Copy as Markdown

Other Tools

//
// Automatically generated by ipdlc.
// Edit at your own risk
//
#include "mozilla/psm/PVerifySSLServerCertChild.h"
#include "mozilla/ProfilerLabels.h"
#include "mozilla/psm/VerifySSLServerCertChild.h"
#include "ipc/IPCMessageUtils.h"
#include "ipc/IPCMessageUtilsSpecializations.h"
#include "nsIFile.h"
#include "mozilla/ipc/Endpoint.h"
#include "mozilla/ipc/ProtocolMessageUtils.h"
#include "mozilla/ipc/ProtocolUtils.h"
#include "mozilla/ipc/ShmemMessageUtils.h"
#include "mozilla/ipc/TaintingIPCUtils.h"
namespace mozilla {
namespace psm {
auto PVerifySSLServerCertChild::Recv__delete__() -> mozilla::ipc::IPCResult
{
return IPC_OK();
}
auto PVerifySSLServerCertChild::ProcessingError(
Result aCode,
const char* aReason) -> void
{
}
auto PVerifySSLServerCertChild::ShouldContinueFromReplyTimeout() -> bool
{
return true;
}
MOZ_IMPLICIT PVerifySSLServerCertChild::PVerifySSLServerCertChild() :
mozilla::ipc::IToplevelProtocol("PVerifySSLServerCertChild", PVerifySSLServerCertMsgStart, mozilla::ipc::ChildSide)
{
MOZ_COUNT_CTOR(PVerifySSLServerCertChild);
}
PVerifySSLServerCertChild::~PVerifySSLServerCertChild()
{
MOZ_COUNT_DTOR(PVerifySSLServerCertChild);
}
auto PVerifySSLServerCertChild::ActorAlloc() -> void
{
MOZ_RELEASE_ASSERT(XRE_IsSocketProcess(), "Invalid process for `PVerifySSLServerCertChild'");
AddRef();
}
auto PVerifySSLServerCertChild::ActorDealloc() -> void
{
Release();
}
auto PVerifySSLServerCertChild::AllManagedActorsCount() const -> uint32_t
{
uint32_t total = 0;
return total;
}
auto PVerifySSLServerCertChild::RemoveManagee(
int32_t aProtocolId,
IProtocol* aListener) -> void
{
FatalError("unreached");
return;
}
auto PVerifySSLServerCertChild::DeallocManagee(
int32_t aProtocolId,
IProtocol* aListener) -> void
{
FatalError("unreached");
return;
}
auto PVerifySSLServerCertChild::OnMessageReceived(const Message& msg__) -> PVerifySSLServerCertChild::Result
{
switch (msg__.type()) {
case PVerifySSLServerCert::Msg_OnVerifiedSSLServerCertSuccess__ID:
{
if (mozilla::ipc::LoggingEnabledFor("PVerifySSLServerCert", mozilla::ipc::ChildSide)) {
mozilla::ipc::LogMessageForProtocol(
"PVerifySSLServerCertChild",
this->ToplevelProtocol()->OtherPidMaybeInvalid(),
"Received ",
(&(msg__))->type(),
mozilla::ipc::MessageDirection::eReceiving);
}
AUTO_PROFILER_LABEL("PVerifySSLServerCert::Msg_OnVerifiedSSLServerCertSuccess", OTHER);
IPC::MessageReader reader__{
msg__,
this};
auto maybe__aBuiltCertChain = IPC::ReadParam<nsTArray<ByteArray>>((&(reader__)));
if (!maybe__aBuiltCertChain) {
FatalError("Error deserializing 'ByteArray[]'");
return MsgValueError;
}
auto& aBuiltCertChain = *maybe__aBuiltCertChain;
// Sentinel = 'aBuiltCertChain'
if ((!(((&(reader__)))->ReadSentinel(772670931)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'ByteArray[]'");
return MsgValueError;
}
auto maybe__aCertTransparencyStatus = IPC::ReadParam<uint16_t>((&(reader__)));
if (!maybe__aCertTransparencyStatus) {
