p2p-nfc.py 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637
  1. #!/usr/bin/python
  2. #
  3. # Example nfcpy to wpa_supplicant wrapper for P2P NFC operations
  4. # Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
  5. #
  6. # This software may be distributed under the terms of the BSD license.
  7. # See README for more details.
  8. import os
  9. import sys
  10. import time
  11. import random
  12. import threading
  13. import argparse
  14. import nfc
  15. import nfc.ndef
  16. import nfc.llcp
  17. import nfc.handover
  18. import logging
  19. import wpaspy
  20. wpas_ctrl = '/var/run/wpa_supplicant'
  21. ifname = None
  22. init_on_touch = False
  23. in_raw_mode = False
  24. prev_tcgetattr = 0
  25. include_wps_req = True
  26. include_p2p_req = True
  27. no_input = False
  28. srv = None
  29. continue_loop = True
  30. terminate_now = False
  31. summary_file = None
  32. success_file = None
  33. def summary(txt):
  34. print txt
  35. if summary_file:
  36. with open(summary_file, 'a') as f:
  37. f.write(txt + "\n")
  38. def success_report(txt):
  39. summary(txt)
  40. if success_file:
  41. with open(success_file, 'a') as f:
  42. f.write(txt + "\n")
  43. def wpas_connect():
  44. ifaces = []
  45. if os.path.isdir(wpas_ctrl):
  46. try:
  47. ifaces = [os.path.join(wpas_ctrl, i) for i in os.listdir(wpas_ctrl)]
  48. except OSError, error:
  49. print "Could not find wpa_supplicant: ", error
  50. return None
  51. if len(ifaces) < 1:
  52. print "No wpa_supplicant control interface found"
  53. return None
  54. for ctrl in ifaces:
  55. if ifname:
  56. if ifname not in ctrl:
  57. continue
  58. try:
  59. print "Trying to use control interface " + ctrl
  60. wpas = wpaspy.Ctrl(ctrl)
  61. return wpas
  62. except Exception, e:
  63. pass
  64. return None
  65. def wpas_tag_read(message):
  66. wpas = wpas_connect()
  67. if (wpas == None):
  68. return False
  69. cmd = "WPS_NFC_TAG_READ " + str(message).encode("hex")
  70. global force_freq
  71. if force_freq:
  72. cmd = cmd + " freq=" + force_freq
  73. if "FAIL" in wpas.request(cmd):
  74. return False
  75. return True
  76. def wpas_get_handover_req():
  77. wpas = wpas_connect()
  78. if (wpas == None):
  79. return None
  80. res = wpas.request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
  81. if "FAIL" in res:
  82. return None
  83. return res.decode("hex")
  84. def wpas_get_handover_req_wps():
  85. wpas = wpas_connect()
  86. if (wpas == None):
  87. return None
  88. res = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
  89. if "FAIL" in res:
  90. return None
  91. return res.decode("hex")
  92. def wpas_get_handover_sel(tag=False):
  93. wpas = wpas_connect()
  94. if (wpas == None):
  95. return None
  96. if tag:
  97. res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip()
  98. else:
  99. res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip()
  100. if "FAIL" in res:
  101. return None
  102. return res.decode("hex")
  103. def wpas_get_handover_sel_wps():
  104. wpas = wpas_connect()
  105. if (wpas == None):
  106. return None
  107. res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR");
  108. if "FAIL" in res:
  109. return None
  110. return res.rstrip().decode("hex")
  111. def wpas_report_handover(req, sel, type):
  112. wpas = wpas_connect()
  113. if (wpas == None):
  114. return None
  115. cmd = "NFC_REPORT_HANDOVER " + type + " P2P " + str(req).encode("hex") + " " + str(sel).encode("hex")
