4 * uAnytun is a tiny implementation of SATP. Unlike Anytun which is a full
5 * featured implementation uAnytun has no support for multiple connections
6 * or synchronisation. It is a small single threaded implementation intended
7 * to act as a client on small platforms.
8 * The secure anycast tunneling protocol (satp) defines a protocol used
9 * for communication between any combination of unicast and anycast
10 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
11 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
12 * ethernet, ip, arp ...). satp directly includes cryptography and
13 * message authentication based on the methodes used by SRTP. It is
14 * intended to deliver a generic, scaleable and secure solution for
15 * tunneling and relaying of packets of any protocol.
18 * Copyright (C) 2007-2010 Christian Pointner <equinox@anytun.org>
20 * This file is part of uAnytun.
22 * uAnytun is free software: you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License as published by
24 * the Free Software Foundation, either version 3 of the License, or
27 * uAnytun is distributed in the hope that it will be useful,
28 * but WITHOUT ANY WARRANTY; without even the implied warranty of
29 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
30 * GNU General Public License for more details.
32 * You should have received a copy of the GNU General Public License
33 * along with uAnytun. If not, see <http://www.gnu.org/licenses/>.
36 #include "datatypes.h"
38 #include "encrypted_packet.h"
43 void encrypted_packet_init(encrypted_packet_t* packet, u_int32_t auth_tag_length)
48 memset (packet, 0, sizeof(*packet));
49 if(auth_tag_length > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t)))
50 packet->auth_tag_length_ = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t);
52 packet->auth_tag_length_ = auth_tag_length;
55 u_int32_t encrypted_packet_get_minimum_length(encrypted_packet_t* packet)
60 return (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
63 u_int8_t* encrypted_packet_get_packet(encrypted_packet_t* packet)
68 return packet->data_.buf_;
71 u_int32_t encrypted_packet_get_length(encrypted_packet_t* packet)
76 return (packet->payload_length_ + sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
79 void encrypted_packet_set_length(encrypted_packet_t* packet, u_int32_t len)
84 if(len > ENCRYPTED_PACKET_SIZE_MAX)
85 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
86 else if(len < (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_))
89 len -= (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
91 packet->payload_length_ = len;
94 u_int8_t* encrypted_packet_get_payload(encrypted_packet_t* packet)
96 if(!packet || !packet->payload_length_)
99 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t));
102 u_int32_t encrypted_packet_get_payload_length(encrypted_packet_t* packet)
107 return packet->payload_length_;
110 void encrypted_packet_set_payload_length(encrypted_packet_t* packet, u_int32_t len)
115 if(len > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_))
116 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
118 packet->payload_length_ = len;
121 u_int8_t* encrypted_packet_get_auth_portion(encrypted_packet_t* packet)
126 return packet->data_.buf_;
129 u_int32_t encrypted_packet_get_auth_portion_length(encrypted_packet_t* packet)
134 return packet->payload_length_ + sizeof(encrypted_packet_header_t);
138 u_int8_t* encrypted_packet_get_auth_tag(encrypted_packet_t* packet)
140 if(!packet || !packet->auth_tag_length_)
143 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t) + packet->payload_length_);
146 u_int32_t encrypted_packet_get_auth_tag_length(encrypted_packet_t* packet)
151 return packet->auth_tag_length_;
155 seq_nr_t encrypted_packet_get_seq_nr(encrypted_packet_t* packet)
160 return SEQ_NR_T_NTOH(packet->data_.header_.seq_nr_);
163 void encrypted_packet_set_seq_nr(encrypted_packet_t* packet, seq_nr_t seq_nr)
168 packet->data_.header_.seq_nr_ = SEQ_NR_T_HTON(seq_nr);
171 sender_id_t encrypted_packet_get_sender_id(encrypted_packet_t* packet)
176 return SENDER_ID_T_NTOH(packet->data_.header_.sender_id_);
179 void encrypted_packet_set_sender_id(encrypted_packet_t* packet, sender_id_t sender_id)
184 packet->data_.header_.sender_id_ = SENDER_ID_T_HTON(sender_id);
187 mux_t encrypted_packet_get_mux(encrypted_packet_t* packet)
192 return MUX_T_NTOH(packet->data_.header_.mux_);
195 void encrypted_packet_set_mux(encrypted_packet_t* packet, mux_t mux)
200 packet->data_.header_.mux_ = MUX_T_HTON(mux);