1746 lines
80 KiB
C++
1746 lines
80 KiB
C++
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#ifndef CDM_CONTENT_DECRYPTION_MODULE_H_
|
|
#define CDM_CONTENT_DECRYPTION_MODULE_H_
|
|
|
|
#include <type_traits>
|
|
|
|
#include "content_decryption_module_export.h"
|
|
|
|
#if defined(_MSC_VER)
|
|
typedef unsigned char uint8_t;
|
|
typedef unsigned int uint32_t;
|
|
typedef int int32_t;
|
|
typedef __int64 int64_t;
|
|
#else
|
|
#include <stdint.h>
|
|
#endif
|
|
|
|
// The version number must be rolled when the exported functions are updated!
|
|
// If the CDM and the adapter use different versions of these functions, the
|
|
// adapter will fail to load or crash!
|
|
#define CDM_MODULE_VERSION 4
|
|
|
|
// Build the versioned entrypoint name.
|
|
// The extra macros are necessary to expand version to an actual value.
|
|
#define INITIALIZE_CDM_MODULE \
|
|
BUILD_ENTRYPOINT(InitializeCdmModule, CDM_MODULE_VERSION)
|
|
#define BUILD_ENTRYPOINT(name, version) \
|
|
BUILD_ENTRYPOINT_NO_EXPANSION(name, version)
|
|
#define BUILD_ENTRYPOINT_NO_EXPANSION(name, version) name##_##version
|
|
|
|
// Macro to check that |type| does the following:
|
|
// 1. is a standard layout.
|
|
// 2. is trivial.
|
|
// 3. sizeof(type) matches the expected size in bytes. As some types contain
|
|
// pointers, the size is specified for both 32 and 64 bit.
|
|
#define CHECK_TYPE(type, size_32, size_64) \
|
|
static_assert(std::is_standard_layout<type>(), \
|
|
#type " not standard_layout"); \
|
|
static_assert(std::is_trivial<type>(), #type " not trivial"); \
|
|
static_assert((sizeof(void*) == 4 && sizeof(type) == size_32) || \
|
|
(sizeof(void*) == 8 && sizeof(type) == size_64), \
|
|
#type " size mismatch")
|
|
|
|
extern "C" {
|
|
|
|
CDM_API void INITIALIZE_CDM_MODULE();
|
|
|
|
CDM_API void DeinitializeCdmModule();
|
|
|
|
// Returns a pointer to the requested CDM Host interface upon success.
|
|
// Returns NULL if the requested CDM Host interface is not supported.
|
|
// The caller should cast the returned pointer to the type matching
|
|
// |host_interface_version|.
|
|
typedef void* (*GetCdmHostFunc)(int host_interface_version, void* user_data);
|
|
|
|
// Returns a pointer to the requested CDM upon success.
|
|
// Returns NULL if an error occurs or the requested |cdm_interface_version| or
|
|
// |key_system| is not supported or another error occurs.
|
|
// The caller should cast the returned pointer to the type matching
|
|
// |cdm_interface_version|.
|
|
// Caller retains ownership of arguments and must call Destroy() on the returned
|
|
// object.
|
|
CDM_API void* CreateCdmInstance(int cdm_interface_version,
|
|
const char* key_system,
|
|
uint32_t key_system_size,
|
|
GetCdmHostFunc get_cdm_host_func,
|
|
void* user_data);
|
|
|
|
CDM_API const char* GetCdmVersion();
|
|
|
|
} // extern "C"
|
|
|
|
namespace cdm {
|
|
|
|
enum Status : uint32_t {
|
|
kSuccess = 0,
|
|
kNeedMoreData, // Decoder needs more data to produce a decoded frame/sample.
|
|
kNoKey, // The required decryption key is not available.
|
|
kInitializationError, // Initialization error.
|
|
kDecryptError, // Decryption failed.
|
|
kDecodeError, // Error decoding audio or video.
|
|
kDeferredInitialization // Decoder is not ready for initialization.
|
|
};
|
|
CHECK_TYPE(Status, 4, 4);
|
|
|
|
// Exceptions used by the CDM to reject promises.
|
|
// https://w3c.github.io/encrypted-media/#exceptions
|
|
enum Exception : uint32_t {
|
|
kExceptionTypeError,
|
|
kExceptionNotSupportedError,
|
|
kExceptionInvalidStateError,
|
|
kExceptionQuotaExceededError
|
|
};
|
|
CHECK_TYPE(Exception, 4, 4);
|
|
|
|
// The encryption scheme. The definitions are from ISO/IEC 23001-7:2016.
|
|
enum class EncryptionScheme : uint32_t {
|
|
kUnencrypted = 0,
|
|
kCenc, // 'cenc' subsample encryption using AES-CTR mode.
|
|
kCbcs // 'cbcs' pattern encryption using AES-CBC mode.
|
|
};
|
|
CHECK_TYPE(EncryptionScheme, 4, 4);
|
|
|
|
// The pattern used for pattern encryption. Note that ISO/IEC 23001-7:2016
|
|
// defines each block to be 16-bytes.
|
|
struct Pattern {
|
|
uint32_t crypt_byte_block; // Count of the encrypted blocks.
|
|
uint32_t skip_byte_block; // Count of the unencrypted blocks.
|
|
};
|
|
CHECK_TYPE(Pattern, 8, 8);
|
|
|
|
enum class ColorRange : uint8_t {
|
|
kInvalid,
|
|
kLimited, // 709 color range with RGB values ranging from 16 to 235.
|
|
kFull, // Full RGB color range with RGB values from 0 to 255.
|
|
kDerived // Range is defined by |transfer_id| and |matrix_id|.
|
|
};
|
|
CHECK_TYPE(ColorRange, 1, 1);
|
|
|
|
// Described in ISO 23001-8:2016, section 7. All the IDs are in the range
|
|
// [0, 255] so 8-bit integer is sufficient. An unspecified ColorSpace should be
|
|
// {2, 2, 2, ColorRange::kInvalid}, where value 2 means "Unspecified" for all
|
|
// the IDs, as defined by the spec.
|
|
struct ColorSpace {
|
|
uint8_t primary_id; // 7.1 colour primaries, table 2
|
|
uint8_t transfer_id; // 7.2 transfer characteristics, table 3
|
|
uint8_t matrix_id; // 7.3 matrix coefficients, table 4
|
|
ColorRange range;
|
|
};
|
|
CHECK_TYPE(ColorSpace, 4, 4);
|
|
|
|
// Time is defined as the number of seconds since the Epoch
|
|
// (00:00:00 UTC, January 1, 1970), not including any added leap second.
|
|
// Also see Time definition in spec: https://w3c.github.io/encrypted-media/#time
|
|
// Note that Time is defined in millisecond accuracy in the spec but in second
|
|
// accuracy here.
|
|
typedef double Time;
|
|
|
|
// An input buffer can be split into several continuous subsamples.
|
|
// A SubsampleEntry specifies the number of clear and cipher bytes in each
|
|
// subsample. For example, the following buffer has three subsamples:
|
|
//
|
|
// |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
|
|
// | clear1 | cipher1 | clear2 | cipher2 | clear3 | cipher3 |
|
|
//
|
|
// For decryption, all of the cipher bytes in a buffer should be concatenated
|
|
// (in the subsample order) into a single logical stream. The clear bytes should
|
|
// not be considered as part of decryption.
|
|
//
|
|
// Stream to decrypt: | cipher1 | cipher2 | cipher3 |
|
|
// Decrypted stream: | decrypted1| decrypted2 | decrypted3 |
|
|
//
|
|
// After decryption, the decrypted bytes should be copied over the position
|
|
// of the corresponding cipher bytes in the original buffer to form the output
|
|
// buffer. Following the above example, the decrypted buffer should be:
|
|
//
|
|
// |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
|
|
// | clear1 | decrypted1| clear2 | decrypted2 | clear3 | decrypted3 |
|
|
//
|
|
struct SubsampleEntry {
|
|
uint32_t clear_bytes;
|
|
uint32_t cipher_bytes;
|
|
};
|
|
CHECK_TYPE(SubsampleEntry, 8, 8);
|
|
|
|
// Represents an input buffer to be decrypted (and possibly decoded). It does
|
|
// not own any pointers in this struct. If |encryption_scheme| = kUnencrypted,
|
|
// the data is unencrypted.
|
|
// Note that this struct is organized so that sizeof(InputBuffer_2)
|
|
// equals the sum of sizeof() all members in both 32-bit and 64-bit compiles.
|
|
// Padding has been added to keep the fields aligned.
|
|
struct InputBuffer_2 {
|
|
const uint8_t* data; // Pointer to the beginning of the input data.
|
|
uint32_t data_size; // Size (in bytes) of |data|.
|
|
|
|
EncryptionScheme encryption_scheme;
|
|
|
|
const uint8_t* key_id; // Key ID to identify the decryption key.
|
|
uint32_t key_id_size; // Size (in bytes) of |key_id|.
|
|
uint32_t : 32; // Padding.
|
|
|
|
const uint8_t* iv; // Initialization vector.
|
|
uint32_t iv_size; // Size (in bytes) of |iv|.
|
|
uint32_t : 32; // Padding.
|
|
|
|
const struct SubsampleEntry* subsamples;
|
|
uint32_t num_subsamples; // Number of subsamples in |subsamples|.
|
|
uint32_t : 32; // Padding.
|
|
|
|
// |pattern| is required if |encryption_scheme| specifies pattern encryption.
|
|
Pattern pattern;
|
|
|
|
int64_t timestamp; // Presentation timestamp in microseconds.
|
|
};
|
|
CHECK_TYPE(InputBuffer_2, 64, 80);
|
|
|
|
enum AudioCodec : uint32_t { kUnknownAudioCodec = 0, kCodecVorbis, kCodecAac };
|
|
CHECK_TYPE(AudioCodec, 4, 4);
|
|
|
|
struct AudioDecoderConfig_2 {
|
|
AudioCodec codec;
|
|
int32_t channel_count;
|
|
int32_t bits_per_channel;
|
|
int32_t samples_per_second;
|
|
|
|
// Optional byte data required to initialize audio decoders, such as the
|
|
// vorbis setup header.
|
|
uint8_t* extra_data;
|
|
uint32_t extra_data_size;
|
|
|
|
// Encryption scheme.
|
|
EncryptionScheme encryption_scheme;
|
|
};
|
|
CHECK_TYPE(AudioDecoderConfig_2, 28, 32);
|
|
|
|
// Supported sample formats for AudioFrames.
|
|
enum AudioFormat : uint32_t {
|
|
kUnknownAudioFormat = 0, // Unknown format value. Used for error reporting.
|
|
kAudioFormatU8, // Interleaved unsigned 8-bit w/ bias of 128.
|
|
kAudioFormatS16, // Interleaved signed 16-bit.
|
|
kAudioFormatS32, // Interleaved signed 32-bit.
|
|
kAudioFormatF32, // Interleaved float 32-bit.
|
|
kAudioFormatPlanarS16, // Signed 16-bit planar.
|
|
kAudioFormatPlanarF32, // Float 32-bit planar.
|
|
};
|
|
CHECK_TYPE(AudioFormat, 4, 4);
|
|
|
|
// Surface formats based on FOURCC labels, see: http://www.fourcc.org/yuv.php
|
|
// Values are chosen to be consistent with Chromium's VideoPixelFormat values.
|
|
enum VideoFormat : uint32_t {
|
|
kUnknownVideoFormat = 0, // Unknown format value. Used for error reporting.
|
|
kYv12 = 1, // 12bpp YVU planar 1x1 Y, 2x2 VU samples.
|
|
kI420 = 2, // 12bpp YUV planar 1x1 Y, 2x2 UV samples.
|
|
|
|
// In the following formats, each sample uses 16-bit in storage, while the
|
|
// sample value is stored in the least significant N bits where N is
|
|
// specified by the number after "P". For example, for YUV420P9, each Y, U,
|
|
// and V sample is stored in the least significant 9 bits in a 2-byte block.
|
|
kYUV420P9 = 16,
|
|
kYUV420P10 = 17,
|
|
kYUV422P9 = 18,
|
|
kYUV422P10 = 19,
|
|
kYUV444P9 = 20,
|
|
kYUV444P10 = 21,
|
|
kYUV420P12 = 22,
|
|
kYUV422P12 = 23,
|
|
kYUV444P12 = 24,
|
|
};
|
|
CHECK_TYPE(VideoFormat, 4, 4);
|
|
|
|
struct Size {
|
|
int32_t width;
|
|
int32_t height;
|
|
};
|
|
CHECK_TYPE(Size, 8, 8);
|
|
|
|
enum VideoCodec : uint32_t {
|
|
kUnknownVideoCodec = 0,
|
|
kCodecVp8,
|
|
kCodecH264,
|
|
kCodecVp9,
|
|
kCodecAv1
|
|
};
|
|
CHECK_TYPE(VideoCodec, 4, 4);
|
|
|
|
enum VideoCodecProfile : uint32_t {
|
|
kUnknownVideoCodecProfile = 0,
|
|
kProfileNotNeeded,
|
|
kH264ProfileBaseline,
|
|
kH264ProfileMain,
|
|
kH264ProfileExtended,
|
|
kH264ProfileHigh,
|
|
kH264ProfileHigh10,
|
|
kH264ProfileHigh422,
|
|
kH264ProfileHigh444Predictive,
|
|
kVP9Profile0,
|
|
kVP9Profile1,
|
|
kVP9Profile2,
|
|
kVP9Profile3,
|
|
kAv1ProfileMain,
|
|
kAv1ProfileHigh,
|
|
kAv1ProfilePro
|
|
};
|
|
CHECK_TYPE(VideoCodecProfile, 4, 4);
|
|
|
|
// Deprecated: New CDM implementations should use VideoDecoderConfig_3.
|
|
// Note that this struct is organized so that sizeof(VideoDecoderConfig_2)
|
|
// equals the sum of sizeof() all members in both 32-bit and 64-bit compiles.
|
|
// Padding has been added to keep the fields aligned.
|
|
struct VideoDecoderConfig_2 {
|
|
VideoCodec codec;
|
|
VideoCodecProfile profile;
|
|
VideoFormat format;
|
|
uint32_t : 32; // Padding.
|
|
|
|
// Width and height of video frame immediately post-decode. Not all pixels
|
|
// in this region are valid.
|
|
Size coded_size;
|
|
|
|
// Optional byte data required to initialize video decoders, such as H.264
|
|
// AAVC data.
|
|
uint8_t* extra_data;
|
|
uint32_t extra_data_size;
|
|
|
|
// Encryption scheme.
|
|
EncryptionScheme encryption_scheme;
|
|
};
|
|
CHECK_TYPE(VideoDecoderConfig_2, 36, 40);
|
|
|
|
struct VideoDecoderConfig_3 {
|
|
VideoCodec codec;
|
|
VideoCodecProfile profile;
|
|
VideoFormat format;
|
|
ColorSpace color_space;
|
|
|
|
// Width and height of video frame immediately post-decode. Not all pixels
|
|
// in this region are valid.
|
|
Size coded_size;
|
|
|
|
// Optional byte data required to initialize video decoders, such as H.264
|
|
// AAVC data.
|
|
uint8_t* extra_data;
|
|
uint32_t extra_data_size;
|
|
|
|
EncryptionScheme encryption_scheme;
|
|
};
|
|
CHECK_TYPE(VideoDecoderConfig_3, 36, 40);
|
|
|
|
enum StreamType : uint32_t { kStreamTypeAudio = 0, kStreamTypeVideo = 1 };
|
|
CHECK_TYPE(StreamType, 4, 4);
|
|
|
|
// Structure provided to ContentDecryptionModule::OnPlatformChallengeResponse()
|
|
// after a platform challenge was initiated via Host::SendPlatformChallenge().
|
|
// All values will be NULL / zero in the event of a challenge failure.
|
|
struct PlatformChallengeResponse {
|
|
// |challenge| provided during Host::SendPlatformChallenge() combined with
|
|
// nonce data and signed with the platform's private key.
|
|
const uint8_t* signed_data;
|
|
uint32_t signed_data_length;
|
|
|
|
// RSASSA-PKCS1-v1_5-SHA256 signature of the |signed_data| block.
|
|
const uint8_t* signed_data_signature;
|
|
uint32_t signed_data_signature_length;
|
|
|
|
// X.509 device specific certificate for the |service_id| requested.
|
|
const uint8_t* platform_key_certificate;
|
|
uint32_t platform_key_certificate_length;
|
|
};
|
|
CHECK_TYPE(PlatformChallengeResponse, 24, 48);
|
|
|
|
// The current status of the associated key. The valid types are defined in the
|
|
// spec: https://w3c.github.io/encrypted-media/#dom-mediakeystatus
|
|
enum KeyStatus : uint32_t {
|
|
kUsable = 0,
|
|
kInternalError = 1,
|
|
kExpired = 2,
|
|
kOutputRestricted = 3,
|
|
kOutputDownscaled = 4,
|
|
kStatusPending = 5,
|
|
kReleased = 6
|
|
};
|
|
CHECK_TYPE(KeyStatus, 4, 4);
|
|
|
|
// Used when passing arrays of key information. Does not own the referenced
|
|
// data. |system_code| is an additional error code for unusable keys and
|
|
// should be 0 when |status| == kUsable.
|
|
struct KeyInformation {
|
|
const uint8_t* key_id;
|
|
uint32_t key_id_size;
|
|
KeyStatus status;
|
|
uint32_t system_code;
|
|
};
|
|
CHECK_TYPE(KeyInformation, 16, 24);
|
|
|
|
// Supported output protection methods for use with EnableOutputProtection() and
|
|
// returned by OnQueryOutputProtectionStatus().
|
|
enum OutputProtectionMethods : uint32_t {
|
|
kProtectionNone = 0,
|
|
kProtectionHDCP = 1 << 0
|
|
};
|
|
CHECK_TYPE(OutputProtectionMethods, 4, 4);
|
|
|
|
// Connected output link types returned by OnQueryOutputProtectionStatus().
|
|
enum OutputLinkTypes : uint32_t {
|
|
kLinkTypeNone = 0,
|
|
kLinkTypeUnknown = 1 << 0,
|
|
kLinkTypeInternal = 1 << 1,
|
|
kLinkTypeVGA = 1 << 2,
|
|
kLinkTypeHDMI = 1 << 3,
|
|
kLinkTypeDVI = 1 << 4,
|
|
kLinkTypeDisplayPort = 1 << 5,
|
|
kLinkTypeNetwork = 1 << 6
|
|
};
|
|
CHECK_TYPE(OutputLinkTypes, 4, 4);
|
|
|
|
// Result of the QueryOutputProtectionStatus() call.
