| // Copyright 2014 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "media/formats/mp4/track_run_iterator.h" |
| |
| #include <algorithm> |
| #include <iomanip> |
| #include <limits> |
| #include <memory> |
| |
| #include "base/memory/raw_ptr.h" |
| #include "base/metrics/histogram_macros.h" |
| #include "base/numerics/checked_math.h" |
| #include "base/numerics/safe_conversions.h" |
| #include "build/chromecast_buildflags.h" |
| #include "media/base/decrypt_config.h" |
| #include "media/base/demuxer.h" |
| #include "media/base/demuxer_memory_limit.h" |
| #include "media/base/encryption_pattern.h" |
| #include "media/base/encryption_scheme.h" |
| #include "media/base/media_util.h" |
| #include "media/base/timestamp_constants.h" |
| #include "media/formats/mp4/rcheck.h" |
| #include "media/formats/mp4/sample_to_group_iterator.h" |
| #include "media/media_buildflags.h" |
| |
| namespace media { |
| namespace mp4 { |
| |
| struct SampleInfo { |
| uint32_t size; |
| uint32_t duration; |
| int64_t cts_offset; |
| bool is_keyframe; |
| uint32_t cenc_group_description_index; |
| }; |
| |
| struct TrackRunInfo { |
| uint32_t track_id; |
| std::vector<SampleInfo> samples; |
| int64_t timescale; |
| int64_t start_dts; |
| int64_t sample_start_offset; |
| |
| bool is_audio; |
| raw_ptr<const AudioSampleEntry> audio_description; |
| raw_ptr<const VideoSampleEntry> video_description; |
| raw_ptr<const SampleGroupDescription> track_sample_encryption_group; |
| |
| // Stores sample encryption entries, which is populated from 'senc' box if it |
| // is available, otherwise will try to load from cenc auxiliary information. |
| std::vector<SampleEncryptionEntry> sample_encryption_entries; |
| |
| // These variables are useful to load |sample_encryption_entries| from cenc |
| // auxiliary information when 'senc' box is not available. |
| int64_t aux_info_start_offset; // Only valid if aux_info_total_size > 0. |
| int aux_info_default_size; |
| std::vector<uint8_t> aux_info_sizes; // Populated if default_size == 0. |
| int aux_info_total_size; |
| |
| EncryptionScheme encryption_scheme = EncryptionScheme::kUnencrypted; |
| EncryptionPattern encryption_pattern; |
| |
| std::vector<CencSampleEncryptionInfoEntry> fragment_sample_encryption_info; |
| |
| TrackRunInfo(); |
| ~TrackRunInfo(); |
| }; |
| |
| TrackRunInfo::TrackRunInfo() |
| : track_id(0), |
| timescale(-1), |
| start_dts(-1), |
| sample_start_offset(-1), |
| is_audio(false), |
| aux_info_start_offset(-1), |
| aux_info_default_size(-1), |
| aux_info_total_size(-1) { |
| } |
| TrackRunInfo::~TrackRunInfo() = default; |
| |
| base::TimeDelta TimeDeltaFromRational(int64_t numer, int64_t denom) { |
| // TODO(sandersd): Change all callers to pass a |denom| as a uint32_t. This is |
| // the correct (and sufficient) type in all cases, but some intermediaries |
| // currently store -1 as a default value. |
| // TODO(sandersd): Change all callers to pass |numer| as a uint64_t. The few |
| // cases that could theoretically be negative would result in negative PTS |
| // anyway, and there are cases where an int64_t is not sufficient to store the |
| // entire representable range. |
| DCHECK_GT(denom, 0); |
| DCHECK_LE(denom, std::numeric_limits<uint32_t>::max()); |
| |
| // The maximum number of seconds that a TimeDelta can hold (about 300,000 |
| // years worth). There is a (t ~= 0.775)-second fraction that is ignored. |
| const int64_t max_seconds = |
| std::numeric_limits<int64_t>::max() / base::Time::kMicrosecondsPerSecond; |
| |
| // The integer part of the result, in seconds. There is a (0 <= f < 1)-second |
| // fraction that is not computed. (Also true for negative |numer|, since |
| // rounding of integer division is towards zero in C++.) |
| const int64_t result_seconds = numer / denom; |
| |
| // Reject |actual_seconds == max_seconds| under the assumption that f > t. |
| // This rejects valid times that are within t seconds of the limit. |
| if (result_seconds >= max_seconds || result_seconds <= -max_seconds) |
| return kNoTimestamp; |
| |
| // Since (denom <= 2 ** 32), the multiplication fits in 52 bits. |
| // Note: When |numer| is negative, (numer % denom) is also negative. C++ |
| // guarantees that ((numer / denom) * denom + (numer % denom) == numer). |
| // TODO(sandersd): Is round-toward-zero the best possible computation here? |
| const int64_t result_microseconds = |
| base::Time::kMicrosecondsPerSecond * (numer % denom) / denom; |
| |
| const int64_t total_microseconds = |
| base::Time::kMicrosecondsPerSecond * result_seconds + result_microseconds; |
| return base::Microseconds(total_microseconds); |
| } |
| |
| DecodeTimestamp DecodeTimestampFromRational(int64_t numer, int64_t denom) { |
| return DecodeTimestamp::FromPresentationTime( |
| TimeDeltaFromRational(numer, denom)); |
| } |
| |
| TrackRunIterator::TrackRunIterator(const Movie* moov, MediaLog* media_log) |
| : moov_(moov), |
| media_log_(media_log), |
| sample_dts_(0), |
| sample_cts_(0), |
| sample_offset_(0) { |
| CHECK(moov); |
| } |
| |
| TrackRunIterator::~TrackRunIterator() = default; |
| |
| static std::string HexFlags(uint32_t flags) { |
| std::stringstream stream; |
| stream << std::setfill('0') << std::setw(sizeof(flags)*2) << std::hex |
| << flags; |
| return stream.str(); |
| } |
| |
| static bool PopulateSampleInfo(const TrackExtends& trex, |
| const TrackFragmentHeader& tfhd, |
| const TrackFragmentRun& trun, |
| const int64_t edit_list_offset, |
| const uint32_t i, |
| SampleInfo* sample_info, |
| const SampleDependsOn sdtp_sample_depends_on, |
| bool is_audio, |
| MediaLog* media_log) { |
| if (i < trun.sample_sizes.size()) { |
| sample_info->size = trun.sample_sizes[i]; |
| } else if (tfhd.default_sample_size > 0) { |
| sample_info->size = tfhd.default_sample_size; |
| } else { |
| sample_info->size = trex.default_sample_size; |
| } |
| |
| if (i < trun.sample_durations.size()) { |
| sample_info->duration = trun.sample_durations[i]; |
| } else if (tfhd.default_sample_duration > 0) { |
| sample_info->duration = tfhd.default_sample_duration; |
| } else { |
| sample_info->duration = trex.default_sample_duration; |
| } |
| |
| auto cts_offset = -base::CheckedNumeric<int64_t>(edit_list_offset); |
| if (i < trun.sample_composition_time_offsets.size()) |
| cts_offset += trun.sample_composition_time_offsets[i]; |
| if (!cts_offset.AssignIfValid(&sample_info->cts_offset)) { |
| MEDIA_LOG(ERROR, media_log) << "PTS offset exceeds representable range."; |
| return false; |
| } |
| |
| uint32_t flags; |
| if (i < trun.sample_flags.size()) { |
| flags = trun.sample_flags[i]; |
| DVLOG(4) << __func__ << " trun sample flags " << HexFlags(flags); |
| } else if (tfhd.has_default_sample_flags) { |
| flags = tfhd.default_sample_flags; |
| DVLOG(4) << __func__ << " tfhd sample flags " << HexFlags(flags); |
| } else { |
| flags = trex.default_sample_flags; |
| DVLOG(4) << __func__ << " trex sample flags " << HexFlags(flags); |
| } |
| |
| SampleDependsOn sample_depends_on = |
| static_cast<SampleDependsOn>((flags >> 24) & 0x3); |
| if (sample_depends_on == kSampleDependsOnUnknown) { |
| sample_depends_on = sdtp_sample_depends_on; |
| } |
| DVLOG(4) << __func__ << " sample_depends_on " << sample_depends_on; |
| if (sample_depends_on == kSampleDependsOnReserved) { |
| MEDIA_LOG(ERROR, media_log) << "Reserved value used in sample dependency" |
| " info."; |
| return false; |
| } |
| |
| // Per spec (ISO 14496-12:2012), the definition for a "sync sample" is |
| // equivalent to the downstream code's "is keyframe" concept. But media exists |
| // that marks non-key video frames as sync samples (http://crbug.com/507916 |
| // and http://crbug.com/310712). Hence, for video we additionally check that |
| // the sample does not depend on others (FFmpeg does too, see mov_read_trun). |
| // Sample dependency is ignored for audio because encoded audio samples can |
| // depend on other samples and still be used for random access. Generally all |
| // audio samples are expected to be sync samples, but we prefer to check the |
| // flags to catch badly muxed audio (for now anyway ;P). History of attempts |
