NetBSD/usr.sbin/wgconfig/wgconfig.c

825 lines
20 KiB
C
Raw Normal View History

/* $NetBSD: wgconfig.c,v 1.6 2023/05/07 16:05:07 oster Exp $ */
2020-08-21 00:28:00 +03:00
/*
* Copyright (C) Ryota Ozaki <ozaki.ryota@gmail.com>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__RCSID("$NetBSD: wgconfig.c,v 1.6 2023/05/07 16:05:07 oster Exp $");
2020-08-21 00:28:00 +03:00
#include <sys/ioctl.h>
#include <net/if.h>
#include <net/if_wg.h>
#include <arpa/inet.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <err.h>
#include <unistd.h>
#include <errno.h>
#include <resolv.h>
#include <util.h>
#include <netdb.h>
#include <prop/proplib.h>
#define PROP_BUFFER_LEN 4096
#define KEY_LEN 32
#define KEY_BASE64_LEN 44
__dead static void
usage(void)
{
const char *progname = getprogname();
#define P(str) fprintf(stderr, "\t%s <interface> %s\n", progname, str)
fprintf(stderr, "Usage:\n");
P("[show all]");
P("show peer <peer name> [--show-preshared-key]");
P("show private-key");
P("set private-key <file path>");
P("set listen-port <port>");
P("add peer <peer name> <base64 public key>\n"
"\t [--preshared-key=<file path>] [--endpoint=<ip>:<port>]\n"
"\t [--allowed-ips=<ip1>/<cidr1>[,<ip2>/<cidr2>]...]");
P("delete peer <peer name>");
exit(EXIT_FAILURE);
#undef P
}
static const char *
format_key(prop_object_t key_prop)
{
int error;
const void *key;
2020-08-21 00:28:00 +03:00
size_t key_len;
static char key_b64[KEY_BASE64_LEN + 1];
if (key_prop == NULL)
return "(none)";
if (prop_object_type(key_prop) != PROP_TYPE_DATA)
errx(EXIT_FAILURE, "invalid key");
2020-08-21 00:28:00 +03:00
key = prop_data_value(key_prop);
2020-08-21 00:28:00 +03:00
key_len = prop_data_size(key_prop);
if (key_len != KEY_LEN)
2020-08-21 20:51:31 +03:00
errx(EXIT_FAILURE, "invalid key len: %zu", key_len);
2020-08-21 00:28:00 +03:00
error = b64_ntop(key, key_len, key_b64, KEY_BASE64_LEN + 1);
if (error == -1)
errx(EXIT_FAILURE, "b64_ntop failed");
key_b64[KEY_BASE64_LEN] = '\0'; /* just in case */
return key_b64;
}
static const char *
format_endpoint(prop_object_t endpoint_prop)
{
int error;
static char buf[INET6_ADDRSTRLEN];
struct sockaddr_storage sockaddr;
const void *addr;
2020-08-21 00:28:00 +03:00
size_t addr_len;
if (prop_object_type(endpoint_prop) != PROP_TYPE_DATA)
errx(EXIT_FAILURE, "invalid endpoint");
addr = prop_data_value(endpoint_prop);
2020-08-21 00:28:00 +03:00
addr_len = prop_data_size(endpoint_prop);
memcpy(&sockaddr, addr, addr_len);
error = sockaddr_snprintf(buf, sizeof(buf), "%a:%p",
(struct sockaddr *)&sockaddr);
if (error == -1)
err(EXIT_FAILURE, "sockaddr_snprintf failed");
return buf;
}
static void
handle_allowed_ips(prop_dictionary_t peer, const char *prefix)
{
prop_object_t prop_obj;
2020-08-21 00:28:00 +03:00
prop_array_t allowedips;
prop_object_iterator_t it;
prop_dictionary_t allowedip;
bool first = true;
prop_obj = prop_dictionary_get(peer, "allowedips");
if (prop_obj == NULL)
2020-08-21 00:28:00 +03:00
return;
if (prop_object_type(prop_obj) != PROP_TYPE_ARRAY)
errx(EXIT_FAILURE, "invalid allowedips");
allowedips = prop_obj;
2020-08-21 00:28:00 +03:00
printf("%sallowed-ips: ", prefix);
it = prop_array_iterator(allowedips);
while ((prop_obj = prop_object_iterator_next(it)) != NULL) {
2020-08-21 00:28:00 +03:00
uint8_t family;
uint8_t cidr;
const void *addr;
size_t addrlen, famaddrlen;
2020-08-21 00:28:00 +03:00
char ntopbuf[INET6_ADDRSTRLEN];
const char *ntopret;
if (prop_object_type(prop_obj) != PROP_TYPE_DICTIONARY) {
warnx("invalid allowedip");
2020-08-21 00:28:00 +03:00
continue;
}
allowedip = prop_obj;
2020-08-21 00:28:00 +03:00
if (!prop_dictionary_get_uint8(allowedip, "family", &family)) {
warnx("allowed-ip without family");
continue;
}
2020-08-21 00:28:00 +03:00
if (!prop_dictionary_get_uint8(allowedip, "cidr", &cidr)) {
2020-08-21 00:28:00 +03:00
warnx("allowed-ip without cidr");
continue;
}
if (!prop_dictionary_get_data(allowedip, "ip",
&addr, &addrlen)) {
2020-08-21 00:28:00 +03:00
warnx("allowed-ip without ip");
continue;
}
switch (family) {
case AF_INET:
famaddrlen = sizeof(struct in_addr);
break;
case AF_INET6:
famaddrlen = sizeof(struct in6_addr);
break;
default:
warnx("unknown family %d", family);
continue;
}
if (addrlen != famaddrlen) {
warnx("allowed-ip bad ip length");
continue;
}
2020-08-21 00:28:00 +03:00
ntopret = inet_ntop(family, addr, ntopbuf, sizeof(ntopbuf));
if (ntopret == NULL)
errx(EXIT_FAILURE, "inet_ntop failed");
printf("%s%s/%u", first ? "" : ",", ntopbuf, cidr);
first = false;
}
if (first)
printf("(none)\n");
else
printf("\n");
}
static prop_dictionary_t
ioctl_get(const char *interface)
{
int error = 0;
struct ifdrv ifd;
int sock;
char *buf;
prop_dictionary_t prop_dict;
sock = socket(AF_INET, SOCK_DGRAM, 0);
if (error == -1)
err(EXIT_FAILURE, "socket");
buf = malloc(PROP_BUFFER_LEN);
if (buf == NULL)
errx(EXIT_FAILURE, "malloc failed");
strlcpy(ifd.ifd_name, interface, sizeof(ifd.ifd_name));
ifd.ifd_cmd = 0;
ifd.ifd_data = buf;
ifd.ifd_len = PROP_BUFFER_LEN;
error = ioctl(sock, SIOCGDRVSPEC, &ifd);
if (error == -1)
err(EXIT_FAILURE, "ioctl(SIOCGDRVSPEC)");
prop_dict = prop_dictionary_internalize(buf);
if (prop_dict == NULL)
errx(EXIT_FAILURE, "prop_dictionary_internalize failed");
free(buf);
close(sock);
return prop_dict;
}
static void
show_peer(prop_dictionary_t peer, const char *prefix, bool show_psk)
{
prop_object_t prop_obj;
time_t sec;
2020-08-21 00:28:00 +03:00
prop_obj = prop_dictionary_get(peer, "public_key");
if (prop_obj == NULL) {
warnx("peer without public-key");
return;
}
printf("%spublic-key: %s\n", prefix, format_key(prop_obj));
prop_obj = prop_dictionary_get(peer, "endpoint");
if (prop_obj == NULL)
printf("%sendpoint: (none)\n", prefix);
else
printf("%sendpoint: %s\n", prefix, format_endpoint(prop_obj));
if (show_psk) {
prop_obj = prop_dictionary_get(peer, "preshared_key");
printf("%spreshared-key: %s\n", prefix, format_key(prop_obj));
} else {
printf("%spreshared-key: (hidden)\n", prefix);
}
handle_allowed_ips(peer, prefix);
if (prop_dictionary_get_int64(peer, "last_handshake_time_sec", &sec)) {
if (sec > 0)
printf("%slatest-handshake: %s", prefix, ctime(&sec));
else
printf("%slatest-handshake: (never)\n", prefix);
} else {
2020-08-21 00:28:00 +03:00
printf("%slatest-handshake: (none)\n", prefix);
}
2020-08-21 00:28:00 +03:00
}
static int
cmd_show_all(const char *interface, int argc, char *argv[])
{
prop_dictionary_t prop_dict;
prop_object_t prop_obj;
uint16_t port;
prop_array_t peers;
2020-08-21 00:28:00 +03:00
prop_dict = ioctl_get(interface);
printf("interface: %s\n", interface);
#if 0
prop_obj = prop_dictionary_get(prop_dict, "private_key");
