| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/security_key/security_key_auth_handler.h" | 5 #include "remoting/host/security_key/security_key_auth_handler.h" |
| 6 | 6 |
| 7 #include <cstdint> | 7 #include <cstdint> |
| 8 #include <map> | 8 #include <map> |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <string> | 10 #include <string> |
| (...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 126 // Ensures SecurityKeyAuthHandlerWin methods are called on the same thread. | 126 // Ensures SecurityKeyAuthHandlerWin methods are called on the same thread. |
| 127 base::ThreadChecker thread_checker_; | 127 base::ThreadChecker thread_checker_; |
| 128 | 128 |
| 129 base::WeakPtrFactory<SecurityKeyAuthHandlerWin> weak_factory_; | 129 base::WeakPtrFactory<SecurityKeyAuthHandlerWin> weak_factory_; |
| 130 | 130 |
| 131 DISALLOW_COPY_AND_ASSIGN(SecurityKeyAuthHandlerWin); | 131 DISALLOW_COPY_AND_ASSIGN(SecurityKeyAuthHandlerWin); |
| 132 }; | 132 }; |
| 133 | 133 |
| 134 std::unique_ptr<SecurityKeyAuthHandler> SecurityKeyAuthHandler::Create( | 134 std::unique_ptr<SecurityKeyAuthHandler> SecurityKeyAuthHandler::Create( |
| 135 ClientSessionDetails* client_session_details, | 135 ClientSessionDetails* client_session_details, |
| 136 const SendMessageCallback& send_message_callback) { | 136 const SendMessageCallback& send_message_callback, |
| 137 scoped_refptr<base::SingleThreadTaskRunner> file_task_runner) { |
| 137 std::unique_ptr<SecurityKeyAuthHandler> auth_handler( | 138 std::unique_ptr<SecurityKeyAuthHandler> auth_handler( |
| 138 new SecurityKeyAuthHandlerWin(client_session_details)); | 139 new SecurityKeyAuthHandlerWin(client_session_details)); |
| 139 auth_handler->SetSendMessageCallback(send_message_callback); | 140 auth_handler->SetSendMessageCallback(send_message_callback); |
| 140 return auth_handler; | 141 return auth_handler; |
| 141 } | 142 } |
| 142 | 143 |
| 143 SecurityKeyAuthHandlerWin::SecurityKeyAuthHandlerWin( | 144 SecurityKeyAuthHandlerWin::SecurityKeyAuthHandlerWin( |
| 144 ClientSessionDetails* client_session_details) | 145 ClientSessionDetails* client_session_details) |
| 145 : client_session_details_(client_session_details), | 146 : client_session_details_(client_session_details), |
| 146 disconnect_timeout_( | 147 disconnect_timeout_( |
| (...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 298 | 299 |
| 299 void SecurityKeyAuthHandlerWin::OnChannelError() { | 300 void SecurityKeyAuthHandlerWin::OnChannelError() { |
| 300 DCHECK(thread_checker_.CalledOnValidThread()); | 301 DCHECK(thread_checker_.CalledOnValidThread()); |
| 301 | 302 |
| 302 // Could be an error, most likely the client disconnected though. Either way | 303 // Could be an error, most likely the client disconnected though. Either way |
| 303 // we should restart the server to prepare for the next connection. | 304 // we should restart the server to prepare for the next connection. |
| 304 RecreateIpcServerChannel(); | 305 RecreateIpcServerChannel(); |
| 305 } | 306 } |
| 306 | 307 |
| 307 } // namespace remoting | 308 } // namespace remoting |
| OLD | NEW |