2014-02-14 23:21:05 +00:00
|
|
|
// Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file or at
|
|
|
|
// https://developers.google.com/open-source/licenses/bsd
|
2013-12-17 00:52:13 +00:00
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
#include "media/base/widevine_encryption_key_source.h"
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
#include "base/base64.h"
|
2014-04-24 16:59:07 +00:00
|
|
|
#include "base/bind.h"
|
2013-12-17 00:52:13 +00:00
|
|
|
#include "base/json/json_reader.h"
|
|
|
|
#include "base/json/json_writer.h"
|
2014-04-24 16:59:07 +00:00
|
|
|
#include "base/memory/ref_counted.h"
|
2014-04-15 22:18:26 +00:00
|
|
|
#include "base/stl_util.h"
|
2013-12-17 00:52:13 +00:00
|
|
|
#include "base/values.h"
|
2014-02-20 22:38:28 +00:00
|
|
|
#include "media/base/http_fetcher.h"
|
2014-01-14 04:52:05 +00:00
|
|
|
#include "media/base/request_signer.h"
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
#define RCHECK(x) \
|
|
|
|
do { \
|
|
|
|
if (!(x)) { \
|
|
|
|
LOG(ERROR) << "Failure while processing: " << #x; \
|
|
|
|
return false; \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2014-01-14 18:36:41 +00:00
|
|
|
const char kLicenseStatusOK[] = "OK";
|
|
|
|
// Server may return INTERNAL_ERROR intermittently, which is a transient error
|
|
|
|
// and the next client request may succeed without problem.
|
|
|
|
const char kLicenseStatusTransientError[] = "INTERNAL_ERROR";
|
|
|
|
|
|
|
|
// Number of times to retry requesting keys in case of a transient error from
|
|
|
|
// the server.
|
|
|
|
const int kNumTransientErrorRetries = 5;
|
|
|
|
const int kFirstRetryDelayMilliseconds = 1000;
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
// Default crypto period count, which is the number of keys to fetch on every
|
|
|
|
// key rotation enabled request.
|
|
|
|
const int kDefaultCryptoPeriodCount = 10;
|
|
|
|
const int kGetKeyTimeoutInSeconds = 5 * 60; // 5 minutes.
|
2014-06-18 19:23:34 +00:00
|
|
|
const int kHttpTimeoutInSeconds = 60; // 1 minute.
|
2014-04-24 16:59:07 +00:00
|
|
|
|
2013-12-17 00:52:13 +00:00
|
|
|
bool Base64StringToBytes(const std::string& base64_string,
|
|
|
|
std::vector<uint8>* bytes) {
|
|
|
|
DCHECK(bytes);
|
|
|
|
std::string str;
|
|
|
|
if (!base::Base64Decode(base64_string, &str))
|
|
|
|
return false;
|
|
|
|
bytes->assign(str.begin(), str.end());
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool GetKeyAndKeyId(const base::DictionaryValue& track_dict,
|
|
|
|
std::vector<uint8>* key,
|
|
|
|
std::vector<uint8>* key_id) {
|
|
|
|
DCHECK(key);
|
|
|
|
DCHECK(key_id);
|
|
|
|
|
|
|
|
std::string key_base64_string;
|
|
|
|
RCHECK(track_dict.GetString("key", &key_base64_string));
|
2014-01-14 18:36:41 +00:00
|
|
|
VLOG(2) << "Key:" << key_base64_string;
|
2013-12-17 00:52:13 +00:00
|
|
|
RCHECK(Base64StringToBytes(key_base64_string, key));
|
|
|
|
|
|
|
|
std::string key_id_base64_string;
|
|
|
|
RCHECK(track_dict.GetString("key_id", &key_id_base64_string));
|
2014-01-14 18:36:41 +00:00
|
|
|
VLOG(2) << "Keyid:" << key_id_base64_string;
|
2013-12-17 00:52:13 +00:00
|
|
|
RCHECK(Base64StringToBytes(key_id_base64_string, key_id));
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-04-15 22:18:26 +00:00
|
|
|
bool GetPsshData(const base::DictionaryValue& track_dict,
|
|
|
|
std::vector<uint8>* pssh_data) {
|
|
|
|
DCHECK(pssh_data);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
const base::ListValue* pssh_list;
|
|
|
|
RCHECK(track_dict.GetList("pssh", &pssh_list));
|
|
|
|
// Invariant check. We don't want to crash in release mode if possible.
|
|
|
|
// The following code handles it gracefully if GetSize() does not return 1.
|
2014-03-21 17:26:49 +00:00
|
|
|
DCHECK_EQ(1u, pssh_list->GetSize());
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
const base::DictionaryValue* pssh_dict;
|
|
|
|
RCHECK(pssh_list->GetDictionary(0, &pssh_dict));
|
|
|
|
std::string drm_type;
|
|
|
|
RCHECK(pssh_dict->GetString("drm_type", &drm_type));
|
|
|
|
if (drm_type != "WIDEVINE") {
|
|
|
|
LOG(ERROR) << "Expecting drm_type 'WIDEVINE', get '" << drm_type << "'.";
|
|
|
|
return false;
|
|
|
|
}
|
2014-04-15 22:18:26 +00:00
|
|
|
std::string pssh_data_base64_string;
|
|
|
|
RCHECK(pssh_dict->GetString("data", &pssh_data_base64_string));
|
2013-12-17 00:52:13 +00:00
|
|
|
|
2014-04-15 22:18:26 +00:00
|
|
|
VLOG(2) << "Pssh Data:" << pssh_data_base64_string;
|
|
|
|
RCHECK(Base64StringToBytes(pssh_data_base64_string, pssh_data));
|
2013-12-17 00:52:13 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace media {
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
// A ref counted wrapper for EncryptionKeyMap.
|
|
|
|
class WidevineEncryptionKeySource::RefCountedEncryptionKeyMap
|
|
|
|
: public base::RefCountedThreadSafe<RefCountedEncryptionKeyMap> {
|
|
|
|
public:
|
|
|
|
explicit RefCountedEncryptionKeyMap(EncryptionKeyMap* encryption_key_map) {
|
|
|
|
DCHECK(encryption_key_map);
|
|
|
|
encryption_key_map_.swap(*encryption_key_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::map<EncryptionKeySource::TrackType, EncryptionKey*>& map() {
|
|
|
|
return encryption_key_map_;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
friend class base::RefCountedThreadSafe<RefCountedEncryptionKeyMap>;
|
|
|
|
|
|
|
|
~RefCountedEncryptionKeyMap() { STLDeleteValues(&encryption_key_map_); }
|
|
|
|
|
|
|
|
EncryptionKeyMap encryption_key_map_;
|
|
|
|
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(RefCountedEncryptionKeyMap);
|
|
|
|
};
|
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
WidevineEncryptionKeySource::WidevineEncryptionKeySource(
|
2014-01-14 18:36:41 +00:00
|
|
|
const std::string& server_url,
|
|
|
|
const std::string& content_id,
|
2014-05-08 22:58:07 +00:00
|
|
|
const std::string& policy,
|
2014-04-24 16:59:07 +00:00
|
|
|
scoped_ptr<RequestSigner> signer,
|
|
|
|
int first_crypto_period_index)
|
2014-06-18 19:23:34 +00:00
|
|
|
: http_fetcher_(new SimpleHttpFetcher(kHttpTimeoutInSeconds)),
|
2014-02-20 22:38:28 +00:00
|
|
|
server_url_(server_url),
|
2013-12-17 00:52:13 +00:00
|
|
|
content_id_(content_id),
|
2014-05-08 22:58:07 +00:00
|
|
|
policy_(policy),
|
2014-04-15 22:18:26 +00:00
|
|
|
signer_(signer.Pass()),
|
2014-04-24 16:59:07 +00:00
|
|
|
key_rotation_enabled_(first_crypto_period_index >= 0),
|
|
|
|
crypto_period_count_(kDefaultCryptoPeriodCount),
|
|
|
|
first_crypto_period_index_(first_crypto_period_index),
|
|
|
|
key_production_thread_(
|
|
|
|
"KeyProductionThread",
|
|
|
|
base::Bind(&WidevineEncryptionKeySource::FetchKeysTask,
|
|
|
|
base::Unretained(this))),
|
|
|
|
key_pool_(kDefaultCryptoPeriodCount,
|
|
|
|
key_rotation_enabled_ ? first_crypto_period_index : 0) {
|
2014-01-14 04:52:05 +00:00
|
|
|
DCHECK(signer_);
|
2013-12-17 00:52:13 +00:00
|
|
|
}
|
2014-04-24 16:59:07 +00:00
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
WidevineEncryptionKeySource::~WidevineEncryptionKeySource() {
|
2014-04-24 16:59:07 +00:00
|
|
|
key_pool_.Stop();
|
2014-05-08 23:34:45 +00:00
|
|
|
if (key_production_thread_.HasBeenStarted())
|
|
|
|
key_production_thread_.Join();
|
|
|
|
}
|
|
|
|
|
|
|
|
Status WidevineEncryptionKeySource::Initialize() {
|
|
|
|
DCHECK(!key_production_thread_.HasBeenStarted());
|
|
|
|
key_production_thread_.Start();
|
|
|
|
|
|
|
|
// Perform a GetKey request to find out common encryption request status.
