2020-01-27 20:39:54 +01:00
|
|
|
#!/usr/bin/python3
|
|
|
|
#
|
|
|
|
# Example nfcpy to wpa_supplicant wrapper for DPP NFC operations
|
|
|
|
# Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
|
|
|
|
# Copyright (c) 2019-2020, The Linux Foundation
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import os
|
2020-05-15 01:26:01 +02:00
|
|
|
import struct
|
2020-01-27 20:39:54 +01:00
|
|
|
import sys
|
|
|
|
import time
|
|
|
|
import threading
|
|
|
|
import argparse
|
|
|
|
|
|
|
|
import nfc
|
|
|
|
import ndef
|
|
|
|
|
|
|
|
import logging
|
|
|
|
|
2020-05-14 20:29:25 +02:00
|
|
|
scriptsdir = os.path.dirname(os.path.realpath(sys.modules[__name__].__file__))
|
2020-01-27 20:39:54 +01:00
|
|
|
sys.path.append(os.path.join(scriptsdir, '..', '..', 'wpaspy'))
|
|
|
|
import wpaspy
|
|
|
|
|
|
|
|
wpas_ctrl = '/var/run/wpa_supplicant'
|
|
|
|
ifname = None
|
|
|
|
init_on_touch = False
|
|
|
|
in_raw_mode = False
|
|
|
|
prev_tcgetattr = 0
|
|
|
|
no_input = False
|
|
|
|
srv = None
|
|
|
|
continue_loop = True
|
|
|
|
terminate_now = False
|
|
|
|
summary_file = None
|
|
|
|
success_file = None
|
2020-05-15 11:10:59 +02:00
|
|
|
my_crn_ready = False
|
2020-05-15 01:26:01 +02:00
|
|
|
my_crn = None
|
|
|
|
peer_crn = None
|
2020-05-15 13:20:26 +02:00
|
|
|
hs_sent = False
|
2020-05-15 11:03:53 +02:00
|
|
|
mutex = threading.Lock()
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
def summary(txt):
|
2020-05-15 11:03:53 +02:00
|
|
|
with mutex:
|
|
|
|
print(txt)
|
|
|
|
if summary_file:
|
|
|
|
with open(summary_file, 'a') as f:
|
|
|
|
f.write(txt + "\n")
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
def success_report(txt):
|
|
|
|
summary(txt)
|
|
|
|
if success_file:
|
|
|
|
with open(success_file, 'a') as f:
|
|
|
|
f.write(txt + "\n")
|
|
|
|
|
|
|
|
def wpas_connect():
|
|
|
|
ifaces = []
|
|
|
|
if os.path.isdir(wpas_ctrl):
|
|
|
|
try:
|
|
|
|
ifaces = [os.path.join(wpas_ctrl, i) for i in os.listdir(wpas_ctrl)]
|
|
|
|
except OSError as error:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Could not find wpa_supplicant: %s", str(error))
|
2020-01-27 20:39:54 +01:00
|
|
|
return None
|
|
|
|
|
|
|
|
if len(ifaces) < 1:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("No wpa_supplicant control interface found")
|
2020-01-27 20:39:54 +01:00
|
|
|
return None
|
|
|
|
|
|
|
|
for ctrl in ifaces:
|
|
|
|
if ifname:
|
|
|
|
if ifname not in ctrl:
|
|
|
|
continue
|
|
|
|
try:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Trying to use control interface " + ctrl)
|
2020-01-27 20:39:54 +01:00
|
|
|
wpas = wpaspy.Ctrl(ctrl)
|
|
|
|
return wpas
|
|
|
|
except Exception as e:
|
|
|
|
pass
|
|
|
|
return None
|
|
|
|
|
|
|
|
def dpp_nfc_uri_process(uri):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
return False
|
|
|
|
peer_id = wpas.request("DPP_NFC_URI " + uri)
|
|
|
|
if "FAIL" in peer_id:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Could not parse DPP URI from NFC URI record")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
|
|
|
peer_id = int(peer_id)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("peer_id=%d for URI from NFC Tag: %s" % (peer_id, uri))
|
2020-01-27 20:39:54 +01:00
|
|
|
cmd = "DPP_AUTH_INIT peer=%d" % peer_id
|
2020-05-14 20:46:50 +02:00
|
|
|
global enrollee_only, configurator_only, config_params
|
|
|
|
if enrollee_only:
|
|
|
|
cmd += " role=enrollee"
|
|
|
|
elif configurator_only:
|
|
|
|
cmd += " role=configurator"
|
|
|
|
if config_params:
|
|
|
|
cmd += " " + config_params
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Initiate DPP authentication: " + cmd)
|
2020-01-27 20:39:54 +01:00
|
|
|
res = wpas.request(cmd)
|
|
|
|
if "OK" not in res:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Failed to initiate DPP Authentication")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP Authentication initiated")
|
2020-01-27 20:39:54 +01:00
|
|
|
return True
|
|
|
|
|
|
|
|
def dpp_hs_tag_read(record):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
return False
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(record)
|
2020-01-27 20:39:54 +01:00
|
|
|
if len(record.data) < 5:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Too short DPP HS")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
|
|
|
if record.data[0] != 0:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Unexpected URI Identifier Code")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
|
|
|
uribuf = record.data[1:]
|
|
|
|
try:
|
|
|
|
uri = uribuf.decode()
|
|
|
|
except:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Invalid URI payload")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI: " + uri)
|
2020-01-27 20:39:54 +01:00
|
|
|
if not uri.startswith("DPP:"):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Not a DPP URI")
|
2020-01-27 20:39:54 +01:00
|
|
|
return False
|
|
|
|
return dpp_nfc_uri_process(uri)
|
|
|
|
|
|
|
|
def get_status(wpas, extra=None):
|
|
|
|
if extra:
|
|
|
|
extra = "-" + extra
|
|
|
|
else:
|
|
|
|
extra = ""
|
|
|
|
res = wpas.request("STATUS" + extra)
|
|
|
|
lines = res.splitlines()
|
|
|
|
vals = dict()
|
|
|
|
for l in lines:
|
|
|
|
try:
|
|
|
|
[name, value] = l.split('=', 1)
|
|
|
|
except ValueError:
|
2020-05-15 13:46:41 +02:00
|
|
|
summary("Ignore unexpected status line: %s" % l)
|
2020-01-27 20:39:54 +01:00
|
|
|
continue
|
|
|
|
vals[name] = value
|
|
|
|
return vals
|
|
|
|
|
|
|
|
def get_status_field(wpas, field, extra=None):
|
|
|
|
vals = get_status(wpas, extra)
|
|
|
|
if field in vals:
|
|
|
|
return vals[field]
|
|
|
|
return None
|
|
|
|
|
|
|
|
def own_addr(wpas):
|
2020-05-14 23:44:27 +02:00
|
|
|
addr = get_status_field(wpas, "address")
|
|
|
|
if addr is None:
|
|
|
|
addr = get_status_field(wpas, "bssid[0]")
|
|
|
|
return addr
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
def dpp_bootstrap_gen(wpas, type="qrcode", chan=None, mac=None, info=None,
|
|
|
|
curve=None, key=None):
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=" + type
|
|
|
|
if chan:
|
|
|
|
cmd += " chan=" + chan
|
|
|
|
if mac:
|
|
|
|
if mac is True:
|
|
|
|
mac = own_addr(wpas)
|
2020-05-14 23:31:32 +02:00
|
|
|
if mac is None:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Could not determine local MAC address for bootstrap info")
|
2020-05-14 23:31:32 +02:00
|
|
|
else:
|
|
|
|
cmd += " mac=" + mac.replace(':', '')
|
2020-01-27 20:39:54 +01:00
|
|
|
if info:
|
|
|
|
cmd += " info=" + info
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
if key:
|
|
|
|
cmd += " key=" + key
|
|
|
|
res = wpas.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
return int(res)
|
|
|
|
|
2020-05-15 13:17:40 +02:00
|
|
|
def wpas_get_nfc_uri(start_listen=True, pick_channel=False):
|
2020-01-27 20:39:54 +01:00
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
return None
|
2020-02-06 22:22:39 +01:00
|
|
|
global own_id, chanlist
|
2020-05-15 13:17:40 +02:00
|
|
|
chan = chanlist
|
|
|
|
if chan is None and get_status_field(wpas, "bssid[0]"):
|
|
|
|
freq = get_status_field(wpas, "freq")
|
|
|
|
if freq:
|
|
|
|
freq = int(freq)
|
|
|
|
if freq >= 2412 and freq <= 2462:
|
|
|
|
chan = "81/%d" % ((freq - 2407) / 5)
|
|
|
|
summary("Use current AP operating channel (%d MHz) as the URI channel list (%s)" % (freq, chan))
|
|
|
|
if chan is None and pick_channel:
|
|
|
|
chan = "81/6"
|
|
|
|
summary("Use channel 2437 MHz since no other preference provided")
|
|
|
|
own_id = dpp_bootstrap_gen(wpas, type="nfc-uri", chan=chan, mac=True)
|
2020-01-27 20:39:54 +01:00
|
|
|
res = wpas.request("DPP_BOOTSTRAP_GET_URI %d" % own_id).rstrip()
|
|
|
|
if "FAIL" in res:
|
|
|
|
return None
|
|
|
|
if start_listen:
|
|
|
|
wpas.request("DPP_LISTEN 2412 netrole=configurator")
|
|
|
|
return res
|
|
|
|
|
|
|
|
def wpas_report_handover_req(uri):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
return None
|
|
|
|
global own_id
|
|
|
|
cmd = "DPP_NFC_HANDOVER_REQ own=%d uri=%s" % (own_id, uri)
|
|
|
|
return wpas.request(cmd)
|
|
|
|
|
|
|
|
def wpas_report_handover_sel(uri):
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
return None
|
|
|
|
global own_id
|
|
|
|
cmd = "DPP_NFC_HANDOVER_SEL own=%d uri=%s" % (own_id, uri)
|
|
|
|
return wpas.request(cmd)
|
|
|
|
|
|
|
|
def dpp_handover_client(llc):
|
|
|
|
uri = wpas_get_nfc_uri(start_listen=False)
|
2020-05-14 23:31:32 +02:00
|
|
|
if uri is None:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Cannot start handover client - no bootstrap URI available")
|
2020-05-14 23:31:32 +02:00
|
|
|
return
|
2020-01-27 20:39:54 +01:00
|
|
|
uri = ndef.UriRecord(uri)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("NFC URI record for DPP: " + str(uri))
|
2020-01-27 20:39:54 +01:00
|
|
|
carrier = ndef.Record('application/vnd.wfa.dpp', 'A', uri.data)
|
2020-05-15 01:26:01 +02:00
|
|
|
crn = os.urandom(2)
|
|
|
|
hr = ndef.HandoverRequestRecord(version="1.4", crn=crn)
|
2020-01-27 20:39:54 +01:00
|
|
|
hr.add_alternative_carrier('active', carrier.name)
|
|
|
|
message = [hr, carrier]
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("NFC Handover Request message for DPP: " + str(message))
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-15 01:26:01 +02:00
|
|
|
global peer_crn
|
|
|
|
if peer_crn is not None:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("NFC handover request from peer was already received - do not send own")
|
2020-05-15 01:26:01 +02:00
|
|
|
return
|
2020-01-27 20:39:54 +01:00
|
|
|
client = nfc.handover.HandoverClient(llc)
|
|
|
|
try:
|
|
|
|
summary("Trying to initiate NFC connection handover")
|
|
|
|
client.connect()
|
|
|
|
summary("Connected for handover")
|
|
|
|
except nfc.llcp.ConnectRefused:
|
|
|
|
summary("Handover connection refused")
|
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
except Exception as e:
|
|
|
|
summary("Other exception: " + str(e))
|
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
|
2020-05-15 01:26:01 +02:00
|
|
|
if peer_crn is not None:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("NFC handover request from peer was already received - do not send own")
|
2020-05-15 01:26:01 +02:00
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
summary("Sending handover request")
|
|
|
|
|
2020-05-15 13:20:26 +02:00
|
|
|
global my_crn, my_crn_ready, hs_sent
|
2020-05-15 11:10:59 +02:00
|
|
|
my_crn_ready = True
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
if not client.send_records(message):
|
2020-05-15 11:10:59 +02:00
|
|
|
my_crn_ready = False
|
2020-01-27 20:39:54 +01:00
|
|
|
summary("Failed to send handover request")
|
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
|
2020-05-15 01:26:01 +02:00
|
|
|
my_crn, = struct.unpack('>H', crn)
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
summary("Receiving handover response")
|
2020-05-15 13:20:26 +02:00
|
|
|
try:
|
|
|
|
message = client.recv_records(timeout=3.0)
|
|
|
|
except Exception as e:
|
|
|
|
# This is fine if we are the handover selector
|
|
|
|
if hs_sent:
|
|
|
|
summary("Client receive failed as expected since I'm the handover server: %s" % str(e))
|
|
|
|
else:
|
|
|
|
summary("Client receive failed: %s" % str(e))
|
|
|
|
message = None
|
2020-01-27 20:39:54 +01:00
|
|
|
if message is None:
|
2020-05-15 13:20:26 +02:00
|
|
|
if hs_sent:
|
|
|
|
summary("No response received as expected since I'm the handover server")
|
|
|
|
else:
|
|
|
|
summary("No response received")
|
2020-01-27 20:39:54 +01:00
|
|
|
client.close()
|
|
|
|
return
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Received message: " + str(message))
|
2020-01-27 20:39:54 +01:00
|
|
|
if len(message) < 1 or \
|
|
|
|
not isinstance(message[0], ndef.HandoverSelectRecord):
|
|
|
|
summary("Response was not Hs - received: " + message.type)
|
|
|
|
client.close()
|
|
|
|
return
|
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Received handover select message")
|
|
|
|
summary("alternative carriers: " + str(message[0].alternative_carriers))
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-02-06 22:47:54 +01:00
|
|
|
dpp_found = False
|
2020-01-27 20:39:54 +01:00
|
|
|
for carrier in message:
|
|
|
|
if isinstance(carrier, ndef.HandoverSelectRecord):
|
|
|
|
continue
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Remote carrier type: " + carrier.type)
|
2020-01-27 20:39:54 +01:00
|
|
|
if carrier.type == "application/vnd.wfa.dpp":
|
|
|
|
if len(carrier.data) == 0 or carrier.data[0] != 0:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI Identifier Code 'None' not seen")
|
2020-01-27 20:39:54 +01:00
|
|
|
continue
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP carrier type match - send to wpa_supplicant")
|
2020-02-06 22:47:54 +01:00
|
|
|
dpp_found = True
|
2020-01-27 20:39:54 +01:00
|
|
|
uri = carrier.data[1:].decode("utf-8")
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP URI: " + uri)
|
2020-01-27 20:39:54 +01:00
|
|
|
res = wpas_report_handover_sel(uri)
|
|
|
|
if res is None or "FAIL" in res:
|
|
|
|
summary("DPP handover report rejected")
|
|
|
|
break
|
|
|
|
|
|
|
|
success_report("DPP handover reported successfully (initiator)")
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("peer_id=" + res)
|
2020-01-27 20:39:54 +01:00
|
|
|
peer_id = int(res)
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
break
|
2020-05-11 23:57:44 +02:00
|
|
|
|
|
|
|
global enrollee_only
|
|
|
|
global config_params
|
|
|
|
if enrollee_only:
|
|
|
|
extra = " role=enrollee"
|
|
|
|
elif config_params:
|
|
|
|
extra = " role=configurator " + config_params
|
|
|
|
else:
|
|
|
|
# TODO: Single Configurator instance
|
|
|
|
res = wpas.request("DPP_CONFIGURATOR_ADD")
|
|
|
|
if "FAIL" in res:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Failed to initiate Configurator")
|
2020-05-11 23:57:44 +02:00
|
|
|
break
|
|
|
|
conf_id = int(res)
|
|
|
|
extra = " conf=sta-dpp configurator=%d" % conf_id
|
2020-01-27 20:39:54 +01:00
|
|
|
global own_id
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Initiate DPP authentication")
|
2020-05-11 23:57:44 +02:00
|
|
|
cmd = "DPP_AUTH_INIT peer=%d own=%d" % (peer_id, own_id)
|
|
|
|
cmd += extra
|
2020-01-27 20:39:54 +01:00
|
|
|
res = wpas.request(cmd)
|
|
|
|
if "FAIL" in res:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Failed to initiate DPP authentication")
|
2020-01-27 20:39:54 +01:00
|
|
|
break
|
|
|
|
|
2020-02-06 22:47:54 +01:00
|
|
|
if not dpp_found:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP carrier not seen in response - allow peer to initiate a new handover with different parameters")
|
2020-02-06 22:47:54 +01:00
|
|
|
client.close()
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Returning from dpp_handover_client")
|
2020-02-06 22:47:54 +01:00
|
|
|
return
|
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Remove peer")
|
2020-01-27 20:39:54 +01:00
|
|
|
client.close()
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Done with handover")
|
2020-01-27 20:39:54 +01:00
|
|
|
global only_one
|
|
|
|
if only_one:
|
|
|
|
print("only_one -> stop loop")
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
|
|
|
|
|
|
|
global no_wait
|
|
|
|
if no_wait:
|
|
|
|
print("Trying to exit..")
|
|
|
|
global terminate_now
|
|
|
|
terminate_now = True
|
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Returning from dpp_handover_client")
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
class HandoverServer(nfc.handover.HandoverServer):
|
|
|
|
def __init__(self, llc):
|
|
|
|
super(HandoverServer, self).__init__(llc)
|
|
|
|
self.sent_carrier = None
|
|
|
|
self.ho_server_processing = False
|
|
|
|
self.success = False
|
2020-02-06 22:47:54 +01:00
|
|
|
self.try_own = False
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
def process_handover_request_message(self, records):
|
|
|
|
self.ho_server_processing = True
|
2020-05-15 11:03:53 +02:00
|
|
|
global in_raw_mode
|
|
|
|
was_in_raw_mode = in_raw_mode
|
2020-01-27 20:39:54 +01:00
|
|
|
clear_raw_mode()
|
2020-05-15 11:03:53 +02:00
|
|
|
if was_in_raw_mode:
|
|
|
|
print("\n")
|
|
|
|
summary("HandoverServer - request received: " + str(records))
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-15 11:10:59 +02:00
|
|
|
global my_crn, peer_crn, my_crn_ready
|
2020-05-15 01:26:01 +02:00
|
|
|
|
|
|
|
for carrier in records:
|
|
|
|
if not isinstance(carrier, ndef.HandoverRequestRecord):
|
|
|
|
continue
|
|
|
|
if carrier.collision_resolution_number:
|
|
|
|
peer_crn = carrier.collision_resolution_number
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("peer_crn: %d" % peer_crn)
|
2020-05-15 01:26:01 +02:00
|
|
|
|
2020-05-15 11:10:59 +02:00
|
|
|
if my_crn is None and my_crn_ready:
|
|
|
|
summary("Still trying to send own handover request - wait a moment to see if that succeeds before checking crn values")
|
|
|
|
for i in range(10):
|
|
|
|
if my_crn is not None:
|
|
|
|
break
|
|
|
|
time.sleep(0.01)
|
2020-05-15 01:26:01 +02:00
|
|
|
if my_crn is not None:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("my_crn: %d" % my_crn)
|
2020-05-15 01:26:01 +02:00
|
|
|
|
|
|
|
if my_crn is not None and peer_crn is not None:
|
|
|
|
if my_crn == peer_crn:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Same crn used - automatic collision resolution failed")
|
2020-05-15 01:26:01 +02:00
|
|
|
# TODO: Should generate a new Handover Request message
|
|
|
|
return ''
|
|
|
|
if ((my_crn & 1) == (peer_crn & 1) and my_crn > peer_crn) or \
|
|
|
|
((my_crn & 1) != (peer_crn & 1) and my_crn < peer_crn):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("I'm the Handover Selector Device")
|
2020-05-15 01:26:01 +02:00
|
|
|
pass
|
|
|
|
else:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Peer is the Handover Selector device")
|
|
|
|
summary("Ignore the received request.")
|
2020-05-15 01:26:01 +02:00
|
|
|
return ''
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
hs = ndef.HandoverSelectRecord('1.4')
|
|
|
|
sel = [hs]
|
|
|
|
|
|
|
|
found = False
|
|
|
|
|
|
|
|
for carrier in records:
|
|
|
|
if isinstance(carrier, ndef.HandoverRequestRecord):
|
|
|
|
continue
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Remote carrier type: " + carrier.type)
|
2020-01-27 20:39:54 +01:00
|
|
|
if carrier.type == "application/vnd.wfa.dpp":
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP carrier type match - add DPP carrier record")
|
2020-01-27 20:39:54 +01:00
|
|
|
if len(carrier.data) == 0 or carrier.data[0] != 0:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI Identifier Code 'None' not seen")
|
2020-01-27 20:39:54 +01:00
|
|
|
continue
|
|
|
|
uri = carrier.data[1:].decode("utf-8")
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Received DPP URI: " + uri)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-15 13:17:40 +02:00
|
|
|
data = wpas_get_nfc_uri(start_listen=False, pick_channel=True)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Own URI (pre-processing): %s" % data)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
res = wpas_report_handover_req(uri)
|
|
|
|
if res is None or "FAIL" in res:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP handover request processing failed")
|
2020-01-27 20:39:54 +01:00
|
|
|
continue
|
|
|
|
|
|
|
|
found = True
|
|
|
|
|
|
|
|
wpas = wpas_connect()
|
|
|
|
if wpas is None:
|
|
|
|
continue
|
|
|
|
global own_id
|
|
|
|
data = wpas.request("DPP_BOOTSTRAP_GET_URI %d" % own_id).rstrip()
|
|
|
|
if "FAIL" in data:
|
|
|
|
continue
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Own URI (post-processing): %s" % data)
|
2020-01-27 20:39:54 +01:00
|
|
|
uri = ndef.UriRecord(data)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Own bootstrapping NFC URI record: " + str(uri))
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
info = wpas.request("DPP_BOOTSTRAP_INFO %d" % own_id)
|
|
|
|
freq = None
|
|
|
|
for line in info.splitlines():
|
|
|
|
if line.startswith("use_freq="):
|
|
|
|
freq = int(line.split('=')[1])
|
2020-05-15 13:17:40 +02:00
|
|
|
if freq is None or freq == 0:
|
|
|
|
summary("No channel negotiated over NFC - use channel 6")
|
|
|
|
freq = 2437
|
|
|
|
else:
|
|
|
|
summary("Negotiated channel: %d MHz" % freq)
|
|
|
|
if get_status_field(wpas, "bssid[0]"):
|
|
|
|
summary("Own AP freq: %s MHz" % str(get_status_field(wpas, "freq")))
|
2020-05-15 13:46:41 +02:00
|
|
|
if get_status_field(wpas, "beacon_set", extra="DRIVER") is None:
|
|
|
|
summary("Enable beaconing to have radio ready for RX")
|
|
|
|
wpas.request("DISABLE")
|
|
|
|
wpas.request("SET start_disabled 0")
|
|
|
|
wpas.request("ENABLE")
|
2020-05-11 23:57:44 +02:00
|
|
|
cmd = "DPP_LISTEN %d" % freq
|
|
|
|
global enrollee_only
|
|
|
|
global configurator_only
|
|
|
|
if enrollee_only:
|
|
|
|
cmd += " role=enrollee"
|
|
|
|
elif configurator_only:
|
|
|
|
cmd += " role=configurator"
|
2020-05-15 13:20:26 +02:00
|
|
|
summary(cmd)
|
2020-05-11 23:57:44 +02:00
|
|
|
res = wpas.request(cmd)
|
2020-01-27 20:39:54 +01:00
|
|
|
if "OK" not in res:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Failed to start DPP listen")
|
2020-01-27 20:39:54 +01:00
|
|
|
break
|
|
|
|
|
|
|
|
carrier = ndef.Record('application/vnd.wfa.dpp', 'A', uri.data)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Own DPP carrier record: " + str(carrier))
|
2020-01-27 20:39:54 +01:00
|
|
|
hs.add_alternative_carrier('active', carrier.name)
|
|
|
|
sel = [hs, carrier]
|
|
|
|
break
|
|
|
|
|
|
|
|
summary("Sending handover select: " + str(sel))
|
2020-02-06 22:47:54 +01:00
|
|
|
if found:
|
|
|
|
self.success = True
|
|
|
|
else:
|
|
|
|
self.try_own = True
|
2020-05-15 13:20:26 +02:00
|
|
|
global hs_sent
|
|
|
|
hs_sent = True
|
2020-01-27 20:39:54 +01:00
|
|
|
return sel
|
|
|
|
|
|
|
|
def clear_raw_mode():
|
|
|
|
import sys, tty, termios
|
|
|
|
global prev_tcgetattr, in_raw_mode
|
|
|
|
if not in_raw_mode:
|
|
|
|
return
|
|
|
|
fd = sys.stdin.fileno()
|
|
|
|
termios.tcsetattr(fd, termios.TCSADRAIN, prev_tcgetattr)
|
|
|
|
in_raw_mode = False
|
|
|
|
|
|
|
|
def getch():
|
|
|
|
import sys, tty, termios, select
|
|
|
|
global prev_tcgetattr, in_raw_mode
|
|
|
|
fd = sys.stdin.fileno()
|
|
|
|
prev_tcgetattr = termios.tcgetattr(fd)
|
|
|
|
ch = None
|
|
|
|
try:
|
|
|
|
tty.setraw(fd)
|
|
|
|
in_raw_mode = True
|
|
|
|
[i, o, e] = select.select([fd], [], [], 0.05)
|
|
|
|
if i:
|
|
|
|
ch = sys.stdin.read(1)
|
|
|
|
finally:
|
|
|
|
termios.tcsetattr(fd, termios.TCSADRAIN, prev_tcgetattr)
|
|
|
|
in_raw_mode = False
|
|
|
|
return ch
|
|
|
|
|
|
|
|
def dpp_tag_read(tag):
|
|
|
|
success = False
|
|
|
|
for record in tag.ndef.records:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(record)
