blob: 5ba63a6466a829818a0d75609a807cbdb623d344 [file] [log] [blame]
/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2015-2019 Intel Corporation. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <errno.h>
#include <stdio.h>
#include <ell/ell.h>
#include "src/missing.h"
#include "src/module.h"
#include "src/dbus.h"
#include "src/netdev.h"
#include "src/wiphy.h"
#include "src/station.h"
#include "src/scan.h"
#include "src/ie.h"
#include "src/wscutil.h"
#include "src/util.h"
#include "src/handshake.h"
#include "src/eap-wsc.h"
#include "src/crypto.h"
#include "src/common.h"
#include "src/storage.h"
#include "src/iwd.h"
#include "src/network.h"
#include "src/wsc.h"
#define WALK_TIME 120
static uint32_t netdev_watch = 0;
struct wsc_enrollee {
struct netdev *netdev;
struct wsc_credentials_info creds[3];
uint32_t n_creds;
struct l_settings *eap_settings;
wsc_done_cb_t done_cb;
void *done_data;
bool disconnecting : 1;
};
static struct l_dbus_message *wsc_error_session_overlap(
struct l_dbus_message *msg)
{
return l_dbus_message_new_error(msg,
IWD_WSC_INTERFACE ".SessionOverlap",
"Multiple sessions detected");
}
static struct l_dbus_message *wsc_error_no_credentials(
struct l_dbus_message *msg)
{
return l_dbus_message_new_error(msg, IWD_WSC_INTERFACE ".NoCredentials",
"No usable credentials obtained");
}
static struct l_dbus_message *wsc_error_not_reachable(
struct l_dbus_message *msg)
{
return l_dbus_message_new_error(msg, IWD_WSC_INTERFACE ".NotReachable",
"Credentials obtained, but network is "
"unreachable");
}
static struct l_dbus_message *wsc_error_walk_time_expired(
struct l_dbus_message *msg)
{
return l_dbus_message_new_error(msg,
IWD_WSC_INTERFACE ".WalkTimeExpired",
"No APs in PushButton mode found in "
"the allotted time");
}
static struct l_dbus_message *wsc_error_time_expired(struct l_dbus_message *msg)
{
return l_dbus_message_new_error(msg,
IWD_WSC_INTERFACE ".TimeExpired",
"No APs in PIN mode found in "
"the allotted time");
}
static void wsc_enrollee_connect_cb(struct netdev *netdev,
enum netdev_result result,
void *event_data, void *user_data)
{
struct wsc_enrollee *wsce = user_data;
l_debug("%d, result: %d", netdev_get_ifindex(wsce->netdev), result);
if (wsce->disconnecting)
return; /* Free the state in the disconnect callback */
if (!wsce->done_cb)
goto done;
if (result == NETDEV_RESULT_HANDSHAKE_FAILED && wsce->n_creds > 0) {
wsce->done_cb(0, wsce->creds, wsce->n_creds, wsce->done_data);
goto done;
}
switch (result) {
case NETDEV_RESULT_ABORTED:
wsce->done_cb(-ECANCELED, NULL, 0, wsce->done_data);
break;
case NETDEV_RESULT_HANDSHAKE_FAILED:
wsce->done_cb(-ENOKEY, NULL, 0, wsce->done_data);
break;
default:
wsce->done_cb(-EIO, NULL, 0, wsce->done_data);
break;
}
done:
wsc_enrollee_free(wsce);
}
static void wsc_enrollee_credential_obtained(struct wsc_enrollee *wsce,
const struct wsc_credential *cred)
{
uint16_t auth_mask;
unsigned int i;
l_debug("Obtained credenials for SSID: %s, address: %s",
util_ssid_to_utf8(cred->ssid_len, cred->ssid),
util_address_to_string(cred->addr));
l_debug("auth_type: %02x, encryption_type: %02x",
cred->auth_type, cred->encryption_type);
if (getenv("IWD_WSC_DEBUG_KEYS"))
l_debug("Key (%u): %.*s", cred->network_key_len,
cred->network_key_len, cred->network_key);
if (wsce->n_creds == L_ARRAY_SIZE(wsce->creds)) {
l_warn("Maximum number of credentials obtained, ignoring...");
return;
}
if (!util_ssid_is_utf8(cred->ssid_len, cred->ssid)) {
l_warn("Ignoring Credentials with non-UTF8 SSID");
return;
}
memcpy(wsce->creds[wsce->n_creds].ssid, cred->ssid, cred->ssid_len);
wsce->creds[wsce->n_creds].ssid[cred->ssid_len] = '\0';
/* We only support open/personal wpa/personal wpa2 */
auth_mask = WSC_AUTHENTICATION_TYPE_OPEN |
WSC_AUTHENTICATION_TYPE_WPA_PERSONAL |
WSC_AUTHENTICATION_TYPE_WPA2_PERSONAL;
if ((cred->auth_type & auth_mask) == 0) {
l_warn("Ignoring Credentials with unsupported auth_type");
return;
}
if (cred->auth_type & WSC_AUTHENTICATION_TYPE_OPEN) {
auth_mask &= ~WSC_AUTHENTICATION_TYPE_OPEN;
if (cred->auth_type & auth_mask) {
l_warn("Ignoring mixed open/wpa credentials");
return;
}
wsce->creds[wsce->n_creds].security = SECURITY_NONE;
} else
wsce->creds[wsce->n_creds].security = SECURITY_PSK;
switch (wsce->creds[wsce->n_creds].security) {
case SECURITY_NONE:
if (cred->network_key_len != 0) {
l_warn("ignoring invalid open key length");
return;
}
break;
case SECURITY_PSK:
if (cred->network_key_len == 64) {
unsigned char *decoded;
const char *hex = (const char *) cred->network_key;
decoded = l_util_from_hexstring(hex, NULL);
if (!decoded) {
l_warn("Ignoring non-hex network_key");
return;
}
memcpy(wsce->creds[wsce->n_creds].psk, decoded, 32);
explicit_bzero(decoded, 32);
l_free(decoded);
} else {
strncpy(wsce->creds[wsce->n_creds].passphrase,
(const char *) cred->network_key,
cred->network_key_len);
wsce->creds[wsce->n_creds].has_passphrase = true;
}
break;
default:
return;
}
for (i = 0; i < wsce->n_creds; i++) {
if (strcmp(wsce->creds[i].ssid,
wsce->creds[wsce->n_creds].ssid))
continue;
l_warn("Found duplicate credentials for SSID: %s",
wsce->creds[i].ssid);
explicit_bzero(&wsce->creds[wsce->n_creds],
sizeof(wsce->creds[wsce->n_creds]));
return;
}
memcpy(wsce->creds[wsce->n_creds].addr, cred->addr, 6);
wsce->n_creds += 1;
}
static void wsc_enrollee_netdev_event(struct netdev *netdev,
enum netdev_event event,
void *event_data, void *user_data)
{
struct wsc_enrollee *wsce = user_data;
switch (event) {
case NETDEV_EVENT_AUTHENTICATING:
case NETDEV_EVENT_ASSOCIATING:
break;
case NETDEV_EVENT_DISCONNECT_BY_AP:
l_debug("Disconnect by AP");
wsc_enrollee_connect_cb(wsce->netdev,
NETDEV_RESULT_HANDSHAKE_FAILED,
event_data, wsce);
break;
case NETDEV_EVENT_RSSI_THRESHOLD_LOW:
case NETDEV_EVENT_RSSI_THRESHOLD_HIGH:
break;
default:
l_debug("Unexpected event: %d", event);
break;
}
}
static void wsc_enrollee_handshake_event(struct handshake_state *hs,
enum handshake_event event,
void *user_data, ...)
{
struct wsc_enrollee *wsce = user_data;
va_list args;
va_start(args, user_data);
switch (event) {
case HANDSHAKE_EVENT_FAILED:
netdev_handshake_failed(hs, va_arg(args, int));
break;
case HANDSHAKE_EVENT_EAP_NOTIFY:
{
unsigned int eap_event = va_arg(args, unsigned int);
switch (eap_event) {
case EAP_WSC_EVENT_CREDENTIAL_OBTAINED:
wsc_enrollee_credential_obtained(wsce,
va_arg(args, const struct wsc_credential *));
break;
default:
l_debug("Got event: %d", eap_event);
}
break;
}
default:
break;
}
va_end(args);
}
static inline enum wsc_rf_band freq_to_rf_band(uint32_t freq)
{
enum scan_band band;
scan_freq_to_channel(freq, &band);
switch (band) {
case SCAN_BAND_2_4_GHZ:
return WSC_RF_BAND_2_4_GHZ;
case SCAN_BAND_5_GHZ:
return WSC_RF_BAND_5_0_GHZ;
}
return WSC_RF_BAND_2_4_GHZ;
}
static int wsc_enrollee_connect(struct wsc_enrollee *wsce, struct scan_bss *bss,
const char *pin, struct iovec *ies,
unsigned int ies_num)
{
struct handshake_state *hs;
struct l_settings *settings = l_settings_new();
int r;
struct wsc_association_request request;
uint8_t *pdu;
size_t pdu_len;
struct iovec ie_iov[1 + ies_num];
hs = netdev_handshake_state_new(wsce->netdev);
l_settings_set_string(settings, "Security", "EAP-Identity",
"WFA-SimpleConfig-Enrollee-1-0");
l_settings_set_string(settings, "Security", "EAP-Method", "WSC");
l_settings_set_uint(settings, "WSC", "RFBand",
freq_to_rf_band(bss->frequency));
l_settings_set_uint(settings, "WSC", "ConfigurationMethods",
WSC_CONFIGURATION_METHOD_VIRTUAL_DISPLAY_PIN |
WSC_CONFIGURATION_METHOD_VIRTUAL_PUSH_BUTTON |
WSC_CONFIGURATION_METHOD_KEYPAD);
l_settings_set_string(settings, "WSC", "PrimaryDeviceType",
"0-00000000-0");
l_settings_set_string(settings, "WSC", "EnrolleeMAC",
util_address_to_string(netdev_get_address(wsce->netdev)));
if (pin) {
enum wsc_device_password_id dpid;
if (strlen(pin) == 4 || wsc_pin_is_checksum_valid(pin))
dpid = WSC_DEVICE_PASSWORD_ID_DEFAULT;
else
dpid = WSC_DEVICE_PASSWORD_ID_USER_SPECIFIED;
l_settings_set_uint(settings, "WSC", "DevicePasswordId", dpid);
l_settings_set_string(settings, "WSC", "DevicePassword", pin);
}
handshake_state_set_event_func(hs, wsc_enrollee_handshake_event, wsce);
handshake_state_set_8021x_config(hs, settings);
wsce->eap_settings = settings;
request.version2 = true;
request.request_type = WSC_REQUEST_TYPE_ENROLLEE_OPEN_8021X;
pdu = wsc_build_association_request(&request, &pdu_len);
if (!pdu) {
r = -ENOMEM;
goto error;
}
ie_iov[0].iov_base = ie_tlv_encapsulate_wsc_payload(pdu, pdu_len,
&ie_iov[0].iov_len);
l_free(pdu);
if (!ie_iov[0].iov_base) {
r = -ENOMEM;
goto error;
}
if (ies_num)
memcpy(ie_iov + 1, ies, sizeof(struct iovec) * ies_num);
r = netdev_connect(wsce->netdev, bss, hs, ie_iov, 1 + ies_num,
wsc_enrollee_netdev_event,
wsc_enrollee_connect_cb, wsce);
l_free(ie_iov[0].iov_base);
if (r == 0)
return 0;
error:
handshake_state_free(hs);
return r;
}
struct wsc_enrollee *wsc_enrollee_new(struct netdev *netdev,
struct scan_bss *target,
const char *pin,
struct iovec *ies, unsigned int ies_num,
wsc_done_cb_t done_cb, void *user_data)
{
struct wsc_enrollee *wsce;
wsce = l_new(struct wsc_enrollee, 1);
wsce->netdev = netdev;
wsce->done_cb = done_cb;
wsce->done_data = user_data;
if (wsc_enrollee_connect(wsce, target, pin, ies, ies_num) == 0)
return wsce;
wsc_enrollee_free(wsce);
return NULL;
}
static void wsc_enrollee_disconnect_cb(struct netdev *netdev, bool result,
void *user_data)
{
struct wsc_enrollee *wsce = user_data;
wsce->done_cb(-ECANCELED, NULL, 0, wsce->done_data);
wsc_enrollee_free(wsce);
}
void wsc_enrollee_cancel(struct wsc_enrollee *wsce, bool defer_cb)
{
if (defer_cb) {
wsce->disconnecting = true;
netdev_disconnect(wsce->netdev, wsc_enrollee_disconnect_cb,
wsce);
} else {
wsce->done_cb(-ECANCELED, NULL, 0, wsce->done_data);
wsce->done_cb = NULL;
/*
* Results in a call to
* wsc_enrollee_connect_cb -> wsc_enrollee_free
*/
netdev_disconnect(wsce->netdev, NULL, NULL);
}
}
void wsc_enrollee_free(struct wsc_enrollee *wsce)
{
l_settings_free(wsce->eap_settings);
explicit_bzero(wsce->creds, sizeof(wsce->creds));
l_free(wsce);
}
struct wsc_station_dbus {
struct wsc_dbus super;
struct wsc_enrollee *enrollee;
struct scan_bss *target;
struct netdev *netdev;
struct station *station;
uint8_t *wsc_ies;
size_t wsc_ies_size;
struct l_timeout *walk_timer;
uint32_t scan_id;
uint32_t station_state_watch;
};
#define CONNECT_REPLY(wsc, message) \
if ((wsc)->super.pending_connect) \
dbus_pending_reply(&(wsc)->super.pending_connect, \
message((wsc)->super.pending_connect)) \
#define CANCEL_REPLY(wsc, message) \
if ((wsc)->super.pending_cancel) \
dbus_pending_reply(&(wsc)->super.pending_cancel, \
message((wsc)->super.pending_cancel)) \
static void wsc_try_credentials(struct wsc_station_dbus *wsc,
struct wsc_credentials_info *creds,
unsigned int n_creds)
{
unsigned int i;
struct network *network;
struct scan_bss *bss;
for (i = 0; i < n_creds; i++) {
network = station_network_find(wsc->station, creds[i].ssid,
creds[i].security);
if (!network)
continue;
