2 * nmrpflash - Netgear Unbrick Utility
3 * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
5 * nmrpflash is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation, either version 3 of the License, or
8 * (at your option) any later version.
10 * nmrpflash is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
29 #define NMRP_HDR_LEN 6
30 #define NMRP_OPT_LEN 4
31 #define NMRP_MIN_PKT_LEN (sizeof(struct eth_hdr) + NMRP_HDR_LEN)
33 #define NMRP_MAX_OPT_SIZE 12
34 #define NMRP_MAX_OPT_NUM 2
36 #define ETH_P_NMRP 0x0912
38 #define MAX_LOOP_RECV 1024
41 #define PACKED __attribute__((__packed__))
51 NMRP_C_KEEP_ALIVE_REQ = 6,
52 NMRP_C_KEEP_ALIVE_ACK = 7,
53 NMRP_C_TFTP_UL_REQ = 16
57 NMRP_O_MAGIC_NO = 0x0001,
58 NMRP_O_DEV_IP = 0x0002,
59 NMRP_O_DEV_REGION = 0x0004,
60 NMRP_O_FW_UP = 0x0101,
61 NMRP_O_ST_UP = 0x0102,
62 NMRP_O_FILE_NAME = 0x0181
82 struct nmrp_opt opts[2];
87 uint8_t ether_dhost[6];
88 uint8_t ether_shost[6];
97 static void msg_update_len(struct nmrp_msg *msg)
100 msg->len = NMRP_HDR_LEN;
101 for (; i != msg->num_opts; ++i) {
102 msg->len += msg->opts[i].len;
106 static void msg_dump(struct nmrp_msg *msg, int dump_opts)
108 struct nmrp_opt *opt;
109 int remain_len, len, i;
111 fprintf(stderr, "res=0x%04x, code=0x%02x, id=0x%02x, len=%u",
112 msg->reserved, msg->code, msg->id, msg->len);
114 remain_len = msg->len - NMRP_HDR_LEN;
115 fprintf(stderr, "%s\n", remain_len ? "" : " (no opts)");
120 while (remain_len > 0) {
122 fprintf(stderr, " opt type=%u, len=%u", opt->type, len);
123 for (i = 0; i != len - NMRP_OPT_LEN; ++i) {
125 fprintf(stderr, "\n ");
128 fprintf(stderr, "%02x ", ((char*)&opt->val)[i] & 0xff);
130 fprintf(stderr, "\n");
132 opt = (struct nmrp_opt*)(((char*)opt) + len);
137 static void msg_hton(struct nmrp_msg *msg)
141 msg->reserved = htons(msg->reserved);
142 msg->len = htons(msg->len);
144 for (; i != msg->num_opts; ++i) {
145 msg->opts[i].len = htons(msg->opts[i].len);
146 msg->opts[i].type = htons(msg->opts[i].type);
150 static void msg_hdr_ntoh(struct nmrp_msg *msg)
152 msg->reserved = ntohs(msg->reserved);
153 msg->len = ntohs(msg->len);
156 static int msg_ntoh(struct nmrp_msg *msg)
158 struct nmrp_opt *opt = msg->opts;
161 remaining = msg->len - NMRP_HDR_LEN;
163 // FIXME maximum of two options supported, maximum option
165 if (remaining < NMRP_MAX_OPT_NUM * NMRP_MAX_OPT_SIZE) {
166 while (remaining > 0) {
167 if (remaining < NMRP_OPT_LEN) {
171 opt->type = ntohs(opt->type);
172 opt->len = ntohs(opt->len);
174 if (opt->len > NMRP_MAX_OPT_SIZE) {
178 remaining -= opt->len;
187 fprintf(stderr, "Unexpected message format.\n");
192 static void *msg_opt_data(struct nmrp_msg *msg, int type, uint16_t *len)
194 struct nmrp_opt *opt = msg->opts;
195 int remaining = msg->len - NMRP_HDR_LEN;
197 while (remaining > 0) {
198 if (opt->type == type) {
199 *len = opt->len - NMRP_OPT_LEN;
200 return (char*)&opt->val;
203 remaining -= opt->len;
204 opt = (struct nmrp_opt*)((char*)opt) + opt->len;
210 static int pkt_send(struct ethsock *sock, struct nmrp_pkt *pkt)
212 size_t len = ntohs(pkt->msg.len) + sizeof(pkt->eh);
213 return ethsock_send(sock, pkt, len);
216 static int pkt_recv(struct ethsock *sock, struct nmrp_pkt *pkt)
220 memset(pkt, 0, sizeof(*pkt));
221 bytes = ethsock_recv(sock, pkt, sizeof(*pkt));
226 } else if (bytes < NMRP_MIN_PKT_LEN) {
227 fprintf(stderr, "Short packet (%d bytes)\n", (int)bytes);
231 msg_hdr_ntoh(&pkt->msg);
232 len = pkt->msg.len + sizeof(pkt->eh);
235 fprintf(stderr, "Short packet (expected %d, got %d).\n",
236 (int)len, (int)bytes);
240 return msg_ntoh(&pkt->msg);
243 static int mac_parse(const char *str, uint8_t *hwaddr)
248 sscanf(str, "%02x:%02x:%02x:%02x:%02x:%02x%n",
249 data, data + 1, data + 2, data + 3, data + 4, data + 5, &i);
251 if (i == strlen(str)) {
252 for (i = 0; i != 6; ++i) {
257 hwaddr[i] = data[i] & 0xff;
267 static struct ethsock *gsock = NULL;
269 static void sigh(int sig)
273 ethsock_close(gsock);
279 static const char *spinner = "\\|/-";
281 int nmrp_do(struct nmrpd_args *args)
283 struct nmrp_pkt tx, rx;
284 uint8_t *src, dest[6];
287 struct in_addr ipaddr, ipmask;
289 int i, err, ulreqs, expect;
290 struct ethsock *sock;
291 void (*sigh_orig)(int);
293 if (args->op != NMRP_UPLOAD_FW) {
294 fprintf(stderr, "Operation not implemented.\n");
298 if (!mac_parse(args->mac, dest)) {
299 fprintf(stderr, "Invalid MAC address '%s'.\n", args->mac);
303 if ((ipaddr.s_addr = inet_addr(args->ipaddr)) == INADDR_NONE) {
304 fprintf(stderr, "Invalid IP address '%s'.\n", args->ipaddr);
308 if ((ipmask.s_addr = inet_addr(args->ipmask)) == INADDR_NONE) {
309 fprintf(stderr, "Invalid subnet mask '%s'.\n", args->ipmask);
313 if (strcmp(args->file_local, "-") && access(args->file_local, R_OK) == -1) {
314 fprintf(stderr, "Error accessing file '%s'.\n", args->file_local);
318 if (args->file_remote) {
319 if (!tftp_is_valid_filename(args->file_remote)) {
320 fprintf(stderr, "Invalid remote filename '%s'.\n",
328 sock = ethsock_create(args->intf, ETH_P_NMRP);
334 sigh_orig = signal(SIGINT, sigh);
336 if (ethsock_set_timeout(sock, args->rx_timeout)) {
340 src = ethsock_get_hwaddr(sock);
345 memcpy(tx.eh.ether_shost, src, 6);
346 memcpy(tx.eh.ether_dhost, dest, 6);
347 tx.eh.ether_type = htons(ETH_P_NMRP);
350 tx.msg.code = NMRP_C_ADVERTISE;
353 tx.msg.opts[0].type = NMRP_O_MAGIC_NO;
354 tx.msg.opts[0].len = NMRP_OPT_LEN + 4;
355 tx.msg.opts[0].val.magic[0] = 'N';
356 tx.msg.opts[0].val.magic[1] = 'T';
357 tx.msg.opts[0].val.magic[2] = 'G';
358 tx.msg.opts[0].val.magic[3] = 'R';
360 msg_update_len(&tx.msg);
367 printf("\rAdvertising NMRP server on interface ... %c",
372 if (pkt_send(sock, &tx) < 0) {
377 err = pkt_recv(sock, &rx);
