123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635 |
- package nebula
- import (
- "bytes"
- "encoding/binary"
- "net"
- "net/netip"
- "testing"
- "github.com/google/gopacket"
- "github.com/google/gopacket/layers"
- "github.com/slackhq/nebula/firewall"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "golang.org/x/net/ipv4"
- )
- func Test_newPacket(t *testing.T) {
- p := &firewall.Packet{}
- // length fails
- err := newPacket([]byte{}, true, p)
- require.ErrorIs(t, err, ErrPacketTooShort)
- err = newPacket([]byte{0x40}, true, p)
- require.ErrorIs(t, err, ErrIPv4PacketTooShort)
- err = newPacket([]byte{0x60}, true, p)
- require.ErrorIs(t, err, ErrIPv6PacketTooShort)
- // length fail with ip options
- h := ipv4.Header{
- Version: 1,
- Len: 100,
- Src: net.IPv4(10, 0, 0, 1),
- Dst: net.IPv4(10, 0, 0, 2),
- Options: []byte{0, 1, 0, 2},
- }
- b, _ := h.Marshal()
- err = newPacket(b, true, p)
- require.ErrorIs(t, err, ErrIPv4InvalidHeaderLength)
- // not an ipv4 packet
- err = newPacket([]byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}, true, p)
- require.ErrorIs(t, err, ErrUnknownIPVersion)
- // invalid ihl
- err = newPacket([]byte{4<<4 | (8 >> 2 & 0x0f), 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}, true, p)
- require.ErrorIs(t, err, ErrIPv4InvalidHeaderLength)
- // account for variable ip header length - incoming
- h = ipv4.Header{
- Version: 1,
- Len: 100,
- Src: net.IPv4(10, 0, 0, 1),
- Dst: net.IPv4(10, 0, 0, 2),
- Options: []byte{0, 1, 0, 2},
- Protocol: firewall.ProtoTCP,
- }
- b, _ = h.Marshal()
- b = append(b, []byte{0, 3, 0, 4}...)
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoTCP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("10.0.0.2"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("10.0.0.1"), p.RemoteAddr)
- assert.Equal(t, uint16(3), p.RemotePort)
- assert.Equal(t, uint16(4), p.LocalPort)
- assert.False(t, p.Fragment)
- // account for variable ip header length - outgoing
- h = ipv4.Header{
- Version: 1,
- Protocol: 2,
- Len: 100,
- Src: net.IPv4(10, 0, 0, 1),
- Dst: net.IPv4(10, 0, 0, 2),
- Options: []byte{0, 1, 0, 2},
- }
- b, _ = h.Marshal()
- b = append(b, []byte{0, 5, 0, 6}...)
- err = newPacket(b, false, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(2), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("10.0.0.1"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("10.0.0.2"), p.RemoteAddr)
- assert.Equal(t, uint16(6), p.RemotePort)
- assert.Equal(t, uint16(5), p.LocalPort)
- assert.False(t, p.Fragment)
- }
- func Test_newPacket_v6(t *testing.T) {
- p := &firewall.Packet{}
- // invalid ipv6
- ip := layers.IPv6{
- Version: 6,
- HopLimit: 128,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- buffer := gopacket.NewSerializeBuffer()
- opt := gopacket.SerializeOptions{
- ComputeChecksums: false,
- FixLengths: false,
- }
- err := gopacket.SerializeLayers(buffer, opt, &ip)
- require.NoError(t, err)
- err = newPacket(buffer.Bytes(), true, p)
- require.ErrorIs(t, err, ErrIPv6CouldNotFindPayload)
- // A v6 packet with a hop-by-hop extension
- // ICMPv6 Payload (Echo Request)
- icmpLayer := layers.ICMPv6{
- TypeCode: layers.ICMPv6TypeEchoRequest,
- }
- // Hop-by-Hop Extension Header
- hopOption := layers.IPv6HopByHopOption{}
- hopOption.OptionData = []byte{0, 0, 0, 0}
- hopByHop := layers.IPv6HopByHop{}
- hopByHop.Options = append(hopByHop.Options, &hopOption)
- ip = layers.IPv6{
- Version: 6,
- HopLimit: 128,
- NextHeader: layers.IPProtocolIPv6Destination,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- buffer.Clear()
- err = gopacket.SerializeLayers(buffer, gopacket.SerializeOptions{
- ComputeChecksums: false,
- FixLengths: true,
- }, &ip, &hopByHop, &icmpLayer)
- if err != nil {
- panic(err)
- }
- // Ensure buffer length checks during parsing with the next 2 tests.
