Index: webkit/media/crypto/ppapi/cdm_wrapper.cc |
diff --git a/webkit/media/crypto/ppapi/cdm_wrapper.cc b/webkit/media/crypto/ppapi/cdm_wrapper.cc |
index 63078563da7af8d630fa46df8bb90e08ee8679c2..8a8cb37d26fdb0b469246563086f29c8bc428b16 100644 |
--- a/webkit/media/crypto/ppapi/cdm_wrapper.cc |
+++ b/webkit/media/crypto/ppapi/cdm_wrapper.cc |
@@ -72,16 +72,16 @@ class CdmWrapper : public pp::Instance, |
// return false if the call was not forwarded to the CDM and should return |
// true otherwise. Once the call reaches the CDM, the call result/status |
// should be reported through the PPB_ContentDecryptor_Private interface. |
- virtual bool GenerateKeyRequest(const std::string& key_system, |
+ virtual void GenerateKeyRequest(const std::string& key_system, |
pp::VarArrayBuffer init_data) OVERRIDE; |
- virtual bool AddKey(const std::string& session_id, |
+ virtual void AddKey(const std::string& session_id, |
pp::VarArrayBuffer key, |
pp::VarArrayBuffer init_data) OVERRIDE; |
- virtual bool CancelKeyRequest(const std::string& session_id) OVERRIDE; |
- virtual bool Decrypt( |
+ virtual void CancelKeyRequest(const std::string& session_id) OVERRIDE; |
+ virtual void Decrypt( |
pp::Buffer_Dev encrypted_buffer, |
const PP_EncryptedBlockInfo& encrypted_block_info) OVERRIDE; |
- virtual bool DecryptAndDecode( |
+ virtual void DecryptAndDecode( |
pp::Buffer_Dev encrypted_buffer, |
const PP_EncryptedBlockInfo& encrypted_block_info) OVERRIDE; |
@@ -120,14 +120,14 @@ CdmWrapper::~CdmWrapper() { |
DestroyCdmInstance(cdm_); |
} |
-bool CdmWrapper::GenerateKeyRequest(const std::string& key_system, |
+void CdmWrapper::GenerateKeyRequest(const std::string& key_system, |
pp::VarArrayBuffer init_data) { |
PP_DCHECK(!key_system.empty()); |
if (!cdm_) { |
cdm_ = CreateCdmInstance(); |
if (!cdm_) |
- return false; |
+ return; |
xhwang
2012/09/13 12:24:59
Should we return a keyerror here? Based on the spe
Tom Finegan
2012/09/14 00:08:37
Makes sense. I agree.
|
} |
cdm::KeyMessage key_request; |
@@ -141,7 +141,7 @@ bool CdmWrapper::GenerateKeyRequest(const std::string& key_system, |
key_request.message_size == 0) { |
CallOnMain(callback_factory_.NewCallback(&CdmWrapper::KeyError, |
std::string())); |
- return true; |
+ return; |
} |
// TODO(xhwang): Remove unnecessary CallOnMain calls here and below once we |
@@ -153,11 +153,9 @@ bool CdmWrapper::GenerateKeyRequest(const std::string& key_system, |
key_system_ = key_system; |
CallOnMain(callback_factory_.NewCallback(&CdmWrapper::KeyMessage, |
key_request)); |
- |
- return true; |
} |
-bool CdmWrapper::AddKey(const std::string& session_id, |
+void CdmWrapper::AddKey(const std::string& session_id, |
pp::VarArrayBuffer key, |
pp::VarArrayBuffer init_data) { |
const uint8_t* key_ptr = reinterpret_cast<const uint8_t*>(key.Map()); |
@@ -167,7 +165,7 @@ bool CdmWrapper::AddKey(const std::string& session_id, |
int init_data_size = init_data.ByteLength(); |
if (!key_ptr || key_size <= 0 || !init_data_ptr || init_data_size <= 0) |
- return false; |
+ return; |
xhwang
2012/09/13 12:24:59
ditto, a keyerror here?
Tom Finegan
2012/09/14 00:08:37
Same, agreed.
|
PP_DCHECK(cdm_); |
cdm::Status status = cdm_->AddKey(session_id.data(), session_id.size(), |
@@ -177,29 +175,23 @@ bool CdmWrapper::AddKey(const std::string& session_id, |
if (status != cdm::kSuccess) { |
CallOnMain(callback_factory_.NewCallback(&CdmWrapper::KeyError, |
session_id)); |
- return true; |
+ return; |
} |
CallOnMain(callback_factory_.NewCallback(&CdmWrapper::KeyAdded, session_id)); |
- return true; |
} |
-bool CdmWrapper::CancelKeyRequest(const std::string& session_id) { |
+void CdmWrapper::CancelKeyRequest(const std::string& session_id) { |
PP_DCHECK(cdm_); |
- |
cdm::Status status = cdm_->CancelKeyRequest(session_id.data(), |
session_id.size()); |
- |
if (status != cdm::kSuccess) { |
CallOnMain(callback_factory_.NewCallback(&CdmWrapper::KeyError, |
session_id)); |
- return true; |
} |
- |
- return true; |
} |
-bool CdmWrapper::Decrypt(pp::Buffer_Dev encrypted_buffer, |
+void CdmWrapper::Decrypt(pp::Buffer_Dev encrypted_buffer, |
const PP_EncryptedBlockInfo& encrypted_block_info) { |
PP_DCHECK(!encrypted_buffer.is_null()); |
PP_DCHECK(cdm_); |
@@ -233,13 +225,11 @@ bool CdmWrapper::Decrypt(pp::Buffer_Dev encrypted_buffer, |
status, |
output_buffer, |
encrypted_block_info.tracking_info)); |
- return true; |
} |
-bool CdmWrapper::DecryptAndDecode( |
+void CdmWrapper::DecryptAndDecode( |
pp::Buffer_Dev encrypted_buffer, |
const PP_EncryptedBlockInfo& encrypted_block_info) { |
- return false; |
} |
pp::Buffer_Dev CdmWrapper::MakeBufferResource(const uint8_t* data, |