OLD | NEW |
1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file | 1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file |
2 // for details. All rights reserved. Use of this source code is governed by a | 2 // for details. All rights reserved. Use of this source code is governed by a |
3 // BSD-style license that can be found in the LICENSE file. | 3 // BSD-style license that can be found in the LICENSE file. |
4 | 4 |
5 #if !defined(DART_IO_SECURE_SOCKET_DISABLED) | 5 #if !defined(DART_IO_SECURE_SOCKET_DISABLED) |
6 | 6 |
7 #include "platform/globals.h" | 7 #include "platform/globals.h" |
8 #if defined(HOST_OS_LINUX) | 8 #if defined(HOST_OS_LINUX) |
9 | 9 |
10 #include "bin/security_context.h" | 10 #include "bin/security_context.h" |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
44 return; | 44 return; |
45 } | 45 } |
46 | 46 |
47 // On Linux, we use the compiled-in trusted certs as a last resort. First, | 47 // On Linux, we use the compiled-in trusted certs as a last resort. First, |
48 // we try to find the trusted certs in various standard locations. A good | 48 // we try to find the trusted certs in various standard locations. A good |
49 // discussion of the complexities of this endeavor can be found here: | 49 // discussion of the complexities of this endeavor can be found here: |
50 // | 50 // |
51 // https://www.happyassassin.net/2015/01/12/a-note-about-ssltls-trusted-certif
icate-stores-and-platforms/ | 51 // https://www.happyassassin.net/2015/01/12/a-note-about-ssltls-trusted-certif
icate-stores-and-platforms/ |
52 const char* bundle = "/etc/pki/tls/certs/ca-bundle.crt"; | 52 const char* bundle = "/etc/pki/tls/certs/ca-bundle.crt"; |
53 const char* cachedir = "/etc/ssl/certs"; | 53 const char* cachedir = "/etc/ssl/certs"; |
54 if (File::Exists(bundle)) { | 54 if (File::Exists(NULL, bundle)) { |
55 LoadRootCertFile(bundle); | 55 LoadRootCertFile(bundle); |
56 return; | 56 return; |
57 } | 57 } |
58 | 58 |
59 if (Directory::Exists(cachedir) == Directory::EXISTS) { | 59 if (Directory::Exists(NULL, cachedir) == Directory::EXISTS) { |
60 LoadRootCertCache(cachedir); | 60 LoadRootCertCache(cachedir); |
61 return; | 61 return; |
62 } | 62 } |
63 | 63 |
64 // Fall back on the compiled-in certs if the standard locations don't exist, | 64 // Fall back on the compiled-in certs if the standard locations don't exist, |
65 // or we aren't on Linux. | 65 // or we aren't on Linux. |
66 if (SSL_LOG_STATUS) { | 66 if (SSL_LOG_STATUS) { |
67 Log::Print("Trusting compiled-in roots\n"); | 67 Log::Print("Trusting compiled-in roots\n"); |
68 } | 68 } |
69 AddCompiledInCerts(); | 69 AddCompiledInCerts(); |
70 } | 70 } |
71 | 71 |
72 void SSLCertContext::RegisterCallbacks(SSL* ssl) { | 72 void SSLCertContext::RegisterCallbacks(SSL* ssl) { |
73 // No callbacks to register for implementations using BoringSSL's built-in | 73 // No callbacks to register for implementations using BoringSSL's built-in |
74 // verification mechanism. | 74 // verification mechanism. |
75 } | 75 } |
76 | 76 |
77 } // namespace bin | 77 } // namespace bin |
78 } // namespace dart | 78 } // namespace dart |
79 | 79 |
80 #endif // defined(HOST_OS_LINUX) | 80 #endif // defined(HOST_OS_LINUX) |
81 | 81 |
82 #endif // !defined(DART_IO_SECURE_SOCKET_DISABLED) | 82 #endif // !defined(DART_IO_SECURE_SOCKET_DISABLED) |
OLD | NEW |