It's good to have SPDX identifiers in all files as the Linux kernel developers are working to add these identifiers to all files. Update all files with the correct SPDX license identifier based on the license text of the project or based on the license in the file itself. The SPDX identifier is a legally binding shorthand, which can be used instead of the full boiler plate text. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Modified-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
63 lines
1.3 KiB
C
63 lines
1.3 KiB
C
/* SPDX-License-Identifier: GPL-2.0
|
|
*
|
|
* Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <string.h>
|
|
#include <fcntl.h>
|
|
#ifdef __linux__
|
|
#include <sys/syscall.h>
|
|
#endif
|
|
|
|
#include "curve25519.h"
|
|
#include "encoding.h"
|
|
#include "subcommands.h"
|
|
|
|
static inline ssize_t get_random_bytes(uint8_t *out, size_t len)
|
|
{
|
|
ssize_t ret;
|
|
int fd;
|
|
#if defined(__NR_getrandom) && defined(__linux__)
|
|
ret = syscall(__NR_getrandom, out, len, 0);
|
|
if (ret >= 0)
|
|
return ret;
|
|
#endif
|
|
fd = open("/dev/urandom", O_RDONLY);
|
|
if (fd < 0)
|
|
return fd;
|
|
ret = read(fd, out, len);
|
|
close(fd);
|
|
return ret;
|
|
}
|
|
|
|
int genkey_main(int argc, char *argv[])
|
|
{
|
|
uint8_t key[WG_KEY_LEN];
|
|
char base64[WG_KEY_LEN_BASE64];
|
|
struct stat stat;
|
|
|
|
if (argc != 1) {
|
|
fprintf(stderr, "Usage: %s %s\n", PROG_NAME, argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
if (!fstat(STDOUT_FILENO, &stat) && S_ISREG(stat.st_mode) && stat.st_mode & S_IRWXO)
|
|
fputs("Warning: writing to world accessible file.\nConsider setting the umask to 077 and trying again.\n", stderr);
|
|
|
|
if (get_random_bytes(key, WG_KEY_LEN) != WG_KEY_LEN) {
|
|
perror("getrandom");
|
|
return 1;
|
|
}
|
|
if (!strcmp(argv[0], "genkey"))
|
|
curve25519_normalize_secret(key);
|
|
|
|
key_to_base64(base64, key);
|
|
puts(base64);
|
|
return 0;
|
|
}
|