1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
|
package server
import (
"net"
"os"
"reflect"
"strings"
"syscall"
"unsafe"
)
const (
TCP_MD5SIG = 14
)
type tcpmd5sig struct {
ss_family uint16
ss [126]byte
pad1 uint16
keylen uint16
pad2 uint32
key [80]byte
}
func buildTcpMD5Sig(address string, key string) (tcpmd5sig, error) {
t := tcpmd5sig{}
addr := net.ParseIP(address)
if addr.To4() != nil {
t.ss_family = syscall.AF_INET
copy(t.ss[2:], addr.To4())
} else {
t.ss_family = syscall.AF_INET6
copy(t.ss[6:], addr.To16())
}
t.keylen = uint16(len(key))
copy(t.key[0:], []byte(key))
return t, nil
}
func connToFd(v reflect.Value) int {
fd := v.FieldByName("fd")
p := reflect.Indirect(fd)
sysfd := p.FieldByName("sysfd")
return int(sysfd.Int())
}
func listenerToFd(l *net.TCPListener) int {
return connToFd(reflect.ValueOf(*l))
}
func tcpConnToFd(tcp *net.TCPConn) int {
n := reflect.ValueOf(*tcp)
return connToFd(n.FieldByName("conn"))
}
func SetTcpMD5SigSockopts(l *net.TCPListener, address string, key string) error {
t, _ := buildTcpMD5Sig(address, key)
_, _, e := syscall.Syscall6(syscall.SYS_SETSOCKOPT, uintptr(listenerToFd(l)),
uintptr(syscall.IPPROTO_TCP), uintptr(TCP_MD5SIG),
uintptr(unsafe.Pointer(&t)), unsafe.Sizeof(t), 0)
return e
}
func SetTcpTTLSockopts(conn *net.TCPConn, ttl int) error {
level := syscall.IPPROTO_IP
name := syscall.IP_TTL
if strings.Contains(conn.RemoteAddr().String(), "[") {
level = syscall.IPPROTO_IPV6
name = syscall.IPV6_UNICAST_HOPS
}
return os.NewSyscallError("setsockopt", syscall.SetsockoptInt(tcpConnToFd(conn), level, name, ttl))
}
|