blob: 6087dcc6d6b7915e028114f02754bc181c37e566 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "media/cdm/ppapi/external_clear_key/clear_key_cdm.h"
#include <algorithm>
#include <cstring>
#include <sstream>
#include "base/bind.h"
#include "base/logging.h"
#include "base/stl_util.h"
#include "base/time/time.h"
#include "base/trace_event/trace_event.h"
#include "media/base/cdm_callback_promise.h"
#include "media/base/cdm_key_information.h"
#include "media/base/decoder_buffer.h"
#include "media/base/decrypt_config.h"
#include "media/base/key_systems.h"
#include "media/cdm/json_web_key.h"
#include "media/cdm/ppapi/cdm_file_io_test.h"
#include "media/cdm/ppapi/external_clear_key/cdm_video_decoder.h"
#include "url/gurl.h"
#if defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
#include "base/basictypes.h"
const int64 kNoTimestamp = kint64min;
#endif // CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
#include "base/at_exit.h"
#include "base/files/file_path.h"
#include "base/path_service.h"
#include "media/base/media.h"
#include "media/cdm/ppapi/external_clear_key/ffmpeg_cdm_audio_decoder.h"
#include "media/cdm/ppapi/external_clear_key/ffmpeg_cdm_video_decoder.h"
// Include FFmpeg avformat.h for av_register_all().
extern "C" {
// Temporarily disable possible loss of data warning.
MSVC_PUSH_DISABLE_WARNING(4244);
#include <libavformat/avformat.h>
MSVC_POP_WARNING();
} // extern "C"
#if !defined COMPONENT_BUILD
static base::AtExitManager g_at_exit_manager;
#endif
// Prepare media library.
static bool InitializeFFmpegLibraries() {
media::InitializeMediaLibrary();
return true;
}
static bool g_ffmpeg_lib_initialized = InitializeFFmpegLibraries();
#endif // CLEAR_KEY_CDM_USE_FFMPEG_DECODER
const char kClearKeyCdmVersion[] = "0.1.0.1";
const char kExternalClearKeyKeySystem[] = "org.chromium.externalclearkey";
const char kExternalClearKeyDecryptOnlyKeySystem[] =
"org.chromium.externalclearkey.decryptonly";
const char kExternalClearKeyFileIOTestKeySystem[] =
"org.chromium.externalclearkey.fileiotest";
const char kExternalClearKeyCrashKeySystem[] =
"org.chromium.externalclearkey.crash";
// Constants for the enumalted session that can be loaded by LoadSession().
// These constants need to be in sync with
// chrome/test/data/media/encrypted_media_utils.js
const char kLoadableSessionId[] = "LoadableSession";
const uint8 kLoadableSessionKeyId[] = "0123456789012345";
const uint8 kLoadableSessionKey[] =
{0xeb, 0xdd, 0x62, 0xf1, 0x68, 0x14, 0xd2, 0x7b,
0x68, 0xef, 0x12, 0x2a, 0xfc, 0xe4, 0xae, 0x3c};
const int64 kSecondsPerMinute = 60;
const int64 kMsPerSecond = 1000;
const int64 kInitialTimerDelayMs = 200;
const int64 kMaxTimerDelayMs = 1 * kSecondsPerMinute * kMsPerSecond;
// Renewal message header. For prefixed EME, if a key message starts with
// |kRenewalHeader|, it's a renewal message. Otherwise, it's a key request.
// FIXME(jrummell): Remove this once prefixed EME goes away.
const char kRenewalHeader[] = "RENEWAL";
// CDM file IO test result header.
const char kFileIOTestResultHeader[] = "FILEIOTESTRESULT";
// Copies |input_buffer| into a media::DecoderBuffer. If the |input_buffer| is
// empty, an empty (end-of-stream) media::DecoderBuffer is returned.
static scoped_refptr<media::DecoderBuffer> CopyDecoderBufferFrom(
const cdm::InputBuffer& input_buffer) {
if (!input_buffer.data) {
DCHECK(!input_buffer.data_size);
return media::DecoderBuffer::CreateEOSBuffer();
}
// TODO(xhwang): Get rid of this copy.
