Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(240)

Unified Diff: media/crypto/aes_decryptor.cc

Issue 22362007: Relocate last remnants of webkit/renderer/media code. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Make chromeos crypto dep explicit. Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « media/crypto/aes_decryptor.h ('k') | media/crypto/aes_decryptor_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: media/crypto/aes_decryptor.cc
diff --git a/media/crypto/aes_decryptor.cc b/media/crypto/aes_decryptor.cc
deleted file mode 100644
index fd7c628066c55b5eb58fdaaed53773e62485193a..0000000000000000000000000000000000000000
--- a/media/crypto/aes_decryptor.cc
+++ /dev/null
@@ -1,345 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "media/crypto/aes_decryptor.h"
-
-#include <vector>
-
-#include "base/logging.h"
-#include "base/stl_util.h"
-#include "base/strings/string_number_conversions.h"
-#include "crypto/encryptor.h"
-#include "crypto/symmetric_key.h"
-#include "media/base/audio_decoder_config.h"
-#include "media/base/decoder_buffer.h"
-#include "media/base/decrypt_config.h"
-#include "media/base/video_decoder_config.h"
-#include "media/base/video_frame.h"
-
-namespace media {
-
-uint32 AesDecryptor::next_session_id_ = 1;
-
-enum ClearBytesBufferSel {
- kSrcContainsClearBytes,
- kDstContainsClearBytes
-};
-
-static void CopySubsamples(const std::vector<SubsampleEntry>& subsamples,
- const ClearBytesBufferSel sel,
- const uint8* src,
- uint8* dst) {
- for (size_t i = 0; i < subsamples.size(); i++) {
- const SubsampleEntry& subsample = subsamples[i];
- if (sel == kSrcContainsClearBytes) {
- src += subsample.clear_bytes;
- } else {
- dst += subsample.clear_bytes;
- }
- memcpy(dst, src, subsample.cypher_bytes);
- src += subsample.cypher_bytes;
- dst += subsample.cypher_bytes;
- }
-}
-
-// Decrypts |input| using |key|. Returns a DecoderBuffer with the decrypted
-// data if decryption succeeded or NULL if decryption failed.
-static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input,
- crypto::SymmetricKey* key) {
- CHECK(input.data_size());
- CHECK(input.decrypt_config());
- CHECK(key);
-
- crypto::Encryptor encryptor;
- if (!encryptor.Init(key, crypto::Encryptor::CTR, "")) {
- DVLOG(1) << "Could not initialize decryptor.";
- return NULL;
- }
-
- DCHECK_EQ(input.decrypt_config()->iv().size(),
- static_cast<size_t>(DecryptConfig::kDecryptionKeySize));
- if (!encryptor.SetCounter(input.decrypt_config()->iv())) {
- DVLOG(1) << "Could not set counter block.";
- return NULL;
- }
-
- const int data_offset = input.decrypt_config()->data_offset();
- const char* sample =
- reinterpret_cast<const char*>(input.data() + data_offset);
- int sample_size = input.data_size() - data_offset;
-
- DCHECK_GT(sample_size, 0) << "No sample data to be decrypted.";
- if (sample_size <= 0)
- return NULL;
-
- if (input.decrypt_config()->subsamples().empty()) {
- std::string decrypted_text;
- base::StringPiece encrypted_text(sample, sample_size);
- if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
- DVLOG(1) << "Could not decrypt data.";
- return NULL;
- }
-
- // TODO(xhwang): Find a way to avoid this data copy.
- return DecoderBuffer::CopyFrom(
- reinterpret_cast<const uint8*>(decrypted_text.data()),
- decrypted_text.size());
- }
-
- const std::vector<SubsampleEntry>& subsamples =
- input.decrypt_config()->subsamples();
-
- int total_clear_size = 0;
- int total_encrypted_size = 0;
- for (size_t i = 0; i < subsamples.size(); i++) {
- total_clear_size += subsamples[i].clear_bytes;
- total_encrypted_size += subsamples[i].cypher_bytes;
- }
- if (total_clear_size + total_encrypted_size != sample_size) {
- DVLOG(1) << "Subsample sizes do not equal input size";
- return NULL;
- }
-
- // No need to decrypt if there is no encrypted data.
