2017-01-10 05:36:19 +00:00
|
|
|
/* Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. */
|
2015-06-05 13:58:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
2016-11-05 20:35:33 +00:00
|
|
|
#include <limits.h>
|
2015-06-05 13:58:00 +00:00
|
|
|
#include <ctype.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
#include "config.h"
|
2016-07-20 19:24:27 +00:00
|
|
|
#include "ipc.h"
|
2015-06-05 13:58:00 +00:00
|
|
|
#include "base64.h"
|
|
|
|
|
|
|
|
#define COMMENT_CHAR '#'
|
|
|
|
|
|
|
|
#define max(a, b) (a > b ? a : b)
|
|
|
|
|
|
|
|
static inline struct wgpeer *peer_from_offset(struct wgdevice *dev, size_t offset)
|
|
|
|
{
|
|
|
|
return (struct wgpeer *)((uint8_t *)dev + sizeof(struct wgdevice) + offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int use_space(struct inflatable_device *buf, size_t space)
|
|
|
|
{
|
|
|
|
size_t expand_to;
|
|
|
|
uint8_t *new_dev;
|
|
|
|
|
|
|
|
if (buf->len - buf->pos < space) {
|
|
|
|
expand_to = max(buf->len * 2, buf->len + space);
|
|
|
|
new_dev = realloc(buf->dev, expand_to + sizeof(struct wgdevice));
|
|
|
|
if (!new_dev)
|
|
|
|
return -errno;
|
|
|
|
memset(&new_dev[buf->len + sizeof(struct wgdevice)], 0, expand_to - buf->len);
|
|
|
|
buf->dev = (struct wgdevice *)new_dev;
|
|
|
|
buf->len = expand_to;
|
|
|
|
}
|
|
|
|
buf->pos += space;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *get_value(const char *line, const char *key)
|
|
|
|
{
|
|
|
|
size_t linelen = strlen(line);
|
|
|
|
size_t keylen = strlen(key);
|
|
|
|
|
|
|
|
if (keylen >= linelen)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (strncasecmp(line, key, keylen))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return line + keylen;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint16_t parse_port(const char *value)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
uint16_t port = 0;
|
|
|
|
struct addrinfo *resolved;
|
|
|
|
struct addrinfo hints = {
|
|
|
|
.ai_family = AF_UNSPEC,
|
|
|
|
.ai_socktype = SOCK_DGRAM,
|
|
|
|
.ai_protocol = IPPROTO_UDP,
|
|
|
|
.ai_flags = AI_ADDRCONFIG | AI_PASSIVE
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!strlen(value)) {
|
|
|
|
fprintf(stderr, "Unable to parse empty port\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = getaddrinfo(NULL, value, &hints, &resolved);
|
|
|
|
if (ret != 0) {
|
|
|
|
fprintf(stderr, "%s: `%s`\n", gai_strerror(ret), value);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (resolved->ai_family == AF_INET && resolved->ai_addrlen == sizeof(struct sockaddr_in))
|
|
|
|
port = ntohs(((struct sockaddr_in *)resolved->ai_addr)->sin_port);
|
|
|
|
else if (resolved->ai_family == AF_INET6 && resolved->ai_addrlen == sizeof(struct sockaddr_in6))
|
|
|
|
port = ntohs(((struct sockaddr_in6 *)resolved->ai_addr)->sin6_port);
|
|
|
|
else
|
|
|
|
fprintf(stderr, "Neither IPv4 nor IPv6 address found: `%s`\n", value);
|
|
|
|
|
|
|
|
freeaddrinfo(resolved);
|
|
|
|
return port;
|
|
|
|
}
|
|
|
|
|
2017-01-24 16:43:35 +00:00
|
|
|
static inline bool parse_fwmark(uint32_t *fwmark, unsigned int *flags, const char *value)
|
|
|
|
{
|
|
|
|
unsigned long ret;
|
|
|
|
char *end;
|
|
|
|
int base = 10;
|
|
|
|
|
|
|
|
if (value[0] == '0' && value[1] == 'x') {
|
|
|
|
value += 2;
|
|
|
|
base = 16;
|
|
|
|
}
|
|
|
|
ret = strtoul(value, &end, base);
|
|
|
|
if (!*value || *end || ret > UINT32_MAX)
|
|
|
|
return false;
|
|
|
|
*fwmark = ret;
|
|
|
|
if (!ret)
|
|
|
|
*flags |= WGDEVICE_REMOVE_FWMARK;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-07-27 09:30:05 +00:00
|
|
|
static inline bool parse_key(uint8_t key[static WG_KEY_LEN], const char *value)
|
2015-06-05 13:58:00 +00:00
|
|
|
{
|
|
|
|
uint8_t tmp[WG_KEY_LEN + 1];
|
2016-07-03 18:06:33 +00:00
|
|
|
if (strlen(value) != b64_len(WG_KEY_LEN) - 1 || b64_pton(value, tmp, WG_KEY_LEN + 1) != WG_KEY_LEN) {
|
|
|
|
fprintf(stderr, "Key is not the correct length or format: `%s`\n", value);
|
2015-06-05 13:58:00 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
memcpy(key, tmp, WG_KEY_LEN);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool parse_ip(struct wgipmask *ipmask, const char *value)
|
|
|
|
{
|
|
|
|
ipmask->family = AF_UNSPEC;
|
|
|
|
if (strchr(value, ':')) {
|
|
|
|
if (inet_pton(AF_INET6, value, &ipmask->ip6) == 1)
|
|
|
|
ipmask->family = AF_INET6;
|
|
|
|
} else {
|
|
|
|
if (inet_pton(AF_INET, value, &ipmask->ip4) == 1)
|
|
|
|
ipmask->family = AF_INET;
|
|
|
|
}
|
|
|
|
if (ipmask->family == AF_UNSPEC) {
|
|
|
|
fprintf(stderr, "Unable to parse IP address: `%s`\n", value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-01-10 04:52:06 +00:00
|
|
|
static inline bool parse_endpoint(struct sockaddr *endpoint, const char *value)
|
2015-06-05 13:58:00 +00:00
|
|
|
{
|
|
|
|
char *mutable = strdup(value);
|
|
|
|
char *begin, *end;
|
|
|
|
int ret;
|
|
|
|
struct addrinfo *resolved;
|
|
|
|
struct addrinfo hints = {
|
|
|
|
.ai_family = AF_UNSPEC,
|
|
|
|
.ai_socktype = SOCK_DGRAM,
|
2016-12-20 20:50:29 +00:00
|
|
|
.ai_protocol = IPPROTO_UDP
|
2015-06-05 13:58:00 +00:00
|
|
|
};
|
|
|
|
if (!strlen(value)) {
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "Unable to parse empty endpoint\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (mutable[0] == '[') {
|
|
|
|
begin = &mutable[1];
|
|
|
|
end = strchr(mutable, ']');
|
|
|
|
if (!end) {
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "Unable to find matching brace of endpoint: `%s`\n", value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*end = '\0';
|
|
|
|
++end;
|
|
|
|
if (*end != ':' || !*(end + 1)) {
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "Unable to find port of endpoint: `%s`\n", value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
++end;
|
|
|
|
} else {
|
|
|
|
begin = mutable;
|
|
|
|
end = strrchr(mutable, ':');
|
|
|
|
if (!end || !*(end + 1)) {
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "Unable to find port of endpoint: `%s`\n", value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*end = '\0';
|
|
|
|
++end;
|
|
|
|
}
|
|
|
|
ret = getaddrinfo(begin, end, &hints, &resolved);
|
|
|
|
if (ret != 0) {
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "%s: `%s`\n", gai_strerror(ret), value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if ((resolved->ai_family == AF_INET && resolved->ai_addrlen == sizeof(struct sockaddr_in)) ||
|
|
|
|
(resolved->ai_family == AF_INET6 && resolved->ai_addrlen == sizeof(struct sockaddr_in6)))
|
|
|
|
memcpy(endpoint, resolved->ai_addr, resolved->ai_addrlen);
|
|
