628 lines
87 KiB
HTML
628 lines
87 KiB
HTML
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
|
|
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
|
|
<meta name="generator" content="Doxygen 1.8.6"/>
|
|
<title>DASH Media Packaging SDK: media/crypto/encryption_handler.cc Source File</title>
|
|
<link href="../../tabs.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="../../jquery.js"></script>
|
|
<script type="text/javascript" src="../../dynsections.js"></script>
|
|
<link href="../../search/search.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="../../search/search.js"></script>
|
|
<script type="text/javascript">
|
|
$(document).ready(function() { searchBox.OnSelectItem(0); });
|
|
</script>
|
|
<link href="../../doxygen.css" rel="stylesheet" type="text/css" />
|
|
</head>
|
|
<body>
|
|
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
|
|
<div id="titlearea">
|
|
<table cellspacing="0" cellpadding="0">
|
|
<tbody>
|
|
<tr style="height: 56px;">
|
|
<td style="padding-left: 0.5em;">
|
|
<div id="projectname">DASH Media Packaging SDK
|
|
</div>
|
|
</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
<!-- end header part -->
|
|
<!-- Generated by Doxygen 1.8.6 -->
|
|
<script type="text/javascript">
|
|
var searchBox = new SearchBox("searchBox", "../../search",false,'Search');
|
|
</script>
|
|
<div id="navrow1" class="tabs">
|
|
<ul class="tablist">
|
|
<li><a href="../../index.html"><span>Main Page</span></a></li>
|
|
<li><a href="../../namespaces.html"><span>Namespaces</span></a></li>
|
|
<li><a href="../../annotated.html"><span>Classes</span></a></li>
|
|
<li class="current"><a href="../../files.html"><span>Files</span></a></li>
|
|
<li>
|
|
<div id="MSearchBox" class="MSearchBoxInactive">
|
|
<span class="left">
|
|
<img id="MSearchSelect" src="../../search/mag_sel.png"
|
|
onmouseover="return searchBox.OnSearchSelectShow()"
|
|
onmouseout="return searchBox.OnSearchSelectHide()"
|
|
alt=""/>
|
|
<input type="text" id="MSearchField" value="Search" accesskey="S"
|
|
onfocus="searchBox.OnSearchFieldFocus(true)"
|
|
onblur="searchBox.OnSearchFieldFocus(false)"
|
|
onkeyup="searchBox.OnSearchFieldChange(event)"/>
|
|
</span><span class="right">
|
|
<a id="MSearchClose" href="javascript:searchBox.CloseResultsWindow()"><img id="MSearchCloseImg" border="0" src="../../search/close.png" alt=""/></a>
|
|
</span>
|
|
</div>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
<div id="navrow2" class="tabs2">
|
|
<ul class="tablist">
|
|
<li><a href="../../files.html"><span>File List</span></a></li>
|
|
</ul>
|
|
</div>
|
|
<!-- window showing the filter options -->
|
|
<div id="MSearchSelectWindow"
|
|
onmouseover="return searchBox.OnSearchSelectShow()"
|
|
onmouseout="return searchBox.OnSearchSelectHide()"
|
|
onkeydown="return searchBox.OnSearchSelectKey(event)">
|
|
<a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(0)"><span class="SelectionMark"> </span>All</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(1)"><span class="SelectionMark"> </span>Classes</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(2)"><span class="SelectionMark"> </span>Namespaces</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(3)"><span class="SelectionMark"> </span>Functions</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(4)"><span class="SelectionMark"> </span>Variables</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(5)"><span class="SelectionMark"> </span>Typedefs</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(6)"><span class="SelectionMark"> </span>Enumerations</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(7)"><span class="SelectionMark"> </span>Enumerator</a></div>
|
|
|
|
<!-- iframe showing the search results (closed by default) -->
|
|
<div id="MSearchResultsWindow">
|
|
<iframe src="javascript:void(0)" frameborder="0"
|
|
name="MSearchResults" id="MSearchResults">
|
|
</iframe>
|
|
</div>
|
|
|
|
<div id="nav-path" class="navpath">
|
|
<ul>
|
|
<li class="navelem"><a class="el" href="../../dir_39dc0668bd5a501998f94e8b4e546c71.html">media</a></li><li class="navelem"><a class="el" href="../../dir_ba94ecd487194410fd7c4b70c530929c.html">crypto</a></li> </ul>
|
|
</div>
|
|
</div><!-- top -->
|
|
<div class="header">
|
|
<div class="headertitle">
|
|
<div class="title">encryption_handler.cc</div> </div>
|
|
</div><!--header-->
|
|
<div class="contents">
|
|
<div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span> <span class="comment">// Copyright 2017 Google Inc. All rights reserved.</span></div>
|
|
<div class="line"><a name="l00002"></a><span class="lineno"> 2</span> <span class="comment">//</span></div>
|
|
<div class="line"><a name="l00003"></a><span class="lineno"> 3</span> <span class="comment">// Use of this source code is governed by a BSD-style</span></div>
|
|
<div class="line"><a name="l00004"></a><span class="lineno"> 4</span> <span class="comment">// license that can be found in the LICENSE file or at</span></div>
|
|
<div class="line"><a name="l00005"></a><span class="lineno"> 5</span> <span class="comment">// https://developers.google.com/open-source/licenses/bsd</span></div>
|
|
<div class="line"><a name="l00006"></a><span class="lineno"> 6</span> </div>
|
|
<div class="line"><a name="l00007"></a><span class="lineno"> 7</span> <span class="preprocessor">#include "packager/media/crypto/encryption_handler.h"</span></div>
|
|
<div class="line"><a name="l00008"></a><span class="lineno"> 8</span> </div>
|
|
<div class="line"><a name="l00009"></a><span class="lineno"> 9</span> <span class="preprocessor">#include <stddef.h></span></div>
|
|
<div class="line"><a name="l00010"></a><span class="lineno"> 10</span> <span class="preprocessor">#include <stdint.h></span></div>
|
|
<div class="line"><a name="l00011"></a><span class="lineno"> 11</span> </div>
|
|
<div class="line"><a name="l00012"></a><span class="lineno"> 12</span> <span class="preprocessor">#include <limits></span></div>
|
|
<div class="line"><a name="l00013"></a><span class="lineno"> 13</span> </div>
|
|
<div class="line"><a name="l00014"></a><span class="lineno"> 14</span> <span class="preprocessor">#include "packager/media/base/aes_encryptor.h"</span></div>
|
|
<div class="line"><a name="l00015"></a><span class="lineno"> 15</span> <span class="preprocessor">#include "packager/media/base/aes_pattern_cryptor.h"</span></div>
|
|
<div class="line"><a name="l00016"></a><span class="lineno"> 16</span> <span class="preprocessor">#include "packager/media/base/key_source.h"</span></div>
|
|
<div class="line"><a name="l00017"></a><span class="lineno"> 17</span> <span class="preprocessor">#include "packager/media/base/media_sample.h"</span></div>
|
|
<div class="line"><a name="l00018"></a><span class="lineno"> 18</span> <span class="preprocessor">#include "packager/media/base/video_stream_info.h"</span></div>
|
|
<div class="line"><a name="l00019"></a><span class="lineno"> 19</span> <span class="preprocessor">#include "packager/media/codecs/video_slice_header_parser.h"</span></div>
|
|
<div class="line"><a name="l00020"></a><span class="lineno"> 20</span> <span class="preprocessor">#include "packager/media/codecs/vp8_parser.h"</span></div>
|
|
<div class="line"><a name="l00021"></a><span class="lineno"> 21</span> <span class="preprocessor">#include "packager/media/codecs/vp9_parser.h"</span></div>
|
|
<div class="line"><a name="l00022"></a><span class="lineno"> 22</span> </div>
|
|
<div class="line"><a name="l00023"></a><span class="lineno"> 23</span> <span class="keyword">namespace </span>shaka {</div>
|
|
<div class="line"><a name="l00024"></a><span class="lineno"> 24</span> <span class="keyword">namespace </span>media {</div>
|
|
<div class="line"><a name="l00025"></a><span class="lineno"> 25</span> </div>
|
|
<div class="line"><a name="l00026"></a><span class="lineno"> 26</span> <span class="keyword">namespace </span>{</div>
|
|
<div class="line"><a name="l00027"></a><span class="lineno"> 27</span> <span class="keyword">const</span> <span class="keywordtype">size_t</span> kCencBlockSize = 16u;</div>
|
|
<div class="line"><a name="l00028"></a><span class="lineno"> 28</span> </div>
|
|
<div class="line"><a name="l00029"></a><span class="lineno"> 29</span> <span class="comment">// The default KID for key rotation is all 0s.</span></div>
|
|
<div class="line"><a name="l00030"></a><span class="lineno"> 30</span> <span class="keyword">const</span> uint8_t kKeyRotationDefaultKeyId[] = {</div>
|
|
<div class="line"><a name="l00031"></a><span class="lineno"> 31</span>  0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,</div>
|
|
<div class="line"><a name="l00032"></a><span class="lineno"> 32</span> };</div>
|
|
<div class="line"><a name="l00033"></a><span class="lineno"> 33</span> </div>
|
|
<div class="line"><a name="l00034"></a><span class="lineno"> 34</span> <span class="comment">// Adds one or more subsamples to |*subsamples|. This may add more than one</span></div>
|
|
<div class="line"><a name="l00035"></a><span class="lineno"> 35</span> <span class="comment">// if one of the values overflows the integer in the subsample.</span></div>
|
|
<div class="line"><a name="l00036"></a><span class="lineno"> 36</span> <span class="keywordtype">void</span> AddSubsample(uint64_t clear_bytes,</div>
|
|
<div class="line"><a name="l00037"></a><span class="lineno"> 37</span>  uint64_t cipher_bytes,</div>
|
|
<div class="line"><a name="l00038"></a><span class="lineno"> 38</span>  DecryptConfig* decrypt_config) {</div>
|
|
<div class="line"><a name="l00039"></a><span class="lineno"> 39</span>  CHECK_LT(cipher_bytes, std::numeric_limits<uint32_t>::max());</div>
|
|
<div class="line"><a name="l00040"></a><span class="lineno"> 40</span>  <span class="keyword">const</span> uint64_t kUInt16Max = std::numeric_limits<uint16_t>::max();</div>
|
|
<div class="line"><a name="l00041"></a><span class="lineno"> 41</span>  <span class="keywordflow">while</span> (clear_bytes > kUInt16Max) {</div>
|
|