scoped_refptr<media::DecoderBuffer> output_buffer =
media::DecoderBuffer::CopyFrom(input_buffer.data, input_buffer.data_size);
std::vector<media::SubsampleEntry> subsamples;
for (uint32_t i = 0; i < input_buffer.num_subsamples; ++i) {
subsamples.push_back(
media::SubsampleEntry(input_buffer.subsamples[i].clear_bytes,
input_buffer.subsamples[i].cipher_bytes));
}
scoped_ptr<media::DecryptConfig> decrypt_config(new media::DecryptConfig(
std::string(reinterpret_cast<const char*>(input_buffer.key_id),
input_buffer.key_id_size),
std::string(reinterpret_cast<const char*>(input_buffer.iv),
input_buffer.iv_size),
subsamples));
output_buffer->set_decrypt_config(decrypt_config.Pass());
output_buffer->set_timestamp(
base::TimeDelta::FromMicroseconds(input_buffer.timestamp));
return output_buffer;
}
static std::string GetFileIOTestResultMessage(bool success) {
std::string message(kFileIOTestResultHeader);
message += success ? '1' : '0';
return message;
}
static cdm::Error ConvertException(media::MediaKeys::Exception exception_code) {
switch (exception_code) {
case media::MediaKeys::NOT_SUPPORTED_ERROR:
return cdm::kNotSupportedError;
case media::MediaKeys::INVALID_STATE_ERROR:
return cdm::kInvalidStateError;
case media::MediaKeys::INVALID_ACCESS_ERROR:
return cdm::kInvalidAccessError;
case media::MediaKeys::QUOTA_EXCEEDED_ERROR:
return cdm::kQuotaExceededError;
case media::MediaKeys::UNKNOWN_ERROR:
return cdm::kUnknownError;
case media::MediaKeys::CLIENT_ERROR:
return cdm::kClientError;
case media::MediaKeys::OUTPUT_ERROR:
return cdm::kOutputError;
}
NOTREACHED();
return cdm::kUnknownError;
}
static media::MediaKeys::SessionType ConvertSessionType(
cdm::SessionType session_type) {
switch (session_type) {
case cdm::kTemporary:
return media::MediaKeys::TEMPORARY_SESSION;
case cdm::kPersistentLicense:
return media::MediaKeys::PERSISTENT_LICENSE_SESSION;
case cdm::kPersistentKeyRelease:
return media::MediaKeys::PERSISTENT_RELEASE_MESSAGE_SESSION;
}
NOTREACHED();
return media::MediaKeys::TEMPORARY_SESSION;
}
static media::EmeInitDataType ConvertInitDataType(
cdm::InitDataType init_data_type) {
switch (init_data_type) {
case cdm::kCenc:
return media::EmeInitDataType::CENC;
case cdm::kKeyIds:
return media::EmeInitDataType::KEYIDS;
case cdm::kWebM:
return media::EmeInitDataType::WEBM;
}
NOTREACHED();
return media::EmeInitDataType::UNKNOWN;
}
cdm::KeyStatus ConvertKeyStatus(media::CdmKeyInformation::KeyStatus status) {
switch (status) {
case media::CdmKeyInformation::KeyStatus::USABLE:
return cdm::kUsable;
case media::CdmKeyInformation::KeyStatus::INTERNAL_ERROR:
return cdm::kInternalError;
case media::CdmKeyInformation::KeyStatus::EXPIRED:
return cdm::kExpired;
case media::CdmKeyInformation::KeyStatus::OUTPUT_NOT_ALLOWED:
return cdm::kOutputNotAllowed;
case media::CdmKeyInformation::KeyStatus::OUTPUT_DOWNSCALED:
return cdm::kOutputDownscaled;
case media::CdmKeyInformation::KeyStatus::KEY_STATUS_PENDING:
return cdm::kStatusPending;
}
NOTREACHED();
return cdm::kInternalError;
}
// Shallow copy all the key information from |keys_info| into |keys_vector|.
// |keys_vector| is only valid for the lifetime of |keys_info| because it
// contains pointers into the latter.
void ConvertCdmKeysInfo(const std::vector<media::CdmKeyInformation*>& keys_info,
std::vector<cdm::KeyInformation>* keys_vector) {
keys_vector->reserve(keys_info.size());
for (const auto& key_info : keys_info) {
cdm::KeyInformation key;
key.key_id = vector_as_array(&key_info->key_id);
key.key_id_size = key_info->key_id.size();
key.status = ConvertKeyStatus(key_info->status);
key.system_code = key_info->system_code;
keys_vector->push_back(key);
}
}
template<typename Type>
class ScopedResetter {
public:
explicit ScopedResetter(Type* object) : object_(object) {}
~ScopedResetter() { object_->Reset(); }
private:
Type* const object_;
};
void INITIALIZE_CDM_MODULE() {
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
av_register_all();
#endif // CLEAR_KEY_CDM_USE_FFMPEG_DECODER
}
void DeinitializeCdmModule() {
}
void* CreateCdmInstance(int cdm_interface_version,
const char* key_system, uint32_t key_system_size,
GetCdmHostFunc get_cdm_host_func,
void* user_data) {
DVLOG(1) << "CreateCdmInstance()";
std::string key_system_string(key_system, key_system_size);
if (key_system_string != kExternalClearKeyKeySystem &&
key_system_string != kExternalClearKeyDecryptOnlyKeySystem &&
key_system_string != kExternalClearKeyFileIOTestKeySystem &&
key_system_string != kExternalClearKeyCrashKeySystem) {
DVLOG(1) << "Unsupported key system:" << key_system_string;
return NULL;
}
if (cdm_interface_version != media::ClearKeyCdmInterface::kVersion)
return NULL;
media::ClearKeyCdmHost* host = static_cast<media::ClearKeyCdmHost*>(
get_cdm_host_func(media::ClearKeyCdmHost::kVersion, user_data));
if (!host)
return NULL;
// TODO(jrummell): Obtain the proper origin for this instance.
return new media::ClearKeyCdm(host, key_system_string, GURL::EmptyGURL());
}
const char* GetCdmVersion() {
return kClearKeyCdmVersion;
}
namespace media {
ClearKeyCdm::ClearKeyCdm(ClearKeyCdmHost* host,
const std::string& key_system,
const GURL& origin)
: decryptor_(
origin,
base::Bind(&ClearKeyCdm::OnSessionMessage, base::Unretained(this)),
base::Bind(&ClearKeyCdm::OnSessionClosed, base::Unretained(this)),
base::Bind(&ClearKeyCdm::OnSessionKeysChange,
base::Unretained(this))),
host_(host),
key_system_(key_system),
has_received_keys_change_event_for_emulated_loadsession_(false),
timer_delay_ms_(kInitialTimerDelayMs),
renewal_timer_set_(false) {
#if defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
channel_count_ = 0;
bits_per_channel_ = 0;
samples_per_second_ = 0;
output_timestamp_base_in_microseconds_ = kNoTimestamp;
total_samples_generated_ = 0;
#endif // CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER
}
ClearKeyCdm::~ClearKeyCdm() {}
void ClearKeyCdm::Initialize(bool /* allow_distinctive_identifier */,
bool /* allow_persistent_state */) {
// Implementation doesn't use distinctive identifier nor save persistent data,
// so nothing to do with these values.
}
void ClearKeyCdm::CreateSessionAndGenerateRequest(
uint32 promise_id,
cdm::SessionType session_type,
cdm::InitDataType init_data_type,
const uint8* init_data,
uint32 init_data_size) {
DVLOG(1) << __FUNCTION__;
scoped_ptr<media::NewSessionCdmPromise> promise(
new media::CdmCallbackPromise<std::string>(
base::Bind(&ClearKeyCdm::OnSessionCreated,
base::Unretained(this),
promise_id),
base::Bind(&ClearKeyCdm::OnPromiseFailed,
base::Unretained(this),
promise_id)));
decryptor_.CreateSessionAndGenerateRequest(
ConvertSessionType(session_type), ConvertInitDataType(init_data_type),
std::vector<uint8_t>(init_data, init_data + init_data_size),
promise.Pass());
if (key_system_ == kExternalClearKeyFileIOTestKeySystem)
StartFileIOTest();
}
// Loads a emulated stored session. Currently only |kLoadableSessionId|
// (containing a |kLoadableSessionKey| for |kLoadableSessionKeyId|) is
// supported.
void ClearKeyCdm::LoadSession(uint32 promise_id,
cdm::SessionType session_type,
const char* session_id,
uint32_t session_id_length) {
DVLOG(1) << __FUNCTION__;
DCHECK_EQ(session_type, cdm::kPersistentLicense);
if (std::string(kLoadableSessionId) !=
std::string(session_id, session_id_length)) {
// TODO(jrummell): This should be resolved with undefined, not rejected.
std::string message("Incorrect session id specified for LoadSession().");
host_->OnRejectPromise(promise_id,
cdm::kInvalidAccessError,
0,
message.data(),
message.length());
return;
}
// Only allowed to successfully load this session once.
