aes_decryptor.cc revision a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7
1ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch// Copyright 2013 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch#include "media/cdm/aes_decryptor.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#include <list>
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <vector>
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/stl_util.h"
12868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/string_number_conversions.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/encryptor.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/symmetric_key.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/audio_decoder_config.h"
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decoder_buffer.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decrypt_config.h"
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_decoder_config.h"
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_frame.h"
20f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "media/cdm/json_web_key.h"
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace media {
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
24a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// Keeps track of the session IDs and DecryptionKeys. The keys are ordered by
25a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// insertion time (last insertion is first). It takes ownership of the
26a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// DecryptionKeys.
27a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)class AesDecryptor::SessionIdDecryptionKeyMap {
28a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Use a std::list to actually hold the data. Insertion is always done
29a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // at the front, so the "latest" decryption key is always the first one
30a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // in the list.
31a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  typedef std::list<std::pair<uint32, DecryptionKey*> > KeyList;
32a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
33a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) public:
34a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  SessionIdDecryptionKeyMap() {}
35a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ~SessionIdDecryptionKeyMap() { STLDeleteValues(&key_list_); }
36a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
37a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Replaces value if |session_id| is already present, or adds it if not.
38a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // This |decryption_key| becomes the latest until another insertion or
39a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |session_id| is erased.
40a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void Insert(uint32 session_id, scoped_ptr<DecryptionKey> decryption_key);
41a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
42a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry for |session_id| if present.
43a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void Erase(const uint32 session_id);
44a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
45a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns whether the list is empty
46a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool Empty() const { return key_list_.empty(); }
47a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
48a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns the last inserted DecryptionKey.
49a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* LatestDecryptionKey() {
50a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(!key_list_.empty());
51a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return key_list_.begin()->second;
52a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
53a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
54a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) private:
55a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Searches the list for an element with |session_id|.
56a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList::iterator Find(const uint32 session_id);
57a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
58a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry pointed to by |position|.
59a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void Erase(KeyList::iterator position);
60a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
61a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList key_list_;
62a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
63a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(SessionIdDecryptionKeyMap);
64a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)};
65a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
66a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Insert(
67a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    uint32 session_id,
68a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    scoped_ptr<DecryptionKey> decryption_key) {
69a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList::iterator it = Find(session_id);
70a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it != key_list_.end())
71a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    Erase(it);
72a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* raw_ptr = decryption_key.release();
73a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_list_.push_front(std::make_pair(session_id, raw_ptr));
74a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
75a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
76a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(const uint32 session_id) {
77a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList::iterator it = Find(session_id);
78a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it == key_list_.end())
79a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return;
80a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  Erase(it);
81a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
82a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
83a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::KeyList::iterator
84a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::Find(const uint32 session_id) {
85a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  for (KeyList::iterator it = key_list_.begin(); it != key_list_.end(); ++it) {
86a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (it->first == session_id)
87a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return it;
88a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
89a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_list_.end();
90a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
91a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
92a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(
93a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    KeyList::iterator position) {
94a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DCHECK(position->second);
95a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  delete position->second;
96a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_list_.erase(position);
97a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
98a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
99a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)uint32 AesDecryptor::next_web_session_id_ = 1;
1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum ClearBytesBufferSel {
1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kSrcContainsClearBytes,
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kDstContainsClearBytes
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static void CopySubsamples(const std::vector<SubsampleEntry>& subsamples,
1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const ClearBytesBufferSel sel,
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const uint8* src,
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           uint8* dst) {
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const SubsampleEntry& subsample = subsamples[i];
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (sel == kSrcContainsClearBytes) {
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      src += subsample.clear_bytes;
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      dst += subsample.clear_bytes;
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    memcpy(dst, src, subsample.cypher_bytes);
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    src += subsample.cypher_bytes;
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    dst += subsample.cypher_bytes;
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Decrypts |input| using |key|.  Returns a DecoderBuffer with the decrypted
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// data if decryption succeeded or NULL if decryption failed.
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input,
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                crypto::SymmetricKey* key) {
127ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.data_size());
128ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.decrypt_config());
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(key);
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  crypto::Encryptor encryptor;
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Init(key, crypto::Encryptor::CTR, "")) {
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not initialize decryptor.";
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
137ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  DCHECK_EQ(input.decrypt_config()->iv().size(),
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)            static_cast<size_t>(DecryptConfig::kDecryptionKeySize));
139ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (!encryptor.SetCounter(input.decrypt_config()->iv())) {
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not set counter block.";
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
144ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  const int data_offset = input.decrypt_config()->data_offset();
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const char* sample =
146ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch      reinterpret_cast<const char*>(input.data() + data_offset);
147f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  DCHECK_GT(input.data_size(), data_offset);
148f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t sample_size = static_cast<size_t>(input.data_size() - data_offset);
1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
150f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted.";
151f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (sample_size == 0)
152a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return NULL;
153a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
154ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (input.decrypt_config()->subsamples().empty()) {
1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string decrypted_text;
1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::StringPiece encrypted_text(sample, sample_size);
1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Could not decrypt data.";
1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TODO(xhwang): Find a way to avoid this data copy.
