Blob


1 /*
2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
17 #include <sys/types.h>
18 #include <sys/socket.h>
20 #include <netdb.h>
22 #include <assert.h>
23 #include <endian.h>
24 #include <err.h>
25 #include <errno.h>
26 #include <event.h>
27 #include <fcntl.h>
28 #include <inttypes.h>
29 #include <signal.h>
30 #include <stdio.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <syslog.h>
34 #include <tls.h>
35 #include <unistd.h>
36 #include <vis.h>
38 #include "9pclib.h"
39 #include "kami.h"
40 #include "log.h"
41 #include "utils.h"
43 #define DEBUG_PACKETS 0
45 #define PROMPT "=% "
47 /* flags */
48 int verbose;
49 int tls;
50 const char *keypath;
51 const char *crtpath;
52 const char *host;
53 const char *port;
55 /* state */
56 struct tls_config *tlsconf;
57 struct tls *ctx;
58 struct bufferevent *bev, *inbev;
60 static void __dead usage(int);
62 static void sig_handler(int, short, void *);
64 static int openconn(void);
65 static void mark_nonblock(int);
67 static void tls_readcb(int, short, void *);
68 static void tls_writecb(int, short, void *);
70 static void client_read(struct bufferevent *, void *);
71 static void client_write(struct bufferevent *, void *);
72 static void client_error(struct bufferevent *, short, void *);
74 static void repl_read(struct bufferevent *, void *);
75 static void repl_error(struct bufferevent *, short, void *);
77 static void excmd_version(const char **, int);
78 static void excmd_attach(const char **, int);
79 static void excmd_clunk(const char **, int);
80 static void excmd_flush(const char **, int);
81 static void excmd_walk(const char ** , int);
82 static void excmd_open(const char ** , int);
83 static void excmd_create(const char ** , int);
84 static void excmd_read(const char ** , int);
85 static void excmd_write(const char **, int);
86 static void excmd(const char **, int);
88 static void pp_qid(const uint8_t *, uint32_t);
89 static void pp_msg(uint32_t, uint8_t, uint16_t, const uint8_t *);
90 static void handle_9p(const uint8_t *, size_t);
91 static void clr(void);
92 static void prompt(void);
94 static void __dead
95 usage(int ret)
96 {
97 fprintf(stderr,
98 "usage: %s [-chv] [-C crt] [-K key] [-H host] [-P port]\n",
99 getprogname());
100 fprintf(stderr, "kamid suite version " KAMID_VERSION "\n");
101 exit(ret);
104 static void
105 sig_handler(int sig, short event, void *d)
107 /*
108 * Normal signal handler rules don't apply because libevent
109 * decouples for us.
110 */
112 switch (sig) {
113 case SIGINT:
114 case SIGTERM:
115 clr();
116 log_warnx("Shutting down...");
117 event_loopbreak();
118 return;
119 default:
120 fatalx("unexpected signal %d", sig);
124 static int
125 openconn(void)
127 struct addrinfo hints, *res, *res0;
128 int error;
129 int save_errno;
130 int s;
131 const char *cause = NULL;
133 memset(&hints, 0, sizeof(hints));
134 hints.ai_family = AF_UNSPEC;
135 hints.ai_socktype = SOCK_STREAM;
136 if ((error = getaddrinfo(host, port, &hints, &res0))) {
137 warnx("%s", gai_strerror(error));
138 return -1;
141 s = -1;
142 for (res = res0; res; res = res->ai_next) {
143 s = socket(res->ai_family, res->ai_socktype,
144 res->ai_protocol);
145 if (s == -1) {
146 cause = "socket";
147 continue;
150 if (connect(s, res->ai_addr, res->ai_addrlen) == -1) {
151 cause = "connect";
152 save_errno = errno;
153 close(s);
154 errno = save_errno;
155 s = -1;
156 continue;
159 break;
162 freeaddrinfo(res0);
164 if (s == -1)
165 warn("%s", cause);
167 return s;
170 static void
171 mark_nonblock(int fd)
173 int flags;
175 if ((flags = fcntl(fd, F_GETFL)) == -1)
176 fatal("fcntl(F_GETFL)");
177 if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) == -1)
178 fatal("fcntl(F_SETFL)");
181 static void
182 tls_readcb(int fd, short event, void *d)
184 struct bufferevent *bufev = d;
185 char buf[IBUF_READ_SIZE];
186 int what = EVBUFFER_READ;
187 int howmuch = IBUF_READ_SIZE;
188 ssize_t ret;
189 size_t len;
191 if (event == EV_TIMEOUT) {
192 what |= EVBUFFER_TIMEOUT;
193 goto err;
196 if (bufev->wm_read.high != 0)
197 howmuch = MIN(sizeof(buf), bufev->wm_read.high);
199 switch (ret = tls_read(ctx, buf, howmuch)) {
200 case TLS_WANT_POLLIN:
201 case TLS_WANT_POLLOUT:
202 goto retry;
203 case -1:
204 what |= EVBUFFER_ERROR;
205 goto err;
207 len = ret;
209 if (len == 0) {
210 what |= EVBUFFER_EOF;
211 goto err;
214 if (evbuffer_add(bufev->input, buf, len) == -1) {
215 what |= EVBUFFER_ERROR;
216 goto err;
219 event_add(&bufev->ev_read, NULL);
221 len = EVBUFFER_LENGTH(bufev->input);
222 if (bufev->wm_read.low != 0 && len < bufev->wm_read.low)
223 return;
224 if (bufev->readcb != NULL)
225 (*bufev->readcb)(bufev, bufev->cbarg);
226 return;
228 retry:
229 event_add(&bufev->ev_read, NULL);
230 return;
232 err:
233 (*bufev->errorcb)(bufev, what, bufev->cbarg);
236 static void
237 tls_writecb(int fd, short event, void *d)
239 struct bufferevent *bufev = d;
240 ssize_t ret;
241 size_t len;
242 short what = EVBUFFER_WRITE;
243 void *data;
245 if (event == EV_TIMEOUT) {
246 what |= EVBUFFER_TIMEOUT;
247 goto err;
250 len = EVBUFFER_LENGTH(bufev->output);
251 if (len != 0) {
252 data = EVBUFFER_DATA(bufev->output);
254 #if DEBUG_PACKETS
255 hexdump("outgoing msg", data, len);
256 #endif
258 switch (ret = tls_write(ctx, data, len)) {
259 case TLS_WANT_POLLIN:
260 case TLS_WANT_POLLOUT:
261 goto retry;
262 case -1:
263 what |= EVBUFFER_ERROR;
264 goto err;
266 evbuffer_drain(bufev->output, ret);
269 if (EVBUFFER_LENGTH(bufev->output) != 0)
270 event_add(&bufev->ev_write, NULL);
272 if (bufev->writecb != NULL &&
273 EVBUFFER_LENGTH(bufev->output) <= bufev->wm_write.low)
274 (*bufev->writecb)(bufev, bufev->cbarg);
275 return;
277 retry:
278 event_add(&bufev->ev_write, NULL);
279 return;
280 err:
281 (*bufev->errorcb)(bufev, what, bufev->cbarg);
284 static void
285 client_read(struct bufferevent *bev, void *d)
287 struct evbuffer *src = EVBUFFER_INPUT(bev);
288 uint32_t len;
289 uint8_t *data;
291 for (;;) {
292 if (EVBUFFER_LENGTH(src) < sizeof(len))
293 return;
295 data = EVBUFFER_DATA(src);
297 memcpy(&len, data, sizeof(len));
298 len = le32toh(len);
300 if (len < HEADERSIZE)
301 fatal("incoming message is too small! (%d bytes)",
302 len);
304 if (len > EVBUFFER_LENGTH(src))
305 return;
307 #if DEBUG_PACKETS
308 hexdump("incoming msg", data, len);
309 #endif
311 handle_9p(data, len);
312 evbuffer_drain(src, len);
316 static void
317 client_write(struct bufferevent *bev, void *data)
319 return; /* nothing to do */
322 static void
323 client_error(struct bufferevent *bev, short err, void *data)
325 if (err & EVBUFFER_ERROR)
326 fatal("buffer event error");
328 if (err & EVBUFFER_EOF) {
329 clr();
330 log_info("EOF");
331 event_loopbreak();
332 return;
335 clr();
336 log_warnx("unknown event error");
337 event_loopbreak();
340 static void
341 repl_read(struct bufferevent *bev, void *d)
343 size_t len;
344 int argc;
345 const char *argv[10], **ap;
346 char *line;
348 line = evbuffer_readln(bev->input, &len, EVBUFFER_EOL_LF);
349 if (line == NULL)
350 return;
352 for (argc = 0, ap = argv; ap < &argv[9] &&
353 (*ap = strsep(&line, " \t")) != NULL;) {
