Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(173)

Side by Side Diff: remoting/host/token_validator_base.cc

Issue 1882433002: Removing NSS files and USE_OPENSSL flag (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase. Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/token_validator_base.h" 5 #include "remoting/host/token_validator_base.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include "base/base64.h" 9 #include "base/base64.h"
10 #include "base/bind.h" 10 #include "base/bind.h"
(...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after
144 // cert store doesn't contain any certificates. Use the "Local Machine" 144 // cert store doesn't contain any certificates. Use the "Local Machine"
145 // store instead. 145 // store instead.
146 // The ACL on the private key of the machine certificate in the "Local 146 // The ACL on the private key of the machine certificate in the "Local
147 // Machine" cert store needs to allow access by "Local Service". 147 // Machine" cert store needs to allow access by "Local Service".
148 HCERTSTORE cert_store = ::CertOpenStore( 148 HCERTSTORE cert_store = ::CertOpenStore(
149 CERT_STORE_PROV_SYSTEM, 0, NULL, 149 CERT_STORE_PROV_SYSTEM, 0, NULL,
150 CERT_SYSTEM_STORE_LOCAL_MACHINE | CERT_STORE_READONLY_FLAG, L"MY"); 150 CERT_SYSTEM_STORE_LOCAL_MACHINE | CERT_STORE_READONLY_FLAG, L"MY");
151 client_cert_store = new net::ClientCertStoreWin(cert_store); 151 client_cert_store = new net::ClientCertStoreWin(cert_store);
152 #elif defined(OS_MACOSX) 152 #elif defined(OS_MACOSX)
153 client_cert_store = new net::ClientCertStoreMac(); 153 client_cert_store = new net::ClientCertStoreMac();
154 #elif defined(USE_OPENSSL) 154 #else
155 // OpenSSL does not use the ClientCertStore infrastructure. 155 // OpenSSL does not use the ClientCertStore infrastructure.
156 client_cert_store = nullptr; 156 client_cert_store = nullptr;
157 #else
158 #error Unknown platform.
159 #endif 157 #endif
160 // The callback is uncancellable, and GetClientCert requires selected_certs 158 // The callback is uncancellable, and GetClientCert requires selected_certs
161 // and client_cert_store to stay alive until the callback is called. So we 159 // and client_cert_store to stay alive until the callback is called. So we
162 // must give it a WeakPtr for |this|, and ownership of the other parameters. 160 // must give it a WeakPtr for |this|, and ownership of the other parameters.
163 net::CertificateList* selected_certs(new net::CertificateList()); 161 net::CertificateList* selected_certs(new net::CertificateList());
164 client_cert_store->GetClientCerts( 162 client_cert_store->GetClientCerts(
165 *cert_request_info, selected_certs, 163 *cert_request_info, selected_certs,
166 base::Bind(&TokenValidatorBase::OnCertificatesSelected, 164 base::Bind(&TokenValidatorBase::OnCertificatesSelected,
167 weak_factory_.GetWeakPtr(), base::Owned(selected_certs), 165 weak_factory_.GetWeakPtr(), base::Owned(selected_certs),
168 base::Owned(client_cert_store))); 166 base::Owned(client_cert_store)));
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
224 return std::string(); 222 return std::string();
225 } 223 }
226 224
227 std::string shared_secret; 225 std::string shared_secret;
228 // Everything is valid, so return the shared secret to the caller. 226 // Everything is valid, so return the shared secret to the caller.
229 dict->GetStringWithoutPathExpansion("access_token", &shared_secret); 227 dict->GetStringWithoutPathExpansion("access_token", &shared_secret);
230 return shared_secret; 228 return shared_secret;
231 } 229 }
232 230
233 } // namespace remoting 231 } // namespace remoting
OLDNEW
« no previous file with comments | « net/url_request/url_request_unittest.cc ('k') | tools/copyright_scanner/third_party_files_whitelist.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698