2018-07-30 12:10:10 -04:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
2022-01-13 03:50:51 -05:00
|
|
|
# SPDX-FileCopyrightText: 2018-2022 Espressif Systems (Shanghai) CO LTD
|
|
|
|
# SPDX-License-Identifier: Apache-2.0
|
2018-07-30 12:10:10 -04:00
|
|
|
#
|
|
|
|
|
|
|
|
import argparse
|
2022-06-07 12:16:23 -04:00
|
|
|
import asyncio
|
2021-01-25 21:49:01 -05:00
|
|
|
import json
|
2018-07-30 12:10:10 -04:00
|
|
|
import os
|
|
|
|
import sys
|
2021-01-25 21:49:01 -05:00
|
|
|
import textwrap
|
|
|
|
import time
|
2019-04-23 02:48:28 -04:00
|
|
|
from getpass import getpass
|
2018-07-30 12:10:10 -04:00
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
import prov
|
2018-12-01 08:23:34 -05:00
|
|
|
import security
|
|
|
|
import transport
|
2018-07-30 12:10:10 -04:00
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
except ImportError:
|
|
|
|
idf_path = os.environ['IDF_PATH']
|
2021-01-25 21:49:01 -05:00
|
|
|
sys.path.insert(0, idf_path + '/components/protocomm/python')
|
|
|
|
sys.path.insert(1, idf_path + '/tools/esp_prov')
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
import prov
|
2018-12-01 08:23:34 -05:00
|
|
|
import security
|
|
|
|
import transport
|
2018-07-30 12:10:10 -04:00
|
|
|
|
2018-11-28 07:31:57 -05:00
|
|
|
# Set this to true to allow exceptions to be thrown
|
|
|
|
config_throw_except = False
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2018-11-28 07:31:57 -05:00
|
|
|
def on_except(err):
|
|
|
|
if config_throw_except:
|
|
|
|
raise RuntimeError(err)
|
|
|
|
else:
|
|
|
|
print(err)
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-05-31 01:19:23 -04:00
|
|
|
def get_security(secver, username, password, pop='', verbose=False):
|
|
|
|
if secver == 2:
|
|
|
|
return security.Security2(username, password, verbose)
|
|
|
|
elif secver == 1:
|
2018-07-30 12:10:10 -04:00
|
|
|
return security.Security1(pop, verbose)
|
|
|
|
elif secver == 0:
|
|
|
|
return security.Security0(verbose)
|
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def get_transport(sel_transport, service_name):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
tp = None
|
|
|
|
if (sel_transport == 'softap'):
|
2019-07-02 10:42:47 -04:00
|
|
|
if service_name is None:
|
|
|
|
service_name = '192.168.4.1:80'
|
|
|
|
tp = transport.Transport_HTTP(service_name)
|
2018-07-30 12:10:10 -04:00
|
|
|
elif (sel_transport == 'ble'):
