Copy as Markdown
Other Tools
//
// Automatically generated by ipdlc.
// Edit at your own risk
//
#include "mozilla/psm/PSelectTLSClientAuthCertChild.h"
#include "mozilla/ProfilerLabels.h"
#include "mozilla/psm/SelectTLSClientAuthCertChild.h"
#include "ipc/IPCMessageUtils.h"
#include "ipc/IPCMessageUtilsSpecializations.h"
#include "nsIFile.h"
#include "mozilla/ipc/Endpoint.h"
#include "mozilla/ipc/ProtocolMessageUtils.h"
#include "mozilla/ipc/ProtocolUtils.h"
#include "mozilla/ipc/ShmemMessageUtils.h"
#include "mozilla/ipc/TaintingIPCUtils.h"
namespace mozilla {
namespace psm {
auto PSelectTLSClientAuthCertChild::Recv__delete__() -> mozilla::ipc::IPCResult
{
return IPC_OK();
}
auto PSelectTLSClientAuthCertChild::ProcessingError(
Result aCode,
const char* aReason) -> void
{
}
auto PSelectTLSClientAuthCertChild::ShouldContinueFromReplyTimeout() -> bool
{
return true;
}
MOZ_IMPLICIT PSelectTLSClientAuthCertChild::PSelectTLSClientAuthCertChild() :
mozilla::ipc::IToplevelProtocol("PSelectTLSClientAuthCertChild", kProtocolId, mozilla::ipc::ChildSide)
{
MOZ_COUNT_CTOR(PSelectTLSClientAuthCertChild);
}
PSelectTLSClientAuthCertChild::~PSelectTLSClientAuthCertChild()
{
MOZ_COUNT_DTOR(PSelectTLSClientAuthCertChild);
}
auto PSelectTLSClientAuthCertChild::ActorAlloc() -> void
{
MOZ_RELEASE_ASSERT(XRE_IsSocketProcess(), "Invalid process for `PSelectTLSClientAuthCertChild'");
AddRef();
}
auto PSelectTLSClientAuthCertChild::ActorDealloc() -> void
{
Release();
}
auto PSelectTLSClientAuthCertChild::ManagedProtocolIds() const -> mozilla::Span<mozilla::ipc::ProtocolId const>
{
return {};
}
auto PSelectTLSClientAuthCertChild::GetManagedActors(mozilla::ipc::ProtocolId aProtocol) -> UntypedManagedContainer*
{
switch (aProtocol) {
default:
return nullptr;
}
}
auto PSelectTLSClientAuthCertChild::DeallocManagee(
int32_t aProtocolId,
IProtocol* aListener) -> void
{
FatalError("unreached");
return;
}
auto PSelectTLSClientAuthCertChild::OnMessageReceived(const Message& msg__) -> PSelectTLSClientAuthCertChild::Result
{
switch (msg__.type()) {
case PSelectTLSClientAuthCert::Msg_TLSClientAuthCertSelected__ID:
{
if (mozilla::ipc::LoggingEnabledFor("PSelectTLSClientAuthCert", mozilla::ipc::ChildSide)) {
mozilla::ipc::LogMessageForProtocol(
"PSelectTLSClientAuthCertChild",
this->ToplevelProtocol()->OtherPidMaybeInvalid(),
"Received ",
(&(msg__))->type(),
mozilla::ipc::MessageDirection::eReceiving);
}
AUTO_PROFILER_LABEL("PSelectTLSClientAuthCert::Msg_TLSClientAuthCertSelected", OTHER);
IPC::MessageReader reader__{
msg__,
this};
auto maybe__aSelectedCertBytes = IPC::ReadParam<ByteArray>((&(reader__)));
if (!maybe__aSelectedCertBytes) {
FatalError("Error deserializing 'ByteArray'");
return MsgValueError;
}
auto& aSelectedCertBytes = *maybe__aSelectedCertBytes;
// Sentinel = 'aSelectedCertBytes'
if ((!(((&(reader__)))->ReadSentinel(1114048288)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'ByteArray'");
return MsgValueError;
}
auto maybe__aSelectedCertChainBytes = IPC::ReadParam<nsTArray<ByteArray>>((&(reader__)));
if (!maybe__aSelectedCertChainBytes) {
FatalError("Error deserializing 'ByteArray[]'");
return MsgValueError;
}
auto& aSelectedCertChainBytes = *maybe__aSelectedCertChainBytes;
// Sentinel = 'aSelectedCertChainBytes'
if ((!(((&(reader__)))->ReadSentinel(1789200643)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'ByteArray[]'");
return MsgValueError;
}
reader__.EndRead();
mozilla::ipc::IPCResult __ok = (static_cast<SelectTLSClientAuthCertChild*>(this))->RecvTLSClientAuthCertSelected(std::move(aSelectedCertBytes), std::move(aSelectedCertChainBytes));
if ((!(__ok))) {
mozilla::ipc::ProtocolErrorBreakpoint("Handler returned error code!");
// Error handled in mozilla::ipc::IPCResult
return MsgProcessingError;
}
return MsgProcessed;
}
default:
return MsgNotKnown;
case SHMEM_CREATED_MESSAGE_TYPE:
{
if (!ShmemCreated(msg__)) {
return MsgPayloadError;
}
return MsgProcessed;
}
case SHMEM_DESTROYED_MESSAGE_TYPE:
{
if (!ShmemDestroyed(msg__)) {
return MsgPayloadError;
}
return MsgProcessed;
}
}
}
auto PSelectTLSClientAuthCertChild::OnMessageReceived(
const Message& msg__,
UniquePtr<Message>& reply__) -> PSelectTLSClientAuthCertChild::Result
{
MOZ_ASSERT_UNREACHABLE("message protocol not supported");
return MsgNotKnown;
}
} // namespace psm
} // namespace mozilla
namespace IPC {
auto ParamTraits<::mozilla::psm::PSelectTLSClientAuthCertChild*>::Write(
IPC::MessageWriter* aWriter,
const paramType& aVar) -> void
{
MOZ_RELEASE_ASSERT(
aWriter->GetActor(),
"Cannot serialize managed actors without an actor");
int32_t id;
if (!aVar) {
id = 0; // kNullActorId
} else {
id = aVar->Id();
if (id == 1) { // kFreedActorId
aVar->FatalError("Actor has been |delete|d");
}
MOZ_RELEASE_ASSERT(
aWriter->GetActor()->GetIPCChannel() == aVar->GetIPCChannel(),
"Actor must be from the same channel as the"
" actor it's being sent over");
MOZ_RELEASE_ASSERT(
aVar->CanSend(),
"Actor must still be open when sending");
}
IPC::WriteParam(aWriter, id);
}
auto ParamTraits<::mozilla::psm::PSelectTLSClientAuthCertChild*>::Read(IPC::MessageReader* aReader) -> IPC::ReadResult<paramType>
{
MOZ_RELEASE_ASSERT(
aReader->GetActor(),
"Cannot deserialize managed actors without an actor");
mozilla::Maybe<mozilla::ipc::IProtocol*> actor = aReader->GetActor()
->ReadActor(aReader, true, "PSelectTLSClientAuthCert", PSelectTLSClientAuthCertMsgStart);
if (actor.isSome()) {
return static_cast<::mozilla::psm::PSelectTLSClientAuthCertChild*>(actor.ref());
}
return {};
}
} // namespace IPC