/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release
13 by Björn Påhlsson
Added following support:
1
/***
2
  This file is part of avahi.
3
 
4
  avahi is free software; you can redistribute it and/or modify it
5
  under the terms of the GNU Lesser General Public License as
6
  published by the Free Software Foundation; either version 2.1 of the
7
  License, or (at your option) any later version.
8
 
9
  avahi is distributed in the hope that it will be useful, but WITHOUT
10
  ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11
  or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
12
  Public License for more details.
13
 
14
  You should have received a copy of the GNU Lesser General Public
15
  License along with avahi; if not, write to the Free Software
16
  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
17
  USA.
18
***/
19
20
#define _LARGEFILE_SOURCE
21
#define _FILE_OFFSET_BITS 64
22
23
#include <stdio.h>
24
#include <assert.h>
25
#include <stdlib.h>
26
#include <time.h>
27
#include <net/if.h>		/* if_nametoindex */
28
29
#include <avahi-core/core.h>
30
#include <avahi-core/lookup.h>
31
#include <avahi-core/log.h>
32
#include <avahi-common/simple-watch.h>
33
#include <avahi-common/malloc.h>
34
#include <avahi-common/error.h>
35
36
//mandos client part
37
#include <sys/types.h>		/* socket(), setsockopt(), inet_pton() */
38
#include <sys/socket.h>		/* socket(), setsockopt(), struct sockaddr_in6, struct in6_addr, inet_pton() */
39
#include <gnutls/gnutls.h>	/* ALL GNUTLS STUFF */
40
#include <gnutls/openpgp.h>	/* gnutls with openpgp stuff */
41
42
#include <unistd.h>		/* close() */
43
#include <netinet/in.h>
44
#include <stdbool.h>		/* true */
45
#include <string.h>		/* memset */
46
#include <arpa/inet.h>		/* inet_pton() */
47
#include <iso646.h>		/* not */
48
49
// gpgme
50
#include <errno.h>		/* perror() */
51
#include <gpgme.h>
52
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
53
// getopt long
54
#include <getopt.h>
13 by Björn Påhlsson
Added following support:
55
56
#ifndef CERT_ROOT
57
#define CERT_ROOT "/conf/conf.d/cryptkeyreq/"
58
#endif
59
#define CERTFILE CERT_ROOT "openpgp-client.txt"
60
#define KEYFILE CERT_ROOT "openpgp-client-key.txt"
61
#define BUFFER_SIZE 256
62
#define DH_BITS 1024
63
15.1.2 by Björn Påhlsson
Added debug options from passprompt as --debug and --debug=passprompt
64
bool debug = false;
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
65
char *interface = "eth0";
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
66
13 by Björn Påhlsson
Added following support:
67
typedef struct {
68
  gnutls_session_t session;
69
  gnutls_certificate_credentials_t cred;
70
  gnutls_dh_params_t dh_params;
71
} encrypted_session;
72
73
74
ssize_t gpg_packet_decrypt (char *packet, size_t packet_size, char **new_packet, char *homedir){
75
  gpgme_data_t dh_crypto, dh_plain;
76
  gpgme_ctx_t ctx;
77
  gpgme_error_t rc;
78
  ssize_t ret;
79
  size_t new_packet_capacity = 0;
80
  size_t new_packet_length = 0;
81
  gpgme_engine_info_t engine_info;
82
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
83
  if (debug){
84
    fprintf(stderr, "Attempting to decrypt password from gpg packet\n");
85
  }
86
  
13 by Björn Påhlsson
Added following support:
87
  /* Init GPGME */
88
  gpgme_check_version(NULL);
89
  gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
90
  
91
  /* Set GPGME home directory */
92
  rc = gpgme_get_engine_info (&engine_info);
93
  if (rc != GPG_ERR_NO_ERROR){
94
    fprintf(stderr, "bad gpgme_get_engine_info: %s: %s\n",
95
	    gpgme_strsource(rc), gpgme_strerror(rc));
96
    return -1;
97
  }
98
  while(engine_info != NULL){
99
    if(engine_info->protocol == GPGME_PROTOCOL_OpenPGP){
100
      gpgme_set_engine_info(GPGME_PROTOCOL_OpenPGP,
101
			    engine_info->file_name, homedir);
102
      break;
103
    }
104
    engine_info = engine_info->next;
105
  }
106
  if(engine_info == NULL){
107
    fprintf(stderr, "Could not set home dir to %s\n", homedir);
108
    return -1;
109
  }
110
  
