| // Copyright 2013 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "media/base/key_systems.h" |
| |
| #include <stddef.h> |
| |
| #include <memory> |
| #include <unordered_map> |
| |
| #include "base/callback_list.h" |
| #include "base/cxx17_backports.h" |
| #include "base/functional/callback_helpers.h" |
| #include "base/logging.h" |
| #include "base/memory/weak_ptr.h" |
| #include "base/no_destructor.h" |
| #include "base/notreached.h" |
| #include "base/strings/string_util.h" |
| #include "base/threading/thread_checker.h" |
| #include "build/build_config.h" |
| #include "media/base/eme_constants.h" |
| #include "media/base/key_system_info.h" |
| #include "media/base/key_system_names.h" |
| #include "media/base/media.h" |
| #include "media/base/media_client.h" |
| #include "media/base/media_switches.h" |
| #include "media/base/mime_util.h" |
| #include "media/cdm/clear_key_cdm_common.h" |
| #include "media/media_buildflags.h" |
| #include "third_party/widevine/cdm/widevine_cdm_common.h" |
| |
| namespace media { |
| |
| namespace { |
| |
| // These names are used by UMA. Do not change them! |
| const char kClearKeyKeySystemNameForUMA[] = "ClearKey"; |
| const char kUnknownKeySystemNameForUMA[] = "Unknown"; |
| const char kHardwareSecureForUMA[] = "HardwareSecure"; |
| const char kSoftwareSecureForUMA[] = "SoftwareSecure"; |
| |
| enum KeySystemForUkm { |
| // These values reported to UKM. Do not change their ordinal values. |
| kUnknownKeySystemForUkm = 0, |
| kClearKeyKeySystemForUkm, |
| kWidevineKeySystemForUkm, |
| }; |
| |
| struct MimeTypeToCodecs { |
| const char* mime_type; |
| SupportedCodecs codecs; |
| }; |
| |
| // Mapping between containers and their codecs. |
| // Only audio codecs can belong to a "audio/*" mime_type, and only video codecs |
| // can belong to a "video/*" mime_type. |
| static const MimeTypeToCodecs kMimeTypeToCodecsMap[] = { |
| {"audio/webm", EME_CODEC_WEBM_AUDIO_ALL}, |
| {"video/webm", EME_CODEC_WEBM_VIDEO_ALL}, |
| {"audio/mp4", EME_CODEC_MP4_AUDIO_ALL}, |
| {"video/mp4", EME_CODEC_MP4_VIDEO_ALL}, |
| #if BUILDFLAG(USE_PROPRIETARY_CODECS) |
| #if BUILDFLAG(ENABLE_MSE_MPEG2TS_STREAM_PARSER) |
| {"video/mp2t", EME_CODEC_MP2T_VIDEO_ALL}, |
| #endif // BUILDFLAG(ENABLE_MSE_MPEG2TS_STREAM_PARSER) |
| #endif // BUILDFLAG(USE_PROPRIETARY_CODECS) |
| }; |
| |
| EmeCodec ToAudioEmeCodec(AudioCodec codec) { |
| switch (codec) { |
| case AudioCodec::kAAC: |
| return EME_CODEC_AAC; |
| case AudioCodec::kVorbis: |
| return EME_CODEC_VORBIS; |
| case AudioCodec::kFLAC: |
| return EME_CODEC_FLAC; |
| case AudioCodec::kOpus: |
| return EME_CODEC_OPUS; |
| case AudioCodec::kEAC3: |
| return EME_CODEC_EAC3; |
| case AudioCodec::kAC3: |
| return EME_CODEC_AC3; |
| case AudioCodec::kIAMF: |
| return EME_CODEC_IAMF; |
| case AudioCodec::kMpegHAudio: |
| return EME_CODEC_MPEG_H_AUDIO; |
| case AudioCodec::kDTS: |
| return EME_CODEC_DTS; |
| case AudioCodec::kDTSXP2: |
| return EME_CODEC_DTSXP2; |
| case AudioCodec::kDTSE: |
| return EME_CODEC_DTSE; |
| default: |
| DVLOG(1) << "Unsupported AudioCodec " << codec; |
| return EME_CODEC_NONE; |
| } |
| } |
| |
| EmeCodec ToVideoEmeCodec(VideoCodec codec, VideoCodecProfile profile) { |
| switch (codec) { |
| case VideoCodec::kH264: |
| return EME_CODEC_AVC1; |
| case VideoCodec::kVP8: |
| return EME_CODEC_VP8; |
| case VideoCodec::kVP9: |
| // ParseVideoCodecString() returns VIDEO_CODEC_PROFILE_UNKNOWN for "vp9" |
| // and "vp9.0". Since these codecs are essentially the same as profile 0, |
| // return EME_CODEC_VP9_PROFILE0. |
| if (profile == VP9PROFILE_PROFILE0 || |
| profile == VIDEO_CODEC_PROFILE_UNKNOWN) { |
| return EME_CODEC_VP9_PROFILE0; |
| } else if (profile == VP9PROFILE_PROFILE2) { |
| return EME_CODEC_VP9_PROFILE2; |
| } else { |
| // Profile 1 and 3 not supported by EME. See https://crbug.com/898298. |
| return EME_CODEC_NONE; |
| } |
| case VideoCodec::kHEVC: |
| // Only handle Main and Main10 profiles for HEVC. |
| if (profile == HEVCPROFILE_MAIN) |
