shaka-packager/docs/d3/d9c/encryption__handler_8cc_sou...

107 lines
101 KiB
HTML

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.13"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Shaka Packager SDK: packager/media/crypto/encryption_handler.cc Source File</title>
<link href="../../tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="../../jquery.js"></script>
<script type="text/javascript" src="../../dynsections.js"></script>
<link href="../../search/search.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="../../search/searchdata.js"></script>
<script type="text/javascript" src="../../search/search.js"></script>
<link href="../../doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 56px;">
<td id="projectalign" style="padding-left: 0.5em;">
<div id="projectname">Shaka Packager SDK
</div>
</td>
</tr>
</tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.13 -->
<script type="text/javascript">
var searchBox = new SearchBox("searchBox", "../../search",false,'Search');
</script>
<script type="text/javascript" src="../../menudata.js"></script>
<script type="text/javascript" src="../../menu.js"></script>
<script type="text/javascript">
$(function() {
initMenu('../../',true,false,'search.php','Search');
$(document).ready(function() { init_search(); });
});
</script>
<div id="main-nav"></div>
<!-- window showing the filter options -->
<div id="MSearchSelectWindow"
onmouseover="return searchBox.OnSearchSelectShow()"
onmouseout="return searchBox.OnSearchSelectHide()"
onkeydown="return searchBox.OnSearchSelectKey(event)">
</div>
<!-- iframe showing the search results (closed by default) -->
<div id="MSearchResultsWindow">
<iframe src="javascript:void(0)" frameborder="0"
name="MSearchResults" id="MSearchResults">
</iframe>
</div>
<div id="nav-path" class="navpath">
<ul>
<li class="navelem"><a class="el" href="../../dir_3f8eec2fc361645de4b1ec14c19fffc7.html">packager</a></li><li class="navelem"><a class="el" href="../../dir_f99dae54fe7170f791f339b952d5067a.html">media</a></li><li class="navelem"><a class="el" href="../../dir_aa847bee70cdde822696c7e33a504139.html">crypto</a></li> </ul>
</div>
</div><!-- top -->
<div class="header">
<div class="headertitle">
<div class="title">encryption_handler.cc</div> </div>
</div><!--header-->
<div class="contents">
<div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span>&#160;<span class="comment">// Copyright 2017 Google Inc. All rights reserved.</span></div><div class="line"><a name="l00002"></a><span class="lineno"> 2</span>&#160;<span class="comment">//</span></div><div class="line"><a name="l00003"></a><span class="lineno"> 3</span>&#160;<span class="comment">// Use of this source code is governed by a BSD-style</span></div><div class="line"><a name="l00004"></a><span class="lineno"> 4</span>&#160;<span class="comment">// license that can be found in the LICENSE file or at</span></div><div class="line"><a name="l00005"></a><span class="lineno"> 5</span>&#160;<span class="comment">// https://developers.google.com/open-source/licenses/bsd</span></div><div class="line"><a name="l00006"></a><span class="lineno"> 6</span>&#160;</div><div class="line"><a name="l00007"></a><span class="lineno"> 7</span>&#160;<span class="preprocessor">#include &quot;packager/media/crypto/encryption_handler.h&quot;</span></div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span>&#160;</div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span>&#160;<span class="preprocessor">#include &lt;stddef.h&gt;</span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span>&#160;<span class="preprocessor">#include &lt;stdint.h&gt;</span></div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span>&#160;</div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span>&#160;<span class="preprocessor">#include &lt;algorithm&gt;</span></div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span>&#160;<span class="preprocessor">#include &lt;limits&gt;</span></div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span>&#160;</div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/aes_encryptor.h&quot;</span></div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/aes_pattern_cryptor.h&quot;</span></div><div class="line"><a name="l00017"></a><span class="lineno"> 17</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/audio_stream_info.h&quot;</span></div><div class="line"><a name="l00018"></a><span class="lineno"> 18</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/key_source.h&quot;</span></div><div class="line"><a name="l00019"></a><span class="lineno"> 19</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/media_sample.h&quot;</span></div><div class="line"><a name="l00020"></a><span class="lineno"> 20</span>&#160;<span class="preprocessor">#include &quot;packager/media/base/video_stream_info.h&quot;</span></div><div class="line"><a name="l00021"></a><span class="lineno"> 21</span>&#160;<span class="preprocessor">#include &quot;packager/media/codecs/video_slice_header_parser.h&quot;</span></div><div class="line"><a name="l00022"></a><span class="lineno"> 22</span>&#160;<span class="preprocessor">#include &quot;packager/media/codecs/vp8_parser.h&quot;</span></div><div class="line"><a name="l00023"></a><span class="lineno"> 23</span>&#160;<span class="preprocessor">#include &quot;packager/media/codecs/vp9_parser.h&quot;</span></div><div class="line"><a name="l00024"></a><span class="lineno"> 24</span>&#160;<span class="preprocessor">#include &quot;packager/media/crypto/sample_aes_ec3_cryptor.h&quot;</span></div><div class="line"><a name="l00025"></a><span class="lineno"> 25</span>&#160;</div><div class="line"><a name="l00026"></a><span class="lineno"> 26</span>&#160;<span class="keyword">namespace </span><a class="code" href="../../d8/daf/namespaceshaka.html">shaka</a> {</div><div class="line"><a name="l00027"></a><span class="lineno"> 27</span>&#160;<span class="keyword">namespace </span>media {</div><div class="line"><a name="l00028"></a><span class="lineno"> 28</span>&#160;</div><div class="line"><a name="l00029"></a><span class="lineno"> 29</span>&#160;<span class="keyword">namespace </span>{</div><div class="line"><a name="l00030"></a><span class="lineno"> 30</span>&#160;<span class="keyword">const</span> <span class="keywordtype">size_t</span> kCencBlockSize = 16u;</div><div class="line"><a name="l00031"></a><span class="lineno"> 31</span>&#160;</div><div class="line"><a name="l00032"></a><span class="lineno"> 32</span>&#160;<span class="comment">// The encryption handler only supports a single output.</span></div><div class="line"><a name="l00033"></a><span class="lineno"> 33</span>&#160;<span class="keyword">const</span> <span class="keywordtype">size_t</span> kStreamIndex = 0;</div><div class="line"><a name="l00034"></a><span class="lineno"> 34</span>&#160;</div><div class="line"><a name="l00035"></a><span class="lineno"> 35</span>&#160;<span class="comment">// The default KID for key rotation is all 0s.</span></div><div class="line"><a name="l00036"></a><span class="lineno"> 36</span>&#160;<span class="keyword">const</span> uint8_t kKeyRotationDefaultKeyId[] = {</div><div class="line"><a name="l00037"></a><span class="lineno"> 37</span>&#160; 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,</div><div class="line"><a name="l00038"></a><span class="lineno"> 38</span>&#160;};</div><div class="line"><a name="l00039"></a><span class="lineno"> 39</span>&#160;</div><div class="line"><a name="l00040"></a><span class="lineno"> 40</span>&#160;<span class="comment">// Adds one or more subsamples to |*decrypt_config|. This may add more than one</span></div><div class="line"><a name="l00041"></a><span class="lineno"> 41</span>&#160;<span class="comment">// if one of the values overflows the integer in the subsample.</span></div><div class="line"><a name="l00042"></a><span class="lineno"> 42</span>&#160;<span class="keywordtype">void</span> AddSubsample(uint64_t clear_bytes,</div><div class="line"><a name="l00043"></a><span class="lineno"> 43</span>&#160; uint64_t cipher_bytes,</div><div class="line"><a name="l00044"></a><span class="lineno"> 44</span>&#160; DecryptConfig* decrypt_config) {</div><div class="line"><a name="l00045"></a><span class="lineno"> 45</span>&#160; CHECK_LT(cipher_bytes, std::numeric_limits&lt;uint32_t&gt;::max());</div><div class="line"><a name="l00046"></a><span class="lineno"> 46</span>&#160; <span class="keyword">const</span> uint64_t kUInt16Max = std::numeric_limits&lt;uint16_t&gt;::max();</div><div class="line"><a name="l00047"></a><span class="lineno"> 47</span>&#160; <span class="keywordflow">while</span> (clear_bytes &gt; kUInt16Max) {</div><div class="line"><a name="l00048"></a><span class="lineno"> 48</span>&#160; decrypt_config-&gt;AddSubsample(kUInt16Max, 0);</div><div class="line"><a name="l00049"></a><span class="lineno"> 49</span>&#160; clear_bytes -= kUInt16Max;</div><div class="line"><a name="l00050"></a><span class="lineno"> 50</span>&#160; }</div><div class="line"><a name="l00051"></a><span class="lineno"> 51</span>&#160;</div><div class="line"><a name="l00052"></a><span class="lineno"> 52</span>&#160; <span class="keywordflow">if</span> (clear_bytes &gt; 0 || cipher_bytes &gt; 0)</div><div class="line"><a name="l00053"></a><span class="lineno"> 53</span>&#160; decrypt_config-&gt;AddSubsample(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00054"></a><span class="lineno"> 54</span>&#160;}</div><div class="line"><a name="l00055"></a><span class="lineno"> 55</span>&#160;</div><div class="line"><a name="l00056"></a><span class="lineno"> 56</span>&#160;uint8_t GetNaluLengthSize(<span class="keyword">const</span> StreamInfo&amp; stream_info) {</div><div class="line"><a name="l00057"></a><span class="lineno"> 57</span>&#160; <span class="keywordflow">if</span> (stream_info.stream_type() != kStreamVideo)</div><div class="line"><a name="l00058"></a><span class="lineno"> 58</span>&#160; <span class="keywordflow">return</span> 0;</div><div class="line"><a name="l00059"></a><span class="lineno"> 59</span>&#160;</div><div class="line"><a name="l00060"></a><span class="lineno"> 60</span>&#160; <span class="keyword">const</span> VideoStreamInfo&amp; video_stream_info =</div><div class="line"><a name="l00061"></a><span class="lineno"> 61</span>&#160; <span class="keyword">static_cast&lt;</span><span class="keyword">const </span>VideoStreamInfo&amp;<span class="keyword">&gt;</span>(stream_info);</div><div class="line"><a name="l00062"></a><span class="lineno"> 62</span>&#160; <span class="keywordflow">return</span> video_stream_info.nalu_length_size();</div><div class="line"><a name="l00063"></a><span class="lineno"> 63</span>&#160;}</div><div class="line"><a name="l00064"></a><span class="lineno"> 64</span>&#160;</div><div class="line"><a name="l00065"></a><span class="lineno"> 65</span>&#160;std::string GetStreamLabelForEncryption(</div><div class="line"><a name="l00066"></a><span class="lineno"> 66</span>&#160; <span class="keyword">const</span> StreamInfo&amp; stream_info,</div><div class="line"><a name="l00067"></a><span class="lineno"> 67</span>&#160; <span class="keyword">const</span> std::function&lt;std::string(</div><div class="line"><a name="l00068"></a><span class="lineno"> 68</span>&#160; <span class="keyword">const</span> EncryptionParams::EncryptedStreamAttributes&amp; stream_attributes)&gt;&amp;</div><div class="line"><a name="l00069"></a><span class="lineno"> 69</span>&#160; stream_label_func) {</div><div class="line"><a name="l00070"></a><span class="lineno"> 70</span>&#160; EncryptionParams::EncryptedStreamAttributes stream_attributes;</div><div class="line"><a name="l00071"></a><span class="lineno"> 71</span>&#160; <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamAudio) {</div><div class="line"><a name="l00072"></a><span class="lineno"> 72</span>&#160; stream_attributes.stream_type =</div><div class="line"><a name="l00073"></a><span class="lineno"> 73</span>&#160; EncryptionParams::EncryptedStreamAttributes::kAudio;</div><div class="line"><a name="l00074"></a><span class="lineno"> 74</span>&#160; } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (stream_info.stream_type() == kStreamVideo) {</div><div class="line"><a name="l00075"></a><span class="lineno"> 75</span>&#160; <span class="keyword">const</span> VideoStreamInfo&amp; video_stream_info =</div><div class="line"><a name="l00076"></a><span class="lineno"> 76</span>&#160; <span class="keyword">static_cast&lt;</span><span class="keyword">const </span>VideoStreamInfo&amp;<span class="keyword">&gt;</span>(stream_info);</div><div class="line"><a name="l00077"></a><span class="lineno"> 77</span>&#160; stream_attributes.stream_type =</div><div class="line"><a name="l00078"></a><span class="lineno"> 78</span>&#160; EncryptionParams::EncryptedStreamAttributes::kVideo;</div><div class="line"><a name="l00079"></a><span class="lineno"> 79</span>&#160; stream_attributes.oneof.video.width = video_stream_info.width();</div><div class="line"><a name="l00080"></a><span class="lineno"> 80</span>&#160; stream_attributes.oneof.video.height = video_stream_info.height();</div><div class="line"><a name="l00081"></a><span class="lineno"> 81</span>&#160; }</div><div class="line"><a name="l00082"></a><span class="lineno"> 82</span>&#160; <span class="keywordflow">return</span> stream_label_func(stream_attributes);</div><div class="line"><a name="l00083"></a><span class="lineno"> 83</span>&#160;}</div><div class="line"><a name="l00084"></a><span class="lineno"> 84</span>&#160;} <span class="comment">// namespace</span></div><div class="line"><a name="l00085"></a><span class="lineno"> 85</span>&#160;</div><div class="line"><a name="l00086"></a><span class="lineno"> 86</span>&#160;EncryptionHandler::EncryptionHandler(<span class="keyword">const</span> EncryptionParams&amp; encryption_params,</div><div class="line"><a name="l00087"></a><span class="lineno"> 87</span>&#160; KeySource* key_source)</div><div class="line"><a name="l00088"></a><span class="lineno"> 88</span>&#160; : encryption_params_(encryption_params),</div><div class="line"><a name="l00089"></a><span class="lineno"> 89</span>&#160; protection_scheme_(</div><div class="line"><a name="l00090"></a><span class="lineno"> 90</span>&#160; static_cast&lt;FourCC&gt;(encryption_params.protection_scheme)),</div><div class="line"><a name="l00091"></a><span class="lineno"> 91</span>&#160; key_source_(key_source) {}</div><div class="line"><a name="l00092"></a><span class="lineno"> 92</span>&#160;</div><div class="line"><a name="l00093"></a><span class="lineno"> 93</span>&#160;EncryptionHandler::~EncryptionHandler() {}</div><div class="line"><a name="l00094"></a><span class="lineno"> 94</span>&#160;</div><div class="line"><a name="l00095"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0"> 95</a></span>&#160;<a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">EncryptionHandler::InitializeInternal</a>() {</div><div class="line"><a name="l00096"></a><span class="lineno"> 96</span>&#160; <span class="keywordflow">if</span> (!encryption_params_.stream_label_func) {</div><div class="line"><a name="l00097"></a><span class="lineno"> 97</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT, <span class="stringliteral">&quot;Stream label function not set.&quot;</span>);</div><div class="line"><a name="l00098"></a><span class="lineno"> 98</span>&#160; }</div><div class="line"><a name="l00099"></a><span class="lineno"> 99</span>&#160; <span class="keywordflow">if</span> (num_input_streams() != 1 || next_output_stream_index() != 1) {</div><div class="line"><a name="l00100"></a><span class="lineno"> 100</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT,</div><div class="line"><a name="l00101"></a><span class="lineno"> 101</span>&#160; <span class="stringliteral">&quot;Expects exactly one input and output.&quot;</span>);</div><div class="line"><a name="l00102"></a><span class="lineno"> 102</span>&#160; }</div><div class="line"><a name="l00103"></a><span class="lineno"> 103</span>&#160; <span class="keywordflow">return</span> Status::OK;</div><div class="line"><a name="l00104"></a><span class="lineno"> 104</span>&#160;}</div><div class="line"><a name="l00105"></a><span class="lineno"> 105</span>&#160;</div><div class="line"><a name="l00106"></a><span class="lineno"><a class="line" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4"> 106</a></span>&#160;<a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> <a class="code" href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">EncryptionHandler::Process</a>(std::unique_ptr&lt;StreamData&gt; stream_data) {</div><div class="line"><a name="l00107"></a><span class="lineno"> 107</span>&#160; <span class="keywordflow">switch</span> (stream_data-&gt;stream_data_type) {</div><div class="line"><a name="l00108"></a><span class="lineno"> 108</span>&#160; <span class="keywordflow">case</span> StreamDataType::kStreamInfo:</div><div class="line"><a name="l00109"></a><span class="lineno"> 109</span>&#160; <span class="keywordflow">return</span> ProcessStreamInfo(*stream_data-&gt;stream_info);</div><div class="line"><a name="l00110"></a><span class="lineno"> 110</span>&#160; <span class="keywordflow">case</span> StreamDataType::kSegmentInfo: {</div><div class="line"><a name="l00111"></a><span class="lineno"> 111</span>&#160; std::shared_ptr&lt;SegmentInfo&gt; segment_info(<span class="keyword">new</span> <a class="code" href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">SegmentInfo</a>(</div><div class="line"><a name="l00112"></a><span class="lineno"> 112</span>&#160; *stream_data-&gt;segment_info));</div><div class="line"><a name="l00113"></a><span class="lineno"> 113</span>&#160;</div><div class="line"><a name="l00114"></a><span class="lineno"> 114</span>&#160; segment_info-&gt;is_encrypted = remaining_clear_lead_ &lt;= 0;</div><div class="line"><a name="l00115"></a><span class="lineno"> 115</span>&#160;</div><div class="line"><a name="l00116"></a><span class="lineno"> 116</span>&#160; <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div><div class="line"><a name="l00117"></a><span class="lineno"> 117</span>&#160; <span class="keywordflow">if</span> (key_rotation_enabled)</div><div class="line"><a name="l00118"></a><span class="lineno"> 118</span>&#160; segment_info-&gt;key_rotation_encryption_config = encryption_config_;</div><div class="line"><a name="l00119"></a><span class="lineno"> 119</span>&#160; <span class="keywordflow">if</span> (!segment_info-&gt;is_subsegment) {</div><div class="line"><a name="l00120"></a><span class="lineno"> 120</span>&#160; <span class="keywordflow">if</span> (key_rotation_enabled)</div><div class="line"><a name="l00121"></a><span class="lineno"> 121</span>&#160; check_new_crypto_period_ = <span class="keyword">true</span>;</div><div class="line"><a name="l00122"></a><span class="lineno"> 122</span>&#160; <span class="keywordflow">if</span> (remaining_clear_lead_ &gt; 0)</div><div class="line"><a name="l00123"></a><span class="lineno"> 123</span>&#160; remaining_clear_lead_ -= segment_info-&gt;duration;</div><div class="line"><a name="l00124"></a><span class="lineno"> 124</span>&#160; }</div><div class="line"><a name="l00125"></a><span class="lineno"> 125</span>&#160;</div><div class="line"><a name="l00126"></a><span class="lineno"> 126</span>&#160; <span class="keywordflow">return</span> DispatchSegmentInfo(kStreamIndex, segment_info);</div><div class="line"><a name="l00127"></a><span class="lineno"> 127</span>&#160; }</div><div class="line"><a name="l00128"></a><span class="lineno"> 128</span>&#160; <span class="keywordflow">case</span> StreamDataType::kMediaSample:</div><div class="line"><a name="l00129"></a><span class="lineno"> 129</span>&#160; <span class="keywordflow">return</span> ProcessMediaSample(std::move(stream_data-&gt;media_sample));</div><div class="line"><a name="l00130"></a><span class="lineno"> 130</span>&#160; <span class="keywordflow">default</span>:</div><div class="line"><a name="l00131"></a><span class="lineno"> 131</span>&#160; VLOG(3) &lt;&lt; <span class="stringliteral">&quot;Stream data type &quot;</span></div><div class="line"><a name="l00132"></a><span class="lineno"> 132</span>&#160; &lt;&lt; <span class="keyword">static_cast&lt;</span><span class="keywordtype">int</span><span class="keyword">&gt;</span>(stream_data-&gt;stream_data_type) &lt;&lt; <span class="stringliteral">&quot; ignored.&quot;</span>;</div><div class="line"><a name="l00133"></a><span class="lineno"> 133</span>&#160; <span class="keywordflow">return</span> Dispatch(std::move(stream_data));</div><div class="line"><a name="l00134"></a><span class="lineno"> 134</span>&#160; }</div><div class="line"><a name="l00135"></a><span class="lineno"> 135</span>&#160;}</div><div class="line"><a name="l00136"></a><span class="lineno"> 136</span>&#160;</div><div class="line"><a name="l00137"></a><span class="lineno"> 137</span>&#160;<a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::ProcessStreamInfo(<span class="keyword">const</span> <a class="code" href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">StreamInfo</a>&amp; clear_info) {</div><div class="line"><a name="l00138"></a><span class="lineno"> 138</span>&#160; <span class="keywordflow">if</span> (clear_info.is_encrypted()) {</div><div class="line"><a name="l00139"></a><span class="lineno"> 139</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::INVALID_ARGUMENT,</div><div class="line"><a name="l00140"></a><span class="lineno"> 140</span>&#160; <span class="stringliteral">&quot;Input stream is already encrypted.&quot;</span>);</div><div class="line"><a name="l00141"></a><span class="lineno"> 141</span>&#160; }</div><div class="line"><a name="l00142"></a><span class="lineno"> 142</span>&#160;</div><div class="line"><a name="l00143"></a><span class="lineno"> 143</span>&#160; DCHECK_NE(kStreamUnknown, clear_info.stream_type());</div><div class="line"><a name="l00144"></a><span class="lineno"> 144</span>&#160; DCHECK_NE(kStreamText, clear_info.stream_type());</div><div class="line"><a name="l00145"></a><span class="lineno"> 145</span>&#160; std::shared_ptr&lt;StreamInfo&gt; stream_info = clear_info.<a class="code" href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html#afdd9b2df8ae1c11bb033c44eaba5e38d">Clone</a>();</div><div class="line"><a name="l00146"></a><span class="lineno"> 146</span>&#160;</div><div class="line"><a name="l00147"></a><span class="lineno"> 147</span>&#160; remaining_clear_lead_ =</div><div class="line"><a name="l00148"></a><span class="lineno"> 148</span>&#160; encryption_params_.clear_lead_in_seconds * stream_info-&gt;time_scale();</div><div class="line"><a name="l00149"></a><span class="lineno"> 149</span>&#160; crypto_period_duration_ =</div><div class="line"><a name="l00150"></a><span class="lineno"> 150</span>&#160; encryption_params_.crypto_period_duration_in_seconds *</div><div class="line"><a name="l00151"></a><span class="lineno"> 151</span>&#160; stream_info-&gt;time_scale();</div><div class="line"><a name="l00152"></a><span class="lineno"> 152</span>&#160; codec_ = stream_info-&gt;codec();</div><div class="line"><a name="l00153"></a><span class="lineno"> 153</span>&#160; nalu_length_size_ = GetNaluLengthSize(*stream_info);</div><div class="line"><a name="l00154"></a><span class="lineno"> 154</span>&#160; stream_label_ = GetStreamLabelForEncryption(</div><div class="line"><a name="l00155"></a><span class="lineno"> 155</span>&#160; *stream_info, encryption_params_.stream_label_func);</div><div class="line"><a name="l00156"></a><span class="lineno"> 156</span>&#160; <span class="keywordflow">switch</span> (codec_) {</div><div class="line"><a name="l00157"></a><span class="lineno"> 157</span>&#160; <span class="keywordflow">case</span> kCodecVP9:</div><div class="line"><a name="l00158"></a><span class="lineno"> 158</span>&#160; <span class="keywordflow">if</span> (encryption_params_.vp9_subsample_encryption)</div><div class="line"><a name="l00159"></a><span class="lineno"> 159</span>&#160; vpx_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../db/d5a/classshaka_1_1media_1_1VP9Parser.html">VP9Parser</a>);</div><div class="line"><a name="l00160"></a><span class="lineno"> 160</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00161"></a><span class="lineno"> 161</span>&#160; <span class="keywordflow">case</span> kCodecH264:</div><div class="line"><a name="l00162"></a><span class="lineno"> 162</span>&#160; header_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../da/df0/classshaka_1_1media_1_1H264VideoSliceHeaderParser.html">H264VideoSliceHeaderParser</a>);</div><div class="line"><a name="l00163"></a><span class="lineno"> 163</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00164"></a><span class="lineno"> 164</span>&#160; <span class="keywordflow">case</span> kCodecH265:</div><div class="line"><a name="l00165"></a><span class="lineno"> 165</span>&#160; header_parser_.reset(<span class="keyword">new</span> <a class="code" href="../../d1/d79/classshaka_1_1media_1_1H265VideoSliceHeaderParser.html">H265VideoSliceHeaderParser</a>);</div><div class="line"><a name="l00166"></a><span class="lineno"> 166</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00167"></a><span class="lineno"> 167</span>&#160; <span class="keywordflow">default</span>:</div><div class="line"><a name="l00168"></a><span class="lineno"> 168</span>&#160; <span class="comment">// Other codecs should have nalu length size == 0.</span></div><div class="line"><a name="l00169"></a><span class="lineno"> 169</span>&#160; <span class="keywordflow">if</span> (nalu_length_size_ &gt; 0) {</div><div class="line"><a name="l00170"></a><span class="lineno"> 170</span>&#160; LOG(WARNING) &lt;&lt; <span class="stringliteral">&quot;Unknown video codec &#39;&quot;</span> &lt;&lt; codec_ &lt;&lt; <span class="stringliteral">&quot;&#39;&quot;</span>;</div><div class="line"><a name="l00171"></a><span class="lineno"> 171</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Unknown video codec.&quot;</span>);</div><div class="line"><a name="l00172"></a><span class="lineno"> 172</span>&#160; }</div><div class="line"><a name="l00173"></a><span class="lineno"> 173</span>&#160; }</div><div class="line"><a name="l00174"></a><span class="lineno"> 174</span>&#160; <span class="keywordflow">if</span> (header_parser_) {</div><div class="line"><a name="l00175"></a><span class="lineno"> 175</span>&#160; CHECK_NE(nalu_length_size_, 0u) &lt;&lt; <span class="stringliteral">&quot;AnnexB stream is not supported yet&quot;</span>;</div><div class="line"><a name="l00176"></a><span class="lineno"> 176</span>&#160; <span class="keywordflow">if</span> (!header_parser_-&gt;Initialize(stream_info-&gt;codec_config())) {</div><div class="line"><a name="l00177"></a><span class="lineno"> 177</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE,</div><div class="line"><a name="l00178"></a><span class="lineno"> 178</span>&#160; <span class="stringliteral">&quot;Fail to read SPS and PPS data.&quot;</span>);</div><div class="line"><a name="l00179"></a><span class="lineno"> 179</span>&#160; }</div><div class="line"><a name="l00180"></a><span class="lineno"> 180</span>&#160; }</div><div class="line"><a name="l00181"></a><span class="lineno"> 181</span>&#160;</div><div class="line"><a name="l00182"></a><span class="lineno"> 182</span>&#160; <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> status = SetupProtectionPattern(stream_info-&gt;stream_type());</div><div class="line"><a name="l00183"></a><span class="lineno"> 183</span>&#160; <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00184"></a><span class="lineno"> 184</span>&#160; <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00185"></a><span class="lineno"> 185</span>&#160;</div><div class="line"><a name="l00186"></a><span class="lineno"> 186</span>&#160; <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a> encryption_key;</div><div class="line"><a name="l00187"></a><span class="lineno"> 187</span>&#160; <span class="keyword">const</span> <span class="keywordtype">bool</span> key_rotation_enabled = crypto_period_duration_ != 0;</div><div class="line"><a name="l00188"></a><span class="lineno"> 188</span>&#160; <span class="keywordflow">if</span> (key_rotation_enabled) {</div><div class="line"><a name="l00189"></a><span class="lineno"> 189</span>&#160; check_new_crypto_period_ = <span class="keyword">true</span>;</div><div class="line"><a name="l00190"></a><span class="lineno"> 190</span>&#160; <span class="comment">// Setup dummy key id and key to signal encryption for key rotation.</span></div><div class="line"><a name="l00191"></a><span class="lineno"> 191</span>&#160; encryption_key.key_id.assign(</div><div class="line"><a name="l00192"></a><span class="lineno"> 192</span>&#160; kKeyRotationDefaultKeyId,</div><div class="line"><a name="l00193"></a><span class="lineno"> 193</span>&#160; kKeyRotationDefaultKeyId + <span class="keyword">sizeof</span>(kKeyRotationDefaultKeyId));</div><div class="line"><a name="l00194"></a><span class="lineno"> 194</span>&#160; <span class="comment">// The key is not really used to encrypt any data. It is there just for</span></div><div class="line"><a name="l00195"></a><span class="lineno"> 195</span>&#160; <span class="comment">// convenience.</span></div><div class="line"><a name="l00196"></a><span class="lineno"> 196</span>&#160; encryption_key.key = encryption_key.key_id;</div><div class="line"><a name="l00197"></a><span class="lineno"> 197</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00198"></a><span class="lineno"> 198</span>&#160; status = key_source_-&gt;GetKey(stream_label_, &amp;encryption_key);</div><div class="line"><a name="l00199"></a><span class="lineno"> 199</span>&#160; <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00200"></a><span class="lineno"> 200</span>&#160; <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00201"></a><span class="lineno"> 201</span>&#160; }</div><div class="line"><a name="l00202"></a><span class="lineno"> 202</span>&#160; <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div><div class="line"><a name="l00203"></a><span class="lineno"> 203</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Failed to create encryptor&quot;</span>);</div><div class="line"><a name="l00204"></a><span class="lineno"> 204</span>&#160;</div><div class="line"><a name="l00205"></a><span class="lineno"> 205</span>&#160; stream_info-&gt;set_is_encrypted(<span class="keyword">true</span>);</div><div class="line"><a name="l00206"></a><span class="lineno"> 206</span>&#160; stream_info-&gt;set_has_clear_lead(encryption_params_.clear_lead_in_seconds &gt; 0);</div><div class="line"><a name="l00207"></a><span class="lineno"> 207</span>&#160; stream_info-&gt;set_encryption_config(*encryption_config_);</div><div class="line"><a name="l00208"></a><span class="lineno"> 208</span>&#160;</div><div class="line"><a name="l00209"></a><span class="lineno"> 209</span>&#160; <span class="keywordflow">return</span> DispatchStreamInfo(kStreamIndex, stream_info);</div><div class="line"><a name="l00210"></a><span class="lineno"> 210</span>&#160;}</div><div class="line"><a name="l00211"></a><span class="lineno"> 211</span>&#160;</div><div class="line"><a name="l00212"></a><span class="lineno"> 212</span>&#160;<a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::ProcessMediaSample(</div><div class="line"><a name="l00213"></a><span class="lineno"> 213</span>&#160; std::shared_ptr&lt;const MediaSample&gt; clear_sample) {</div><div class="line"><a name="l00214"></a><span class="lineno"> 214</span>&#160; DCHECK(clear_sample);</div><div class="line"><a name="l00215"></a><span class="lineno"> 215</span>&#160;</div><div class="line"><a name="l00216"></a><span class="lineno"> 216</span>&#160; <span class="comment">// We need to parse the frame (which also updates the vpx parser) even if the</span></div><div class="line"><a name="l00217"></a><span class="lineno"> 217</span>&#160; <span class="comment">// frame is not encrypted as the next (encrypted) frame may be dependent on</span></div><div class="line"><a name="l00218"></a><span class="lineno"> 218</span>&#160; <span class="comment">// this clear frame.</span></div><div class="line"><a name="l00219"></a><span class="lineno"> 219</span>&#160; std::vector&lt;VPxFrameInfo&gt; vpx_frames;</div><div class="line"><a name="l00220"></a><span class="lineno"> 220</span>&#160; <span class="keywordflow">if</span> (vpx_parser_ &amp;&amp; !vpx_parser_-&gt;Parse(clear_sample-&gt;data(),</div><div class="line"><a name="l00221"></a><span class="lineno"> 221</span>&#160; clear_sample-&gt;data_size(),</div><div class="line"><a name="l00222"></a><span class="lineno"> 222</span>&#160; &amp;vpx_frames)) {</div><div class="line"><a name="l00223"></a><span class="lineno"> 223</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Failed to parse vpx frame.&quot;</span>);</div><div class="line"><a name="l00224"></a><span class="lineno"> 224</span>&#160; }</div><div class="line"><a name="l00225"></a><span class="lineno"> 225</span>&#160;</div><div class="line"><a name="l00226"></a><span class="lineno"> 226</span>&#160; <span class="comment">// Need to setup the encryptor for new segments even if this segment does not</span></div><div class="line"><a name="l00227"></a><span class="lineno"> 227</span>&#160; <span class="comment">// need to be encrypted, so we can signal encryption metadata earlier to</span></div><div class="line"><a name="l00228"></a><span class="lineno"> 228</span>&#160; <span class="comment">// allows clients to prefetch the keys.</span></div><div class="line"><a name="l00229"></a><span class="lineno"> 229</span>&#160; <span class="keywordflow">if</span> (check_new_crypto_period_) {</div><div class="line"><a name="l00230"></a><span class="lineno"> 230</span>&#160; <span class="keyword">const</span> int64_t current_crypto_period_index =</div><div class="line"><a name="l00231"></a><span class="lineno"> 231</span>&#160; clear_sample-&gt;dts() / crypto_period_duration_;</div><div class="line"><a name="l00232"></a><span class="lineno"> 232</span>&#160; <span class="keywordflow">if</span> (current_crypto_period_index != prev_crypto_period_index_) {</div><div class="line"><a name="l00233"></a><span class="lineno"> 233</span>&#160; <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a> encryption_key;</div><div class="line"><a name="l00234"></a><span class="lineno"> 234</span>&#160; <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> status = key_source_-&gt;GetCryptoPeriodKey(</div><div class="line"><a name="l00235"></a><span class="lineno"> 235</span>&#160; current_crypto_period_index, stream_label_, &amp;encryption_key);</div><div class="line"><a name="l00236"></a><span class="lineno"> 236</span>&#160; <span class="keywordflow">if</span> (!status.ok())</div><div class="line"><a name="l00237"></a><span class="lineno"> 237</span>&#160; <span class="keywordflow">return</span> status;</div><div class="line"><a name="l00238"></a><span class="lineno"> 238</span>&#160; <span class="keywordflow">if</span> (!CreateEncryptor(encryption_key))</div><div class="line"><a name="l00239"></a><span class="lineno"> 239</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Failed to create encryptor&quot;</span>);</div><div class="line"><a name="l00240"></a><span class="lineno"> 240</span>&#160; prev_crypto_period_index_ = current_crypto_period_index;</div><div class="line"><a name="l00241"></a><span class="lineno"> 241</span>&#160; }</div><div class="line"><a name="l00242"></a><span class="lineno"> 242</span>&#160; check_new_crypto_period_ = <span class="keyword">false</span>;</div><div class="line"><a name="l00243"></a><span class="lineno"> 243</span>&#160; }</div><div class="line"><a name="l00244"></a><span class="lineno"> 244</span>&#160;</div><div class="line"><a name="l00245"></a><span class="lineno"> 245</span>&#160; <span class="comment">// Since there is no encryption needed right now, send the clear copy</span></div><div class="line"><a name="l00246"></a><span class="lineno"> 246</span>&#160; <span class="comment">// downstream so we can save the costs of copying it.</span></div><div class="line"><a name="l00247"></a><span class="lineno"> 247</span>&#160; <span class="keywordflow">if</span> (remaining_clear_lead_ &gt; 0) {</div><div class="line"><a name="l00248"></a><span class="lineno"> 248</span>&#160; <span class="keywordflow">return</span> DispatchMediaSample(kStreamIndex, std::move(clear_sample));</div><div class="line"><a name="l00249"></a><span class="lineno"> 249</span>&#160; }</div><div class="line"><a name="l00250"></a><span class="lineno"> 250</span>&#160;</div><div class="line"><a name="l00251"></a><span class="lineno"> 251</span>&#160; std::unique_ptr&lt;DecryptConfig&gt; decrypt_config(<span class="keyword">new</span> <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>(</div><div class="line"><a name="l00252"></a><span class="lineno"> 252</span>&#160; encryption_config_-&gt;key_id,</div><div class="line"><a name="l00253"></a><span class="lineno"> 253</span>&#160; encryptor_-&gt;iv(),</div><div class="line"><a name="l00254"></a><span class="lineno"> 254</span>&#160; std::vector&lt;SubsampleEntry&gt;(),</div><div class="line"><a name="l00255"></a><span class="lineno"> 255</span>&#160; protection_scheme_,</div><div class="line"><a name="l00256"></a><span class="lineno"> 256</span>&#160; crypt_byte_block_,</div><div class="line"><a name="l00257"></a><span class="lineno"> 257</span>&#160; skip_byte_block_));</div><div class="line"><a name="l00258"></a><span class="lineno"> 258</span>&#160;</div><div class="line"><a name="l00259"></a><span class="lineno"> 259</span>&#160; <span class="comment">// Now that we know that this sample must be encrypted, make a copy of</span></div><div class="line"><a name="l00260"></a><span class="lineno"> 260</span>&#160; <span class="comment">// the sample first so that all the encryption operations can be done</span></div><div class="line"><a name="l00261"></a><span class="lineno"> 261</span>&#160; <span class="comment">// in-place.</span></div><div class="line"><a name="l00262"></a><span class="lineno"> 262</span>&#160; std::shared_ptr&lt;MediaSample&gt; cipher_sample(clear_sample-&gt;Clone());</div><div class="line"><a name="l00263"></a><span class="lineno"> 263</span>&#160; <span class="comment">// |cipher_sample| above still contains the old clear sample data. We will</span></div><div class="line"><a name="l00264"></a><span class="lineno"> 264</span>&#160; <span class="comment">// use |cipher_sample_data| to hold cipher sample data then transfer it to</span></div><div class="line"><a name="l00265"></a><span class="lineno"> 265</span>&#160; <span class="comment">// |cipher_sample| after encryption.</span></div><div class="line"><a name="l00266"></a><span class="lineno"> 266</span>&#160; std::shared_ptr&lt;uint8_t&gt; cipher_sample_data(</div><div class="line"><a name="l00267"></a><span class="lineno"> 267</span>&#160; <span class="keyword">new</span> uint8_t[clear_sample-&gt;data_size()], std::default_delete&lt;uint8_t[]&gt;());</div><div class="line"><a name="l00268"></a><span class="lineno"> 268</span>&#160;</div><div class="line"><a name="l00269"></a><span class="lineno"> 269</span>&#160; <span class="keywordflow">if</span> (vpx_parser_) {</div><div class="line"><a name="l00270"></a><span class="lineno"> 270</span>&#160; <span class="keywordflow">if</span> (!EncryptVpxFrame(vpx_frames, clear_sample-&gt;data(),</div><div class="line"><a name="l00271"></a><span class="lineno"> 271</span>&#160; clear_sample-&gt;data_size(),</div><div class="line"><a name="l00272"></a><span class="lineno"> 272</span>&#160; &amp;cipher_sample_data.get()[0], decrypt_config.get())) {</div><div class="line"><a name="l00273"></a><span class="lineno"> 273</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Failed to encrypt VPX frame.&quot;</span>);</div><div class="line"><a name="l00274"></a><span class="lineno"> 274</span>&#160; }</div><div class="line"><a name="l00275"></a><span class="lineno"> 275</span>&#160; DCHECK_EQ(decrypt_config-&gt;GetTotalSizeOfSubsamples(),</div><div class="line"><a name="l00276"></a><span class="lineno"> 276</span>&#160; clear_sample-&gt;data_size());</div><div class="line"><a name="l00277"></a><span class="lineno"> 277</span>&#160; } <span class="keywordflow">else</span> <span class="keywordflow">if</span> (header_parser_) {</div><div class="line"><a name="l00278"></a><span class="lineno"> 278</span>&#160; <span class="keywordflow">if</span> (!EncryptNalFrame(clear_sample-&gt;data(), clear_sample-&gt;data_size(),</div><div class="line"><a name="l00279"></a><span class="lineno"> 279</span>&#160; &amp;cipher_sample_data.get()[0], decrypt_config.get())) {</div><div class="line"><a name="l00280"></a><span class="lineno"> 280</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(error::ENCRYPTION_FAILURE, <span class="stringliteral">&quot;Failed to encrypt NAL frame.&quot;</span>);</div><div class="line"><a name="l00281"></a><span class="lineno"> 281</span>&#160; }</div><div class="line"><a name="l00282"></a><span class="lineno"> 282</span>&#160; DCHECK_EQ(decrypt_config-&gt;GetTotalSizeOfSubsamples(),</div><div class="line"><a name="l00283"></a><span class="lineno"> 283</span>&#160; clear_sample-&gt;data_size());</div><div class="line"><a name="l00284"></a><span class="lineno"> 284</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00285"></a><span class="lineno"> 285</span>&#160; memcpy(&amp;cipher_sample_data.get()[0], clear_sample-&gt;data(),</div><div class="line"><a name="l00286"></a><span class="lineno"> 286</span>&#160; std::min(clear_sample-&gt;data_size(), leading_clear_bytes_size_));</div><div class="line"><a name="l00287"></a><span class="lineno"> 287</span>&#160; <span class="keywordflow">if</span> (clear_sample-&gt;data_size() &gt; leading_clear_bytes_size_) {</div><div class="line"><a name="l00288"></a><span class="lineno"> 288</span>&#160; <span class="comment">// The residual block is left unecrypted (copied without encryption). No</span></div><div class="line"><a name="l00289"></a><span class="lineno"> 289</span>&#160; <span class="comment">// need to do special handling here.</span></div><div class="line"><a name="l00290"></a><span class="lineno"> 290</span>&#160; EncryptBytes(clear_sample-&gt;data() + leading_clear_bytes_size_,</div><div class="line"><a name="l00291"></a><span class="lineno"> 291</span>&#160; clear_sample-&gt;data_size() - leading_clear_bytes_size_,</div><div class="line"><a name="l00292"></a><span class="lineno"> 292</span>&#160; &amp;cipher_sample_data.get()[leading_clear_bytes_size_]);</div><div class="line"><a name="l00293"></a><span class="lineno"> 293</span>&#160; }</div><div class="line"><a name="l00294"></a><span class="lineno"> 294</span>&#160; }</div><div class="line"><a name="l00295"></a><span class="lineno"> 295</span>&#160;</div><div class="line"><a name="l00296"></a><span class="lineno"> 296</span>&#160; cipher_sample-&gt;TransferData(std::move(cipher_sample_data),</div><div class="line"><a name="l00297"></a><span class="lineno"> 297</span>&#160; clear_sample-&gt;data_size());</div><div class="line"><a name="l00298"></a><span class="lineno"> 298</span>&#160; <span class="comment">// Finish initializing the sample before sending it downstream. We must</span></div><div class="line"><a name="l00299"></a><span class="lineno"> 299</span>&#160; <span class="comment">// wait until now to finish the initialization as we will lose access to</span></div><div class="line"><a name="l00300"></a><span class="lineno"> 300</span>&#160; <span class="comment">// |decrypt_config| once we set it.</span></div><div class="line"><a name="l00301"></a><span class="lineno"> 301</span>&#160; cipher_sample-&gt;set_is_encrypted(<span class="keyword">true</span>);</div><div class="line"><a name="l00302"></a><span class="lineno"> 302</span>&#160; cipher_sample-&gt;set_decrypt_config(std::move(decrypt_config));</div><div class="line"><a name="l00303"></a><span class="lineno"> 303</span>&#160;</div><div class="line"><a name="l00304"></a><span class="lineno"> 304</span>&#160; encryptor_-&gt;UpdateIv();</div><div class="line"><a name="l00305"></a><span class="lineno"> 305</span>&#160;</div><div class="line"><a name="l00306"></a><span class="lineno"> 306</span>&#160; <span class="keywordflow">return</span> DispatchMediaSample(kStreamIndex, std::move(cipher_sample));</div><div class="line"><a name="l00307"></a><span class="lineno"> 307</span>&#160;}</div><div class="line"><a name="l00308"></a><span class="lineno"> 308</span>&#160;</div><div class="line"><a name="l00309"></a><span class="lineno"> 309</span>&#160;<a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a> EncryptionHandler::SetupProtectionPattern(StreamType stream_type) {</div><div class="line"><a name="l00310"></a><span class="lineno"> 310</span>&#160; <span class="keywordflow">switch</span> (protection_scheme_) {</div><div class="line"><a name="l00311"></a><span class="lineno"> 311</span>&#160; <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme: {</div><div class="line"><a name="l00312"></a><span class="lineno"> 312</span>&#160; <span class="keyword">const</span> <span class="keywordtype">size_t</span> kH264LeadingClearBytesSize = 32u;</div><div class="line"><a name="l00313"></a><span class="lineno"> 313</span>&#160; <span class="keyword">const</span> <span class="keywordtype">size_t</span> kSmallNalUnitSize = 32u + 16u;</div><div class="line"><a name="l00314"></a><span class="lineno"> 314</span>&#160; <span class="keyword">const</span> <span class="keywordtype">size_t</span> kAudioLeadingClearBytesSize = 16u;</div><div class="line"><a name="l00315"></a><span class="lineno"> 315</span>&#160; <span class="keywordflow">switch</span> (codec_) {</div><div class="line"><a name="l00316"></a><span class="lineno"> 316</span>&#160; <span class="keywordflow">case</span> kCodecH264:</div><div class="line"><a name="l00317"></a><span class="lineno"> 317</span>&#160; <span class="comment">// Apple Sample AES uses 1:9 pattern for video.