| // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #ifndef NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ | 
 | #define NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ | 
 |  | 
 | #include <map> | 
 | #include <string> | 
 | #include <vector> | 
 |  | 
 | #include "base/basictypes.h" | 
 | #include "base/memory/scoped_ptr.h" | 
 | #include "base/memory/weak_ptr.h" | 
 | #include "base/threading/non_thread_safe.h" | 
 | #include "base/time.h" | 
 | #include "net/base/completion_callback.h" | 
 | #include "net/base/net_export.h" | 
 | #include "net/base/server_bound_cert_store.h" | 
 | #include "net/base/ssl_client_cert_type.h" | 
 |  | 
 | namespace base { | 
 | class TaskRunner; | 
 | } | 
 |  | 
 | namespace net { | 
 |  | 
 | class ServerBoundCertServiceJob; | 
 | class ServerBoundCertServiceWorker; | 
 |  | 
 | // A class for creating and fetching server bound certs. | 
 | // Inherits from NonThreadSafe in order to use the function | 
 | // |CalledOnValidThread|. | 
 | class NET_EXPORT ServerBoundCertService | 
 |     : NON_EXPORTED_BASE(public base::NonThreadSafe) { | 
 |  public: | 
 |   // Opaque type used to cancel a request. | 
 |   typedef void* RequestHandle; | 
 |  | 
 |   // Password used on EncryptedPrivateKeyInfo data stored in EC private_key | 
 |   // values.  (This is not used to provide any security, but to workaround NSS | 
 |   // being unable to import unencrypted PrivateKeyInfo for EC keys.) | 
 |   static const char kEPKIPassword[]; | 
 |  | 
 |   // This object owns |server_bound_cert_store|.  |task_runner| will | 
 |   // be used to post certificate generation worker tasks.  The tasks are | 
 |   // safe for use with WorkerPool and SequencedWorkerPool::CONTINUE_ON_SHUTDOWN. | 
 |   ServerBoundCertService( | 
 |       ServerBoundCertStore* server_bound_cert_store, | 
 |       const scoped_refptr<base::TaskRunner>& task_runner); | 
 |  | 
 |   ~ServerBoundCertService(); | 
 |  | 
 |   // Returns the domain to be used for |host|.  The domain is the | 
 |   // "registry controlled domain", or the "ETLD + 1" where one exists, or | 
 |   // the origin otherwise. | 
 |   static std::string GetDomainForHost(const std::string& host); | 
 |  | 
 |   // Tests whether the system time is within the supported range for | 
 |   // certificate generation.  This value is cached when ServerBoundCertService | 
 |   // is created, so if the system time is changed by a huge amount, this may no | 
 |   // longer hold. | 
 |   bool IsSystemTimeValid() const { return is_system_time_valid_; } | 
 |  | 
 |   // Fetches the domain bound cert for the specified origin of the specified | 
 |   // type if one exists and creates one otherwise. Returns OK if successful or | 
 |   // an error code upon failure. | 
 |   // | 
 |   // |requested_types| is a list of the TLS ClientCertificateTypes the site will | 
 |   // accept, ordered from most preferred to least preferred.  Types we don't | 
 |   // support will be ignored. See ssl_client_cert_type.h. | 
 |   // | 
 |   // On successful completion, |private_key| stores a DER-encoded | 
 |   // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate, and | 
 |   // |type| specifies the type of certificate that was returned. | 
 |   // | 
 |   // |callback| must not be null. ERR_IO_PENDING is returned if the operation | 
 |   // could not be completed immediately, in which case the result code will | 
 |   // be passed to the callback when available. | 
 |   // | 
 |   // |*out_req| will be filled with a handle to the async request. This handle | 
 |   // is not valid after the request has completed. | 
 |   int GetDomainBoundCert( | 
 |       const std::string& origin, | 
 |       const std::vector<uint8>& requested_types, | 
 |       SSLClientCertType* type, | 
 |       std::string* private_key, | 
 |       std::string* cert, | 
 |       const CompletionCallback& callback, | 
 |       RequestHandle* out_req); | 
 |  | 
 |   // Cancels the specified request. |req| is the handle returned by | 
 |   // GetDomainBoundCert(). After a request is canceled, its completion | 
 |   // callback will not be called. | 
 |   void CancelRequest(RequestHandle req); | 
 |  | 
 |   // Returns the backing ServerBoundCertStore. | 
 |   ServerBoundCertStore* GetCertStore(); | 
 |  | 
 |   // Public only for unit testing. | 
 |   int cert_count(); | 
 |   uint64 requests() const { return requests_; } | 
 |   uint64 cert_store_hits() const { return cert_store_hits_; } | 
 |   uint64 inflight_joins() const { return inflight_joins_; } | 
 |  | 
 |  private: | 
 |   void HandleResult(const std::string& server_identifier, | 
 |                     int error, | 
 |                     scoped_ptr<ServerBoundCertStore::ServerBoundCert> cert); | 
 |  | 
 |   scoped_ptr<ServerBoundCertStore> server_bound_cert_store_; | 
 |   scoped_refptr<base::TaskRunner> task_runner_; | 
 |  | 
 |   // inflight_ maps from a server to an active generation which is taking | 
 |   // place. | 
 |   std::map<std::string, ServerBoundCertServiceJob*> inflight_; | 
 |   base::WeakPtrFactory<ServerBoundCertService> weak_ptr_factory_; | 
 |  | 
 |   uint64 requests_; | 
 |   uint64 cert_store_hits_; | 
 |   uint64 inflight_joins_; | 
 |  | 
 |   bool is_system_time_valid_; | 
 |  | 
 |   DISALLOW_COPY_AND_ASSIGN(ServerBoundCertService); | 
 | }; | 
 |  | 
 | }  // namespace net | 
 |  | 
 | #endif  // NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ |