4 * uAnytun is a tiny implementation of SATP. Unlike Anytun which is a full
5 * featured implementation uAnytun has no support for multiple connections
6 * or synchronisation. It is a small single threaded implementation intended
7 * to act as a client on small platforms.
8 * The secure anycast tunneling protocol (satp) defines a protocol used
9 * for communication between any combination of unicast and anycast
10 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
11 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
12 * ethernet, ip, arp ...). satp directly includes cryptography and
13 * message authentication based on the methodes used by SRTP. It is
14 * intended to deliver a generic, scaleable and secure solution for
15 * tunneling and relaying of packets of any protocol.
18 * Copyright (C) 2007-2008 Christian Pointner <equinox@anytun.org>
20 * This file is part of uAnytun.
22 * uAnytun is free software: you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License version 3 as
24 * published by the Free Software Foundation.
26 * uAnytun is distributed in the hope that it will be useful,
27 * but WITHOUT ANY WARRANTY; without even the implied warranty of
28 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
29 * GNU General Public License for more details.
31 * You should have received a copy of the GNU General Public License
32 * along with uAnytun. If not, see <http://www.gnu.org/licenses/>.
35 #include "datatypes.h"
37 #include "encrypted_packet.h"
42 void encrypted_packet_init(encrypted_packet_t* packet, u_int32_t auth_tag_length)
47 memset (packet, 0, sizeof(*packet));
48 if(auth_tag_length > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t)))
49 packet->auth_tag_length_ = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t);
51 packet->auth_tag_length_ = auth_tag_length;
54 u_int32_t encrypted_packet_get_minimum_length(encrypted_packet_t* packet)
59 return (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
62 u_int8_t* encrypted_packet_get_packet(encrypted_packet_t* packet)
67 return packet->data_.buf_;
70 u_int32_t encrypted_packet_get_length(encrypted_packet_t* packet)
75 return (packet->payload_length_ + sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
78 void encrypted_packet_set_length(encrypted_packet_t* packet, u_int32_t len)
83 if(len > ENCRYPTED_PACKET_SIZE_MAX)
84 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
85 else if(len < (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_))
88 len -= (sizeof(encrypted_packet_header_t) + packet->auth_tag_length_);
90 packet->payload_length_ = len;
93 u_int8_t* encrypted_packet_get_payload(encrypted_packet_t* packet)
95 if(!packet || !packet->payload_length_)
98 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t));
101 u_int32_t encrypted_packet_get_payload_length(encrypted_packet_t* packet)
106 return packet->payload_length_;
109 void encrypted_packet_set_payload_length(encrypted_packet_t* packet, u_int32_t len)
114 if(len > (ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_))
115 len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t) - packet->auth_tag_length_;
117 packet->payload_length_ = len;
120 u_int8_t* encrypted_packet_get_auth_portion(encrypted_packet_t* packet)
125 return packet->data_.buf_;
128 u_int32_t encrypted_packet_get_auth_portion_length(encrypted_packet_t* packet)
133 return packet->payload_length_ + sizeof(encrypted_packet_header_t);
137 u_int8_t* encrypted_packet_get_auth_tag(encrypted_packet_t* packet)
139 if(!packet || !packet->auth_tag_length_)
142 return (packet->data_.buf_ + sizeof(encrypted_packet_header_t) + packet->payload_length_);
145 u_int32_t encrypted_packet_get_auth_tag_length(encrypted_packet_t* packet)
150 return packet->auth_tag_length_;
154 seq_nr_t encrypted_packet_get_seq_nr(encrypted_packet_t* packet)
159 return SEQ_NR_T_NTOH(packet->data_.header_.seq_nr_);
162 void encrypted_packet_set_seq_nr(encrypted_packet_t* packet, seq_nr_t seq_nr)
167 packet->data_.header_.seq_nr_ = SEQ_NR_T_HTON(seq_nr);
170 sender_id_t encrypted_packet_get_sender_id(encrypted_packet_t* packet)
175 return SENDER_ID_T_NTOH(packet->data_.header_.sender_id_);
178 void encrypted_packet_set_sender_id(encrypted_packet_t* packet, sender_id_t sender_id)
183 packet->data_.header_.sender_id_ = SENDER_ID_T_HTON(sender_id);
186 mux_t encrypted_packet_get_mux(encrypted_packet_t* packet)
191 return MUX_T_NTOH(packet->data_.header_.mux_);
194 void encrypted_packet_set_mux(encrypted_packet_t* packet, mux_t mux)
199 packet->data_.header_.mux_ = MUX_T_HTON(mux);