2017-06-24 15:34:17 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/cipher"
|
2017-09-01 14:21:53 +02:00
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
|
|
|
"reflect"
|
2017-06-26 13:14:02 +02:00
|
|
|
"sync"
|
2017-06-27 17:33:06 +02:00
|
|
|
"time"
|
2017-06-24 15:34:17 +02:00
|
|
|
)
|
|
|
|
|
2017-09-01 14:21:53 +02:00
|
|
|
type safeAEAD struct {
|
|
|
|
mutex sync.RWMutex
|
|
|
|
aead cipher.AEAD
|
|
|
|
}
|
|
|
|
|
|
|
|
func (con *safeAEAD) clear() {
|
|
|
|
// TODO: improve handling of key material
|
|
|
|
con.mutex.Lock()
|
|
|
|
if con.aead != nil {
|
|
|
|
val := reflect.ValueOf(con.aead)
|
|
|
|
elm := val.Elem()
|
|
|
|
typ := elm.Type()
|
|
|
|
elm.Set(reflect.Zero(typ))
|
|
|
|
con.aead = nil
|
|
|
|
}
|
|
|
|
con.mutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (con *safeAEAD) setKey(key *[chacha20poly1305.KeySize]byte) {
|
|
|
|
// TODO: improve handling of key material
|
|
|
|
con.aead, _ = chacha20poly1305.New(key[:])
|
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
type KeyPair struct {
|
2017-09-01 14:21:53 +02:00
|
|
|
send safeAEAD
|
|
|
|
receive safeAEAD
|
2017-07-10 12:09:19 +02:00
|
|
|
replayFilter ReplayFilter
|
|
|
|
sendNonce uint64
|
|
|
|
isInitiator bool
|
|
|
|
created time.Time
|
|
|
|
localIndex uint32
|
|
|
|
remoteIndex uint32
|
2017-06-26 13:14:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type KeyPairs struct {
|
2017-06-30 14:41:08 +02:00
|
|
|
mutex sync.RWMutex
|
|
|
|
current *KeyPair
|
|
|
|
previous *KeyPair
|
|
|
|
next *KeyPair // not yet "confirmed by transport"
|
2017-06-26 22:07:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (kp *KeyPairs) Current() *KeyPair {
|
|
|
|
kp.mutex.RLock()
|
|
|
|
defer kp.mutex.RUnlock()
|
|
|
|
return kp.current
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
func (device *Device) DeleteKeyPair(key *KeyPair) {
|
2017-09-01 14:21:53 +02:00
|
|
|
key.send.clear()
|
|
|
|
key.receive.clear()
|
2017-08-14 17:09:25 +02:00
|
|
|
device.indices.Delete(key.localIndex)
|
|
|
|
}
|