- if (total_encrypted_size <= 0) {
- return DecoderBuffer::CopyFrom(reinterpret_cast<const uint8*>(sample),
- sample_size);
- }
-
- // The encrypted portions of all subsamples must form a contiguous block,
- // such that an encrypted subsample that ends away from a block boundary is
- // immediately followed by the start of the next encrypted subsample. We
- // copy all encrypted subsamples to a contiguous buffer, decrypt them, then
- // copy the decrypted bytes over the encrypted bytes in the output.
- // TODO(strobe): attempt to reduce number of memory copies
- scoped_ptr<uint8[]> encrypted_bytes(new uint8[total_encrypted_size]);
- CopySubsamples(subsamples, kSrcContainsClearBytes,
- reinterpret_cast<const uint8*>(sample), encrypted_bytes.get());
-
- base::StringPiece encrypted_text(
- reinterpret_cast<const char*>(encrypted_bytes.get()),
- total_encrypted_size);
- std::string decrypted_text;
- if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
- DVLOG(1) << "Could not decrypt data.";
- return NULL;
- }
- DCHECK_EQ(decrypted_text.size(), encrypted_text.size());
-
- scoped_refptr<DecoderBuffer> output = DecoderBuffer::CopyFrom(
- reinterpret_cast<const uint8*>(sample), sample_size);
- CopySubsamples(subsamples, kDstContainsClearBytes,
- reinterpret_cast<const uint8*>(decrypted_text.data()),
- output->writable_data());
- return output;
-}
-
-AesDecryptor::AesDecryptor(const KeyAddedCB& key_added_cb,
- const KeyErrorCB& key_error_cb,
- const KeyMessageCB& key_message_cb)
- : key_added_cb_(key_added_cb),
- key_error_cb_(key_error_cb),
- key_message_cb_(key_message_cb) {
-}
-
-AesDecryptor::~AesDecryptor() {
- STLDeleteValues(&key_map_);
-}
-
-bool AesDecryptor::GenerateKeyRequest(const std::string& type,
- const uint8* init_data,
- int init_data_length) {
- std::string session_id_string(base::UintToString(next_session_id_++));
-
- // For now, the AesDecryptor does not care about |type|;
- // just fire the event with the |init_data| as the request.
- std::vector<uint8> message;
- if (init_data && init_data_length)
- message.assign(init_data, init_data + init_data_length);
-
- key_message_cb_.Run(session_id_string, message, std::string());
- return true;
-}
-
-void AesDecryptor::AddKey(const uint8* key,
- int key_length,
- const uint8* init_data,
- int init_data_length,
- const std::string& session_id) {
- CHECK(key);
- CHECK_GT(key_length, 0);
-
- // TODO(xhwang): Add |session_id| check after we figure out how:
- // https://www.w3.org/Bugs/Public/show_bug.cgi?id=16550
- if (key_length != DecryptConfig::kDecryptionKeySize) {
- DVLOG(1) << "Invalid key length: " << key_length;
- key_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
- return;
- }
-
- // TODO(xhwang): Fix the decryptor to accept no |init_data|. See
- // http://crbug.com/123265. Until then, ensure a non-empty value is passed.
- static const uint8 kDummyInitData[1] = { 0 };
- if (!init_data) {
- init_data = kDummyInitData;
- init_data_length = arraysize(kDummyInitData);
- }
-
- // TODO(xhwang): For now, use |init_data| for key ID. Make this more spec
- // compliant later (http://crbug.com/123262, http://crbug.com/123265).
- std::string key_id_string(reinterpret_cast<const char*>(init_data),
- init_data_length);
- std::string key_string(reinterpret_cast<const char*>(key) , key_length);
- scoped_ptr<DecryptionKey> decryption_key(new DecryptionKey(key_string));
- if (!decryption_key) {
- DVLOG(1) << "Could not create key.";
- key_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
- return;
- }
-
- if (!decryption_key->Init()) {
- DVLOG(1) << "Could not initialize decryption key.";
- key_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
- return;
- }
-
- SetKey(key_id_string, decryption_key.Pass());
-
- if (!new_audio_key_cb_.is_null())
- new_audio_key_cb_.Run();
-
- if (!new_video_key_cb_.is_null())
- new_video_key_cb_.Run();
-
- key_added_cb_.Run(session_id);
-}
-
-void AesDecryptor::CancelKeyRequest(const std::string& session_id) {
-}
-
-Decryptor* AesDecryptor::GetDecryptor() {
- return this;
-}
-
-void AesDecryptor::RegisterNewKeyCB(StreamType stream_type,
- const NewKeyCB& new_key_cb) {
- switch (stream_type) {
- case kAudio:
- new_audio_key_cb_ = new_key_cb;
- break;
- case kVideo:
- new_video_key_cb_ = new_key_cb;
- break;
- default:
- NOTREACHED();
- }
-}
-
-void AesDecryptor::Decrypt(StreamType stream_type,
- const scoped_refptr<DecoderBuffer>& encrypted,
- const DecryptCB& decrypt_cb) {
- CHECK(encrypted->decrypt_config());
-
- scoped_refptr<DecoderBuffer> decrypted;
- // An empty iv string signals that the frame is unencrypted.
