1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
|
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_BASE_CERT_VERIFIER_H_
#define NET_BASE_CERT_VERIFIER_H_
#pragma once
#include <map>
#include <string>
#include "base/basictypes.h"
#include "base/memory/scoped_ptr.h"
#include "base/threading/non_thread_safe.h"
#include "base/time.h"
#include "net/base/cert_database.h"
#include "net/base/cert_verify_result.h"
#include "net/base/completion_callback.h"
#include "net/base/net_export.h"
#include "net/base/x509_cert_types.h"
namespace net {
class CertVerifierJob;
class CertVerifierWorker;
class X509Certificate;
// CachedCertVerifyResult contains the result of a certificate verification.
struct CachedCertVerifyResult {
CachedCertVerifyResult();
~CachedCertVerifyResult();
// Returns true if |current_time| is greater than or equal to |expiry|.
bool HasExpired(base::Time current_time) const;
int error; // The return value of CertVerifier::Verify.
CertVerifyResult result; // The output of CertVerifier::Verify.
// The time at which the certificate verification result expires.
base::Time expiry;
};
// CertVerifier represents a service for verifying certificates.
//
// CertVerifier can handle multiple requests at a time, so when canceling a
// request the RequestHandle that was returned by Verify() needs to be
// given. A simpler alternative for consumers that only have 1 outstanding
// request at a time is to create a SingleRequestCertVerifier wrapper around
// CertVerifier (which will automatically cancel the single request when it
// goes out of scope).
class NET_EXPORT CertVerifier : public base::NonThreadSafe,
public CertDatabase::Observer {
public:
// Opaque type used to cancel a request.
typedef void* RequestHandle;
// CertVerifier must not call base::Time::Now() directly. It must call
// time_service_->Now(). This allows unit tests to mock the current time.
class TimeService {
public:
virtual ~TimeService() {}
virtual base::Time Now() = 0;
};
CertVerifier();
// Used by unit tests to mock the current time. Takes ownership of
// |time_service|.
explicit CertVerifier(TimeService* time_service);
// When the verifier is destroyed, all certificate verifications requests are
// canceled, and their completion callbacks will not be called.
~CertVerifier();
// Verifies the given certificate against the given hostname. Returns OK if
// successful or an error code upon failure.
//
// The |*verify_result| structure, including the |verify_result->cert_status|
// bitmask, is always filled out regardless of the return value. If the
// certificate has multiple errors, the corresponding status flags are set in
// |verify_result->cert_status|, and the error code for the most serious
// error is returned.
//
// |flags| is bitwise OR'd of X509Certificate::VerifyFlags.
// If VERIFY_REV_CHECKING_ENABLED is set in |flags|, certificate revocation
// checking is performed.
//
// If VERIFY_EV_CERT is set in |flags| too, EV certificate verification is
// performed. If |flags| is VERIFY_EV_CERT (that is,
// VERIFY_REV_CHECKING_ENABLED is not set), EV certificate verification will
// not be performed.
//
// |callback| must not be null. ERR_IO_PENDING is returned if the operation
// could not be completed synchronously, in which case the result code will
// be passed to the callback when available.
//
// If |out_req| is non-NULL, then |*out_req| will be filled with a handle to
// the async request. This handle is not valid after the request has
// completed.
int Verify(X509Certificate* cert,
const std::string& hostname,
int flags,
CertVerifyResult* verify_result,
CompletionCallback* callback,
RequestHandle* out_req);
// Cancels the specified request. |req| is the handle returned by Verify().
// After a request is canceled, its completion callback will not be called.
void CancelRequest(RequestHandle req);
// Clears the verification result cache.
void ClearCache();
size_t GetCacheSize() const;
uint64 requests() const { return requests_; }
uint64 cache_hits() const { return cache_hits_; }
uint64 inflight_joins() const { return inflight_joins_; }
private:
friend class CertVerifierWorker; // Calls HandleResult.
// Input parameters of a certificate verification request.
struct RequestParams {
bool operator==(const RequestParams& other) const {
// |flags| is compared before |cert_fingerprint| and |hostname| under
// assumption that integer comparisons are faster than memory and string
// comparisons.
return (flags == other.flags &&
memcmp(cert_fingerprint.data, other.cert_fingerprint.data,
sizeof(cert_fingerprint.data)) == 0 &&
hostname == other.hostname);
}
bool operator<(const RequestParams& other) const {
// |flags| is compared before |cert_fingerprint| and |hostname| under
// assumption that integer comparisons are faster than memory and string
// comparisons.
if (flags != other.flags)
return flags < other.flags;
int rv = memcmp(cert_fingerprint.data, other.cert_fingerprint.data,
sizeof(cert_fingerprint.data));
if (rv != 0)
return rv < 0;
return hostname < other.hostname;
}
SHA1Fingerprint cert_fingerprint;
std::string hostname;
int flags;
};
void HandleResult(X509Certificate* cert,
const std::string& hostname,
int flags,
int error,
const CertVerifyResult& verify_result);
// CertDatabase::Observer methods:
virtual void OnCertTrustChanged(const X509Certificate* cert);
// cache_ maps from a request to a cached result. The cached result may
// have expired and the size of |cache_| must be <= kMaxCacheEntries.
std::map<RequestParams, CachedCertVerifyResult> cache_;
// inflight_ maps from a request to an active verification which is taking
// place.
std::map<RequestParams, CertVerifierJob*> inflight_;
scoped_ptr<TimeService> time_service_;
uint64 requests_;
uint64 cache_hits_;
uint64 inflight_joins_;
DISALLOW_COPY_AND_ASSIGN(CertVerifier);
};
// This class represents the task of verifying a certificate. It wraps
// CertVerifier to verify only a single certificate at a time and cancels this
// request when going out of scope.
class SingleRequestCertVerifier {
public:
// |cert_verifier| must remain valid for the lifetime of |this|.
explicit SingleRequestCertVerifier(CertVerifier* cert_verifier);
// If a completion callback is pending when the verifier is destroyed, the
// certificate verification is canceled, and the completion callback will
// not be called.
~SingleRequestCertVerifier();
// Verifies the given certificate, filling out the |verify_result| object
// upon success. See CertVerifier::Verify() for details.
int Verify(X509Certificate* cert,
const std::string& hostname,
int flags,
CertVerifyResult* verify_result,
CompletionCallback* callback);
private:
// Callback for when the request to |cert_verifier_| completes, so we
// dispatch to the user's callback.
void OnVerifyCompletion(int result);
// The actual certificate verifier that will handle the request.
CertVerifier* const cert_verifier_;
// The current request (if any).
CertVerifier::RequestHandle cur_request_;
CompletionCallback* cur_request_callback_;
// Completion callback for when request to |cert_verifier_| completes.
CompletionCallbackImpl<SingleRequestCertVerifier> callback_;
DISALLOW_COPY_AND_ASSIGN(SingleRequestCertVerifier);
};
} // namespace net
#endif // NET_BASE_CERT_VERIFIER_H_
|