Index: content/renderer/media/crypto/proxy_decryptor.cc |
diff --git a/content/renderer/media/crypto/proxy_decryptor.cc b/content/renderer/media/crypto/proxy_decryptor.cc |
index 4716405902d4b72ab560dafc153fc252029cad47..0016d19a7e854657b6fd0dc9810c28e4bf77e2da 100644 |
--- a/content/renderer/media/crypto/proxy_decryptor.cc |
+++ b/content/renderer/media/crypto/proxy_decryptor.cc |
@@ -21,9 +21,9 @@ namespace content { |
// WebContentDecryptionModuleSessionImpl for the short time both paths are |
// active, start with 100000 and generate the IDs from there. |
// TODO(jrummell): Only allow one path http://crbug.com/306680. |
-uint32 ProxyDecryptor::next_reference_id_ = 100000; |
+uint32 ProxyDecryptor::next_session_id_ = 100000; |
-const uint32 INVALID_REFERENCE_ID = 0; |
+const uint32 kInvalidSessionId = 0; |
#if defined(ENABLE_PEPPER_CDMS) |
void ProxyDecryptor::DestroyHelperPlugin() { |
@@ -116,9 +116,9 @@ bool ProxyDecryptor::GenerateKeyRequest(const std::string& type, |
const uint8* init_data, |
int init_data_length) { |
// Use a unique reference id for this request. |
- uint32 reference_id = next_reference_id_++; |
+ uint32 session_id = next_session_id_++; |
if (!media_keys_->CreateSession( |
- reference_id, type, init_data, init_data_length)) { |
+ session_id, type, init_data, init_data_length)) { |
media_keys_.reset(); |
return false; |
} |
@@ -130,12 +130,12 @@ void ProxyDecryptor::AddKey(const uint8* key, |
int key_length, |
const uint8* init_data, |
int init_data_length, |
- const std::string& session_id) { |
+ const std::string& web_session_id) { |
DVLOG(1) << "AddKey()"; |
// WebMediaPlayerImpl ensures GenerateKeyRequest() has been called. |
- uint32 reference_id = LookupReferenceId(session_id); |
- if (reference_id == INVALID_REFERENCE_ID) { |
+ uint32 session_id = LookupSessionId(web_session_id); |
+ if (session_id == kInvalidSessionId) { |
// Session hasn't been referenced before, so it is an error. |
// Note that the specification says "If sessionId is not null and is |
// unrecognized, throw an INVALID_ACCESS_ERR." However, for backwards |
@@ -162,25 +162,25 @@ void ProxyDecryptor::AddKey(const uint8* key, |
media::GenerateJWKSet(key, key_length, init_data, init_data_length); |
DCHECK(!jwk.empty()); |
media_keys_->UpdateSession( |
- reference_id, reinterpret_cast<const uint8*>(jwk.data()), jwk.size()); |
+ session_id, reinterpret_cast<const uint8*>(jwk.data()), jwk.size()); |
return; |
} |
- media_keys_->UpdateSession(reference_id, key, key_length); |
+ media_keys_->UpdateSession(session_id, key, key_length); |
} |
void ProxyDecryptor::CancelKeyRequest(const std::string& session_id) { |
DVLOG(1) << "CancelKeyRequest()"; |
// WebMediaPlayerImpl ensures GenerateKeyRequest() has been called. |
- uint32 reference_id = LookupReferenceId(session_id); |
- if (reference_id == INVALID_REFERENCE_ID) { |
+ uint32 session_reference_id = LookupSessionId(session_id); |
+ if (session_reference_id == kInvalidSessionId) { |
// Session hasn't been created, so it is an error. |
key_error_cb_.Run( |
std::string(), media::MediaKeys::kUnknownError, 0); |
} |
else { |
- media_keys_->ReleaseSession(reference_id); |
+ media_keys_->ReleaseSession(session_reference_id); |
} |
} |
@@ -211,40 +211,40 @@ scoped_ptr<media::MediaKeys> ProxyDecryptor::CreateMediaKeys( |
weak_ptr_factory_.GetWeakPtr())); |
} |
-void ProxyDecryptor::OnSessionCreated(uint32 reference_id, |
- const std::string& session_id) { |
+void ProxyDecryptor::OnSessionCreated(uint32 session_id, |
+ const std::string& web_session_id) { |
// Due to heartbeat messages, OnSessionCreated() can get called multiple |
// times. |
- SessionIdMap::iterator it = sessions_.find(reference_id); |
- DCHECK(it == sessions_.end() || it->second == session_id); |
+ SessionIdMap::iterator it = sessions_.find(session_id); |
+ DCHECK(it == sessions_.end() || it->second == web_session_id); |
if (it == sessions_.end()) |
- sessions_[reference_id] = session_id; |
+ sessions_[session_id] = web_session_id; |
} |
-void ProxyDecryptor::OnSessionMessage(uint32 reference_id, |
+void ProxyDecryptor::OnSessionMessage(uint32 session_id, |
const std::vector<uint8>& message, |
const std::string& destination_url) { |
// Assumes that OnSessionCreated() has been called before this. |
- key_message_cb_.Run(LookupSessionId(reference_id), message, destination_url); |
+ key_message_cb_.Run(LookupWebSessionId(session_id), message, destination_url); |
} |
-void ProxyDecryptor::OnSessionReady(uint32 reference_id) { |
+void ProxyDecryptor::OnSessionReady(uint32 session_id) { |
// Assumes that OnSessionCreated() has been called before this. |
- key_added_cb_.Run(LookupSessionId(reference_id)); |
+ key_added_cb_.Run(LookupWebSessionId(session_id)); |
} |
-void ProxyDecryptor::OnSessionClosed(uint32 reference_id) { |
+void ProxyDecryptor::OnSessionClosed(uint32 session_id) { |
// No closed event in EME v0.1b. |
} |
-void ProxyDecryptor::OnSessionError(uint32 reference_id, |
+void ProxyDecryptor::OnSessionError(uint32 session_id, |
media::MediaKeys::KeyError error_code, |
int system_code) { |
// Assumes that OnSessionCreated() has been called before this. |
- key_error_cb_.Run(LookupSessionId(reference_id), error_code, system_code); |
+ key_error_cb_.Run(LookupWebSessionId(session_id), error_code, system_code); |
} |
-uint32 ProxyDecryptor::LookupReferenceId(const std::string& session_id) { |
+uint32 ProxyDecryptor::LookupSessionId(const std::string& session_id) { |
for (SessionIdMap::iterator it = sessions_.begin(); |
it != sessions_.end(); |
++it) { |
@@ -256,14 +256,14 @@ uint32 ProxyDecryptor::LookupReferenceId(const std::string& session_id) { |
if (session_id.empty() && sessions_.size() == 1) |
return sessions_.begin()->first; |
- return INVALID_REFERENCE_ID; |
+ return kInvalidSessionId; |
} |
-const std::string& ProxyDecryptor::LookupSessionId(uint32 reference_id) { |
- DCHECK_NE(reference_id, INVALID_REFERENCE_ID); |
+const std::string& ProxyDecryptor::LookupWebSessionId(uint32 session_id) { |
+ DCHECK_NE(session_id, kInvalidSessionId); |
// Session may not exist if error happens during GenerateKeyRequest(). |
- SessionIdMap::iterator it = sessions_.find(reference_id); |
+ SessionIdMap::iterator it = sessions_.find(session_id); |
return (it != sessions_.end()) ? it->second : base::EmptyString(); |
} |