| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "config.h" | 5 #include "config.h" |
| 6 #include "modules/encryptedmedia/HTMLMediaElementEncryptedMedia.h" | 6 #include "modules/encryptedmedia/HTMLMediaElementEncryptedMedia.h" |
| 7 | 7 |
| 8 #include "bindings/core/v8/ExceptionState.h" | 8 #include "bindings/core/v8/ExceptionState.h" |
| 9 #include "bindings/core/v8/ScriptPromise.h" | 9 #include "bindings/core/v8/ScriptPromise.h" |
| 10 #include "bindings/core/v8/ScriptPromiseResolver.h" | 10 #include "bindings/core/v8/ScriptPromiseResolver.h" |
| (...skipping 277 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 288 fail(code, errorMessage); | 288 fail(code, errorMessage); |
| 289 } | 289 } |
| 290 | 290 |
| 291 DEFINE_TRACE(SetMediaKeysHandler) | 291 DEFINE_TRACE(SetMediaKeysHandler) |
| 292 { | 292 { |
| 293 visitor->trace(m_element); | 293 visitor->trace(m_element); |
| 294 visitor->trace(m_newMediaKeys); | 294 visitor->trace(m_newMediaKeys); |
| 295 ScriptPromiseResolver::trace(visitor); | 295 ScriptPromiseResolver::trace(visitor); |
| 296 } | 296 } |
| 297 | 297 |
| 298 HTMLMediaElementEncryptedMedia::HTMLMediaElementEncryptedMedia() | 298 HTMLMediaElementEncryptedMedia::HTMLMediaElementEncryptedMedia(HTMLMediaElement&
element) |
| 299 : m_emeMode(EmeModeNotSelected) | 299 : m_mediaElement(element) |
| 300 , m_emeMode(EmeModeNotSelected) |
| 300 , m_isWaitingForKey(false) | 301 , m_isWaitingForKey(false) |
| 301 { | 302 { |
| 302 } | 303 } |
| 303 | 304 |
| 304 #if !ENABLE(OILPAN) | 305 #if !ENABLE(OILPAN) |
| 305 HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMedia() | 306 HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMedia() |
| 306 { | 307 { |
| 307 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMe
dia"); | 308 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMe
dia"); |
| 308 if (m_mediaKeys) | 309 if (m_mediaKeys) |
| 309 m_mediaKeys->clearMediaElement(); | 310 m_mediaKeys->clearMediaElement(); |
| 310 } | 311 } |
| 311 #endif | 312 #endif |
| 312 | 313 |
| 313 const char* HTMLMediaElementEncryptedMedia::supplementName() | 314 const char* HTMLMediaElementEncryptedMedia::supplementName() |
| 314 { | 315 { |
| 315 return "HTMLMediaElementEncryptedMedia"; | 316 return "HTMLMediaElementEncryptedMedia"; |
| 316 } | 317 } |
| 317 | 318 |
| 318 HTMLMediaElementEncryptedMedia& HTMLMediaElementEncryptedMedia::from(HTMLMediaEl
ement& element) | 319 HTMLMediaElementEncryptedMedia& HTMLMediaElementEncryptedMedia::from(HTMLMediaEl
ement& element) |
| 319 { | 320 { |
| 320 HTMLMediaElementEncryptedMedia* supplement = static_cast<HTMLMediaElementEnc
ryptedMedia*>(WillBeHeapSupplement<HTMLMediaElement>::from(element, supplementNa
me())); | 321 HTMLMediaElementEncryptedMedia* supplement = static_cast<HTMLMediaElementEnc
ryptedMedia*>(WillBeHeapSupplement<HTMLMediaElement>::from(element, supplementNa
me())); |
| 321 if (!supplement) { | 322 if (!supplement) { |
| 322 supplement = new HTMLMediaElementEncryptedMedia(); | 323 supplement = new HTMLMediaElementEncryptedMedia(element); |
| 323 provideTo(element, supplementName(), adoptPtrWillBeNoop(supplement)); | 324 provideTo(element, supplementName(), adoptPtrWillBeNoop(supplement)); |
| 324 } | 325 } |
| 325 return *supplement; | 326 return *supplement; |
| 326 } | 327 } |
| 327 | 328 |
| 328 bool HTMLMediaElementEncryptedMedia::setEmeMode(EmeMode emeMode) | 329 bool HTMLMediaElementEncryptedMedia::setEmeMode(EmeMode emeMode) |
| 329 { | 330 { |
| 330 if (m_emeMode != EmeModeNotSelected && m_emeMode != emeMode) | 331 if (m_emeMode != EmeModeNotSelected && m_emeMode != emeMode) |
| 331 return false; | 332 return false; |
| 332 | 333 |
| 333 m_emeMode = emeMode; | 334 m_emeMode = emeMode; |
| 334 return true; | 335 return true; |
| 335 } | 336 } |
| 336 | 337 |
| 337 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule() | |
| 338 { | |
| 339 return m_mediaKeys ? m_mediaKeys->contentDecryptionModule() : 0; | |
| 340 } | |
| 341 | |
| 342 MediaKeys* HTMLMediaElementEncryptedMedia::mediaKeys(HTMLMediaElement& element) | 338 MediaKeys* HTMLMediaElementEncryptedMedia::mediaKeys(HTMLMediaElement& element) |
| 343 { | 339 { |
| 344 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 340 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); |
| 345 return thisElement.m_mediaKeys.get(); | 341 return thisElement.m_mediaKeys.get(); |
| 346 } | 342 } |
| 347 | 343 |
| 348 ScriptPromise HTMLMediaElementEncryptedMedia::setMediaKeys(ScriptState* scriptSt
ate, HTMLMediaElement& element, MediaKeys* mediaKeys) | 344 ScriptPromise HTMLMediaElementEncryptedMedia::setMediaKeys(ScriptState* scriptSt
ate, HTMLMediaElement& element, MediaKeys* mediaKeys) |
| 349 { | 345 { |
| 350 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 346 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); |
| 351 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::setMediaKeys current(%p), ne
w(%p)", thisElement.m_mediaKeys.get(), mediaKeys); | 347 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::setMediaKeys current(%p), ne
w(%p)", thisElement.m_mediaKeys.get(), mediaKeys); |
| (...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 494 | 490 |
| 495 if (!webMediaPlayer) { | 491 if (!webMediaPlayer) { |
| 496 exceptionState.throwDOMException(InvalidStateError, "No media has been l
oaded."); | 492 exceptionState.throwDOMException(InvalidStateError, "No media has been l
oaded."); |
| 497 return; | 493 return; |
| 498 } | 494 } |
| 499 | 495 |
| 500 WebMediaPlayer::MediaKeyException result = webMediaPlayer->cancelKeyRequest(
keySystem, sessionId); | 496 WebMediaPlayer::MediaKeyException result = webMediaPlayer->cancelKeyRequest(
keySystem, sessionId); |
| 501 throwExceptionIfMediaKeyExceptionOccurred(keySystem, sessionId, result, exce
ptionState); | 497 throwExceptionIfMediaKeyExceptionOccurred(keySystem, sessionId, result, exce
ptionState); |
| 502 } | 498 } |
| 503 | 499 |
| 504 void HTMLMediaElementEncryptedMedia::keyAdded(HTMLMediaElement& element, const S
tring& keySystem, const String& sessionId) | 500 void HTMLMediaElementEncryptedMedia::keyAdded(const WebString& keySystem, const
WebString& sessionId) |
| 505 { | 501 { |
| 506 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyAdded"); | 502 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyAdded"); |
| 507 | 503 |
| 508 MediaKeyEventInit initializer; | 504 MediaKeyEventInit initializer; |
| 509 initializer.setKeySystem(keySystem); | 505 initializer.setKeySystem(keySystem); |
| 510 initializer.setSessionId(sessionId); | 506 initializer.setSessionId(sessionId); |
| 511 | 507 |
| 512 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyadded, initializer); | 508 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyadded, initializer); |
| 513 event->setTarget(&element); | 509 event->setTarget(&m_mediaElement); |
| 514 element.scheduleEvent(event.release()); | 510 m_mediaElement.scheduleEvent(event.release()); |
| 515 } | 511 } |
| 516 | 512 |
| 517 void HTMLMediaElementEncryptedMedia::keyError(HTMLMediaElement& element, const S
tring& keySystem, const String& sessionId, WebMediaPlayerClient::MediaKeyErrorCo
de errorCode, unsigned short systemCode) | 513 void HTMLMediaElementEncryptedMedia::keyError(const WebString& keySystem, const
WebString& sessionId, WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCode erro
rCode, unsigned short systemCode) |
| 518 { | 514 { |
| 519 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyError: session
ID=%s, errorCode=%d, systemCode=%d", sessionId.utf8().data(), errorCode, systemC