printf("\tprivate-key: %s\n", format_key(prop_obj));
#else
printf("\tprivate-key: (hidden)\n");
#endif
if (prop_dictionary_get_uint16(prop_dict, "listen_port", &port)) {
printf("\tlisten-port: %u\n", port);
2020-08-21 00:28:00 +03:00
} else {
printf("\tlisten-port: (none)\n");
}
prop_obj = prop_dictionary_get(prop_dict, "peers");
if (prop_obj == NULL)
2020-08-21 00:28:00 +03:00
return EXIT_SUCCESS;
if (prop_object_type(prop_obj) != PROP_TYPE_ARRAY)
errx(EXIT_FAILURE, "invalid peers");
peers = prop_obj;
2020-08-21 00:28:00 +03:00
prop_object_iterator_t it = prop_array_iterator(peers);
while ((prop_obj = prop_object_iterator_next(it)) != NULL) {
const char *name;
if (prop_object_type(prop_obj) != PROP_TYPE_DICTIONARY)
errx(EXIT_FAILURE, "invalid peer");
prop_dictionary_t peer = prop_obj;
if (prop_dictionary_get_string(peer, "name", &name)) {
2020-08-21 00:28:00 +03:00
printf("\tpeer: %s\n", name);
} else
printf("\tpeer: (none)\n");
show_peer(peer, "\t\t", false);
}
return EXIT_SUCCESS;
}
static int
cmd_show_peer(const char *interface, int argc, char *argv[])
{
prop_dictionary_t prop_dict;
prop_object_t prop_obj;
2020-08-21 00:28:00 +03:00
const char *target;
const char *opt = "--show-preshared-key";
bool show_psk = false;
if (argc != 1 && argc != 2)
usage();
target = argv[0];
if (argc == 2) {
if (strncmp(argv[1], opt, strlen(opt)) != 0)
usage();
show_psk = true;
}
prop_dict = ioctl_get(interface);
prop_obj = prop_dictionary_get(prop_dict, "peers");
if (prop_obj == NULL)
2020-08-21 00:28:00 +03:00
return EXIT_SUCCESS;
if (prop_object_type(prop_obj) != PROP_TYPE_ARRAY)
errx(EXIT_FAILURE, "invalid peers");
2020-08-21 00:28:00 +03:00
prop_array_t peers = prop_obj;
2020-08-21 00:28:00 +03:00
prop_object_iterator_t it = prop_array_iterator(peers);
while ((prop_obj = prop_object_iterator_next(it)) != NULL) {
const char *name;
if (prop_object_type(prop_obj) != PROP_TYPE_DICTIONARY)
errx(EXIT_FAILURE, "invalid peer");
prop_dictionary_t peer = prop_obj;
if (!prop_dictionary_get_string(peer, "name", &name))
2020-08-21 00:28:00 +03:00
continue;
if (strcmp(name, target) == 0) {
printf("peer: %s\n", name);
show_peer(peer, "\t", show_psk);
return EXIT_SUCCESS;
2020-08-21 00:28:00 +03:00
}
}
return EXIT_FAILURE;
2020-08-21 00:28:00 +03:00
}
static int
cmd_show_private_key(const char *interface, int argc, char *argv[])
{
prop_dictionary_t prop_dict;
prop_object_t prop_obj;
prop_dict = ioctl_get(interface);
prop_obj = prop_dictionary_get(prop_dict, "private_key");
printf("private-key: %s\n", format_key(prop_obj));
return EXIT_SUCCESS;
}
static void
ioctl_set(const char *interface, int cmd, char *propstr)
{
int error;
struct ifdrv ifd;
int sock;
strlcpy(ifd.ifd_name, interface, sizeof(ifd.ifd_name));
ifd.ifd_cmd = cmd;
ifd.ifd_data = propstr;
ifd.ifd_len = strlen(propstr);
sock = socket(AF_INET, SOCK_DGRAM, 0);
error = ioctl(sock, SIOCSDRVSPEC, &ifd);
if (error == -1)
err(EXIT_FAILURE, "ioctl(SIOCSDRVSPEC): cmd=%d", cmd);
close(sock);
}
static void
base64_decode(const char keyb64buf[KEY_BASE64_LEN + 1],
unsigned char keybuf[KEY_LEN])
{
int ret;
ret = b64_pton(keyb64buf, keybuf, KEY_LEN);
if (ret == -1)
errx(EXIT_FAILURE, "b64_pton failed");
}
static void
read_key(const char *path, unsigned char keybuf[KEY_LEN])
{
FILE *fp;
char keyb64buf[KEY_BASE64_LEN + 1];
size_t n;
fp = fopen(path, "r");
if (fp == NULL)
err(EXIT_FAILURE, "fopen");
n = fread(keyb64buf, 1, KEY_BASE64_LEN, fp);
if (n != KEY_BASE64_LEN)
2020-08-21 20:51:31 +03:00
errx(EXIT_FAILURE, "base64 key len is short: %zu", n);
2020-08-21 00:28:00 +03:00
keyb64buf[KEY_BASE64_LEN] = '\0';
base64_decode(keyb64buf, keybuf);
}
static int
cmd_set_private_key(const char *interface, int argc, char *argv[])
{
unsigned char keybuf[KEY_LEN];
if (argc != 1)
usage();
read_key(argv[0], keybuf);
prop_dictionary_t prop_dict;
prop_dict = prop_dictionary_create();
if (prop_dict == NULL)
errx(EXIT_FAILURE, "prop_dictionary_create");
if (!prop_dictionary_set_data(prop_dict, "private_key",
keybuf, sizeof(keybuf)))
errx(EXIT_FAILURE, "prop_dictionary_set_data");
2020-08-21 00:28:00 +03:00
char *buf = prop_dictionary_externalize(prop_dict);
if (buf == NULL)
err(EXIT_FAILURE, "prop_dictionary_externalize failed");
ioctl_set(interface, WG_IOCTL_SET_PRIVATE_KEY, buf);
return EXIT_SUCCESS;
}
static uint16_t
strtouint16(const char *str)
{
char *ep;
long val;
errno = 0;
val = strtol(str, &ep, 10);
if (ep == str)
errx(EXIT_FAILURE, "strtol: not a number");
if (*ep != '\0')
errx(EXIT_FAILURE, "strtol: trailing garbage");
if (errno != 0)
err(EXIT_FAILURE, "strtol");
if (val < 0 || val > USHRT_MAX)
errx(EXIT_FAILURE, "out of range");
return (uint16_t)val;
}
static int
cmd_set_listen_port(const char *interface, int argc, char *argv[])
{
uint16_t port;
if (argc != 1)
usage();
port = strtouint16(argv[0]);
if (port == 0)
errx(EXIT_FAILURE, "port 0 is not allowed");
prop_dictionary_t prop_dict;
prop_dict = prop_dictionary_create();
if (prop_dict == NULL)
errx(EXIT_FAILURE, "prop_dictionary_create");
if (!prop_dictionary_set_uint16(prop_dict, "listen_port", port))
errx(EXIT_FAILURE, "prop_dictionary_set_uint16");
2020-08-21 00:28:00 +03:00
char *buf = prop_dictionary_externalize(prop_dict);
if (buf == NULL)
err(EXIT_FAILURE, "prop_dictionary_externalize failed");
ioctl_set(interface, WG_IOCTL_SET_LISTEN_PORT, buf);
return EXIT_SUCCESS;
}
static void
handle_option_endpoint(const char *_addr_port, prop_dictionary_t prop_dict)
{
int error;
char *port;
struct addrinfo hints, *res;
char *addr_port, *addr;
addr = addr_port = strdup(_addr_port);
if (addr_port[0] == '[') {
/* [<ipv6>]:<port> */
/* Accept [<ipv4>]:<port> too, but it's not a big deal. */
char *bracket, *colon;
if (strlen(addr_port) < strlen("[::]:0"))
errx(EXIT_FAILURE, "invalid endpoint format");
addr = addr_port + 1;
bracket = strchr(addr, ']');
if (bracket == NULL)
errx(EXIT_FAILURE, "invalid endpoint format");
*bracket = '\0';
colon = bracket + 1;
if (*colon != ':')
errx(EXIT_FAILURE, "invalid endpoint format");
*colon = '\0';
port = colon + 1;
} else {
char *colon, *tmp;
colon = strchr(addr_port, ':');
if (colon == NULL)
errx(EXIT_FAILURE, "no ':' found in endpoint");
tmp = strchr(colon + 1, ':');
if (tmp != NULL) {
/* <ipv6>:<port> */
/* Assume the last colon is a separator */
char *last_colon = tmp;
while ((tmp = strchr(tmp + 1, ':')) != NULL)
last_colon = tmp;
colon = last_colon;
*colon = '\0';
port = colon + 1;
} else {
/* <ipv4>:<port> */
*colon = '\0';
port = colon + 1;
}
}
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_UNSPEC;
hints.ai_flags = AI_NUMERICHOST;
error = getaddrinfo(addr, port, &hints, &res);
