// Copyright 2016 Google LLC. All rights reserved. // // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file or at // https://developers.google.com/open-source/licenses/bsd #include "packager/media/base/decryptor_source.h" #include "packager/base/logging.h" #include "packager/media/base/aes_decryptor.h" #include "packager/media/base/aes_pattern_cryptor.h" namespace { // Return true if [encrypted_buffer, encrypted_buffer + buffer_size) overlaps // with [decrypted_buffer, decrypted_buffer + buffer_size). bool CheckMemoryOverlap(const uint8_t* encrypted_buffer, size_t buffer_size, uint8_t* decrypted_buffer) { return (decrypted_buffer < encrypted_buffer) ? (encrypted_buffer < decrypted_buffer + buffer_size) : (decrypted_buffer < encrypted_buffer + buffer_size); } } // namespace namespace shaka { namespace media { DecryptorSource::DecryptorSource(KeySource* key_source) : key_source_(key_source) { CHECK(key_source); } DecryptorSource::~DecryptorSource() {} bool DecryptorSource::DecryptSampleBuffer(const DecryptConfig* decrypt_config, const uint8_t* encrypted_buffer, size_t buffer_size, uint8_t* decrypted_buffer) { DCHECK(decrypt_config); DCHECK(encrypted_buffer); DCHECK(decrypted_buffer); if (CheckMemoryOverlap(encrypted_buffer, buffer_size, decrypted_buffer)) { LOG(ERROR) << "Encrypted buffer and decrypted buffer cannot overlap."; return false; } // Get the decryptor object. AesCryptor* decryptor = nullptr; auto found = decryptor_map_.find(decrypt_config->key_id()); if (found == decryptor_map_.end()) { // Create new AesDecryptor based on decryption mode. EncryptionKey key; Status status(key_source_->GetKey(decrypt_config->key_id(), &key)); if (!status.ok()) { LOG(ERROR) << "Error retrieving decryption key: " << status; return false; } std::unique_ptr aes_decryptor; switch (decrypt_config->protection_scheme()) { case FOURCC_cenc: aes_decryptor.reset(new AesCtrDecryptor); break; case FOURCC_cbc1: aes_decryptor.reset(new AesCbcDecryptor(kNoPadding)); break; case FOURCC_cens: aes_decryptor.reset(new AesPatternCryptor( decrypt_config->crypt_byte_block(), decrypt_config->skip_byte_block(), AesPatternCryptor::kEncryptIfCryptByteBlockRemaining, AesCryptor::kDontUseConstantIv, std::unique_ptr(new AesCtrDecryptor()))); break; case FOURCC_cbcs: aes_decryptor.reset(new AesPatternCryptor( decrypt_config->crypt_byte_block(), decrypt_config->skip_byte_block(), AesPatternCryptor::kEncryptIfCryptByteBlockRemaining, AesCryptor::kUseConstantIv, std::unique_ptr(new AesCbcDecryptor(kNoPadding)))); break; default: LOG(ERROR) << "Unsupported protection scheme: " << decrypt_config->protection_scheme(); return false; } if (!aes_decryptor->InitializeWithIv(key.key, decrypt_config->iv())) { LOG(ERROR) << "Failed to initialize AesDecryptor for decryption."; return false; } decryptor = aes_decryptor.get(); decryptor_map_[decrypt_config->key_id()] = std::move(aes_decryptor); } else { decryptor = found->second.get(); } if (!decryptor->SetIv(decrypt_config->iv())) { LOG(ERROR) << "Invalid initialization vector."; return false; } if (decrypt_config->subsamples().empty()) { // Sample not encrypted using subsample encryption. Decrypt whole. if (!decryptor->Crypt(encrypted_buffer, buffer_size, decrypted_buffer)) { LOG(ERROR) << "Error during bulk sample decryption."; return false; } return true; } // Subsample decryption. const std::vector& subsamples = decrypt_config->subsamples(); const uint8_t* current_ptr = encrypted_buffer; const uint8_t* const buffer_end = encrypted_buffer + buffer_size; for (const auto& subsample : subsamples) { if ((current_ptr + subsample.clear_bytes + subsample.cipher_bytes) > buffer_end) { LOG(ERROR) << "Subsamples overflow sample buffer."; return false; } memcpy(decrypted_buffer, current_ptr, subsample.clear_bytes); current_ptr += subsample.clear_bytes; decrypted_buffer += subsample.clear_bytes; if (!decryptor->Crypt(current_ptr, subsample.cipher_bytes, decrypted_buffer)) { LOG(ERROR) << "Error decrypting subsample buffer."; return false; } current_ptr += subsample.cipher_bytes; decrypted_buffer += subsample.cipher_bytes; } return true; } } // namespace media } // namespace shaka