diff options
Diffstat (limited to 'indra/newview')
| -rw-r--r-- | indra/newview/llappviewer.cpp | 3 | ||||
| -rw-r--r-- | indra/newview/llcommandlineparser.cpp | 17 | ||||
| -rw-r--r-- | indra/newview/llsecapi.cpp | 4 | ||||
| -rw-r--r-- | indra/newview/llsechandler_basic.cpp | 54 | 
4 files changed, 38 insertions, 40 deletions
diff --git a/indra/newview/llappviewer.cpp b/indra/newview/llappviewer.cpp index fdef556589..0eca63da46 100644 --- a/indra/newview/llappviewer.cpp +++ b/indra/newview/llappviewer.cpp @@ -132,7 +132,6 @@  #include <boost/foreach.hpp>  #include <boost/algorithm/string.hpp>  #include <boost/regex.hpp> -#include <boost/throw_exception.hpp>  #if LL_WINDOWS  #	include <share.h> // For _SH_DENYWR in processMarkerFiles @@ -5513,7 +5512,7 @@ void LLAppViewer::forceErrorInfiniteLoop()  void LLAppViewer::forceErrorSoftwareException()  {     	LL_WARNS() << "Forcing a deliberate exception" << LL_ENDL; -    BOOST_THROW_EXCEPTION(LLException("User selected Force Software Exception")); +    LLTHROW(LLException("User selected Force Software Exception"));  }  void LLAppViewer::forceErrorDriverCrash() diff --git a/indra/newview/llcommandlineparser.cpp b/indra/newview/llcommandlineparser.cpp index 54f96b8872..90a5483dc9 100644 --- a/indra/newview/llcommandlineparser.cpp +++ b/indra/newview/llcommandlineparser.cpp @@ -43,7 +43,6 @@  #include <boost/bind.hpp>  #include <boost/tokenizer.hpp>  #include <boost/assign/list_of.hpp> -#include <boost/throw_exception.hpp>  #if _MSC_VER  #   pragma warning(pop) @@ -52,6 +51,7 @@  #include "llsdserialize.h"  #include "llerror.h"  #include "stringize.h" +#include "llexception.h"  #include <string>  #include <set>  #include <iostream> @@ -204,17 +204,17 @@ protected:      {          if(gPastLastOption)          { -            BOOST_THROW_EXCEPTION(LLCLPLastOption("Don't parse no more!")); +            LLTHROW(LLCLPLastOption("Don't parse no more!"));          }          // Error checks. Needed?          if (!value_store.empty() && !is_composing())           { -            BOOST_THROW_EXCEPTION(LLCLPError("Non composing value with multiple occurences.")); +            LLTHROW(LLCLPError("Non composing value with multiple occurences."));          }          if (new_tokens.size() < min_tokens() || new_tokens.size() > max_tokens())          { -            BOOST_THROW_EXCEPTION(LLCLPError("Illegal number of tokens specified.")); +            LLTHROW(LLCLPError("Illegal number of tokens specified."));          }          if(value_store.empty()) @@ -468,7 +468,7 @@ onevalue(const std::string& option,      {          // What does it mean when the user specifies a command-line switch          // that requires a value, but omits the value? Complain. -        BOOST_THROW_EXCEPTION(LLCLPError(STRINGIZE("No value specified for --" << option << "!"))); +        LLTHROW(LLCLPError(STRINGIZE("No value specified for --" << option << "!")));      }      else if (value.size() > 1)      { @@ -486,10 +486,9 @@ void badvalue(const std::string& option,      // If the user passes an unusable value for a command-line switch, it      // seems like a really bad idea to just ignore it, even with a log      // warning. -    BOOST_THROW_EXCEPTION( -        LLCLPError(STRINGIZE("Invalid value specified by command-line switch '" << option -                             << "' for variable '" << varname << "' of type " << type -                             << ": '" << value << "'"))); +    LLTHROW(LLCLPError(STRINGIZE("Invalid value specified by command-line switch '" << option +                                 << "' for variable '" << varname << "' of type " << type +                                 << ": '" << value << "'")));  }  template <typename T> diff --git a/indra/newview/llsecapi.cpp b/indra/newview/llsecapi.cpp index bcb9417820..933f7bb16e 100644 --- a/indra/newview/llsecapi.cpp +++ b/indra/newview/llsecapi.cpp @@ -29,7 +29,7 @@  #include "llviewerprecompiledheaders.h"  #include "llsecapi.h"  #include "llsechandler_basic.h" -#include <boost/throw_exception.hpp> +#include "llexception.h"  #include <openssl/evp.h>  #include <openssl/err.h>  #include <map> @@ -70,7 +70,7 @@ void initializeSecHandler()  	}  	if (!exception_msg.empty())  // an exception was thrown.  	{ -		BOOST_THROW_EXCEPTION(LLProtectedDataException(exception_msg)); +		LLTHROW(LLProtectedDataException(exception_msg));  	}  } diff --git a/indra/newview/llsechandler_basic.cpp b/indra/newview/llsechandler_basic.cpp index 39ce64ad0e..183a625382 100644 --- a/indra/newview/llsechandler_basic.cpp +++ b/indra/newview/llsechandler_basic.cpp @@ -35,7 +35,7 @@  #include "llfile.h"  #include "lldir.h"  #include "llviewercontrol.h" -#include <boost/throw_exception.hpp> +#include "llexception.h"  #include <vector>  #include <ios>  #include <openssl/ossl_typ.h> @@ -73,14 +73,14 @@ LLBasicCertificate::LLBasicCertificate(const std::string& pem_cert)  	if(pem_bio == NULL)  	{  		LL_WARNS("SECAPI") << "Could not allocate an openssl memory BIO." << LL_ENDL; -		BOOST_THROW_EXCEPTION(LLInvalidCertificate(this)); +		LLTHROW(LLInvalidCertificate(this));  	}  	mCert = NULL;  	PEM_read_bio_X509(pem_bio, &mCert, 0, NULL);  	BIO_free(pem_bio);  	if (!mCert)  	{ -		BOOST_THROW_EXCEPTION(LLInvalidCertificate(this)); +		LLTHROW(LLInvalidCertificate(this));  	}  } @@ -89,7 +89,7 @@ LLBasicCertificate::LLBasicCertificate(X509* pCert)  {  	if (!pCert || !pCert->cert_info)  	{ -		BOOST_THROW_EXCEPTION(LLInvalidCertificate(this)); +		LLTHROW(LLInvalidCertificate(this));  	}	  	mCert = X509_dup(pCert);  } @@ -874,22 +874,22 @@ void _validateCert(int validation_policy,  	// check basic properties exist in the cert  	if(!current_cert_info.has(CERT_SUBJECT_NAME) || !current_cert_info.has(CERT_SUBJECT_NAME_STRING))  	{ -		BOOST_THROW_EXCEPTION(LLCertException(cert, "Cert doesn't have a Subject Name"));				 +		LLTHROW(LLCertException(cert, "Cert doesn't have a Subject Name"));  	}  	if(!current_cert_info.has(CERT_ISSUER_NAME_STRING))  	{ -		BOOST_THROW_EXCEPTION(LLCertException(cert, "Cert doesn't have an Issuer Name"));				 +		LLTHROW(LLCertException(cert, "Cert doesn't have an Issuer Name"));  	}  	// check basic properties exist in the cert  	if(!current_cert_info.has(CERT_VALID_FROM) || !current_cert_info.has(CERT_VALID_TO))  	{ -		BOOST_THROW_EXCEPTION(LLCertException(cert, "Cert doesn't have an expiration period"));				 +		LLTHROW(LLCertException(cert, "Cert doesn't have an expiration period"));  	}  	if (!current_cert_info.has(CERT_SHA1_DIGEST))  	{ -		BOOST_THROW_EXCEPTION(LLCertException(cert, "No SHA1 digest")); +		LLTHROW(LLCertException(cert, "No SHA1 digest"));  	}  	if (validation_policy & VALIDATION_POLICY_TIME) @@ -904,7 +904,7 @@ void _validateCert(int validation_policy,  		if((validation_date < current_cert_info[CERT_VALID_FROM].asDate()) ||  		   (validation_date > current_cert_info[CERT_VALID_TO].asDate()))  		{ -			BOOST_THROW_EXCEPTION(LLCertValidationExpirationException(cert, validation_date)); +			LLTHROW(LLCertValidationExpirationException(cert, validation_date));  		}  	}  	if (validation_policy & VALIDATION_POLICY_SSL_KU) @@ -915,14 +915,14 @@ void _validateCert(int validation_policy,  			!