blob: 7dee1c1edb83afa30cb62a351799db04742e2029 [file] [log] [blame]
/*
*
* Copyright 2015, Google Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Google Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
#include "src/core/security/secure_endpoint.h"
#include "src/core/support/string.h"
#include <grpc/support/alloc.h>
#include <grpc/support/log.h>
#include <grpc/support/slice_buffer.h>
#include <grpc/support/slice.h>
#include <grpc/support/sync.h>
#include "src/core/tsi/transport_security_interface.h"
#include "src/core/debug/trace.h"
#define STAGING_BUFFER_SIZE 8192
typedef struct
{
grpc_endpoint base;
grpc_endpoint *wrapped_ep;
struct tsi_frame_protector *protector;
gpr_mu protector_mu;
/* saved upper level callbacks and user_data. */
grpc_closure *read_cb;
grpc_closure *write_cb;
grpc_closure on_read;
gpr_slice_buffer *read_buffer;
gpr_slice_buffer source_buffer;
/* saved handshaker leftover data to unprotect. */
gpr_slice_buffer leftover_bytes;
/* buffers for read and write */
gpr_slice read_staging_buffer;
gpr_slice write_staging_buffer;
gpr_slice_buffer output_buffer;
gpr_refcount ref;
} secure_endpoint;
int grpc_trace_secure_endpoint = 0;
static void
destroy (grpc_exec_ctx * exec_ctx, secure_endpoint * secure_ep)
{
secure_endpoint *ep = secure_ep;
grpc_endpoint_destroy (exec_ctx, ep->wrapped_ep);
tsi_frame_protector_destroy (ep->protector);
gpr_slice_buffer_destroy (&ep->leftover_bytes);
gpr_slice_unref (ep->read_staging_buffer);
gpr_slice_unref (ep->write_staging_buffer);
gpr_slice_buffer_destroy (&ep->output_buffer);
gpr_slice_buffer_destroy (&ep->source_buffer);
gpr_mu_destroy (&ep->protector_mu);
gpr_free (ep);
}
/*#define GRPC_SECURE_ENDPOINT_REFCOUNT_DEBUG*/
#ifdef GRPC_SECURE_ENDPOINT_REFCOUNT_DEBUG
#define SECURE_ENDPOINT_UNREF(ep, reason, cl) \
secure_endpoint_unref((ep), (cl), (reason), __FILE__, __LINE__)
#define SECURE_ENDPOINT_REF(ep, reason) \
secure_endpoint_ref((ep), (reason), __FILE__, __LINE__)
static void
secure_endpoint_unref (secure_endpoint * ep, grpc_closure_list * closure_list, const char *reason, const char *file, int line)
{
gpr_log (file, line, GPR_LOG_SEVERITY_DEBUG, "SECENDP unref %p : %s %d -> %d", ep, reason, ep->ref.count, ep->ref.count - 1);
if (gpr_unref (&ep->ref))
{
destroy (exec_ctx, ep);
}
}
static void
secure_endpoint_ref (secure_endpoint * ep, const char *reason, const char *file, int line)
{
gpr_log (file, line, GPR_LOG_SEVERITY_DEBUG, "SECENDP ref %p : %s %d -> %d", ep, reason, ep->ref.count, ep->ref.count + 1);
gpr_ref (&ep->ref);
}
#else
#define SECURE_ENDPOINT_UNREF(ep, reason, cl) secure_endpoint_unref((ep), (cl))
#define SECURE_ENDPOINT_REF(ep, reason) secure_endpoint_ref((ep))
static void
secure_endpoint_unref (grpc_exec_ctx * exec_ctx, secure_endpoint * ep)
{
if (gpr_unref (&ep->ref))
{
destroy (exec_ctx, ep);
}
}
static void
secure_endpoint_ref (secure_endpoint * ep)
{
gpr_ref (&ep->ref);
}
#endif
static void
flush_read_staging_buffer (secure_endpoint * ep, gpr_uint8 ** cur, gpr_uint8 ** end)
{
gpr_slice_buffer_add (ep->read_buffer, ep->read_staging_buffer);
ep->read_staging_buffer = gpr_slice_malloc (STAGING_BUFFER_SIZE);
*cur = GPR_SLICE_START_PTR (ep->read_staging_buffer);
*end = GPR_SLICE_END_PTR (ep->read_staging_buffer);
}
static void
call_read_cb (grpc_exec_ctx * exec_ctx, secure_endpoint * ep, int success)
{
if (grpc_trace_secure_endpoint)
{
size_t i;
for (i = 0; i < ep->read_buffer->count; i++)
{
char *data = gpr_dump_slice (ep->read_buffer->slices[i],
GPR_DUMP_HEX | GPR_DUMP_ASCII);
gpr_log (GPR_DEBUG, "READ %p: %s", ep, data);
gpr_free (data);
}
}
ep->read_buffer = NULL;
grpc_closure_list_add (closure_list, ep->read_cb, success);
SECURE_ENDPOINT_UNREF (exec_ctx, ep, "read");
}
static void
on_read (grpc_exec_ctx * exec_ctx, void *user_data, int success)
