| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308 | 
							- /*
 
-  *
 
-  * Copyright 2015, Google Inc.
 
-  * All rights reserved.
 
-  *
 
-  * Redistribution and use in source and binary forms, with or without
 
-  * modification, are permitted provided that the following conditions are
 
-  * met:
 
-  *
 
-  *     * Redistributions of source code must retain the above copyright
 
-  * notice, this list of conditions and the following disclaimer.
 
-  *     * Redistributions in binary form must reproduce the above
 
-  * copyright notice, this list of conditions and the following disclaimer
 
-  * in the documentation and/or other materials provided with the
 
-  * distribution.
 
-  *     * Neither the name of Google Inc. nor the names of its
 
-  * contributors may be used to endorse or promote products derived from
 
-  * this software without specific prior written permission.
 
-  *
 
-  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 
-  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 
-  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 
-  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 
-  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 
-  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 
-  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 
-  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 
-  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 
-  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 
-  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 
-  *
 
-  */
 
- #include "src/core/security/handshake.h"
 
- #include <string.h>
 
- #include "src/core/security/secure_endpoint.h"
 
- #include <grpc/support/alloc.h>
 
- #include <grpc/support/log.h>
 
- #include <grpc/support/slice_buffer.h>
 
- #define GRPC_INITIAL_HANDSHAKE_BUFFER_SIZE 256
 
- typedef struct {
 
-   grpc_security_connector *connector;
 
-   tsi_handshaker *handshaker;
 
-   unsigned char *handshake_buffer;
 
-   size_t handshake_buffer_size;
 
-   grpc_endpoint *wrapped_endpoint;
 
-   grpc_endpoint *secure_endpoint;
 
-   gpr_slice_buffer left_overs;
 
-   gpr_slice_buffer incoming;
 
-   gpr_slice_buffer outgoing;
 
-   grpc_security_handshake_done_cb cb;
 
-   void *user_data;
 
-   grpc_iomgr_closure on_handshake_data_sent_to_peer;
 
-   grpc_iomgr_closure on_handshake_data_received_from_peer;
 
- } grpc_security_handshake;
 
- static void on_handshake_data_received_from_peer(void *setup, int success);
 
- static void on_handshake_data_sent_to_peer(void *setup, int success);
 
- static void security_handshake_done(grpc_security_handshake *h,
 
-                                     int is_success) {
 
-   if (is_success) {
 
-     h->cb(h->user_data, GRPC_SECURITY_OK, h->wrapped_endpoint,
 
-           h->secure_endpoint);
 
-   } else {
 
-     if (h->secure_endpoint != NULL) {
 
-       grpc_endpoint_shutdown(h->secure_endpoint);
 
-       grpc_endpoint_destroy(h->secure_endpoint);
 
-     } else {
 
-       grpc_endpoint_destroy(h->wrapped_endpoint);
 
-     }
 
-     h->cb(h->user_data, GRPC_SECURITY_ERROR, h->wrapped_endpoint, NULL);
 
-   }
 
-   if (h->handshaker != NULL) tsi_handshaker_destroy(h->handshaker);
 
-   if (h->handshake_buffer != NULL) gpr_free(h->handshake_buffer);
 
-   gpr_slice_buffer_destroy(&h->left_overs);
 
-   gpr_slice_buffer_destroy(&h->outgoing);
 
-   gpr_slice_buffer_destroy(&h->incoming);
 
-   GRPC_SECURITY_CONNECTOR_UNREF(h->connector, "handshake");
 
-   gpr_free(h);
 
- }
 
- static void on_peer_checked(void *user_data, grpc_security_status status) {
 
-   grpc_security_handshake *h = user_data;
 
-   tsi_frame_protector *protector;
 
-   tsi_result result;
 
-   if (status != GRPC_SECURITY_OK) {
 
-     gpr_log(GPR_ERROR, "Error checking peer.");
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   result =
 
-       tsi_handshaker_create_frame_protector(h->handshaker, NULL, &protector);
 
-   if (result != TSI_OK) {
 
-     gpr_log(GPR_ERROR, "Frame protector creation failed with error %s.",
 
-             tsi_result_to_string(result));
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   h->secure_endpoint =
 
-       grpc_secure_endpoint_create(protector, h->wrapped_endpoint,
 
-                                   h->left_overs.slices, h->left_overs.count);
 
-   h->left_overs.count = 0;
 
