2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
20#ifndef APPS_ECHO_MODEL_SERVER_H
21#define APPS_ECHO_MODEL_SERVER_H
23#include "log/Logger.h"
26#define STR_INCLUDE(a) #a
29#define SOCKETSERVER_INCLUDE QUOTE_INCLUDE(net/NET/stream/STREAM/SocketServer.h)
32#include SOCKETSERVER_INCLUDE
36#ifndef DOXYGEN_SHOULD_SKIP_THIS
40#if (STREAM_TYPE == TLS)
42#include <openssl/ssl.h>
43#include <openssl/x509v3.h>
48#if (STREAM_TYPE == LEGACY)
50namespace apps::echo::model::
legacy {
55 return EchoSocketServer(
"echoserver");
60#elif (STREAM_TYPE == TLS)
62namespace apps::echo::model::tls {
64 using EchoSocketServer = net::NET::stream::tls::SocketServer<EchoServerSocketContextFactory>;
65 using SocketConnection = EchoSocketServer::SocketConnection;
67 EchoSocketServer getServer() {
68 EchoSocketServer server(
"echoserver");
70 server.setOnConnect([&server](SocketConnection* socketConnection) {
71 VLOG(1) <<
"OnConnect " << server.getConfig().getInstanceName();
73 VLOG(1) <<
"\tLocal: " << socketConnection->getLocalAddress().toString();
74 VLOG(1) <<
"\tPeer: " << socketConnection->getRemoteAddress().toString();
86 server.setOnConnected([&server](SocketConnection* socketConnection) {
87 VLOG(1) <<
"OnConnected " << server.getConfig().getInstanceName();
89 X509* server_cert = SSL_get_peer_certificate(socketConnection->getSSL());
90 if (server_cert !=
nullptr) {
91 long verifyErr = SSL_get_verify_result(socketConnection->getSSL());
93 VLOG(1) <<
"\tPeer certificate verifyErr = " + std::to_string(verifyErr) +
": " +
94 std::string(X509_verify_cert_error_string(verifyErr));
96 char* str = X509_NAME_oneline(X509_get_subject_name(server_cert),
nullptr, 0);
97 VLOG(1) <<
"\t Subject: " + std::string(str);
100 str = X509_NAME_oneline(X509_get_issuer_name(server_cert),
nullptr, 0);
101 VLOG(1) <<
"\t Issuer: " + std::string(str);
106 GENERAL_NAMES* subjectAltNames =
107 static_cast<GENERAL_NAMES*>(X509_get_ext_d2i(server_cert, NID_subject_alt_name,
nullptr,
nullptr));
109#pragma GCC diagnostic push
111#if __has_warning("-Wused-but-marked-unused")
112#pragma GCC diagnostic ignored "-Wused-but-marked-unused"
116 int32_t altNameCount = sk_GENERAL_NAME_num(subjectAltNames);
118#pragma GCC diagnostic pop
120 VLOG(1) <<
"\t Subject alternative name count: " << altNameCount;
121 for (int32_t i = 0; i < altNameCount; ++i) {
123#pragma GCC diagnostic push
125#if __has_warning("-Wused-but-marked-unused")
126#pragma GCC diagnostic ignored "-Wused-but-marked-unused"
130 GENERAL_NAME* generalName = sk_GENERAL_NAME_value(subjectAltNames, i);
132#pragma GCC diagnostic pop
134 if (generalName->type == GEN_URI) {
135 std::string subjectAltName =
136 std::string(
reinterpret_cast<
const char*>(ASN1_STRING_get0_data(generalName->d.uniformResourceIdentifier)),
137 static_cast<std::size_t>(ASN1_STRING_length(generalName->d.uniformResourceIdentifier)));
138 VLOG(1) <<
"\t SAN (URI): '" + subjectAltName;
139 }
else if (generalName->type == GEN_DNS) {
140 std::string subjectAltName =
141 std::string(
reinterpret_cast<
const char*>(ASN1_STRING_get0_data(generalName->d.dNSName)),
142 static_cast<std::size_t>(ASN1_STRING_length(generalName->d.dNSName)));
143 VLOG(1) <<
"\t SAN (DNS): '" + subjectAltName;
145 VLOG(1) <<
"\t SAN (Type): '" + std::to_string(generalName->type);
149#pragma GCC diagnostic push
151#if __has_warning("-Wused-but-marked-unused")
152#pragma GCC diagnostic ignored "-Wused-but-marked-unused"
156 sk_GENERAL_NAME_pop_free(subjectAltNames, GENERAL_NAME_free);
158#pragma GCC diagnostic pop
160 X509_free(server_cert);
162 VLOG(1) <<
"\tPeer certificate: no certificate";
166 server.setOnDisconnect([&server](SocketConnection* socketConnection) {
167 VLOG(1) <<
"OnDisconnect " << server.getConfig().getInstanceName();
169 VLOG(1) <<
"\tLocal: " << socketConnection->getLocalAddress().toString();
170 VLOG(1) <<
"\tPeer: " << socketConnection->getRemoteAddress().toString();
int main(int argc, char *argv[])
EchoSocketServer getServer()