summaryrefslogtreecommitdiff
path: root/encryptedPacket.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'encryptedPacket.cpp')
-rw-r--r--encryptedPacket.cpp287
1 files changed, 287 insertions, 0 deletions
diff --git a/encryptedPacket.cpp b/encryptedPacket.cpp
new file mode 100644
index 0000000..0ac0ca9
--- /dev/null
+++ b/encryptedPacket.cpp
@@ -0,0 +1,287 @@
+/*
+ * anytun
+ *
+ * The secure anycast tunneling protocol (satp) defines a protocol used
+ * for communication between any combination of unicast and anycast
+ * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
+ * mode and allows tunneling of every ETHER TYPE protocol (e.g.
+ * ethernet, ip, arp ...). satp directly includes cryptography and
+ * message authentication based on the methodes used by SRTP. It is
+ * intended to deliver a generic, scaleable and secure solution for
+ * tunneling and relaying of packets of any protocol.
+ *
+ *
+ * Copyright (C) 2007 anytun.org <satp@wirdorange.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program (see the file COPYING included with this
+ * distribution); if not, write to the Free Software Foundation, Inc.,
+ * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+#include <stdexcept>
+#include <iostream>
+#include <arpa/inet.h>
+#include <cstdio> // for std::memcpy
+
+#include "encryptedPacket.h"
+#include "datatypes.h"
+#include "authTag.h"
+#include "log.h"
+
+
+EncryptedPacket::EncryptedPacket(u_int32_t max_payload_length)
+ : Buffer(max_payload_length + sizeof(struct HeaderStruct) + AUTHTAG_SIZE)
+{
+ header_ = reinterpret_cast<struct HeaderStruct*>(buf_);
+ auth_tag_ = NULL;
+ buf_ = buf_ + sizeof(struct HeaderStruct); // no authtag yet
+ length_ = length_ - sizeof(struct HeaderStruct);
+ size_ = max_payload_length + AUTHTAG_SIZE;
+}
+
+
+seq_nr_t EncryptedPacket::getSeqNr() const
+{
+ return SEQ_NR_T_NTOH(header_->seq_nr);
+}
+
+sender_id_t EncryptedPacket::getSenderId() const
+{
+ return SENDER_ID_T_NTOH(header_->sender_id);
+}
+
+mux_t EncryptedPacket::getMux() const
+{
+ return MUX_T_NTOH(header_->mux);
+}
+
+u_int32_t EncryptedPacket::getSize() const
+{
+ return size_;
+}
+
+void EncryptedPacket::setLength(u_int32_t length)
+{
+ if(length > size_)
+ throw std::out_of_range("can't set length greater then size ofsize of allocated memory");
+
+ length_ = length;
+}
+
+void EncryptedPacket::setSeqNr(seq_nr_t seq_nr)
+{
+ header_->seq_nr = SEQ_NR_T_HTON(seq_nr);
+}
+
+void EncryptedPacket::setSenderId(sender_id_t sender_id)
+{
+ header_->sender_id = SENDER_ID_T_HTON(sender_id);
+}
+
+void EncryptedPacket::setMux(mux_t mux)
+{
+ header_->mux = MUX_T_HTON(mux);
+}
+
+void EncryptedPacket::setHeader(seq_nr_t seq_nr, sender_id_t sender_id, mux_t mux)
+{
+ header_->seq_nr = SEQ_NR_T_HTON(seq_nr);
+ header_->sender_id = SENDER_ID_T_HTON(sender_id);
+ header_->mux = MUX_T_HTON(mux);
+}
+
+bool EncryptedPacket::hasAuthTag() const
+{
+ if( auth_tag_ == NULL )
+ return false;
+ return true;
+}
+
+void EncryptedPacket::withAuthTag(bool b)
+{
+ if( b && (auth_tag_ != NULL) )
+ throw std::runtime_error("packet already has auth tag function enabled");
+
+ if( b ) {
+ auth_tag_ = reinterpret_cast<AuthTag*>( buf_ + sizeof(struct HeaderStruct) );
+ buf_ = buf_ + AUTHTAG_SIZE;
+ length_ -= AUTHTAG_SIZE;
+ size_ -= AUTHTAG_SIZE;
+ } else {
+ buf_ = reinterpret_cast<u_int8_t*>( auth_tag_ );
+ length_ += AUTHTAG_SIZE;
+ size_ += AUTHTAG_SIZE;
+ auth_tag_ = NULL;
+ }
+}
+
+void EncryptedPacket::setAuthTag(AuthTag& tag)
+{
+ if( auth_tag_ == NULL )
+ throw std::runtime_error("auth tag not enabled");
+
+ if( tag == AuthTag(0) )
+ return;
+
+ if( tag.getLength() != AUTHTAG_SIZE )
+ throw std::length_error("authtag length mismatch with AUTHTAG_SIZE");
