blob: e9137f4abb075c842bf3a71b5ad0429795577993 [file] [log] [blame]
Henrik Boström41b3a382015-08-20 12:15:54 +02001/*
2 * Copyright 2015 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#include "rtc_base/rtc_certificate.h"
Henrik Boström41b3a382015-08-20 12:15:54 +020012
Jonas Olssona4d87372019-07-05 19:08:33 +020013#include <memory>
14
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020015#include "rtc_base/checks.h"
Niels Möller95129102022-01-13 11:00:05 +010016#include "rtc_base/ref_counted_object.h"
Steve Anton10542f22019-01-11 09:11:00 -080017#include "rtc_base/ssl_certificate.h"
18#include "rtc_base/ssl_identity.h"
19#include "rtc_base/time_utils.h"
Henrik Boström41b3a382015-08-20 12:15:54 +020020
21namespace rtc {
22
23scoped_refptr<RTCCertificate> RTCCertificate::Create(
jbauch555604a2016-04-26 03:13:22 -070024 std::unique_ptr<SSLIdentity> identity) {
Niels Möller95129102022-01-13 11:00:05 +010025 // Explicit new to access proteced constructor.
26 return rtc::scoped_refptr<RTCCertificate>(
27 new RTCCertificate(identity.release()));
Henrik Boström41b3a382015-08-20 12:15:54 +020028}
29
Yves Gerey665174f2018-06-19 15:03:05 +020030RTCCertificate::RTCCertificate(SSLIdentity* identity) : identity_(identity) {
henrikg91d6ede2015-09-17 00:24:34 -070031 RTC_DCHECK(identity_);
Henrik Boström41b3a382015-08-20 12:15:54 +020032}
33
Tommi86ee89f2021-04-20 16:58:01 +020034RTCCertificate::~RTCCertificate() = default;
Henrik Boström41b3a382015-08-20 12:15:54 +020035
hbos3980d462015-12-09 05:26:49 -080036uint64_t RTCCertificate::Expires() const {
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070037 int64_t expires = GetSSLCertificate().CertificateExpirationTime();
hbos3980d462015-12-09 05:26:49 -080038 if (expires != -1)
39 return static_cast<uint64_t>(expires) * kNumMillisecsPerSec;
40 // If the expiration time could not be retrieved return an expired timestamp.
41 return 0; // = 1970-01-01
Henrik Boström41b3a382015-08-20 12:15:54 +020042}
43
hbos3980d462015-12-09 05:26:49 -080044bool RTCCertificate::HasExpired(uint64_t now) const {
45 return Expires() <= now;
Henrik Boström41b3a382015-08-20 12:15:54 +020046}
47
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070048const SSLCertificate& RTCCertificate::GetSSLCertificate() const {
49 return identity_->certificate();
50}
51
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070052const SSLCertChain& RTCCertificate::GetSSLCertificateChain() const {
Taylor Brandstetterc3928662018-02-23 13:04:51 -080053 return identity_->cert_chain();
54}
55
hbos6b470a92016-04-28 05:14:21 -070056RTCCertificatePEM RTCCertificate::ToPEM() const {
57 return RTCCertificatePEM(identity_->PrivateKeyToPEMString(),
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070058 GetSSLCertificate().ToPEMString());
hbos6b470a92016-04-28 05:14:21 -070059}
60
61scoped_refptr<RTCCertificate> RTCCertificate::FromPEM(
62 const RTCCertificatePEM& pem) {
Yves Gerey665174f2018-06-19 15:03:05 +020063 std::unique_ptr<SSLIdentity> identity(
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010064 SSLIdentity::CreateFromPEMStrings(pem.private_key(), pem.certificate()));
jbromanb9eaeba2016-10-20 10:27:21 -070065 if (!identity)
66 return nullptr;
Niels Möller95129102022-01-13 11:00:05 +010067 return RTCCertificate::Create(std::move(identity));
hbos6b470a92016-04-28 05:14:21 -070068}
69
70bool RTCCertificate::operator==(const RTCCertificate& certificate) const {
71 return *this->identity_ == *certificate.identity_;
72}
73
74bool RTCCertificate::operator!=(const RTCCertificate& certificate) const {
75 return !(*this == certificate);
76}
77
Henrik Boström41b3a382015-08-20 12:15:54 +020078} // namespace rtc