2017-01-05 17:32:17 +00:00
|
|
|
// Copyright 2017 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file or at
|
|
|
|
// https://developers.google.com/open-source/licenses/bsd
|
|
|
|
//
|
|
|
|
// Defines command line flags for playready encryption.
|
|
|
|
|
|
|
|
#include "packager/app/playready_key_encryption_flags.h"
|
|
|
|
|
|
|
|
#include "packager/app/validate_flag.h"
|
|
|
|
|
|
|
|
DEFINE_bool(enable_playready_encryption,
|
|
|
|
false,
|
|
|
|
"Enable encryption with playready key.");
|
|
|
|
DEFINE_string(playready_server_url, "", "PlayReady packaging server url.");
|
|
|
|
DEFINE_string(program_identifier, "",
|
|
|
|
"Program identifier for packaging request.");
|
2017-06-14 23:18:16 +00:00
|
|
|
DEFINE_hex_bytes(playready_key_id, "", "PlayReady key id in hex.");
|
|
|
|
DEFINE_hex_bytes(playready_key, "", "PlayReady key in hex.");
|
2017-01-05 17:32:17 +00:00
|
|
|
DEFINE_string(ca_file, "",
|
|
|
|
"Absolute path to the Certificate Authority file for the "
|
|
|
|
"server cert. PEM format");
|
|
|
|
DEFINE_string(client_cert_file, "",
|
|
|
|
"Absolute path to client certificate file.");
|
|
|
|
DEFINE_string(client_cert_private_key_file, "",
|
|
|
|
"Absolute path to the Private Key file.");
|
|
|
|
DEFINE_string(client_cert_private_key_password, "",
|
|
|
|
"Password to the private key file.");
|
|
|
|
|
|
|
|
namespace shaka {
|
|
|
|
|
|
|
|
bool ValidatePRCryptoFlags() {
|
|
|
|
bool success = true;
|
|
|
|
|
|
|
|
const char playready_label[] = "--enable_playready_encryption";
|
|
|
|
bool playready_enabled = FLAGS_enable_playready_encryption;
|
|
|
|
if (!ValidateFlag("playready_server_url", FLAGS_playready_server_url,
|
|
|
|
playready_enabled, true, playready_label)) {
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
if (!ValidateFlag("program_identifier", FLAGS_program_identifier,
|
|
|
|
playready_enabled, true, playready_label)) {
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
bool use_packaging = !FLAGS_playready_server_url.empty() &&
|
|
|
|
!FLAGS_program_identifier.empty();
|
2017-06-14 23:18:16 +00:00
|
|
|
if (!ValidateFlag("playready_key_id", FLAGS_playready_key_id_bytes,
|
2017-01-05 17:32:17 +00:00
|
|
|
playready_enabled, true, playready_label)) {
|
|
|
|
success = false;
|
|
|
|
}
|
2017-06-14 23:18:16 +00:00
|
|
|
if (!ValidateFlag("playready_key", FLAGS_playready_key_bytes,
|
2017-01-05 17:32:17 +00:00
|
|
|
playready_enabled, true, playready_label)) {
|
|
|
|
success = false;
|
|
|
|
}
|
2017-06-14 23:18:16 +00:00
|
|
|
bool use_fixed_key = !FLAGS_playready_key_id_bytes.empty() &&
|
|
|
|
!FLAGS_playready_key_bytes.empty();
|
2017-01-05 17:32:17 +00:00
|
|
|
|
|
|
|
if (playready_enabled && !use_packaging && !use_fixed_key) {
|
|
|
|
PrintError("combination of --playready_server_url and "
|
|
|
|
"--program_identifier or --playready_key_id and playready_key are "
|
|
|
|
"required");
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
if (use_packaging && use_fixed_key) {
|
|
|
|
PrintError("combination of --playready_server_url, --program_identifier, "
|
|
|
|
"--playready_key_id, and playready_key is not valid");
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
return success;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace shaka
|