pub struct TicketSwitcher {
pub(crate) generator: fn() -> Result<Box<dyn ProducesTickets>, GetRandomFailed>,
lifetime: u32,
state: Mutex<TicketSwitcherState>,
}
Expand description
A ticketer that has a ‘current’ sub-ticketer and a single ‘previous’ ticketer. It creates a new ticketer every so often, demoting the current ticketer.
Fields§
§generator: fn() -> Result<Box<dyn ProducesTickets>, GetRandomFailed>
§lifetime: u32
§state: Mutex<TicketSwitcherState>
Implementations§
Source§impl TicketSwitcher
impl TicketSwitcher
Sourcepub fn new(
lifetime: u32,
generator: fn() -> Result<Box<dyn ProducesTickets>, GetRandomFailed>,
) -> Result<Self, Error>
👎Deprecated: use TicketRotator instead
pub fn new( lifetime: u32, generator: fn() -> Result<Box<dyn ProducesTickets>, GetRandomFailed>, ) -> Result<Self, Error>
Creates a new TicketSwitcher
, which rotates through sub-ticketers
based on the passage of time.
lifetime
is in seconds, and is how long the current ticketer
is used to generate new tickets. Tickets are accepted for no
longer than twice this duration. generator
produces a new
ProducesTickets
implementation.
Sourcepub(crate) fn maybe_roll(
&self,
now: UnixTime,
) -> Option<MutexGuard<'_, TicketSwitcherState>>
pub(crate) fn maybe_roll( &self, now: UnixTime, ) -> Option<MutexGuard<'_, TicketSwitcherState>>
If it’s time, demote the current
ticketer to previous
(so it
does no new encryptions but can do decryption) and use next for a
new current
ticketer.
Calling this regularly will ensure timely key erasure. Otherwise, key erasure will be delayed until the next encrypt/decrypt call.
For efficiency, this is also responsible for locking the state mutex and returning the mutexguard.
Trait Implementations§
Source§impl Debug for TicketSwitcher
impl Debug for TicketSwitcher
Source§impl ProducesTickets for TicketSwitcher
impl ProducesTickets for TicketSwitcher
Source§fn lifetime(&self) -> u32
fn lifetime(&self) -> u32
Source§fn enabled(&self) -> bool
fn enabled(&self) -> bool
Source§fn encrypt(&self, message: &[u8]) -> Option<Vec<u8>>
fn encrypt(&self, message: &[u8]) -> Option<Vec<u8>>
plain
, returning the resulting
ticket. Return None if plain
cannot be encrypted for
some reason: an empty ticket will be sent and the connection
will continue.Source§fn decrypt(&self, ciphertext: &[u8]) -> Option<Vec<u8>>
fn decrypt(&self, ciphertext: &[u8]) -> Option<Vec<u8>>
cipher
, validating its authenticity protection
and recovering the plaintext. cipher
is fully attacker
controlled, so this decryption must be side-channel free,
panic-proof, and otherwise bullet-proof. If the decryption
fails, return None.