ode); | 515 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyError: session
ID=%s, errorCode=%d, systemCode=%d", sessionId.utf8().data(), errorCode, systemC
ode); |
| 520 | 516 |
| 521 MediaKeyError::Code mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; | 517 MediaKeyError::Code mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; |
| 522 switch (errorCode) { | 518 switch (errorCode) { |
| 523 case WebMediaPlayerClient::MediaKeyErrorCodeUnknown: | 519 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeUnknown: |
| 524 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; | 520 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; |
| 525 break; | 521 break; |
| 526 case WebMediaPlayerClient::MediaKeyErrorCodeClient: | 522 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeClient: |
| 527 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_CLIENT; | 523 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_CLIENT; |
| 528 break; | 524 break; |
| 529 case WebMediaPlayerClient::MediaKeyErrorCodeService: | 525 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeService: |
| 530 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_SERVICE; | 526 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_SERVICE; |
| 531 break; | 527 break; |
| 532 case WebMediaPlayerClient::MediaKeyErrorCodeOutput: | 528 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeOutput: |
| 533 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_OUTPUT; | 529 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_OUTPUT; |
| 534 break; | 530 break; |
| 535 case WebMediaPlayerClient::MediaKeyErrorCodeHardwareChange: | 531 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeHardwareChange: |
| 536 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_HARDWARECHANGE; | 532 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_HARDWARECHANGE; |
| 537 break; | 533 break; |
| 538 case WebMediaPlayerClient::MediaKeyErrorCodeDomain: | 534 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeDomain: |
| 539 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_DOMAIN; | 535 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_DOMAIN; |
| 540 break; | 536 break; |
| 541 } | 537 } |
| 542 | 538 |
| 543 MediaKeyEventInit initializer; | 539 MediaKeyEventInit initializer; |
| 544 initializer.setKeySystem(keySystem); | 540 initializer.setKeySystem(keySystem); |
| 545 initializer.setSessionId(sessionId); | 541 initializer.setSessionId(sessionId); |
| 546 initializer.setErrorCode(MediaKeyError::create(mediaKeyErrorCode)); | 542 initializer.setErrorCode(MediaKeyError::create(mediaKeyErrorCode)); |
| 547 initializer.setSystemCode(systemCode); | 543 initializer.setSystemCode(systemCode); |
| 548 | 544 |
| 549 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyerror, initializer); | 545 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyerror, initializer); |
| 550 event->setTarget(&element); | 546 event->setTarget(&m_mediaElement); |
| 551 element.scheduleEvent(event.release()); | 547 m_mediaElement.scheduleEvent(event.release()); |
| 552 } | 548 } |
| 553 | 549 |
| 554 void HTMLMediaElementEncryptedMedia::keyMessage(HTMLMediaElement& element, const
String& keySystem, const String& sessionId, const unsigned char* message, unsig
ned messageLength, const WebURL& defaultURL) | 550 void HTMLMediaElementEncryptedMedia::keyMessage(const WebString& keySystem, cons
t WebString& sessionId, const unsigned char* message, unsigned messageLength, co
nst WebURL& defaultURL) |
| 555 { | 551 { |
| 556 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyMessage: sessi
onID=%s", sessionId.utf8().data()); | 552 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyMessage: sessi
onID=%s", sessionId.utf8().data()); |
| 557 | 553 |
| 558 MediaKeyEventInit initializer; | 554 MediaKeyEventInit initializer; |
