2016-07-22 20:15:38 +02:00
|
|
|
// Copyright 2011 The Go Authors. All rights reserved.
|
2011-09-16 17:47:21 +02:00
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2013-11-06 20:49:01 +01:00
|
|
|
// +build darwin dragonfly freebsd netbsd openbsd
|
2011-10-27 01:57:58 +02:00
|
|
|
|
2011-09-16 17:47:21 +02:00
|
|
|
package net
|
|
|
|
|
|
|
|
import (
|
|
|
|
"syscall"
|
2016-07-22 20:15:38 +02:00
|
|
|
|
2019-01-18 20:04:36 +01:00
|
|
|
"internal/x/net/route"
|
2011-09-16 17:47:21 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// If the ifindex is zero, interfaceTable returns mappings of all
|
2016-07-22 20:15:38 +02:00
|
|
|
// network interfaces. Otherwise it returns a mapping of a specific
|
2011-09-16 17:47:21 +02:00
|
|
|
// interface.
|
2011-12-03 03:17:34 +01:00
|
|
|
func interfaceTable(ifindex int) ([]Interface, error) {
|
2016-07-22 20:15:38 +02:00
|
|
|
msgs, err := interfaceMessages(ifindex)
|
2012-01-13 06:11:45 +01:00
|
|
|
if err != nil {
|
2016-07-22 20:15:38 +02:00
|
|
|
return nil, err
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
n := len(msgs)
|
|
|
|
if ifindex != 0 {
|
|
|
|
n = 1
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
ift := make([]Interface, n)
|
|
|
|
n = 0
|
2011-09-16 17:47:21 +02:00
|
|
|
for _, m := range msgs {
|
2013-07-16 08:54:42 +02:00
|
|
|
switch m := m.(type) {
|
2016-07-22 20:15:38 +02:00
|
|
|
case *route.InterfaceMessage:
|
|
|
|
if ifindex != 0 && ifindex != m.Index {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
ift[n].Index = m.Index
|
|
|
|
ift[n].Name = m.Name
|
|
|
|
ift[n].Flags = linkFlags(m.Flags)
|
|
|
|
if sa, ok := m.Addrs[syscall.RTAX_IFP].(*route.LinkAddr); ok && len(sa.Addr) > 0 {
|
|
|
|
ift[n].HardwareAddr = make([]byte, len(sa.Addr))
|
|
|
|
copy(ift[n].HardwareAddr, sa.Addr)
|
|
|
|
}
|
|
|
|
for _, sys := range m.Sys() {
|
|
|
|
if imx, ok := sys.(*route.InterfaceMetrics); ok {
|
|
|
|
ift[n].MTU = imx.MTU
|
|
|
|
break
|
2013-07-16 08:54:42 +02:00
|
|
|
}
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
n++
|
|
|
|
if ifindex == m.Index {
|
|
|
|
return ift[:n], nil
|
|
|
|
}
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
return ift[:n], nil
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
|
|
|
|
2016-07-22 20:15:38 +02:00
|
|
|
func linkFlags(rawFlags int) Flags {
|
2011-09-16 17:47:21 +02:00
|
|
|
var f Flags
|
|
|
|
if rawFlags&syscall.IFF_UP != 0 {
|
|
|
|
f |= FlagUp
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_BROADCAST != 0 {
|
|
|
|
f |= FlagBroadcast
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_LOOPBACK != 0 {
|
|
|
|
f |= FlagLoopback
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_POINTOPOINT != 0 {
|
|
|
|
f |= FlagPointToPoint
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_MULTICAST != 0 {
|
|
|
|
f |= FlagMulticast
|
|
|
|
}
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2013-07-16 08:54:42 +02:00
|
|
|
// If the ifi is nil, interfaceAddrTable returns addresses for all
|
2016-07-22 20:15:38 +02:00
|
|
|
// network interfaces. Otherwise it returns addresses for a specific
|
2013-07-16 08:54:42 +02:00
|
|
|
// interface.
|
|
|
|
func interfaceAddrTable(ifi *Interface) ([]Addr, error) {
|
|
|
|
index := 0
|
|
|
|
if ifi != nil {
|
|
|
|
index = ifi.Index
|
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
msgs, err := interfaceMessages(index)
|
2012-01-13 06:11:45 +01:00
|
|
|
if err != nil {
|
2016-07-22 20:15:38 +02:00
|
|
|
return nil, err
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
2016-07-22 20:15:38 +02:00
|
|
|
ifat := make([]Addr, 0, len(msgs))
|
2011-09-16 17:47:21 +02:00
|
|
|
for _, m := range msgs {
|
2013-07-16 08:54:42 +02:00
|
|
|
switch m := m.(type) {
|
2016-07-22 20:15:38 +02:00
|
|
|
case *route.InterfaceAddrMessage:
|
|
|
|
if index != 0 && index != m.Index {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
var mask IPMask
|
|
|
|
switch sa := m.Addrs[syscall.RTAX_NETMASK].(type) {
|
|
|
|
case *route.Inet4Addr:
|
|
|
|
mask = IPv4Mask(sa.IP[0], sa.IP[1], sa.IP[2], sa.IP[3])
|
|
|
|
case *route.Inet6Addr:
|
|
|
|
mask = make(IPMask, IPv6len)
|
|
|
|
copy(mask, sa.IP[:])
|
|
|
|
}
|
|
|
|
var ip IP
|
|
|
|
switch sa := m.Addrs[syscall.RTAX_IFA].(type) {
|
|
|
|
case *route.Inet4Addr:
|
|
|
|
ip = IPv4(sa.IP[0], sa.IP[1], sa.IP[2], sa.IP[3])
|
|
|
|
case *route.Inet6Addr:
|
|
|
|
ip = make(IP, IPv6len)
|
|
|
|
copy(ip, sa.IP[:])
|
|
|
|
}
|
|
|
|
if ip != nil && mask != nil { // NetBSD may contain route.LinkAddr
|
|
|
|
ifat = append(ifat, &IPNet{IP: ip, Mask: mask})
|
2011-09-16 17:47:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ifat, nil
|
|
|
|
}
|