111
  /* Create new GPGME data buffer from packet buffer */
112
  rc = gpgme_data_new_from_mem(&dh_crypto, packet, packet_size, 0);
113
  if (rc != GPG_ERR_NO_ERROR){
114
    fprintf(stderr, "bad gpgme_data_new_from_mem: %s: %s\n",
115
	    gpgme_strsource(rc), gpgme_strerror(rc));
116
    return -1;
117
  }
118
  
119
  /* Create new empty GPGME data buffer for the plaintext */
120
  rc = gpgme_data_new(&dh_plain);
121
  if (rc != GPG_ERR_NO_ERROR){
122
    fprintf(stderr, "bad gpgme_data_new: %s: %s\n",
123
	    gpgme_strsource(rc), gpgme_strerror(rc));
124
    return -1;
125
  }
126
  
127
  /* Create new GPGME "context" */
128
  rc = gpgme_new(&ctx);
129
  if (rc != GPG_ERR_NO_ERROR){
130
    fprintf(stderr, "bad gpgme_new: %s: %s\n",
131
	    gpgme_strsource(rc), gpgme_strerror(rc));
132
    return -1;
133
  }
134
  
135
  /* Decrypt data from the FILE pointer to the plaintext data buffer */
136
  rc = gpgme_op_decrypt(ctx, dh_crypto, dh_plain);
137
  if (rc != GPG_ERR_NO_ERROR){
138
    fprintf(stderr, "bad gpgme_op_decrypt: %s: %s\n",
139
	    gpgme_strsource(rc), gpgme_strerror(rc));
140
    return -1;
141
  }
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
142
143
  if(debug){
144
    fprintf(stderr, "decryption of gpg packet succeeded\n");
145
  }
146
147
  if (debug){
148
    gpgme_decrypt_result_t result;
149
    result = gpgme_op_decrypt_result(ctx);
150
    if (result == NULL){
151
      fprintf(stderr, "gpgme_op_decrypt_result failed\n");
152
    } else {
153
      fprintf(stderr, "Unsupported algorithm: %s\n", result->unsupported_algorithm);
154
      fprintf(stderr, "Wrong key usage: %d\n", result->wrong_key_usage);
155
      if(result->file_name != NULL){
156
	fprintf(stderr, "File name: %s\n", result->file_name);
157
      }
158
      gpgme_recipient_t recipient;
159
      recipient = result->recipients;
160
      if(recipient){
161
	while(recipient != NULL){
162
	  fprintf(stderr, "Public key algorithm: %s\n",
163
		  gpgme_pubkey_algo_name(recipient->pubkey_algo));
164
	  fprintf(stderr, "Key ID: %s\n", recipient->keyid);
165
	  fprintf(stderr, "Secret key available: %s\n",
166
		  recipient->status == GPG_ERR_NO_SECKEY ? "No" : "Yes");
167
	  recipient = recipient->next;
168
	}
169
      }
170
    }
171
  }
13 by Björn Påhlsson
Added following support:
172
  
173
  /* Delete the GPGME FILE pointer cryptotext data buffer */
174
  gpgme_data_release(dh_crypto);
175
  
176
  /* Seek back to the beginning of the GPGME plaintext data buffer */
177
  gpgme_data_seek(dh_plain, 0, SEEK_SET);
178
179
  *new_packet = 0;
180
  while(true){
181
    if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
182
      *new_packet = realloc(*new_packet, new_packet_capacity + BUFFER_SIZE);
183
      if (*new_packet == NULL){
184
	perror("realloc");
185
	return -1;
186
      }
187
      new_packet_capacity += BUFFER_SIZE;
188
    }
189
    
190
    ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length, BUFFER_SIZE);
191
    /* Print the data, if any */
192
    if (ret == 0){
193
      /* If password is empty, then a incorrect error will be printed */
194
      break;
195
    }
196
    if(ret < 0){
197
      perror("gpgme_data_read");
198
      return -1;
199
    }
200
    new_packet_length += ret;
201
  }
202
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
203
  /* FIXME: check characters before printing to screen so to not print
204
     terminal control characters */
205
  /*   if(debug){ */
206
  /*     fprintf(stderr, "decrypted password is: "); */
207
  /*     fwrite(*new_packet, 1, new_packet_length, stderr); */
208
  /*     fprintf(stderr, "\n"); */
209
  /*   } */
210
  
211
  /* Delete the GPGME plaintext data buffer */
13 by Björn Påhlsson
Added following support:
212
  gpgme_data_release(dh_plain);
213
  return new_packet_length;
214
}
215
216
static const char * safer_gnutls_strerror (int value) {
217
  const char *ret = gnutls_strerror (value);
218
  if (ret == NULL)
219
    ret = "(unknown)";
220
  return ret;
221
}
222
223
void debuggnutls(int level, const char* string){
224
  fprintf(stderr, "%s", string);
225
}
226
227
int initgnutls(encrypted_session *es){
228
  const char *err;
229
  int ret;
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
230
231
  if(debug){
232
    fprintf(stderr, "Initializing gnutls\n");
233
  }
234
13 by Björn Påhlsson
Added following support:
235
  
236
  if ((ret = gnutls_global_init ())
237
      != GNUTLS_E_SUCCESS) {
238
    fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
239
    return -1;
240
  }
241
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
242
  if (debug){
243
    gnutls_global_set_log_level(11);
244
    gnutls_global_set_log_function(debuggnutls);
245
  }
246
  
13 by Björn Påhlsson
Added following support:
247
248
  /* openpgp credentials */
249
  if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
250
      != GNUTLS_E_SUCCESS) {
251
    fprintf (stderr, "memory error: %s\n", safer_gnutls_strerror(ret));
252
    return -1;
253
  }
254
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
255
  if(debug){
256
    fprintf(stderr, "Attempting to use openpgp certificate %s"
257
	    " and keyfile %s as gnutls credentials\n", CERTFILE, KEYFILE);
258
  }
259
13 by Björn Påhlsson
Added following support:
260
  ret = gnutls_certificate_set_openpgp_key_file
261
    (es->cred, CERTFILE, KEYFILE, GNUTLS_OPENPGP_FMT_BASE64);
262
  if (ret != GNUTLS_E_SUCCESS) {
263
    fprintf
264
      (stderr, "Error[%d] while reading the OpenPGP key pair ('%s', '%s')\n",
265
       ret, CERTFILE, KEYFILE);
266
    fprintf(stdout, "The Error is: %s\n",
267
	    safer_gnutls_strerror(ret));
268
    return -1;
269
  }
270
271
  //Gnutls server initialization
272
  if ((ret = gnutls_dh_params_init (&es->dh_params))
273
      != GNUTLS_E_SUCCESS) {
274
    fprintf (stderr, "Error in dh parameter initialization: %s\n",
275
	     safer_gnutls_strerror(ret));
276
    return -1;
277
  }
278
279
  if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
280
      != GNUTLS_E_SUCCESS) {
281
    fprintf (stderr, "Error in prime generation: %s\n",
282
	     safer_gnutls_strerror(ret));
283
    return -1;
284
  }
285
286
  gnutls_certificate_set_dh_params (es->cred, es->dh_params);
287
288
  // Gnutls session creation
289
  if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
290
      != GNUTLS_E_SUCCESS){
291
    fprintf(stderr, "Error in gnutls session initialization: %s\n",
292
	    safer_gnutls_strerror(ret));
293
  }
294
295
  if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
296
      != GNUTLS_E_SUCCESS) {
297
    fprintf(stderr, "Syntax error at: %s\n", err);
298
    fprintf(stderr, "Gnutls error: %s\n",
299
	    safer_gnutls_strerror(ret));
300
    return -1;
301
  }
302
303
  if ((ret = gnutls_credentials_set
304
       (es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
305
      != GNUTLS_E_SUCCESS) {
306
    fprintf(stderr, "Error setting a credentials set: %s\n",
307
	    safer_gnutls_strerror(ret));
308
    return -1;
309
  }
310
311
  /* ignore client certificate if any. */
312
  gnutls_certificate_server_set_request (es->session, GNUTLS_CERT_IGNORE);
313
  