  116. global force_freq
  117. if force_freq:
  118. cmd = cmd + " freq=" + force_freq
  119. return wpas.request(cmd)
  120. def wpas_report_handover_wsc(req, sel, type):
  121. wpas = wpas_connect()
  122. if (wpas == None):
  123. return None
  124. cmd = "NFC_REPORT_HANDOVER " + type + " WPS " + str(req).encode("hex") + " " + str(sel).encode("hex")
  125. if force_freq:
  126. cmd = cmd + " freq=" + force_freq
  127. return wpas.request(cmd)
  128. def p2p_handover_client(llc):
  129. message = nfc.ndef.HandoverRequestMessage(version="1.2")
  130. message.nonce = random.randint(0, 0xffff)
  131. global include_p2p_req
  132. if include_p2p_req:
  133. data = wpas_get_handover_req()
  134. if (data == None):
  135. summary("Could not get handover request carrier record from wpa_supplicant")
  136. return
  137. print "Handover request carrier record from wpa_supplicant: " + data.encode("hex")
  138. datamsg = nfc.ndef.Message(data)
  139. message.add_carrier(datamsg[0], "active", datamsg[1:])
  140. global include_wps_req
  141. if include_wps_req:
  142. print "Handover request (pre-WPS):"
  143. try:
  144. print message.pretty()
  145. except Exception, e:
  146. print e
  147. data = wpas_get_handover_req_wps()
  148. if data:
  149. print "Add WPS request in addition to P2P"
  150. datamsg = nfc.ndef.Message(data)
  151. message.add_carrier(datamsg[0], "active", datamsg[1:])
  152. print "Handover request:"
  153. try:
  154. print message.pretty()
  155. except Exception, e:
  156. print e
  157. print str(message).encode("hex")
  158. client = nfc.handover.HandoverClient(llc)
  159. try:
  160. summary("Trying to initiate NFC connection handover")
  161. client.connect()
  162. summary("Connected for handover")
  163. except nfc.llcp.ConnectRefused:
  164. summary("Handover connection refused")
  165. client.close()
  166. return
  167. except Exception, e:
  168. summary("Other exception: " + str(e))
  169. client.close()
  170. return
  171. summary("Sending handover request")
  172. if not client.send(message):
  173. summary("Failed to send handover request")
  174. client.close()
  175. return
  176. summary("Receiving handover response")
  177. message = client._recv()
  178. if message is None:
  179. summary("No response received")
  180. client.close()
  181. return
  182. if message.type != "urn:nfc:wkt:Hs":
  183. summary("Response was not Hs - received: " + message.type)
  184. client.close()
  185. return
  186. print "Received message"
  187. try:
  188. print message.pretty()
  189. except Exception, e:
  190. print e
  191. print str(message).encode("hex")
  192. message = nfc.ndef.HandoverSelectMessage(message)
  193. summary("Handover select received")
  194. try:
  195. print message.pretty()
  196. except Exception, e:
  197. print e
  198. for carrier in message.carriers:
  199. print "Remote carrier type: " + carrier.type
  200. if carrier.type == "application/vnd.wfa.p2p":
  201. print "P2P carrier type match - send to wpa_supplicant"
  202. if "OK" in wpas_report_handover(data, carrier.record, "INIT"):
  203. success_report("P2P handover reported successfully (initiator)")
  204. else:
  205. summary("P2P handover report rejected")
  206. break
  207. print "Remove peer"
  208. client.close()
  209. print "Done with handover"
  210. global only_one
  211. if only_one:
  212. print "only_one -> stop loop"
  213. global continue_loop
  214. continue_loop = False
  215. global no_wait
  216. if no_wait:
  217. print "Trying to exit.."
  218. global terminate_now
  219. terminate_now = True
  220. class HandoverServer(nfc.handover.HandoverServer):
  221. def __init__(self, llc):
  222. super(HandoverServer, self).__init__(llc)
  223. self.sent_carrier = None
  224. self.ho_server_processing = False
  225. self.success = False
  226. def process_request(self, request):
  227. self.ho_server_processing = True
  228. clear_raw_mode()
  229. print "HandoverServer - request received"
  230. try:
  231. print "Parsed handover request: " + request.pretty()
  232. except Exception, e:
  233. print e
  234. sel = nfc.ndef.HandoverSelectMessage(version="1.2")
  235. found = False
  236. for carrier in request.carriers:
  237. print "Remote carrier type: " + carrier.type
  238. if carrier.type == "application/vnd.wfa.p2p":
  239. print "P2P carrier type match - add P2P carrier record"
  240. found = True
  241. self.received_carrier = carrier.record
  242. print "Carrier record:"
  243. try:
  244. print carrier.record.pretty()
  245. except Exception, e:
  246. print e
  247. data = wpas_get_handover_sel()
  248. if data is None:
  249. print "Could not get handover select carrier record from wpa_supplicant"
  250. continue
  251. print "Handover select carrier record from wpa_supplicant:"
  252. print data.encode("hex")
  253. self.sent_carrier = data
  254. if "OK" in wpas_report_handover(self.received_carrier, self.sent_carrier, "RESP"):
  255. success_report("P2P handover reported successfully (responder)")
  256. else:
  257. summary("P2P handover report rejected")
  258. break
  259. message = nfc.ndef.Message(data);
  260. sel.add_carrier(message[0], "active", message[1:])
  261. break
  262. for carrier in request.carriers:
  263. if found:
  264. break
  265. print "Remote carrier type: " + carrier.type
  266. if carrier.type == "application/vnd.wfa.wsc":
  267. print "WSC carrier type match - add WSC carrier record"
  268. found = True
  269. self.received_carrier = carrier.record
  270. print "Carrier record:"
  271. try:
  272. print carrier.record.pretty()
  273. except Exception, e:
  274. print e
  275. data = wpas_get_handover_sel_wps()
  276. if data is None:
  277. print "Could not get handover select carrier record from wpa_supplicant"
  278. continue
  279. print "Handover select carrier record from wpa_supplicant:"
  280. print data.encode("hex")
  281. self.sent_carrier = data
  282. if "OK" in wpas_report_handover_wsc(self.received_carrier, self.sent_carrier, "RESP"):
  283. success_report("WSC handover reported successfully")
  284. else:
  285. summary("WSC handover report rejected")
  286. break
  287. message = nfc.ndef.Message(data);
  288. sel.add_carrier(message[0], "active", message[1:])
  289. found = True
  290. break
  291. print "Handover select:"
  292. try:
  293. print sel.pretty()
  294. except Exception, e:
  295. print e
  296. print str(sel).encode("hex")
  297. summary("Sending handover select")
  298. self.success = True
  299. return sel
  300. def clear_raw_mode():
  301. import sys, tty, termios
  302. global prev_tcgetattr, in_raw_mode
  303. if not in_raw_mode:
  304. return
  305. fd = sys.stdin.fileno()
  306. termios.tcsetattr(fd, termios.TCSADRAIN, prev_tcgetattr)
  307. in_raw_mode = False
  308. def getch():
  309. import sys, tty, termios, select
  310. global prev_tcgetattr, in_raw_mode
  311. fd = sys.stdin.fileno()
  312. prev_tcgetattr = termios.tcgetattr(fd)
  313. ch = None
  314. try:
  315. tty.setraw(fd)
  316. in_raw_mode = True
  317. [i, o, e] = select.select([fd], [], [], 0.05)
  318. if i:
  319. ch = sys.stdin.read(1)
  320. finally:
  321. termios.tcsetattr(fd, termios.TCSADRAIN, prev_tcgetattr)
  322. in_raw_mode = False
  323. return ch
  324. def p2p_tag_read(tag):
  325. success = False
  326. if len(tag.ndef.message):
  327. for record in tag.ndef.message:
