407 lines
		
	
	
		
			9.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			407 lines
		
	
	
		
			9.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (c) 2013 INSIDE Secure Corporation
 | 
						|
 * Copyright (c) PeerSec Networks, 2002-2011
 | 
						|
 * All Rights Reserved
 | 
						|
 *
 | 
						|
 * The latest version of this code is available at http://www.matrixssl.org
 | 
						|
 *
 | 
						|
 * This software is open source; you can redistribute it and/or modify
 | 
						|
 * it under the terms of the GNU General Public License as published by
 | 
						|
 * the Free Software Foundation; either version 2 of the License, or
 | 
						|
 * (at your option) any later version.
 | 
						|
 *
 | 
						|
 * This program is distributed in WITHOUT ANY WARRANTY; without even the
 | 
						|
 * implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 | 
						|
 * See the GNU General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU General Public License
 | 
						|
 * along with this program; if not, write to the Free Software
 | 
						|
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 | 
						|
 * http://www.gnu.org/copyleft/gpl.html
 | 
						|
 */
 | 
						|
#include <errno.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <stdarg.h>
 | 
						|
#include <fcntl.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <time.h>
 | 
						|
#include <poll.h>
 | 
						|
#include <sys/socket.h>
 | 
						|
 | 
						|
#include "matrixssl/matrixsslApi.h"
 | 
						|
 | 
						|
//#warning "DO NOT USE THESE DEFAULT KEYS IN PRODUCTION ENVIRONMENTS."
 | 
						|
 | 
						|
/*
 | 
						|
 * If supporting client authentication, pick ONE identity to auto select a
 | 
						|
 * certificate and private key that support desired algorithms.
 | 
						|
 */
 | 
						|
#define ID_RSA /* RSA Certificate and Key */
 | 
						|
 | 
						|
#define USE_HEADER_KEYS
 | 
						|
 | 
						|
/* If the algorithm type is supported, load a CA for it */
 | 
						|
#ifdef USE_HEADER_KEYS
 | 
						|
/* CAs */
 | 
						|
# include "sampleCerts/RSA/ALL_RSA_CAS.h"
 | 
						|
/* Identity Certs and Keys for use with Client Authentication */
 | 
						|
# ifdef ID_RSA
 | 
						|
#  define EXAMPLE_RSA_KEYS
 | 
						|
#  include "sampleCerts/RSA/2048_RSA.h"
 | 
						|
#  include "sampleCerts/RSA/2048_RSA_KEY.h"
 | 
						|
# endif
 | 
						|
#endif
 | 
						|
 | 
						|
static ssize_t safe_write(int fd, const void *buf, size_t count)
 | 
						|
{
 | 
						|
	ssize_t n;
 | 
						|
 | 
						|
	do {
 | 
						|
		n = write(fd, buf, count);
 | 
						|
	} while (n < 0 && errno == EINTR);
 | 
						|
 | 
						|
	return n;
 | 
						|
}
 | 
						|
 | 
						|
static ssize_t full_write(int fd, const void *buf, size_t len)
 | 
						|
{
 | 
						|
	ssize_t cc;
 | 
						|
	ssize_t total;
 | 
						|
 | 
						|
	total = 0;
 | 
						|
 | 
						|
	while (len) {
 | 
						|
		cc = safe_write(fd, buf, len);
 | 
						|
 | 
						|
		if (cc < 0) {
 | 
						|
			if (total) {
 | 
						|
				/* we already wrote some! */
 | 
						|
				/* user can do another write to know the error code */
 | 
						|
				return total;
 | 
						|
			}
 | 
						|
			return cc;  /* write() returns -1 on failure. */
 | 
						|
		}
 | 
						|
 | 
						|
		total += cc;
 | 
						|
		buf = ((const char *)buf) + cc;
 | 
						|
		len -= cc;
 | 
						|
	}
 | 
						|
 | 
						|
	return total;
 | 
						|
}
 | 
						|
 | 
						|
static void say(const char *s, ...)