|
|
else {
|
|
|
|
freeaddrinfo(resolved);
|
|
|
|
free(mutable);
|
|
|
|
fprintf(stderr, "Neither IPv4 nor IPv6 address found: `%s`\n", value);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
freeaddrinfo(resolved);
|
|
|
|
free(mutable);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-07-08 00:30:03 +00:00
|
|
|
static inline bool parse_persistent_keepalive(__u16 *interval, const char *value)
|
|
|
|
{
|
|
|
|
unsigned long ret;
|
|
|
|
char *end;
|
|
|
|
|
|
|
|
if (!strcasecmp(value, "off")) {
|
|
|
|
*interval = 0;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = strtoul(value, &end, 10);
|
2016-08-08 11:53:00 +00:00
|
|
|
if (!*value || *value == '-' || *end || ret > 65535) {
|
|
|
|
fprintf(stderr, "The persistent keepalive interval must be 0/off or 1-65535. Found: `%s`\n", value);
|
2016-07-08 00:30:03 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
*interval = (__u16)ret;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-05 13:58:00 +00:00
|
|
|
static inline bool parse_ipmasks(struct inflatable_device *buf, size_t peer_offset, const char *value)
|
|
|
|
{
|
|
|
|
struct wgpeer *peer;
|
|
|
|
struct wgipmask *ipmask;
|
|
|
|
char *mask, *mutable = strdup(value), *sep;
|
|
|
|
if (!mutable) {
|
|
|
|
perror("strdup");
|
|
|
|
return false;
|
|
|
|
};
|
|
|
|
peer = peer_from_offset(buf->dev, peer_offset);
|
2017-01-10 03:47:29 +00:00
|
|
|
peer->flags |= WGPEER_REPLACE_IPMASKS;
|
2015-06-05 13:58:00 +00:00
|
|
|
if (!strlen(value)) {
|
|
|
|
free(mutable);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
sep = mutable;
|
|
|
|
while ((mask = strsep(&sep, ","))) {
|
2016-11-05 20:35:33 +00:00
|
|
|
unsigned long cidr = ULONG_MAX;
|
2015-06-05 13:58:00 +00:00
|
|
|
char *end, *ip = strsep(&mask, "/");
|
|
|
|
if (use_space(buf, sizeof(struct wgipmask)) < 0) {
|
|
|
|
perror("use_space");
|
|
|
|
free(mutable);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
peer = peer_from_offset(buf->dev, peer_offset);
|
|
|
|
ipmask = (struct wgipmask *)((uint8_t *)peer + sizeof(struct wgpeer) + (sizeof(struct wgipmask) * peer->num_ipmasks));
|
|
|
|
|
|
|
|
if (!parse_ip(ipmask, ip)) {
|
|
|
|
free(mutable);
|
|
|
|
return false;
|
|
|
|
}
|
2016-11-05 20:35:33 +00:00
|
|
|
if (mask && *mask) {
|
|
|
|
cidr = strtoul(mask, &end, 10);
|
|
|
|
if (*end)
|
|
|
|
cidr = ULONG_MAX;
|
|
|
|
}
|
|
|
|
if (ipmask->family == AF_INET)
|
|
|
|
cidr = cidr > 32 ? 32 : cidr;
|
|
|
|
else if (ipmask->family == AF_INET6)
|
|
|
|
cidr = cidr > 128 ? 128 : cidr;
|
|
|
|
else
|
2015-06-05 13:58:00 +00:00
|
|
|
continue;
|
|
|
|
ipmask->cidr = cidr;
|
|
|
|
++peer->num_ipmasks;
|
|
|
|
}
|
|
|
|
free(mutable);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool process_line(struct config_ctx *ctx, const char *line)
|
|
|
|
{
|
|
|
|
const char *value;
|
|
|
|
bool ret = true;
|
|
|
|
|
|
|
|
if (!strcasecmp(line, "[Interface]")) {
|
|
|
|
ctx->is_peer_section = false;
|
|
|
|
ctx->is_device_section = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (!strcasecmp(line, "[Peer]")) {
|
|
|
|
ctx->peer_offset = ctx->buf.pos;
|
|
|
|
if (use_space(&ctx->buf, sizeof(struct wgpeer)) < 0) {
|
|
|
|
perror("use_space");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
++ctx->buf.dev->num_peers;
|
|
|
|
