Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
/*
* @author STF 276
* @version $Id$
* @desc This module specifies functions definitions
* based on the IPv6 meta message type.
*
*/
module LibIpv6_Interface_Functions {
//LibCommon
import from LibCommon_BasicTypesAndValues all;
import from LibCommon_DataStrings all;
import from LibCommon_VerdictControl { type FncRetCode };
//LibIpv6
import from LibIpv6_Interface_TypesAndValues all;
import from LibIpv6_Interface_Templates all;
import from LibIpv6_ModuleParameters all;
import from LibIpv6_ExternalFunctions all;
import from LibIpv6_CommonRfcs_Functions all;
import from LibIpv6_CommonRfcs_TypesAndValues all;
group rfc2460Root_Functions {
group ipv6Packets {
/*
* @desc This sends a General IPv6 packet
* from an IPv6 node to any NUT.
* A General IPv6 packet is used in the case where only Extension headers
* need to be sent.
* @remark Time limit is defined by module parameter PX_TAC (see comp type)
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendGeneralIpv6(template Ipv6Packet p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var Ipv6Packet v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendGeneralIpv6: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendGeneralIpv6
group extHdrFns {
/*
* @desc This goes through the extension header list and calculates length, checksum
* and other specific functions of the different extension headers
* @param p_srcAddr Source Address of IPv6 packet
* @param p_dstAddr Dst Address of IPv6 packet
* @param p_extHdrList Extension Header List
* @return execution status
*/
function f_setExtensionHeaders( inout ExtensionHeaderList p_extHdrList,
in Ipv6Address p_srcAddr,
in Ipv6Address p_dstAddr,
in Ipv6Packet p_ipv6Packet)
runs on LibIpv6Node
return FncRetCode {
var UInt8 i;
var Ipv6Address v_homeAddress := c_16ZeroBytes;
var UInt8 v_nrOfTunnelHdr := 0;
for (i:=0; i<sizeof(p_extHdrList);i:=i+1) {
if (ischosen(p_extHdrList[i].mipHeader)) {
if (f_isPresentHomeAddressOption(p_extHdrList, v_homeAddress) == e_success) {
f_setMipHeader( v_homeAddress,
p_dstAddr,
p_extHdrList[i].mipHeader,
p_ipv6Packet);
}
else if (f_isPresentRoutingHeaderType2(p_extHdrList, v_homeAddress) == e_success) {
f_setMipHeader( p_srcAddr,
v_homeAddress,
p_extHdrList[i].mipHeader,
p_ipv6Packet);
}
else {
f_setMipHeader( p_srcAddr,
p_dstAddr,
p_extHdrList[i].mipHeader,
p_ipv6Packet);
}
}
else if (ischosen(p_extHdrList[i].tunneledIpv6)) {
v_nrOfTunnelHdr := v_nrOfTunnelHdr + 1;
p_extHdrList[i].tunneledIpv6.payloadLength := fx_tunnelledPayloadLength(p_ipv6Packet, v_nrOfTunnelHdr);
}
/* else if (ischosen(p_extHdrList[i].)) {
f_setSecurityHdr();
} */
}//end for
return e_success;
}//end f_setExtensionHeaders
}//end group extHdrFns
} //end group ipv6Packets
}//end group rfc2460Root_Functions
group rfc3775Mipv6_ExtHdrFunctions {
/*
* @desc This goes through the Mip header and calculates length, checksum
* and other specific functions of the different messages.
* This function is used when sending messages.
