blob: 78d1ec12b7902891e4c8e26f80dbcf7b1b561311 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11// Handling of certificates and keypairs for SSLStreamAdapter's peer mode.
12
Steve Anton10542f22019-01-11 09:11:00 -080013#ifndef RTC_BASE_SSL_IDENTITY_H_
14#define RTC_BASE_SSL_IDENTITY_H_
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015
Yves Gerey988cc082018-10-23 12:03:01 +020016#include <stdint.h>
Yves Gerey2e00abc2018-10-05 15:39:24 +020017#include <ctime>
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010018#include <memory>
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020019#include <string>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000020
Mirko Bonadei35214fc2019-09-23 14:54:28 +020021#include "rtc_base/system/rtc_export.h"
22
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020023namespace rtc {
24
Yves Gerey988cc082018-10-23 12:03:01 +020025class SSLCertChain;
26class SSLCertificate;
27
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020028// KT_LAST is intended for vector declarations and loops over all key types;
29// it does not represent any key type in itself.
30// KT_DEFAULT is used as the default KeyType for KeyParams.
31enum KeyType { KT_RSA, KT_ECDSA, KT_LAST, KT_DEFAULT = KT_ECDSA };
32
33static const int kRsaDefaultModSize = 1024;
34static const int kRsaDefaultExponent = 0x10001; // = 2^16+1 = 65537
35static const int kRsaMinModSize = 1024;
36static const int kRsaMaxModSize = 8192;
37
38// Certificate default validity lifetime.
39static const int kDefaultCertificateLifetimeInSeconds =
40 60 * 60 * 24 * 30; // 30 days
41// Certificate validity window.
42// This is to compensate for slightly incorrect system clocks.
43static const int kCertificateWindowInSeconds = -60 * 60 * 24;
44
45struct RSAParams {
46 unsigned int mod_size;
47 unsigned int pub_exp;
48};
49
50enum ECCurve { EC_NIST_P256, /* EC_FANCY, */ EC_LAST };
51
Mirko Bonadei35214fc2019-09-23 14:54:28 +020052class RTC_EXPORT KeyParams {
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020053 public:
54 // Generate a KeyParams object from a simple KeyType, using default params.
55 explicit KeyParams(KeyType key_type = KT_DEFAULT);
56
57 // Generate a a KeyParams for RSA with explicit parameters.
58 static KeyParams RSA(int mod_size = kRsaDefaultModSize,
59 int pub_exp = kRsaDefaultExponent);
60
61 // Generate a a KeyParams for ECDSA specifying the curve.
62 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
63
64 // Check validity of a KeyParams object. Since the factory functions have
65 // no way of returning errors, this function can be called after creation
66 // to make sure the parameters are OK.
67 bool IsValid() const;
68
69 RSAParams rsa_params() const;
70
71 ECCurve ec_curve() const;
72
73 KeyType type() const { return type_; }
74
75 private:
76 KeyType type_;
77 union {
78 RSAParams rsa;
79 ECCurve curve;
80 } params_;
81};
82
83// TODO(hbos): Remove once rtc::KeyType (to be modified) and
84// blink::WebRTCKeyType (to be landed) match. By using this function in Chromium
85// appropriately we can change KeyType enum -> class without breaking Chromium.
86KeyType IntKeyTypeFamilyToKeyType(int key_type_family);
87
Artem Titov96e3b992021-07-26 16:03:14 +020088// Parameters for generating a certificate. If `common_name` is non-empty, it
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020089// will be used for the certificate's subject and issuer name, otherwise a
90// random string will be used.
91struct SSLIdentityParams {
92 std::string common_name;
93 time_t not_before; // Absolute time since epoch in seconds.
94 time_t not_after; // Absolute time since epoch in seconds.
95 KeyParams key_params;
96};
97
98// Our identity in an SSL negotiation: a keypair and certificate (both
99// with the same public key).
100// This too is pretty much immutable once created.
