DASH Media Packaging SDK
 All Classes Namespaces Functions Variables Typedefs Enumerator
widevine_encryption_flags.cc
1 // Copyright 2014 Google Inc. All rights reserved.
2 //
3 // Use of this source code is governed by a BSD-style
4 // license that can be found in the LICENSE file or at
5 // https://developers.google.com/open-source/licenses/bsd
6 //
7 // Defines command line flags for widevine_encryption.
8 
9 #include "packager/app/widevine_encryption_flags.h"
10 
11 #include "packager/app/validate_flag.h"
12 #include "packager/base/logging.h"
13 #include "packager/base/strings/string_piece.h"
14 #include "packager/base/strings/string_util.h"
15 
16 DEFINE_bool(enable_widevine_encryption,
17  false,
18  "Enable encryption with Widevine license server/proxy. User should "
19  "provide either AES signing key (--aes_signing_key, "
20  "--aes_signing_iv) or RSA signing key (--rsa_signing_key_path).");
21 DEFINE_bool(enable_widevine_decryption,
22  false,
23  "Enable decryption with Widevine license server/proxy. User should "
24  "provide either AES signing key (--aes_signing_key, "
25  "--aes_signing_iv) or RSA signing key (--rsa_signing_key_path).");
26 DEFINE_string(key_server_url, "", "Key server url. Required for encryption and "
27  "decryption");
28 DEFINE_string(content_id, "", "Content Id (hex).");
29 DEFINE_string(policy,
30  "",
31  "The name of a stored policy, which specifies DRM content "
32  "rights.");
33 DEFINE_int32(max_sd_pixels,
34  768 * 576,
35  "If the video track has more pixels per frame than max_sd_pixels, "
36  "it is considered as HD, SD otherwise. Default: 768 * 576.");
37 DEFINE_string(signer, "", "The name of the signer.");
38 DEFINE_string(aes_signing_key,
39  "",
40  "AES signing key in hex string. --aes_signing_iv is required. "
41  "Exclusive with --rsa_signing_key_path.");
42 DEFINE_string(aes_signing_iv,
43  "",
44  "AES signing iv in hex string.");
45 DEFINE_string(rsa_signing_key_path,
46  "",
47  "Stores PKCS#1 RSA private key for request signing. Exclusive "
48  "with --aes_signing_key.");
49 DEFINE_int32(crypto_period_duration,
50  0,
51  "Crypto period duration in seconds. If it is non-zero, key "
52  "rotation is enabled.");
53 
54 namespace edash_packager {
55 
57  bool success = true;
58 
59  const bool widevine_crypto =
60  FLAGS_enable_widevine_encryption || FLAGS_enable_widevine_decryption;
61  const char widevine_crypto_label[] =
62  "--enable_widevine_encryption/decryption";
63  // key_server_url and signer (optional) are associated with
64  // enable_widevine_encryption and enable_widevine_descryption.
65  if (!ValidateFlag("key_server_url",
66  FLAGS_key_server_url,
67  widevine_crypto,
68  false,
69  widevine_crypto_label)) {
70  success = false;
71  }
72  if (!ValidateFlag("signer",
73  FLAGS_signer,
74  widevine_crypto,
75  true,
76  widevine_crypto_label)) {
77  success = false;
78  }
79  if (widevine_crypto && FLAGS_signer.empty() &&
80  base::StartsWith(base::StringPiece(FLAGS_key_server_url), "http",
81  base::CompareCase::INSENSITIVE_ASCII)) {
82  LOG(WARNING) << "--signer is likely required with "
83  "--enable_widevine_encryption/decryption.";
84  }
85 
86  const char widevine_encryption_label[] = "--enable_widevine_encryption";
87  // content_id and policy (optional) are associated with
88  // enable_widevine_encryption.
89  if (!ValidateFlag("content_id",
90  FLAGS_content_id,
91  FLAGS_enable_widevine_encryption,
92  false,
93  widevine_encryption_label)) {
94  success = false;
95  }
96  if (!ValidateFlag("policy",
97  FLAGS_policy,
98  FLAGS_enable_widevine_encryption,
99  true,
100  widevine_encryption_label)) {
101  success = false;
102  }
103 
104  if (FLAGS_max_sd_pixels <= 0) {
105  PrintError("--max_sd_pixels must be positive.");
106  success = false;
107  }
108 
109  const bool aes = !FLAGS_signer.empty() && FLAGS_rsa_signing_key_path.empty();
110  const char aes_label[] =
111  "--signer is specified and exclusive with --rsa_signing_key_path";
112  // aes_signer_key and aes_signing_iv are associated with aes signing.
113  if (!ValidateFlag(
114  "aes_signing_key", FLAGS_aes_signing_key, aes, true, aes_label)) {
115  success = false;
116  }
117  if (!ValidateFlag(
118  "aes_signing_iv", FLAGS_aes_signing_iv, aes, true, aes_label)) {
119  success = false;
120  }
121 
122  const bool rsa = !FLAGS_signer.empty() && FLAGS_aes_signing_key.empty() &&
123  FLAGS_aes_signing_iv.empty();
124  const char rsa_label[] =
125  "--signer is specified and exclusive with --aes_signing_key/iv";
126  // rsa_signing_key_path is associated with rsa_signing.
127  if (!ValidateFlag("rsa_signing_key_path",
128  FLAGS_rsa_signing_key_path,
129  rsa,
130  true,
131  rsa_label)) {
132  success = false;
133  }
134 
135  if (!FLAGS_signer.empty() &&
136  (FLAGS_aes_signing_key.empty() || FLAGS_aes_signing_iv.empty()) &&
137  FLAGS_rsa_signing_key_path.empty()) {
138  PrintError(
139  "--aes_signing_key/iv or --rsa_signing_key_path is required with "
140  "--signer.");
141  success = false;
142  }
143 
144  if (FLAGS_crypto_period_duration < 0) {
145  PrintError("--crypto_period_duration should not be negative.");
146  success = false;
147  }
148  return success;
149 }
150 
151 } // namespace edash_packager
bool ValidateFlag(const char *flag_name, const std::string &flag_value, bool condition, bool optional, const char *label)
void PrintError(const std::string &error_message)