| Index: remoting/host/security_key/security_key_message_writer_impl.cc
|
| diff --git a/remoting/host/security_key/security_key_message_writer_impl.cc b/remoting/host/security_key/security_key_message_writer_impl.cc
|
| deleted file mode 100644
|
| index a14055bd2e63b1feaf1f875c35096f12a456470e..0000000000000000000000000000000000000000
|
| --- a/remoting/host/security_key/security_key_message_writer_impl.cc
|
| +++ /dev/null
|
| @@ -1,82 +0,0 @@
|
| -// Copyright 2016 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "remoting/host/security_key/security_key_message_writer_impl.h"
|
| -
|
| -#include <cstdint>
|
| -#include <string>
|
| -#include <utility>
|
| -
|
| -#include "remoting/host/security_key/security_key_message.h"
|
| -
|
| -namespace remoting {
|
| -
|
| -SecurityKeyMessageWriterImpl::SecurityKeyMessageWriterImpl(
|
| - base::File output_file)
|
| - : output_stream_(std::move(output_file)) {}
|
| -
|
| -SecurityKeyMessageWriterImpl::~SecurityKeyMessageWriterImpl() {}
|
| -
|
| -bool SecurityKeyMessageWriterImpl::WriteMessage(
|
| - SecurityKeyMessageType message_type) {
|
| - return WriteMessageWithPayload(message_type, std::string());
|
| -}
|
| -
|
| -bool SecurityKeyMessageWriterImpl::WriteMessageWithPayload(
|
| - SecurityKeyMessageType message_type,
|
| - const std::string& message_payload) {
|
| - if (write_failed_ || !output_stream_.IsValid()) {
|
| - return false;
|
| - }
|
| -
|
| - int message_payload_size_bytes = message_payload.size();
|
| - uint32_t total_message_size_bytes =
|
| - SecurityKeyMessage::kMessageTypeSizeBytes + message_payload_size_bytes;
|
| - CHECK(SecurityKeyMessage::IsValidMessageSize(total_message_size_bytes));
|
| -
|
| - // First we send the message header which is the length of the message_type
|
| - // and message_payload in bytes.
|
| - if (!WriteBytesToOutput(reinterpret_cast<char*>(&total_message_size_bytes),
|
| - SecurityKeyMessage::kHeaderSizeBytes)) {
|
| - LOG(ERROR) << "Failed to send message header.";
|
| - return false;
|
| - }
|
| -
|
| - // Next we send the message_type.
|
| - if (!WriteBytesToOutput(reinterpret_cast<char*>(&message_type),
|
| - SecurityKeyMessage::kMessageTypeSizeBytes)) {
|
| - LOG(ERROR) << "Failed to send message type.";
|
| - return false;
|
| - }
|
| -
|
| - // Lastly, send the message data if appropriate.
|
| - if (!message_payload.empty()) {
|
| - if (!WriteBytesToOutput(message_payload.data(),
|
| - message_payload_size_bytes)) {
|
| - LOG(ERROR) << "Failed to send message payload.";
|
| - return false;
|
| - }
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -bool SecurityKeyMessageWriterImpl::WriteBytesToOutput(const char* message,
|
| - int bytes_to_write) {
|
| - DCHECK(message);
|
| - DCHECK_GT(bytes_to_write, 0);
|
| -
|
| - int result = output_stream_.WriteAtCurrentPos(message, bytes_to_write);
|
| - if (result != bytes_to_write) {
|
| - LOG(ERROR) << "Failed to write all bytes to output stream. bytes written: "
|
| - << result << ", file error: "
|
| - << base::File::ErrorToString(output_stream_.error_details());
|
| - write_failed_ = true;
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -} // namespace remoting
|
|
|