 | 
						|
{
 | 
						|
	char buf[256];
 | 
						|
	va_list p;
 | 
						|
	int sz;
 | 
						|
 | 
						|
	va_start(p, s);
 | 
						|
	sz = vsnprintf(buf, sizeof(buf), s, p);
 | 
						|
	full_write(STDERR_FILENO, buf, sz >= 0 && sz < sizeof(buf) ? sz : strlen(buf));
 | 
						|
	va_end(p);
 | 
						|
}
 | 
						|
 | 
						|
static void die(const char *s, ...)
 | 
						|
{
 | 
						|
	char buf[256];
 | 
						|
	va_list p;
 | 
						|
	int sz;
 | 
						|
 | 
						|
	va_start(p, s);
 | 
						|
	sz = vsnprintf(buf, sizeof(buf), s, p);
 | 
						|
	full_write(STDERR_FILENO, buf, sz >= 0 && sz < sizeof(buf) ? sz : strlen(buf));
 | 
						|
	exit(1);
 | 
						|
	va_end(p);
 | 
						|
}
 | 
						|
 | 
						|
#if 0
 | 
						|
# define dbg(...) say(__VA_ARGS__)
 | 
						|
#else
 | 
						|
# define dbg(...) ((void)0)
 | 
						|
#endif
 | 
						|
 | 
						|
static struct pollfd pfd[2] = {
 | 
						|
	{ -1, POLLIN|POLLERR|POLLHUP, 0 },
 | 
						|
	{ -1, POLLIN|POLLERR|POLLHUP, 0 },
 | 
						|
};
 | 
						|
#define STDIN           pfd[0]
 | 
						|
#define NETWORK         pfd[1]
 | 
						|
#define STDIN_READY()   (pfd[0].revents & (POLLIN|POLLERR|POLLHUP))
 | 
						|
#define NETWORK_READY() (pfd[1].revents & (POLLIN|POLLERR|POLLHUP))
 | 
						|
 | 
						|
static int wait_for_input(void)
 | 
						|
{
 | 
						|
	if (STDIN.fd == NETWORK.fd) /* means both are -1 */
 | 
						|
		exit(0);
 | 
						|
	dbg("polling\n");
 | 
						|
	STDIN.revents = NETWORK.revents = 0;
 | 
						|
	return poll(pfd, 2, -1);
 | 
						|
}
 | 
						|
 | 
						|
static int32 certCb(ssl_t *ssl, psX509Cert_t *cert, int32 alert)
 | 
						|
{
 | 
						|
	/* Example to allow anonymous connections based on a define */
 | 
						|
	if (alert > 0) {
 | 
						|
		return SSL_ALLOW_ANON_CONNECTION; // = 254
 | 
						|
	}
 | 
						|
#if 0
 | 
						|
	/* Validate the 'not before' and 'not after' dates, etc */
 | 
						|
	return PS_FAILURE; /* if we don't like this cert */
 | 
						|
#endif
 | 
						|
	return PS_SUCCESS;
 | 
						|
}
 | 
						|
 | 
						|
static void close_conn_and_exit(ssl_t *ssl, int fd)
 | 
						|
{
 | 
						|
	unsigned char *buf;
 | 
						|
	int len;
 | 
						|
 | 
						|
	fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK);
 | 
						|
	/* Quick attempt to send a closure alert, don't worry about failure */
 | 
						|
	if (matrixSslEncodeClosureAlert(ssl) >= 0) {
 | 
						|
		len = matrixSslGetOutdata(ssl, &buf);
 | 
						|
		if (len > 0) {
 | 
						|
			len = safe_write(fd, buf, len);
 | 
						|
			//if (len > 0) {
 | 
						|
			//	matrixSslSentData(ssl, len);
 | 
						|
			//}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	//matrixSslDeleteSession(ssl);
