FD.io VPP  v17.01.1-3-gc6833f8
Vector Packet Processing
ipsec.c
Go to the documentation of this file.
1 /*
2  * decap.c : IPSec tunnel support
3  *
4  * Copyright (c) 2015 Cisco and/or its affiliates.
5  * Licensed under the Apache License, Version 2.0 (the "License");
6  * you may not use this file except in compliance with the License.
7  * You may obtain a copy of the License at:
8  *
9  * http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 
18 #include <vnet/vnet.h>
19 #include <vnet/api_errno.h>
20 #include <vnet/ip/ip.h>
21 #include <vnet/interface.h>
22 
23 #include <vnet/ipsec/ipsec.h>
24 #include <vnet/ipsec/ikev2.h>
25 
26 #if DPDK_CRYPTO==1
28 #define ESP_NODE "dpdk-esp-encrypt"
29 #else
30 #include <vnet/ipsec/esp.h>
31 #define ESP_NODE "esp-encrypt"
32 #endif
33 
34 #if DPDK_CRYPTO==0
35 /* dummy function */
36 static int
37 add_del_sa_sess (u32 sa_index, u8 is_add)
38 {
39  return 0;
40 }
41 #endif
42 
43 u32
45 {
46  ipsec_main_t *im = &ipsec_main;
47  uword *p = hash_get (im->sa_index_by_sa_id, sa_id);
48  if (!p)
49  return ~0;
50 
51  return p[0];
52 }
53 
54 int
55 ipsec_set_interface_spd (vlib_main_t * vm, u32 sw_if_index, u32 spd_id,
56  int is_add)
57 {
58  ipsec_main_t *im = &ipsec_main;
59  ip4_ipsec_config_t config;
60 
61  u32 spd_index;
62  uword *p;
63 
64  p = hash_get (im->spd_index_by_spd_id, spd_id);
65  if (!p)
66  return VNET_API_ERROR_SYSCALL_ERROR_1; /* no such spd-id */
67 
68  spd_index = p[0];
69 
70  p = hash_get (im->spd_index_by_sw_if_index, sw_if_index);
71  if (p && is_add)
72  return VNET_API_ERROR_SYSCALL_ERROR_1; /* spd already assigned */
73 
74  if (is_add)
75  {
76  hash_set (im->spd_index_by_sw_if_index, sw_if_index, spd_index);
77  }
78  else
79  {
80  hash_unset (im->spd_index_by_sw_if_index, sw_if_index);
81  }
82 
83  clib_warning ("sw_if_index %u spd_id %u spd_index %u",
84  sw_if_index, spd_id, spd_index);
85 
86  /* enable IPsec on TX */
87  vnet_feature_enable_disable ("ip4-output", "ipsec-output-ip4", sw_if_index,
88  is_add, 0, 0);
89  vnet_feature_enable_disable ("ip6-output", "ipsec-output-ip6", sw_if_index,
90  is_add, 0, 0);
91 
92  /* enable IPsec on RX */
93  vnet_feature_enable_disable ("ip4-unicast", "ipsec-input-ip4", sw_if_index,
94  is_add, &config, sizeof (config));
95  vnet_feature_enable_disable ("ip6-unicast", "ipsec-input-ip6", sw_if_index,
96  is_add, &config, sizeof (config));
97 
98  return 0;
99 }
100 
101 int
102 ipsec_add_del_spd (vlib_main_t * vm, u32 spd_id, int is_add)
103 {
104  ipsec_main_t *im = &ipsec_main;
105  ipsec_spd_t *spd = 0;
106  uword *p;
107  u32 spd_index, k, v;
108 
109  p = hash_get (im->spd_index_by_spd_id, spd_id);
110  if (p && is_add)
111  return VNET_API_ERROR_INVALID_VALUE;
112  if (!p && !is_add)
113  return VNET_API_ERROR_INVALID_VALUE;
114 
115  if (!is_add) /* delete */
116  {
117  spd_index = p[0];
118  spd = pool_elt_at_index (im->spds, spd_index);
119  if (!spd)
120  return VNET_API_ERROR_INVALID_VALUE;
121  /* *INDENT-OFF* */
123  if (v == spd_index)
124  ipsec_set_interface_spd(vm, k, spd_id, 0);
125  }));
126  /* *INDENT-ON* */
127  hash_unset (im->spd_index_by_spd_id, spd_id);
128  pool_free (spd->policies);
133  pool_put (im->spds, spd);
134  }
135  else /* create new SPD */
136  {
137  pool_get (im->spds, spd);
138  memset (spd, 0, sizeof (*spd));
139  spd_index = spd - im->spds;
140  spd->id = spd_id;
141  hash_set (im->spd_index_by_spd_id, spd_id, spd_index);
142  }
143  return 0;
144 }
145 
146 static int
147 ipsec_spd_entry_sort (void *a1, void *a2)
148 {
149  ipsec_main_t *im = &ipsec_main;
150  u32 *id1 = a1;
151  u32 *id2 = a2;
152  ipsec_spd_t *spd;
153  ipsec_policy_t *p1, *p2;
154 
155  /* *INDENT-OFF* */
156  pool_foreach (spd, im->spds, ({
157  p1 = pool_elt_at_index(spd->policies, *id1);
158  p2 = pool_elt_at_index(spd->policies, *id2);
159  if (p1 && p2)
160  return p2->priority - p1->priority;
161  }));
162  /* *INDENT-ON* */
163 
164  return 0;
165 }
166 
167 int
168 ipsec_add_del_policy (vlib_main_t * vm, ipsec_policy_t * policy, int is_add)
169 {
170  ipsec_main_t *im = &ipsec_main;
171  ipsec_spd_t *spd = 0;
172  ipsec_policy_t *vp;
173  uword *p;
174  u32 spd_index;
175 
176  clib_warning ("policy-id %u priority %d is_outbound %u", policy->id,
177  policy->priority, policy->is_outbound);
178 
179  if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
180  {
181  p = hash_get (im->sa_index_by_sa_id, policy->sa_id);
182  if (!p)
183  return VNET_API_ERROR_SYSCALL_ERROR_1;
184  policy->sa_index = p[0];
185  }
186 
187  p = hash_get (im->spd_index_by_spd_id, policy->id);
188 
189  if (!p)
190  return VNET_API_ERROR_SYSCALL_ERROR_1;
191 
192  spd_index = p[0];
193  spd = pool_elt_at_index (im->spds, spd_index);
194  if (!spd)
195  return VNET_API_ERROR_SYSCALL_ERROR_1;
196 
197  if (is_add)
198  {
199  u32 policy_index;
200 
201  pool_get (spd->policies, vp);
202  clib_memcpy (vp, policy, sizeof (*vp));
203  policy_index = vp - spd->policies;
204 
205  if (policy->is_outbound)
206  {
207  if (policy->is_ipv6)
208  {
209  vec_add1 (spd->ipv6_outbound_policies, policy_index);
210  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
213  }
214  else
215  {
216  vec_add1 (spd->ipv4_outbound_policies, policy_index);
217  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
220  }
221  }
222  else
223  {
224  if (policy->is_ipv6)
225  {
226  if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
227  {
229  policy_index);
230  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
234  }
235  else
236  {
237  vec_add1
239  policy_index);
240  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
244  }
245  }
246  else
247  {
248  if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
249  {
251  policy_index);
252  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
256  }
257  else
258  {
259  vec_add1
261  policy_index);
262  clib_memcpy (vp, policy, sizeof (ipsec_policy_t));
266  }
267  }
268  }
269 
270  }
271  else
272  {
273  u32 i, j;
274  /* *INDENT-OFF* */
275  pool_foreach_index(i, spd->policies, ({
276  vp = pool_elt_at_index(spd->policies, i);
277  if (vp->priority != policy->priority)
278  continue;
279  if (vp->is_outbound != policy->is_outbound)
280  continue;
281  if (vp->policy != policy->policy)
282  continue;
283  if (vp->sa_id != policy->sa_id)
284  continue;
285  if (vp->protocol != policy->protocol)
286  continue;
287  if (vp->lport.start != policy->lport.start)
288  continue;
289  if (vp->lport.stop != policy->lport.stop)
290  continue;
291  if (vp->rport.start != policy->rport.start)
292  continue;
293  if (vp->rport.stop != policy->rport.stop)
294  continue;
295  if (vp->is_ipv6 != policy->is_ipv6)
296  continue;
297  if (policy->is_ipv6)
298  {
299  if (vp->laddr.start.ip6.as_u64[0] != policy->laddr.start.ip6.as_u64[0])
300  continue;
301  if (vp->laddr.start.ip6.as_u64[1] != policy->laddr.start.ip6.as_u64[1])
302  continue;
303  if (vp->laddr.stop.ip6.as_u64[0] != policy->laddr.stop.ip6.as_u64[0])
304  continue;
305  if (vp->laddr.stop.ip6.as_u64[1] != policy->laddr.stop.ip6.as_u64[1])
306  continue;
307  if (vp->raddr.start.ip6.as_u64[0] != policy->raddr.start.ip6.as_u64[0])
308  continue;
309  if (vp->raddr.start.ip6.as_u64[1] != policy->raddr.start.ip6.as_u64[1])
310  continue;
311  if (vp->raddr.stop.ip6.as_u64[0] != policy->raddr.stop.ip6.as_u64[0])
312  continue;
313  if (vp->laddr.stop.ip6.as_u64[1] != policy->laddr.stop.ip6.as_u64[1])
314  continue;
315  if (policy->is_outbound)
316  {
317  vec_foreach_index(j, spd->ipv6_outbound_policies) {
318  if (vec_elt(spd->ipv6_outbound_policies, j) == i) {
319  vec_del1 (spd->ipv6_outbound_policies, j);
320  break;
321  }
322  }
323  }
324  else
325  {
326  if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
327  {
328  vec_foreach_index(j, spd->ipv6_inbound_protect_policy_indices) {
329  if (vec_elt(spd->ipv6_inbound_protect_policy_indices, j) == i) {
330  vec_del1 (spd->ipv6_inbound_protect_policy_indices, j);
331  break;
332  }
333  }
334  }
335  else
336  {
337  vec_foreach_index(j, spd->ipv6_inbound_policy_discard_and_bypass_indices) {
338  if (vec_elt(spd->ipv6_inbound_policy_discard_and_bypass_indices, j) == i) {
339  vec_del1 (spd->ipv6_inbound_policy_discard_and_bypass_indices, j);
340  break;
341  }
342  }
343  }
344  }
345  }
346  else
347  {
348  if (vp->laddr.start.ip4.as_u32 != policy->laddr.start.ip4.as_u32)
349  continue;
350  if (vp->laddr.stop.ip4.as_u32 != policy->laddr.stop.ip4.as_u32)
351  continue;
352  if (vp->raddr.start.ip4.as_u32 != policy->raddr.start.ip4.as_u32)
353  continue;
354  if (vp->raddr.stop.ip4.as_u32 != policy->raddr.stop.ip4.as_u32)
355  continue;
356  if (policy->is_outbound)
357  {
358  vec_foreach_index(j, spd->ipv4_outbound_policies) {
359  if (vec_elt(spd->ipv4_outbound_policies, j) == i) {
360  vec_del1 (spd->ipv4_outbound_policies, j);
361  break;
362  }
363  }
364  }
365  else
366  {
367  if (policy->policy == IPSEC_POLICY_ACTION_PROTECT)
368  {
369  vec_foreach_index(j, spd->ipv4_inbound_protect_policy_indices) {
370  if (vec_elt(spd->ipv4_inbound_protect_policy_indices, j) == i) {
371  vec_del1 (spd->ipv4_inbound_protect_policy_indices, j);
372  break;
373  }
374  }
375  }
376  else
377  {
378  vec_foreach_index(j, spd->ipv4_inbound_policy_discard_and_bypass_indices) {