DCHECK(session_id_for_emulated_loadsession_.empty());
scoped_ptr<media::NewSessionCdmPromise> promise(
new media::CdmCallbackPromise<std::string>(
base::Bind(&ClearKeyCdm::OnSessionLoaded,
base::Unretained(this),
promise_id),
base::Bind(&ClearKeyCdm::OnPromiseFailed,
base::Unretained(this),
promise_id)));
decryptor_.CreateSessionAndGenerateRequest(
MediaKeys::TEMPORARY_SESSION, EmeInitDataType::WEBM,
std::vector<uint8_t>(), promise.Pass());
}
void ClearKeyCdm::UpdateSession(uint32 promise_id,
const char* session_id,
uint32_t session_id_length,
const uint8* response,
uint32 response_size) {
DVLOG(1) << __FUNCTION__;
std::string web_session_str(session_id, session_id_length);
// If updating the loadable session, use the actual session id generated.
if (web_session_str == std::string(kLoadableSessionId))
web_session_str = session_id_for_emulated_loadsession_;
scoped_ptr<media::SimpleCdmPromise> promise(new media::CdmCallbackPromise<>(
base::Bind(&ClearKeyCdm::OnPromiseResolved, base::Unretained(this),
promise_id),
base::Bind(&ClearKeyCdm::OnPromiseFailed, base::Unretained(this),
promise_id)));
decryptor_.UpdateSession(
web_session_str, std::vector<uint8_t>(response, response + response_size),
promise.Pass());
if (!renewal_timer_set_) {
ScheduleNextRenewal();
renewal_timer_set_ = true;
}
}
void ClearKeyCdm::CloseSession(uint32 promise_id,
const char* session_id,
uint32_t session_id_length) {
DVLOG(1) << __FUNCTION__;
std::string web_session_str(session_id, session_id_length);
// If closing the loadable session, use the actual session id generated.
if (web_session_str == std::string(kLoadableSessionId))
web_session_str = session_id_for_emulated_loadsession_;
scoped_ptr<media::SimpleCdmPromise> promise(new media::CdmCallbackPromise<>(
base::Bind(
&ClearKeyCdm::OnPromiseResolved, base::Unretained(this), promise_id),
base::Bind(
&ClearKeyCdm::OnPromiseFailed, base::Unretained(this), promise_id)));
decryptor_.CloseSession(web_session_str, promise.Pass());
}
void ClearKeyCdm::RemoveSession(uint32 promise_id,
const char* session_id,
uint32_t session_id_length) {
DVLOG(1) << __FUNCTION__;
std::string web_session_str(session_id, session_id_length);
// RemoveSession only allowed for the loadable session.
if (web_session_str == std::string(kLoadableSessionId)) {
web_session_str = session_id_for_emulated_loadsession_;
} else {
// TODO(jrummell): This should be a DCHECK once blink does the proper
// checks.
std::string message("Not supported for non-persistent sessions.");
host_->OnRejectPromise(promise_id,
cdm::kInvalidAccessError,
0,
message.data(),
message.length());
return;
}
scoped_ptr<media::SimpleCdmPromise> promise(new media::CdmCallbackPromise<>(
base::Bind(&ClearKeyCdm::OnPromiseResolved, base::Unretained(this),
promise_id),
base::Bind(&ClearKeyCdm::OnPromiseFailed, base::Unretained(this),
promise_id)));
decryptor_.RemoveSession(web_session_str, promise.Pass());
}
void ClearKeyCdm::SetServerCertificate(uint32 promise_id,
const uint8_t* server_certificate_data,
uint32_t server_certificate_data_size) {
// ClearKey doesn't use a server certificate.
host_->OnResolvePromise(promise_id);
}
void ClearKeyCdm::TimerExpired(void* context) {
if (context == &session_id_for_emulated_loadsession_) {
LoadLoadableSession();
return;
}
DCHECK(renewal_timer_set_);
std::string renewal_message;
if (!next_renewal_message_.empty() &&
context == &next_renewal_message_[0]) {
renewal_message = next_renewal_message_;
} else {
renewal_message = "ERROR: Invalid timer context found!";
}
// This URL is only used for testing the code path for defaultURL.
