Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(338)

Side by Side Diff: third_party/grpc/src/core/security/secure_endpoint.c

Issue 1932353002: Initial checkin of gRPC to third_party/ Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 /*
2 *
3 * Copyright 2015-2016, Google Inc.
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34 #include "src/core/security/secure_endpoint.h"
35 #include "src/core/support/string.h"
36 #include <grpc/support/alloc.h>
37 #include <grpc/support/log.h>
38 #include <grpc/support/slice_buffer.h>
39 #include <grpc/support/slice.h>
40 #include <grpc/support/sync.h>
41 #include "src/core/tsi/transport_security_interface.h"
42 #include "src/core/debug/trace.h"
43
44 #define STAGING_BUFFER_SIZE 8192
45
46 typedef struct {
47 grpc_endpoint base;
48 grpc_endpoint *wrapped_ep;
49 struct tsi_frame_protector *protector;
50 gpr_mu protector_mu;
51 /* saved upper level callbacks and user_data. */
52 grpc_closure *read_cb;
53 grpc_closure *write_cb;
54 grpc_closure on_read;
55 gpr_slice_buffer *read_buffer;
56 gpr_slice_buffer source_buffer;
57 /* saved handshaker leftover data to unprotect. */
58 gpr_slice_buffer leftover_bytes;
59 /* buffers for read and write */
60 gpr_slice read_staging_buffer;
61
62 gpr_slice write_staging_buffer;
63 gpr_slice_buffer output_buffer;
64
65 gpr_refcount ref;
66 } secure_endpoint;
67
68 int grpc_trace_secure_endpoint = 0;
69
70 static void destroy(grpc_exec_ctx *exec_ctx, secure_endpoint *secure_ep) {
71 secure_endpoint *ep = secure_ep;
72 grpc_endpoint_destroy(exec_ctx, ep->wrapped_ep);
73 tsi_frame_protector_destroy(ep->protector);
74 gpr_slice_buffer_destroy(&ep->leftover_bytes);
75 gpr_slice_unref(ep->read_staging_buffer);
76 gpr_slice_unref(ep->write_staging_buffer);
77 gpr_slice_buffer_destroy(&ep->output_buffer);
78 gpr_slice_buffer_destroy(&ep->source_buffer);
79 gpr_mu_destroy(&ep->protector_mu);
80 gpr_free(ep);
81 }
82
83 /*#define GRPC_SECURE_ENDPOINT_REFCOUNT_DEBUG*/
84 #ifdef GRPC_SECURE_ENDPOINT_REFCOUNT_DEBUG
85 #define SECURE_ENDPOINT_UNREF(exec_ctx, ep, reason) \
86 secure_endpoint_unref((exec_ctx), (ep), (reason), __FILE__, __LINE__)
87 #define SECURE_ENDPOINT_REF(ep, reason) \
88 secure_endpoint_ref((ep), (reason), __FILE__, __LINE__)
89 static void secure_endpoint_unref(secure_endpoint *ep,
90 grpc_closure_list *closure_list,
91 const char *reason, const char *file,
92 int line) {
93 gpr_log(file, line, GPR_LOG_SEVERITY_DEBUG, "SECENDP unref %p : %s %d -> %d",
94 ep, reason, ep->ref.count, ep->ref.count - 1);
95 if (gpr_unref(&ep->ref)) {
96 destroy(exec_ctx, ep);
97 }
98 }
99
100 static void secure_endpoint_ref(secure_endpoint *ep, const char *reason,
101 const char *file, int line) {
102 gpr_log(file, line, GPR_LOG_SEVERITY_DEBUG, "SECENDP ref %p : %s %d -> %d",
103 ep, reason, ep->ref.count, ep->ref.count + 1);
104 gpr_ref(&ep->ref);
105 }
