1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
|
/*
* (C) 2008 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
#include <botan/init.h>
#include <botan/tls_client.h>
#include "socket.h"
using namespace Botan;
#include <stdio.h>
#include <string>
#include <iostream>
#include <memory>
class Client_TLS_Policy : public TLS_Policy
{
public:
bool check_cert(const std::vector<X509_Certificate>& certs) const
{
for(size_t i = 0; i != certs.size(); ++i)
{
std::cout << certs[i].to_string();
}
std::cout << "Warning: not checking cert signatures\n";
return true;
}
};
int main(int argc, char* argv[])
{
if(argc != 2 && argc != 3)
{
printf("Usage: %s host [port]\n", argv[0]);
return 1;
}
try
{
LibraryInitializer init;
std::string host = argv[1];
u32bit port = argc == 3 ? Botan::to_u32bit(argv[2]) : 443;
printf("Connecting to %s:%d...\n", host.c_str(), port);
Socket sock(argv[1], port);
std::auto_ptr<Botan::RandomNumberGenerator> rng(
Botan::RandomNumberGenerator::make_rng());
Client_TLS_Policy policy;
TLS_Client tls(std::tr1::bind(&Socket::read, std::tr1::ref(sock), _1, _2),
std::tr1::bind(&Socket::write, std::tr1::ref(sock), _1, _2),
policy, *rng);
printf("Handshake extablished...\n");
#if 0
std::string http_command = "GET / HTTP/1.1\r\n"
"Server: " + host + ':' + to_string(port) + "\r\n\r\n";
#else
std::string http_command = "GET / HTTP/1.0\r\n\r\n";
#endif
tls.write((const byte*)http_command.c_str(), http_command.length());
u32bit total_got = 0;
while(true)
{
if(tls.is_closed())
break;
byte buf[16+1] = { 0 };
u32bit got = tls.read(buf, sizeof(buf)-1);
printf("%s", buf);
fflush(0);
total_got += got;
}
printf("\nRetrieved %d bytes total\n", total_got);
}
catch(std::exception& e)
{
printf("%s\n", e.what());
return 1;
}
return 0;
}
|