Index: third_party/grpc/src/core/httpcli/httpcli_security_connector.c |
diff --git a/third_party/grpc/src/core/httpcli/httpcli_security_connector.c b/third_party/grpc/src/core/httpcli/httpcli_security_connector.c |
new file mode 100644 |
index 0000000000000000000000000000000000000000..156961a377a5abced49e4d7e8dead5b8b1a857af |
--- /dev/null |
+++ b/third_party/grpc/src/core/httpcli/httpcli_security_connector.c |
@@ -0,0 +1,188 @@ |
+/* |
+ * |
+ * Copyright 2015-2016, Google Inc. |
+ * All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ * |
+ */ |
+ |
+#include "src/core/httpcli/httpcli.h" |
+ |
+#include <string.h> |
+ |
+#include "src/core/security/handshake.h" |
+#include "src/core/support/string.h" |
+#include <grpc/support/alloc.h> |
+#include <grpc/support/log.h> |
+#include <grpc/support/string_util.h> |
+#include "src/core/tsi/ssl_transport_security.h" |
+ |
+typedef struct { |
+ grpc_channel_security_connector base; |
+ tsi_ssl_handshaker_factory *handshaker_factory; |
+ char *secure_peer_name; |
+} grpc_httpcli_ssl_channel_security_connector; |
+ |
+static void httpcli_ssl_destroy(grpc_security_connector *sc) { |
+ grpc_httpcli_ssl_channel_security_connector *c = |
+ (grpc_httpcli_ssl_channel_security_connector *)sc; |
+ if (c->handshaker_factory != NULL) { |
+ tsi_ssl_handshaker_factory_destroy(c->handshaker_factory); |
+ } |
+ if (c->secure_peer_name != NULL) gpr_free(c->secure_peer_name); |
+ gpr_free(sc); |
+} |
+ |
+static void httpcli_ssl_do_handshake(grpc_exec_ctx *exec_ctx, |
+ grpc_channel_security_connector *sc, |
+ grpc_endpoint *nonsecure_endpoint, |
+ grpc_security_handshake_done_cb cb, |
+ void *user_data) { |
+ grpc_httpcli_ssl_channel_security_connector *c = |
+ (grpc_httpcli_ssl_channel_security_connector *)sc; |
+ tsi_result result = TSI_OK; |
+ tsi_handshaker *handshaker; |
+ if (c->handshaker_factory == NULL) { |
+ cb(exec_ctx, user_data, GRPC_SECURITY_ERROR, NULL, NULL); |
+ return; |
+ } |
+ result = tsi_ssl_handshaker_factory_create_handshaker( |
+ c->handshaker_factory, c->secure_peer_name, &handshaker); |
+ if (result != TSI_OK) { |
+ gpr_log(GPR_ERROR, "Handshaker creation failed with error %s.", |
+ tsi_result_to_string(result)); |
+ cb(exec_ctx, user_data, GRPC_SECURITY_ERROR, NULL, NULL); |
+ } else { |
+ grpc_do_security_handshake(exec_ctx, handshaker, &sc->base, true, |
+ nonsecure_endpoint, cb, user_data); |
+ } |
+} |
+ |
+static void httpcli_ssl_check_peer(grpc_exec_ctx *exec_ctx, |
+ grpc_security_connector *sc, tsi_peer peer, |
+ grpc_security_peer_check_cb cb, |
+ void *user_data) { |
+ grpc_httpcli_ssl_channel_security_connector *c = |
+ (grpc_httpcli_ssl_channel_security_connector *)sc; |
+ grpc_security_status status = GRPC_SECURITY_OK; |
+ |
+ /* Check the peer name. */ |
+ if (c->secure_peer_name != NULL && |
+ !tsi_ssl_peer_matches_name(&peer, c->secure_peer_name)) { |
+ gpr_log(GPR_ERROR, "Peer name %s is not in peer certificate", |
+ c->secure_peer_name); |
+ status = GRPC_SECURITY_ERROR; |
+ } |
+ cb(exec_ctx, user_data, status, NULL); |
+ tsi_peer_destruct(&peer); |
+} |
+ |