314
  gnutls_dh_set_prime_bits (es->session, DH_BITS);
315
  
316
  return 0;
317
}
318
319
void empty_log(AvahiLogLevel level, const char *txt){}
320
321
int start_mandos_communcation(char *ip, uint16_t port){
322
  int ret, tcp_sd;
323
  struct sockaddr_in6 to;
324
  struct in6_addr ip_addr;
325
  encrypted_session es;
326
  char *buffer = NULL;
327
  char *decrypted_buffer;
328
  size_t buffer_length = 0;
329
  size_t buffer_capacity = 0;
330
  ssize_t decrypted_buffer_size;
331
  int retval = 0;
332
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
333
  if(debug){
334
    fprintf(stderr, "Setting up a tcp connection to %s\n", ip);
335
  }
13 by Björn Påhlsson
Added following support:
336
  
337
  tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
338
  if(tcp_sd < 0) {
339
    perror("socket");
340
    return -1;
341
  }
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
342
343
  if(debug){
344
    fprintf(stderr, "Binding to interface %s\n", interface);
345
  }
346
347
  ret = setsockopt(tcp_sd, SOL_SOCKET, SO_BINDTODEVICE, interface, 5);
13 by Björn Påhlsson
Added following support:
348
  if(tcp_sd < 0) {
349
    perror("setsockopt bindtodevice");
350
    return -1;
351
  }
352
  
353
  memset(&to,0,sizeof(to));
354
  to.sin6_family = AF_INET6;
355
  ret = inet_pton(AF_INET6, ip, &ip_addr);
356
  if (ret < 0 ){
357
    perror("inet_pton");
358
    return -1;
359
  }  
360
  if(ret == 0){
361
    fprintf(stderr, "Bad address: %s\n", ip);
362
    return -1;
363
  }
364
  to.sin6_port = htons(port);
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
365
  to.sin6_scope_id = if_nametoindex(interface);
366
367
  if(debug){
368
    fprintf(stderr, "Connection to: %s\n", ip);
369
  }
13 by Björn Påhlsson
Added following support:
370
  
371
  ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
372
  if (ret < 0){
373
    perror("connect");
374
    return -1;
375
  }
376
  
377
  ret = initgnutls (&es);
378
  if (ret != 0){
379
    retval = -1;
380
    return -1;
381
  }
382
    
383
  
384
  gnutls_transport_set_ptr (es.session, (gnutls_transport_ptr_t) tcp_sd);
385
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
386
  if(debug){
387
    fprintf(stderr, "Establishing tls session with %s\n", ip);
388
  }
389
390
  
13 by Björn Påhlsson
Added following support:
391
  ret = gnutls_handshake (es.session);
392
  
393
  if (ret != GNUTLS_E_SUCCESS){
394
    fprintf(stderr, "\n*** Handshake failed ***\n");
395
    gnutls_perror (ret);
396
    retval = -1;
397
    goto exit;
398
  }
399
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
400
  //Retrieve gpg packet that contains the wanted password
401
402
  if(debug){
403
    fprintf(stderr, "Retrieving pgp encrypted password from %s\n", ip);
404
  }
405
13 by Björn Påhlsson
Added following support:
406
  while(true){
407
    if (buffer_length + BUFFER_SIZE > buffer_capacity){
408
      buffer = realloc(buffer, buffer_capacity + BUFFER_SIZE);
409
      if (buffer == NULL){
410
	perror("realloc");
411
	goto exit;
412
      }
413
      buffer_capacity += BUFFER_SIZE;
414
    }
415
    
416
    ret = gnutls_record_recv
417
      (es.session, buffer+buffer_length, BUFFER_SIZE);
418
    if (ret == 0){
419
      break;
420
    }
421
    if (ret < 0){
422
      switch(ret){
423
      case GNUTLS_E_INTERRUPTED:
424
      case GNUTLS_E_AGAIN:
425
	break;
426
      case GNUTLS_E_REHANDSHAKE:
427
	ret = gnutls_handshake (es.session);
428
	if (ret < 0){
429
	  fprintf(stderr, "\n*** Handshake failed ***\n");
430
	  gnutls_perror (ret);
431
	  retval = -1;
432
	  goto exit;
433
	}
434
	break;
435
      default:
436
	fprintf(stderr, "Unknown error while reading data from encrypted session with mandos server\n");
437
	retval = -1;
438
	gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
439
	goto exit;
440
      }
441
    } else {
442
      buffer_length += ret;
443
    }
444
  }
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
445
  
