/* * Copyright (c) 2022 Intel and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #define vl_typedefs #define vl_endianfun /* Include the (first) vlib-api API definition layer */ #include /* Include the current layer (third) vpp API definition layer */ #include #include #include #include #include #include #include #include #undef vl_typedefs #undef vl_endianfun #include "kernel_vpp_ipsec.h" #include "kernel_vpp_shared.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define PRIO_BASE 384 u32 natt_port; /** * One and only instance of the daemon. */ daemon_t *charon; typedef struct private_kernel_vpp_ipsec_t private_kernel_vpp_ipsec_t; /** * Private variables of kernel_vpp_ipsec class. */ struct private_kernel_vpp_ipsec_t { /** * Public interface */ kernel_vpp_ipsec_t public; /** * Next security association database entry ID to allocate */ refcount_t next_sad_id; /** * Next security policy database entry ID to allocate */ refcount_t next_spd_id; /** * Mutex to lock access to installed policies */ mutex_t *mutex; /** * Hash table of instaled SA, as kernel_ipsec_sa_id_t => sa_t */ hashtable_t *sas; /** * Hash table of security policy databases, as nterface => spd_t */ hashtable_t *spds; /** * Linked list of installed routes */ linked_list_t *routes; /** * Next SPI to allocate */ refcount_t nextspi; /** * Mix value to distribute SPI allocation randomly */ uint32_t mixspi; /** * Whether to install routes along policies */ bool install_routes; /** * Whether to install SAs with tunnel flag. Disabling this can be useful * in some scenarios e.g. using SAs to "ipsec tunnel protect" for the * route-based IPsec */ bool use_tunnel_mode_sa; }; /** * Security association entry */ typedef struct { /** VPP SA ID */ uint32_t sa_id; uint32_t stat_index; } sa_t; /** * Security policy database */ typedef struct { /** VPP SPD ID */ uint32_t spd_id; /** Networking interface ID restricting policy */ uint32_t sw_if_index; /** Policy count for this SPD */ refcount_t policy_num; } spd_t; /** * Installed route */ typedef struct { /** Name of the interface the route is bound to */ char *if_name; /** Gateway of route */ host_t *gateway; /** Destination network of route */ host_t *dst_net; /** Prefix length of dst_net */ uint8_t prefixlen; /** References for route */ refcount_t refs; } route_entry_t; #define htonll(x) \ ((1 == htonl (1)) ? \ (x) : \ ((uint64_t) htonl ((x) &0xFFFFFFFF) << 32) | htonl ((x) >> 32)) #define ntohll(x) \ ((1 == ntohl (1)) ? \ (x) : \ ((uint64_t) ntohl ((x) &0xFFFFFFFF) << 32) | ntohl ((x) >> 32)) CALLBACK (route_equals, bool, route_entry_t *a, va_list args) { host_t *dst_net, *gateway; uint8_t *prefixlen; char *if_name; VA_ARGS_VGET (args, if_name, gateway, dst_net, prefixlen); return a->if_name && if_name && streq (a->if_name, if_name) && a->gateway->ip_equals (a->gateway, gateway) && a->dst_net->ip_equals (a->dst_net, dst_net) && a->prefixlen == *prefixlen; } /** * Clean up a route entry */ static void route_destroy (route_entry_t *this) { this->dst_net->destroy (this->dst_net); this->gateway->destroy (this->gateway); free (this->if_name); free (this); } static uint32_t get_sw_if_index (); static int set_arp (char *ipStr, char *if_name, bool add) { char *out = NULL; int out_len = 0; vl_api_ip_neighbor_add_del_t *mp; vl_api_ip_neighbor_add_del_reply_t *rmp; int rc = SUCCESS; uint32_t sw_if_index = ~0; FILE *fp; int nread = 0; ssize_t len = 0; char *buffer = NULL; char buf[2][20]; char *file = "/proc/net/arp"; unsigned char mac[8] = { 0, }; uint32_t addr; if (if_name == NULL || ipStr == NULL) { DBG2 (DBG_KNL, "para is null\n"); rc = FAILED; } DBG2 (DBG_KNL, "from kernel read mac\n"); mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); sw_if_index = get_sw_if_index (if_name); if (sw_if_index == ~0) { DBG1 (DBG_KNL, "sw_if_index for %s not found", if_name); goto error; } fp = fopen (file, "rb"); while ((nread = getline (&buffer, &len, fp)) != -1) { sscanf (buffer, "%s %*s %*s %s %*s %*s", &buf[0], &buf[1]); inet_aton (&buf[0], &addr); if (addr == *((u32 *) (ipStr))) { sscanf (buf[1], "%02x:%02x:%02x:%02x:%02x:%02x", &mac[0], &mac[1], &mac[2], &mac[3], &mac[4], &mac[5]); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ip_neighbor_add_del_0607c257"); mp->_vl_msg_id = htons (msg_id); mp->is_add = add; memcpy (mp->neighbor.ip_address.un.ip4, (u8 *) &addr, sizeof (addr)); mp->neighbor.ip_address.af = 0; memcpy (mp->neighbor.mac_address, mac, 6); mp->neighbor.sw_if_index = htonl (sw_if_index); mp->neighbor.flags = 1; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s neighbor entry", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s neighbor add rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } fclose (fp); return rc; } } return rc; error: free (out); vl_msg_api_free (mp); return rc; } static int add_Route (char *ipAddr, int len, char *mask, char *gateWay) { int fd; int rc = SUCCESS; struct sockaddr_in _sin; struct sockaddr_in *sin = &_sin; struct rtentry rt; do { fd = socket (AF_INET, SOCK_DGRAM, 0); if (fd < 0) { DBG2 (DBG_KNL, "addRoute: socket error\n"); rc = FAILED; break; } memset (&rt, 0, sizeof (struct rtentry)); memset (sin, 0, sizeof (struct sockaddr_in)); sin->sin_family = AF_INET; sin->sin_port = 0; if (inet_aton (gateWay, &sin->sin_addr) < 0) { rc = FAILED; break; } memcpy (&rt.rt_gateway, sin, sizeof (struct sockaddr_in)); ((struct sockaddr_in *) &rt.rt_dst)->sin_family = AF_INET; memcpy (&((struct sockaddr_in *) &rt.rt_dst)->sin_addr, ipAddr, len); ((struct sockaddr_in *) &rt.rt_genmask)->sin_family = AF_INET; if (inet_aton (mask, &((struct sockaddr_in *) &rt.rt_genmask)->sin_addr) < 0) { rc = FAILED; break; } rt.rt_flags = RTF_GATEWAY; if (ioctl (fd, SIOCADDRT, &rt) < 0) { rc = FAILED; } } while (0); close (fd); return rc; } static int set_address (u32 ipAddr, u32 sw_if_index, bool add) { char *out = NULL; int out_len = 0; vl_api_sw_interface_add_del_address_t *mp; vl_api_sw_interface_add_del_address_reply_t *rmp; int rc = SUCCESS; uint32_t addr; mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "sw_interface_add_del_address_5463d73b"); mp->_vl_msg_id = htons (msg_id); mp->is_add = add; memcpy (mp->prefix.address.un.ip4, (u8 *) &ipAddr, sizeof (ipAddr)); mp->prefix.len = 24; mp->sw_if_index = sw_if_index; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG2 (DBG_KNL, "vac %s neighbor entry", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG2 (DBG_KNL, "%s neighbor add rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } return rc; error: free (out); vl_msg_api_free (mp); return rc; } /** * (Un)-install a single route */ static void manage_route (private_kernel_vpp_ipsec_t *this, bool add, traffic_selector_t *dst_ts, host_t *src, host_t *dst) { host_t *dst_net, *gateway; uint8_t prefixlen; char *if_name; route_entry_t *route; bool route_exist = FALSE; char *netmask = "255.255.255.0"; char *tap_gateway = "1.1.1.1"; int arp_rc = 0; if (dst->is_anyaddr (dst)) { return; } gateway = charon->kernel->get_nexthop (charon->kernel, dst, -1, NULL, &if_name); dst_ts->to_subnet (dst_ts, &dst_net, &prefixlen); if (!if_name) { if (src->is_anyaddr (src)) { return; } if (!charon->kernel->get_interface (charon->kernel, src, &if_name)) { return; } } route_exist = this->routes->find_first (this->routes, route_equals, (void **) &route, if_name, gateway, dst_net, &prefixlen); if (add) { DBG2 (DBG_KNL, "installing route: %H/%d via %H dev %s", dst_net, prefixlen, gateway, if_name); if (route_exist) { unsigned int refs_num = ref_get (&route->refs); DBG2 (DBG_KNL, "add route but it exist %d", refs_num); } else { INIT (route, .if_name = strdup (if_name), .gateway = gateway->clone (gateway), .dst_net = dst_net->clone (dst_net), .prefixlen = prefixlen, .refs = 1, ); this->routes->insert_last (this->routes, route); charon->kernel->add_route (charon->kernel, dst_net->get_address (dst_net), prefixlen, gateway, dst, if_name, 1); } add_Route (dst_net->get_address (dst_net).ptr, dst_net->get_address (dst_net).len, netmask, tap_gateway); arp_rc = set_arp (gateway->get_address (gateway).ptr, if_name, TRUE); if (arp_rc) DBG2 (DBG_KNL, "arpGet success!\n"); } else { DBG2 (DBG_KNL, "uninstalling route: %H/%d via %H dev %s", dst_net, prefixlen, gateway, if_name); if (!route_exist) { DBG2 (DBG_KNL, "del route but it not exist"); return; } if (ref_put (&route->refs)) { this->routes->remove (this->routes, route, NULL); route_destroy (route); charon->kernel->del_route (charon->kernel, dst_net->get_address (dst_net), prefixlen, gateway, dst, if_name, 1); } } } /** * Hash function for IPsec SA */ static u_int sa_hash (kernel_ipsec_sa_id_t *sa) { return chunk_hash_inc ( sa->src->get_address (sa->src), chunk_hash_inc ( sa->dst->get_address (sa->dst), chunk_hash_inc (chunk_from_thing (sa->spi), chunk_hash (chunk_from_thing (sa->proto))))); } /** * Equality function for IPsec SA */ static bool sa_equals (kernel_ipsec_sa_id_t *sa, kernel_ipsec_sa_id_t *other_sa) { return sa->src->ip_equals (sa->src, other_sa->src) && sa->dst->ip_equals (sa->dst, other_sa->dst) && sa->spi == other_sa->spi && sa->proto == other_sa->proto; } /** * Equality function for policy SPD */ static bool policy_equals (vl_api_ipsec_spd_entry_t *policy, vl_api_ipsec_spd_entry_t *other_policy) { /* change protocol due to legacy implementation of ANY protocol inside VPP */ if (other_policy->protocol == 255) other_policy->protocol = 0; /* return true if both policies are equal */ return !memcmp (policy, other_policy, sizeof (*policy)); } /** * Hash function for interface */ static u_int interface_hash (char *interface) { return