Index: net/ssl/ssl_client_session_cache_openssl.cc |
diff --git a/net/ssl/ssl_client_session_cache_openssl.cc b/net/ssl/ssl_client_session_cache_openssl.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..a278ea0a343593c7616c04637b5fa3549dede562 |
--- /dev/null |
+++ b/net/ssl/ssl_client_session_cache_openssl.cc |
@@ -0,0 +1,108 @@ |
+// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/ssl/ssl_client_session_cache_openssl.h" |
+ |
+#include <utility> |
+ |
+#include "base/logging.h" |
+#include "base/time/clock.h" |
+#include "base/time/default_clock.h" |
+#include "net/ssl/scoped_openssl_types.h" |
+ |
+namespace net { |
+ |
+struct SSLClientSessionCacheOpenSSL::CacheEntry { |
+ ScopedSSL_SESSION session; |
+ // The time at which this entry was created. |
+ base::Time creation_time; |
+}; |
+ |
+SSLClientSessionCacheOpenSSL::SSLClientSessionCacheOpenSSL(const Config& config) |
+ : clock_(new base::DefaultClock), |
+ config_(config), |
+ cache_(config.max_entries), |
+ lookups_since_flush_(0) { |
+} |
+ |
+SSLClientSessionCacheOpenSSL::~SSLClientSessionCacheOpenSSL() { |
+ // TODO(davidben): The session cache is currently a singleton, so it is |
+ // destroyed on a different thread than the one it's created on. When |
+ // https://crbug.com/458365 is fixed, this will no longer be an issue. |
+ thread_checker_.DetachFromThread(); |
+ |
+ Flush(); |
+} |
+ |
+size_t SSLClientSessionCacheOpenSSL::size() const { |
+ return cache_.size(); |
+} |
+ |
+SSL_SESSION* SSLClientSessionCacheOpenSSL::Lookup( |
+ const std::string& cache_key) { |
+ DCHECK(thread_checker_.CalledOnValidThread()); |
+ |
+ // Expire stale sessions. |
+ lookups_since_flush_++; |
+ if (lookups_since_flush_ >= config_.expiration_check_count) { |
+ lookups_since_flush_ = 0; |
+ FlushExpiredSessions(); |
+ } |
+ |
+ CacheEntryMap::iterator iter = cache_.Get(cache_key); |
+ if (iter == cache_.end()) |
+ return nullptr; |
+ if (IsExpired(iter->second, clock_->Now())) { |
+ cache_.Erase(iter); |
+ return nullptr; |
+ } |
+ return iter->second->session.get(); |
+} |
+ |
+void SSLClientSessionCacheOpenSSL::Insert(const std::string& cache_key, |
+ SSL_SESSION* session) { |
+ DCHECK(thread_checker_.CalledOnValidThread()); |
+ |
+ // Make a new entry. |
+ CacheEntry* entry = new CacheEntry; |
+ entry->session.reset(SSL_SESSION_up_ref(session)); |
+ entry->creation_time = clock_->Now(); |
+ |
+ // Takes ownership. |
+ cache_.Put(cache_key, entry); |
+} |
+ |
+void SSLClientSessionCacheOpenSSL::Flush() { |
+ DCHECK(thread_checker_.CalledOnValidThread()); |
+ |
+ cache_.Clear(); |
+} |
+ |
+void SSLClientSessionCacheOpenSSL::SetClockForTesting( |
+ scoped_ptr<base::Clock> clock) { |
+ DCHECK(thread_checker_.CalledOnValidThread()); |
+ |
+ clock_ = clock.Pass(); |
+} |
+ |
+bool SSLClientSessionCacheOpenSSL::IsExpired( |
+ SSLClientSessionCacheOpenSSL::CacheEntry* entry, |
+ base::Time now) { |
Ryan Sleevi
2015/04/02 20:00:14
const-ref
davidben
2015/04/03 00:37:11
Done.
|
+ return now < entry->creation_time || |
+ entry->creation_time + config_.timeout < now; |
+} |
+ |
+void SSLClientSessionCacheOpenSSL::FlushExpiredSessions() { |
+ base::Time now = clock_->Now(); |
+ CacheEntryMap::iterator iter = cache_.begin(); |
+ while (iter != cache_.end()) { |
+ if (IsExpired(iter->second, now)) { |
+ iter = cache_.Erase(iter); |
+ } else { |
+ ++iter; |
+ } |
+ } |
+} |
+ |
+} // namespace net |