Diag-Client-Lib
tls_client_.cpp
Go to the documentation of this file.
1 /* Diagnostic Client library
2  * Copyright (C) 2024 Avijit Dey
3  *
4  * This Source Code Form is subject to the terms of the Mozilla Public
5  * License, v. 2.0. If a copy of the MPL was not distributed with this
6  * file, You can obtain one at http://mozilla.org/MPL/2.0/.
7  */
8 
10 
11 #include <utility>
12 
14 
15 namespace boost_support {
16 namespace socket {
17 namespace tcp {
18 namespace {
19 
20 void print_cn_name(const char *label, X509_NAME *const name) {
21  int idx = -1, success = 0;
22  unsigned char *utf8 = NULL;
23 
24  do {
25  if (!name) break; /* failed */
26 
27  idx = X509_NAME_get_index_by_NID(name, NID_commonName, -1);
28  if (!(idx > -1)) break; /* failed */
29 
30  X509_NAME_ENTRY *entry = X509_NAME_get_entry(name, idx);
31  if (!entry) break; /* failed */
32 
33  ASN1_STRING *data = X509_NAME_ENTRY_get_data(entry);
34  if (!data) break; /* failed */
35 
36  int length = ASN1_STRING_to_UTF8(&utf8, data);
37  if (!utf8 || !(length > 0)) break; /* failed */
38 
39  fprintf(stdout, " %s: %s\n", label, utf8);
40  success = 1;
41 
42  } while (0);
43 
44  if (utf8) OPENSSL_free(utf8);
45 
46  if (!success) fprintf(stdout, " %s: <not available>\n", label);
47 }
48 
49 } // namespace
50 
51 TlsClientSocket::TlsClientSocket(std::string_view local_ip_address, std::uint16_t local_port_num,
52  TcpHandlerRead tcp_handler_read,
53  std::string_view ca_certification_path)
54  : local_ip_address_{local_ip_address},
55  local_port_num_{local_port_num},
56  io_context_{},
57  io_ssl_context_{boost::asio::ssl::context::tlsv13_client},
58  tls_socket_{io_context_, io_ssl_context_},
59  exit_request_{false},
60  running_{false},
61  cond_var_{},
62  mutex_{},
63  thread_{},
64  tcp_handler_read_{std::move(tcp_handler_read)} {
65  // Set verification mode
66  tls_socket_.set_verify_mode(boost::asio::ssl::verify_peer);
67  // Set the verification callback
68  tls_socket_.set_verify_callback(
69  [](bool pre_verified, boost::asio::ssl::verify_context &ctx) noexcept -> bool {
70  X509 *cert = X509_STORE_CTX_get_current_cert(ctx.native_handle());
71  int depth = X509_STORE_CTX_get_error_depth(ctx.native_handle());
72 
73  fprintf(stdout, "verify_callback (depth=%d)(preverify=%d)\n", depth, pre_verified);
74 
75  X509_NAME *iname = cert ? X509_get_issuer_name(cert) : nullptr;
76  X509_NAME *sname = cert ? X509_get_subject_name(cert) : nullptr;
77 
78  /* Issuer is the authority we trust that warrants nothing useful */
79  print_cn_name("Issuer (cn)", iname);
80  /* Subject is who the certificate is issued to by the authority */
81  print_cn_name("Subject (cn)", sname);
82  return true;
83  });
84  // Load the root CA certificates
85  io_ssl_context_.load_verify_file(std::string{ca_certification_path});
86 
87  SSL_set_ciphersuites(tls_socket_.native_handle(),
88  "TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_"
89  "CHACHA20_POLY1305_SHA256");
90 
91  // Start thread to receive messages
92  thread_ = std::thread([this]() {
93  std::unique_lock<std::mutex> lck(mutex_);
94  while (!exit_request_) {
95  if (!running_) {
96  cond_var_.wait(lck, [this]() { return exit_request_ || running_; });
97  }
98  if (!exit_request_.load()) {
99  if (running_) {
100  lck.unlock();
101  HandleMessage();
102  lck.lock();
103  }
104  }
105  }
106  });
107 }
108 
110  {
111  std::unique_lock<std::mutex> lck(mutex_);
112  exit_request_ = true;
113  running_ = false;
114  }
115  cond_var_.notify_all();
116  thread_.join();
117 }
118 
121  TcpErrorCodeType ec{};
122 
123  // Open the socket
124  GetNativeTcpSocket().open(Tcp::v4(), ec);
125  if (ec.value() == boost::system::errc::success) {
126  // Re-use address
127  GetNativeTcpSocket().set_option(boost::asio::socket_base::reuse_address{true});
128  // Set socket to non blocking
129  GetNativeTcpSocket().non_blocking(false);
130  // Bind to local ip address and random port
131  GetNativeTcpSocket().bind(
132  Tcp::endpoint(TcpIpAddress::from_string(local_ip_address_), local_port_num_), ec);
133 
134  if (ec.value() == boost::system::errc::success) {
135  // Socket binding success
137  FILE_NAME, __LINE__, __func__, [this](std::stringstream &msg) {
138  Tcp::endpoint const endpoint_{GetNativeTcpSocket().local_endpoint()};
139  msg << "Tcp Socket opened and bound to "
140  << "<" << endpoint_.address().to_string() << "," << endpoint_.port() << ">";
141  });
