/* Copyright (c) 2007-2018, Arvid Norberg All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "libtorrent/config.hpp" #include "libtorrent/enum_net.hpp" #include "libtorrent/broadcast_socket.hpp" #include "libtorrent/assert.hpp" #include "libtorrent/aux_/socket_type.hpp" #include "libtorrent/span.hpp" #ifdef TORRENT_WINDOWS #include "libtorrent/aux_/win_util.hpp" #endif #include #include // for wcstombscstombs #include "libtorrent/aux_/disable_warnings_push.hpp" #include #include #if TORRENT_USE_IFCONF #include #include #include #include #include #endif #if TORRENT_USE_SYSCTL #include #ifdef __APPLE__ #include "TargetConditionals.h" #endif #if defined TARGET_IPHONE_SIMULATOR || defined TARGET_OS_IPHONE // net/route.h is not included in the iphone sdk. #include "libtorrent/aux_/route.h" #else #include #endif #endif // TORRENT_USE_SYSCTL #if TORRENT_USE_GETIPFORWARDTABLE || TORRENT_USE_GETADAPTERSADDRESSES #include "libtorrent/aux_/windows.hpp" #include #endif #if TORRENT_USE_NETLINK #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #if defined TORRENT_ANDROID && !defined IFA_F_DADFAILED #define IFA_F_DADFAILED 8 #endif #endif #if TORRENT_USE_IFADDRS #include #endif #if TORRENT_USE_IFADDRS || TORRENT_USE_IFCONF || TORRENT_USE_NETLINK || TORRENT_USE_SYSCTL // capture this here where warnings are disabled (the macro generates warnings) const unsigned long siocgifmtu = SIOCGIFMTU; #endif #include "libtorrent/aux_/disable_warnings_pop.hpp" #if defined(TORRENT_OS2) && !defined(IF_NAMESIZE) #define IF_NAMESIZE IFNAMSIZ #endif namespace libtorrent { namespace { #if !defined TORRENT_BUILD_SIMULATOR address_v4 inaddr_to_address(void const* ina, int const len = 4) { boost::asio::ip::address_v4::bytes_type b = {}; if (len > 0) std::memcpy(b.data(), ina, std::min(std::size_t(len), b.size())); return address_v4(b); } address_v6 inaddr6_to_address(void const* ina6, int const len = 16) { boost::asio::ip::address_v6::bytes_type b = {}; if (len > 0) std::memcpy(b.data(), ina6, std::min(std::size_t(len), b.size())); return address_v6(b); } #if !TORRENT_USE_NETLINK int sockaddr_len(sockaddr const* sin) { #if TORRENT_HAS_SALEN return sin->sa_len; #else return sin->sa_family == AF_INET ? sizeof(sockaddr_in) : sizeof(sockaddr_in6); #endif } address sockaddr_to_address(sockaddr const* sin, int assume_family = -1) { if (sin->sa_family == AF_INET || assume_family == AF_INET) return inaddr_to_address(&reinterpret_cast(sin)->sin_addr , sockaddr_len(sin) - int(offsetof(sockaddr, sa_data))); else if (sin->sa_family == AF_INET6 || assume_family == AF_INET6) { auto saddr = reinterpret_cast(sin); auto ret = inaddr6_to_address(&saddr->sin6_addr , sockaddr_len(sin) - int(offsetof(sockaddr, sa_data))); ret.scope_id(saddr->sin6_scope_id); return ret; } return address(); } #endif bool valid_addr_family(int family) { return (family == AF_INET || family == AF_INET6 ); } #if TORRENT_USE_NETLINK int read_nl_sock(int sock, span buf, std::uint32_t const seq, std::uint32_t const pid) { nlmsghdr* nl_hdr; int msg_len = 0; for (;;) { auto next_msg = buf.subspan(msg_len); int const read_len = int(recv(sock, next_msg.data(), static_cast(next_msg.size()), 0)); if (read_len < 0) return -1; nl_hdr = reinterpret_cast(next_msg.data()); #ifdef __clang__ #pragma clang diagnostic push // NLMSG_OK uses signed/unsigned compare in the same expression #pragma clang diagnostic ignored "-Wsign-compare" #endif if ((NLMSG_OK(nl_hdr, read_len) == 0) || (nl_hdr->nlmsg_type == NLMSG_ERROR)) return -1; #ifdef __clang__ #pragma clang diagnostic pop #endif // this function doesn't handle multiple requests at the same time // so report an error if the message does not have the expected seq and pid if (nl_hdr->nlmsg_seq != seq || nl_hdr->nlmsg_pid != pid) return -1; if (nl_hdr->nlmsg_type == NLMSG_DONE) break; msg_len += read_len; if ((nl_hdr->nlmsg_flags & NLM_F_MULTI) == 0) break; } return msg_len; } constexpr int NL_BUFSIZE = 8192; int nl_dump_request(int sock, std::uint16_t type, std::uint32_t seq, char family, span msg, std::size_t msg_len) { nlmsghdr* nl_msg = reinterpret_cast(msg.data()); nl_msg->nlmsg_len = std::uint32_t(NLMSG_LENGTH(msg_len)); nl_msg->nlmsg_type = type; nl_msg->nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST; nl_msg->nlmsg_seq = seq; // in theory nlmsg_pid should be set to the netlink port ID (NOT the process ID) // of the sender, but the kernel ignores this field so it is typically set to // zero nl_msg->nlmsg_pid = 0; // first byte of routing messages is always the family msg[sizeof(nlmsghdr)] = family; if (::send(sock, nl_msg, nl_msg->nlmsg_len, 0) < 0) { return -1; } // get the socket's port ID so that we can verify it in the repsonse sockaddr_nl sock_addr; socklen_t sock_addr_len = sizeof(sock_addr); if (::getsockname(sock, reinterpret_cast(&sock_addr), &sock_addr_len) < 0) { return -1; } return read_nl_sock(sock, msg, seq, sock_addr.nl_pid); } address to_address(int const address_family, void const* in) { if (address_family == AF_INET6) return inaddr6_to_address(in); else return inaddr_to_address(in); } bool parse_route(int s, nlmsghdr* nl_hdr, ip_route* rt_info) { rtmsg* rt_msg = reinterpret_cast(NLMSG_DATA(nl_hdr)); if (!valid_addr_family(rt_msg->rtm_family)) return false; // make sure the defaults have the right address family // in case the attributes are not present if (rt_msg->rtm_family == AF_INET6) { rt_info->gateway = address_v6(); rt_info->destination = address_v6(); } int if_index = 0; auto rt_len = RTM_PAYLOAD(nl_hdr); #ifdef __clang__ #pragma clang diagnostic push #pragma clang diagnostic ignored "-Wcast-align" #endif for (rtattr* rt_attr = reinterpret_cast(RTM_RTA(rt_msg)); RTA_OK(rt_attr, rt_len); rt_attr = RTA_NEXT(rt_attr, rt_len)) { switch(rt_attr->rta_type) { case RTA_OIF: if_index = *reinterpret_cast(RTA_DATA(rt_attr)); break; case RTA_GATEWAY: rt_info->gateway = to_address(rt_msg->rtm_family, RTA_DATA(rt_attr)); break; case RTA_DST: rt_info->destination = to_address(rt_msg->rtm_family, RTA_DATA(rt_attr)); break; case RTA_PREFSRC: rt_info->source_hint = to_address(rt_msg->rtm_family, RTA_DATA(rt_attr)); break; } } #ifdef __clang__ #pragma clang diagnostic pop #endif if (rt_info->gateway.is_v6() && rt_info->gateway.to_v6().is_link_local()) { address_v6 gateway6 = rt_info->gateway.to_v6(); gateway6.scope_id(std::uint32_t(if_index)); rt_info->gateway = gateway6; } ifreq req = {}; ::if_indextoname(std::uint32_t(if_index), req.ifr_name); static_assert(sizeof(rt_info->name) >= sizeof(req.ifr_name), "ip_route::name is too small"); std::memcpy(rt_info->name, req.ifr_name, sizeof(req.ifr_name)); ::ioctl(s, ::siocgifmtu, &req); rt_info->mtu = req.ifr_mtu; rt_info->netmask = build_netmask(rt_msg->rtm_dst_len, rt_msg->rtm_family); return true; } bool parse_nl_address(nlmsghdr* nl_hdr, ip_interface* ip_info) { ifaddrmsg* addr_msg = reinterpret_cast(NLMSG_DATA(nl_hdr)); if (!valid_addr_family(addr_msg->ifa_family)) return false; ip_info->preferred = (addr_msg->ifa_flags & (IFA_F_DADFAILED | IFA_F_DEPRECATED | IFA_F_TENTATIVE)) == 0; ip_info->netmask = build_netmask(addr_msg->ifa_prefixlen, addr_msg->ifa_family); ip_info->interface_address = address(); int rt_len = int(IFA_PAYLOAD(nl_hdr)); #ifdef __clang__ #pragma clang diagnostic push #pragma clang diagnostic ignored "-Wcast-align" #endif for (rtattr* rt_attr = reinterpret_cast(IFA_RTA(addr_msg)); RTA_OK(rt_attr, rt_len); rt_attr = RTA_NEXT(rt_attr, rt_len)) { switch(rt_attr->rta_type) { case