plan9fox/sys/src/cmd/tlsclient.c
cinap_lenrek d4a830e2e1 tlsclient: allow dumping the server's certificate with new -d flag
usefull for debugging, like:

./8.tlsclient -d /fd/3 tcp!code.9front.org!https |[0=3] auth/asn1dump
2018-01-06 07:43:08 +01:00

173 lines
2.9 KiB
C

#include <u.h>
#include <libc.h>
#include <mp.h>
#include <libsec.h>
#include <auth.h>
int debug, auth, dialfile;
char *keyspec = "";
char *servername, *file, *filex, *ccert, *dumpcert;
void
usage(void)
{
fprint(2, "usage: tlsclient [-D] [-a [-k keyspec] ] [-c clientcert.pem] [-d servercert] [-t /sys/lib/tls/xxx] [-x /sys/lib/tls/xxx.exclude] [-n servername] [-o] dialstring [cmd [args...]]\n");
exits("usage");
}
void
xfer(int from, int to)
{
char buf[12*1024];
int n;
while((n = read(from, buf, sizeof buf)) > 0)
if(write(to, buf, n) < 0)
break;
}
static int
reporter(char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
fprint(2, "%s: tls reports ", argv0);
vfprint(2, fmt, ap);
fprint(2, "\n");
va_end(ap);
return 0;
}
void
main(int argc, char **argv)
{
int fd, dfd;
char *addr;
TLSconn *conn;
Thumbprint *thumb;
AuthInfo *ai = nil;
fmtinstall('[', encodefmt);
fmtinstall('H', encodefmt);
ARGBEGIN{
case 'D':
debug++;
break;
case 'a':
auth++;
break;
case 'k':
keyspec = EARGF(usage());
break;
case 't':
file = EARGF(usage());
break;
case 'x':
filex = EARGF(usage());
break;
case 'c':
ccert = EARGF(usage());
break;
case 'd':
dumpcert = EARGF(usage());
break;
case 'n':
servername = EARGF(usage());
break;
case 'o':
dialfile = 1;
break;
default:
usage();
}ARGEND
if(argc < 1)
usage();
if(filex && !file)
sysfatal("specifying -x without -t is useless");
if(file){
thumb = initThumbprints(file, filex, "x509");
if(thumb == nil)
sysfatal("initThumbprints: %r");
} else
thumb = nil;
addr = *argv++;
if((fd = dialfile? open(addr, ORDWR): dial(addr, 0, 0, 0)) < 0)
sysfatal("dial %s: %r", addr);
conn = (TLSconn*)mallocz(sizeof *conn, 1);
conn->serverName = servername;
if(ccert){
conn->cert = readcert(ccert, &conn->certlen);
if(conn->cert == nil)
sysfatal("readcert: %r");
}
if(auth){
ai = auth_proxy(fd, auth_getkey, "proto=p9any role=client %s", keyspec);
if(ai == nil)
sysfatal("auth_proxy: %r");
conn->pskID = "p9secret";
conn->psk = ai->secret;
conn->psklen = ai->nsecret;
}
if(debug)
conn->trace = reporter;
fd = tlsClient(fd, conn);
if(fd < 0)
sysfatal("tlsclient: %r");
if(dumpcert){
if((dfd = create(dumpcert, OWRITE, 0666)) < 0)
sysfatal("create: %r");
if(conn->cert != nil)
write(dfd, conn->cert, conn->certlen);
write(dfd, "", 0);
close(dfd);
}
if(thumb){
if(!okCertificate(conn->cert, conn->certlen, thumb))
sysfatal("cert for %s not recognized: %r", servername ? servername : addr);
freeThumbprints(thumb);
}
free(conn->cert);
free(conn->sessionID);
free(conn);
if(ai != nil)
auth_freeAI(ai);
if(*argv){
dup(fd, 0);
dup(fd, 1);
if(fd > 1)
close(fd);
exec(*argv, argv);
sysfatal("exec: %r");
}
rfork(RFNOTEG);
switch(fork()){
case -1:
sysfatal("fork: %r");
case 0:
xfer(0, fd);
break;
default:
xfer(fd, 1);
break;
}
postnote(PNGROUP, getpid(), "die yankee pig dog");
exits(0);
}