blob: bba84e22c96d148ea5cb41c98b39c3f230c65b8d [file] [log] [blame]
Nathan Harold1a371532017-01-30 12:30:48 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#ifndef _XFRM_CONTROLLER_H
17#define _XFRM_CONTROLLER_H
18
19#include <atomic>
20#include <list>
21#include <map>
22#include <string>
23#include <utility> // for pair
24
Benedict Wong319f17e2018-05-15 17:06:44 -070025#include <linux/if.h>
manojboopathi8707f232018-01-02 14:45:47 -080026#include <linux/if_link.h>
27#include <linux/if_tunnel.h>
Nathan Harold1a371532017-01-30 12:30:48 -080028#include <linux/netlink.h>
Nathan Harold420ceac2017-04-05 19:36:59 -070029#include <linux/udp.h>
Nathan Harold1a371532017-01-30 12:30:48 -080030#include <linux/xfrm.h>
Bernie Innocenti97f388f2018-10-16 19:17:08 +090031#include <unistd.h>
Nathan Harold1a371532017-01-30 12:30:48 -080032
33#include "NetdConstants.h"
Bernie Innocenti97f388f2018-10-16 19:17:08 +090034#include "android-base/unique_fd.h"
manojboopathi8707f232018-01-02 14:45:47 -080035#include "netdutils/Slice.h"
ludi6e8eccd2017-08-14 14:40:37 -070036#include "netdutils/Status.h"
Bernie Innocenti97f388f2018-10-16 19:17:08 +090037#include "sysutils/SocketClient.h"
Nathan Harold1a371532017-01-30 12:30:48 -080038
39namespace android {
40namespace net {
41
Nathan Harold39b5df42017-08-02 18:45:25 -070042// Exposed for testing
43extern const uint32_t ALGO_MASK_AUTH_ALL;
44// Exposed for testing
45extern const uint32_t ALGO_MASK_CRYPT_ALL;
46// Exposed for testing
Benedict Wongbe65b432017-08-22 21:43:14 -070047extern const uint32_t ALGO_MASK_AEAD_ALL;
48// Exposed for testing
Nathan Harold39b5df42017-08-02 18:45:25 -070049extern const uint8_t REPLAY_WINDOW_SIZE;
50
Nathan Harold1a371532017-01-30 12:30:48 -080051// Suggest we avoid the smallest and largest ints
52class XfrmMessage;
53class TransportModeSecurityAssociation;
Benedict Wongaf855432018-05-10 17:07:37 -070054class DumpWriter;
Nathan Harold1a371532017-01-30 12:30:48 -080055
56class XfrmSocket {
57public:
58 virtual void close() {
Nathan Harold420ceac2017-04-05 19:36:59 -070059 if (mSock >= 0) {
Nathan Harold1a371532017-01-30 12:30:48 -080060 ::close(mSock);
61 }
62 mSock = -1;
63 }
64
ludi6e8eccd2017-08-14 14:40:37 -070065 virtual netdutils::Status open() = 0;
Nathan Harold1a371532017-01-30 12:30:48 -080066
67 virtual ~XfrmSocket() { close(); }
68
ludie51e3862017-08-15 19:28:12 -070069 // Sends the netlink message contained in iovecs. This populates iovecs[0] with
70 // a valid netlink message header.
ludi6e8eccd2017-08-14 14:40:37 -070071 virtual netdutils::Status sendMessage(uint16_t nlMsgType, uint16_t nlMsgFlags,
72 uint16_t nlMsgSeqNum,
73 std::vector<iovec>* iovecs) const = 0;
Nathan Harold1a371532017-01-30 12:30:48 -080074
75protected:
76 int mSock;
77};
78
79enum struct XfrmDirection : uint8_t {
80 IN = XFRM_POLICY_IN,
81 OUT = XFRM_POLICY_OUT,
82 FORWARD = XFRM_POLICY_FWD,
83 MASK = XFRM_POLICY_MASK,
84};
85
86enum struct XfrmMode : uint8_t {
87 TRANSPORT = XFRM_MODE_TRANSPORT,
88 TUNNEL = XFRM_MODE_TUNNEL,
89};
90
Nathan Harold420ceac2017-04-05 19:36:59 -070091enum struct XfrmEncapType : uint16_t {
92 NONE = 0,
93 ESPINUDP_NON_IKE = UDP_ENCAP_ESPINUDP_NON_IKE,
94 ESPINUDP = UDP_ENCAP_ESPINUDP
95};
96
Nathan Harold1a371532017-01-30 12:30:48 -080097struct XfrmAlgo {
98 std::string name;
99 std::vector<uint8_t> key;
100 uint16_t truncLenBits;
101};
102
Nathan Harold420ceac2017-04-05 19:36:59 -0700103struct XfrmEncap {
104 XfrmEncapType type;
105 uint16_t srcPort;
106 uint16_t dstPort;
107};
108
Nathan Harold7441c692017-12-12 21:25:01 -0800109// minimally sufficient structure to match either an SA or a Policy
Benedict Wonga04ffa72018-05-09 21:42:42 -0700110struct XfrmCommonInfo {
Nathan Harold1a371532017-01-30 12:30:48 -0800111 xfrm_address_t dstAddr; // network order
112 xfrm_address_t srcAddr;
113 int addrFamily; // AF_INET or AF_INET6
114 int transformId; // requestId
115 int spi;
Di Lu2ccb3e52018-01-03 16:19:20 -0800116 xfrm_mark mark;
Benedict Wonga450e722018-05-07 10:29:02 -0700117 int xfrm_if_id;
Nathan Harold1a371532017-01-30 12:30:48 -0800118};
119
Benedict Wonga04ffa72018-05-09 21:42:42 -0700120struct XfrmSaInfo : XfrmCommonInfo {
Nathan Harold1a371532017-01-30 12:30:48 -0800121 XfrmAlgo auth;
122 XfrmAlgo crypt;
Benedict Wongbe65b432017-08-22 21:43:14 -0700123 XfrmAlgo aead;
Nathan Harold1a371532017-01-30 12:30:48 -0800124 int netId;
125 XfrmMode mode;
Nathan Harold420ceac2017-04-05 19:36:59 -0700126 XfrmEncap encap;
Nathan Harold1a371532017-01-30 12:30:48 -0800127};
128
Benedict Wonga04ffa72018-05-09 21:42:42 -0700129struct XfrmSpInfo : XfrmSaInfo {
130 // Address family in XfrmCommonInfo used for template/SA matching, need separate addrFamily
131 // for selectors
132 int selAddrFamily; // AF_INET or AF_INET6
133};
134
Nathan Harold1a371532017-01-30 12:30:48 -0800135class XfrmController {
136public:
137 XfrmController();
138
Benedict Wongaf855432018-05-10 17:07:37 -0700139 // Initializer to override XFRM-I support for unit-testing purposes
140 explicit XfrmController(bool xfrmIntfSupport);
141
Nathan Harold21299f72018-03-16 20:13:03 -0700142 static netdutils::Status Init();
Benedict Wongb2daefb2017-12-06 22:05:46 -0800143
Nathan Harold21299f72018-03-16 20:13:03 -0700144 static netdutils::Status ipSecSetEncapSocketOwner(const android::base::unique_fd& socket,
145 int newUid, uid_t callerUid);
Nathan Harold1a371532017-01-30 12:30:48 -0800146
Nathan Harold21299f72018-03-16 20:13:03 -0700147 static netdutils::Status ipSecAllocateSpi(int32_t transformId, const std::string& localAddress,
148 const std::string& remoteAddress, int32_t inSpi,
149 int32_t* outSpi);
150
151 static netdutils::Status ipSecAddSecurityAssociation(
Benedict Wonga450e722018-05-07 10:29:02 -0700152 int32_t transformId, int32_t mode, const std::string& sourceAddress,
153 const std::string& destinationAddress, int32_t underlyingNetId, int32_t spi,
154 int32_t markValue, int32_t markMask, const std::string& authAlgo,
155 const std::vector<uint8_t>& authKey, int32_t authTruncBits,
156 const std::string& cryptAlgo, const std::vector<uint8_t>& cryptKey,
157 int32_t cryptTruncBits, const std::string& aeadAlgo,
158 const std::vector<uint8_t>& aeadKey, int32_t aeadIcvBits, int32_t encapType,
159 int32_t encapLocalPort, int32_t encapRemotePort, int32_t xfrmInterfaceId);
Nathan Harold1a371532017-01-30 12:30:48 -0800160
Nathan Harold21299f72018-03-16 20:13:03 -0700161 static netdutils::Status ipSecDeleteSecurityAssociation(int32_t transformId,
162 const std::string& sourceAddress,
163 const std::string& destinationAddress,
164 int32_t spi, int32_t markValue,
Benedict Wonga450e722018-05-07 10:29:02 -0700165 int32_t markMask,
166 int32_t xfrmInterfaceId);
Nathan Harold1a371532017-01-30 12:30:48 -0800167
Nathan Harold21299f72018-03-16 20:13:03 -0700168 static netdutils::Status
169 ipSecApplyTransportModeTransform(const android::base::unique_fd& socket, int32_t transformId,
170 int32_t direction, const std::string& localAddress,
171 const std::string& remoteAddress, int32_t spi);
Nathan Harold1a371532017-01-30 12:30:48 -0800172
Nathan Harold21299f72018-03-16 20:13:03 -0700173 static netdutils::Status
174 ipSecRemoveTransportModeTransform(const android::base::unique_fd& socket);
Nathan Harold1a371532017-01-30 12:30:48 -0800175
Benedict Wonga04ffa72018-05-09 21:42:42 -0700176 static netdutils::Status ipSecAddSecurityPolicy(int32_t transformId, int32_t selAddrFamily,
177 int32_t direction,
Benedict Wongad600cb2018-05-14 17:22:35 -0700178 const std::string& tmplSrcAddress,
179 const std::string& tmplDstAddress, int32_t spi,
Benedict Wonga450e722018-05-07 10:29:02 -0700180 int32_t markValue, int32_t markMask,
181 int32_t xfrmInterfaceId);
ludi771b8002017-11-20 15:09:05 -0800182
Benedict Wonga04ffa72018-05-09 21:42:42 -0700183 static netdutils::Status ipSecUpdateSecurityPolicy(int32_t transformId, int32_t selAddrFamily,
184 int32_t direction,
Benedict Wongad600cb2018-05-14 17:22:35 -0700185 const std::string& tmplSrcAddress,
186 const std::string& tmplDstAddress,
Nathan Harold21299f72018-03-16 20:13:03 -0700187 int32_t spi, int32_t markValue,
Benedict Wonga450e722018-05-07 10:29:02 -0700188 int32_t markMask, int32_t xfrmInterfaceId);
ludi771b8002017-11-20 15:09:05 -0800189
Benedict Wonga04ffa72018-05-09 21:42:42 -0700190 static netdutils::Status ipSecDeleteSecurityPolicy(int32_t transformId, int32_t selAddrFamily,
191 int32_t direction, int32_t markValue,
Benedict Wonga450e722018-05-07 10:29:02 -0700192 int32_t markMask, int32_t xfrmInterfaceId);
ludi771b8002017-11-20 15:09:05 -0800193
Benedict Wong319f17e2018-05-15 17:06:44 -0700194 static netdutils::Status ipSecAddTunnelInterface(const std::string& deviceName,
195 const std::string& localAddress,
196 const std::string& remoteAddress, int32_t ikey,
Benedict Wonga450e722018-05-07 10:29:02 -0700197 int32_t okey, int32_t interfaceId,
198 bool isUpdate);
manojboopathi8707f232018-01-02 14:45:47 -0800199
Benedict Wong319f17e2018-05-15 17:06:44 -0700200 static netdutils::Status ipSecRemoveTunnelInterface(const std::string& deviceName);
manojboopathi8707f232018-01-02 14:45:47 -0800201
Benedict Wongaf855432018-05-10 17:07:37 -0700202 void dump(DumpWriter& dw);
203
Jonathan Basseric6461a62017-08-31 14:47:33 -0700204 // Some XFRM netlink attributes comprise a header, a struct, and some data
205 // after the struct. We wrap all of those in one struct for easier
206 // marshalling. The structs below must be ABI compatible with the kernel and
207 // are composed from kernel structures; thus, they use the kernel naming
208 // convention.
