xfrm_state_linux.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368
  1. package netlink
  2. import (
  3. "fmt"
  4. "syscall"
  5. "unsafe"
  6. "github.com/vishvananda/netlink/nl"
  7. )
  8. func writeStateAlgo(a *XfrmStateAlgo) []byte {
  9. algo := nl.XfrmAlgo{
  10. AlgKeyLen: uint32(len(a.Key) * 8),
  11. AlgKey: a.Key,
  12. }
  13. end := len(a.Name)
  14. if end > 64 {
  15. end = 64
  16. }
  17. copy(algo.AlgName[:end], a.Name)
  18. return algo.Serialize()
  19. }
  20. func writeStateAlgoAuth(a *XfrmStateAlgo) []byte {
  21. algo := nl.XfrmAlgoAuth{
  22. AlgKeyLen: uint32(len(a.Key) * 8),
  23. AlgTruncLen: uint32(a.TruncateLen),
  24. AlgKey: a.Key,
  25. }
  26. end := len(a.Name)
  27. if end > 64 {
  28. end = 64
  29. }
  30. copy(algo.AlgName[:end], a.Name)
  31. return algo.Serialize()
  32. }
  33. func writeStateAlgoAead(a *XfrmStateAlgo) []byte {
  34. algo := nl.XfrmAlgoAEAD{
  35. AlgKeyLen: uint32(len(a.Key) * 8),
  36. AlgICVLen: uint32(a.ICVLen),
  37. AlgKey: a.Key,
  38. }
  39. end := len(a.Name)
  40. if end > 64 {
  41. end = 64
  42. }
  43. copy(algo.AlgName[:end], a.Name)
  44. return algo.Serialize()
  45. }
  46. func writeMark(m *XfrmMark) []byte {
  47. mark := &nl.XfrmMark{
  48. Value: m.Value,
  49. Mask: m.Mask,
  50. }
  51. if mark.Mask == 0 {
  52. mark.Mask = ^uint32(0)
  53. }
  54. return mark.Serialize()
  55. }
  56. // XfrmStateAdd will add an xfrm state to the system.
  57. // Equivalent to: `ip xfrm state add $state`
  58. func XfrmStateAdd(state *XfrmState) error {
  59. return pkgHandle.XfrmStateAdd(state)
  60. }
  61. // XfrmStateAdd will add an xfrm state to the system.
  62. // Equivalent to: `ip xfrm state add $state`
  63. func (h *Handle) XfrmStateAdd(state *XfrmState) error {
  64. return h.xfrmStateAddOrUpdate(state, nl.XFRM_MSG_NEWSA)
  65. }
  66. // XfrmStateUpdate will update an xfrm state to the system.
  67. // Equivalent to: `ip xfrm state update $state`
  68. func XfrmStateUpdate(state *XfrmState) error {
  69. return pkgHandle.XfrmStateUpdate(state)
  70. }
  71. // XfrmStateUpdate will update an xfrm state to the system.
  72. // Equivalent to: `ip xfrm state update $state`
  73. func (h *Handle) XfrmStateUpdate(state *XfrmState) error {
  74. return h.xfrmStateAddOrUpdate(state, nl.XFRM_MSG_UPDSA)
  75. }
  76. func (h *Handle) xfrmStateAddOrUpdate(state *XfrmState, nlProto int) error {
  77. // A state with spi 0 can't be deleted so don't allow it to be set
  78. if state.Spi == 0 {
  79. return fmt.Errorf("Spi must be set when adding xfrm state.")
  80. }
  81. req := h.newNetlinkRequest(nlProto, syscall.NLM_F_CREATE|syscall.NLM_F_EXCL|syscall.NLM_F_ACK)
  82. msg := &nl.XfrmUsersaInfo{}
  83. msg.Family = uint16(nl.GetIPFamily(state.Dst))
  84. msg.Id.Daddr.FromIP(state.Dst)
  85. msg.Saddr.FromIP(state.Src)
  86. msg.Id.Proto = uint8(state.Proto)
  87. msg.Mode = uint8(state.Mode)
  88. msg.Id.Spi = nl.Swap32(uint32(state.Spi))
  89. msg.Reqid = uint32(state.Reqid)
  90. msg.ReplayWindow = uint8(state.ReplayWindow)
  91. limitsToLft(state.Limits, &msg.Lft)
  92. req.AddData(msg)
  93. if state.Auth != nil {
  94. out := nl.NewRtAttr(nl.XFRMA_ALG_AUTH_TRUNC, writeStateAlgoAuth(state.Auth))
  95. req.AddData(out)
  96. }
  97. if state.Crypt != nil {
  98. out := nl.NewRtAttr(nl.XFRMA_ALG_CRYPT, writeStateAlgo(state.Crypt))
  99. req.AddData(out)
  100. }
  101. if state.Aead != nil {
  102. out := nl.NewRtAttr(nl.XFRMA_ALG_AEAD, writeStateAlgoAead(state.Aead))
  103. req.AddData(out)
  104. }
  105. if state.Encap != nil {
  106. encapData := make([]byte, nl.SizeofXfrmEncapTmpl)
  107. encap := nl.DeserializeXfrmEncapTmpl(encapData)
  108. encap.EncapType = uint16(state.Encap.Type)
  109. encap.EncapSport = nl.Swap16(uint16(state.Encap.SrcPort))
  110. encap.EncapDport = nl.Swap16(uint16(state.Encap.DstPort))
  111. encap.EncapOa.FromIP(state.Encap.OriginalAddress)
  112. out := nl.NewRtAttr(nl.XFRMA_ENCAP, encapData)
  113. req.AddData(out)
  114. }
  115. if state.Mark != nil {
  116. out := nl.NewRtAttr(nl.XFRMA_MARK, writeMark(state.Mark))
  117. req.AddData(out)
  118. }
  119. _, err := req.Execute(syscall.NETLINK_XFRM, 0)
  120. return err
  121. }
  122. // XfrmStateDel will delete an xfrm state from the system. Note that
  123. // the Algos are ignored when matching the state to delete.
  124. // Equivalent to: `ip xfrm state del $state`
  125. func XfrmStateDel(state *XfrmState) error {
  126. return pkgHandle.XfrmStateDel(state)
  127. }
  128. // XfrmStateDel will delete an xfrm state from the system. Note that
  129. // the Algos are ignored when matching the state to delete.
  130. // Equivalent to: `ip xfrm state del $state`
  131. func (h *Handle) XfrmStateDel(state *XfrmState) error {
  132. _, err := h.xfrmStateGetOrDelete(state, nl.XFRM_MSG_DELSA)
  133. return err
  134. }
  135. // XfrmStateList gets a list of xfrm states in the system.
  136. // Equivalent to: `ip [-4|-6] xfrm state show`.
  137. // The list can be filtered by ip family.
  138. func XfrmStateList(family int) ([]XfrmState, error) {
  139. return pkgHandle.XfrmStateList(family)
  140. }
  141. // XfrmStateList gets a list of xfrm states in the system.
  142. // Equivalent to: `ip xfrm state show`.
  143. // The list can be filtered by ip family.
  144. func (h *Handle) XfrmStateList(family int) ([]XfrmState, error) {
  145. req := h.newNetlinkRequest(nl.XFRM_MSG_GETSA, syscall.NLM_F_DUMP)
  146. msgs, err := req.Execute(syscall.NETLINK_XFRM, nl.XFRM_MSG_NEWSA)
  147. if err != nil {
  148. return nil, err
  149. }
  150. var res []XfrmState
  151. for _, m := range msgs {
  152. if state, err := parseXfrmState(m, family); err == nil {
  153. res = append(res, *state)
  154. } else if err == familyError {
  155. continue
  156. } else {
  157. return nil, err
  158. }
  159. }
  160. return res, nil
  161. }
  162. // XfrmStateGet gets the xfrm state described by the ID, if found.
  163. // Equivalent to: `ip xfrm state get ID [ mark MARK [ mask MASK ] ]`.
  164. // Only the fields which constitue the SA ID must be filled in:
  165. // ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM-PROTO ] [ spi SPI ]
  166. // mark is optional
  167. func XfrmStateGet(state *XfrmState) (*XfrmState, error) {
  168. return pkgHandle.XfrmStateGet(state)
  169. }
  170. // XfrmStateGet gets the xfrm state described by the ID, if found.
  171. // Equivalent to: `ip xfrm state get ID [ mark MARK [ mask MASK ] ]`.
  172. // Only the fields which constitue the SA ID must be filled in:
  173. // ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM-PROTO ] [ spi SPI ]
  174. // mark is optional
  175. func (h *Handle) XfrmStateGet(state *XfrmState) (*XfrmState, error) {
  176. return h.xfrmStateGetOrDelete(state, nl.XFRM_MSG_GETSA)
  177. }
  178. func (h *Handle) xfrmStateGetOrDelete(state *XfrmState, nlProto int) (*XfrmState, error) {
  179. req := h.newNetlinkRequest(nlProto, syscall.NLM_F_ACK)
  180. msg := &nl.XfrmUsersaId{}
  181. msg.Family = uint16(nl.GetIPFamily(state.Dst))
  182. msg.Daddr.FromIP(state.Dst)
  183. msg.Proto = uint8(state.Proto)
  184. msg.Spi = nl.Swap32(uint32(state.Spi))
  185. req.AddData(msg)
  186. if state.Mark != nil {
  187. out := nl.NewRtAttr(nl.XFRMA_MARK, writeMark(state.Mark))
  188. req.AddData(out)
  189. }
  190. if state.Src != nil {
  191. out := nl.NewRtAttr(nl.XFRMA_SRCADDR, state.Src)
  192. req.AddData(out)
  193. }
  194. resType := nl.XFRM_MSG_NEWSA
  195. if nlProto == nl.XFRM_MSG_DELSA {
  196. resType = 0
  197. }
  198. msgs, err := req.Execute(syscall.NETLINK_XFRM, uint16(resType))
  199. if err != nil {
  200. return nil, err
  201. }
  202. if nlProto == nl.XFRM_MSG_DELSA {
  203. return nil, nil
  204. }
  205. s, err := parseXfrmState(msgs[0], FAMILY_ALL)
  206. if err != nil {
  207. return nil, err
  208. }
  209. return s, nil
  210. }
  211. var familyError = fmt.Errorf("family error")
  212. func parseXfrmState(m []byte, family int) (*XfrmState, error) {
  213. msg := nl.DeserializeXfrmUsersaInfo(m)
  214. // This is mainly for the state dump
  215. if family != FAMILY_ALL && family != int(msg.Family) {
  216. return nil, familyError
  217. }
  218. var state XfrmState
  219. state.Dst = msg.Id.Daddr.ToIP()
  220. state.Src = msg.Saddr.ToIP()
  221. state.Proto = Proto(msg.Id.Proto)
  222. state.Mode = Mode(msg.Mode)
  223. state.Spi = int(nl.Swap32(msg.Id.Spi))
  224. state.Reqid = int(msg.Reqid)
  225. state.ReplayWindow = int(msg.ReplayWindow)
  226. lftToLimits(&msg.Lft, &state.Limits)
  227. attrs, err := nl.ParseRouteAttr(m[nl.SizeofXfrmUsersaInfo:])
  228. if err != nil {
  229. return nil, err
  230. }
  231. for _, attr := range attrs {
  232. switch attr.Attr.Type {
  233. case nl.XFRMA_ALG_AUTH, nl.XFRMA_ALG_CRYPT:
  234. var resAlgo *XfrmStateAlgo
  235. if attr.Attr.Type == nl.XFRMA_ALG_AUTH {
  236. if state.Auth == nil {
  237. state.Auth = new(XfrmStateAlgo)
  238. }
  239. resAlgo = state.Auth
  240. } else {
  241. state.Crypt = new(XfrmStateAlgo)
  242. resAlgo = state.Crypt
  243. }
  244. algo := nl.DeserializeXfrmAlgo(attr.Value[:])
  245. (*resAlgo).Name = nl.BytesToString(algo.AlgName[:])
  246. (*resAlgo).Key = algo.AlgKey
  247. case nl.XFRMA_ALG_AUTH_TRUNC:
  248. if state.Auth == nil {
