Blame libnm-core/nm-setting-macsec.c

Packit Service 87a54e
/* SPDX-License-Identifier: LGPL-2.1-or-later */
Packit 5756e2
/*
Packit 5756e2
 * Copyright (C) 2017 Red Hat, Inc.
Packit 5756e2
 */
Packit 5756e2
Packit 5756e2
#include "nm-default.h"
Packit 5756e2
Packit 5756e2
#include "nm-setting-macsec.h"
Packit 5756e2
Packit 5756e2
#include <stdlib.h>
Packit 5756e2
Packit 5756e2
#include "nm-glib-aux/nm-secret-utils.h"
Packit 5756e2
Packit 5756e2
#include "nm-utils.h"
Packit 5756e2
#include "nm-core-types-internal.h"
Packit 5756e2
#include "nm-setting-connection.h"
Packit 5756e2
#include "nm-setting-private.h"
Packit 5756e2
#include "nm-setting-wired.h"
Packit 5756e2
#include "nm-connection-private.h"
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * SECTION:nm-setting-macsec
Packit 5756e2
 * @short_description: Describes connection properties for MACSEC interfaces
Packit 5756e2
 *
Packit 5756e2
 * The #NMSettingMacsec object is a #NMSetting subclass that describes properties
Packit 5756e2
 * necessary for connection to MACsec (IEEE 802.1AE) interfaces.
Packit 5756e2
 **/
Packit 5756e2
Packit 5756e2
/*****************************************************************************/
Packit 5756e2
Packit Service a1bd4f
NM_GOBJECT_PROPERTIES_DEFINE_BASE(PROP_PARENT,
Packit Service a1bd4f
                                  PROP_MODE,
Packit Service a1bd4f
                                  PROP_ENCRYPT,
Packit Service a1bd4f
                                  PROP_MKA_CAK,
Packit Service a1bd4f
                                  PROP_MKA_CAK_FLAGS,
Packit Service a1bd4f
                                  PROP_MKA_CKN,
Packit Service a1bd4f
                                  PROP_PORT,
Packit Service a1bd4f
                                  PROP_VALIDATION,
Packit Service a1bd4f
                                  PROP_SEND_SCI, );
Packit 5756e2
Packit 5756e2
typedef struct {
Packit Service a1bd4f
    char *                    parent;
Packit Service a1bd4f
    char *                    mka_cak;
Packit Service a1bd4f
    char *                    mka_ckn;
Packit Service a1bd4f
    int                       port;
Packit Service a1bd4f
    NMSettingMacsecMode       mode;
Packit Service a1bd4f
    NMSettingSecretFlags      mka_cak_flags;
Packit Service a1bd4f
    NMSettingMacsecValidation validation;
Packit Service a1bd4f
    bool                      encrypt : 1;
Packit Service a1bd4f
    bool                      send_sci : 1;
Packit 5756e2
} NMSettingMacsecPrivate;
Packit 5756e2
Packit Service a1bd4f
G_DEFINE_TYPE(NMSettingMacsec, nm_setting_macsec, NM_TYPE_SETTING)
Packit 5756e2
Packit Service a1bd4f
#define NM_SETTING_MACSEC_GET_PRIVATE(o) \
Packit Service a1bd4f
    (G_TYPE_INSTANCE_GET_PRIVATE((o), NM_TYPE_SETTING_MACSEC, NMSettingMacsecPrivate))
Packit 5756e2
Packit 5756e2
/*****************************************************************************/
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_parent:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:parent property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
const char *
Packit Service a1bd4f
nm_setting_macsec_get_parent(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NULL);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->parent;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_mode:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:mode property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
NMSettingMacsecMode
Packit Service a1bd4f
nm_setting_macsec_get_mode(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NM_SETTING_MACSEC_MODE_PSK);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->mode;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_encrypt:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:encrypt property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
gboolean
Packit Service a1bd4f
