summaryrefslogtreecommitdiff
path: root/sys/src/cmd/tlsclient.c
diff options
context:
space:
mode:
authorcinap_lenrek <cinap_lenrek@felloff.net>2016-02-01 22:49:20 +0100
committercinap_lenrek <cinap_lenrek@felloff.net>2016-02-01 22:49:20 +0100
commitcc8e8c978cb48955417db592b799c4c65881c2b8 (patch)
treed0611263b54a2e22d3a9553702b0d6b351397af1 /sys/src/cmd/tlsclient.c
parenta291bbdeddfd41a2f0907ecbd7b819f0eedffdaf (diff)
tlssrv: p9any authentication support using TLS-PSK cipher suits
Diffstat (limited to 'sys/src/cmd/tlsclient.c')
-rw-r--r--sys/src/cmd/tlsclient.c81
1 files changed, 60 insertions, 21 deletions
diff --git a/sys/src/cmd/tlsclient.c b/sys/src/cmd/tlsclient.c
index d96e733b4..bc4b6d678 100644
--- a/sys/src/cmd/tlsclient.c
+++ b/sys/src/cmd/tlsclient.c
@@ -2,11 +2,16 @@
#include <libc.h>
#include <mp.h>
#include <libsec.h>
+#include <auth.h>
+
+int debug, auth;
+char *keyspec = "";
+char *servername, *file, *filex, *ccert;
void
usage(void)
{
- fprint(2, "usage: tlsclient [-c lib/tls/clientcert] [-t /sys/lib/tls/xxx] [-x /sys/lib/tls/xxx.exclude] dialstring\n");
+ fprint(2, "usage: tlsclient [-D] [-a [-k keyspec] ] [-c lib/tls/clientcert] [-t /sys/lib/tls/xxx] [-x /sys/lib/tls/xxx.exclude] [-n servername] dialstring [cmd [args...]]\n");
exits("usage");
}
@@ -38,72 +43,106 @@ reporter(char *fmt, ...)
void
main(int argc, char **argv)
{
- int fd, debug;
- uchar digest[20];
+ int fd;
+ char *addr;
TLSconn *conn;
- char *addr, *file, *filex, *ccert;
Thumbprint *thumb;
- file = nil;
- filex = nil;
- thumb = nil;
- ccert=nil;
- debug=0;
+ fmtinstall('H', encodefmt);
+
ARGBEGIN{
+ case 'D':
+ debug++;
+ break;
+ case 'a':
+ auth++;
+ break;
+ case 'k':
+ keyspec = EARGF(usage());
+ break;
case 't':
file = EARGF(usage());
break;
case 'x':
filex = EARGF(usage());
break;
- case 'D':
- debug++;
- break;
case 'c':
ccert = EARGF(usage());
break;
+ case 'n':
+ servername = EARGF(usage());
+ break;
default:
usage();
}ARGEND
- if(argc != 1)
+ if(argc < 1)
usage();
if(filex && !file)
sysfatal("specifying -x without -t is useless");
+
if(file){
thumb = initThumbprints(file, filex);
if(thumb == nil)
sysfatal("initThumbprints: %r");
- }
+ } else
+ thumb = nil;
- addr = argv[0];
+ addr = *argv++;
if((fd = dial(addr, 0, 0, 0)) < 0)
sysfatal("dial %s: %r", addr);
conn = (TLSconn*)mallocz(sizeof *conn, 1);
- if(ccert)
+ conn->serverName = servername;
+ if(ccert){
conn->cert = readcert(ccert, &conn->certlen);
+ if(conn->cert == nil)
+ sysfatal("readcert: %r");
+ }
+
+ if(auth){
+ AuthInfo *ai;
+
+ ai = auth_proxy(fd, auth_getkey, "proto=p9any role=client %s", keyspec);
+ if(ai == nil)
+ sysfatal("auth_proxy: %r");
+
+ conn->pskID = "p9secret";
+ conn->psk = ai->secret;
+ conn->psklen = ai->nsecret;
+ }
+
if(debug)
conn->trace = reporter;
+
fd = tlsClient(fd, conn);
if(fd < 0)
sysfatal("tlsclient: %r");
+
if(thumb){
+ uchar digest[20];
+
if(conn->cert==nil || conn->certlen<=0)
sysfatal("server did not provide TLS certificate");
sha1(conn->cert, conn->certlen, digest, nil);
- if(!okThumbprint(digest, thumb)){
- fmtinstall('H', encodefmt);
+ if(!okThumbprint(digest, thumb))
sysfatal("server certificate %.*H not recognized", SHA1dlen, digest);
- }
+ }
+
+ if(*argv){
+ dup(fd, 0);
+ dup(fd, 1);
+ if(fd > 1)
+ close(fd);
+ exec(*argv, argv);
+ sysfatal("exec: %r");
}
rfork(RFNOTEG);
switch(fork()){
case -1:
- fprint(2, "%s: fork: %r\n", argv0);
- exits("dial");
+ sysfatal("fork: %r");
case 0:
xfer(0, fd);
break;