32
32
#define _LARGEFILE_SOURCE
33
33
#define _FILE_OFFSET_BITS 64
39
#include <net/if.h> /* if_nametoindex */
40
#include <sys/ioctl.h> /* ioctl, ifreq, SIOCGIFFLAGS, IFF_UP,
35
#define _GNU_SOURCE /* TEMP_FAILURE_RETRY(), asprintf() */
37
#include <stdio.h> /* fprintf(), stderr, fwrite(),
39
#include <stdint.h> /* uint16_t, uint32_t */
40
#include <stddef.h> /* NULL, size_t, ssize_t */
41
#include <stdlib.h> /* free(), EXIT_SUCCESS, EXIT_FAILURE,
43
#include <stdbool.h> /* bool, true */
44
#include <string.h> /* memset(), strcmp(), strlen(),
45
strerror(), asprintf(), strcpy() */
46
#include <sys/ioctl.h> /* ioctl */
47
#include <sys/types.h> /* socket(), inet_pton(), sockaddr,
48
sockaddr_in6, PF_INET6,
49
SOCK_STREAM, INET6_ADDRSTRLEN,
51
#include <inttypes.h> /* PRIu16 */
52
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
53
struct in6_addr, inet_pton(),
55
#include <assert.h> /* assert() */
56
#include <errno.h> /* perror(), errno */
57
#include <time.h> /* time() */
42
58
#include <net/if.h> /* ioctl, ifreq, SIOCGIFFLAGS, IFF_UP,
59
SIOCSIFFLAGS, if_indextoname(),
60
if_nametoindex(), IF_NAMESIZE */
61
#include <unistd.h> /* close(), SEEK_SET, off_t, write(),
62
getuid(), getgid(), setuid(),
64
#include <netinet/in.h>
65
#include <arpa/inet.h> /* inet_pton(), htons */
66
#include <iso646.h> /* not, and */
67
#include <argp.h> /* struct argp_option, error_t, struct
68
argp_state, struct argp,
69
argp_parse(), ARGP_KEY_ARG,
70
ARGP_KEY_END, ARGP_ERR_UNKNOWN */
73
/* All Avahi types, constants and functions
45
76
#include <avahi-core/core.h>
46
77
#include <avahi-core/lookup.h>
47
78
#include <avahi-core/log.h>
49
80
#include <avahi-common/malloc.h>
50
81
#include <avahi-common/error.h>
53
#include <sys/types.h> /* socket(), inet_pton() */
54
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
55
struct in6_addr, inet_pton() */
56
#include <gnutls/gnutls.h> /* All GnuTLS stuff */
57
#include <gnutls/openpgp.h> /* GnuTLS with openpgp stuff */
59
#include <unistd.h> /* close() */
60
#include <netinet/in.h>
61
#include <stdbool.h> /* true */
62
#include <string.h> /* memset */
63
#include <arpa/inet.h> /* inet_pton() */
64
#include <iso646.h> /* not */
67
#include <errno.h> /* perror() */
84
#include <gnutls/gnutls.h> /* All GnuTLS types, constants and
87
init_gnutls_session(),
89
#include <gnutls/openpgp.h> /* gnutls_certificate_set_openpgp_key_file(),
90
GNUTLS_OPENPGP_FMT_BASE64 */
93
#include <gpgme.h> /* All GPGME types, constants and
96
GPGME_PROTOCOL_OpenPGP,
73
99
#define BUFFER_SIZE 256
75
102
static const char *keydir = "/conf/conf.d/mandos";
76
static const char *pubkeyfile = "pubkey.txt";
77
static const char *seckeyfile = "seckey.txt";
81
/* Used for passing in values through all the callback functions */
103
static const char mandos_protocol_version[] = "1";
104
const char *argp_program_version = "password-request 1.0";
105
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
107
/* Used for passing in values through the Avahi callback functions */
83
109
AvahiSimplePoll *simple_poll;
84
110
AvahiServer *server;
85
111
gnutls_certificate_credentials_t cred;
86
112
unsigned int dh_bits;
113
gnutls_dh_params_t dh_params;
87
114
const char *priority;
118
* Make room in "buffer" for at least BUFFER_SIZE additional bytes.