IFA_ADDRESS: // if this is a point-to-point link then IFA_LOCAL holds // the local address while IFA_ADDRESS is the destination // don't overwrite the former with the latter if (!ip_info->interface_address.is_unspecified()) break; BOOST_FALLTHROUGH; case IFA_LOCAL: if (addr_msg->ifa_family == AF_INET6) { address_v6 addr = inaddr6_to_address(RTA_DATA(rt_attr)); if (addr_msg->ifa_scope == RT_SCOPE_LINK) addr.scope_id(addr_msg->ifa_index); ip_info->interface_address = addr; } else { ip_info->interface_address = inaddr_to_address(RTA_DATA(rt_attr)); } break; } } #ifdef __clang__ #pragma clang diagnostic pop #endif static_assert(sizeof(ip_info->name) >= IF_NAMESIZE, "not enough space in ip_interface::name"); if_indextoname(addr_msg->ifa_index, ip_info->name); return true; } #endif // TORRENT_USE_NETLINK #endif // !BUILD_SIMULATOR #if TORRENT_USE_SYSCTL && !defined TORRENT_BUILD_SIMULATOR #ifdef TORRENT_OS2 int _System __libsocket_sysctl(int* mib, u_int namelen, void *oldp, size_t *oldlenp, void *newp, size_t newlen); #endif bool parse_route(int, rt_msghdr* rtm, ip_route* rt_info) { sockaddr* rti_info[RTAX_MAX]; auto* sa = reinterpret_cast(rtm + 1); for (int i = 0; i < RTAX_MAX; ++i) { if ((rtm->rtm_addrs & (1 << i)) == 0) { rti_info[i] = nullptr; continue; } rti_info[i] = sa; #define ROUNDUP(a) \ ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) sa = reinterpret_cast(reinterpret_cast(sa) + ROUNDUP(sa->sa_len)); #undef ROUNDUP } sa = rti_info[RTAX_GATEWAY]; if (sa == nullptr || rti_info[RTAX_DST] == nullptr || rti_info[RTAX_NETMASK] == nullptr || !valid_addr_family(sa->sa_family)) return false; rt_info->gateway = sockaddr_to_address(rti_info[RTAX_GATEWAY]); rt_info->destination = sockaddr_to_address(rti_info[RTAX_DST]); rt_info->netmask = sockaddr_to_address(rti_info[RTAX_NETMASK] , rt_info->destination.is_v4() ? AF_INET : AF_INET6); if_indextoname(rtm->rtm_index, rt_info->name); if (rti_info[RTAX_IFA]) rt_info->source_hint = sockaddr_to_address(rti_info[RTAX_IFA]); return true; } #endif #if TORRENT_USE_IFADDRS && !defined TORRENT_BUILD_SIMULATOR bool iface_from_ifaddrs(ifaddrs *ifa, ip_interface &rv) { if (!valid_addr_family(ifa->ifa_addr->sa_family)) { return false; } std::strncpy(rv.name, ifa->ifa_name, sizeof(rv.name) - 1); rv.name[sizeof(rv.name) - 1] = '\0'; // determine address rv.interface_address = sockaddr_to_address(ifa->ifa_addr); // determine netmask if (ifa->ifa_netmask != nullptr) { rv.netmask = sockaddr_to_address(ifa->ifa_netmask); } return true; } #endif void build_netmask_impl(span mask, int prefix_bits) { TORRENT_ASSERT(prefix_bits <= mask.size() * 8); TORRENT_ASSERT(prefix_bits >= 0); int i = 0; while (prefix_bits >= 8) { mask[i] = 0xff; prefix_bits -= 8; ++i; } if (i < mask.size()) { mask[i] = (0xff << (8 - prefix_bits)) & 0xff; ++i; while (i < mask.size()) { mask[i] = 0; ++i; } } } } // int family(address const& a) { return a.is_v4() ? AF_INET : AF_INET6; } address build_netmask(int prefix_bits, int const family) { if (family == AF_INET) { address_v4::bytes_type b; build_netmask_impl(b, prefix_bits); return address_v4(b); } else if (family == AF_INET6) { address_v6::bytes_type b; build_netmask_impl(b, prefix_bits); return address_v6(b); } return {}; } // return (a1 & mask) == (a2 & mask) bool match_addr_mask(address const& a1, address const& a2, address const& mask) { // all 3 addresses needs to belong to the same family if (a1.is_v4() != a2.is_v4()) return false; if (a1.is_v4() != mask.is_v4()) return false; if (a1.is_v6()) { if (a1.to_v6().scope_id() != a2.to_v6().scope_id()) return false; address_v6::bytes_type b1 = a1.to_v6().to_bytes(); address_v6::bytes_type b2 = a2.to_v6().to_bytes(); address_v6::bytes_type m = mask.to_v6().to_bytes(); for (std::size_t i = 0; i < b1.size(); ++i) { b1[i] &= m[i]; b2[i] &= m[i]; } return b1 == b2; } return (a1.to_v4().to_ulong() & mask.to_v4().to_ulong()) == (a2.to_v4().to_ulong() & mask.to_v4().to_ulong()); } std::vector enum_net_interfaces(io_service& ios, error_code& ec) { TORRENT_UNUSED(ios); // this may be unused depending on configuration std::vector ret; ec.clear(); #if defined TORRENT_BUILD_SIMULATOR std::vector
