Home | History | Annotate | Download | only in android
      1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "media/base/android/media_drm_bridge.h"
      6 
      7 #include <algorithm>
      8 
      9 #include "base/android/build_info.h"
     10 #include "base/android/jni_array.h"
     11 #include "base/android/jni_string.h"
     12 #include "base/callback_helpers.h"
     13 #include "base/containers/hash_tables.h"
     14 #include "base/lazy_instance.h"
     15 #include "base/location.h"
     16 #include "base/logging.h"
     17 #include "base/message_loop/message_loop_proxy.h"
     18 #include "base/strings/string_util.h"
     19 #include "base/sys_byteorder.h"
     20 #include "jni/MediaDrmBridge_jni.h"
     21 
     22 #include "widevine_cdm_version.h"  // In SHARED_INTERMEDIATE_DIR.
     23 
     24 using base::android::AttachCurrentThread;
     25 using base::android::ConvertUTF8ToJavaString;
     26 using base::android::ConvertJavaStringToUTF8;
     27 using base::android::JavaByteArrayToByteVector;
     28 using base::android::ScopedJavaLocalRef;
     29 
     30 namespace media {
     31 
     32 static uint32 ReadUint32(const uint8_t* data) {
     33   uint32 value = 0;
     34   for (int i = 0; i < 4; ++i)
     35     value = (value << 8) | data[i];
     36   return value;
     37 }
     38 
     39 static uint64 ReadUint64(const uint8_t* data) {
     40   uint64 value = 0;
     41   for (int i = 0; i < 8; ++i)
     42     value = (value << 8) | data[i];
     43   return value;
     44 }
     45 
     46 // The structure of an ISO CENC Protection System Specific Header (PSSH) box is
     47 // as follows. (See ISO/IEC FDIS 23001-7:2011(E).)
     48 // Note: ISO boxes use big-endian values.
     49 //
     50 // PSSH {
     51 //   uint32 Size
     52 //   uint32 Type
     53 //   uint64 LargeSize  # Field is only present if value(Size) == 1.
     54 //   uint32 VersionAndFlags
     55 //   uint8[16] SystemId
     56 //   uint32 DataSize
     57 //   uint8[DataSize] Data
     58 // }
     59 const int kBoxHeaderSize = 8;  // Box's header contains Size and Type.
     60 const int kBoxLargeSizeSize = 8;
     61 const int kPsshVersionFlagSize = 4;
     62 const int kPsshSystemIdSize = 16;
     63 const int kPsshDataSizeSize = 4;
     64 const uint32 kTencType = 0x74656e63;
     65 const uint32 kPsshType = 0x70737368;
     66 const uint8 kWidevineUuid[16] = {
     67     0xED, 0xEF, 0x8B, 0xA9, 0x79, 0xD6, 0x4A, 0xCE,
     68     0xA3, 0xC8, 0x27, 0xDC, 0xD5, 0x1D, 0x21, 0xED };
     69 
     70 typedef std::vector<uint8> UUID;
     71 
     72 class KeySystemUuidManager {
     73  public:
     74   KeySystemUuidManager();
     75   UUID GetUUID(const std::string& key_system);
     76   void AddMapping(const std::string& key_system, const UUID& uuid);
     77   std::vector<std::string> GetPlatformKeySystemNames();
     78 
     79  private:
     80   typedef base::hash_map<std::string, UUID> KeySystemUuidMap;
     81 
     82   KeySystemUuidMap key_system_uuid_map_;
     83 
     84   DISALLOW_COPY_AND_ASSIGN(KeySystemUuidManager);
     85 };
     86 
     87 KeySystemUuidManager::KeySystemUuidManager() {
     88   // Widevine is always supported in Android.
     89   key_system_uuid_map_[kWidevineKeySystem] =
     90       UUID(kWidevineUuid, kWidevineUuid + arraysize(kWidevineUuid));
     91 }
     92 
     93 UUID KeySystemUuidManager::GetUUID(const std::string& key_system) {
     94   KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
     95   if (it == key_system_uuid_map_.end())
     96     return UUID();
     97   return it->second;
     98 }
     99 
    100 void KeySystemUuidManager::AddMapping(const std::string& key_system,
    101                                       const UUID& uuid) {
    102   KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
    103   DCHECK(it == key_system_uuid_map_.end())
    104       << "Shouldn't overwrite an existing key system.";
    105   if (it != key_system_uuid_map_.end())
    106     return;
    107   key_system_uuid_map_[key_system] = uuid;
    108 }
    109 
    110 std::vector<std::string> KeySystemUuidManager::GetPlatformKeySystemNames() {
    111   std::vector<std::string> key_systems;
    112   for (KeySystemUuidMap::iterator it = key_system_uuid_map_.begin();
    113        it != key_system_uuid_map_.end(); ++it) {
    114     // Rule out the key system handled by Chrome explicitly.
    115     if (it->first != kWidevineKeySystem)
    116       key_systems.push_back(it->first);
    117   }
    118   return key_systems;
    119 }
    120 
    121 base::LazyInstance<KeySystemUuidManager>::Leaky g_key_system_uuid_manager =
    122     LAZY_INSTANCE_INITIALIZER;
    123 
    124 // Tries to find a PSSH box whose "SystemId" is |uuid| in |data|, parses the
    125 // "Data" of the box and put it in |pssh_data|. Returns true if such a box is
    126 // found and successfully parsed. Returns false otherwise.
    127 // Notes:
    128 // 1, If multiple PSSH boxes are found,the "Data" of the first matching PSSH box
    129 // will be set in |pssh_data|.
    130 // 2, Only PSSH and TENC boxes are allowed in |data|. TENC boxes are skipped.
    131 static bool GetPsshData(const uint8* data, int data_size,
    132                         const UUID& uuid,
    133                         std::vector<uint8>* pssh_data) {
    134   const uint8* cur = data;
    135   const uint8* data_end = data + data_size;
    136   int bytes_left = data_size;
    137 
    138   while (bytes_left > 0) {
    139     const uint8* box_head = cur;
    140 
    141     if (bytes_left < kBoxHeaderSize)
    142       return false;
    143 
    144     uint64_t box_size = ReadUint32(cur);
    145     uint32 type = ReadUint32(cur + 4);
    146     cur += kBoxHeaderSize;
    147     bytes_left -= kBoxHeaderSize;
    148 
    149     if (box_size == 1) {  // LargeSize is present.
    150       if (bytes_left < kBoxLargeSizeSize)
    151         return false;
    152 
    153       box_size = ReadUint64(cur);
    154       cur += kBoxLargeSizeSize;
    155       bytes_left -= kBoxLargeSizeSize;
    156     } else if (box_size == 0) {
    157       box_size = bytes_left + kBoxHeaderSize;
    158     }
    159 
    160     const uint8* box_end = box_head + box_size;
    161     if (data_end < box_end)
    162       return false;
    163 
    164     if (type == kTencType) {
    165       // Skip 'tenc' box.
    166       cur = box_end;
    167       bytes_left = data_end - cur;
    168       continue;
    169     } else if (type != kPsshType) {
    170       return false;
    171     }
    172 
    173     const int kPsshBoxMinimumSize =
    174         kPsshVersionFlagSize + kPsshSystemIdSize + kPsshDataSizeSize;
    175     if (box_end < cur + kPsshBoxMinimumSize)
    176       return false;
    177 
    178     uint32 version_and_flags = ReadUint32(cur);
    179     cur += kPsshVersionFlagSize;
    180     bytes_left -= kPsshVersionFlagSize;
    181     if (version_and_flags != 0)
    182       return false;
    183 
    184     DCHECK_GE(bytes_left, kPsshSystemIdSize);
    185     if (!std::equal(uuid.begin(), uuid.end(), cur)) {
    186       cur = box_end;
    187       bytes_left = data_end - cur;
    188       continue;
    189     }
    190 
    191     cur += kPsshSystemIdSize;
    192     bytes_left -= kPsshSystemIdSize;
    193 
    194     uint32 data_size = ReadUint32(cur);
    195     cur += kPsshDataSizeSize;
    196     bytes_left -= kPsshDataSizeSize;
    197 
    198     if (box_end < cur + data_size)
    199       return false;
    200 
    201     pssh_data->assign(cur, cur + data_size);
