Files
NetworkManager/libnm/nm-device-wireguard.c
Thomas Haller 3b69f02164 all: unify format of our Copyright source code comments
```bash

readarray -d '' FILES < <(
  git ls-files -z \
    ':(exclude)po' \
    ':(exclude)shared/c-rbtree' \
    ':(exclude)shared/c-list' \
    ':(exclude)shared/c-siphash' \
    ':(exclude)shared/c-stdaux' \
    ':(exclude)shared/n-acd' \
    ':(exclude)shared/n-dhcp4' \
    ':(exclude)src/systemd/src' \
    ':(exclude)shared/systemd/src' \
    ':(exclude)m4' \
    ':(exclude)COPYING*'
  )

sed \
  -e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) *[-–] *\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C1pyright#\5 - \7#\9/' \
  -e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) *[,] *\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C2pyright#\5, \7#\9/' \
  -e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C3pyright#\5#\7/' \
  -e 's/^Copyright \(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/C4pyright#\1#\3/' \
  -i \
  "${FILES[@]}"

echo ">>> untouched Copyright lines"
git grep Copyright "${FILES[@]}"

echo ">>> Copyright lines with unusual extra"
git grep '\<C[0-9]pyright#' "${FILES[@]}" | grep -i reserved

sed \
  -e 's/\<C[0-9]pyright#\([^#]*\)#\(.*\)$/Copyright (C) \1 \2/' \
  -i \
  "${FILES[@]}"

```

https://gitlab.freedesktop.org/NetworkManager/NetworkManager/merge_requests/298
2019-10-02 17:03:52 +02:00

207 lines
5.1 KiB
C

// SPDX-License-Identifier: LGPL-2.1+
/*
* Copyright (C) 2018 Javier Arteaga <jarteaga@jbeta.is>
*/
#include "nm-default.h"
#include "nm-device-wireguard.h"
#include "nm-object-private.h"
typedef struct {
GBytes *public_key;
guint listen_port;
guint fwmark;
} NMDeviceWireGuardPrivate;
/**
* NMDeviceWireGuard:
*/
struct _NMDeviceWireGuard {
NMDevice parent;
};
struct _NMDeviceWireGuardClass {
NMDeviceClass parent;
};
G_DEFINE_TYPE (NMDeviceWireGuard, nm_device_wireguard, NM_TYPE_DEVICE)
#define NM_DEVICE_WIREGUARD_GET_PRIVATE(o) (G_TYPE_INSTANCE_GET_PRIVATE ((o), NM_TYPE_DEVICE_WIREGUARD, NMDeviceWireGuardPrivate))
NM_GOBJECT_PROPERTIES_DEFINE_BASE (
PROP_PUBLIC_KEY,
PROP_LISTEN_PORT,
PROP_FWMARK,
);
/**
* nm_device_wireguard_get_public_key:
* @device: a #NMDeviceWireGuard
*
* Gets the public key for this interface
*
* Returns: (transfer none): the #GBytes containing the 32-byte public key
*
* Since: 1.14
**/
GBytes *
nm_device_wireguard_get_public_key (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), NULL);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->public_key;
}
/**
* nm_device_wireguard_get_listen_port:
* @device: a #NMDeviceWireGuard
*
* Gets the local UDP port this interface listens on
*
* Returns: UDP listen port
*
* Since: 1.14
**/
guint16
nm_device_wireguard_get_listen_port (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), 0);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->listen_port;
}
/**
* nm_device_wireguard_get_fwmark:
* @device: a #NMDeviceWireGuard
*
* Gets the fwmark (firewall mark) for this interface.
* It can be used to set routing policy for outgoing encrypted packets.
* See: ip-rule(8)
*
* Returns: 0 if fwmark not in use, 32-bit fwmark value otherwise
*
* Since: 1.14
**/
guint32
nm_device_wireguard_get_fwmark (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), 0);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->fwmark;
}
/***********************************************************/
static void
get_property (GObject *object,
guint prop_id,
GValue *value,
GParamSpec *pspec)
{
NMDeviceWireGuard *device = NM_DEVICE_WIREGUARD (object);
switch (prop_id) {
case PROP_PUBLIC_KEY:
g_value_set_boxed (value, nm_device_wireguard_get_public_key (device));
break;
case PROP_LISTEN_PORT:
g_value_set_uint (value, nm_device_wireguard_get_listen_port (device));
break;
case PROP_FWMARK:
g_value_set_uint (value, nm_device_wireguard_get_fwmark (device));
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
}
}
static void
nm_device_wireguard_init (NMDeviceWireGuard *device)
{
}
static void
init_dbus (NMObject *object)
{
NMDeviceWireGuardPrivate *priv = NM_DEVICE_WIREGUARD_GET_PRIVATE (object);
const NMPropertiesInfo property_info[] = {
{ NM_DEVICE_WIREGUARD_PUBLIC_KEY, &priv->public_key },
{ NM_DEVICE_WIREGUARD_LISTEN_PORT, &priv->listen_port },
{ NM_DEVICE_WIREGUARD_FWMARK, &priv->fwmark },
{ NULL }
};
NM_OBJECT_CLASS (nm_device_wireguard_parent_class)->init_dbus (object);
_nm_object_register_properties (object,
NM_DBUS_INTERFACE_DEVICE_WIREGUARD,
property_info);
}
static void
finalize (GObject *object)
{
NMDeviceWireGuardPrivate *priv = NM_DEVICE_WIREGUARD_GET_PRIVATE (object);
g_bytes_unref (priv->public_key);
G_OBJECT_CLASS (nm_device_wireguard_parent_class)->finalize (object);
}
static void
nm_device_wireguard_class_init (NMDeviceWireGuardClass *wireguard_class)
{
GObjectClass *object_class = G_OBJECT_CLASS (wireguard_class);
NMObjectClass *nm_object_class = NM_OBJECT_CLASS (wireguard_class);
g_type_class_add_private (wireguard_class, sizeof (NMDeviceWireGuardPrivate));
object_class->get_property = get_property;
object_class->finalize = finalize;
nm_object_class->init_dbus = init_dbus;
/**
* NMDeviceWireGuard:public-key:
*
* 32-byte public key, derived from the current private key.
*
* Since: 1.14
**/
obj_properties[PROP_PUBLIC_KEY] =
g_param_spec_boxed (NM_DEVICE_WIREGUARD_PUBLIC_KEY, "", "",
G_TYPE_BYTES,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
/**
* NMDeviceWireGuard:listen-port:
*
* Local UDP listen port.
* Set to 0 to allow a random port to be chosen (default).
*
* Since: 1.14
**/
obj_properties[PROP_LISTEN_PORT] =
g_param_spec_uint (NM_DEVICE_WIREGUARD_LISTEN_PORT, "", "",
0, G_MAXUINT16, 0,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
/**
* NMDeviceWireGuard:fwmark:
*
* Optional firewall mark - see ip-rule(8).
* Used when setting routing policy for outgoing encrypted packets.
* Set to 0 to disable the mark (default).
*
* Since: 1.14
**/
obj_properties[PROP_FWMARK] =
g_param_spec_uint (NM_DEVICE_WIREGUARD_FWMARK, "", "",
0, G_MAXUINT32, 0,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
g_object_class_install_properties (object_class, _PROPERTY_ENUMS_LAST, obj_properties);
}