Wire Sysio Wire Sysion 1.0.0
Loading...
Searching...
No Matches
tls.hpp
Go to the documentation of this file.
1/*
2 * Copyright (c) 2015, Peter Thorson. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 * * Redistributions of source code must retain the above copyright
7 * notice, this list of conditions and the following disclaimer.
8 * * Redistributions in binary form must reproduce the above copyright
9 * notice, this list of conditions and the following disclaimer in the
10 * documentation and/or other materials provided with the distribution.
11 * * Neither the name of the WebSocket++ Project nor the
12 * names of its contributors may be used to endorse or promote products
13 * derived from this software without specific prior written permission.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
16 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL PETER THORSON BE LIABLE FOR ANY
19 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
20 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
21 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
22 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
24 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 *
26 */
27
28#ifndef WEBSOCKETPP_TRANSPORT_SECURITY_TLS_HPP
29#define WEBSOCKETPP_TRANSPORT_SECURITY_TLS_HPP
30
32
33#include <websocketpp/uri.hpp>
34
40
41#include <sstream>
42#include <string>
43
44namespace websocketpp {
45namespace transport {
46namespace asio {
49namespace tls_socket {
50
52typedef lib::function<void(connection_hdl,lib::asio::ssl::stream<
53 lib::asio::ip::tcp::socket>&)> socket_init_handler;
55typedef lib::function<lib::shared_ptr<lib::asio::ssl::context>(connection_hdl)>
57
59
63class connection : public lib::enable_shared_from_this<connection> {
64public:
68 typedef lib::shared_ptr<type> ptr;
69
71 typedef lib::asio::ssl::stream<lib::asio::ip::tcp::socket> socket_type;
73 typedef lib::shared_ptr<socket_type> socket_ptr;
75 typedef lib::asio::io_service * io_service_ptr;
77 typedef lib::shared_ptr<lib::asio::io_service::strand> strand_ptr;
79 typedef lib::shared_ptr<lib::asio::ssl::context> context_ptr;
80
81 explicit connection() {
82 //std::cout << "transport::asio::tls_socket::connection constructor"
83 // << std::endl;
84 }
85
88 return shared_from_this();
89 }
90
92
95 bool is_secure() const {
96 return true;
97 }
98
100
103 socket_type::lowest_layer_type & get_raw_socket() {
104 return m_socket->lowest_layer();
105 }
106
108
111 socket_type::next_layer_type & get_next_layer() {
112 return m_socket->next_layer();
113 }
114
116
120 return *m_socket;
121 }
122
124
132 m_socket_init_handler = h;
133 }
134
136
145 m_tls_init_handler = h;
146 }
147
149
158 std::string get_remote_endpoint(lib::error_code & ec) const {
159 std::stringstream s;
160
161 lib::asio::error_code aec;
162 lib::asio::ip::tcp::endpoint ep = m_socket->lowest_layer().remote_endpoint(aec);
163
164 if (aec) {
166 s << "Error getting remote endpoint: " << aec
167 << " (" << aec.message() << ")";
168 return s.str();
169 } else {
170 ec = lib::error_code();
171 s << ep;
172 return s.str();
173 }
174 }
175protected:
177
185 lib::error_code init_asio (io_service_ptr service, strand_ptr strand,
186 bool is_server)
187 {
188 if (!m_tls_init_handler) {
190 }
191 m_context = m_tls_init_handler(m_hdl);
192
193 if (!m_context) {
195 }
196 m_socket = lib::make_shared<socket_type>(*service, *m_context);
197
198 m_io_service = service;
199 m_strand = strand;
200 m_is_server = is_server;
201
202 return lib::error_code();
203 }
204
206
217 void set_uri(uri_ptr u) {
218 m_uri = u;
219 }
220
222
230 void pre_init(init_handler callback) {
231 // TODO: is this the best way to check whether this function is
232 // available in the version of OpenSSL being used?
233 // TODO: consider case where host is an IP address
234#if OPENSSL_VERSION_NUMBER >= 0x90812f
235 if (!m_is_server) {
236 // For clients on systems with a suitable OpenSSL version, set the
237 // TLS SNI hostname header so connecting to TLS servers using SNI
238 // will work.
