OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/net/client_cert_store_chromeos.h" | 5 #include "chrome/browser/chromeos/net/client_cert_store_chromeos.h" |
6 | 6 |
7 #include <cert.h> | 7 #include <cert.h> |
8 #include <algorithm> | 8 #include <algorithm> |
9 #include <utility> | 9 #include <utility> |
10 | 10 |
11 #include "base/bind.h" | 11 #include "base/bind.h" |
12 #include "base/bind_helpers.h" | 12 #include "base/bind_helpers.h" |
13 #include "base/callback.h" | 13 #include "base/callback.h" |
14 #include "base/location.h" | 14 #include "base/location.h" |
| 15 #include "base/task_runner_util.h" |
15 #include "base/threading/worker_pool.h" | 16 #include "base/threading/worker_pool.h" |
16 #include "chrome/browser/chromeos/certificate_provider/certificate_provider.h" | 17 #include "chrome/browser/chromeos/certificate_provider/certificate_provider.h" |
17 #include "crypto/nss_crypto_module_delegate.h" | 18 #include "crypto/nss_crypto_module_delegate.h" |
18 #include "net/ssl/ssl_cert_request_info.h" | 19 #include "net/ssl/ssl_cert_request_info.h" |
19 | 20 |
20 namespace chromeos { | 21 namespace chromeos { |
21 | 22 |
22 namespace { | 23 namespace { |
23 | 24 |
24 class CertNotAllowedPredicate { | 25 class CertNotAllowedPredicate { |
(...skipping 15 matching lines...) Expand all Loading... |
40 std::unique_ptr<CertificateProvider> cert_provider, | 41 std::unique_ptr<CertificateProvider> cert_provider, |
41 std::unique_ptr<CertFilter> cert_filter, | 42 std::unique_ptr<CertFilter> cert_filter, |
42 const PasswordDelegateFactory& password_delegate_factory) | 43 const PasswordDelegateFactory& password_delegate_factory) |
43 : cert_provider_(std::move(cert_provider)), | 44 : cert_provider_(std::move(cert_provider)), |
44 cert_filter_(std::move(cert_filter)) {} | 45 cert_filter_(std::move(cert_filter)) {} |
45 | 46 |
46 ClientCertStoreChromeOS::~ClientCertStoreChromeOS() {} | 47 ClientCertStoreChromeOS::~ClientCertStoreChromeOS() {} |
47 | 48 |
48 void ClientCertStoreChromeOS::GetClientCerts( | 49 void ClientCertStoreChromeOS::GetClientCerts( |
49 const net::SSLCertRequestInfo& cert_request_info, | 50 const net::SSLCertRequestInfo& cert_request_info, |
50 net::CertificateList* selected_certs, | 51 const ClientCertListCallback& callback) { |
51 const base::Closure& callback) { | |
52 // Caller is responsible for keeping the ClientCertStore alive until the | 52 // Caller is responsible for keeping the ClientCertStore alive until the |
53 // callback is run. | 53 // callback is run. |
54 base::Callback<void(const net::CertificateList&)> | 54 base::Callback<void(const net::CertificateList&)> |
55 get_platform_certs_and_filter = base::Bind( | 55 get_platform_certs_and_filter = |
56 &ClientCertStoreChromeOS::GotAdditionalCerts, base::Unretained(this), | 56 base::Bind(&ClientCertStoreChromeOS::GotAdditionalCerts, |
57 &cert_request_info, selected_certs, callback); | 57 base::Unretained(this), &cert_request_info, callback); |
58 | 58 |
59 base::Closure get_additional_certs_and_continue; | 59 base::Closure get_additional_certs_and_continue; |
60 if (cert_provider_) { | 60 if (cert_provider_) { |
61 get_additional_certs_and_continue = base::Bind( | 61 get_additional_certs_and_continue = base::Bind( |
62 &CertificateProvider::GetCertificates, | 62 &CertificateProvider::GetCertificates, |
63 base::Unretained(cert_provider_.get()), get_platform_certs_and_filter); | 63 base::Unretained(cert_provider_.get()), get_platform_certs_and_filter); |
64 } else { | 64 } else { |
65 get_additional_certs_and_continue = | 65 get_additional_certs_and_continue = |
66 base::Bind(get_platform_certs_and_filter, net::CertificateList()); | 66 base::Bind(get_platform_certs_and_filter, net::CertificateList()); |
67 } | 67 } |
68 | 68 |
69 if (cert_filter_->Init(get_additional_certs_and_continue)) | 69 if (cert_filter_->Init(get_additional_certs_and_continue)) |
70 get_additional_certs_and_continue.Run(); | 70 get_additional_certs_and_continue.Run(); |
71 } | 71 } |
72 | 72 |
73 void ClientCertStoreChromeOS::GotAdditionalCerts( | 73 void ClientCertStoreChromeOS::GotAdditionalCerts( |
74 const net::SSLCertRequestInfo* request, | 74 const net::SSLCertRequestInfo* request, |
75 net::CertificateList* selected_certs, | 75 const ClientCertListCallback& callback, |
76 const base::Closure& callback, | |
77 const net::CertificateList& additional_certs) { | 76 const net::CertificateList& additional_certs) { |
78 std::unique_ptr<crypto::CryptoModuleBlockingPasswordDelegate> | 77 std::unique_ptr<crypto::CryptoModuleBlockingPasswordDelegate> |
79 password_delegate; | 78 password_delegate; |
80 if (!password_delegate_factory_.is_null()) { | 79 if (!password_delegate_factory_.is_null()) { |
81 password_delegate.reset( | 80 password_delegate.reset( |
82 password_delegate_factory_.Run(request->host_and_port)); | 81 password_delegate_factory_.Run(request->host_and_port)); |
83 } | 82 } |
84 if (base::WorkerPool::PostTaskAndReply( | 83 if (base::PostTaskAndReplyWithResult( |
| 84 base::WorkerPool::GetTaskRunner(true /* task_is_slow */).get(), |
85 FROM_HERE, | 85 FROM_HERE, |
86 base::Bind(&ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread, | 86 base::Bind(&ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread, |
87 base::Unretained(this), base::Passed(&password_delegate), | 87 base::Unretained(this), base::Passed(&password_delegate), |
88 request, additional_certs, selected_certs), | 88 request, additional_certs), |
89 callback, true)) { | 89 callback)) { |
90 return; | 90 return; |
91 } | 91 } |
92 // If the task could not be posted, behave as if there were no certificates | 92 // If the task could not be posted, behave as if there were no certificates. |
93 // which requires to clear |selected_certs|. | 93 callback.Run(net::CertificateList()); |
94 selected_certs->clear(); | |
95 callback.Run(); | |
96 } | 94 } |
97 | 95 |
98 void ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread( | 96 net::CertificateList ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread( |
99 std::unique_ptr<crypto::CryptoModuleBlockingPasswordDelegate> | 97 std::unique_ptr<crypto::CryptoModuleBlockingPasswordDelegate> |
100 password_delegate, | 98 password_delegate, |
101 const net::SSLCertRequestInfo* request, | 99 const net::SSLCertRequestInfo* request, |
102 const net::CertificateList& additional_certs, | 100 const net::CertificateList& additional_certs) { |
103 net::CertificateList* selected_certs) { | |
104 net::CertificateList unfiltered_certs; | 101 net::CertificateList unfiltered_certs; |
105 net::ClientCertStoreNSS::GetPlatformCertsOnWorkerThread( | 102 net::ClientCertStoreNSS::GetPlatformCertsOnWorkerThread( |
106 std::move(password_delegate), &unfiltered_certs); | 103 std::move(password_delegate), &unfiltered_certs); |
107 | 104 |
108 unfiltered_certs.erase( | 105 unfiltered_certs.erase( |
109 std::remove_if(unfiltered_certs.begin(), unfiltered_certs.end(), | 106 std::remove_if(unfiltered_certs.begin(), unfiltered_certs.end(), |
110 CertNotAllowedPredicate(cert_filter_.get())), | 107 CertNotAllowedPredicate(cert_filter_.get())), |
111 unfiltered_certs.end()); | 108 unfiltered_certs.end()); |
112 | 109 |
113 unfiltered_certs.insert(unfiltered_certs.end(), additional_certs.begin(), | 110 unfiltered_certs.insert(unfiltered_certs.end(), additional_certs.begin(), |
114 additional_certs.end()); | 111 additional_certs.end()); |
115 | 112 |
| 113 net::CertificateList selected_certs; |
116 net::ClientCertStoreNSS::FilterCertsOnWorkerThread(unfiltered_certs, *request, | 114 net::ClientCertStoreNSS::FilterCertsOnWorkerThread(unfiltered_certs, *request, |
117 selected_certs); | 115 &selected_certs); |
| 116 return selected_certs; |
118 } | 117 } |
119 | 118 |
120 } // namespace chromeos | 119 } // namespace chromeos |
OLD | NEW |