2019-01-02 01:55:51 +01:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 15:04:00 +02:00
|
|
|
*
|
2021-01-28 17:52:15 +01:00
|
|
|
* Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved.
|
2018-05-03 15:04:00 +02:00
|
|
|
*/
|
|
|
|
|
2019-03-03 04:04:41 +01:00
|
|
|
package device
|
2017-06-24 15:34:17 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/cipher"
|
2017-06-26 13:14:02 +02:00
|
|
|
"sync"
|
2020-05-02 09:30:23 +02:00
|
|
|
"sync/atomic"
|
2017-06-27 17:33:06 +02:00
|
|
|
"time"
|
2020-05-02 09:30:23 +02:00
|
|
|
"unsafe"
|
2019-05-14 09:09:52 +02:00
|
|
|
|
2021-08-16 02:43:17 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/replay"
|
2017-06-24 15:34:17 +02:00
|
|
|
)
|
|
|
|
|
2017-09-20 09:26:08 +02:00
|
|
|
/* Due to limitations in Go and /x/crypto there is currently
|
|
|
|
* no way to ensure that key material is securely ereased in memory.
|
|
|
|
*
|
|
|
|
* Since this may harm the forward secrecy property,
|
|
|
|
* we plan to resolve this issue; whenever Go allows us to do so.
|
|
|
|
*/
|
2017-09-01 14:21:53 +02:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
type Keypair struct {
|
2020-12-16 00:02:13 +01:00
|
|
|
sendNonce uint64 // accessed atomically
|
2017-09-20 09:26:08 +02:00
|
|
|
send cipher.AEAD
|
|
|
|
receive cipher.AEAD
|
2020-09-09 20:06:44 +02:00
|
|
|
replayFilter replay.Filter
|
2017-07-10 12:09:19 +02:00
|
|
|
isInitiator bool
|
|
|
|
created time.Time
|
|
|
|
localIndex uint32
|
|
|
|
remoteIndex uint32
|
2017-06-26 13:14:02 +02:00
|
|
|
}
|
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
type Keypairs struct {
|
2019-01-03 19:04:00 +01:00
|
|
|
sync.RWMutex
|
2018-05-07 22:27:03 +02:00
|
|
|
current *Keypair
|
|
|
|
previous *Keypair
|
2018-05-13 19:33:41 +02:00
|
|
|
next *Keypair
|
2017-06-26 22:07:29 +02:00
|
|
|
}
|
|
|
|
|
2020-05-02 09:30:23 +02:00
|
|
|
func (kp *Keypairs) storeNext(next *Keypair) {
|
|
|
|
atomic.StorePointer((*unsafe.Pointer)((unsafe.Pointer)(&kp.next)), (unsafe.Pointer)(next))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (kp *Keypairs) loadNext() *Keypair {
|
|
|
|
return (*Keypair)(atomic.LoadPointer((*unsafe.Pointer)((unsafe.Pointer)(&kp.next))))
|
|
|
|
}
|
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
func (kp *Keypairs) Current() *Keypair {
|
2019-01-03 19:04:00 +01:00
|
|
|
kp.RLock()
|
|
|
|
defer kp.RUnlock()
|
2017-06-26 22:07:29 +02:00
|
|
|
return kp.current
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
2017-08-14 17:09:25 +02:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
func (device *Device) DeleteKeypair(key *Keypair) {
|
2018-02-02 17:24:29 +01:00
|
|
|
if key != nil {
|
2018-05-13 18:23:40 +02:00
|
|
|
device.indexTable.Delete(key.localIndex)
|
2018-02-02 17:24:29 +01:00
|
|
|
}
|
2017-08-14 17:09:25 +02:00
|
|
|
}
|