2017-06-24 15:34:17 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/cipher"
|
2017-06-26 13:14:02 +02:00
|
|
|
"sync"
|
2017-06-27 17:33:06 +02:00
|
|
|
"time"
|
2017-06-24 15:34:17 +02:00
|
|
|
)
|
|
|
|
|
2017-09-20 09:26:08 +02:00
|
|
|
/* Due to limitations in Go and /x/crypto there is currently
|
|
|
|
* no way to ensure that key material is securely ereased in memory.
|
|
|
|
*
|
|
|
|
* Since this may harm the forward secrecy property,
|
|
|
|
* we plan to resolve this issue; whenever Go allows us to do so.
|
|
|
|
*/
|
2017-09-01 14:21:53 +02:00
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
type KeyPair struct {
|
2017-09-20 09:26:08 +02:00
|
|
|
send cipher.AEAD
|
|
|
|
receive cipher.AEAD
|
2017-07-10 12:09:19 +02:00
|
|
|
replayFilter ReplayFilter
|
|
|
|
sendNonce uint64
|
|
|
|
isInitiator bool
|
|
|
|
created time.Time
|
|
|
|
localIndex uint32
|
|
|
|
remoteIndex uint32
|
2017-06-26 13:14:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type KeyPairs struct {
|
2017-06-30 14:41:08 +02:00
|
|
|
mutex sync.RWMutex
|
|
|
|
current *KeyPair
|
|
|
|
previous *KeyPair
|
|
|
|
next *KeyPair // not yet "confirmed by transport"
|
2017-06-26 22:07:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (kp *KeyPairs) Current() *KeyPair {
|
|
|
|
kp.mutex.RLock()
|
|
|
|
defer kp.mutex.RUnlock()
|
|
|
|
return kp.current
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
func (device *Device) DeleteKeyPair(key *KeyPair) {
|
2018-02-02 17:24:29 +01:00
|
|
|
if key != nil {
|
|
|
|
device.indices.Delete(key.localIndex)
|
|
|
|
}
|
2017-08-14 17:09:25 +02:00
|
|
|
}
|