106 #else
107 #define SECURE_ENDPOINT_UNREF(exec_ctx, ep, reason) \
108 secure_endpoint_unref((exec_ctx), (ep))
109 #define SECURE_ENDPOINT_REF(ep, reason) secure_endpoint_ref((ep))
110 static void secure_endpoint_unref(grpc_exec_ctx *exec_ctx,
111 secure_endpoint *ep) {
112 if (gpr_unref(&ep->ref)) {
113 destroy(exec_ctx, ep);
114 }
115 }
116
117 static void secure_endpoint_ref(secure_endpoint *ep) { gpr_ref(&ep->ref); }
118 #endif
119
120 static void flush_read_staging_buffer(secure_endpoint *ep, uint8_t **cur,
121 uint8_t **end) {
122 gpr_slice_buffer_add(ep->read_buffer, ep->read_staging_buffer);
123 ep->read_staging_buffer = gpr_slice_malloc(STAGING_BUFFER_SIZE);
124 *cur = GPR_SLICE_START_PTR(ep->read_staging_buffer);
125 *end = GPR_SLICE_END_PTR(ep->read_staging_buffer);
126 }
127
128 static void call_read_cb(grpc_exec_ctx *exec_ctx, secure_endpoint *ep,
129 bool success) {
130 if (grpc_trace_secure_endpoint) {
131 size_t i;
132 for (i = 0; i < ep->read_buffer->count; i++) {
133 char *data = gpr_dump_slice(ep->read_buffer->slices[i],
134 GPR_DUMP_HEX | GPR_DUMP_ASCII);
135 gpr_log(GPR_DEBUG, "READ %p: %s", ep, data);
136 gpr_free(data);
137 }
138 }
139 ep->read_buffer = NULL;
140 grpc_exec_ctx_enqueue(exec_ctx, ep->read_cb, success, NULL);
141 SECURE_ENDPOINT_UNREF(exec_ctx, ep, "read");
142 }
143
144 static void on_read(grpc_exec_ctx *exec_ctx, void *user_data, bool success) {
145 unsigned i;
146 uint8_t keep_looping = 0;
147 tsi_result result = TSI_OK;
148 secure_endpoint *ep = (secure_endpoint *)user_data;
149 uint8_t *cur = GPR_SLICE_START_PTR(ep->read_staging_buffer);
150 uint8_t *end = GPR_SLICE_END_PTR(ep->read_staging_buffer);
151
152 if (!success) {
153 gpr_slice_buffer_reset_and_unref(ep->read_buffer);
154 call_read_cb(exec_ctx, ep, 0);
155 return;
156 }
157
158 /* TODO(yangg) check error, maybe bail out early */
159 for (i = 0; i < ep->source_buffer.count; i++) {
160 gpr_slice encrypted = ep->source_buffer.slices[i];
161 uint8_t *message_bytes = GPR_SLICE_START_PTR(encrypted);
162 size_t message_size = GPR_SLICE_LENGTH(encrypted);
163
164 while (message_size > 0 || keep_looping) {
165 size_t unprotected_buffer_size_written = (size_t)(end - cur);
166 size_t processed_message_size = message_size;
167 gpr_mu_lock(&ep->protector_mu);
168 result = tsi_frame_protector_unprotect(ep->protector, message_bytes,
169 &processed_message_size, cur,
170 &unprotected_buffer_size_written);
171 gpr_mu_unlock(&ep->protector_mu);
172 if (result != TSI_OK) {
173 gpr_log(GPR_ERROR, "Decryption error: %s",
174 tsi_result_to_string(result));
175 break;
176 }
177 message_bytes += processed_message_size;
178 message_size -= processed_message_size;
179 cur += unprotected_buffer_size_written;
180
181 if (cur == end) {
182 flush_read_staging_buffer(ep, &cur, &end);
183 /* Force to enter the loop again to extract buffered bytes in protector.
