VERIFICATION_LEVEL_UNVERIFIED = 1; + VERIFICATION_LEVEL_VERIFIED = 2; + VERIFICATION_LEVEL_VERIFIED_GTS = 3; +} + +message VerificationInfo { + + VerificationLevel level = 1; + + string proof = 2; + + string notes = 3; +} + + + + + + +message AndroidAttestationKeybox { + + + bytes ecdsa_private_key = 1; + + + + repeated bytes ecdsa_cert = 2; + + + bytes rsa_private_key = 3; + + + + repeated bytes rsa_cert = 4; + + + uint32 attestation_keybox_id = 5; +} + + +enum AttestationMethod { + ATTESTATION_METHOD_UNSPECIFIED = 0; + + ATTESTATION_METHOD_KEY_UPLOAD = 1; + + ATTESTATION_METHOD_VERIFIER_KEY = 2; +} + +extend google.protobuf.EnumValueOptions { + string string_name = 123456789; +} + + + +enum OemCryptoVersion { + OEM_CRYPTO_V_UNKNOWN = 0 [(string_name) = "unknown"]; + OEM_CRYPTO_V9 = 1 [(string_name) = "9"]; + OEM_CRYPTO_V10 = 2 [(string_name) = "10"]; + OEM_CRYPTO_V10_1 = 3 [(string_name) = "10.1"]; + OEM_CRYPTO_V10_2 = 4 [(string_name) = "10.2"]; + OEM_CRYPTO_V10_3 = 5 [(string_name) = "10.3"]; + OEM_CRYPTO_V11 = 6 [(string_name) = "11"]; + OEM_CRYPTO_V11_1 = 7 [(string_name) = "11.1"]; + OEM_CRYPTO_V11_2 = 8 [(string_name) = "11.2"]; + OEM_CRYPTO_V12 = 9 [(string_name) = "12"]; + OEM_CRYPTO_V13 = 10 [(string_name) = "13"]; + OEM_CRYPTO_V13_1 = 11 [(string_name) = "13.1"]; + OEM_CRYPTO_V13_2 = 12 [(string_name) = "13.2"]; + OEM_CRYPTO_V14 = 13 [(string_name) = "14"]; + OEM_CRYPTO_V14_1 = 14 [(string_name) = "14.1"]; + OEM_CRYPTO_V15 = 15 [(string_name) = "15"]; + OEM_CRYPTO_V15_1 = 16 [(string_name) = "15.1"]; + OEM_CRYPTO_V15_2 = 17 [(string_name) = "15.2"]; + OEM_CRYPTO_V16 = 18 [(string_name) = "16"]; + OEM_CRYPTO_V16_1 = 19 [(string_name) = "16.1"]; + OEM_CRYPTO_V16_2 = 20 [(string_name) = "16.2"]; + OEM_CRYPTO_V16_3 = 21 [(string_name) = "16.3"]; + OEM_CRYPTO_V16_4 = 22 [(string_name) = "16.4"]; + OEM_CRYPTO_V17 = 23 [(string_name) = "17"]; + OEM_CRYPTO_V17_1 = 24 [(string_name) = "17.1"]; + OEM_CRYPTO_V17_1_1 = 25 [(string_name) = "17.1.1"]; + OEM_CRYPTO_V18 = 26 [(string_name) = "18"]; + OEM_CRYPTO_V18_1 = 27 [(string_name) = "18.1"]; + OEM_CRYPTO_V18_3 = 28 [(string_name) = "18.3"]; + OEM_CRYPTO_V18_4 = 29 [(string_name) = "18.4"]; + OEM_CRYPTO_V18_5 = 30 [(string_name) = "18.5"]; + OEM_CRYPTO_V19 = 31 [(string_name) = "19"]; + OEM_CRYPTO_V19_1 = 32 [(string_name) = "19.1"]; + OEM_CRYPTO_V19_2 = 33 [(string_name) = "19.2"]; + OEM_CRYPTO_V19_3 = 34 [(string_name) = "19.3"]; + OEM_CRYPTO_V19_4 = 35 [(string_name) = "19.4"]; + OEM_CRYPTO_V19_5 = 36 [(string_name) = "19.5"]; + OEM_CRYPTO_V19_6 = 37 [(string_name) = "19.6"]; + OEM_CRYPTO_V19_7 = 38 [(string_name) = "19.7"]; + OEM_CRYPTO_V20_0 = 39 [(string_name) = "20.0"]; + OEM_CRYPTO_V20_1 = 40 [(string_name) = "20.1"]; + OEM_CRYPTO_V17_2 = 41 [(string_name) = "17.2"]; + OEM_CRYPTO_V17_4 = 42 [(string_name) = "17.4"]; + OEM_CRYPTO_V18_6 = 43 [(string_name) = "18.6"]; + OEM_CRYPTO_V17_5 = 44 [(string_name) = "17.5"]; + OEM_CRYPTO_V18_7 = 45 [(string_name) = "18.7"]; + OEM_CRYPTO_V17_6 = 46 [(string_name) = "17.6"]; + OEM_CRYPTO_V18_8 = 47 [(string_name) = "18.8"]; + OEM_CRYPTO_V17_7 = 48 [(string_name) = "17.7"]; + OEM_CRYPTO_V18_9 = 49 [(string_name) = "18.9"]; +} + + +enum AndroidPlatform { + ANDROID_PLATFORM_UNSPECIFIED = 0 [(string_name) = "unknown"]; + ANDROID_PLATFORM_MOBILE = 1 [(string_name) = "Mobile"]; + ANDROID_PLATFORM_TV = 2 [(string_name) = "TV"]; + ANDROID_PLATFORM_AUTO = 3 [(string_name) = "Auto"]; + ANDROID_PLATFORM_WEAR = 4 [(string_name) = "Wear"]; +} + + +enum AndroidApiLevel { + ANDROID_API_LEVEL_UNSPECIFIED = 0 [(string_name) = "unknown"]; + ANDROID_API_LEVEL_26 = 1 [(string_name) = "API 26/Android 8"]; + ANDROID_API_LEVEL_27 = 2 [(string_name) = "API 27/Android 8"]; + ANDROID_API_LEVEL_28 = 3 [(string_name) = "API 28/Android 9"]; + ANDROID_API_LEVEL_29 = 4 [(string_name) = "API 29/Android 10"]; + ANDROID_API_LEVEL_30 = 5 [(string_name) = "API 30/Android 11"]; + ANDROID_API_LEVEL_31 = 6 [(string_name) = "API 31/Android 12"]; + ANDROID_API_LEVEL_32 = 7 [(string_name) = "API 32/Android 12L"]; + ANDROID_API_LEVEL_33 = 8 [(string_name) = "API 33/Android 13"]; + ANDROID_API_LEVEL_34 = 9 [(string_name) = "API 34/Android 14"]; + ANDROID_API_LEVEL_35 = 10 [(string_name) = "API 35/Android 15"]; + ANDROID_VERSION_V16 = 11 [(string_name) = "Android 16"]; +} diff --git a/centos/protos/public/hash_algorithm.proto b/centos/protos/public/hash_algorithm.proto new file mode 100644 index 0000000..a8c5f86 --- /dev/null +++ b/centos/protos/public/hash_algorithm.proto @@ -0,0 +1,22 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +syntax = "proto3"; + +package video_widevine; + + +enum HashAlgorithmProto { + + + HASH_ALGORITHM_UNSPECIFIED = 0; + HASH_ALGORITHM_SHA_1 = 1; + HASH_ALGORITHM_SHA_256 = 2; + HASH_ALGORITHM_SHA_384 = 3; +} + diff --git a/centos/protos/public/provisioned_device_info.proto b/centos/protos/public/provisioned_device_info.proto new file mode 100644 index 0000000..a1be2b1 --- /dev/null +++ b/centos/protos/public/provisioned_device_info.proto @@ -0,0 +1,102 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2016 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + + + + +syntax = "proto2"; + +package video_widevine; + +import "protos/public/device_common.proto"; + +option java_package = "com.google.video.widevine.protos"; +option java_outer_classname = "ProvisionedDeviceInfoProto"; + + + +message ProvisionedDeviceInfo { + enum WvSecurityLevel { + + + LEVEL_UNSPECIFIED = 0; + LEVEL_1 = 1; + LEVEL_2 = 2; + LEVEL_3 = 3; + } + + + + + enum ProvisioningMethod { + + PROVISIONING_METHOD_UNSPECIFIED = 0; + + FACTORY_KEYBOX = 1; + + FACTORY_OEM_DEVICE_CERTIFICATE = 2; + + FACTORY_OEM_GROUP_CERTIFICATE = 3; + + FACTORY_DRM_GROUP_CERTIFICATE = 4; + + OTA_KEYBOX = 5; + + OTA_OEM_DEVICE_CERTIFICATE = 6; + + OTA_OEM_GROUP_CERTIFICATE = 7; + + OTA_DRM_DEVICE_CERTIFICATE = 8; + + OTA_OEM_DEVICE_CERTIFICATE_SIGMA_210 = 9; + + OTA_ANDROID_ATTESTATION_KEYBOX = 10; + + OTA_OEM_DEVICE_CERTIFICATE_PROVISIONING_4 = 11; + + OTA_DRM_DEVICE_CERTIFICATE_DRM_REPROVISIONING = 12; + } + + + optional uint32 system_id = 1; + + optional string soc = 2; + + optional string manufacturer = 3; + + + optional string model = 4; + + optional string device_type = 5; + + optional uint32 model_year = 6; + + optional WvSecurityLevel security_level = 7 [default = LEVEL_UNSPECIFIED]; + + + optional bool test_device = 8 [default = false]; + + optional ProvisioningMethod provisioning_method = 9; + + repeated DeviceModel model_info = 10; + + optional Platform platform = 11; + + optional DeviceState device_state = 12; + + optional VulnerabilityLevel vulnerability_level = 13; + + optional VerificationLevel verification_level = 14; + + optional uint32 provider_key_version = 15; + + optional bytes public_key_encryption_key = 16 + ; + + optional CertificateKeyType certificate_key_type = 17; +} diff --git a/centos/sdk/examples/license_server_sdk/cpp/BUILD b/centos/sdk/examples/license_server_sdk/cpp/BUILD new file mode 100644 index 0000000..2a0d73c --- /dev/null +++ b/centos/sdk/examples/license_server_sdk/cpp/BUILD @@ -0,0 +1,59 @@ +######################################## +## Copyright 2018 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +# Build file for targets to export license server SDK examples. + +package( + default_visibility = ["//visibility:public"], +) + +filegroup( + name = "wvpl_binary_release_files_cpp", + srcs = [ + "wvpl_license_sdk_example.cc", + "wvpl_license_sdk_using_dsp_example.cc", + ], +) + +LICENSE_SDK_HEADER_FILES = [ +"//common:exported_sdk_header_files", +"//sdk/external/cpp/wvpl/common:exported_sdk_header_files", +"//sdk/external/cpp/wvpl/license_server_sdk:exported_sdk_header_files", +"//util:exported_sdk_header_files", +] + +# This file created by previous bazel build step. +# libwvpl_license_sdk.so directly copied to this directory for this build target. +cc_import( +name = "local_sdk_so", +shared_library = "libwvpl_license_sdk.so", +) + +cc_binary( +name = "wvpl_license_sdk_example", +srcs = [ +"wvpl_license_sdk_example.cc", +] + LICENSE_SDK_HEADER_FILES, +deps = [ +":local_sdk_so", +"@abseil_repo//absl/strings", +"@abseil_repo//absl/synchronization", +], +) + +cc_binary( +name = "wvpl_license_sdk_using_dsp_example", +srcs = [ +"wvpl_license_sdk_using_dsp_example.cc", +] + LICENSE_SDK_HEADER_FILES, +deps = [ +":local_sdk_so", +"@abseil_repo//absl/strings", +"@abseil_repo//absl/synchronization", +], +) diff --git a/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_example.cc b/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_example.cc new file mode 100755 index 0000000..875bd5f --- /dev/null +++ b/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_example.cc @@ -0,0 +1,316 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include +#include +#include +#include +#include + +#include "absl/strings/escaping.h" +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h" + +using ::video_widevine_server::wv_pl_sdk::HDCP_V1; +using ::video_widevine_server::wv_pl_sdk::HDCP_V2; +using ::video_widevine_server::wv_pl_sdk::kDeviceCertificateExpiration; +using ::video_widevine_server::wv_pl_sdk::kDrmCertificateType; +using ::video_widevine_server::wv_pl_sdk::VIDEO_HD; +using ::video_widevine_server::wv_pl_sdk::VIDEO_SD; +using ::video_widevine_server::wv_pl_sdk::WvPLCapabilityStatus; +using ::video_widevine_server::wv_pl_sdk::WvPLDeviceStatusOptions; +using ::video_widevine_server::wv_pl_sdk::WvPLEnvironment; +using ::video_widevine_server::wv_pl_sdk::WvPLKey; +using ::video_widevine_server::wv_pl_sdk::WvPLPlaybackPolicy; +using ::video_widevine_server::wv_pl_sdk::WvPLSession; +using ::video_widevine_server::wv_pl_sdk::WvPLSessionInit; +using ::video_widevine_server::wv_pl_sdk::WvPLStatus; + +constexpr uint32_t kSystemId = 0x112; +constexpr char kKeyBytes1[] = + "\x69\xea\xa8\x02\xa6\x76\x3a\xf9\x79\xe8\xd1\x94\x0f\xb8\x83\x92"; +constexpr char kKeyId1[] = + "\xab\xba\x27\x1e\x8b\xcf\x55\x2b\xbd\x2e\x86\xa4\x34\xa9\xa5\xd9"; +constexpr char kKeyBytes2[] = + "\xa4\x63\x1a\x15\x3a\x44\x3d\xf9\xee\xd0\x59\x30\x43\xdb\x75\x19"; +constexpr char kKeyId2[] = + "\xf3\xc5\xe0\x36\x1e\x66\x54\xb2\x8f\x80\x49\xc7\x78\xb2\x39\x46"; +constexpr char kKeyId3[] = + "\x10\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"; +constexpr char kKeyBytes3[] = + "\x10\x20\x30\x40\x50\x60\x70\x80\x90\xa0\xb0\xc0\xd0\xe0\xf0\x10"; + +constexpr char kPreProvisioningKey[] = "f7538b38acc78ec68c732ac665c55c65"; +constexpr char kValidCertList[] = + "{" + "\"kind\": \"certificateprovisioning#certificateStatusListResponse\"," + "\"signedList\": \"" + "CisIhdC/" + "9gUSIwoNc2VyaWFsLW51bWJlciIQCJICGgRtYWtlIgVtb2RlbDAeEoADMI21pWCKSrmyeUAiCT" + "gkYwrZsXXHKsDQ7J9pkNbZTYj5kqpa/WaXQDWV3KNsEAf0a9FERSFr1V/" + "Vr3oEwOVZ8pA2uHY7KA/ghY7FByzDYA8GQyofi8XV/m27QL/o2iu1YQXkO87l37/" + "RdWY1gHzqiwbiCXJsPqD4+S2g9o5/hwlDOzHToqylUS2rj5iBO/" + "0fkuxKnWbxU0+PCcV2cuUhBv+jqOg8wDAw3/9HJEiUAzH7la/" + "f8nZQMUj1AOBZuKbgdobIPNs9tj3cCRKDIY8DomfceZgJO+" + "DHtxdggeZoBfq8jiFS5NynMx7OcINT3LRPmJ6opTwMhF5uurXRmRDXxJ/E+Z5bTCEbxCZ/" + "6rhr+faGam9tDZHxHuetDPx5l2mfQnF7lY7Te+FChv+" + "xIc93FvqNYF3TCZui3LYoqqPylijzLNZ7dPaVZ7hN/cFPJVudA/" + "eHq6ElmJquoKd5022d6Rin6oFymJUKF7FKRKfIkepkgncT5C/kI3/tX6nilNb6" + "\" }"; + +/** Example of how to use WvPL API. */ + +int main(int argc, char** argv) { + + // -- Set up WvPLEnvironment. + + std::map config; + // Set device certificate expiration time to 10 years (10 * 365 * 24 * 3600). + // Note that in practice, the expiration should not be 10 years long. + // Certificate status list should be updated periodically. + config[kDeviceCertificateExpiration] = "315360000"; + + // The DCSL and service certificate used in this example are for "development" + // and will not work with Widevine's production servers. Replace "dev" with + // "prod" when using production certificates. + config[kDrmCertificateType] = "dev"; + + // Set parameters on the environment. + WvPLEnvironment wvpl_env(config); + WvPLStatus status = wvpl_env.Initialize(); + if (!status.ok()) { + std::cerr << "Failed to Initialize environment: " << status.error_message() + << std::endl; + return status.error_code(); + } + + // The preProvKeys map takes a device systemID as the key and an associated + // preprovisioning key as the value. + std::map prev_prov_keys; + prev_prov_keys[kSystemId] = kPreProvisioningKey; + status = wvpl_env.SetPreProvisioningKeys(prev_prov_keys); + if (!status.ok()) { + std::cerr << "Failed to set pre-prov keys: " << status.error_message() + << std::endl; + return status.error_code(); + } + + std::string b64DrmServiceCertificate = + "CsMCCAMSENU2hMYAMrDf+" + "Z9TlWepj1UY7eXE9gUijgIwggEKAoIBAQCqBNtJ830093pLL7h0daCvCUY7WQ8nrNfyYa5NI" + "TMR8V6JxHUtykxzMP2FR6cgJb0NPXQXg3U6kTqHClUYu2OOHjoSi68LtbTL4S+7d/" + "b1NqOhLLLQqiRXUOfZE4BrSJx0W+bUrzLOFgl+xmMv5jlNpdFLhn1+/" + "QOs0u2dxen+yCDoXIOVbFtQtA3RB+sRxvjaOwW4u5dqMj2Xzd/" + "JjWiAwgDAMe3g256M2s+5ZzZ1CnZv6KWPwKzQKXzO/O/" + "bSGrMz9K9T1kRVPPnq8FAiXh2IY+" + "JZ5EcPwrbcdEmiMWxf7bWv3Pk9vSSC8ZDUUI4oBdocf6TCEFKFq1uZBXP0VGbAgMBAAE6Emh" + "hbWlkLXd2cGwtc2RrLXVhdEABSAESgAO0xjYXyZAJ7UNU0N5duOxRkSjlZW7DcqYE5DH8T9n" + "QzCZ/PHPraiWcOaHxyG1sR6Vn6zW7EFV4izXWPI0BTI6Kys/3fQmbstX71om2h8lm3+zOh/" + "baLl605RaIpTCHdQj5hfoxs/nn6CI+VxxxD8L1JiGXbcg0/" + "noSHMJorOq+sDJDK6aYqZDEtrJaY6DfZa+IAK7Nn/" + "WDWVpefrVJwP2h2chjKpYSbOVxRnpqWqWVxT30ROyJwF1BA9F/" + "dMeqTyeyzk1fMfVRQuHaaFqYz6HazSg7dqoXGEKTonN9kHWXTzdPY5jhdXO3vOu4U1k9LzSM" + "4Gnb/" + "8K2F2vQQECskoGkGTF85NB2vyXA95FJa5ExwCXrTnCuBZOLOsR6wwazn5H0gDAmqbTxm2I0r" + "7Ar7IrU8z9v83k1171RDk9xHO+yJD6eFQSyk9stqQH/dNU1DPjCaMylk8ysQ/" + "8XYRj9O0LBEsT2oC4Y7lFd17/NqJeOGvOwVgUmQ/lIVNMmZajEqz0="; + + std::string b64EncryptedProviderKeyConfig = + "ChJoYW1pZC13dnBsLXNkay11YXQSENU2hMYAMrDf+Z9TlWepj1Ua0AHd4Ov+L/" + "2wwOhiCSmULAExqAav8E8Ori0F2/" + "fIjdP4dCU+1M5EGJgMQhoyrYz9VFpUpFm9nFZdMhcafHjcKkN4NUVeH24xbJDPIN2+" + "B9TyRmqVYR+2iIqrHnIRwd8jJMOy8X6tS3hi1fJk7JFYRnPHPhkiUANkV/" + "4pAZINquNkFnoswt7oo40dFv+ztgrIbkofXdW/" + "COJYZKWdVM27RFWk0VxSTglYMVPkXTNSwhR+i6DpB11ZwAFXw2ndiFYd3Skx47knYGobNW/" + "kUV7azqnUIhDdntgweqt2QSyUFYa4c99MKoACBTGaIdLXmRh6sVRhQ4f6pYWEK+b+Kf/" + "9cGItNmH4Y+3Pzpr61wmV8b8NIju2ztRuOR+gzQwyWWoqZh3otqnpd6Fds4Bs+4+" + "FQRLOTSBoV9d6JFKvokLtCqFDPWTHVZnKX9PKcjng6MNwGjwMlYELam7qWwXElXKjvBZGNEx" + "INA5v97xF+" + "CCCXysVAxC8MQmRQA9rDBhroN2akkrk1qau4L7Nb3T8oKIGEfiwHcENP2TlgDzmRK9W//" + "+tFnZLJ1e12L1Vd390pV4G9cLOrTkF368LZ4lykOHeIQ1jgvUjuGk0uEwzi+" + "hHDyA7WtbtpUXbteq8ytD9MUvIOGVyHwRnzw=="; + + std::string b64PrivateKey = + "MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQI4UNtEZV1vrkCAggAMBQGCCqG" + "SIb3DQMHBAhSpl2tcdfcVwSCBMi7K5Ne/XsAB49mm0gIQ1BCTiIfdzuS/OO0Z3xoUry9/" + "Z50vE6aAkqLbvP7XbWltDU+jzjkjoAnkEUJ56Njifd7EhTSN7M6W6x2mC7c+" + "qgdVW7XqR8iKIpULYaU9txNadwl1p1iP0MoKN0cORXKHzhgUPaTkUKiseCMVdCsImPrDlBrm" + "s+jeyft8YwPpUlCxFLTQo+F9HmxKBKxYcEs1g9EByrXCrIx1oHAJBgCihFOi+" + "qFC2HQJex54tx1QEf/" + "bb5G7xW3vD4T3fZU9by9GNKq9MOVsARmy7ozvDeark6f+" + "MxCuUhVvRqRK4EC3YiaVj9GB6kqWA1UjldF+" + "HFHsqs6qV2J6HNs42JL7N9PQTJJx6Xdxp7f7PjgsJUslZeiyW+uZ8wIpMsBg4NtOkcbgb+" + "ijGiPGYCPMv7mVFWqyMeSM+BQN3NF48P/" + "VHfHQ9CmX41uE8+" + "IhXdi1b4fjenUIKcJ95yoB1yauZGBRBdvjjrZtduczYnoJd9BYCbEYErRC5cvNU+" + "FzYEUYKqUBLc25RWd8hg/" + "NGiaC7YwCJjI59o7SGgY1BFuPuEaehJ60OvbgJiyBofAGOMulrF+" + "Quf6QFgltUFnOIpcXhll9/" + "C+" + "RWW6uLXfxZICt3F6Z4dq9xZi5ZSUzZVsdLtbYAP4QLXTqGTgPA7FdFvHrhf3GJTIppE2a58x" + "uEkVkXl2cqYSuat4QGRxNrleJ55gWvZKIzIN2j85Jk2E9UljNURso/9FIsEF/" + "S2Js77nvn5t40VNdzhUvSjDkD8S75hlyHMTFbc/" + "9yOlrUWT2AP+veMnzgR5wltQ32qgkujBj7ogHz+0/" + "RvpBKyvmHI+mvmqm6aS22yEjQ6jhyEN8mKZNPpgz94TFzYwP9s/qV+/" + "AllJNQ0ruMue9gUKYu381u/" + "F0eLG4ZORinxnxMtWQhpB7cR71nBmt2SYicg2moqKc9hQ7JRJ7g0V07AjWByRRHaOwgJ/" + "YBsCaVeyMl8ynKpWB9r8AW9qKaf79JC+brcWrel8S+YKHX8akmTrs0gSzI+M0hBGqp3f/" + "xnRiAuBXLGZ8Vm2YqsJpFYGyFKBoPUinCuoDLWJnbWt3GBAvHp8OWry67Ldz6vcQmh0eEWmi" + "qIzHGGw2eti2BNpJwATXZ7CfETB9jlHfk4vPZlTWzuzBaQtExLNGXJbgXDJeaTxVdZ7JU2ul" + "S4VgmBAUZnXXJYBgNc1qCCnijFX/R06hN3LrG/" + "d5odxQCfhIMuSieaTrWuoqBYxxi5dLzarRRp9DySURt9JepyOps9sPBfvLh5iDy2LQ2dWbmS" + "A/" + "rqsaV+" + "8z4v4Y1gDJCmKFMa2GPNSlJDqjASw8tDDMXL4dwYb2RcWLCHM5CXJAnxSE4ZpHvf0dwAyDqg" + "hikih9D7CvOwGdv7oVW6/" + "tTdoOo+WkrQtgmRfboxX9Spin+vL1ia2jW2VugSMQbEhTkKH+" + "NE0TC6VGsvPJt0wLLhzRMzTEeT05Zl4QpeCKUmHFM4LIXWcACQ8L1Q0YjOXg733q/" + "fs2kmXsHV9TG5kqHemGIf7t0baF7ibzwnl7F+GGWmg/" + "dQ1RdM7T0p5wRtqHK0wAKxG8hxZkejHPBnV9GYK8QUOlxnE7tVM2Sv6QmTOKGXGKDRBsoacm" + "BaGLiE="; + + std::string b64DecodedDrmServiceCertificate; + std::string b64DecodedEncryptedProviderKeyConfig; + std::string b64DecodedPrivateKey; + if (!absl::Base64Unescape(b64DrmServiceCertificate, + &b64DecodedDrmServiceCertificate)) { + std::cerr << "Failed to decode ServiceCertificate." << std::endl; + return 1; + } + if (!absl::Base64Unescape(b64EncryptedProviderKeyConfig, + &b64DecodedEncryptedProviderKeyConfig)) { + std::cerr << "Failed to decode EncryptedProviderKeyConfig." << std::endl; + return 1; + } + if (!absl::Base64Unescape(b64PrivateKey, &b64DecodedPrivateKey)) { + std::cerr << "Failed to decode PrivateKey." << std::endl; + return 1; + } + // Must set a valid drm service certificate, otherwise it will failed to + // create session. + std::string passphrase = "encryptallthekitties"; + status = wvpl_env.SetDrmServiceCertificate(b64DecodedDrmServiceCertificate, + b64DecodedPrivateKey, passphrase); + if (!status.ok()) { + std::cerr << "Failed to set DrmServiceCertificate: " + << status.error_message() << std::endl; + return status.error_code(); + } + + // If using provider keys: set an encrypted provider key config. Note that the + // service certificate has to be set first. + status = wvpl_env.SetEncryptedProviderKeyConfig( + b64DecodedEncryptedProviderKeyConfig); + if (!status.ok()) { + std::cerr << "Failed to set an encrypted provider key config: " + << status.error_message() << std::endl; + return status.error_code(); + } + + // Set a valid device certificate status list. + status = wvpl_env.SetDeviceCertificateStatusList(kValidCertList); + if (!status.ok()) { + std::cerr << "Failed to update the certificate status list: " + << status.error_message() << std::endl; + return status.error_code(); + } + + // -- Create the DRM session. + WvPLSession* session = nullptr; + + // Set the license request. + const char kLicenseRequestExample[] = + "\x12\x90\x01\x0a\x58\x08\x00\x12\x48\x00\x00\x00\x02\x00\x00\x01\x12\x8e" + "\x1e\xbf\xe0\x37\x82\x80\x96\xca\x65\x38\xb4\xf6\xf4\xbc\xb5\x1c\x2b\x71" + "\x91\xcf\x03\x7e\x98\xbe\xaa\x24\x92\x49\x07\xe1\x28\xf9\xff\x49\xb5\x4a" + "\x16\x5c\xd9\xc3\x3e\x65\x47\x53\x7e\xb4\xd2\x9f\xb7\xe8\xdf\x3c\x2c\x1c" + "\xd9\x25\x17\xa1\x2f\x49\x22\x95\x3e\x1a\x0a\x0a\x03\x66\x6f\x6f\x12\x03" + "\x62\x61\x72\x12\x2c\x12\x2a\x0a\x10\x30\x31\x32\x33\x34\x35\x36\x37\x38" + "\x39\x41\x42\x43\x44\x45\x46\x10\x01\x1a\x14\x6d\x79\x43\x6f\x6f\x6c\x52" + "\x65\x71\x75\x65\x73\x74\x2c\x20\x44\x75\x64\x65\x21\x18\x01\x20\x9d\x88" + "\xf7\x8a\x05\x1a\x20\xac\xc0\x12\xac\xcd\x1a\xac\x9f\x11\xaa\x84\xbf\xd1" + "\x6f\x01\x44\x8a\xd5\x00\xb8\x60\x2e\x26\x9d\xd2\x71\x7e\x0b\x26\x55\x31" + "\x83"; + + status = + wvpl_env.CreateSession(std::string(std::begin(kLicenseRequestExample), + std::end(kLicenseRequestExample) - 1), + &session); + if (!status.ok()) { + std::cerr << "Failed to create session: " << status.error_message() + << std::endl; + return status.error_code(); + } + // -- Inspect the request. + // Set parameters on the created session. + + // Set policy parameters + WvPLPlaybackPolicy policy; + policy.set_license_duration_seconds(604800); + policy.set_playback_duration_seconds(86400); + session->set_policy(policy); + + // Set key parameters + WvPLKey wvpl_key1; + // Key bytes and key id must be in bytes. + wvpl_key1.set_key_id(kKeyId1); + wvpl_key1.set_key_bytes(kKeyBytes1); + wvpl_key1.set_track_type(VIDEO_HD); + wvpl_key1.mutable_output_protection()->set_hdcp(HDCP_V1); + wvpl_key1.mutable_output_protection()->set_secure_data_path(true); + status = session->AddKey(wvpl_key1); + if (!status.ok()) { + std::cerr << "Failed to add key: " << status.error_message() << std::endl; + return status.error_code(); + } + + WvPLKey wvpl_key2; + wvpl_key2.set_key_id(kKeyId2); + wvpl_key2.set_key_bytes(kKeyBytes2); + wvpl_key2.set_track_type(VIDEO_SD); + wvpl_key2.mutable_requested_output_protection()->set_hdcp(HDCP_V2); + wvpl_key2.mutable_requested_output_protection()->set_secure_data_path(false); + status = session->AddKey(wvpl_key2); + if (!status.ok()) { + std::cerr << "Failed to add key: " << status.error_message() << std::endl; + return status.error_code(); + } + + // We also could use filterKey to filter out the key. + WvPLKey filtered_key1; + filtered_key1.set_key_id(kKeyId3); + filtered_key1.set_key_bytes(kKeyBytes3); + filtered_key1.set_track_type(VIDEO_HD); + WvPLCapabilityStatus capability_status = session->FilterKey(filtered_key1); + if (!capability_status.ok()) { + std::cerr << "Failed to add filtered key: " << capability_status.status() + << std::endl; + } + + // Set SessionInit + WvPLDeviceStatusOptions wvpl_device_status_options; + wvpl_device_status_options.set_allow_test_only_system_id(true); + WvPLSessionInit wvpl_session_init; + wvpl_session_init.set_device_status_options(wvpl_device_status_options); + session->set_session_init(wvpl_session_init); + + // -- Generate the license + + std::string license_response; + status = session->GenerateLicense(&license_response); + if (!status.ok()) { + std::cerr << "Failed to generate license: " << status.error_message() + << std::endl; + return status.error_code(); + } + std::cout << "Generated license: " << absl::BytesToHexString(license_response) + << std::endl; + return 0; +} diff --git a/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_using_dsp_example.cc b/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_using_dsp_example.cc new file mode 100755 index 0000000..8cfe1d3 --- /dev/null +++ b/centos/sdk/examples/license_server_sdk/cpp/wvpl_license_sdk_using_dsp_example.cc @@ -0,0 +1,441 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2021 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include +#include +#include +#include +#include +#include +#include + +#include "absl/strings/escaping.h" +#include "absl/strings/string_view.h" +#include "common/status.h" +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h" + +using ::video_widevine_server::wv_pl_sdk::HDCP_NONE; +using ::video_widevine_server::wv_pl_sdk::HDCP_V1; +using ::video_widevine_server::wv_pl_sdk::kDeviceCertificateExpiration; +using ::video_widevine_server::wv_pl_sdk::kDrmCertificateType; +using ::video_widevine_server::wv_pl_sdk::VIDEO_HD; +using ::video_widevine_server::wv_pl_sdk::VIDEO_SD; +using ::video_widevine_server::wv_pl_sdk::WvPLCapabilityStatus; +using ::video_widevine_server::wv_pl_sdk::WvPLDeviceStatusOptions; +using ::video_widevine_server::wv_pl_sdk::WvPLEnvironment; +using ::video_widevine_server::wv_pl_sdk::WvPLKey; +using ::video_widevine_server::wv_pl_sdk::WvPLPlaybackPolicy; +using ::video_widevine_server::wv_pl_sdk::WvPLSession; +using ::video_widevine_server::wv_pl_sdk::WvPLSessionInit; +using ::video_widevine_server::wv_pl_sdk::WvPLStatus; + +constexpr uint32_t kSystemId = 0x112; +constexpr char kKeyBytes1[] = + "\x69\xea\xa8\x02\xa6\x76\x3a\xf9\x79\xe8\xd1\x94\x0f\xb8\x83\x92"; +constexpr char kKeyId1[] = + "\xab\xba\x27\x1e\x8b\xcf\x55\x2b\xbd\x2e\x86\xa4\x34\xa9\xa5\xd9"; +constexpr char kKeyBytes2[] = + "\xa4\x63\x1a\x15\x3a\x44\x3d\xf9\xee\xd0\x59\x30\x43\xdb\x75\x19"; +constexpr char kKeyId2[] = + "\xf3\xc5\xe0\x36\x1e\x66\x54\xb2\x8f\x80\x49\xc7\x78\xb2\x39\x46"; +constexpr char kKeyId3[] = + "\x10\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"; +constexpr char kKeyBytes3[] = + "\x10\x20\x30\x40\x50\x60\x70\x80\x90\xa0\xb0\xc0\xd0\xe0\xf0\x10"; +constexpr char kPreProvisioningKey[] = "f7538b38acc78ec68c732ac665c55c65"; +constexpr char kValidCertList[] = + "{" + "\"kind\": \"certificateprovisioning#certificateStatusListResponse\"," + "\"signedList\": \"" + "CisIhdC/" + "9gUSIwoNc2VyaWFsLW51bWJlciIQCJICGgRtYWtlIgVtb2RlbDAeEoADMI21pWCKSrmyeUAiCT" + "gkYwrZsXXHKsDQ7J9pkNbZTYj5kqpa/WaXQDWV3KNsEAf0a9FERSFr1V/" + "Vr3oEwOVZ8pA2uHY7KA/ghY7FByzDYA8GQyofi8XV/m27QL/o2iu1YQXkO87l37/" + "RdWY1gHzqiwbiCXJsPqD4+S2g9o5/hwlDOzHToqylUS2rj5iBO/" + "0fkuxKnWbxU0+PCcV2cuUhBv+jqOg8wDAw3/9HJEiUAzH7la/" + "f8nZQMUj1AOBZuKbgdobIPNs9tj3cCRKDIY8DomfceZgJO+" + "DHtxdggeZoBfq8jiFS5NynMx7OcINT3LRPmJ6opTwMhF5uurXRmRDXxJ/E+Z5bTCEbxCZ/" + "6rhr+faGam9tDZHxHuetDPx5l2mfQnF7lY7Te+FChv+" + "xIc93FvqNYF3TCZui3LYoqqPylijzLNZ7dPaVZ7hN/cFPJVudA/" + "eHq6ElmJquoKd5022d6Rin6oFymJUKF7FKRKfIkepkgncT5C/kI3/tX6nilNb6" + "\" }"; +constexpr char b64DrmServiceCertificate[] = + "CsMCCAMSENU2hMYAMrDf+" + "Z9TlWepj1UY7eXE9gUijgIwggEKAoIBAQCqBNtJ830093pLL7h0daCvCUY7WQ8nrNfyYa5NI" + "TMR8V6JxHUtykxzMP2FR6cgJb0NPXQXg3U6kTqHClUYu2OOHjoSi68LtbTL4S+7d/" + "b1NqOhLLLQqiRXUOfZE4BrSJx0W+bUrzLOFgl+xmMv5jlNpdFLhn1+/" + "QOs0u2dxen+yCDoXIOVbFtQtA3RB+sRxvjaOwW4u5dqMj2Xzd/" + "JjWiAwgDAMe3g256M2s+5ZzZ1CnZv6KWPwKzQKXzO/O/" + "bSGrMz9K9T1kRVPPnq8FAiXh2IY+" + "JZ5EcPwrbcdEmiMWxf7bWv3Pk9vSSC8ZDUUI4oBdocf6TCEFKFq1uZBXP0VGbAgMBAAE6Emh" + "hbWlkLXd2cGwtc2RrLXVhdEABSAESgAO0xjYXyZAJ7UNU0N5duOxRkSjlZW7DcqYE5DH8T9n" + "QzCZ/PHPraiWcOaHxyG1sR6Vn6zW7EFV4izXWPI0BTI6Kys/3fQmbstX71om2h8lm3+zOh/" + "baLl605RaIpTCHdQj5hfoxs/nn6CI+VxxxD8L1JiGXbcg0/" + "noSHMJorOq+sDJDK6aYqZDEtrJaY6DfZa+IAK7Nn/" + "WDWVpefrVJwP2h2chjKpYSbOVxRnpqWqWVxT30ROyJwF1BA9F/" + "dMeqTyeyzk1fMfVRQuHaaFqYz6HazSg7dqoXGEKTonN9kHWXTzdPY5jhdXO3vOu4U1k9LzSM" + "4Gnb/" + "8K2F2vQQECskoGkGTF85NB2vyXA95FJa5ExwCXrTnCuBZOLOsR6wwazn5H0gDAmqbTxm2I0r" + "7Ar7IrU8z9v83k1171RDk9xHO+yJD6eFQSyk9stqQH/dNU1DPjCaMylk8ysQ/" + "8XYRj9O0LBEsT2oC4Y7lFd17/NqJeOGvOwVgUmQ/lIVNMmZajEqz0="; + +constexpr char b64PrivateKey[] = + "MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQI4UNtEZV1vrkCAggAMBQGCCqG" + "SIb3DQMHBAhSpl2tcdfcVwSCBMi7K5Ne/XsAB49mm0gIQ1BCTiIfdzuS/OO0Z3xoUry9/" + "Z50vE6aAkqLbvP7XbWltDU+jzjkjoAnkEUJ56Njifd7EhTSN7M6W6x2mC7c+" + "qgdVW7XqR8iKIpULYaU9txNadwl1p1iP0MoKN0cORXKHzhgUPaTkUKiseCMVdCsImPrDlBrm" + "s+jeyft8YwPpUlCxFLTQo+F9HmxKBKxYcEs1g9EByrXCrIx1oHAJBgCihFOi+" + "qFC2HQJex54tx1QEf/" + "bb5G7xW3vD4T3fZU9by9GNKq9MOVsARmy7ozvDeark6f+" + "MxCuUhVvRqRK4EC3YiaVj9GB6kqWA1UjldF+" + "HFHsqs6qV2J6HNs42JL7N9PQTJJx6Xdxp7f7PjgsJUslZeiyW+uZ8wIpMsBg4NtOkcbgb+" + "ijGiPGYCPMv7mVFWqyMeSM+BQN3NF48P/" + "VHfHQ9CmX41uE8+" + "IhXdi1b4fjenUIKcJ95yoB1yauZGBRBdvjjrZtduczYnoJd9BYCbEYErRC5cvNU+" + "FzYEUYKqUBLc25RWd8hg/" + "NGiaC7YwCJjI59o7SGgY1BFuPuEaehJ60OvbgJiyBofAGOMulrF+" + "Quf6QFgltUFnOIpcXhll9/" + "C+" + "RWW6uLXfxZICt3F6Z4dq9xZi5ZSUzZVsdLtbYAP4QLXTqGTgPA7FdFvHrhf3GJTIppE2a58x" + "uEkVkXl2cqYSuat4QGRxNrleJ55gWvZKIzIN2j85Jk2E9UljNURso/9FIsEF/" + "S2Js77nvn5t40VNdzhUvSjDkD8S75hlyHMTFbc/" + "9yOlrUWT2AP+veMnzgR5wltQ32qgkujBj7ogHz+0/" + "RvpBKyvmHI+mvmqm6aS22yEjQ6jhyEN8mKZNPpgz94TFzYwP9s/qV+/" + "AllJNQ0ruMue9gUKYu381u/" + "F0eLG4ZORinxnxMtWQhpB7cR71nBmt2SYicg2moqKc9hQ7JRJ7g0V07AjWByRRHaOwgJ/" + "YBsCaVeyMl8ynKpWB9r8AW9qKaf79JC+brcWrel8S+YKHX8akmTrs0gSzI+M0hBGqp3f/" + "xnRiAuBXLGZ8Vm2YqsJpFYGyFKBoPUinCuoDLWJnbWt3GBAvHp8OWry67Ldz6vcQmh0eEWmi" + "qIzHGGw2eti2BNpJwATXZ7CfETB9jlHfk4vPZlTWzuzBaQtExLNGXJbgXDJeaTxVdZ7JU2ul" + "S4VgmBAUZnXXJYBgNc1qCCnijFX/R06hN3LrG/" + "d5odxQCfhIMuSieaTrWuoqBYxxi5dLzarRRp9DySURt9JepyOps9sPBfvLh5iDy2LQ2dWbmS" + "A/" + "rqsaV+" + "8z4v4Y1gDJCmKFMa2GPNSlJDqjASw8tDDMXL4dwYb2RcWLCHM5CXJAnxSE4ZpHvf0dwAyDqg" + "hikih9D7CvOwGdv7oVW6/" + "tTdoOo+WkrQtgmRfboxX9Spin+vL1ia2jW2VugSMQbEhTkKH+" + "NE0TC6VGsvPJt0wLLhzRMzTEeT05Zl4QpeCKUmHFM4LIXWcACQ8L1Q0YjOXg733q/" + "fs2kmXsHV9TG5kqHemGIf7t0baF7ibzwnl7F+GGWmg/" + "dQ1RdM7T0p5wRtqHK0wAKxG8hxZkejHPBnV9GYK8QUOlxnE7tVM2Sv6QmTOKGXGKDRBsoacm" + "BaGLiE="; +constexpr char kLicenseRequestExample[] = + "\x12\x90\x01\x0a\x58\x08\x00\x12\x48\x00\x00\x00\x02\x00\x00\x01\x12\x8e" + "\x1e\xbf\xe0\x37\x82\x80\x96\xca\x65\x38\xb4\xf6\xf4\xbc\xb5\x1c\x2b\x71" + "\x91\xcf\x03\x7e\x98\xbe\xaa\x24\x92\x49\x07\xe1\x28\xf9\xff\x49\xb5\x4a" + "\x16\x5c\xd9\xc3\x3e\x65\x47\x53\x7e\xb4\xd2\x9f\xb7\xe8\xdf\x3c\x2c\x1c" + "\xd9\x25\x17\xa1\x2f\x49\x22\x95\x3e\x1a\x0a\x0a\x03\x66\x6f\x6f\x12\x03" + "\x62\x61\x72\x12\x2c\x12\x2a\x0a\x10\x30\x31\x32\x33\x34\x35\x36\x37\x38" + "\x39\x41\x42\x43\x44\x45\x46\x10\x01\x1a\x14\x6d\x79\x43\x6f\x6f\x6c\x52" + "\x65\x71\x75\x65\x73\x74\x2c\x20\x44\x75\x64\x65\x21\x18\x01\x20\x9d\x88" + "\xf7\x8a\x05\x1a\x20\xac\xc0\x12\xac\xcd\x1a\xac\x9f\x11\xaa\x84\xbf\xd1" + "\x6f\x01\x44\x8a\xd5\x00\xb8\x60\x2e\x26\x9d\xd2\x71\x7e\x0b\x26\x55\x31" + "\x83"; +constexpr char b64SerializedSignedDeviceSecurityProfiles[] = + "Cm0I45_P_" + "AUSLwoIZHNwX3Rlc3QQAhoECAAQACIGCAAQAyACKg13aWRldmluZV90ZXN0OgQIABAAEjQKC" + "GxpdmVkZW1vEAIaAggEIgIQASoNd2lkZXZpbmVfdGVzdDIFCNcIEAI6CAiDwrX6BRAAEoADb" + "oYJI5ouzml8W63DmiTBA7thzSl5OaKbyc1dAKGpHrMw-lTuUyrzULPm5nb_" + "st4YJk2w3F0k4Ly0lsRY_QweMSIechtcII5jO_9N2scy0y5V-lBRH_" + "7AtZFdfwD2wrseVCCarSyWDZN84-" + "6Wu3ekKbNO8vehiP8Tx2VWmkcIypJ09nPuTDxPT5CutLkgzlIS2q9HjwE5IK4nfC-" + "rx7seGgMxouyEb-QsTBtJ-Lx9O8D1GFMvOtHmfG-KfoD1L-" + "9lUT6j8W3TfyrUesnIDQy2bCCQzsbsNg60M9B-YZNvl6DX_-" + "PqE1CT2Lal7rp5TsZluOtwEj8TMBzyNl5kC5MAXZ3ETEFDag_9qEZrMJMIEsw194_lo_" + "o2ivjkiPNwCC00rJ91RI9gc2ctDlXUqtbqfz5-lx_v04VsI8AEYfuXmO8OBhFZwz4__" + "ZVwpI8fOtedm1KI46uCWZUwIi3yigYNJvgxoynzxVF8uMLTJi3iqiG5BAtrRImEt1iRVD8Ow" + "h4-GAI="; + +int GenerateLicenseUsingProfiles( + WvPLSession& session, absl::string_view content_owner, + const std::vector& qualified_profile_names, + std::string* license_response) { + // Set parameters on the created session. + // Set policy parameters. + WvPLPlaybackPolicy policy; + policy.set_license_duration_seconds(604800); + policy.set_playback_duration_seconds(86400); + session.set_policy(policy); + + // Set key parameters. + // Content keys are generated based on the info from qualifying profiles. + // The qualified profiles can be used to determine the content keys allowed + // in the license. + // In this example case, qualified custom profiles for owner_name + // "widevine_test" is non-empty, so the following keys are generated based on + // qualified custom profiles. Those keys would support SD content. + WvPLKey wvpl_key1; + // Key bytes and key id must be in bytes. + wvpl_key1.set_key_id(kKeyId1); + wvpl_key1.set_key_bytes(kKeyBytes1); + wvpl_key1.set_track_type(VIDEO_SD); + wvpl_key1.mutable_output_protection()->set_hdcp(HDCP_NONE); + wvpl_key1.mutable_output_protection()->set_secure_data_path(true); + WvPLStatus status = session.AddKey(wvpl_key1); + if (!status.ok()) { + std::cerr << "Failed to add key: " << status.error_message() << std::endl; + return status.error_code(); + } + + WvPLKey wvpl_key2; + wvpl_key2.set_key_id(kKeyId2); + wvpl_key2.set_key_bytes(kKeyBytes2); + wvpl_key2.set_track_type(VIDEO_SD); + wvpl_key2.mutable_requested_output_protection()->set_hdcp(HDCP_V1); + wvpl_key2.mutable_requested_output_protection()->set_secure_data_path(false); + status = session.AddKey(wvpl_key2); + if (!status.ok()) { + std::cerr << "Failed to add key: " << status.error_message() << std::endl; + return status.error_code(); + } + + // Generate the license + status = session.GenerateLicense(license_response); + if (!status.ok()) { + std::cerr << "Failed to generate license: " << status.error_message() + << std::endl; + return status.error_code(); + } + std::cout << "Generated license. " + << absl::BytesToHexString(*license_response) << std::endl; + return 0; +} + +int GenerateLicense(WvPLSession& session, const std::string& content_owner, + const std::vector& profile_owners, + std::string* license_response) { + std::vector qualified_profile_names; + WvPLStatus status; + std::string content_id; + status = session.GetContentId(&content_id); + + // Set parameters on the created session. + // Set policy parameters. + WvPLPlaybackPolicy policy; + policy.set_license_duration_seconds(604800); + policy.set_playback_duration_seconds(86400); + session.set_policy(policy); + + // Optional. Check the qualified custom profiles for the content owner. + if (std::find(profile_owners.begin(), profile_owners.end(), content_owner) != + profile_owners.end()) { + status = session.GetQualifiedCustomDeviceSecurityProfiles( + content_owner, &qualified_profile_names); + if (status.ok() && !qualified_profile_names.empty()) { + std::cout << "DRM qualifying custom profiles for owner <" << content_owner + << ">: "; + for (const auto& profile_name : qualified_profile_names) { + std::cout << "<" << profile_name << "> "; + } + std::cout << std::endl; + } + } + // Set key parameters. + // Content keys could be generated based on the info from qualifying profiles. + // The qualified profiles can be used to determine the content keys allowed + // in the license. + // In this example case, qualified custom profiles for owner_name + // "widevine_test" is non-empty, so the following `wvpl_key1` could be + // generated based on qualified custom profiles. + WvPLKey wvpl_key1; + // Key bytes and key id must be in bytes. + wvpl_key1.set_key_id(kKeyId1); + wvpl_key1.set_key_bytes(kKeyBytes1); + wvpl_key1.set_track_type(VIDEO_SD); + wvpl_key1.mutable_output_protection()->set_hdcp(HDCP_NONE); + wvpl_key1.mutable_output_protection()->set_secure_data_path(true); + status = session.AddKey(wvpl_key1); + if (!status.ok()) { + std::cerr << "Failed to add key: " << status.error_message() << std::endl; + return status.error_code(); + } + + // Or we could call FilterKey() to filter out the keys. Keys could be inserted + // with one security profile as required profile, as well as content owner. In + // Filterkey() API it already contains the logic of checking the qualified + // security profiles for the content owner. + WvPLKey wvpl_key2; + wvpl_key2.set_key_id(kKeyId2); + wvpl_key2.set_key_bytes(kKeyBytes2); + wvpl_key2.set_track_type(VIDEO_SD); + wvpl_key2.mutable_requested_output_protection()->set_hdcp(HDCP_V1); + wvpl_key2.mutable_requested_output_protection()->set_secure_data_path(false); + wvpl_key2.set_required_profile("dsp_test"); + wvpl_key2.set_content_owner(content_owner); + WvPLCapabilityStatus wvpl_capability_status2 = session.FilterKey(wvpl_key2); + if (!wvpl_capability_status2.ok()) { + std::cerr << "Failed to add key: " << wvpl_key2.key_id() + << " with status:" << wvpl_capability_status2.status() + << std::endl; + } + // The following example `wvpl_key3` will be filtered out because the profile + // name the key associated with is not qualified. + WvPLKey wvpl_key3; + wvpl_key3.set_key_id(kKeyId3); + wvpl_key3.set_key_bytes(kKeyBytes3); + wvpl_key3.set_track_type(VIDEO_HD); + wvpl_key3.mutable_output_protection()->set_hdcp(HDCP_NONE); + wvpl_key3.mutable_output_protection()->set_secure_data_path(true); + wvpl_key3.set_required_profile("L3"); + wvpl_key3.set_content_owner(content_owner); + WvPLCapabilityStatus wvpl_capability_status1 = session.FilterKey(wvpl_key3); + if (!wvpl_capability_status1.ok()) { + std::cerr << "Failed to add key: " << wvpl_capability_status1.status() + << std::endl; + } + + // Generate the license + status = session.GenerateLicense(license_response); + if (!status.ok()) { + std::cerr << "Failed to generate license: " << status.error_message() + << std::endl; + return status.error_code(); + } + std::cout << "Generated license. " + << absl::BytesToHexString(*license_response) << std::endl; + return 0; +} + +/** This example is used when content providers want to use DSP API for license + * generation. The qualified profiles can be used to determine the content keys + * allowed in the license. + * + * If content provider doesn't want to use DSP for license generation, they + * could follow the example shown in "wvpl_license_sdk_example.cc". + */ +int main(int argc, char** argv) { + + // Set up WvPLEnvironment. + std::map config; + // Set device certificate expiration time to 10 years (10 * 365 * 24 * 3600). + // Note that in practice, the expiration should not be 10 years long. + // Certificate status list should be updated periodically. + config[kDeviceCertificateExpiration] = "315360000"; + + // The DCSL and service certificate used in this example are for "development" + // and will not work with Widevine's production servers. Replace "dev" with + // "prod" when using production certificates. + config[kDrmCertificateType] = "dev"; + + // Set parameters on the environment. + WvPLEnvironment wvpl_env(config); + WvPLStatus status = wvpl_env.Initialize(); + if (!status.ok()) { + std::cerr << "Failed to Initialize environment: " << status.error_message() + << std::endl; + return status.error_code(); + } + + // The preProvKeys map takes a device systemID as the key and an associated + // preprovisioning key as value. + std::map prev_prov_keys; + prev_prov_keys[kSystemId] = kPreProvisioningKey; + video_widevine::Status wv_status = + wvpl_env.SetPreProvisioningKeys(prev_prov_keys); + if (!wv_status.ok()) { + std::cerr << "Failed to set pre prov keys with stats: " << wv_status + << std::endl; + return 1; + } + + std::string b64DecodedDrmServiceCertificate; + std::string b64DecodedPrivateKey; + if (!absl::Base64Unescape(b64DrmServiceCertificate, + &b64DecodedDrmServiceCertificate)) { + std::cerr << "Failed to decode ServiceCertificate." << std::endl; + return 1; + } + if (!absl::Base64Unescape(b64PrivateKey, &b64DecodedPrivateKey)) { + std::cerr << "Failed to decode PrivateKey." << std::endl; + return 1; + } + // Must set a valid drm service certificate, otherwise it will failed to + // create session. + std::string passphrase = "encryptallthekitties"; + status = wvpl_env.SetDrmServiceCertificate(b64DecodedDrmServiceCertificate, + b64DecodedPrivateKey, passphrase); + if (!status.ok()) { + std::cerr << "Failed to set DrmServiceCertificate: " + << status.error_message() << std::endl; + return status.error_code(); + } + + // Set a valid device certificate status list. + status = wvpl_env.SetDeviceCertificateStatusList(kValidCertList); + if (!status.ok()) { + std::cerr << "Failed to update the certificate status list: " + << status.error_message() << std::endl; + return status.error_code(); + } + + // Set custom device security profile list. + // One time setup each time new DSPs are loaded. + std::string serialized_signed_dsps; + if (!absl::WebSafeBase64Unescape(b64SerializedSignedDeviceSecurityProfiles, + &serialized_signed_dsps)) { + std::cerr << "Failed to decode serialized_signed_dsps." << std::endl; + return 1; + } + status = wvpl_env.SetCustomDeviceSecurityProfiles(serialized_signed_dsps); + if (!status.ok()) { + std::cerr << "Failed to set custom device security profiles: " + << status.error_message() + << ". wvpl_env will continue to use the previously loaded DSPs " + "if there is any." + << std::endl; + return status.error_code(); + } + + // Optional sannity check. + // Verify the custom profile owners match with list of expected content + // owners. + std::vector custom_profile_owners; + status = + wvpl_env.GetCustomDeviceSecurityProfileOwners(&custom_profile_owners); + if (!status.ok() || custom_profile_owners.empty()) { + std::cerr + << "Failed to get owner list for custom device security profiles: " + << status.error_message() << std::endl; + return status.error_code(); + } + std::cout << "DRM custom profile owner list: "; + for (const auto& owner_name : custom_profile_owners) { + std::cout << "<" << owner_name << "> "; + } + std::cout << std::endl; + + // Create the DRM session. + WvPLSession* session = nullptr; + + // Set the license request. + status = + wvpl_env.CreateSession(std::string(std::begin(kLicenseRequestExample), + std::end(kLicenseRequestExample) - 1), + &session); + if (!status.ok()) { + std::cerr << "Failed to create session: " << status.error_message() + << std::endl; + return status.error_code(); + } + + // Set SessionInit + WvPLDeviceStatusOptions wvpl_device_status_options; + wvpl_device_status_options.set_allow_test_only_system_id(true); + WvPLSessionInit wvpl_session_init; + wvpl_session_init.set_device_status_options(wvpl_device_status_options); + session->set_session_init(wvpl_session_init); + + // Generate the license for |content_owner| after successfully creating a + // WvPL session. Assume license is generated for content_owner = + // "widevine_test". + std::string content_owner = "widevine_test"; + std::string license_response; + return GenerateLicense(*session, content_owner, custom_profile_owners, + &license_response); +} diff --git a/centos/sdk/examples/license_server_sdk/java/WvPLExample.java b/centos/sdk/examples/license_server_sdk/java/WvPLExample.java new file mode 100755 index 0000000..ec02f91 --- /dev/null +++ b/centos/sdk/examples/license_server_sdk/java/WvPLExample.java @@ -0,0 +1,496 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +package com.google.video.widevine.sdk.wvpl; + +import static java.nio.charset.StandardCharsets.UTF_8; + + +import com.google.video.widevine.protos.LicenseProtocol.License; +import com.google.video.widevine.protos.LicenseProtocol.SignedMessage; +import java.io.BufferedReader; +import java.io.FileNotFoundException; +import java.io.IOException; +import java.nio.file.Files; +import java.nio.file.Path; +import java.util.Arrays; +import java.util.Base64; +import java.util.Map; + +/** Tests for {@link WvPLSession} Java API in Widevine License Server SDK. */ +public class WvPLExample { + /* Creates WvTestRunner to run wvpl test */ + static class WvTestRunner extends Thread { + private final int loops; + private final String threadName; + private final WvPLEnvironment env; + + public WvTestRunner(WvPLEnvironment env, ThreadGroup group, String threadName, int loops) { + super(group, threadName); + this.loops = loops; + this.threadName = threadName; + this.env = env; + } + + @Override + public void run() { + System.out.println("Thread Started: " + threadName); + try { + Thread.sleep(2000); + } catch (InterruptedException e) { + System.out.println("InterruptedException in thread."); + } + String b64LicenseRequest = + "CAES9AwKlQwIARLtCQquAggCEhDEmqLqtzGkARd0kTEo0I1IGJSf2qkFIo4CMIIBCgKCAQEA0NXBS5-DGcEt_vnp" + + "kWgiYUrrlKjddGnSLPuloU5fNHN-TTtF2HwCbKHxv-71EeYwl4omrd36XZ7N6cRPE78G1BQoJy57z2wgCJZ8_3" + + "jPsMnQSadynMxDdvVBqQde87T66-KqqBMTBOI3dC_LtX1Ydj04OR3yIKSlmTGGPwW37BfvsmNWGAHOHa0i7kP3" + + "C1HkUyBixNJLArnNmQSfLi5jf8EyRu6-yJwFRyY1EcXXcDouUgJbWFGey6oK26-HI87rs4bEJyjxk3fr0BJcfh" + + "QSVm-Awmyp4TU0J_A_PLoatG0yzjvPLT0ymsujLta0ZT6xHLSSeD3JfDyrlyS196GS2QIDAQABKIchEoACUqrZ" + + "8CzIzCe-j4BI0cqjvQ7C_spcMjwdlO9E5pb-FIcP5fDdOSa8Op6gpkB7HwEv-HC8ITXjdQ3MRl5BcLB8elBDBw" + + "Tl-nfw4AUqVRwSyPKfpOTU9w7MloiFBD8j2zP0Fbb3gub_G-JCMBYlpi8ObTiE5a3olWIl__trUgj-huLSKkIs" + + "dH7dtaK55vvHIM7h7UcwomnxjJN1phHxB0c4iyHBAQfGaVSIUz3N7nXqsW__QO7qRIa7XCA-uiXpYF17wwTc4w" + + "_X_fOKoYJ8mly85Sunm-XvxKZGzzcjyJuOsO_cK_KUiqt-TzeVmiohpmrEDK68ozm6LMFIFO3yBFpNgxq2BQqw" + + "AggBEhDbPKzP3nYDjtzFHkw5JPr6GMLSg44FIo4CMIIBCgKCAQEAuVISqq1KZKOCyoJdYCxsMcBmzUvOotSUG2" + + "c3VlJz_7Kq4MY65zff4_8AXtnsT4q4WWiREgiewPWe0n8x8_FI8z3r5cLKzwh_wRUwHlV5Sn2dw4I8VTzdPMH5" + + "bfmgtCpM1NV5NhzT-YagPth3xrcwCnIP54oCLuKCDxG_rKcmKcHiyMVZnqdYHDNO5b8Tn21EV3JHZsLjpEfo_J" + + "Og6mv1Z0r-vP6VJQT43KSJns5VSKx-RAHoff2ZTBuDWU2YOqFZpi_oeupPiHT_prwF9bIZiGhbEFNK-2T_t2BG" + + "SzBpGNkQPb3VLek7WcctcqZTZ-eFQrzboRV0L5O8pho2cjVTswIDAQABKIchMAESgAMB8IopgGaBVAPSQnh6PI" + + "VhD9nt9H_BgEMsW_pXJ5ij4PMltfdr8y03yF2GHJ_ZTeRYJpL_Mn8Mh5sLCaNF44S3nxSw5dT7bH35ZIFiB-uC" + + "OH60js6UKadq099NZkPUtLCJAX5U_ggkSq2UMAMeRCyTo7XghUEaf_JyECh6rI5fKAjzIX7MfTLU32yHeiGkjN" + + "Aj2_SoUnZH91Kb_wbStm6GSQdnw7G2kyKp6I6MJclgQZn7fJVCmRJugC57fDiBVv-sfl3Zp2SYQ9hwRBR9byMn" + + "Vp5KLedB_v-9nnHniMLgSiDK-HASpZA-5C0OO27jHcdvdMgVjXoyJY05YYW1BcKKnGHit82fMY5zEDVG5mfmgq" + + "d8ZYVlLAxJLWHZ7XCs1pIcAG1LjEy5rKzQtlT2DdwBzsF5mdybWKCLr-fbEqFo_ftp9HIc6EL70pZ07ofHbl0e" + + "-PCkn5mJJYPbTNv7UxZgUU_2IqUJTxtwZD2GannSnwAPjd6D7u0W6CwFk-rhBe4aFAoMY29tcGFueV9uYW1lEg" + + "Rhc3VzGhUKCm1vZGVsX25hbWUSB05leHVzIDcaIAoRYXJjaGl0ZWN0dXJlX25hbWUSC2FybWVhYmktdjdhGhIK" + + "C2RldmljZV9uYW1lEgNkZWIaFgoMcHJvZHVjdF9uYW1lEgZyYXpvcmcaRQoKYnVpbGRfaW5mbxI3Z29vZ2xlL3" + + "Jhem9yZy9kZWI6TU5DL01BU1RFUi8xODU1NjM3OnVzZXJkZWJ1Zy9kZXYta2V5cxotCglkZXZpY2VfaWQSIEpR" + + "NVpJWkVMVUpBQlBVQzNLMkg1Q0NXNklVAAAAAAAAGiYKFHdpZGV2aW5lX2NkbV92ZXJzaW9uEg52My4wLjAtYW" + + "5kcm9pZDIIEAEgBCgJMAASSgpICiIIARoNd2lkZXZpbmVfdGVzdCIPc3RyZWFtaW5nX2NsaXAxEAEaIDE3NEQ4" + + "MkUyRjA0QzZGQkEwNjAwMDAwMDAwMDAwMDAwGAEgmZ_aqQUwFTij79WWBRqAAsguK-RkA18-zOzwX38JDpT877" + + "woGiL-kUhQ9w2NuDxolgFovFqp-VNEESpG9GG-dp8sFXAABy4Xk3YJnyVvAtI6MtiSPjDLt87QPSie6WCLgqvL" + + "zHoGSGuo4ij4HBX23QM0jZNDz_u_1rdZLKfV-nIWQ1sVI2u-QYnTYCztRmpMd1Gp1mZzLpcOL9PNGIYbuJSmQe" + + "fi3FDGdwfmKLRYg8peJXj2OPHKNyyJCfRMZ42PmBvg4bxI36Ets_TU_6m2RMKARnTLYoGq0bw0fl9GeV_27mDU" + + "Kvl0SIWXh0Jup8xxCO_iFQzw_7rCyW2FtrzXqq2qEmPRK5HjY-_c_0XVWh0="; + + String testSessionId = "TestSessionId"; + String testPurchaseId = "TestPurchaseId"; + String testProviderClientToken = "TestProviderClientToken"; + boolean testOverrideProviderClientToken = true; + byte[] decodedLicenseRequest = Base64.getUrlDecoder().decode(b64LicenseRequest); + byte[] testMasterSigningKeyBytes = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + for (int i = 0; i < loops; i++) { + try { + byte[] bad = {1, 2, 3, 4}; + env.createSession(bad); + } catch (WvPLStatusException e) { + System.out.println("Message for bad session: " + e.getMessage()); + System.out.println("Status message for bad session: " + e.getStatus().getMessage()); + } + WvPLSession session = null; + try { + session = env.createSession(decodedLicenseRequest); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + byte[] contentId = null; + try { + contentId = session.getContentId(); + System.out.println("ContentId:" + new String(contentId, UTF_8)); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + System.out.println("Version: " + WvPLSession.getVersionString()); + // VMP Status + try { + System.out.println( + "VMP Status: " + session.verifyPlatform().getPlatformVerificationStatus()); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + + // Set parameters on the created session. + WvPLPlaybackPolicy policy = new WvPLPlaybackPolicy(); + policy.setLicenseDurationSeconds(10000000L); + session.setPolicy(policy); + + WvPLKey key1 = new WvPLKey(); + byte[] data1 = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key1.setKeyId(data1); + key1.setKeyBytes(data1); + key1.setTrackType(WvPLTrackType.TrackType.AUDIO); + session.addKey(key1); + + WvPLKey key2 = new WvPLKey(); + byte[] data2 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key2.setKeyBytes(data2); + key2.setTrackType(WvPLTrackType.TrackType.VIDEO_SD); + session.addKey(key2); + + WvPLKey key3 = new WvPLKey(); + byte[] data3 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key3.setKeyId(data3); + key3.setKeyBytes(data3); + key3.setTrackType(WvPLTrackType.TrackType.VIDEO_HD); + WvPLOutputProtection outputProtection = new WvPLOutputProtection(); + outputProtection.setHdcp(WvPLHdcp.HDCP.HDCP_V2_2); + outputProtection.setSecurityLevel(WvPLSecurityLevel.SecurityLevel.SW_SECURE_DECODE); + outputProtection.setDisableAnalogOutput(true); + outputProtection.setCgms(WvPLCgms.Cgms.COPY_FREE); + System.out.println( + "SecurityLevel for outputProtection = " + outputProtection.getSecurityLevel()); + WvPLVideoResolutionConstraint videoResolutionConstraint1 = + new WvPLVideoResolutionConstraint(); + videoResolutionConstraint1.setMinResolutionPixels(300); + videoResolutionConstraint1.setMaxResolutionPixels(600); + videoResolutionConstraint1.setHdcp(WvPLHdcp.HDCP.HDCP_V2); + WvPLVideoResolutionConstraint videoResolutionConstraint2 = + new WvPLVideoResolutionConstraint(); + videoResolutionConstraint2.setMinResolutionPixels(3000); + videoResolutionConstraint2.setMaxResolutionPixels(6000); + videoResolutionConstraint2.setHdcp(WvPLHdcp.HDCP.HDCP_V1); + key3.addVideoResolutionConstraint(videoResolutionConstraint1); + key3.addVideoResolutionConstraint(videoResolutionConstraint2); + System.out.println( + "Number of video resolutions in key3 = " + key3.getVideoResolutionConstraint().size()); + for (WvPLVideoResolutionConstraint vrc : key3.getVideoResolutionConstraint()) { + System.out.println("min resolution in pixels = " + vrc.getMinResolutionPixels() + + ", max resolution in pixels = " + vrc.getMaxResolutionPixels() + + ", hdcp = " + vrc.getHdcp()); + } + key3.setOutputProtection(outputProtection); + WvPLOutputProtection requestedOutputProtection = new WvPLOutputProtection(); + requestedOutputProtection.setHdcp(WvPLHdcp.HDCP.HDCP_V2); + key3.setRequestedOutputProtection(requestedOutputProtection); + session.addKey(key3); + + WvPLKey key4 = new WvPLKey(); + byte[] data4 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key4.setKeyBytes(data4); + key4.setTrackType(WvPLTrackType.TrackType.VIDEO_UHD1); + session.addKey(key4); + + // We also could use filterKey to filter out the key. + WvPLKey filteredKey1 = new WvPLKey(); + byte[] filteredKeyData1 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + filteredKey1.setKeyId(filteredKeyData1); + filteredKey1.setKeyBytes(filteredKeyData1); + filteredKey1.setTrackType(WvPLTrackType.TrackType.VIDEO_HD); + WvPLCapabilityStatus capabilityStatus = session.filterKey(filteredKey1); + System.out.println("WvPLCapabilityStatus for adding filtered key = " + capabilityStatus); + + System.out.println("Is device ChromeCDM = " + session.isChromeCDM()); + + WvPLSessionInit sessionInit = new WvPLSessionInit(); + sessionInit.setSessionId(testSessionId); + sessionInit.setPurchaseId(testPurchaseId); + sessionInit.setMasterSigningKey(testMasterSigningKeyBytes); + sessionInit.setProviderClientToken(testProviderClientToken); + sessionInit.setOverrideProviderClientToken(testOverrideProviderClientToken); + + session.setSessionInit(sessionInit); + + try { + byte[] license = session.generateLicense(); + System.out.println( + "License Duration Seconds = " + session.getPolicy().getLicenseDurationSeconds()); + System.out.print("License Response = "); + if (license.length > 0) { + printSignedMessage(license); + } else { + System.out.println("Empty"); + } + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + try { + // GetProvisionedDeviceInfo is deprecated, use getDeviceInfo instead. + WvPLDeviceInfo deviceInfo = session.getDeviceInfo(); + System.out.println("DeviceInfo = " + deviceInfo); + + WvPLDeviceSecurityLevel.DeviceSecurityLevel deviceSecurityLevel = + deviceInfo.getDeviceSecurityLevel(); + // Expect a L1 device for the license request in use. + System.out.println( + "Device Security level = " + deviceSecurityLevel.getDeviceSecurityLevel()); + } catch (WvPLStatusException e) { + System.out.println("Failed to get deviceInfo."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + try { + WvPLClientInfo clientInfo = session.getClientInfo(); + WvPLHdcp.HDCP maxHdcpVersion = clientInfo.getMaxHdcpVersion(); + System.out.println("max hdcp version = " + maxHdcpVersion.getHDCP() + + ", oem crypto api version = " + clientInfo.getOemCryptoApiVersion() + + ", provider client token = " + clientInfo.getProviderClientToken()); + Map namesValues = clientInfo.getNamesValues(); + for (Map.Entry nameValue : namesValues.entrySet()) { + System.out.println("Key = " + nameValue.getKey() + ", Value = " + nameValue.getValue()); + } + } catch (WvPLStatusException e) { + System.out.println("Failed to get clientInfo from license request."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + WvPLWidevinePsshData widevinePsshData = null; + try { + widevinePsshData = session.getPsshData(); + } catch (WvPLStatusException e) { + System.out.println("Failed to get psshData from license request."