nm_setting_macsec_get_encrypt(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), TRUE);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->encrypt;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_mka_cak
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:mka-cak property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
const char *
Packit Service a1bd4f
nm_setting_macsec_get_mka_cak(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NULL);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->mka_cak;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_mka_cak_flags:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingSecretFlags pertaining to the #NMSettingMacsec:mka-cak
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
NMSettingSecretFlags
Packit Service a1bd4f
nm_setting_macsec_get_mka_cak_flags(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NM_SETTING_SECRET_FLAG_NONE);
Packit 5756e2
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->mka_cak_flags;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_mka_ckn:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:mka-ckn property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
const char *
Packit Service a1bd4f
nm_setting_macsec_get_mka_ckn(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NULL);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->mka_ckn;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_port:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:port property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
int
Packit Service a1bd4f
nm_setting_macsec_get_port(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), 1);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->port;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_validation:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:validation property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
NMSettingMacsecValidation
Packit Service a1bd4f
nm_setting_macsec_get_validation(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), NM_SETTING_MACSEC_VALIDATION_DISABLE);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->validation;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_get_send_sci:
Packit 5756e2
 * @setting: the #NMSettingMacsec
Packit 5756e2
 *
Packit 5756e2
 * Returns: the #NMSettingMacsec:send-sci property of the setting
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.12
Packit 5756e2
 **/
Packit 5756e2
gboolean
Packit Service a1bd4f
nm_setting_macsec_get_send_sci(NMSettingMacsec *setting)
Packit 5756e2
{
Packit Service a1bd4f
    g_return_val_if_fail(NM_IS_SETTING_MACSEC(setting), TRUE);
Packit Service a1bd4f
    return NM_SETTING_MACSEC_GET_PRIVATE(setting)->send_sci;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
static GPtrArray *
Packit Service a1bd4f
need_secrets(NMSetting *setting)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv    = NM_SETTING_MACSEC_GET_PRIVATE(setting);
Packit Service a1bd4f
    GPtrArray *             secrets = NULL;
Packit Service a1bd4f
Packit Service a1bd4f
    if (priv->mode == NM_SETTING_MACSEC_MODE_PSK) {
Packit Service a1bd4f
        if (!priv->mka_cak
Packit Service a1bd4f
            && !NM_FLAGS_HAS(priv->mka_cak_flags, NM_SETTING_SECRET_FLAG_NOT_REQUIRED)) {
Packit Service a1bd4f
            secrets = g_ptr_array_sized_new(1);
Packit Service a1bd4f
            g_ptr_array_add(secrets, NM_SETTING_MACSEC_MKA_CAK);
Packit Service a1bd4f
        }
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    return secrets;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/*********************************************************************/
Packit 5756e2
Packit 5756e2
static gboolean
Packit Service a1bd4f
verify_macsec_key(const char *key, gboolean cak, GError **error)
Packit 5756e2
{
Packit Service a1bd4f
    int req_len;
Packit Service a1bd4f
Packit Service a1bd4f
    /* CAK is a connection secret and can be NULL for various
Packit Service a1bd4f
     * reasons (agent-owned, no permissions to get secrets, etc.)