ips = ios.get_ips(); for (auto const& ip : ips) { ip_interface wan; wan.interface_address = ip; if (ip.is_v4()) wan.netmask = address_v4::from_string("255.0.0.0"); else wan.netmask = address_v6::from_string("ffff::"); std::strcpy(wan.name, "eth0"); std::strcpy(wan.friendly_name, "Ethernet"); std::strcpy(wan.description, "Simulator Ethernet Adapter"); ret.push_back(wan); } #elif TORRENT_USE_NETLINK int sock = ::socket(PF_ROUTE, SOCK_DGRAM, NETLINK_ROUTE); if (sock < 0) { ec = error_code(errno, system_category()); return ret; } char msg[NL_BUFSIZE] = {}; nlmsghdr* nl_msg = reinterpret_cast(msg); int len = nl_dump_request(sock, RTM_GETADDR, 0, AF_PACKET, msg, sizeof(ifaddrmsg)); if (len < 0) { ec = error_code(errno, system_category()); ::close(sock); return ret; } #ifdef __clang__ #pragma clang diagnostic push #pragma clang diagnostic ignored "-Wcast-align" // NLMSG_OK uses signed/unsigned compare in the same expression #pragma clang diagnostic ignored "-Wsign-compare" #endif for (; NLMSG_OK(nl_msg, len); nl_msg = NLMSG_NEXT(nl_msg, len)) { ip_interface iface; if (parse_nl_address(nl_msg, &iface)) ret.push_back(iface); } #ifdef __clang__ #pragma clang diagnostic pop #endif ::close(sock); #elif TORRENT_USE_IFADDRS int s = ::socket(AF_INET, SOCK_DGRAM, 0); if (s < 0) { ec = error_code(errno, system_category()); return ret; } ifaddrs *ifaddr; if (getifaddrs(&ifaddr) == -1) { ec = error_code(errno, system_category()); ::close(s); return ret; } for (ifaddrs* ifa = ifaddr; ifa != nullptr; ifa = ifa->ifa_next) { if (ifa->ifa_addr == nullptr) continue; if ((ifa->ifa_flags & IFF_UP) == 0) continue; if (valid_addr_family(ifa->ifa_addr->sa_family)) { ip_interface iface; if (iface_from_ifaddrs(ifa, iface)) ret.push_back(iface); } } ::close(s); freeifaddrs(ifaddr); // MacOS X, BSD and solaris #elif TORRENT_USE_IFCONF int s = ::socket(AF_INET, SOCK_DGRAM, 0); if (s < 0) { ec = error_code(errno, system_category()); return ret; } ifconf ifc; // make sure the buffer is aligned to hold ifreq structs ifreq buf[40]; ifc.ifc_len = sizeof(buf); ifc.ifc_buf = reinterpret_cast(buf); if (ioctl(s, SIOCGIFCONF, &ifc) < 0) { ec = error_code(errno, system_category()); ::close(s); return ret; } char *ifr = reinterpret_cast(ifc.ifc_req); int remaining = ifc.ifc_len; while (remaining > 0) { ifreq const& item = *reinterpret_cast(ifr); #ifdef _SIZEOF_ADDR_IFREQ int current_size = _SIZEOF_ADDR_IFREQ(item); #elif defined TORRENT_BSD int current_size = item.ifr_addr.sa_len + IFNAMSIZ; #else int current_size = sizeof(ifreq); #endif if (remaining < current_size) break; if (valid_addr_family(item.ifr_addr.sa_family)) { ip_interface iface; iface.interface_address = sockaddr_to_address(&item.ifr_addr); std::strncpy(iface.name, item.ifr_name, sizeof(iface.name) - 1); iface.name[sizeof(iface.name) - 1] = '\0'; ifreq req = {}; std::strncpy(req.ifr_name, item.ifr_name, IF_NAMESIZE - 1); if (ioctl(s, SIOCGIFNETMASK, &req) < 0) { if (iface.interface_address.is_v6()) { // this is expected to fail (at least on MacOS X) iface.netmask = address_v6::any(); } else { ec = error_code(errno, system_category()); ::close(s); return ret; } } else { iface.netmask = sockaddr_to_address(&req.ifr_addr, item.ifr_addr.sa_family); } ret.push_back(iface); } ifr += current_size; remaining -= current_size; } ::close(s); #elif