X-Git-Url: https://git.exim.org/users/heiko/exim.git/blobdiff_plain/4fab92fbc2b63bac2d89c1dae69fa1845cb640b7..3af849e2045f7c580d4c533d829dc9d567162d36:/test/src/client.c?ds=inline diff --git a/test/src/client.c b/test/src/client.c index 4a0a1bac4..be8b1cc0d 100644 --- a/test/src/client.c +++ b/test/src/client.c @@ -103,7 +103,7 @@ static int ssl_session_timeout = 200; /* Priorities for TLS algorithms to use. */ -#if GNUTLS_VERSION_NUMBER < 0x030400 +# if GNUTLS_VERSION_NUMBER < 0x030400 static const int protocol_priority[16] = { GNUTLS_TLS1, GNUTLS_SSL3, 0 }; static const int kx_priority[16] = { @@ -125,7 +125,7 @@ static const int mac_priority[16] = { 0 }; static const int comp_priority[16] = { GNUTLS_COMP_NULL, 0 }; -#endif +# endif #endif /*HAVE_GNUTLS*/ @@ -133,6 +133,7 @@ static const int comp_priority[16] = { GNUTLS_COMP_NULL, 0 }; #ifdef HAVE_TLS char * ocsp_stapling = NULL; +char * pri_string = NULL; #endif @@ -454,7 +455,7 @@ gnutls_session_t session; gnutls_init(&session, GNUTLS_CLIENT | GNUTLS_NO_EXTENSIONS); -#if GNUTLS_VERSION_NUMBER < 0x030400 +# if GNUTLS_VERSION_NUMBER < 0x030400 gnutls_cipher_set_priority(session, default_cipher_priority); gnutls_compression_set_priority(session, comp_priority); gnutls_kx_set_priority(session, kx_priority); @@ -462,10 +463,19 @@ gnutls_protocol_set_priority(session, protocol_priority); gnutls_mac_set_priority(session, mac_priority); gnutls_cred_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred); -#else -gnutls_set_default_priority(session); +# else +if (pri_string) + { + gnutls_priority_t priority_cache; + const char * errpos; + + gnutls_priority_init(&priority_cache, pri_string, &errpos); + gnutls_priority_set(session, priority_cache); + } +else + gnutls_set_default_priority(session); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred); -#endif +# endif gnutls_dh_set_prime_bits(session, DH_BITS); gnutls_db_set_cache_expiration(session, ssl_session_timeout); @@ -476,462 +486,147 @@ return session; /****************************************************************************/ -/****************************************************************************/ - - - - -/************************************************* -* Main Program * -*************************************************/ - -const char * const HELP_MESSAGE = "\n\ -Usage: client\n" -#ifdef HAVE_TLS -"\ - [-tls-on-connect]\n\ - [-ocsp]\n" -#endif -"\ - [-tn] n seconds timeout\n\ - \n\ - \n\ - []\n\ - []\n\ - []\n\ -\n"; +/* Turn "\n" and "\r" into the relevant characters. This is a hack. */ -int main(int argc, char **argv) +static int +unescape_buf(unsigned char * buf, int len) { -struct sockaddr *s_ptr; -struct sockaddr_in s_in4; -char *interface = NULL; -char *address = NULL; -char *certfile = NULL; -char *keyfile = NULL; -char *end = NULL; -int argi = 1; -int host_af, port, s_len, rc, sock, save_errno; -int timeout = 5; -int tls_active = 0; -int sent_starttls = 0; -int tls_on_connect = 0; -long tmplong; - -#if HAVE_IPV6 -struct sockaddr_in6 s_in6; -#endif +unsigned char * s; +unsigned char c, t; +unsigned shift; -#ifdef HAVE_OPENSSL -SSL_CTX* ctx; -SSL* ssl; -#endif - -unsigned char outbuffer[10240]; -unsigned char inbuffer[10240]; -unsigned char *inptr = inbuffer; - -*inptr = 0; /* Buffer empty */ - -/* Options */ - -while (argc >= argi + 1 && argv[argi][0] == '-') +for (s = buf; s < buf+len; s++) if (*s == '\\') { - if (strcmp(argv[argi], "-help") == 0 || - strcmp(argv[argi], "--help") == 0 || - strcmp(argv[argi], "-h") == 0) - { - puts(HELP_MESSAGE); - exit(0); - } - if (strcmp(argv[argi], "-tls-on-connect") == 0) - { - tls_on_connect = 1; - argi++; - } -#ifdef HAVE_TLS - else if (strcmp(argv[argi], "-ocsp") == 0) - { - if (argc < ++argi + 1) - { - fprintf(stderr, "Missing required certificate file for ocsp option\n"); - exit(96); - } - ocsp_stapling = argv[argi++]; - } - -#endif - else if (argv[argi][1] == 't' && isdigit(argv[argi][2])) - { - tmplong = strtol(argv[argi]+2, &end, 10); - if (end == argv[argi]+2 || *end) - { - fprintf(stderr, "Failed to parse seconds from option <%s>\n", - argv[argi]); - exit(95); - } - if (tmplong > 10000L) - { - fprintf(stderr, "Unreasonably long wait of %ld seconds requested\n", - tmplong); - exit(94); - } - if (tmplong < 0L) - { - fprintf(stderr, "Timeout must not be negative (%ld)\n", tmplong); - exit(93); - } - timeout = (int) tmplong; - argi++; - } - else + switch (s[1]) { - fprintf(stderr, "Unrecognized option %s\n", argv[argi]); - exit(92); + default: c = s[1]; shift = 1; break; + case 'n': c = '\n'; shift = 1; break; + case 'r': c = '\r'; shift = 1; break; + case 'x': + t = s[2]; + if (t >= 'A' && t <= 'F') t -= 'A'-'9'-1; + else if (t >= 'a' && t <= 'f') t -= 'a'-'9'-1; + t -= '0'; + c = (t<<4) & 0xf0; + t = s[3]; + if (t >= 'A' && t <= 'F') t -= 'A'-'9'-1; + else if (t >= 'a' && t <= 'f') t -= 'a'-'9'-1; + t -= '0'; + c |= t & 0xf; + shift = 3; + break; } + *s = c; + memmove(s+1, s+shift+1, len-shift); + len -= shift; } +return len; +} -/* Mandatory 1st arg is IP address */ - -if (argc < argi+1) - { - fprintf(stderr, "No IP address given\n"); - exit(91); - } - -address = argv[argi++]; -host_af = (strchr(address, ':') != NULL)? AF_INET6 : AF_INET; - -/* Mandatory 2nd arg is port */ - -if (argc < argi+1) - { - fprintf(stderr, "No port number given\n"); - exit(90); - } - -port = atoi(argv[argi++]); - -/* Optional next arg is interface */ - -if (argc > argi && - (isdigit((unsigned char)argv[argi][0]) || argv[argi][0] == ':')) - interface = argv[argi++]; - -/* Any more arguments are the name of a certificate file and key file */ - -if (argc > argi) certfile = argv[argi++]; -if (argc > argi) keyfile = argv[argi++]; - - -#if HAVE_IPV6 -/* For an IPv6 address, use an IPv6 sockaddr structure. */ -if (host_af == AF_INET6) - { - s_ptr = (struct sockaddr *)&s_in6; - s_len = sizeof(s_in6); - } -else +/****************************************************************************/ +typedef struct { + int sock; + int tls_active; +#ifdef HAVE_OPENSSL + SSL_CTX * ctx; + SSL * ssl; #endif + int sent_starttls; +} srv_ctx; -/* For an IPv4 address, use an IPv4 sockaddr structure, -even on an IPv6 system. */ - - { - s_ptr = (struct sockaddr *)&s_in4; - s_len = sizeof(s_in4); - } - -printf("Connecting to %s port %d ... ", address, port); +static void +do_file(srv_ctx * srv, FILE * f, int timeout, + unsigned char * inbuffer, unsigned bsiz, unsigned char * inptr) +{ +unsigned char outbuffer[1024 * 20]; -sock = socket(host_af, SOCK_STREAM, 0); -if (sock < 0) +while (fgets(CS outbuffer, sizeof(outbuffer), f) != NULL) { - printf("socket creation failed: %s\n", strerror(errno)); - exit(89); - } + int n = (int)strlen(CS outbuffer); + int crlf = 1; + int rc; -/* Bind to a specific interface if requested. On an IPv6 system, this has -to be of the same family as the address we are calling. On an IPv4 system the -test is redundant, but it keeps the code tidier. */ + /* Strip trailing newline */ + if (outbuffer[n-1] == '\n') outbuffer[--n] = 0; -if (interface != NULL) - { - int interface_af = (strchr(interface, ':') != NULL)? AF_INET6 : AF_INET; + /* Expect incoming */ - if (interface_af == host_af) + if ( strncmp(CS outbuffer, "???", 3) == 0 + && (outbuffer[3] == ' ' || outbuffer[3] == '*') + ) { - #if HAVE_IPV6 + unsigned char *lineptr; + unsigned exp_eof = outbuffer[3] == '*'; - /* Set up for IPv6 binding */ + printf("%s\n", outbuffer); + n = unescape_buf(outbuffer, n); - if (host_af == AF_INET6) + if (*inptr == 0) /* Refill input buffer */ { - memset(&s_in6, 0, sizeof(s_in6)); - s_in6.sin6_family = AF_INET6; - s_in6.sin6_port = 0; - if (inet_pton(AF_INET6, interface, &s_in6.sin6_addr) != 1) + if (srv->tls_active) { - printf("Unable to parse \"%s\"", interface); - exit(88); + #ifdef HAVE_OPENSSL + rc = SSL_read (srv->ssl, inbuffer, bsiz - 1); + #endif + #ifdef HAVE_GNUTLS + rc = gnutls_record_recv(tls_session, CS inbuffer, bsiz - 1); + #endif + } + else + { + alarm(timeout); + rc = read(srv->sock, inbuffer, bsiz); + alarm(0); } - } - else - #endif - /* Set up for IPv4 binding */ + if (rc < 0) + { + printf("Read error %s\n", strerror(errno)); + exit(81); + } + else if (rc == 0) + if (exp_eof) + { + printf("Expected EOF read\n"); + continue; + } + else + { + printf("Unexpected EOF read\n"); + close(srv->sock); + exit(80); + } + else if (exp_eof) + { + printf("Expected EOF not read\n"); + close(srv->sock); + exit(74); + } + else + { + inbuffer[rc] = 0; + inptr = inbuffer; + } + } + lineptr = inptr; + while (*inptr != 0 && *inptr != '\r' && *inptr != '\n') inptr++; + if (*inptr != 0) { - memset(&s_in4, 0, sizeof(s_in4)); - s_in4.sin_family = AF_INET; - s_in4.sin_port = 0; - s_in4.sin_addr.s_addr = (S_ADDR_TYPE)inet_addr(interface); + *inptr++ = 0; + if (*inptr == '\n') inptr++; } - /* Bind */ - - if (bind(sock, s_ptr, s_len) < 0) + printf("<<< %s\n", lineptr); + if (strncmp(CS lineptr, CS outbuffer + 4, n - 4) != 0) { - printf("Unable to bind outgoing SMTP call to %s: %s", - interface, strerror(errno)); - exit(87); - } - } - } - -/* Set up a remote IPv6 address */ - -#if HAVE_IPV6 -if (host_af == AF_INET6) - { - memset(&s_in6, 0, sizeof(s_in6)); - s_in6.sin6_family = AF_INET6; - s_in6.sin6_port = htons(port); - if (inet_pton(host_af, address, &s_in6.sin6_addr) != 1) - { - printf("Unable to parse \"%s\"", address); - exit(86); - } - } -else -#endif - -/* Set up a remote IPv4 address */ - - { - memset(&s_in4, 0, sizeof(s_in4)); - s_in4.sin_family = AF_INET; - s_in4.sin_port = htons(port); - s_in4.sin_addr.s_addr = (S_ADDR_TYPE)inet_addr(address); - } - -/* SIGALRM handler crashes out */ - -signal(SIGALRM, sigalrm_handler_crash); -alarm(timeout); -rc = connect(sock, s_ptr, s_len); -save_errno = errno; -alarm(0); - -/* A failure whose error code is "Interrupted system call" is in fact -an externally applied timeout if the signal handler has been run. */ - -if (rc < 0) - { - close(sock); - printf("connect failed: %s\n", strerror(save_errno)); - exit(85); - } - -printf("connected\n"); - - -/* --------------- Set up for OpenSSL --------------- */ - -#ifdef HAVE_OPENSSL -SSL_library_init(); -SSL_load_error_strings(); - -ctx = SSL_CTX_new(SSLv23_method()); -if (ctx == NULL) - { - printf ("SSL_CTX_new failed\n"); - exit(84); - } - -if (certfile != NULL) - { - if (!SSL_CTX_use_certificate_file(ctx, certfile, SSL_FILETYPE_PEM)) - { - printf("SSL_CTX_use_certificate_file failed\n"); - exit(83); - } - printf("Certificate file = %s\n", certfile); - } - -if (keyfile != NULL) - { - if (!SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) - { - printf("SSL_CTX_use_PrivateKey_file failed\n"); - exit(82); - } - printf("Key file = %s\n", keyfile); - } - -SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_BOTH); -SSL_CTX_set_timeout(ctx, 200); -SSL_CTX_set_info_callback(ctx, (void (*)())info_callback); -#endif - - -/* --------------- Set up for GnuTLS --------------- */ - -#ifdef HAVE_GNUTLS -if (certfile != NULL) printf("Certificate file = %s\n", certfile); -if (keyfile != NULL) printf("Key file = %s\n", keyfile); -tls_init(certfile, keyfile); -tls_session = tls_session_init(); -#ifdef HAVE_OCSP -if (ocsp_stapling) - gnutls_ocsp_status_request_enable_client(tls_session, NULL, 0, NULL); -#endif -gnutls_transport_set_ptr(tls_session, (gnutls_transport_ptr_t)(intptr_t)sock); - -/* When the server asks for a certificate and the client does not have one, -there is a SIGPIPE error in the gnutls_handshake() function for some reason -that is not understood. As luck would have it, this has never hit Exim itself -because it ignores SIGPIPE errors. Doing the same here allows it all to work as -one wants. */ - -signal(SIGPIPE, SIG_IGN); -#endif - -/* ---------------------------------------------- */ - - -/* Start TLS session if configured to do so without STARTTLS */ - -#ifdef HAVE_TLS -if (tls_on_connect) - { - printf("Attempting to start TLS\n"); - -#ifdef HAVE_OPENSSL - tls_active = tls_start(sock, &ssl, ctx); -#endif - -#ifdef HAVE_GNUTLS - { - int rc; - sigalrm_seen = FALSE; - alarm(timeout); - do { - rc = gnutls_handshake(tls_session); - } while (rc < 0 && gnutls_error_is_fatal(rc) == 0); - tls_active = rc >= 0; - alarm(0); - - if (!tls_active) printf("%s\n", gnutls_strerror(rc)); - } -#endif - - if (!tls_active) - printf("Failed to start TLS\n"); -#if defined(HAVE_GNUTLS) && defined(HAVE_OCSP) - else if ( ocsp_stapling - && gnutls_ocsp_status_request_is_checked(tls_session, 0) == 0) - printf("Failed to verify certificate status\n"); -#endif - else - printf("Succeeded in starting TLS\n"); - } -#endif - -while (fgets(CS outbuffer, sizeof(outbuffer), stdin) != NULL) - { - int n = (int)strlen(CS outbuffer); - - /* Strip trailing newline */ - if (outbuffer[n-1] == '\n') outbuffer[--n] = 0; - - /* Expect incoming */ - - if ( strncmp(CS outbuffer, "???", 3) == 0 - && (outbuffer[3] == ' ' || outbuffer[3] == '*') - ) - { - unsigned char *lineptr; - unsigned exp_eof = outbuffer[3] == '*'; - - printf("%s\n", outbuffer); - - if (*inptr == 0) /* Refill input buffer */ - { - if (tls_active) - { - #ifdef HAVE_OPENSSL - rc = SSL_read (ssl, inbuffer, sizeof(inbuffer) - 1); - #endif - #ifdef HAVE_GNUTLS - rc = gnutls_record_recv(tls_session, CS inbuffer, sizeof(inbuffer) - 1); - #endif - } - else - { - alarm(timeout); - rc = read(sock, inbuffer, sizeof(inbuffer)); - alarm(0); - } - - if (rc < 0) - { - printf("Read error %s\n", strerror(errno)); - exit(81); - } - else if (rc == 0) - if (exp_eof) - { - printf("Expected EOF read\n"); - continue; - } - else - { - printf("Enexpected EOF read\n"); - close(sock); - exit(80); - } - else if (exp_eof) - { - printf("Expected EOF not read\n"); - close(sock); - exit(74); - } - else - { - inbuffer[rc] = 0; - inptr = inbuffer; - } - } - - lineptr = inptr; - while (*inptr != 0 && *inptr != '\r' && *inptr != '\n') inptr++; - if (*inptr != 0) - { - *inptr++ = 0; - if (*inptr == '\n') inptr++; - } - - printf("<<< %s\n", lineptr); - if (strncmp(CS lineptr, CS outbuffer + 4, (int)strlen(CS outbuffer) - 4) != 0) - { - printf("\n******** Input mismatch ********\n"); - exit(79); + printf("\n******** Input mismatch ********\n"); + exit(79); } #ifdef HAVE_TLS - if (sent_starttls) + if (srv->sent_starttls) { if (lineptr[0] == '2') { @@ -942,7 +637,7 @@ int rc; fflush(stdout); #ifdef HAVE_OPENSSL - tls_active = tls_start(sock, &ssl, ctx); + srv->tls_active = tls_start(srv->sock, &srv->ssl, srv->ctx); #endif #ifdef HAVE_GNUTLS @@ -953,14 +648,14 @@ int rc; do { rc = gnutls_handshake(tls_session); } while (rc < 0 && gnutls_error_is_fatal(rc) == 0); - tls_active = rc >= 0; + srv->tls_active = rc >= 0; alarm(0); - if (!tls_active) printf("%s\n", gnutls_strerror(rc)); + if (!srv->tls_active) printf("%s\n", gnutls_strerror(rc)); } #endif - if (!tls_active) + if (!srv->tls_active) { printf("Failed to start TLS\n"); fflush(stdout); @@ -1008,7 +703,7 @@ int rc; } else printf("Abandoning TLS start attempt\n"); } - sent_starttls = 0; + srv->sent_starttls = 0; #endif } @@ -1020,16 +715,37 @@ int rc; sleep(atoi(CS outbuffer + 4)); } - /* Send outgoing, but barf if unconsumed incoming */ + /* Stack new input file */ + + else if (strncmp(CS outbuffer, "<<< ", 4) == 0) + { + FILE * new_f; + if (!(new_f = fopen(outbuffer+4 , "r"))) + { + printf("Unable to open '%s': %s", inptr, strerror(errno)); + exit(74); + } + do_file(srv, new_f, timeout, inbuffer, bsiz, inptr); + } + + + /* Send line outgoing, but barf if unconsumed incoming */ else { - unsigned char *escape; + unsigned char * out = outbuffer; + + if (strncmp(CS outbuffer, ">>> ", 4) == 0) + { + crlf = 0; + out += 4; + n -= 4; + } if (*inptr != 0) { printf("Unconsumed input: %s", inptr); - printf(" About to send: %s\n", outbuffer); + printf(" About to send: %s\n", out); exit(78); } @@ -1037,10 +753,10 @@ int rc; /* Shutdown TLS */ - if (strcmp(CS outbuffer, "stoptls") == 0 || - strcmp(CS outbuffer, "STOPTLS") == 0) + if (strcmp(CS out, "stoptls") == 0 || + strcmp(CS out, "STOPTLS") == 0) { - if (!tls_active) + if (!srv->tls_active) { printf("STOPTLS read when TLS not active\n"); exit(77); @@ -1048,8 +764,8 @@ int rc; printf("Shutting down TLS encryption\n"); #ifdef HAVE_OPENSSL - SSL_shutdown(ssl); - SSL_free(ssl); + SSL_shutdown(srv->ssl); + SSL_free(srv->ssl); #endif #ifdef HAVE_GNUTLS @@ -1059,56 +775,45 @@ int rc; gnutls_global_deinit(); #endif - tls_active = 0; + srv->tls_active = 0; continue; } /* Remember that we sent STARTTLS */ - sent_starttls = (strcmp(CS outbuffer, "starttls") == 0 || - strcmp(CS outbuffer, "STARTTLS") == 0); + srv->sent_starttls = (strcmp(CS out, "starttls") == 0 || + strcmp(CS