FatalError("Error deserializing 'uint16_t'");
return MsgValueError;
}
auto& aCertTransparencyStatus = *maybe__aCertTransparencyStatus;
// Sentinel = 'aCertTransparencyStatus'
if ((!(((&(reader__)))->ReadSentinel(1852770670)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'uint16_t'");
return MsgValueError;
}
auto maybe__aEVStatus = IPC::ReadParam<uint8_t>((&(reader__)));
if (!maybe__aEVStatus) {
FatalError("Error deserializing 'uint8_t'");
return MsgValueError;
}
auto& aEVStatus = *maybe__aEVStatus;
// Sentinel = 'aEVStatus'
if ((!(((&(reader__)))->ReadSentinel(275186561)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'uint8_t'");
return MsgValueError;
}
auto maybe__isBuiltCertChainRootBuiltInRoot = IPC::ReadParam<bool>((&(reader__)));
if (!maybe__isBuiltCertChainRootBuiltInRoot) {
FatalError("Error deserializing 'bool'");
return MsgValueError;
}
auto& isBuiltCertChainRootBuiltInRoot = *maybe__isBuiltCertChainRootBuiltInRoot;
// Sentinel = 'isBuiltCertChainRootBuiltInRoot'
if ((!(((&(reader__)))->ReadSentinel(3281652813)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'bool'");
return MsgValueError;
}
auto maybe__aMadeOCSPRequests = IPC::ReadParam<bool>((&(reader__)));
if (!maybe__aMadeOCSPRequests) {
FatalError("Error deserializing 'bool'");
return MsgValueError;
}
auto& aMadeOCSPRequests = *maybe__aMadeOCSPRequests;
// Sentinel = 'aMadeOCSPRequests'
if ((!(((&(reader__)))->ReadSentinel(919012970)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'bool'");
return MsgValueError;
}
reader__.EndRead();
mozilla::ipc::IPCResult __ok = (static_cast<VerifySSLServerCertChild*>(this))->RecvOnVerifiedSSLServerCertSuccess(std::move(aBuiltCertChain), std::move(aCertTransparencyStatus), std::move(aEVStatus), std::move(isBuiltCertChainRootBuiltInRoot), std::move(aMadeOCSPRequests));
if ((!(__ok))) {
mozilla::ipc::ProtocolErrorBreakpoint("Handler returned error code!");
// Error handled in mozilla::ipc::IPCResult
return MsgProcessingError;
}
return MsgProcessed;
}
case PVerifySSLServerCert::Msg_OnVerifiedSSLServerCertFailure__ID:
{
if (mozilla::ipc::LoggingEnabledFor("PVerifySSLServerCert", mozilla::ipc::ChildSide)) {
mozilla::ipc::LogMessageForProtocol(
"PVerifySSLServerCertChild",
this->ToplevelProtocol()->OtherPidMaybeInvalid(),
"Received ",
(&(msg__))->type(),
mozilla::ipc::MessageDirection::eReceiving);
}
AUTO_PROFILER_LABEL("PVerifySSLServerCert::Msg_OnVerifiedSSLServerCertFailure", OTHER);
IPC::MessageReader reader__{
msg__,
this};
auto maybe__aFinalError = IPC::ReadParam<int32_t>((&(reader__)));
if (!maybe__aFinalError) {
FatalError("Error deserializing 'int32_t'");
return MsgValueError;
}
auto& aFinalError = *maybe__aFinalError;
// Sentinel = 'aFinalError'
if ((!(((&(reader__)))->ReadSentinel(420021334)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'int32_t'");
return MsgValueError;
}
auto maybe__aOverridableErrorCategory = IPC::ReadParam<uint32_t>((&(reader__)));
if (!maybe__aOverridableErrorCategory) {