Mirko Bonadei35214fc2019-09-23 14:54:28 +0200101class RTC_EXPORT SSLIdentity {
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200102 public:
103 // Generates an identity (keypair and self-signed certificate). If
Artem Titov96e3b992021-07-26 16:03:14 +0200104 // `common_name` is non-empty, it will be used for the certificate's subject
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200105 // and issuer name, otherwise a random string will be used. The key type and
Artem Titov96e3b992021-07-26 16:03:14 +0200106 // parameters are defined in `key_param`. The certificate's lifetime in
107 // seconds from the current time is defined in `certificate_lifetime`; it
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200108 // should be a non-negative number.
109 // Returns null on failure.
110 // Caller is responsible for freeing the returned object.
Harald Alvestrand8515d5a2020-03-20 22:51:32 +0100111 static std::unique_ptr<SSLIdentity> Create(const std::string& common_name,
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200112 const KeyParams& key_param,
113 time_t certificate_lifetime);
Harald Alvestrand8515d5a2020-03-20 22:51:32 +0100114 static std::unique_ptr<SSLIdentity> Create(const std::string& common_name,
115 const KeyParams& key_param);
116 static std::unique_ptr<SSLIdentity> Create(const std::string& common_name,
117 KeyType key_type);
Taylor Brandstetter4479a822020-04-14 16:36:29 -0700118
119 // Allows fine-grained control over expiration time.
Harald Alvestrand8515d5a2020-03-20 22:51:32 +0100120 static std::unique_ptr<SSLIdentity> CreateForTest(
121 const SSLIdentityParams& params);
122
123 // Construct an identity from a private key and a certificate.
124 static std::unique_ptr<SSLIdentity> CreateFromPEMStrings(
125 const std::string& private_key,
126 const std::string& certificate);
127
128 // Construct an identity from a private key and a certificate chain.
129 static std::unique_ptr<SSLIdentity> CreateFromPEMChainStrings(
130 const std::string& private_key,
131 const std::string& certificate_chain);
132
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200133 virtual ~SSLIdentity() {}
134
135 // Returns a new SSLIdentity object instance wrapping the same
136 // identity information.
Harald Alvestrand8515d5a2020-03-20 22:51:32 +0100137 std::unique_ptr<SSLIdentity> Clone() const { return CloneInternal(); }
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200138
Taylor Brandstetterc3928662018-02-23 13:04:51 -0800139 // Returns a temporary reference to the end-entity (leaf) certificate.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200140 virtual const SSLCertificate& certificate() const = 0;
Taylor Brandstetterc3928662018-02-23 13:04:51 -0800141 // Returns a temporary reference to the entire certificate chain.
142 virtual const SSLCertChain& cert_chain() const = 0;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200143 virtual std::string PrivateKeyToPEMString() const = 0;
144 virtual std::string PublicKeyToPEMString() const = 0;
145
146 // Helpers for parsing converting between PEM and DER format.
147 static bool PemToDer(const std::string& pem_type,
148 const std::string& pem_string,
149 std::string* der);
150 static std::string DerToPem(const std::string& pem_type,
151 const unsigned char* data,
152 size_t length);
Harald Alvestrand8515d5a2020-03-20 22:51:32 +0100153
154 protected:
155 virtual std::unique_ptr<SSLIdentity> CloneInternal() const = 0;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200156};
157
158bool operator==(const SSLIdentity& a, const SSLIdentity& b);
159bool operator!=(const SSLIdentity& a, const SSLIdentity& b);
160
161// Convert from ASN1 time as restricted by RFC 5280 to seconds from 1970-01-01
162// 00.00 ("epoch"). If the ASN1 time cannot be read, return -1. The data at
Artem Titov96e3b992021-07-26 16:03:14 +0200163// `s` is not 0-terminated; its char count is defined by `length`.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200164int64_t ASN1TimeToSec(const unsigned char* s, size_t length, bool long_format);
165
166extern const char kPemTypeCertificate[];
167extern const char kPemTypeRsaPrivateKey[];
168extern const char kPemTypeEcPrivateKey[];
169
170} // namespace rtc
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000171
Steve Anton10542f22019-01-11 09:11:00 -0800172#endif // RTC_BASE_SSL_IDENTITY_H_