/* * Copyright (c) 2015 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef __IPSEC_SPD_POLICY_H__ #define __IPSEC_SPD_POLICY_H__ #include #include #include /** * calculated as max number of flows (2^10) divided by KVP_PER_PAGE (4) */ #define IPSEC_FP_HASH_LOOKUP_HASH_BUCKETS (1 << 8) #define IPSEC_POLICY_PROTOCOL_ANY IP_PROTOCOL_RESERVED /** * This number is calculated as ceil power of 2 for the number * sizeof(clib_bihash_kv_16_8_t)=24 * BIHASH_KVP_PER_PAGE=4 * COLLISIONS_NO=8 * */ #define IPSEC_FP_IP4_HASH_MEM_PER_BUCKET 1024 /** * This number is calculated as ceil power of 2 for the number * sizeof(clib_bihash_kv_40_8_t)=48 * BIHASH_KVP_PER_PAGE=4 * COLLISIONS_NO=8 * */ #define IPSEC_FP_IP6_HASH_MEM_PER_BUCKET 2048 #define foreach_ipsec_policy_action \ _ (0, BYPASS, "bypass") \ _ (1, DISCARD, "discard") \ _ (2, RESOLVE, "resolve") \ _ (3, PROTECT, "protect") typedef enum { #define _(v, f, s) IPSEC_POLICY_ACTION_##f = v, foreach_ipsec_policy_action #undef _ } ipsec_policy_action_t; #define IPSEC_POLICY_N_ACTION (IPSEC_POLICY_ACTION_PROTECT + 1) typedef struct { ip46_address_t start, stop; } ip46_address_range_t; typedef struct { u16 start, stop; } port_range_t; /** * @brief * Policy packet & bytes counters */ extern vlib_combined_counter_main_t ipsec_spd_policy_counters; /** * @brief A Secruity Policy. An entry in an SPD */ typedef struct ipsec_policy_t_ { u32 id; i32 priority; // the type of policy ipsec_spd_policy_type_t type; // Selector u8 is_ipv6; ip46_address_range_t laddr; ip46_address_range_t raddr; u8 protocol; port_range_t lport; port_range_t rport; // Policy ipsec_policy_action_t policy; u32 sa_id; u32 sa_index; u32 fp_mask_type_id; } ipsec_policy_t; /** * @brief Add/Delete a SPD */ extern int ipsec_add_del_policy (vlib_main_t * vm, ipsec_policy_t * policy, int is_add, u32 * stat_index); extern u8 *format_ipsec_policy (u8 * s, va_list * args); extern u8 *format_ipsec_policy_action (u8 * s, va_list * args); extern uword unformat_ipsec_policy_action (unformat_input_t * input, va_list * args); extern int ipsec_policy_mk_type (bool is_outbound, bool is_ipv6, ipsec_policy_action_t action, ipsec_spd_policy_type_t * type); /* A 5-tuple used to calculate the bihash entry */ typedef union { struct { union { struct { u32 l3_zero_pad[6]; ip4_address_t laddr; ip4_address_t raddr; }; struct { ip6_address_t ip6_laddr; ip6_address_t ip6_raddr; }; }; union { struct { u16 lport; u16 rport; }; u32 spi; }; u8 protocol; u8 action; u16 is_ipv6; }; /* for ipv6 */ clib_bihash_kv_40_8_t kv_40_8; /* for ipv4 */ struct { u64 padding_for_kv_16_8[3]; clib_bihash_kv_16_8_t kv_16_8; }; } ipsec_fp_5tuple_t; /* * An element describing a particular policy mask, * and refcount of policies with same mask. */ typedef struct { /** Required for pool_get_aligned */ CLIB_CACHE_LINE_ALIGN_MARK (cacheline0); ipsec_fp_5tuple_t mask; u32 refcount; /* counts how many policies use this mask */ } ipsec_fp_mask_type_entry_t; /* * Bihash lookup value, * contains an unordered vector of policies indices in policy pool. */ typedef union { u64 as_u64; struct { u32 *fp_policies_ids; }; } ipsec_fp_lookup_value_t; /** * @brief add or delete a fast path policy */ int ipsec_fp_add_del_policy (void *fp_spd, ipsec_policy_t *policy, int is_add, u32 *stat_index); static_always_inline int ipsec_policy_is_equal (ipsec_policy_t *p1, ipsec_policy_t *p2) { if (p1->priority != p2->priority) return 0; if (p1->type != p2->type) return (0); if (p1->policy != p2->policy) return (0); if (p1->sa_id != p2->sa_id) return (0); if (p1->protocol != p2->protocol) return (0); if (p1->lport.start != p2->lport.start) return (0); if (p1->lport.stop != p2->lport.stop) return (0); if (p1->rport.start != p2->rport.start) return (0); if (p1->rport.stop != p2->rport.stop) return (0); if (p1->is_ipv6 != p2->is_ipv6) return (0); if (p2->is_ipv6) { if (p1->laddr.start.ip6.as_u64[0] != p2->laddr.start.ip6.as_u64[0]) return (0); if (p1->laddr.start.ip6.as_u64[1] != p2->laddr.start.ip6.as_u64[1]) return (0); if (p1->laddr.stop.ip6.as_u64[0] != p2->laddr.stop.ip6.as_u64[0]) return (0); if (p1->laddr.stop.ip6.as_u64[1] != p2->laddr.stop.ip6.as_u64[1]) return (0); if (p1->raddr.start.ip6.as_u64[0] != p2->raddr.start.ip6.as_u64[0]) return (0); if (p1->raddr.start.ip6.as_u64[1] != p2->raddr.start.ip6.as_u64[1]) return (0); if (p1->raddr.stop.ip6.as_u64[0] != p2->raddr.stop.ip6.as_u64[0]) return (0); if (p1->laddr.stop.ip6.as_u64[1] != p2->laddr.stop.ip6.as_u64[1]) return (0); } else { if (p1->laddr.start.ip4.as_u32 != p2->laddr.start.ip4.as_u32) return (0); if (p1->laddr.stop.ip4.as_u32 != p2->laddr.stop.ip4.as_u32) return (0); if (p1->raddr.start.ip4.as_u32 != p2->raddr.start.ip4.as_u32) return (0); if (p1->raddr.stop.ip4.as_u32 != p2->raddr.stop.ip4.as_u32) return (0); } return (1); } #endif /* __IPSEC_SPD_POLICY_H__ */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */