| /* |
| * |
| * Wireless daemon for Linux |
| * |
| * Copyright (C) 2015-2019 Intel Corporation. All rights reserved. |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include <stdbool.h> |
| #include <stdarg.h> |
| #include <errno.h> |
| #include <stdio.h> |
| |
| #include <ell/ell.h> |
| |
| #include "src/util.h" |
| #include "src/ie.h" |
| #include "src/wscutil.h" |
| |
| const unsigned char wsc_wfa_oui[3] = { 0x00, 0x37, 0x2a }; |
| |
| void wsc_wfa_ext_iter_init(struct wsc_wfa_ext_iter *iter, |
| const unsigned char *pdu, unsigned short len) |
| { |
| iter->pdu = pdu; |
| iter->max = len; |
| iter->pos = 0; |
| } |
| |
| bool wsc_wfa_ext_iter_next(struct wsc_wfa_ext_iter *iter) |
| { |
| const unsigned char *start = iter->pdu + iter->pos; |
| const unsigned char *end = iter->pdu + iter->max; |
| unsigned char type; |
| unsigned char len; |
| |
| if (iter->pos + 2 >= iter->max) |
| return false; |
| |
| type = *start; |
| start += 1; |
| |
| len = *start; |
| start += 1; |
| |
| if (start + len > end) |
| return false; |
| |
| iter->type = type; |
| iter->len = len; |
| iter->data = start; |
| |
| iter->pos = start + len - iter->pdu; |
| |
| return true; |
| } |
| |
| void wsc_attr_iter_init(struct wsc_attr_iter *iter, const unsigned char *pdu, |
| unsigned int len) |
| { |
| iter->pdu = pdu; |
| iter->max = len; |
| iter->pos = 0; |
| } |
| |
| bool wsc_attr_iter_next(struct wsc_attr_iter *iter) |
| { |
| const unsigned char *start = iter->pdu + iter->pos; |
| const unsigned char *end = iter->pdu + iter->max; |
| unsigned short type; |
| unsigned short len; |
| |
| /* Make sure we have at least type + len fields */ |
| if (iter->pos + 4 >= iter->max) |
| return false; |
| |
| type = l_get_be16(start); |
| start += 2; |
| |
| len = l_get_be16(start); |
| start += 2; |
| |
| if (start + len > end) |
| return false; |
| |
| iter->type = type; |
| iter->len = len; |
| iter->data = start; |
| |
| iter->pos = start + len - iter->pdu; |
| |
| return true; |
| } |
| |
| bool wsc_attr_iter_recurse_wfa_ext(struct wsc_attr_iter *iter, |
| struct wsc_wfa_ext_iter *wfa_iter) |
| { |
| if (iter->type != WSC_ATTR_VENDOR_EXTENSION) |
| return false; |
| |
| if (iter->len < 3) |
| return false; |
| |
| if (memcmp(iter->data, wsc_wfa_oui, sizeof(wsc_wfa_oui))) |
| return false; |
| |
| wsc_wfa_ext_iter_init(wfa_iter, iter->data + 3, iter->len - 3); |
| |
| return true; |
| } |
| |
| typedef bool (*attr_handler)(struct wsc_attr_iter *, void *); |
| |
| static bool extract_uint8(struct wsc_attr_iter *iter, void *data) |
| { |
| uint8_t *to = data; |
| |
| if (wsc_attr_iter_get_length(iter) != 1) |
| return false; |
| |
| *to = *wsc_attr_iter_get_data(iter); |
| |
| return true; |
| } |
| |
| static bool extract_uint16(struct wsc_attr_iter *iter, void *data) |
| { |
| uint16_t *to = data; |
| |
| if (wsc_attr_iter_get_length(iter) != 2) |
| return false; |
| |
| *to = l_get_be16(wsc_attr_iter_get_data(iter)); |
| |
| return true; |
| } |
| |
| static bool extract_bool(struct wsc_attr_iter *iter, void *data) |
| { |
| bool *to = data; |
| |
| if (wsc_attr_iter_get_length(iter) != 1) |
| return false; |
| |
| *to = *wsc_attr_iter_get_data(iter) ? true : false; |
| |
| return true; |
| } |
| |
| static bool extract_uuid(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 16) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 16); |
| return true; |
| } |
| |
| static bool extract_hash(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 32) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 32); |
| return true; |
| } |
| |
| static bool extract_authenticator(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 8) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 8); |
| return true; |
| } |
| |
| static bool extract_ascii_string(struct wsc_attr_iter *iter, void *data, |
| unsigned int max_len) |
| { |
| char *out = data; |
| const uint8_t *p; |
| unsigned int len; |
| unsigned int i; |
| |
| len = wsc_attr_iter_get_length(iter); |
| if (len > max_len) |
| return false; |
| |
| p = wsc_attr_iter_get_data(iter); |
| |
| for (i = 0; i < len; i++) { |
| if (!p[i]) |
| break; |
| |
| if (!l_ascii_isprint(p[i])) |
| return false; |
| } |
| |
| memcpy(out, p, i); |
| out[i] = '\0'; |
| return true; |
| } |
| |
| static bool extract_utf8_string(struct wsc_attr_iter *iter, void *data, |
| unsigned int max_len) |
| { |
| char *out = data; |
| const uint8_t *p; |
| unsigned int len; |
| unsigned int i; |
| |
| len = wsc_attr_iter_get_length(iter); |
| if (len > max_len) |
| return false; |
| |
| p = wsc_attr_iter_get_data(iter); |
| |
| for (i = 0; i < len; i++) { |
| if (!p[i]) |
| break; |
| } |
| |
| if (!l_utf8_validate((const char *) p, i, NULL)) |
| return false; |
| |
| memcpy(out, p, i); |
| out[i] = '\0'; |
| return true; |
| } |
| |
| static bool extract_nonce(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 16) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 16); |
| return true; |
| } |
| |
| static bool extract_association_state(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_association_state *out = data; |
| uint16_t as; |
| |
| if (!extract_uint16(iter, &as)) |
| return false; |
| |
| /* WSC 2.0.5: Table 31 */ |
| if (as > 4) |
| return false; |
| |
| *out = as; |
| return true; |
| } |
| |
| static bool extract_configuration_error(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_configuration_error *out = data; |
| uint16_t ce; |
| |
| if (!extract_uint16(iter, &ce)) |
| return false; |
| |
| /* WSC 2.0.5: Table 34 */ |
| if (ce > 20) |
| return false; |
| |
| *out = ce; |
| return true; |
| } |
| |
| static bool extract_device_name(struct wsc_attr_iter *iter, void *data) |
| { |
| return extract_utf8_string(iter, data, 32); |
| } |
| |
| static bool extract_device_password_id(struct wsc_attr_iter *iter, void *data) |
| { |
| uint16_t v; |
| enum wsc_device_password_id *out = data; |
| |
| if (wsc_attr_iter_get_length(iter) != 2) |
| return false; |
| |
| v = l_get_be16(wsc_attr_iter_get_data(iter)); |
| if (v > 0x0008) |
| return false; |
| |
| *out = v; |
| return true; |
| } |
| |
| static bool extract_encrypted_settings(struct wsc_attr_iter *iter, void *data) |
| { |
| struct iovec *iov = data; |
| |
| iov->iov_len = wsc_attr_iter_get_length(iter); |
| iov->iov_base = (void *) wsc_attr_iter_get_data(iter); |
| |
| return true; |
| } |
| |
| static bool extract_mac_address(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 6) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 6); |
| return true; |
| } |
| |
| static bool extract_manufacturer(struct wsc_attr_iter *iter, void *data) |
| { |
| return extract_ascii_string(iter, data, 64); |
| } |
| |
| static bool extract_message_type(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_message_type *out = data; |
| uint8_t mt; |
| |
| if (!extract_uint8(iter, &mt)) |
| return false; |
| |
| /* WSC 2.0.5: Table 42 */ |
| if (!mt || mt > 0x0f) |
| return false; |
| |
| *out = mt; |
| return true; |
| } |
| |
| static bool extract_model_name(struct wsc_attr_iter *iter, void *data) |
| { |
| return extract_ascii_string(iter, data, 32); |
| } |
| |
| static bool extract_model_number(struct wsc_attr_iter *iter, void *data) |
| { |
| return extract_ascii_string(iter, data, 32); |
| } |
| |
| static bool extract_network_key(struct wsc_attr_iter *iter, void *data) |
| { |
| struct iovec *network_key = data; |
| unsigned int len; |
| const uint8_t *key; |
| |
| len = wsc_attr_iter_get_length(iter); |
| if (len > 64) |
| return false; |
| |
| /* |
| * WSC 2.0.5, Section 12, Network Key: |
| * "Some existing implementations based on v1.0h null-terminate the |
| * passphrase value, i.e., add an extra 0x00 octet into the end of |
| * the value. For backwards compatibility, implementations shall be |
| * able to parse such a value" |
| */ |
| key = wsc_attr_iter_get_data(iter); |
| if (len && key[len - 1] == 0x00) |
| len--; |
| |
| network_key->iov_len = len; |
| network_key->iov_base = (void *) key; |
| |
| return true; |
| } |
| |
| static bool extract_new_password(struct wsc_attr_iter *iter, void *data) |
| { |
| struct iovec *new_password = data; |
| unsigned int len; |
| |
| len = wsc_attr_iter_get_length(iter); |
| if (len > 64) |
| return false; |
| |
| new_password->iov_len = len; |
| new_password->iov_base = (void *) wsc_attr_iter_get_data(iter); |
| |
| return true; |
| } |
| |
| static bool extract_os_version(struct wsc_attr_iter *iter, void *data) |
| { |
| uint32_t v; |
| uint32_t *out = data; |
| |
| if (wsc_attr_iter_get_length(iter) != 4) |
| return false; |
| |
| v = l_get_be32(wsc_attr_iter_get_data(iter)); |
| |
| /* |
| * The OS Version component indicates what operating system is running |
| * on the device. It is a four-byte field. The most significant bit is |
| * reserved and always set to one. |
| * |
| * We do not strictly check this as at least Apple's WPS implementation |
| * does not set the MSB to 1. |
| */ |
| *out = v & 0x7fffffff; |
| return true; |
| } |
| |
| static bool extract_public_key(struct wsc_attr_iter *iter, void *data) |
| { |
| if (wsc_attr_iter_get_length(iter) != 192) |
| return false; |
| |
