EtherGuard-VPN/tap/tap.go
2021-12-05 22:02:49 +00:00

139 lines
3.7 KiB
Go

/* SPDX-License-Identifier: MIT
*
* Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved.
*/
package tap
import (
"encoding/binary"
"errors"
"fmt"
"math/big"
"net"
"strconv"
"strings"
)
type Event int
type MacAddress [6]byte
func (mac *MacAddress) String() string {
return net.HardwareAddr((*mac)[:]).String()
}
func GetDstMacAddr(packet []byte) (dstMacAddr MacAddress) {
copy(dstMacAddr[:], packet[0:6])
return
}
func GetSrcMacAddr(packet []byte) (srcMacAddr MacAddress) {
copy(srcMacAddr[:], packet[6:12])
return
}
func GetIP(version int, netcidr string, uid uint32) (net.IP, net.IPMask, error) {
_, the_net, err := net.ParseCIDR(netcidr)
if err != nil {
return nil, nil, fmt.Errorf("Not a valid IPv%v CIDR: %v", version, netcidr)
}
the_ip := the_net.IP
if version == 4 {
if strings.Contains(netcidr, ":") {
return nil, nil, errors.New("Not a valid IPv4 CIDR: " + netcidr)
}
if the_ip.To4() == nil {
return nil, nil, errors.New("Not a valid IPv4 CIDR: " + netcidr)
}
}
if version == 6 {
if strings.Contains(netcidr, ".") {
return nil, nil, errors.New("Not a valid IPv4 CIDR: " + netcidr)
}
if the_ip.To4() != nil {
return nil, nil, errors.New("Not a valid IPv6 CIDR: " + netcidr)
}
}
ones, bits := the_net.Mask.Size()
maxuid := big.NewInt(1)
maxuid.Lsh(maxuid, uint((bits - ones)))
ip_use := big.NewInt(int64(uid))
if maxuid.Cmp(big.NewInt(2)) > 0 {
maxuid.Sub(maxuid, big.NewInt(2))
if uid == 0 {
ip_use.Set(maxuid)
}
}
if ip_use.Cmp(maxuid) > 0 {
return nil, nil, fmt.Errorf("The CIDR %v can only contain %v IPs. But your NodeID %v exceed it.", netcidr, maxuid, uid)
}
IP_Int := big.NewInt(0)
IP_Int.SetBytes(the_ip)
IP_Int.Add(IP_Int, ip_use)
ip_arr := IP_Int.Bytes()
if len(ip_arr) < 16 {
ip_arr = append(make([]byte, 16-len(ip_arr)), ip_arr...)
}
if len(ip_arr) > 16 {
ip_arr = ip_arr[len(ip_arr)-16:]
}
result_ip := net.IP(ip_arr)
return result_ip, the_net.Mask, nil
}
func GetMacAddr(prefix string, uid uint32) (mac MacAddress, err error) {
macprefix, _, err := prefixStr2prefix(prefix)
if err != nil {
return
}
idbuf := make([]byte, 4)
binary.BigEndian.PutUint32(idbuf, uid)
copy(mac[2:], idbuf)
copy(mac[:], macprefix)
if IsNotUnicast(mac) {
err = errors.New("ERROR: MAC address can only set to unicast address")
return
}
return
}
func prefixStr2prefix(prefix string) ([]uint8, uint32, error) {
hexStrs := strings.Split(strings.ToLower(prefix), ":")
retprefix := make([]uint8, len(hexStrs))
maxID := uint32(1)<<((6-len(hexStrs))*8) - 1
if len(hexStrs) < 2 || len(hexStrs) > 6 {
return []uint8{}, 0, errors.New("Macaddr prefix length must between 2 and 6, " + prefix + " is " + strconv.Itoa(len(hexStrs)))
}
for index, hexstr := range hexStrs {
value, err := strconv.ParseInt(hexstr, 16, 16)
if err != nil {
return []uint8{}, 0, err
}
retprefix[index] = uint8(value)
}
return retprefix, maxID, nil
}
func IsNotUnicast(mac_in MacAddress) bool {
if mac_in[0]&1 == 0 { // Is unicast
return false
}
return true
}
const (
EventUp = 1 << iota
EventDown
EventMTUUpdate
)
type Device interface {
Read([]byte, int) (int, error) // read a packet from the device (without any additional headers)
Write([]byte, int) (int, error) // writes a packet to the device (without any additional headers)
Flush() error // flush all previous writes to the device
MTU() (int, error) // returns the MTU of the device
Name() (string, error) // fetches and returns the current name
Events() chan Event // returns a constant channel of events related to the device
Close() error // stops the device and closes the event channel
}