From f4eda80723bcfa9c6955f7c44170a98e4b5be173 Mon Sep 17 00:00:00 2001
From: Chris Needham This specification extends [[HTML]] providing APIs to control playback of encrypted content. This specification extends {{HTMLMediaElement}} [[HTML]] providing APIs to control playback of encrypted content. The API supports use cases ranging from simple clear key decryption to high value video (given an appropriate user agent implementation).
License/key exchange is controlled by the application, facilitating the development of robust playback applications supporting a range of content decryption and protection technologies. This specification does not define a content protection or Digital Rights Management system. Rather, it defines a common API that may be used to discover, select and interact with
such systems as well as with simpler content encryption systems. Implementation of Digital Rights Management is not required for compliance with this specification: only the
- Clear Key system is required to be implemented as a common baseline.
The common API supports a simple set of content encryption capabilities, leaving application functions such as authentication and authorization to page authors. This is achieved by requiring content protection system-specific messaging to be mediated by the page rather than assuming out-of-band communication between the encryption system and a license or other server.
@@ -177,7 +82,7 @@This specification enables script to select content protection mechanisms, control license/key exchange, and @@ -187,12 +92,12 @@
Supported content is encrypted per container-specific "common encryption" specifications, enabling use across key systems. - Supported content has an unencrypted container, enabling metadata to be provided to the application and maintaining compatibility with other features. + Supported content has an unencrypted container, enabling metadata to be provided to the application and maintaining compatibility with other {{HTMLMediaElement}} features.
Implementers should pay attention to the mitigations for the security and privacy threats and concerns described in this specification. - In particular, the specification requirements for security and privacy cannot be met without knowledge of the security and privacy properties of the and its implementation(s). - contains security and privacy provisions related to the integration and use of underlying implementations. + In particular, the specification requirements for security and privacy cannot be met without knowledge of the security and privacy properties of the [=Key System=] and its implementation(s). + contains security and privacy provisions related to the integration and use of underlying [=Key System=] implementations. focuses on external threats, such as input data or network attacks. focuses on the handling of user-specific information and providing users with adequate control over their own privacy.
@@ -203,33 +108,33 @@Content Decryption Module (CDM) is the client component that provides the functionality, including decryption, for one or more .
+Content Decryption Module (CDM) is the client component that provides the functionality, including decryption, for one or more [=Key Systems=].
Implementations may or may not separate the implementations of CDMs or treat them as separate from the user agent. This is transparent to the API and application.
A Key System is a generic term for a decryption mechanism and/or content protection provider. Key System strings provide unique identification of a Key System. - They are used by the user agent to select a and identify the source of a key-related event. - User agents MUST support the Common Key Systems. - User agents MAY also provide additional CDMs with corresponding Key System strings. + They are used by the user agent to select a [=CDM=] and identify the source of a key-related event. + User agents MUST support the [=Common Key Systems=]. + User agents MAY also provide additional [=CDMs=] with corresponding Key System strings.
A Key System string is always a reverse domain name. - Key System strings are compared using case-sensitive matching. It is RECOMMENDED that CDMs use simple lower-case ASCII key system strings.
+ Key System strings are compared using case-sensitive matching. It is RECOMMENDED that [=CDMs=] use simple lower-case ASCII key system strings.For example, "com.example.somesystem".
@@ -239,41 +144,41 @@
A Key Session, or simply Session, provides a context for message exchange with the as a result of which key(s) are made available to the CDM. - Sessions are embodied as MediaKeySession objects. - Each Key session is associated with a single instance of provided in the call. +
A Key Session, or simply Session, provides a context for message exchange with the [=CDM=] as a result of which key(s) are made available to the [=CDM=]. + Sessions are embodied as {{MediaKeySession}} objects. + Each Key session is associated with a single instance of [=Initialization Data=] provided in the {{MediaKeySession/generateRequest()}} call.
-Each Key Session is associated with a single MediaKeys object, and only media element(s) associated with that MediaKeys object may access key(s) associated with the session. - Other MediaKeys objects, CDM instances, and media elements MUST NOT access the key session or use its key(s). - Key sessions and the keys they contain are no longer once the session has been closed, including when the MediaKeySession object is destroyed. +
Each Key Session is associated with a single {{MediaKeys}} object, and only media element(s) associated with that {{MediaKeys}} object may access key(s) associated with the session. + Other {{MediaKeys}} objects, [=CDM=] instances, and media elements MUST NOT access the key session or use its key(s). + Key sessions and the keys they contain are no longer [=usable for decryption=] once the session has been closed, including when the {{MediaKeySession}} object is destroyed.
All license(s) and key(s) associated with a Key Session which have not been explicitly stored MUST be destroyed when the Key Session is closed.
-Key IDs MUST be unique within a session.
+[=Key IDs=] MUST be unique within a session.
A Session ID is a unique string identifier generated by the that can be used by the application to identify MediaKeySession objects.
+A Session ID is a unique string identifier generated by the [=CDM=] that can be used by the application to identify {{MediaKeySession}} objects.
-A new Session ID is generated each time the user agent and CDM successfully create a new session.
+A new Session ID is generated each time the user agent and [=CDM=] successfully create a new session.
Each Session ID SHALL be unique within the browsing context in which it was created.
- For session types for which the algorithm returns true
, Session IDs MUST be unique within the over time, including across browsing sessions.
+ For session types for which the [=Is persistent session type?=] algorithm returns true
, Session IDs MUST be unique within the [=origin=] over time, including across browsing sessions.
The underlying content protection protocol does not necessarily need to support Session IDs.
Unless otherwise stated, key refers to a decryption key that can be used to decrypt blocks within . - Each such key is uniquely identified by a . - A key is associated with the session used to provide it to the . (The same key may be present in multiple sessions.) - Such keys MUST only be provided to the CDM via an call. (They may later be loaded by as part of the stored session data.) +
Unless otherwise stated, key refers to a decryption key that can be used to decrypt blocks within [=HTMLMediaElement/media data=]. + Each such key is uniquely identified by a [=key ID=]. + A key is associated with the [=key session|session=] used to provide it to the [=CDM=]. (The same key may be present in multiple sessions.) + Such keys MUST only be provided to the [=CDM=] via an {{MediaKeySession/update()}} call. (They may later be loaded by {{MediaKeySession/load()}} as part of the stored session data.)
