summaryrefslogtreecommitdiff
path: root/src/pt-tls-client/pt-tls-client.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/pt-tls-client/pt-tls-client.c')
-rw-r--r--src/pt-tls-client/pt-tls-client.c275
1 files changed, 275 insertions, 0 deletions
diff --git a/src/pt-tls-client/pt-tls-client.c b/src/pt-tls-client/pt-tls-client.c
new file mode 100644
index 000000000..e7d75f078
--- /dev/null
+++ b/src/pt-tls-client/pt-tls-client.c
@@ -0,0 +1,275 @@
+/*
+ * Copyright (C) 2010-2013 Martin Willi, revosec AG
+ * Copyright (C) 2013 Andreas Steffen, HSR Hochschule für Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
+
+#include <unistd.h>
+#include <stdio.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <getopt.h>
+#include <errno.h>
+#include <string.h>
+#include <stdlib.h>
+
+#include <pt_tls.h>
+#include <pt_tls_client.h>
+#include <tnc/tnc.h>
+#include <tls.h>
+
+#include <library.h>
+#include <utils/debug.h>
+#include <credentials/sets/mem_cred.h>
+#include <utils/optionsfrom.h>
+
+/**
+ * Print usage information
+ */
+static void usage(FILE *out, char *cmd)
+{
+ fprintf(out, "usage:\n");
+ fprintf(out, " %s --connect <address> [--port <port>] [--cert <file>]+\n", cmd);
+ fprintf(out, " [--client <client-id>] [--secret <password>]\n");
+ fprintf(out, " [--optionsfrom <filename>]\n");
+}
+
+/**
+ * Client routine
+ */
+static int client(char *address, u_int16_t port, char *identity)
+{
+ pt_tls_client_t *assessment;
+ tls_t *tnccs;
+ identification_t *server, *client;
+ host_t *host;
+ status_t status;
+
+ host = host_create_from_dns(address, AF_UNSPEC, port);
+ if (!host)
+ {
+ return 1;
+ }
+ server = identification_create_from_string(address);
+ client = identification_create_from_string(identity);
+ tnccs = (tls_t*)tnc->tnccs->create_instance(tnc->tnccs, TNCCS_2_0, FALSE,
+ server, client, TNC_IFT_TLS_2_0, NULL);
+ if (!tnccs)
+ {
+ fprintf(stderr, "loading TNCCS failed: %s\n", PLUGINS);
+ host->destroy(host);
+ server->destroy(server);
+ client->destroy(client);
+ return 1;
+ }
+ assessment = pt_tls_client_create(host, server, client);
+ status = assessment->run_assessment(assessment, (tnccs_t*)tnccs);
+ assessment->destroy(assessment);
+ tnccs->destroy(tnccs);
+ return status;
+}
+
+
+/**
+ * In-Memory credential set
+ */
+static mem_cred_t *creds;
+
+/**
+ * Load certificate from file
+ */
+static bool load_certificate(char *filename)
+{
+ certificate_t *cert;
+
+ cert = lib->creds->create(lib->creds, CRED_CERTIFICATE, CERT_X509,
+ BUILD_FROM_FILE, filename, BUILD_END);
+ if (!cert)
+ {
+ DBG1(DBG_TLS, "loading certificate from '%s' failed", filename);
+ return FALSE;
+ }
+ creds->add_cert(creds, TRUE, cert);
+ return TRUE;
+}
+
+/**
+ * Load private key from file
+ */
+static bool load_key(char *filename)
+{
+ private_key_t *key;
+
+ key = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA,
+ BUILD_FROM_FILE, filename, BUILD_END);
+ if (!key)
+ {
+ DBG1(DBG_TLS, "loading key from '%s' failed", filename);
+ return FALSE;
+ }
+ creds->add_key(creds, key);
+ return TRUE;
+}
+
+/**
+ * Debug level
+ */
+static level_t pt_tls_level = 1;
+
+static void dbg_pt_tls(debug_t group, level_t level, char *fmt, ...)
+{
+ if (level <= pt_tls_level)
+ {
+ va_list args;
+
+ va_start(args, fmt);
+ vfprintf(stderr, fmt, args);
+ fprintf(stderr, "\n");
+ va_end(args);
+ }
+}
+
+/**
+ * Handles --optionsfrom arguments
+ */
+options_t *options;
+
+/**
+ * Cleanup
+ */
+static void cleanup()
+{
+ lib->processor->cancel(lib->processor);
+ lib->credmgr->remove_set(lib->credmgr, &creds->set);
+ creds->destroy(creds);
+ options->destroy(options);
+ libtnccs_deinit();
+ library_deinit();
+}
+
+/**
+ * Initialize library
+ */
+static void init()
+{
+ plugin_feature_t features[] = {
+ PLUGIN_NOOP,
+ PLUGIN_PROVIDE(CUSTOM, "pt-tls-client"),
+ PLUGIN_DEPENDS(CUSTOM, "tnccs-manager"),
+ };
+ library_init(NULL);
+ libtnccs_init();
+
+ dbg = dbg_pt_tls;
+ options = options_create();
+
+ lib->plugins->add_static_features(lib->plugins, "pt-tls-client", features,
+ countof(features), TRUE);
+ if (!lib->plugins->load(lib->plugins,
+ lib->settings->get_str(lib->settings, "pt-tls-client.load", PLUGINS)))
+ {
+ exit(SS_RC_INITIALIZATION_FAILED);
+ }
+ lib->plugins->status(lib->plugins, LEVEL_CTRL);
+
+ creds = mem_cred_create();
+ lib->credmgr->add_set(lib->credmgr, &creds->set);
+
+ atexit(cleanup);
+}
+
+int main(int argc, char *argv[])
+{
+ char *address = NULL, *identity = "%any", *secret = NULL;
+ int port = PT_TLS_PORT;
+
+ init();
+
+ while (TRUE)
+ {
+ struct option long_opts[] = {
+ {"help", no_argument, NULL, 'h' },
+ {"connect", required_argument, NULL, 'c' },
+ {"client", required_argument, NULL, 'i' },
+ {"secret", required_argument, NULL, 's' },
+ {"port", required_argument, NULL, 'p' },
+ {"cert", required_argument, NULL, 'x' },
+ {"key", required_argument, NULL, 'k' },
+ {"debug", required_argument, NULL, 'd' },
+ {"optionsfrom", required_argument, NULL, '+' },
+ {0,0,0,0 }
+ };
+ switch (getopt_long(argc, argv, "", long_opts, NULL))
+ {
+ case EOF:
+ break;
+ case 'h':
+ usage(stdout, argv[0]);
+ return 0;
+ case 'x':
+ if (!load_certificate(optarg))
+ {
+ return 1;
+ }
+ continue;
+ case 'k':
+ if (!load_key(optarg))
+ {
+ return 1;
+ }
+ continue;
+ case 'c':
+ if (address)
+ {
+ usage(stderr, argv[0]);
+ return 1;
+ }
+ address = optarg;
+ continue;
+ case 'i':
+ identity = optarg;
+ continue;
+ case 's':
+ secret = optarg;
+ continue;
+ case 'p':
+ port = atoi(optarg);
+ continue;
+ case 'd':
+ pt_tls_level = atoi(optarg);
+ continue;
+ case '+': /* --optionsfrom <filename> */
+ if (!options->from(options, optarg, &argc, &argv, optind))
+ {
+ return 1;
+ }
+ continue;
+ default:
+ usage(stderr, argv[0]);
+ return 1;
+ }
+ break;
+ }
+ if (!address)
+ {
+ usage(stderr, argv[0]);
+ return 1;
+ }
+ if (secret)
+ {
+ creds->add_shared(creds, shared_key_create(SHARED_EAP,
+ chunk_clone(chunk_from_str(secret))),
+ identification_create_from_string(identity), NULL);
+ }
+
+ return client(address, port, identity);
+}