Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1110)

Side by Side Diff: net/ssl/openssl_client_key_store.cc

Issue 474663002: Remove manual CRYPTO_add calls. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/ssl/openssl_client_key_store.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/openssl_client_key_store.h" 5 #include "net/ssl/openssl_client_key_store.h"
6 6
7 #include <openssl/evp.h> 7 #include <openssl/evp.h>
8 #include <openssl/x509.h> 8 #include <openssl/x509.h>
9 9
10 #include "base/memory/scoped_ptr.h" 10 #include "base/memory/scoped_ptr.h"
11 #include "base/memory/singleton.h" 11 #include "base/memory/singleton.h"
12 #include "net/cert/x509_certificate.h" 12 #include "net/cert/x509_certificate.h"
13 13
14 namespace net { 14 namespace net {
15 15
16 namespace { 16 namespace {
17 17
18 // Increment the reference count of a given EVP_PKEY. This function
19 // is similar to EVP_PKEY_dup which is not available from the OpenSSL
20 // version used by Chromium at the moment. Its name is distinct to
21 // avoid compiler warnings about ambiguous function calls at caller
22 // sites.
23 EVP_PKEY* CopyEVP_PKEY(EVP_PKEY* key) {
24 if (key)
25 CRYPTO_add(&key->references, 1, CRYPTO_LOCK_EVP_PKEY);
26 return key;
27 }
28
29 // Return the EVP_PKEY holding the public key of a given certificate. 18 // Return the EVP_PKEY holding the public key of a given certificate.
30 // |cert| is a certificate. 19 // |cert| is a certificate.
31 // Returns a scoped EVP_PKEY for it. 20 // Returns a scoped EVP_PKEY for it.
32 crypto::ScopedEVP_PKEY GetOpenSSLPublicKey(const X509Certificate* cert) { 21 crypto::ScopedEVP_PKEY GetOpenSSLPublicKey(const X509Certificate* cert) {
33 // X509_PUBKEY_get() increments the reference count of its result. 22 // X509_PUBKEY_get() increments the reference count of its result.
34 // Unlike X509_get_X509_PUBKEY() which simply returns a direct pointer. 23 // Unlike X509_get_X509_PUBKEY() which simply returns a direct pointer.
35 EVP_PKEY* pkey = 24 EVP_PKEY* pkey =
36 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle())); 25 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle()));
37 if (!pkey) 26 if (!pkey)
38 LOG(ERROR) << "Can't extract private key from certificate!"; 27 LOG(ERROR) << "Can't extract private key from certificate!";
39 return crypto::ScopedEVP_PKEY(pkey); 28 return crypto::ScopedEVP_PKEY(pkey);
40 } 29 }
41 30
42 } // namespace 31 } // namespace
43 32
44 OpenSSLClientKeyStore::OpenSSLClientKeyStore() { 33 OpenSSLClientKeyStore::OpenSSLClientKeyStore() {
45 } 34 }
46 35
47 OpenSSLClientKeyStore::~OpenSSLClientKeyStore() { 36 OpenSSLClientKeyStore::~OpenSSLClientKeyStore() {
48 } 37 }
49 38
50 OpenSSLClientKeyStore::KeyPair::KeyPair(EVP_PKEY* pub_key, 39 OpenSSLClientKeyStore::KeyPair::KeyPair(EVP_PKEY* pub_key,
51 EVP_PKEY* priv_key) { 40 EVP_PKEY* priv_key)
52 public_key = CopyEVP_PKEY(pub_key); 41 : public_key(EVP_PKEY_dup(pub_key)),
53 private_key = CopyEVP_PKEY(priv_key); 42 private_key(EVP_PKEY_dup(priv_key)) {
54 } 43 }
55 44
56 OpenSSLClientKeyStore::KeyPair::~KeyPair() { 45 OpenSSLClientKeyStore::KeyPair::~KeyPair() {
57 EVP_PKEY_free(public_key);
58 EVP_PKEY_free(private_key);
59 } 46 }
60 47
61 OpenSSLClientKeyStore::KeyPair::KeyPair(const KeyPair& other) { 48 OpenSSLClientKeyStore::KeyPair::KeyPair(const KeyPair& other)
62 public_key = CopyEVP_PKEY(other.public_key); 49 : public_key(EVP_PKEY_dup(other.public_key.get())),
63 private_key = CopyEVP_PKEY(other.private_key); 50 private_key(EVP_PKEY_dup(other.private_key.get())) {
64 } 51 }
65 52
66 void OpenSSLClientKeyStore::KeyPair::operator=(const KeyPair& other) { 53 void OpenSSLClientKeyStore::KeyPair::operator=(const KeyPair& other) {
67 EVP_PKEY* old_public_key = public_key; 54 public_key.reset(EVP_PKEY_dup(other.public_key.get()));
68 EVP_PKEY* old_private_key = private_key; 55 private_key.reset(EVP_PKEY_dup(other.private_key.get()));
Ryan Sleevi 2014/08/13 22:49:38 Are you sure this is safe w/r/t the scoped_ptr iss
davidben 2014/08/13 23:41:39 Mrrrf. That's obnoxious. I guess whether it's fine
69 public_key = CopyEVP_PKEY(other.public_key);
70 private_key = CopyEVP_PKEY(other.private_key);
71 EVP_PKEY_free(old_private_key);
72 EVP_PKEY_free(old_public_key);
73 } 56 }
74 57
75 int OpenSSLClientKeyStore::FindKeyPairIndex(EVP_PKEY* public_key) { 58 int OpenSSLClientKeyStore::FindKeyPairIndex(EVP_PKEY* public_key) {
76 if (!public_key) 59 if (!public_key)
77 return -1; 60 return -1;
78 for (size_t n = 0; n < pairs_.size(); ++n) { 61 for (size_t n = 0; n < pairs_.size(); ++n) {
79 if (EVP_PKEY_cmp(pairs_[n].public_key, public_key) == 1) 62 if (EVP_PKEY_cmp(pairs_[n].public_key.get(), public_key) == 1)
80 return static_cast<int>(n); 63 return static_cast<int>(n);
81 } 64 }
82 return -1; 65 return -1;
83 } 66 }
84 67
85 void OpenSSLClientKeyStore::AddKeyPair(EVP_PKEY* pub_key, 68 void OpenSSLClientKeyStore::AddKeyPair(EVP_PKEY* pub_key,
86 EVP_PKEY* private_key) { 69 EVP_PKEY* private_key) {
87 int index = FindKeyPairIndex(pub_key); 70 int index = FindKeyPairIndex(pub_key);
88 if (index < 0) 71 if (index < 0)
89 pairs_.push_back(KeyPair(pub_key, private_key)); 72 pairs_.push_back(KeyPair(pub_key, private_key));
(...skipping 23 matching lines...) Expand all
113 return crypto::ScopedEVP_PKEY(); 96 return crypto::ScopedEVP_PKEY();
114 97
115 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 98 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert));
116 if (!pub_key.get()) 99 if (!pub_key.get())
117 return crypto::ScopedEVP_PKEY(); 100 return crypto::ScopedEVP_PKEY();
118 101
119 int index = FindKeyPairIndex(pub_key.get()); 102 int index = FindKeyPairIndex(pub_key.get());
120 if (index < 0) 103 if (index < 0)
121 return crypto::ScopedEVP_PKEY(); 104 return crypto::ScopedEVP_PKEY();
122 105
123 return crypto::ScopedEVP_PKEY(CopyEVP_PKEY(pairs_[index].private_key)); 106 return crypto::ScopedEVP_PKEY(EVP_PKEY_dup(pairs_[index].private_key.get()));
124 } 107 }
125 108
126 void OpenSSLClientKeyStore::Flush() { 109 void OpenSSLClientKeyStore::Flush() {
127 pairs_.clear(); 110 pairs_.clear();
128 } 111 }
129 112
130 OpenSSLClientKeyStore* OpenSSLClientKeyStore::GetInstance() { 113 OpenSSLClientKeyStore* OpenSSLClientKeyStore::GetInstance() {
131 return Singleton<OpenSSLClientKeyStore>::get(); 114 return Singleton<OpenSSLClientKeyStore>::get();
132 } 115 }
133 116
134 } // namespace net 117 } // namespace net
135 118
136 119
OLDNEW
« no previous file with comments | « net/ssl/openssl_client_key_store.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698