Index: media/crypto/aes_decryptor.cc |
diff --git a/media/crypto/aes_decryptor.cc b/media/crypto/aes_decryptor.cc |
index 8136cadfb82751c1685d7cd6518a6552e19eb11c..60e5a57543d0254c863d878926c740df50b32ef7 100644 |
--- a/media/crypto/aes_decryptor.cc |
+++ b/media/crypto/aes_decryptor.cc |
@@ -47,8 +47,8 @@ static void CopySubsamples(const std::vector<SubsampleEntry>& subsamples, |
// data if decryption succeeded or NULL if decryption failed. |
static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input, |
crypto::SymmetricKey* key) { |
- CHECK(input.GetDataSize()); |
- CHECK(input.GetDecryptConfig()); |
+ CHECK(input.data_size()); |
+ CHECK(input.decrypt_config()); |
CHECK(key); |
crypto::Encryptor encryptor; |
@@ -57,19 +57,19 @@ static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input, |
return NULL; |
} |
- DCHECK_EQ(input.GetDecryptConfig()->iv().size(), |
+ DCHECK_EQ(input.decrypt_config()->iv().size(), |
static_cast<size_t>(DecryptConfig::kDecryptionKeySize)); |
- if (!encryptor.SetCounter(input.GetDecryptConfig()->iv())) { |
+ if (!encryptor.SetCounter(input.decrypt_config()->iv())) { |
DVLOG(1) << "Could not set counter block."; |
return NULL; |
} |
- const int data_offset = input.GetDecryptConfig()->data_offset(); |
+ const int data_offset = input.decrypt_config()->data_offset(); |
const char* sample = |
- reinterpret_cast<const char*>(input.GetData() + data_offset); |
- int sample_size = input.GetDataSize() - data_offset; |
+ reinterpret_cast<const char*>(input.data() + data_offset); |
+ int sample_size = input.data_size() - data_offset; |
- if (input.GetDecryptConfig()->subsamples().empty()) { |
+ if (input.decrypt_config()->subsamples().empty()) { |
std::string decrypted_text; |
base::StringPiece encrypted_text(sample, sample_size); |
if (!encryptor.Decrypt(encrypted_text, &decrypted_text)) { |
@@ -84,7 +84,7 @@ static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input, |
} |
const std::vector<SubsampleEntry>& subsamples = |
- input.GetDecryptConfig()->subsamples(); |
+ input.decrypt_config()->subsamples(); |
int total_clear_size = 0; |
int total_encrypted_size = 0; |
@@ -104,8 +104,10 @@ static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input, |
// copy the decrypted bytes over the encrypted bytes in the output. |
// TODO(strobe): attempt to reduce number of memory copies |
scoped_ptr<uint8[]> encrypted_bytes(new uint8[total_encrypted_size]); |
- CopySubsamples(subsamples, kSrcContainsClearBytes, |
- reinterpret_cast<const uint8*>(sample), encrypted_bytes.get()); |
+ CopySubsamples(subsamples, |
+ kSrcContainsClearBytes, |
+ reinterpret_cast<const uint8*>(sample), |
+ encrypted_bytes.get()); |
base::StringPiece encrypted_text( |
reinterpret_cast<const char*>(encrypted_bytes.get()), |
@@ -118,9 +120,10 @@ static scoped_refptr<DecoderBuffer> DecryptData(const DecoderBuffer& input, |
scoped_refptr<DecoderBuffer> output = DecoderBuffer::CopyFrom( |
reinterpret_cast<const uint8*>(sample), sample_size); |
- CopySubsamples(subsamples, kDstContainsClearBytes, |
+ CopySubsamples(subsamples, |
+ kDstContainsClearBytes, |
reinterpret_cast<const uint8*>(decrypted_text.data()), |
- output->GetWritableData()); |
+ output->writable_data()); |
return output; |
} |
@@ -131,12 +134,9 @@ AesDecryptor::AesDecryptor(const KeyAddedCB& key_added_cb, |
: key_added_cb_(key_added_cb), |
key_error_cb_(key_error_cb), |
key_message_cb_(key_message_cb), |
- need_key_cb_(need_key_cb) { |
-} |
+ need_key_cb_(need_key_cb) {} |
-AesDecryptor::~AesDecryptor() { |
- STLDeleteValues(&key_map_); |
-} |
+AesDecryptor::~AesDecryptor() { STLDeleteValues(&key_map_); } |
bool AesDecryptor::GenerateKeyRequest(const std::string& type, |
const uint8* init_data, |
@@ -147,8 +147,8 @@ bool AesDecryptor::GenerateKeyRequest(const std::string& type, |
