| Index: net/ocsp/nss_ocsp.cc
|
| ===================================================================
|
| --- net/ocsp/nss_ocsp.cc (revision 66790)
|
| +++ net/ocsp/nss_ocsp.cc (working copy)
|
| @@ -85,8 +85,7 @@
|
| DISALLOW_COPY_AND_ASSIGN(OCSPIOLoop);
|
| };
|
|
|
| -base::LazyInstance<OCSPIOLoop, base::LeakyLazyInstanceTraits<OCSPIOLoop> >
|
| - g_ocsp_io_loop(base::LINKER_INITIALIZED);
|
| +base::LazyInstance<OCSPIOLoop> g_ocsp_io_loop(base::LINKER_INITIALIZED);
|
|
|
| const int kRecvBufferSize = 4096;
|
|
|
| @@ -561,6 +560,7 @@
|
| SECStatus OCSPCreateSession(const char* host, PRUint16 portnum,
|
| SEC_HTTP_SERVER_SESSION* pSession) {
|
| VLOG(1) << "OCSP create session: host=" << host << " port=" << portnum;
|
| + DCHECK(!MessageLoop::current());
|
| pthread_mutex_lock(&g_request_context_lock);
|
| URLRequestContext* request_context = g_request_context;
|
| pthread_mutex_unlock(&g_request_context_lock);
|
| @@ -579,6 +579,7 @@
|
| SECStatus OCSPKeepAliveSession(SEC_HTTP_SERVER_SESSION session,
|
| PRPollDesc **pPollDesc) {
|
| VLOG(1) << "OCSP keep alive";
|
| + DCHECK(!MessageLoop::current());
|
| if (pPollDesc)
|
| *pPollDesc = NULL;
|
| return SECSuccess;
|
| @@ -586,6 +587,7 @@
|
|
|
| SECStatus OCSPFreeSession(SEC_HTTP_SERVER_SESSION session) {
|
| VLOG(1) << "OCSP free session";
|
| + DCHECK(!MessageLoop::current());
|
| delete reinterpret_cast<OCSPServerSession*>(session);
|
| return SECSuccess;
|
| }
|
| @@ -600,6 +602,7 @@
|
| << " path_and_query=" << path_and_query_string
|
| << " http_request_method=" << http_request_method
|
| << " timeout=" << timeout;
|
| + DCHECK(!MessageLoop::current());
|
| OCSPServerSession* ocsp_session =
|
| reinterpret_cast<OCSPServerSession*>(session);
|
|
|
| @@ -621,6 +624,7 @@
|
| const PRUint32 http_data_len,
|
| const char* http_content_type) {
|
| VLOG(1) << "OCSP set post data len=" << http_data_len;
|
| + DCHECK(!MessageLoop::current());
|
| OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request);
|
|
|
| req->SetPostData(http_data, http_data_len, http_content_type);
|
| @@ -632,6 +636,7 @@
|
| const char* http_header_value) {
|
| VLOG(1) << "OCSP add header name=" << http_header_name
|
| << " value=" << http_header_value;
|
| + DCHECK(!MessageLoop::current());
|
| OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request);
|
|
|
| req->AddHeader(http_header_name, http_header_value);
|
| @@ -691,6 +696,7 @@
|
| }
|
|
|
| VLOG(1) << "OCSP try send and receive";
|
| + DCHECK(!MessageLoop::current());
|
| OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request);
|
| // We support blocking mode only.
|
| if (pPollDesc)
|
| @@ -768,6 +774,7 @@
|
|
|
| SECStatus OCSPFree(SEC_HTTP_REQUEST_SESSION request) {
|
| VLOG(1) << "OCSP free";
|
| + DCHECK(!MessageLoop::current());
|
| OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request);
|
| req->Cancel();
|
| req->Release();
|
|
|