Authors SHOULD encrypt each set of stream(s) that requires enforcement of a meaningfully different policy with a distinct key (and key ID). @@ -283,79 +188,79 @@
A key is considered usable for decryption if the CDM is certain the key is currently usable to decrypt one or more blocks of .
+A key is considered usable for decryption if the [=CDM=] is certain the key is currently usable to decrypt one or more blocks of [=HTMLMediaElement/media data=].
For example, a key is not usable for decryption if its license has expired. Even if its license has not expired, a key is not usable for decryption if other conditions (e.g., output protection) for its use are not currently satisfied.
A key is associated with a key ID that is a sequence of octets and which uniquely identifies the key. - The container specifies the ID of the key that can decrypt a block or set of blocks within the . - MAY contain key ID(s) to identify the keys that are needed to decrypt the media data. - However, there is no requirement that Initialization Data contain any or all key IDs used in the or . - Licenses provided to the associate each key with a key ID so the CDM can select the appropriate key when decrypting an encrypted block of media data. +
A [=key=] is associated with a key ID that is a sequence of octets and which uniquely identifies the key. + The container specifies the ID of the key that can decrypt a block or set of blocks within the [=HTMLMediaElement/media data=]. + [=Initialization Data=] MAY contain key ID(s) to identify the keys that are needed to decrypt the media data. + However, there is no requirement that Initialization Data contain any or all key IDs used in the [=HTMLMediaElement/media data=] or media resource. + [=Licenses=] provided to the [=CDM=] associate each key with a key ID so the [=CDM=] can select the appropriate key when decrypting an encrypted block of media data.
A key is considered to be known to a session if the 's implementation of the session contains any information - specifically the - about it, regardless of whether the actual key is usable or its value is known. - Known keys are exposed via the attribute. +
A key is considered to be known to a session if the [=CDM=]'s implementation of the session contains any information - specifically the [=key ID=] - about it, regardless of whether the actual [=key=] is usable or its value is known. + Known keys are exposed via the {{MediaKeySession/keyStatuses}} attribute.
-Keys are considered known even after they become unusable, such as due to expiration or if they are removed but a is available. +
Keys are considered known even after they become unusable, such as due to [=expiration=] or if they are removed but a [=record of license destruction=] is available. Keys only become unknown when they are explicitly removed from a session and any license release message is acknowledged.
-For example, a key could become unknown if an call provides a new license that does not include the key and includes instructions to replace the license(s) that previously contained the key.
+For example, a key could become unknown if an {{MediaKeySession/update()}} call provides a new license that does not include the key and includes instructions to replace the license(s) that previously contained the key.
A license is key system-specific state information that includes one or more key(s) - each associated with a - and potentially other information about key usage.
+A license is key system-specific state information that includes one or more [=key(s)=] - each associated with a [=key ID=] - and potentially other information about key usage.
- usually require a block of initialization data containing information about the stream to be decrypted before they can construct a license request message. + [=Key Systems=] usually require a block of initialization data containing information about the stream to be decrypted before they can construct a license request message. This block could be a simple key or content ID or a more complex structure containing such information. - It SHOULD always allow unique identification of the key(s) needed to decrypt the content. - This initialization information MAY be obtained in some application-specific way or provided with the . + It SHOULD always allow unique identification of the [=key(s)=] needed to decrypt the content. + This initialization information MAY be obtained in some application-specific way or provided with the [=HTMLMediaElement/media data=].
- Initialization Data is a generic term for container-specific data that is used by a to generate a license request. + Initialization Data is a generic term for container-specific data that is used by a [=CDM=] to generate a license request.
The format of the initialization data depends upon the type of container, and containers MAY support more than one format - of initialization data. The Initialization Data Type is a string that indicates the + of initialization data. The Initialization Data Type is a string that indicates the format of the accompanying Initialization Data. Initialization Data Type strings are always matched case-sensitively. It is RECOMMENDED that Initialization Data Type strings are lower-case ASCII strings.
The [[[EME-INITDATA-REGISTRY]]] [[EME-INITDATA-REGISTRY]] - provides the mapping from string to the specification for each format. + provides the mapping from [=Initialization Data Type=] string to the specification for each format.
- When the user agent encounters Initialization Data in the , it provides that Initialization Data to the application in the attribute of the event. + When the user agent encounters Initialization Data in the [=HTMLMediaElement/media data=], it provides that Initialization Data to the application in the {{MediaEncryptedEvent/initData}} attribute of the {{encrypted}} event. The user agent MUST NOT store the Initialization Data or use its content at the time it is encountered. - The application provides Initialization Data to the CDM via . - The user agent MUST NOT provide Initialization Data to the CDM by other means. + The application provides [=Initialization Data=] to the [=CDM=] via {{MediaKeySession/generateRequest()}}. + The user agent MUST NOT provide [=Initialization Data=] to the [=CDM=] by other means.
-Initialization Data MUST be a fixed value for a given set of stream(s) or . - It MUST only contain information related to the keys required to play a given set of stream(s) or . +
Initialization Data MUST be a fixed value for a given set of stream(s) or [=HTMLMediaElement/media data=]. + It MUST only contain information related to the keys required to play a given set of stream(s) or [=HTMLMediaElement/media data=]. It MUST NOT contain application data, client-specific data, user-specific data, or executable code.
Initialization Data SHOULD NOT contain Key System-specific data or values. - Implementations MUST support the common formats defined in [[EME-INITDATA-REGISTRY]] for each they support. + Implementations MUST support the common formats defined in [[EME-INITDATA-REGISTRY]] for each [=Initialization Data Type=] they support.
Use of proprietary formats/contents is discouraged, and supporting or using only proprietary formats is strongly discouraged. @@ -363,32 +268,32 @@
- Two or more identifiers or other values are said to be associable if they are identical or it is possible - with a reasonable amount of time and effort - to correlate or associate them. - Otherwise, the values are non-associable. + Two or more identifiers or other values are said to be associable if they are identical or it is possible - with a reasonable amount of time and effort - to correlate or associate them. + Otherwise, the values are non-associable.
For example, values created in the following ways are :
+For example, values created in the following ways are [=associable=]:
Using a trivially-reversible hash function.