{
unsigned i;
gpr_uint8 keep_looping = 0;
tsi_result result = TSI_OK;
secure_endpoint *ep = (secure_endpoint *) user_data;
gpr_uint8 *cur = GPR_SLICE_START_PTR (ep->read_staging_buffer);
gpr_uint8 *end = GPR_SLICE_END_PTR (ep->read_staging_buffer);
if (!success)
{
gpr_slice_buffer_reset_and_unref (ep->read_buffer);
call_read_cb (exec_ctx, ep, 0);
return;
}
/* TODO(yangg) check error, maybe bail out early */
for (i = 0; i < ep->source_buffer.count; i++)
{
gpr_slice encrypted = ep->source_buffer.slices[i];
gpr_uint8 *message_bytes = GPR_SLICE_START_PTR (encrypted);
size_t message_size = GPR_SLICE_LENGTH (encrypted);
while (message_size > 0 || keep_looping)
{
size_t unprotected_buffer_size_written = (size_t) (end - cur);
size_t processed_message_size = message_size;
gpr_mu_lock (&ep->protector_mu);
result = tsi_frame_protector_unprotect (ep->protector, message_bytes, &processed_message_size, cur, &unprotected_buffer_size_written);
gpr_mu_unlock (&ep->protector_mu);
if (result != TSI_OK)
{
gpr_log (GPR_ERROR, "Decryption error: %s", tsi_result_to_string (result));
break;
}
message_bytes += processed_message_size;
message_size -= processed_message_size;
cur += unprotected_buffer_size_written;
if (cur == end)
{
flush_read_staging_buffer (ep, &cur, &end);
/* Force to enter the loop again to extract buffered bytes in protector.
The bytes could be buffered because of running out of staging_buffer.
If this happens at the end of all slices, doing another unprotect
avoids leaving data in the protector. */
keep_looping = 1;
}
else if (unprotected_buffer_size_written > 0)
{
keep_looping = 1;
}
else
{
keep_looping = 0;
}
}
if (result != TSI_OK)
break;
}
if (cur != GPR_SLICE_START_PTR (ep->read_staging_buffer))
{
gpr_slice_buffer_add (ep->read_buffer, gpr_slice_split_head (&ep->read_staging_buffer, (size_t) (cur - GPR_SLICE_START_PTR (ep->read_staging_buffer))));
}
/* TODO(yangg) experiment with moving this block after read_cb to see if it
helps latency */
gpr_slice_buffer_reset_and_unref (&ep->source_buffer);
if (result != TSI_OK)
{
gpr_slice_buffer_reset_and_unref (ep->read_buffer);
call_read_cb (exec_ctx, ep, 0);
return;
}
call_read_cb (exec_ctx, ep, 1);
}
static void
endpoint_read (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep, gpr_slice_buffer * slices, grpc_closure * cb)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
ep->read_cb = cb;
ep->read_buffer = slices;
gpr_slice_buffer_reset_and_unref (ep->read_buffer);
SECURE_ENDPOINT_REF (ep, "read");
if (ep->leftover_bytes.count)
{
gpr_slice_buffer_swap (&ep->leftover_bytes, &ep->source_buffer);
GPR_ASSERT (ep->leftover_bytes.count == 0);
on_read (exec_ctx, ep, 1);
return;
}
grpc_endpoint_read (exec_ctx, ep->wrapped_ep, &ep->source_buffer, &ep->on_read);
}
static void
flush_write_staging_buffer (secure_endpoint * ep, gpr_uint8 ** cur, gpr_uint8 ** end)
{
gpr_slice_buffer_add (&ep->output_buffer, ep->write_staging_buffer);
ep->write_staging_buffer = gpr_slice_malloc (STAGING_BUFFER_SIZE);
*cur = GPR_SLICE_START_PTR (ep->write_staging_buffer);
*end = GPR_SLICE_END_PTR (ep->write_staging_buffer);
}
static void
endpoint_write (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep, gpr_slice_buffer * slices, grpc_closure * cb)
{
unsigned i;
tsi_result result = TSI_OK;
secure_endpoint *ep = (secure_endpoint *) secure_ep;
gpr_uint8 *cur = GPR_SLICE_START_PTR (ep->write_staging_buffer);
gpr_uint8 *end = GPR_SLICE_END_PTR (ep->write_staging_buffer);
gpr_slice_buffer_reset_and_unref (&ep->output_buffer);
if (grpc_trace_secure_endpoint)
{
for (i = 0; i < slices->count; i++)
{
char *data = gpr_dump_slice (slices->slices[i], GPR_DUMP_HEX | GPR_DUMP_ASCII);
gpr_log (GPR_DEBUG, "WRITE %p: %s", ep, data);
gpr_free (data);
}
}
for (i = 0; i < slices->count; i++)
