107 lines
101 KiB
HTML
107 lines
101 KiB
HTML
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
|
|
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
|
|
<meta name="generator" content="Doxygen 1.8.13"/>
|
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
|
<title>Shaka Packager SDK: packager/media/crypto/encryption_handler.cc Source File</title>
|
|
<link href="../../tabs.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="../../jquery.js"></script>
|
|
<script type="text/javascript" src="../../dynsections.js"></script>
|
|
<link href="../../search/search.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="../../search/searchdata.js"></script>
|
|
<script type="text/javascript" src="../../search/search.js"></script>
|
|
<link href="../../doxygen.css" rel="stylesheet" type="text/css" />
|
|
</head>
|
|
<body>
|
|
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
|
|
<div id="titlearea">
|
|
<table cellspacing="0" cellpadding="0">
|
|
<tbody>
|
|
<tr style="height: 56px;">
|
|
<td id="projectalign" style="padding-left: 0.5em;">
|
|
<div id="projectname">Shaka Packager SDK
|
|
</div>
|
|
</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
<!-- end header part -->
|
|
<!-- Generated by Doxygen 1.8.13 -->
|
|
<script type="text/javascript">
|
|
var searchBox = new SearchBox("searchBox", "../../search",false,'Search');
|
|
</script>
|
|
<script type="text/javascript" src="../../menudata.js"></script>
|
|
<script type="text/javascript" src="../../menu.js"></script>
|
|
<script type="text/javascript">
|
|
$(function() {
|
|
initMenu('../../',true,false,'search.php','Search');
|
|
$(document).ready(function() { init_search(); });
|
|
});
|
|
</script>
|
|
<div id="main-nav"></div>
|
|
<!-- window showing the filter options -->
|
|
<div id="MSearchSelectWindow"
|
|
onmouseover="return searchBox.OnSearchSelectShow()"
|
|
onmouseout="return searchBox.OnSearchSelectHide()"
|
|
onkeydown="return searchBox.OnSearchSelectKey(event)">
|
|
</div>
|
|
|
|
<!-- iframe showing the search results (closed by default) -->
|
|
<div id="MSearchResultsWindow">
|
|
<iframe src="javascript:void(0)" frameborder="0"
|
|
name="MSearchResults" id="MSearchResults">
|
|
</iframe>
|
|
</div>
|
|
|
|
<div id="nav-path" class="navpath">
|
|
<ul>
|
|
<li class="navelem"><a class="el" href="../../dir_3f8eec2fc361645de4b1ec14c19fffc7.html">packager</a></li><li class="navelem"><a class="el" href="../../dir_f99dae54fe7170f791f339b952d5067a.html">media</a></li><li class="navelem"><a class="el" href="../../dir_aa847bee70cdde822696c7e33a504139.html">crypto</a></li> </ul>
|
|
</div>
|
|
</div><!-- top -->
|
|
<div class="header">
|
|
<div class="headertitle">
|
|
<div class="title">encryption_handler.cc</div> </div>
|
|
</div><!--header-->
|
|
<div class="contents">
|
|
<div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span> <span class="comment">// Copyright 2017 Google Inc. All rights reserved.</span></div><div class="line"><a name="l00002"></a><span class="lineno"> 2</span> <span class="comment">//</span></div><div class="line"><a name="l00003"></a><span class="lineno"> 3</span> <span class="comment">// Use of this source code is governed by a BSD-style</span></div><div class="line"><a name="l00004"></a><span class="lineno"> 4</span> <span class="comment">// license that can be found in the LICENSE file or at</span></div><div class="line"><a name="l00005"></a><span class="lineno"> 5</span> <span class="comment">// https://developers.google.com/open-source/licenses/bsd</span></div><div class="line"><a name="l00006"></a><span class="lineno"> 6</span> </div><div class="line"><a name="l00007"></a><span class="lineno"> 7</span> <span class="preprocessor">#include "packager/media/crypto/encryption_handler.h"</span></div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span> </div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span> <span class="preprocessor">#include <stddef.h></span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span> <span class="preprocessor">#include <stdint.h></span></div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span> </div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span> <span class="preprocessor">#include <algorithm></span></div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span> <span class="preprocessor">#include <limits></span></div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span> </div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span> <span class="preprocessor">#include "packager/media/base/aes_encryptor.h"</span></div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span> <span class="preprocessor">#include "packager/media/base/aes_pattern_cryptor.h"</span></div><div class="line"><a name="l00017"></a><span class="lineno"> 17</span> <span class="preprocessor">#include "packager/media/base/audio_stream_info.h"</span></div><div class="line"><a name="l00018"></a><span class="lineno"> 18</span> <span class="preprocessor">#include "packager/media/base/key_source.h"</span></div><div class="line"><a name="l00019"></a><span class="lineno"> 19</span> <span class="preprocessor">#include "packager/media/base/media_sample.h"</span></div><div class="line"><a name="l00020"></a><span class="lineno"> 20</span> <span class="preprocessor">#include "packager/media/base/video_stream_info.h"</span></div><div class="line"><a name="l00021"></a><span class="lineno"> 21</span> <span class="preprocessor">#include "packager/media/codecs/video_slice_header_parser.h"</span></div><div class="line"><a name="l00022"></a><span class="lineno"> 22</span> <span class="preprocessor">#include "packager/media/codecs/vp8_parser.h"</span></div><div class="line"><a name="l00023"></a><span class="lineno"> 23</span> <span class="preprocessor">#include "packager/media/codecs/vp9_parser.h"</span></div><div class="line"><a name="l00024"></a><span class="lineno"> 24</span> <span class="preprocessor">#include "packager/media/crypto/sample_aes_ec3_cryptor.h"</span></div><div class="line"><a name="l00025"></a><span class="lineno"> 25</span> </div><div class="line"><a name="l00026"></a><span class="lineno"> 26</span> <span class="keyword">namespace </span><a class="code" href="../../d8/daf/namespaceshaka.html">shaka</a> {</div><div class="line"><a name="l00027"></a><span class="lineno"> 27</span> <span class="keyword">namespace </span>media {</div><div class="line"><a name="l00028"></a><span class="lineno"> 28</span> </div><div class="line"><a name="l00029"></a><span class="lineno"> 29</span> <span class="keyword">namespace </span>{</div><div class="line"><a name="l00030"></a><span class="lineno"> 30</span> <span class="keyword">const</span> <span class="keywordtype">size_t</span> kCencBlockSize = 16u;</div><div class="line"><a name="l00031"></a><span class="lineno"> 31</span> </div><div class="line"><a name="l00032"></a><span class="lineno"> 32</span> <span class="comment">// The encryption handler only supports a single output.</span></div><div class="line"><a name="l00033"></a><span class="lineno"> 33</span> <span class="keyword">const</span> <span class="keywordtype">size_t</span> kStreamIndex = 0;</div><div class="line"><a name="l00034"></a><span class="lineno"> 34</span> </div><div class="line"><a name="l00035"></a><span class="lineno"> 35</span> <span class="comment">// The default KID for key rotation is all 0s.</span></div><div class="line"><a name="l00036"></a><span class="lineno"> 36</span> <span class="keyword">const</span> uint8_t kKeyRotationDefaultKeyId[] = {</div><div class="line"><a name="l00037"></a><span class="lineno"> 37</span>  0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,</div><div class="line"><a name="l00038"></a><span class="lineno"> 38</span> };</div><div class="line"><a name="l00039"></a><span class="lineno"> 39</span> </div><div class="line"><a name="l00040"></a><span class="lineno"> 40</span> <span class="comment">// Adds one or more subsamples to |*decrypt_config|. This may add more than one</span></div><div class="line"><a name="l00041"></a><span class="lineno"> 41</span> <span class="comment">// if one of the values overflows the integer in the subsample.</span></div><div class="line"><a name="l00042"></a><span class="lineno"> 42</span> <span class="keywordtype">void</span> AddSubsample(uint64_t clear_bytes,</div><div class="line"><a name="l00043"></a><span class="lineno"> 43</span>  uint64_t cipher_bytes,</div><div class="line"><a name="l00044"></a><span class="lineno"> 44</span>  DecryptConfig* decrypt_config) {</div><div class="line"><a name="l00045"></a><span class="lineno"> 45</span>  CHECK_LT(cipher_bytes, std::numeric_limits<uint32_t>::max());</div><div class="line"><a name="l00046"></a><span class="lineno"> 46</span>  <span class="keyword">const</span> uint64_t kUInt16Max = std::numeric_limits<uint16_t>::max();</div><div class="line"><a name="l00047"></a><span class="lineno"> 47</span>  <span class="keywordflow">while</span> (clear_bytes > kUInt16Max) {</div><div class="line"><a name="l00048"></a><span class="lineno"> 48</span>  decrypt_config->AddSubsample(kUInt16Max, 0);</div><div class="line"><a name="l00049"></a><span class="lineno"> 49</span>  clear_bytes -= kUInt16Max;</div><div class="line"><a name="l00050"></a><span class="lineno"> 50</span>  }</div><div class="line"><a name="l00051"></a><span class="lineno"> 51</span> </div><div class="line"><a name="l00052"></a><span class="lineno"> 52</span>  <span class="keywordflow">if</span> (clear_bytes > 0 || cipher_bytes > 0)</div><div class="line"><a name="l00053"></a><span class="lineno"> 53</span>  decrypt_config->AddSubsample(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00054"></a><span class="lineno"> 54</span> }</div><div class="line"><a name="l00055"></a><span class="lineno"> 55</span> </div><div class="line"><a name="l00056"></a><span class="lineno"> 56</span> uint8_t GetNaluLengthSize(<span class="keyword">const</span> StreamInfo& stream_info) {</div><div class="line"><a name="l00057"></a><span class="lineno"> 57</span>  <span class="keywordflow">if</span> (stream_info.stream_type() != kStreamVideo)</div><div class="line"><a name="l00058"></a><span class="lineno"> 58</span>  <span class="keywordflow">return</span> 0;</div><div class="line"><a name="l00059"></a><span class="lineno"> 59</span> </div><div class="line"><a name="l00060"></a><span class="lineno"> 60</span>  <span class="keyword">const</span> VideoStreamInfo& video_stream_info =</div><div class="line"><a name="l00061"></a><span class="lineno"> 61</span>  <span class="keyword">static_cast<</span><span class="keyword">const </span>VideoStreamInfo&<span class="keyword">></span>(stream_info);</div><div class="line"><a name="l00062"></a><span class="lineno"> 62</span>  <span class="keywordflow">return</span> video_stream_info.nalu_length_size();</div><div class="line"><a name="l00063"></a><span class="lineno"> 63</span> }</div><div class="line"><a name="l00064"></a><span class="lineno"> 64</span> </div><div class="line"><a name="l00065"></a><span