out, "STARTTLS") == 0); /* Fudge: if the command is "starttls_wait", we send the starttls bit, but we haven't set the flag, so that there is no negotiation. This is for testing the server's timeout. */ - if (strcmp(CS outbuffer, "starttls_wait") == 0) + if (strcmp(CS out, "starttls_wait") == 0) { - outbuffer[8] = 0; + out[8] = 0; n = 8; } #endif - printf(">>> %s\n", outbuffer); - strcpy(CS outbuffer + n, "\r\n"); - - /* Turn "\n" and "\r" into the relevant characters. This is a hack. */ - - while ((escape = US strstr(CS outbuffer, "\\r")) != NULL) + printf(">>> %s\n", out); + if (crlf) { - *escape = '\r'; - memmove(escape + 1, escape + 2, (n + 2) - (escape - outbuffer) - 2); - n--; + strcpy(CS out + n, "\r\n"); + n += 2; } - while ((escape = US strstr(CS outbuffer, "\\n")) != NULL) - { - *escape = '\n'; - memmove(escape + 1, escape + 2, (n + 2) - (escape - outbuffer) - 2); - n--; - } + n = unescape_buf(out, n); /* OK, do it */ alarm(timeout); - if (tls_active) + if (srv->tls_active) { #ifdef HAVE_OPENSSL - rc = SSL_write (ssl, outbuffer, n + 2); + rc = SSL_write (srv->ssl, out, n); #endif #ifdef HAVE_GNUTLS - rc = gnutls_record_send(tls_session, CS outbuffer, n + 2); - if (rc < 0) + if ((rc = gnutls_record_send(tls_session, CS out, n)) < 0) { printf("GnuTLS write error: %s\n", gnutls_strerror(rc)); exit(76); @@ -1116,9 +821,7 @@ int rc; #endif } else - { - rc = write(sock, outbuffer, n + 2); - } + rc = write(srv->sock, out, n); alarm(0); if (rc < 0) @@ -1128,11 +831,396 @@ int rc; } } } +} + + + + +/************************************************* +* Main Program * +*************************************************/ + +const char * const HELP_MESSAGE = "\n\ +Usage: client\n" +#ifdef HAVE_TLS +"\ + [-tls-on-connect]\n\ + [-ocsp]\n" +# ifdef HAVE_GNUTLS +"\ + [-p priority-string]\n" +# endif +#endif +"\ + [-tn] n seconds timeout\n\ + \n\ + \n\ + []\n\ + []\n\ + []\n\ +\n"; + +int +main(int argc, char **argv) +{ +struct sockaddr *s_ptr; +struct sockaddr_in s_in4; +char *interface = NULL; +char *address = NULL; +char *certfile = NULL; +char *keyfile = NULL; +char *end = NULL; +int argi = 1; +int host_af, port, s_len, rc, save_errno; +int timeout = 5; +int tls_on_connect = 0; +long tmplong; + +#if HAVE_IPV6 +struct sockaddr_in6 s_in6; +#endif + +srv_ctx srv; + +unsigned char inbuffer[10240]; +unsigned char *inptr = inbuffer; + +*inptr = 0; /* Buffer empty */ +srv.tls_active = 0; +srv.sent_starttls = 0; + +/* Options */ + +while (argc >= argi + 1 && argv[argi][0] == '-') + { + if (strcmp(argv[argi], "-help") == 0 || + strcmp(argv[argi], "--help") == 0 || + strcmp(argv[argi], "-h") == 0) + { + puts(HELP_MESSAGE); + exit(0); + } + if (strcmp(argv[argi], "-tls-on-connect") == 0) + { + tls_on_connect = 1; + argi++; + } +#ifdef HAVE_TLS + else if (strcmp(argv[argi], "-ocsp") == 0) + { + if (argc < ++argi + 1) + { + fprintf(stderr, "Missing required certificate file for ocsp option\n"); + exit(96); + } + ocsp_stapling = argv[argi++]; + } +# ifdef HAVE_GNUTLS + else if (strcmp(argv[argi], "-p") == 0) + { + if (argc < ++argi + 1) + { + fprintf(stderr, "Missing priority string\n"); + exit(96); + } + pri_string = argv[argi++]; + } +#endif + +#endif + else if (argv[argi][1] == 't' && isdigit(argv[argi][2])) + { + tmplong = strtol(argv[argi]+2, &end, 10); + if (end == argv[argi]+2 || *end) + { + fprintf(stderr, "Failed to parse seconds from option <%s>\n", + argv[argi]); + exit(95); + } + if (tmplong > 10000L) + { + fprintf(stderr, "Unreasonably long wait of %ld seconds requested\n", + tmplong); + exit(94); + } + if (tmplong < 0L) + { + fprintf(stderr, "Timeout must not be negative (%ld)\n", tmplong); + exit(93); + } + timeout = (int) tmplong; + argi++; + } + else + { + fprintf(stderr, "Unrecognized option %s\n", argv[argi]); + exit(92); + } + } + +/* Mandatory 1st arg is IP address */ + +if (argc < argi+1) + { + fprintf(stderr, "No IP address given\n"); + exit(91); + } + +address = argv[argi++]; +host_af = (strchr(address, ':') != NULL)? AF_INET6 : AF_INET; + +/* Mandatory 2nd arg is port */ + +if (argc < argi+1) + { + fprintf(stderr, "No port number given\n"); + exit(90); + } + +port = atoi(argv[argi++]); + +/* Optional next arg is interface */ + +if (argc > argi && + (isdigit((unsigned char)argv[argi][0]) || argv[argi][0] == ':')) + interface = argv[argi++]; + +/* Any more arguments are the name of a certificate file and key file */ + +if (argc > argi) certfile = argv[argi++]; +if (argc > argi) keyfile = argv[argi++]; + + +#if HAVE_IPV6 +/* For an IPv6 address, use an IPv6 sockaddr structure. */ + +if (host_af == AF_INET6) + { + s_ptr = (struct sockaddr *)&s_in6; + s_len = sizeof(s_in6); + } +else +#endif + +/* For an IPv4 address, use an IPv4 sockaddr structure, +even on an IPv6 system. */ + + { + s_ptr = (struct sockaddr *)&s_in4; + s_len = sizeof(s_in4); + } + +printf("Connecting to %s port %d ... ", address, port); + +srv.sock = socket(host_af, SOCK_STREAM, 0); +if (srv.sock < 0) + { + printf("socket creation failed: %s\n", strerror(errno)); + exit(89); + } + +/* Bind to a specific interface if requested. On an IPv6 system, this has +to be of the same family as the address we are calling. On an IPv4 system the +test is redundant, but it keeps the code tidier. */ + +if (interface != NULL) + { + int interface_af = (strchr(interface, ':') != NULL)? AF_INET6 : AF_INET; + + if (interface_af == host_af) + { + #if HAVE_IPV6 + + /* Set up for IPv6 binding */ + + if (host_af == AF_INET6) + { + memset(&s_in6, 0, sizeof(s_in6)); + s_in6.sin6_family = AF_INET6; + s_in6.sin6_port = 0; + if (inet_pton(AF_INET6, interface, &s_in6.sin6_addr) != 1) + { + printf("Unable to parse \"%s\"", interface); + exit(88); + } + } + else + #endif + + /* Set up for IPv4 binding */ + + { + memset(&s_in4, 0, sizeof(s_in4)); + s_in4.sin_family = AF_INET; + s_in4.sin_port = 0; + s_in4.sin_addr.s_addr = (S_ADDR_TYPE)inet_addr(interface); + } + + /* Bind */ + + if (bind(srv.sock, s_ptr, s_len) < 0) + { + printf("Unable to bind outgoing SMTP call to %s: %s", + interface, strerror(errno)); + exit(87); + } + } + } + +/* Set up a remote IPv6 address */ + +#if HAVE_IPV6 +if (host_af == AF_INET6) + { + memset(&s_in6, 0, sizeof(s_in6)); + s_in6.sin6_family = AF_INET6; + s_in6.sin6_port = htons(port); + if (inet_pton(host_af, address, &s_in6.sin6_addr) != 1) + { + printf("Unable to parse \"%s\"", address); + exit(86); + } + } +else +#endif + +/* Set up a remote IPv4 address */ + + { + memset(&s_in4, 0, sizeof(s_in4)); + s_in4.sin_family = AF_INET; + s_in4.sin_port = htons(port); + s_in4.sin_addr.s_addr = (S_ADDR_TYPE)inet_addr(address); + } + +/* SIGALRM handler