Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(138)

Unified Diff: net/cert/caching_cert_verifier.h

Issue 1991653002: Move caching out of MultiThreadedCertVerifier (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@request_params
Patch Set: Rebased Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/caching_cert_verifier.h
diff --git a/net/cert/caching_cert_verifier.h b/net/cert/caching_cert_verifier.h
new file mode 100644
index 0000000000000000000000000000000000000000..74d81a0ef62e6de2beff793f09858ed7c1a89a64
--- /dev/null
+++ b/net/cert/caching_cert_verifier.h
@@ -0,0 +1,124 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_CERT_CACHING_CERT_VERIFIER_H_
+#define NET_CERT_CACHING_CERT_VERIFIER_H_
+
+#include <memory>
+
+#include "net/base/expiring_cache.h"
+#include "net/base/net_export.h"
+#include "net/cert/cert_database.h"
+#include "net/cert/cert_verifier.h"
+#include "net/cert/cert_verify_result.h"
+
+namespace net {
+
+class CertTrustAnchorProvider;
+
+class NET_EXPORT CachingCertVerifier : public CertVerifier,
eroman 2016/06/10 01:31:52 Also, please add a comment for this class (even th
+ public CertDatabase::Observer {
+ public:
+ explicit CachingCertVerifier(std::unique_ptr<CertVerifier> verifier);
+
+ ~CachingCertVerifier() override;
+
+ // Configures a source of additional certificates that should be treated as
+ // trust anchors during verification, provided that the underlying
+ // CertVerifyProc supports additional trust beyond the default implementation.
+ // It must outlive the CachingCertVerifier.
+ void SetCertTrustAnchorProvider(
eroman 2016/06/10 00:08:03 This is weird (being part of CachingCertVerifier l
+ CertTrustAnchorProvider* trust_anchor_provider);
+
+ // CertVerifier implementation:
+ int Verify(const RequestParams& params,
+ CRLSet* crl_set,
+ CertVerifyResult* verify_result,
+ const CompletionCallback& callback,
+ std::unique_ptr<Request>* out_req,
+ const BoundNetLog& net_log) override;
+ bool SupportsOCSPStapling() override;
+
+ private:
+ FRIEND_TEST_ALL_PREFIXES(CachingCertVerifierTest, CacheHit);
+ FRIEND_TEST_ALL_PREFIXES(CachingCertVerifierTest, DifferentCACerts);
+ FRIEND_TEST_ALL_PREFIXES(CachingCertVerifierTest, CertTrustAnchorProvider);
+
+ // CachedResult contains the result of a certificate verification.
+ struct NET_EXPORT_PRIVATE CachedResult {
+ CachedResult();
+ ~CachedResult();
+
+ int error; // The return value of CertVerifier::Verify.
+ CertVerifyResult result; // The output of CertVerifier::Verify.
+ };
+
+ // Rather than having a single validity point along a monotonically increasing
+ // timeline, certificate verification is based on falling within a range of
+ // the certificate's NotBefore and NotAfter and based on what the current
+ // system clock says (which may advance forwards or backwards as users correct
+ // clock skew). CacheValidityPeriod and CacheExpirationFunctor are helpers to
+ // ensure that expiration is measured both by the 'general' case (now + cache
+ // TTL) and by whether or not significant enough clock skew was introduced
+ // since the last verification.
+ struct CacheValidityPeriod {
+ explicit CacheValidityPeriod(base::Time now);
+ CacheValidityPeriod(base::Time now, base::Time expiration);
+
+ base::Time verification_time;
+ base::Time expiration_time;
+ };
+
+ struct CacheExpirationFunctor {
+ // Returns true iff |now| is within the validity period of |expiration|.
+ bool operator()(const CacheValidityPeriod& now,
+ const CacheValidityPeriod& expiration) const;
+ };
+
+ using CertVerificationCache = ExpiringCache<RequestParams,
+ CachedResult,
+ CacheValidityPeriod,
+ CacheExpirationFunctor>;
+
+ // Handles completion of the request matching |params|, which started at
+ // |start_time|, completing. |verify_result| and |result| are added to the
+ // cache, and then |callback| (the original caller's callback) is invoked.
+ void OnRequestFinished(const RequestParams& params,
+ base::Time start_time,
+ const CompletionCallback& callback,
+ CertVerifyResult* verify_result,
+ int error);
+
+ // Adds |verify_result| and |error| to the cache for |params|, whose
+ // verification attempt began at |start_time|. See the implementation
+ // for more details about the necessity of |start_time|.
+ void AddResultToCache(const RequestParams& params,
+ base::Time start_time,
+ const CertVerifyResult& verify_result,
+ int error);
+
+ // CertDatabase::Observer methods:
+ void OnCACertChanged(const X509Certificate* cert) override;
+
+ // For unit testing.
+ void ClearCache();
+ size_t GetCacheSize() const;
+ uint64_t cache_hits() const { return cache_hits_; }
eroman 2016/06/10 01:31:52 side comment: if this is just for unit-testing, is
Ryan Sleevi 2016/06/10 07:51:20 Fair point, will do.
Ryan Sleevi 2016/06/10 23:41:51 Actually, after reading https://www.chromium.org/d
+ uint64_t requests() const { return requests_; }
+
+ std::unique_ptr<CertVerifier> verifier_;
+
+ CertTrustAnchorProvider* trust_anchor_provider_;
+
+ CertVerificationCache cache_;
+
+ uint64_t requests_;
+ uint64_t cache_hits_;
+
+ DISALLOW_COPY_AND_ASSIGN(CachingCertVerifier);
+};
+
+} // namespace net
+
+#endif // NET_CERT_CACHING_CERT_VERIFIER_H_

Powered by Google App Engine
This is Rietveld 408576698