|
2019-05-09 17:36:56 -04:00
|
|
|
# BLE client is now capable of automatically figuring out
|
|
|
|
# the primary service from the advertisement data and the
|
|
|
|
# characteristics corresponding to each endpoint.
|
|
|
|
# Below, the service_uuid field and 16bit UUIDs in the nu_lookup
|
|
|
|
# table are provided only to support devices running older firmware,
|
|
|
|
# in which case, the automated discovery will fail and the client
|
|
|
|
# will fallback to using the provided UUIDs instead
|
2019-04-23 02:48:28 -04:00
|
|
|
nu_lookup = {'prov-session': 'ff51', 'prov-config': 'ff52', 'proto-ver': 'ff53'}
|
2022-06-07 12:16:23 -04:00
|
|
|
tp = transport.Transport_BLE(service_uuid='021a9004-0382-4aea-bff4-6b3f1c5adfb4',
|
2019-04-23 02:48:28 -04:00
|
|
|
nu_lookup=nu_lookup)
|
2022-06-07 12:16:23 -04:00
|
|
|
await tp.connect(devname=service_name)
|
2018-07-30 12:10:10 -04:00
|
|
|
elif (sel_transport == 'console'):
|
|
|
|
tp = transport.Transport_Console()
|
|
|
|
return tp
|
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def version_match(tp, protover, verbose=False):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('proto-ver', protover)
|
2019-04-23 13:47:28 -04:00
|
|
|
|
|
|
|
if verbose:
|
2021-01-25 21:49:01 -05:00
|
|
|
print('proto-ver response : ', response)
|
2019-04-23 13:47:28 -04:00
|
|
|
|
|
|
|
# First assume this to be a simple version string
|
|
|
|
if response.lower() == protover.lower():
|
|
|
|
return True
|
|
|
|
|
2019-07-02 10:42:47 -04:00
|
|
|
try:
|
|
|
|
# Else interpret this as JSON structure containing
|
|
|
|
# information with versions and capabilities of both
|
|
|
|
# provisioning service and application
|
|
|
|
info = json.loads(response)
|
|
|
|
if info['prov']['ver'].lower() == protover.lower():
|
|
|
|
return True
|
|
|
|
|
|
|
|
except ValueError:
|
|
|
|
# If decoding as JSON fails, it means that capabilities
|
|
|
|
# are not supported
|
|
|
|
return False
|
2019-04-23 13:47:28 -04:00
|
|
|
|
|
|
|
except Exception as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def has_capability(tp, capability='none', verbose=False):
|
2019-07-02 10:42:47 -04:00
|
|
|
# Note : default value of `capability` argument cannot be empty string
|
|
|
|
# because protocomm_httpd expects non zero content lengths
|
2019-04-23 02:48:28 -04:00
|
|
|
try:
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('proto-ver', capability)
|
2019-04-23 02:48:28 -04:00
|
|
|
|
|
|
|
if verbose:
|
2021-01-25 21:49:01 -05:00
|
|
|
print('proto-ver response : ', response)
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2019-07-02 10:42:47 -04:00
|
|
|
try:
|
|
|
|
# Interpret this as JSON structure containing
|
|
|
|
# information with versions and capabilities of both
|
|
|
|
# provisioning service and application
|
|
|
|
info = json.loads(response)
|
|
|
|
supported_capabilities = info['prov']['cap']
|
|
|
|
if capability.lower() == 'none':
|
|
|
|
# No specific capability to check, but capabilities
|
|
|
|
# feature is present so return True
|
|
|
|
return True
|
|
|
|
elif capability in supported_capabilities:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
except ValueError:
|
|
|
|
# If decoding as JSON fails, it means that capabilities
|
|
|
|
# are not supported
|
|
|
|
return False
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2019-07-02 10:42:47 -04:00
|
|
|
except RuntimeError as e:
|
2019-04-23 02:48:28 -04:00
|
|
|
on_except(e)
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def get_version(tp):
|
2019-04-23 02:48:28 -04:00
|
|
|
response = None
|
|
|
|
try:
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('proto-ver', '---')
|
2019-04-23 02:48:28 -04:00
|
|
|
except RuntimeError as e:
|
|
|
|
on_except(e)
|
|
|
|
response = ''
|
|
|
|
return response
|
|
|
|
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def establish_session(tp, sec):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
response = None
|
|
|
|
while True:
|
|
|
|
request = sec.security_session(response)
|
2018-12-01 08:23:34 -05:00
|
|
|
if request is None:
|
2018-07-30 12:10:10 -04:00
|
|
|
break
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-session', request)
|
2018-12-01 08:23:34 -05:00
|
|
|
if (response is None):
|
2018-07-30 12:10:10 -04:00
|
|
|
return False
|
|
|
|
return True
|
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def custom_config(tp, sec, custom_info, custom_ver):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
message = prov.custom_config_request(sec, custom_info, custom_ver)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('custom-config', message)
|
2018-07-30 12:10:10 -04:00
|
|
|
return (prov.custom_config_response(sec, response) == 0)
|
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def custom_data(tp, sec, custom_data):
|
2020-01-05 13:06:48 -05:00
|
|
|
try:
|
|
|
|
message = prov.custom_data_request(sec, custom_data)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('custom-data', message)
|
2020-01-05 13:06:48 -05:00
|
|
|
return (prov.custom_data_response(sec, response) == 0)
|
|
|
|
except RuntimeError as e:
|
|
|
|
on_except(e)
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def scan_wifi_APs(sel_transport, tp, sec):
|
2019-04-23 02:48:28 -04:00
|
|
|
APs = []
|
|
|
|
group_channels = 0
|
|
|
|
readlen = 100
|
|
|
|
if sel_transport == 'softap':
|
|
|
|
# In case of softAP we must perform the scan on individual channels, one by one,
|
|
|
|
# so that the Wi-Fi controller gets ample time to send out beacons (necessary to
|
|
|
|
# maintain connectivity with authenticated stations. As scanning one channel at a
|
|
|
|
# time will be slow, we can group more than one channels to be scanned in quick
|
|
|
|
# succession, hence speeding up the scan process. Though if too many channels are
|
|
|
|
# present in a group, the controller may again miss out on sending beacons. Hence,
|
|
|
|
# the application must should use an optimum value. The following value usually
|
|
|
|
# works out in most cases
|
|
|
|
group_channels = 5
|
|
|
|
elif sel_transport == 'ble':
|
|
|
|
# Read at most 4 entries at a time. This is because if we are using BLE transport
|
|
|
|
# then the response packet size should not exceed the present limit of 256 bytes of
|
|
|
|
# characteristic value imposed by protocomm_ble. This limit may be removed in the
|
|
|
|
# future
|
|
|
|
readlen = 4
|
|
|
|
try:
|
|
|
|
message = prov.scan_start_request(sec, blocking=True, group_channels=group_channels)
|
|
|
|
start_time = time.time()
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-scan', message)
|
2019-04-23 02:48:28 -04:00
|
|
|
stop_time = time.time()
|
2021-01-25 21:49:01 -05:00
|
|
|
print('++++ Scan process executed in ' + str(stop_time - start_time) + ' sec')
|
2019-04-23 02:48:28 -04:00
|
|
|
prov.scan_start_response(sec, response)
|
|
|
|
|
|
|
|
message = prov.scan_status_request(sec)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-scan', message)
|
2019-04-23 02:48:28 -04:00
|
|
|
result = prov.scan_status_response(sec, response)
|
2021-01-25 21:49:01 -05:00
|
|
|
print('++++ Scan results : ' + str(result['count']))
|
|
|
|
if result['count'] != 0:
|
2019-04-23 02:48:28 -04:00
|
|
|
index = 0
|
2021-01-25 21:49:01 -05:00
|
|
|
remaining = result['count']
|
2019-04-23 02:48:28 -04:00
|
|
|
while remaining:
|
|
|
|
count = [remaining, readlen][remaining > readlen]
|
|
|
|
message = prov.scan_result_request(sec, index, count)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-scan', message)
|
2019-04-23 02:48:28 -04:00
|
|
|
APs += prov.scan_result_response(sec, response)
|
|
|
|
remaining -= count
|
|
|
|
index += count
|
|
|
|
|
|
|
|
except RuntimeError as e:
|
|
|
|
on_except(e)
|
|
|
|
return None
|
|
|
|
|
|
|
|
return APs
|
|
|
|
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def send_wifi_config(tp, sec, ssid, passphrase):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
