aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2017-12-06 19:15:19 +0100
committerJason A. Donenfeld <Jason@zx2c4.com>2017-12-06 20:44:30 +0100
commit0b7446eac1a84115c6325b7c9319926cfe884914 (patch)
tree0582fafd60fc09ecbaa3991c6cf577393bca8ebd
parentCreate flashable zip (diff)
downloadandroid_kernel_wireguard-0b7446eac1a84115c6325b7c9319926cfe884914.tar.xz
android_kernel_wireguard-0b7446eac1a84115c6325b7c9319926cfe884914.zip
Reimplement wg-quick in C
The bash dependency doesn't make sense for Android, where everything is horrible.
-rw-r--r--Android.mk6
-rw-r--r--standalone/Makefile13
-rw-r--r--standalone/bash/.gitignore2
-rw-r--r--standalone/bash/Android.mk23
-rwxr-xr-xstandalone/bash/fetch.sh14
-rw-r--r--standalone/installer.sh17
-rw-r--r--wg-quick.bash187
-rw-r--r--wg-quick.c615
8 files changed, 625 insertions, 252 deletions
diff --git a/Android.mk b/Android.mk
index e9edde6..190ff75 100644
--- a/Android.mk
+++ b/Android.mk
@@ -43,10 +43,10 @@ ALL_DEFAULT_INSTALLED_MODULES += wg
include $(BUILD_EXECUTABLE)
include $(CLEAR_VARS)
+LOCAL_SRC_FILES := wg-quick.c
+LOCAL_CFLAGS := -O3 -std=gnu11 -Wall -pedantic -Wno-missing-field-initializers -Wno-sign-compare
LOCAL_MODULE := wg-quick
LOCAL_MODULE_PATH := $(TARGET_OUT_OPTIONAL_EXECUTABLES)
-LOCAL_SRC_FILES := wg-quick.bash
-LOCAL_REQUIRED_MODULES := bash wg
LOCAL_MODULE_CLASS := EXECUTABLES
ALL_DEFAULT_INSTALLED_MODULES += wg-quick
-include $(BUILD_PREBUILT)
+include $(BUILD_EXECUTABLE)
diff --git a/standalone/Makefile b/standalone/Makefile
index 1a8f70f..1e49b07 100644
--- a/standalone/Makefile
+++ b/standalone/Makefile
@@ -9,20 +9,15 @@ all: wireguard-tools.zip
clean:
rm -rf build wireguard-tools.zip
-wg-build:
+wg-build: ../wg-quick.c
ndk-build NDK_PROJECT_PATH=$(PWD)/build APP_BUILD_SCRIPT=$(PWD)/../Android.mk APP_PLATFORM=21
-bash-build:
- ndk-build NDK_PROJECT_PATH=$(PWD)/build APP_BUILD_SCRIPT=$(PWD)/bash/Android.mk APP_PLATFORM=21 IN_THE_RIGHT_PLACE=yes-yes-i-am
+$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg build/libs/$(ARCH)/wg-quick): wg-build
-$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg): wg-build
-$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/libncurses.so build/libs/$(ARCH)/bash): bash-build
-
-wireguard-tools.zip: $(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/libncurses.so build/libs/$(ARCH)/bash build/libs/$(ARCH)/wg) installer.sh ../wg-quick.bash addonsd.sh
+wireguard-tools.zip: $(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg-quick build/libs/$(ARCH)/wg) installer.sh addonsd.sh
rm -rf $@ build/zip build/*.zip
- mkdir -p build/zip build/zip/addon.d build/zip/scripts build/zip/META-INF/com/google/android
+ mkdir -p build/zip build/zip/addon.d build/zip/META-INF/com/google/android
ln -frs build/libs build/zip/arch
- ln -frs ../wg-quick.bash build/zip/scripts/wg-quick
ln -frs addonsd.sh build/zip/addon.d/40-wireguard.sh
ln -frs installer.sh build/zip/META-INF/com/google/android/update-binary
touch build/zip/META-INF/com/google/android/updater-script
diff --git a/standalone/bash/.gitignore b/standalone/bash/.gitignore
deleted file mode 100644
index 1993ef8..0000000
--- a/standalone/bash/.gitignore
+++ /dev/null
@@ -1,2 +0,0 @@
-android_external_bash-cm-14.1
-android_external_libncurses-cm-14.1
diff --git a/standalone/bash/Android.mk b/standalone/bash/Android.mk
deleted file mode 100644
index 937e56c..0000000
--- a/standalone/bash/Android.mk
+++ /dev/null
@@ -1,23 +0,0 @@
-ifeq ($(IN_THE_RIGHT_PLACE),yes-yes-i-am)
-THIS_DIR := $(call my-dir)
-
-# AOSP build system things:
-define all-c-files-under
-$(call all-named-files-under,*.c,$(1))
-endef
-define all-named-files-under
-$(call find-files-in-subdirs,$(LOCAL_PATH),"$(1)",$(2))
-endef
-define find-files-in-subdirs
-$(sort $(patsubst ./%,%, \
- $(shell cd $(1) ; \
- find -L $(3) -name $(2) -and -not -name ".*") \
- ))
-endef
-
-$(shell cd $(THIS_DIR) && ./fetch.sh )
-include $(THIS_DIR)/android_external_libncurses-cm-14.1/Android.mk
-include $(THIS_DIR)/android_external_bash-cm-14.1/Android.mk
-__ndk_modules.bash.CFLAGS += -D'getdtablesize()=sysconf(_SC_OPEN_MAX)'
-__ndk_modules.builtins.CFLAGS += -D'getdtablesize()=sysconf(_SC_OPEN_MAX)'
-endif
diff --git a/standalone/bash/fetch.sh b/standalone/bash/fetch.sh
deleted file mode 100755
index b1b77e8..0000000
--- a/standalone/bash/fetch.sh
+++ /dev/null
@@ -1,14 +0,0 @@
-#!/bin/sh
-set -e
-
-if [ ! -d android_external_bash-cm-14.1 ]; then
- curl -L -o bash.zip https://github.com/LineageOS/android_external_bash/archive/cm-14.1.zip
- unzip bash.zip
- rm bash.zip
-fi
-
-if [ ! -d android_external_libncurses-cm-14.1 ]; then
- curl -L -o ncurses.zip https://github.com/LineageOS/android_external_libncurses/archive/cm-14.1.zip
- unzip ncurses.zip
- rm ncurses.zip
-fi
diff --git a/standalone/installer.sh b/standalone/installer.sh
index 59a44f8..84dacdc 100644
--- a/standalone/installer.sh
+++ b/standalone/installer.sh
@@ -55,22 +55,11 @@ rm -rf /tmp/wireguard
mkdir -p /tmp/wireguard
print "Extracting files"
unzip -d /tmp/wireguard "$ZIP"
-[ -f /tmp/wireguard/arch/$ARCH/wg ] || die "Not available for device's ABI"
-print "Copying WireGuard tools"
-cp /tmp/wireguard/scripts/wg-quick /tmp/wireguard/arch/$(getprop ro.product.cpu.abi)/wg /system/xbin/
+[ -d /tmp/wireguard/arch/$ARCH ] || die "Not available for device's ABI"
+print "Installing WireGuard tools"
+cp /tmp/wireguard/arch/$(getprop ro.product.cpu.abi)/* /system/xbin/
cp /tmp/wireguard/addon.d/40-wireguard.sh /system/addon.d/
chmod 755 /system/xbin/wg /system/xbin/wg-quick /system/addon.d/40-wireguard.sh
-if [ ! -f /system/xbin/bash ]; then
- print "Installing bash"
- cp /tmp/wireguard/arch/$ARCH/bash /system/xbin/
- chmod 755 /system/xbin/bash
- if [ -d /system/lib64 -a ! -f /system/lib64/libncurses.so ]; then
- cp /tmp/wireguard/arch/$ARCH/libncurses.so /system/lib64/
- elif [ ! -d /system/lib64 -a ! -f /system/lib/libncurses.so ]; then
- cp /tmp/wireguard/arch/$ARCH/libncurses.so /system/lib/
- fi
-fi
-
mkdir -pm 700 /data/misc/wireguard
print "Success! Be sure your kernel has the WireGuard module enabled."
diff --git a/wg-quick.bash b/wg-quick.bash
deleted file mode 100644
index 164e553..0000000
--- a/wg-quick.bash
+++ /dev/null
@@ -1,187 +0,0 @@
-#!/system/xbin/bash
-# SPDX-License-Identifier: GPL-2.0
-#
-# Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
-
-set -e -o pipefail
-shopt -s extglob
-export LC_ALL=C
-
-SELF="$(readlink -f "${BASH_SOURCE[0]}")"
-export PATH="${SELF%/*}:$PATH"
-
-WG_CONFIG=""
-INTERFACE=""
-NETID=0
-ADDRESSES=( )
-MTU=""
-DNS=( )
-CONFIG_FILE=""
-PROGRAM="${0##*/}"
-ARGS=( "$@" )
-
-parse_options() {
- local interface_section=0 line key value
- CONFIG_FILE="$1"
- [[ $CONFIG_FILE =~ ^[a-zA-Z0-9_=+.-]{1,16}$ ]] && CONFIG_FILE="/data/misc/wireguard/$CONFIG_FILE.conf"
- [[ -e $CONFIG_FILE ]] || die "\`$CONFIG_FILE' does not exist"
- [[ $CONFIG_FILE =~ /?([a-zA-Z0-9_=+.-]{1,16})\.conf$ ]] || die "The config file must be a valid interface name, followed by .conf"
- ((($(stat -c '%#a' "$CONFIG_FILE") & 0007) == 0)) || echo "Warning: \`$CONFIG_FILE' is world accessible" >&2
- INTERFACE="${BASH_REMATCH[1]}"
- shopt -s nocasematch
- while read -r line || [[ -n $line ]]; do
- key="${line%%=*}"; key="${key##*([[:space:]])}"; key="${key%%*([[:space:]])}"
- value="${line#*=}"; value="${value##*([[:space:]])}"; value="${value%%*([[:space:]])}"
- [[ $key == "["* ]] && interface_section=0
- [[ $key == "[Interface]" ]] && interface_section=1
- if [[ $interface_section -eq 1 ]]; then
- case "$key" in
- Address) ADDRESSES+=( ${value//,/ } ); continue ;;
- MTU) MTU="$value"; continue ;;
- DNS) DNS+=( ${value//,/ } ); continue ;;
- esac
- fi
- WG_CONFIG+="$line"$'\n'
- done < "$CONFIG_FILE"
- shopt -u nocasematch
-}
-
-cmd() {
- echo "[#] $*" >&2
- "$@"
-}
-
-cndc() {
- local out="$(cmd ndc "$@")"
- [[ $out == *200\ 0* ]] || { echo "$out"; return 1; }
-}
-
-die() {
- echo "$PROGRAM: $*" >&2
- exit 1
-}
-
-auto_su() {
- [[ $UID == 0 ]] || exec su -p -c "'$SELF' ${ARGS[*]}"
-}
-
-add_if() {
- cmd ip link add "$INTERFACE" type wireguard
-}
-
-del_if() {
- cmd ip link del "$INTERFACE"
- [[ $(ip rule show) =~ 0xc([0-9a-f]+)/0xcffff\ lookup\ $INTERFACE ]] && cndc network destroy $(( 0x${BASH_REMATCH[1]} ));
-}
-
-up_if() {
- while [[ $NETID -lt 4096 ]]; do
- NETID="$RANDOM"
- done
- cmd wg set "$INTERFACE" fwmark 0x20000
- cndc interface setcfg "$INTERFACE" up
- cndc network create "$NETID" vpn 1 1
- cndc network interface add "$NETID" "$INTERFACE"
- cndc network users add "$NETID" 0-99999
-}
-
-set_dns() {
- [[ ${#DNS[@]} -eq 0 ]] || cndc resolver setnetdns "$NETID" "" "${DNS[@]}"
-}
-
-add_addr() {
- if [[ $1 == *:* ]]; then
- cndc interface ipv6 "$INTERFACE" enable
- cmd ip -6 addr add "$1" dev "$INTERFACE"
- else
- local ip="${1%%/*}" mask=32
- [[ $1 == */* ]] && mask="${1##*/}"
- cndc interface setcfg "$INTERFACE" "$ip" "$mask"
- fi
-}
-
-set_mtu() {
- local mtu=0 endpoint output
- if [[ -n $MTU ]]; then
- cndc interface setmtu "$INTERFACE" "$MTU"
- return
- fi
- while read -r _ endpoint; do
- [[ $endpoint =~ ^\[?([a-z0-9:.]+)\]?:[0-9]+$ ]] || continue
- output="$(ip route get "${BASH_REMATCH[1]}" || true)"
- [[ ( $output =~ mtu\ ([0-9]+) || ( $output =~ dev\ ([^ ]+) && $(ip link show dev "${BASH_REMATCH[1]}") =~ mtu\ ([0-9]+) ) ) && ${BASH_REMATCH[1]} -gt $mtu ]] && mtu="${BASH_REMATCH[1]}"
- done < <(wg show "$INTERFACE" endpoints)
- if [[ $mtu -eq 0 ]]; then
- read -r output < <(ip route show default || true) || true
- [[ ( $output =~ mtu\ ([0-9]+) || ( $output =~ dev\ ([^ ]+) && $(ip link show dev "${BASH_REMATCH[1]}") =~ mtu\ ([0-9]+) ) ) && ${BASH_REMATCH[1]} -gt $mtu ]] && mtu="${BASH_REMATCH[1]}"
- fi
- [[ $mtu -gt 0 ]] || mtu=1500
- cndc interface setmtu "$INTERFACE" $(( mtu - 80 ))
-}
-
-add_route() {
- cndc network route add "$NETID" "$INTERFACE" "$1"
-}
-
-set_config() {
- cmd wg setconf "$INTERFACE" <(echo "$WG_CONFIG")
-}
-
-cmd_usage() {
- cat >&2 <<-_EOF
- Usage: $PROGRAM [ up | down ] [ CONFIG_FILE | INTERFACE ]
-
- CONFIG_FILE is a configuration file, whose filename is the interface name
- followed by \`.conf'. Otherwise, INTERFACE is an interface name, with
- configuration found at /data/misc/wireguard/INTERFACE.conf. It is to be readable
- by wg(8)'s \`setconf' sub-command, with the exception of the following additions
- to the [Interface] section, which are handled by $PROGRAM:
-
- - Address: may be specified one or more times and contains one or more
- IP addresses (with an optional CIDR mask) to be set for the interface.
- - MTU: an optional MTU for the interface; if unspecified, auto-calculated.
- - DNS: an optional DNS server to use while the device is up.
-
- See wg-quick(8) for more info and examples.
- _EOF
-}
-
-cmd_up() {
- local i
- [[ -z $(ip link show dev "$INTERFACE" 2>/dev/null) ]] || die "\`$INTERFACE' already exists"
- trap 'del_if; exit' INT TERM EXIT
- add_if
- set_config
- set_mtu
- for i in "${ADDRESSES[@]}"; do
- add_addr "$i"
- done
- up_if
- set_dns
- for i in $(while read -r _ i; do for i in $i; do [[ $i =~ ^[0-9a-z:.]+/[0-9]+$ ]] && echo "$i"; done; done < <(wg show "$INTERFACE" allowed-ips) | sort -nr -k 2 -t /); do
- [[ $(ip route get "$i" 2>/dev/null) == *dev\ $INTERFACE\ * ]] || add_route "$i"
- done
- trap - INT TERM EXIT
-}
-
-cmd_down() {
- [[ " $(wg show interfaces) " == *" $INTERFACE "* ]] || die "\`$INTERFACE' is not a WireGuard interface"
- del_if
-}
-
-if [[ $# -eq 1 && ( $1 == --help || $1 == -h || $1 == help ) ]]; then
- cmd_usage
-elif [[ $# -eq 2 && $1 == up ]]; then
- auto_su
- parse_options "$2"
- cmd_up
-elif [[ $# -eq 2 && $1 == down ]]; then
- auto_su
- parse_options "$2"
- cmd_down
-else
- cmd_usage
- exit 1
-fi
-
-exit 0
diff --git a/wg-quick.c b/wg-quick.c
new file mode 100644
index 0000000..0e3cb3d
--- /dev/null
+++ b/wg-quick.c
@@ -0,0 +1,615 @@
+/* SPDX-License-Identifier: GPL-2.0
+ *
+ * Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
+ *
+ * This is a shell script written in C. It very intentionally still functions like
+ * a shell script, calling out to external executables such as ip(8).
+ */
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <stdbool.h>
+#include <string.h>
+#include <strings.h>
+#include <stdarg.h>
+#include <ctype.h>
+#include <time.h>
+#include <unistd.h>
+#include <errno.h>
+#include <regex.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <sys/param.h>
+
+#define _printf_(x, y) __attribute__((format(printf, x, y)))
+#define _cleanup_(x) __attribute__((cleanup(x)))
+#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0]))
+
+static bool is_exiting = false;
+
+static void *xmalloc(size_t size)
+{
+ void *ret = malloc(size);
+ if (ret)
+ return ret;
+ perror("Error: malloc");
+ exit(errno);
+}
+
+static void *xstrdup(const char *str)
+{
+ char *ret = strdup(str);
+ if (ret)
+ return ret;
+ perror("Error: strdup");
+ exit(errno);
+}
+
+static void xregcomp(regex_t *preg, const char *regex, int cflags)
+{
+ char error[4096];
+ int ret;
+
+ ret = regcomp(preg, regex, cflags);
+ if (!ret)
+ return;
+ regerror(ret, preg, error, sizeof(error));
+ fprintf(stderr, "Error: Regex compilation error: %s\n", error);
+ exit(88);
+}
+
+static char *concat(char *first, ...)
+{
+ va_list args;
+ size_t len = 0;
+ char *ret;
+
+ va_start(args, first);
+ for (char *i = first; i; i = va_arg(args, char *))
+ len += strlen(i);
+ va_end(args);
+
+ ret = xmalloc(len + 1);
+ ret[0] = 0;
+
+ va_start(args, first);
+ for (char *i = first; i; i = va_arg(args, char *))
+ strcat(ret, i);
+ va_end(args);
+
+ return ret;
+}
+
+struct command_buffer {
+ char *line;
+ size_t len;
+ FILE *stream;
+};
+
+static void free_command_buffer(struct command_buffer *c)
+{
+ if (!c)
+ return;
+ if (c->stream)
+ pclose(c->stream);
+ free(c->line);
+}
+
+static void freep(void *p)
+{
+ free(*(void **)p);
+}
+static void fclosep(FILE **f)
+{
+ if (*f)
+ fclose(*f);
+}
+#define _cleanup_free_ _cleanup_(freep)
+#define _cleanup_fclose_ _cleanup_(fclosep)
+
+#define DEFINE_CMD(name) _cleanup_(free_command_buffer) struct command_buffer name = { 0 };
+
+static char *vcmd_ret(struct command_buffer *c, const char *cmd_fmt, va_list args)
+{
+ char cmd[8192];
+
+ if (!c->stream && !cmd_fmt)
+ return NULL;
+ if (c->stream && cmd_fmt)
+ pclose(c->stream);
+
+ if (cmd_fmt) {
+ if (vsnprintf(cmd, sizeof(cmd), cmd_fmt, args) >= sizeof(cmd)) {
+ errno = E2BIG;
+ perror("Error: vsnprintf");
+ exit(errno);
+ }
+
+ c->stream = popen(cmd, "r");
+ if (!c->stream) {
+ perror("Error: popen");
+ exit(errno);
+ }
+ }
+ if (getline(&c->line, &c->len, c->stream) < 0) {
+ if (errno) {
+ perror("Error: getline");
+ exit(errno);
+ }
+ return NULL;
+ }
+ return c->line;
+}
+
+_printf_(1, 2) static void cmd(const char *cmd_fmt, ...)
+{
+ char cmd[8192];
+ va_list args;
+ int ret;
+
+ va_start(args, cmd_fmt);
+ if (vsnprintf(cmd, sizeof(cmd), cmd_fmt, args) >= sizeof(cmd)) {
+ errno = E2BIG;
+ perror("Error: vsnprintf");
+ exit(errno);
+ }
+ va_end(args);
+
+ printf("[#] %s\n", cmd);
+ ret = system(cmd);
+
+ if (ret && !is_exiting)
+ exit(ret);
+}
+
+_printf_(2, 3) static char *cmd_ret(struct command_buffer *c, const char *cmd_fmt, ...)
+{
+ va_list args;
+ char *ret;
+
+ va_start(args, cmd_fmt);
+ ret = vcmd_ret(c, cmd_fmt, args);
+ va_end(args);
+ return ret;
+}
+
+_printf_(1, 2) static void cndc(const char *cmd_fmt, ...)
+{
+ DEFINE_CMD(c);
+ char *ret;
+ va_list args;
+ _cleanup_free_ char *ndc_fmt = concat("ndc ", cmd_fmt, NULL);
+
+ va_start(args, cmd_fmt);
+ printf("[#] ");
+ vprintf(ndc_fmt, args);
+ printf("\n");
+ va_end(args);
+
+ va_start(args, cmd_fmt);
+ ret = vcmd_ret(&c, ndc_fmt, args);
+ va_end(args);
+
+ if (!ret || !strstr(ret, "200 0")) {
+ if (ret)
+ fprintf(stderr, "Error: %s\n", ret);
+ exit(29);
+ }
+}
+
+static void auto_su(int argc, char *argv[])
+{
+ char *args[argc + 4];
+
+ if (!getuid())
+ return;
+
+ args[0] = "su";
+ args[1] = "-p";
+ args[2] = "-c";
+ memcpy(&args[3], argv, argc * sizeof(*args));
+ args[argc + 3] = NULL;
+
+ printf("[$] su -p -c wg-quick\n");
+ execvp("su", args);
+ exit(errno);
+}
+
+static void add_if(const char *iface)
+{
+ cmd("ip link add %s type wireguard", iface);
+}
+
+static void del_if(const char *iface)
+{
+ DEFINE_CMD(c);
+ regex_t reg;
+ char *netid = NULL;
+ _cleanup_free_ char *regex = concat("0xc([0-9a-f]+)/0xcffff lookup ", iface, NULL);
+
+ xregcomp(&reg, regex, REG_EXTENDED);
+
+ cmd("ip link del %s", iface);
+ for (char *ret = cmd_ret(&c, "ip rule show"); ret; ret = cmd_ret(&c, NULL)) {
+ regmatch_t matches[2];
+
+ if (!regexec(&reg, ret, ARRAY_SIZE(matches), matches, 0)) {
+ ret[matches[1].rm_eo] = 0;
+ netid = &ret[matches[1].rm_so];
