aboutsummaryrefslogtreecommitdiffstats
path: root/client.c
blob: 6bdd48051f62238f42a6e6462176d03359f382f4 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
/* SPDX-License-Identifier: MIT */
/*
 * Copyright (C) 2018 Wireguard LLC
 */

#include <stdlib.h>
#include <stdbool.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include "wireguard.h"
#include "protocol.h"
#include "client.h"

bool is_server_in_allowed_ips(const char iface[])
{
	unsigned __int128 server_addr;
	unsigned __int128 subnet_mask;
	unsigned __int128 allowed_ip6;
	wg_device *device;
	wg_allowedip *allowedip;
	int ret;

	inet_pton(AF_INET6, WG_DYNAMIC_SERVER_IP, &server_addr);

	ret = wg_get_device(&device, iface);
	if (ret < 0) {
		wg_free_device(device);
		return false;
	}

	wg_for_each_allowedip(device->first_peer, allowedip)
	{
		if (allowedip->family == AF_INET6) {
			memset(&subnet_mask, 0xFF, sizeof(unsigned __int128));
			memcpy(&allowed_ip6, &allowedip->ip6,
			       sizeof(unsigned __int128));
			subnet_mask <<= allowedip->cidr;
			server_addr &= subnet_mask;
			allowed_ip6 &= subnet_mask;
			if (server_addr == allowed_ip6) {
				wg_free_device(device);
				return true;
			}
		}
	}
	wg_free_device(device);
	return false;
}

int connect_to_server()
{
	int sock = -1;
	int ret;
	struct sockaddr_in6 addr;

	sock = socket(AF_INET6, SOCK_STREAM, 0);
	if (sock < 0) {
		return -errno;
	}
	addr.sin6_family = AF_INET6;
	addr.sin6_port = htons(WG_DYNAMIC_SERVER_PORT);
	inet_pton(AF_INET6, WG_DYNAMIC_SERVER_IP, &addr.sin6_addr);
	ret = connect(sock, (struct sockaddr *)&addr, sizeof(addr));
	if (ret < 0) {
		return -errno;
	}

	return sock;
}

int close_connection(int sock)
{
	int ret;
	ret = close(sock);
	if (ret < 0) {
		return -errno;
	}
	return 0;
}