| memcpy(data, wsc_attr_iter_get_data(iter), 192); |
| return true; |
| } |
| |
| int wsc_parse_primary_device_type(const uint8_t *pdu, size_t len, |
| struct wsc_primary_device_type *out) |
| { |
| uint16_t category; |
| |
| if (len != 8) |
| return -EINVAL; |
| |
| category = l_get_be16(pdu); |
| if (category > 12 && category != 255) |
| return -EINVAL; |
| |
| out->category = category; |
| memcpy(out->oui, pdu + 2, 3); |
| out->oui_type = pdu[5]; |
| out->subcategory = l_get_be16(pdu + 6); |
| return 0; |
| } |
| |
| static bool extract_primary_device_type(struct wsc_attr_iter *iter, void *data) |
| { |
| return wsc_parse_primary_device_type(wsc_attr_iter_get_data(iter), |
| wsc_attr_iter_get_length(iter), |
| data) == 0; |
| } |
| |
| static bool extract_request_type(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_request_type *out = data; |
| uint8_t rt; |
| |
| if (!extract_uint8(iter, &rt)) |
| return false; |
| |
| /* WSC 2.0.5: Table 42 */ |
| if (rt > 3) |
| return false; |
| |
| *out = rt; |
| return true; |
| } |
| |
| static bool extract_response_type(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_response_type *out = data; |
| uint8_t rt; |
| |
| if (!extract_uint8(iter, &rt)) |
| return false; |
| |
| /* WSC 2.0.5: Table 43 */ |
| if (rt > 3) |
| return false; |
| |
| *out = rt; |
| return true; |
| } |
| |
| static bool extract_serial_number(struct wsc_attr_iter *iter, void *data) |
| { |
| return extract_ascii_string(iter, data, 32); |
| } |
| |
| static bool extract_ssid(struct wsc_attr_iter *iter, void *data) |
| { |
| struct iovec *ssid = data; |
| unsigned int len; |
| |
| len = wsc_attr_iter_get_length(iter); |
| if (len > 32) |
| return false; |
| |
| ssid->iov_len = len; |
| ssid->iov_base = (void *) wsc_attr_iter_get_data(iter); |
| |
| return true; |
| } |
| |
| static bool extract_version(struct wsc_attr_iter *iter, void *data) |
| { |
| uint8_t *out = data; |
| uint8_t v; |
| |
| if (!extract_uint8(iter, &v)) |
| return false; |
| |
| /* |
| * "This attribute is always set to value 0x10 (version 1.0) |
| * for backwards compatibility" |
| */ |
| if (v != 0x10) |
| return false; |
| |
| *out = v; |
| return true; |
| } |
| |
| static bool extract_wsc_state(struct wsc_attr_iter *iter, void *data) |
| { |
| enum wsc_state *out = data; |
| uint8_t st; |
| |
| if (!extract_uint8(iter, &st)) |
| return false; |
| |
| if (st < 1 || st > 2) |
| return false; |
| |
| *out = st; |
| return true; |
| } |
| |
| static attr_handler handler_for_type(enum wsc_attr type) |
| { |
| switch (type) { |
| case WSC_ATTR_AP_SETUP_LOCKED: |
| return extract_bool; |
| case WSC_ATTR_ASSOCIATION_STATE: |
| return extract_association_state; |
| case WSC_ATTR_AUTHENTICATION_TYPE: |
| case WSC_ATTR_AUTHENTICATION_TYPE_FLAGS: |
| return extract_uint16; |
| case WSC_ATTR_AUTHENTICATOR: |
| return extract_authenticator; |
| case WSC_ATTR_CONFIGURATION_ERROR: |
| return extract_configuration_error; |
| case WSC_ATTR_CONFIGURATION_METHODS: |
| return extract_uint16; |
| case WSC_ATTR_CONNECTION_TYPE_FLAGS: |
| return extract_uint8; |
| case WSC_ATTR_DEVICE_NAME: |
| return extract_device_name; |
| case WSC_ATTR_DEVICE_PASSWORD_ID: |
| return extract_device_password_id; |
| case WSC_ATTR_E_HASH1: |
| case WSC_ATTR_E_HASH2: |
| return extract_hash; |
| case WSC_ATTR_E_SNONCE1: |
| case WSC_ATTR_E_SNONCE2: |
| return extract_nonce; |
| case WSC_ATTR_ENCRYPTED_SETTINGS: |
| return extract_encrypted_settings; |
| case WSC_ATTR_ENCRYPTION_TYPE: |
| case WSC_ATTR_ENCRYPTION_TYPE_FLAGS: |
| return extract_uint16; |
| case WSC_ATTR_ENROLLEE_NONCE: |
| return extract_nonce; |
| case WSC_ATTR_KEY_WRAP_AUTHENTICATOR: |
| return extract_authenticator; |
| case WSC_ATTR_MAC_ADDRESS: |
| return extract_mac_address; |
| case WSC_ATTR_MANUFACTURER: |
| return extract_manufacturer; |
| case WSC_ATTR_MESSAGE_TYPE: |
| return extract_message_type; |
| case WSC_ATTR_MODEL_NAME: |
| return extract_model_name; |
| case WSC_ATTR_MODEL_NUMBER: |
| return extract_model_number; |
| case WSC_ATTR_NETWORK_INDEX: |
| return extract_uint8; |
| case WSC_ATTR_NETWORK_KEY: |
| return extract_network_key; |
| case WSC_ATTR_NEW_PASSWORD: |
| return extract_new_password; |
| case WSC_ATTR_NETWORK_KEY_INDEX: |
| return extract_uint8; |
| case WSC_ATTR_OS_VERSION: |
| return extract_os_version; |
| case WSC_ATTR_PUBLIC_KEY: |
| return extract_public_key; |
| case WSC_ATTR_PRIMARY_DEVICE_TYPE: |
| return extract_primary_device_type; |
| case WSC_ATTR_REGISTRAR_NONCE: |
| return extract_nonce; |
| case WSC_ATTR_REQUEST_TYPE: |
| return extract_request_type; |
| case WSC_ATTR_REQUESTED_DEVICE_TYPE: |
| return extract_primary_device_type; |
| case WSC_ATTR_RESPONSE_TYPE: |
| return extract_response_type; |
| case WSC_ATTR_RF_BANDS: |
| return extract_uint8; |
| case WSC_ATTR_R_HASH1: |
| case WSC_ATTR_R_HASH2: |
| return extract_hash; |
| case WSC_ATTR_R_SNONCE1: |
| case WSC_ATTR_R_SNONCE2: |
| return extract_nonce; |
| case WSC_ATTR_SELECTED_REGISTRAR: |
| return extract_bool; |
| case WSC_ATTR_SELECTED_REGISTRAR_CONFIGURATION_METHODS: |
| return extract_uint16; |
| case WSC_ATTR_SERIAL_NUMBER: |
| return extract_serial_number; |
| case WSC_ATTR_SSID: |
| return extract_ssid; |
| case WSC_ATTR_VERSION: |
| return extract_version; |
| case WSC_ATTR_WSC_STATE: |
| return extract_wsc_state; |
| case WSC_ATTR_UUID_E: |
| return extract_uuid; |
| case WSC_ATTR_UUID_R: |
| return extract_uuid; |
| default: |
| break; |
| } |
| |
| return NULL; |
| } |
| |
| struct attr_handler_entry { |
| enum wsc_attr type; |
| unsigned int flags; |
| void *data; |
| bool present; |
| }; |
| |
| static bool verify_version2(struct wsc_wfa_ext_iter *ext_iter) |
| { |
| if (!wsc_wfa_ext_iter_next(ext_iter)) |
| return false; |
| |
| if (wsc_wfa_ext_iter_get_type(ext_iter) != WSC_WFA_EXTENSION_VERSION2) |
| return false; |
| |
| if (wsc_wfa_ext_iter_get_length(ext_iter) != 1) |
| return false; |
| |
| return true; |
| } |
| |
| int wsc_parse_attrs(const unsigned char *pdu, unsigned int len, |
| bool *out_version2, struct wsc_wfa_ext_iter *ext_iter, |
| enum wsc_attr authenticator_type, |
| uint8_t *authenticator, int type, ...) |
| { |
| struct wsc_attr_iter iter; |
| struct l_queue *entries; |
| const struct l_queue_entry *e; |
| va_list args; |
| bool version2 = false; |
| bool sr = false; |
| bool have_required = true; |
| bool parse_error = false; |
| |
| if (ext_iter) /* In case of no WFA extension */ |
| wsc_wfa_ext_iter_init(ext_iter, NULL, 0); |
| |
| wsc_attr_iter_init(&iter, pdu, len); |
| |
| va_start(args, type); |
| |
| entries = l_queue_new(); |
| |
| while (type != WSC_ATTR_INVALID) { |
| struct attr_handler_entry *entry; |
| |
| entry = l_new(struct attr_handler_entry, 1); |
| |
| entry->type = type; |
| entry->flags = va_arg(args, unsigned int); |
| entry->data = va_arg(args, void *); |
| |
| type = va_arg(args, enum wsc_attr); |
| l_queue_push_tail(entries, entry); |
| } |
| |
| va_end(args); |
| e = l_queue_get_entries(entries); |
| |
| while (wsc_attr_iter_next(&iter)) { |
| attr_handler handler; |
| struct attr_handler_entry *entry; |
| const struct l_queue_entry *e2; |
| |
| for (e2 = e; e2; e2 = e2->next) { |
| entry = e2->data; |
| |
| if (wsc_attr_iter_get_type(&iter) == entry->type) { |
| entry->present = true; |
| break; |
| } |
| |
| if (entry->flags & WSC_ATTR_FLAG_REQUIRED) { |
| have_required = false; |
| goto done; |
| } |
| } |
| |
| if (e2 == NULL) { |
| if (!ext_iter) |
| break; |
| |
| if (wsc_attr_iter_get_type(&iter) |
| != WSC_ATTR_VENDOR_EXTENSION) |
| break; |
| |
| if (!wsc_attr_iter_recurse_wfa_ext(&iter, ext_iter)) |
| break; |
| |
| if (!verify_version2(ext_iter)) { |
| parse_error = true; |
| goto done; |
| } |
| |
| version2 = true; |
| continue; |
| } |
| |
| if (entry->type == WSC_ATTR_SELECTED_REGISTRAR) |
| sr = true; |
| |
| handler = handler_for_type(entry->type); |
| |
| if (!handler(&iter, entry->data)) { |
| parse_error = true; |
| goto done; |
| } |
| |
| e = e2->next; |
| } |
| |
| for (; e; e = e->next) { |
| struct attr_handler_entry *entry = e->data; |
| |
| if (entry->flags & WSC_ATTR_FLAG_REQUIRED) { |
| parse_error = true; |
| goto done; |
| } |
| } |
| |
| /* Authenticator element must be the last element */ |
| if (authenticator) { |
| while (wsc_attr_iter_get_type(&iter) != authenticator_type) { |
| if (!wsc_attr_iter_next(&iter)) { |
| have_required = false; |
| goto done; |
| } |
| } |
| |
| if (!extract_authenticator(&iter, authenticator)) { |
| parse_error = true; |
| goto done; |
| } |
| |
| if (wsc_attr_iter_next(&iter) != false) { |
| parse_error = true; |
| goto done; |
| } |
| |
| if (wsc_attr_iter_get_pos(&iter) != len) { |
| parse_error = true; |
| goto done; |
| } |
| } |
| |
| /* |
| * Check for Version 2.0 required attributes. |
| * If version2 attribute is present in the WFA Vendor field, |
| * then check the required attributes are present. Mostly relevant |
| * for Probe Request messages according to 8.2.4 in WSC 2.0.5 |
| */ |
| if (version2) { |
| struct attr_handler_entry *entry; |
| |
| for (e = l_queue_get_entries(entries); e; e = e->next) { |
| entry = e->data; |
| |
| if (!(entry->flags & WSC_ATTR_FLAG_VERSION2)) |
