hlsdemux: make decryption key handling per-stream

Add demuxer instance-wide decryption key cache. The current and
last key url are per-stream, so make a shared cache. Move the
decryption handling into the stream object, and use the shared
cache for the keys.
This commit is contained in:
Tim-Philipp Müller 2016-07-13 23:02:10 +10:00 committed by Jan Schmidt
parent 463f48c148
commit 6697feae5f
2 changed files with 155 additions and 117 deletions

View file

@ -72,11 +72,11 @@ static gchar *gst_hls_src_buf_to_utf8_playlist (GstBuffer * buf);
static gboolean gst_hls_demux_change_playlist (GstHLSDemux * demux, static gboolean gst_hls_demux_change_playlist (GstHLSDemux * demux,
guint max_bitrate, gboolean * changed); guint max_bitrate, gboolean * changed);
static GstBuffer *gst_hls_demux_decrypt_fragment (GstHLSDemux * demux, static GstBuffer *gst_hls_demux_decrypt_fragment (GstHLSDemux * demux,
GstBuffer * encrypted_buffer, GError ** err); GstHLSDemuxStream * stream, GstBuffer * encrypted_buffer, GError ** err);
static gboolean static gboolean
gst_hls_demux_decrypt_start (GstHLSDemux * demux, const guint8 * key_data, gst_hls_demux_stream_decrypt_start (GstHLSDemuxStream * stream,
const guint8 * iv_data); const guint8 * key_data, const guint8 * iv_data);
static void gst_hls_demux_decrypt_end (GstHLSDemux * demux); static void gst_hls_demux_stream_decrypt_end (GstHLSDemuxStream * stream);
static gboolean gst_hls_demux_is_live (GstAdaptiveDemux * demux); static gboolean gst_hls_demux_is_live (GstAdaptiveDemux * demux);
static GstClockTime gst_hls_demux_get_duration (GstAdaptiveDemux * demux); static GstClockTime gst_hls_demux_get_duration (GstAdaptiveDemux * demux);
@ -116,6 +116,7 @@ gst_hls_demux_finalize (GObject * obj)
gst_hls_demux_reset (GST_ADAPTIVE_DEMUX_CAST (demux)); gst_hls_demux_reset (GST_ADAPTIVE_DEMUX_CAST (demux));
gst_m3u8_client_free (demux->client); gst_m3u8_client_free (demux->client);
g_mutex_clear (&demux->keys_lock);
G_OBJECT_CLASS (parent_class)->finalize (obj); G_OBJECT_CLASS (parent_class)->finalize (obj);
} }
@ -175,6 +176,9 @@ gst_hls_demux_init (GstHLSDemux * demux)
{ {
gst_adaptive_demux_set_stream_struct_size (GST_ADAPTIVE_DEMUX_CAST (demux), gst_adaptive_demux_set_stream_struct_size (GST_ADAPTIVE_DEMUX_CAST (demux),
sizeof (GstHLSDemuxStream)); sizeof (GstHLSDemuxStream));
demux->keys = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, g_free);
g_mutex_init (&demux->keys_lock);
} }
static GstStateChangeReturn static GstStateChangeReturn
@ -196,6 +200,7 @@ gst_hls_demux_change_state (GstElement * element, GstStateChange transition)
switch (transition) { switch (transition) {
case GST_STATE_CHANGE_PAUSED_TO_READY: case GST_STATE_CHANGE_PAUSED_TO_READY:
gst_hls_demux_reset (GST_ADAPTIVE_DEMUX_CAST (demux)); gst_hls_demux_reset (GST_ADAPTIVE_DEMUX_CAST (demux));
g_hash_table_remove_all (demux->keys);
break; break;
default: default:
break; break;
@ -236,7 +241,6 @@ gst_hls_demux_clear_pending_data (GstHLSDemux * hlsdemux)
GstAdaptiveDemux *demux = (GstAdaptiveDemux *) hlsdemux; GstAdaptiveDemux *demux = (GstAdaptiveDemux *) hlsdemux;
GList *walk; GList *walk;
gst_hls_demux_decrypt_end (hlsdemux);
for (walk = demux->streams; walk != NULL; walk = walk->next) { for (walk = demux->streams; walk != NULL; walk = walk->next) {
GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (walk->data); GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (walk->data);
