Chromium Code Reviews| Index: net/http/disk_based_cert_cache.cc |
| diff --git a/net/http/disk_based_cert_cache.cc b/net/http/disk_based_cert_cache.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..45dec7b4fb9dfc4f07cd2b6093175f54656bc2bb |
| --- /dev/null |
| +++ b/net/http/disk_based_cert_cache.cc |
| @@ -0,0 +1,217 @@ |
| +// Copyright (c) 2014 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/http/disk_based_cert_cache.h" |
| + |
| +#include <string> |
|
wtc
2014/06/12 03:13:16
Nit: since the .h file includes <string>, the .cc
|
| + |
| +#include "base/bind.h" |
| +#include "base/callback.h" |
| +#include "base/callback_helpers.h" |
| +#include "base/memory/ref_counted.h" |
| +#include "base/memory/weak_ptr.h" |
| +#include "base/strings/string_number_conversions.h" |
| +#include "net/base/io_buffer.h" |
| +#include "net/base/net_errors.h" |
| +#include "net/cert/x509_certificate.h" |
| +#include "net/disk_cache/disk_cache.h" |
|
wtc
2014/06/12 03:13:16
The headers that are included by the .h file don't
|
| + |
| +namespace net { |
| + |
| +DiskBasedCertCache::DiskBasedCertCache(disk_cache::Backend* backend) |
| + : backend_(backend), |
| + active_entry_(NULL), |
| + state_(NONE), |
| + create_failed_(false), |
| + active_entry_size_(0), |
| + weak_factory_(this) { |
| + DCHECK(backend_); |
| + io_callback_ = |
| + base::Bind(&DiskBasedCertCache::OnIOComplete, weak_factory_.GetWeakPtr()); |
| +} |
| + |
| +DiskBasedCertCache::~DiskBasedCertCache() { |
| + weak_factory_.InvalidateWeakPtrs(); |
| +} |
| + |
| +void DiskBasedCertCache::Get( |
| + std::string& key, |
| + base::Callback<void(X509Certificate::OSCertHandle cert_handle)> cb) { |
| + user_read_callback_ = cb; |
| + |
| + state_ = START_READ; |
| + |
| + int rv = backend_->OpenEntry(key, &active_entry_, io_callback_); |
| + |
| + DoLoop(rv); |
| +} |
| + |
| +int DiskBasedCertCache::DoStartRead(int rv) { |
| + // todo(brandonsalmon) implement error handling |
|
wtc
2014/06/12 03:13:16
Our convention is all caps TODO.
|
| + if (rv <= 0) |
| + NOTIMPLEMENTED(); |
| + |
| + active_entry_size_ = active_entry_->GetDataSize(0 /* index */); |
| + buffer = new IOBuffer(active_entry_size_); |
| + |
| + state_ = FINISH_READ; |
| + |
| + return active_entry_->ReadData( |
| + 0 /* index */, 0 /* offset */, buffer, active_entry_size_, io_callback_); |
| +} |
| + |
| +int DiskBasedCertCache::DoFinishRead(int rv) { |
| + // todo(brandonsalmon) implement error handling |
| + if (rv <= 0) |
| + NOTIMPLEMENTED(); |
| + |
| + if (user_read_callback_.is_null()) { |
| + ResetState(); |
| + return OK; // todo(brandonsalmon): is this ERR_ABORTED? |
| + } |
| + |
| + active_cert_handle_ = X509Certificate::CreateOSCertHandleFromBytes( |
| + buffer->data(), active_entry_size_); |
| + |
| + CHECK(active_cert_handle_); |
| + |
| + base::ResetAndReturn(&user_read_callback_).Run(active_cert_handle_); |
| + |
| + ResetState(); |
| + return OK; |
| +} |
| + |
| +void DiskBasedCertCache::Set(const X509Certificate::OSCertHandle cert_handle, |
| + base::Callback<void(const std::string&)> cb) { |
| + DCHECK(!cb.is_null()); |
| + |
| + active_cert_handle_ = cert_handle; |
| + |
| + state_ = CREATE_OR_OPEN; |
| + user_write_callback_ = cb; |
| + DoLoop(OK); |
| +} |
| + |
| +std::string DiskBasedCertCache::Key() { |
| + CHECK(active_cert_handle_); |
