blob: e0b6b3258e0a42466b00283d38b5aad715bed11e [file] [log] [blame]
Henrik Boström41b3a382015-08-20 12:15:54 +02001/*
2 * Copyright 2015 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#include "rtc_base/rtc_certificate.h"
Henrik Boström41b3a382015-08-20 12:15:54 +020012
Jonas Olssona4d87372019-07-05 19:08:33 +020013#include <memory>
14
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020015#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080016#include "rtc_base/ssl_certificate.h"
17#include "rtc_base/ssl_identity.h"
18#include "rtc_base/time_utils.h"
Henrik Boström41b3a382015-08-20 12:15:54 +020019
20namespace rtc {
21
22scoped_refptr<RTCCertificate> RTCCertificate::Create(
jbauch555604a2016-04-26 03:13:22 -070023 std::unique_ptr<SSLIdentity> identity) {
Niels Möller95129102022-01-13 11:00:05 +010024 // Explicit new to access proteced constructor.
25 return rtc::scoped_refptr<RTCCertificate>(
26 new RTCCertificate(identity.release()));
Henrik Boström41b3a382015-08-20 12:15:54 +020027}
28
Yves Gerey665174f2018-06-19 15:03:05 +020029RTCCertificate::RTCCertificate(SSLIdentity* identity) : identity_(identity) {
henrikg91d6ede2015-09-17 00:24:34 -070030 RTC_DCHECK(identity_);
Henrik Boström41b3a382015-08-20 12:15:54 +020031}
32
Tommi86ee89f2021-04-20 16:58:01 +020033RTCCertificate::~RTCCertificate() = default;
Henrik Boström41b3a382015-08-20 12:15:54 +020034
hbos3980d462015-12-09 05:26:49 -080035uint64_t RTCCertificate::Expires() const {
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070036 int64_t expires = GetSSLCertificate().CertificateExpirationTime();
hbos3980d462015-12-09 05:26:49 -080037 if (expires != -1)
38 return static_cast<uint64_t>(expires) * kNumMillisecsPerSec;
39 // If the expiration time could not be retrieved return an expired timestamp.
40 return 0; // = 1970-01-01
Henrik Boström41b3a382015-08-20 12:15:54 +020041}
42
hbos3980d462015-12-09 05:26:49 -080043bool RTCCertificate::HasExpired(uint64_t now) const {
44 return Expires() <= now;
Henrik Boström41b3a382015-08-20 12:15:54 +020045}
46
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070047const SSLCertificate& RTCCertificate::GetSSLCertificate() const {
48 return identity_->certificate();
49}
50
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070051const SSLCertChain& RTCCertificate::GetSSLCertificateChain() const {
Taylor Brandstetterc3928662018-02-23 13:04:51 -080052 return identity_->cert_chain();
53}
54
hbos6b470a92016-04-28 05:14:21 -070055RTCCertificatePEM RTCCertificate::ToPEM() const {
56 return RTCCertificatePEM(identity_->PrivateKeyToPEMString(),
Benjamin Wright6c6c9df2018-10-25 01:16:26 -070057 GetSSLCertificate().ToPEMString());
hbos6b470a92016-04-28 05:14:21 -070058}
59
60scoped_refptr<RTCCertificate> RTCCertificate::FromPEM(
61 const RTCCertificatePEM& pem) {
Yves Gerey665174f2018-06-19 15:03:05 +020062 std::unique_ptr<SSLIdentity> identity(
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010063 SSLIdentity::CreateFromPEMStrings(pem.private_key(), pem.certificate()));
jbromanb9eaeba2016-10-20 10:27:21 -070064 if (!identity)
65 return nullptr;
Niels Möller95129102022-01-13 11:00:05 +010066 return RTCCertificate::Create(std::move(identity));
hbos6b470a92016-04-28 05:14:21 -070067}
68
69bool RTCCertificate::operator==(const RTCCertificate& certificate) const {
70 return *this->identity_ == *certificate.identity_;
71}
72
73bool RTCCertificate::operator!=(const RTCCertificate& certificate) const {
74 return !(*this == certificate);
75}
76
Henrik Boström41b3a382015-08-20 12:15:54 +020077} // namespace rtc