Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(402)

Side by Side Diff: content/common/media/media_stream_messages.h

Issue 2721113002: getUserMedia: handle the device starting status report. (Closed)
Patch Set: address nits Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // IPC messages for the media streaming. 5 // IPC messages for the media streaming.
6 // Multiply-included message file, hence no include guard. 6 // Multiply-included message file, hence no include guard.
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "content/common/content_export.h" 10 #include "content/common/content_export.h"
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after
126 // connected video sinks meet the requirement of output protection.). 126 // connected video sinks meet the requirement of output protection.).
127 // Note: the browser process only trusts the |is_sucure| value in this IPC 127 // Note: the browser process only trusts the |is_sucure| value in this IPC
128 // message if it's comimg from a trusted, whitelisted extension. Extensions run 128 // message if it's comimg from a trusted, whitelisted extension. Extensions run
129 // in separate render processes. So it shouldn't be possible, for example, for 129 // in separate render processes. So it shouldn't be possible, for example, for
130 // a user's visit to a malicious web page to compromise a render process running 130 // a user's visit to a malicious web page to compromise a render process running
131 // a trusted extension to make it report falsehood in this IPC message. 131 // a trusted extension to make it report falsehood in this IPC message.
132 IPC_MESSAGE_CONTROL3(MediaStreamHostMsg_SetCapturingLinkSecured, 132 IPC_MESSAGE_CONTROL3(MediaStreamHostMsg_SetCapturingLinkSecured,
133 int, /* session_id */ 133 int, /* session_id */
134 content::MediaStreamType, /* type */ 134 content::MediaStreamType, /* type */
135 bool /* is_secure */) 135 bool /* is_secure */)
136
137 // Tell the browser process that the stream has been started successfully.
138 IPC_MESSAGE_CONTROL1(MediaStreamHostMsg_StreamStarted, std::string /* label */)
OLDNEW
« no previous file with comments | « content/browser/renderer_host/media/video_capture_manager_unittest.cc ('k') | content/common/media/video_capture.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698