summaryrefslogtreecommitdiff
path: root/netwerk/ipc/NeckoMessageUtils.h
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /netwerk/ipc/NeckoMessageUtils.h
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloaduxp-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
Add m-esr52 at 52.6.0
Diffstat (limited to 'netwerk/ipc/NeckoMessageUtils.h')
-rw-r--r--netwerk/ipc/NeckoMessageUtils.h189
1 files changed, 189 insertions, 0 deletions
diff --git a/netwerk/ipc/NeckoMessageUtils.h b/netwerk/ipc/NeckoMessageUtils.h
new file mode 100644
index 0000000000..273f049a26
--- /dev/null
+++ b/netwerk/ipc/NeckoMessageUtils.h
@@ -0,0 +1,189 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef mozilla_net_NeckoMessageUtils_h
+#define mozilla_net_NeckoMessageUtils_h
+
+#include "mozilla/DebugOnly.h"
+
+#include "ipc/IPCMessageUtils.h"
+#include "nsStringGlue.h"
+#include "prio.h"
+#include "mozilla/net/DNS.h"
+#include "TimingStruct.h"
+
+#ifdef MOZ_CRASHREPORTER
+#include "nsExceptionHandler.h"
+#include "nsPrintfCString.h"
+#endif
+
+namespace IPC {
+
+// nsIPermissionManager utilities
+
+struct Permission
+{
+ nsCString origin, type;
+ uint32_t capability, expireType;
+ int64_t expireTime;
+
+ Permission() { }
+ Permission(const nsCString& aOrigin,
+ const nsCString& aType,
+ const uint32_t aCapability,
+ const uint32_t aExpireType,
+ const int64_t aExpireTime) : origin(aOrigin),
+ type(aType),
+ capability(aCapability),
+ expireType(aExpireType),
+ expireTime(aExpireTime)
+ {}
+};
+
+template<>
+struct ParamTraits<Permission>
+{
+ static void Write(Message* aMsg, const Permission& aParam)
+ {
+ WriteParam(aMsg, aParam.origin);
+ WriteParam(aMsg, aParam.type);
+ WriteParam(aMsg, aParam.capability);
+ WriteParam(aMsg, aParam.expireType);
+ WriteParam(aMsg, aParam.expireTime);
+ }
+
+ static bool Read(const Message* aMsg, PickleIterator* aIter, Permission* aResult)
+ {
+ return ReadParam(aMsg, aIter, &aResult->origin) &&
+ ReadParam(aMsg, aIter, &aResult->type) &&
+ ReadParam(aMsg, aIter, &aResult->capability) &&
+ ReadParam(aMsg, aIter, &aResult->expireType) &&
+ ReadParam(aMsg, aIter, &aResult->expireTime);
+ }
+
+ static void Log(const Permission& p, std::wstring* l)
+ {
+ l->append(L"(");
+ LogParam(p.origin, l);
+ l->append(L", ");
+ LogParam(p.capability, l);
+ l->append(L", ");
+ LogParam(p.expireTime, l);
+ l->append(L", ");
+ LogParam(p.expireType, l);
+ l->append(L")");
+ }
+};
+
+template<>
+struct ParamTraits<mozilla::net::NetAddr>
+{
+ static void Write(Message* aMsg, const mozilla::net::NetAddr &aParam)
+ {
+ WriteParam(aMsg, aParam.raw.family);
+ if (aParam.raw.family == AF_UNSPEC) {
+ aMsg->WriteBytes(aParam.raw.data, sizeof(aParam.raw.data));
+ } else if (aParam.raw.family == AF_INET) {
+ WriteParam(aMsg, aParam.inet.port);
+ WriteParam(aMsg, aParam.inet.ip);
+ } else if (aParam.raw.family == AF_INET6) {
+ WriteParam(aMsg, aParam.inet6.port);
+ WriteParam(aMsg, aParam.inet6.flowinfo);
+ WriteParam(aMsg, aParam.inet6.ip.u64[0]);
+ WriteParam(aMsg, aParam.inet6.ip.u64[1]);
+ WriteParam(aMsg, aParam.inet6.scope_id);
+#if defined(XP_UNIX)
+ } else if (aParam.raw.family == AF_LOCAL) {
+ // Train's already off the rails: let's get a stack trace at least...
