2 5c7abf01 2021-12-29 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 5c7abf01 2021-12-29 op * Permission to use, copy, modify, and distribute this software for any
5 5c7abf01 2021-12-29 op * purpose with or without fee is hereby granted, provided that the above
6 5c7abf01 2021-12-29 op * copyright notice and this permission notice appear in all copies.
8 5c7abf01 2021-12-29 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 5c7abf01 2021-12-29 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 5c7abf01 2021-12-29 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 5c7abf01 2021-12-29 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 5c7abf01 2021-12-29 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 5c7abf01 2021-12-29 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 5c7abf01 2021-12-29 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 5c7abf01 2021-12-29 op #include "gmid.h"
19 5c7abf01 2021-12-29 op #include <sys/socket.h>
21 5c7abf01 2021-12-29 op #include <assert.h>
22 5c7abf01 2021-12-29 op #include <ctype.h>
23 5c7abf01 2021-12-29 op #include <errno.h>
24 5c7abf01 2021-12-29 op #include <string.h>
36 5c7abf01 2021-12-29 op int dont_verify_name;
40 5c7abf01 2021-12-29 op int redirects = 5;
43 5c7abf01 2021-12-29 op const char *cert;
44 5c7abf01 2021-12-29 op const char *key;
45 5c7abf01 2021-12-29 op const char *proxy_host;
46 5c7abf01 2021-12-29 op const char *proxy_port;
47 5c7abf01 2021-12-29 op const char *sni;
50 5c7abf01 2021-12-29 op struct tls_config *tls_conf;
53 5c7abf01 2021-12-29 op timeout(int signo)
55 5c7abf01 2021-12-29 op dprintf(2, "%s: timer expired\n", getprogname());
60 5c7abf01 2021-12-29 op load_tls_conf(void)
62 5c7abf01 2021-12-29 op if ((tls_conf = tls_config_new()) == NULL)
63 5c7abf01 2021-12-29 op err(1, "tls_config_new");
65 5c7abf01 2021-12-29 op tls_config_insecure_noverifycert(tls_conf);
66 5c7abf01 2021-12-29 op if (dont_verify_name)
67 5c7abf01 2021-12-29 op tls_config_insecure_noverifyname(tls_conf);
70 5c7abf01 2021-12-29 op tls_config_set_protocols(tls_conf, TLS_PROTOCOL_TLSv1_2) == -1)
71 5c7abf01 2021-12-29 op errx(1, "can't set TLSv1.2");
73 5c7abf01 2021-12-29 op tls_config_set_protocols(tls_conf, TLS_PROTOCOL_TLSv1_3) == -1)
74 5c7abf01 2021-12-29 op errx(1, "can't set TLSv1.3");
76 5c7abf01 2021-12-29 op if (cert != NULL &&
77 5c7abf01 2021-12-29 op tls_config_set_keypair_file(tls_conf, cert, key) == -1)
78 5c7abf01 2021-12-29 op errx(1, "can't load client certificate %s", cert);
82 5c7abf01 2021-12-29 op connectto(struct tls *ctx, const char *host, const char *port)
84 5c7abf01 2021-12-29 op struct addrinfo hints, *res, *res0;
86 5c7abf01 2021-12-29 op int saved_errno;
88 5c7abf01 2021-12-29 op const char *cause = NULL;
89 5c7abf01 2021-12-29 op const char *sname;
91 5c7abf01 2021-12-29 op if (proxy_host != NULL) {
92 5c7abf01 2021-12-29 op host = proxy_host;
93 5c7abf01 2021-12-29 op port = proxy_port;
96 5c7abf01 2021-12-29 op if ((sname = sni) == NULL)
99 5c7abf01 2021-12-29 op memset(&hints, 0, sizeof(hints));
100 5c7abf01 2021-12-29 op hints.ai_family = AF_UNSPEC;
101 5c7abf01 2021-12-29 op hints.ai_socktype = SOCK_STREAM;
102 5c7abf01 2021-12-29 op error = getaddrinfo(host, port, &hints, &res0);
104 5c7abf01 2021-12-29 op errx(1, "%s", gai_strerror(error));
107 5c7abf01 2021-12-29 op for (res = res0; res != NULL; res = res->ai_next) {
108 5c7abf01 2021-12-29 op s = socket(res->ai_family, res->ai_socktype,
109 5c7abf01 2021-12-29 op res->ai_protocol);
110 5c7abf01 2021-12-29 op if (s == -1) {
111 5c7abf01 2021-12-29 op cause = "socket";
115 5c7abf01 2021-12-29 op if (connect(s, res->ai_addr, res->ai_addrlen) == -1) {
116 5c7abf01 2021-12-29 op cause = "connect";
117 5c7abf01 2021-12-29 op saved_errno = errno;
119 5c7abf01 2021-12-29 op errno = saved_errno;
128 5c7abf01 2021-12-29 op err(1, "%s: can't connect to %s:%s", cause,
131 5c7abf01 2021-12-29 op freeaddrinfo(res0);
133 5c7abf01 2021-12-29 op if (tls_connect_socket(ctx, s, sname) == -1)
134 5c7abf01 2021-12-29 op errx(1, "tls_connect_socket: %s", tls_error(ctx));
138 5c7abf01 2021-12-29 op doreq(struct tls *ctx, const char *buf)
143 5c7abf01 2021-12-29 op s = strlen(buf);
144 5c7abf01 2021-12-29 op while (s != 0) {
145 5c7abf01 2021-12-29 op switch (w = tls_write(ctx, buf, s)) {
148 5c7abf01 2021-12-29 op errx(1, "tls_write: %s", tls_error(ctx));
149 5c7abf01 2021-12-29 op case TLS_WANT_POLLIN:
150 5c7abf01 2021-12-29 op case TLS_WANT_POLLOUT:
159 5c7abf01 2021-12-29 op static size_t
160 5c7abf01 2021-12-29 op dorep(struct tls *ctx, void *buf, size_t len)
163 5c7abf01 2021-12-29 op size_t tot = 0;
165 5c7abf01 2021-12-29 op while (len != 0) {
166 5c7abf01 2021-12-29 op switch (w = tls_read(ctx, buf, len)) {
170 5c7abf01 2021-12-29 op errx(1, "tls_write: %s", tls_error(ctx));
171 5c7abf01 2021-12-29 op case TLS_WANT_POLLIN:
172 5c7abf01 2021-12-29 op case TLS_WANT_POLLOUT:
185 5c7abf01 2021-12-29 op get(const char *r)
187 5c7abf01 2021-12-29 op struct tls *ctx;
188 5c7abf01 2021-12-29 op struct iri iri;
189 5c7abf01 2021-12-29 op int foundhdr = 0, code = -1, od;
190 5c7abf01 2021-12-29 op char iribuf[GEMINI_URL_LEN];
191 5c7abf01 2021-12-29 op char req[GEMINI_URL_LEN];
192 5c7abf01 2021-12-29 op char buf[2048];
193 5c7abf01 2021-12-29 op const char *parse_err, *host, *port;
195 5c7abf01 2021-12-29 op if (strlcpy(iribuf, r, sizeof(iribuf)) >= sizeof(iribuf))
196 5c7abf01 2021-12-29 op errx(1, "iri too long: %s", r);
198 5c7abf01 2021-12-29 op if (strlcpy(req, r, sizeof(req)) >= sizeof(req))
199 5c7abf01 2021-12-29 op errx(1, "iri too long: %s", r);
201 5c7abf01 2021-12-29 op if (strlcat(req, "\r\n", sizeof(req)) >= sizeof(req))
202 5c7abf01 2021-12-29 op errx(1, "iri too long: %s", r);
