| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495 |
- // Copyright 2022 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package tls
- import (
- "crypto/x509"
- "runtime"
- "sync"
- "sync/atomic"
- )
- type cacheEntry struct {
- refs atomic.Int64
- cert *x509.Certificate
- }
- // certCache implements an intern table for reference counted x509.Certificates,
- // implemented in a similar fashion to BoringSSL's CRYPTO_BUFFER_POOL. This
- // allows for a single x509.Certificate to be kept in memory and referenced from
- // multiple Conns. Returned references should not be mutated by callers. Certificates
- // are still safe to use after they are removed from the cache.
- //
- // Certificates are returned wrapped in a activeCert struct that should be held by
- // the caller. When references to the activeCert are freed, the number of references
- // to the certificate in the cache is decremented. Once the number of references
- // reaches zero, the entry is evicted from the cache.
- //
- // The main difference between this implementation and CRYPTO_BUFFER_POOL is that
- // CRYPTO_BUFFER_POOL is a more generic structure which supports blobs of data,
- // rather than specific structures. Since we only care about x509.Certificates,
- // certCache is implemented as a specific cache, rather than a generic one.
- //
- // See https://boringssl.googlesource.com/boringssl/+/master/include/openssl/pool.h
- // and https://boringssl.googlesource.com/boringssl/+/master/crypto/pool/pool.c
- // for the BoringSSL reference.
- type certCache struct {
- sync.Map
- }
- var clientCertCache = new(certCache)
- // activeCert is a handle to a certificate held in the cache. Once there are
- // no alive activeCerts for a given certificate, the certificate is removed
- // from the cache by a finalizer.
- type activeCert struct {
- cert *x509.Certificate
- }
- // active increments the number of references to the entry, wraps the
- // certificate in the entry in a activeCert, and sets the finalizer.
- //
- // Note that there is a race between active and the finalizer set on the
- // returned activeCert, triggered if active is called after the ref count is
- // decremented such that refs may be > 0 when evict is called. We consider this
- // safe, since the caller holding an activeCert for an entry that is no longer
- // in the cache is fine, with the only side effect being the memory overhead of
- // there being more than one distinct reference to a certificate alive at once.
- func (cc *certCache) active(e *cacheEntry) *activeCert {
- e.refs.Add(1)
- a := &activeCert{e.cert}
- runtime.SetFinalizer(a, func(_ *activeCert) {
- if e.refs.Add(-1) == 0 {
- cc.evict(e)
- }
- })
- return a
- }
- // evict removes a cacheEntry from the cache.
- func (cc *certCache) evict(e *cacheEntry) {
- cc.Delete(string(e.cert.Raw))
- }
- // newCert returns a x509.Certificate parsed from der. If there is already a copy
- // of the certificate in the cache, a reference to the existing certificate will
- // be returned. Otherwise, a fresh certificate will be added to the cache, and
- // the reference returned. The returned reference should not be mutated.
- func (cc *certCache) newCert(der []byte) (*activeCert, error) {
- if entry, ok := cc.Load(string(der)); ok {
- return cc.active(entry.(*cacheEntry)), nil
- }
- cert, err := x509.ParseCertificate(der)
- if err != nil {
- return nil, err
- }
- entry := &cacheEntry{cert: cert}
- if entry, loaded := cc.LoadOrStore(string(der), entry); loaded {
- return cc.active(entry.(*cacheEntry)), nil
- }
- return cc.active(entry), nil
- }
|