if (hls_stream->pending_encrypted_data) if (hls_stream->pending_encrypted_data)
@ -244,6 +248,7 @@ gst_hls_demux_clear_pending_data (GstHLSDemux * hlsdemux)
gst_buffer_replace (&hls_stream->pending_decrypted_buffer, NULL); gst_buffer_replace (&hls_stream->pending_decrypted_buffer, NULL);
gst_buffer_replace (&hls_stream->pending_typefind_buffer, NULL); gst_buffer_replace (&hls_stream->pending_typefind_buffer, NULL);
hls_stream->current_offset = -1; hls_stream->current_offset = -1;
gst_hls_demux_stream_decrypt_end (hls_stream);
} }
} }
@ -490,52 +495,81 @@ gst_hls_demux_is_live (GstAdaptiveDemux * demux)
return gst_m3u8_client_is_live (hlsdemux->client); return gst_m3u8_client_is_live (hlsdemux->client);
} }
static const GstHLSKey *
gst_hls_demux_get_key (GstHLSDemux * demux, const gchar * key_url,
const gchar * referer, gboolean allow_cache)
{
GstFragment *key_fragment;
GstBuffer *key_buffer;
GstHLSKey *key;
GError *err = NULL;
GST_LOG_OBJECT (demux, "Looking up key for key url %s", key_url);
g_mutex_lock (&demux->keys_lock);
key = g_hash_table_lookup (demux->keys, key_url);
if (key != NULL) {
GST_LOG_OBJECT (demux, "Found key for key url %s in key cache", key_url);
goto out;
}
GST_INFO_OBJECT (demux, "Fetching key %s", key_url);
key_fragment =
gst_uri_downloader_fetch_uri (GST_ADAPTIVE_DEMUX (demux)->downloader,
key_url, referer, FALSE, FALSE, allow_cache, &err);
if (key_fragment == NULL) {
GST_WARNING_OBJECT (demux, "Failed to download key to decrypt data: %s",
err ? err->message : "error");
g_clear_error (&err);
goto out;
}
key_buffer = gst_fragment_get_buffer (key_fragment);
key = g_new0 (GstHLSKey, 1);
if (gst_buffer_extract (key_buffer, 0, key->data, 16) < 16)
GST_WARNING_OBJECT (demux, "Download decryption key is too short!");
g_hash_table_insert (demux->keys, g_strdup (key_url), key);
gst_buffer_unref (key_buffer);
g_object_unref (key_fragment);
out:
g_mutex_unlock (&demux->keys_lock);
if (key != NULL)
GST_MEMDUMP_OBJECT (demux, "Key", key->data, 16);
return key;
}
static gboolean static gboolean
gst_hls_demux_start_fragment (GstAdaptiveDemux * demux, gst_hls_demux_start_fragment (GstAdaptiveDemux * demux,
GstAdaptiveDemuxStream * stream) GstAdaptiveDemuxStream * stream)
{ {
GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (stream);
GstHLSDemux *hlsdemux = GST_HLS_DEMUX_CAST (demux); GstHLSDemux *hlsdemux = GST_HLS_DEMUX_CAST (demux);
const GstHLSKey *key;
if (hlsdemux->current_key) { /* If no decryption is needed, there's nothing to be done here */
GError *err = NULL; if (hls_stream->current_key == NULL)
GstFragment *key_fragment; return TRUE;
GstBuffer *key_buffer;
GstMapInfo key_info;
/* new key? */ key = gst_hls_demux_get_key (hlsdemux, hls_stream->current_key,
if (hlsdemux->key_url hlsdemux->client->main ? hlsdemux->client->main->uri : NULL,
&& strcmp (hlsdemux->key_url, hlsdemux->current_key) == 0) { hlsdemux->client->current ? hlsdemux->client->current->allowcache : TRUE);
key_fragment = g_object_ref (hlsdemux->key_fragment);
} else {
g_free (hlsdemux->key_url);
hlsdemux->key_url = NULL;
if (hlsdemux->key_fragment) if (key == NULL)
g_object_unref (hlsdemux->key_fragment); goto key_failed;
hlsdemux->key_fragment = NULL;
GST_INFO_OBJECT (demux, "Fetching key %s", hlsdemux->current_key); gst_hls_demux_stream_decrypt_start (hls_stream, key->data,
key_fragment = hls_stream->current_iv);
gst_uri_downloader_fetch_uri (demux->downloader,
hlsdemux->current_key, hlsdemux->client->main ?