|
|
|
|
// It also primes the key_pool if successful.
|
|
|
|
return key_rotation_enabled_ ? GetCryptoPeriodKey(first_crypto_period_index_,
|
|
|
|
TRACK_TYPE_SD, NULL)
|
|
|
|
: GetKey(TRACK_TYPE_SD, NULL);
|
2014-04-15 22:18:26 +00:00
|
|
|
}
|
2013-12-17 00:52:13 +00:00
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
Status WidevineEncryptionKeySource::GetKey(TrackType track_type,
|
|
|
|
EncryptionKey* key) {
|
2014-05-08 23:34:45 +00:00
|
|
|
DCHECK(key_production_thread_.HasBeenStarted());
|
2014-04-24 16:59:07 +00:00
|
|
|
DCHECK(!key_rotation_enabled_);
|
|
|
|
return GetKeyInternal(0u, track_type, key);
|
|
|
|
}
|
|
|
|
|
|
|
|
Status WidevineEncryptionKeySource::GetCryptoPeriodKey(
|
|
|
|
uint32 crypto_period_index,
|
|
|
|
TrackType track_type,
|
|
|
|
EncryptionKey* key) {
|
2014-05-08 23:34:45 +00:00
|
|
|
DCHECK(key_production_thread_.HasBeenStarted());
|
2014-04-24 16:59:07 +00:00
|
|
|
DCHECK(key_rotation_enabled_);
|
|
|
|
return GetKeyInternal(crypto_period_index, track_type, key);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WidevineEncryptionKeySource::set_http_fetcher(
|
|
|
|
scoped_ptr<HttpFetcher> http_fetcher) {
|
|
|
|
http_fetcher_ = http_fetcher.Pass();
|
|
|
|
}
|
|
|
|
|
|
|
|
Status WidevineEncryptionKeySource::GetKeyInternal(
|
|
|
|
uint32 crypto_period_index,
|
|
|
|
TrackType track_type,
|
|
|
|
EncryptionKey* key) {
|
|
|
|
DCHECK_LE(track_type, NUM_VALID_TRACK_TYPES);
|
|
|
|
DCHECK_NE(track_type, TRACK_TYPE_UNKNOWN);
|
|
|
|
|
|
|
|
scoped_refptr<RefCountedEncryptionKeyMap> ref_counted_encryption_key_map;
|
|
|
|
Status status = key_pool_.Peek(crypto_period_index,
|
|
|
|
&ref_counted_encryption_key_map,
|
|
|
|
kGetKeyTimeoutInSeconds * 1000);
|
|
|
|
if (!status.ok()) {
|
|
|
|
if (status.error_code() == error::STOPPED) {
|
|
|
|
CHECK(!common_encryption_request_status_.ok());
|
|
|
|
return common_encryption_request_status_;
|
2014-04-15 22:18:26 +00:00
|
|
|
}
|
|
|
|
return status;
|
2014-04-24 16:59:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
EncryptionKeyMap& encryption_key_map = ref_counted_encryption_key_map->map();
|
|
|
|
if (encryption_key_map.find(track_type) == encryption_key_map.end()) {
|
2014-04-15 22:18:26 +00:00
|
|
|
return Status(error::INTERNAL_ERROR,
|
|
|
|
"Cannot find key of type " + TrackTypeToString(track_type));
|
|
|
|
}
|
2014-05-08 23:34:45 +00:00
|
|
|
if (key)
|
|
|
|
*key = *encryption_key_map[track_type];
|
2014-04-15 22:18:26 +00:00
|
|
|
return Status::OK;
|
|
|
|
}
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
void WidevineEncryptionKeySource::FetchKeysTask() {
|
|
|
|
Status status = FetchKeys(first_crypto_period_index_);
|
|
|
|
if (key_rotation_enabled_) {
|
|
|
|
while (status.ok()) {
|
|
|
|
first_crypto_period_index_ += crypto_period_count_;
|
|
|
|
status = FetchKeys(first_crypto_period_index_);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
common_encryption_request_status_ = status;
|
|
|
|
key_pool_.Stop();
|
2014-04-15 22:18:26 +00:00
|
|
|
}
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
Status WidevineEncryptionKeySource::FetchKeys(
|
|
|
|
uint32 first_crypto_period_index) {
|
2013-12-17 00:52:13 +00:00
|
|
|
std::string request;
|
2014-04-24 16:59:07 +00:00
|
|
|
FillRequest(content_id_, first_crypto_period_index, &request);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
std::string message;
|
|
|
|
Status status = SignRequest(request, &message);
|
|
|
|
if (!status.ok())
|
|
|
|
return status;
|
2014-01-14 18:36:41 +00:00
|
|
|
VLOG(1) << "Message: " << message;
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
std::string raw_response;
|
2014-01-14 18:36:41 +00:00
|
|
|
int64 sleep_duration = kFirstRetryDelayMilliseconds;
|
|
|
|
|
|
|
|
// Perform client side retries if seeing server transient error to workaround
|
|
|
|
// server limitation.
