diff options
author | Toni Uhlig <matzeton@googlemail.com> | 2020-05-22 13:43:46 +0200 |
---|---|---|
committer | Toni Uhlig <matzeton@googlemail.com> | 2020-05-22 14:48:29 +0200 |
commit | c394c09330760985d282cb866a06dea6294012aa (patch) | |
tree | 5a120d309ef25552b719844474993184a8707608 /client.c |
first public release
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'client.c')
-rw-r--r-- | client.c | 325 |
1 files changed, 325 insertions, 0 deletions
diff --git a/client.c b/client.c new file mode 100644 index 0000000..38afa82 --- /dev/null +++ b/client.c @@ -0,0 +1,325 @@ +#include <errno.h> +#include <event2/event.h> +#include <event2/listener.h> +#include <event2/buffer.h> +#include <event2/bufferevent.h> +#include <event2/event-config.h> +#include <fcntl.h> +#include <netdb.h> +#include <netinet/in.h> +#include <signal.h> +#include <sodium.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <sys/socket.h> +#include <sys/types.h> +#include <unistd.h> + +#include "common-event2.h" +#include "common-sodium.h" +#include "logging.h" +#include "protocol.h" +#include "utils.h" + +static struct cmd_options opts = {.key_string = NULL, .key_length = 0, .host = NULL, .port = 0, .filepath = NULL}; +static int data_fd = -1; + +static void send_data(struct connection * const state) +{ + uint8_t buf[WINDOW_SIZE]; + ssize_t bytes_read; + + if (data_fd >= 0) { + bytes_read = read(data_fd, buf, sizeof(buf)); + if (bytes_read <= 0 || ev_protocol_data(state, buf, bytes_read) != 0) { + if (bytes_read == 0) { + LOG(WARNING, "EoF: Closing file descriptor %d aka %s", data_fd, opts.filepath); + } else { + LOG(WARNING, "Closing file descriptor %d aka %s: %s", data_fd, opts.filepath, strerror(errno)); + } + close(data_fd); + data_fd = -1; + } else { + LOG(NOTICE, "Send DATA: %zd", bytes_read); + } + } +} + +enum recv_return protocol_request_client_auth(struct connection * const state, + struct protocol_header const * const buffer, + size_t * const processed) +{ + (void)state; + (void)buffer; + (void)processed; + return RECV_CALLBACK_NOT_IMPLEMENTED; +} + +enum recv_return protocol_request_server_helo(struct connection * const state, + struct protocol_header const * const buffer, + size_t * const processed) +{ + struct protocol_server_helo const * const helo_pkt = (struct protocol_server_helo *)buffer; + + (void)processed; + LOG(NOTICE, "Server HELLO with message: %.*s", sizeof(helo_pkt->server_message), helo_pkt->server_message); + + crypto_secretstream_xchacha20poly1305_init_pull(&state->crypto_rx_state, + helo_pkt->client_rx_header, + state->session_keys->rx); + + if (ev_setup_generic_timer((struct ev_user_data *)state->user_data, PING_INTERVAL) != 0) { + LOG(ERROR, "Timer init failed"); + return RECV_FATAL; + } + + send_data(state); + + state->state = CONNECTION_AUTH_SUCCESS; + return RECV_SUCCESS; +} + +enum recv_return protocol_request_data(struct connection * const state, + struct protocol_header const * const buffer, + size_t * const processed) +{ + struct protocol_data const * const data_pkt = (struct protocol_data *)buffer; + + (void)state; + (void)processed; + LOG(LP_DEBUG, "Received DATA with size: %u", data_pkt->header.body_size); + LOG(NOTICE, "Remote answered: %.*s", (int)data_pkt->header.body_size, data_pkt->payload); + send_data(state); + return RECV_SUCCESS; +} + +enum recv_return protocol_request_ping(struct connection * const state, + struct protocol_header const * const buffer, + size_t * const processed) +{ + struct protocol_ping const * const ping_pkt = (struct protocol_ping *)buffer; + + (void)processed; + LOG(NOTICE, + "Received PING with timestamp: %.*s / %lluus", + sizeof(ping_pkt->timestamp), + ping_pkt->timestamp, + state->last_ping_recv_usec); + if (state->latency_usec > 0.0) { + LOG(NOTICE, "PING-PONG latency: %.02lfms", state->latency_usec / 1000.0); + } + + if (ev_protocol_pong(state) != 0) { + return RECV_FATAL; + } else { + return RECV_SUCCESS; + } +} + +enum recv_return protocol_request_pong(struct connection * const state, + struct protocol_header const * const buffer, + size_t * const processed) +{ + struct protocol_pong const * const pong_pkt = (struct protocol_pong *)buffer; + (void)processed; + LOG(NOTICE, + "Received PONG with timestamp: %.