Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(85)

Side by Side Diff: runtime/bin/security_context.cc

Issue 3001963002: [dart:io] Namespaces for file IO (Closed)
Patch Set: Fuchsia fix Created 3 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « runtime/bin/process_win.cc ('k') | runtime/bin/security_context_fuchsia.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file 1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file
2 // for details. All rights reserved. Use of this source code is governed by a 2 // for details. All rights reserved. Use of this source code is governed by a
3 // BSD-style license that can be found in the LICENSE file. 3 // BSD-style license that can be found in the LICENSE file.
4 4
5 #if !defined(DART_IO_SECURE_SOCKET_DISABLED) 5 #if !defined(DART_IO_SECURE_SOCKET_DISABLED)
6 6
7 #include "bin/security_context.h" 7 #include "bin/security_context.h"
8 8
9 #include <openssl/bio.h> 9 #include <openssl/bio.h>
10 #include <openssl/err.h> 10 #include <openssl/err.h>
(...skipping 305 matching lines...) Expand 10 before | Expand all | Expand 10 after
316 } 316 }
317 317
318 SecureSocketUtils::CheckStatus(status, "TlsException", 318 SecureSocketUtils::CheckStatus(status, "TlsException",
319 "Failure in setClientAuthoritiesBytes"); 319 "Failure in setClientAuthoritiesBytes");
320 } 320 }
321 321
322 void SSLCertContext::LoadRootCertFile(const char* file) { 322 void SSLCertContext::LoadRootCertFile(const char* file) {
323 if (SSL_LOG_STATUS) { 323 if (SSL_LOG_STATUS) {
324 Log::Print("Looking for trusted roots in %s\n", file); 324 Log::Print("Looking for trusted roots in %s\n", file);
325 } 325 }
326 if (!File::Exists(file)) { 326 if (!File::Exists(NULL, file)) {
327 SecureSocketUtils::ThrowIOException(-1, "TlsException", 327 SecureSocketUtils::ThrowIOException(-1, "TlsException",
328 "Failed to find root cert file", NULL); 328 "Failed to find root cert file", NULL);
329 } 329 }
330 int status = SSL_CTX_load_verify_locations(context(), file, NULL); 330 int status = SSL_CTX_load_verify_locations(context(), file, NULL);
331 SecureSocketUtils::CheckStatus(status, "TlsException", 331 SecureSocketUtils::CheckStatus(status, "TlsException",
332 "Failure trusting builtin roots"); 332 "Failure trusting builtin roots");
333 if (SSL_LOG_STATUS) { 333 if (SSL_LOG_STATUS) {
334 Log::Print("Trusting roots from: %s\n", file); 334 Log::Print("Trusting roots from: %s\n", file);
335 } 335 }
336 } 336 }
(...skipping 25 matching lines...) Expand all
362 // If there is an error here, it must be the error indicating that we are done 362 // If there is an error here, it must be the error indicating that we are done
363 // reading PEM certificates. 363 // reading PEM certificates.
364 ASSERT((ERR_peek_error() == 0) || SecureSocketUtils::NoPEMStartLine()); 364 ASSERT((ERR_peek_error() == 0) || SecureSocketUtils::NoPEMStartLine());
365 ERR_clear_error(); 365 ERR_clear_error();
366 } 366 }
367 367
368 void SSLCertContext::LoadRootCertCache(const char* cache) { 368 void SSLCertContext::LoadRootCertCache(const char* cache) {
369 if (SSL_LOG_STATUS) { 369 if (SSL_LOG_STATUS) {
370 Log::Print("Looking for trusted roots in %s\n", cache); 370 Log::Print("Looking for trusted roots in %s\n", cache);
371 } 371 }
372 if (Directory::Exists(cache) != Directory::EXISTS) { 372 if (Directory::Exists(NULL, cache) != Directory::EXISTS) {
373 SecureSocketUtils::ThrowIOException(-1, "TlsException", 373 SecureSocketUtils::ThrowIOException(-1, "TlsException",
374 "Failed to find root cert cache", NULL); 374 "Failed to find root cert cache", NULL);
375 } 375 }
376 int status = SSL_CTX_load_verify_locations(context(), NULL, cache); 376 int status = SSL_CTX_load_verify_locations(context(), NULL, cache);
377 SecureSocketUtils::CheckStatus(status, "TlsException", 377 SecureSocketUtils::CheckStatus(status, "TlsException",
378 "Failure trusting builtin roots"); 378 "Failure trusting builtin roots");
379 if (SSL_LOG_STATUS) { 379 if (SSL_LOG_STATUS) {
380 Log::Print("Trusting roots from: %s\n", cache); 380 Log::Print("Trusting roots from: %s\n", cache);
381 } 381 }
382 } 382 }
(...skipping 427 matching lines...) Expand 10 before | Expand all | Expand 10 after
810 } else { 810 } else {
811 Dart_ThrowException(DartUtils::NewDartArgumentError( 811 Dart_ThrowException(DartUtils::NewDartArgumentError(
812 "Non-boolean is_server argument passed to SetAlpnProtocols")); 812 "Non-boolean is_server argument passed to SetAlpnProtocols"));
813 } 813 }
814 } 814 }
815 815
816 } // namespace bin 816 } // namespace bin
817 } // namespace dart 817 } // namespace dart
818 818
819 #endif // !defined(DART_IO_SECURE_SOCKET_DISABLED) 819 #endif // !defined(DART_IO_SECURE_SOCKET_DISABLED)
OLDNEW
« no previous file with comments | « runtime/bin/process_win.cc ('k') | runtime/bin/security_context_fuchsia.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698