[PD1] crypto changes and TLS almost done
This commit is contained in:
parent
2c4f1fd2fc
commit
5ae7358a0d
13 changed files with 138 additions and 87 deletions
BIN
Projs/PD1/certs/CLI1.p12
Normal file
BIN
Projs/PD1/certs/CLI1.p12
Normal file
Binary file not shown.
BIN
Projs/PD1/certs/serverdata.p12
Normal file
BIN
Projs/PD1/certs/serverdata.p12
Normal file
Binary file not shown.
|
@ -5,7 +5,6 @@ import (
|
||||||
"PD1/internal/utils/cryptoUtils"
|
"PD1/internal/utils/cryptoUtils"
|
||||||
"PD1/internal/utils/networking"
|
"PD1/internal/utils/networking"
|
||||||
"flag"
|
"flag"
|
||||||
"fmt"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func Run() {
|
func Run() {
|
||||||
|
@ -16,6 +15,9 @@ func Run() {
|
||||||
if flag.NArg() == 0 {
|
if flag.NArg() == 0 {
|
||||||
panic("No command provided. Use 'help' for instructions.")
|
panic("No command provided. Use 'help' for instructions.")
|
||||||
}
|
}
|
||||||
|
//Get user KeyStore
|
||||||
|
password := AskUserPassword()
|
||||||
|
clientKeyStore := cryptoUtils.LoadKeyStore(userFile, password)
|
||||||
|
|
||||||
command := flag.Arg(0)
|
command := flag.Arg(0)
|
||||||
switch command {
|
switch command {
|
||||||
|
@ -24,44 +26,41 @@ func Run() {
|
||||||
panic("Insufficient arguments for 'send' command. Usage: send <UID> <SUBJECT>")
|
panic("Insufficient arguments for 'send' command. Usage: send <UID> <SUBJECT>")
|
||||||
}
|
}
|
||||||
uid := flag.Arg(1)
|
uid := flag.Arg(1)
|
||||||
subject := flag.Arg(2)
|
//subject := flag.Arg(2)
|
||||||
messageContent := readMessageContent()
|
//messageContent := readMessageContent()
|
||||||
|
|
||||||
clientCert := cryptoUtils.LoadKeyStore("userdata.p12")
|
cl := networking.NewClient[protocol.Packet](&clientKeyStore)
|
||||||
|
defer cl.Connection.Conn.Close()
|
||||||
|
|
||||||
cl := networking.NewClient[protocol.Packet](clientCert)
|
certRequestPacket := protocol.NewRequestUserCertPacket(uid)
|
||||||
defer cl.Connection.Conn.Close()
|
cl.Connection.Send(certRequestPacket)
|
||||||
|
//certPacket := cl.Connection.Receive()
|
||||||
|
|
||||||
|
// TODO: Encrypt message
|
||||||
certRequestPacket := protocol.NewRequestUserCertPacket(uid)
|
//submitMessage(cl, uid, cipherContent)
|
||||||
cl.Connection.Send(certRequestPacket)
|
|
||||||
certPacket := cl.Connection.Receive()
|
|
||||||
|
|
||||||
// TODO: Encrypt message
|
|
||||||
submitMessage(cl,uid,cipherContent)
|
|
||||||
|
|
||||||
case "askqueue":
|
case "askqueue":
|
||||||
cl := networking.NewClient[protocol.Packet]()
|
cl := networking.NewClient[protocol.Packet](&clientKeyStore)
|
||||||
defer cl.Connection.Conn.Close()
|
defer cl.Connection.Conn.Close()
|
||||||
|
|
||||||
case "getmsg":
|
case "getmsg":
|
||||||
if flag.NArg() < 2 {
|
if flag.NArg() < 2 {
|
||||||
panic("Insufficient arguments for 'getmsg' command. Usage: getmsg <NUM>")
|
panic("Insufficient arguments for 'getmsg' command. Usage: getmsg <NUM>")
|
||||||
}
|
}
|
||||||
num := flag.Arg(1)
|
//num := flag.Arg(1)
|
||||||
cl := networking.NewClient[protocol.Packet]()
|
cl := networking.NewClient[protocol.Packet](&clientKeyStore)
|
||||||
defer cl.Connection.Conn.Close()
|
defer cl.Connection.Conn.Close()
|
||||||
|
|
||||||
case "help":
|
case "help":
|
||||||
showHelp()
|
showHelp()
|
||||||
|
|
||||||
default:
|
default:
|
||||||
commandError()
|
commandError()
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func submitMessage(cl networking.Client[protocol.Packet],uid string, content []byte) {
|
func submitMessage(cl networking.Client[protocol.Packet], uid string, content []byte) {
|
||||||
pack := protocol.NewSubmitMessage(uid,content)
|
pack := protocol.NewSubmitMessagePacket(uid, content)
|
||||||
cl.Connection.Send(pack)
|
cl.Connection.Send(pack)
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,11 +14,8 @@ func readMessageContent() string {
|
||||||
return scanner.Text()
|
return scanner.Text()
|
||||||
}
|
}
|
||||||
|
|
||||||
//FIX: Why is this function in the client if it's called by crypto?
|
|
||||||
// It should be called by the client and the result
|
|
||||||
// should then be passed into the crypto library
|
|
||||||
func AskUserPassword() string {
|
func AskUserPassword() string {
|
||||||
fmt.Println("Enter message content (limited to 1000 bytes):")
|
fmt.Println("Enter key store password")
|
||||||
scanner := bufio.NewScanner(os.Stdin)
|
scanner := bufio.NewScanner(os.Stdin)
|
||||||
scanner.Scan()
|
scanner.Scan()
|
||||||
// FIX: make sure this doesnt die
|
// FIX: make sure this doesnt die
|
||||||
|
|
|
@ -103,9 +103,9 @@ type ServerMessagePacket struct {
|
||||||
Timestamp time.Time
|
Timestamp time.Time
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewMessagePacket(fromUID, toUID string, content []byte, timestamp time.Time) Packet {
|
func NewServerMessagePacket(fromUID, toUID string, content []byte, timestamp time.Time) Packet {
|
||||||
return Packet{
|
return Packet{
|
||||||
Flag: Msg,
|
Flag: ServerMsgPkt,
|
||||||
Body: ServerMessagePacket{
|
Body: ServerMessagePacket{
|
||||||
FromUID: fromUID,
|
FromUID: fromUID,
|
||||||
ToUID: toUID,
|
ToUID: toUID,
|
||||||
|
|
|
@ -115,7 +115,7 @@ func (ds DataStore) GetAllMessages(toUID string) []protocol.Packet {
|
||||||
if err := rows.Scan(&fromUID, &toUID, &content, ×tamp); err != nil {
|
if err := rows.Scan(&fromUID, &toUID, &content, ×tamp); err != nil {
|
||||||
log.Panicln("Failed to scan row:", err)
|
log.Panicln("Failed to scan row:", err)
|
||||||
}
|
}
|
||||||
message := protocol.NewMessagePacket(fromUID, toUID, content, timestamp)
|
message := protocol.NewServerMessagePacket(fromUID, toUID, content, timestamp)
|
||||||
messagePackets = append(messagePackets, message)
|
messagePackets = append(messagePackets, message)
|
||||||
}
|
}
|
||||||
if err := rows.Err(); err != nil {
|
if err := rows.Err(); err != nil {
|
||||||
|
|
15
Projs/PD1/internal/server/interface.go
Normal file
15
Projs/PD1/internal/server/interface.go
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
func AskServerPassword() string {
|
||||||
|
fmt.Println("Enter key store password")
|
||||||
|
scanner := bufio.NewScanner(os.Stdin)
|
||||||
|
scanner.Scan()
|
||||||
|
// FIX: make sure this doesnt die
|
||||||
|
return scanner.Text()
|
||||||
|
}
|
|
@ -10,15 +10,17 @@ import (
|
||||||
func clientHandler(connection networking.Connection[protocol.Packet], dataStore DataStore) {
|
func clientHandler(connection networking.Connection[protocol.Packet], dataStore DataStore) {
|
||||||
defer connection.Conn.Close()
|
defer connection.Conn.Close()
|
||||||
|
|
||||||
// FIX: GET THE UID FROM THE USER CERTIFICATE FROM THE TLS SESSION
|
clientCert := connection.GetPeerCertificate()
|
||||||
uid := "0"
|
oidValueMap := cryptoUtils.ExtractAllOIDValues(clientCert)
|
||||||
|
fmt.Println(oidValueMap)
|
||||||
|
|
||||||
|
|
||||||
for {
|
for {
|
||||||
pac := connection.Receive()
|
pac := connection.Receive()
|
||||||
switch pac.Flag {
|
switch pac.Flag {
|
||||||
case protocol.ReqUserCertPkt:
|
case protocol.ReqUserCertPkt:
|
||||||
userCertPacket := dataStore.GetUserCertificate(uid)
|
//userCertPacket := dataStore.GetUserCertificate(uid)
|
||||||
connection.Send(userCertPacket)
|
//connection.Send(userCertPacket)
|
||||||
case protocol.ReqAllMsgPkt:
|
case protocol.ReqAllMsgPkt:
|
||||||
fmt.Println("ReqAllMsg")
|
fmt.Println("ReqAllMsg")
|
||||||
case protocol.ReqMsgPkt:
|
case protocol.ReqMsgPkt:
|
||||||
|
@ -35,13 +37,14 @@ func Run(port int) {
|
||||||
dataStore := OpenDB()
|
dataStore := OpenDB()
|
||||||
defer dataStore.db.Close()
|
defer dataStore.db.Close()
|
||||||
|
|
||||||
//TODO: Get the server's keystore path instead of hardcoding it
|
//FIX: Get the server's keystore path instead of hardcoding it
|
||||||
|
|
||||||
//Read server keystore
|
//Read server keystore
|
||||||
