| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "ppapi/proxy/ppp_content_decryptor_private_proxy.h" |
| |
| #include "base/platform_file.h" |
| #include "ppapi/c/pp_bool.h" |
| #include "ppapi/c/ppb_core.h" |
| #include "ppapi/proxy/content_decryptor_private_serializer.h" |
| #include "ppapi/proxy/host_dispatcher.h" |
| #include "ppapi/proxy/plugin_globals.h" |
| #include "ppapi/proxy/plugin_resource_tracker.h" |
| #include "ppapi/proxy/ppapi_messages.h" |
| #include "ppapi/proxy/ppb_buffer_proxy.h" |
| #include "ppapi/proxy/serialized_var.h" |
| #include "ppapi/shared_impl/var_tracker.h" |
| #include "ppapi/thunk/enter.h" |
| #include "ppapi/thunk/ppb_buffer_api.h" |
| #include "ppapi/thunk/ppb_buffer_trusted_api.h" |
| #include "ppapi/thunk/ppb_instance_api.h" |
| #include "ppapi/thunk/thunk.h" |
| |
| using ppapi::thunk::EnterResourceNoLock; |
| using ppapi::thunk::PPB_Buffer_API; |
| using ppapi::thunk::PPB_BufferTrusted_API; |
| using ppapi::thunk::PPB_Instance_API; |
| |
| namespace ppapi { |
| namespace proxy { |
| |
| namespace { |
| |
| PP_Bool DescribeHostBufferResource(PP_Resource resource, uint32_t* size) { |
| EnterResourceNoLock<PPB_Buffer_API> enter(resource, true); |
| if (enter.failed()) |
| return PP_FALSE; |
| return enter.object()->Describe(size); |
| } |
| |
| // TODO(dmichael): Refactor so this handle sharing code is in one place. |
| PP_Bool ShareHostBufferResourceToPlugin( |
| HostDispatcher* dispatcher, |
| PP_Resource resource, |
| base::SharedMemoryHandle* shared_mem_handle) { |
| if (!dispatcher || resource == 0 || !shared_mem_handle) |
| return PP_FALSE; |
| EnterResourceNoLock<PPB_BufferTrusted_API> enter(resource, true); |
| if (enter.failed()) |
| return PP_FALSE; |
| int handle; |
| int32_t result = enter.object()->GetSharedMemory(&handle); |
| if (result != PP_OK) |
| return PP_FALSE; |
| base::PlatformFile platform_file = |
| #if defined(OS_WIN) |
| reinterpret_cast<HANDLE>(static_cast<intptr_t>(handle)); |
| #elif defined(OS_POSIX) |
| handle; |
| #else |
| #error Not implemented. |
| #endif |
| |
| *shared_mem_handle = dispatcher->ShareHandleWithRemote(platform_file, false); |
| return PP_TRUE; |
| } |
| |
| // SerializedVarReceiveInput will decrement the reference count, but we want |
| // to give the recipient a reference. This utility function takes care of that |
| // work for the message handlers defined below. |
| PP_Var ExtractReceivedVarAndAddRef(Dispatcher* dispatcher, |
| SerializedVarReceiveInput* serialized_var) { |
| PP_Var var = serialized_var->Get(dispatcher); |
| PpapiGlobals::Get()->GetVarTracker()->AddRefVar(var); |
| return var; |
| } |
| |
| // Increments the reference count on |resource| to ensure that it remains valid |
| // until the plugin receives the resource within the asynchronous message sent |
| // from the proxy. The plugin side takes ownership of that reference. Returns |
| // PP_TRUE when the reference is successfully added, PP_FALSE otherwise. |
| PP_Bool AddRefResourceForPlugin(HostDispatcher* dispatcher, |
| PP_Resource resource) { |
| const PPB_Core* core = static_cast<const PPB_Core*>( |
| dispatcher->local_get_interface()(PPB_CORE_INTERFACE)); |
| if (!core) { |
| NOTREACHED(); |
| return PP_FALSE; |
| } |
| core->AddRefResource(resource); |
| return PP_TRUE; |
| } |
| |
| void GenerateKeyRequest(PP_Instance instance, |
| PP_Var key_system, |
| PP_Var init_data) { |
| HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance); |
| if (!dispatcher) { |
| NOTREACHED(); |
| return; |
| } |
| |
| dispatcher->Send( |
| new PpapiMsg_PPPContentDecryptor_GenerateKeyRequest( |
| API_ID_PPP_CONTENT_DECRYPTOR_PRIVATE, |
| instance, |
| SerializedVarSendInput(dispatcher, key_system), |
| SerializedVarSendInput(dispatcher, init_data))); |
| } |
| |