354 if (**ap != '\0')
355 ap++, argc++;
358 clr();
359 excmd(argv, argc);
360 prompt();
362 free(line);
365 static void
366 repl_error(struct bufferevent *bev, short error, void *d)
368 fatalx("an error occurred");
371 static inline void
372 do_send(void)
374 bufferevent_write_buffer(bev, evb);
377 /* version [version-str] */
378 static void
379 excmd_version(const char **argv, int argc)
381 const char *s;
383 s = VERSION9P;
384 if (argc == 2)
385 s = argv[1];
387 tversion(s, MSIZE9P);
388 do_send();
391 /* attach fid uname aname */
392 static void
393 excmd_attach(const char **argv, int argc)
395 uint32_t fid;
396 const char *errstr;
398 if (argc != 4)
399 goto usage;
401 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
402 if (errstr != NULL) {
403 log_warnx("fid is %s: %s", errstr, argv[1]);
404 return;
407 tattach(fid, NOFID, argv[2], argv[3]);
408 do_send();
409 return;
411 usage:
412 log_warnx("usage: attach fid uname aname");
415 /* clunk fid */
416 static void
417 excmd_clunk(const char **argv, int argc)
419 uint32_t fid;
420 const char *errstr;
422 if (argc != 2)
423 goto usage;
425 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
426 if (errstr != NULL) {
427 log_warnx("fid is %s: %s", errstr, argv[1]);
428 return;
431 tclunk(fid);
432 do_send();
433 return;
435 usage:
436 log_warnx("usage: clunk fid");
439 /* flush oldtag */
440 static void
441 excmd_flush(const char **argv, int argc)
443 uint16_t oldtag;
444 const char *errstr;
446 if (argc != 2)
447 goto usage;
449 oldtag = strtonum(argv[1], 0, UINT16_MAX, &errstr);
450 if (errstr != NULL) {
451 log_warnx("oldtag is %s: %s", errstr, argv[1]);
452 return;
455 tflush(oldtag);
456 do_send();
457 return;
459 usage:
460 log_warnx("usage: flush oldtag");
463 /* walk fid newfid wnames... */
464 static void
465 excmd_walk(const char **argv, int argc)
467 uint32_t fid, newfid;
468 const char *errstr;
470 if (argc < 3)
471 goto usage;
473 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
474 if (errstr != NULL) {
475 log_warnx("fid is %s: %s", errstr, argv[1]);
476 return;
479 newfid = strtonum(argv[2], 0, UINT32_MAX, &errstr);
480 if (errstr != NULL) {
481 log_warnx("newfid is %s: %s", errstr, argv[1]);
482 return;
485 twalk(fid, newfid, argv + 3, argc - 3);
486 do_send();
487 return;
489 usage:
490 log_warnx("usage: walk fid newfid wnames...");
493 /* open fid mode [flag] */
494 static void
495 excmd_open(const char **argv, int argc)
497 const char *errstr;
498 uint32_t fid;
499 uint8_t mode = 0;
501 if (argc != 3 && argc != 4)
502 goto usage;
504 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
505 if (errstr != NULL) {
506 log_warnx("fid is %s: %s", errstr, argv[1]);
507 return;
510 /* parse mode */
511 if (!strcmp("read", argv[2]) || !strcmp("r", argv[2]))
512 mode = KOREAD;
513 else if (!strcmp("write", argv[2]) || !strcmp("w", argv[2]))
514 mode = KOWRITE;
515 else if (!strcmp("readwrite", argv[2]) || !strcmp("rw", argv[2]))
516 mode = KORDWR;
517 else {
518 log_warnx("invalid mode %s", argv[2]);
519 return;
522 /* parse flag */
523 if (argv[3] != NULL) {
524 if (!strcmp("trunc", argv[3]))
525 mode |= KOTRUNC;
526 else if (!strcmp("rclose", argv[3]))
527 mode |= KORCLOSE;
528 else {
529 log_warnx("invalid flag %s", argv[3]);
530 return;
534 topen(fid, mode);
535 do_send();
536 return;
538 usage:
539 log_warnx("usage: open fid mode [flag]");
542 /* create fid path perm mode */
543 static void
544 excmd_create(const char **argv, int argc)
546 const char *errstr;
547 uint32_t fid;
