/* * (C) 2014 Jack Lloyd * * Botan is released under the Simplified BSD License (see license.txt) */ #include "apps.h" #if defined(BOTAN_HAS_TLS) && defined(BOTAN_TARGET_OS_HAS_SOCKETS) #include #include #include #if defined(BOTAN_HAS_TLS_SQLITE3_SESSION_MANAGER) #include #endif #include #include #include #include #include #include #include #include #include #include #if !defined(MSG_NOSIGNAL) #define MSG_NOSIGNAL 0 #endif #include "credentials.h" using namespace Botan; using namespace std::placeholders; namespace { int connect_to_host(const std::string& host, u16bit port, bool tcp) { hostent* host_addr = ::gethostbyname(host.c_str()); if(!host_addr) throw std::runtime_error("gethostbyname failed for " + host); if(host_addr->h_addrtype != AF_INET) // FIXME throw std::runtime_error(host + " has IPv6 address, not supported"); int type = tcp ? SOCK_STREAM : SOCK_DGRAM; int fd = ::socket(PF_INET, type, 0); if(fd == -1) throw std::runtime_error("Unable to acquire socket"); sockaddr_in socket_info; ::memset(&socket_info, 0, sizeof(socket_info)); socket_info.sin_family = AF_INET; socket_info.sin_port = htons(port); ::memcpy(&socket_info.sin_addr, host_addr->h_addr, host_addr->h_length); socket_info.sin_addr = *reinterpret_cast(host_addr->h_addr); // FIXME if(::connect(fd, (sockaddr*)&socket_info, sizeof(struct sockaddr)) != 0) { ::close(fd); throw std::runtime_error("connect failed"); } return fd; } bool handshake_complete(const TLS::Session& session) { std::cout << "Handshake complete, " << session.version().to_string() << " using " << session.ciphersuite().to_string() << std::endl; if(!session.session_id().empty()) std::cout << "Session ID " << hex_encode(session.session_id()) << std::endl; if(!session.session_ticket().empty()) std::cout << "Session ticket " << hex_encode(session.session_ticket()) << std::endl; return true; } void dgram_socket_write(int sockfd, const byte buf[], size_t length) { int r = send(sockfd, buf, length, MSG_NOSIGNAL); if(r == -1) throw std::runtime_error("Socket write failed errno=" + std::to_string(errno)); } void stream_socket_write(int sockfd, const byte buf[], size_t length) { size_t offset = 0; while(length) { ssize_t sent = ::send(sockfd, (const char*)buf + offset, length, MSG_NOSIGNAL); if(sent == -1) { if(errno == EINTR) sent = 0; else throw std::runtime_error("Socket write failed errno=" + std::to_string(errno)); } offset += sent; length -= sent; } } bool got_alert = false; void alert_received(TLS::Alert alert, const byte [], size_t ) { std::cout << "Alert: " << alert.type_string() << std::endl; got_alert = true; } void process_data(const byte buf[], size_t buf_size) { for(size_t i = 0; i != buf_size; ++i) std::cout << buf[i]; } int tls_client(int argc, char* argv[]) { if(argc != 2 && argc != 3 && argc != 4) { std::cout << "Usage " << argv[0] << " host [port] [udp|tcp]" << std::endl; return 1; } try { AutoSeeded_RNG rng; TLS::Policy policy; #if defined(BOTAN_HAS_TLS_SQLITE3_SESSION_MANAGER) const std::string passphrase = "correct horse battery staple"; const std::string sessions_db = "sessions.db"; TLS::Session_Manager_SQLite session_manager(passphrase, rng, sessions_db); #else TLS::Session_Manager_In_Memory session_manager(rng); #endif Basic_Credentials_Manager creds; std::string host = argv[1]; u32bit port = argc >= 3 ? Botan::to_u32bit(argv[2]) : 443; const std::string transport = argc >= 4 ? argv[3] : "tcp"; const bool use_tcp = (transport == "tcp"); const std::vector protocols_to_offer = { "test/9.9", "http/1.1", "echo/9.1" }; int sockfd = connect_to_host(host, port, use_tcp); auto socket_write = use_tcp ? std::bind(stream_socket_write, sockfd, _1, _2) : std::bind(dgram_socket_write, sockfd, _1, _2); auto version = policy.latest_supported_version(!use_tcp); TLS::Client client(socket_write, process_data, alert_received, handshake_complete, session_manager, creds, policy, rng, TLS::Server_Information(host, port), version, protocols_to_offer); bool first_active = true; while(!client.is_closed()) { fd_set readfds; FD_ZERO(&readfds); FD_SET(sockfd, &readfds); if(client.is_active()) { FD_SET(STDIN_FILENO, &readfds); if(first_active && !protocols_to_offer.empty()) { std::string app = client.application_protocol(); if(app != "") std::cout << "Server choose protocol: " << client.application_protocol() << std::endl; first_active = false; } } struct timeval timeout = { 1, 0 }; ::select(sockfd + 1, &readfds, nullptr, nullptr, &timeout); if(FD_ISSET(sockfd, &readfds)) { byte buf[4*1024] = { 0 }; ssize_t got = ::read(sockfd, buf, sizeof(buf)); if(got == 0) { std::cout << "EOF on socket" << std::endl; break; } else if(got == -1) { std::cout << "Socket error: " << errno << " " << strerror(errno) << std::endl; continue; } client.received_data(buf, got); } if(FD_ISSET(STDIN_FILENO, &readfds)) { byte buf[1024] = { 0 }; ssize_t got = read(STDIN_FILENO, buf, sizeof(buf)); if(got == 0) { std::cout << "EOF on stdin" << std::endl; client.close(); break; } else if(got == -1) { std::cout << "Stdin error: " << errno << " " << strerror(errno) << std::endl; continue; } if(got == 2 && buf[1] == '\n') { char cmd = buf[0]; if(cmd == 'R' || cmd == 'r') { std::cout << "Client initiated renegotiation" << std::endl; client.renegotiate(cmd == 'R'); } else if(cmd == 'Q') { std::cout << "Client initiated close" << std::endl; client.close(); } } else if(buf[0] == 'H') client.heartbeat(&buf[1], got-1); else client.send(buf, got); } if(client.timeout_check()) { std::cout << "Timeout detected" << std::endl; } } ::close(sockfd); } catch(std::exception& e) { std::cout << "Exception: " << e.what() << std::endl; return 1; } return 0; } REGISTER_APP(tls_client); } #endif