| return EME_CODEC_HEVC_PROFILE_MAIN; |
| if (profile == HEVCPROFILE_MAIN10) |
| return EME_CODEC_HEVC_PROFILE_MAIN10; |
| return EME_CODEC_NONE; |
| case VideoCodec::kDolbyVision: |
| // Only profiles 0, 4, 5, 7, 8, 9 are valid. Profile 0 and 9 are encoded |
| // based on AVC while profile 4, 5, 7 and 8 are based on HEVC. |
| if (profile == DOLBYVISION_PROFILE0) |
| return EME_CODEC_DOLBY_VISION_PROFILE0; |
| if (profile == DOLBYVISION_PROFILE4) |
| return EME_CODEC_DOLBY_VISION_PROFILE4; |
| if (profile == DOLBYVISION_PROFILE5) |
| return EME_CODEC_DOLBY_VISION_PROFILE5; |
| if (profile == DOLBYVISION_PROFILE7) |
| return EME_CODEC_DOLBY_VISION_PROFILE7; |
| if (profile == DOLBYVISION_PROFILE8) |
| return EME_CODEC_DOLBY_VISION_PROFILE8; |
| if (profile == DOLBYVISION_PROFILE9) |
| return EME_CODEC_DOLBY_VISION_PROFILE9; |
| return EME_CODEC_NONE; |
| case VideoCodec::kAV1: |
| return EME_CODEC_AV1; |
| default: |
| DVLOG(1) << "Unsupported VideoCodec " << codec; |
| return EME_CODEC_NONE; |
| } |
| } |
| |
| class ClearKeyKeySystemInfo : public KeySystemInfo { |
| public: |
| std::string GetBaseKeySystemName() const final { return kClearKeyKeySystem; } |
| |
| bool IsSupportedInitDataType(EmeInitDataType init_data_type) const final { |
| return init_data_type == EmeInitDataType::CENC || |
| init_data_type == EmeInitDataType::WEBM || |
| init_data_type == EmeInitDataType::KEYIDS; |
| } |
| |
| EmeConfig::Rule GetEncryptionSchemeConfigRule( |
| EncryptionScheme encryption_scheme) const final { |
| switch (encryption_scheme) { |
| case EncryptionScheme::kCenc: |
| case EncryptionScheme::kCbcs: { |
| return EmeConfig::SupportedRule(); |
| } |
| case EncryptionScheme::kUnencrypted: |
| break; |
| } |
| NOTREACHED(); |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| SupportedCodecs GetSupportedCodecs() const final { |
| // On Android, Vorbis, VP8, AAC and AVC1 are supported in MediaCodec: |
| // http://developer.android.com/guide/appendix/media-formats.html |
| // VP9 support is device dependent. |
| return EME_CODEC_WEBM_ALL | EME_CODEC_MP4_ALL; |
| } |
| |
| EmeConfig::Rule GetRobustnessConfigRule( |
| const std::string& key_system, |
| EmeMediaType media_type, |
| const std::string& requested_robustness, |
| const bool* /*hw_secure_requirement*/) const final { |
| if (requested_robustness.empty()) { |
| return EmeConfig::SupportedRule(); |
| } else { |
| return EmeConfig::UnsupportedRule(); |
| } |
| } |
| |
| EmeConfig::Rule GetPersistentLicenseSessionSupport() const final { |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| EmeFeatureSupport GetPersistentStateSupport() const final { |
| return EmeFeatureSupport::NOT_SUPPORTED; |
| } |
| |
| EmeFeatureSupport GetDistinctiveIdentifierSupport() const final { |
| return EmeFeatureSupport::NOT_SUPPORTED; |
| } |
| |
| bool UseAesDecryptor() const final { return true; } |
| }; |
| |
| // Returns whether the |key_system| is known to Chromium and is thus likely to |
| // be implemented in an interoperable way. |
| // True is always returned for a |key_system| that begins with "x-". |
| // |
| // As with other web platform features, advertising support for a key system |
| // implies that it adheres to a defined and interoperable specification. |
| // |
| // To ensure interoperability, implementations of a specific |key_system| string |
| // must conform to a specification for that identifier that defines |
| // key system-specific behaviors not fully defined by the EME specification. |
| // That specification should be provided by the owner of the domain that is the |
| // reverse of the |key_system| string. |
| // This involves more than calling a library, SDK, or platform API. |
| // KeySystemsImpl must be populated appropriately, and there will likely be glue |
| // code to adapt to the API of the library, SDK, or platform API. |
| // |
| // Chromium mainline contains this data and glue code for specific key systems, |
| // which should help ensure interoperability with other implementations using |
