xref: /openbmc/qemu/migration/tls.c (revision 5ade579b)
1 /*
2  * QEMU migration TLS support
3  *
4  * Copyright (c) 2015 Red Hat, Inc.
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18  *
19  */
20 
21 #include "qemu/osdep.h"
22 #include "channel.h"
23 #include "migration.h"
24 #include "tls.h"
25 #include "crypto/tlscreds.h"
26 #include "qemu/error-report.h"
27 #include "qapi/error.h"
28 #include "trace.h"
29 
30 static QCryptoTLSCreds *
31 migration_tls_get_creds(MigrationState *s,
32                         QCryptoTLSCredsEndpoint endpoint,
33                         Error **errp)
34 {
35     Object *creds;
36     QCryptoTLSCreds *ret;
37 
38     creds = object_resolve_path_component(
39         object_get_objects_root(), s->parameters.tls_creds);
40     if (!creds) {
41         error_setg(errp, "No TLS credentials with id '%s'",
42                    s->parameters.tls_creds);
43         return NULL;
44     }
45     ret = (QCryptoTLSCreds *)object_dynamic_cast(
46         creds, TYPE_QCRYPTO_TLS_CREDS);
47     if (!ret) {
48         error_setg(errp, "Object with id '%s' is not TLS credentials",
49                    s->parameters.tls_creds);
50         return NULL;
51     }
52     if (ret->endpoint != endpoint) {
53         error_setg(errp,
54                    "Expected TLS credentials for a %s endpoint",
55                    endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT ?
56                    "client" : "server");
57         return NULL;
58     }
59 
60     return ret;
61 }
62 
63 
64 static void migration_tls_incoming_handshake(QIOTask *task,
65                                              gpointer opaque)
66 {
67     QIOChannel *ioc = QIO_CHANNEL(qio_task_get_source(task));
68     Error *err = NULL;
69 
70     if (qio_task_propagate_error(task, &err)) {
71         trace_migration_tls_incoming_handshake_error(error_get_pretty(err));
72         error_report_err(err);
73     } else {
74         trace_migration_tls_incoming_handshake_complete();
75         migration_channel_process_incoming(ioc);
76     }
77     object_unref(OBJECT(ioc));
78 }
79 
80 void migration_tls_channel_process_incoming(MigrationState *s,
81                                             QIOChannel *ioc,
82                                             Error **errp)
83 {
84     QCryptoTLSCreds *creds;
85     QIOChannelTLS *tioc;
86 
87     creds = migration_tls_get_creds(
88         s, QCRYPTO_TLS_CREDS_ENDPOINT_SERVER, errp);
89     if (!creds) {
90         return;
91     }
92 
93     tioc = qio_channel_tls_new_server(
94         ioc, creds,
95         s->parameters.tls_authz,
96         errp);
97     if (!tioc) {
98         return;
99     }
100 
101     trace_migration_tls_incoming_handshake_start();
102     qio_channel_set_name(QIO_CHANNEL(tioc), "migration-tls-incoming");
103     qio_channel_tls_handshake(tioc,
104                               migration_tls_incoming_handshake,
105                               NULL,
106                               NULL,
107                               NULL);
108 }
109 
110 
111 static void migration_tls_outgoing_handshake(QIOTask *task,
112                                              gpointer opaque)
113 {
114     MigrationState *s = opaque;
115     QIOChannel *ioc = QIO_CHANNEL(qio_task_get_source(task));
116     Error *err = NULL;
117 
118     if (qio_task_propagate_error(task, &err)) {
119         trace_migration_tls_outgoing_handshake_error(error_get_pretty(err));
120     } else {
121         trace_migration_tls_outgoing_handshake_complete();
122     }
123     migration_channel_connect(s, ioc, NULL, err);
124     object_unref(OBJECT(ioc));
125 }
126 
127 QIOChannelTLS *migration_tls_client_create(MigrationState *s,
128                                            QIOChannel *ioc,
129                                            const char *hostname,
130                                            Error **errp)
131 {
132     QCryptoTLSCreds *creds;
133     QIOChannelTLS *tioc;
134 
135     creds = migration_tls_get_creds(
136         s, QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT, errp);
137     if (!creds) {
138         return NULL;
139     }
140 
141     if (s->parameters.tls_hostname && *s->parameters.tls_hostname) {
142         hostname = s->parameters.tls_hostname;
143     }
144     if (!hostname) {
145         error_setg(errp, "No hostname available for TLS");
146         return NULL;
147     }
148 
149     tioc = qio_channel_tls_new_client(
150         ioc, creds, hostname, errp);
151 
152     return tioc;
153 }
154 
155 void migration_tls_channel_connect(MigrationState *s,
156                                    QIOChannel *ioc,
157                                    const char *hostname,
158                                    Error **errp)
159 {
160     QIOChannelTLS *tioc;
161 
162     tioc = migration_tls_client_create(s, ioc, hostname, errp);
163     if (!tioc) {
164         return;
165     }
166 
167     /* Save hostname into MigrationState for handshake */
168     s->hostname = g_strdup(hostname);
169     trace_migration_tls_outgoing_handshake_start(hostname);
170     qio_channel_set_name(QIO_CHANNEL(tioc), "migration-tls-outgoing");
171     qio_channel_tls_handshake(tioc,
172                               migration_tls_outgoing_handshake,
173                               s,
174                               NULL,
175                               NULL);
176 }
177