|
|
|
|
for (int i = 0; i < kNumTransientErrorRetries; ++i) {
|
2014-02-20 22:38:28 +00:00
|
|
|
status = http_fetcher_->Post(server_url_, message, &raw_response);
|
2014-06-18 19:23:34 +00:00
|
|
|
if (status.ok()) {
|
|
|
|
VLOG(1) << "Retry [" << i << "] Response:" << raw_response;
|
|
|
|
|
|
|
|
std::string response;
|
|
|
|
if (!DecodeResponse(raw_response, &response)) {
|
|
|
|
return Status(error::SERVER_ERROR,
|
|
|
|
"Failed to decode response '" + raw_response + "'.");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool transient_error = false;
|
|
|
|
if (ExtractEncryptionKey(response, &transient_error))
|
|
|
|
return Status::OK;
|
|
|
|
|
|
|
|
if (!transient_error) {
|
|
|
|
return Status(
|
|
|
|
error::SERVER_ERROR,
|
|
|
|
"Failed to extract encryption key from '" + response + "'.");
|
|
|
|
}
|
|
|
|
} else if (status.error_code() != error::TIME_OUT) {
|
2014-01-14 18:36:41 +00:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Exponential backoff.
|
|
|
|
if (i != kNumTransientErrorRetries - 1) {
|
|
|
|
base::PlatformThread::Sleep(
|
|
|
|
base::TimeDelta::FromMilliseconds(sleep_duration));
|
|
|
|
sleep_duration *= 2;
|
|
|
|
}
|
2013-12-17 00:52:13 +00:00
|
|
|
}
|
2014-01-14 18:36:41 +00:00
|
|
|
return Status(error::SERVER_ERROR,
|
|
|
|
"Failed to recover from server internal error.");
|
2013-12-17 00:52:13 +00:00
|
|
|
}
|
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
void WidevineEncryptionKeySource::FillRequest(const std::string& content_id,
|
2014-04-24 16:59:07 +00:00
|
|
|
uint32 first_crypto_period_index,
|
2014-04-16 01:09:32 +00:00
|
|
|
std::string* request) {
|
2013-12-17 00:52:13 +00:00
|
|
|
DCHECK(request);
|
|
|
|
|
|
|
|
std::string content_id_base64_string;
|
2014-02-26 23:55:01 +00:00
|
|
|
base::Base64Encode(content_id, &content_id_base64_string);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
base::DictionaryValue request_dict;
|
|
|
|
request_dict.SetString("content_id", content_id_base64_string);
|
2014-05-08 22:58:07 +00:00
|
|
|
request_dict.SetString("policy", policy_);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
// Build tracks.
|
|
|
|
base::ListValue* tracks = new base::ListValue();
|
|
|
|
|
|
|
|
base::DictionaryValue* track_sd = new base::DictionaryValue();
|
|
|
|
track_sd->SetString("type", "SD");
|
|
|
|
tracks->Append(track_sd);
|
|
|
|
base::DictionaryValue* track_hd = new base::DictionaryValue();
|
|
|
|
track_hd->SetString("type", "HD");
|
|
|
|
tracks->Append(track_hd);
|
|
|
|
base::DictionaryValue* track_audio = new base::DictionaryValue();
|
|
|
|
track_audio->SetString("type", "AUDIO");
|
|
|
|
tracks->Append(track_audio);
|
|
|
|
|
|
|
|
request_dict.Set("tracks", tracks);
|
|
|
|
|
|
|
|
// Build DRM types.
