1c1d255d3SCy Schubert /*
2c1d255d3SCy Schubert * WPA Supplicant / Configuration backend: Windows registry
3c1d255d3SCy Schubert * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
4c1d255d3SCy Schubert *
5c1d255d3SCy Schubert * This software may be distributed under the terms of the BSD license.
6c1d255d3SCy Schubert * See README for more details.
7c1d255d3SCy Schubert *
8c1d255d3SCy Schubert * This file implements a configuration backend for Windows registry. All the
9c1d255d3SCy Schubert * configuration information is stored in the registry and the format for
10c1d255d3SCy Schubert * network configuration fields is same as described in the sample
11c1d255d3SCy Schubert * configuration file, wpa_supplicant.conf.
12c1d255d3SCy Schubert *
13c1d255d3SCy Schubert * Configuration data is in
14c1d255d3SCy Schubert * \a HKEY_LOCAL_MACHINE\\SOFTWARE\\%wpa_supplicant\\configs
15c1d255d3SCy Schubert * key. Each configuration profile has its own key under this. In terms of text
16c1d255d3SCy Schubert * files, each profile would map to a separate text file with possibly multiple
17c1d255d3SCy Schubert * networks. Under each profile, there is a networks key that lists all
18c1d255d3SCy Schubert * networks as a subkey. Each network has set of values in the same way as
19c1d255d3SCy Schubert * network block in the configuration file. In addition, blobs subkey has
20c1d255d3SCy Schubert * possible blobs as values.
21c1d255d3SCy Schubert *
22c1d255d3SCy Schubert * Example network configuration block:
23c1d255d3SCy Schubert * \verbatim
24c1d255d3SCy Schubert HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks\0000
25c1d255d3SCy Schubert ssid="example"
26c1d255d3SCy Schubert key_mgmt=WPA-PSK
27c1d255d3SCy Schubert \endverbatim
28c1d255d3SCy Schubert */
29c1d255d3SCy Schubert
30c1d255d3SCy Schubert #include "includes.h"
31c1d255d3SCy Schubert
32c1d255d3SCy Schubert #include "common.h"
33c1d255d3SCy Schubert #include "uuid.h"
34c1d255d3SCy Schubert #include "config.h"
35c1d255d3SCy Schubert
36c1d255d3SCy Schubert #ifndef WPA_KEY_ROOT
37c1d255d3SCy Schubert #define WPA_KEY_ROOT HKEY_LOCAL_MACHINE
38c1d255d3SCy Schubert #endif
39c1d255d3SCy Schubert #ifndef WPA_KEY_PREFIX
40c1d255d3SCy Schubert #define WPA_KEY_PREFIX TEXT("SOFTWARE\\wpa_supplicant")
41c1d255d3SCy Schubert #endif
42c1d255d3SCy Schubert
43c1d255d3SCy Schubert #ifdef UNICODE
44c1d255d3SCy Schubert #define TSTR "%S"
45c1d255d3SCy Schubert #else /* UNICODE */
46c1d255d3SCy Schubert #define TSTR "%s"
47c1d255d3SCy Schubert #endif /* UNICODE */
48c1d255d3SCy Schubert
49c1d255d3SCy Schubert
wpa_config_read_blobs(struct wpa_config * config,HKEY hk)50c1d255d3SCy Schubert static int wpa_config_read_blobs(struct wpa_config *config, HKEY hk)
51c1d255d3SCy Schubert {
52c1d255d3SCy Schubert struct wpa_config_blob *blob;
53c1d255d3SCy Schubert int errors = 0;
54c1d255d3SCy Schubert HKEY bhk;
55c1d255d3SCy Schubert LONG ret;
56c1d255d3SCy Schubert DWORD i;
57c1d255d3SCy Schubert
58c1d255d3SCy Schubert ret = RegOpenKeyEx(hk, TEXT("blobs"), 0, KEY_QUERY_VALUE, &bhk);
59c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
60c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
61c1d255d3SCy Schubert "blobs key");
62c1d255d3SCy Schubert return 0; /* assume no blobs */
63c1d255d3SCy Schubert }
64c1d255d3SCy Schubert
65c1d255d3SCy Schubert for (i = 0; ; i++) {
66c1d255d3SCy Schubert #define TNAMELEN 255
67c1d255d3SCy Schubert TCHAR name[TNAMELEN];
68c1d255d3SCy Schubert char data[4096];
69c1d255d3SCy Schubert DWORD namelen, datalen, type;
70c1d255d3SCy Schubert
71c1d255d3SCy Schubert namelen = TNAMELEN;
72c1d255d3SCy Schubert datalen = sizeof(data);
73c1d255d3SCy Schubert ret = RegEnumValue(bhk, i, name, &namelen, NULL, &type,
74c1d255d3SCy Schubert (LPBYTE) data, &datalen);
75c1d255d3SCy Schubert
76c1d255d3SCy Schubert if (ret == ERROR_NO_MORE_ITEMS)
77c1d255d3SCy Schubert break;
78c1d255d3SCy Schubert
79c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
80c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "RegEnumValue failed: 0x%x",
81c1d255d3SCy Schubert (unsigned int) ret);
82c1d255d3SCy Schubert break;
83c1d255d3SCy Schubert }
84c1d255d3SCy Schubert
85c1d255d3SCy Schubert if (namelen >= TNAMELEN)
86c1d255d3SCy Schubert namelen = TNAMELEN - 1;
87c1d255d3SCy Schubert name[namelen] = TEXT('\0');
88c1d255d3SCy Schubert wpa_unicode2ascii_inplace(name);
89c1d255d3SCy Schubert
90c1d255d3SCy Schubert if (datalen >= sizeof(data))
91c1d255d3SCy Schubert datalen = sizeof(data) - 1;
92c1d255d3SCy Schubert
93c1d255d3SCy Schubert wpa_printf(MSG_MSGDUMP, "blob %d: field='%s' len %d",
94c1d255d3SCy Schubert (int) i, name, (int) datalen);
95c1d255d3SCy Schubert
96c1d255d3SCy Schubert blob = os_zalloc(sizeof(*blob));
97c1d255d3SCy Schubert if (blob == NULL) {
98c1d255d3SCy Schubert errors++;
99c1d255d3SCy Schubert break;
100c1d255d3SCy Schubert }
101c1d255d3SCy Schubert blob->name = os_strdup((char *) name);
102c1d255d3SCy Schubert blob->data = os_memdup(data, datalen);
103c1d255d3SCy Schubert if (blob->name == NULL || blob->data == NULL) {
104c1d255d3SCy Schubert wpa_config_free_blob(blob);
105c1d255d3SCy Schubert errors++;
106c1d255d3SCy Schubert break;
107c1d255d3SCy Schubert }
108c1d255d3SCy Schubert blob->len = datalen;
109c1d255d3SCy Schubert
110c1d255d3SCy Schubert wpa_config_set_blob(config, blob);
111c1d255d3SCy Schubert }
112c1d255d3SCy Schubert
113c1d255d3SCy Schubert RegCloseKey(bhk);
114c1d255d3SCy Schubert
115c1d255d3SCy Schubert return errors ? -1 : 0;
116c1d255d3SCy Schubert }
117c1d255d3SCy Schubert
118c1d255d3SCy Schubert
wpa_config_read_reg_dword(HKEY hk,const TCHAR * name,int * _val)119c1d255d3SCy Schubert static int wpa_config_read_reg_dword(HKEY hk, const TCHAR *name, int *_val)
120c1d255d3SCy Schubert {
121c1d255d3SCy Schubert DWORD val, buflen;
122c1d255d3SCy Schubert LONG ret;
123c1d255d3SCy Schubert
124c1d255d3SCy Schubert buflen = sizeof(val);
125c1d255d3SCy Schubert ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) &val, &buflen);
126c1d255d3SCy Schubert if (ret == ERROR_SUCCESS && buflen == sizeof(val)) {
127c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, TSTR "=%d", name, (int) val);
128c1d255d3SCy Schubert *_val = val;
129c1d255d3SCy Schubert return 0;
130c1d255d3SCy Schubert }
131c1d255d3SCy Schubert
132c1d255d3SCy Schubert return -1;
133c1d255d3SCy Schubert }
134c1d255d3SCy Schubert
135c1d255d3SCy Schubert
wpa_config_read_reg_string(HKEY hk,const TCHAR * name)136c1d255d3SCy Schubert static char * wpa_config_read_reg_string(HKEY hk, const TCHAR *name)
137c1d255d3SCy Schubert {
138c1d255d3SCy Schubert DWORD buflen;
139c1d255d3SCy Schubert LONG ret;
140c1d255d3SCy Schubert TCHAR *val;
141c1d255d3SCy Schubert
142c1d255d3SCy Schubert buflen = 0;
143c1d255d3SCy Schubert ret = RegQueryValueEx(hk, name, NULL, NULL, NULL, &buflen);
144c1d255d3SCy Schubert if (ret != ERROR_SUCCESS)
145c1d255d3SCy Schubert return NULL;
146c1d255d3SCy Schubert val = os_malloc(buflen);
147c1d255d3SCy Schubert if (val == NULL)
148c1d255d3SCy Schubert return NULL;
149c1d255d3SCy Schubert
150c1d255d3SCy Schubert ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) val, &buflen);
151c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
152c1d255d3SCy Schubert os_free(val);
153c1d255d3SCy Schubert return NULL;
154c1d255d3SCy Schubert }
155c1d255d3SCy Schubert
156c1d255d3SCy Schubert wpa_unicode2ascii_inplace(val);
157c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, TSTR "=%s", name, (char *) val);
158c1d255d3SCy Schubert return (char *) val;
159c1d255d3SCy Schubert }
160c1d255d3SCy Schubert
161c1d255d3SCy Schubert
162c1d255d3SCy Schubert #ifdef CONFIG_WPS
wpa_config_read_global_uuid(struct wpa_config * config,HKEY hk)163c1d255d3SCy Schubert static int wpa_config_read_global_uuid(struct wpa_config *config, HKEY hk)
164c1d255d3SCy Schubert {
165c1d255d3SCy Schubert char *str;
166c1d255d3SCy Schubert int ret = 0;
167c1d255d3SCy Schubert
168c1d255d3SCy Schubert str = wpa_config_read_reg_string(hk, TEXT("uuid"));
169c1d255d3SCy Schubert if (str == NULL)
170c1d255d3SCy Schubert return 0;
171c1d255d3SCy Schubert
172c1d255d3SCy Schubert if (uuid_str2bin(str, config->uuid))
173c1d255d3SCy Schubert ret = -1;
174c1d255d3SCy Schubert
175c1d255d3SCy Schubert os_free(str);
176c1d255d3SCy Schubert
177c1d255d3SCy Schubert return ret;
178c1d255d3SCy Schubert }
179c1d255d3SCy Schubert
180c1d255d3SCy Schubert
wpa_config_read_global_os_version(struct wpa_config * config,HKEY hk)181c1d255d3SCy Schubert static int wpa_config_read_global_os_version(struct wpa_config *config,
182c1d255d3SCy Schubert HKEY hk)
183c1d255d3SCy Schubert {
184c1d255d3SCy Schubert char *str;
185c1d255d3SCy Schubert int ret = 0;
186c1d255d3SCy Schubert
187c1d255d3SCy Schubert str = wpa_config_read_reg_string(hk, TEXT("os_version"));
188c1d255d3SCy Schubert if (str == NULL)
189c1d255d3SCy Schubert return 0;
190c1d255d3SCy Schubert
191c1d255d3SCy Schubert if (hexstr2bin(str, config->os_version, 4))
192c1d255d3SCy Schubert ret = -1;
193c1d255d3SCy Schubert
194c1d255d3SCy Schubert os_free(str);
195c1d255d3SCy Schubert
196c1d255d3SCy Schubert return ret;
197c1d255d3SCy Schubert }
198c1d255d3SCy Schubert #endif /* CONFIG_WPS */
199c1d255d3SCy Schubert
200c1d255d3SCy Schubert
wpa_config_read_global(struct wpa_config * config,HKEY hk)201c1d255d3SCy Schubert static int wpa_config_read_global(struct wpa_config *config, HKEY hk)
202c1d255d3SCy Schubert {
203c1d255d3SCy Schubert int errors = 0;
204c1d255d3SCy Schubert int val;
205c1d255d3SCy Schubert
206c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("ap_scan"), &config->ap_scan);
207c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("fast_reauth"),
208c1d255d3SCy Schubert &config->fast_reauth);
209c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("dot11RSNAConfigPMKLifetime"),
210c1d255d3SCy Schubert (int *) &config->dot11RSNAConfigPMKLifetime);
211c1d255d3SCy Schubert wpa_config_read_reg_dword(hk,
212c1d255d3SCy Schubert TEXT("dot11RSNAConfigPMKReauthThreshold"),
213c1d255d3SCy Schubert (int *)
214c1d255d3SCy Schubert &config->dot11RSNAConfigPMKReauthThreshold);
215c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("dot11RSNAConfigSATimeout"),
216c1d255d3SCy Schubert (int *) &config->dot11RSNAConfigSATimeout);
217c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("update_config"),
218c1d255d3SCy Schubert &config->update_config);
219c1d255d3SCy Schubert
220c1d255d3SCy Schubert if (wpa_config_read_reg_dword(hk, TEXT("eapol_version"),
221c1d255d3SCy Schubert &config->eapol_version) == 0) {
222c1d255d3SCy Schubert if (config->eapol_version < 1 ||
223c1d255d3SCy Schubert config->eapol_version > 2) {
224c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Invalid EAPOL version (%d)",
225c1d255d3SCy Schubert config->eapol_version);
226c1d255d3SCy Schubert errors++;
227c1d255d3SCy Schubert }
228c1d255d3SCy Schubert }
229c1d255d3SCy Schubert
230c1d255d3SCy Schubert config->ctrl_interface = wpa_config_read_reg_string(
231c1d255d3SCy Schubert hk, TEXT("ctrl_interface"));
232c1d255d3SCy Schubert
233c1d255d3SCy Schubert #ifdef CONFIG_WPS
234c1d255d3SCy Schubert if (wpa_config_read_global_uuid(config, hk))
235c1d255d3SCy Schubert errors++;
236c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("auto_uuid"), &config->auto_uuid);
237c1d255d3SCy Schubert config->device_name = wpa_config_read_reg_string(
238c1d255d3SCy Schubert hk, TEXT("device_name"));
239c1d255d3SCy Schubert config->manufacturer = wpa_config_read_reg_string(
240c1d255d3SCy Schubert hk, TEXT("manufacturer"));
241c1d255d3SCy Schubert config->model_name = wpa_config_read_reg_string(
242c1d255d3SCy Schubert hk, TEXT("model_name"));
243c1d255d3SCy Schubert config->serial_number = wpa_config_read_reg_string(
244c1d255d3SCy Schubert hk, TEXT("serial_number"));
245c1d255d3SCy Schubert {
246c1d255d3SCy Schubert char *t = wpa_config_read_reg_string(
247c1d255d3SCy Schubert hk, TEXT("device_type"));
248c1d255d3SCy Schubert if (t && wps_dev_type_str2bin(t, config->device_type))
249c1d255d3SCy Schubert errors++;
250c1d255d3SCy Schubert os_free(t);
251c1d255d3SCy Schubert }
252c1d255d3SCy Schubert config->config_methods = wpa_config_read_reg_string(
253c1d255d3SCy Schubert hk, TEXT("config_methods"));
254c1d255d3SCy Schubert if (wpa_config_read_global_os_version(config, hk))
255c1d255d3SCy Schubert errors++;
256c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("wps_cred_processing"),
257c1d255d3SCy Schubert &config->wps_cred_processing);
258c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("wps_cred_add_sae"),
259c1d255d3SCy Schubert &config->wps_cred_add_sae);
260c1d255d3SCy Schubert #endif /* CONFIG_WPS */
261c1d255d3SCy Schubert #ifdef CONFIG_P2P
262c1d255d3SCy Schubert config->p2p_ssid_postfix = wpa_config_read_reg_string(
263c1d255d3SCy Schubert hk, TEXT("p2p_ssid_postfix"));
264c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("p2p_group_idle"),
265c1d255d3SCy Schubert (int *) &config->p2p_group_idle);
266c1d255d3SCy Schubert #endif /* CONFIG_P2P */
267c1d255d3SCy Schubert
268c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("bss_max_count"),
269c1d255d3SCy Schubert (int *) &config->bss_max_count);
270c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("filter_ssids"),
271c1d255d3SCy Schubert &config->filter_ssids);
272c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("max_num_sta"),
273c1d255d3SCy Schubert (int *) &config->max_num_sta);
274c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("disassoc_low_ack"),
275c1d255d3SCy Schubert (int *) &config->disassoc_low_ack);
276c1d255d3SCy Schubert
277c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("okc"), &config->okc);
278c1d255d3SCy Schubert wpa_config_read_reg_dword(hk, TEXT("pmf"), &val);
279c1d255d3SCy Schubert config->pmf = val;
280c1d255d3SCy Schubert if (wpa_config_read_reg_dword(hk, TEXT("extended_key_id"),
281c1d255d3SCy Schubert &val) == 0) {
282c1d255d3SCy Schubert if (val < 0 || val > 1) {
283c1d255d3SCy Schubert wpa_printf(MSG_ERROR,
284c1d255d3SCy Schubert "Invalid Extended Key ID setting (%d)", val);
285c1d255d3SCy Schubert errors++;
286c1d255d3SCy Schubert }
287c1d255d3SCy Schubert config->extended_key_id = val;
288c1d255d3SCy Schubert }
289c1d255d3SCy Schubert
290c1d255d3SCy Schubert return errors ? -1 : 0;
291c1d255d3SCy Schubert }
292c1d255d3SCy Schubert
293c1d255d3SCy Schubert
wpa_config_read_network(HKEY hk,const TCHAR * netw,int id)294c1d255d3SCy Schubert static struct wpa_ssid * wpa_config_read_network(HKEY hk, const TCHAR *netw,
295c1d255d3SCy Schubert int id)
296c1d255d3SCy Schubert {
297c1d255d3SCy Schubert HKEY nhk;
298c1d255d3SCy Schubert LONG ret;
299c1d255d3SCy Schubert DWORD i;
300c1d255d3SCy Schubert struct wpa_ssid *ssid;
301c1d255d3SCy Schubert int errors = 0;
302c1d255d3SCy Schubert
303c1d255d3SCy Schubert ret = RegOpenKeyEx(hk, netw, 0, KEY_QUERY_VALUE, &nhk);
304c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
305c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
306c1d255d3SCy Schubert "network '" TSTR "'", netw);
307c1d255d3SCy Schubert return NULL;
308c1d255d3SCy Schubert }
309c1d255d3SCy Schubert
310c1d255d3SCy Schubert wpa_printf(MSG_MSGDUMP, "Start of a new network '" TSTR "'", netw);
311c1d255d3SCy Schubert ssid = os_zalloc(sizeof(*ssid));
312c1d255d3SCy Schubert if (ssid == NULL) {
313c1d255d3SCy Schubert RegCloseKey(nhk);
314c1d255d3SCy Schubert return NULL;
315c1d255d3SCy Schubert }
316c1d255d3SCy Schubert dl_list_init(&ssid->psk_list);
317c1d255d3SCy Schubert ssid->id = id;
318c1d255d3SCy Schubert
319c1d255d3SCy Schubert wpa_config_set_network_defaults(ssid);
320c1d255d3SCy Schubert
321c1d255d3SCy Schubert for (i = 0; ; i++) {
322c1d255d3SCy Schubert TCHAR name[255], data[1024];
323c1d255d3SCy Schubert DWORD namelen, datalen, type;
324c1d255d3SCy Schubert
325c1d255d3SCy Schubert namelen = 255;
326c1d255d3SCy Schubert datalen = sizeof(data);
327c1d255d3SCy Schubert ret = RegEnumValue(nhk, i, name, &namelen, NULL, &type,
328c1d255d3SCy Schubert (LPBYTE) data, &datalen);
329c1d255d3SCy Schubert
330c1d255d3SCy Schubert if (ret == ERROR_NO_MORE_ITEMS)
331c1d255d3SCy Schubert break;
332c1d255d3SCy Schubert
333c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
334c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "RegEnumValue failed: 0x%x",
335c1d255d3SCy Schubert (unsigned int) ret);
336c1d255d3SCy Schubert break;
337c1d255d3SCy Schubert }
338c1d255d3SCy Schubert
339c1d255d3SCy Schubert if (namelen >= 255)
340c1d255d3SCy Schubert namelen = 255 - 1;
341c1d255d3SCy Schubert name[namelen] = TEXT('\0');
342c1d255d3SCy Schubert
343c1d255d3SCy Schubert if (datalen >= 1024)
344c1d255d3SCy Schubert datalen = 1024 - 1;
345c1d255d3SCy Schubert data[datalen] = TEXT('\0');
346c1d255d3SCy Schubert
347c1d255d3SCy Schubert wpa_unicode2ascii_inplace(name);
348c1d255d3SCy Schubert wpa_unicode2ascii_inplace(data);
349c1d255d3SCy Schubert if (wpa_config_set(ssid, (char *) name, (char *) data, 0) < 0)
350c1d255d3SCy Schubert errors++;
351c1d255d3SCy Schubert }
352c1d255d3SCy Schubert
353c1d255d3SCy Schubert RegCloseKey(nhk);
354c1d255d3SCy Schubert
355c1d255d3SCy Schubert if (ssid->passphrase) {
356c1d255d3SCy Schubert if (ssid->psk_set) {
357c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Both PSK and passphrase "
358c1d255d3SCy Schubert "configured for network '" TSTR "'.", netw);
359c1d255d3SCy Schubert errors++;
360c1d255d3SCy Schubert }
361c1d255d3SCy Schubert wpa_config_update_psk(ssid);
362c1d255d3SCy Schubert }
363c1d255d3SCy Schubert
364c1d255d3SCy Schubert if ((ssid->group_cipher & WPA_CIPHER_CCMP) &&
365c1d255d3SCy Schubert !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) &&
366c1d255d3SCy Schubert !(ssid->pairwise_cipher & WPA_CIPHER_NONE)) {
367c1d255d3SCy Schubert /* Group cipher cannot be stronger than the pairwise cipher. */
368c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Removed CCMP from group cipher "
369c1d255d3SCy Schubert "list since it was not allowed for pairwise "
370c1d255d3SCy Schubert "cipher for network '" TSTR "'.", netw);
371c1d255d3SCy Schubert ssid->group_cipher &= ~WPA_CIPHER_CCMP;
372c1d255d3SCy Schubert }
373c1d255d3SCy Schubert
374c1d255d3SCy Schubert if (errors) {
375c1d255d3SCy Schubert wpa_config_free_ssid(ssid);
376c1d255d3SCy Schubert ssid = NULL;
377c1d255d3SCy Schubert }
378c1d255d3SCy Schubert
379c1d255d3SCy Schubert return ssid;
380c1d255d3SCy Schubert }
381c1d255d3SCy Schubert
382c1d255d3SCy Schubert
wpa_config_read_networks(struct wpa_config * config,HKEY hk)383c1d255d3SCy Schubert static int wpa_config_read_networks(struct wpa_config *config, HKEY hk)
384c1d255d3SCy Schubert {
385c1d255d3SCy Schubert HKEY nhk;
386c1d255d3SCy Schubert struct wpa_ssid *ssid, *tail = NULL, *head = NULL;
387c1d255d3SCy Schubert int errors = 0;
388c1d255d3SCy Schubert LONG ret;
389c1d255d3SCy Schubert DWORD i;
390c1d255d3SCy Schubert
391c1d255d3SCy Schubert ret = RegOpenKeyEx(hk, TEXT("networks"), 0, KEY_ENUMERATE_SUB_KEYS,
392c1d255d3SCy Schubert &nhk);
393c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
394c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Could not open wpa_supplicant networks "
395c1d255d3SCy Schubert "registry key");
396c1d255d3SCy Schubert return -1;
397c1d255d3SCy Schubert }
398c1d255d3SCy Schubert
399c1d255d3SCy Schubert for (i = 0; ; i++) {
400c1d255d3SCy Schubert TCHAR name[255];
401c1d255d3SCy Schubert DWORD namelen;
402c1d255d3SCy Schubert
403c1d255d3SCy Schubert namelen = 255;
404c1d255d3SCy Schubert ret = RegEnumKeyEx(nhk, i, name, &namelen, NULL, NULL, NULL,
405c1d255d3SCy Schubert NULL);
406c1d255d3SCy Schubert
407c1d255d3SCy Schubert if (ret == ERROR_NO_MORE_ITEMS)
408c1d255d3SCy Schubert break;
409c1d255d3SCy Schubert
410c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
411c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x",
412c1d255d3SCy Schubert (unsigned int) ret);
413c1d255d3SCy Schubert break;
414c1d255d3SCy Schubert }
415c1d255d3SCy Schubert
416c1d255d3SCy Schubert if (namelen >= 255)
417c1d255d3SCy Schubert namelen = 255 - 1;
418c1d255d3SCy Schubert name[namelen] = '\0';
419c1d255d3SCy Schubert
420c1d255d3SCy Schubert ssid = wpa_config_read_network(nhk, name, i);
421c1d255d3SCy Schubert if (ssid == NULL) {
422c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Failed to parse network "
423c1d255d3SCy Schubert "profile '%s'.", name);
424c1d255d3SCy Schubert errors++;
425c1d255d3SCy Schubert continue;
426c1d255d3SCy Schubert }
427c1d255d3SCy Schubert if (head == NULL) {
428c1d255d3SCy Schubert head = tail = ssid;
429c1d255d3SCy Schubert } else {
430c1d255d3SCy Schubert tail->next = ssid;
431c1d255d3SCy Schubert tail = ssid;
432c1d255d3SCy Schubert }
433c1d255d3SCy Schubert if (wpa_config_add_prio_network(config, ssid)) {
434c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Failed to add network profile "
435c1d255d3SCy Schubert "'%s' to priority list.", name);
436c1d255d3SCy Schubert errors++;
437c1d255d3SCy Schubert continue;
438c1d255d3SCy Schubert }
439c1d255d3SCy Schubert }
440c1d255d3SCy Schubert
441c1d255d3SCy Schubert RegCloseKey(nhk);
442c1d255d3SCy Schubert
443c1d255d3SCy Schubert config->ssid = head;
444c1d255d3SCy Schubert
445c1d255d3SCy Schubert return errors ? -1 : 0;
446c1d255d3SCy Schubert }
447c1d255d3SCy Schubert
448c1d255d3SCy Schubert
wpa_config_read(const char * name,struct wpa_config * cfgp,bool ro)449*a90b9d01SCy Schubert struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp,
450*a90b9d01SCy Schubert bool ro)
451c1d255d3SCy Schubert {
452c1d255d3SCy Schubert TCHAR buf[256];
453c1d255d3SCy Schubert int errors = 0;
454c1d255d3SCy Schubert struct wpa_config *config;
455c1d255d3SCy Schubert HKEY hk;
456c1d255d3SCy Schubert LONG ret;
457c1d255d3SCy Schubert
458c1d255d3SCy Schubert if (name == NULL)
459c1d255d3SCy Schubert return NULL;
460c1d255d3SCy Schubert if (cfgp)
461c1d255d3SCy Schubert config = cfgp;
462c1d255d3SCy Schubert else
463c1d255d3SCy Schubert config = wpa_config_alloc_empty(NULL, NULL);
464c1d255d3SCy Schubert if (config == NULL)
465c1d255d3SCy Schubert return NULL;
466c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Reading configuration profile '%s'", name);
467c1d255d3SCy Schubert
468c1d255d3SCy Schubert #ifdef UNICODE
469c1d255d3SCy Schubert _snwprintf(buf, 256, WPA_KEY_PREFIX TEXT("\\configs\\%S"), name);
470c1d255d3SCy Schubert #else /* UNICODE */
471c1d255d3SCy Schubert os_snprintf(buf, 256, WPA_KEY_PREFIX TEXT("\\configs\\%s"), name);
472c1d255d3SCy Schubert #endif /* UNICODE */
473c1d255d3SCy Schubert
474c1d255d3SCy Schubert ret = RegOpenKeyEx(WPA_KEY_ROOT, buf, 0, KEY_QUERY_VALUE, &hk);
475c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
476c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Could not open wpa_supplicant "
477c1d255d3SCy Schubert "configuration registry HKLM\\" TSTR, buf);
478c1d255d3SCy Schubert os_free(config);
479c1d255d3SCy Schubert return NULL;
480c1d255d3SCy Schubert }
481c1d255d3SCy Schubert
482c1d255d3SCy Schubert if (wpa_config_read_global(config, hk))
483c1d255d3SCy Schubert errors++;
484c1d255d3SCy Schubert
485c1d255d3SCy Schubert if (wpa_config_read_networks(config, hk))
486c1d255d3SCy Schubert errors++;
487c1d255d3SCy Schubert
488c1d255d3SCy Schubert if (wpa_config_read_blobs(config, hk))
489c1d255d3SCy Schubert errors++;
490c1d255d3SCy Schubert
491c1d255d3SCy Schubert wpa_config_debug_dump_networks(config);
492c1d255d3SCy Schubert
493c1d255d3SCy Schubert RegCloseKey(hk);
494c1d255d3SCy Schubert
495c1d255d3SCy Schubert if (errors) {
496c1d255d3SCy Schubert wpa_config_free(config);
497c1d255d3SCy Schubert config = NULL;
498c1d255d3SCy Schubert }
499c1d255d3SCy Schubert
500c1d255d3SCy Schubert return config;
501c1d255d3SCy Schubert }
502c1d255d3SCy Schubert
503c1d255d3SCy Schubert
wpa_config_write_reg_dword(HKEY hk,const TCHAR * name,int val,int def)504c1d255d3SCy Schubert static int wpa_config_write_reg_dword(HKEY hk, const TCHAR *name, int val,
505c1d255d3SCy Schubert int def)
506c1d255d3SCy Schubert {
507c1d255d3SCy Schubert LONG ret;
508c1d255d3SCy Schubert DWORD _val = val;
509c1d255d3SCy Schubert
510c1d255d3SCy Schubert if (val == def) {
511c1d255d3SCy Schubert RegDeleteValue(hk, name);
512c1d255d3SCy Schubert return 0;
513c1d255d3SCy Schubert }
514c1d255d3SCy Schubert
515c1d255d3SCy Schubert ret = RegSetValueEx(hk, name, 0, REG_DWORD, (LPBYTE) &_val,
516c1d255d3SCy Schubert sizeof(_val));
517c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
518c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "WINREG: Failed to set %s=%d: error %d",
519c1d255d3SCy Schubert name, val, (int) GetLastError());
520c1d255d3SCy Schubert return -1;
521c1d255d3SCy Schubert }
522c1d255d3SCy Schubert
523c1d255d3SCy Schubert return 0;
524c1d255d3SCy Schubert }
525c1d255d3SCy Schubert
526c1d255d3SCy Schubert
wpa_config_write_reg_string(HKEY hk,const char * name,const char * val)527c1d255d3SCy Schubert static int wpa_config_write_reg_string(HKEY hk, const char *name,
528c1d255d3SCy Schubert const char *val)
529c1d255d3SCy Schubert {
530c1d255d3SCy Schubert LONG ret;
531c1d255d3SCy Schubert TCHAR *_name, *_val;
532c1d255d3SCy Schubert
533c1d255d3SCy Schubert _name = wpa_strdup_tchar(name);
534c1d255d3SCy Schubert if (_name == NULL)
535c1d255d3SCy Schubert return -1;
536c1d255d3SCy Schubert
537c1d255d3SCy Schubert if (val == NULL) {
538c1d255d3SCy Schubert RegDeleteValue(hk, _name);
539c1d255d3SCy Schubert os_free(_name);
540c1d255d3SCy Schubert return 0;
541c1d255d3SCy Schubert }
542c1d255d3SCy Schubert
543c1d255d3SCy Schubert _val = wpa_strdup_tchar(val);
544c1d255d3SCy Schubert if (_val == NULL) {
545c1d255d3SCy Schubert os_free(_name);
546c1d255d3SCy Schubert return -1;
547c1d255d3SCy Schubert }
548c1d255d3SCy Schubert ret = RegSetValueEx(hk, _name, 0, REG_SZ, (BYTE *) _val,
549c1d255d3SCy Schubert (os_strlen(val) + 1) * sizeof(TCHAR));
550c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
551c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "WINREG: Failed to set %s='%s': "
552c1d255d3SCy Schubert "error %d", name, val, (int) GetLastError());
553c1d255d3SCy Schubert os_free(_name);
554c1d255d3SCy Schubert os_free(_val);
555c1d255d3SCy Schubert return -1;
556c1d255d3SCy Schubert }
557c1d255d3SCy Schubert
558c1d255d3SCy Schubert os_free(_name);
559c1d255d3SCy Schubert os_free(_val);
560c1d255d3SCy Schubert return 0;
561c1d255d3SCy Schubert }
562c1d255d3SCy Schubert
563c1d255d3SCy Schubert
wpa_config_write_global(struct wpa_config * config,HKEY hk)564c1d255d3SCy Schubert static int wpa_config_write_global(struct wpa_config *config, HKEY hk)
565c1d255d3SCy Schubert {
566c1d255d3SCy Schubert #ifdef CONFIG_CTRL_IFACE
567c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "ctrl_interface",
568c1d255d3SCy Schubert config->ctrl_interface);
569c1d255d3SCy Schubert #endif /* CONFIG_CTRL_IFACE */
570c1d255d3SCy Schubert
571c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("eapol_version"),
572c1d255d3SCy Schubert config->eapol_version,
573c1d255d3SCy Schubert DEFAULT_EAPOL_VERSION);
574c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("ap_scan"), config->ap_scan,
575c1d255d3SCy Schubert DEFAULT_AP_SCAN);
576c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("fast_reauth"),
577c1d255d3SCy Schubert config->fast_reauth, DEFAULT_FAST_REAUTH);
578c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("dot11RSNAConfigPMKLifetime"),
579c1d255d3SCy Schubert config->dot11RSNAConfigPMKLifetime, 0);
580c1d255d3SCy Schubert wpa_config_write_reg_dword(hk,
581c1d255d3SCy Schubert TEXT("dot11RSNAConfigPMKReauthThreshold"),
582c1d255d3SCy Schubert config->dot11RSNAConfigPMKReauthThreshold,
583c1d255d3SCy Schubert 0);
584c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("dot11RSNAConfigSATimeout"),
585c1d255d3SCy Schubert config->dot11RSNAConfigSATimeout, 0);
586c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("update_config"),
587c1d255d3SCy Schubert config->update_config,
588c1d255d3SCy Schubert 0);
589c1d255d3SCy Schubert #ifdef CONFIG_WPS
590c1d255d3SCy Schubert if (!is_nil_uuid(config->uuid)) {
591c1d255d3SCy Schubert char buf[40];
592c1d255d3SCy Schubert uuid_bin2str(config->uuid, buf, sizeof(buf));
593c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "uuid", buf);
594c1d255d3SCy Schubert }
595c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("auto_uuid"), config->auto_uuid,
596c1d255d3SCy Schubert 0);
597c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "device_name", config->device_name);
598c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "manufacturer", config->manufacturer);
599c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "model_name", config->model_name);
600c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "model_number", config->model_number);
601c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "serial_number",