204 5c7abf01 2021-12-29 op if (!parse_iri(iribuf, &iri, &parse_err))
205 5c7abf01 2021-12-29 op errx(1, "invalid IRI: %s", parse_err);
208 5c7abf01 2021-12-29 op errx(0, "IRI OK");
210 5c7abf01 2021-12-29 op if ((ctx = tls_client()) == NULL)
211 5c7abf01 2021-12-29 op errx(1, "can't create tls context");
213 5c7abf01 2021-12-29 op if (tls_configure(ctx, tls_conf) == -1)
214 5c7abf01 2021-12-29 op errx(1, "tls_configure: %s", tls_error(ctx));
216 5c7abf01 2021-12-29 op host = iri.host;
217 5c7abf01 2021-12-29 op port = "1965";
218 5c7abf01 2021-12-29 op if (*iri.port != '\0')
219 5c7abf01 2021-12-29 op port = iri.port;
221 5c7abf01 2021-12-29 op connectto(ctx, host, port);
224 5c7abf01 2021-12-29 op while (!od) {
225 5c7abf01 2021-12-29 op switch (tls_handshake(ctx)) {
230 5c7abf01 2021-12-29 op errx(1, "handshake: %s", tls_error(ctx));
235 5c7abf01 2021-12-29 op printf("%s", req);
237 5c7abf01 2021-12-29 op doreq(ctx, req);
243 5c7abf01 2021-12-29 op len = dorep(ctx, buf, sizeof(buf));
244 5c7abf01 2021-12-29 op if (len == 0)
247 5c7abf01 2021-12-29 op if (foundhdr) {
248 5c7abf01 2021-12-29 op write(1, buf, len);
251 5c7abf01 2021-12-29 op foundhdr = 1;
253 5c7abf01 2021-12-29 op if (memmem(buf, len, "\r\n", 2) == NULL)
254 5c7abf01 2021-12-29 op errx(1, "invalid reply: no \\r\\n");
255 5c7abf01 2021-12-29 op if (!isdigit(buf[0]) || !isdigit(buf[1]) || buf[2] != ' ')
256 5c7abf01 2021-12-29 op errx(1, "invalid reply: invalid response format");
258 5c7abf01 2021-12-29 op code = (buf[0] - '0') * 10 + buf[1] - '0';
260 5c7abf01 2021-12-29 op if (debug == DEBUG_CODE) {
261 5c7abf01 2021-12-29 op printf("%d\n", code);
265 5c7abf01 2021-12-29 op if (debug == DEBUG_HEADER) {
266 5c7abf01 2021-12-29 op t = memmem(buf, len, "\r\n", 2);
267 5c7abf01 2021-12-29 op assert(t != NULL);
269 5c7abf01 2021-12-29 op printf("%s\n", buf);
273 5c7abf01 2021-12-29 op if (debug == DEBUG_META) {
274 5c7abf01 2021-12-29 op t = memmem(buf, len, "\r\n", 2);
275 5c7abf01 2021-12-29 op assert(t != NULL);
277 5c7abf01 2021-12-29 op printf("%s\n", buf+3);
281 e89f4739 2022-01-27 op if (debug == DEBUG_ALL) {
282 5c7abf01 2021-12-29 op write(1, buf, len);
286 5c7abf01 2021-12-29 op /* skip the header */
287 5c7abf01 2021-12-29 op t = memmem(buf, len, "\r\n", 2);
288 5c7abf01 2021-12-29 op assert(t != NULL);
289 5c7abf01 2021-12-29 op t += 2; /* skip \r\n */
290 5c7abf01 2021-12-29 op len -= t - buf;
291 5c7abf01 2021-12-29 op write(1, t, len);
295 5c7abf01 2021-12-29 op od = tls_close(ctx);
296 5c7abf01 2021-12-29 op if (od == TLS_WANT_POLLIN || od == TLS_WANT_POLLOUT)
299 5c7abf01 2021-12-29 op tls_close(ctx);
300 5c7abf01 2021-12-29 op tls_free(ctx);
304 5c7abf01 2021-12-29 op static void __attribute__((noreturn))
307 5c7abf01 2021-12-29 op fprintf(stderr, "usage: %s [-23Nnv] [-C cert] [-d mode] [-H sni] "
308 febfcde8 2022-01-13 op "[-K key] [-P host[:port]]\n",
