Index: media/crypto/aes_decryptor.cc |
diff --git a/media/crypto/aes_decryptor.cc b/media/crypto/aes_decryptor.cc |
index fb16486104441837edb0b635067279ae88cd952e..81ff92411081aed06cd2777d6a2dd3994eb51318 100644 |
--- a/media/crypto/aes_decryptor.cc |
+++ b/media/crypto/aes_decryptor.cc |
@@ -139,6 +139,12 @@ bool AesDecryptor::GenerateKeyRequest(const std::string& key_system, |
int init_data_length) { |
std::string session_id_string(base::UintToString(next_session_id_++)); |
+ if (!init_data || !init_data_length) { |
+ DVLOG(1) << "Could not generate key request with empty init_data."; |
ddorwin
2012/11/29 17:55:08
nit: How about "init_data required to generate a k
xhwang
2012/11/29 20:34:37
Done.
|
+ client_->KeyError(key_system, "", Decryptor::kUnknownError, 0); |
+ return false; |
ddorwin
2012/11/29 17:55:08
Is false going to cause some error to be reported
xhwang
2012/11/29 20:34:37
We discussed offline that decryptors other than Pr
ddorwin
2012/11/29 22:19:01
No, I don't think we should do that. Let's file a
|
+ } |
+ |
// For now, the AesDecryptor does not care about |key_system| and |type|; |
// just fire the event with the |init_data| as the request. |
int message_length = init_data_length; |