|
|
enum QueryResult : uint32_t { kQuerySucceeded = 0, kQueryFailed };
|
|
CHECK_TYPE(QueryResult, 4, 4);
|
|
|
|
// The Initialization Data Type. The valid types are defined in the spec:
|
|
// https://w3c.github.io/encrypted-media/format-registry/initdata/index.html#registry
|
|
enum InitDataType : uint32_t { kCenc = 0, kKeyIds = 1, kWebM = 2 };
|
|
CHECK_TYPE(InitDataType, 4, 4);
|
|
|
|
// The type of session to create. The valid types are defined in the spec:
|
|
// https://w3c.github.io/encrypted-media/#dom-mediakeysessiontype
|
|
enum SessionType : uint32_t {
|
|
kTemporary = 0,
|
|
kPersistentLicense = 1,
|
|
kPersistentUsageRecord = 2
|
|
};
|
|
CHECK_TYPE(SessionType, 4, 4);
|
|
|
|
// The type of the message event. The valid types are defined in the spec:
|
|
// https://w3c.github.io/encrypted-media/#dom-mediakeymessagetype
|
|
enum MessageType : uint32_t {
|
|
kLicenseRequest = 0,
|
|
kLicenseRenewal = 1,
|
|
kLicenseRelease = 2,
|
|
kIndividualizationRequest = 3
|
|
};
|
|
CHECK_TYPE(MessageType, 4, 4);
|
|
|
|
enum HdcpVersion : uint32_t {
|
|
kHdcpVersionNone,
|
|
kHdcpVersion1_0,
|
|
kHdcpVersion1_1,
|
|
kHdcpVersion1_2,
|
|
kHdcpVersion1_3,
|
|
kHdcpVersion1_4,
|
|
kHdcpVersion2_0,
|
|
kHdcpVersion2_1,
|
|
kHdcpVersion2_2,
|
|
kHdcpVersion2_3
|
|
};
|
|
CHECK_TYPE(HdcpVersion, 4, 4);
|
|
|
|
struct Policy {
|
|
HdcpVersion min_hdcp_version;
|
|
};
|
|
CHECK_TYPE(Policy, 4, 4);
|
|
|
|
// Represents a buffer created by Allocator implementations.
|
|
class CDM_CLASS_API Buffer {
|
|
public:
|
|
// Destroys the buffer in the same context as it was created.
|
|
virtual void Destroy() = 0;
|
|
|
|
virtual uint32_t Capacity() const = 0;
|
|
virtual uint8_t* Data() = 0;
|
|
virtual void SetSize(uint32_t size) = 0;
|
|
virtual uint32_t Size() const = 0;
|
|
|
|
protected:
|
|
Buffer() {}
|
|
virtual ~Buffer() {}
|
|
|
|
private:
|
|
Buffer(const Buffer&);
|
|
void operator=(const Buffer&);
|
|
};
|
|
|
|
// Represents a decrypted block that has not been decoded.
|
|
class CDM_CLASS_API DecryptedBlock {
|
|
public:
|
|
virtual void SetDecryptedBuffer(Buffer* buffer) = 0;
|
|
virtual Buffer* DecryptedBuffer() = 0;
|
|
|
|
// TODO(tomfinegan): Figure out if timestamp is really needed. If it is not,
|
|
// we can just pass Buffer pointers around.
|
|
virtual void SetTimestamp(int64_t timestamp) = 0;
|
|
virtual int64_t Timestamp() const = 0;
|
|
|
|
protected:
|
|
DecryptedBlock() {}
|
|
virtual ~DecryptedBlock() {}
|
|
};
|
|
|
|
// This intentionally avoids using an enum, since it will be used to do math
|
|
// with other enums, which is deprecated in C++20.
|
|
using VideoPlane = uint32_t;
|
|
constexpr VideoPlane kYPlane = 0;
|
|
constexpr VideoPlane kUPlane = 1;
|
|
constexpr VideoPlane kVPlane = 2;
|
|
constexpr VideoPlane kMaxPlanes = 3;
|
|
CHECK_TYPE(VideoPlane, 4, 4);
|
|
|
|
class CDM_CLASS_API VideoFrame {
|
|
public:
|
|
virtual void SetFormat(VideoFormat format) = 0;
|
|
virtual VideoFormat Format() const = 0;
|
|
|
|
virtual void SetSize(cdm::Size size) = 0;
|
|
virtual cdm::Size Size() const = 0;
|
|
|
|
virtual void SetFrameBuffer(Buffer* frame_buffer) = 0;
|
|
virtual Buffer* FrameBuffer() = 0;
|
|
|
|
virtual void SetPlaneOffset(VideoPlane plane, uint32_t offset) = 0;
|
|
virtual uint32_t PlaneOffset(VideoPlane plane) = 0;
|
|
|
|
virtual void SetStride(VideoPlane plane, uint32_t stride) = 0;
|
|
virtual uint32_t Stride(VideoPlane plane) = 0;
|
|
|
|
// Sets and gets the presentation timestamp which is in microseconds.
|
|
virtual void SetTimestamp(int64_t timestamp) = 0;
|
|
virtual int64_t Timestamp() const = 0;
|
|
|
|
protected:
|
|
VideoFrame() {}
|
|
virtual ~VideoFrame() {}
|
|
};
|
|
|
|
// Represents a decoded video frame. The CDM should call the interface methods
|
|
// to set the frame attributes. See DecryptAndDecodeFrame().
|
|
class CDM_CLASS_API VideoFrame_2 {
|
|
public:
|
|
virtual void SetFormat(VideoFormat format) = 0;
|
|
virtual void SetSize(cdm::Size size) = 0;
|
|
virtual void SetFrameBuffer(Buffer* frame_buffer) = 0;
|
|
virtual void SetPlaneOffset(VideoPlane plane, uint32_t offset) = 0;
|
|
virtual void SetStride(VideoPlane plane, uint32_t stride) = 0;
|
|
// Sets the presentation timestamp which is in microseconds.
|
|
virtual void SetTimestamp(int64_t timestamp) = 0;
|
|
virtual void SetColorSpace(ColorSpace color_space) = 0;
|
|
|
|
protected:
|
|
VideoFrame_2() {}
|
|
virtual ~VideoFrame_2() {}
|
|
};
|
|
|
|
// Represents decrypted and decoded audio frames. AudioFrames can contain
|
|
// multiple audio output buffers, which are serialized into this format:
|
|
//
|
|
// |<------------------- serialized audio buffer ------------------->|
|
|
// | int64_t timestamp | int64_t length | length bytes of audio data |
|
|
//
|
|
// For example, with three audio output buffers, the AudioFrames will look
|
|
// like this:
|
|
//
|
|
// |<----------------- AudioFrames ------------------>|
|
|
// | audio buffer 0 | audio buffer 1 | audio buffer 2 |
|
|
class CDM_CLASS_API AudioFrames {
|
|
public:
|
|
virtual void SetFrameBuffer(Buffer* buffer) = 0;
|
|
virtual Buffer* FrameBuffer() = 0;
|
|
|
|
// The CDM must call this method, providing a valid format, when providing
|
|
// frame buffers. Planar data should be stored end to end; e.g.,
|
|
// |ch1 sample1||ch1 sample2|....|ch1 sample_last||ch2 sample1|...
|
|
virtual void SetFormat(AudioFormat format) = 0;
|
|
virtual AudioFormat Format() const = 0;
|
|
|
|
protected:
|
|
AudioFrames() {}
|
|
virtual ~AudioFrames() {}
|
|
};
|
|
|
|
// FileIO interface provides a way for the CDM to store data in a file in
|
|
// persistent storage. This interface aims only at providing basic read/write
|
|
// capabilities and should not be used as a full fledged file IO API.
|
|
// Each CDM and origin (e.g. HTTPS, "foo.example.com", 443) combination has
|
|
// its own persistent storage. All instances of a given CDM associated with a
|
|
// given origin share the same persistent storage.
|
|
// Note to implementors of this interface:
|
|
// Per-origin storage and the ability for users to clear it are important.
|
|
// See http://www.w3.org/TR/encrypted-media/#privacy-storedinfo.
|
|
class CDM_CLASS_API FileIO {
|
|
public:
|
|
// Opens the file with |file_name| for read and write.
|
|
// FileIOClient::OnOpenComplete() will be called after the opening
|
|
// operation finishes.
|
|
// - When the file is opened by a CDM instance, it will be classified as "in
|
|
// use". In this case other CDM instances in the same domain may receive
|
|
// kInUse status when trying to open it.
|
|
// - |file_name| must only contain letters (A-Za-z), digits(0-9), or "._-".
|
|
// It must not start with an underscore ('_'), and must be at least 1
|
|
// character and no more than 256 characters long.
|
|
virtual void Open(const char* file_name, uint32_t file_name_size) = 0;
|
|
|
|
// Reads the contents of the file. FileIOClient::OnReadComplete() will be
|
|
// called with the read status. Read() should not be called if a previous
|
|
// Read() or Write() call is still pending; otherwise OnReadComplete() will
|
|
// be called with kInUse.
|
|
virtual void Read() = 0;
|
|
|
|
// Writes |data_size| bytes of |data| into the file.
|
|
// FileIOClient::OnWriteComplete() will be called with the write status.
|
|
// All existing contents in the file will be overwritten. Calling Write() with
|
|
// NULL |data| will clear all contents in the file. Write() should not be
|
|
// called if a previous Write() or Read() call is still pending; otherwise
|
|
// OnWriteComplete() will be called with kInUse.
|
|
virtual void Write(const uint8_t* data, uint32_t data_size) = 0;
|
|
|
|
// Closes the file if opened, destroys this FileIO object and releases any
|
|
// resources allocated. The CDM must call this method when it finished using
|
|
// this object. A FileIO object must not be used after Close() is called.
|
|
virtual void Close() = 0;
|
|
|
|
protected:
|
|
FileIO() {}
|
|
virtual ~FileIO() {}
|
|
};
|
|
|
|
// Responses to FileIO calls. All responses will be called asynchronously.
|
|
// When kError is returned, the FileIO object could be in an error state. All
|
|
// following calls (other than Close()) could return kError. The CDM should
|
|
// still call Close() to destroy the FileIO object.
|
|
class CDM_CLASS_API FileIOClient {
|
|
public:
|
|
enum class Status : uint32_t { kSuccess = 0, kInUse, kError };
|
|
|
|
// Response to a FileIO::Open() call with the open |status|.
|
|
virtual void OnOpenComplete(Status status) = 0;
|
|
|
|
// Response to a FileIO::Read() call to provide |data_size| bytes of |data|
|
|
// read from the file.