Sharing a prefix or other subset
Replacing random value N with N+10
XORing the origin with a fixed value (because it is trivially reversible)
In contrast, two values that are completely unrelated or cryptographically distinct, such as via a cryptographically strong non-reversible hash function, are .
+In contrast, two values that are completely unrelated or cryptographically distinct, such as via a cryptographically strong non-reversible hash function, are [=non-associable=]
Two or more identifiers or other values are said to be associable by an entity if it is possible - with a reasonable amount of time and effort - for the referenced entity or set of entities to correlate or associate them without participation of additional entity(ies). - Otherwise, the values are non-associable by an entity. +
Two or more identifiers or other values are said to be associable by an entity if it is possible - with a reasonable amount of time and effort - for the referenced entity or set of entities to correlate or associate them without participation of additional entity(ies). + Otherwise, the values are non-associable by an entity.
-Two or more identifiers or other values are said to be non-associable by the application if they are non-associable by an entity - where the entity is set that includes the application, all other applications, and other entities such as servers that they use or with which they communicate. - Otherwise, the values would be considered associable by the application, which is forbidden. +
Two or more identifiers or other values are said to be non-associable by the application if they are [=non-associable by an entity=] + where the entity is the set that includes the application, all other applications, and other entities such as servers that they use or with which they communicate. + Otherwise, the values would be considered associable by the application, which is forbidden.
A Distinctive Value is a value, piece of data, implication of the possession of a piece of data, or an observable behavior or timing that is not shared across a large population of users or client devices. @@ -397,11 +302,11 @@
Examples of Distinctive Values include but are not limited to:
[=Distinctive Identifiers=]
[=Distinctive Permanent Identifiers=]
Other identifiers
[=Session IDs=]
[=Licenses=]
Other session data
- A Permanent Identifier is a value, piece of data, implication of the possession of a piece of data, or an observable behavior or timing that is indelible in some way or otherwise non-trivial for the user to remove, reset, or change. - This, includes but is not limited to: + A Permanent Identifier is a value, piece of data, implication of the possession of a piece of data, or an observable behavior or timing that is indelible in some way or otherwise non-trivial for the user to remove, reset, or change. + This includes but is not limited to:
A hardware or hardware-based identifier
A value provisioned in the hardware device in the factory
A value associated with or derived from the operating system installation instance
A value associated with or derived from the user agent installation instance
A value associated with or derived from the or other software component
A value associated with or derived from the [=CDM=] or other software component
A value in a configuration file or similar semi-permanent data, even if generated on the client
Client or other user account values
- A Distinctive Permanent Identifier is a Permanent Identifier that is distinctive. + A Distinctive Permanent Identifier is a [=Permanent Identifier=] that is [=distinctive=].
When exposed outside the client, Distinctive Permanent Identifiers and values derived from or otherwise related to them MUST be encrypted. @@ -437,26 +342,26 @@
- A Distinctive Permanent Identifier is not a because it is not derived or generated (within the scope of this specification). + A Distinctive Permanent Identifier is not a [=Distinctive Identifier=] because it is not derived or generated (within the scope of this specification).
- controls whether Distinctive Permanent Identifiers may be used. - Specifically, Distinctive Permanent Identifiers may only be used when the value of the member of the MediaKeySystemAccess used to create the MediaKeys object is . + {{MediaKeySystemConfiguration/distinctiveIdentifier}} controls whether Distinctive Permanent Identifiers may be used. + Specifically, Distinctive Permanent Identifiers may only be used when the value of the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of the {{MediaKeySystemAccess}} used to create the {{MediaKeys}} object is {{MediaKeysRequirement/"required"}}.
A Distinctive Identifier is a value, including in opaque or encrypted form, for which it is possible for any entity external to the client to correlate or associate values beyond what a user may expect on the web platform (e.g., cookies and other site data). - For example, values that are associable by an entity other than the application across - a) origins, - b) browsing profiles, + For example, values that are [=associable by an entity|associable by an entity other than the application=] across + a) [=origins=], + b) [=browsing profiles=], or c) browsing sessions even after the user has attempted to protect his or her privacy by clearing browsing data or values for which it is not easy for a user to break such association. - In particular, a value is a Distinctive Identifier if it is possible for a central server, such as an individualization server, to associate values across origins, such as because the individualization requests contained a common value, or because values provided in individualization requests are associable by such server even after attempts to clear browsing data. - Possible causes of this include use of in the individualization process. + In particular, a value is a Distinctive Identifier if it is possible for a [=associable by an entity|central server, such as an individualization server, to associate=] values across origins, such as because the [=individualization=] requests contained a common value, or because values provided in individualization requests are [=associable by an entity|associable by such a server=] even after attempts to clear browsing data. + Possible causes of this include use of [=Distinctive Permanent Identifier(s)=] in the individualization process.
Distinctive Identifiers exposed to the application, even in encrypted form, MUST adhere to the identifier requirements, @@ -464,30 +369,30 @@
While the instantiation or use of a Distinctive Identifier is triggered by the application's use of the APIs defined in this specification, the identifier need not be provided to the application to trigger conditions related to Distinctive Identifiers. - (The MUST NOT ever be provided to the application, even in opaque or encrypted form.) + (The [=Distinctive Permanent Identifier(s)=] MUST NOT ever be provided to the application, even in opaque or encrypted form.)
- controls whether Distinctive Identifiers may be used. - Specifically, Distinctive Identifiers may only be used when the value of the member of the MediaKeySystemAccess used to create the MediaKeys object is . + {{MediaKeySystemConfiguration/distinctiveIdentifier}} controls whether Distinctive Identifiers may be used. + Specifically, Distinctive Identifiers may only be used when the value of the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of the {{MediaKeySystemAccess}} used to create the {{MediaKeys}} object is {{MediaKeysRequirement/"required"}}.
A Distinctive Identifier is a value, piece of data, implication of the possession of a piece of data, or an observable behavior or timing for which all of the following criteria hold:
It is distinctive.
+It is [=distinctive=].
While a Distinctive Identifier is typically unique to a user or client device, an identifier does not need to be strictly unique to be distinctive. For example, an identifier shared among a small number of users could still be distinctive.
