Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(450)

Unified Diff: webrtc/p2p/base/dtlstransport.h

Issue 1246913005: TransportController refactoring (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: webrtc/p2p/base/dtlstransport.h
diff --git a/webrtc/p2p/base/dtlstransport.h b/webrtc/p2p/base/dtlstransport.h
index 9fd3ba3274ad585e3196bfc36989f763510f650e..b0684559e6a1c0b535094414e274ace05d0c93ac 100644
--- a/webrtc/p2p/base/dtlstransport.h
+++ b/webrtc/p2p/base/dtlstransport.h
@@ -23,33 +23,31 @@ namespace cricket {
class PortAllocator;
-// Base should be a descendant of cricket::Transport
-// TODO(hbos): Add appropriate DCHECK thread checks to all methods.
+// Base should be a descendant of cricket::Transport and have a constructor
+// that takes a transport name and PortAllocator.
+//
+// Everything in this class should be called on the worker thread.
template<class Base>
class DtlsTransport : public Base {
public:
- DtlsTransport(rtc::Thread* signaling_thread,
- rtc::Thread* worker_thread,
- const std::string& content_name,
+ DtlsTransport(const std::string& content_name,
PortAllocator* allocator,
const rtc::scoped_refptr<rtc::RTCCertificate>& certificate)
- : Base(signaling_thread, worker_thread, content_name, allocator),
+ : Base(content_name, allocator),
certificate_(certificate),
secure_role_(rtc::SSL_CLIENT),
- ssl_max_version_(rtc::SSL_PROTOCOL_DTLS_10) {
- }
+ ssl_max_version_(rtc::SSL_PROTOCOL_DTLS_10) {}
~DtlsTransport() {
Base::DestroyAllChannels();
}
- void SetCertificate_w(
+
+ void SetCertificate(
const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
- DCHECK(Base::worker_thread()->IsCurrent());
certificate_ = certificate;
}
- bool GetCertificate_w(
+ bool GetCertificate(
rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override {
- DCHECK(Base::worker_thread()->IsCurrent());
if (!certificate_)
return false;
@@ -57,15 +55,13 @@ class DtlsTransport : public Base {
return true;
}
- bool SetSslMaxProtocolVersion_w(rtc::SSLProtocolVersion version) override {
- DCHECK(Base::worker_thread()->IsCurrent());
+ bool SetSslMaxProtocolVersion(rtc::SSLProtocolVersion version) override {
ssl_max_version_ = version;
return true;
}
- bool ApplyLocalTransportDescription_w(TransportChannelImpl* channel,
- std::string* error_desc) override {
- DCHECK(Base::worker_thread()->IsCurrent());
+ bool ApplyLocalTransportDescription(TransportChannelImpl* channel,
+ std::string* error_desc) override {
rtc::SSLFingerprint* local_fp =
Base::local_description()->identity_fingerprint.get();
@@ -93,19 +89,18 @@ class DtlsTransport : public Base {
}
// TODO(hbos): SetLocalCertificate
- if (!channel->SetLocalIdentity(
- certificate_ ? certificate_->identity() : nullptr)) {
+ if (!channel->SetLocalIdentity(certificate_ ? certificate_->identity()
+ : nullptr)) {
return BadTransportDescription("Failed to set local identity.",
error_desc);
}
// Apply the description in the base class.
- return Base::ApplyLocalTransportDescription_w(channel, error_desc);
+ return Base::ApplyLocalTransportDescription(channel, error_desc);
}
- bool NegotiateTransportDescription_w(ContentAction local_role,
- std::string* error_desc) override {
- DCHECK(Base::worker_thread()->IsCurrent());
+ bool NegotiateTransportDescription(ContentAction local_role,
+ std::string* error_desc) override {
if (!Base::local_description() || !Base::remote_description()) {
const std::string msg = "Local and Remote description must be set before "
"transport descriptions are negotiated";
@@ -202,7 +197,7 @@ class DtlsTransport : public Base {
}
// Now run the negotiation for the base class.
- return Base::NegotiateTransportDescription_w(local_role, error_desc);
+ return Base::NegotiateTransportDescription(local_role, error_desc);
}
DtlsTransportChannelWrapper* CreateTransportChannel(int component) override {
@@ -221,18 +216,15 @@ class DtlsTransport : public Base {
Base::DestroyTransportChannel(base_channel);
}
- bool GetSslRole_w(rtc::SSLRole* ssl_role) const override {
- DCHECK(Base::worker_thread()->IsCurrent());
+ bool GetSslRole(rtc::SSLRole* ssl_role) const override {
ASSERT(ssl_role != NULL);
*ssl_role = secure_role_;
return true;
}
private:
- bool ApplyNegotiatedTransportDescription_w(
- TransportChannelImpl* channel,
- std::string* error_desc) override {
- DCHECK(Base::worker_thread()->IsCurrent());
+ bool ApplyNegotiatedTransportDescription(TransportChannelImpl* channel,
+ std::string* error_desc) override {
// Set ssl role. Role must be set before fingerprint is applied, which
// initiates DTLS setup.
if (!channel->SetSslRole(secure_role_)) {
@@ -247,7 +239,7 @@ class DtlsTransport : public Base {
return BadTransportDescription("Failed to apply remote fingerprint.",
error_desc);
}
- return Base::ApplyNegotiatedTransportDescription_w(channel, error_desc);
+ return Base::ApplyNegotiatedTransportDescription(channel, error_desc);
}
rtc::scoped_refptr<rtc::RTCCertificate> certificate_;

Powered by Google App Engine
This is Rietveld 408576698