Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1140)

Unified Diff: content/renderer/media/crypto/proxy_decryptor.cc

Issue 105383002: Rename EME WD call parameters (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix nit Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/renderer/media/crypto/proxy_decryptor.cc
diff --git a/content/renderer/media/crypto/proxy_decryptor.cc b/content/renderer/media/crypto/proxy_decryptor.cc
index 4716405902d4b72ab560dafc153fc252029cad47..0016d19a7e854657b6fd0dc9810c28e4bf77e2da 100644
--- a/content/renderer/media/crypto/proxy_decryptor.cc
+++ b/content/renderer/media/crypto/proxy_decryptor.cc
@@ -21,9 +21,9 @@ namespace content {
// WebContentDecryptionModuleSessionImpl for the short time both paths are
// active, start with 100000 and generate the IDs from there.
// TODO(jrummell): Only allow one path http://crbug.com/306680.
-uint32 ProxyDecryptor::next_reference_id_ = 100000;
+uint32 ProxyDecryptor::next_session_id_ = 100000;
-const uint32 INVALID_REFERENCE_ID = 0;
+const uint32 kInvalidSessionId = 0;
#if defined(ENABLE_PEPPER_CDMS)
void ProxyDecryptor::DestroyHelperPlugin() {
@@ -116,9 +116,9 @@ bool ProxyDecryptor::GenerateKeyRequest(const std::string& type,
const uint8* init_data,
int init_data_length) {
// Use a unique reference id for this request.
- uint32 reference_id = next_reference_id_++;
+ uint32 session_id = next_session_id_++;
if (!media_keys_->CreateSession(
- reference_id, type, init_data, init_data_length)) {
+ session_id, type, init_data, init_data_length)) {
media_keys_.reset();
return false;
}
@@ -130,12 +130,12 @@ void ProxyDecryptor::AddKey(const uint8* key,
int key_length,
const uint8* init_data,
int init_data_length,
- const std::string& session_id) {
+ const std::string& web_session_id) {
DVLOG(1) << "AddKey()";
// WebMediaPlayerImpl ensures GenerateKeyRequest() has been called.
- uint32 reference_id = LookupReferenceId(session_id);
- if (reference_id == INVALID_REFERENCE_ID) {
+ uint32 session_id = LookupSessionId(web_session_id);
+ if (session_id == kInvalidSessionId) {
// Session hasn't been referenced before, so it is an error.
// Note that the specification says "If sessionId is not null and is
// unrecognized, throw an INVALID_ACCESS_ERR." However, for backwards
@@ -162,25 +162,25 @@ void ProxyDecryptor::AddKey(const uint8* key,
media::GenerateJWKSet(key, key_length, init_data, init_data_length);
DCHECK(!jwk.empty());
media_keys_->UpdateSession(
- reference_id, reinterpret_cast<const uint8*>(jwk.data()), jwk.size());
+ session_id, reinterpret_cast<const uint8*>(jwk.data()), jwk.size());
return;
}
- media_keys_->UpdateSession(reference_id, key, key_length);
+ media_keys_->UpdateSession(session_id, key, key_length);
}
void ProxyDecryptor::CancelKeyRequest(const std::string& session_id) {
DVLOG(1) << "CancelKeyRequest()";
// WebMediaPlayerImpl ensures GenerateKeyRequest() has been called.
- uint32 reference_id = LookupReferenceId(session_id);
- if (reference_id == INVALID_REFERENCE_ID) {
+ uint32 session_reference_id = LookupSessionId(session_id);
+ if (session_reference_id == kInvalidSessionId) {
// Session hasn't been created, so it is an error.
key_error_cb_.Run(
std::string(), media::MediaKeys::kUnknownError, 0);
}
else {
- media_keys_->ReleaseSession(reference_id);
+ media_keys_->ReleaseSession(session_reference_id);
}
}
@@ -211,40 +211,40 @@ scoped_ptr<media::MediaKeys> ProxyDecryptor::CreateMediaKeys(
weak_ptr_factory_.GetWeakPtr()));
}
-void ProxyDecryptor::OnSessionCreated(uint32 reference_id,
- const std::string& session_id) {
+void ProxyDecryptor::OnSessionCreated(uint32 session_id,
+ const std::string& web_session_id) {
// Due to heartbeat messages, OnSessionCreated() can get called multiple
// times.
- SessionIdMap::iterator it = sessions_.find(reference_id);
- DCHECK(it == sessions_.end() || it->second == session_id);
+ SessionIdMap::iterator it = sessions_.find(session_id);
+ DCHECK(it == sessions_.end() || it->second == web_session_id);
if (it == sessions_.end())
- sessions_[reference_id] = session_id;
+ sessions_[session_id] = web_session_id;
}
-void ProxyDecryptor::OnSessionMessage(uint32 reference_id,
+void ProxyDecryptor::OnSessionMessage(uint32 session_id,
const std::vector<uint8>& message,
const std::string& destination_url) {
// Assumes that OnSessionCreated() has been called before this.
- key_message_cb_.Run(LookupSessionId(reference_id), message, destination_url);
+ key_message_cb_.Run(LookupWebSessionId(session_id), message, destination_url);
}
-void ProxyDecryptor::OnSessionReady(uint32 reference_id) {
+void ProxyDecryptor::OnSessionReady(uint32 session_id) {
// Assumes that OnSessionCreated() has been called before this.
- key_added_cb_.Run(LookupSessionId(reference_id));
+ key_added_cb_.Run(LookupWebSessionId(session_id));
}
-void ProxyDecryptor::OnSessionClosed(uint32 reference_id) {
+void ProxyDecryptor::OnSessionClosed(uint32 session_id) {
// No closed event in EME v0.1b.
}
-void ProxyDecryptor::OnSessionError(uint32 reference_id,
+void ProxyDecryptor::OnSessionError(uint32 session_id,
media::MediaKeys::KeyError error_code,
int system_code) {
// Assumes that OnSessionCreated() has been called before this.
- key_error_cb_.Run(LookupSessionId(reference_id), error_code, system_code);
+ key_error_cb_.Run(LookupWebSessionId(session_id), error_code, system_code);
}
-uint32 ProxyDecryptor::LookupReferenceId(const std::string& session_id) {
+uint32 ProxyDecryptor::LookupSessionId(const std::string& session_id) {
for (SessionIdMap::iterator it = sessions_.begin();
it != sessions_.end();
++it) {
@@ -256,14 +256,14 @@ uint32 ProxyDecryptor::LookupReferenceId(const std::string& session_id) {
if (session_id.empty() && sessions_.size() == 1)
return sessions_.begin()->first;
- return INVALID_REFERENCE_ID;
+ return kInvalidSessionId;
}
-const std::string& ProxyDecryptor::LookupSessionId(uint32 reference_id) {
- DCHECK_NE(reference_id, INVALID_REFERENCE_ID);
+const std::string& ProxyDecryptor::LookupWebSessionId(uint32 session_id) {
+ DCHECK_NE(session_id, kInvalidSessionId);
// Session may not exist if error happens during GenerateKeyRequest().
- SessionIdMap::iterator it = sessions_.find(reference_id);
+ SessionIdMap::iterator it = sessions_.find(session_id);
return (it != sessions_.end()) ? it->second : base::EmptyString();
}
« no previous file with comments | « content/renderer/media/crypto/proxy_decryptor.h ('k') | content/renderer/media/webcontentdecryptionmodule_impl.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698