class="lineno"> 65</span> std::string GetStreamLabelForEncryption(</div><div class="line"><a name="l00066"></a><span class="lineno"> 66</span>  <span class="keyword">const</span> StreamInfo& stream_info,</div><div class="line"><a name="l00067"></a><span class="lineno"> 67</span>  <span class="keyword">const</span> std::function<std::string(</div><div class="line"><a name="l00068"></a><span class="lineno"> 68</span>  <span class="keyword">const</span> EncryptionParams::EncryptedStreamAttributes& stream_attributes)>&</div><div class="line"><a name="l00069"></a><span class="lineno"> 69</span>  stream_label_func) {</div><div class="line"><a name="l00070"></a><span class="lineno"> 70</span>  EncryptionParams::EncryptedStreamAttributes stream_attributes;</div><div class="line"><a name="l00071"></a><span class="lineno"> 71</span>  <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamAudio) {</div><div class="line"><a name="l00072"></a><span class="lineno"> 72</span>  stream_attributes.stream_type =</div><div class="line"><a name="l00073"></a><span class="lineno"> 73</span>  EncryptionParams::EncryptedStreamAttributes::kAudio;</div><div class="line"><a name="l00074"></a><span class="lineno"> 74</span>  } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamVideo) {</div><div class="line"><a name="l00075"></a><span class="lineno"> 75</span>  <span class="keyword">const</span> VideoStreamInfo& video_stream_info =</div><div class="line"><a name="l00076"></a><span class="lineno"> 76</span>  <span class="keyword">static_cast<</span><span class="keyword">const </span>VideoStreamInfo&<span class="keyword">></span>(stream_info);</div><div class="line"><a name="l00077"></a><span class="lineno"> 77</span>  stream_attributes.stream_type =</div><div class="line"><a name="l00078"></a><span class="lineno"> 78</span>  EncryptionParams::EncryptedStreamAttributes::kVideo;</div><div class="line"><a name="l00079"></a><span class="lineno"> 79</span>  stream_attributes.oneof.video.width = video_stream_info.width();</div><div class="line"><a name="l00080"></a><span class="lineno"> 80</span>  stream_attributes.oneof.video.height = video_stream_info.height();</div><div class="line"><a name="l00081"></a><span class="lineno"> 81</span>  }</div><div class="line"><a name="l00082"></a><span class="lineno"> 82</span>  <span class="keywordflow">return</span> stream_label_func(stream_attributes);</div><div class="line"><a name="l00083"></a><span class="lineno"> 83</span> }</div><div class="line"><a name="l00084"></a><span class="lineno"> 84</span> } <span class="comment">// namespace</span></div><div class="line"><a name="l00085"></a><span class="lineno"> 85</span> </div><div class="line"><a name="l00086"></a><span class="lineno"> 86</span> EncryptionHandler::EncryptionHandler(<span class="keyword">const</span> EncryptionParams& encryption_params,</div><div class="line"><a name="l00087"></a><span class="lineno"> 87</span>  KeySource* key_source)</div><div class="line"><a name="l00088"></a><span class="lineno"> 88</span>  : encryption_params_(encryption_params),</div><div class="line"><a name="l00089"></a><span class="lineno"> 89</span>  protection_scheme_(</div><div class="line"><a name="l00090"></a><span class="lineno"> 90</span>  static_cast<FourCC>(encryption_params.protection_scheme)),</div><div class="line"><a name="l00091"></a><span class="lineno"> 91</span>  key_source_(key_source) {}</div><div class="line"><a name="l00092"></a><span class="lineno"> 92</span> </div><div class="line"><a name="l00093"></a><span class="lineno"> 93</span> EncryptionHandler::~EncryptionHandler() {}</div><div class="line"><a name="l00094"></a><span class="lineno"> 94</span> </div><div class="line"><a name="l00095"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0"> 95</a></span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">EncryptionHandler::InitializeInternal</a>() {</div><div class="line"><a name="l00096"></a><span class="lineno"> 96</span>  <span class="keywordflow">if</span> (!encryption_params_.stream_label_func) {</div><div class="line"><a name="l00097"></a><span class="lineno"> 97</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT, <span class="stringliteral">"Stream label function not set."</span>);</div><div class="line"><a name="l00098"></a><span class="lineno"> 98</span>  }</div><div class="line"><a name="l00099"></a><span class="lineno"> 99</span>  <span class="keywordflow">if</span> (num_input_streams() != 1 || next_output_stream_index() != 1) {</div><div class="line"><a name="l00100"></a><span class="lineno"> 100</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT,</div><div class="line"><a name="l00101"></a><span class="lineno"> 101</span>  <span class="stringliteral">"Expects exactly one input and output."</span>);</div><div class="line"><a name="l00102"></a><span class="lineno"> 102</span>  }</div><div class="line"><a name="l00103"></a><span class="lineno"> 103</span>  <span class="keywordflow">return</span> Status::OK;</div><div class="line"><a name="l00104"></a><span class="lineno"> 104</span> }</div><div class="line"><a name="l00105"></a><span class="lineno"> 105</span> </div><div class="line"><a name="l00106"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4"> 106</a></span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">EncryptionHandler::Process</a>(std::unique_ptr<StreamData> stream_data) {</div><div class="line"><a name="l00107"></a><span class="lineno"> 107</span>  <span class="keywordflow">switch</span> (stream_data->stream_data_type) {</div><div class="line"><a name="l00108"></a><span class="lineno"> 108</span>  <span class="keywordflow">case</span> StreamDataType::kStreamInfo:</div><div class="line"><a name="l00109"></a><span class="lineno"> 109</span>  <span class="keywordflow">return</span> ProcessStreamInfo(*stream_data->stream_info);</div><div class="line"><a name="l00110"></a><span class="lineno"> 110</span>  <span class="keywordflow">case</span> StreamDataType::kSegmentInfo: {</div><div class="line"><a name="l00111"></a><span class="lineno"> 111</span>  std::shared_ptr<SegmentInfo> segment_info(<span class="keyword">new</span> <a class="code" href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">SegmentInfo</a>(</div><div class="line"><a name="l00112"></a><span class="lineno"> 112</span>  *stream_data->segment_info));</div><div class="line"><a name="l00113"></a><span class="lineno"> 113</span> </div><div class="line"><a name="l00114"></a><span class="lineno"> 114</span>  segment_info->is_encrypted = remaining_clear_lead_ <= 0;</div><div class="line"><a name="l00115"></a><span class="lineno"> 115</span> </div><div class="line"><a name="l00116"></a><span class="lineno"> 116</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div><div class="line"><a name="l00117"></a><span class="lineno"> 117</span>  <span class="keywordflow">if</span> (key_rotation_enabled)</div><div class="line"><a name="l00118"></a><span class="lineno"> 118</span>  segment_info->key_rotation_encryption_config = encryption_config_;</div><div class="line"><a name="l00119"></a><span class="lineno"> 119</span>  <span class="keywordflow">if</span> (!segment_info->is_subsegment) {</div><div class="line"><a name="l00120"></a><span class="lineno"> 120</span>  <span class="keywordflow">if</span> (key_rotation_enabled)</div><div class="line"><a name="l00121"></a><span class="lineno"> 121</span>  check_new_crypto_period_ = <span class="keyword">true</span>;</div><div class="line"><a name="l00122"></a><span class="lineno"> 122</span>  <span class="keywordflow">if</span> (remaining_clear_lead_ > 0)</div><div class="line"><a name="l00123"></a><span class="lineno"> 123</span>  remaining_clear_lead_ -= segment_info->duration;</div><div class="line"><a name="l00124"></a><span class="lineno"> 124</span>  }</div><div class="line"><a name="l00125"></a><span class="lineno"> 125</span> </div><div class="line"><a name="l00126"></a><span class="lineno"> 126</span>  <span class="keywordflow">return</span> DispatchSegmentInfo(kStreamIndex, segment_info);</div><div class="line"><a name="l00127"></a><span class="lineno"> 127</span>  }</div><div class="line"><a name="l00128"></a><span class="lineno"> 128</span>  <span class="keywordflow">case</span> StreamDataType::kMediaSample:</div><div class="line"><a name="l00129"></a><span class="lineno"> 129</span>  <span class="keywordflow">return</span> ProcessMediaSample(std::move(stream_data->media_sample));</div><div class="line"><a name="l00130"></a><span class="lineno"> 130</span>  <span class="keywordflow">default</span>:</div><div class="line"><a name="l00131"></a><span class="lineno"> 131</span>  VLOG(3) << <span class="stringliteral">"Stream data type "</span></div><div class="line"><a name="l00132"></a><span class="lineno"> 132</span>  << <span class="keyword">static_cast<</span><span class="keywordtype">int</span><span class="keyword">></span>(stream_data->stream_data_type) << <span class="stringliteral">" ignored."</span>;</div><div class="line"><a name="l00133"></a><span class="lineno"> 133</span>  <span class="keywordflow">return</span> Dispatch(std::move(stream_data));</div><div class="line"><a name="l00134"></a><span class="lineno"> 134</span>  }</div><div class="line"><a name="l00135"></a><span class="lineno"> 135</span> }</div><div class="line"><a name="l00136"></a><span class="lineno"> 136</span> </div><div class="line"><a name="l00137"></a><span class="lineno"> 137</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::ProcessStreamInfo(<span class="keyword">const</span> <a class="code" href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">StreamInfo</a>& clear_info) {</div><div class="line"><a name="l00138"></a><span class="lineno"> 138</span>  <span class="keywordflow">if</span> (clear_info.is_encrypted()) {</div><div class="line"><a name="l00139"></a><span class="lineno"> 139</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT,</div><div class="line"><a name="l00140"></a><span class="lineno"> 140</span>  <span class="stringliteral">"Input stream is already encrypted."</span>);</div><div class="line"><a name="l00141"></a><span class="lineno"> 141</span>  }</div><div class="line"><a name="l00142"></a><span class="lineno"> 142</span> </div><div class="line"><a name="l00143"></a><span class="lineno"> 143</span>  DCHECK_NE(kStreamUnknown, clear_info.stream_type());</div><div class="line"><a name="l00144"></a><span class="lineno"> 144</span>  DCHECK_NE(kStreamText, clear_info.stream_type());</div><div class="line"><a name="l00145"></a><span class="lineno"> 145</span>  std::shared_ptr<StreamInfo> stream_info = clear_info.