| void AddKey(PP_Instance instance, |
| PP_Var session_id, |
| PP_Var key, |
| PP_Var init_data) { |
| HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance); |
| if (!dispatcher) { |
| NOTREACHED(); |
| return; |
| } |
| |
| dispatcher->Send( |
| new PpapiMsg_PPPContentDecryptor_AddKey( |
| API_ID_PPP_CONTENT_DECRYPTOR_PRIVATE, |
| instance, |
| SerializedVarSendInput(dispatcher, session_id), |
| SerializedVarSendInput(dispatcher, key), |
| SerializedVarSendInput(dispatcher, init_data))); |
| } |
| |
| void CancelKeyRequest(PP_Instance instance, PP_Var session_id) { |
| HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance); |
| if (!dispatcher) { |
| NOTREACHED(); |
| return; |
| } |
| |
| dispatcher->Send( |
| new PpapiMsg_PPPContentDecryptor_CancelKeyRequest( |
| API_ID_PPP_CONTENT_DECRYPTOR_PRIVATE, |
| instance, |
| SerializedVarSendInput(dispatcher, session_id))); |
| } |
| |
| void Decrypt(PP_Instance instance, |
| PP_Resource encrypted_block, |
| const PP_EncryptedBlockInfo* encrypted_block_info) { |
| HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance); |
| if (!dispatcher) { |
| NOTREACHED(); |
| return; |
| } |
| |
| if (!AddRefResourceForPlugin(dispatcher, encrypted_block)) { |
| NOTREACHED(); |
| return; |
| } |
| |
| HostResource host_resource; |
| host_resource.SetHostResource(instance, encrypted_block); |
| |
| uint32_t size = 0; |
| if (DescribeHostBufferResource(encrypted_block, &size) == PP_FALSE) |
| return; |
| |
| base::SharedMemoryHandle handle; |
| if (ShareHostBufferResourceToPlugin(dispatcher, |
| encrypted_block, |
| &handle) == PP_FALSE) |
| return; |
| |
| PPPDecryptor_Buffer buffer; |
| buffer.resource = host_resource; |
| buffer.handle = handle; |
| buffer.size = size; |
| |
| std::string serialized_block_info; |
| if (!SerializeBlockInfo(*encrypted_block_info, &serialized_block_info)) |
| return; |
| |
| dispatcher->Send( |
| new PpapiMsg_PPPContentDecryptor_Decrypt( |
| API_ID_PPP_CONTENT_DECRYPTOR_PRIVATE, |
| instance, |
| buffer, |
| serialized_block_info)); |
| } |
| |
| void DecryptAndDecode(PP_Instance instance, |
| PP_Resource encrypted_block, |
| const PP_EncryptedBlockInfo* encrypted_block_info) { |
| HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance); |
| if (!dispatcher) { |
| NOTREACHED(); |
| return; |
| } |
| |
| if (!AddRefResourceForPlugin(dispatcher, encrypted_block)) { |
| NOTREACHED(); |
| return; |
| } |
| |
| HostResource host_resource; |
| host_resource.SetHostResource(instance, encrypted_block); |
| |
| uint32_t size = 0; |
| if (DescribeHostBufferResource(encrypted_block, &size) == PP_FALSE) |
| return; |
| |
| base::SharedMemoryHandle handle; |
| if (ShareHostBufferResourceToPlugin(dispatcher, |
| encrypted_block, |
| &handle) == PP_FALSE) |
| return; |
| |
| PPPDecryptor_Buffer buffer; |
| buffer.resource = host_resource; |
| buffer.handle = handle; |
| buffer.size = size; |
| |
| std::string serialized_block_info; |
| if (!SerializeBlockInfo(*encrypted_block_info, &serialized_block_info)) |
| return; |
| |
| dispatcher->Send( |
| new PpapiMsg_PPPContentDecryptor_DecryptAndDecode( |
| API_ID_PPP_CONTENT_DECRYPTOR_PRIVATE, |
| instance, |
| buffer, |
| serialized_block_info)); |
| } |
| |
| static const PPP_ContentDecryptor_Private content_decryptor_interface = { |
| &GenerateKeyRequest, |
| &AddKey, |
| &CancelKeyRequest, |
| &Decrypt, |
| &DecryptAndDecode |
| }; |
| |
| InterfaceProxy* CreateContentDecryptorPPPProxy(Dispatcher* dispatcher) { |
| return new PPP_ContentDecryptor_Private_Proxy(dispatcher); |
| } |
| |
| } // namespace |
| |
| PPP_ContentDecryptor_Private_Proxy::PPP_ContentDecryptor_Private_Proxy( |
| Dispatcher* dispatcher) |
| : InterfaceProxy(dispatcher), |
| ppp_decryptor_impl_(NULL) { |
| if (dispatcher->IsPlugin()) { |