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + if (widevinePsshData.getContentId().length > 0) { + System.out.println( + "ContentId from Widevine Pssh = " + Arrays.toString(widevinePsshData.getContentId())); + } else { + System.out.println("ContentId from Widevine Pssh is empty"); + } + if (!widevinePsshData.getKeyIds().isEmpty()) { + for (byte[] keyId : widevinePsshData.getKeyIds()) { + System.out.println("keyId from Widevine Pssh = " + Arrays.toString(keyId)); + } + } else { + System.out.println("KeyIds from Widevine Pssh is empty"); + } + WvPLStatus errorStatus = + new WvPLStatus(WvPLStatus.StatusCode.SERVICE_CERTIFICATE_REQUEST_MESSAGE, ""); + byte[] error = env.generateErrorResponse(errorStatus); + System.out.print("Service Certificate Response = "); + if (error.length > 0) { + printSignedMessage(error); + } else { + System.out.println("Empty"); + } + + // license counter with flushData set + boolean flushData = true; + byte[] statsBytes = env.getStatsAsBytes(flushData); + System.out.print("stats as bytes with flush set = "); + if (statsBytes.length > 0) { + System.out.println(Arrays.toString(statsBytes)); + } else { + System.out.println("Empty"); + } + + String statsString = env.getStatsAsString(flushData); + System.out.print("stats as std::string with flush set = "); + if (statsString.length() > 0) { + System.out.println(statsString); + } else { + System.out.println("Empty"); + } + // license counter with flushData unset + flushData = false; + statsBytes = env.getStatsAsBytes(flushData); + System.out.print("stats as bytes with flush unset = "); + if (statsBytes.length > 0) { + System.out.println(Arrays.toString(statsBytes)); + } else { + System.out.println("Empty"); + } + statsString = env.getStatsAsString(flushData); + System.out.print("stats as String with flush unset = "); + if (statsString.length() > 0) { + System.out.println(statsString); + } else { + System.out.println("Empty"); + } + + WvPLSessionInit retrievedSessionInit = session.getSessionInit(); + System.out.println( + "retrieved session init fields: sessionId = " + retrievedSessionInit.getSessionId() + + ", purchaseId = " + retrievedSessionInit.getPurchaseId() + + ", masterSigningKey = " + Arrays.toString(retrievedSessionInit.getMasterSigningKey()) + + ", providerClientToken = " + retrievedSessionInit.getProviderClientToken() + + ", overrideProviderClientToken = " + + retrievedSessionInit.getOverrideProviderClientToken()); + try { + policy.close(); + key1.close(); + key2.close(); + outputProtection.close(); + key3.close(); + session.close(); + } catch (IOException e) { + System.out.println("IOException when closing: " + e.getMessage()); + } + System.out.println("Thread Name: " + threadName + ", Loop Complete: " + i); + try { + Thread.sleep(500); + } catch (InterruptedException e) { + System.out.println("InterruptedException in thread."); + } + } + System.out.println("Thread Ended: " + threadName); + } + } + + public static void printSignedMessage(byte[] bytes) { + try { + SignedMessage licenseMessage = SignedMessage.parseFrom(bytes); + System.out.println(licenseMessage); + if (licenseMessage.getType() == SignedMessage.MessageType.LICENSE + || licenseMessage.getType() == SignedMessage.MessageType.SERVICE_CERTIFICATE) { + License licenseResponse = License.parseFrom(licenseMessage.getMsg()); + System.out.println(licenseResponse); + } + } catch (Exception e) { + System.out.print(" FAILED"); + } + } + + public static String loadCertificateStatusListFromFile(String certificateStatusListFile) + throws IOException { + BufferedReader br = Files.newBufferedReader(Path.of(certificateStatusListFile), UTF_8); + StringBuilder sb = new StringBuilder(); + String line = br.readLine(); + while (line != null) { + sb.append(line); + sb.append(System.lineSeparator()); + line = br.readLine(); + } + br.close(); + return sb.toString(); + } + + public static void main(String[] argv) throws Exception { + int numberOfRunners = 10; + int numberOfLoops = 100; + // TODO(yawenyu): Remove loadCertificateStatusListFromFile function. Add three flags to the + // main function for certificateStatusListFile,b64DrmServiceCertificate and b64PrivateKey. + String certificateStatusListFile = + "sdk/testing/sampleProdCertificateStatusList.json"; + String b64DrmServiceCertificate = + "CsYCCAMSEIrKPCL3PObh7uUsPogH1bwY-PDksQUijgIwggEKAoIBAQDP6G_52lmYxLv2m2qL3B2L" + + "tUUjCcHWvy4cxBe4_9TJLHkqaZe8InB4mmn_V0IV0f8-1jXu9cwxHycp0c2FzUe40KcK5Y1Tjqp2" + + "EgFzC_e7z_KnTv0_ar1E7HANAAJbfOZEsTPDiLqRyD0kS85lCCxHICPrruORnKvgogDm4Gr4ACNO" + + "NMG8WeH1mgVeIUNPpg1FVeeWYr1zMAmJmSHjPz6ymHW9lMNFLZayJZNjA9L-g4Ncv8mI03Qt0fmi" + + "hJLa5p9EHrqDuhbEgmD3fmEvxwyitR111NbXPAzJPk_4jfMqztIiqDoEXqBEpnFgdTBPwx9FmC3C" + + "en_0SGMMtpmC8sfJAgMBAAE6GWF0cy53di5zYW5kYm94Lmdvb2dsZS5jb20SgAN1Hma3aCJos4A_" + + "aa-JyanEIZ12SpZpkQissZxSI0JTwRgW8bnYMgMFqJAdxKQ60kDjwzlqi30bpqXgFa6dvfWjswlR" + + "cRQovHhR0UAnI04LmmXuH4LN1Exclh9TxKnMtYW9tkCKD-Ykrl1gbaBSYkTLTvn9zV8z7sHePDzz" + + "tNMZH0MFR2YWLc0X5TSPJETftB_iGgm0SoQy7CpFYEswBV4kTlTEtEbdH3D1tPvp2VT9--sT45b2" + + "rH2smhm-iiOi20sr42Dhcsl6TkIrmvuKcXv7oVjNHEUo4F25qmjFaNTVmBjxwfYPxTANqnnNJVIO" + + "bAqfQVMCJT0sUd5C0LWcYIaUOxRI2hJCp3rpEyIWPjexk8hRwZ1S2Sdiiiwlh_ms3PlSkyoMWIHa" + + "VllH3OV_8S1LFMy3ZgCOgx0rnFjNVpFayCSLWFhtE0waV2dQ1bhtYhGDxn17fO0EXUyNJhPa2rfy" + + "r1VDonJVG7CyyzwF88_0KEZISCQykw3oCF82PDKF2tU="; + String b64EncryptedProviderKeyConfig = + "ChlhdHMud3Yuc2FuZGJveC5nb29nbGUuY29tEhCKyjwi9zzm4e7lLD6IB9W8GtAB_ap4K2QYS3tx" + + "7Xj8siqnpONGJOfEBR5yJs4FxHBVRfVLw2_lvz4EavH0q5WjXFcODJyGjR-jTzhsoM_z4Qpi2rpp" + + "K1_TPv82glRJbmU9aKQwMa6GldCjjvJqhVJzcVRVhx19Y2b7stOQb5i4i9CHYWn4C4fjSXbkaaYl" + + "pYISNd0MbVrRK53vvyGWs8v9v6s-CsqrTJC7--gsn2fjNJfOTMN3Z_9pZzemoyCpdOWhqWChfjv0" + + "4e1PGHjNroGQOjxtNI0GAzi_e65NZcUHF1aDciIQk2NXF2Btbu59TB657lNEmSqAAl55dLmocO6O" + + "NLL-swezkDB6jdCjjxBehVbfLkIRM4M0MjXvyX9i78yeDbqF1FA9tdGv2brzNNgpecXxE8cuPWSi" + + "ED-Ml5-Pwt0Pcwnj8Z1o5lj4Is0J6BTeR8Mqs_VLzLNVc5YKsqNWA-Ad7WMDt5oasP54m-T5FhCS" + + "_XSd45fQG2QSgdv7niei_ZHWsVYWkIQVMbGw7Wxe33o3E5LwNZW9LQ0uMD4m_zdKhh-Tk8kvADWP" + + "b7YAnWZGhYWKm_5992weJ0BgD7ADjPvpO8NMX2mi-Np1RAbM92r9UMpxKYAsTTA1xz1H_HGrxvBd" + + "VB17Ji8nR8UrQmQokBPPAoi4iDs="; + String b64PrivateKey = + "MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQItfwZJLNOj2MCAggAMBQGCCqGSIb3" + + "DQMHBAiwSBxfbxJvkwSCBMi6EkXgJBbGDayLfDbm1EFCucR6OiGAJoH_1ePza9mGREhI_r4YqCZx" + + "opY8D5aFJIeKjR4KCiOoGZnn9xHu5JBhs_asGFWuSFry95fXFzfgYCFqzI2Za9TZkDpqDrh2d8on" + + "CGBIYgz9PaxXKrxAQxhLfKaZ8lB-pRi5SRTV-6nxG37ZfDMRIrHFQcxhlnjTSQ97Ix2iaK66UYDJ" + + "sqjapH3cYwk_B_xaxpbYUDlmuJBh14SzSpjG_HXlBWRxCKBRljXo6wjBoBFyKviu4p3Otcpfa7Rf" + + "1nF4gQHHW6HvMvQTaY0lC6D5NzyV7KWosBdYX0am7uvQKs9MqulhL0NpBFMywyb9CTDvccoDyanO" + + "U4nkSsax6ILS2trA7JKrb_4CX5W6qkmFgCqzgx8cNWI-1NABCJzBtF85BGoArQKW_sQqh96ulfTb" + + "MpyQKQ2Uvkqtfv3G7Q5Hz3A6qAJqf6A6a9ADsk4ry9-ZZshlxFw4iNa6kNQKKSO4EElIHXe47TAF" + + "658nb9aA2cSlLQnr7d9h-AyGghP6cztTazwgjiS7lXo4GwOQQ2jWuVJ4RI0750WdC5t1yS1p-qIC" + + "2Ckh71OF8d3DSDQYTMYjn5iOODQqqM9mx_VMIairNfrCsX9GvOHSw0My3OshKCuPXhdt3TkThp2T" + + "Mr4TlunHiPG5C7S1tSr0Brvy_c6XpejpLxmnUd-_J53GfbHLXeZiifMVCu7c7BKSkoDSLQwfk7lz" + + "Idu0BE9GtIrB1NmQasYaeE9L31TL4KegvROFksyK7mZnC6NEXZKsZdsfV3TcB0OZ52BE5L2X7CMO" + + "X-n_BQeH-cB-pbIuFqKtbjEcqRUag-m4MYZ2GkMwBJP3Sh_jewjh2TKPlkwvJI9FX5n7VGGuBvN5" + + "CmUqqgQAqu9ieVuz-VVylSIOwdEdSyPGQia45OlYd9HsTD7NdGPyseBjlVLWq2BI1lG5KqJqCH7w" + + "NxrIYl0PWOo6WrClWJW1CkJXRmoKzl5PTx-PL8W0KO3pZg94RMHVsZ8sRE62MPPu9Ltnl6x0Zjc8" + + "YQItP7eR-aF0wlQQ-8__TBTBah3hLMBsAEKV6xD2bTvHBW-3vd-WCxX3hM7FACULlxgbT5wkXb0K" + + "hUOWwim3zLRjbFhOI-MynVt6aM83bWrSRdbr52eyT4Ybx3EZ8tLVtzumgLVMWbJXcUnOU6I5y6W-" + + "tzzUHsDba5AtG4-u9UitUQlDd4Hh4GlUaRdCqX8PwQLl-efjJysBuNu5xobxp3df9SqRgxCdaC-J" + + "CS2Hi_hciIrcJNwxTJFUjilGOMDAqM0GdH8QMkbFjPAsAvz_fMYHoB4vyRYeURbwyiFb8hVOjgdB" + + "8M_oRlmeYIcS8DzR84WdV-yUV_hsakjIqr5KznmGqhDSgrv609vjxKLO3PUnXq1J5TcTH5hN-bHr" + + "WS-9zV0iA81aCVxk7HbCAj_ODuQjFYu_B31gvpkgICvgb-PMxCU-GJ5-bcYLWm-8apHdQ15SMbma" + + "TrW7k7JZLMMqSjc7aJ25NyIbAtBg70EjebAnJI1JqmnPV-lUzfeqW0ulRv1fQZH057BXCyaPhNDY" + + "rFf_lzyz-aX21HuL59l1B6rEJPU3qxdctT6kmi6L78fTvSP0V5aNd0box0Y="; + String passphrase = "encryptallthekitties"; + byte[] passphraseBytes = passphrase.getBytes(UTF_8); + + byte[] decodedDrmServiceCertificate = Base64.getUrlDecoder().decode(b64DrmServiceCertificate); + byte[] decodedEncryptedProviderKeyConfig = + Base64.getUrlDecoder().decode(b64EncryptedProviderKeyConfig); + byte[] decodedPrivateKey = Base64.getUrlDecoder().decode(b64PrivateKey); + + String certList = ""; + try { + certList = loadCertificateStatusListFromFile(certificateStatusListFile); + } catch (FileNotFoundException e) { + System.out.println("FileNotFoundException in reading input cert list."); + } catch (IOException e) { + System.out.println("IOException in reading input cert list."); + } + java.util.Map configValues = new java.util.HashMap<>(); + String providerIv = "d58ce954203b7c9a9a9d467f59839249"; + String providerKey = "1ae8ccd0e7985cc0b6203a55855a1034afc252980e970ca90e5202689f947ab9"; + // Define the configuration that is to be used for WvPLEnvironment. + configValues.put("allow_unknown_device", "1"); + configValues.put("provider", "widevine_test"); + configValues.put("provider_iv", providerIv); + configValues.put("provider_key", providerKey); + // Set the device certificate expiration to 10 years (10 * 365 * 24 * 3600). + // Note that in practice, the expiration should not be 10 years long. Certificate status list + // should be updated periodically. + configValues.put("device_certificate_expiration", "315360000"); + + java.util.Map preProvKeys = new java.util.HashMap<>(); + preProvKeys.put(100, "f7008b38acc00ec68c732ac665c55c65"); + + try (WvPLEnvironment env = new WvPLEnvironment(configValues)) { + env.setPreProvisioningKeys(preProvKeys); + + WvPLStatus status; + try { + status = env.setDeviceCertificateStatusList(certList.getBytes(UTF_8)); + } catch (WvPLStatusException e) { + status = e.getStatus(); + System.out.println("setDeviceCertificateStatusList exception Message: " + + e.getMessage() + ", exception status message: " + e.getStatus().getMessage() + + ", numeric code = " + e.getStatus().getNumericCode()); + } + status = + env.setServiceCertificate( + decodedDrmServiceCertificate, decodedPrivateKey, passphraseBytes); + if (status.getStatusCode() != WvPLStatus.StatusCode.OK) { + System.out.println("setServiceCertificate status = " + status.getStatusCode() + + ", message = " + status.getMessage()); + } else { + System.out.println("Successfully loaded service certificate"); + } + // If using provider keys: set an encrypted provider key config. Note that the + // service certificate has to be set first. + status = env.setEncryptedProviderKeyConfig(decodedEncryptedProviderKeyConfig); + if (status.getStatusCode() != WvPLStatus.StatusCode.OK) { + System.out.println("setEncryptedProviderKeyConfig status = " + status.getStatusCode() + + ", message = " + status.getMessage()); + } else { + System.out.println("Successfully set provider key config"); + } + WvTestRunner[] runner = new WvTestRunner[numberOfRunners]; + ThreadGroup group = new ThreadGroup("Test Runner"); + for (int i = 0; i < runner.length; i++) { + runner[i] = new WvTestRunner(env, group, "thread_runner_" + i, numberOfLoops); + runner[i].start(); + } + for (WvPLExample.WvTestRunner element : runner) { + element.join(); + } + env.close(); + } + } +} diff --git a/centos/sdk/examples/license_server_sdk/java/WvPLUsingDspExample.java b/centos/sdk/examples/license_server_sdk/java/WvPLUsingDspExample.java new file mode 100755 index 0000000..fe7c8fd --- /dev/null +++ b/centos/sdk/examples/license_server_sdk/java/WvPLUsingDspExample.java @@ -0,0 +1,600 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2021 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +package com.google.video.widevine.sdk.wvpl; + +import static java.nio.charset.StandardCharsets.UTF_8; + +import com.google.protobuf.ExtensionRegistry; + +import com.google.video.widevine.protos.LicenseProtocol.License; +import com.google.video.widevine.protos.LicenseProtocol.SignedMessage; +import java.io.BufferedReader; +import java.io.FileNotFoundException; +import java.io.IOException; +import java.nio.file.Files; +import java.nio.file.Path; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.Base64; +import java.util.HashMap; +import java.util.List; +import java.util.Map; + +/** Tests for {@link WvPLSession} Java API in Widevine License Server SDK. */ +public class WvPLUsingDspExample { + /** Example of how to use WvPL API including DSP functions. + * + * This example is used when content providers want to use DSP API for license + * generation. The qualified profiles can be used to determine the content keys + * allowed in the license. + * + * If content provider doesn't want to use DSP for license generation, they + * could follow the example shown in "wvpl_license_sdk_example.cc". + */ + /* Creates WvTestRunner to run wvpl test */ + static class WvTestRunner extends Thread { + private final int loops; + private final String threadName; + private final WvPLEnvironment env; + private List customProfileOwners; + private String contentOwner; + + public WvTestRunner(WvPLEnvironment env, ThreadGroup group, String threadName, int loops) { + super(group, threadName); + this.loops = loops; + this.threadName = threadName; + this.env = env; + } + + public void setCustomProfileOwners(List customProfileOwners) { + this.customProfileOwners = customProfileOwners; + } + + public void setContentOwner(String contentOwner) { + this.contentOwner = contentOwner; + } + + @Override + public void run() { + System.out.println("Thread Started: " + threadName); + try { + Thread.sleep(2000); + } catch (InterruptedException e) { + System.out.println("InterruptedException in thread."); + } + String b64LicenseRequest = + "CAES9AwKlQwIARLtCQquAggCEhDEmqLqtzGkARd0kTEo0I1IGJSf2qkFIo4CMIIBCgKCAQEA0NXBS5-DGcEt_vnp" + + "kWgiYUrrlKjddGnSLPuloU5fNHN-TTtF2HwCbKHxv-71EeYwl4omrd36XZ7N6cRPE78G1BQoJy57z2wgCJZ8_3" + + "jPsMnQSadynMxDdvVBqQde87T66-KqqBMTBOI3dC_LtX1Ydj04OR3yIKSlmTGGPwW37BfvsmNWGAHOHa0i7kP3" + + "C1HkUyBixNJLArnNmQSfLi5jf8EyRu6-yJwFRyY1EcXXcDouUgJbWFGey6oK26-HI87rs4bEJyjxk3fr0BJcfh" + + "QSVm-Awmyp4TU0J_A_PLoatG0yzjvPLT0ymsujLta0ZT6xHLSSeD3JfDyrlyS196GS2QIDAQABKIchEoACUqrZ" + + "8CzIzCe-j4BI0cqjvQ7C_spcMjwdlO9E5pb-FIcP5fDdOSa8Op6gpkB7HwEv-HC8ITXjdQ3MRl5BcLB8elBDBw" + + "Tl-nfw4AUqVRwSyPKfpOTU9w7MloiFBD8j2zP0Fbb3gub_G-JCMBYlpi8ObTiE5a3olWIl__trUgj-huLSKkIs" + + "dH7dtaK55vvHIM7h7UcwomnxjJN1phHxB0c4iyHBAQfGaVSIUz3N7nXqsW__QO7qRIa7XCA-uiXpYF17wwTc4w" + + "_X_fOKoYJ8mly85Sunm-XvxKZGzzcjyJuOsO_cK_KUiqt-TzeVmiohpmrEDK68ozm6LMFIFO3yBFpNgxq2BQqw" + + "AggBEhDbPKzP3nYDjtzFHkw5JPr6GMLSg44FIo4CMIIBCgKCAQEAuVISqq1KZKOCyoJdYCxsMcBmzUvOotSUG2" + + "c3VlJz_7Kq4MY65zff4_8AXtnsT4q4WWiREgiewPWe0n8x8_FI8z3r5cLKzwh_wRUwHlV5Sn2dw4I8VTzdPMH5" + + "bfmgtCpM1NV5NhzT-YagPth3xrcwCnIP54oCLuKCDxG_rKcmKcHiyMVZnqdYHDNO5b8Tn21EV3JHZsLjpEfo_J" + + "Og6mv1Z0r-vP6VJQT43KSJns5VSKx-RAHoff2ZTBuDWU2YOqFZpi_oeupPiHT_prwF9bIZiGhbEFNK-2T_t2BG" + + "SzBpGNkQPb3VLek7WcctcqZTZ-eFQrzboRV0L5O8pho2cjVTswIDAQABKIchMAESgAMB8IopgGaBVAPSQnh6PI" + + "VhD9nt9H_BgEMsW_pXJ5ij4PMltfdr8y03yF2GHJ_ZTeRYJpL_Mn8Mh5sLCaNF44S3nxSw5dT7bH35ZIFiB-uC" + + "OH60js6UKadq099NZkPUtLCJAX5U_ggkSq2UMAMeRCyTo7XghUEaf_JyECh6rI5fKAjzIX7MfTLU32yHeiGkjN" + + "Aj2_SoUnZH91Kb_wbStm6GSQdnw7G2kyKp6I6MJclgQZn7fJVCmRJugC57fDiBVv-sfl3Zp2SYQ9hwRBR9byMn" + + "Vp5KLedB_v-9nnHniMLgSiDK-HASpZA-5C0OO27jHcdvdMgVjXoyJY05YYW1BcKKnGHit82fMY5zEDVG5mfmgq" + + "d8ZYVlLAxJLWHZ7XCs1pIcAG1LjEy5rKzQtlT2DdwBzsF5mdybWKCLr-fbEqFo_ftp9HIc6EL70pZ07ofHbl0e" + + "-PCkn5mJJYPbTNv7UxZgUU_2IqUJTxtwZD2GannSnwAPjd6D7u0W6CwFk-rhBe4aFAoMY29tcGFueV9uYW1lEg" + + "Rhc3VzGhUKCm1vZGVsX25hbWUSB05leHVzIDcaIAoRYXJjaGl0ZWN0dXJlX25hbWUSC2FybWVhYmktdjdhGhIK" + + "C2RldmljZV9uYW1lEgNkZWIaFgoMcHJvZHVjdF9uYW1lEgZyYXpvcmcaRQoKYnVpbGRfaW5mbxI3Z29vZ2xlL3" + + "Jhem9yZy9kZWI6TU5DL01BU1RFUi8xODU1NjM3OnVzZXJkZWJ1Zy9kZXYta2V5cxotCglkZXZpY2VfaWQSIEpR" + + "NVpJWkVMVUpBQlBVQzNLMkg1Q0NXNklVAAAAAAAAGiYKFHdpZGV2aW5lX2NkbV92ZXJzaW9uEg52My4wLjAtYW" + + "5kcm9pZDIIEAEgBCgJMAASSgpICiIIARoNd2lkZXZpbmVfdGVzdCIPc3RyZWFtaW5nX2NsaXAxEAEaIDE3NEQ4" + + "MkUyRjA0QzZGQkEwNjAwMDAwMDAwMDAwMDAwGAEgmZ_aqQUwFTij79WWBRqAAsguK-RkA18-zOzwX38JDpT877" + + "woGiL-kUhQ9w2NuDxolgFovFqp-VNEESpG9GG-dp8sFXAABy4Xk3YJnyVvAtI6MtiSPjDLt87QPSie6WCLgqvL" + + "zHoGSGuo4ij4HBX23QM0jZNDz_u_1rdZLKfV-nIWQ1sVI2u-QYnTYCztRmpMd1Gp1mZzLpcOL9PNGIYbuJSmQe" + + "fi3FDGdwfmKLRYg8peJXj2OPHKNyyJCfRMZ42PmBvg4bxI36Ets_TU_6m2RMKARnTLYoGq0bw0fl9GeV_27mDU" + + "Kvl0SIWXh0Jup8xxCO_iFQzw_7rCyW2FtrzXqq2qEmPRK5HjY-_c_0XVWh0="; + + String testSessionId = "TestSessionId"; + String testPurchaseId = "TestPurchaseId"; + String testProviderClientToken = "TestProviderClientToken"; + boolean testOverrideProviderClientToken = true; + byte[] decodedLicenseRequest = Base64.getUrlDecoder().decode(b64LicenseRequest); + byte[] testMasterSigningKeyBytes = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + for (int i = 0; i < loops; i++) { + try { + byte[] bad = {1, 2, 3, 4}; + env.createSession(bad); + } catch (WvPLStatusException e) { + System.out.println("Message for bad session: " + e.getMessage()); + System.out.println("Status message for bad session: " + e.getStatus().getMessage()); + } + WvPLSession session = null; + try { + session = env.createSession(decodedLicenseRequest); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + byte[] contentId = null; + try { + contentId = session.getContentId(); + System.out.println("ContentId:" + new String(contentId, UTF_8)); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + System.out.println("Version: " + WvPLSession.getVersionString()); + // VMP Status + try { + System.out.println( + "VMP Status: " + session.verifyPlatform().getPlatformVerificationStatus()); + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + // Set parameters on the created session. + // Set policy parameters. + WvPLPlaybackPolicy policy = new WvPLPlaybackPolicy(); + policy.setLicenseDurationSeconds(10000000L); + session.setPolicy(policy); + + // Optional. Check the qualified custom profiles for the content owner. + List qualifiedProfileNames; + WvPLStatus status; + if (customProfileOwners.contains(contentOwner)) { + try { + qualifiedProfileNames = session.getQualifiedCustomDeviceSecurityProfiles(contentOwner); + if (!qualifiedProfileNames.isEmpty()) { + System.out.println( + "DRM qualifying custom profiles for owner <" + contentOwner + ">:"); + for (String profileName : qualifiedProfileNames) { + System.out.printf("%s ", profileName); + } + System.out.println(); + } + } catch (WvPLStatusException e) { + status = e.getStatus(); + System.out.println( + "Failed to get qualifying custom profiles: " + + status.getStatusCode() + + ", message: " + + status.getMessage() + + " for owner: <" + + contentOwner + + ">"); + } + } + // Content keys are generated based on the info from qualifying profiles. + // The qualified profiles can be used to determine the content keys allowed + // in the license. + // In this example, the following `key1` and `key2` are generated based on + // qualified custom profiles. Those keys would support SD and HD content. + WvPLKey key1 = new WvPLKey(); + byte[] data1 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key1.setKeyBytes(data1); + key1.setTrackType(WvPLTrackType.TrackType.VIDEO_SD); + session.addKey(key1); + + WvPLKey key2 = new WvPLKey(); + byte[] data2 = {10, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16}; + key2.setKeyId(data2); + key2.setKeyBytes(data2); + key2.setTrackType(WvPLTrackType.TrackType.VIDEO_HD); + WvPLOutputProtection outputProtection = new WvPLOutputProtection(); + outputProtection.setHdcp(WvPLHdcp.HDCP.HDCP_V2_2); + outputProtection.setSecurityLevel(WvPLSecurityLevel.SecurityLevel.SW_SECURE_DECODE); + outputProtection.setDisableAnalogOutput(true); + outputProtection.setCgms(WvPLCgms.Cgms.COPY_FREE); + System.out.println( + "SecurityLevel for outputProtection = " + outputProtection.getSecurityLevel()); + WvPLVideoResolutionConstraint videoResolutionConstraint1 = + new WvPLVideoResolutionConstraint(); + videoResolutionConstraint1.setMinResolutionPixels(300); + videoResolutionConstraint1.setMaxResolutionPixels(600); + videoResolutionConstraint1.setHdcp(WvPLHdcp.HDCP.HDCP_V2); + WvPLVideoResolutionConstraint videoResolutionConstraint2 = + new WvPLVideoResolutionConstraint(); + videoResolutionConstraint2.setMinResolutionPixels(3000); + videoResolutionConstraint2.setMaxResolutionPixels(6000); + videoResolutionConstraint2.setHdcp(WvPLHdcp.HDCP.HDCP_V1); + key2.addVideoResolutionConstraint(videoResolutionConstraint1); + key2.addVideoResolutionConstraint(videoResolutionConstraint2); + System.out.println( + "Number of video resolutions in key2 = " + key2.getVideoResolutionConstraint().size()); + for (WvPLVideoResolutionConstraint vrc : key2.getVideoResolutionConstraint()) { + System.out.println("min resolution in pixels = " + vrc.getMinResolutionPixels() + + ", max resolution in pixels = " + vrc.getMaxResolutionPixels() + + ", hdcp = " + vrc.getHdcp()); + } + key2.setOutputProtection(outputProtection); + WvPLOutputProtection requestedOutputProtection = new WvPLOutputProtection(); + requestedOutputProtection.setHdcp(WvPLHdcp.HDCP.HDCP_V2); + key2.setRequestedOutputProtection(requestedOutputProtection); + session.addKey(key2); + + // Or we could call filterKey() to filter out the keys. Keys could be inserted + // with one security profile as required profile, as well as content owner. In + // filterkey() API it already contains the logic of checking the qualified security + // profiles for the content owner. + WvPLKey key3 = new WvPLKey(); + byte[] data3 = {4, 4, 4, 4, 4, 4, 4, 4, 4, 10, 11, 12, 13, 14, 15, 16}; + key3.setKeyBytes(data3); + key3.setTrackType(WvPLTrackType.TrackType.VIDEO_HD); + outputProtection.setHdcp(WvPLHdcp.HDCP.HDCP_NONE); + outputProtection.setSecuredataPath(true); + key3.setOutputProtection(outputProtection); + String requiredProfileName = "L1"; + key3.setRequiredProfile(requiredProfileName.getBytes(UTF_8)); + key3.setContentOwner(contentOwner.getBytes(UTF_8)); + WvPLCapabilityStatus capabilityStatus = session.filterKey(key3); + if (capabilityStatus.getStatus() + != WvPLCapabilityStatus.DeviceCapabilityStatus.CAPABILITY_OK) { + System.out.println( + "Failed to filter key: " + + capabilityStatus.getStatus() + + " for owner: <" + + contentOwner + + ">"); + } + System.out.println("Is device ChromeCDM = " + session.isChromeCDM()); + + WvPLSessionInit sessionInit = new WvPLSessionInit(); + sessionInit.setSessionId(testSessionId); + sessionInit.setPurchaseId(testPurchaseId); + sessionInit.setMasterSigningKey(testMasterSigningKeyBytes); + sessionInit.setProviderClientToken(testProviderClientToken); + sessionInit.setOverrideProviderClientToken(testOverrideProviderClientToken); + + session.setSessionInit(sessionInit); + + try { + byte[] license = session.generateLicense(); + System.out.println( + "License Duration Seconds = " + session.getPolicy().getLicenseDurationSeconds()); + System.out.print("License Response = "); + if (license.length > 0) { + printSignedMessage(license); + } else { + System.out.println("Empty"); + } + } catch (WvPLStatusException e) { + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + try { + // GetProvisionedDeviceInfo is deprecated, use getDeviceInfo instead. + WvPLDeviceInfo deviceInfo = session.getDeviceInfo(); + System.out.println("DeviceInfo = " + deviceInfo); + + WvPLDeviceSecurityLevel.DeviceSecurityLevel deviceSecurityLevel = + deviceInfo.getDeviceSecurityLevel(); + // Expect a L1 device for the license request in use. + System.out.println( + "Device Security level = " + deviceSecurityLevel.getDeviceSecurityLevel()); + } catch (WvPLStatusException e) { + System.out.println("Failed to get deviceInfo."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + try { + WvPLClientInfo clientInfo = session.getClientInfo(); + WvPLHdcp.HDCP maxHdcpVersion = clientInfo.getMaxHdcpVersion(); + System.out.println("max hdcp version = " + maxHdcpVersion.getHDCP() + + ", oem crypto api version = " + clientInfo.getOemCryptoApiVersion() + + ", provider client token = " + clientInfo.getProviderClientToken()); + Map namesValues = clientInfo.getNamesValues(); + for (Map.Entry nameValue : namesValues.entrySet()) { + System.out.println("Key = " + nameValue.getKey() + ", Value = " + nameValue.getValue()); + } + } catch (WvPLStatusException e) { + System.out.println("Failed to get clientInfo from license request."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + WvPLWidevinePsshData widevinePsshData = null; + try { + widevinePsshData = session.getPsshData(); + } catch (WvPLStatusException e) { + System.out.println("Failed to get psshData from license request."); + System.out.println("Message: " + e.getMessage()); + System.out.println("Status message: " + e.getStatus().getMessage()); + } + if (widevinePsshData.getContentId().length > 0) { + System.out.println( + "ContentId from Widevine Pssh = " + Arrays.toString(widevinePsshData.getContentId())); + } else { + System.out.println("ContentId from Widevine Pssh is empty"); + } + if (!widevinePsshData.getKeyIds().isEmpty()) { + for (byte[] keyId : widevinePsshData.getKeyIds()) { + System.out.println("keyId from Widevine Pssh = " + Arrays.toString(keyId)); + } + } else { + System.out.println("KeyIds from Widevine Pssh is empty"); + } + WvPLStatus errorStatus = + new WvPLStatus(WvPLStatus.StatusCode.SERVICE_CERTIFICATE_REQUEST_MESSAGE, ""); + byte[] error = env.generateErrorResponse(errorStatus); + System.out.print("Service Certificate Response = "); + if (error.length > 0) { + printSignedMessage(error); + } else { + System.out.println("Empty"); + } + + // license counter with flushData set + boolean flushData = true; + byte[] statsBytes = env.getStatsAsBytes(flushData); + System.out.print("stats as bytes with flush set = "); + if (statsBytes.length > 0) { + System.out.println(Arrays.toString(statsBytes)); + } else { + System.out.println("Empty"); + } + + String statsString = env.getStatsAsString(flushData); + System.out.print("stats as std::string with flush set = "); + if (statsString.length() > 0) { + System.out.println(statsString); + } else { + System.out.println("Empty"); + } + // license counter with flushData unset + flushData = false; + statsBytes = env.getStatsAsBytes(flushData); + System.out.print("stats as bytes with flush unset = "); + if (statsBytes.length > 0) { + System.out.println(Arrays.toString(statsBytes)); + } else { + System.out.println("Empty"); + } + statsString = env.getStatsAsString(flushData); + System.out.print("stats as String with flush unset = "); + if (statsString.length() > 0) { + System.out.println(statsString); + } else { + System.out.println("Empty"); + } + + WvPLSessionInit retrievedSessionInit = session.getSessionInit(); + System.out.println( + "retrieved session init fields: sessionId = " + retrievedSessionInit.getSessionId() + + ", purchaseId = " + retrievedSessionInit.getPurchaseId() + + ", masterSigningKey = " + Arrays.toString(retrievedSessionInit.getMasterSigningKey()) + + ", providerClientToken = " + retrievedSessionInit.getProviderClientToken() + + ", overrideProviderClientToken = " + + retrievedSessionInit.getOverrideProviderClientToken()); + try { + policy.close(); + key1.close(); + key2.close(); + outputProtection.close(); + session.close(); + } catch (IOException e) { + System.out.println("IOException when closing: " + e.getMessage()); + } + System.out.println("Thread Name: " + threadName + ", Loop Complete: " + i); + try { + Thread.sleep(500); + } catch (InterruptedException e) { + System.out.println("InterruptedException in thread."); + } + } + System.out.println("Thread Ended: " + threadName); + } + } + + public static void printSignedMessage(byte[] bytes) { + try { + SignedMessage licenseMessage = + SignedMessage.parseFrom(bytes, ExtensionRegistry.getGeneratedRegistry()); + System.out.println(licenseMessage); + if (licenseMessage.getType() == SignedMessage.MessageType.LICENSE + || licenseMessage.getType() == SignedMessage.MessageType.SERVICE_CERTIFICATE) { + License licenseResponse = License.parseFrom(licenseMessage.getMsg()); + System.out.println(licenseResponse); + } + } catch (Exception e) { + System.out.print(" FAILED"); + } + } + + public static String loadCertificateStatusListFromFile(String certificateStatusListFile) + throws IOException { + BufferedReader br = Files.newBufferedReader(Path.of(certificateStatusListFile), UTF_8); + StringBuilder sb = new StringBuilder(); + String line = br.readLine(); + while (line != null) { + sb.append(line); + sb.append(System.lineSeparator()); + line = br.readLine(); + } + br.close(); + return sb.toString(); + } + + public static void main(String[] argv) throws Exception { + int numberOfRunners = 10; + int numberOfLoops = 100; + // TODO(yawenyu): Remove loadCertificateStatusListFromFile function. Add three flags to the + // main function for certificateStatusListFile,b64DrmServiceCertificate and b64PrivateKey. + String certificateStatusListFile = + "sdk/testing/sampleProdCertificateStatusList.json"; + String b64DrmServiceCertificate = + "CsYCCAMSEIrKPCL3PObh7uUsPogH1bwY-PDksQUijgIwggEKAoIBAQDP6G_52lmYxLv2m2qL3B2L" + + "tUUjCcHWvy4cxBe4_9TJLHkqaZe8InB4mmn_V0IV0f8-1jXu9cwxHycp0c2FzUe40KcK5Y1Tjqp2" + + "EgFzC_e7z_KnTv0_ar1E7HANAAJbfOZEsTPDiLqRyD0kS85lCCxHICPrruORnKvgogDm4Gr4ACNO" + + "NMG8WeH1mgVeIUNPpg1FVeeWYr1zMAmJmSHjPz6ymHW9lMNFLZayJZNjA9L-g4Ncv8mI03Qt0fmi" + + "hJLa5p9EHrqDuhbEgmD3fmEvxwyitR111NbXPAzJPk_4jfMqztIiqDoEXqBEpnFgdTBPwx9FmC3C" + + "en_0SGMMtpmC8sfJAgMBAAE6GWF0cy53di5zYW5kYm94Lmdvb2dsZS5jb20SgAN1Hma3aCJos4A_" + + "aa-JyanEIZ12SpZpkQissZxSI0JTwRgW8bnYMgMFqJAdxKQ60kDjwzlqi30bpqXgFa6dvfWjswlR" + + "cRQovHhR0UAnI04LmmXuH4LN1Exclh9TxKnMtYW9tkCKD-Ykrl1gbaBSYkTLTvn9zV8z7sHePDzz" + + "tNMZH0MFR2YWLc0X5TSPJETftB_iGgm0SoQy7CpFYEswBV4kTlTEtEbdH3D1tPvp2VT9--sT45b2" + + "rH2smhm-iiOi20sr42Dhcsl6TkIrmvuKcXv7oVjNHEUo4F25qmjFaNTVmBjxwfYPxTANqnnNJVIO" + + "bAqfQVMCJT0sUd5C0LWcYIaUOxRI2hJCp3rpEyIWPjexk8hRwZ1S2Sdiiiwlh_ms3PlSkyoMWIHa" + + "VllH3OV_8S1LFMy3ZgCOgx0rnFjNVpFayCSLWFhtE0waV2dQ1bhtYhGDxn17fO0EXUyNJhPa2rfy" + + "r1VDonJVG7CyyzwF88_0KEZISCQykw3oCF82PDKF2tU="; + String b64EncryptedProviderKeyConfig = + "ChlhdHMud3Yuc2FuZGJveC5nb29nbGUuY29tEhCKyjwi9zzm4e7lLD6IB9W8GtAB_ap4K2QYS3tx" + + "7Xj8siqnpONGJOfEBR5yJs4FxHBVRfVLw2_lvz4EavH0q5WjXFcODJyGjR-jTzhsoM_z4Qpi2rpp" + + "K1_TPv82glRJbmU9aKQwMa6GldCjjvJqhVJzcVRVhx19Y2b7stOQb5i4i9CHYWn4C4fjSXbkaaYl" + + "pYISNd0MbVrRK53vvyGWs8v9v6s-CsqrTJC7--gsn2fjNJfOTMN3Z_9pZzemoyCpdOWhqWChfjv0" + + "4e1PGHjNroGQOjxtNI0GAzi_e65NZcUHF1aDciIQk2NXF2Btbu59TB657lNEmSqAAl55dLmocO6O" + + "NLL-swezkDB6jdCjjxBehVbfLkIRM4M0MjXvyX9i78yeDbqF1FA9tdGv2brzNNgpecXxE8cuPWSi" + + "ED-Ml5-Pwt0Pcwnj8Z1o5lj4Is0J6BTeR8Mqs_VLzLNVc5YKsqNWA-Ad7WMDt5oasP54m-T5FhCS" + + "_XSd45fQG2QSgdv7niei_ZHWsVYWkIQVMbGw7Wxe33o3E5LwNZW9LQ0uMD4m_zdKhh-Tk8kvADWP" + + "b7YAnWZGhYWKm_5992weJ0BgD7ADjPvpO8NMX2mi-Np1RAbM92r9UMpxKYAsTTA1xz1H_HGrxvBd" + + "VB17Ji8nR8UrQmQokBPPAoi4iDs="; + String b64PrivateKey = + "MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQItfwZJLNOj2MCAggAMBQGCCqGSIb3" + + "DQMHBAiwSBxfbxJvkwSCBMi6EkXgJBbGDayLfDbm1EFCucR6OiGAJoH_1ePza9mGREhI_r4YqCZx" + + "opY8D5aFJIeKjR4KCiOoGZnn9xHu5JBhs_asGFWuSFry95fXFzfgYCFqzI2Za9TZkDpqDrh2d8on" + + "CGBIYgz9PaxXKrxAQxhLfKaZ8lB-pRi5SRTV-6nxG37ZfDMRIrHFQcxhlnjTSQ97Ix2iaK66UYDJ" + + "sqjapH3cYwk_B_xaxpbYUDlmuJBh14SzSpjG_HXlBWRxCKBRljXo6wjBoBFyKviu4p3Otcpfa7Rf" + + "1nF4gQHHW6HvMvQTaY0lC6D5NzyV7KWosBdYX0am7uvQKs9MqulhL0NpBFMywyb9CTDvccoDyanO" + + "U4nkSsax6ILS2trA7JKrb_4CX5W6qkmFgCqzgx8cNWI-1NABCJzBtF85BGoArQKW_sQqh96ulfTb" + + "MpyQKQ2Uvkqtfv3G7Q5Hz3A6qAJqf6A6a9ADsk4ry9-ZZshlxFw4iNa6kNQKKSO4EElIHXe47TAF" + + "658nb9aA2cSlLQnr7d9h-AyGghP6cztTazwgjiS7lXo4GwOQQ2jWuVJ4RI0750WdC5t1yS1p-qIC" + + "2Ckh71OF8d3DSDQYTMYjn5iOODQqqM9mx_VMIairNfrCsX9GvOHSw0My3OshKCuPXhdt3TkThp2T" + + "Mr4TlunHiPG5C7S1tSr0Brvy_c6XpejpLxmnUd-_J53GfbHLXeZiifMVCu7c7BKSkoDSLQwfk7lz" + + "Idu0BE9GtIrB1NmQasYaeE9L31TL4KegvROFksyK7mZnC6NEXZKsZdsfV3TcB0OZ52BE5L2X7CMO" + + "X-n_BQeH-cB-pbIuFqKtbjEcqRUag-m4MYZ2GkMwBJP3Sh_jewjh2TKPlkwvJI9FX5n7VGGuBvN5" + + "CmUqqgQAqu9ieVuz-VVylSIOwdEdSyPGQia45OlYd9HsTD7NdGPyseBjlVLWq2BI1lG5KqJqCH7w" + + "NxrIYl0PWOo6WrClWJW1CkJXRmoKzl5PTx-PL8W0KO3pZg94RMHVsZ8sRE62MPPu9Ltnl6x0Zjc8" + + "YQItP7eR-aF0wlQQ-8__TBTBah3hLMBsAEKV6xD2bTvHBW-3vd-WCxX3hM7FACULlxgbT5wkXb0K" + + "hUOWwim3zLRjbFhOI-MynVt6aM83bWrSRdbr52eyT4Ybx3EZ8tLVtzumgLVMWbJXcUnOU6I5y6W-" + + "tzzUHsDba5AtG4-u9UitUQlDd4Hh4GlUaRdCqX8PwQLl-efjJysBuNu5xobxp3df9SqRgxCdaC-J" + + "CS2Hi_hciIrcJNwxTJFUjilGOMDAqM0GdH8QMkbFjPAsAvz_fMYHoB4vyRYeURbwyiFb8hVOjgdB" + + "8M_oRlmeYIcS8DzR84WdV-yUV_hsakjIqr5KznmGqhDSgrv609vjxKLO3PUnXq1J5TcTH5hN-bHr" + + "WS-9zV0iA81aCVxk7HbCAj_ODuQjFYu_B31gvpkgICvgb-PMxCU-GJ5-bcYLWm-8apHdQ15SMbma" + + "TrW7k7JZLMMqSjc7aJ25NyIbAtBg70EjebAnJI1JqmnPV-lUzfeqW0ulRv1fQZH057BXCyaPhNDY" + + "rFf_lzyz-aX21HuL59l1B6rEJPU3qxdctT6kmi6L78fTvSP0V5aNd0box0Y="; + String b64SerializedSignedDsps = + "CtcBCKW6m4UGEioKAkwxEAAaACICEAEqDXdpZGV2aW5lX3Rlc3Q6DQiq_tKDBhD_gtH_rwcSLQoFTDMtVjIQAxoAI" + + "gIQAyoNd2lkZXZpbmVfdGVzdDoNCKr-0oMGEP-C0f-vBxIsCgJMMxADGgAiBAgPEAMqDXdpZGV2aW5lX3Rlc3Q6" + + "DQiq_tKDBhD_gtH_rwcSRgoIVGVzdCBEU1AQAhoECAMQAyIGCAsQASADKg13aWRldmluZV90ZXN0MgUI6AcQAjI" + + "FCOkHEAE6DQiq_tKDBhD_gtH_rwcSgANriJGUB9Gx1JwP1IIKmPsThy7k2P2GKCI6t0CNIuQ48Z54hz4HUC8lqV" + + "Ykae1qoVH6PD7oJJ4Wzc5VKWSs6iLCiS-CB2z4LwS2a7om93hhXZ1DRYBdHOsvmItYPwZwNcM5lZBYGNOCi36jp" + + "IVLqesIlnS4W3zjYUDEsiHhgbTftvZMRaSnbsDyvT5Hzc2zW6dyJbMLQfT-Yvt3oj4RmzxnDoc406Z01HVv3sPO" + + "gYefTTK9z348Qvcaol4D9EllBI2t9DODhKrbV9rOZbNN8R3SAHHSKy0r8abNoyGNLEDluhIxjsUX1t7m4S20Bh7" + + "-Ss5GwfysrU3tPXzJHIP5TY0pWeAW46UI3cDmPeJXfSEh85jl64GviY26l5tP2o_wxJ1WYOdP44hSs0QwNadG6E" + + "kaEoZ8Kr0LSVISinZ8rMjNoiIu7K8JSt92av3_422wg88yfnfO398kgpOAr6Z2AiC7z4p0R7IOSR0W3JKGL0QcO" + + "LddlYoqbLK5RvGOeFOh_QcYAg=="; + String passphrase = "encryptallthekitties"; + byte[] passphraseBytes = passphrase.getBytes(UTF_8); + + byte[] decodedDrmServiceCertificate = Base64.getUrlDecoder().decode(b64DrmServiceCertificate); + byte[] decodedEncryptedProviderKeyConfig = + Base64.getUrlDecoder().decode(b64EncryptedProviderKeyConfig); + byte[] decodedPrivateKey = Base64.getUrlDecoder().decode(b64PrivateKey); + + String certList = ""; + try { + certList = loadCertificateStatusListFromFile(certificateStatusListFile); + } catch (FileNotFoundException e) { + System.out.println("FileNotFoundException in reading input cert list."); + } catch (IOException e) { + System.out.println("IOException in reading input cert list."); + } + java.util.Map configValues = new HashMap<>(); + String providerIv = "d58ce954203b7c9a9a9d467f59839249"; + String providerKey = "1ae8ccd0e7985cc0b6203a55855a1034afc252980e970ca90e5202689f947ab9"; + // Define the configuration that is to be used for WvPLEnvironment. + configValues.put("allow_unknown_device", "1"); + configValues.put("provider", "widevine_test"); + configValues.put("provider_iv", providerIv); + configValues.put("provider_key", providerKey); + // Set the device certificate expiration to 10 years (10 * 365 * 24 * 3600). + // Note that in practice, the expiration should not be 10 years long. Certificate status list + // should be updated periodically. + configValues.put("device_certificate_expiration", "315360000"); + + java.util.Map preProvKeys = new java.util.HashMap<>(); + preProvKeys.put(100, "f7008b38acc00ec68c732ac665c55c65"); + + try (WvPLEnvironment env = new WvPLEnvironment(configValues)) { + env.setPreProvisioningKeys(preProvKeys); + + WvPLStatus status; + try { + status = env.setDeviceCertificateStatusList(certList.getBytes(UTF_8)); + } catch (WvPLStatusException e) { + status = e.getStatus(); + System.out.println("setDeviceCertificateStatusList exception Message: " + + e.getMessage() + ", exception status message: " + e.getStatus().getMessage() + + ", numeric code = " + e.getStatus().getNumericCode()); + } + status = + env.setServiceCertificate( + decodedDrmServiceCertificate, decodedPrivateKey, passphraseBytes); + if (status.getStatusCode() != WvPLStatus.StatusCode.OK) { + System.out.println("setServiceCertificate status = " + status.getStatusCode() + + ", message = " + status.getMessage()); + } else { + System.out.println("Successfully loaded service certificate"); + } + + // If using provider keys: set an encrypted provider key config. Note that the + // service certificate has to be set first. + status = env.setEncryptedProviderKeyConfig(decodedEncryptedProviderKeyConfig); + if (status.getStatusCode() != WvPLStatus.StatusCode.OK) { + System.out.println("setProviderKeyConfig status = " + status.getStatusCode() + + ", message = " + status.getMessage()); + } else { + System.out.println("Successfully set provider key config"); + } + + // Set custom device security profile list. + // One time setup each time new DSPs are loaded. + byte[] signedDsp = Base64.getUrlDecoder().decode(b64SerializedSignedDsps); + status = env.setCustomDeviceSecurityProfiles(signedDsp); + if (status.getStatusCode() != WvPLStatus.StatusCode.OK) { + System.out.println("setCustomDeviceSecurityProfiles status = " + status.getStatusCode() + + ", message = " + status.getMessage()); + return; + } + + // Optional sannity check. + // Verify the custom profile owners match with list of expected content + // owners. + List customProfileOwners = new ArrayList<>(); + try { + customProfileOwners = env.getCustomDeviceSecurityProfileOwners(); + } catch (WvPLStatusException e) { + status = e.getStatus(); + System.out.println("getCustomDeviceSecurityProfileOwners exception Message: " + + e.getMessage() + ", exception status message: " + e.getStatus().getMessage() + + ", numeric code = " + e.getStatus().getNumericCode()); + } + if (customProfileOwners.isEmpty()) { + System.out.println("Owner list is empty for custom device security profiles."); + return; + } + System.out.printf("Custom profile owners are: "); + for (String owner : customProfileOwners) { + System.out.printf("%s, ", owner); + } + System.out.println(); + + String contentOwner = "widevine_test"; + WvTestRunner[] runner = new WvTestRunner[numberOfRunners]; + ThreadGroup group = new ThreadGroup("Test Runner"); + for (int i = 0; i < runner.length; i++) { + runner[i] = new WvTestRunner(env, group, "thread_runner_" + i, numberOfLoops); + runner[i].setCustomProfileOwners(customProfileOwners); + runner[i].setContentOwner(contentOwner); + runner[i].start(); + } + for (WvPLUsingDspExample.WvTestRunner element : runner) { + element.join(); + } + env.close(); + } + } +} diff --git a/centos/sdk/external/cpp/wvpl/common/BUILD b/centos/sdk/external/cpp/wvpl/common/BUILD new file mode 100644 index 0000000..2b0b927 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/common/BUILD @@ -0,0 +1,20 @@ +######################################## +## Copyright 2022 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package( + default_visibility = ["//visibility:public"], +) + +filegroup( + name = "exported_sdk_header_files", + srcs = [ + "wvpl_sdk_environment.h", + "wvpl_sdk_session.h", + "wvpl_types.h", + ], +) diff --git a/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h b/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h new file mode 100755 index 0000000..f9c7a64 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h @@ -0,0 +1,235 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_ENVIRONMENT_H_ +#define VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_ENVIRONMENT_H_ + +#include +#include +#include +#include +#include + +#include "absl/base/attributes.h" +#include "absl/strings/string_view.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" + +namespace video_widevine { +class DrmRootCertificate; +class Environment; +} // namespace video_widevine +namespace video_widevine_server { +namespace wv_pl_sdk { + +// WvPLSdkEnvironment subclass is expected to have a constructor that accepts +// `const std::map& config_values`. +// Below are constants of various keys in such `config_values` map. +extern const char kDeviceCertificateExpiration[]; +extern const char kAllowUnknownDevice[]; +extern const char kProvider[]; +extern const char kProviderIv[]; +extern const char kProviderKey[]; +extern const char kApiVerInKcb[]; +extern const char kLimitUsageStatsToErrorsOnly[]; +// Valid values are 'test' and 'prod'. +extern const char kDrmCertificateType[]; +// Valid values are 'log', 'soft', and 'hard'. +extern const char kHardenedVmpMode[]; +extern const char kIndividualDeviceRevocationListExpirationSeconds[]; +extern const char kSetDefaultValuesInLicenseForContentProviderSettings[]; + +// Base environment class of various WvPL SDKs. +// This class is not meant to be instantiated directly. +class WvPLSdkEnvironment { + public: + virtual ~WvPLSdkEnvironment(); + // Generates a license response in response to an error condition. + // `create_session_status` is a previous error status + // returned by the CreateSession(). `license_response` points to a std::string to + // contain the license response and may not be NULL. This method returns true + // if there is an error license to be sent to the client, or false + // otherwise. + static bool GenerateErrorResponse(const WvPLStatus& create_session_status, + std::string* license_response); + + // Adds a service certificate to the environment that is used across sessions. + // `service_certificate` is a Google-generated certificate used to + // authenticate the service provider. + // `service_private_key` is the encrypted PKCS#8 private RSA key corresponding + // to the service certificate. + // `service_private_key_passphrase` is the password required to decrypt + // `service_private_key`. + // This is a thread-safe call. + virtual WvPLStatus SetDrmServiceCertificate( + const std::string& service_certificate, + const std::string& service_private_key, + const std::string& service_private_key_passphrase); + + // Returns the DRM root certificate configured for this environment. + // This is public because it is used by unit tests. + const video_widevine::DrmRootCertificate* drm_root_certificate() const { + return drm_root_certificate_.get(); + } + + virtual WvPLStatus SetDeviceCertificateStatusList( + const std::string& device_certificate_status_list); + + virtual WvPLStatus SetIndividualDeviceRevocationList( + absl::string_view individual_revocation_list); + + virtual WvPLStatus SetCustomDeviceSecurityProfiles( + const std::string& serialized_signed_device_security_profiles) const; + + ABSL_DEPRECATED( + "Use GetCustomDeviceSecurityProfileNames() instead after loading the " + "custom DSPs in the Environment class.") + virtual WvPLStatus GetDefaultDeviceSecurityProfileNames( + std::vector* profile_names) const; + + // Returns the default device security profile associated with `profile_name`. + ABSL_DEPRECATED( + "Use GetCustomDeviceSecurityProfiles() instead after loading the " + "custom DSPs in the Environment class.") + virtual WvPLStatus GetDefaultDeviceSecurityProfile( + const std::string& profile_name, + WvPLSecurityProfile* device_security_profile) const; + + virtual WvPLStatus GetCustomDeviceSecurityProfileOwners( + std::vector* custom_profile_owners) const; + + // Returns a list of custom device security profile names associated with + // `owner_name`. + virtual WvPLStatus GetCustomDeviceSecurityProfileNames( + const std::string& owner_name, + std::vector* profile_names) const; + + // Returns the custom device security profiles associated with `owner_name`. + virtual WvPLStatus GetCustomDeviceSecurityProfiles( + const std::string& owner_name, + std::vector* custom_device_security_profiles) const; + + // Enables delivery of licenses to revoked client devices. `system_id_list` is + // a comma separated list of systems Ids to allow even if revoked. + virtual void AllowRevokedDevices(const std::string& system_id_list); + + // Returns true if the licensing to `system_id` is allowed even if it is + // revoked. + virtual bool IsRevokedDeviceAllowed(uint32_t system_id) const; + + // Translates the license request from the CDM to a human-readable message, + // useful for debugging. This translated request is placed in `request_out`. + // Returns OK if parsing the `request` is successfully, else an error status. + virtual WvPLStatus GetRequestAsString(const std::string& request, + std::string* request_out) const; + + // Generates a signed request to be sent to Widevine Certificate Provisioning + // Server to retrieve device certificate status list (DCSL). + virtual WvPLStatus GenerateDeviceStatusListRequest( + std::string* signed_device_certificate_status_list_request) const = 0; + + // Sets the encrypted provider key config used for L3 CDM. + // `encrypted_provider_key_config_bytes` is a serialized + // EncryptedProviderKeyConfig proto message. + // Returns OK if decryption and parsing are successful, otherwise an error is + // returned. + // Note that this function has to be called after the service certificate is + // added to the SDK. + virtual WvPLStatus SetEncryptedProviderKeyConfig( + const std::string& encrypted_provider_key_config_bytes); + + ABSL_DEPRECATED("Use SetEncryptedProviderKeyConfig() instead.") + virtual WvPLStatus SetProviderKeyConfig( + const std::string& encrypted_provider_key_config_bytes) { + return SetEncryptedProviderKeyConfig(encrypted_provider_key_config_bytes); + } + + // Returns the hardened vmp mode used for L3 CDM. + HardenedVmpMode hardened_vmp_mode() const; + // Returns the value of config field + // set_default_values_in_license_for_content_provider_settings. If true, + // returns default values for fields from WvPLPlaybackPolicy, + // WvPLOutputProtection and WvPLKey(outputProtection, + // requestedOutputProtection, trackType fields) objects in generated license, + // even though they are not set in the license request. + virtual bool set_default_values_in_license_for_content_provider_settings() + const; + + // Returns a std::string containing the Widevine SDK version in the + // form .. . + std::string GetSdkVersionString() const; + + protected: + explicit WvPLSdkEnvironment( + const std::map& config_values); + + // Sets the variable environment_. + // This method is NOT thread safe. |environment_| is not mutex + // protected and changing it may be dangerous. + virtual void SetEnvironment( + std::unique_ptr environment); + + // Number of seconds until the device certificate status list (DCSL) expires + // after its creation time. Default value is 1 year. + uint32_t device_certificate_expiration_seconds_ = 365 * 24 * 60 * 60; + // Number of seconds until the individual device revocation list (IDRL) + // expires after its creation time. Default value is 1 year. + uint32_t idrl_expiration_seconds_ = 365 * 24 * 60 * 60; + + // "config_values" settings. + // Value for kDrmCertificateType key in "config_values" map. + // Supported values are "test" and "prod". Default value is "prod". + std::string drm_certificate_type_ = "prod"; + // Value for kProvider key in "config_values" map. + // This is the name of the provider hosting this service. + std::string provider_; + // Value for kProviderIv key in "config_values" map. + std::string provider_iv_; + // Value for kProviderKey key in "config_values" map. + std::string provider_key_; + + // If true, allow issuing licenses to devices not in the device certificate + // status list. + bool allow_unknown_device_ = false; + // DRM root certificate used for verifying all other DRM certificates. + std::unique_ptr drm_root_certificate_; + // Internal environment implementation. + std::unique_ptr environment_; + // If true, return the default values of WvPLPlaybackPolicy, + // WvPLOutputProtection and WvPLKey(outputProtection, + // requestedOutputProtection, trackType) fields in the license, even when + // fields are not explicitly set in request. + bool set_default_values_in_license_for_content_provider_settings_ = false; + + private: + // Define WvPLSdkSession as a friend class to access the + // drm_certificate_type_ field. + friend class WvPLSdkSession; + // Gets the expected service type for drm service certificate. + virtual int GetExpectedServiceCertificateType(); + + // Checks the type of `service_certificate`. Returns "OK" if the + // `service_certificate` can be used for the current SDK, else an error + // status. + virtual WvPLStatus CheckServiceCertificateType( + const std::string& service_certificate); + + // Retrieves whether sdk use widevine certificate or not. + virtual bool is_widevine_certificate() { return is_widevine_certificate_; } + + // Returns the DRM certificate type content provider set in the config_values. + virtual std::string GetDrmCertificateType() const { + return drm_certificate_type_; + } + // Only for Google-internal content providers. + bool is_widevine_certificate_ = false; +}; + +} // namespace wv_pl_sdk +} // namespace video_widevine_server + +#endif // VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_ENVIRONMENT_H_ diff --git a/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_session.h b/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_session.h new file mode 100755 index 0000000..2e56df1 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/common/wvpl_sdk_session.h @@ -0,0 +1,293 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_SESSION_H_ +#define VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_SESSION_H_ + +#include +#include +#include +#include + +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" + +namespace video_widevine { +class ClientIdentification; +class DrmRootCertificate; +class LicenseRequest; +class ProvisionedDeviceInfo; +class Session; +class SessionInit; +class SessionState; +class SignedMessage; + +const uint32_t WIDEVINE_PSSH_DATA_PROTECTION_SCHEME_UNKNOWN = 0; +const uint32_t WIDEVINE_PSSH_DATA_CENC = 0x63656E63; +const uint32_t WIDEVINE_PSSH_DATA_CBC1 = 0x63626331; +const uint32_t WIDEVINE_PSSH_DATA_CENS = 0x63656E73; +const uint32_t WIDEVINE_PSSH_DATA_CBCS = 0x63626373; + +} // namespace video_widevine +namespace video_widevine_server { +namespace wv_pl_sdk { + +class WvPLSdkSession { + public: + virtual ~WvPLSdkSession(); + + // Adds a WvPLKey `key` to the session. The key can be one of many supported + // KeyType (see wvpl_types.h). + virtual WvPLStatus AddKey(const WvPLKey& key); + + // Filters a WvPLKey `key`. Specifically, it checks if the device can meet the + // requirements specified in `key`. If requirements are met, add the key and + // the returned WvPLCapabilityStatus.status() will be CAPABILITY_OK. If + // requirements are not met, the returned WvPLCapabilityStatus will indicate + // which requirement is not met. + virtual WvPLCapabilityStatus FilterKey(WvPLKey& key); + + // Gets the list of WvPLKey that have been previously set in this session. + virtual const std::vector& keys() const { return keys_; } + + virtual void set_policy(const WvPLPlaybackPolicy& policy) { + policy_ = policy; + has_policy_ = true; + } + + virtual const WvPLPlaybackPolicy& policy() const { return policy_; } + + virtual void set_session_init(const WvPLSessionInit& session_init) { + session_init_ = session_init; + } + + virtual const WvPLSessionInit& session_init() const { return session_init_; } + + // Returns true if the license request is from Chrome CDM, false otherwise. + virtual bool IsChromeCDM() const; + + // Returns the Widevine PSSH data for the license request handled by this + // session. + virtual WvPLStatus GetPsshData( + WvPLWidevinePsshData* wvpl_widevine_pssh_data) const; + + // Returns the WvPLClientInfo information for the license request + // handled by this session. + virtual WvPLStatus GetClientInfo(WvPLClientInfo* client_info) const; + + // Returns the WvPLClientCapabilities information for the license request + // handled by this session. + virtual WvPLStatus GetClientCapabilities( + WvPLClientCapabilities* client_capabilities) const; + + // Returns the WvPLDeviceInfo information for the license request handled by + // this session. + virtual WvPLStatus GetDeviceInfo(WvPLDeviceInfo* device_info) const; + + virtual PlatformVerificationStatus VerifyPlatform() const; + + virtual WvPLRequestType GetRequestType() const { return request_type_; } + + // Returns true if the license type is offline, false otherwise. + virtual bool is_offline_license() const; + + // Returns true if the license request contains client id, false otherwise. + virtual bool has_client_id() const { return has_client_id_; } + + // Returns true if license request has encrypted_client_id, false otherwise. + virtual bool has_encrypted_client_id() { return has_encrypted_client_id_; } + + // Sets to whether to allow license generation for device with + // PlatformVerificationStatus = PLATFORM_UNVERIFIED. + virtual void set_allow_unverified_platform(bool allow_unverified_platform); + + // Retrieves the setting of whether license generation is allowed for device + // with PlatformVerificationStatus = PLATFORM_UNVERIFIED. + virtual bool allow_unverified_platform() const; + + // Sets whether this session should reject licensing to device with unknown + // make and model. Default value for this setting is false, meaning request + // from unknown make and model is not rejected. + virtual void set_reject_unknown_make_model(bool reject_unknown_make_model); + + // Retrieves the setting of whether license request from unknown make model is + // rejected. + virtual bool reject_unknown_make_model() const; + + // Sets to whether to allow license generation for device with + // PlatformVerificationStatus = PLATFORM_TAMPERED. + virtual void set_allow_tampered_platform(bool allow_tampered_platform); + + // Retrieves the setting of whether license generation is allowed for device + // with PlatformVerificationStatus = PLATFORM_TAMPERED. + virtual bool allow_tampered_platform() const; + + // Retrieves Widevine Security Profile DrmInfo of the device and return it via + // `drm_info`. Returns true the retrieval was successful, false otherwise. + virtual bool GetDrmInfo(WvPLSecurityProfile::DrmInfo* drm_info) const; + + ABSL_DEPRECATED( + "Use GetQualifiedCustomDeviceSecurityProfiles() instead after loading " + "the custom DSPs in the Environment class.") + virtual WvPLStatus GetQualifiedDefaultDeviceSecurityProfiles( + std::vector* default_qualified_profile_names) const; + + // Retrieves qualifying Custom Security Profiles names given the owner name. + virtual WvPLStatus GetQualifiedCustomDeviceSecurityProfiles( + const std::string& owner_name, + std::vector* custom_qualified_profile_names) const; + + // Gets content id and returned it in `content_id`. + // Return ok if the operation is successful, false otherwise. + WvPLStatus GetContentId(std::string* content_id) const; + + bool remote_attestation_verified() const; + + // Returns the serial number of certificate associated with this device and + // content provider. + virtual std::string GetDrmDeviceId() const; + + // Returns the session usage in `wvpl_session_usage`. + // Returns true if session usage exists in the license request and returned in + // `wvpl_session_usage`, false otherwise. + bool GetSessionUsage(WvPLSessionUsage& wvpl_session_usage) const; + + protected: + friend class WvPLSdkSessionTestPeer; + + explicit WvPLSdkSession( + const video_widevine::DrmRootCertificate* drm_root_certificate); + + WvPLSdkSession(std::unique_ptr session, + const video_widevine::DrmRootCertificate* drm_root_certificate, + const WvPLSdkEnvironment* wvpl_sdk_environment); + + virtual const WvPLDeviceInfo& device_info() const { return device_info_; } + + void set_license_request_from_cdm(const std::string& request_from_cdm) { + license_request_from_cdm_ = request_from_cdm; + } + + // Returns the WvPL Client Capabilities information for the license request + // handled by this session. + WvPLStatus GetWvPLClientCapabilities( + const video_widevine::ClientIdentification& client_id, + WvPLClientCapabilities* client_capabilities) const; + + // Copies `wvpl_session_init` into `session_init`. + virtual void CopySessionInit(const WvPLSessionInit& wvpl_session_init, + video_widevine::SessionInit* session_init) const; + + // Copies `wvpl_device_info` into `device_info`. + virtual void CopyProvisionedDeviceInfo( + const WvPLDeviceInfo& wvpl_device_info, + video_widevine::ProvisionedDeviceInfo* device_info); + + // Populates |device_info_|, |client_id_|, |pssh_data_| in this session based + // on the license request. + WvPLStatus ParseLicenseRequest(); + + // Copies `wvpl_session_state` into `session_state`. + void CopySessionState(const WvPLSessionState& wvpl_session_state, + video_widevine::SessionState* session_state); + + // Only used for unit testing. + // Sets system_id_. + virtual void SetSystemId(uint32_t system_id); + + // Returns |has_system_id_| value. True if session has system id. + virtual bool HasSystemId() const; + + // Returns |system_id_| value. + virtual uint32_t system_id() const; + + // Only used for unit testing. + // Sets drm serial number. + virtual void SetDrmSerialNumber(const std::string& drm_serial_number); + + // Returns drm serial number. + virtual std::string GetDrmSerialNumber() const; + + virtual bool has_policy() { return has_policy_; } + + // Set the provider which hosts this service. + virtual void set_provider(const std::string& provider) { + provider_ = provider; + } + + virtual void set_provider_iv(const std::string& provider_iv) { + provider_iv_ = provider_iv; + } + + virtual void set_provider_key(const std::string& provider_key) { + provider_key_ = provider_key; + } + + bool using_generated_content_id() const { + return using_generated_content_id_; + } + + const WvPLSdkEnvironment* wvpl_sdk_environment() const { + return wvpl_sdk_environment_; + } + + // Internal session implementation. + std::unique_ptr session_; + const video_widevine::DrmRootCertificate* drm_root_certificate_; + std::string user_agent_; + std::string client_ip_; + std::string device_id_; + std::string content_id_; + std::vector keys_; + WvPLPlaybackPolicy policy_; + WvPLSessionInit session_init_; + WvPLWidevinePsshData pssh_data_; + std::unique_ptr client_id_; + WvPLDeviceInfo device_info_; + bool has_pssh_data_ = false; + bool has_client_id_ = false; + PlatformVerificationStatus platform_verification_status_ = + PLATFORM_NO_VERIFICATION; + std::unique_ptr + signed_message_request_from_cdm_; + std::string license_request_from_cdm_; + std::string remote_attestation_cert_serial_number_; + std::unique_ptr sdk_license_request_; + WvPLRequestType request_type_; + bool has_session_state_ = false; + bool has_encrypted_client_id_ = false; + bool using_generated_content_id_ = false; + std::string provider_; + std::string provider_iv_; + std::string provider_key_; + const WvPLSdkEnvironment* wvpl_sdk_environment_ = nullptr; + + private: + WvPLCapabilityStatus CheckDeviceCapabilityByProfile( + const std::string& content_owner, const std::string& required_profile); + + WvPLCapabilityStatus CheckDeviceCapability( + const WvPLOutputProtection& required_output_protection); + + // Called when Device Security Profiles are used. Output Protections per + // Key are updated based on the Security Profile's Output Requirements and + // the Key's Output Protections as set by the Content Provider. This API is + // implemented as per go/dsp-key-filtering-updated. + virtual void UpdateOutputProtection( + const WvPLSecurityProfile& security_profile, WvPLKey& wvpl_key) const; + + std::unique_ptr system_id_; + bool has_policy_ = false; + bool enable_key_filtering_ = false; + bool has_client_id_from_upstream_ = false; +}; + +} // namespace wv_pl_sdk +} // namespace video_widevine_server + +#endif // VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_SDK_SESSION_H_ diff --git a/centos/sdk/external/cpp/wvpl/common/wvpl_types.h b/centos/sdk/external/cpp/wvpl/common/wvpl_types.h new file mode 100755 index 0000000..91a6c88 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/common/wvpl_types.h @@ -0,0 +1,2644 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_TYPES_H_ +#define VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_TYPES_H_ + +#include + +#include +#include +#include +#include +#include +#include + +#include "absl/base/attributes.h" +#include "common/status.h" + +namespace video_widevine_server { +namespace wv_pl_sdk { +typedef video_widevine::Status WvPLStatus; +typedef uint32_t uint32_t; +typedef int64_t int64_t; + +// The protection scheme used in the Widevine PSSH, represented as +// WvPLWidevinePsshData. +enum ProtectionScheme { + PROTECTION_SCHEME_UNKNOWN = 0, + CENC = 0x63656E63, // AES-CTR + CBC1 = 0x63626331, // AES-CBC + CENS = 0x63656E73, // AES-CTR pattern encryption + CBCS = 0x63626373 // AES-CBC pattern encryption +}; + +// Represents the status of the device. This would be mappable from the +// DeviceCertificateStatusList (DCSL). +enum DeviceStatus { + STATUS_UNKNOWN = 0, + STATUS_IN_TESTING = 1, // Pre-release, active device. + STATUS_RELEASED = 2, // Released, active device. + STATUS_TEST_ONLY = 3, // Development-only device. + STATUS_REVOKED = 4, // Revoked device. +}; + +// List of all output and security device capabilities used for key filtering. +enum DeviceCapabilityStatus { + CAPABILITY_UNKNOWN = 0, + CAPABILITY_OK = 1, + CAPABILITY_HDCP = 2, + CAPABILITY_OEMCRYPTO_VERSION = 3, + CAPABILITY_ANALOG_OUTPUT = 4, + CAPABILITY_DIGITAL_OUTPUT = 5, + CAPABILITY_ANTI_ROLLBACK = 6, + CAPABILITY_RESOURCE_RATING = 7, + CAPABILITY_SECURITY_LEVEL = 8, + CAPABILITY_SECURE_DATA_PATH = 9, + CAPABILITY_UNQUALIFIED_PROFILE = 10 +}; + +// Represents the key type for the keys that are used when generating a license. +// The generated license includes one or more key containers, which in turn, +// contains the key material, metadata and policy needed to use the key. +enum KeyType { + UNKNOWN_KEY = 0, + // Key used to decrypt media content. + CONTENT = 1, + // Key used for wrapping content keys. + ENTITLEMENT = 2, + // OEM-specified content key. + OEM_CONTENT = 3, + // Public signing key provided by content providers. Currently used by CAS + // for verifying the received ECM/EMM signature. Only EC key is supported + // for now. + PROVIDER_ECM_VERIFIER_PUBLIC_KEY = 4, + // Wrapped key for auxiliary crypto operations. + OPERATOR_SESSION = 5, + // OEM-specified Entitlement key. + OEM_ENTITLEMENT = 6 +}; + +// A shortcut for specifying whether to return keys for the video feature only +// or to return all keys or ignore the video feature. +// The VideoFeatureKeySet only applies when video feature is specified in the +// PSSH. +enum VideoFeatureKeySet { + VF_UNSPECIFIED = 0, + // License should not include keys for the video feature, instead only + // include keys not associated with the video feature. + VF_EXCLUDED = 1, + // License should only include keys associated with the video feature + // (e.g., HDR). + VF_ONLY = 2, + // License should include keys for the video feature and also for keys + // not associated with the video feature (e.g., SDR keys). + VF_INCLUDED = 3, +}; + +// The type of license used in the request and response between the client and +// the server. +enum LicenseType { + LICENSE_TYPE_UNSPECIFIED = 0, + STREAMING = 1, + OFFLINE = 2, + AUTOMATIC = 3, +}; + +// Represents the type of message that is included in the license prototol +// messaging between the client and the server. +enum MessageType { + UNKNOWN = 0, + LICENSE_REQUEST = 1, + SERVICE_CERTIFICATE_REQUEST = 4, + EXTERNAL_LICENSE_REQUEST = 9 +}; +// The type of certificate. +enum CertificateKeyType { + RSA_2048 = 0, + RSA_3072 = 1, +}; + +// The request type of the license request sent by the client. +enum LicenseRequestType { + REQUEST_TYPE_UNSPECIFIED = 0, + NEW = 1, + RENEWAL = 2, + RELEASE = 3, +}; + +// The status of the Verified Media Pipeline (VMP) verification as computed by +// the server, using the request from the client. +enum PlatformVerificationStatus { + PLATFORM_UNVERIFIED = 0, + PLATFORM_TAMPERED = 1, + PLATFORM_SOFTWARE_VERIFIED = 2, + PLATFORM_HARDWARE_VERIFIED = 3, + PLATFORM_NO_VERIFICATION = 4, + PLATFORM_SECURE_STORAGE_SOFTWARE_VERIFIED = 5 +}; + +// Indicates whether HDCP is required on digital outputs, and which +// version should be used. +enum HDCP { + HDCP_NONE = 0, + HDCP_V1 = 1, + HDCP_V2 = 2, + HDCP_V2_1 = 3, + HDCP_V2_2 = 4, + HDCP_V2_3 = 5, + HDCP_NO_DIGITAL_OUTPUT = 0xff +}; +// The platform and the OS of the device that is requesting a license. +enum Platform { + PLATFORM_UNSPECIFIED = 0, + PLATFORM_CHROMECAST = 1, + PLATFORM_FUCHSIA = 2, + PLATFORM_IOS = 3, + PLATFORM_IPAD_OS = 4, + PLATFORM_TV_OS = 5, + PLATFORM_ANDROID = 6, + PLATFORM_WINDOWS = 7, + PLATFORM_CHROME_OS = 8, + PLATFORM_MAC_OS = 9, + PLATFORM_LINUX = 10, + PLATFORM_WEB_OS = 11, + PLATFORM_TIZEN = 12, + PLATFORM_FIRE_OS = 13, + PLATFORM_ROKU = 14, + PLATFORM_PLAYSTATION = 15, + PLATFORM_XBOX = 16, + PLATFORM_KAIOS = 17, + PLATFORM_RDK = 18, + PLATFORM_OTHER = 19 +}; + +// The SecurityLevel enumeration allows the server to communicate the level +// of robustness required by the client, in order to use the key. +enum SecurityLevel { + SECURITY_LEVEL_UNDEFINED = 0, + SW_SECURE_CRYPTO = 1, + SW_SECURE_DECODE = 2, + HW_SECURE_CRYPTO = 3, + HW_SECURE_DECODE = 4, + HW_SECURE_ALL = 5 +}; + +enum HdcpSrmRule { + HDCP_SRM_RULE_NONE = 0, + CURRENT_SRM = 1, +}; + +// The Widevine device security level. +enum DeviceSecurityLevel { + DEVICE_LEVEL_UNSPECIFIED = 0, + DEVICE_LEVEL_1 = 1, + DEVICE_LEVEL_2 = 2, + DEVICE_LEVEL_3 = 3 +}; + +// Indicates the CGMS setting to be inserted on analog output. +enum CGMS { + CGMS_NONE = 42, + COPY_FREE = 0, + COPY_ONCE = 2, + COPY_NEVER = 3, +}; + +// Indicates the type of track that is to be specified with a WvPLKey or +// WvPLCasKey. +enum TrackType { + TRACK_TYPE_UNSPECIFIED = 0, + AUDIO = 1, + VIDEO_SD = 2, + VIDEO_HD = 3, + VIDEO_UHD1 = 4, + VIDEO_UHD2 = 5, +}; + +// Indicates the analog output capabilities of the device, specified in the +// license request from the client. +enum AnalogOutputCapabilities { + ANALOG_OUTPUT_UNKNOWN = 0, + ANALOG_OUTPUT_NONE = 1, + ANALOG_OUTPUT_SUPPORTED = 2, + ANALOG_OUTPUT_SUPPORTS_CGMS_A = 3, +}; + +// Used to specify the status of the make/model/year combination that is allowed +// by the device manufacturer. +// MODEL_STATUS_VERIFIED indicates that the manufacturer +// confirmed that it is correct. +// MODEL_STATUS_UNVERIFIED means that we have sufficient data +// to believe it is correct, but the manufacturer has not confirmed. +// MODEL_STATUS_REJECTED indicates that the manufacturer explicitly disallowed +// the use of the make/model/year combination. +// MODEL_STATUS_UNKNOWN indicates that we do not have sufficient information to +// indicate whether or not the device is allowed by the manufacturer. +enum ModelStatus { + MODEL_STATUS_UNSPECIFIED = 0, + MODEL_STATUS_VERIFIED = 1, + MODEL_STATUS_UNVERIFIED = 2, + MODEL_STATUS_REJECTED = 3, + MODEL_STATUS_UNKNOWN = 4, +}; + +// Represents what kind of content a key is created for. +enum WvPLKeyCategory { + // By default, key is created for single content. + SINGLE_CONTENT_KEY_DEFAULT = 0, + // Key is created for a group of contents. + GROUP_KEY = 1, +}; + +// Represents what kind of license category current license belongs to. +enum WvPLLicenseCategory { + // By default, license is used for single content. + SINGLE_CONTENT_LICENSE_DEFAULT = 0, + // License is used for multiple contents(could be a combination of + // single contents and groups of contents). + MULTI_CONTENT_LICENSE = 1, + // License is used for contents logically grouped. + GROUP_LICENSE = 2, +}; + +// Defines the current state of the device. It is used in +// licensing to determine if a license should be +// issued. The status affects if and how a device record is shown in +// DeviceCertificateStatusList (DCSL). +enum DeviceState { + DEVICE_STATE_UNKNOWN = 0, + IN_TESTING = 1, + RELEASED = 2, + DELETED = 3, + TEST_ONLY = 4, + REVOKED = 5, + PRE_RELEASE = 6, + REVOKED_LICENSING = 7, +}; + +// Client-side watermarking restrictions for the license. +enum WatermarkingControl { + // Watermarking may or may not be used, provider does not care. + WATERMARKING_CONTROL_UNSPECIFIED = 0, + // Watermarking must not be used. The device must disable watermarking + // if it supports it. + WATERMARKING_FORBIDDEN = 1, + // Watermarking is required if the device supports it. + WATERMARKING_REQUIRED = 2, +}; + +// The EncryptionScheme to be used for the WvPLKey. +enum WvPLEncryptionScheme { + ENCRYPTION_SCHEME_UNSPECIFIED = 0, + AES128_CTR = 1, + AES128_CBC = 2, +}; + +// Describes the mode of enforcement of the VMP hardened measures. +enum HardenedVmpMode { + // Only logs the hardened vmp results if there is a mismatch with the legacy + // vmp. + kLog = 0, + // Use the hardened vmp results if and only if the request received is from + // a new client CDM. + kSoft = 1, + // Use the hardeend vmp results for all CDM clients. + kHard = 2 +}; + +// The provisioning version of the device at Widevine initial provisioning. +enum ProvisioningVersion { + PROVISIONING_UNSPECIFIED = 0, + PROVISIONING_1_0 = 1, + PROVISIONING_2_0 = 2, + PROVISIONING_3_0 = 3, + PROVISIONING_4_0 = 4, +}; + +// Widevine initial provisioning / bootstrapping method. DRM certificates are +// required for retrieving licenses, so if a DRM certificate is not initially +// provisioned, then the provisioned credentials will be used to provision +// a DRM certificate via the Widevine Provisioning Service. +enum ProvisioningMethod { + // Don't use this. + PROVISIONING_METHOD_UNSPECIFIED = 0, + // Factory-provisioned device-unique keybox. + FACTORY_KEYBOX = 1, + // Factory-provisioned device-unique OEM certificate. + FACTORY_OEM_DEVICE_CERTIFICATE = 2, + // Factory-provisioned model-group OEM certificate. + FACTORY_OEM_GROUP_CERTIFICATE = 3, + // Factory-provisioned model-group DRM certificate (Level-3 "baked in"). + FACTORY_DRM_GROUP_CERTIFICATE = 4, + // OTA-provisioned keybox (Level-1 ARC++). + OTA_KEYBOX = 5, + // OTA-provisioned device-unique OEM certificate. + OTA_OEM_DEVICE_CERTIFICATE = 6, + // OTA-provisioned model-group OEM certificate. + OTA_OEM_GROUP_CERTIFICATE = 7, + // OTA-provisioned device-unique DRM certificate (Bedrock). + OTA_DRM_DEVICE_CERTIFICATE = 8, + // OTA-provisioned device-unique OEM certificate (Beanstalk). + OTA_OEM_DEVICE_CERTIFICATE_SIGMA_210 = 9, + // OTA-provisioned keyboxes using Android Attestation for authentication. + OTA_ANDROID_ATTESTATION_KEYBOX = 10, + // OTA-provisioned device-unique OEM certificate (Google Dice Attestation). + OTA_OEM_DEVICE_CERTIFICATE_PROVISIONING_4 = 11, + // OTA-provisioned device-unique DRM certificate using Drm Reprovisioning. + OTA_DRM_DEVICE_CERTIFICATE_DRM_REPROVISIONING = 12, +}; + +// The base for (delayed) timers, i.e. the time from which the delayed timer +// starts. +enum TimerDelayBase { + // Not specified + TIMER_DELAY_BASE_UNSPECIFIED = 0, + // The timer delay is based on "license start time" from a license. + LICENSE_START = 1, + // The timer delay is based on the time the license is received by the + // client, whether the license is newly issued by the server or loaded + // from the disk (for persistent licenses). + // IMPORTANT: The playback window also begins immediately at license load + // time. + LICENSE_LOAD = 2, + // The timer delay is based on the time of first decryption. + // NOTE: For persistent licenses, the first decryption time should be + // persisted so that the "first decrypt" should only happen once even when + // the license is loaded repeatedly. + FIRST_DECRYPT = 3, +}; + +// The clock security level as sent in a license request of RELEASE +// LicenseRequestType. +enum ClockSecurityLevel { + INSECURE_CLOCK = 0, + SECURE_TIMER = 1, + SECURE_CLOCK = 2, + HW_SECURE_CLOCK = 3, +}; + +// Vulnerability levels as defined by NIST national vulnerability database. +// https://nvd.nist.gov/vuln-metrics/cvss +enum VulnerabilityLevel { + VULNERABILITY_LEVEL_UNSPECIFIED = 0, + VULNERABILITY_LEVEL_NONE = 1, + VULNERABILITY_LEVEL_LOW = 2, + VULNERABILITY_LEVEL_MEDIUM = 3, + VULNERABILITY_LEVEL_HIGH = 4, + VULNERABILITY_LEVEL_CRITICAL = 5, +}; + +// Verification levels for a Device. +enum VerificationLevel { + VERIFICATION_LEVEL_UNSPECIFIED = 0, + VERIFICATION_LEVEL_UNVERIFIED = 1, + VERIFICATION_LEVEL_VERIFIED = 2, + VERIFICATION_LEVEL_VERIFIED_GTS = 3, +}; + +// DeCENC mitigation options. +enum DecencMitigationOption { + DECENC_MITIGATION_OPTION_UNSPECIFIED = 0, + DECENC_MITIGATION_OPTION_AUTHENTICATE_BITSTREAM = 1, + DECENC_MITIGATION_OPTION_VALIDATE_BITSTREAM = 2, + DECENC_MITIGATION_OPTION_RESTRICT_DECODING = 3, +}; + +// Models the types of data that can be included in a license +// request. +class WvPLRequestType { + public: + WvPLRequestType() { + message_type_ = UNKNOWN; + license_type_ = STREAMING; + license_request_type_ = REQUEST_TYPE_UNSPECIFIED; + } + + void set_message_type(MessageType message_type) { + message_type_ = message_type; + } + MessageType message_type() const { return message_type_; } + + void set_license_type(LicenseType license_type) { + license_type_ = license_type; + } + LicenseType license_type() const { return license_type_; } + + void set_license_request_type(LicenseRequestType license_request_type) { + license_request_type_ = license_request_type; + } + LicenseRequestType license_request_type() const { + return license_request_type_; + } + + private: + // Type of the message in this request, default value is UNKNOWN. + MessageType message_type_; + // Type of the license, default value is STREAMING. + LicenseType license_type_; + // Type of the license request, default value is REQUEST_TYPE_UNSPECIFIED. + LicenseRequestType license_request_type_; +}; + +// Models the playback policy that is included in a license. This is set by the +// content provider per license request, +class WvPLPlaybackPolicy { + public: + WvPLPlaybackPolicy() { + license_duration_seconds_ = 0; + playback_duration_seconds_ = 0; + play_start_grace_period_seconds_ = 0; + rental_duration_seconds_ = 0; + renewal_interval_seconds_ = 0; + renewal_recovery_duration_seconds_ = 0; + renewal_retry_interval_seconds_ = 0; + can_play_ = true; + can_renew_ = false; + can_persist_ = false; + soft_enforce_playback_duration_ = false; + soft_enforce_rental_duration_ = true; + always_include_client_id_ = false; + renew_with_usage_ = false; + watermarking_control_ = WATERMARKING_CONTROL_UNSPECIFIED; + timer_delay_base_ = TIMER_DELAY_BASE_UNSPECIFIED; + } + + void set_license_duration_seconds(int64_t duration) { + license_duration_seconds_ = duration; + has_license_duration_seconds_ = true; + } + int64_t license_duration_seconds() const { return license_duration_seconds_; } + bool has_license_duration_seconds() const { + return has_license_duration_seconds_; + } + void set_play_start_grace_period_seconds(int64_t duration) { + play_start_grace_period_seconds_ = duration; + this->has_play_start_grace_period_seconds_ = true; + } + int64_t play_start_grace_period_seconds() const { + return play_start_grace_period_seconds_; + } + bool has_play_start_grace_period_seconds() const { + return has_play_start_grace_period_seconds_; + } + void set_playback_duration_seconds(int64_t duration) { + playback_duration_seconds_ = duration; + has_playback_duration_seconds_ = true; + } + int64_t playback_duration_seconds() const { return playback_duration_seconds_; } + bool has_playback_duration_seconds() const { + return has_playback_duration_seconds_; + } + void set_rental_duration_seconds(int64_t duration) { + rental_duration_seconds_ = duration; + has_rental_duration_seconds_ = true; + } + int64_t rental_duration_seconds() const { return rental_duration_seconds_; } + bool has_rental_duration_seconds() const { + return has_rental_duration_seconds_; + } + void set_renewal_interval_seconds(int64_t duration) { + renewal_interval_seconds_ = duration; + has_renewal_interval_seconds_ = true; + } + int64_t renewal_interval_seconds() const { return renewal_interval_seconds_; } + bool has_renewal_interval_seconds() const { + return has_renewal_interval_seconds_; + } + void set_renewal_recovery_duration_seconds(int64_t dur) { + renewal_recovery_duration_seconds_ = dur; + has_renewal_recovery_duration_seconds_ = true; + } + int64_t renewal_recovery_duration_seconds() const { + return renewal_recovery_duration_seconds_; + } + bool has_renewal_recovery_duration_seconds() const { + return has_renewal_recovery_duration_seconds_; + } + void set_renewal_retry_interval_seconds(int64_t retry_interval) { + renewal_retry_interval_seconds_ = retry_interval; + has_renewal_retry_interval_seconds_ = true; + } + int64_t renewal_retry_interval_seconds() const { + return renewal_retry_interval_seconds_; + } + bool has_renewal_retry_interval_seconds() const { + return has_renewal_retry_interval_seconds_; + } + void set_renew_with_usage(bool usage_flag) { + renew_with_usage_ = usage_flag; + has_renew_with_usage_ = true; + } + bool renew_with_usage() const { return renew_with_usage_; } + bool has_renew_with_usage() const { return has_renew_with_usage_; } + void set_renewal_url(const std::string& url) { + renewal_url_ = url; + has_renewal_url_ = true; + } + const std::string& renewal_url() const { return renewal_url_; } + bool has_renewal_url() const { return has_renewal_url_; } + void set_can_play(bool play_flag) { + can_play_ = play_flag; + has_can_play_ = true; + } + bool can_play() const { return can_play_; } + bool has_can_play() const { return has_can_play_; } + void set_can_persist(bool persist_flag) { + can_persist_ = persist_flag; + has_can_persist_ = true; + } + bool can_persist() const { return can_persist_; } + bool has_can_persist() const { return has_can_persist_; } + void set_can_renew(bool renew_flag) { + can_renew_ = renew_flag; + has_can_renew_ = true; + } + bool can_renew() const { return can_renew_; } + bool has_can_renew() const { return has_can_renew_; } + void set_soft_enforce_playback_duration(bool soft_enforce_playback_duration) { + soft_enforce_playback_duration_ = soft_enforce_playback_duration; + has_soft_enforce_playback_duration_ = true; + } + bool soft_enforce_playback_duration() const { + return soft_enforce_playback_duration_; + } + bool has_soft_enforce_playback_duration() const { + return has_soft_enforce_playback_duration_; + } + void set_always_include_client_id(bool always_include_client_id) { + always_include_client_id_ = always_include_client_id; + has_always_include_client_id_ = true; + } + bool always_include_client_id() const { return always_include_client_id_; } + bool has_always_include_client_id() const { + return has_always_include_client_id_; + } + void set_soft_enforce_rental_duration(bool soft_enforce_rental_duration) { + soft_enforce_rental_duration_ = soft_enforce_rental_duration; + has_soft_enforce_rental_duration_ = true; + } + bool soft_enforce_rental_duration() const { + return soft_enforce_rental_duration_; + } + bool has_soft_enforce_rental_duration() const { + return has_soft_enforce_rental_duration_; + } + void set_watermarking_control(WatermarkingControl watermarking_control) { + watermarking_control_ = watermarking_control; + has_watermarking_control_ = true; + } + WatermarkingControl watermarking_control() const { + return watermarking_control_; + } + bool has_watermarking_control() const { return has_watermarking_control_; } + void set_initial_renewal_delay_base(TimerDelayBase timer_delay_base) { + timer_delay_base_ = timer_delay_base; + has_timer_delay_base_ = true; + } + TimerDelayBase initial_renewal_delay_base() const { + return timer_delay_base_; + } + bool has_initial_renewal_delay_base() const { return has_timer_delay_base_; } + + private: + // The license window. Once a license is granted, the number of seconds to use + // this license. Default is 0, indicating unlimited license. + int64_t license_duration_seconds_; + + // Setting to determine if |license_duration_seconds_| is set. If 'true', it + // indicates that set_license_duration_seconds() was previously called to set + // |license_duration_seconds_|. + bool has_license_duration_seconds_ = false; + + // The playback window. Once initial playback starts, the number of seconds + // to use the license. Default is 0, indicating unlimited but not to exceed + // the license_duration_window. + int64_t playback_duration_seconds_; + + // Setting to determine if |playback_duration_seconds_| is set. If 'true', it + // indicates that set_playback_duration_seconds() was previously called to set + // |playback_duration_seconds_|. + bool has_playback_duration_seconds_ = false; + + // Duration of grace period before playback_duration_seconds (short window) + // goes into effect. Optional. + int64_t play_start_grace_period_seconds_; + + // Setting to determine if |play_start_grace_period_seconds_| is set. If + // 'true', it indicates that set_play_start_grace_period_seconds() was + // previously called to set |play_start_grace_period_seconds_|. + bool has_play_start_grace_period_seconds_ = false; + + // The rental window. Default is 0, indicating unlimited but not to exceed + // the license_duration_window. + int64_t rental_duration_seconds_; + + // Setting to determine if |rental_duration_seconds_| is set. If 'true', it + // indicates that set_rental_duration_seconds() was previously called to set + // |rental_duration_seconds_|. + bool has_rental_duration_seconds_ = false; + + // How many seconds after license_start_time, before renewal is first + // attempted. + int64_t renewal_interval_seconds_; + + // Setting to determine if |renewal_interval_seconds_| is set. If 'true', it + // indicates that set_renewal_interval_seconds() was previously called to set + // |renewal_interval_seconds_|. + bool has_renewal_interval_seconds_ = false; + + // The window of time, in which playback is allowed to continue while + // renewal is attempted, yet unsuccessful due to backend problems with + // the license server. + int64_t renewal_recovery_duration_seconds_; + + // Setting to determine if |renewal_recovery_duration_seconds_| is set. If + // 'true', it indicates that set_renewal_recovery_duration_seconds() was + // previously called to set |renewal_recovery_duration_seconds_|. + bool has_renewal_recovery_duration_seconds_ = false; + + // Specifies the delay in seconds between subsequent license + // renewal requests, in case of failure. + int64_t renewal_retry_interval_seconds_; + + // Setting to determine if |renewal_retry_interval_seconds_| is set. If + // 'true', it indicates that set_renewal_retry_interval_seconds() was + // previously called to set |renewal_retry_interval_seconds_|. + bool has_renewal_retry_interval_seconds_ = false; + + // Indicates that the license shall be sent for renewal when usage is + // started. + bool renew_with_usage_; + + // Setting to determine if |renew_with_usage_| is set. If + // 'true', it indicates that set_renew_with_usage() was + // previously called to set |renew_with_usage_|. + bool has_renew_with_usage_ = false; + + // Renewal requests are sent to this URL. + std::string renewal_url_; + + // Setting to determine if |renewal_url_| is set. If + // 'true', it indicates that set_renewal_url() was + // previously called to set |renewal_url_|. + bool has_renewal_url_ = false; + + // Indicates that playback of ths content is allowed. + bool can_play_; + + // Setting to determine if |can_play_| is set. If + // 'true', it indicates that set_can_play() was + // previously called to set |can_play_|. + bool has_can_play_ = false; + + // Indicates that the license may be persisted to non-volatile storage for + // offline use. + bool can_persist_; + + // Setting to determine if |can_persist_| is set. If + // 'true', it indicates that set_can_persist() was + // previously called to set |can_persist_|. + bool has_can_persist_ = false; + + // Indicates that renewal of this license is allowed. + bool can_renew_; + + // Setting to determine if |can_renew_| is set. If + // 'true', it indicates that set_can_renew() was + // previously called to set |can_renew_|. + bool has_can_renew_ = false; + + // 'soft' enforcement of playback duration. If set to true, video playback + // goes to completion even if 'short' duration of playback window expires. + bool soft_enforce_playback_duration_; + + // Setting to determine if |soft_enforce_playback_duration_| is set. If + // 'true', set_soft_enforce_playback_duration() was called to set + // |soft_enforce_playback_duration_|. Default is 'false'. + bool has_soft_enforce_playback_duration_ = false; + + // 'soft' enforcement of rental duration. Initial playback *must* always + // start before |rental_duration_seconds_|. If set to true, subsequent + // playbacks are allowed even after expiration of |rental_duration_seconds_|. + // If set to false, subsequent playbacks are not allowed after expiration of + // |rental_duration_seconds_|. + bool soft_enforce_rental_duration_; + + // Setting to determine if |soft_enforce_rental_duration| is set. If 'true', + // set_soft_enforce_rental_duration() was called to set + // |soft_enforce_rental_duration_|. + bool has_soft_enforce_rental_duration_ = false; + + // indicates to client that RENEWAL and RELEASE requests should include + // Clientidentification. + bool always_include_client_id_; + + // Setting to determine if |always_include_client_id_| is set. If + // 'true', it indicates that set_always_include_client_id() was + // previously called to set |always_include_client_id_|. + bool has_always_include_client_id_ = false; + + // Optional requirement to indicate watermarking is allowed. + WatermarkingControl watermarking_control_; + + // Setting to determine if |watermarking_control_| is set. If + // 'true', it indicates that set_watermarking_control() was + // previously called to set |watermarking_control_|. + bool has_watermarking_control_ = false; + + // The base for |renewal_interval_seconds_| for the initial license. For + // renewal licenses this field will be ignored and |renewal_interval_seconds_| + // is always be based on |license_start_time|. NOTE: For backward + // compatibility, when set to TIMER_DELAY_BASE_UNSPECIFIED or has no value, + // the actual "renewal delay base" will be FIRST_DECRYPT if |renew_with_usage| + // is true, or LICENSE_START otherwise. + TimerDelayBase timer_delay_base_; + + // Setting to determine if |timer_delay_base_| is set. If + // 'true', it indicates that set_timer_delay_base() was + // previously called to set |timer_delay_base_|. + bool has_timer_delay_base_ = false; +}; + +// LicenseIdentification is propagated from LicenseRequest to License, +// incrementing version with each iteration. +class LicenseIdentification { + public: + LicenseIdentification() { + version_ = 0; + type_ = STREAMING; + } + + // `request_id` must be specified in bytes. + void set_request_id(const std::string& request_id) { + request_id_ = request_id; + } + + const std::string& request_id() { return request_id_; } + + // `session_id` must be specified in bytes. + void set_session_id(const std::string& session_id) { + session_id_ = session_id; + } + + const std::string& session_id() { return session_id_; } + + // `purchase_id` must be specified in bytes. + void set_purchase_id(const std::string& purchase_id) { + purchase_id_ = purchase_id; + } + + const std::string& purchase_id() { return purchase_id_; } + + void set_type(LicenseType type) { type_ = type; } + + LicenseType type() { return type_; } + + uint32_t version() { return version_; } + + void set_version(uint32_t version) { version_ = version; } + + // `provider_session_token` must be specified in bytes. + void set_provider_session_token(const std::string& provider_session_token) { + provider_session_token_ = provider_session_token; + } + + const std::string& provider_session_token() { + return provider_session_token_; + } + + private: + // License request id. + std::string request_id_; // NOLINT + // Session identifier for license request. + std::string session_id_; // NOLINT + // Session token for the session. This token is for use by the license + // provider, and is akin to a session cookie. It will be copied to + // LicenseIdentfication::provider_session_token, and sent back in all + std::string provider_session_token_; // NOLINT + // Purchase identifier. + std::string purchase_id_; // NOLINT + // Type of the license, default value is Streaming. + LicenseType type_; // NOLINT + // Version of license request. + uint32_t version_; // NOLINT +}; + +// This message is used by the server to preserve and restore session state. +class WvPLSessionState { + public: + WvPLSessionState() { + keybox_system_id_ = 0; + license_counter_ = 0; + } + + void set_license_id(const LicenseIdentification& license_id) { + license_id_ = license_id; + } + + const LicenseIdentification& license_id() const { return license_id_; } + + LicenseIdentification* mutable_license_id() { return &license_id_; } + + const std::string& signing_key() const { return signing_key_; } + + // `signing_key` must be specified in bytes. + void set_signing_key(const std::string& signing_key) { + signing_key_ = signing_key; + } + + uint32_t keybox_system_id() const { return keybox_system_id_; } + + void set_keybox_system_id(uint32_t keybox_system_id) { + keybox_system_id_ = keybox_system_id; + } + + uint32_t license_counter() const { return license_counter_; } + + void set_license_counter(uint32_t license_counter) { + license_counter_ = license_counter; + } + + const std::string& provider_client_token() const { + return provider_client_token_; + } + + // `provider_client_token` must be specified in bytes. + void set_provider_client_token(const std::string& provider_client_token) { + provider_client_token_ = provider_client_token; + } + + private: + // License information propagated from license request to the license. + LicenseIdentification license_id_; // NOLINT + // Provider client token sent back in the license. + std::string provider_client_token_; // NOLINT + // Signing_key should be 512 bits in length to be split into two + // (server || client) HMAC-SHA256 keys. + std::string signing_key_; // NOLINT + // System_id in keybox. + uint32_t keybox_system_id_; // NOLINT + // License counter associated with the |provider_client_token|. + uint32_t license_counter_; // NOLINT +}; + +// Used to report session usage to the license provider. The session usage +// information is specified by the client in a license request of RELEASE +// LicenseRequestType. +class WvPLSessionUsage { + public: + WvPLSessionUsage() = default; + + void set_license_used(bool license_used) { license_used_ = license_used; } + bool license_used() const { return license_used_; } + + void set_license_released(bool license_released) { + license_released_ = license_released; + } + bool license_released() const { return license_released_; } + + void set_clock_security_level(ClockSecurityLevel clock_security_level) { + clock_security_level_ = clock_security_level; + } + ClockSecurityLevel clock_security_level() const { + return clock_security_level_; + } + + void set_seconds_since_license_received( + uint64_t seconds_since_license_received) { + seconds_since_license_received_ = seconds_since_license_received; + } + uint64_t seconds_since_license_received() const { + return seconds_since_license_received_; + } + + void set_seconds_since_first_decrypt(uint64_t seconds_since_first_decrypt) { + seconds_since_first_decrypt_ = seconds_since_first_decrypt; + } + uint64_t seconds_since_first_decrypt() const { + return seconds_since_first_decrypt_; + } + + void set_seconds_since_last_decrypt(uint64_t seconds_since_last_decrypt) { + seconds_since_last_decrypt_ = seconds_since_last_decrypt; + } + uint64_t seconds_since_last_decrypt() const { + return seconds_since_last_decrypt_; + } + + void set_provider_session_token(const std::string& provider_session_token) { + provider_session_token_ = provider_session_token; + } + const std::string& provider_session_token() const { + return provider_session_token_; + } + + private: + // Set to true if the license was used. + bool license_used_ = false; + // Set to true if the license was released. + bool license_released_ = false; + ClockSecurityLevel clock_security_level_ = INSECURE_CLOCK; + uint64_t seconds_since_license_received_ = 0; + // The decrypt values are only set if the license was used. + uint64_t seconds_since_first_decrypt_ = 0; + uint64_t seconds_since_last_decrypt_ = 0; + // Session token for the session. This token would have been set by the + // content provider, and is akin to a session cookie. This field value is sent + // back in all license renewal and release requests for the session + // thereafter. + std::string provider_session_token_; +}; + +// Models the video resolution constraints for a WvPLKey. +class WvPLVideoResolutionConstraint { + public: + WvPLVideoResolutionConstraint() { + min_resolution_pixels_ = 0; + max_resolution_pixels_ = 0; + hdcp_ = HDCP_NONE; + } + + void set_min_resolution_pixels(uint32_t pixels) { + min_resolution_pixels_ = pixels; + } + + void set_max_resolution_pixels(uint32_t pixels) { + max_resolution_pixels_ = pixels; + } + + void set_hdcp(HDCP hdcp_value) { + hdcp_ = hdcp_value; + has_hdcp_ = true; + } + + HDCP hdcp() const { return hdcp_; } + + bool has_hdcp() const { return has_hdcp_; } + + uint32_t min_resolution_pixels() const { return min_resolution_pixels_; } + + uint32_t max_resolution_pixels() const { return max_resolution_pixels_; } + + private: + // Minimum and maximum video resolutions in the range (height x width). + uint32_t min_resolution_pixels_; + uint32_t max_resolution_pixels_; + // Optional output protection requirements for this range. If not + // specified, the output protection in WvPLKey applies. + HDCP hdcp_; + bool has_hdcp_ = false; +}; + +// Models the output protection requirements for a WvPLKey. +class WvPLOutputProtection { + public: + WvPLOutputProtection() + : hdcp_(HDCP_NONE), + hdcp_srm_rule_(HDCP_SRM_RULE_NONE), + secure_data_path_(false), + security_level_(SECURITY_LEVEL_UNDEFINED), + disable_analog_output_(false), + disable_digital_output_(false), + cgms_(CGMS_NONE), + allow_record_(false) {} + + void set_hdcp(HDCP hdcp_value) { + hdcp_ = hdcp_value; + has_hdcp_ = true; + } + + HDCP hdcp() const { return hdcp_; } + + bool has_hdcp() const { return has_hdcp_; } + + // Sets to true indicates security_level is HW_SECURE_ALL, otherwise the + // default is false which maps to security_level of SW_SECURE_CRYPTO. This + // value is ignored if security_level is set directly. + void set_secure_data_path(bool secure_flag) { + secure_data_path_ = secure_flag; + has_secure_data_path_ = true; + } + + bool secure_data_path() const { return secure_data_path_; } + + bool has_secure_data_path() const { return has_secure_data_path_; } + + // Sets |security_level_| directly takes precedence over setting the + // |secure_data_path_|. For most applications, there is no need to set the + // |security_level_| directly. Using |secure_data_path_| is sufficient. + void set_security_level(SecurityLevel level) { security_level_ = level; } + + SecurityLevel security_level() const { return security_level_; } + + // Sets to true to disable analog output. + void set_disable_analog_output(bool flag) { + disable_analog_output_ = flag; + has_disable_analog_output_ = true; + } + + bool disable_analog_output() const { return disable_analog_output_; } + + bool has_disable_analog_output() const { return has_disable_analog_output_; } + + // Sets to true to disable digital output. + void set_disable_digital_output(bool flag) { + disable_digital_output_ = flag; + has_disable_digital_output_ = true; + } + + bool disable_digital_output() const { return disable_digital_output_; } + + bool has_disable_digital_output() const { + return has_disable_digital_output_; + } + + // CGMS-A setting + void set_cgms(CGMS cgms_value) { + cgms_ = cgms_value; + has_cgms_ = true; + } + + CGMS cgms() const { return cgms_; } + + bool has_cgms() const { return has_cgms_; } + + void set_hdcp_srm_rule(HdcpSrmRule hdcp_srm_rule) { + hdcp_srm_rule_ = hdcp_srm_rule; + has_hdcp_srm_rule_ = true; + } + + HdcpSrmRule hdcp_srm_rule() const { return hdcp_srm_rule_; } + + bool has_hdcp_srm_rule() const { return has_hdcp_srm_rule_; } + + // Sets to true to allow digital video recording (DVR). + void set_allow_record(bool flag) { + allow_record_ = flag; + has_allow_record_ = true; + } + + // Returns whether or not allow digital video recording (DVR). + bool allow_record() const { return allow_record_; } + + bool has_allow_record() const { return has_allow_record_; } + + private: + // Indicates whether HDCP is required on digital outputs. Default is None. + HDCP hdcp_; + bool has_hdcp_ = false; + + HdcpSrmRule hdcp_srm_rule_; + bool has_hdcp_srm_rule_ = false; + + // Crypto operations and handling of the media must be performed within a + // hardware backed trusted environment. Default is false. + bool secure_data_path_; + bool has_secure_data_path_ = false; + + // Security level robustness defined by Widevine. Default is UNDEFINED in + // which case secure_data_path_ is used. If secure_data_path_ is false, + // security_level_ is set to SW_SECURE_CRYPTO. If secure_data_path_ is + // true, security_level_ is set to HW_SECURE_ALL; + SecurityLevel security_level_; + + // Whether to disable analog output. + bool disable_analog_output_; + bool has_disable_analog_output_ = false; + + // Whether to disable digital output. + bool disable_digital_output_; + bool has_disable_digital_output_ = false; + + // CGMS-A analog output. + CGMS cgms_; + bool has_cgms_ = false; + + // Sets to true to indicate digital video recording (DVR) is allowed. + bool allow_record_; + bool has_allow_record_ = false; +}; + +// Permissions specific to operator session keys. +class WvPLOperatorSessionKeyPermissions { + public: + WvPLOperatorSessionKeyPermissions() = default; + + void set_allow_encrypt(bool flag) { + allow_encrypt_ = flag; + has_allow_encrypt_ = true; + } + bool allow_encrypt() const { return allow_encrypt_; } + bool has_allow_encrypt() const { return has_allow_encrypt_; } + + void set_allow_decrypt(bool flag) { + allow_decrypt_ = flag; + has_allow_decrypt_ = true; + } + bool allow_decrypt() const { return allow_decrypt_; } + bool has_allow_decrypt() const { return has_allow_decrypt_; } + + void set_allow_sign(bool flag) { + allow_sign_ = flag; + has_allow_sign_ = true; + } + bool allow_sign() const { return allow_sign_; } + bool has_allow_sign() const { return has_allow_sign_; } + + void set_allow_signature_verify(bool flag) { + allow_signature_verify_ = flag; + has_allow_signature_verify_ = true; + } + bool allow_signature_verify() const { return allow_signature_verify_; } + bool has_allow_signature_verify() const { + return has_allow_signature_verify_; + } + + private: + bool allow_encrypt_ = false; + bool has_allow_encrypt_ = false; + bool allow_decrypt_ = false; + bool has_allow_decrypt_ = false; + bool allow_sign_ = false; + bool has_allow_sign_ = false; + bool allow_signature_verify_ = false; + bool has_allow_signature_verify_ = false; +}; + +// Configuration option of Authenticate Bitstream method for DeCENC +// mitigation. +class WvPLAuthenticateBitstreamConfigOption { + public: + WvPLAuthenticateBitstreamConfigOption() = default; + + void set_authentication_key_iv(const std::string& authentication_key_iv) { + authentication_key_iv_ = authentication_key_iv; + } + std::string authentication_key_iv() const { return authentication_key_iv_; } + + void set_authentication_key(const std::string& authentication_key) { + authentication_key_ = authentication_key; + } + std::string authentication_key() const { return authentication_key_; } + + private: + // IV for the authentication key. + std::string authentication_key_iv_; + // Authentication key. + std::string authentication_key_; +}; + +// Configuration option for DeCENC mitigation. +class WvPLDecencMitigationConfigOptions { + public: + WvPLDecencMitigationConfigOptions() = default; + + void set_authenticate_bitstream_config_option( + const WvPLAuthenticateBitstreamConfigOption& + authenticate_bitstream_config_option) { + authenticate_bitstream_config_option_ = + authenticate_bitstream_config_option; + } + const WvPLAuthenticateBitstreamConfigOption& + authenticate_bitstream_config_option() const { + return authenticate_bitstream_config_option_; + } + + private: + WvPLAuthenticateBitstreamConfigOption authenticate_bitstream_config_option_; +}; + +// Represents the DeCENC mitigation options that can be specified by the +// content provider. +class WvPLDecencMitigation { + public: + WvPLDecencMitigation() + : decenc_mitigation_options_( + DecencMitigationOption::DECENC_MITIGATION_OPTION_UNSPECIFIED) {} + + void set_decenc_mitigation_options( + const DecencMitigationOption& decenc_mitigation_options) { + decenc_mitigation_options_ = decenc_mitigation_options; + } + const DecencMitigationOption& decenc_mitigation_options() const { + return decenc_mitigation_options_; + } + + private: + DecencMitigationOption decenc_mitigation_options_; + WvPLDecencMitigationConfigOptions decenc_mitigation_config_options_; +}; + +// Models the key information for a WvPLKey. This is used by the content +// provider to define the key(s) and their associated data, per license request. +// The key(s) data will be included in the license. +class WvPLKey { + public: + WvPLKey() = default; + + // `key_id` must be specified in bytes. + void set_key_id(const std::string& key_id) { key_id_ = key_id; } + + const std::string& key_id() const { return key_id_; } + + // `key_bytes` must be specified in bytes. + void set_key_bytes(const std::string& key_bytes) { key_bytes_ = key_bytes; } + + const std::string& key_bytes() const { return key_bytes_; } + + // `wrapping_key` must be specified in bytes. This is to be specified only + // when |key_type_| is OEM_CONTENT or OEM_ENTITLEMENT. This key will be used + // to 'wrap' or 'encrypt' the Widevine-generated key control block in the + // license. + void set_wrapping_key(const std::string& wrapping_key) { + wrapping_key_ = wrapping_key; + } + + const std::string& wrapping_key() const { return wrapping_key_; } + + void set_output_protection(const WvPLOutputProtection& out_prot) { + output_protection_ = out_prot; + has_output_protection_ = true; + } + + void set_requested_output_protection(const WvPLOutputProtection& out_prot) { + requested_output_protection_ = out_prot; + has_requested_output_protection_ = true; + } + + const WvPLOutputProtection& output_protection() const { + return output_protection_; + } + + const WvPLOutputProtection& requested_output_protection() const { + return requested_output_protection_; + } + + bool has_output_protection() const { return has_output_protection_; } + + bool has_requested_output_protection() const { + return has_requested_output_protection_; + } + + WvPLOutputProtection* mutable_output_protection() { + has_output_protection_ = true; + return &output_protection_; + } + + WvPLOutputProtection* mutable_requested_output_protection() { + has_requested_output_protection_ = true; + return &requested_output_protection_; + } + + std::vector video_resolution_constraints() + const { + return video_resolution_constraints_; + } + + void AddVideoResolutionConstraint( + const WvPLVideoResolutionConstraint& constraint) { + video_resolution_constraints_.push_back(constraint); + } + + void set_track_type(const TrackType track_type) { + track_type_ = track_type; + has_track_type_ = true; + } + + TrackType track_type() const { return track_type_; } + + bool has_track_type() const { return has_track_type_; } + + void set_key_type(const KeyType key_type) { key_type_ = key_type; } + + KeyType key_type() const { return key_type_; } + + void set_operator_session_key_permissions( + const WvPLOperatorSessionKeyPermissions& perm) { + operator_session_key_permissions_ = perm; + } + + const WvPLOperatorSessionKeyPermissions& operator_session_key_permissions() + const { + return operator_session_key_permissions_; + } + + void set_encryption_scheme(const WvPLEncryptionScheme encryption_scheme) { + encryption_scheme_ = encryption_scheme; + } + WvPLEncryptionScheme encryption_scheme() const { return encryption_scheme_; } + + void set_required_profile(const std::string& required_profile) { + required_profile_ = required_profile; + } + std::string required_profile() const { return required_profile_; } + + void set_content_owner(const std::string& content_owner) { + content_owner_ = content_owner; + } + std::string content_owner() const { return content_owner_; } + + void set_decenc_mitigation(WvPLDecencMitigation decenc_mitigation) { + decenc_mitigation_ = decenc_mitigation; + } + + WvPLDecencMitigation decenc_mitigation() const { return decenc_mitigation_; } + + private: + // Key ID in bytes. + std::string key_id_; + // Key bytes in bytes. + std::string key_bytes_; + // Wrapping key in bytes. + std::string wrapping_key_; + // Output protection requirements for this key. + WvPLOutputProtection output_protection_; + bool has_output_protection_ = false; + // Output protection requested for this key. + WvPLOutputProtection requested_output_protection_; + bool has_requested_output_protection_ = false; + // If the video resolution of the content being decrypted/decoded falls + // within one of the specified ranges, the optional output protections may + // be applied. + std::vector video_resolution_constraints_; + // Track type for this key. + TrackType track_type_ = TRACK_TYPE_UNSPECIFIED; + bool has_track_type_ = false; + // Key type for this key. + KeyType key_type_ = CONTENT; + // Operator session key permissions. + WvPLOperatorSessionKeyPermissions operator_session_key_permissions_; + // Type of encryption for this key. + WvPLEncryptionScheme encryption_scheme_ = ENCRYPTION_SCHEME_UNSPECIFIED; + // Used with key filtering to indicate required qualified security profile. + std::string required_profile_; + // Owner of the content, this is needed when using security profiles. + std::string content_owner_; + // Multiple mitigation options that allows content providers to mitigate + // DeCENC attack. DeCENC Mitigation is associated with each key. + WvPLDecencMitigation decenc_mitigation_; +}; + +// Models the device information for a device making a license request. This +// information is available to the content provider to retrieve, per request. +// The license request and DCSL are used to populate this device information. +class WvPLDeviceInfo { + public: + class ModelInfo { + public: + ModelInfo() : model_year_(0), status_(MODEL_STATUS_UNVERIFIED) {} + void set_manufacturer(const std::string& manufacturer) { + manufacturer_ = manufacturer; + } + const std::string& manufacturer() const { return manufacturer_; } + + void set_model(const std::string& model) { model_ = model; } + const std::string& model() const { return model_; } + + void set_model_year(uint32_t model_year) { model_year_ = model_year; } + uint32_t model_year() const { return model_year_; } + + void set_status(ModelStatus status) { status_ = status; } + ModelStatus status() const { return status_; } + + private: + // Device manufacturer + std::string manufacturer_; + // Device model + std::string model_; + // Model launch year + uint32_t model_year_; + // Model status + ModelStatus status_; + }; + + WvPLDeviceInfo() { + platform_ = PLATFORM_UNSPECIFIED; + security_level_ = DEVICE_LEVEL_UNSPECIFIED; + system_id_ = 0; + test_device_ = false; + vulnerability_level_ = VULNERABILITY_LEVEL_UNSPECIFIED; + verification_level_ = VERIFICATION_LEVEL_UNSPECIFIED; + } + + void set_system_id(uint32_t system_id) { system_id_ = system_id; } + uint32_t system_id() const { return system_id_; } + void set_model_year(uint32_t model_year) { model_year_ = model_year; } + uint32_t model_year() const { return model_year_; } + void set_soc(const std::string& soc) { soc_ = soc; } + const std::string& soc() const { return soc_; } + + void set_manufacturer(const std::string& manufacturer) { + manufacturer_ = manufacturer; + } + const std::string& manufacturer() const { return manufacturer_; } + + void set_model(const std::string& model) { model_ = model; } + const std::string& model() const { return model_; } + + void set_device_type(const std::string& device_type) { + device_type_ = device_type; + } + const std::string& device_type() const { return device_type_; } + + void set_device_platform(Platform platform) { platform_ = platform; } + Platform device_platform() const { return platform_; } + + void set_security_level(DeviceSecurityLevel level) { + security_level_ = level; + } + DeviceSecurityLevel security_level() const { return security_level_; } + + void set_test_device(bool test_device) { test_device_ = test_device; } + bool test_device() const { return test_device_; } + + void set_drm_certificate_serial_number( + const std::string& drm_certificate_serial_number) { + drm_certificate_serial_number_ = drm_certificate_serial_number; + } + const std::string& drm_certificate_serial_number() const { + return drm_certificate_serial_number_; + } + + void set_service_id(const std::string& service_id) { + service_id_ = service_id; + } + const std::string& service_id() const { return service_id_; } + + void add_model_info(const ModelInfo& model_info) { + model_info_.push_back(model_info); + } + const std::list& model_info() const { return model_info_; } + + void set_status(DeviceStatus status) { device_status_ = status; } + DeviceStatus status() const { return device_status_; } + + void set_provisioning_method(ProvisioningMethod provisioning_method) { + provisioning_method_ = provisioning_method; + } + ProvisioningMethod provisioning_method() const { + return provisioning_method_; + } + + void set_vulnerability_level(VulnerabilityLevel vulnerability_level) { + vulnerability_level_ = vulnerability_level; + } + VulnerabilityLevel vulnerability_level() const { + return vulnerability_level_; + } + + void set_verification_level(VerificationLevel verification_level) { + verification_level_ = verification_level; + } + VerificationLevel verification_level() const { return verification_level_; } + + private: + // Widevine system ID for this device family. + uint32_t system_id_; + // Name of system-on-a-chip. + std::string soc_; + // Name of manufacturer. + std::string manufacturer_; + // Manufacturer's model name. + std::string model_; + // Type of device (Phone, Tablet, TV, etc). + std::string device_type_; + // The expected release year of the registered device as identified by + // |manufacturer_| and |model_| + uint32_t model_year_; + // The device platform. + Platform platform_; + // Widevine-defined security level. + DeviceSecurityLevel security_level_; + // True if the certificate corresponds to a test (non production) device. + bool test_device_; + // 128-bit globally unique serial number of certificate. + std::string drm_certificate_serial_number_; + // Service identifier (web origin) for the provider which owns the + // certificate. + std::string service_id_; + // List of models that are associated with this device record. + std::list model_info_; + // Device status from the Device Certificate Status List (DCSL) + DeviceStatus device_status_ = DeviceStatus::STATUS_UNKNOWN; + // Registered provisioning method. + ProvisioningMethod provisioning_method_ = PROVISIONING_METHOD_UNSPECIFIED; + VulnerabilityLevel vulnerability_level_ = VULNERABILITY_LEVEL_UNSPECIFIED; + VerificationLevel verification_level_ = VERIFICATION_LEVEL_UNSPECIFIED; +}; + +// This message is used to hold usage data for each Widevine system Id. +struct WvPLLicenseStatusCounterData { + // Initializes members + WvPLLicenseStatusCounterData() : license_status(0), status_count(0) {} + uint32_t license_status; + // Count of occurrences of the above status; + uint32_t status_count; +}; + +// This message is used to hold usage data for each device model. +struct WvPLDeviceModelCounterData { + std::string device_model; + // Key is each status we returned associated with the above model; + std::map status_map; +}; + +// This message is used to hold usage data for each device make. +struct WvPLDeviceMakeCounterData { + std::string device_make; + // Key is each model associated with this device make. + std::map model_map; +}; + +// This message is used to hold usage data for each Widevine system Id. +struct WvPLSystemIdCounterData { + // Initializes members + WvPLSystemIdCounterData() : system_id(0) {} + uint32_t system_id; + // Key is each make we handled associated with the above system Id. + std::map make_map; +}; + +// This top level message contains aggregated usage data for license requests. +struct WvPLCounterData { + // Initializes members + WvPLCounterData() : start_time_utc(0), end_time_utc(0) {} + // Time of the first license in this structure, represented as seconds since + // Unix epoch. + time_t start_time_utc; + // Time of the last license in this structure, represented as seconds since + // Unix epoch. + time_t end_time_utc; + // Key is each system Id we handled. + std::map system_id_map; +}; + +// Represents the License Category Spec. Each license could be categorized as +// license for single content, license for multiple contents, license +// for a logically-defined group. +class WvPLLicenseCategorySpec { + public: + WvPLLicenseCategorySpec() = default; + void set_license_category(WvPLLicenseCategory license_category) { + license_category_ = license_category; + } + WvPLLicenseCategory license_category() const { return license_category_; } + void set_content_or_group_id(std::string content_or_group_id) { + content_or_group_id_ = std::move(content_or_group_id); + } + std::string content_or_group_id() const { return content_or_group_id_; } + + private: + // License category indicates if license is used for single content, + // multiple contents(could be a combination of + // single contents and groups of contents) or a group content. + WvPLLicenseCategory license_category_ = SINGLE_CONTENT_LICENSE_DEFAULT; + // Id for license category. If it is a license for single content, + // content_or_group_id represents the content_id. Otherwise, it will be + // a group_id representing multiple_content_license or group_license. + std::string content_or_group_id_; +}; + +// Represents the Device Status Options that can be specified by the content +// provider, per request. This allows the content provider to specify +// options for handling devices based on their system ID. +class WvPLDeviceStatusOptions { + public: + void set_allow_unknown_system_id(bool flag) { + allow_unknown_system_id_ = flag; + } + bool allow_unknown_system_id() const { return allow_unknown_system_id_; } + + void set_allow_revoked_system_id(bool flag) { + allow_revoked_system_id_ = flag; + } + bool allow_revoked_system_id() const { return allow_revoked_system_id_; } + + void set_allow_test_only_system_id(bool flag) { + allow_test_only_system_id_ = flag; + } + bool allow_test_only_system_id() const { return allow_test_only_system_id_; } + + void set_allow_pre_release_system_id(bool flag) { + allow_pre_release_system_id_ = flag; + } + bool allow_pre_release_system_id() const { + return allow_pre_release_system_id_; + } + + void set_allow_revoked_individual_device(bool flag) { + allow_revoked_individual_device_ = flag; + } + bool allow_revoked_individual_device() const { + return allow_revoked_individual_device_; + } + + private: + // Do not fail if the device has an unknown system ID. + bool allow_unknown_system_id_ = false; + // Do not fail if the device system ID is revoked. + bool allow_revoked_system_id_ = false; + // Do not fail if the device is a TEST_ONLY system ID. + bool allow_test_only_system_id_ = false; + // Do not fail if the device is an IN_TESTING (pre-release) system ID. + bool allow_pre_release_system_id_ = true; + // Do not fail if the individual device is revoked. + bool allow_revoked_individual_device_ = false; +}; + +// Represents the Session Init options that can be specified by the content +// provider, per request. This allows the content provider to specify +// options, that are used as part of the license generation. +class WvPLSessionInit { + public: + WvPLSessionInit() + : license_start_time_(0), + override_provider_client_token_(false), + override_device_revocation_(false) {} + + void set_session_id(const std::string& session_id) { + session_id_ = session_id; + } + std::string session_id() const { return session_id_; } + + void set_purchase_id(const std::string& purchase_id) { + purchase_id_ = purchase_id; + } + std::string purchase_id() const { return purchase_id_; } + + void set_master_signing_key(const std::string& master_signing_key) { + master_signing_key_ = master_signing_key; + } + std::string master_signing_key() const { return master_signing_key_; } + + void set_license_start_time(const int64_t license_start_time) { + license_start_time_ = license_start_time; + } + int64_t license_start_time() const { return license_start_time_; } + + void set_provider_client_token(const std::string& provider_client_token) { + provider_client_token_ = provider_client_token; + } + std::string provider_client_token() const { return provider_client_token_; } + + void set_provider_session_token(const std::string& provider_session_token) { + provider_session_token_ = provider_session_token; + } + std::string provider_session_token() const { return provider_session_token_; } + + void set_override_provider_client_token(bool override_provider_client_token) { + override_provider_client_token_ = override_provider_client_token; + } + bool override_provider_client_token() const { + return override_provider_client_token_; + } + + void set_override_oem_crypto_api_version( + const std::string& override_oem_crypto_api_version) { + override_oem_crypto_api_version_ = override_oem_crypto_api_version; + } + std::string override_oem_crypto_api_version() const { + return override_oem_crypto_api_version_; + } + + void set_override_device_revocation(bool override_device_revocation) { + override_device_revocation_ = override_device_revocation; + } + bool override_device_revocation() const { + return override_device_revocation_; + } + void set_license_category_spec(const WvPLLicenseCategorySpec& category_spec) { + license_category_spec_ = category_spec; + } + const WvPLLicenseCategorySpec& license_category_spec() const { + return license_category_spec_; + } + void set_device_status_options( + const WvPLDeviceStatusOptions& device_status_options) { + device_status_options_ = device_status_options; + } + const WvPLDeviceStatusOptions& device_status_options() const { + return device_status_options_; + } + void set_secure_data_path_hw_decode_enabled( + bool secure_data_path_hw_decode_enabled) { + secure_data_path_hw_decode_enabled_ = secure_data_path_hw_decode_enabled; + } + bool secure_data_path_hw_decode_enabled() const { + return secure_data_path_hw_decode_enabled_; + } + + private: + // Identifier for the session. + std::string session_id_; + // Identifier for the purchased content. + std::string purchase_id_; + // Master signing key should be 128 bits in length. + std::string master_signing_key_; + // signing_key should be 512 bits in length to be split into two + // (server || client) HMAC-SHA256 keys. + std::string signing_key_; + // The reference time in UTC as calculated by the client clock. + int64_t license_start_time_; + // Client token for the session. + std::string provider_client_token_; + // Session token for the session. + std::string provider_session_token_; + // If false and the license request contains a |provider_client_token_|, + // use the token from that request even if |provider_client_token_| is + // specified. + // If true and the license request contains a |provider_client_token_|, + // use |provider_client_token_|. + bool override_provider_client_token_; + // For testing use only. Service Providers can test how devices are handling + // the version reflection in KCB (key control block) by specifying the api + // version that is reflected back in the KCB. If an override is specified, + // the override value will be used in the KCB instead of the api version + // specified by the client in client_capabilities. + // Crypto API version is represented as 4 bytes, for example 'kcxx', where xx + // is the API version. Some valid values are: 'kc09', kc10', kc14'. Only the + // first 4 bytes are used and additional bytes are ignored. + std::string override_oem_crypto_api_version_; + // If set to true, generate the license even if the device is revoked. + bool override_device_revocation_; + // License category spec for this license. + WvPLLicenseCategorySpec license_category_spec_; + // Options for handling devices based on their system ID. + WvPLDeviceStatusOptions device_status_options_; + // A 'true' value means that secure data path is enabled for non-audio keys + // that have HW_SECURE_DECODE security level. If the value is 'false', + // secure data path is disabled for non-audio keys that have HW_SECURE_DECODE + // security level. + bool secure_data_path_hw_decode_enabled_ = false; +}; + +// Represents the Session Create options that can be specified by the content +// provider, per request. +class WvPLSessionCreateOptions { + public: + WvPLSessionCreateOptions() = default; + // If set to true, construct the session even if the device is revoked. + void set_allow_revoked_device(bool allow_revoked_device) { + allow_revoked_device_ = allow_revoked_device; + } + bool allow_revoked_device() const { return allow_revoked_device_; } + + private: + bool allow_revoked_device_ = false; +}; + +// Represents the Client Capabilities that are included in the license request, +// typically in a license request of NEW LicenseRequestType. +class WvPLClientCapabilities { + public: + enum class WatermarkingSupport { + WATERMARKING_SUPPORT_UNKNOWN, + WATERMARKING_NOT_SUPPORTED, + WATERMARKING_CONFIGURABLE, + WATERMARKING_ALWAYS_ON + }; + + WvPLClientCapabilities() = default; + + void set_client_token(bool client_token) { client_token_ = client_token; } + + bool client_token() const { return client_token_; } + + void set_session_token(bool session_token) { session_token_ = session_token; } + + bool session_token() const { return session_token_; } + + void set_video_resolution_constraints(bool video_resolution_constraints) { + video_resolution_constraints_ = video_resolution_constraints; + } + + bool video_resolution_constraints() const { + return video_resolution_constraints_; + } + + void set_max_hdcp_version(HDCP max_hdcp_version) { + max_hdcp_version_ = max_hdcp_version; + } + + HDCP max_hdcp_version() const { return max_hdcp_version_; } + + void set_oem_crypto_api_version(uint32_t oem_crypto_api_version) { + oem_crypto_api_version_ = oem_crypto_api_version; + } + + uint32_t oem_crypto_api_version() const { return oem_crypto_api_version_; } + + void set_anti_rollback_usage_table(bool anti_rollback_usage_table) { + anti_rollback_usage_table_ = anti_rollback_usage_table; + } + + bool anti_rollback_usage_table() const { return anti_rollback_usage_table_; } + + void set_srm_version(uint32_t srm_version) { srm_version_ = srm_version; } + + uint32_t srm_version() const { return srm_version_; } + + void set_can_update_srm(bool can_update_srm) { + can_update_srm_ = can_update_srm; + } + + bool can_update_srm() const { return can_update_srm_; } + + void add_supported_certificate_key_type(const CertificateKeyType key_type) { + supported_certificate_key_type_.push_back(key_type); + } + std::list supported_certificate_key_type() const { + return supported_certificate_key_type_; + } + + void set_analog_output_capabilities( + const AnalogOutputCapabilities analog_output_capabilities) { + analog_output_capabilities_ = analog_output_capabilities; + } + + AnalogOutputCapabilities analog_output_capabilities() const { + return analog_output_capabilities_; + } + + void set_can_disable_analog_output(bool can_disable_analog_output) { + can_disable_analog_output_ = can_disable_analog_output; + } + + bool can_disable_analog_output() const { return can_disable_analog_output_; } + + void set_resource_rating_tier(uint32_t resource_rating_tier) { + resource_rating_tier_ = resource_rating_tier; + } + + uint32_t resource_rating_tier() const { return resource_rating_tier_; } + + void set_watermarking_support(WatermarkingSupport watermarking_support) { + watermarking_support_ = watermarking_support; + } + + WatermarkingSupport watermarking_support() const { + return watermarking_support_; + } + + void set_initial_renewal_delay_base(bool initial_renewal_delay_base) { + initial_renewal_delay_base_ = initial_renewal_delay_base; + } + + bool initial_renewal_delay_base() const { + return initial_renewal_delay_base_; + } + + private: + // Client token generated by the content provider. + bool client_token_ = false; + // A token associated with the client session. + bool session_token_ = false; + // Video resolution constraints. If the video resolution of the + // content being decrypted/decoded falls within one of the specified ranges, + // the required_protections may be applied. Otherwise an error will be + // reported. + // NOTE: Use of this feature is not recommended, as it is only supported on + // a small number of platforms. + bool video_resolution_constraints_ = false; + // The max "High-bandwidth Digital Content Protection" (HDCP) version + // supported by the client. + HDCP max_hdcp_version_ = HDCP_NONE; + // The OEM Crypto API version supported by the client. + uint32_t oem_crypto_api_version_ = 0; + // Flag to indicate the key must only be used if the client + // supports anti rollback of the user table. Content provider can query the + // client capabilities to determine if the client support this feature. + bool anti_rollback_usage_table_ = false; + // The client shall report |srm_version| if available. + uint32_t srm_version_ = 0; + // A device may have SRM data, and report a version, but may not be capable + // of updating SRM data. + bool can_update_srm_ = false; + // A list of CertificateKeyTypes. + std::list supported_certificate_key_type_; + // Analog capabilities of the device. + AnalogOutputCapabilities analog_output_capabilities_ = ANALOG_OUTPUT_UNKNOWN; + // Indicates if the device can disable it's analog output. + bool can_disable_analog_output_ = false; + // OEM Crypto resource rating tier. + uint32_t resource_rating_tier_ = 0; + // Watermarking support setting + WatermarkingSupport watermarking_support_ = + WatermarkingSupport::WATERMARKING_SUPPORT_UNKNOWN; + // Flag to indicate if the client support 'initial_delay_renewal_base'. This + // allows the license to be loaded by the client only upon license usage. + bool initial_renewal_delay_base_ = false; +}; + +// Represents the Client Identification information that is included in the +// license request. +class WvPLClientInfo { + public: + WvPLClientInfo() + : max_hdcp_version_(HDCP_NONE), + oem_crypto_api_version_(0), + analog_output_capabilities_(ANALOG_OUTPUT_UNKNOWN), + can_disable_analog_output_(false) {} + + void set_max_hdcp_version(HDCP max_hdcp_version) { + max_hdcp_version_ = max_hdcp_version; + } + HDCP max_hdcp_version() const { return max_hdcp_version_; } + + void set_oem_crypto_api_version(uint32_t oem_crypto_api_version) { + oem_crypto_api_version_ = oem_crypto_api_version; + } + uint32_t oem_crypto_api_version() const { return oem_crypto_api_version_; } + + void set_provider_client_token(const std::string& provider_client_token) { + provider_client_token_ = provider_client_token; + } + const std::string& provider_client_token() const { + return provider_client_token_; + } + + void set_cdm_version(const std::string& cdm_version) { + cdm_version_ = cdm_version; + } + const std::string& cdm_version() const { return cdm_version_; } + + void set_name_value(const std::string& name, const std::string& value) { + names_values_.insert(std::make_pair(name, value)); + } + const std::map& names_values() { + return names_values_; + } + + void set_analog_output_capabilities(AnalogOutputCapabilities capability) { + analog_output_capabilities_ = capability; + } + AnalogOutputCapabilities analog_output_capabilities() const { + return analog_output_capabilities_; + } + + void set_can_disable_analog_output(bool can_disable) { + can_disable_analog_output_ = can_disable; + } + bool can_disable_analog_output() const { return can_disable_analog_output_; } + + WvPLClientCapabilities client_capabilities() const { + return client_capabilities_; + } + void set_client_capabilities( + const WvPLClientCapabilities& client_capabilities) { + client_capabilities_ = client_capabilities; + } + + void set_provisioning_version(ProvisioningVersion provisioning_version) { + provisioning_version_ = provisioning_version; + } + ProvisioningVersion provisioning_version() const { + return provisioning_version_; + } + + private: + // The max "High-bandwidth Digital Content Protection" (HDCP) version + // supported by the device. + HDCP max_hdcp_version_; + // The OEM Crypto API version supported by the client. + uint32_t oem_crypto_api_version_; + // The client CDM version. + std::string cdm_version_; + // The client token generated by the content provider. + std::string provider_client_token_; + // Map of other fields specified as name-value pairs representing the + // client. + std::map names_values_; + // Analog capabilities of the device. + AnalogOutputCapabilities analog_output_capabilities_; + // Indicates if the device can disable it's analog output. + bool can_disable_analog_output_; + // Capabilities which not all clients may support. Used for the license + // exchange protocol only. + WvPLClientCapabilities client_capabilities_; + // The type of provisioning + ProvisioningVersion provisioning_version_ = PROVISIONING_UNSPECIFIED; +}; + +// Represents the entitled key. Used in the generation of WvPLWidevinePsshData. +class WvPLEntitledKey { + public: + WvPLEntitledKey() = default; + + void set_entitlement_key_id(const std::string& entitlement_key_id) { + entitlement_key_id_ = entitlement_key_id; + } + const std::string& entitlement_key_id() const { return entitlement_key_id_; } + + void set_key_id(const std::string& key_id) { key_id_ = key_id; } + const std::string& key_id() const { return key_id_; } + + void set_key_bytes(const std::string& key_bytes) { key_bytes_ = key_bytes; } + const std::string& key_bytes() const { return key_bytes_; } + + void set_entitlement_key_iv(const std::string& entitlement_key_iv) { + entitlement_key_iv_ = entitlement_key_iv; + } + const std::string& entitlement_key_iv() const { return entitlement_key_iv_; } + + void set_entitlement_key_size_bytes(uint32_t entitlement_key_size_bytes) { + entitlement_key_size_bytes_ = entitlement_key_size_bytes; + } + uint32_t entitlement_key_size_bytes() const { + return entitlement_key_size_bytes_; + } + + private: + // ID of entitlement key used for wrapping |key|. + std::string entitlement_key_id_; + // ID of the entitled key. + std::string key_id_; + // Wrapped key. + std::string key_bytes_; + // IV used for wrapping |key|. + std::string entitlement_key_iv_; + // Size of entitlement key used for wrapping |key|. + uint32_t entitlement_key_size_bytes_ = 32; +}; + +// Defines the Widevine PSSH. +class WvPLWidevinePsshData { + public: + WvPLWidevinePsshData() = default; + + void set_content_id(const std::string& content_id) { + content_id_ = content_id; + } + std::string content_id() const { return content_id_; } + + void set_group_id(const std::string& group_id) { + group_id_list_.push_back(group_id); + } + const std::list& group_ids() const { return group_id_list_; } + + void set_key_id(const std::string& key_id) { key_ids_.push_back(key_id); } + const std::list& key_ids() const { return key_ids_; } + + void add_entitled_key(const WvPLEntitledKey& entitled_key) { + entitled_keys_.push_back(entitled_key); + } + const std::list& entitled_keys() const { + return entitled_keys_; + } + + void set_video_feature(const std::string& video_feature) { + video_feature_ = video_feature; + } + std::string video_feature() const { return video_feature_; } + + void set_entitlement_period_index(uint32_t entitlement_period_index) { + entitlement_period_index_ = entitlement_period_index; + entitlement_rotation_enabled_ = true; + } + bool entitlement_rotation_enabled() const { + return entitlement_rotation_enabled_; + } + uint32_t entitlement_period_index() const { + return entitlement_period_index_; + } + + void set_protection_scheme(ProtectionScheme protection_scheme) { + protection_scheme_ = protection_scheme; + } + ProtectionScheme protection_scheme() const { return protection_scheme_; } + + private: + // A list of key identifiers, for entitlement keys or content keys. + std::list key_ids_; + // The content identifier. + std::string content_id_; + // A list of group identifiers. + std::list group_id_list_; + // A list of wrapped keys. + std::list entitled_keys_; + // Video feature identifier. + std::string video_feature_; + // The entitlement period index used by entitlement key rotation feature. + // Valid only if |entitlement_rotation_enabled_| is true. + uint32_t entitlement_period_index_ = 0; + // Indicates if entitlement key rotation has been enabled. + bool entitlement_rotation_enabled_ = false; + // Protection Scheme identifying the encryption algorithm. The protection + // scheme is represented as a uint32_t value. The uint32_t contains 4 bytes each + // representing a single ascii character in one of the protection scheme + // values. This protection scheme value may be encoded into the content. If + // the protection scheme is available in the content, it will supersede this + // value. + ProtectionScheme protection_scheme_ = PROTECTION_SCHEME_UNKNOWN; +}; + +// Represents the Key Category Spec. Each key could be associated with a group +// of contents or single content. +class WvPLKeyCategorySpec { + public: + WvPLKeyCategorySpec() = default; + void set_key_category(WvPLKeyCategory key_category) { + key_category_ = key_category; + } + WvPLKeyCategory key_category() const { return key_category_; } + void set_content_or_group_id(std::string content_or_group_id) { + content_or_group_id_ = std::move(content_or_group_id); + } + std::string content_or_group_id() const { return content_or_group_id_; } + + private: + // The key category to indicate if current key is created for single content + // or for group use. + WvPLKeyCategory key_category_ = SINGLE_CONTENT_KEY_DEFAULT; + // Id for key category. If it is a key for single content, content_or_group_id + // represents for the content_id. Otherwise, it represents for a group_id. + std::string content_or_group_id_; +}; + +class WvPLCasKey { + public: + WvPLCasKey() = default; + + void set_odd_key_id(const std::string& odd_key_id) { + odd_key_id_ = odd_key_id; + } + + const std::string& odd_key_id() const { return odd_key_id_; } + + void set_odd_key_bytes(const std::string& odd_key_bytes) { + odd_key_bytes_ = odd_key_bytes; + } + + const std::string& odd_key_bytes() const { return odd_key_bytes_; } + + void set_even_key_id(const std::string& even_key_id) { + even_key_id_ = even_key_id; + } + + const std::string& even_key_id() const { return even_key_id_; } + + void set_even_key_bytes(const std::string& even_key_bytes) { + even_key_bytes_ = even_key_bytes; + } + + const std::string& even_key_bytes() const { return even_key_bytes_; } + + void set_track_type(const TrackType track_type) { track_type_ = track_type; } + + TrackType track_type() const { return track_type_; } + + void set_output_protection(const WvPLOutputProtection& output_protection) { + output_protection_ = output_protection; + } + + void set_requested_output_protection( + const WvPLOutputProtection& output_protection) { + requested_output_protection_ = output_protection; + } + + const WvPLOutputProtection& output_protection() const { + return output_protection_; + } + + const WvPLOutputProtection& requested_output_protection() const { + return requested_output_protection_; + } + + WvPLOutputProtection* mutable_output_protection() { + return &output_protection_; + } + + WvPLOutputProtection* mutable_requested_output_protection() { + return &requested_output_protection_; + } + + void set_key_type(const KeyType key_type) { key_type_ = key_type; } + + KeyType key_type() const { return key_type_; } + + void set_key_category_spec(const WvPLKeyCategorySpec& category_spec) { + key_category_spec_ = category_spec; + } + + const WvPLKeyCategorySpec& key_category_spec() const { + return key_category_spec_; + } + + private: + // 'Odd' Key slot identifier. + std::string odd_key_id_; + // 'Odd' Key slot. + std::string odd_key_bytes_; + // 'Even' Key slot identifier. + std::string even_key_id_; + // 'Even' Key slot. + std::string even_key_bytes_; + // track type. + TrackType track_type_ = TRACK_TYPE_UNSPECIFIED; + // Required output protection. + WvPLOutputProtection output_protection_; + // Requested output protection. + WvPLOutputProtection requested_output_protection_; + // Key type from the KeyType enumeration. + KeyType key_type_ = ENTITLEMENT; + // Key Category Spec indicator. + WvPLKeyCategorySpec key_category_spec_; +}; + +// Defines the Widevine security profile. +class WvPLSecurityProfile { + public: + enum Level { + SECURITY_PROFILE_LEVEL_UNDEFINED = 0, + SECURITY_PROFILE_LEVEL_1 = 1, + SECURITY_PROFILE_LEVEL_2 = 2, + SECURITY_PROFILE_LEVEL_3 = 3, + SECURITY_PROFILE_LEVEL_4 = 4, + SECURITY_PROFILE_LEVEL_5 = 5, + }; + + // Defines the output requirement for the Widevine security profile. + class OutputRequirement { + public: + OutputRequirement() { + hdcp_version_ = HDCP_NONE; + analog_output_capabilities_ = ANALOG_OUTPUT_UNKNOWN; + cgms_level_ = CGMS_NONE; + disable_analog_output_ = false; + security_profile_hdcp_version_ = HDCP_NONE; + } + + void set_hdcp_version(HDCP hdcp_version) { hdcp_version_ = hdcp_version; } + HDCP hdcp_version() const { return hdcp_version_; } + + void set_analog_output_capabilities( + AnalogOutputCapabilities analog_output_capabilities) { + analog_output_capabilities_ = analog_output_capabilities; + } + AnalogOutputCapabilities analog_output_capabilities() const { + return analog_output_capabilities_; + } + + void set_cgms_level(CGMS cgms_level) { cgms_level_ = cgms_level; } + CGMS cgms_level() const { return cgms_level_; } + + void set_disable_analog_output(bool disable_analog_output) { + disable_analog_output_ = disable_analog_output; + } + bool disable_analog_output() const { return disable_analog_output_; } + + void set_security_profile_hdcp_version(HDCP security_profile_hdcp_version) { + security_profile_hdcp_version_ = security_profile_hdcp_version; + } + HDCP security_profile_hdcp_version() const { + return security_profile_hdcp_version_; + } + + private: + // HDCP version + HDCP hdcp_version_; + // Analog Output Capabilities + AnalogOutputCapabilities analog_output_capabilities_; + // CGMS Level + CGMS cgms_level_; + // Disable Analog Output + bool disable_analog_output_; + // Security Profile HDCP version as set by a Studio (Content Owner) + HDCP security_profile_hdcp_version_; + }; + + // List of required platform verification status based on VMP and remote + // attestation. + class BrowserRequirement { + public: + BrowserRequirement() = default; + + void add_vmp_statuses(const PlatformVerificationStatus& vmp_status) { + vmp_statuses_.push_back(vmp_status); + } + const std::list& vmp_statuses() const { + return vmp_statuses_; + } + + private: + std::list vmp_statuses_; + }; + + // Defines the security requirement for the Widevine security profile. + class SecurityRequirement { + public: + enum VulnerabilityLevel { + VULNERABILITY_LEVEL_UNSPECIFIED = 0, + VULNERABILITY_LEVEL_NONE = 1, + VULNERABILITY_LEVEL_LOW = 2, + VULNERABILITY_LEVEL_MEDIUM = 3, + VULNERABILITY_LEVEL_HIGH = 4, + VULNERABILITY_LEVEL_CRITICAL = 5, + }; + + SecurityRequirement() { + oem_crypto_api_major_version_ = 0; + security_level_ = DEVICE_LEVEL_UNSPECIFIED; + resource_rating_tier_ = 1; + vulnerability_level_ = VULNERABILITY_LEVEL_UNSPECIFIED; + verified_make_model_ = false; + } + + void set_oem_crypto_api_major_version(uint32_t oem_crypto_api_major_version) { + oem_crypto_api_major_version_ = oem_crypto_api_major_version; + } + uint32_t oem_crypto_api_major_version() const { + return oem_crypto_api_major_version_; + } + + void set_security_level(const DeviceSecurityLevel& security_level) { + security_level_ = security_level; + } + DeviceSecurityLevel security_level() const { return security_level_; } + + void set_resource_rating_tier(uint32_t resource_rating_tier) { + resource_rating_tier_ = resource_rating_tier; + } + uint32_t resource_rating_tier() const { return resource_rating_tier_; } + + void set_vulnerability_level(VulnerabilityLevel vulnerability_level) { + vulnerability_level_ = vulnerability_level; + } + VulnerabilityLevel vulnerability_level() const { + return vulnerability_level_; + } + void set_verified_make_model(bool verified_make_model) { + verified_make_model_ = verified_make_model; + } + bool verified_make_model() const { return verified_make_model_; } + void add_device_state(const DeviceState& device_state) { + device_states_.push_back(device_state); + } + std::list device_states() const { return device_states_; } + + void set_browser_requirements( + const BrowserRequirement& browser_requirements) { + browser_requirements_ = browser_requirements; + } + BrowserRequirement browser_requirements() const { + return browser_requirements_; + } + + private: + // OEM Crypto API major version + uint32_t oem_crypto_api_major_version_; + // Device security level + DeviceSecurityLevel security_level_; + // OEM Crypto resource rating tier as per + // Resource Rating Tier + // 1 - Low + // 2 - Medium + // 3 - High + uint32_t resource_rating_tier_; + // Security vulnerability level. + VulnerabilityLevel vulnerability_level_; + // Verified make model (i.e. the device manufacturer has verified the make + // model information). + bool verified_make_model_; + // Device states allowed for this profile. + std::list device_states_; + // Platform verification requirements for devices using desktop browsers. + BrowserRequirement browser_requirements_; + }; + + // Defines the device exception for the Widevine security profile. + class DeviceException { + public: + DeviceException() { + system_id_ = 0; + exception_action_ = DEVICE_EXCEPTION_UNSPECIFIED; + } + + enum ExceptionAction { + DEVICE_EXCEPTION_UNSPECIFIED = 0, + DEVICE_EXCEPTION_ALLOW = 1, + DEVICE_EXCEPTION_BLOCK = 2, + }; + + void set_system_id(uint32_t system_id) { system_id_ = system_id; } + uint32_t system_id() const { return system_id_; } + + void set_exception_action(ExceptionAction exception_action) { + exception_action_ = exception_action; + } + + ExceptionAction exception_action() const { return exception_action_; } + + private: + // System Id for the exceptional device. + uint32_t system_id_; + // Override action is taken if override is specified. + ExceptionAction exception_action_; + }; + + // Defines the control time for the Widevine security profile. + class ControlTime { + public: + ControlTime() { + start_time_seconds_ = 0; + end_time_seconds_ = 0; + } + + void set_start_time_seconds(int64_t start_time_seconds) { + start_time_seconds_ = start_time_seconds; + } + int64_t start_time_seconds() const { return start_time_seconds_; } + + void set_end_time_seconds(int64_t end_time_seconds) { + end_time_seconds_ = end_time_seconds; + } + int64_t end_time_seconds() const { return end_time_seconds_; } + + private: + int64_t start_time_seconds_; + int64_t end_time_seconds_; + }; + + // Defines the DRM information for the Widevine security profile. + class DrmInfo { + public: + class DcslInfo { + public: + DcslInfo() { creation_time_seconds_ = 0; } + + void set_creation_time_seconds(uint32_t creation_time_seconds) { + creation_time_seconds_ = creation_time_seconds; + } + uint32_t creation_time_seconds() const { return creation_time_seconds_; } + + private: + uint32_t creation_time_seconds_; + }; + DrmInfo() { system_id_ = 0; } + + void set_request_model_info( + const WvPLDeviceInfo::ModelInfo& request_model_info) { + request_model_info_ = request_model_info; + } + const WvPLDeviceInfo::ModelInfo& request_model_info() const { + return request_model_info_; + } + + void set_system_id(uint32_t system_id) { system_id_ = system_id; } + uint32_t system_id() const { return system_id_; } + + void set_output_requirement(const OutputRequirement& output_requirement) { + output_requirement_ = output_requirement; + } + const OutputRequirement& output_requirement() const { + return output_requirement_; + } + + void set_security_requirement( + const SecurityRequirement& security_requirement) { + security_requirement_ = security_requirement; + } + const SecurityRequirement& security_requirement() const { + return security_requirement_; + } + + void set_platform(const std::string& platform) { platform_ = platform; } + const std::string& platform() const { return platform_; } + + void set_device_type(const std::string& device_type) { + device_type_ = device_type; + } + const std::string& device_type() const { return device_type_; } + + void set_dcsl_info(const DcslInfo& dcsl_info) { dcsl_info_ = dcsl_info; } + const DcslInfo& dcsl_info() const { return dcsl_info_; } + + private: + // Device information specified by the client. + WvPLDeviceInfo::ModelInfo request_model_info_; + // Widevine system ID for this device family. + uint32_t system_id_; + // Output requirement for the Widevine security profile. + OutputRequirement output_requirement_; + // Security requirement for the Widevine security profile. + SecurityRequirement security_requirement_; + // Platform specifies the OS and perhaps other software information. for + // example, Android, iOS, or Chrome. + std::string platform_; + // Form factor of the device, for example, phone, tablet, TV, etc. + std::string device_type_; + // DCSL information. + DcslInfo dcsl_info_; + }; + + WvPLSecurityProfile() { level_ = SECURITY_PROFILE_LEVEL_UNDEFINED; } + + void set_name(const std::string& name) { name_ = name; } + const std::string& name() const { return name_; } + + ABSL_DEPRECATED("Use SecurityRequirement.security_level() instead.") + void set_level(Level level) { level_ = level; } + Level level() const { return level_; } + + void set_output_requirement(const OutputRequirement& output_requirement) { + output_requirement_ = output_requirement; + } + const OutputRequirement& output_requirement() const { + return output_requirement_; + } + + void set_security_requirement( + const SecurityRequirement& security_requirement) { + security_requirement_ = security_requirement; + } + const SecurityRequirement& security_requirement() const { + return security_requirement_; + } + + void set_owner(const std::string& owner) { owner_ = owner; } + const std::string& owner() const { return owner_; } + + void add_device_exception(const DeviceException& device_exception) { + device_exception_.push_back(device_exception); + } + const std::list& device_exception() const { + return device_exception_; + } + + void set_control_time(const ControlTime& control_time) { + control_time_ = control_time; + } + const ControlTime& control_time() const { return control_time_; } + + private: + // Widevine security profile name. + std::string name_; + // DEPRECATED. Use SecurityRequirement.security_level() instead. + // Widevine security profile level. + Level level_; + // Output requirement for the Widevine security profile. + OutputRequirement output_requirement_; + // Security requirement for the Widevine security profile. + SecurityRequirement security_requirement_; + // Name of content owner who owns this security profile. + std::string owner_; + // Special handling of devices to override the default capabilities of a + // device. + std::list device_exception_; + // Control time indicates the timestamps when this profile is + // effective and when it is expired. + ControlTime control_time_; +}; + +// Represents the capability status for a WvPLKey, in the context of a +// WvPLSecurityProfile. +class WvPLCapabilityStatus { + public: + WvPLCapabilityStatus() { status_ = CAPABILITY_UNKNOWN; } + explicit WvPLCapabilityStatus(DeviceCapabilityStatus status) { + status_ = status; + } + + void set_status(DeviceCapabilityStatus status) { status_ = status; } + DeviceCapabilityStatus status() const { return status_; } + + void set_required_output_protection(WvPLOutputProtection output_protection) { + required_output_protection_ = output_protection; + } + WvPLOutputProtection required_output_protection() const { + return required_output_protection_; + } + + void set_client_capabilities(WvPLClientCapabilities client_capabilities) { + client_capabilities_ = client_capabilities; + } + WvPLClientCapabilities client_capabilities() const { + return client_capabilities_; + } + WvPLClientCapabilities* mutable_client_capabilities() { + return &client_capabilities_; + } + + bool ok() const { return (status() == CAPABILITY_OK); } + + private: + // Indicates whether the device meets the required capabilities by + // identifying the capability not met. + DeviceCapabilityStatus status_; + + // Output requirement for the device. + WvPLOutputProtection required_output_protection_; + + // Device actual capabilities. + WvPLClientCapabilities client_capabilities_; +}; + +} // namespace wv_pl_sdk +} // namespace video_widevine_server + +#endif // VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_COMMON_WVPL_TYPES_H_ diff --git a/centos/sdk/external/cpp/wvpl/license_server_sdk/BUILD b/centos/sdk/external/cpp/wvpl/license_server_sdk/BUILD new file mode 100644 index 0000000..8e587df --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/license_server_sdk/BUILD @@ -0,0 +1,19 @@ +######################################## +## Copyright 2022 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package( + default_visibility = ["//visibility:public"], +) + +filegroup( + name = "exported_sdk_header_files", + srcs = [ + "wvpl_environment.h", + "wvpl_session.h", + ], +) diff --git a/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h b/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h new file mode 100755 index 0000000..cf485f6 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h @@ -0,0 +1,194 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_ENVIRONMENT_H_ +#define VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_ENVIRONMENT_H_ + +#include +#include +#include +#include + +#include "absl/base/attributes.h" +#include "absl/strings/string_view.h" +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" + +namespace video_widevine { +// go/keep-sorted start +class ClientIdentification; +class Environment; +class LicenseRequest; +class SessionCreateOptions; +// go/keep-sorted end +} // namespace video_widevine + +namespace video_widevine_server { +namespace wv_pl_sdk { + +class WvPLLicenseCounter; +class WvPLSession; + +// WvPLEnvironment is used to create WvPLSessions. +// WvPLEnvironment holds data that spans the lifetime of multiple sessions. +// WvPLSession creation depends on a successful prior call to +// WvPLEnvironment::SetDeviceCertificateStatusList(). +// +// Example: +// std::map config_values; +// config_values.insert(std::make_pair(kAllowUnknownDevice, "true")); +// config_values.insert(std::make_pair(kProvider, "")); +// config_values.insert(std::make_pair(kProviderIv, "")); +// config_values.insert(std::make_pair(kProviderKey, "")); +// WvPLEnvironment* wvpl_environment = new WvPLEnvironment(config_values); +// std::string cert_status_list; +// WvPLStatus status; +// status = wvpl_environment->Initialize(); +// wvpl_environment->SetPreProvisioningKeys(prev_prov_keys); +// status = wvpl_environment->SetDrmServiceCertificate( +// "", "", +// ""); +// -- Fetch the intermediate certificates. +// SomeFunctionToFetchTheCertificates(&cert_status_list); +// status = +// wvpl_environment->SetDeviceCertificateStatusList(cert_status_list); + +class WvPLEnvironment : public WvPLSdkEnvironment { + public: + // Copies the config_values and constructs a new WvPLEnvironment object. + explicit WvPLEnvironment( + const std::map& config_values); + + ~WvPLEnvironment() override; + + // One time initialization. Must be called once after construction. + virtual WvPLStatus Initialize(); + + // Creates a new WvPLSession object. Upon success, `session` points to a new + // object created on the heap. Caller retains ownership of the session. + // Example usage: + // WvPLSession* session; + // WvPLStatus status = wvpl_environment->CreateSession(request_from_client, + // &session); + // if (!status.ok()) { + // std::string error_license; + // if (wvpl_environment->GenerateErrorResponse(status, &error_license)) { + // // Send error_license to the client. + // } else { + // // Handle error + // } + // return ... + // } + // // Continue with license flow, invoke GenerateLicense(), etc. + virtual WvPLStatus CreateSession(const std::string& request, + WvPLSession** session) const; + + virtual WvPLStatus CreateSessionWithOptions( + const std::string& request, const WvPLSessionCreateOptions& options, + WvPLSession** session) const; + + // Deletes `session`. Should be called if CreateSession() was successful and + // the session is no longer needed. + virtual void DestroySession(WvPLSession* session) const; + + // If |auto_set_provider_session_token_| is 'true', the provider session token + // may be automatically set. + // The default setting for |auto_set_provider_session_token_| is 'true'. + virtual void SetAutoSetProviderSessionToken( + bool auto_set_provider_session_token); + + // Returns the setting as to whether the provider session token will be + // automatically set. + virtual bool GetAutoSetProviderSessionToken() const; + + // Specifies a comma separated list of system Ids that can support having + // OEMCrypto version, as specified in the license request, reflected back in + // the Key Control Block which is used by partner. Otherwise, only 'kctl' or + // 'kc09' is returned in KCB. + void SetDevicesToHandleOEMCryptoVersionInKCB( + absl::string_view system_id_list); + + // Thread-safe call to set the pre-provisioning keys. `key` is map of + // . Value should be human-readable hex digits. + virtual WvPLStatus SetPreProvisioningKeys( + const std::map& keys); + + // Returns the license counter data as bytes. The bytes in + // `signed_license_stats` are binary. The internal data is flushed + // if `flush_data` is true. If `flush_data` is false, license counters will + // accumulate. If this call returns "Status::OK", `signed_license_stats` is + // populated. `signed_license_stats` is owned by the caller. + virtual WvPLStatus GetStatsAsBytes(bool flush_data, + std::string* signed_license_stats); + + // Returns the license counter data in a human-readable format. The + // internal data is flushed if `flush_data` is true. If `flush_data` is + // false, license counters will accumulate. If this call returns + // "Status::OK", `license_stats` is populated. `license_stats` is owned by + // the caller. + virtual WvPLStatus GetStatsAsString(bool flush_data, + std::string* license_stats); + + // DEPRECATED. + // In order to stay up-to-date with new devices, it is recommended to fetch + // new certificates on a regular basis. The update interval should be once a + // day. If UpdateWithCerftificates() fails, the existing certificates are + // still valid, but are subject to expiration. The expiration is controlled + // by the content provider and configured as a parameter when creating + // WvPLEnvironment. + // `cert_list` is the response provided from the Widevine API + // that produces the certificate list. The method can handle either the new + // API format (the serialized PublishedDevices proto), or the legacy format (a + // JSON response containing the base64-encoded certificate list). + ABSL_DEPRECATED( + "Use WvPLSdkEnvironment::SetDeviceCertificateStatusList() instead.") + virtual WvPLStatus UpdateWithCertificates(const std::string& cert_list); + + // Generates a signed request to be sent to Widevine Certificate Provisioning + // Server to retrieve 'DeviceCertificateStatusList'. + WvPLStatus GenerateDeviceStatusListRequest( + std::string* signed_device_certificate_status_list_request) + const override; + + // Get the expected service type for drm service certificate. + // The expected return value is int value of enum LICENSE_SERVER_SDK + // which is of type DrmCertificate.ServiceType. + int GetExpectedServiceCertificateType() override; + + // Enables delivery of licenses to revoked client devices. `system_id_list` + // is a comma separated list of systems Ids to allow even if revoked. + void AllowRevokedDevices(const std::string& system_id_list) override; + + private: + // Returns the signature for the provider specified in the `config_values` + // parameter in the constructor. `signature` is owned by the caller. + virtual WvPLStatus GetSignature(const std::string& text_to_sign, + std::string* signature); + + std::unique_ptr license_counter_; + // List of system ids that support having the Crypto API version specified in + // the Key Control Block (KCB). + std::string system_ids_for_api_ver_in_kcb_; + // Comma separated list of system ids by make allowed to be TEST_ONLY. + std::string allow_test_only_by_make_; + // Comma separated list of system ids by provider allowed to be TEST_ONLY. + std::string allow_test_only_by_provider_; + // Whether all test devices should be allowed. + bool allow_development_clients_; + // Restriction on core message features. If this is an empty string, the + // default feature set is used. If it is an integer, that is the ODK version + // supported. This restricts the features that the server will support in an + // oemcrypto core message. For example, we may restrict the server to never + // send a v17 message by setting the std::string to "16". + std::string core_message_features_; +}; + +} // namespace wv_pl_sdk +} // namespace video_widevine_server + +#endif // VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_ENVIRONMENT_H_ diff --git a/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h b/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h new file mode 100755 index 0000000..2d5ba14 --- /dev/null +++ b/centos/sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h @@ -0,0 +1,106 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_SESSION_H_ +#define VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_SESSION_H_ + +#include +#include + +#include "absl/base/attributes.h" +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_environment.h" +#include "sdk/external/cpp/wvpl/common/wvpl_sdk_session.