239 long res = SSL_set_tlsext_host_name(
240 get_socket().native_handle(), m_uri->get_host().c_str());
241 if (!(1 == res)) {
243 }
244 }
245#endif
246
247 if (m_socket_init_handler) {
248 m_socket_init_handler(m_hdl,get_socket());
249 }
250
251 callback(lib::error_code());
252 }
253
255
262 void post_init(init_handler callback) {
264
265 // TLS handshake
266 if (m_strand) {
267 m_socket->async_handshake(
268 get_handshake_type(),
269 m_strand->wrap(lib::bind(
271 callback,
272 lib::placeholders::_1
273 ))
274 );
275 } else {
276 m_socket->async_handshake(
277 get_handshake_type(),
278 lib::bind(
280 callback,
281 lib::placeholders::_1
282 )
283 );
284 }
285 }
286
288
295 m_hdl = hdl;
296 }
297
298 void handle_init(init_handler callback,lib::asio::error_code const & ec) {
299 if (ec) {
301 } else {
302 m_ec = lib::error_code();
303 }
304
305 callback(m_ec);
306 }
307
308 lib::error_code get_ec() const {
309 return m_ec;
310 }
311
313
321 lib::asio::error_code cancel_socket() {
322 lib::asio::error_code ec;
323 get_raw_socket().cancel(ec);
324 return ec;
325 }
326
328 if (m_strand) {
329 m_socket->async_shutdown(m_strand->wrap(callback));
330 } else {
331 m_socket->async_shutdown(callback);
332 }
333 }
334
336
354 template <typename ErrorCodeType>
355 lib::error_code translate_ec(ErrorCodeType ec) {
356 if (ec.category() == lib::asio::error::get_ssl_category()) {
357 // We know it is a TLS related error, but otherwise don't know
358 // more. Pass through as TLS generic.
359 return make_error_code(transport::error::tls_error);
360 } else {
361 // We don't know any more information about this error so pass
362 // through
363 return make_error_code(transport::error::pass_through);
364 }
365 }
366
369 lib::error_code translate_ec(lib::error_code ec) {
370 // Normalize the tls_short_read error as it is used by the library and
371 // needs a consistent value. All other errors pass through natively.
372 // TODO: how to get the SSL category from std::error?
373 /*if (ec.category() == lib::asio::error::get_ssl_category()) {
374 if (ERR_GET_REASON(ec.value()) == SSL_R_SHORT_READ) {
375 return make_error_code(transport::error::tls_short_read);
376 }
377 }*/
378 return ec;
379 }
380private:
381 socket_type::handshake_type get_handshake_type() {
382 if (m_is_server) {
383 return lib::asio::ssl::stream_base::server;
384 } else {
385 return lib::asio::ssl::stream_base::client;
386 }
387 }
388
389 io_service_ptr m_io_service;
390 strand_ptr m_strand;
391 context_ptr m_context;
392 socket_ptr m_socket;
393 uri_ptr m_uri;
394 bool m_is_server;
395
396 lib::error_code m_ec;
397
398 connection_hdl m_hdl;
399 socket_init_handler m_socket_init_handler;
400 tls_init_handler m_tls_init_handler;
401};
402
404
408class endpoint {
409public:
411 typedef endpoint type;
412
418
419 explicit endpoint() {}
420
422
425 bool is_secure() const {
426 return true;
427 }
428
430
438 m_socket_init_handler = h;
439 }
440
442
451 m_tls_init_handler = h;
452 }
453protected:
455
463 lib::error_code init(socket_con_ptr scon) {
464 scon->set_socket_init_handler(m_socket_init_handler);
465 scon->set_tls_init_handler(m_tls_init_handler);
466 return lib::error_code();
467 }
468
469private:
470 socket_init_handler m_socket_init_handler;
471 tls_init_handler m_tls_init_handler;
472};
473
474} // namespace tls_socket
475} // namespace asio
476} // namespace transport
477} // namespace websocketpp
478
479#endif // WEBSOCKETPP_TRANSPORT_SECURITY_TLS_HPP
TLS enabled Asio connection socket component.
Definition tls.hpp:63
lib::asio::ssl::stream< lib::asio::ip::tcp::socket > socket_type
Type of the ASIO socket being used.
Definition tls.hpp:71
bool is_secure() const
Check whether or not this connection is secure.
Definition tls.hpp:95
lib::error_code init_asio(io_service_ptr service, strand_ptr strand, bool is_server)
Perform one time initializations.
Definition tls.hpp:185
void pre_init(init_handler callback)
Pre-initialize security policy.
Definition tls.hpp:230
std::string get_remote_endpoint(lib::error_code &ec) const
Get the remote endpoint address.
Definition tls.hpp:158
void set_handle(connection_hdl hdl)
Sets the connection handle.
