| Index: media/cdm/aes_decryptor_unittest.cc
|
| diff --git a/media/cdm/aes_decryptor_unittest.cc b/media/cdm/aes_decryptor_unittest.cc
|
| index 12bdbc94250fa3b05a1676257af6c4b2256e5a7e..5d41515be2afd8d9653ca0d8222ba4d388108195 100644
|
| --- a/media/cdm/aes_decryptor_unittest.cc
|
| +++ b/media/cdm/aes_decryptor_unittest.cc
|
| @@ -38,12 +38,8 @@ const uint8 kKeyId[] = {
|
| 0x00, 0x01, 0x02, 0x03
|
| };
|
|
|
| -const uint8 kKey[] = {
|
| - // base64 equivalent is BAUGBwgJCgsMDQ4PEBESEw
|
| - 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
|
| - 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13
|
| -};
|
| -
|
| +// Key is 0x0405060708090a0b0c0d0e0f10111213,
|
| +// base64 equivalent is BAUGBwgJCgsMDQ4PEBESEw.
|
| const char kKeyAsJWK[] =
|
| "{"
|
| " \"keys\": ["
|
| @@ -225,25 +221,6 @@ class AesDecryptorTest : public testing::Test {
|
| KEY_ERROR
|
| };
|
|
|
| - void AddRawKeyAndExpect(const std::vector<uint8>& key_id,
|
| - const std::vector<uint8>& key,
|
| - AddKeyExpectation result) {
|
| - // TODO(jrummell): Remove once raw keys no longer supported.
|
| - DCHECK(!key_id.empty());
|
| - DCHECK(!key.empty());
|
| -
|
| - if (result == KEY_ADDED) {
|
| - EXPECT_CALL(*this, KeyAdded(reference_id_));
|
| - } else if (result == KEY_ERROR) {
|
| - EXPECT_CALL(*this, KeyError(reference_id_, MediaKeys::kUnknownError, 0));
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| -
|
| - decryptor_.AddKey(
|
| - reference_id_, &key[0], key.size(), &key_id[0], key_id.size());
|
| - }
|
| -
|
| void AddKeyAndExpect(const std::string& key, AddKeyExpectation result) {
|
| DCHECK(!key.empty());
|
|
|
| @@ -416,10 +393,6 @@ TEST_F(AesDecryptorTest, KeyReplacement) {
|
| TEST_F(AesDecryptorTest, WrongSizedKey) {
|
| GenerateKeyRequest(key_id_);
|
| AddKeyAndExpect(kWrongSizedKeyAsJWK, KEY_ERROR);
|
| -
|
| - // Repeat for a raw key. Use "-1" to create a wrong sized key.
|
| - std::vector<uint8> wrong_sized_key(kKey, kKey + arraysize(kKey) - 1);
|
| - AddRawKeyAndExpect(key_id_, wrong_sized_key, KEY_ERROR);
|
| }
|
|
|
| TEST_F(AesDecryptorTest, MultipleKeysAndFrames) {
|
| @@ -687,15 +660,4 @@ TEST_F(AesDecryptorTest, JWKKey) {
|
| AddKeyAndExpect(key8, KEY_ERROR);
|
| }
|
|
|
| -TEST_F(AesDecryptorTest, RawKey) {
|
| - // Verify that v0.1b keys (raw key) is still supported. Raw keys are
|
| - // 16 bytes long. Use the undecoded value of |kKey|.
|
| - GenerateKeyRequest(key_id_);
|
| - AddRawKeyAndExpect(
|
| - key_id_, std::vector<uint8>(kKey, kKey + arraysize(kKey)), KEY_ADDED);
|
| - scoped_refptr<DecoderBuffer> encrypted_buffer = CreateEncryptedBuffer(
|
| - encrypted_data_, key_id_, iv_, 0, no_subsample_entries_);
|
| - DecryptAndExpect(encrypted_buffer, original_data_, SUCCESS);
|
| -}
|
| -
|
| } // namespace media
|
|
|