#include "nest/bird.h" #include "lib/ip.h" #include "lib/net.h" #include "lib/flowspec.h" const char * const net_label[] = { [NET_IP4] = "ipv4", [NET_IP6] = "ipv6", [NET_VPN4] = "vpn4", [NET_VPN6] = "vpn6", [NET_ROA4] = "roa4", [NET_ROA6] = "roa6", [NET_FLOW4] = "flow4", [NET_FLOW6] = "flow6", [NET_IP6_SADR]= "ipv6-sadr", [NET_MPLS] = "mpls", [NET_ASPA] = "aspa", }; const u16 net_addr_length[] = { [NET_IP4] = sizeof(net_addr_ip4), [NET_IP6] = sizeof(net_addr_ip6), [NET_VPN4] = sizeof(net_addr_vpn4), [NET_VPN6] = sizeof(net_addr_vpn6), [NET_ROA4] = sizeof(net_addr_roa4), [NET_ROA6] = sizeof(net_addr_roa6), [NET_FLOW4] = 0, [NET_FLOW6] = 0, [NET_IP6_SADR]= sizeof(net_addr_ip6_sadr), [NET_MPLS] = sizeof(net_addr_mpls), [NET_ASPA] = sizeof(net_addr_aspa), }; const u8 net_max_prefix_length[] = { [NET_IP4] = IP4_MAX_PREFIX_LENGTH, [NET_IP6] = IP6_MAX_PREFIX_LENGTH, [NET_VPN4] = IP4_MAX_PREFIX_LENGTH, [NET_VPN6] = IP6_MAX_PREFIX_LENGTH, [NET_ROA4] = IP4_MAX_PREFIX_LENGTH, [NET_ROA6] = IP6_MAX_PREFIX_LENGTH, [NET_FLOW4] = IP4_MAX_PREFIX_LENGTH, [NET_FLOW6] = IP6_MAX_PREFIX_LENGTH, [NET_IP6_SADR]= IP6_MAX_PREFIX_LENGTH, [NET_MPLS] = 0, [NET_ASPA] = 0, }; const u16 net_max_text_length[] = { [NET_IP4] = 18, /* "255.255.255.255/32" */ [NET_IP6] = 43, /* "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" */ [NET_VPN4] = 40, /* "4294967296:4294967296 255.255.255.255/32" */ [NET_VPN6] = 65, /* "4294967296:4294967296 ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" */ [NET_ROA4] = 34, /* "255.255.255.255/32-32 AS4294967295" */ [NET_ROA6] = 60, /* "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128-128 AS4294967295" */ [NET_FLOW4] = 0, /* "flow4 { ... }" */ [NET_FLOW6] = 0, /* "flow6 { ... }" */ [NET_IP6_SADR]= 92, /* "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 from ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" */ [NET_MPLS] = 7, /* "1048575" */ [NET_ASPA] = 10, /* "4294967295" */ }; /* There should be no implicit padding in net_addr structures */ STATIC_ASSERT(sizeof(net_addr) == 24); STATIC_ASSERT(sizeof(net_addr_ip4) == 8); STATIC_ASSERT(sizeof(net_addr_ip6) == 20); STATIC_ASSERT(sizeof(net_addr_vpn4) == 16); STATIC_ASSERT(sizeof(net_addr_vpn6) == 32); STATIC_ASSERT(sizeof(net_addr_roa4) == 16); STATIC_ASSERT(sizeof(net_addr_roa6) == 28); STATIC_ASSERT(sizeof(net_addr_flow4) == 8); STATIC_ASSERT(sizeof(net_addr_flow6) == 20); STATIC_ASSERT(sizeof(net_addr_ip6_sadr) == 40); STATIC_ASSERT(sizeof(net_addr_mpls) == 8); STATIC_ASSERT(sizeof(net_addr_aspa) == 8); /* Ensure that all net_addr structures have the same alignment */ STATIC_ASSERT(alignof(net_addr_ip4) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_ip6) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_vpn4) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_vpn6) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_roa4) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_roa6) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_flow4) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_flow6) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_flow4) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_flow6) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_ip6_sadr) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_mpls) == alignof(net_addr)); STATIC_ASSERT(alignof(net_addr_aspa) == alignof(net_addr)); int