    202     return true;
    203   }
    204 
    205   return false;
    206 }
    207 
    208 static MediaDrmBridge::SecurityLevel GetSecurityLevelFromString(
    209     const std::string& security_level_str) {
    210   if (0 == security_level_str.compare("L1"))
    211     return MediaDrmBridge::SECURITY_LEVEL_1;
    212   if (0 == security_level_str.compare("L3"))
    213     return MediaDrmBridge::SECURITY_LEVEL_3;
    214   DCHECK(security_level_str.empty());
    215   return MediaDrmBridge::SECURITY_LEVEL_NONE;
    216 }
    217 
    218 static std::string GetSecurityLevelString(
    219     MediaDrmBridge::SecurityLevel security_level) {
    220   switch (security_level) {
    221     case MediaDrmBridge::SECURITY_LEVEL_NONE:
    222       return "";
    223     case MediaDrmBridge::SECURITY_LEVEL_1:
    224       return "L1";
    225     case MediaDrmBridge::SECURITY_LEVEL_3:
    226       return "L3";
    227   }
    228   return "";
    229 }
    230 
    231 // Checks whether |key_system| is supported with |container_mime_type|. Only
    232 // checks |key_system| support if |container_mime_type| is empty.
    233 // TODO(xhwang): The |container_mime_type| is not the same as contentType in
    234 // the EME spec. Revisit this once the spec issue with initData type is
    235 // resolved.
    236 static bool IsKeySystemSupportedWithTypeImpl(
    237     const std::string& key_system,
    238     const std::string& container_mime_type) {
    239   if (!MediaDrmBridge::IsAvailable())
    240     return false;
    241 
    242   UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system);
    243   if (scheme_uuid.empty())
    244     return false;
    245 
    246   JNIEnv* env = AttachCurrentThread();
    247   ScopedJavaLocalRef<jbyteArray> j_scheme_uuid =
    248       base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size());
    249   ScopedJavaLocalRef<jstring> j_container_mime_type =
    250       ConvertUTF8ToJavaString(env, container_mime_type);
    251   return Java_MediaDrmBridge_isCryptoSchemeSupported(
    252       env, j_scheme_uuid.obj(), j_container_mime_type.obj());
    253 }
    254 
    255 // static
    256 bool MediaDrmBridge::IsAvailable() {
    257   return base::android::BuildInfo::GetInstance()->sdk_int() >= 19;
    258 }
    259 
    260 // static
    261 bool MediaDrmBridge::IsSecureDecoderRequired(SecurityLevel security_level) {
    262   DCHECK(IsAvailable());
    263   return SECURITY_LEVEL_1 == security_level;
    264 }
    265 
    266 // static
    267 bool MediaDrmBridge::IsSecurityLevelSupported(const std::string& key_system,
    268                                               SecurityLevel security_level) {
    269   if (!IsAvailable())
    270     return false;
    271 
    272   scoped_ptr<MediaDrmBridge> media_drm_bridge =
    273       MediaDrmBridge::CreateSessionless(key_system);
    274   if (!media_drm_bridge)
    275     return false;
    276 
    277   return media_drm_bridge->SetSecurityLevel(security_level);
    278 }
    279 
    280 static void AddKeySystemUuidMapping(JNIEnv* env, jclass clazz,
    281                                     jstring j_key_system,
    282                                     jobject j_buffer) {
    283   std::string key_system = ConvertJavaStringToUTF8(env, j_key_system);
    284   uint8* buffer = static_cast<uint8*>(env->GetDirectBufferAddress(j_buffer));
    285   UUID uuid(buffer, buffer + 16);
    286   g_key_system_uuid_manager.Get().AddMapping(key_system, uuid);
    287 }
    288 
    289 // static
    290 std::vector<std::string> MediaDrmBridge::GetPlatformKeySystemNames() {
    291   return g_key_system_uuid_manager.Get().GetPlatformKeySystemNames();
    292 }
    293 
    294 // static
    295 bool MediaDrmBridge::IsKeySystemSupported(const std::string& key_system) {
    296   DCHECK(!key_system.empty());
    297   return IsKeySystemSupportedWithTypeImpl(key_system, "");
    298 }
    299 
    300 // static
    301 bool MediaDrmBridge::IsKeySystemSupportedWithType(
    302     const std::string& key_system,
    303     const std::string& container_mime_type) {
    304   DCHECK(!key_system.empty() && !container_mime_type.empty());
    305   return IsKeySystemSupportedWithTypeImpl(key_system, container_mime_type);
    306 }
    307 
    308 bool MediaDrmBridge::RegisterMediaDrmBridge(JNIEnv* env) {