hlsdemux->client->main->uri : NULL, FALSE, FALSE,
hlsdemux->client->current ? hlsdemux->client->current->
allowcache : TRUE, &err);
if (key_fragment == NULL)
goto key_failed;
hlsdemux->key_url = g_strdup (hlsdemux->current_key);
hlsdemux->key_fragment = g_object_ref (key_fragment);
}
key_buffer = gst_fragment_get_buffer (key_fragment);
gst_buffer_map (key_buffer, &key_info, GST_MAP_READ);
gst_hls_demux_decrypt_start (hlsdemux, key_info.data, hlsdemux->current_iv);
gst_buffer_unmap (key_buffer, &key_info);
gst_buffer_unref (key_buffer);
g_object_unref (key_fragment);
}
gst_hls_demux_clear_pending_data (hlsdemux); gst_hls_demux_clear_pending_data (hlsdemux);
@ -623,12 +657,12 @@ gst_hls_demux_finish_fragment (GstAdaptiveDemux * demux,
GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (stream); // FIXME: pass HlsStream into function GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (stream); // FIXME: pass HlsStream into function
GstFlowReturn ret = GST_FLOW_OK; GstFlowReturn ret = GST_FLOW_OK;
if (hlsdemux->current_key) if (hls_stream->current_key)
gst_hls_demux_decrypt_end (hlsdemux); gst_hls_demux_stream_decrypt_end (hls_stream);
if (stream->last_ret == GST_FLOW_OK) { if (stream->last_ret == GST_FLOW_OK) {
if (hls_stream->pending_decrypted_buffer) { if (hls_stream->pending_decrypted_buffer) {
if (hlsdemux->current_key) { if (hls_stream->current_key) {
GstMapInfo info; GstMapInfo info;
gssize unpadded_size; gssize unpadded_size;
@ -660,15 +694,15 @@ static GstFlowReturn
gst_hls_demux_data_received (GstAdaptiveDemux * demux, gst_hls_demux_data_received (GstAdaptiveDemux * demux,
GstAdaptiveDemuxStream * stream, GstBuffer * buffer) GstAdaptiveDemuxStream * stream, GstBuffer * buffer)
{ {
GstHLSDemux *hlsdemux = GST_HLS_DEMUX_CAST (demux);
GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (stream); GstHLSDemuxStream *hls_stream = GST_HLS_DEMUX_STREAM_CAST (stream);
GstHLSDemux *hlsdemux = GST_HLS_DEMUX_CAST (demux);
if (hls_stream->current_offset == -1) if (hls_stream->current_offset == -1)
hls_stream->current_offset = hls_stream->current_offset =
GST_BUFFER_OFFSET_IS_VALID (buffer) ? GST_BUFFER_OFFSET (buffer) : 0; GST_BUFFER_OFFSET_IS_VALID (buffer) ? GST_BUFFER_OFFSET (buffer) : 0;
/* Is it encrypted? */ /* Is it encrypted? */
if (hlsdemux->current_key) { if (hls_stream->current_key) {
GError *err = NULL; GError *err = NULL;
gsize size; gsize size;
GstBuffer *tmp_buffer; GstBuffer *tmp_buffer;
@ -687,7 +721,8 @@ gst_hls_demux_data_received (GstAdaptiveDemux * demux,
} }
buffer = gst_adapter_take_buffer (hls_stream->pending_encrypted_data, size); buffer = gst_adapter_take_buffer (hls_stream->pending_encrypted_data, size);
buffer = gst_hls_demux_decrypt_fragment (hlsdemux, buffer, &err); buffer =
gst_hls_demux_decrypt_fragment (hlsdemux, hls_stream, buffer, &err);
if (buffer == NULL) { if (buffer == NULL) {
GST_ELEMENT_ERROR (demux, STREAM, DECODE, ("Failed to decrypt buffer"), GST_ELEMENT_ERROR (demux, STREAM, DECODE, ("Failed to decrypt buffer"),
("decryption failed %s", err->message)); ("decryption failed %s", err->message));
@ -713,6 +748,16 @@ gst_hls_demux_stream_free (GstAdaptiveDemuxStream * stream)