|
|
|
|
base::ListValue* drm_types = new base::ListValue();
|
|
|
|
drm_types->AppendString("WIDEVINE");
|
|
|
|
request_dict.Set("drm_types", drm_types);
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
// Build key rotation fields.
|
|
|
|
if (key_rotation_enabled_) {
|
|
|
|
request_dict.SetInteger("first_crypto_period_index",
|
|
|
|
first_crypto_period_index);
|
|
|
|
request_dict.SetInteger("crypto_period_count", crypto_period_count_);
|
|
|
|
}
|
|
|
|
|
2013-12-17 00:52:13 +00:00
|
|
|
base::JSONWriter::Write(&request_dict, request);
|
|
|
|
}
|
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
Status WidevineEncryptionKeySource::SignRequest(const std::string& request,
|
|
|
|
std::string* signed_request) {
|
2013-12-17 00:52:13 +00:00
|
|
|
DCHECK(signed_request);
|
|
|
|
|
|
|
|
// Sign the request.
|
|
|
|
std::string signature;
|
2014-01-14 04:52:05 +00:00
|
|
|
if (!signer_->GenerateSignature(request, &signature))
|
|
|
|
return Status(error::INTERNAL_ERROR, "Signature generation failed.");
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
// Encode request and signature using Base64 encoding.
|
|
|
|
std::string request_base64_string;
|
2014-02-26 23:55:01 +00:00
|
|
|
base::Base64Encode(request, &request_base64_string);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
std::string signature_base64_string;
|
2014-02-26 23:55:01 +00:00
|
|
|
base::Base64Encode(signature, &signature_base64_string);
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
base::DictionaryValue signed_request_dict;
|
|
|
|
signed_request_dict.SetString("request", request_base64_string);
|
|
|
|
signed_request_dict.SetString("signature", signature_base64_string);
|
2014-01-14 04:52:05 +00:00
|
|
|
signed_request_dict.SetString("signer", signer_->signer_name());
|
2013-12-17 00:52:13 +00:00
|
|
|
|
|
|
|
base::JSONWriter::Write(&signed_request_dict, signed_request);
|
|
|
|
return Status::OK;
|
|
|
|
}
|
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
bool WidevineEncryptionKeySource::DecodeResponse(
|
|
|
|
const std::string& raw_response,
|
|
|
|
std::string* response) {
|
2013-12-17 00:52:13 +00:00
|
|
|
DCHECK(response);
|
|
|
|
|
|
|
|
// Extract base64 formatted response from JSON formatted raw response.
|
|
|
|
scoped_ptr<base::Value> root(base::JSONReader::Read(raw_response));
|
|
|
|
if (!root) {
|
|
|
|
LOG(ERROR) << "'" << raw_response << "' is not in JSON format.";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
const base::DictionaryValue* response_dict = NULL;
|
|
|
|
RCHECK(root->GetAsDictionary(&response_dict));
|
|
|
|
|
|
|
|
std::string response_base64_string;
|
|
|
|
RCHECK(response_dict->GetString("response", &response_base64_string));
|
|
|
|
RCHECK(base::Base64Decode(response_base64_string, response));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-04-16 01:09:32 +00:00
|
|
|
bool WidevineEncryptionKeySource::ExtractEncryptionKey(
|
|
|
|
const std::string& response,
|
|
|
|
bool* transient_error) {
|
2014-01-14 18:36:41 +00:00
|
|
|
DCHECK(transient_error);
|
|
|
|
*transient_error = false;
|
|
|
|
|
2013-12-17 00:52:13 +00:00
|
|
|
scoped_ptr<base::Value> root(base::JSONReader::Read(response));
|
|
|
|
if (!root) {
|
|
|
|
LOG(ERROR) << "'" << response << "' is not in JSON format.";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const base::DictionaryValue* license_dict = NULL;
|
|
|
|
RCHECK(root->GetAsDictionary(&license_dict));
|
|
|
|
|
|
|
|
std::string license_status;
|
|
|
|
RCHECK(license_dict->GetString("status", &license_status));
