]>
Commit | Line | Data |
---|---|---|
3ff24563 JB |
1 | #include <net/if.h> |
2 | #include <errno.h> | |
3 | #include <string.h> | |
819b78cc | 4 | #include <stdio.h> |
3ff24563 JB |
5 | |
6 | #include <netlink/genl/genl.h> | |
7 | #include <netlink/genl/family.h> | |
8 | #include <netlink/genl/ctrl.h> | |
9 | #include <netlink/msg.h> | |
10 | #include <netlink/attr.h> | |
11 | ||
819b78cc JB |
12 | #include <arpa/inet.h> |
13 | ||
3ff24563 JB |
14 | #include "nl80211.h" |
15 | #include "iw.h" | |
16 | ||
17 | SECTION(wowlan); | |
18 | ||
819b78cc JB |
19 | static int wowlan_parse_tcp_file(struct nl_msg *msg, const char *fn) |
20 | { | |
21 | char buf[16768]; | |
22 | int err = 1; | |
23 | FILE *f = fopen(fn, "r"); | |
24 | struct nlattr *tcp; | |
25 | ||
26 | if (!f) | |
27 | return 1; | |
28 | tcp = nla_nest_start(msg, NL80211_WOWLAN_TRIG_TCP_CONNECTION); | |
29 | if (!tcp) | |
30 | goto nla_put_failure; | |
31 | ||
32 | while (!feof(f)) { | |
33 | char *eol; | |
34 | ||
35 | if (!fgets(buf, sizeof(buf), f)) | |
36 | break; | |
37 | ||
38 | eol = strchr(buf + 5, '\r'); | |
39 | if (eol) | |
40 | *eol = 0; | |
41 | eol = strchr(buf + 5, '\n'); | |
42 | if (eol) | |
43 | *eol = 0; | |
44 | ||
45 | if (strncmp(buf, "source=", 7) == 0) { | |
46 | struct in_addr in_addr; | |
47 | char *addr = buf + 7; | |
48 | char *port = strchr(buf + 7, ':'); | |
49 | ||
50 | if (port) { | |
51 | *port = 0; | |
52 | port++; | |
53 | } | |
54 | if (inet_aton(addr, &in_addr) == 0) | |
55 | goto close; | |
56 | NLA_PUT_U32(msg, NL80211_WOWLAN_TCP_SRC_IPV4, | |
57 | in_addr.s_addr); | |
58 | if (port) | |
59 | NLA_PUT_U16(msg, NL80211_WOWLAN_TCP_SRC_PORT, | |
60 | atoi(port)); | |
61 | } else if (strncmp(buf, "dest=", 5) == 0) { | |
62 | struct in_addr in_addr; | |
63 | char *addr = buf + 5; | |
64 | char *port = strchr(buf + 5, ':'); | |
65 | char *mac; | |
66 | unsigned char macbuf[6]; | |
67 | ||
68 | if (!port) | |
69 | goto close; | |
70 | *port = 0; | |
71 | port++; | |
72 | mac = strchr(port, '@'); | |
73 | if (!mac) | |
74 | goto close; | |
75 | *mac = 0; | |
76 | mac++; | |
77 | if (inet_aton(addr, &in_addr) == 0) | |
78 | goto close; | |
79 | NLA_PUT_U32(msg, NL80211_WOWLAN_TCP_DST_IPV4, | |
80 | in_addr.s_addr); | |
81 | NLA_PUT_U16(msg, NL80211_WOWLAN_TCP_DST_PORT, | |
82 | atoi(port)); | |
83 | if (mac_addr_a2n(macbuf, mac)) | |
84 | goto close; | |
85 | NLA_PUT(msg, NL80211_WOWLAN_TCP_DST_MAC, | |
86 | 6, macbuf); | |
87 | } else if (strncmp(buf, "data=", 5) == 0) { | |
88 | size_t len; | |
89 | unsigned char *pkt = parse_hex(buf + 5, &len); | |
90 | ||
91 | if (!pkt) | |
92 | goto close; | |
93 | NLA_PUT(msg, NL80211_WOWLAN_TCP_DATA_PAYLOAD, len, pkt); | |
94 | free(pkt); | |
95 | } else if (strncmp(buf, "data.interval=", 14) == 0) { | |
96 | NLA_PUT_U32(msg, NL80211_WOWLAN_TCP_DATA_INTERVAL, | |
509a5e5a | 97 | atoi(buf + 14)); |