13 by Björn Påhlsson
Added following support:
446
  if (buffer_length > 0){
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
447
    if ((decrypted_buffer_size = gpg_packet_decrypt(buffer, buffer_length, &decrypted_buffer, CERT_ROOT)) >= 0){
13 by Björn Påhlsson
Added following support:
448
      fwrite (decrypted_buffer, 1, decrypted_buffer_size, stdout);
449
      free(decrypted_buffer);
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
450
    } else {
451
      retval = -1;
13 by Björn Påhlsson
Added following support:
452
    }
453
  }
454
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
455
  //shutdown procedure
456
457
  if(debug){
458
    fprintf(stderr, "Closing tls session\n");
459
  }
460
13 by Björn Påhlsson
Added following support:
461
  free(buffer);
462
  gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
463
 exit:
464
  close(tcp_sd);
465
  gnutls_deinit (es.session);
466
  gnutls_certificate_free_credentials (es.cred);
467
  gnutls_global_deinit ();
468
  return retval;
469
}
470
471
static AvahiSimplePoll *simple_poll = NULL;
472
static AvahiServer *server = NULL;
473
474
static void resolve_callback(
475
    AvahiSServiceResolver *r,
476
    AVAHI_GCC_UNUSED AvahiIfIndex interface,
477
    AVAHI_GCC_UNUSED AvahiProtocol protocol,
478
    AvahiResolverEvent event,
479
    const char *name,
480
    const char *type,
481
    const char *domain,
482
    const char *host_name,
483
    const AvahiAddress *address,
484
    uint16_t port,
485
    AvahiStringList *txt,
486
    AvahiLookupResultFlags flags,
487
    AVAHI_GCC_UNUSED void* userdata) {
488
    
489
    assert(r);
490
491
    /* Called whenever a service has been resolved successfully or timed out */
492
493
    switch (event) {
494
        case AVAHI_RESOLVER_FAILURE:
495
            fprintf(stderr, "(Resolver) Failed to resolve service '%s' of type '%s' in domain '%s': %s\n", name, type, domain, avahi_strerror(avahi_server_errno(server)));
496
            break;
497
498
        case AVAHI_RESOLVER_FOUND: {
499
	  char ip[AVAHI_ADDRESS_STR_MAX];
500
            avahi_address_snprint(ip, sizeof(ip), address);
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
501
	    if(debug){
502
	      fprintf(stderr, "Mandos server found at %s on port %d\n", ip, port);
503
	    }
13 by Björn Påhlsson
Added following support:
504
	    int ret = start_mandos_communcation(ip, port);
505
	    if (ret == 0){
506
	      exit(EXIT_SUCCESS);
507
	    } else {
508
	      exit(EXIT_FAILURE);
509
	    }
510
        }
511
    }
512
    avahi_s_service_resolver_free(r);
513
}
514
515
static void browse_callback(
516
    AvahiSServiceBrowser *b,
517
    AvahiIfIndex interface,
518
    AvahiProtocol protocol,
519
    AvahiBrowserEvent event,
520
    const char *name,
521
    const char *type,
522
    const char *domain,
523
    AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
524
    void* userdata) {
525
    
526
    AvahiServer *s = userdata;
527
    assert(b);
528
529
    /* Called whenever a new services becomes available on the LAN or is removed from the LAN */
530
531
    switch (event) {
532
533
        case AVAHI_BROWSER_FAILURE:
534
            
535
            fprintf(stderr, "(Browser) %s\n", avahi_strerror(avahi_server_errno(server)));
536
            avahi_simple_poll_quit(simple_poll);
537
            return;
538
539
        case AVAHI_BROWSER_NEW:
540
            /* We ignore the returned resolver object. In the callback
541
               function we free it. If the server is terminated before
542
               the callback function is called the server will free
543
               the resolver for us. */
544
            