- if (encrypted->decrypt_config()->iv().empty()) {
- int data_offset = encrypted->decrypt_config()->data_offset();
- decrypted = DecoderBuffer::CopyFrom(encrypted->data() + data_offset,
- encrypted->data_size() - data_offset);
- } else {
- const std::string& key_id = encrypted->decrypt_config()->key_id();
- DecryptionKey* key = GetKey(key_id);
- if (!key) {
- DVLOG(1) << "Could not find a matching key for the given key ID.";
- decrypt_cb.Run(kNoKey, NULL);
- return;
- }
-
- crypto::SymmetricKey* decryption_key = key->decryption_key();
- decrypted = DecryptData(*encrypted.get(), decryption_key);
- if (!decrypted.get()) {
- DVLOG(1) << "Decryption failed.";
- decrypt_cb.Run(kError, NULL);
- return;
- }
- }
-
- decrypted->set_timestamp(encrypted->timestamp());
- decrypted->set_duration(encrypted->duration());
- decrypt_cb.Run(kSuccess, decrypted);
-}
-
-void AesDecryptor::CancelDecrypt(StreamType stream_type) {
- // Decrypt() calls the DecryptCB synchronously so there's nothing to cancel.
-}
-
-void AesDecryptor::InitializeAudioDecoder(const AudioDecoderConfig& config,
- const DecoderInitCB& init_cb) {
- // AesDecryptor does not support audio decoding.
- init_cb.Run(false);
-}
-
-void AesDecryptor::InitializeVideoDecoder(const VideoDecoderConfig& config,
- const DecoderInitCB& init_cb) {
- // AesDecryptor does not support video decoding.
- init_cb.Run(false);
-}
-
-void AesDecryptor::DecryptAndDecodeAudio(
- const scoped_refptr<DecoderBuffer>& encrypted,
- const AudioDecodeCB& audio_decode_cb) {
- NOTREACHED() << "AesDecryptor does not support audio decoding";
-}
-
-void AesDecryptor::DecryptAndDecodeVideo(
- const scoped_refptr<DecoderBuffer>& encrypted,
- const VideoDecodeCB& video_decode_cb) {
- NOTREACHED() << "AesDecryptor does not support video decoding";
-}
-
-void AesDecryptor::ResetDecoder(StreamType stream_type) {
- NOTREACHED() << "AesDecryptor does not support audio/video decoding";
-}
-
-void AesDecryptor::DeinitializeDecoder(StreamType stream_type) {
- NOTREACHED() << "AesDecryptor does not support audio/video decoding";
-}
-
-void AesDecryptor::SetKey(const std::string& key_id,
- scoped_ptr<DecryptionKey> decryption_key) {
- base::AutoLock auto_lock(key_map_lock_);
- KeyMap::iterator found = key_map_.find(key_id);
- if (found != key_map_.end()) {
- delete found->second;
- key_map_.erase(found);
- }
- key_map_[key_id] = decryption_key.release();
-}
-
-AesDecryptor::DecryptionKey* AesDecryptor::GetKey(
- const std::string& key_id) const {
- base::AutoLock auto_lock(key_map_lock_);
- KeyMap::const_iterator found = key_map_.find(key_id);
- if (found == key_map_.end())
- return NULL;
-
- return found->second;
-}
-
-AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret)
- : secret_(secret) {
-}
-
-AesDecryptor::DecryptionKey::~DecryptionKey() {}
-
-bool AesDecryptor::DecryptionKey::Init() {
- CHECK(!secret_.empty());
- decryption_key_.reset(crypto::SymmetricKey::Import(
- crypto::SymmetricKey::AES, secret_));
- if (!decryption_key_)
- return false;
- return true;
-}
-
-} // namespace media
« no previous file with comments | « media/crypto/aes_decryptor.h ('k') | media/crypto/aes_decryptor_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698