819b78cc JB |
98 | } else if (strncmp(buf, "wake=", 5) == 0) { |
99 | unsigned char *pat, *mask; | |
100 | size_t patlen; | |
101 | ||
102 | if (parse_hex_mask(buf + 5, &pat, &patlen, &mask)) | |
103 | goto close; | |
104 | NLA_PUT(msg, NL80211_WOWLAN_TCP_WAKE_MASK, | |
105 | DIV_ROUND_UP(patlen, 8), mask); | |
106 | NLA_PUT(msg, NL80211_WOWLAN_TCP_WAKE_PAYLOAD, | |
107 | patlen, pat); | |
108 | free(mask); | |
109 | free(pat); | |
110 | } else if (strncmp(buf, "data.seq=", 9) == 0) { | |
111 | struct nl80211_wowlan_tcp_data_seq seq = {}; | |
112 | char *len, *offs, *start; | |
113 | ||
114 | len = buf + 9; | |
115 | offs = strchr(len, ','); | |
116 | if (!offs) | |
117 | goto close; | |
118 | *offs = 0; | |
119 | offs++; | |
120 | start = strchr(offs, ','); | |
121 | if (start) { | |
122 | *start = 0; | |
123 | start++; | |
124 | seq.start = atoi(start); | |
125 | } | |
126 | seq.len = atoi(len); | |
127 | seq.offset = atoi(offs); | |
128 | ||
129 | NLA_PUT(msg, NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ, | |
130 | sizeof(seq), &seq); | |
131 | } else if (strncmp(buf, "data.tok=", 9) == 0) { | |
132 | struct nl80211_wowlan_tcp_data_token *tok; | |
133 | size_t stream_len; | |
134 | char *len, *offs, *toks; | |
135 | unsigned char *stream; | |
136 | ||
137 | len = buf + 9; | |
138 | offs = strchr(len, ','); | |
139 | if (!offs) | |
140 | goto close; | |
141 | *offs = 0; | |
142 | offs++; | |
143 | toks = strchr(offs, ','); | |
144 | if (!toks) | |
145 | goto close; | |
146 | *toks = 0; | |
147 | toks++; | |
148 | ||
149 | stream = parse_hex(toks, &stream_len); | |
150 | if (!stream) | |
151 | goto close; | |
152 | tok = malloc(sizeof(*tok) + stream_len); | |
153 | if (!tok) { | |
154 | free(stream); | |
155 | err = -ENOMEM; | |
156 | goto close; | |
157 | } | |
158 | ||
159 | tok->len = atoi(len); | |
160 | tok->offset = atoi(offs); | |
161 | memcpy(tok->token_stream, stream, stream_len); | |
162 | ||
163 | NLA_PUT(msg, NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN, | |
164 | sizeof(*tok) + stream_len, tok); | |
165 | free(stream); | |
166 | free(tok); | |
167 | } else { | |
168 | if (buf[0] == '#') | |
169 | continue; | |
170 | goto close; | |
171 | } | |
172 | } | |
173 | ||
174 | err = 0; | |
175 | goto close; | |
176 | nla_put_failure: | |
177 | err = -ENOBUFS; | |
178 | close: | |
179 | fclose(f); | |
180 | nla_nest_end(msg, tcp); | |
181 | return err; | |
182 | } | |
183 | ||
d516c5bc LC |
184 | static int wowlan_parse_net_detect(struct nl_msg *msg, int *argc, char ***argv) |
185 | { | |
b1622287 LC |
186 | struct nlattr *nd; |
187 | int err = 0; | |
d516c5bc LC |
188 | |
189 | nd = nla_nest_start(msg, NL80211_WOWLAN_TRIG_NET_DETECT); | |
b1622287 LC |
190 | if (!nd) |
191 | return -ENOBUFS; | |
d516c5bc | 192 | |
b1622287 | 193 | err = parse_sched_scan(msg, argc, argv); |
d516c5bc | 194 | |