| + |
| + SHA1HashValue fingerprint = |
| + X509Certificate::CalculateFingerprint(active_cert_handle_); |
| + |
| + // should update to store the key so the data doesn't have to be encoded |
| + // multiple times. |
| + |
| + return "cert:" + base::HexEncode(fingerprint.data, 20); |
|
wtc
2014/06/12 03:13:16
Avoid the use of 20. Try arraysize(fingerprint.dat
|
| +} |
| + |
| +void DiskBasedCertCache::DoLoop(int rv) { |
| + do { |
| + switch (state_) { |
| + case CREATE_OR_OPEN: |
| + rv = DoCreateOrOpen(rv); |
| + break; |
| + case START_WRITE: |
| + rv = DoStartWrite(rv); |
| + break; |
| + case FINISH_CREATE_OR_OPEN: |
| + rv = DoFinishCreateOrOpen(rv); |
| + break; |
| + case FINISH_WRITE: |
| + rv = DoFinishWrite(rv); |
| + break; |
| + case START_READ: |
| + rv = DoStartRead(rv); |
| + break; |
| + case FINISH_READ: |
| + rv = DoFinishRead(rv); |
| + break; |
| + case NONE: |
| + break; |
| + } |
| + } while (rv != ERR_IO_PENDING && state_ != NONE); |
| +} |
| + |
| +void DiskBasedCertCache::OnIOComplete(int rv) { |
| + // todo(brandonsalmon) Check for fatal errors? |
| + DoLoop(rv); |
| +} |
| + |
| +int DiskBasedCertCache::DoStartWrite(int rv) { |
| + // todo(brandonsalmon) implement error handling |
| + if (rv <= 0) |
| + NOTIMPLEMENTED(); |
| + |
| + std::string write_data; |
| + // todo(brandonsalmon) deal with faulty encoding. |
| + bool encoded = |
| + X509Certificate::GetDEREncoded(active_cert_handle_, &write_data); |
| + |
| + if (!encoded) |
| + NOTIMPLEMENTED(); |
| + |
| + buffer = new IOBuffer(write_data.size()); |
| + memcpy(buffer->data(), write_data.data(), write_data.size()); |
| + |
| + state_ = FINISH_WRITE; |
| + |
| + return active_entry_->WriteData(0 /* index */, |
| + 0 /* offset */, |
| + buffer, |
| + write_data.size(), |
| + io_callback_, |
| + true /* truncate */); |
| +} |
| + |
| +int DiskBasedCertCache::DoCreateOrOpen(int rv) { |
| + DCHECK(active_entry_ == NULL); |
| + |
| + state_ = FINISH_CREATE_OR_OPEN; |
| + |
| + if (create_failed_) { |
| + return backend_->OpenEntry(Key(), &active_entry_, io_callback_); |
| + } |
| + |
| + return backend_->CreateEntry(Key(), &active_entry_, io_callback_); |
| +} |
| + |
| +int DiskBasedCertCache::DoFinishCreateOrOpen(int rv) { |
| + // ERR_FAILED implies create entry failed, and we should try opening instead. |
| + //!create_failed is checked to make sure we only try to open once. |
| + if (rv == ERR_FAILED && !create_failed_) { |
| + create_failed_ = true; |
| + state_ = CREATE_OR_OPEN; |
| + return OK; |
| + } else if (rv <= 0) { |
| + NOTIMPLEMENTED(); |
| + } |
| + |
| + state_ = START_WRITE; |
| + return OK; |
| +} |
| + |
| +int DiskBasedCertCache::DoFinishWrite(int rv) { |
| + // todo(brandonsalmon) implement error handling |
| + if (rv <= 0) |
| + NOTIMPLEMENTED(); |
| + |
| + if (user_write_callback_.is_null()) { |
| + ResetState(); |
| + return OK; // todo(brandonsalmon): is this ERR_ABORTED? |
| + } |
| + |
| + base::ResetAndReturn(&user_write_callback_).Run(Key()); |
| + ResetState(); |
| + return OK; |
| +} |
| + |
| +void DiskBasedCertCache::ResetState() { |
| + state_ = NONE; |
| + active_entry_->Close(); |
| + active_entry_ = NULL; |
| + active_cert_handle_ = NULL; |
| + user_write_callback_.Reset(); |
| + user_read_callback_.Reset(); |
| +} |
| + |
| +} // namespace net |