142  result.EmplaceValue();
143  } else {
144  // Socket binding failed
146  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
147  msg << "Tcp Socket binding failed with message: " << ec.message();
148  });
149  result.EmplaceError(TlsErrorCode::kBindingFailed);
150  }
151  } else {
153  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
154  msg << "Tcp Socket opening failed with error: " << ec.message();
155  });
156  result.EmplaceError(TlsErrorCode::kOpenFailed);
157  }
158  return result;
159 }
160 
162  std::string_view host_ip_address, std::uint16_t host_port_num) {
164  TcpErrorCodeType ec{};
165 
166  // Connect to provided Ip address
167  GetNativeTcpSocket().connect(
168  Tcp::endpoint(TcpIpAddress::from_string(std::string{host_ip_address}), host_port_num), ec);
169  if (ec.value() == boost::system::errc::success) {
171  FILE_NAME, __LINE__, __func__, [this](std::stringstream &msg) {
172  Tcp::endpoint const endpoint_{GetNativeTcpSocket().remote_endpoint()};
173  msg << "Tcp Socket connected to host "
174  << "<" << endpoint_.address().to_string() << "," << endpoint_.port() << ">";
175  });
176  // Perform TLS handshake
177  tls_socket_.handshake(boost::asio::ssl::stream_base::client, ec);
178  if (ec.value() == boost::system::errc::success) {
179  { // start reading
180  std::lock_guard<std::mutex> lock{mutex_};
181  running_ = true;
182  }
183  cond_var_.notify_all();
184  printf("Connected with %s encryption\n", SSL_get_cipher(tls_socket_.native_handle()));
185  result.EmplaceValue();
186  } else {
188  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
189  msg << "Tls client handshake with host failed with error: " << ec.message();
190  });
191  result.EmplaceError(TlsErrorCode::kTlsHandshakeFailed);
192  }
193  } else {
195  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
196  msg << "Tcp Socket connect to host failed with error: " << ec.message();
197  });
198  result.EmplaceError(TlsErrorCode::kConnectFailed);
199  }
200  return result;
201 }
202 
205  TcpErrorCodeType ec{};
206  // Shutdown TLS connection
207  tls_socket_.shutdown(ec);
208  // Shutdown of TCP connection
209  GetNativeTcpSocket().shutdown(TcpSocket::shutdown_both, ec);
210 
211  if (ec.value() == boost::system::errc::success) {
212  {
213  std::lock_guard<std::mutex> lock{mutex_};
214  // stop reading
215  running_ = false;
216  }
217  // Socket shutdown success
218  result.EmplaceValue();
219  } else {
221  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
222  msg << "Tcp Socket disconnection from host failed with error: " << ec.message();
223  });
224  }
225  return result;
226 }
227 
229  message::tcp::TcpMessageConstPtr tcp_message) {
231  TcpErrorCodeType ec{};
232 
233  boost::asio::write(
234  tls_socket_,
235  boost::asio::buffer(tcp_message->GetPayload().data(), tcp_message->GetPayload().size()), ec);
236  // Check for error
237  if (ec.value() == boost::system::errc::success) {
239  FILE_NAME, __LINE__, __func__, [this](std::stringstream &msg) {
240  Tcp::endpoint const endpoint_{GetNativeTcpSocket().remote_endpoint()};
241  msg << "Tcp message sent to "
242  << "<" << endpoint_.address().to_string() << "," << endpoint_.port() << ">";
243  });
244  result.EmplaceValue();
245  } else {
247  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
248  msg << "Tcp message sending failed with error: " << ec.message();
249  });
250  }
251  return result;
252 }
253 
256  // destroy the socket
257  GetNativeTcpSocket().close();
258  result.EmplaceValue();
259  return result;
260 }
261 
263  TcpErrorCodeType ec{};
264  // create and reserve the buffer
266  rx_buffer.resize(message::tcp::kDoipheadrSize);
267  // start blocking read to read Header first
268  boost::asio::read(tls_socket_, boost::asio::buffer(&rx_buffer[0u], message::tcp::kDoipheadrSize),
269  ec);
270  // Check for error
271  if (ec.value() == boost::system::errc::success) {
272  // read the next bytes to read
273  std::uint32_t const read_next_bytes = [&rx_buffer]() noexcept -> std::uint32_t {
274  return static_cast<std::uint32_t>(
275  (static_cast<std::uint32_t>(rx_buffer[4u] << 24u) & 0xFF000000) |
276  (static_cast<std::uint32_t>(rx_buffer[5u] << 16u) & 0x00FF0000) |
277  (static_cast<std::uint32_t>(rx_buffer[6u] << 8u) & 0x0000FF00) |
278  (static_cast<std::uint32_t>(rx_buffer[7u] & 0x000000FF)));
279  }();
280 
281  if (read_next_bytes != 0u) {
282  // reserve the buffer