chunk_hash (chunk_from_str (interface)); } /** * Equality function for interface */ static bool interface_equals (char *interface1, char *interface2) { return streq (interface1, interface2); } /** * Map an integer x with a one-to-one function using quadratic residues */ static u_int permute (u_int x, u_int p) { u_int qr; x = x % p; qr = ((uint64_t) x * x) % p; if (x <= p / 2) { return qr; } return p - qr; } /** * Initialize seeds for SPI generation */ static bool init_spi (private_kernel_vpp_ipsec_t *this) { bool ok = TRUE; rng_t *rng; rng = lib->crypto->create_rng (lib->crypto, RNG_STRONG); if (!rng) { return FALSE; } ok = rng->get_bytes (rng, sizeof (this->nextspi), (uint8_t *) &this->nextspi); if (ok) { ok = rng->get_bytes (rng, sizeof (this->mixspi), (uint8_t *) &this->mixspi); } rng->destroy (rng); return ok; } /** * Calculate policy priority */ static uint32_t calculate_priority (policy_priority_t policy_priority, traffic_selector_t *src, traffic_selector_t *dst) { uint32_t priority = PRIO_BASE; uint16_t port; uint8_t mask, proto; host_t *net; switch (policy_priority) { case POLICY_PRIORITY_FALLBACK: priority <<= 1; /* fall-through */ case POLICY_PRIORITY_ROUTED: priority <<= 1; /* fall-through */ case POLICY_PRIORITY_DEFAULT: priority <<= 1; /* fall-through */ case POLICY_PRIORITY_PASS: break; } /* calculate priority based on selector size, small size = high prio */ src->to_subnet (src, &net, &mask); priority -= mask; proto = src->get_protocol (src); port = net->get_port (net); net->destroy (net); dst->to_subnet (dst, &net, &mask); priority -= mask; proto = max (proto, dst->get_protocol (dst)); port = max (port, net->get_port (net)); net->destroy (net); priority <<= 2; /* make some room for the two flags */ priority += port ? 0 : 2; priority += proto ? 0 : 1; return priority; } /** * Get sw_if_index from interface name */ static uint32_t get_sw_if_index (char *interface) { char *out = NULL; int out_len, name_filter_len = 0, msg_len = 0; vl_api_sw_interface_dump_t *mp; vl_api_sw_interface_details_t *rmp; uint32_t sw_if_index = ~0; name_filter_len = strlen (interface); msg_len = sizeof (*mp) + name_filter_len; mp = vl_msg_api_alloc (msg_len); clib_memset (mp, 0, msg_len); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "sw_interface_dump_aa610c27"); mp->_vl_msg_id = htons (msg_id); mp->name_filter_valid = TRUE; mp->name_filter.length = htonl (name_filter_len); memcpy ((char *) mp->name_filter.buf, interface, name_filter_len); if (vac->send (vac, (char *) mp, msg_len, &out, &out_len)) { goto error; } if (!out_len) { goto error; } rmp = (vl_api_sw_interface_details_t *) out; sw_if_index = ntohl (rmp->sw_if_index); error: free (out); vl_msg_api_free (mp); return sw_if_index; } /** * (Un)-install a security policy database */ static status_t spd_add_del (bool add, uint32_t spd_id) { char *out = NULL; int out_len; vl_api_ipsec_spd_add_del_t *mp; vl_api_ipsec_spd_add_del_reply_t *rmp; status_t rv = FAILED; mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_add_del_20e89a95"); mp->_vl_msg_id = htons (msg_id); mp->is_add = add; mp->spd_id = htonl (spd_id); if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } rv = SUCCESS; error: free (out); vl_msg_api_free (mp); return rv; } /** * Enable or disable SPD on an insterface */ static status_t interface_add_del_spd (bool add, uint32_t spd_id, uint32_t sw_if_index) { char *out = NULL; int out_len; vl_api_ipsec_interface_add_del_spd_t *mp; vl_api_ipsec_interface_add_del_spd_reply_t *rmp; status_t rv = FAILED; mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_interface_add_del_spd_80f80cbb"); mp->_vl_msg_id = htons (msg_id); mp->is_add = add; mp->spd_id = htonl (spd_id); mp->sw_if_index = htonl (sw_if_index); if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s interface SPD failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s interface SPD failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } rv = SUCCESS; error: free (out); vl_msg_api_free (mp); return rv; } static int bypass_all (bool add, uint32_t spd_id, uint32_t sa_id) { vl_api_ipsec_spd_entry_add_del_t *mp; vl_api_ipsec_spd_entry_add_del_reply_t *rmp; char *out = NULL; int out_len; status_t rv = FAILED; DBG2 (DBG_KNL, "bypass_all [%s] spd_id %d sa_id %d", add ? "ADD" : "DEL", spd_id, sa_id); mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411"); mp->_vl_msg_id = ntohs (msg_id); mp->is_add = add; mp->entry.sa_id = ntohl (sa_id); mp->entry.spd_id = ntohl (spd_id); mp->entry.priority = ntohl (INT_MAX - POLICY_PRIORITY_PASS - 1); mp->entry.is_outbound = 0; mp->entry.policy = ntohl (IPSEC_API_SPD_ACTION_BYPASS); memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16); memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16); mp->entry.remote_port_start = mp->entry.local_port_start = ntohs (0); mp->entry.remote_port_stop = mp->entry.local_port_stop = ntohs (0xFFFF); mp->entry.protocol = IP_API_PROTO_ESP; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } mp->entry.is_outbound = 1; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } mp->entry.is_outbound = 0; mp->entry.protocol = IP_API_PROTO_AH; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } mp->entry.is_outbound = 1; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } rv = SUCCESS; error: if (out) free (out); vl_msg_api_free (mp); return rv; } static int bypass_port (bool add, uint32_t spd_id, uint32_t sa_id, uint16_t port) { vl_api_ipsec_spd_entry_add_del_t *mp; vl_api_ipsec_spd_entry_add_del_reply_t *rmp; char *out = NULL; int out_len; status_t rv = FAILED; mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411"); mp->_vl_msg_id = ntohs (msg_id); mp->is_add = add; mp->entry.sa_id = ntohl (sa_id); mp->entry.spd_id = ntohl (spd_id); mp->entry.priority = ntohl (INT_MAX - POLICY_PRIORITY_PASS - 1); mp->entry.policy = ntohl (IPSEC_API_SPD_ACTION_BYPASS); memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16); memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16); mp->entry.is_outbound = 0; mp->entry.remote_port_start = mp->entry.local_port_start = ntohs (0); mp->entry.remote_port_stop = mp->entry.local_port_stop = ntohs (0xFFFF); mp->entry.protocol = IP_API_PROTO_HOPOPT; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } mp->entry.is_outbound = 1; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } rv = SUCCESS; error: if (out) free (out); vl_msg_api_free (mp); return rv; } /** * Add or remove a bypass policy */ static status_t manage_bypass (bool add, uint32_t spd_id, uint32_t sa_id) { uint16_t port; status_t rv; bypass_all (add, spd_id, sa_id); port = lib->settings->get_int (lib->settings, "%s.port", IKEV2_UDP_PORT, lib->ns); if (port) { rv = bypass_port (add, spd_id, sa_id, port); if (rv != SUCCESS) { return rv; } } port = lib->settings->get_int (lib->settings, "%s.port_nat_t", IKEV2_NATT_PORT, lib->ns); if (port) { rv = bypass_port (add, spd_id, sa_id, port); if (rv != SUCCESS) { return rv; } } return SUCCESS; } /** * Add or remove a policy */ static status_t manage_policy (private_kernel_vpp_ipsec_t *this, bool add, kernel_ipsec_policy_id_t *id, kernel_ipsec_manage_policy_t *data) { spd_t *spd; char *out = NULL, *interface = NULL; int out_len; uint32_t sw_if_index, spd_id = ~0, sad_id = ~0; status_t rv = FAILED; uint32_t priority, auto_priority; chunk_t src_from, src_to, dst_from, dst_to; host_t *src, *dst, *addr; vl_api_ipsec_spd_entry_add_del_t *mp; vl_api_ipsec_spd_entry_add_del_reply_t *rmp; bool n_spd = false; mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); this->mutex->lock (this->mutex); if (!id->interface) { addr = id->dir == POLICY_IN ? data->dst : data->src; for (int i = 0; i < 5; i++) { if (!charon->kernel->get_interface (charon->kernel, addr, &interface)) { DBG1 (DBG_KNL, "policy no interface %H", addr); interface = NULL; sleep (1); } if (interface) { DBG1 (DBG_KNL, "policy have interface %H", addr); break; } } if (!interface) goto error; id->interface = interface; } DBG2 (DBG_KNL, "manage policy [%s] interface [%s]", add ? "ADD" : "DEL", id->interface); spd = this->spds->get (this->spds, id->interface); if (!spd) { if (!add) { DBG1 (DBG_KNL, "SPD for %s not found, should not be deleted", id->interface); goto error; } sw_if_index = get_sw_if_index (id->interface); DBG1 (DBG_KNL, "firstly created, spd for %s found sw_if_index is %d", id->interface, sw_if_index); if (sw_if_index == ~0) { DBG1 (DBG_KNL, "sw_if_index for %s not found", id->interface); goto error; } spd_id = ref_get (&this->next_spd_id); if (spd_add_del (TRUE, spd_id)) { DBG1 (DBG_KNL, "spd_add_del %d failed!!!!!", spd_id); goto error; } if (interface_add_del_spd (TRUE, spd_id, sw_if_index)) { DBG1 (DBG_KNL, "interface_add_del_spd %d %d failed!!!!!", spd_id, sw_if_index); goto error; } INIT (spd, .spd_id = spd_id, .sw_if_index = sw_if_index, .policy_num = 0, ); this->spds->put (this->spds, id->interface, spd); n_spd = true; } auto_priority = calculate_priority (data->prio, id->src_ts, id->dst_ts); priority = data->manual_prio ? data->manual_prio : auto_priority; u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411"); mp->_vl_msg_id = htons (msg_id); mp->is_add = add; mp->entry.spd_id = htonl (spd->spd_id); mp->entry.priority = htonl (INT_MAX - POLICY_PRIORITY_PASS); mp->entry.is_outbound = id->dir == POLICY_OUT; switch (data->type) { case POLICY_IPSEC: mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_PROTECT); break; case POLICY_PASS: mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_BYPASS); break; case POLICY_DROP: mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_DISCARD); break; } if ((data->type == POLICY_IPSEC) && data->sa) { kernel_ipsec_sa_id_t id = { .src = data->src, .dst = data->dst, .proto = data->sa->esp.use ? IPPROTO_ESP : IPPROTO_AH, .spi = data->sa->esp.use ? data->sa->esp.spi : data->sa->ah.spi, }; sa_t *sa = NULL; sa = this->sas->get (this->sas, &id); if (!sa) { DBG1 (DBG_KNL, "SA ID not found"); goto error; } sad_id = sa->sa_id; if (n_spd) { if (manage_bypass (TRUE, spd_id, ~0)) { DBG1 (DBG_KNL, "manage_bypass %d failed!!!!", spd_id); goto error; } } } mp->entry.sa_id = htonl (sad_id); bool is_ipv6 = false; if (id->src_ts->get_type (id->src_ts) == TS_IPV6_ADDR_RANGE) { is_ipv6 = true; mp->entry.local_address_start.af = htonl (ADDRESS_IP6); mp->entry.local_address_stop.af = htonl (ADDRESS_IP6); mp->entry.remote_address_start.af = htonl (ADDRESS_IP6); mp->entry.remote_address_stop.af = htonl (ADDRESS_IP6); } else { mp->entry.local_address_start.af = htonl (ADDRESS_IP4); mp->entry.local_address_stop.af = htonl (ADDRESS_IP4); mp->entry.remote_address_start.af = htonl (ADDRESS_IP4); mp->entry.remote_address_stop.af = htonl (ADDRESS_IP4); } mp->entry.protocol = id->src_ts->get_protocol (id->src_ts); if (id->dir == POLICY_OUT) { src_from = id->src_ts->get_from_address (id->src_ts); src_to = id->src_ts->get_to_address (id->src_ts); src = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, src_to, 0); dst_from = id->dst_ts->get_from_address (id->dst_ts); dst_to = id->dst_ts->get_to_address (id->dst_ts); dst = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, dst_to, 0); } else { dst_from = id->src_ts->get_from_address (id->src_ts); dst_to = id->src_ts->get_to_address (id->src_ts); dst = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, dst_from, 0); src_from = id->dst_ts->get_from_address (id->dst_ts); src_to = id->dst_ts->get_to_address (id->dst_ts); src = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, src_from, 0); } if (src->is_anyaddr (src) && dst->is_anyaddr (dst)) { memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16); memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16); } else { memcpy (is_ipv6 ? mp->entry.local_address_start.un.ip6 : mp->entry.local_address_start.un.ip4, src_from.ptr, src_from.len); memcpy (is_ipv6 ? mp->entry.local_address_stop.un.ip6 : mp->entry.local_address_stop.un.ip4, src_to.ptr, src_to.len); memcpy (is_ipv6 ? mp->entry.remote_address_start.un.ip6 : mp->entry.remote_address_start.un.ip4, dst_from.ptr, dst_from.len); memcpy (is_ipv6 ? mp->entry.remote_address_stop.un.ip6 : mp->entry.remote_address_stop.un.ip4, dst_to.ptr, dst_to.len); } mp->entry.local_port_start = htons (id->src_ts->get_from_port (id->src_ts)); mp->entry.local_port_stop = htons (id->src_ts->get_to_port (id->src_ts)); mp->entry.remote_port_start = htons (id->dst_ts->get_from_port (id->dst_ts)); mp->entry.remote_port_stop = htons (id->dst_ts->get_to_port (id->dst_ts)); /* check if policy exists in SPD */ vl_api_ipsec_spd_dump_t *mp_dump; vl_api_ipsec_spd_details_t *rmp_dump, *tmp; mp_dump = vl_msg_api_alloc (sizeof (*mp_dump)); memset (mp_dump, 0, sizeof (*mp_dump)); msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_dump_afefbf7d"); mp_dump->_vl_msg_id = htons (msg_id); mp_dump->spd_id = htonl (spd->spd_id); mp_dump->sa_id = htonl (sad_id); if (vac->send_dump (vac, (char *) mp_dump, sizeof (*mp_dump), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD lookup failed", add ? "adding" : "removing"); goto error; } int num = out_len / sizeof (*rmp_dump); tmp = (void *) out; /* found existing policy */ if (add && num) { int i; for (i = 0; i < num; i++) { rmp_dump = tmp; tmp += 1; /* check if found entry equals the new one */ if (policy_equals (&mp->entry, &rmp_dump->entry)) goto next; } } else if (!add && num == 0) { /* VPP doesn't have any policy to delete */ goto next; } free (out); if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove", ntohl (rmp->retval)); goto error; } next: if (add) { ref_get (&spd->policy_num); } else { if (ref_put (&spd->policy_num)) { DBG1 ( DBG_KNL, "policy_num's ref is 0, delete spd_id %d sw_if_index %d sad_id %x", spd->spd_id, spd->sw_if_index, sad_id); interface_add_del_spd (FALSE, spd->spd_id, spd->sw_if_index); manage_bypass (FALSE, spd->spd_id, sad_id); spd_add_del (FALSE, spd->spd_id); this->spds->remove (this->spds, id->interface); } } if (this->install_routes && id->dir == POLICY_OUT && !mp->entry.protocol) { if (data->type == POLICY_IPSEC && data->sa->mode != MODE_TRANSPORT) { manage_route (this, add, id->dst_ts, data->src, data->dst); } } rv = SUCCESS; error: free (out); vl_msg_api_free (mp_dump); vl_msg_api_free (mp); this->mutex->unlock (this->mutex); return rv; } METHOD (kernel_ipsec_t, get_features, kernel_feature_t, private_kernel_vpp_ipsec_t *this) { return