OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "jingle/notifier/base/fake_ssl_client_socket.h" | 5 #include "jingle/notifier/base/fake_ssl_client_socket.h" |
6 | 6 |
7 #include <cstdlib> | 7 #include <cstdlib> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
92 old_user_connect_callback_(NULL), | 92 old_user_connect_callback_(NULL), |
93 write_buf_(NewDrainableIOBufferWithSize(arraysize(kSslClientHello))), | 93 write_buf_(NewDrainableIOBufferWithSize(arraysize(kSslClientHello))), |
94 read_buf_(NewDrainableIOBufferWithSize(arraysize(kSslServerHello))) { | 94 read_buf_(NewDrainableIOBufferWithSize(arraysize(kSslServerHello))) { |
95 CHECK(transport_socket_.get()); | 95 CHECK(transport_socket_.get()); |
96 std::memcpy(write_buf_->data(), kSslClientHello, arraysize(kSslClientHello)); | 96 std::memcpy(write_buf_->data(), kSslClientHello, arraysize(kSslClientHello)); |
97 } | 97 } |
98 | 98 |
99 FakeSSLClientSocket::~FakeSSLClientSocket() {} | 99 FakeSSLClientSocket::~FakeSSLClientSocket() {} |
100 | 100 |
101 int FakeSSLClientSocket::Read(net::IOBuffer* buf, int buf_len, | 101 int FakeSSLClientSocket::Read(net::IOBuffer* buf, int buf_len, |
102 net::OldCompletionCallback* callback) { | 102 net::OldCompletionCallback* callback) { |
103 DCHECK_EQ(next_handshake_state_, STATE_NONE); | 103 DCHECK_EQ(next_handshake_state_, STATE_NONE); |
104 DCHECK(handshake_completed_); | 104 DCHECK(handshake_completed_); |
105 return transport_socket_->Read(buf, buf_len, callback); | 105 return transport_socket_->Read(buf, buf_len, callback); |
| 106 } |
| 107 int FakeSSLClientSocket::Read(net::IOBuffer* buf, int buf_len, |
| 108 const net::CompletionCallback& callback) { |
| 109 DCHECK_EQ(next_handshake_state_, STATE_NONE); |
| 110 DCHECK(handshake_completed_); |
| 111 return transport_socket_->Read(buf, buf_len, callback); |
106 } | 112 } |
107 | 113 |
108 int FakeSSLClientSocket::Write(net::IOBuffer* buf, int buf_len, | 114 int FakeSSLClientSocket::Write(net::IOBuffer* buf, int buf_len, |
109 net::OldCompletionCallback* callback) { | 115 net::OldCompletionCallback* callback) { |
110 DCHECK_EQ(next_handshake_state_, STATE_NONE); | 116 DCHECK_EQ(next_handshake_state_, STATE_NONE); |
111 DCHECK(handshake_completed_); | 117 DCHECK(handshake_completed_); |
112 return transport_socket_->Write(buf, buf_len, callback); | 118 return transport_socket_->Write(buf, buf_len, callback); |
113 } | 119 } |
114 | 120 |
115 bool FakeSSLClientSocket::SetReceiveBufferSize(int32 size) { | 121 bool FakeSSLClientSocket::SetReceiveBufferSize(int32 size) { |
(...skipping 247 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
363 | 369 |
364 int64 FakeSSLClientSocket::NumBytesRead() const { | 370 int64 FakeSSLClientSocket::NumBytesRead() const { |
365 return transport_socket_->NumBytesRead(); | 371 return transport_socket_->NumBytesRead(); |
366 } | 372 } |
367 | 373 |
368 base::TimeDelta FakeSSLClientSocket::GetConnectTimeMicros() const { | 374 base::TimeDelta FakeSSLClientSocket::GetConnectTimeMicros() const { |
369 return transport_socket_->GetConnectTimeMicros(); | 375 return transport_socket_->GetConnectTimeMicros(); |
370 } | 376 } |
371 | 377 |
372 } // namespace notifier | 378 } // namespace notifier |
OLD | NEW |