  249. state.Auth = new(XfrmStateAlgo)
  250. }
  251. algo := nl.DeserializeXfrmAlgoAuth(attr.Value[:])
  252. state.Auth.Name = nl.BytesToString(algo.AlgName[:])
  253. state.Auth.Key = algo.AlgKey
  254. state.Auth.TruncateLen = int(algo.AlgTruncLen)
  255. case nl.XFRMA_ALG_AEAD:
  256. state.Aead = new(XfrmStateAlgo)
  257. algo := nl.DeserializeXfrmAlgoAEAD(attr.Value[:])
  258. state.Aead.Name = nl.BytesToString(algo.AlgName[:])
  259. state.Aead.Key = algo.AlgKey
  260. state.Aead.ICVLen = int(algo.AlgICVLen)
  261. case nl.XFRMA_ENCAP:
  262. encap := nl.DeserializeXfrmEncapTmpl(attr.Value[:])
  263. state.Encap = new(XfrmStateEncap)
  264. state.Encap.Type = EncapType(encap.EncapType)
  265. state.Encap.SrcPort = int(nl.Swap16(encap.EncapSport))
  266. state.Encap.DstPort = int(nl.Swap16(encap.EncapDport))
  267. state.Encap.OriginalAddress = encap.EncapOa.ToIP()
  268. case nl.XFRMA_MARK:
  269. mark := nl.DeserializeXfrmMark(attr.Value[:])
  270. state.Mark = new(XfrmMark)
  271. state.Mark.Value = mark.Value
  272. state.Mark.Mask = mark.Mask
  273. }
  274. }
  275. return &state, nil
  276. }
  277. // XfrmStateFlush will flush the xfrm state on the system.
  278. // proto = 0 means any transformation protocols
  279. // Equivalent to: `ip xfrm state flush [ proto XFRM-PROTO ]`
  280. func XfrmStateFlush(proto Proto) error {
  281. return pkgHandle.XfrmStateFlush(proto)
  282. }
  283. // XfrmStateFlush will flush the xfrm state on the system.
  284. // proto = 0 means any transformation protocols
  285. // Equivalent to: `ip xfrm state flush [ proto XFRM-PROTO ]`
  286. func (h *Handle) XfrmStateFlush(proto Proto) error {
  287. req := h.newNetlinkRequest(nl.XFRM_MSG_FLUSHSA, syscall.NLM_F_ACK)
  288. req.AddData(&nl.XfrmUsersaFlush{Proto: uint8(proto)})
  289. _, err := req.Execute(syscall.NETLINK_XFRM, 0)
  290. if err != nil {
  291. return err
  292. }
  293. return nil
  294. }
  295. func limitsToLft(lmts XfrmStateLimits, lft *nl.XfrmLifetimeCfg) {
  296. if lmts.ByteSoft != 0 {
  297. lft.SoftByteLimit = lmts.ByteSoft
  298. } else {
  299. lft.SoftByteLimit = nl.XFRM_INF
  300. }
  301. if lmts.ByteHard != 0 {
  302. lft.HardByteLimit = lmts.ByteHard
  303. } else {
  304. lft.HardByteLimit = nl.XFRM_INF
  305. }
  306. if lmts.PacketSoft != 0 {
  307. lft.SoftPacketLimit = lmts.PacketSoft
  308. } else {
  309. lft.SoftPacketLimit = nl.XFRM_INF
  310. }
  311. if lmts.PacketHard != 0 {
  312. lft.HardPacketLimit = lmts.PacketHard
  313. } else {
  314. lft.HardPacketLimit = nl.XFRM_INF
  315. }
  316. lft.SoftAddExpiresSeconds = lmts.TimeSoft
  317. lft.HardAddExpiresSeconds = lmts.TimeHard
  318. lft.SoftUseExpiresSeconds = lmts.TimeUseSoft
  319. lft.HardUseExpiresSeconds = lmts.TimeUseHard
  320. }
  321. func lftToLimits(lft *nl.XfrmLifetimeCfg, lmts *XfrmStateLimits) {
  322. *lmts = *(*XfrmStateLimits)(unsafe.Pointer(lft))
  323. }