Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(100)

Unified Diff: android_webview/native/aw_contents_client_bridge.cc

Issue 235563005: Add client cert support to android_webview (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: code review phase 2 Created 6 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: android_webview/native/aw_contents_client_bridge.cc
diff --git a/android_webview/native/aw_contents_client_bridge.cc b/android_webview/native/aw_contents_client_bridge.cc
index 348505981eb1c9df73e8ffca162acf18c9e65beb..2409aa4cb7d15c9d7a3245ff46d55523eee535a1 100644
--- a/android_webview/native/aw_contents_client_bridge.cc
+++ b/android_webview/native/aw_contents_client_bridge.cc
@@ -8,10 +8,14 @@
#include "base/android/jni_android.h"
#include "base/android/jni_array.h"
#include "base/android/jni_string.h"
-#include "base/callback.h"
+#include "base/callback_helpers.h"
#include "content/public/browser/browser_thread.h"
#include "jni/AwContentsClientBridge_jni.h"
+#include "net/android/keystore_openssl.h"
#include "net/cert/x509_certificate.h"
+#include "net/ssl/openssl_client_key_store.h"
+#include "net/ssl/ssl_cert_request_info.h"
+#include "net/ssl/ssl_client_cert_type.h"
#include "url/gurl.h"
using base::android::AttachCurrentThread;
@@ -24,6 +28,21 @@ using content::BrowserThread;
namespace android_webview {
+typedef net::OpenSSLClientKeyStore::ScopedEVP_PKEY ScopedEVP_PKEY;
+
+namespace {
+// Must be called on the I/O thread to record a client certificate
+// and its private key in the OpenSSLClientKeyStore.
+void RecordClientCertificateKey(
+ const scoped_refptr<net::X509Certificate>& client_cert,
+ ScopedEVP_PKEY private_key) {
+ DCHECK_CURRENTLY_ON(content::BrowserThread::IO);
+ net::OpenSSLClientKeyStore::GetInstance()->RecordClientCertPrivateKey(
+ client_cert.get(), private_key.get());
+}
+
+} // namespace
+
AwContentsClientBridge::AwContentsClientBridge(JNIEnv* env, jobject obj)
: java_ref_(env, obj) {
DCHECK(obj);
@@ -49,7 +68,7 @@ void AwContentsClientBridge::AllowCertificateError(
const base::Callback<void(bool)>& callback,
bool* cancel_request) {
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
+ DCHECK_CURRENTLY_ON(BrowserThread::UI);
JNIEnv* env = AttachCurrentThread();
ScopedJavaLocalRef<jobject> obj = java_ref_.get(env);
@@ -73,12 +92,12 @@ void AwContentsClientBridge::AllowCertificateError(
// if the request is cancelled, then cancel the stored callback
if (*cancel_request) {
pending_cert_error_callbacks_.Remove(request_id);
- }
+ }
}
void AwContentsClientBridge::ProceedSslError(JNIEnv* env, jobject obj,
jboolean proceed, jint id) {
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
+ DCHECK_CURRENTLY_ON(BrowserThread::UI);
CertErrorCallback* callback = pending_cert_error_callbacks_.Lookup(id);
if (!callback || callback->is_null()) {
LOG(WARNING) << "Ignoring unexpected ssl error proceed callback";
@@ -88,6 +107,156 @@ void AwContentsClientBridge::ProceedSslError(JNIEnv* env, jobject obj,
pending_cert_error_callbacks_.Remove(id);
}
+// This method is almost same as SelectClientCertificate() in
boliu 2014/04/18 17:10:12 inspired by?
sgurun-gerrit only 2014/04/19 01:28:50 Done.
+// chrome/browser/ui/android/ssl_client_certificate_request.cc
+void AwContentsClientBridge::SelectClientCertificate(
+ net::SSLCertRequestInfo* cert_request_info,
+ const SelectCertificateCallback& callback) {
+ DCHECK_CURRENTLY_ON(BrowserThread::UI);
+
+ // Ensure that the callback runs on any error case.
+ base::ScopedClosureRunner guard(base::Bind(
+ callback, scoped_refptr<net::X509Certificate>()));
boliu 2014/04/18 17:10:12 Insert the callback into the map here and re-use H
sgurun-gerrit only 2014/04/19 01:28:50 Done.
+
+ JNIEnv* env = base::android::AttachCurrentThread();
+ ScopedJavaLocalRef<jobject> obj = java_ref_.get(env);
+ if (obj.is_null())
+ return;
+
+ // Build the |key_types| JNI parameter, as a String[]
+ std::vector<std::string> key_types;
+ for (size_t n = 0; n < cert_request_info->cert_key_types.size(); ++n) {
+ switch (cert_request_info->cert_key_types[n]) {
+ case net::CLIENT_CERT_RSA_SIGN:
+ key_types.push_back("RSA");
+ break;
+ case net::CLIENT_CERT_DSS_SIGN:
+ key_types.push_back("DSA");
+ break;
+ case net::CLIENT_CERT_ECDSA_SIGN:
+ key_types.push_back("ECDSA");
+ break;
+ default:
+ // Ignore unknown types.
