Chromium Code Reviews| Index: media/crypto/aes_decryptor.cc |
| diff --git a/media/crypto/aes_decryptor.cc b/media/crypto/aes_decryptor.cc |
| index fb16486104441837edb0b635067279ae88cd952e..81ff92411081aed06cd2777d6a2dd3994eb51318 100644 |
| --- a/media/crypto/aes_decryptor.cc |
| +++ b/media/crypto/aes_decryptor.cc |
| @@ -139,6 +139,12 @@ bool AesDecryptor::GenerateKeyRequest(const std::string& key_system, |
| int init_data_length) { |
| std::string session_id_string(base::UintToString(next_session_id_++)); |
| + if (!init_data || !init_data_length) { |
| + DVLOG(1) << "Could not generate key request with empty init_data."; |
|
ddorwin
2012/11/29 17:55:08
nit: How about "init_data required to generate a k
xhwang
2012/11/29 20:34:37
Done.
|
| + client_->KeyError(key_system, "", Decryptor::kUnknownError, 0); |
| + return false; |
|
ddorwin
2012/11/29 17:55:08
Is false going to cause some error to be reported
xhwang
2012/11/29 20:34:37
We discussed offline that decryptors other than Pr
ddorwin
2012/11/29 22:19:01
No, I don't think we should do that. Let's file a
|
| + } |
| + |
| // For now, the AesDecryptor does not care about |key_system| and |type|; |
| // just fire the event with the |init_data| as the request. |
| int message_length = init_data_length; |