OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "webkit/media/crypto/ppapi_decryptor.h" | 5 #include "webkit/media/crypto/ppapi_decryptor.h" |
6 | 6 |
| 7 #include <string> |
| 8 |
| 9 #include "base/bind.h" |
| 10 #include "base/location.h" |
7 #include "base/logging.h" | 11 #include "base/logging.h" |
| 12 #include "base/message_loop.h" |
| 13 #include "base/message_loop_proxy.h" |
8 #include "media/base/decoder_buffer.h" | 14 #include "media/base/decoder_buffer.h" |
9 #include "media/base/decryptor_client.h" | 15 #include "media/base/decryptor_client.h" |
10 #include "webkit/media/crypto/key_systems.h" | 16 #include "webkit/media/crypto/key_systems.h" |
11 #include "webkit/plugins/ppapi/ppapi_plugin_instance.h" | 17 #include "webkit/plugins/ppapi/ppapi_plugin_instance.h" |
12 | 18 |
13 namespace webkit_media { | 19 namespace webkit_media { |
14 | 20 |
15 PpapiDecryptor::PpapiDecryptor( | 21 PpapiDecryptor::PpapiDecryptor( |
16 media::DecryptorClient* client, | 22 media::DecryptorClient* client, |
17 const scoped_refptr<webkit::ppapi::PluginInstance>& plugin_instance) | 23 const scoped_refptr<webkit::ppapi::PluginInstance>& plugin_instance) |
18 : client_(client), | 24 : client_(client), |
19 cdm_plugin_(plugin_instance) { | 25 cdm_plugin_(plugin_instance), |
| 26 render_loop_proxy_(base::MessageLoopProxy::current()) { |
| 27 DCHECK(client_); |
| 28 DCHECK(cdm_plugin_); |
| 29 cdm_plugin_->set_decrypt_client(client); |
20 } | 30 } |
21 | 31 |
22 PpapiDecryptor::~PpapiDecryptor() { | 32 PpapiDecryptor::~PpapiDecryptor() { |
23 } | 33 } |
24 | 34 |
25 void PpapiDecryptor::GenerateKeyRequest(const std::string& key_system, | 35 void PpapiDecryptor::GenerateKeyRequest(const std::string& key_system, |
26 const uint8* init_data, | 36 const uint8* init_data, |
27 int init_data_length) { | 37 int init_data_length) { |
| 38 DVLOG(1) << "GenerateKeyRequest()"; |
| 39 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
28 DCHECK(cdm_plugin_); | 40 DCHECK(cdm_plugin_); |
29 // TODO(xhwang): Enable the following once we have updated PluginInstance. | 41 |
30 // if (!cdm_plugin_->GenerateKeyRequest(key_system, | 42 // TODO(xhwang): Finalize the data type for |init_data| to avoid unnecessary |
31 // init_data, init_data_length)) { | 43 // data type conversions. |
32 // client_->KeyError(key_system, "", media::Decryptor::kUnknownError, 0); | 44 if (!cdm_plugin_->GenerateKeyRequest( |
33 // } | 45 key_system, |
| 46 std::string(reinterpret_cast<const char*>(init_data), |
| 47 init_data_length))) { |
| 48 ReportFailureToCallPlugin(key_system, ""); |
| 49 } |
34 } | 50 } |
35 | 51 |
36 void PpapiDecryptor::AddKey(const std::string& key_system, | 52 void PpapiDecryptor::AddKey(const std::string& key_system, |
37 const uint8* key, | 53 const uint8* key, |
38 int key_length, | 54 int key_length, |
39 const uint8* init_data, | 55 const uint8* init_data, |
40 int init_data_length, | 56 int init_data_length, |
41 const std::string& session_id) { | 57 const std::string& session_id) { |
| 58 DVLOG(1) << "AddKey()"; |
| 59 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
42 DCHECK(cdm_plugin_); | 60 DCHECK(cdm_plugin_); |
43 // TODO(xhwang): Enable the following once we have updated PluginInstance. | 61 |
44 // if (!cdm_plugin_->AddKey(key_system, key, key_length, | 62 if (!cdm_plugin_->AddKey(session_id, |
45 // init_data, init_data_length, session_id)) { | 63 std::string(reinterpret_cast<const char*>(key), |
46 // client_->KeyError(key_system, session_id, Decryptor::kUnknownError, 0); | 64 key_length), |
47 // } | 65 std::string(reinterpret_cast<const char*>(init_data), |
| 66 init_data_length))) { |
| 67 ReportFailureToCallPlugin(key_system, session_id); |
| 68 } |
48 } | 69 } |
49 | 70 |
50 void PpapiDecryptor::CancelKeyRequest(const std::string& key_system, | 71 void PpapiDecryptor::CancelKeyRequest(const std::string& key_system, |
51 const std::string& session_id) { | 72 const std::string& session_id) { |
| 73 DVLOG(1) << "CancelKeyRequest()"; |
| 74 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
52 DCHECK(cdm_plugin_); | 75 DCHECK(cdm_plugin_); |
53 // TODO(xhwang): Enable the following once we have updated PluginInstance. | 76 |
54 // if (!cdm_plugin_->CancelKeyRequest(key_system, session_id)) | 77 if (!cdm_plugin_->CancelKeyRequest(session_id)) |
55 // client_->KeyError(key_system, session_id, Decryptor::kUnknownError, 0); | 78 ReportFailureToCallPlugin(key_system, session_id); |
56 } | 79 } |
57 | 80 |
58 void PpapiDecryptor::Decrypt( | 81 void PpapiDecryptor::Decrypt( |
59 const scoped_refptr<media::DecoderBuffer>& encrypted, | 82 const scoped_refptr<media::DecoderBuffer>& encrypted, |
60 const DecryptCB& decrypt_cb) { | 83 const DecryptCB& decrypt_cb) { |
61 DCHECK(cdm_plugin_); | 84 DVLOG(1) << "Decrypt()"; |
62 // TODO(xhwang): Enable the following once we have updated PluginInstance. | 85 if (!render_loop_proxy_->BelongsToCurrentThread()) { |
63 // TODO(xhwang): Need to figure out thread safety about PPP calls. | 86 render_loop_proxy_->PostTask( |
64 // if (!cdm_plugin_->Decrypt( | 87 FROM_HERE, |
65 // encrypted, base::Bind(&PpapiDecryptor::DataReady, this, decrypt_cb))) { | 88 base::Bind(&PpapiDecryptor::Decrypt, base::Unretained(this), |
66 // decrypt_cb.Run(kError, NULL); | 89 encrypted, decrypt_cb)); |
67 // } | 90 return; |
| 91 } |
| 92 |
| 93 if (!cdm_plugin_->Decrypt(encrypted, decrypt_cb)) |
| 94 decrypt_cb.Run(kError, NULL); |
68 } | 95 } |
69 | 96 |
70 void PpapiDecryptor::Stop() { | 97 void PpapiDecryptor::Stop() { |
71 } | 98 } |
72 | 99 |
73 void PpapiDecryptor::DataReady(const DecryptCB& decrypt_cb, | 100 void PpapiDecryptor::ReportFailureToCallPlugin(const std::string& key_system, |
74 const uint8* data, int data_size ) { | 101 const std::string& session_id) { |
75 DCHECK(!decrypt_cb.is_null()); | 102 DVLOG(1) << "Failed to call plugin."; |
76 scoped_refptr<media::DecoderBuffer> decrypted_data = | 103 client_->KeyError(key_system, session_id, kUnknownError, 0); |
77 media::DecoderBuffer::CopyFrom(data, data_size); | |
78 decrypt_cb.Run(kSuccess, decrypted_data); | |
79 } | 104 } |
80 | 105 |
81 } // namespace webkit_media | 106 } // namespace webkit_media |
OLD | NEW |