Lines Matching defs:env

6 #include "env-inl.h"
64 BIOPointer LoadBIO(Environment* env, Local<Value> v) {
68 ByteSource bsrc = ByteSource::FromStringOrBuffer(env, v);
242 Environment* env = Environment::GetCurrent(args);
247 env->isolate(),
255 Array::New(env->isolate(), result, arraysize(root_certs)));
258 bool SecureContext::HasInstance(Environment* env, const Local<Value>& value) {
259 return GetConstructorTemplate(env)->HasInstance(value);
263 Environment* env) {
264 Local<FunctionTemplate> tmpl = env->secure_context_constructor_template();
266 Isolate* isolate = env->isolate();
270 tmpl->Inherit(BaseObject::GetConstructorTemplate(env));
271 tmpl->SetClassName(FIXED_ONE_BYTE_STRING(env->isolate(), "SecureContext"));
327 env->set_secure_context_constructor_template(tmpl);
332 void SecureContext::Initialize(Environment* env, Local<Object> target) {
333 Local<Context> context = env->context();
337 GetConstructorTemplate(env),
389 SecureContext* SecureContext::Create(Environment* env) {
391 if (!GetConstructorTemplate(env)
393 ->NewInstance(env->context()).ToLocal(&obj)) {
397 return new SecureContext(env, obj);
400 SecureContext::SecureContext(Environment* env, Local<Object> wrap)
401 : BaseObject(env, wrap) {
403 env->isolate()->AdjustAmountOfExternalAllocatedMemory(kExternalSize);
408 env()->isolate()->AdjustAmountOfExternalAllocatedMemory(-kExternalSize);
420 Environment* env = Environment::GetCurrent(args);
421 new SecureContext(env, args.This());
427 Environment* env = sc->env();
441 Utf8Value sslmethod(env->isolate(), args[0]);
450 THROW_ERR_TLS_INVALID_PROTOCOL_METHOD(env, "SSLv2 methods disabled");
455 THROW_ERR_TLS_INVALID_PROTOCOL_METHOD(env, "SSLv3 methods disabled");
511 env, "Unknown method: %s", *sslmethod);
518 return ThrowCryptoError(env, ERR_get_error(), "SSL_CTX_new");
554 env, "Error generating ticket keys");
579 Maybe<bool> SecureContext::UseKey(Environment* env,
582 THROW_ERR_CRYPTO_INVALID_KEYTYPE(env);
588 ThrowCryptoError(env, ERR_get_error(), "SSL_CTX_use_PrivateKey");
596 Environment* env = Environment::GetCurrent(args);
603 BIOPointer bio(LoadBIO(env, args[0]));
609 passphrase = ByteSource::FromString(env, args[1].As<String>());
622 return ThrowCryptoError(env, ERR_get_error(), "PEM_read_bio_PrivateKey");
625 return ThrowCryptoError(env, ERR_get_error(), "SSL_CTX_use_PrivateKey");
631 Environment* env = sc->env();
637 const Utf8Value sigalgs(env->isolate(), args[0]);
640 return ThrowCryptoError(env, ERR_get_error());
645 Environment* env = Environment::GetCurrent(args);
653 Utf8Value engine_id(env->isolate(), args[1]);
657 if (errors.ToException(env).ToLocal(&exception))
658 env->isolate()->ThrowException(exception);
664 env, "Failure to initialize engine");
669 Utf8Value key_name(env->isolate(), args[0]);
674 return ThrowCryptoError(env, ERR_get_error(), "ENGINE_load_private_key");
677 return ThrowCryptoError(env, ERR_get_error(), "SSL_CTX_use_PrivateKey");
683 Maybe<bool> SecureContext::AddCert(Environment* env, BIOPointer&& bio) {
694 ThrowCryptoError(env, ERR_get_error(), "SSL_CTX_use_certificate_chain");
701 Environment* env = Environment::GetCurrent(args);
708 BIOPointer bio(LoadBIO(env, args[0]));
709 USE(sc->AddCert(env, std::move(bio)));
728 Environment* env = Environment::GetCurrent(args);
735 BIOPointer bio(LoadBIO(env, args[0]));
739 Maybe<bool> SecureContext::SetCRL(Environment* env, const BIOPointer& bio) {
747 THROW_ERR_CRYPTO_OPERATION_FAILED(env, "Failed to parse CRL");
765 Environment* env = Environment::GetCurrent(args);
772 BIOPointer bio(LoadBIO(env, args[0]));
773 USE(sc->SetCRL(env, bio));
796 Environment* env = sc->env();
802 const Utf8Value ciphers(env->isolate(), args[0]);
804 return ThrowCryptoError(env, ERR_get_error(), "Failed to set ciphers");
811 Environment* env = sc->env();
817 Utf8Value ciphers(env->isolate(), args[0]);
828 return ThrowCryptoError(env, err, "Failed to set ciphers");
835 Environment* env = sc->env();
840 Utf8Value curve(env->isolate(), args[0]);
843 return THROW_ERR_CRYPTO_OPERATION_FAILED(env, "Failed to set ECDH curve");
850 Environment* env = sc->env();
865 BIOPointer bio(LoadBIO(env, args[0]));
882 env, "DH parameter is less than 1024 bits");
885 env->isolate(), "DH parameter is less than 2048 bits"));
890 env, "Error setting temp DH parameter");
941 Environment* env = Environment::GetCurrent(args);
948 int64_t val = args[0]->IntegerValue(env->context()).FromMaybe(0);
958 Environment* env = sc->env();
963 const Utf8Value sessionIdContext(env->isolate(), args[0]);
976 message = FIXED_ONE_BYTE_STRING(env->isolate(),
981 message = OneByteString(env->isolate(), mem->data, mem->length);
984 env->isolate()->ThrowException(Exception::TypeError(message));
1006 Environment* env = Environment::GetCurrent(args);
1016 return THROW_ERR_MISSING_ARGS(env, "PFX certificate argument is mandatory");
1019 BIOPointer in(LoadBIO(env, args[0]));
1022 env, "Unable to load PFX certificate");
1026 THROW_AND_RETURN_IF_NOT_BUFFER(env, args[1], "Pass phrase");
1083 return env->ThrowError(str);
1090 Environment* env = Environment::GetCurrent(args);
1107 const Utf8Value engine_id(env->isolate(), args[0]);
1111 if (errors.ToException(env).ToLocal(&exception))
1112 env->isolate()->ThrowException(exception);
1118 return ThrowCryptoError(env, ERR_get_error());
1128 if (!Buffer::New(wrap->env(), 48).ToLocal(&buff))
1176 Environment* env = sc->env();
1177 HandleScope handle_scope(env->isolate());
1178 Context::Scope context_scope(env->context());
1183 env,
1187 env,
1193 argv[2] = Boolean::New(env->isolate(), enc != 0);
1197 env->isolate(),
1199 env->ticketkeycallback_string(),
1209 if (!arr->Get(env->context(), kTicketKeyReturnIndex).ToLocal(&val) ||
1221 if (!arr->Get(env->context(), kTicketKeyHMACIndex).ToLocal(&hmac) ||
1222 !arr->Get(env->context(), kTicketKeyAESIndex).ToLocal(&aes) ||
1230 if (!arr->Get(env->context(), kTicketKeyNameIndex).ToLocal(&name_val) ||
1231 !arr->Get(env->context(), kTicketKeyIVIndex).ToLocal(&iv_val) ||
1315 Environment* env = wrap->env();
1327 if (!Buffer::New(env, size).ToLocal(&buff))