</span></div><div class="line"><a name="l00318"></a><span class="lineno"> 318</span>&#160; crypt_byte_block_ = 1u;</div><div class="line"><a name="l00319"></a><span class="lineno"> 319</span>&#160; skip_byte_block_ = 9u;</div><div class="line"><a name="l00320"></a><span class="lineno"> 320</span>&#160; leading_clear_bytes_size_ = kH264LeadingClearBytesSize;</div><div class="line"><a name="l00321"></a><span class="lineno"> 321</span>&#160; min_protected_data_size_ = kSmallNalUnitSize + 1u;</div><div class="line"><a name="l00322"></a><span class="lineno"> 322</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00323"></a><span class="lineno"> 323</span>&#160; <span class="keywordflow">case</span> kCodecAAC:</div><div class="line"><a name="l00324"></a><span class="lineno"> 324</span>&#160; FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00325"></a><span class="lineno"> 325</span>&#160; <span class="keywordflow">case</span> kCodecAC3:</div><div class="line"><a name="l00326"></a><span class="lineno"> 326</span>&#160; FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00327"></a><span class="lineno"> 327</span>&#160; <span class="keywordflow">case</span> kCodecEAC3:</div><div class="line"><a name="l00328"></a><span class="lineno"> 328</span>&#160; <span class="comment">// Audio is whole sample encrypted. We could not use a</span></div><div class="line"><a name="l00329"></a><span class="lineno"> 329</span>&#160; <span class="comment">// crypto_byte_block_ of 1 here as if there is one crypto block</span></div><div class="line"><a name="l00330"></a><span class="lineno"> 330</span>&#160; <span class="comment">// remaining, it need not be encrypted for video but it needs to be</span></div><div class="line"><a name="l00331"></a><span class="lineno"> 331</span>&#160; <span class="comment">// encrypted for audio.</span></div><div class="line"><a name="l00332"></a><span class="lineno"> 332</span>&#160; crypt_byte_block_ = 0u;</div><div class="line"><a name="l00333"></a><span class="lineno"> 333</span>&#160; skip_byte_block_ = 0u;</div><div class="line"><a name="l00334"></a><span class="lineno"> 334</span>&#160; <span class="comment">// E-AC3 encryption is handled by SampleAesEc3Cryptor, which also</span></div><div class="line"><a name="l00335"></a><span class="lineno"> 335</span>&#160; <span class="comment">// manages leading clear bytes.</span></div><div class="line"><a name="l00336"></a><span class="lineno"> 336</span>&#160; leading_clear_bytes_size_ =</div><div class="line"><a name="l00337"></a><span class="lineno"> 337</span>&#160; codec_ == kCodecEAC3 ? 0 : kAudioLeadingClearBytesSize;</div><div class="line"><a name="l00338"></a><span class="lineno"> 338</span>&#160; min_protected_data_size_ = leading_clear_bytes_size_ + 15u;</div><div class="line"><a name="l00339"></a><span class="lineno"> 339</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00340"></a><span class="lineno"> 340</span>&#160; <span class="keywordflow">default</span>:</div><div class="line"><a name="l00341"></a><span class="lineno"> 341</span>&#160; <span class="keywordflow">return</span> <a class="code" href="../../d2/d20/classshaka_1_1Status.html">Status</a>(</div><div class="line"><a name="l00342"></a><span class="lineno"> 342</span>&#160; error::ENCRYPTION_FAILURE,</div><div class="line"><a name="l00343"></a><span class="lineno"> 343</span>&#160; <span class="stringliteral">&quot;Only AAC/AC3/EAC3 and H264 are supported in Sample AES.&quot;</span>);</div><div class="line"><a name="l00344"></a><span class="lineno"> 344</span>&#160; }</div><div class="line"><a name="l00345"></a><span class="lineno"> 345</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00346"></a><span class="lineno"> 346</span>&#160; }</div><div class="line"><a name="l00347"></a><span class="lineno"> 347</span>&#160; <span class="keywordflow">case</span> FOURCC_cbcs:</div><div class="line"><a name="l00348"></a><span class="lineno"> 348</span>&#160; FALLTHROUGH_INTENDED;</div><div class="line"><a name="l00349"></a><span class="lineno"> 349</span>&#160; <span class="keywordflow">case</span> FOURCC_cens:</div><div class="line"><a name="l00350"></a><span class="lineno"> 350</span>&#160; <span class="keywordflow">if</span> (stream_type == kStreamVideo) {</div><div class="line"><a name="l00351"></a><span class="lineno"> 351</span>&#160; <span class="comment">// Use 1:9 pattern for video.</span></div><div class="line"><a name="l00352"></a><span class="lineno"> 352</span>&#160; crypt_byte_block_ = 1u;</div><div class="line"><a name="l00353"></a><span class="lineno"> 353</span>&#160; skip_byte_block_ = 9u;</div><div class="line"><a name="l00354"></a><span class="lineno"> 354</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00355"></a><span class="lineno"> 355</span>&#160; <span class="comment">// Tracks other than video are protected using whole-block full-sample</span></div><div class="line"><a name="l00356"></a><span class="lineno"> 356</span>&#160; <span class="comment">// encryption, which is essentially a pattern of 1:0. Note that this may</span></div><div class="line"><a name="l00357"></a><span class="lineno"> 357</span>&#160; <span class="comment">// not be the same as the non-pattern based encryption counterparts,</span></div><div class="line"><a name="l00358"></a><span class="lineno"> 358</span>&#160; <span class="comment">// e.g. in &#39;cens&#39; for full sample encryption, the whole sample is</span></div><div class="line"><a name="l00359"></a><span class="lineno"> 359</span>&#160; <span class="comment">// encrypted up to the last 16-byte boundary, see 23001-7:2016(E) 9.7;</span></div><div class="line"><a name="l00360"></a><span class="lineno"> 360</span>&#160; <span class="comment">// while in &#39;cenc&#39; for full sample encryption, the last partial 16-byte</span></div><div class="line"><a name="l00361"></a><span class="lineno"> 361</span>&#160; <span class="comment">// block is also encrypted, see 23001-7:2016(E) 9.4.2. Another</span></div><div class="line"><a name="l00362"></a><span class="lineno"> 362</span>&#160; <span class="comment">// difference is the use of constant iv.</span></div><div class="line"><a name="l00363"></a><span class="lineno"> 363</span>&#160; crypt_byte_block_ = 1u;</div><div class="line"><a name="l00364"></a><span class="lineno"> 364</span>&#160; skip_byte_block_ = 0u;</div><div class="line"><a name="l00365"></a><span class="lineno"> 365</span>&#160; }</div><div class="line"><a name="l00366"></a><span class="lineno"> 366</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00367"></a><span class="lineno"> 367</span>&#160; <span class="keywordflow">default</span>:</div><div class="line"><a name="l00368"></a><span class="lineno"> 368</span>&#160; <span class="comment">// Not using pattern encryption.</span></div><div class="line"><a name="l00369"></a><span class="lineno"> 369</span>&#160; crypt_byte_block_ = 0u;</div><div class="line"><a name="l00370"></a><span class="lineno"> 370</span>&#160; skip_byte_block_ = 0u;</div><div class="line"><a name="l00371"></a><span class="lineno"> 371</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00372"></a><span class="lineno"> 372</span>&#160; }</div><div class="line"><a name="l00373"></a><span class="lineno"> 373</span>&#160; <span class="keywordflow">return</span> Status::OK;</div><div class="line"><a name="l00374"></a><span class="lineno"> 374</span>&#160;}</div><div class="line"><a name="l00375"></a><span class="lineno"> 375</span>&#160;</div><div class="line"><a name="l00376"></a><span class="lineno"> 376</span>&#160;<span class="keywordtype">bool</span> EncryptionHandler::CreateEncryptor(<span class="keyword">const</span> <a class="code" href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">EncryptionKey</a>&amp; encryption_key) {</div><div class="line"><a name="l00377"></a><span class="lineno"> 377</span>&#160; std::unique_ptr&lt;AesCryptor&gt; encryptor;</div><div class="line"><a name="l00378"></a><span class="lineno"> 378</span>&#160; <span class="keywordflow">switch</span> (protection_scheme_) {</div><div class="line"><a name="l00379"></a><span class="lineno"> 379</span>&#160; <span class="keywordflow">case</span> FOURCC_cenc:</div><div class="line"><a name="l00380"></a><span class="lineno"> 380</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">AesCtrEncryptor</a>);</div><div class="line"><a name="l00381"></a><span class="lineno"> 381</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00382"></a><span class="lineno"> 382</span>&#160; <span class="keywordflow">case</span> FOURCC_cbc1:</div><div class="line"><a name="l00383"></a><span class="lineno"> 383</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding));</div><div class="line"><a name="l00384"></a><span class="lineno"> 384</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00385"></a><span class="lineno"> 385</span>&#160; <span class="keywordflow">case</span> FOURCC_cens:</div><div class="line"><a name="l00386"></a><span class="lineno"> 386</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00387"></a><span class="lineno"> 387</span>&#160; crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00388"></a><span class="lineno"> 388</span>&#160; <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00389"></a><span class="lineno"> 389</span>&#160; AesCryptor::kDontUseConstantIv,</div><div class="line"><a name="l00390"></a><span class="lineno"> 390</span>&#160; std::unique_ptr&lt;AesCryptor&gt;(<span class="keyword">new</span> <a class="code" href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">AesCtrEncryptor</a>())));</div><div class="line"><a name="l00391"></a><span class="lineno"> 391</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00392"></a><span class="lineno"> 392</span>&#160; <span class="keywordflow">case</span> FOURCC_cbcs:</div><div class="line"><a name="l00393"></a><span class="lineno"> 393</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00394"></a><span class="lineno"> 394</span>&#160; crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00395"></a><span class="lineno"> 395</span>&#160; <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00396"></a><span class="lineno"> 396</span>&#160; AesCryptor::kUseConstantIv,</div><div class="line"><a name="l00397"></a><span class="lineno"> 397</span>&#160; std::unique_ptr&lt;AesCryptor&gt;(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00398"></a><span class="lineno"> 398</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00399"></a><span class="lineno"> 399</span>&#160; <span class="keywordflow">case</span> kAppleSampleAesProtectionScheme:</div><div class="line"><a name="l00400"></a><span class="lineno"> 400</span>&#160; <span class="keywordflow">if</span> (crypt_byte_block_ == 0 &amp;&amp; skip_byte_block_ == 0) {</div><div class="line"><a name="l00401"></a><span class="lineno"> 401</span>&#160; <span class="keywordflow">if</span> (codec_ == kCodecEAC3) {</div><div class="line"><a name="l00402"></a><span class="lineno"> 402</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d9/da0/classshaka_1_1media_1_1SampleAesEc3Cryptor.html">SampleAesEc3Cryptor</a>(</div><div class="line"><a name="l00403"></a><span class="lineno"> 403</span>&#160; std::unique_ptr&lt;AesCryptor&gt;(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00404"></a><span class="lineno"> 404</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00405"></a><span class="lineno"> 405</span>&#160; encryptor.reset(</div><div class="line"><a name="l00406"></a><span class="lineno"> 406</span>&#160; <span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding, AesCryptor::kUseConstantIv));</div><div class="line"><a name="l00407"></a><span class="lineno"> 407</span>&#160; }</div><div class="line"><a name="l00408"></a><span class="lineno"> 408</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00409"></a><span class="lineno"> 409</span>&#160; encryptor.reset(<span class="keyword">new</span> <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">AesPatternCryptor</a>(</div><div class="line"><a name="l00410"></a><span class="lineno"> 410</span>&#160; crypt_byte_block_, skip_byte_block_,</div><div class="line"><a name="l00411"></a><span class="lineno"> 411</span>&#160; <a class="code" href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a>,</div><div class="line"><a name="l00412"></a><span class="lineno"> 412</span>&#160; AesCryptor::kUseConstantIv,</div><div class="line"><a name="l00413"></a><span class="lineno"> 413</span>&#160; std::unique_ptr&lt;AesCryptor&gt;(<span class="keyword">new</span> <a class="code" href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">AesCbcEncryptor</a>(kNoPadding))));</div><div class="line"><a name="l00414"></a><span class="lineno"> 414</span>&#160; }</div><div class="line"><a name="l00415"></a><span class="lineno"> 415</span>&#160; <span class="keywordflow">break</span>;</div><div class="line"><a name="l00416"></a><span class="lineno"> 416</span>&#160; <span class="keywordflow">default</span>:</div><div class="line"><a name="l00417"></a><span class="lineno"> 417</span>&#160; LOG(ERROR) &lt;&lt; <span class="stringliteral">&quot;Unsupported protection scheme.