| ppp_decryptor_impl_ = static_cast<const PPP_ContentDecryptor_Private*>( |
| dispatcher->local_get_interface()( |
| PPP_CONTENTDECRYPTOR_PRIVATE_INTERFACE)); |
| } |
| } |
| |
| PPP_ContentDecryptor_Private_Proxy::~PPP_ContentDecryptor_Private_Proxy() { |
| } |
| |
| // static |
| const PPP_ContentDecryptor_Private* |
| PPP_ContentDecryptor_Private_Proxy::GetProxyInterface() { |
| return &content_decryptor_interface; |
| } |
| |
| bool PPP_ContentDecryptor_Private_Proxy::OnMessageReceived( |
| const IPC::Message& msg) { |
| bool handled = true; |
| IPC_BEGIN_MESSAGE_MAP(PPP_ContentDecryptor_Private_Proxy, msg) |
| IPC_MESSAGE_HANDLER(PpapiMsg_PPPContentDecryptor_GenerateKeyRequest, |
| OnMsgGenerateKeyRequest) |
| IPC_MESSAGE_HANDLER(PpapiMsg_PPPContentDecryptor_AddKey, |
| OnMsgAddKey) |
| IPC_MESSAGE_HANDLER(PpapiMsg_PPPContentDecryptor_CancelKeyRequest, |
| OnMsgCancelKeyRequest) |
| IPC_MESSAGE_HANDLER(PpapiMsg_PPPContentDecryptor_Decrypt, |
| OnMsgDecrypt) |
| IPC_MESSAGE_HANDLER(PpapiMsg_PPPContentDecryptor_DecryptAndDecode, |
| OnMsgDecryptAndDecode) |
| IPC_MESSAGE_UNHANDLED(handled = false) |
| IPC_END_MESSAGE_MAP() |
| DCHECK(handled); |
| return handled; |
| } |
| |
| void PPP_ContentDecryptor_Private_Proxy::OnMsgGenerateKeyRequest( |
| PP_Instance instance, |
| SerializedVarReceiveInput key_system, |
| SerializedVarReceiveInput init_data) { |
| if (ppp_decryptor_impl_) { |
| CallWhileUnlocked(ppp_decryptor_impl_->GenerateKeyRequest, |
| instance, |
| ExtractReceivedVarAndAddRef(dispatcher(), &key_system), |
| ExtractReceivedVarAndAddRef(dispatcher(), &init_data)); |
| } |
| } |
| |
| void PPP_ContentDecryptor_Private_Proxy::OnMsgAddKey( |
| PP_Instance instance, |
| SerializedVarReceiveInput session_id, |
| SerializedVarReceiveInput key, |
| SerializedVarReceiveInput init_data) { |
| if (ppp_decryptor_impl_) { |
| CallWhileUnlocked(ppp_decryptor_impl_->AddKey, |
| instance, |
| ExtractReceivedVarAndAddRef(dispatcher(), &session_id), |
| ExtractReceivedVarAndAddRef(dispatcher(), &key), |
| ExtractReceivedVarAndAddRef(dispatcher(), &init_data)); |
| } |
| } |
| |
| void PPP_ContentDecryptor_Private_Proxy::OnMsgCancelKeyRequest( |
| PP_Instance instance, |
| SerializedVarReceiveInput session_id) { |
| if (ppp_decryptor_impl_) { |
| CallWhileUnlocked(ppp_decryptor_impl_->CancelKeyRequest, |
| instance, |
| ExtractReceivedVarAndAddRef(dispatcher(), &session_id)); |
| } |
| } |
| |
| void PPP_ContentDecryptor_Private_Proxy::OnMsgDecrypt( |
| PP_Instance instance, |
| const PPPDecryptor_Buffer& encrypted_buffer, |
| const std::string& serialized_block_info) { |
| if (ppp_decryptor_impl_) { |
| PP_Resource plugin_resource = |
| PPB_Buffer_Proxy::AddProxyResource(encrypted_buffer.resource, |
| encrypted_buffer.handle, |
| encrypted_buffer.size); |
| PP_EncryptedBlockInfo block_info; |
| if (!DeserializeBlockInfo(serialized_block_info, &block_info)) |
| return; |
| CallWhileUnlocked(ppp_decryptor_impl_->Decrypt, |
| instance, |
| plugin_resource, |
| const_cast<const PP_EncryptedBlockInfo*>(&block_info)); |
| } |
| } |
| |
| void PPP_ContentDecryptor_Private_Proxy::OnMsgDecryptAndDecode( |
| PP_Instance instance, |
| const PPPDecryptor_Buffer& encrypted_buffer, |
| const std::string& serialized_block_info) { |
| if (ppp_decryptor_impl_) { |
| PP_Resource plugin_resource = |
| PPB_Buffer_Proxy::AddProxyResource(encrypted_buffer.resource, |
| encrypted_buffer.handle, |
| encrypted_buffer.size); |
| PP_EncryptedBlockInfo block_info; |
| if (!DeserializeBlockInfo(serialized_block_info, &block_info)) |
| return; |
| CallWhileUnlocked(ppp_decryptor_impl_->DecryptAndDecode, |
| instance, |
| plugin_resource, |
| const_cast<const PP_EncryptedBlockInfo*>(&block_info)); |
| } |
| } |
| |
| } // namespace proxy |
| } // namespace ppapi |