548 uint8_t mode = 0;
550 if (argc != 5)
551 goto usage;
553 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
554 if (errstr != NULL) {
555 log_warnx("fid is %s: %s", errstr, argv[1]);
556 return;
559 /* parse mode */
560 if (!strcmp("write", argv[4]) || !strcmp("w", argv[4]))
561 mode = KOWRITE;
562 else if (!strcmp("readwrite", argv[4]) || !strcmp("rw", argv[4]))
563 mode = KORDWR;
564 else {
565 log_warnx("invalid mode %s for create", argv[4]);
566 return;
569 tcreate(fid, argv[2], 0, mode);
570 do_send();
571 return;
573 usage:
574 log_warnx("usage: create fid path perm mode ; perm is unused");
578 /* read fid offset count */
579 static void
580 excmd_read(const char **argv, int argc)
582 uint64_t off;
583 uint32_t fid, count;
584 const char *errstr;
586 if (argc != 4)
587 goto usage;
589 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
590 if (errstr != NULL) {
591 log_warnx("fid is %s: %s", errstr, argv[1]);
592 return;
595 /* should really be UNT64_MAX but it fails... */
596 off = strtonum(argv[2], -1, UINT32_MAX, &errstr);
597 if (errstr != NULL) {
598 log_warnx("offset is %s: %s", errstr, argv[2]);
599 return;
602 count = strtonum(argv[3], 0, UINT32_MAX, &errstr);
603 if (errstr != NULL) {
604 log_warnx("count is %s: %s", errstr, argv[3]);
605 return;
608 tread(fid, off, count);
609 do_send();
610 return;
612 usage:
613 log_warnx("usage: read fid offset count");
616 /* write fid offset content */
617 static void
618 excmd_write(const char **argv, int argc)
620 uint64_t off;
621 uint32_t fid, count;
622 const char *errstr;
624 if (argc != 4)
625 goto usage;
627 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
628 if (errstr != NULL) {
629 log_warnx("fid is %s: %s", errstr, argv[1]);
630 return;
633 /* should really be UINT64_MAX but... */
634 off = strtonum(argv[2], 0, UINT32_MAX, &errstr);
635 if (errstr != NULL) {
636 log_warnx("offset is %s: %s", errstr, argv[2]);
637 return;
640 count = strlen(argv[3]);
641 twrite(fid, off, argv[3], count);
642 do_send();
643 return;
645 usage:
646 log_warnx("usage: write fid offset content");
649 /* remove fid */
650 static void
651 excmd_remove(const char **argv, int argc)
653 const char *errstr;
654 uint32_t fid;
656 if (argc != 2)
657 goto usage;
659 fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
660 if (errstr != NULL) {
661 log_warnx("fid is %s: %s", errstr, argv[1]);
662 return;
665 tremove(fid);
666 do_send();
667 return;
669 usage:
670 log_warnx("usage: remove fid");
673 static void
674 excmd(const char **argv, int argc)
676 struct cmd {
677 const char *name;
678 void (*fn)(const char **, int);
679 } cmds[] = {
680 {"version", excmd_version},
681 {"attach", excmd_attach},
682 {"clunk", excmd_clunk},
683 {"flush", excmd_flush},
684 {"walk", excmd_walk},
685 {"open", excmd_open},
686 {"create", excmd_create},
687 {"read", excmd_read},
688 {"write", excmd_write},
689 /* TODO: stat */
690 {"remove", excmd_remove},
691 };
692 size_t i;
694 if (argc == 0)
695 return;
697 for (i = 0; i < sizeof(cmds)/sizeof(cmds[0]); ++i) {
698 if (!strcmp(cmds[i].name, argv[0])) {
699 cmds[i].fn(argv, argc);
700 return;
704 log_warnx("Unknown command %s", *argv);
707 static void
708 pp_qid(const uint8_t *d, uint32_t len)
710 uint64_t path;
711 uint32_t vers;
712 uint8_t type;
714 if (len < 13) {
715 printf("invalid");
716 return;
719 type = *d++;
721 memcpy(&vers, d, sizeof(vers));
722 d += sizeof(vers);
723 vers = le64toh(vers);
725 memcpy(&path, d, sizeof(path));
726 d += sizeof(path);
727 path = le64toh(path);
