| Index: webkit/media/crypto/proxy_decryptor_unittest.cc
|
| diff --git a/webkit/media/crypto/proxy_decryptor_unittest.cc b/webkit/media/crypto/proxy_decryptor_unittest.cc
|
| index 759e68cd948b34311c1ec91b0ad07b0101fcadd8..1f85a3d0917e5cdd51a7aa5a852b496fe36417df 100644
|
| --- a/webkit/media/crypto/proxy_decryptor_unittest.cc
|
| +++ b/webkit/media/crypto/proxy_decryptor_unittest.cc
|
| @@ -29,6 +29,7 @@ using media::Decryptor;
|
| namespace webkit_media {
|
|
|
| static const uint8 kFakeKeyId[] = { 0x4b, 0x65, 0x79, 0x20, 0x49, 0x44 };
|
| +static const int kFakeKeyIdSize = arraysize(kFakeKeyId);
|
| static const uint8 kFakeIv[DecryptConfig::kDecryptionKeySize] = { 0 };
|
| static const char kFakeKeySystem[] = "system.key.fake";
|
| static const char kFakeSessionId[] = "FakeSessionId";
|
| @@ -44,7 +45,7 @@ static scoped_refptr<DecoderBuffer> CreateFakeEncryptedBuffer() {
|
| encrypted_buffer->SetDecryptConfig(scoped_ptr<DecryptConfig>(
|
| new DecryptConfig(
|
| std::string(reinterpret_cast<const char*>(kFakeKeyId),
|
| - arraysize(kFakeKeyId)),
|
| + kFakeKeyIdSize),
|
| std::string(reinterpret_cast<const char*>(kFakeIv),
|
| DecryptConfig::kDecryptionKeySize),
|
| encrypted_frame_offset,
|
| @@ -94,11 +95,11 @@ class ProxyDecryptorTest : public testing::Test {
|
| // hence always use fake key IDs and keys.
|
| void AddKey() {
|
| EXPECT_CALL(*real_decryptor_, AddKey(kFakeKeySystem,
|
| - kFakeKeyId, arraysize(kFakeKeyId),
|
| + kFakeKeyId, kFakeKeyIdSize,
|
| kFakeKey, arraysize(kFakeKey),
|
| kFakeSessionId));
|
| proxy_decryptor_.AddKey(kFakeKeySystem,
|
| - kFakeKeyId, arraysize(kFakeKeyId),
|
| + kFakeKeyId, kFakeKeyIdSize,
|
| kFakeKey, arraysize(kFakeKey),
|
| kFakeSessionId);
|
| }
|
| @@ -163,7 +164,7 @@ TEST_F(ProxyDecryptorTest, NormalDecryption_NoKey) {
|
|
|
| EXPECT_CALL(*real_decryptor_, Decrypt(stream_type_, encrypted_buffer_, _))
|
| .WillOnce(RunDecryptCB(Decryptor::kNoKey, null_buffer_));
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)));
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize));
|
| proxy_decryptor_.Decrypt(stream_type_, encrypted_buffer_, decrypt_cb_);
|
|
|
| EXPECT_CALL(*this, DeliverBuffer(Decryptor::kSuccess, null_buffer_));
|
| @@ -172,7 +173,7 @@ TEST_F(ProxyDecryptorTest, NormalDecryption_NoKey) {
|
|
|
| // Tests the case where Decrypt() is called after the right key is added.
|
| TEST_F(ProxyDecryptorTest, DecryptBeforeAddKey) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)));
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize));
|
| GenerateKeyRequest();
|
| EXPECT_CALL(*real_decryptor_, Decrypt(stream_type_, encrypted_buffer_, _))
|
| .WillOnce(RunDecryptCB(Decryptor::kNoKey, null_buffer_));
|
| @@ -190,7 +191,7 @@ TEST_F(ProxyDecryptorTest, DecryptBeforeAddKey) {
|
| // Tests the case where Decrypt() is called before GKR() and the right key is
|
| // added.
|
| TEST_F(ProxyDecryptorTest, DecryptBeforeGenerateKeyRequest) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)));
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize));
|
| proxy_decryptor_.Decrypt(stream_type_, encrypted_buffer_, decrypt_cb_);
|
|
|
| EXPECT_CALL(*real_decryptor_, Decrypt(stream_type_, encrypted_buffer_, _))
|
| @@ -206,7 +207,7 @@ TEST_F(ProxyDecryptorTest, DecryptBeforeGenerateKeyRequest) {
|
| // Tests the case where multiple AddKey() is called to add some irrelevant keys
|
| // before the real key that can decrypt |encrypted_buffer_| is added.
|
| TEST_F(ProxyDecryptorTest, MultipleAddKeys) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)))
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize))
|
| .Times(AtLeast(1));
|
| proxy_decryptor_.Decrypt(stream_type_, encrypted_buffer_, decrypt_cb_);
|
|
|
| @@ -257,7 +258,7 @@ TEST_F(ProxyDecryptorTest, AddKeyAfterDecryptButBeforeNoKeyReturned) {
|
| // GenerateKeyRequest is called. In this case, the decryptor was not even
|
| // created!
|
| TEST_F(ProxyDecryptorTest, CancelDecryptWithoutGenerateKeyRequestCalled) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)))
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize))
|
| .Times(AtLeast(1));
|
| proxy_decryptor_.Decrypt(stream_type_, encrypted_buffer_, decrypt_cb_);
|
|
|
| @@ -271,7 +272,7 @@ TEST_F(ProxyDecryptorTest, CancelDecryptWithoutGenerateKeyRequestCalled) {
|
| // Test the case where we cancel the pending decryption callback when it's
|
| // stored in the ProxyDecryptor.
|
| TEST_F(ProxyDecryptorTest, CancelDecryptWhenDecryptPendingInProxyDecryptor) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)))
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize))
|
| .Times(AtLeast(1));
|
| EXPECT_CALL(*real_decryptor_, Decrypt(stream_type_, encrypted_buffer_, _))
|
| .WillRepeatedly(RunDecryptCB(Decryptor::kNoKey, null_buffer_));
|
| @@ -311,7 +312,7 @@ TEST_F(ProxyDecryptorTest, CancelDecryptWhenDecryptPendingInRealDecryptor) {
|
| // Test the case where we try to decrypt again after the previous decrypt was
|
| // canceled.
|
| TEST_F(ProxyDecryptorTest, DecryptAfterCancelDecrypt) {
|
| - EXPECT_CALL(client_, NeedKeyMock("", "", NotNull(), arraysize(kFakeKeyId)))
|
| + EXPECT_CALL(client_, NeedKeyMock("", "", "", NotNull(), kFakeKeyIdSize))
|
| .Times(AtLeast(1));
|
| EXPECT_CALL(*real_decryptor_, Decrypt(stream_type_, encrypted_buffer_, _))
|
| .WillRepeatedly(RunDecryptCB(Decryptor::kNoKey, null_buffer_));
|
|
|