gst_buffer_replace (&hls_stream->pending_decrypted_buffer, NULL); gst_buffer_replace (&hls_stream->pending_decrypted_buffer, NULL);
gst_buffer_replace (&hls_stream->pending_typefind_buffer, NULL); gst_buffer_replace (&hls_stream->pending_typefind_buffer, NULL);
if (hls_stream->current_key) {
g_free (hls_stream->current_key);
hls_stream->current_key = NULL;
}
if (hls_stream->current_iv) {
g_free (hls_stream->current_iv);
hls_stream->current_iv = NULL;
}
gst_hls_demux_stream_decrypt_end (hls_stream);
} }
static gboolean static gboolean
@ -767,10 +812,11 @@ gst_hls_demux_update_fragment_info (GstAdaptiveDemuxStream * stream)
stream->fragment.timestamp = GST_CLOCK_TIME_NONE; stream->fragment.timestamp = GST_CLOCK_TIME_NONE;
} }
g_free (hlsdemux->current_key); g_free (hlsdemux_stream->current_key);
hlsdemux->current_key = key; hlsdemux_stream->current_key = key;
g_free (hlsdemux->current_iv); g_free (hlsdemux_stream->current_iv);
hlsdemux->current_iv = iv; hlsdemux_stream->current_iv = iv;
g_free (stream->fragment.uri); g_free (stream->fragment.uri);
stream->fragment.uri = next_fragment_uri; stream->fragment.uri = next_fragment_uri;
stream->fragment.range_start = range_start; stream->fragment.range_start = range_start;
@ -813,13 +859,6 @@ gst_hls_demux_reset (GstAdaptiveDemux * ademux)
{ {
GstHLSDemux *demux = GST_HLS_DEMUX_CAST (ademux); GstHLSDemux *demux = GST_HLS_DEMUX_CAST (ademux);
g_free (demux->key_url);
demux->key_url = NULL;
if (demux->key_fragment)
g_object_unref (demux->key_fragment);
demux->key_fragment = NULL;
if (demux->client) { if (demux->client) {
gst_m3u8_client_free (demux->client); gst_m3u8_client_free (demux->client);
demux->client = NULL; demux->client = NULL;
@ -830,17 +869,6 @@ gst_hls_demux_reset (GstAdaptiveDemux * ademux)
demux->srcpad_counter = 0; demux->srcpad_counter = 0;
gst_hls_demux_clear_pending_data (demux); gst_hls_demux_clear_pending_data (demux);
if (demux->current_key) {
g_free (demux->current_key);
demux->current_key = NULL;
}
if (demux->current_iv) {
g_free (demux->current_iv);
demux->current_iv = NULL;
}
gst_hls_demux_decrypt_end (demux);
} }
static gchar * static gchar *
@ -1140,19 +1168,19 @@ retry_failover_protection:
#if defined(HAVE_OPENSSL) #if defined(HAVE_OPENSSL)
static gboolean static gboolean
gst_hls_demux_decrypt_start (GstHLSDemux * demux, const guint8 * key_data, gst_hls_demux_stream_decrypt_start (GstHLSDemuxStream * stream,
const guint8 * iv_data) const guint8 * key_data, const guint8 * iv_data)
{ {
EVP_CIPHER_CTX_init (&demux->aes_ctx); EVP_CIPHER_CTX_init (&stream->aes_ctx);
if (!EVP_DecryptInit_ex (&demux->aes_ctx, EVP_aes_128_cbc (), NULL, key_data, if (!EVP_DecryptInit_ex (&stream->aes_ctx, EVP_aes_128_cbc (), NULL, key_data,
iv_data)) iv_data))
return FALSE; return FALSE;
EVP_CIPHER_CTX_set_padding (&demux->aes_ctx, 0); EVP_CIPHER_CTX_set_padding (&stream->aes_ctx, 0);
return TRUE; return TRUE;
} }
static gboolean static gboolean
decrypt_fragment (GstHLSDemux * demux, gsize length, decrypt_fragment (GstHLSDemuxStream * stream, gsize length,
const guint8 * encrypted_data, guint8 * decrypted_data) const guint8 * encrypted_data, guint8 * decrypted_data)
{ {