&quot;</span>;</div><div class="line"><a name="l00418"></a><span class="lineno"> 418</span>&#160; <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00419"></a><span class="lineno"> 419</span>&#160; }</div><div class="line"><a name="l00420"></a><span class="lineno"> 420</span>&#160;</div><div class="line"><a name="l00421"></a><span class="lineno"> 421</span>&#160; std::vector&lt;uint8_t&gt; iv = encryption_key.iv;</div><div class="line"><a name="l00422"></a><span class="lineno"> 422</span>&#160; <span class="keywordflow">if</span> (iv.empty()) {</div><div class="line"><a name="l00423"></a><span class="lineno"> 423</span>&#160; <span class="keywordflow">if</span> (!<a class="code" href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">AesCryptor::GenerateRandomIv</a>(protection_scheme_, &amp;iv)) {</div><div class="line"><a name="l00424"></a><span class="lineno"> 424</span>&#160; LOG(ERROR) &lt;&lt; <span class="stringliteral">&quot;Failed to generate random iv.&quot;</span>;</div><div class="line"><a name="l00425"></a><span class="lineno"> 425</span>&#160; <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00426"></a><span class="lineno"> 426</span>&#160; }</div><div class="line"><a name="l00427"></a><span class="lineno"> 427</span>&#160; }</div><div class="line"><a name="l00428"></a><span class="lineno"> 428</span>&#160; <span class="keyword">const</span> <span class="keywordtype">bool</span> initialized =</div><div class="line"><a name="l00429"></a><span class="lineno"> 429</span>&#160; encryptor-&gt;InitializeWithIv(encryption_key.key, iv);</div><div class="line"><a name="l00430"></a><span class="lineno"> 430</span>&#160; encryptor_ = std::move(encryptor);</div><div class="line"><a name="l00431"></a><span class="lineno"> 431</span>&#160;</div><div class="line"><a name="l00432"></a><span class="lineno"> 432</span>&#160; encryption_config_.reset(<span class="keyword">new</span> <a class="code" href="../../d7/d34/structshaka_1_1media_1_1EncryptionConfig.html">EncryptionConfig</a>);</div><div class="line"><a name="l00433"></a><span class="lineno"> 433</span>&#160; encryption_config_-&gt;protection_scheme = protection_scheme_;</div><div class="line"><a name="l00434"></a><span class="lineno"> 434</span>&#160; encryption_config_-&gt;crypt_byte_block = crypt_byte_block_;</div><div class="line"><a name="l00435"></a><span class="lineno"> 435</span>&#160; encryption_config_-&gt;skip_byte_block = skip_byte_block_;</div><div class="line"><a name="l00436"></a><span class="lineno"> 436</span>&#160; <span class="keywordflow">if</span> (encryptor_-&gt;use_constant_iv()) {</div><div class="line"><a name="l00437"></a><span class="lineno"> 437</span>&#160; encryption_config_-&gt;per_sample_iv_size = 0;</div><div class="line"><a name="l00438"></a><span class="lineno"> 438</span>&#160; encryption_config_-&gt;constant_iv = iv;</div><div class="line"><a name="l00439"></a><span class="lineno"> 439</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00440"></a><span class="lineno"> 440</span>&#160; encryption_config_-&gt;per_sample_iv_size = <span class="keyword">static_cast&lt;</span>uint8_t<span class="keyword">&gt;</span>(iv.size());</div><div class="line"><a name="l00441"></a><span class="lineno"> 441</span>&#160; }</div><div class="line"><a name="l00442"></a><span class="lineno"> 442</span>&#160; encryption_config_-&gt;key_id = encryption_key.key_id;</div><div class="line"><a name="l00443"></a><span class="lineno"> 443</span>&#160; encryption_config_-&gt;key_system_info = encryption_key.key_system_info;</div><div class="line"><a name="l00444"></a><span class="lineno"> 444</span>&#160; <span class="keywordflow">return</span> initialized;</div><div class="line"><a name="l00445"></a><span class="lineno"> 445</span>&#160;}</div><div class="line"><a name="l00446"></a><span class="lineno"> 446</span>&#160;</div><div class="line"><a name="l00447"></a><span class="lineno"> 447</span>&#160;<span class="keywordtype">bool</span> EncryptionHandler::EncryptVpxFrame(</div><div class="line"><a name="l00448"></a><span class="lineno"> 448</span>&#160; <span class="keyword">const</span> std::vector&lt;VPxFrameInfo&gt;&amp; vpx_frames,</div><div class="line"><a name="l00449"></a><span class="lineno"> 449</span>&#160; <span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00450"></a><span class="lineno"> 450</span>&#160; <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00451"></a><span class="lineno"> 451</span>&#160; uint8_t* dest,</div><div class="line"><a name="l00452"></a><span class="lineno"> 452</span>&#160; <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>* decrypt_config) {</div><div class="line"><a name="l00453"></a><span class="lineno"> 453</span>&#160; <span class="keyword">const</span> uint8_t* data = source;</div><div class="line"><a name="l00454"></a><span class="lineno"> 454</span>&#160; <span class="keywordflow">for</span> (<span class="keyword">const</span> <a class="code" href="../../d0/d11/structshaka_1_1media_1_1VPxFrameInfo.html">VPxFrameInfo</a>&amp; frame : vpx_frames) {</div><div class="line"><a name="l00455"></a><span class="lineno"> 455</span>&#160; uint16_t clear_bytes =</div><div class="line"><a name="l00456"></a><span class="lineno"> 456</span>&#160; <span class="keyword">static_cast&lt;</span>uint16_t<span class="keyword">&gt;</span>(frame.uncompressed_header_size);</div><div class="line"><a name="l00457"></a><span class="lineno"> 457</span>&#160; uint32_t cipher_bytes = <span class="keyword">static_cast&lt;</span>uint32_t<span class="keyword">&gt;</span>(</div><div class="line"><a name="l00458"></a><span class="lineno"> 458</span>&#160; frame.frame_size - frame.uncompressed_header_size);</div><div class="line"><a name="l00459"></a><span class="lineno"> 459</span>&#160;</div><div class="line"><a name="l00460"></a><span class="lineno"> 460</span>&#160; <span class="comment">// &quot;VP Codec ISO Media File Format Binding&quot; document requires that the</span></div><div class="line"><a name="l00461"></a><span class="lineno"> 461</span>&#160; <span class="comment">// encrypted bytes of each frame within the superframe must be block</span></div><div class="line"><a name="l00462"></a><span class="lineno"> 462</span>&#160; <span class="comment">// aligned so that the counter state can be computed for each frame</span></div><div class="line"><a name="l00463"></a><span class="lineno"> 463</span>&#160; <span class="comment">// within the superframe.</span></div><div class="line"><a name="l00464"></a><span class="lineno"> 464</span>&#160; <span class="comment">// ISO/IEC 23001-7:2016 10.2 &#39;cbc1&#39; 10.3 &#39;cens&#39;</span></div><div class="line"><a name="l00465"></a><span class="lineno"> 465</span>&#160; <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div><div class="line"><a name="l00466"></a><span class="lineno"> 466</span>&#160; <span class="comment">// avoid partial blocks in Subsamples.</span></div><div class="line"><a name="l00467"></a><span class="lineno"> 467</span>&#160; <span class="comment">// For consistency, apply block alignment to all frames.</span></div><div class="line"><a name="l00468"></a><span class="lineno"> 468</span>&#160; <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div><div class="line"><a name="l00469"></a><span class="lineno"> 469</span>&#160; clear_bytes += misalign_bytes;</div><div class="line"><a name="l00470"></a><span class="lineno"> 470</span>&#160; cipher_bytes -= misalign_bytes;</div><div class="line"><a name="l00471"></a><span class="lineno"> 471</span>&#160;</div><div class="line"><a name="l00472"></a><span class="lineno"> 472</span>&#160; decrypt_config-&gt;<a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">AddSubsample</a>(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00473"></a><span class="lineno"> 473</span>&#160; memcpy(dest, data, clear_bytes);</div><div class="line"><a name="l00474"></a><span class="lineno"> 474</span>&#160; <span class="keywordflow">if</span> (cipher_bytes &gt; 0)</div><div class="line"><a name="l00475"></a><span class="lineno"> 475</span>&#160; EncryptBytes(data + clear_bytes, cipher_bytes, dest + clear_bytes);</div><div class="line"><a name="l00476"></a><span class="lineno"> 476</span>&#160; data += frame.frame_size;</div><div class="line"><a name="l00477"></a><span class="lineno"> 477</span>&#160; dest += frame.frame_size;</div><div class="line"><a name="l00478"></a><span class="lineno"> 478</span>&#160; }</div><div class="line"><a name="l00479"></a><span class="lineno"> 479</span>&#160; <span class="comment">// Add subsample for the superframe index if exists.</span></div><div class="line"><a name="l00480"></a><span class="lineno"> 480</span>&#160; <span class="keyword">const</span> <span class="keywordtype">bool</span> is_superframe = vpx_frames.size() &gt; 1;</div><div class="line"><a name="l00481"></a><span class="lineno"> 481</span>&#160; <span class="keywordflow">if</span> (is_superframe) {</div><div class="line"><a name="l00482"></a><span class="lineno"> 482</span>&#160; <span class="keywordtype">size_t</span> index_size = source + source_size - data;</div><div class="line"><a name="l00483"></a><span class="lineno"> 483</span>&#160; DCHECK_LE(index_size, 2 + vpx_frames.size() * 4);</div><div class="line"><a name="l00484"></a><span class="lineno"> 484</span>&#160; DCHECK_GE(index_size, 2 + vpx_frames.size() * 1);</div><div class="line"><a name="l00485"></a><span class="lineno"> 485</span>&#160; uint16_t clear_bytes = <span class="keyword">static_cast&lt;</span>uint16_t<span class="keyword">&gt;</span>(index_size);</div><div class="line"><a name="l00486"></a><span class="lineno"> 486</span>&#160; uint32_t cipher_bytes = 0;</div><div class="line"><a name="l00487"></a><span class="lineno"> 487</span>&#160; decrypt_config-&gt;<a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">AddSubsample</a>(clear_bytes, cipher_bytes);</div><div class="line"><a name="l00488"></a><span class="lineno"> 488</span>&#160; memcpy(dest, data, clear_bytes);</div><div class="line"><a name="l00489"></a><span class="lineno"> 489</span>&#160; }</div><div class="line"><a name="l00490"></a><span class="lineno"> 490</span>&#160; <span class="keywordflow">return</span> <span class="keyword">true</span>;</div><div class="line"><a name="l00491"></a><span class="lineno"> 491</span>&#160;}</div><div class="line"><a name="l00492"></a><span class="lineno"> 492</span>&#160;</div><div class="line"><a name="l00493"></a><span class="lineno"> 493</span>&#160;<span class="keywordtype">bool</span> EncryptionHandler::EncryptNalFrame(<span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00494"></a><span class="lineno"> 494</span>&#160; <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00495"></a><span class="lineno"> 495</span>&#160; uint8_t* dest,</div><div class="line"><a name="l00496"></a><span class="lineno"> 496</span>&#160; <a class="code" href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">DecryptConfig</a>* decrypt_config) {</div><div class="line"><a name="l00497"></a><span class="lineno"> 497</span>&#160; DCHECK_NE(nalu_length_size_, 0u);</div><div class="line"><a name="l00498"></a><span class="lineno"> 498</span>&#160; DCHECK(header_parser_);</div><div class="line"><a name="l00499"></a><span class="lineno"> 499</span>&#160; <span class="keyword">const</span> Nalu::CodecType nalu_type =</div><div class="line"><a name="l00500"></a><span class="lineno"> 500</span>&#160; (codec_ == kCodecH265) ? Nalu::kH265 : Nalu::kH264;</div><div class="line"><a name="l00501"></a><span class="lineno"> 501</span>&#160; <a class="code" href="../../db/d86/classshaka_1_1media_1_1NaluReader.html">NaluReader</a> reader(nalu_type, nalu_length_size_, source, source_size);</div><div class="line"><a name="l00502"></a><span class="lineno"> 502</span>&#160;</div><div class="line"><a name="l00503"></a><span class="lineno"> 503</span>&#160; <span class="comment">// Store the current length of clear data. This is used to squash</span></div><div class="line"><a name="l00504"></a><span class="lineno"> 504</span>&#160; <span class="comment">// multiple unencrypted NAL units into fewer subsample entries.