message = prov.config_set_config_request(sec, ssid, passphrase)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-config', message)
|
2018-07-30 12:10:10 -04:00
|
|
|
return (prov.config_set_config_response(sec, response) == 0)
|
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def apply_wifi_config(tp, sec):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
message = prov.config_apply_config_request(sec)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-config', message)
|
2019-04-23 13:47:28 -04:00
|
|
|
return (prov.config_apply_config_response(sec, response) == 0)
|
2018-07-30 12:10:10 -04:00
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def get_wifi_config(tp, sec):
|
2018-07-30 12:10:10 -04:00
|
|
|
try:
|
|
|
|
message = prov.config_get_status_request(sec)
|
2022-06-07 12:16:23 -04:00
|
|
|
response = await tp.send_data('prov-config', message)
|
2018-07-30 12:10:10 -04:00
|
|
|
return prov.config_get_status_response(sec, response)
|
|
|
|
except RuntimeError as e:
|
2018-11-28 07:31:57 -05:00
|
|
|
on_except(e)
|
2018-07-30 12:10:10 -04:00
|
|
|
return None
|
|
|
|
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def wait_wifi_connected(tp, sec):
|
2020-06-25 01:52:25 -04:00
|
|
|
"""
|
|
|
|
Wait for provisioning to report Wi-Fi is connected
|
|
|
|
|
|
|
|
Returns True if Wi-Fi connection succeeded, False if connection consistently failed
|
|
|
|
"""
|
|
|
|
TIME_PER_POLL = 5
|
|
|
|
retry = 3
|
|
|
|
|
|
|
|
while True:
|
|
|
|
time.sleep(TIME_PER_POLL)
|
2021-01-25 21:49:01 -05:00
|
|
|
print('\n==== Wi-Fi connection state ====')
|
2022-06-07 12:16:23 -04:00
|
|
|
ret = await get_wifi_config(tp, sec)
|
2021-01-25 21:49:01 -05:00
|
|
|
if ret == 'connecting':
|
2020-06-25 01:52:25 -04:00
|
|
|
continue
|
2021-01-25 21:49:01 -05:00
|
|
|
elif ret == 'connected':
|
|
|
|
print('==== Provisioning was successful ====')
|
2020-06-25 01:52:25 -04:00
|
|
|
return True
|
|
|
|
elif retry > 0:
|
|
|
|
retry -= 1
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Waiting to poll status again (status %s, %d tries left)...' % (ret, retry))
|
2020-06-25 01:52:25 -04:00
|
|
|
else:
|
2022-06-22 05:44:19 -04:00
|
|
|
print('---- Provisioning failed! ----')
|
2020-06-25 01:52:25 -04:00
|
|
|
return False
|
|
|
|
|
|
|
|
|
2019-07-02 10:42:47 -04:00
|
|
|
def desc_format(*args):
|
|
|
|
desc = ''
|
|
|
|
for arg in args:
|
2021-01-25 21:49:01 -05:00
|
|
|
desc += textwrap.fill(replace_whitespace=False, text=arg) + '\n'
|
2019-07-02 10:42:47 -04:00
|
|
|
return desc
|
2018-07-30 12:10:10 -04:00
|
|
|
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
async def main():
|
2019-07-02 10:42:47 -04:00
|
|
|
parser = argparse.ArgumentParser(description=desc_format(
|
|
|
|
'ESP Provisioning tool for configuring devices '
|
|
|
|
'running protocomm based provisioning service.',
|
|
|
|
'See esp-idf/examples/provisioning for sample applications'),
|
|
|
|
formatter_class=argparse.RawTextHelpFormatter)
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--transport', required=True, dest='mode', type=str,
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'Mode of transport over which provisioning is to be performed.',
|
|
|
|
'This should be one of "softap", "ble" or "console"'))
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--service_name', dest='name', type=str,
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'This specifies the name of the provisioning service to connect to, '
|
|
|
|
'depending upon the mode of transport :',
|
|
|
|
'\t- transport "ble" : The BLE Device Name',
|
|
|
|
'\t- transport "softap" : HTTP Server hostname or IP',
|
|
|
|
'\t (default "192.168.4.1:80")'))
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--proto_ver', dest='version', type=str, default='',
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'This checks the protocol version of the provisioning service running '