| 559 initializer.setKeySystem(keySystem); | 555 initializer.setKeySystem(keySystem); |
| 560 initializer.setSessionId(sessionId); | 556 initializer.setSessionId(sessionId); |
| 561 initializer.setMessage(DOMUint8Array::create(message, messageLength)); | 557 initializer.setMessage(DOMUint8Array::create(message, messageLength)); |
| 562 initializer.setDefaultURL(KURL(defaultURL)); | 558 initializer.setDefaultURL(KURL(defaultURL)); |
| 563 | 559 |
| 564 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeymessage, initializer); | 560 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeymessage, initializer); |
| 565 event->setTarget(&element); | 561 event->setTarget(&m_mediaElement); |
| 566 element.scheduleEvent(event.release()); | 562 m_mediaElement.scheduleEvent(event.release()); |
| 567 } | 563 } |
| 568 | 564 |
| 569 void HTMLMediaElementEncryptedMedia::encrypted(HTMLMediaElement& element, WebEnc
ryptedMediaInitDataType initDataType, const unsigned char* initData, unsigned in
itDataLength) | 565 void HTMLMediaElementEncryptedMedia::encrypted(WebEncryptedMediaInitDataType ini
tDataType, const unsigned char* initData, unsigned initDataLength) |
| 570 { | 566 { |
| 571 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::encrypted"); | 567 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::encrypted"); |
| 572 | 568 |
| 573 if (RuntimeEnabledFeatures::encryptedMediaEnabled()) { | 569 if (RuntimeEnabledFeatures::encryptedMediaEnabled()) { |
| 574 // Send event for WD EME. | 570 // Send event for WD EME. |
| 575 RefPtrWillBeRawPtr<Event> event; | 571 RefPtrWillBeRawPtr<Event> event; |
| 576 if (element.isMediaDataCORSSameOrigin(element.executionContext()->securi
tyOrigin())) { | 572 if (m_mediaElement.isMediaDataCORSSameOrigin(m_mediaElement.executionCon
text()->securityOrigin())) { |
| 577 event = createEncryptedEvent(initDataType, initData, initDataLength)
; | 573 event = createEncryptedEvent(initDataType, initData, initDataLength)
; |
| 578 } else { | 574 } else { |
| 579 // Current page is not allowed to see content from the media file, | 575 // Current page is not allowed to see content from the media file, |
| 580 // so don't return the initData. However, they still get an event. | 576 // so don't return the initData. However, they still get an event. |
| 581 event = createEncryptedEvent(WebEncryptedMediaInitDataType::Unknown,
nullptr, 0); | 577 event = createEncryptedEvent(WebEncryptedMediaInitDataType::Unknown,
nullptr, 0); |
| 582 } | 578 } |
| 583 | 579 |
| 584 event->setTarget(&element); | 580 event->setTarget(&m_mediaElement); |
| 585 element.scheduleEvent(event.release()); | 581 m_mediaElement.scheduleEvent(event.release()); |
| 586 } | 582 } |
| 587 | 583 |
| 588 if (RuntimeEnabledFeatures::prefixedEncryptedMediaEnabled()) { | 584 if (RuntimeEnabledFeatures::prefixedEncryptedMediaEnabled()) { |
| 589 // Send event for v0.1b EME. | 585 // Send event for v0.1b EME. |
| 590 RefPtrWillBeRawPtr<Event> event = createWebkitNeedKeyEvent(initData, ini
tDataLength); | 586 RefPtrWillBeRawPtr<Event> event = createWebkitNeedKeyEvent(initData, ini
tDataLength); |
| 591 event->setTarget(&element); | 587 event->setTarget(&m_mediaElement); |
| 592 element.scheduleEvent(event.release()); | 588 m_mediaElement.scheduleEvent(event.release()); |
| 593 } | 589 } |
| 594 } | 590 } |
| 595 | 591 |
| 596 void HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKey(HTMLMediaElem
ent& element) | 592 void HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKey() |
| 597 { | 593 { |
| 598 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKe
y"); | 594 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKe
y"); |
| 599 | 595 |
| 600 // From https://w3c.github.io/encrypted-media/#queue-waitingforkey: | 596 // From https://w3c.github.io/encrypted-media/#queue-waitingforkey: |
| 601 // It should only be called when the HTMLMediaElement object is potentially | 597 // It should only be called when the HTMLMediaElement object is potentially |
| 602 // playing and its readyState is equal to HAVE_FUTURE_DATA or greater. | 598 // playing and its readyState is equal to HAVE_FUTURE_DATA or greater. |
| 603 // FIXME: Is this really required? | 599 // FIXME: Is this really required? |
| 604 | 600 |
| 605 // 1. Let the media element be the specified HTMLMediaElement object. | 601 // 1. Let the media element be the specified HTMLMediaElement object. |
| 606 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 602 // This is nothing but |this| element. |
| 607 | 603 |
| 608 // 2. If the media element's waiting for key value is false, queue a task | 604 // 2. If the media element's waiting for key value is false, queue a task |
| 609 // to fire a simple event named waitingforkey at the media element. | 605 // to fire a simple event named waitingforkey at the media element. |
| 610 if (!thisElement.m_isWaitingForKey) { | 606 if (!m_isWaitingForKey) { |
| 611 RefPtrWillBeRawPtr<Event> event = Event::create(EventTypeNames::waitingf
orkey); | 607 RefPtrWillBeRawPtr<Event> event = Event::create(EventTypeNames::waitingf
orkey); |
| 612 event->setTarget(&element); | 608 event->setTarget(&m_mediaElement); |
| 613 element.scheduleEvent(event.release()); | 609 m_mediaElement.scheduleEvent(event.release()); |
| 614 } | 610 } |
| 615 | 611 |
| 616 // 3. Set the media element's waiting for key value to true. | 612 // 3. Set the media element's waiting for key value to true. |
| 617 thisElement.m_isWaitingForKey = true; | 613 m_isWaitingForKey = true; |
| 618 | 614 |
| 619 // 4. Suspend playback. | 615 // 4. Suspend playback. |
| 620 // (Already done on the Chromium side by the decryptors.) | 616 // (Already done on the Chromium side by the decryptors.) |
| 621 } | 617 } |
| 622 | 618 |
| 623 void HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForKey(HTMLMediaEle
ment& element) | 619 void HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForKey() |
| 624 { | 620 { |
| 625 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForK
ey"); | 621 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForK
ey"); |
| 626 | 622 |
| 627 // Logic is on the Chromium side to attempt to resume playback when a new | 623 // Logic is on the Chromium side to attempt to resume playback when a new |
| 628 // key is available. However, |m_isWaitingForKey| needs to be cleared so | 624 // key is available. However, |m_isWaitingForKey| needs to be cleared so |
| 629 // that a later waitingForKey() call can generate the event. | 625 // that a later waitingForKey() call can generate the event. |
| 630 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 626 m_isWaitingForKey = false; |
| 631 thisElement.m_isWaitingForKey = false; | |
| 632 } | 627 } |
| 633 | 628 |
| 634 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule(HTMLMediaElement& element) | 629 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule() |
| 635 { | 630 { |
| 636 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 631 return m_mediaKeys ? m_mediaKeys->contentDecryptionModule() : 0; |
| 637 return thisElement.contentDecryptionModule(); | |
| 638 } | 632 } |
| 639 | 633 |
| 640 DEFINE_TRACE(HTMLMediaElementEncryptedMedia) | 634 DEFINE_TRACE(HTMLMediaElementEncryptedMedia) |
| 641 { | 635 { |
| 642 visitor->trace(m_mediaKeys); | 636 visitor->trace(m_mediaKeys); |
| 643 WillBeHeapSupplement<HTMLMediaElement>::trace(visitor); | 637 WillBeHeapSupplement<HTMLMediaElement>::trace(visitor); |
| 644 } | 638 } |
| 645 | 639 |
| 646 } // namespace blink | 640 } // namespace blink |
| OLD | NEW |