summaryrefslogtreecommitdiff
path: root/src/keypair.go
diff options
context:
space:
mode:
authorMathias Hall-Andersen <mathias@hall-andersen.dk>2018-02-04 16:08:26 +0100
committerMathias Hall-Andersen <mathias@hall-andersen.dk>2018-02-04 16:08:26 +0100
commita0f54cbe5ac2cd8b8296c2c57c30029dd349cff0 (patch)
tree64574090d79ff3899c5c18e5268e450028e4656b /src/keypair.go
parent5871ec04deb8f4715cab37146940baa35c08cbee (diff)
downloadwireguard-go-a0f54cbe5ac2cd8b8296c2c57c30029dd349cff0.tar.gz
wireguard-go-a0f54cbe5ac2cd8b8296c2c57c30029dd349cff0.zip
Align with go library layout
Diffstat (limited to 'src/keypair.go')
-rw-r--r--src/keypair.go44
1 files changed, 0 insertions, 44 deletions
diff --git a/src/keypair.go b/src/keypair.go
deleted file mode 100644
index 283cb92..0000000
--- a/src/keypair.go
+++ /dev/null
@@ -1,44 +0,0 @@
-package main
-
-import (
- "crypto/cipher"
- "sync"
- "time"
-)
-
-/* Due to limitations in Go and /x/crypto there is currently
- * no way to ensure that key material is securely ereased in memory.
- *
- * Since this may harm the forward secrecy property,
- * we plan to resolve this issue; whenever Go allows us to do so.
- */
-
-type KeyPair struct {
- send cipher.AEAD
- receive cipher.AEAD
- replayFilter ReplayFilter
- sendNonce uint64
- isInitiator bool
- created time.Time
- localIndex uint32
- remoteIndex uint32
-}
-
-type KeyPairs struct {
- mutex sync.RWMutex
- current *KeyPair
- previous *KeyPair
- next *KeyPair // not yet "confirmed by transport"
-}
-
-func (kp *KeyPairs) Current() *KeyPair {
- kp.mutex.RLock()
- defer kp.mutex.RUnlock()
- return kp.current
-}
-
-func (device *Device) DeleteKeyPair(key *KeyPair) {
- if key != nil {
- device.indices.Delete(key.localIndex)
- }
-}