It, information about it, or values derived from or otherwise related to it are exposed, even in encrypted form, outside the client. - This includes but is not limited to providing it to the application and/or license, individualization, or other server. + This includes but is not limited to providing it to the application and/or license, [=individualization=], or other server.
It has one or more the following properties:
The generation, individualization, provisioning or other process that produced the value involved, used, provided, derived from, or similarly involved one or more or another Distinctive Identifier.
It is derived from one or more [=Distinctive Permanent Identifier(s)=].
The generation, [=individualization=], provisioning or other process that produced the value involved, used, provided, derived from, or similarly involved one or more [=Distinctive Permanent Identifier(s)=] or another Distinctive Identifier.
It is clearable but not along with cookies and other site data.
For example, via some mechanism external to the user agent, such as an OS-level mechanism.
@@ -496,57 +401,57 @@Other properties of concern that are normatively prohibited for values exposed to the application include:
It is a [=Distinctive Permanent Identifier=].
It is not clearable.
Value(s) created after clearing identifier(s) may be associable by the application with previous value(s).
Value(s) created after clearing identifier(s) may be [=associable by the application=] with previous value(s).
Values may not be unique per origin and profile.
Values for different origins may be associable by the application.
Values for different origins may be [=associable by the application=].
Examples of such normatively prohibited values include but is not limited to:
A single hardware-based value used for all origins.
A single random based value used for all origins.
A single value obtained from an individualization process that is used for all origins.
A single value obtained from an [=individualization=] process that is used for all origins.
Values that include all or part of any of the above values.
A single value that is used for multiple but not all origins.
A single value that is used for all origins on a domain. (Identifiers must be per-.)
A single value that is used for all origins on a domain. (Identifiers must be per-[=origin=].)
A pre-provisioned origin-specific value.
Values generated by trivially-reversible means, which are thus associable by the application, regardless of whether generated on the client or involving an a individualization process. For example, XORing or otherwise integrating (part of) the origin with a fixed value.
Values generated by trivially-reversible means, which are thus [=associable by the application=], regardless of whether generated on the client or involving an [=individualization=] process. For example, XORing or otherwise integrating (part of) the origin with a fixed value.
- While Distinctive Identifier are usually associable by the entity that generated them they MUST be . - In other words, such correlation or association is only possible by the entity, such as an individualization server, that originally generated the Distinctive Identifier values. - Entities with access to the MUST NOT expose this capability to applications, as this would make resulting Distinctive Identifiers associable by the application, and SHOULD take care to avoid exposing such correlation to other entities or third parties. + While Distinctive Identifier are usually [=associable by an entity|associable by the entity that generated them=] they MUST be [=non-associable by applications=]. + In other words, such correlation or association is only possible by the entity, such as an [=individualization=] server, that originally generated the Distinctive Identifier values. + Entities with access to the [=Distinctive Permanent Identifier(s)=] MUST NOT expose this capability to applications, as this would make resulting Distinctive Identifiers [=associable by the application=], and SHOULD take care to avoid exposing such correlation to other entities or third parties.
Examples of Distinctive Identifiers include but are not limited to:
A series of bytes that is included in key requests, different from the series of bytes included by other client devices, and based on or was acquired directly or indirectly using a .
A public key included in key requests that is different from the public keys included in the requests by other client devices and is based on or was acquired directly or indirectly using a .
Demonstration of possession of a private key (e.g., by signing some data) that other client devices do not have and is based on or was acquired directly or indirectly using a .
A series of bytes that is included in key requests, different from the series of bytes included by other client devices, and based on or was acquired directly or indirectly using a [=Distinctive Permanent Identifier=].
A public key included in key requests that is different from the public keys included in the requests by other client devices and is based on or was acquired directly or indirectly using a [=Distinctive Permanent Identifier=].
Demonstration of possession of a private key (e.g., by signing some data) that other client devices do not have and is based on or was acquired directly or indirectly using a [=Distinctive Permanent Identifier=].
An identifier for such a key.
Such a value used to derive another value that is exposed even though the first value is not directly exposed.
A value derived from another Distinctive Identifier.
A random value that was reported to a (e.g., individualization) server along with a or provided by such a server after providing a .
A random value that was reported to a (e.g., [=individualization=]) server along with a [=Distinctive Permanent Identifier=] or provided by such a server after providing a [=Distinctive Permanent Identifier=].
A value derived from a unique value provisioned in the hardware device in the factory.
A value derived from a unique hardware value (e.g., MAC address or serial number) or software value (e.g., operating system installation instance or operating system user account name) in the hardware device in the factory.
A value derived from a unique value embedded in the CDM binary or other file used by the CDM.
A value derived from a unique value embedded in the [=CDM=] binary or other file used by the [=CDM=].
Examples of things that are not Distinctive Identifiers:
A public key shared among all copies of a given CDM version if the installed base is large.
A public key shared among all copies of a given [=CDM=] version if the installed base is large.
A nonce or ephemeral key that is unique but used in only one session.
A value that is not exposed, even in derived or similar ways, outside the client, including via individualization or similar.
Device-unique keys used in attestations between, for example, the video pipeline and the CDM when the CDM does not let these attestations further flow to the application and instead makes a new attestation on its own using a key that does not constitute a Distinctive Identifier.
A value that is not exposed, even in derived or similar ways, outside the client, including via [=individualization=] or similar.
Device-unique keys used in attestations between, for example, the video pipeline and the [=CDM=] when the [=CDM=] does not let these attestations further flow to the application and instead makes a new attestation on its own using a key that does not constitute a Distinctive Identifier.
A value that is fully cleared/clearable along with browsing data, such as cookies, after which it will be replaced by a value that is (not just ), even by a central server such as an individualization server, AND one or more of the following:
+A value that is fully cleared/clearable along with browsing data, such as cookies, after which it will be replaced by a value that is [=non-associable=]] (not just [=non-associable by applications=]), even by a central server such as an [=individualization=] server, AND one or more of the following:
No or Distinctive Identifier was involved in the generation of the value.
No [=Distinctive Permanent Identifier=] or Distinctive Identifier was involved in the generation of the value.
It is a random value generated without inputs from the system.
It is a value provided by a server without the use of or knowledge of another Distinctive Identifier.