| continue; |
| |
| if (entry->present) |
| continue; |
| |
| parse_error = true; |
| goto done; |
| } |
| } |
| |
| /* |
| * If Selected Registrar is present and true, then certain attributes |
| * must also be present. |
| */ |
| if (sr) { |
| struct attr_handler_entry *entry; |
| |
| for (e = l_queue_get_entries(entries); e; e = e->next) { |
| entry = e->data; |
| |
| if (!(entry->flags & WSC_ATTR_FLAG_REGISTRAR)) |
| continue; |
| |
| if (entry->present) |
| continue; |
| |
| parse_error = true; |
| goto done; |
| } |
| |
| } |
| |
| done: |
| l_queue_destroy(entries, l_free); |
| |
| if (!have_required) |
| return -EINVAL; |
| if (parse_error) |
| return -EBADMSG; |
| |
| if (out_version2) |
| *out_version2 = version2; |
| |
| return 0; |
| } |
| |
| static bool wfa_extract_bool(struct wsc_wfa_ext_iter *iter, void *data) |
| { |
| bool *to = data; |
| |
| if (wsc_wfa_ext_iter_get_length(iter) != 1) |
| return false; |
| |
| *to = *wsc_wfa_ext_iter_get_data(iter); |
| return true; |
| } |
| |
| static bool wfa_extract_authorized_macs(struct wsc_wfa_ext_iter *iter, |
| void *data) |
| { |
| uint8_t *to = data; |
| unsigned int len = wsc_wfa_ext_iter_get_length(iter); |
| unsigned int mod; |
| |
| if (!len || len > 30) |
| return false; |
| |
| mod = len % 6; |
| if (mod) |
| return false; |
| |
| memcpy(to, wsc_wfa_ext_iter_get_data(iter), len); |
| return true; |
| } |
| |
| static bool wfa_extract_registrar_configuration_methods( |
| struct wsc_wfa_ext_iter *iter, void *data) |
| { |
| uint16_t *to = data; |
| |
| if (wsc_wfa_ext_iter_get_length(iter) != 2) |
| return false; |
| |
| *to = l_get_be16(wsc_wfa_ext_iter_get_data(iter)); |
| return true; |
| } |
| |
| #define REQUIRED(attr, out) \ |
| WSC_ATTR_ ## attr, WSC_ATTR_FLAG_REQUIRED, out |
| |
| #define OPTIONAL(attr, out) \ |
| WSC_ATTR_ ## attr, 0, out |
| |
| #define REGISTRAR(attr, out) \ |
| WSC_ATTR_ ## attr, WSC_ATTR_FLAG_REGISTRAR, out |
| |
| #define VERSION2(attr, out) \ |
| WSC_ATTR_ ## attr, WSC_ATTR_FLAG_VERSION2, out |
| |
| int wsc_parse_credential(const uint8_t *pdu, uint32_t len, |
| struct wsc_credential *out) |
| { |
| uint8_t network_index; |
| struct iovec ssid; |
| uint8_t network_key_index; |
| struct iovec network_key; |
| int r; |
| |
| memset(out, 0, sizeof(*out)); |
| |
| r = wsc_parse_attrs(pdu, len, NULL, NULL, 0, NULL, |
| REQUIRED(NETWORK_INDEX, &network_index), |
| REQUIRED(SSID, &ssid), |
| REQUIRED(AUTHENTICATION_TYPE, &out->auth_type), |
| REQUIRED(ENCRYPTION_TYPE, &out->encryption_type), |
| OPTIONAL(NETWORK_KEY_INDEX, &network_key_index), |
| REQUIRED(NETWORK_KEY, &network_key), |
| REQUIRED(MAC_ADDRESS, &out->addr), |
| /* TODO: Parse EAP attributes */ |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| memcpy(out->ssid, ssid.iov_base, ssid.iov_len); |
| out->ssid_len = ssid.iov_len; |
| |
| while (out->ssid_len > 0 && out->ssid[out->ssid_len - 1] == 0) |
| out->ssid_len -= 1; |
| |
| if (!out->ssid_len) |
| return -EBADMSG; |
| |
| memcpy(out->network_key, network_key.iov_base, network_key.iov_len); |
| out->network_key_len = network_key.iov_len; |
| |
| /* TODO: Parse Network Key Shareable inside WFA EXT */ |
| |
| return 0; |
| } |
| |
| int wsc_parse_beacon(const unsigned char *pdu, unsigned int len, |
| struct wsc_beacon *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| |
| memset(out, 0, sizeof(struct wsc_beacon)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(WSC_STATE, &out->state), |
| OPTIONAL(AP_SETUP_LOCKED, &out->ap_setup_locked), |
| OPTIONAL(SELECTED_REGISTRAR, &out->selected_registrar), |
| REGISTRAR(DEVICE_PASSWORD_ID, &out->device_password_id), |
| REGISTRAR(SELECTED_REGISTRAR_CONFIGURATION_METHODS, |
| &out->selected_reg_config_methods), |
| OPTIONAL(UUID_E, &out->uuid_e), |
| OPTIONAL(RF_BANDS, &out->rf_bands), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_AUTHORIZED_MACS) { |
| if (!wfa_extract_authorized_macs(&iter, &out->authorized_macs)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_REGISTRAR_CONFIGRATION_METHODS) { |
| if (!wfa_extract_registrar_configuration_methods(&iter, |
| &out->reg_config_methods)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| return -EINVAL; |
| |
| done: |
| return 0; |
| } |
| |
| int wsc_parse_probe_response(const unsigned char *pdu, unsigned int len, |
| struct wsc_probe_response *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| |
| memset(out, 0, sizeof(struct wsc_probe_response)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(WSC_STATE, &out->state), |
| OPTIONAL(AP_SETUP_LOCKED, &out->ap_setup_locked), |
| OPTIONAL(SELECTED_REGISTRAR, &out->selected_registrar), |
| REGISTRAR(DEVICE_PASSWORD_ID, &out->device_password_id), |
| REGISTRAR(SELECTED_REGISTRAR_CONFIGURATION_METHODS, |
| &out->selected_reg_config_methods), |
| REQUIRED(RESPONSE_TYPE, &out->response_type), |
| REQUIRED(UUID_E, &out->uuid_e), |
| REQUIRED(MANUFACTURER, &out->manufacturer), |
| REQUIRED(MODEL_NAME, &out->model_name), |
| REQUIRED(MODEL_NUMBER, &out->model_number), |
| REQUIRED(SERIAL_NUMBER, &out->serial_number), |
| REQUIRED(PRIMARY_DEVICE_TYPE, &out->primary_device_type), |
| REQUIRED(DEVICE_NAME, &out->device_name), |
| REQUIRED(CONFIGURATION_METHODS, &out->config_methods), |
| OPTIONAL(RF_BANDS, &out->rf_bands), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_AUTHORIZED_MACS) { |
| if (!wfa_extract_authorized_macs(&iter, &out->authorized_macs)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_REGISTRAR_CONFIGRATION_METHODS) { |
| if (!wfa_extract_registrar_configuration_methods(&iter, |
| &out->reg_config_methods)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| return -EINVAL; |
| |
| done: |
| return 0; |
| } |
| |
| int wsc_parse_probe_request(const unsigned char *pdu, unsigned int len, |
| struct wsc_probe_request *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| |
| memset(out, 0, sizeof(struct wsc_probe_request)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(REQUEST_TYPE, &out->request_type), |
| REQUIRED(CONFIGURATION_METHODS, &out->config_methods), |
| REQUIRED(UUID_E, &out->uuid_e), |
| REQUIRED(PRIMARY_DEVICE_TYPE, &out->primary_device_type), |
| REQUIRED(RF_BANDS, &out->rf_bands), |
| REQUIRED(ASSOCIATION_STATE, &out->association_state), |
| REQUIRED(CONFIGURATION_ERROR, &out->configuration_error), |
| REQUIRED(DEVICE_PASSWORD_ID, &out->device_password_id), |
| VERSION2(MANUFACTURER, &out->manufacturer), |
| VERSION2(MODEL_NAME, &out->model_name), |
| VERSION2(MODEL_NUMBER, &out->model_number), |
| VERSION2(DEVICE_NAME, &out->device_name), |
| OPTIONAL(REQUESTED_DEVICE_TYPE, &out->requested_device_type), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_REQUEST_TO_ENROLL) { |
| if (!wfa_extract_bool(&iter, &out->request_to_enroll)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| return -EINVAL; |
| |
| done: |
| return 0; |
| } |
| |
| int wsc_parse_association_request(const uint8_t *pdu, uint32_t len, |
| struct wsc_association_request *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| |
| memset(out, 0, sizeof(struct wsc_association_request)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(REQUEST_TYPE, &out->request_type), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| return 0; |
| } |
| |
| int wsc_parse_association_response(const uint8_t *pdu, uint32_t len, |
| struct wsc_association_response *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| |
| memset(out, 0, sizeof(struct wsc_association_response)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(RESPONSE_TYPE, &out->response_type), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m1(const uint8_t *pdu, uint32_t len, struct wsc_m1 *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m1)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(UUID_E, &out->uuid_e), |
| REQUIRED(MAC_ADDRESS, &out->addr), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(PUBLIC_KEY, &out->public_key), |
| REQUIRED(AUTHENTICATION_TYPE_FLAGS, &out->auth_type_flags), |
| REQUIRED(ENCRYPTION_TYPE_FLAGS, &out->encryption_type_flags), |
| REQUIRED(CONNECTION_TYPE_FLAGS, &out->connection_type_flags), |
| REQUIRED(CONFIGURATION_METHODS, &out->config_methods), |
| REQUIRED(WSC_STATE, &out->state), |
| REQUIRED(MANUFACTURER, &out->manufacturer), |
| REQUIRED(MODEL_NAME, &out->model_name), |
| REQUIRED(MODEL_NUMBER, &out->model_number), |
| REQUIRED(SERIAL_NUMBER, &out->serial_number), |
| REQUIRED(PRIMARY_DEVICE_TYPE, &out->primary_device_type), |
| REQUIRED(DEVICE_NAME, &out->device_name), |
| REQUIRED(RF_BANDS, &out->rf_bands), |
| REQUIRED(ASSOCIATION_STATE, &out->association_state), |
| REQUIRED(DEVICE_PASSWORD_ID, &out->device_password_id), |
| REQUIRED(CONFIGURATION_ERROR, &out->configuration_error), |
| REQUIRED(OS_VERSION, &out->os_version), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M1) |
| return -EBADMSG; |
| |
| /* WSC 2.0.5, Section 8.3.1: "Specific RF band used for this message" */ |
| if (__builtin_popcount(out->rf_bands) != 1) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| |
| if (wsc_wfa_ext_iter_get_type(&iter) == |
| WSC_WFA_EXTENSION_REQUEST_TO_ENROLL) { |
| if (!wfa_extract_bool(&iter, &out->request_to_enroll)) |