729 printf("qid{path=%"PRIu64" version=%"PRIu32" type=0x%x\"%s\"}",
730 path, vers, type, pp_qid_type(type));
733 static void
734 pp_msg(uint32_t len, uint8_t type, uint16_t tag, const uint8_t *d)
736 uint32_t msize, iounit, count;
737 uint16_t slen;
738 char *v;
740 printf("len=%"PRIu32" type=%d[%s] tag=0x%x[%d] ", len,
741 type, pp_msg_type(type), tag, tag);
743 len -= HEADERSIZE;
745 switch (type) {
746 case Rversion:
747 if (len < 6) {
748 printf("invalid: not enough space for msize "
749 "and version provided.");
750 break;
753 memcpy(&msize, d, sizeof(msize));
754 d += sizeof(msize);
755 len -= sizeof(msize);
756 msize = le32toh(msize);
758 memcpy(&slen, d, sizeof(slen));
759 d += sizeof(slen);
760 len -= sizeof(slen);
761 slen = le16toh(slen);
763 if (len != slen) {
764 printf("invalid: version string length doesn't "
765 "match. Got %d; want %d", slen, len);
766 break;
769 printf("msize=%"PRIu32" version[%"PRIu16"]=\"",
770 msize, slen);
771 fwrite(d, 1, slen, stdout);
772 printf("\"");
774 break;
776 case Rattach:
777 pp_qid(d, len);
778 break;
780 case Rclunk:
781 case Rflush:
782 case Rremove:
783 if (len != 0)
784 printf("invalid %s: %"PRIu32" extra bytes",
785 pp_msg_type(type), len);
786 break;
788 case Rwalk:
789 if (len < 2) {
790 printf("invaild Rwalk: less than two bytes (%d)",
791 (int)len);
792 break;
795 memcpy(&slen, d, sizeof(slen));
796 d += sizeof(slen);
797 len -= sizeof(slen);
798 slen = le16toh(slen);
800 if (len != QIDSIZE * slen) {
801 printf("invalid Rwalk: wanted %d bytes for %d qids "
802 "but got %"PRIu32" bytes instead",
803 QIDSIZE*slen, slen, len);
804 break;
807 printf("nwqid=%"PRIu16, slen);
809 for (; slen != 0; slen--) {
810 printf(" ");
811 pp_qid(d, len);
812 d += QIDSIZE;
813 len -= QIDSIZE;
816 break;
818 case Ropen:
819 case Rcreate:
820 if (len != QIDSIZE + 4) {
821 printf("invalid %s: expected %d bytes; "
822 "got %u\n", pp_msg_type(type), QIDSIZE + 4, len);
823 break;
826 pp_qid(d, len);
827 d += QIDSIZE;
828 len -= QIDSIZE;
830 memcpy(&iounit, d, sizeof(iounit));
831 d += sizeof(iounit);
832 len -= sizeof(iounit);
833 iounit = le32toh(iounit);
834 printf(" iounit=%"PRIu32, iounit);
835 break;
837 case Rread:
838 if (len < sizeof(count)) {
839 printf("invalid Rread: expected %zu bytes at least; "
840 "got %u\n", sizeof(count), len);
841 break;
844 memcpy(&count, d, sizeof(count));
845 d += sizeof(count);
846 len -= sizeof(count);
847 count = le32toh(count);
849 if (len != count) {
850 printf("invalid Rread: expected %d data bytes; "
851 "got %u\n", count, len);
852 break;
855 /* allocates three extra bytes, oh well... */
856 if ((v = calloc(count + 1, 4)) == NULL)
857 fatal("calloc");
858 strvisx(v, d, count, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
859 printf("data=%s", v);
860 free(v);
862 break;
864 case Rwrite:
865 if (len != sizeof(count)) {
866 printf("invalid Rwrite: expected %zu data bytes; "
867 "got %u\n", sizeof(count), len);
868 break;
871 memcpy(&count, d, sizeof(count));
872 d += sizeof(count);
873 len -= sizeof(count);
874 count = le32toh(count);
876 printf("count=%d", count);
877 break;
879 case Rerror:
880 memcpy(&slen, d, sizeof(slen));
881 d += sizeof(slen);
882 len -= sizeof(slen);
883 slen = le16toh(slen);
885 if (slen != len) {
886 printf("invalid: error string length doesn't "
887 "match. Got %d; want %d", slen, len);
888 break;
891 printf("error=\"");
892 fwrite(d, 1, slen, stdout);
893 printf("\"");
895 break;
897 default:
898 if ((v = calloc(len + 1, 4)) == NULL)
899 fatal("calloc");
900 strvisx(v, d, len, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