- An implementation, configuration, instance, or object uses Distinctive Identifier(s) if, at any time during its lifetime or the lifetime of related such entities, - it exposes, even in encrypted form, one or more , information about them, or values derived from or otherwise related to them outside the client. - This includes but is not limited to providing such a value to the application and/or license, individualization, or other server. + An implementation, configuration, instance, or object uses Distinctive Identifier(s) if, at any time during its lifetime or the lifetime of related such entities, + it exposes, even in encrypted form, one or more [=Distinctive Identifier(s)=], information about them, or values derived from or otherwise related to them outside the client. + This includes but is not limited to providing such a value to the application and/or license, [=individualization=], or other server.
- An implementation, configuration, instance, or object uses Distinctive Permanent Identifier(s) if, at any time during its lifetime or the lifetime of related such entities, - it exposes, even in encrypted form, one or more , information about them, or values derived from or otherwise related to them outside the client. - This includes but is not limited to providing such a value to an individualization server. + An implementation, configuration, instance, or object uses Distinctive Permanent Identifier(s) if, at any time during its lifetime or the lifetime of related such entities, + it exposes, even in encrypted form, one or more [=Distinctive Permanent Identifier(s)=], information about them, or values derived from or otherwise related to them outside the client. + This includes but is not limited to providing such a value to an [=individualization=] server. Such values MUST NOT be provided to the application.
- An implementation, configuration, instance, or object uses Distinctive Identifier(s) or Distinctive Permanent Identifier(s) if it - uses Distinctive Identifier(s) and/or uses Distinctive Permanent Identifier(s). + An implementation, configuration, instance, or object uses Distinctive Identifier(s) or Distinctive Permanent Identifier(s) if it + [=uses Distinctive Identifier(s)=] and/or [=uses Distinctive Permanent Identifier(s)=].
- controls whether and may be used. - Specifically, such identifiers may only be used when the value of the member of the MediaKeySystemAccess used to create the MediaKeys object is . + {{MediaKeySystemConfiguration/distinctiveIdentifier}} controls whether [=Distinctive Identifiers=] and [=Distinctive Permanent Identifiers=] may be used. + Specifically, such identifiers may only be used when the value of the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of the {{MediaKeySystemAccess}} used to create the {{MediaKeys}} object is {{MediaKeysRequirement/"required"}}.
During playback, embedded media data is exposed to script in the embedding . - In order for the API to provide in the event, MUST be with the embedding page. - If is cross-origin with the embedding document, authors SHOULD use the attribute - on the and CORS headers on the response to make it . +
During playback, embedded media data is exposed to script in the embedding [=origin=]. + In order for the API to provide [=Initialization Data=] in the {{encrypted}} event, [=HTMLMediaElement/media data=] MUST be [=CORS-same-origin=] with the embedding page. + If [=HTMLMediaElement/media data=] is cross-origin with the embedding document, authors SHOULD use the {{HTMLMediaElement/crossOrigin}} attribute + on the {{HTMLMediaElement}} and CORS headers on the [=HTMLMediaElement/media data=] response to make it [=CORS-same-origin=].
During playback, embedded media data is exposed to script in the embedding . - In order for the API to provide in the event, MUST NOT be Mixed Content [[MIXED-CONTENT]]. +
During playback, embedded media data is exposed to script in the embedding [=origin=]. + In order for the API to provide [=Initialization Data=] in the {{encrypted}} event, [=HTMLMediaElement/media data=] MUST NOT be [=Mixed Content=] [[MIXED-CONTENT]].
Time MUST be equivalent to that represented in ECMAScript Time Values and Time Range [[ECMA-262]].
@@ -605,14 +510,14 @@- The time after which key(s) will no longer be . + The [=time=] after which key(s) will no longer be [=usable for decryption=].
A User Agent on a given machine may support execution in a variety of different contexts or modes or temporary states that are expected to behave independently @@ -624,10 +529,10 @@
- A valid media MIME type is a media MIME type that is also a [[HTML]]. + A valid media MIME type is a media MIME type that is also a [=valid MIME type string=] [[mimesniff]]. When a MIME type includes parameters, such as `"codecs"` [[RFC6381]], such parameters MUST also be valid per the relevant specification.
@@ -639,7 +544,7 @@
This section defines the mechanism for obtaining access to a key system. +
This section defines the mechanism for obtaining access to a [=Key System=]. The inclusion of capabilities in the request also enables feature detection.
The steps of an algorithm are always aborted when rejecting a promise.
@@ -647,31 +552,39 @@
- is a policy-controlled feature
- identified by the string encrypted-media
. Its default allowlist is 'self'
+ {{Navigator/requestMediaKeySystemAccess()}} is a [=policy-controlled feature=]
+ identified by the string encrypted-media
. Its
+ [=policy-controlled feature/default allowlist=] is 'self'
[[!PERMISSIONS-POLICY]].
requestMediaKeySystemAccess()
[Exposed=Window] -partial interface Navigator { - [SecureContext] Promise<MediaKeySystemAccess> requestMediaKeySystemAccess (DOMString keySystem, sequence<MediaKeySystemConfiguration> supportedConfigurations); -};
requestMediaKeySystemAccess
+ [Exposed=Window] + partial interface Navigator { + [SecureContext] Promise<MediaKeySystemAccess> requestMediaKeySystemAccess ( + DOMString keySystem, + sequence<MediaKeySystemConfiguration> supportedConfigurations); + }; ++
Calling this method may have user-visible effects, including requests for user consent. - This method should only be called when the author intends to create and use a MediaKeys object with the provided configuration. + This method should only be called when the author intends to create and use a {{MediaKeys}} object with the provided configuration.
-Requests access to the specified . +
Requests access to the specified [=Key System=].
When supportedConfigurations
is specified, the configuration specified by at least one of its elements must be supported.
- The resulting MediaKeySystemAccess will correspond to the first such element.
+ The resulting {{MediaKeySystemAccess}} will correspond to the first such element.
Any permission checks or user interaction, such as a prompt for consent, MUST be performed before resolving the promise.
If the keySystem
is not supported or not allowed (in at least one of the supportedConfigurations
, if specified), the promise is rejected.
- Otherwise, it is resolved with a new MediaKeySystemAccess object.