|
|
// - kSuccess indicates that all contents of the file has been successfully
|
|
// read. In this case, 0 |data_size| means that the file is empty.
|
|
// - kInUse indicates that there are other read/write operations pending.
|
|
// - kError indicates read failure, e.g. the storage is not open or cannot be
|
|
// fully read.
|
|
virtual void OnReadComplete(Status status,
|
|
const uint8_t* data,
|
|
uint32_t data_size) = 0;
|
|
|
|
// Response to a FileIO::Write() call.
|
|
// - kSuccess indicates that all the data has been written into the file
|
|
// successfully.
|
|
// - kInUse indicates that there are other read/write operations pending.
|
|
// - kError indicates write failure, e.g. the storage is not open or cannot be
|
|
// fully written. Upon write failure, the contents of the file should be
|
|
// regarded as corrupt and should not used.
|
|
virtual void OnWriteComplete(Status status) = 0;
|
|
|
|
protected:
|
|
FileIOClient() {}
|
|
virtual ~FileIOClient() {}
|
|
};
|
|
|
|
// Metrics that will be reported from the CDM through the ReportMetrics()
|
|
// function. To add a new metric, please add it to the end of this enum list
|
|
// without changing any existing enum values.
|
|
// Note: For forward compatibility, Host implementations must gracefully handle
|
|
// unexpected (new) enum values, e.g. no-op.
|
|
enum MetricName : uint32_t {
|
|
kSdkVersion,
|
|
kCertificateSerialNumber,
|
|
kDecoderBypassBlockCount,
|
|
};
|
|
CHECK_TYPE(MetricName, 4, 4);
|
|
|
|
class CDM_CLASS_API Host_10;
|
|
class CDM_CLASS_API Host_11;
|
|
class CDM_CLASS_API Host_12;
|
|
|
|
// ContentDecryptionModule interface that all CDMs need to implement.
|
|
// The interface is versioned for backward compatibility.
|
|
// Note: ContentDecryptionModule implementations must use the allocator
|
|
// provided in CreateCdmInstance() to allocate any Buffer that needs to
|
|
// be passed back to the caller. Implementations must call Buffer::Destroy()
|
|
// when a Buffer is created that will never be returned to the caller.
|
|
class CDM_CLASS_API ContentDecryptionModule_10 {
|
|
public:
|
|
static const int kVersion = 10;
|
|
static const bool kIsStable = true;
|
|
typedef Host_10 Host;
|
|
|
|
// Initializes the CDM instance, providing information about permitted
|
|
// functionalities. The CDM must respond by calling Host::OnInitialized()
|
|
// with whether the initialization succeeded. No other calls will be made by
|
|
// the host before Host::OnInitialized() returns.
|
|
// If |allow_distinctive_identifier| is false, messages from the CDM,
|
|
// such as message events, must not contain a Distinctive Identifier,
|
|
// even in an encrypted form.
|
|
// If |allow_persistent_state| is false, the CDM must not attempt to
|
|
// persist state. Calls to CreateFileIO() will fail.
|
|
// If |use_hw_secure_codecs| is true, the CDM must ensure the decryption key
|
|
// and video buffers (compressed and uncompressed) are securely protected by
|
|
// hardware.
|
|
virtual void Initialize(bool allow_distinctive_identifier,
|
|
bool allow_persistent_state,
|
|
bool use_hw_secure_codecs) = 0;
|
|
|
|
// Gets the key status if the CDM has a hypothetical key with the |policy|.
|
|
// The CDM must respond by calling either Host::OnResolveKeyStatusPromise()
|
|
// with the result key status or Host::OnRejectPromise() if an unexpected
|
|
// error happened or this method is not supported.
|
|
virtual void GetStatusForPolicy(uint32_t promise_id,
|
|
const Policy& policy) = 0;
|
|
|
|
// SetServerCertificate(), CreateSessionAndGenerateRequest(), LoadSession(),
|
|
// UpdateSession(), CloseSession(), and RemoveSession() all accept a
|
|
// |promise_id|, which must be passed to the completion Host method
|
|
// (e.g. Host::OnResolveNewSessionPromise()).
|
|
|
|
// Provides a server certificate to be used to encrypt messages to the
|
|
// license server. The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
// If the CDM does not support server certificates, the promise should be
|
|
// rejected with kExceptionNotSupportedError. If |server_certificate_data|
|
|
// is empty, reject with kExceptionTypeError. Any other error should be
|
|
// rejected with kExceptionInvalidStateError or kExceptionQuotaExceededError.
|
|
// TODO(crbug.com/796417): Add support for the promise to return true or
|
|
// false, rather than using kExceptionNotSupportedError to mean false.
|
|
virtual void SetServerCertificate(uint32_t promise_id,
|
|
const uint8_t* server_certificate_data,
|
|
uint32_t server_certificate_data_size) = 0;
|
|
|
|
// Creates a session given |session_type|, |init_data_type|, and |init_data|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise().
|
|
virtual void CreateSessionAndGenerateRequest(uint32_t promise_id,
|
|
SessionType session_type,
|
|
InitDataType init_data_type,
|
|
const uint8_t* init_data,
|
|
uint32_t init_data_size) = 0;
|
|
|
|
// Loads the session of type |session_type| specified by |session_id|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise(). If the session is not found, call
|
|
// Host::OnResolveNewSessionPromise() with session_id = NULL.
|
|
virtual void LoadSession(uint32_t promise_id,
|
|
SessionType session_type,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Updates the session with |response|. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
virtual void UpdateSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size,
|
|
const uint8_t* response,
|
|
uint32_t response_size) = 0;
|
|
|
|
// Requests that the CDM close the session. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise() when the request
|
|
// has been processed. This may be before the session is closed. Once the
|
|
// session is closed, Host::OnSessionClosed() must also be called.
|
|
virtual void CloseSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Removes any stored session data associated with this session. Will only be
|
|
// called for persistent sessions. The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise() when the request has
|
|
// been processed.
|
|
virtual void RemoveSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Performs scheduled operation with |context| when the timer fires.
|
|
virtual void TimerExpired(void* context) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer|.
|
|
//
|
|
// Returns kSuccess if decryption succeeded, in which case the callee
|
|
// should have filled the |decrypted_buffer| and passed the ownership of
|
|
// |data| in |decrypted_buffer| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kDecryptError if any other error happened.
|
|
// If the return value is not kSuccess, |decrypted_buffer| should be ignored
|
|
// by the caller.
|
|
virtual Status Decrypt(const InputBuffer_2& encrypted_buffer,
|
|
DecryptedBlock* decrypted_buffer) = 0;
|
|
|
|
// Initializes the CDM audio decoder with |audio_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeSamples() is called.
|
|
//
|
|
// Returns kSuccess if the |audio_decoder_config| is supported and the CDM
|
|
// audio decoder is successfully initialized.
|
|
// Returns kInitializationError if |audio_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeAudioDecoder(
|
|
const AudioDecoderConfig_2& audio_decoder_config) = 0;
|
|
|
|
// Initializes the CDM video decoder with |video_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeFrame() is called.
|
|
//
|
|
// Returns kSuccess if the |video_decoder_config| is supported and the CDM
|
|
// video decoder is successfully initialized.
|
|
// Returns kInitializationError if |video_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeVideoDecoder(
|
|
const VideoDecoderConfig_2& video_decoder_config) = 0;
|
|
|
|
// De-initializes the CDM decoder and sets it to an uninitialized state. The
|
|
// caller can initialize the decoder again after this call to re-initialize
|
|
// it. This can be used to reconfigure the decoder if the configuration
|
|
// changes.
|
|
virtual void DeinitializeDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Resets the CDM decoder to an initialized clean state. All internal buffers
|
|
// MUST be flushed.
|
|
virtual void ResetDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into a
|
|
// |video_frame|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until
|
|
// kNeedMoreData is returned.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled the |video_frame| and passed the ownership of
|
|
// |frame_buffer| in |video_frame| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// a decoded frame (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |video_frame| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeFrame(const InputBuffer_2& encrypted_buffer,
|
|
VideoFrame* video_frame) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into
|
|
// |audio_frames|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until only empty
|
|
// |audio_frames| is produced.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled |audio_frames| and passed the ownership of
|
|
// |data| in |audio_frames| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// audio samples (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |audio_frames| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeSamples(const InputBuffer_2& encrypted_buffer,
|
|
AudioFrames* audio_frames) = 0;
|
|
|
|
// Called by the host after a platform challenge was initiated via
|
|
// Host::SendPlatformChallenge().
|
|
virtual void OnPlatformChallengeResponse(
|
|
const PlatformChallengeResponse& response) = 0;
|
|
|
|
// Called by the host after a call to Host::QueryOutputProtectionStatus(). The
|
|
// |link_mask| is a bit mask of OutputLinkTypes and |output_protection_mask|
|
|
// is a bit mask of OutputProtectionMethods. If |result| is kQueryFailed,
|
|
// then |link_mask| and |output_protection_mask| are undefined and should
|
|
// be ignored.
|
|
virtual void OnQueryOutputProtectionStatus(
|
|
QueryResult result,
|
|
uint32_t link_mask,
|
|
uint32_t output_protection_mask) = 0;
|
|
|
|
// Called by the host after a call to Host::RequestStorageId(). If the
|
|
// version of the storage ID requested is available, |storage_id| and
|
|
// |storage_id_size| are set appropriately. |version| will be the same as
|
|
// what was requested, unless 0 (latest) was requested, in which case
|
|
// |version| will be the actual version number for the |storage_id| returned.
|
|
// If the requested version is not available, null/zero will be provided as
|
|
// |storage_id| and |storage_id_size|, respectively, and |version| should be
|
|
// ignored.
|
|
virtual void OnStorageId(uint32_t version,
|
|
const uint8_t* storage_id,
|
|
uint32_t storage_id_size) = 0;
|
|
|
|
// Destroys the object in the same context as it was created.
|
|
virtual void Destroy() = 0;
|
|
|
|
protected:
|
|
ContentDecryptionModule_10() {}
|
|
virtual ~ContentDecryptionModule_10() {}
|
|
};
|
|
|
|
// ContentDecryptionModule interface that all CDMs need to implement.
|
|
// The interface is versioned for backward compatibility.
|
|
// Note: ContentDecryptionModule implementations must use the allocator
|
|
// provided in CreateCdmInstance() to allocate any Buffer that needs to
|
|
// be passed back to the caller. Implementations must call Buffer::Destroy()
|
|
// when a Buffer is created that will never be returned to the caller.
|
|
class CDM_CLASS_API ContentDecryptionModule_11 {
|
|
public:
|
|
static const int kVersion = 11;
|
|
static const bool kIsStable = true;
|
|
typedef Host_11 Host;
|
|
|
|
// Initializes the CDM instance, providing information about permitted
|
|
// functionalities. The CDM must respond by calling Host::OnInitialized()
|
|
// with whether the initialization succeeded. No other calls will be made by
|
|
// the host before Host::OnInitialized() returns.
|
|
// If |allow_distinctive_identifier| is false, messages from the CDM,
|
|
// such as message events, must not contain a Distinctive Identifier,
|
|
// even in an encrypted form.
|
|
// If |allow_persistent_state| is false, the CDM must not attempt to
|
|
// persist state. Calls to CreateFileIO() will fail.
|
|
// If |use_hw_secure_codecs| is true, the CDM must ensure the decryption key
|
|
// and video buffers (compressed and uncompressed) are securely protected by
|
|
// hardware.
|
|
virtual void Initialize(bool allow_distinctive_identifier,
|
|
bool allow_persistent_state,
|
|
bool use_hw_secure_codecs) = 0;
|
|
|
|
// Gets the key status if the CDM has a hypothetical key with the |policy|.
|
|
// The CDM must respond by calling either Host::OnResolveKeyStatusPromise()
|
|
// with the result key status or Host::OnRejectPromise() if an unexpected
|
|
// error happened or this method is not supported.
|
|
virtual void GetStatusForPolicy(uint32_t promise_id,
|
|
const Policy& policy) = 0;
|
|
|
|
// SetServerCertificate(), CreateSessionAndGenerateRequest(), LoadSession(),
|
|
// UpdateSession(), CloseSession(), and RemoveSession() all accept a
|
|
// |promise_id|, which must be passed to the completion Host method
|
|
// (e.g. Host::OnResolveNewSessionPromise()).
|
|
|
|
// Provides a server certificate to be used to encrypt messages to the
|
|
// license server. The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
// If the CDM does not support server certificates, the promise should be
|
|
// rejected with kExceptionNotSupportedError. If |server_certificate_data|
|
|
// is empty, reject with kExceptionTypeError. Any other error should be
|
|
// rejected with kExceptionInvalidStateError or kExceptionQuotaExceededError.
|
|
// TODO(crbug.com/796417): Add support for the promise to return true or
|
|
// false, rather than using kExceptionNotSupportedError to mean false.
|
|
virtual void SetServerCertificate(uint32_t promise_id,
|
|
const uint8_t* server_certificate_data,
|
|
uint32_t server_certificate_data_size) = 0;
|
|
|
|
// Creates a session given |session_type|, |init_data_type|, and |init_data|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise().
|
|
virtual void CreateSessionAndGenerateRequest(uint32_t promise_id,
|
|
SessionType session_type,
|
|
InitDataType init_data_type,
|
|
const uint8_t* init_data,
|
|
uint32_t init_data_size) = 0;
|
|
|
|
// Loads the session of type |session_type| specified by |session_id|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise(). If the session is not found, call
|
|
// Host::OnResolveNewSessionPromise() with session_id = NULL.
|
|
virtual void LoadSession(uint32_t promise_id,
|
|
SessionType session_type,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Updates the session with |response|. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
virtual void UpdateSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size,
|
|
const uint8_t* response,
|
|
uint32_t response_size) = 0;
|
|
|
|
// Requests that the CDM close the session. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise() when the request
|
|
// has been processed. This may be before the session is closed. Once the
|
|
// session is closed, Host::OnSessionClosed() must also be called.
|
|
virtual void CloseSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Removes any stored session data associated with this session. Will only be
|
|
// called for persistent sessions. The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise() when the request has
|
|
// been processed.
|
|
virtual void RemoveSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Performs scheduled operation with |context| when the timer fires.
|
|
virtual void TimerExpired(void* context) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer|.
|
|
//
|
|
// Returns kSuccess if decryption succeeded, in which case the callee
|
|
// should have filled the |decrypted_buffer| and passed the ownership of
|
|
// |data| in |decrypted_buffer| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kDecryptError if any other error happened.
|
|
// If the return value is not kSuccess, |decrypted_buffer| should be ignored
|
|
// by the caller.
|
|
virtual Status Decrypt(const InputBuffer_2& encrypted_buffer,
|
|
DecryptedBlock* decrypted_buffer) = 0;
|
|
|
|
// Initializes the CDM audio decoder with |audio_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeSamples() is called.
|
|
//
|
|
// Returns kSuccess if the |audio_decoder_config| is supported and the CDM
|
|
// audio decoder is successfully initialized.
|
|
// Returns kInitializationError if |audio_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeAudioDecoder(
|
|
const AudioDecoderConfig_2& audio_decoder_config) = 0;
|
|
|
|
// Initializes the CDM video decoder with |video_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeFrame() is called.
|
|
//
|
|
// Returns kSuccess if the |video_decoder_config| is supported and the CDM
|
|
// video decoder is successfully initialized.
|
|
// Returns kInitializationError if |video_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeVideoDecoder(
|
|
const VideoDecoderConfig_2& video_decoder_config) = 0;
|
|
|
|
// De-initializes the CDM decoder and sets it to an uninitialized state. The
|
|
// caller can initialize the decoder again after this call to re-initialize
|
|
// it. This can be used to reconfigure the decoder if the configuration
|
|
// changes.
|
|
virtual void DeinitializeDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Resets the CDM decoder to an initialized clean state. All internal buffers
|
|
// MUST be flushed.
|
|
virtual void ResetDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into a
|
|
// |video_frame|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until
|
|
// kNeedMoreData is returned.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled the |video_frame| and passed the ownership of
|
|
// |frame_buffer| in |video_frame| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// a decoded frame (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |video_frame| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeFrame(const InputBuffer_2& encrypted_buffer,
|
|
VideoFrame* video_frame) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into
|
|
// |audio_frames|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until only empty
|
|
// |audio_frames| is produced.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled |audio_frames| and passed the ownership of
|
|
// |data| in |audio_frames| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// audio samples (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |audio_frames| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeSamples(const InputBuffer_2& encrypted_buffer,
|
|
AudioFrames* audio_frames) = 0;
|
|
|
|
// Called by the host after a platform challenge was initiated via
|
|
// Host::SendPlatformChallenge().
|
|
virtual void OnPlatformChallengeResponse(
|
|
const PlatformChallengeResponse& response) = 0;
|
|
|
|
// Called by the host after a call to Host::QueryOutputProtectionStatus(). The
|
|
// |link_mask| is a bit mask of OutputLinkTypes and |output_protection_mask|
|
|
// is a bit mask of OutputProtectionMethods. If |result| is kQueryFailed,
|
|
// then |link_mask| and |output_protection_mask| are undefined and should
|
|
// be ignored.
|
|
virtual void OnQueryOutputProtectionStatus(
|
|
QueryResult result,
|
|
uint32_t link_mask,
|
|
uint32_t output_protection_mask) = 0;
|
|
|
|
// Called by the host after a call to Host::RequestStorageId(). If the
|
|
// version of the storage ID requested is available, |storage_id| and
|
|
// |storage_id_size| are set appropriately. |version| will be the same as
|
|
// what was requested, unless 0 (latest) was requested, in which case
|
|
// |version| will be the actual version number for the |storage_id| returned.
|
|
// If the requested version is not available, null/zero will be provided as
|
|
// |storage_id| and |storage_id_size|, respectively, and |version| should be
|
|
// ignored.
|
|
virtual void OnStorageId(uint32_t version,
|
|
const uint8_t* storage_id,
|
|
uint32_t storage_id_size) = 0;
|
|
|
|
// Destroys the object in the same context as it was created.
|
|
virtual void Destroy() = 0;
|
|
|
|
protected:
|
|
ContentDecryptionModule_11() {}
|
|
virtual ~ContentDecryptionModule_11() {}
|
|
};
|
|
|
|
// ----- Note: CDM interface(s) below still in development and not stable! -----
|
|
|
|
// ContentDecryptionModule interface that all CDMs need to implement.
|
|
// The interface is versioned for backward compatibility.
|
|
// Note: ContentDecryptionModule implementations must use the allocator
|
|
// provided in CreateCdmInstance() to allocate any Buffer that needs to
|
|
// be passed back to the caller. Implementations must call Buffer::Destroy()
|
|
// when a Buffer is created that will never be returned to the caller.
|
|
class CDM_CLASS_API ContentDecryptionModule_12 {
|
|
public:
|
|
static const int kVersion = 12;
|
|
static const bool kIsStable = false;
|
|
typedef Host_12 Host;
|
|
|
|
// Initializes the CDM instance, providing information about permitted
|
|
// functionalities. The CDM must respond by calling Host::OnInitialized()
|
|
// with whether the initialization succeeded. No other calls will be made by
|
|
// the host before Host::OnInitialized() returns.
|
|
// If |allow_distinctive_identifier| is false, messages from the CDM,
|
|
// such as message events, must not contain a Distinctive Identifier,
|
|
// even in an encrypted form.
|
|
// If |allow_persistent_state| is false, the CDM must not attempt to
|
|
// persist state. Calls to CreateFileIO() will fail.
|
|
// If |use_hw_secure_codecs| is true, the CDM must ensure the decryption key
|
|
// and video buffers (compressed and uncompressed) are securely protected by
|
|
// hardware.
|
|
virtual void Initialize(bool allow_distinctive_identifier,
|
|
bool allow_persistent_state,
|
|
bool use_hw_secure_codecs) = 0;
|
|
|
|
// Gets the key status if the CDM has a hypothetical key with the |policy|.
|
|
// The CDM must respond by calling either Host::OnResolveKeyStatusPromise()
|
|
// with the result key status or Host::OnRejectPromise() if an unexpected
|
|
// error happened or this method is not supported.
|
|
virtual void GetStatusForPolicy(uint32_t promise_id,
|
|
const Policy& policy) = 0;
|
|
|
|
// SetServerCertificate(), CreateSessionAndGenerateRequest(), LoadSession(),
|
|
// UpdateSession(), CloseSession(), and RemoveSession() all accept a
|
|
// |promise_id|, which must be passed to the completion Host method
|
|
// (e.g. Host::OnResolveNewSessionPromise()).
|
|
|
|
// Provides a server certificate to be used to encrypt messages to the
|
|
// license server. The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
// If the CDM does not support server certificates, the promise should be
|
|
// rejected with kExceptionNotSupportedError. If |server_certificate_data|
|
|
// is empty, reject with kExceptionTypeError. Any other error should be
|
|
// rejected with kExceptionInvalidStateError or kExceptionQuotaExceededError.
|
|
// TODO(crbug.com/796417): Add support for the promise to return true or
|
|
// false, rather than using kExceptionNotSupportedError to mean false.
|
|
virtual void SetServerCertificate(uint32_t promise_id,
|
|
const uint8_t* server_certificate_data,
|
|
uint32_t server_certificate_data_size) = 0;
|
|
|
|
// Creates a session given |session_type|, |init_data_type|, and |init_data|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise().
|
|
virtual void CreateSessionAndGenerateRequest(uint32_t promise_id,
|
|
SessionType session_type,
|
|
InitDataType init_data_type,
|
|
const uint8_t* init_data,
|
|
uint32_t init_data_size) = 0;
|
|
|
|
// Loads the session of type |session_type| specified by |session_id|.
|
|
// The CDM must respond by calling either Host::OnResolveNewSessionPromise()
|
|
// or Host::OnRejectPromise(). If the session is not found, call
|
|
// Host::OnResolveNewSessionPromise() with session_id = NULL.
|
|
virtual void LoadSession(uint32_t promise_id,
|
|
SessionType session_type,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Updates the session with |response|. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise().
|
|
virtual void UpdateSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size,
|
|
const uint8_t* response,
|
|
uint32_t response_size) = 0;
|
|
|
|
// Requests that the CDM close the session. The CDM must respond by calling
|
|
// either Host::OnResolvePromise() or Host::OnRejectPromise() when the request
|
|
// has been processed. This may be before the session is closed. Once the
|
|
// session is closed, Host::OnSessionClosed() must also be called.
|
|
virtual void CloseSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Removes any stored session data associated with this session. Removes all
|
|
// license(s) and key(s) associated with the session, whether they are in
|
|
// memory, persistent store, or both. For persistent session types, other
|
|
// session data (e.g. record of license destruction) will be cleared as
|
|
// defined for each session type once a release message acknowledgment is
|
|
// processed by UpdateSession(). The CDM must respond by calling either
|
|
// Host::OnResolvePromise() or Host::OnRejectPromise() when the request has
|
|
// been processed.
|
|
virtual void RemoveSession(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Performs scheduled operation with |context| when the timer fires.
|
|
virtual void TimerExpired(void* context) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer|.
|
|
//
|
|
// Returns kSuccess if decryption succeeded, in which case the callee
|
|
// should have filled the |decrypted_buffer| and passed the ownership of
|
|
// |data| in |decrypted_buffer| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kDecryptError if any other error happened.
|
|
// If the return value is not kSuccess, |decrypted_buffer| should be ignored
|
|
// by the caller.
|
|
virtual Status Decrypt(const InputBuffer_2& encrypted_buffer,
|
|
DecryptedBlock* decrypted_buffer) = 0;
|
|
|
|
// Initializes the CDM audio decoder with |audio_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeSamples() is called.
|
|
//
|
|
// Returns kSuccess if the |audio_decoder_config| is supported and the CDM
|
|
// audio decoder is successfully initialized.
|
|
// Returns kInitializationError if |audio_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeAudioDecoder(
|
|
const AudioDecoderConfig_2& audio_decoder_config) = 0;
|
|
|
|
// Initializes the CDM video decoder with |video_decoder_config|. This
|
|
// function must be called before DecryptAndDecodeFrame() is called.
|
|
//
|
|
// Returns kSuccess if the |video_decoder_config| is supported and the CDM
|
|
// video decoder is successfully initialized.
|
|
// Returns kInitializationError if |video_decoder_config| is not supported.
|
|
// The CDM may still be able to do Decrypt().
|
|
// Returns kDeferredInitialization if the CDM is not ready to initialize the
|
|
// decoder at this time. Must call Host::OnDeferredInitializationDone() once
|
|
// initialization is complete.
|
|
virtual Status InitializeVideoDecoder(
|
|
const VideoDecoderConfig_3& video_decoder_config) = 0;
|
|
|
|
// De-initializes the CDM decoder and sets it to an uninitialized state. The
|
|
// caller can initialize the decoder again after this call to re-initialize
|
|
// it. This can be used to reconfigure the decoder if the configuration
|
|
// changes.
|
|
virtual void DeinitializeDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Resets the CDM decoder to an initialized clean state. All internal buffers
|
|
// MUST be flushed.
|
|
virtual void ResetDecoder(StreamType decoder_type) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into a
|
|
// |video_frame|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until
|
|
// kNeedMoreData is returned.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled the |video_frame| and passed the ownership of
|
|
// |frame_buffer| in |video_frame| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// a decoded frame (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |video_frame| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeFrame(const InputBuffer_2& encrypted_buffer,
|
|
VideoFrame_2* video_frame) = 0;
|
|
|
|
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into
|
|
// |audio_frames|. Upon end-of-stream, the caller should call this function
|
|
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until only empty
|
|
// |audio_frames| is produced.
|
|
//
|
|
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
|
// the callee will have filled |audio_frames| and passed the ownership of
|
|
// |data| in |audio_frames| to the caller.
|
|
// Returns kNoKey if the CDM did not have the necessary decryption key
|
|
// to decrypt.
|
|
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
|
// audio samples (e.g. during initialization and end-of-stream).
|
|
// Returns kDecryptError if any decryption error happened.
|
|
// Returns kDecodeError if any decoding error happened.
|
|
// If the return value is not kSuccess, |audio_frames| should be ignored by
|
|
// the caller.
|
|
virtual Status DecryptAndDecodeSamples(const InputBuffer_2& encrypted_buffer,
|
|
AudioFrames* audio_frames) = 0;
|
|
|
|
// Called by the host after a platform challenge was initiated via
|
|
// Host::SendPlatformChallenge().
|
|
virtual void OnPlatformChallengeResponse(
|
|
const PlatformChallengeResponse& response) = 0;
|
|
|
|
// Called by the host after a call to Host::QueryOutputProtectionStatus(). The
|
|
// |link_mask| is a bit mask of OutputLinkTypes and |output_protection_mask|
|
|
// is a bit mask of OutputProtectionMethods. If |result| is kQueryFailed,
|
|
// then |link_mask| and |output_protection_mask| are undefined and should
|
|
// be ignored.
|
|
virtual void OnQueryOutputProtectionStatus(
|
|
QueryResult result,
|
|
uint32_t link_mask,
|
|
uint32_t output_protection_mask) = 0;
|
|
|
|
// Called by the host after a call to Host::RequestStorageId(). If the
|
|
// version of the storage ID requested is available, |storage_id| and
|
|
// |storage_id_size| are set appropriately. |version| will be the same as
|
|
// what was requested, unless 0 (latest) was requested, in which case
|
|
// |version| will be the actual version number for the |storage_id| returned.
|
|
// If the requested version is not available, null/zero will be provided as
|
|
// |storage_id| and |storage_id_size|, respectively, and |version| should be
|
|
// ignored.
|
|
virtual void OnStorageId(uint32_t version,
|
|
const uint8_t* storage_id,
|
|
uint32_t storage_id_size) = 0;
|
|
|
|
// Destroys the object in the same context as it was created.
|
|
virtual void Destroy() = 0;
|
|
|
|
protected:
|
|
ContentDecryptionModule_12() {}
|
|
virtual ~ContentDecryptionModule_12() {}
|
|
};
|
|
|
|
class CDM_CLASS_API Host_10 {
|
|
public:
|
|
static const int kVersion = 10;
|
|
|
|
// Returns a Buffer* containing non-zero members upon success, or NULL on
|
|
// failure. The caller owns the Buffer* after this call. The buffer is not
|
|
// guaranteed to be zero initialized. The capacity of the allocated Buffer
|
|
// is guaranteed to be not less than |capacity|.
|
|
virtual Buffer* Allocate(uint32_t capacity) = 0;
|
|
|
|
// Requests the host to call ContentDecryptionModule::TimerFired() |delay_ms|
|
|
// from now with |context|.
|
|
virtual void SetTimer(int64_t delay_ms, void* context) = 0;
|
|
|
|
// Returns the current wall time.
|
|
virtual Time GetCurrentWallTime() = 0;
|
|
|
|
// Called by the CDM with the result after the CDM instance was initialized.
|
|
virtual void OnInitialized(bool success) = 0;
|
|
|
|
// Called by the CDM when a key status is available in response to
|
|
// GetStatusForPolicy().
|
|
virtual void OnResolveKeyStatusPromise(uint32_t promise_id,
|
|
KeyStatus key_status) = 0;
|
|
|
|
// Called by the CDM when a session is created or loaded and the value for the
|
|
// MediaKeySession's sessionId attribute is available (|session_id|).
|
|
// This must be called before OnSessionMessage() or
|
|
// OnSessionKeysChange() is called for the same session. |session_id_size|
|
|
// should not include null termination.
|
|
// When called in response to LoadSession(), the |session_id| must be the
|
|
// same as the |session_id| passed in LoadSession(), or NULL if the
|
|
// session could not be loaded.
|
|
virtual void OnResolveNewSessionPromise(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Called by the CDM when a session is updated or released.
|
|
virtual void OnResolvePromise(uint32_t promise_id) = 0;
|
|
|
|
// Called by the CDM when an error occurs as a result of one of the
|
|
// ContentDecryptionModule calls that accept a |promise_id|.
|
|
// |exception| must be specified. |error_message| and |system_code|
|
|
// are optional. |error_message_size| should not include null termination.
|
|
virtual void OnRejectPromise(uint32_t promise_id,
|
|
Exception exception,
|
|
uint32_t system_code,
|
|
const char* error_message,
|
|
uint32_t error_message_size) = 0;
|
|
|
|
// Called by the CDM when it has a message for session |session_id|.
|
|
// Size parameters should not include null termination.
|
|
virtual void OnSessionMessage(const char* session_id,
|
|
uint32_t session_id_size,
|
|
MessageType message_type,
|
|
const char* message,
|
|
uint32_t message_size) = 0;
|
|
|
|
// Called by the CDM when there has been a change in keys or their status for
|
|
// session |session_id|. |has_additional_usable_key| should be set if a
|
|
// key is newly usable (e.g. new key available, previously expired key has
|
|
// been renewed, etc.) and the browser should attempt to resume playback.
|
|
// |keys_info| is the list of key IDs for this session along with their
|
|
// current status. |keys_info_count| is the number of entries in |keys_info|.
|
|
// Size parameter for |session_id| should not include null termination.
|
|
virtual void OnSessionKeysChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
bool has_additional_usable_key,
|
|
const KeyInformation* keys_info,
|
|
uint32_t keys_info_count) = 0;
|
|
|
|
// Called by the CDM when there has been a change in the expiration time for
|
|
// session |session_id|. This can happen as the result of an Update() call
|
|
// or some other event. If this happens as a result of a call to Update(),
|
|
// it must be called before resolving the Update() promise. |new_expiry_time|
|
|
// represents the time after which the key(s) in the session will no longer
|
|
// be usable for decryption. It can be 0 if no such time exists or if the
|
|
// license explicitly never expires. Size parameter should not include null
|
|
// termination.
|
|
virtual void OnExpirationChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
Time new_expiry_time) = 0;
|
|
|
|
// Called by the CDM when session |session_id| is closed. Size
|
|
// parameter should not include null termination.
|
|
virtual void OnSessionClosed(const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// The following are optional methods that may not be implemented on all
|
|
// platforms.
|
|
|
|
// Sends a platform challenge for the given |service_id|. |challenge| is at
|
|
// most 256 bits of data to be signed. Once the challenge has been completed,
|
|
// the host will call ContentDecryptionModule::OnPlatformChallengeResponse()
|
|
// with the signed challenge response and platform certificate. Size
|
|
// parameters should not include null termination.
|
|
virtual void SendPlatformChallenge(const char* service_id,
|
|
uint32_t service_id_size,
|
|
const char* challenge,
|
|
uint32_t challenge_size) = 0;
|
|
|
|
// Attempts to enable output protection (e.g. HDCP) on the display link. The
|
|
// |desired_protection_mask| is a bit mask of OutputProtectionMethods. No
|
|
// status callback is issued, the CDM must call QueryOutputProtectionStatus()
|
|
// periodically to ensure the desired protections are applied.
|
|
virtual void EnableOutputProtection(uint32_t desired_protection_mask) = 0;
|
|
|
|
// Requests the current output protection status. Once the host has the status
|
|
// it will call ContentDecryptionModule::OnQueryOutputProtectionStatus().
|
|
virtual void QueryOutputProtectionStatus() = 0;
|
|
|
|
// Must be called by the CDM if it returned kDeferredInitialization during
|
|
// InitializeAudioDecoder() or InitializeVideoDecoder().
|
|
virtual void OnDeferredInitializationDone(StreamType stream_type,
|
|
Status decoder_status) = 0;
|
|
|
|
// Creates a FileIO object from the host to do file IO operation. Returns NULL
|
|
// if a FileIO object cannot be obtained. Once a valid FileIO object is
|
|
// returned, |client| must be valid until FileIO::Close() is called. The
|
|
// CDM can call this method multiple times to operate on different files.
|
|
virtual FileIO* CreateFileIO(FileIOClient* client) = 0;
|
|
|
|
// Requests a specific version of the storage ID. A storage ID is a stable,
|
|
// device specific ID used by the CDM to securely store persistent data. The
|
|
// ID will be returned by the host via ContentDecryptionModule::OnStorageId().
|
|
// If |version| is 0, the latest version will be returned. All |version|s
|
|
// that are greater than or equal to 0x80000000 are reserved for the CDM and
|
|
// should not be supported or returned by the host. The CDM must not expose
|
|
// the ID outside the client device, even in encrypted form.
|
|
virtual void RequestStorageId(uint32_t version) = 0;
|
|
|
|
protected:
|
|
Host_10() {}
|
|
virtual ~Host_10() {}
|
|
};
|
|
|
|
class CDM_CLASS_API Host_11 {
|
|
public:
|
|
static const int kVersion = 11;
|
|
|
|
// Returns a Buffer* containing non-zero members upon success, or NULL on
|
|
// failure. The caller owns the Buffer* after this call. The buffer is not
|
|
// guaranteed to be zero initialized. The capacity of the allocated Buffer
|
|
// is guaranteed to be not less than |capacity|.
|
|
virtual Buffer* Allocate(uint32_t capacity) = 0;
|
|
|
|
// Requests the host to call ContentDecryptionModule::TimerFired() |delay_ms|
|
|
// from now with |context|.
|
|
virtual void SetTimer(int64_t delay_ms, void* context) = 0;
|
|
|
|
// Returns the current wall time.
|
|
virtual Time GetCurrentWallTime() = 0;
|
|
|
|
// Called by the CDM with the result after the CDM instance was initialized.
|
|
virtual void OnInitialized(bool success) = 0;
|
|
|
|
// Called by the CDM when a key status is available in response to
|
|
// GetStatusForPolicy().
|
|
virtual void OnResolveKeyStatusPromise(uint32_t promise_id,
|
|
KeyStatus key_status) = 0;
|
|
|
|
// Called by the CDM when a session is created or loaded and the value for the
|
|
// MediaKeySession's sessionId attribute is available (|session_id|).
|
|
// This must be called before OnSessionMessage() or
|
|
// OnSessionKeysChange() is called for the same session. |session_id_size|
|
|
// should not include null termination.
|
|
// When called in response to LoadSession(), the |session_id| must be the
|
|
// same as the |session_id| passed in LoadSession(), or NULL if the
|
|
// session could not be loaded.
|
|
virtual void OnResolveNewSessionPromise(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Called by the CDM when a session is updated or released.
|
|
virtual void OnResolvePromise(uint32_t promise_id) = 0;
|
|
|
|
// Called by the CDM when an error occurs as a result of one of the
|
|
// ContentDecryptionModule calls that accept a |promise_id|.
|
|
// |exception| must be specified. |error_message| and |system_code|
|
|
// are optional. |error_message_size| should not include null termination.
|
|
virtual void OnRejectPromise(uint32_t promise_id,
|
|
Exception exception,
|
|
uint32_t system_code,
|
|
const char* error_message,
|
|
uint32_t error_message_size) = 0;
|
|
|
|
// Called by the CDM when it has a message for session |session_id|.
|
|
// Size parameters should not include null termination.
|
|
virtual void OnSessionMessage(const char* session_id,
|
|
uint32_t session_id_size,
|
|
MessageType message_type,
|
|
const char* message,
|
|
uint32_t message_size) = 0;
|
|
|
|
// Called by the CDM when there has been a change in keys or their status for
|
|
// session |session_id|. |has_additional_usable_key| should be set if a
|
|
// key is newly usable (e.g. new key available, previously expired key has
|
|
// been renewed, etc.) and the browser should attempt to resume playback.
|
|
// |keys_info| is the list of key IDs for this session along with their
|
|
// current status. |keys_info_count| is the number of entries in |keys_info|.
|
|
// Size parameter for |session_id| should not include null termination.
|
|
virtual void OnSessionKeysChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
bool has_additional_usable_key,
|
|
const KeyInformation* keys_info,
|
|
uint32_t keys_info_count) = 0;
|
|
|
|
// Called by the CDM when there has been a change in the expiration time for
|
|
// session |session_id|. This can happen as the result of an Update() call
|
|
// or some other event. If this happens as a result of a call to Update(),
|
|
// it must be called before resolving the Update() promise. |new_expiry_time|
|
|
// represents the time after which the key(s) in the session will no longer
|
|
// be usable for decryption. It can be 0 if no such time exists or if the
|
|
// license explicitly never expires. Size parameter should not include null
|
|
// termination.
|
|
virtual void OnExpirationChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
Time new_expiry_time) = 0;
|
|
|
|
// Called by the CDM when session |session_id| is closed. Size
|
|
// parameter should not include null termination.
|
|
virtual void OnSessionClosed(const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// The following are optional methods that may not be implemented on all
|
|
// platforms.
|
|
|
|
// Sends a platform challenge for the given |service_id|. |challenge| is at
|
|
// most 256 bits of data to be signed. Once the challenge has been completed,
|
|
// the host will call ContentDecryptionModule::OnPlatformChallengeResponse()
|
|
// with the signed challenge response and platform certificate. Size
|
|
// parameters should not include null termination.
