1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
|
/* ISC license. */
#include <stdint.h>
#include <signal.h>
#include <skalibs/gccattributes.h>
#include <skalibs/types.h>
#include <skalibs/sgetopt.h>
#include <skalibs/strerr.h>
#include <skalibs/tai.h>
#include <skalibs/sig.h>
#include <skalibs/djbunix.h>
#include <s6-networking/config.h>
#define USAGE "s6-tlsc-io [ -v verbosity ] [ -d notif ] [ -S | -s ] [ -J | -j ] [ -Y | -y ] [ -K timeout ] [ -k servername ] fdr fdw"
#define dieusage() strerr_dieusage(100, USAGE)
static inline void doit (int *, tain const *tto, uint32_t, uint32_t, unsigned int, char const *, unsigned int) gccattr_noreturn ;
#ifdef S6_NETWORKING_USE_TLS
#include <s6-networking/stls.h>
static inline void doit (int *fds, tain const *tto, uint32_t preoptions, uint32_t options, unsigned int verbosity, char const *servername, unsigned int notif)
{
struct tls *ctx = stls_client_init_and_handshake(fds + 2, tto, preoptions, servername) ;
if (notif)
{
if (!stls_send_environment(ctx, notif))
strerr_diefu1sys(111, "write post-handshake data") ;
fd_close(notif) ;
}
stls_run(ctx, fds, options, verbosity) ;
}
#else
#ifdef S6_NETWORKING_USE_BEARSSL
#include <bearssl.h>
#include <s6-networking/sbearssl.h>
static int handshake_cb (br_ssl_engine_context *ctx, sbearssl_handshake_cbarg *cbarg)
{
if (cbarg->notif)
{
if (!sbearssl_send_environment(ctx, cbarg)) return 0 ;
fd_close(cbarg->notif) ;
}
return 1 ;
}
static inline void doit (int *fds, tain const *tto, uint32_t preoptions, uint32_t options, unsigned int verbosity, char const *servername, unsigned int notif)
{
sbearssl_handshake_cbarg cbarg = SBEARSSL_HANDSHAKE_CBARG_ZERO ;
cbarg.notif = notif ;
sbearssl_client_init_and_run(fds, tto, preoptions, options, verbosity, servername, &handshake_cb, &cbarg) ;
}
#else
#error No SSL backend configured.
#endif
#endif
int main (int argc, char const *const *argv, char const *const *envp)
{
char const *servername = 0 ;
tain tto ;
int fds[4] = { 0, 1 } ;
unsigned int verbosity = 1 ;
unsigned int notif = 0 ;
uint32_t preoptions = 0 ;
uint32_t options = 0 ;
PROG = "s6-tlsc-io" ;
{
subgetopt l = SUBGETOPT_ZERO ;
unsigned int t = 0 ;
for (;;)
{
int opt = subgetopt_r(argc, argv, "d:SsJjYyv:K:k:", &l) ;
if (opt == -1) break ;
switch (opt)
{
case 'v' : if (!uint0_scan(l.arg, &verbosity)) dieusage() ; break ;
case 'd' : if (!uint0_scan(l.arg, ¬if)) dieusage() ; break ;
case 'S' : options |= 1 ; break ;
case 's' : options &= ~1 ; break ;
case 'J' : options |= 2 ; break ;
case 'j' : options &= ~2 ; break ;
case 'y' : preoptions |= 1 ; break ;
case 'Y' : preoptions &= ~1 ; break ;
case 'K' : if (!uint0_scan(l.arg, &t)) dieusage() ; break ;
case 'k' : servername = l.arg ; break ;
default : dieusage() ;
}
}
argc -= l.ind ; argv += l.ind ;
if (t) tain_from_millisecs(&tto, t) ; else tto = tain_infinite_relative ;
}
if (argc < 2) dieusage() ;
{
unsigned int u ;
if (!uint0_scan(argv[0], &u)) dieusage() ;
fds[2] = u ;
if (!uint0_scan(argv[1], &u)) dieusage() ;
fds[3] = u ;
}
if (!sig_ignore(SIGPIPE)) strerr_diefu1sys(111, "ignore SIGPIPE") ;
tain_now_set_stopwatch_g() ;
doit(fds, &tto, preoptions, options, verbosity, servername, notif) ;
}
|