| Index: media/base/key_systems.cc
|
| diff --git a/media/base/key_systems.cc b/media/base/key_systems.cc
|
| index 4dee18a97ee5413bf527431b7c93ba5c6bf90e31..27bd0877d16d5fcd34d72d9f3624f3a8833aaab3 100644
|
| --- a/media/base/key_systems.cc
|
| +++ b/media/base/key_systems.cc
|
| @@ -57,8 +57,8 @@ static const NamedCodec kCodecStrings[] = {
|
| {"vp8.0", EME_CODEC_WEBM_VP8}, // VP8.
|
| {"vp9", EME_CODEC_WEBM_VP9}, // VP9.
|
| {"vp9.0", EME_CODEC_WEBM_VP9}, // VP9.
|
| + {"vp09", EME_CODEC_COMMON_VP9}, // New multi-part VP9 for WebM and MP4.
|
| #if BUILDFLAG(USE_PROPRIETARY_CODECS)
|
| - {"vp09", EME_CODEC_MP4_VP9}, // VP9 in MP4.
|
| {"mp4a", EME_CODEC_MP4_AAC}, // AAC.
|
| {"avc1", EME_CODEC_MP4_AVC1}, // AVC1.
|
| {"avc3", EME_CODEC_MP4_AVC1}, // AVC3.
|
| @@ -599,15 +599,21 @@ EmeConfigRule KeySystemsImpl::GetContentTypeConfigRule(
|
| // necessary because |codecs| may be empty.)
|
| SupportedCodecs mime_type_codec_mask =
|
| GetCodecMaskForMimeType(container_mime_type);
|
| - if ((key_system_codec_mask & mime_type_codec_mask) == 0)
|
| + if ((key_system_codec_mask & mime_type_codec_mask) == 0) {
|
| + DVLOG(2) << " Container " << container_mime_type << " not supported by "
|
| + << key_system;
|
| return EmeConfigRule::NOT_SUPPORTED;
|
| + }
|
|
|
| // Check that the codecs are supported by the key system and container.
|
| EmeConfigRule support = EmeConfigRule::SUPPORTED;
|
| for (size_t i = 0; i < codecs.size(); i++) {
|
| SupportedCodecs codec = GetCodecForString(codecs[i]);
|
| - if ((codec & key_system_codec_mask & mime_type_codec_mask) == 0)
|
| + if ((codec & key_system_codec_mask & mime_type_codec_mask) == 0) {
|
| + DVLOG(2) << " Container/codec pair (" << container_mime_type << " / "
|
| + << codecs[i] << ") not supported by " << key_system;
|
| return EmeConfigRule::NOT_SUPPORTED;
|
| + }
|
| #if defined(OS_ANDROID)
|
| // Check whether the codec supports a hardware-secure mode. The goal is to
|
| // prevent mixing of non-hardware-secure codecs with hardware-secure codecs,
|
|
|