    309   return RegisterNativesImpl(env);
    310 }
    311 
    312 MediaDrmBridge::MediaDrmBridge(const std::vector<uint8>& scheme_uuid,
    313                                const SessionCreatedCB& session_created_cb,
    314                                const SessionMessageCB& session_message_cb,
    315                                const SessionReadyCB& session_ready_cb,
    316                                const SessionClosedCB& session_closed_cb,
    317                                const SessionErrorCB& session_error_cb)
    318     : scheme_uuid_(scheme_uuid),
    319       session_created_cb_(session_created_cb),
    320       session_message_cb_(session_message_cb),
    321       session_ready_cb_(session_ready_cb),
    322       session_closed_cb_(session_closed_cb),
    323       session_error_cb_(session_error_cb) {
    324   JNIEnv* env = AttachCurrentThread();
    325   CHECK(env);
    326 
    327   ScopedJavaLocalRef<jbyteArray> j_scheme_uuid =
    328       base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size());
    329   j_media_drm_.Reset(Java_MediaDrmBridge_create(
    330       env, j_scheme_uuid.obj(), reinterpret_cast<intptr_t>(this)));
    331 }
    332 
    333 MediaDrmBridge::~MediaDrmBridge() {
    334   JNIEnv* env = AttachCurrentThread();
    335   player_tracker_.NotifyCdmUnset();
    336   if (!j_media_drm_.is_null())
    337     Java_MediaDrmBridge_release(env, j_media_drm_.obj());
    338 }
    339 
    340 // static
    341 scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create(
    342     const std::string& key_system,
    343     const SessionCreatedCB& session_created_cb,
    344     const SessionMessageCB& session_message_cb,
    345     const SessionReadyCB& session_ready_cb,
    346     const SessionClosedCB& session_closed_cb,
    347     const SessionErrorCB& session_error_cb) {
    348   scoped_ptr<MediaDrmBridge> media_drm_bridge;
    349   if (!IsAvailable())
    350     return media_drm_bridge.Pass();
    351 
    352   UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system);
    353   if (scheme_uuid.empty())
    354     return media_drm_bridge.Pass();
    355 
    356   media_drm_bridge.reset(new MediaDrmBridge(scheme_uuid,
    357                                             session_created_cb,
    358                                             session_message_cb,
    359                                             session_ready_cb,
    360                                             session_closed_cb,
    361                                             session_error_cb));
    362 
    363   if (media_drm_bridge->j_media_drm_.is_null())
    364     media_drm_bridge.reset();
    365 
    366   return media_drm_bridge.Pass();
    367 }
    368 
    369 // static
    370 scoped_ptr<MediaDrmBridge> MediaDrmBridge::CreateSessionless(
    371     const std::string& key_system) {
    372   return MediaDrmBridge::Create(key_system,
    373                                 SessionCreatedCB(),
    374                                 SessionMessageCB(),
    375                                 SessionReadyCB(),
    376                                 SessionClosedCB(),
    377                                 SessionErrorCB());
    378 }
    379 
    380 bool MediaDrmBridge::SetSecurityLevel(SecurityLevel security_level) {
    381   JNIEnv* env = AttachCurrentThread();
    382 
    383   std::string security_level_str = GetSecurityLevelString(security_level);
    384   if (security_level_str.empty())
    385     return false;
    386 
    387   ScopedJavaLocalRef<jstring> j_security_level =
    388       ConvertUTF8ToJavaString(env, security_level_str);
    389   return Java_MediaDrmBridge_setSecurityLevel(
    390       env, j_media_drm_.obj(), j_security_level.obj());
    391 }
    392 
    393 bool MediaDrmBridge::CreateSession(uint32 session_id,
    394                                    const std::string& content_type,
    395                                    const uint8* init_data,
    396                                    int init_data_length) {
    397   DVLOG(1) << __FUNCTION__;
    398 
    399   DCHECK(!session_created_cb_.is_null())
    400       << "CreateSession called on a sessionless MediaDrmBridge object.";
    401 
    402   JNIEnv* env = AttachCurrentThread();
    403   ScopedJavaLocalRef<jbyteArray> j_init_data;
    404   // Caller should always use "video/*" content types.