<a class="code" href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html#afdd9b2df8ae1c11bb033c44eaba5e38d">Clone</a>();</div><div class="line"><a name="l00146"></a><span class="lineno"> 146</span> </div><div class="line"><a name="l00147"></a><span class="lineno"> 147</span>  remaining_clear_lead_ =</div><div class="line"><a name="l00148"></a><span class="lineno"> 148</span>  encryption_params_.clear_lead_in_seconds * stream_info->time_scale();</div><div class="line"><a name="l00149"></a><span class="lineno"> 149</span>  crypto_period_duration_ =</div><div class="line"><a name="l00150"></a><span class="lineno"> 150</span>  encryption_params_.crypto_period_duration_in_seconds *</div><div class="line"><a name="l00151"></a><span class="lineno"> 151</span>  stream_info->time_scale();</div><div class="line"><a name="l00152"></a><span class="lineno"> 152</span>  codec_ = stream_info->codec();</div><div class="line"><a name="l00153"></a><span class="lineno"> 153</span>  nalu_length_size_ = GetNaluLengthSize(*stream_info);</div><div class="line"><a name="l00154"></a><span class="lineno"> 154</span>  stream_label_ = GetStreamLabelForEncryption(</div><div class="line"><a name="l00155"></a><span class="lineno"> 155</span>  *stream_info, encryption_params_.stream_label_func);</div><div class="line"><a name="l00156"></a><span class="lineno"> 156</span>  <span class="keywordflow">switch</span> (codec_) {</div><div class="line"><a name="l00157"></a><span class="lineno"> 157</span>  <span class="keywordflow">case</span> kCodecVP9:</div><div class="line"><a name="l00158"></a><span class="lineno"> 158</span>  <span class="keywordflow">if</span> (encryption_params_.vp9_subsample_encryption)</div><div class="line"><a name="l00159"></a><span class="lineno"> 159</span>  vpx_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../db/d5a/classshaka_1_1media_1_1VP9Parser.html">VP9Parser</a>);</div><div class="line"><a name="l00160"></a><span class="lineno"> 160</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00161"></a><span class="lineno"> 161</span>  <span class="keywordflow">case</span> kCodecH264:</div><div class="line"><a name="l00162"></a><span class="lineno"> 162</span>  header_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../da/df0/classshaka_1_1media_1_1H264VideoSliceHeaderParser.html">H264VideoSliceHeaderParser</a>);</div><div class="line"><a name="l00163"></a><span class="lineno"> 163</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00164"></a><span class="lineno"> 164</span>  <span class="keywordflow">case</span> kCodecH265:</div><div class="line"><a name="l00165"></a><span class="lineno"> 165</span>  header_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../d1/d79/classshaka_1_1media_1_1H265VideoSliceHeaderParser.html">H265VideoSliceHeaderParser</a>);</div><div class="line"><a name="l00166"></a><span class="lineno"> 166</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00167"></a><span class="lineno"> 167</span>  <span class="keywordflow">default</span>:</div><div class="line"><a name="l00168"></a><span class="lineno"> 168</span>  <span class="comment">// Other codecs should have nalu length size == 0.</span></div><div class="line"><a name="l00169"></a><span class="lineno"> 169</span>  <span class="keywordflow">if</span> (nalu_length_size_ > 0) {</div><div class="line"><a name="l00170"></a><span class="lineno"> 170</span>  LOG(WARNING) << <span class="stringliteral">"Unknown video codec '"</span> << codec_ << <span class="stringliteral">"'"</span>;</div><div class="line"><a name="l00171"></a><span class="lineno"> 171</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Unknown video codec."</span>);</div><div class="line"><a name="l00172"></a><span class="lineno"> 172</span>  }</div><div class="line"><a name="l00173"></a><span class="lineno"> 173</span>  }</div><div class="line"><a name="l00174"></a><span class="lineno"> 174</span>  <span class="keywordflow">if</span> (header_parser_) {</div><div class="line"><a name="l00175"></a><span class="lineno"> 175</span>  CHECK_NE(nalu_length_size_, 0u) << <span class="stringliteral">"AnnexB stream is not supported yet"</span>;</div><div class="line"><a name="l00176"></a><span class="lineno"> 176</span>  <span class="keywordflow">if</span> (!header_parser_->Initialize(stream_info->codec_config())) {</div><div class="line"><a name="l00177"></a><span class="lineno"> 177</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE,</div><div class="line"><a name="l00178"></a><span class="lineno"> 178</span>  <span class="stringliteral">"Fail to read SPS and PPS data."</span>);</div><div class="line"><a name="l00179"></a><span class="lineno"> 179</span>  }</div><div class="line"><a name="l00180"></a><span class="lineno"> 180</span>  }</div><div class="line"><a name="l00181"></a><span class="lineno"> 181</span> </div><div class="line"><a name="l00182"></a><span class="lineno"> 182</span>  <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> status = SetupProtectionPattern(stream_info->stream_type());</div><div class="line"><a name="l00183"></a><span class="lineno"> 183</span>  <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00184"></a><span class="lineno"> 184</span>  <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00185"></a><span class="lineno"> 185</span> </div><div class="line"><a name="l00186"></a><span class="lineno"> 186</span>  <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a> encryption_key;</div><div class="line"><a name="l00187"></a><span class="lineno"> 187</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div><div class="line"><a name="l00188"></a><span class="lineno"> 188</span>  <span class="keywordflow">if</span> (key_rotation_enabled) {</div><div class="line"><a name="l00189"></a><span class="lineno"> 189</span>  check_new_crypto_period_ = <span class="keyword">true</span>;</div><div class="line"><a name="l00190"></a><span class="lineno"> 190</span>  <span class="comment">// Setup dummy key id and key to signal encryption for key rotation.</span></div><div class="line"><a name="l00191"></a><span class="lineno"> 191</span>  encryption_key.key_id.assign(</div><div class="line"><a name="l00192"></a><span class="lineno"> 192</span>  kKeyRotationDefaultKeyId,</div><div class="line"><a name="l00193"></a><span class="lineno"> 193</span>  kKeyRotationDefaultKeyId + <span class="keyword">sizeof</span>(kKeyRotationDefaultKeyId));</div><div class="line"><a name="l00194"></a><span class="lineno"> 194</span>  <span class="comment">// The key is not really used to encrypt any data. It is there just for</span></div><div class="line"><a name="l00195"></a><span class="lineno"> 195</span>  <span class="comment">// convenience.</span></div><div class="line"><a name="l00196"></a><span class="lineno"> 196</span>  encryption_key.key = encryption_key.key_id;</div><div class="line"><a name="l00197"></a><span class="lineno"> 197</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00198"></a><span class="lineno"> 198</span>  status = key_source_->GetKey(stream_label_, &encryption_key);</div><div class="line"><a name="l00199"></a><span class="lineno"> 199</span>  <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00200"></a><span class="lineno"> 200</span>  <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00201"></a><span class="lineno"> 201</span>  }</div><div class="line"><a name="l00202"></a><span class="lineno"> 202</span>  <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div><div class="line"><a name="l00203"></a><span class="lineno"> 203</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to create encryptor"</span>);</div><div class="line"><a name="l00204"></a><span class="lineno"> 204</span> </div><div class="line"><a name="l00205"></a><span class="lineno"> 205</span>  stream_info->set_is_encrypted(<span class="keyword">true</span>);</div><div class="line"><a name="l00206"></a><span class="lineno"> 206</span>  stream_info->set_has_clear_lead(encryption_params_.clear_lead_in_seconds > 0);</div><div class="line"><a name="l00207"></a><span class="lineno"> 207</span>  stream_info->set_encryption_config(*encryption_config_);</div><div class="line"><a name="l00208"></a><span class="lineno"> 208</span> </div><div class="line"><a name="l00209"></a><span class="lineno"> 209</span>  <span class="keywordflow">return</span> DispatchStreamInfo(kStreamIndex, stream_info);</div><div class="line"><a name="l00210"></a><span class="lineno"> 210</span> }</div><div class="line"><a name="l00211"></a><span class="lineno"> 211</span> </div><div class="line"><a name="l00212"></a><span class="lineno"> 212</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::ProcessMediaSample(</div><div class="line"><a name="l00213"></a><span class="lineno"> 213</span>  std::shared_ptr<const MediaSample> clear_sample) {</div><div class="line"><a name="l00214"></a><span class="lineno"> 214</span>  DCHECK(clear_sample);</div><div class="line"><a name="l00215"></a><span class="lineno"> 215</span> </div><div class="line"><a name="l00216"></a><span class="lineno"> 216</span>  <span class="comment">// We need to parse the frame (which also updates the vpx parser) even if the</span></div><div class="line"><a name="l00217"></a><span class="lineno"> 217</span>  <span class="comment">// frame is not encrypted as the next (encrypted) frame may be dependent on</span></div><div class="line"><a name="l00218"></a><span class="lineno"> 218</span>  <span class="comment">// this clear frame.</span></div><div class="line"><a name="l00219"></a><span class="lineno"> 219</span>  std::vector<VPxFrameInfo> vpx_frames;</div><div class="line"><a name="l00220"></a><span class="lineno"> 220</span>  <span class="keywordflow">if</span> (vpx_parser_ && !vpx_parser_->Parse(clear_sample->data(),</div><div class="line"><a name="l00221"></a><span class="lineno"> 221</span>  clear_sample->data_size(),</div><div class="line"><a name="l00222"></a><span class="lineno"> 222</span>  &vpx_frames)) {</div><div class="line"><a name="l00223"></a><span class="lineno"> 223</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to parse vpx frame."</span>);</div><div class="line"><a name="l00224"></a><span class="lineno"> 224</span>  }</div><div class="line"><a name="l00225"></a><span class="lineno"> 225</span> </div><div class="line"><a name="l00226"></a><span class="lineno"> 226</span>  <span class="comment">// Need to setup the encryptor for new segments even if this segment does not</span></div><div class="line"><a name="l00227"></a><span class="lineno"> 227</span>  <span class="comment">// need to be encrypted, so we can signal encryption metadata earlier to</span></div><div class="line"><a name="l00228"></a><span class="lineno"> 228</span>  <span class="comment">// allows clients to prefetch the keys.