184 The bytes could be buffered because of running out of staging_buffer.
185 If this happens at the end of all slices, doing another unprotect
186 avoids leaving data in the protector. */
187 keep_looping = 1;
188 } else if (unprotected_buffer_size_written > 0) {
189 keep_looping = 1;
190 } else {
191 keep_looping = 0;
192 }
193 }
194 if (result != TSI_OK) break;
195 }
196
197 if (cur != GPR_SLICE_START_PTR(ep->read_staging_buffer)) {
198 gpr_slice_buffer_add(
199 ep->read_buffer,
200 gpr_slice_split_head(
201 &ep->read_staging_buffer,
202 (size_t)(cur - GPR_SLICE_START_PTR(ep->read_staging_buffer))));
203 }
204
205 /* TODO(yangg) experiment with moving this block after read_cb to see if it
206 helps latency */
207 gpr_slice_buffer_reset_and_unref(&ep->source_buffer);
208
209 if (result != TSI_OK) {
210 gpr_slice_buffer_reset_and_unref(ep->read_buffer);
211 call_read_cb(exec_ctx, ep, 0);
212 return;
213 }
214
215 call_read_cb(exec_ctx, ep, 1);
216 }
217
218 static void endpoint_read(grpc_exec_ctx *exec_ctx, grpc_endpoint *secure_ep,
219 gpr_slice_buffer *slices, grpc_closure *cb) {
220 secure_endpoint *ep = (secure_endpoint *)secure_ep;
221 ep->read_cb = cb;
222 ep->read_buffer = slices;
223 gpr_slice_buffer_reset_and_unref(ep->read_buffer);
224
225 SECURE_ENDPOINT_REF(ep, "read");
226 if (ep->leftover_bytes.count) {
227 gpr_slice_buffer_swap(&ep->leftover_bytes, &ep->source_buffer);
228 GPR_ASSERT(ep->leftover_bytes.count == 0);
229 on_read(exec_ctx, ep, 1);
230 return;
231 }
232
233 grpc_endpoint_read(exec_ctx, ep->wrapped_ep, &ep->source_buffer,
234 &ep->on_read);
235 }
236
237 static void flush_write_staging_buffer(secure_endpoint *ep, uint8_t **cur,
238 uint8_t **end) {
239 gpr_slice_buffer_add(&ep->output_buffer, ep->write_staging_buffer);
240 ep->write_staging_buffer = gpr_slice_malloc(STAGING_BUFFER_SIZE);
241 *cur = GPR_SLICE_START_PTR(ep->write_staging_buffer);
242 *end = GPR_SLICE_END_PTR(ep->write_staging_buffer);
243 }
244
245 static void endpoint_write(grpc_exec_ctx *exec_ctx, grpc_endpoint *secure_ep,
246 gpr_slice_buffer *slices, grpc_closure *cb) {
247 unsigned i;
248 tsi_result result = TSI_OK;
249 secure_endpoint *ep = (secure_endpoint *)secure_ep;
250 uint8_t *cur = GPR_SLICE_START_PTR(ep->write_staging_buffer);
251 uint8_t *end = GPR_SLICE_END_PTR(ep->write_staging_buffer);
252
253 gpr_slice_buffer_reset_and_unref(&ep->output_buffer);
254
255 if (grpc_trace_secure_endpoint) {
256 for (i = 0; i < slices->count; i++) {
257 char *data =
258 gpr_dump_slice(slices->slices[i], GPR_DUMP_HEX | GPR_DUMP_ASCII);
259 gpr_log(GPR_DEBUG, "WRITE %p: %s", ep, data);
260 gpr_free(data);
261 }
262 }
263
264 for (i = 0; i < slices->count; i++) {
265 gpr_slice plain = slices->slices[i];
266 uint8_t *message_bytes = GPR_SLICE_START_PTR(plain);
267 size_t message_size = GPR_SLICE_LENGTH(plain);
268 while (message_size > 0) {
269 size_t protected_buffer_size_to_send = (size_t)(end - cur);
270 size_t processed_message_size = message_size;
271 gpr_mu_lock(&ep->protector_mu);
272 result = tsi_frame_protector_protect(ep->protector, message_bytes,
273 &processed_message_size, cur,
274 &protected_buffer_size_to_send);
275 gpr_mu_unlock(&ep->protector_mu);
276 if (result != TSI_OK) {
277 gpr_log(GPR_ERROR, "Encryption error: %s",
278 tsi_result_to_string(result));
279 break;
280 }
281 message_bytes += processed_message_size;
282 message_size -= processed_message_size;
283 cur += protected_buffer_size_to_send;
284
285 if (cur == end) {
286 flush_write_staging_buffer(ep, &cur, &end);
287 }
288 }
289 if (result != TSI_OK) break;
290 }
