aboutsummaryrefslogtreecommitdiffstats
path: root/keypair.go
diff options
context:
space:
mode:
authorMathias Hall-Andersen <mathias@hall-andersen.dk>2018-02-04 16:08:26 +0100
committerMathias Hall-Andersen <mathias@hall-andersen.dk>2018-02-04 16:08:26 +0100
commita0f54cbe5ac2cd8b8296c2c57c30029dd349cff0 (patch)
tree64574090d79ff3899c5c18e5268e450028e4656b /keypair.go
parentFixed tests (diff)
downloadwireguard-go-a0f54cbe5ac2cd8b8296c2c57c30029dd349cff0.tar.xz
wireguard-go-a0f54cbe5ac2cd8b8296c2c57c30029dd349cff0.zip
Align with go library layout
Diffstat (limited to 'keypair.go')
-rw-r--r--keypair.go44
1 files changed, 44 insertions, 0 deletions
diff --git a/keypair.go b/keypair.go
new file mode 100644
index 0000000..283cb92
--- /dev/null
+++ b/keypair.go
@@ -0,0 +1,44 @@
+package main
+
+import (
+ "crypto/cipher"
+ "sync"
+ "time"
+)
+
+/* Due to limitations in Go and /x/crypto there is currently
+ * no way to ensure that key material is securely ereased in memory.
+ *
+ * Since this may harm the forward secrecy property,
+ * we plan to resolve this issue; whenever Go allows us to do so.
+ */
+
+type KeyPair struct {
+ send cipher.AEAD
+ receive cipher.AEAD
+ replayFilter ReplayFilter
+ sendNonce uint64
+ isInitiator bool
+ created time.Time
+ localIndex uint32
+ remoteIndex uint32
+}
+
+type KeyPairs struct {
+ mutex sync.RWMutex
+ current *KeyPair
+ previous *KeyPair
+ next *KeyPair // not yet "confirmed by transport"
+}
+
+func (kp *KeyPairs) Current() *KeyPair {
+ kp.mutex.RLock()
+ defer kp.mutex.RUnlock()
+ return kp.current
+}
+
+func (device *Device) DeleteKeyPair(key *KeyPair) {
+ if key != nil {
+ device.indices.Delete(key.localIndex)
+ }
+}