Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(7)

Side by Side Diff: net/base/openssl_private_key_store_android.cc

Issue 12220104: Wire up SSL client authentication for OpenSSL/Android through the net/ stack (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Fix linux_redux build. Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/base/openssl_private_key_store.h" 5 #include "net/base/openssl_private_key_store.h"
6 6
7 #include <openssl/evp.h> 7 #include <openssl/evp.h>
8 #include <openssl/x509.h> 8 #include <openssl/x509.h>
9 9
10 #include "base/logging.h" 10 #include "base/logging.h"
11 #include "base/memory/singleton.h" 11 #include "base/memory/singleton.h"
12 #include "crypto/openssl_util.h"
13 #include "net/android/network_library.h" 12 #include "net/android/network_library.h"
14 13
15 namespace net { 14 namespace net {
16 15
17 namespace { 16 namespace {
18 17
19 class OpenSSLKeyStoreAndroid : public OpenSSLPrivateKeyStore { 18 // Android-specific implementation of OpenSSLPrivateKeyStore.
19 // This uses platform APIs to store the private/public keygened
20 // pair to the system's keychain.
21 class OpenSSLPrivateKeyStoreAndroid : public OpenSSLPrivateKeyStore {
20 public: 22 public:
21 ~OpenSSLKeyStoreAndroid() {} 23 OpenSSLPrivateKeyStoreAndroid() {}
22 24
23 virtual bool StorePrivateKey(const GURL& url, EVP_PKEY* pkey) { 25 virtual ~OpenSSLPrivateKeyStoreAndroid() {}
26
27 static OpenSSLPrivateKeyStoreAndroid* GetInstance() {
28 return Singleton<OpenSSLPrivateKeyStoreAndroid>::get();
29 }
30
31 virtual bool StoreKeyPair(const GURL& url, EVP_PKEY* pkey) OVERRIDE {
24 // Always clear openssl errors on exit. 32 // Always clear openssl errors on exit.
25 crypto::OpenSSLErrStackTracer err_trace(FROM_HERE); 33 crypto::OpenSSLErrStackTracer err_trace(FROM_HERE);
26 34
27 // Important: Do not use i2d_PublicKey() here, which returns data in 35 // Important: Do not use i2d_PublicKey() here, which returns data in
28 // PKCS#1 format, use i2d_PUBKEY() which returns it as DER-encoded 36 // PKCS#1 format, use i2d_PUBKEY() which returns it as DER-encoded
29 // SubjectPublicKeyInfo (X.509), as expected by the platform. 37 // SubjectPublicKeyInfo (X.509), as expected by the platform.
30 unsigned char* public_key = NULL; 38 unsigned char* public_key = NULL;
31 int public_len = i2d_PUBKEY(pkey, &public_key); 39 int public_len = i2d_PUBKEY(pkey, &public_key);
32 40
33 // Important: Do not use i2d_PrivateKey() here, it returns data 41 // Important: Do not use i2d_PrivateKey() here, it returns data
34 // in a format that is incompatible with what the platform expects. 42 // in a format that is incompatible with what the platform expects.
35 unsigned char* private_key = NULL; 43 unsigned char* private_key = NULL;
36 int private_len = 0; 44 int private_len = 0;
37 crypto::ScopedOpenSSL<PKCS8_PRIV_KEY_INFO, 45 crypto::ScopedOpenSSL<PKCS8_PRIV_KEY_INFO,
38 PKCS8_PRIV_KEY_INFO_free> pkcs8(EVP_PKEY2PKCS8(pkey)); 46 PKCS8_PRIV_KEY_INFO_free> pkcs8(EVP_PKEY2PKCS8(pkey));
39 if (pkcs8.get() != NULL) { 47 if (pkcs8.get() != NULL) {
40 private_len = i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), &private_key); 48 private_len = i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), &private_key);
41 } 49 }
42 bool ret = false; 50 bool ret = false;
43 if (public_len > 0 && private_len > 0) { 51 if (public_len > 0 && private_len > 0) {
44 ret = net::android::StoreKeyPair( 52 ret = net::android::StoreKeyPair(
45 static_cast<const uint8*>(public_key), public_len, 53 static_cast<const uint8*>(public_key), public_len,
46 static_cast<const uint8*>(private_key), private_len); 54 static_cast<const uint8*>(private_key), private_len);
47 } 55 }
48 LOG_IF(ERROR, !ret) << "StorePrivateKey failed. pub len = " << public_len 56 LOG_IF(ERROR, !ret) << "StoreKeyPair failed. pub len = " << public_len
49 << " priv len = " << private_len; 57 << " priv len = " << private_len;
50 OPENSSL_free(public_key); 58 OPENSSL_free(public_key);
51 OPENSSL_free(private_key); 59 OPENSSL_free(private_key);
52 return ret; 60 return ret;
53 } 61 }
54 62
55 virtual EVP_PKEY* FetchPrivateKey(EVP_PKEY* pkey) {
56 // TODO(joth): Implement when client authentication is required.
57 NOTIMPLEMENTED();
58 return NULL;
59 }
60
61 static OpenSSLKeyStoreAndroid* GetInstance() {
62 // Leak the OpenSSL key store as it is used from a non-joinable worker
63 // thread that may still be running at shutdown.
64 return Singleton<
65 OpenSSLKeyStoreAndroid,
66 OpenSSLKeyStoreAndroidLeakyTraits>::get();
67 }
68
69 private: 63 private:
70 friend struct DefaultSingletonTraits<OpenSSLKeyStoreAndroid>; 64 DISALLOW_COPY_AND_ASSIGN(OpenSSLPrivateKeyStoreAndroid);
71 typedef LeakySingletonTraits<OpenSSLKeyStoreAndroid>
72 OpenSSLKeyStoreAndroidLeakyTraits;
73
74 OpenSSLKeyStoreAndroid() {}
75
76 DISALLOW_COPY_AND_ASSIGN(OpenSSLKeyStoreAndroid);
77 }; 65 };
78 66
79 } // namespace 67 } // namespace
80 68
81 OpenSSLPrivateKeyStore* OpenSSLPrivateKeyStore::GetInstance() { 69 OpenSSLPrivateKeyStore* OpenSSLPrivateKeyStore::GetInstance() {
82 return OpenSSLKeyStoreAndroid::GetInstance(); 70 return OpenSSLPrivateKeyStoreAndroid::GetInstance();
83 } 71 }
84 72
85 } // namespace net 73 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698