Guard against uninitialized packetization modes.
This change inserts a RTC_CHECK for illegal packetization modes when RTP packetizers are constructed. This should help find places where this field is not initialized. BUG=webrtc:6858 Review-Url: https://codereview.webrtc.org/2575073002 Cr-Commit-Position: refs/heads/master@{#15614}
This commit is contained in:
parent
d30bd18048
commit
88cf05cf73
@ -81,7 +81,11 @@ bool ParseStapAStartOffsets(const uint8_t* nalu_ptr,
|
||||
RtpPacketizerH264::RtpPacketizerH264(size_t max_payload_len,
|
||||
H264PacketizationMode packetization_mode)
|
||||
: max_payload_len_(max_payload_len),
|
||||
packetization_mode_(packetization_mode) {}
|
||||
packetization_mode_(packetization_mode) {
|
||||
// Guard against uninitialized memory in packetization_mode.
|
||||
RTC_CHECK(packetization_mode == H264PacketizationMode::NonInterleaved ||
|
||||
packetization_mode == H264PacketizationMode::SingleNalUnit);
|
||||
}
|
||||
|
||||
RtpPacketizerH264::~RtpPacketizerH264() {
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user