1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
/*
* Copyright 2015, Mozilla Foundation and contributors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef __ClearKeyDecryptionManager_h__
#define __ClearKeyDecryptionManager_h__
// This include is required in order for content_decryption_module to work
// on Unix systems.
#include <stddef.h>
#include <map>
#include "content_decryption_module.h"
#include "ClearKeyUtils.h"
#include "RefCounted.h"
class ClearKeyDecryptor;
class CryptoMetaData {
public:
CryptoMetaData() = default;
explicit CryptoMetaData(const cdm::InputBuffer_2* aInputBuffer) {
Init(aInputBuffer);
}
void Init(const cdm::InputBuffer_2* aInputBuffer) {
if (!aInputBuffer) {
assert(!IsValid());
return;
}
mEncryptionScheme = aInputBuffer->encryption_scheme;
Assign(mKeyId, aInputBuffer->key_id, aInputBuffer->key_id_size);
Assign(mIV, aInputBuffer->iv, aInputBuffer->iv_size);
mCryptByteBlock = aInputBuffer->pattern.crypt_byte_block;
mSkipByteBlock = aInputBuffer->pattern.skip_byte_block;
for (uint32_t i = 0; i < aInputBuffer->num_subsamples; ++i) {
const cdm::SubsampleEntry& subsample = aInputBuffer->subsamples[i];
mClearBytes.push_back(subsample.clear_bytes);
mCipherBytes.push_back(subsample.cipher_bytes);
}
}
bool IsValid() const {
return !mKeyId.empty() && !mIV.empty() && !mCipherBytes.empty() &&
!mClearBytes.empty();
}
size_t NumSubsamples() const {
assert(mClearBytes.size() == mCipherBytes.size());
return mClearBytes.size();
}
cdm::EncryptionScheme mEncryptionScheme;
std::vector<uint8_t> mKeyId;
std::vector<uint8_t> mIV;
uint32_t mCryptByteBlock;
uint32_t mSkipByteBlock;
std::vector<uint32_t> mClearBytes;
std::vector<uint32_t> mCipherBytes;
};
class ClearKeyDecryptionManager : public RefCounted {
private:
ClearKeyDecryptionManager();
~ClearKeyDecryptionManager();
static ClearKeyDecryptionManager* sInstance;
public:
static ClearKeyDecryptionManager* Get();
bool HasSeenKeyId(const KeyId& aKeyId) const;
bool HasKeyForKeyId(const KeyId& aKeyId) const;
const Key& GetDecryptionKey(const KeyId& aKeyId);
// Create a decryptor for the given KeyId if one does not already exist.
void InitKey(KeyId aKeyId, Key aKey);
void ExpectKeyId(KeyId aKeyId);
void ReleaseKeyId(KeyId aKeyId);
// Decrypts buffer *in place*.
cdm::Status Decrypt(uint8_t* aBuffer, uint32_t aBufferSize,
const CryptoMetaData& aMetadata);
cdm::Status Decrypt(std::vector<uint8_t>& aBuffer,
const CryptoMetaData& aMetadata);
private:
bool IsExpectingKeyForKeyId(const KeyId& aKeyId) const;
std::map<KeyId, ClearKeyDecryptor*> mDecryptors;
};
#endif // __ClearKeyDecryptionManager_h__
|