/* * ľAnytun * * ľAnytun is a tiny implementation of SATP. Unlike Anytun which is a full * featured implementation ľAnytun has no support for multiple connections * or synchronisation. It is a small single threaded implementation intended * to act as a client on small platforms. * The secure anycast tunneling protocol (satp) defines a protocol used * for communication between any combination of unicast and anycast * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel * mode and allows tunneling of every ETHER TYPE protocol (e.g. * ethernet, ip, arp ...). satp directly includes cryptography and * message authentication based on the methodes used by SRTP. It is * intended to deliver a generic, scaleable and secure solution for * tunneling and relaying of packets of any protocol. * * * Copyright (C) 2007-2008 Christian Pointner * * This file is part of ľAnytun. * * ľAnytun is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License version 3 as * published by the Free Software Foundation. * * ľAnytun is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with ľAnytun. If not, see . */ #include "datatypes.h" #include "encrypted_packet.h" #include #include void encrypted_packet_init(encrypted_packet_t* packet) { if(!packet) return; memset (packet, 0, sizeof(*packet)); } u_int8_t* encrypted_packet_get_packet(encrypted_packet_t* packet) { if(!packet) return NULL; return packet->data_.buf_; } u_int32_t encrypted_packet_get_length(encrypted_packet_t* packet) { if(!packet) return 0; return (packet->payload_length_ + sizeof(encrypted_packet_header_t)); } void encrypted_packet_set_length(encrypted_packet_t* packet, u_int32_t len) { if(!packet) return; if(len > ENCRYPTED_PACKET_SIZE_MAX) len = ENCRYPTED_PACKET_SIZE_MAX - sizeof(encrypted_packet_header_t); else if(len < sizeof(encrypted_packet_header_t)) len = 0; else len -= sizeof(encrypted_packet_header_t); packet->payload_length_ = len; } u_int8_t* encrypted_packet_get_payload(encrypted_packet_t* packet) { if(!packet) return NULL; return (packet->data_.buf_ + sizeof(encrypted_packet_header_t)); } u_int32_t encrypted_packet_get_payload_length(encrypted_packet_t* packet) { if(!packet) return 0; return packet->payload_length_; } seq_nr_t encrypted_packet_get_seq_nr(encrypted_packet_t* packet) { if(!packet) return 0; return SEQ_NR_T_NTOH(packet->data_.header_.seq_nr_); } void encrypted_packet_set_seq_nr(encrypted_packet_t* packet, seq_nr_t seq_nr) { if(!packet) return; packet->data_.header_.seq_nr_ = SEQ_NR_T_HTON(seq_nr); } sender_id_t encrypted_packet_get_sender_id(encrypted_packet_t* packet) { if(!packet) return 0; return SENDER_ID_T_NTOH(packet->data_.header_.sender_id_); } void encrypted_packet_set_sender_id(encrypted_packet_t* packet, sender_id_t sender_id) { if(!packet) return; packet->data_.header_.sender_id_ = SENDER_ID_T_HTON(sender_id); } mux_t encrypted_packet_get_mux(encrypted_packet_t* packet) { if(!packet) return 0; return MUX_T_NTOH(packet->data_.header_.mux_); } void encrypted_packet_set_mux(encrypted_packet_t* packet, mux_t mux) { if(!packet) return; packet->data_.header_.mux_ = MUX_T_HTON(mux); }