</span></div><div class="line"><a name="l00505"></a><span class="lineno"> 505</span>&#160; uint64_t accumulated_clear_bytes = 0;</div><div class="line"><a name="l00506"></a><span class="lineno"> 506</span>&#160;</div><div class="line"><a name="l00507"></a><span class="lineno"> 507</span>&#160; <a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html">Nalu</a> nalu;</div><div class="line"><a name="l00508"></a><span class="lineno"> 508</span>&#160; NaluReader::Result result;</div><div class="line"><a name="l00509"></a><span class="lineno"> 509</span>&#160; <span class="keywordflow">while</span> ((result = reader.<a class="code" href="../../db/d86/classshaka_1_1media_1_1NaluReader.html#ae051f1f92d84acfcd4cc159d972d647a">Advance</a>(&amp;nalu)) == NaluReader::kOk) {</div><div class="line"><a name="l00510"></a><span class="lineno"> 510</span>&#160; <span class="keyword">const</span> uint64_t nalu_total_size = nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">header_size</a>() + nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#abe782e4298e7add8ce0a1c33e66cfcdb">payload_size</a>();</div><div class="line"><a name="l00511"></a><span class="lineno"> 511</span>&#160; <span class="keywordflow">if</span> (nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a63f091b3dbe862fd4519c1b374dfc937">is_video_slice</a>() &amp;&amp; nalu_total_size &gt;= min_protected_data_size_) {</div><div class="line"><a name="l00512"></a><span class="lineno"> 512</span>&#160; uint64_t current_clear_bytes = leading_clear_bytes_size_;</div><div class="line"><a name="l00513"></a><span class="lineno"> 513</span>&#160; <span class="keywordflow">if</span> (current_clear_bytes == 0) {</div><div class="line"><a name="l00514"></a><span class="lineno"> 514</span>&#160; <span class="comment">// For video-slice NAL units, encrypt the video slice. This skips</span></div><div class="line"><a name="l00515"></a><span class="lineno"> 515</span>&#160; <span class="comment">// the frame header.</span></div><div class="line"><a name="l00516"></a><span class="lineno"> 516</span>&#160; <span class="keyword">const</span> int64_t video_slice_header_size =</div><div class="line"><a name="l00517"></a><span class="lineno"> 517</span>&#160; header_parser_-&gt;GetHeaderSize(nalu);</div><div class="line"><a name="l00518"></a><span class="lineno"> 518</span>&#160; <span class="keywordflow">if</span> (video_slice_header_size &lt; 0) {</div><div class="line"><a name="l00519"></a><span class="lineno"> 519</span>&#160; LOG(ERROR) &lt;&lt; <span class="stringliteral">&quot;Failed to read slice header.&quot;</span>;</div><div class="line"><a name="l00520"></a><span class="lineno"> 520</span>&#160; <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00521"></a><span class="lineno"> 521</span>&#160; }</div><div class="line"><a name="l00522"></a><span class="lineno"> 522</span>&#160; current_clear_bytes = nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">header_size</a>() + video_slice_header_size;</div><div class="line"><a name="l00523"></a><span class="lineno"> 523</span>&#160; }</div><div class="line"><a name="l00524"></a><span class="lineno"> 524</span>&#160; uint64_t cipher_bytes = nalu_total_size - current_clear_bytes;</div><div class="line"><a name="l00525"></a><span class="lineno"> 525</span>&#160;</div><div class="line"><a name="l00526"></a><span class="lineno"> 526</span>&#160; <span class="comment">// ISO/IEC 23001-7:2016 10.2 &#39;cbc1&#39; 10.3 &#39;cens&#39;</span></div><div class="line"><a name="l00527"></a><span class="lineno"> 527</span>&#160; <span class="comment">// The BytesOfProtectedData size SHALL be a multiple of 16 bytes to</span></div><div class="line"><a name="l00528"></a><span class="lineno"> 528</span>&#160; <span class="comment">// avoid partial blocks in Subsamples.</span></div><div class="line"><a name="l00529"></a><span class="lineno"> 529</span>&#160; <span class="comment">// CMAF requires &#39;cenc&#39; scheme BytesOfProtectedData SHALL be a multiple</span></div><div class="line"><a name="l00530"></a><span class="lineno"> 530</span>&#160; <span class="comment">// of 16 bytes; while &#39;cbcs&#39; scheme BytesOfProtectedData SHALL start on</span></div><div class="line"><a name="l00531"></a><span class="lineno"> 531</span>&#160; <span class="comment">// the first byte of video data following the slice header.</span></div><div class="line"><a name="l00532"></a><span class="lineno"> 532</span>&#160; <span class="keywordflow">if</span> (protection_scheme_ == FOURCC_cbc1 ||</div><div class="line"><a name="l00533"></a><span class="lineno"> 533</span>&#160; protection_scheme_ == FOURCC_cens ||</div><div class="line"><a name="l00534"></a><span class="lineno"> 534</span>&#160; protection_scheme_ == FOURCC_cenc) {</div><div class="line"><a name="l00535"></a><span class="lineno"> 535</span>&#160; <span class="keyword">const</span> uint16_t misalign_bytes = cipher_bytes % kCencBlockSize;</div><div class="line"><a name="l00536"></a><span class="lineno"> 536</span>&#160; current_clear_bytes += misalign_bytes;</div><div class="line"><a name="l00537"></a><span class="lineno"> 537</span>&#160; cipher_bytes -= misalign_bytes;</div><div class="line"><a name="l00538"></a><span class="lineno"> 538</span>&#160; }</div><div class="line"><a name="l00539"></a><span class="lineno"> 539</span>&#160;</div><div class="line"><a name="l00540"></a><span class="lineno"> 540</span>&#160; accumulated_clear_bytes += nalu_length_size_ + current_clear_bytes;</div><div class="line"><a name="l00541"></a><span class="lineno"> 541</span>&#160; AddSubsample(accumulated_clear_bytes, cipher_bytes, decrypt_config);</div><div class="line"><a name="l00542"></a><span class="lineno"> 542</span>&#160; memcpy(dest, source, accumulated_clear_bytes);</div><div class="line"><a name="l00543"></a><span class="lineno"> 543</span>&#160; source += accumulated_clear_bytes;</div><div class="line"><a name="l00544"></a><span class="lineno"> 544</span>&#160; dest += accumulated_clear_bytes;</div><div class="line"><a name="l00545"></a><span class="lineno"> 545</span>&#160; accumulated_clear_bytes = 0;</div><div class="line"><a name="l00546"></a><span class="lineno"> 546</span>&#160;</div><div class="line"><a name="l00547"></a><span class="lineno"> 547</span>&#160; DCHECK_EQ(nalu.<a class="code" href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a52dc6f445a09c36a64c634ccc2891489">data</a>() + current_clear_bytes, source);</div><div class="line"><a name="l00548"></a><span class="lineno"> 548</span>&#160; EncryptBytes(source, cipher_bytes, dest);</div><div class="line"><a name="l00549"></a><span class="lineno"> 549</span>&#160; source += cipher_bytes;</div><div class="line"><a name="l00550"></a><span class="lineno"> 550</span>&#160; dest += cipher_bytes;</div><div class="line"><a name="l00551"></a><span class="lineno"> 551</span>&#160; } <span class="keywordflow">else</span> {</div><div class="line"><a name="l00552"></a><span class="lineno"> 552</span>&#160; <span class="comment">// For non-video-slice or small NAL units, don&#39;t encrypt.</span></div><div class="line"><a name="l00553"></a><span class="lineno"> 553</span>&#160; accumulated_clear_bytes += nalu_length_size_ + nalu_total_size;</div><div class="line"><a name="l00554"></a><span class="lineno"> 554</span>&#160; }</div><div class="line"><a name="l00555"></a><span class="lineno"> 555</span>&#160; }</div><div class="line"><a name="l00556"></a><span class="lineno"> 556</span>&#160; <span class="keywordflow">if</span> (result != NaluReader::kEOStream) {</div><div class="line"><a name="l00557"></a><span class="lineno"> 557</span>&#160; LOG(ERROR) &lt;&lt; <span class="stringliteral">&quot;Failed to parse NAL units.&quot;</span>;</div><div class="line"><a name="l00558"></a><span class="lineno"> 558</span>&#160; <span class="keywordflow">return</span> <span class="keyword">false</span>;</div><div class="line"><a name="l00559"></a><span class="lineno"> 559</span>&#160; }</div><div class="line"><a name="l00560"></a><span class="lineno"> 560</span>&#160; AddSubsample(accumulated_clear_bytes, 0, decrypt_config);</div><div class="line"><a name="l00561"></a><span class="lineno"> 561</span>&#160; memcpy(dest, source, accumulated_clear_bytes);</div><div class="line"><a name="l00562"></a><span class="lineno"> 562</span>&#160; <span class="keywordflow">return</span> <span class="keyword">true</span>;</div><div class="line"><a name="l00563"></a><span class="lineno"> 563</span>&#160;}</div><div class="line"><a name="l00564"></a><span class="lineno"> 564</span>&#160;</div><div class="line"><a name="l00565"></a><span class="lineno"> 565</span>&#160;<span class="keywordtype">void</span> EncryptionHandler::EncryptBytes(<span class="keyword">const</span> uint8_t* source,</div><div class="line"><a name="l00566"></a><span class="lineno"> 566</span>&#160; <span class="keywordtype">size_t</span> source_size,</div><div class="line"><a name="l00567"></a><span class="lineno"> 567</span>&#160; uint8_t* dest) {</div><div class="line"><a name="l00568"></a><span class="lineno"> 568</span>&#160; DCHECK(source);</div><div class="line"><a name="l00569"></a><span class="lineno"> 569</span>&#160; DCHECK(dest);</div><div class="line"><a name="l00570"></a><span class="lineno"> 570</span>&#160; DCHECK(encryptor_);</div><div class="line"><a name="l00571"></a><span class="lineno"> 571</span>&#160; CHECK(encryptor_-&gt;Crypt(source, source_size, dest));</div><div class="line"><a name="l00572"></a><span class="lineno"> 572</span>&#160;}</div><div class="line"><a name="l00573"></a><span class="lineno"> 573</span>&#160;</div><div class="line"><a name="l00574"></a><span class="lineno"> 574</span>&#160;<span class="keywordtype">void</span> EncryptionHandler::InjectVpxParserForTesting(</div><div class="line"><a name="l00575"></a><span class="lineno"> 575</span>&#160; std::unique_ptr&lt;VPxParser&gt; vpx_parser) {</div><div class="line"><a name="l00576"></a><span class="lineno"> 576</span>&#160; vpx_parser_ = std::move(vpx_parser);</div><div class="line"><a