From 69f0fe67b63d90e523a5a1241fb1b46c2e8dbe03 Mon Sep 17 00:00:00 2001 From: "Jason A. Donenfeld" Date: Sun, 3 Mar 2019 04:04:41 +0100 Subject: global: begin modularization --- keypair.go | 50 -------------------------------------------------- 1 file changed, 50 deletions(-) delete mode 100644 keypair.go (limited to 'keypair.go') diff --git a/keypair.go b/keypair.go deleted file mode 100644 index af10a58..0000000 --- a/keypair.go +++ /dev/null @@ -1,50 +0,0 @@ -/* SPDX-License-Identifier: MIT - * - * Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved. - */ - -package main - -import ( - "crypto/cipher" - "golang.zx2c4.com/wireguard/replay" - "sync" - "time" -) - -/* Due to limitations in Go and /x/crypto there is currently - * no way to ensure that key material is securely ereased in memory. - * - * Since this may harm the forward secrecy property, - * we plan to resolve this issue; whenever Go allows us to do so. - */ - -type Keypair struct { - sendNonce uint64 - send cipher.AEAD - receive cipher.AEAD - replayFilter replay.ReplayFilter - isInitiator bool - created time.Time - localIndex uint32 - remoteIndex uint32 -} - -type Keypairs struct { - sync.RWMutex - current *Keypair - previous *Keypair - next *Keypair -} - -func (kp *Keypairs) Current() *Keypair { - kp.RLock() - defer kp.RUnlock() - return kp.current -} - -func (device *Device) DeleteKeypair(key *Keypair) { - if key != nil { - device.indexTable.Delete(key.localIndex) - } -} -- cgit v1.2.3-59-g8ed1b