aes_decryptor.cc revision 03b57e008b61dfcb1fbad3aea950ae0e001748b0
1ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch// Copyright 2013 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch#include "media/cdm/aes_decryptor.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#include <list>
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <vector>
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/stl_util.h"
12868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/string_number_conversions.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/encryptor.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/symmetric_key.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/audio_decoder_config.h"
16f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)#include "media/base/cdm_promise.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decoder_buffer.h"
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decrypt_config.h"
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_decoder_config.h"
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_frame.h"
21f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "media/cdm/json_web_key.h"
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace media {
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
25a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// Keeps track of the session IDs and DecryptionKeys. The keys are ordered by
26a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// insertion time (last insertion is first). It takes ownership of the
27a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// DecryptionKeys.
28a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)class AesDecryptor::SessionIdDecryptionKeyMap {
29a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Use a std::list to actually hold the data. Insertion is always done
30a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // at the front, so the "latest" decryption key is always the first one
31a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // in the list.
32f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  typedef std::list<std::pair<std::string, DecryptionKey*> > KeyList;
33a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
34a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) public:
35a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  SessionIdDecryptionKeyMap() {}
36a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ~SessionIdDecryptionKeyMap() { STLDeleteValues(&key_list_); }
37a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
38a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Replaces value if |session_id| is already present, or adds it if not.
39a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // This |decryption_key| becomes the latest until another insertion or
40a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |session_id| is erased.
41f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  void Insert(const std::string& web_session_id,
42f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)              scoped_ptr<DecryptionKey> decryption_key);
43a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
44a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry for |session_id| if present.
45f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  void Erase(const std::string& web_session_id);
46a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
47a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns whether the list is empty
48a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool Empty() const { return key_list_.empty(); }
49a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
50a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns the last inserted DecryptionKey.
51a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* LatestDecryptionKey() {
52a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(!key_list_.empty());
53a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return key_list_.begin()->second;
54a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
55a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
566e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  bool Contains(const std::string& web_session_id) {
576e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)    return Find(web_session_id) != key_list_.end();
586e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  }
596e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)
60a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) private:
61f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Searches the list for an element with |web_session_id|.
62f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator Find(const std::string& web_session_id);
63a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
64a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry pointed to by |position|.
65a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void Erase(KeyList::iterator position);
66a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
67a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList key_list_;
68a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
69a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(SessionIdDecryptionKeyMap);
70a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)};
71a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
72a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Insert(
73f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id,
74a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    scoped_ptr<DecryptionKey> decryption_key) {
75f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator it = Find(web_session_id);
76a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it != key_list_.end())
77a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    Erase(it);
78a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* raw_ptr = decryption_key.release();
79f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  key_list_.push_front(std::make_pair(web_session_id, raw_ptr));
80a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
81a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
82f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(
83f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id) {
84f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator it = Find(web_session_id);
85a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it == key_list_.end())
86a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return;
87a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  Erase(it);
88a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
89a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
90a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::KeyList::iterator
91f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::Find(
92f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id) {
93a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  for (KeyList::iterator it = key_list_.begin(); it != key_list_.end(); ++it) {
94f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    if (it->first == web_session_id)
95a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return it;
96a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
97a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_list_.end();
98a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
99a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
100a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(
101a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    KeyList::iterator position) {
102a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DCHECK(position->second);
103a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  delete position->second;
104a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_list_.erase(position);
105a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
106a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
107a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)uint32 AesDecryptor::next_web_session_id_ = 1;
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum ClearBytesBufferSel {
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kSrcContainsClearBytes,
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kDstContainsClearBytes
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static void CopySubsamples(const std::vector<SubsampleEntry>& subsamples,
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const ClearBytesBufferSel sel,
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const uint8* src,
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           uint8* dst) {
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const SubsampleEntry& subsample = subsamples[i];
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (sel == kSrcContainsClearBytes) {
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      src += subsample.clear_bytes;
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      dst += subsample.clear_bytes;
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    memcpy(dst, src, subsample.cypher_bytes);
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    src += subsample.cypher_bytes;
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    dst += subsample.cypher_bytes;
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Decrypts |input| using |key|.  Returns a DecoderBuffer with the decrypted
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// data if decryption succeeded or NULL if decryption failed.
