]> git.lizzy.rs Git - plan9front.git/blobdiff - sys/src/cmd/tlsclient.c
disk/format: implement long name support
[plan9front.git] / sys / src / cmd / tlsclient.c
index f4f1a25d888a4de0f19289fba63c9b91001e1a26..06d34a32020ed50bccc7b64605e2f692c895c5b5 100644 (file)
@@ -2,11 +2,16 @@
 #include <libc.h>
 #include <mp.h>
 #include <libsec.h>
+#include <auth.h>
+
+int debug, auth, dialfile;
+char *keyspec = "";
+char *servername, *file, *filex, *ccert, *dumpcert;
 
 void
 usage(void)
 {
-       fprint(2, "usage: tlsclient [-c lib/tls/clientcert] [-t /sys/lib/tls/xxx] [-x /sys/lib/tls/xxx.exclude] dialstring\n");
+       fprint(2, "usage: tlsclient [-D] [-a [-k keyspec] ] [-c clientcert.pem] [-d servercert] [-t /sys/lib/tls/xxx] [-x /sys/lib/tls/xxx.exclude] [-n servername] [-o] dialstring [cmd [args...]]\n");
        exits("usage");
 }
 
@@ -38,74 +43,123 @@ reporter(char *fmt, ...)
 void
 main(int argc, char **argv)
 {
-       int fd, netfd, debug;
-       uchar digest[20];
+       int fd, dfd;
+       char *addr;
        TLSconn *conn;
-       char *addr, *file, *filex, *ccert;
        Thumbprint *thumb;
+       AuthInfo *ai = nil;
+
+       fmtinstall('[', encodefmt);
+       fmtinstall('H', encodefmt);
 
-       file = nil;
-       filex = nil;
-       thumb = nil;
-       ccert=nil;
-       debug=0;
        ARGBEGIN{
+       case 'D':
+               debug++;
+               break;
+       case 'a':
+               auth++;
+               break;
+       case 'k':
+               keyspec = EARGF(usage());
+               break;
        case 't':
                file = EARGF(usage());
                break;
        case 'x':
                filex = EARGF(usage());
                break;
-       case 'D':
-               debug++;
-               break;
        case 'c':
                ccert = EARGF(usage());
                break;
+       case 'd':
+               dumpcert = EARGF(usage());
+               break;
+       case 'n':
+               servername = EARGF(usage());
+               break;
+       case 'o':
+               dialfile = 1;
+               break;
        default:
                usage();
        }ARGEND
 
-       if(argc != 1)
+       if(argc < 1)
                usage();
 
        if(filex && !file)      
                sysfatal("specifying -x without -t is useless");
+
        if(file){
-               thumb = initThumbprints(file, filex);
+               thumb = initThumbprints(file, filex, "x509");
                if(thumb == nil)
                        sysfatal("initThumbprints: %r");
-       }
+       } else
+               thumb = nil;
 
-       addr = argv[0];
-       if((netfd = dial(addr, 0, 0, 0)) < 0)
+       addr = *argv++;
+       if((fd = dialfile? open(addr, ORDWR): dial(addr, 0, 0, 0)) < 0)
                sysfatal("dial %s: %r", addr);
 
        conn = (TLSconn*)mallocz(sizeof *conn, 1);
-       if(ccert)
+       conn->serverName = servername;
+       if(ccert){
                conn->cert = readcert(ccert, &conn->certlen);
+               if(conn->cert == nil)
+                       sysfatal("readcert: %r");
+       }
+
+       if(auth){
+               ai = auth_proxy(fd, auth_getkey, "proto=p9any role=client %s", keyspec);
+               if(ai == nil)
+                       sysfatal("auth_proxy: %r");
+
+               conn->pskID = "p9secret";
+               conn->psk = ai->secret;
+               conn->psklen = ai->nsecret;
+       }
+
        if(debug)
                conn->trace = reporter;
-       fd = tlsClient(netfd, conn);
+
+       fd = tlsClient(fd, conn);
        if(fd < 0)
                sysfatal("tlsclient: %r");
+
+       if(dumpcert){
+               if((dfd = create(dumpcert, OWRITE, 0666)) < 0)
+                       sysfatal("create: %r");
+               if(conn->cert != nil)
+                       write(dfd, conn->cert, conn->certlen);
+               write(dfd, "", 0);
+               close(dfd);
+       }
+
        if(thumb){
-               if(conn->cert==nil || conn->certlen<=0)
-                       sysfatal("server did not provide TLS certificate");
-               sha1(conn->cert, conn->certlen, digest, nil);
-               if(!okThumbprint(digest, thumb)){
-                       fmtinstall('H', encodefmt);
-                       sysfatal("server certificate %.*H not recognized", SHA1dlen, digest);
-               }
+               if(!okCertificate(conn->cert, conn->certlen, thumb))
+                       sysfatal("cert for %s not recognized: %r", servername ? servername : addr);
+               freeThumbprints(thumb);
        }
+
        free(conn->cert);
-       close(netfd);
+       free(conn->sessionID);
+       free(conn);
+       if(ai != nil)
+               auth_freeAI(ai);
+
+       if(*argv){
+               dup(fd, 0);
+               dup(fd, 1);
+               if(fd > 1)
+                       close(fd);
+               exec(*argv, argv);
+               sysfatal("exec: %r");
+       }
 
        rfork(RFNOTEG);
        switch(fork()){
        case -1:
-               fprint(2, "%s: fork: %r\n", argv0);
-               exits("dial");
+               sysfatal("fork: %r");
        case 0:
                xfer(0, fd);
                break;