* @param p_msg ExtensionHeaderList to be treated
* @return execution status
*/
function f_setMipHeader(in Ipv6Address p_srcAddr,
in Ipv6Address p_dstAddr,
inout MipHeader p_mipHeader,
in Ipv6Packet p_ipv6Packet)
runs on LibIpv6Node
return FncRetCode {
var MipHeader v_mipHeader := valueof(p_mipHeader);
var Ipv6Address v_homeAddress := c_16ZeroBytes ;
//if (ischosen(p_mipHeader.mipMessage.homeTestInit)) {
//calc homeInitCookie
//p_mipHeader.mipMessage.homeTestInit.homeInitCookie := f_createInitCookie();
//}
//else if (ischosen(p_mipHeader.mipMessage.homeTest)) {//CNSimu sends this message
//}
//else if (ischosen(p_mipHeader.mipMessage.careOfTestInit) and (PX_TEST_IPSEC == true)) {
//SMU TODO
//}
//else if (ischosen(p_mipHeader.mipMessage.careOfTest) and (PX_TEST_IPSEC == true)) {
//SMU TODO
//}
if (ischosen(p_mipHeader.mipMessage.bindingUpdateMsg)) {//Authorization data is only needed for BU sent to CN=IUT
var UInt8 v_position := 0;
//Concept of including bindingAuthentication
// specifiy on template level all options
// 1) if authenticator == c_20ZeroBytes then value is calculated in f_setMipHeader
// 2) if authenticator != c_20ZeroBytes then no value is calculated in f_setMipHeader,
// because it's assumed that the correct value was set on template level
// 3) same applies to nonceIndex etc
if (f_isPresentNonceIndices(p_mipHeader.mipMessage.bindingUpdateMsg, v_position) == e_success
and vc_mipSec.mnSimuParams.receivedHomeNonceIndex != c_uInt16Zero
and vc_mipSec.mnSimuParams.receivedCareOfNonceIndex != c_uInt16Zero) {
p_mipHeader.mipMessage.bindingUpdateMsg.mipOptions[v_position].mipOptNonceIndices.homeNonceIndex
:= vc_mipSec.mnSimuParams.receivedHomeNonceIndex;
p_mipHeader.mipMessage.bindingUpdateMsg.mipOptions[v_position].mipOptNonceIndices.careOfNonceIndex
:= vc_mipSec.mnSimuParams.receivedCareOfNonceIndex;
}
else {
log("f_setMipHeader: Error: NonceIndices included in Binding Update, but mnSimuParams.receivedCareOfNonceIndex/receivedHomeNonceIndex not initialized");
return e_error;
}
if (f_isPresentBindingAuthorizationDataOption(p_mipHeader.mipMessage.bindingUpdateMsg, v_position) == e_success
and vc_mipSec.mnSimuParams.receivedHomeKeygenToken != c_64ZeroBits
and vc_mipSec.mnSimuParams.receivedCareOfKeygenToken != c_64ZeroBits) {
vc_mipSec.mnSimuParams.kbm := fx_integrity( e_sha1_96, c_1ZeroByte,
bit2oct(vc_mipSec.mnSimuParams.receivedHomeKeygenToken)
& bit2oct(vc_mipSec.mnSimuParams.receivedCareOfKeygenToken));
var Oct20 v_bindingAuthenticator := fx_integrity( e_hmac_sha1_96, vc_mipSec.mnSimuParams.kbm,
p_srcAddr//careOfaddr
& p_dstAddr//cnAddr
& fx_mipHdrToOct(p_mipHeader) );
p_mipHeader.mipMessage.bindingUpdateMsg.mipOptions[v_position].mipBindingAuthorizationData := {
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
mipOptType := 5,
mipOptLen := lengthof(v_bindingAuthenticator),
authenticator := v_bindingAuthenticator
}
}
else {
log("f_setMipHeader: Error: BindingAuthorizationDataOption included in Binding Update, but receivedHomeKeygenToken/receivedCareOfKeygenToken not initialized");
return e_error;
}
}
// else if (ischosen(p_mipHeader.mipMessage.bindingAck) and (PX_TEST_IPSEC == true)) {
//SMU TODO
//}
//calc mipHeaderLen
p_mipHeader.headerLen := fx_mipHeaderLength(p_mipHeader);
// modified by PK to easily send packets with wrong checksum
//set mipChecksum to zero
//p_mipHeader.checksum := c_2ZeroBytes;
//calc mipChecksum
p_mipHeader.checksum := fx_mipHeaderChecksum ( p_srcAddr,
p_dstAddr,
p_mipHeader);
return e_success;
}
/*
* @desc This goes through the BindingUpdate and
* checks if a NonceIndicesOption is present.
* @param p_bindingUpdate Binding Update to be treated
* @param v_position Position of the NonceIndicesOption in the MipOptionList
* @return execution status
*/
function f_isPresentNonceIndices( in BindingUpdateMsg p_bindingUpdate,
inout UInt8 v_position)
runs on LibIpv6Node
return FncRetCode {
var FncRetCode v_ret := e_error;
var UInt8 i;
//select ext hdrs that need special calculation
for (i:=0; i<sizeof(p_bindingUpdate.mipOptions) and (v_ret != e_success); i:=i+1) {
if (ischosen(p_bindingUpdate.mipOptions[i].mipOptNonceIndices)) {
v_position := i;
v_ret := e_success;
}
}
return v_ret;
}//end function f_isPresentNonceIndices
/*
* @desc This goes through the BindingUpdate and
* checks if a AuthorizationDataOption is present.
* @param p_bindingUpdate Binding Update to be treated
* @param v_position Position of the AuthorizationDataOption in the MipOptionList
* @return execution status
*/
function f_isPresentBindingAuthorizationDataOption( in BindingUpdateMsg p_bindingUpdate,
inout UInt8 v_position)
runs on LibIpv6Node
return FncRetCode {
var FncRetCode v_ret := e_error;
var UInt8 i;
//select ext hdrs that need special calculation
for (i:=0; i<sizeof(p_bindingUpdate.mipOptions) and (v_ret != e_success); i:=i+1) {
if (ischosen(p_bindingUpdate.mipOptions[i].mipBindingAuthorizationData)) {
v_position := i;
v_ret := e_success;
}
}
return v_ret;
}//end function f_isPresentBindingAuthorizationDataOption
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
/*
* @desc This sends a IPv6 packet with MipExtHdr - Binding Update
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendBU(template BindingUpdate p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var BindingUpdate v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendBU: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendBU
/*
* @desc This sends a IPv6 packet with MipExtHdr - Binding Acknowledgement
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendBA(template BindingAcknowledgement p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var BindingAcknowledgement v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendBA: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendBA
/*
* @desc This sends a IPv6 packet with MipExtHdr - Binding Error
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendBE(template BindingError p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var BindingError v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendBE: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendBE
/*
* @desc This sends a IPv6 packet with MipExtHdr - Binding Refresh Request
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendBR(template BindingRefreshRequest p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var BindingRefreshRequest v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendBR: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendBR
/*
* @desc This sends a IPv6 packet with MipExtHdr - Home Test
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendHot(template HomeTest p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var HomeTest v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendHot: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendHot
/*
* @desc This sends a IPv6 packet with MipExtHdr - Home Test Init
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendHoti(template HomeTestInit p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var HomeTestInit v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendHoti: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendHoti
/*
* @desc This sends a IPv6 packet with MipExtHdr - CareOfTestInit
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendCoti(template CareOfTestInit p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var CareOfTestInit v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendCoti: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendCoti
/*
* @desc This sends a IPv6 packet with MipExtHdr - CareOfTest
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendCot(template CareOfTest p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var CareOfTest v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendCoti: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendCot
/*
* @desc This sends a IPv6 packet with MipExtHdr - Fast Nbr Adv
* from an IPv6 node to any NUT.
