6 #include <netlink/genl/genl.h>
7 #include <netlink/genl/family.h>
8 #include <netlink/genl/ctrl.h>
9 #include <netlink/msg.h>
10 #include <netlink/attr.h>
12 #include <arpa/inet.h>
19 static int wowlan_parse_tcp_file(struct nl_msg
*msg
, const char *fn
)
23 FILE *f
= fopen(fn
, "r");
28 tcp
= nla_nest_start(msg
, NL80211_WOWLAN_TRIG_TCP_CONNECTION
);
35 if (!fgets(buf
, sizeof(buf
), f
))
38 eol
= strchr(buf
+ 5, '\r');
41 eol
= strchr(buf
+ 5, '\n');
45 if (strncmp(buf
, "source=", 7) == 0) {
46 struct in_addr in_addr
;
48 char *port
= strchr(buf
+ 7, ':');
54 if (inet_aton(addr
, &in_addr
) == 0)
56 NLA_PUT_U32(msg
, NL80211_WOWLAN_TCP_SRC_IPV4
,
59 NLA_PUT_U16(msg
, NL80211_WOWLAN_TCP_SRC_PORT
,
61 } else if (strncmp(buf
, "dest=", 5) == 0) {
62 struct in_addr in_addr
;
64 char *port
= strchr(buf
+ 5, ':');
66 unsigned char macbuf
[6];
72 mac
= strchr(port
, '@');
77 if (inet_aton(addr
, &in_addr
) == 0)
79 NLA_PUT_U32(msg
, NL80211_WOWLAN_TCP_DST_IPV4
,
81 NLA_PUT_U16(msg
, NL80211_WOWLAN_TCP_DST_PORT
,
83 if (mac_addr_a2n(macbuf
, mac
))
85 NLA_PUT(msg
, NL80211_WOWLAN_TCP_DST_MAC
,
87 } else if (strncmp(buf
, "data=", 5) == 0) {
89 unsigned char *pkt
= parse_hex(buf
+ 5, &len
);
93 NLA_PUT(msg
, NL80211_WOWLAN_TCP_DATA_PAYLOAD
, len
, pkt
);
95 } else if (strncmp(buf
, "data.interval=", 14) == 0) {
96 NLA_PUT_U32(msg
, NL80211_WOWLAN_TCP_DATA_INTERVAL
,
98 } else if (strncmp(buf
, "wake=", 5) == 0) {
99 unsigned char *pat
, *mask
;
102 if (parse_hex_mask(buf
+ 5, &pat
, &patlen
, &mask
))
104 NLA_PUT(msg
, NL80211_WOWLAN_TCP_WAKE_MASK
,
105 DIV_ROUND_UP(patlen
, 8), mask
);
106 NLA_PUT(msg
, NL80211_WOWLAN_TCP_WAKE_PAYLOAD
,
110 } else if (strncmp(buf
, "data.seq=", 9) == 0) {
111 struct nl80211_wowlan_tcp_data_seq seq
= {};
112 char *len
, *offs
, *start
;
115 offs
= strchr(len
, ',');
120 start
= strchr(offs
, ',');
124 seq
.start
= atoi(start
);
127 seq
.offset
= atoi(offs
);
129 NLA_PUT(msg
, NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ
,
131 } else if (strncmp(buf
, "data.tok=", 9) == 0) {
132 struct nl80211_wowlan_tcp_data_token
*tok
;
134 char *len
, *offs
, *toks
;
135 unsigned char *stream
;
138 offs
= strchr(len
, ',');
143 toks
= strchr(offs
, ',');
149 stream
= parse_hex(toks
, &stream_len
);
152 tok
= malloc(sizeof(*tok
) + stream_len
);
159 tok
->len
= atoi(len
);
160 tok
->offset
= atoi(offs
);
161 memcpy(tok
->token_stream
, stream
, stream_len
);
163 NLA_PUT(msg
, NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN
,
164 sizeof(*tok
) + stream_len
, tok
);
180 nla_nest_end(msg
, tcp
);
184 static int handle_wowlan_enable(struct nl80211_state
*state
, struct nl_cb
*cb
,
185 struct nl_msg
*msg
, int argc
, char **argv
,
188 struct nlattr
*wowlan
, *pattern
;
189 struct nl_msg
*patterns
= NULL
;
193 } parse_state
= PS_REG
;
195 unsigned char *pat
, *mask
;
197 int patnum
= 0, pkt_offset
;
198 char *eptr
, *value1
, *value2
, *sptr
= NULL
;
200 wowlan
= nla_nest_start(msg
, NL80211_ATTR_WOWLAN_TRIGGERS
);
205 switch (parse_state
) {
207 if (strcmp(argv
[0], "any") == 0)
208 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_ANY
);
209 else if (strcmp(argv
[0], "disconnect") == 0)
210 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_DISCONNECT
);
211 else if (strcmp(argv
[0], "magic-packet") == 0)
212 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_MAGIC_PKT
);
213 else if (strcmp(argv
[0], "gtk-rekey-failure") == 0)
214 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE
);
215 else if (strcmp(argv
[0], "eap-identity-request") == 0)
216 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST
);
217 else if (strcmp(argv
[0], "4way-handshake") == 0)
218 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE
);
219 else if (strcmp(argv
[0], "rfkill-release") == 0)
220 NLA_PUT_FLAG(msg
, NL80211_WOWLAN_TRIG_RFKILL_RELEASE
);
221 else if (strcmp(argv
[0], "tcp") == 0) {
226 goto nla_put_failure
;
228 err
= wowlan_parse_tcp_file(msg
, argv
[0]);
230 goto nla_put_failure
;
231 } else if (strcmp(argv
[0], "patterns") == 0) {
232 parse_state
= PS_PAT
;
233 patterns
= nlmsg_alloc();
236 goto nla_put_failure
;
240 goto nla_put_failure
;
244 value1
= strtok_r(argv
[0], "+", &sptr
);
245 value2
= strtok_r(NULL
, "+", &sptr
);
251 pkt_offset
= strtoul(value1
, &eptr
, 10);
252 if (eptr
!= value1
+ strlen(value1
)) {
254 goto nla_put_failure
;
258 if (parse_hex_mask(value2
, &pat
, &patlen
, &mask
)) {
260 goto nla_put_failure
;
263 pattern
= nla_nest_start(patterns
, ++patnum
);
264 NLA_PUT(patterns
, NL80211_PKTPAT_MASK
,
265 DIV_ROUND_UP(patlen
, 8), mask
);
266 NLA_PUT(patterns
, NL80211_PKTPAT_PATTERN
, patlen
, pat
);
267 NLA_PUT_U32(patterns
, NL80211_PKTPAT_OFFSET
,
269 nla_nest_end(patterns
, pattern
);
279 nla_put_nested(msg
, NL80211_WOWLAN_TRIG_PKT_PATTERN
,
282 nla_nest_end(msg
, wowlan
);
285 nlmsg_free(patterns
);
288 COMMAND(wowlan
, enable
, "[any] [disconnect] [magic-packet] [gtk-rekey-failure] [eap-identity-request]"
289 " [4way-handshake] [rfkill-release] [tcp <config-file>] [patterns [offset1+]<pattern1> ...]",
290 NL80211_CMD_SET_WOWLAN
, 0, CIB_PHY
, handle_wowlan_enable
,
291 "Enable WoWLAN with the given triggers.\n"
292 "Each pattern is given as a bytestring with '-' in places where any byte\n"
293 "may be present, e.g. 00:11:22:-:44 will match 00:11:22:33:44 and\n"
294 "00:11:22:33:ff:44 etc.\n"
295 "Offset and pattern should be separated by '+', e.g. 18+43:34:00:12 will match "
296 "'43:34:00:12' after 18 bytes of offset in Rx packet.\n\n"
297 "The TCP configuration file contains:\n"
298 " source=ip[:port]\n"
299 " dest=ip:port@mac\n"
300 " data=<hex data packet>\n"
301 " data.interval=seconds\n"
302 " [wake=<hex packet with masked out bytes indicated by '-'>]\n"
303 " [data.seq=len,offset[,start]]\n"
304 " [data.tok=len,offset,<token stream>]");
307 static int handle_wowlan_disable(struct nl80211_state
*state
, struct nl_cb
*cb
,
308 struct nl_msg
*msg
, int argc
, char **argv
,
311 /* just a set w/o wowlan attribute */