rd_format(const vpn_rd rd_, char *buf, int buflen) { u64 rd = rd_to_u64(rd_); switch (rd >> 48) { case 0: return bsnprintf(buf, buflen, "%u:%u", (u32) (rd >> 32), (u32) rd); case 1: return bsnprintf(buf, buflen, "%I4:%u", ip4_from_u32(rd >> 16), (u32) (rd & 0xffff)); case 2: if (((u32) (rd >> 16)) >> 16) return bsnprintf(buf, buflen, "%u:%u", (u32) (rd >> 16), (u32) (rd & 0xffff)); else return bsnprintf(buf, buflen, "2:%u:%u", (u32) (rd >> 16), (u32) (rd & 0xffff)); default: return bsnprintf(buf, buflen, "X:%08x:%08x", (u32) (rd >> 32), (u32) rd); } } int net_format(const net_addr *N, char *buf, int buflen) { net_addr_union *n = (void *) N; buf[0] = 0; switch (n->n.type) { case NET_IP4: return (buflen < IP4_PX_BUFFER_SIZE) ? -1 : ip4_px_ntop(n->ip4.prefix, n->ip4.pxlen, buf) - buf; case NET_IP6: return bsnprintf(buf, buflen, "%I6/%d", n->ip6.prefix, n->ip6.pxlen); case NET_VPN4: { int c = rd_format(n->vpn4.rd, buf, buflen); ADVANCE(buf, buflen, c); return bsnprintf(buf, buflen, " %I4/%d", n->vpn4.prefix, n->vpn4.pxlen); } case NET_VPN6: { /* XXX: RD format is specified for VPN4; not found any for VPN6, reusing the same as for VPN4 */ int c = rd_format(n->vpn6.rd, buf, buflen); ADVANCE(buf, buflen, c); return bsnprintf(buf, buflen, " %I6/%d", n->vpn6.prefix, n->vpn6.pxlen); } case NET_ROA4: return bsnprintf(buf, buflen, "%I4/%u-%u AS%u", n->roa4.prefix, n->roa4.pxlen, n->roa4.max_pxlen, n->roa4.asn); case NET_ROA6: return bsnprintf(buf, buflen, "%I6/%u-%u AS%u", n->roa6.prefix, n->roa6.pxlen, n->roa6.max_pxlen, n->roa6.asn); case NET_FLOW4: return flow4_net_format(buf, buflen, &n->flow4); case NET_FLOW6: return flow6_net_format(buf, buflen, &n->flow6); case NET_IP6_SADR: return bsnprintf(buf, buflen, "%I6/%d from %I6/%d", n->ip6_sadr.dst_prefix, n->ip6_sadr.dst_pxlen, n->ip6_sadr.src_prefix, n->ip6_sadr.src_pxlen); case NET_MPLS: return bsnprintf(buf, buflen, "%u", n->mpls.label); case NET_ASPA: return bsnprintf(buf, buflen, "%u", n->aspa.asn); } bug("unknown network type"); } ip_addr net_pxmask(const net_addr *a) { switch (a->type) { case NET_IP4: case NET_VPN4: case NET_ROA4: case NET_FLOW4: return ipa_from_ip4(ip4_mkmask(net4_pxlen(a))); case NET_IP6: case NET_VPN6: case NET_ROA6: case NET_FLOW6: case NET_IP6_SADR: return ipa_from_ip6(ip6_mkmask(net6_pxlen(a))); case NET_MPLS: case NET_ASPA: default: return IPA_NONE; } } int net_compare(const net_addr *a, const net_addr *b) { if (a->type != b->type) return uint_cmp(a->type, b->type); switch (a->type) { case NET_IP4: return net_compare_ip4((const net_addr_ip4 *) a, (const net_addr_ip4 *) b); case NET_IP6: return net_compare_ip6((const net_addr_ip6 *) a, (const net_addr_ip6 *) b); case NET_VPN4: return net_compare_vpn4((const net_addr_vpn4 *) a, (const net_addr_vpn4 *) b); case NET_VPN6: return net_compare_vpn6((const net_addr_vpn6 *) a, (const net_addr_vpn6 *) b); case NET_ROA4: return net_compare_roa4((const net_addr_roa4 *) a, (const net_addr_roa4 *) b); case NET_ROA6: return net_compare_roa6((const net_addr_roa6 *) a, (const net_addr_roa6 *) b); case NET_FLOW4: return net_compare_flow4((const net_addr_flow4 *) a, (const net_addr_flow4 *) b); case NET_FLOW6: return net_compare_flow6((const net_addr_flow6 *) a, (const net_addr_flow6 *) b); case NET_IP6_SADR: return net_compare_ip6_sadr((const