</span></div><div class="line"><a name="l00229"></a><span class="lineno"> 229</span>  <span class="keywordflow">if</span> (check_new_crypto_period_) {</div><div class="line"><a name="l00230"></a><span class="lineno"> 230</span>  <span class="keyword">const</span> int64_t current_crypto_period_index =</div><div class="line"><a name="l00231"></a><span class="lineno"> 231</span>  clear_sample->dts() / crypto_period_duration_;</div><div class="line"><a name="l00232"></a><span class="lineno"> 232</span>  <span class="keywordflow">if</span> (current_crypto_period_index != prev_crypto_period_index_) {</div><div class="line"><a name="l00233"></a><span class="lineno"> 233</span>  <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a> encryption_key;</div><div class="line"><a name="l00234"></a><span class="lineno"> 234</span>  <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> status = key_source_->GetCryptoPeriodKey(</div><div class="line"><a name="l00235"></a><span class="lineno"> 235</span>  current_crypto_period_index, stream_label_, &encryption_key);</div><div class="line"><a name="l00236"></a><span class="lineno"> 236</span>  <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00237"></a><span class="lineno"> 237</span>  <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00238"></a><span class="lineno"> 238</span>  <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div><div class="line"><a name="l00239"></a><span class="lineno"> 239</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to create encryptor"</span>);</div><div class="line"><a name="l00240"></a><span class="lineno"> 240</span>  prev_crypto_period_index_ = current_crypto_period_index;</div><div class="line"><a name="l00241"></a><span class="lineno"> 241</span>  }</div><div class="line"><a name="l00242"></a><span class="lineno"> 242</span>  check_new_crypto_period_ = <span class="keyword">false</span>;</div><div class="line"><a name="l00243"></a><span class="lineno"> 243</span>  }</div><div class="line"><a name="l00244"></a><span class="lineno"> 244</span> </div><div class="line"><a name="l00245"></a><span class="lineno"> 245</span>  <span class="comment">// Since there is no encryption needed right now, send the clear copy</span></div><div class="line"><a name="l00246"></a><span class="lineno"> 246</span>  <span class="comment">// downstream so we can save the costs of copying it.</span></div><div class="line"><a name="l00247"></a><span class="lineno"> 247</span>  <span class="keywordflow">if</span> (remaining_clear_lead_ > 0) {</div><div class="line"><a name="l00248"></a><span class="lineno"> 248</span>  <span class="keywordflow">return</span> DispatchMediaSample(kStreamIndex, std::move(clear_sample));</div><div class="line"><a name="l00249"></a><span class="lineno"> 249</span>  }</div><div class="line"><a name="l00250"></a><span class="lineno"> 250</span> </div><div class="line"><a name="l00251"></a><span class="lineno"> 251</span>  std::unique_ptr<DecryptConfig> decrypt_config(<span class="keyword">new</span> <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>(</div><div class="line"><a name="l00252"></a><span class="lineno"> 252</span>  encryption_config_->key_id,</div><div class="line"><a name="l00253"></a><span class="lineno"> 253</span>  encryptor_->iv(),</div><div class="line"><a name="l00254"></a><span class="lineno"> 254</span>  std::vector<SubsampleEntry>(),</div><div class="line"><a name="l00255"></a><span class="lineno"> 255</span>  protection_scheme_,</div><div class="line"><a name="l00256"></a><span class="lineno"> 256</span>  crypt_byte_block_,</div><div class="line"><a name="l00257"></a><span class="lineno"> 257</span>  skip_byte_block_));</div><div class="line"><a name="l00258"></a><span class="lineno"> 258</span> </div><div class="line"><a name="l00259"></a><span class="lineno"> 259</span>  <span class="comment">// Now that we know that this sample must be encrypted, make a copy of</span></div><div class="line"><a name="l00260"></a><span class="lineno"> 260</span>  <span class="comment">// the sample first so that all the encryption operations can be done</span></div><div class="line"><a name="l00261"></a><span class="lineno"> 261</span>  <span class="comment">// in-place.</span></div><div class="line"><a name="l00262"></a><span class="lineno"> 262</span>  std::shared_ptr<MediaSample> cipher_sample(clear_sample->Clone());</div><div class="line"><a name="l00263"></a><span class="lineno"> 263</span>  <span class="comment">// |cipher_sample| above still contains the old clear sample data. We will</span></div><div class="line"><a name="l00264"></a><span class="lineno"> 264</span>  <span class="comment">// use |cipher_sample_data| to hold cipher sample data then transfer it to</span></div><div class="line"><a name="l00265"></a><span class="lineno"> 265</span>  <span class="comment">// |cipher_sample| after encryption.</span></div><div class="line"><a name="l00266"></a><span class="lineno"> 266</span>  std::shared_ptr<uint8_t> cipher_sample_data(</div><div class="line"><a name="l00267"></a><span class="lineno"> 267</span>  <span class="keyword">new</span> uint8_t[clear_sample->data_size()], std::default_delete<uint8_t[]>());</div><div class="line"><a name="l00268"></a><span class="lineno"> 268</span> </div><div class="line"><a name="l00269"></a><span class="lineno"> 269</span>  <span class="keywordflow">if</span> (vpx_parser_) {</div><div class="line"><a name="l00270"></a><span class="lineno"> 270</span>  <span class="keywordflow">if</span> (!EncryptVpxFrame(vpx_frames, clear_sample->data(),</div><div class="line"><a name="l00271"></a><span class="lineno"> 271</span>  clear_sample->data_size(),</div><div class="line"><a name="l00272"></a><span class="lineno"> 272</span>  &cipher_sample_data.get()[0], decrypt_config.get())) {</div><div class="line"><a name="l00273"></a><span class="lineno"> 273</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to encrypt VPX frame."</span>);</div><div class="line"><a name="l00274"></a><span class="lineno"> 274</span>  }</div><div class="line"><a name="l00275"></a><span class="lineno"> 275</span>  DCHECK_EQ(decrypt_config->GetTotalSizeOfSubsamples(),</div><div class="line"><a name="l00276"></a><span class="lineno"> 276</span>  clear_sample->data_size());</div><div class="line"><a name="l00277"></a><span class="lineno"> 277</span>  } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (header_parser_) {</div><div class="line"><a name="l00278"></a><span class="lineno"> 278</span>  <span class="keywordflow">if</span> (!EncryptNalFrame(clear_sample->data(), clear_sample->data_size(),</div><div class="line"><a name="l00279"></a><span class="lineno"> 279</span>  &cipher_sample_data.get()[0], decrypt_config.get())) {</div><div class="line"><a name="l00280"></a><span class="lineno"> 280</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">"Failed to encrypt NAL frame."</span>);</div><div class="line"><a name="l00281"></a><span class="lineno"> 281</span>  }</div><div class="line"><a name="l00282"></a><span class="lineno"> 282</span>  DCHECK_EQ(decrypt_config->GetTotalSizeOfSubsamples(),</div><div class="line"><a name="l00283"></a><span class="lineno"> 283</span>  clear_sample->data_size());</div><div class="line"><a name="l00284"></a><span class="lineno"> 284</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00285"></a><span class="lineno"> 285</span>  memcpy(&cipher_sample_data.get()[0], clear_sample->data(),</div><div class="line"><a name="l00286"></a><span class="lineno"> 286</span>  std::min(clear_sample->data_size(), leading_clear_bytes_size_));</div><div class="line"><a name="l00287"></a><span class="lineno"> 287</span>  <span class="keywordflow">if</span> (clear_sample->data_size() > leading_clear_bytes_size_) {</div><div class="line"><a name="l00288"></a><span class="lineno"> 288</span>  <span class="comment">// The residual block is left unecrypted (copied without encryption). No</span></div><div class="line"><a name="l00289"></a><span class="lineno"> 289</span>  <span class="comment">// need to do special handling here.</span></div><div class="line"><a name="l00290"></a><span class="lineno"> 290</span>  EncryptBytes(clear_sample->data() + leading_clear_bytes_size_,</div><div class="line"><a name="l00291"></a><span class="lineno"> 291</span>  clear_sample->data_size() - leading_clear_bytes_size_,</div><div class="line"><a name="l00292"></a><span class="lineno"> 292</span>  &cipher_sample_data.get()[leading_clear_bytes_size_]);</div><div class="line"><a name="l00293"></a><span class="lineno"> 293</span>  }</div><div class="line"><a name="l00294"></a><span class="lineno"> 294</span>  }</div><div class="line"><a name="l00295"></a><span class="lineno"> 295</span> </div><div class="line"><a name="l00296"></a><span class="lineno"> 296</span>  cipher_sample->TransferData(std::move(cipher_sample_data),</div><div class="line"><a name="l00297"></a><span class="lineno"> 297</span>  clear_sample->data_size());</div><div class="line"><a name="l00298"></a><span class="lineno"> 298</span>  <span class="comment">// Finish initializing the sample before sending it downstream. We must</span></div><div class="line"><a name="l00299"></a><span class="lineno"> 299</span>  <span class="comment">// wait until now to finish the initialization as we will lose access to</span></div><div class="line"><a name="l00300"></a><span class="lineno"> 300</span>  <span class="comment">// |decrypt_config| once we set it.</span></div><div class="line"><a name="l00301"></a><span class="lineno"> 301</span>  cipher_sample->set_is_encrypted(<span class="keyword">true</span>);</div><div class="line"><a name="l00302"></a><span class="lineno"> 302</span>  cipher_sample->set_decrypt_config(std::move(decrypt_config));</div><div class="line"><a name="l00303"></a><span class="lineno"> 303</span> </div><div class="line"><a name="l00304"></a><span class="lineno"> 304</span>  encryptor_->UpdateIv();</div><div class="line"><a name="l00305"></a><span class="lineno"> 305</span> </div><div class="line"><a name="l00306"></a><span class="lineno"> 306</span>  <span class="keywordflow">return</span> DispatchMediaSample(kStreamIndex, std::move(cipher_sample));</div><div class="line"><a name="l00307"></a><span class="lineno"> 307</span> }</div><div class="line"><a name="l00308"></a><span class="lineno"> 308</span> </div><div class="line"><a name="l00309"></a><span class="lineno"> 309</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::SetupProtectionPattern(StreamType stream_type) {</div><div class="line"><a name="l00310"></a><span class="lineno"> 310</span>  <span class="keywordflow">switch</span> (protection_scheme_) {</div><div class="line"><a name="l00311"></a><span class="lineno"> 311</span>  <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme: {</div><div class="line"><a name="l00312"></a><span class="lineno"> 312</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kH264LeadingClearBytesSize = 32u;</div><div class="line"><a name="l00313"></a><span class="lineno"> 313</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kSmallNalUnitSize = 32u + 16u;</div><div class="line"><a name="l00314"></a><span class="lineno"> 314</span>  <span class="keyword">const</span> <span class="keywordtype">size_t</span> kAudioLeadingClearBytesSize = 16u;</div><div class="line"><a name="l00315"></a><span class="lineno"> 315</span>  <span class="keywordflow">switch</span> (codec_) {</div><div class="line"><a name="l00316"></a><span class="lineno"> 316</span>  <span class="keywordflow">case</span> kCodecH264:</div><div class="line"><a name="l00317"></a><span class="lineno"> 317</span>  <span class="comment">// Apple Sample AES uses 1:9 pattern for video.</span></div><div class="line"><a name="l00318"></a><span class="lineno"> 318</span>  crypt_byte_block_ = 1u;</div><div class="line"><a name="l00319"></a><span class="lineno"> 319</span>  skip_byte_block_ = 9u;</div><div class="line"><a name="l00320"></a><span class="lineno"> 320</span>  leading_clear_bytes_size_ = kH264LeadingClearBytesSize;</div><div class="line"><a name="l00321"></a><span class="lineno"> 321</span>  min_protected_data_size_ = kSmallNalUnitSize + 1u;</div><div class="line"><a name="l00322"></a><span class="lineno"> 322</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00323"></a><span class="lineno"> 323</span>  <span class="keywordflow">case</span> kCodecAAC:</div><div class="line"><a name="l00324"></a><span class="lineno"> 324</span>  FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00325"></a><span class="lineno"> 325</span>  <span class="keywordflow">case</span> kCodecAC3:</div><div class="line"><a name="l00326"></a><span class="lineno"> 326</span>  FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00327"></a><span class="lineno"> 327</span>  <span class="keywordflow">case</span> kCodecEAC3:</div><div class="line"><a name="l00328"></a><span class="lineno"> 328</span>  <span class="comment">// Audio is whole sample encrypted. We could not use a</span></div><div class="line"><a name="l00329"></a><span class="lineno"> 329</span>  <span class="comment">// crypto_byte_block_ of 1 here as if there is one crypto block</span></div><div class="line"><a name="l00330"></a><span class="lineno"> 330</span>  <span class="comment">// remaining, it need not be encrypted for video but it needs to be</span></div><div class="line"><a name="l00331"></a><span class="lineno"> 331</span>  <span class="comment">// encrypted for audio.</span></div><div class="line"><a name="l00332"></a><span class="lineno"> 332</span>  crypt_byte_block_ = 0u;</div><div class="line"><a name="l00333"></a><span class="lineno"> 333</span>  skip_byte_block_ = 0u;</div><div class="line"><a name="l00334"></a><span class="lineno"> 334</span>  <span class="comment">// E-AC3 encryption is handled by SampleAesEc3Cryptor, which also</span></div><div class="line"><a name="l00335"></a><span class="lineno"> 335</span>  <span class="comment">// manages leading clear bytes.</span></div><div class="line"><a name="l00336"></a><span class="lineno"> 336</span>  leading_clear_bytes_size_ =</div><div class="line"><a name="l00337"></a><span class="lineno"> 337</span>  codec_ == kCodecEAC3 ? 0 : kAudioLeadingClearBytesSize;</div><div class="line"><a name="l00338"></a><span class="lineno"> 338</span>  min_protected_data_size_ = leading_clear_bytes_size_ + 15u;</div><div class="line"><a name="l00339"></a><span class="lineno"> 339</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00340"></a><span class="lineno"> 340</span>  <span class="keywordflow">default</span>:</div><div class="line"><a name="l00341"></a><span class="lineno"> 341</span>  <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(</div><div class="line"><a name="l00342"></a><span class="lineno"> 342</span>  error::ENCRYPTION_FAILURE,</div><div class="line"><a name="l00343"></a><span class="lineno"> 343</span>  <span class="stringliteral">"Only AAC/AC3/EAC3 and H264 are supported in Sample AES."</span>);</div><div class="line"><a name="l00344"></a><span class="lineno"> 344</span>  }</div><div class="line"><a name="l00345"></a><span class="lineno"> 345</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00346"></a><span class="lineno"> 346</span>  }</div><div class="line"><a name="l00347"></a><span class="lineno"> 347</span>  <span class="keywordflow">case</span> FOURCC_cbcs:</div><div class="line"><a name="l00348"></a><span class="lineno"> 348</span>  FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00349"></a><span class="lineno"> 349</span>  <span class="keywordflow">case</span> FOURCC_cens:</div><div class="line"><a name="l00350"></a><span class="lineno"> 350</span>  <span class="keywordflow">if</span> (stream_type == kStreamVideo) {</div><div class="line"><a name="l00351"></a><span class="lineno"> 351</span>  <span class="comment">// Use 1:9 pattern for video.</span></div><div class="line"><a name="l00352"></a><span class="lineno"> 352</span>  crypt_byte_block_ = 1u;</div><div class="line"><a name="l00353"></a><span class="lineno"> 353</span>  skip_byte_block_ = 9u;</div><div class="line"><a name="l00354"></a><span class="lineno"> 354</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00355"></a><span class="lineno"> 355</span>  <span class="comment">// Tracks other than video are protected using whole-block full-sample</span></div><div class="line"><a name="l00356"></a><span class="lineno"> 356</span>  <span class="comment">// encryption, which is essentially a pattern of 1:0. Note that this may</span></div><div class="line"><a name="l00357"></a><span class="lineno"> 357</span>  <span class="comment">// not be the same as the non-pattern based encryption counterparts,</span></div><div class="line"><a name="l00358"></a><span class="lineno"> 358</span>  <span class="comment">// e.g. in 'cens' for full sample encryption, the whole sample is</span></div><div class="line"><a name="l00359"></a><span class="lineno"> 359</span>  <span class="comment">// encrypted up to the last 16-byte boundary, see 23001-7:2016(E) 9.7;</span></div><div class="line"><a name="l00360"></a><span class="lineno"> 360</span>  <span class="comment">// while in 'cenc' for full sample encryption, the last partial 16-byte</span></div><div class="line"><a name="l00361"></a><span class="lineno"> 361</span>  <span class="comment">// block is also encrypted, see 23001-7:2016(E) 9.4.2. Another</span></div><div class="line"><a name="l00362"></a><span class="lineno"> 362</span>  <span class="comment">// difference is the use of constant iv.</span></div><div class="line"><a name="l00363"></a><span class="lineno"> 363</span>  crypt_byte_block_ = 1u;</div><div class="line"><a name="l00364"></a><span class="lineno"> 364</span>  skip_byte_block_ = 0u;</div><div class="line"><a name="l00365"></a><span class="lineno"> 365</span>  }</div><div class="line"><a name="l00366"></a><span class="lineno"> 366</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00367"></a><span class="lineno"> 367</span>  <span class="keywordflow">default</span>:</div><div class="line"><a name="l00368"></a><span class="lineno"> 368</span>  <span class="comment">// Not using pattern encryption.</span></div><div class="line"><a name="l00369"></a><span class="lineno"> 369</span>  crypt_byte_block_ = 0u;</div><div class="line"><a name="l00370"></a><span class="lineno"> 370</span>  skip_byte_block_ = 0u;</div><div class="line"><a name="l00371"></a><span class="lineno"> 371</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00372"></a><span class="lineno"> 372</span>  }</div><div class="line"><a name="l00373"></a><span class="lineno"> 373</span>  <span class="keywordflow">return</span> Status::OK;</div><div class="line"><a name="l00374"></a><span class="lineno"> 374</span> }</div><div class="line"><a name="l00375"></a><span class="lineno"> 375</span> </div><div class="line"><a name="l00376"></a><span class="lineno"> 376</span> <span class="keywordtype">bool</span> EncryptionHandler::CreateEncryptor(<span class="keyword">const</span> <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a>& encryption_key) {</div><div class="line"><a name="l00377"></a><span class="lineno"> 377</span>  std::unique_ptr<AesCryptor> encryptor;</div><div class="line"><a name="l00378"></a><span class="lineno"> 378</span>  <span class="keywordflow">switch</span> (protection_scheme_) {</div><div class="line"><a name="l00379"></a><span class="lineno"> 379</span>  <span class="keywordflow">case</span> FOURCC_cenc:</div><div class="line"><a name="l00380"></a><span class="lineno"> 380</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">AesCtrEncryptor</a>);</div><div class="line"><a name="l00381"></a><span class="lineno"> 381</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00382"></a><span class="lineno"> 382</span>  <span class="keywordflow">case</span> FOURCC_cbc1:</div><div class="line"><a name="l00383"></a><span class="lineno"> 383</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding));</div><div class="line"><a name="l00384"></a><span class="lineno"> 384</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00385"></a><span class="lineno"> 385</span>  <span class="keywordflow">case</span> FOURCC_cens:</div><div class="line"><a name="l00386"></a><span class="lineno"> 386</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00387"></a><span class="lineno"> 387</span>  crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00388"></a><span class="lineno"> 388</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00389"></a><span class="lineno"> 389</span>  AesCryptor::kDontUseConstantIv,</div><div class="line"><a name="l00390"></a><span class="lineno"> 390</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> <a class="code" href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">AesCtrEncryptor</a>())));</div><div class="line"><a name="l00391"></a><span class="lineno"> 391</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00392"></a><span class="lineno"> 392</span>  <span class="keywordflow">case</span> FOURCC_cbcs:</div><div class="line"><a name="l00393"></a><span class="lineno"> 393</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00394"></a><span class="lineno"> 394</span>  crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00395"></a><span class="lineno"> 395</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00396"></a><span class="lineno"> 396</span>  AesCryptor::kUseConstantIv,</div><div class="line"><a name="l00397"></a><span class="lineno"> 397</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00398"></a><span class="lineno"> 398</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00399"></a><span class="lineno"> 399</span>  <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme:</div><div class="line"><a name="l00400"></a><span class="lineno"> 400</span>  <span class="keywordflow">if</span> (crypt_byte_block_ == 0 && skip_byte_block_ == 0) {</div><div class="line"><a name="l00401"></a><span class="lineno"> 401</span>  <span class="keywordflow">if</span> (codec_ == kCodecEAC3) {</div><div class="line"><a name="l00402"></a><span class="lineno"> 402</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d9/da0/classshaka_1_1media_1_1SampleAesEc3Cryptor.html">SampleAesEc3Cryptor</a>(</div><div class="line"><a name="l00403"></a><span class="lineno"> 403</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00404"></a><span class="lineno"> 404</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00405"></a><span class="lineno"> 405</span>  encryptor.reset(</div><div class="line"><a name="l00406"></a><span class="lineno"> 406</span>  <span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding, AesCryptor::kUseConstantIv));</div><div class="line"><a name="l00407"></a><span class="lineno"> 407</span>  }</div><div class="line"><a name="l00408"></a><span class="lineno"> 408</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00409"></a><span class="lineno"> 409</span>  encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00410"></a><span class="lineno"> 410</span>  crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00411"></a><span class="lineno"> 411</span>  <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00412"></a><span class="lineno"> 412</span>  AesCryptor::kUseConstantIv,</div><div class="line"><a name="l00413"></a><span class="lineno"> 413</span>  std::unique_ptr<AesCryptor>(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00414"></a><span class="lineno"> 414</span>  }</div><div class="line"><a name="l00415"></a><span class="lineno"> 415</span>  <span class="keywordflow">break</span>;</div><div class="line"><a name="l00416"></a><span class="lineno"> 416</span>  <span class="keywordflow">default</span>:</div><div class="line"><a name="l00417"></a><span class="lineno"> 417</span>  LOG(ERROR) << <span class="stringliteral">"Unsupported protection scheme."</span>;</div><div class="line"><a name="l00418"></a><span class="lineno"> 418</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00419"></a><span class="lineno"> 419</span>  }</div><div class="line"><a name="l00420"></a><span class="lineno"> 420</span> </div><div class="line"><a name="l00421"></a><span class="lineno"> 421</span>  std::vector<uint8_t> iv = encryption_key.iv;</div><div class="line"><a name="l00422"></a><span class="lineno"> 422</span>  <span class="keywordflow">if</span> (iv.empty()) {</div><div class="line"><a name="l00423"></a><span class="lineno"> 423</span>  <span class="keywordflow">if</span> (!<a class="code" href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">AesCryptor::GenerateRandomIv</a>(protection_scheme_, &iv)) {</div><div class="line"><a name="l00424"></a><span class="lineno"> 424</span>  LOG(ERROR) << <span class="stringliteral">"Failed to generate random iv."</span>;</div><div class="line"><a name="l00425"></a><span class="lineno"> 425</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00426"></a><span class="lineno"> 426</span>  }</div><div class="line"><a name="l00427"></a><span class="lineno"> 427</span>  }</div><div class="line"><a name="l00428"></a><span class="lineno"> 428</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> initialized =</div><div class="line"><a name="l00429"></a><span class="lineno"> 429</span>  encryptor->InitializeWithIv(encryption_key.key, iv);</div><div class="line"><a name="l00430"></a><span class="lineno"> 430</span>  encryptor_ = std::move(encryptor);</div><div class="line"><a name="l00431"></a><span class="lineno"> 431</span> </div><div class="line"><a name="l00432"></a><span class="lineno"> 432</span>  encryption_config_.reset(<span class="keyword">new</span> <a class="code" href="../../d7/d34/structshaka_1_1media_1_1EncryptionConfig.html">EncryptionConfig</a>);</div><div class="line"><a name="l00433"></a><span class="lineno"> 433</span>  encryption_config_->protection_scheme = protection_scheme_;</div><div class="line"><a name="l00434"></a><span class="lineno"> 434</span>  encryption_config_->crypt_byte_block = crypt_byte_block_;</div><div class="line"><a name="l00435"></a><span class="lineno"> 435</span>  encryption_config_->skip_byte_block = skip_byte_block_;</div><div class="line"><a name="l00436"></a><span class="lineno"> 436</span>  <span class="keywordflow">if</span> (encryptor_->use_constant_iv()) {</div><div class="line"><a name="l00437"></a><span class="lineno"> 437</span>  encryption_config_->per_sample_iv_size = 0;</div><div class="line"><a name="l00438"></a><span class="lineno"> 438</span>  encryption_config_->constant_iv = iv;</div><div class="line"><a name="l00439"></a><span class="lineno"> 439</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00440"></a><span class="lineno"> 440</span>  encryption_config_->per_sample_iv_size = <span class="keyword">static_cast<</span>uint8_t<span class="keyword">></span>(iv.size());</div><div class="line"><a name="l00441"></a><span class="lineno"> 441</span>  }</div><div class="line"><a name="l00442"></a><span class="lineno"> 442</span>  encryption_config_->key_id = encryption_key.key_id;</div><div class="line"><a name="l00443"></a><span class="lineno"> 443</span>  encryption_config_->key_system_info = encryption_key.key_system_info;</div><div class="line"><a name="l00444"></a><span class="lineno"> 444</span>  <span class="keywordflow">return</span> initialized;</div><div class="line"><a name="l00445"></a><span class="lineno"> 445</span> }</div><div class="line"><a name="l00446"></a><span class="lineno"> 446</span> </div><div class="line"><a name="l00447"></a><span class="lineno"> 447</span> <span class="keywordtype">bool</span> EncryptionHandler::EncryptVpxFrame(</div><div class="line"><a name="l00448"></a><span class="lineno"> 448</span>  <span class="keyword">const</span> std::vector<VPxFrameInfo>& vpx_frames,</div><div class="line"><a name="l00449"></a><span class="lineno"> 449</span>  <span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00450"></a><span class="lineno"> 450</span>  <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00451"></a><span class="lineno"> 451</span>  uint8_t* dest,</div><div class="line"><a name="l00452"></a><span class="lineno"> 452</span>  <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>* decrypt_config) {</div><div class="line"><a name="l00453"></a><span class="lineno"> 453</span>  <span class="keyword">const</span> uint8_t* data = source;</div><div class="line"><a name="l00454"></a><span class="lineno"> 454</span>  <span class="keywordflow">for</span> (<span class="keyword">const</span> <a class="code" href="../../d0/d11/structshaka_1_1media_1_1VPxFrameInfo.html">VPxFrameInfo</a>& frame : vpx_frames) {</div><div class="line"><a name="l00455"></a><span class="lineno"> 455</span>  uint16_t clear_bytes =</div><div class="line"><a name="l00456"></a><span class="lineno"> 456</span>  <span class="keyword">static_cast<</span>uint16_t<span class="keyword">></span>(frame.uncompressed_header_size);</div><div class="line"><a name="l00457"></a><span class="lineno"> 457</span>  uint32_t cipher_bytes = <span class="keyword">static_cast<</span>uint32_t<span class="keyword">></span>(</div><div class="line"><a name="l00458"></a><span class="lineno"> 458</span>  frame.frame_size - frame.uncompressed_header_size);</div><div class="line"><a name="l00459"></a><span class="lineno"> 459</span> </div><div class="line"><a name="l00460"></a><span class="lineno"> 460</span>  <span class="comment">// "VP Codec ISO Media File Format Binding" document requires that the</span></div><div class="line"><a name="l00461"></a><span class="lineno"> 461</span>  <span class="comment">// encrypted bytes of each frame within the superframe must be block</span></div><div class="line"><a name="l00462"></a><span class="lineno"> 462</span>  <span class="comment">// aligned so that the counter state can be computed for each frame</span></div><div class="line"><a name="l00463"></a><span class="lineno"> 463</span>  <span class="comment">// within the superframe.</span></div><div class="line"><a name="l00464"></a><span class="lineno"> 464</span>  <span class="comment">// ISO/IEC 23001-7:2016 10.2 'cbc1' 10.3 'cens'</span></div><div class="line"><a name="l00465"></a><span class="lineno"> 465</span>  <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div><div class="line"><a name="l00466"></a><span class="lineno"> 466</span>  <span class="comment">// avoid partial blocks in Subsamples.</span></div><div class="line"><a name="l00467"></a><span class="lineno"> 467</span>  <span class="comment">// For consistency, apply block alignment to all frames.</span></div><div class="line"><a name="l00468"></a><span class="lineno"> 468</span>  <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div><div class="line"><a name="l00469"></a><span class="lineno"> 469</span>  clear_bytes += misalign_bytes;</div><div class="line"><a name="l00470"></a><span class="lineno"> 470</span>  cipher_bytes -= misalign_bytes;</div><div class="line"><a name="l00471"></a><span class="lineno"> 471</span> </div><div class="line"><a name="l00472"></a><span class="lineno"> 472</span>  decrypt_config-><a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">AddSubsample</a>(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00473"></a><span class="lineno"> 473</span>  memcpy(dest, data, clear_bytes);</div><div class="line"><a name="l00474"></a><span class="lineno"> 474</span>  <span class="keywordflow">if</span> (cipher_bytes > 0)</div><div class="line"><a name="l00475"></a><span class="lineno"> 475</span>  EncryptBytes(data + clear_bytes, cipher_bytes, dest + clear_bytes);</div><div class="line"><a name="l00476"></a><span class="lineno"> 476</span>  data += frame.frame_size;</div><div class="line"><a name="l00477"></a><span class="lineno"> 477</span>  dest += frame.frame_size;</div><div class="line"><a name="l00478"></a><span class="lineno"> 478</span>  }</div><div class="line"><a name="l00479"></a><span class="lineno"> 479</span>  <span class="comment">// Add subsample for the superframe index if exists.</span></div><div class="line"><a name="l00480"></a><span class="lineno"> 480</span>  <span class="keyword">const</span> <span class="keywordtype">bool</span> is_superframe = vpx_frames.size() > 1;</div><div class="line"><a name="l00481"></a><span class="lineno"> 481</span>  <span class="keywordflow">if</span> (is_superframe) {</div><div class="line"><a name="l00482"></a><span class="lineno"> 482</span>  <span class="keywordtype">size_t</span> index_size = source + source_size - data;</div><div class="line"><a name="l00483"></a><span class="lineno"> 483</span>  DCHECK_LE(index_size, 2 + vpx_frames.size() * 4);</div><div class="line"><a name="l00484"></a><span class="lineno"> 484</span>  DCHECK_GE(index_size, 2 + vpx_frames.size() * 1);</div><div class="line"><a name="l00485"></a><span class="lineno"> 485</span>  uint16_t clear_bytes = <span class="keyword">static_cast<</span>uint16_t<span class="keyword">></span>(index_size);</div><div class="line"><a name="l00486"></a><span class="lineno"> 486</span>  uint32_t cipher_bytes = 0;</div><div class="line"><a name="l00487"></a><span class="lineno"> 487</span>  decrypt_config-><a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">AddSubsample</a>(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00488"></a><span class="lineno"> 488</span>  memcpy(dest, data, clear_bytes);</div><div class="line"><a name="l00489"></a><span class="lineno"> 489</span>  }</div><div class="line"><a name="l00490"></a><span class="lineno"> 490</span>  <span class="keywordflow">return</span> <span class="keyword">true</span>;</div><div class="line"><a name="l00491"></a><span class="lineno"> 491</span> }</div><div class="line"><a name="l00492"></a><span class="lineno"> 492</span> </div><div class="line"><a name="l00493"></a><span class="lineno"> 493</span> <span class="keywordtype">bool</span> EncryptionHandler::EncryptNalFrame(<span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00494"></a><span class="lineno"> 494</span>  <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00495"></a><span class="lineno"> 495</span>  uint8_t* dest,</div><div class="line"><a name="l00496"></a><span class="lineno"> 496</span>  <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>* decrypt_config) {</div><div class="line"><a name="l00497"></a><span class="lineno"> 497</span>  DCHECK_NE(nalu_length_size_, 0u);</div><div class="line"><a name="l00498"></a><span class="lineno"> 498</span>  DCHECK(header_parser_);</div><div class="line"><a name="l00499"></a><span class="lineno"> 499</span>  <span class="keyword">const</span> Nalu::CodecType nalu_type =</div><div class="line"><a name="l00500"></a><span class="lineno"> 500</span>  (codec_ == kCodecH265) ? Nalu::kH265 : Nalu::kH264;</div><div class="line"><a name="l00501"></a><span class="lineno"> 501</span>  <a class="code" href="../../db/d86/classshaka_1_1media_1_1NaluReader.html">NaluReader</a> reader(nalu_type, nalu_length_size_, source, source_size);</div><div class="line"><a name="l00502"></a><span class="lineno"> 502</span> </div><div class="line"><a name="l00503"></a><span class="lineno"> 503</span>  <span class="comment">// Store the current length of clear data. This is used to squash</span></div><div class="line"><a name="l00504"></a><span class="lineno"> 504</span>  <span class="comment">// multiple unencrypted NAL units into fewer subsample entries.</span></div><div class="line"><a name="l00505"></a><span class="lineno"> 505</span>  uint64_t accumulated_clear_bytes = 0;</div><div class="line"><a name="l00506"></a><span class="lineno"> 506</span> </div><div class="line"><a name="l00507"></a><span class="lineno"> 507</span>  <a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html">Nalu</a> nalu;</div><div class="line"><a name="l00508"></a><span class="lineno"> 508</span>  NaluReader::Result result;</div><div class="line"><a name="l00509"></a><span class="lineno"> 509</span>  <span class="keywordflow">while</span> ((result = reader.<a class="code" href="../../db/d86/classshaka_1_1media_1_1NaluReader.html#ae051f1f92d84acfcd4cc159d972d647a">Advance</a>(&nalu)) == NaluReader::kOk) {</div><div class="line"><a name="l00510"></a><span class="lineno"> 510</span>  <span class="keyword">const</span> uint64_t nalu_total_size = nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">header_size</a>() + nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#abe782e4298e7add8ce0a1c33e66cfcdb">payload_size</a>();</div><div class="line"><a name="l00511"></a><span class="lineno"> 511</span>  <span class="keywordflow">if</span> (nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a63f091b3dbe862fd4519c1b374dfc937">is_video_slice</a>() && nalu_total_size >= min_protected_data_size_) {</div><div class="line"><a name="l00512"></a><span class="lineno"> 512</span>  uint64_t current_clear_bytes = leading_clear_bytes_size_;</div><div class="line"><a name="l00513"></a><span class="lineno"> 513</span>  <span class="keywordflow">if</span> (current_clear_bytes == 0) {</div><div class="line"><a name="l00514"></a><span class="lineno"> 514</span>  <span class="comment">// For video-slice NAL units, encrypt the video slice. This skips</span></div><div class="line"><a name="l00515"></a><span class="lineno"> 515</span>  <span class="comment">// the frame header.</span></div><div class="line"><a name="l00516"></a><span class="lineno"> 516</span>  <span class="keyword">const</span> int64_t video_slice_header_size =</div><div class="line"><a name="l00517"></a><span class="lineno"> 517</span>  header_parser_->GetHeaderSize(nalu);</div><div class="line"><a name="l00518"></a><span class="lineno"> 518</span>  <span class="keywordflow">if</span> (video_slice_header_size < 0) {</div><div class="line"><a name="l00519"></a><span class="lineno"> 519</span>  LOG(ERROR) << <span class="stringliteral">"Failed to read slice header."</span>;</div><div class="line"><a name="l00520"></a><span class="lineno"> 520</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00521"></a><span class="lineno"> 521</span>  }</div><div class="line"><a name="l00522"></a><span class="lineno"> 522</span>  current_clear_bytes = nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">header_size</a>() + video_slice_header_size;</div><div class="line"><a name="l00523"></a><span class="lineno"> 523</span>  }</div><div class="line"><a name="l00524"></a><span class="lineno"> 524</span>  uint64_t cipher_bytes = nalu_total_size - current_clear_bytes;</div><div class="line"><a name="l00525"></a><span class="lineno"> 525</span> </div><div class="line"><a name="l00526"></a><span class="lineno"> 526</span>  <span class="comment">// ISO/IEC 23001-7:2016 10.2 'cbc1' 10.3 'cens'</span></div><div class="line"><a name="l00527"></a><span class="lineno"> 527</span>  <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div><div class="line"><a name="l00528"></a><span class="lineno"> 528</span>  <span class="comment">// avoid partial blocks in Subsamples.</span></div><div class="line"><a name="l00529"></a><span class="lineno"> 529</span>  <span class="comment">// CMAF requires 'cenc' scheme BytesOfProtectedData SHALL be a multiple</span></div><div class="line"><a name="l00530"></a><span class="lineno"> 530</span>  <span class="comment">// of 16 bytes; while 'cbcs' scheme BytesOfProtectedData SHALL start on</span></div><div class="line"><a name="l00531"></a><span class="lineno"> 531</span>  <span class="comment">// the first byte of video data following the slice header.</span></div><div class="line"><a name="l00532"></a><span class="lineno"> 532</span>  <span class="keywordflow">if</span> (protection_scheme_ == FOURCC_cbc1 ||</div><div class="line"><a name="l00533"></a><span class="lineno"> 533</span>  protection_scheme_ == FOURCC_cens ||</div><div class="line"><a name="l00534"></a><span class="lineno"> 534</span>  protection_scheme_ == FOURCC_cenc) {</div><div class="line"><a name="l00535"></a><span class="lineno"> 535</span>  <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div><div class="line"><a name="l00536"></a><span class="lineno"> 536</span>  current_clear_bytes += misalign_bytes;</div><div class="line"><a name="l00537"></a><span class="lineno"> 537</span>  cipher_bytes -= misalign_bytes;</div><div class="line"><a name="l00538"></a><span class="lineno"> 538</span>  }</div><div class="line"><a name="l00539"></a><span class="lineno"> 539</span> </div><div class="line"><a name="l00540"></a><span class="lineno"> 540</span>  accumulated_clear_bytes += nalu_length_size_ + current_clear_bytes;</div><div class="line"><a name="l00541"></a><span class="lineno"> 541</span>  AddSubsample(accumulated_clear_bytes, cipher_bytes, decrypt_config);</div><div class="line"><a name="l00542"></a><span class="lineno"> 542</span>  memcpy(dest, source, accumulated_clear_bytes);</div><div class="line"><a name="l00543"></a><span class="lineno"> 543</span>  source += accumulated_clear_bytes;</div><div class="line"><a name="l00544"></a><span class="lineno"> 544</span>  dest += accumulated_clear_bytes;</div><div class="line"><a name="l00545"></a><span class="lineno"> 545</span>  accumulated_clear_bytes = 0;</div><div class="line"><a name="l00546"></a><span class="lineno"> 546</span> </div><div class="line"><a name="l00547"></a><span class="lineno"> 547</span>  DCHECK_EQ(nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a52dc6f445a09c36a64c634ccc2891489">data</a>() + current_clear_bytes, source);</div><div class="line"><a name="l00548"></a><span class="lineno"> 548</span>  EncryptBytes(source, cipher_bytes, dest);</div><div class="line"><a name="l00549"></a><span class="lineno"> 549</span>  source += cipher_bytes;</div><div class="line"><a name="l00550"></a><span class="lineno"> 550</span>  dest += cipher_bytes;</div><div class="line"><a name="l00551"></a><span class="lineno"> 551</span>  } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00552"></a><span class="lineno"> 552</span>  <span class="comment">// For non-video-slice or small NAL units, don't encrypt.</span></div><div class="line"><a name="l00553"></a><span class="lineno"> 553</span>  accumulated_clear_bytes += nalu_length_size_ + nalu_total_size;</div><div class="line"><a name="l00554"></a><span class="lineno"> 554</span>  }</div><div class="line"><a name="l00555"></a><span class="lineno"> 555</span>  }</div><div class="line"><a name="l00556"></a><span class="lineno"> 556</span>  <span class="keywordflow">if</span> (result != NaluReader::kEOStream) {</div><div class="line"><a name="l00557"></a><span class="lineno"> 557</span>  LOG(ERROR) << <span class="stringliteral">"Failed to parse NAL units."</span>;</div><div class="line"><a name="l00558"></a><span class="lineno"> 558</span>  <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00559"></a><span class="lineno"> 559</span>  }</div><div class="line"><a name="l00560"></a><span class="lineno"> 560</span>  AddSubsample(accumulated_clear_bytes, 0, decrypt_config);</div><div class="line"><a name="l00561"></a><span class="lineno"> 561</span>  memcpy(dest, source, accumulated_clear_bytes);</div><div class="line"><a name="l00562"></a><span class="lineno"> 562</span>  <span class="keywordflow">return</span> <span class="keyword">true</span>;</div><div class="line"><a name="l00563"></a><span class="lineno"> 563</span> }</div><div class="line"><a name="l00564"></a><span class="lineno"> 564</span> </div><div class="line"><a name="l00565"></a><span class="lineno"> 565</span> <span class="keywordtype">void</span> EncryptionHandler::EncryptBytes(<span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00566"></a><span class="lineno"> 566</span>  <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00567"></a><span class="lineno"> 567</span>  uint8_t* dest) {</div><div class="line"><a name="l00568"></a><span class="lineno"> 568</span>  DCHECK(source);</div><div class="line"><a name="l00569"></a><span class="lineno"> 569</span>  DCHECK(dest);</div><div class="line"><a name="l00570"></a><span class="lineno"> 570</span>  DCHECK(encryptor_);</div><div class="line"><a name="l00571"></a><span class="lineno"> 571</span>  CHECK(encryptor_->Crypt(source, source_size, dest));</div><div class="line"><a name="l00572"></a><span class="lineno"> 572</span> }</div><div class="line"><a name="l00573"></a><span class="lineno"> 573</span> </div><div class="line"><a name="l00574"></a><span class="lineno"> 574</span> <span class="keywordtype">void</span> EncryptionHandler::InjectVpxParserForTesting(</div><div class="line"><a name="l00575"></a><span class="lineno"> 575</span>  std::unique_ptr<VPxParser> vpx_parser) {</div><div class="line"><a