314 COMMAND(wowlan
, disable
, "", NL80211_CMD_SET_WOWLAN
, 0, CIB_PHY
, handle_wowlan_disable
,
318 static int print_wowlan_handler(struct nl_msg
*msg
, void *arg
)
320 struct nlattr
*attrs
[NL80211_ATTR_MAX
+ 1];
321 struct nlattr
*trig
[NUM_NL80211_WOWLAN_TRIG
];
322 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
323 struct nlattr
*pattern
;
326 nla_parse(attrs
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
327 genlmsg_attrlen(gnlh
, 0), NULL
);
329 if (!attrs
[NL80211_ATTR_WOWLAN_TRIGGERS
]) {
330 printf("WoWLAN is disabled.\n");
334 /* XXX: use policy */
335 nla_parse(trig
, MAX_NL80211_WOWLAN_TRIG
,
336 nla_data(attrs
[NL80211_ATTR_WOWLAN_TRIGGERS
]),
337 nla_len(attrs
[NL80211_ATTR_WOWLAN_TRIGGERS
]),
340 printf("WoWLAN is enabled:\n");
341 if (trig
[NL80211_WOWLAN_TRIG_ANY
])
342 printf(" * wake up on special any trigger\n");
343 if (trig
[NL80211_WOWLAN_TRIG_DISCONNECT
])
344 printf(" * wake up on disconnect\n");
345 if (trig
[NL80211_WOWLAN_TRIG_MAGIC_PKT
])
346 printf(" * wake up on magic packet\n");
347 if (trig
[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE
])
348 printf(" * wake up on GTK rekeying failure\n");
349 if (trig
[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST
])
350 printf(" * wake up on EAP identity request\n");
351 if (trig
[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE
])
352 printf(" * wake up on 4-way handshake\n");
353 if (trig
[NL80211_WOWLAN_TRIG_RFKILL_RELEASE
])
354 printf(" * wake up on RF-kill release\n");
355 if (trig
[NL80211_WOWLAN_TRIG_PKT_PATTERN
]) {
356 nla_for_each_nested(pattern
,
357 trig
[NL80211_WOWLAN_TRIG_PKT_PATTERN
],
359 struct nlattr
*patattr
[NUM_NL80211_PKTPAT
];
360 int i
, patlen
, masklen
, pkt_offset
;
362 nla_parse(patattr
, MAX_NL80211_PKTPAT
,
363 nla_data(pattern
), nla_len(pattern
), NULL
);
364 if (!patattr
[NL80211_PKTPAT_MASK
] ||
365 !patattr
[NL80211_PKTPAT_PATTERN
] ||
366 !patattr
[NL80211_PKTPAT_OFFSET
]) {
367 printf(" * (invalid pattern specification)\n");
370 masklen
= nla_len(patattr
[NL80211_PKTPAT_MASK
]);
371 patlen
= nla_len(patattr
[NL80211_PKTPAT_PATTERN
]);
373 nla_get_u32(patattr
[NL80211_PKTPAT_OFFSET
]);
374 if (DIV_ROUND_UP(patlen
, 8) != masklen
) {
375 printf(" * (invalid pattern specification)\n");
378 printf(" * wake up on packet offset: %d", pkt_offset
);
379 printf(" pattern: ");
380 pat
= nla_data(patattr
[NL80211_PKTPAT_PATTERN
]);
381 mask
= nla_data(patattr
[NL80211_PKTPAT_MASK
]);
382 for (i
= 0; i
< patlen
; i
++) {
383 if (mask
[i
/ 8] & (1 << (i
% 8)))
384 printf("%.2x", pat
[i
]);
393 if (trig
[NL80211_WOWLAN_TRIG_TCP_CONNECTION
])
394 printf(" * wake up on TCP connection\n");
399 static int handle_wowlan_show(struct nl80211_state
*state
, struct nl_cb
*cb
,
400 struct nl_msg
*msg
, int argc
, char **argv
,
403 nl_cb_set(cb
, NL_CB_VALID
, NL_CB_CUSTOM
,
404 print_wowlan_handler
, NULL
);
408 COMMAND(wowlan
, show
, "", NL80211_CMD_GET_WOWLAN
, 0, CIB_PHY
, handle_wowlan_show
,
409 "Show WoWLAN status.");