1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
|
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "WMFClearKeyInputTrustAuthority.h"
#include <mfapi.h>
#include <mferror.h>
#include "WMFClearKeyActivate.h"
#include "WMFClearKeyCDM.h"
// #include "WMFClearKeyDecryptor.h"
#include "WMFClearKeyUtils.h"
#include "WMFClearKeyOutputPolicy.h"
namespace mozilla {
using Microsoft::WRL::ComPtr;
using Microsoft::WRL::MakeAndInitialize;
HRESULT WMFClearKeyInputTrustAuthority::RuntimeClassInitialize(
UINT32 aStreamId, SessionManagerWrapper* aSessionManager) {
ENTRY_LOG();
mSessionManager = aSessionManager;
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::GetDecrypter(REFIID aRiid,
void** aPpv) {
ENTRY_LOG();
ComPtr<IMFTransform> decryptor;
// TODO : As currently we are still not able to make decryption working in the
// media foundation pipeline, we will finish the implementation for
// WMFClearKeyDecryptor later.
// RETURN_IF_FAILED((MakeAndInitialize<WMFClearKeyDecryptor, IMFTransform>(
// &decryptor, mSessionManager)));
RETURN_IF_FAILED(decryptor.CopyTo(aRiid, aPpv));
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::RequestAccess(
MFPOLICYMANAGER_ACTION aAction, IMFActivate** aContentEnablerActivate) {
ENTRY_LOG_ARGS("aAction=%d", aAction);
// The ITA only allows the PLAY, EXTRACT and NO actions
// NOTE: Topology created only on the basis of EXTRACT or NO action will NOT
// decrypt content.
if (PEACTION_EXTRACT == aAction || PEACTION_NO == aAction) {
return S_OK;
}
if (PEACTION_PLAY != aAction) {
ENTRY_LOG_ARGS("Unsupported action");
return MF_E_ITA_UNSUPPORTED_ACTION;
}
ComPtr<IMFActivate> activate;
RETURN_IF_FAILED(MakeAndInitialize<WMFClearKeyActivate>(&activate));
*aContentEnablerActivate = activate.Detach();
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::GetPolicy(
MFPOLICYMANAGER_ACTION aAction, IMFOutputPolicy** aPolicy) {
ENTRY_LOG();
// For testing purpose, we don't need to set the output policy/
*aPolicy = nullptr;
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::BindAccess(
MFINPUTTRUSTAUTHORITY_ACCESS_PARAMS* aParams) {
ENTRY_LOG();
if (aParams == nullptr || aParams->dwVer != 0) {
return E_INVALIDARG;
}
for (DWORD i = 0; i < aParams->cActions; ++i) {
MFPOLICYMANAGER_ACTION action = aParams->rgOutputActions[i].Action;
if (action != PEACTION_PLAY && action != PEACTION_EXTRACT &&
action != PEACTION_NO) {
ENTRY_LOG_ARGS("Unexpected action!");
return MF_E_UNEXPECTED;
}
}
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::UpdateAccess(
MFINPUTTRUSTAUTHORITY_ACCESS_PARAMS* aParams) {
ENTRY_LOG();
return BindAccess(aParams);
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::Reset() {
NOT_IMPLEMENTED();
return E_NOTIMPL;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::GetShutdownStatus(
MFSHUTDOWN_STATUS* aStatus) {
ENTRY_LOG();
// https://learn.microsoft.com/en-us/windows/win32/api/mfidl/nf-mfidl-imfshutdown-getshutdownstatus#return-value
if (mSessionManager->IsShutdown()) {
return MF_E_INVALIDREQUEST;
}
return S_OK;
}
STDMETHODIMP WMFClearKeyInputTrustAuthority::Shutdown() {
ENTRY_LOG();
if (mSessionManager->IsShutdown()) {
return MF_E_SHUTDOWN;
}
mSessionManager->Shutdown();
return S_OK;
}
} // namespace mozilla
|