283  rx_buffer.resize(message::tcp::kDoipheadrSize + std::size_t(read_next_bytes));
284  boost::asio::read(
285  tls_socket_,
286  boost::asio::buffer(&rx_buffer[message::tcp::kDoipheadrSize], read_next_bytes), ec);
287 
288  // all message received, transfer to upper layer
289  Tcp::endpoint const endpoint_{GetNativeTcpSocket().remote_endpoint()};
290  message::tcp::TcpMessagePtr tcp_rx_message{std::make_unique<message::tcp::TcpMessage>(
291  endpoint_.address().to_string(), endpoint_.port(), std::move(rx_buffer))};
293  FILE_NAME, __LINE__, __func__, [endpoint_](std::stringstream &msg) {
294  msg << "Tcp Message received from "
295  << "<" << endpoint_.address().to_string() << "," << endpoint_.port() << ">";
296  });
297  // notify upper layer about received message
298  tcp_handler_read_(std::move(tcp_rx_message));
299  } else {
301  FILE_NAME, __LINE__, __func__,
302  [](std::stringstream &msg) { msg << "Tcp Message read ignored as header size is zero"; });
303  }
304  } else if (ec.value() == boost::asio::error::eof) {
305  running_ = false;
307  FILE_NAME, __LINE__, __func__,
308  [ec](std::stringstream &msg) { msg << "Remote Disconnected with: " << ec.message(); });
309  } else {
310  running_ = false;
312  FILE_NAME, __LINE__, __func__, [ec](std::stringstream &msg) {
313  msg << "Remote Disconnected with undefined error: " << ec.message();
314  });
315  }
316 }
317 
318 TlsClientSocket::TlsStream::lowest_layer_type &TlsClientSocket::GetNativeTcpSocket() {
319  return tls_socket_.lowest_layer();
320 }
321 
322 } // namespace tcp
323 } // namespace socket
324 } // namespace boost_support
static auto GetLibBoostLogger() noexcept -> LibBoostLogger &
Definition: logger.h:20
std::vector< std::uint8_t > BufferType
Type alias for underlying buffer.
Definition: tcp_message.h:49
TlsStream::lowest_layer_type & GetNativeTcpSocket()
Function to get the native tcp socket under tls socket.
core_type::Result< void, TlsErrorCode > DisconnectFromHost()
Function to Disconnect from host.
std::uint16_t local_port_num_
Store local port number.
Definition: tls_client_.h:136
std::atomic_bool exit_request_
Flag to terminate the thread.
Definition: tls_client_.h:156
TlsClientSocket(std::string_view local_ip_address, std::uint16_t local_port_num, TcpHandlerRead tcp_handler_read, std::string_view ca_certification_path)
Constructs an instance of TlsClientSocket.
Definition: tls_client_.cpp:51
std::thread thread_
The thread itself.
Definition: tls_client_.h:176
core_type::Result< void, TlsErrorCode > ConnectToHost(std::string_view host_ip_address, std::uint16_t host_port_num)
Function to connect to remote ip address and port number.
core_type::Result< void, TlsErrorCode > Open()
Function to Open the socket.
std::function< void(message::tcp::TcpMessagePtr)> TcpHandlerRead
Tcp function template used for reception.
Definition: tls_client_.h:43
core_type::Result< void, TlsErrorCode > Transmit(message::tcp::TcpMessageConstPtr tcp_message)
Function to trigger transmission.
core_type::Result< void, TlsErrorCode > Destroy()
Function to destroy the socket.
boost::asio::ssl::context io_ssl_context_
boost io ssl context
Definition: tls_client_.h:146
boost::system::error_code TcpErrorCodeType
Type alias for tcp error codes.
Definition: tls_client_.h:126
~TlsClientSocket()
Destruct an instance of TcpClientSocket.
std::mutex mutex_
mutex to lock critical section
Definition: tls_client_.h:171
void HandleMessage()
Function to handle the reception of tcp message.
std::string local_ip_address_
Store local ip address.
Definition: tls_client_.h:131
std::atomic_bool running_
Flag to start the thread.
Definition: tls_client_.h:161
TlsStream tls_socket_
Store ssl socket.
Definition: tls_client_.h:151
std::condition_variable cond_var_
Conditional variable to block the thread.
Definition: tls_client_.h:166
TcpHandlerRead tcp_handler_read_
Store the handler.
Definition: tls_client_.h:181
Class type to contains a value (of type ValueType), or an error (of type ErrorType)
Definition: result.h:29
#define FILE_NAME
Definition: file_path.h:14
std::unique_ptr< TcpMessage > TcpMessagePtr
The unique pointer to TcpMessage.
Definition: tcp_message.h:151
std::unique_ptr< TcpMessage const > TcpMessageConstPtr
The unique pointer to const TcpMessage.
Definition: tcp_message.h:146
constexpr std::uint8_t kDoipheadrSize
Doip HeaderSize.
Definition: tcp_message.h:156
void print_cn_name(const char *label, X509_NAME *const name)
Definition: tls_client_.cpp:20