/* * decap.c : IPSec tunnel support * * Copyright (c) 2015 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include ipsec_main_t ipsec_main; u32 ipsec_get_sa_index_by_sa_id (u32 sa_id) { ipsec_main_t *im = &ipsec_main; uword *p = hash_get (im->sa_index_by_sa_id, sa_id); if (!p) return ~0; return p[0]; } int ipsec_set_interface_spd (vlib_main_t * vm, u32 sw_if_index, u32 spd_id, int is_add) { ipsec_main_t *im = &ipsec_main; ip4_ipsec_config_t config; u32 spd_index; uword *p; p = hash_get (im->spd_index_by_spd_id, spd_id); if (!p) return VNET_API_ERROR_SYSCALL_ERROR_1; /* no such spd-id */ spd_index = p[0]; p = hash_get (im->spd_index_by_sw_if_index, sw_if_index); if (p && is_add) return VNET_API_ERROR_SYSCALL_ERROR_1; /* spd already assigned */ if (is_add) { hash_set (im->spd_index_by_sw_if_index, sw_if_index, spd_index); } else { hash_unset (im->spd_index_by_sw_if_index, sw_if_index); } clib_warning ("sw_if_index %u spd_id %u spd_index %u", sw_if_index, spd_id, spd_index); /* enable IPsec on TX */ vnet_feature_enable_disable ("ip4-output", "ipsec4-output", sw_if_index, is_add, 0, 0); vnet_feature_enable_disable ("ip6-output", "ipsec6-output", sw_if_index, is_add, 0, 0); config.spd_index = spd_index; /* enable IPsec on RX */ vnet_feature_enable_disable ("ip4-unicast", "ipsec4-input", sw_if_index, is_add, &config, sizeof (config)); vnet_feature_enable_disable ("ip6-unicast", "ipsec6-input", sw_if_index, is_add, &config, sizeof (config)); return 0; } int ipsec_add_del_spd (vlib_main_t * vm, u32 spd_id, int is_add) { ipsec_main_t *im = &ipsec_main; ipsec_spd_t *spd = 0; uword *p; u32 spd_index, k, v; p = hash_get (im->spd_index_by_spd_id, spd_id); if (p && is_add) return VNET_API_ERROR_INVALID_VALUE; if (!p && !is_add) return VNET_API_ERROR_INVALID_VALUE; if (!is_add) /* delete */ { spd_index = p[0]; spd = pool_elt_at_index (im->spds, spd_index); if (!spd) return VNET_API_ERROR_INVALID_VALUE; /* *INDENT-OFF* */ hash_foreach (k, v, im->spd_index_by_sw_if_index, ({ if (v == spd_index) ipsec_set_interface_spd(vm, k, spd_id, 0); })); /* *INDENT-ON* */ hash_unset (im->spd_index_by_spd_id, spd_id); pool_free (spd->policies); vec_free (spd->ipv4_outbound_policies); vec_free (spd->ipv6_outbound_policies); vec_free (spd->ipv4_inbound_protect_policy_indices); vec_free (spd->ipv4_inbound_policy_discard_and_bypass_indices); pool_put (im->spds, spd); } else /* create new SPD */ { pool_get (im->spds, spd); clib_memset (spd, 0, sizeof (*spd)); spd_index = spd - im->spds; spd->id = spd_id; hash_set (im->spd_index_by_spd_id, spd_id, spd_index); } return 0; } static int ipsec_spd_entry_sort (void *a1, void *a2) { u32 *id1 = a1; u32 *id2 = a2; ipsec_spd_t *spd = ipsec_main.spd_to_sort; ipsec_policy_t *p1, *p2; p1 = pool_elt_at_index (spd->policies, *id1); p2 = pool_elt_at_index (spd->policies, *id2); if (p1 && p2) return p2->priority - p1->priority; return 0; } int ipsec_add_del_policy (vlib_main_t * vm, ipsec_policy_t * policy, int is_add) { ipsec_main_t *im = &ipsec_main; ipsec_spd_t *spd = 0; ipsec_policy_t *vp; uword *p; u32 spd_index; clib_warning ("policy-id %u priority %d is_outbound %u", policy->id, policy->priority, policy->is_outbound); if (policy->policy == IPSEC_POLICY_ACTION_PROTECT) { p = hash_get (im->sa_index_by_sa_id, policy->sa_id); if (!p) return VNET_API_ERROR_SYSCALL_ERROR_1; policy->sa_index = p[0]; } p = hash_get (im->spd_index_by_spd_id, policy->id); if (!p) return