Packit Service a1bd4f
     */
Packit Service a1bd4f
    if (cak && !key)
Packit Service a1bd4f
        return TRUE;
Packit Service a1bd4f
Packit Service a1bd4f
    if (!key || !key[0]) {
Packit Service a1bd4f
        g_set_error_literal(error,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                            _("the key is empty"));
Packit Service a1bd4f
        return FALSE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    req_len = cak ? NM_SETTING_MACSEC_MKA_CAK_LENGTH : NM_SETTING_MACSEC_MKA_CKN_LENGTH;
Packit Service a1bd4f
    if (strlen(key) != (gsize) req_len) {
Packit Service a1bd4f
        g_set_error(error,
Packit Service a1bd4f
                    NM_CONNECTION_ERROR,
Packit Service a1bd4f
                    NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                    _("the key must be %d characters"),
Packit Service a1bd4f
                    req_len);
Packit Service a1bd4f
        return FALSE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    if (!NM_STRCHAR_ALL(key, ch, g_ascii_isxdigit(ch))) {
Packit Service a1bd4f
        g_set_error_literal(error,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                            _("the key contains non-hexadecimal characters"));
Packit Service a1bd4f
        return FALSE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    return TRUE;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
static gboolean
Packit Service a1bd4f
verify(NMSetting *setting, NMConnection *connection, GError **error)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv    = NM_SETTING_MACSEC_GET_PRIVATE(setting);
Packit Service a1bd4f
    NMSettingConnection *   s_con   = NULL;
Packit Service a1bd4f
    NMSettingWired *        s_wired = NULL;
Packit Service a1bd4f
    NMSetting8021x *        s_8021x = NULL;
Packit Service a1bd4f
Packit Service a1bd4f
    if (connection) {
Packit Service a1bd4f
        s_con   = nm_connection_get_setting_connection(connection);
Packit Service a1bd4f
        s_wired = nm_connection_get_setting_wired(connection);
Packit Service a1bd4f
        s_8021x = nm_connection_get_setting_802_1x(connection);
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    if (priv->parent) {
Packit Service a1bd4f
        if (nm_utils_is_uuid(priv->parent)) {
Packit Service a1bd4f
            /* If we have an NMSettingConnection:master with slave-type="macsec",
Packit Service a1bd4f
             * then it must be the same UUID.
Packit Service a1bd4f
             */
Packit Service a1bd4f
            if (s_con) {
Packit Service a1bd4f
                const char *master = NULL, *slave_type = NULL;
Packit Service a1bd4f
Packit Service a1bd4f
                slave_type = nm_setting_connection_get_slave_type(s_con);
Packit Service a1bd4f
                if (!g_strcmp0(slave_type, NM_SETTING_MACSEC_SETTING_NAME))
Packit Service a1bd4f
                    master = nm_setting_connection_get_master(s_con);
Packit Service a1bd4f
Packit Service a1bd4f
                if (master && g_strcmp0(priv->parent, master) != 0) {
Packit Service a1bd4f
                    g_set_error(error,
Packit Service a1bd4f
                                NM_CONNECTION_ERROR,
Packit Service a1bd4f
                                NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                                _("'%s' value doesn't match '%s=%s'"),
Packit Service a1bd4f
                                priv->parent,
Packit Service a1bd4f
                                NM_SETTING_CONNECTION_MASTER,
Packit Service a1bd4f
                                master);
Packit Service a1bd4f
                    g_prefix_error(error,
Packit Service a1bd4f
                                   "%s.%s: ",
Packit Service a1bd4f
                                   NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                                   NM_SETTING_MACSEC_PARENT);
Packit Service a1bd4f
                    return FALSE;
Packit Service a1bd4f
                }
Packit Service a1bd4f
            }
Packit Service a1bd4f
        } else if (!nm_utils_iface_valid_name(priv->parent)) {
Packit Service a1bd4f
            /* parent must be either a UUID or an interface name */
Packit Service a1bd4f
            g_set_error(error,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                        _("'%s' is neither an UUID nor an interface name"),
Packit Service a1bd4f
                        priv->parent);
Packit Service a1bd4f
            g_prefix_error(error,
Packit Service a1bd4f
                           "%s.%s: ",
Packit Service a1bd4f
                           NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                           NM_SETTING_MACSEC_PARENT);
Packit Service a1bd4f
            return FALSE;
Packit Service a1bd4f
        }
Packit Service a1bd4f
    } else {
Packit Service a1bd4f
        /* If parent is NULL, the parent must be specified via
Packit Service a1bd4f
         * NMSettingWired:mac-address.