+
+ std::memcpy( auth_tag_, tag.getBuf(), AUTHTAG_SIZE );
+}
+
+AuthTag EncryptedPacket::getAuthTag() const
+{
+ if( auth_tag_ == NULL )
+ throw std::runtime_error("auth tag not enabled");
+
+ AuthTag at(AUTHTAG_SIZE);
+ std::memcpy(at, auth_tag_, AUTHTAG_SIZE );
+ return at;
+}
+
+
+//Packet& Packet::addHeader(seq_nr_t seq_nr, sender_id_t sender_id)
+//{
+// if(!has_header_)
+// {
+// if(sizeof(struct HeaderStruct) > resizeFront(length_ + sizeof(struct HeaderStruct)))
+// return *this;
+//
+// has_header_ = true;
+// }
+// struct HeaderStruct* header;
+// header = reinterpret_cast<struct HeaderStruct*>(buf_);
+// header->seq_nr = SEQ_NR_T_HTON(seq_nr);
+// header->sender_id = SENDER_ID_T_HTON(sender_id);
+// return *this;
+//}
+//
+//
+//bool Packet::hasPayloadType() const
+//{
+// return has_payload_type_;
+//}
+//
+//Packet& Packet::withPayloadType(bool b)
+//{
+// if(b && length_ >= sizeof(payload_type_t))
+// has_payload_type_ = true;
+// else
+// has_payload_type_ = false;
+//
+// return *this;
+//}
+//
+//payload_type_t Packet::getPayloadType() const
+//{
+// if(!has_payload_type_)
+// return 0;
+//
+// if((!has_auth_tag_ && length_ < sizeof(payload_type_t)) ||
+// (has_auth_tag_ && length_ < (sizeof(payload_type_t) + AUTHTAG_SIZE)))
+// return 0;
+//
+// payload_type_t* payload_type;
+//
+// if(!has_auth_tag_)
+// payload_type = reinterpret_cast<payload_type_t*>(buf_ + length_ - sizeof(payload_type_t));
+// else
+// payload_type = reinterpret_cast<payload_type_t*>(buf_ + length_ - sizeof(payload_type_t) - AUTHTAG_SIZE);
+// return PAYLOAD_TYPE_T_NTOH(*payload_type);
+//}
+//
+//Packet& Packet::addPayloadType(payload_type_t payload_type)
+//{
+// if(has_auth_tag_)
+// throw std::runtime_error("can't add payload_type with existing auth_tag");
+//
+// if(!has_payload_type_)
+// {
+// u_int32_t new_length = length_ + sizeof(payload_type_t);
+// if(new_length > resizeBack(new_length))
+// return *this;
+//
+// has_payload_type_ = true;
+// }
+// payload_type_t* payload_type_ptr;
+// payload_type_ptr = reinterpret_cast<payload_type_t*>(buf_ + length_ - sizeof(payload_type_t));
+// *payload_type_ptr = PAYLOAD_TYPE_T_HTON(payload_type);
+// return *this;
+//}
+//
+//Packet& Packet::removePayloadType()
+//{
+// if(has_auth_tag_)
+// throw std::runtime_error("can't remove payload_type with existing auth_tag");
+//
+// if(!has_payload_type_)
+// return *this;
+//
+// if(length_ >= sizeof(payload_type_t))
+// resizeBack(length_ - sizeof(payload_type_t));
+//
+// has_payload_type_ = false;
+//
+// return *this;
+//}
+//
+//
+//
+//
+//AuthTag Packet::getAuthTag() const
+//{
+// if(!has_auth_tag_)
+// return AuthTag(0);
+//
+// if(length_ < AUTHTAG_SIZE)
+// return AuthTag(0);
+//
+// //AuthTag* auth_tag;
+// //auth_tag = reinterpret_cast<AuthTag*>(buf_ + length_ - AUTHTAG_SIZE);
+// //return AUTH_TAG_T_NTOH(*auth_tag);
+// AuthTag auth_tag;
+// auth_tag = AuthTag(buf_ + length_ - AUTHTAG_SIZE, AUTHTAG_SIZE);
+// return auth_tag;
+//}
+//
+//Packet& Packet::addAuthTag(AuthTag auth_tag)
+//{
+// if(!has_auth_tag_)
+// {
+// u_int32_t new_length = length_ + auth_tag.getLength();
+// if(new_length > resizeBack(new_length))
+// return *this;
+//
+// has_auth_tag_ = true;
+// }
+//
+// AuthTag* auth_tag_ptr;
+// auth_tag_ptr = reinterpret_cast<AuthTag*>(buf_ + length_ - auth_tag.getLength());
+// std::memcpy(auth_tag_ptr, auth_tag.getBuf(), auth_tag.getLength());
+//
+// return *this;
+//}
+//
+//Packet& Packet::removeAuthTag()
+//{
+// if(!has_auth_tag_)
+// return *this;
+//
+// if(length_ >= AUTHTAG_SIZE)
+// resizeBack(length_ - AUTHTAG_SIZE);
+//
+// has_auth_tag_ = false;
+//
+// return *this;
+//}
+//