/* * Copyright 2015, Mozilla Foundation and contributors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef __ClearKeyUtils_h__ #define __ClearKeyUtils_h__ #include // stdef.h is required for content_decryption_module to work on Unix systems. #include #include #include #include #include "content_decryption_module.h" #include "pk11pub.h" #include "mozilla/Span.h" #if 0 void CK_Log(const char* aFmt, ...); # define CK_LOGE(...) CK_Log(__VA_ARGS__) # define CK_LOGD(...) CK_Log(__VA_ARGS__) # define CK_LOGW(...) CK_Log(__VA_ARGS__) # define CK_LOGARRAY(APREPEND, ADATA, ADATA_SIZE) \ CK_LogArray(APREPEND, ADATA, ADATA_SIZE) #else // Note: Enabling logging slows things down a LOT, especially when logging to // a file. # define CK_LOGE(...) # define CK_LOGD(...) # define CK_LOGW(...) # define CK_LOGARRAY(APREPEND, ADATA, ADATA_SIZE) #endif typedef std::vector KeyId; typedef std::vector Key; // The session response size should be within a reasonable limit. // The size 64 KB is referenced from web-platform-test. static const uint32_t kMaxSessionResponseLength = 65536; // Provide limitation for KeyIds length and webm initData size. static const uint32_t kMaxWebmInitDataSize = 65536; static const uint32_t kMaxKeyIdsLength = 512; void CK_LogArray(const char* aPrepend, const uint8_t* aData, const uint32_t aDataSize); struct KeyIdPair { KeyId mKeyId; Key mKey; }; class ClearKeyUtils { public: static bool DecryptCbcs(const std::vector& aKey, const std::vector& aIV, mozilla::Span aSubsampleEncryptedRange, uint32_t aCryptByteBlocks, uint32_t aSkipByteBlocks); static bool DecryptAES(const std::vector& aKey, std::vector& aData, std::vector& aIV); static bool ParseKeyIdsInitData(const uint8_t* aInitData, uint32_t aInitDataSize, std::vector& aOutKeyIds); static void MakeKeyRequest(const std::vector& aKeyIds, std::string& aOutRequest, cdm::SessionType aSessionType); static bool ParseJWK(const uint8_t* aKeyData, uint32_t aKeyDataSize, std::vector& aOutKeys, cdm::SessionType aSessionType); static const char* SessionTypeToString(cdm::SessionType aSessionType); static bool IsValidSessionId(const char* aBuff, uint32_t aLength); static std::string ToHexString(const uint8_t* aBytes, uint32_t aLength); }; template inline bool Contains(const Container& aContainer, const Element& aElement) { return aContainer.find(aElement) != aContainer.end(); } template inline void Assign(std::vector& aVec, const T* aData, size_t aLength) { aVec.assign(aData, aData + aLength); } #endif // __ClearKeyUtils_h__