Packit Service a1bd4f
         */
Packit Service a1bd4f
        if (connection && (!s_wired || !nm_setting_wired_get_mac_address(s_wired))) {
Packit Service a1bd4f
            g_set_error(error,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR_MISSING_PROPERTY,
Packit Service a1bd4f
                        _("property is not specified and neither is '%s:%s'"),
Packit Service a1bd4f
                        NM_SETTING_WIRED_SETTING_NAME,
Packit Service a1bd4f
                        NM_SETTING_WIRED_MAC_ADDRESS);
Packit Service a1bd4f
            g_prefix_error(error,
Packit Service a1bd4f
                           "%s.%s: ",
Packit Service a1bd4f
                           NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                           NM_SETTING_MACSEC_PARENT);
Packit Service a1bd4f
            return FALSE;
Packit Service a1bd4f
        }
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    if (priv->mode == NM_SETTING_MACSEC_MODE_PSK) {
Packit Service a1bd4f
        if (!verify_macsec_key(priv->mka_ckn, FALSE, error)) {
Packit Service a1bd4f
            g_prefix_error(error,
Packit Service a1bd4f
                           "%s.%s: ",
Packit Service a1bd4f
                           NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                           NM_SETTING_MACSEC_MKA_CKN);
Packit Service a1bd4f
            return FALSE;
Packit Service a1bd4f
        }
Packit Service a1bd4f
        if (!verify_macsec_key(priv->mka_cak, TRUE, error)) {
Packit Service a1bd4f
            g_prefix_error(error,
Packit Service a1bd4f
                           "%s.%s: ",
Packit Service a1bd4f
                           NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                           NM_SETTING_MACSEC_MKA_CAK);
Packit Service a1bd4f
            return FALSE;
Packit Service a1bd4f
        }
Packit Service a1bd4f
    } else if (priv->mode == NM_SETTING_MACSEC_MODE_EAP) {
Packit Service a1bd4f
        if (!s_8021x) {
Packit Service a1bd4f
            g_set_error(error,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR,
Packit Service a1bd4f
                        NM_CONNECTION_ERROR_MISSING_SETTING,
Packit Service a1bd4f
                        _("EAP key management requires '%s' setting presence"),
Packit Service a1bd4f
                        NM_SETTING_802_1X_SETTING_NAME);
Packit Service a1bd4f
            g_prefix_error(error, "%s: ", NM_SETTING_MACSEC_SETTING_NAME);
Packit Service a1bd4f
            return FALSE;
Packit Service a1bd4f
        }
Packit Service a1bd4f
    } else {
Packit Service a1bd4f
        g_set_error_literal(error,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                            _("must be either psk (0) or eap (1)"));
Packit Service a1bd4f
        g_prefix_error(error, "%s.%s: ", NM_SETTING_MACSEC_SETTING_NAME, NM_SETTING_MACSEC_MODE);
Packit Service a1bd4f
        return FALSE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    if (priv->port <= 0 || priv->port > 65534) {
Packit Service a1bd4f
        g_set_error(error,
Packit Service a1bd4f
                    NM_CONNECTION_ERROR,
Packit Service a1bd4f
                    NM_CONNECTION_ERROR_MISSING_PROPERTY,
Packit Service a1bd4f
                    _("invalid port %d"),
Packit Service a1bd4f
                    priv->port);
Packit Service a1bd4f
        g_prefix_error(error, "%s.%s: ", NM_SETTING_MACSEC_SETTING_NAME, NM_SETTING_MACSEC_PORT);
Packit Service a1bd4f
        return FALSE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    if (priv->mode != NM_SETTING_MACSEC_MODE_PSK && (priv->mka_cak || priv->mka_ckn)) {
Packit Service a1bd4f
        g_set_error_literal(error,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR,
Packit Service a1bd4f
                            NM_CONNECTION_ERROR_INVALID_PROPERTY,
Packit Service a1bd4f
                            _("only valid for psk mode"));
Packit Service a1bd4f
        g_prefix_error(error,
Packit Service a1bd4f
                       "%s.%s: ",
Packit Service a1bd4f
                       NM_SETTING_MACSEC_SETTING_NAME,
Packit Service a1bd4f
                       priv->mka_cak ? NM_SETTING_MACSEC_MKA_CAK : NM_SETTING_MACSEC_MKA_CKN);
Packit Service a1bd4f
        return NM_SETTING_VERIFY_NORMALIZABLE;
Packit Service a1bd4f
    }
Packit Service a1bd4f
Packit Service a1bd4f
    return TRUE;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/*****************************************************************************/
Packit 5756e2
Packit 5756e2
static void
Packit Service a1bd4f