bss = network_bss_find_by_addr(network, creds[i].addr);
if (!bss)
bss = network_bss_select(network, true);
if (!bss)
continue;
if (creds[i].security == SECURITY_PSK) {
bool ret;
/*
* Prefer setting passphrase, this will work for both
* WPA2 and WPA3 since the PSK can always be generated
* if needed
*/
if (creds[i].has_passphrase)
ret = network_set_passphrase(network,
creds[i].passphrase);
else
ret = network_set_psk(network, creds[i].psk);
if (!ret)
continue;
}
station_connect_network(wsc->station, network, bss,
wsc->super.pending_connect);
l_dbus_message_unref(wsc->super.pending_connect);
wsc->super.pending_connect = NULL;
return;
}
CONNECT_REPLY(wsc, wsc_error_not_reachable);
station_set_autoconnect(wsc->station, true);
}
static void wsc_store_credentials(struct wsc_credentials_info *creds,
unsigned int n_creds)
{
unsigned int i;
for (i = 0; i < n_creds; i++) {
enum security security = creds[i].security;
const char *ssid = creds[i].ssid;
struct l_settings *settings = l_settings_new();
l_debug("Storing credential for '%s(%s)'", ssid,
security_to_str(security));
if (security == SECURITY_PSK)
l_settings_set_bytes(settings, "Security",
"PreSharedKey", creds[i].psk,
sizeof(creds[i].psk));
storage_network_sync(security, ssid, settings);
l_settings_free(settings);
}
}
static void wsc_dbus_done_cb(int err, struct wsc_credentials_info *creds,
unsigned int n_creds, void *user_data)
{
struct wsc_station_dbus *wsc = user_data;
wsc->enrollee = NULL;
wsc->target = NULL;
l_debug("err=%i", err);
if (err && wsc->station)
station_set_autoconnect(wsc->station, true);
switch (err) {
case 0:
break;
case -ECANCELED:
/* Send reply if we haven't already sent one e.g. in Cancel() */
CONNECT_REPLY(wsc, dbus_error_aborted);
CANCEL_REPLY(wsc, l_dbus_message_new_method_return);
return;
case -ENOKEY:
CONNECT_REPLY(wsc, wsc_error_no_credentials);
return;
case -EBUSY:
CONNECT_REPLY(wsc, dbus_error_busy);
return;
default:
CONNECT_REPLY(wsc, dbus_error_failed);
return;
}
wsc_store_credentials(creds, n_creds);
wsc_try_credentials(wsc, creds, n_creds);
}
static void wsc_connect(struct wsc_station_dbus *wsc)
{
const char *pin = NULL;
if (!strcmp(l_dbus_message_get_member(wsc->super.pending_connect),
"StartPin"))
l_dbus_message_get_arguments(wsc->super.pending_connect, "s",
&pin);
wsc->enrollee = wsc_enrollee_new(wsc->netdev, wsc->target, pin, NULL, 0,
wsc_dbus_done_cb, wsc);
if (wsc->enrollee)
return;
wsc_dbus_done_cb(-EIO, NULL, 0, wsc);
}
static void station_state_watch(enum station_state state, void *userdata)
{
struct wsc_station_dbus *wsc = userdata;
if (state != STATION_STATE_DISCONNECTED)
return;
l_debug("%p", wsc);
station_remove_state_watch(wsc->station, wsc->station_state_watch);
wsc->station_state_watch = 0;
wsc_connect(wsc);
}
static void wsc_check_can_connect(struct wsc_station_dbus *wsc,
struct scan_bss *target)
{
l_debug("%p", wsc);
/*
* For now we assign the target pointer directly, since we should not
* be triggering any more scans while disconnecting / connecting
*/
wsc->target = target;
station_set_autoconnect(wsc->station, false);
switch (station_get_state(wsc->station)) {
case STATION_STATE_DISCONNECTED:
wsc_connect(wsc);
return;
case STATION_STATE_CONNECTING:
case STATION_STATE_CONNECTED:
if (station_disconnect(wsc->station) < 0)
goto error;
/* fall through */
case STATION_STATE_DISCONNECTING:
wsc->station_state_watch =
station_add_state_watch(wsc->station,
station_state_watch,
wsc, NULL);
return;
case STATION_STATE_AUTOCONNECT_QUICK:
case STATION_STATE_AUTOCONNECT_FULL:
case STATION_STATE_ROAMING:
l_warn("wsc_check_can_connect: invalid station state");
break;
}
error:
wsc->target = NULL;
CONNECT_REPLY(wsc, dbus_error_failed);