<div class="line"><a name="l00042"></a><span class="lineno"> 42</span>  decrypt_config->AddSubsample(kUInt16Max, 0);</div>
|
|
<div class="line"><a name="l00043"></a><span class="lineno"> 43</span>  clear_bytes -= kUInt16Max;</div>
|
|
<div class="line"><a name="l00044"></a><span class="lineno"> 44</span>  }</div>
|
|
<div class="line"><a name="l00045"></a><span class="lineno"> 45</span> </div>
|
|
<div class="line"><a name="l00046"></a><span class="lineno"> 46</span>  <span class="keywordflow">if</span> (clear_bytes > 0 || cipher_bytes > 0)</div>
|
|
<div class="line"><a name="l00047"></a><span class="lineno"> 47</span>  decrypt_config->AddSubsample(clear_bytes, cipher_bytes);</div>
|
|
<div class="line"><a name="l00048"></a><span class="lineno"> 48</span> }</div>
|
|
<div class="line"><a name="l00049"></a><span class="lineno"> 49</span> </div>
|
|
<div class="line"><a name="l00050"></a><span class="lineno"> 50</span> uint8_t GetNaluLengthSize(<span class="keyword">const</span> StreamInfo& stream_info) {</div>
|
|
<div class="line"><a name="l00051"></a><span class="lineno"> 51</span>  <span class="keywordflow">if</span> (stream_info.stream_type() != kStreamVideo)</div>
|
|
<div class="line"><a name="l00052"></a><span class="lineno"> 52</span>  <span class="keywordflow">return</span> 0;</div>
|
|
<div class="line"><a name="l00053"></a><span class="lineno"> 53</span> </div>
|
|
<div class="line"><a name="l00054"></a><span class="lineno"> 54</span>  <span class="keyword">const</span> VideoStreamInfo& video_stream_info =</div>
|
|
<div class="line"><a name="l00055"></a><span class="lineno"> 55</span>  <span class="keyword">static_cast<</span><span class="keyword">const </span>VideoStreamInfo&<span class="keyword">></span>(stream_info);</div>
|
|
<div class="line"><a name="l00056"></a><span class="lineno"> 56</span>  <span class="keywordflow">return</span> video_stream_info.nalu_length_size();</div>
|
|
<div class="line"><a name="l00057"></a><span class="lineno"> 57</span> }</div>
|
|
<div class="line"><a name="l00058"></a><span class="lineno"> 58</span> </div>
|
|
<div class="line"><a name="l00059"></a><span class="lineno"> 59</span> std::string GetStreamLabelForEncryption(</div>
|
|
<div class="line"><a name="l00060"></a><span class="lineno"> 60</span>  <span class="keyword">const</span> StreamInfo& stream_info,</div>
|
|
<div class="line"><a name="l00061"></a><span class="lineno"> 61</span>  <span class="keyword">const</span> std::function<std::string(</div>
|
|
<div class="line"><a name="l00062"></a><span class="lineno"> 62</span>  <span class="keyword">const</span> EncryptionParams::EncryptedStreamAttributes& stream_attributes)>&</div>
|
|
<div class="line"><a name="l00063"></a><span class="lineno"> 63</span>  stream_label_func) {</div>
|
|
<div class="line"><a name="l00064"></a><span class="lineno"> 64</span>  EncryptionParams::EncryptedStreamAttributes stream_attributes;</div>
|
|
<div class="line"><a name="l00065"></a><span class="lineno"> 65</span>  <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamAudio) {</div>
|
|
<div class="line"><a name="l00066"></a><span class="lineno"> 66</span>  stream_attributes.stream_type =</div>
|
|
<div class="line"><a name="l00067"></a><span class="lineno"> 67</span>  EncryptionParams::EncryptedStreamAttributes::kAudio;</div>
|
|
<div class="line"><a name="l00068"></a><span class="lineno"> 68</span>  } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamVideo) {</div>
|
|
<div class="line"><a name="l00069"></a><span class="lineno"> 69</span>  <span class="keyword">const</span> VideoStreamInfo& video_stream_info =</div>
|
|
<div class="line"><a name="l00070"></a><span class="lineno"> 70</span>  <span class="keyword">static_cast<</span><span class="keyword">const </span>VideoStreamInfo&<span class="keyword">></span>(stream_info);</div>
|
|
<div class="line"><a name="l00071"></a><span class="lineno"> 71</span>  stream_attributes.stream_type =</div>
|
|
<div class="line"><a name="l00072"></a><span class="lineno"> 72</span>  EncryptionParams::EncryptedStreamAttributes::kVideo;</div>
|
|
<div class="line"><a name="l00073"></a><span class="lineno"> 73</span>  stream_attributes.oneof.video.width = video_stream_info.width();</div>
|
|
<div class="line"><a name="l00074"></a><span class="lineno"> 74</span>  stream_attributes.oneof.video.height = video_stream_info.height();</div>
|
|
<div class="line"><a name="l00075"></a><span class="lineno"> 75</span>  }</div>
|
|
<div class="line"><a name="l00076"></a><span class="lineno"> 76</span>  <span class="keywordflow">return</span> stream_label_func(stream_attributes);</div>
|
|
<div class="line"><a name="l00077"></a><span class="lineno"> 77</span> }</div>
|
|
<div class="line"><a name="l00078"></a><span class="lineno"> 78</span> } <span class="comment">// namespace</span></div>
|
|
<div class="line"><a name="l00079"></a><span class="lineno"> 79</span> </div>
|
|
<div class="line"><a name="l00080"></a><span class="lineno"> 80</span> EncryptionHandler::EncryptionHandler(</div>
|
|
<div class="line"><a name="l00081"></a><span class="lineno"> 81</span>  <span class="keyword">const</span> EncryptionOptions& encryption_options,</div>
|
|
<div class="line"><a name="l00082"></a><span class="lineno"> 82</span>  KeySource* key_source)</div>
|
|
<div class="line"><a name="l00083"></a><span class="lineno"> 83</span>  : encryption_options_(encryption_options), key_source_(key_source) {}</div>
|
|
<div class="line"><a name="l00084"></a><span class="lineno"> 84</span> </div>
|
|
<div class="line"><a name="l00085"></a><span class="lineno"> 85</span> EncryptionHandler::~EncryptionHandler() {}</div>
|
|
<div class="line"><a name="l00086"></a><span class="lineno"> 86</span> </div>
|
|
<div class="line"><a name="l00087"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0"> 87</a></span> Status <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">EncryptionHandler::InitializeInternal</a>() {</div>
|
|
<div class="line"><a name="l00088"></a><span class="lineno"> 88</span>  <span class="keywordflow">if</span> (!encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a586017f7bf6490e06a61c1f6eaf7970c">stream_label_func</a>) {</div>
|
|
<div class="line"><a name="l00089"></a><span class="lineno"> 89</span>  <span class="keywordflow">return</span> Status(error::INVALID_ARGUMENT, <span class="stringliteral">"Stream label function not set."</span>);</div>
|
|
<div class="line"><a name="l00090"></a><span class="lineno"> 90</span>  }</div>
|
|
<div class="line"><a name="l00091"></a><span class="lineno"> 91</span>  <span class="keywordflow">if</span> (num_input_streams() != 1 || next_output_stream_index() != 1) {</div>
|
|
<div class="line"><a name="l00092"></a><span class="lineno"> 92</span>  <span class="keywordflow">return</span> Status(error::INVALID_ARGUMENT,</div>
|
|
<div class="line"><a name="l00093"></a><span class="lineno"> 93</span>  <span class="stringliteral">"Expects exactly one input and output."</span>);</div>
|
|
<div class="line"><a name="l00094"></a><span class="lineno"> 94</span>  }</div>
|
|
<div class="line"><a name="l00095"></a><span class="lineno"> 95</span>  <span class="keywordflow">return</span> Status::OK;</div>
|
|
<div class="line"><a name="l00096"></a><span class="lineno"> 96</span> }</div>
|
|
<div class="line"><a name="l00097"></a><span class="lineno"> 97</span> </div>
|
|
<div class="line"><a name="l00098"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4"> 98</a></span> Status <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">EncryptionHandler::Process</a>(std::unique_ptr<StreamData> stream_data) {</div>
|
|
<div class="line"><a name="l00099"></a><span class="lineno"> 99</span>  Status status;</div>
|
|
<div class="line"><a name="l00100"></a><span class="lineno"> 100</span>  <span class="keywordflow">switch</span> (stream_data->stream_data_type) {</div>
|
|
<div class="line"><a name="l00101"></a><span class="lineno"> 101</span>  <span class="keywordflow">case</span> StreamDataType::kStreamInfo:</div>
|
|
<div class="line"><a name="l00102"></a><span class="lineno"> 102</span>  status = ProcessStreamInfo(stream_data->stream_info.get());</div>
|
|
<div class="line"><a name="l00103"></a><span class="lineno"> 103</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00104"></a><span class="lineno"> 104</span>  <span class="keywordflow">case</span> StreamDataType::kSegmentInfo: {</div>
|
|
<div class="line"><a name="l00105"></a><span class="lineno"> 105</span>  <a class="code" href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">SegmentInfo</a>* segment_info = stream_data->segment_info.get();</div>
|
|
<div class="line"><a name="l00106"></a><span class="lineno"> 106</span>  segment_info->is_encrypted = remaining_clear_lead_ <= 0;</div>
|
|
<div class="line"><a name="l00107"></a><span class="lineno"> 107</span> </div>
|
|
<div class="line"><a name="l00108"></a><span class="lineno"> 108</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div>
|
|
<div class="line"><a name="l00109"></a><span class="lineno"> 109</span>  <span class="keywordflow">if</span> (key_rotation_enabled)</div>
|
|
<div class="line"><a name="l00110"></a><span class="lineno"> 110</span>  segment_info->key_rotation_encryption_config = encryption_config_;</div>
|
|
<div class="line"><a name="l00111"></a><span class="lineno"> 111</span>  <span class="keywordflow">if</span> (!segment_info->is_subsegment) {</div>
|
|
<div class="line"><a name="l00112"></a><span class="lineno"> 112</span>  <span class="keywordflow">if</span> (key_rotation_enabled)</div>
|
|
<div class="line"><a name="l00113"></a><span class="lineno"> 113</span>  check_new_crypto_period_ = <span class="keyword">true</span>;</div>
|
|
<div class="line"><a name="l00114"></a><span class="lineno"> 114</span>  <span class="keywordflow">if</span> (remaining_clear_lead_ > 0)</div>
|
|
<div class="line"><a name="l00115"></a><span class="lineno"> 115</span>  remaining_clear_lead_ -= segment_info->duration;</div>
|
|
<div class="line"><a name="l00116"></a><span class="lineno"> 116</span>  }</div>
|
|
<div class="line"><a name="l00117"></a><span class="lineno"> 117</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00118"></a><span class="lineno"> 118</span>  }</div>
|
|
<div class="line"><a name="l00119"></a><span class="lineno"> 119</span>  <span class="keywordflow">case</span> StreamDataType::kMediaSample:</div>
|
|
<div class="line"><a name="l00120"></a><span class="lineno"> 120</span>  status = ProcessMediaSample(stream_data->media_sample.get());</div>
|
|
<div class="line"><a name="l00121"></a><span class="lineno"> 121</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00122"></a><span class="lineno"> 122</span>  <span class="keywordflow">default</span>:</div>
|
|
<div class="line"><a name="l00123"></a><span class="lineno"> 123</span>  VLOG(3) << <span class="stringliteral">"Stream data type "</span></div>
|
|
<div class="line"><a name="l00124"></a><span class="lineno"> 124</span>  << <span class="keyword">static_cast<</span><span class="keywordtype">int</span><span class="keyword">></span>(stream_data->stream_data_type) << <span class="stringliteral">" ignored."</span>;</div>
|
|
<div class="line"><a name="l00125"></a><span class="lineno"> 125</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00126"></a><span class="lineno"> 126</span>  }</div>
|
|
<div class="line"><a name="l00127"></a><span class="lineno"> 127</span>  <span class="keywordflow">return</span> status.ok() ? <a class="code" href="../../da/dfd/classshaka_1_1media_1_1MediaHandler.html#accd62dd4def920571f95f4e1a98ab7ca">Dispatch</a>(std::move(stream_data)) : status;</div>
|
|
<div class="line"><a name="l00128"></a><span class="lineno"> 128</span> }</div>
|
|
<div class="line"><a name="l00129"></a><span class="lineno"> 129</span> </div>
|
|
<div class="line"><a name="l00130"></a><span class="lineno"> 130</span> Status EncryptionHandler::ProcessStreamInfo(<a class="code" href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">StreamInfo</a>* stream_info) {</div>
|
|
<div class="line"><a name="l00131"></a><span class="lineno"> 131</span>  <span class="keywordflow">if</span> (stream_info->is_encrypted()) {</div>
|
|
<div class="line"><a name="l00132"></a><span class="lineno"> 132</span>  <span class="keywordflow">return</span> Status(error::INVALID_ARGUMENT,</div>
|
|
<div class="line"><a name="l00133"></a><span class="lineno"> 133</span>  <span class="stringliteral">"Input stream is already encrypted."</span>);</div>
|
|
<div class="line"><a name="l00134"></a><span class="lineno"> 134</span>  }</div>
|
|
<div class="line"><a name="l00135"></a><span class="lineno"> 135</span> </div>
|
|
<div class="line"><a name="l00136"></a><span class="lineno"> 136</span>  remaining_clear_lead_ =</div>
|
|
<div class="line"><a name="l00137"></a><span class="lineno"> 137</span>  encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a3d58dc01a4af0ebfb56f3c4979f745f7">clear_lead_in_seconds</a> * stream_info->time_scale();</div>
|
|
<div class="line"><a name="l00138"></a><span class="lineno"> 138</span>  crypto_period_duration_ =</div>
|
|
<div class="line"><a name="l00139"></a><span class="lineno"> 139</span>  encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a20acea0141ca7c8dd57d0129c53a6d13">crypto_period_duration_in_seconds</a> *</div>
|
|
<div class="line"><a name="l00140"></a><span class="lineno"> 140</span>  stream_info->time_scale();</div>
|
|
<div class="line"><a name="l00141"></a><span class="lineno"> 141</span>  codec_ = stream_info->codec();</div>
|
|
<div class="line"><a name="l00142"></a><span class="lineno"> 142</span>  nalu_length_size_ = GetNaluLengthSize(*stream_info);</div>
|
|
<div class="line"><a name="l00143"></a><span class="lineno"> 143</span>  stream_label_ = GetStreamLabelForEncryption(</div>
|
|
<div class="line"><a name="l00144"></a><span class="lineno"> 144</span>  *stream_info, encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a586017f7bf6490e06a61c1f6eaf7970c">stream_label_func</a>);</div>
|
|
<div class="line"><a name="l00145"></a><span class="lineno"> 145</span>  <span class="keywordflow">switch</span> (codec_) {</div>
|
|
<div class="line"><a name="l00146"></a><span class="lineno"> 146</span>  <span class="keywordflow">case</span> kCodecVP9:</div>
|
|
<div class="line"><a name="l00147"></a><span class="lineno"> 147</span>  <span class="keywordflow">if</span> (encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a2f971f63a7525a777d5578d87ef0c99f">vp9_subsample_encryption</a>)</div>
|
|
<div class="line"><a name="l00148"></a><span class="lineno"> 148</span>  vpx_parser_.reset(<span class="keyword">new</span> VP9Parser);</div>
|
|
<div class="line"><a name="l00149"></a><span class="lineno"> 149</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00150"></a><span class="lineno"> 150</span>  <span class="keywordflow">case</span> kCodecH264:</div>
|
|
<div class="line"><a name="l00151"></a><span class="lineno"> 151</span>  header_parser_.reset(<span class="keyword">new</span> H264VideoSliceHeaderParser);</div>
|
|
<div class="line"><a name="l00152"></a><span class="lineno"> 152</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00153"></a><span class="lineno"> 153</span>  <span class="keywordflow">case</span> kCodecH265:</div>
|
|
<div class="line"><a name="l00154"></a><span class="lineno"> 154</span>  header_parser_.reset(<span class="keyword">new</span> H265VideoSliceHeaderParser);</div>
|
|
<div class="line"><a name="l00155"></a><span class="lineno"> 155</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00156"></a><span class="lineno"> 156</span>  <span class="keywordflow">default</span>:</div>
|
|
<div class="line"><a name="l00157"></a><span class="lineno"> 157</span>  <span class="comment">// Other codecs should have nalu length size == 0.</span></div>
|
|
<div class="line"><a name="l00158"></a><span class="lineno"> 158</span>  <span class="keywordflow">if</span> (nalu_length_size_ > 0) {</div>
|
|
<div class="line"><a name="l00159"></a><span class="lineno"> 159</span>  LOG(WARNING) << <span class="stringliteral">"Unknown video codec '"</span> << codec_ << <span class="stringliteral">"'"</span>;</div>
|
|
<div class="line"><a name="l00160"></a><span class="lineno"> 160</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Unknown video codec."</span>);</div>
|
|
<div class="line"><a name="l00161"></a><span class="lineno"> 161</span>  }</div>
|
|
<div class="line"><a name="l00162"></a><span class="lineno"> 162</span>  }</div>
|
|
<div class="line"><a name="l00163"></a><span class="lineno"> 163</span>  <span class="keywordflow">if</span> (header_parser_) {</div>
|
|
<div class="line"><a name="l00164"></a><span class="lineno"> 164</span>  CHECK_NE(nalu_length_size_, 0u) << <span class="stringliteral">"AnnexB stream is not supported yet"</span>;</div>
|
|
<div class="line"><a name="l00165"></a><span class="lineno"> 165</span>  <span class="keywordflow">if</span> (!header_parser_->Initialize(stream_info->codec_config())) {</div>
|
|
<div class="line"><a name="l00166"></a><span class="lineno"> 166</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE,</div>
|
|
<div class="line"><a name="l00167"></a><span class="lineno"> 167</span>  <span class="stringliteral">"Fail to read SPS and PPS data."</span>);</div>
|
|
<div class="line"><a name="l00168"></a><span class="lineno"> 168</span>  }</div>
|
|
<div class="line"><a name="l00169"></a><span class="lineno"> 169</span>  }</div>
|
|
<div class="line"><a name="l00170"></a><span class="lineno"> 170</span> </div>
|
|
<div class="line"><a name="l00171"></a><span class="lineno"> 171</span>  Status status = SetupProtectionPattern(stream_info->stream_type());</div>
|
|
<div class="line"><a name="l00172"></a><span class="lineno"> 172</span>  <span class="keywordflow">if</span> (!status.ok())</div>
|
|
<div class="line"><a name="l00173"></a><span class="lineno"> 173</span>  <span class="keywordflow">return</span> status;</div>
|
|
<div class="line"><a name="l00174"></a><span class="lineno"> 174</span> </div>
|
|
<div class="line"><a name="l00175"></a><span class="lineno"> 175</span>  EncryptionKey encryption_key;</div>
|
|
<div class="line"><a name="l00176"></a><span class="lineno"> 176</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div>
|
|
<div class="line"><a name="l00177"></a><span class="lineno"> 177</span>  <span class="keywordflow">if</span> (key_rotation_enabled) {</div>
|
|
<div class="line"><a name="l00178"></a><span class="lineno"> 178</span>  check_new_crypto_period_ = <span class="keyword">true</span>;</div>
|
|
<div class="line"><a name="l00179"></a><span class="lineno"> 179</span>  <span class="comment">// Setup dummy key id and key to signal encryption for key rotation.</span></div>
|
|
<div class="line"><a name="l00180"></a><span class="lineno"> 180</span>  encryption_key.key_id.assign(</div>
|
|
<div class="line"><a name="l00181"></a><span class="lineno"> 181</span>  kKeyRotationDefaultKeyId,</div>
|
|
<div class="line"><a name="l00182"></a><span class="lineno"> 182</span>  kKeyRotationDefaultKeyId + <span class="keyword">sizeof</span>(kKeyRotationDefaultKeyId));</div>
|
|
<div class="line"><a name="l00183"></a><span class="lineno"> 183</span>  <span class="comment">// The key is not really used to encrypt any data. It is there just for</span></div>
|
|
<div class="line"><a name="l00184"></a><span class="lineno"> 184</span>  <span class="comment">// convenience.</span></div>
|
|
<div class="line"><a name="l00185"></a><span class="lineno"> 185</span>  encryption_key.key = encryption_key.key_id;</div>
|
|
<div class="line"><a name="l00186"></a><span class="lineno"> 186</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00187"></a><span class="lineno"> 187</span>  status = key_source_-><a class="code" href="../../d1/d1f/classshaka_1_1media_1_1KeySource.html#af56c833453d65297c4dc96c9d2f83e1a">GetKey</a>(stream_label_, &encryption_key);</div>
