xfrm_state_linux.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697
  1. package netlink
  2. import (
  3. "errors"
  4. "fmt"
  5. "net"
  6. "time"
  7. "unsafe"
  8. "github.com/vishvananda/netlink/nl"
  9. "golang.org/x/sys/unix"
  10. )
  11. // XfrmStateAlgo represents the algorithm to use for the ipsec encryption.
  12. type XfrmStateAlgo struct {
  13. Name string
  14. Key []byte
  15. TruncateLen int // Auth only
  16. ICVLen int // AEAD only
  17. }
  18. func (a XfrmStateAlgo) String() string {
  19. base := fmt.Sprintf("{Name: %s, Key: 0x%x", a.Name, a.Key)
  20. if a.TruncateLen != 0 {
  21. base = fmt.Sprintf("%s, Truncate length: %d", base, a.TruncateLen)
  22. }
  23. if a.ICVLen != 0 {
  24. base = fmt.Sprintf("%s, ICV length: %d", base, a.ICVLen)
  25. }
  26. return fmt.Sprintf("%s}", base)
  27. }
  28. // EncapType is an enum representing the optional packet encapsulation.
  29. type EncapType uint8
  30. const (
  31. XFRM_ENCAP_ESPINUDP_NONIKE EncapType = iota + 1
  32. XFRM_ENCAP_ESPINUDP
  33. )
  34. func (e EncapType) String() string {
  35. switch e {
  36. case XFRM_ENCAP_ESPINUDP_NONIKE:
  37. return "espinudp-non-ike"
  38. case XFRM_ENCAP_ESPINUDP:
  39. return "espinudp"
  40. }
  41. return "unknown"
  42. }
  43. // XfrmStateEncap represents the encapsulation to use for the ipsec encryption.
  44. type XfrmStateEncap struct {
  45. Type EncapType
  46. SrcPort int
  47. DstPort int
  48. OriginalAddress net.IP
  49. }
  50. func (e XfrmStateEncap) String() string {
  51. return fmt.Sprintf("{Type: %s, Srcport: %d, DstPort: %d, OriginalAddress: %v}",
  52. e.Type, e.SrcPort, e.DstPort, e.OriginalAddress)
  53. }
  54. // XfrmStateLimits represents the configured limits for the state.
  55. type XfrmStateLimits struct {
  56. ByteSoft uint64
  57. ByteHard uint64
  58. PacketSoft uint64
  59. PacketHard uint64
  60. TimeSoft uint64
  61. TimeHard uint64
  62. TimeUseSoft uint64
  63. TimeUseHard uint64
  64. }
  65. // XfrmStateStats represents the current number of bytes/packets
  66. // processed by this State, the State's installation and first use
  67. // time and the replay window counters.
  68. type XfrmStateStats struct {
  69. ReplayWindow uint32
  70. Replay uint32
  71. Failed uint32
  72. Bytes uint64
  73. Packets uint64
  74. AddTime uint64
  75. UseTime uint64
  76. }
  77. // XfrmReplayState represents the sequence number states for
  78. // "legacy" anti-replay mode.
  79. type XfrmReplayState struct {
  80. OSeq uint32
  81. Seq uint32
  82. BitMap uint32
  83. }
  84. func (r XfrmReplayState) String() string {
  85. return fmt.Sprintf("{OSeq: 0x%x, Seq: 0x%x, BitMap: 0x%x}",
  86. r.OSeq, r.Seq, r.BitMap)
  87. }
  88. // XfrmState represents the state of an ipsec policy. It optionally
  89. // contains an XfrmStateAlgo for encryption and one for authentication.
  90. type XfrmState struct {
  91. Dst net.IP
  92. Src net.IP
  93. Proto Proto
  94. Mode Mode
  95. Spi int
  96. Reqid int
  97. ReplayWindow int
  98. Limits XfrmStateLimits
  99. Statistics XfrmStateStats
  100. Mark *XfrmMark
  101. OutputMark *XfrmMark
  102. SADir SADir
  103. Ifid int
  104. Pcpunum *uint32
  105. Auth *XfrmStateAlgo
  106. Crypt *XfrmStateAlgo
  107. Aead *XfrmStateAlgo
  108. Encap *XfrmStateEncap
  109. ESN bool
  110. DontEncapDSCP bool
  111. OSeqMayWrap bool
  112. Replay *XfrmReplayState
  113. Selector *XfrmPolicy
  114. }
  115. func (sa XfrmState) String() string {
  116. return fmt.Sprintf("Dst: %v, Src: %v, Proto: %s, Mode: %s, SPI: 0x%x, ReqID: 0x%x, ReplayWindow: %d, Mark: %v, OutputMark: %v, SADir: %d, Ifid: %d, Pcpunum: %d, Auth: %v, Crypt: %v, Aead: %v, Encap: %v, ESN: %t, DontEncapDSCP: %t, OSeqMayWrap: %t, Replay: %v",
  117. sa.Dst, sa.Src, sa.Proto, sa.Mode, sa.Spi, sa.Reqid, sa.ReplayWindow, sa.Mark, sa.OutputMark, sa.SADir, sa.Ifid, *sa.Pcpunum, sa.Auth, sa.Crypt, sa.Aead, sa.Encap, sa.ESN, sa.DontEncapDSCP, sa.OSeqMayWrap, sa.Replay)
  118. }
  119. func (sa XfrmState) Print(stats bool) string {
  120. if !stats {
  121. return sa.String()
  122. }
  123. at := time.Unix(int64(sa.Statistics.AddTime), 0).Format(time.UnixDate)
  124. ut := "-"
  125. if sa.Statistics.UseTime > 0 {
  126. ut = time.Unix(int64(sa.Statistics.UseTime), 0).Format(time.UnixDate)
  127. }
  128. return fmt.Sprintf("%s, ByteSoft: %s, ByteHard: %s, PacketSoft: %s, PacketHard: %s, TimeSoft: %d, TimeHard: %d, TimeUseSoft: %d, TimeUseHard: %d, Bytes: %d, Packets: %d, "+
  129. "AddTime: %s, UseTime: %s, ReplayWindow: %d, Replay: %d, Failed: %d",
  130. sa.String(), printLimit(sa.Limits.ByteSoft), printLimit(sa.Limits.ByteHard), printLimit(sa.Limits.PacketSoft), printLimit(sa.Limits.PacketHard),
  131. sa.Limits.TimeSoft, sa.Limits.TimeHard, sa.Limits.TimeUseSoft, sa.Limits.TimeUseHard, sa.Statistics.Bytes, sa.Statistics.Packets, at, ut,
  132. sa.Statistics.ReplayWindow, sa.Statistics.Replay, sa.Statistics.Failed)
  133. }
  134. func printLimit(lmt uint64) string {
  135. if lmt == ^uint64(0) {
  136. return "(INF)"
  137. }
  138. return fmt.Sprintf("%d", lmt)
  139. }
  140. func writeStateAlgo(a *XfrmStateAlgo) []byte {
  141. algo := nl.XfrmAlgo{
  142. AlgKeyLen: uint32(len(a.Key) * 8),
  143. AlgKey: a.Key,
  144. }
  145. end := len(a.Name)
  146. if end > 64 {
  147. end = 64
  148. }
  149. copy(algo.AlgName[:end], a.Name)
  150. return algo.Serialize()
  151. }
  152. func writeStateAlgoAuth(a *XfrmStateAlgo) []byte {
  153. algo := nl.XfrmAlgoAuth{
  154. AlgKeyLen: uint32(len(a.Key) * 8),
  155. AlgTruncLen: uint32(a.TruncateLen),
  156. AlgKey: a.Key,
  157. }
  158. end := len(a.Name)
  159. if end > 64 {
  160. end = 64
  161. }
  162. copy(algo.AlgName[:end], a.Name)
  163. return algo.Serialize()
  164. }
  165. func writeStateAlgoAead(a *XfrmStateAlgo) []byte {
  166. algo := nl.XfrmAlgoAEAD{
  167. AlgKeyLen: uint32(len(a.Key) * 8),
  168. AlgICVLen: uint32(a.ICVLen),
  169. AlgKey: a.Key,
  170. }
  171. end := len(a.Name)
  172. if end > 64 {
  173. end = 64
  174. }
  175. copy(algo.AlgName[:end], a.Name)
  176. return algo.Serialize()
  177. }
  178. func writeMark(m *XfrmMark) []byte {
  179. mark := &nl.XfrmMark{
  180. Value: m.Value,
  181. Mask: m.Mask,
  182. }
  183. if mark.Mask == 0 {
  184. mark.Mask = ^uint32(0)
  185. }
  186. return mark.Serialize()
  187. }
  188. func writeReplayEsn(replayWindow int) []byte {
  189. replayEsn := &nl.XfrmReplayStateEsn{
  190. OSeq: 0,
  191. Seq: 0,
  192. OSeqHi: 0,
  193. SeqHi: 0,
  194. ReplayWindow: uint32(replayWindow),
  195. }
  196. // Linux stores the bitmap to identify the already received sequence packets in blocks of uint32 elements.
  197. // Therefore bitmap length is the minimum number of uint32 elements needed. The following is a ceiling operation.
  198. bytesPerElem := int(unsafe.Sizeof(replayEsn.BmpLen)) // Any uint32 variable is good for this
  199. replayEsn.BmpLen = uint32((replayWindow + (bytesPerElem * 8) - 1) / (bytesPerElem * 8))
  200. return replayEsn.Serialize()
  201. }
  202. func writeReplay(r *XfrmReplayState) []byte {
  203. return (&nl.XfrmReplayState{
  204. OSeq: r.OSeq,
  205. Seq: r.Seq,
  206. BitMap: r.BitMap,
  207. }).Serialize()
  208. }
  209. // XfrmStateAdd will add an xfrm state to the system.
  210. // Equivalent to: `ip xfrm state add $state`
  211. func XfrmStateAdd(state *XfrmState) error {
  212. return pkgHandle.XfrmStateAdd(state)
  213. }
  214. // XfrmStateAdd will add an xfrm state to the system.
  215. // Equivalent to: `ip xfrm state add $state`
  216. func (h *Handle) XfrmStateAdd(state *XfrmState) error {
  217. return h.xfrmStateAddOrUpdate(state, nl.XFRM_MSG_NEWSA)
  218. }
  219. // XfrmStateAllocSpi will allocate an xfrm state in the system.
  220. // Equivalent to: `ip xfrm state allocspi`
  221. func XfrmStateAllocSpi(state *XfrmState) (*XfrmState, error) {
  222. return pkgHandle.xfrmStateAllocSpi(state)
  223. }
  224. // XfrmStateUpdate will update an xfrm state to the system.
  225. // Equivalent to: `ip xfrm state update $state`
  226. func XfrmStateUpdate(state *XfrmState) error {
  227. return pkgHandle.XfrmStateUpdate(state)
  228. }
  229. // XfrmStateUpdate will update an xfrm state to the system.
  230. // Equivalent to: `ip xfrm state update $state`
  231. func (h *Handle) XfrmStateUpdate(state *XfrmState) error {
  232. return h.xfrmStateAddOrUpdate(state, nl.XFRM_MSG_UPDSA)
  233. }
  234. func (h *Handle) xfrmStateAddOrUpdate(state *XfrmState, nlProto int) error {
  235. // A state with spi 0 can't be deleted so don't allow it to be set
  236. if state.Spi == 0 {
  237. return fmt.Errorf("Spi must be set when adding xfrm state")
  238. }
  239. req := h.newNetlinkRequest(nlProto, unix.NLM_F_CREATE|unix.NLM_F_EXCL|unix.NLM_F_ACK)
  240. msg := xfrmUsersaInfoFromXfrmState(state)
  241. if state.ESN {
  242. if state.ReplayWindow == 0 {
  243. return fmt.Errorf("ESN flag set without ReplayWindow")
  244. }
  245. msg.Flags |= nl.XFRM_STATE_ESN
  246. msg.ReplayWindow = 0
  247. }
  248. limitsToLft(state.Limits, &msg.Lft)
  249. req.AddData(msg)
  250. if state.Auth != nil {
  251. out := nl.NewRtAttr(nl.XFRMA_ALG_AUTH_TRUNC, writeStateAlgoAuth(state.Auth))
  252. req.AddData(out)
  253. }
  254. if state.Crypt != nil {
  255. out := nl.NewRtAttr(nl.XFRMA_ALG_CRYPT, writeStateAlgo(state.Crypt))
  256. req.AddData(out)
  257. }
  258. if state.Aead != nil {
  259. out := nl.NewRtAttr(nl.XFRMA_ALG_AEAD, writeStateAlgoAead(state.Aead))
  260. req.AddData(out)
  261. }
  262. if state.Encap != nil {
  263. encapData := make([]byte, nl.SizeofXfrmEncapTmpl)
  264. encap := nl.DeserializeXfrmEncapTmpl(encapData)
  265. encap.EncapType = uint16(state.Encap.Type)
  266. encap.EncapSport = nl.Swap16(uint16(state.Encap.SrcPort))
  267. encap.EncapDport = nl.Swap16(uint16(state.Encap.DstPort))
  268. encap.EncapOa.FromIP(state.Encap.OriginalAddress)
  269. out := nl.NewRtAttr(nl.XFRMA_ENCAP, encapData)
  270. req.AddData(out)
  271. }
  272. if state.Mark != nil {
  273. out := nl.NewRtAttr(nl.XFRMA_MARK, writeMark(state.Mark))
  274. req.AddData(out)
  275. }
  276. if state.ESN {
  277. out := nl.NewRtAttr(nl.XFRMA_REPLAY_ESN_VAL, writeReplayEsn(state.ReplayWindow))
  278. req.AddData(out)
  279. }
  280. if state.OutputMark != nil {
  281. out := nl.NewRtAttr(nl.XFRMA_SET_MARK, nl.Uint32Attr(state.OutputMark.Value))
  282. req.AddData(out)
  283. if state.OutputMark.Mask != 0 {
  284. out = nl.NewRtAttr(nl.XFRMA_SET_MARK_MASK, nl.Uint32Attr(state.OutputMark.Mask))
  285. req.AddData(out)
  286. }
  287. }
  288. if state.OSeqMayWrap || state.DontEncapDSCP {
  289. var flags uint32
  290. if state.DontEncapDSCP {
  291. flags |= nl.XFRM_SA_XFLAG_DONT_ENCAP_DSCP
  292. }
  293. if state.OSeqMayWrap {
  294. flags |= nl.XFRM_SA_XFLAG_OSEQ_MAY_WRAP
  295. }
  296. out := nl.NewRtAttr(nl.XFRMA_SA_EXTRA_FLAGS, nl.Uint32Attr(flags))
  297. req.AddData(out)
  298. }
  299. if state.Replay != nil {
  300. out := nl.NewRtAttr(nl.XFRMA_REPLAY_VAL, writeReplay(state.Replay))
  301. req.AddData(out)
  302. }
  303. if state.SADir != 0 {
  304. saDir := nl.NewRtAttr(nl.XFRMA_SA_DIR, nl.Uint8Attr(uint8(state.SADir)))
  305. req.AddData(saDir)
  306. }
  307. if state.Ifid != 0 {
  308. ifId := nl.NewRtAttr(nl.XFRMA_IF_ID, nl.Uint32Attr(uint32(state.Ifid)))
  309. req.AddData(ifId)
  310. }
  311. if state.Pcpunum != nil {
  312. pcpuNum := nl.NewRtAttr(nl.XFRMA_SA_PCPU, nl.Uint32Attr(uint32(*state.Pcpunum)))
  313. req.AddData(pcpuNum)
  314. }
  315. _, err := req.Execute(unix.NETLINK_XFRM, 0)
  316. return err
  317. }
  318. func (h *Handle) xfrmStateAllocSpi(state *XfrmState) (*XfrmState, error) {
  319. req := h.newNetlinkRequest(nl.XFRM_MSG_ALLOCSPI,
  320. unix.NLM_F_CREATE|unix.NLM_F_EXCL|unix.NLM_F_ACK)
  321. msg := &nl.XfrmUserSpiInfo{}
  322. msg.XfrmUsersaInfo = *(xfrmUsersaInfoFromXfrmState(state))
  323. // 1-255 is reserved by IANA for future use
  324. msg.Min = 0x100
  325. msg.Max = 0xffffffff
  326. req.AddData(msg)
  327. if state.Mark != nil {
  328. out := nl.NewRtAttr(nl.XFRMA_MARK, writeMark(state.Mark))
  329. req.AddData(out)
  330. }
  331. msgs, err := req.Execute(unix.NETLINK_XFRM, 0)
  332. if err != nil {
  333. return nil, err
  334. }
  335. return parseXfrmState(msgs[0], FAMILY_ALL)
  336. }
  337. // XfrmStateDel will delete an xfrm state from the system. Note that
  338. // the Algos are ignored when matching the state to delete.