|
2014-01-14 18:36:41 +00:00
|
|
|
if (license_status != kLicenseStatusOK) {
|
2013-12-17 00:52:13 +00:00
|
|
|
LOG(ERROR) << "Received non-OK license response: " << response;
|
2014-01-14 18:36:41 +00:00
|
|
|
*transient_error = (license_status == kLicenseStatusTransientError);
|
2013-12-17 00:52:13 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const base::ListValue* tracks;
|
|
|
|
RCHECK(license_dict->GetList("tracks", &tracks));
|
2014-04-24 16:59:07 +00:00
|
|
|
RCHECK(key_rotation_enabled_
|
|
|
|
? tracks->GetSize() >= NUM_VALID_TRACK_TYPES * crypto_period_count_
|
|
|
|
: tracks->GetSize() >= NUM_VALID_TRACK_TYPES);
|
|
|
|
|
|
|
|
int current_crypto_period_index = first_crypto_period_index_;
|
2013-12-17 00:52:13 +00:00
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
EncryptionKeyMap encryption_key_map;
|
2014-04-15 22:18:26 +00:00
|
|
|
for (size_t i = 0; i < tracks->GetSize(); ++i) {
|
2013-12-17 00:52:13 +00:00
|
|
|
const base::DictionaryValue* track_dict;
|
2014-04-15 22:18:26 +00:00
|
|
|
RCHECK(tracks->GetDictionary(i, &track_dict));
|
|
|
|
|
2014-04-24 16:59:07 +00:00
|
|
|
if (key_rotation_enabled_) {
|
|
|
|
int crypto_period_index;
|
|
|
|
RCHECK(
|
|
|
|
track_dict->GetInteger("crypto_period_index", &crypto_period_index));
|
|
|
|
if (crypto_period_index != current_crypto_period_index) {
|
|
|
|
if (crypto_period_index != current_crypto_period_index + 1) {
|
|
|
|
LOG(ERROR) << "Expecting crypto period index "
|
|
|
|
<< current_crypto_period_index << " or "
|
|
|
|
<< current_crypto_period_index + 1 << "; Seen "
|
|
|
|
<< crypto_period_index << " at track " << i;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!PushToKeyPool(&encryption_key_map))
|
|
|
|
return false;
|
|
|
|
++current_crypto_period_index;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-15 22:18:26 +00:00
|
|
|
std::string track_type_str;
|
|
|
|
RCHECK(track_dict->GetString("type", &track_type_str));
|
|
|
|
TrackType track_type = GetTrackTypeFromString(track_type_str);
|
|
|
|
DCHECK_NE(TRACK_TYPE_UNKNOWN, track_type);
|
2014-04-24 16:59:07 +00:00
|
|
|
RCHECK(encryption_key_map.find(track_type) == encryption_key_map.end());
|
2014-04-15 22:18:26 +00:00
|
|
|
|
|
|
|
scoped_ptr<EncryptionKey> encryption_key(new EncryptionKey());
|
|
|
|
std::vector<uint8> pssh_data;
|
2014-04-16 01:09:32 +00:00
|
|
|
if (!GetKeyAndKeyId(
|
|
|
|
*track_dict, &encryption_key->key, &encryption_key->key_id) ||
|
2014-04-15 22:18:26 +00:00
|
|
|
!GetPsshData(*track_dict, &pssh_data))
|
2014-01-14 18:36:41 +00:00
|
|
|
return false;
|
2014-04-15 22:18:26 +00:00
|
|
|
encryption_key->pssh = PsshBoxFromPsshData(pssh_data);
|
2014-04-24 16:59:07 +00:00
|
|
|
encryption_key_map[track_type] = encryption_key.release();
|
|
|
|
}
|
|
|
|
|
|
|
|
DCHECK(!encryption_key_map.empty());
|
|
|
|
return PushToKeyPool(&encryption_key_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WidevineEncryptionKeySource::PushToKeyPool(
|
|
|
|
EncryptionKeyMap* encryption_key_map) {
|
|
|
|
DCHECK(encryption_key_map);
|
|
|
|
Status status =
|
|
|
|
key_pool_.Push(scoped_refptr<RefCountedEncryptionKeyMap>(
|
|
|
|
new RefCountedEncryptionKeyMap(encryption_key_map)),
|
|
|
|
kInfiniteTimeout);
|
|
|
|
encryption_key_map->clear();
|
|
|
|
if (!status.ok()) {
|
|
|
|
DCHECK_EQ(error::STOPPED, status.error_code());
|
|
|
|
return false;
|
2013-12-17 00:52:13 +00:00
|
|
|
}
|
2014-04-15 22:18:26 +00:00
|
|
|
return true;
|
2013-12-17 00:52:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace media
|