name="l00577"></a><span class="lineno"> 577</span>&#160;}</div><div class="line"><a name="l00578"></a><span class="lineno"> 578</span>&#160;</div><div class="line"><a name="l00579"></a><span class="lineno"> 579</span>&#160;<span class="keywordtype">void</span> EncryptionHandler::InjectVideoSliceHeaderParserForTesting(</div><div class="line"><a name="l00580"></a><span class="lineno"> 580</span>&#160; std::unique_ptr&lt;VideoSliceHeaderParser&gt; header_parser) {</div><div class="line"><a name="l00581"></a><span class="lineno"> 581</span>&#160; header_parser_ = std::move(header_parser);</div><div class="line"><a name="l00582"></a><span class="lineno"> 582</span>&#160;}</div><div class="line"><a name="l00583"></a><span class="lineno"> 583</span>&#160;</div><div class="line"><a name="l00584"></a><span class="lineno"> 584</span>&#160;} <span class="comment">// namespace media</span></div><div class="line"><a name="l00585"></a><span class="lineno"> 585</span>&#160;} <span class="comment">// namespace shaka</span></div><div class="ttc" id="classshaka_1_1media_1_1H265VideoSliceHeaderParser_html"><div class="ttname"><a href="../../d1/d79/classshaka_1_1media_1_1H265VideoSliceHeaderParser.html">shaka::media::H265VideoSliceHeaderParser</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d2/d33/video__slice__header__parser_8h_source.html#l00053">video_slice_header_parser.h:53</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1StreamInfo_html"><div class="ttname"><a href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html">shaka::media::StreamInfo</a></div><div class="ttdoc">Abstract class holds stream information. </div><div class="ttdef"><b>Definition:</b> <a href="../../d8/daa/stream__info_8h_source.html#l00059">stream_info.h:59</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a63f091b3dbe862fd4519c1b374dfc937"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a63f091b3dbe862fd4519c1b374dfc937">shaka::media::Nalu::is_video_slice</a></div><div class="ttdeci">bool is_video_slice() const</div><div class="ttdoc">Slice data partition NALs are not considered as slice NALs. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00117">nalu_reader.h:117</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1StreamInfo_html_afdd9b2df8ae1c11bb033c44eaba5e38d"><div class="ttname"><a href="../../d5/db1/classshaka_1_1media_1_1StreamInfo.html#afdd9b2df8ae1c11bb033c44eaba5e38d">shaka::media::StreamInfo::Clone</a></div><div class="ttdeci">virtual std::unique_ptr&lt; StreamInfo &gt; Clone() const =0</div></div>
<div class="ttc" id="classshaka_1_1media_1_1DecryptConfig_html"><div class="ttname"><a href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html">shaka::media::DecryptConfig</a></div><div class="ttdef"><b>Definition:</b> <a href="../../df/dad/decrypt__config_8h_source.html#l00040">decrypt_config.h:40</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a52dc6f445a09c36a64c634ccc2891489"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a52dc6f445a09c36a64c634ccc2891489">shaka::media::Nalu::data</a></div><div class="ttdeci">const uint8_t * data() const</div><div class="ttdoc">This is the pointer to the Nalu data, pointing to the header. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00097">nalu_reader.h:97</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a09674e418b61763fdc5cf22c248efd4f">shaka::media::AesPatternCryptor::kSkipIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00035">aes_pattern_cryptor.h:35</a></div></div>
<div class="ttc" id="structshaka_1_1media_1_1SegmentInfo_html"><div class="ttname"><a href="../../d0/dc0/structshaka_1_1media_1_1SegmentInfo.html">shaka::media::SegmentInfo</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d93/media__handler_8h_source.html#l00053">media_handler.h:53</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1NaluReader_html"><div class="ttname"><a href="../../db/d86/classshaka_1_1media_1_1NaluReader.html">shaka::media::NaluReader</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00149">nalu_reader.h:149</a></div></div>
<div class="ttc" id="structshaka_1_1media_1_1VPxFrameInfo_html"><div class="ttname"><a href="../../d0/d11/structshaka_1_1media_1_1VPxFrameInfo.html">shaka::media::VPxFrameInfo</a></div><div class="ttdef"><b>Definition:</b> <a href="../../df/d8a/vpx__parser_8h_source.html#l00019">vpx_parser.h:19</a></div></div>
<div class="ttc" id="namespaceshaka_html"><div class="ttname"><a href="../../d8/daf/namespaceshaka.html">shaka</a></div><div class="ttdoc">All the methods that are virtual are virtual for mocking. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d15/gflags__hex__bytes_8cc_source.html#l00011">gflags_hex_bytes.cc:11</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_a835d8f01a8ab94887ee3dce3b5d3721e"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#a835d8f01a8ab94887ee3dce3b5d3721e">shaka::media::Nalu::header_size</a></div><div class="ttdeci">uint64_t header_size() const</div><div class="ttdoc">The size of the header, e.g. 1 for H.264. </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00100">nalu_reader.h:100</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html_a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html#a54fd35d7782d3b4948c7eb68387711f0a76b19d202e22b2b0f661f933b47b3b16">shaka::media::AesPatternCryptor::kEncryptIfCryptByteBlockRemaining</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00026">aes_pattern_cryptor.h:26</a></div></div>
<div class="ttc" id="classshaka_1_1Status_html"><div class="ttname"><a href="../../d2/d20/classshaka_1_1Status.html">shaka::Status</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/d13/status_8h_source.html#l00110">status.h:110</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a3f1808a4386081e5e1c9a798a1a69dd0"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a3f1808a4386081e5e1c9a798a1a69dd0">shaka::media::EncryptionHandler::InitializeInternal</a></div><div class="ttdeci">Status InitializeInternal() override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00095">encryption_handler.cc:95</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1EncryptionHandler_html_a7887e6060eb572036674ecb9a7e045c4"><div class="ttname"><a href="../../d6/d4c/classshaka_1_1media_1_1EncryptionHandler.html#a7887e6060eb572036674ecb9a7e045c4">shaka::media::EncryptionHandler::Process</a></div><div class="ttdeci">Status Process(std::unique_ptr&lt; StreamData &gt; stream_data) override</div><div class="ttdef"><b>Definition:</b> <a href="../../d3/d9c/encryption__handler_8cc_source.html#l00106">encryption_handler.cc:106</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesCbcEncryptor_html"><div class="ttname"><a href="../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html">shaka::media::AesCbcEncryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df0/aes__encryptor_8h_source.html#l00077">aes_encryptor.h:77</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1SampleAesEc3Cryptor_html"><div class="ttname"><a href="../../d9/da0/classshaka_1_1media_1_1SampleAesEc3Cryptor.html">shaka::media::SampleAesEc3Cryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d40/sample__aes__ec3__cryptor_8h_source.html#l00017">sample_aes_ec3_cryptor.h:17</a></div></div>
<div class="ttc" id="structshaka_1_1media_1_1EncryptionKey_html"><div class="ttname"><a href="../../dd/dbd/structshaka_1_1media_1_1EncryptionKey.html">shaka::media::EncryptionKey</a></div><div class="ttdef"><b>Definition:</b> <a href="../../dc/d3f/key__source_8h_source.html#l00037">key_source.h:37</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesCryptor_html_a40d9a82d274d6fbaee5346328f11dedd"><div class="ttname"><a href="../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a40d9a82d274d6fbaee5346328f11dedd">shaka::media::AesCryptor::GenerateRandomIv</a></div><div class="ttdeci">static bool GenerateRandomIv(FourCC protection_scheme, std::vector&lt; uint8_t &gt; *iv)</div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d55/aes__cryptor_8cc_source.html#l00107">aes_cryptor.cc:107</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1H264VideoSliceHeaderParser_html"><div class="ttname"><a href="../../da/df0/classshaka_1_1media_1_1H264VideoSliceHeaderParser.html">shaka::media::H264VideoSliceHeaderParser</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d2/d33/video__slice__header__parser_8h_source.html#l00036">video_slice_header_parser.h:36</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1NaluReader_html_ae051f1f92d84acfcd4cc159d972d647a"><div class="ttname"><a href="../../db/d86/classshaka_1_1media_1_1NaluReader.html#ae051f1f92d84acfcd4cc159d972d647a">shaka::media::NaluReader::Advance</a></div><div class="ttdeci">Result Advance(Nalu *nalu)</div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df5/nalu__reader_8cc_source.html#l00239">nalu_reader.cc:239</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1VP9Parser_html"><div class="ttname"><a href="../../db/d5a/classshaka_1_1media_1_1VP9Parser.html">shaka::media::VP9Parser</a></div><div class="ttdoc">Class to parse a vp9 bit stream. </div><div class="ttdef"><b>Definition:</b> <a href="../../df/d8a/vp9__parser_8h_source.html#l00020">vp9_parser.h:20</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html">shaka::media::Nalu</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00027">nalu_reader.h:27</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesPatternCryptor_html"><div class="ttname"><a href="../../d3/dfe/classshaka_1_1media_1_1AesPatternCryptor.html">shaka::media::AesPatternCryptor</a></div><div class="ttdoc">Implements pattern-based encryption/decryption. </div><div class="ttdef"><b>Definition:</b> <a href="../../d6/d09/aes__pattern__cryptor_8h_source.html#l00017">aes_pattern_cryptor.h:17</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1AesCtrEncryptor_html"><div class="ttname"><a href="../../d0/dd8/classshaka_1_1media_1_1AesCtrEncryptor.html">shaka::media::AesCtrEncryptor</a></div><div class="ttdef"><b>Definition:</b> <a href="../../d1/df0/aes__encryptor_8h_source.html#l00042">aes_encryptor.h:42</a></div></div>
<div class="ttc" id="structshaka_1_1media_1_1EncryptionConfig_html"><div class="ttname"><a href="../../d7/d34/structshaka_1_1media_1_1EncryptionConfig.html">shaka::media::EncryptionConfig</a></div><div class="ttdef"><b>Definition:</b> <a href="../../dd/d05/encryption__config_8h_source.html#l00016">encryption_config.h:16</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1DecryptConfig_html_a36681ecf1eeb8a4effb0f00b232bda58"><div class="ttname"><a href="../../de/d49/classshaka_1_1media_1_1DecryptConfig.html#a36681ecf1eeb8a4effb0f00b232bda58">shaka::media::DecryptConfig::AddSubsample</a></div><div class="ttdeci">void AddSubsample(uint16_t clear_bytes, uint32_t cipher_bytes)</div><div class="ttdef"><b>Definition:</b> <a href="../../df/dad/decrypt__config_8h_source.html#l00080">decrypt_config.h:80</a></div></div>
<div class="ttc" id="classshaka_1_1media_1_1Nalu_html_abe782e4298e7add8ce0a1c33e66cfcdb"><div class="ttname"><a href="../../d6/dff/classshaka_1_1media_1_1Nalu.html#abe782e4298e7add8ce0a1c33e66cfcdb">shaka::media::Nalu::payload_size</a></div><div class="ttdeci">uint64_t payload_size() const</div><div class="ttdoc">Size of this Nalu minus header_size(). </div><div class="ttdef"><b>Definition:</b> <a href="../../d4/d87/nalu__reader_8h_source.html#l00102">nalu_reader.h:102</a></div></div>
</div><!-- fragment --></div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Wed May 23 2018 16:10:48 for Shaka Packager SDK by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="../../doxygen.png" alt="doxygen"/>
</a> 1.8.13
</small></address>
</body>
</html>