forked from dlenski/openconnect
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverhash.c
69 lines (60 loc) · 1.89 KB
/
serverhash.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
/*
* OpenConnect (SSL + DTLS) VPN client
*
* Copyright © 2008-2016 Intel Corporation.
*
* Author: David Woodhouse <[email protected]>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* version 2.1, as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*/
#include <stdio.h>
#include <stdlib.h>
#include <stdarg.h>
/* Normally it's nice for header files to automatically include anything
* they need. But winsock is a horrid can of worms; we 're not going to
* make openconnect.h include anything for itself. So just do this... */
#ifdef _WIN32
#define SOCKET int
#endif
#include "../openconnect.h"
static void progress(void *privdata, int level, const char *fmt, ...)
{
va_list args;
if (level > PRG_ERR)
return;
va_start(args, fmt);
vfprintf(stderr, fmt, args);
va_end(args);
}
static int validate_peer_cert(void *_vpninfo, const char *reason)
{
printf("%s\n", openconnect_get_peer_cert_hash(_vpninfo));
exit(0);
}
/* We do this in a separate test tool because we *really* don't want
* people scripting it to recover the --no-cert-check functionality.
* Validate your server certs properly, people! */
int main(int argc, char **argv)
{
struct openconnect_info *vpninfo;
if (argc != 2) {
fprintf(stderr, "usage: serverhash <server>\n");
exit(1);
}
openconnect_init_ssl();
vpninfo = openconnect_vpninfo_new(NULL, validate_peer_cert, NULL, NULL, progress, NULL);
if (openconnect_parse_url(vpninfo, argv[1])) {
fprintf(stderr, "Failed to parse URL\n");
exit(1);
}
openconnect_set_system_trust(vpninfo, 0);
openconnect_obtain_cookie(vpninfo);
return -1;
}