2012-11-03 16:43:15 -04:00
|
|
|
#!/usr/bin/python
|
|
|
|
#
|
|
|
|
# Example nfcpy to wpa_supplicant wrapper for WPS NFC operations
|
2013-02-10 09:20:25 -05:00
|
|
|
# Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
|
2012-11-03 16:43:15 -04:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import os
|
|
|
|
import sys
|
|
|
|
import time
|
2013-02-10 11:19:59 -05:00
|
|
|
import random
|
2013-11-29 05:16:38 -05:00
|
|
|
import threading
|
2013-11-29 05:41:34 -05:00
|
|
|
import argparse
|
2012-11-03 16:43:15 -04:00
|
|
|
|
|
|
|
import nfc
|
|
|
|
import nfc.ndef
|
2012-11-04 09:04:42 -05:00
|
|
|
import nfc.llcp
|
|
|
|
import nfc.handover
|
2012-11-03 16:43:15 -04:00
|
|
|
|
2013-02-10 09:20:25 -05:00
|
|
|
import logging
|
|
|
|
|
2013-03-16 15:47:10 -04:00
|
|
|
import wpaspy
|
2012-11-03 16:43:15 -04:00
|
|
|
|
|
|
|
wpas_ctrl = '/var/run/wpa_supplicant'
|
2013-11-29 05:16:38 -05:00
|
|
|
srv = None
|
|
|
|
continue_loop = True
|
2013-11-29 05:57:34 -05:00
|
|
|
terminate_now = False
|
2014-02-12 05:48:26 -05:00
|
|
|
summary_file = None
|
|
|
|
success_file = None
|
|
|
|
|
|
|
|
def summary(txt):
|
2019-01-24 02:45:42 -05:00
|
|
|
print(txt)
|
2014-02-12 05:48:26 -05:00
|
|
|
if summary_file:
|
|
|
|
with open(summary_file, 'a') as f:
|
|
|
|
f.write(txt + "\n")
|
|
|
|
|
|
|
|
def success_report(txt):
|
|
|
|
summary(txt)
|
|
|
|
if success_file:
|
|
|
|
with open(success_file, 'a') as f:
|
|
|
|
f.write(txt + "\n")
|
2012-11-03 16:43:15 -04:00
|
|
|
|
2012-11-04 08:53:33 -05:00
|
|
|
def wpas_connect():
|
2012-11-03 16:43:15 -04:00
|
|
|
ifaces = []
|
|
|
|
if os.path.isdir(wpas_ctrl):
|
|
|
|
try:
|
|
|
|
ifaces = [os.path.join(wpas_ctrl, i) for i in os.listdir(wpas_ctrl)]
|
2019-01-24 02:45:41 -05:00
|
|
|
except OSError as error:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Could not find wpa_supplicant: ", error)
|
2012-11-04 08:53:33 -05:00
|
|
|
return None
|
2012-11-03 16:43:15 -04:00
|
|
|
|
|
|
|
if len(ifaces) < 1:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("No wpa_supplicant control interface found")
|
2012-11-04 08:53:33 -05:00
|
|
|
return None
|
2012-11-03 16:43:15 -04:00
|
|
|
|
|
|
|
for ctrl in ifaces:
|
|
|
|
try:
|
2013-03-16 15:47:10 -04:00
|
|
|
wpas = wpaspy.Ctrl(ctrl)
|
2012-11-04 08:53:33 -05:00
|
|
|
return wpas
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2012-11-03 16:43:15 -04:00
|
|
|
pass
|
2012-11-04 08:53:33 -05:00
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
|
|
def wpas_tag_read(message):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
2013-04-11 11:18:39 -04:00
|
|
|
return False
|
2013-11-29 05:16:38 -05:00
|
|
|
if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")):
|
2013-04-11 11:18:39 -04:00
|
|
|
return False
|
|
|
|
return True
|
2012-11-04 08:56:46 -05:00
|
|
|
|
2013-04-01 14:28:57 -04:00
|
|
|
def wpas_get_config_token(id=None):
|
2013-02-15 04:45:29 -05:00
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
|
|
|
return None
|
2013-04-01 14:28:57 -04:00
|
|
|
if id:
|
2013-04-11 11:18:39 -04:00
|
|
|
ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF " + id)
|
|
|
|
else:
|
|
|
|
ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF")
|
|
|
|
if "FAIL" in ret:
|
|
|
|
return None
|
|
|
|
return ret.rstrip().decode("hex")
|
2013-02-15 04:45:29 -05:00
|
|
|
|
|
|
|
|
2013-02-24 03:54:18 -05:00
|
|
|
def wpas_get_er_config_token(uuid):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
|
|
|
return None
|
2013-11-29 05:46:41 -05:00
|
|
|
ret = wpas.request("WPS_ER_NFC_CONFIG_TOKEN NDEF " + uuid)
|
|
|
|
if "FAIL" in ret:
|
|
|
|
return None
|
|
|
|
return ret.rstrip().decode("hex")
|
2013-02-24 03:54:18 -05:00
|
|
|
|
|
|
|
|
2013-02-15 04:29:37 -05:00
|
|
|
def wpas_get_password_token():
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
|
|
|
return None
|
2014-02-12 05:48:26 -05:00
|
|
|
ret = wpas.request("WPS_NFC_TOKEN NDEF")
|
|
|
|
if "FAIL" in ret:
|
|
|
|
return None
|
|
|
|
return ret.rstrip().decode("hex")
|
2013-02-15 04:29:37 -05:00
|
|
|
|
2012-11-04 09:04:42 -05:00
|
|
|
def wpas_get_handover_req():
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
|
|
|
return None
|
2014-02-12 05:48:26 -05:00
|
|
|
ret = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR")
|
|
|
|
if "FAIL" in ret:
|
|
|
|
return None
|
|
|
|
return ret.rstrip().decode("hex")
|
2012-11-04 09:04:42 -05:00
|
|
|
|
|
|
|
|
2013-02-24 03:56:29 -05:00
|
|
|
def wpas_get_handover_sel(uuid):
|
2012-11-04 09:04:42 -05:00
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
2013-02-11 11:43:46 -05:00
|
|
|
return None
|
2013-02-24 03:57:06 -05:00
|
|
|
if uuid is None:
|
2013-11-29 05:46:41 -05:00
|
|
|
res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip()
|
|
|
|
else:
|
|
|
|
res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR " + uuid).rstrip()
|
|
|
|
if "FAIL" in res:
|
|
|
|
return None
|
|
|
|
return res.decode("hex")
|
2013-02-24 03:56:29 -05:00
|
|
|
|
|
|
|
|
|
|
|
def wpas_report_handover(req, sel, type):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if (wpas == None):
|
|
|
|
return None
|
|
|
|
return wpas.request("NFC_REPORT_HANDOVER " + type + " WPS " +
|
2013-02-11 11:43:46 -05:00
|
|
|
str(req).encode("hex") + " " +
|
|
|
|
str(sel).encode("hex"))
|
2012-11-04 09:04:42 -05:00
|
|
|
|
|
|
|
|
2013-02-24 03:56:29 -05:00
|
|
|
class HandoverServer(nfc.handover.HandoverServer):
|
2013-11-29 05:16:38 -05:00
|
|
|
def __init__(self, llc):
|
|
|
|
super(HandoverServer, self).__init__(llc)
|
|
|
|
self.sent_carrier = None
|
|
|
|
self.ho_server_processing = False
|
|
|
|
self.success = False
|
2013-02-24 03:56:29 -05:00
|
|
|
|
2014-02-13 09:14:04 -05:00
|
|
|
# override to avoid parser error in request/response.pretty() in nfcpy
|
|
|
|
# due to new WSC handover format
|
|
|
|
def _process_request(self, request):
|
|
|
|
summary("received handover request {}".format(request.type))
|
|
|
|
response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
|
|
|
|
if not request.type == 'urn:nfc:wkt:Hr':
|
|
|
|
summary("not a handover request")
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
request = nfc.ndef.HandoverRequestMessage(request)
|
|
|
|
except nfc.ndef.DecodeError as e:
|
|
|
|
summary("error decoding 'Hr' message: {}".format(e))
|
|
|
|
else:
|
|
|
|
response = self.process_request(request)
|
|
|
|
summary("send handover response {}".format(response.type))
|
|
|
|
return response
|
|
|
|
|
2013-02-24 03:56:29 -05:00
|
|
|
def process_request(self, request):
|
2013-11-29 05:16:38 -05:00
|
|
|
self.ho_server_processing = True
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("HandoverServer - request received")
|
2013-11-29 06:01:39 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Parsed handover request: " + request.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
2013-02-24 03:56:29 -05:00
|
|
|
|
|
|
|
sel = nfc.ndef.HandoverSelectMessage(version="1.2")
|
|
|
|
|
|
|
|
for carrier in request.carriers:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Remote carrier type: " + carrier.type)
|
2013-02-24 03:56:29 -05:00
|
|
|
if carrier.type == "application/vnd.wfa.wsc":
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("WPS carrier type match - add WPS carrier record")
|
2013-02-24 03:56:29 -05:00
|
|
|
data = wpas_get_handover_sel(self.uuid)
|
|
|
|
if data is None:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Could not get handover select carrier record from wpa_supplicant")
|
2013-02-24 03:56:29 -05:00
|
|
|
continue
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Handover select carrier record from wpa_supplicant:")
|
|
|
|
print(data.encode("hex"))
|
2013-02-24 03:56:29 -05:00
|
|
|
self.sent_carrier = data
|
2014-02-12 05:48:26 -05:00
|
|
|
if "OK" in wpas_report_handover(carrier.record, self.sent_carrier, "RESP"):
|
|
|
|
success_report("Handover reported successfully (responder)")
|
|
|
|
else:
|
|
|
|
summary("Handover report rejected (responder)")
|
2013-02-24 03:56:29 -05:00
|
|
|
|
|
|
|
message = nfc.ndef.Message(data);
|
|
|
|
sel.add_carrier(message[0], "active", message[1:])
|
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Handover select:")
|
2013-11-29 06:01:39 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(sel.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
|
|
|
print(str(sel).encode("hex"))
|
2013-02-24 03:56:29 -05:00
|
|
|
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Sending handover select")
|
2013-11-29 05:16:38 -05:00
|
|
|
self.success = True
|
2013-02-24 03:56:29 -05:00
|
|
|
return sel
|
|
|
|
|
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
def wps_handover_init(llc):
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Trying to initiate WPS handover")
|
2012-11-04 09:04:42 -05:00
|
|
|
|
|
|
|
data = wpas_get_handover_req()
|
|
|
|
if (data == None):
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Could not get handover request carrier record from wpa_supplicant")
|
2012-11-04 09:04:42 -05:00
|
|
|
return
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Handover request carrier record from wpa_supplicant: " + data.encode("hex"))
|
2013-02-10 11:19:59 -05:00
|
|
|
|
|
|
|
message = nfc.ndef.HandoverRequestMessage(version="1.2")
|
|
|
|
message.nonce = random.randint(0, 0xffff)
|
2013-11-29 05:59:26 -05:00
|
|
|
datamsg = nfc.ndef.Message(data)
|
|
|
|
message.add_carrier(datamsg[0], "active", datamsg[1:])
|
2013-02-10 11:19:59 -05:00
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Handover request:")
|
2013-11-29 06:01:39 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(message.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
|
|
|
print(str(message).encode("hex"))
|
2012-11-04 09:04:42 -05:00
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
client = nfc.handover.HandoverClient(llc)
|
2012-11-04 09:04:42 -05:00
|
|
|
try:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Trying to initiate NFC connection handover")
|
2012-11-04 09:04:42 -05:00
|
|
|
client.connect()
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Connected for handover")
|
2012-11-04 09:04:42 -05:00
|
|
|
except nfc.llcp.ConnectRefused:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Handover connection refused")
|
|
|
|
client.close()
|
|
|
|
return
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Other exception: " + str(e))
|
2012-11-04 09:04:42 -05:00
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Sending handover request")
|
2012-11-04 09:04:42 -05:00
|
|
|
|
|
|
|
if not client.send(message):
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Failed to send handover request")
|
|
|
|
client.close()
|
|
|
|
return
|
2012-11-04 09:04:42 -05:00
|
|
|
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Receiving handover response")
|
2012-11-04 09:04:42 -05:00
|
|
|
message = client._recv()
|
2013-02-10 09:27:59 -05:00
|
|
|
if message is None:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("No response received")
|
2013-02-10 09:27:59 -05:00
|
|
|
client.close()
|
|
|
|
return
|
2013-02-10 11:42:43 -05:00
|
|
|
if message.type != "urn:nfc:wkt:Hs":
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Response was not Hs - received: " + message.type)
|
2013-02-10 11:42:43 -05:00
|
|
|
client.close()
|
|
|
|
return
|
2013-02-10 09:27:59 -05:00
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Received message")
|
2013-11-29 06:01:39 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(message.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
|
|
|
print(str(message).encode("hex"))
|
2013-02-10 11:42:43 -05:00
|
|
|
message = nfc.ndef.HandoverSelectMessage(message)
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Handover select received")
|
2013-11-29 06:01:39 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(message.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
2013-02-10 11:42:43 -05:00
|
|
|
|
|
|
|
for carrier in message.carriers:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Remote carrier type: " + carrier.type)
|
2013-02-10 11:42:43 -05:00
|
|
|
if carrier.type == "application/vnd.wfa.wsc":
|
2019-01-24 02:45:42 -05:00
|
|
|
print("WPS carrier type match - send to wpa_supplicant")
|
2014-02-12 05:48:26 -05:00
|
|
|
if "OK" in wpas_report_handover(data, carrier.record, "INIT"):
|
|
|
|
success_report("Handover reported successfully (initiator)")
|
|
|
|
else:
|
|
|
|
summary("Handover report rejected (initiator)")
|
2013-11-29 06:01:39 -05:00
|
|
|
# nfcpy does not support the new format..
|
|
|
|
#wifi = nfc.ndef.WifiConfigRecord(carrier.record)
|
|
|
|
#print wifi.pretty()
|
2012-11-04 09:04:42 -05:00
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Remove peer")
|
2012-11-04 09:04:42 -05:00
|
|
|
client.close()
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Done with handover")
|
2013-11-29 05:16:38 -05:00
|
|
|
global only_one
|
|
|
|
if only_one:
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
2012-11-04 09:04:42 -05:00
|
|
|
|
2013-11-29 05:57:34 -05:00
|
|
|
global no_wait
|
|
|
|
if no_wait:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Trying to exit..")
|
2013-11-29 05:57:34 -05:00
|
|
|
global terminate_now
|
|
|
|
terminate_now = True
|
2012-11-04 09:04:42 -05:00
|
|
|
|
2013-04-11 11:18:39 -04:00
|
|
|
def wps_tag_read(tag, wait_remove=True):
|
|
|
|
success = False
|
2012-11-04 08:56:46 -05:00
|
|
|
if len(tag.ndef.message):
|
2013-11-29 05:16:38 -05:00
|
|
|
for record in tag.ndef.message:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("record type " + record.type)
|
2012-11-04 08:56:46 -05:00
|
|
|
if record.type == "application/vnd.wfa.wsc":
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("WPS tag - send to wpa_supplicant")
|
2013-04-11 11:18:39 -04:00
|
|
|
success = wpas_tag_read(tag.ndef.message)
|
2012-11-04 08:56:46 -05:00
|
|
|
break
|
|
|
|
else:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Empty tag")
|
|
|
|
|
|
|
|
if success:
|
|
|
|
success_report("Tag read succeeded")
|
2012-11-04 08:56:46 -05:00
|
|
|
|
2013-04-11 11:18:39 -04:00
|
|
|
if wait_remove:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Remove tag")
|
2013-04-11 11:18:39 -04:00
|
|
|
while tag.is_present:
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
|
|
|
return success
|
2012-11-04 08:56:46 -05:00
|
|
|
|
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
def rdwr_connected_write(tag):
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Tag found - writing - " + str(tag))
|
2013-11-29 05:16:38 -05:00
|
|
|
global write_data
|
|
|
|
tag.ndef.message = str(write_data)
|
2014-02-12 05:48:26 -05:00
|
|
|
success_report("Tag write succeeded")
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Done - remove tag")
|
2013-11-29 05:16:38 -05:00
|
|
|
global only_one
|
|
|
|
if only_one:
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
|
|
|
global write_wait_remove
|
|
|
|
while write_wait_remove and tag.is_present:
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
2013-04-11 11:18:39 -04:00
|
|
|
def wps_write_config_tag(clf, id=None, wait_remove=True):
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Write WPS config token")
|
2013-11-29 05:16:38 -05:00
|
|
|
global write_data, write_wait_remove
|
|
|
|
write_wait_remove = wait_remove
|
|
|
|
write_data = wpas_get_config_token(id)
|
|
|
|
if write_data == None:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Could not get WPS config token from wpa_supplicant")
|
2013-04-11 11:18:39 -04:00
|
|
|
sys.exit(1)
|
2013-02-15 04:45:29 -05:00
|
|
|
return
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Touch an NFC tag")
|
2013-11-29 05:16:38 -05:00
|
|
|
clf.connect(rdwr={'on-connect': rdwr_connected_write})
|
2013-02-15 04:45:29 -05:00
|
|
|
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
def wps_write_er_config_tag(clf, uuid, wait_remove=True):
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Write WPS ER config token")
|
2013-11-29 05:16:38 -05:00
|
|
|
global write_data, write_wait_remove
|
2013-11-29 05:41:34 -05:00
|
|
|
write_wait_remove = wait_remove
|
2013-11-29 05:16:38 -05:00
|
|
|
write_data = wpas_get_er_config_token(uuid)
|
|
|
|
if write_data == None:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Could not get WPS config token from wpa_supplicant")
|
2013-02-24 03:54:18 -05:00
|
|
|
return
|
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Touch an NFC tag")
|
2013-11-29 05:16:38 -05:00
|
|
|
clf.connect(rdwr={'on-connect': rdwr_connected_write})
|
2013-02-24 03:54:18 -05:00
|
|
|
|
|
|
|
|
2013-04-11 11:18:39 -04:00
|
|
|
def wps_write_password_tag(clf, wait_remove=True):
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Write WPS password token")
|
2013-11-29 05:16:38 -05:00
|
|
|
global write_data, write_wait_remove
|
|
|
|
write_wait_remove = wait_remove
|
|
|
|
write_data = wpas_get_password_token()
|
|
|
|
if write_data == None:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Could not get WPS password token from wpa_supplicant")
|
2013-02-15 04:29:37 -05:00
|
|
|
return
|
|
|
|
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Touch an NFC tag")
|
2013-11-29 05:16:38 -05:00
|
|
|
clf.connect(rdwr={'on-connect': rdwr_connected_write})
|
|
|
|
|
|
|
|
|
|
|
|
def rdwr_connected(tag):
|
2013-11-29 05:57:34 -05:00
|
|
|
global only_one, no_wait
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Tag connected: " + str(tag))
|
2013-11-29 05:16:38 -05:00
|
|
|
|
|
|
|
if tag.ndef:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("NDEF tag: " + tag.type)
|
2013-11-29 05:16:38 -05:00
|
|
|
try:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(tag.ndef.message.pretty())
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print(e)
|
2013-11-29 05:16:38 -05:00
|
|
|
success = wps_tag_read(tag, not only_one)
|
|
|
|
if only_one and success:
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
|
|
|
else:
|
2014-02-12 05:48:26 -05:00
|
|
|
summary("Not an NDEF tag - remove tag")
|
|
|
|
return True
|
2013-11-29 05:57:34 -05:00
|
|
|
|
|
|
|
return not no_wait
|
2013-02-15 04:29:37 -05:00
|
|
|
|
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
def llcp_worker(llc):
|
|
|
|
global arg_uuid
|
|
|
|
if arg_uuid is None:
|
|
|
|
wps_handover_init(llc)
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Exiting llcp_worker thread")
|
2013-11-29 05:16:38 -05:00
|
|
|
return
|
2013-02-15 04:29:37 -05:00
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
global srv
|
|
|
|
global wait_connection
|
|
|
|
while not wait_connection and srv.sent_carrier is None:
|
|
|
|
if srv.ho_server_processing:
|
|
|
|
time.sleep(0.025)
|
|
|
|
|
|
|
|
def llcp_startup(clf, llc):
|
|
|
|
global arg_uuid
|
|
|
|
if arg_uuid:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Start LLCP server")
|
2013-11-29 05:16:38 -05:00
|
|
|
global srv
|
|
|
|
srv = HandoverServer(llc)
|
|
|
|
if arg_uuid is "ap":
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Trying to handle WPS handover")
|
2013-11-29 05:16:38 -05:00
|
|
|
srv.uuid = None
|
|
|
|
else:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Trying to handle WPS handover with AP " + arg_uuid)
|
2013-11-29 05:16:38 -05:00
|
|
|
srv.uuid = arg_uuid
|
|
|
|
return llc
|
|
|
|
|
|
|
|
def llcp_connected(llc):
|
2019-01-24 02:45:42 -05:00
|
|
|
print("P2P LLCP connected")
|
2013-11-29 05:16:38 -05:00
|
|
|
global wait_connection
|
|
|
|
wait_connection = False
|
|
|
|
global arg_uuid
|
|
|
|
if arg_uuid:
|
|
|
|
global srv
|
|
|
|
srv.start()
|
|
|
|
else:
|
|
|
|
threading.Thread(target=llcp_worker, args=(llc,)).start()
|
2019-01-24 02:45:42 -05:00
|
|
|
print("llcp_connected returning")
|
2013-11-29 05:16:38 -05:00
|
|
|
return True
|
2013-02-10 09:25:20 -05:00
|
|
|
|
|
|
|
|
2013-11-29 05:57:34 -05:00
|
|
|
def terminate_loop():
|
|
|
|
global terminate_now
|
|
|
|
return terminate_now
|
|
|
|
|
2012-11-03 16:43:15 -04:00
|
|
|
def main():
|
|
|
|
clf = nfc.ContactlessFrontend()
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
parser = argparse.ArgumentParser(description='nfcpy to wpa_supplicant integration for WPS NFC operations')
|
2013-11-30 09:49:04 -05:00
|
|
|
parser.add_argument('-d', const=logging.DEBUG, default=logging.INFO,
|
|
|
|
action='store_const', dest='loglevel',
|
|
|
|
help='verbose debug output')
|
|
|
|
parser.add_argument('-q', const=logging.WARNING, action='store_const',
|
|
|
|
dest='loglevel', help='be quiet')
|
2013-11-29 05:41:34 -05:00
|
|
|
parser.add_argument('--only-one', '-1', action='store_true',
|
|
|
|
help='run only one operation and exit')
|
|
|
|
parser.add_argument('--no-wait', action='store_true',
|
|
|
|
help='do not wait for tag to be removed before exiting')
|
|
|
|
parser.add_argument('--uuid',
|
|
|
|
help='UUID of an AP (used for WPS ER operations)')
|
|
|
|
parser.add_argument('--id',
|
|
|
|
help='network id (used for WPS ER operations)')
|
2014-02-12 05:48:26 -05:00
|
|
|
parser.add_argument('--summary',
|
|
|
|
help='summary file for writing status updates')
|
|
|
|
parser.add_argument('--success',
|
|
|
|
help='success file for writing success update')
|
2013-11-29 05:41:34 -05:00
|
|
|
parser.add_argument('command', choices=['write-config',
|
|
|
|
'write-er-config',
|
|
|
|
'write-password'],
|
|
|
|
nargs='?')
|
|
|
|
args = parser.parse_args()
|
2013-11-29 05:16:38 -05:00
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
global arg_uuid
|
|
|
|
arg_uuid = args.uuid
|
2013-02-15 04:45:29 -05:00
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
global only_one
|
|
|
|
only_one = args.only_one
|
2013-04-11 11:18:39 -04:00
|
|
|
|
2013-11-29 05:57:34 -05:00
|
|
|
global no_wait
|
|
|
|
no_wait = args.no_wait
|
|
|
|
|
2014-02-12 05:48:26 -05:00
|
|
|
if args.summary:
|
|
|
|
global summary_file
|
|
|
|
summary_file = args.summary
|
|
|
|
|
|
|
|
if args.success:
|
|
|
|
global success_file
|
|
|
|
success_file = args.success
|
|
|
|
|
2013-11-30 09:49:04 -05:00
|
|
|
logging.basicConfig(level=args.loglevel)
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
try:
|
|
|
|
if not clf.open("usb"):
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Could not open connection with an NFC device")
|
2013-04-01 14:28:57 -04:00
|
|
|
raise SystemExit
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
if args.command == "write-config":
|
|
|
|
wps_write_config_tag(clf, id=args.id, wait_remove=not args.no_wait)
|
2013-02-24 03:54:18 -05:00
|
|
|
raise SystemExit
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
if args.command == "write-er-config":
|
|
|
|
wps_write_er_config_tag(clf, args.uuid, wait_remove=not args.no_wait)
|
2013-02-15 04:29:37 -05:00
|
|
|
raise SystemExit
|
|
|
|
|
2013-11-29 05:41:34 -05:00
|
|
|
if args.command == "write-password":
|
|
|
|
wps_write_password_tag(clf, wait_remove=not args.no_wait)
|
2013-04-11 11:18:39 -04:00
|
|
|
raise SystemExit
|
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
global continue_loop
|
|
|
|
while continue_loop:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("Waiting for a tag or peer to be touched")
|
2013-11-29 05:16:38 -05:00
|
|
|
wait_connection = True
|
|
|
|
try:
|
|
|
|
if not clf.connect(rdwr={'on-connect': rdwr_connected},
|
|
|
|
llcp={'on-startup': llcp_startup,
|
2013-11-29 05:57:34 -05:00
|
|
|
'on-connect': llcp_connected},
|
|
|
|
terminate=terminate_loop):
|
2013-04-11 11:18:39 -04:00
|
|
|
break
|
2019-01-24 02:45:41 -05:00
|
|
|
except Exception as e:
|
2019-01-24 02:45:42 -05:00
|
|
|
print("clf.connect failed")
|
2013-02-10 09:25:20 -05:00
|
|
|
|
2013-11-29 05:16:38 -05:00
|
|
|
global srv
|
|
|
|
if only_one and srv and srv.success:
|
|
|
|
raise SystemExit
|
2012-11-03 16:43:15 -04:00
|
|
|
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
raise SystemExit
|
|
|
|
finally:
|
|
|
|
clf.close()
|
|
|
|
|
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|