summaryrefslogtreecommitdiff
path: root/indra/newview/llsecapi.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'indra/newview/llsecapi.cpp')
-rw-r--r--indra/newview/llsecapi.cpp182
1 files changed, 91 insertions, 91 deletions
diff --git a/indra/newview/llsecapi.cpp b/indra/newview/llsecapi.cpp
index aba8ca5a4a..85c7451d8a 100644
--- a/indra/newview/llsecapi.cpp
+++ b/indra/newview/llsecapi.cpp
@@ -1,4 +1,4 @@
-/**
+/**
* @file llsecapi.cpp
* @brief Security API for services such as certificate handling
* secure local storage, etc.
@@ -6,21 +6,21 @@
* $LicenseInfo:firstyear=2009&license=viewerlgpl$
* Second Life Viewer Source Code
* Copyright (C) 2010, Linden Research, Inc.
- *
+ *
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation;
* version 2.1 of the License only.
- *
+ *
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
- *
+ *
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- *
+ *
* Linden Research, Inc., 945 Battery Street, San Francisco, CA 94111 USA
* $/LicenseInfo$
*/
@@ -42,37 +42,37 @@ LLPointer<LLSecAPIHandler> gSecAPIHandler;
void initializeSecHandler()
{
- ERR_load_crypto_strings();
- OpenSSL_add_all_algorithms();
-
- gHandlerMap[BASIC_SECHANDLER] = new LLSecAPIBasicHandler();
-
-
- // Currently, we only have the Basic handler, so we can point the main sechandler
- // pointer to the basic handler. Later, we'll create a wrapper handler that
- // selects the appropriate sechandler as needed, for instance choosing the
- // mac keyring handler, with fallback to the basic sechandler
- gSecAPIHandler = gHandlerMap[BASIC_SECHANDLER];
-
- // initialize all SecAPIHandlers
- std::string exception_msg;
- std::map<std::string, LLPointer<LLSecAPIHandler> >::const_iterator itr;
- for(itr = gHandlerMap.begin(); itr != gHandlerMap.end(); ++itr)
- {
- LLPointer<LLSecAPIHandler> handler = (*itr).second;
- try
- {
- handler->init();
- }
- catch (LLProtectedDataException& e)
- {
- exception_msg = e.what();
- }
- }
- if (!exception_msg.empty()) // an exception was thrown.
- {
- LLTHROW(LLProtectedDataException(exception_msg));
- }
+ ERR_load_crypto_strings();
+ OpenSSL_add_all_algorithms();
+
+ gHandlerMap[BASIC_SECHANDLER] = new LLSecAPIBasicHandler();
+
+
+ // Currently, we only have the Basic handler, so we can point the main sechandler
+ // pointer to the basic handler. Later, we'll create a wrapper handler that
+ // selects the appropriate sechandler as needed, for instance choosing the
+ // mac keyring handler, with fallback to the basic sechandler
+ gSecAPIHandler = gHandlerMap[BASIC_SECHANDLER];
+
+ // initialize all SecAPIHandlers
+ std::string exception_msg;
+ std::map<std::string, LLPointer<LLSecAPIHandler> >::const_iterator itr;
+ for(itr = gHandlerMap.begin(); itr != gHandlerMap.end(); ++itr)
+ {
+ LLPointer<LLSecAPIHandler> handler = (*itr).second;
+ try
+ {
+ handler->init();
+ }
+ catch (LLProtectedDataException& e)
+ {
+ exception_msg = e.what();
+ }
+ }
+ if (!exception_msg.empty()) // an exception was thrown.
+ {
+ LLTHROW(LLProtectedDataException(exception_msg));
+ }
}
@@ -85,80 +85,80 @@ void clearSecHandler()
// the default is used
LLPointer<LLSecAPIHandler> getSecHandler(const std::string& handler_type)
{
- if (gHandlerMap.find(handler_type) != gHandlerMap.end())
- {
- return gHandlerMap[handler_type];
- }
- else
- {
- return LLPointer<LLSecAPIHandler>(NULL);
- }
+ if (gHandlerMap.find(handler_type) != gHandlerMap.end())
+ {
+ return gHandlerMap[handler_type];
+ }
+ else
+ {
+ return LLPointer<LLSecAPIHandler>(NULL);
+ }
}
// register a handler
-void registerSecHandler(const std::string& handler_type,
- LLPointer<LLSecAPIHandler>& handler)
+void registerSecHandler(const std::string& handler_type,
+ LLPointer<LLSecAPIHandler>& handler)
{
- gHandlerMap[handler_type] = handler;
+ gHandlerMap[handler_type] = handler;
}
std::ostream& operator <<(std::ostream& s, const LLCredential& cred)
{
- return s << (std::string)cred;
+ return s << (std::string)cred;
}
LLSD LLCredential::getLoginParams()
{
- LLSD result = LLSD::emptyMap();
- std::string username;
- try
- {
- if (mIdentifier["type"].asString() == "agent")
- {
- // legacy credential
- result["passwd"] = "$1$" + mAuthenticator["secret"].asString();
- result["first"] = mIdentifier["first_name"];
- result["last"] = mIdentifier["last_name"];
- username = result["first"].asString() + " " + result["last"].asString();
- }
- else if (mIdentifier["type"].asString() == "account")
- {
- result["username"] = mIdentifier["account_name"];
- result["passwd"] = mAuthenticator["secret"].asString();
- username = result["username"].asString();
- }
- }
- catch (...)
- {
- // nat 2016-08-18: not clear what exceptions the above COULD throw?!
- LOG_UNHANDLED_EXCEPTION(STRINGIZE("for '" << username << "'"));
- // we could have corrupt data, so simply return a null login param if so
- LL_WARNS("AppInit") << "Invalid credential" << LL_ENDL;
- }
- return result;
+ LLSD result = LLSD::emptyMap();
+ std::string username;
+ try
+ {
+ if (mIdentifier["type"].asString() == "agent")
+ {
+ // legacy credential
+ result["passwd"] = "$1$" + mAuthenticator["secret"].asString();
+ result["first"] = mIdentifier["first_name"];
+ result["last"] = mIdentifier["last_name"];
+ username = result["first"].asString() + " " + result["last"].asString();
+ }
+ else if (mIdentifier["type"].asString() == "account")
+ {
+ result["username"] = mIdentifier["account_name"];
+ result["passwd"] = mAuthenticator["secret"].asString();
+ username = result["username"].asString();
+ }
+ }
+ catch (...)
+ {
+ // nat 2016-08-18: not clear what exceptions the above COULD throw?!
+ LOG_UNHANDLED_EXCEPTION(STRINGIZE("for '" << username << "'"));
+ // we could have corrupt data, so simply return a null login param if so
+ LL_WARNS("AppInit") << "Invalid credential" << LL_ENDL;
+ }
+ return result;
}
void LLCredential::identifierType(std::string &idType)
{
- if(mIdentifier.has("type"))
- {
- idType = mIdentifier["type"].asString();
- }
- else {
- idType = std::string();
-
- }
+ if(mIdentifier.has("type"))
+ {
+ idType = mIdentifier["type"].asString();
+ }
+ else {
+ idType = std::string();
+
+ }
}
void LLCredential::authenticatorType(std::string &idType)
{
- if(mAuthenticator.has("type"))
- {
- idType = mAuthenticator["type"].asString();
- }
- else {
- idType = std::string();
-
- }
+ if(mAuthenticator.has("type"))
+ {
+ idType = mAuthenticator["type"].asString();
+ }
+ else {
+ idType = std::string();
+
+ }
}
LLCertException::LLCertException(const LLSD& cert_data, const std::string& msg)