OLD | NEW |
---|---|
1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/disk_based_cert_cache.h" | 5 #include "net/http/disk_based_cert_cache.h" |
6 | 6 |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/callback_helpers.h" | 10 #include "base/callback_helpers.h" |
11 #include "base/memory/ref_counted.h" | 11 #include "base/memory/ref_counted.h" |
12 #include "base/stl_util.h" | 12 #include "base/stl_util.h" |
13 #include "base/strings/string_number_conversions.h" | 13 #include "base/strings/string_number_conversions.h" |
14 #include "net/base/io_buffer.h" | 14 #include "net/base/io_buffer.h" |
15 #include "net/base/net_errors.h" | 15 #include "net/base/net_errors.h" |
16 #include "net/disk_cache/disk_cache.h" | 16 #include "net/disk_cache/disk_cache.h" |
17 | 17 |
18 namespace net { | 18 namespace net { |
19 | 19 |
20 namespace { | 20 namespace { |
21 | 21 |
22 // TODO(brandonsalmon): change this number to improve performance. | |
23 const int kMemoryCacheMaxSize = 30; | |
Ryan Sleevi
2014/07/02 21:49:58
size_t
| |
24 | |
22 // Used to obtain a unique cache key for a certificate in the form of | 25 // Used to obtain a unique cache key for a certificate in the form of |
23 // "cert:<hash>". | 26 // "cert:<hash>". |
24 std::string GetCacheKeyToCert(const X509Certificate::OSCertHandle cert_handle) { | 27 std::string GetCacheKeyToCert(const X509Certificate::OSCertHandle cert_handle) { |
25 SHA1HashValue fingerprint = | 28 SHA1HashValue fingerprint = |
26 X509Certificate::CalculateFingerprint(cert_handle); | 29 X509Certificate::CalculateFingerprint(cert_handle); |
27 | 30 |
28 return "cert:" + | 31 return "cert:" + |
29 base::HexEncode(fingerprint.data, arraysize(fingerprint.data)); | 32 base::HexEncode(fingerprint.data, arraysize(fingerprint.data)); |
30 } | 33 } |
31 | 34 |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
101 std::vector<SetCallback> user_callbacks_; | 104 std::vector<SetCallback> user_callbacks_; |
102 CompletionCallback io_callback_; | 105 CompletionCallback io_callback_; |
103 }; | 106 }; |
104 | 107 |
105 DiskBasedCertCache::WriteWorker::WriteWorker( | 108 DiskBasedCertCache::WriteWorker::WriteWorker( |
106 disk_cache::Backend* backend, | 109 disk_cache::Backend* backend, |
107 const std::string& key, | 110 const std::string& key, |
108 X509Certificate::OSCertHandle cert_handle, | 111 X509Certificate::OSCertHandle cert_handle, |
109 const base::Closure& cleanup_callback) | 112 const base::Closure& cleanup_callback) |
110 : backend_(backend), | 113 : backend_(backend), |
111 cert_handle_(cert_handle), | 114 cert_handle_(cert_handle), |
wtc
2014/07/02 20:51:49
I wonder if we should dup the cert_handle here, an
Ryan Sleevi
2014/07/02 21:49:58
Oof. Missed this. Yes, we should.
| |
112 key_(key), | 115 key_(key), |
113 canceled_(false), | 116 canceled_(false), |
114 entry_(NULL), | 117 entry_(NULL), |
115 state_(STATE_NONE), | 118 state_(STATE_NONE), |
116 io_buf_len_(0), | 119 io_buf_len_(0), |
117 cleanup_callback_(cleanup_callback), | 120 cleanup_callback_(cleanup_callback), |
118 io_callback_( | 121 io_callback_( |
119 base::Bind(&WriteWorker::OnIOComplete, base::Unretained(this))) { | 122 base::Bind(&WriteWorker::OnIOComplete, base::Unretained(this))) { |
120 } | 123 } |
121 | 124 |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
199 state_ = STATE_WRITE; | 202 state_ = STATE_WRITE; |
200 return OK; | 203 return OK; |
201 } | 204 } |
202 | 205 |
203 int DiskBasedCertCache::WriteWorker::DoOpen() { | 206 int DiskBasedCertCache::WriteWorker::DoOpen() { |
204 state_ = STATE_OPEN_COMPLETE; | 207 state_ = STATE_OPEN_COMPLETE; |
205 return backend_->OpenEntry(key_, &entry_, io_callback_); | 208 return backend_->OpenEntry(key_, &entry_, io_callback_); |
206 } | 209 } |
207 | 210 |
208 int DiskBasedCertCache::WriteWorker::DoOpenComplete(int rv) { | 211 int DiskBasedCertCache::WriteWorker::DoOpenComplete(int rv) { |
209 if (rv < 0) { | 212 if (rv < 0) |
210 state_ = STATE_NONE; | |
211 return rv; | 213 return rv; |
212 } | 214 |
213 state_ = STATE_WRITE; | 215 state_ = STATE_WRITE; |
214 return OK; | 216 return OK; |
215 } | 217 } |
216 | 218 |
217 int DiskBasedCertCache::WriteWorker::DoWrite() { | 219 int DiskBasedCertCache::WriteWorker::DoWrite() { |
218 std::string write_data; | 220 std::string write_data; |
219 bool encoded = X509Certificate::GetDEREncoded(cert_handle_, &write_data); | 221 bool encoded = X509Certificate::GetDEREncoded(cert_handle_, &write_data); |
220 | 222 |
221 if (!encoded) { | 223 if (!encoded) |
222 state_ = STATE_NONE; | |
223 return ERR_FAILED; | 224 return ERR_FAILED; |
224 } | |
225 | 225 |
226 buffer_ = new IOBuffer(write_data.size()); | 226 buffer_ = new IOBuffer(write_data.size()); |
227 io_buf_len_ = write_data.size(); | 227 io_buf_len_ = write_data.size(); |
228 memcpy(buffer_->data(), write_data.data(), io_buf_len_); | 228 memcpy(buffer_->data(), write_data.data(), io_buf_len_); |
229 | 229 |
230 state_ = STATE_WRITE_COMPLETE; | 230 state_ = STATE_WRITE_COMPLETE; |
231 | 231 |
232 return entry_->WriteData(0 /* index */, | 232 return entry_->WriteData(0 /* index */, |
233 0 /* offset */, | 233 0 /* offset */, |
234 buffer_, | 234 buffer_, |
235 write_data.size(), | 235 write_data.size(), |
236 io_callback_, | 236 io_callback_, |
237 true /* truncate */); | 237 true /* truncate */); |
238 } | 238 } |
239 | 239 |
240 int DiskBasedCertCache::WriteWorker::DoWriteComplete(int rv) { | 240 int DiskBasedCertCache::WriteWorker::DoWriteComplete(int rv) { |
241 state_ = STATE_NONE; | |
242 if (rv < io_buf_len_) | 241 if (rv < io_buf_len_) |
243 return ERR_FAILED; | 242 return ERR_FAILED; |
244 | 243 |
245 return OK; | 244 return OK; |
246 } | 245 } |
247 | 246 |
248 void DiskBasedCertCache::WriteWorker::RunCallbacks(int rv) { | 247 void DiskBasedCertCache::WriteWorker::RunCallbacks(int rv) { |
249 std::string key; | 248 std::string key; |
250 if (rv >= 0) | 249 if (rv >= 0) |
251 key = key_; | 250 key = key_; |
(...skipping 10 matching lines...) Expand all Loading... | |
262 cleanup_callback_.Run(); | 261 cleanup_callback_.Run(); |
263 cleanup_callback_.Reset(); | 262 cleanup_callback_.Reset(); |
264 RunCallbacks(rv); | 263 RunCallbacks(rv); |
265 delete this; | 264 delete this; |
266 } | 265 } |
267 | 266 |
268 void DiskBasedCertCache::WriteWorker::Cancel() { | 267 void DiskBasedCertCache::WriteWorker::Cancel() { |
269 canceled_ = true; | 268 canceled_ = true; |
270 } | 269 } |
271 | 270 |
272 DiskBasedCertCache::WriteWorker::~WriteWorker() { | 271 DiskBasedCertCache::WriteWorker::~WriteWorker() { |
wtc
2014/07/02 20:51:49
Define the destructor right after the constructor.