|
|
|
|
'on the device before initiating Wi-Fi configuration'))
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--sec_ver', dest='secver', type=int, default=None,
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'Protocomm security scheme used by the provisioning service for secure '
|
|
|
|
'session establishment. Accepted values are :',
|
|
|
|
'\t- 0 : No security',
|
|
|
|
'\t- 1 : X25519 key exchange + AES-CTR encryption',
|
|
|
|
'\t + Authentication using Proof of Possession (PoP)',
|
2022-05-31 01:19:23 -04:00
|
|
|
'\t- 2 : SRP6a + AES-GCM encryption',
|
2019-07-02 10:42:47 -04:00
|
|
|
'In case device side application uses IDF\'s provisioning manager, '
|
|
|
|
'the compatible security version is automatically determined from '
|
|
|
|
'capabilities retrieved via the version endpoint'))
|
|
|
|
|
2022-05-31 01:19:23 -04:00
|
|
|
parser.add_argument('--pop', dest='sec1_pop', type=str, default='',
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'This specifies the Proof of possession (PoP) when security scheme 1 '
|
|
|
|
'is used'))
|
|
|
|
|
2022-05-31 01:19:23 -04:00
|
|
|
parser.add_argument('--sec2_username', dest='sec2_usr', type=str, default='',
|
|
|
|
help=desc_format(
|
|
|
|
'Username for security scheme 2 (SRP6a)'))
|
|
|
|
|
|
|
|
parser.add_argument('--sec2_pwd', dest='sec2_pwd', type=str, default='',
|
|
|
|
help=desc_format(
|
|
|
|
'Password for security scheme 2 (SRP6a)'))
|
|
|
|
|
|
|
|
parser.add_argument('--sec2_gen_cred', help='Generate salt and verifier for security scheme 2 (SRP6a)', action='store_true')
|
|
|
|
|
|
|
|
parser.add_argument('--sec2_salt_len', dest='sec2_salt_len', type=int, default=16,
|
|
|
|
help=desc_format(
|
|
|
|
'Salt length for security scheme 2 (SRP6a)'))
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--ssid', dest='ssid', type=str, default='',
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'This configures the device to use SSID of the Wi-Fi network to which '
|
|
|
|
'we would like it to connect to permanently, once provisioning is complete. '
|
|
|
|
'If Wi-Fi scanning is supported by the provisioning service, this need not '
|
|
|
|
'be specified'))
|
|
|
|
|
2022-06-07 18:32:08 -04:00
|
|
|
parser.add_argument('--passphrase', dest='passphrase', type=str,
|
2019-07-02 10:42:47 -04:00
|
|
|
help=desc_format(
|
|
|
|
'This configures the device to use Passphrase for the Wi-Fi network to which '
|
|
|
|
'we would like it to connect to permanently, once provisioning is complete. '
|
|
|
|
'If Wi-Fi scanning is supported by the provisioning service, this need not '
|
|
|
|
'be specified'))
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('--custom_data', dest='custom_data', type=str, default='',
|
2020-01-05 13:06:48 -05:00
|
|
|
help=desc_format(
|
|
|
|
'This is an optional parameter, only intended for use with '
|
2022-01-13 03:50:51 -05:00
|
|
|
'"examples/provisioning/wifi_prov_mgr"'))
|
2019-07-02 10:42:47 -04:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
parser.add_argument('-v','--verbose', help='Increase output verbosity', action='store_true')
|
2018-12-01 08:23:34 -05:00
|
|
|
|
2018-07-30 12:10:10 -04:00
|
|
|
args = parser.parse_args()
|
|
|
|
|
2022-05-31 01:19:23 -04:00
|
|
|
if args.secver == 2 and args.sec2_gen_cred:
|
|
|
|
if not args.sec2_usr or not args.sec2_pwd:
|
2022-06-22 05:44:19 -04:00
|
|
|
raise ValueError('Username/password cannot be empty for security scheme 2 (SRP6a)')
|
|
|
|
|
2022-05-31 01:19:23 -04:00
|
|
|
print('==== Salt-verifier for security scheme 2 (SRP6a) ====')
|
|
|
|
security.sec2_gen_salt_verifier(args.sec2_usr, args.sec2_pwd, args.sec2_salt_len)
|
2022-06-22 05:44:19 -04:00
|
|
|
sys.exit()
|
2022-05-31 01:19:23 -04:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
obj_transport = await get_transport(args.mode.lower(), args.name)
|
2018-12-01 08:23:34 -05:00
|
|
|
if obj_transport is None:
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Failed to establish connection')
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
try:
|
|
|
|
# If security version not specified check in capabilities
|
|
|
|
if args.secver is None:
|
|
|
|
# First check if capabilities are supported or not
|
|
|
|
if not await has_capability(obj_transport):
|
2022-06-22 05:44:19 -04:00
|
|
|
print('Security capabilities could not be determined, please specify "--sec_ver" explicitly')
|
|
|
|
raise ValueError('Invalid Security Version')
|
2019-07-02 10:42:47 -04:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
# When no_sec is present, use security 0, else security 1
|
|
|
|
args.secver = int(not await has_capability(obj_transport, 'no_sec'))
|
2022-06-22 05:44:19 -04:00
|
|
|
print(f'==== Security Scheme: {args.secver} ====')
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2022-06-22 05:44:19 -04:00
|
|
|
if (args.secver == 1):
|
|
|
|
if not await has_capability(obj_transport, 'no_pop'):
|
2022-06-07 12:16:23 -04:00
|
|
|
if len(args.sec1_pop) == 0:
|
2022-06-22 05:44:19 -04:00
|
|
|
prompt_str = 'Proof of Possession required: '
|
|
|
|
args.sec1_pop = getpass(prompt_str)
|
2022-06-07 12:16:23 -04:00
|
|
|
elif len(args.sec1_pop) != 0:
|
2022-06-22 05:44:19 -04:00
|
|
|
print('Proof of Possession will be ignored')
|
2022-06-07 12:16:23 -04:00
|
|
|
args.sec1_pop = ''
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2022-06-22 05:44:19 -04:00
|
|
|
if (args.secver == 2):
|
|
|
|
if len(args.sec2_usr) == 0:
|
|
|
|
args.sec2_usr = input('Security Scheme 2 - SRP6a Username required: ')
|
|
|
|
if len(args.sec2_pwd) == 0:
|
|
|
|
prompt_str = 'Security Scheme 2 - SRP6a Password required: '
|
|
|
|
args.sec2_pwd = getpass(prompt_str)
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
obj_security = get_security(args.secver, args.sec2_usr, args.sec2_pwd, args.sec1_pop, args.verbose)
|
|
|
|
if obj_security is None:
|
2022-06-22 05:44:19 -04:00
|
|
|
raise ValueError('Invalid Security Version')
|
2022-06-07 12:16:23 -04:00
|
|
|
|
|
|
|
if args.version != '':
|
|
|
|
print('\n==== Verifying protocol version ====')
|
|
|
|
if not await version_match(obj_transport, args.version, args.verbose):
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in protocol version matching')
|
2022-06-07 12:16:23 -04:00
|
|
|
print('==== Verified protocol version successfully ====')
|
|
|
|
|
|
|
|
print('\n==== Starting Session ====')
|
|
|
|
if not await establish_session(obj_transport, obj_security):
|
|
|
|
print('Failed to establish session. Ensure that security scheme and proof of possession are correct')
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in establishing session')
|
2022-06-07 12:16:23 -04:00
|
|
|
print('==== Session Established ====')
|
|
|
|
|
|
|
|
if args.custom_data != '':
|
2022-06-22 05:44:19 -04:00
|
|
|
print('\n==== Sending Custom data to Target ====')
|
2022-06-07 12:16:23 -04:00
|
|
|
if not await custom_data(obj_transport, obj_security, args.custom_data):
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in custom data')
|
2022-06-07 12:16:23 -04:00
|
|
|
print('==== Custom data sent successfully ====')
|
|
|
|
|
|
|
|
if args.ssid == '':
|
|
|
|
if not await has_capability(obj_transport, 'wifi_scan'):
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Wi-Fi Scan List is not supported by provisioning service')
|
2019-04-23 02:48:28 -04:00
|
|
|
|
|
|
|
while True:
|
2022-06-07 12:16:23 -04:00
|
|
|
print('\n==== Scanning Wi-Fi APs ====')
|
|
|
|
start_time = time.time()
|
|
|
|
APs = await scan_wifi_APs(args.mode.lower(), obj_transport, obj_security)
|
|
|
|
end_time = time.time()
|
|
|
|
print('\n++++ Scan finished in ' + str(end_time - start_time) + ' sec')
|
|
|
|
if APs is None:
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in scanning Wi-Fi APs')
|
2022-06-07 12:16:23 -04:00
|
|
|
|
|
|
|
if len(APs) == 0:
|
|
|
|
print('No APs found!')
