forked from aler9/dctk
-
Notifications
You must be signed in to change notification settings - Fork 0
/
listener_tcp.go
108 lines (93 loc) · 2.16 KB
/
listener_tcp.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
package dctoolkit
import (
crand "crypto/rand"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/pem"
"fmt"
"math/big"
"net"
)
type listenerTcp struct {
client *Client
isEncrypted bool
terminateRequested bool
listener net.Listener
}
func newListenerTcp(client *Client, isEncrypted bool) error {
var listener net.Listener
if isEncrypted == true {
var err error
priv, err := rsa.GenerateKey(crand.Reader, 1024)
if err != nil {
return err
}
serialNumber, err := crand.Int(crand.Reader, new(big.Int).Lsh(big.NewInt(1), 128))
if err != nil {
return err
}
template := x509.Certificate{
SerialNumber: serialNumber,
}
bcert, err := x509.CreateCertificate(crand.Reader, &template, &template, &priv.PublicKey, priv)
if err != nil {
return err
}
if client.protoIsAdc == true {
xcert, err := x509.ParseCertificate(bcert)
if err != nil {
return err
}
client.adcFingerprint = adcCertificateFingerprint(xcert)
}
certPEMBlock := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: bcert})
keyPEMBlock := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(priv)})
tcert, err := tls.X509KeyPair(certPEMBlock, keyPEMBlock)
if err != nil {
return err
}
listener, err = tls.Listen("tcp4", fmt.Sprintf(":%d", client.conf.TcpTlsPort),
&tls.Config{Certificates: []tls.Certificate{tcert}})
if err != nil {
return err
}
} else {
var err error
listener, err = net.Listen("tcp4", fmt.Sprintf(":%d", client.conf.TcpPort))
if err != nil {
return err
}
}
l := &listenerTcp{
client: client,
isEncrypted: isEncrypted,
listener: listener,
}
if isEncrypted == true {
client.tcpTlsListener = l
} else {
client.listenerTcp = l
}
return nil
}
func (t *listenerTcp) close() {
if t.terminateRequested == true {
return
}
t.terminateRequested = true
t.listener.Close()
}
func (t *listenerTcp) do() {
defer t.client.wg.Done()
for {
rawconn, err := t.listener.Accept()
// listener closed
if err != nil {
break
}
t.client.Safe(func() {
newConnPeer(t.client, t.isEncrypted, true, rawconn, "", 0, "")
})
}
}