-   h->left_overs.length = 0;
 
-   security_handshake_done(h, 1);
 
-   return;
 
- }
 
- static void check_peer(grpc_security_handshake *h) {
 
-   grpc_security_status peer_status;
 
-   tsi_peer peer;
 
-   tsi_result result = tsi_handshaker_extract_peer(h->handshaker, &peer);
 
-   if (result != TSI_OK) {
 
-     gpr_log(GPR_ERROR, "Peer extraction failed with error %s",
 
-             tsi_result_to_string(result));
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   peer_status = grpc_security_connector_check_peer(h->connector, peer,
 
-                                                    on_peer_checked, h);
 
-   if (peer_status == GRPC_SECURITY_ERROR) {
 
-     gpr_log(GPR_ERROR, "Peer check failed.");
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   } else if (peer_status == GRPC_SECURITY_OK) {
 
-     on_peer_checked(h, peer_status);
 
-   }
 
- }
 
- static void send_handshake_bytes_to_peer(grpc_security_handshake *h) {
 
-   size_t offset = 0;
 
-   tsi_result result = TSI_OK;
 
-   gpr_slice to_send;
 
-   do {
 
-     size_t to_send_size = h->handshake_buffer_size - offset;
 
-     result = tsi_handshaker_get_bytes_to_send_to_peer(
 
-         h->handshaker, h->handshake_buffer + offset, &to_send_size);
 
-     offset += to_send_size;
 
-     if (result == TSI_INCOMPLETE_DATA) {
 
-       h->handshake_buffer_size *= 2;
 
-       h->handshake_buffer =
 
-           gpr_realloc(h->handshake_buffer, h->handshake_buffer_size);
 
-     }
 
-   } while (result == TSI_INCOMPLETE_DATA);
 
-   if (result != TSI_OK) {
 
-     gpr_log(GPR_ERROR, "Handshake failed with error %s",
 
-             tsi_result_to_string(result));
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   to_send =
 
-       gpr_slice_from_copied_buffer((const char *)h->handshake_buffer, offset);
 
-   gpr_slice_buffer_reset_and_unref(&h->outgoing);
 
-   gpr_slice_buffer_add(&h->outgoing, to_send);
 
-   /* TODO(klempner,jboeuf): This should probably use the client setup
 
-          deadline */
 
-   switch (grpc_endpoint_write(h->wrapped_endpoint, &h->outgoing,
 
-                               &h->on_handshake_data_sent_to_peer)) {
 
-     case GRPC_ENDPOINT_ERROR:
 
-       gpr_log(GPR_ERROR, "Could not send handshake data to peer.");
 
-       security_handshake_done(h, 0);
 
-       break;
 
-     case GRPC_ENDPOINT_DONE:
 
-       on_handshake_data_sent_to_peer(h, 1);
 
-       break;
 
-     case GRPC_ENDPOINT_PENDING:
 
-       break;
 
-   }
 
- }
 
- static void on_handshake_data_received_from_peer(void *handshake, int success) {
 
-   grpc_security_handshake *h = handshake;
 
-   size_t consumed_slice_size = 0;
 
-   tsi_result result = TSI_OK;
 
-   size_t i;
 
-   size_t num_left_overs;
 
-   int has_left_overs_in_current_slice = 0;
 
-   if (!success) {
 
-     gpr_log(GPR_ERROR, "Read failed.");
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   for (i = 0; i < h->incoming.count; i++) {
 
-     consumed_slice_size = GPR_SLICE_LENGTH(h->incoming.slices[i]);
 
-     result = tsi_handshaker_process_bytes_from_peer(
 
-         h->handshaker, GPR_SLICE_START_PTR(h->incoming.slices[i]),
 
-         &consumed_slice_size);
 
-     if (!tsi_handshaker_is_in_progress(h->handshaker)) break;
 
-   }
 
-   if (tsi_handshaker_is_in_progress(h->handshaker)) {
 
-     /* We may need more data. */
 
-     if (result == TSI_INCOMPLETE_DATA) {
 
-       switch (grpc_endpoint_read(h->wrapped_endpoint, &h->incoming,
 
-                                  &h->on_handshake_data_received_from_peer)) {
 
-         case GRPC_ENDPOINT_DONE:
 
-           on_handshake_data_received_from_peer(h, 1);
 
-           break;
 
-         case GRPC_ENDPOINT_ERROR:
 
-           on_handshake_data_received_from_peer(h, 0);
 
-           break;
 
-         case GRPC_ENDPOINT_PENDING:
 
-           break;
 
-       }
 
-       return;
 
-     } else {
 
-       send_handshake_bytes_to_peer(h);
 
-       return;
 
-     }
 
-   }
 
-   if (result != TSI_OK) {
 
-     gpr_log(GPR_ERROR, "Handshake failed with error %s",
 
-             tsi_result_to_string(result));
 
-     security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   /* Handshake is done and successful this point. */
 
-   has_left_overs_in_current_slice =
 
-       (consumed_slice_size < GPR_SLICE_LENGTH(h->incoming.slices[i]));
 
-   num_left_overs =
 
-       (has_left_overs_in_current_slice ? 1 : 0) + h->incoming.count - i - 1;
 
-   if (num_left_overs == 0) {
 
-     check_peer(h);
 
-     return;
 
-   }
 
-   /* Put the leftovers in our buffer (ownership transfered). */
 
-   if (has_left_overs_in_current_slice) {
 
-     gpr_slice_buffer_add(
 
-         &h->left_overs,
 
-         gpr_slice_split_tail(&h->incoming.slices[i], consumed_slice_size));
 
-     gpr_slice_unref(
 
-         h->incoming.slices[i]); /* split_tail above increments refcount. */
 
-   }
 
-   gpr_slice_buffer_addn(
 
-       &h->left_overs, &h->incoming.slices[i + 1],
 
-       num_left_overs - (size_t)has_left_overs_in_current_slice);
 
-   check_peer(h);
 
- }
 
- /* If handshake is NULL, the handshake is done. */
 
- static void on_handshake_data_sent_to_peer(void *handshake, int success) {
 
-   grpc_security_handshake *h = handshake;
 
-   /* Make sure that write is OK. */
 
-   if (!success) {
 
-     gpr_log(GPR_ERROR, "Write failed.");
 
-     if (handshake != NULL) security_handshake_done(h, 0);
 
-     return;
 
-   }
 
-   /* We may be done. */
 
-   if (tsi_handshaker_is_in_progress(h->handshaker)) {
 
-     /* TODO(klempner,jboeuf): This should probably use the client setup
 
-        deadline */
 
-     switch (grpc_endpoint_read(h->wrapped_endpoint, &h->incoming,
 
-                                &h->on_handshake_data_received_from_peer)) {
 
-       case GRPC_ENDPOINT_ERROR:
 
-         on_handshake_data_received_from_peer(h, 0);
 
-         break;
 
-       case GRPC_ENDPOINT_PENDING:
 
-         break;
 
-       case GRPC_ENDPOINT_DONE:
 
-         on_handshake_data_received_from_peer(h, 1);
 
-         break;
 
-     }
 
-   } else {
 
-     check_peer(h);
 
-   }
 
- }
 
- void grpc_do_security_handshake(tsi_handshaker *handshaker,
 
-                                 grpc_security_connector *connector,
 
-                                 grpc_endpoint *nonsecure_endpoint,
 
-                                 grpc_security_handshake_done_cb cb,
 
-                                 void *user_data) {
 
-   grpc_security_handshake *h = gpr_malloc(sizeof(grpc_security_handshake));
 
-   memset(h, 0, sizeof(grpc_security_handshake));
 
-   h->handshaker = handshaker;
 
-   h->connector = GRPC_SECURITY_CONNECTOR_REF(connector, "handshake");
 
-   h->handshake_buffer_size = GRPC_INITIAL_HANDSHAKE_BUFFER_SIZE;
 
-   h->handshake_buffer = gpr_malloc(h->handshake_buffer_size);
 
-   h->wrapped_endpoint = nonsecure_endpoint;
 
-   h->user_data = user_data;
 
-   h->cb = cb;
 
-   grpc_iomgr_closure_init(&h->on_handshake_data_sent_to_peer,
 
-                           on_handshake_data_sent_to_peer, h);
 
-   grpc_iomgr_closure_init(&h->on_handshake_data_received_from_peer,
 
-                           on_handshake_data_received_from_peer, h);
 
-   gpr_slice_buffer_init(&h->left_overs);
 
-   gpr_slice_buffer_init(&h->outgoing);
 
-   gpr_slice_buffer_init(&h->incoming);
 
-   send_handshake_bytes_to_peer(h);
 
- }
 
 
  |