// Copyright 2016 Google LLC. All rights reserved. // // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file or at // https://developers.google.com/open-source/licenses/bsd #include #include #include #include #include #include #include #include namespace { const char kEmptyDrmLabel[] = ""; } // namespace namespace shaka { namespace media { RawKeySource::~RawKeySource() {} Status RawKeySource::FetchKeys(EmeInitDataType init_data_type, const std::vector& init_data) { UNUSED(init_data_type); UNUSED(init_data); // Do nothing for raw key encryption/decryption. return Status::OK; } Status RawKeySource::GetKey(const std::string& stream_label, EncryptionKey* key) { DCHECK(key); // Try to find the key with label |stream_label|. If it is not available, // fall back to the default empty label if it is available. auto iter = encryption_key_map_.find(stream_label); if (iter == encryption_key_map_.end()) { iter = encryption_key_map_.find(kEmptyDrmLabel); if (iter == encryption_key_map_.end()) { return Status(error::NOT_FOUND, "Key for '" + stream_label + "' was not found."); } } *key = *iter->second; return Status::OK; } Status RawKeySource::GetKey(const std::vector& key_id, EncryptionKey* key) { DCHECK(key); for (const auto& pair : encryption_key_map_) { if (pair.second->key_id == key_id) { *key = *pair.second; return Status::OK; } } return Status(error::INTERNAL_ERROR, "Key for key_id=" + absl::BytesToHexString(byte_vector_to_string_view(key_id)) + " was not found."); } Status RawKeySource::GetCryptoPeriodKey( uint32_t crypto_period_index, int32_t crypto_period_duration_in_seconds, const std::string& stream_label, EncryptionKey* key) { UNUSED(crypto_period_duration_in_seconds); RETURN_IF_ERROR(GetKey(stream_label, key)); // A naive key rotation algorithm is implemented here by left rotating the // key, key_id and pssh. Note that this implementation is only intended for // testing purpose. The actual key rotation algorithm can be much more // complicated. LOG(WARNING) << "This naive key rotation algorithm should not be used in production."; std::rotate(key->key_id.begin(), key->key_id.begin() + (crypto_period_index % key->key_id.size()), key->key_id.end()); std::rotate(key->key.begin(), key->key.begin() + (crypto_period_index % key->key.size()), key->key.end()); key->key_ids.clear(); key->key_ids.emplace_back(key->key_id); return Status::OK; } std::unique_ptr RawKeySource::Create( const RawKeyParams& raw_key) { std::vector key_system_info; if (!raw_key.pssh.empty()) { if (!ProtectionSystemSpecificInfo::ParseBoxes( raw_key.pssh.data(), raw_key.pssh.size(), &key_system_info)) { LOG(ERROR) << "--pssh argument should be full PSSH boxes."; return std::unique_ptr(); } } std::vector> key_ids; for (const auto& entry : raw_key.key_map) key_ids.emplace_back(entry.second.key_id); EncryptionKeyMap encryption_key_map; for (const auto& entry : raw_key.key_map) { const std::string& drm_label = entry.first; const RawKeyParams::KeyInfo& key_pair = entry.second; if (key_pair.key_id.size() != 16) { LOG(ERROR) << "Invalid key ID size '" << key_pair.key_id.size() << "', must be 16 bytes."; return std::unique_ptr(); } if (key_pair.key.size() != 16) { // CENC only supports AES-128, i.e. 16 bytes. LOG(ERROR) << "Invalid key size '" << key_pair.key.size() << "', must be 16 bytes."; return std::unique_ptr(); } if (!key_pair.iv.empty() && key_pair.iv.size() != 8 && key_pair.iv.size() != 16) { LOG(ERROR) << "Invalid IV '" << key_pair.iv.size() << "', must be 8 or 16 bytes."; return std::unique_ptr(); } std::unique_ptr encryption_key(new EncryptionKey); encryption_key->key_id = key_pair.key_id; encryption_key->key_ids = key_ids; encryption_key->key = key_pair.key; encryption_key->iv = (key_pair.iv.empty()) ? raw_key.iv : key_pair.iv; encryption_key->key_system_info = key_system_info; encryption_key_map[drm_label] = std::move(encryption_key); } return std::unique_ptr( new RawKeySource(std::move(encryption_key_map))); } RawKeySource::RawKeySource() {} RawKeySource::RawKeySource(EncryptionKeyMap&& encryption_key_map) : encryption_key_map_(std::move(encryption_key_map)) {} } // namespace media } // namespace shaka