get_property(GObject *object, guint prop_id, GValue *value, GParamSpec *pspec)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsec *       setting = NM_SETTING_MACSEC(object);
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv    = NM_SETTING_MACSEC_GET_PRIVATE(setting);
Packit Service a1bd4f
Packit Service a1bd4f
    switch (prop_id) {
Packit Service a1bd4f
    case PROP_PARENT:
Packit Service a1bd4f
        g_value_set_string(value, priv->parent);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MODE:
Packit Service a1bd4f
        g_value_set_int(value, priv->mode);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_ENCRYPT:
Packit Service a1bd4f
        g_value_set_boolean(value, priv->encrypt);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CAK:
Packit Service a1bd4f
        g_value_set_string(value, priv->mka_cak);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CAK_FLAGS:
Packit Service a1bd4f
        g_value_set_flags(value, priv->mka_cak_flags);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CKN:
Packit Service a1bd4f
        g_value_set_string(value, priv->mka_ckn);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_PORT:
Packit Service a1bd4f
        g_value_set_int(value, priv->port);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_VALIDATION:
Packit Service a1bd4f
        g_value_set_int(value, priv->validation);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_SEND_SCI:
Packit Service a1bd4f
        g_value_set_boolean(value, priv->send_sci);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    default:
Packit Service a1bd4f
        G_OBJECT_WARN_INVALID_PROPERTY_ID(object, prop_id, pspec);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    }
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
static void
Packit Service a1bd4f
set_property(GObject *object, guint prop_id, const GValue *value, GParamSpec *pspec)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsec *       setting = NM_SETTING_MACSEC(object);
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv    = NM_SETTING_MACSEC_GET_PRIVATE(setting);
Packit Service a1bd4f
Packit Service a1bd4f
    switch (prop_id) {
Packit Service a1bd4f
    case PROP_PARENT:
Packit Service a1bd4f
        g_free(priv->parent);
Packit Service a1bd4f
        priv->parent = g_value_dup_string(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MODE:
Packit Service a1bd4f
        priv->mode = g_value_get_int(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_ENCRYPT:
Packit Service a1bd4f
        priv->encrypt = g_value_get_boolean(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CAK:
Packit Service a1bd4f
        nm_free_secret(priv->mka_cak);
Packit Service a1bd4f
        priv->mka_cak = g_value_dup_string(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CAK_FLAGS:
Packit Service a1bd4f
        priv->mka_cak_flags = g_value_get_flags(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_MKA_CKN:
Packit Service a1bd4f
        g_free(priv->mka_ckn);
Packit Service a1bd4f
        priv->mka_ckn = g_value_dup_string(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_PORT:
Packit Service a1bd4f
        priv->port = g_value_get_int(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_VALIDATION:
Packit Service a1bd4f
        priv->validation = g_value_get_int(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    case PROP_SEND_SCI:
Packit Service a1bd4f
        priv->send_sci = g_value_get_boolean(value);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    default:
Packit Service a1bd4f
        G_OBJECT_WARN_INVALID_PROPERTY_ID(object, prop_id, pspec);
Packit Service a1bd4f
        break;
Packit Service a1bd4f
    }
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/*****************************************************************************/
Packit 5756e2
Packit 5756e2
static void
Packit Service a1bd4f
nm_setting_macsec_init(NMSettingMacsec *self)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv = NM_SETTING_MACSEC_GET_PRIVATE(self);
Packit 5756e2
Packit Service a1bd4f
    nm_assert(priv->mode == NM_SETTING_MACSEC_MODE_PSK);
Packit Service a1bd4f
    priv->encrypt    = TRUE;
Packit Service a1bd4f
    priv->port       = 1;
Packit Service a1bd4f
    priv->send_sci   = TRUE;
Packit Service a1bd4f
    priv->validation = NM_SETTING_MACSEC_VALIDATION_STRICT;
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
/**
Packit 5756e2
 * nm_setting_macsec_new:
Packit 5756e2
 *
Packit 5756e2
 * Creates a new #NMSettingMacsec object with default values.
Packit 5756e2
 *
Packit 5756e2
 * Returns: (transfer full): the new empty #NMSettingMacsec object
Packit 5756e2
 *
Packit 5756e2
 * Since: 1.6
Packit 5756e2
 **/
Packit 5756e2
NMSetting *
Packit Service a1bd4f
nm_setting_macsec_new(void)
Packit 5756e2
{
Packit Service a1bd4f
    return g_object_new(NM_TYPE_SETTING_MACSEC, NULL);
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
static void
Packit Service a1bd4f
finalize(GObject *object)
Packit 5756e2
{
Packit Service a1bd4f
    NMSettingMacsec *       setting = NM_SETTING_MACSEC(object);
Packit Service a1bd4f
    NMSettingMacsecPrivate *priv    = NM_SETTING_MACSEC_GET_PRIVATE(setting);
Packit 5756e2
Packit Service a1bd4f
    g_free(priv->parent);
Packit Service a1bd4f
    nm_free_secret(priv->mka_cak);
Packit Service a1bd4f
    g_free(priv->mka_ckn);
Packit 5756e2
Packit Service a1bd4f
    G_OBJECT_CLASS(nm_setting_macsec_parent_class)->finalize(object);
Packit 5756e2
}
Packit 5756e2
Packit 5756e2
static void
Packit Service a1bd4f
nm_setting_macsec_class_init(NMSettingMacsecClass *klass)
Packit 5756e2
{
Packit Service a1bd4f
    GObjectClass *  object_class  = G_OBJECT_CLASS(klass);
Packit Service a1bd4f
    NMSettingClass *setting_class = NM_SETTING_CLASS(klass);
Packit Service a1bd4f
Packit Service a1bd4f
    g_type_class_add_private(klass, sizeof(NMSettingMacsecPrivate));
Packit Service a1bd4f
Packit Service a1bd4f
    object_class->get_property = get_property;
Packit Service a1bd4f
    object_class->set_property = set_property;
Packit Service a1bd4f
    object_class->finalize     = finalize;
Packit Service a1bd4f
Packit Service a1bd4f
    setting_class->verify       = verify;
Packit Service a1bd4f
    setting_class->need_secrets = need_secrets;
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:parent:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * If given, specifies the parent interface name or parent connection UUID
Packit Service a1bd4f
     * from which this MACSEC interface should be created.  If this property is
Packit Service a1bd4f
     * not specified, the connection must contain an #NMSettingWired setting
Packit Service a1bd4f
     * with a #NMSettingWired:mac-address property.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_PARENT] = g_param_spec_string(
Packit Service a1bd4f
        NM_SETTING_MACSEC_PARENT,
Packit Service a1bd4f
        "",
Packit Service a1bd4f
        "",
Packit Service a1bd4f
        NULL,
Packit Service a1bd4f
        G_PARAM_READWRITE | NM_SETTING_PARAM_INFERRABLE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:mode:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Specifies how the CAK (Connectivity Association Key) for MKA (MACsec Key
Packit Service a1bd4f
     * Agreement) is obtained.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_MODE] =
Packit Service a1bd4f
        g_param_spec_int(NM_SETTING_MACSEC_MODE,
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         G_MININT,
Packit Service a1bd4f
                         G_MAXINT,
Packit Service a1bd4f
                         NM_SETTING_MACSEC_MODE_PSK,
Packit Service a1bd4f
                         G_PARAM_READWRITE | NM_SETTING_PARAM_INFERRABLE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:encrypt:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Whether the transmitted traffic must be encrypted.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_ENCRYPT] = g_param_spec_boolean(NM_SETTING_MACSEC_ENCRYPT,
Packit Service a1bd4f
                                                        "",
Packit Service a1bd4f
                                                        "",
Packit Service a1bd4f
                                                        TRUE,
Packit Service a1bd4f
                                                        G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:mka-cak:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * The pre-shared CAK (Connectivity Association Key) for MACsec
Packit Service a1bd4f
     * Key Agreement.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_MKA_CAK] =