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return DecoderBuffer::CopyFrom(
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        reinterpret_cast<const uint8*>(decrypted_text.data()),
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        decrypted_text.size());
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const std::vector<SubsampleEntry>& subsamples =
169ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch      input.decrypt_config()->subsamples();
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
171f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_clear_size = 0;
172f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_encrypted_size = 0;
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_clear_size += subsamples[i].clear_bytes;
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_encrypted_size += subsamples[i].cypher_bytes;
176f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // Check for overflow. This check is valid because *_size is unsigned.
177f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(total_clear_size >= subsamples[i].clear_bytes);
178f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (total_encrypted_size < subsamples[i].cypher_bytes)
179f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      return NULL;
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
181f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_size = total_clear_size + total_encrypted_size;
182f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (total_size < total_clear_size || total_size != sample_size) {
1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Subsample sizes do not equal input size";
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
187a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  // No need to decrypt if there is no encrypted data.
188a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  if (total_encrypted_size <= 0) {
189a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return DecoderBuffer::CopyFrom(reinterpret_cast<const uint8*>(sample),
190a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)                                   sample_size);
191a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  }
192a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // The encrypted portions of all subsamples must form a contiguous block,
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // such that an encrypted subsample that ends away from a block boundary is
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // immediately followed by the start of the next encrypted subsample. We
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy all encrypted subsamples to a contiguous buffer, decrypt them, then
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy the decrypted bytes over the encrypted bytes in the output.
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // TODO(strobe): attempt to reduce number of memory copies
199c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  scoped_ptr<uint8[]> encrypted_bytes(new uint8[total_encrypted_size]);
2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kSrcContainsClearBytes,
2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(sample), encrypted_bytes.get());
2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::StringPiece encrypted_text(
2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const char*>(encrypted_bytes.get()),
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      total_encrypted_size);
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string decrypted_text;
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not decrypt data.";
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
211a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  DCHECK_EQ(decrypted_text.size(), encrypted_text.size());
2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> output = DecoderBuffer::CopyFrom(
2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const uint8*>(sample), sample_size);
2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kDstContainsClearBytes,
2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(decrypted_text.data()),
217ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch                 output->writable_data());
2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return output;
2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
221a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)AesDecryptor::AesDecryptor(const SessionCreatedCB& session_created_cb,
222a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                           const SessionMessageCB& session_message_cb,
223a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                           const SessionReadyCB& session_ready_cb,
224a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                           const SessionClosedCB& session_closed_cb,
225a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                           const SessionErrorCB& session_error_cb)
226a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    : session_created_cb_(session_created_cb),
227a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_message_cb_(session_message_cb),
228a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_ready_cb_(session_ready_cb),
229a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_closed_cb_(session_closed_cb),
230a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_error_cb_(session_error_cb) {}
2315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::~AesDecryptor() {
233a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.clear();
2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
236a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)bool AesDecryptor::CreateSession(uint32 session_id,
237a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const std::string& type,
238a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* init_data,
239a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 int init_data_length) {
240a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  std::string web_session_id_string(base::UintToString(next_web_session_id_++));
2415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2427d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  // For now, the AesDecryptor does not care about |type|;
2435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // just fire the event with the |init_data| as the request.
244eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  std::vector<uint8> message;
245eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  if (init_data && init_data_length)
246eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    message.assign(init_data, init_data + init_data_length);
2475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
248a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  session_created_cb_.Run(session_id, web_session_id_string);
249a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  session_message_cb_.Run(session_id, message, std::string());
2505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
2515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
253a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::UpdateSession(uint32 session_id,
254a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* response,
255a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 int response_length) {
256a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK(response);
257a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK_GT(response_length, 0);
258a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // TODO(jrummell): Verify that the session for |session_id| exists.
259a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
260a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  std::string key_string(reinterpret_cast<const char*>(response),
261a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                         response_length);
262f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  KeyIdAndKeyPairs keys;
263f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (!ExtractKeysFromJWKSet(key_string, &keys)) {
264a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
265f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
266f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
2675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
268f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  // Make sure that at least one key was extracted.
269f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (keys.empty()) {
270a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
271f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
272f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
273f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
274f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) {
275f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (it->second.length() !=
27658537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)        static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) {
27758537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      DVLOG(1) << "Invalid key length: " << key_string.length();
278a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
27958537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
28058537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
281a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (!AddDecryptionKey(session_id, it->first, it->second)) {
282a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
28358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
28458537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
28558537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
2865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2872a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  if (!new_audio_key_cb_.is_null())
2882a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    new_audio_key_cb_.Run();
2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2902a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  if (!new_video_key_cb_.is_null())
2912a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    new_video_key_cb_.Run();
2925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
293a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  session_ready_cb_.Run(session_id);
2945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
296a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::ReleaseSession(uint32 session_id) {
297a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DeleteKeysForSession(session_id);
298a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  session_closed_cb_.Run(session_id);
2995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
301eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen MurdochDecryptor* AesDecryptor::GetDecryptor() {
302868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)  return this;
303868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)}
304868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)
3052a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::RegisterNewKeyCB(StreamType stream_type,
3062a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                    const NewKeyCB& new_key_cb) {
3075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  switch (stream_type) {
3085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kAudio:
3092a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_audio_key_cb_ = new_key_cb;
3105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kVideo:
3122a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_video_key_cb_ = new_key_cb;
3135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    default:
3155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      NOTREACHED();
3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::Decrypt(StreamType stream_type,
3205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const scoped_refptr<DecoderBuffer>& encrypted,
3215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const DecryptCB& decrypt_cb) {
322ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(encrypted->decrypt_config());
3235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> decrypted;
3255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // An empty iv string signals that the frame is unencrypted.
326ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (encrypted->decrypt_config()->iv().empty()) {
327ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch    int data_offset = encrypted->decrypt_config()->data_offset();
328ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch    decrypted = DecoderBuffer::CopyFrom(encrypted->data() + data_offset,
329ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch                                        encrypted->data_size() - data_offset);
3305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
331ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch    const std::string& key_id = encrypted->decrypt_config()->key_id();
3322a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    DecryptionKey* key = GetKey(key_id);
3332a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    if (!key) {
3342a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      DVLOG(1) << "Could not find a matching key for the given key ID.";
3352a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      decrypt_cb.Run(kNoKey, NULL);
3362a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      return;
3372a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    }
3382a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
3395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    crypto::SymmetricKey* decryption_key = key->decryption_key();
340868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    decrypted = DecryptData(*encrypted.get(), decryption_key);
341868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    if (!decrypted.get()) {
3425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Decryption failed.";
3435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      decrypt_cb.Run(kError, NULL);
3445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return;
3455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
3465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
348ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_timestamp(encrypted->timestamp());
349ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_duration(encrypted->duration());
3505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decrypt_cb.Run(kSuccess, decrypted);
3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::CancelDecrypt(StreamType stream_type) {
3545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Decrypt() calls the DecryptCB synchronously so there's nothing to cancel.
3555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3572a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeAudioDecoder(const AudioDecoderConfig& config,
3585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
3595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support audio decoding.
3605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
3615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3632a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeVideoDecoder(const VideoDecoderConfig& config,
3645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
3655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support video decoding.
3665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
3675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeAudio(
3705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
3715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const AudioDecodeCB& audio_decode_cb) {
3725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio decoding";
3735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeVideo(
3765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
3775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const VideoDecodeCB& video_decode_cb) {
3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support video decoding";
3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::ResetDecoder(StreamType stream_type) {
3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
3835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DeinitializeDecoder(StreamType stream_type) {
3865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
3875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
389a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)bool AesDecryptor::AddDecryptionKey(const uint32 session_id,
390a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                    const std::string& key_id,
39158537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)                                    const std::string& key_string) {
39258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  scoped_ptr<DecryptionKey> decryption_key(new DecryptionKey(key_string));
39358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  if (!decryption_key) {
39458537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    DVLOG(1) << "Could not create key.";
39558537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    return false;
39658537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
39758537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)
39858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  if (!decryption_key->Init()) {
39958537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    DVLOG(1) << "Could not initialize decryption key.";
40058537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    return false;
40158537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
40258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)
4035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
404a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
405a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_entry != key_map_.end()) {
406a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    key_id_entry->second->Insert(session_id, decryption_key.Pass());
407a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return true;
4085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
409a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
410a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |key_id| not found, so need to create new entry.
411a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  scoped_ptr<SessionIdDecryptionKeyMap> inner_map(
412a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      new SessionIdDecryptionKeyMap());
413a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  inner_map->Insert(session_id, decryption_key.Pass());
414a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.add(key_id, inner_map.Pass());
41558537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  return true;
4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey* AesDecryptor::GetKey(
4195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const std::string& key_id) const {
4205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
421a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
422a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_found == key_map_.end())
4235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
4245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
425a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Return the key from the "latest" session_id entry.
426a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_id_found->second->LatestDecryptionKey();
427a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
428a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
429a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::DeleteKeysForSession(const uint32 session_id) {
430a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
431a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
432a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Remove all keys associated with |session_id|. Since the data is optimized
433a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // for access in GetKey(), we need to look at each entry in |key_map_|.
434a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator it = key_map_.begin();
435a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  while (it != key_map_.end()) {
436a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    it->second->Erase(session_id);
437a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (it->second->Empty()) {
438a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // Need to get rid of the entry for this key_id. This will mess up the
439a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // iterator, so we need to increment it first.
440a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      KeyIdToSessionKeysMap::iterator current = it;
441a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
442a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      key_map_.erase(current);
443a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    } else {
444a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
445a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
446a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret)
4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : secret_(secret) {
4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::~DecryptionKey() {}
4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool AesDecryptor::DecryptionKey::Init() {
4565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(!secret_.empty());
4575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decryption_key_.reset(crypto::SymmetricKey::Import(
4585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      crypto::SymmetricKey::AES, secret_));
459c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  if (!decryption_key_)
4605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
4615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
4625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace media
465