+ Otherwise, it is resolved with a new {{MediaKeySystemAccess}} object.
This method is only exposed to [=secure contexts=] as indicated by the [SecureContext]
IDL attribute.
requestMediaKeySystemAccess()
Implementations MUST meet all related requirements and SHOULD follow related recommendations such that the risks on in an secure context would be similar.
When this method is invoked, the user agent MUST run the following steps:
If this's
- relevant global object's
- associated Document
- is not allowed to use the encrypted-media
feature, then throw a "SecurityError" DOMException and abort these steps.
If keySystem is the empty string, return a promise rejected with a newly created .
If supportedConfigurations is empty, return a promise rejected with a newly created .
If [=this=]'s [=relevant global object=]'s [=associated Document=]
+ is not allowed to use the encrypted-media
feature, then throw a "{{SecurityError}}"
+ {{DOMException}} and abort these steps.
If keySystem is the empty string, return a promise rejected with a newly created {{TypeError}}.
If supportedConfigurations is empty, return a promise rejected with a newly created {{TypeError}}.
Let document be the calling context's [=Document=].
Let origin be the [=origin=] of document.
Let promise be a new promise.
Run the following steps in parallel:
If keySystem is not one of the supported by the user agent, reject promise with a . String comparison is case-sensitive.
If keySystem is not one of the [=Key Systems=] supported by the user agent, reject promise with a {{NotSupportedError}}. String comparison is case-sensitive.
Let implementation be the implementation of keySystem.
For each value in supportedConfigurations
:
Let candidate configuration be the value.
Let supported configuration be the result of executing the algorithm on implementation, candidate configuration, and origin.
Let supported configuration be the result of executing the [=Get Supported Configuration=] algorithm on implementation, candidate configuration, and origin.
If supported configuration is not NotSupported
, run the following steps:
Let access be a new MediaKeySystemAccess object, and initialize it as follows:
+Let access be a new {{MediaKeySystemAccess}} object, and initialize it as follows:
Set the {{MediaKeySystemAccess/keySystem}} attribute to keySystem.
Let the configuration value be supported configuration.
Let the cdm implementation value be implementation.
requestMediaKeySystemAccess()
Reject promise with a {{NotSupportedError}}.
keySystem
was not supported/allowed or none of the configurations in supportedConfigurations
were supported/allowed.
Return promise.
Parameter | Type | Nullable | Optional | Description |
---|---|---|---|---|
keySystem | DOMString | ✘ | ✘ | - The for which access is being requested. - |
supportedConfigurations | sequence<MediaKeySystemConfiguration> | ✘ | ✘ | - A sequence of MediaKeySystemConfiguration configurations to try in order. - The first element with a satisfiable configuration will be used. - |
Promise<MediaKeySystemAccess>
Given a implementation implementation, MediaKeySystemConfiguration candidate configuration, and origin, this algorithm returns a supported configuration or NotSupported
as appropriate.
Given a [=Key Systems=] implementation implementation, {{MediaKeySystemConfiguration}} candidate configuration, and origin, this algorithm returns a supported configuration or NotSupported
as appropriate.
Unrecognized dictionary members in candidate configuration are ignored per [[WEBIDL]] and will never reach this algorithm. Thus, they cannot be considered as part of the configuration.
Supported configurations, including supported audio and video codecs, may depend on availability of optional capabilities such as - and persistent state. The following algorithm iteratively tries to find a configuration + [=Distinctive Identifier(s)=] and persistent state. The following algorithm iteratively tries to find a configuration that is both supported and has user consent (or does not need consent).
- User Agents should reuse earlier consent responses, when appropriate, at least for the duration of the + User Agents should reuse earlier consent responses, when appropriate, at least for the duration of the {{Navigator/requestMediaKeySystemAccess()}} algorithm in order to avoid repeated requests to the user for similar configurations.
@@ -777,7 +684,7 @@
Let supported configuration and, if provided, restrictions be the result of executing the - algorithm + [=Get Supported Configuration and Consent=] algorithm with implementation, candidate configuration, restrictions and origin.
Given a implementation implementation, MediaKeySystemConfiguration candidate configuration, +
Given a [=Key Systems=] implementation implementation, {{MediaKeySystemConfiguration}} candidate configuration,
restrictions and origin, this algorithm returns a supported configuration, NotSupported
, or ConsentDenied
as appropriate and, in the ConsentDenied
case, restrictions.
Let accumulated configuration be a new MediaKeySystemConfiguration dictionary.
Let accumulated configuration be a new {{MediaKeySystemConfiguration}} dictionary.
- Set the member of accumulated configuration to equal the member of candidate configuration. + Set the {{MediaKeySystemConfiguration/label}} member of accumulated configuration to equal the {{MediaKeySystemConfiguration/label}} member of candidate configuration.
If the member of candidate configuration is non-empty, run the following steps:
+If the {{MediaKeySystemConfiguration/initDataTypes}} member of candidate configuration is non-empty, run the following steps:
Let supported types be an empty sequence of DOMStrings.
Let supported types be an empty sequence of {{DOMString}}s.
For each value in candidate configuration's {{MediaKeySystemConfiguration/initDataTypes}} member:
Let initDataType be the value.
If supported types is empty, return NotSupported
.
Set the member of accumulated configuration to supported types.
Set the {{MediaKeySystemConfiguration/initDataTypes}} member of accumulated configuration to supported types.
- Let distinctive identifier requirement be the value of candidate configuration's member. + Let distinctive identifier requirement be the value of candidate configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} member.
- If distinctive identifier requirement is and - are not allowed according to restrictions, set distinctive identifier requirement - to . + If distinctive identifier requirement is {{MediaKeysRequirement/"optional"}} and + [=Distinctive Identifiers=] are not allowed according to restrictions, set distinctive identifier requirement + to {{MediaKeysRequirement/"not-allowed"}}.
Follow the steps for distinctive identifier requirement from the following list:
If the implementation does not support use of Distinctive Identifier(s) in combination with accumulated configuration and restrictions, return NotSupported
.
If the implementation does not support [=use of Distinctive Identifier(s)=] in combination with accumulated configuration and restrictions, return NotSupported
.
Continue with the following steps.