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" + +namespace video_widevine { +class ContentInfo; +class Session; +} // namespace video_widevine + +namespace video_widevine_server { +namespace wv_pl_sdk { +class WvPLLicenseCounter; + +// WvPL License SDK gets its release version from here. +// Major version to line up with latest released OEMCrypto API version. +// Minor version to line up with release timeframe, which generally changes +// quarterly within the same calendar year. +// Release version is to line up with the release number within the same +// quarter. +const uint32_t kMajorVersion = 19; +const uint32_t kMinorVersion = 10; +const uint32_t kRelease = 1; + +// Once a WvPLEnvironment object is successfully initialized, it can be used +// to create a WvPLSession object for each license request. +// CreateSession() parses the request and validates the request by verifying +// the signature. If verification is successful, a session object is created +// and OK status is returned. +// Once a WvPLSession object is successfully created, setup the session +// object with the policy and keys, and call AddKey() for each key. +class WvPLSession : public WvPLSdkSession { + public: + WvPLSession(); + ~WvPLSession() override; + + // Generates the license for sending back to the Widevine client. Caller owns + // `license`. + virtual WvPLStatus GenerateLicense(std::string* license); + + virtual void set_session_state(const WvPLSessionState& wvpl_session_state) { + wvpl_session_state_ = wvpl_session_state; + has_session_state_ = true; + } + + virtual const WvPLSessionState& session_state() const { + return wvpl_session_state_; + } + + bool has_sdk_session() const { return session_ != nullptr; } + + // Returns a std::string containing the WVPL version in the form: + // .. + static std::string GetVersionString(); + + // DEPRECATED. + // Returns true if a provisioned device info exists. Populates the specified + // `device_info` structure. + ABSL_DEPRECATED("Use GetDeviceInfo() instead.") + virtual bool GetProvisionedDeviceInfo(WvPLDeviceInfo* device_info) const; + + // Returns the license request from the client. If the client id is encrypted, + // it will be decrypted and returned. + virtual std::string GetLicenseRequest() const; + + protected: + // This class takes ownership of `session`. This class keeps a pointer + // to `license_counter` but the caller maintains ownership of + // `license_counter`. All arguments must not be NULL. + WvPLSession( + const video_widevine::DrmRootCertificate* drm_root_certificate, + video_widevine::Session* session, WvPLLicenseCounter* license_counter, + const WvPLSdkEnvironment* wvpl_sdk_environment); + + // Sets the license counter to use. The caller maintains ownership of + // `license_counter` but this class keeps a pointer to `license_counter`. + void set_license_counter(WvPLLicenseCounter* license_counter) { + license_counter_ = license_counter; + } + + private: + friend class WvPLEnvironment; + friend class WvPLSessionTestPeer; + + WvPLLicenseCounter* license_counter_ = nullptr; + WvPLSessionState wvpl_session_state_; +}; + +} // namespace wv_pl_sdk +} // namespace video_widevine_server + +#endif // VIDEO_WIDEVINE_EXPORT_SDK_EXTERNAL_CPP_WVPL_LICENSE_SERVER_SDK_WVPL_SESSION_H_ diff --git a/centos/sdk/testing/sampleProdCertificateStatusList.json b/centos/sdk/testing/sampleProdCertificateStatusList.json new file mode 100755 index 0000000..a7f8f64 --- /dev/null +++ b/centos/sdk/testing/sampleProdCertificateStatusList.json @@ -0,0 +1,6 @@ +// Copyright 2018 Google LLC +// This is an example Device Certificate Status in Prod Certificate Provisioning environment. +{ + "kind": "certificateprovisioning#certificateStatusListResponse", + "signedList": "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" +} diff --git a/centos/tools/bin/published_devices_cli_deploy.jar b/centos/tools/bin/published_devices_cli_deploy.jar new file mode 100755 index 0000000..a6e84f5 Binary files /dev/null and b/centos/tools/bin/published_devices_cli_deploy.jar differ diff --git a/centos/tools/bin/published_devices_delta_deploy.jar b/centos/tools/bin/published_devices_delta_deploy.jar new file mode 100755 index 0000000..628695c Binary files /dev/null and b/centos/tools/bin/published_devices_delta_deploy.jar differ diff --git a/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/BUILD b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/BUILD new file mode 100644 index 0000000..45ceec0 --- /dev/null +++ b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/BUILD @@ -0,0 +1,56 @@ +######################################## +## Copyright 2019 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +# Published Devices protocol buffer definitions for the +# Widevine Published Devices One Platform API service. + +package(default_visibility = ["//visibility:public"]) + +load("@io_grpc_grpc_java//:java_grpc_library.bzl", "java_grpc_library") + +proto_library( + name = "published_devices_proto", + srcs = ["published_devices.proto"], + deps = [ + ":device_security_profiles_proto", + "@com_github_googleapis_googleapis//google/api:annotations_proto", + "@com_github_googleapis_googleapis//google/api:field_behavior_proto", + "@com_google_protobuf//:timestamp_proto", + ], +) + +proto_library( + name = "device_security_profiles_proto", + srcs = ["device_security_profiles.proto"], + deps = [ + "@com_github_googleapis_googleapis//google/api:field_behavior_proto", + ], +) + +cc_proto_library( + name = "published_devices_cc_proto", + deps = [":published_devices_proto"], +) + +java_proto_library( + name = "published_devices_java_proto", + deps = [":published_devices_proto"], +) + +java_grpc_library( + name = "published_devices_grpc", + srcs = [":published_devices_proto"], + deps = [ + ":published_devices_java_proto", + ], +) + +java_proto_library( + name = "device_security_profiles_java_proto", + deps = [":device_security_profiles_proto"], +) diff --git a/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/device_security_profiles.proto b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/device_security_profiles.proto new file mode 100644 index 0000000..410a7ff --- /dev/null +++ b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/device_security_profiles.proto @@ -0,0 +1,108 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + + + + +syntax = "proto3"; + +package google.chrome.widevine.contentpartners.v1beta1; + +import "google/api/field_behavior.proto"; + +option java_multiple_files = true; +option java_outer_classname = "DeviceSecurityProfilesProto"; +option java_package = "com.google.chrome.widevine.contentpartners.v1beta1"; + + + + +message DeviceSecurityProfileCriteria { + + string content_provider = 1 [ + (google.api.field_behavior) = REQUIRED + ]; + + + + + + repeated string content_owners = 2 [(google.api.field_behavior) = OPTIONAL]; +} + + + + + + + + + + +message ListDeviceSecurityProfilesRequest { + + DeviceSecurityProfileCriteria device_security_profile_criteria = 1 [ + (google.api.field_behavior) = REQUIRED + ]; +} + + + + + + + +message SignedDeviceSecurityProfiles { + + + + + + + bytes device_security_profiles = 1 [(google.api.field_behavior) = REQUIRED]; + + + bytes signature = 2 [(google.api.field_behavior) = REQUIRED]; + + HashAlgorithm hash_algorithm = 3 [(google.api.field_behavior) = OPTIONAL]; +} + + + + + + + + + + + + +message ListDeviceSecurityProfilesResponse { + + + SignedDeviceSecurityProfiles signed_device_security_profiles = 1 + [(google.api.field_behavior) = REQUIRED]; +} + + + + + + +enum HashAlgorithm { + + + HASH_ALGORITHM_UNSPECIFIED = 0; + + HASH_ALGORITHM_SHA_1 = 1; + + HASH_ALGORITHM_SHA_256 = 2; + + HASH_ALGORITHM_SHA_384 = 3; +} diff --git a/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/published_devices.proto b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/published_devices.proto new file mode 100755 index 0000000..aeac412 --- /dev/null +++ b/centos/tools/src/google/chrome/widevine/contentpartners/v1beta1/published_devices.proto @@ -0,0 +1,188 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2019 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + + + + + +// + + + + + +// + + + + +syntax = "proto3"; + +package google.chrome.widevine.contentpartners.v1beta1; + +import "google/api/annotations.proto"; +import "google/api/field_behavior.proto"; +import "google/chrome/widevine/contentpartners/v1beta1/device_security_profiles.proto"; +import "google/protobuf/timestamp.proto"; + +option csharp_namespace = "Google.Chrome.Widevine.ContentPartners.V1Beta1"; +option java_multiple_files = true; +option java_outer_classname = "PublishedDevicesProtos"; +option java_package = "com.google.chrome.widevine.contentpartners.v1beta1"; + + +option objc_class_prefix = "GCWPD"; + + + + +service PublishedDevicesService { + + + rpc GetPublishedDevices(PublishedDevicesRequest) returns (PublishedDevices) { + + option (google.api.http) = { + post: "/v1beta1/publishedDevices:getSignedBatch" + body: "*" + }; + } + + + + + + + + rpc RetrieveIndividualDeviceRevocationList( + RetrieveIndividualDeviceRevocationListRequest) + returns (RetrieveIndividualDeviceRevocationListResponse) { + + option (google.api.http) = { + post: "/v1beta1/individualDeviceRevocationList:retrieve" + body: "*" + }; + } + + + + rpc ListDeviceSecurityProfiles(ListDeviceSecurityProfilesRequest) + returns (ListDeviceSecurityProfilesResponse) { + + option (google.api.http) = { + get: "/v1beta1/deviceSecurityProfiles:listDeviceSecurityProfiles" + }; + } +} + + + + + +message SdkClientInformation { + + string sdk_version = 1; + + uint64 sdk_time_seconds = 2; + + bytes service_certificate = 3; + + string provider = 4; +} + + +message PublishedDevicesRequest { + + bytes sdk_client_information = 1; + + + + + bytes signature = 2; + + + HashAlgorithm hash_algorithm = 3 [(google.api.field_behavior) = OPTIONAL]; + + + + + + + DcslSnapshotType dcsl_snapshot_type = 4 + [(google.api.field_behavior) = OPTIONAL]; + + + + + + google.protobuf.Timestamp last_dcsl_epoch_time = 5 + [(google.api.field_behavior) = OPTIONAL]; + + + + + + + bool include_impact_analysis = 6 [(google.api.field_behavior) = OPTIONAL]; +} + + +message PublishedDevices { + + + + + + bytes published_devices = 1; + + + + bytes signature = 2; + + + HashAlgorithm hash_algorithm = 3 [(google.api.field_behavior) = OPTIONAL]; + + + DcslSnapshotType dcsl_snapshot_type = 4 + [(google.api.field_behavior) = OPTIONAL]; +} + + +message RetrieveIndividualDeviceRevocationListRequest { + + string provider = 1 [ + (google.api.field_behavior) = REQUIRED + ]; +} + + +message RetrieveIndividualDeviceRevocationListResponse { + + + + + bytes global_individual_device_revocation_list = 1 + [(google.api.field_behavior) = REQUIRED]; + + + bytes provider_individual_device_revocation_list = 2 + [(google.api.field_behavior) = OPTIONAL]; +} + + +enum DcslSnapshotType { + + DCSL_SNAPSHOT_TYPE_UNSPECIFIED = 0; + + DCSL_ALPHA = 1; + + + DCSL_BETA = 2; + + + DCSL_RELEASED = 3; +} diff --git a/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/BUILD b/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/BUILD new file mode 100644 index 0000000..1fb62a3 --- /dev/null +++ b/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/BUILD @@ -0,0 +1,31 @@ +######################################## +## Copyright 2023 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package(default_visibility = ["//visibility:public"]) + +load("@io_grpc_grpc_java//:java_grpc_library.bzl", "java_grpc_library") + +proto_library( + name = "fraud_detection_and_reporting_service_proto", + srcs = ["fraud_detection_and_reporting_service.proto"], + deps = [ + "@com_github_googleapis_googleapis//google/api:annotations_proto", + "@com_github_googleapis_googleapis//google/api:field_behavior_proto", + ], +) + +java_proto_library( + name = "fraud_detection_and_reporting_service_java_proto", + deps = [":fraud_detection_and_reporting_service_proto"], +) + +java_grpc_library( + name = "fraud_detection_and_reporting_grpc", + srcs = [":fraud_detection_and_reporting_service_proto"], + deps = [":fraud_detection_and_reporting_service_java_proto"], +) diff --git a/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/fraud_detection_and_reporting_service.proto b/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/fraud_detection_and_reporting_service.proto new file mode 100644 index 0000000..a143f50 --- /dev/null +++ b/centos/tools/src/google/chrome/widevine/frauddetection/v1eap1/fraud_detection_and_reporting_service.proto @@ -0,0 +1,201 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2022 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +syntax = "proto3"; + +package google.chrome.widevine.frauddetection.v1eap1; + +import "google/api/annotations.proto"; +import "google/api/field_behavior.proto"; + +option java_multiple_files = true; +option java_outer_classname = "FraudDetectionAndReportingServiceProto"; +option java_package = "com.google.chrome.widevine.frauddetection.v1eap1"; + + + + +service FraudDetectionAndReportingService { + + rpc CalculateFraudLevel(CalculateFraudLevelRequest) + returns (CalculateFraudLevelResponse) { + option (google.api.http) = { + post: "/v1eap1/fraudDetection:calculateFraudLevel" + body: "*" + }; + } + + + rpc ReportFraudLevel(ReportFraudLevelRequest) + returns (ReportFraudLevelResponse) { + option (google.api.http) = { + post: "/v1eap1/fraudReporting:reportFraudLevel" + body: "*" + }; + } +} + + +message LicenseRequestInfo { + + message RequestMetadata { + + + string client_ip_address = 1 [ + (google.api.field_behavior) = OPTIONAL + ]; + + + string user_agent = 2; + + + string provider = 3; + } + + + + + bytes license_request = 1 [ + (google.api.field_behavior) = REQUIRED + ]; + + + + + + bytes clear_client_id = 2 [ + (google.api.field_behavior) = OPTIONAL + ]; + + + RequestMetadata request_metadata = 3; +} + + +message FraudLevel { + + + enum FraudScore { + + FRAUD_SCORE_UNSPECIFIED = 0; + + + FRAUD_SCORE_NONE = 1; + + + FRAUD_SCORE_LOW = 2; + + + FRAUD_SCORE_MEDIUM = 3; + + + FRAUD_SCORE_HIGH = 4; + + + FRAUD_SCORE_CRITICAL = 5; + } + + + + enum ConfidenceLevel { + + CONFIDENCE_LEVEL_UNSPECIFIED = 0; + + + CONFIDENCE_LEVEL_NONE = 1; + + + CONFIDENCE_LEVEL_LOW = 2; + + + CONFIDENCE_LEVEL_MEDIUM = 3; + + + CONFIDENCE_LEVEL_HIGH = 4; + + + CONFIDENCE_LEVEL_VERIFIED = 5; + } + + + FraudScore fraud_score = 1; + + + ConfidenceLevel confidence_level = 2; +} + + +message CalculateFraudLevelRequest { + + enum Option { + + OPTION_UNSPECIFIED = 0; + + + + + OPTION_NO_RESULTS = 1; + + + + OPTION_LOW_LATENCY = 2; + + + OPTION_HIGH_LATENCY = 3; + } + + + Option request_option = 1 [ + (google.api.field_behavior) = REQUIRED + ]; + + + LicenseRequestInfo license_request_info = 2 [ + (google.api.field_behavior) = REQUIRED + ]; + + + + bool validate_only = 3 [(google.api.field_behavior) = OPTIONAL]; +} + + +message CalculateFraudLevelResponse { + + FraudLevel fraud_level = 1; + + + + LicenseRequestInfo license_request_info = 2; +} + + +message ReportFraudLevelRequest { + + FraudLevel fraud_level = 1 [ + (google.api.field_behavior) = REQUIRED + ]; + + + LicenseRequestInfo license_request_info = 2 [ + (google.api.field_behavior) = REQUIRED + ]; + + + string reason = 3 [(google.api.field_behavior) = OPTIONAL]; +} + + +message ReportFraudLevelResponse { + + FraudLevel fraud_level = 1; + + + + LicenseRequestInfo license_request_info = 2; +} diff --git a/centos/tools/src/testing/cts/common/BUILD b/centos/tools/src/testing/cts/common/BUILD new file mode 100644 index 0000000..a8d402e --- /dev/null +++ b/centos/tools/src/testing/cts/common/BUILD @@ -0,0 +1,32 @@ +######################################## +## Copyright 2024 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package(default_visibility = ["//visibility:public"]) + +COMMON_DATA = [ + "cts_resources/cert_staging_google_com.der", + "cts_resources/dev_cert_status_list.dat", + "cts_resources/private_key_staging_google_com.der", + "cts_resources/dcsl-google.com_blockbuster-1154-5f30025abf26.json", +] + +filegroup( + name = "cts_resources", + srcs = COMMON_DATA, +) + +cc_library( + name = "cts_resource_config", + srcs = ["cts_resource_config.cc"], + hdrs = ["cts_resource_config.h"], + data = COMMON_DATA, + deps = [ + "//base", + "//devtools/build/runtime:get_runfiles_dir", + ], +) diff --git a/centos/tools/src/testing/cts/common/cts_resource_config.cc b/centos/tools/src/testing/cts/common/cts_resource_config.cc new file mode 100644 index 0000000..4fab99d --- /dev/null +++ b/centos/tools/src/testing/cts/common/cts_resource_config.cc @@ -0,0 +1,106 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include "testing/cts/common/cts_resource_config.h" + +#include +#include +#include +#include +#include +#include + +#include "devtools/build/runtime/get_runfiles_dir.h" + +namespace video_widevine { +namespace cts_resource_config { + +using devtools_build::GetDataDependencyFilepath; + +std::map SetupDefaultConfigs() { + std::map config_values; + config_values.insert(std::make_pair("allow_unknown_device", "1")); + config_values.insert(std::make_pair("device_certificate_expiration", "0")); + config_values.insert(std::make_pair("provider", "widevine_test")); + config_values.insert( + std::make_pair("provider_iv", "b9c3c175d69b9905e50715d196326acc")); + config_values.insert(std::make_pair( + "provider_key", + "93338e5289145f5f9990d9c9612bcb2bb79e6a684acc6d0ad34bdb7a475621da")); + return config_values; +} + +std::string GetServiceCertificate() { + // use the jts server cert + const std::string resource_path = + "google3/testing/cts/common/" + "cts_resources/" + "cert_staging_google_com.der"; + // update dependency path for borg + std::string resource_path_full = GetDataDependencyFilepath(resource_path); + std::ifstream input_file(resource_path_full); + if (!input_file.is_open()) { + std::cerr << "Error opening file!\n"; + std::cerr << resource_path << "\n"; + return ""; + } + std::stringstream buffer; + buffer << input_file.rdbuf(); + std::string service_certificate = buffer.str(); + input_file.close(); + return service_certificate; +} + +std::string GetServiceCertificatePrivateKey() { + // use the jts server cert + const std::string resource_path = + "google3/testing/cts/common/" + "cts_resources/" + "private_key_staging_google_com.der"; + // update dependency path for borg + std::string resource_path_full = GetDataDependencyFilepath(resource_path); + std::ifstream input_file(resource_path_full); + if (!input_file.is_open()) { + std::cerr << "Error opening file!\n"; + std::cerr << resource_path << "\n"; + return ""; + } + std::stringstream buffer; + buffer << input_file.rdbuf(); + std::string service_certificate_private_key = buffer.str(); + input_file.close(); + return service_certificate_private_key; +} + +std::string GetDCSLRawData() { + const std::string dcsl_path = + "google3/testing/cts/common/" + "cts_resources/" + "dev_cert_status_list.dat"; + // update dependency path for borg + std::string dcsl_path_full = GetDataDependencyFilepath(dcsl_path); + std::ifstream input_file(dcsl_path_full); + if (!input_file.is_open()) { + std::cerr << "Error opening file!\n"; + std::cerr << dcsl_path << "\n"; + return ""; + } + std::stringstream buffer; + buffer << input_file.rdbuf(); + std::string dcsl_str = buffer.str(); + input_file.close(); + return dcsl_str; +} + +std::string GetPrivateKeyPassphrase() { + return "mViUNMa3Lag7KJyEl5aphWn4/dkOOI3H/" + "D8LSJ0g3t8GLj3lOHGTTjn1Y2XKPqU7M3NlxAw5mFZl"; +} + +} // namespace cts_resource_config +} // namespace video_widevine diff --git a/centos/tools/src/testing/cts/common/cts_resource_config.h b/centos/tools/src/testing/cts/common/cts_resource_config.h new file mode 100644 index 0000000..2af2bad --- /dev/null +++ b/centos/tools/src/testing/cts/common/cts_resource_config.h @@ -0,0 +1,26 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_TESTING_CTS_COMMON_CTS_RESOURCE_CONFIG_H_ +#define VIDEO_WIDEVINE_EXPORT_TESTING_CTS_COMMON_CTS_RESOURCE_CONFIG_H_ + +#include +#include + +namespace video_widevine { +namespace cts_resource_config { + +std::map SetupDefaultConfigs(); +std::string GetDCSLRawData(); +std::string GetServiceCertificate(); +std::string GetServiceCertificatePrivateKey(); +std::string GetPrivateKeyPassphrase(); +} // namespace cts_resource_config +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_TESTING_CTS_COMMON_CTS_RESOURCE_CONFIG_H_ diff --git a/centos/tools/src/testing/cts/env/BUILD b/centos/tools/src/testing/cts/env/BUILD new file mode 100644 index 0000000..f21b0ed --- /dev/null +++ b/centos/tools/src/testing/cts/env/BUILD @@ -0,0 +1,22 @@ +######################################## +## Copyright 2024 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package(default_visibility = ["//visibility:public"]) + +cc_library( + name = "wvpl_env", + hdrs = ["wvpl_env.h"], + deps = [ + "@abseil_repo//absl/log", + "@abseil_repo//absl/strings", + "//sdk/external/cpp/wvpl/common:wvpl_types", + "//sdk/external/cpp/wvpl/license_server_sdk:wvpl_environment", + "//testing/cts/common:cts_resource_config", + "//testing/cts/published_devices:published_devices_provider", + ], +) diff --git a/centos/tools/src/testing/cts/env/wvpl_env.h b/centos/tools/src/testing/cts/env/wvpl_env.h new file mode 100644 index 0000000..637d8ec --- /dev/null +++ b/centos/tools/src/testing/cts/env/wvpl_env.h @@ -0,0 +1,116 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_TESTING_CTS_ENV_WVPL_ENV_H_ +#define VIDEO_WIDEVINE_EXPORT_TESTING_CTS_ENV_WVPL_ENV_H_ + +#include +#include + +#include "absl/log/log.h" +#include "absl/strings/escaping.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" +#include "testing/cts/common/cts_resource_config.h" +#include "testing/cts/published_devices/published_devices_provider.h" + +namespace video_widevine { +namespace cts { +namespace wvpl_env { + +using video_widevine::published_devices_provider::GetDCSL; +using video_widevine_server::wv_pl_sdk::WvPLEnvironment; + +// Singleton class to get an instance of WvPLEnvironment from wvpl_environment.h +class WvplEnv { + public: + // Gets the instance of WvplEnv singleton which stores a WvPLEnvironment. + static WvplEnv* GetInstance() { + static WvplEnv* s = new WvplEnv(); + return s; + } + // Gets the WvPLEnvironment instance stored inside this singleton. + WvPLEnvironment* get_env() { return &wvpl_env_instance_; } + // Returns true if env initialization failed for any reason. + bool env_setup_failed() { return env_init_failed_; } + + private: + WvplEnv() + : wvpl_env_instance_( + video_widevine::cts_resource_config::SetupDefaultConfigs()) { + env_init_failed_ = false; + video_widevine_server::wv_pl_sdk::WvPLStatus status = + wvpl_env_instance_.Initialize(); + if (status.ok()) { + } else { + env_init_failed_ = true; + return; + } + std::string service_cert = + video_widevine::cts_resource_config::GetServiceCertificate(); + std::string service_cert_private_key = + video_widevine::cts_resource_config::GetServiceCertificatePrivateKey(); + + status = wvpl_env_instance_.SetDrmServiceCertificate( + service_cert, service_cert_private_key, + video_widevine::cts_resource_config::GetPrivateKeyPassphrase()); + if (status.ok()) { + } else { + env_init_failed_ = true; + return; + } + + std::string use_dcsl_from_file = ""; + if (getenv("USE_DCSL_FROM_FILE") != nullptr) { + use_dcsl_from_file = getenv("USE_DCSL_FROM_FILE"); + } + if (use_dcsl_from_file == "True") { + std::string dcsl_str_encoded = + video_widevine::cts_resource_config::GetDCSLRawData(); + std::string dcsl_decoded; + bool result = + absl::WebSafeBase64Unescape(dcsl_str_encoded, &dcsl_decoded); + if (!result) { + } + status = wvpl_env_instance_.SetDeviceCertificateStatusList(dcsl_decoded); + if (status.ok()) { + } else { + env_init_failed_ = true; + return; + } + } else { + // Fetch the device certificate status list. + absl::StatusOr dcslStatus = GetDCSL(wvpl_env_instance_); + if (dcslStatus.ok()) { + } else { + env_init_failed_ = true; + return; + } + status = + wvpl_env_instance_.SetDeviceCertificateStatusList(dcslStatus.value()); + if (status.ok()) { + } else { + env_init_failed_ = true; + return; + } + } + } + + ~WvplEnv() = default; + + WvplEnv(const WvplEnv&) = delete; + WvplEnv& operator=(const WvplEnv&) = delete; + + WvPLEnvironment wvpl_env_instance_; + bool env_init_failed_; +}; +} // namespace wvpl_env +} // namespace cts +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_TESTING_CTS_ENV_WVPL_ENV_H_ diff --git a/centos/tools/src/testing/cts/published_devices/BUILD b/centos/tools/src/testing/cts/published_devices/BUILD new file mode 100644 index 0000000..db8b01d --- /dev/null +++ b/centos/tools/src/testing/cts/published_devices/BUILD @@ -0,0 +1,38 @@ +######################################## +## Copyright 2024 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package(default_visibility = ["//visibility:public"]) + +cc_library( + name = "published_devices_provider", + srcs = ["published_devices_provider.cc"], + hdrs = ["published_devices_provider.h"], + deps = [ + "//base", + "//chubby/lib/public:lockservice", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_cc_grpc", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_cc_proto", + "//net/eventmanager", + "//net/grpc:grpc++", + "//net/http:httpserverrequest", + "//net/http2/server/lib/public:server", + "//net/rpc", + + "@abseil_repo//absl/functional:bind_front", + "@abseil_repo//absl/log", + "@abseil_repo//absl/log:check", + "@abseil_repo//absl/status", + "@abseil_repo//absl/status:statusor", + "//third_party/grpc", + "//third_party/grpc:grpc++", + "//thread", + "//util:error_space", + "//sdk/external/cpp/wvpl/common:wvpl_types", + "//sdk/external/cpp/wvpl/license_server_sdk:wvpl_environment", + ], +) diff --git a/centos/tools/src/testing/cts/published_devices/published_devices_provider.cc b/centos/tools/src/testing/cts/published_devices/published_devices_provider.cc new file mode 100644 index 0000000..bab3d00 --- /dev/null +++ b/centos/tools/src/testing/cts/published_devices/published_devices_provider.cc @@ -0,0 +1,94 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include "testing/cts/published_devices/published_devices_provider.h" + +#include + +#include +#include +#include + +#include "google/chrome/widevine/contentpartners/v1beta1/published_devices.grpc.pb.h" +#include "google/chrome/widevine/contentpartners/v1beta1/published_devices.pb.h" +#include "absl/log/log.h" +#include "absl/status/status.h" +#include "absl/status/statusor.h" +#include "third_party/grpc/include/grpcpp/channel.h" +#include "third_party/grpc/include/grpcpp/client_context.h" +#include "third_party/grpc/include/grpcpp/create_channel.h" +#include "third_party/grpc/include/grpcpp/security/credentials.h" +#include "third_party/grpc/include/grpcpp/support/status.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" + +namespace video_widevine { +namespace published_devices_provider { + +using google::chrome::widevine::contentpartners::v1beta1::PublishedDevices; +using google::chrome::widevine::contentpartners::v1beta1:: + PublishedDevicesRequest; +using google::chrome::widevine::contentpartners::v1beta1:: + PublishedDevicesService; + +using video_widevine_server::wv_pl_sdk::WvPLEnvironment; +using video_widevine_server::wv_pl_sdk::WvPLStatus; + +const char apiServicePath[] = "widevine.googleapis.com"; + +absl::StatusOr GetPublishedDevices( + const WvPLEnvironment& env) { + std::shared_ptr channel = nullptr; + PublishedDevices devicesResponse; + try { + // Create grpc channel. + std::shared_ptr channel = + grpc::CreateChannel(apiServicePath, grpc::GoogleDefaultCredentials()); + + // Create a stub. + std::unique_ptr stub( + (PublishedDevicesService::NewStub(channel))); + PublishedDevicesRequest publishedDevicesRequest; + std::string publishedDevicesRequestString; + WvPLStatus status = + env.GenerateDeviceStatusListRequest(&publishedDevicesRequestString); + if (!status.ok()) { + return absl::FailedPreconditionError("unable to generate dcsl request: " + + status.error_message()); + } + if (!publishedDevicesRequest.ParseFromString( + publishedDevicesRequestString)) { + return absl::FailedPreconditionError( + "unable to parse published devices request"); + } + + // Send gRPC request. + grpc::ClientContext context; + grpc::Status grpcStatus = stub->GetPublishedDevices( + &context, publishedDevicesRequest, &devicesResponse); + if (grpcStatus.ok()) { + } else { + return absl::FailedPreconditionError("grpc getPublishedDevices failed: " + + grpcStatus.error_message()); + } + } catch (const std::exception& exc) { + return absl::FailedPreconditionError("failed to retrieve signd list"); + } + return devicesResponse; +} + +absl::StatusOr GetDCSL(const WvPLEnvironment& env) { + absl::StatusOr pdResponse = GetPublishedDevices(env); + if (!pdResponse.ok()) { + return pdResponse.status(); + } + return pdResponse.value().SerializeAsString(); +} + +} // namespace published_devices_provider +} // namespace video_widevine diff --git a/centos/tools/src/testing/cts/published_devices/published_devices_provider.h b/centos/tools/src/testing/cts/published_devices/published_devices_provider.h new file mode 100644 index 0000000..560aa79 --- /dev/null +++ b/centos/tools/src/testing/cts/published_devices/published_devices_provider.h @@ -0,0 +1,32 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_TESTING_CTS_PUBLISHED_DEVICES_PUBLISHED_DEVICES_PROVIDER_H_ +#define VIDEO_WIDEVINE_EXPORT_TESTING_CTS_PUBLISHED_DEVICES_PUBLISHED_DEVICES_PROVIDER_H_ + +#include + +#include "google/chrome/widevine/contentpartners/v1beta1/published_devices.pb.h" +#include "absl/status/statusor.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" + +namespace video_widevine { +namespace published_devices_provider { + +absl::StatusOr< + google::chrome::widevine::contentpartners::v1beta1::PublishedDevices> +GetPublishedDevices( + const video_widevine_server::wv_pl_sdk::WvPLEnvironment& env); + +absl::StatusOr GetDCSL( + const video_widevine_server::wv_pl_sdk::WvPLEnvironment& env); + +} // namespace published_devices_provider +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_TESTING_CTS_PUBLISHED_DEVICES_PUBLISHED_DEVICES_PROVIDER_H_ diff --git a/centos/tools/src/testing/cts/sdk/BUILD b/centos/tools/src/testing/cts/sdk/BUILD new file mode 100644 index 0000000..03fa000 --- /dev/null +++ b/centos/tools/src/testing/cts/sdk/BUILD @@ -0,0 +1,28 @@ +######################################## +## Copyright 2024 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package(default_visibility = ["//visibility:public"]) + +cc_library( + name = "wvpl_sdk", + srcs = ["wvpl_sdk.cc"], + hdrs = ["wvpl_sdk.h"], + deps = [ + "//google/chrome/widevine/licensedata/v1:content_key_spec_cc_proto", + "@abseil_repo//absl/log", + "@abseil_repo//absl/status", + "@abseil_repo//absl/status:statusor", + "//sdk/external/cpp/wvpl/common:wvpl_types", + "//sdk/external/cpp/wvpl/license_server_sdk:wvpl_environment", + "//sdk/external/cpp/wvpl/license_server_sdk:wvpl_session", + "//testing/cts/env:wvpl_env", + "//protos/public:license_protocol_cc_proto", + "//protos/public:license_protos_cc_proto", + "//protos/public:license_services_cc_proto", + ], +) diff --git a/centos/tools/src/testing/cts/sdk/wvpl_sdk.cc b/centos/tools/src/testing/cts/sdk/wvpl_sdk.cc new file mode 100644 index 0000000..d0e766c --- /dev/null +++ b/centos/tools/src/testing/cts/sdk/wvpl_sdk.cc @@ -0,0 +1,153 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include "testing/cts/sdk/wvpl_sdk.h" + +#include +#include + +#include "google/chrome/widevine/licensedata/v1/content_key_spec.pb.h" +#include "absl/log/log.h" +#include "absl/status/status.h" +#include "sdk/external/cpp/wvpl/common/wvpl_types.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_environment.h" +#include "sdk/external/cpp/wvpl/license_server_sdk/wvpl_session.h" +#include "testing/cts/env/wvpl_env.h" +#include "protos/public/license_protocol.pb.h" +#include "protos/public/license_protos.pb.h" +#include "protos/public/license_services.pb.h" + +namespace video_widevine { +namespace wvpl_sdk { + +using video_widevine_server::wv_pl_sdk::WvPLEnvironment; +using video_widevine_server::wv_pl_sdk::WvPLKey; +using video_widevine_server::wv_pl_sdk::WvPLPlaybackPolicy; +using video_widevine_server::wv_pl_sdk::WvPLRequestType; +using video_widevine_server::wv_pl_sdk::WvPLSession; +using video_widevine_server::wv_pl_sdk::WvPLStatus; +using video_widevine_server::wv_pl_sdk::WvPLWidevinePsshData; + +video_widevine_server::wv_pl_sdk::TrackType get_track_type( + std::string track_type) { + if (track_type == "SD") { + return video_widevine_server::wv_pl_sdk::VIDEO_SD; + } else if (track_type == "HD") { + return video_widevine_server::wv_pl_sdk::VIDEO_HD; + } else if (track_type == "UHD1") { + return video_widevine_server::wv_pl_sdk::VIDEO_UHD1; + } else if (track_type == "UHD2") { + return video_widevine_server::wv_pl_sdk::VIDEO_UHD2; + } else if (track_type == "AUDIO") { + return video_widevine_server::wv_pl_sdk::AUDIO; + } else { + return video_widevine_server::wv_pl_sdk::TRACK_TYPE_UNSPECIFIED; + } +} + +bool add_keys_to_session(WvPLSession& session, std::vector wvpl_keys) { + for (const WvPLKey& wvpl_key : wvpl_keys) { + WvPLStatus status = session.AddKey(wvpl_key); + if (!status.ok()) { + return false; + } + } + return true; +} + +std::vector create_wvpl_keys_from_content_key_specs( + ModularDrmLicenseRequest drmRequest, WvPLWidevinePsshData _wv_pssh_data, + bool is_external_license_request) { + std::vector wvpl_keys; + + for (int i = 0; i < drmRequest.content_key_specs_size(); i++) { + WvPLKey wvpl_key; + const auto& content_key_spec = drmRequest.content_key_specs(i); + wvpl_key.set_key_id(content_key_spec.key_id()); + wvpl_key.set_key_bytes(content_key_spec.key()); + wvpl_key.set_key_type( + static_cast( + content_key_spec.key_type())); + wvpl_key.set_track_type(get_track_type(content_key_spec.track_type())); + wvpl_keys.push_back(wvpl_key); + } + return wvpl_keys; +} + +// TODO: b/323916039 - Setup handler for /drmRequest +absl::StatusOr HandleDrmLicenseRequest(std::string requestString) { + ModularDrmLicenseRequest drmRequest; + if (!drmRequest.ParseFromString(requestString)) { + return ""; + } + std::string license_request_payload = drmRequest.payload(); + std::string response = ""; + WvPLSession* session; + auto wvpl_env_instance = + video_widevine::cts::wvpl_env::WvplEnv::GetInstance(); + WvPLEnvironment* wvpl_env = wvpl_env_instance->get_env(); + WvPLStatus status = + wvpl_env->CreateSession(license_request_payload, &session); + if (!status.ok()) { + return absl::InternalError("Failed to create session: " + + status.error_message()); + } else { + } + WvPLRequestType request_type = session->GetRequestType(); + video_widevine::LicenseRequest license_request = session->request(); + video_widevine::LicenseRequest::RequestType license_request_type = + license_request.type(); + video_widevine_server::wv_pl_sdk::MessageType message_type = + request_type.message_type(); + bool should_add_keys = false; + bool external_license_request = false; + switch (message_type) { + case SignedMessage::LICENSE_REQUEST: + if (license_request_type == video_widevine::LicenseRequest::NEW) { + should_add_keys = true; + } + break; + case SignedMessage::EXTERNAL_LICENSE_REQUEST: + should_add_keys = true; + external_license_request = true; + break; + case video_widevine_server::wv_pl_sdk::UNKNOWN: + case video_widevine_server::wv_pl_sdk::SERVICE_CERTIFICATE_REQUEST: + break; + } + WvPLWidevinePsshData wv_pssh_data; + status = session->GetPsshData(&wv_pssh_data); + if (!status.ok()) { + return absl::InternalError("Failed to get pssh data: " + + status.error_message()); + } + + if (should_add_keys) { + std::vector wvpl_keys = create_wvpl_keys_from_content_key_specs( + drmRequest, wv_pssh_data, external_license_request); + bool keys_added = add_keys_to_session(*session, wvpl_keys); + if (!keys_added) { + return absl::InternalError("Failed to add keys"); + } + } + License::Policy license_policy = drmRequest.policy_overrides(); + WvPLPlaybackPolicy wvpl_playback_policy; + wvpl_playback_policy.set_license_duration_seconds( + license_policy.license_duration_seconds()); + session->set_policy(wvpl_playback_policy); + status = session->GenerateLicense(&response); + if (!status.ok()) { + // TODO: b/329230518 - Sometimes error message is empty, needs investigation + return absl::InternalError("Failed to generate license: " + + status.error_message()); + } else { + } + return response; +} +} // namespace wvpl_sdk +} // namespace video_widevine diff --git a/centos/tools/src/testing/cts/sdk/wvpl_sdk.h b/centos/tools/src/testing/cts/sdk/wvpl_sdk.h new file mode 100644 index 0000000..7431086 --- /dev/null +++ b/centos/tools/src/testing/cts/sdk/wvpl_sdk.h @@ -0,0 +1,23 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_TESTING_CTS_SDK_WVPL_SDK_H_ +#define VIDEO_WIDEVINE_EXPORT_TESTING_CTS_SDK_WVPL_SDK_H_ + +#include + +#include "absl/status/statusor.h" + +namespace video_widevine { +namespace wvpl_sdk { + +absl::StatusOr HandleDrmLicenseRequest(std::string requestString); +} +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_TESTING_CTS_SDK_WVPL_SDK_H_ diff --git a/centos/tools/src/testing/cts/server/BUILD b/centos/tools/src/testing/cts/server/BUILD new file mode 100644 index 0000000..e439b4b --- /dev/null +++ b/centos/tools/src/testing/cts/server/BUILD @@ -0,0 +1,64 @@ +######################################## +## Copyright 2024 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +# Binary to run cts wvpl server + +load("//tools/build_defs/pkg:google.bzl", "pkg_binary_with_runfiles") + +cc_binary( + name = "test_server", + srcs = ["test_server.cc"], + deps = [ + "//base", + "//chubby/lib/public:lockservice", + "//net/eventmanager", + "//net/eventmanager:eventmanager_utils", + "//net/grpc:grpc++", + "//net/http:httpserverrequest", + "//net/http2/server/lib/public:server", + "//net/rpc", + + "@abseil_repo//absl/functional:bind_front", + "@abseil_repo//absl/log", + "@abseil_repo//absl/log:check", + "//third_party/grpc", + "//third_party/grpc:grpc++", + "//thread", + "//util:error_space", + "//sdk/external/cpp/wvpl/common:wvpl_types", + "//sdk/external/cpp/wvpl/license_server_sdk:wvpl_environment", + "//testing/cts/env:wvpl_env", + "//testing/cts/sdk:wvpl_sdk", + "//webutil/http", + ], +) + +pkg_binary_with_runfiles( + name = "test_server_with_runfiles", + binary = ":test_server", +) + +genmpm( + # Name of the rule, as usual. + name = "test_server_temporal_mpm", + # List of files to include in the package. + srcs = [":test_server"], + # Temporal MPM option. This allows us to use this target with `blaze_label` + # in the .borg file, as explained below. + temporal = True, +) + +genmpm( + name = "test_server_mpm", + # MPM package name. + package_name = "testing/cts/server/test_server", + # List of files to include in the package. + deps = [ + ":test_server_with_runfiles", + ], +) diff --git a/centos/tools/src/testing/cts/server/README.md b/centos/tools/src/testing/cts/server/README.md new file mode 100644 index 0000000..b0837c5 --- /dev/null +++ b/centos/tools/src/testing/cts/server/README.md @@ -0,0 +1,79 @@ +# CTS server setup + +The CTS server setup directory contains the cc_binary needed to build and run +the CTS server. Instructions on how to build this binary locally are below. + +[TOC] + +## Get cts resources + +Resource files are the ones from jts_resources, currently only using the ones +needed for server startup. To get the resource files run the following from this +directory (cts/server):\ +`mkdir cts_resources`\ +`gsutil -m cp -r gs://blockbuster/jts_resources/* ./cts_resources` + +only resources being used currently are: +* cert_staging_google_com.der +* private_key_staging_google_com.der + +## Setup service account locally + +Important: +**do not upload the service account json file,** +**it is only to be used locally.** + +Download the service account json from the jts google cloud server. +Copy file locally to following location: +`testing/cts/published_devices/service_acc_cred.json`\ +JSON cred file must be this exact name/path as this is specified in the `BUILD` +file for +the server. + +Run the following command to setup google default creds:\ +`export GOOGLE_APPLICATION_CREDENTIALS=testing/cts/common/cts_resources/dcsl-google.com_blockbuster-1154-5f30025abf26.json` + +## Run server + +Running the server: \ +`blaze run //testing/cts/server:test_server -- --logtostderr +--port=10000` + +Another option to run server if logs are very long: \ +`blaze run //testing/cts/server:test_server > +cts_error_log.txt -- --port=10000` + +## Run server on borg local + +build your web server and mpm package:\ +``` +blaze mpm -c opt testing/cts/server:test_server_mpm +``` + +check versions, latest one is at bottom\ +``` +mpm packageinfo --show_version_map testing/cts/server/test_server +``` + +run following with the latest package version (or whichever you want)\ +``` +PACKAGE_VERSION_ID=1-1ae53a0e_03cacc13_1f05d096_3052174c_28367faa +``` + +set live label\ +``` +mpm setlabel testing/cts/server/test_server --label=live --version=$PACKAGE_VERSION_ID +``` + +start up borg\ +``` +borgcfg production/borg/widevine/templates/dev/cts_wvpl.borg --borguser=nihardamar --user=nihardamar up +``` + +shut down borg job\ +``` +borgcfg production/borg/widevine/templates/dev/cts_wvpl.borg --borguser=nihardamar --user=nihardamar down +``` + +Url to look up borg job\ +http://sigma diff --git a/centos/tools/src/testing/cts/server/test_server.cc b/centos/tools/src/testing/cts/server/test_server.cc new file mode 100644 index 0000000..e3c9579 --- /dev/null +++ b/centos/tools/src/testing/cts/server/test_server.cc @@ -0,0 +1,82 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2024 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#include +#include +#include +#include + +#include "base/init_google.h" +#include "net/eventmanager/eventmanager.h" +#include "net/eventmanager/eventmanager_utils.h" +#include "net/http/httpserverrequest.h" +#include "net/http2/server/lib/public/httpserver2.h" +#include "absl/flags/flag.h" +#include "absl/functional/bind_front.h" +#include "absl/log/check.h" +#include "absl/log/log.h" +#include "testing/cts/env/wvpl_env.h" +#include "testing/cts/sdk/wvpl_sdk.h" +#include "webutil/http/httpresponse.h" + +using net_http2::HTTPServer2; +using video_widevine::wvpl_sdk::HandleDrmLicenseRequest; + +ABSL_FLAG(int32_t, port, 10000, "Port for incoming HTTP requests"); +ABSL_FLAG(int32_t, worker_threads, 10, "Number of worker threads"); + +void SDKHandler(HTTPServerRequest* req) { + req->output()->WriteString("Hello world"); + req->Reply(); +} + +// TODO: b/323916039 - Setup handlers to response to endpoints for SDK +void drmRequestHandler(HTTPServerRequest* req) { + std::string requestString = req->input()->ToString(); + absl::StatusOr response = HandleDrmLicenseRequest(requestString); + if (!response.ok()) { + req->output()->WriteString(response.status().ToString()); + req->ReplyWithStatus(HTTPResponse::RC_BAD_REQUEST); + return; + } + + req->output()->WriteString(response.value()); + req->Reply(); +} + +int main(int argc, char** argv) { + InitGoogle(argv[0], &argc, &argv, true); + + auto wvpl_env = video_widevine::cts::wvpl_env::WvplEnv::GetInstance(); + if (wvpl_env->env_setup_failed()) { + return 1; + } else { + } + + // Configure the options for your server + auto options = absl::make_unique(); + options->SetVersion("Example HTTPServer2 (non-blocking)"); + options->SetServerType("test_server"); + options->AddPort(absl::GetFlag(FLAGS_port)); // Create the HTTPServer2 + + eventmanager::GenericEventManagerOptions eventOptions; + eventOptions.num_threads_hint = absl::GetFlag(FLAGS_worker_threads); + auto eventManager = eventmanager::NewEventManager(eventOptions); + eventmanager::EventManagerInterface* eventManagerPtr = eventManager.get(); + + std::unique_ptr server = + HTTPServer2::CreateEventDrivenModeServer(eventManagerPtr, + std::move(options)) + .value(); + server->RegisterHandler("/", absl::bind_front(SDKHandler)); + server->RegisterHandler("/drmRequest", absl::bind_front(drmRequestHandler)); + + CHECK_OK(server->StartAcceptingRequests()); + server->WaitForTermination(); + return 0; +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/BUILD b/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/BUILD new file mode 100644 index 0000000..45bb88b --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/BUILD @@ -0,0 +1,44 @@ +######################################## +## Copyright 2019 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## +# Desciption: +# JTS http clients. + +load("@rules_java//java:defs.bzl", "java_library") + +package( + default_visibility = ["//visibility:public"], +) + +java_library( + name = "httpclient", + srcs = glob( + ["*.java"], + exclude = [ + "CdmHttpClient.java", + ], + ), + deps = [ + "@google_api//:com_google_api_client_google_api_client", + "@google_guice//:com_google_inject_guice", + "@google_http_client//:com_google_http_client_google_http_client", + "@google_http_client_gson//:com_google_http_client_google_http_client_gson", + "@google_oauth2//:com_google_oauth_client_google_oauth_client", + "@jackson_core//:com_fasterxml_jackson_core_jackson_core", + "@json//:org_json_json", + ], +) + +java_library( + name = "cdm_http_client", + srcs = ["CdmHttpClient.java"], + deps = [ + "//java/com/google/chubby/svelte:bns_resolver", + "//java/com/google/io/base", + "//java/com/google/net/httpclient", + ], +) diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/Credentials.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/Credentials.java new file mode 100644 index 0000000..50a26b7 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/httpclient/Credentials.java @@ -0,0 +1,62 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2019 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.httpclient; + +import com.google.api.client.googleapis.auth.oauth2.GoogleCredential; +import java.io.FileInputStream; +import java.io.IOException; +import java.util.Arrays; +import java.util.List; +import java.util.logging.Level; +import java.util.logging.Logger; + +/** + * JTS Cloud Credentials. + * + * Provides Oauth2 authentication, and access/refresh tokens. + */ +public class Credentials { + + private static final List SCOPES = Arrays.asList( + "https://www.googleapis.com/auth/cloud-platform", + "https://www.googleapis.com/auth/widevine/frontend"); + private static final int MIN_ACCESS_TOKEN_REFRESH_SEC = 1200; + private static final Logger logger = Logger.getLogger(Credentials.class.getName()); + + private String credentialsJsonFile = null; + private GoogleCredential googleCredential = null; + private String accessToken = null; + + /** + * Credentials Constructor. + * + * @param credentialsJsonFile The full path to a GCP service account json credentials file. + */ + public Credentials(String credentialsJsonFile) throws IOException { + this.credentialsJsonFile = credentialsJsonFile; + activateGoogleCredentials(); + } + + private void activateGoogleCredentials() throws IOException { + googleCredential = GoogleCredential + .fromStream(new FileInputStream(credentialsJsonFile)) + .createScoped(SCOPES); + googleCredential.refreshToken(); + } + + /** Provides an Oauth2 Access Token that can be used to make GCP service calls.*/ + public String getAccessToken() throws IOException { + if (accessToken == null + || googleCredential.getExpiresInSeconds() <= MIN_ACCESS_TOKEN_REFRESH_SEC) { + googleCredential.refreshToken(); + accessToken = googleCredential.getAccessToken(); + logger.log(Level.INFO, "Getting new access token."); + } + return accessToken; + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/BUILD b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/BUILD new file mode 100644 index 0000000..c01461d --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/BUILD @@ -0,0 +1,27 @@ +######################################## +## Copyright 2018 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## +# Desciption: +# JTS interfaces. + +load("@rules_java//java:defs.bzl", "java_library") + +package( + default_visibility = ["//visibility:public"], +) + +java_library( + name = "interfaces", + srcs = glob(["*.java"]), + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:device_security_profiles_java_proto", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_java_proto", + "@com_google_protobuf//:protobuf_java", + "@apache_httpcore//:org_apache_httpcomponents_httpcore", + "//protos/public:license_protocol_java_proto", + ], +) diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceCertificate.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceCertificate.java new file mode 100644 index 0000000..ee25ac9 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceCertificate.java @@ -0,0 +1,24 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2019 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevices; + +/** + * DeviceCertificate defines APIs for getting PublishedDevices and Published Devices list. + */ +public interface DeviceCertificate { + + /** + * Get the latest {@code PublishedDevices} containing Published Devices list data. + * + * @return {@code PublishedDevices} containing Published Devices list data. + */ + public PublishedDevices getPublishedDevices() throws Exception; + +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceSecurityProfile.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceSecurityProfile.java new file mode 100644 index 0000000..91f2b58 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/DeviceSecurityProfile.java @@ -0,0 +1,22 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +import com.google.chrome.widevine.contentpartners.v1beta1.SignedDeviceSecurityProfiles; + +/** DeviceSecurityProfile defines APIs for getting Signed Device Security Profile list. */ +public interface DeviceSecurityProfile { + + /** + * Get the latest {@code SignedDeviceSecurityProfiles} containing Device Security Profile list + * data. + * + * @return {@code SignedDeviceSecurityProfiles} containing Device Security Profile list data. + */ + public SignedDeviceSecurityProfiles getSignedDeviceSecurityProfiles() throws Exception; +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/IndividualDeviceRevocationList.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/IndividualDeviceRevocationList.java new file mode 100644 index 0000000..1f36204 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/IndividualDeviceRevocationList.java @@ -0,0 +1,21 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2023 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +/** + * IndividualDeviceRevocationList defines APIs for getting Individual Device Revocation List (IDRL). + */ +public interface IndividualDeviceRevocationList { + + /** + * Get the latest Individual Device Revocation List data. + * + * @return Individual Device Revocation List data. + */ + public byte[] getIndividualDeviceRevocationList() throws Exception; +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/KeyProviderInterface.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/KeyProviderInterface.java new file mode 100644 index 0000000..b46fac5 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/KeyProviderInterface.java @@ -0,0 +1,54 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +import com.google.protobuf.ByteString; +import com.google.video.widevine.protos.LicenseProtocol.License.KeyContainer; +import java.util.List; + +/** An interface to be implemented by a Key provider. */ +public interface KeyProviderInterface { + /** + * Gets a list of KeyContainers for the specified content Id. + * + * @param contentId The content Id that uniquely identifies the video. + * Cannot be used in conjunction with keyIds. + * See http://google3/protos/public/widevine_pssh.proto + * @return A List of KeyContainer protos if the content is found, else null. + */ + public List getKeys(String contentId); + + /** + * Gets a list of KeyContainers for the specified key Ids. + * @param keyIds The key Ids to apply to a video's license. + * Cannot be used in conjunction with contentId. + * See http://google3/protos/public/widevine_pssh.proto + * @return A List of KeyContainer protos if the key IDs are found, else null. + */ + public List getKeys(List keyIds); + + /** + * Gets a list of KeyContainers for the specified List of DSP names. + * @param dspNames The DSP names to fetch associated KeyContainers. + * @return A List of KeyContainer protos if the DSPs are found, else returns empty List + * if no DSPs found. + */ + public List getKeysFromDsp(List dspNames); + + /** + * Gets a profile name that is associated with the keyId and contentOwner. + * + * @param keyId The key Ids to apply to a video's license. + * @param contentOwner The content owner of the key. + * @return A profile name if the keyId and contentOwner are found, else returns empty string. + */ + public String getRequiredDspProfileForKeyId(String keyId, String contentOwner); + + /** Returns the owner of the DSP. */ + public String getOwnerForDsp(); +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/LicenseInterface.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/LicenseInterface.java new file mode 100644 index 0000000..d26fbb7 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/LicenseInterface.java @@ -0,0 +1,56 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +import org.apache.http.HttpException; + +/** + * LicenseInterface defines the API that a license-based SDK must implement. + * + *