209
Nathan Harold39b5df42017-08-02 18:45:25 -0700210 // Exposed for testing
Benedict Wong4f60ee12017-10-10 12:27:25 -0700211 static constexpr size_t MAX_KEY_LENGTH = 128;
Nathan Harold39b5df42017-08-02 18:45:25 -0700212
Jonathan Basseric6461a62017-08-31 14:47:33 -0700213 // Container for the content of an XFRMA_ALG_CRYPT netlink attribute.
Nathan Harold39b5df42017-08-02 18:45:25 -0700214 // Exposed for testing
215 struct nlattr_algo_crypt {
216 nlattr hdr;
217 xfrm_algo crypt;
Benedict Wong4f60ee12017-10-10 12:27:25 -0700218 uint8_t key[MAX_KEY_LENGTH];
Nathan Harold39b5df42017-08-02 18:45:25 -0700219 };
220
Jonathan Basseric6461a62017-08-31 14:47:33 -0700221 // Container for the content of an XFRMA_ALG_AUTH_TRUNC netlink attribute.
Nathan Harold39b5df42017-08-02 18:45:25 -0700222 // Exposed for testing
223 struct nlattr_algo_auth {
224 nlattr hdr;
225 xfrm_algo_auth auth;
Benedict Wong4f60ee12017-10-10 12:27:25 -0700226 uint8_t key[MAX_KEY_LENGTH];
Nathan Harold39b5df42017-08-02 18:45:25 -0700227 };
228
Jonathan Basseric6461a62017-08-31 14:47:33 -0700229 // Container for the content of an XFRMA_TMPL netlink attribute.
Nathan Harold39b5df42017-08-02 18:45:25 -0700230 // Exposed for testing
Benedict Wongbe65b432017-08-22 21:43:14 -0700231 struct nlattr_algo_aead {
232 nlattr hdr;
233 xfrm_algo_aead aead;
Benedict Wong4f60ee12017-10-10 12:27:25 -0700234 uint8_t key[MAX_KEY_LENGTH];
Benedict Wongbe65b432017-08-22 21:43:14 -0700235 };
236
237 // Exposed for testing
Nathan Harold39b5df42017-08-02 18:45:25 -0700238 struct nlattr_user_tmpl {
239 nlattr hdr;
240 xfrm_user_tmpl tmpl;
241 };
242
Jonathan Basseric6461a62017-08-31 14:47:33 -0700243 // Container for the content of an XFRMA_ENCAP netlink attribute.
Nathan Harold39b5df42017-08-02 18:45:25 -0700244 // Exposed for testing
245 struct nlattr_encap_tmpl {
246 nlattr hdr;
247 xfrm_encap_tmpl tmpl;
248 };
249
Di Lu2ccb3e52018-01-03 16:19:20 -0800250 // Container for the content of an XFRMA_MARK netlink attribute.
251 // Exposed for testing
252 struct nlattr_xfrm_mark {
253 nlattr hdr;
254 xfrm_mark mark;
255 };
256
Benedict Wong96abf482018-01-22 13:56:41 -0800257 // Container for the content of an XFRMA_OUTPUT_MARK netlink attribute.
258 // Exposed for testing
259 struct nlattr_xfrm_output_mark {
260 nlattr hdr;
261 __u32 outputMark;
262 };
263
Benedict Wong319f17e2018-05-15 17:06:44 -0700264 // Container for the content of an XFRMA_IF_ID netlink attribute.
265 // Exposed for testing
266 struct nlattr_xfrm_interface_id {
267 nlattr hdr;
268 __u32 if_id;
269 };
270
271 // Exposed for testing
272 struct nlattr_payload_u32 {
273 nlattr hdr;
274 uint32_t value;
275 };
276
277 private:
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700278/*
Bernie Innocentiedf68352018-07-05 17:50:38 +0900279 * This is a workaround for a kernel bug in the 32bit netlink compat layer
280 * that has been present on x86_64 kernels since 2010 with no fix on the
281 * horizon.
282 *
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700283 * Below is a redefinition of the xfrm_usersa_info struct that is part
284 * of the Linux uapi <linux/xfrm.h> to align the structures to a 64-bit
285 * boundary.
Bernie Innocentiedf68352018-07-05 17:50:38 +0900286 *
287 * Note that we turn this on for all x86 32bit targets, under the assumption
288 * that nowadays all x86 targets are running 64bit kernels.
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700289 */
Bernie Innocentiedf68352018-07-05 17:50:38 +0900290#if defined(__i386__)
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700291 // Shadow the kernel definition of xfrm_usersa_info with a 64-bit aligned version
292 struct xfrm_usersa_info : ::xfrm_usersa_info {
293 } __attribute__((aligned(8)));
294 // Shadow the kernel's version, using the aligned version of xfrm_usersa_info
295 struct xfrm_userspi_info {
296 struct xfrm_usersa_info info;
297 __u32 min;
298 __u32 max;
299 };
Bjoern Johansson83977442018-05-25 16:55:28 -0700300 struct xfrm_userpolicy_info : ::xfrm_userpolicy_info {
301 } __attribute__((aligned(8)));
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700302
303 /*
304 * Anyone who encounters a failure when sending netlink messages should look here
305 * first. Hitting the static_assert() below should be a strong hint that Android
306 * IPsec will probably not work with your current settings.
307 *
308 * Again, experimentally determined, the "flags" field should be the first byte in
309 * the final word of the xfrm_usersa_info struct. The check validates the size of
310 * the padding to be 7.
311 *
312 * This padding is verified to be correct on gcc/x86_64 kernel, and clang/x86 userspace.
313 */
314 static_assert(sizeof(::xfrm_usersa_info) % 8 != 0, "struct xfrm_usersa_info has changed "
315 "alignment. Please consider whether this "
316 "patch is needed.");
317 static_assert(sizeof(xfrm_usersa_info) - offsetof(xfrm_usersa_info, flags) == 8,
318 "struct xfrm_usersa_info probably misaligned with kernel struct.");
319 static_assert(sizeof(xfrm_usersa_info) % 8 == 0, "struct xfrm_usersa_info_t is not 64-bit "
320 "aligned. Please consider whether this patch "
321 "is needed.");
322 static_assert(sizeof(::xfrm_userspi_info) - sizeof(::xfrm_usersa_info) ==
323 sizeof(xfrm_userspi_info) - sizeof(xfrm_usersa_info),
324 "struct xfrm_userspi_info has changed and does not match the kernel struct.");
