2011-09-16 17:47:21 +02:00
|
|
|
// Copyright 2011 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2011-10-27 01:57:58 +02:00
|
|
|
// +build darwin freebsd openbsd
|
|
|
|
|
2011-09-16 17:47:21 +02:00
|
|
|
// Network interface identification for BSD variants
|
|
|
|
|
|
|
|
package net
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
|
|
|
"syscall"
|
|
|
|
"unsafe"
|
|
|
|
)
|
|
|
|
|
|
|
|
// If the ifindex is zero, interfaceTable returns mappings of all
|
|
|
|
// network interfaces. Otheriwse it returns a mapping of a specific
|
|
|
|
// interface.
|
|
|
|
func interfaceTable(ifindex int) ([]Interface, os.Error) {
|
|
|
|
var (
|
|
|
|
tab []byte
|
|
|
|
e int
|
|
|
|
msgs []syscall.RoutingMessage
|
|
|
|
ift []Interface
|
|
|
|
)
|
|
|
|
|
|
|
|
tab, e = syscall.RouteRIB(syscall.NET_RT_IFLIST, ifindex)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route rib", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
msgs, e = syscall.ParseRoutingMessage(tab)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route message", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range msgs {
|
|
|
|
switch v := m.(type) {
|
|
|
|
case *syscall.InterfaceMessage:
|
|
|
|
if ifindex == 0 || ifindex == int(v.Header.Index) {
|
|
|
|
ifi, err := newLink(v)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ift = append(ift, ifi...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ift, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newLink(m *syscall.InterfaceMessage) ([]Interface, os.Error) {
|
|
|
|
var ift []Interface
|
|
|
|
|
|
|
|
sas, e := syscall.ParseRoutingSockaddr(m)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route sockaddr", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, s := range sas {
|
|
|
|
switch v := s.(type) {
|
|
|
|
case *syscall.SockaddrDatalink:
|
|
|
|
// NOTE: SockaddrDatalink.Data is minimum work area,
|
|
|
|
// can be larger.
|
|
|
|
m.Data = m.Data[unsafe.Offsetof(v.Data):]
|
|
|
|
ifi := Interface{Index: int(m.Header.Index), Flags: linkFlags(m.Header.Flags)}
|
|
|
|
var name [syscall.IFNAMSIZ]byte
|
|
|
|
for i := 0; i < int(v.Nlen); i++ {
|
|
|
|
name[i] = byte(m.Data[i])
|
|
|
|
}
|
|
|
|
ifi.Name = string(name[:v.Nlen])
|
|
|
|
ifi.MTU = int(m.Header.Data.Mtu)
|
|
|
|
addr := make([]byte, v.Alen)
|
|
|
|
for i := 0; i < int(v.Alen); i++ {
|
|
|
|
addr[i] = byte(m.Data[int(v.Nlen)+i])
|
|
|
|
}
|
|
|
|
ifi.HardwareAddr = addr[:v.Alen]
|
|
|
|
ift = append(ift, ifi)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ift, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func linkFlags(rawFlags int32) Flags {
|
|
|
|
var f Flags
|
|
|
|
if rawFlags&syscall.IFF_UP != 0 {
|
|
|
|
f |= FlagUp
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_BROADCAST != 0 {
|
|
|
|
f |= FlagBroadcast
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_LOOPBACK != 0 {
|
|
|
|
f |= FlagLoopback
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_POINTOPOINT != 0 {
|
|
|
|
f |= FlagPointToPoint
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_MULTICAST != 0 {
|
|
|
|
f |= FlagMulticast
|
|
|
|
}
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the ifindex is zero, interfaceAddrTable returns addresses
|
|
|
|
// for all network interfaces. Otherwise it returns addresses
|
|
|
|
// for a specific interface.
|
|
|
|
func interfaceAddrTable(ifindex int) ([]Addr, os.Error) {
|
|
|
|
var (
|
|
|
|
tab []byte
|
|
|
|
e int
|
|
|
|
msgs []syscall.RoutingMessage
|
|
|
|
ifat []Addr
|
|
|
|
)
|
|
|
|
|
|
|
|
tab, e = syscall.RouteRIB(syscall.NET_RT_IFLIST, ifindex)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route rib", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
msgs, e = syscall.ParseRoutingMessage(tab)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route message", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range msgs {
|
|
|
|
switch v := m.(type) {
|
|
|
|
case *syscall.InterfaceAddrMessage:
|
|
|
|
if ifindex == 0 || ifindex == int(v.Header.Index) {
|
|
|
|
ifa, err := newAddr(v)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ifat = append(ifat, ifa...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ifat, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newAddr(m *syscall.InterfaceAddrMessage) ([]Addr, os.Error) {
|
|
|
|
var ifat []Addr
|
|
|
|
|
|
|
|
sas, e := syscall.ParseRoutingSockaddr(m)
|
|
|
|
if e != 0 {
|
|
|
|
return nil, os.NewSyscallError("route sockaddr", e)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, s := range sas {
|
|
|
|
switch v := s.(type) {
|
|
|
|
case *syscall.SockaddrInet4:
|
|
|
|
ifa := &IPAddr{IP: IPv4(v.Addr[0], v.Addr[1], v.Addr[2], v.Addr[3])}
|
|
|
|
ifat = append(ifat, ifa.toAddr())
|
|
|
|
case *syscall.SockaddrInet6:
|
|
|
|
ifa := &IPAddr{IP: make(IP, IPv6len)}
|
|
|
|
copy(ifa.IP, v.Addr[:])
|
|
|
|
// NOTE: KAME based IPv6 protcol stack usually embeds
|
|
|
|
// the interface index in the interface-local or link-
|
|
|
|
// local address as the kernel-internal form.
|
|
|
|
if ifa.IP.IsLinkLocalUnicast() {
|
|
|
|
// remove embedded scope zone ID
|
|
|
|
ifa.IP[2], ifa.IP[3] = 0, 0
|
|
|
|
}
|
|
|
|
ifat = append(ifat, ifa.toAddr())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ifat, nil
|
|
|
|
}
|