Packit Service a1bd4f
        g_param_spec_string(NM_SETTING_MACSEC_MKA_CAK,
Packit Service a1bd4f
                            "",
Packit Service a1bd4f
                            "",
Packit Service a1bd4f
                            NULL,
Packit Service a1bd4f
                            G_PARAM_READWRITE | NM_SETTING_PARAM_SECRET | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:mka-cak-flags:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Flags indicating how to handle the #NMSettingMacsec:mka-cak
Packit Service a1bd4f
     * property.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_MKA_CAK_FLAGS] =
Packit Service a1bd4f
        g_param_spec_flags(NM_SETTING_MACSEC_MKA_CAK_FLAGS,
Packit Service a1bd4f
                           "",
Packit Service a1bd4f
                           "",
Packit Service a1bd4f
                           NM_TYPE_SETTING_SECRET_FLAGS,
Packit Service a1bd4f
                           NM_SETTING_SECRET_FLAG_NONE,
Packit Service a1bd4f
                           G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:mka-ckn:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * The pre-shared CKN (Connectivity-association Key Name) for
Packit Service a1bd4f
     * MACsec Key Agreement.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_MKA_CKN] = g_param_spec_string(NM_SETTING_MACSEC_MKA_CKN,
Packit Service a1bd4f
                                                       "",
Packit Service a1bd4f
                                                       "",
Packit Service a1bd4f
                                                       NULL,
Packit Service a1bd4f
                                                       G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:port:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * The port component of the SCI (Secure Channel Identifier), between 1 and 65534.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_PORT] =
Packit Service a1bd4f
        g_param_spec_int(NM_SETTING_MACSEC_PORT,
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         1,
Packit Service a1bd4f
                         65534,
Packit Service a1bd4f
                         1,
Packit Service a1bd4f
                         G_PARAM_READWRITE | NM_SETTING_PARAM_INFERRABLE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:validation:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Specifies the validation mode for incoming frames.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.6
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_VALIDATION] =
Packit Service a1bd4f
        g_param_spec_int(NM_SETTING_MACSEC_VALIDATION,
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         "",
Packit Service a1bd4f
                         G_MININT,
Packit Service a1bd4f
                         G_MAXINT,
Packit Service a1bd4f
                         NM_SETTING_MACSEC_VALIDATION_STRICT,
Packit Service a1bd4f
                         G_PARAM_READWRITE | NM_SETTING_PARAM_INFERRABLE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    /**
Packit Service a1bd4f
     * NMSettingMacsec:send-sci:
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Specifies whether the SCI (Secure Channel Identifier) is included
Packit Service a1bd4f
     * in every packet.
Packit Service a1bd4f
     *
Packit Service a1bd4f
     * Since: 1.12
Packit Service a1bd4f
     **/
Packit Service a1bd4f
    obj_properties[PROP_SEND_SCI] =
Packit Service a1bd4f
        g_param_spec_boolean(NM_SETTING_MACSEC_SEND_SCI,
Packit Service a1bd4f
                             "",
Packit Service a1bd4f
                             "",
Packit Service a1bd4f
                             TRUE,
Packit Service a1bd4f
                             G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
Packit Service a1bd4f
Packit Service a1bd4f
    g_object_class_install_properties(object_class, _PROPERTY_ENUMS_LAST, obj_properties);
Packit Service a1bd4f
Packit Service a1bd4f
    _nm_setting_class_commit(setting_class, NM_META_SETTING_TYPE_MACSEC);
Packit 5756e2
}