378 if (err == 0 && memcmp(rx.eh.ether_dhost, src, 6) == 0) {
380 } else if (err == 1) {
384 if ((time(NULL) - beg) >= 60) {
385 printf("\nNo response after 60 seconds. Bailing out.\n");
393 expect = NMRP_C_CONF_REQ;
397 if (expect != NMRP_C_NONE && rx.msg.code != expect) {
398 fprintf(stderr, "Received code 0x%02x while waiting for 0x%02x!\n",
399 rx.msg.code, expect);
402 tx.msg.code = NMRP_C_NONE;
410 switch (rx.msg.code) {
411 case NMRP_C_ADVERTISE:
412 printf("Received NMRP advertisement from %s.\n",
413 mac_to_str(rx.eh.ether_shost));
416 case NMRP_C_CONF_REQ:
417 tx.msg.code = NMRP_C_CONF_ACK;
420 tx.msg.opts[0].type = NMRP_O_DEV_IP;
421 tx.msg.opts[0].len = NMRP_OPT_LEN + 2 * 4;
423 memcpy(tx.msg.opts[0].val.ip.addr, &ipaddr, 4);
424 memcpy(tx.msg.opts[0].val.ip.mask, &ipmask, 4);
426 tx.msg.opts[1].type = NMRP_O_FW_UP;
427 tx.msg.opts[1].len = NMRP_OPT_LEN;
429 expect = NMRP_C_TFTP_UL_REQ;
431 printf("Received configuration request from %s.\n",
432 mac_to_str(rx.eh.ether_shost));
434 memcpy(tx.eh.ether_dhost, rx.eh.ether_shost, 6);
436 printf("Sending configuration: ip %s, mask %s.\n",
437 args->ipaddr, args->ipmask);
440 case NMRP_C_TFTP_UL_REQ:
442 fprintf(stderr, "Device re-requested file upload %d "
443 "times; aborting.\n", ulreqs);
444 tx.msg.code = NMRP_C_CLOSE_REQ;
449 filename = msg_opt_data(&rx.msg, NMRP_O_FILE_NAME, &len);
451 if (!args->file_remote) {
452 args->file_remote = filename;
454 printf("Received upload request: filename '%.*s'.\n",
456 } else if (!args->file_remote) {
457 if (tftp_is_valid_filename(args->file_local)) {
458 args->file_remote = args->file_local;
460 args->file_remote = "firmware";
462 printf("Received upload request with empty filename.");
468 printf("Executing '%s' ... ", args->tftpcmd);
470 err = system(args->tftpcmd);
478 if (!err && args->file_local) {
480 printf("Using remote filename '%s'.\n",
484 if (!strcmp(args->file_local, "-")) {
485 printf("Uploading from stdin ... ");
487 printf("Uploading %s ... ", args->file_local);
490 err = tftp_put(args);
494 printf("OK\nWaiting for remote to respond.\n");
495 ethsock_set_timeout(sock, args->ul_timeout);
496 expect = NMRP_C_CLOSE_REQ;
497 } else if (err == -2) {
498 expect = NMRP_C_TFTP_UL_REQ;
504 case NMRP_C_KEEP_ALIVE_REQ:
505 tx.msg.code = NMRP_C_KEEP_ALIVE_ACK;
507 case NMRP_C_CLOSE_REQ:
508 tx.msg.code = NMRP_C_CLOSE_ACK;
510 case NMRP_C_CLOSE_ACK:
514 fprintf(stderr, "Unknown message code 0x%02x!\n",
516 msg_dump(&rx.msg, 0);
519 if (tx.msg.code != NMRP_C_NONE) {
520 msg_update_len(&tx.msg);
523 if (pkt_send(sock, &tx) < 0) {
529 if (rx.msg.code == NMRP_C_CLOSE_REQ) {
530 printf("Remote finished. Closing connection.\n");
534 err = pkt_recv(sock, &rx);
537 fprintf(stderr, "Timeout while waiting for 0x%02x.\n", expect);
542 ethsock_set_timeout(sock, args->rx_timeout);
548 printf("Reboot your device now.\n");
551 signal(SIGINT, sigh_orig);