309 5c7abf01 2021-12-29 op getprogname());
310 5c7abf01 2021-12-29 op fprintf(stderr, " [-T seconds] gemini://...\n");
315 5c7abf01 2021-12-29 op parse_debug(const char *arg)
317 5c7abf01 2021-12-29 op if (!strcmp(arg, "none"))
318 5c7abf01 2021-12-29 op return DEBUG_NONE;
319 5c7abf01 2021-12-29 op if (!strcmp(arg, "code"))
320 5c7abf01 2021-12-29 op return DEBUG_CODE;
321 5c7abf01 2021-12-29 op if (!strcmp(arg, "header"))
322 5c7abf01 2021-12-29 op return DEBUG_HEADER;
323 5c7abf01 2021-12-29 op if (!strcmp(arg, "meta"))
324 5c7abf01 2021-12-29 op return DEBUG_META;
325 e89f4739 2022-01-27 op if (!strcmp(arg, "all"))
326 e89f4739 2022-01-27 op return DEBUG_ALL;
331 5c7abf01 2021-12-29 op parse_proxy(const char *arg)
335 5c7abf01 2021-12-29 op if ((proxy_host = strdup(arg)) == NULL)
336 5c7abf01 2021-12-29 op err(1, "strdup");
338 5c7abf01 2021-12-29 op proxy_port = "1965";
340 5c7abf01 2021-12-29 op if ((at = strchr(proxy_host, ':')) == NULL)
343 5c7abf01 2021-12-29 op proxy_port = ++at;
345 5c7abf01 2021-12-29 op if (strchr(proxy_port, ':') != NULL)
346 5c7abf01 2021-12-29 op errx(1, "invalid port %s", proxy_port);
350 5c7abf01 2021-12-29 op main(int argc, char **argv)
352 5c7abf01 2021-12-29 op int ch, code;
353 5c7abf01 2021-12-29 op const char *errstr;
355 5c7abf01 2021-12-29 op while ((ch = getopt(argc, argv, "23C:d:H:K:NP:T:v")) != -1) {
356 5c7abf01 2021-12-29 op switch (ch) {
364 5c7abf01 2021-12-29 op cert = optarg;
367 5c7abf01 2021-12-29 op debug = parse_debug(optarg);
370 5c7abf01 2021-12-29 op sni = optarg;
373 5c7abf01 2021-12-29 op key = optarg;
376 5c7abf01 2021-12-29 op dont_verify_name = 1;
382 5c7abf01 2021-12-29 op parse_proxy(optarg);
383 5c7abf01 2021-12-29 op dont_verify_name = 1;
386 5c7abf01 2021-12-29 op timer = strtonum(optarg, 1, 1000, &errstr);
387 5c7abf01 2021-12-29 op if (errstr != NULL)
388 5c7abf01 2021-12-29 op errx(1, "timeout is %s: %s",
389 5c7abf01 2021-12-29 op errstr, optarg);
390 5c7abf01 2021-12-29 op signal(SIGALRM, timeout);
391 5c7abf01 2021-12-29 op alarm(timer);
400 5c7abf01 2021-12-29 op argc -= optind;
401 5c7abf01 2021-12-29 op argv += optind;
403 5c7abf01 2021-12-29 op if (flag2 + flag3 > 1) {
404 5c7abf01 2021-12-29 op warnx("only -2 or -3 can be specified at the same time");
408 5c7abf01 2021-12-29 op if ((cert != NULL && key == NULL) ||
409 5c7abf01 2021-12-29 op (cert == NULL && key != NULL)) {
410 5c7abf01 2021-12-29 op warnx("cert or key is missing");
414 b3602923 2022-01-13 op if (argc != 1)
417 5c7abf01 2021-12-29 op load_tls_conf();
419 b3602923 2022-01-13 op signal(SIGPIPE, SIG_IGN);
421 5c7abf01 2021-12-29 op #ifdef __OpenBSD__
422 5c7abf01 2021-12-29 op if (pledge("stdio inet dns", NULL) == -1)
423 5c7abf01 2021-12-29 op err(1, "pledge");
426 5c7abf01 2021-12-29 op code = get(*argv);
428 5c7abf01 2021-12-29 op return code < 20 || code >= 30;