OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 #include <vector> | 6 #include <vector> |
7 | 7 |
8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "media/base/decoder_buffer.h" | 10 #include "media/base/decoder_buffer.h" |
(...skipping 298 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
309 } | 309 } |
310 | 310 |
311 MockDecryptorClient client_; | 311 MockDecryptorClient client_; |
312 AesDecryptor decryptor_; | 312 AesDecryptor decryptor_; |
313 std::string session_id_string_; | 313 std::string session_id_string_; |
314 AesDecryptor::DecryptCB decrypt_cb_; | 314 AesDecryptor::DecryptCB decrypt_cb_; |
315 std::vector<SubsampleEntry> subsample_entries_; | 315 std::vector<SubsampleEntry> subsample_entries_; |
316 }; | 316 }; |
317 | 317 |
318 TEST_F(AesDecryptorTest, GenerateKeyRequestWithNullInitData) { | 318 TEST_F(AesDecryptorTest, GenerateKeyRequestWithNullInitData) { |
319 EXPECT_FALSE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", NULL, 0)); | 319 EXPECT_CALL(client_, KeyMessageMock(kClearKeySystem, StrNe(""), |
| 320 IsNull(), 0, "")); |
| 321 EXPECT_TRUE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", NULL, 0)); |
320 } | 322 } |
321 | 323 |
322 TEST_F(AesDecryptorTest, NormalWebMDecryption) { | 324 TEST_F(AesDecryptorTest, NormalWebMDecryption) { |
323 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; | 325 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; |
324 GenerateKeyRequest(frame.key_id, frame.key_id_size); | 326 GenerateKeyRequest(frame.key_id, frame.key_id_size); |
325 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, | 327 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, |
326 frame.key, frame.key_size); | 328 frame.key, frame.key_size); |
327 scoped_refptr<DecoderBuffer> encrypted_data = | 329 scoped_refptr<DecoderBuffer> encrypted_data = |
328 CreateWebMEncryptedBuffer(frame.encrypted_data, | 330 CreateWebMEncryptedBuffer(frame.encrypted_data, |
329 frame.encrypted_data_size, | 331 frame.encrypted_data_size, |
(...skipping 256 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
586 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( | 588 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( |
587 kSubsampleData, arraysize(kSubsampleData), | 589 kSubsampleData, arraysize(kSubsampleData), |
588 kSubsampleKeyId, arraysize(kSubsampleKeyId), | 590 kSubsampleKeyId, arraysize(kSubsampleKeyId), |
589 kSubsampleIv, arraysize(kSubsampleIv), | 591 kSubsampleIv, arraysize(kSubsampleIv), |
590 0, | 592 0, |
591 entries); | 593 entries); |
592 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); | 594 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); |
593 } | 595 } |
594 | 596 |
595 } // namespace media | 597 } // namespace media |
OLD | NEW |