BSD Sockets
Overview
Zephyr offers an implementation of a subset of the BSD Sockets API (a part of the POSIX standard). This API allows to reuse existing programming experience and port existing simple networking applications to Zephyr.
Here are the key requirements and concepts which governed BSD Sockets compatible API implementation for Zephyr:
Has minimal overhead, similar to the requirement for other Zephyr subsystems.
Is namespaced by default, to avoid name conflicts with well-known names like
close()
, which may be part of libc or other POSIX compatibility libraries. If enabled byCONFIG_POSIX_API
, it will also expose native POSIX names.
BSD Sockets compatible API is enabled using CONFIG_NET_SOCKETS
config option and implements the following operations: socket()
, close()
,
recv()
, recvfrom()
, send()
, sendto()
, connect()
, bind()
,
listen()
, accept()
, fcntl()
(to set non-blocking mode),
getsockopt()
, setsockopt()
, poll()
, select()
,
getaddrinfo()
, getnameinfo()
.
Based on the namespacing requirements above, these operations are by
default exposed as functions with zsock_
prefix, e.g.
zsock_socket()
and zsock_close()
. If the config option
CONFIG_POSIX_API
is defined, all the functions
will be also exposed as aliases without the prefix. This includes the
functions like close()
and fcntl()
(which may conflict with
functions in libc or other libraries, for example, with the filesystem
libraries).
Another entailment of the design requirements above is that the Zephyr
API aggressively employs the short-read/short-write property of the POSIX API
whenever possible (to minimize complexity and overheads). POSIX allows
for calls like recv()
and send()
to actually process (receive
or send) less data than requested by the user (on SOCK_STREAM
type
sockets). For example, a call recv(sock, 1000, 0)
may return 100,
meaning that only 100 bytes were read (short read), and the application
needs to retry call(s) to receive the remaining 900 bytes.
The BSD Sockets API uses file descriptors to represent sockets. File descriptors are small integers, consecutively assigned from zero, shared among sockets, files, special devices (like stdin/stdout), etc. Internally, there is a table mapping file descriptors to internal object pointers. The file descriptor table is used by the BSD Sockets API even if the rest of the POSIX subsystem (filesystem, stdin/stdout) is not enabled.
See Echo server (advanced) and Echo client (advanced) sample applications to learn how to create a simple server or client BSD socket based application.
Secure Sockets
Zephyr provides an extension of standard POSIX socket API, allowing to create
and configure sockets with TLS protocol types, facilitating secure
communication. Secure functions for the implementation are provided by
mbedTLS library. Secure sockets implementation allows use of both TLS and DTLS
protocols with standard socket calls. See net_ip_protocol_secure
type
for supported secure protocol versions.
To enable secure sockets, set the CONFIG_NET_SOCKETS_SOCKOPT_TLS
option. To enable DTLS support, use CONFIG_NET_SOCKETS_ENABLE_DTLS
option.
TLS credentials subsystem
TLS credentials must be registered in the system before they can be used with
secure sockets. See tls_credential_add()
for more information.
When a specific TLS credential is registered in the system, it is assigned with
numeric value of type sec_tag_t
, called a tag. This value can be used
later on to reference the credential during secure socket configuration with
socket options.
The following TLS credential types can be registered in the system:
TLS_CREDENTIAL_CA_CERTIFICATE
TLS_CREDENTIAL_SERVER_CERTIFICATE
TLS_CREDENTIAL_PRIVATE_KEY
TLS_CREDENTIAL_PSK
TLS_CREDENTIAL_PSK_ID
An example registration of CA certificate (provided in ca_certificate
array) looks like this:
ret = tls_credential_add(CA_CERTIFICATE_TAG, TLS_CREDENTIAL_CA_CERTIFICATE,
ca_certificate, sizeof(ca_certificate));
By default certificates in DER format are supported. PEM support can be enabled in mbedTLS settings.
Secure Socket Creation
A secure socket can be created by specifying secure protocol type, for instance:
sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TLS_1_2);
Once created, it can be configured with socket options. For instance, the CA certificate and hostname can be set:
sec_tag_t sec_tag_opt[] = {
CA_CERTIFICATE_TAG,
};
ret = setsockopt(sock, SOL_TLS, TLS_SEC_TAG_LIST,
sec_tag_opt, sizeof(sec_tag_opt));
char host[] = "google.com";
ret = setsockopt(sock, SOL_TLS, TLS_HOSTNAME, host, sizeof(host));
Once configured, socket can be used just like a regular TCP socket.
Several samples in Zephyr use secure sockets for communication. For a sample use see e.g. echo-server sample application or HTTP GET sample application.
