{
fprintf(out, "usage:\n");
fprintf(out, " %s --connect <address> --port <port> [--key <key] [--cert <file>] [--cacert <file>]+ [--times <n>]\n", cmd);
- fprintf(out, " %s --listen <address> --port <port> --key <key> --cert <file> [--cacert <file>]+ [--times <n>]\n", cmd);
+ fprintf(out, " %s --listen <address> --port <port> --key <key> --cert <file> [--cacert <file>]+ [--auth-optional] [--times <n>]\n", cmd);
fprintf(out, "\n");
fprintf(out, "options:\n");
fprintf(out, " --help print help and exit\n");
fprintf(out, " --cert <file> certificate to authenticate itself\n");
fprintf(out, " --key <file> private key to authenticate itself\n");
fprintf(out, " --cacert <file> certificate to verify other peer\n");
+ fprintf(out, " --auth-optional don't enforce client authentication\n");
fprintf(out, " --times <n> specify the amount of repeated connection establishments\n");
fprintf(out, " --ipv4 use IPv4\n");
fprintf(out, " --ipv6 use IPv6\n");
*/
static int run_client(host_t *host, identification_t *server,
identification_t *client, int times, tls_cache_t *cache,
- tls_version_t min_version, tls_version_t max_version)
+ tls_version_t min_version, tls_version_t max_version,
+ tls_flag_t flags)
{
tls_socket_t *tls;
int fd, res;
return 1;
}
tls = tls_socket_create(FALSE, server, client, fd, cache, min_version,
- max_version, TLS_FLAG_ENCRYPTION_OPTIONAL);
+ max_version, flags);
if (!tls)
{
close(fd);
*/
static int serve(host_t *host, identification_t *server, identification_t *client,
int times, tls_cache_t *cache, tls_version_t min_version,
- tls_version_t max_version)
+ tls_version_t max_version, tls_flag_t flags)
{
tls_socket_t *tls;
int fd, cfd;
DBG1(DBG_TLS, "%#H connected", host);
tls = tls_socket_create(TRUE, server, client, cfd, cache, min_version,
- max_version, TLS_FLAG_ENCRYPTION_OPTIONAL);
+ max_version, flags);
if (!tls)
{
close(fd);
int port = 0, times = -1, res, family = AF_UNSPEC;
identification_t *server, *client = NULL;
tls_version_t min_version = TLS_SUPPORTED_MIN, max_version = TLS_SUPPORTED_MAX;
+ tls_flag_t flags = TLS_FLAG_ENCRYPTION_OPTIONAL;
tls_cache_t *cache;
host_t *host;
while (TRUE)
{
struct option long_opts[] = {
- {"help", no_argument, NULL, 'h' },
- {"connect", required_argument, NULL, 'c' },
- {"listen", required_argument, NULL, 'l' },
- {"port", required_argument, NULL, 'p' },
- {"cert", required_argument, NULL, 'x' },
- {"key", required_argument, NULL, 'k' },
- {"cacert", required_argument, NULL, 'f' },
- {"times", required_argument, NULL, 't' },
- {"ipv4", no_argument, NULL, '4' },
- {"ipv6", no_argument, NULL, '6' },
- {"min-version", required_argument, NULL, 'm' },
- {"max-version", required_argument, NULL, 'M' },
- {"version", required_argument, NULL, 'v' },
- {"debug", required_argument, NULL, 'd' },
+ {"help", no_argument, NULL, 'h' },
+ {"connect", required_argument, NULL, 'c' },
+ {"listen", required_argument, NULL, 'l' },
+ {"port", required_argument, NULL, 'p' },
+ {"cert", required_argument, NULL, 'x' },
+ {"key", required_argument, NULL, 'k' },
+ {"cacert", required_argument, NULL, 'f' },
+ {"times", required_argument, NULL, 't' },
+ {"ipv4", no_argument, NULL, '4' },
+ {"ipv6", no_argument, NULL, '6' },
+ {"min-version", required_argument, NULL, 'm' },
+ {"max-version", required_argument, NULL, 'M' },
+ {"version", required_argument, NULL, 'v' },
+ {"auth-optional", no_argument, NULL, 'n' },
+ {"debug", required_argument, NULL, 'd' },
{0,0,0,0 }
};
switch (getopt_long(argc, argv, "", long_opts, NULL))
}
max_version = min_version;
continue;
+ case 'n':
+ flags |= TLS_FLAG_CLIENT_AUTH_OPTIONAL;
+ continue;
default:
usage(stderr, argv[0]);
return 1;
cache = tls_cache_create(100, 30);
if (listen)
{
- res = serve(host, server, client, times, cache, min_version, max_version);
+ res = serve(host, server, client, times, cache, min_version,
+ max_version, flags);
}
else
{
DESTROY_IF(client);
client = find_client_id();
res = run_client(host, server, client, times, cache, min_version,
- max_version);
+ max_version, flags);
DESTROY_IF(client);
}
cache->destroy(cache);