Index: media/filters/pipeline_integration_test.cc |
diff --git a/media/filters/pipeline_integration_test.cc b/media/filters/pipeline_integration_test.cc |
index dffc5da96792bd4de4509559c5fb187cd603cfd7..beb9bd063de134a767fa461fb1fdad82f3488402 100644 |
--- a/media/filters/pipeline_integration_test.cc |
+++ b/media/filters/pipeline_integration_test.cc |
@@ -134,9 +134,9 @@ class FakeEncryptedMedia { |
FAIL() << "Unexpected Key Error"; |
} |
- virtual void NeedKey(const std::string& type, |
- const std::vector<uint8>& init_data, |
- AesDecryptor* decryptor) = 0; |
+ virtual void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data, |
+ AesDecryptor* decryptor) = 0; |
}; |
FakeEncryptedMedia(AppBase* app) |
@@ -175,9 +175,9 @@ class FakeEncryptedMedia { |
web_session_id, error_name, system_code, error_message); |
} |
- void NeedKey(const std::string& type, |
- const std::vector<uint8>& init_data) { |
- app_->NeedKey(type, init_data, &decryptor_); |
+ void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data) { |
+ app_->OnEncryptedMediaInitData(init_data_type, init_data, &decryptor_); |
} |
private: |
@@ -264,13 +264,11 @@ class KeyProvidingApp : public FakeEncryptedMedia::AppBase { |
EXPECT_EQ(has_additional_usable_key, true); |
} |
- void NeedKey(const std::string& type, |
- const std::vector<uint8>& init_data, |
- AesDecryptor* decryptor) override { |
+ void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data, |
+ AesDecryptor* decryptor) override { |
if (current_session_id_.empty()) { |
- decryptor->CreateSession(type, |
- kInitData, |
- arraysize(kInitData), |
+ decryptor->CreateSession(init_data_type, kInitData, arraysize(kInitData), |
MediaKeys::TEMPORARY_SESSION, |
CreateSessionPromise(RESOLVED)); |
EXPECT_FALSE(current_session_id_.empty()); |
@@ -281,7 +279,7 @@ class KeyProvidingApp : public FakeEncryptedMedia::AppBase { |
// correct key ID. |
const uint8* key_id = init_data.empty() ? NULL : &init_data[0]; |
size_t key_id_length = init_data.size(); |
- if (type == kCencInitDataType) { |
+ if (init_data_type == kCencInitDataType) { |
key_id = kKeyId; |
key_id_length = arraysize(kKeyId); |
} |
@@ -302,23 +300,22 @@ class RotatingKeyProvidingApp : public KeyProvidingApp { |
public: |
RotatingKeyProvidingApp() : num_distint_need_key_calls_(0) {} |
~RotatingKeyProvidingApp() override { |
- // Expect that NeedKey is fired multiple times with different |init_data|. |
+ // Expect that OnEncryptedMediaInitData is fired multiple times with |
+ // different |init_data|. |
EXPECT_GT(num_distint_need_key_calls_, 1u); |
} |
- void NeedKey(const std::string& type, |
- const std::vector<uint8>& init_data, |
- AesDecryptor* decryptor) override { |
+ void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data, |
+ AesDecryptor* decryptor) override { |
// Skip the request if the |init_data| has been seen. |
if (init_data == prev_init_data_) |
return; |
prev_init_data_ = init_data; |
++num_distint_need_key_calls_; |
- decryptor->CreateSession(type, |
- vector_as_array(&init_data), |
- init_data.size(), |
- MediaKeys::TEMPORARY_SESSION, |
+ decryptor->CreateSession(init_data_type, vector_as_array(&init_data), |
+ init_data.size(), MediaKeys::TEMPORARY_SESSION, |