119
* "buffer_capacity" is how much is currently allocated,
120
* "buffer_length" is how much is already used.
122
size_t adjustbuffer(char **buffer, size_t buffer_length,
123
size_t buffer_capacity){
124
if (buffer_length + BUFFER_SIZE > buffer_capacity){
125
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
129
buffer_capacity += BUFFER_SIZE;
131
return buffer_capacity;
91
135
* Decrypt OpenPGP data using keyrings in HOMEDIR.
92
136
* Returns -1 on error
170
214
fprintf(stderr, "bad gpgme_op_decrypt: %s: %s\n",
171
215
gpgme_strsource(rc), gpgme_strerror(rc));
172
216
plaintext_length = -1;
218
gpgme_decrypt_result_t result;
219
result = gpgme_op_decrypt_result(ctx);
221
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
223
fprintf(stderr, "Unsupported algorithm: %s\n",
224
result->unsupported_algorithm);
225
fprintf(stderr, "Wrong key usage: %u\n",
226
result->wrong_key_usage);
227
if(result->file_name != NULL){
228
fprintf(stderr, "File name: %s\n", result->file_name);
230
gpgme_recipient_t recipient;
231
recipient = result->recipients;
233
while(recipient != NULL){
234
fprintf(stderr, "Public key algorithm: %s\n",
235
gpgme_pubkey_algo_name(recipient->pubkey_algo));
236
fprintf(stderr, "Key ID: %s\n", recipient->keyid);
237
fprintf(stderr, "Secret key available: %s\n",
238
recipient->status == GPG_ERR_NO_SECKEY
240
recipient = recipient->next;
173
245
goto decrypt_end;
177
249
fprintf(stderr, "Decryption of OpenPGP data succeeded\n");
181
gpgme_decrypt_result_t result;
182
result = gpgme_op_decrypt_result(ctx);
184
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
186
fprintf(stderr, "Unsupported algorithm: %s\n",
187
result->unsupported_algorithm);
188
fprintf(stderr, "Wrong key usage: %d\n",
189
result->wrong_key_usage);
190
if(result->file_name != NULL){
191
fprintf(stderr, "File name: %s\n", result->file_name);
193
gpgme_recipient_t recipient;
194
recipient = result->recipients;
196
while(recipient != NULL){
197
fprintf(stderr, "Public key algorithm: %s\n",
198
gpgme_pubkey_algo_name(recipient->pubkey_algo));
199
fprintf(stderr, "Key ID: %s\n", recipient->keyid);
200
fprintf(stderr, "Secret key available: %s\n",
201
recipient->status == GPG_ERR_NO_SECKEY
203
recipient = recipient->next;
209
252
/* Seek back to the beginning of the GPGME plaintext data buffer */
210
253
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
211
254
perror("pgpme_data_seek");
263
303
static const char * safer_gnutls_strerror (int value) {
264
const char *ret = gnutls_strerror (value);
304
const char *ret = gnutls_strerror (value); /* Spurious warning */
266
306
ret = "(unknown)";
310
/* GnuTLS log function callback */
270
311
static void debuggnutls(__attribute__((unused)) int level,
271
312
const char* string){
272
fprintf(stderr, "%s", string);
313
fprintf(stderr, "GnuTLS: %s", string);
275
static int initgnutls(mandos_context *mc, gnutls_session_t *session,
276
gnutls_dh_params_t *dh_params){
316
static int init_gnutls_global(mandos_context *mc,
317
const char *pubkeyfilename,
318
const char *seckeyfilename){
281
322
fprintf(stderr, "Initializing GnuTLS\n");
284
if ((ret = gnutls_global_init ())
285
!= GNUTLS_E_SUCCESS) {
286
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
325
ret = gnutls_global_init();
326
if (ret != GNUTLS_E_SUCCESS) {
327
fprintf (stderr, "GnuTLS global_init: %s\n",
328
safer_gnutls_strerror(ret));
333
/* "Use a log level over 10 to enable all debugging options."
291
336
gnutls_global_set_log_level(11);
292
337
gnutls_global_set_log_function(debuggnutls);
295
/* openpgp credentials */
296
if ((ret = gnutls_certificate_allocate_credentials (&mc->cred))
297
!= GNUTLS_E_SUCCESS) {
298
fprintf (stderr, "memory error: %s\n",
340
/* OpenPGP credentials */
341
gnutls_certificate_allocate_credentials(&mc->cred);
342
if (ret != GNUTLS_E_SUCCESS){
343
fprintf (stderr, "GnuTLS memory error: %s\n", /* Spurious
299
345
safer_gnutls_strerror(ret));
346
gnutls_global_deinit ();
304
351
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
305
" and keyfile %s as GnuTLS credentials\n", pubkeyfile,
352
" and keyfile %s as GnuTLS credentials\n", pubkeyfilename,
309
356
ret = gnutls_certificate_set_openpgp_key_file
310
(mc->cred, pubkeyfile, seckeyfile, GNUTLS_OPENPGP_FMT_BASE64);
357
(mc->cred, pubkeyfilename, seckeyfilename,
358
GNUTLS_OPENPGP_FMT_BASE64);
311
359
if (ret != GNUTLS_E_SUCCESS) {
313
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
315
ret, pubkeyfile, seckeyfile);
316
fprintf(stdout, "The Error is: %s\n",
361
"Error[%d] while reading the OpenPGP key pair ('%s',"
362
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
363
fprintf(stdout, "The GnuTLS error is: %s\n",
317
364
safer_gnutls_strerror(ret));
321
//GnuTLS server initialization
322
if ((ret = gnutls_dh_params_init(dh_params))
323
!= GNUTLS_E_SUCCESS) {
324
fprintf (stderr, "Error in dh parameter initialization: %s\n",
325
safer_gnutls_strerror(ret));
329
if ((ret = gnutls_dh_params_generate2(*dh_params, mc->dh_bits))
330
!= GNUTLS_E_SUCCESS) {
331
fprintf (stderr, "Error in prime generation: %s\n",
332
safer_gnutls_strerror(ret));
336
gnutls_certificate_set_dh_params(mc->cred, *dh_params);
338
// GnuTLS session creation
339
if ((ret = gnutls_init(session, GNUTLS_SERVER))
340
!= GNUTLS_E_SUCCESS){
368
/* GnuTLS server initialization */
369
ret = gnutls_dh_params_init(&mc->dh_params);
370
if (ret != GNUTLS_E_SUCCESS) {
371
fprintf (stderr, "Error in GnuTLS DH parameter initialization:"
372
" %s\n", safer_gnutls_strerror(ret));
375
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
376
if (ret != GNUTLS_E_SUCCESS) {
377
fprintf (stderr, "Error in GnuTLS prime generation: %s\n",
378
safer_gnutls_strerror(ret));
382
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
388
gnutls_certificate_free_credentials(mc->cred);
389
gnutls_global_deinit();
394
static int init_gnutls_session(mandos_context *mc,
395
gnutls_session_t *session){
397
/* GnuTLS session creation */
398
ret = gnutls_init(session, GNUTLS_SERVER);
399
if (ret != GNUTLS_E_SUCCESS){
341
400
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
342
401
safer_gnutls_strerror(ret));
345
if ((ret = gnutls_priority_set_direct(*session, mc->priority, &err))
346
!= GNUTLS_E_SUCCESS) {
347
fprintf(stderr, "Syntax error at: %s\n", err);
348
fprintf(stderr, "GnuTLS error: %s\n",
349
safer_gnutls_strerror(ret));
406
ret = gnutls_priority_set_direct(*session, mc->priority, &err);
407
if (ret != GNUTLS_E_SUCCESS) {
408
fprintf(stderr, "Syntax error at: %s\n", err);
409
fprintf(stderr, "GnuTLS error: %s\n",
410
safer_gnutls_strerror(ret));
411
gnutls_deinit (*session);
353
if ((ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
355
!= GNUTLS_E_SUCCESS) {
356
fprintf(stderr, "Error setting a credentials set: %s\n",
416
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
418
if (ret != GNUTLS_E_SUCCESS) {
419
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
357
420
safer_gnutls_strerror(ret));
421
gnutls_deinit (*session);
436
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
509
ret = connect(tcp_sd, &to.in, sizeof(to));
438
511
perror("connect");
442
ret = initgnutls (mc, &session, &dh_params);
515
const char *out = mandos_protocol_version;
518
size_t out_size = strlen(out);
519
ret = TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
520
out_size - written));
526
written += (size_t)ret;
527
if(written < out_size){
530
if (out == mandos_protocol_version){
540
fprintf(stderr, "Establishing TLS session with %s\n", ip);
448
543
gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) tcp_sd);
451
fprintf(stderr, "Establishing TLS session with %s\n", ip);
454
ret = gnutls_handshake (session);
546
ret = gnutls_handshake (session);
547
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
456
549
if (ret != GNUTLS_E_SUCCESS){
458
fprintf(stderr, "\n*** Handshake failed ***\n");
551
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
459
552
gnutls_perror (ret);
465
//Retrieve OpenPGP packet that contains the wanted password
558
/* Read OpenPGP packet that contains the wanted password */
468
561
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
618
715
case AVAHI_BROWSER_FAILURE:
620
fprintf(stderr, "(Browser) %s\n",
717
fprintf(stderr, "(Avahi browser) %s\n",
621
718
avahi_strerror(avahi_server_errno(mc->server)));
622
719
avahi_simple_poll_quit(mc->simple_poll);
625
722
case AVAHI_BROWSER_NEW:
626
/* We ignore the returned resolver object. In the callback
627
function we free it. If the server is terminated before
628
the callback function is called the server will free
629
the resolver for us. */
723
/* We ignore the returned Avahi resolver object. In the callback
724
function we free it. If the Avahi server is terminated before
725
the callback function is called the Avahi server will free the
631
728
if (!(avahi_s_service_resolver_new(mc->server, interface,
632
729
protocol, name, type, domain,
633
730
AVAHI_PROTO_INET6, 0,
634
731
resolve_callback, mc)))
635
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
636
avahi_strerror(avahi_server_errno(mc->server)));
732
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
733
name, avahi_strerror(avahi_server_errno(mc->server)));
639
736
case AVAHI_BROWSER_REMOVE:
642
739
case AVAHI_BROWSER_ALL_FOR_NOW:
643
740
case AVAHI_BROWSER_CACHE_EXHAUSTED:
742
fprintf(stderr, "No Mandos server found, still searching...\n");
648
748
/* Combines file name and path and returns the malloced new
649
749
string. some sane checks could/should be added */
650
static const char *combinepath(const char *first, const char *second){
651
size_t f_len = strlen(first);
652
size_t s_len = strlen(second);
653
char *tmp = malloc(f_len + s_len + 2);
750
static char *combinepath(const char *first, const char *second){
752
int ret = asprintf(&tmp, "%s/%s", first, second);
658
memcpy(tmp, first, f_len); /* Spurious warning */
662
memcpy(tmp + f_len + 1, second, s_len); /* Spurious warning */
664
tmp[f_len + 1 + s_len] = '\0';
669
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
670
AvahiServerConfig config;
760
int main(int argc, char *argv[]){
671
761
AvahiSServiceBrowser *sb = NULL;
675
int returncode = EXIT_SUCCESS;
764
int exitcode = EXIT_SUCCESS;
676
765
const char *interface = "eth0";
677
766
struct ifreq network;
679
770
char *connect_to = NULL;
680
771
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
772
char *pubkeyfilename = NULL;
773
char *seckeyfilename = NULL;
774
const char *pubkeyname = "pubkey.txt";
775
const char *seckeyname = "seckey.txt";
681
776
mandos_context mc = { .simple_poll = NULL, .server = NULL,
682
.dh_bits = 1024, .priority = "SECURE256"};
684
debug_int = debug ? 1 : 0;
686
struct option long_options[] = {