ctx->is_peer_section = true;
|
|
|
|
ctx->is_device_section = false;
|
2017-01-10 03:47:29 +00:00
|
|
|
peer_from_offset(ctx->buf.dev, ctx->peer_offset)->flags |= WGPEER_REPLACE_IPMASKS;
|
2016-07-08 00:30:03 +00:00
|
|
|
peer_from_offset(ctx->buf.dev, ctx->peer_offset)->persistent_keepalive_interval = (__u16)-1;
|
2015-06-05 13:58:00 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define key_match(key) (value = get_value(line, key "="))
|
|
|
|
|
|
|
|
if (ctx->is_device_section) {
|
|
|
|
if (key_match("ListenPort"))
|
|
|
|
ret = !!(ctx->buf.dev->port = parse_port(value));
|
2017-01-24 16:43:35 +00:00
|
|
|
else if (key_match("FwMark"))
|
|
|
|
ret = parse_fwmark(&ctx->buf.dev->fwmark, &ctx->buf.dev->flags, value);
|
2015-06-05 13:58:00 +00:00
|
|
|
else if (key_match("PrivateKey")) {
|
|
|
|
ret = parse_key(ctx->buf.dev->private_key, value);
|
|
|
|
if (!ret)
|
|
|
|
memset(ctx->buf.dev->private_key, 0, WG_KEY_LEN);
|
|
|
|
} else if (key_match("PresharedKey")) {
|
|
|
|
ret = parse_key(ctx->buf.dev->preshared_key, value);
|
|
|
|
if (!ret)
|
|
|
|
memset(ctx->buf.dev->preshared_key, 0, WG_KEY_LEN);
|
|
|
|
} else
|
|
|
|
goto error;
|
|
|
|
} else if (ctx->is_peer_section) {
|
|
|
|
if (key_match("Endpoint"))
|
2017-01-10 04:52:06 +00:00
|
|
|
ret = parse_endpoint(&peer_from_offset(ctx->buf.dev, ctx->peer_offset)->endpoint.addr, value);
|
2015-06-05 13:58:00 +00:00
|
|
|
else if (key_match("PublicKey"))
|
|
|
|
ret = parse_key(peer_from_offset(ctx->buf.dev, ctx->peer_offset)->public_key, value);
|
|
|
|
else if (key_match("AllowedIPs"))
|
|
|
|
ret = parse_ipmasks(&ctx->buf, ctx->peer_offset, value);
|
2016-07-08 00:30:03 +00:00
|
|
|
else if (key_match("PersistentKeepalive"))
|
|
|
|
ret = parse_persistent_keepalive(&peer_from_offset(ctx->buf.dev, ctx->peer_offset)->persistent_keepalive_interval, value);
|
2015-06-05 13:58:00 +00:00
|
|
|
else
|
|
|
|
goto error;
|
|
|
|
} else
|
|
|
|
goto error;
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
#undef key_match
|
|
|
|
|
|
|
|
error:
|
|
|
|
fprintf(stderr, "Line unrecognized: `%s'\n", line);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool config_read_line(struct config_ctx *ctx, const char *input)
|
|
|
|
{
|
|
|
|
size_t len = strlen(input), cleaned_len = 0;
|
|
|
|
char *line = calloc(len + 1, sizeof(char));
|
|
|
|
bool ret = true;
|
|
|
|
if (!line) {
|
|
|
|
perror("calloc");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!len)
|
|
|
|
goto out;
|
|
|
|
for (size_t i = 0; i < len; ++i) {
|
|
|
|
if (!isspace(input[i]))
|
|
|
|
line[cleaned_len++] = input[i];
|
|
|
|
}
|
|
|
|
if (!cleaned_len)
|
|
|
|
goto out;
|
|
|
|
if (line[0] == COMMENT_CHAR)
|
|
|
|
goto out;
|
|
|
|
ret = process_line(ctx, line);
|
|
|
|
out:
|
|
|
|
free(line);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool config_read_init(struct config_ctx *ctx, struct wgdevice **device, bool append)
|
|
|
|
{
|
|
|
|
memset(ctx, 0, sizeof(struct config_ctx));
|
|
|
|
ctx->device = device;
|
|
|
|
ctx->buf.dev = calloc(1, sizeof(struct wgdevice));
|
|
|
|
if (!ctx->buf.dev) {
|
|
|
|
perror("calloc");
|
|
|
|
return false;
|
|
|
|
}
|
2017-01-10 03:47:29 +00:00
|
|
|
if (!append)
|
|
|
|
ctx->buf.dev->flags |= WGDEVICE_REPLACE_PEERS;
|
2015-06-05 13:58:00 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool key_is_valid(uint8_t key[WG_KEY_LEN])
|
|
|
|
{
|
|
|
|
static const uint8_t zero[WG_KEY_LEN] = { 0 };
|
|
|
|
return !!memcmp(key, zero, WG_KEY_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool config_read_finish(struct config_ctx *ctx)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
struct wgpeer *peer;
|
2017-01-10 03:47:29 +00:00
|
|
|
if (ctx->buf.dev->flags & WGDEVICE_REPLACE_PEERS && !ctx->buf.dev->num_peers) {
|
2015-06-05 13:58:00 +00:00
|
|
|
fprintf(stderr, "No peers configured\n");
|
|
|
|
goto err;
|
|
|
|
}
|
2017-01-10 03:47:29 +00:00
|
|
|
if (ctx->buf.dev->flags & WGDEVICE_REPLACE_PEERS && !key_is_valid(ctx->buf.dev->private_key)) {
|
2015-06-05 13:58:00 +00:00
|
|
|
fprintf(stderr, "No private key configured\n");
|
|
|
|
goto err;
|
|
|
|
}
|
2017-01-24 03:11:56 +00:00
|
|
|
if (ctx->buf.dev->flags & WGDEVICE_REPLACE_PEERS && !key_is_valid(ctx->buf.dev->preshared_key))
|
|
|
|
ctx->buf.dev->flags |= WGDEVICE_REMOVE_PRESHARED_KEY;
|
2017-01-24 16:43:35 +00:00
|
|
|
if (ctx->buf.dev->flags & WGDEVICE_REPLACE_PEERS && !ctx->buf.dev->fwmark)
|
|
|
|
ctx->buf.dev->flags |= WGDEVICE_REMOVE_FWMARK;
|
2017-01-24 03:11:56 +00:00
|
|
|
|
2015-06-05 13:58:00 +00:00
|
|
|
for_each_wgpeer(ctx->buf.dev, peer, i) {
|
|
|
|
if (!key_is_valid(peer->public_key)) {
|
|
|
|
fprintf(stderr, "A peer is missing a public key\n");
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*ctx->device = ctx->buf.dev;
|
|
|
|
return true;
|
|
|
|
err:
|
|
|
|
free(ctx->buf.dev);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int read_line(char **dst, const char *path)
|
|
|
|
{
|
|
|
|
FILE *f;
|
|
|
|
size_t n = 0;
|
|
|
|
|
|
|
|
*dst = NULL;
|
|
|
|
|
|
|
|
f = fopen(path, "r");
|
|
|
|
if (!f) {
|
|
|
|
perror("fopen");
|
|
|
|
return -1;
|
|
|
|
}
|
2017-01-24 03:20:05 +00:00
|
|
|
if (getline(dst, &n, f) < 0 && errno) {
|
2015-06-05 13:58:00 +00:00
|
|
|
perror("getline");
|
|
|
|
fclose(f);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
n = strlen(*dst);
|
2017-01-24 03:20:05 +00:00
|
|
|
if (!n)
|
|
|
|
return 1;
|
2015-06-05 13:58:00 +00:00
|
|
|
while (--n) {
|
|
|
|
if (isspace((*dst)[n]))
|
|
|
|
(*dst)[n] = '\0';
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *strip_spaces(const char *in)
|
|
|
|
{
|
|
|
|
char *out;
|
|
|
|
size_t t, l, i;
|
|
|
|
|
|
|
|
t = strlen(in);
|
|
|
|
out = calloc(t + 1, sizeof(char));
|
|
|
|
if (!out) {
|
|
|
|
perror("calloc");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
for (i = 0, l = 0; i < t; ++i) {
|
|
|
|
if (!isspace(in[i]))
|
|
|
|
out[l++] = in[i];
|
|
|
|
}
|
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool config_read_cmd(struct wgdevice **device, char *argv[], int argc)
|
|
|
|
{
|
|
|
|
struct inflatable_device buf = { 0 };
|
|
|
|
size_t peer_offset = 0;
|
|
|
|
buf.dev = calloc(sizeof(struct wgdevice), 1);
|
|
|
|
if (!buf.dev) {
|
|
|
|
perror("calloc");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
while (argc > 0) {
|
|
|
|
if (!strcmp(argv[0], "listen-port") && argc >= 2 && !buf.dev->num_peers) {
|
|
|
|
buf.dev->port = parse_port(argv[1]);
|
|
|
|
if (!buf.dev->port)
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
2017-01-24 16:43:35 +00:00
|
|
|
