aboutsummaryrefslogtreecommitdiffstats
path: root/Sources/WireGuardKitGo/go.sum
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2021-06-16 17:09:40 +0200
committerJason A. Donenfeld <Jason@zx2c4.com>2021-06-16 17:40:12 +0200
commit23bf3cfccb5a6fa9faf85c35ca24ec4c3e29c3fe (patch)
tree17fdcb0327ab8bcf03da407beabef80c8702f17b /Sources/WireGuardKitGo/go.sum
parentKit: Adapter: iterate through all FDs to find UTUN (diff)
downloadwireguard-apple-23bf3cfccb5a6fa9faf85c35ca24ec4c3e29c3fe.tar.xz
wireguard-apple-23bf3cfccb5a6fa9faf85c35ca24ec4c3e29c3fe.zip
Kit: Adapter: use more reliable utun detection technique
Rather than hoping that the AF_SYSTEM fd is of type utun, and then calling "2" on it to get the name -- which could be defined as something else for a different AF_SYSTEM socket type -- instead simply query the AF_SYSTEM control socket ID with getpeername. This has one catch, which is that the ID is dynamically allocated, so we resolve it using the qualified name. Normally we'd make a new AF_SYSTEM socket for this, but since that's not allowed in the sandbox, we reuse the AF_SYSTEM socket that we're checking. At this point in the flow, we know that it's a proper AF_SYSTEM one, based on the first sockaddr member; we just don't know that it's a utun variety. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'Sources/WireGuardKitGo/go.sum')
0 files changed, 0 insertions, 0 deletions