| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475 | package nebulaimport (	"crypto/cipher"	"encoding/binary"	"errors"	"github.com/flynn/noise")type endianness interface {	PutUint64(b []byte, v uint64)}var noiseEndianness endianness = binary.BigEndiantype NebulaCipherState struct {	c noise.Cipher	//k [32]byte	//n uint64}func NewNebulaCipherState(s *noise.CipherState) *NebulaCipherState {	return &NebulaCipherState{c: s.Cipher()}}// EncryptDanger encrypts and authenticates a given payload.//// out is a destination slice to hold the output of the EncryptDanger operation.//   - ad is additional data, which will be authenticated and appended to out, but not encrypted.//   - plaintext is encrypted, authenticated and appended to out.//   - n is a nonce value which must never be re-used with this key.//   - nb is a buffer used for temporary storage in the implementation of this call, which should//     be re-used by callers to minimize garbage collection.func (s *NebulaCipherState) EncryptDanger(out, ad, plaintext []byte, n uint64, nb []byte) ([]byte, error) {	if s != nil {		// TODO: Is this okay now that we have made messageCounter atomic?		// Alternative may be to split the counter space into ranges		//if n <= s.n {		//	return nil, errors.New("CRITICAL: a duplicate counter value was used")		//}		//s.n = n		nb[0] = 0		nb[1] = 0		nb[2] = 0		nb[3] = 0		noiseEndianness.PutUint64(nb[4:], n)		out = s.c.(cipher.AEAD).Seal(out, nb, plaintext, ad)		//l.Debugf("Encryption: outlen: %d, nonce: %d, ad: %s, plainlen %d", len(out), n, ad, len(plaintext))		return out, nil	} else {		return nil, errors.New("no cipher state available to encrypt")	}}func (s *NebulaCipherState) DecryptDanger(out, ad, ciphertext []byte, n uint64, nb []byte) ([]byte, error) {	if s != nil {		nb[0] = 0		nb[1] = 0		nb[2] = 0		nb[3] = 0		noiseEndianness.PutUint64(nb[4:], n)		return s.c.(cipher.AEAD).Open(out, nb, ciphertext, ad)	} else {		return []byte{}, nil	}}func (s *NebulaCipherState) Overhead() int {	if s != nil {		return s.c.(cipher.AEAD).Overhead()	}	return 0}
 |