379  if (vec_elt(spd->ipv4_inbound_policy_discard_and_bypass_indices, j) == i) {
380  vec_del1 (spd->ipv4_inbound_policy_discard_and_bypass_indices, j);
381  break;
382  }
383  }
384  }
385  }
386  pool_put (spd->policies, vp);
387  break;
388  }
389  }));
390  /* *INDENT-ON* */
391  }
392 
393  return 0;
394 }
395 
396 static u8
398 {
399  ipsec_main_t *im = &ipsec_main;
400  ipsec_spd_t *spd;
401  ipsec_policy_t *p;
403 
404  /* *INDENT-OFF* */
405  pool_foreach(spd, im->spds, ({
406  pool_foreach(p, spd->policies, ({
407  if (p->policy == IPSEC_POLICY_ACTION_PROTECT)
408  {
409  if (p->sa_index == sa_index)
410  return 1;
411  }
412  }));
413  }));
414 
415  pool_foreach(t, im->tunnel_interfaces, ({
416  if (t->input_sa_index == sa_index)
417  return 1;
418  if (t->output_sa_index == sa_index)
419  return 1;
420  }));
421  /* *INDENT-ON* */
422 
423  return 0;
424 }
425 
426 int
427 ipsec_add_del_sa (vlib_main_t * vm, ipsec_sa_t * new_sa, int is_add)
428 {
429  ipsec_main_t *im = &ipsec_main;
430  ipsec_sa_t *sa = 0;
431  uword *p;
432  u32 sa_index;
433 
434  clib_warning ("id %u spi %u", new_sa->id, new_sa->spi);
435 
436  p = hash_get (im->sa_index_by_sa_id, new_sa->id);
437  if (p && is_add)
438  return VNET_API_ERROR_SYSCALL_ERROR_1; /* already exists */
439  if (!p && !is_add)
440  return VNET_API_ERROR_SYSCALL_ERROR_1;
441 
442  if (!is_add) /* delete */
443  {
444  sa_index = p[0];
445  sa = pool_elt_at_index (im->sad, sa_index);
446  if (ipsec_is_sa_used (sa_index))
447  {
448  clib_warning ("sa_id %u used in policy", sa->id);
449  return VNET_API_ERROR_SYSCALL_ERROR_1; /* sa used in policy */
450  }
451  hash_unset (im->sa_index_by_sa_id, sa->id);
452  add_del_sa_sess (sa_index, is_add);
453  pool_put (im->sad, sa);
454  }
455  else /* create new SA */
456  {
457  pool_get (im->sad, sa);
458  clib_memcpy (sa, new_sa, sizeof (*sa));
459  sa_index = sa - im->sad;
460  hash_set (im->sa_index_by_sa_id, sa->id, sa_index);
461  if (add_del_sa_sess (sa_index, is_add) < 0)
462  return VNET_API_ERROR_SYSCALL_ERROR_1;
463  }
464  return 0;
465 }
466 
467 int
469 {
470  ipsec_main_t *im = &ipsec_main;
471  uword *p;
472  u32 sa_index;
473  ipsec_sa_t *sa = 0;
474 
475  p = hash_get (im->sa_index_by_sa_id, sa_update->id);
476  if (!p)
477  return VNET_API_ERROR_SYSCALL_ERROR_1; /* no such sa-id */
478 
479  sa_index = p[0];
480  sa = pool_elt_at_index (im->sad, sa_index);
481 
482  /* new crypto key */
483  if (0 < sa_update->crypto_key_len)
484  {
485  clib_memcpy (sa->crypto_key, sa_update->crypto_key,
486  sa_update->crypto_key_len);
487  sa->crypto_key_len = sa_update->crypto_key_len;
488  }
489 
490  /* new integ key */
491  if (0 < sa_update->integ_key_len)
492  {
493  clib_memcpy (sa->integ_key, sa_update->integ_key,
494  sa_update->integ_key_len);
495  sa->integ_key_len = sa_update->integ_key_len;
496  }
497 
498  if (sa->crypto_key_len + sa->integ_key_len > 0)
499  {
500  if (add_del_sa_sess (sa_index, 0) < 0)
501  return VNET_API_ERROR_SYSCALL_ERROR_1;
502  }
503 
504  return 0;
505 }
506 
507 static void
