Index: media/crypto/aes_decryptor_unittest.cc |
diff --git a/media/crypto/aes_decryptor_unittest.cc b/media/crypto/aes_decryptor_unittest.cc |
index dac0208dd1f7d90158f7de134f7c949c9ac889db..b6c980516eea89266f93ba2cb3a60f19dc7b62af 100644 |
--- a/media/crypto/aes_decryptor_unittest.cc |
+++ b/media/crypto/aes_decryptor_unittest.cc |
@@ -24,6 +24,10 @@ using ::testing::StrNe; |
namespace media { |
+MATCHER_P2(ArrayEq, array, size, "") { |
+ return !memcmp(arg, array, size); |
+} |
+ |
// |encrypted_data| is encrypted from |plain_text| using |key|. |key_id| is |
// used to distinguish |key|. |
struct WebmEncryptedData { |
@@ -59,8 +63,7 @@ const WebmEncryptedData kWebmEncryptedFrames[] = { |
0xff, 0xf0, 0xd1, 0x12, 0xd5, 0x24, 0x81, 0x96, |
0x55, 0x1b, 0x68, 0x9f, 0x38, 0x91, 0x85 |
}, 23 |
- }, |
- { |
+ }, { |
// plaintext |
"Changed Original data.", 22, |
// key_id |
@@ -78,8 +81,7 @@ const WebmEncryptedData kWebmEncryptedFrames[] = { |
0x79, 0x1c, 0x8e, 0x25, 0xd7, 0x17, 0xe7, 0x5e, |
0x16, 0xe3, 0x40, 0x08, 0x27, 0x11, 0xe9 |
}, 31 |
- }, |
- { |
+ }, { |
// plaintext |
"Original data.", 14, |
// key_id |
@@ -95,8 +97,7 @@ const WebmEncryptedData kWebmEncryptedFrames[] = { |
0x00, 0x9c, 0x71, 0x26, 0x57, 0x3e, 0x25, 0x37, |
0xf7, 0x31, 0x81, 0x19, 0x64, 0xce, 0xbc |
}, 23 |
- }, |
- { |
+ }, { |
// plaintext |
"Changed Original data.", 22, |
// key_id |
@@ -115,8 +116,6 @@ const WebmEncryptedData kWebmEncryptedFrames[] = { |
} |
}; |
- |
- |
static const uint8 kWebmWrongSizedKey[] = { 0x20, 0x20 }; |
static const uint8 kSubsampleOriginalData[] = "Original subsample data."; |
@@ -241,7 +240,8 @@ class AesDecryptorTest : public testing::Test { |
protected: |
void GenerateKeyRequest(const uint8* key_id, int key_id_size) { |
EXPECT_CALL(client_, KeyMessageMock(kClearKeySystem, StrNe(""), |
- NotNull(), Gt(0), "")) |
+ ArrayEq(key_id, key_id_size), |
+ key_id_size, "")) |
.WillOnce(SaveArg<1>(&session_id_string_)); |
EXPECT_TRUE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", |
key_id, key_id_size)); |
@@ -315,6 +315,10 @@ class AesDecryptorTest : public testing::Test { |
std::vector<SubsampleEntry> subsample_entries_; |
}; |
+TEST_F(AesDecryptorTest, GenerateKeyRequestWithNullInitData) { |
+ EXPECT_FALSE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", NULL, 0)); |
+} |
+ |
TEST_F(AesDecryptorTest, NormalWebMDecryption) { |
const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; |
GenerateKeyRequest(frame.key_id, frame.key_id_size); |