Server IP : 103.119.228.120 / Your IP : 18.191.81.46 Web Server : Apache System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64 User : nobody ( 99) PHP Version : 5.6.40 Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/local/ssl/local/ssl/local/share/perl5/Net/ |
Upload File : |
# IPv4Addr.pm - Perl module to manipulate IPv4 addresses. # # Author: Francis J. Lacoste <francis.lacoste@iNsu.COM> # # Copyright (C) 1999, 2000 iNsu Innovations Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms as perl itself. # package Net::IPv4Addr; use strict; use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS); BEGIN { require Exporter; require AutoLoader; @ISA = qw(Exporter AutoLoader); @EXPORT = qw(); %EXPORT_TAGS = ( all => [qw{ ipv4_parse ipv4_chkip ipv4_network ipv4_broadcast ipv4_cidr2msk ipv4_msk2cidr ipv4_in_network ipv4_dflt_netmask } ], ); @EXPORT_OK = qw(); Exporter::export_ok_tags('all'); $VERSION = '0.10'; } # Preloaded methods go here. use Carp; # Functions to manipulate IPV4 address my $ip_rgx = "\\d+\\.\\d+\\.\\d+\\.\\d+"; # Given an IPv4 address in host, ip/netmask or cidr format # returns a ip / cidr pair. sub ipv4_parse($;$) { my ($ip,$msk); # Called with 2 args, assume first is IP address if ( defined $_[1] ) { $ip = $_[0]; $msk= $_[1]; } else { ($ip) = $_[0] =~ /($ip_rgx)/o; ($msk) = $_[0] =~ m!/(.+)!o; } # Remove white spaces $ip = ipv4_chkip( $ip ) or croak __PACKAGE__, ": invalid IPv4 address: ", $ip, "\n"; $msk =~ s/\s//g if defined $msk; # Check Netmask to see if it is a CIDR or Network if (defined $msk ) { if ($msk =~ /^\d{1,2}$/) { # Check cidr croak __PACKAGE__, ": invalid cidr: ", $msk, "\n" if $msk < 0 or $msk > 32; } elsif ($msk =~ /^$ip_rgx$/o ) { $msk = ipv4_msk2cidr($msk); } else { croak __PACKAGE__, ": invalid netmask specification: ", $msk, "\n"; } } else { # Host return $ip; } wantarray ? ($ip,$msk) : "$ip/$msk"; } sub ipv4_dflt_netmask($) { my ($ip) = ipv4_parse($_[0]); my ($b1) = split /\./, $ip; return "255.0.0.0" if $b1 <= 127; return "255.255.0.0" if $b1 <= 191; return "255.255.255.0"; } # Check form a valid IPv4 address. sub ipv4_chkip($) { my ($ip) = $_[0] =~ /($ip_rgx)/o; return undef unless $ip; # Check that bytes are in range for (split /\./, $ip ) { return undef if $_ < 0 or $_ > 255; } return $ip; } # Transform a netmask in a CIDR mask length sub ipv4_msk2cidr($) { my $msk = ipv4_chkip( $_[0] ) or croak __PACKAGE__, ": invalid netmask: ", $_[0], "\n"; my @bytes = split /\./, $msk; my $cidr = 0; for (@bytes) { my $bits = unpack( "B*", pack( "C", $_ ) ); $cidr += $bits =~ tr /1/1/; } return $cidr; } # Transform a CIDR mask length in a netmask sub ipv4_cidr2msk($) { my $cidr = shift; croak __PACKAGE__, ": invalid cidr: ", $cidr, "\n" if $cidr < 0 or $cidr > 32; my $bits = "1" x $cidr . "0" x (32 - $cidr); return join ".", (unpack 'CCCC', pack("B*", $bits )); } # Return the network address of # an IPv4 address sub ipv4_network($;$) { my ($ip,$cidr) = ipv4_parse( $_[0], $_[1] ); # If only an host is given, use the default netmask unless (defined $cidr) { $cidr = ipv4_msk2cidr( ipv4_dflt_netmask($ip) ); } my $u32 = unpack "N", pack "CCCC", split /\./, $ip; my $bits = "1" x $cidr . "0" x (32 - $cidr ); my $msk = unpack "N", pack "B*", $bits; my $net = join ".", unpack "CCCC", pack "N", $u32 & $msk; wantarray ? ( $net, $cidr) : "$net/$cidr"; } sub ipv4_broadcast($;$) { my ($ip,$cidr) = ipv4_parse( $_[0], $_[1] ); # If only an host is given, use the default netmask unless (defined $cidr) { $cidr = ipv4_msk2cidr( ipv4_dflt_netmask($ip) ); } my $u32 = unpack "N", pack "CCCC", split /\./, $ip; my $bits = "1" x $cidr . "0" x (32 - $cidr ); my $msk = unpack "N", pack "B*", $bits; my $broadcast = join ".", unpack "CCCC", pack "N", $u32 | ~$msk; $broadcast; } sub ipv4_in_network($$;$$) { my ($ip1,$cidr1,$ip2,$cidr2); if ( @_ >= 3) { ($ip1,$cidr1) = ipv4_parse( $_[0], $_[1] ); ($ip2,$cidr2) = ipv4_parse( $_[2], $_[3] ); } else { ($ip1,$cidr1) = ipv4_parse( $_[0]); ($ip2,$cidr2) = ipv4_parse( $_[1]); } # Check for magic addresses. return 1 if ($ip1 eq "255.255.255.255" or $ip1 eq "0.0.0.0") and !defined $cidr1; return 1 if ($ip2 eq "255.255.255.255" or $ip2 eq "0.0.0.0") and !defined $cidr2; # Case where first argument is really an host return $ip1 eq $ip2 unless (defined $cidr1); # Case where second argument is an host if ( not defined $cidr2) { return ipv4_network( $ip1, $cidr1) eq ipv4_network( $ip2, $cidr1 ); } elsif ( $cidr2 >= $cidr1 ) { # Network 2 is smaller or equal than network 1 return ipv4_network( $ip1, $cidr1 ) eq ipv4_network( $ip2, $cidr1 ); } else { # Network 2 is bigger, so can't be wholly contained. return 0; } } # Autoload methods go after =cut, and are processed by the autosplit program. 