- // A full IPv6 header and 1 byte in the first extension, but missing
- // the length byte.
- err = newPacket(buffer.Bytes()[:41], true, p)
- require.ErrorIs(t, err, ErrIPv6CouldNotFindPayload)
- // A full IPv6 header plus 1 full extension, but only 1 byte of the
- // next layer, missing length byte
- err = newPacket(buffer.Bytes()[:49], true, p)
- require.ErrorIs(t, err, ErrIPv6CouldNotFindPayload)
- // A good ICMP packet
- ip = layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolICMPv6,
- HopLimit: 128,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- icmp := layers.ICMPv6{}
- buffer.Clear()
- err = gopacket.SerializeLayers(buffer, opt, &ip, &icmp)
- if err != nil {
- panic(err)
- }
- err = newPacket(buffer.Bytes(), true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(layers.IPProtocolICMPv6), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(0), p.RemotePort)
- assert.Equal(t, uint16(0), p.LocalPort)
- assert.False(t, p.Fragment)
- // A good ESP packet
- b := buffer.Bytes()
- b[6] = byte(layers.IPProtocolESP)
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(layers.IPProtocolESP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(0), p.RemotePort)
- assert.Equal(t, uint16(0), p.LocalPort)
- assert.False(t, p.Fragment)
- // A good None packet
- b = buffer.Bytes()
- b[6] = byte(layers.IPProtocolNoNextHeader)
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(layers.IPProtocolNoNextHeader), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(0), p.RemotePort)
- assert.Equal(t, uint16(0), p.LocalPort)
- assert.False(t, p.Fragment)
- // An unknown protocol packet
- b = buffer.Bytes()
- b[6] = 255 // 255 is a reserved protocol number
- err = newPacket(b, true, p)
- require.ErrorIs(t, err, ErrIPv6CouldNotFindPayload)
- // A good UDP packet
- ip = layers.IPv6{
- Version: 6,
- NextHeader: firewall.ProtoUDP,
- HopLimit: 128,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- udp := layers.UDP{
- SrcPort: layers.UDPPort(36123),
- DstPort: layers.UDPPort(22),
- }
- err = udp.SetNetworkLayerForChecksum(&ip)
- require.NoError(t, err)
- buffer.Clear()
- err = gopacket.SerializeLayers(buffer, opt, &ip, &udp, gopacket.Payload([]byte{0xde, 0xad, 0xbe, 0xef}))
- if err != nil {
- panic(err)
- }
- b = buffer.Bytes()
- // incoming
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoUDP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(36123), p.RemotePort)
- assert.Equal(t, uint16(22), p.LocalPort)
- assert.False(t, p.Fragment)
- // outgoing
- err = newPacket(b, false, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoUDP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.RemoteAddr)
- assert.Equal(t, uint16(36123), p.LocalPort)
- assert.Equal(t, uint16(22), p.RemotePort)
- assert.False(t, p.Fragment)
- // Too short UDP packet
- err = newPacket(b[:len(b)-10], false, p) // pull off the last 10 bytes
- require.ErrorIs(t, err, ErrIPv6PacketTooShort)
- // A good TCP packet
- b[6] = byte(layers.IPProtocolTCP)
- // incoming
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoTCP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(36123), p.RemotePort)
- assert.Equal(t, uint16(22), p.LocalPort)
- assert.False(t, p.Fragment)
- // outgoing
- err = newPacket(b, false, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoTCP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.RemoteAddr)
- assert.Equal(t, uint16(36123), p.LocalPort)
- assert.Equal(t, uint16(22), p.RemotePort)
- assert.False(t, p.Fragment)
- // Too short TCP packet
- err = newPacket(b[:len(b)-10], false, p) // pull off the last 10 bytes
- require.ErrorIs(t, err, ErrIPv6PacketTooShort)
- // A good UDP packet with an AH header
- ip = layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolAH,
- HopLimit: 128,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- ah := layers.IPSecAH{
- AuthenticationData: []byte{0xde, 0xad, 0xbe, 0xef, 0xde, 0xad, 0xbe, 0xef},
- }
- ah.NextHeader = layers.IPProtocolUDP
- udpHeader := []byte{
- 0x8d, 0x1b, // Source port 36123
- 0x00, 0x16, // Destination port 22
- 0x00, 0x00, // Length
- 0x00, 0x00, // Checksum
- }
- buffer.Clear()
- err = ip.SerializeTo(buffer, opt)
- if err != nil {
- panic(err)
- }
- b = buffer.Bytes()
- ahb := serializeAH(&ah)
- b = append(b, ahb...)
- b = append(b, udpHeader...)
- err = newPacket(b, true, p)
- require.NoError(t, err)
- assert.Equal(t, uint8(firewall.ProtoUDP), p.Protocol)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint16(36123), p.RemotePort)
- assert.Equal(t, uint16(22), p.LocalPort)
- assert.False(t, p.Fragment)
- // Ensure buffer bounds checking during processing
- err = newPacket(b[:41], true, p)
- require.ErrorIs(t, err, ErrIPv6PacketTooShort)
- // Invalid AH header
- b = buffer.Bytes()
- err = newPacket(b, true, p)
- require.ErrorIs(t, err, ErrIPv6CouldNotFindPayload)
- }
- func Test_newPacket_ipv6Fragment(t *testing.T) {
- p := &firewall.Packet{}
- ip := &layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolIPv6Fragment,
- HopLimit: 64,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- // First fragment
- fragHeader1 := []byte{
- uint8(layers.IPProtocolUDP), // Next Header (UDP)
- 0x00, // Reserved
- 0x00, // Fragment Offset high byte (0)
- 0x01, // Fragment Offset low byte & flags (M=1)
- 0x00, 0x00, 0x00, 0x01, // Identification
- }
- udpHeader := []byte{
- 0x8d, 0x1b, // Source port 36123
- 0x00, 0x16, // Destination port 22
- 0x00, 0x00, // Length
- 0x00, 0x00, // Checksum
- }
- buffer := gopacket.NewSerializeBuffer()
- opts := gopacket.SerializeOptions{
- ComputeChecksums: true,
- FixLengths: true,
- }
- err := ip.SerializeTo(buffer, opts)
- if err != nil {
- t.Fatal(err)
- }
- firstFrag := buffer.Bytes()
- firstFrag = append(firstFrag, fragHeader1...)
- firstFrag = append(firstFrag, udpHeader...)
- firstFrag = append(firstFrag, []byte{0xde, 0xad, 0xbe, 0xef}...)
- // Test first fragment incoming
- err = newPacket(firstFrag, true, p)
- require.NoError(t, err)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint8(layers.IPProtocolUDP), p.Protocol)
- assert.Equal(t, uint16(36123), p.RemotePort)
- assert.Equal(t, uint16(22), p.LocalPort)
- assert.False(t, p.Fragment)
- // Test first fragment outgoing
- err = newPacket(firstFrag, false, p)
- require.NoError(t, err)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.RemoteAddr)
- assert.Equal(t, uint8(layers.IPProtocolUDP), p.Protocol)
- assert.Equal(t, uint16(36123), p.LocalPort)
- assert.Equal(t, uint16(22), p.RemotePort)
- assert.False(t, p.Fragment)
- // Second fragment
- fragHeader2 := []byte{
- uint8(layers.IPProtocolUDP), // Next Header (UDP)
- 0x00, // Reserved
- 0xb9, // Fragment Offset high byte (185)
- 0x01, // Fragment Offset low byte & flags (M=1)
- 0x00, 0x00, 0x00, 0x01, // Identification
- }
- buffer.Clear()
- err = ip.SerializeTo(buffer, opts)
- if err != nil {
- t.Fatal(err)
- }
- secondFrag := buffer.Bytes()
- secondFrag = append(secondFrag, fragHeader2...)
- secondFrag = append(secondFrag, []byte{0xde, 0xad, 0xbe, 0xef}...)
- // Test second fragment incoming
- err = newPacket(secondFrag, true, p)
- require.NoError(t, err)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.RemoteAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.LocalAddr)
- assert.Equal(t, uint8(layers.IPProtocolUDP), p.Protocol)
- assert.Equal(t, uint16(0), p.RemotePort)
- assert.Equal(t, uint16(0), p.LocalPort)
- assert.True(t, p.Fragment)
- // Test second fragment outgoing
- err = newPacket(secondFrag, false, p)
- require.NoError(t, err)
- assert.Equal(t, netip.MustParseAddr("ff02::2"), p.LocalAddr)
- assert.Equal(t, netip.MustParseAddr("ff02::1"), p.RemoteAddr)
- assert.Equal(t, uint8(layers.IPProtocolUDP), p.Protocol)
- assert.Equal(t, uint16(0), p.LocalPort)
- assert.Equal(t, uint16(0), p.RemotePort)
- assert.True(t, p.Fragment)
- // Too short of a fragment packet
- err = newPacket(secondFrag[:len(secondFrag)-10], false, p)
- require.ErrorIs(t, err, ErrIPv6PacketTooShort)
- }
- func BenchmarkParseV6(b *testing.B) {
- // Regular UDP packet
- ip := &layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolUDP,
- HopLimit: 64,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- udp := &layers.UDP{
- SrcPort: layers.UDPPort(36123),
- DstPort: layers.UDPPort(22),
- }
- buffer := gopacket.NewSerializeBuffer()
- opts := gopacket.SerializeOptions{
- ComputeChecksums: false,
- FixLengths: true,
- }
- err := gopacket.SerializeLayers(buffer, opts, ip, udp)
- if err != nil {
- b.Fatal(err)
- }
- normalPacket := buffer.Bytes()
- // First Fragment packet
- ipFrag := &layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolIPv6Fragment,
- HopLimit: 64,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- fragHeader := []byte{
- uint8(layers.IPProtocolUDP), // Next Header (UDP)
- 0x00, // Reserved
- 0x00, // Fragment Offset high byte (0)
- 0x01, // Fragment Offset low byte & flags (M=1)
- 0x00, 0x00, 0x00, 0x01, // Identification
- }
- udpHeader := []byte{
- 0x8d, 0x7b, // Source port 36123
- 0x00, 0x16, // Destination port 22
- 0x00, 0x00, // Length
- 0x00, 0x00, // Checksum
- }
- buffer.Clear()
- err = ipFrag.SerializeTo(buffer, opts)
- if err != nil {
- b.Fatal(err)
- }
- firstFrag := buffer.Bytes()
- firstFrag = append(firstFrag, fragHeader...)
- firstFrag = append(firstFrag, udpHeader...)
- firstFrag = append(firstFrag, []byte{0xde, 0xad, 0xbe, 0xef}...)
- // Second Fragment packet
- fragHeader[2] = 0xb9 // offset 185
- buffer.Clear()
- err = ipFrag.SerializeTo(buffer, opts)
- if err != nil {
- b.Fatal(err)
- }
- secondFrag := buffer.Bytes()
- secondFrag = append(secondFrag, fragHeader...)
- secondFrag = append(secondFrag, []byte{0xde, 0xad, 0xbe, 0xef}...)