+ break;
+ }
+ }
+
+ if (netid)
+ cndc("network destroy %lu", strtoul(netid, NULL, 16));
+}
+
+static void up_if(unsigned int *netid, const char *iface)
+{
+ srandom(time(NULL) ^ getpid()); /* Not real randomness. */
+
+ while (*netid < 4096)
+ *netid = random() & 0xfffe;
+
+ cmd("wg set %s fwmark 0x20000", iface);
+ cndc("interface setcfg %s up", iface);
+ cndc("network create %u vpn 1 1", *netid);
+ cndc("network interface add %u %s", *netid, iface);
+ cndc("network users add %u 0-99999", *netid);
+}
+
+static void set_dnses(unsigned int netid, const char *dnses)
+{
+ size_t len = strlen(dnses);
+ _cleanup_free_ char *mutable = xstrdup(dnses);
+ _cleanup_free_ char *arglist = xmalloc(len * 4 + 1);
+ _cleanup_free_ char *arg = xmalloc(len + 4);
+
+ if (!len)
+ return;
+ arglist[0] = 0;
+
+ for (char *dns = strtok(mutable, ", \t\n"); dns; dns = strtok(NULL, ", \t\n")) {
+ if (strchr(dns, '\'') || strchr(dns, '\\'))
+ continue;
+ snprintf(arg, len + 3, "'%s' ", dns);
+ strncat(arglist, arg, len * 4 - 1);
+ }
+ if (!strlen(arglist))
+ return;
+ cndc("resolver setnetdns %u '' %s", netid, arglist);
+}
+
+static void add_addr(const char *iface, const char *addr)
+{
+ if (strchr(addr, ':')) {
+ cndc("interface ipv6 %s enable", iface);
+ cmd("ip -6 addr add '%s' dev %s", addr, iface);
+ } else {
+ _cleanup_free_ char *mutable = strdup(addr);
+ char *slash = strchr(mutable, '/');
+ unsigned char mask = 32;
+
+ if (slash) {
+ *slash = 0;
+ mask = atoi(slash + 1);
+ }
+ cndc("interface setcfg %s '%s' %u", iface, mutable, mask);
+ }
+}
+
+static void set_addr(const char *iface, const char *addrs)
+{
+ _cleanup_free_ char *mutable = xstrdup(addrs);
+
+ for (char *addr = strtok(mutable, ", \t\n"); addr; addr = strtok(NULL, ", \t\n")) {
+ if (strchr(addr, '\'') || strchr(addr, '\\'))
+ continue;
+ add_addr(iface, addr);
+ }
+}
+
+static int get_route_mtu(const char *endpoint)
+{
+ DEFINE_CMD(c_route);
+ DEFINE_CMD(c_dev);
+ regmatch_t matches[2];
+ regex_t regex_mtu, regex_dev;
+ char *route, *mtu, *dev;
+
+ xregcomp(&regex_mtu, "mtu ([0-9]+)", REG_EXTENDED);
+ xregcomp(&regex_dev, "dev ([^ ]+)", REG_EXTENDED);
+
+ if (strcmp(endpoint, "default"))
+ route = cmd_ret(&c_route, "ip -o route get %s", endpoint);
+ else
+ route = cmd_ret(&c_route, "ip -o route show %s", endpoint);
+ if (!route)
+ return -1;
+
+ if (!regexec(&regex_mtu, route, ARRAY_SIZE(matches), matches, 0)) {
+ route[matches[1].rm_eo] = 0;
+ mtu = &route[matches[1].rm_so];
+ } else if (!regexec(&regex_dev, route, ARRAY_SIZE(matches), matches, 0)) {
+ route[matches[1].rm_eo] = 0;
+ dev = &route[matches[1].rm_so];
+ route = cmd_ret(&c_dev, "ip -o link show dev %s", dev);
+ if (!route)
+ return -1;
+ if (regexec(&regex_mtu, route, ARRAY_SIZE(matches), matches, 0))
+ return -1;
+ route[matches[1].rm_eo] = 0;
+ mtu = &route[matches[1].rm_so];
+ } else
+ return -1;
+ return atoi(mtu);
+}
+
+static void set_mtu(const char *iface, unsigned int mtu)
+{
+ DEFINE_CMD(c_endpoints);
+ regex_t regex_endpoint;
+ int endpoint_mtu;
+
+ if (mtu) {
+ cndc("interface setmtu %s %u", iface, mtu);
+ return;
+ }
+
+ xregcomp(&regex_endpoint, "^\\[?([a-z0-9:.]+)\\]?:[0-9]+$", REG_EXTENDED);
+
+ endpoint_mtu = get_route_mtu("default");
+ if (endpoint_mtu == -1)
+ endpoint_mtu = 1500;
+
+ for (char *endpoint = cmd_ret(&c_endpoints, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c_endpoints, NULL)) {
+ regmatch_t matches[2];