    405   DCHECK_EQ(0u, content_type.find("video/"));
    406 
    407   // Widevine MediaDrm plugin only accepts the "data" part of the PSSH box as
    408   // the init data when using MP4 container.
    409   if (std::equal(scheme_uuid_.begin(), scheme_uuid_.end(), kWidevineUuid) &&
    410       content_type == "video/mp4") {
    411     std::vector<uint8> pssh_data;
    412     if (!GetPsshData(init_data, init_data_length, scheme_uuid_, &pssh_data))
    413       return false;
    414     j_init_data =
    415         base::android::ToJavaByteArray(env, &pssh_data[0], pssh_data.size());
    416   } else {
    417     j_init_data =
    418         base::android::ToJavaByteArray(env, init_data, init_data_length);
    419   }
    420 
    421   ScopedJavaLocalRef<jstring> j_mime =
    422       ConvertUTF8ToJavaString(env, content_type);
    423   Java_MediaDrmBridge_createSession(
    424       env, j_media_drm_.obj(), session_id, j_init_data.obj(), j_mime.obj());
    425   return true;
    426 }
    427 
    428 void MediaDrmBridge::LoadSession(uint32 session_id,
    429                                  const std::string& web_session_id) {
    430   // MediaDrmBridge doesn't support loading sessions.
    431   NOTREACHED();
    432 }
    433 
    434 void MediaDrmBridge::UpdateSession(uint32 session_id,
    435                                    const uint8* response,
    436                                    int response_length) {
    437   DVLOG(1) << __FUNCTION__;
    438 
    439   DCHECK(!session_ready_cb_.is_null())
    440       << __FUNCTION__ << " called on a sessionless MediaDrmBridge object.";
    441 
    442   JNIEnv* env = AttachCurrentThread();
    443   ScopedJavaLocalRef<jbyteArray> j_response =
    444       base::android::ToJavaByteArray(env, response, response_length);
    445   Java_MediaDrmBridge_updateSession(
    446       env, j_media_drm_.obj(), session_id, j_response.obj());
    447 }
    448 
    449 void MediaDrmBridge::ReleaseSession(uint32 session_id) {
    450   DVLOG(1) << __FUNCTION__;
    451 
    452   DCHECK(!session_closed_cb_.is_null())
    453       << __FUNCTION__ << " called on a sessionless MediaDrmBridge object.";
    454 
    455   JNIEnv* env = AttachCurrentThread();
    456   Java_MediaDrmBridge_releaseSession(env, j_media_drm_.obj(), session_id);
    457 }
    458 
    459 int MediaDrmBridge::RegisterPlayer(const base::Closure& new_key_cb,
    460                                    const base::Closure& cdm_unset_cb) {
    461   return player_tracker_.RegisterPlayer(new_key_cb, cdm_unset_cb);
    462 }
    463 
    464 void MediaDrmBridge::UnregisterPlayer(int registration_id) {
    465   player_tracker_.UnregisterPlayer(registration_id);
    466 }
    467 
    468 void MediaDrmBridge::SetMediaCryptoReadyCB(const base::Closure& closure) {
    469   if (closure.is_null()) {
    470     media_crypto_ready_cb_.Reset();
    471     return;
    472   }
    473 
    474   DCHECK(media_crypto_ready_cb_.is_null());
    475 
    476   if (!GetMediaCrypto().is_null()) {
    477     base::MessageLoopProxy::current()->PostTask(FROM_HERE, closure);
    478     return;
    479   }
    480 
    481   media_crypto_ready_cb_ = closure;
    482 }
    483 
    484 void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject) {
    485   DCHECK(!GetMediaCrypto().is_null());
    486   if (!media_crypto_ready_cb_.is_null())
    487     base::ResetAndReturn(&media_crypto_ready_cb_).Run();
    488 }
    489 
    490 void MediaDrmBridge::OnSessionCreated(JNIEnv* env,
    491                                       jobject j_media_drm,
    492                                       jint j_session_id,
