| Index: webkit/renderer/media/crypto/ppapi/clear_key_cdm.cc
|
| diff --git a/webkit/renderer/media/crypto/ppapi/clear_key_cdm.cc b/webkit/renderer/media/crypto/ppapi/clear_key_cdm.cc
|
| index 81f7cd0dbba4d36fe7a58a18e847f65b783287cf..335001b8fd95f89a4b8682949e8c9e32534c600a 100644
|
| --- a/webkit/renderer/media/crypto/ppapi/clear_key_cdm.cc
|
| +++ b/webkit/renderer/media/crypto/ppapi/clear_key_cdm.cc
|
| @@ -181,21 +181,10 @@ void ClearKeyCdm::Client::KeyMessage(const std::string& session_id,
|
| default_url_ = default_url;
|
| }
|
|
|
| -void ClearKeyCdm::Client::NeedKey(const std::string& session_id,
|
| - const std::string& type,
|
| - scoped_ptr<uint8[]> init_data,
|
| - int init_data_length) {
|
| - // In the current implementation of AesDecryptor, NeedKey is not used.
|
| - // If no key is available to decrypt an input buffer, it returns kNoKey to
|
| - // the caller instead of firing NeedKey.
|
| - NOTREACHED();
|
| -}
|
| -
|
| ClearKeyCdm::ClearKeyCdm(cdm::Host* host)
|
| : decryptor_(base::Bind(&Client::KeyAdded, base::Unretained(&client_)),
|
| base::Bind(&Client::KeyError, base::Unretained(&client_)),
|
| - base::Bind(&Client::KeyMessage, base::Unretained(&client_)),
|
| - base::Bind(&Client::NeedKey, base::Unretained(&client_))),
|
| + base::Bind(&Client::KeyMessage, base::Unretained(&client_))),
|
| host_(host),
|
| timer_delay_ms_(kInitialTimerDelayMs),
|
| timer_set_(false) {
|
|
|