if (error)
errx(EXIT_FAILURE, "getaddrinfo: %s", gai_strerror(error));
2020-08-21 00:28:00 +03:00
if (!prop_dictionary_set_data(prop_dict, "endpoint",
res->ai_addr, res->ai_addrlen))
errx(EXIT_FAILURE, "prop_dictionary_set_data");
2020-08-21 00:28:00 +03:00
freeaddrinfo(res);
free(addr_port);
}
static void
handle_option_allowed_ips(const char *_allowed_ips, prop_dictionary_t prop_dict)
{
prop_array_t allowedips;
int i;
char *allowed_ips, *ip;
allowed_ips = strdup(_allowed_ips);
if (allowed_ips == NULL)
errx(EXIT_FAILURE, "strdup");
2020-08-21 00:28:00 +03:00
allowedips = prop_array_create();
if (allowedips == NULL)
errx(EXIT_FAILURE, "prop_array_create");
for (i = 0; (ip = strsep(&allowed_ips, ",")) != NULL; i++) {
2020-08-21 00:28:00 +03:00
prop_dictionary_t prop_allowedip;
uint16_t cidr;
char *cidrp;
struct addrinfo hints, *res;
int error;
prop_allowedip = prop_dictionary_create();
if (prop_allowedip == NULL)
errx(EXIT_FAILURE, "prop_dictionary_create");
2020-08-21 00:28:00 +03:00
cidrp = strchr(ip, '/');
if (cidrp == NULL)
errx(EXIT_FAILURE, "no '/' found in allowed-ip");
*cidrp = '\0';
cidrp++;
cidr = strtouint16(cidrp);
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_UNSPEC;
hints.ai_flags = AI_NUMERICHOST;
error = getaddrinfo(ip, 0, &hints, &res);
if (error)
errx(EXIT_FAILURE, "getaddrinfo: %s",
gai_strerror(errno));
2020-08-21 00:28:00 +03:00
sa_family_t family = res->ai_addr->sa_family;
if (!prop_dictionary_set_uint8(prop_allowedip, "family",
family))
errx(EXIT_FAILURE, "prop_dictionary_set_uint8");
const void *addr;
size_t addrlen;
switch (family) {
case AF_INET: {
const struct sockaddr_in *sin =
(const struct sockaddr_in *)res->ai_addr;
addr = &sin->sin_addr;
addrlen = sizeof(sin->sin_addr);
break;
}
case AF_INET6: {
const struct sockaddr_in6 *sin6 =
(const struct sockaddr_in6 *)res->ai_addr;
addr = &sin6->sin6_addr;
addrlen = sizeof(sin6->sin6_addr);
break;
}
default:
2020-08-21 00:28:00 +03:00
errx(EXIT_FAILURE, "invalid family: %d", family);
}
if (!prop_dictionary_set_data(prop_allowedip, "ip",
addr, addrlen))
errx(EXIT_FAILURE, "prop_dictionary_set_data");
if (!prop_dictionary_set_uint16(prop_allowedip, "cidr", cidr))
errx(EXIT_FAILURE, "prop_dictionary_set_uint16");
2020-08-21 00:28:00 +03:00
freeaddrinfo(res);
prop_array_set(allowedips, i, prop_allowedip);
}
prop_dictionary_set(prop_dict, "allowedips", allowedips);
prop_object_release(allowedips);
2020-08-21 00:28:00 +03:00
free(allowed_ips);
}
static void
handle_option_preshared_key(const char *path, prop_dictionary_t prop_dict)
{
unsigned char keybuf[KEY_LEN];
read_key(path, keybuf);
if (!prop_dictionary_set_data(prop_dict, "preshared_key",
keybuf, sizeof(keybuf)))
errx(EXIT_FAILURE, "prop_dictionary_set_data");
2020-08-21 00:28:00 +03:00
}
static const struct option {
const char *option;
void (*func)(const char *, prop_dictionary_t);
} options[] = {
{"--endpoint=", handle_option_endpoint},
{"--allowed-ips=", handle_option_allowed_ips},
{"--preshared-key=", handle_option_preshared_key},
};
static void
handle_options(int argc, char *argv[], prop_dictionary_t prop_dict)
{
while (argc > 0) {
int found = 0;
2020-08-21 00:28:00 +03:00
for (size_t i = 0; i < __arraycount(options); i++) {
const struct option *opt = &options[i];
size_t optlen = strlen(opt->option);
