| Index: media/cdm/aes_decryptor.cc
|
| diff --git a/media/cdm/aes_decryptor.cc b/media/cdm/aes_decryptor.cc
|
| index 0ecaa0b690a8d243114ec1e8e58cbb8534832731..b0e1de46806b8f2fd40febe80e35ba82add19743 100644
|
| --- a/media/cdm/aes_decryptor.cc
|
| +++ b/media/cdm/aes_decryptor.cc
|
| @@ -251,8 +251,8 @@ AesDecryptor::~AesDecryptor() {
|
| void AesDecryptor::SetServerCertificate(
|
| const std::vector<uint8_t>& certificate,
|
| std::unique_ptr<SimpleCdmPromise> promise) {
|
| - promise->reject(
|
| - NOT_SUPPORTED_ERROR, 0, "SetServerCertificate() is not supported.");
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0,
|
| + "SetServerCertificate() is not supported.");
|
| }
|
|
|
| void AesDecryptor::CreateSessionAndGenerateRequest(
|
| @@ -273,7 +273,7 @@ void AesDecryptor::CreateSessionAndGenerateRequest(
|
| // |init_data| is simply the key needed.
|
| if (init_data.size() < limits::kMinKeyIdLength ||
|
| init_data.size() > limits::kMaxKeyIdLength) {
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0, "Incorrect length");
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0, "Incorrect length");
|
| return;
|
| }
|
| keys.push_back(init_data);
|
| @@ -282,12 +282,13 @@ void AesDecryptor::CreateSessionAndGenerateRequest(
|
| #if defined(USE_PROPRIETARY_CODECS)
|
| // |init_data| is a set of 0 or more concatenated 'pssh' boxes.
|
| if (!GetKeyIdsForCommonSystemId(init_data, &keys)) {
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0, "No supported PSSH box found.");
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0,
|
| + "No supported PSSH box found.");
|
| return;
|
| }
|
| break;
|
| #else
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0,
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0,
|
| "Initialization data type CENC is not supported.");
|
| return;
|
| #endif
|
| @@ -296,14 +297,15 @@ void AesDecryptor::CreateSessionAndGenerateRequest(
|
| std::string error_message;
|
| if (!ExtractKeyIdsFromKeyIdsInitData(init_data_string, &keys,
|
| &error_message)) {
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0, error_message);
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0, error_message);
|
| return;
|
| }
|
| break;
|
| }
|
| default:
|
| NOTREACHED();
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0, "init_data_type not supported.");
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0,
|
| + "init_data_type not supported.");
|
| return;
|
| }
|
| CreateLicenseRequest(keys, session_type, &message);
|
| @@ -318,7 +320,8 @@ void AesDecryptor::LoadSession(SessionType session_type,
|
| std::unique_ptr<NewSessionCdmPromise> promise) {
|
| // TODO(xhwang): Change this to NOTREACHED() when blink checks for key systems
|
| // that do not support loadSession. See http://crbug.com/342481
|
| - promise->reject(NOT_SUPPORTED_ERROR, 0, "LoadSession() is not supported.");
|
| + promise->reject(CdmPromise::NOT_SUPPORTED_ERROR, 0,
|
| + "LoadSession() is not supported.");
|
| }
|
|
|
| void AesDecryptor::UpdateSession(const std::string& session_id,
|
| @@ -328,7 +331,8 @@ void AesDecryptor::UpdateSession(const std::string& session_id,
|
|
|
| // TODO(jrummell): Convert back to a DCHECK once prefixed EME is removed.
|
| if (valid_sessions_.find(session_id) == valid_sessions_.end()) {
|
| - promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Session does not exist.");
|
| return;
|
| }
|
|
|
| @@ -337,15 +341,15 @@ void AesDecryptor::UpdateSession(const std::string& session_id,
|
| KeyIdAndKeyPairs keys;
|
| SessionType session_type = MediaKeys::TEMPORARY_SESSION;
|
| if (!ExtractKeysFromJWKSet(key_string, &keys, &session_type)) {
|
| - promise->reject(
|
| - INVALID_ACCESS_ERROR, 0, "Response is not a valid JSON Web Key Set.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Response is not a valid JSON Web Key Set.");
|
| return;
|
| }
|
|
|
| // Make sure that at least one key was extracted.
|
| if (keys.empty()) {
|
| - promise->reject(
|
| - INVALID_ACCESS_ERROR, 0, "Response does not contain any keys.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Response does not contain any keys.");
|
| return;
|
| }
|
|
|
| @@ -354,7 +358,8 @@ void AesDecryptor::UpdateSession(const std::string& session_id,
|
| if (it->second.length() !=
|
| static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) {
|
| DVLOG(1) << "Invalid key length: " << it->second.length();
|
| - promise->reject(INVALID_ACCESS_ERROR, 0, "Invalid key length.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Invalid key length.");
|
| return;
|
| }
|
|
|
| @@ -364,7 +369,8 @@ void AesDecryptor::UpdateSession(const std::string& session_id,
|
| key_added = true;
|
|
|
| if (!AddDecryptionKey(session_id, it->first, it->second)) {
|
| - promise->reject(INVALID_ACCESS_ERROR, 0, "Unable to add key.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Unable to add key.");
|
| return;
|
| }
|
| }
|
| @@ -415,7 +421,8 @@ void AesDecryptor::CloseSession(const std::string& session_id,
|
| void AesDecryptor::RemoveSession(const std::string& session_id,
|
| std::unique_ptr<SimpleCdmPromise> promise) {
|
| NOTIMPLEMENTED() << "Need to address https://crbug.com/616166.";
|
| - promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist.");
|
| + promise->reject(CdmPromise::INVALID_ACCESS_ERROR, 0,
|
| + "Session does not exist.");
|
| }
|
|
|
| CdmContext* AesDecryptor::GetCdmContext() {
|
|
|