602c1d255d3SCy Schubert config->serial_number);
603c1d255d3SCy Schubert {
604c1d255d3SCy Schubert char _buf[WPS_DEV_TYPE_BUFSIZE], *buf;
605c1d255d3SCy Schubert buf = wps_dev_type_bin2str(config->device_type,
606c1d255d3SCy Schubert _buf, sizeof(_buf));
607c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "device_type", buf);
608c1d255d3SCy Schubert }
609c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "config_methods",
610c1d255d3SCy Schubert config->config_methods);
611c1d255d3SCy Schubert if (WPA_GET_BE32(config->os_version)) {
612c1d255d3SCy Schubert char vbuf[10];
613c1d255d3SCy Schubert os_snprintf(vbuf, sizeof(vbuf), "%08x",
614c1d255d3SCy Schubert WPA_GET_BE32(config->os_version));
615c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "os_version", vbuf);
616c1d255d3SCy Schubert }
617c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("wps_cred_processing"),
618c1d255d3SCy Schubert config->wps_cred_processing, 0);
619c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("wps_cred_add_sae"),
620c1d255d3SCy Schubert config->wps_cred_add_sae, 0);
621c1d255d3SCy Schubert #endif /* CONFIG_WPS */
622c1d255d3SCy Schubert #ifdef CONFIG_P2P
623c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "p2p_ssid_postfix",
624c1d255d3SCy Schubert config->p2p_ssid_postfix);
625c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("p2p_group_idle"),
626c1d255d3SCy Schubert config->p2p_group_idle, 0);
627c1d255d3SCy Schubert #endif /* CONFIG_P2P */
628c1d255d3SCy Schubert
629c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("bss_max_count"),
630c1d255d3SCy Schubert config->bss_max_count,
631c1d255d3SCy Schubert DEFAULT_BSS_MAX_COUNT);
632c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("filter_ssids"),
633c1d255d3SCy Schubert config->filter_ssids, 0);
634c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("max_num_sta"),
635c1d255d3SCy Schubert config->max_num_sta, DEFAULT_MAX_NUM_STA);
636c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("ap_isolate"),
637c1d255d3SCy Schubert config->ap_isolate, DEFAULT_AP_ISOLATE);
638c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("disassoc_low_ack"),
639c1d255d3SCy Schubert config->disassoc_low_ack, 0);
640c1d255d3SCy Schubert
641c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("okc"), config->okc, 0);
642c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("pmf"), config->pmf, 0);
643c1d255d3SCy Schubert
644c1d255d3SCy Schubert wpa_config_write_reg_dword(hk, TEXT("external_sim"),
645c1d255d3SCy Schubert config->external_sim, 0);
646c1d255d3SCy Schubert
647c1d255d3SCy Schubert return 0;
648c1d255d3SCy Schubert }
649c1d255d3SCy Schubert
650c1d255d3SCy Schubert
wpa_config_delete_subkeys(HKEY hk,const TCHAR * key)651c1d255d3SCy Schubert static int wpa_config_delete_subkeys(HKEY hk, const TCHAR *key)
652c1d255d3SCy Schubert {
653c1d255d3SCy Schubert HKEY nhk;
654c1d255d3SCy Schubert int i, errors = 0;
655c1d255d3SCy Schubert LONG ret;
656c1d255d3SCy Schubert
657c1d255d3SCy Schubert ret = RegOpenKeyEx(hk, key, 0, KEY_ENUMERATE_SUB_KEYS | DELETE, &nhk);
658c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
659c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "WINREG: Could not open key '" TSTR
660c1d255d3SCy Schubert "' for subkey deletion: error 0x%x (%d)", key,
661c1d255d3SCy Schubert (unsigned int) ret, (int) GetLastError());
662c1d255d3SCy Schubert return 0;
663c1d255d3SCy Schubert }
664c1d255d3SCy Schubert
665c1d255d3SCy Schubert for (i = 0; ; i++) {
666c1d255d3SCy Schubert TCHAR name[255];
667c1d255d3SCy Schubert DWORD namelen;
668c1d255d3SCy Schubert
669c1d255d3SCy Schubert namelen = 255;
670c1d255d3SCy Schubert ret = RegEnumKeyEx(nhk, i, name, &namelen, NULL, NULL, NULL,
671c1d255d3SCy Schubert NULL);
672c1d255d3SCy Schubert
673c1d255d3SCy Schubert if (ret == ERROR_NO_MORE_ITEMS)
674c1d255d3SCy Schubert break;
675c1d255d3SCy Schubert
676c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
677c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x (%d)",
678c1d255d3SCy Schubert (unsigned int) ret, (int) GetLastError());
679c1d255d3SCy Schubert break;
680c1d255d3SCy Schubert }
681c1d255d3SCy Schubert
682c1d255d3SCy Schubert if (namelen >= 255)
683c1d255d3SCy Schubert namelen = 255 - 1;
684c1d255d3SCy Schubert name[namelen] = TEXT('\0');
685c1d255d3SCy Schubert
686c1d255d3SCy Schubert ret = RegDeleteKey(nhk, name);
687c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
688c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "RegDeleteKey failed: 0x%x (%d)",
689c1d255d3SCy Schubert (unsigned int) ret, (int) GetLastError());
690c1d255d3SCy Schubert errors++;
691c1d255d3SCy Schubert }
692c1d255d3SCy Schubert }
693c1d255d3SCy Schubert
694c1d255d3SCy Schubert RegCloseKey(nhk);
695c1d255d3SCy Schubert
696c1d255d3SCy Schubert return errors ? -1 : 0;
697c1d255d3SCy Schubert }
698c1d255d3SCy Schubert
699c1d255d3SCy Schubert
write_str(HKEY hk,const char * field,struct wpa_ssid * ssid)700c1d255d3SCy Schubert static void write_str(HKEY hk, const char *field, struct wpa_ssid *ssid)
701c1d255d3SCy Schubert {
702c1d255d3SCy Schubert char *value = wpa_config_get(ssid, field);
703c1d255d3SCy Schubert if (value == NULL)
704c1d255d3SCy Schubert return;
705c1d255d3SCy Schubert wpa_config_write_reg_string(hk, field, value);
706c1d255d3SCy Schubert os_free(value);
707c1d255d3SCy Schubert }
708c1d255d3SCy Schubert
709c1d255d3SCy Schubert
write_int(HKEY hk,const char * field,int value,int def)710c1d255d3SCy Schubert static void write_int(HKEY hk, const char *field, int value, int def)
711c1d255d3SCy Schubert {
712c1d255d3SCy Schubert char val[20];
713c1d255d3SCy Schubert if (value == def)
714c1d255d3SCy Schubert return;
715c1d255d3SCy Schubert os_snprintf(val, sizeof(val), "%d", value);
