#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "common-event2.h" #include "common-sodium.h" #include "logging.h" #include "protocol.h" #include "utils.h" static struct cmd_options opts = {.key_string = NULL, .key_length = 0, .host = NULL, .port = 0, .filepath = NULL}; static int data_fd = -1; static void send_data(struct connection * const state) { uint8_t buf[WINDOW_SIZE]; ssize_t bytes_read; if (data_fd >= 0) { bytes_read = read(data_fd, buf, sizeof(buf)); if (bytes_read <= 0 || ev_protocol_data(state, buf, bytes_read) != 0) { if (bytes_read == 0) { LOG(WARNING, "EoF: Closing file descriptor %d aka %s", data_fd, opts.filepath); } else { LOG(WARNING, "Closing file descriptor %d aka %s: %s", data_fd, opts.filepath, strerror(errno)); } close(data_fd); data_fd = -1; } else { LOG(NOTICE, "Send DATA: %zd bytes, buffer capacity %0.2f%% unused", bytes_read, 100.0f - ((float)bytes_read / sizeof(buf)) * 100.0f); } } } enum recv_return protocol_request_client_auth(struct connection * const state, struct protocol_header const * const buffer, size_t * const processed) { (void)state; (void)buffer; (void)processed; return RECV_CALLBACK_NOT_IMPLEMENTED; } enum recv_return protocol_request_server_helo(struct connection * const state, struct protocol_header const * const buffer, size_t * const processed) { struct protocol_server_helo const * const helo_pkt = (struct protocol_server_helo *)buffer; (void)processed; LOG(NOTICE, "Server HELLO with message: %.*s", sizeof(helo_pkt->server_message), helo_pkt->server_message); if (init_crypto_client(state, helo_pkt->client_rx_header, sizeof(helo_pkt->client_rx_header)) != 0) { LOG(ERROR, "Client session keypair generation failed"); return RECV_FATAL; } if (ev_setup_generic_timer((struct ev_user_data *)state->user_data, PING_INTERVAL) != 0) { LOG(ERROR, "Timer init failed"); return RECV_FATAL; } send_data(state); state->state = CONNECTION_AUTH_SUCCESS; return RECV_SUCCESS; } enum recv_return protocol_request_data(struct connection * const state, struct protocol_header const * const buffer, size_t * const processed) { struct protocol_data const * const data_pkt = (struct protocol_data *)buffer; (void)state; (void)processed; LOG(LP_DEBUG, "Received DATA with size: %u", data_pkt->header.body_size); LOG(NOTICE, "Remote answered: %.*s", (int)data_pkt->header.body_size, data_pkt->payload); send_data(state); return RECV_SUCCESS; } enum recv_return protocol_request_ping(struct connection * const state, struct protocol_header const * const buffer, size_t * const processed) { struct protocol_ping const * const ping_pkt = (struct protocol_ping *)buffer; (void)processed; LOG(NOTICE, "Received PING with timestamp: %.*s / %lluus", sizeof(ping_pkt->timestamp), ping_pkt->timestamp, state->last_ping_recv_usec); if (state->latency_usec > 0.0) { LOG(NOTICE, "PING-PONG latency: %.02lfms", state->latency_usec / 1000.0); } if (ev_protocol_pong(state) != 0) { return RECV_FATAL; } else { return RECV_SUCCESS; } } enum recv_return protocol_request_pong(struct connection * const state, struct protocol_header const * const buffer, size_t * const processed) { struct protocol_pong const * const pong_pkt = (struct protocol_pong *)buffer; (void)processed; LOG(NOTICE, "Received PONG with timestamp: %.*s / %lluus / %zu outstanding PONG's", sizeof(pong_pkt->timestamp), pong_pkt->timestamp, state->last_pong_recv_usec, state->awaiting_pong); return RECV_SUCCESS; } void on_disconnect(struct connection * const state) { struct ev_user_data * const user_data = (struct ev_user_data *)state->user_data; if (user_data != NULL) { event_base_loopexit(bufferevent_get_base(user_data->bev), NULL); } } static void event_cb(struct bufferevent * bev, short events, void * con) { struct connection * const c = (struct connection *)con; char events_string[64] = {0}; ev_events_to_string(events, events_string, sizeof(events_string)); LOG(LP_DEBUG, "Event(s): 0x%02X (%s)", events, events_string); if (events & BEV_EVENT_ERROR) { LOG(ERROR, "Error from bufferevent: %s", strerror(errno)); on_disconnect(c); return; } if (events & (BEV_EVENT_EOF | BEV_EVENT_ERROR)) { LOG(NOTICE, "Remote end closed the connection"); on_disconnect(c); return; } if (events & BEV_EVENT_CONNECTED) { if (c->state != CONNECTION_NEW) { LOG(ERROR, "Remote authenticated again?!"); return; } LOG(NOTICE, "Connected, sending AUTH"); if (generate_session_keypair_sodium(c) != 0) { LOG(ERROR, "Client session keypair generation failed"); on_disconnect(c); return; } if (ev_protocol_client_auth(c, "username", "passphrase") != 0) { LOG(ERROR, "Client AUTH failed"); on_disconnect(c); return; } } if (events & EV_TIMEOUT) { LOG(NOTICE, "Timeout"); bufferevent_enable(bev, EV_READ | EV_WRITE); on_disconnect(c); return; } } static void cleanup(struct event_base ** const ev_base, struct event ** const ev_sig, struct longterm_keypair ** const my_keypair) { if (*my_keypair != NULL) { sodium_memzero((*my_keypair)->secretkey, crypto_kx_SECRETKEYBYTES); free(*my_keypair); } if (*ev_sig != NULL) { event_free(*ev_sig); } if (*ev_base != NULL) { event_base_free(*ev_base); } *my_keypair = NULL; *ev_sig = NULL; *ev_base = NULL; } __attribute__((noreturn)) static void cleanup_and_exit(struct event_base ** const ev_base, struct event ** const ev_sig, struct longterm_keypair ** const my_keypair, struct connection ** const state, int exit_code) { char pretty_bytes_rx[16]; char pretty_bytes_tx[16]; LOG(LP_DEBUG, "Cleanup and exit with exit code: %d", exit_code); if (*state != NULL) { LOG(NOTICE, "Closed connection; received %s; sent %s", prettify_bytes_with_units(pretty_bytes_rx, sizeof(pretty_bytes_rx), (*state)->total_bytes_recv), prettify_bytes_with_units(pretty_bytes_tx, sizeof(pretty_bytes_tx), (*state)->total_bytes_sent)); } *state = NULL; cleanup(ev_base, ev_sig, my_keypair); exit(exit_code); } int main(int argc, char ** argv) { struct event_base * ev_base = NULL; struct event * ev_sig = NULL; struct bufferevent * bev; struct sockaddr_in sin; struct longterm_keypair * my_keypair = NULL; struct connection * c = NULL; char ip_str[INET6_ADDRSTRLEN + 1]; parse_cmdline(&opts, argc, argv); if (opts.key_string == NULL) { usage(argv[0]); } if (opts.key_length != crypto_kx_PUBLICKEYBYTES * 2 /* hex string */) { LOG(ERROR, "Invalid server public key length: %zu", opts.key_length); return 1; } if (opts.filepath != NULL) { data_fd = open(opts.filepath, O_RDONLY, 0); if (data_fd < 0) { LOG(ERROR, "File '%s' open() error: %s", opts.filepath, strerror(errno)); return 1; } } if (opts.port <= 0 || opts.port > 65535) { LOG(ERROR, "Invalid port: %d", opts.port); return 2; } srandom(time(NULL)); if (sodium_init() != 0) { LOG(ERROR, "Sodium init failed"); return 3; } if (init_sockaddr_inet(&sin, opts.host, opts.port, ip_str) != 0) { return 4; } LOG(NOTICE, "Connecting to %s:%u", ip_str, opts.port); /* generate client keypair */ my_keypair = generate_keypair_sodium(); if (my_keypair == NULL) { LOG(ERROR, "Sodium keypair generation failed"); cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 5); } log_bin2hex_sodium(NOTICE, "Client public key", my_keypair->publickey, sizeof(my_keypair->publickey)); /* create global connection state */ c = new_connection_to_server(my_keypair); if (c == NULL) { LOG(ERROR, "Could not create connection state"); cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 6); } /* parse server public key into global connection state */ if (sodium_hex2bin( c->peer_publickey, sizeof(c->peer_publickey), opts.key_string, opts.key_length, NULL, NULL, NULL) != 0) { LOG(ERROR, "Could not parse server public key: %s", opts.key_string); cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 7); } log_bin2hex_sodium(NOTICE, "Server public key", c->peer_publickey, sizeof(c->peer_publickey)); ev_base = event_base_new(); if (ev_base == NULL) { LOG(ERROR, "Couldn't open event base"); cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 8); } ev_sig = evsignal_new(ev_base, SIGINT, ev_sighandler, event_self_cbarg()); if (ev_sig == NULL) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 9); } if (event_add(ev_sig, NULL) != 0) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 10); } bev = bufferevent_socket_new(ev_base, -1, BEV_OPT_CLOSE_ON_FREE | BEV_OPT_DEFER_CALLBACKS | BEV_OPT_UNLOCK_CALLBACKS); if (bev == NULL) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 11); } if (ev_setup_user_data(bev, c) != 0) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 12); } bufferevent_setcb(bev, ev_read_cb, ev_write_cb, event_cb, c); if (bufferevent_enable(bev, EV_READ | EV_WRITE) != 0) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 13); } ev_set_io_timeouts(bev); if (bufferevent_socket_connect(bev, (struct sockaddr *)&sin, sizeof(sin)) != 0) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 14); } LOG(LP_DEBUG, "Event loop"); if (event_base_dispatch(ev_base) != 0) { cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 15); } cleanup_and_exit(&ev_base, &ev_sig, &my_keypair, &c, 0); }