291 if (result == TSI_OK) {
292 size_t still_pending_size;
293 do {
294 size_t protected_buffer_size_to_send = (size_t)(end - cur);
295 gpr_mu_lock(&ep->protector_mu);
296 result = tsi_frame_protector_protect_flush(ep->protector, cur,
297 &protected_buffer_size_to_send,
298 &still_pending_size);
299 gpr_mu_unlock(&ep->protector_mu);
300 if (result != TSI_OK) break;
301 cur += protected_buffer_size_to_send;
302 if (cur == end) {
303 flush_write_staging_buffer(ep, &cur, &end);
304 }
305 } while (still_pending_size > 0);
306 if (cur != GPR_SLICE_START_PTR(ep->write_staging_buffer)) {
307 gpr_slice_buffer_add(
308 &ep->output_buffer,
309 gpr_slice_split_head(
310 &ep->write_staging_buffer,
311 (size_t)(cur - GPR_SLICE_START_PTR(ep->write_staging_buffer))));
312 }
313 }
314
315 if (result != TSI_OK) {
316 /* TODO(yangg) do different things according to the error type? */
317 gpr_slice_buffer_reset_and_unref(&ep->output_buffer);
318 grpc_exec_ctx_enqueue(exec_ctx, cb, false, NULL);
319 return;
320 }
321
322 grpc_endpoint_write(exec_ctx, ep->wrapped_ep, &ep->output_buffer, cb);
323 }
324
325 static void endpoint_shutdown(grpc_exec_ctx *exec_ctx,
326 grpc_endpoint *secure_ep) {
327 secure_endpoint *ep = (secure_endpoint *)secure_ep;
328 grpc_endpoint_shutdown(exec_ctx, ep->wrapped_ep);
329 }
330
331 static void endpoint_destroy(grpc_exec_ctx *exec_ctx,
332 grpc_endpoint *secure_ep) {
333 secure_endpoint *ep = (secure_endpoint *)secure_ep;
334 SECURE_ENDPOINT_UNREF(exec_ctx, ep, "destroy");
335 }
336
337 static void endpoint_add_to_pollset(grpc_exec_ctx *exec_ctx,
338 grpc_endpoint *secure_ep,
339 grpc_pollset *pollset) {
340 secure_endpoint *ep = (secure_endpoint *)secure_ep;
341 grpc_endpoint_add_to_pollset(exec_ctx, ep->wrapped_ep, pollset);
342 }
343
344 static void endpoint_add_to_pollset_set(grpc_exec_ctx *exec_ctx,
345 grpc_endpoint *secure_ep,
346 grpc_pollset_set *pollset_set) {
347 secure_endpoint *ep = (secure_endpoint *)secure_ep;
348 grpc_endpoint_add_to_pollset_set(exec_ctx, ep->wrapped_ep, pollset_set);
349 }
350
351 static char *endpoint_get_peer(grpc_endpoint *secure_ep) {
352 secure_endpoint *ep = (secure_endpoint *)secure_ep;
353 return grpc_endpoint_get_peer(ep->wrapped_ep);
354 }
355
356 static const grpc_endpoint_vtable vtable = {
357 endpoint_read, endpoint_write, endpoint_add_to_pollset,
358 endpoint_add_to_pollset_set, endpoint_shutdown, endpoint_destroy,
359 endpoint_get_peer};
360
361 grpc_endpoint *grpc_secure_endpoint_create(
362 struct tsi_frame_protector *protector, grpc_endpoint *transport,
363 gpr_slice *leftover_slices, size_t leftover_nslices) {
364 size_t i;
365 secure_endpoint *ep = (secure_endpoint *)gpr_malloc(sizeof(secure_endpoint));
366 ep->base.vtable = &vtable;
367 ep->wrapped_ep = transport;
368 ep->protector = protector;
369 gpr_slice_buffer_init(&ep->leftover_bytes);
370 for (i = 0; i < leftover_nslices; i++) {
371 gpr_slice_buffer_add(&ep->leftover_bytes,
372 gpr_slice_ref(leftover_slices[i]));
373 }
374 ep->write_staging_buffer = gpr_slice_malloc(STAGING_BUFFER_SIZE);
375 ep->read_staging_buffer = gpr_slice_malloc(STAGING_BUFFER_SIZE);
376 gpr_slice_buffer_init(&ep->output_buffer);
377 gpr_slice_buffer_init(&ep->source_buffer);
378 ep->read_buffer = NULL;
379 grpc_closure_init(&ep->on_read, on_read, ep);
380 gpr_mu_init(&ep->protector_mu);
381 gpr_ref_init(&ep->ref, 1);
382 return &ep->base;
383 }
OLDNEW
« no previous file with comments | « third_party/grpc/src/core/security/secure_endpoint.h ('k') | third_party/grpc/src/core/security/security_connector.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698