Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(60)

Unified Diff: net/base/openssl_private_key_store.h

Issue 12220104: Wire up SSL client authentication for OpenSSL/Android through the net/ stack (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Fix linux_redux build. Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/openssl_private_key_store.h
diff --git a/net/base/openssl_private_key_store.h b/net/base/openssl_private_key_store.h
index edd54f38aa150159336a088bbc74475106a0c211..afd6c6fc76fe436f4accbfd343d35ce3e929107e 100644
--- a/net/base/openssl_private_key_store.h
+++ b/net/base/openssl_private_key_store.h
@@ -5,43 +5,47 @@
#ifndef NET_BASE_OPENSSL_PRIVATE_KEY_STORE_H_
#define NET_BASE_OPENSSL_PRIVATE_KEY_STORE_H_
-#include "base/basictypes.h"
+#include <openssl/evp.h>
+
+#include <vector>
-// Avoid including <openssl/evp.h> here.
-typedef struct evp_pkey_st EVP_PKEY;
+#include "base/basictypes.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/synchronization/lock.h"
+#include "crypto/openssl_util.h"
+#include "net/base/net_export.h"
class GURL;
namespace net {
-// Defines an abstract store for private keys; the OpenSSL library does not
-// provide this service so it is left to individual platforms to provide it.
-//
-// The contract is that the private key will be stored in an appropriate secure
-// system location, and be available to the SSLClientSocketOpenSSL when using a
-// client certificate created against the associated public key for client
-// authentication.
-class OpenSSLPrivateKeyStore {
+class X509Certificate;
+
+// OpenSSLPrivateKeyStore provides an interface for storing
+// public/private key pairs to system storage on platforms where
+// OpenSSL is used.
+// This class shall only be used from the network thread.
+class NET_EXPORT OpenSSLPrivateKeyStore {
public:
// Platforms must define this factory function as appropriate.
static OpenSSLPrivateKeyStore* GetInstance();
- virtual ~OpenSSLPrivateKeyStore() {}
-
- // Called to store a private key generated via <keygen> while visiting |url|.
- // Does not takes ownership of |pkey|, the caller reamins responsible to
- // EVP_PKEY_free it. (Internally, a copy maybe made or the reference count
- // incremented).
+ // Called to permanently store a private/public key pair, generated
+ // via <keygen> while visiting |url|, to an appropriate system
+ // location. Increments |pkey|'s reference count, so the caller is still
+ // responsible for calling EVP_PKEY_free on it. Note that this has
+ // nothing to do with the methods RecordClientCertPrivateKey() and
+ // FetchClientCertPrivateKey() below.
+ // |url| is the corresponding server URL.
+ // |pkey| is the key pair handle.
// Returns false if an error occurred whilst attempting to store the key.
- virtual bool StorePrivateKey(const GURL& url, EVP_PKEY* pkey) = 0;
-
- // Given a |public_key| part returns the corresponding private key, or NULL
- // if no key found. Does NOT return ownership.
- virtual EVP_PKEY* FetchPrivateKey(EVP_PKEY* public_key) = 0;
+ virtual bool StoreKeyPair(const GURL& url, EVP_PKEY* pkey) = 0;
protected:
OpenSSLPrivateKeyStore() {}
+ virtual ~OpenSSLPrivateKeyStore() {}
Ryan Sleevi 2013/02/27 01:08:20 Does this really need to be virtual with multiple
digit1 2013/02/27 10:24:27 I was just trying to make a minimally viable chang
+
private:
DISALLOW_COPY_AND_ASSIGN(OpenSSLPrivateKeyStore);
};

Powered by Google App Engine
This is Rietveld 408576698