Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2726)

Unified Diff: chrome/browser/chromeos/net/client_cert_store_chromeos.cc

Issue 2937553003: Make CertificateProviderService vend ClientCertIdentities directly. (Closed)
Patch Set: review changes for comments 11 & 12 Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/chromeos/net/client_cert_store_chromeos.h ('k') | net/BUILD.gn » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/chromeos/net/client_cert_store_chromeos.cc
diff --git a/chrome/browser/chromeos/net/client_cert_store_chromeos.cc b/chrome/browser/chromeos/net/client_cert_store_chromeos.cc
index 89da96a9899f3801b755344a72142daa5efe2027..75f67d371eb5f7985ce49f45930ac40a382ef8af 100644
--- a/chrome/browser/chromeos/net/client_cert_store_chromeos.cc
+++ b/chrome/browser/chromeos/net/client_cert_store_chromeos.cc
@@ -18,7 +18,6 @@
#include "base/threading/worker_pool.h"
#include "chrome/browser/chromeos/certificate_provider/certificate_provider.h"
#include "crypto/nss_crypto_module_delegate.h"
-#include "net/ssl/client_key_store.h"
#include "net/ssl/ssl_cert_request_info.h"
#include "net/ssl/ssl_private_key.h"
@@ -26,23 +25,6 @@ namespace chromeos {
namespace {
-class ClientCertIdentityCros : public net::ClientCertIdentity {
- public:
- explicit ClientCertIdentityCros(scoped_refptr<net::X509Certificate> cert)
- : net::ClientCertIdentity(std::move(cert)) {}
- ~ClientCertIdentityCros() override = default;
-
- void AcquirePrivateKey(
- const base::Callback<void(scoped_refptr<net::SSLPrivateKey>)>&
- private_key_callback) override {
- // There is only one implementation of ClientKeyStore and it doesn't do
- // anything blocking, so this doesn't need to run on a worker thread.
- private_key_callback.Run(
- net::ClientKeyStore::GetInstance()->FetchClientCertPrivateKey(
- *certificate()));
- }
-};
-
class CertNotAllowedPredicate {
public:
explicit CertNotAllowedPredicate(
@@ -73,7 +55,7 @@ void ClientCertStoreChromeOS::GetClientCerts(
const ClientCertListCallback& callback) {
// Caller is responsible for keeping the ClientCertStore alive until the
// callback is run.
- base::Callback<void(const net::CertificateList&)>
+ base::Callback<void(net::ClientCertIdentityList)>
get_platform_certs_and_filter =
base::Bind(&ClientCertStoreChromeOS::GotAdditionalCerts,
base::Unretained(this), &cert_request_info, callback);
@@ -85,7 +67,8 @@ void ClientCertStoreChromeOS::GetClientCerts(
base::Unretained(cert_provider_.get()), get_platform_certs_and_filter);
} else {
get_additional_certs_and_continue =
- base::Bind(get_platform_certs_and_filter, net::CertificateList());
+ base::Bind(get_platform_certs_and_filter,
+ base::Passed(net::ClientCertIdentityList()));
}
if (cert_filter_->Init(get_additional_certs_and_continue))
@@ -95,7 +78,7 @@ void ClientCertStoreChromeOS::GetClientCerts(
void ClientCertStoreChromeOS::GotAdditionalCerts(
const net::SSLCertRequestInfo* request,
const ClientCertListCallback& callback,
- const net::CertificateList& additional_certs) {
+ net::ClientCertIdentityList additional_certs) {
scoped_refptr<crypto::CryptoModuleBlockingPasswordDelegate> password_delegate;
if (!password_delegate_factory_.is_null())
password_delegate = password_delegate_factory_.Run(request->host_and_port);
@@ -104,7 +87,7 @@ void ClientCertStoreChromeOS::GotAdditionalCerts(
FROM_HERE,
base::Bind(&ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread,
base::Unretained(this), password_delegate, request,
- additional_certs),
+ base::Passed(&additional_certs)),
callback)) {
return;
}
@@ -117,7 +100,7 @@ ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread(
scoped_refptr<crypto::CryptoModuleBlockingPasswordDelegate>
password_delegate,
const net::SSLCertRequestInfo* request,
- const net::CertificateList& additional_certs) {
+ net::ClientCertIdentityList additional_certs) {
net::ClientCertIdentityList client_certs;
net::ClientCertStoreNSS::GetPlatformCertsOnWorkerThread(
std::move(password_delegate), &client_certs);
@@ -127,8 +110,9 @@ ClientCertStoreChromeOS::GetAndFilterCertsOnWorkerThread(
CertNotAllowedPredicate(cert_filter_.get())),
client_certs.end());
- for (const scoped_refptr<net::X509Certificate>& cert : additional_certs)
- client_certs.push_back(base::MakeUnique<ClientCertIdentityCros>(cert));
+ client_certs.reserve(client_certs.size() + additional_certs.size());
+ for (std::unique_ptr<net::ClientCertIdentity>& cert : additional_certs)
+ client_certs.push_back(std::move(cert));
net::ClientCertStoreNSS::FilterCertsOnWorkerThread(&client_certs, *request);
return client_certs;
}
« no previous file with comments | « chrome/browser/chromeos/net/client_cert_store_chromeos.h ('k') | net/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698