// There is no service at this URL, so applications should ignore it.
const char url[] = "http://test.externalclearkey.chromium.org";
host_->OnSessionMessage(last_session_id_.data(), last_session_id_.length(),
cdm::kLicenseRenewal, renewal_message.data(),
renewal_message.length(), url, arraysize(url) - 1);
ScheduleNextRenewal();
}
static void CopyDecryptResults(
media::Decryptor::Status* status_copy,
scoped_refptr<media::DecoderBuffer>* buffer_copy,
media::Decryptor::Status status,
const scoped_refptr<media::DecoderBuffer>& buffer) {
*status_copy = status;
*buffer_copy = buffer;
}
cdm::Status ClearKeyCdm::Decrypt(const cdm::InputBuffer& encrypted_buffer,
cdm::DecryptedBlock* decrypted_block) {
DVLOG(1) << "Decrypt()";
DCHECK(encrypted_buffer.data);
scoped_refptr<media::DecoderBuffer> buffer;
cdm::Status status = DecryptToMediaDecoderBuffer(encrypted_buffer, &buffer);
if (status != cdm::kSuccess)
return status;
DCHECK(buffer->data());
decrypted_block->SetDecryptedBuffer(
host_->Allocate(buffer->data_size()));
memcpy(reinterpret_cast<void*>(decrypted_block->DecryptedBuffer()->Data()),
buffer->data(),
buffer->data_size());
decrypted_block->DecryptedBuffer()->SetSize(buffer->data_size());
decrypted_block->SetTimestamp(buffer->timestamp().InMicroseconds());
return cdm::kSuccess;
}
cdm::Status ClearKeyCdm::InitializeAudioDecoder(
const cdm::AudioDecoderConfig& audio_decoder_config) {
if (key_system_ == kExternalClearKeyDecryptOnlyKeySystem)
return cdm::kSessionError;
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
if (!audio_decoder_)
audio_decoder_.reset(new media::FFmpegCdmAudioDecoder(host_));
if (!audio_decoder_->Initialize(audio_decoder_config))
return cdm::kSessionError;
return cdm::kSuccess;
#elif defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
channel_count_ = audio_decoder_config.channel_count;
bits_per_channel_ = audio_decoder_config.bits_per_channel;
samples_per_second_ = audio_decoder_config.samples_per_second;
return cdm::kSuccess;
#else
NOTIMPLEMENTED();
return cdm::kSessionError;
#endif // CLEAR_KEY_CDM_USE_FFMPEG_DECODER
}
cdm::Status ClearKeyCdm::InitializeVideoDecoder(
const cdm::VideoDecoderConfig& video_decoder_config) {
if (key_system_ == kExternalClearKeyDecryptOnlyKeySystem)
return cdm::kSessionError;
if (video_decoder_ && video_decoder_->is_initialized()) {
DCHECK(!video_decoder_->is_initialized());
return cdm::kSessionError;
}
// Any uninitialized decoder will be replaced.
video_decoder_ = CreateVideoDecoder(host_, video_decoder_config);
if (!video_decoder_)
return cdm::kSessionError;
return cdm::kSuccess;
}
void ClearKeyCdm::ResetDecoder(cdm::StreamType decoder_type) {
DVLOG(1) << "ResetDecoder()";
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
switch (decoder_type) {
case cdm::kStreamTypeVideo:
video_decoder_->Reset();
break;
case cdm::kStreamTypeAudio:
audio_decoder_->Reset();
break;
default:
NOTREACHED() << "ResetDecoder(): invalid cdm::StreamType";
}
#elif defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
if (decoder_type == cdm::kStreamTypeAudio) {
output_timestamp_base_in_microseconds_ = kNoTimestamp;
total_samples_generated_ = 0;
}
#endif // CLEAR_KEY_CDM_USE_FFMPEG_DECODER
}
void ClearKeyCdm::DeinitializeDecoder(cdm::StreamType decoder_type) {
DVLOG(1) << "DeinitializeDecoder()";
switch (decoder_type) {
case cdm::kStreamTypeVideo:
video_decoder_->Deinitialize();
break;
case cdm::kStreamTypeAudio:
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
audio_decoder_->Deinitialize();
#elif defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
output_timestamp_base_in_microseconds_ = kNoTimestamp;
total_samples_generated_ = 0;
#endif
break;
default:
NOTREACHED() << "DeinitializeDecoder(): invalid cdm::StreamType";
}
}
cdm::Status ClearKeyCdm::DecryptAndDecodeFrame(
const cdm::InputBuffer& encrypted_buffer,
cdm::VideoFrame* decoded_frame) {
DVLOG(1) << "DecryptAndDecodeFrame()";
TRACE_EVENT0("media", "ClearKeyCdm::DecryptAndDecodeFrame");
scoped_refptr<media::DecoderBuffer> buffer;
cdm::Status status = DecryptToMediaDecoderBuffer(encrypted_buffer, &buffer);
if (status != cdm::kSuccess)
return status;
const uint8_t* data = NULL;
int32_t size = 0;
int64_t timestamp = 0;
if (!buffer->end_of_stream()) {
data = buffer->data();
size = buffer->data_size();
timestamp = encrypted_buffer.timestamp;
}
return video_decoder_->DecodeFrame(data, size, timestamp, decoded_frame);
}
cdm::Status ClearKeyCdm::DecryptAndDecodeSamples(
const cdm::InputBuffer& encrypted_buffer,
cdm::AudioFrames* audio_frames) {
DVLOG(1) << "DecryptAndDecodeSamples()";
// Trigger a crash on purpose for testing purpose.