Secure Sockets options
Secure sockets offer the following options for socket management:
Socket offloading
Zephyr allows to register custom socket implementations (called offloaded sockets). This allows for seamless integration for devices which provide an external IP stack and expose socket-like API.
Socket offloading can be enabled with CONFIG_NET_SOCKETS_OFFLOAD
option. A network driver that wants to register a new socket implementation
should use NET_SOCKET_OFFLOAD_REGISTER
macro. The macro accepts the
following parameters:
socket_name
An arbitrary name for the socket implementation.
prio
Socket implementation’s priority. The higher the priority, the earlier this particular implementation will be processed when creating a new socket. Lower numeric value indicates higher priority.
_family
Socket family implemented by the offloaded socket.
AF_UNSPEC
indicates any family.
_is_supported
A filtering function, used to verify whether a particular socket family, type and protocol are supported by the offloaded socket implementation.
_handler
A function compatible with
socket()
API, used to create an offloaded socket.
Every offloaded socket implementation should also implement a set of socket
APIs, specified in socket_op_vtable
struct.
The function registered for socket creation should allocate a new file
descriptor using z_reserve_fd()
function. Any additional actions,
specific to the creation of a particular offloaded socket implementation should
take place after the file descriptor is allocated. As a final step, if the
offloaded socket was created successfully, the file descriptor should be
finalized with z_finalize_fd()
function. The finalize function allows
to register a socket_op_vtable
structure implementing socket APIs
for an offloaded socket along with an optional socket context data pointer.
Finally, when an offloaded network interface is initialized, it should indicate
that the interface is offloaded with net_if_socket_offload_set()
function. The function registers the function used to create an offloaded socket
(the same as the one provided in NET_SOCKET_OFFLOAD_REGISTER
) at the
network interface.
Offloaded socket creation
When application creates a new socket with socket()
function, the
network stack iterates over all registered socket implementations (native and
offloaded). Higher priority socket implementations are processed first.
For each registered socket implementation, an address family is verified, and if
it matches (or the socket was registered as AF_UNSPEC
), the corresponding
_is_supported
function is called to verify the remaining socket parameters.
The first implementation that fulfills the socket requirements (i. e.
_is_supported
returns true) will create a new socket with its _handler
function.
The above indicates the importance of the socket priority. If multiple socket implementations support the same set of socket family/type/protocol, the first implementation processed by the system will create a socket. Therefore it’s important to give the highest priority to the implementation that should be the system default.
The socket priority for native socket implementation is configured with Kconfig.
Use CONFIG_NET_SOCKETS_TLS_PRIORITY
to set the priority for
the native TLS sockets.
Use CONFIG_NET_SOCKETS_PRIORITY_DEFAULT
to set the priority
for the remaining native sockets.
Dealing with multiple offloaded interfaces
As the socket()
function does not allow to specify which network
interface should be used by a socket, it’s not possible to choose a specific
implementation in case multiple offloaded socket implementations, supporting the
same type of sockets, are available. The same problem arises when both native
and offloaded sockets are available in the system.
To address this problem, a special socket implementation (called socket
dispatcher) was introduced. The sole reason for this module is to postpone the
socket creation for until the first operation on a socket is performed. This
leaves an opening to use SO_BINDTODEVICE
socket option, to bind a socket to
a particular network interface (and thus offloaded socket implementation).
The socket dispatcher can be enabled with CONFIG_NET_SOCKETS_OFFLOAD_DISPATCHER
Kconfig option.
When enabled, the application can specify the network interface to use with
setsockopt()
function:
/* A "dispatcher" socket is created */
sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
struct ifreq ifreq = {
.ifr_name = "SimpleLink"
};
/* The socket is "dispatched" to a particular network interface
* (offloaded or not).
*/
setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifreq, sizeof(ifreq));
Similarly, if TLS is supported by both native and offloaded sockets,
TLS_NATIVE
socket option can be used to indicate that a native TLS socket
should be created. The underlying socket can then be bound to a particular
network interface:
/* A "dispatcher" socket is created */
sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TLS_1_2);
int tls_native = 1;
/* The socket is "dispatched" to a native TLS socket implmeentation.
* The underlying socket is a "dispatcher" socket now.
*/
setsockopt(sock, SOL_TLS, TLS_NATIVE, &tls_native, sizeof(tls_native));
struct ifreq ifreq = {
.ifr_name = "SimpleLink"
};
/* The underlying socket is "dispatched" to a particular network interface
* (offloaded or not).
*/
setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifreq, sizeof(ifreq));
In case no SO_BINDTODEVICE
socket option is used on a socket, the socket
will be dispatched according to the default priority and filtering rules on a
first socket API call.