| return -EBADMSG; |
| |
| if (!wsc_wfa_ext_iter_next(&iter)) |
| goto done; |
| } |
| |
| return -EINVAL; |
| |
| done: |
| return 0; |
| } |
| |
| int wsc_parse_m2(const uint8_t *pdu, uint32_t len, struct wsc_m2 *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m2)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| REQUIRED(UUID_R, &out->uuid_r), |
| REQUIRED(PUBLIC_KEY, &out->public_key), |
| REQUIRED(AUTHENTICATION_TYPE_FLAGS, &out->auth_type_flags), |
| REQUIRED(ENCRYPTION_TYPE_FLAGS, &out->encryption_type_flags), |
| REQUIRED(CONNECTION_TYPE_FLAGS, &out->connection_type_flags), |
| REQUIRED(CONFIGURATION_METHODS, &out->config_methods), |
| REQUIRED(MANUFACTURER, &out->manufacturer), |
| REQUIRED(MODEL_NAME, &out->model_name), |
| REQUIRED(MODEL_NUMBER, &out->model_number), |
| REQUIRED(SERIAL_NUMBER, &out->serial_number), |
| REQUIRED(PRIMARY_DEVICE_TYPE, &out->primary_device_type), |
| REQUIRED(DEVICE_NAME, &out->device_name), |
| REQUIRED(RF_BANDS, &out->rf_bands), |
| REQUIRED(ASSOCIATION_STATE, &out->association_state), |
| REQUIRED(CONFIGURATION_ERROR, &out->configuration_error), |
| REQUIRED(DEVICE_PASSWORD_ID, &out->device_password_id), |
| REQUIRED(OS_VERSION, &out->os_version), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M2) |
| return -EBADMSG; |
| |
| /* WSC 2.0.5, Section 8.3.2: "Specific RF band used for this message" */ |
| if (__builtin_popcount(out->rf_bands) != 1) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m3(const uint8_t *pdu, uint32_t len, struct wsc_m3 *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m3)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| REQUIRED(E_HASH1, &out->e_hash1), |
| REQUIRED(E_HASH2, &out->e_hash2), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M3) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m4(const uint8_t *pdu, uint32_t len, struct wsc_m4 *out, |
| struct iovec *out_encrypted) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m4)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(R_HASH1, &out->r_hash1), |
| REQUIRED(R_HASH2, &out->r_hash2), |
| REQUIRED(ENCRYPTED_SETTINGS, out_encrypted), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M4) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m4_encrypted_settings(const uint8_t *pdu, uint32_t len, |
| struct wsc_m4_encrypted_settings *out) |
| { |
| memset(out, 0, sizeof(*out)); |
| |
| return wsc_parse_attrs(pdu, len, NULL, NULL, |
| WSC_ATTR_KEY_WRAP_AUTHENTICATOR, out->authenticator, |
| REQUIRED(R_SNONCE1, out->r_snonce1), |
| WSC_ATTR_INVALID); |
| } |
| |
| int wsc_parse_m5(const uint8_t *pdu, uint32_t len, struct wsc_m5 *out, |
| struct iovec *out_encrypted) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m5)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| REQUIRED(ENCRYPTED_SETTINGS, out_encrypted), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M5) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m5_encrypted_settings(const uint8_t *pdu, uint32_t len, |
| struct wsc_m5_encrypted_settings *out) |
| { |
| memset(out, 0, sizeof(*out)); |
| |
| return wsc_parse_attrs(pdu, len, NULL, NULL, |
| WSC_ATTR_KEY_WRAP_AUTHENTICATOR, out->authenticator, |
| REQUIRED(E_SNONCE1, out->e_snonce1), |
| WSC_ATTR_INVALID); |
| } |
| |
| int wsc_parse_m6(const uint8_t *pdu, uint32_t len, struct wsc_m6 *out, |
| struct iovec *out_encrypted) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m6)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(ENCRYPTED_SETTINGS, out_encrypted), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M6) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m6_encrypted_settings(const uint8_t *pdu, uint32_t len, |
| struct wsc_m6_encrypted_settings *out) |
| { |
| memset(out, 0, sizeof(*out)); |
| |
| return wsc_parse_attrs(pdu, len, NULL, NULL, |
| WSC_ATTR_KEY_WRAP_AUTHENTICATOR, out->authenticator, |
| REQUIRED(R_SNONCE2, out->r_snonce2), |
| WSC_ATTR_INVALID); |
| } |
| |
| int wsc_parse_m7(const uint8_t *pdu, uint32_t len, struct wsc_m7 *out, |
| struct iovec *out_encrypted) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m7)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| REQUIRED(ENCRYPTED_SETTINGS, out_encrypted), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M7) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m7_encrypted_settings(const uint8_t *pdu, uint32_t len, |
| struct wsc_m7_encrypted_settings *out) |
| { |
| memset(out, 0, sizeof(*out)); |
| |
| return wsc_parse_attrs(pdu, len, NULL, NULL, |
| WSC_ATTR_KEY_WRAP_AUTHENTICATOR, out->authenticator, |
| REQUIRED(E_SNONCE2, out->e_snonce2), |
| WSC_ATTR_INVALID); |
| } |
| |
| int wsc_parse_m8(const uint8_t *pdu, uint32_t len, struct wsc_m8 *out, |
| struct iovec *out_encrypted) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_m8)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, |
| WSC_ATTR_AUTHENTICATOR, out->authenticator, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(ENCRYPTED_SETTINGS, out_encrypted), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_M8) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_m8_encrypted_settings(const uint8_t *pdu, uint32_t len, |
| struct wsc_m8_encrypted_settings *out, |
| struct iovec *iov, size_t *iovcnt) |
| { |
| struct wsc_attr_iter iter; |
| size_t n_cred = 0; |
| |
| memset(out, 0, sizeof(*out)); |
| wsc_attr_iter_init(&iter, pdu, len); |
| |
| if (!wsc_attr_iter_next(&iter)) |
| return -EBADMSG; |
| |
| while (wsc_attr_iter_get_type(&iter) == WSC_ATTR_CREDENTIAL) { |
| if (n_cred < *iovcnt) { |
| iov[n_cred].iov_base = |
| (void *) wsc_attr_iter_get_data(&iter); |
| iov[n_cred].iov_len = wsc_attr_iter_get_length(&iter); |
| n_cred += 1; |
| } |
| |
| if (!wsc_attr_iter_next(&iter)) |
| return -EBADMSG; |
| } |
| |
| /* At least one Credential element is required */ |
| if (!n_cred) |
| return -EBADMSG; |
| |
| if (wsc_attr_iter_get_type(&iter) == WSC_ATTR_NEW_PASSWORD) { |
| struct iovec np; |
| |
| if (!extract_new_password(&iter, &np)) |
| return -EBADMSG; |
| |
| memcpy(out->new_password, np.iov_base, np.iov_len); |
| out->new_password_len = np.iov_len; |
| |
| if (!wsc_attr_iter_next(&iter)) |
| return -EBADMSG; |
| |
| /* |
| * According to WSC 2.0.5, Table 21, Device Password ID is |
| * "Required if New Password is included." |
| */ |
| if (wsc_attr_iter_get_type(&iter) != |
| WSC_ATTR_DEVICE_PASSWORD_ID) |
| return -EBADMSG; |
| } |
| |
| if (wsc_attr_iter_get_type(&iter) == WSC_ATTR_DEVICE_PASSWORD_ID) { |
| extract_device_password_id(&iter, &out->device_password_id); |
| |
| if (!wsc_attr_iter_next(&iter)) |
| return -EBADMSG; |
| } |
| |
| while (wsc_attr_iter_get_type(&iter) != |
| WSC_ATTR_KEY_WRAP_AUTHENTICATOR) { |
| if (!wsc_attr_iter_next(&iter)) |
| return -EBADMSG; |
| } |
| |
| if (!extract_authenticator(&iter, &out->authenticator)) |
| return -EBADMSG; |
| |
| if (wsc_attr_iter_get_pos(&iter) != len) |
| return -EBADMSG; |
| |
| *iovcnt = n_cred; |
| |
| return 0; |
| } |
| |
| int wsc_parse_wsc_ack(const uint8_t *pdu, uint32_t len, struct wsc_ack *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_ack)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_WSC_ACK) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_wsc_nack(const uint8_t *pdu, uint32_t len, struct wsc_nack *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_nack)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| REQUIRED(CONFIGURATION_ERROR, &out->configuration_error), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_WSC_NACK) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| int wsc_parse_wsc_done(const uint8_t *pdu, uint32_t len, struct wsc_done *out) |
| { |
| int r; |
| struct wsc_wfa_ext_iter iter; |
| uint8_t version; |
| enum wsc_message_type msg_type; |
| |
| memset(out, 0, sizeof(struct wsc_done)); |
| |
| r = wsc_parse_attrs(pdu, len, &out->version2, &iter, 0, NULL, |
| REQUIRED(VERSION, &version), |
| REQUIRED(MESSAGE_TYPE, &msg_type), |
| REQUIRED(ENROLLEE_NONCE, &out->enrollee_nonce), |
| REQUIRED(REGISTRAR_NONCE, &out->registrar_nonce), |
| WSC_ATTR_INVALID); |
| |
| if (r < 0) |
| return r; |
| |
| if (msg_type != WSC_MESSAGE_TYPE_WSC_DONE) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| struct wsc_attr_builder { |
| size_t capacity; |
| uint8_t *buf; |
| size_t offset; |
| uint16_t curlen; |
| }; |
| |
| static void wsc_attr_builder_grow(struct wsc_attr_builder *builder) |
| { |
| builder->buf = l_realloc(builder->buf, builder->capacity * 2); |
| builder->capacity *= 2; |
| } |
| |
| static bool wsc_attr_builder_start_attr(struct wsc_attr_builder *builder, |
| enum wsc_attr type) |
| { |
| uint8_t *bytes; |
| |
| /* TLVs must be length > 0 */ |
| if (builder->curlen == 0 && builder->offset != 0) |
| return false; |
| |
| /* Record previous attribute's length */ |
| if (builder->curlen > 0) { |
| bytes = builder->buf + builder->offset; |
| l_put_be16(builder->curlen - 4, bytes + 2); |
| builder->offset += builder->curlen; |
| } |
| |
| builder->curlen = 4; |
| |
| if (builder->offset + 4 >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| bytes = builder->buf + builder->offset; |
| l_put_be16(type, bytes); |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_u8(struct wsc_attr_builder *builder, uint8_t v) |