d516c5bc | 195 | nla_nest_end(msg, nd); |
b1622287 | 196 | |
d516c5bc LC |
197 | return err; |
198 | } | |
199 | ||
34b23014 | 200 | static int handle_wowlan_enable(struct nl80211_state *state, |
05514f95 JB |
201 | struct nl_msg *msg, int argc, char **argv, |
202 | enum id_input id) | |
3ff24563 JB |
203 | { |
204 | struct nlattr *wowlan, *pattern; | |
205 | struct nl_msg *patterns = NULL; | |
206 | enum { | |
207 | PS_REG, | |
208 | PS_PAT, | |
209 | } parse_state = PS_REG; | |
210 | int err = -ENOBUFS; | |
211 | unsigned char *pat, *mask; | |
212 | size_t patlen; | |
1c8f49c5 AK |
213 | int patnum = 0, pkt_offset; |
214 | char *eptr, *value1, *value2, *sptr = NULL; | |
3ff24563 JB |
215 | |
216 | wowlan = nla_nest_start(msg, NL80211_ATTR_WOWLAN_TRIGGERS); | |
217 | if (!wowlan) | |
218 | return -ENOBUFS; | |
219 | ||
220 | while (argc) { | |
221 | switch (parse_state) { | |
222 | case PS_REG: | |
223 | if (strcmp(argv[0], "any") == 0) | |
224 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_ANY); | |
225 | else if (strcmp(argv[0], "disconnect") == 0) | |
226 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_DISCONNECT); | |
227 | else if (strcmp(argv[0], "magic-packet") == 0) | |
228 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT); | |
3a6636b1 JB |
229 | else if (strcmp(argv[0], "gtk-rekey-failure") == 0) |
230 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE); | |
231 | else if (strcmp(argv[0], "eap-identity-request") == 0) | |
232 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST); | |
233 | else if (strcmp(argv[0], "4way-handshake") == 0) | |
234 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE); | |
235 | else if (strcmp(argv[0], "rfkill-release") == 0) | |
236 | NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE); | |
819b78cc JB |
237 | else if (strcmp(argv[0], "tcp") == 0) { |
238 | argv++; | |
239 | argc--; | |
240 | if (!argc) { | |
241 | err = 1; | |
242 | goto nla_put_failure; | |
243 | } | |
244 | err = wowlan_parse_tcp_file(msg, argv[0]); | |
245 | if (err) | |
246 | goto nla_put_failure; | |
247 | } else if (strcmp(argv[0], "patterns") == 0) { | |
3ff24563 JB |
248 | parse_state = PS_PAT; |
249 | patterns = nlmsg_alloc(); | |
250 | if (!patterns) { | |
251 | err = -ENOMEM; | |
252 | goto nla_put_failure; | |
253 | } | |
d516c5bc LC |
254 | } else if (strcmp(argv[0], "net-detect") == 0) { |
255 | argv++; | |
256 | argc--; | |
257 | if (!argc) { | |
258 | err = 1; | |
259 | goto nla_put_failure; | |
260 | } | |
261 | err = wowlan_parse_net_detect(msg, &argc, &argv); | |
262 | if (err) | |
263 | goto nla_put_failure; | |
264 | continue; | |
3ff24563 JB |
265 | } else { |
266 | err = 1; | |
267 | goto nla_put_failure; | |
268 | } | |
269 | break; | |
270 | case PS_PAT: | |
1c8f49c5 AK |
271 | value1 = strtok_r(argv[0], "+", &sptr); |
272 | value2 = strtok_r(NULL, "+", &sptr); | |
273 | ||
