25
25
* along with this program. If not, see
26
26
* <http://www.gnu.org/licenses/>.
28
* Contact the authors at <mandos@fukt.bsnet.se>.
28
* Contact the authors at <https://www.fukt.bsnet.se/~belorn/> and
29
* <https://www.fukt.bsnet.se/~teddy/>.
31
32
/* Needed by GPGME, specifically gpgme_data_seek() */
32
33
#define _LARGEFILE_SOURCE
33
34
#define _FILE_OFFSET_BITS 64
35
#define _GNU_SOURCE /* TEMP_FAILURE_RETRY(), asprintf() */
37
#include <stdio.h> /* fprintf(), stderr, fwrite(),
39
#include <stdint.h> /* uint16_t, uint32_t */
40
#include <stddef.h> /* NULL, size_t, ssize_t */
41
#include <stdlib.h> /* free(), EXIT_SUCCESS, EXIT_FAILURE,
43
#include <stdbool.h> /* bool, true */
44
#include <string.h> /* memset(), strcmp(), strlen(),
45
strerror(), asprintf(), strcpy() */
46
#include <sys/ioctl.h> /* ioctl */
47
#include <sys/types.h> /* socket(), inet_pton(), sockaddr,
48
sockaddr_in6, PF_INET6,
49
SOCK_STREAM, INET6_ADDRSTRLEN,
51
#include <inttypes.h> /* PRIu16 */
52
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
53
struct in6_addr, inet_pton(),
55
#include <assert.h> /* assert() */
56
#include <errno.h> /* perror(), errno */
57
#include <time.h> /* time() */
58
#include <net/if.h> /* ioctl, ifreq, SIOCGIFFLAGS, IFF_UP,
59
SIOCSIFFLAGS, if_indextoname(),
60
if_nametoindex(), IF_NAMESIZE */
61
#include <unistd.h> /* close(), SEEK_SET, off_t, write(),
62
getuid(), getgid(), setuid(),
64
#include <netinet/in.h>
65
#include <arpa/inet.h> /* inet_pton(), htons */
66
#include <iso646.h> /* not, and */
67
#include <argp.h> /* struct argp_option, error_t, struct
68
argp_state, struct argp,
69
argp_parse(), ARGP_KEY_ARG,
70
ARGP_KEY_END, ARGP_ERR_UNKNOWN */
73
/* All Avahi types, constants and functions
40
#include <net/if.h> /* if_nametoindex */
76
42
#include <avahi-core/core.h>
77
43
#include <avahi-core/lookup.h>
78
44
#include <avahi-core/log.h>
80
46
#include <avahi-common/malloc.h>
81
47
#include <avahi-common/error.h>
84
#include <gnutls/gnutls.h> /* All GnuTLS types, constants and
87
init_gnutls_session(),
89
#include <gnutls/openpgp.h> /* gnutls_certificate_set_openpgp_key_file(),
90
GNUTLS_OPENPGP_FMT_BASE64 */
93
#include <gpgme.h> /* All GPGME types, constants and
96
GPGME_PROTOCOL_OpenPGP,
50
#include <sys/types.h> /* socket(), inet_pton() */
51
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
52
struct in6_addr, inet_pton() */
53
#include <gnutls/gnutls.h> /* All GnuTLS stuff */
54
#include <gnutls/openpgp.h> /* GnuTLS with openpgp stuff */
56
#include <unistd.h> /* close() */
57
#include <netinet/in.h>
58
#include <stdbool.h> /* true */
59
#include <string.h> /* memset */
60
#include <arpa/inet.h> /* inet_pton() */
61
#include <iso646.h> /* not */
64
#include <errno.h> /* perror() */
99
70
#define BUFFER_SIZE 256
73
const char *certdir = "/conf/conf.d/cryptkeyreq/";
74
const char *certfile = "openpgp-client.txt";
75
const char *certkey = "openpgp-client-key.txt";
101
77
bool debug = false;
102
static const char *keydir = "/conf/conf.d/mandos";
103
static const char mandos_protocol_version[] = "1";
104
const char *argp_program_version = "password-request 1.0";
105
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
107
/* Used for passing in values through the Avahi callback functions */
109
AvahiSimplePoll *simple_poll;
80
gnutls_session_t session;
111
81
gnutls_certificate_credentials_t cred;
112
unsigned int dh_bits;
113
82
gnutls_dh_params_t dh_params;
114
const char *priority;
118
* Make room in "buffer" for at least BUFFER_SIZE additional bytes.
119
* "buffer_capacity" is how much is currently allocated,
120
* "buffer_length" is how much is already used.
122
size_t adjustbuffer(char **buffer, size_t buffer_length,
123
size_t buffer_capacity){
124
if (buffer_length + BUFFER_SIZE > buffer_capacity){
125
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
129
buffer_capacity += BUFFER_SIZE;
131
return buffer_capacity;
135
* Decrypt OpenPGP data using keyrings in HOMEDIR.
136
* Returns -1 on error
138
static ssize_t pgp_packet_decrypt (const char *cryptotext,
141
const char *homedir){
86
ssize_t pgp_packet_decrypt (char *packet, size_t packet_size,
87
char **new_packet, const char *homedir){
142
88
gpgme_data_t dh_crypto, dh_plain;
146
size_t plaintext_capacity = 0;
147
ssize_t plaintext_length = 0;
92
ssize_t new_packet_capacity = 0;
93
ssize_t new_packet_length = 0;
148
94
gpgme_engine_info_t engine_info;
151
fprintf(stderr, "Trying to decrypt OpenPGP data\n");
97
fprintf(stderr, "Trying to decrypt OpenPGP packet\n");
195
/* Delete the GPGME FILE pointer cryptotext data buffer */
196
gpgme_data_release(dh_crypto);
253
198
/* Seek back to the beginning of the GPGME plaintext data buffer */
254
199
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
255
200
perror("pgpme_data_seek");
256
plaintext_length = -1;
262
plaintext_capacity = adjustbuffer(plaintext,
263
(size_t)plaintext_length,
265
if (plaintext_capacity == 0){
266
perror("adjustbuffer");
267
plaintext_length = -1;
205
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
206
*new_packet = realloc(*new_packet,
207
(unsigned int)new_packet_capacity
209
if (*new_packet == NULL){
213
new_packet_capacity += BUFFER_SIZE;
271
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
216
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length,
273
218
/* Print the data, if any */
279
223
perror("gpgme_data_read");
280
plaintext_length = -1;
283
plaintext_length += ret;
226
new_packet_length += ret;
287
fprintf(stderr, "Decrypted password is: ");
288
for(ssize_t i = 0; i < plaintext_length; i++){
289
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
291
fprintf(stderr, "\n");
296
/* Delete the GPGME cryptotext data buffer */
297
gpgme_data_release(dh_crypto);
229
/* FIXME: check characters before printing to screen so to not print
230
terminal control characters */
232
/* fprintf(stderr, "decrypted password is: "); */
233
/* fwrite(*new_packet, 1, new_packet_length, stderr); */
234
/* fprintf(stderr, "\n"); */
299
237
/* Delete the GPGME plaintext data buffer */
300
238
gpgme_data_release(dh_plain);
301
return plaintext_length;
239
return new_packet_length;
304
242
static const char * safer_gnutls_strerror (int value) {
311
/* GnuTLS log function callback */
312
static void debuggnutls(__attribute__((unused)) int level,
314
fprintf(stderr, "GnuTLS: %s", string);
249
void debuggnutls(__attribute__((unused)) int level,
251
fprintf(stderr, "%s", string);
317
static int init_gnutls_global(mandos_context *mc,
318
const char *pubkeyfilename,
319
const char *seckeyfilename){
254
int initgnutls(encrypted_session *es){
323
259
fprintf(stderr, "Initializing GnuTLS\n");
326
ret = gnutls_global_init();
327
if (ret != GNUTLS_E_SUCCESS) {
328
fprintf (stderr, "GnuTLS global_init: %s\n",
329
safer_gnutls_strerror(ret));
262
if ((ret = gnutls_global_init ())
263
!= GNUTLS_E_SUCCESS) {
264
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
334
/* "Use a log level over 10 to enable all debugging options."
