blob: bdd90f209e8d79a6976e5e14c3900eb1c188a3de [file] [log] [blame]
Henrik Boströmda3a1da2016-04-15 17:55:21 +02001/*
2 * Copyright 2016 The WebRTC project authors. All Rights Reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#include "rtc_base/rtc_certificate_generator.h"
Henrik Boströmda3a1da2016-04-15 17:55:21 +020012
Yves Gerey988cc082018-10-23 12:03:01 +020013#include <time.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020014
Henrik Boströmda3a1da2016-04-15 17:55:21 +020015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
Yves Gerey988cc082018-10-23 12:03:01 +020017#include <utility>
Henrik Boströmda3a1da2016-04-15 17:55:21 +020018
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020019#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080020#include "rtc_base/message_handler.h"
Steve Anton10542f22019-01-11 09:11:00 -080021#include "rtc_base/ssl_identity.h"
Henrik Boströmda3a1da2016-04-15 17:55:21 +020022
23namespace rtc {
24
25namespace {
26
27// A certificates' subject and issuer name.
28const char kIdentityName[] = "WebRTC";
agrieve26622d32017-08-08 10:48:15 -070029const uint64_t kYearInSeconds = 365 * 24 * 60 * 60;
Henrik Boströmda3a1da2016-04-15 17:55:21 +020030
Henrik Boströmda3a1da2016-04-15 17:55:21 +020031} // namespace
32
33// static
Yves Gerey665174f2018-06-19 15:03:05 +020034scoped_refptr<RTCCertificate> RTCCertificateGenerator::GenerateCertificate(
Henrik Boströmda3a1da2016-04-15 17:55:21 +020035 const KeyParams& key_params,
Danil Chapovalov0a1d1892018-06-21 11:48:25 +020036 const absl::optional<uint64_t>& expires_ms) {
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070037 if (!key_params.IsValid()) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020038 return nullptr;
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070039 }
40
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010041 std::unique_ptr<SSLIdentity> identity;
Henrik Boströmda3a1da2016-04-15 17:55:21 +020042 if (!expires_ms) {
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010043 identity = SSLIdentity::Create(kIdentityName, key_params);
Henrik Boströmda3a1da2016-04-15 17:55:21 +020044 } else {
45 uint64_t expires_s = *expires_ms / 1000;
46 // Limit the expiration time to something reasonable (a year). This was
47 // somewhat arbitrarily chosen. It also ensures that the value is not too
Artem Titov96e3b992021-07-26 16:03:14 +020048 // large for the unspecified `time_t`.
Henrik Boströmda3a1da2016-04-15 17:55:21 +020049 expires_s = std::min(expires_s, kYearInSeconds);
Artem Titov96e3b992021-07-26 16:03:14 +020050 // TODO(torbjorng): Stop using `time_t`, its type is unspecified. It it safe
Henrik Boströmda3a1da2016-04-15 17:55:21 +020051 // to assume it can hold up to a year's worth of seconds (and more), but
Artem Titovcfea2182021-08-10 01:22:31 +020052 // `SSLIdentity::Create` should stop relying on `time_t`.
Henrik Boströmda3a1da2016-04-15 17:55:21 +020053 // See bugs.webrtc.org/5720.
54 time_t cert_lifetime_s = static_cast<time_t>(expires_s);
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010055 identity = SSLIdentity::Create(kIdentityName, key_params, cert_lifetime_s);
Henrik Boströmda3a1da2016-04-15 17:55:21 +020056 }
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070057 if (!identity) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020058 return nullptr;
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070059 }
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010060 return RTCCertificate::Create(std::move(identity));
Henrik Boströmda3a1da2016-04-15 17:55:21 +020061}
62
Yves Gerey665174f2018-06-19 15:03:05 +020063RTCCertificateGenerator::RTCCertificateGenerator(Thread* signaling_thread,
64 Thread* worker_thread)
65 : signaling_thread_(signaling_thread), worker_thread_(worker_thread) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020066 RTC_DCHECK(signaling_thread_);
67 RTC_DCHECK(worker_thread_);
68}
69
70void RTCCertificateGenerator::GenerateCertificateAsync(
71 const KeyParams& key_params,
Danil Chapovalov0a1d1892018-06-21 11:48:25 +020072 const absl::optional<uint64_t>& expires_ms,
Danil Chapovalovb7da8162022-08-22 16:39:34 +020073 RTCCertificateGenerator::Callback callback) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020074 RTC_DCHECK(signaling_thread_->IsCurrent());
75 RTC_DCHECK(callback);
76
Henrik Boström2deee4b2022-01-20 11:58:05 +010077 worker_thread_->PostTask([key_params, expires_ms,
78 signaling_thread = signaling_thread_,
Danil Chapovalovb7da8162022-08-22 16:39:34 +020079 cb = std::move(callback)]() mutable {
Tomas Gunnarsson295570e2020-09-12 15:47:36 +020080 scoped_refptr<RTCCertificate> certificate =
81 RTCCertificateGenerator::GenerateCertificate(key_params, expires_ms);
82 signaling_thread->PostTask(
Danil Chapovalovb7da8162022-08-22 16:39:34 +020083 [cert = std::move(certificate), cb = std::move(cb)]() mutable {
84 std::move(cb)(std::move(cert));
Tomas Gunnarsson295570e2020-09-12 15:47:36 +020085 });
86 });
Henrik Boströmda3a1da2016-04-15 17:55:21 +020087}
88
89} // namespace rtc