| // these key systems. |
| // |
| // If you need to add support for other key systems, ensure that you have |
| // obtained the specification for how to integrate it with EME, implemented the |
| // appropriate glue/adapter code, and added all the appropriate data to |
| // KeySystemsImpl. Only then should you change this function. |
| static bool IsPotentiallySupportedKeySystem(const std::string& key_system) { |
| if (key_system == kWidevineKeySystem) |
| return true; |
| |
| if (key_system == kClearKeyKeySystem) { |
| return true; |
| } |
| |
| // External or MediaFoundation Clear Key is known and supports suffixes for |
| // testing. |
| if (IsExternalClearKey(key_system)) |
| return true; |
| |
| // Chromecast defines behaviors for Cast clients within its reverse domain. |
| const char kChromecastRoot[] = "com.chromecast"; |
| if (IsSubKeySystemOf(key_system, kChromecastRoot)) |
| return true; |
| |
| // Implementations that do not have a specification or appropriate glue code |
| // can use the "x-" prefix to avoid conflicting with and advertising support |
| // for real key system names. Use is discouraged. |
| const char kExcludedPrefix[] = "x-"; |
| return base::StartsWith(key_system, kExcludedPrefix, |
| base::CompareCase::SENSITIVE); |
| } |
| |
| // Returns whether distinctive identifiers and persistent state can be reliably |
| // blocked for |key_system_info| (and therefore be safely configurable). |
| static bool CanBlock(const KeySystemInfo& key_system_info) { |
| // When AesDecryptor is used, we are sure we can block. |
| if (key_system_info.UseAesDecryptor()) { |
| return true; |
| } |
| |
| // For External Clear Key, it is either implemented as a library CDM (Clear |
| // Key CDM), which is covered above, or by using AesDecryptor remotely, e.g. |
| // via MojoCdm. In both cases, we can block. This is only used for testing. |
| if (base::FeatureList::IsEnabled(kExternalClearKeyForTesting) && |
| IsExternalClearKey(key_system_info.GetBaseKeySystemName())) { |
| return true; |
| } |
| |
| #if BUILDFLAG(ENABLE_LIBRARY_CDMS) |
| // When library CDMs are enabled, we are either using AesDecryptor, or using |
| // the library CDM hosted in a sandboxed process. In both cases distinctive |
| // identifiers and persistent state can be reliably blocked. |
| return true; |
| #else |
| // For other platforms assume the CDM can and will do anything. So we cannot |
| // block. |
| return false; |
| #endif |
| } |
| |
| class KeySystemsImpl : public KeySystems { |
| public: |
| static KeySystemsImpl* GetInstance(); |
| |
| KeySystemsImpl(const KeySystemsImpl&) = delete; |
| KeySystemsImpl& operator=(const KeySystemsImpl&) = delete; |
| |
| // Implementation of KeySystems interface. |
| void UpdateIfNeeded(base::OnceClosure done_cb) override; |
| std::string GetBaseKeySystemName( |
| const std::string& key_system) const override; |
| bool IsSupportedKeySystem(const std::string& key_system) const override; |
| bool ShouldUseBaseKeySystemName(const std::string& key_system) const override; |
| bool CanUseAesDecryptor(const std::string& key_system) const override; |
| bool IsSupportedInitDataType(const std::string& key_system, |
| EmeInitDataType init_data_type) const override; |
| EmeConfig::Rule GetEncryptionSchemeConfigRule( |
| const std::string& key_system, |
| EncryptionScheme encryption_scheme) const override; |
| EmeConfig::Rule GetContentTypeConfigRule( |
| const std::string& key_system, |
| EmeMediaType media_type, |
| const std::string& container_mime_type, |
| const std::vector<std::string>& codecs) const override; |
| EmeConfig::Rule GetRobustnessConfigRule( |
| const std::string& key_system, |
| EmeMediaType media_type, |
| const std::string& requested_robustness, |
| const bool* hw_secure_requirement) const override; |
| EmeConfig::Rule GetPersistentLicenseSessionSupport( |
| const std::string& key_system) const override; |
| EmeFeatureSupport GetPersistentStateSupport( |