| // to get this right discussed in http://crrev.com/1319813002 |
| bool sample_is_sync_sample = !(flags & kSampleIsNonSyncSample); |
| bool sample_depends_on_others = sample_depends_on == kSampleDependsOnOthers; |
| sample_info->is_keyframe = sample_is_sync_sample && |
| (!sample_depends_on_others || is_audio); |
| |
| DVLOG(4) << __func__ << " is_kf:" << sample_info->is_keyframe |
| << " is_sync:" << sample_is_sync_sample |
| << " deps:" << sample_depends_on_others << " audio:" << is_audio; |
| |
| return true; |
| } |
| |
| static const CencSampleEncryptionInfoEntry* GetSampleEncryptionInfoEntry( |
| const TrackRunInfo& run_info, |
| uint32_t group_description_index) { |
| const std::vector<CencSampleEncryptionInfoEntry>* entries = nullptr; |
| |
| // ISO-14496-12 Section 8.9.2.3 and 8.9.4 : group description index |
| // (1) ranges from 1 to the number of sample group entries in the track |
| // level SampleGroupDescription Box, or (2) takes the value 0 to |
| // indicate that this sample is a member of no group, in this case, the |
| // sample is associated with the default values specified in |
| // TrackEncryption Box, or (3) starts at 0x10001, i.e. the index value |
| // 1, with the value 1 in the top 16 bits, to reference fragment-local |
| // SampleGroupDescription Box. |
| // Case (2) is not supported here. The caller must handle it externally |
| // before invoking this function. |
| DCHECK_NE(group_description_index, 0u); |
| if (group_description_index > |
| SampleToGroupEntry::kFragmentGroupDescriptionIndexBase) { |
| group_description_index -= |
| SampleToGroupEntry::kFragmentGroupDescriptionIndexBase; |
| entries = &run_info.fragment_sample_encryption_info; |
| } else { |
| entries = &run_info.track_sample_encryption_group->entries; |
| } |
| |
| // |group_description_index| is 1-based. |
| return (group_description_index > entries->size()) |
| ? nullptr |
| : &(*entries)[group_description_index - 1]; |
| } |
| |
| // In well-structured encrypted media, each track run will be immediately |
| // preceded by its auxiliary information; this is the only optimal storage |
| // pattern in terms of minimum number of bytes from a serial stream needed to |
| // begin playback. It also allows us to optimize caching on memory-constrained |
| // architectures, because we can cache the relatively small auxiliary |
| // information for an entire run and then discard data from the input stream, |
| // instead of retaining the entire 'mdat' box. |
| // |
| // We optimize for this situation (with no loss of generality) by sorting track |
| // runs during iteration in order of their first data offset (either sample data |
| // or auxiliary data). |
| class CompareMinTrackRunDataOffset { |
| public: |
| bool operator()(const TrackRunInfo& a, const TrackRunInfo& b) { |
| int64_t a_aux = a.aux_info_total_size ? a.aux_info_start_offset |
| : std::numeric_limits<int64_t>::max(); |
| int64_t b_aux = b.aux_info_total_size ? b.aux_info_start_offset |
| : std::numeric_limits<int64_t>::max(); |
| |
| int64_t a_lesser = std::min(a_aux, a.sample_start_offset); |
| int64_t a_greater = std::max(a_aux, a.sample_start_offset); |
| int64_t b_lesser = std::min(b_aux, b.sample_start_offset); |
| int64_t b_greater = std::max(b_aux, b.sample_start_offset); |
| |
| if (a_lesser == b_lesser) return a_greater < b_greater; |
| return a_lesser < b_lesser; |
| } |
| }; |
| |
| bool TrackRunIterator::Init(const MovieFragment& moof) { |
| runs_.clear(); |
| |
| for (size_t i = 0; i < moof.tracks.size(); i++) { |
| const TrackFragment& traf = moof.tracks[i]; |
| |
| const Track* trak = NULL; |
| for (size_t t = 0; t < moov_->tracks.size(); t++) { |
| if (moov_->tracks[t].header.track_id == traf.header.track_id) |
| trak = &moov_->tracks[t]; |
| } |
| RCHECK(trak); |
| |
| const TrackExtends* trex = NULL; |
| for (size_t t = 0; t < moov_->extends.tracks.size(); t++) { |
| if (moov_->extends.tracks[t].track_id == traf.header.track_id) |
| trex = &moov_->extends.tracks[t]; |
| } |
| RCHECK(trex); |
| |
| const SampleDescription& stsd = |
| trak->media.information.sample_table.description; |
| if (stsd.type != kAudio && stsd.type != kVideo) { |
| DVLOG(1) << "Skipping unhandled track type"; |
| continue; |
| } |
| size_t desc_idx = traf.header.sample_description_index; |
| if (!desc_idx) desc_idx = trex->default_sample_description_index; |
| RCHECK(desc_idx > 0); // Descriptions are one-indexed in the file |
| desc_idx -= 1; |
| |
| const std::vector<uint8_t>& sample_encryption_data = |
| traf.sample_encryption.sample_encryption_data; |
| std::unique_ptr<BufferReader> sample_encryption_reader; |
| uint32_t sample_encryption_entries_count = 0; |
| if (!sample_encryption_data.empty()) { |
| sample_encryption_reader = std::make_unique<BufferReader>( |
| sample_encryption_data.data(), sample_encryption_data.size()); |
| RCHECK(sample_encryption_reader->Read4(&sample_encryption_entries_count)); |
| } |
| |
| // Process edit list to remove CTS offset introduced in the presence of |
| // B-frames (those that contain a single edit with a nonnegative media |
| // time). Other uses of edit lists are not supported, as they are |
| // both uncommon and better served by higher-level protocols. |
| int64_t edit_list_offset = 0; |
| const std::vector<EditListEntry>& edits = trak->edit.list.edits; |
| if (!edits.empty()) { |
| if (edits.size() > 1) |
| DVLOG(1) << "Multi-entry edit box detected; some components ignored."; |
| |
| if (edits[0].media_time < 0) { |
| DVLOG(1) << "Empty edit list entry ignored."; |
| } else { |
| edit_list_offset = edits[0].media_time; |
| } |
| } |
| |
| SampleToGroupIterator sample_to_group_itr(traf.sample_to_group); |
| bool is_sample_to_group_valid = sample_to_group_itr.IsValid(); |
| |
| int64_t run_start_dts = traf.decode_time.decode_time; |
| uint64_t sample_count_sum = 0; |
| for (size_t j = 0; j < traf.runs.size(); j++) { |
| const TrackFragmentRun& trun = traf.runs[j]; |
| TrackRunInfo tri; |
| tri.track_id = traf.header.track_id; |
| tri.timescale = trak->media.header.timescale; |
| tri.start_dts = run_start_dts; |
| tri.sample_start_offset = trun.data_offset; |
| tri.track_sample_encryption_group = |
| &trak->media.information.sample_table.sample_group_description; |
| tri.fragment_sample_encryption_info = |
| traf.sample_group_description.entries; |
| |
| const TrackEncryption* track_encryption; |
| const ProtectionSchemeInfo* sinf; |
| tri.is_audio = (stsd.type == kAudio); |
| if (tri.is_audio) { |
| RCHECK(!stsd.audio_entries.empty()); |
| if (desc_idx >= stsd.audio_entries.size()) |
| desc_idx = 0; |
| tri.audio_description = &stsd.audio_entries[desc_idx]; |
| sinf = &tri.audio_description->sinf; |
| track_encryption = &tri.audio_description->sinf.info.track_encryption; |
| } else { |
| RCHECK(!stsd.video_entries.empty()); |
| if (desc_idx >= stsd.video_entries.size()) |
| desc_idx = 0; |
| tri.video_description = &stsd.video_entries[desc_idx]; |
| sinf = &tri.video_description->sinf; |
| track_encryption = &tri.video_description->sinf.info.track_encryption; |
| } |
| |
| if (!sinf->HasSupportedScheme()) { |
| tri.encryption_scheme = EncryptionScheme::kUnencrypted; |
| } else { |
| tri.encryption_scheme = sinf->IsCbcsEncryptionScheme() |
| ? EncryptionScheme::kCbcs |
| : EncryptionScheme::kCenc; |
| tri.encryption_pattern = |
| EncryptionPattern(track_encryption->default_crypt_byte_block, |
| track_encryption->default_skip_byte_block); |
| } |
| |
| // Initialize aux_info variables only if no sample encryption entries. |
| if (sample_encryption_entries_count == 0 && |
| traf.auxiliary_offset.offsets.size() > j) { |
| // Collect information from the auxiliary_offset entry with the same |
| // index in the 'saiz' container as the current run's index in the |
| // 'trun' container, if it is present. |
| // There should be an auxiliary info entry corresponding to each sample |
| // in the auxiliary offset entry's corresponding track run. |
| RCHECK(traf.auxiliary_size.sample_count >= |
| sample_count_sum + trun.sample_count); |