545
            if (!(avahi_s_service_resolver_new(s, interface, protocol, name, type, domain, AVAHI_PROTO_INET6, 0, resolve_callback, s)))
546
                fprintf(stderr, "Failed to resolve service '%s': %s\n", name, avahi_strerror(avahi_server_errno(s)));
547
            
548
            break;
549
550
        case AVAHI_BROWSER_REMOVE:
551
            break;
552
553
        case AVAHI_BROWSER_ALL_FOR_NOW:
554
        case AVAHI_BROWSER_CACHE_EXHAUSTED:
555
            break;
556
    }
557
}
558
559
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
560
    AvahiServerConfig config;
561
    AvahiSServiceBrowser *sb = NULL;
562
    int error;
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
563
    int ret;
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
564
    int returncode = EXIT_SUCCESS;
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
565
566
    while (true){
567
      static struct option long_options[] = {
568
	{"debug", no_argument, (int *)&debug, 1},
569
	{"interface", required_argument, 0, 'i'},
570
	{0, 0, 0, 0} };
571
572
      int option_index = 0;
573
      ret = getopt_long (argc, argv, "i:", long_options, &option_index);
574
575
      if (ret == -1){
576
	break;
577
      }
578
      
579
      switch(ret){
580
      case 0:
581
	break;
582
      case 'i':
583
	interface = optarg;
584
	break;
585
      default:
586
	exit(EXIT_FAILURE);
587
      }
588
    }
589
    
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
590
    if (not debug){
591
      avahi_set_log_function(empty_log);
592
    }
13 by Björn Påhlsson
Added following support:
593
    
594
    /* Initialize the psuedo-RNG */
595
    srand(time(NULL));
596
597
    /* Allocate main loop object */
598
    if (!(simple_poll = avahi_simple_poll_new())) {
599
        fprintf(stderr, "Failed to create simple poll object.\n");
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
600
	
601
        goto exit;
13 by Björn Påhlsson
Added following support:
602
    }
603
604
    /* Do not publish any local records */
605
    avahi_server_config_init(&config);
606
    config.publish_hinfo = 0;
607
    config.publish_addresses = 0;
608
    config.publish_workstation = 0;
609
    config.publish_domain = 0;
610
611
    /* Allocate a new server */
612
    server = avahi_server_new(avahi_simple_poll_get(simple_poll), &config, NULL, NULL, &error);
613
614
    /* Free the configuration data */
615
    avahi_server_config_free(&config);
616
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
617
    /* Check if creating the server object succeeded */
13 by Björn Påhlsson
Added following support:
618
    if (!server) {
619
        fprintf(stderr, "Failed to create server: %s\n", avahi_strerror(error));
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
620
	returncode = EXIT_FAILURE;
621
        goto exit;
13 by Björn Påhlsson
Added following support:
622
    }
623
    
624
    /* Create the service browser */
625
    if (!(sb = avahi_s_service_browser_new(server, if_nametoindex("eth0"), AVAHI_PROTO_INET6, "_mandos._tcp", NULL, 0, browse_callback, server))) {
626
        fprintf(stderr, "Failed to create service browser: %s\n", avahi_strerror(avahi_server_errno(server)));
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
627
	returncode = EXIT_FAILURE;
628
        goto exit;
13 by Björn Påhlsson
Added following support:
629
    }
630
    
631
    /* Run the main loop */
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
632
633
    if (debug){
634
      fprintf(stderr, "Starting avahi loop search\n");
635
    }
636
    
13 by Björn Påhlsson
Added following support:
637
    avahi_simple_poll_loop(simple_poll);
638
    
15.1.1 by Björn Påhlsson
Added debugg support in form off --debug and --debug=mandosclient
639
exit:
640
641
    if (debug){
642
      fprintf(stderr, "%s exiting\n", argv[0]);
643
    }
13 by Björn Påhlsson
Added following support:
644
    
645
    /* Cleanup things */
646
    if (sb)
647
        avahi_s_service_browser_free(sb);
648
    
649
    if (server)
650
        avahi_server_free(server);
651
652
    if (simple_poll)
653
        avahi_simple_poll_free(simple_poll);
654
15.1.3 by Björn Påhlsson
Added getopt_long support for mandosclient and passprompt
655
    return returncode;
13 by Björn Påhlsson
Added following support:
656
}