 | 
						|
	shutdown(fd, SHUT_WR);
 | 
						|
	exit(0);
 | 
						|
}
 | 
						|
 | 
						|
static int encode_data(ssl_t *ssl, const void *data, int len)
 | 
						|
{
 | 
						|
	unsigned char *buf;
 | 
						|
	int available;
 | 
						|
 | 
						|
	available = matrixSslGetWritebuf(ssl, &buf, len);
 | 
						|
	if (available < 0)
 | 
						|
		die("matrixSslGetWritebuf\n");
 | 
						|
	if (len > available)
 | 
						|
		die("len > available\n");
 | 
						|
	memcpy(buf, data, len);
 | 
						|
	if (matrixSslEncodeWritebuf(ssl, len) < 0)
 | 
						|
		die("matrixSslEncodeWritebuf\n");
 | 
						|
	return len;
 | 
						|
}
 | 
						|
 | 
						|
static void flush_to_net(ssl_t *ssl, int fd)
 | 
						|
{
 | 
						|
	int rc;
 | 
						|
	int len;
 | 
						|
	unsigned char *buf;
 | 
						|
 | 
						|
	while ((len = matrixSslGetOutdata(ssl, &buf)) > 0) {
 | 
						|
		dbg("writing net %d bytes\n", len);
 | 
						|
		if (full_write(fd, buf, len) != len)
 | 
						|
			die("write to network\n");
 | 
						|
		rc = matrixSslSentData(ssl, len);
 | 
						|
		if (rc < 0)
 | 
						|
			die("matrixSslSentData\n");
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static void do_io_until_eof_and_exit(int fd, sslKeys_t *keys)
 | 
						|
{
 | 
						|
	int rc;
 | 
						|
	int len;
 | 
						|
	uint32_t len32u;
 | 
						|
	sslSessionId_t *sid;
 | 
						|
	ssl_t *ssl;
 | 
						|
	unsigned char *buf;
 | 
						|
 | 
						|
	NETWORK.fd = fd;
 | 
						|
	/* Note! STDIN.fd is disabled (-1) until SSL handshake is over:
 | 
						|
	 * we do not attempt to feed any user data to MatrixSSL
 | 
						|
	 * before it is ready.
 | 
						|
	 */
 | 
						|
 | 
						|
	matrixSslNewSessionId(&sid);
 | 
						|
	rc = matrixSslNewClientSession(&ssl, keys, sid, 0, certCb, NULL, NULL, 0);
 | 
						|
dbg("matrixSslNewClientSession:rc=%d\n", rc);
 | 
						|
	if (rc != MATRIXSSL_REQUEST_SEND)
 | 
						|
		die("matrixSslNewClientSession\n");
 | 
						|
 | 
						|
	len = 0; /* only to suppress compiler warning */
 | 
						|
 again:
 | 
						|
	switch (rc) {
 | 
						|
	case MATRIXSSL_REQUEST_SEND:
 | 
						|
		dbg("MATRIXSSL_REQUEST_SEND\n");
 | 
						|
		flush_to_net(ssl, fd);
 | 
						|
		goto poll_input;
 | 
						|
 | 
						|
	case 0:
 | 
						|
		dbg("rc==0\n");
 | 
						|
		flush_to_net(ssl, fd);
 | 
						|
		goto poll_input;
 | 
						|
 | 
						|
	case MATRIXSSL_REQUEST_CLOSE:
 | 
						|
		/* what does this mean if we are here? */
 | 
						|
		dbg("MATRIXSSL_REQUEST_CLOSE\n");
 | 
						|
		close_conn_and_exit(ssl, fd);
 | 
						|
 | 
						|
	case MATRIXSSL_HANDSHAKE_COMPLETE:
 | 
						|
		dbg("MATRIXSSL_HANDSHAKE_COMPLETE\n");
 | 
						|
		/* Init complete, can start reading local user's data: */