|
|
|
|
summary("record type " + record.type)
|
2020-01-27 20:39:54 +01:00
|
|
|
if record.type == "application/vnd.wfa.dpp":
|
|
|
|
summary("DPP HS tag - send to wpa_supplicant")
|
|
|
|
success = dpp_hs_tag_read(record)
|
|
|
|
break
|
|
|
|
if isinstance(record, ndef.UriRecord):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI record: uri=" + record.uri)
|
|
|
|
summary("URI record: iri=" + record.iri)
|
2020-01-27 20:39:54 +01:00
|
|
|
if record.iri.startswith("DPP:"):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("DPP URI")
|
2020-01-27 20:39:54 +01:00
|
|
|
if not dpp_nfc_uri_process(record.iri):
|
|
|
|
break
|
|
|
|
success = True
|
|
|
|
else:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Ignore unknown URI")
|
2020-01-27 20:39:54 +01:00
|
|
|
break
|
|
|
|
|
|
|
|
if success:
|
|
|
|
success_report("Tag read succeeded")
|
|
|
|
|
|
|
|
return success
|
|
|
|
|
|
|
|
def rdwr_connected_write_tag(tag):
|
|
|
|
summary("Tag found - writing - " + str(tag))
|
|
|
|
if not tag.ndef.is_writeable:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Not a writable tag")
|
2020-01-27 20:39:54 +01:00
|
|
|
return
|
|
|
|
global dpp_tag_data
|
|
|
|
if tag.ndef.capacity < len(dpp_tag_data):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Not enough room for the message")
|
2020-01-27 20:39:54 +01:00
|
|
|
return
|
|
|
|
tag.ndef.records = dpp_tag_data
|
|
|
|
success_report("Tag write succeeded")
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Done - remove tag")
|
2020-01-27 20:39:54 +01:00
|
|
|
global only_one
|
|
|
|
if only_one:
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
|
|
|
global dpp_sel_wait_remove
|
|
|
|
return dpp_sel_wait_remove
|
|
|
|
|
|
|
|
def write_nfc_uri(clf, wait_remove=True):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Write NFC URI record")
|
2020-01-27 20:39:54 +01:00
|
|
|
data = wpas_get_nfc_uri()
|
|
|
|
if data is None:
|
|
|
|
summary("Could not get NFC URI from wpa_supplicant")
|
|
|
|
return
|
|
|
|
|
|
|
|
global dpp_sel_wait_remove
|
|
|
|
dpp_sel_wait_remove = wait_remove
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI: %s" % data)
|
2020-01-27 20:39:54 +01:00
|
|
|
uri = ndef.UriRecord(data)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(uri)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Touch an NFC tag")
|
2020-01-27 20:39:54 +01:00
|
|
|
global dpp_tag_data
|
|
|
|
dpp_tag_data = [uri]
|
|
|
|
clf.connect(rdwr={'on-connect': rdwr_connected_write_tag})
|
|
|
|
|
|
|
|
def write_nfc_hs(clf, wait_remove=True):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Write NFC Handover Select record on a tag")
|
2020-01-27 20:39:54 +01:00
|
|
|
data = wpas_get_nfc_uri()
|
|
|
|
if data is None:
|
|
|
|
summary("Could not get NFC URI from wpa_supplicant")
|
|
|
|
return
|
|
|
|
|
|
|
|
global dpp_sel_wait_remove
|
|
|
|
dpp_sel_wait_remove = wait_remove
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("URI: %s" % data)
|
2020-01-27 20:39:54 +01:00
|
|
|
uri = ndef.UriRecord(data)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(uri)
|
2020-01-27 20:39:54 +01:00
|
|
|
carrier = ndef.Record('application/vnd.wfa.dpp', 'A', uri.data)
|
|
|
|
hs = ndef.HandoverSelectRecord('1.4')
|
|
|
|
hs.add_alternative_carrier('active', carrier.name)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(hs)
|
|
|
|
summary(carrier)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Touch an NFC tag")
|
2020-01-27 20:39:54 +01:00
|
|
|
global dpp_tag_data
|
|
|
|
dpp_tag_data = [hs, carrier]
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(dpp_tag_data)
|
2020-01-27 20:39:54 +01:00
|
|
|
clf.connect(rdwr={'on-connect': rdwr_connected_write_tag})
|
|
|
|
|
|
|
|
def rdwr_connected(tag):
|
|
|
|
global only_one, no_wait
|
|
|
|
summary("Tag connected: " + str(tag))
|
|
|
|
|
|
|
|
if tag.ndef:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("NDEF tag: " + tag.type)
|
|
|
|
summary(tag.ndef.records)
|
2020-01-27 20:39:54 +01:00
|
|
|
success = dpp_tag_read(tag)
|
|
|
|
if only_one and success:
|
|
|
|
global continue_loop
|
|
|
|
continue_loop = False
|
|
|
|
else:
|
|
|
|
summary("Not an NDEF tag - remove tag")
|
|
|
|
return True
|
|
|
|
|
|
|
|
return not no_wait
|
|
|
|
|
|
|
|
def llcp_worker(llc):
|
|
|
|
global init_on_touch
|
|
|
|
if init_on_touch:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Starting handover client")
|
2020-01-27 20:39:54 +01:00
|
|
|
dpp_handover_client(llc)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Exiting llcp_worker thread (init_in_touch)")
|
2020-01-27 20:39:54 +01:00
|
|
|
return
|
|
|
|
|
|
|
|
global no_input
|
|
|
|
if no_input:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Wait for handover to complete")
|
2020-01-27 20:39:54 +01:00
|
|
|
else:
|
|
|
|
print("Wait for handover to complete - press 'i' to initiate")
|
|
|
|
global srv
|
|
|
|
global wait_connection
|
|
|
|
while not wait_connection and srv.sent_carrier is None:
|
2020-02-06 22:47:54 +01:00
|
|
|
if srv.try_own:
|
|
|
|
srv.try_own = False
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Try to initiate another handover with own parameters")
|
2020-02-06 22:47:54 +01:00
|
|
|
dpp_handover_client(llc)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Exiting llcp_worker thread (retry with own parameters)")
|
2020-02-06 22:47:54 +01:00
|
|
|
return
|
2020-01-27 20:39:54 +01:00
|
|
|
if srv.ho_server_processing:
|
|
|
|
time.sleep(0.025)
|
|
|
|
elif no_input:
|
|
|
|
time.sleep(0.5)
|
|
|
|
else:
|
|
|
|
res = getch()
|
|
|
|
if res != 'i':
|
|
|
|
continue
|
|
|
|
clear_raw_mode()
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Starting handover client")
|
2020-01-27 20:39:54 +01:00
|
|
|
dpp_handover_client(llc)
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Exiting llcp_worker thread (manual init)")
|
2020-01-27 20:39:54 +01:00
|
|
|
return
|
|
|
|
|
2020-05-15 11:03:53 +02:00
|
|
|
global in_raw_mode
|
|
|
|
was_in_raw_mode = in_raw_mode
|
2020-01-27 20:39:54 +01:00
|
|
|
clear_raw_mode()
|
2020-05-15 11:03:53 +02:00
|
|
|
if was_in_raw_mode:
|
|
|
|
print("\r")
|
|
|
|
summary("Exiting llcp_worker thread")
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
def llcp_startup(llc):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Start LLCP server")
|
2020-01-27 20:39:54 +01:00
|
|
|
global srv
|
|
|
|
srv = HandoverServer(llc)
|
|
|
|
return llc
|
|
|
|
|
|
|
|
def llcp_connected(llc):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("P2P LLCP connected")
|
2020-05-15 13:20:26 +02:00
|
|
|
global wait_connection, my_crn, peer_crn, my_crn_ready, hs_sent
|
2020-01-27 20:39:54 +01:00
|
|
|
wait_connection = False
|
2020-05-15 11:10:59 +02:00
|
|
|
my_crn_ready = False
|
2020-05-15 01:26:01 +02:00
|
|
|
my_crn = None
|
|
|
|
peer_crn = None
|
2020-05-15 13:20:26 +02:00
|
|
|
hs_sent = False
|
2020-05-15 00:21:01 +02:00
|
|
|
global srv
|
|
|
|
srv.start()
|
2020-01-27 20:39:54 +01:00
|
|
|
if init_on_touch or not no_input:
|
|
|
|
threading.Thread(target=llcp_worker, args=(llc,)).start()
|
|
|
|
return True
|
|
|
|
|
|
|
|
def llcp_release(llc):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("LLCP release")
|
2020-01-27 20:39:54 +01:00
|
|
|
return True
|
|
|
|
|
|
|
|
def terminate_loop():
|
|
|
|
global terminate_now
|
|
|
|
return terminate_now
|
|
|
|
|
|
|
|
def main():
|
|
|
|
clf = nfc.ContactlessFrontend()
|
|
|
|
|
|
|
|
parser = argparse.ArgumentParser(description='nfcpy to wpa_supplicant integration for DPP NFC operations')
|
|
|
|
parser.add_argument('-d', const=logging.DEBUG, default=logging.INFO,
|
|
|
|
action='store_const', dest='loglevel',
|
|
|
|
help='verbose debug output')
|
|
|
|
parser.add_argument('-q', const=logging.WARNING, action='store_const',
|
|
|
|
dest='loglevel', help='be quiet')
|
|
|
|
parser.add_argument('--only-one', '-1', action='store_true',
|
|
|
|
help='run only one operation and exit')
|
|
|
|
parser.add_argument('--init-on-touch', '-I', action='store_true',
|
|
|
|
help='initiate handover on touch')
|
|
|
|
parser.add_argument('--no-wait', action='store_true',
|
|
|
|
help='do not wait for tag to be removed before exiting')
|
|
|
|
parser.add_argument('--ifname', '-i',
|
|
|
|
help='network interface name')
|
|
|
|
parser.add_argument('--no-input', '-a', action='store_true',
|
|
|
|
help='do not use stdout input to initiate handover')
|
|
|
|
parser.add_argument('--tag-read-only', '-t', action='store_true',
|
|
|
|
help='tag read only (do not allow connection handover)')
|
|
|
|
parser.add_argument('--handover-only', action='store_true',
|
|
|
|
help='connection handover only (do not allow tag read)')
|
2020-05-11 23:57:44 +02:00
|
|
|
parser.add_argument('--enrollee', action='store_true',
|
|
|
|
help='run as Enrollee-only')
|
|
|
|
parser.add_argument('--configurator', action='store_true',
|
|
|
|
help='run as Configurator-only')
|
|
|
|
parser.add_argument('--config-params', default='',
|
|
|
|
help='configurator parameters')
|
2020-05-14 20:52:09 +02:00
|
|
|
parser.add_argument('--ctrl', default='/var/run/wpa_supplicant',
|
|
|
|
help='wpa_supplicant/hostapd control interface')
|
2020-01-27 20:39:54 +01:00
|
|
|
parser.add_argument('--summary',
|
|
|
|
help='summary file for writing status updates')
|
|
|
|
parser.add_argument('--success',
|
|
|
|
help='success file for writing success update')
|
|
|
|
parser.add_argument('--device', default='usb', help='NFC device to open')
|
2020-05-15 13:17:40 +02:00
|
|
|
parser.add_argument('--chan', default=None, help='channel list')
|
2020-01-27 20:39:54 +01:00
|
|
|
parser.add_argument('command', choices=['write-nfc-uri',
|
|
|
|
'write-nfc-hs'],
|
|
|
|
nargs='?')