if (key_system_ == kExternalClearKeyCrashKeySystem)
CHECK(false);
scoped_refptr<media::DecoderBuffer> buffer;
cdm::Status status = DecryptToMediaDecoderBuffer(encrypted_buffer, &buffer);
if (status != cdm::kSuccess)
return status;
#if defined(CLEAR_KEY_CDM_USE_FFMPEG_DECODER)
const uint8_t* data = NULL;
int32_t size = 0;
int64_t timestamp = 0;
if (!buffer->end_of_stream()) {
data = buffer->data();
size = buffer->data_size();
timestamp = encrypted_buffer.timestamp;
}
return audio_decoder_->DecodeBuffer(data, size, timestamp, audio_frames);
#elif defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
int64 timestamp_in_microseconds = kNoTimestamp;
if (!buffer->end_of_stream()) {
timestamp_in_microseconds = buffer->GetTimestamp().InMicroseconds();
DCHECK(timestamp_in_microseconds != kNoTimestamp);
}
return GenerateFakeAudioFrames(timestamp_in_microseconds, audio_frames);
#else
return cdm::kSuccess;
#endif // CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER
}
void ClearKeyCdm::Destroy() {
DVLOG(1) << "Destroy()";
delete this;
}
void ClearKeyCdm::ScheduleNextRenewal() {
// Prepare the next renewal message and set timer.
std::ostringstream msg_stream;
msg_stream << kRenewalHeader << " from ClearKey CDM set at time "
<< host_->GetCurrentWallTime() << ".";
next_renewal_message_ = msg_stream.str();
host_->SetTimer(timer_delay_ms_, &next_renewal_message_[0]);
// Use a smaller timer delay at start-up to facilitate testing. Increase the
// timer delay up to a limit to avoid message spam.
if (timer_delay_ms_ < kMaxTimerDelayMs)
timer_delay_ms_ = std::min(2 * timer_delay_ms_, kMaxTimerDelayMs);
}
cdm::Status ClearKeyCdm::DecryptToMediaDecoderBuffer(
const cdm::InputBuffer& encrypted_buffer,
scoped_refptr<media::DecoderBuffer>* decrypted_buffer) {
DCHECK(decrypted_buffer);
scoped_refptr<media::DecoderBuffer> buffer =
CopyDecoderBufferFrom(encrypted_buffer);
if (buffer->end_of_stream()) {
*decrypted_buffer = buffer;
return cdm::kSuccess;
}
// Callback is called synchronously, so we can use variables on the stack.
media::Decryptor::Status status = media::Decryptor::kError;
// The AesDecryptor does not care what the stream type is. Pass kVideo
// for both audio and video decryption.
decryptor_.Decrypt(
media::Decryptor::kVideo,
buffer,
base::Bind(&CopyDecryptResults, &status, decrypted_buffer));
if (status == media::Decryptor::kError)
return cdm::kDecryptError;
if (status == media::Decryptor::kNoKey)
return cdm::kNoKey;
DCHECK_EQ(status, media::Decryptor::kSuccess);
return cdm::kSuccess;
}
void ClearKeyCdm::OnPlatformChallengeResponse(
const cdm::PlatformChallengeResponse& response) {
NOTIMPLEMENTED();
}
void ClearKeyCdm::OnQueryOutputProtectionStatus(
cdm::QueryResult result,
uint32_t link_mask,
uint32_t output_protection_mask) {
NOTIMPLEMENTED();
};
void ClearKeyCdm::LoadLoadableSession() {
std::string jwk_set = GenerateJWKSet(kLoadableSessionKey,
sizeof(kLoadableSessionKey),
kLoadableSessionKeyId,
sizeof(kLoadableSessionKeyId) - 1);
scoped_ptr<media::SimpleCdmPromise> promise(new media::CdmCallbackPromise<>(
base::Bind(&ClearKeyCdm::OnLoadSessionUpdated, base::Unretained(this)),
base::Bind(&ClearKeyCdm::OnPromiseFailed, base::Unretained(this),
promise_id_for_emulated_loadsession_)));
decryptor_.UpdateSession(session_id_for_emulated_loadsession_,
std::vector<uint8_t>(jwk_set.begin(), jwk_set.end()),
promise.Pass());
}
void ClearKeyCdm::OnSessionMessage(const std::string& session_id,
MediaKeys::MessageType message_type,
const std::vector<uint8>& message,
const GURL& legacy_destination_url) {
DVLOG(1) << "OnSessionMessage: " << message.size();
// Ignore the message when we are waiting to update the loadable session.
