premiere-libtorrent/src/enum_net.cpp

1112 lines
29 KiB
C++
Raw Normal View History

/*
Copyright (c) 2007-2016, Arvid Norberg
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the distribution.
* Neither the name of the author nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
*/
#include "libtorrent/config.hpp"
#include "libtorrent/enum_net.hpp"
#include "libtorrent/broadcast_socket.hpp"
2012-05-12 18:15:36 +02:00
#include "libtorrent/assert.hpp"
2014-07-06 21:18:00 +02:00
#include "libtorrent/socket_type.hpp"
#ifdef TORRENT_WINDOWS
#include "libtorrent/aux_/win_util.hpp"
#endif
2015-08-18 16:42:03 +02:00
#include <functional>
#include <cstdlib> // for wcstombscstombs
2015-08-18 16:42:03 +02:00
#include "libtorrent/aux_/disable_warnings_push.hpp"
2008-05-03 18:05:42 +02:00
#include <boost/asio/ip/host_name.hpp>
2014-02-17 08:25:21 +01:00
#if TORRENT_USE_IFCONF
#include <sys/ioctl.h>
2008-03-04 05:29:03 +01:00
#include <sys/socket.h>
#include <netinet/in.h>
#include <net/if.h>
#include <cstring>
#endif
#if TORRENT_USE_SYSCTL
2009-01-27 09:24:48 +01:00
#include <sys/sysctl.h>
2011-04-10 05:45:13 +02:00
#include <net/route.h>
2009-01-27 09:24:48 +01:00
#endif
2011-04-10 05:45:13 +02:00
#if TORRENT_USE_GETIPFORWARDTABLE || TORRENT_USE_GETADAPTERSADDRESSES
#ifndef WIN32_LEAN_AND_MEAN
#define WIN32_LEAN_AND_MEAN
#endif
#include <windows.h>
#include <iphlpapi.h>
#endif
2011-04-10 05:45:13 +02:00
#if TORRENT_USE_NETLINK
#include <linux/netlink.h>
#include <linux/rtnetlink.h>
#include <asm/types.h>
#include <netinet/ether.h>
#include <netinet/in.h>
#include <net/if.h>
#include <stdio.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/types.h>
2011-02-15 08:42:46 +01:00
#endif
#if TORRENT_USE_IFADDRS
#include <ifaddrs.h>
#endif
#if TORRENT_USE_IFADDRS || TORRENT_USE_IFCONF || TORRENT_USE_NETLINK || TORRENT_USE_SYSCTL
2015-08-18 16:42:03 +02:00
// capture this here where warnings are disabled (the macro generates warnings)
const unsigned long siocgifmtu = SIOCGIFMTU;
2015-08-18 16:42:03 +02:00
#endif
#include "libtorrent/aux_/disable_warnings_pop.hpp"
2012-10-21 17:19:23 +02:00
#if defined(TORRENT_OS2) && !defined(IF_NAMESIZE)
2012-09-24 18:13:57 +02:00
#define IF_NAMESIZE IFNAMSIZ
#endif
namespace libtorrent { namespace
{
#if !defined TORRENT_BUILD_SIMULATOR
address_v4 inaddr_to_address(in_addr const* ina, int const len = 4)
{
boost::asio::ip::address_v4::bytes_type b;
b.fill(0);
if (len > 0) std::memcpy(b.data(), ina, std::min(std::size_t(len), b.size()));
return address_v4(b);
}
#if TORRENT_USE_IPV6
address_v6 inaddr6_to_address(in6_addr const* ina6, int const len = 16)
{
boost::asio::ip::address_v6::bytes_type b;
b.fill(0);
if (len > 0) std::memcpy(b.data(), ina6, std::min(std::size_t(len), b.size()));
return address_v6(b);
}
#endif
2010-11-29 02:33:05 +01:00
int sockaddr_len(sockaddr const* sin)
{
#if TORRENT_HAS_SALEN
2010-11-29 02:33:05 +01:00
return sin->sa_len;
#else
return sin->sa_family == AF_INET ? sizeof(sockaddr_in) : sizeof(sockaddr_in6);
2010-11-29 02:33:05 +01:00
#endif
}
address sockaddr_to_address(sockaddr const* sin, int assume_family = -1)
{
if (sin->sa_family == AF_INET || assume_family == AF_INET)
2015-08-18 15:33:00 +02:00
return inaddr_to_address(&reinterpret_cast<sockaddr_in const*>(sin)->sin_addr
, sockaddr_len(sin) - int(offsetof(sockaddr, sa_data)));
#if TORRENT_USE_IPV6
2010-11-29 02:33:05 +01:00
else if (sin->sa_family == AF_INET6 || assume_family == AF_INET6)
{
auto saddr = reinterpret_cast<sockaddr_in6 const*>(sin);
auto ret = inaddr6_to_address(&saddr->sin6_addr
, sockaddr_len(sin) - int(offsetof(sockaddr, sa_data)));
ret.scope_id(saddr->sin6_scope_id);
return ret;
}
#endif
return address();
}
bool valid_addr_family(int family)
{
return (family == AF_INET
#if TORRENT_USE_IPV6
|| family == AF_INET6
#endif
);
}
#if TORRENT_USE_NETLINK