int len, flen = 0; int len, flen = 0;
@ -1161,102 +1189,102 @@ decrypt_fragment (GstHLSDemux * demux, gsize length,
return FALSE; return FALSE;
len = (int) length; len = (int) length;
if (!EVP_DecryptUpdate (&demux->aes_ctx, decrypted_data, &len, encrypted_data, if (!EVP_DecryptUpdate (&stream->aes_ctx, decrypted_data, &len,
len)) encrypted_data, len))
return FALSE; return FALSE;
EVP_DecryptFinal_ex (&demux->aes_ctx, decrypted_data + len, &flen); EVP_DecryptFinal_ex (&stream->aes_ctx, decrypted_data + len, &flen);
g_return_val_if_fail (len + flen == length, FALSE); g_return_val_if_fail (len + flen == length, FALSE);
return TRUE; return TRUE;
} }
static void static void
gst_hls_stream_decrypt_end (GstHLSDemuxStream * stream) gst_hls_demux_stream_decrypt_end (GstHLSDemuxStream * stream)
{ {
EVP_CIPHER_CTX_cleanup (&demux->aes_ctx); EVP_CIPHER_CTX_cleanup (&stream->aes_ctx);
} }
#elif defined(HAVE_NETTLE) #elif defined(HAVE_NETTLE)
static gboolean static gboolean
gst_hls_demux_decrypt_start (GstHLSDemux * demux, const guint8 * key_data, gst_hls_demux_stream_decrypt_start (GstHLSDemuxStream * stream,
const guint8 * iv_data) const guint8 * key_data, const guint8 * iv_data)
{ {
aes_set_decrypt_key (&demux->aes_ctx.ctx, 16, key_data); aes_set_decrypt_key (&stream->aes_ctx.ctx, 16, key_data);
CBC_SET_IV (&demux->aes_ctx, iv_data); CBC_SET_IV (&stream->aes_ctx, iv_data);
return TRUE; return TRUE;
} }
static gboolean static gboolean
decrypt_fragment (GstHLSDemux * demux, gsize length, decrypt_fragment (GstHLSDemuxStream * stream, gsize length,
const guint8 * encrypted_data, guint8 * decrypted_data) const guint8 * encrypted_data, guint8 * decrypted_data)
{ {
if (length % 16 != 0) if (length % 16 != 0)
return FALSE; return FALSE;
CBC_DECRYPT (&demux->aes_ctx, aes_decrypt, length, decrypted_data, CBC_DECRYPT (&stream->aes_ctx, aes_decrypt, length, decrypted_data,
encrypted_data); encrypted_data);
return TRUE; return TRUE;
} }
static void static void
gst_hls_demux_decrypt_end (GstHLSDemux * demux) gst_hls_demux_stream_decrypt_end (GstHLSDemuxStream * stream)
{ {
/* NOP */ /* NOP */
} }
#else #else
static gboolean static gboolean
gst_hls_demux_decrypt_start (GstHLSDemux * demux, const guint8 * key_data, gst_hls_demux_stream_decrypt_start (GstHLSDemuxStream * stream,
const guint8 * iv_data) const guint8 * key_data, const guint8 * iv_data)
{ {
gcry_error_t err = 0; gcry_error_t err = 0;
gboolean ret = FALSE; gboolean ret = FALSE;
err = err =
gcry_cipher_open (&demux->aes_ctx, GCRY_CIPHER_AES128, gcry_cipher_open (&stream->aes_ctx, GCRY_CIPHER_AES128,
GCRY_CIPHER_MODE_CBC, 0); GCRY_CIPHER_MODE_CBC, 0);
if (err) if (err)
goto out; goto out;
err = gcry_cipher_setkey (demux->aes_ctx, key_data, 16); err = gcry_cipher_setkey (stream->aes_ctx, key_data, 16);
if (err) if (err)
goto out; goto out;
err = gcry_cipher_setiv (demux->aes_ctx, iv_data, 16); err = gcry_cipher_setiv (stream->aes_ctx, iv_data, 16);
if (!err) if (!err)
ret = TRUE; ret = TRUE;
out: out:
if (!ret) if (!ret)
if (demux->aes_ctx) if (stream->aes_ctx)
gcry_cipher_close (demux->aes_ctx); gcry_cipher_close (stream->aes_ctx);
return ret; return ret;
} }
static gboolean static gboolean