Definition tls.hpp:294
void async_shutdown(socket::shutdown_handler callback)
Definition tls.hpp:327
lib::asio::io_service * io_service_ptr
Type of a pointer to the ASIO io_service being used.
Definition tls.hpp:75
socket_type & get_socket()
Retrieve a pointer to the wrapped socket.
Definition tls.hpp:119
connection type
Type of this connection socket component.
Definition tls.hpp:66
lib::shared_ptr< type > ptr
Type of a shared pointer to this connection socket component.
Definition tls.hpp:68
lib::error_code translate_ec(ErrorCodeType ec)
Translate any security policy specific information about an error code.
Definition tls.hpp:355
socket_type::lowest_layer_type & get_raw_socket()
Retrieve a pointer to the underlying socket.
Definition tls.hpp:103
void set_socket_init_handler(socket_init_handler h)
Set the socket initialization handler.
Definition tls.hpp:131
void set_tls_init_handler(tls_init_handler h)
Set TLS init handler.
Definition tls.hpp:144
lib::shared_ptr< lib::asio::io_service::strand > strand_ptr
Type of a pointer to the ASIO io_service strand being used.
Definition tls.hpp:77
void handle_init(init_handler callback, lib::asio::error_code const &ec)
Definition tls.hpp:298
lib::error_code translate_ec(lib::error_code ec)
Definition tls.hpp:369
void set_uri(uri_ptr u)
Set hostname hook.
Definition tls.hpp:217
void post_init(init_handler callback)
Post-initialize security policy.
Definition tls.hpp:262
ptr get_shared()
Get a shared pointer to this component.
Definition tls.hpp:87
socket_type::next_layer_type & get_next_layer()
Retrieve a pointer to the layer below the ssl stream.
Definition tls.hpp:111
lib::shared_ptr< socket_type > socket_ptr
Type of a shared pointer to the ASIO socket being used.
Definition tls.hpp:73
lib::shared_ptr< lib::asio::ssl::context > context_ptr
Type of a shared pointer to the ASIO TLS context being used.
Definition tls.hpp:79
lib::asio::error_code cancel_socket()
Cancel all async operations on this socket.
Definition tls.hpp:321
TLS enabled Asio endpoint socket component.
Definition tls.hpp:408
lib::error_code init(socket_con_ptr scon)
Initialize a connection.
Definition tls.hpp:463
void set_tls_init_handler(tls_init_handler h)
Set TLS init handler.
Definition tls.hpp:450
bool is_secure() const
Checks whether the endpoint creates secure connections.
Definition tls.hpp:425
endpoint type
The type of this endpoint socket component.
Definition tls.hpp:411
connection socket_con_type
The type of the corresponding connection socket component.
Definition tls.hpp:414
void set_socket_init_handler(socket_init_handler h)
Set socket init handler.
Definition tls.hpp:437
websocketpp::lib::shared_ptr< boost::asio::ssl::context > context_ptr
lib::error_code make_error_code(error::value e)
Create an error code with the given value and the asio transport category.
Definition base.hpp:217
@ pass_through
there was an error in the underlying transport library
Definition base.hpp:171
@ missing_tls_init_handler
Required tls_init handler not present.
Definition base.hpp:99
@ tls_failed_sni_hostname
Failed to set TLS SNI hostname.
Definition base.hpp:105
@ tls_handshake_failed
TLS Handshake Failed.
Definition base.hpp:102
@ tls_handshake_timeout
TLS Handshake Timeout.
Definition base.hpp:93
lib::function< void(lib::asio::error_code const &)> shutdown_handler
Definition base.hpp:67
lib::error_code make_error_code(error::value e)
Definition base.hpp:147
lib::function< void(connection_hdl, lib::asio::ssl::stream< lib::asio::ip::tcp::socket > &)> socket_init_handler
The signature of the socket_init_handler for this socket policy.
Definition tls.hpp:53
lib::function< lib::shared_ptr< lib::asio::ssl::context >(connection_hdl)> tls_init_handler
The signature of the tls_init_handler for this socket policy.
Definition tls.hpp:56
@ pass_through
underlying transport pass through
lib::function< void(lib::error_code const &)> init_handler
The type and signature of the callback passed to the init hook.
Namespace for the WebSocket++ project.
Definition base64.hpp:41
lib::weak_ptr< void > connection_hdl
A handle to uniquely identify a connection.
lib::shared_ptr< uri > uri_ptr
Pointer to a URI.
Definition uri.hpp:351
char * s