Bjoern Johansson83977442018-05-25 16:55:28 -0700325 static_assert(sizeof(::xfrm_userpolicy_info) % 8 != 0,
326 "struct xfrm_userpolicy_info has changed "
327 "alignment. Please consider whether this "
328 "patch is needed.");
329 static_assert(sizeof(xfrm_userpolicy_info) - offsetof(xfrm_userpolicy_info, share) == 5,
330 "struct xfrm_userpolicy_info probably misaligned with kernel struct.");
331 static_assert(sizeof(xfrm_userpolicy_info) % 8 == 0,
332 "struct xfrm_userpolicy_info is not 64-bit "
333 "aligned. Please consider whether this patch "
334 "is needed.");
Nathan Harolde2dd4c72017-04-19 11:09:11 -0700335#endif
336
Benedict Wongaf855432018-05-10 17:07:37 -0700337 static bool isXfrmIntfSupported();
338
Benedict Wonga04ffa72018-05-09 21:42:42 -0700339 // helper functions for filling in the XfrmCommonInfo (and XfrmSaInfo) structure
340 static netdutils::Status fillXfrmCommonInfo(const std::string& sourceAddress,
341 const std::string& destinationAddress, int32_t spi,
342 int32_t markValue, int32_t markMask,
Benedict Wonga450e722018-05-07 10:29:02 -0700343 int32_t transformId, int32_t xfrmInterfaceId,
344 XfrmCommonInfo* info);
Benedict Wonga04ffa72018-05-09 21:42:42 -0700345 static netdutils::Status fillXfrmCommonInfo(int32_t spi, int32_t markValue, int32_t markMask,
Benedict Wonga450e722018-05-07 10:29:02 -0700346 int32_t transformId, int32_t xfrmInterfaceId,
347 XfrmCommonInfo* info);
Nathan Harold1a371532017-01-30 12:30:48 -0800348
349 // Top level functions for managing a Transport Mode Transform
ludi6e8eccd2017-08-14 14:40:37 -0700350 static netdutils::Status addTransportModeTransform(const XfrmSaInfo& record);
Nathan Harold1a371532017-01-30 12:30:48 -0800351 static int removeTransportModeTransform(const XfrmSaInfo& record);
352
353 // TODO(messagerefactor): FACTOR OUT ALL MESSAGE BUILDING CODE BELOW HERE
354 // Shared between SA and SP
Benedict Wonga04ffa72018-05-09 21:42:42 -0700355 static void fillXfrmSelector(const int record, xfrm_selector* selector);
Nathan Harold1a371532017-01-30 12:30:48 -0800356
357 // Shared between Transport and Tunnel Mode
358 static int fillNlAttrXfrmAlgoEnc(const XfrmAlgo& in_algo, nlattr_algo_crypt* algo);
359 static int fillNlAttrXfrmAlgoAuth(const XfrmAlgo& in_algo, nlattr_algo_auth* algo);
Benedict Wongbe65b432017-08-22 21:43:14 -0700360 static int fillNlAttrXfrmAlgoAead(const XfrmAlgo& in_algo, nlattr_algo_aead* algo);
Nathan Harold420ceac2017-04-05 19:36:59 -0700361 static int fillNlAttrXfrmEncapTmpl(const XfrmSaInfo& record, nlattr_encap_tmpl* tmpl);
Nathan Harold1a371532017-01-30 12:30:48 -0800362
Di Lu0e16b5e2018-01-12 10:37:53 -0800363 // Functions for updating a Transport Mode SA
364 static netdutils::Status updateSecurityAssociation(const XfrmSaInfo& record,
manojboopathi4d2d6f12017-12-06 11:11:31 -0800365 const XfrmSocket& sock);
Nathan Harold1a371532017-01-30 12:30:48 -0800366 static int fillUserSaInfo(const XfrmSaInfo& record, xfrm_usersa_info* usersa);
367
368 // Functions for deleting a Transport Mode SA
Benedict Wonga04ffa72018-05-09 21:42:42 -0700369 static netdutils::Status deleteSecurityAssociation(const XfrmCommonInfo& record,
ludi6e8eccd2017-08-14 14:40:37 -0700370 const XfrmSocket& sock);