serverKeyStore := cryptoUtils.LoadKeyStore("serverdata.p12")
|
password := AskServerPassword()
|
||||||
|
serverKeyStore := cryptoUtils.LoadKeyStore("certs/serverdata.p12",password)
|
||||||
|
|
||||||
//Create server listener
|
//Create server listener
|
||||||
server := networking.NewServer[protocol.Packet](serverKeyStore,port)
|
server := networking.NewServer[protocol.Packet](&serverKeyStore,port)
|
||||||
go server.ListenLoop()
|
go server.ListenLoop()
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
|
|
@ -1,7 +1,6 @@
|
||||||
package cryptoUtils
|
package cryptoUtils
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"PD1/internal/client"
|
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
|
@ -15,7 +14,7 @@ import (
|
||||||
type KeyStore struct {
|
type KeyStore struct {
|
||||||
cert *x509.Certificate
|
cert *x509.Certificate
|
||||||
caCertChain []*x509.Certificate
|
caCertChain []*x509.Certificate
|
||||||
privKey rsa.PrivateKey
|
privKey *rsa.PrivateKey
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k KeyStore) GetCert() *x509.Certificate {
|
func (k KeyStore) GetCert() *x509.Certificate {
|
||||||
|
@ -26,67 +25,90 @@ func (k KeyStore) GetCACertChain() []*x509.Certificate {
|
||||||
return k.caCertChain
|
return k.caCertChain
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k KeyStore) GetPrivKey() rsa.PrivateKey {
|
func (k KeyStore) GetPrivKey() *rsa.PrivateKey {
|
||||||
return k.privKey
|
return k.privKey
|
||||||
}
|
}
|
||||||
|
|
||||||
func LoadKeyStore(keyStorePath string) KeyStore {
|
func ExtractAllOIDValues(cert *x509.Certificate) map[string]string {
|
||||||
|
oidValueMap := make(map[string]string)
|
||||||
|
for _, name := range cert.Subject.Names {
|
||||||
|
oid := name.Type.String()
|
||||||
|
value := name.Value.(string)
|
||||||
|
oidValueMap[oid] = value
|
||||||
|
}
|
||||||
|
return oidValueMap
|
||||||
|
}
|
||||||
|
|
||||||
var privKey rsa.PrivateKey
|
func LoadKeyStore(keyStorePath string, password string) KeyStore {
|
||||||
|
|
||||||
|
var privKey *rsa.PrivateKey
|
||||||
|
|
||||||
certFile, err := os.ReadFile(keyStorePath)
|
certFile, err := os.ReadFile(keyStorePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("Provided certificate %v couldn't be opened", keyStorePath)
|
log.Panicln("Provided certificate couldn't be opened")
|
||||||
}
|
}
|
||||||
|
|
||||||
password := client.AskUserPassword()
|
|
||||||
privKeyInterface, cert, caCerts, err := pkcs12.DecodeChain(certFile, password)
|
privKeyInterface, cert, caCerts, err := pkcs12.DecodeChain(certFile, password)
|
||||||
privKey = privKeyInterface.(rsa.PrivateKey)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("PKCS12 key store couldn't be decoded")
|
log.Panicln("PKCS12 key store couldn't be decoded")
|
||||||
}
|
}
|
||||||
|
privKey, ok := privKeyInterface.(*rsa.PrivateKey)
|
||||||
|
if !ok {
|
||||||
|
log.Panicln("Failed to convert private key to RSA private key")
|
||||||
|
}
|
||||||
|
|
||||||
if err := privKey.Validate(); err != nil {
|
if err := privKey.Validate(); err != nil {
|
||||||
log.Panicln("Private key is not valid")
|
log.Panicln("Private key is not valid")
|
||||||
}
|
}
|
||||||
return KeyStore{cert: cert, caCertChain: caCerts, privKey: privKey}
|
return KeyStore{cert: cert, caCertChain: caCerts, privKey: privKey}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k KeyStore)GetTLSConfig() *tls.Config {
|
func (k *KeyStore) GetTLSConfig() *tls.Config {
|
||||||
certificate ,err := tls.X509KeyPair(k.cert.Raw, pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(&k.privKey)}))
|
|
||||||
if err!=nil{
|
|
||||||
log.Panicln("Could not load certificate and privkey to TLS")
|
|
||||||
}
|
|
||||||
|
|
||||||
//Add the CA certificate chain to a CertPool
|
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: k.cert.Raw})