|
|
<div class="line"><a name="l00188"></a><span class="lineno"> 188</span>  <span class="keywordflow">if</span> (!status.ok())</div>
|
|
<div class="line"><a name="l00189"></a><span class="lineno"> 189</span>  <span class="keywordflow">return</span> status;</div>
|
|
<div class="line"><a name="l00190"></a><span class="lineno"> 190</span>  }</div>
|
|
<div class="line"><a name="l00191"></a><span class="lineno"> 191</span>  <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div>
|
|
<div class="line"><a name="l00192"></a><span class="lineno"> 192</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to create encryptor"</span>);</div>
|
|
<div class="line"><a name="l00193"></a><span class="lineno"> 193</span> </div>
|
|
<div class="line"><a name="l00194"></a><span class="lineno"> 194</span>  stream_info->set_is_encrypted(<span class="keyword">true</span>);</div>
|
|
<div class="line"><a name="l00195"></a><span class="lineno"> 195</span>  stream_info->set_has_clear_lead(encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a3d58dc01a4af0ebfb56f3c4979f745f7">clear_lead_in_seconds</a> ></div>
|
|
<div class="line"><a name="l00196"></a><span class="lineno"> 196</span>  0);</div>
|
|
<div class="line"><a name="l00197"></a><span class="lineno"> 197</span>  stream_info->set_encryption_config(*encryption_config_);</div>
|
|
<div class="line"><a name="l00198"></a><span class="lineno"> 198</span>  <span class="keywordflow">return</span> Status::OK;</div>
|
|
<div class="line"><a name="l00199"></a><span class="lineno"> 199</span> }</div>
|
|
<div class="line"><a name="l00200"></a><span class="lineno"> 200</span> </div>
|
|
<div class="line"><a name="l00201"></a><span class="lineno"> 201</span> Status EncryptionHandler::ProcessMediaSample(MediaSample* sample) {</div>
|
|
<div class="line"><a name="l00202"></a><span class="lineno"> 202</span>  <span class="comment">// We need to parse the frame (which also updates the vpx parser) even if the</span></div>
|
|
<div class="line"><a name="l00203"></a><span class="lineno"> 203</span>  <span class="comment">// frame is not encrypted as the next (encrypted) frame may be dependent on</span></div>
|
|
<div class="line"><a name="l00204"></a><span class="lineno"> 204</span>  <span class="comment">// this clear frame.</span></div>
|
|
<div class="line"><a name="l00205"></a><span class="lineno"> 205</span>  std::vector<VPxFrameInfo> vpx_frames;</div>
|
|
<div class="line"><a name="l00206"></a><span class="lineno"> 206</span>  <span class="keywordflow">if</span> (vpx_parser_ &&</div>
|
|
<div class="line"><a name="l00207"></a><span class="lineno"> 207</span>  !vpx_parser_->Parse(sample->data(), sample->data_size(), &vpx_frames)) {</div>
|
|
<div class="line"><a name="l00208"></a><span class="lineno"> 208</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to parse vpx frame."</span>);</div>
|
|
<div class="line"><a name="l00209"></a><span class="lineno"> 209</span>  }</div>
|
|
<div class="line"><a name="l00210"></a><span class="lineno"> 210</span> </div>
|
|
<div class="line"><a name="l00211"></a><span class="lineno"> 211</span>  <span class="comment">// Need to setup the encryptor for new segments even if this segment does not</span></div>
|
|
<div class="line"><a name="l00212"></a><span class="lineno"> 212</span>  <span class="comment">// need to be encrypted, so we can signal encryption metadata earlier to</span></div>
|
|
<div class="line"><a name="l00213"></a><span class="lineno"> 213</span>  <span class="comment">// allows clients to prefetch the keys.</span></div>
|
|
<div class="line"><a name="l00214"></a><span class="lineno"> 214</span>  <span class="keywordflow">if</span> (check_new_crypto_period_) {</div>
|
|
<div class="line"><a name="l00215"></a><span class="lineno"> 215</span>  <span class="keyword">const</span> int64_t current_crypto_period_index =</div>
|
|
<div class="line"><a name="l00216"></a><span class="lineno"> 216</span>  sample->dts() / crypto_period_duration_;</div>
|
|
<div class="line"><a name="l00217"></a><span class="lineno"> 217</span>  <span class="keywordflow">if</span> (current_crypto_period_index != prev_crypto_period_index_) {</div>
|
|
<div class="line"><a name="l00218"></a><span class="lineno"> 218</span>  EncryptionKey encryption_key;</div>
|
|
<div class="line"><a name="l00219"></a><span class="lineno"> 219</span>  Status status = key_source_-><a class="code" href="../../d1/d1f/classshaka_1_1media_1_1KeySource.html#a34340247a575bc693d14c3bef9102258">GetCryptoPeriodKey</a>(</div>
|
|
<div class="line"><a name="l00220"></a><span class="lineno"> 220</span>  current_crypto_period_index, stream_label_, &encryption_key);</div>
|
|
<div class="line"><a name="l00221"></a><span class="lineno"> 221</span>  <span class="keywordflow">if</span> (!status.ok())</div>
|
|
<div class="line"><a name="l00222"></a><span class="lineno"> 222</span>  <span class="keywordflow">return</span> status;</div>
|
|
<div class="line"><a name="l00223"></a><span class="lineno"> 223</span>  <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div>
|
|
<div class="line"><a name="l00224"></a><span class="lineno"> 224</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to create encryptor"</span>);</div>
|
|
<div class="line"><a name="l00225"></a><span class="lineno"> 225</span>  prev_crypto_period_index_ = current_crypto_period_index;</div>
|
|
<div class="line"><a name="l00226"></a><span class="lineno"> 226</span>  }</div>
|
|
<div class="line"><a name="l00227"></a><span class="lineno"> 227</span>  check_new_crypto_period_ = <span class="keyword">false</span>;</div>
|
|
<div class="line"><a name="l00228"></a><span class="lineno"> 228</span>  }</div>
|
|
<div class="line"><a name="l00229"></a><span class="lineno"> 229</span> </div>
|
|
<div class="line"><a name="l00230"></a><span class="lineno"> 230</span>  <span class="keywordflow">if</span> (remaining_clear_lead_ > 0)</div>
|
|
<div class="line"><a name="l00231"></a><span class="lineno"> 231</span>  <span class="keywordflow">return</span> Status::OK;</div>
|
|
<div class="line"><a name="l00232"></a><span class="lineno"> 232</span> </div>
|
|
<div class="line"><a name="l00233"></a><span class="lineno"> 233</span>  std::unique_ptr<DecryptConfig> decrypt_config(<span class="keyword">new</span> DecryptConfig(</div>
|
|
<div class="line"><a name="l00234"></a><span class="lineno"> 234</span>  encryption_config_->key_id, encryptor_->iv(),</div>
|
|
<div class="line"><a name="l00235"></a><span class="lineno"> 235</span>  std::vector<SubsampleEntry>(), encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a>,</div>
|
|
<div class="line"><a name="l00236"></a><span class="lineno"> 236</span>  crypt_byte_block_, skip_byte_block_));</div>
|
|
<div class="line"><a name="l00237"></a><span class="lineno"> 237</span>  <span class="keywordtype">bool</span> result = <span class="keyword">true</span>;</div>
|
|
<div class="line"><a name="l00238"></a><span class="lineno"> 238</span>  <span class="keywordflow">if</span> (vpx_parser_) {</div>
|
|
<div class="line"><a name="l00239"></a><span class="lineno"> 239</span>  result = EncryptVpxFrame(vpx_frames, sample, decrypt_config.get());</div>
|
|
<div class="line"><a name="l00240"></a><span class="lineno"> 240</span>  <span class="keywordflow">if</span> (result) {</div>
|
|
<div class="line"><a name="l00241"></a><span class="lineno"> 241</span>  DCHECK_EQ(decrypt_config->GetTotalSizeOfSubsamples(),</div>
|
|
<div class="line"><a name="l00242"></a><span class="lineno"> 242</span>  sample->data_size());</div>
|
|
<div class="line"><a name="l00243"></a><span class="lineno"> 243</span>  }</div>
|
|
<div class="line"><a name="l00244"></a><span class="lineno"> 244</span>  } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (header_parser_) {</div>
|
|
<div class="line"><a name="l00245"></a><span class="lineno"> 245</span>  result = EncryptNalFrame(sample, decrypt_config.get());</div>
|
|
<div class="line"><a name="l00246"></a><span class="lineno"> 246</span>  <span class="keywordflow">if</span> (result) {</div>
|
|
<div class="line"><a name="l00247"></a><span class="lineno"> 247</span>  DCHECK_EQ(decrypt_config->GetTotalSizeOfSubsamples(),</div>
|
|
<div class="line"><a name="l00248"></a><span class="lineno"> 248</span>  sample->data_size());</div>
|
|
<div class="line"><a name="l00249"></a><span class="lineno"> 249</span>  }</div>
|
|
<div class="line"><a name="l00250"></a><span class="lineno"> 250</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00251"></a><span class="lineno"> 251</span>  <span class="keywordflow">if</span> (sample->data_size() > leading_clear_bytes_size_) {</div>
|
|
<div class="line"><a name="l00252"></a><span class="lineno"> 252</span>  EncryptBytes(sample->writable_data() + leading_clear_bytes_size_,</div>
|
|
<div class="line"><a name="l00253"></a><span class="lineno"> 253</span>  sample->data_size() - leading_clear_bytes_size_);</div>
|
|
<div class="line"><a name="l00254"></a><span class="lineno"> 254</span>  }</div>
|
|
<div class="line"><a name="l00255"></a><span class="lineno"> 255</span>  }</div>
|
|
<div class="line"><a name="l00256"></a><span class="lineno"> 256</span>  <span class="keywordflow">if</span> (!result)</div>
|
|
<div class="line"><a name="l00257"></a><span class="lineno"> 257</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to encrypt samples."</span>);</div>
|
|
<div class="line"><a name="l00258"></a><span class="lineno"> 258</span>  sample->set_is_encrypted(<span class="keyword">true</span>);</div>
|
|
<div class="line"><a name="l00259"></a><span class="lineno"> 259</span>  sample->set_decrypt_config(std::move(decrypt_config));</div>
|
|
<div class="line"><a name="l00260"></a><span class="lineno"> 260</span>  encryptor_->UpdateIv();</div>
|
|
<div class="line"><a name="l00261"></a><span class="lineno"> 261</span>  <span class="keywordflow">return</span> Status::OK;</div>
|
|
<div class="line"><a name="l00262"></a><span class="lineno"> 262</span> }</div>
|
|
<div class="line"><a name="l00263"></a><span class="lineno"> 263</span> </div>
|
|
<div class="line"><a name="l00264"></a><span class="lineno"> 264</span> Status EncryptionHandler::SetupProtectionPattern(StreamType stream_type) {</div>
|
|
<div class="line"><a name="l00265"></a><span class="lineno"> 265</span>  <span class="keywordflow">switch</span> (encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a>) {</div>
|
|
<div class="line"><a name="l00266"></a><span class="lineno"> 266</span>  <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme: {</div>
|
|
<div class="line"><a name="l00267"></a><span class="lineno"> 267</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kH264LeadingClearBytesSize = 32u;</div>
|
|
<div class="line"><a name="l00268"></a><span class="lineno"> 268</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kSmallNalUnitSize = 32u + 16u;</div>
|
|
<div class="line"><a name="l00269"></a><span class="lineno"> 269</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kAudioLeadingClearBytesSize = 16u;</div>
|
|
<div class="line"><a name="l00270"></a><span class="lineno"> 270</span>  <span class="keywordflow">switch</span> (codec_) {</div>
|
|
<div class="line"><a name="l00271"></a><span class="lineno"> 271</span>  <span class="keywordflow">case</span> kCodecH264:</div>
|
|
<div class="line"><a name="l00272"></a><span class="lineno"> 272</span>  <span class="comment">// Apple Sample AES uses 1:9 pattern for video.</span></div>
|
|
<div class="line"><a name="l00273"></a><span class="lineno"> 273</span>  crypt_byte_block_ = 1u;</div>
|
|
<div class="line"><a name="l00274"></a><span class="lineno"> 274</span>  skip_byte_block_ = 9u;</div>
|
|
<div class="line"><a name="l00275"></a><span class="lineno"> 275</span>  leading_clear_bytes_size_ = kH264LeadingClearBytesSize;</div>
|
|
<div class="line"><a name="l00276"></a><span class="lineno"> 276</span>  min_protected_data_size_ = kSmallNalUnitSize + 1u;</div>
|
|
<div class="line"><a name="l00277"></a><span class="lineno"> 277</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00278"></a><span class="lineno"> 278</span>  <span class="keywordflow">case</span> kCodecAAC:</div>
|
|
<div class="line"><a name="l00279"></a><span class="lineno"> 279</span>  FALLTHROUGH_INTENDED;</div>
|
|
<div class="line"><a name="l00280"></a><span class="lineno"> 280</span>  <span class="keywordflow">case</span> kCodecAC3:</div>
|
|
<div class="line"><a name="l00281"></a><span class="lineno"> 281</span>  <span class="comment">// Audio is whole sample encrypted. We could not use a</span></div>
|
|
<div class="line"><a name="l00282"></a><span class="lineno"> 282</span>  <span class="comment">// crypto_byte_block_ of 1 here as if there is one crypto block</span></div>
|
|
<div class="line"><a name="l00283"></a><span class="lineno"> 283</span>  <span class="comment">// remaining, it need not be encrypted for video but it needs to be</span></div>
|
|
<div class="line"><a name="l00284"></a><span class="lineno"> 284</span>  <span class="comment">// encrypted for audio.</span></div>
|
|
<div class="line"><a name="l00285"></a><span class="lineno"> 285</span>  crypt_byte_block_ = 0u;</div>
|
|
<div class="line"><a name="l00286"></a><span class="lineno"> 286</span>  skip_byte_block_ = 0u;</div>
|
|
<div class="line"><a name="l00287"></a><span class="lineno"> 287</span>  leading_clear_bytes_size_ = kAudioLeadingClearBytesSize;</div>
|
|
<div class="line"><a name="l00288"></a><span class="lineno"> 288</span>  min_protected_data_size_ = leading_clear_bytes_size_ + 1u;</div>
|
|
<div class="line"><a name="l00289"></a><span class="lineno"> 289</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00290"></a><span class="lineno"> 290</span>  <span class="keywordflow">default</span>:</div>
|
|
<div class="line"><a name="l00291"></a><span class="lineno"> 291</span>  <span class="keywordflow">return</span> Status(error::ENCRYPTION_FAILURE,</div>
|
|
<div class="line"><a name="l00292"></a><span class="lineno"> 292</span>  <span class="stringliteral">"Only AAC/AC3 and H264 are supported in Sample AES."</span>);</div>
|
|
<div class="line"><a name="l00293"></a><span class="lineno"> 293</span>  }</div>
|
|
<div class="line"><a name="l00294"></a><span class="lineno"> 294</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00295"></a><span class="lineno"> 295</span>  }</div>
|
|
<div class="line"><a name="l00296"></a><span class="lineno"> 296</span>  <span class="keywordflow">case</span> FOURCC_cbcs:</div>
|
|
<div class="line"><a name="l00297"></a><span class="lineno"> 297</span>  FALLTHROUGH_INTENDED;</div>
|
|
<div class="line"><a name="l00298"></a><span class="lineno"> 298</span>  <span class="keywordflow">case</span> FOURCC_cens:</div>
|
|
<div class="line"><a name="l00299"></a><span class="lineno"> 299</span>  <span class="keywordflow">if</span> (stream_type == kStreamVideo) {</div>
|
|
<div class="line"><a name="l00300"></a><span class="lineno"> 300</span>  <span class="comment">// Use 1:9 pattern for video.</span></div>
|
|
<div class="line"><a name="l00301"></a><span class="lineno"> 301</span>  crypt_byte_block_ = 1u;</div>
|
|
<div class="line"><a name="l00302"></a><span class="lineno"> 302</span>  skip_byte_block_ = 9u;</div>
|
|
<div class="line"><a name="l00303"></a><span class="lineno"> 303</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00304"></a><span class="lineno"> 304</span>  <span class="comment">// Tracks other than video are protected using whole-block full-sample</span></div>
|
|
<div class="line"><a name="l00305"></a><span class="lineno"> 305</span>  <span class="comment">// encryption, which is essentially a pattern of 1:0. Note that this may</span></div>
|
|
<div class="line"><a name="l00306"></a><span class="lineno"> 306</span>  <span class="comment">// not be the same as the non-pattern based encryption counterparts,</span></div>
|
|
<div class="line"><a name="l00307"></a><span class="lineno"> 307</span>  <span class="comment">// e.g. in 'cens' for full sample encryption, the whole sample is</span></div>
|
|
<div class="line"><a name="l00308"></a><span class="lineno"> 308</span>  <span class="comment">// encrypted up to the last 16-byte boundary, see 23001-7:2016(E) 9.7;</span></div>
|
|
<div class="line"><a name="l00309"></a><span class="lineno"> 309</span>  <span class="comment">// while in 'cenc' for full sample encryption, the last partial 16-byte</span></div>
|
|
<div class="line"><a name="l00310"></a><span class="lineno"> 310</span>  <span class="comment">// block is also encrypted, see 23001-7:2016(E) 9.4.2. Another</span></div>
|
|
<div class="line"><a name="l00311"></a><span class="lineno"> 311</span>  <span class="comment">// difference is the use of constant iv.</span></div>
|
|
<div class="line"><a name="l00312"></a><span class="lineno"> 312</span>  crypt_byte_block_ = 1u;</div>
|
|
<div class="line"><a name="l00313"></a><span class="lineno"> 313</span>  skip_byte_block_ = 0u;</div>
|
|
<div class="line"><a name="l00314"></a><span class="lineno"> 314</span>  }</div>
|
|
<div class="line"><a name="l00315"></a><span class="lineno"> 315</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00316"></a><span class="lineno"> 316</span>  <span class="keywordflow">default</span>:</div>
|
|
<div class="line"><a name="l00317"></a><span class="lineno"> 317</span>  <span class="comment">// Not using pattern encryption.</span></div>
|
|
<div class="line"><a name="l00318"></a><span class="lineno"> 318</span>  crypt_byte_block_ = 0u;</div>
|
|
<div class="line"><a name="l00319"></a><span class="lineno"> 319</span>  skip_byte_block_ = 0u;</div>
|
|
<div class="line"><a name="l00320"></a><span class="lineno"> 320</span>  }</div>
|
|
<div class="line"><a name="l00321"></a><span class="lineno"> 321</span>  <span class="keywordflow">return</span> Status::OK;</div>
|
|
<div class="line"><a name="l00322"></a><span class="lineno"> 322</span> }</div>
|
|
<div class="line"><a name="l00323"></a><span class="lineno"> 323</span> </div>
|
|
<div class="line"><a name="l00324"></a><span class="lineno"> 324</span> <span class="keywordtype">bool</span> EncryptionHandler::CreateEncryptor(<span class="keyword">const</span> EncryptionKey& encryption_key) {</div>
|
|
<div class="line"><a name="l00325"></a><span class="lineno"> 325</span>  std::unique_ptr<AesCryptor> encryptor;</div>
|
|
<div class="line"><a name="l00326"></a><span class="lineno"> 326</span>  <span class="keywordflow">switch</span> (encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a>) {</div>
|
|
<div class="line"><a name="l00327"></a><span class="lineno"> 327</span>  <span class="keywordflow">case</span> FOURCC_cenc:</div>
|
|
<div class="line"><a name="l00328"></a><span class="lineno"> 328</span>  encryptor.reset(<span class="keyword">new</span> AesCtrEncryptor);</div>
|
|
<div class="line"><a name="l00329"></a><span class="lineno"> 329</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00330"></a><span class="lineno"> 330</span>  <span class="keywordflow">case</span> FOURCC_cbc1:</div>
|
|
<div class="line"><a name="l00331"></a><span class="lineno"> 331</span>  encryptor.reset(<span class="keyword">new</span> AesCbcEncryptor(kNoPadding));</div>
|
|
<div class="line"><a name="l00332"></a><span class="lineno"> 332</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00333"></a><span class="lineno"> 333</span>  <span class="keywordflow">case</span> FOURCC_cens:</div>
|
|
<div class="line"><a name="l00334"></a><span class="lineno"> 334</span>  encryptor.reset(<span class="keyword">new</span> AesPatternCryptor(</div>
|
|
<div class="line"><a name="l00335"></a><span class="lineno"> 335</span>  crypt_byte_block_, skip_byte_block_,</div>
|
|
<div class="line"><a name="l00336"></a><span class="lineno"> 336</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div>
|
|
<div class="line"><a name="l00337"></a><span class="lineno"> 337</span>  AesCryptor::kDontUseConstantIv,</div>
|
|
<div class="line"><a name="l00338"></a><span class="lineno"> 338</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> AesCtrEncryptor())));</div>
|
|
<div class="line"><a name="l00339"></a><span class="lineno"> 339</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00340"></a><span class="lineno"> 340</span>  <span class="keywordflow">case</span> FOURCC_cbcs:</div>
|
|
<div class="line"><a name="l00341"></a><span class="lineno"> 341</span>  encryptor.reset(<span class="keyword">new</span> AesPatternCryptor(</div>
|
|
<div class="line"><a name="l00342"></a><span class="lineno"> 342</span>  crypt_byte_block_, skip_byte_block_,</div>
|
|
<div class="line"><a name="l00343"></a><span class="lineno"> 343</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div>
|
|
<div class="line"><a name="l00344"></a><span class="lineno"> 344</span>  AesCryptor::kUseConstantIv,</div>
|
|
<div class="line"><a name="l00345"></a><span class="lineno"> 345</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> AesCbcEncryptor(kNoPadding))));</div>
|
|
<div class="line"><a name="l00346"></a><span class="lineno"> 346</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00347"></a><span class="lineno"> 347</span>  <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme:</div>
|
|
<div class="line"><a name="l00348"></a><span class="lineno"> 348</span>  <span class="keywordflow">if</span> (crypt_byte_block_ == 0 && skip_byte_block_ == 0) {</div>
|
|
<div class="line"><a name="l00349"></a><span class="lineno"> 349</span>  encryptor.reset(</div>
|
|
<div class="line"><a name="l00350"></a><span class="lineno"> 350</span>  <span class="keyword">new</span> AesCbcEncryptor(kNoPadding, AesCryptor::kUseConstantIv));</div>
|
|
<div class="line"><a name="l00351"></a><span class="lineno"> 351</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00352"></a><span class="lineno"> 352</span>  encryptor.reset(<span class="keyword">new</span> AesPatternCryptor(</div>
|
|
<div class="line"><a name="l00353"></a><span class="lineno"> 353</span>  crypt_byte_block_, skip_byte_block_,</div>
|
|
<div class="line"><a name="l00354"></a><span class="lineno"> 354</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a>,</div>
|
|
<div class="line"><a name="l00355"></a><span class="lineno"> 355</span>  AesCryptor::kUseConstantIv,</div>
|
|
<div class="line"><a name="l00356"></a><span class="lineno"> 356</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> AesCbcEncryptor(kNoPadding))));</div>
|
|
<div class="line"><a name="l00357"></a><span class="lineno"> 357</span>  }</div>
|
|
<div class="line"><a name="l00358"></a><span class="lineno"> 358</span>  <span class="keywordflow">break</span>;</div>
|
|
<div class="line"><a name="l00359"></a><span class="lineno"> 359</span>  <span class="keywordflow">default</span>:</div>
|
|
<div class="line"><a name="l00360"></a><span class="lineno"> 360</span>  LOG(ERROR) << <span class="stringliteral">"Unsupported protection scheme."</span>;</div>
|
|
<div class="line"><a name="l00361"></a><span class="lineno"> 361</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div>
|
|
<div class="line"><a name="l00362"></a><span class="lineno"> 362</span>  }</div>
|
|
<div class="line"><a name="l00363"></a><span class="lineno"> 363</span> </div>
|
|
<div class="line"><a name="l00364"></a><span class="lineno"> 364</span>  std::vector<uint8_t> iv = encryption_key.iv;</div>
|
|
<div class="line"><a name="l00365"></a><span class="lineno"> 365</span>  <span class="keywordflow">if</span> (iv.empty()) {</div>
|
|
<div class="line"><a name="l00366"></a><span class="lineno"> 366</span>  <span class="keywordflow">if</span> (!<a class="code" href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">AesCryptor::GenerateRandomIv</a>(encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a>,</div>
|
|
<div class="line"><a name="l00367"></a><span class="lineno"> 367</span>  &iv)) {</div>
|
|
<div class="line"><a name="l00368"></a><span class="lineno"> 368</span>  LOG(ERROR) << <span class="stringliteral">"Failed to generate random iv."</span>;</div>
|
|
<div class="line"><a name="l00369"></a><span class="lineno"> 369</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div>
|
|
<div class="line"><a name="l00370"></a><span class="lineno"> 370</span>  }</div>
|
|
<div class="line"><a name="l00371"></a><span class="lineno"> 371</span>  }</div>
|
|
<div class="line"><a name="l00372"></a><span class="lineno"> 372</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> initialized =</div>
|
|
<div class="line"><a name="l00373"></a><span class="lineno"> 373</span>  encryptor->InitializeWithIv(encryption_key.key, iv);</div>
|
|
<div class="line"><a name="l00374"></a><span class="lineno"> 374</span>  encryptor_ = std::move(encryptor);</div>
|
|
<div class="line"><a name="l00375"></a><span class="lineno"> 375</span> </div>
|
|
<div class="line"><a name="l00376"></a><span class="lineno"> 376</span>  encryption_config_.reset(<span class="keyword">new</span> EncryptionConfig);</div>
|
|
<div class="line"><a name="l00377"></a><span class="lineno"> 377</span>  encryption_config_->protection_scheme = encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a>;</div>
|
|
<div class="line"><a name="l00378"></a><span class="lineno"> 378</span>  encryption_config_->crypt_byte_block = crypt_byte_block_;</div>
|
|
<div class="line"><a name="l00379"></a><span class="lineno"> 379</span>  encryption_config_->skip_byte_block = skip_byte_block_;</div>
|
|
<div class="line"><a name="l00380"></a><span class="lineno"> 380</span>  <span class="keywordflow">if</span> (encryptor_->use_constant_iv()) {</div>
|
|
<div class="line"><a name="l00381"></a><span class="lineno"> 381</span>  encryption_config_->per_sample_iv_size = 0;</div>
|
|
<div class="line"><a name="l00382"></a><span class="lineno"> 382</span>  encryption_config_->constant_iv = iv;</div>
|
|
<div class="line"><a name="l00383"></a><span class="lineno"> 383</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00384"></a><span class="lineno"> 384</span>  encryption_config_->per_sample_iv_size = <span class="keyword">static_cast<</span>uint8_t<span class="keyword">></span>(iv.size());</div>
|
|
<div class="line"><a name="l00385"></a><span class="lineno"> 385</span>  }</div>
|
|
<div class="line"><a name="l00386"></a><span class="lineno"> 386</span>  encryption_config_->key_id = encryption_key.key_id;</div>
|
|
<div class="line"><a name="l00387"></a><span class="lineno"> 387</span>  encryption_config_->key_system_info = encryption_key.key_system_info;</div>
|
|
<div class="line"><a name="l00388"></a><span class="lineno"> 388</span>  <span class="keywordflow">return</span> initialized;</div>
|
|
<div class="line"><a name="l00389"></a><span class="lineno"> 389</span> }</div>
|
|
<div class="line"><a name="l00390"></a><span class="lineno"> 390</span> </div>
|
|
<div class="line"><a name="l00391"></a><span class="lineno"> 391</span> <span class="keywordtype">bool</span> EncryptionHandler::EncryptVpxFrame(</div>
|
|
<div class="line"><a name="l00392"></a><span class="lineno"> 392</span>  <span class="keyword">const</span> std::vector<VPxFrameInfo>& vpx_frames,</div>
|
|
<div class="line"><a name="l00393"></a><span class="lineno"> 393</span>  MediaSample* sample,</div>
|
|
<div class="line"><a name="l00394"></a><span class="lineno"> 394</span>  DecryptConfig* decrypt_config) {</div>
|
|
<div class="line"><a name="l00395"></a><span class="lineno"> 395</span>  uint8_t* data = sample->writable_data();</div>
|
|
<div class="line"><a name="l00396"></a><span class="lineno"> 396</span>  <span class="keywordflow">for</span> (<span class="keyword">const</span> VPxFrameInfo& frame : vpx_frames) {</div>
|
|
<div class="line"><a name="l00397"></a><span class="lineno"> 397</span>  uint16_t clear_bytes =</div>
|
|
<div class="line"><a name="l00398"></a><span class="lineno"> 398</span>  <span class="keyword">static_cast<</span>uint16_t<span class="keyword">></span>(frame.uncompressed_header_size);</div>
|
|
<div class="line"><a name="l00399"></a><span class="lineno"> 399</span>  uint32_t cipher_bytes = <span class="keyword">static_cast<</span>uint32_t<span class="keyword">></span>(</div>
|
|
<div class="line"><a name="l00400"></a><span class="lineno"> 400</span>  frame.frame_size - frame.uncompressed_header_size);</div>
|
|
<div class="line"><a name="l00401"></a><span class="lineno"> 401</span> </div>
|
|
<div class="line"><a name="l00402"></a><span class="lineno"> 402</span>  <span class="comment">// "VP Codec ISO Media File Format Binding" document requires that the</span></div>
|
|
<div class="line"><a name="l00403"></a><span class="lineno"> 403</span>  <span class="comment">// encrypted bytes of each frame within the superframe must be block</span></div>
|
|
<div class="line"><a name="l00404"></a><span class="lineno"> 404</span>  <span class="comment">// aligned so that the counter state can be computed for each frame</span></div>
|
|
<div class="line"><a name="l00405"></a><span class="lineno"> 405</span>  <span class="comment">// within the superframe.</span></div>
|
|
<div class="line"><a name="l00406"></a><span class="lineno"> 406</span>  <span class="comment">// ISO/IEC 23001-7:2016 10.2 'cbc1' 10.3 'cens'</span></div>
|
|
<div class="line"><a name="l00407"></a><span class="lineno"> 407</span>  <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div>
|
|
<div class="line"><a name="l00408"></a><span class="lineno"> 408</span>  <span class="comment">// avoid partial blocks in Subsamples.</span></div>
|
|
<div class="line"><a name="l00409"></a><span class="lineno"> 409</span>  <span class="comment">// For consistency, apply block alignment to all frames.</span></div>
|
|
<div class="line"><a name="l00410"></a><span class="lineno"> 410</span>  <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div>
|
|
<div class="line"><a name="l00411"></a><span class="lineno"> 411</span>  clear_bytes += misalign_bytes;</div>