name="l00576"></a><span class="lineno"> 576</span>  vpx_parser_ = std::move(vpx_parser);</div><div class="line"><a name="l00577"></a><span class="lineno"> 577</span> }</div><div class="line"><a name="l00578"></a><span class="lineno"> 578</span> </div><div class="line"><a name="l00579"></a><span class="lineno"> 579</span> <span class="keywordtype">void</span> EncryptionHandler::InjectVideoSliceHeaderParserForTesting(</div><div class="line"><a name="l00580"></a><span class="lineno"> 580</span>  std::unique_ptr<VideoSliceHeaderParser> header_parser) {</div><div class="line"><a name="l00581"></a><span class="lineno"> 581</span>  header_parser_ = std::move(header_parser);</div><div class="line"><a name="l00582"></a><span class="lineno"> 582</span> }</div><div class="line"><a name="l00583"></a><span class="lineno"> 583</span> </div><div class="line"><a name="l00584"></a><span class="lineno"> 584</span> } <span class="comment">// namespace media</span></div><div class="line"><a name="l00585"></a><span class="lineno"> 585</span> } <span class="comment">// namespace shaka</span></div><div class="ttc" id="classshaka_1_1media_1_1H265VideoSliceHeaderParser_html"><div class="ttname"><a href="../../d1/d79/classshaka_1_1media_1_1H265VideoSliceHeaderParser.html">shaka::media::H265VideoSliceHeaderParser</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d2/d33/video__slice__header__parser_8h_source.html#l00053">video_slice_header_parser.h:53</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1StreamInfo_html"><div class="ttname"><a href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">shaka::media::StreamInfo</a></div><div class="ttdoc">Abstract class holds stream information. </div><div class="ttdef"><b>Definition:</b> <a href="../../d8/daa/stream__info_8h_source.html#l00058">stream_info.h:58</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a63f091b3dbe862fd4519c1b374dfc937"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a63f091b3dbe862fd4519c1b374dfc937">shaka::media::Nalu::is_video_slice</a></div><div class="ttdeci">bool is_video_slice() const</div><div class="ttdoc">Slice data partition NALs are not considered as slice NALs. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00117">nalu_reader.h:117</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1StreamInfo_html_afdd9b2df8ae1c11bb033c44eaba5e38d"><div class="ttname"><a href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html#afdd9b2df8ae1c11bb033c44eaba5e38d">shaka::media::StreamInfo::Clone</a></div><div class="ttdeci">virtual std::unique_ptr< StreamInfo > Clone() const =0</div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1DecryptConfig_html"><div class="ttname"><a href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">shaka::media::DecryptConfig</a></div><div class="ttdef"><b>Definition:</b> <a href="../../df/dad/decrypt__config_8h_source.html#l00040">decrypt_config.h:40</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a52dc6f445a09c36a64c634ccc2891489"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a52dc6f445a09c36a64c634ccc2891489">shaka::media::Nalu::data</a></div><div class="ttdeci">const uint8_t * data() const</div><div class="ttdoc">This is the pointer to the Nalu data, pointing to the header. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00097">nalu_reader.h:97</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">shaka::media::AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00035">aes_pattern_cryptor.h:35</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1SegmentInfo_html"><div class="ttname"><a href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">shaka::media::SegmentInfo</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d93/media__handler_8h_source.html#l00053">media_handler.h:53</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1NaluReader_html"><div class="ttname"><a href="../../db/d86/classshaka_1_1media_1_1NaluReader.html">shaka::media::NaluReader</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00149">nalu_reader.h:149</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1VPxFrameInfo_html"><div class="ttname"><a href="../../d0/d11/structshaka_1_1media_1_1VPxFrameInfo.html">shaka::media::VPxFrameInfo</a></div><div class="ttdef"><b>Definition:</b> <a href="../../df/d8a/vpx__parser_8h_source.html#l00019">vpx_parser.h:19</a></div></div>
|
|
<div class="ttc" id="namespaceshaka_html"><div class="ttname"><a href="../../d8/daf/namespaceshaka.html">shaka</a></div><div class="ttdoc">All the methods that are virtual are virtual for mocking. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d15/gflags__hex__bytes_8cc_source.html#l00011">gflags_hex_bytes.cc:11</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a835d8f01a8ab94887ee3dce3b5d3721e"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">shaka::media::Nalu::header_size</a></div><div class="ttdeci">uint64_t header_size() const</div><div class="ttdoc">The size of the header, e.g. 1 for H.264. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00100">nalu_reader.h:100</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">shaka::media::AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00026">aes_pattern_cryptor.h:26</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1Status_html"><div class="ttname"><a href="../../d2/d20/classshaka_1_1Status.html">shaka::Status</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/d13/status_8h_source.html#l00110">status.h:110</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a3f1808a4386081e5e1c9a798a1a69dd0"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">shaka::media::EncryptionHandler::InitializeInternal</a></div><div class="ttdeci">Status InitializeInternal() override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00095">encryption_handler.cc:95</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a7887e6060eb572036674ecb9a7e045c4"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">shaka::media::EncryptionHandler::Process</a></div><div class="ttdeci">Status Process(std::unique_ptr< StreamData > stream_data) override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00106">encryption_handler.cc:106</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesCbcEncryptor_html"><div class="ttname"><a href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">shaka::media::AesCbcEncryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df0/aes__encryptor_8h_source.html#l00077">aes_encryptor.h:77</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1SampleAesEc3Cryptor_html"><div class="ttname"><a href="../../d9/da0/classshaka_1_1media_1_1SampleAesEc3Cryptor.html">shaka::media::SampleAesEc3Cryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d40/sample__aes__ec3__cryptor_8h_source.html#l00017">sample_aes_ec3_cryptor.h:17</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionKey_html"><div class="ttname"><a href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">shaka::media::EncryptionKey</a></div><div class="ttdef"><b>Definition:</b> <a href="../../dc/d3f/key__source_8h_source.html#l00034">key_source.h:34</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesCryptor_html_a40d9a82d274d6fbaee5346328f11dedd"><div class="ttname"><a href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">shaka::media::AesCryptor::GenerateRandomIv</a></div><div class="ttdeci">static bool GenerateRandomIv(FourCC protection_scheme, std::vector< uint8_t > *iv)</div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d55/aes__cryptor_8cc_source.html#l00107">aes_cryptor.cc:107</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1H264VideoSliceHeaderParser_html"><div class="ttname"><a href="../../da/df0/classshaka_1_1media_1_1H264VideoSliceHeaderParser.html">shaka::media::H264VideoSliceHeaderParser</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d2/d33/video__slice__header__parser_8h_source.html#l00036">video_slice_header_parser.h:36</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1NaluReader_html_ae051f1f92d84acfcd4cc159d972d647a"><div class="ttname"><a href="../../db/d86/classshaka_1_1media_1_1NaluReader.html#ae051f1f92d84acfcd4cc159d972d647a">shaka::media::NaluReader::Advance</a></div><div class="ttdeci">Result Advance(Nalu *nalu)</div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df5/nalu__reader_8cc_source.html#l00239">nalu_reader.cc:239</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1VP9Parser_html"><div class="ttname"><a href="../../db/d5a/classshaka_1_1media_1_1VP9Parser.html">shaka::media::VP9Parser</a></div><div class="ttdoc">Class to parse a vp9 bit stream. </div><div class="ttdef"><b>Definition:</b> <a href="../../df/d8a/vp9__parser_8h_source.html#l00020">vp9_parser.h:20</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html">shaka::media::Nalu</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00027">nalu_reader.h:27</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">shaka::media::AesPatternCryptor</a></div><div class="ttdoc">Implements pattern-based encryption/decryption. </div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00017">aes_pattern_cryptor.h:17</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1AesCtrEncryptor_html"><div class="ttname"><a href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">shaka::media::AesCtrEncryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df0/aes__encryptor_8h_source.html#l00042">aes_encryptor.h:42</a></div></div>
|
|
<div class="ttc" id="structshaka_1_1media_1_1EncryptionConfig_html"><div class="ttname"><a href="../../d7/d34/structshaka_1_1media_1_1EncryptionConfig.html">shaka::media::EncryptionConfig</a></div><div class="ttdef"><b>Definition:</b> <a href="../../dd/d05/encryption__config_8h_source.html#l00016">encryption_config.h:16</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1DecryptConfig_html_a36681ecf1eeb8a4effb0f00b232bda58"><div class="ttname"><a href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">shaka::media::DecryptConfig::AddSubsample</a></div><div class="ttdeci">void AddSubsample(uint16_t clear_bytes, uint32_t cipher_bytes)</div><div class="ttdef"><b>Definition:</b> <a href="../../df/dad/decrypt__config_8h_source.html#l00080">decrypt_config.h:80</a></div></div>
|
|
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_abe782e4298e7add8ce0a1c33e66cfcdb"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#abe782e4298e7add8ce0a1c33e66cfcdb">shaka::media::Nalu::payload_size</a></div><div class="ttdeci">uint64_t payload_size() const</div><div class="ttdoc">Size of this Nalu minus header_size(). </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00102">nalu_reader.h:102</a></div></div>
|
|
</div><!-- fragment --></div><!-- contents -->
|
|
<!-- start footer part -->
|
|
<hr class="footer"/><address class="footer"><small>
|
|
Generated on Sat Feb 10 2018 15:36:43 for Shaka Packager SDK by  <a href="http://www.doxygen.org/index.html">
|
|
<img class="footer" src="../../doxygen.png" alt="doxygen"/>
|
|
</a> 1.8.13
|
|
</small></address>
|
|
</body>
|
|
</html>
|