n2n/include/header_encryption.h
Hamish Coleman 370ea9bd37
addressed all but one of the remaining compile warnings (#793)
* Fix the mismatched char, uint8_t warnings

* Ensure we leave room for zero termination and then ensure the string is terminated

* GCC has a warning if it thinks your could overflow your snprintf buffer, but dont check for said overflow
2021-09-16 14:45:46 +05:45

36 lines
1.5 KiB
C

/**
* (C) 2007-21 - ntop.org and contributors
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not see see <http://www.gnu.org/licenses/>
*
*/
int packet_header_decrypt (uint8_t packet[], uint16_t packet_len,
char *community_name,
he_context_t *ctx, he_context_t *ctx_iv,
uint64_t *stamp);
int packet_header_encrypt (uint8_t packet[], uint16_t header_len, uint16_t packet_len,
he_context_t *ctx, he_context_t *ctx_iv,
uint64_t stamp);
void packet_header_setup_key (const char *community_name,
he_context_t **ctx_static, he_context_t **ctx_dynamic,
he_context_t **ctx_iv_static, he_context_t **ctx_iv_dynamic);
void packet_header_change_dynamic_key (uint8_t *key_dynamic,
he_context_t **ctx_dynamic,
he_context_t **ctx_iv_dynamic);