} else if (!strcmp(argv[0], "fwmark") && argc >= 2 && !buf.dev->num_peers) {
|
|
|
|
if (!parse_fwmark(&buf.dev->fwmark, &buf.dev->flags, argv[1]))
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
2015-06-05 13:58:00 +00:00
|
|
|
} else if (!strcmp(argv[0], "private-key") && argc >= 2 && !buf.dev->num_peers) {
|
|
|
|
char *line;
|
|
|
|
int ret = read_line(&line, argv[1]);
|
|
|
|
if (ret == 0) {
|
|
|
|
if (!parse_key(buf.dev->private_key, line)) {
|
|
|
|
free(line);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
free(line);
|
|
|
|
} else if (ret == 1)
|
2017-01-10 03:47:29 +00:00
|
|
|
buf.dev->flags |= WGDEVICE_REMOVE_PRIVATE_KEY;
|
2015-06-05 13:58:00 +00:00
|
|
|
else
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
|
|
|
} else if (!strcmp(argv[0], "preshared-key") && argc >= 2 && !buf.dev->num_peers) {
|
|
|
|
char *line;
|
|
|
|
int ret = read_line(&line, argv[1]);
|
|
|
|
if (ret == 0) {
|
|
|
|
if (!parse_key(buf.dev->preshared_key, line)) {
|
|
|
|
free(line);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
free(line);
|
|
|
|
} else if (ret == 1)
|
2017-01-10 03:47:29 +00:00
|
|
|
buf.dev->flags |= WGDEVICE_REMOVE_PRESHARED_KEY;
|
2015-06-05 13:58:00 +00:00
|
|
|
else
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
|
|
|
} else if (!strcmp(argv[0], "peer") && argc >= 2) {
|
|
|
|
peer_offset = buf.pos;
|
|
|
|
if (use_space(&buf, sizeof(struct wgpeer)) < 0) {
|
|
|
|
perror("use_space");
|
|
|
|
goto error;
|
|
|
|
}
|
2016-07-08 00:30:03 +00:00
|
|
|
peer_from_offset(buf.dev, peer_offset)->persistent_keepalive_interval = (__u16)-1;
|
2015-06-05 13:58:00 +00:00
|
|
|
++buf.dev->num_peers;
|
|
|
|
if (!parse_key(peer_from_offset(buf.dev, peer_offset)->public_key, argv[1]))
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
|
|
|
} else if (!strcmp(argv[0], "remove") && argc >= 1 && buf.dev->num_peers) {
|
2017-01-10 03:47:29 +00:00
|
|
|
peer_from_offset(buf.dev, peer_offset)->flags |= WGPEER_REMOVE_ME;
|
2015-06-05 13:58:00 +00:00
|
|
|
argv += 1;
|
|
|
|
argc -= 1;
|
|
|
|
} else if (!strcmp(argv[0], "endpoint") && argc >= 2 && buf.dev->num_peers) {
|
2017-01-10 04:52:06 +00:00
|
|
|
if (!parse_endpoint(&peer_from_offset(buf.dev, peer_offset)->endpoint.addr, argv[1]))
|
2015-06-05 13:58:00 +00:00
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
|
|
|
} else if (!strcmp(argv[0], "allowed-ips") && argc >= 2 && buf.dev->num_peers) {
|
|
|
|
char *line = strip_spaces(argv[1]);
|
|
|
|
if (!line)
|
|
|
|
goto error;
|
|
|
|
if (!parse_ipmasks(&buf, peer_offset, line)) {
|
|
|
|
free(line);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
free(line);
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
2016-07-08 00:30:03 +00:00
|
|
|
} else if (!strcmp(argv[0], "persistent-keepalive") && argc >= 2 && buf.dev->num_peers) {
|
|
|
|
if (!parse_persistent_keepalive(&peer_from_offset(buf.dev, peer_offset)->persistent_keepalive_interval, argv[1]))
|
|
|
|
goto error;
|
|
|
|
argv += 2;
|
|
|
|
argc -= 2;
|
2015-06-05 13:58:00 +00:00
|
|
|
} else {
|
|
|
|
fprintf(stderr, "Invalid argument: %s\n", argv[0]);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*device = buf.dev;
|
|
|
|
return true;
|
|
|
|
error:
|
|
|
|
free(buf.dev);
|
|
|
|
return false;
|
|
|
|
}
|