if (session_id == session_id_for_emulated_loadsession_)
return;
// OnSessionMessage() only called during CreateSession(), so no promise
// involved (OnSessionCreated() called to resolve the CreateSession()
// promise).
host_->OnSessionMessage(session_id.data(), session_id.length(),
cdm::kLicenseRequest,
reinterpret_cast<const char*>(message.data()),
message.size(), legacy_destination_url.spec().data(),
legacy_destination_url.spec().size());
}
void ClearKeyCdm::OnSessionKeysChange(const std::string& session_id,
bool has_additional_usable_key,
CdmKeysInfo keys_info) {
DVLOG(1) << "OnSessionKeysChange: " << keys_info.size();
std::string new_session_id = session_id;
if (new_session_id == session_id_for_emulated_loadsession_) {
// Save |keys_info| if the loadable session is still being created. This
// event will then be forwarded on in OnLoadSessionUpdated().
if (promise_id_for_emulated_loadsession_ != 0) {
has_received_keys_change_event_for_emulated_loadsession_ = true;
keys_info_for_emulated_loadsession_.swap(keys_info);
return;
}
// Loadable session has already been created, so pass this event on,
// using the session_id callers expect to see.
new_session_id = std::string(kLoadableSessionId);
}
std::vector<cdm::KeyInformation> keys_vector;
ConvertCdmKeysInfo(keys_info.get(), &keys_vector);
host_->OnSessionKeysChange(new_session_id.data(), new_session_id.length(),
has_additional_usable_key,
vector_as_array(&keys_vector), keys_vector.size());
}
void ClearKeyCdm::OnSessionClosed(const std::string& session_id) {
std::string new_session_id = session_id;
if (new_session_id == session_id_for_emulated_loadsession_)
new_session_id = std::string(kLoadableSessionId);
host_->OnSessionClosed(new_session_id.data(), new_session_id.length());
}
void ClearKeyCdm::OnSessionCreated(uint32 promise_id,
const std::string& session_id) {
// Save the latest session ID for renewal and file IO test messages.
last_session_id_ = session_id;
host_->OnResolveNewSessionPromise(promise_id, session_id.data(),
session_id.length());
}
void ClearKeyCdm::OnSessionLoaded(uint32 promise_id,
const std::string& session_id) {
// Save the latest session ID for renewal and file IO test messages.
last_session_id_ = session_id;
// |decryptor_| created some session as |session_id|, but going forward
// we need to map that to |kLoadableSessionId|, as that is what callers
// expect.
session_id_for_emulated_loadsession_ = session_id;
// Delay LoadLoadableSession() to test the case where Decrypt*() calls are
// made before the session is fully loaded.
const int64 kDelayToLoadSessionMs = 500;
// Defer resolving the promise until the session is loaded.
promise_id_for_emulated_loadsession_ = promise_id;
// Use the address of |session_id_for_emulated_loadsession_| as the timer
// context so that we can call LoadLoadableSession() when the timer expires.
host_->SetTimer(kDelayToLoadSessionMs, &session_id_for_emulated_loadsession_);
}
void ClearKeyCdm::OnLoadSessionUpdated() {
// This method is only called to finish loading sessions, so handle
// appropriately.
// |promise_id_for_emulated_loadsession_| is the LoadSession() promise,
// so resolve appropriately.
host_->OnResolveNewSessionPromise(promise_id_for_emulated_loadsession_,
kLoadableSessionId,
strlen(kLoadableSessionId));
promise_id_for_emulated_loadsession_ = 0;
// Generate the KeysChange event now that the session is "loaded" if one
// was seen.