| { |
| if (builder->offset + builder->curlen + 1 >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| builder->buf[builder->offset + builder->curlen] = v; |
| builder->curlen += 1; |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_u16(struct wsc_attr_builder *builder, |
| uint16_t v) |
| { |
| if (builder->offset + builder->curlen + 2 >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| l_put_be16(v, builder->buf + builder->offset + builder->curlen); |
| builder->curlen += 2; |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_u32(struct wsc_attr_builder *builder, |
| uint32_t v) |
| { |
| if (builder->offset + builder->curlen + 4 >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| l_put_be32(v, builder->buf + builder->offset + builder->curlen); |
| builder->curlen += 4; |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_bytes(struct wsc_attr_builder *builder, |
| const void *bytes, size_t size) |
| { |
| while (builder->offset + builder->curlen + size >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| memcpy(builder->buf + builder->offset + builder->curlen, bytes, size); |
| builder->curlen += size; |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_oui(struct wsc_attr_builder *builder, |
| const uint8_t *oui) |
| { |
| if (builder->offset + builder->curlen + 3 >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| memcpy(builder->buf + builder->offset + builder->curlen, oui, 3); |
| builder->curlen += 3; |
| |
| return true; |
| } |
| |
| static bool wsc_attr_builder_put_string(struct wsc_attr_builder *builder, |
| const char *string) |
| { |
| size_t len; |
| |
| len = string ? strlen(string) : 0; |
| |
| if (len == 0) { |
| string = " "; |
| len = 1; |
| } |
| |
| if (builder->offset + builder->curlen + len >= builder->capacity) |
| wsc_attr_builder_grow(builder); |
| |
| memcpy(builder->buf + builder->offset + builder->curlen, string, len); |
| builder->curlen += len; |
| |
| return true; |
| } |
| |
| static struct wsc_attr_builder *wsc_attr_builder_new(size_t initial_capacity) |
| { |
| struct wsc_attr_builder *builder; |
| |
| if (initial_capacity == 0) |
| return NULL; |
| |
| builder = l_new(struct wsc_attr_builder, 1); |
| builder->buf = l_malloc(initial_capacity); |
| builder->capacity = initial_capacity; |
| |
| return builder; |
| } |
| |
| static uint8_t *wsc_attr_builder_free(struct wsc_attr_builder *builder, |
| bool free_contents, |
| size_t *out_size) |
| { |
| uint8_t *ret; |
| |
| if (builder->curlen > 0) { |
| uint8_t *bytes = builder->buf + builder->offset; |
| l_put_be16(builder->curlen - 4, bytes + 2); |
| builder->offset += builder->curlen; |
| builder->curlen = 0; |
| } |
| |
| if (free_contents) { |
| l_free(builder->buf); |
| builder->buf = NULL; |
| } |
| |
| ret = builder->buf; |
| |
| if (out_size) |
| *out_size = builder->offset; |
| |
| l_free(builder); |
| |
| return ret; |
| } |
| |
| static void build_ap_setup_locked(struct wsc_attr_builder *builder, bool locked) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_AP_SETUP_LOCKED); |
| wsc_attr_builder_put_u8(builder, locked ? 0x01 : 0x00); |
| } |
| |
| static void build_association_state(struct wsc_attr_builder *builder, |
| enum wsc_association_state state) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ASSOCIATION_STATE); |
| wsc_attr_builder_put_u16(builder, state); |
| } |
| |
| static void build_authentication_type(struct wsc_attr_builder *builder, |
| uint16_t auth_type) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_AUTHENTICATION_TYPE); |
| wsc_attr_builder_put_u16(builder, auth_type); |
| } |
| |
| static void build_authentication_type_flags(struct wsc_attr_builder *builder, |
| uint16_t auth_type_flags) |
| { |
| wsc_attr_builder_start_attr(builder, |
| WSC_ATTR_AUTHENTICATION_TYPE_FLAGS); |
| wsc_attr_builder_put_u16(builder, auth_type_flags); |
| } |
| |
| static void build_authenticator(struct wsc_attr_builder *builder, |
| const uint8_t *authenticator) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_AUTHENTICATOR); |
| wsc_attr_builder_put_bytes(builder, authenticator, 8); |
| } |
| |
| static void build_configuration_error(struct wsc_attr_builder *builder, |
| enum wsc_configuration_error error) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_CONFIGURATION_ERROR); |
| wsc_attr_builder_put_u16(builder, error); |
| } |
| |
| static void build_configuration_methods(struct wsc_attr_builder *builder, |
| uint16_t config_methods) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_CONFIGURATION_METHODS); |
| wsc_attr_builder_put_u16(builder, config_methods); |
| } |
| |
| static void build_connection_type_flags(struct wsc_attr_builder *builder, |
| uint8_t connection_type_flags) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_CONNECTION_TYPE_FLAGS); |
| wsc_attr_builder_put_u8(builder, connection_type_flags); |
| } |
| |
| static void build_device_name(struct wsc_attr_builder *builder, |
| const char *device_name) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_DEVICE_NAME); |
| wsc_attr_builder_put_string(builder, device_name); |
| } |
| |
| static void build_device_password_id(struct wsc_attr_builder *builder, |
| enum wsc_device_password_id id) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_DEVICE_PASSWORD_ID); |
| wsc_attr_builder_put_u16(builder, id); |
| } |
| |
| static void build_encryption_type(struct wsc_attr_builder *builder, |
| uint16_t encryption_type) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTION_TYPE); |
| wsc_attr_builder_put_u16(builder, encryption_type); |
| } |
| |
| static void build_encryption_type_flags(struct wsc_attr_builder *builder, |
| uint16_t encryption_type_flags) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTION_TYPE_FLAGS); |
| wsc_attr_builder_put_u16(builder, encryption_type_flags); |
| } |
| |
| static void build_e_hash1(struct wsc_attr_builder *builder, |
| const uint8_t *e_hash1) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_E_HASH1); |
| wsc_attr_builder_put_bytes(builder, e_hash1, 32); |
| } |
| |
| static void build_e_hash2(struct wsc_attr_builder *builder, |
| const uint8_t *e_hash2) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_E_HASH2); |
| wsc_attr_builder_put_bytes(builder, e_hash2, 32); |
| } |
| |
| static void build_e_snonce1(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_E_SNONCE1); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_e_snonce2(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_E_SNONCE2); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_enrollee_nonce(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENROLLEE_NONCE); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_key_wrap_authenticator(struct wsc_attr_builder *builder, |
| const uint8_t *authenticator) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_KEY_WRAP_AUTHENTICATOR); |
| wsc_attr_builder_put_bytes(builder, authenticator, 8); |
| } |
| |
| static void build_mac_address(struct wsc_attr_builder *builder, |
| const uint8_t *addr) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_MAC_ADDRESS); |
| wsc_attr_builder_put_bytes(builder, addr, 6); |
| } |
| |
| static void build_manufacturer(struct wsc_attr_builder *builder, |
| const char *manufacturer) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_MANUFACTURER); |
| wsc_attr_builder_put_string(builder, manufacturer); |
| } |
| |
| static void build_message_type(struct wsc_attr_builder *builder, |
| enum wsc_message_type type) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_MESSAGE_TYPE); |
| wsc_attr_builder_put_u8(builder, type); |
| } |
| |
| static void build_model_name(struct wsc_attr_builder *builder, |
| const char *model_name) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_MODEL_NAME); |
| wsc_attr_builder_put_string(builder, model_name); |
| } |
| |
| static void build_model_number(struct wsc_attr_builder *builder, |
| const char *model_number) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_MODEL_NUMBER); |
| wsc_attr_builder_put_string(builder, model_number); |
| } |
| |
| static void build_network_index(struct wsc_attr_builder *builder, |
| uint8_t network_index) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_NETWORK_INDEX); |
| wsc_attr_builder_put_u8(builder, network_index); |
| } |
| |
| static void build_network_key(struct wsc_attr_builder *builder, |
| const uint8_t *key, size_t key_len) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_NETWORK_KEY); |
| wsc_attr_builder_put_bytes(builder, key, key_len); |
| } |
| |
| static void build_new_password(struct wsc_attr_builder *builder, |
| const uint8_t *password, size_t password_len) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_NEW_PASSWORD); |
| wsc_attr_builder_put_bytes(builder, password, password_len); |
| } |
| |
| static void build_os_version(struct wsc_attr_builder *builder, |
| uint32_t os_version) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_OS_VERSION); |
| wsc_attr_builder_put_u32(builder, os_version | 0x80000000); |
| } |
| |
| static void build_primary_device_type(struct wsc_attr_builder *builder, |
| const struct wsc_primary_device_type *pdt) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_PRIMARY_DEVICE_TYPE); |