 | 
						|
		STDIN.fd = STDIN_FILENO;
 | 
						|
 poll_input:
 | 
						|
		wait_for_input();
 | 
						|
		if (STDIN_READY()) {
 | 
						|
			char ibuf[4 * 1024];
 | 
						|
			dbg("reading stdin\n");
 | 
						|
			len = read(STDIN_FILENO, ibuf, sizeof(ibuf));
 | 
						|
			if (len < 0)
 | 
						|
				die("read error on stdin\n");
 | 
						|
			if (len == 0)
 | 
						|
				STDIN.fd = -1;
 | 
						|
			else {
 | 
						|
				len = encode_data(ssl, ibuf, len);
 | 
						|
				if (len) {
 | 
						|
					rc = MATRIXSSL_REQUEST_SEND;
 | 
						|
dbg("rc=%d\n", rc);
 | 
						|
					goto again;
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 read_network:
 | 
						|
		if (NETWORK_READY()) {
 | 
						|
			dbg("%s%s%s\n",
 | 
						|
				(pfd[1].revents & POLLIN)  ? "POLLIN"  : "",
 | 
						|
				(pfd[1].revents & POLLERR) ? "|POLLERR" : "",
 | 
						|
				(pfd[1].revents & POLLHUP) ? "|POLLHUP" : ""
 | 
						|
			);
 | 
						|
			len = matrixSslGetReadbuf(ssl, &buf);
 | 
						|
			if (len <= 0)
 | 
						|
				die("matrixSslGetReadbuf\n");
 | 
						|
			dbg("reading net up to %d\n", len);
 | 
						|
			len = read(fd, buf, len);
 | 
						|
			dbg("reading net:%d\n", len);
 | 
						|
			if (len < 0)
 | 
						|
				die("read error on network\n");
 | 
						|
			if (len == 0) /*eof*/
 | 
						|
				NETWORK.fd = -1;
 | 
						|
			len32u = len;
 | 
						|
			rc = matrixSslReceivedData(ssl, len, &buf, &len32u);
 | 
						|
dbg("matrixSslReceivedData:rc=%d\n", rc);
 | 
						|
			len = len32u;
 | 
						|
			if (rc < 0)
 | 
						|
				die("matrixSslReceivedData\n");
 | 
						|
		}
 | 
						|
		goto again;
 | 
						|
 | 
						|
	case MATRIXSSL_APP_DATA:
 | 
						|
		dbg("MATRIXSSL_APP_DATA: writing stdout\n");
 | 
						|
		do {
 | 
						|
			if (full_write(STDOUT_FILENO, buf, len) != len)
 | 
						|
				die("write to stdout\n");
 | 
						|
			len32u = len;
 | 
						|
			rc = matrixSslProcessedData(ssl, &buf, &len32u);
 | 
						|
//this was seen returning rc=0:
 | 
						|
dbg("matrixSslProcessedData:rc=%d\n", rc);
 | 
						|
			len = len32u;
 | 
						|
		} while (rc == MATRIXSSL_APP_DATA);
 | 
						|
		if (pfd[1].fd == -1) {
 | 
						|
			/* Already saw EOF on network, and we processed
 | 
						|
			 * and wrote out all ssl data. Signal it:
 | 
						|
			 */
 | 
						|
			close(STDOUT_FILENO);
 | 
						|
		}
 | 
						|
		goto again;
 | 
						|
 | 
						|
	case MATRIXSSL_REQUEST_RECV:
 | 
						|
		dbg("MATRIXSSL_REQUEST_RECV\n");
 | 
						|
		wait_for_input();
 | 
						|
		goto read_network;
 | 
						|
 | 
						|
	case MATRIXSSL_RECEIVED_ALERT:
 | 
						|
		dbg("MATRIXSSL_RECEIVED_ALERT\n");
 | 
						|
		/* The first byte of the buffer is the level */