int read_nl_sock(int sock, char *buf, int bufsize, int const seq, int const pid)
{
nlmsghdr* nl_hdr;
int msg_len = 0;
do
{
int read_len = int(recv(sock, buf, bufsize - msg_len, 0));
if (read_len < 0) return -1;
nl_hdr = reinterpret_cast<nlmsghdr*>(buf);
#ifdef __clang__
#pragma clang diagnostic push
// NLMSG_OK uses signed/unsigned compare in the same expression
#pragma clang diagnostic ignored "-Wsign-compare"
#endif
if ((NLMSG_OK(nl_hdr, read_len) == 0) || (nl_hdr->nlmsg_type == NLMSG_ERROR))
return -1;
#ifdef __clang__
#pragma clang diagnostic pop
#endif
if (nl_hdr->nlmsg_type == NLMSG_DONE) break;
buf += read_len;
msg_len += read_len;
if ((nl_hdr->nlmsg_flags & NLM_F_MULTI) == 0) break;
} while((int(nl_hdr->nlmsg_seq) != seq) || (int(nl_hdr->nlmsg_pid) != pid));
return msg_len;
}
2010-11-29 02:33:05 +01:00
bool parse_route(int s, nlmsghdr* nl_hdr, ip_route* rt_info)
{
rtmsg* rt_msg = reinterpret_cast<rtmsg*>(NLMSG_DATA(nl_hdr));
if (!valid_addr_family(rt_msg->rtm_family) || (rt_msg->rtm_table != RT_TABLE_MAIN
2010-11-29 02:33:05 +01:00
&& rt_msg->rtm_table != RT_TABLE_LOCAL))
2008-04-28 03:23:11 +02:00
return false;
2010-11-29 02:33:05 +01:00
int if_index = 0;
int rt_len = int(RTM_PAYLOAD(nl_hdr));
#ifdef __clang__
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wcast-align"
#endif
for (rtattr* rt_attr = reinterpret_cast<rtattr*>(RTM_RTA(rt_msg));
RTA_OK(rt_attr, rt_len); rt_attr = RTA_NEXT(rt_attr, rt_len))
{
switch(rt_attr->rta_type)
{
case RTA_OIF:
if_index = *reinterpret_cast<int*>(RTA_DATA(rt_attr));
break;
case RTA_GATEWAY:
2010-11-29 02:33:05 +01:00
#if TORRENT_USE_IPV6
if (rt_msg->rtm_family == AF_INET6)
{
rt_info->gateway = inaddr6_to_address(reinterpret_cast<in6_addr*>(RTA_DATA(rt_attr)));
2010-11-29 02:33:05 +01:00
}
else
#endif
{
rt_info->gateway = inaddr_to_address(reinterpret_cast<in_addr*>(RTA_DATA(rt_attr)));
2010-11-29 02:33:05 +01:00
}
break;
case RTA_DST:
2010-11-29 02:33:05 +01:00
#if TORRENT_USE_IPV6
if (rt_msg->rtm_family == AF_INET6)
{
rt_info->destination = inaddr6_to_address(reinterpret_cast<in6_addr*>(RTA_DATA(rt_attr)));
2010-11-29 02:33:05 +01:00
}
else
#endif
{
rt_info->destination = inaddr_to_address(reinterpret_cast<in_addr*>(RTA_DATA(rt_attr)));
2010-11-29 02:33:05 +01:00
}
break;
}
}
#ifdef __clang__
#pragma clang diagnostic pop
#endif
2010-11-29 02:33:05 +01:00
if_indextoname(std::uint32_t(if_index), rt_info->name);
ifreq req = {};
if_indextoname(std::uint32_t(if_index), req.ifr_name);
2015-08-18 16:42:03 +02:00
ioctl(s, siocgifmtu, &req);
2010-11-29 02:33:05 +01:00
rt_info->mtu = req.ifr_mtu;
// obviously this doesn't work correctly. How do you get the netmask for a route?
// if (ioctl(s, SIOCGIFNETMASK, &req) == 0) {
// rt_info->netmask = sockaddr_to_address(&req.ifr_addr, req.ifr_addr.sa_family);
// }
2008-04-28 03:23:11 +02:00
return true;
}
#endif // TORRENT_USE_NETLINK
#endif // !BUILD_SIMULATOR
#if TORRENT_USE_SYSCTL && !defined TORRENT_BUILD_SIMULATOR
2012-09-24 18:13:57 +02:00
#ifdef TORRENT_OS2
int _System __libsocket_sysctl(int* mib, u_int namelen, void *oldp, size_t *oldlenp, void *newp, size_t newlen);
#endif
2010-11-29 02:33:05 +01:00
bool parse_route(int s, rt_msghdr* rtm, ip_route* rt_info)
{
sockaddr* rti_info[RTAX_MAX];
2015-08-18 15:33:00 +02:00
sockaddr* sa = reinterpret_cast<sockaddr*>(rtm + 1);
for (int i = 0; i < RTAX_MAX; ++i)
{
if ((rtm->rtm_addrs & (1 << i)) == 0)
{
2016-07-09 22:26:26 +02:00
rti_info[i] = nullptr;
continue;
}
rti_info[i] = sa;
#define ROUNDUP(a) \
((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
2015-08-18 15:33:00 +02:00
sa = reinterpret_cast<sockaddr*>(reinterpret_cast<char*>(sa) + ROUNDUP(sa->sa_len));
#undef ROUNDUP
}
2008-01-12 10:35:11 +01:00
sa = rti_info[RTAX_GATEWAY];
2016-07-09 22:26:26 +02:00
if (sa == nullptr
|| rti_info[RTAX_DST] == nullptr
|| rti_info[RTAX_NETMASK] == nullptr
|| !valid_addr_family(sa->sa_family))
return false;
rt_info->gateway = sockaddr_to_address(rti_info[RTAX_GATEWAY]);
rt_info->destination = sockaddr_to_address(rti_info[RTAX_DST]);
2010-11-29 02:33:05 +01:00
rt_info->netmask = sockaddr_to_address(rti_info[RTAX_NETMASK]
, rt_info->destination.is_v4() ? AF_INET : AF_INET6);
if_indextoname(rtm->rtm_index, rt_info->name);
2010-11-29 02:33:05 +01:00
2016-06-22 01:05:22 +02:00
// TODO: get the MTU (and other interesting metrics) from the rt_msghdr instead
ifreq req = {};
2010-11-29 02:33:05 +01:00
if_indextoname(rtm->rtm_index, req.ifr_name);
2016-02-11 06:46:28 +01:00
// ignore errors here. This is best-effort
ioctl(s, siocgifmtu, &req);
2010-11-29 02:33:05 +01:00
rt_info->mtu = req.ifr_mtu;
return true;
}
#endif
#if TORRENT_USE_IFADDRS && !defined TORRENT_BUILD_SIMULATOR
2015-05-18 07:04:55 +02:00
bool iface_from_ifaddrs(ifaddrs *ifa, ip_interface &rv)
{
if (!valid_addr_family(ifa->ifa_addr->sa_family))
{
return false;
}
strncpy(rv.name, ifa->ifa_name, sizeof(rv.name));
rv.name[sizeof(rv.name)-1] = 0;
// determine address
rv.interface_address = sockaddr_to_address(ifa->ifa_addr);
// determine netmask
if (ifa->ifa_netmask != nullptr)
{
rv.netmask = sockaddr_to_address(ifa->ifa_netmask);
}
return true;
}
#endif
}} // <anonymous>
namespace libtorrent
{
2015-05-18 07:04:55 +02:00
2010-11-29 02:33:05 +01:00
// return (a1 & mask) == (a2 & mask)
bool match_addr_mask(address const& a1, address const& a2, address const& mask)
{
2010-11-29 02:33:05 +01:00
// all 3 addresses needs to belong to the same family
if (a1.is_v4() != a2.is_v4()) return false;
if (a1.is_v4() != mask.is_v4()) return false;
#if TORRENT_USE_IPV6
if (a1.is_v6())
{
address_v6::bytes_type b1;
address_v6::bytes_type b2;
address_v6::bytes_type m;
b1 = a1.to_v6().to_bytes();
b2 = a2.to_v6().to_bytes();
m = mask.to_v6().to_bytes();
for (std::size_t i = 0; i < b1.size(); ++i)
2014-03-10 06:53:49 +01:00
{
2010-11-29 02:33:05 +01:00
b1[i] &= m[i];
2014-03-10 06:53:49 +01:00
b2[i] &= m[i];
}
2017-01-14 00:27:09 +01:00
return std::memcmp(b1.data(), b2.data(), b1.size()) == 0;
2010-11-29 02:33:05 +01:00
}
#endif
return (a1.to_v4().to_ulong() & mask.to_v4().to_ulong())
== (a2.to_v4().to_ulong() & mask.to_v4().to_ulong());
}
2008-05-03 18:05:42 +02:00
bool in_local_network(io_service& ios, address const& addr, error_code& ec)
{
std::vector<ip_interface> net = enum_net_interfaces(ios, ec);
if (ec) return false;
2014-07-06 21:18:00 +02:00
return in_local_network(net, addr);
}
bool in_local_network(std::vector<ip_interface> const& net, address const& addr)
{
2017-01-14 00:27:09 +01:00
for (auto const& i : net)
{
2017-01-14 00:27:09 +01:00
if (match_addr_mask(addr, i.interface_address, i.netmask))
2014-03-10 06:53:49 +01:00
return true;
}
return false;
}
2010-11-29 02:33:05 +01:00
#if TORRENT_USE_GETIPFORWARDTABLE
2010-11-29 02:33:05 +01:00
address build_netmask(int bits, int family)
{
if (family == AF_INET)
{
typedef boost::asio::ip::address_v4::bytes_type bytes_t;
2010-11-29 02:33:05 +01:00
bytes_t b;
std::memset(&b[0], 0xff, b.size());
for (int i = int(sizeof(bytes_t)) / 8 - 1; i > 0; --i)
2010-11-29 02:33:05 +01:00
{
if (bits < 8)
{
b[i] <<= bits;
break;
}
b[i] = 0;
bits -= 8;
}
return address_v4(b);
}
#if TORRENT_USE_IPV6
else if (family == AF_INET6)
{
typedef boost::asio::ip::address_v6::bytes_type bytes_t;
2010-11-29 02:33:05 +01:00
bytes_t b;
std::memset(&b[0], 0xff, b.size());
for (int i = int(sizeof(bytes_t)) / 8 - 1; i > 0; --i)
2010-11-29 02:33:05 +01:00
{
if (bits < 8)
{
b[i] <<= bits;
break;
}
b[i] = 0;
bits -= 8;
}
return address_v6(b);
}
#endif
else
{
return address();
}
}
#endif
2015-05-18 07:04:55 +02:00
2008-05-03 18:05:42 +02:00
std::vector<ip_interface> enum_net_interfaces(io_service& ios, error_code& ec)
{
2015-05-18 07:04:55 +02:00
TORRENT_UNUSED(ios); // this may be unused depending on configuration
std::vector<ip_interface> ret;
#if defined TORRENT_BUILD_SIMULATOR