| const std::string& key_system) const override; |
| EmeFeatureSupport GetDistinctiveIdentifierSupport( |
| const std::string& key_system) const override; |
| |
| // These functions are for testing purpose only. |
| void AddCodecMaskForTesting(EmeMediaType media_type, |
| const std::string& codec, |
| uint32_t mask); |
| void AddMimeTypeCodecMaskForTesting(const std::string& mime_type, |
| uint32_t mask); |
| void ResetForTesting(); |
| |
| private: |
| friend class base::NoDestructor<KeySystemsImpl>; |
| |
| using MimeTypeToCodecsMap = std::unordered_map<std::string, SupportedCodecs>; |
| using CodecMap = std::unordered_map<std::string, EmeCodec>; |
| using InitDataTypesMap = std::unordered_map<std::string, EmeInitDataType>; |
| |
| KeySystemsImpl(); |
| ~KeySystemsImpl() override; |
| |
| void Initialize(); |
| |
| void UpdateSupportedKeySystems(); |
| void OnSupportedKeySystemsUpdated(KeySystemInfos key_systems); |
| void ProcessSupportedKeySystems(KeySystemInfos key_systems); |
| |
| const KeySystemInfo* GetKeySystemInfo(const std::string& key_system) const; |
| |
| void RegisterMimeType(const std::string& mime_type, SupportedCodecs codecs); |
| bool IsValidMimeTypeCodecsCombination(const std::string& mime_type, |
| SupportedCodecs codecs) const; |
| |
| // TODO(crbug.com/417440): Separate container enum from codec mask value. |
| // Potentially pass EmeMediaType and a container enum. |
| SupportedCodecs GetCodecMaskForMimeType( |
| const std::string& container_mime_type) const; |
| |
| // Converts a full `codec_string` (e.g. vp09.02.10.10) to an EmeCodec. Returns |
| // EME_CODEC_NONE is the |codec_string| is invalid or not supported by EME. |
| EmeCodec GetEmeCodecForString(EmeMediaType media_type, |
| const std::string& container_mime_type, |
| const std::string& codec_string) const; |
| |
| // Whether the supported key systems are still up to date. |
| bool is_updating_ = false; |
| |
| // Pending callbacks for UpdateIfNeeded() calls. |
| base::OnceClosureList update_callbacks_; |
| |
| // Vector of KeySystemInfo . |
| KeySystemInfos key_system_info_vector_; |
| |
| // This member should only be modified by RegisterMimeType(). |
| MimeTypeToCodecsMap mime_type_to_codecs_map_; |
| |
| // For unit test only. |
| CodecMap codec_map_for_testing_; |
| |
| SupportedCodecs audio_codec_mask_ = EME_CODEC_AUDIO_ALL; |
| SupportedCodecs video_codec_mask_ = EME_CODEC_VIDEO_ALL; |
| |
| // Makes sure all methods are called from the same thread. |
| base::ThreadChecker thread_checker_; |
| |
| base::WeakPtrFactory<KeySystemsImpl> weak_factory_{this}; |
| }; |
| |
| KeySystemsImpl* KeySystemsImpl::GetInstance() { |
| static base::NoDestructor<KeySystemsImpl> key_systems; |
| return key_systems.get(); |
| } |
| |
| KeySystemsImpl::KeySystemsImpl() { |
| Initialize(); |
| } |
| |
| KeySystemsImpl::~KeySystemsImpl() { |
| if (!update_callbacks_.empty()) |
| update_callbacks_.Notify(); |
| } |
| |
| void KeySystemsImpl::Initialize() { |
| for (const auto& [mime_type, codecs] : kMimeTypeToCodecsMap) |
| RegisterMimeType(mime_type, codecs); |
| |
| UpdateSupportedKeySystems(); |
| } |
| |
| void KeySystemsImpl::UpdateSupportedKeySystems() { |
| DCHECK(!is_updating_); |
| is_updating_ = true; |
| |
| if (!GetMediaClient()) { |
| OnSupportedKeySystemsUpdated({}); |
| return; |
| } |
| |
| GetMediaClient()->GetSupportedKeySystems( |
| base::BindRepeating(&KeySystemsImpl::OnSupportedKeySystemsUpdated, |
| weak_factory_.GetWeakPtr())); |
| } |
| |
| void KeySystemsImpl::UpdateIfNeeded(base::OnceClosure done_cb) { |
| if (is_updating_) { |
| // The callback will be resolved in OnSupportedKeySystemsUpdated(). |
| update_callbacks_.AddUnsafe(std::move(done_cb)); |
| return; |
| } |
| |
| std::move(done_cb).Run(); |
| } |
| |
| SupportedCodecs KeySystemsImpl::GetCodecMaskForMimeType( |
| const std::string& container_mime_type) const { |
| auto iter = mime_type_to_codecs_map_.find(container_mime_type); |
| if (iter == mime_type_to_codecs_map_.end()) |
| return EME_CODEC_NONE; |
| |
| DCHECK(IsValidMimeTypeCodecsCombination(container_mime_type, iter->second)); |
| return iter->second; |
| } |
| |
| EmeCodec KeySystemsImpl::GetEmeCodecForString( |
| EmeMediaType media_type, |
| const std::string& container_mime_type, |
| const std::string& codec_string) const { |
| // Per spec, we should already reject empty mime types in |
| // GetSupportedCapabilities(). |
| DCHECK(!container_mime_type.empty()); |
| |
| // This is not checked because MimeUtil declares "vp9" and "vp9.0" as |
| // ambiguous, but they have always been supported by EME. |
| // TODO(xhwang): Find out whether we should fix MimeUtil about these cases. |
| bool is_ambiguous = true; |
| |
| // For testing only. |
| auto iter = codec_map_for_testing_.find(codec_string); |
| if (iter != codec_map_for_testing_.end()) |
| return iter->second; |
| |
| if (media_type == EmeMediaType::AUDIO) { |
| AudioCodec audio_codec = AudioCodec::kUnknown; |
| ParseAudioCodecString(container_mime_type, codec_string, &is_ambiguous, |
| &audio_codec); |
| DVLOG(3) << "Audio codec = " << audio_codec; |
| return ToAudioEmeCodec(audio_codec); |
| } |
| |
| DCHECK_EQ(media_type, EmeMediaType::VIDEO); |
| |
| // In general EmeCodec doesn't care about codec profiles and assumes the same |
| // level of profile support as Chromium, which is checked in |
| // KeySystemConfigSelector::IsSupportedContentType(). However, there are a few |
| // exceptions where we need to know the profile. For example, for VP9, there |
| // are older CDMs only supporting profile 0, hence EmeCodec differentiate |
| // between VP9 profile 0 and higher profiles. |
| VideoCodec video_codec = VideoCodec::kUnknown; |
| VideoCodecProfile profile = VIDEO_CODEC_PROFILE_UNKNOWN; |
| uint8_t level = 0; |
| VideoColorSpace color_space; |
| ParseVideoCodecString(container_mime_type, codec_string, &is_ambiguous, |
| &video_codec, &profile, &level, &color_space); |
| DVLOG(3) << "Video codec = " << video_codec << ", profile = " << profile; |
| return ToVideoEmeCodec(video_codec, profile); |
| } |
| |
| void KeySystemsImpl::OnSupportedKeySystemsUpdated(KeySystemInfos key_systems) { |
| DVLOG(1) << __func__; |
| |
| is_updating_ = false; |
| |
| // Clear Key is always supported. |
| key_systems.emplace_back(std::make_unique<ClearKeyKeySystemInfo>()); |
| |
| ProcessSupportedKeySystems(std::move(key_systems)); |
| |
| update_callbacks_.Notify(); |
| } |
| |
| void KeySystemsImpl::ProcessSupportedKeySystems(KeySystemInfos key_systems) { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| // Clear `key_system_info_vector_` before repopulating it. |
| key_system_info_vector_.clear(); |
| |
| for (auto& key_system : key_systems) { |
| DCHECK(!key_system->GetBaseKeySystemName().empty()); |
| DCHECK(key_system->GetPersistentStateSupport() != |
| EmeFeatureSupport::INVALID); |
| DCHECK(key_system->GetDistinctiveIdentifierSupport() != |
| EmeFeatureSupport::INVALID); |
| |
| if (!IsPotentiallySupportedKeySystem(key_system->GetBaseKeySystemName())) { |
| // If you encounter this path, see the comments for the function above. |
| DLOG(ERROR) << "Unsupported name '" << key_system->GetBaseKeySystemName() |
| << "'. See code comments."; |
| continue; |
| } |
| |
| // Supporting persistent state is a prerequisite for supporting persistent |
| // sessions. |
| if (key_system->GetPersistentStateSupport() == |
| EmeFeatureSupport::NOT_SUPPORTED) { |
| DCHECK(!key_system->GetPersistentLicenseSessionSupport().has_value()); |
| } |
| |
| if (!CanBlock(*key_system)) { |
| DCHECK(key_system->GetDistinctiveIdentifierSupport() == |
| EmeFeatureSupport::ALWAYS_ENABLED); |
| DCHECK(key_system->GetPersistentStateSupport() == |
| EmeFeatureSupport::ALWAYS_ENABLED); |
| } |
| |
| const auto base_key_system_name = key_system->GetBaseKeySystemName(); |
| DVLOG(1) << __func__ << ": Adding key system " << base_key_system_name; |
| key_system_info_vector_.push_back(std::move(key_system)); |
| } |
| } |
| |
| const KeySystemInfo* KeySystemsImpl::GetKeySystemInfo( |
| const std::string& key_system) const { |
| DCHECK(!is_updating_); |
| for (const auto& key_system_info : key_system_info_vector_) { |
| const auto& base_key_system = key_system_info->GetBaseKeySystemName(); |
| if ((key_system == base_key_system || |
| IsSubKeySystemOf(key_system, base_key_system)) && |
| key_system_info->IsSupportedKeySystem(key_system)) { |
| return key_system_info.get(); |
| } |
| } |
| |
| return nullptr; |
| } |
| |
| // Adds the MIME type with the codec mask after verifying the validity. |
| // Only this function should modify |mime_type_to_codecs_map_|. |
| void KeySystemsImpl::RegisterMimeType(const std::string& mime_type, |
| SupportedCodecs codecs) { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| DCHECK(!mime_type_to_codecs_map_.count(mime_type)); |
| DCHECK(IsValidMimeTypeCodecsCombination(mime_type, codecs)) |
| << ": mime_type = " << mime_type << ", codecs = " << codecs; |
| |
| mime_type_to_codecs_map_[mime_type] = codecs; |
| } |
| |
| // Returns whether |mime_type| follows a valid format and the specified codecs |
| // are of the correct type based on |*_codec_mask_|. |
| // Only audio/ or video/ MIME types with their respective codecs are allowed. |
| bool KeySystemsImpl::IsValidMimeTypeCodecsCombination( |
| const std::string& mime_type, |
| SupportedCodecs codecs) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| if (codecs == EME_CODEC_NONE) |
| return true; |
| |
| if (base::StartsWith(mime_type, "audio/", base::CompareCase::SENSITIVE)) |
| return !(codecs & ~audio_codec_mask_); |
| if (base::StartsWith(mime_type, "video/", base::CompareCase::SENSITIVE)) |
| return !(codecs & ~video_codec_mask_); |
| |
| return false; |
| } |
| |
| bool KeySystemsImpl::IsSupportedInitDataType( |
| const std::string& key_system, |
| EmeInitDataType init_data_type) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return false; |
| } |
| |
| return key_system_info->IsSupportedInitDataType(init_data_type); |
| } |
| |
| EmeConfig::Rule KeySystemsImpl::GetEncryptionSchemeConfigRule( |
| const std::string& key_system, |
| EncryptionScheme encryption_scheme) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| return key_system_info->GetEncryptionSchemeConfigRule(encryption_scheme); |
| } |
| |
| void KeySystemsImpl::AddCodecMaskForTesting(EmeMediaType media_type, |
| const std::string& codec, |
| uint32_t mask) { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| DCHECK(!codec_map_for_testing_.count(codec)); |
| codec_map_for_testing_[codec] = static_cast<EmeCodec>(mask); |
| if (media_type == EmeMediaType::AUDIO) { |
| audio_codec_mask_ |= mask; |
| } else { |
| video_codec_mask_ |= mask; |
| } |
| } |
| |
| void KeySystemsImpl::AddMimeTypeCodecMaskForTesting( |
| const std::string& mime_type, |
| uint32_t codecs_mask) { |
| RegisterMimeType(mime_type, static_cast<EmeCodec>(codecs_mask)); |
| } |
| |
| void KeySystemsImpl::ResetForTesting() { |
| weak_factory_.InvalidateWeakPtrs(); |
| is_updating_ = false; |
| DCHECK(update_callbacks_.empty()) |
| << "Should have no update callbacks for a clean test."; |
| key_system_info_vector_.clear(); |
| mime_type_to_codecs_map_.clear(); |
| codec_map_for_testing_.clear(); |
| audio_codec_mask_ = EME_CODEC_AUDIO_ALL; |
| video_codec_mask_ = EME_CODEC_VIDEO_ALL; |
| |
| Initialize(); |
| } |
| |
| std::string KeySystemsImpl::GetBaseKeySystemName( |
| const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED() << "Key system support should have been checked"; |
| return key_system; |
| } |
| |
| return key_system_info->GetBaseKeySystemName(); |
| } |
| |
| bool KeySystemsImpl::IsSupportedKeySystem(const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| return GetKeySystemInfo(key_system); |
| } |
| |
| bool KeySystemsImpl::ShouldUseBaseKeySystemName( |
| const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED() << "Key system support should have been checked"; |
| return false; |
| } |
| |
| return key_system_info->ShouldUseBaseKeySystemName(); |