 | 
						|
		/* The second byte is the description */
 | 
						|
		if (buf[0] == SSL_ALERT_LEVEL_FATAL)
 | 
						|
			die("Fatal alert\n");
 | 
						|
		/* Closure alert is normal (and best) way to close */
 | 
						|
		if (buf[1] == SSL_ALERT_CLOSE_NOTIFY)
 | 
						|
			close_conn_and_exit(ssl, fd);
 | 
						|
		die("Warning alert\n");
 | 
						|
		len32u = len;
 | 
						|
		rc = matrixSslProcessedData(ssl, &buf, &len32u);
 | 
						|
dbg("matrixSslProcessedData:rc=%d\n", rc);
 | 
						|
		len = len32u;
 | 
						|
		goto again;
 | 
						|
 | 
						|
	default:
 | 
						|
		/* If rc < 0 it is an error */
 | 
						|
		die("bad rc:%d\n", rc);
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static sslKeys_t* make_keys(void)
 | 
						|
{
 | 
						|
	int rc, CAstreamLen;
 | 
						|
	char *CAstream;
 | 
						|
	sslKeys_t *keys;
 | 
						|
 | 
						|
	if (matrixSslNewKeys(&keys) < 0)
 | 
						|
		die("matrixSslNewKeys\n");
 | 
						|
 | 
						|
#ifdef USE_HEADER_KEYS
 | 
						|
	/*
 | 
						|
	 * In-memory based keys
 | 
						|
	 * Build the CA list first for potential client auth usage
 | 
						|
	 */
 | 
						|
	CAstream = NULL;
 | 
						|
	CAstreamLen = sizeof(RSACAS);
 | 
						|
	if (CAstreamLen > 0) {
 | 
						|
		CAstream = psMalloc(NULL, CAstreamLen);
 | 
						|
		memcpy(CAstream, RSACAS, sizeof(RSACAS));
 | 
						|
	}
 | 
						|
 | 
						|
 #ifdef ID_RSA
 | 
						|
	rc = matrixSslLoadRsaKeysMem(keys, RSA2048, sizeof(RSA2048),
 | 
						|
			RSA2048KEY, sizeof(RSA2048KEY), (unsigned char*)CAstream,
 | 
						|
			CAstreamLen);
 | 
						|
	if (rc < 0)
 | 
						|
		die("matrixSslLoadRsaKeysMem\n");
 | 
						|
 #endif
 | 
						|
 | 
						|
	if (CAstream)
 | 
						|
		psFree(CAstream);
 | 
						|
#endif /* USE_HEADER_KEYS */
 | 
						|
	return keys;
 | 
						|
}
 | 
						|
 | 
						|
int main(int argc, char **argv)
 | 
						|
{
 | 
						|
	int fd;
 | 
						|
	char *fd_str;
 | 
						|
 | 
						|
	if (!argv[1])
 | 
						|
		die("Syntax error\n");
 | 
						|
	if (argv[1][0] != '-')
 | 
						|
		die("Syntax error\n");
 | 
						|
	if (argv[1][1] != 'd')
 | 
						|
		die("Syntax error\n");
 | 
						|
	fd_str = argv[1] + 2;
 | 
						|
	if (!fd_str[0])
 | 
						|
		fd_str = argv[2];
 | 
						|
	if (!fd_str || fd_str[0] < '0' || fd_str[0] > '9')
 | 
						|
		die("Syntax error\n");
 | 
						|
 | 
						|
	fd = atoi(fd_str);
 | 
						|
	if (fd < 3)
 | 
						|
		die("Syntax error\n");
 | 
						|
 | 
						|
	if (matrixSslOpen() < 0)
 | 
						|
		die("matrixSslOpen\n");
 | 
						|
 | 
						|
	do_io_until_eof_and_exit(fd, make_keys());
 | 
						|
	/* does not return */
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 |