2015-08-21 14:03:16 +02:00
TORRENT_UNUSED(ec);
std::vector<address> ips = ios.get_ips();
for (int i = 0; i < int(ips.size()); ++i)
{
ip_interface wan;
wan.interface_address = ips[i];
wan.netmask = address_v4::from_string("255.255.255.255");
strcpy(wan.name, "eth0");
wan.mtu = ios.sim().config().path_mtu(ips[i], ips[i]);
ret.push_back(wan);
}
#elif TORRENT_USE_IFADDRS
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s < 0)
{
ec = error_code(errno, system_category());
return ret;
}
ifaddrs *ifaddr;
if (getifaddrs(&ifaddr) == -1)
{
ec = error_code(errno, system_category());
close(s);
return ret;
}
for (ifaddrs* ifa = ifaddr; ifa; ifa = ifa->ifa_next)
{
2016-07-09 22:26:26 +02:00
if (ifa->ifa_addr == nullptr) continue;
if ((ifa->ifa_flags & IFF_UP) == 0) continue;
if (valid_addr_family(ifa->ifa_addr->sa_family))
{
ip_interface iface;
2015-05-18 07:04:55 +02:00
if (iface_from_ifaddrs(ifa, iface))
{
ifreq req = {};
// -1 to leave a 0-terminator
std::strncpy(req.ifr_name, iface.name, IF_NAMESIZE - 1);
2016-02-11 06:46:28 +01:00
// ignore errors here. This is best-effort
ioctl(s, siocgifmtu, &req);
iface.mtu = req.ifr_mtu;
ret.push_back(iface);
}
}
}
close(s);
freeifaddrs(ifaddr);
// MacOS X, BSD and solaris
#elif TORRENT_USE_IFCONF
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s < 0)
{
ec = error_code(errno, system_category());
return ret;
}
ifconf ifc;
2012-05-12 18:15:36 +02:00
// make sure the buffer is aligned to hold ifreq structs
ifreq buf[40];
ifc.ifc_len = sizeof(buf);
ifc.ifc_buf = reinterpret_cast<char*>(buf);
if (ioctl(s, SIOCGIFCONF, &ifc) < 0)
{
ec = error_code(errno, system_category());
close(s);
return ret;
}
char *ifr = reinterpret_cast<char*>(ifc.ifc_req);
int remaining = ifc.ifc_len;
while (remaining > 0)
{
ifreq const& item = *reinterpret_cast<ifreq*>(ifr);
#ifdef _SIZEOF_ADDR_IFREQ
int current_size = _SIZEOF_ADDR_IFREQ(item);
#elif defined TORRENT_BSD
int current_size = item.ifr_addr.sa_len + IFNAMSIZ;
#else
int current_size = sizeof(ifreq);
#endif
if (remaining < current_size) break;
if (valid_addr_family(item.ifr_addr.sa_family))
2007-09-20 18:25:07 +02:00
{
ip_interface iface;
iface.interface_address = sockaddr_to_address(&item.ifr_addr);
strcpy(iface.name, item.ifr_name);
ifreq req = {};
// -1 to leave a 0-terminator
2011-02-24 05:25:35 +01:00
strncpy(req.ifr_name, item.ifr_name, IF_NAMESIZE - 1);
2015-08-18 16:42:03 +02:00
if (ioctl(s, siocgifmtu, &req) < 0)
2010-11-29 02:33:05 +01:00
{
ec = error_code(errno, system_category());
2010-11-29 02:33:05 +01:00
close(s);
return ret;
}
2012-09-24 18:13:57 +02:00
#ifndef TORRENT_OS2
2010-11-29 02:33:05 +01:00
iface.mtu = req.ifr_mtu;
2012-09-24 18:13:57 +02:00
#else
iface.mtu = req.ifr_metric; // according to tcp/ip reference
#endif
2010-11-29 02:33:05 +01:00
std::memset(&req, 0, sizeof(req));
2011-02-24 05:25:35 +01:00
strncpy(req.ifr_name, item.ifr_name, IF_NAMESIZE - 1);
2010-11-29 02:33:05 +01:00
if (ioctl(s, SIOCGIFNETMASK, &req) < 0)
{
2009-11-27 19:46:29 +01:00
#if TORRENT_USE_IPV6
if (iface.interface_address.is_v6())
{
// this is expected to fail (at least on MacOS X)
iface.netmask = address_v6::any();
}
else
2009-11-27 19:46:29 +01:00
#endif
{
ec = error_code(errno, system_category());
close(s);
return ret;
}
}
else
{
2010-11-29 02:33:05 +01:00
iface.netmask = sockaddr_to_address(&req.ifr_addr, item.ifr_addr.sa_family);
}
ret.push_back(iface);
}
ifr += current_size;
remaining -= current_size;
}
close(s);
#elif TORRENT_USE_GETADAPTERSADDRESSES
2010-12-01 06:47:18 +01:00
#if _WIN32_WINNT >= 0x0501
typedef ULONG (WINAPI *GetAdaptersAddresses_t)(ULONG,ULONG,PVOID,PIP_ADAPTER_ADDRESSES,PULONG);
// Get GetAdaptersAddresses() pointer
auto GetAdaptersAddresses =
aux::get_library_procedure<aux::iphlpapi, GetAdaptersAddresses_t>("GetAdaptersAddresses");
2010-11-29 02:33:05 +01:00
if (GetAdaptersAddresses != nullptr)
{
