123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224 |
- // Copyright 2012 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
-
- package ipv4_test
-
- import (
- "fmt"
- "log"
- "net"
- "os"
- "runtime"
- "time"
-
- "golang.org/x/net/icmp"
- "golang.org/x/net/ipv4"
- )
-
- func ExampleConn_markingTCP() {
- ln, err := net.Listen("tcp", "0.0.0.0:1024")
- if err != nil {
- log.Fatal(err)
- }
- defer ln.Close()
-
- for {
- c, err := ln.Accept()
- if err != nil {
- log.Fatal(err)
- }
- go func(c net.Conn) {
- defer c.Close()
- if c.RemoteAddr().(*net.TCPAddr).IP.To4() != nil {
- p := ipv4.NewConn(c)
- if err := p.SetTOS(0x28); err != nil { // DSCP AF11
- log.Fatal(err)
- }
- if err := p.SetTTL(128); err != nil {
- log.Fatal(err)
- }
- }
- if _, err := c.Write([]byte("HELLO-R-U-THERE-ACK")); err != nil {
- log.Fatal(err)
- }
- }(c)
- }
- }
-
- func ExamplePacketConn_servingOneShotMulticastDNS() {
- c, err := net.ListenPacket("udp4", "0.0.0.0:5353") // mDNS over UDP
- if err != nil {
- log.Fatal(err)
- }
- defer c.Close()
- p := ipv4.NewPacketConn(c)
-
- en0, err := net.InterfaceByName("en0")
- if err != nil {
- log.Fatal(err)
- }
- mDNSLinkLocal := net.UDPAddr{IP: net.IPv4(224, 0, 0, 251)}
- if err := p.JoinGroup(en0, &mDNSLinkLocal); err != nil {
- log.Fatal(err)
- }
- defer p.LeaveGroup(en0, &mDNSLinkLocal)
- if err := p.SetControlMessage(ipv4.FlagDst, true); err != nil {
- log.Fatal(err)
- }
-
- b := make([]byte, 1500)
- for {
- _, cm, peer, err := p.ReadFrom(b)
- if err != nil {
- log.Fatal(err)
- }
- if !cm.Dst.IsMulticast() || !cm.Dst.Equal(mDNSLinkLocal.IP) {
- continue
- }
- answers := []byte("FAKE-MDNS-ANSWERS") // fake mDNS answers, you need to implement this
- if _, err := p.WriteTo(answers, nil, peer); err != nil {
- log.Fatal(err)
- }
- }
- }
-
- func ExamplePacketConn_tracingIPPacketRoute() {
- // Tracing an IP packet route to www.google.com.
-
- const host = "www.google.com"
- ips, err := net.LookupIP(host)
- if err != nil {
- log.Fatal(err)
- }
- var dst net.IPAddr
- for _, ip := range ips {
- if ip.To4() != nil {
- dst.IP = ip
- fmt.Printf("using %v for tracing an IP packet route to %s\n", dst.IP, host)
- break
- }
- }
- if dst.IP == nil {
- log.Fatal("no A record found")
- }
-
- c, err := net.ListenPacket("ip4:1", "0.0.0.0") // ICMP for IPv4
- if err != nil {
- log.Fatal(err)
- }
- defer c.Close()
- p := ipv4.NewPacketConn(c)
-
- if err := p.SetControlMessage(ipv4.FlagTTL|ipv4.FlagSrc|ipv4.FlagDst|ipv4.FlagInterface, true); err != nil {
- log.Fatal(err)
- }
- wm := icmp.Message{
- Type: ipv4.ICMPTypeEcho, Code: 0,
- Body: &icmp.Echo{
- ID: os.Getpid() & 0xffff,
- Data: []byte("HELLO-R-U-THERE"),
- },
- }
-
- rb := make([]byte, 1500)
- for i := 1; i <= 64; i++ { // up to 64 hops
- wm.Body.(*icmp.Echo).Seq = i
- wb, err := wm.Marshal(nil)
- if err != nil {
- log.Fatal(err)
- }
- if err := p.SetTTL(i); err != nil {
- log.Fatal(err)
- }
-
- // In the real world usually there are several
- // multiple traffic-engineered paths for each hop.
- // You may need to probe a few times to each hop.
- begin := time.Now()
- if _, err := p.WriteTo(wb, nil, &dst); err != nil {
- log.Fatal(err)
- }
- if err := p.SetReadDeadline(time.Now().Add(3 * time.Second)); err != nil {
- log.Fatal(err)
- }
- n, cm, peer, err := p.ReadFrom(rb)
- if err != nil {
- if err, ok := err.(net.Error); ok && err.Timeout() {
- fmt.Printf("%v\t*\n", i)
- continue
- }
- log.Fatal(err)
- }
- rm, err := icmp.ParseMessage(1, rb[:n])
- if err != nil {
- log.Fatal(err)
- }
- rtt := time.Since(begin)
-
- // In the real world you need to determine whether the
- // received message is yours using ControlMessage.Src,
- // ControlMessage.Dst, icmp.Echo.ID and icmp.Echo.Seq.
- switch rm.Type {
- case ipv4.ICMPTypeTimeExceeded:
- names, _ := net.LookupAddr(peer.String())
- fmt.Printf("%d\t%v %+v %v\n\t%+v\n", i, peer, names, rtt, cm)
- case ipv4.ICMPTypeEchoReply:
- names, _ := net.LookupAddr(peer.String())
- fmt.Printf("%d\t%v %+v %v\n\t%+v\n", i, peer, names, rtt, cm)
- return
- default:
- log.Printf("unknown ICMP message: %+v\n", rm)
- }
- }
- }
-
- func ExampleRawConn_advertisingOSPFHello() {
- c, err := net.ListenPacket("ip4:89", "0.0.0.0") // OSPF for IPv4
- if err != nil {
- log.Fatal(err)
- }
- defer c.Close()
- r, err := ipv4.NewRawConn(c)
- if err != nil {
- log.Fatal(err)
- }
-
- en0, err := net.InterfaceByName("en0")
- if err != nil {
- log.Fatal(err)
- }
- allSPFRouters := net.IPAddr{IP: net.IPv4(224, 0, 0, 5)}
- if err := r.JoinGroup(en0, &allSPFRouters); err != nil {
- log.Fatal(err)
- }
- defer r.LeaveGroup(en0, &allSPFRouters)
-
- hello := make([]byte, 24) // fake hello data, you need to implement this
- ospf := make([]byte, 24) // fake ospf header, you need to implement this
- ospf[0] = 2 // version 2
- ospf[1] = 1 // hello packet
- ospf = append(ospf, hello...)
- iph := &ipv4.Header{
- Version: ipv4.Version,
- Len: ipv4.HeaderLen,
- TOS: 0xc0, // DSCP CS6
- TotalLen: ipv4.HeaderLen + len(ospf),
- TTL: 1,
- Protocol: 89,
- Dst: allSPFRouters.IP.To4(),
- }
-
- var cm *ipv4.ControlMessage
- switch runtime.GOOS {
- case "darwin", "linux":
- cm = &ipv4.ControlMessage{IfIndex: en0.Index}
- default:
- if err := r.SetMulticastInterface(en0); err != nil {
- log.Fatal(err)
- }
- }
- if err := r.WriteTo(iph, ospf, cm); err != nil {
- log.Fatal(err)
- }
- }
|