KERNEL_ESP_V3_TFC; } METHOD (kernel_ipsec_t, get_spi, status_t, private_kernel_vpp_ipsec_t *this, host_t *src, host_t *dst, uint8_t protocol, uint32_t *spi) { static const u_int p = 268435399, offset = 0xc0000000; *spi = htonl (offset + permute (ref_get (&this->nextspi) ^ this->mixspi, p)); return SUCCESS; } METHOD (kernel_ipsec_t, get_cpi, status_t, private_kernel_vpp_ipsec_t *this, host_t *src, host_t *dst, uint16_t *cpi) { DBG1 (DBG_KNL, "get_cpi is not supported!!!!!!!!!!!!!!!!!!!!!!!!"); return NOT_SUPPORTED; } /** * Helper struct for expiration events */ typedef struct { private_kernel_vpp_ipsec_t *manager; kernel_ipsec_sa_id_t *sa_id; /** * 0 if this is a hard expire, otherwise the offset in s (soft->hard) */ uint32_t hard_offset; } vpp_sa_expired_t; /** * Callback for expiration events */ static job_requeue_t sa_expired (vpp_sa_expired_t *expired) { private_kernel_vpp_ipsec_t *this = expired->manager; sa_t *sa; kernel_ipsec_sa_id_t *id = expired->sa_id; this->mutex->lock (this->mutex); sa = this->sas->get (this->sas, id); if (sa) { charon->kernel->expire (charon->kernel, id->proto, id->spi, id->dst, FALSE); } free (id); this->mutex->unlock (this->mutex); return JOB_REQUEUE_NONE; } /** * Schedule a job to handle IPsec SA expiration */ static void schedule_expiration (private_kernel_vpp_ipsec_t *this, kernel_ipsec_add_sa_t *entry, kernel_ipsec_sa_id_t *entry2) { lifetime_cfg_t *lifetime = entry->lifetime; vpp_sa_expired_t *expired; callback_job_t *job; uint32_t timeout; kernel_ipsec_sa_id_t *id; if (!lifetime->time.life) { /* no expiration at all */ return; } INIT (id, .src = entry2->src->clone (entry2->src), .dst = entry2->dst->clone (entry2->dst), .spi = entry2->spi, .proto = entry2->proto, ); INIT (expired, .manager = this, .sa_id = id, ); /* schedule a rekey first, a hard timeout will be scheduled then, if any */ expired->hard_offset = lifetime->time.life - lifetime->time.rekey; timeout = lifetime->time.rekey; if (lifetime->time.life <= lifetime->time.rekey || lifetime->time.rekey == 0) { /* no rekey, schedule hard timeout */ expired->hard_offset = 0; timeout = lifetime->time.life; } job = callback_job_create ((callback_job_cb_t) sa_expired, expired, (callback_job_cleanup_t) free, NULL); lib->scheduler->schedule_job (lib->scheduler, (job_t *) job, timeout); } METHOD (kernel_ipsec_t, add_sa, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_sa_id_t *id, kernel_ipsec_add_sa_t *data) { char *out = NULL; int out_len; vl_api_ipsec_sad_entry_add_del_t *mp; vl_api_ipsec_sad_entry_add_del_reply_t *rmp; uint32_t sad_id = ref_get (&this->next_sad_id); uint8_t ca = 0, ia = 0; status_t rv = FAILED; chunk_t src, dst; kernel_ipsec_sa_id_t *sa_id; sa_t *sa; int key_len = data->enc_key.len; if ((data->enc_alg == ENCR_AES_CTR) || (data->enc_alg == ENCR_AES_GCM_ICV8) || (data->enc_alg == ENCR_AES_GCM_ICV12) || (data->enc_alg == ENCR_AES_GCM_ICV16)) { static const int SALT_SIZE = 4; /* See how enc_size is calculated at keymat_v2.derive_child_keys */ key_len = key_len - SALT_SIZE; } natt_port = lib->settings->get_int ( lib->settings, "%s.plugins.socket-default.natt", IKEV2_NATT_PORT, lib->ns); mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6"); mp->_vl_msg_id = htons (msg_id); mp->is_add = 1; mp->entry.sad_id = htonl (sad_id); mp->entry.spi = id->spi; mp->entry.protocol = id->proto == IPPROTO_ESP ? htonl (IPSEC_API_PROTO_ESP) : htonl (IPSEC_API_PROTO_AH); switch (data->enc_alg) { case ENCR_NULL: ca = IPSEC_API_CRYPTO_ALG_NONE; break; case ENCR_AES_CBC: switch (key_len * 8) { case 128: ca = IPSEC_API_CRYPTO_ALG_AES_CBC_128; break; case 192: ca = IPSEC_API_CRYPTO_ALG_AES_CBC_192; break; case 256: ca = IPSEC_API_CRYPTO_ALG_AES_CBC_256; break; default: DBG1 (DBG_KNL, "Key length %d is not supported by VPP!", key_len * 8); goto error; } break; case ENCR_AES_CTR: switch (key_len * 8) { case 128: ca = IPSEC_API_CRYPTO_ALG_AES_CTR_128; break; case 192: ca = IPSEC_API_CRYPTO_ALG_AES_CTR_192; break; case 256: ca = IPSEC_API_CRYPTO_ALG_AES_CTR_256; break; default: DBG1 (DBG_KNL, "Key length %d is not supported by VPP!", key_len * 8); goto error; } break; case ENCR_AES_GCM_ICV8: case ENCR_AES_GCM_ICV12: case ENCR_AES_GCM_ICV16: switch (key_len * 8) { case 128: ca = IPSEC_API_CRYPTO_ALG_AES_GCM_128; break; case 192: ca = IPSEC_API_CRYPTO_ALG_AES_GCM_192; break; case 256: ca = IPSEC_API_CRYPTO_ALG_AES_GCM_256; break; default: DBG1 (DBG_KNL, "Key length %d is not supported by VPP!", key_len * 8); goto error; } break; case ENCR_DES: ca = IPSEC_API_CRYPTO_ALG_DES_CBC; break; case ENCR_3DES: ca = IPSEC_API_CRYPTO_ALG_3DES_CBC; break; default: DBG1 (DBG_KNL, "algorithm %N not supported by VPP!", encryption_algorithm_names, data->enc_alg); goto error; } mp->entry.crypto_algorithm = htonl (ca); mp->entry.crypto_key.length = key_len < 128 ? key_len : 128; memcpy (mp->entry.crypto_key.data, data->enc_key.ptr, mp->entry.crypto_key.length); /* copy salt for AEAD algorithms */ if ((data->enc_alg == ENCR_AES_CTR) || (data->enc_alg == ENCR_AES_GCM_ICV8) || (data->enc_alg == ENCR_AES_GCM_ICV12) || (data->enc_alg == ENCR_AES_GCM_ICV16)) { memcpy (&mp->entry.salt, data->enc_key.ptr + mp->entry.crypto_key.length, 4); } switch (data->int_alg) { case AUTH_UNDEFINED: ia = IPSEC_API_INTEG_ALG_NONE; break; case AUTH_HMAC_MD5_96: ia = IPSEC_API_INTEG_ALG_MD5_96; break; case AUTH_HMAC_SHA1_96: ia = IPSEC_API_INTEG_ALG_SHA1_96; break; case AUTH_HMAC_SHA2_256_96: ia = IPSEC_API_INTEG_ALG_SHA_256_96; break; case AUTH_HMAC_SHA2_256_128: ia = IPSEC_API_INTEG_ALG_SHA_256_128; break; case AUTH_HMAC_SHA2_384_192: ia = IPSEC_API_INTEG_ALG_SHA_384_192; break; case AUTH_HMAC_SHA2_512_256: ia = IPSEC_API_INTEG_ALG_SHA_512_256; break; default: DBG1 (DBG_KNL, "algorithm %N not supported by VPP!", integrity_algorithm_names, data->int_alg); goto error; break; } mp->entry.integrity_algorithm = htonl (ia); mp->entry.integrity_key.length = data->int_key.len < 128 ? data->int_key.len : 128; memcpy (mp->entry.integrity_key.data, data->int_key.ptr, mp->entry.integrity_key.length); int flags = IPSEC_API_SAD_FLAG_NONE; if (data->inbound) flags |= IPSEC_API_SAD_FLAG_IS_INBOUND; /* like the kernel-netlink plugin, anti-replay can be disabled with zero * replay_window, but window size cannot be customized for vpp */ if (data->replay_window) flags |= IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY; if (data->esn) flags |= IPSEC_API_SAD_FLAG_USE_ESN; if (this->use_tunnel_mode_sa && data->mode == MODE_TUNNEL) { if (id->src->get_family (id->src) == AF_INET6) flags |= IPSEC_API_SAD_FLAG_IS_TUNNEL_V6; else flags |= IPSEC_API_SAD_FLAG_IS_TUNNEL; } if (data->encap) { DBG1 (DBG_KNL, "UDP encap!!!!!!!!!!!!!!!!!!!!"); flags |= IPSEC_API_SAD_FLAG_UDP_ENCAP; } mp->entry.flags = htonl (flags); bool is_ipv6 = false; if (id->src->get_family (id->src) == AF_INET6) { is_ipv6 = true; mp->entry.tunnel_src.af = htonl (ADDRESS_IP6); mp->entry.tunnel_dst.af = htonl (ADDRESS_IP6); } else { mp->entry.tunnel_src.af = htonl (ADDRESS_IP4); mp->entry.tunnel_dst.af = htonl (ADDRESS_IP4); } src = id->src->get_address (id->src); memcpy (is_ipv6 ? mp->entry.tunnel_src.un.ip6 : mp->entry.tunnel_src.un.ip4, src.ptr, src.len); dst = id->dst->get_address (id->dst); memcpy (is_ipv6 ? mp->entry.tunnel_dst.un.ip6 : mp->entry.tunnel_dst.un.ip4, dst.ptr, dst.len); if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac adding SA failed"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "add SA failed rv:%d", ntohl (rmp->retval)); goto error; } this->mutex->lock (this->mutex); INIT (sa_id, .src = id->src->clone (id->src), .dst = id->dst->clone (id->dst), .spi = id->spi, .proto = id->proto, ); INIT (sa, .sa_id = sad_id, .stat_index = ntohl (rmp->stat_index), ); DBG4 (DBG_KNL, "put sa by its sa_id %x !!!!!!", sad_id); this->sas->put (this->sas, sa_id, sa); schedule_expiration (this, data, id); this->mutex->unlock (this->mutex); rv = SUCCESS; error: free (out); vl_msg_api_free (mp); return rv; } METHOD (kernel_ipsec_t, update_sa, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_sa_id_t *id, kernel_ipsec_update_sa_t *data) { DBG1 (DBG_KNL, "update sa not supported!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"); return NOT_SUPPORTED; } METHOD (kernel_ipsec_t, query_sa, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_sa_id_t *id, kernel_ipsec_query_sa_t *data, uint64_t *bytes, uint64_t *packets, time_t *time) { status_t rv = FAILED; sa_t *sa; u32 *dir; int i, k; stat_segment_data_t *res; u8 **pattern = 0; uint64_t res_bytes = 0; uint64_t res_packets = 0; this->mutex->lock (this->mutex); sa = this->sas->get (this->sas, id); this->mutex->unlock (this->mutex); if (!sa) { DBG1 (DBG_KNL, "SA not found"); return NOT_FOUND; } int rv_stat = stat_segment_connect ("/run/vpp/stats.sock"); if (rv_stat != 0) { DBG1 (DBG_KNL, "Not connecting with stats segmentation"); return NOT_FOUND; } vec_add1 (pattern, (u8 *) "/net/ipsec/sa"); dir = stat_segment_ls ((u8 **) pattern); res = stat_segment_dump (dir); /* i-loop for each results find by pattern - here two: * 1. /net/ipsec/sa * 2. /net/ipsec/sa/lost */ for (i = 0; i < vec_len (res); i++) { switch (res[i].type) { /* type for how many packets are lost */ case STAT_DIR_TYPE_COUNTER_VECTOR_SIMPLE: if (res[i].simple_counter_vec == 0) continue; break; /* type for counter for each SA */ case STAT_DIR_TYPE_COUNTER_VECTOR_COMBINED: if (res[i].combined_counter_vec == 0) continue; /* k-loop for each threads - that you run VPP */ for (k = 0; k < vec_len (res[i].combined_counter_vec); k++) { if (sa->stat_index <= vec_len (res[i].combined_counter_vec[k])) { DBG4 (DBG_KNL, "Thread: %d, Packets: %lu, Bytes: %lu", k, res[i].combined_counter_vec[k][sa->stat_index].packets, res[i].combined_counter_vec[k][sa->stat_index].bytes); res_bytes += res[i].combined_counter_vec[k][sa->stat_index].bytes; res_packets += res[i].combined_counter_vec[k][sa->stat_index].packets; } } break; case STAT_DIR_TYPE_NAME_VECTOR: if (res[i].name_vector == 0) continue; break; } } stat_segment_data_free (res); stat_segment_disconnect (); vec_free (pattern); vec_free (dir); if (bytes) { *bytes = res_bytes; } if (packets) { *packets = res_packets; } if (time) { *time = 0; } rv = SUCCESS; return rv; } METHOD (kernel_ipsec_t, del_sa, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_sa_id_t *id, kernel_ipsec_del_sa_t *data) { char *out = NULL; int out_len; vl_api_ipsec_sad_entry_add_del_t *mp; vl_api_ipsec_sad_entry_add_del_reply_t *rmp; status_t rv = FAILED; sa_t *sa; this->mutex->lock (this->mutex); sa = this->sas->get (this->sas, id); if (!sa) { DBG1 (DBG_KNL, "SA not found"); rv = NOT_FOUND; goto error; } mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); mp->is_add = 0; u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6"); mp->_vl_msg_id = htons (msg_id); mp->entry.sad_id = htonl (sa->sa_id); if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "vac removing SA failed"); goto error; } rmp = (void *) out; if (rmp->retval) { DBG1 (DBG_KNL, "del SA failed rv:%d", ntohl (rmp->retval)); goto error; } vl_msg_api_free (mp); this->sas->remove (this->sas, id); rv = SUCCESS; error: free (out); this->mutex->unlock (this->mutex); return rv; } METHOD (kernel_ipsec_t, flush_sas, status_t, private_kernel_vpp_ipsec_t *this) { enumerator_t *enumerator; int out_len; char *out; vl_api_ipsec_sad_entry_add_del_t *mp; sa_t *sa = NULL; this->mutex->lock (this->mutex); enumerator = this->sas->create_enumerator (this->sas); while (enumerator->enumerate (enumerator, sa, NULL)) { mp = vl_msg_api_alloc (sizeof (*mp)); memset (mp, 0, sizeof (*mp)); u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6"); mp->_vl_msg_id = htons (msg_id); mp->entry.sad_id = htonl (sa->sa_id); mp->is_add = 0; if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len)) { DBG1 (DBG_KNL, "flush_sas failed!!!!"); return FALSE; } free (out); vl_msg_api_free (mp); this->sas->remove_at (this->sas, enumerator); } enumerator->destroy (enumerator); this->mutex->unlock (this->mutex); return SUCCESS; } METHOD (kernel_ipsec_t, add_policy, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_policy_id_t *id, kernel_ipsec_manage_policy_t *data) { return manage_policy (this, TRUE, id, data); } METHOD (kernel_ipsec_t, query_policy, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_policy_id_t *id, kernel_ipsec_query_policy_t *data, time_t *use_time) { return NOT_SUPPORTED; } METHOD (kernel_ipsec_t, del_policy, status_t, private_kernel_vpp_ipsec_t *this, kernel_ipsec_policy_id_t *id, kernel_ipsec_manage_policy_t *data) { return manage_policy (this, FALSE, id, data); } METHOD (kernel_ipsec_t, flush_policies, status_t, private_kernel_vpp_ipsec_t *this) { return NOT_SUPPORTED; } METHOD (kernel_ipsec_t, bypass_socket, bool, private_kernel_vpp_ipsec_t *this, int fd, int family) { return FALSE; } METHOD (kernel_ipsec_t, enable_udp_decap, bool, private_kernel_vpp_ipsec_t *this, int fd, int family, u_int16_t port) { DBG1 (DBG_KNL, "enable_udp_decap not supported!!!!!!!!!!!!!!!!!!!!!!!!!"); return FALSE; } METHOD (kernel_ipsec_t, destroy, void, private_kernel_vpp_ipsec_t *this) { this->mutex->destroy (this->mutex); this->sas->destroy (this->sas); this->spds->destroy (this->spds); this->routes->destroy (this->routes); free (this); } kernel_vpp_ipsec_t * kernel_vpp_ipsec_create () { private_kernel_vpp_ipsec_t *this; INIT(this, .public = { .interface = { .get_features = _get_features, .get_spi = _get_spi, .get_cpi = _get_cpi, .add_sa = _add_sa, .update_sa = _update_sa, .query_sa = _query_sa, .del_sa = _del_sa, .flush_sas = _flush_sas, .add_policy = _add_policy, .query_policy = _query_policy, .del_policy = _del_policy, .flush_policies = _flush_policies, .bypass_socket = _bypass_socket, .enable_udp_decap = _enable_udp_decap, .destroy = _destroy, }, }, .next_sad_id = 0, .next_spd_id = 0, .mutex = mutex_create(MUTEX_TYPE_DEFAULT), .sas = hashtable_create((hashtable_hash_t)sa_hash, (hashtable_equals_t)sa_equals, 32), .spds = hashtable_create((hashtable_hash_t)interface_hash, (hashtable_equals_t)interface_equals, 4), .routes = linked_list_create(), .install_routes = lib->settings->get_bool(lib->settings, "%s.install_routes", TRUE, lib->ns), .use_tunnel_mode_sa = lib->settings->get_bool(lib->settings, "%s.plugins.kernel-vpp.use_tunnel_mode_sa", TRUE, lib->ns), ); if (!init_spi (this)) { destroy (this); return NULL; } return &this->public; }