1; __END__ # Below is the stub of documentation for your module. You better edit it! =pod =head1 NAME Net::IPv4Addr - Perl extension for manipulating IPv4 addresses. =head1 SYNOPSIS use Net::IPv4Addr qw( :all ); my ($ip,$cidr) = ipv4_parse( "127.0.0.1/24" ); my ($ip,$cidr) = ipv4_parse( "192.168.100.10 / 255.255.255.0" ); my ($net,$msk) = ipv4_network( "192.168.100.30" ); my $broadcast = ipv4_broadcast( "192.168.100.30/26" ); if ( ipv4_in_network( "192.168.100.0", $her_ip ) ) { print "Welcome !"; } etc. =head1 DESCRIPTION Net::IPv4Addr provides functions for parsing IPv4 addresses both in traditional address/netmask format and in the new CIDR format. There are also methods for calculating the network and broadcast address and also to see check if a given address is in a specific network. =head1 ADDRESSES All of Net::IPv4Addr functions accepts addresses in many format. The parsing is very liberal. All these addresses would be accepted: 127.0.0.1 192.168.001.010/24 192.168.10.10/255.255.255.0 192.168.30.10 / 21 10.0.0.0 / 255.0.0.0 255.255.0.0 Those wouldn't though: 272.135.234.0 192.168/16 Most functions accepts the address and netmask or masklength in the same scalar value or as separate values. That is either my($ip,$masklength) = ipv4_parse($cidr_str); my($ip,$masklength) = ipv4_parse($ip_str,$msk_str); =head1 USING No functions are exported by default. Either use the C<:all> tag to import them all or explicitly import those you need. =head1 FUNCTIONS =over =item ipv4_parse my ($ip,$msklen) = ipv4_parse($cidr_str); my $cidr = ipv4_parse($ip_str,$msk_str); my ($ip) = ipv4_parse($ip_str,$msk_str); Parse an IPv4 address and in scalar context the address in CIDR format and in an array context the address and the mask length. If the parameters doesn't contains a netmask or a mask length, in scalar context only the IPv4 address is returned and in an array context the mask length is undefined. If the function cannot parse its input, it croaks. Trap it using C<eval> if don't like that. =item ipv4_network my $cidr = ipv4_network($ip_str); my $cidr = ipv4_network($cidr_str); my ($net,$msk) = ipv4_network( $net_str, $msk_str); In scalar context, this function returns the network in CIDR format in which the address is. In array context, it returns the network address and its mask length as a two elements array. If the input is an host without a netmask of mask length, the default netmask is assumed. Again, the function croak if the input is invalid. =item ipv4_broadcast my ($broadcast) = ipv4_broadcast($ip_str); my $broadcast = ipv4_broadcast($ip_str,$msk_str); This function returns the broadcast address. If the input doesn't contains a netmask or mask length, the default netmask is assumed. This function croaks if the input is invalid. =item ipv4_network my $cidr = ipv4_network($net_str); my $cidr = ipv4_network($cidr_sstr); my ($net,$msk) = ipv4_network( $ip_str, $mask_str); In scalar context, this function returns the network in CIDR format in which the address is. In array context, it returns the network address and its mask length as a two elements array. If the input is an host without a netmask or mask length, the default netmask is assumed. Again, the function croak if the input is invalid. =item ipv4_in_network print "Yes" if ipv4_in_network( $cidr_str1, $cidr_str2); print "Yes" if ipv4_in_network( $ip_str1, $mask_str1, $cidr_str2 ); print "Yes" if ipv4_in_network( $ip1, $mask1, $ip2, $msk2 ); This function checks if the second network is contained in the first one and it implements the following semantics : If net1 or net2 is a magic address (0.0.0.0 or 255.255.255.255) than this function returns true. If net1 is an host, net2 will be in the same net only if it is the same host. If net2 is an host, it will be contained in net1 only if it is part of net1. If net2 is only part of net1 if it is entirely contained in net1. Trap bad input with C<eval> or else. =item ipv4_checkip if ($ip = ipv4_checkip($str) ) { # Do something } Return the IPv4 address in the string or undef if the input doesn't contains a valid IPv4 address. =item ipv4_cidr2msk my $netmask = ipv4_cidr2msk( $cidr ); Returns the netmask corresponding to the mask length given in input. As usual, croaks if it doesn't like your input (in this case a number between 0 and 32). =item ipv4_msk2cidr my $masklen = ipv4_msk2cidr( $msk ); Returns the mask length of the netmask in input. As usual, croaks if it doesn't like your input. =back =head1 AUTHOR Francis J. Lacoste <francis.lacoste@iNsu.COM> =head1 COPYRIGHT Copyright (c) 1999, 2000 iNsu Innovations Inc. All rights reserved. This program is free software; you can redistribute it and/or modify it under the terms as perl itself. =head1 SEE ALSO perl(1) ipv4calc(1). =cut