+ unsigned int next_mtu;
+
+ if (regexec(&regex_endpoint, endpoint, ARRAY_SIZE(matches), matches, 0))
+ continue;
+ endpoint[matches[1].rm_eo] = 0;
+ endpoint = &endpoint[matches[1].rm_so];
+
+ next_mtu = get_route_mtu(endpoint);
+ if (next_mtu > 0 && next_mtu < endpoint_mtu)
+ endpoint_mtu = next_mtu;
+ }
+
+ cndc("interface setmtu %s %d", iface, endpoint_mtu - 80);
+}
+
+static void add_route(const char *iface, unsigned int netid, const char *route)
+{
+ cndc("network route add %u %s %s", netid, iface, route);
+}
+
+static void set_routes(const char *iface, unsigned int netid)
+{
+ DEFINE_CMD(c);
+
+ for (char *allowedips = cmd_ret(&c, "wg show %s allowed-ips", iface); allowedips; allowedips = cmd_ret(&c, NULL)) {
+ char *start = strchr(allowedips, '\t');
+ if (!start)
+ continue;
+ ++start;
+ for (char *allowedip = strtok(start, " \n"); allowedip; allowedip = strtok(NULL, " \n"))
+ add_route(iface, netid, allowedip);
+ }
+}
+
+static void set_config(const char *iface, const char *config)
+{
+ FILE *config_writer;
+ _cleanup_free_ char *cmd = concat("wg setconf ", iface, " /proc/self/fd/0", NULL);
+
+ printf("[#] %s\n", cmd);
+
+ config_writer = popen(cmd, "w");
+ if (!config_writer) {
+ perror("Error: popen");
+ exit(errno);
+ }
+ if (fputs(config, config_writer) < 0) {
+ perror("Error: fputs");
+ exit(errno);
+ }
+ pclose(config_writer);
+}
+
+static void cmd_usage(const char *program)
+{
+ printf( "Usage: %s [ up | down ] [ CONFIG_FILE | INTERFACE ]\n"
+ "\n"
+ " CONFIG_FILE is a configuration file, whose filename is the interface name\n"
+ " followed by `.conf'. Otherwise, INTERFACE is an interface name, with\n"
+ " configuration found at /data/misc/wireguard/INTERFACE.conf. It is to be readable\n"
+ " by wg(8)'s `setconf' sub-command, with the exception of the following additions\n"
+ " to the [Interface] section, which are handled by %s:\n"
+ "\n"
+ " - Address: may be specified one or more times and contains one or more\n"
+ " IP addresses (with an optional CIDR mask) to be set for the interface.\n"
+ " - MTU: an optional MTU for the interface; if unspecified, auto-calculated.\n"
+ " - DNS: an optional DNS server to use while the device is up.\n"
+ "\n"
+ "See wg-quick(8) for more info and examples.\n", program, program);
+}
+
+static char *cleanup_iface = NULL;
+
+static void cmd_up_cleanup(void)
+{
+ is_exiting = true;
+ if (cleanup_iface)
+ del_if(cleanup_iface);
+ free(cleanup_iface);
+}
+
+static void cmd_up(const char *iface, const char *config, unsigned int mtu, const char *addrs, const char *dnses)
+{
+ DEFINE_CMD(c);
+ unsigned int netid = 0;
+
+ if (cmd_ret(&c, "ip link show dev %s 2>/dev/null", iface)) {
+ fprintf(stderr, "Error: %s already exists\n", iface);
+ exit(92);
+ }
+
+ cleanup_iface = xstrdup(iface);
+ atexit(cmd_up_cleanup);
+
+ add_if(iface);
+ set_config(iface, config);
+ set_mtu(iface, mtu);
+ set_addr(iface, addrs);
+ up_if(&netid, iface);
+ set_dnses(netid, dnses);
+ set_routes(iface, netid);
+
+ free(cleanup_iface);
+ cleanup_iface = NULL;
+ exit(0);
+}
+
+static void cmd_down(const char *iface)
+{
+ DEFINE_CMD(c);
+ bool found = false;
+
+ char *ifaces = cmd_ret(&c, "wg show interfaces");
+ if (ifaces) {
+ for (char *eiface = strtok(ifaces, " \n"); eiface; eiface = strtok(NULL, " \n")) {
+ if (!strcmp(iface, eiface)) {
+ found = true;
+ break;
+ }
+ }
+ }
+ if (!found) {
+ fprintf(stderr, "Error: %s is not a WireGuard interface\n", iface);