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input,
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                crypto::SymmetricKey* key) {
135ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.data_size());
136ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.decrypt_config());
1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(key);
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  crypto::Encryptor encryptor;
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Init(key, crypto::Encryptor::CTR, "")) {
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not initialize decryptor.";
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
145ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  DCHECK_EQ(input.decrypt_config()->iv().size(),
1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)            static_cast<size_t>(DecryptConfig::kDecryptionKeySize));
147ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (!encryptor.SetCounter(input.decrypt_config()->iv())) {
1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not set counter block.";
1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1525d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  const char* sample = reinterpret_cast<const char*>(input.data());
1535d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  size_t sample_size = static_cast<size_t>(input.data_size());
1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
155f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted.";
156f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (sample_size == 0)
157a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return NULL;
158a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
159ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (input.decrypt_config()->subsamples().empty()) {
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string decrypted_text;
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::StringPiece encrypted_text(sample, sample_size);
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Could not decrypt data.";
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TODO(xhwang): Find a way to avoid this data copy.
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return DecoderBuffer::CopyFrom(
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        reinterpret_cast<const uint8*>(decrypted_text.data()),
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        decrypted_text.size());
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const std::vector<SubsampleEntry>& subsamples =
174ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch      input.decrypt_config()->subsamples();
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
176f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_clear_size = 0;
177f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_encrypted_size = 0;
1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_clear_size += subsamples[i].clear_bytes;
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_encrypted_size += subsamples[i].cypher_bytes;
181f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // Check for overflow. This check is valid because *_size is unsigned.
182f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(total_clear_size >= subsamples[i].clear_bytes);
183f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (total_encrypted_size < subsamples[i].cypher_bytes)
184f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      return NULL;
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
186f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_size = total_clear_size + total_encrypted_size;
187f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (total_size < total_clear_size || total_size != sample_size) {
1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Subsample sizes do not equal input size";
1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
192a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  // No need to decrypt if there is no encrypted data.
193a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  if (total_encrypted_size <= 0) {
194a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return DecoderBuffer::CopyFrom(reinterpret_cast<const uint8*>(sample),
195a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)                                   sample_size);
196a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  }
197a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // The encrypted portions of all subsamples must form a contiguous block,
1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // such that an encrypted subsample that ends away from a block boundary is
2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // immediately followed by the start of the next encrypted subsample. We
2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy all encrypted subsamples to a contiguous buffer, decrypt them, then
2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy the decrypted bytes over the encrypted bytes in the output.
2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // TODO(strobe): attempt to reduce number of memory copies
204c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  scoped_ptr<uint8[]> encrypted_bytes(new uint8[total_encrypted_size]);
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kSrcContainsClearBytes,
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(sample), encrypted_bytes.get());
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::StringPiece encrypted_text(
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const char*>(encrypted_bytes.get()),
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      total_encrypted_size);
2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string decrypted_text;
2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not decrypt data.";
2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
216a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  DCHECK_EQ(decrypted_text.size(), encrypted_text.size());
2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> output = DecoderBuffer::CopyFrom(
2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const uint8*>(sample), sample_size);
2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kDstContainsClearBytes,
2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(decrypted_text.data()),
222ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch                 output->writable_data());
2235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return output;
2245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
226f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)AesDecryptor::AesDecryptor(const SessionMessageCB& session_message_cb,
227f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                           const SessionClosedCB& session_closed_cb)
228f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    : session_message_cb_(session_message_cb),
229f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      session_closed_cb_(session_closed_cb) {
230f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DCHECK(!session_message_cb_.is_null());
231f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DCHECK(!session_closed_cb_.is_null());
232f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)}
2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::~AesDecryptor() {
235a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.clear();
2365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
238f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::CreateSession(const std::string& init_data_type,
239a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* init_data,
240f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 int init_data_length,
241f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 SessionType session_type,
242f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 scoped_ptr<NewSessionCdmPromise> promise) {
243f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  std::string web_session_id(base::UintToString(next_web_session_id_++));
244f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  valid_sessions_.insert(web_session_id);
245f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
246f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // For now, the AesDecryptor does not care about |init_data_type| or
247f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // |session_type|; just resolve the promise and then fire a message event
24803b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)  // using the |init_data| as the key ID in the license request.
249f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Validate |init_data_type| and |session_type|.
250eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  std::vector<uint8> message;
251eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  if (init_data && init_data_length)
25203b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)    CreateLicenseRequest(init_data, init_data_length, session_type, &message);
2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
254f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve(web_session_id);
255f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
256f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  session_message_cb_.Run(web_session_id, message, GURL());
2575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
259f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::LoadSession(const std::string& web_session_id,
260f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                               scoped_ptr<NewSessionCdmPromise> promise) {
2615d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // TODO(xhwang): Change this to NOTREACHED() when blink checks for key systems
2625d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // that do not support loadSession. See http://crbug.com/342481
263f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->reject(NOT_SUPPORTED_ERROR, 0, "LoadSession() is not supported.");
2645d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)}
2655d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
266f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::UpdateSession(const std::string& web_session_id,
267a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* response,
268f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 int response_length,
269f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 scoped_ptr<SimpleCdmPromise> promise) {
270a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK(response);
271a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK_GT(response_length, 0);
272f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
273f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Convert back to a DCHECK once prefixed EME is removed.
274f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  if (valid_sessions_.find(web_session_id) == valid_sessions_.end()) {
275f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
276f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    return;
277f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  }
278a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
279a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  std::string key_string(reinterpret_cast<const char*>(response),
280a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                         response_length);
281f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
282f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  KeyIdAndKeyPairs keys;
28303b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)  SessionType session_type = MediaKeys::TEMPORARY_SESSION;
28403b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)  if (!ExtractKeysFromJWKSet(key_string, &keys, &session_type)) {
285f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(
286f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)        INVALID_ACCESS_ERROR, 0, "response is not a valid JSON Web Key Set.");
287f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
288f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
290f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  // Make sure that at least one key was extracted.
291f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (keys.empty()) {
292f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(
293f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)        INVALID_ACCESS_ERROR, 0, "response does not contain any keys.");
294f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
295f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
296f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
297f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) {
298f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (it->second.length() !=
29958537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)        static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) {
30058537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      DVLOG(1) << "Invalid key length: " << key_string.length();
301f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      promise->reject(INVALID_ACCESS_ERROR, 0, "Invalid key length.");
30258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
30358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
304f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    if (!AddDecryptionKey(web_session_id, it->first, it->second)) {
305f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      promise->reject(INVALID_ACCESS_ERROR, 0, "Unable to add key.");
30658537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
30758537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
30858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
3095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3105d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  {
3115d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    base::AutoLock auto_lock(new_key_cb_lock_);
3125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3135d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (!new_audio_key_cb_.is_null())
3145d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      new_audio_key_cb_.Run();
3155d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
3165d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (!new_video_key_cb_.is_null())
3175d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      new_video_key_cb_.Run();
3185d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  }
3195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
320f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve();
3215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3236e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)void AesDecryptor::GetUsableKeyIds(const std::string& web_session_id,
3246e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)                                   scoped_ptr<KeyIdsPromise> promise) {
3256e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  // Since |web_session_id| is not provided by the user, this should never
3266e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  // happen.
3276e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  DCHECK(valid_sessions_.find(web_session_id) != valid_sessions_.end());
3286e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)
3296e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  KeyIdsVector keyids;
3306e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
3316e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  for (KeyIdToSessionKeysMap::iterator it = key_map_.begin();
3326e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)       it != key_map_.end();
3336e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)       ++it) {
3346e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)    if (it->second->Contains(web_session_id))
3356e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)      keyids.push_back(std::vector<uint8>(it->first.begin(), it->first.end()));
3366e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  }
3376e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  promise->resolve(keyids);
3386e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)}
3396e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)
340f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::ReleaseSession(const std::string& web_session_id,
341f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                  scoped_ptr<SimpleCdmPromise> promise) {
3425d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // Validate that this is a reference to an active session and then forget it.
343f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  std::set<std::string>::iterator it = valid_sessions_.find(web_session_id);
344f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Convert back to a DCHECK once prefixed EME is removed.
345f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  if (it == valid_sessions_.end()) {
346f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
347f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    return;
348f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  }
349f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
3505d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  valid_sessions_.erase(it);
3515d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
352f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Close the session.
353f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DeleteKeysForSession(web_session_id);
354f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve();
355f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  session_closed_cb_.Run(web_session_id);
3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
358eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen MurdochDecryptor* AesDecryptor::GetDecryptor() {
359868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)  return this;
360868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)}
361868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)
3622a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::RegisterNewKeyCB(StreamType stream_type,
3632a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                    const NewKeyCB& new_key_cb) {
3645d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  base::AutoLock auto_lock(new_key_cb_lock_);
3655d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
3665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  switch (stream_type) {
3675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kAudio:
3682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_audio_key_cb_ = new_key_cb;
3695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kVideo:
3712a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_video_key_cb_ = new_key_cb;
3725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    default:
3745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      NOTREACHED();
3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::Decrypt(StreamType stream_type,
3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const scoped_refptr<DecoderBuffer>& encrypted,
3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const DecryptCB& decrypt_cb) {
381ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(encrypted->decrypt_config());
3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> decrypted;
3845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // An empty iv string signals that the frame is unencrypted.
385ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (encrypted->decrypt_config()->iv().empty()) {
3865d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    decrypted = DecoderBuffer::CopyFrom(encrypted->data(),
3875d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)                                        encrypted->data_size());
3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
389ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch    const std::string& key_id = encrypted->decrypt_config()->key_id();
3902a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    DecryptionKey* key = GetKey(key_id);
3912a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    if (!key) {
3922a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      DVLOG(1) << "Could not find a matching key for the given key ID.";
3932a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      decrypt_cb.Run(kNoKey, NULL);
3942a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      return;
3952a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    }
3962a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
3975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    crypto::SymmetricKey* decryption_key = key->decryption_key();
398868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    decrypted = DecryptData(*encrypted.get(), decryption_key);
399868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    if (!decrypted.get()) {
4005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Decryption failed.";
4015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      decrypt_cb.Run(kError, NULL);
4025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return;
4035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
4045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
4055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
406ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_timestamp(encrypted->timestamp());
407ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_duration(encrypted->duration());
4085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decrypt_cb.Run(kSuccess, decrypted);
4095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::CancelDecrypt(StreamType stream_type) {
4125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Decrypt() calls the DecryptCB synchronously so there's nothing to cancel.
4135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4152a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeAudioDecoder(const AudioDecoderConfig& config,
4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
4175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support audio decoding.
4185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
4195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4212a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeVideoDecoder(const VideoDecoderConfig& config,
4225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
4235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support video decoding.
4245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
4255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeAudio(
4285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
4295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const AudioDecodeCB& audio_decode_cb) {
4305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio decoding";
4315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeVideo(
4345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
4355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const VideoDecodeCB& video_decode_cb) {
4365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support video decoding";
4375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::ResetDecoder(StreamType stream_type) {
4405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
4415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DeinitializeDecoder(StreamType stream_type) {
4445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
4455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
447f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)bool AesDecryptor::AddDecryptionKey(const std::string& web_session_id,
448a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                    const std::string& key_id,
44958537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)                                    const std::string& key_string) {
45058537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  scoped_ptr<DecryptionKey> decryption_key(new DecryptionKey(key_string));
45158537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  if (!decryption_key->Init()) {
45258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    DVLOG(1) << "Could not initialize decryption key.";
45358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    return false;
45458537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
45558537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)
4565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
457a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
458a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_entry != key_map_.end()) {
459f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    key_id_entry->second->Insert(web_session_id, decryption_key.Pass());
460a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return true;
4615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
462a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
463a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |key_id| not found, so need to create new entry.
464a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  scoped_ptr<SessionIdDecryptionKeyMap> inner_map(
465a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      new SessionIdDecryptionKeyMap());
466f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  inner_map->Insert(web_session_id, decryption_key.Pass());
467a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.add(key_id, inner_map.Pass());
46858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  return true;
4695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey* AesDecryptor::GetKey(
4725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const std::string& key_id) const {
4735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
474a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
475a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_found == key_map_.end())
4765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
4775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
478a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Return the key from the "latest" session_id entry.
479a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_id_found->second->LatestDecryptionKey();
480a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
481a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
482f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::DeleteKeysForSession(const std::string& web_session_id) {
483a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
484a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
485f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Remove all keys associated with |web_session_id|. Since the data is
486f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // optimized for access in GetKey(), we need to look at each entry in
487f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // |key_map_|.
488a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator it = key_map_.begin();
489a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  while (it != key_map_.end()) {
490f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    it->second->Erase(web_session_id);
491a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (it->second->Empty()) {
492a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // Need to get rid of the entry for this key_id. This will mess up the
493a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // iterator, so we need to increment it first.
494a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      KeyIdToSessionKeysMap::iterator current = it;
495a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
496a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      key_map_.erase(current);
497a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    } else {
498a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
499a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
500a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
5015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
5025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret)
5045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : secret_(secret) {
5055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
5065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::~DecryptionKey() {}
5085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool AesDecryptor::DecryptionKey::Init() {
5105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(!secret_.empty());
5115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decryption_key_.reset(crypto::SymmetricKey::Import(
5125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      crypto::SymmetricKey::AES, secret_));
513c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  if (!decryption_key_)
5145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
5155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
5165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
5175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace media
519