337
269
gnutls_global_set_log_level(11);
338
270
gnutls_global_set_log_function(debuggnutls);
341
/* OpenPGP credentials */
342
gnutls_certificate_allocate_credentials(&mc->cred);
343
if (ret != GNUTLS_E_SUCCESS){
344
fprintf (stderr, "GnuTLS memory error: %s\n",
273
/* openpgp credentials */
274
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
275
!= GNUTLS_E_SUCCESS) {
276
fprintf (stderr, "memory error: %s\n",
345
277
safer_gnutls_strerror(ret));
346
gnutls_global_deinit ();
351
282
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
352
" and keyfile %s as GnuTLS credentials\n", pubkeyfilename,
283
" and keyfile %s as GnuTLS credentials\n", certfile,
356
287
ret = gnutls_certificate_set_openpgp_key_file
357
(mc->cred, pubkeyfilename, seckeyfilename,
358
GNUTLS_OPENPGP_FMT_BASE64);
288
(es->cred, certfile, certkey, GNUTLS_OPENPGP_FMT_BASE64);
359
289
if (ret != GNUTLS_E_SUCCESS) {
361
"Error[%d] while reading the OpenPGP key pair ('%s',"
362
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
363
fprintf(stdout, "The GnuTLS error is: %s\n",
291
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
293
ret, certfile, certkey);
294
fprintf(stdout, "The Error is: %s\n",
364
295
safer_gnutls_strerror(ret));
368
/* GnuTLS server initialization */
369
ret = gnutls_dh_params_init(&mc->dh_params);
370
if (ret != GNUTLS_E_SUCCESS) {
371
fprintf (stderr, "Error in GnuTLS DH parameter initialization:"
372
" %s\n", safer_gnutls_strerror(ret));
375
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
376
if (ret != GNUTLS_E_SUCCESS) {
377
fprintf (stderr, "Error in GnuTLS prime generation: %s\n",
378
safer_gnutls_strerror(ret));
382
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
388
gnutls_certificate_free_credentials(mc->cred);
389
gnutls_global_deinit();
394
static int init_gnutls_session(mandos_context *mc,
395
gnutls_session_t *session){
397
/* GnuTLS session creation */
398
ret = gnutls_init(session, GNUTLS_SERVER);
399
if (ret != GNUTLS_E_SUCCESS){
299
//GnuTLS server initialization
300
if ((ret = gnutls_dh_params_init (&es->dh_params))
301
!= GNUTLS_E_SUCCESS) {
302
fprintf (stderr, "Error in dh parameter initialization: %s\n",
303
safer_gnutls_strerror(ret));
307
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
308
!= GNUTLS_E_SUCCESS) {
309
fprintf (stderr, "Error in prime generation: %s\n",
310
safer_gnutls_strerror(ret));
314
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
316
// GnuTLS session creation
317
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
318
!= GNUTLS_E_SUCCESS){
400
319
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
401
320
safer_gnutls_strerror(ret));
406
ret = gnutls_priority_set_direct(*session, mc->priority, &err);
407
if (ret != GNUTLS_E_SUCCESS) {
408
fprintf(stderr, "Syntax error at: %s\n", err);
409
fprintf(stderr, "GnuTLS error: %s\n",
410
safer_gnutls_strerror(ret));
411
gnutls_deinit (*session);
323
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
324
!= GNUTLS_E_SUCCESS) {
325
fprintf(stderr, "Syntax error at: %s\n", err);
326
fprintf(stderr, "GnuTLS error: %s\n",
327
safer_gnutls_strerror(ret));
416
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
418
if (ret != GNUTLS_E_SUCCESS) {
419
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
331
if ((ret = gnutls_credentials_set
332
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
333
!= GNUTLS_E_SUCCESS) {
334
fprintf(stderr, "Error setting a credentials set: %s\n",
420
335
safer_gnutls_strerror(ret));
421
gnutls_deinit (*session);
425
339
/* ignore client certificate if any. */
426
gnutls_certificate_server_set_request (*session,
340
gnutls_certificate_server_set_request (es->session,
427
341