TORRENT_USE_GETADAPTERSADDRESSES #if _WIN32_WINNT >= 0x0501 using GetAdaptersAddresses_t = ULONG (WINAPI *)(ULONG,ULONG,PVOID,PIP_ADAPTER_ADDRESSES,PULONG); // Get GetAdaptersAddresses() pointer auto GetAdaptersAddresses = aux::get_library_procedure("GetAdaptersAddresses"); if (GetAdaptersAddresses != nullptr) { ULONG buf_size = 10000; std::vector buffer(buf_size); PIP_ADAPTER_ADDRESSES adapter_addresses = reinterpret_cast(&buffer[0]); DWORD res = GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST, nullptr, adapter_addresses, &buf_size); if (res == ERROR_BUFFER_OVERFLOW) { buffer.resize(buf_size); adapter_addresses = reinterpret_cast(&buffer[0]); res = GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST, nullptr, adapter_addresses, &buf_size); } if (res != NO_ERROR) { ec = error_code(WSAGetLastError(), system_category()); return std::vector(); } for (PIP_ADAPTER_ADDRESSES adapter = adapter_addresses; adapter != 0; adapter = adapter->Next) { ip_interface r; std::strncpy(r.name, adapter->AdapterName, sizeof(r.name) - 1); r.name[sizeof(r.name) - 1] = '\0'; wcstombs(r.friendly_name, adapter->FriendlyName, sizeof(r.friendly_name)); r.friendly_name[sizeof(r.friendly_name) - 1] = '\0'; wcstombs(r.description, adapter->Description, sizeof(r.description)); r.description[sizeof(r.description) - 1] = '\0'; for (IP_ADAPTER_UNICAST_ADDRESS* unicast = adapter->FirstUnicastAddress; unicast; unicast = unicast->Next) { auto const family = unicast->Address.lpSockaddr->sa_family; if (!valid_addr_family(family)) continue; r.preferred = unicast->DadState == IpDadStatePreferred; r.interface_address = sockaddr_to_address(unicast->Address.lpSockaddr); int const max_prefix_len = family == AF_INET ? 32 : 128; if (unicast->Length <= offsetof(IP_ADAPTER_UNICAST_ADDRESS, OnLinkPrefixLength)) { // OnLinkPrefixLength is only present on Vista and newer. If // we're running on XP, we don't have the netmask. r.netmask = (family == AF_INET) ? address(address_v4()) : address(address_v6()); ret.push_back(r); continue; } if (family == AF_INET6 && unicast->OnLinkPrefixLength == 128 && (unicast->PrefixOrigin == IpPrefixOriginDhcp || unicast->SuffixOrigin == IpSuffixOriginRandom)) { // DHCPv6 does not specify a subnet mask (it should be taken from the RA) // but apparently MS didn't get the memo and incorrectly reports a // prefix length of 128 for DHCPv6 assigned addresses // 128 is also reported for privacy addresses despite claiming to // have gotten the prefix length from the RA *shrug* // use a 64 bit prefix in these cases since that is likely to be // the correct value, or at least less wrong than 128 r.netmask = build_netmask(64, family); } else if (unicast->OnLinkPrefixLength <= max_prefix_len) { r.netmask = build_netmask(unicast->OnLinkPrefixLength, family); } else { // we don't know what the netmask is r.netmask = (family == AF_INET) ? address(address_v4()) : address(address_v6()); } ret.push_back(r); } } return ret; } #endif SOCKET s = ::socket(AF_INET, SOCK_DGRAM, 0); if (int(s) == SOCKET_ERROR) { ec = error_code(WSAGetLastError(), system_category()); return ret; } INTERFACE_INFO buffer[30]; DWORD size; if (WSAIoctl(s, SIO_GET_INTERFACE_LIST, 0, 0, buffer, sizeof(buffer), &size, 0, 0) != 0) { ec = error_code(WSAGetLastError(), system_category()); closesocket(s); return ret; } closesocket(s); int n = size / sizeof(INTERFACE_INFO); for (int i = 0; i < n; ++i) { ip_interface iface; iface.interface_address = sockaddr_to_address(&buffer[i].iiAddress.Address); if (iface.interface_address == address_v4::any()) continue; iface.netmask = sockaddr_to_address(&buffer[i].iiNetmask.Address , iface.interface_address.is_v4() ? AF_INET : AF_INET6); ret.push_back(iface); } #else #error "Don't know how to enumerate network interfaces on this platform" #endif return ret; } boost::optional