| tri.aux_info_start_offset = traf.auxiliary_offset.offsets[j]; |
| tri.aux_info_default_size = |
| traf.auxiliary_size.default_sample_info_size; |
| if (tri.aux_info_default_size == 0) { |
| const std::vector<uint8_t>& sizes = |
| traf.auxiliary_size.sample_info_sizes; |
| tri.aux_info_sizes.insert( |
| tri.aux_info_sizes.begin(), sizes.begin() + sample_count_sum, |
| sizes.begin() + sample_count_sum + trun.sample_count); |
| } |
| |
| // If the default info size is positive, find the total size of the aux |
| // info block from it, otherwise sum over the individual sizes of each |
| // aux info entry in the aux_offset entry. |
| if (tri.aux_info_default_size) { |
| tri.aux_info_total_size = |
| tri.aux_info_default_size * trun.sample_count; |
| } else { |
| tri.aux_info_total_size = 0; |
| for (size_t k = 0; k < trun.sample_count; k++) { |
| tri.aux_info_total_size += tri.aux_info_sizes[k]; |
| } |
| } |
| } else { |
| tri.aux_info_start_offset = -1; |
| tri.aux_info_total_size = 0; |
| } |
| |
| // Avoid allocating insane sample counts for invalid media. |
| size_t max_sample_count = |
| GetDemuxerMemoryLimit(Demuxer::DemuxerTypes::kChunkDemuxer) / |
| sizeof(decltype(tri.samples)::value_type); |
| |
| #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION |
| // The fuzzer frequently gets stuck running out of memory on long useless |
| // chains of empty TRUN values. Histogram analysis shows large in the wild |
| // sample counts, so we can't limit more than the memory limit above. |
| max_sample_count = std::min(size_t{10000}, max_sample_count); |
| #endif |
| |
| RCHECK_MEDIA_LOGGED( |
| base::strict_cast<size_t>(trun.sample_count) <= max_sample_count, |
| media_log_, "Metadata overhead exceeds storage limit."); |
| tri.samples.resize(trun.sample_count); |
| |
| for (size_t k = 0; k < trun.sample_count; k++) { |
| if (!PopulateSampleInfo(*trex, traf.header, trun, edit_list_offset, k, |
| &tri.samples[k], traf.sdtp.sample_depends_on(k), |
| tri.is_audio, media_log_)) { |
| return false; |
| } |
| |
| RCHECK(std::numeric_limits<int64_t>::max() - tri.samples[k].duration > |
| run_start_dts); |
| |
| run_start_dts += tri.samples[k].duration; |
| |
| if (!is_sample_to_group_valid) { |
| // Set group description index to 0 to read encryption information |
| // from TrackEncryption Box. |
| tri.samples[k].cenc_group_description_index = 0; |
| continue; |
| } |
| |
| uint32_t index = sample_to_group_itr.group_description_index(); |
| tri.samples[k].cenc_group_description_index = index; |
| if (index != 0) |
| RCHECK(GetSampleEncryptionInfoEntry(tri, index)); |
| is_sample_to_group_valid = sample_to_group_itr.Advance(); |
| } |
| |
| if (sample_encryption_entries_count > 0) { |
| RCHECK(sample_encryption_entries_count >= |
| sample_count_sum + trun.sample_count); |
| tri.sample_encryption_entries.resize(trun.sample_count); |
| for (size_t k = 0; k < trun.sample_count; k++) { |
| uint32_t index = tri.samples[k].cenc_group_description_index; |
| const CencSampleEncryptionInfoEntry* info_entry = |
| index == 0 ? nullptr : GetSampleEncryptionInfoEntry(tri, index); |
| const uint8_t iv_size = index == 0 ? track_encryption->default_iv_size |
| : info_entry->iv_size; |
| SampleEncryptionEntry& entry = tri.sample_encryption_entries[k]; |
| RCHECK(entry.Parse(sample_encryption_reader.get(), iv_size, |
| traf.sample_encryption.use_subsample_encryption)); |
| // If we don't have a per-sample IV, get the constant IV. |
| bool is_encrypted = index == 0 ? track_encryption->is_encrypted |
| : info_entry->is_encrypted; |
| |
| // TODO(crbug.com/1336055): Investigate if this is a hardware or |
| // cast-related limitation. |
| #if BUILDFLAG(IS_CASTOS) |
| // On Chromecast, we only support setting the pattern values in the |
| // 'tenc' box for the track (not varying on per sample group basis). |
| // Thus we need to verify that the settings in the sample group |
| // match those in the 'tenc'. |
| if (is_encrypted && index != 0) { |
| RCHECK_MEDIA_LOGGED(info_entry->crypt_byte_block == |
| track_encryption->default_crypt_byte_block, |