decrypt_fragment (GstHLSDemux * demux, gsize length, decrypt_fragment (GstHLSDemuxStream * stream, gsize length,
const guint8 * encrypted_data, guint8 * decrypted_data) const guint8 * encrypted_data, guint8 * decrypted_data)
{ {
gcry_error_t err = 0; gcry_error_t err = 0;
err = gcry_cipher_decrypt (demux->aes_ctx, decrypted_data, length, err = gcry_cipher_decrypt (stream->aes_ctx, decrypted_data, length,
encrypted_data, length); encrypted_data, length);
return err == 0; return err == 0;
} }
static void static void
gst_hls_demux_decrypt_end (GstHLSDemux * demux) gst_hls_demux_stream_decrypt_end (GstHLSDemuxStream * stream)
{ {
if (demux->aes_ctx) { if (stream->aes_ctx) {
gcry_cipher_close (demux->aes_ctx); gcry_cipher_close (stream->aes_ctx);
demux->aes_ctx = NULL; stream->aes_ctx = NULL;
} }
} }
#endif #endif
static GstBuffer * static GstBuffer *
gst_hls_demux_decrypt_fragment (GstHLSDemux * demux, gst_hls_demux_decrypt_fragment (GstHLSDemux * demux, GstHLSDemuxStream * stream,
GstBuffer * encrypted_buffer, GError ** err) GstBuffer * encrypted_buffer, GError ** err)
{ {
GstBuffer *decrypted_buffer = NULL; GstBuffer *decrypted_buffer = NULL;
@ -1269,7 +1297,7 @@ gst_hls_demux_decrypt_fragment (GstHLSDemux * demux,
gst_buffer_map (encrypted_buffer, &encrypted_info, GST_MAP_READ); gst_buffer_map (encrypted_buffer, &encrypted_info, GST_MAP_READ);
gst_buffer_map (decrypted_buffer, &decrypted_info, GST_MAP_WRITE); gst_buffer_map (decrypted_buffer, &decrypted_info, GST_MAP_WRITE);
if (!decrypt_fragment (demux, encrypted_info.size, if (!decrypt_fragment (stream, encrypted_info.size,
encrypted_info.data, decrypted_info.data)) encrypted_info.data, decrypted_info.data))
goto decrypt_error; goto decrypt_error;

View file

@ -72,8 +72,29 @@ struct _GstHLSDemuxStream
We only know that it is the last at EOS */ We only know that it is the last at EOS */
guint64 current_offset; /* offset we're currently at */ guint64 current_offset; /* offset we're currently at */
gboolean reset_pts; gboolean reset_pts;
/* decryption tooling */
#if defined(HAVE_OPENSSL)
EVP_CIPHER_CTX aes_ctx;
#elif defined(HAVE_NETTLE)
struct CBC_CTX (struct aes_ctx, AES_BLOCK_SIZE) aes_ctx;
#else
gcry_cipher_hd_t aes_ctx;
#endif
gchar *current_key;
guint8 *current_iv;
GstBuffer *pending_buffer; /* decryption scenario:
* the last buffer can only be pushed when
* resized, so need to store and wait for
* EOS to know it is the last */
}; };
typedef struct {
guint8 data[16];
} GstHLSKey;
/** /**
* GstHLSDemux: * GstHLSDemux:
* *
@ -88,20 +109,9 @@ struct _GstHLSDemux
gchar *uri; /* Original playlist URI */ gchar *uri; /* Original playlist URI */
GstM3U8Client *client; /* M3U8 client */ GstM3U8Client *client; /* M3U8 client */
/* Cache for the last key */ /* Decryption key cache: url => GstHLSKey */
gchar *key_url; GHashTable *keys;
GstFragment *key_fragment; GMutex keys_lock;
/* decryption tooling */
#if defined(HAVE_OPENSSL)
EVP_CIPHER_CTX aes_ctx;
#elif defined(HAVE_NETTLE)
struct CBC_CTX (struct aes_ctx, AES_BLOCK_SIZE) aes_ctx;
#else
gcry_cipher_hd_t aes_ctx;
#endif
gchar *current_key;
guint8 *current_iv;
}; };
struct _GstHLSDemuxClass struct _GstHLSDemuxClass