CreateSessionPromise(RESOLVED)); |
std::vector<uint8> key_id; |
@@ -392,9 +389,9 @@ class NoResponseApp : public FakeEncryptedMedia::AppBase { |
EXPECT_EQ(has_additional_usable_key, true); |
} |
- void NeedKey(const std::string& type, |
- const std::vector<uint8>& init_data, |
- AesDecryptor* decryptor) override {} |
+ void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data, |
+ AesDecryptor* decryptor) override {} |
}; |
// Helper class that emulates calls made on the ChunkDemuxer by the |
@@ -409,7 +406,7 @@ class MockMediaSource { |
mimetype_(mimetype), |
chunk_demuxer_(new ChunkDemuxer( |
base::Bind(&MockMediaSource::DemuxerOpened, base::Unretained(this)), |
- base::Bind(&MockMediaSource::DemuxerNeedKey, |
+ base::Bind(&MockMediaSource::OnEncryptedMediaInitData, |
base::Unretained(this)), |
LogCB(), |
scoped_refptr<MediaLog>(new MediaLog()), |
@@ -428,8 +425,9 @@ class MockMediaSource { |
scoped_ptr<Demuxer> GetDemuxer() { return owned_chunk_demuxer_.Pass(); } |
- void set_need_key_cb(const Demuxer::NeedKeyCB& need_key_cb) { |
- need_key_cb_ = need_key_cb; |
+ void set_encrypted_media_init_data_cb( |
+ const Demuxer::EncryptedMediaInitDataCB& encrypted_media_init_data_cb) { |
+ encrypted_media_init_data_cb_ = encrypted_media_init_data_cb; |
} |
void Seek(base::TimeDelta seek_time, int new_position, int seek_append_size) { |
@@ -535,11 +533,11 @@ class MockMediaSource { |
AppendData(initial_append_size_); |
} |
- void DemuxerNeedKey(const std::string& type, |
- const std::vector<uint8>& init_data) { |
+ void OnEncryptedMediaInitData(const std::string& init_data_type, |
+ const std::vector<uint8>& init_data) { |
DCHECK(!init_data.empty()); |
- CHECK(!need_key_cb_.is_null()); |
- need_key_cb_.Run(type, init_data); |
+ CHECK(!encrypted_media_init_data_cb_.is_null()); |
+ encrypted_media_init_data_cb_.Run(init_data_type, init_data); |
} |
base::TimeDelta last_timestamp_offset() const { |
@@ -555,7 +553,7 @@ class MockMediaSource { |
std::string mimetype_; |
ChunkDemuxer* chunk_demuxer_; |
scoped_ptr<Demuxer> owned_chunk_demuxer_; |
- Demuxer::NeedKeyCB need_key_cb_; |
+ Demuxer::EncryptedMediaInitDataCB encrypted_media_init_data_cb_; |
base::TimeDelta last_timestamp_offset_; |
}; |
@@ -626,8 +624,9 @@ class PipelineIntegrationTest |
base::Closure(), base::Bind(&PipelineIntegrationTest::OnAddTextTrack, |
base::Unretained(this))); |
- source->set_need_key_cb(base::Bind(&FakeEncryptedMedia::NeedKey, |
- base::Unretained(encrypted_media))); |
+ source->set_encrypted_media_init_data_cb( |
+ base::Bind(&FakeEncryptedMedia::OnEncryptedMediaInitData, |
+ base::Unretained(encrypted_media))); |
message_loop_.Run(); |
EXPECT_EQ(PIPELINE_OK, pipeline_status_); |
@@ -719,8 +718,9 @@ TEST_F(PipelineIntegrationTest, F32PlaybackHashed) { |
TEST_F(PipelineIntegrationTest, BasicPlaybackEncrypted) { |
FakeEncryptedMedia encrypted_media(new KeyProvidingApp()); |
- set_need_key_cb(base::Bind(&FakeEncryptedMedia::NeedKey, |
- base::Unretained(&encrypted_media))); |
+ set_encrypted_media_init_data_cb( |
+ base::Bind(&FakeEncryptedMedia::OnEncryptedMediaInitData, |
+ base::Unretained(&encrypted_media))); |
ASSERT_EQ(PIPELINE_OK, Start("bear-320x240-av_enc-av.webm", |
encrypted_media.GetCdmContext())); |