diff options
author | Mathias Hall-Andersen <mathias@hall-andersen.dk> | 2018-02-04 16:08:26 +0100 |
---|---|---|
committer | Mathias Hall-Andersen <mathias@hall-andersen.dk> | 2018-02-04 16:08:26 +0100 |
commit | a0f54cbe5ac2cd8b8296c2c57c30029dd349cff0 (patch) | |
tree | 64574090d79ff3899c5c18e5268e450028e4656b /keypair.go | |
parent | 5871ec04deb8f4715cab37146940baa35c08cbee (diff) |
Align with go library layout
Diffstat (limited to 'keypair.go')
-rw-r--r-- | keypair.go | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/keypair.go b/keypair.go new file mode 100644 index 0000000..283cb92 --- /dev/null +++ b/keypair.go @@ -0,0 +1,44 @@ +package main + +import ( + "crypto/cipher" + "sync" + "time" +) + +/* Due to limitations in Go and /x/crypto there is currently + * no way to ensure that key material is securely ereased in memory. + * + * Since this may harm the forward secrecy property, + * we plan to resolve this issue; whenever Go allows us to do so. + */ + +type KeyPair struct { + send cipher.AEAD + receive cipher.AEAD + replayFilter ReplayFilter + sendNonce uint64 + isInitiator bool + created time.Time + localIndex uint32 + remoteIndex uint32 +} + +type KeyPairs struct { + mutex sync.RWMutex + current *KeyPair + previous *KeyPair + next *KeyPair // not yet "confirmed by transport" +} + +func (kp *KeyPairs) Current() *KeyPair { + kp.mutex.RLock() + defer kp.mutex.RUnlock() + return kp.current +} + +func (device *Device) DeleteKeyPair(key *KeyPair) { + if key != nil { + device.indices.Delete(key.localIndex) + } +} |