+ NS_RUNTIMEABORT("Error: please post stack trace to "
+ "https://bugzilla.mozilla.org/show_bug.cgi?id=661158");
+ aMsg->WriteBytes(aParam.local.path, sizeof(aParam.local.path));
+#endif
+ } else {
+#ifdef MOZ_CRASHREPORTER
+ if (XRE_IsParentProcess()) {
+ nsPrintfCString msg("%d", aParam.raw.family);
+ CrashReporter::AnnotateCrashReport(NS_LITERAL_CSTRING("Unknown NetAddr socket family"), msg);
+ }
+#endif
+ NS_RUNTIMEABORT("Unknown socket family");
+ }
+ }
+
+ static bool Read(const Message* aMsg, PickleIterator* aIter, mozilla::net::NetAddr* aResult)
+ {
+ if (!ReadParam(aMsg, aIter, &aResult->raw.family))
+ return false;
+
+ if (aResult->raw.family == AF_UNSPEC) {
+ return aMsg->ReadBytesInto(aIter, &aResult->raw.data, sizeof(aResult->raw.data));
+ } else if (aResult->raw.family == AF_INET) {
+ return ReadParam(aMsg, aIter, &aResult->inet.port) &&
+ ReadParam(aMsg, aIter, &aResult->inet.ip);
+ } else if (aResult->raw.family == AF_INET6) {
+ return ReadParam(aMsg, aIter, &aResult->inet6.port) &&
+ ReadParam(aMsg, aIter, &aResult->inet6.flowinfo) &&
+ ReadParam(aMsg, aIter, &aResult->inet6.ip.u64[0]) &&
+ ReadParam(aMsg, aIter, &aResult->inet6.ip.u64[1]) &&
+ ReadParam(aMsg, aIter, &aResult->inet6.scope_id);
+#if defined(XP_UNIX)
+ } else if (aResult->raw.family == AF_LOCAL) {
+ return aMsg->ReadBytesInto(aIter, &aResult->local.path, sizeof(aResult->local.path));
+#endif
+ }
+
+ /* We've been tricked by some socket family we don't know about! */
+ return false;
+ }
+};
+
+template<>
+struct ParamTraits<mozilla::net::ResourceTimingStruct>
+{
+ static void Write(Message* aMsg, const mozilla::net::ResourceTimingStruct& aParam)
+ {
+ WriteParam(aMsg, aParam.domainLookupStart);
+ WriteParam(aMsg, aParam.domainLookupEnd);
+ WriteParam(aMsg, aParam.connectStart);
+ WriteParam(aMsg, aParam.connectEnd);
+ WriteParam(aMsg, aParam.requestStart);
+ WriteParam(aMsg, aParam.responseStart);
+ WriteParam(aMsg, aParam.responseEnd);
+
+ WriteParam(aMsg, aParam.fetchStart);
+ WriteParam(aMsg, aParam.redirectStart);
+ WriteParam(aMsg, aParam.redirectEnd);
+
+ WriteParam(aMsg, aParam.transferSize);
+ WriteParam(aMsg, aParam.encodedBodySize);
+ WriteParam(aMsg, aParam.protocolVersion);
+
+ WriteParam(aMsg, aParam.cacheReadStart);
+ WriteParam(aMsg, aParam.cacheReadEnd);
+ }
+
+ static bool Read(const Message* aMsg, PickleIterator* aIter, mozilla::net::ResourceTimingStruct* aResult)
+ {
+ return ReadParam(aMsg, aIter, &aResult->domainLookupStart) &&
+ ReadParam(aMsg, aIter, &aResult->domainLookupEnd) &&
+ ReadParam(aMsg, aIter, &aResult->connectStart) &&
+ ReadParam(aMsg, aIter, &aResult->connectEnd) &&
+ ReadParam(aMsg, aIter, &aResult->requestStart) &&
+ ReadParam(aMsg, aIter, &aResult->responseStart) &&
+ ReadParam(aMsg, aIter, &aResult->responseEnd) &&
+ ReadParam(aMsg, aIter, &aResult->fetchStart) &&
+ ReadParam(aMsg, aIter, &aResult->redirectStart) &&
+ ReadParam(aMsg, aIter, &aResult->redirectEnd) &&
+ ReadParam(aMsg, aIter, &aResult->transferSize) &&
+ ReadParam(aMsg, aIter, &aResult->encodedBodySize) &&
+ ReadParam(aMsg, aIter, &aResult->protocolVersion) &&
+ ReadParam(aMsg, aIter, &aResult->cacheReadStart) &&
+ ReadParam(aMsg, aIter, &aResult->cacheReadEnd);
+ }
+};
+
+} // namespace IPC
+
+#endif // mozilla_net_NeckoMessageUtils_h