    The {@link LicenseRequestAction} receives all incoming license requests and dispatches them to + * the appropriate licensing service SDK implementation for processing. This interface defines the + * API that each SDK implementation must provide in order for requests to be properly handled. + */ +public interface LicenseInterface { + + /** + * Handles an incoming license request and returns the license response. + * + * @param requestBody The incoming body of the license request. + * @param policyId Optional. A custom policy ID to use if specified, else null. + * @param renewalPolicyId Optional. A custom renewal policy ID to use if specified, else null. + * @param requestId A unique request id used to track, or collect stats on, a specific request, or + * series of requests. + * @param useDsp Set {@code true} to process license using Device Security Profiles (DSP). + * @param useFilterKey Set {@code true} to using filterKey() to insert keys in license request. + * @return The license response to be returned to the client as a byte[]. + */ + public byte[] handleLicenseRequest( + byte[] requestBody, + String policyId, + String renewalPolicyId, + String requestId, + boolean useDsp, + boolean useFilterKey, + StringBuilder sessionUsageBuilder) + throws HttpException; + + /** Handles returning status info about a running SDK. */ + public byte[] getSdkStatus(); + + /** + * Handles an incoming DrmLicenseRequest and returns the license response. + * + * @param requestBody The incoming body of the ModularDrmLicenseRequest or CasDrmLicenseRequest. + * @param useDsp Set {@code true} to process license using Device Security Profiles (DSP). + * @param useFilterKey Set {@code true} to using filterKey() to insert keys in license request. + * @return The license response to be returned to the client as a byte[]. + */ + public byte[] handleDrmLicenseRequest(byte[] requestBody, boolean useDsp, boolean useFilterKey) + throws HttpException; +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/PolicyProviderInterface.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/PolicyProviderInterface.java new file mode 100644 index 0000000..7326f55 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/interfaces/PolicyProviderInterface.java @@ -0,0 +1,48 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2018 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.interfaces; + +import com.google.video.widevine.protos.LicenseProtocol.License.Policy; + +// TODO(march): Move back to /j/c/g/v/w/testing/sdk/interfaces once b/79438055 is fixed. + +/** An interface to be implemented by a Policy provider. */ +public interface PolicyProviderInterface { + /** + * Gets a Policy for the specified policy ID. + * + * @param policyId The ID of the policy to retrieve. + * @return A Policy proto if the policy is found, else null. + */ + public Policy getPolicy(String policyId); + + /** + * Gets a policy id for the specified content id. + * + * @param contentId The id of the content to retrieve. + * @return The policy id if the content is found and has a policy, else null. + */ + public String getPolicyIdForContentId(String contentId); + + /** + * Gets a Provider Session Token (PST) for the specified content id. + * + * @param contentId The id of the content to retrieve. + * @return The PST token if the content is found and has uses one. + */ + public String getProviderSessionToken(String contentId); + + /** + * Sets a Policy for the specified policy ID. + * + * @param policyId The ID of the policy to set. + * @param policy A proto defining the policy details. + * @return A boolean indicating whether the policy was successfully set. + */ + public Boolean setPolicy(String policyId, Policy policy); +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/BUILD b/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/BUILD new file mode 100644 index 0000000..17fe7a7 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/BUILD @@ -0,0 +1,72 @@ +######################################## +## Copyright 2018 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## +# Description: +# JTS interfaces. + +load("@rules_java//java:defs.bzl", "java_library") + +package( + default_visibility = ["//visibility:public"], +) + +java_library( + name = "providers", + srcs = glob(["*.java"]), + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:device_security_profiles_java_proto", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_grpc", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_java_proto", + "//google/chrome/widevine/frauddetection/v1eap1:fraud_detection_and_reporting_grpc", + "//google/chrome/widevine/frauddetection/v1eap1:fraud_detection_and_reporting_service_java_proto", + "//protos/public:device_certificate_status_java_proto", + "//protos/public:license_protocol_java_proto", + "//protos/public:sdk_license_data_config_java_proto", + "//protos/public:widevine_pssh_java_proto", + ":libwidevine_license_wvpl_sdk_lib.jar", + "//testing/java/com/google/video/widevine/jts/common", + "//testing/java/com/google/video/widevine/jts/httpclient", + "//testing/java/com/google/video/widevine/jts/interfaces", + "@com_google_protobuf//:protobuf_java", + "@com_google_protobuf//:timestamp_proto", + "@google_guava//:com_google_guava_guava", + "@google_guice//:com_google_inject_guice", + "@io_grpc_grpc_java//api", + "@io_grpc_grpc_java//netty", + "@io_grpc_grpc_java//stub", + "@json//:org_json_json", + "@maven//:com_google_api_grpc_proto_google_common_protos", + "@maven//:com_google_code_findbugs_jsr305", + "@maven//:com_google_code_gson_gson", + ], +) + +java_library( + name = "providers_tools", + srcs = [ + "PublishedDevicesProvider.java", + ], + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:device_security_profiles_java_proto", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_grpc", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_java_proto", + "//google/chrome/widevine/frauddetection/v1eap1:fraud_detection_and_reporting_grpc", + "//google/chrome/widevine/frauddetection/v1eap1:fraud_detection_and_reporting_service_java_proto", + "//protos/public:device_certificate_status_java_proto", + ":libwidevine_license_wvpl_sdk_lib.jar", + "//testing/java/com/google/video/widevine/jts/httpclient", + "//testing/java/com/google/video/widevine/jts/interfaces", + "@com_google_protobuf//:protobuf_java", + "@com_google_protobuf//:timestamp_proto", + "@google_guava//:com_google_guava_guava", + "@google_guice//:com_google_inject_guice", + "@io_grpc_grpc_java//api", + "@io_grpc_grpc_java//netty", + "@io_grpc_grpc_java//stub", + "@maven//:com_google_code_findbugs_jsr305", + ], +) diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/PublishedDevicesProvider.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/PublishedDevicesProvider.java new file mode 100644 index 0000000..dbcd7da --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/providers/PublishedDevicesProvider.java @@ -0,0 +1,339 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +package com.google.video.widevine.jts.providers; + +import static java.util.concurrent.TimeUnit.SECONDS; + +import com.google.chrome.widevine.contentpartners.v1beta1.DcslSnapshotType; +import com.google.chrome.widevine.contentpartners.v1beta1.DeviceSecurityProfileCriteria; +import com.google.chrome.widevine.contentpartners.v1beta1.ListDeviceSecurityProfilesRequest; +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevices; +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevicesRequest; +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevicesServiceGrpc; +import com.google.chrome.widevine.contentpartners.v1beta1.RetrieveIndividualDeviceRevocationListRequest; +import com.google.chrome.widevine.contentpartners.v1beta1.RetrieveIndividualDeviceRevocationListResponse; +import com.google.chrome.widevine.contentpartners.v1beta1.SignedDeviceSecurityProfiles; +import com.google.chrome.widevine.frauddetection.v1eap1.FraudDetectionAndReportingServiceGrpc; +import com.google.chrome.widevine.frauddetection.v1eap1.FraudLevel; +import com.google.chrome.widevine.frauddetection.v1eap1.LicenseRequestInfo; +import com.google.chrome.widevine.frauddetection.v1eap1.LicenseRequestInfo.RequestMetadata; +import com.google.chrome.widevine.frauddetection.v1eap1.ReportFraudLevelRequest; +import com.google.chrome.widevine.frauddetection.v1eap1.ReportFraudLevelResponse; +import com.google.common.base.Ascii; +import com.google.inject.Inject; +import com.google.protobuf.ByteString; +import com.google.protobuf.ExtensionRegistry; +import com.google.protobuf.TextFormat; +import com.google.protobuf.Timestamp; +import com.google.video.widevine.jts.httpclient.Credentials; +import com.google.video.widevine.jts.interfaces.DeviceCertificate; +import com.google.video.widevine.jts.interfaces.DeviceSecurityProfile; +import com.google.video.widevine.jts.interfaces.IndividualDeviceRevocationList; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.DeviceCertificateStatusList; +import com.google.video.widevine.sdk.wvpl.WvPLBaseEnvironment; +import com.google.video.widevine.sdk.wvpl.WvPLStatusException; +import io.grpc.ManagedChannel; +import io.grpc.Metadata; +import io.grpc.netty.NettyChannelBuilder; +import io.grpc.stub.MetadataUtils; +import java.io.IOException; +import java.time.Instant; +import java.time.ZoneOffset; +import java.time.format.DateTimeFormatter; +import java.util.Base64; +import java.util.logging.Level; +import java.util.logging.Logger; +import javax.annotation.Nullable; + +/** + * Provides the latest {@code PublishedDevices} or {@code SignedDeviceSecurityProfiles} data from + * the Widevine Published Devices Service. + * + *