| } |
| |
| bool KeySystemsImpl::CanUseAesDecryptor(const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| DLOG(ERROR) << key_system << " is not a known supported key system"; |
| return false; |
| } |
| |
| return key_system_info->UseAesDecryptor(); |
| } |
| |
| EmeConfig::Rule KeySystemsImpl::GetContentTypeConfigRule( |
| const std::string& key_system, |
| EmeMediaType media_type, |
| const std::string& container_mime_type, |
| const std::vector<std::string>& codecs) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| // Make sure the container MIME type matches |media_type|. |
| switch (media_type) { |
| case EmeMediaType::AUDIO: |
| if (!base::StartsWith(container_mime_type, "audio/", |
| base::CompareCase::SENSITIVE)) { |
| return EmeConfig::UnsupportedRule(); |
| } |
| break; |
| case EmeMediaType::VIDEO: |
| if (!base::StartsWith(container_mime_type, "video/", |
| base::CompareCase::SENSITIVE)) { |
| return EmeConfig::UnsupportedRule(); |
| } |
| break; |
| } |
| |
| // Double check whether the key system is supported. |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED() << "Key system support should have been checked"; |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| // Look up the key system's supported codecs and secure codecs. |
| SupportedCodecs key_system_codec_mask = key_system_info->GetSupportedCodecs(); |
| SupportedCodecs key_system_hw_secure_codec_mask = |
| key_system_info->GetSupportedHwSecureCodecs(); |
| |
| // Check that the container is supported by the key system. (This check is |
| // necessary because |codecs| may be empty.) |
| SupportedCodecs mime_type_codec_mask = |
| GetCodecMaskForMimeType(container_mime_type); |
| if ((key_system_codec_mask & mime_type_codec_mask) == 0) { |
| DVLOG(2) << "Container " << container_mime_type << " not supported by " |
| << key_system; |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| // Check that the codecs are supported by the key system and container based |
| // on the following rule: |
| // SupportedCodecs | SupportedSecureCodecs | Result |
| // yes | yes | SUPPORTED |
| // yes | no | HW_SECURE_CODECS_NOT_ALLOWED |
| // no | yes | HW_SECURE_CODECS_REQUIRED |
| // no | no | NOT_SUPPORTED |
| auto to_support = EmeConfig::SupportedRule(); |
| for (auto& codec_iterator : codecs) { |
| EmeCodec codec = |
| GetEmeCodecForString(media_type, container_mime_type, codec_iterator); |
| if (codec == EME_CODEC_NONE) { |
| DVLOG(2) << "Unsupported codec string \"" << codec_iterator << "\""; |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| // Currently all EmeCodecs only have one bit set. In case there could be |
| // codecs with multiple bits set, e.g. to cover multiple profiles, we check |
| // (codec & mask) == codec instead of (codec & mask) != 0 to make sure all |
| // bits are set. Same below. |
| if ((codec & key_system_codec_mask & mime_type_codec_mask) != codec && |
| (codec & key_system_hw_secure_codec_mask & mime_type_codec_mask) != |
| codec) { |
| DVLOG(2) << "Container/codec pair (" << container_mime_type << " / " |
| << codec_iterator << ") not supported by " << key_system; |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| // Check whether the codec supports a hardware-secure mode (any level). |
| if ((codec & key_system_hw_secure_codec_mask) != codec) { |
| DCHECK_EQ(codec & key_system_codec_mask, codec); |
| if (to_support->hw_secure_codecs == EmeConfigRuleState::kRequired) { |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| to_support->hw_secure_codecs = EmeConfigRuleState::kNotAllowed; |
| } |
| |
| // Check whether the codec requires a hardware-secure mode (any level). |
| if ((codec & key_system_codec_mask) != codec) { |
| DCHECK_EQ(codec & key_system_hw_secure_codec_mask, codec); |
| if (to_support->hw_secure_codecs == EmeConfigRuleState::kNotAllowed) { |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| to_support->hw_secure_codecs = EmeConfigRuleState::kRequired; |
| } |
| } |