crashes out */ + +signal(SIGALRM, sigalrm_handler_crash); +alarm(timeout); +rc = connect(srv.sock, s_ptr, s_len); +save_errno = errno; +alarm(0); + +/* A failure whose error code is "Interrupted system call" is in fact +an externally applied timeout if the signal handler has been run. */ + +if (rc < 0) + { + close(srv.sock); + printf("connect failed: %s\n", strerror(save_errno)); + exit(85); + } + +printf("connected\n"); + + +/* --------------- Set up for OpenSSL --------------- */ + +#ifdef HAVE_OPENSSL +SSL_library_init(); +SSL_load_error_strings(); + +if (!(srv.ctx = SSL_CTX_new(SSLv23_method()))) + { + printf ("SSL_CTX_new failed\n"); + exit(84); + } + +if (certfile) + { + if (!SSL_CTX_use_certificate_file(srv.ctx, certfile, SSL_FILETYPE_PEM)) + { + printf("SSL_CTX_use_certificate_file failed\n"); + exit(83); + } + printf("Certificate file = %s\n", certfile); + } + +if (keyfile) + { + if (!SSL_CTX_use_PrivateKey_file(srv.ctx, keyfile, SSL_FILETYPE_PEM)) + { + printf("SSL_CTX_use_PrivateKey_file failed\n"); + exit(82); + } + printf("Key file = %s\n", keyfile); + } + +SSL_CTX_set_session_cache_mode(srv.ctx, SSL_SESS_CACHE_BOTH); +SSL_CTX_set_timeout(srv.ctx, 200); +SSL_CTX_set_info_callback(srv.ctx, (void (*)())info_callback); +#endif + + +/* --------------- Set up for GnuTLS --------------- */ + +#ifdef HAVE_GNUTLS +if (certfile != NULL) printf("Certificate file = %s\n", certfile); +if (keyfile != NULL) printf("Key file = %s\n", keyfile); +tls_init(certfile, keyfile); +tls_session = tls_session_init(); +#ifdef HAVE_OCSP +if (ocsp_stapling) + gnutls_ocsp_status_request_enable_client(tls_session, NULL, 0, NULL); +#endif +gnutls_transport_set_ptr(tls_session, (gnutls_transport_ptr_t)(intptr_t)srv.sock); + +/* When the server asks for a certificate and the client does not have one, +there is a SIGPIPE error in the gnutls_handshake() function for some reason +that is not understood. As luck would have it, this has never hit Exim itself +because it ignores SIGPIPE errors. Doing the same here allows it all to work as +one wants. */ + +signal(SIGPIPE, SIG_IGN); +#endif + +/* ---------------------------------------------- */ + + +/* Start TLS session if configured to do so without STARTTLS */ + +#ifdef HAVE_TLS +if (tls_on_connect) + { + printf("Attempting to start TLS\n"); + +#ifdef HAVE_OPENSSL + srv.tls_active = tls_start(srv.sock, &srv.ssl, srv.ctx); +#endif + +#ifdef HAVE_GNUTLS + { + int rc; + sigalrm_seen = FALSE; + alarm(timeout); + do { + rc = gnutls_handshake(tls_session); + } while (rc < 0 && gnutls_error_is_fatal(rc) == 0); + srv.tls_active = rc >= 0; + alarm(0); + + if (!srv.tls_active) printf("%s\n", gnutls_strerror(rc)); + } +#endif + + if (!srv.tls_active) + printf("Failed to start TLS\n"); +#if defined(HAVE_GNUTLS) && defined(HAVE_OCSP) + else if ( ocsp_stapling + && gnutls_ocsp_status_request_is_checked(tls_session, 0) == 0) + printf("Failed to verify certificate status\n"); +#endif + else + printf("Succeeded in starting TLS\n"); + } +#endif + +do_file(&srv, stdin, timeout, inbuffer, sizeof(inbuffer), inptr); printf("End of script\n"); -shutdown(sock, SHUT_WR); -while ((rc = read(sock, inbuffer, sizeof(inbuffer))) > 0) ; -close(sock); +shutdown(srv.sock, SHUT_WR); +while (read(srv.sock, inbuffer, sizeof(inbuffer)) > 0) ; +close(srv.sock); exit(0); }