|
|
<div class="line"><a name="l00412"></a><span class="lineno"> 412</span>  cipher_bytes -= misalign_bytes;</div>
|
|
<div class="line"><a name="l00413"></a><span class="lineno"> 413</span> </div>
|
|
<div class="line"><a name="l00414"></a><span class="lineno"> 414</span>  decrypt_config->AddSubsample(clear_bytes, cipher_bytes);</div>
|
|
<div class="line"><a name="l00415"></a><span class="lineno"> 415</span>  <span class="keywordflow">if</span> (cipher_bytes > 0)</div>
|
|
<div class="line"><a name="l00416"></a><span class="lineno"> 416</span>  EncryptBytes(data + clear_bytes, cipher_bytes);</div>
|
|
<div class="line"><a name="l00417"></a><span class="lineno"> 417</span>  data += frame.frame_size;</div>
|
|
<div class="line"><a name="l00418"></a><span class="lineno"> 418</span>  }</div>
|
|
<div class="line"><a name="l00419"></a><span class="lineno"> 419</span>  <span class="comment">// Add subsample for the superframe index if exists.</span></div>
|
|
<div class="line"><a name="l00420"></a><span class="lineno"> 420</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> is_superframe = vpx_frames.size() > 1;</div>
|
|
<div class="line"><a name="l00421"></a><span class="lineno"> 421</span>  <span class="keywordflow">if</span> (is_superframe) {</div>
|
|
<div class="line"><a name="l00422"></a><span class="lineno"> 422</span>  <span class="keywordtype">size_t</span> index_size = sample->data() + sample->data_size() - data;</div>
|
|
<div class="line"><a name="l00423"></a><span class="lineno"> 423</span>  DCHECK_LE(index_size, 2 + vpx_frames.size() * 4);</div>
|
|
<div class="line"><a name="l00424"></a><span class="lineno"> 424</span>  DCHECK_GE(index_size, 2 + vpx_frames.size() * 1);</div>
|
|
<div class="line"><a name="l00425"></a><span class="lineno"> 425</span>  uint16_t clear_bytes = <span class="keyword">static_cast<</span>uint16_t<span class="keyword">></span>(index_size);</div>
|
|
<div class="line"><a name="l00426"></a><span class="lineno"> 426</span>  uint32_t cipher_bytes = 0;</div>
|
|
<div class="line"><a name="l00427"></a><span class="lineno"> 427</span>  decrypt_config->AddSubsample(clear_bytes, cipher_bytes);</div>
|
|
<div class="line"><a name="l00428"></a><span class="lineno"> 428</span>  }</div>
|
|
<div class="line"><a name="l00429"></a><span class="lineno"> 429</span>  <span class="keywordflow">return</span> <span class="keyword">true</span>;</div>
|
|
<div class="line"><a name="l00430"></a><span class="lineno"> 430</span> }</div>
|
|
<div class="line"><a name="l00431"></a><span class="lineno"> 431</span> </div>
|
|
<div class="line"><a name="l00432"></a><span class="lineno"> 432</span> <span class="keywordtype">bool</span> EncryptionHandler::EncryptNalFrame(MediaSample* sample,</div>
|
|
<div class="line"><a name="l00433"></a><span class="lineno"> 433</span>  DecryptConfig* decrypt_config) {</div>
|
|
<div class="line"><a name="l00434"></a><span class="lineno"> 434</span>  DCHECK_NE(nalu_length_size_, 0u);</div>
|
|
<div class="line"><a name="l00435"></a><span class="lineno"> 435</span>  DCHECK(header_parser_);</div>
|
|
<div class="line"><a name="l00436"></a><span class="lineno"> 436</span>  <span class="keyword">const</span> Nalu::CodecType nalu_type =</div>
|
|
<div class="line"><a name="l00437"></a><span class="lineno"> 437</span>  (codec_ == kCodecH265) ? Nalu::kH265 : Nalu::kH264;</div>
|
|
<div class="line"><a name="l00438"></a><span class="lineno"> 438</span>  NaluReader reader(nalu_type, nalu_length_size_, sample->writable_data(),</div>
|
|
<div class="line"><a name="l00439"></a><span class="lineno"> 439</span>  sample->data_size());</div>
|
|
<div class="line"><a name="l00440"></a><span class="lineno"> 440</span> </div>
|
|
<div class="line"><a name="l00441"></a><span class="lineno"> 441</span>  <span class="comment">// Store the current length of clear data. This is used to squash</span></div>
|
|
<div class="line"><a name="l00442"></a><span class="lineno"> 442</span>  <span class="comment">// multiple unencrypted NAL units into fewer subsample entries.</span></div>
|
|
<div class="line"><a name="l00443"></a><span class="lineno"> 443</span>  uint64_t accumulated_clear_bytes = 0;</div>
|
|
<div class="line"><a name="l00444"></a><span class="lineno"> 444</span> </div>
|
|
<div class="line"><a name="l00445"></a><span class="lineno"> 445</span>  Nalu nalu;</div>
|
|
<div class="line"><a name="l00446"></a><span class="lineno"> 446</span>  NaluReader::Result result;</div>
|
|
<div class="line"><a name="l00447"></a><span class="lineno"> 447</span>  <span class="keywordflow">while</span> ((result = reader.Advance(&nalu)) == NaluReader::kOk) {</div>
|
|
<div class="line"><a name="l00448"></a><span class="lineno"> 448</span>  <span class="keyword">const</span> uint64_t nalu_total_size = nalu.header_size() + nalu.payload_size();</div>
|
|
<div class="line"><a name="l00449"></a><span class="lineno"> 449</span>  <span class="keywordflow">if</span> (nalu.is_video_slice() && nalu_total_size >= min_protected_data_size_) {</div>
|
|
<div class="line"><a name="l00450"></a><span class="lineno"> 450</span>  uint64_t current_clear_bytes = leading_clear_bytes_size_;</div>
|
|
<div class="line"><a name="l00451"></a><span class="lineno"> 451</span>  <span class="keywordflow">if</span> (current_clear_bytes == 0) {</div>
|
|
<div class="line"><a name="l00452"></a><span class="lineno"> 452</span>  <span class="comment">// For video-slice NAL units, encrypt the video slice. This skips</span></div>
|
|
<div class="line"><a name="l00453"></a><span class="lineno"> 453</span>  <span class="comment">// the frame header.</span></div>
|
|
<div class="line"><a name="l00454"></a><span class="lineno"> 454</span>  <span class="keyword">const</span> int64_t video_slice_header_size =</div>
|
|
<div class="line"><a name="l00455"></a><span class="lineno"> 455</span>  header_parser_->GetHeaderSize(nalu);</div>
|
|
<div class="line"><a name="l00456"></a><span class="lineno"> 456</span>  <span class="keywordflow">if</span> (video_slice_header_size < 0) {</div>
|
|
<div class="line"><a name="l00457"></a><span class="lineno"> 457</span>  LOG(ERROR) << <span class="stringliteral">"Failed to read slice header."</span>;</div>
|
|
<div class="line"><a name="l00458"></a><span class="lineno"> 458</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div>
|
|
<div class="line"><a name="l00459"></a><span class="lineno"> 459</span>  }</div>
|
|
<div class="line"><a name="l00460"></a><span class="lineno"> 460</span>  current_clear_bytes = nalu.header_size() + video_slice_header_size;</div>
|
|
<div class="line"><a name="l00461"></a><span class="lineno"> 461</span>  }</div>
|
|
<div class="line"><a name="l00462"></a><span class="lineno"> 462</span>  uint64_t cipher_bytes = nalu_total_size - current_clear_bytes;</div>
|
|
<div class="line"><a name="l00463"></a><span class="lineno"> 463</span> </div>
|
|
<div class="line"><a name="l00464"></a><span class="lineno"> 464</span>  <span class="comment">// ISO/IEC 23001-7:2016 10.2 'cbc1' 10.3 'cens'</span></div>
|
|
<div class="line"><a name="l00465"></a><span class="lineno"> 465</span>  <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div>
|
|
<div class="line"><a name="l00466"></a><span class="lineno"> 466</span>  <span class="comment">// avoid partial blocks in Subsamples.</span></div>
|
|
<div class="line"><a name="l00467"></a><span class="lineno"> 467</span>  <span class="comment">// CMAF requires 'cenc' scheme BytesOfProtectedData SHALL be a multiple</span></div>
|
|
<div class="line"><a name="l00468"></a><span class="lineno"> 468</span>  <span class="comment">// of 16 bytes; while 'cbcs' scheme BytesOfProtectedData SHALL start on</span></div>
|
|
<div class="line"><a name="l00469"></a><span class="lineno"> 469</span>  <span class="comment">// the first byte of video data following the slice header.</span></div>
|
|
<div class="line"><a name="l00470"></a><span class="lineno"> 470</span>  <span class="keywordflow">if</span> (encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a> == FOURCC_cbc1 ||</div>
|
|
<div class="line"><a name="l00471"></a><span class="lineno"> 471</span>  encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a> == FOURCC_cens ||</div>
|
|
<div class="line"><a name="l00472"></a><span class="lineno"> 472</span>  encryption_options_.<a class="code" href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">protection_scheme</a> == FOURCC_cenc) {</div>
|
|
<div class="line"><a name="l00473"></a><span class="lineno"> 473</span>  <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div>
|
|
<div class="line"><a name="l00474"></a><span class="lineno"> 474</span>  current_clear_bytes += misalign_bytes;</div>
|
|
<div class="line"><a name="l00475"></a><span class="lineno"> 475</span>  cipher_bytes -= misalign_bytes;</div>
|
|
<div class="line"><a name="l00476"></a><span class="lineno"> 476</span>  }</div>
|
|
<div class="line"><a name="l00477"></a><span class="lineno"> 477</span> </div>
|
|
<div class="line"><a name="l00478"></a><span class="lineno"> 478</span>  <span class="keyword">const</span> uint8_t* nalu_data = nalu.data() + current_clear_bytes;</div>
|
|
<div class="line"><a name="l00479"></a><span class="lineno"> 479</span>  EncryptBytes(const_cast<uint8_t*>(nalu_data), cipher_bytes);</div>
|
|
<div class="line"><a name="l00480"></a><span class="lineno"> 480</span> </div>
|
|
<div class="line"><a name="l00481"></a><span class="lineno"> 481</span>  AddSubsample(</div>
|
|
<div class="line"><a name="l00482"></a><span class="lineno"> 482</span>  accumulated_clear_bytes + nalu_length_size_ + current_clear_bytes,</div>
|
|
<div class="line"><a name="l00483"></a><span class="lineno"> 483</span>  cipher_bytes, decrypt_config);</div>
|
|
<div class="line"><a name="l00484"></a><span class="lineno"> 484</span>  accumulated_clear_bytes = 0;</div>
|
|
<div class="line"><a name="l00485"></a><span class="lineno"> 485</span>  } <span class="keywordflow">else</span> {</div>