ULONG buf_size = 10000;
std::vector<char> buffer(buf_size);
PIP_ADAPTER_ADDRESSES adapter_addresses
= reinterpret_cast<IP_ADAPTER_ADDRESSES*>(&buffer[0]);
DWORD res = GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_SKIP_DNS_SERVER
| GAA_FLAG_SKIP_ANYCAST, nullptr, adapter_addresses, &buf_size);
if (res == ERROR_BUFFER_OVERFLOW)
{
buffer.resize(buf_size);
2016-03-01 00:14:10 +01:00
adapter_addresses = reinterpret_cast<IP_ADAPTER_ADDRESSES*>(&buffer[0]);
res = GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_SKIP_DNS_SERVER
| GAA_FLAG_SKIP_ANYCAST, nullptr, adapter_addresses, &buf_size);
}
if (res != NO_ERROR)
{
ec = error_code(WSAGetLastError(), system_category());
return std::vector<ip_interface>();
}
2010-11-29 02:33:05 +01:00
for (PIP_ADAPTER_ADDRESSES adapter = adapter_addresses;
adapter != 0; adapter = adapter->Next)
{
ip_interface r;
strncpy(r.name, adapter->AdapterName, sizeof(r.name));
r.name[sizeof(r.name)-1] = 0;
r.mtu = adapter->Mtu;
for (IP_ADAPTER_UNICAST_ADDRESS* unicast = adapter->FirstUnicastAddress;
unicast; unicast = unicast->Next)
2010-11-29 02:33:05 +01:00
{
2017-02-12 08:24:14 +01:00
if (!valid_addr_family(unicast->Address.lpSockaddr->sa_family))
continue;
r.interface_address = sockaddr_to_address(unicast->Address.lpSockaddr);
ret.push_back(r);
}
2010-11-29 02:33:05 +01:00
}
return ret;
2010-11-29 02:33:05 +01:00
}
2010-12-01 06:47:18 +01:00
#endif
2010-11-29 02:33:05 +01:00
SOCKET s = socket(AF_INET, SOCK_DGRAM, 0);
if (int(s) == SOCKET_ERROR)
{
ec = error_code(WSAGetLastError(), system_category());
return ret;
}
INTERFACE_INFO buffer[30];
DWORD size;
2015-05-18 07:04:55 +02:00
if (WSAIoctl(s, SIO_GET_INTERFACE_LIST, 0, 0, buffer,
sizeof(buffer), &size, 0, 0) != 0)
{
ec = error_code(WSAGetLastError(), system_category());
closesocket(s);
return ret;
}
closesocket(s);
int n = size / sizeof(INTERFACE_INFO);
ip_interface iface;
for (int i = 0; i < n; ++i)
{
iface.interface_address = sockaddr_to_address(&buffer[i].iiAddress.Address);
if (iface.interface_address == address_v4::any()) continue;
2010-11-29 02:33:05 +01:00
iface.netmask = sockaddr_to_address(&buffer[i].iiNetmask.Address
, iface.interface_address.is_v4() ? AF_INET : AF_INET6);
iface.name[0] = 0;
iface.mtu = 1500; // how to get the MTU?
ret.push_back(iface);
}
#else
2014-11-17 04:41:01 +01:00
#ifdef _MSC_VER
#pragma message ( "THIS OS IS NOT RECOGNIZED, enum_net_interfaces WILL PROBABLY NOT WORK" )
#else
#warning "THIS OS IS NOT RECOGNIZED, enum_net_interfaces WILL PROBABLY NOT WORK"
#endif
// make a best guess of the interface we're using and its IP
udp::resolver r(ios);
udp::resolver::iterator i = r.resolve(udp::resolver::query(boost::asio::ip::host_name(ec), "0"), ec);
if (ec) return ret;
ip_interface iface;
for (;i != udp::resolver_iterator(); ++i)
{
iface.interface_address = i->endpoint().address();
iface.name[0] = '\0';
2010-11-29 02:33:05 +01:00
iface.mtu = 1500;
if (iface.interface_address.is_v4())
iface.netmask = address_v4::netmask(iface.interface_address.to_v4());
ret.push_back(iface);
}
#endif
return ret;
}
address get_default_gateway(io_service& ios, error_code& ec)
{
std::vector<ip_route> ret = enum_routes(ios, ec);
2017-01-14 00:27:09 +01:00
auto const i = std::find_if(ret.begin(), ret.end()
, [](ip_route const& r) { return r.destination == address(); });
if (i == ret.end()) return address();
return i->gateway;
}
std::vector<ip_route> enum_routes(io_service& ios, error_code& ec)
{
std::vector<ip_route> ret;
2015-08-18 16:42:03 +02:00
TORRENT_UNUSED(ios);
2015-05-18 07:04:55 +02:00
#ifdef TORRENT_BUILD_SIMULATOR
2015-08-21 14:03:16 +02:00
TORRENT_UNUSED(ec);
std::vector<address> ips = ios.get_ips();
for (int i = 0; i < int(ips.size()); ++i)
{
ip_route r;
if (ips[i].is_v4())
{
r.destination = address_v4();
r.netmask = address_v4::from_string("255.255.255.0");
address_v4::bytes_type b = ips[i].to_v4().to_bytes();