| |
273 if (entry_) | 272 if (entry_) |
274 entry_->Close(); | 273 entry_->Close(); |
275 } | 274 } |
276 | 275 |
277 // ReadWorkers represent pending Get jobs in the DiskBasedCertCache. Each | 276 // ReadWorkers represent pending Get jobs in the DiskBasedCertCache. Each |
278 // certificate requested to be retrieved from the cache is assigned a ReadWorker | 277 // certificate requested to be retrieved from the cache is assigned a ReadWorker |
279 // on a one-to-one basis. The same |key| should not have multiple ReadWorkers | 278 // on a one-to-one basis. The same |key| should not have multiple ReadWorkers |
280 // at the same time; instead, call AddCallback to add a user_callback_ to | 279 // at the same time; instead, call AddCallback to add a user_callback_ to |
281 // the the existing ReadWorker. | 280 // the the existing ReadWorker. |
282 class DiskBasedCertCache::ReadWorker { | 281 class DiskBasedCertCache::ReadWorker { |
283 public: | 282 public: |
284 // |backend| is the backend to read |certificate| from, using | 283 // |backend| is the backend to read |certificate| from, using |
285 // |key| as the key for the disk_cache::Entry. | 284 // |key| as the key for the disk_cache::Entry. |
286 // |cleanup_callback| is called to clean up this ReadWorker, | 285 // |cleanup_callback| is called to clean up this ReadWorker, |
287 // regardless of success or failure. | 286 // regardless of success or failure. |
288 ReadWorker(disk_cache::Backend* backend, | 287 ReadWorker(disk_cache::Backend* backend, |
289 const std::string& key, | 288 const std::string& key, |
290 const base::Closure& cleanup_callback); | 289 const GetCallback& cleanup_callback); |
291 | 290 |
292 ~ReadWorker(); | 291 ~ReadWorker(); |
293 | 292 |
294 // Reads the given certificate from the cache. On completion, will invoke all | 293 // Reads the given certificate from the cache. On completion, will invoke all |
295 // user callbacks. | 294 // user callbacks. |
296 void Start(); | 295 void Start(); |
297 | 296 |
298 // Adds a callback to the set of callbacks to be run when this | 297 // Adds a callback to the set of callbacks to be run when this |
299 // ReadWorker finishes processing. | 298 // ReadWorker finishes processing. |
300 void AddCallback(const GetCallback& user_callback); | 299 void AddCallback(const GetCallback& user_callback); |
(...skipping 27 matching lines...) Expand all Loading... | |
328 X509Certificate::OSCertHandle cert_handle_; | 327 X509Certificate::OSCertHandle cert_handle_; |
329 std::string key_; | 328 std::string key_; |
330 bool canceled_; | 329 bool canceled_; |
331 | 330 |
332 disk_cache::Entry* entry_; | 331 disk_cache::Entry* entry_; |
333 | 332 |
334 State state_; | 333 State state_; |
335 scoped_refptr<IOBuffer> buffer_; | 334 scoped_refptr<IOBuffer> buffer_; |
336 int io_buf_len_; | 335 int io_buf_len_; |
337 | 336 |
338 base::Closure cleanup_callback_; | 337 GetCallback cleanup_callback_; |
339 std::vector<GetCallback> user_callbacks_; | 338 std::vector<GetCallback> user_callbacks_; |
340 CompletionCallback io_callback_; | 339 CompletionCallback io_callback_; |
341 }; | 340 }; |
342 | 341 |
343 DiskBasedCertCache::ReadWorker::ReadWorker( | 342 DiskBasedCertCache::ReadWorker::ReadWorker(disk_cache::Backend* backend, |
344 disk_cache::Backend* backend, | 343 const std::string& key, |
345 const std::string& key, | 344 const GetCallback& cleanup_callback) |
346 const base::Closure& cleanup_callback) | |
347 : backend_(backend), | 345 : backend_(backend), |
348 cert_handle_(NULL), | 346 cert_handle_(NULL), |
349 key_(key), | 347 key_(key), |
350 canceled_(false), | 348 canceled_(false), |
351 entry_(NULL), | 349 entry_(NULL), |
352 state_(STATE_NONE), | 350 state_(STATE_NONE), |
353 io_buf_len_(0), | 351 io_buf_len_(0), |
354 cleanup_callback_(cleanup_callback), | 352 cleanup_callback_(cleanup_callback), |
355 io_callback_( | 353 io_callback_( |
356 base::Bind(&ReadWorker::OnIOComplete, base::Unretained(this))) { | 354 base::Bind(&ReadWorker::OnIOComplete, base::Unretained(this))) { |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
411 | 409 |
412 return rv; | 410 return rv; |
413 } | 411 } |
414 | 412 |
415 int DiskBasedCertCache::ReadWorker::DoOpen() { | 413 int DiskBasedCertCache::ReadWorker::DoOpen() { |
416 state_ = STATE_OPEN_COMPLETE; | 414 state_ = STATE_OPEN_COMPLETE; |
417 return backend_->OpenEntry(key_, &entry_, io_callback_); | 415 return backend_->OpenEntry(key_, &entry_, io_callback_); |
418 } | 416 } |
419 | 417 |
420 int DiskBasedCertCache::ReadWorker::DoOpenComplete(int rv) { | 418 int DiskBasedCertCache::ReadWorker::DoOpenComplete(int rv) { |
421 if (rv < 0) { | 419 if (rv < 0) |
422 state_ = STATE_NONE; | |
423 return rv; | 420 return rv; |
424 } | 421 |
425 state_ = STATE_READ; | 422 state_ = STATE_READ; |
426 return OK; | 423 return OK; |
427 } | 424 } |
428 | 425 |
429 int DiskBasedCertCache::ReadWorker::DoRead() { | 426 int DiskBasedCertCache::ReadWorker::DoRead() { |
430 state_ = STATE_READ_COMPLETE; | 427 state_ = STATE_READ_COMPLETE; |
431 io_buf_len_ = entry_->GetDataSize(0 /* index */); | 428 io_buf_len_ = entry_->GetDataSize(0 /* index */); |
432 buffer_ = new IOBuffer(io_buf_len_); | 429 buffer_ = new IOBuffer(io_buf_len_); |
433 return entry_->ReadData( | 430 return entry_->ReadData( |
434 0 /* index */, 0 /* offset */, buffer_, io_buf_len_, io_callback_); | 431 0 /* index */, 0 /* offset */, buffer_, io_buf_len_, io_callback_); |
435 } | 432 } |
436 | 433 |
437 int DiskBasedCertCache::ReadWorker::DoReadComplete(int rv) { | 434 int DiskBasedCertCache::ReadWorker::DoReadComplete(int rv) { |
438 state_ = STATE_NONE; | |
439 if (rv < io_buf_len_) | 435 if (rv < io_buf_len_) |
440 return ERR_FAILED; | 436 return ERR_FAILED; |
441 | 437 |
442 cert_handle_ = X509Certificate::CreateOSCertHandleFromBytes(buffer_->data(), | 438 cert_handle_ = X509Certificate::CreateOSCertHandleFromBytes(buffer_->data(), |
443 io_buf_len_); | 439 io_buf_len_); |
444 if (!cert_handle_) | 440 if (!cert_handle_) |
445 return ERR_FAILED; | 441 return ERR_FAILED; |
446 | 442 |
447 return OK; | 443 return OK; |
448 } | 444 } |
449 | 445 |
450 void DiskBasedCertCache::ReadWorker::RunCallbacks() { | 446 void DiskBasedCertCache::ReadWorker::RunCallbacks() { |
451 for (std::vector<GetCallback>::const_iterator it = user_callbacks_.begin(); | 447 for (std::vector<GetCallback>::const_iterator it = user_callbacks_.begin(); |
452 it != user_callbacks_.end(); | 448 it != user_callbacks_.end(); |
453 ++it) { | 449 ++it) { |
454 it->Run(cert_handle_); | 450 it->Run(cert_handle_); |
455 } | 451 } |
456 user_callbacks_.clear(); | 452 user_callbacks_.clear(); |
457 } | 453 } |
458 | 454 |
459 void DiskBasedCertCache::ReadWorker::Finish(int rv) { | 455 void DiskBasedCertCache::ReadWorker::Finish(int rv) { |
460 cleanup_callback_.Run(); | 456 cleanup_callback_.Run(cert_handle_); |
461 cleanup_callback_.Reset(); | 457 cleanup_callback_.Reset(); |
462 RunCallbacks(); | 458 RunCallbacks(); |
463 delete this; | 459 delete this; |
464 } | 460 } |
465 | 461 |
466 void DiskBasedCertCache::ReadWorker::Cancel() { | 462 void DiskBasedCertCache::ReadWorker::Cancel() { |
467 canceled_ = true; | 463 canceled_ = true; |
468 } | 464 } |
469 | 465 |
470 DiskBasedCertCache::ReadWorker::~ReadWorker() { | 466 DiskBasedCertCache::ReadWorker::~ReadWorker() { |
wtc
2014/07/02 20:51:50
Define the destructor right after the constructor.
| |
471 if (entry_) | 467 if (entry_) |
472 entry_->Close(); | 468 entry_->Close(); |
473 if (cert_handle_) | 469 if (cert_handle_) |
474 X509Certificate::FreeOSCertHandle(cert_handle_); | 470 X509Certificate::FreeOSCertHandle(cert_handle_); |
475 } | 471 } |
476 | 472 |
477 DiskBasedCertCache::DiskBasedCertCache(disk_cache::Backend* backend) | 473 DiskBasedCertCache::DiskBasedCertCache(disk_cache::Backend* backend) |
478 : backend_(backend), weak_factory_(this) { | 474 : backend_(backend), |
475 mru_cert_cache_(kMemoryCacheMaxSize), | |
476 mem_cache_hits_(0), | |
477 mem_cache_misses_(0), | |
478 weak_factory_(this) { | |
479 DCHECK(backend_); | 479 DCHECK(backend_); |
480 } | 480 } |
481 | 481 |
482 DiskBasedCertCache::~DiskBasedCertCache() { | 482 DiskBasedCertCache::~DiskBasedCertCache() { |
483 for (WriteWorkerMap::iterator it = write_worker_map_.begin(); | 483 for (WriteWorkerMap::iterator it = write_worker_map_.begin(); |
484 it != write_worker_map_.end(); | 484 it != write_worker_map_.end(); |
485 ++it) { | 485 ++it) { |
486 it->second->Cancel(); | 486 it->second->Cancel(); |
487 } | 487 } |
488 for (ReadWorkerMap::iterator it = read_worker_map_.begin(); | 488 for (ReadWorkerMap::iterator it = read_worker_map_.begin(); |
489 it != read_worker_map_.end(); | 489 it != read_worker_map_.end(); |
490 ++it) { | 490 ++it) { |
491 it->second->Cancel(); | 491 it->second->Cancel(); |
492 } | 492 } |
493 } | 493 } |
494 | 494 |
495 void DiskBasedCertCache::Get(const std::string& key, const GetCallback& cb) { | 495 void DiskBasedCertCache::Get(const std::string& key, const GetCallback& cb) { |
496 DCHECK(!key.empty()); | 496 DCHECK(!key.empty()); |
497 | 497 |
498 // If the handle is already in the MRU cache, just return that (via callback). | |
499 // Note, this will also bring the cert_handle to the front | |
wtc
2014/07/02 20:51:50
Nit: this line break is too short.