// TODO(jrummell): Once the order of events is fixed in the spec, either
// require the keyschange event to have happened, or remove this code.
// http://crbug.com/448225
if (has_received_keys_change_event_for_emulated_loadsession_) {
std::vector<cdm::KeyInformation> keys_vector;
CdmKeysInfo keys_info;
keys_info.swap(keys_info_for_emulated_loadsession_);
has_received_keys_change_event_for_emulated_loadsession_ = false;
DCHECK(!keys_vector.empty());
ConvertCdmKeysInfo(keys_info.get(), &keys_vector);
host_->OnSessionKeysChange(
kLoadableSessionId, strlen(kLoadableSessionId), !keys_vector.empty(),
vector_as_array(&keys_vector), keys_vector.size());
}
}
void ClearKeyCdm::OnPromiseResolved(uint32 promise_id) {
host_->OnResolvePromise(promise_id);
}
void ClearKeyCdm::OnPromiseFailed(uint32 promise_id,
MediaKeys::Exception exception_code,
uint32 system_code,
const std::string& error_message) {
host_->OnRejectPromise(promise_id,
ConvertException(exception_code),
system_code,
error_message.data(),
error_message.length());
}
#if defined(CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER)
int64 ClearKeyCdm::CurrentTimeStampInMicroseconds() const {
return output_timestamp_base_in_microseconds_ +
base::Time::kMicrosecondsPerSecond *
total_samples_generated_ / samples_per_second_;
}
int ClearKeyCdm::GenerateFakeAudioFramesFromDuration(
int64 duration_in_microseconds,
cdm::AudioFrames* audio_frames) const {
int64 samples_to_generate = static_cast<double>(samples_per_second_) *
duration_in_microseconds / base::Time::kMicrosecondsPerSecond + 0.5;
if (samples_to_generate <= 0)
return 0;
int64 bytes_per_sample = channel_count_ * bits_per_channel_ / 8;
// |frame_size| must be a multiple of |bytes_per_sample|.
int64 frame_size = bytes_per_sample * samples_to_generate;
int64 timestamp = CurrentTimeStampInMicroseconds();
const int kHeaderSize = sizeof(timestamp) + sizeof(frame_size);
audio_frames->SetFrameBuffer(host_->Allocate(kHeaderSize + frame_size));
uint8_t* data = audio_frames->FrameBuffer()->Data();
memcpy(data, &timestamp, sizeof(timestamp));
data += sizeof(timestamp);
memcpy(data, &frame_size, sizeof(frame_size));
data += sizeof(frame_size);
// You won't hear anything because we have all zeros here. But the video
// should play just fine!
memset(data, 0, frame_size);
audio_frames->FrameBuffer()->SetSize(kHeaderSize + frame_size);
return samples_to_generate;
}
cdm::Status ClearKeyCdm::GenerateFakeAudioFrames(
int64 timestamp_in_microseconds,
cdm::AudioFrames* audio_frames) {
if (timestamp_in_microseconds == kNoTimestamp)
return cdm::kNeedMoreData;
// Return kNeedMoreData for the first frame because duration is unknown.
if (output_timestamp_base_in_microseconds_ == kNoTimestamp) {
output_timestamp_base_in_microseconds_ = timestamp_in_microseconds;
return cdm::kNeedMoreData;
}
int samples_generated = GenerateFakeAudioFramesFromDuration(
timestamp_in_microseconds - CurrentTimeStampInMicroseconds(),
audio_frames);
total_samples_generated_ += samples_generated;
return samples_generated == 0 ? cdm::kNeedMoreData : cdm::kSuccess;
}
#endif // CLEAR_KEY_CDM_USE_FAKE_AUDIO_DECODER
void ClearKeyCdm::StartFileIOTest() {
file_io_test_runner_.reset(new FileIOTestRunner(
base::Bind(&ClearKeyCdmHost::CreateFileIO, base::Unretained(host_))));
file_io_test_runner_->RunAllTests(
base::Bind(&ClearKeyCdm::OnFileIOTestComplete, base::Unretained(this)));
}
void ClearKeyCdm::OnFileIOTestComplete(bool success) {
DVLOG(1) << __FUNCTION__ << ": " << success;
std::string message = GetFileIOTestResultMessage(success);
host_->OnSessionMessage(last_session_id_.data(), last_session_id_.length(),
cdm::kLicenseRequest, message.data(),
message.length(), NULL, 0);
file_io_test_runner_.reset();
}
} // namespace media