Index: net/http/disk_based_cert_cache.cc |
diff --git a/net/http/disk_based_cert_cache.cc b/net/http/disk_based_cert_cache.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..b6c5b7e2731b5ede6215fefe0f2ffceba679f5e6 |
--- /dev/null |
+++ b/net/http/disk_based_cert_cache.cc |
@@ -0,0 +1,547 @@ |
+// Copyright (c) 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/http/disk_based_cert_cache.h" |
+ |
+#include <vector> |
+ |
+#include "base/bind.h" |
+#include "base/callback_helpers.h" |
+#include "base/memory/ref_counted.h" |
+#include "base/stl_util.h" |
+#include "base/strings/string_number_conversions.h" |
+#include "net/base/io_buffer.h" |
+#include "net/base/net_errors.h" |
+#include "net/disk_cache/disk_cache.h" |
+ |
+namespace net { |
+ |
+namespace { |
+ |
+// Used to obtain a unique cache key for a certificate in the form of |
+// "cert:<hash>". |
+std::string GetCacheKeyToCert(const X509Certificate::OSCertHandle cert_handle) { |
+ SHA1HashValue fingerprint = |
+ X509Certificate::CalculateFingerprint(cert_handle); |
+ |
+ return "cert:" + |
+ base::HexEncode(fingerprint.data, arraysize(fingerprint.data)); |
+} |
+ |
+} // namespace |
+ |
+// WriteWorkers represent pending Set jobs in the DiskBasedCertCache. Each |
+// certificate requested to be cached is assigned a Writeworker on a one-to-one |
+// basis. The same certificate should not have multiple WriteWorkers at the same |
+// time; instead, add a user callback to the existing WriteWorker. |
+class DiskBasedCertCache::WriteWorker { |
+ public: |
+ // |backend| is the backend to store |certificate| in, using |
+ // |key| as the key for the disk_cache::Entry. |
+ // |cleanup_callback| is called to clean up this ReadWorker, |
+ // regardless of success or failure. |
+ WriteWorker(disk_cache::Backend* backend, |
+ const std::string& key, |
+ X509Certificate::OSCertHandle cert_handle, |
+ const base::Closure& cleanup_callback); |
+ |
+ ~WriteWorker(); |
+ |
+ // Writes the given certificate to the cache. On completion, will invoke all |
+ // user callbacks. |
+ void Start(); |
+ |
+ // Adds a callback to the set of callbacks to be run when this |
+ // WriteWorker finishes processing. |
+ void AddCallback(const SetCallback& user_callback); |
+ |
+ // Signals the WriteWorker to abort early. The WriteWorker will be destroyed |
+ // upon the completion of any pending callbacks. User callbacks will be |
+ // invoked with an empty string. |
+ void Cancel(); |
+ |
+ private: |
+ enum State { |
+ STATE_CREATE, |
+ STATE_CREATE_COMPLETE, |
+ STATE_OPEN, |
+ STATE_OPEN_COMPLETE, |
+ STATE_WRITE, |
+ STATE_WRITE_COMPLETE, |
+ STATE_NONE |
+ }; |
+ |
+ void OnIOComplete(int rv); |
+ int DoLoop(int rv); |
+ |
+ int DoCreate(); |
+ int DoCreateComplete(int rv); |
+ int DoOpen(); |
+ int DoOpenComplete(int rv); |
+ int DoWrite(); |
+ int DoWriteComplete(int rv); |
+ |
+ void Finish(int rv); |
+ |
+ // Invokes all of the |user_callbacks_| |
+ void RunCallbacks(int rv); |
+ |
+ disk_cache::Backend* backend_; |
+ const X509Certificate::OSCertHandle cert_handle_; |
+ std::string key_; |
+ bool canceled_; |
+ |
+ disk_cache::Entry* entry_; |
+ State state_; |
+ scoped_refptr<IOBuffer> buffer_; |
+ int io_buf_len_; |
+ |
+ base::Closure cleanup_callback_; |
+ std::vector<SetCallback> user_callbacks_; |
+ CompletionCallback io_callback_; |
+}; |
+ |
+DiskBasedCertCache::WriteWorker::WriteWorker( |
+ disk_cache::Backend* backend, |
+ const std::string& key, |
+ X509Certificate::OSCertHandle cert_handle, |
+ const base::Closure& cleanup_callback) |
+ : backend_(backend), |
+ cert_handle_(cert_handle), |
+ key_(key), |
+ canceled_(false), |
+ entry_(NULL), |
+ state_(STATE_NONE), |
+ io_buf_len_(0), |
+ cleanup_callback_(cleanup_callback), |
+ io_callback_( |
+ base::Bind(&WriteWorker::OnIOComplete, base::Unretained(this))) { |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::Start() { |
+ DCHECK_EQ(STATE_NONE, state_); |
+ state_ = STATE_CREATE; |
+ int rv = DoLoop(OK); |
+ |
+ if (rv == ERR_IO_PENDING) |
+ return; |
+ |
+ Finish(rv); |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::AddCallback( |
+ const SetCallback& user_callback) { |
+ user_callbacks_.push_back(user_callback); |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::OnIOComplete(int rv) { |
+ if (canceled_) { |
+ Finish(ERR_FAILED); |
+ return; |
+ } |
+ |
+ rv = DoLoop(rv); |
+ |
+ if (rv == ERR_IO_PENDING) |
+ return; |
+ |
+ Finish(rv); |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoLoop(int rv) { |
+ do { |
+ State next_state = state_; |
+ state_ = STATE_NONE; |
+ switch (next_state) { |
+ case STATE_CREATE: |
+ rv = DoCreate(); |
+ break; |
+ case STATE_CREATE_COMPLETE: |
+ rv = DoCreateComplete(rv); |
+ break; |
+ case STATE_OPEN: |
+ rv = DoOpen(); |
+ break; |
+ case STATE_OPEN_COMPLETE: |
+ rv = DoOpenComplete(rv); |
+ break; |
+ case STATE_WRITE: |
+ rv = DoWrite(); |
+ break; |
+ case STATE_WRITE_COMPLETE: |
+ rv = DoWriteComplete(rv); |
+ break; |
+ case STATE_NONE: |
+ NOTREACHED(); |
+ break; |
+ } |
+ } while (rv != ERR_IO_PENDING && state_ != STATE_NONE); |
+ |
+ return rv; |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoCreate() { |
+ state_ = STATE_CREATE_COMPLETE; |
+ |
+ return backend_->CreateEntry(key_, &entry_, io_callback_); |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoCreateComplete(int rv) { |
+ // An error here usually signifies that the entry already exists. |
+ // If this occurs, it is necessary to instead open the previously |
+ // existing entry. |
+ if (rv < 0) { |
+ state_ = STATE_OPEN; |
+ return OK; |
+ } |
+ |
+ state_ = STATE_WRITE; |
+ return OK; |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoOpen() { |
+ state_ = STATE_OPEN_COMPLETE; |
+ return backend_->OpenEntry(key_, &entry_, io_callback_); |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoOpenComplete(int rv) { |
+ if (rv < 0) { |
+ state_ = STATE_NONE; |
+ return rv; |
+ } |
+ state_ = STATE_WRITE; |
+ return OK; |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoWrite() { |
+ std::string write_data; |
+ bool encoded = X509Certificate::GetDEREncoded(cert_handle_, &write_data); |
+ |
+ if (!encoded) { |
+ state_ = STATE_NONE; |
+ return ERR_FAILED; |
+ } |
+ |
+ buffer_ = new IOBuffer(write_data.size()); |
+ io_buf_len_ = write_data.size(); |
+ memcpy(buffer_->data(), write_data.data(), io_buf_len_); |
+ |
+ state_ = STATE_WRITE_COMPLETE; |
+ |
+ return entry_->WriteData(0 /* index */, |
+ 0 /* offset */, |
+ buffer_, |
+ write_data.size(), |
+ io_callback_, |
+ true /* truncate */); |
+} |
+ |
+int DiskBasedCertCache::WriteWorker::DoWriteComplete(int rv) { |
+ state_ = STATE_NONE; |
+ if (rv < io_buf_len_) |
+ return ERR_FAILED; |
+ |
+ return OK; |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::RunCallbacks(int rv) { |
+ std::string key; |
+ if (rv >= 0) |
+ key = key_; |
+ |
+ for (std::vector<SetCallback>::const_iterator it = user_callbacks_.begin(); |
+ it != user_callbacks_.end(); |
+ ++it) { |
+ it->Run(key); |
+ } |
+ user_callbacks_.clear(); |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::Finish(int rv) { |
+ cleanup_callback_.Run(); |
+ cleanup_callback_.Reset(); |
+ RunCallbacks(rv); |
+ delete this; |
+} |
+ |
+void DiskBasedCertCache::WriteWorker::Cancel() { |
+ canceled_ = true; |
