| Index: components/gcm_driver/crypto/gcm_encryption_provider.cc
|
| diff --git a/components/gcm_driver/crypto/gcm_encryption_provider.cc b/components/gcm_driver/crypto/gcm_encryption_provider.cc
|
| index 9695815dd46c3cae8a5b002a889013db1c1aa3b5..35015369f5d25a0746e0783489422bf78a21ced6 100644
|
| --- a/components/gcm_driver/crypto/gcm_encryption_provider.cc
|
| +++ b/components/gcm_driver/crypto/gcm_encryption_provider.cc
|
| @@ -124,17 +124,16 @@ void GCMEncryptionProvider::DecryptMessage(
|
| DCHECK(encryption_header != message.data.end());
|
| DCHECK(crypto_key_header != message.data.end());
|
|
|
| - std::vector<EncryptionHeaderValues> encryption_header_values;
|
| - if (!ParseEncryptionHeader(encryption_header->second,
|
| - &encryption_header_values)) {
|
| + EncryptionHeaderIterator encryption_header_iterator(
|
| + encryption_header->second.begin(), encryption_header->second.end());
|
| + if (!encryption_header_iterator.GetNext()) {
|
| DLOG(ERROR) << "Unable to parse the value of the Encryption header";
|
| callback.Run(DECRYPTION_RESULT_INVALID_ENCRYPTION_HEADER,
|
| IncomingMessage());
|
| return;
|
| }
|
|
|
| - if (encryption_header_values.size() != 1u ||
|
| - encryption_header_values[0].salt.size() !=
|
| + if (encryption_header_iterator.salt().size() !=
|
| GCMMessageCryptographer::kSaltSize) {
|
| DLOG(ERROR) << "Invalid values supplied in the Encryption header";
|
| callback.Run(DECRYPTION_RESULT_INVALID_ENCRYPTION_HEADER,
|
| @@ -142,17 +141,16 @@ void GCMEncryptionProvider::DecryptMessage(
|
| return;
|
| }
|
|
|
| - std::vector<CryptoKeyHeaderValues> crypto_key_header_values;
|
| - if (!ParseCryptoKeyHeader(crypto_key_header->second,
|
| - &crypto_key_header_values)) {
|
| + CryptoKeyHeaderIterator crypto_key_header_iterator(
|
| + crypto_key_header->second.begin(), crypto_key_header->second.end());
|
| + if (!crypto_key_header_iterator.GetNext()) {
|
| DLOG(ERROR) << "Unable to parse the value of the Crypto-Key header";
|
| callback.Run(DECRYPTION_RESULT_INVALID_CRYPTO_KEY_HEADER,
|
| IncomingMessage());
|
| return;
|
| }
|
|
|
| - if (crypto_key_header_values.size() != 1u ||
|
| - !crypto_key_header_values[0].dh.size()) {
|
| + if (crypto_key_header_iterator.dh().empty()) {
|
| DLOG(ERROR) << "Invalid values supplied in the Crypto-Key header";
|
| callback.Run(DECRYPTION_RESULT_INVALID_CRYPTO_KEY_HEADER,
|
| IncomingMessage());
|
| @@ -165,9 +163,9 @@ void GCMEncryptionProvider::DecryptMessage(
|
| true /* fallback_to_empty_authorized_entity */,
|
| base::Bind(&GCMEncryptionProvider::DecryptMessageWithKey,
|
| weak_ptr_factory_.GetWeakPtr(), message,
|
| - callback, encryption_header_values[0].salt,
|
| - crypto_key_header_values[0].dh,
|
| - encryption_header_values[0].rs));
|
| + callback, encryption_header_iterator.salt(),
|
| + crypto_key_header_iterator.dh(),
|
| + encryption_header_iterator.rs()));
|
| }
|
|
|
| void GCMEncryptionProvider::DidGetEncryptionInfo(
|
|
|