if (strncmp(argv[0], opt->option, optlen) == 0) {
opt->func(argv[0] + optlen, prop_dict);
found = 1;
2020-08-21 00:28:00 +03:00
break;
}
}
if (found == 0)
errx(EXIT_FAILURE, "invalid option: %s", argv[0]);
2020-08-21 00:28:00 +03:00
argc -= 1;
argv += 1;
}
if (argc != 0)
usage();
}
static int
cmd_add_peer(const char *interface, int argc, char *argv[])
{
const char *name;
unsigned char keybuf[KEY_LEN];
if (argc < 2)
usage();
prop_dictionary_t prop_dict;
prop_dict = prop_dictionary_create();
if (prop_dict == NULL)
errx(EXIT_FAILURE, "prop_dictionary_create");
2020-08-21 00:28:00 +03:00
name = argv[0];
if (strlen(name) > WG_PEER_NAME_MAXLEN)
errx(EXIT_FAILURE, "peer name too long");
if (strnlen(argv[1], KEY_BASE64_LEN + 1) != KEY_BASE64_LEN)
errx(EXIT_FAILURE, "invalid public-key length: %zu",
strlen(argv[1]));
2020-08-21 00:28:00 +03:00
base64_decode(argv[1], keybuf);
if (!prop_dictionary_set_string(prop_dict, "name", name))
errx(EXIT_FAILURE, "prop_dictionary_set_string");
if (!prop_dictionary_set_data(prop_dict, "public_key",
keybuf, sizeof(keybuf)))
errx(EXIT_FAILURE, "prop_dictionary_set_data");
2020-08-21 00:28:00 +03:00
argc -= 2;
argv += 2;
handle_options(argc, argv, prop_dict);
char *buf = prop_dictionary_externalize(prop_dict);
if (buf == NULL)
err(EXIT_FAILURE, "prop_dictionary_externalize failed");
ioctl_set(interface, WG_IOCTL_ADD_PEER, buf);
return EXIT_SUCCESS;
}
static int
cmd_delete_peer(const char *interface, int argc, char *argv[])
{
const char *name;
if (argc != 1)
usage();
prop_dictionary_t prop_dict;
prop_dict = prop_dictionary_create();
if (prop_dict == NULL)
errx(EXIT_FAILURE, "prop_dictionary_create");
2020-08-21 00:28:00 +03:00
name = argv[0];
if (strlen(name) > WG_PEER_NAME_MAXLEN)
errx(EXIT_FAILURE, "peer name too long");
if (!prop_dictionary_set_string(prop_dict, "name", name))
errx(EXIT_FAILURE, "prop_dictionary_set_string");
2020-08-21 00:28:00 +03:00
char *buf = prop_dictionary_externalize(prop_dict);
if (buf == NULL)
err(EXIT_FAILURE, "prop_dictionary_externalize failed");
ioctl_set(interface, WG_IOCTL_DELETE_PEER, buf);
return EXIT_SUCCESS;
}
static const struct command {
const char *command;
const char *target;
int (*func)(const char *, int, char **);
} commands[] = {
{"show", "all", cmd_show_all},
{"show", "peer", cmd_show_peer},
{"show", "private-key", cmd_show_private_key},
{"set", "private-key", cmd_set_private_key},
{"set", "listen-port", cmd_set_listen_port},
{"add", "peer", cmd_add_peer},
{"delete", "peer", cmd_delete_peer},
};
int
main(int argc, char *argv[])
{
const char *interface;
const char *command;
const char *target;
if (argc < 2 ||
strcmp(argv[1], "-h") == 0 ||
strcmp(argv[1], "-?") == 0 ||
strcmp(argv[1], "--help") == 0) {
2020-08-21 00:28:00 +03:00
usage();
}
interface = argv[1];
if (strlen(interface) > IFNAMSIZ)
errx(EXIT_FAILURE, "interface name too long");
if (argc == 2) {
return cmd_show_all(interface, 0, NULL);
}
if (argc < 4) {
usage();
}
command = argv[2];
target = argv[3];
argc -= 4;
argv += 4;
for (size_t i = 0; i < __arraycount(commands); i++) {
const struct command *cmd = &commands[i];
if (strncmp(command, cmd->command, strlen(cmd->command)) == 0 &&
strncmp(target, cmd->target, strlen(cmd->target)) == 0) {
return cmd->func(interface, argc, argv);
}
}
usage();
}