Index: media/base/key_systems.cc |
diff --git a/media/base/key_systems.cc b/media/base/key_systems.cc |
index 17c4210da220be672128198333c711550a26f0da..684e60ae45249cff7c8bfd90ee777931d55691ad 100644 |
--- a/media/base/key_systems.cc |
+++ b/media/base/key_systems.cc |
@@ -716,8 +716,10 @@ EmeConfigRule KeySystemsImpl::GetContentTypeConfigRule( |
if ((codec & key_system_codec_mask & container_codec_mask) == 0) |
return EmeConfigRule::NOT_SUPPORTED; |
#if defined(OS_ANDROID) |
- // Check whether the codec supports a hardware-secure mode; if not, indicate |
- // that hardware-secure codecs are not available for all listed codecs. |
+ // Check whether the codec supports a hardware-secure mode. The goal is to |
+ // prevent mixing of non-hardware-secure codecs with hardware-secure codecs, |
+ // since the mode is fixed at CDM creation. |
+ // |
// Because the check for regular codec support is early-exit, we don't have |
// to consider codecs that are only supported in hardware-secure mode. We |
// could do so, and make use of SECURE_CODECS_REQUIRED, if it turns out that |
@@ -725,7 +727,6 @@ EmeConfigRule KeySystemsImpl::GetContentTypeConfigRule( |
if ((codec & key_system_secure_codec_mask) == 0) |
support = EmeConfigRule::SECURE_CODECS_NOT_ALLOWED; |
#endif // defined(OS_ANDROID) |
- |
} |
return support; |