| media_log_, |
| "Pattern value (crypt byte block) for the " |
| "sample group does not match that in the tenc " |
| "box . This is not currently supported."); |
| RCHECK_MEDIA_LOGGED(info_entry->skip_byte_block == |
| track_encryption->default_skip_byte_block, |
| media_log_, |
| "Pattern value (skip byte block) for the " |
| "sample group does not match that in the tenc " |
| "box . This is not currently supported."); |
| } |
| #endif // BUILDFLAG(IS_CASTOS) |
| if (is_encrypted && !iv_size) { |
| const uint8_t constant_iv_size = |
| index == 0 ? track_encryption->default_constant_iv_size |
| : info_entry->constant_iv_size; |
| RCHECK(constant_iv_size != 0); |
| const uint8_t* constant_iv = |
| index == 0 ? track_encryption->default_constant_iv |
| : info_entry->constant_iv; |
| memcpy(entry.initialization_vector, constant_iv, constant_iv_size); |
| } |
| } |
| } |
| runs_.push_back(tri); |
| sample_count_sum += trun.sample_count; |
| } |
| |
| // We should have iterated through all samples in SampleToGroup Box. |
| RCHECK(!sample_to_group_itr.IsValid()); |
| } |
| |
| std::sort(runs_.begin(), runs_.end(), CompareMinTrackRunDataOffset()); |
| run_itr_ = runs_.begin(); |
| return ResetRun(); |
| } |
| |
| bool TrackRunIterator::UpdateCts() { |
| // TODO(sandersd): Should |sample_cts_| be cleared in this case? |
| if (!IsSampleValid()) |
| return true; |
| auto cts = base::CheckAdd(sample_dts_, sample_itr_->cts_offset); |
| if (!cts.AssignIfValid(&sample_cts_)) { |
| MEDIA_LOG(ERROR, media_log_) << "Sample PTS exceeds representable range."; |
| return false; |
| } |
| return true; |
| } |
| |
| bool TrackRunIterator::AdvanceRun() { |
| ++run_itr_; |
| return ResetRun(); |
| } |
| |
| bool TrackRunIterator::ResetRun() { |
| // TODO(sandersd): Should we clear all the values if the run is not valid? |
| if (!IsRunValid()) |
| return true; |
| sample_dts_ = run_itr_->start_dts; |
| sample_offset_ = run_itr_->sample_start_offset; |
| sample_itr_ = run_itr_->samples.begin(); |
| // UpdateCts() must run after |sample_itr_| is updated to the current run. |
| return UpdateCts(); |
| } |
| |
| bool TrackRunIterator::AdvanceSample() { |
| DCHECK(IsSampleValid()); |
| auto dts = base::CheckAdd(sample_dts_, sample_itr_->duration); |
| if (!dts.AssignIfValid(&sample_dts_)) { |
| MEDIA_LOG(ERROR, media_log_) << "Sample DTS exceeds representable range."; |
| return false; |
| } |
| sample_offset_ += sample_itr_->size; |
| ++sample_itr_; |
| // UpdateCts() must run after |sample_itr_| is updated to the current sample. |
| return UpdateCts(); |
| } |
| |
| // This implementation only indicates a need for caching if CENC auxiliary |
| // info is available in the stream. |
| bool TrackRunIterator::AuxInfoNeedsToBeCached() { |
| DCHECK(IsRunValid()); |
| return is_encrypted() && aux_info_size() > 0 && |
| run_itr_->sample_encryption_entries.size() == 0; |
| } |
| |
| // This implementation currently only caches CENC auxiliary info. |
| bool TrackRunIterator::CacheAuxInfo(const uint8_t* buf, int buf_size) { |
| RCHECK(AuxInfoNeedsToBeCached() && buf_size >= aux_info_size()); |
| |
| std::vector<SampleEncryptionEntry>& sample_encryption_entries = |
| runs_[run_itr_ - runs_.begin()].sample_encryption_entries; |
| sample_encryption_entries.resize(run_itr_->samples.size()); |
| int64_t pos = 0; |
| for (size_t i = 0; i < run_itr_->samples.size(); i++) { |
| int info_size = run_itr_->aux_info_default_size; |
| if (!info_size) |
| info_size = run_itr_->aux_info_sizes[i]; |
| |
| if (IsSampleEncrypted(i)) { |
| BufferReader reader(buf + pos, info_size); |
| const uint8_t iv_size = GetIvSize(i); |
| const bool has_subsamples = info_size > iv_size; |
| SampleEncryptionEntry& entry = sample_encryption_entries[i]; |
| RCHECK_MEDIA_LOGGED( |
| entry.Parse(&reader, iv_size, has_subsamples), media_log_, |
| "SampleEncryptionEntry parse failed when caching aux info"); |
| // if we don't have a per-sample IV, get the constant IV. |
| if (!iv_size) { |
| RCHECK(ApplyConstantIv(i, &entry)); |
| } |
| } |
| pos += info_size; |