  339. // Equivalent to: `ip xfrm state del $state`
  340. func XfrmStateDel(state *XfrmState) error {
  341. return pkgHandle.XfrmStateDel(state)
  342. }
  343. // XfrmStateDel will delete an xfrm state from the system. Note that
  344. // the Algos are ignored when matching the state to delete.
  345. // Equivalent to: `ip xfrm state del $state`
  346. func (h *Handle) XfrmStateDel(state *XfrmState) error {
  347. _, err := h.xfrmStateGetOrDelete(state, nl.XFRM_MSG_DELSA)
  348. return err
  349. }
  350. // XfrmStateList gets a list of xfrm states in the system.
  351. // Equivalent to: `ip [-4|-6] xfrm state show`.
  352. // The list can be filtered by ip family.
  353. //
  354. // If the returned error is [ErrDumpInterrupted], results may be inconsistent
  355. // or incomplete.
  356. func XfrmStateList(family int) ([]XfrmState, error) {
  357. return pkgHandle.XfrmStateList(family)
  358. }
  359. // XfrmStateList gets a list of xfrm states in the system.
  360. // Equivalent to: `ip xfrm state show`.
  361. // The list can be filtered by ip family.
  362. //
  363. // If the returned error is [ErrDumpInterrupted], results may be inconsistent
  364. // or incomplete.
  365. func (h *Handle) XfrmStateList(family int) ([]XfrmState, error) {
  366. req := h.newNetlinkRequest(nl.XFRM_MSG_GETSA, unix.NLM_F_DUMP)
  367. msgs, executeErr := req.Execute(unix.NETLINK_XFRM, nl.XFRM_MSG_NEWSA)
  368. if executeErr != nil && !errors.Is(executeErr, ErrDumpInterrupted) {
  369. return nil, executeErr
  370. }
  371. var res []XfrmState
  372. for _, m := range msgs {
  373. if state, err := parseXfrmState(m, family); err == nil {
  374. res = append(res, *state)
  375. } else if err == familyError {
  376. continue
  377. } else {
  378. return nil, err
  379. }
  380. }
  381. return res, executeErr
  382. }
  383. // XfrmStateGet gets the xfrm state described by the ID, if found.
  384. // Equivalent to: `ip xfrm state get ID [ mark MARK [ mask MASK ] ]`.
  385. // Only the fields which constitue the SA ID must be filled in:
  386. // ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM-PROTO ] [ spi SPI ]
  387. // mark is optional
  388. func XfrmStateGet(state *XfrmState) (*XfrmState, error) {
  389. return pkgHandle.XfrmStateGet(state)
  390. }
  391. // XfrmStateGet gets the xfrm state described by the ID, if found.
  392. // Equivalent to: `ip xfrm state get ID [ mark MARK [ mask MASK ] ]`.
  393. // Only the fields which constitue the SA ID must be filled in:
  394. // ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM-PROTO ] [ spi SPI ]
  395. // mark is optional
  396. func (h *Handle) XfrmStateGet(state *XfrmState) (*XfrmState, error) {
  397. return h.xfrmStateGetOrDelete(state, nl.XFRM_MSG_GETSA)
  398. }
  399. func (h *Handle) xfrmStateGetOrDelete(state *XfrmState, nlProto int) (*XfrmState, error) {
  400. req := h.newNetlinkRequest(nlProto, unix.NLM_F_ACK)
  401. msg := &nl.XfrmUsersaId{}
  402. msg.Family = uint16(nl.GetIPFamily(state.Dst))
  403. msg.Daddr.FromIP(state.Dst)
  404. msg.Proto = uint8(state.Proto)
  405. msg.Spi = nl.Swap32(uint32(state.Spi))
  406. req.AddData(msg)
  407. if state.Mark != nil {
  408. out := nl.NewRtAttr(nl.XFRMA_MARK, writeMark(state.Mark))
  409. req.AddData(out)
  410. }
  411. if state.Src != nil {
  412. out := nl.NewRtAttr(nl.XFRMA_SRCADDR, state.Src.To16())
  413. req.AddData(out)
  414. }
  415. if state.Ifid != 0 {
  416. ifId := nl.NewRtAttr(nl.XFRMA_IF_ID, nl.Uint32Attr(uint32(state.Ifid)))
  417. req.AddData(ifId)
  418. }
  419. if state.Pcpunum != nil {
  420. pcpuNum := nl.NewRtAttr(nl.XFRMA_SA_PCPU, nl.Uint32Attr(uint32(*state.Pcpunum)))
  421. req.AddData(pcpuNum)
  422. }
  423. resType := nl.XFRM_MSG_NEWSA
  424. if nlProto == nl.XFRM_MSG_DELSA {
  425. resType = 0
  426. }
  427. msgs, err := req.Execute(unix.NETLINK_XFRM, uint16(resType))
  428. if err != nil {
  429. return nil, err
  430. }
  431. if nlProto == nl.XFRM_MSG_DELSA {
  432. return nil, nil
  433. }
  434. s, err := parseXfrmState(msgs[0], FAMILY_ALL)
  435. if err != nil {
  436. return nil, err
  437. }
  438. return s, nil
  439. }
  440. var familyError = fmt.Errorf("family error")
  441. func xfrmStateFromXfrmUsersaInfo(msg *nl.XfrmUsersaInfo) *XfrmState {
  442. var state XfrmState
  443. state.Dst = msg.Id.Daddr.ToIP()
  444. state.Src = msg.Saddr.ToIP()
  445. state.Proto = Proto(msg.Id.Proto)
  446. state.Mode = Mode(msg.Mode)
  447. state.Spi = int(nl.Swap32(msg.Id.Spi))
  448. state.Reqid = int(msg.Reqid)
  449. state.ReplayWindow = int(msg.ReplayWindow)
  450. lftToLimits(&msg.Lft, &state.Limits)
  451. curToStats(&msg.Curlft, &msg.Stats, &state.Statistics)
  452. state.Selector = &XfrmPolicy{
  453. Dst: msg.Sel.Daddr.ToIPNet(msg.Sel.PrefixlenD, msg.Sel.Family),
  454. Src: msg.Sel.Saddr.ToIPNet(msg.Sel.PrefixlenS, msg.Sel.Family),
  455. Proto: Proto(msg.Sel.Proto),
  456. DstPort: int(nl.Swap16(msg.Sel.Dport)),
  457. SrcPort: int(nl.Swap16(msg.Sel.Sport)),
  458. Ifindex: int(msg.Sel.Ifindex),
  459. }
  460. return &state
  461. }
  462. func parseXfrmState(m []byte, family int) (*XfrmState, error) {
  463. msg := nl.DeserializeXfrmUsersaInfo(m)
  464. // This is mainly for the state dump
  465. if family != FAMILY_ALL && family != int(msg.Family) {
  466. return nil, familyError
  467. }
  468. state := xfrmStateFromXfrmUsersaInfo(msg)
  469. attrs, err := nl.ParseRouteAttr(m[nl.SizeofXfrmUsersaInfo:])
  470. if err != nil {
  471. return nil, err
  472. }
  473. for _, attr := range attrs {
  474. switch attr.Attr.Type {
  475. case nl.XFRMA_ALG_AUTH, nl.XFRMA_ALG_CRYPT:
  476. var resAlgo *XfrmStateAlgo
  477. if attr.Attr.Type == nl.XFRMA_ALG_AUTH {
  478. if state.Auth == nil {
  479. state.Auth = new(XfrmStateAlgo)
  480. }
  481. resAlgo = state.Auth
  482. } else {
  483. state.Crypt = new(XfrmStateAlgo)
  484. resAlgo = state.Crypt
  485. }
  486. algo := nl.DeserializeXfrmAlgo(attr.Value[:])
  487. (*resAlgo).Name = nl.BytesToString(algo.AlgName[:])
  488. (*resAlgo).Key = algo.AlgKey
  489. case nl.XFRMA_ALG_AUTH_TRUNC:
  490. if state.Auth == nil {
  491. state.Auth = new(XfrmStateAlgo)
  492. }
  493. algo := nl.DeserializeXfrmAlgoAuth(attr.Value[:])
  494. state.Auth.Name = nl.BytesToString(algo.AlgName[:])
  495. state.Auth.Key = algo.AlgKey
  496. state.Auth.TruncateLen = int(algo.AlgTruncLen)
  497. case nl.XFRMA_ALG_AEAD:
  498. state.Aead = new(XfrmStateAlgo)
  499. algo := nl.DeserializeXfrmAlgoAEAD(attr.Value[:])
  500. state.Aead.Name = nl.BytesToString(algo.AlgName[:])
  501. state.Aead.Key = algo.AlgKey
  502. state.Aead.ICVLen = int(algo.AlgICVLen)
  503. case nl.XFRMA_ENCAP:
  504. encap := nl.DeserializeXfrmEncapTmpl(attr.Value[:])
  505. state.Encap = new(XfrmStateEncap)
  506. state.Encap.Type = EncapType(encap.EncapType)
  507. state.Encap.SrcPort = int(nl.Swap16(encap.EncapSport))
  508. state.Encap.DstPort = int(nl.Swap16(encap.EncapDport))
  509. state.Encap.OriginalAddress = encap.EncapOa.ToIP()
  510. case nl.XFRMA_MARK:
  511. mark := nl.DeserializeXfrmMark(attr.Value[:])
  512. state.Mark = new(XfrmMark)
  513. state.Mark.Value = mark.Value
  514. state.Mark.Mask = mark.Mask
  515. case nl.XFRMA_SA_EXTRA_FLAGS:
  516. flags := native.Uint32(attr.Value)
  517. if (flags & nl.XFRM_SA_XFLAG_DONT_ENCAP_DSCP) != 0 {
  518. state.DontEncapDSCP = true
  519. }
  520. if (flags & nl.XFRM_SA_XFLAG_OSEQ_MAY_WRAP) != 0 {
  521. state.OSeqMayWrap = true
  522. }
  523. case nl.XFRMA_SET_MARK:
  524. if state.OutputMark == nil {
  525. state.OutputMark = new(XfrmMark)
  526. }
  527. state.OutputMark.Value = native.Uint32(attr.Value)
  528. case nl.XFRMA_SET_MARK_MASK:
  529. if state.OutputMark == nil {
  530. state.OutputMark = new(XfrmMark)
  531. }
  532. state.OutputMark.Mask = native.Uint32(attr.Value)
  533. if state.OutputMark.Mask == 0xffffffff {
  534. state.OutputMark.Mask = 0
  535. }
  536. case nl.XFRMA_SA_DIR:
  537. state.SADir = SADir(attr.Value[0])
  538. case nl.XFRMA_IF_ID:
  539. state.Ifid = int(native.Uint32(attr.Value))
  540. case nl.XFRMA_SA_PCPU:
  541. pcpuNum := native.Uint32(attr.Value)
  542. state.Pcpunum = &pcpuNum
  543. case nl.XFRMA_REPLAY_VAL:
  544. if state.Replay == nil {
  545. state.Replay = new(XfrmReplayState)
  546. }
  547. replay := nl.DeserializeXfrmReplayState(attr.Value[:])
  548. state.Replay.OSeq = replay.OSeq
  549. state.Replay.Seq = replay.Seq
  550. state.Replay.BitMap = replay.BitMap
  551. }
  552. }
  553. return state, nil
  554. }
  555. // XfrmStateFlush will flush the xfrm state on the system.
