Index: content/browser/renderer_host/render_message_filter.cc |
diff --git a/content/browser/renderer_host/render_message_filter.cc b/content/browser/renderer_host/render_message_filter.cc |
index 394f916da9f66f9c82a6d1ed8d9b96336fcc0fdf..6e9fcccb8a37a08091e9cfe03b522a525441b0b6 100644 |
--- a/content/browser/renderer_host/render_message_filter.cc |
+++ b/content/browser/renderer_host/render_message_filter.cc |
@@ -53,7 +53,7 @@ |
#include "media/audio/audio_parameters.h" |
#include "media/base/media_log_event.h" |
#include "net/base/io_buffer.h" |
-#include "net/base/keygen_handler.h" |
+//XXX #include "net/base/keygen_handler.h" |
#include "net/base/mime_util.h" |
#include "net/base/request_priority.h" |
#include "net/cookies/canonical_cookie.h" |
@@ -925,6 +925,8 @@ void RenderMessageFilter::OnKeygen(uint32 key_size_index, |
const std::string& challenge_string, |
const GURL& url, |
IPC::Message* reply_msg) { |
+ LOG(INFO) << "render_process_id_:" << render_process_id_ |
+ << " routing_id:" << reply_msg->routing_id(); |
// Map displayed strings indicating level of keysecurity in the <keygen> |
// menu to the key size in bits. (See SSLKeyGeneratorChromium.cpp in WebCore.) |
int key_size_in_bits; |
@@ -942,40 +944,18 @@ void RenderMessageFilter::OnKeygen(uint32 key_size_index, |
return; |
} |
- VLOG(1) << "Dispatching keygen task to worker pool."; |
- // Dispatch to worker pool, so we do not block the IO thread. |
- if (!base::WorkerPool::PostTask( |
- FROM_HERE, |
- base::Bind( |
- &RenderMessageFilter::OnKeygenOnWorkerThread, this, |
- key_size_in_bits, challenge_string, url, reply_msg), |
- true)) { |
- NOTREACHED() << "Failed to dispatch keygen task to worker pool"; |
- ViewHostMsg_Keygen::WriteReplyParams(reply_msg, std::string()); |
- Send(reply_msg); |
- return; |
- } |
+ GetContentClient()->browser()->Keygen( |
+ resource_context_, |
+ key_size_in_bits, |
+ challenge_string, |
+ url, |
+ base::Bind(&RenderMessageFilter::OnKeygenComplete, this, reply_msg)); |
} |
-void RenderMessageFilter::OnKeygenOnWorkerThread( |
- int key_size_in_bits, |
- const std::string& challenge_string, |
- const GURL& url, |
- IPC::Message* reply_msg) { |
- DCHECK(reply_msg); |
- |
- // Generate a signed public key and challenge, then send it back. |
- net::KeygenHandler keygen_handler(key_size_in_bits, challenge_string, url); |
- |
-#if defined(USE_NSS) |
- // Attach a password delegate so we can authenticate. |
- keygen_handler.set_crypto_module_password_delegate( |
- GetContentClient()->browser()->GetCryptoPasswordDelegate(url)); |
-#endif // defined(USE_NSS) |
- |
- ViewHostMsg_Keygen::WriteReplyParams( |
- reply_msg, |
- keygen_handler.GenKeyAndSignChallenge()); |
+void RenderMessageFilter::OnKeygenComplete( |
+ IPC::Message* reply_msg, |
+ const std::string* result) { |
+ ViewHostMsg_Keygen::WriteReplyParams(reply_msg, result ? *result : ""); |
Send(reply_msg); |
} |