}
static void wsc_cancel_scan(struct wsc_station_dbus *wsc)
{
l_free(wsc->wsc_ies);
wsc->wsc_ies = 0;
if (wsc->scan_id > 0) {
scan_cancel(netdev_get_wdev_id(wsc->netdev), wsc->scan_id);
wsc->scan_id = 0;
}
if (wsc->walk_timer) {
l_timeout_remove(wsc->walk_timer);
wsc->walk_timer = NULL;
}
}
static void walk_timeout(struct l_timeout *timeout, void *user_data)
{
struct wsc_station_dbus *wsc = user_data;
wsc_cancel_scan(wsc);
CONNECT_REPLY(wsc, wsc_error_walk_time_expired);
}
static void pin_timeout(struct l_timeout *timeout, void *user_data)
{
struct wsc_station_dbus *wsc = user_data;
wsc_cancel_scan(wsc);
CONNECT_REPLY(wsc, wsc_error_time_expired);
}
static bool push_button_scan_results(int err, struct l_queue *bss_list,
void *userdata)
{
struct wsc_station_dbus *wsc = userdata;
struct scan_bss *bss_2g;
struct scan_bss *bss_5g;
struct scan_bss *target;
uint8_t uuid_2g[16];
uint8_t uuid_5g[16];
const struct l_queue_entry *bss_entry;
struct wsc_probe_response probe_response;
if (err) {
wsc_cancel_scan(wsc);
CONNECT_REPLY(wsc, dbus_error_failed);
return false;
}
bss_2g = NULL;
bss_5g = NULL;
wsc->scan_id = 0;
for (bss_entry = l_queue_get_entries(bss_list); bss_entry;
bss_entry = bss_entry->next) {
struct scan_bss *bss = bss_entry->data;
enum scan_band band;
int err;
l_debug("bss '%s' with SSID: %s, freq: %u",
util_address_to_string(bss->addr),
util_ssid_to_utf8(bss->ssid_len, bss->ssid),
bss->frequency);
l_debug("bss->wsc: %p, %zu", bss->wsc, bss->wsc_size);
if (!bss->wsc)
continue;
err = wsc_parse_probe_response(bss->wsc, bss->wsc_size,
&probe_response);
if (err < 0) {
l_debug("ProbeResponse parse failed: %s",
strerror(-err));
continue;
}
l_debug("SelectedRegistar: %s",
probe_response.selected_registrar ? "true" : "false");
if (!probe_response.selected_registrar)
continue;
if (probe_response.device_password_id !=
WSC_DEVICE_PASSWORD_ID_PUSH_BUTTON)
continue;
scan_freq_to_channel(bss->frequency, &band);
switch (band) {
case SCAN_BAND_2_4_GHZ:
if (bss_2g) {
l_debug("2G Session overlap error");
goto session_overlap;
}
bss_2g = bss;
memcpy(uuid_2g, probe_response.uuid_e, 16);
break;
case SCAN_BAND_5_GHZ:
if (bss_5g) {
l_debug("5G Session overlap error");
goto session_overlap;
}
bss_5g = bss;
memcpy(uuid_5g, probe_response.uuid_e, 16);
break;
default:
return false;
}
}
if (bss_2g && bss_5g && memcmp(uuid_2g, uuid_5g, 16)) {
l_debug("Found two PBC APs on different bands");
goto session_overlap;
}
if (bss_5g)
target = bss_5g;
else if (bss_2g)
target = bss_2g;
else {
l_debug("No PBC APs found, running the scan again");
wsc->scan_id = scan_active(netdev_get_wdev_id(wsc->netdev),
wsc->wsc_ies, wsc->wsc_ies_size,
NULL, push_button_scan_results,
wsc, NULL);
return false;
}
wsc_cancel_scan(wsc);
station_set_scan_results(wsc->station, bss_list, false, true);
l_debug("Found AP to connect to: %s",
util_address_to_string(target->addr));
wsc_check_can_connect(wsc, target);
return true;
session_overlap:
wsc_cancel_scan(wsc);
CONNECT_REPLY(wsc, wsc_error_session_overlap);
return false;
}
static const char *authorized_macs_to_string(const uint8_t *authorized_macs)
{
unsigned int i;
unsigned int offset = 0;
/* Max of 5 addresses in AuthorizedMacs, 17 bytes / address */
static char buf[128];
for (i = 0; i < 5; i++) {
const uint8_t *addr = authorized_macs + i * 6;
if (util_mem_is_zero(addr, 6))
continue;
offset += sprintf(buf + offset, "%s",
util_address_to_string(addr));
}
return buf;
}
static bool authorized_macs_contains(const uint8_t *authorized_macs,
const uint8_t *target)
{
unsigned int i;
for (i = 0; i < 5; i++) {
const uint8_t *addr = authorized_macs + i * 6;
if (!memcmp(addr, target, 6))
return true;
}
return false;
}
static bool pin_scan_results(int err, struct l_queue *bss_list, void *userdata)
{
static const uint8_t wildcard_address[] =
{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
struct wsc_station_dbus *wsc = userdata;
struct scan_bss *target = NULL;
const struct l_queue_entry *bss_entry;
struct wsc_probe_response probe_response;
if (err) {
wsc_cancel_scan(wsc);
CONNECT_REPLY(wsc, dbus_error_failed);
return false;
}
wsc->scan_id = 0;
for (bss_entry = l_queue_get_entries(bss_list); bss_entry;
bss_entry = bss_entry->next) {
struct scan_bss *bss = bss_entry->data;
const uint8_t *amacs;
int err;
l_debug("bss '%s' with SSID: %s, freq: %u",
util_address_to_string(bss->addr),
util_ssid_to_utf8(bss->ssid_len, bss->ssid),
bss->frequency);
l_debug("bss->wsc: %p, %zu", bss->wsc, bss->wsc_size);
if (!bss->wsc)
continue;
err = wsc_parse_probe_response(bss->wsc, bss->wsc_size,
&probe_response);
if (err < 0) {
l_debug("ProbeResponse parse failed: %s",
strerror(-err));
continue;
}
if (probe_response.device_password_id !=
WSC_DEVICE_PASSWORD_ID_DEFAULT &&
probe_response.device_password_id !=
WSC_DEVICE_PASSWORD_ID_USER_SPECIFIED)
continue;
l_debug("SelectedRegistar: %s",
probe_response.selected_registrar ? "true" : "false");
/*
* WSC Best Practices v2.0.1, Section 3.4:
* In a mixed environment with both WSC 1.0 and WSC 2.0 APs, an
* Enrollee should be prepared to run both the WSC 1.0 and
* WSC 2.0 forms of discovery. An Enrollee may scan available
* channels and then order PIN attempts with prospective APs
* as follows:
* 1. WSC 2.0 AP with the Selected Registrar attribute TRUE
* and the Enrollee's MAC address in the AuthorizedMACs
* sub-element in Beacons and Probe Responses.
* 2. WSC 2.0 APs with the Selected Registrar attribute TRUE
* and the wildcard MAC address in the AuthorizedMACs
* sub-element in Beacons and Probe Responses, ordered by
* decreasing RSSI.
* 3. WSC 1.0 APs, ordered by decreasing RSSI.
* If option 1 is available, options 2 and 3 should be
* unnecessary.
*/
if (!probe_response.selected_registrar)
continue;
amacs = probe_response.authorized_macs;
l_debug("AuthorizedMacs: %s", authorized_macs_to_string(amacs));
if (authorized_macs_contains(amacs,
netdev_get_address(wsc->netdev))) {
target = bss;
break;
} else if (!target && authorized_macs_contains(amacs,
wildcard_address))
target = bss;
}
if (!target) {
l_debug("No PIN APs found, running the scan again");
wsc->scan_id = scan_active(netdev_get_wdev_id(wsc->netdev),
wsc->wsc_ies, wsc->wsc_ies_size,
NULL, pin_scan_results,
wsc, NULL);
return false;
}
wsc_cancel_scan(wsc);
station_set_scan_results(wsc->station, bss_list, false, true);
l_debug("Found AP to connect to: %s",
util_address_to_string(target->addr));
wsc_check_can_connect(wsc, target);
return true;
}
static bool wsc_initiate_scan(struct wsc_station_dbus *wsc,
enum wsc_device_password_id dpid,
scan_notify_func_t callback)
{
static const uint8_t wfa_oui[] = { 0x00, 0x50, 0xF2 };
struct wsc_probe_request req;
struct wiphy *wiphy = netdev_get_wiphy(wsc->netdev);
uint32_t bands;
uint8_t *wsc_data;
size_t wsc_data_size;
memset(&req, 0, sizeof(req));
req.version2 = true;
req.request_type = WSC_REQUEST_TYPE_ENROLLEE_INFO;
/* TODO: Grab from configuration file ? */
req.config_methods = WSC_CONFIGURATION_METHOD_VIRTUAL_PUSH_BUTTON |
WSC_CONFIGURATION_METHOD_KEYPAD;
if (!wsc_uuid_from_addr(netdev_get_address(wsc->netdev), req.uuid_e))
return false;
/* TODO: Grab from configuration file ? */
req.primary_device_type.category = 255;
memcpy(req.primary_device_type.oui, wfa_oui, 3);
req.primary_device_type.oui_type = 0x04;
req.primary_device_type.subcategory = 0;
bands = wiphy_get_supported_bands(wiphy);
if (bands & SCAN_BAND_2_4_GHZ)
req.rf_bands |= WSC_RF_BAND_2_4_GHZ;
if (bands & SCAN_BAND_5_GHZ)
req.rf_bands |= WSC_RF_BAND_5_0_GHZ;
req.association_state = WSC_ASSOCIATION_STATE_NOT_ASSOCIATED;
req.configuration_error = WSC_CONFIGURATION_ERROR_NO_ERROR;
req.device_password_id = dpid;
req.request_to_enroll = true;
wsc_data = wsc_build_probe_request(&req, &wsc_data_size);
if (!wsc_data)
return false;
wsc->wsc_ies = ie_tlv_encapsulate_wsc_payload(wsc_data, wsc_data_size,
&wsc->wsc_ies_size);
l_free(wsc_data);
if (!wsc->wsc_ies)
return false;
wsc->scan_id = scan_active(netdev_get_wdev_id(wsc->netdev),
wsc->wsc_ies, wsc->wsc_ies_size,
NULL, callback, wsc, NULL);
if (!wsc->scan_id) {
l_free(wsc->wsc_ies);
wsc->wsc_ies = NULL;
return false;
}
return true;
}
static const char *wsc_station_dbus_get_path(struct wsc_dbus *super)
{
struct wsc_station_dbus *wsc =
l_container_of(super, struct wsc_station_dbus, super);
return netdev_get_path(wsc->netdev);
}
static void wsc_station_dbus_connect(struct wsc_dbus *super,
const char *pin)
{
struct wsc_station_dbus *wsc =
l_container_of(super, struct wsc_station_dbus, super);
scan_notify_func_t scan_callback;
enum wsc_device_password_id dpid;
wsc->station = station_find(netdev_get_ifindex(wsc->netdev));
if (!wsc->station) {
CONNECT_REPLY(wsc, dbus_error_not_available);
return;
}
if (pin) {
if (strlen(pin) == 4 || wsc_pin_is_checksum_valid(pin))
dpid = WSC_DEVICE_PASSWORD_ID_DEFAULT;
else
dpid = WSC_DEVICE_PASSWORD_ID_USER_SPECIFIED;
scan_callback = pin_scan_results;
} else {
dpid = WSC_DEVICE_PASSWORD_ID_PUSH_BUTTON;
scan_callback = push_button_scan_results;
}
if (!wsc_initiate_scan(wsc, dpid, scan_callback)) {
CONNECT_REPLY(wsc, dbus_error_failed);
return;
}
if (pin) {
wsc->walk_timer = l_timeout_create(60, pin_timeout, wsc, NULL);
} else {
wsc->walk_timer = l_timeout_create(WALK_TIME, walk_timeout, wsc,
NULL);
}
}
static void wsc_station_dbus_cancel(struct wsc_dbus *super)
{
struct wsc_station_dbus *wsc =
l_container_of(super, struct wsc_station_dbus, super);
wsc_cancel_scan(wsc);
if (wsc->station_state_watch) {
station_remove_state_watch(wsc->station,
wsc->station_state_watch);
wsc->station_state_watch = 0;
wsc->target = NULL;
}
CONNECT_REPLY(wsc, dbus_error_aborted);
if (wsc->enrollee)
wsc_enrollee_cancel(wsc->enrollee, true);
else
CANCEL_REPLY(wsc, l_dbus_message_new_method_return);
}
static void wsc_station_dbus_remove(struct wsc_dbus *super)
{
struct wsc_station_dbus *wsc =
l_container_of(super, struct wsc_station_dbus, super);
wsc_cancel_scan(wsc);
if (wsc->station_state_watch) {
station_remove_state_watch(wsc->station,
wsc->station_state_watch);
wsc->station_state_watch = 0;
}
if (wsc->enrollee)
wsc_enrollee_free(wsc->enrollee);
l_free(wsc);
}
static struct l_dbus_message *wsc_push_button(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct wsc_dbus *wsc = user_data;
l_debug("");
if (!l_dbus_message_get_arguments(message, ""))
return dbus_error_invalid_args(message);
if (wsc->pending_connect || wsc->pending_cancel)
return dbus_error_busy(message);
wsc->pending_connect = l_dbus_message_ref(message);
wsc->connect(wsc, NULL);
return NULL;
}
static struct l_dbus_message *wsc_generate_pin(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct wsc_dbus *wsc = user_data;
struct l_dbus_message *reply;
char pin[9];
l_debug("");
if (wsc->pending_connect)
return dbus_error_busy(message);
if (!wsc_pin_generate(pin))
return dbus_error_failed(message);
reply = l_dbus_message_new_method_return(message);
l_dbus_message_set_arguments(reply, "s", pin);
explicit_bzero(pin, 9);
return reply;
}
static struct l_dbus_message *wsc_start_pin(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct wsc_dbus *wsc = user_data;
const char *pin;
l_debug("");
if (wsc->pending_connect || wsc->pending_cancel)
return dbus_error_busy(message);
if (!l_dbus_message_get_arguments(message, "s", &pin))
return dbus_error_invalid_args(message);
if (!wsc_pin_is_valid(pin))
return dbus_error_invalid_format(message);
wsc->pending_connect = l_dbus_message_ref(message);
wsc->connect(wsc, pin);
return NULL;
}
static struct l_dbus_message *wsc_cancel(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct wsc_dbus *wsc = user_data;
l_debug("");
if (!l_dbus_message_get_arguments(message, ""))
return dbus_error_invalid_args(message);
if (!wsc->pending_connect)
return dbus_error_not_available(message);
if (wsc->pending_cancel)
return dbus_error_busy(message);
wsc->pending_cancel = l_dbus_message_ref(message);
wsc->cancel(wsc);
return NULL;
}
static void setup_wsc_interface(struct l_dbus_interface *interface)
{
l_dbus_interface_method(interface, "PushButton", 0,
wsc_push_button, "", "");
l_dbus_interface_method(interface, "GeneratePin", 0,
wsc_generate_pin, "s", "", "pin");
l_dbus_interface_method(interface, "StartPin", 0,
wsc_start_pin, "", "s", "pin");
l_dbus_interface_method(interface, "Cancel", 0,
wsc_cancel, "", "");
}
bool wsc_dbus_add_interface(struct wsc_dbus *wsc)
{
struct l_dbus *dbus = dbus_get_bus();
if (!l_dbus_object_add_interface(dbus, wsc->get_path(wsc),
IWD_WSC_INTERFACE, wsc)) {
l_info("Unable to register %s interface", IWD_WSC_INTERFACE);
return false;
}
return true;
}
void wsc_dbus_remove_interface(struct wsc_dbus *wsc)
{
struct l_dbus *dbus = dbus_get_bus();
l_dbus_object_remove_interface(dbus, wsc->get_path(wsc),
IWD_WSC_INTERFACE);
}
static void wsc_dbus_free(void *user_data)
{
struct wsc_dbus *wsc = user_data;
if (wsc->pending_connect)
dbus_pending_reply(&wsc->pending_connect,
dbus_error_not_available(wsc->pending_connect));
if (wsc->pending_cancel)
dbus_pending_reply(&wsc->pending_cancel,
dbus_error_aborted(wsc->pending_cancel));
wsc->remove(wsc);
}
static void wsc_add_station(struct netdev *netdev)
{
struct wsc_station_dbus *wsc;
if (!wiphy_get_max_scan_ie_len(netdev_get_wiphy(netdev))) {
l_debug("Simple Configuration isn't supported by ifindex %u",
netdev_get_ifindex(netdev));
return;
}
wsc = l_new(struct wsc_station_dbus, 1);
wsc->netdev = netdev;
wsc->super.get_path = wsc_station_dbus_get_path;
wsc->super.connect = wsc_station_dbus_connect;
wsc->super.cancel = wsc_station_dbus_cancel;
wsc->super.remove = wsc_station_dbus_remove;
if (!wsc_dbus_add_interface(&wsc->super))
wsc_station_dbus_remove(&wsc->super);
}
static void wsc_remove_station(struct netdev *netdev)
{
struct l_dbus *dbus = dbus_get_bus();
l_dbus_object_remove_interface(dbus, netdev_get_path(netdev),
IWD_WSC_INTERFACE);
}
static void wsc_netdev_watch(struct netdev *netdev,
enum netdev_watch_event event, void *userdata)
{
switch (event) {
case NETDEV_WATCH_EVENT_UP:
case NETDEV_WATCH_EVENT_NEW:
if (netdev_get_iftype(netdev) == NETDEV_IFTYPE_STATION &&
netdev_get_is_up(netdev))
wsc_add_station(netdev);
break;
case NETDEV_WATCH_EVENT_DOWN:
case NETDEV_WATCH_EVENT_DEL:
wsc_remove_station(netdev);
break;
default:
break;
}
}
static int wsc_init(void)
{
l_debug("");
netdev_watch = netdev_watch_add(wsc_netdev_watch, NULL, NULL);
l_dbus_register_interface(dbus_get_bus(), IWD_WSC_INTERFACE,
setup_wsc_interface,
wsc_dbus_free, false);
return 0;
}
static void wsc_exit(void)
{
l_debug("");
l_dbus_unregister_interface(dbus_get_bus(), IWD_WSC_INTERFACE);
netdev_watch_remove(netdev_watch);
}
IWD_MODULE(wsc, wsc_init, wsc_exit)
IWD_MODULE_DEPENDS(wsc, netdev);