diff options
Diffstat (limited to 'indra/newview/llsecapi.cpp')
| -rw-r--r-- | indra/newview/llsecapi.cpp | 182 | 
1 files changed, 91 insertions, 91 deletions
diff --git a/indra/newview/llsecapi.cpp b/indra/newview/llsecapi.cpp index aba8ca5a4a..85c7451d8a 100644 --- a/indra/newview/llsecapi.cpp +++ b/indra/newview/llsecapi.cpp @@ -1,4 +1,4 @@ -/**  +/**   * @file llsecapi.cpp   * @brief Security API for services such as certificate handling   * secure local storage, etc. @@ -6,21 +6,21 @@   * $LicenseInfo:firstyear=2009&license=viewerlgpl$   * Second Life Viewer Source Code   * Copyright (C) 2010, Linden Research, Inc. - *  + *   * This library is free software; you can redistribute it and/or   * modify it under the terms of the GNU Lesser General Public   * License as published by the Free Software Foundation;   * version 2.1 of the License only. - *  + *   * This library is distributed in the hope that it will be useful,   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU   * Lesser General Public License for more details. - *  + *   * You should have received a copy of the GNU Lesser General Public   * License along with this library; if not, write to the Free Software   * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA - *  + *   * Linden Research, Inc., 945 Battery Street, San Francisco, CA  94111  USA   * $/LicenseInfo$   */ @@ -42,37 +42,37 @@ LLPointer<LLSecAPIHandler> gSecAPIHandler;  void initializeSecHandler()  { -	ERR_load_crypto_strings(); -	OpenSSL_add_all_algorithms(); - -	gHandlerMap[BASIC_SECHANDLER] = new LLSecAPIBasicHandler(); -	 -	 -	// Currently, we only have the Basic handler, so we can point the main sechandler -	// pointer to the basic handler.  Later, we'll create a wrapper handler that -	// selects the appropriate sechandler as needed, for instance choosing the -	// mac keyring handler, with fallback to the basic sechandler -	gSecAPIHandler = gHandlerMap[BASIC_SECHANDLER]; - -	// initialize all SecAPIHandlers -	std::string exception_msg; -	std::map<std::string, LLPointer<LLSecAPIHandler> >::const_iterator itr; -	for(itr = gHandlerMap.begin(); itr != gHandlerMap.end(); ++itr) -	{ -		LLPointer<LLSecAPIHandler> handler = (*itr).second; -		try  -		{ -			handler->init(); -		} -		catch (LLProtectedDataException& e) -		{ -			exception_msg = e.what(); -		} -	} -	if (!exception_msg.empty())  // an exception was thrown. -	{ -		LLTHROW(LLProtectedDataException(exception_msg)); -	} +    ERR_load_crypto_strings(); +    OpenSSL_add_all_algorithms(); + +    gHandlerMap[BASIC_SECHANDLER] = new LLSecAPIBasicHandler(); + + +    // Currently, we only have the Basic handler, so we can point the main sechandler +    // pointer to the basic handler.  Later, we'll create a wrapper handler that +    // selects the appropriate sechandler as needed, for instance choosing the +    // mac keyring handler, with fallback to the basic sechandler +    gSecAPIHandler = gHandlerMap[BASIC_SECHANDLER]; + +    // initialize all SecAPIHandlers +    std::string exception_msg; +    std::map<std::string, LLPointer<LLSecAPIHandler> >::const_iterator itr; +    for(itr = gHandlerMap.begin(); itr != gHandlerMap.end(); ++itr) +    { +        LLPointer<LLSecAPIHandler> handler = (*itr).second; +        try +        { +            handler->init(); +        } +        catch (LLProtectedDataException& e) +        { +            exception_msg = e.what(); +        } +    } +    if (!exception_msg.empty())  // an exception was thrown. +    { +        LLTHROW(LLProtectedDataException(exception_msg)); +    }  } @@ -85,80 +85,80 @@ void clearSecHandler()  // the default is used  LLPointer<LLSecAPIHandler> getSecHandler(const std::string& handler_type)  { -	if (gHandlerMap.find(handler_type) != gHandlerMap.end()) -	{ -		return gHandlerMap[handler_type]; -	} -	else -	{ -		return LLPointer<LLSecAPIHandler>(NULL); -	} +    if (gHandlerMap.find(handler_type) != gHandlerMap.end()) +    { +        return gHandlerMap[handler_type]; +    } +    else +    { +        return LLPointer<LLSecAPIHandler>(NULL); +    }  }  // register a handler -void registerSecHandler(const std::string& handler_type,  -						LLPointer<LLSecAPIHandler>& handler) +void registerSecHandler(const std::string& handler_type, +                        LLPointer<LLSecAPIHandler>& handler)  { -	gHandlerMap[handler_type] = handler; +    gHandlerMap[handler_type] = handler;  }  std::ostream& operator <<(std::ostream& s, const LLCredential& cred)  { -	return s << (std::string)cred; +    return s << (std::string)cred;  }  LLSD LLCredential::getLoginParams()  { -	LLSD result = LLSD::emptyMap(); -	std::string username; -	try  -	{ -		if (mIdentifier["type"].asString() == "agent") -		{ -			// legacy credential -			result["passwd"] = "$1$" + mAuthenticator["secret"].asString(); -			result["first"] = mIdentifier["first_name"]; -			result["last"] = mIdentifier["last_name"]; -			username = result["first"].asString() + " " + result["last"].asString(); -		} -		else if (mIdentifier["type"].asString() == "account") -		{ -			result["username"] = mIdentifier["account_name"]; -			result["passwd"] = mAuthenticator["secret"].asString(); -			username = result["username"].asString(); -		} -	} -	catch (...) -	{ -		// nat 2016-08-18: not clear what exceptions the above COULD throw?! -		LOG_UNHANDLED_EXCEPTION(STRINGIZE("for '" << username << "'")); -		// we could have corrupt data, so simply return a null login param if so -		LL_WARNS("AppInit") << "Invalid credential" << LL_ENDL; -	} -	return result; +    LLSD result = LLSD::emptyMap(); +    std::string username; +    try +    { +        if (mIdentifier["type"].asString() == "agent") +        { +            // legacy credential +            result["passwd"] = "$1$" + mAuthenticator["secret"].asString(); +            result["first"] = mIdentifier["first_name"]; +            result["last"] = mIdentifier["last_name"]; +            username = result["first"].asString() + " " + result["last"].asString(); +        } +        else if (mIdentifier["type"].asString() == "account") +        { +            result["username"] = mIdentifier["account_name"]; +            result["passwd"] = mAuthenticator["secret"].asString(); +            username = result["username"].asString(); +        } +    } +    catch (...) +    { +        // nat 2016-08-18: not clear what exceptions the above COULD throw?! +        LOG_UNHANDLED_EXCEPTION(STRINGIZE("for '" << username << "'")); +        // we could have corrupt data, so simply return a null login param if so +        LL_WARNS("AppInit") << "Invalid credential" << LL_ENDL; +    } +    return result;  }  void LLCredential::identifierType(std::string &idType)  { -	if(mIdentifier.has("type")) -	{ -		idType = mIdentifier["type"].asString(); -	} -	else { -		idType = std::string(); -		 -	} +    if(mIdentifier.has("type")) +    { +        idType = mIdentifier["type"].asString(); +    } +    else { +        idType = std::string(); + +    }  }  void LLCredential::authenticatorType(std::string &idType)  { -	if(mAuthenticator.has("type")) -	{ -		idType = mAuthenticator["type"].asString(); -	} -	else { -		idType = std::string(); -		 -	} +    if(mAuthenticator.has("type")) +    { +        idType = mAuthenticator["type"].asString(); +    } +    else { +        idType = std::string(); + +    }  }  LLCertException::LLCertException(const LLSD& cert_data, const std::string& msg)  | 