274 | if (!value2) { | |
275 | pkt_offset = 0; | |
276 | value2 = value1; | |
277 | } else { | |
278 | pkt_offset = strtoul(value1, &eptr, 10); | |
279 | if (eptr != value1 + strlen(value1)) { | |
280 | err = 1; | |
281 | goto nla_put_failure; | |
282 | } | |
283 | } | |
284 | ||
285 | if (parse_hex_mask(value2, &pat, &patlen, &mask)) { | |
3ff24563 JB |
286 | err = 1; |
287 | goto nla_put_failure; | |
288 | } | |
1c8f49c5 | 289 | |
3ff24563 | 290 | pattern = nla_nest_start(patterns, ++patnum); |
c82868da | 291 | NLA_PUT(patterns, NL80211_PKTPAT_MASK, |
3ff24563 | 292 | DIV_ROUND_UP(patlen, 8), mask); |
c82868da AK |
293 | NLA_PUT(patterns, NL80211_PKTPAT_PATTERN, patlen, pat); |
294 | NLA_PUT_U32(patterns, NL80211_PKTPAT_OFFSET, | |
295 | pkt_offset); | |
3ff24563 JB |
296 | nla_nest_end(patterns, pattern); |
297 | free(mask); | |
298 | free(pat); | |
299 | break; | |
300 | } | |
301 | argv++; | |
302 | argc--; | |
303 | } | |
304 | ||
305 | if (patterns) | |
306 | nla_put_nested(msg, NL80211_WOWLAN_TRIG_PKT_PATTERN, | |
307 | patterns); | |
308 | ||
309 | nla_nest_end(msg, wowlan); | |
310 | err = 0; | |
311 | nla_put_failure: | |
312 | nlmsg_free(patterns); | |
313 | return err; | |
314 | } | |
3a6636b1 | 315 | COMMAND(wowlan, enable, "[any] [disconnect] [magic-packet] [gtk-rekey-failure] [eap-identity-request]" |
b1622287 | 316 | " [4way-handshake] [rfkill-release] [net-detect " SCHED_SCAN_OPTIONS "]" |
d516c5bc | 317 | " [tcp <config-file>] [patterns [offset1+]<pattern1> ...]", |
3ff24563 JB |
318 | NL80211_CMD_SET_WOWLAN, 0, CIB_PHY, handle_wowlan_enable, |
319 | "Enable WoWLAN with the given triggers.\n" | |
320 | "Each pattern is given as a bytestring with '-' in places where any byte\n" | |
321 | "may be present, e.g. 00:11:22:-:44 will match 00:11:22:33:44 and\n" | |
1c8f49c5 AK |
322 | "00:11:22:33:ff:44 etc.\n" |
323 | "Offset and pattern should be separated by '+', e.g. 18+43:34:00:12 will match " | |
324 | "'43:34:00:12' after 18 bytes of offset in Rx packet.\n\n" | |
819b78cc JB |
325 | "The TCP configuration file contains:\n" |
326 | " source=ip[:port]\n" | |
327 | " dest=ip:port@mac\n" | |
328 | " data=<hex data packet>\n" | |
329 | " data.interval=seconds\n" | |
330 | " [wake=<hex packet with masked out bytes indicated by '-'>]\n" | |
331 | " [data.seq=len,offset[,start]]\n" | |
d516c5bc LC |
332 | " [data.tok=len,offset,<token stream>]\n\n" |
333 | "Net-detect configuration example:\n" | |
29af2019 | 334 | " iw phy0 wowlan enable net-detect interval 5000 delay 30 freqs 2412 2422 matches ssid foo ssid bar"); |
3ff24563 JB |
335 | |
336 | ||
34b23014 | 337 | static int handle_wowlan_disable(struct nl80211_state *state, |
05514f95 JB |
338 | struct nl_msg *msg, int argc, char **argv, |
339 | enum id_input id) | |
3ff24563 JB |
340 | { |
341 | /* just a set w/o wowlan attribute */ | |
342 | return 0; | |
343 | } | |
