blob: 5ad147b934fa09d26ebe79e0fb45ef9166ccd813 [file] [log] [blame]
Neale Ranns999c8ee2019-02-01 03:31:24 -08001/*
2 * Copyright (c) 2015 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16#include <vnet/ipsec/ipsec.h>
17
Neale Rannsa09c1ff2019-02-04 01:10:30 -080018/**
19 * @brief
20 * Policy packet & bytes counters
21 */
22vlib_combined_counter_main_t ipsec_spd_policy_counters = {
23 .name = "policy",
24 .stat_segment_name = "/net/ipsec/policy",
25};
26
27static int
28ipsec_policy_is_equal (ipsec_policy_t * p1, ipsec_policy_t * p2)
29{
30 if (p1->priority != p2->priority)
31 return 0;
32 if (p1->is_outbound != p2->is_outbound)
33 return (0);
34 if (p1->policy != p2->policy)
35 return (0);
36 if (p1->sa_id != p2->sa_id)
37 return (0);
38 if (p1->protocol != p2->protocol)
39 return (0);
40 if (p1->lport.start != p2->lport.start)
41 return (0);
42 if (p1->lport.stop != p2->lport.stop)
43 return (0);
44 if (p1->rport.start != p2->rport.start)
45 return (0);
46 if (p1->rport.stop != p2->rport.stop)
47 return (0);
48 if (p1->is_ipv6 != p2->is_ipv6)
49 return (0);
50 if (p2->is_ipv6)
51 {
52 if (p1->laddr.start.ip6.as_u64[0] != p2->laddr.start.ip6.as_u64[0])
53 return (0);
54 if (p1->laddr.start.ip6.as_u64[1] != p2->laddr.start.ip6.as_u64[1])
55 return (0);
56 if (p1->laddr.stop.ip6.as_u64[0] != p2->laddr.stop.ip6.as_u64[0])
57 return (0);
58 if (p1->laddr.stop.ip6.as_u64[1] != p2->laddr.stop.ip6.as_u64[1])
59 return (0);
60 if (p1->raddr.start.ip6.as_u64[0] != p2->raddr.start.ip6.as_u64[0])
61 return (0);
62 if (p1->raddr.start.ip6.as_u64[1] != p2->raddr.start.ip6.as_u64[1])
63 return (0);
64 if (p1->raddr.stop.ip6.as_u64[0] != p2->raddr.stop.ip6.as_u64[0])
65 return (0);
66 if (p1->laddr.stop.ip6.as_u64[1] != p2->laddr.stop.ip6.as_u64[1])
67 return (0);
68 }
69 else
70 {
71 if (p1->laddr.start.ip4.as_u32 != p2->laddr.start.ip4.as_u32)
72 return (0);
73 if (p1->laddr.stop.ip4.as_u32 != p2->laddr.stop.ip4.as_u32)
74 return (0);
75 if (p1->raddr.start.ip4.as_u32 != p2->raddr.start.ip4.as_u32)
76 return (0);
77 if (p1->raddr.stop.ip4.as_u32 != p2->raddr.stop.ip4.as_u32)
78 return (0);
79 }
80 return (1);
81}
82
Neale Ranns999c8ee2019-02-01 03:31:24 -080083static int
84ipsec_spd_entry_sort (void *a1, void *a2)
85{
Neale Rannsa09c1ff2019-02-04 01:10:30 -080086 ipsec_main_t *im = &ipsec_main;
Neale Ranns999c8ee2019-02-01 03:31:24 -080087 u32 *id1 = a1;
88 u32 *id2 = a2;
Neale Ranns999c8ee2019-02-01 03:31:24 -080089 ipsec_policy_t *p1, *p2;
90
Neale Rannsa09c1ff2019-02-04 01:10:30 -080091 p1 = pool_elt_at_index (im->policies, *id1);
92 p2 = pool_elt_at_index (im->policies, *id2);
Neale Ranns999c8ee2019-02-01 03:31:24 -080093 if (p1 && p2)
94 return p2->priority - p1->priority;
95
96 return 0;
97}
98
99int
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800100ipsec_add_del_policy (vlib_main_t * vm,
101 ipsec_policy_t * policy, int is_add, u32 * stat_index)
Neale Ranns999c8ee2019-02-01 03:31:24 -0800102{
103 ipsec_main_t *im = &ipsec_main;
104 ipsec_spd_t *spd = 0;
105 ipsec_policy_t *vp;
Neale Ranns999c8ee2019-02-01 03:31:24 -0800106 u32 spd_index;
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800107 uword *p;
Neale Ranns999c8ee2019-02-01 03:31:24 -0800108
109 clib_warning ("policy-id %u priority %d is_outbound %u", policy->id,
110 policy->priority, policy->is_outbound);
111
112 if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
113 {
114 p = hash_get (im->sa_index_by_sa_id, policy->sa_id);
115 if (!p)
116 return VNET_API_ERROR_SYSCALL_ERROR_1;
117 policy->sa_index = p[0];
118 }
119
120 p = hash_get (im->spd_index_by_spd_id, policy->id);
121
122 if (!p)
123 return VNET_API_ERROR_SYSCALL_ERROR_1;
124
125 spd_index = p[0];
126 spd = pool_elt_at_index (im->spds, spd_index);
127 if (!spd)
128 return VNET_API_ERROR_SYSCALL_ERROR_1;
129
130 if (is_add)
131 {
132 u32 policy_index;
133
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800134 pool_get (im->policies, vp);
Neale Ranns999c8ee2019-02-01 03:31:24 -0800135 clib_memcpy (vp, policy, sizeof (*vp));
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800136 policy_index = vp - im->policies;
Neale Ranns999c8ee2019-02-01 03:31:24 -0800137
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800138 vlib_validate_combined_counter (&ipsec_spd_policy_counters,
139 policy_index);
140 vlib_zero_combined_counter (&ipsec_spd_policy_counters, policy_index);
Neale Ranns999c8ee2019-02-01 03:31:24 -0800141
142 if (policy->is_outbound)
143 {
144 if (policy->is_ipv6)
145 {
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800146 vec_add1 (spd->policies[IPSEC_SPD_POLICY_IP6_OUTBOUND],
147 policy_index);
148 vec_sort_with_function (spd->policies
149 [IPSEC_SPD_POLICY_IP6_OUTBOUND],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800150 ipsec_spd_entry_sort);
151 }
152 else
153 {
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800154 vec_add1 (spd->policies[IPSEC_SPD_POLICY_IP4_OUTBOUND],
155 policy_index);
156 vec_sort_with_function (spd->policies
157 [IPSEC_SPD_POLICY_IP4_OUTBOUND],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800158 ipsec_spd_entry_sort);
159 }
160 }
161 else
162 {
163 if (policy->is_ipv6)
164 {
165 if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
166 {
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800167 vec_add1 (spd->policies
168 [IPSEC_SPD_POLICY_IP6_INBOUND_PROTECT],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800169 policy_index);
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800170 vec_sort_with_function (spd->policies
171 [IPSEC_SPD_POLICY_IP6_INBOUND_PROTECT],
172 ipsec_spd_entry_sort);
Neale Ranns999c8ee2019-02-01 03:31:24 -0800173 }
174 else
175 {
176 vec_add1
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800177 (spd->policies[IPSEC_SPD_POLICY_IP6_INBOUND_BYPASS],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800178 policy_index);
179 vec_sort_with_function
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800180 (spd->policies[IPSEC_SPD_POLICY_IP6_INBOUND_BYPASS],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800181 ipsec_spd_entry_sort);
182 }
183 }
184 else
185 {
186 if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
187 {
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800188 vec_add1 (spd->policies
189 [IPSEC_SPD_POLICY_IP4_INBOUND_PROTECT],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800190 policy_index);
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800191 vec_sort_with_function (spd->policies
192 [IPSEC_SPD_POLICY_IP4_INBOUND_PROTECT],
193 ipsec_spd_entry_sort);
Neale Ranns999c8ee2019-02-01 03:31:24 -0800194 }
195 else
196 {
197 vec_add1
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800198 (spd->policies[IPSEC_SPD_POLICY_IP4_INBOUND_BYPASS],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800199 policy_index);
200 vec_sort_with_function
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800201 (spd->policies[IPSEC_SPD_POLICY_IP4_INBOUND_BYPASS],
Neale Ranns999c8ee2019-02-01 03:31:24 -0800202 ipsec_spd_entry_sort);
203 }
204 }
205 }
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800206 *stat_index = policy_index;
Neale Ranns999c8ee2019-02-01 03:31:24 -0800207 }
208 else
209 {
Neale Rannsa09c1ff2019-02-04 01:10:30 -0800210 ipsec_spd_policy_t ptype;
211 u32 ii;
212
213 FOR_EACH_IPSEC_SPD_POLICY_TYPE (ptype)
214 {
215 vec_foreach_index (ii, (spd->policies[ptype]))
216 {
217 vp = pool_elt_at_index (im->policies, spd->policies[ptype][ii]);
218 if (ipsec_policy_is_equal (vp, policy))
219 {
220 vec_del1 (spd->policies[ptype], ii);
221 pool_put (im->policies, vp);
222 goto done;
223 }
224 }
225 }
226 done:;
Neale Ranns999c8ee2019-02-01 03:31:24 -0800227 }
228
229 return 0;
230}
231
232/*
233 * fd.io coding-style-patch-verification: ON
234 *
235 * Local Variables:
236 * eval: (c-set-style "gnu")
237 * End:
238 */