Index: media/blink/key_system_config_selector.cc |
diff --git a/media/blink/key_system_config_selector.cc b/media/blink/key_system_config_selector.cc |
index 24cbf9f39dfd7dd13ddeccd20307f41f2a2ccece..f34bd8fc463cfb00ea9d5b3a1029653ae34805af 100644 |
--- a/media/blink/key_system_config_selector.cc |
+++ b/media/blink/key_system_config_selector.cc |
@@ -8,7 +8,6 @@ |
#include "base/logging.h" |
#include "base/strings/string_util.h" |
#include "base/strings/utf_string_conversions.h" |
-#include "media/base/cdm_config.h" |
#include "media/base/key_systems.h" |
#include "media/base/media_permission.h" |
#include "media/blink/webmediaplayer_util.h" |
@@ -132,8 +131,8 @@ |
blink::WebVector<blink::WebMediaKeySystemConfiguration> |
candidate_configurations; |
blink::WebSecurityOrigin security_origin; |
- base::Callback<void(const blink::WebMediaKeySystemConfiguration&, |
- const CdmConfig&)> succeeded_cb; |
+ base::Callback<void(const blink::WebMediaKeySystemConfiguration&, bool)> |
+ succeeded_cb; |
base::Callback<void(const blink::WebString&)> not_supported_cb; |
bool was_permission_requested = false; |
bool is_permission_granted = false; |
@@ -159,8 +158,8 @@ |
bool IsIdentifierRecommended() const { return is_identifier_recommended_; } |
- bool AreHwSecureCodecsRequired() const { |
- return are_hw_secure_codecs_required_; |
+ bool AreSecureCodecsRequired() const { |
+ return are_secure_codecs_required_; |
} |
// Checks whether a rule is compatible with all previously added rules. |
@@ -183,10 +182,10 @@ |
case EmeConfigRule::IDENTIFIER_AND_PERSISTENCE_REQUIRED: |
return (!is_identifier_not_allowed_ && IsPermissionPossible() && |
!is_persistence_not_allowed_); |
- case EmeConfigRule::HW_SECURE_CODECS_NOT_ALLOWED: |
- return !are_hw_secure_codecs_required_; |
- case EmeConfigRule::HW_SECURE_CODECS_REQUIRED: |
- return !are_hw_secure_codecs_not_allowed_; |
+ case EmeConfigRule::SECURE_CODECS_NOT_ALLOWED: |
+ return !are_secure_codecs_required_; |
+ case EmeConfigRule::SECURE_CODECS_REQUIRED: |
+ return !are_secure_codecs_not_allowed_; |
case EmeConfigRule::SUPPORTED: |
return true; |
} |
@@ -220,11 +219,11 @@ |
is_identifier_required_ = true; |
is_persistence_required_ = true; |
return; |
- case EmeConfigRule::HW_SECURE_CODECS_NOT_ALLOWED: |
- are_hw_secure_codecs_not_allowed_ = true; |
- return; |
- case EmeConfigRule::HW_SECURE_CODECS_REQUIRED: |
- are_hw_secure_codecs_required_ = true; |
+ case EmeConfigRule::SECURE_CODECS_NOT_ALLOWED: |
+ are_secure_codecs_not_allowed_ = true; |
+ return; |
+ case EmeConfigRule::SECURE_CODECS_REQUIRED: |
+ are_secure_codecs_required_ = true; |
return; |
case EmeConfigRule::SUPPORTED: |
return; |
@@ -256,8 +255,8 @@ |
// Whether a rule has been added that requires or blocks hardware-secure |
// codecs. |
- bool are_hw_secure_codecs_required_ = false; |
- bool are_hw_secure_codecs_not_allowed_ = false; |
+ bool are_secure_codecs_required_ = false; |
+ bool are_secure_codecs_not_allowed_ = false; |
}; |
KeySystemConfigSelector::KeySystemConfigSelector( |
@@ -674,8 +673,8 @@ |
candidate_configurations, |
const blink::WebSecurityOrigin& security_origin, |
bool are_secure_codecs_supported, |
- base::Callback<void(const blink::WebMediaKeySystemConfiguration&, |
- const CdmConfig&)> succeeded_cb, |
+ base::Callback<void(const blink::WebMediaKeySystemConfiguration&, bool)> |
+ succeeded_cb, |
base::Callback<void(const blink::WebString&)> not_supported_cb) { |
// Continued from requestMediaKeySystemAccess(), step 7, from |
// https://w3c.github.io/encrypted-media/#requestmediakeysystemaccess |
@@ -724,11 +723,10 @@ |
ConfigState config_state(request->was_permission_requested, |
request->is_permission_granted); |
DCHECK(config_state.IsRuleSupported( |
- EmeConfigRule::HW_SECURE_CODECS_NOT_ALLOWED)); |
+ EmeConfigRule::SECURE_CODECS_NOT_ALLOWED)); |
if (!request->are_secure_codecs_supported) |
- config_state.AddRule(EmeConfigRule::HW_SECURE_CODECS_NOT_ALLOWED); |
+ config_state.AddRule(EmeConfigRule::SECURE_CODECS_NOT_ALLOWED); |
blink::WebMediaKeySystemConfiguration accumulated_configuration; |
- CdmConfig cdm_config; |
ConfigurationSupport support = GetSupportedConfiguration( |
request->key_system, request->candidate_configurations[i], |
&config_state, &accumulated_configuration); |
@@ -748,15 +746,8 @@ |
weak_factory_.GetWeakPtr(), base::Passed(&request))); |
return; |
case CONFIGURATION_SUPPORTED: |
- cdm_config.allow_distinctive_identifier = |
- (accumulated_configuration.distinctiveIdentifier == |
- blink::WebMediaKeySystemConfiguration::Requirement::Required); |
- cdm_config.allow_persistent_state = |
- (accumulated_configuration.persistentState == |
- blink::WebMediaKeySystemConfiguration::Requirement::Required); |
- cdm_config.use_hw_secure_codecs = |
- config_state.AreHwSecureCodecsRequired(); |
- request->succeeded_cb.Run(accumulated_configuration, cdm_config); |
+ request->succeeded_cb.Run(accumulated_configuration, |
+ config_state.AreSecureCodecsRequired()); |
return; |
} |
} |