Echo ServerΒΆ
This example demonstrates a basic asynchronous echo server
#include "certificate.hpp"
#include <wintls.hpp>
#ifdef WINTLS_USE_STANDALONE_ASIO
#include <asio.hpp>
#else // WINTLS_USE_STANDALONE_ASIO
#include <boost/asio.hpp>
#endif // !WINTLS_USE_STANDALONE_ASIO
#include <cstdlib>
#include <functional>
#include <iostream>
#ifdef WINTLS_USE_STANDALONE_ASIO
namespace net = asio;
#else // WINTLS_USE_STANDALONE_ASIO
namespace net = boost::asio;
#endif // !WINTLS_USE_STANDALONE_ASIO
using net::ip::tcp;
class session : public std::enable_shared_from_this<session> {
public:
session(wintls::stream<tcp::socket> stream)
: stream_(std::move(stream)) {
}
void start() {
do_handshake();
}
private:
void do_handshake() {
auto self(shared_from_this());
stream_.async_handshake(wintls::handshake_type::server,
[this, self](const wintls::error_code& ec) {
if (!ec) {
do_read();
} else {
std::cerr << "Handshake failed: " << ec.message() << "\n";
}
});
}
void do_read() {
auto self(shared_from_this());
stream_.async_read_some(net::buffer(data_),
[this, self](const wintls::error_code& ec, std::size_t length) {
if (!ec) {
do_write(length);
} else {
if (ec.value() != SEC_I_CONTEXT_EXPIRED) { // SEC_I_CONTEXT_EXPIRED means the client shutdown the TLS channel
std::cerr << "Read failed: " << ec.message() << "\n";
}
}
});
}
void do_write(std::size_t length) {
auto self(shared_from_this());
net::async_write(stream_, net::buffer(data_, length),
[this, self](const wintls::error_code& ec, std::size_t /*length*/) {
if (!ec) {
do_read();
} else {
std::cerr << "Write failed: " << ec.message() << "\n";
}
});
}
wintls::stream<tcp::socket> stream_;
char data_[1024];
};
class server {
public:
server(net::io_context& io_context, unsigned short port)
: acceptor_(io_context, tcp::endpoint(tcp::v4(), port))
, context_(wintls::method::system_default)
, private_key_name_("wintls-echo-server-example") {
// Convert X509 PEM bytes to Windows CERT_CONTEXT
auto certificate = wintls::x509_to_cert_context(net::buffer(x509_certificate),
wintls::file_format::pem);
// Import RSA private key into the default cryptographic provider
wintls::error_code ec;
wintls::import_private_key(net::buffer(rsa_key),
wintls::file_format::pem,
private_key_name_,
ec);
// If the key already exists, assume it's the one already imported
// and ignore that error
if (ec && ec.value() != NTE_EXISTS) {
throw wintls::system_error(ec);
}
// Use the imported private key for the certificate
wintls::assign_private_key(certificate.get(), private_key_name_);
// Use the certificate for encrypting TLS messages
context_.use_certificate(certificate.get());
do_accept();
}
~server() {
// Remove the imported private key. Most real applications
// probably only want to import the key once and most likely not
// in the server code. This is just for demonstration purposes.
wintls::error_code ec;
wintls::delete_private_key(private_key_name_, ec);
}
private:
void do_accept() {
acceptor_.async_accept([this](const wintls::error_code& ec, tcp::socket socket) {
if (!ec) {
std::make_shared<session>(wintls::stream<tcp::socket>(std::move(socket), context_))->start();
} else {
std::cerr << "Read failed: " << ec.message() << "\n";
}
do_accept();
});
}
tcp::acceptor acceptor_;
wintls::context context_;
std::string private_key_name_;
};
int main(int argc, char* argv[]) {
try {
if (argc != 2) {
std::cerr << "Usage: server <port>\n";
return 1;
}
net::io_context io_context;
server s(io_context, static_cast<std::uint16_t>(std::atoi(argv[1])));
io_context.run();
} catch (std::exception& e) {
std::cerr << "Exception: " << e.what() << "\n";
}
return 0;
}