  556. // proto = 0 means any transformation protocols
  557. // Equivalent to: `ip xfrm state flush [ proto XFRM-PROTO ]`
  558. func XfrmStateFlush(proto Proto) error {
  559. return pkgHandle.XfrmStateFlush(proto)
  560. }
  561. // XfrmStateFlush will flush the xfrm state on the system.
  562. // proto = 0 means any transformation protocols
  563. // Equivalent to: `ip xfrm state flush [ proto XFRM-PROTO ]`
  564. func (h *Handle) XfrmStateFlush(proto Proto) error {
  565. req := h.newNetlinkRequest(nl.XFRM_MSG_FLUSHSA, unix.NLM_F_ACK)
  566. req.AddData(&nl.XfrmUsersaFlush{Proto: uint8(proto)})
  567. _, err := req.Execute(unix.NETLINK_XFRM, 0)
  568. return err
  569. }
  570. func limitsToLft(lmts XfrmStateLimits, lft *nl.XfrmLifetimeCfg) {
  571. if lmts.ByteSoft != 0 {
  572. lft.SoftByteLimit = lmts.ByteSoft
  573. } else {
  574. lft.SoftByteLimit = nl.XFRM_INF
  575. }
  576. if lmts.ByteHard != 0 {
  577. lft.HardByteLimit = lmts.ByteHard
  578. } else {
  579. lft.HardByteLimit = nl.XFRM_INF
  580. }
  581. if lmts.PacketSoft != 0 {
  582. lft.SoftPacketLimit = lmts.PacketSoft
  583. } else {
  584. lft.SoftPacketLimit = nl.XFRM_INF
  585. }
  586. if lmts.PacketHard != 0 {
  587. lft.HardPacketLimit = lmts.PacketHard
  588. } else {
  589. lft.HardPacketLimit = nl.XFRM_INF
  590. }
  591. lft.SoftAddExpiresSeconds = lmts.TimeSoft
  592. lft.HardAddExpiresSeconds = lmts.TimeHard
  593. lft.SoftUseExpiresSeconds = lmts.TimeUseSoft
  594. lft.HardUseExpiresSeconds = lmts.TimeUseHard
  595. }
  596. func lftToLimits(lft *nl.XfrmLifetimeCfg, lmts *XfrmStateLimits) {
  597. *lmts = *(*XfrmStateLimits)(unsafe.Pointer(lft))
  598. }
  599. func curToStats(cur *nl.XfrmLifetimeCur, wstats *nl.XfrmStats, stats *XfrmStateStats) {
  600. stats.Bytes = cur.Bytes
  601. stats.Packets = cur.Packets
  602. stats.AddTime = cur.AddTime
  603. stats.UseTime = cur.UseTime
  604. stats.ReplayWindow = wstats.ReplayWindow
  605. stats.Replay = wstats.Replay
  606. stats.Failed = wstats.IntegrityFailed
  607. }
  608. func xfrmUsersaInfoFromXfrmState(state *XfrmState) *nl.XfrmUsersaInfo {
  609. msg := &nl.XfrmUsersaInfo{}
  610. msg.Family = uint16(nl.GetIPFamily(state.Dst))
  611. msg.Id.Daddr.FromIP(state.Dst)
  612. msg.Saddr.FromIP(state.Src)
  613. msg.Id.Proto = uint8(state.Proto)
  614. msg.Mode = uint8(state.Mode)
  615. msg.Id.Spi = nl.Swap32(uint32(state.Spi))
  616. msg.Reqid = uint32(state.Reqid)
  617. msg.ReplayWindow = uint8(state.ReplayWindow)
  618. msg.Sel = nl.XfrmSelector{}
  619. if state.Selector != nil {
  620. selFromPolicy(&msg.Sel, state.Selector)
  621. }
  622. return msg
  623. }