/
token_list.go
63 lines (47 loc) · 1.22 KB
/
token_list.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
package main
import (
"crypto/rand"
"crypto/rsa"
"sync"
"github.com/golang-devops/go-psexec/shared"
)
var (
currentTokenId int
tokenStore = &TokenStore{tokens: make(map[int]*sessionToken)}
)
type TokenStore struct {
sync.RWMutex
tokens map[int]*sessionToken
}
type sessionToken struct {
Token []byte
ClientPublicKey *rsa.PublicKey
}
func (s *sessionToken) DecryptWithSessionToken(cipher []byte) ([]byte, error) {
return shared.DecryptSymmetric(s.Token, cipher)
}
/*func (s *sessionToken) NewEncryptedWriter(writer io.Writer) *shared.EncryptedWriterProxy {
return shared.NewEncryptedWriterProxy(writer, s.Token)
}*/
func (t *TokenStore) NewSessionToken(clientPublicKey *rsa.PublicKey) (int, []byte, error) {
t.Lock()
defer t.Unlock()
key := make([]byte, 32)
_, err := rand.Read(key)
if err != nil {
return 0, nil, err
}
currentTokenId++
t.tokens[currentTokenId] = &sessionToken{key, clientPublicKey}
// The key length can be 32, 24, 16 bytes (OR in bits: 128, 192 or 256)
return currentTokenId, key, nil
}
func (t *TokenStore) GetSessionToken(sessionId int) (*sessionToken, bool) {
t.Lock()
defer t.Unlock()
tok, ok := t.tokens[sessionId]
return tok, ok
}
func init() {
currentTokenId = 1
}