b[3] = 1;
r.gateway = address_v4(b);
}
else
{
r.destination = address_v6();
r.netmask = address_v6::from_string("FFFF:FFFF:FFFF:FFFF::0");
address_v6::bytes_type b = ips[i].to_v6().to_bytes();
b[14] = 1;
r.gateway = address_v6(b);
}
strcpy(r.name, "eth0");
r.mtu = ios.sim().config().path_mtu(ips[i], ips[i]);
ret.push_back(r);
}
#elif TORRENT_USE_SYSCTL
/*
2008-01-11 10:38:05 +01:00
struct rt_msg
{
rt_msghdr m_rtm;
char buf[512];
};
rt_msg m;
int len = sizeof(rt_msg);
bzero(&m, len);
m.m_rtm.rtm_type = RTM_GET;
m.m_rtm.rtm_flags = RTF_UP | RTF_GATEWAY;
m.m_rtm.rtm_version = RTM_VERSION;
m.m_rtm.rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK;
2008-01-11 10:38:05 +01:00
m.m_rtm.rtm_seq = 0;
m.m_rtm.rtm_msglen = len;
int s = socket(PF_ROUTE, SOCK_RAW, AF_UNSPEC);
2008-01-11 10:38:05 +01:00
if (s == -1)
{
ec = error_code(errno, system_category());
return std::vector<ip_route>();
2008-01-11 10:38:05 +01:00
}
int n = write(s, &m, len);
if (n == -1)
{
ec = error_code(errno, system_category());
2008-01-11 10:38:05 +01:00
close(s);
return std::vector<ip_route>();
2008-01-11 10:38:05 +01:00
}
else if (n != len)
{
ec = boost::asio::error::operation_not_supported;
2008-01-11 10:38:05 +01:00
close(s);
return std::vector<ip_route>();
2008-01-11 10:38:05 +01:00
}
bzero(&m, len);
n = read(s, &m, len);
if (n == -1)
{
ec = error_code(errno, system_category());
2008-01-11 10:38:05 +01:00
close(s);
return std::vector<ip_route>();
2008-01-11 10:38:05 +01:00
}
for (rt_msghdr* ptr = &m.m_rtm; (char*)ptr < ((char*)&m.m_rtm) + n; ptr = (rt_msghdr*)(((char*)ptr) + ptr->rtm_msglen))
2008-01-11 10:38:05 +01:00
{
std::cout << " rtm_msglen: " << ptr->rtm_msglen << std::endl;
std::cout << " rtm_type: " << ptr->rtm_type << std::endl;
if (ptr->rtm_errno)
{
ec = error_code(ptr->rtm_errno, system_category());
return std::vector<ip_route>();
}
if (m.m_rtm.rtm_flags & RTF_UP == 0
|| m.m_rtm.rtm_flags & RTF_GATEWAY == 0)
{
ec = boost::asio::error::operation_not_supported;
return address_v4::any();
}
if (ptr->rtm_addrs & RTA_DST == 0
|| ptr->rtm_addrs & RTA_GATEWAY == 0
|| ptr->rtm_addrs & RTA_NETMASK == 0)
{
ec = boost::asio::error::operation_not_supported;
return std::vector<ip_route>();
}
if (ptr->rtm_msglen > len - ((char*)ptr - ((char*)&m.m_rtm)))
{
ec = boost::asio::error::operation_not_supported;
return std::vector<ip_route>();
}
int min_len = sizeof(rt_msghdr) + 2 * sizeof(sockaddr_in);
if (m.m_rtm.rtm_msglen < min_len)
{
ec = boost::asio::error::operation_not_supported;
return std::vector<ip_route>();
}
2008-01-11 10:38:05 +01:00
ip_route r;
// destination
char* p = m.buf;
sockaddr_in* sin = (sockaddr_in*)p;
r.destination = sockaddr_to_address((sockaddr*)p);
2008-01-11 10:38:05 +01:00
// gateway
p += sin->sin_len;
sin = (sockaddr_in*)p;
r.gateway = sockaddr_to_address((sockaddr*)p);
// netmask
p += sin->sin_len;
sin = (sockaddr_in*)p;
r.netmask = sockaddr_to_address((sockaddr*)p);
ret.push_back(r);
2008-01-11 10:38:05 +01:00
}
close(s);
*/
2017-01-14 00:27:09 +01:00
int mib[6] = {CTL_NET, PF_ROUTE, 0, AF_UNSPEC, NET_RT_DUMP, 0};
2008-01-11 10:38:05 +01:00
2017-01-14 00:27:09 +01:00
std::size_t needed = 0;
2012-09-24 18:13:57 +02:00
#ifdef TORRENT_OS2
if (__libsocket_sysctl(mib, 6, 0, &needed, 0, 0) < 0)
#else
2016-07-09 22:26:26 +02:00
if (sysctl(mib, 6, nullptr, &needed, nullptr, 0) < 0)
2012-09-24 18:13:57 +02:00
#endif
{
ec = error_code(errno, system_category());
return std::vector<ip_route>();
}
2008-01-11 10:38:05 +01:00
if (needed <= 0)
{
return std::vector<ip_route>();
}
std::unique_ptr<char[]> buf(new (std::nothrow) char[needed]);
2016-07-09 22:26:26 +02:00
if (buf.get() == nullptr)
{
ec = boost::asio::error::no_memory;
return std::vector<ip_route>();
}
2012-09-24 18:13:57 +02:00
#ifdef TORRENT_OS2
if (__libsocket_sysctl(mib, 6, buf.get(), &needed, 0, 0) < 0)
#else
2016-07-09 22:26:26 +02:00
if (sysctl(mib, 6, buf.get(), &needed, nullptr, 0) < 0)