+} |
+ |
+DiskBasedCertCache::WriteWorker::~WriteWorker() { |
+ if (entry_) |
+ entry_->Close(); |
+} |
+ |
+// ReadWorkers represent pending Get jobs in the DiskBasedCertCache. Each |
+// certificate requested to be retrieved from the cache is assigned a ReadWorker |
+// on a one-to-one basis. The same |key| should not have multiple ReadWorkers |
+// at the same time; instead, call AddCallback to add a user_callback_ to |
+// the the existing ReadWorker. |
+class DiskBasedCertCache::ReadWorker { |
+ public: |
+ // |backend| is the backend to read |certificate| from, using |
+ // |key| as the key for the disk_cache::Entry. |
+ // |cleanup_callback| is called to clean up this ReadWorker, |
+ // regardless of success or failure. |
+ ReadWorker(disk_cache::Backend* backend, |
+ const std::string& key, |
+ const base::Closure& cleanup_callback); |
+ |
+ ~ReadWorker(); |
+ |
+ // Reads the given certificate from the cache. On completion, will invoke all |
+ // user callbacks. |
+ void Start(); |
+ |
+ // Adds a callback to the set of callbacks to be run when this |
+ // ReadWorker finishes processing. |
+ void AddCallback(const GetCallback& user_callback); |
+ |
+ // Signals the ReadWorker to abort early. The ReadWorker will be destroyed |
+ // upon the completion of any pending callbacks. User callbacks will be |
+ // invoked with a NULL cert handle. |
+ void Cancel(); |
+ |
+ private: |
+ enum State { |
+ STATE_OPEN, |
+ STATE_OPEN_COMPLETE, |
+ STATE_READ, |
+ STATE_READ_COMPLETE, |
+ STATE_NONE |
+ }; |
+ |
+ void OnIOComplete(int rv); |
+ int DoLoop(int rv); |
+ int DoOpen(); |
+ int DoOpenComplete(int rv); |
+ int DoRead(); |
+ int DoReadComplete(int rv); |
+ void Finish(int rv); |
+ |
+ // Invokes all of |user_callbacks_| |
+ void RunCallbacks(); |
+ |
+ disk_cache::Backend* backend_; |
+ X509Certificate::OSCertHandle cert_handle_; |
+ std::string key_; |
+ bool canceled_; |
+ |
+ disk_cache::Entry* entry_; |
+ |
+ State state_; |
+ scoped_refptr<IOBuffer> buffer_; |
+ int io_buf_len_; |
+ |
+ base::Closure cleanup_callback_; |
+ std::vector<GetCallback> user_callbacks_; |
+ CompletionCallback io_callback_; |
+}; |
+ |
+DiskBasedCertCache::ReadWorker::ReadWorker( |
+ disk_cache::Backend* backend, |
+ const std::string& key, |
+ const base::Closure& cleanup_callback) |
+ : backend_(backend), |
+ cert_handle_(NULL), |
+ key_(key), |
+ canceled_(false), |
+ entry_(NULL), |
+ state_(STATE_NONE), |
+ io_buf_len_(0), |
+ cleanup_callback_(cleanup_callback), |
+ io_callback_( |
+ base::Bind(&ReadWorker::OnIOComplete, base::Unretained(this))) { |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::Start() { |
+ DCHECK_EQ(STATE_NONE, state_); |
+ state_ = STATE_OPEN; |
+ int rv = DoLoop(OK); |
+ |
+ if (rv == ERR_IO_PENDING) |
+ return; |
+ |
+ Finish(rv); |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::AddCallback( |
+ const GetCallback& user_callback) { |
+ user_callbacks_.push_back(user_callback); |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::OnIOComplete(int rv) { |
+ if (canceled_) { |
+ Finish(ERR_FAILED); |
+ return; |
+ } |
+ |
+ rv = DoLoop(rv); |
+ |
+ if (rv == ERR_IO_PENDING) |
+ return; |
+ |
+ Finish(rv); |
+} |
+ |
+int DiskBasedCertCache::ReadWorker::DoLoop(int rv) { |
+ do { |
+ State next_state = state_; |
+ state_ = STATE_NONE; |
+ switch (next_state) { |
+ case STATE_OPEN: |
+ rv = DoOpen(); |
+ break; |
+ case STATE_OPEN_COMPLETE: |
+ rv = DoOpenComplete(rv); |
+ break; |
+ case STATE_READ: |
+ rv = DoRead(); |
+ break; |
+ case STATE_READ_COMPLETE: |
+ rv = DoReadComplete(rv); |
+ break; |
+ case STATE_NONE: |
+ NOTREACHED(); |
+ break; |
+ } |