+ break;
+ }
+ }
+
+ ScopedJavaLocalRef<jobjectArray> key_types_ref =
+ base::android::ToJavaArrayOfStrings(env, key_types);
+ if (key_types_ref.is_null()) {
+ LOG(ERROR) << "Could not create key types array (String[])";
+ return;
+ }
+
+ // Build the |encoded_principals| JNI parameter, as a byte[][]
+ ScopedJavaLocalRef<jobjectArray> principals_ref =
+ base::android::ToJavaArrayOfByteArray(
+ env, cert_request_info->cert_authorities);
+ if (principals_ref.is_null()) {
+ LOG(ERROR) << "Could not create principals array (byte[][])";
+ return;
+ }
+
+ // Build the |host_name| and |port| JNI parameters, as a String and
+ // a jint.
+ ScopedJavaLocalRef<jstring> host_name_ref =
+ base::android::ConvertUTF8ToJavaString(
+ env, cert_request_info->host_and_port.host());
+
+ // Add the callback to id map.
+ int request_id = pending_client_cert_request_callbacks_.Add(
+ new SelectCertificateCallback(callback));
+
+ // Release the guard. Java will call the callback.
+ ignore_result(guard.Release());
boliu 2014/04/18 17:10:12 Keep this below the java call (to prevent someone
sgurun-gerrit only 2014/04/19 01:28:50 Done.
+
+ Java_AwContentsClientBridge_selectClientCertificate(
+ env,
+ obj.obj(),
+ request_id,
+ key_types_ref.obj(),
+ principals_ref.obj(),
+ host_name_ref.obj(),
+ cert_request_info->host_and_port.port());
+}
+
+// Use to cleanup if there is an error in client certificate response.
+void AwContentsClientBridge::HandleErrorInClientCertificateResponse(
+ int request_id) {
+ SelectCertificateCallback* callback =
+ pending_client_cert_request_callbacks_.Lookup(request_id);
+ callback->Run(scoped_refptr<net::X509Certificate>());
+ pending_client_cert_request_callbacks_.Remove(request_id);
+}
+
+// This method is almost same as OnSystemRequestCompletion() in
+// chrome/browser/ui/android/ssl_client_certificate_request.cc
+void AwContentsClientBridge::ProvideClientCertificateResponse(
+ JNIEnv* env,
+ jobject obj,
+ int request_id,
+ jobjectArray encoded_chain_ref,
+ jobject private_key_ref) {
+ DCHECK_CURRENTLY_ON(BrowserThread::UI);
+
+ SelectCertificateCallback* callback =
+ pending_client_cert_request_callbacks_.Lookup(request_id);
+ if (!callback || callback->is_null()) {
+ LOG(WARNING) << "Ignoring unexpected client certificate response callback";
+ return;
+ }
+ // Make sure callback is run on error.
+ base::ScopedClosureRunner guard(base::Bind(
+ &AwContentsClientBridge::HandleErrorInClientCertificateResponse,
+ base::Unretained(this),
+ request_id));
+ if (encoded_chain_ref == NULL || private_key_ref == NULL) {
+ LOG(ERROR) << "Client certificate request cancelled";
+ return;
+ }
+ // Convert the encoded chain to a vector of strings.
+ std::vector<std::string> encoded_chain_strings;
+ if (encoded_chain_ref) {
+ base::android::JavaArrayOfByteArrayToStringVector(
+ env, encoded_chain_ref, &encoded_chain_strings);
+ }
+
+ std::vector<base::StringPiece> encoded_chain;
+ for (size_t n = 0; n < encoded_chain_strings.size(); ++n)
+ encoded_chain.push_back(encoded_chain_strings[n]);
+
+ // Create the X509Certificate object from the encoded chain.
+ scoped_refptr<net::X509Certificate> client_cert(
+ net::X509Certificate::CreateFromDERCertChain(encoded_chain));
+ if (!client_cert.get()) {
+ LOG(ERROR) << "Could not decode client certificate chain";
+ return;
+ }
+
+ // Create an EVP_PKEY wrapper for the private key JNI reference.
+ ScopedEVP_PKEY private_key(
+ net::android::GetOpenSSLPrivateKeyWrapper(private_key_ref));
+ if (!private_key.get()) {
+ LOG(ERROR) << "Could not create OpenSSL wrapper for private key";
+ return;
+ }
+
+ ignore_result(guard.Release());
boliu 2014/04/18 17:10:12 Again, move below PostTaskAndReply
sgurun-gerrit only 2014/04/19 01:28:50 Done.
+
+ // RecordClientCertificateKey() must be called on the I/O thread,
+ // before the callback is called with the selected certificate on
+ // the UI thread.
+ content::BrowserThread::PostTaskAndReply(
+ content::BrowserThread::IO,
+ FROM_HERE,
+ base::Bind(&RecordClientCertificateKey,
+ client_cert,
+ base::Passed(&private_key)),
+ base::Bind(*callback, client_cert));
+ pending_client_cert_request_callbacks_.Remove(request_id);
+}
+
void AwContentsClientBridge::RunJavaScriptDialog(
content::JavaScriptMessageType message_type,
const GURL& origin_url,

Powered by Google App Engine
This is Rietveld 408576698