GNUTLS_CERT_IGNORE);
429
gnutls_dh_set_prime_bits (*session, mc->dh_bits);
343
gnutls_dh_set_prime_bits (es->session, DH_BITS);
434
/* Avahi log function callback */
435
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
436
__attribute__((unused)) const char *txt){}
348
void empty_log(__attribute__((unused)) AvahiLogLevel level,
349
__attribute__((unused)) const char *txt){}
438
/* Called when a Mandos server is found */
439
static int start_mandos_communication(const char *ip, uint16_t port,
440
AvahiIfIndex if_index,
351
int start_mandos_communication(const char *ip, uint16_t port,
352
AvahiIfIndex if_index){
443
union { struct sockaddr in; struct sockaddr_in6 in6; } to;
354
struct sockaddr_in6 to;
355
encrypted_session es;
444
356
char *buffer = NULL;
445
357
char *decrypted_buffer;
446
358
size_t buffer_length = 0;
447
359
size_t buffer_capacity = 0;
448
360
ssize_t decrypted_buffer_size;
451
363
char interface[IF_NAMESIZE];
452
gnutls_session_t session;
454
ret = init_gnutls_session (mc, &session);
460
fprintf(stderr, "Setting up a tcp connection to %s, port %" PRIu16
366
fprintf(stderr, "Setting up a tcp connection to %s, port %d\n",
464
370
tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
466
372
perror("socket");
471
if(if_indextoname((unsigned int)if_index, interface) == NULL){
376
if(if_indextoname((unsigned int)if_index, interface) == NULL){
472
378
perror("if_indextoname");
475
384
fprintf(stderr, "Binding to interface %s\n", interface);
478
memset(&to, 0, sizeof(to)); /* Spurious warning */
479
to.in6.sin6_family = AF_INET6;
480
/* It would be nice to have a way to detect if we were passed an
481
IPv4 address here. Now we assume an IPv6 address. */
482
ret = inet_pton(AF_INET6, ip, &to.in6.sin6_addr);
387
memset(&to,0,sizeof(to)); /* Spurious warning */
388
to.sin6_family = AF_INET6;
389
ret = inet_pton(AF_INET6, ip, &to.sin6_addr);
484
391
perror("inet_pton");
488
395
fprintf(stderr, "Bad address: %s\n", ip);
491
to.in6.sin6_port = htons(port); /* Spurious warning */
398
to.sin6_port = htons(port); /* Spurious warning */
493
to.in6.sin6_scope_id = (uint32_t)if_index;
400
to.sin6_scope_id = (uint32_t)if_index;
496
fprintf(stderr, "Connection to: %s, port %" PRIu16 "\n", ip,
498
char addrstr[INET6_ADDRSTRLEN] = "";
499
if(inet_ntop(to.in6.sin6_family, &(to.in6.sin6_addr), addrstr,
500
sizeof(addrstr)) == NULL){
503
if(strcmp(addrstr, ip) != 0){
504
fprintf(stderr, "Canonical address form: %s\n", addrstr);
403
fprintf(stderr, "Connection to: %s, port %d\n", ip, port);
404
/* char addrstr[INET6_ADDRSTRLEN]; */
405
/* if(inet_ntop(to.sin6_family, &(to.sin6_addr), addrstr, */
406
/* sizeof(addrstr)) == NULL){ */
407
/* perror("inet_ntop"); */
409
/* fprintf(stderr, "Really connecting to: %s, port %d\n", */
410
/* addrstr, ntohs(to.sin6_port)); */
509
ret = connect(tcp_sd, &to.in, sizeof(to));
414
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
511
416
perror("connect");
515
const char *out = mandos_protocol_version;
518
size_t out_size = strlen(out);
519
ret = TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
520
out_size - written));
526
written += (size_t)ret;
527
if(written < out_size){
530
if (out == mandos_protocol_version){
420
ret = initgnutls (&es);
426
gnutls_transport_set_ptr (es.session,
427
(gnutls_transport_ptr_t) tcp_sd);
540
430
fprintf(stderr, "Establishing TLS session with %s\n", ip);
543
gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) tcp_sd);
546
ret = gnutls_handshake (session);
547
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
433
ret = gnutls_handshake (es.session);
549
435
if (ret != GNUTLS_E_SUCCESS){
551
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
437
