|  | // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #ifndef NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ | 
|  | #define NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ | 
|  |  | 
|  | #include <map> | 
|  | #include <string> | 
|  | #include <vector> | 
|  |  | 
|  | #include "base/basictypes.h" | 
|  | #include "base/memory/scoped_ptr.h" | 
|  | #include "base/memory/weak_ptr.h" | 
|  | #include "base/threading/non_thread_safe.h" | 
|  | #include "base/time.h" | 
|  | #include "net/base/completion_callback.h" | 
|  | #include "net/base/net_export.h" | 
|  | #include "net/base/server_bound_cert_store.h" | 
|  | #include "net/base/ssl_client_cert_type.h" | 
|  |  | 
|  | namespace base { | 
|  | class TaskRunner; | 
|  | } | 
|  |  | 
|  | namespace net { | 
|  |  | 
|  | class ServerBoundCertServiceJob; | 
|  | class ServerBoundCertServiceWorker; | 
|  |  | 
|  | // A class for creating and fetching server bound certs. | 
|  | // Inherits from NonThreadSafe in order to use the function | 
|  | // |CalledOnValidThread|. | 
|  | class NET_EXPORT ServerBoundCertService | 
|  | : NON_EXPORTED_BASE(public base::NonThreadSafe) { | 
|  | public: | 
|  | // Opaque type used to cancel a request. | 
|  | typedef void* RequestHandle; | 
|  |  | 
|  | // Password used on EncryptedPrivateKeyInfo data stored in EC private_key | 
|  | // values.  (This is not used to provide any security, but to workaround NSS | 
|  | // being unable to import unencrypted PrivateKeyInfo for EC keys.) | 
|  | static const char kEPKIPassword[]; | 
|  |  | 
|  | // This object owns |server_bound_cert_store|.  |task_runner| will | 
|  | // be used to post certificate generation worker tasks.  The tasks are | 
|  | // safe for use with WorkerPool and SequencedWorkerPool::CONTINUE_ON_SHUTDOWN. | 
|  | ServerBoundCertService( | 
|  | ServerBoundCertStore* server_bound_cert_store, | 
|  | const scoped_refptr<base::TaskRunner>& task_runner); | 
|  |  | 
|  | ~ServerBoundCertService(); | 
|  |  | 
|  | // Returns the domain to be used for |host|.  The domain is the | 
|  | // "registry controlled domain", or the "ETLD + 1" where one exists, or | 
|  | // the origin otherwise. | 
|  | static std::string GetDomainForHost(const std::string& host); | 
|  |  | 
|  | // Tests whether the system time is within the supported range for | 
|  | // certificate generation.  This value is cached when ServerBoundCertService | 
|  | // is created, so if the system time is changed by a huge amount, this may no | 
|  | // longer hold. | 
|  | bool IsSystemTimeValid() const { return is_system_time_valid_; } | 
|  |  | 
|  | // Fetches the domain bound cert for the specified origin of the specified | 
|  | // type if one exists and creates one otherwise. Returns OK if successful or | 
|  | // an error code upon failure. | 
|  | // | 
|  | // |requested_types| is a list of the TLS ClientCertificateTypes the site will | 
|  | // accept, ordered from most preferred to least preferred.  Types we don't | 
|  | // support will be ignored. See ssl_client_cert_type.h. | 
|  | // | 
|  | // On successful completion, |private_key| stores a DER-encoded | 
|  | // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate, and | 
|  | // |type| specifies the type of certificate that was returned. | 
|  | // | 
|  | // |callback| must not be null. ERR_IO_PENDING is returned if the operation | 
|  | // could not be completed immediately, in which case the result code will | 
|  | // be passed to the callback when available. | 
|  | // | 
|  | // |*out_req| will be filled with a handle to the async request. This handle | 
|  | // is not valid after the request has completed. | 
|  | int GetDomainBoundCert( | 
|  | const std::string& origin, | 
|  | const std::vector<uint8>& requested_types, | 
|  | SSLClientCertType* type, | 
|  | std::string* private_key, | 
|  | std::string* cert, | 
|  | const CompletionCallback& callback, | 
|  | RequestHandle* out_req); | 
|  |  | 
|  | // Cancels the specified request. |req| is the handle returned by | 
|  | // GetDomainBoundCert(). After a request is canceled, its completion | 
|  | // callback will not be called. | 
|  | void CancelRequest(RequestHandle req); | 
|  |  | 
|  | // Returns the backing ServerBoundCertStore. | 
|  | ServerBoundCertStore* GetCertStore(); | 
|  |  | 
|  | // Public only for unit testing. | 
|  | int cert_count(); | 
|  | uint64 requests() const { return requests_; } | 
|  | uint64 cert_store_hits() const { return cert_store_hits_; } | 
|  | uint64 inflight_joins() const { return inflight_joins_; } | 
|  |  | 
|  | private: | 
|  | void HandleResult(const std::string& server_identifier, | 
|  | int error, | 
|  | scoped_ptr<ServerBoundCertStore::ServerBoundCert> cert); | 
|  |  | 
|  | scoped_ptr<ServerBoundCertStore> server_bound_cert_store_; | 
|  | scoped_refptr<base::TaskRunner> task_runner_; | 
|  |  | 
|  | // inflight_ maps from a server to an active generation which is taking | 
|  | // place. | 
|  | std::map<std::string, ServerBoundCertServiceJob*> inflight_; | 
|  | base::WeakPtrFactory<ServerBoundCertService> weak_ptr_factory_; | 
|  |  | 
|  | uint64 requests_; | 
|  | uint64 cert_store_hits_; | 
|  | uint64 inflight_joins_; | 
|  |  | 
|  | bool is_system_time_valid_; | 
|  |  | 
|  | DISALLOW_COPY_AND_ASSIGN(ServerBoundCertService); | 
|  | }; | 
|  |  | 
|  | }  // namespace net | 
|  |  | 
|  | #endif  // NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ |