sm->ClientTimeout = 60;
if (conf->mac_addr)
os_memcpy(sm->mac_addr, conf->mac_addr, ETH_ALEN);
+ if (conf->uuid)
+ os_memcpy(sm->uuid, conf->uuid, 16);
os_memset(&tlsconf, 0, sizeof(tlsconf));
tlsconf.opensc_engine_path = conf->opensc_engine_path;
* This is only used by EAP-WSC and can be left %NULL if not available.
*/
const u8 *mac_addr;
+ /**
+ * uuid - Device UUID
+ *
+ * This is only used by EAP-WSC and can be left %NULL if not available.
+ */
+ const u8 *uuid;
};
struct eap_sm * eap_peer_sm_init(void *eapol_ctx,
int force_disabled;
u8 mac_addr[ETH_ALEN];
+ u8 uuid[16];
};
const u8 * eap_get_config_identity(struct eap_sm *sm, size_t *len);
size_t identity_len;
int registrar;
struct wps_config cfg;
- u8 uuid[UUID_LEN];
const char *pos;
const char *phase1;
struct wps_context *wps = NULL;
return NULL;
}
- pos = os_strstr(phase1, "uuid=");
- if (pos == NULL) {
- wpa_printf(MSG_INFO, "EAP-WSC: UUID not set in phase1 "
- "configuration data");
- os_free(data);
- return NULL;
- }
- if (uuid_str2bin(pos + 5, uuid)) {
- wpa_printf(MSG_INFO, "EAP-WSC: Invalid UUID in phase1 "
- "configuration data");
- os_free(data);
- return NULL;
- }
if (registrar && wps)
- os_memcpy(wps->uuid, uuid, UUID_LEN);
+ os_memcpy(wps->uuid, sm->uuid, UUID_LEN);
else
- cfg.uuid = uuid;
+ cfg.uuid = sm->uuid;
cfg.wps_cred_cb = sm->eapol_cb->wps_cred;
cfg.cb_ctx = sm->eapol_ctx;
data->wps = wps_init(&cfg);
conf.pkcs11_module_path = ctx->pkcs11_module_path;
#endif /* EAP_TLS_OPENSSL */
conf.mac_addr = ctx->mac_addr;
+ conf.uuid = ctx->uuid;
sm->eap = eap_peer_sm_init(sm, &eapol_cb, sm->ctx->msg_ctx, &conf);
if (sm->eap == NULL) {
const u8 *mac_addr;
/**
+ * uuid - Device UUID
+ *
+ * This is only used by EAP-WSC and can be left %NULL if not available.
+ */
+ const u8 *uuid;
+
+ /**
* wps_cred - Notify that new credential was received from WPS
* @ctx: Callback context (ctx)
* Returns: 0 on success (credential stored), -1 on failure
return -1;
return 0;
}
+
+
+int is_nil_uuid(const u8 *uuid)
+{
+ int i;
+ for (i = 0; i < UUID_LEN; i++)
+ if (uuid[i])
+ return 0;
+ return 1;
+}
int uuid_str2bin(const char *str, u8 *bin);
int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
+int is_nil_uuid(const u8 *uuid);
#endif /* UUID_H */
* blobs - Configuration blobs
*/
struct wpa_config_blob *blobs;
+
+ /**
+ * uuid - Universally Unique IDentifier (UUID; see RFC 4122) for WPS
+ */
+ u8 uuid[16];
};
#include "common.h"
#include "config.h"
#include "base64.h"
+#include "uuid.h"
#include "eap_peer/eap_methods.h"
}
+#ifdef CONFIG_WPS
+static int wpa_config_process_uuid(struct wpa_config *config, int line,
+ char *pos)
+{
+ char buf[40];
+ if (uuid_str2bin(pos, config->uuid)) {
+ wpa_printf(MSG_ERROR, "Line %d: invalid UUID", line);
+ return -1;
+ }
+ uuid_bin2str(config->uuid, buf, sizeof(buf));
+ wpa_printf(MSG_DEBUG, "uuid=%s", buf);
+ return 0;
+}
+#endif /* CONFIG_WPS */
+
+
static int wpa_config_process_global(struct wpa_config *config, char *pos,
int line)
{
if (os_strncmp(pos, "load_dynamic_eap=", 17) == 0)
return wpa_config_process_load_dynamic_eap(line, pos + 17);
+#ifdef CONFIG_WPS
+ if (os_strncmp(pos, "uuid=", 5) == 0)
+ return wpa_config_process_uuid(config, line, pos + 5);
+#endif /* CONFIG_WPS */
+
return -1;
}
config->dot11RSNAConfigSATimeout);
if (config->update_config)
fprintf(f, "update_config=%d\n", config->update_config);
+#ifdef CONFIG_WPS
+ if (is_nil_uuid(config->uuid)) {
+ char buf[40];
+ uuid_bin2str(config->uuid, buf, sizeof(buf));
+ fprintf(f, "uuid=%s\n", buf);
+ }
+#endif /* CONFIG_WPS */
}
#endif /* CONFIG_NO_CONFIG_WRITE */
#include "includes.h"
#include "common.h"
+#include "uuid.h"
#include "config.h"
#ifndef WPA_KEY_ROOT
}
+#ifdef CONFIG_WPS
+static int wpa_config_read_global_uuid(struct wpa_config *config, HKEY hk)
+{
+ char *str;
+ int ret = 0;
+
+ str = wpa_config_read_reg_string(hk, TEXT("uuid"));
+ if (str == NULL)
+ return 0;
+
+ if (uuid_str2bin(str, config->uuid))
+ ret = -1;
+
+ os_free(str);
+
+ return ret;
+}
+#endif /* CONFIG_WPS */
+
+
static int wpa_config_read_global(struct wpa_config *config, HKEY hk)
{
int errors = 0;
config->ctrl_interface = wpa_config_read_reg_string(
hk, TEXT("ctrl_interface"));
+#ifdef CONFIG_WPS
+ if (wpa_config_read_global_uuid(config, hk))
+ errors++;
+#endif /* CONFIG_WPS */
+
return errors ? -1 : 0;
}
wpa_config_write_reg_dword(hk, TEXT("update_config"),
config->update_config,
0);
+#ifdef CONFIG_WPS
+ if (is_nil_uuid(config->uuid)) {
+ char buf[40];
+ uuid_bin2str(config->uuid, buf, sizeof(buf));
+ wpa_config_write_reg_string(hk, "uuid", buf);
+ }
+#endif /* CONFIG_WPS */
return 0;
}
#include "config.h"
#include "wpa_supplicant_i.h"
#include "mlme.h"
-#include "uuid.h"
#include "wps/wps.h"
#ifdef CONFIG_WPS
-static int wpas_wps_in_use(struct wpa_config *conf, u8 *uuid)
+static int wpas_wps_in_use(struct wpa_config *conf)
{
struct wpa_ssid *ssid;
int wps = 0;
- const char *pos;
for (ssid = conf->ssid; ssid; ssid = ssid->next) {
if (!(ssid->key_mgmt & WPA_KEY_MGMT_WPS))
if (!ssid->eap.phase1)
continue;
- pos = os_strstr(ssid->eap.phase1, "uuid=");
- if (pos)
- uuid_str2bin(pos + 5, uuid);
-
if (os_strstr(ssid->eap.phase1, "pbc=1"))
return 2;
}
const u8 *extra_ie = NULL;
size_t extra_ie_len = 0;
int wps = 0;
-#ifdef CONFIG_WPS
- u8 uuid[UUID_LEN];
-#endif /* CONFIG_WPS */
if (wpa_s->disconnected && !wpa_s->scan_req)
return;
wpa_s->prev_scan_ssid = BROADCAST_SSID_SCAN;
#ifdef CONFIG_WPS
- wps = wpas_wps_in_use(wpa_s->conf, uuid);
+ wps = wpas_wps_in_use(wpa_s->conf);
#endif /* CONFIG_WPS */
if (wpa_s->scan_res_tried == 0 && wpa_s->conf->ap_scan == 1 &&
#ifdef CONFIG_WPS
if (wps) {
- wps_ie = wps_enrollee_build_probe_req_ie(wps == 2, uuid);
+ wps_ie = wps_enrollee_build_probe_req_ie(wps == 2,
+ wpa_s->conf->uuid);
if (wps_ie) {
extra_ie = wpabuf_head(wps_ie);
extra_ie_len = wpabuf_len(wps_ie);
# Timeout for security association negotiation in seconds; default 60
#dot11RSNAConfigSATimeout=60
+# Wi-Fi Protected Setup (WPS) parameters
+
+# Universally Unique IDentifier (UUID; see RFC 4122) of the device
+#uuid=12345678-9abc-def0-1234-56789abcdef0
+
+
# network block
#
# Each network (usually AP's sharing the same SSID) is configured as a separate
# * 0 = do not use cryptobinding (default)
# * 1 = use cryptobinding if server supports it
# * 2 = require cryptobinding
-# EAP-WSC (WPS) uses following options: pin=<Device Password> and
-# uuid=<Device UUID>.
+# EAP-WSC (WPS) uses following options: pin=<Device Password> or
+# pbc=1.
# phase2: Phase2 (inner authentication with TLS tunnel) parameters
# (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
# "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
ctx->pkcs11_module_path = wpa_s->conf->pkcs11_module_path;
#endif /* EAP_TLS_OPENSSL */
ctx->mac_addr = wpa_s->own_addr;
+ ctx->uuid = wpa_s->conf->uuid;
ctx->wps_cred = wpa_supplicant_wps_cred;
ctx->eap_param_needed = wpa_supplicant_eap_param_needed;
ctx->cb = wpa_supplicant_eapol_cb;