*
* @remark
* @param p_msg MIPHeader to be sent
* @return execution status
*/
function f_sendFastNbrAdv(template FastNbrAdv p_msg)
runs on LibIpv6Node
return FncRetCode {
//Variables
var FastNbrAdv v_ipPkt;
v_ipPkt := valueof(p_msg);
//set extensionHeaders
if (ispresent(v_ipPkt.extHdrList)) {
if(f_setExtensionHeaders( v_ipPkt.extHdrList,
v_ipPkt.ipv6Hdr.sourceAddress,
v_ipPkt.ipv6Hdr.destinationAddress,
v_ipPkt) != e_success) {
log(" **** f_sendFastNbrAdv: Error when calculating length of extension headers ****");
return e_error;
}
}
//calc payloadLen
v_ipPkt.ipv6Hdr.payloadLength := fx_payloadLength (v_ipPkt);
//send
ipPort.send(v_ipPkt);
return e_success;
}//end f_sendFastNbrAdv
}//end group rfc3775Mipv6_ExtHdrFunctions
group rfc4303Esp_ExtHdrFunctions {
function f_initParams()
runs on LibIpv6Node {
vc_sad[0] := {
spi := PX_SPI/*f_createSpi()*/,
seqNr := c_uInt32Zero,
// AH Integrity
ahIntegrityAlgo := PX_INTEGRITY_ALGO,
ahIntegrityKey := PX_INTEGRITY_KEY/*f_createSecretKey()*/,
// ESP encryption
espEncryptionAlgo := PX_ENCRYPTION_ALGO,
espEncryptionKey := PX_ESP_ENCR_KEY/*f_createSecretKey()*/,
// ESP integrity
espIntegrityAlgo := PX_INTEGRITY_ALGO,
espIntegrityKey := PX_INTEGRITY_KEY/*f_createSecretKey()*/,
// Combined mode
espCombinedModeAlgo := PX_COMBINED_MODE_ALGO,
espCombinedModeKey := PX_COMBINED_MODE_KEY/*f_createSecretKey()*/,
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
// Protocol mode
ipSecProtocolMode := PX_IP_SEC_PROTOCOL_MODE
}
}//end f_initParams
/*
* @desc This generates Security Parameters Index
* @return Security Parameters Index
*/
function f_createSpi()
runs on LibIpv6Node
return UInt32 {
var Oct4 v_spi := int2oct(float2int(int2float(20000-5000)*rnd())+5000, 4);
return oct2int(v_spi);
}//end f_createSpi
/*
* @desc This generates a secret key
* @return Secret key
*/
function f_createSecretKey()
runs on LibIpv6Node
return octetstring {
var Oct20 v_key := int2oct(float2int(int2float(20000-5000)*rnd())+5000, 20);
return v_key;
}//end f_createSecretKey
// function f_buildEspExtHdr(
// in Sa p_sa,
// in PlaintextData p_plaintextData,
// out ExtensionHeader p_extensionHeader)
// runs on LibIpv6Node
// return FncRetCode {
// // Variables
// var EncryptResult v_encryptResult;
/// var IntegrityResult v_integrityResult;
// var FncRetCode v_ret := e_error;
// var octetstring v_padding := c_1ZeroByte;
//TODO check this
/*
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
// Encrypt espPayloadData
v_ret := fx_encrypt( p_sa.ipSecProtocolMode,
p_sa.espEncryptionAlgo,
p_sa.espEncryptionKey,
p_plaintextData,
v_encryptResult);
if ( v_ret != e_success ) {return v_ret;}
// Fill EspExtHdr
var EspHeader v_espHdr := valueof(m_espHdr_dummy);
// Header
v_espHdr.securityParametersIndex := p_sa.securityParametersIndex;
v_espHdr.sequenceNumber := p_sa.sequenceNumber;
// Payload
if (ispresent(v_encryptResult.iv)) {
v_espHdr.iv := v_encryptResult.iv;
}
// Encrypted payload is assigend for integrity calculation.
// Afterwards plaintext will be assigned
v_espHdr.espPayloadData.ciphertextData := v_encryptResult.ciphertextData;
if (ispresent(v_encryptResult.tfcPadding)) {
v_espHdr.tfcPadding := v_encryptResult.tfcPadding;
}
// Byte Align
v_ret := fx_byteAlignEspHeader(4, v_espHdr, v_padding);
if ( v_ret != e_success ) {return v_ret;}
if (v_padding != c_1ZeroByte) {
v_espHdr.padding := v_padding;
v_espHdr.padLength := lengthof(v_padding);
}
// Integrity
v_ret := fx_integrityEspHdr( p_sa.espIntegrityAlgo,
p_sa.espIntegrityKey,
v_espHdr,
v_integrityResult);
if ( v_ret != e_success ) {return v_ret;}
if (ispresent(v_integrityResult.icv)) {
v_espHdr.icv := v_integrityResult.icv;
}
// Assign Plaintext EspPayload
v_espHdr.espPayloadData.plaintextData := p_plaintextData;
p_extensionHeader := {espHeader := v_espHdr};