    493                                       jstring j_web_session_id) {
    494   uint32 session_id = j_session_id;
    495   std::string web_session_id = ConvertJavaStringToUTF8(env, j_web_session_id);
    496   session_created_cb_.Run(session_id, web_session_id);
    497 }
    498 
    499 void MediaDrmBridge::OnSessionMessage(JNIEnv* env,
    500                                       jobject j_media_drm,
    501                                       jint j_session_id,
    502                                       jbyteArray j_message,
    503                                       jstring j_destination_url) {
    504   uint32 session_id = j_session_id;
    505   std::vector<uint8> message;
    506   JavaByteArrayToByteVector(env, j_message, &message);
    507   GURL destination_gurl = GURL(ConvertJavaStringToUTF8(env, j_destination_url));
    508   if (!destination_gurl.is_valid() && !destination_gurl.is_empty()) {
    509     DLOG(WARNING) << "SessionMessage destination_url is invalid : "
    510                   << destination_gurl.possibly_invalid_spec();
    511     destination_gurl = GURL::EmptyGURL();  // Replace invalid destination_url.
    512   }
    513   session_message_cb_.Run(session_id, message, destination_gurl);
    514 }
    515 
    516 void MediaDrmBridge::OnSessionReady(JNIEnv* env,
    517                                     jobject j_media_drm,
    518                                     jint j_session_id) {
    519   uint32 session_id = j_session_id;
    520   session_ready_cb_.Run(session_id);
    521   // TODO(xhwang/jrummell): Move this when usableKeyIds/keyschange are
    522   // implemented.
    523   player_tracker_.NotifyNewKey();
    524 }
    525 
    526 void MediaDrmBridge::OnSessionClosed(JNIEnv* env,
    527                                      jobject j_media_drm,
    528                                      jint j_session_id) {
    529   uint32 session_id = j_session_id;
    530   session_closed_cb_.Run(session_id);
    531 }
    532 
    533 void MediaDrmBridge::OnSessionError(JNIEnv* env,
    534                                     jobject j_media_drm,
    535                                     jint j_session_id) {
    536   uint32 session_id = j_session_id;
    537   session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0);
    538 }
    539 
    540 ScopedJavaLocalRef<jobject> MediaDrmBridge::GetMediaCrypto() {
    541   JNIEnv* env = AttachCurrentThread();
    542   return Java_MediaDrmBridge_getMediaCrypto(env, j_media_drm_.obj());
    543 }
    544 
    545 MediaDrmBridge::SecurityLevel MediaDrmBridge::GetSecurityLevel() {
    546   JNIEnv* env = AttachCurrentThread();
    547   ScopedJavaLocalRef<jstring> j_security_level =
    548       Java_MediaDrmBridge_getSecurityLevel(env, j_media_drm_.obj());
    549   std::string security_level_str =
    550       ConvertJavaStringToUTF8(env, j_security_level.obj());
    551   return GetSecurityLevelFromString(security_level_str);
    552 }
    553 
    554 bool MediaDrmBridge::IsProtectedSurfaceRequired() {
    555   return IsSecureDecoderRequired(GetSecurityLevel());
    556 }
    557 
    558 void MediaDrmBridge::ResetDeviceCredentials(
    559     const ResetCredentialsCB& callback) {
    560   DCHECK(reset_credentials_cb_.is_null());
    561   reset_credentials_cb_ = callback;
    562   JNIEnv* env = AttachCurrentThread();
    563   Java_MediaDrmBridge_resetDeviceCredentials(env, j_media_drm_.obj());
    564 }
    565 
    566 void MediaDrmBridge::OnResetDeviceCredentialsCompleted(
    567     JNIEnv* env, jobject, bool success) {
    568   base::ResetAndReturn(&reset_credentials_cb_).Run(success);
    569 }
    570 
    571 }  // namespace media
    572