|
||||||
caCertPool := x509.NewCertPool()
|
privKeyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(k.privKey)})
|
||||||
|
certificate, err := tls.X509KeyPair(certPEM, privKeyPEM)
|
||||||
|
if err != nil {
|
||||||
|
log.Panicln("Could not load certificate and privkey to TLS", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
config := &tls.Config{
|
||||||
|
Certificates: []tls.Certificate{certificate},
|
||||||
|
}
|
||||||
|
return config
|
||||||
|
}
|
||||||
|
|
||||||
|
func (k *KeyStore) GetTLSConfigServer() *tls.Config {
|
||||||
|
config := k.GetTLSConfig()
|
||||||
|
|
||||||
|
//Add the CA certificate chain to a CertPool
|
||||||
|
caCertPool := x509.NewCertPool()
|
||||||
for _, caCert := range k.caCertChain {
|
for _, caCert := range k.caCertChain {
|
||||||
caCertPool.AddCert(caCert)
|
caCertPool.AddCert(caCert)
|
||||||
}
|
}
|
||||||
|
config.ClientCAs = caCertPool
|
||||||
config := &tls.Config{
|
|
||||||
Certificates: []tls.Certificate{certificate},
|
|
||||||
ClientCAs: caCertPool,
|
|
||||||
}
|
|
||||||
return config
|
|
||||||
}
|
|
||||||
|
|
||||||
func (k KeyStore)GetTLSConfigServer() *tls.Config {
|
|
||||||
config := k.GetTLSConfig()
|
|
||||||
|
|
||||||
config.ClientAuth = tls.RequireAndVerifyClientCert
|
config.ClientAuth = tls.RequireAndVerifyClientCert
|
||||||
|
|
||||||
return config
|
return config
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k KeyStore)GetTLSConfigClient() *tls.Config {
|
func (k *KeyStore) GetTLSConfigClient() *tls.Config {
|
||||||
config:= k.GetTLSConfig()
|
config := k.GetTLSConfig()
|
||||||
|
|
||||||
config.ServerName = "SERVER"
|
//Add the CA certificate chain to a CertPool
|
||||||
|
caCertPool := x509.NewCertPool()
|
||||||
|
for _, caCert := range k.caCertChain {
|
||||||
|
caCertPool.AddCert(caCert)
|
||||||
|
}
|
||||||
|
config.RootCAs = caCertPool
|
||||||
|
|
||||||
|
//TODO: FIX THE VERIFICATION OF THE SERVER
|
||||||
|
//config.ServerName = "SERVER"
|
||||||
|
|
||||||
return config
|
return config
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k KeyStore)EncryptMessageContent(peerPubKey rsa.PublicKey, content []byte) []byte {
|
func (k KeyStore) EncryptMessageContent(peerPubKey rsa.PublicKey, content []byte) []byte {
|
||||||
// Digital envolope
|
// Digital envolope
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,7 @@ package networking
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"net"
|
"log"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ type Client[T any] struct {
|
||||||
func NewClient[T any](clientTLSConfigProvider ClientTLSConfigProvider) Client[T] {
|
func NewClient[T any](clientTLSConfigProvider ClientTLSConfigProvider) Client[T] {
|
||||||
dialConn, err := tls.Dial("tcp", "localhost:8080", clientTLSConfigProvider.GetTLSConfigClient())
|
dialConn, err := tls.Dial("tcp", "localhost:8080", clientTLSConfigProvider.GetTLSConfigClient())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic("Could not open connection to server")
|
log.Panicln("Could not open connection to server",err)
|
||||||
}
|
}
|
||||||
conn := NewConnection[T](dialConn)
|
conn := NewConnection[T](dialConn)
|
||||||
return Client[T]{Connection: conn}
|
return Client[T]{Connection: conn}
|
||||||
|
|
|
@ -1,18 +1,18 @@
|
||||||
package networking
|
package networking
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"net"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type Connection[T any] struct {
|
type Connection[T any] struct {
|
||||||
Conn net.Conn
|
Conn *tls.Conn
|
||||||
encoder *json.Encoder
|
encoder *json.Encoder
|
||||||
decoder *json.Decoder
|
decoder *json.Decoder
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func NewConnection[T any](netConn *tls.Conn) Connection[T] {
|
||||||