|
|
virtual void SendPlatformChallenge(const char* service_id,
|
|
uint32_t service_id_size,
|
|
const char* challenge,
|
|
uint32_t challenge_size) = 0;
|
|
|
|
// Attempts to enable output protection (e.g. HDCP) on the display link. The
|
|
// |desired_protection_mask| is a bit mask of OutputProtectionMethods. No
|
|
// status callback is issued, the CDM must call QueryOutputProtectionStatus()
|
|
// periodically to ensure the desired protections are applied.
|
|
virtual void EnableOutputProtection(uint32_t desired_protection_mask) = 0;
|
|
|
|
// Requests the current output protection status. Once the host has the status
|
|
// it will call ContentDecryptionModule::OnQueryOutputProtectionStatus().
|
|
virtual void QueryOutputProtectionStatus() = 0;
|
|
|
|
// Must be called by the CDM if it returned kDeferredInitialization during
|
|
// InitializeAudioDecoder() or InitializeVideoDecoder().
|
|
virtual void OnDeferredInitializationDone(StreamType stream_type,
|
|
Status decoder_status) = 0;
|
|
|
|
// Creates a FileIO object from the host to do file IO operation. Returns NULL
|
|
// if a FileIO object cannot be obtained. Once a valid FileIO object is
|
|
// returned, |client| must be valid until FileIO::Close() is called. The
|
|
// CDM can call this method multiple times to operate on different files.
|
|
virtual FileIO* CreateFileIO(FileIOClient* client) = 0;
|
|
|
|
// Requests a specific version of the storage ID. A storage ID is a stable,
|
|
// device specific ID used by the CDM to securely store persistent data. The
|
|
// ID will be returned by the host via ContentDecryptionModule::OnStorageId().
|
|
// If |version| is 0, the latest version will be returned. All |version|s
|
|
// that are greater than or equal to 0x80000000 are reserved for the CDM and
|
|
// should not be supported or returned by the host. The CDM must not expose
|
|
// the ID outside the client device, even in encrypted form.
|
|
virtual void RequestStorageId(uint32_t version) = 0;
|
|
|
|
// Reports the metric |metric_name| with value |value| to the host. Can be
|
|
// called by the CDM at any time. May report the same metric multiple times
|
|
// during the lifetime of the CDM.
|
|
virtual void ReportMetrics(MetricName metric_name, uint64_t value) = 0;
|
|
|
|
protected:
|
|
Host_11() {}
|
|
virtual ~Host_11() {}
|
|
};
|
|
|
|
class CDM_CLASS_API Host_12 {
|
|
public:
|
|
static const int kVersion = 12;
|
|
|
|
// Returns a Buffer* containing non-zero members upon success, or NULL on
|
|
// failure. The caller owns the Buffer* after this call. The buffer is not
|
|
// guaranteed to be zero initialized. The capacity of the allocated Buffer
|
|
// is guaranteed to be not less than |capacity|.
|
|
virtual Buffer* Allocate(uint32_t capacity) = 0;
|
|
|
|
// Requests the host to call ContentDecryptionModule::TimerFired() |delay_ms|
|
|
// from now with |context|.
|
|
virtual void SetTimer(int64_t delay_ms, void* context) = 0;
|
|
|
|
// Returns the current wall time.
|
|
virtual Time GetCurrentWallTime() = 0;
|
|
|
|
// Called by the CDM with the result after the CDM instance was initialized.
|
|
virtual void OnInitialized(bool success) = 0;
|
|
|
|
// Called by the CDM when a key status is available in response to
|
|
// GetStatusForPolicy().
|
|
virtual void OnResolveKeyStatusPromise(uint32_t promise_id,
|
|
KeyStatus key_status) = 0;
|
|
|
|
// Called by the CDM when a session is created or loaded and the value for the
|
|
// MediaKeySession's sessionId attribute is available (|session_id|).
|
|
// This must be called before OnSessionMessage() or
|
|
// OnSessionKeysChange() is called for the same session. |session_id_size|
|
|
// should not include null termination.
|
|
// When called in response to LoadSession(), the |session_id| must be the
|
|
// same as the |session_id| passed in LoadSession(), or NULL if the
|
|
// session could not be loaded.
|
|
virtual void OnResolveNewSessionPromise(uint32_t promise_id,
|
|
const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// Called by the CDM when a session is updated or released.
|
|
virtual void OnResolvePromise(uint32_t promise_id) = 0;
|
|
|
|
// Called by the CDM when an error occurs as a result of one of the
|
|
// ContentDecryptionModule calls that accept a |promise_id|.
|
|
// |exception| must be specified. |error_message| and |system_code|
|
|
// are optional. |error_message_size| should not include null termination.
|
|
virtual void OnRejectPromise(uint32_t promise_id,
|
|
Exception exception,
|
|
uint32_t system_code,
|
|
const char* error_message,
|
|
uint32_t error_message_size) = 0;
|
|
|
|
// Called by the CDM when it has a message for session |session_id|.
|
|
// Size parameters should not include null termination.
|
|
virtual void OnSessionMessage(const char* session_id,
|
|
uint32_t session_id_size,
|
|
MessageType message_type,
|
|
const char* message,
|
|
uint32_t message_size) = 0;
|
|
|
|
// Called by the CDM when there has been a change in keys or their status for
|
|
// session |session_id|. |has_additional_usable_key| should be set if a
|
|
// key is newly usable (e.g. new key available, previously expired key has
|
|
// been renewed, etc.) and the browser should attempt to resume playback.
|
|
// |keys_info| is the list of key IDs for this session along with their
|
|
// current status. |keys_info_count| is the number of entries in |keys_info|.
|
|
// Size parameter for |session_id| should not include null termination.
|
|
virtual void OnSessionKeysChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
bool has_additional_usable_key,
|
|
const KeyInformation* keys_info,
|
|
uint32_t keys_info_count) = 0;
|
|
|
|
// Called by the CDM when there has been a change in the expiration time for
|
|
// session |session_id|. This can happen as the result of an Update() call
|
|
// or some other event. If this happens as a result of a call to Update(),
|
|
// it must be called before resolving the Update() promise. |new_expiry_time|
|
|
// represents the time after which the key(s) in the session will no longer
|
|
// be usable for decryption. It can be 0 if no such time exists or if the
|
|
// license explicitly never expires. Size parameter should not include null
|
|
// termination.
|
|
virtual void OnExpirationChange(const char* session_id,
|
|
uint32_t session_id_size,
|
|
Time new_expiry_time) = 0;
|
|
|
|
// Called by the CDM when session |session_id| is closed. Size
|
|
// parameter should not include null termination.
|
|
virtual void OnSessionClosed(const char* session_id,
|
|
uint32_t session_id_size) = 0;
|
|
|
|
// The following are optional methods that may not be implemented on all
|
|
// platforms.
|
|
|
|
// Sends a platform challenge for the given |service_id|. |challenge| is at
|
|
// most 256 bits of data to be signed. Once the challenge has been completed,
|
|
// the host will call ContentDecryptionModule::OnPlatformChallengeResponse()
|
|
// with the signed challenge response and platform certificate. Size
|
|
// parameters should not include null termination.
|
|
virtual void SendPlatformChallenge(const char* service_id,
|
|
uint32_t service_id_size,
|
|
const char* challenge,
|
|
uint32_t challenge_size) = 0;
|
|
|
|
// Attempts to enable output protection (e.g. HDCP) on the display link. The
|
|
// |desired_protection_mask| is a bit mask of OutputProtectionMethods. No
|
|
// status callback is issued, the CDM must call QueryOutputProtectionStatus()
|
|
// periodically to ensure the desired protections are applied.
|
|
virtual void EnableOutputProtection(uint32_t desired_protection_mask) = 0;
|
|
|
|
// Requests the current output protection status. Once the host has the status
|
|
// it will call ContentDecryptionModule::OnQueryOutputProtectionStatus().
|
|
virtual void QueryOutputProtectionStatus() = 0;
|
|
|
|
// Must be called by the CDM if it returned kDeferredInitialization during
|
|
// InitializeAudioDecoder() or InitializeVideoDecoder().
|
|
virtual void OnDeferredInitializationDone(StreamType stream_type,
|
|
Status decoder_status) = 0;
|
|
|
|
// Creates a FileIO object from the host to do file IO operation. Returns NULL
|
|
// if a FileIO object cannot be obtained. Once a valid FileIO object is
|
|
// returned, |client| must be valid until FileIO::Close() is called. The
|
|
// CDM can call this method multiple times to operate on different files.
|
|
virtual FileIO* CreateFileIO(FileIOClient* client) = 0;
|
|
|
|
// Requests a specific version of the storage ID. A storage ID is a stable,
|
|
// device specific ID used by the CDM to securely store persistent data. The
|
|
// ID will be returned by the host via ContentDecryptionModule::OnStorageId().
|
|
// If |version| is 0, the latest version will be returned. All |version|s
|
|
// that are greater than or equal to 0x80000000 are reserved for the CDM and
|
|
// should not be supported or returned by the host. The CDM must not expose
|
|
// the ID outside the client device, even in encrypted form.
|
|
virtual void RequestStorageId(uint32_t version) = 0;
|
|
|
|
// Reports the metric |metric_name| with value |value| to the host. Can be
|
|
// called by the CDM at any time. May report the same metric multiple times
|
|
// during the lifetime of the CDM.
|
|
virtual void ReportMetrics(MetricName metric_name, uint64_t value) = 0;
|
|
|
|
protected:
|
|
Host_12() {}
|
|
virtual ~Host_12() {}
|
|
};
|
|
|
|
} // namespace cdm
|
|
|
|
#endif // CDM_CONTENT_DECRYPTION_MODULE_H_
|