+ exit(43);
+ }
+
+ del_if(iface);
+ exit(0);
+}
+
+static char *concat_and_free(char *orig, const char *delim, const char *new_line)
+{
+ char *ret;
+
+ if (!orig)
+ ret = xstrdup(new_line);
+ else
+ ret = concat(orig, delim, new_line, NULL);
+ free(orig);
+ return ret;
+}
+
+static void parse_options(char **iface, char **config, unsigned int *mtu, char **addrs, char **dnses, const char *arg)
+{
+ _cleanup_fclose_ FILE *file = NULL;
+ char filename[PATH_MAX + 1], *line = NULL;
+ regex_t regex_iface, regex_conf;
+ regmatch_t matches[2];
+ struct stat sbuf;
+ size_t n = 0;
+ bool in_interface_section = false;
+
+ *iface = *config = *addrs = *dnses = NULL;
+ *mtu = 0;
+
+ xregcomp(&regex_iface, "^[a-zA-Z0-9_=+.-]{1,16}$", REG_EXTENDED | REG_NOSUB);
+ xregcomp(&regex_conf, "/?([a-zA-Z0-9_=+.-]{1,16})\\.conf$", REG_EXTENDED);
+
+ filename[sizeof(filename) - 1] = 0;
+ if (!regexec(&regex_iface, arg, 0, NULL, 0))
+ snprintf(filename, sizeof(filename) - 1, "/data/misc/wireguard/%s.conf", arg);
+ else
+ strncpy(filename, arg, sizeof(filename) - 1);
+
+ file = fopen(filename, "r");
+ if (!file) {
+ fprintf(stderr, "Error: Unable to open configuration file `%s': %s\n", filename, strerror(errno));
+ exit(errno);
+ }
+
+ if (regexec(&regex_conf, filename, ARRAY_SIZE(matches), matches, 0)) {
+ fprintf(stderr, "Error: The config file must be a valid interface name, followed by .conf\n");
+ exit(77);
+ }
+
+ if (fstat(fileno(file), &sbuf) < 0) {
+ perror("Error: fstat");
+ exit(errno);
+ }
+ if (sbuf.st_mode & 0007)
+ fprintf(stderr, "Warning: `%s' is world accessible\n", filename);
+
+ filename[matches[1].rm_eo] = 0;
+ *iface = xstrdup(&filename[matches[1].rm_so]);
+
+ while (getline(&line, &n, file) >= 0) {
+ size_t len = strlen(line), j = 0;
+ _cleanup_free_ char *clean = xmalloc(len + 1);
+
+ for (size_t i = 0; i < len; ++i) {
+ if (!isspace(line[i]))
+ clean[j++] = line[i];
+ }
+ clean[j] = 0;
+ len = strlen(clean);
+
+ if (clean[0] == '[')
+ in_interface_section = false;
+ if (!strcasecmp(clean, "[Interface]"))
+ in_interface_section = true;
+ if (in_interface_section) {
+ if (!strncasecmp(clean, "Address=", 8) && len > 8) {
+ *addrs = concat_and_free(*addrs, ",", clean + 8);
+ continue;
+ } else if (!strncasecmp(clean, "DNS=", 4) && len > 4) {
+ *dnses = concat_and_free(*dnses, ",", clean + 4);
+ continue;
+ } else if (!strncasecmp(clean, "MTU=", 4) && len > 4) {
+ *mtu = atoi(clean + 4);
+ continue;
+ }
+ }
+ *config = concat_and_free(*config, "", line);
+ }
+
+ if (!*iface)
+ *iface = xstrdup("");
+ if (!*config)
+ *config = xstrdup("");
+ if (!*addrs)
+ *addrs = xstrdup("");
+ if (!*dnses)
+ *dnses = xstrdup("");
+}
+
+int main(int argc, char *argv[])
+{
+ _cleanup_free_ char *iface = NULL;
+ _cleanup_free_ char *config = NULL;
+ _cleanup_free_ char *addrs = NULL;
+ _cleanup_free_ char *dnses = NULL;
+ unsigned int mtu;
+
+ if (argc == 2 && (!strcmp(argv[1], "help") || !strcmp(argv[1], "--help") || !strcmp(argv[1], "-h")))
+ cmd_usage(argv[0]);
+ else if (argc == 3 && !strcmp(argv[1], "up")) {
+ auto_su(argc, argv);
+ parse_options(&iface, &config, &mtu, &addrs, &dnses, argv[2]);
+ cmd_up(iface, config, mtu, addrs, dnses);
+ } else if (argc == 3 && !strcmp(argv[1], "down")) {
+ auto_su(argc, argv);
+ parse_options(&iface, &config, &mtu, &addrs, &dnses, argv[2]);
+ cmd_down(iface);
+ } else {
+ cmd_usage(argv[0]);
+ return 1;
+ }
+ return 0;
+}