- fp := &firewall.Packet{}
- b.Run("Normal", func(b *testing.B) {
- for i := 0; i < b.N; i++ {
- if err = parseV6(normalPacket, true, fp); err != nil {
- b.Fatal(err)
- }
- }
- })
- b.Run("FirstFragment", func(b *testing.B) {
- for i := 0; i < b.N; i++ {
- if err = parseV6(firstFrag, true, fp); err != nil {
- b.Fatal(err)
- }
- }
- })
- b.Run("SecondFragment", func(b *testing.B) {
- for i := 0; i < b.N; i++ {
- if err = parseV6(secondFrag, true, fp); err != nil {
- b.Fatal(err)
- }
- }
- })
- // Evil packet
- evilPacket := &layers.IPv6{
- Version: 6,
- NextHeader: layers.IPProtocolIPv6HopByHop,
- HopLimit: 64,
- SrcIP: net.IPv6linklocalallrouters,
- DstIP: net.IPv6linklocalallnodes,
- }
- hopHeader := []byte{
- uint8(layers.IPProtocolIPv6HopByHop), // Next Header (HopByHop)
- 0x00, // Length
- 0x00, 0x00, // Options and padding
- 0x00, 0x00, 0x00, 0x00, // More options and padding
- }
- lastHopHeader := []byte{
- uint8(layers.IPProtocolUDP), // Next Header (UDP)
- 0x00, // Length
- 0x00, 0x00, // Options and padding
- 0x00, 0x00, 0x00, 0x00, // More options and padding
- }
- buffer.Clear()
- err = evilPacket.SerializeTo(buffer, opts)
- if err != nil {
- b.Fatal(err)
- }
- evilBytes := buffer.Bytes()
- for i := 0; i < 200; i++ {
- evilBytes = append(evilBytes, hopHeader...)
- }
- evilBytes = append(evilBytes, lastHopHeader...)
- evilBytes = append(evilBytes, udpHeader...)
- evilBytes = append(evilBytes, []byte{0xde, 0xad, 0xbe, 0xef}...)
- b.Run("200 HopByHop headers", func(b *testing.B) {
- for i := 0; i < b.N; i++ {
- if err = parseV6(evilBytes, false, fp); err != nil {
- b.Fatal(err)
- }
- }
- })
- }
- // Ensure authentication data is a multiple of 8 bytes by padding if necessary
- func padAuthData(authData []byte) []byte {
- // Length of Authentication Data must be a multiple of 8 bytes
- paddingLength := (8 - (len(authData) % 8)) % 8 // Only pad if necessary
- if paddingLength > 0 {
- authData = append(authData, make([]byte, paddingLength)...)
- }
- return authData
- }
- // Custom function to manually serialize IPSecAH for both IPv4 and IPv6
- func serializeAH(ah *layers.IPSecAH) []byte {
- buf := new(bytes.Buffer)
- // Ensure Authentication Data is a multiple of 8 bytes
- ah.AuthenticationData = padAuthData(ah.AuthenticationData)
- // Calculate Payload Length (in 32-bit words, minus 2)
- payloadLen := uint8((12+len(ah.AuthenticationData))/4) - 2
- // Serialize fields
- if err := binary.Write(buf, binary.BigEndian, ah.NextHeader); err != nil {
- panic(err)
- }
- if err := binary.Write(buf, binary.BigEndian, payloadLen); err != nil {
- panic(err)
- }
- if err := binary.Write(buf, binary.BigEndian, ah.Reserved); err != nil {
- panic(err)
- }
- if err := binary.Write(buf, binary.BigEndian, ah.SPI); err != nil {
- panic(err)
- }
- if err := binary.Write(buf, binary.BigEndian, ah.Seq); err != nil {
- panic(err)
- }
- if len(ah.AuthenticationData) > 0 {
- if err := binary.Write(buf, binary.BigEndian, ah.AuthenticationData); err != nil {
- panic(err)
- }
- }
- return buf.Bytes()
- }
|