  328. print "record type " + record.type
  329. if record.type == "application/vnd.wfa.wsc":
  330. summary("WPS tag - send to wpa_supplicant")
  331. success = wpas_tag_read(tag.ndef.message)
  332. break
  333. if record.type == "application/vnd.wfa.p2p":
  334. summary("P2P tag - send to wpa_supplicant")
  335. success = wpas_tag_read(tag.ndef.message)
  336. break
  337. else:
  338. summary("Empty tag")
  339. if success:
  340. success_report("Tag read succeeded")
  341. return success
  342. def rdwr_connected_p2p_write(tag):
  343. summary("Tag found - writing - " + str(tag))
  344. global p2p_sel_data
  345. tag.ndef.message = str(p2p_sel_data)
  346. success_report("Tag write succeeded")
  347. print "Done - remove tag"
  348. global only_one
  349. if only_one:
  350. global continue_loop
  351. continue_loop = False
  352. global p2p_sel_wait_remove
  353. return p2p_sel_wait_remove
  354. def wps_write_p2p_handover_sel(clf, wait_remove=True):
  355. print "Write P2P handover select"
  356. data = wpas_get_handover_sel(tag=True)
  357. if (data == None):
  358. summary("Could not get P2P handover select from wpa_supplicant")
  359. return
  360. global p2p_sel_wait_remove
  361. p2p_sel_wait_remove = wait_remove
  362. global p2p_sel_data
  363. p2p_sel_data = nfc.ndef.HandoverSelectMessage(version="1.2")
  364. message = nfc.ndef.Message(data);
  365. p2p_sel_data.add_carrier(message[0], "active", message[1:])
  366. print "Handover select:"
  367. try:
  368. print p2p_sel_data.pretty()
  369. except Exception, e:
  370. print e
  371. print str(p2p_sel_data).encode("hex")
  372. print "Touch an NFC tag"
  373. clf.connect(rdwr={'on-connect': rdwr_connected_p2p_write})
  374. def rdwr_connected(tag):
  375. global only_one, no_wait
  376. summary("Tag connected: " + str(tag))
  377. if tag.ndef:
  378. print "NDEF tag: " + tag.type
  379. try:
  380. print tag.ndef.message.pretty()
  381. except Exception, e:
  382. print e
  383. success = p2p_tag_read(tag)
  384. if only_one and success:
  385. global continue_loop
  386. continue_loop = False
  387. else:
  388. summary("Not an NDEF tag - remove tag")
  389. return True
  390. return not no_wait
  391. def llcp_worker(llc):
  392. global init_on_touch
  393. if init_on_touch:
  394. print "Starting handover client"
  395. p2p_handover_client(llc)
  396. return
  397. global no_input
  398. if no_input:
  399. print "Wait for handover to complete"
  400. else:
  401. print "Wait for handover to complete - press 'i' to initiate ('w' for WPS only, 'p' for P2P only)"
  402. global srv
  403. global wait_connection
  404. while not wait_connection and srv.sent_carrier is None:
  405. if srv.ho_server_processing:
  406. time.sleep(0.025)
  407. elif no_input:
  408. time.sleep(0.5)
  409. else:
  410. global include_wps_req, include_p2p_req
  411. res = getch()
  412. if res == 'i':
  413. include_wps_req = True
  414. include_p2p_req = True
  415. elif res == 'p':
  416. include_wps_req = False
  417. include_p2p_req = True
  418. elif res == 'w':
  419. include_wps_req = True
  420. include_p2p_req = False
  421. else:
  422. continue
  423. clear_raw_mode()
  424. print "Starting handover client"
  425. p2p_handover_client(llc)
  426. return
  427. clear_raw_mode()
  428. print "Exiting llcp_worker thread"
  429. def llcp_startup(clf, llc):
  430. print "Start LLCP server"
  431. global srv
  432. srv = HandoverServer(llc)
  433. return llc
  434. def llcp_connected(llc):
  435. print "P2P LLCP connected"
  436. global wait_connection
  437. wait_connection = False
  438. global init_on_touch
  439. if not init_on_touch:
  440. global srv
  441. srv.start()
  442. if init_on_touch or not no_input:
  443. threading.Thread(target=llcp_worker, args=(llc,)).start()
  444. return True
  445. def terminate_loop():
  446. global terminate_now
  447. return terminate_now
  448. def main():
  449. clf = nfc.ContactlessFrontend()
  450. parser = argparse.ArgumentParser(description='nfcpy to wpa_supplicant integration for P2P and WPS NFC operations')
  451. parser.add_argument('-d', const=logging.DEBUG, default=logging.INFO,
  452. action='store_const', dest='loglevel',
  453. help='verbose debug output')
  454. parser.add_argument('-q', const=logging.WARNING, action='store_const',
  455. dest='loglevel', help='be quiet')
  456. parser.add_argument('--only-one', '-1', action='store_true',
  457. help='run only one operation and exit')
  458. parser.add_argument('--init-on-touch', '-I', action='store_true',
  459. help='initiate handover on touch')
  460. parser.add_argument('--no-wait', action='store_true',
  461. help='do not wait for tag to be removed before exiting')
  462. parser.add_argument('--ifname', '-i',
  463. help='network interface name')
  464. parser.add_argument('--no-wps-req', '-N', action='store_true',
  465. help='do not include WPS carrier record in request')
  466. parser.add_argument('--no-input', '-a', action='store_true',
  467. help='do not use stdout input to initiate handover')
  468. parser.add_argument('--tag-read-only', '-t', action='store_true',
  469. help='tag read only (do not allow connection handover)')
  470. parser.add_argument('--handover-only', action='store_true',
  471. help='connection handover only (do not allow tag read)')
  472. parser.add_argument('--freq', '-f',
  473. help='forced frequency of operating channel in MHz')
  474. parser.add_argument('--summary',
  475. help='summary file for writing status updates')
  476. parser.add_argument('--success',
  477. help='success file for writing success update')
  478. parser.add_argument('command', choices=['write-p2p-sel'],
  479. nargs='?')
  480. args = parser.parse_args()
  481. global only_one
  482. only_one = args.only_one
  483. global no_wait
  484. no_wait = args.no_wait
  485. global force_freq
  486. force_freq = args.freq
  487. logging.basicConfig(level=args.loglevel)
  488. global init_on_touch
  489. init_on_touch = args.init_on_touch
  490. if args.ifname:
  491. global ifname
  492. ifname = args.ifname
  493. print "Selected ifname " + ifname
  494. if args.no_wps_req:
  495. global include_wps_req
  496. include_wps_req = False
  497. if args.summary:
  498. global summary_file
  499. summary_file = args.summary
  500. if args.success:
  501. global success_file
  502. success_file = args.success
  503. if args.no_input:
  504. global no_input
  505. no_input = True
  506. clf = nfc.ContactlessFrontend()
  507. global wait_connection
  508. try:
  509. if not clf.open("usb"):
  510. print "Could not open connection with an NFC device"
  511. raise SystemExit
  512. if args.command == "write-p2p-sel":
  513. wps_write_p2p_handover_sel(clf, wait_remove=not args.no_wait)
  514. raise SystemExit
  515. global continue_loop
  516. while continue_loop:
  517. print "Waiting for a tag or peer to be touched"
  518. wait_connection = True
  519. try:
  520. if args.tag_read_only:
  521. if not clf.connect(rdwr={'on-connect': rdwr_connected}):
  522. break
  523. elif args.handover_only:
  524. if not clf.connect(llcp={'on-startup': llcp_startup,
  525. 'on-connect': llcp_connected},
  526. terminate=terminate_loop):
  527. break
  528. else:
  529. if not clf.connect(rdwr={'on-connect': rdwr_connected},
  530. llcp={'on-startup': llcp_startup,
  531. 'on-connect': llcp_connected},
  532. terminate=terminate_loop):
  533. break
  534. except Exception, e:
  535. print "clf.connect failed"
  536. global srv
  537. if only_one and srv and srv.success:
  538. raise SystemExit
  539. except KeyboardInterrupt:
  540. raise SystemExit
  541. finally:
  542. clf.close()
  543. raise SystemExit
  544. if __name__ == '__main__':
  545. main()