    This implementation uses the Widevine Published Devices API, and support a gRPC method for + * retrieving PublishedDevices with an embedded Published Devices list, or Device Security Profiles + * list. + */ +public class PublishedDevicesProvider + implements DeviceCertificate, DeviceSecurityProfile, IndividualDeviceRevocationList { + private static final Logger logger = Logger.getLogger(PublishedDevicesProvider.class.getName()); + private WvPLBaseEnvironment environment = null; + private String apiServicePath = null; + private Credentials credentials = null; + private String provider = null; + private boolean includeImpactAnalysis = false; + private Integer lastDcslEpochTime = null; + private String dcslType = null; + private static final String FRAUDULENT_API_SERVICE_PATH = "widevinefrauddetection.googleapis.com"; + + /** + * PublishedDevicesProvider constructor. + * + * @param environment A WvPLBaseEnvironment object initialized with a Service Certificate. + * @param serviceAccountPath Path to a GCP Service Account json file, used in OAUTH. + * @param apiServicePath Path to a Widevine Published Devices API service. + * @param provider Provider name, necessary for creating ListDSP request. It could be null if it + * is not used by dsps. + * @param includeImpactAnalysis Includes impact analysis in published devices response based on + * flag value. It can be false if caller doesn't care about impact analysis data from + * published devices. + * @param lastDcslEpochTime Timestamp that helps to calculate the DCSL impact analysis from a DCSL + * snapshot at last_dcsl_epoch_time to the latest DCSL snapshot. It can be set to null if + * caller doesn't care about impact analysis data from published devices. + * @throws IOException upon failure creating OAUTH credentials. + */ + @Inject + public PublishedDevicesProvider( + WvPLBaseEnvironment environment, + String serviceAccountPath, + String apiServicePath, + @Nullable String provider, + boolean includeImpactAnalysis, + Integer lastDcslEpochTime, + String dcslType) + throws IOException { + this.environment = environment; + this.apiServicePath = apiServicePath; + credentials = new Credentials(serviceAccountPath); + this.provider = provider; + this.includeImpactAnalysis = includeImpactAnalysis; + this.lastDcslEpochTime = lastDcslEpochTime; + this.dcslType = dcslType; + } + + /** + * Get the latest {@code PublishedDevices} from the Widevine Published Devices Service. + * + * @return The latest {@code PublishedDevices} data. + * @throws InterruptedException upon RPC failure. + * @throws WvPLStatusException upon WvPLBaseEnvironment errors. + */ + @Override + public PublishedDevices getPublishedDevices() throws InterruptedException, WvPLStatusException { + ManagedChannel channel = null; + PublishedDevices devicesResponse = null; + + logger.log(Level.INFO, "Getting PublishedDevices..."); + try { + channel = createRpcChannel(apiServicePath); + PublishedDevicesServiceGrpc.PublishedDevicesServiceBlockingStub blockingStub = + createBlockingStub(channel); + PublishedDevicesRequest publishedDevicesRequest = + PublishedDevicesRequest.parseFrom( + environment.generateDeviceStatusListRequest(), ExtensionRegistry.getEmptyRegistry()); + PublishedDevicesRequest.Builder updatedPublishedDevicesRequestBuilder = + publishedDevicesRequest.toBuilder().setIncludeImpactAnalysis(includeImpactAnalysis); + if (lastDcslEpochTime != null) { + updatedPublishedDevicesRequestBuilder.setLastDcslEpochTime( + Timestamp.newBuilder().setSeconds(lastDcslEpochTime).build()); + } + updatedPublishedDevicesRequestBuilder.setDcslSnapshotType(getDcslSnapshotType(dcslType)); + devicesResponse = + blockingStub.getPublishedDevices(updatedPublishedDevicesRequestBuilder.build()); + String truncatedLogString = TextFormat.printer().printToString(devicesResponse); + int tenLines = 800; + if (truncatedLogString.length() > tenLines) { + truncatedLogString = truncatedLogString.substring(0, tenLines) + "..."; + } + logger.log( + Level.INFO, + "GRPC Call to PublishedDevicesService.GetPublishedDevices returned:\n" + + truncatedLogString); + + DeviceCertificateStatusList dcsl = + DeviceCertificateStatusList.parseFrom( + devicesResponse.getPublishedDevices(), ExtensionRegistry.getEmptyRegistry()); + logger.log( + Level.INFO, + "Impact analysis count in response from PublishedDevicesService.GetPublishedDevices is:\n" + + dcsl.getImpactAnalysisReport().getImpactAnalysisCount()); + logger.log( + Level.INFO, + "DCSL type in response from PublishedDevicesService.GetPublishedDevices is:\n" + + devicesResponse.getDcslSnapshotType()); + logger.log( + Level.INFO, + "DCSL snapshot creation time in response from" + + " PublishedDevicesService.GetPublishedDevices is: " + + dcsl.getCreationTimeSeconds() + + " in UTC time is :\n" + + Instant.ofEpochSecond(dcsl.getCreationTimeSeconds()) + .atZone(ZoneOffset.UTC) + .toLocalDateTime() + .format(DateTimeFormatter.ofPattern("yyyy-MM-dd HH:mm:ss"))); + } catch (IOException e) { + logger.log(Level.INFO, "IOException encountered trying to retrieve the signed list: " + e); + } finally { + closeRpcChannel(channel); + } + return devicesResponse; + } + + @Override + public SignedDeviceSecurityProfiles getSignedDeviceSecurityProfiles() + throws InterruptedException, WvPLStatusException { + // Generate list dsp request. + ListDeviceSecurityProfilesRequest listDspRequest = + ListDeviceSecurityProfilesRequest.newBuilder() + .setDeviceSecurityProfileCriteria( + DeviceSecurityProfileCriteria.newBuilder() + .setContentProvider(this.provider) + .build()) + .build(); + + ManagedChannel channel = null; + SignedDeviceSecurityProfiles signedMessageInResponse = null; + + logger.log(Level.INFO, "Getting DeviceSecurityProfilesList..."); + try { + channel = createRpcChannel(apiServicePath); + PublishedDevicesServiceGrpc.PublishedDevicesServiceBlockingStub blockingStub = + createBlockingStub(channel); + + signedMessageInResponse = + blockingStub.listDeviceSecurityProfiles(listDspRequest).getSignedDeviceSecurityProfiles(); + logger.log( + Level.INFO, + "GRPC Call to PublishedDevicesService.ListDeviceSecurityProfiles returned:\n" + + TextFormat.printer().printToString(signedMessageInResponse)); + } catch (IOException e) { + logger.log( + Level.INFO, "IOException encountered trying to retrieve the signed dsp list: " + e); + } finally { + closeRpcChannel(channel); + } + return signedMessageInResponse; + } + + @Override + public byte[] getIndividualDeviceRevocationList() throws InterruptedException { + ManagedChannel channel = null; + RetrieveIndividualDeviceRevocationListResponse response = null; + logger.log(Level.INFO, "Getting IndividualDeviceRevocationList..."); + try { + channel = createRpcChannel(apiServicePath); + PublishedDevicesServiceGrpc.PublishedDevicesServiceBlockingStub blockingStub = + createBlockingStub(channel); + RetrieveIndividualDeviceRevocationListRequest request = + RetrieveIndividualDeviceRevocationListRequest.newBuilder() + .setProvider(this.provider) + .build(); + response = blockingStub.retrieveIndividualDeviceRevocationList(request); + logger.log( + Level.INFO, + "GRPC Call to PublishedDevicesService.retrieveIndividualDeviceRevocationList returned:\n" + + TextFormat.printer().printToString(response)); + } catch (IOException e) { + logger.log(Level.INFO, "IOException encountered trying to retrieve the IDRL: " + e); + } finally { + closeRpcChannel(channel); + } + return response.toByteArray(); + } + + public byte[] reportFraudulentDevice( + String licenseRequest, + @Nullable String clearClientId, + @Nullable String userAgent, + @Nullable String reason, + FraudLevel.FraudScore fraudScore) + throws InterruptedException, IOException { + ReportFraudLevelRequest request = + createReportFraudLevelRequest( + this.provider, licenseRequest, clearClientId, userAgent, reason, fraudScore); + ManagedChannel channel = createRpcChannel(FRAUDULENT_API_SERVICE_PATH); + try { + return reportFraudulentDeviceWithChannel(channel, request); + } finally { + closeRpcChannel(channel); + } + } + + // Construct the ReportFraudLevelRequest. + static ReportFraudLevelRequest createReportFraudLevelRequest( + String provider, + String licenseRequest, + @Nullable String clearClientId, + @Nullable String userAgent, + @Nullable String reason, + FraudLevel.FraudScore fraudScore) { + RequestMetadata.Builder requestMetadata = RequestMetadata.newBuilder().setProvider(provider); + if (userAgent != null) { + requestMetadata.setUserAgent(userAgent); + } + LicenseRequestInfo.Builder licenseRequestInfo = + LicenseRequestInfo.newBuilder() + .setRequestMetadata(requestMetadata.build()) + .setLicenseRequest(ByteString.copyFrom(Base64.getDecoder().decode(licenseRequest))); + if (clearClientId != null) { + licenseRequestInfo.setClearClientId( + ByteString.copyFrom(Base64.getDecoder().decode(clearClientId))); + } + ReportFraudLevelRequest.Builder request = + ReportFraudLevelRequest.newBuilder() + .setFraudLevel(FraudLevel.newBuilder().setFraudScore(fraudScore)) + .setLicenseRequestInfo(licenseRequestInfo.build()); + if (reason != null) { + request.setReason(reason); + } + return request.build(); + } + + private byte[] reportFraudulentDeviceWithChannel( + ManagedChannel channel, ReportFraudLevelRequest request) throws IOException { + logger.log(Level.INFO, "Reporting fraudulent device..."); + FraudDetectionAndReportingServiceGrpc.FraudDetectionAndReportingServiceBlockingStub + blockingStub = + FraudDetectionAndReportingServiceGrpc.newBlockingStub(channel) + .withInterceptors(MetadataUtils.newAttachHeadersInterceptor(createMetadata())); + ReportFraudLevelResponse response = blockingStub.reportFraudLevel(request); + logger.log( + Level.INFO, + "GRPC Call to report fraud returned:\n" + TextFormat.printer().printToString(response)); + return response.toByteArray(); + } + + private static ManagedChannel createRpcChannel(String host) { + return NettyChannelBuilder.forTarget(host).build(); + } + + private static void closeRpcChannel(ManagedChannel channel) throws InterruptedException { + if (channel != null) { + channel.shutdown(); + channel.awaitTermination(1, SECONDS); + } + } + + private Metadata createMetadata() throws IOException { + Metadata metadata = new Metadata(); + String token = "Bearer " + credentials.getAccessToken(); + metadata.put(Metadata.Key.of("authorization", Metadata.ASCII_STRING_MARSHALLER), token); + return metadata; + } + + private PublishedDevicesServiceGrpc.PublishedDevicesServiceBlockingStub createBlockingStub( + ManagedChannel channel) throws IOException { + Metadata metadata = createMetadata(); + return PublishedDevicesServiceGrpc.newBlockingStub(channel) + .withInterceptors(MetadataUtils.newAttachHeadersInterceptor(metadata)); + } + + private DcslSnapshotType getDcslSnapshotType(String dcslType) throws IOException { + if (dcslType == null) { + return DcslSnapshotType.DCSL_SNAPSHOT_TYPE_UNSPECIFIED; + } else if (Ascii.equalsIgnoreCase(dcslType, "alpha")) { + return DcslSnapshotType.DCSL_ALPHA; + } else if (Ascii.equalsIgnoreCase(dcslType, "beta")) { + return DcslSnapshotType.DCSL_BETA; + } else if (Ascii.equalsIgnoreCase(dcslType, "released")) { + return DcslSnapshotType.DCSL_RELEASED; + } + throw new IOException( + "Invalid value set for dcslType flag. Valid values are Alpha, Beta and Released."); + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/BUILD b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/BUILD new file mode 100644 index 0000000..0f622a6 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/BUILD @@ -0,0 +1,101 @@ +######################################## +## Copyright 2019 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## +# Description: +# JTS tools. + +load("@rules_java//java:defs.bzl", "java_binary", "java_library") + +package(default_visibility = ["//visibility:public"]) + +java_library( + name = "published_devices_cli_lib", + srcs = [ + "PublishedDevicesCli.java", + ], + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:device_security_profiles_java_proto", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_grpc", + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_java_proto", + "//google/chrome/widevine/frauddetection/v1eap1:fraud_detection_and_reporting_service_java_proto", + "//testing/java/com/google/video/widevine/jts/providers:libwidevine_license_wvpl_sdk_lib.jar", + "//testing/java/com/google/video/widevine/jts/providers:providers_tools", + "@google_guava//:com_google_guava_guava", + "@jcommander//:com_beust_jcommander", + ], +) + +java_library( + name = "published_devices_delta_lib", + srcs = [ + "PublishedDevicesDeltaWrapper.java", + "PublishedDevicesWrapper.java", + ], + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:published_devices_java_proto", + "//protos/public:device_certificate_status_java_proto", + "//protos/public:device_certificate_status_proto", + "//protos/public:published_devices_delta_java_proto", + "//protos/public:published_devices_delta_proto", + "@com_google_protobuf//:protobuf_java", + "@google_guava//:com_google_guava_guava", + ], +) + +java_library( + name = "device_security_profiles_lib", + srcs = [ + "DeviceSecurityProfilesDeltaWrapper.java", + "DeviceSecurityProfilesWrapper.java", + ], + deps = [ + "//google/chrome/widevine/contentpartners/v1beta1:device_security_profiles_java_proto", + "//protos/public:device_security_profile_list_java_proto", + "//protos/public:device_security_profiles_delta_java_proto", + "//protos/public:security_profile_java_proto", + "@com_google_protobuf//:protobuf_java", + "@google_guava//:com_google_guava_guava", + ], +) + +java_binary( + name = "published_devices_cli", + main_class = "com.google.video.widevine.jts.tools.PublishedDevicesCli", + runtime_deps = [ + ":published_devices_cli_lib", + ], +) + +java_binary( + name = "published_devices_delta", + main_class = "com.google.video.widevine.jts.tools.PublishedDevicesMain", + runtime_deps = [ + ":published_devices_delta_main_lib", + ], +) + +java_library( + name = "published_devices_delta_main_lib", + srcs = [ + "PublishedDevicesMain.java", + ], + deps = [ + ":device_security_profiles_lib", + ":published_devices_delta_lib", + "//protos/public:device_certificate_status_java_proto", + "//protos/public:device_certificate_status_proto", + "//protos/public:device_security_profiles_delta_java_proto", + "//protos/public:device_security_profiles_delta_proto", + "//protos/public:published_devices_delta_java_proto", + "//protos/public:published_devices_delta_proto", + "//protos/public:security_profile_java_proto", + "@com_google_protobuf//:protobuf_java", + "@google_guava//:com_google_guava_guava", + "@jcommander//:com_beust_jcommander", + "@json//:org_json_json", + ], +) diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesDeltaWrapper.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesDeltaWrapper.java new file mode 100644 index 0000000..a5cf46b --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesDeltaWrapper.java @@ -0,0 +1,265 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.tools; + +import static com.google.common.base.Preconditions.checkNotNull; + +import com.google.chrome.widevine.contentpartners.v1beta1.SignedDeviceSecurityProfiles; +import com.google.protobuf.ExtensionRegistry; +import com.google.protobuf.InvalidProtocolBufferException; +import com.google.video.widevine.protos.DeviceSecurityProfileListProtos.DeviceSecurityProfileList; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta.DspDelta; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta.Header; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta.Modified; +import com.google.video.widevine.protos.SecurityProfileProtos.SecurityProfile; +import java.util.ArrayList; +import java.util.HashSet; +import java.util.LinkedHashMap; +import java.util.List; +import java.util.Map; +import java.util.Set; + +/** Device Security Profiles Delta Wrapper class to find the diff of two DSPs list. */ +final class DeviceSecurityProfilesDeltaWrapper { + private DeviceSecurityProfileList originalDspList = null; + private DeviceSecurityProfileList newDspList = null; + private DeviceSecurityProfilesDelta dspDelta = null; + private final List dspAddedList = new ArrayList<>(); + private final List dspRemovedList = new ArrayList<>(); + private final List dspModifiedList = new ArrayList<>(); + + /** + * DeviceSecurityProfilesDeltaWrapper constructor. The input is two {@link + * SignedDeviceSecurityProfiles} proto messages. + * + * @param signedDspList1 first {@link SignedDeviceSecurityProfiles} proto message. + * @param signedDspList2 second {@link SignedDeviceSecurityProfiles} proto message. + * @throws InvalidProtocolBufferException if failed to parse DeviceSecurityProfileList from {@link + * SignedDeviceSecurityProfiles}. + */ + public DeviceSecurityProfilesDeltaWrapper( + SignedDeviceSecurityProfiles signedDspList1, SignedDeviceSecurityProfiles signedDspList2) + throws InvalidProtocolBufferException { + checkNotNull(signedDspList1, "'signedDspList1' must not be null"); + checkNotNull(signedDspList2, "'signedDspList2' must not be null"); + parseDeviceSecurityProfilesList(signedDspList1, signedDspList2); + this.dspDelta = createDeviceSecurityProfilesDelta(originalDspList, newDspList); + createDeviceSecurityProfilesDeltaInfo(this.dspDelta); + } + /** + * DeviceSecurityProfilesDeltaWrapper constructor. The input is two byte arrays of serialized + * {@link SignedDeviceSecurityProfiles} proto. + * + * @param signedDspListInBytes1 first serialized {@link SignedDeviceSecurityProfiles} proto in + * bytes. + * @param signedDspListInBytes2 second serialized {@link SignedDeviceSecurityProfiles} proto in + * bytes. + * @throws InvalidProtocolBufferException if failed to parse {@link SignedDeviceSecurityProfiles} + * or if failed to parse {@link DeviceSecurityProfileList}. + */ + public DeviceSecurityProfilesDeltaWrapper( + byte[] signedDspListInBytes1, byte[] signedDspListInBytes2) + throws InvalidProtocolBufferException { + checkNotNull(signedDspListInBytes1, "'signedDspListInBytes1' must not be null"); + checkNotNull(signedDspListInBytes2, "'signedDspListInBytes2' must not be null"); + SignedDeviceSecurityProfiles signedDspListProto1 = + SignedDeviceSecurityProfiles.parseFrom( + signedDspListInBytes1, ExtensionRegistry.getEmptyRegistry()); + SignedDeviceSecurityProfiles signedDspListProto2 = + SignedDeviceSecurityProfiles.parseFrom( + signedDspListInBytes2, ExtensionRegistry.getEmptyRegistry()); + parseDeviceSecurityProfilesList(signedDspListProto1, signedDspListProto2); + this.dspDelta = createDeviceSecurityProfilesDelta(originalDspList, newDspList); + createDeviceSecurityProfilesDeltaInfo(this.dspDelta); + } + + /** Returns {@link DeviceSecurityProfilesDelta} of two dsp lists. */ + public DeviceSecurityProfilesDelta getDelta() { + return dspDelta; + } + + /** + * Returns {@link DspDelta} for a specific content owner. If no matched result, return empty + * DspDelta proto. + */ + public DspDelta getDeviceSecurityProfilesDelta(String owner) { + for (DspDelta dspDeltaEntry : dspDelta.getDspDeltaList()) { + if (dspDeltaEntry.getOwner().equals(owner)) { + return dspDeltaEntry; + } + } + return DspDelta.getDefaultInstance(); + } + + /** Returns a list of added DSPs from DeviceSecurityProfilesDelta for all content owners. */ + public List getAddedDeviceSecurityProfiles() { + return dspAddedList; + } + + /** Returns a list of removed DSPs from DeviceSecurityProfilesDelta for all content owners. */ + public List getRemovedDeviceSecurityProfiles() { + return dspRemovedList; + } + + /** Returns a list of modified DSPs from DeviceSecurityProfilesDelta for all content owners. */ + public List getModifiedDeviceSecurityProfiles() { + return dspModifiedList; + } + + /** Parse {@link DeviceSecurityProfileList} from {@link SignedDeviceSecurityProfiles}. */ + private void parseDeviceSecurityProfilesList( + SignedDeviceSecurityProfiles signedDspList1, SignedDeviceSecurityProfiles signedDspList2) + throws InvalidProtocolBufferException { + originalDspList = + DeviceSecurityProfileList.parseFrom( + signedDspList1.getDeviceSecurityProfiles(), ExtensionRegistry.getEmptyRegistry()); + newDspList = + DeviceSecurityProfileList.parseFrom( + signedDspList2.getDeviceSecurityProfiles(), ExtensionRegistry.getEmptyRegistry()); + + // Swap the DeviceSecurityProfileList if originalDspList is newer than signedDspList2. + if (originalDspList.getCreationTimeSeconds() > newDspList.getCreationTimeSeconds()) { + DeviceSecurityProfileList tempList = newDspList; + newDspList = originalDspList; + originalDspList = tempList; + } + } + + /** Creates a {@link DeviceSecurityProfilesDelta} of originalDspList and newDspList. */ + private static DeviceSecurityProfilesDelta createDeviceSecurityProfilesDelta( + DeviceSecurityProfileList originalDspList, DeviceSecurityProfileList newDspList) { + Header header = + Header.newBuilder() + .setPrevCreationTimeSeconds(originalDspList.getCreationTimeSeconds()) + .setNewCreationTimeSeconds(newDspList.getCreationTimeSeconds()) + .build(); + DeviceSecurityProfilesDelta.Builder deltaBuilder = + DeviceSecurityProfilesDelta.newBuilder().setHeader(header); + + // Separately add all original dsps and new dsps into two maps. Key is content owner name, + // value is a list of dsps created by this content owner. + Map> originalDspMap = initializeDspMap(originalDspList); + Map> newDspMap = initializeDspMap(newDspList); + // Create a map to store DspDelta.Builder. Key is content owner name, value is dspDelta for each + // owner. + Map dspDeltaBuilderMap = calculateDspDelta(originalDspMap, newDspMap); + + // Export dspDeltaBuilderMap and return DeviceSecurityProfilesDelta proto. + for (String owner : dspDeltaBuilderMap.keySet()) { + DspDelta.Builder dspDeltaBuilder = dspDeltaBuilderMap.get(owner).setOwner(owner); + deltaBuilder.addDspDelta(dspDeltaBuilder.build()); + } + return deltaBuilder.build(); + } + + /** + * Parses {@link DeviceSecurityProfilesDelta} to obtain AddedList, RemovedList and ModifiedList + * for all content owners from DeviceSecurityProfilesList. + */ + private void createDeviceSecurityProfilesDeltaInfo(DeviceSecurityProfilesDelta dspDelta) { + for (DspDelta dspDeltaEntry : dspDelta.getDspDeltaList()) { + dspAddedList.addAll(dspDeltaEntry.getAddedList()); + dspRemovedList.addAll(dspDeltaEntry.getRemovedList()); + dspModifiedList.addAll(dspDeltaEntry.getModifiedList()); + } + } + + /** + * Creates dsp map storing dsp list. + * + * @param dspList dsp list in DeviceSecurityProfileList proto. + * @return a map which stores dsp list. Key is content owner name, value is a list of dsps for + * that owner. + */ + private static Map> initializeDspMap( + DeviceSecurityProfileList dspList) { + Map> dspMap = new LinkedHashMap<>(); + for (SecurityProfile dsp : dspList.getDeviceSecurityProfilesList()) { + dspMap.putIfAbsent(dsp.getOwner(), new ArrayList<>()); + dspMap.get(dsp.getOwner()).add(dsp); + } + return dspMap; + } + + /** + * Calculates dsp delta based on the original dsp and new dsp map. + * + * @param originalDspMap original dsp map. + * @param newDspMap new dsp map. + * @return a dsp delta map. Key is content owner name, value is the dsp delta builder belongs to + * that owner. + */ + private static Map calculateDspDelta( + Map> originalDspMap, + Map> newDspMap) { + Map dspDeltaBuilderMap = new LinkedHashMap<>(); + for (String owner : newDspMap.keySet()) { + // Record already-processed original dsp set. + Set processedOriginalDspSet = new HashSet<>(); + + // If current owner is not shown in the original dsp map, add all new dsps to Add field for + // this content owner and then continue checking the next owner from new dsp map. + if (!originalDspMap.containsKey(owner)) { + dspDeltaBuilderMap.putIfAbsent(owner, DspDelta.newBuilder().setOwner(owner)); + dspDeltaBuilderMap.get(owner).addAllAdded(newDspMap.get(owner)); + continue; + } + for (SecurityProfile newDsp : newDspMap.get(owner)) { + // For each new dsp, compare with the original dsp list. + // If two dsps are identical, record it to the already-processed list. And pass to the next + // new dsp. + if (originalDspMap.get(owner).contains(newDsp)) { + // Record the original dsp which is dentical to new dsp in the already_processed list. + processedOriginalDspSet.add(newDsp); + continue; + } else { + // If new dsp can't find the equivalent dsp in the original list, need to figure out it is + // an new added one or a modified one -modified one comes with the same dsp unique key + // {dspName, owner, provider, startTime}. + boolean sameDspUniqueKeyFound = false; + for (SecurityProfile originalDsp : originalDspMap.get(owner)) { + // Owner and provider are identical. Only need to compare dspName and startTime. + if (originalDsp.getName().equals(newDsp.getName()) + && (originalDsp.getControlTime().getStartTimeSeconds() + == newDsp.getControlTime().getStartTimeSeconds())) { + // Add original and new dsp to Modified field for this content owner. + dspDeltaBuilderMap.putIfAbsent(owner, DspDelta.newBuilder().setOwner(owner)); + dspDeltaBuilderMap + .get(owner) + .addModifiedBuilder() + .setPrevDsp(originalDsp) + .setNewDsp(newDsp); + // Record the original dsp in the already_processed list. + processedOriginalDspSet.add(originalDsp); + sameDspUniqueKeyFound = true; + break; + } + } + if (!sameDspUniqueKeyFound) { + // Add new dsp to Added field for this content owner. + dspDeltaBuilderMap.putIfAbsent(owner, DspDelta.newBuilder().setOwner(owner)); + dspDeltaBuilderMap.get(owner).addAdded(newDsp); + } + } + } + // Remove already-processed dsps from originalDspMap for this content owner. + originalDspMap.get(owner).removeAll(processedOriginalDspSet); + } + + // Add all remaining dsps from originalDspMap to Removed field. + for (String owner : originalDspMap.keySet()) { + if (!originalDspMap.get(owner).isEmpty()) { + dspDeltaBuilderMap.putIfAbsent(owner, DspDelta.newBuilder().setOwner(owner)); + dspDeltaBuilderMap.get(owner).addAllRemoved(originalDspMap.get(owner)); + } + } + + return dspDeltaBuilderMap; + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesWrapper.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesWrapper.java new file mode 100644 index 0000000..2c9be5f --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/DeviceSecurityProfilesWrapper.java @@ -0,0 +1,156 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.tools; + +import static com.google.common.base.Preconditions.checkNotNull; +import static com.google.common.base.Strings.isNullOrEmpty; + +import com.google.chrome.widevine.contentpartners.v1beta1.SignedDeviceSecurityProfiles; +import com.google.protobuf.ExtensionRegistry; +import com.google.protobuf.InvalidProtocolBufferException; +import com.google.video.widevine.protos.DeviceSecurityProfileListProtos.DeviceSecurityProfileList; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta; +import com.google.video.widevine.protos.SecurityProfileProtos.SecurityProfile; +import java.util.ArrayList; +import java.util.LinkedHashMap; +import java.util.List; +import java.util.Map; +import java.util.Set; + +/** Device Security Profiles Wrapper class to parse and discover retrieved DSPs. */ +final class DeviceSecurityProfilesWrapper { + private SignedDeviceSecurityProfiles signedDspList = null; + private DeviceSecurityProfileList dspList = null; + private final Map> dspMap = new LinkedHashMap<>(); + private Set ownerSet = null; + + /** + * Constructor to create DeviceSecurityProfilesWrapper object with {@link + * SignedDeviceSecurityProfiles} as input. + * + * @param signedDspList SignedDeviceSecurityProfiles proto. + */ + public DeviceSecurityProfilesWrapper(SignedDeviceSecurityProfiles signedDspList) + throws InvalidProtocolBufferException { + checkNotNull(signedDspList, "'signedDspList' must not be null"); + this.signedDspList = signedDspList; + parseDeviceSecurityProfilesList(); + } + + /** + * Constructor to create DeviceSecurityProfilesWrapper object with byte array from {@link + * SignedDeviceSecurityProfiles} serialized proto. + * + * @param signedDspListInfo a serialized SignedDeviceSecurityProfiles proto. + */ + public DeviceSecurityProfilesWrapper(byte[] signedDspListInfo) + throws InvalidProtocolBufferException { + checkNotNull(signedDspListInfo, "'signedDspListInfo' must not be null"); + signedDspList = + SignedDeviceSecurityProfiles.parseFrom( + signedDspListInfo, ExtensionRegistry.getEmptyRegistry()); + parseDeviceSecurityProfilesList(); + } + + /** + * Get DeviceSecurityProfileList. + * + * @return DeviceSecurityProfileList a deserialized DeviceSecurityProfiles message from + * SignedDeviceSecurityProfiles. + */ + public DeviceSecurityProfileList getDeviceSecurityProfileList() { + return dspList; + } + + /** + * Get the number of DSPs shown in DeviceSecurityProfileList. + * + * @return int Number of DSPs shown in DeviceSecurityProfileList. + */ + public int getSize() { + return dspList.getDeviceSecurityProfilesCount(); + } + + /** + * Get a list of DeviceSecurityProfiles for specific content owner. + * + * @param owner content owner name in String. + * @return {@link List} a list of DSPs for specific content owner. Return null if + * none of the DSPs belongs to the specific content owner. + */ + public List getDeviceSecurityProfiles(String owner) { + if (isNullOrEmpty(owner)) { + return null; + } + return dspMap.get(owner); + } + + /** + * Get the content owner list from the DSPs. + * + * @return {@link List} a list of content owners shown in the DSPs. Return null if owner + * set is null or empty. + */ + public List getOwners() { + if (ownerSet == null || ownerSet.isEmpty()) { + return null; + } + return new ArrayList<>(ownerSet); + } + + /** + * Get one DeviceSecurityProfile given content owner and profile name. + * + * @param owner content owner name in String. + * @param profileName dsp name in String. + * @return {@link SecurityProfile) One specific DSP which matches content owner and profile name. + * Return null if such DSP couldn't be found. + */ + SecurityProfile getDeviceSecurityProfile(String owner, String profileName) { + List list = dspMap.get(owner); + if (list == null) { + return null; + } + for (SecurityProfile securityProfile : list) { + if (securityProfile.getName().equals(profileName)) { + return securityProfile; + } + } + return null; + } + + /** + * Get {@link DeviceSecurityProfilesDelta} of new signedDspList with current signedDspList. + * + * @param newSignedDspList new signed dsp list in SignedDeviceSecurityProfiles proto. + * @return {@link DeviceSecurityProfilesDelta}. + * @throws InvalidProtocolBufferException if failed to parse DeviceSecurityProfileList from + * SignedDeviceSecurityProfiles. + */ + public DeviceSecurityProfilesDelta getDeviceSecurityProfilesDelta( + SignedDeviceSecurityProfiles newSignedDspList) throws InvalidProtocolBufferException { + checkNotNull(newSignedDspList, "'newSignedDspList' must not be null"); + DeviceSecurityProfilesDeltaWrapper dspDeltaWrapper = + new DeviceSecurityProfilesDeltaWrapper(this.signedDspList, newSignedDspList); + return dspDeltaWrapper.getDelta(); + } + + private void parseDeviceSecurityProfilesList() throws InvalidProtocolBufferException { + dspList = + DeviceSecurityProfileList.parseFrom( + signedDspList.getDeviceSecurityProfiles(), ExtensionRegistry.getEmptyRegistry()); + + // Add all DSPs into a map where key is dsp owner, value is a list of DSPs. + for (SecurityProfile dsp : dspList.getDeviceSecurityProfilesList()) { + dspMap.putIfAbsent(dsp.getOwner(), new ArrayList<>()); + dspMap.get(dsp.getOwner()).add(dsp); + } + // Get owner set from key set of dspMap. + ownerSet = dspMap.keySet(); + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesCli.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesCli.java new file mode 100644 index 0000000..8f08059 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesCli.java @@ -0,0 +1,350 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +package com.google.video.widevine.jts.tools; + +import static java.nio.charset.StandardCharsets.UTF_8; + +import com.beust.jcommander.JCommander; +import com.beust.jcommander.Parameter; +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevices; +import com.google.chrome.widevine.contentpartners.v1beta1.SignedDeviceSecurityProfiles; +import com.google.chrome.widevine.frauddetection.v1eap1.FraudLevel; +import com.google.common.collect.ImmutableList; +import com.google.common.io.BaseEncoding; +import com.google.video.widevine.jts.providers.PublishedDevicesProvider; +import com.google.video.widevine.sdk.wvpl.WvPLEnvironment; +import com.google.video.widevine.sdk.wvpl.WvPLStatus; +import com.google.video.widevine.sdk.wvpl.WvPLStatusException; +import java.io.IOException; +import java.nio.file.Files; +import java.nio.file.Path; +import java.util.HashMap; + +/** + * Published Devices Client command line tool. + * + *

