2023-01-02 23:47:15 +01:00
|
|
|
// Copyright (c) 2023 The Chromium Embedded Framework Authors. All rights
|
2016-09-02 12:01:33 +02:00
|
|
|
// reserved. Use of this source code is governed by a BSD-style license that
|
|
|
|
// can be found in the LICENSE file.
|
|
|
|
//
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// This file was generated by the CEF translator tool. If making changes by
|
|
|
|
// hand only do so within the body of existing method and function
|
|
|
|
// implementations. See the translator.README.txt file in the tools directory
|
|
|
|
// for more information.
|
|
|
|
//
|
2023-05-08 17:15:02 +02:00
|
|
|
// $hash=82e87e32f0c6e2da2ae52a8f3af76e22790ee911$
|
2017-05-17 11:29:28 +02:00
|
|
|
//
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
#include "libcef_dll/ctocpp/sslstatus_ctocpp.h"
|
|
|
|
#include "libcef_dll/ctocpp/x509certificate_ctocpp.h"
|
2019-01-23 16:42:12 +01:00
|
|
|
#include "libcef_dll/shutdown_checker.h"
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// VIRTUAL METHODS - Body may be edited by hand.
|
|
|
|
|
2018-07-12 19:55:56 +02:00
|
|
|
NO_SANITIZE("cfi-icall") bool CefSSLStatusCToCpp::IsSecureConnection() {
|
2019-01-23 16:42:12 +01:00
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_sslstatus_t* _struct = GetStruct();
|
2023-01-02 23:47:15 +01:00
|
|
|
if (CEF_MEMBER_MISSING(_struct, is_secure_connection)) {
|
2016-09-02 12:01:33 +02:00
|
|
|
return false;
|
2023-01-02 23:47:15 +01:00
|
|
|
}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
int _retval = _struct->is_secure_connection(_struct);
|
|
|
|
|
|
|
|
// Return type: bool
|
2017-05-17 11:29:28 +02:00
|
|
|
return _retval ? true : false;
|
2016-09-02 12:01:33 +02:00
|
|
|
}
|
|
|
|
|
2018-07-12 19:55:56 +02:00
|
|
|
NO_SANITIZE("cfi-icall") cef_cert_status_t CefSSLStatusCToCpp::GetCertStatus() {
|
2019-01-23 16:42:12 +01:00
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_sslstatus_t* _struct = GetStruct();
|
2023-01-02 23:47:15 +01:00
|
|
|
if (CEF_MEMBER_MISSING(_struct, get_cert_status)) {
|
2016-09-02 12:01:33 +02:00
|
|
|
return CERT_STATUS_NONE;
|
2023-01-02 23:47:15 +01:00
|
|
|
}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
cef_cert_status_t _retval = _struct->get_cert_status(_struct);
|
|
|
|
|
|
|
|
// Return type: simple
|
|
|
|
return _retval;
|
|
|
|
}
|
|
|
|
|
2018-07-12 19:55:56 +02:00
|
|
|
NO_SANITIZE("cfi-icall") cef_ssl_version_t CefSSLStatusCToCpp::GetSSLVersion() {
|
2019-01-23 16:42:12 +01:00
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_sslstatus_t* _struct = GetStruct();
|
2023-01-02 23:47:15 +01:00
|
|
|
if (CEF_MEMBER_MISSING(_struct, get_sslversion)) {
|
2016-09-02 12:01:33 +02:00
|
|
|
return SSL_CONNECTION_VERSION_UNKNOWN;
|
2023-01-02 23:47:15 +01:00
|
|
|
}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
cef_ssl_version_t _retval = _struct->get_sslversion(_struct);
|
|
|
|
|
|
|
|
// Return type: simple
|
|
|
|
return _retval;
|
|
|
|
}
|
|
|
|
|
2018-07-12 19:55:56 +02:00
|
|
|
NO_SANITIZE("cfi-icall")
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_ssl_content_status_t CefSSLStatusCToCpp::GetContentStatus() {
|
2019-01-23 16:42:12 +01:00
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_sslstatus_t* _struct = GetStruct();
|
2023-01-02 23:47:15 +01:00
|
|
|
if (CEF_MEMBER_MISSING(_struct, get_content_status)) {
|
2016-09-02 12:01:33 +02:00
|
|
|
return SSL_CONTENT_NORMAL_CONTENT;
|
2023-01-02 23:47:15 +01:00
|
|
|
}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
cef_ssl_content_status_t _retval = _struct->get_content_status(_struct);
|
|
|
|
|
|
|
|
// Return type: simple
|
|
|
|
return _retval;
|
|
|
|
}
|
|
|
|
|
2018-07-12 19:55:56 +02:00
|
|
|
NO_SANITIZE("cfi-icall")
|
2016-09-02 12:01:33 +02:00
|
|
|
CefRefPtr<CefX509Certificate> CefSSLStatusCToCpp::GetX509Certificate() {
|
2019-01-23 16:42:12 +01:00
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
|
2016-09-02 12:01:33 +02:00
|
|
|
cef_sslstatus_t* _struct = GetStruct();
|
2023-01-02 23:47:15 +01:00
|
|
|
if (CEF_MEMBER_MISSING(_struct, get_x509certificate)) {
|
2020-01-15 14:53:19 +01:00
|
|
|
return nullptr;
|
2023-01-02 23:47:15 +01:00
|
|
|
}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
|
|
|
// AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
cef_x509certificate_t* _retval = _struct->get_x509certificate(_struct);
|
|
|
|
|
|
|
|
// Return type: refptr_same
|
|
|
|
return CefX509CertificateCToCpp::Wrap(_retval);
|
|
|
|
}
|
|
|
|
|
|
|
|
// CONSTRUCTOR - Do not edit by hand.
|
|
|
|
|
2017-05-17 11:29:28 +02:00
|
|
|
CefSSLStatusCToCpp::CefSSLStatusCToCpp() {}
|
2016-09-02 12:01:33 +02:00
|
|
|
|
2019-01-23 16:42:12 +01:00
|
|
|
// DESTRUCTOR - Do not edit by hand.
|
|
|
|
|
|
|
|
CefSSLStatusCToCpp::~CefSSLStatusCToCpp() {
|
|
|
|
shutdown_checker::AssertNotShutdown();
|
|
|
|
}
|
|
|
|
|
2017-05-17 11:29:28 +02:00
|
|
|
template <>
|
|
|
|
cef_sslstatus_t*
|
|
|
|
CefCToCppRefCounted<CefSSLStatusCToCpp, CefSSLStatus, cef_sslstatus_t>::
|
|
|
|
UnwrapDerived(CefWrapperType type, CefSSLStatus* c) {
|
2023-05-08 17:15:02 +02:00
|
|
|
DCHECK(false) << "Unexpected class type: " << type;
|
2020-01-15 14:53:19 +01:00
|
|
|
return nullptr;
|
2016-09-02 12:01:33 +02:00
|
|
|
}
|
|
|
|
|
2017-05-17 11:29:28 +02:00
|
|
|
template <>
|
|
|
|
CefWrapperType CefCToCppRefCounted<CefSSLStatusCToCpp,
|
|
|
|
CefSSLStatus,
|
|
|
|
cef_sslstatus_t>::kWrapperType =
|
|
|
|
WT_SSLSTATUS;
|