Index: media/cdm/aes_decryptor.cc |
diff --git a/media/cdm/aes_decryptor.cc b/media/cdm/aes_decryptor.cc |
index ee4b987d6fe42b43ef804682ad8072230d6969e2..c4a491330e55d3b02666247dcbcaca0e18a19ac1 100644 |
--- a/media/cdm/aes_decryptor.cc |
+++ b/media/cdm/aes_decryptor.cc |
@@ -157,7 +157,7 @@ AesDecryptor::~AesDecryptor() { |
STLDeleteValues(&key_map_); |
} |
-bool AesDecryptor::CreateSession(uint32 reference_id, |
+bool AesDecryptor::CreateSession(uint32 session_id, |
const std::string& type, |
const uint8* init_data, |
int init_data_length) { |
@@ -169,12 +169,12 @@ bool AesDecryptor::CreateSession(uint32 reference_id, |
if (init_data && init_data_length) |
message.assign(init_data, init_data + init_data_length); |
- session_created_cb_.Run(reference_id, session_id_string); |
- session_message_cb_.Run(reference_id, message, std::string()); |
+ session_created_cb_.Run(session_id, session_id_string); |
+ session_message_cb_.Run(session_id, message, std::string()); |
xhwang
2013/12/05 18:51:37
just double check, do we have a DCHECK that create
jrummell
2013/12/06 23:42:35
SessionMessage will fail when it tries to convert
|
return true; |
} |
-void AesDecryptor::UpdateSession(uint32 reference_id, |
+void AesDecryptor::UpdateSession(uint32 session_id, |
const uint8* response, |
int response_length) { |
CHECK(response); |
@@ -184,13 +184,13 @@ void AesDecryptor::UpdateSession(uint32 reference_id, |
response_length); |
KeyIdAndKeyPairs keys; |
if (!ExtractKeysFromJWKSet(key_string, &keys)) { |
- session_error_cb_.Run(reference_id, MediaKeys::kUnknownError, 0); |
+ session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0); |
return; |
} |
// Make sure that at least one key was extracted. |
if (keys.empty()) { |
- session_error_cb_.Run(reference_id, MediaKeys::kUnknownError, 0); |
+ session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0); |
return; |
} |
@@ -198,11 +198,11 @@ void AesDecryptor::UpdateSession(uint32 reference_id, |
if (it->second.length() != |
static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) { |
DVLOG(1) << "Invalid key length: " << key_string.length(); |
- session_error_cb_.Run(reference_id, MediaKeys::kUnknownError, 0); |
+ session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0); |
return; |
} |
if (!AddDecryptionKey(it->first, it->second)) { |
- session_error_cb_.Run(reference_id, MediaKeys::kUnknownError, 0); |
+ session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0); |
return; |
} |
} |
@@ -213,10 +213,10 @@ void AesDecryptor::UpdateSession(uint32 reference_id, |
if (!new_video_key_cb_.is_null()) |
new_video_key_cb_.Run(); |
- session_ready_cb_.Run(reference_id); |
+ session_ready_cb_.Run(session_id); |
} |
-void AesDecryptor::ReleaseSession(uint32 reference_id) { |
+void AesDecryptor::ReleaseSession(uint32 session_id) { |
// TODO: Implement: http://crbug.com/313412. |
} |