*s / %lluus / %zu outstanding PONG's", + sizeof(pong_pkt->timestamp), + pong_pkt->timestamp, + state->last_pong_recv_usec, + state->awaiting_pong); + + return RECV_SUCCESS; +} + +void on_disconnect(struct connection * const state) +{ + struct ev_user_data * const user_data = (struct ev_user_data *)state->user_data; + + if (user_data != NULL) { + event_base_loopexit(bufferevent_get_base(user_data->bev), NULL); + } +} + +static void event_cb(struct bufferevent * bev, short events, void * con) +{ + struct connection * const c = (struct connection *)con; + char events_string[64] = {0}; + + ev_events_to_string(events, events_string, sizeof(events_string)); + LOG(LP_DEBUG, "Event(s): 0x%02X (%s)", events, events_string); + + if (events & BEV_EVENT_ERROR) { + LOG(ERROR, "Error from bufferevent: %s", strerror(errno)); + on_disconnect(c); + return; + } + if (events & (BEV_EVENT_EOF | BEV_EVENT_ERROR)) { + LOG(NOTICE, "Remote end closed the connection"); + on_disconnect(c); + return; + } + if (events & BEV_EVENT_CONNECTED) { + if (c->state != CONNECTION_NEW) { + LOG(ERROR, "Remote authenticated again?!"); + return; + } + LOG(NOTICE, "Connected, sending AUTH"); + if (generate_session_keypair_sodium(c) != 0) { + LOG(ERROR, "Client session keypair generation failed"); + on_disconnect(c); + return; + } + if (ev_protocol_client_auth(c, "username", "passphrase") != 0) { + LOG(ERROR, "Client AUTH failed"); + on_disconnect(c); + return; + } + } + if (events & EV_TIMEOUT) { + LOG(NOTICE, "Timeout"); + bufferevent_enable(bev, EV_READ | EV_WRITE); + on_disconnect(c); + return; + } +} + +static void cleanup(struct event_base ** const ev_base, + struct event ** const ev_sig, + struct longterm_keypair ** const my_keypair) +{ + if (*my_keypair != NULL) { + sodium_memzero((*my_keypair)->secretkey, crypto_kx_SECRETKEYBYTES); + free(*my_keypair); + } + if (*ev_sig != NULL) { + event_free(*ev_sig); + } + if (*ev_base != NULL) { + event_base_free(*ev_base); + } + *my_keypair = NULL; + *ev_sig = NULL; + *ev_base = NULL; +} + +__attribute__((noreturn)) static void cleanup_and_exit(struct event_base ** const ev_base, + struct event ** const ev_sig, + struct longterm_keypair ** const my_keypair, + struct connection ** const state, + int exit_code) +{ + LOG(LP_DEBUG, "Cleanup and exit with exit code: %d", exit_code); + *state = NULL; + cleanup(ev_base, ev_sig, my_keypair); + exit(exit_code); +} + +int main(int argc, char ** argv) +{ + struct event_base * ev_base = NULL; + struct event * ev_sig = NULL; + struct bufferevent * bev; + struct sockaddr_in sin; + struct longterm_keypair * my_keypair = NULL; + struct connection * c = NULL; + + char ip_str[INET6_ADDRSTRLEN + 1]; + + parse_cmdline(&opts, argc, argv); + if (opts.key_string == NULL) { + usage(argv[0]); + } + if (opts.key_length != crypto_kx_PUBLICKEYBYTES * 2 /* hex string */) { + LOG(ERROR, "Invalid server public key length: %zu", opts.key_length); + return 1; + } + if (opts.filepath != NULL) { + data_fd = open(opts.filepath, O_RDONLY, 0); + if (data_fd < 0) { + LOG(ERROR, "File '%s' open() error: %s", opts.filepath, strerror(errno)); + return 1; + } + } + if (opts.port <= 0 || opts.port > 65535) { + LOG(ERROR, "Invalid port: %d", opts.port); + return 2; + } + + srandom(time(NULL)); + + if (sodium_init() != 0) { + LOG(ERROR, "Sodium init failed"); + return 3; + } + + if (init_sockaddr_inet(&sin, opts.host, opts.port, ip_str) != 0) { + return 4; + } + LOG(NOTICE, "Connecting to %s:%u", ip_str, opts.port); + + /* generate client keypair */ + my_keypair = generate_keypair_sodium(); + if (my_keypair == NULL) { + LOG(ERROR, "Sodium keypair generation failed"); + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 5); + } + log_bin2hex_sodium("Client public key", my_keypair->publickey, sizeof(my_keypair->publickey)); + + /* create global connection state */ + c = new_connection_to_server(my_keypair); + if (c == NULL) { + LOG(ERROR, "Could not create connection state"); + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 6); + } + + /* parse server public key into global connection state */ + if (sodium_hex2bin( + c->peer_publickey, sizeof(c->peer_publickey), opts.key_string, opts.key_length, NULL, NULL, NULL) != 0) { + LOG(ERROR, "Could not parse server public key: %s", opts.key_string); + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 7); + } + log_bin2hex_sodium("Server public key", c->peer_publickey, sizeof(c->peer_publickey)); + + ev_base = event_base_new(); + if (ev_base == NULL) { + LOG(ERROR, "Couldn't open event base"); + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 8); + } + + ev_sig = evsignal_new(ev_base, SIGINT, ev_sighandler, event_self_cbarg()); + if (ev_sig == NULL) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 9); + } + if (event_add(ev_sig, NULL) != 0) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 10); + } + + bev = + bufferevent_socket_new(ev_base, -1, BEV_OPT_CLOSE_ON_FREE | BEV_OPT_DEFER_CALLBACKS | BEV_OPT_UNLOCK_CALLBACKS); + if (bev == NULL) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 11); + } + + if (ev_setup_user_data(bev, c) != 0) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 12); + } + + bufferevent_setcb(bev, ev_read_cb, ev_write_cb, event_cb, c); + if (bufferevent_enable(bev, EV_READ | EV_WRITE) != 0) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 13); + } + ev_set_io_timeouts(bev); + + if (bufferevent_socket_connect(bev, (struct sockaddr *)&sin, sizeof(sin)) != 0) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 14); + } + + LOG(LP_DEBUG, "Event loop"); + if (event_base_dispatch(ev_base) != 0) { + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 15); + } + + cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 0); +} |