fprintf(stderr, "\n*** Handshake failed ***\n");
552
438
gnutls_perror (ret);
558
/* Read OpenPGP packet that contains the wanted password */
444
//Retrieve OpenPGP packet that contains the wanted password
561
447
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
679
567
char ip[AVAHI_ADDRESS_STR_MAX];
680
568
avahi_address_snprint(ip, sizeof(ip), address);
682
fprintf(stderr, "Mandos server \"%s\" found on %s (%s, %"
683
PRIu16 ") on port %d\n", name, host_name, ip,
570
fprintf(stderr, "Mandos server \"%s\" found on %s (%s) on"
571
" port %d\n", name, host_name, ip, port);
686
int ret = start_mandos_communication(ip, port, interface, mc);
573
int ret = start_mandos_communication(ip, port, interface);
688
avahi_simple_poll_quit(mc->simple_poll);
692
579
avahi_s_service_resolver_free(r);
695
static void browse_callback( AvahiSServiceBrowser *b,
696
AvahiIfIndex interface,
697
AvahiProtocol protocol,
698
AvahiBrowserEvent event,
702
AVAHI_GCC_UNUSED AvahiLookupResultFlags
705
mandos_context *mc = userdata;
706
assert(b); /* Spurious warning */
708
/* Called whenever a new services becomes available on the LAN or
709
is removed from the LAN */
713
case AVAHI_BROWSER_FAILURE:
715
fprintf(stderr, "(Avahi browser) %s\n",
716
avahi_strerror(avahi_server_errno(mc->server)));
717
avahi_simple_poll_quit(mc->simple_poll);
720
case AVAHI_BROWSER_NEW:
721
/* We ignore the returned Avahi resolver object. In the callback
722
function we free it. If the Avahi server is terminated before
723
the callback function is called the Avahi server will free the
726
if (!(avahi_s_service_resolver_new(mc->server, interface,
727
protocol, name, type, domain,
728
AVAHI_PROTO_INET6, 0,
729
resolve_callback, mc)))
730
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
731
name, avahi_strerror(avahi_server_errno(mc->server)));
734
case AVAHI_BROWSER_REMOVE:
737
case AVAHI_BROWSER_ALL_FOR_NOW:
738
case AVAHI_BROWSER_CACHE_EXHAUSTED:
740
fprintf(stderr, "No Mandos server found, still searching...\n");
582
static void browse_callback(
583
AvahiSServiceBrowser *b,
584
AvahiIfIndex interface,
585
AvahiProtocol protocol,
586
AvahiBrowserEvent event,
590
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
593
AvahiServer *s = userdata;
594
assert(b); /* Spurious warning */
596
/* Called whenever a new services becomes available on the LAN or
597
is removed from the LAN */
601
case AVAHI_BROWSER_FAILURE:
603
fprintf(stderr, "(Browser) %s\n",
604
avahi_strerror(avahi_server_errno(server)));
605
avahi_simple_poll_quit(simple_poll);
608
case AVAHI_BROWSER_NEW:
609
/* We ignore the returned resolver object. In the callback
610
function we free it. If the server is terminated before
611
the callback function is called the server will free
612
the resolver for us. */
614
if (!(avahi_s_service_resolver_new(s, interface, protocol, name,
616
AVAHI_PROTO_INET6, 0,
617
resolve_callback, s)))
618
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
619
avahi_strerror(avahi_server_errno(s)));
622
case AVAHI_BROWSER_REMOVE:
625
case AVAHI_BROWSER_ALL_FOR_NOW:
626
case AVAHI_BROWSER_CACHE_EXHAUSTED:
746
/* Combines file name and path and returns the malloced new
747
string. some sane checks could/should be added */
748
static char *combinepath(const char *first, const char *second){
631
/* combinds file name and path and returns the malloced new string. som sane checks could/should be added */
632
const char *combinepath(const char *first, const char *second){
750
int ret = asprintf(&tmp, "%s/%s", first, second);
634
tmp = malloc(strlen(first) + strlen(second) + 2);
640
if (first[0] != '\0' and first[strlen(first) - 1] != '/'){
758
int main(int argc, char *argv[]){
648