344 | COMMAND(wowlan, disable, "", NL80211_CMD_SET_WOWLAN, 0, CIB_PHY, handle_wowlan_disable, | |
345 | "Disable WoWLAN."); | |
346 | ||
347 | ||
348 | static int print_wowlan_handler(struct nl_msg *msg, void *arg) | |
349 | { | |
350 | struct nlattr *attrs[NL80211_ATTR_MAX + 1]; | |
351 | struct nlattr *trig[NUM_NL80211_WOWLAN_TRIG]; | |
352 | struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); | |
353 | struct nlattr *pattern; | |
354 | int rem_pattern; | |
355 | ||
356 | nla_parse(attrs, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), | |
357 | genlmsg_attrlen(gnlh, 0), NULL); | |
358 | ||
359 | if (!attrs[NL80211_ATTR_WOWLAN_TRIGGERS]) { | |
360 | printf("WoWLAN is disabled.\n"); | |
361 | return NL_SKIP; | |
362 | } | |
363 | ||
364 | /* XXX: use policy */ | |
365 | nla_parse(trig, MAX_NL80211_WOWLAN_TRIG, | |
366 | nla_data(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]), | |
367 | nla_len(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]), | |
368 | NULL); | |
369 | ||
370 | printf("WoWLAN is enabled:\n"); | |
371 | if (trig[NL80211_WOWLAN_TRIG_ANY]) | |
372 | printf(" * wake up on special any trigger\n"); | |
373 | if (trig[NL80211_WOWLAN_TRIG_DISCONNECT]) | |
374 | printf(" * wake up on disconnect\n"); | |
375 | if (trig[NL80211_WOWLAN_TRIG_MAGIC_PKT]) | |
376 | printf(" * wake up on magic packet\n"); | |
3a6636b1 JB |
377 | if (trig[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE]) |
378 | printf(" * wake up on GTK rekeying failure\n"); | |
379 | if (trig[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST]) | |
380 | printf(" * wake up on EAP identity request\n"); | |
381 | if (trig[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE]) | |
382 | printf(" * wake up on 4-way handshake\n"); | |
383 | if (trig[NL80211_WOWLAN_TRIG_RFKILL_RELEASE]) | |
384 | printf(" * wake up on RF-kill release\n"); | |
d7d39283 LC |
385 | if (trig[NL80211_WOWLAN_TRIG_NET_DETECT]) { |
386 | struct nlattr *match, *freq, | |
387 | *nd[NUM_NL80211_ATTR], *tb[NUM_NL80211_ATTR]; | |
388 | int rem_match; | |
389 | ||
d516c5bc | 390 | printf(" * wake up on network detection\n"); |
d7d39283 LC |
391 | nla_parse(nd, NUM_NL80211_ATTR, |
392 | nla_data(trig[NL80211_WOWLAN_TRIG_NET_DETECT]), | |
393 | nla_len(trig[NL80211_WOWLAN_TRIG_NET_DETECT]), NULL); | |
394 | ||
395 | if (nd[NL80211_ATTR_SCHED_SCAN_INTERVAL]) | |
29af2019 | 396 | printf("\tscan interval: %u msecs\n", |
d7d39283 LC |
397 | nla_get_u32(nd[NL80211_ATTR_SCHED_SCAN_INTERVAL])); |
398 | ||
29af2019 | 399 | if (nd[NL80211_ATTR_SCHED_SCAN_DELAY]) |
f66320a6 | 400 | printf("\tinitial scan delay: %u secs\n", |
29af2019 LC |
401 | nla_get_u32(nd[NL80211_ATTR_SCHED_SCAN_DELAY])); |
402 | ||
d7d39283 LC |
403 | if (nd[NL80211_ATTR_SCHED_SCAN_MATCH]) { |
404 | printf("\tmatches:\n"); | |
405 | nla_for_each_nested(match, | |
406 | nd[NL80211_ATTR_SCHED_SCAN_MATCH], | |
