4 * uAnytun is a tiny implementation of SATP. Unlike Anytun which is a full
5 * featured implementation uAnytun has no support for multiple connections
6 * or synchronisation. It is a small single threaded implementation intended
7 * to act as a client on small platforms.
8 * The secure anycast tunneling protocol (satp) defines a protocol used
9 * for communication between any combination of unicast and anycast
10 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
11 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
12 * ethernet, ip, arp ...). satp directly includes cryptography and
13 * message authentication based on the methods used by SRTP. It is
14 * intended to deliver a generic, scaleable and secure solution for
15 * tunneling and relaying of packets of any protocol.
18 * Copyright (C) 2007-2014 Christian Pointner <equinox@anytun.org>
20 * This file is part of uAnytun.
22 * uAnytun is free software: you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License as published by
24 * the Free Software Foundation, either version 3 of the License, or
27 * uAnytun is distributed in the hope that it will be useful,
28 * but WITHOUT ANY WARRANTY; without even the implied warranty of
29 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
30 * GNU General Public License for more details.
32 * You should have received a copy of the GNU General Public License
33 * along with uAnytun. If not, see <http://www.gnu.org/licenses/>.
35 * In addition, as a special exception, the copyright holders give
36 * permission to link the code of portions of this program with the
37 * OpenSSL library under certain conditions as described in each
38 * individual source file, and distribute linked combinations
40 * You must obey the GNU General Public License in all respects
41 * for all of the code used other than OpenSSL. If you modify
42 * file(s) with this exception, you may extend this exception to your
43 * version of the file(s), but you are not obligated to do so. If you
44 * do not wish to do so, delete this exception statement from your
45 * version. If you delete this exception statement from all source
46 * files in the program, then also delete it here.
49 #include "datatypes.h"
51 #include "encrypted_packet.h"
56 void encrypted_packet_init(encrypted_packet_t* packet, u_int32_t auth_tag_length)
61 memset (packet, 0, sizeof(*packet));
62 if(auth_tag_length > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t)))
63 packet->auth_tag_length_ = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t);
65 packet->auth_tag_length_ = auth_tag_length;
68 u_int32_t encrypted_packet_get_minimum_length(encrypted_packet_t* packet)
73 return (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
76 u_int8_t* encrypted_packet_get_packet(encrypted_packet_t* packet)
81 return packet->data_.buf_;
84 u_int32_t encrypted_packet_get_length(encrypted_packet_t* packet)
89 return (packet->payload_length_ + sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
92 void encrypted_packet_set_length(encrypted_packet_t* packet, u_int32_t len)
97 if(len > ENCRYPTED_PACKET_SIZE_MAX)
98 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
99 else if(len < (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_))
102 len -= (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
104 packet->payload_length_ = len;
107 u_int8_t* encrypted_packet_get_payload(encrypted_packet_t* packet)
109 if(!packet || !packet->payload_length_)
112 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t));
115 u_int32_t encrypted_packet_get_payload_length(encrypted_packet_t* packet)
120 return packet->payload_length_;
123 void encrypted_packet_set_payload_length(encrypted_packet_t* packet, u_int32_t len)
128 if(len > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_))
129 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
131 packet->payload_length_ = len;
134 u_int8_t* encrypted_packet_get_auth_portion(encrypted_packet_t* packet)
139 return packet->data_.buf_;
142 u_int32_t encrypted_packet_get_auth_portion_length(encrypted_packet_t* packet)
147 return packet->payload_length_ + sizeof(encrypted_packet_header_t);
151 u_int8_t* encrypted_packet_get_auth_tag(encrypted_packet_t* packet)
153 if(!packet || !packet->auth_tag_length_)
156 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t) + packet->payload_length_);
159 u_int32_t encrypted_packet_get_auth_tag_length(encrypted_packet_t* packet)
164 return packet->auth_tag_length_;
168 seq_nr_t encrypted_packet_get_seq_nr(encrypted_packet_t* packet)
173 return SEQ_NR_T_NTOH(packet->data_.header_.seq_nr_);
176 void encrypted_packet_set_seq_nr(encrypted_packet_t* packet, seq_nr_t seq_nr)
181 packet->data_.header_.seq_nr_ = SEQ_NR_T_HTON(seq_nr);
184 sender_id_t encrypted_packet_get_sender_id(encrypted_packet_t* packet)
189 return SENDER_ID_T_NTOH(packet->data_.header_.sender_id_);
192 void encrypted_packet_set_sender_id(encrypted_packet_t* packet, sender_id_t sender_id)
197 packet->data_.header_.sender_id_ = SENDER_ID_T_HTON(sender_id);
200 mux_t encrypted_packet_get_mux(encrypted_packet_t* packet)
205 return MUX_T_NTOH(packet->data_.header_.mux_);
208 void encrypted_packet_set_mux(encrypted_packet_t* packet, mux_t mux)
213 packet->data_.header_.mux_ = MUX_T_HTON(mux);