+static grpc_security_connector_vtable httpcli_ssl_vtable = { |
+ httpcli_ssl_destroy, httpcli_ssl_check_peer}; |
+ |
+static grpc_security_status httpcli_ssl_channel_security_connector_create( |
+ const unsigned char *pem_root_certs, size_t pem_root_certs_size, |
+ const char *secure_peer_name, grpc_channel_security_connector **sc) { |
+ tsi_result result = TSI_OK; |
+ grpc_httpcli_ssl_channel_security_connector *c; |
+ |
+ if (secure_peer_name != NULL && pem_root_certs == NULL) { |
+ gpr_log(GPR_ERROR, |
+ "Cannot assert a secure peer name without a trust root."); |
+ return GRPC_SECURITY_ERROR; |
+ } |
+ |
+ c = gpr_malloc(sizeof(grpc_httpcli_ssl_channel_security_connector)); |
+ memset(c, 0, sizeof(grpc_httpcli_ssl_channel_security_connector)); |
+ |
+ gpr_ref_init(&c->base.base.refcount, 1); |
+ c->base.base.vtable = &httpcli_ssl_vtable; |
+ if (secure_peer_name != NULL) { |
+ c->secure_peer_name = gpr_strdup(secure_peer_name); |
+ } |
+ result = tsi_create_ssl_client_handshaker_factory( |
+ NULL, 0, NULL, 0, pem_root_certs, pem_root_certs_size, NULL, NULL, NULL, |
+ 0, &c->handshaker_factory); |
+ if (result != TSI_OK) { |
+ gpr_log(GPR_ERROR, "Handshaker factory creation failed with %s.", |
+ tsi_result_to_string(result)); |
+ httpcli_ssl_destroy(&c->base.base); |
+ *sc = NULL; |
+ return GRPC_SECURITY_ERROR; |
+ } |
+ c->base.do_handshake = httpcli_ssl_do_handshake; |
+ *sc = &c->base; |
+ return GRPC_SECURITY_OK; |
+} |
+ |
+/* handshaker */ |
+ |
+typedef struct { |
+ void (*func)(grpc_exec_ctx *exec_ctx, void *arg, grpc_endpoint *endpoint); |
+ void *arg; |
+} on_done_closure; |
+ |
+static void on_secure_transport_setup_done(grpc_exec_ctx *exec_ctx, void *rp, |
+ grpc_security_status status, |
+ grpc_endpoint *secure_endpoint, |
+ grpc_auth_context *auth_context) { |
+ on_done_closure *c = rp; |
+ if (status != GRPC_SECURITY_OK) { |
+ gpr_log(GPR_ERROR, "Secure transport setup failed with error %d.", status); |
+ c->func(exec_ctx, c->arg, NULL); |
+ } else { |
+ c->func(exec_ctx, c->arg, secure_endpoint); |
+ } |
+ gpr_free(c); |
+} |
+ |
+static void ssl_handshake(grpc_exec_ctx *exec_ctx, void *arg, |
+ grpc_endpoint *tcp, const char *host, |
+ void (*on_done)(grpc_exec_ctx *exec_ctx, void *arg, |
+ grpc_endpoint *endpoint)) { |
+ grpc_channel_security_connector *sc = NULL; |
+ const unsigned char *pem_root_certs = NULL; |
+ on_done_closure *c = gpr_malloc(sizeof(*c)); |
+ size_t pem_root_certs_size = grpc_get_default_ssl_roots(&pem_root_certs); |
+ if (pem_root_certs == NULL || pem_root_certs_size == 0) { |
+ gpr_log(GPR_ERROR, "Could not get default pem root certs."); |
+ on_done(exec_ctx, arg, NULL); |
+ gpr_free(c); |
+ return; |
+ } |
+ c->func = on_done; |
+ c->arg = arg; |
+ GPR_ASSERT(httpcli_ssl_channel_security_connector_create( |
+ pem_root_certs, pem_root_certs_size, host, &sc) == |
+ GRPC_SECURITY_OK); |
+ grpc_channel_security_connector_do_handshake( |
+ exec_ctx, sc, tcp, on_secure_transport_setup_done, c); |
+ GRPC_SECURITY_CONNECTOR_UNREF(&sc->base, "httpcli"); |
+} |
+ |
+const grpc_httpcli_handshaker grpc_httpcli_ssl = {"https", ssl_handshake}; |