1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77#include "libbb.h"
78#include <netpacket/packet.h>
79#include <netinet/ether.h>
80#include <linux/if.h>
81
82
83
84
85
86#ifdef PF_PACKET
87# define whereto_t sockaddr_ll
88# define make_socket() xsocket(PF_PACKET, SOCK_RAW, 0)
89#else
90# define whereto_t sockaddr
91# define make_socket() xsocket(AF_INET, SOCK_PACKET, SOCK_PACKET)
92#endif
93
94#ifdef DEBUG
95# define bb_debug_msg(fmt, args...) fprintf(stderr, fmt, ## args)
96void bb_debug_dump_packet(unsigned char *outpack, int pktsize)
97{
98 int i;
99 printf("packet dump:\n");
100 for (i = 0; i < pktsize; ++i) {
101 printf("%2.2x ", outpack[i]);
102 if (i % 20 == 19) bb_putchar('\n');
103 }
104 printf("\n\n");
105}
106#else
107# define bb_debug_msg(fmt, args...) ((void)0)
108# define bb_debug_dump_packet(outpack, pktsize) ((void)0)
109#endif
110
111
112
113
114
115
116
117static void get_dest_addr(const char *hostid, struct ether_addr *eaddr)
118{
119 struct ether_addr *eap;
120
121 eap = ether_aton_r(hostid, eaddr);
122 if (eap) {
123 bb_debug_msg("The target station address is %s\n\n", ether_ntoa(eap));
124#if !defined(__UCLIBC__) || UCLIBC_VERSION >= KERNEL_VERSION(0, 9, 30)
125 } else if (ether_hostton(hostid, eaddr) == 0) {
126 bb_debug_msg("Station address for hostname %s is %s\n\n", hostid, ether_ntoa(eaddr));
127#endif
128 } else {
129 bb_show_usage();
130 }
131}
132
133#define PKT_HEADER_SIZE (20 + 16*6)
134static int fill_pkt_header(unsigned char *pkt, struct ether_addr *eaddr, int broadcast)
135{
136 int i;
137 unsigned char *station_addr = eaddr->ether_addr_octet;
138
139 memset(pkt, 0xff, 6);
140 if (!broadcast)
141 memcpy(pkt, station_addr, 6);
142 pkt += 6;
143
144 memcpy(pkt, station_addr, 6);
145 pkt += 6;
146
147 *pkt++ = 0x08;
148 *pkt++ = 0x42;
149
150 memset(pkt, 0xff, 6);
151
152 for (i = 0; i < 16; ++i) {
153 pkt += 6;
154 memcpy(pkt, station_addr, 6);
155 }
156
157 return PKT_HEADER_SIZE;
158}
159
160static int get_wol_pw(const char *ethoptarg, unsigned char *wol_passwd)
161{
162 unsigned passwd[6];
163 int byte_cnt, i;
164
165
166 byte_cnt = sscanf(ethoptarg, "%2x:%2x:%2x:%2x:%2x:%2x",
167 &passwd[0], &passwd[1], &passwd[2],
168 &passwd[3], &passwd[4], &passwd[5]);
169
170
171 if (byte_cnt < 4)
172 byte_cnt = sscanf(ethoptarg, "%u.%u.%u.%u",
173 &passwd[0], &passwd[1], &passwd[2], &passwd[3]);
174 if (byte_cnt < 4) {
175 bb_error_msg("can't read Wake-On-LAN pass");
176 return 0;
177 }
178
179 for (i = 0; i < byte_cnt; ++i)
180 wol_passwd[i] = passwd[i];
181
182 bb_debug_msg("password: %2.2x %2.2x %2.2x %2.2x (%d)\n\n",
183 wol_passwd[0], wol_passwd[1], wol_passwd[2], wol_passwd[3],
184 byte_cnt);
185
186 return byte_cnt;
187}
188
189int ether_wake_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
190int ether_wake_main(int argc UNUSED_PARAM, char **argv)
191{
192 const char *ifname = "eth0";
193 char *pass;
194 unsigned flags;
195 unsigned char wol_passwd[6];
196 int wol_passwd_sz = 0;
197 int s;
198 int pktsize;
199 unsigned char outpack[PKT_HEADER_SIZE + 6 + 16 ];
200
201 struct ether_addr eaddr;
202 struct whereto_t whereto;
203
204
205 opt_complementary = "=1";
206 flags = getopt32(argv, "bi:p:", &ifname, &pass);
207 if (flags & 4)
208 wol_passwd_sz = get_wol_pw(pass, wol_passwd);
209 flags &= 1;
210
211
212 s = make_socket();
213
214
215
216
217
218 get_dest_addr(argv[optind], &eaddr);
219
220
221 pktsize = fill_pkt_header(outpack, &eaddr, flags );
222
223 bb_debug_dump_packet(outpack, pktsize);
224
225
226#ifdef __linux__
227 {
228 struct ifreq if_hwaddr;
229
230 strncpy_IFNAMSIZ(if_hwaddr.ifr_name, ifname);
231 ioctl_or_perror_and_die(s, SIOCGIFHWADDR, &if_hwaddr, "SIOCGIFHWADDR on %s failed", ifname);
232
233 memcpy(outpack+6, if_hwaddr.ifr_hwaddr.sa_data, 6);
234
235# ifdef DEBUG
236 {
237 unsigned char *hwaddr = if_hwaddr.ifr_hwaddr.sa_data;
238 printf("The hardware address (SIOCGIFHWADDR) of %s is type %d "
239 "%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x\n\n", ifname,
240 if_hwaddr.ifr_hwaddr.sa_family, hwaddr[0], hwaddr[1],
241 hwaddr[2], hwaddr[3], hwaddr[4], hwaddr[5]);
242 }
243# endif
244 }
245#endif
246
247 bb_debug_dump_packet(outpack, pktsize);
248
249
250 if (wol_passwd_sz > 0) {
251 memcpy(outpack+pktsize, wol_passwd, wol_passwd_sz);
252 pktsize += wol_passwd_sz;
253 }
254
255 bb_debug_dump_packet(outpack, pktsize);
256
257
258 if (flags ) {
259 if (setsockopt_broadcast(s) != 0)
260 bb_perror_msg("SO_BROADCAST");
261 }
262
263#if defined(PF_PACKET)
264 {
265 struct ifreq ifr;
266 strncpy_IFNAMSIZ(ifr.ifr_name, ifname);
267 xioctl(s, SIOCGIFINDEX, &ifr);
268 memset(&whereto, 0, sizeof(whereto));
269 whereto.sll_family = AF_PACKET;
270 whereto.sll_ifindex = ifr.ifr_ifindex;
271
272
273 whereto.sll_halen = ETH_ALEN;
274 memcpy(whereto.sll_addr, outpack, ETH_ALEN);
275 }
276#else
277 whereto.sa_family = 0;
278 strcpy(whereto.sa_data, ifname);
279#endif
280 xsendto(s, outpack, pktsize, (struct sockaddr *)&whereto, sizeof(whereto));
281 if (ENABLE_FEATURE_CLEAN_UP)
282 close(s);
283 return EXIT_SUCCESS;
284}
285