// just fire the event with the |init_data| as the request. |
std::string message; |
if (init_data && init_data_length) { |
- message = std::string(reinterpret_cast<const char*>(init_data), |
- init_data_length); |
+ message = |
+ std::string(reinterpret_cast<const char*>(init_data), init_data_length); |
} |
key_message_cb_.Run(session_id_string, message, std::string()); |
@@ -173,7 +173,7 @@ void AesDecryptor::AddKey(const uint8* key, |
// TODO(xhwang): Fix the decryptor to accept no |init_data|. See |
// http://crbug.com/123265. Until then, ensure a non-empty value is passed. |
- static const uint8 kDummyInitData[1] = { 0 }; |
+ static const uint8 kDummyInitData[1] = {0}; |
if (!init_data) { |
init_data = kDummyInitData; |
init_data_length = arraysize(kDummyInitData); |
@@ -183,7 +183,7 @@ void AesDecryptor::AddKey(const uint8* key, |
// compliant later (http://crbug.com/123262, http://crbug.com/123265). |
std::string key_id_string(reinterpret_cast<const char*>(init_data), |
init_data_length); |
- std::string key_string(reinterpret_cast<const char*>(key) , key_length); |
+ std::string key_string(reinterpret_cast<const char*>(key), key_length); |
scoped_ptr<DecryptionKey> decryption_key(new DecryptionKey(key_string)); |
if (!decryption_key) { |
DVLOG(1) << "Could not create key."; |
@@ -208,12 +208,9 @@ void AesDecryptor::AddKey(const uint8* key, |
key_added_cb_.Run(session_id); |
} |
-void AesDecryptor::CancelKeyRequest(const std::string& session_id) { |
-} |
+void AesDecryptor::CancelKeyRequest(const std::string& session_id) {} |
-Decryptor* AesDecryptor::GetDecryptor() { |
- return this; |
-} |
+Decryptor* AesDecryptor::GetDecryptor() { return this; } |
void AesDecryptor::RegisterNewKeyCB(StreamType stream_type, |
const NewKeyCB& new_key_cb) { |
@@ -232,16 +229,16 @@ void AesDecryptor::RegisterNewKeyCB(StreamType stream_type, |
void AesDecryptor::Decrypt(StreamType stream_type, |
const scoped_refptr<DecoderBuffer>& encrypted, |
const DecryptCB& decrypt_cb) { |
- CHECK(encrypted->GetDecryptConfig()); |
+ CHECK(encrypted->decrypt_config()); |
scoped_refptr<DecoderBuffer> decrypted; |
// An empty iv string signals that the frame is unencrypted. |
- if (encrypted->GetDecryptConfig()->iv().empty()) { |
- int data_offset = encrypted->GetDecryptConfig()->data_offset(); |
- decrypted = DecoderBuffer::CopyFrom(encrypted->GetData() + data_offset, |
- encrypted->GetDataSize() - data_offset); |
+ if (encrypted->decrypt_config()->iv().empty()) { |
+ int data_offset = encrypted->decrypt_config()->data_offset(); |
+ decrypted = DecoderBuffer::CopyFrom(encrypted->data() + data_offset, |
+ encrypted->data_size() - data_offset); |
} else { |
- const std::string& key_id = encrypted->GetDecryptConfig()->key_id(); |
+ const std::string& key_id = encrypted->decrypt_config()->key_id(); |
DecryptionKey* key = GetKey(key_id); |
if (!key) { |
DVLOG(1) << "Could not find a matching key for the given key ID."; |
@@ -258,8 +255,8 @@ void AesDecryptor::Decrypt(StreamType stream_type, |
} |
} |
- decrypted->SetTimestamp(encrypted->GetTimestamp()); |
- decrypted->SetDuration(encrypted->GetDuration()); |
+ decrypted->set_timestamp(encrypted->timestamp()); |
+ decrypted->set_duration(encrypted->duration()); |
decrypt_cb.Run(kSuccess, decrypted); |
} |
@@ -321,15 +318,14 @@ AesDecryptor::DecryptionKey* AesDecryptor::GetKey( |
} |
AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret) |
- : secret_(secret) { |
-} |
+ : secret_(secret) {} |
AesDecryptor::DecryptionKey::~DecryptionKey() {} |
bool AesDecryptor::DecryptionKey::Init() { |
CHECK(!secret_.empty()); |
- decryption_key_.reset(crypto::SymmetricKey::Import( |
- crypto::SymmetricKey::AES, secret_)); |
+ decryption_key_.reset( |
+ crypto::SymmetricKey::Import(crypto::SymmetricKey::AES, secret_)); |
if (!decryption_key_) |
return false; |
return true; |