    Provides a command line interface to get the latest {@code PublishedDevices} and {@code + * SignedDeviceSecurityProfiles} data from the Widevine Published Devices Service. + * + *

    Default Widevine Service API path: widevine.googleapis.com. + * + *

    To build: bazel build + * java/com/google/video/widevine/jts/tools:published_devices_cli_deploy.jar + * + *

    To run: java -Djava.library.path=./path/to/license/sdk.so \ -jar + * /path/to/published_devices_cli_deploy.jar \ -data_type PUBLISHED_DEVICESOrDSPInString \ + * -service_cert_path /path/to/cert_file.der \ -service_private_key_path /path/to/private_key.der \ + * -service_private_key_passphrase theprivatekeypassphrase \ -service_account_path + * /path/to/service-account.json \ -provider_name providerNameInString + */ +public final class PublishedDevicesCli { + private static final String PUBLISHED_DEVICES = "PUBLISHED_DEVICES"; + private static final String DSP = "DSP"; + private static final String IDRL = "IDRL"; + private static final String FRAUD_REPORT = "FRAUD_REPORT"; + private static final ImmutableList DATA_TYPE_LIST = + ImmutableList.of(PUBLISHED_DEVICES, DSP, IDRL, FRAUD_REPORT); + + private static final String FRAUD_LEVEL_CRITICAL = "CRITICAL"; + private static final String FRAUD_LEVEL_NONE = "NONE"; + private static final ImmutableList FRAUD_LEVEL_LIST = + ImmutableList.of(FRAUD_LEVEL_CRITICAL, FRAUD_LEVEL_NONE); + + private WvPLEnvironment environment = null; + private PublishedDevicesProvider publishedDevices = null; + private String serviceCertPath = null; + private String privateKeyPath = null; + private String privateKeyPassphrase = null; + + /** Command Line Flags. */ + static class Flags { + private Flags() {} + + @Parameter( + names = {"-h", "-help"}, + help = true) + private boolean help = false; + + @Parameter( + names = "-data_type", + description = + "Set retrieved data type. Must be \"PUBLISHED_DEVICES\", \"DSP\", \"IDRL\" or" + + "\"FRAUD_REPORT\".") + private String dataType = "PUBLISHED_DEVICES"; + + @Parameter(names = "-service_cert_path", description = "Path to service certificate") + private String serviceCertPath = ""; + + @Parameter( + names = "-service_private_key_path", + description = "Path to private key file needed to decrypt service certificate") + private String servicePrivateKeyPath = ""; + + @Parameter( + names = "-service_private_key_passphrase", + description = "Passphrase needed to decrypt the private key") + private String servicePrivateKeyPassphrase = ""; + + @Parameter( + names = "-service_account_path", + description = "Path to a GCP Service Account json file. Required.") + private String serviceAccountPath = ""; + + @Parameter( + names = "-api_service_path", + description = "Optional. Path to a Widevine API service.") + private String apiServicePath = "widevine.googleapis.com"; + + @Parameter( + names = "-provider_name", + description = + "Set provider name. Must provide when obtaining DSP and IDRL. Optional for obtaining" + + " PUBLISHED_DEVICES.") + private String provider = ""; + + @Parameter( + names = "-include_impact_analysis", + description = + "Option specifying whether or not to include impact analysis results in response.") + private boolean includeImpactAnalysis = false; + + @Parameter( + names = "-last_dcsl_epoch_time_seconds", + description = + "Option that helps to calculate the DCSL impact analysis from a DCSL snapshot at" + + " last_dcsl_epoch_time to the latest DCSL snapshot. Time is contained in the last" + + " fetched DCSL DeviceCertificateStatusList.creation_time_seconds. Maximum" + + " timeframe is 30 days.") + private Integer lastDcslEpochTimeSeconds = null; + + @Parameter( + names = "-dcsl_type", + description = + "Option specifying which DCSL type needs to be returned in response. Valid options are" + + " Alpha, Beta or Released. Alpha is unverified DCSL which is not a release" + + " candidate yet. Beta is partially verified release candidate. Released is fully" + + " verified and is a release candidate available for production. By default, a" + + " released DCSL is returned in response.") + private String dcslType = null; + + @Parameter(names = "-s", description = "Save retrieved file path.") + private String saveFilePath = null; + + @Parameter( + names = "-fraud_license_request", + description = + "Base64 encoded fraud license request from the device. Required for fraud reporting.") + private String fraudLicenseRequest = null; + + @Parameter( + names = "-fraud_clear_id", + description = + "Base64 encoded clear client id. Required if the one in license request is encrypted.") + private String fraudClearId = null; + + @Parameter( + names = "-fraud_user_agent", + description = "User agent of the fraud license request. Optional.") + private String fraudUserAgent = null; + + @Parameter( + names = "-fraud_reason", + description = "Reason the device is considered fraudulent. Optional.") + private String fraudReason = null; + + @Parameter( + names = "-fraud_level", + description = + "Level of fraud, must be one of \"CRITICAL\" or \"NONE\". A \"NONE\" fraud level is" + + " used to \"unrevoke\" a device, meaning the device is not fraudulent. Optional.") + private String fraudLevel = "CRITICAL"; + } + + public PublishedDevicesCli( + String dataType, + String serviceCertPath, + String privateKeyPath, + String privateKeyPassphrase, + String serviceAccountPath, + String apiServicePath, + String provider, + boolean includeImpactAnalysis, + Integer lastDcslEpochTimeSeconds, + String dcslType) + throws Exception { + this.serviceCertPath = serviceCertPath; + this.privateKeyPath = privateKeyPath; + this.privateKeyPassphrase = privateKeyPassphrase; + // Construct PublishedDevicesProvider to obtain PUBLISHED_DEVICES or DSPs. + if (dataType.equals(PUBLISHED_DEVICES)) { + initializeWvplEnvironment(); + } + publishedDevices = + new PublishedDevicesProvider( + environment, + serviceAccountPath, + apiServicePath, + provider, + includeImpactAnalysis, + lastDcslEpochTimeSeconds, + dcslType); + } + + /** + * Get the latest {@code PublishedDevices} from the Widevine Published Devices Service. + * + * @return The latest PublishedDevices data. + * @throws InterruptedException upon RPC failure. + * @throws WvPLStatusException upon WvPLBaseEnvironment errors. + */ + public PublishedDevices getPublishedDevices() throws InterruptedException, WvPLStatusException { + return publishedDevices.getPublishedDevices(); + } + + /** + * Get the latest {@code SignedDeviceSecurityProfiles} from the Widevine Published Devices + * Service. + * + * @return The latest SignedDeviceSecurityProfiles data. + */ + public SignedDeviceSecurityProfiles getSignedDeviceSecurityProfiles() + throws InterruptedException, WvPLStatusException { + return publishedDevices.getSignedDeviceSecurityProfiles(); + } + + /** + * Get the latest Individual Device Revocation List from the Widevine Published Devices Service. + * + * @return The latest SignedDeviceSecurityProfiles data. + */ + public byte[] getIndividualDeviceRevocationList() throws InterruptedException { + return publishedDevices.getIndividualDeviceRevocationList(); + } + + /** + * Report a fraudulent device to Widevine. + * + * @param licenseRequest Base64 encoded fraud license request from the device. Required. + * @param clearClientId Base64 encoded clear client id. Required if the one in license request is + * encrypted. + * @param userAgent User agent of the fraud license request. Optional. + * @param reason Reason the device is considered fraudulent. Optional. + * @param fraudScore Fraud score of the device. Required. + * @return The response message from Widevine server. + */ + public byte[] reportFraudulentDevice( + String licenseRequest, + String clearClientId, + String userAgent, + String reason, + FraudLevel.FraudScore fraudScore) + throws InterruptedException, IOException { + return publishedDevices.reportFraudulentDevice( + licenseRequest, clearClientId, userAgent, reason, fraudScore); + } + + /** + * Saves byte array to a file. + * + * @param saveFilePath The path to the save file. + * @param byteArray a byte array transformed from proto. + */ + public static void saveByteArrayToFile(String saveFilePath, byte[] byteArray) throws IOException { + Files.write(Path.of(saveFilePath), BaseEncoding.base64Url().encode(byteArray).getBytes(UTF_8)); + } + + public static void main(String[] args) throws Exception { + Flags flags = new Flags(); + JCommander jCommander = new JCommander(flags); + jCommander.parse(args); + if (flags.help) { + jCommander.usage(); + return; + } + // Check flags. + if (!DATA_TYPE_LIST.contains(flags.dataType)) { + System.out.println("Data type should be selected from:" + DATA_TYPE_LIST); + System.err.println("Error selecting data type. Exit"); + System.exit(-1); + } + if (flags.provider.isEmpty() && !flags.dataType.equals(PUBLISHED_DEVICES)) { + System.err.println("Failed to provide the provider name. Exit"); + System.exit(-1); + } + if (flags.serviceAccountPath.isEmpty()) { + System.err.println("service_account_path is required. Exit"); + System.exit(-1); + } + + PublishedDevicesCli devices = + new PublishedDevicesCli( + flags.dataType, + flags.serviceCertPath, + flags.servicePrivateKeyPath, + flags.servicePrivateKeyPassphrase, + flags.serviceAccountPath, + flags.apiServicePath, + flags.provider, + flags.includeImpactAnalysis, + flags.lastDcslEpochTimeSeconds, + flags.dcslType); + + byte[] content = null; + if (flags.dataType.equals(PUBLISHED_DEVICES)) { + content = devices.getPublishedDevices().toByteArray(); + } else if (flags.dataType.equals(DSP)) { + content = devices.getSignedDeviceSecurityProfiles().toByteArray(); + } else if (flags.dataType.equals(IDRL)) { + content = devices.getIndividualDeviceRevocationList(); + } else if (flags.dataType.equals(FRAUD_REPORT)) { + content = + devices.reportFraudulentDevice( + flags.fraudLicenseRequest, + flags.fraudClearId, + flags.fraudUserAgent, + flags.fraudReason, + getFraudScore(flags.fraudLevel)); + } + if (flags.saveFilePath != null) { + saveByteArrayToFile(flags.saveFilePath, content); + } + } + + private void initializeWvplEnvironment() throws Exception { + environment = new WvPLEnvironment(new HashMap<>()); + // Set service certificate. + WvPLStatus status = + environment.setServiceCertificate( + loadDataFromFile(serviceCertPath), + loadDataFromFile(privateKeyPath), + privateKeyPassphrase.getBytes(UTF_8)); + if (!status.getStatusCode().equals(WvPLStatus.StatusCode.OK)) { + throw new Exception("Set server certificate status: " + status); + } + } + + private static byte[] loadDataFromFile(String filePath) throws IOException { + return Files.readAllBytes(Path.of(filePath)); + } + + public static FraudLevel.FraudScore getFraudScore(String fraudLevel) { + switch (fraudLevel) { + case FRAUD_LEVEL_CRITICAL: + return FraudLevel.FraudScore.FRAUD_SCORE_CRITICAL; + case FRAUD_LEVEL_NONE: + return FraudLevel.FraudScore.FRAUD_SCORE_NONE; + default: + throw new IllegalArgumentException( + "Fraud level should be selected from: " + + FRAUD_LEVEL_LIST + + ". Invalid fraud level: " + + fraudLevel); + } + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesDeltaWrapper.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesDeltaWrapper.java new file mode 100644 index 0000000..3442560 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesDeltaWrapper.java @@ -0,0 +1,256 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +package com.google.video.widevine.jts.tools; + +import static com.google.common.base.Preconditions.checkNotNull; + +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevices; +import com.google.protobuf.ExtensionRegistry; +import com.google.protobuf.InvalidProtocolBufferException; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.DeviceCertificateStatus; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.PublishedDevicesList; +import com.google.video.widevine.protos.PublishedDevicesDeltaProtos.PublishedDevicesDelta; +import com.google.video.widevine.protos.PublishedDevicesDeltaProtos.PublishedDevicesDelta.Header; +import com.google.video.widevine.protos.PublishedDevicesDeltaProtos.PublishedDevicesDelta.Modified; +import java.util.ArrayList; +import java.util.LinkedHashMap; +import java.util.List; +import java.util.Map; + +/** Published Devices Delta Wrapper class to get {@link PublishedDevicesDelta}. */ +public final class PublishedDevicesDeltaWrapper { + private PublishedDevicesList originalList = null; + private PublishedDevicesList newList = null; + private PublishedDevicesDelta publishedDevicesDelta = null; + private final Map dcslAddedMap = new LinkedHashMap<>(); + private final Map dcslRemovedMap = new LinkedHashMap<>(); + private final Map dcslModifiedMap = new LinkedHashMap<>(); + static final int MAJOR_VERSION = 1; + static final int MINOR_VERSION = 1; + static final int RELEASE = 0; + + /** + * PublishedDevicesDeltaWrapper constructor. The input is two byte array serialized + * PublishedDevices proto. + * + * @param publishedDevicesInBytes1 first serialized PublishedDevices proto in bytes. + * @param publishedDevicesInBytes2 second serialized PublishedDevices proto in bytes. + * @throws InvalidProtocolBufferException if failed to parse published devices or if failed to + * parse PublishedDevicesList. + */ + public PublishedDevicesDeltaWrapper( + byte[] publishedDevicesInBytes1, byte[] publishedDevicesInBytes2) + throws InvalidProtocolBufferException { + checkNotNull(publishedDevicesInBytes1, "'publishedDevicesInBytes1' must not be null"); + checkNotNull(publishedDevicesInBytes2, "'publishedDevicesInBytes2' must not be null"); + PublishedDevices publishedDevices1 = + PublishedDevices.parseFrom(publishedDevicesInBytes1, ExtensionRegistry.getEmptyRegistry()); + PublishedDevices publishedDevices2 = + PublishedDevices.parseFrom(publishedDevicesInBytes2, ExtensionRegistry.getEmptyRegistry()); + parsePublishedDevicesList(publishedDevices1, publishedDevices2); + this.publishedDevicesDelta = createPublishedDevicesDelta(originalList, newList); + createPublishedDevicesDeltaInfo(publishedDevicesDelta); + } + + /** + * PublishedDevicesDeltaWrapper constructor. The input is two PublishedDevices protos. + * + * @param publishedDevices1 first PublishedDevices proto. + * @param publishedDevices2 second PublishedDevices proto. + * @throws InvalidProtocolBufferException if failed to parse PublishedDevicesList from published + * devices. + */ + public PublishedDevicesDeltaWrapper( + PublishedDevices publishedDevices1, PublishedDevices publishedDevices2) + throws InvalidProtocolBufferException { + checkNotNull(publishedDevices1, "'publishedDevices1' must not be null"); + checkNotNull(publishedDevices2, "'publishedDevices2' must not be null"); + parsePublishedDevicesList(publishedDevices1, publishedDevices2); + this.publishedDevicesDelta = createPublishedDevicesDelta(originalList, newList); + createPublishedDevicesDeltaInfo(publishedDevicesDelta); + } + + /** + * PublishedDevicesDeltaWrapper constructor. The input is PublishedDevicesDelta proto. + * + * @param publishedDevicesDelta PublishedDevicesDeltaWrapper proto. + */ + public PublishedDevicesDeltaWrapper(PublishedDevicesDelta publishedDevicesDelta) { + checkNotNull(publishedDevicesDelta, "'delta' must not be null"); + this.publishedDevicesDelta = publishedDevicesDelta; + createPublishedDevicesDeltaInfo(publishedDevicesDelta); + } + + /** Returns {@link PublishedDevicesDelta} of originalPublishedDevices and newPublishedDevices. */ + public PublishedDevicesDelta getDelta() { + return publishedDevicesDelta; + } + + /** + * Returns {@link PublishedDevicesDelta} of originalPublishedDevices and newPublishedDevices. + * + * @param originalList original list in PublishedDevicesList proto + * @param newList new list in PublishedDevicesList proto + */ + static PublishedDevicesDelta createPublishedDevicesDelta( + PublishedDevicesList originalList, PublishedDevicesList newList) { + // Construct PublishedDevicesDelta. + PublishedDevicesDelta.Builder deltaBuilder = PublishedDevicesDelta.newBuilder(); + // Construct Header object. + Header header = + Header.newBuilder() + .setPrevCreationTimeSeconds(originalList.getCreationTimeSeconds()) + .setNewCreationTimeSeconds(newList.getCreationTimeSeconds()) + .build(); + deltaBuilder.setHeader(header); + + // Add removed, added and modified field in to delta. + List prevDCSL = originalList.getDeviceCertificateStatusList(); + List newDcsl = newList.getDeviceCertificateStatusList(); + Map dcslMap = new LinkedHashMap<>(); + // Add all the original DCSLs into the map. + for (DeviceCertificateStatus dcsl : prevDCSL) { + dcslMap.put(dcsl.getDeviceInfo().getSystemId(), dcsl); + } + + for (DeviceCertificateStatus dcsl : newDcsl) { + int systemId = dcsl.getDeviceInfo().getSystemId(); + if (dcslMap.containsKey(systemId) && !dcsl.equals(dcslMap.get(systemId))) { + deltaBuilder.addModifiedBuilder().setPrevDevice(dcslMap.get(systemId)).setNewDevice(dcsl); + } else if (!dcslMap.containsKey(systemId)) { + // Add the new DCSL into added field in PublishedDevicesDeltaWrapper. + deltaBuilder.addAdded(dcsl); + } + // Remove the iterated DCSL from the map. + dcslMap.remove(systemId); + } + // Add the original DCSL into removed field in PublishedDevicesDeltaWrapper. + if (!dcslMap.isEmpty()) { + deltaBuilder.addAllRemoved(dcslMap.values()); + } + + return deltaBuilder.build(); + } + + /** + * Returns the formatted text output of the {@link PublishedDevicesDelta}. + * + * @return String String format of publishedDevices. + */ + public static String toString(PublishedDevicesDelta delta) { + return delta.toString(); + } + + /** Parse {@link PublishedDevicesList} from {@link PublishedDevices}. */ + private void parsePublishedDevicesList( + PublishedDevices publishedDevices1, PublishedDevices publishedDevices2) + throws InvalidProtocolBufferException { + // Parse PublishedDevicesList proto. + originalList = + PublishedDevicesList.parseFrom( + publishedDevices1.getPublishedDevices(), ExtensionRegistry.getEmptyRegistry()); + newList = + PublishedDevicesList.parseFrom( + publishedDevices2.getPublishedDevices(), ExtensionRegistry.getEmptyRegistry()); + + // Swap the PublishedDevicesList list if originalList is newer than newList. + if (originalList.getCreationTimeSeconds() > newList.getCreationTimeSeconds()) { + PublishedDevicesList temp = newList; + newList = originalList; + originalList = temp; + } + } + + /** + * Get {@link DeviceCertificateStatus} of the specific system_id. + * + * @param systemId Device system_id. + * @return DeviceCertificateStatus Returns DeviceCertificateStatus of the specific system_id if it + * is added. Otherwise it will return null. + */ + public DeviceCertificateStatus getAddedDeviceCertificateStatus(int systemId) { + return dcslAddedMap.get(systemId); + } + + /** + * Get {@link DeviceCertificateStatus} of the specific system_id. + * + * @param systemId Device system_id. + * @return DeviceCertificateStatus Returns the DeviceCertificateStatus of the specific system_id + * if it is removed.Otherwise it will return null. + */ + public DeviceCertificateStatus getRemovedDeviceCertificateStatus(int systemId) { + return dcslRemovedMap.get(systemId); + } + + /** + * Get {@link Modified} of the specific system_id. Return null if not found. + * + * @param systemId Device system_id. + * @return Modified Returns ModifiedDeviceCertificateStatus of the specific system_id. Return null + * if not found. + */ + public Modified getModifiedDeviceCertificateStatus(int systemId) { + return dcslModifiedMap.get(systemId); + } + + /** + * Get count of added DeviceCertificateStatus in delta. + * + * @return a list of system_ids for added DeviceCertificateStatus in delta. + */ + public List getAddedDevices() { + return new ArrayList<>(dcslAddedMap.keySet()); + } + + /** + * Get count of modified DeviceCertificateStatus in delta. + * + * @return a list of system_ids for modified DeviceCertificateStatus in delta. + */ + public List getModifiedDevices() { + return new ArrayList<>(dcslModifiedMap.keySet()); + } + + /** + * Get list of system ids for removed DeviceCertificateStatus in delta. + * + * @return a list of system_ids for removed DeviceCertificateStatus in delta. + */ + public List getRemovedDevices() { + return new ArrayList<>(dcslRemovedMap.keySet()); + } + + /** + * Get the version of Published Devices Release. + * + * @return the version of Published Devices Release as a String. + */ + public String getVersion() { + return MAJOR_VERSION + "." + MINOR_VERSION + "." + RELEASE; + } + + /** + * Parse PublishedDevicesDeltaWrapper to get AddedMap, RemovedMap and ModifiedMap for + * PublishedDevicesList. + * + * @param publishedDevicesDelta PublishedDevicesDelta delta. + */ + private void createPublishedDevicesDeltaInfo(PublishedDevicesDelta publishedDevicesDelta) { + for (DeviceCertificateStatus status : publishedDevicesDelta.getAddedList()) { + dcslAddedMap.put(status.getDeviceInfo().getSystemId(), status); + } + for (DeviceCertificateStatus status : publishedDevicesDelta.getRemovedList()) { + dcslRemovedMap.put(status.getDeviceInfo().getSystemId(), status); + } + for (Modified status : publishedDevicesDelta.getModifiedList()) { + dcslModifiedMap.put(status.getPrevDevice().getDeviceInfo().getSystemId(), status); + } + } +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesMain.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesMain.java new file mode 100644 index 0000000..f4216f2 --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesMain.java @@ -0,0 +1,455 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.tools; + +import static com.google.common.io.BaseEncoding.base64; +import static com.google.common.io.BaseEncoding.base64Url; + +import com.beust.jcommander.JCommander; +import com.beust.jcommander.Parameter; +import com.google.common.base.Ascii; +import com.google.common.collect.ImmutableList; +import com.google.protobuf.InvalidProtocolBufferException; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.DeviceCertificateStatus; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta; +import com.google.video.widevine.protos.DeviceSecurityProfilesDeltaProtos.DeviceSecurityProfilesDelta.DspDelta; +import com.google.video.widevine.protos.PublishedDevicesDeltaProtos.PublishedDevicesDelta; +import com.google.video.widevine.protos.SecurityProfileProtos.SecurityProfile; +import java.io.IOException; +import java.nio.file.Files; +import java.nio.file.Path; +import java.util.Arrays; +import java.util.List; +import java.util.logging.Level; +import java.util.logging.Logger; +import org.json.JSONException; +import org.json.JSONObject; + +/** + * Published Devices command line tool. + * + *

    Provides a command line tool which could help to (1) get the diff between two PublishedDevices + * Proto, parse the PublishedDevices and PublishedDevicesDelta. (2) get the diff between two + * SignedDeviceSecurityProfiles Proto, parse the DeviceSecurityProfiles and + * DeviceSecurityProfilesDelta. + * + *

    To build: Bazel build tools:published_devices_delta_deploy.jar + * + *

    Commands for PublishedDevices: + * + *

    To run: java -jar /path/to/published_devices_lib_deploy.jar -new_file_path path + * -original_file_path path -print + * + *

    To run: java -jar /path/to/published_devices_lib_deploy.jar -new_file_path path + * -original_file_path path -system_id 100 -get_system_ids + * + *

    To run: java -jar /path/to/published_devices_lib_deploy.jar -query path -system_id 100 + * + *

    Commands for DeviceSecurityProfiles: + * + *

    Get DSP delta, save and print it: java -jar /path/to/published_devices_lib_deploy.jar + * -data_type DSP -new_file_path path -original_file_path path -print + * + *

    Obtain the dsp delta per content owner: java -jar /path/to/published_devices_lib_deploy.jar + * -data_type DSP -new_file_path path -original_file_path path -content_owner owner_name + * + *

    Obtain Added/Removed/Modified list in dsp delta: java -jar + * /path/to/published_devices_lib_deploy.jar -data_type DSP -new_file_path path -original_file_path + * path -get_specific_field_in_dsp_delta field_name + * + *

    Get DSPs for specific owner: java -jar /path/to/published_devices_lib_deploy.jar -data_type + * DSP -query path -content_owner owner_name + * + *

    Get owner list from one retrieved dsp list: java -jar + * /path/to/published_devices_lib_deploy.jar -data_type DSP -query path -get_owners + * + *

    Get targeted dsp given contentOwner and profile name: java -jar + * /path/to/published_devices_lib_deploy.jar -data_type DSP -query path -content_owner owner_name + * -profile_name profile_name + */ +public class PublishedDevicesMain { + private static final Logger logger = Logger.getLogger(PublishedDevicesMain.class.getName()); + private static final int ZERO_SYSTEM_ID = 0; + private static final String JSON_NAME = "signedList"; + private static final String PUBLISHED_DEVICES = "PUBLISHED_DEVICES"; + private static final String DSP = "DSP"; + private static final ImmutableList DATA_TYPE_LIST = + ImmutableList.of(PUBLISHED_DEVICES, DSP); + private static final String ADDED_FIELD_IN_DSP_DELTA = "added"; + private static final String MODIFIED_FIELD_IN_DSP_DELTA = "modified"; + private static final String REMOVED_FIELD_IN_DSP_DELTA = "removed"; + + /** Command Line Flags. */ + static class Flags { + private Flags() {} + + // Shared parameters for both PublishedDevices and DSP. + @Parameter( + names = "-data_type", + description = "Set parsed data type. Must be \"PUBLISHED_DEVICES\" or \"DSP\".") + private String dataType = "PUBLISHED_DEVICES"; + + @Parameter( + names = "-original_file_path", + description = + "Path to original file. Could be the original file for either PublishedDevices or" + + " DeviceSecurityProfiles.") + private String originalFilePath = null; + + @Parameter( + names = "-new_file_path", + description = + "Path to new file. Could be the new file for either PublishedDevices or" + + " DeviceSecurityProfiles.") + private String newFilePath = null; + + @Parameter( + names = "-print", + description = "Setting to true, if content provider wants to print the delta in String.") + private boolean print = false; + + @Parameter(names = "-query", description = "Parse the input file.") + private String query = null; + + // Unique parameters for PublishedDevices. + @Parameter( + names = "-system_id", + description = "Device system-id shown in PublishedDevicesList.") + private int systemId = ZERO_SYSTEM_ID; + + @Parameter( + names = "-get_system_ids", + description = + "Boolean to get list of system_ids in added/removed/modified PublishedDevicesList.") + private boolean getSystemIdsList = false; + + // Unique parameters for DeviceSecurityProfiles. + @Parameter( + names = "-content_owner", + description = "Content owner name to retrieve corresponding DeviceSecurityProfiles.") + private String contentOwner = null; + + @Parameter( + names = "-get_specific_field_in_dsp_delta", + description = + "Optional. Obtain one specific field (added, removed or modified) in dsp delta." + + " Returned list covers all content owners.") + private String getSpecificFieldInDspDelta = null; + + @Parameter( + names = "-get_owners", + description = "Obtain owner list from one DeviceSecurityProfilesList.") + private boolean getOwners = false; + + @Parameter(names = "-profile_name", description = "device security profile name.") + private String profileName = null; + } + + /** Main function to run Published Devices Delta command line tool. */ + public static void main(String[] args) { + Flags flags = new Flags(); + new JCommander(flags).parse(args); + // Check the FLAGs. + if (!DATA_TYPE_LIST.contains(flags.dataType)) { + System.out.println("Data type should be selected from:" + DATA_TYPE_LIST); + logger.log(Level.SEVERE, "Data type should match with PUBLISHED_DEVICES or DSP."); + } + + if (flags.dataType.equals(PUBLISHED_DEVICES)) { + if (flags.newFilePath != null && flags.originalFilePath != null) { + parsePublishedDevicesDelta(flags); + } else if (flags.query != null) { + queryPublishedDevices(flags); + } + } else if (flags.dataType.equals(DSP)) { + if (flags.newFilePath != null && flags.originalFilePath != null) { + parseDeviceSecurityProfilesDelta(flags); + } else if (flags.query != null) { + queryDeviceSecurityProfiles(flags); + } + } + } + + /** Parse the argument related to PublishedDevicesDelta. */ + private static void parsePublishedDevicesDelta(Flags flags) { + try { + byte[] originalPublishedDevices = + getPublishedDevicesOrDspFileAsBytes(flags.originalFilePath, flags.dataType); + byte[] newPublishedDevices = + getPublishedDevicesOrDspFileAsBytes(flags.newFilePath, flags.dataType); + checkLoadFileResult(flags.originalFilePath, originalPublishedDevices); + checkLoadFileResult(flags.newFilePath, newPublishedDevices); + PublishedDevicesDeltaWrapper devices = + new PublishedDevicesDeltaWrapper(originalPublishedDevices, newPublishedDevices); + PublishedDevicesDelta delta = devices.getDelta(); + if (flags.print) { + System.out.println(delta); + } + parseDeltaInfo(devices, flags); + } catch (IOException e) { + logger.log( + Level.SEVERE, "IOException encountered trying to open published devices files: " + e); + } + } + + /** Parse the argument related to DeviceSecurityProfilesDelta. */ + private static void parseDeviceSecurityProfilesDelta(Flags flags) { + try { + byte[] originalDeviceSecurityProfiles = + getPublishedDevicesOrDspFileAsBytes(flags.originalFilePath, flags.dataType); + byte[] newDeviceSecurityProfiles = + getPublishedDevicesOrDspFileAsBytes(flags.newFilePath, flags.dataType); + checkLoadFileResult(flags.originalFilePath, originalDeviceSecurityProfiles); + checkLoadFileResult(flags.newFilePath, newDeviceSecurityProfiles); + DeviceSecurityProfilesDeltaWrapper dspDeltaWrapper = + new DeviceSecurityProfilesDeltaWrapper( + originalDeviceSecurityProfiles, newDeviceSecurityProfiles); + DeviceSecurityProfilesDelta delta = dspDeltaWrapper.getDelta(); + if (flags.print) { + System.out.println(delta); + } + parseDeltaInfo(dspDeltaWrapper, flags); + } catch (IOException e) { + logger.log( + Level.SEVERE, + "IOException encountered trying to open device security profiles files: " + e); + } + } + + /** Parse the detailed info shown in PublishedDevicesDelta. */ + private static void parseDeltaInfo( + PublishedDevicesDeltaWrapper publishedDevicesDelta, Flags flags) { + if (flags.systemId != 0) { + if (publishedDevicesDelta.getAddedDeviceCertificateStatus(flags.systemId) != null) { + System.out.println( + flags.systemId + " system-id is found in added field of published devices delta."); + System.out.println(publishedDevicesDelta.getAddedDeviceCertificateStatus(flags.systemId)); + + } else if (publishedDevicesDelta.getRemovedDeviceCertificateStatus(flags.systemId) != null) { + System.out.println( + flags.systemId + " system-id is found in removed field of published devices delta."); + System.out.println(publishedDevicesDelta.getRemovedDeviceCertificateStatus(flags.systemId)); + } else if (publishedDevicesDelta.getModifiedDeviceCertificateStatus(flags.systemId) != null) { + System.out.println( + flags.systemId + " system-id is found in modified field of published devices delta."); + System.out.println( + publishedDevicesDelta.getModifiedDeviceCertificateStatus(flags.systemId)); + } else { + logger.log(Level.SEVERE, flags.systemId + "was not found in the PublishedDevicesDelta."); + } + } + if (flags.getSystemIdsList) { + System.out.println( + "List of system_id for added published devices in published devices delta: " + + publishedDevicesDelta.getAddedDevices()); + System.out.println( + "List of system_id for removed published devices in published devices delta: " + + publishedDevicesDelta.getRemovedDevices()); + System.out.println( + "List of system_id for removed published devices in published devices delta: " + + publishedDevicesDelta.getModifiedDevices()); + } + } + + /** Parse the detailed info shown in DeviceSecurityProfilesDelta. */ + private static void parseDeltaInfo( + DeviceSecurityProfilesDeltaWrapper dspDeltaWrapper, Flags flags) { + if (flags.getSpecificFieldInDspDelta != null) { + if (Ascii.toLowerCase(flags.getSpecificFieldInDspDelta).equals(ADDED_FIELD_IN_DSP_DELTA)) { + System.out.println( + "List of added DSPs in device security profiles delta: " + + dspDeltaWrapper.getAddedDeviceSecurityProfiles()); + } else if (Ascii.toLowerCase(flags.getSpecificFieldInDspDelta) + .equals(MODIFIED_FIELD_IN_DSP_DELTA)) { + System.out.println( + "List of modified DSPs in device security profiles delta: " + + dspDeltaWrapper.getModifiedDeviceSecurityProfiles()); + } else if (Ascii.toLowerCase(flags.getSpecificFieldInDspDelta) + .equals(REMOVED_FIELD_IN_DSP_DELTA)) { + System.out.println( + "List of removed DSPs in device security profiles delta: " + + dspDeltaWrapper.getRemovedDeviceSecurityProfiles()); + } else { + logger.log( + Level.SEVERE, + flags.getSpecificFieldInDspDelta + + "is not a valid field in DeviceSecurityProfilesDelta."); + } + } + + if (flags.contentOwner != null) { + DspDelta dspDelta = dspDeltaWrapper.getDeviceSecurityProfilesDelta(flags.contentOwner); + if (dspDelta != null) { + System.out.println("Obtain the dsp delta for specific content owner: " + dspDelta); + } else { + logger.log( + Level.WARNING, flags.contentOwner + "is not shown in DeviceSecurityProfilesDelta."); + } + } + } + + private static void queryPublishedDevices(Flags flags) { + try { + byte[] publishedDevices = getPublishedDevicesOrDspFileAsBytes(flags.query, flags.dataType); + checkLoadFileResult(flags.query, publishedDevices); + PublishedDevicesWrapper wrapper = new PublishedDevicesWrapper(publishedDevices); + if (flags.systemId != ZERO_SYSTEM_ID) { + DeviceCertificateStatus deviceCertificateStatus = + wrapper.getDeviceCertificateStatus(flags.systemId); + if (deviceCertificateStatus == null) { + logger.log( + Level.SEVERE, + flags.systemId + + " (system-id) was not found in PublishedDevicesList from " + + flags.query); + System.exit(1); + } + System.out.println(deviceCertificateStatus); + // TODO(b/160253740): Add ProvisonedStatus and ProvisionedDeviceInfo functions. + } + } catch (InvalidProtocolBufferException e) { + logger.log( + Level.SEVERE, + "InvalidProtocolBufferException encountered to parse device certificate status list" + + " or published devices proto:" + + e); + } catch (IOException e) { + logger.log( + Level.SEVERE, "IOException encountered trying to open published devices file: " + e); + } + } + + private static void queryDeviceSecurityProfiles(Flags flags) { + try { + byte[] deviceSecurityProfiles = + getPublishedDevicesOrDspFileAsBytes(flags.query, flags.dataType); + checkLoadFileResult(flags.query, deviceSecurityProfiles); + DeviceSecurityProfilesWrapper dspWrapper = + new DeviceSecurityProfilesWrapper(deviceSecurityProfiles); + if (flags.contentOwner != null && flags.profileName != null) { + SecurityProfile securityProfile = + dspWrapper.getDeviceSecurityProfile(flags.contentOwner, flags.profileName); + if (securityProfile == null) { + logger.log( + Level.WARNING, + flags.contentOwner + + " (content owner) and" + + flags.profileName + + " (profile name) " + + "were not found in DeviceSecurityProfiles from " + + flags.query); + } else { + System.out.println(securityProfile); + } + } else if (flags.contentOwner != null) { + List securityProfiles = + dspWrapper.getDeviceSecurityProfiles(flags.contentOwner); + if (securityProfiles == null || securityProfiles.isEmpty()) { + logger.log( + Level.WARNING, + flags.contentOwner + + " (content owner) was not found in DeviceSecurityProfiles from " + + flags.query); + } else { + System.out.println(Arrays.toString(securityProfiles.toArray())); + } + } + if (flags.getOwners) { + List ownerList = dspWrapper.getOwners(); + if (ownerList == null || ownerList.isEmpty()) { + logger.log( + Level.WARNING, + " owner list was not found in DeviceSecurityProfiles from " + flags.query); + } + System.out.println(Arrays.toString(ownerList.toArray())); + } + } catch (InvalidProtocolBufferException e) { + logger.log( + Level.SEVERE, + "InvalidProtocolBufferException encountered while parsing device security profile list" + + " or device security profiles proto:" + + e); + } catch (IOException e) { + logger.log( + Level.SEVERE, + "IOException encountered trying to open device security profiles file: " + e); + } + } + + private static void checkLoadFileResult(String filePath, byte[] result) { + if (result == null) { + logger.log(Level.SEVERE, "Fail to load the file:" + filePath); + System.exit(1); + } + } + + /** + * Load published devices or device security profiles file into string. For published devices v1, + * it would be a json file. + * + * @param filePath file path in String. + * @return byte array file content in String. + * @throws IOException if failed to read the file. + */ + public static byte[] getPublishedDevicesOrDspFileAsBytes(String filePath, String dataType) + throws IOException { + String result = loadFile(filePath); + if (!DATA_TYPE_LIST.contains(dataType) || result == null) { + return null; + } + byte[] serializedList; + if (dataType.equals(PUBLISHED_DEVICES)) { + String requestBody = ""; + try { + // Parse both PublishedDevices v1 output. + JSONObject obj = new JSONObject(result); + requestBody = obj.getString(JSON_NAME); + } catch (JSONException e) { + // Parse both PublishedDevices v2 output. + requestBody = result; + } + serializedList = base64Decode(requestBody); + } else { + serializedList = base64Decode(result); + } + return serializedList; + } + + /** + * Load file into string. + * + * @param filePath file path in String. + * @return String file content in String. + * @throws IOException if failed to read the file. + */ + public static String loadFile(String filePath) throws IOException { + StringBuilder result = new StringBuilder(); + List input = Files.readAllLines(Path.of(filePath)); + for (String element : input) { + result.append(element); + } + return result.toString(); + } + + /** + * Decodes a base64-encoded std::string or web-safe base64-encoded string. + * + * @param base64EncodedData base64 encode data in String. + * @return byte[] decoded std::string in byte array. + */ + public static byte[] base64Decode(String base64EncodedData) { + try { + return base64().decode(base64EncodedData); + } catch (IllegalArgumentException e) { + // Do nothing. Try the url safe base64 decode next. + } + return base64Url().decode(base64EncodedData); + } + + private PublishedDevicesMain() {} +} diff --git a/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesWrapper.java b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesWrapper.java new file mode 100644 index 0000000..bd48f0d --- /dev/null +++ b/centos/tools/src/testing/java/com/google/video/widevine/jts/tools/PublishedDevicesWrapper.java @@ -0,0 +1,110 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2020 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// +package com.google.video.widevine.jts.tools; + +import static com.google.common.base.Preconditions.checkNotNull; + +import com.google.chrome.widevine.contentpartners.v1beta1.PublishedDevices; +import com.google.protobuf.ExtensionRegistry; +import com.google.protobuf.InvalidProtocolBufferException; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.DeviceCertificateStatus; +import com.google.video.widevine.protos.DeviceCertificateStatusProtos.PublishedDevicesList; +import com.google.video.widevine.protos.PublishedDevicesDeltaProtos.PublishedDevicesDelta; +import java.util.LinkedHashMap; +import java.util.Map; + +/** Wrap the PublishedDevices proto in PublishedDevicesWrapper. */ +final class PublishedDevicesWrapper { + private PublishedDevices publishedDevices = null; + private PublishedDevicesList publishedDevicesList = null; + private final Map dcslMap = new LinkedHashMap<>(); + + /** Constructor to create PublishedDevicesWrapper object with {@link PublishedDevices} */ + public PublishedDevicesWrapper(PublishedDevices publishedDevices) + throws InvalidProtocolBufferException { + checkNotNull(publishedDevices, "'published devices' must not be null"); + this.publishedDevices = publishedDevices; + parsePublishedDevicesList(); + } + + /** + * Constructor to create PublishedDevicesWrapper object with byte array from {@link + * PublishedDevices} serialized proto. + */ + public PublishedDevicesWrapper(byte[] publishedDevicesInfo) + throws InvalidProtocolBufferException { + checkNotNull(publishedDevicesInfo, "'published devices' must not be null"); + publishedDevices = + PublishedDevices.parseFrom(publishedDevicesInfo, ExtensionRegistry.getEmptyRegistry()); + parsePublishedDevicesList(); + } + + private void parsePublishedDevicesList() throws InvalidProtocolBufferException { + publishedDevicesList = + PublishedDevicesList.parseFrom( + publishedDevices.getPublishedDevices(), ExtensionRegistry.getEmptyRegistry()); + + // Add all the original DCSLs into the map. + for (DeviceCertificateStatus dcsl : publishedDevicesList.getDeviceCertificateStatusList()) { + dcslMap.put(dcsl.getDeviceInfo().getSystemId(), dcsl); + } + } + + /** + * Get PublishedDevicesList . + * + * @return {@link PublishedDevicesList} field in {@link PublishedDevices}. + */ + public PublishedDevicesList getPublishedDevicesList() { + + return publishedDevicesList; + } + /** + * Get DeviceCertificateStatus for specific systemId. + * + * @param systemId systemId in Integer. + * @return {@link DeviceCertificateStatus} for specific systemId. + */ + public DeviceCertificateStatus getDeviceCertificateStatus(int systemId) { + return dcslMap.get(systemId); + } + + /** + * Get the size of PublishedDevicesList. + * + * @return int Size of PublishedDevicesList. + */ + public int getSize() { + return publishedDevicesList.getDeviceCertificateStatusCount(); + } + + /** + * Return PublishedDevicesList as a String. + * + * @return {@link PublishedDevicesList} in String. + */ + @Override + public String toString() { + return publishedDevicesList.toString(); + } + + /** + * Get {@link PublishedDevicesDelta} by getting delta of new PublishedDevices with current + * PublishedDevices. + * + * @param newPublishedDevices PublishedDevices proto. + * @return {@link PublishedDevicesDelta}. + * @throws InvalidProtocolBufferException if failed to parse published devices. + */ + public PublishedDevicesDelta getPublishedDevicesDelta(PublishedDevices newPublishedDevices) + throws InvalidProtocolBufferException { + PublishedDevicesDeltaWrapper delta = + new PublishedDevicesDeltaWrapper(this.publishedDevices, newPublishedDevices); + return delta.getDelta(); + } +} diff --git a/centos/util/BUILD b/centos/util/BUILD new file mode 100644 index 0000000..358c019 --- /dev/null +++ b/centos/util/BUILD @@ -0,0 +1,18 @@ +######################################## +## Copyright 2022 Google LLC +## +## This software is licensed under the terms defined in the Widevine Master +## License Agreement. For a copy of this agreement, please contact +## widevine-licensing@google.com. +######################################## + +package( + default_visibility = ["//visibility:public"], +) + +filegroup( + name = "exported_sdk_header_files", + srcs = [ + "error_space.h", + ], +) diff --git a/centos/util/error_space.h b/centos/util/error_space.h new file mode 100755 index 0000000..9f6eb95 --- /dev/null +++ b/centos/util/error_space.h @@ -0,0 +1,87 @@ +//////////////////////////////////////////////////////////////////////////////// +//// Copyright 2017 Google LLC +//// +//// This software is licensed under the terms defined in the Widevine Master +//// License Agreement. For a copy of this agreement, please contact +//// widevine-licensing@google.com. +//////////////////////////////////////////////////////////////////////////////// + +#ifndef VIDEO_WIDEVINE_EXPORT_EXPORTED_ROOT_UTIL_ERROR_SPACE_H_ +#define VIDEO_WIDEVINE_EXPORT_EXPORTED_ROOT_UTIL_ERROR_SPACE_H_ + +#include + +#include "absl/strings/string_view.h" + +namespace video_widevine { +namespace util { + +class ErrorSpace { + public: + absl::string_view SpaceName() const { return space_name_func_(this); } + std::string String(int code) const { + return code_to_string_func_(this, code); + } + + protected: + // typedef instead of using statements for SWIG compatibility. + typedef absl::string_view (*SpaceNameFunc)(const ErrorSpace* space); + typedef std::string (*CodeToStringFunc)(const ErrorSpace* space, int code); + constexpr ErrorSpace(SpaceNameFunc space_name_func, + CodeToStringFunc code_to_string_func) + : space_name_func_(space_name_func), + code_to_string_func_(code_to_string_func) {} + + private: + const SpaceNameFunc space_name_func_; + const CodeToStringFunc code_to_string_func_; +}; + +// Manages creation of error space subclasses. +template +class ErrorSpaceImpl : public ErrorSpace { + public: + constexpr ErrorSpaceImpl() + : ErrorSpace(&ErrorSpaceImpl::SpaceNameImpl, + &ErrorSpaceImpl::CodeToStringImpl) {} + + // Returns the canonical instance of the `T` error space. + static constexpr const T* Get(); + + private: + // These functions adapt the stateful implementation that takes a space + // pointer to stateless static methods, so that clients of ErrorSpaceImpl are + // safe to have constexpr global instances. + static absl::string_view SpaceNameImpl(const ErrorSpace* /*space*/) { + return T::space_name(); + } + + static std::string CodeToStringImpl(const ErrorSpace* /*space*/, int code) { + return T::code_to_string(code); + } +}; + +namespace internal { + +// Provides a global constexpr instance of the error space `T`. +// We need the indirection because ErrorSpaceImpl can't declare constexpr +// instances of T since it is not yet fully declared. +template +struct ErrorSpaceInstance { + static constexpr T value = {}; +}; + +template +constexpr T ErrorSpaceInstance::value; + +} // namespace internal + +template +constexpr const T* ErrorSpaceImpl::Get() { + return &internal::ErrorSpaceInstance::value; +} + +} // namespace util +} // namespace video_widevine + +#endif // VIDEO_WIDEVINE_EXPORT_EXPORTED_ROOT_UTIL_ERROR_SPACE_H_