2016-09-22 20:47:43 +02:00
/*
luksrku - Tool to remotely unlock LUKS disks using TLS .
Copyright ( C ) 2016 - 2016 Johannes Bauer
This file is part of luksrku .
luksrku is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; this program is ONLY licensed under
version 3 of the License , later versions are explicitly excluded .
luksrku is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with luksrku ; if not , write to the Free Software
Foundation , Inc . , 59 Temple Place , Suite 330 , Boston , MA 02111 - 1307 USA
Johannes Bauer < JohannesBauer @ gmx . de >
*/
2016-09-22 20:40:58 +02:00
# include <stdio.h>
# include <stdlib.h>
# include <string.h>
# include "openssl.h"
# include "log.h"
2019-10-23 11:34:40 +02:00
# include "pgmopts.h"
# include "editor.h"
# include "openssl.h"
2019-10-23 13:18:51 +02:00
# include "server.h"
2016-09-22 20:40:58 +02:00
2018-01-16 18:59:50 +01:00
# if OPENSSL_VERSION_NUMBER < 0x010100000
# error "luksrku requires at least OpenSSL v1.1 to work."
# endif
2019-10-23 11:34:40 +02:00
static int main_edit ( const struct pgmopts_edit_t * opts ) {
2019-10-23 13:18:51 +02:00
return editor_start ( opts ) ? 0 : 1 ;
2019-10-23 11:34:40 +02:00
}
static int main_server ( const struct pgmopts_server_t * opts ) {
2019-10-23 13:18:51 +02:00
return keyserver_start ( opts ) ? 0 : 1 ;
2019-10-23 11:34:40 +02:00
}
static int main_client ( const struct pgmopts_client_t * opts ) {
return 0 ;
}
2016-09-22 20:40:58 +02:00
int main ( int argc , char * * argv ) {
# ifdef DEBUG
fprintf ( stderr , " WARNING: This has been compiled in DEBUG mode and uses reduced security. \n " ) ;
# endif
2019-10-23 11:34:40 +02:00
parse_pgmopts_or_quit ( argc , argv ) ;
if ( ! openssl_init ( ) ) {
log_msg ( LLVL_FATAL , " Could not initialize OpenSSL. " ) ;
exit ( EXIT_FAILURE ) ;
}
switch ( pgmopts - > pgm ) {
case PGM_EDIT :
return main_edit ( & pgmopts - > edit ) ;
case PGM_SERVER :
return main_server ( & pgmopts - > server ) ;
case PGM_CLIENT :
return main_client ( & pgmopts - > client ) ;
}
return 0 ;
2016-09-22 20:40:58 +02:00
2019-10-23 09:39:40 +02:00
#if 0
2016-09-22 20:40:58 +02:00
struct options_t options ;
if ( ! parse_cmdline_arguments ( & options , argc , argv ) ) {
2016-09-24 11:16:58 +02:00
print_syntax ( argv [ 0 ] ) ;
2016-09-22 20:40:58 +02:00
exit ( EXIT_FAILURE ) ;
}
if ( options . verbose ) {
log_setlvl ( LLVL_DEBUG ) ;
}
struct keydb_t keydb ;
bool success = true ;
memset ( & keydb , 0 , sizeof ( keydb ) ) ;
do {
if ( ! read_binary_keyfile ( options . keydbfile , & keydb ) ) {
log_msg ( LLVL_FATAL , " Could not read key database file %s. " , options . keydbfile ) ;
success = false ;
break ;
}
log_msg ( LLVL_DEBUG , " Successfully loaded key database file %s with %d entries and %d disk keys. " , options . keydbfile , keydb . entrycnt , keydb_disk_key_count ( & keydb ) ) ;
# ifdef DEBUG
keydb_dump ( & keydb ) ;
# endif
2018-01-16 18:59:50 +01:00
2016-09-22 20:40:58 +02:00
if ( keydb . entrycnt = = 0 ) {
log_msg ( LLVL_FATAL , " Key database file %s contains no keys. " , options . keydbfile ) ;
success = false ;
break ;
}
if ( options . mode = = SERVER_MODE ) {
if ( keydb . entrycnt ! = 1 ) {
log_msg ( LLVL_FATAL , " Server configuration files need to have exactly one host entry. " ) ;
success = false ;
break ;
}
2018-01-16 18:59:50 +01:00
2016-09-22 20:40:58 +02:00
if ( keydb_disk_key_count ( & keydb ) ! = 0 ) {
log_msg ( LLVL_FATAL , " Server configuration files may not contain disk unlocking keys. " ) ;
success = false ;
break ;
}
2018-01-16 18:59:50 +01:00
2016-09-22 20:40:58 +02:00
if ( ! dtls_server ( keydb_getentry ( & keydb , 0 ) , & options ) ) {
2019-10-23 11:34:40 +02:00
log_msg ( LLVL_FATAL , " Failed to start TLS server. " ) ;
2016-09-22 20:40:58 +02:00
success = false ;
break ;
}
} else {
if ( ! dtls_client ( & keydb , & options ) ) {
2019-10-23 11:34:40 +02:00
log_msg ( LLVL_FATAL , " Failed to connect TLS client. " ) ;
2016-09-22 20:40:58 +02:00
success = false ;
break ;
}
}
} while ( false ) ;
2018-01-16 18:59:50 +01:00
2016-09-22 20:40:58 +02:00
keydb_free ( & keydb ) ;
if ( ! success ) {
exit ( EXIT_FAILURE ) ;
}
2019-10-23 09:39:40 +02:00
# endif
2016-09-22 20:40:58 +02:00
return 0 ;
}