2012-09-24 18:13:57 +02:00
#endif
{
ec = error_code(errno, system_category());
return std::vector<ip_route>();
}
char* end = buf.get() + needed;
2010-11-29 02:33:05 +01:00
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s < 0)
{
ec = error_code(errno, system_category());
2010-11-29 02:33:05 +01:00
return std::vector<ip_route>();
}
rt_msghdr* rtm;
for (char* next = buf.get(); next < end; next += rtm->rtm_msglen)
{
2015-08-18 15:33:00 +02:00
rtm = reinterpret_cast<rt_msghdr*>(next);
2016-06-22 01:05:22 +02:00
if (rtm->rtm_version != RTM_VERSION
|| rtm->rtm_type != RTM_ADD)
{
continue;
2016-06-22 01:05:22 +02:00
}
2015-05-18 07:04:55 +02:00
ip_route r;
2010-11-29 02:33:05 +01:00
if (parse_route(s, rtm, &r)) ret.push_back(r);
}
2010-11-29 02:33:05 +01:00
close(s);
2015-05-18 07:04:55 +02:00
#elif TORRENT_USE_GETIPFORWARDTABLE
2010-11-29 02:33:05 +01:00
/*
move this to enum_net_interfaces
// Get GetAdaptersInfo() pointer
typedef DWORD (WINAPI *GetAdaptersInfo_t)(PIP_ADAPTER_INFO, PULONG);
GetAdaptersInfo_t GetAdaptersInfo = get_library_procedure<iphlpapi, GetAdaptersInfo_t>("GetAdaptersInfo");
if (GetAdaptersInfo == nullptr)
{
ec = boost::asio::error::operation_not_supported;
return std::vector<ip_route>();
}
PIP_ADAPTER_INFO adapter_info = 0;
ULONG out_buf_size = 0;
if (GetAdaptersInfo(adapter_info, &out_buf_size) != ERROR_BUFFER_OVERFLOW)
{
ec = boost::asio::error::operation_not_supported;
return std::vector<ip_route>();
}
adapter_info = (IP_ADAPTER_INFO*)malloc(out_buf_size);
if (!adapter_info)
{
ec = boost::asio::error::no_memory;
return std::vector<ip_route>();
}
if (GetAdaptersInfo(adapter_info, &out_buf_size) == NO_ERROR)
{
2008-01-11 10:38:05 +01:00
for (PIP_ADAPTER_INFO adapter = adapter_info;
adapter != 0; adapter = adapter->Next)
{
ip_route r;
2008-05-06 21:13:59 +02:00
r.destination = address::from_string(adapter->IpAddressList.IpAddress.String, ec);
r.gateway = address::from_string(adapter->GatewayList.IpAddress.String, ec);
r.netmask = address::from_string(adapter->IpAddressList.IpMask.String, ec);
2008-05-06 21:13:59 +02:00
strncpy(r.name, adapter->AdapterName, sizeof(r.name));
2008-01-11 10:38:05 +01:00
if (ec)
{
2008-05-03 18:05:42 +02:00
ec = error_code();
2008-01-11 10:38:05 +01:00
continue;
}
ret.push_back(r);
}
}
2010-11-29 02:33:05 +01:00
// Free memory
free(adapter_info);
2010-11-29 02:33:05 +01:00
*/
2011-04-10 05:45:13 +02:00
typedef DWORD (WINAPI *GetIfEntry_t)(PMIB_IFROW pIfRow);
auto GetIfEntry = aux::get_library_procedure<aux::iphlpapi, GetIfEntry_t>("GetIfEntry");
if (GetIfEntry == nullptr)
2011-04-10 05:45:13 +02:00
{
ec = boost::asio::error::operation_not_supported;
2011-04-10 05:45:13 +02:00
return std::vector<ip_route>();
}
2010-12-01 06:47:18 +01:00
#if _WIN32_WINNT >= 0x0600
2010-11-29 02:33:05 +01:00
typedef DWORD (WINAPI *GetIpForwardTable2_t)(
ADDRESS_FAMILY, PMIB_IPFORWARD_TABLE2*);
typedef void (WINAPI *FreeMibTable_t)(PVOID Memory);
2015-05-18 07:04:55 +02:00
auto GetIpForwardTable2 = aux::get_library_procedure<aux::iphlpapi, GetIpForwardTable2_t>("GetIpForwardTable2");
auto FreeMibTable = aux::get_library_procedure<aux::iphlpapi, FreeMibTable_t>("FreeMibTable");
if (GetIpForwardTable2 != nullptr && FreeMibTable != nullptr)
2010-11-29 02:33:05 +01:00
{
MIB_IPFORWARD_TABLE2* routes = nullptr;
2010-11-29 02:33:05 +01:00
int res = GetIpForwardTable2(AF_UNSPEC, &routes);
if (res == NO_ERROR)
{
for (int i = 0; i < int(routes->NumEntries); ++i)
2010-11-29 02:33:05 +01:00
{
ip_route r;
r.gateway = sockaddr_to_address((const sockaddr*)&routes->Table[i].NextHop);
r.destination = sockaddr_to_address(
(const sockaddr*)&routes->Table[i].DestinationPrefix.Prefix);
r.netmask = build_netmask(routes->Table[i].SitePrefixLength
, routes->Table[i].DestinationPrefix.Prefix.si_family);
MIB_IFROW ifentry;
ifentry.dwIndex = routes->Table[i].InterfaceIndex;