509 {
510  struct
511  {
512  time_t time;
513  pid_t pid;
514  void *p;
515  } seed_data;
516 
517  seed_data.time = time (NULL);
518  seed_data.pid = getpid ();
519  seed_data.p = (void *) &seed_data;
520 
521  RAND_seed ((const void *) &seed_data, sizeof (seed_data));
522 }
523 
524 static clib_error_t *
526 {
527  clib_error_t *error;
528  ipsec_main_t *im = &ipsec_main;
530  vlib_node_t *node;
531 
532  ipsec_rand_seed ();
533 
534  memset (im, 0, sizeof (im[0]));
535 
536  im->vnet_main = vnet_get_main ();
537  im->vlib_main = vm;
538 
539  im->spd_index_by_spd_id = hash_create (0, sizeof (uword));
540  im->sa_index_by_sa_id = hash_create (0, sizeof (uword));
541  im->spd_index_by_sw_if_index = hash_create (0, sizeof (uword));
542 
545 
546  node = vlib_get_node_by_name (vm, (u8 *) "error-drop");
547  ASSERT (node);
548  im->error_drop_node_index = node->index;
549 
550  node = vlib_get_node_by_name (vm, (u8 *) ESP_NODE);
551 
552  ASSERT (node);
553  im->esp_encrypt_node_index = node->index;
554 
555  node = vlib_get_node_by_name (vm, (u8 *) "ip4-lookup");
556  ASSERT (node);
557  im->ip4_lookup_node_index = node->index;
558 
559  if ((error = vlib_call_init_function (vm, ipsec_cli_init)))
560  return error;
561 
562  if ((error = vlib_call_init_function (vm, ipsec_tunnel_if_init)))
563  return error;
564 
565  esp_init ();
566 
567  if ((error = ikev2_init (vm)))
568  return error;
569 
570  return 0;
571 }
572 
574 
575 /*
576  * fd.io coding-style-patch-verification: ON
577  *
578  * Local Variables:
579  * eval: (c-set-style "gnu")
580  * End:
581  */
static u8 ipsec_is_sa_used(u32 sa_index)
Definition: ipsec.c:397
u32 * ipv6_inbound_protect_policy_indices
Definition: ipsec.h:205
ipsec_spd_t * spds
Definition: ipsec.h:229
#define hash_set(h, key, value)
Definition: hash.h:254
u32 * ipv4_inbound_protect_policy_indices
Definition: ipsec.h:203
sll srl srl sll sra u16x4 i
Definition: vector_sse2.h:343
#define hash_unset(h, key)
Definition: hash.h:260
u32 id
Definition: ipsec.h:94
int ipsec_set_interface_spd(vlib_main_t *vm, u32 sw_if_index, u32 spd_id, int is_add)
Definition: ipsec.c:55
i32 priority
Definition: ipsec.h:175
#define NULL
Definition: clib.h:55
u32 index
Definition: node.h:237
#define vec_add1(V, E)
Add 1 element to end of vector (unspecified alignment).
Definition: vec.h:482
u32 * ipv4_outbound_policies
Definition: ipsec.h:201
int ipsec_set_sa_key(vlib_main_t *vm, ipsec_sa_t *sa_update)
Definition: ipsec.c:468
#define vec_validate_aligned(V, I, A)
Make sure vector is long enough for given index (no header, specified alignment)
Definition: vec.h:407
#define pool_get(P, E)
Allocate an object E from a pool P (unspecified alignment).
Definition: pool.h:200
u8 crypto_key[128]
Definition: ipsec.h:100
u32 spi
Definition: ipsec.h:95
uword * spd_index_by_sw_if_index
Definition: ipsec.h:249
clib_error_t * ipsec_tunnel_if_init(vlib_main_t *vm)
Definition: ipsec_if.c:354
vnet_main_t * vnet_get_main(void)
Definition: misc.c:46
u8 integ_key[128]
Definition: ipsec.h:104
#define pool_foreach(VAR, POOL, BODY)
Iterate through pool.