| wsc_attr_builder_put_u16(builder, pdt->category); |
| wsc_attr_builder_put_oui(builder, pdt->oui); |
| wsc_attr_builder_put_u8(builder, pdt->oui_type); |
| wsc_attr_builder_put_u16(builder, pdt->subcategory); |
| } |
| |
| static void build_public_key(struct wsc_attr_builder *builder, |
| const uint8_t *public_key) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_PUBLIC_KEY); |
| wsc_attr_builder_put_bytes(builder, public_key, 192); |
| } |
| |
| static void build_registrar_nonce(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_REGISTRAR_NONCE); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_request_type(struct wsc_attr_builder *builder, |
| enum wsc_request_type type) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_REQUEST_TYPE); |
| wsc_attr_builder_put_u8(builder, type); |
| } |
| |
| static void build_response_type(struct wsc_attr_builder *builder, |
| enum wsc_response_type type) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_RESPONSE_TYPE); |
| wsc_attr_builder_put_u8(builder, type); |
| } |
| |
| static void build_rf_bands(struct wsc_attr_builder *builder, uint8_t rf_bands) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_RF_BANDS); |
| wsc_attr_builder_put_u8(builder, rf_bands); |
| } |
| |
| static void build_r_hash1(struct wsc_attr_builder *builder, |
| const uint8_t *r_hash1) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_R_HASH1); |
| wsc_attr_builder_put_bytes(builder, r_hash1, 32); |
| } |
| |
| static void build_r_hash2(struct wsc_attr_builder *builder, |
| const uint8_t *r_hash2) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_R_HASH2); |
| wsc_attr_builder_put_bytes(builder, r_hash2, 32); |
| } |
| |
| static void build_r_snonce1(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_R_SNONCE1); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_r_snonce2(struct wsc_attr_builder *builder, |
| const uint8_t *nonce) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_R_SNONCE2); |
| wsc_attr_builder_put_bytes(builder, nonce, 16); |
| } |
| |
| static void build_selected_registrar(struct wsc_attr_builder *builder, |
| bool selected) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_SELECTED_REGISTRAR); |
| wsc_attr_builder_put_u8(builder, selected ? 0x01 : 0x00); |
| } |
| |
| static void build_selected_registrar_configuration_methods( |
| struct wsc_attr_builder *builder, |
| uint16_t config_methods) |
| { |
| wsc_attr_builder_start_attr(builder, |
| WSC_ATTR_SELECTED_REGISTRAR_CONFIGURATION_METHODS); |
| wsc_attr_builder_put_u16(builder, config_methods); |
| } |
| |
| static void build_ssid(struct wsc_attr_builder *builder, const uint8_t *ssid, |
| size_t ssid_len) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_SSID); |
| wsc_attr_builder_put_bytes(builder, ssid, ssid_len); |
| } |
| |
| static void build_serial_number(struct wsc_attr_builder *builder, |
| const char *serial_number) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_SERIAL_NUMBER); |
| wsc_attr_builder_put_string(builder, serial_number); |
| } |
| |
| static void build_uuid_e(struct wsc_attr_builder *builder, const uint8_t *uuid) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_UUID_E); |
| wsc_attr_builder_put_bytes(builder, uuid, 16); |
| } |
| |
| static void build_uuid_r(struct wsc_attr_builder *builder, const uint8_t *uuid) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_UUID_R); |
| wsc_attr_builder_put_bytes(builder, uuid, 16); |
| } |
| |
| static void build_version(struct wsc_attr_builder *builder, uint8_t version) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_VERSION); |
| wsc_attr_builder_put_u8(builder, version); |
| } |
| |
| static void build_wsc_state(struct wsc_attr_builder *builder, |
| enum wsc_state state) |
| { |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_WSC_STATE); |
| wsc_attr_builder_put_u8(builder, state); |
| } |
| |
| #define START_WFA_VENDOR_EXTENSION() \ |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_VENDOR_EXTENSION);\ |
| wsc_attr_builder_put_oui(builder, wsc_wfa_oui); \ |
| wsc_attr_builder_put_u8(builder, WSC_WFA_EXTENSION_VERSION2); \ |
| wsc_attr_builder_put_u8(builder, 1); \ |
| wsc_attr_builder_put_u8(builder, 0x20) |
| |
| static void wfa_build_authorized_macs(struct wsc_attr_builder *builder, |
| const uint8_t authorized_macs[static 30]) |
| { |
| int count; |
| |
| for (count = 1; count < 5; count++) |
| if (util_mem_is_zero(authorized_macs + count * 6, 6)) |
| break; |
| |
| wsc_attr_builder_put_u8(builder, WSC_WFA_EXTENSION_AUTHORIZED_MACS); |
| wsc_attr_builder_put_u8(builder, count * 6); |
| wsc_attr_builder_put_bytes(builder, authorized_macs, count * 6); |
| } |
| |
| uint8_t *wsc_build_credential(const struct wsc_credential *in, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(128); |
| build_network_index(builder, 1); |
| build_ssid(builder, in->ssid, in->ssid_len); |
| build_authentication_type(builder, in->auth_type); |
| build_encryption_type(builder, in->encryption_type); |
| build_network_key(builder, in->network_key, in->network_key_len); |
| build_mac_address(builder, in->addr); |
| |
| /* TODO: Append EAP attrs & Network Key Shareable inside WFA EXT */ |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| static void build_credential(struct wsc_attr_builder *builder, |
| const struct wsc_credential *cred) |
| { |
| size_t data_len; |
| uint8_t *data = wsc_build_credential(cred, &data_len); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_CREDENTIAL); |
| wsc_attr_builder_put_bytes(builder, data, data_len); |
| l_free(data); |
| } |
| |
| uint8_t *wsc_build_beacon(const struct wsc_beacon *beacon, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(512); |
| build_version(builder, 0x10); |
| build_wsc_state(builder, beacon->state); |
| |
| if (beacon->ap_setup_locked) |
| build_ap_setup_locked(builder, true); |
| |
| if (beacon->selected_registrar) { |
| build_selected_registrar(builder, true); |
| build_device_password_id(builder, beacon->device_password_id); |
| build_selected_registrar_configuration_methods(builder, |
| beacon->selected_reg_config_methods); |
| } |
| |
| /* These two "should be provided" if dual-band */ |
| if (__builtin_popcount(beacon->rf_bands) > 1) { |
| if (beacon->selected_registrar) |
| build_uuid_e(builder, beacon->uuid_e); |
| |
| build_rf_bands(builder, beacon->rf_bands); |
| } |
| |
| if (!beacon->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| if (!util_mem_is_zero(beacon->authorized_macs, 6)) |
| wfa_build_authorized_macs(builder, beacon->authorized_macs); |
| |
| if (beacon->reg_config_methods) { |
| wsc_attr_builder_put_u8(builder, |
| WSC_WFA_EXTENSION_REGISTRAR_CONFIGRATION_METHODS); |
| wsc_attr_builder_put_u8(builder, 2); |
| wsc_attr_builder_put_u16(builder, beacon->reg_config_methods); |
| } |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_probe_request(const struct wsc_probe_request *probe_request, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(512); |
| build_version(builder, 0x10); |
| build_request_type(builder, probe_request->request_type); |
| build_configuration_methods(builder, probe_request->config_methods); |
| build_uuid_e(builder, probe_request->uuid_e); |
| build_primary_device_type(builder, &probe_request->primary_device_type); |
| build_rf_bands(builder, probe_request->rf_bands); |
| build_association_state(builder, probe_request->association_state); |
| build_configuration_error(builder, probe_request->configuration_error); |
| build_device_password_id(builder, probe_request->device_password_id); |
| |
| if (!probe_request->version2) |
| goto done; |
| |
| build_manufacturer(builder, probe_request->manufacturer); |
| build_model_name(builder, probe_request->model_name); |
| build_model_number(builder, probe_request->model_number); |
| build_device_name(builder, probe_request->device_name); |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| if (!probe_request->request_to_enroll) |
| goto done; |
| |
| wsc_attr_builder_put_u8(builder, WSC_WFA_EXTENSION_REQUEST_TO_ENROLL); |
| wsc_attr_builder_put_u8(builder, 1); |
| wsc_attr_builder_put_u8(builder, 1); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_probe_response( |
| const struct wsc_probe_response *probe_response, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(512); |
| build_version(builder, 0x10); |
| build_wsc_state(builder, probe_response->state); |
| |
| if (probe_response->ap_setup_locked) |
| build_ap_setup_locked(builder, true); |
| |
| if (probe_response->selected_registrar) { |
| build_selected_registrar(builder, true); |
| build_device_password_id(builder, |
| probe_response->device_password_id); |
| build_selected_registrar_configuration_methods(builder, |
| probe_response->selected_reg_config_methods); |
| } |
| |
| build_response_type(builder, probe_response->response_type); |
| build_uuid_e(builder, probe_response->uuid_e); |
| build_manufacturer(builder, probe_response->manufacturer); |
| build_model_name(builder, probe_response->model_name); |
| build_model_number(builder, probe_response->model_number); |
| build_serial_number(builder, probe_response->serial_number); |
| build_primary_device_type(builder, |
| &probe_response->primary_device_type); |
| build_device_name(builder, probe_response->device_name); |
| build_configuration_methods(builder, probe_response->config_methods); |
| |
| if (__builtin_popcount(probe_response->rf_bands) > 1) |
| build_rf_bands(builder, probe_response->rf_bands); |
| |
| if (!probe_response->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| if (!util_mem_is_zero(probe_response->authorized_macs, 6)) |
| wfa_build_authorized_macs(builder, |
| probe_response->authorized_macs); |
| |
| if (probe_response->reg_config_methods) { |
| wsc_attr_builder_put_u8(builder, |
| WSC_WFA_EXTENSION_REGISTRAR_CONFIGRATION_METHODS); |
| wsc_attr_builder_put_u8(builder, 2); |
| wsc_attr_builder_put_u16(builder, |
| probe_response->reg_config_methods); |
| } |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_association_request( |
| const struct wsc_association_request *association_request, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(128); |
| build_version(builder, 0x10); |
| build_request_type(builder, association_request->request_type); |
| |
| if (!association_request->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_association_response( |
| const struct wsc_association_response *association_response, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(128); |
| build_version(builder, 0x10); |
| build_response_type(builder, association_response->response_type); |
| |
| if (!association_response->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m1(const struct wsc_m1 *m1, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(1024); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M1); |
| build_uuid_e(builder, m1->uuid_e); |
| build_mac_address(builder, m1->addr); |
| build_enrollee_nonce(builder, m1->enrollee_nonce); |
| build_public_key(builder, m1->public_key); |
| build_authentication_type_flags(builder, m1->auth_type_flags); |
| build_encryption_type_flags(builder, m1->encryption_type_flags); |
| build_connection_type_flags(builder, m1->connection_type_flags); |
| build_configuration_methods(builder, m1->config_methods); |
| build_wsc_state(builder, m1->state); |
| build_manufacturer(builder, m1->manufacturer); |
| build_model_name(builder, m1->model_name); |
| build_model_number(builder, m1->model_number); |
| build_serial_number(builder, m1->serial_number); |
| build_primary_device_type(builder, &m1->primary_device_type); |
| build_device_name(builder, m1->device_name); |
| build_rf_bands(builder, m1->rf_bands); |
| build_association_state(builder, m1->association_state); |
| build_device_password_id(builder, m1->device_password_id); |
| build_configuration_error(builder, m1->configuration_error); |
| build_os_version(builder, m1->os_version); |
| |
| if (!m1->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| if (!m1->request_to_enroll) |
| goto done; |
| |
| wsc_attr_builder_put_u8(builder, WSC_WFA_EXTENSION_REQUEST_TO_ENROLL); |
| wsc_attr_builder_put_u8(builder, 1); |
| wsc_attr_builder_put_u8(builder, 1); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m2(const struct wsc_m2 *m2, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(1024); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M2); |
| build_enrollee_nonce(builder, m2->enrollee_nonce); |
| build_registrar_nonce(builder, m2->registrar_nonce); |
| build_uuid_r(builder, m2->uuid_r); |
| build_public_key(builder, m2->public_key); |
| build_authentication_type_flags(builder, m2->auth_type_flags); |
| build_encryption_type_flags(builder, m2->encryption_type_flags); |
| build_connection_type_flags(builder, m2->connection_type_flags); |
| build_configuration_methods(builder, m2->config_methods); |
| build_manufacturer(builder, m2->manufacturer); |
| build_model_name(builder, m2->model_name); |
| build_model_number(builder, m2->model_number); |
| build_serial_number(builder, m2->serial_number); |
| build_primary_device_type(builder, &m2->primary_device_type); |
| build_device_name(builder, m2->device_name); |
| build_rf_bands(builder, m2->rf_bands); |
| build_association_state(builder, m2->association_state); |
| build_configuration_error(builder, m2->configuration_error); |
| build_device_password_id(builder, m2->device_password_id); |
| build_os_version(builder, m2->os_version); |
| |
| if (!m2->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m2->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m3(const struct wsc_m3 *m3, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M3); |
| build_registrar_nonce(builder, m3->registrar_nonce); |
| build_e_hash1(builder, m3->e_hash1); |
| build_e_hash2(builder, m3->e_hash2); |
| |
| if (!m3->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m3->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m4(const struct wsc_m4 *m4, const uint8_t *encrypted, |
| size_t encrypted_len, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M4); |
| build_enrollee_nonce(builder, m4->enrollee_nonce); |
| build_r_hash1(builder, m4->r_hash1); |
| build_r_hash2(builder, m4->r_hash2); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTED_SETTINGS); |
| wsc_attr_builder_put_bytes(builder, encrypted, encrypted_len); |
| |
| if (!m4->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m4->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m4_encrypted_settings( |
| const struct wsc_m4_encrypted_settings *in, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| |
| builder = wsc_attr_builder_new(256); |
| build_r_snonce1(builder, in->r_snonce1); |
| build_key_wrap_authenticator(builder, in->authenticator); |
| |
| return wsc_attr_builder_free(builder, false, out_len); |
| } |
| |
| uint8_t *wsc_build_m5(const struct wsc_m5 *m5, const uint8_t *encrypted, |
| size_t encrypted_len, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M5); |
| build_registrar_nonce(builder, m5->registrar_nonce); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTED_SETTINGS); |
| wsc_attr_builder_put_bytes(builder, encrypted, encrypted_len); |
| |
| if (!m5->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m5->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m5_encrypted_settings( |
| const struct wsc_m5_encrypted_settings *in, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| |
| builder = wsc_attr_builder_new(256); |
| build_e_snonce1(builder, in->e_snonce1); |
| build_key_wrap_authenticator(builder, in->authenticator); |
| |
| return wsc_attr_builder_free(builder, false, out_len); |
| } |
| |
| uint8_t *wsc_build_m6(const struct wsc_m6 *m6, const uint8_t *encrypted, |
| size_t encrypted_len, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M6); |
| build_enrollee_nonce(builder, m6->enrollee_nonce); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTED_SETTINGS); |
| wsc_attr_builder_put_bytes(builder, encrypted, encrypted_len); |
| |
| if (!m6->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m6->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m6_encrypted_settings( |
| const struct wsc_m6_encrypted_settings *in, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| |
| builder = wsc_attr_builder_new(256); |
| build_r_snonce2(builder, in->r_snonce2); |
| build_key_wrap_authenticator(builder, in->authenticator); |
| |
| return wsc_attr_builder_free(builder, false, out_len); |
| } |
| |
| uint8_t *wsc_build_m7(const struct wsc_m7 *m7, const uint8_t *encrypted, |
| size_t encrypted_len, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M7); |
| build_registrar_nonce(builder, m7->registrar_nonce); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTED_SETTINGS); |
| wsc_attr_builder_put_bytes(builder, encrypted, encrypted_len); |
| |
| if (!m7->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m7->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m7_encrypted_settings( |
| const struct wsc_m7_encrypted_settings *in, |
| size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| |
| builder = wsc_attr_builder_new(256); |
| build_e_snonce2(builder, in->e_snonce2); |
| build_key_wrap_authenticator(builder, in->authenticator); |
| |
| return wsc_attr_builder_free(builder, false, out_len); |
| } |
| |
| uint8_t *wsc_build_m8(const struct wsc_m8 *m8, const uint8_t *encrypted, |
| size_t encrypted_len, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_M8); |
| build_enrollee_nonce(builder, m8->enrollee_nonce); |
| |
| wsc_attr_builder_start_attr(builder, WSC_ATTR_ENCRYPTED_SETTINGS); |
| wsc_attr_builder_put_bytes(builder, encrypted, encrypted_len); |
| |
| if (!m8->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| build_authenticator(builder, m8->authenticator); |
| |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_m8_encrypted_settings( |
| const struct wsc_m8_encrypted_settings *in, |
| const struct wsc_credential *creds, |
| unsigned int creds_cnt, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| unsigned int i; |
| |
| builder = wsc_attr_builder_new(256); |
| |
| for (i = 0; i < creds_cnt; i++) |
| build_credential(builder, &creds[i]); |
| |
| if (in->new_password_len) { |
| build_new_password(builder, in->new_password, |
| in->new_password_len); |
| build_device_password_id(builder, in->device_password_id); |
| } |
| |
| build_key_wrap_authenticator(builder, in->authenticator); |
| |
| return wsc_attr_builder_free(builder, false, out_len); |
| } |
| |
| uint8_t *wsc_build_wsc_ack(const struct wsc_ack *ack, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_WSC_ACK); |
| build_enrollee_nonce(builder, ack->enrollee_nonce); |
| build_registrar_nonce(builder, ack->registrar_nonce); |
| |
| if (!ack->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_wsc_nack(const struct wsc_nack *nack, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_WSC_NACK); |
| build_enrollee_nonce(builder, nack->enrollee_nonce); |
| build_registrar_nonce(builder, nack->registrar_nonce); |
| build_configuration_error(builder, nack->configuration_error); |
| |
| if (!nack->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_wsc_done(const struct wsc_done *done, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(256); |
| build_version(builder, 0x10); |
| build_message_type(builder, WSC_MESSAGE_TYPE_WSC_DONE); |
| build_enrollee_nonce(builder, done->enrollee_nonce); |
| build_registrar_nonce(builder, done->registrar_nonce); |
| |
| if (!done->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| uint8_t *wsc_build_p2p_attrs(const struct wsc_p2p_attrs *attrs, size_t *out_len) |
| { |
| struct wsc_attr_builder *builder; |
| uint8_t *ret; |
| |
| builder = wsc_attr_builder_new(512); |
| |
| if (attrs->version) |
| build_version(builder, 0x10); |
| |
| if (attrs->device_password_id) |
| build_device_password_id(builder, attrs->device_password_id); |
| |
| if (attrs->config_methods) |
| build_configuration_methods(builder, attrs->config_methods); |
| |
| if (!attrs->version2) |
| goto done; |
| |
| START_WFA_VENDOR_EXTENSION(); |
| |
| done: |
| ret = wsc_attr_builder_free(builder, false, out_len); |
| return ret; |
| } |
| |
| bool wsc_uuid_from_addr(const uint8_t addr[], uint8_t *out_uuid) |
| { |
| /* Reuse the NSID from WPA Supplicant for compatibility */ |
| static const uint8_t nsid[] = { |
| 0x52, 0x64, 0x80, 0xf8, 0xc9, 0x9b, 0x4b, 0xe5, |
| 0xa6, 0x55, 0x58, 0xed, 0x5f, 0x5d, 0x60, 0x84, |
| }; |
| |
| return l_uuid_v5(nsid, addr, 6, out_uuid); |
| } |
| |
| /* WSC 2.0.5, Section 7.3 */ |
| bool wsc_kdf(const void *key, void *output, size_t size) |
| { |
| static char *personalization = "Wi-Fi Easy and Secure Key Derivation"; |
| struct l_checksum *hmac; |
| unsigned int i, offset = 0; |
| unsigned int counter; |
| uint8_t counter_be[4]; |
| uint8_t total_key_bits[4]; |
| struct iovec iov[3] = { |
| [0] = { .iov_base = counter_be, .iov_len = 4 }, |
| [1] = { .iov_base = personalization, |
| .iov_len = strlen(personalization) }, |
| [2] = { .iov_base = total_key_bits, .iov_len = 4 }, |
| }; |
| |
| hmac = l_checksum_new_hmac(L_CHECKSUM_SHA256, key, 32); |
| if (!hmac) |
| return false; |
| |
| /* Length is denominated in bits, not bytes */ |
| l_put_be32(size * 8, total_key_bits); |
| |
| /* KDF processes in 256-bit chunks (32 bytes) */ |
| for (i = 0, counter = 1; i < (size + 31) / 32; i++, counter++) { |
| size_t len; |
| |
| if (size - offset > 32) |
| len = 32; |
| else |
| len = size - offset; |
| |
| l_put_be32(counter, counter_be); |
| |
| l_checksum_updatev(hmac, iov, 3); |
| l_checksum_get_digest(hmac, output + offset, len); |
| |
| offset += len; |
| } |
| |
| l_checksum_free(hmac); |
| |
| return true; |
| } |
| |
| bool wsc_pin_is_valid(const char *pin) |
| { |
| unsigned int i; |
| |
| for (i = 0; pin[i] >= '0' && pin[i] <= '9'; i++) |
| ; |
| |
| if (pin[i]) |
| return false; |
| |
| if (i != 8 && i != 4) |
| return false; |
| |
| return true; |
| } |
| |
| /* Takes the first 7 characters of a PIN as input and computes a check digit */ |
| static char compute_check_digit(const char *pin) |
| { |
| unsigned int accum = 0; |
| unsigned int digit; |
| |
| accum += 3 * ((pin[0] - '0') % 10); |
| accum += 1 * ((pin[1] - '0') % 10); |
| accum += 3 * ((pin[2] - '0') % 10); |
| accum += 1 * ((pin[3] - '0') % 10); |
| accum += 3 * ((pin[4] - '0') % 10); |
| accum += 1 * ((pin[5] - '0') % 10); |
| accum += 3 * ((pin[6] - '0') % 10); |
| |
| digit = (10 - (accum % 10)) % 10; |
| return '0' + digit; |
| } |
| |
| /* |
| * Validates the checksum digit and returns true if valid. Assumes that the |
| * input is an 8-byte PIN already validated by wsc_pin_is_valid() |
| */ |
| bool wsc_pin_is_checksum_valid(const char *pin) |
| { |
| char digit = compute_check_digit(pin); |
| return pin[7] == digit; |
| } |
| |
| /* |
| * Generate an 8 character PIN string into buffer given by @pin. @pin must be |
| * at least 9 bytes long to account for the nul character. |
| */ |
| bool wsc_pin_generate(char *pin) |
| { |
| uint32_t random; |
| bool ok; |
| |
| ok = l_getrandom(&random, sizeof(random)); |
| if (!ok) |
| return ok; |
| |
| snprintf(pin, 8, "%07u", random); |
| pin[7] = compute_check_digit(pin); |
| pin[8] = '\0'; |
| |
| return true; |
| } |
| |
| struct device_type_category_info { |
| const char *category_str; |
| unsigned int subcategory_max; |
| const char **subcategory_str; |
| }; |
| |
| /* WSC 2.0.5, Table 41 strings adapted to IWD DBus enum convention */ |
| struct device_type_category_info device_type_categories[] = { |
| [1] = { |
| "computer", |
| 10, |
| (const char *[]) { |
| [1] = "pc", |
| [2] = "server", |
| [3] = "media-center", |
| [4] = "ultra-mobile-pc", |
| [5] = "notebook", |
| [6] = "desktop", |
| [7] = "mobile-internet-device", |
| [8] = "netbook", |
| [9] = "tablet", |
| [10] = "ultrabook", |
| }, |
| }, |
| [2] = { |
| "input-device", |
| 9, |
| (const char *[]) { |
| [1] = "keyboard", |
| [2] = "mouse", |
| [3] = "joystick", |
| [4] = "trackball", |
| [5] = "gaming-controller", |
| [6] = "remote", |
| [7] = "touchscreen", |
| [8] = "biometric-reader", |
| [9] = "barcode-reader", |
| }, |
| }, |
| [3] = { |
| "printer-scanner", |
| 5, |
| (const char *[]) { |
| [1] = "printer-print-server", |
| [2] = "scanner", |
| [3] = "fax", |
| [4] = "copier", |
| [5] = "printer-scanner-fax-copier", |
| }, |
| }, |
| [4] = { |
| "camera", |
| 4, |
| (const char *[]) { |
| [1] = "digital-still-camera", |
| [2] = "video-camera", |
| [3] = "web-camera", |
| [4] = "security-camera", |
| }, |
| }, |
| [5] = { |
| "storage", |
| 1, |
| (const char *[]) { |
| [1] = "nas", |
| }, |
| }, |
| [6] = { |
| "network-infrastructure", |
| 5, |
| (const char *[]) { |
| [1] = "ap", |
| [2] = "router", |
| [3] = "switch", |
| [4] = "gateway", |
| [5] = "bridge", |
| }, |
| }, |
| [7] = { |
| "display", |
| 4, |
| (const char *[]) { |
| [1] = "television", |
| [2] = "electronic-picture-frame", |
| [3] = "projector", |
| [4] = "monitor", |
| }, |
| }, |
| [8] = { |
| "multimedia-device", |
| 6, |
| (const char *[]) { |
| [1] = "dar", |
| [2] = "pvr", |
| [3] = "mcx", |
| [4] = "set-top-box", |
| [5] = "media-server-adapter-extender", |
| [6] = "portable-video-player", |
| }, |
| }, |
| [9] = { |
| "gaming-device", |
| 5, |
| (const char *[]) { |
| [1] = "xbox", |
| [2] = "xbox360", |
| [3] = "playstation", |
| [4] = "game-console-adapter", |
| [5] = "portable-gaming-device", |
| }, |
| }, |
| [10] = { |
| "telephone", |
| 5, |
| (const char *[]) { |
| [1] = "windows-mobile", |
| [2] = "single-mode-phone", |
| [3] = "dual-mode-phone", |
| [4] = "single-mode-smartphone", |
| [5] = "dual-mode-smartphone", |
| }, |
| }, |
| [11] = { |
| "audio-device", |
| 7, |
| (const char *[]) { |
| [1] = "audio-tuner-receiver", |
| [2] = "speakers", |
| [3] = "portable-music-player", |
| [4] = "headset", |
| [5] = "headphones", |
| [6] = "microphone", |
| [7] = "home-theater-system", |
| }, |
| }, |
| [12] = { |
| "docking-device", |
| 2, |
| (const char *[]) { |
| [1] = "computer-docking-station", |
| [2] = "media-kiosk", |
| }, |
| }, |
| }; |
| |
| bool wsc_device_type_to_dbus_str(const struct wsc_primary_device_type *val, |
| const char **category_str, |
| const char **subcategory_str) |
| { |
| struct device_type_category_info *cat; |
| |
| if (val->category >= L_ARRAY_SIZE(device_type_categories)) |
| return false; |
| |
| cat = &device_type_categories[val->category]; |
| |
| if (!cat->category_str) |
| return false; |
| |
| if (category_str) |
| *category_str = cat->category_str; |
| |
| if (!subcategory_str) |
| return true; |
| |
| if (memcmp(val->oui, microsoft_oui, 3) || val->oui_type != 4) |
| *subcategory_str = NULL; /* Vendor-specific */ |
| else if (val->subcategory <= cat->subcategory_max && |
| cat->subcategory_str[val->subcategory]) |
| *subcategory_str = cat->subcategory_str[val->subcategory]; |
| else |
| *subcategory_str = NULL; /* Unknown */ |
| |
| return true; |
| } |
| |
| bool wsc_device_type_from_subcategory_str(struct wsc_primary_device_type *out, |
| const char *subcategory_str) |
| { |
| struct device_type_category_info *cat = device_type_categories + 1; |
| unsigned int i; |
| |
| for (i = 1; i < L_ARRAY_SIZE(device_type_categories); i++, cat++) { |
| unsigned int j; |
| |
| for (j = 1; j <= cat->subcategory_max; j++) |
| if (!strcasecmp(subcategory_str, |
| cat->subcategory_str[j])) { |
| out->category = i; |
| memcpy(out->oui, microsoft_oui, 3); |
| out->oui_type = 4; |
| out->subcategory = j; |
| return true; |
| } |
| } |
| |
| return false; |
| } |