FatalError("Error deserializing 'uint32_t'");
return MsgValueError;
}
auto& aOverridableErrorCategory = *maybe__aOverridableErrorCategory;
// Sentinel = 'aOverridableErrorCategory'
if ((!(((&(reader__)))->ReadSentinel(2173635097)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'uint32_t'");
return MsgValueError;
}
auto maybe__aMadeOCSPRequests = IPC::ReadParam<bool>((&(reader__)));
if (!maybe__aMadeOCSPRequests) {
FatalError("Error deserializing 'bool'");
return MsgValueError;
}
auto& aMadeOCSPRequests = *maybe__aMadeOCSPRequests;
// Sentinel = 'aMadeOCSPRequests'
if ((!(((&(reader__)))->ReadSentinel(919012970)))) {
mozilla::ipc::SentinelReadError("Error deserializing 'bool'");
return MsgValueError;
}
reader__.EndRead();
mozilla::ipc::IPCResult __ok = (static_cast<VerifySSLServerCertChild*>(this))->RecvOnVerifiedSSLServerCertFailure(std::move(aFinalError), std::move(aOverridableErrorCategory), std::move(aMadeOCSPRequests));
if ((!(__ok))) {
mozilla::ipc::ProtocolErrorBreakpoint("Handler returned error code!");
// Error handled in mozilla::ipc::IPCResult
return MsgProcessingError;
}
return MsgProcessed;
}
default:
return MsgNotKnown;
case SHMEM_CREATED_MESSAGE_TYPE:
{
if (!ShmemCreated(msg__)) {
return MsgPayloadError;
}
return MsgProcessed;
}
case SHMEM_DESTROYED_MESSAGE_TYPE:
{
if (!ShmemDestroyed(msg__)) {
return MsgPayloadError;
}
return MsgProcessed;
}
}
}
auto PVerifySSLServerCertChild::OnMessageReceived(
const Message& msg__,
UniquePtr<Message>& reply__) -> PVerifySSLServerCertChild::Result
{
MOZ_ASSERT_UNREACHABLE("message protocol not supported");
return MsgNotKnown;
}
auto PVerifySSLServerCertChild::DoomSubtree() -> void
{
SetDoomed();
}
auto PVerifySSLServerCertChild::PeekManagedActor() -> IProtocol*
{
return nullptr;
}
} // namespace psm
} // namespace mozilla
namespace IPC {
auto ParamTraits<::mozilla::psm::PVerifySSLServerCertChild*>::Write(
IPC::MessageWriter* aWriter,
const paramType& aVar) -> void
{
MOZ_RELEASE_ASSERT(
aWriter->GetActor(),
"Cannot serialize managed actors without an actor");
int32_t id;
if (!aVar) {
id = 0; // kNullActorId
} else {
id = aVar->Id();
if (id == 1) { // kFreedActorId
aVar->FatalError("Actor has been |delete|d");
}
MOZ_RELEASE_ASSERT(
aWriter->GetActor()->GetIPCChannel() == aVar->GetIPCChannel(),
"Actor must be from the same channel as the"
" actor it's being sent over");
MOZ_RELEASE_ASSERT(
aVar->CanSend(),
"Actor must still be open when sending");
}
IPC::WriteParam(aWriter, id);
}
auto ParamTraits<::mozilla::psm::PVerifySSLServerCertChild*>::Read(IPC::MessageReader* aReader) -> IPC::ReadResult<paramType>
{
MOZ_RELEASE_ASSERT(
aReader->GetActor(),
"Cannot deserialize managed actors without an actor");
mozilla::Maybe<mozilla::ipc::IProtocol*> actor = aReader->GetActor()
->ReadActor(aReader, true, "PVerifySSLServerCert", PVerifySSLServerCertMsgStart);
if (actor.isSome()) {
return static_cast<::mozilla::psm::PVerifySSLServerCertChild*>(actor.ref());
}
return {};
}
} // namespace IPC