if (GetIfEntry(&ifentry) == NO_ERROR)
{
wcstombs(r.name, ifentry.wszName, sizeof(r.name));
r.mtu = ifentry.dwMtu;
ret.push_back(r);
}
}
}
if (routes) FreeMibTable(routes);
return ret;
}
2010-12-01 06:47:18 +01:00
#endif
2010-11-29 02:33:05 +01:00
// Get GetIpForwardTable() pointer
typedef DWORD (WINAPI *GetIpForwardTable_t)(PMIB_IPFORWARDTABLE pIpForwardTable,PULONG pdwSize,BOOL bOrder);
2015-05-18 07:04:55 +02:00
auto GetIpForwardTable = aux::get_library_procedure<aux::iphlpapi, GetIpForwardTable_t>("GetIpForwardTable");
if (GetIpForwardTable == nullptr)
2010-11-29 02:33:05 +01:00
{
ec = boost::asio::error::operation_not_supported;
2010-11-29 02:33:05 +01:00
return std::vector<ip_route>();
}
MIB_IPFORWARDTABLE* routes = nullptr;
2010-11-29 02:33:05 +01:00
ULONG out_buf_size = 0;
if (GetIpForwardTable(routes, &out_buf_size, FALSE) != ERROR_INSUFFICIENT_BUFFER)
{
ec = boost::asio::error::operation_not_supported;
2010-11-29 02:33:05 +01:00
return std::vector<ip_route>();
}
routes = (MIB_IPFORWARDTABLE*)malloc(out_buf_size);
if (!routes)
{
ec = boost::asio::error::no_memory;
2010-11-29 02:33:05 +01:00
return std::vector<ip_route>();
}
if (GetIpForwardTable(routes, &out_buf_size, FALSE) == NO_ERROR)
{
for (int i = 0; i < int(routes->dwNumEntries); ++i)
2010-11-29 02:33:05 +01:00
{
ip_route r;
r.destination = inaddr_to_address((in_addr const*)&routes->table[i].dwForwardDest);
r.netmask = inaddr_to_address((in_addr const*)&routes->table[i].dwForwardMask);
r.gateway = inaddr_to_address((in_addr const*)&routes->table[i].dwForwardNextHop);
MIB_IFROW ifentry;
ifentry.dwIndex = routes->table[i].dwForwardIfIndex;
if (GetIfEntry(&ifentry) == NO_ERROR)
{
wcstombs(r.name, ifentry.wszName, sizeof(r.name));
r.name[sizeof(r.name)-1] = 0;
r.mtu = ifentry.dwMtu;
ret.push_back(r);
}
}
}
// Free memory
free(routes);
#elif TORRENT_USE_NETLINK
enum { BUFSIZE = 8192 };
int sock = socket(PF_ROUTE, SOCK_DGRAM, NETLINK_ROUTE);
if (sock < 0)
{
ec = error_code(errno, system_category());
2008-04-28 03:23:11 +02:00
return std::vector<ip_route>();
}
int seq = 0;
char msg[BUFSIZE] = {};
nlmsghdr* nl_msg = reinterpret_cast<nlmsghdr*>(msg);
2008-04-27 06:51:28 +02:00
nl_msg->nlmsg_len = NLMSG_LENGTH(sizeof(rtmsg));
nl_msg->nlmsg_type = RTM_GETROUTE;
nl_msg->nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST;
nl_msg->nlmsg_seq = seq++;
nl_msg->nlmsg_pid = std::uint32_t(getpid());
if (send(sock, nl_msg, nl_msg->nlmsg_len, 0) < 0)
{
ec = error_code(errno, system_category());
close(sock);
2008-04-28 03:23:11 +02:00
return std::vector<ip_route>();
}
int len = read_nl_sock(sock, msg, BUFSIZE, seq, getpid());
if (len < 0)
{
ec = error_code(errno, system_category());
close(sock);
2008-04-28 03:23:11 +02:00
return std::vector<ip_route>();
}
2010-11-29 02:33:05 +01:00
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s < 0)
{
ec = error_code(errno, system_category());
2010-11-29 02:33:05 +01:00
return std::vector<ip_route>();
}
#ifdef __clang__
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wcast-align"
// NLMSG_OK uses signed/unsigned compare in the same expression
#pragma clang diagnostic ignored "-Wsign-compare"
#endif
for (; NLMSG_OK(nl_msg, len); nl_msg = NLMSG_NEXT(nl_msg, len))
{
ip_route r;
2010-11-29 02:33:05 +01:00
if (parse_route(s, nl_msg, &r)) ret.push_back(r);
}
#ifdef __clang__
#pragma clang diagnostic pop
#endif
2010-11-29 02:33:05 +01:00
close(s);
close(sock);
#endif
return ret;
}
2014-07-06 21:18:00 +02:00
// returns the device name whose local address is ``addr``. If
// no such device is found, an empty string is returned.
std::string device_for_address(address addr, io_service& ios, error_code& ec)
{
std::vector<ip_interface> ifs = enum_net_interfaces(ios, ec);
if (ec) return std::string();
for (auto const& iface : ifs)
if (iface.interface_address == addr) return iface.name;
2014-07-06 21:18:00 +02:00
return std::string();
}
}