+ } while (rv != ERR_IO_PENDING && state_ != STATE_NONE); |
+ |
+ return rv; |
+} |
+ |
+int DiskBasedCertCache::ReadWorker::DoOpen() { |
+ state_ = STATE_OPEN_COMPLETE; |
+ return backend_->OpenEntry(key_, &entry_, io_callback_); |
+} |
+ |
+int DiskBasedCertCache::ReadWorker::DoOpenComplete(int rv) { |
+ if (rv < 0) { |
+ state_ = STATE_NONE; |
+ return rv; |
+ } |
+ state_ = STATE_READ; |
+ return OK; |
+} |
+ |
+int DiskBasedCertCache::ReadWorker::DoRead() { |
+ state_ = STATE_READ_COMPLETE; |
+ io_buf_len_ = entry_->GetDataSize(0 /* index */); |
+ buffer_ = new IOBuffer(io_buf_len_); |
+ return entry_->ReadData( |
+ 0 /* index */, 0 /* offset */, buffer_, io_buf_len_, io_callback_); |
+} |
+ |
+int DiskBasedCertCache::ReadWorker::DoReadComplete(int rv) { |
+ state_ = STATE_NONE; |
+ if (rv < io_buf_len_) |
+ return ERR_FAILED; |
+ |
+ cert_handle_ = X509Certificate::CreateOSCertHandleFromBytes(buffer_->data(), |
+ io_buf_len_); |
+ if (!cert_handle_) |
+ return ERR_FAILED; |
+ |
+ return OK; |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::RunCallbacks() { |
+ for (std::vector<GetCallback>::const_iterator it = user_callbacks_.begin(); |
+ it != user_callbacks_.end(); |
+ ++it) { |
+ it->Run(cert_handle_); |
+ } |
+ user_callbacks_.clear(); |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::Finish(int rv) { |
+ cleanup_callback_.Run(); |
+ cleanup_callback_.Reset(); |
+ RunCallbacks(); |
+ delete this; |
+} |
+ |
+void DiskBasedCertCache::ReadWorker::Cancel() { |
+ canceled_ = true; |
+} |
+ |
+DiskBasedCertCache::ReadWorker::~ReadWorker() { |
+ if (entry_) |
+ entry_->Close(); |
+ if (cert_handle_) |
+ X509Certificate::FreeOSCertHandle(cert_handle_); |
+} |
+ |
+DiskBasedCertCache::DiskBasedCertCache(disk_cache::Backend* backend) |
+ : backend_(backend), weak_factory_(this) { |
+ DCHECK(backend_); |
+} |
+ |
+DiskBasedCertCache::~DiskBasedCertCache() { |
+ for (WriteWorkerMap::iterator it = write_worker_map_.begin(); |
+ it != write_worker_map_.end(); |
+ ++it) { |
+ it->second->Cancel(); |
+ } |
+ for (ReadWorkerMap::iterator it = read_worker_map_.begin(); |
+ it != read_worker_map_.end(); |
+ ++it) { |
+ it->second->Cancel(); |
+ } |
+} |
+ |
+void DiskBasedCertCache::Get(const std::string& key, const GetCallback& cb) { |
+ DCHECK(!key.empty()); |
+ |
+ ReadWorkerMap::iterator it = read_worker_map_.find(key); |
+ |
+ if (it == read_worker_map_.end()) { |
+ ReadWorker* worker = |
+ new ReadWorker(backend_, |
+ key, |
+ base::Bind(&DiskBasedCertCache::FinishedReadOperation, |
+ weak_factory_.GetWeakPtr(), |
+ key)); |
+ read_worker_map_[key] = worker; |
+ worker->AddCallback(cb); |
+ worker->Start(); |
+ } else { |
+ it->second->AddCallback(cb); |
+ } |
+} |
+ |
+void DiskBasedCertCache::Set(const X509Certificate::OSCertHandle cert_handle, |
+ const SetCallback& cb) { |
+ DCHECK(!cb.is_null()); |
+ DCHECK(cert_handle); |
+ std::string key = GetCacheKeyToCert(cert_handle); |
+ |
+ WriteWorkerMap::iterator it = write_worker_map_.find(key); |
+ |
+ if (it == write_worker_map_.end()) { |
+ WriteWorker* worker = |
+ new WriteWorker(backend_, |
+ key, |
+ cert_handle, |
+ base::Bind(&DiskBasedCertCache::FinishedWriteOperation, |
+ weak_factory_.GetWeakPtr(), |
+ key)); |
+ write_worker_map_[key] = worker; |
+ worker->AddCallback(cb); |
+ worker->Start(); |
+ } else { |
+ it->second->AddCallback(cb); |
+ } |
+} |
+ |
+void DiskBasedCertCache::FinishedWriteOperation(const std::string& key) { |
+ write_worker_map_.erase(key); |
+} |
+ |
+void DiskBasedCertCache::FinishedReadOperation(const std::string& key) { |
+ read_worker_map_.erase(key); |
+} |
+ |
+} // namespace net |