|
|
|
|
args = parser.parse_args()
|
2020-05-15 11:03:53 +02:00
|
|
|
summary(args)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
|
|
|
global only_one
|
|
|
|
only_one = args.only_one
|
|
|
|
|
|
|
|
global no_wait
|
|
|
|
no_wait = args.no_wait
|
|
|
|
|
2020-02-06 22:22:39 +01:00
|
|
|
global chanlist
|
|
|
|
chanlist = args.chan
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
logging.basicConfig(level=args.loglevel)
|
|
|
|
|
|
|
|
global init_on_touch
|
|
|
|
init_on_touch = args.init_on_touch
|
|
|
|
|
2020-05-11 23:57:44 +02:00
|
|
|
global enrollee_only
|
|
|
|
enrollee_only = args.enrollee
|
|
|
|
|
|
|
|
global configurator_only
|
|
|
|
configurator_only = args.configurator
|
|
|
|
|
|
|
|
global config_params
|
|
|
|
config_params = args.config_params
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
if args.ifname:
|
|
|
|
global ifname
|
|
|
|
ifname = args.ifname
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Selected ifname " + ifname)
|
2020-01-27 20:39:54 +01:00
|
|
|
|
2020-05-14 20:52:09 +02:00
|
|
|
if args.ctrl:
|
|
|
|
global wpas_ctrl
|
|
|
|
wpas_ctrl = args.ctrl
|
|
|
|
|
2020-01-27 20:39:54 +01:00
|
|
|
if args.summary:
|
|
|
|
global summary_file
|
|
|
|
summary_file = args.summary
|
|
|
|
|
|
|
|
if args.success:
|
|
|
|
global success_file
|
|
|
|
success_file = args.success
|
|
|
|
|
|
|
|
if args.no_input:
|
|
|
|
global no_input
|
|
|
|
no_input = True
|
|
|
|
|
|
|
|
clf = nfc.ContactlessFrontend()
|
|
|
|
global wait_connection
|
|
|
|
|
|
|
|
try:
|
|
|
|
if not clf.open(args.device):
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("Could not open connection with an NFC device")
|
2020-01-27 20:39:54 +01:00
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
if args.command == "write-nfc-uri":
|
|
|
|
write_nfc_uri(clf, wait_remove=not args.no_wait)
|
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
if args.command == "write-nfc-hs":
|
|
|
|
write_nfc_hs(clf, wait_remove=not args.no_wait)
|
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
global continue_loop
|
|
|
|
while continue_loop:
|
2020-05-15 11:03:53 +02:00
|
|
|
global in_raw_mode
|
|
|
|
was_in_raw_mode = in_raw_mode
|
2020-01-27 20:39:54 +01:00
|
|
|
clear_raw_mode()
|
2020-05-15 11:03:53 +02:00
|
|
|
if was_in_raw_mode:
|
|
|
|
print("\r")
|
|
|
|
summary("Waiting for a tag or peer to be touched")
|
2020-01-27 20:39:54 +01:00
|
|
|
wait_connection = True
|
|
|
|
try:
|
|
|
|
if args.tag_read_only:
|
|
|
|
if not clf.connect(rdwr={'on-connect': rdwr_connected}):
|
|
|
|
break
|
|
|
|
elif args.handover_only:
|
|
|
|
if not clf.connect(llcp={'on-startup': llcp_startup,
|
|
|
|
'on-connect': llcp_connected,
|
|
|
|
'on-release': llcp_release},
|
|
|
|
terminate=terminate_loop):
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
if not clf.connect(rdwr={'on-connect': rdwr_connected},
|
|
|
|
llcp={'on-startup': llcp_startup,
|
|
|
|
'on-connect': llcp_connected,
|
|
|
|
'on-release': llcp_release},
|
|
|
|
terminate=terminate_loop):
|
|
|
|
break
|
|
|
|
except Exception as e:
|
2020-05-15 11:03:53 +02:00
|
|
|
summary("clf.connect failed: " + str(e))
|
2020-01-27 20:39:54 +01:00
|
|
|
break
|
|
|
|
|
|
|
|
global srv
|
|
|
|
if only_one and srv and srv.success:
|
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
raise SystemExit
|
|
|
|
finally:
|
|
|
|
clf.close()
|
|
|
|
|
|
|
|
raise SystemExit
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|