| |
| return to_support; |
| } |
| |
| EmeConfig::Rule KeySystemsImpl::GetRobustnessConfigRule( |
| const std::string& key_system, |
| EmeMediaType media_type, |
| const std::string& requested_robustness, |
| const bool* hw_secure_requirement) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| return key_system_info->GetRobustnessConfigRule( |
| key_system, media_type, requested_robustness, hw_secure_requirement); |
| } |
| |
| EmeConfig::Rule KeySystemsImpl::GetPersistentLicenseSessionSupport( |
| const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return EmeConfig::UnsupportedRule(); |
| } |
| |
| return key_system_info->GetPersistentLicenseSessionSupport(); |
| } |
| |
| EmeFeatureSupport KeySystemsImpl::GetPersistentStateSupport( |
| const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return EmeFeatureSupport::INVALID; |
| } |
| |
| return key_system_info->GetPersistentStateSupport(); |
| } |
| |
| EmeFeatureSupport KeySystemsImpl::GetDistinctiveIdentifierSupport( |
| const std::string& key_system) const { |
| DCHECK(thread_checker_.CalledOnValidThread()); |
| |
| const auto* key_system_info = GetKeySystemInfo(key_system); |
| if (!key_system_info) { |
| NOTREACHED(); |
| return EmeFeatureSupport::INVALID; |
| } |
| |
| return key_system_info->GetDistinctiveIdentifierSupport(); |
| } |
| |
| } // namespace |
| |
| KeySystems* KeySystems::GetInstance() { |
| return KeySystemsImpl::GetInstance(); |
| } |
| |
| bool IsSupportedKeySystemWithInitDataType(const std::string& key_system, |
| EmeInitDataType init_data_type) { |
| return KeySystemsImpl::GetInstance()->IsSupportedInitDataType(key_system, |
| init_data_type); |
| } |
| |
| std::string GetKeySystemNameForUMA(const std::string& key_system, |
| absl::optional<bool> use_hw_secure_codecs) { |
| // Here we maintain a short list of known key systems to facilitate UMA |
| // reporting. Mentioned key systems are not necessarily supported by |
| // the current platform. |
| |
| if (key_system == kWidevineKeySystem) { |
| std::string key_system_name = kWidevineKeySystemNameForUMA; |
| if (use_hw_secure_codecs.has_value()) { |
| key_system_name += "."; |
| key_system_name += (use_hw_secure_codecs.value() ? kHardwareSecureForUMA |
| : kSoftwareSecureForUMA); |
| } |
| return key_system_name; |
| } |
| |
| // For Clear Key and unknown key systems we don't to differentiate between |
| // software and hardware security. |
| |
| if (key_system == kClearKeyKeySystem) { |
| return kClearKeyKeySystemNameForUMA; |
| } |
| |
| return kUnknownKeySystemNameForUMA; |
| } |
| |
| int GetKeySystemIntForUKM(const std::string& key_system) { |
| if (key_system == kWidevineKeySystem) |
| return KeySystemForUkm::kWidevineKeySystemForUkm; |
| |
| if (key_system == kClearKeyKeySystem) { |
| return KeySystemForUkm::kClearKeyKeySystemForUkm; |
| } |
| |
| return KeySystemForUkm::kUnknownKeySystemForUkm; |
| } |
| |
| bool CanUseAesDecryptor(const std::string& key_system) { |
| return KeySystemsImpl::GetInstance()->CanUseAesDecryptor(key_system); |
| } |
| |
| // These three functions are for testing purpose only. The declaration in the |
| // header file is guarded by "#if defined(UNIT_TEST)" so that they can be used |
| // by tests but not non-test code. However, this .cc file is compiled as part of |
| // "media" where "UNIT_TEST" is not defined. So we need to specify |
| // "MEDIA_EXPORT" here again so that they are visible to tests. |
| |
| MEDIA_EXPORT void AddCodecMaskForTesting(EmeMediaType media_type, |
| const std::string& codec, |
| uint32_t mask) { |
| KeySystemsImpl::GetInstance()->AddCodecMaskForTesting(media_type, codec, |
| mask); |
| } |
| |
| MEDIA_EXPORT void AddMimeTypeCodecMaskForTesting(const std::string& mime_type, |
| uint32_t mask) { |
| KeySystemsImpl::GetInstance()->AddMimeTypeCodecMaskForTesting(mime_type, |
| mask); |
| } |
| |
| MEDIA_EXPORT void ResetKeySystemsForTesting() { |
| KeySystemsImpl::GetInstance()->ResetForTesting(); |
| } |
| |
| } // namespace media |