123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687 |
- package crypt
- import (
- "crypto/rand"
- "crypto/rsa"
- "crypto/tls"
- "crypto/x509"
- "crypto/x509/pkix"
- "encoding/pem"
- "log"
- "math/big"
- "net"
- "os"
- "time"
- "github.com/astaxie/beego/logs"
- )
- var (
- cert tls.Certificate
- )
- func InitTls() {
- c, k, err := generateKeyPair("NPS Org")
- if err == nil {
- cert, err = tls.X509KeyPair(c, k)
- }
- if err != nil {
- log.Fatalln("Error initializing crypto certs", err)
- }
- }
- func NewTlsServerConn(conn net.Conn) net.Conn {
- var err error
- if err != nil {
- logs.Error(err)
- os.Exit(0)
- return nil
- }
- config := &tls.Config{Certificates: []tls.Certificate{cert}}
- return tls.Server(conn, config)
- }
- func NewTlsClientConn(conn net.Conn) net.Conn {
- conf := &tls.Config{
- InsecureSkipVerify: true,
- }
- return tls.Client(conn, conf)
- }
- func generateKeyPair(CommonName string) (rawCert, rawKey []byte, err error) {
- // Create private key and self-signed certificate
- // Adapted from https://golang.org/src/crypto/tls/generate_cert.go
- priv, err := rsa.GenerateKey(rand.Reader, 2048)
- if err != nil {
- return
- }
- validFor := time.Hour * 24 * 365 * 10 // ten years
- notBefore := time.Now()
- notAfter := notBefore.Add(validFor)
- serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
- serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
- template := x509.Certificate{
- SerialNumber: serialNumber,
- Subject: pkix.Name{
- Organization: []string{"My Company Name LTD."},
- CommonName: CommonName,
- Country: []string{"US"},
- },
- NotBefore: notBefore,
- NotAfter: notAfter,
- KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
- ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
- BasicConstraintsValid: true,
- }
- derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
- if err != nil {
- return
- }
- rawCert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
- rawKey = pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(priv)})
- return
- }
|