687
{"debug", no_argument, &debug_int, 1},
688
{"connect", required_argument, NULL, 'c'},
689
{"interface", required_argument, NULL, 'i'},
690
{"keydir", required_argument, NULL, 'd'},
691
{"seckey", required_argument, NULL, 's'},
692
{"pubkey", required_argument, NULL, 'p'},
693
{"dh-bits", required_argument, NULL, 'D'},
694
{"priority", required_argument, NULL, 'P'},
697
int option_index = 0;
698
ret = getopt_long (argc, argv, "i:", long_options,
725
mc.dh_bits = (unsigned int) strtol(optarg, NULL, 10);
732
mc.priority = optarg;
739
debug = debug_int ? true : false;
741
pubkeyfile = combinepath(keydir, pubkeyfile);
742
if (pubkeyfile == NULL){
743
perror("combinepath");
744
returncode = EXIT_FAILURE;
748
seckeyfile = combinepath(keydir, seckeyfile);
749
if (seckeyfile == NULL){
750
perror("combinepath");
777
.dh_bits = 1024, .priority = "SECURE256"
778
":!CTYPE-X.509:+CTYPE-OPENPGP" };
779
bool gnutls_initalized = false;
782
struct argp_option options[] = {
783
{ .name = "debug", .key = 128,
784
.doc = "Debug mode", .group = 3 },
785
{ .name = "connect", .key = 'c',
787
.doc = "Connect directly to a sepcified mandos server",
789
{ .name = "interface", .key = 'i',
791
.doc = "Interface that Avahi will conntect through",
793
{ .name = "keydir", .key = 'd',
795
.doc = "Directory where the openpgp keyring is",
797
{ .name = "seckey", .key = 's',
799
.doc = "Secret openpgp key for gnutls authentication",
801
{ .name = "pubkey", .key = 'p',
803
.doc = "Public openpgp key for gnutls authentication",
805
{ .name = "dh-bits", .key = 129,
807
.doc = "dh-bits to use in gnutls communication",
809
{ .name = "priority", .key = 130,
811
.doc = "GNUTLS priority", .group = 1 },
816
error_t parse_opt (int key, char *arg,
817
struct argp_state *state) {
818
/* Get the INPUT argument from `argp_parse', which we know is
819
a pointer to our plugin list pointer. */
821
case 128: /* --debug */
824
case 'c': /* --connect */
827
case 'i': /* --interface */
830
case 'd': /* --keydir */
833
case 's': /* --seckey */
836
case 'p': /* --pubkey */
839
case 129: /* --dh-bits */
841
mc.dh_bits = (unsigned int) strtol(arg, NULL, 10);
847
case 130: /* --priority */
855
return ARGP_ERR_UNKNOWN;
860
struct argp argp = { .options = options, .parser = parse_opt,
862
.doc = "Mandos client -- Get and decrypt"
863
" passwords from mandos server" };
864
ret = argp_parse (&argp, argc, argv, 0, 0, NULL);
865
if (ret == ARGP_ERR_UNKNOWN){
866
fprintf(stderr, "Unknown error while parsing arguments\n");
867
exitcode = EXIT_FAILURE;
872
pubkeyfilename = combinepath(keydir, pubkeyname);
873
if (pubkeyfilename == NULL){
874
perror("combinepath");
875
exitcode = EXIT_FAILURE;
879
seckeyfilename = combinepath(keydir, seckeyname);
880
if (seckeyfilename == NULL){
881
perror("combinepath");
882
exitcode = EXIT_FAILURE;
886
ret = init_gnutls_global(&mc, pubkeyfilename, seckeyfilename);
888
fprintf(stderr, "init_gnutls_global failed\n");
889
exitcode = EXIT_FAILURE;
892
gnutls_initalized = true;
895
/* If the interface is down, bring it up */
897
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
900
exitcode = EXIT_FAILURE;
903
strcpy(network.ifr_name, interface);
904
ret = ioctl(sd, SIOCGIFFLAGS, &network);
906
perror("ioctl SIOCGIFFLAGS");
907
exitcode = EXIT_FAILURE;
910
if((network.ifr_flags & IFF_UP) == 0){
911
network.ifr_flags |= IFF_UP;
912
ret = ioctl(sd, SIOCSIFFLAGS, &network);
914
perror("ioctl SIOCSIFFLAGS");
915
exitcode = EXIT_FAILURE;
754
935
if_index = (AvahiIfIndex) if_nametoindex(interface);
763
944
char *address = strrchr(connect_to, ':');
764
945
if(address == NULL){
765
946
fprintf(stderr, "No colon in address\n");