{
gpr_slice plain = slices->slices[i];
gpr_uint8 *message_bytes = GPR_SLICE_START_PTR (plain);
size_t message_size = GPR_SLICE_LENGTH (plain);
while (message_size > 0)
{
size_t protected_buffer_size_to_send = (size_t) (end - cur);
size_t processed_message_size = message_size;
gpr_mu_lock (&ep->protector_mu);
result = tsi_frame_protector_protect (ep->protector, message_bytes, &processed_message_size, cur, &protected_buffer_size_to_send);
gpr_mu_unlock (&ep->protector_mu);
if (result != TSI_OK)
{
gpr_log (GPR_ERROR, "Encryption error: %s", tsi_result_to_string (result));
break;
}
message_bytes += processed_message_size;
message_size -= processed_message_size;
cur += protected_buffer_size_to_send;
if (cur == end)
{
flush_write_staging_buffer (ep, &cur, &end);
}
}
if (result != TSI_OK)
break;
}
if (result == TSI_OK)
{
size_t still_pending_size;
do
{
size_t protected_buffer_size_to_send = (size_t) (end - cur);
gpr_mu_lock (&ep->protector_mu);
result = tsi_frame_protector_protect_flush (ep->protector, cur, &protected_buffer_size_to_send, &still_pending_size);
gpr_mu_unlock (&ep->protector_mu);
if (result != TSI_OK)
break;
cur += protected_buffer_size_to_send;
if (cur == end)
{
flush_write_staging_buffer (ep, &cur, &end);
}
}
while (still_pending_size > 0);
if (cur != GPR_SLICE_START_PTR (ep->write_staging_buffer))
{
gpr_slice_buffer_add (&ep->output_buffer, gpr_slice_split_head (&ep->write_staging_buffer, (size_t) (cur - GPR_SLICE_START_PTR (ep->write_staging_buffer))));
}
}
if (result != TSI_OK)
{
/* TODO(yangg) do different things according to the error type? */
gpr_slice_buffer_reset_and_unref (&ep->output_buffer);
grpc_closure_list_add (closure_list, cb, 0);
return;
}
grpc_endpoint_write (exec_ctx, ep->wrapped_ep, &ep->output_buffer, cb);
}
static void
endpoint_shutdown (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
grpc_endpoint_shutdown (exec_ctx, ep->wrapped_ep);
}
static void
endpoint_destroy (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
SECURE_ENDPOINT_UNREF (exec_ctx, ep, "destroy");
}
static void
endpoint_add_to_pollset (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep, grpc_pollset * pollset)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
grpc_endpoint_add_to_pollset (exec_ctx, ep->wrapped_ep, pollset);
}
static void
endpoint_add_to_pollset_set (grpc_exec_ctx * exec_ctx, grpc_endpoint * secure_ep, grpc_pollset_set * pollset_set)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
grpc_endpoint_add_to_pollset_set (exec_ctx, ep->wrapped_ep, pollset_set);
}
static char *
endpoint_get_peer (grpc_endpoint * secure_ep)
{
secure_endpoint *ep = (secure_endpoint *) secure_ep;
return grpc_endpoint_get_peer (ep->wrapped_ep);
}
static const grpc_endpoint_vtable vtable = {
endpoint_read, endpoint_write,
endpoint_add_to_pollset, endpoint_add_to_pollset_set,
endpoint_shutdown, endpoint_destroy,
endpoint_get_peer
};
grpc_endpoint *
grpc_secure_endpoint_create (struct tsi_frame_protector *protector, grpc_endpoint * transport, gpr_slice * leftover_slices, size_t leftover_nslices)
{
size_t i;
secure_endpoint *ep = (secure_endpoint *) gpr_malloc (sizeof (secure_endpoint));
ep->base.vtable = &vtable;
ep->wrapped_ep = transport;
ep->protector = protector;
gpr_slice_buffer_init (&ep->leftover_bytes);
for (i = 0; i < leftover_nslices; i++)
{
gpr_slice_buffer_add (&ep->leftover_bytes, gpr_slice_ref (leftover_slices[i]));
}
ep->write_staging_buffer = gpr_slice_malloc (STAGING_BUFFER_SIZE);
ep->read_staging_buffer = gpr_slice_malloc (STAGING_BUFFER_SIZE);
gpr_slice_buffer_init (&ep->output_buffer);
gpr_slice_buffer_init (&ep->source_buffer);
ep->read_buffer = NULL;
grpc_closure_init (&ep->on_read, on_read, ep);
gpr_mu_init (&ep->protector_mu);
gpr_ref_init (&ep->ref, 1);
return &ep->base;
}