aes_decryptor.cc revision f8ee788a64d60abd8f2d742a5fdedde054ecd910
1ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch// Copyright 2013 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5ba5b9a6411cb1792fd21f0a078d7a25cd1ceec16Ben Murdoch#include "media/cdm/aes_decryptor.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#include <list>
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <vector>
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/stl_util.h"
12868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/string_number_conversions.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/encryptor.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/symmetric_key.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/audio_decoder_config.h"
16f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)#include "media/base/cdm_promise.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decoder_buffer.h"
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/decrypt_config.h"
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_decoder_config.h"
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "media/base/video_frame.h"
21f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "media/cdm/json_web_key.h"
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace media {
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
25a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// Keeps track of the session IDs and DecryptionKeys. The keys are ordered by
26a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// insertion time (last insertion is first). It takes ownership of the
27a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)// DecryptionKeys.
28a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)class AesDecryptor::SessionIdDecryptionKeyMap {
29a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Use a std::list to actually hold the data. Insertion is always done
30a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // at the front, so the "latest" decryption key is always the first one
31a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // in the list.
32f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  typedef std::list<std::pair<std::string, DecryptionKey*> > KeyList;
33a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
34a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) public:
35a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  SessionIdDecryptionKeyMap() {}
36a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ~SessionIdDecryptionKeyMap() { STLDeleteValues(&key_list_); }
37a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
38a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Replaces value if |session_id| is already present, or adds it if not.
39a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // This |decryption_key| becomes the latest until another insertion or
40a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |session_id| is erased.
41f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  void Insert(const std::string& web_session_id,
42f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)              scoped_ptr<DecryptionKey> decryption_key);
43a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
44a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry for |session_id| if present.
45f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  void Erase(const std::string& web_session_id);
46a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
47a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns whether the list is empty
48a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool Empty() const { return key_list_.empty(); }
49a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
50a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Returns the last inserted DecryptionKey.
51a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* LatestDecryptionKey() {
52a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(!key_list_.empty());
53a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return key_list_.begin()->second;
54a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
55a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
56a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) private:
57f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Searches the list for an element with |web_session_id|.
58f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator Find(const std::string& web_session_id);
59a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
60a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Deletes the entry pointed to by |position|.
61a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void Erase(KeyList::iterator position);
62a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
63a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyList key_list_;
64a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
65a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(SessionIdDecryptionKeyMap);
66a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)};
67a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
68a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Insert(
69f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id,
70a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    scoped_ptr<DecryptionKey> decryption_key) {
71f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator it = Find(web_session_id);
72a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it != key_list_.end())
73a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    Erase(it);
74a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DecryptionKey* raw_ptr = decryption_key.release();
75f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  key_list_.push_front(std::make_pair(web_session_id, raw_ptr));
76a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
77a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
78f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(
79f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id) {
80f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  KeyList::iterator it = Find(web_session_id);
81a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (it == key_list_.end())
82a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return;
83a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  Erase(it);
84a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
85a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
86a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::KeyList::iterator
87f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)AesDecryptor::SessionIdDecryptionKeyMap::Find(
88f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    const std::string& web_session_id) {
89a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  for (KeyList::iterator it = key_list_.begin(); it != key_list_.end(); ++it) {
90f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    if (it->first == web_session_id)
91a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return it;
92a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
93a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_list_.end();
94a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
95a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
96a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void AesDecryptor::SessionIdDecryptionKeyMap::Erase(
97a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    KeyList::iterator position) {
98a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DCHECK(position->second);
99a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  delete position->second;
100a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_list_.erase(position);
101a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
102a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
103a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)uint32 AesDecryptor::next_web_session_id_ = 1;
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum ClearBytesBufferSel {
1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kSrcContainsClearBytes,
1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  kDstContainsClearBytes
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static void CopySubsamples(const std::vector<SubsampleEntry>& subsamples,
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const ClearBytesBufferSel sel,
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const uint8* src,
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           uint8* dst) {
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const SubsampleEntry& subsample = subsamples[i];
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (sel == kSrcContainsClearBytes) {
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      src += subsample.clear_bytes;
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      dst += subsample.clear_bytes;
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    memcpy(dst, src, subsample.cypher_bytes);
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    src += subsample.cypher_bytes;
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    dst += subsample.cypher_bytes;
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Decrypts |input| using |key|.  Returns a DecoderBuffer with the decrypted
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// data if decryption succeeded or NULL if decryption failed.