947
exitcode = EXIT_FAILURE;
769
951
uint16_t port = (uint16_t) strtol(address+1, NULL, 10);
771
953
perror("Bad port number");
954
exitcode = EXIT_FAILURE;
775
958
address = connect_to;
776
959
ret = start_mandos_communication(address, port, if_index, &mc);
961
exitcode = EXIT_FAILURE;
784
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
787
returncode = EXIT_FAILURE;
790
strcpy(network.ifr_name, interface); /* Spurious warning */
791
ret = ioctl(sd, SIOCGIFFLAGS, &network);
794
perror("ioctl SIOCGIFFLAGS");
795
returncode = EXIT_FAILURE;
798
if((network.ifr_flags & IFF_UP) == 0){
799
network.ifr_flags |= IFF_UP;
800
ret = ioctl(sd, SIOCSIFFLAGS, &network);
802
perror("ioctl SIOCSIFFLAGS");
803
returncode = EXIT_FAILURE;
963
exitcode = EXIT_SUCCESS;
810
969
avahi_set_log_function(empty_log);
813
/* Initialize the psuedo-RNG */
972
/* Initialize the pseudo-RNG for Avahi */
814
973
srand((unsigned int) time(NULL));
816
/* Allocate main loop object */
817
if (!(mc.simple_poll = avahi_simple_poll_new())) {
818
fprintf(stderr, "Failed to create simple poll object.\n");
819
returncode = EXIT_FAILURE;
823
/* Do not publish any local records */
824
avahi_server_config_init(&config);
825
config.publish_hinfo = 0;
826
config.publish_addresses = 0;
827
config.publish_workstation = 0;
828
config.publish_domain = 0;
830
/* Allocate a new server */
831
mc.server=avahi_server_new(avahi_simple_poll_get(mc.simple_poll),
832
&config, NULL, NULL, &error);
834
/* Free the configuration data */
835
avahi_server_config_free(&config);
837
/* Check if creating the server object succeeded */
839
fprintf(stderr, "Failed to create server: %s\n",
975
/* Allocate main Avahi loop object */
976
mc.simple_poll = avahi_simple_poll_new();
977
if (mc.simple_poll == NULL) {
978
fprintf(stderr, "Avahi: Failed to create simple poll"
980
exitcode = EXIT_FAILURE;
985
AvahiServerConfig config;
986
/* Do not publish any local Zeroconf records */
987
avahi_server_config_init(&config);
988
config.publish_hinfo = 0;
989
config.publish_addresses = 0;
990
config.publish_workstation = 0;
991
config.publish_domain = 0;
993
/* Allocate a new server */
994
mc.server = avahi_server_new(avahi_simple_poll_get
995
(mc.simple_poll), &config, NULL,
998
/* Free the Avahi configuration data */
999
avahi_server_config_free(&config);
1002
/* Check if creating the Avahi server object succeeded */
1003
if (mc.server == NULL) {
1004
fprintf(stderr, "Failed to create Avahi server: %s\n",
840
1005
avahi_strerror(error));
841
returncode = EXIT_FAILURE;
1006
exitcode = EXIT_FAILURE;
845
/* Create the service browser */
1010
/* Create the Avahi service browser */
846
1011
sb = avahi_s_service_browser_new(mc.server, if_index,
847
1012
AVAHI_PROTO_INET6,
848
1013
"_mandos._tcp", NULL, 0,
849
1014
browse_callback, &mc);
851
1016
fprintf(stderr, "Failed to create service browser: %s\n",
852
1017
avahi_strerror(avahi_server_errno(mc.server)));
853
returncode = EXIT_FAILURE;
1018
exitcode = EXIT_FAILURE;
857
1022
/* Run the main loop */
860
fprintf(stderr, "Starting avahi loop search\n");
1025
fprintf(stderr, "Starting Avahi loop search\n");
863
1028
avahi_simple_poll_loop(mc.simple_poll);
868
1033
fprintf(stderr, "%s exiting\n", argv[0]);
871
1036
/* Cleanup things */
873
1038
avahi_s_service_browser_free(sb);
1040
if (mc.server != NULL)
876
1041
avahi_server_free(mc.server);
1043
if (mc.simple_poll != NULL)
879
1044
avahi_simple_poll_free(mc.simple_poll);
1045
free(pubkeyfilename);
1046
free(seckeyfilename);
1048
if (gnutls_initalized){
1049
gnutls_certificate_free_credentials(mc.cred);
1050
gnutls_global_deinit ();