aboutsummaryrefslogtreecommitdiffstats
path: root/src/plugins/tlsopenssl/tls_async.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/plugins/tlsopenssl/tls_async.c')
-rw-r--r--src/plugins/tlsopenssl/tls_async.c462
1 files changed, 401 insertions, 61 deletions
diff --git a/src/plugins/tlsopenssl/tls_async.c b/src/plugins/tlsopenssl/tls_async.c
index d85af686d21..cd08da5d9ea 100644
--- a/src/plugins/tlsopenssl/tls_async.c
+++ b/src/plugins/tlsopenssl/tls_async.c
@@ -17,28 +17,58 @@
#include <vlib/node_funcs.h>
#include <openssl/engine.h>
#include <tlsopenssl/tls_openssl.h>
+#include <dlfcn.h>
-#define SSL_ASYNC_INFLIGHT 1
-#define SSL_ASYNC_READY 2
-#define SSL_ASYNC_REENTER 3
#define MAX_VECTOR_ASYNC 256
+#define SSL_WANT_NAMES \
+ { \
+ [0] = "N/A", [SSL_NOTHING] = "SSL_NOTHING", \
+ [SSL_WRITING] = "SSL_WRITING", [SSL_READING] = "SSL_READING", \
+ [SSL_X509_LOOKUP] = "SSL_X509_LOOKUP", \
+ [SSL_ASYNC_PAUSED] = "SSL_ASYNC_PAUSED", \
+ [SSL_ASYNC_NO_JOBS] = "SSL_ASYNC_NO_JOBS", \
+ [SSL_CLIENT_HELLO_CB] = "SSL_CLIENT_HELLO_CB", \
+ }
+
+const char *ssl_want[] = SSL_WANT_NAMES;
+
+#define foreach_ssl_evt_status_type_ \
+ _ (INVALID_STATUS, "Async event invalid status") \
+ _ (INFLIGHT, "Async event inflight") \
+ _ (READY, "Async event ready") \
+ _ (REENTER, "Async event reenter") \
+ _ (DEQ_DONE, "Async event dequeued") \
+ _ (CB_EXECUTED, "Async callback executed") \
+ _ (MAX_STATUS, "Async event max status")
+
+typedef enum ssl_evt_status_type_
+{
+#define _(sym, str) SSL_ASYNC_##sym,
+ foreach_ssl_evt_status_type_
+#undef _
+} ssl_evt_status_type_t;
+
typedef struct openssl_tls_callback_arg_
{
int thread_index;
int event_index;
+ ssl_async_evt_type_t async_evt_type;
+ openssl_resume_handler *evt_handler;
} openssl_tls_callback_arg_t;
typedef struct openssl_event_
{
u32 ctx_index;
int session_index;
- u8 status;
-
- openssl_resume_handler *handler;
+ ssl_evt_status_type_t status;
+ transport_send_params_t *tran_sp;
openssl_tls_callback_arg_t cb_args;
+
#define thread_idx cb_args.thread_index
#define event_idx cb_args.event_index
+#define async_event_type cb_args.async_evt_type
+#define async_evt_handler cb_args.evt_handler
int next;
} openssl_evt_t;
@@ -46,12 +76,14 @@ typedef struct openssl_async_queue_
{
int evt_run_head;
int evt_run_tail;
+ int depth;
} openssl_async_queue_t;
typedef struct openssl_async_
{
openssl_evt_t ***evt_pool;
openssl_async_queue_t *queue;
+ openssl_async_queue_t *queue_in_init;
void (*polling) (void);
u8 start_polling;
ENGINE *engine;
@@ -74,8 +106,8 @@ struct engine_polling
void qat_init_thread (void *arg);
struct engine_polling engine_list[] = {
- {"qat", qat_polling, qat_pre_init, qat_init_thread},
- {"dasync", dasync_polling, NULL, NULL}
+ { "qat", qat_polling, qat_pre_init, qat_init_thread },
+ { "dasync", dasync_polling, NULL, NULL }
};
openssl_async_t openssl_async_main;
@@ -98,6 +130,7 @@ evt_pool_init (vlib_main_t * vm)
vec_validate (om->evt_pool, num_threads - 1);
vec_validate (om->queue, num_threads - 1);
+ vec_validate (om->queue_in_init, num_threads - 1);
om->start_polling = 0;
om->engine = 0;
@@ -106,6 +139,11 @@ evt_pool_init (vlib_main_t * vm)
{
om->queue[i].evt_run_head = -1;
om->queue[i].evt_run_tail = -1;
+ om->queue[i].depth = 0;
+
+ om->queue_in_init[i].evt_run_head = -1;
+ om->queue_in_init[i].evt_run_tail = -1;
+ om->queue_in_init[i].depth = 0;
}
om->polling = NULL;
@@ -243,16 +281,25 @@ int
tls_async_openssl_callback (SSL * s, void *cb_arg)
{
openssl_evt_t *event, *event_tail;
+ openssl_async_queue_t *queue;
openssl_async_t *om = &openssl_async_main;
openssl_tls_callback_arg_t *args = (openssl_tls_callback_arg_t *) cb_arg;
int thread_index = args->thread_index;
int event_index = args->event_index;
- int *evt_run_tail = &om->queue[thread_index].evt_run_tail;
- int *evt_run_head = &om->queue[thread_index].evt_run_head;
+ ssl_async_evt_type_t evt_type = args->async_evt_type;
+ int *evt_run_tail, *evt_run_head;
TLS_DBG (2, "Set event %d to run\n", event_index);
event = openssl_evt_get_w_thread (event_index, thread_index);
+ if (evt_type == SSL_ASYNC_EVT_INIT)
+ queue = om->queue_in_init;
+ else
+ queue = om->queue;
+
+ evt_run_tail = &queue[thread_index].evt_run_tail;
+ evt_run_head = &queue[thread_index].evt_run_head;
+
/* Happend when a recursive case, especially in SW simulation */
if (PREDICT_FALSE (event->status == SSL_ASYNC_READY))
{
@@ -262,72 +309,128 @@ tls_async_openssl_callback (SSL * s, void *cb_arg)
event->status = SSL_ASYNC_READY;
event->next = -1;
- if (*evt_run_tail >= 0)
+ if (*evt_run_head < 0)
+ *evt_run_head = event_index;
+ else if (*evt_run_tail >= 0)
{
event_tail = openssl_evt_get_w_thread (*evt_run_tail, thread_index);
event_tail->next = event_index;
}
+
+ queue[thread_index].depth++;
+
*evt_run_tail = event_index;
- if (*evt_run_head < 0)
- {
- *evt_run_head = event_index;
- }
return 1;
}
+/*
+ * Continue an async SSL_write() call.
+ * This function is _only_ called when continuing an SSL_write() call
+ * that returned WANT_ASYNC.
+ * Since it continues the handling of an existing, paused SSL job
+ * (ASYNC_JOB*), the 'buf' and 'num' params to SSL_write() have
+ * already been set in the initial call, and are meaningless here.
+ * Therefore setting buf=null,num=0, to emphasize the point.
+ * On successful write, TLS context total_async_write bytes are updated.
+ */
+static int
+openssl_async_write_from_fifo_into_ssl (svm_fifo_t *f, SSL *ssl,
+ openssl_ctx_t *oc)
+{
+ int wrote = 0;
+
+ wrote = SSL_write (ssl, NULL, 0);
+ ossl_check_err_is_fatal (ssl, wrote);
+
+ oc->total_async_write -= wrote;
+ svm_fifo_dequeue_drop (f, wrote);
+
+ return wrote;
+}
+
+static int
+openssl_async_read_from_ssl_into_fifo (svm_fifo_t *f, SSL *ssl)
+{
+ int read;
+
+ read = SSL_read (ssl, NULL, 0);
+ if (read <= 0)
+ return read;
+
+ svm_fifo_enqueue_nocopy (f, read);
+
+ return read;
+}
+
int
-vpp_tls_async_init_event (tls_ctx_t * ctx,
- openssl_resume_handler * handler,
- session_t * session)
+vpp_tls_async_init_event (tls_ctx_t *ctx, openssl_resume_handler *handler,
+ session_t *session, ssl_async_evt_type_t evt_type,
+ transport_send_params_t *sp, int wr_size)
{
u32 eidx;
- openssl_evt_t *event;
+ openssl_evt_t *event = NULL;
openssl_ctx_t *oc = (openssl_ctx_t *) ctx;
u32 thread_id = ctx->c_thread_index;
- eidx = openssl_evt_alloc ();
+ if (oc->evt_alloc_flag[evt_type])
+ {
+ eidx = oc->evt_index[evt_type];
+ if (evt_type == SSL_ASYNC_EVT_WR)
+ {
+ event = openssl_evt_get (eidx);
+ goto update_wr_evnt;
+ }
+ return 1;
+ }
+ else
+ {
+ eidx = openssl_evt_alloc ();
+ oc->evt_alloc_flag[evt_type] = true;
+ }
+
event = openssl_evt_get (eidx);
event->ctx_index = oc->openssl_ctx_index;
+ /* async call back args */
event->event_idx = eidx;
event->thread_idx = thread_id;
- event->handler = handler;
+ event->async_event_type = evt_type;
+ event->async_evt_handler = handler;
event->session_index = session->session_index;
- event->status = 0;
- ctx->evt_index = eidx;
+ event->status = SSL_ASYNC_INVALID_STATUS;
+ oc->evt_index[evt_type] = eidx;
#ifdef HAVE_OPENSSL_ASYNC
SSL_set_async_callback_arg (oc->ssl, &event->cb_args);
#endif
-
+update_wr_evnt:
+ if (evt_type == SSL_ASYNC_EVT_WR)
+ {
+ transport_connection_deschedule (&ctx->connection);
+ sp->flags |= TRANSPORT_SND_F_DESCHED;
+ oc->total_async_write = wr_size;
+ }
+ event->tran_sp = sp;
return 1;
}
int
-vpp_openssl_is_inflight (tls_ctx_t * ctx)
+vpp_openssl_is_inflight (tls_ctx_t *ctx)
{
u32 eidx;
+ openssl_ctx_t *oc = (openssl_ctx_t *) ctx;
openssl_evt_t *event;
- eidx = ctx->evt_index;
- event = openssl_evt_get (eidx);
-
- if (event->status == SSL_ASYNC_INFLIGHT)
- return 1;
- return 0;
-}
+ int i;
-int
-vpp_tls_async_update_event (tls_ctx_t * ctx, int eagain)
-{
- u32 eidx;
- openssl_evt_t *event;
+ for (i = SSL_ASYNC_EVT_INIT; i < SSL_ASYNC_EVT_MAX; i++)
+ {
+ eidx = oc->evt_index[i];
+ event = openssl_evt_get (eidx);
- eidx = ctx->evt_index;
- event = openssl_evt_get (eidx);
- event->status = SSL_ASYNC_INFLIGHT;
- if (eagain)
- return tls_async_openssl_callback (0, &event->cb_args);
+ if (event->status == SSL_ASYNC_INFLIGHT)
+ return 1;
+ }
- return 1;
+ return 0;
}
void
@@ -337,17 +440,16 @@ event_handler (void *tls_async)
openssl_evt_t *event;
session_t *session;
int thread_index;
- tls_ctx_t *ctx;
event = (openssl_evt_t *) tls_async;
thread_index = event->thread_idx;
- ctx = openssl_ctx_get_w_thread (event->ctx_index, thread_index);
- handler = event->handler;
+ handler = event->async_evt_handler;
session = session_get (event->session_index, thread_index);
if (handler)
{
- (*handler) (ctx, session);
+ (*handler) (event, session);
+ event->status = SSL_ASYNC_CB_EXECUTED;
}
return;
@@ -444,35 +546,33 @@ tls_async_do_job (int eidx, u32 thread_index)
}
int
-tls_resume_from_crypto (int thread_index)
+handle_async_cb_events (openssl_async_queue_t *queue, int thread_index)
{
int i;
-
- openssl_async_t *om = &openssl_async_main;
openssl_evt_t *event;
- int *evt_run_head = &om->queue[thread_index].evt_run_head;
- int *evt_run_tail = &om->queue[thread_index].evt_run_tail;
+
+ int *evt_run_head = &queue[thread_index].evt_run_head;
+ int *evt_run_tail = &queue[thread_index].evt_run_tail;
if (*evt_run_head < 0)
return 0;
for (i = 0; i < MAX_VECTOR_ASYNC; i++)
{
- if (*evt_run_head >= 0)
+ if (*evt_run_head >= 0 && queue[thread_index].depth)
{
event = openssl_evt_get_w_thread (*evt_run_head, thread_index);
- tls_async_do_job (*evt_run_head, thread_index);
if (PREDICT_FALSE (event->status == SSL_ASYNC_REENTER))
- {
- /* recusive event triggered */
- event->status = SSL_ASYNC_READY;
- continue;
- }
+ /* recusive event triggered */
+ goto deq_event;
+ tls_async_do_job (*evt_run_head, thread_index);
- event->status = 0;
+ deq_event:
*evt_run_head = event->next;
+ event->status = SSL_ASYNC_DEQ_DONE;
+ queue[thread_index].depth--;
- if (event->next < 0)
+ if (*evt_run_head < 0)
{
*evt_run_tail = -1;
break;
@@ -481,7 +581,32 @@ tls_resume_from_crypto (int thread_index)
}
return 0;
+}
+
+void
+resume_handshake_events (int thread_index)
+{
+ openssl_async_t *om = &openssl_async_main;
+
+ openssl_async_queue_t *queue = om->queue_in_init;
+ handle_async_cb_events (queue, thread_index);
+}
+
+void
+resume_read_write_events (int thread_index)
+{
+ openssl_async_t *om = &openssl_async_main;