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
649
AvahiServerConfig config;
759
650
AvahiSServiceBrowser *sb = NULL;
762
int exitcode = EXIT_SUCCESS;
763
const char *interface = "eth0";
764
struct ifreq network;
653
int returncode = EXIT_SUCCESS;
654
const char *interface = NULL;
655
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
768
656
char *connect_to = NULL;
769
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
770
char *pubkeyfilename = NULL;
771
char *seckeyfilename = NULL;
772
const char *pubkeyname = "pubkey.txt";
773
const char *seckeyname = "seckey.txt";
774
mandos_context mc = { .simple_poll = NULL, .server = NULL,
775
.dh_bits = 1024, .priority = "SECURE256"};
776
bool gnutls_initalized = false;
779
struct argp_option options[] = {
780
{ .name = "debug", .key = 128,
781
.doc = "Debug mode", .group = 3 },
782
{ .name = "connect", .key = 'c',
784
.doc = "Connect directly to a sepcified mandos server",
786
{ .name = "interface", .key = 'i',
788
.doc = "Interface that Avahi will conntect through",
790
{ .name = "keydir", .key = 'd',
792
.doc = "Directory where the openpgp keyring is",
794
{ .name = "seckey", .key = 's',
796
.doc = "Secret openpgp key for gnutls authentication",
798
{ .name = "pubkey", .key = 'p',
800
.doc = "Public openpgp key for gnutls authentication",
802
{ .name = "dh-bits", .key = 129,
804
.doc = "dh-bits to use in gnutls communication",
806
{ .name = "priority", .key = 130,
808
.doc = "GNUTLS priority", .group = 1 },
813
error_t parse_opt (int key, char *arg,
814
struct argp_state *state) {
815
/* Get the INPUT argument from `argp_parse', which we know is
816
a pointer to our plugin list pointer. */
838
mc.dh_bits = (unsigned int) strtol(arg, NULL, 10);
852
return ARGP_ERR_UNKNOWN;
857
struct argp argp = { .options = options, .parser = parse_opt,
859
.doc = "Mandos client -- Get and decrypt"
860
" passwords from mandos server" };
861
ret = argp_parse (&argp, argc, argv, 0, 0, NULL);
862
if (ret == ARGP_ERR_UNKNOWN){
863
fprintf(stderr, "Unknown error while parsing arguments\n");
864
exitcode = EXIT_FAILURE;
869
pubkeyfilename = combinepath(keydir, pubkeyname);
870
if (pubkeyfilename == NULL){
871
perror("combinepath");
872
exitcode = EXIT_FAILURE;
876
seckeyfilename = combinepath(keydir, seckeyname);
877
if (seckeyfilename == NULL){
878
perror("combinepath");
879
exitcode = EXIT_FAILURE;
883
ret = init_gnutls_global(&mc, pubkeyfilename, seckeyfilename);
885
fprintf(stderr, "init_gnutls_global failed\n");
886
exitcode = EXIT_FAILURE;
889
gnutls_initalized = true;
892
/* If the interface is down, bring it up */
894
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
897
exitcode = EXIT_FAILURE;
900
strcpy(network.ifr_name, interface); /* Spurious warning */
901
ret = ioctl(sd, SIOCGIFFLAGS, &network);
903
perror("ioctl SIOCGIFFLAGS");
904
exitcode = EXIT_FAILURE;
907
if((network.ifr_flags & IFF_UP) == 0){
908
network.ifr_flags |= IFF_UP;
909
ret = ioctl(sd, SIOCSIFFLAGS, &network);
911
perror("ioctl SIOCSIFFLAGS");
912
exitcode = EXIT_FAILURE;
932
if_index = (AvahiIfIndex) if_nametoindex(interface);
934
fprintf(stderr, "No such interface: \"%s\"\n", interface);
659
static struct option long_options[] = {
660
{"debug", no_argument, (int *)&debug, 1},
661
{"connect", required_argument, 0, 'C'},
662
{"interface", required_argument, 0, 'i'},
663
{"certdir", required_argument, 0, 'd'},
664
{"certkey", required_argument, 0, 'c'},
665
{"certfile", required_argument, 0, 'k'},
668
int option_index = 0;
669
ret = getopt_long (argc, argv, "i:", long_options,
699
certfile = combinepath(certdir, certfile);
700
if (certfile == NULL){
704
if(interface != NULL){
705
if_index = (AvahiIfIndex) if_nametoindex(interface);
707