(_LLSDArrayIncludesValue(current_cert_info[CERT_KEY_USAGE],   									  LLSD((std::string)CERT_KU_KEY_ENCIPHERMENT)))))  		{ -			BOOST_THROW_EXCEPTION(LLCertKeyUsageValidationException(cert)); +			LLTHROW(LLCertKeyUsageValidationException(cert));  		}  		// only validate EKU if the cert has it  		if(current_cert_info.has(CERT_EXTENDED_KEY_USAGE) && current_cert_info[CERT_EXTENDED_KEY_USAGE].isArray() &&	     		   (!_LLSDArrayIncludesValue(current_cert_info[CERT_EXTENDED_KEY_USAGE],   									LLSD((std::string)CERT_EKU_SERVER_AUTH))))  		{ -			BOOST_THROW_EXCEPTION(LLCertKeyUsageValidationException(cert));			 +			LLTHROW(LLCertKeyUsageValidationException(cert));  		}  	}  	if (validation_policy & VALIDATION_POLICY_CA_KU) @@ -931,7 +931,7 @@ void _validateCert(int validation_policy,  			(!_LLSDArrayIncludesValue(current_cert_info[CERT_KEY_USAGE],   									   (std::string)CERT_KU_CERT_SIGN)))  			{ -				BOOST_THROW_EXCEPTION(LLCertKeyUsageValidationException(cert));						 +				LLTHROW(LLCertKeyUsageValidationException(cert));  			}  	} @@ -943,13 +943,13 @@ void _validateCert(int validation_policy,  		if(!current_cert_info[CERT_BASIC_CONSTRAINTS].has(CERT_BASIC_CONSTRAINTS_CA) ||  		   !current_cert_info[CERT_BASIC_CONSTRAINTS][CERT_BASIC_CONSTRAINTS_CA])  		{ -				BOOST_THROW_EXCEPTION(LLCertBasicConstraintsValidationException(cert)); +				LLTHROW(LLCertBasicConstraintsValidationException(cert));  		}  		if (current_cert_info[CERT_BASIC_CONSTRAINTS].has(CERT_BASIC_CONSTRAINTS_PATHLEN) &&  			((current_cert_info[CERT_BASIC_CONSTRAINTS][CERT_BASIC_CONSTRAINTS_PATHLEN].asInteger() != 0) &&  			 (depth > current_cert_info[CERT_BASIC_CONSTRAINTS][CERT_BASIC_CONSTRAINTS_PATHLEN].asInteger())))  		{ -			BOOST_THROW_EXCEPTION(LLCertBasicConstraintsValidationException(cert));					 +			LLTHROW(LLCertBasicConstraintsValidationException(cert));  		}  	}  } @@ -1019,7 +1019,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  	if(cert_chain->size() < 1)  	{ -		BOOST_THROW_EXCEPTION(LLCertException(NULL, "No certs in chain")); +		LLTHROW(LLCertException(NULL, "No certs in chain"));  	}  	iterator current_cert = cert_chain->begin();  	LLSD 	current_cert_info; @@ -1034,11 +1034,11 @@ void LLBasicCertificateStore::validate(int validation_policy,  		(*current_cert)->getLLSD(current_cert_info);  		if(!validation_params.has(CERT_HOSTNAME))  		{ -			BOOST_THROW_EXCEPTION(LLCertException((*current_cert), "No hostname passed in for validation"));			 +			LLTHROW(LLCertException((*current_cert), "No hostname passed in for validation"));  		}  		if(!current_cert_info.has(CERT_SUBJECT_NAME) || !current_cert_info[CERT_SUBJECT_NAME].has(CERT_NAME_CN))  		{ -			BOOST_THROW_EXCEPTION(LLInvalidCertificate((*current_cert)));				 +			LLTHROW(LLInvalidCertificate((*current_cert)));  		}  		LL_DEBUGS("SECAPI") << "Validating the hostname " << validation_params[CERT_HOSTNAME].asString() <<  @@ -1055,7 +1055,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  	X509* cert_x509 = (*current_cert)->getOpenSSLX509();  	if(!cert_x509)  	{ -		BOOST_THROW_EXCEPTION(LLInvalidCertificate((*current_cert)));			 +		LLTHROW(LLInvalidCertificate((*current_cert)));  	}  	std::string sha1_hash((const char *)cert_x509->sha1_hash, SHA_DIGEST_LENGTH);  	X509_free( cert_x509 ); @@ -1076,7 +1076,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  			if((validation_date < cache_entry->second.first) ||  			   (validation_date > cache_entry->second.second))  			{ -				BOOST_THROW_EXCEPTION(LLCertValidationExpirationException((*current_cert), validation_date)); +				LLTHROW(LLCertValidationExpirationException((*current_cert), validation_date));  			}  		}  		// successfully found in cache @@ -1108,7 +1108,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  			if(!