| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ |
| #define NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ |
| |
| #include <map> |
| #include <string> |
| #include <vector> |
| |
| #include "base/basictypes.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/memory/weak_ptr.h" |
| #include "base/threading/non_thread_safe.h" |
| #include "base/time.h" |
| #include "net/base/completion_callback.h" |
| #include "net/base/net_export.h" |
| #include "net/base/server_bound_cert_store.h" |
| #include "net/base/ssl_client_cert_type.h" |
| |
| namespace base { |
| class TaskRunner; |
| } |
| |
| namespace net { |
| |
| class ServerBoundCertServiceJob; |
| class ServerBoundCertServiceWorker; |
| |
| // A class for creating and fetching server bound certs. |
| // Inherits from NonThreadSafe in order to use the function |
| // |CalledOnValidThread|. |
| class NET_EXPORT ServerBoundCertService |
| : NON_EXPORTED_BASE(public base::NonThreadSafe) { |
| public: |
| // Opaque type used to cancel a request. |
| typedef void* RequestHandle; |
| |
| // Password used on EncryptedPrivateKeyInfo data stored in EC private_key |
| // values. (This is not used to provide any security, but to workaround NSS |
| // being unable to import unencrypted PrivateKeyInfo for EC keys.) |
| static const char kEPKIPassword[]; |
| |
| // This object owns |server_bound_cert_store|. |task_runner| will |
| // be used to post certificate generation worker tasks. The tasks are |
| // safe for use with WorkerPool and SequencedWorkerPool::CONTINUE_ON_SHUTDOWN. |
| ServerBoundCertService( |
| ServerBoundCertStore* server_bound_cert_store, |
| const scoped_refptr<base::TaskRunner>& task_runner); |
| |
| ~ServerBoundCertService(); |
| |
| // Returns the domain to be used for |host|. The domain is the |
| // "registry controlled domain", or the "ETLD + 1" where one exists, or |
| // the origin otherwise. |
| static std::string GetDomainForHost(const std::string& host); |
| |
| // Tests whether the system time is within the supported range for |
| // certificate generation. This value is cached when ServerBoundCertService |
| // is created, so if the system time is changed by a huge amount, this may no |
| // longer hold. |
| bool IsSystemTimeValid() const { return is_system_time_valid_; } |
| |
| // Fetches the domain bound cert for the specified origin of the specified |
| // type if one exists and creates one otherwise. Returns OK if successful or |
| // an error code upon failure. |
| // |
| // |requested_types| is a list of the TLS ClientCertificateTypes the site will |
| // accept, ordered from most preferred to least preferred. Types we don't |
| // support will be ignored. See ssl_client_cert_type.h. |
| // |
| // On successful completion, |private_key| stores a DER-encoded |
| // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate, and |
| // |type| specifies the type of certificate that was returned. |
| // |
| // |callback| must not be null. ERR_IO_PENDING is returned if the operation |
| // could not be completed immediately, in which case the result code will |
| // be passed to the callback when available. |
| // |
| // |*out_req| will be filled with a handle to the async request. This handle |
| // is not valid after the request has completed. |
| int GetDomainBoundCert( |
| const std::string& origin, |
| const std::vector<uint8>& requested_types, |
| SSLClientCertType* type, |
| std::string* private_key, |
| std::string* cert, |
| const CompletionCallback& callback, |
| RequestHandle* out_req); |
| |
| // Cancels the specified request. |req| is the handle returned by |
| // GetDomainBoundCert(). After a request is canceled, its completion |
| // callback will not be called. |
| void CancelRequest(RequestHandle req); |
| |
| // Returns the backing ServerBoundCertStore. |
| ServerBoundCertStore* GetCertStore(); |
| |
| // Public only for unit testing. |
| int cert_count(); |
| uint64 requests() const { return requests_; } |
| uint64 cert_store_hits() const { return cert_store_hits_; } |
| uint64 inflight_joins() const { return inflight_joins_; } |
| |
| private: |
| void HandleResult(const std::string& server_identifier, |
| int error, |
| scoped_ptr<ServerBoundCertStore::ServerBoundCert> cert); |
| |
| scoped_ptr<ServerBoundCertStore> server_bound_cert_store_; |
| scoped_refptr<base::TaskRunner> task_runner_; |
| |
| // inflight_ maps from a server to an active generation which is taking |
| // place. |
| std::map<std::string, ServerBoundCertServiceJob*> inflight_; |
| base::WeakPtrFactory<ServerBoundCertService> weak_ptr_factory_; |
| |
| uint64 requests_; |
| uint64 cert_store_hits_; |
| uint64 inflight_joins_; |
| |
| bool is_system_time_valid_; |
| |
| DISALLOW_COPY_AND_ASSIGN(ServerBoundCertService); |
| }; |
| |
| } // namespace net |
| |
| #endif // NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ |