wps-nfc.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410
  1. #!/usr/bin/python
  2. #
  3. # Example nfcpy to wpa_supplicant wrapper for WPS NFC operations
  4. # Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
  5. #
  6. # This software may be distributed under the terms of the BSD license.
  7. # See README for more details.
  8. import os
  9. import sys
  10. import time
  11. import random
  12. import StringIO
  13. import nfc
  14. import nfc.ndef
  15. import nfc.llcp
  16. import nfc.handover
  17. import logging
  18. logging.basicConfig()
  19. import wpaspy
  20. wpas_ctrl = '/var/run/wpa_supplicant'
  21. def wpas_connect():
  22. ifaces = []
  23. if os.path.isdir(wpas_ctrl):
  24. try:
  25. ifaces = [os.path.join(wpas_ctrl, i) for i in os.listdir(wpas_ctrl)]
  26. except OSError, error:
  27. print "Could not find wpa_supplicant: ", error
  28. return None
  29. if len(ifaces) < 1:
  30. print "No wpa_supplicant control interface found"
  31. return None
  32. for ctrl in ifaces:
  33. try:
  34. wpas = wpaspy.Ctrl(ctrl)
  35. return wpas
  36. except Exception, e:
  37. pass
  38. return None
  39. def wpas_tag_read(message):
  40. wpas = wpas_connect()
  41. if (wpas == None):
  42. return
  43. print wpas.request("WPS_NFC_TAG_READ " + message.encode("hex"))
  44. def wpas_get_config_token(id=None):
  45. wpas = wpas_connect()
  46. if (wpas == None):
  47. return None
  48. if id:
  49. return wpas.request("WPS_NFC_CONFIG_TOKEN NDEF " + id).rstrip().decode("hex")
  50. return wpas.request("WPS_NFC_CONFIG_TOKEN NDEF").rstrip().decode("hex")
  51. def wpas_get_er_config_token(uuid):
  52. wpas = wpas_connect()
  53. if (wpas == None):
  54. return None
  55. return wpas.request("WPS_ER_NFC_CONFIG_TOKEN NDEF " + uuid).rstrip().decode("hex")
  56. def wpas_get_password_token():
  57. wpas = wpas_connect()
  58. if (wpas == None):
  59. return None
  60. return wpas.request("WPS_NFC_TOKEN NDEF").rstrip().decode("hex")
  61. def wpas_get_handover_req():
  62. wpas = wpas_connect()
  63. if (wpas == None):
  64. return None
  65. return wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip().decode("hex")
  66. def wpas_get_handover_sel(uuid):
  67. wpas = wpas_connect()
  68. if (wpas == None):
  69. return None
  70. if uuid is None:
  71. return wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip().decode("hex")
  72. return wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR " + uuid).rstrip().decode("hex")
  73. def wpas_report_handover(req, sel, type):
  74. wpas = wpas_connect()
  75. if (wpas == None):
  76. return None
  77. return wpas.request("NFC_REPORT_HANDOVER " + type + " WPS " +
  78. str(req).encode("hex") + " " +
  79. str(sel).encode("hex"))
  80. class HandoverServer(nfc.handover.HandoverServer):
  81. def __init__(self):
  82. super(HandoverServer, self).__init__()
  83. def process_request(self, request):
  84. print "HandoverServer - request received"
  85. print "Parsed handover request: " + request.pretty()
  86. sel = nfc.ndef.HandoverSelectMessage(version="1.2")
  87. for carrier in request.carriers:
  88. print "Remote carrier type: " + carrier.type
  89. if carrier.type == "application/vnd.wfa.wsc":
  90. print "WPS carrier type match - add WPS carrier record"
  91. self.received_carrier = carrier.record
  92. data = wpas_get_handover_sel(self.uuid)
  93. if data is None:
  94. print "Could not get handover select carrier record from wpa_supplicant"
  95. continue
  96. print "Handover select carrier record from wpa_supplicant:"
  97. print data.encode("hex")
  98. self.sent_carrier = data
  99. message = nfc.ndef.Message(data);
  100. sel.add_carrier(message[0], "active", message[1:])
  101. print "Handover select:"
  102. print sel.pretty()
  103. print str(sel).encode("hex")
  104. print "Sending handover select"
  105. return sel
  106. def wps_handover_resp(peer, uuid):
  107. if uuid is None:
  108. print "Trying to handle WPS handover"
  109. else:
  110. print "Trying to handle WPS handover with AP " + uuid
  111. srv = HandoverServer()
  112. srv.sent_carrier = None
  113. srv.uuid = uuid
  114. nfc.llcp.activate(peer);
  115. try:
  116. print "Trying handover";
  117. srv.start()
  118. print "Wait for disconnect"
  119. while nfc.llcp.connected():
  120. time.sleep(0.1)
  121. print "Disconnected after handover"
  122. except nfc.llcp.ConnectRefused:
  123. print "Handover connection refused"
  124. nfc.llcp.shutdown()
  125. return
  126. if srv.sent_carrier:
  127. wpas_report_handover(srv.received_carrier, srv.sent_carrier, "RESP")
  128. print "Remove peer"
  129. nfc.llcp.shutdown()
  130. print "Done with handover"
  131. time.sleep(1)
  132. def wps_handover_init(peer):
  133. print "Trying to initiate WPS handover"
  134. data = wpas_get_handover_req()
  135. if (data == None):
  136. print "Could not get handover request carrier record from wpa_supplicant"
  137. return
  138. print "Handover request carrier record from wpa_supplicant: " + data.encode("hex")
  139. record = nfc.ndef.Record()
  140. f = StringIO.StringIO(data)
  141. record._read(f)
  142. record = nfc.ndef.HandoverCarrierRecord(record)
  143. print "Parsed handover request carrier record:"
  144. print record.pretty()
  145. message = nfc.ndef.HandoverRequestMessage(version="1.2")
  146. message.nonce = random.randint(0, 0xffff)
  147. message.add_carrier(record, "active")
  148. print "Handover request:"
  149. print message.pretty()
  150. nfc.llcp.activate(peer);
  151. client = nfc.handover.HandoverClient()
  152. try:
  153. print "Trying handover";
  154. client.connect()
  155. print "Connected for handover"
  156. except nfc.llcp.ConnectRefused:
  157. print "Handover connection refused"
  158. nfc.llcp.shutdown()
  159. client.close()
  160. return
  161. print "Sending handover request"
  162. if not client.send(message):
  163. print "Failed to send handover request"
  164. print "Receiving handover response"
  165. message = client._recv()
  166. if message is None:
  167. print "No response received"
  168. nfc.llcp.shutdown()
  169. client.close()
  170. return
  171. if message.type != "urn:nfc:wkt:Hs":
  172. print "Response was not Hs - received: " + message.type
  173. nfc.llcp.shutdown()
  174. client.close()
  175. return
  176. print "Received message"
  177. print message.pretty()
  178. message = nfc.ndef.HandoverSelectMessage(message)
  179. print "Handover select received"
  180. print message.pretty()
  181. for carrier in message.carriers:
  182. print "Remote carrier type: " + carrier.type
  183. if carrier.type == "application/vnd.wfa.wsc":
  184. print "WPS carrier type match - send to wpa_supplicant"
  185. wpas_report_handover(data, carrier.record, "INIT")
  186. wifi = nfc.ndef.WifiConfigRecord(carrier.record)
  187. print wifi.pretty()
  188. print "Remove peer"
  189. nfc.llcp.shutdown()
  190. client.close()
  191. print "Done with handover"
  192. def wps_tag_read(tag):
  193. if len(tag.ndef.message):
  194. message = nfc.ndef.Message(tag.ndef.message)
  195. print "message type " + message.type
  196. for record in message:
  197. print "record type " + record.type
  198. if record.type == "application/vnd.wfa.wsc":
  199. print "WPS tag - send to wpa_supplicant"
  200. wpas_tag_read(tag.ndef.message)
  201. break
  202. else:
  203. print "Empty tag"
  204. print "Remove tag"
  205. while tag.is_present:
  206. time.sleep(0.1)
  207. def wps_write_config_tag(clf, id=None):
  208. print "Write WPS config token"
  209. data = wpas_get_config_token(id)
  210. if (data == None):
  211. print "Could not get WPS config token from wpa_supplicant"
  212. return
  213. print "Touch an NFC tag"
  214. while True:
  215. tag = clf.poll()
  216. if tag == None:
  217. time.sleep(0.1)
  218. continue
  219. break
  220. print "Tag found - writing"
  221. tag.ndef.message = data
  222. print "Done - remove tag"
  223. while tag.is_present:
  224. time.sleep(0.1)
  225. def wps_write_er_config_tag(clf, uuid):
  226. print "Write WPS ER config token"
  227. data = wpas_get_er_config_token(uuid)
  228. if (data == None):
  229. print "Could not get WPS config token from wpa_supplicant"
  230. return
  231. print "Touch an NFC tag"
  232. while True:
  233. tag = clf.poll()
  234. if tag == None:
  235. time.sleep(0.1)
  236. continue
  237. break
  238. print "Tag found - writing"
  239. tag.ndef.message = data
  240. print "Done - remove tag"
  241. while tag.is_present:
  242. time.sleep(0.1)
  243. def wps_write_password_tag(clf):
  244. print "Write WPS password token"
  245. data = wpas_get_password_token()
  246. if (data == None):
  247. print "Could not get WPS password token from wpa_supplicant"
  248. return
  249. print "Touch an NFC tag"
  250. while True:
  251. tag = clf.poll()
  252. if tag == None:
  253. time.sleep(0.1)
  254. continue
  255. break
  256. print "Tag found - writing"
  257. tag.ndef.message = data
  258. print "Done - remove tag"
  259. while tag.is_present:
  260. time.sleep(0.1)
  261. def find_peer(clf):
  262. while True:
  263. if nfc.llcp.connected():
  264. print "LLCP connected"
  265. general_bytes = nfc.llcp.startup({})
  266. peer = clf.listen(ord(os.urandom(1)) + 250, general_bytes)
  267. if isinstance(peer, nfc.DEP):
  268. print "listen -> DEP";
  269. if peer.general_bytes.startswith("Ffm"):
  270. print "Found DEP"
  271. return peer
  272. print "mismatch in general_bytes"
  273. print peer.general_bytes
  274. peer = clf.poll(general_bytes)
  275. if isinstance(peer, nfc.DEP):
  276. print "poll -> DEP";
  277. if peer.general_bytes.startswith("Ffm"):
  278. print "Found DEP"
  279. return peer
  280. print "mismatch in general_bytes"
  281. print peer.general_bytes
  282. if peer:
  283. print "Found tag"
  284. return peer
  285. def main():
  286. clf = nfc.ContactlessFrontend()
  287. try:
  288. arg_uuid = None
  289. if len(sys.argv) > 1:
  290. arg_uuid = sys.argv[1]
  291. if len(sys.argv) > 1 and sys.argv[1] == "write-config":
  292. wps_write_config_tag(clf)
  293. raise SystemExit
  294. if len(sys.argv) > 2 and sys.argv[1] == "write-config-id":
  295. wps_write_config_tag(clf, sys.argv[2])
  296. raise SystemExit
  297. if len(sys.argv) > 2 and sys.argv[1] == "write-er-config":
  298. wps_write_er_config_tag(clf, sys.argv[2])
  299. raise SystemExit
  300. if len(sys.argv) > 1 and sys.argv[1] == "write-password":
  301. wps_write_password_tag(clf)
  302. raise SystemExit
  303. while True:
  304. print "Waiting for a tag or peer to be touched"
  305. tag = find_peer(clf)
  306. if isinstance(tag, nfc.DEP):
  307. if arg_uuid is None:
  308. wps_handover_init(tag)
  309. elif arg_uuid is "ap":
  310. wps_handover_resp(tag, None)
  311. else:
  312. wps_handover_resp(tag, arg_uuid)
  313. continue
  314. if tag.ndef:
  315. wps_tag_read(tag)
  316. continue
  317. print "Not an NDEF tag - remove tag"
  318. while tag.is_present:
  319. time.sleep(0.1)
  320. except KeyboardInterrupt:
  321. raise SystemExit
  322. finally:
  323. clf.close()
  324. raise SystemExit
  325. if __name__ == '__main__':
  326. main()