_verify_signature((*current_cert),  								  previous_cert))  			{ -			   BOOST_THROW_EXCEPTION(LLCertValidationInvalidSignatureException(previous_cert)); +			   LLTHROW(LLCertValidationInvalidSignatureException(previous_cert));  			}  		}  		_validateCert(local_validation_policy, @@ -1157,7 +1157,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  			if(!_verify_signature((*found_store_cert),  								  (*current_cert)))  			{ -				BOOST_THROW_EXCEPTION(LLCertValidationInvalidSignatureException(*current_cert)); +				LLTHROW(LLCertValidationInvalidSignatureException(*current_cert));  			}			  			// successfully validated.  			mTrustedCertCache[sha1_hash] = std::pair<LLDate, LLDate>(from_time, to_time);		 @@ -1174,7 +1174,7 @@ void LLBasicCertificateStore::validate(int validation_policy,  	if (validation_policy & VALIDATION_POLICY_TRUSTED)  	{  		// we reached the end without finding a trusted cert. -		BOOST_THROW_EXCEPTION(LLCertValidationTrustException((*cert_chain)[cert_chain->size()-1])); +		LLTHROW(LLCertValidationTrustException((*cert_chain)[cert_chain->size()-1]));  	}  	mTrustedCertCache[sha1_hash] = std::pair<LLDate, LLDate>(from_time, to_time);	 @@ -1262,7 +1262,7 @@ void LLSecAPIBasicHandler::_readProtectedData()  		protected_data_stream.read((char *)salt, STORE_SALT_SIZE);  		if (protected_data_stream.gcount() < STORE_SALT_SIZE)  		{ -			BOOST_THROW_EXCEPTION(LLProtectedDataException("Config file too short.")); +			LLTHROW(LLProtectedDataException("Config file too short."));  		}  		cipher.decrypt(salt, STORE_SALT_SIZE);		 @@ -1302,7 +1302,7 @@ void LLSecAPIBasicHandler::_readProtectedData()  		if (parser->parse(parse_stream, mProtectedDataMap,   						  LLSDSerialize::SIZE_UNLIMITED) == LLSDParser::PARSE_FAILURE)  		{ -			BOOST_THROW_EXCEPTION(LLProtectedDataException("Config file cannot be decrypted.")); +			LLTHROW(LLProtectedDataException("Config file cannot be decrypted."));  		}  	}  } @@ -1373,7 +1373,7 @@ void LLSecAPIBasicHandler::_writeProtectedData()  		// EXP-1825 crash in LLSecAPIBasicHandler::_writeProtectedData()  		// Decided throwing an exception here was overkill until we figure out why this happens -		//BOOST_THROW_EXCEPTION(LLProtectedDataException("Error writing Protected Data Store")); +		//LLTHROW(LLProtectedDataException("Error writing Protected Data Store"));  	}      try @@ -1388,7 +1388,7 @@ void LLSecAPIBasicHandler::_writeProtectedData()              // EXP-1825 crash in LLSecAPIBasicHandler::_writeProtectedData()              // Decided throwing an exception here was overkill until we figure out why this happens -            //BOOST_THROW_EXCEPTION(LLProtectedDataException("Could not overwrite protected data store")); +            //LLTHROW(LLProtectedDataException("Could not overwrite protected data store"));          }  	}  	catch (...) @@ -1402,7 +1402,7 @@ void LLSecAPIBasicHandler::_writeProtectedData()  		//crash in LLSecAPIBasicHandler::_writeProtectedData()  		// Decided throwing an exception here was overkill until we figure out why this happens -		//BOOST_THROW_EXCEPTION(LLProtectedDataException("Error writing Protected Data Store")); +		//LLTHROW(LLProtectedDataException("Error writing Protected Data Store"));  	}  }  | 