|
2022-06-22 05:44:19 -04:00
|
|
|
sys.exit()
|
2022-06-07 12:16:23 -04:00
|
|
|
|
|
|
|
print('==== Wi-Fi Scan results ====')
|
|
|
|
print('{0: >4} {1: <33} {2: <12} {3: >4} {4: <4} {5: <16}'.format(
|
|
|
|
'S.N.', 'SSID', 'BSSID', 'CHN', 'RSSI', 'AUTH'))
|
|
|
|
for i in range(len(APs)):
|
|
|
|
print('[{0: >2}] {1: <33} {2: <12} {3: >4} {4: <4} {5: <16}'.format(
|
|
|
|
i + 1, APs[i]['ssid'], APs[i]['bssid'], APs[i]['channel'], APs[i]['rssi'], APs[i]['auth']))
|
|
|
|
|
|
|
|
while True:
|
|
|
|
try:
|
2022-06-22 05:44:19 -04:00
|
|
|
select = int(input('Select AP by number (0 to rescan) : '))
|
2022-06-07 12:16:23 -04:00
|
|
|
if select < 0 or select > len(APs):
|
|
|
|
raise ValueError
|
|
|
|
break
|
|
|
|
except ValueError:
|
|
|
|
print('Invalid input! Retry')
|
|
|
|
|
|
|
|
if select != 0:
|
2019-04-23 02:48:28 -04:00
|
|
|
break
|
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
args.ssid = APs[select - 1]['ssid']
|
2022-06-07 18:32:08 -04:00
|
|
|
|
|
|
|
if args.passphrase is None:
|
2022-06-07 12:16:23 -04:00
|
|
|
prompt_str = 'Enter passphrase for {0} : '.format(args.ssid)
|
|
|
|
args.passphrase = getpass(prompt_str)
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2022-06-22 05:44:19 -04:00
|
|
|
print('\n==== Sending Wi-Fi Credentials to Target ====')
|
2022-06-07 12:16:23 -04:00
|
|
|
if not await send_wifi_config(obj_transport, obj_security, args.ssid, args.passphrase):
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in send Wi-Fi config')
|
2022-06-07 12:16:23 -04:00
|
|
|
print('==== Wi-Fi Credentials sent successfully ====')
|
2019-04-23 02:48:28 -04:00
|
|
|
|
2022-06-22 05:44:19 -04:00
|
|
|
print('\n==== Applying Wi-Fi Config to Target ====')
|
2022-06-07 12:16:23 -04:00
|
|
|
if not await apply_wifi_config(obj_transport, obj_security):
|
2022-06-22 05:44:19 -04:00
|
|
|
raise RuntimeError('Error in apply Wi-Fi config')
|
2022-06-07 12:16:23 -04:00
|
|
|
print('==== Apply config sent successfully ====')
|
2018-07-30 12:10:10 -04:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
await wait_wifi_connected(obj_transport, obj_security)
|
|
|
|
finally:
|
|
|
|
await obj_transport.disconnect()
|
2018-07-30 12:10:10 -04:00
|
|
|
|
2022-06-07 12:16:23 -04:00
|
|
|
if __name__ == '__main__':
|
|
|
|
asyncio.run(main())
|