blob: 5e1fdcac30899823f4a0263e4a4d4f5d8c8193e3 [file] [log] [blame]
Henrik Boströmda3a1da2016-04-15 17:55:21 +02001/*
2 * Copyright 2016 The WebRTC project authors. All Rights Reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#include "rtc_base/rtc_certificate_generator.h"
Henrik Boströmda3a1da2016-04-15 17:55:21 +020012
Yves Gerey988cc082018-10-23 12:03:01 +020013#include <time.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020014
Henrik Boströmda3a1da2016-04-15 17:55:21 +020015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
Yves Gerey988cc082018-10-23 12:03:01 +020017#include <utility>
Henrik Boströmda3a1da2016-04-15 17:55:21 +020018
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020019#include "rtc_base/checks.h"
Yves Gerey988cc082018-10-23 12:03:01 +020020#include "rtc_base/location.h"
Steve Anton10542f22019-01-11 09:11:00 -080021#include "rtc_base/message_handler.h"
Steve Anton10542f22019-01-11 09:11:00 -080022#include "rtc_base/ref_counted_object.h"
23#include "rtc_base/ssl_identity.h"
Henrik Boströmda3a1da2016-04-15 17:55:21 +020024
25namespace rtc {
26
27namespace {
28
29// A certificates' subject and issuer name.
30const char kIdentityName[] = "WebRTC";
agrieve26622d32017-08-08 10:48:15 -070031const uint64_t kYearInSeconds = 365 * 24 * 60 * 60;
Henrik Boströmda3a1da2016-04-15 17:55:21 +020032
Henrik Boströmda3a1da2016-04-15 17:55:21 +020033} // namespace
34
35// static
Yves Gerey665174f2018-06-19 15:03:05 +020036scoped_refptr<RTCCertificate> RTCCertificateGenerator::GenerateCertificate(
Henrik Boströmda3a1da2016-04-15 17:55:21 +020037 const KeyParams& key_params,
Danil Chapovalov0a1d1892018-06-21 11:48:25 +020038 const absl::optional<uint64_t>& expires_ms) {
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070039 if (!key_params.IsValid()) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020040 return nullptr;
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070041 }
42
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010043 std::unique_ptr<SSLIdentity> identity;
Henrik Boströmda3a1da2016-04-15 17:55:21 +020044 if (!expires_ms) {
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010045 identity = SSLIdentity::Create(kIdentityName, key_params);
Henrik Boströmda3a1da2016-04-15 17:55:21 +020046 } else {
47 uint64_t expires_s = *expires_ms / 1000;
48 // Limit the expiration time to something reasonable (a year). This was
49 // somewhat arbitrarily chosen. It also ensures that the value is not too
50 // large for the unspecified |time_t|.
51 expires_s = std::min(expires_s, kYearInSeconds);
52 // TODO(torbjorng): Stop using |time_t|, its type is unspecified. It it safe
53 // to assume it can hold up to a year's worth of seconds (and more), but
Taylor Brandstetter165c6182020-12-10 16:23:03 -080054 // |SSLIdentity::Create| should stop relying on |time_t|.
Henrik Boströmda3a1da2016-04-15 17:55:21 +020055 // See bugs.webrtc.org/5720.
56 time_t cert_lifetime_s = static_cast<time_t>(expires_s);
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010057 identity = SSLIdentity::Create(kIdentityName, key_params, cert_lifetime_s);
Henrik Boströmda3a1da2016-04-15 17:55:21 +020058 }
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070059 if (!identity) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020060 return nullptr;
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070061 }
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010062 return RTCCertificate::Create(std::move(identity));
Henrik Boströmda3a1da2016-04-15 17:55:21 +020063}
64
Yves Gerey665174f2018-06-19 15:03:05 +020065RTCCertificateGenerator::RTCCertificateGenerator(Thread* signaling_thread,
66 Thread* worker_thread)
67 : signaling_thread_(signaling_thread), worker_thread_(worker_thread) {
Henrik Boströmda3a1da2016-04-15 17:55:21 +020068 RTC_DCHECK(signaling_thread_);
69 RTC_DCHECK(worker_thread_);
70}
71
72void RTCCertificateGenerator::GenerateCertificateAsync(
73 const KeyParams& key_params,
Danil Chapovalov0a1d1892018-06-21 11:48:25 +020074 const absl::optional<uint64_t>& expires_ms,
Henrik Boströmda3a1da2016-04-15 17:55:21 +020075 const scoped_refptr<RTCCertificateGeneratorCallback>& callback) {
76 RTC_DCHECK(signaling_thread_->IsCurrent());
77 RTC_DCHECK(callback);
78
79 // Create a new |RTCCertificateGenerationTask| for this generation request. It
80 // is reference counted and referenced by the message data, ensuring it lives
81 // until the task has completed (independent of |RTCCertificateGenerator|).
Tomas Gunnarsson295570e2020-09-12 15:47:36 +020082 worker_thread_->PostTask(RTC_FROM_HERE, [key_params, expires_ms,
83 signaling_thread = signaling_thread_,
84 cb = callback]() {
85 scoped_refptr<RTCCertificate> certificate =
86 RTCCertificateGenerator::GenerateCertificate(key_params, expires_ms);
87 signaling_thread->PostTask(
88 RTC_FROM_HERE, [cert = std::move(certificate), cb = std::move(cb)]() {
89 cert ? cb->OnSuccess(cert) : cb->OnFailure();
90 });
91 });
Henrik Boströmda3a1da2016-04-15 17:55:21 +020092}
93
94} // namespace rtc