Benedict Wonga04ffa72018-05-09 21:42:42 -0700371 static int fillUserSaId(const XfrmCommonInfo& record, xfrm_usersa_id* said);
372 static int fillUserTemplate(const XfrmSpInfo& record, xfrm_user_tmpl* tmpl);
ludi771b8002017-11-20 15:09:05 -0800373
Benedict Wonga04ffa72018-05-09 21:42:42 -0700374 static int fillUserSpInfo(const XfrmSpInfo& record, XfrmDirection direction,
375 xfrm_userpolicy_info* usersp);
376 static int fillNlAttrUserTemplate(const XfrmSpInfo& record, nlattr_user_tmpl* tmpl);
377 static int fillUserPolicyId(const XfrmSpInfo& record, XfrmDirection direction,
ludi771b8002017-11-20 15:09:05 -0800378 xfrm_userpolicy_id* policy_id);
Benedict Wonga04ffa72018-05-09 21:42:42 -0700379 static int fillNlAttrXfrmMark(const XfrmCommonInfo& record, nlattr_xfrm_mark* mark);
Benedict Wongd8b6a382018-09-18 17:16:10 -0700380 static int fillNlAttrXfrmOutputMark(const __u32 underlyingNetId,
Benedict Wong96abf482018-01-22 13:56:41 -0800381 nlattr_xfrm_output_mark* output_mark);
Benedict Wong319f17e2018-05-15 17:06:44 -0700382 static int fillNlAttrXfrmIntfId(const __u32 intf_id_value, nlattr_xfrm_interface_id* intf_id);
Nathan Harold1a371532017-01-30 12:30:48 -0800383
ludi6e8eccd2017-08-14 14:40:37 -0700384 static netdutils::Status allocateSpi(const XfrmSaInfo& record, uint32_t minSpi, uint32_t maxSpi,
385 uint32_t* outSpi, const XfrmSocket& sock);
Nathan Harold1a371532017-01-30 12:30:48 -0800386
Benedict Wonga04ffa72018-05-09 21:42:42 -0700387 static netdutils::Status processSecurityPolicy(int32_t transformId, int32_t selAddrFamily,
388 int32_t direction,
Benedict Wongad600cb2018-05-14 17:22:35 -0700389 const std::string& tmplSrcAddress,
390 const std::string& tmplDstAddress, int32_t spi,
Nathan Harold21299f72018-03-16 20:13:03 -0700391 int32_t markValue, int32_t markMask,
Benedict Wonga450e722018-05-07 10:29:02 -0700392 int32_t xfrmInterfaceId, int32_t msgType);
Benedict Wonga04ffa72018-05-09 21:42:42 -0700393 static netdutils::Status updateTunnelModeSecurityPolicy(const XfrmSpInfo& record,
ludi771b8002017-11-20 15:09:05 -0800394 const XfrmSocket& sock,
395 XfrmDirection direction,
396 uint16_t msgType);
Benedict Wonga04ffa72018-05-09 21:42:42 -0700397 static netdutils::Status deleteTunnelModeSecurityPolicy(const XfrmSpInfo& record,
ludi771b8002017-11-20 15:09:05 -0800398 const XfrmSocket& sock,
399 XfrmDirection direction);
Nathan Harold21299f72018-03-16 20:13:03 -0700400 static netdutils::Status flushInterfaces();
401 static netdutils::Status flushSaDb(const XfrmSocket& s);
402 static netdutils::Status flushPolicyDb(const XfrmSocket& s);
403
Benedict Wong319f17e2018-05-15 17:06:44 -0700404 static netdutils::Status ipSecAddXfrmInterface(const std::string& deviceName,
Benedict Wongaf855432018-05-10 17:07:37 -0700405 int32_t interfaceId, uint16_t flags);
Benedict Wong319f17e2018-05-15 17:06:44 -0700406 static netdutils::Status ipSecAddVirtualTunnelInterface(const std::string& deviceName,
407 const std::string& localAddress,
408 const std::string& remoteAddress,
409 int32_t ikey, int32_t okey,
410 uint16_t flags);
Nathan Harold1a371532017-01-30 12:30:48 -0800411 // END TODO(messagerefactor)
412};
413
414} // namespace net
415} // namespace android
416
417#endif /* !defined(XFRM_CONTROLLER_H) */