| } |
| |
| return true; |
| } |
| |
| bool TrackRunIterator::IsRunValid() const { |
| return run_itr_ != runs_.end(); |
| } |
| |
| bool TrackRunIterator::IsSampleValid() const { |
| return IsRunValid() && (sample_itr_ != run_itr_->samples.end()); |
| } |
| |
| // Because tracks are in sorted order and auxiliary information is cached when |
| // returning samples, it is guaranteed that no data will be required before the |
| // lesser of the minimum data offset of this track and the next in sequence. |
| // (The stronger condition - that no data is required before the minimum data |
| // offset of this track alone - is not guaranteed, because the BMFF spec does |
| // not have any inter-run ordering restrictions.) |
| int64_t TrackRunIterator::GetMaxClearOffset() { |
| int64_t offset = std::numeric_limits<int64_t>::max(); |
| |
| if (IsSampleValid()) { |
| offset = std::min(offset, sample_offset_); |
| if (AuxInfoNeedsToBeCached()) |
| offset = std::min(offset, aux_info_offset()); |
| } |
| if (run_itr_ != runs_.end()) { |
| auto next_run = run_itr_ + 1; |
| if (next_run != runs_.end()) { |
| offset = std::min(offset, next_run->sample_start_offset); |
| if (next_run->aux_info_total_size) |
| offset = std::min(offset, next_run->aux_info_start_offset); |
| } |
| } |
| if (offset == std::numeric_limits<int64_t>::max()) |
| return 0; |
| return offset; |
| } |
| |
| uint32_t TrackRunIterator::track_id() const { |
| DCHECK(IsRunValid()); |
| return run_itr_->track_id; |
| } |
| |
| bool TrackRunIterator::is_encrypted() const { |
| DCHECK(IsSampleValid()); |
| return IsSampleEncrypted(sample_itr_ - run_itr_->samples.begin()); |
| } |
| |
| int64_t TrackRunIterator::aux_info_offset() const { |
| return run_itr_->aux_info_start_offset; |
| } |
| |
| int TrackRunIterator::aux_info_size() const { |
| return run_itr_->aux_info_total_size; |
| } |
| |
| bool TrackRunIterator::is_audio() const { |
| DCHECK(IsRunValid()); |
| return run_itr_->is_audio; |
| } |
| |
| const AudioSampleEntry& TrackRunIterator::audio_description() const { |
| DCHECK(is_audio()); |
| DCHECK(run_itr_->audio_description); |
| return *run_itr_->audio_description; |
| } |
| |
| const VideoSampleEntry& TrackRunIterator::video_description() const { |
| DCHECK(!is_audio()); |
| DCHECK(run_itr_->video_description); |
| return *run_itr_->video_description; |
| } |
| |
| int64_t TrackRunIterator::sample_offset() const { |
| DCHECK(IsSampleValid()); |
| return sample_offset_; |
| } |
| |
| uint32_t TrackRunIterator::sample_size() const { |
| DCHECK(IsSampleValid()); |
| return sample_itr_->size; |
| } |
| |
| DecodeTimestamp TrackRunIterator::dts() const { |
| DCHECK(IsSampleValid()); |
| return DecodeTimestampFromRational(sample_dts_, run_itr_->timescale); |
| } |
| |
| base::TimeDelta TrackRunIterator::cts() const { |
| DCHECK(IsSampleValid()); |
| return TimeDeltaFromRational(sample_cts_, run_itr_->timescale); |
| } |
| |
| base::TimeDelta TrackRunIterator::duration() const { |
| DCHECK(IsSampleValid()); |
| return TimeDeltaFromRational(sample_itr_->duration, run_itr_->timescale); |
| } |
| |
| bool TrackRunIterator::is_keyframe() const { |
| DCHECK(IsSampleValid()); |
| return sample_itr_->is_keyframe; |
| } |
| |
| const ProtectionSchemeInfo& TrackRunIterator::protection_scheme_info() const { |
| if (is_audio()) |
| return audio_description().sinf; |
| return video_description().sinf; |
| } |
| |
| const TrackEncryption& TrackRunIterator::track_encryption() const { |
| return protection_scheme_info().info.track_encryption; |
| } |
| |
| std::unique_ptr<DecryptConfig> TrackRunIterator::GetDecryptConfig() { |
| DCHECK(is_encrypted()); |
| size_t sample_idx = sample_itr_ - run_itr_->samples.begin(); |
| const std::vector<uint8_t>& kid = GetKeyId(sample_idx); |
| std::string key_id(kid.begin(), kid.end()); |
| |
| if (run_itr_->sample_encryption_entries.empty()) { |
| DCHECK_EQ(0, aux_info_size()); |
| // The 'cbcs' scheme allows empty aux info when a constant IV is in use |
| // with full sample encryption. That case will fall through to here. |