Definition: pool.h:348
static clib_error_t * ipsec_init(vlib_main_t *vm)
Definition: ipsec.c:525
#define VLIB_INIT_FUNCTION(x)
Definition: init.h:111
#define hash_foreach(key_var, value_var, h, body)
Definition: hash.h:418
u32 ipsec_get_sa_index_by_sa_id(u32 sa_id)
Definition: ipsec.c:44
#define clib_warning(format, args...)
Definition: error.h:59
static void esp_init()
Definition: esp.h:231
#define vlib_call_init_function(vm, x)
Definition: init.h:161
ipsec_policy_t * policies
Definition: ipsec.h:199
u32 ip4_lookup_node_index
Definition: ipsec.h:255
u32 error_drop_node_index
Definition: ipsec.h:254
#define hash_get(h, key)
Definition: hash.h:248
#define pool_elt_at_index(p, i)
Returns pointer to element at given index.
Definition: pool.h:369
static void ipsec_rand_seed(void)
Definition: ipsec.c:508
vnet_main_t * vnet_main
Definition: ipsec.h:242
#define v
Definition: acl.c:314
#define pool_put(P, E)
Free an object E in pool P.
Definition: pool.h:214
static int ipsec_spd_entry_sort(void *a1, void *a2)
Definition: ipsec.c:147
int ipsec_add_del_policy(vlib_main_t *vm, ipsec_policy_t *policy, int is_add)
Definition: ipsec.c:168
uword * spd_index_by_spd_id
Definition: ipsec.h:248
#define pool_free(p)
Free a pool.
Definition: pool.h:263
ipsec_main_t ipsec_main
Definition: ipsec.h:260
u32 esp_encrypt_node_index
Definition: ipsec.h:256
clib_error_t * ipsec_cli_init(vlib_main_t *vm)
Definition: ipsec_cli.c:793
#define vec_free(V)
Free vector&#39;s memory (no header).
Definition: vec.h:300
u32 sa_index
Definition: ipsec.h:189
static vlib_thread_main_t * vlib_get_thread_main()
Definition: global_funcs.h:32
#define clib_memcpy(a, b, c)
Definition: string.h:69
uword * sa_index_by_sa_id
Definition: ipsec.h:250
vlib_main_t * vlib_main
Definition: ipsec.h:241
#define hash_create(elts, value_bytes)
Definition: hash.h:658
#define ASSERT(truth)
unsigned int u32
Definition: types.h:88
ipsec_sa_t * sad
Definition: ipsec.h:230
u8 integ_key_len
Definition: ipsec.h:103
u64 uword
Definition: types.h:112
u8 crypto_key_len
Definition: ipsec.h:99
vlib_node_t * vlib_get_node_by_name(vlib_main_t *vm, u8 *name)
Definition: node.c:45
int ipsec_add_del_sa(vlib_main_t *vm, ipsec_sa_t *new_sa, int is_add)
Definition: ipsec.c:427
u32 * ipv4_inbound_policy_discard_and_bypass_indices
Definition: ipsec.h:204
unsigned char u8
Definition: types.h:56
u8 is_outbound
Definition: ipsec.h:176
#define ESP_NODE
Definition: ipsec.c:31
u32 * ipv6_inbound_policy_discard_and_bypass_indices
Definition: ipsec.h:206
#define vec_sort_with_function(vec, f)
Sort a vector using the supplied element comparison function.
Definition: vec.h:920
int ipsec_add_del_spd(vlib_main_t *vm, u32 spd_id, int is_add)
Definition: ipsec.c:102
static int add_del_sa_sess(u32 sa_index, u8 is_add)
Definition: ipsec.c:37
u32 * ipv6_outbound_policies
Definition: ipsec.h:202
u32 id
Definition: ipsec.h:197
clib_error_t * ikev2_init(vlib_main_t *vm)
Definition: ikev2.c:2148
#define pool_foreach_index(i, v, body)
Iterate pool by index.
Definition: pool.h:390
#define CLIB_CACHE_LINE_BYTES
Definition: cache.h:67
u32 ** empty_buffers
Definition: ipsec.h:236
int vnet_feature_enable_disable(const char *arc_name, const char *node_name, u32 sw_if_index, int enable_disable, void *feature_config, u32 n_feature_config_bytes)
Definition: feature.c:238