func NewConnection[T any](netConn net.Conn) Connection[T] {
|
|
||||||
return Connection[T]{
|
return Connection[T]{
|
||||||
Conn: netConn,
|
Conn: netConn,
|
||||||
encoder: json.NewEncoder(netConn),
|
encoder: json.NewEncoder(netConn),
|
||||||
|
@ -20,16 +20,21 @@ func NewConnection[T any](netConn net.Conn) Connection[T] {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (jc Connection[T]) Send(obj T) {
|
func (c Connection[T]) Send(obj T) {
|
||||||
if err := jc.encoder.Encode(&obj); err != nil {
|
if err := c.encoder.Encode(&obj); err != nil {
|
||||||
panic("Failed encoding data or sending it to connection")
|
panic("Failed encoding data or sending it to connection")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (jc Connection[T]) Receive() T {
|
func (c Connection[T]) Receive() T {
|
||||||
var obj T
|
var obj T
|
||||||
if err := jc.decoder.Decode(&obj); err != nil {
|
if err := c.decoder.Decode(&obj); err != nil {
|
||||||
panic("Failed decoding data or reading it from connection")
|
panic("Failed decoding data or reading it from connection")
|
||||||
}
|
}
|
||||||
return obj
|
return obj
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c Connection[T]) GetPeerCertificate() *x509.Certificate {
|
||||||
|
state := c.Conn.ConnectionState()
|
||||||
|
return state.PeerCertificates[0]
|
||||||
|
}
|
||||||
|
|
|
@ -3,11 +3,12 @@ package networking
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"log"
|
||||||
"net"
|
"net"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ServerTLSConfigProvider interface {
|
type ServerTLSConfigProvider interface {
|
||||||
GetServerTLSConfig() *tls.Config
|
GetTLSConfigServer() *tls.Config
|
||||||
}
|
}
|
||||||
|
|
||||||
type Server[T any] struct {
|
type Server[T any] struct {
|
||||||
|
@ -15,16 +16,16 @@ type Server[T any] struct {
|
||||||
C chan Connection[T]
|
C chan Connection[T]
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer[T any](serverTLSConfigProvider ServerTLSConfigProvider,port int) Server[T]{
|
func NewServer[T any](serverTLSConfigProvider ServerTLSConfigProvider, port int) Server[T] {
|
||||||
|
|
||||||
listener, err := tls.Listen("tcp", fmt.Sprintf("0.0.0.0:%d", port), serverTLSConfigProvider.GetServerTLSConfig())
|
listener, err := tls.Listen("tcp", fmt.Sprintf("0.0.0.0:%d", port), serverTLSConfigProvider.GetTLSConfigServer())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic("Server could not bind to address")
|
panic("Server could not bind to address")
|
||||||
}
|
}
|
||||||
return Server[T]{
|
return Server[T]{
|
||||||
listener:listener,
|
listener: listener,
|
||||||
C: make(chan Connection[T]),
|
C: make(chan Connection[T]),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server[T]) ListenLoop() {
|
func (s *Server[T]) ListenLoop() {
|
||||||
|
@ -34,7 +35,16 @@ func (s *Server[T]) ListenLoop() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic("Server could not accept connection")
|
panic("Server could not accept connection")
|
||||||
}
|
}
|
||||||
conn := NewConnection[T](listenerConn)
|
tlsConn, ok := listenerConn.(*tls.Conn)
|
||||||
|
if !ok {
|
||||||
|
panic("Connection is not a TLS connection")
|
||||||
|
}
|
||||||
|
|
||||||
|
state := tlsConn.ConnectionState()
|
||||||
|
if len(state.PeerCertificates) == 0 {
|
||||||
|
log.Panicln("Client did not provide a certificate")
|
||||||
|
}
|
||||||
|
conn := NewConnection[T](tlsConn)
|
||||||
s.C <- conn
|
s.C <- conn
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,4 +15,4 @@ cmd="go run ./cmd/server/server.go"
|
||||||
|
|
||||||
[targets.client]
|
[targets.client]
|
||||||
deps=["check"]
|
deps=["check"]
|
||||||
cmd="go run ./cmd/client/client.go"
|
cmd="go run ./cmd/client/client.go -user certs/CLI1.p12 send CLI1 testsubject"
|
||||||
|
|
Loading…
Add table
Reference in a new issue