407 | rem_match) { | |
408 | nla_parse(tb, NUM_NL80211_ATTR, nla_data(match), | |
409 | nla_len(match), | |
410 | NULL); | |
411 | printf("\t\tSSID: "); | |
412 | print_ssid_escaped( | |
413 | nla_len(tb[NL80211_SCHED_SCAN_MATCH_ATTR_SSID]), | |
414 | nla_data(tb[NL80211_SCHED_SCAN_MATCH_ATTR_SSID])); | |
415 | printf("\n"); | |
416 | } | |
417 | } | |
418 | if (nd[NL80211_ATTR_SCAN_FREQUENCIES]) { | |
419 | printf("\tfrequencies:"); | |
420 | nla_for_each_nested(freq, | |
421 | nd[NL80211_ATTR_SCAN_FREQUENCIES], | |
422 | rem_match) { | |
423 | printf(" %d", nla_get_u32(freq)); | |
424 | } | |
425 | printf("\n"); | |
426 | } | |
427 | } | |
3ff24563 JB |
428 | if (trig[NL80211_WOWLAN_TRIG_PKT_PATTERN]) { |
429 | nla_for_each_nested(pattern, | |
430 | trig[NL80211_WOWLAN_TRIG_PKT_PATTERN], | |
431 | rem_pattern) { | |
c82868da | 432 | struct nlattr *patattr[NUM_NL80211_PKTPAT]; |
19195f35 | 433 | int i, patlen, masklen; |
3ff24563 | 434 | uint8_t *mask, *pat; |
c82868da AK |
435 | nla_parse(patattr, MAX_NL80211_PKTPAT, |
436 | nla_data(pattern), nla_len(pattern), NULL); | |
437 | if (!patattr[NL80211_PKTPAT_MASK] || | |
19195f35 | 438 | !patattr[NL80211_PKTPAT_PATTERN]) { |
3ff24563 JB |
439 | printf(" * (invalid pattern specification)\n"); |
440 | continue; | |
441 | } | |
c82868da AK |
442 | masklen = nla_len(patattr[NL80211_PKTPAT_MASK]); |
443 | patlen = nla_len(patattr[NL80211_PKTPAT_PATTERN]); | |
3ff24563 JB |
444 | if (DIV_ROUND_UP(patlen, 8) != masklen) { |
445 | printf(" * (invalid pattern specification)\n"); | |
446 | continue; | |
447 | } | |
19195f35 JB |
448 | if (patattr[NL80211_PKTPAT_OFFSET]) { |
449 | int pkt_offset = | |
450 | nla_get_u32(patattr[NL80211_PKTPAT_OFFSET]); | |
451 | printf(" * wake up on packet offset: %d", pkt_offset); | |
452 | } | |
1c8f49c5 | 453 | printf(" pattern: "); |
c82868da AK |
454 | pat = nla_data(patattr[NL80211_PKTPAT_PATTERN]); |
455 | mask = nla_data(patattr[NL80211_PKTPAT_MASK]); | |
3ff24563 JB |
456 | for (i = 0; i < patlen; i++) { |
457 | if (mask[i / 8] & (1 << (i % 8))) | |
458 | printf("%.2x", pat[i]); | |
459 | else | |
460 | printf("--"); | |
461 | if (i != patlen - 1) | |
462 | printf(":"); | |
463 | } | |
464 | printf("\n"); | |
465 | } | |
466 | } | |
819b78cc JB |
467 | if (trig[NL80211_WOWLAN_TRIG_TCP_CONNECTION]) |
468 | printf(" * wake up on TCP connection\n"); | |
3ff24563 JB |
469 | |
470 | return NL_SKIP; | |
471 | } | |
472 | ||
34b23014 | 473 | static int handle_wowlan_show(struct nl80211_state *state, |
05514f95 JB |
474 | struct nl_msg *msg, int argc, char **argv, |
475 | enum id_input id) | |
3ff24563 | 476 | { |
34b23014 | 477 | register_handler(print_wowlan_handler, NULL); |
3ff24563 JB |
478 | |
479 | return 0; | |
480 | } | |
481 | COMMAND(wowlan, show, "", NL80211_CMD_GET_WOWLAN, 0, CIB_PHY, handle_wowlan_show, | |
482 | "Show WoWLAN status."); |