If the implementation requires use Distinctive Identifier(s) or Distinctive Permanent Identifier(s) in combination with accumulated configuration and restrictions, return NotSupported
.
If the implementation requires [=use of Distinctive Identifier(s) or Distinctive Permanent Identifier(s)=] in combination with accumulated configuration and restrictions, return NotSupported
.
- Set the member of accumulated configuration to equal distinctive identifier requirement. + Set the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of accumulated configuration to equal distinctive identifier requirement.
- Let persistent state requirement be equal to the value of candidate configuration's member. + Let persistent state requirement be equal to the value of candidate configuration's {{MediaKeySystemConfiguration/persistentState}} member.
- If persistent state requirement is and persisting state is not allowed according to - restrictions, set persistent state requirement to . + If persistent state requirement is {{MediaKeysRequirement/"optional"}} and persisting state is not allowed according to + restrictions, set persistent state requirement to {{MediaKeysRequirement/"not-allowed"}}.
Follow the steps for persistent state requirement from the following list:
If the implementation does not support persisting state in combination with accumulated configuration and restrictions, return NotSupported
.
Continue with the following steps.
If the implementation requires persisting state in combination with accumulated configuration and restrictions, return NotSupported
.
- Set the member of accumulated configuration to equal the value of persistent state requirement. + Set the {{MediaKeySystemConfiguration/persistentState}} member of accumulated configuration to equal the value of persistent state requirement.
Follow the steps for the first matching condition from the following list:
Let session types be candidate configuration's member.
+Let session types be candidate configuration's {{MediaKeySystemConfiguration/sessionTypes}} member.
Let session types be [ {{MediaKeySessionType/"temporary"}} ]
.
Let session type be the value.
- If accumulated configuration's value is and the algorithm returns true
for session type return NotSupported
.
+ If accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value is {{MediaKeysRequirement/"not-allowed"}} and the [=Is persistent session type?=] algorithm returns true
for session type return NotSupported
.
If the implementation does not support session type in combination with accumulated configuration and restrictions for other reasons, return NotSupported
.
If accumulated configuration's value is and the result of running the algorithm on session type is true
, change accumulated configuration's value to .
If accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value is {{MediaKeysRequirement/"optional"}} and the result of running the [=Is persistent session type?=] algorithm on session type is true
, change accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value to {{MediaKeysRequirement/"required"}}.
Set the member of accumulated configuration to session types.
Set the {{MediaKeySystemConfiguration/sessionTypes}} member of accumulated configuration to session types.
- If the and members in candidate configuration
+ If the {{MediaKeySystemConfiguration/videoCapabilities}} and {{MediaKeySystemConfiguration/audioCapabilities}} members in candidate configuration
are both empty, return NotSupported
.
Let video capabilities be the result of executing the algorithm on Video, candidate configuration's member, accumulated configuration, and restrictions.
Let video capabilities be the result of executing the [=Get Supported Capabilities for Audio\/Video Type=] algorithm on Video, candidate configuration's {{MediaKeySystemConfiguration/videoCapabilities}} member, accumulated configuration, and restrictions.
If video capabilities is null
, return NotSupported
.
Set the member of accumulated configuration to video capabilities.
Set the {{MediaKeySystemConfiguration/videoCapabilities}} member of accumulated configuration to video capabilities.
Set the member of accumulated configuration to an empty sequence.
Set the {{MediaKeySystemConfiguration/videoCapabilities}} member of accumulated configuration to an empty sequence.
Let audio capabilities be the result of executing the algorithm on Audio, candidate configuration's member, accumulated configuration, and restrictions.
Let audio capabilities be the result of executing the [=Get Supported Capabilities for Audio\/Video Type=] algorithm on Audio, candidate configuration's {{MediaKeySystemConfiguration/audioCapabilities}} member, accumulated configuration, and restrictions.
If audio capabilities is null
, return NotSupported
.
Set the member of accumulated configuration to audio capabilities.
Set the {{MediaKeySystemConfiguration/audioCapabilities}} member of accumulated configuration to audio capabilities.
Set the member of accumulated configuration to an empty sequence.
Set the {{MediaKeySystemConfiguration/audioCapabilities}} member of accumulated configuration to an empty sequence.
If accumulated configuration's value is , follow the steps for the first matching condition from the following list:
+If accumulated configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} value is {{MediaKeysRequirement/"optional"}}, follow the steps for the first matching condition from the following list:
Change accumulated configuration's value to .
+Change accumulated configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} value to {{MediaKeysRequirement/"required"}}.
Change accumulated configuration's value to .
+Change accumulated configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} value to {{MediaKeysRequirement/"not-allowed"}}.
If accumulated configuration's value is , follow the steps for the first matching condition from the following list:
+If accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value is {{MediaKeysRequirement/"optional"}}, follow the steps for the first matching condition from the following list:
Change accumulated configuration's value to .
+Change accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value to {{MediaKeysRequirement/"required"}}.
Change accumulated configuration's value to .
+Change accumulated configuration's {{MediaKeySystemConfiguration/persistentState}} value to {{MediaKeysRequirement/"not-allowed"}}.
- If accumulated configuration's value is and - the associated with accumulated configuration are not unique per origin and profile and + If accumulated configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} value is {{MediaKeysRequirement/"required"}} and + the [=Distinctive Identifier(s)=] associated with accumulated configuration are not unique per origin and profile and clearable:
- Let consent status and updated restrictions be the result of running the algorithm on accumulated configuration, restrictions and origin and follow the steps for the value of consent status from the following list: + Let consent status and updated restrictions be the result of running the [=Get Consent Status=] algorithm on accumulated configuration, restrictions and origin and follow the steps for the value of consent status from the following list:
Inform the user that accumulated configuration is in use in the origin including, specifically, the information - that and/or as appropriate will be used if the - member of accumulated configuration is . Continue to the next step. + that [=Distinctive Identifier(s)=] and/or [=Distinctive Permanent Identifier(s)=] as appropriate will be used if the {{MediaKeySystemConfiguration/distinctiveIdentifier}} + member of accumulated configuration is {{MediaKeysRequirement/"required"}}. Continue to the next step.
Allowed
:Given an audio/video type, MediaKeySystemMediaCapability sequence requested media capabilities, MediaKeySystemConfiguration accumulated configuration, and restrictions, this algorithm returns a sequence of supported MediaKeySystemMediaCapability values for this audio/video type or null
as appropriate.
