import (
"crypto/hmac"
"crypto/rand"
- "git.zx2c4.com/wireguard-go/internal/xchacha20poly1305"
"golang.org/x/crypto/blake2s"
"golang.org/x/crypto/chacha20poly1305"
"sync"
return nil, err
}
- xchacha20poly1305.Encrypt(
+ XChaCha20Poly1305Encrypt(
reply.Cookie[:0],
&reply.Nonce,
cookie[:],
var cookie [blake2s.Size128]byte
- _, err := xchacha20poly1305.Decrypt(
+ _, err := XChaCha20Poly1305Decrypt(
cookie[:0],
&msg.Nonce,
msg.Cookie[:],
package main
import (
- "git.zx2c4.com/wireguard-go/internal/ratelimiter"
"runtime"
"sync"
"sync/atomic"
rate struct {
underLoadUntil atomic.Value
- limiter ratelimiter.Ratelimiter
+ limiter Ratelimiter
}
pool struct {
import (
"errors"
- "git.zx2c4.com/wireguard-go/internal/tai64n"
"golang.org/x/crypto/blake2s"
"golang.org/x/crypto/chacha20poly1305"
"golang.org/x/crypto/poly1305"
Sender uint32
Ephemeral NoisePublicKey
Static [NoisePublicKeySize + poly1305.TagSize]byte
- Timestamp [tai64n.TimestampSize + poly1305.TagSize]byte
+ Timestamp [TimestampSize + poly1305.TagSize]byte
MAC1 [blake2s.Size128]byte
MAC2 [blake2s.Size128]byte
}
remoteStatic NoisePublicKey // long term key
remoteEphemeral NoisePublicKey // ephemeral public key
precomputedStaticStatic [NoisePublicKeySize]byte // precomputed shared secret
- lastTimestamp tai64n.Timestamp
+ lastTimestamp Timestamp
lastInitiationConsumption time.Time
}
// encrypt timestamp
- timestamp := tai64n.Now()
+ timestamp := TimestampNow()
func() {
var key [chacha20poly1305.KeySize]byte
KDF2(
// verify identity
- var timestamp tai64n.Timestamp
+ var timestamp Timestamp
var key [chacha20poly1305.KeySize]byte
handshake.mutex.RLock()
-package ratelimiter
+package main
/* Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. */
-package ratelimiter
+package main
import (
"net"
-package tai64n
+package main
import (
"bytes"
type Timestamp [TimestampSize]byte
-func Now() Timestamp {
+func TimestampNow() Timestamp {
var tai64n Timestamp
now := time.Now()
secs := base + uint64(now.Unix())
-package tai64n
+package main
import (
"testing"
* as used by WireGuard.
*/
func TestMonotonic(t *testing.T) {
- old := Now()
+ old := TimestampNow()
for i := 0; i < 10000; i++ {
time.Sleep(time.Nanosecond)
- next := Now()
+ next := TimestampNow()
if !next.After(old) {
t.Error("TAI64N, not monotonically increasing on nano-second scale")
}
// Use of this source code is governed by a license that can be
// found in the LICENSE file.
-package xchacha20poly1305
+package main
import (
"encoding/binary"
binary.LittleEndian.PutUint32(out[28:], v15)
}
-func Encrypt(
+func XChaCha20Poly1305Encrypt(
dst []byte,
nonceFull *[24]byte,
plaintext []byte,
return aead.Seal(dst, nonce[:], plaintext, additionalData)
}
-func Decrypt(
+func XChaCha20Poly1305Decrypt(
dst []byte,
nonceFull *[24]byte,
plaintext []byte,
-package xchacha20poly1305
+package main
import (
"encoding/hex"
// test encryption
- ct := Encrypt(
+ ct := XChaCha20Poly1305Encrypt(
nil,
&nonceArray,
pt,
// test decryption
- ptp, err := Decrypt(
+ ptp, err := XChaCha20Poly1305Decrypt(
nil,
&nonceArray,
ct,