Index: content/browser/renderer_host/media/dtls_identity_service_host.cc |
diff --git a/content/browser/renderer_host/media/dtls_identity_service_host.cc b/content/browser/renderer_host/media/dtls_identity_service_host.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..727752abd76378988965010b2ba876d955ad8182 |
--- /dev/null |
+++ b/content/browser/renderer_host/media/dtls_identity_service_host.cc |
@@ -0,0 +1,85 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "content/browser/renderer_host/media/dtls_identity_service_host.h" |
+ |
+#include "base/bind.h" |
+#include "content/common/media/dtls_identity_messages.h" |
+#include "content/public/browser/render_process_host.h" |
+#include "net/base/net_errors.h" |
+ |
+namespace content { |
+ |
+DTLSIdentityServiceHost::DTLSIdentityServiceHost( |
+ DTLSIdentityStore* dtls_identity_store) |
+ : dtls_identity_store_(dtls_identity_store) { |
+} |
+ |
+DTLSIdentityServiceHost::~DTLSIdentityServiceHost() { |
+ RequestCancellerMap::iterator it; |
+ for (it = pending_request_canceller_map_.begin(); |
+ it != pending_request_canceller_map_.end(); |
+ ++it) { |
+ it->second.Run(); |
+ } |
+} |
+ |
+bool DTLSIdentityServiceHost::OnMessageReceived(const IPC::Message& message, |
+ bool* message_was_ok) { |
+ bool handled = true; |
+ IPC_BEGIN_MESSAGE_MAP_EX(DTLSIdentityServiceHost, message, *message_was_ok) |
+ IPC_MESSAGE_HANDLER(DTLSIdentityMsg_RequestIdentity, OnRequestIdentity) |
+ IPC_MESSAGE_HANDLER(DTLSIdentityMsg_CancelRequest, OnCancelRequest) |
+ IPC_MESSAGE_UNHANDLED(handled = false) |
+ IPC_END_MESSAGE_MAP_EX() |
+ return handled; |
+} |
+ |
+void DTLSIdentityServiceHost::OnRequestIdentity( |
+ int request_id, |
+ const GURL& origin, |
+ const std::string& identity_name, |
+ const std::string& common_name) { |
+ DCHECK(pending_request_canceller_map_.end() == |
+ pending_request_canceller_map_.find(request_id)); |
+ |
+ base::Closure canceller; |
+ bool success = dtls_identity_store_-> |
+ RequestIdentity( |
Ryan Sleevi
2013/06/17 23:08:34
style: Seems this wrapping is over-eager. Perhaps
jiayl
2013/06/18 01:07:55
Done.
|
+ origin, |
+ identity_name, |
+ common_name, |
+ base::Bind(&DTLSIdentityServiceHost::OnComplete, |
+ base::Unretained(this), request_id), |
+ &canceller); |
+ if (success) |
+ pending_request_canceller_map_[request_id] = canceller; |
+ else |
+ OnComplete(request_id, net::ERR_UNEXPECTED, std::string(), std::string()); |
+} |
+ |
+void DTLSIdentityServiceHost::OnCancelRequest(int request_id) { |
+ DCHECK(pending_request_canceller_map_.find(request_id) != |
+ pending_request_canceller_map_.end()); |
+ pending_request_canceller_map_[request_id].Run(); |
+ pending_request_canceller_map_.erase(request_id); |
+} |
+ |
+void DTLSIdentityServiceHost::OnComplete(int request_id, |
+ int error, |
+ const std::string& certificate, |
+ const std::string& private_key) { |
+ DCHECK(pending_request_canceller_map_.find(request_id) != |
+ pending_request_canceller_map_.end()); |
+ pending_request_canceller_map_.erase(request_id); |
+ if (error == net::OK) { |
+ Send(new DTLSIdentityHostMsg_IdentityReady(request_id, |
+ certificate, |
+ private_key)); |
+ } else { |
+ Send(new DTLSIdentityHostMsg_RequestFailed(request_id, error)); |
+ } |
+} |
+ |
+} // namespace content |