|
|
<div class="line"><a name="l00486"></a><span class="lineno"> 486</span>  <span class="comment">// For non-video-slice or small NAL units, don't encrypt.</span></div>
|
|
<div class="line"><a name="l00487"></a><span class="lineno"> 487</span>  accumulated_clear_bytes += nalu_length_size_ + nalu_total_size;</div>
|
|
<div class="line"><a name="l00488"></a><span class="lineno"> 488</span>  }</div>
|
|
<div class="line"><a name="l00489"></a><span class="lineno"> 489</span>  }</div>
|
|
<div class="line"><a name="l00490"></a><span class="lineno"> 490</span>  <span class="keywordflow">if</span> (result != NaluReader::kEOStream) {</div>
|
|
<div class="line"><a name="l00491"></a><span class="lineno"> 491</span>  LOG(ERROR) << <span class="stringliteral">"Failed to parse NAL units."</span>;</div>
|
|
<div class="line"><a name="l00492"></a><span class="lineno"> 492</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div>
|
|
<div class="line"><a name="l00493"></a><span class="lineno"> 493</span>  }</div>
|
|
<div class="line"><a name="l00494"></a><span class="lineno"> 494</span>  AddSubsample(accumulated_clear_bytes, 0, decrypt_config);</div>
|
|
<div class="line"><a name="l00495"></a><span class="lineno"> 495</span>  <span class="keywordflow">return</span> <span class="keyword">true</span>;</div>
|
|
<div class="line"><a name="l00496"></a><span class="lineno"> 496</span> }</div>
|
|
<div class="line"><a name="l00497"></a><span class="lineno"> 497</span> </div>
|
|
<div class="line"><a name="l00498"></a><span class="lineno"> 498</span> <span class="keywordtype">void</span> EncryptionHandler::EncryptBytes(uint8_t* data, <span class="keywordtype">size_t</span> size) {</div>
|
|
<div class="line"><a name="l00499"></a><span class="lineno"> 499</span>  DCHECK(encryptor_);</div>
|
|
<div class="line"><a name="l00500"></a><span class="lineno"> 500</span>  CHECK(encryptor_->Crypt(data, size, data));</div>
|
|
<div class="line"><a name="l00501"></a><span class="lineno"> 501</span> }</div>
|
|
<div class="line"><a name="l00502"></a><span class="lineno"> 502</span> </div>
|
|
<div class="line"><a name="l00503"></a><span class="lineno"> 503</span> <span class="keywordtype">void</span> EncryptionHandler::InjectVpxParserForTesting(</div>
|
|
<div class="line"><a name="l00504"></a><span class="lineno"> 504</span>  std::unique_ptr<VPxParser> vpx_parser) {</div>
|
|
<div class="line"><a name="l00505"></a><span class="lineno"> 505</span>  vpx_parser_ = std::move(vpx_parser);</div>
|
|
<div class="line"><a name="l00506"></a><span class="lineno"> 506</span> }</div>
|
|
<div class="line"><a name="l00507"></a><span class="lineno"> 507</span> </div>
|
|
<div class="line"><a name="l00508"></a><span class="lineno"> 508</span> <span class="keywordtype">void</span> EncryptionHandler::InjectVideoSliceHeaderParserForTesting(</div>
|
|
<div class="line"><a name="l00509"></a><span class="lineno"> 509</span>  std::unique_ptr<VideoSliceHeaderParser> header_parser) {</div>
|
|
<div class="line"><a name="l00510"></a><span class="lineno"> 510</span>  header_parser_ = std::move(header_parser);</div>
|
|
<div class="line"><a name="l00511"></a><span class="lineno"> 511</span> }</div>
|
|
<div class="line"><a name="l00512"></a><span class="lineno"> 512</span> </div>
|
|
<div class="line"><a name="l00513"></a><span class="lineno"> 513</span> } <span class="comment">// namespace media</span></div>
|
|
<div class="line"><a name="l00514"></a><span class="lineno"> 514</span> } <span class="comment">// namespace shaka</span></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionOptions_html_a586017f7bf6490e06a61c1f6eaf7970c"><div class="ttname"><a href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a586017f7bf6490e06a61c1f6eaf7970c">shaka::media::EncryptionOptions::stream_label_func</a></div><div class="ttdeci">std::function< std::string(const EncryptionParams::EncryptedStreamAttributes &stream_attributes)> stream_label_func</div><div class="ttdef"><b>Definition:</b> <a href="../../dd/dbc/encryption__handler_8h_source.html#l00038">encryption_handler.h:38</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1StreamInfo_html"><div class="ttname"><a href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">shaka::media::StreamInfo</a></div><div class="ttdoc">Abstract class holds stream information. </div><div class="ttdef"><b>Definition:</b> <a href="../../d8/daa/stream__info_8h_source.html#l00057">stream_info.h:57</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionOptions_html_a2f971f63a7525a777d5578d87ef0c99f"><div class="ttname"><a href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a2f971f63a7525a777d5578d87ef0c99f">shaka::media::EncryptionOptions::vp9_subsample_encryption</a></div><div class="ttdeci">bool vp9_subsample_encryption</div><div class="ttdoc">Enable/disable subsample encryption for VP9. </div><div class="ttdef"><b>Definition:</b> <a href="../../dd/dbc/encryption__handler_8h_source.html#l00033">encryption_handler.h:33</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1KeySource_html_a34340247a575bc693d14c3bef9102258"><div class="ttname"><a href="../../d1/d1f/classshaka_1_1media_1_1KeySource.html#a34340247a575bc693d14c3bef9102258">shaka::media::KeySource::GetCryptoPeriodKey</a></div><div class="ttdeci">virtual Status GetCryptoPeriodKey(uint32_t crypto_period_index, const std::string &stream_label, EncryptionKey *key)=0</div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">shaka::media::AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00035">aes_pattern_cryptor.h:35</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1MediaHandler_html_accd62dd4def920571f95f4e1a98ab7ca"><div class="ttname"><a href="../../da/dfd/classshaka_1_1media_1_1MediaHandler.html#accd62dd4def920571f95f4e1a98ab7ca">shaka::media::MediaHandler::Dispatch</a></div><div class="ttdeci">Status Dispatch(std::unique_ptr< StreamData > stream_data)</div><div class="ttdef"><b>Definition:</b> <a href="../../d2/de9/media__handler_8cc_source.html#l00052">media_handler.cc:52</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1SegmentInfo_html"><div class="ttname"><a href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">shaka::media::SegmentInfo</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d93/media__handler_8h_source.html#l00035">media_handler.h:35</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1KeySource_html_af56c833453d65297c4dc96c9d2f83e1a"><div class="ttname"><a href="../../d1/d1f/classshaka_1_1media_1_1KeySource.html#af56c833453d65297c4dc96c9d2f83e1a">shaka::media::KeySource::GetKey</a></div><div class="ttdeci">virtual Status GetKey(const std::string &stream_label, EncryptionKey *key)=0</div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionOptions_html_a20acea0141ca7c8dd57d0129c53a6d13"><div class="ttname"><a href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a20acea0141ca7c8dd57d0129c53a6d13">shaka::media::EncryptionOptions::crypto_period_duration_in_seconds</a></div><div class="ttdeci">double crypto_period_duration_in_seconds</div><div class="ttdef"><b>Definition:</b> <a href="../../dd/dbc/encryption__handler_8h_source.html#l00031">encryption_handler.h:31</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">shaka::media::AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00026">aes_pattern_cryptor.h:26</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a3f1808a4386081e5e1c9a798a1a69dd0"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">shaka::media::EncryptionHandler::InitializeInternal</a></div><div class="ttdeci">Status InitializeInternal() override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00087">encryption_handler.cc:87</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a7887e6060eb572036674ecb9a7e045c4"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">shaka::media::EncryptionHandler::Process</a></div><div class="ttdeci">Status Process(std::unique_ptr< StreamData > stream_data) override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00098">encryption_handler.cc:98</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesCryptor_html_a40d9a82d274d6fbaee5346328f11dedd"><div class="ttname"><a href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">shaka::media::AesCryptor::GenerateRandomIv</a></div><div class="ttdeci">static bool GenerateRandomIv(FourCC protection_scheme, std::vector< uint8_t > *iv)</div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d55/aes__cryptor_8cc_source.html#l00107">aes_cryptor.cc:107</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionOptions_html_a3d58dc01a4af0ebfb56f3c4979f745f7"><div class="ttname"><a href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#a3d58dc01a4af0ebfb56f3c4979f745f7">shaka::media::EncryptionOptions::clear_lead_in_seconds</a></div><div class="ttdeci">double clear_lead_in_seconds</div><div class="ttdoc">Clear lead duration in seconds. </div><div class="ttdef"><b>Definition:</b> <a href="../../dd/dbc/encryption__handler_8h_source.html#l00026">encryption_handler.h:26</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionOptions_html_ac858b4c03e49e871e07e38fc35893088"><div class="ttname"><a href="../../d6/d82/structshaka_1_1media_1_1EncryptionOptions.html#ac858b4c03e49e871e07e38fc35893088">shaka::media::EncryptionOptions::protection_scheme</a></div><div class="ttdeci">FourCC protection_scheme</div><div class="ttdoc">The protection scheme: 'cenc', 'cens', 'cbc1', 'cbcs'. </div><div class="ttdef"><b>Definition:</b> <a href="../../dd/dbc/encryption__handler_8h_source.html#l00028">encryption_handler.h:28</a></div></div>
|
|
</div><!-- fragment --></div><!-- contents -->
|
|
<!-- start footer part -->
|
|
<hr class="footer"/><address class="footer"><small>
|
|
Generated on Fri Jul 7 2017 17:49:45 for DASH Media Packaging SDK by  <a href="http://www.doxygen.org/index.html">
|
|
<img class="footer" src="../../doxygen.png" alt="doxygen"/>
|
|
</a> 1.8.6
|
|
</small></address>
|
|
</body>
|
|
</html>
|