VNET_API_ERROR_SYSCALL_ERROR_1; spd_index = p[0]; spd = pool_elt_at_index (im->spds, spd_index); if (!spd) return VNET_API_ERROR_SYSCALL_ERROR_1; if (is_add) { u32 policy_index; pool_get (spd->policies, vp); clib_memcpy (vp, policy, sizeof (*vp)); policy_index = vp - spd->policies; ipsec_main.spd_to_sort = spd; if (policy->is_outbound) { if (policy->is_ipv6) { vec_add1 (spd->ipv6_outbound_policies, policy_index); vec_sort_with_function (spd->ipv6_outbound_policies, ipsec_spd_entry_sort); } else { vec_add1 (spd->ipv4_outbound_policies, policy_index); vec_sort_with_function (spd->ipv4_outbound_policies, ipsec_spd_entry_sort); } } else { if (policy->is_ipv6) { if (policy->policy == IPSEC_POLICY_ACTION_PROTECT) { vec_add1 (spd->ipv6_inbound_protect_policy_indices, policy_index); vec_sort_with_function (spd->ipv6_inbound_protect_policy_indices, ipsec_spd_entry_sort); } else { vec_add1 (spd->ipv6_inbound_policy_discard_and_bypass_indices, policy_index); vec_sort_with_function (spd->ipv6_inbound_policy_discard_and_bypass_indices, ipsec_spd_entry_sort); } } else { if (policy->policy == IPSEC_POLICY_ACTION_PROTECT) { vec_add1 (spd->ipv4_inbound_protect_policy_indices, policy_index); vec_sort_with_function (spd->ipv4_inbound_protect_policy_indices, ipsec_spd_entry_sort); } else { vec_add1 (spd->ipv4_inbound_policy_discard_and_bypass_indices, policy_index); vec_sort_with_function (spd->ipv4_inbound_policy_discard_and_bypass_indices, ipsec_spd_entry_sort); } } } ipsec_main.spd_to_sort = NULL; } else { u32 i, j; /* *INDENT-OFF* */ pool_foreach_index(i, spd->policies, ({ vp = pool_elt_at_index(spd->policies, i); if (vp->priority != policy->priority) continue; if (vp->is_outbound != policy->is_outbound) continue; if (vp->policy != policy->policy) continue; if (vp->sa_id != policy->sa_id) continue; if (vp->protocol != policy->protocol) continue; if (vp->lport.start != policy->lport.start) continue; if (vp->lport.stop != polic
#!/usr/bin/env python3
# Copyright (c) 2016 Comcast Cable Communications Management, LLC.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at:
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# Looks for preprocessor macros with struct initializers and siphons them
# off into another file for later parsing; ostensibly to generate
# documentation from struct initializer data.

import argparse
import logging
import os

import siphon

DEFAULT_LOGFILE = None
DEFAULT_LOGLEVEL = "info"
DEFAULT_OUTPUT = "build-root/docs/siphons"
DEFAULT_PREFIX = os.getcwd()

ap = argparse.ArgumentParser()
ap.add_argument("--log-file", default=DEFAULT_LOGFILE,
                help="Log file [%s]" % DEFAULT_LOGFILE)
ap.add_argument("--log-level", default=DEFAULT_LOGLEVEL,
                choices=["debug", "info", "warning", "error", "critical"],
                help="Logging level [%s]" % DEFAULT_LOGLEVEL)

ap.add_argument("--output", '-o', metavar="directory", default=DEFAULT_OUTPUT,
                help="Output directory for .siphon files [%s]" %
                     DEFAULT_OUTPUT)
ap.add_argument("--input-prefix", metavar="path", default=DEFAULT_PREFIX,
                help="Prefix to strip from input pathnames [%s]" %
                     DEFAULT_PREFIX)
ap.add_argument("input", nargs='+', metavar="input_file",
                help="Input C source files")
args = ap.parse_args()

logging.basicConfig(filename=args.log_file,
                    level=getattr(logging, args.