+ openssl_async_queue_t *queue = om->queue;
+ handle_async_cb_events (queue, thread_index);
+}
+
+int
+tls_resume_from_crypto (int thread_index)
+{
+ resume_read_write_events (thread_index);
+ resume_handshake_events (thread_index);
+ return 0;
}
static clib_error_t *
@@ -491,6 +616,221 @@ tls_async_init (vlib_main_t * vm)
return 0;
}
+int
+tls_async_handshake_event_handler (void *async_evt, void *unused)
+{
+ openssl_evt_t *event = (openssl_evt_t *) async_evt;
+ int thread_index = event->thread_idx;
+ openssl_ctx_t *oc;
+ tls_ctx_t *ctx;
+ int rv, err;
+
+ ASSERT (thread_index == vlib_get_thread_index ());
+ ctx = openssl_ctx_get_w_thread (event->ctx_index, thread_index);
+ oc = (openssl_ctx_t *) ctx;
+ session_t *tls_session = session_get_from_handle (ctx->tls_session_handle);
+
+ if (!SSL_in_init (oc->ssl))
+ {
+ TLS_DBG (2, "[!SSL_in_init]==>CTX: %p EVT: %p EIDX: %d", ctx, event,
+ event->event_idx);
+ return 0;
+ }
+
+ if (ctx->flags & TLS_CONN_F_RESUME)
+ {
+ ctx->flags &= ~TLS_CONN_F_RESUME;
+ }
+ else if (!svm_fifo_max_dequeue_cons (tls_session->rx_fifo))
+ return 0;
+
+ rv = SSL_do_handshake (oc->ssl);
+ err = SSL_get_error (oc->ssl, rv);
+
+ if (err == SSL_ERROR_WANT_ASYNC)
+ return 0;
+
+ if (err == SSL_ERROR_SSL)
+ {
+ char buf[512];
+ ERR_error_string (ERR_get_error (), buf);
+ TLS_DBG (2, "[SSL_ERROR_SSL]==>CTX: %p EVT: %p EIDX: %d Buf: %s", ctx,
+ event, event->event_idx, buf);
+ openssl_handle_handshake_failure (ctx);
+ return 0;
+ }
+
+ if (err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ)
+ return 0;
+
+ /* client not supported */
+ if (!SSL_is_server (oc->ssl))
+ return 0;
+
+ /* Need to check transport status */
+ if (ctx->flags & TLS_CONN_F_PASSIVE_CLOSE)
+ {
+ openssl_handle_handshake_failure (ctx);
+ return 0;
+ }
+
+ if (tls_notify_app_accept (ctx))
+ {
+ ctx->c_s_index = SESSION_INVALID_INDEX;
+ tls_disconnect_transport (ctx);
+ }
+
+ TLS_DBG (1,
+ "<=====Handshake for %u complete. TLS cipher is %s EVT: %p =====>",
+ oc->openssl_ctx_index, SSL_get_cipher (oc->ssl), event);
+
+ ctx->flags |= TLS_CONN_F_HS_DONE;
+
+ return 1;
+}
+
+int
+tls_async_read_event_handler (void *async_evt, void *unused)
+{
+ openssl_evt_t *event = (openssl_evt_t *) async_evt;
+ int thread_index = event->thread_idx;
+ session_t *app_session, *tls_session;
+ openssl_ctx_t *oc;
+ tls_ctx_t *ctx;
+ SSL *ssl;
+
+ ASSERT (thread_index == vlib_get_thread_index ());
+ ctx = openssl_ctx_get_w_thread (event->ctx_index, thread_index);
+ oc = (openssl_ctx_t *) ctx;
+ ssl = oc->ssl;
+
+ ctx->flags |= TLS_CONN_F_ASYNC_RD;
+ /* read event */
+ svm_fifo_t *app_rx_fifo, *tls_rx_fifo;
+ int read, err;
+
+ app_session = session_get_from_handle (ctx->app_session_handle);
+ app_rx_fifo = app_session->rx_fifo;
+
+ tls_session = session_get_from_handle (ctx->tls_session_handle);
+ tls_rx_fifo = tls_session->rx_fifo;
+
+ /* continue the paused job */
+ read = openssl_async_read_from_ssl_into_fifo (app_rx_fifo, ssl);
+ err = SSL_get_error (oc->ssl, read);
+
+ if (err == SSL_ERROR_WANT_ASYNC)
+ return 0;
+
+ if (read <= 0)
+ {
+ if (SSL_want_async (ssl))
+ return 0;
+ goto ev_rd_done;
+ }
+
+ /* Unrecoverable protocol error. Reset connection */
+ if (PREDICT_FALSE ((read <= 0) && (err == SSL_ERROR_SSL)))
+ {
+ tls_notify_app_io_error (ctx);
+ goto ev_rd_done;
+ }
+
+ /*
+ * Managed to read some data. If handshake just completed, session
+ * may still be in accepting state.
+ */
+ if (app_session->session_state >= SESSION_STATE_READY)
+ tls_notify_app_enqueue (ctx, app_session);
+
+ev_rd_done:
+ /* read done */
+ ctx->flags &= ~TLS_CONN_F_ASYNC_RD;
+
+ if ((SSL_pending (ssl) > 0) || svm_fifo_max_dequeue_cons (tls_rx_fifo))
+ tls_add_vpp_q_builtin_rx_evt (tls_session);
+
+ return 1;
+}
+
+int
+tls_async_write_event_handler (void *async_evt, void *unused)
+{
+ openssl_evt_t *event = (openssl_evt_t *) async_evt;
+ int thread_index = event->thread_idx;
+ session_t *app_session, *tls_session;
+ openssl_ctx_t *oc;
+ tls_ctx_t *ctx;
+ SSL *ssl;
+
+ ASSERT (thread_index == vlib_get_thread_index ());
+ ctx = openssl_ctx_get_w_thread (event->ctx_index, thread_index);
+ oc = (openssl_ctx_t *) ctx;
+ ssl = oc->ssl;
+
+ /* write event */
+ int wrote = 0;
+ u32 space, enq_buf;
+ svm_fifo_t *app_tx_fifo, *tls_tx_fifo;
+ transport_send_params_t *sp = event->tran_sp;
+
+ app_session = session_get_from_handle (ctx->app_session_handle);
+ app_tx_fifo = app_session->tx_fifo;
+
+ /* Check if already data write is completed or not */
+ if (oc->total_async_write == 0)
+ return 0;
+
+ wrote = openssl_async_write_from_fifo_into_ssl (app_tx_fifo, ssl, oc);
+ if (PREDICT_FALSE (!wrote))
+ {
+ if (SSL_want_async (ssl))
+ return 0;
+ }
+
+ /* Unrecoverable protocol error. Reset connection */
+ if (PREDICT_FALSE (wrote < 0))
+ {
+ tls_notify_app_io_error (ctx);
+ return 0;
+ }
+
+ tls_session = session_get_from_handle (ctx->tls_session_handle);
+ tls_tx_fifo = tls_session->tx_fifo;
+
+ /* prepare for remaining write(s) */
+ space = svm_fifo_max_enqueue_prod (tls_tx_fifo);
+ /* Leave a bit of extra space for tls ctrl data, if any needed */
+ space = clib_max ((int) space - TLSO_CTRL_BYTES, 0);
+
+ if (svm_fifo_needs_deq_ntf (app_tx_fifo, wrote))
+ session_dequeue_notify (app_session);
+
+ /* we got here, async write is done */
+ oc->total_async_write = 0;
+
+ if (PREDICT_FALSE (ctx->flags & TLS_CONN_F_APP_CLOSED &&
+ BIO_ctrl_pending (oc->rbio) <= 0))
+ openssl_confirm_app_close (ctx);
+
+ /* Deschedule and wait for deq notification if fifo is almost full */
+ enq_buf = clib_min (svm_fifo_size (tls_tx_fifo) / 2, TLSO_MIN_ENQ_SPACE);
+ if (space < wrote + enq_buf)
+ {
+ svm_fifo_add_want_deq_ntf (tls_tx_fifo, SVM_FIFO_WANT_DEQ_NOTIF);
+ transport_connection_deschedule (&ctx->connection);
+ sp->flags |= TRANSPORT_SND_F_DESCHED;
+ }
+ else
+ {
+ /* Request tx reschedule of the app session */
+ app_session->flags |= SESSION_F_CUSTOM_TX;
+ transport_connection_reschedule (&ctx->connection);
+ }
+
+ return 1;
+}
+
static uword
tls_async_process (vlib_main_t * vm, vlib_node_runtime_t * rt,
vlib_frame_t * f)