get_gateway(ip_interface const& iface, span routes) { bool const v4 = iface.interface_address.is_v4(); // local IPv6 addresses can never be used to reach the internet if (!v4 && is_local(iface.interface_address)) return {}; auto const it = std::find_if(routes.begin(), routes.end() , [&](ip_route const& r) -> bool { return r.destination.is_unspecified() && r.destination.is_v4() == iface.interface_address.is_v4() && !r.gateway.is_unspecified() // in case there are multiple networks on the same networking // device, the source hint may be the only thing telling them // apart && (r.source_hint.is_unspecified() || r.source_hint == iface.interface_address) && std::strcmp(r.name, iface.name) == 0; }); if (it != routes.end()) return it->gateway; return {}; } bool has_default_route(char const* device, int const fam, span routes) { return std::find_if(routes.begin(), routes.end() , [&](ip_route const& r) -> bool { return r.destination.is_unspecified() && family(r.destination) == fam && std::strcmp(r.name, device) == 0; }) != routes.end(); } std::vector enum_routes(io_service& ios, error_code& ec) { std::vector ret; TORRENT_UNUSED(ios); ec.clear(); #ifdef TORRENT_BUILD_SIMULATOR TORRENT_UNUSED(ec); std::vector
ips = ios.get_ips(); for (auto const& ip : ips) { ip_route r; if (ip.is_v4()) { r.destination = address_v4(); r.netmask = address_v4::from_string("255.0.0.0"); address_v4::bytes_type b = ip.to_v4().to_bytes(); b[3] = 1; r.gateway = address_v4(b); } else { r.destination = address_v6(); r.netmask = address_v6::from_string("ffff:ffff:ffff:ffff::0"); address_v6::bytes_type b = ip.to_v6().to_bytes(); b[14] = 1; r.gateway = address_v6(b); } std::strcpy(r.name, "eth0"); r.mtu = ios.sim().config().path_mtu(ip, ip); ret.push_back(r); } #elif TORRENT_USE_SYSCTL /* struct rt_msg { rt_msghdr m_rtm; char buf[512]; }; rt_msg m; int len = sizeof(rt_msg); bzero(&m, len); m.m_rtm.rtm_type = RTM_GET; m.m_rtm.rtm_flags = RTF_UP | RTF_GATEWAY; m.m_rtm.rtm_version = RTM_VERSION; m.m_rtm.rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK; m.m_rtm.rtm_seq = 0; m.m_rtm.rtm_msglen = len; int s = ::socket(PF_ROUTE, SOCK_RAW, AF_UNSPEC); if (s == -1) { ec = error_code(errno, system_category()); return std::vector(); } int n = write(s, &m, len); if (n == -1) { ec = error_code(errno, system_category()); ::close(s); return std::vector(); } else if (n != len) { ec = boost::asio::error::operation_not_supported; ::close(s); return std::vector(); } bzero(&m, len); n = read(s, &m, len); if (n == -1) { ec = error_code(errno, system_category()); ::close(s); return std::vector(); } for (rt_msghdr* ptr = &m.m_rtm; (char*)ptr < ((char*)&m.m_rtm) + n; ptr = (rt_msghdr*)(((char*)ptr) + ptr->rtm_msglen)) { std::cout << " rtm_msglen: " << ptr->rtm_msglen << std::endl; std::cout << " rtm_type: " << ptr->rtm_type << std::endl; if (ptr->rtm_errno) { ec = error_code(ptr->rtm_errno, system_category()); return std::vector(); } if (m.m_rtm.rtm_flags & RTF_UP == 0 || m.m_rtm.rtm_flags & RTF_GATEWAY == 0) { ec = boost::asio::error::operation_not_supported; return address_v4::any(); } if (ptr->rtm_addrs & RTA_DST == 0 || ptr->rtm_addrs & RTA_GATEWAY == 0 || ptr->rtm_addrs & RTA_NETMASK == 0) { ec = boost::asio::error::operation_not_supported; return std::vector(); } if (ptr->rtm_msglen > len - ((char*)ptr - ((char*)&m.m_rtm))) { ec = boost::asio::error::operation_not_supported; return std::vector(); } int min_len = sizeof(rt_msghdr) + 2 * sizeof(sockaddr_in); if (m.m_rtm.rtm_msglen < min_len) { ec = boost::asio::error::operation_not_supported; return std::vector(); } ip_route r; // destination char* p = m.buf; sockaddr_in* sin = (sockaddr_in*)p; r.destination = sockaddr_to_address((sockaddr*)p); // gateway p += sin->sin_len; sin = (sockaddr_in*)p; r.gateway = sockaddr_to_address((sockaddr*)p); // netmask p += sin->sin_len; sin = (sockaddr_in*)p; r.netmask = sockaddr_to_address((sockaddr*)p); ret.push_back(r); } ::close(s); */ int mib[6] = {CTL_NET, PF_ROUTE, 0, AF_UNSPEC, NET_RT_DUMP, 0}; std::size_t needed = 0; #ifdef TORRENT_OS2 if (__libsocket_sysctl(mib, 6, 0, &needed, 0, 0) < 0) #else if (sysctl(mib, 6, nullptr, &needed, nullptr, 0) < 0) #endif { ec = error_code(errno, system_category()); return std::vector(); } if (needed == 0) { return std::vector(); } std::unique_ptr buf(new (std::nothrow) char[needed]); if (buf == nullptr) { ec = boost::asio::error::no_memory; return std::vector(); } #ifdef TORRENT_OS2 if (__libsocket_sysctl(mib, 6, buf.get(), &needed, 0, 0) < 0) #else if (sysctl(mib, 6, buf.get(), &needed, nullptr, 0) < 0) #endif { ec = error_code(errno, system_category()); return std::vector(); } char* end = buf.get() + needed; int s = ::socket(AF_INET, SOCK_DGRAM, 0); if (s < 0) { ec = error_code(errno, system_category()); return std::vector(); } rt_msghdr* rtm; for (char* next = buf.get(); next < end; next += rtm->rtm_msglen) { rtm = reinterpret_cast(next); if (rtm->rtm_version != RTM_VERSION || (rtm->rtm_type != RTM_ADD && rtm->rtm_type != RTM_GET)) { continue; } ip_route r; if (parse_route(s, rtm, &r)) ret.push_back(r); } ::close(s); #elif TORRENT_USE_GETIPFORWARDTABLE /* move this to enum_net_interfaces // Get GetAdaptersInfo() pointer using GetAdaptersInfo_t = DWORD (WINAPI*)(PIP_ADAPTER_INFO, PULONG); GetAdaptersInfo_t GetAdaptersInfo = get_library_procedure("GetAdaptersInfo"); if (GetAdaptersInfo == nullptr) { ec = boost::asio::error::operation_not_supported; return std::vector(); } PIP_ADAPTER_INFO adapter_info = 0; ULONG out_buf_size = 0; if (GetAdaptersInfo(adapter_info, &out_buf_size) != ERROR_BUFFER_OVERFLOW) { ec = boost::asio::error::operation_not_supported; return std::vector(); } adapter_info = (IP_ADAPTER_INFO*)malloc(out_buf_size); if (!adapter_info) { ec = boost::asio::error::no_memory; return std::vector(); } if (GetAdaptersInfo(adapter_info, &out_buf_size) == NO_ERROR) { for (PIP_ADAPTER_INFO adapter = adapter_info; adapter != 0; adapter = adapter->Next) { ip_route r; r.destination = address::from_string(adapter->IpAddressList.IpAddress.String, ec); r.gateway = address::from_string(adapter->GatewayList.IpAddress.String, ec); r.netmask = address::from_string(adapter->IpAddressList.IpMask.String, ec); strncpy(r.name, adapter->AdapterName, sizeof(r.name) - 1); r.name[sizeof(r.name) - 1] = '\0'; if (ec) { ec = error_code(); continue; } ret.push_back(r); } } // Free memory free(adapter_info); */ using GetIfEntry_t = DWORD (WINAPI *)(PMIB_IFROW pIfRow); auto GetIfEntry = aux::get_library_procedure( "GetIfEntry"); if (GetIfEntry == nullptr) { ec = boost::asio::error::operation_not_supported; return std::vector(); } #if _WIN32_WINNT >= 0x0600 using GetIpForwardTable2_t = DWORD (WINAPI *)( ADDRESS_FAMILY, PMIB_IPFORWARD_TABLE2*); using FreeMibTable_t = void (WINAPI *)(PVOID Memory); auto GetIpForwardTable2 = aux::get_library_procedure("GetIpForwardTable2"); auto FreeMibTable = aux::get_library_procedure("FreeMibTable"); if (GetIpForwardTable2 != nullptr && FreeMibTable != nullptr) { MIB_IPFORWARD_TABLE2* routes = nullptr; int res = GetIpForwardTable2(AF_UNSPEC, &routes); if (res == NO_ERROR) { for (int i = 0; i < int(routes->NumEntries); ++i) { ip_route r; r.gateway = sockaddr_to_address((const sockaddr*)&routes->Table[i].NextHop); // The scope_id in NextHop is always zero because that would make // things too easy apparently if (r.gateway.is_v6() && r.gateway.to_v6().is_link_local()) { address_v6 gateway6 = r.gateway.to_v6(); gateway6.scope_id(routes->Table[i].InterfaceIndex); r.gateway = gateway6; } r.destination = sockaddr_to_address( (const sockaddr*)&routes->Table[i].DestinationPrefix.Prefix); r.netmask = build_netmask(routes->Table[i].DestinationPrefix.PrefixLength , routes->Table[i].DestinationPrefix.Prefix.si_family); MIB_IFROW ifentry; ifentry.dwIndex = routes->Table[i].InterfaceIndex; if (GetIfEntry(&ifentry) == NO_ERROR) { WCHAR* name = ifentry.wszName; // strip UNC prefix to match the names returned by enum_net_interfaces if (wcsncmp(name, L"\\DEVICE\\TCPIP_", wcslen(L"\\DEVICE\\TCPIP_")) == 0) { name += wcslen(L"\\DEVICE\\TCPIP_"); } wcstombs(r.name, name, sizeof(r.name) - 1); r.name[sizeof(r.name) - 1] = '\0'; r.mtu = ifentry.dwMtu; ret.push_back(r); } } } if (routes) FreeMibTable(routes); return ret; } #endif // Get GetIpForwardTable() pointer using GetIpForwardTable_t = DWORD (WINAPI*)(PMIB_IPFORWARDTABLE pIpForwardTable,PULONG pdwSize,BOOL bOrder); auto GetIpForwardTable = aux::get_library_procedure("GetIpForwardTable"); if (GetIpForwardTable == nullptr) { ec = boost::asio::error::operation_not_supported; return std::vector(); } MIB_IPFORWARDTABLE* routes = nullptr; ULONG out_buf_size = 0; if (GetIpForwardTable(routes, &out_buf_size, FALSE) != ERROR_INSUFFICIENT_BUFFER) { ec = boost::asio::error::operation_not_supported; return std::vector(); } routes = (MIB_IPFORWARDTABLE*)malloc(out_buf_size); if (!routes) { ec = boost::asio::error::no_memory; return std::vector(); } if (GetIpForwardTable(routes, &out_buf_size, FALSE) == NO_ERROR) { for (int i = 0; i < int(routes->dwNumEntries); ++i) { ip_route r; r.destination = inaddr_to_address(&routes->table[i].dwForwardDest); r.netmask = inaddr_to_address(&routes->table[i].dwForwardMask); r.gateway = inaddr_to_address(&routes->table[i].dwForwardNextHop); MIB_IFROW ifentry; ifentry.dwIndex = routes->table[i].dwForwardIfIndex; if (GetIfEntry(&ifentry) == NO_ERROR) { wcstombs(r.name, ifentry.wszName, sizeof(r.name) - 1); r.name[sizeof(r.name) - 1] = '\0'; r.mtu = ifentry.dwMtu; ret.push_back(r); } } } // Free memory free(routes); #elif TORRENT_USE_NETLINK int sock = ::socket(PF_ROUTE, SOCK_DGRAM, NETLINK_ROUTE); if (sock < 0) { ec = error_code(errno, system_category()); return std::vector(); } std::uint32_t seq = 0; char msg[NL_BUFSIZE] = {}; nlmsghdr* nl_msg = reinterpret_cast(msg); int len = nl_dump_request(sock, RTM_GETROUTE, seq++, AF_UNSPEC, msg, sizeof(rtmsg)); if (len < 0) { ec = error_code(errno, system_category()); ::close(sock); return std::vector(); } close(sock); sock = ::socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { ec = error_code(errno, system_category()); return std::vector(); } #ifdef __clang__ #pragma clang diagnostic push #pragma clang diagnostic ignored "-Wcast-align" // NLMSG_OK uses signed/unsigned compare in the same expression #pragma clang diagnostic ignored "-Wsign-compare" #endif for (; NLMSG_OK(nl_msg, len); nl_msg = NLMSG_NEXT(nl_msg, len)) { ip_route r; if (parse_route(sock, nl_msg, &r)) ret.push_back(r); } #ifdef __clang__ #pragma clang diagnostic pop #endif ::close(sock); #else #error "don't know how to enumerate network routes on this platform" #endif return ret; } // returns the device name whose local address is ``addr``. If // no such device is found, an empty string is returned. std::string device_for_address(address addr, io_service& ios, error_code& ec) { std::vector ifs = enum_net_interfaces(ios, ec); if (ec) return {}; auto const iter = std::find_if(ifs.begin(), ifs.end() , [&addr](ip_interface const& iface) { return iface.interface_address == addr; }); return (iter == ifs.end()) ? std::string() : iter->name; } }