fprintf(stderr, "No such interface: \"%s\"\n", interface);
938
712
if(connect_to != NULL){
941
715
char *address = strrchr(connect_to, ':');
942
716
if(address == NULL){
943
717
fprintf(stderr, "No colon in address\n");
944
exitcode = EXIT_FAILURE;
948
721
uint16_t port = (uint16_t) strtol(address+1, NULL, 10);
950
723
perror("Bad port number");
951
exitcode = EXIT_FAILURE;
955
727
address = connect_to;
956
ret = start_mandos_communication(address, port, if_index, &mc);
728
ret = start_mandos_communication(address, port, if_index);
958
exitcode = EXIT_FAILURE;
960
exitcode = EXIT_SUCCESS;
736
certkey = combinepath(certdir, certkey);
737
if (certkey == NULL){
966
742
avahi_set_log_function(empty_log);
969
/* Initialize the pseudo-RNG for Avahi */
745
/* Initialize the psuedo-RNG */
970
746
srand((unsigned int) time(NULL));
972
/* Allocate main Avahi loop object */
973
mc.simple_poll = avahi_simple_poll_new();
974
if (mc.simple_poll == NULL) {
975
fprintf(stderr, "Avahi: Failed to create simple poll"
977
exitcode = EXIT_FAILURE;
982
AvahiServerConfig config;
983
/* Do not publish any local Zeroconf records */
984
avahi_server_config_init(&config);
985
config.publish_hinfo = 0;
986
config.publish_addresses = 0;
987
config.publish_workstation = 0;
988
config.publish_domain = 0;
990
/* Allocate a new server */
991
mc.server = avahi_server_new(avahi_simple_poll_get
992
(mc.simple_poll), &config, NULL,
995
/* Free the Avahi configuration data */
996
avahi_server_config_free(&config);
999
/* Check if creating the Avahi server object succeeded */
1000
if (mc.server == NULL) {
1001
fprintf(stderr, "Failed to create Avahi server: %s\n",
748
/* Allocate main loop object */
749
if (!(simple_poll = avahi_simple_poll_new())) {
750
fprintf(stderr, "Failed to create simple poll object.\n");
755
/* Do not publish any local records */
756
avahi_server_config_init(&config);
757
config.publish_hinfo = 0;
758
config.publish_addresses = 0;
759
config.publish_workstation = 0;
760
config.publish_domain = 0;
762
/* Allocate a new server */
763
server = avahi_server_new(avahi_simple_poll_get(simple_poll),
764
&config, NULL, NULL, &error);
766
/* Free the configuration data */
767
avahi_server_config_free(&config);
769
/* Check if creating the server object succeeded */
771
fprintf(stderr, "Failed to create server: %s\n",
1002
772
avahi_strerror(error));
1003
exitcode = EXIT_FAILURE;
773
returncode = EXIT_FAILURE;
1007
/* Create the Avahi service browser */
1008
sb = avahi_s_service_browser_new(mc.server, if_index,
777
/* Create the service browser */
778
sb = avahi_s_service_browser_new(server, if_index,
1009
779
AVAHI_PROTO_INET6,
1010
780
"_mandos._tcp", NULL, 0,
1011
browse_callback, &mc);
781
browse_callback, server);
1013
783
fprintf(stderr, "Failed to create service browser: %s\n",
1014
avahi_strerror(avahi_server_errno(mc.server)));
1015
exitcode = EXIT_FAILURE;
784
avahi_strerror(avahi_server_errno(server)));
785
returncode = EXIT_FAILURE;
1019
789
/* Run the main loop */
1022
fprintf(stderr, "Starting Avahi loop search\n");
792
fprintf(stderr, "Starting avahi loop search\n");
1025
avahi_simple_poll_loop(mc.simple_poll);
795
avahi_simple_poll_loop(simple_poll);
1030
800
fprintf(stderr, "%s exiting\n", argv[0]);
1033
803
/* Cleanup things */
1035
805
avahi_s_service_browser_free(sb);
1037
if (mc.server != NULL)
1038
avahi_server_free(mc.server);
1040
if (mc.simple_poll != NULL)
1041
avahi_simple_poll_free(mc.simple_poll);
1042
free(pubkeyfilename);
1043
free(seckeyfilename);
1045
if (gnutls_initalized){
1046
gnutls_certificate_free_credentials(mc.cred);
1047
gnutls_global_deinit ();
808
avahi_server_free(server);
811
avahi_simple_poll_free(simple_poll);