Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "content/browser/media/dtls_identity_store.h" | |
| 6 | |
| 7 #include "base/bind.h" | |
| 8 #include "base/callback_helpers.h" | |
| 9 #include "base/location.h" | |
| 10 #include "base/logging.h" | |
| 11 #include "base/rand_util.h" | |
| 12 #include "base/task_runner.h" | |
| 13 #include "base/threading/worker_pool.h" | |
| 14 #include "content/public/browser/browser_thread.h" | |
| 15 #include "crypto/rsa_private_key.h" | |
| 16 #include "googleurl/src/gurl.h" | |
| 17 #include "net/base/net_errors.h" | |
| 18 #include "net/cert/x509_certificate.h" | |
| 19 | |
| 20 namespace content { | |
| 21 | |
| 22 namespace { | |
|
Ryan Sleevi
2013/06/13 22:36:47
STYLE: Linebreak
jiayl
2013/06/14 00:37:01
Done.
| |
| 23 struct DTLSIdentityRequestResult { | |
| 24 int error; | |
| 25 std::string certificate; | |
| 26 std::string private_key; | |
| 27 }; | |
| 28 | |
| 29 static void GenerateIdentityWorker(const std::string& common_name, | |
| 30 DTLSIdentityRequestResult* result) { | |
| 31 result->error = net::OK; | |
| 32 std::string certificate; | |
| 33 std::vector<uint8> private_key_info; | |
| 34 | |
| 35 int serial_number = base::RandInt(0, std::numeric_limits<int>::max()); | |
| 36 | |
| 37 scoped_ptr<crypto::RSAPrivateKey> key(crypto::RSAPrivateKey::Create(1024)); | |
| 38 if (!key.get()) { | |
| 39 DLOG(ERROR) << "Unable to create key pair for client"; | |
| 40 result->error = net::ERR_KEY_GENERATION_FAILED; | |
| 41 return; | |
| 42 } | |
| 43 | |
| 44 scoped_refptr<net::X509Certificate> cert = | |
| 45 net::X509Certificate::CreateSelfSigned(key.get(), | |
| 46 "CN=" + common_name, | |
| 47 serial_number, | |
| 48 base::TimeDelta::FromDays(30)); | |
| 49 if (!cert) { | |
| 50 DLOG(ERROR) << "Unable to create x509 cert for client"; | |
| 51 result->error = net::ERR_SELF_SIGNED_CERT_GENERATION_FAILED; | |
| 52 return; | |
| 53 } | |
| 54 if (!net::X509Certificate::GetDEREncoded(cert->os_cert_handle(), | |
| 55 &result->certificate)) { | |
| 56 DLOG(ERROR) << "Unable to get the DER decoded data from the cert."; | |
| 57 result->error = net::ERR_SELF_SIGNED_CERT_GENERATION_FAILED; | |
| 58 return; | |
| 59 } | |
| 60 | |
| 61 if (!key->ExportPrivateKey(&private_key_info)) { | |
| 62 DLOG(ERROR) << "Unable to export private key"; | |
| 63 result->error = net::ERR_PRIVATE_KEY_EXPORT_FAILED; | |
| 64 return; | |
| 65 } | |
| 66 | |
| 67 result->private_key = | |
| 68 std::string(private_key_info.begin(), private_key_info.end()); | |
| 69 } | |
| 70 | |
| 71 class DTLSIdentityRequest { | |
| 72 public: | |
| 73 DTLSIdentityRequest(const DTLSIdentityStore::CompletionCallback& callback) | |
| 74 : callback_(callback) {} | |
| 75 | |
| 76 void Cancel() { | |
| 77 callback_.Reset(); | |
| 78 } | |
| 79 | |
| 80 void Post(DTLSIdentityRequestResult* result) { | |
| 81 if (callback_.is_null()) | |
| 82 return; | |
| 83 callback_.Run(result->error, result->certificate, result->private_key); | |
| 84 } | |
| 85 | |
| 86 private: | |
| 87 DTLSIdentityStore::CompletionCallback callback_; | |
| 88 }; | |
| 89 | |
| 90 } // namespace | |
| 91 | |
| 92 DTLSIdentityStore::RequestHandle::RequestHandle() | |
| 93 : store_(NULL), | |
| 94 request_(NULL) {} | |
| 95 | |
| 96 DTLSIdentityStore::RequestHandle::~RequestHandle() { | |
| 97 Cancel(); | |
| 98 } | |
| 99 | |
| 100 void DTLSIdentityStore::RequestHandle::Cancel() { | |
| 101 if (request_) { | |
| 102 store_->CancelRequest(request_); | |
| 103 request_ = NULL; | |
| 104 callback_.Reset(); | |
| 105 } | |
| 106 } | |
| 107 | |
| 108 void DTLSIdentityStore::RequestHandle::RequestStarted( | |
| 109 DTLSIdentityStore* store, | |
| 110 DTLSIdentityRequest* request, | |
| 111 const CompletionCallback& callback) { | |
| 112 DCHECK(request_ == NULL); | |
|
Ryan Sleevi
2013/06/13 22:36:47
DCHECK(!request_)
jiayl
2013/06/14 00:37:01
Done.
| |
| 113 store_ = store; | |
| 114 request_ = request; | |
| 115 callback_ = callback; | |
| 116 } | |
| 117 | |
| 118 void DTLSIdentityStore::RequestHandle::OnRequestComplete( | |
| 119 int error, | |
| 120 const std::string& certificate, | |
| 121 const std::string& private_key) { | |
| 122 request_ = NULL; | |
| 123 base::ResetAndReturn(&callback_).Run(error, certificate, private_key); | |
| 124 } | |
| 125 | |
| 126 DTLSIdentityStore::DTLSIdentityStore() | |
| 127 : task_runner_(base::WorkerPool::GetTaskRunner(true)) { | |
| 128 } | |
| 129 | |
| 130 DTLSIdentityStore::DTLSIdentityStore( | |
| 131 const scoped_refptr<base::TaskRunner>& task_runner) | |
| 132 : task_runner_(task_runner) { | |
| 133 } | |
| 134 | |
| 135 DTLSIdentityStore::~DTLSIdentityStore() {} | |
| 136 | |
| 137 void DTLSIdentityStore::RequestIdentity(const GURL& origin, | |
| 138 const std::string& identity_name, | |
| 139 const std::string& common_name, | |
| 140 const CompletionCallback& callback, | |
| 141 RequestHandle* out_request) { | |
| 142 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
| 143 // TODO(jiayl): find the cert in the persistent store and generate a new one | |
| 144 // only when not found. | |
| 145 DTLSIdentityRequest* request = new DTLSIdentityRequest( | |
| 146 base::Bind(&RequestHandle::OnRequestComplete, | |
| 147 base::Unretained(out_request))); | |
| 148 out_request->RequestStarted(this, request, callback); | |
| 149 | |
| 150 DTLSIdentityRequestResult* result = new DTLSIdentityRequestResult; | |
| 151 task_runner_->PostTaskAndReply( | |
| 152 FROM_HERE, | |
| 153 base::Bind(&GenerateIdentityWorker, common_name, result), | |
| 154 base::Bind(&DTLSIdentityRequest::Post, | |
| 155 base::Owned(request), base::Owned(result))); | |
| 156 } | |
| 157 | |
| 158 void DTLSIdentityStore::CancelRequest(DTLSIdentityRequest* request) { | |
| 159 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
| 160 request->Cancel(); | |
| 161 } | |
| 162 | |
| 163 } // namespace content | |
| OLD | NEW |