| SampleEncryptionEntry sample_encryption_entry; |
| if (ApplyConstantIv(sample_idx, &sample_encryption_entry)) { |
| std::string iv(reinterpret_cast<const char*>( |
| sample_encryption_entry.initialization_vector), |
| std::size(sample_encryption_entry.initialization_vector)); |
| switch (run_itr_->encryption_scheme) { |
| case EncryptionScheme::kUnencrypted: |
| return nullptr; |
| case EncryptionScheme::kCenc: |
| return DecryptConfig::CreateCencConfig( |
| key_id, iv, sample_encryption_entry.subsamples); |
| case EncryptionScheme::kCbcs: |
| return DecryptConfig::CreateCbcsConfig( |
| key_id, iv, sample_encryption_entry.subsamples, |
| run_itr_->encryption_pattern); |
| } |
| } |
| MEDIA_LOG(ERROR, media_log_) << "Sample encryption info is not available."; |
| return nullptr; |
| } |
| |
| DCHECK_LT(sample_idx, run_itr_->sample_encryption_entries.size()); |
| const SampleEncryptionEntry& sample_encryption_entry = |
| run_itr_->sample_encryption_entries[sample_idx]; |
| std::string iv(reinterpret_cast<const char*>( |
| sample_encryption_entry.initialization_vector), |
| std::size(sample_encryption_entry.initialization_vector)); |
| |
| size_t total_size = 0; |
| if (!sample_encryption_entry.subsamples.empty() && |
| (!sample_encryption_entry.GetTotalSizeOfSubsamples(&total_size) || |
| total_size != static_cast<size_t>(sample_size()))) { |
| MEDIA_LOG(ERROR, media_log_) << "Incorrect CENC subsample size."; |
| return nullptr; |
| } |
| |
| if (protection_scheme_info().IsCbcsEncryptionScheme()) { |
| uint32_t index = GetGroupDescriptionIndex(sample_idx); |
| uint32_t encrypt_blocks = |
| (index == 0) |
| ? track_encryption().default_crypt_byte_block |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->crypt_byte_block; |
| uint32_t skip_blocks = |
| (index == 0) |
| ? track_encryption().default_skip_byte_block |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->skip_byte_block; |
| return DecryptConfig::CreateCbcsConfig( |
| key_id, iv, sample_encryption_entry.subsamples, |
| EncryptionPattern(encrypt_blocks, skip_blocks)); |
| } |
| |
| return DecryptConfig::CreateCencConfig(key_id, iv, |
| sample_encryption_entry.subsamples); |
| } |
| |
| uint32_t TrackRunIterator::GetGroupDescriptionIndex( |
| uint32_t sample_index) const { |
| DCHECK(IsRunValid()); |
| DCHECK_LT(sample_index, run_itr_->samples.size()); |
| return run_itr_->samples[sample_index].cenc_group_description_index; |
| } |
| |
| bool TrackRunIterator::IsSampleEncrypted(size_t sample_index) const { |
| uint32_t index = GetGroupDescriptionIndex(sample_index); |
| return (index == 0) |
| ? track_encryption().is_encrypted |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->is_encrypted; |
| } |
| |
| const std::vector<uint8_t>& TrackRunIterator::GetKeyId( |
| size_t sample_index) const { |
| uint32_t index = GetGroupDescriptionIndex(sample_index); |
| return (index == 0) ? track_encryption().default_kid |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->key_id; |
| } |
| |
| uint8_t TrackRunIterator::GetIvSize(size_t sample_index) const { |
| uint32_t index = GetGroupDescriptionIndex(sample_index); |
| return (index == 0) ? track_encryption().default_iv_size |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->iv_size; |
| } |
| |
| bool TrackRunIterator::ApplyConstantIv(size_t sample_index, |
| SampleEncryptionEntry* entry) const { |
| DCHECK(IsSampleEncrypted(sample_index)); |
| uint32_t index = GetGroupDescriptionIndex(sample_index); |
| const uint8_t constant_iv_size = |
| index == 0 |
| ? track_encryption().default_constant_iv_size |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->constant_iv_size; |
| RCHECK(constant_iv_size != 0); |
| const uint8_t* constant_iv = |
| index == 0 ? track_encryption().default_constant_iv |
| : GetSampleEncryptionInfoEntry(*run_itr_, index)->constant_iv; |
| RCHECK(constant_iv != nullptr); |
| memcpy(entry->initialization_vector, constant_iv, kInitializationVectorSize); |
| return true; |
| } |
| |
| } // namespace mp4 |
| } // namespace media |