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input,
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                crypto::SymmetricKey* key) {
131ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.data_size());
132ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(input.decrypt_config());
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(key);
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  crypto::Encryptor encryptor;
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Init(key, crypto::Encryptor::CTR, "")) {
1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not initialize decryptor.";
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
141ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  DCHECK_EQ(input.decrypt_config()->iv().size(),
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)            static_cast<size_t>(DecryptConfig::kDecryptionKeySize));
143ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (!encryptor.SetCounter(input.decrypt_config()->iv())) {
1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not set counter block.";
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1485d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  const char* sample = reinterpret_cast<const char*>(input.data());
1495d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  size_t sample_size = static_cast<size_t>(input.data_size());
1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
151f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted.";
152f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (sample_size == 0)
153a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return NULL;
154a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
155ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (input.decrypt_config()->subsamples().empty()) {
1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string decrypted_text;
1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::StringPiece encrypted_text(sample, sample_size);
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Could not decrypt data.";
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TODO(xhwang): Find a way to avoid this data copy.
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return DecoderBuffer::CopyFrom(
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        reinterpret_cast<const uint8*>(decrypted_text.data()),
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        decrypted_text.size());
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const std::vector<SubsampleEntry>& subsamples =
170ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch      input.decrypt_config()->subsamples();
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
172f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_clear_size = 0;
173f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_encrypted_size = 0;
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < subsamples.size(); i++) {
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_clear_size += subsamples[i].clear_bytes;
1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    total_encrypted_size += subsamples[i].cypher_bytes;
177f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // Check for overflow. This check is valid because *_size is unsigned.
178f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(total_clear_size >= subsamples[i].clear_bytes);
179f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (total_encrypted_size < subsamples[i].cypher_bytes)
180f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      return NULL;
1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
182f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  size_t total_size = total_clear_size + total_encrypted_size;
183f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (total_size < total_clear_size || total_size != sample_size) {
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Subsample sizes do not equal input size";
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
188a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  // No need to decrypt if there is no encrypted data.
189a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  if (total_encrypted_size <= 0) {
190a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)    return DecoderBuffer::CopyFrom(reinterpret_cast<const uint8*>(sample),
191a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)                                   sample_size);
192a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  }
193a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // The encrypted portions of all subsamples must form a contiguous block,
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // such that an encrypted subsample that ends away from a block boundary is
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // immediately followed by the start of the next encrypted subsample. We
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy all encrypted subsamples to a contiguous buffer, decrypt them, then
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy the decrypted bytes over the encrypted bytes in the output.
1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // TODO(strobe): attempt to reduce number of memory copies
200c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  scoped_ptr<uint8[]> encrypted_bytes(new uint8[total_encrypted_size]);
2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kSrcContainsClearBytes,
2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(sample), encrypted_bytes.get());
2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::StringPiece encrypted_text(
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const char*>(encrypted_bytes.get()),
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      total_encrypted_size);
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string decrypted_text;
2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) {
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DVLOG(1) << "Could not decrypt data.";
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
212a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  DCHECK_EQ(decrypted_text.size(), encrypted_text.size());
2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> output = DecoderBuffer::CopyFrom(
2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<const uint8*>(sample), sample_size);
2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CopySubsamples(subsamples, kDstContainsClearBytes,
2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 reinterpret_cast<const uint8*>(decrypted_text.data()),
218ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch                 output->writable_data());
2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return output;
2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
222f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)AesDecryptor::AesDecryptor(const SessionMessageCB& session_message_cb,
223f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                           const SessionClosedCB& session_closed_cb)
224f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    : session_message_cb_(session_message_cb),
225f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      session_closed_cb_(session_closed_cb) {
226f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DCHECK(!session_message_cb_.is_null());
227f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DCHECK(!session_closed_cb_.is_null());
228f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)}
2295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::~AesDecryptor() {
231a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.clear();
2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
234f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::CreateSession(const std::string& init_data_type,
235a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* init_data,
236f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 int init_data_length,
237f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 SessionType session_type,
238f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 scoped_ptr<NewSessionCdmPromise> promise) {
239f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  std::string web_session_id(base::UintToString(next_web_session_id_++));
240f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  valid_sessions_.insert(web_session_id);
241f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
242f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // For now, the AesDecryptor does not care about |init_data_type| or
243f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // |session_type|; just resolve the promise and then fire a message event
244f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // with the |init_data| as the request.
245f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Validate |init_data_type| and |session_type|.
246eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  std::vector<uint8> message;
247eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  if (init_data && init_data_length)
248eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    message.assign(init_data, init_data + init_data_length);
2495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
250f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve(web_session_id);
251f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
252f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  session_message_cb_.Run(web_session_id, message, GURL());
2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
255f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::LoadSession(const std::string& web_session_id,
256f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                               scoped_ptr<NewSessionCdmPromise> promise) {
2575d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // TODO(xhwang): Change this to NOTREACHED() when blink checks for key systems
2585d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // that do not support loadSession. See http://crbug.com/342481
259f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->reject(NOT_SUPPORTED_ERROR, 0, "LoadSession() is not supported.");
2605d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)}
2615d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
262f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::UpdateSession(const std::string& web_session_id,
263a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                 const uint8* response,
264f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 int response_length,
265f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                 scoped_ptr<SimpleCdmPromise> promise) {
266a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK(response);
267a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  CHECK_GT(response_length, 0);
268f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
269f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Convert back to a DCHECK once prefixed EME is removed.
270f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  if (valid_sessions_.find(web_session_id) == valid_sessions_.end()) {
271f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
272f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    return;
273f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  }
274a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
275a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  std::string key_string(reinterpret_cast<const char*>(response),
276a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                         response_length);
277f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
278f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  KeyIdAndKeyPairs keys;
279f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (!ExtractKeysFromJWKSet(key_string, &keys)) {
280f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(
281f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)        INVALID_ACCESS_ERROR, 0, "response is not a valid JSON Web Key Set.");
282f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
283f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
2845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
285f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  // Make sure that at least one key was extracted.
286f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  if (keys.empty()) {
287f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(
288f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)        INVALID_ACCESS_ERROR, 0, "response does not contain any keys.");
289f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    return;
290f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
291f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
292f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) {
293f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (it->second.length() !=
29458537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)        static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) {
29558537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      DVLOG(1) << "Invalid key length: " << key_string.length();
296f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      promise->reject(INVALID_ACCESS_ERROR, 0, "Invalid key length.");
29758537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
29858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
299f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    if (!AddDecryptionKey(web_session_id, it->first, it->second)) {
300f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)      promise->reject(INVALID_ACCESS_ERROR, 0, "Unable to add key.");
30158537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)      return;
30258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    }
30358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
3045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3055d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  {
3065d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    base::AutoLock auto_lock(new_key_cb_lock_);
3075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3085d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (!new_audio_key_cb_.is_null())
3095d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      new_audio_key_cb_.Run();
3105d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
3115d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (!new_video_key_cb_.is_null())
3125d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      new_video_key_cb_.Run();
3135d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  }
3145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
315f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve();
3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
318f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::ReleaseSession(const std::string& web_session_id,
319f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)                                  scoped_ptr<SimpleCdmPromise> promise) {
3205d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  // Validate that this is a reference to an active session and then forget it.
321f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  std::set<std::string>::iterator it = valid_sessions_.find(web_session_id);
322f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // TODO(jrummell): Convert back to a DCHECK once prefixed EME is removed.
323f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  if (it == valid_sessions_.end()) {
324f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
325f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    return;
326f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  }
327f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)
3285d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  valid_sessions_.erase(it);
3295d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
330f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Close the session.
331f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  DeleteKeysForSession(web_session_id);
332f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  promise->resolve();
333f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  session_closed_cb_.Run(web_session_id);
3345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
336eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen MurdochDecryptor* AesDecryptor::GetDecryptor() {
337868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)  return this;
338868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)}
339868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)
3402a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::RegisterNewKeyCB(StreamType stream_type,
3412a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                    const NewKeyCB& new_key_cb) {
3425d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  base::AutoLock auto_lock(new_key_cb_lock_);
3435d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
3445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  switch (stream_type) {
3455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kAudio:
3462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_audio_key_cb_ = new_key_cb;
3475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    case kVideo:
3492a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      new_video_key_cb_ = new_key_cb;
3505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    default:
3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      NOTREACHED();
3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::Decrypt(StreamType stream_type,
3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const scoped_refptr<DecoderBuffer>& encrypted,
3585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           const DecryptCB& decrypt_cb) {
359ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  CHECK(encrypted->decrypt_config());
3605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<DecoderBuffer> decrypted;
3625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // An empty iv string signals that the frame is unencrypted.
363ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  if (encrypted->decrypt_config()->iv().empty()) {
3645d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    decrypted = DecoderBuffer::CopyFrom(encrypted->data(),
3655d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)                                        encrypted->data_size());
3665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
367ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch    const std::string& key_id = encrypted->decrypt_config()->key_id();
3682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    DecryptionKey* key = GetKey(key_id);
3692a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    if (!key) {
3702a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      DVLOG(1) << "Could not find a matching key for the given key ID.";
3712a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      decrypt_cb.Run(kNoKey, NULL);
3722a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      return;
3732a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    }
3742a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    crypto::SymmetricKey* decryption_key = key->decryption_key();
376868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    decrypted = DecryptData(*encrypted.get(), decryption_key);
377868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)    if (!decrypted.get()) {
3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      DVLOG(1) << "Decryption failed.";
3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      decrypt_cb.Run(kError, NULL);
3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return;
3815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
384ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_timestamp(encrypted->timestamp());
385ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch  decrypted->set_duration(encrypted->duration());
3865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decrypt_cb.Run(kSuccess, decrypted);
3875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::CancelDecrypt(StreamType stream_type) {
3905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Decrypt() calls the DecryptCB synchronously so there's nothing to cancel.
3915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3932a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeAudioDecoder(const AudioDecoderConfig& config,
3945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
3955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support audio decoding.
3965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
3975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3992a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void AesDecryptor::InitializeVideoDecoder(const VideoDecoderConfig& config,
4005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                          const DecoderInitCB& init_cb) {
4015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // AesDecryptor does not support video decoding.
4025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  init_cb.Run(false);
4035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeAudio(
4065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
4075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const AudioDecodeCB& audio_decode_cb) {
4085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio decoding";
4095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DecryptAndDecodeVideo(
4125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const scoped_refptr<DecoderBuffer>& encrypted,
4135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const VideoDecodeCB& video_decode_cb) {
4145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support video decoding";
4155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::ResetDecoder(StreamType stream_type) {
4185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
4195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void AesDecryptor::DeinitializeDecoder(StreamType stream_type) {
4225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTREACHED() << "AesDecryptor does not support audio/video decoding";
4235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
425f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)bool AesDecryptor::AddDecryptionKey(const std::string& web_session_id,
426a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                    const std::string& key_id,
42758537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)                                    const std::string& key_string) {
42858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  scoped_ptr<DecryptionKey> decryption_key(new DecryptionKey(key_string));
42958537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  if (!decryption_key->Init()) {
43058537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    DVLOG(1) << "Could not initialize decryption key.";
43158537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)    return false;
43258537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  }
43358537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)
4345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
435a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
436a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_entry != key_map_.end()) {
437f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    key_id_entry->second->Insert(web_session_id, decryption_key.Pass());
438a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return true;
4395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
440a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
441a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // |key_id| not found, so need to create new entry.
442a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  scoped_ptr<SessionIdDecryptionKeyMap> inner_map(
443a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      new SessionIdDecryptionKeyMap());
444f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  inner_map->Insert(web_session_id, decryption_key.Pass());
445a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  key_map_.add(key_id, inner_map.Pass());
44658537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)  return true;
4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey* AesDecryptor::GetKey(
4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const std::string& key_id) const {
4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
452a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
453a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (key_id_found == key_map_.end())
4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
456a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  // Return the key from the "latest" session_id entry.
457a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return key_id_found->second->LatestDecryptionKey();
458a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
459a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
460f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)void AesDecryptor::DeleteKeysForSession(const std::string& web_session_id) {
461a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  base::AutoLock auto_lock(key_map_lock_);
462a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
463f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // Remove all keys associated with |web_session_id|. Since the data is
464f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // optimized for access in GetKey(), we need to look at each entry in
465f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)  // |key_map_|.
466a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  KeyIdToSessionKeysMap::iterator it = key_map_.begin();
467a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  while (it != key_map_.end()) {
468f8ee788a64d60abd8f2d742a5fdedde054ecd910Torne (Richard Coles)    it->second->Erase(web_session_id);
469a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (it->second->Empty()) {
470a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // Need to get rid of the entry for this key_id. This will mess up the
471a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // iterator, so we need to increment it first.
472a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      KeyIdToSessionKeysMap::iterator current = it;
473a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
474a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      key_map_.erase(current);
475a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    } else {
476a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      ++it;
477a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
478a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
4795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret)
4825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : secret_(secret) {
4835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AesDecryptor::DecryptionKey::~DecryptionKey() {}
4865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool AesDecryptor::DecryptionKey::Init() {
4885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CHECK(!secret_.empty());
4895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  decryption_key_.reset(crypto::SymmetricKey::Import(
4905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      crypto::SymmetricKey::AES, secret_));
491c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  if (!decryption_key_)
4925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
4935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
4945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace media
497