Given an audio/video type, {{MediaKeySystemMediaCapability}} sequence requested media capabilities, {{MediaKeySystemConfiguration}} accumulated configuration, and restrictions, this algorithm returns a sequence of supported {{MediaKeySystemMediaCapability}} values for this audio/video type or null
as appropriate.
Let local accumulated configuration be a local copy of accumulated configuration.
Let supported media capabilities be an empty sequence of MediaKeySystemMediaCapability dictionaries.
Let supported media capabilities be an empty sequence of {{MediaKeySystemMediaCapability}} dictionaries.
For each requested media capability in requested media capabilities:
Let encryption scheme be requested media capability’s member.
Let content type be requested media capability's {{MediaKeySystemMediaCapability/contentType}} member.
Let encryption scheme be requested media capability’s {{MediaKeySystemMediaCapability/encryptionScheme}} member.
Let robustness be requested media capability's {{MediaKeySystemMediaCapability/robustness}} member.
If content type is the empty string, return null
.
If content type is not a or is unrecognized, continue to the next iteration.
If content type is not a [=valid media MIME type=] or is unrecognized, continue to the next iteration.
Let container be the container type specified by content type.
If the user agent does not support container, continue to the next iteration. The case-sensitivity of string comparisons is determined by the appropriate RFC.
Per RFC 6838 [[RFC6838]], "Both top-level type and subtype names are case-insensitive."
@@ -1114,7 +1021,7 @@If encryption scheme is non-null and is not recognized or not supported by implementation, continue to the next iteration.
If robustness is not the empty string and contains an unrecognized value or a value not supported by implementation, continue to the next iteration. String comparison is case-sensitive.
If the user agent and implementation definitely support playback of encrypted for the combination of container, media types, encryption scheme, robustness and local accumulated configuration in combination with restrictions:
+If the user agent and implementation definitely support playback of encrypted [=HTMLMediaElement/media data=] for the combination of container, media types, encryption scheme, robustness and local accumulated configuration in combination with restrictions:
requested media capability (content type and robustness) must be supported when used together with all previously added requested media capabilities.
- Add requested media capability to the member of local accumulated configuration. + Add requested media capability to the {{MediaKeySystemConfiguration/videoCapabilities}} member of local accumulated configuration.
- Add requested media capability to the member of local accumulated configuration. + Add requested media capability to the {{MediaKeySystemConfiguration/audioCapabilities}} member of local accumulated configuration.
If supported media capabilities is empty, return null
.
None of the MediaKeySystemMediaCapability elements in requested media capabilities is supported in combination with accumulated configuration.
+None of the {{MediaKeySystemMediaCapability}} elements in requested media capabilities is supported in combination with accumulated configuration.
Return supported media capabilities.
Given an accumulated configuration, restrictions and origin, this algorithm returns the consent status for
accumulated configuration and origin as one of ConsentDenied
, InformUser
or Allowed
,
@@ -1166,13 +1073,13 @@
- Consent status for accumulated configuration depends at least on the value of the member of + Consent status for accumulated configuration depends at least on the value of the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of accumulated configuration.
- Previous consent for accumulated configuration with - set to does not imply consent for the same configuration with - set to or . + Previous consent for accumulated configuration with {{MediaKeySystemConfiguration/distinctiveIdentifier}} + set to {{MediaKeysRequirement/"not-allowed"}} does not imply consent for the same configuration with {{MediaKeySystemConfiguration/distinctiveIdentifier}} + set to {{MediaKeysRequirement/"optional"}} or {{MediaKeysRequirement/"required"}}.
- The member of accumulated configuration is not - and the combination of the User Agent, implementation + The {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of accumulated configuration is not + {{MediaKeysRequirement/"not-allowed"}} and the combination of the User Agent, implementation and accumulated configuration does not follow all the recommendations of Allow Persistent Data to Be Cleared with respect to - . + [=Distinctive Identifier(s)=].
- Another reason for requiring explicit user consent may be due to the security properties of the CDM implementation. + Another reason for requiring explicit user consent may be due to the security properties of the [=CDM=] implementation.
- The consent MUST include consent to use a and/or as appropriate if - accumulated configuration's member is . + The consent MUST include consent to use a [=Distinctive Identifier(s)=] and/or [=Distinctive Permanent Identifier(s)=] as appropriate if + accumulated configuration's {{MediaKeySystemConfiguration/distinctiveIdentifier}} member is {{MediaKeysRequirement/"required"}}.
User consent to use accumulated configuration is specific to the origin and may be limited to configurations sharing certain properties with accumulated configuration.
- If the member of accumulated configuration is not
- , return InformUser
.
+ If the {{MediaKeySystemConfiguration/distinctiveIdentifier}} member of accumulated configuration is not
+ {{MediaKeysRequirement/"not-allowed"}}, return InformUser
.
enum MediaKeysRequirement { - "required", - "optional", - "not-allowed" -};+
+ enum MediaKeysRequirement { + "required", + "optional", + "not-allowed" + }; +
The MediaKeysRequirement enumeration is defined as follows:
-Enumeration description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
required |
+
dictionary MediaKeySystemConfiguration { - DOMString label = ""; - sequence<DOMString> initDataTypes = []; - sequence<MediaKeySystemMediaCapability> audioCapabilities = []; - sequence<MediaKeySystemMediaCapability> videoCapabilities = []; - MediaKeysRequirement distinctiveIdentifier = "optional"; - MediaKeysRequirement persistentState = "optional"; - sequence<DOMString> sessionTypes; -};+ + dictionary MediaKeySystemConfiguration { + DOMString label = ""; + sequence<DOMString> initDataTypes = []; + sequence<MediaKeySystemMediaCapability> audioCapabilities = []; + sequence<MediaKeySystemMediaCapability> videoCapabilities = []; + MediaKeysRequirement distinctiveIdentifier = "optional"; + MediaKeysRequirement persistentState = "optional"; + sequence<DOMString> sessionTypes; + }; + - The dictionary MediaKeySystemConfiguration contains the following members: + The dictionary {{MediaKeySystemConfiguration}} contains the following members: -
|