| |
500 // of the recency list in the MRU cache. | |
501 MRUCertCache::iterator mru_it = mru_cert_cache_.Get(key); | |
502 if (mru_it != mru_cert_cache_.end()) { | |
503 ++mem_cache_hits_; | |
504 cb.Run(mru_it->second); | |
505 return; | |
rvargas (doing something else)
2014/07/02 22:14:38
You may want to tell the backend about this: backe
| |
506 } | |
507 ++mem_cache_misses_; | |
508 | |
498 ReadWorkerMap::iterator it = read_worker_map_.find(key); | 509 ReadWorkerMap::iterator it = read_worker_map_.find(key); |
499 | 510 |
500 if (it == read_worker_map_.end()) { | 511 if (it == read_worker_map_.end()) { |
501 ReadWorker* worker = | 512 ReadWorker* worker = |
502 new ReadWorker(backend_, | 513 new ReadWorker(backend_, |
503 key, | 514 key, |
504 base::Bind(&DiskBasedCertCache::FinishedReadOperation, | 515 base::Bind(&DiskBasedCertCache::FinishedReadOperation, |
505 weak_factory_.GetWeakPtr(), | 516 weak_factory_.GetWeakPtr(), |
506 key)); | 517 key)); |
507 read_worker_map_[key] = worker; | 518 read_worker_map_[key] = worker; |
508 worker->AddCallback(cb); | 519 worker->AddCallback(cb); |
509 worker->Start(); | 520 worker->Start(); |
510 } else { | 521 } else { |
511 it->second->AddCallback(cb); | 522 it->second->AddCallback(cb); |
512 } | 523 } |
513 } | 524 } |
514 | 525 |
515 void DiskBasedCertCache::Set(const X509Certificate::OSCertHandle cert_handle, | 526 void DiskBasedCertCache::Set(const X509Certificate::OSCertHandle cert_handle, |
516 const SetCallback& cb) { | 527 const SetCallback& cb) { |
517 DCHECK(!cb.is_null()); | 528 DCHECK(!cb.is_null()); |
518 DCHECK(cert_handle); | 529 DCHECK(cert_handle); |
519 std::string key = GetCacheKeyToCert(cert_handle); | 530 std::string key = GetCacheKeyToCert(cert_handle); |
520 | 531 |
532 // If |cert_handle| already exists in the MRU cache, there is no need to | |
533 // re-write it to the disk cache. This will also bring |cert_handle| | |
534 // to the front of the recency list in the MRU cache. | |
535 if (mru_cert_cache_.Get(key) != mru_cert_cache_.end()) { | |
536 ++mem_cache_hits_; | |
537 cb.Run(key); | |
538 return; | |
539 } | |
540 ++mem_cache_misses_; | |
wtc
2014/07/02 20:51:50
IMPORTANT: We should think about whether Set() sho
Ryan Sleevi
2014/07/02 21:49:58
Yes.
I think we only want Get to be satisfied by
| |
541 | |
521 WriteWorkerMap::iterator it = write_worker_map_.find(key); | 542 WriteWorkerMap::iterator it = write_worker_map_.find(key); |
522 | 543 |
523 if (it == write_worker_map_.end()) { | 544 if (it == write_worker_map_.end()) { |
524 WriteWorker* worker = | 545 WriteWorker* worker = |
525 new WriteWorker(backend_, | 546 new WriteWorker(backend_, |
526 key, | 547 key, |
527 cert_handle, | 548 cert_handle, |
528 base::Bind(&DiskBasedCertCache::FinishedWriteOperation, | 549 base::Bind(&DiskBasedCertCache::FinishedWriteOperation, |
529 weak_factory_.GetWeakPtr(), | 550 weak_factory_.GetWeakPtr(), |
530 key)); | 551 key, |
552 cert_handle)); | |
531 write_worker_map_[key] = worker; | 553 write_worker_map_[key] = worker; |
532 worker->AddCallback(cb); | 554 worker->AddCallback(cb); |
533 worker->Start(); | 555 worker->Start(); |
534 } else { | 556 } else { |
535 it->second->AddCallback(cb); | 557 it->second->AddCallback(cb); |
536 } | 558 } |
537 } | 559 } |
538 | 560 |
539 void DiskBasedCertCache::FinishedWriteOperation(const std::string& key) { | 561 void DiskBasedCertCache::FinishedWriteOperation( |
562 const std::string& key, | |
563 X509Certificate::OSCertHandle cert_handle) { | |
540 write_worker_map_.erase(key); | 564 write_worker_map_.erase(key); |
565 if (key != std::string()) | |
wtc
2014/07/02 20:51:49
Test !key.empty().
| |
566 mru_cert_cache_.Put(key, X509Certificate::DupOSCertHandle(cert_handle)); | |
541 } | 567 } |
542 | 568 |
543 void DiskBasedCertCache::FinishedReadOperation(const std::string& key) { | 569 void DiskBasedCertCache::FinishedReadOperation( |
570 const std::string& key, | |
571 X509Certificate::OSCertHandle cert_handle) { | |
572 if (cert_handle) | |
573 mru_cert_cache_.Put(key, X509Certificate::DupOSCertHandle(cert_handle)); | |
544 read_worker_map_.erase(key); | 574 read_worker_map_.erase(key); |
545 } | 575 } |
546 | 576 |
547 } // namespace net | 577 } // namespace net |
OLD | NEW |