| Index: media/cdm/proxy_decryptor.cc
|
| diff --git a/media/cdm/proxy_decryptor.cc b/media/cdm/proxy_decryptor.cc
|
| index 3f1911b97876effce81a759e52b83bc32ec761bf..02ef8bf654f8f8410ed32f4d424635828d054e6f 100644
|
| --- a/media/cdm/proxy_decryptor.cc
|
| +++ b/media/cdm/proxy_decryptor.cc
|
| @@ -133,15 +133,13 @@ bool ProxyDecryptor::GenerateKeyRequest(const std::string& init_data_type,
|
| return true;
|
| }
|
|
|
| -#if defined(OS_CHROMEOS)
|
| +#if defined(OS_CHROMEOS) || defined(OS_ANDROID)
|
| media_permission_->RequestPermission(
|
| MediaPermission::PROTECTED_MEDIA_IDENTIFIER, security_origin_,
|
| base::Bind(&ProxyDecryptor::OnPermissionStatus,
|
| weak_ptr_factory_.GetWeakPtr(), session_type, init_data_type,
|
| init_data_vector, base::Passed(&promise)));
|
| #else
|
| - // TODO(xhwang): Fix the Android path by requesting permission for key systems
|
| - // that don't use AesDecryptor in M43.
|
| OnPermissionStatus(session_type, init_data_type, init_data_vector,
|
| promise.Pass(), true /* granted */);
|
| #endif
|
| @@ -157,8 +155,8 @@ void ProxyDecryptor::OnPermissionStatus(
|
| bool granted) {
|
| // ProxyDecryptor is only used by Prefixed EME, where RequestPermission() is
|
| // only for triggering the permission UI. Later CheckPermission() will be
|
| - // called (e.g. in PlatformVerificationFlow) and the permission status will be
|
| - // evaluated there.
|
| + // called (e.g. in PlatformVerificationFlow on ChromeOS; in BrowserCdmManager
|
| + // on Android) and the permission status will be evaluated then.
|
| DVLOG_IF(1, !granted) << "Permission request rejected.";
|
|
|
| const uint8* init_data_vector_data =
|
|
|