901 printf("body=%s", v);
902 free(v);
905 printf("\n");
908 static void
909 handle_9p(const uint8_t *data, size_t size)
911 uint32_t len;
912 uint16_t tag;
913 uint8_t type;
915 assert(size >= HEADERSIZE);
917 memcpy(&len, data, sizeof(len));
918 data += sizeof(len);
920 memcpy(&type, data, sizeof(type));
921 data += sizeof(type);
923 memcpy(&tag, data, sizeof(tag));
924 data += sizeof(tag);
926 len = le32toh(len);
927 /* type is one byte long, no endianness issues */
928 tag = le16toh(tag);
930 clr();
931 pp_msg(len, type, tag, data);
932 prompt();
935 static void
936 clr(void)
938 printf("\r");
939 fflush(stdout);
942 static void
943 prompt(void)
945 printf("%s", PROMPT);
946 fflush(stdout);
949 int
950 main(int argc, char **argv)
952 int ch, sock, handshake;
953 struct event ev_sigint, ev_sigterm;
955 signal(SIGPIPE, SIG_IGN);
957 while ((ch = getopt(argc, argv, "C:cH:hK:P:v")) != -1) {
958 switch (ch) {
959 case 'C':
960 crtpath = optarg;
961 break;
962 case 'c':
963 tls = 1;
964 break;
965 case 'H':
966 host = optarg;
967 break;
968 case 'h':
969 usage(0);
970 break;
971 case 'K':
972 keypath = optarg;
973 break;
974 case 'P':
975 port = optarg;
976 break;
977 case 'v':
978 verbose = 1;
979 break;
980 default:
981 usage(1);
985 if (host == NULL)
986 host = "localhost";
987 if (port == NULL)
988 port = "1337";
990 argc -= optind;
991 argv += optind;
993 if (argc != 0)
994 usage(1);
995 /* if (!tls || (crtpath != NULL || keypath != NULL)) */
996 /* usage(1); */
997 if (!tls)
998 errx(1, "must enable tls (for now)");
1000 log_init(1, LOG_DAEMON);
1001 log_setverbose(verbose);
1002 log_procinit(getprogname());
1004 if ((tlsconf = tls_config_new()) == NULL)
1005 fatalx("tls_config_new");
1006 tls_config_insecure_noverifycert(tlsconf);
1007 tls_config_insecure_noverifyname(tlsconf);
1008 if (tls_config_set_keypair_file(tlsconf, crtpath, keypath) == -1)
1009 fatalx("can't load certs (%s, %s)", crtpath, keypath);
1011 if ((ctx = tls_client()) == NULL)
1012 fatal("tls_client");
1013 if (tls_configure(ctx, tlsconf) == -1)
1014 fatalx("tls_configure: %s", tls_error(ctx));
1016 log_info("connecting to %s:%s...", host, port);
1018 if ((sock = openconn()) == -1)
1019 fatalx("can't connect to %s:%s", host, port);
1021 if (tls_connect_socket(ctx, sock, host) == -1)
1022 fatalx("tls_connect_socket: %s", tls_error(ctx));
1024 for (handshake = 0; !handshake;) {
1025 switch (tls_handshake(ctx)) {
1026 case -1:
1027 fatalx("tls_handshake: %s", tls_error(ctx));
1028 case 0:
1029 handshake = 1;
1030 break;
1034 log_info("connected!");
1036 mark_nonblock(sock);
1038 event_init();
1040 /* initialize global evb */
1041 if ((evb = evbuffer_new()) == NULL)
1042 fatal("evbuffer_new");
1044 signal_set(&ev_sigint, SIGINT, sig_handler, NULL);
1045 signal_set(&ev_sigterm, SIGINT, sig_handler, NULL);
1047 signal_add(&ev_sigint, NULL);
1048 signal_add(&ev_sigterm, NULL);
1050 bev = bufferevent_new(sock, client_read, client_write, client_error,
1051 NULL);
1052 if (bev == NULL)
1053 fatal("bufferevent_new");
1055 /* setup tls/io */
1056 event_set(&bev->ev_read, sock, EV_READ, tls_readcb, bev);
1057 event_set(&bev->ev_write, sock, EV_WRITE, tls_writecb, bev);
1059 bufferevent_enable(bev, EV_READ|EV_WRITE);
1061 mark_nonblock(0);
1062 inbev = bufferevent_new(0, repl_read, NULL, repl_error, NULL);
1063 bufferevent_enable(inbev, EV_READ);
1065 prompt();
1066 event_dispatch();
1068 bufferevent_free(bev);
1069 tls_free(ctx);
1070 tls_config_free(tlsconf);
1071 close(sock);
1073 return 0;