net_addr_ip6_sadr *) a, (const net_addr_ip6_sadr *) b); case NET_MPLS: return net_compare_mpls((const net_addr_mpls *) a, (const net_addr_mpls *) b); case NET_ASPA: return net_compare_aspa((const net_addr_aspa *) a, (const net_addr_aspa *) b); } return 0; } #define NET_HASH(a,t) net_hash_##t((const net_addr_##t *) a) u32 net_hash(const net_addr *n) { switch (n->type) { case NET_IP4: return NET_HASH(n, ip4); case NET_IP6: return NET_HASH(n, ip6); case NET_VPN4: return NET_HASH(n, vpn4); case NET_VPN6: return NET_HASH(n, vpn6); case NET_ROA4: return NET_HASH(n, roa4); case NET_ROA6: return NET_HASH(n, roa6); case NET_FLOW4: return NET_HASH(n, flow4); case NET_FLOW6: return NET_HASH(n, flow6); case NET_IP6_SADR: return NET_HASH(n, ip6_sadr); case NET_MPLS: return NET_HASH(n, mpls); case NET_ASPA: return NET_HASH(n, aspa); default: bug("invalid type"); } } #define NET_VALIDATE(a,t) net_validate_##t((const net_addr_##t *) a) int net_validate(const net_addr *n) { switch (n->type) { case NET_IP4: return NET_VALIDATE(n, ip4); case NET_IP6: return NET_VALIDATE(n, ip6); case NET_VPN4: return NET_VALIDATE(n, vpn4); case NET_VPN6: return NET_VALIDATE(n, vpn6); case NET_ROA4: return NET_VALIDATE(n, roa4); case NET_ROA6: return NET_VALIDATE(n, roa6); case NET_FLOW4: return NET_VALIDATE(n, flow4); case NET_FLOW6: return NET_VALIDATE(n, flow6); case NET_IP6_SADR: return NET_VALIDATE(n, ip6_sadr); case NET_MPLS: return NET_VALIDATE(n, mpls); case NET_ASPA: return NET_VALIDATE(n, aspa); default: return 0; } } void net_normalize(net_addr *N) { net_addr_union *n = (void *) N; switch (n->n.type) { case NET_IP4: case NET_VPN4: case NET_ROA4: case NET_FLOW4: return net_normalize_ip4(&n->ip4); case NET_IP6: case NET_VPN6: case NET_ROA6: case NET_FLOW6: return net_normalize_ip6(&n->ip6); case NET_IP6_SADR: return net_normalize_ip6_sadr(&n->ip6_sadr); case NET_MPLS: case NET_ASPA: return; } } int net_classify(const net_addr *N) { net_addr_union *n = (void *) N; switch (n->n.type) { case NET_IP4: case NET_VPN4: case NET_ROA4: case NET_FLOW4: return ip4_zero(n->ip4.prefix) ? (IADDR_HOST | SCOPE_UNIVERSE) : ip4_classify(n->ip4.prefix); case NET_IP6: case NET_VPN6: case NET_ROA6: case NET_FLOW6: return ip6_zero(n->ip6.prefix) ? (IADDR_HOST | SCOPE_UNIVERSE) : ip6_classify(&n->ip6.prefix); case NET_IP6_SADR: return ip6_zero(n->ip6_sadr.dst_prefix) ? (IADDR_HOST | SCOPE_UNIVERSE) : ip6_classify(&n->ip6_sadr.dst_prefix); case NET_MPLS: case NET_ASPA: return IADDR_HOST | SCOPE_UNIVERSE; } return IADDR_INVALID; } int ipa_in_netX(const ip_addr a, const net_addr *n) { switch (n->type) { case NET_IP4: case NET_VPN4: case NET_ROA4: case NET_FLOW4: if (!ipa_is_ip4(a)) return 0; return ip4_zero(ip4_and(ip4_xor(ipa_to_ip4(a), net4_prefix(n)), ip4_mkmask(net4_pxlen(n)))); case NET_IP6: case NET_VPN6: case NET_ROA6: case NET_FLOW6: if (ipa_is_ip4(a)) return 0; return ip6_zero(ip6_and(ip6_xor(ipa_to_ip6(a), net6_prefix(n)), ip6_mkmask(net6_pxlen(n)))); case NET_IP6_SADR: if (ipa_is_ip4(a)) return 0; return ip6_zero(ip6_and(ip6_xor(ipa_to_ip6(a), net6_prefix(n)), ip6_mkmask(net6_pxlen(n)))); case NET_MPLS: case NET_ASPA: default: return 0; } } int net_in_netX(const net_addr *a, const net_addr *n) { if (a->type != n->type) return 0; return (net_pxlen(n) <= net_pxlen(a)) && ipa_in_netX(net_prefix(a), n); }