716c1d255d3SCy Schubert wpa_config_write_reg_string(hk, field, val);
717c1d255d3SCy Schubert }
718c1d255d3SCy Schubert
719c1d255d3SCy Schubert
write_bssid(HKEY hk,struct wpa_ssid * ssid)720c1d255d3SCy Schubert static void write_bssid(HKEY hk, struct wpa_ssid *ssid)
721c1d255d3SCy Schubert {
722c1d255d3SCy Schubert char *value = wpa_config_get(ssid, "bssid");
723c1d255d3SCy Schubert if (value == NULL)
724c1d255d3SCy Schubert return;
725c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "bssid", value);
726c1d255d3SCy Schubert os_free(value);
727c1d255d3SCy Schubert }
728c1d255d3SCy Schubert
729c1d255d3SCy Schubert
write_psk(HKEY hk,struct wpa_ssid * ssid)730c1d255d3SCy Schubert static void write_psk(HKEY hk, struct wpa_ssid *ssid)
731c1d255d3SCy Schubert {
732c1d255d3SCy Schubert char *value = wpa_config_get(ssid, "psk");
733c1d255d3SCy Schubert if (value == NULL)
734c1d255d3SCy Schubert return;
735c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "psk", value);
736c1d255d3SCy Schubert os_free(value);
737c1d255d3SCy Schubert }
738c1d255d3SCy Schubert
739c1d255d3SCy Schubert
write_proto(HKEY hk,struct wpa_ssid * ssid)740c1d255d3SCy Schubert static void write_proto(HKEY hk, struct wpa_ssid *ssid)
741c1d255d3SCy Schubert {
742c1d255d3SCy Schubert char *value;
743c1d255d3SCy Schubert
744c1d255d3SCy Schubert if (ssid->proto == DEFAULT_PROTO)
745c1d255d3SCy Schubert return;
746c1d255d3SCy Schubert
747c1d255d3SCy Schubert value = wpa_config_get(ssid, "proto");
748c1d255d3SCy Schubert if (value == NULL)
749c1d255d3SCy Schubert return;
750c1d255d3SCy Schubert if (value[0])
751c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "proto", value);
752c1d255d3SCy Schubert os_free(value);
753c1d255d3SCy Schubert }
754c1d255d3SCy Schubert
755c1d255d3SCy Schubert
write_key_mgmt(HKEY hk,struct wpa_ssid * ssid)756c1d255d3SCy Schubert static void write_key_mgmt(HKEY hk, struct wpa_ssid *ssid)
757c1d255d3SCy Schubert {
758c1d255d3SCy Schubert char *value;
759c1d255d3SCy Schubert
760c1d255d3SCy Schubert if (ssid->key_mgmt == DEFAULT_KEY_MGMT)
761c1d255d3SCy Schubert return;
762c1d255d3SCy Schubert
763c1d255d3SCy Schubert value = wpa_config_get(ssid, "key_mgmt");
764c1d255d3SCy Schubert if (value == NULL)
765c1d255d3SCy Schubert return;
766c1d255d3SCy Schubert if (value[0])
767c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "key_mgmt", value);
768c1d255d3SCy Schubert os_free(value);
769c1d255d3SCy Schubert }
770c1d255d3SCy Schubert
771c1d255d3SCy Schubert
write_pairwise(HKEY hk,struct wpa_ssid * ssid)772c1d255d3SCy Schubert static void write_pairwise(HKEY hk, struct wpa_ssid *ssid)
773c1d255d3SCy Schubert {
774c1d255d3SCy Schubert char *value;
775c1d255d3SCy Schubert
776c1d255d3SCy Schubert if (ssid->pairwise_cipher == DEFAULT_PAIRWISE)
777c1d255d3SCy Schubert return;
778c1d255d3SCy Schubert
779c1d255d3SCy Schubert value = wpa_config_get(ssid, "pairwise");
780c1d255d3SCy Schubert if (value == NULL)
781c1d255d3SCy Schubert return;
782c1d255d3SCy Schubert if (value[0])
783c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "pairwise", value);
784c1d255d3SCy Schubert os_free(value);
785c1d255d3SCy Schubert }
786c1d255d3SCy Schubert
787c1d255d3SCy Schubert
write_group(HKEY hk,struct wpa_ssid * ssid)788c1d255d3SCy Schubert static void write_group(HKEY hk, struct wpa_ssid *ssid)
789c1d255d3SCy Schubert {
790c1d255d3SCy Schubert char *value;
791c1d255d3SCy Schubert
792c1d255d3SCy Schubert if (ssid->group_cipher == DEFAULT_GROUP)
793c1d255d3SCy Schubert return;
794c1d255d3SCy Schubert
795c1d255d3SCy Schubert value = wpa_config_get(ssid, "group");
796c1d255d3SCy Schubert if (value == NULL)
797c1d255d3SCy Schubert return;
798c1d255d3SCy Schubert if (value[0])
799c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "group", value);
800c1d255d3SCy Schubert os_free(value);
801c1d255d3SCy Schubert }
802c1d255d3SCy Schubert
803c1d255d3SCy Schubert
write_auth_alg(HKEY hk,struct wpa_ssid * ssid)804c1d255d3SCy Schubert static void write_auth_alg(HKEY hk, struct wpa_ssid *ssid)
805c1d255d3SCy Schubert {
806c1d255d3SCy Schubert char *value;
807c1d255d3SCy Schubert
808c1d255d3SCy Schubert if (ssid->auth_alg == 0)
809c1d255d3SCy Schubert return;
810c1d255d3SCy Schubert
811c1d255d3SCy Schubert value = wpa_config_get(ssid, "auth_alg");
812c1d255d3SCy Schubert if (value == NULL)
813c1d255d3SCy Schubert return;
814c1d255d3SCy Schubert if (value[0])
815c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "auth_alg", value);
816c1d255d3SCy Schubert os_free(value);
817c1d255d3SCy Schubert }
818c1d255d3SCy Schubert
819c1d255d3SCy Schubert
820c1d255d3SCy Schubert #ifdef IEEE8021X_EAPOL
write_eap(HKEY hk,struct wpa_ssid * ssid)821c1d255d3SCy Schubert static void write_eap(HKEY hk, struct wpa_ssid *ssid)
822c1d255d3SCy Schubert {
823c1d255d3SCy Schubert char *value;
824c1d255d3SCy Schubert
825c1d255d3SCy Schubert value = wpa_config_get(ssid, "eap");
826c1d255d3SCy Schubert if (value == NULL)
827c1d255d3SCy Schubert return;
828c1d255d3SCy Schubert
829c1d255d3SCy Schubert if (value[0])
830c1d255d3SCy Schubert wpa_config_write_reg_string(hk, "eap", value);
831c1d255d3SCy Schubert os_free(value);
832c1d255d3SCy Schubert }
833c1d255d3SCy Schubert #endif /* IEEE8021X_EAPOL */
834c1d255d3SCy Schubert
835c1d255d3SCy Schubert
836c1d255d3SCy Schubert #ifdef CONFIG_WEP
write_wep_key(HKEY hk,int idx,struct wpa_ssid * ssid)837c1d255d3SCy Schubert static void write_wep_key(HKEY hk, int idx, struct wpa_ssid *ssid)
838c1d255d3SCy Schubert {
839c1d255d3SCy Schubert char field[20], *value;
840c1d255d3SCy Schubert
841c1d255d3SCy Schubert os_snprintf(field, sizeof(field), "wep_key%d", idx);
842c1d255d3SCy Schubert value = wpa_config_get(ssid, field);
843c1d255d3SCy Schubert if (value) {
844c1d255d3SCy Schubert wpa_config_write_reg_string(hk, field, value);
845c1d255d3SCy Schubert os_free(value);
846c1d255d3SCy Schubert }
847c1d255d3SCy Schubert }
848c1d255d3SCy Schubert #endif /* CONFIG_WEP */
849c1d255d3SCy Schubert
850c1d255d3SCy Schubert
wpa_config_write_network(HKEY hk,struct wpa_ssid * ssid,int id)851c1d255d3SCy Schubert static int wpa_config_write_network(HKEY hk, struct wpa_ssid *ssid, int id)
852c1d255d3SCy Schubert {
853c1d255d3SCy Schubert int errors = 0;
854c1d255d3SCy Schubert HKEY nhk, netw;
855c1d255d3SCy Schubert LONG ret;
856c1d255d3SCy Schubert TCHAR name[5];
857c1d255d3SCy Schubert
858c1d255d3SCy Schubert ret = RegOpenKeyEx(hk, TEXT("networks"), 0, KEY_CREATE_SUB_KEY, &nhk);
859c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
860c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "WINREG: Could not open networks key "
861c1d255d3SCy Schubert "for subkey addition: error 0x%x (%d)",
862c1d255d3SCy Schubert (unsigned int) ret, (int) GetLastError());
863c1d255d3SCy Schubert return 0;
864c1d255d3SCy Schubert }
865c1d255d3SCy Schubert
866c1d255d3SCy Schubert #ifdef UNICODE
867c1d255d3SCy Schubert wsprintf(name, L"%04d", id);
868c1d255d3SCy Schubert #else /* UNICODE */
869c1d255d3SCy Schubert os_snprintf(name, sizeof(name), "%04d", id);
870c1d255d3SCy Schubert #endif /* UNICODE */
871c1d255d3SCy Schubert ret = RegCreateKeyEx(nhk, name, 0, NULL, 0, KEY_WRITE, NULL, &netw,
872c1d255d3SCy Schubert NULL);
873c1d255d3SCy Schubert RegCloseKey(nhk);
874c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
875c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "WINREG: Could not add network key '%s':"
876c1d255d3SCy Schubert " error 0x%x (%d)",
877c1d255d3SCy Schubert name, (unsigned int) ret, (int) GetLastError());
878c1d255d3SCy Schubert return -1;
879c1d255d3SCy Schubert }
880c1d255d3SCy Schubert
881c1d255d3SCy Schubert #define STR(t) write_str(netw, #t, ssid)
882c1d255d3SCy Schubert #define INT(t) write_int(netw, #t, ssid->t, 0)
883c1d255d3SCy Schubert #define INTe(t, m) write_int(netw, #t, ssid->eap.m, 0)
884c1d255d3SCy Schubert #define INT_DEF(t, def) write_int(netw, #t, ssid->t, def)
885c1d255d3SCy Schubert #define INT_DEFe(t, m, def) write_int(netw, #t, ssid->eap.m, def)
886c1d255d3SCy Schubert
887c1d255d3SCy Schubert STR(ssid);
888c1d255d3SCy Schubert INT(scan_ssid);
889c1d255d3SCy Schubert write_bssid(netw, ssid);
890c1d255d3SCy Schubert write_psk(netw, ssid);
891c1d255d3SCy Schubert STR(sae_password);
892c1d255d3SCy Schubert STR(sae_password_id);
893c1d255d3SCy Schubert write_proto(netw, ssid);
894c1d255d3SCy Schubert write_key_mgmt(netw, ssid);
895c1d255d3SCy Schubert write_pairwise(netw, ssid);
896c1d255d3SCy Schubert write_group(netw, ssid);
897c1d255d3SCy Schubert write_auth_alg(netw, ssid);
898c1d255d3SCy Schubert #ifdef IEEE8021X_EAPOL
899c1d255d3SCy Schubert write_eap(netw, ssid);
900c1d255d3SCy Schubert STR(identity);
901c1d255d3SCy Schubert STR(anonymous_identity);
902c1d255d3SCy Schubert STR(imsi_identity);
903c1d255d3SCy Schubert STR(password);
904c1d255d3SCy Schubert STR(ca_cert);
905c1d255d3SCy Schubert STR(ca_path);
906c1d255d3SCy Schubert STR(client_cert);
907c1d255d3SCy Schubert STR(private_key);
908c1d255d3SCy Schubert STR(private_key_passwd);
909c1d255d3SCy Schubert STR(subject_match);
910c1d255d3SCy Schubert STR(check_cert_subject);
911c1d255d3SCy Schubert STR(altsubject_match);
912c1d255d3SCy Schubert STR(ca_cert2);
913c1d255d3SCy Schubert STR(ca_path2);
914c1d255d3SCy Schubert STR(client_cert2);
915c1d255d3SCy Schubert STR(private_key2);
916c1d255d3SCy Schubert STR(private_key2_passwd);
917c1d255d3SCy Schubert STR(subject_match2);
918c1d255d3SCy Schubert STR(check_cert_subject2);
919c1d255d3SCy Schubert STR(altsubject_match2);
920c1d255d3SCy Schubert STR(phase1);
921c1d255d3SCy Schubert STR(phase2);
922c1d255d3SCy Schubert STR(pcsc);
923c1d255d3SCy Schubert STR(pin);
924c1d255d3SCy Schubert STR(engine_id);
925c1d255d3SCy Schubert STR(key_id);
926c1d255d3SCy Schubert STR(cert_id);
927c1d255d3SCy Schubert STR(ca_cert_id);
928c1d255d3SCy Schubert STR(key2_id);
929c1d255d3SCy Schubert STR(pin2);
930c1d255d3SCy Schubert STR(engine2_id);
931c1d255d3SCy Schubert STR(cert2_id);
932c1d255d3SCy Schubert STR(ca_cert2_id);
933c1d255d3SCy Schubert INTe(engine, cert.engine);
934c1d255d3SCy Schubert INTe(engine2, phase2_cert.engine);
935c1d255d3SCy Schubert INT_DEF(eapol_flags, DEFAULT_EAPOL_FLAGS);
936c1d255d3SCy Schubert #endif /* IEEE8021X_EAPOL */
937c1d255d3SCy Schubert #ifdef CONFIG_WEP
938c1d255d3SCy Schubert {
939c1d255d3SCy Schubert int i;
940c1d255d3SCy Schubert
941c1d255d3SCy Schubert for (i = 0; i < 4; i++)
942c1d255d3SCy Schubert write_wep_key(netw, i, ssid);
943c1d255d3SCy Schubert INT(wep_tx_keyidx);
944c1d255d3SCy Schubert }
945c1d255d3SCy Schubert #endif /* CONFIG_WEP */
946c1d255d3SCy Schubert INT(priority);
947c1d255d3SCy Schubert #ifdef IEEE8021X_EAPOL
948c1d255d3SCy Schubert INT_DEF(eap_workaround, DEFAULT_EAP_WORKAROUND);
949c1d255d3SCy Schubert STR(pac_file);
950c1d255d3SCy Schubert INT_DEFe(fragment_size, fragment_size, DEFAULT_FRAGMENT_SIZE);
951c1d255d3SCy Schubert #endif /* IEEE8021X_EAPOL */
952c1d255d3SCy Schubert INT(mode);
953c1d255d3SCy Schubert write_int(netw, "proactive_key_caching", ssid->proactive_key_caching,
954c1d255d3SCy Schubert -1);
955c1d255d3SCy Schubert INT(disabled);
956c1d255d3SCy Schubert write_int(netw, "ieee80211w", ssid->ieee80211w,
957c1d255d3SCy Schubert MGMT_FRAME_PROTECTION_DEFAULT);
958c1d255d3SCy Schubert STR(id_str);
959c1d255d3SCy Schubert #ifdef CONFIG_HS20
960c1d255d3SCy Schubert INT(update_identifier);
961c1d255d3SCy Schubert #endif /* CONFIG_HS20 */
962c1d255d3SCy Schubert INT(group_rekey);
963c1d255d3SCy Schubert INT(ft_eap_pmksa_caching);
964c1d255d3SCy Schubert
965c1d255d3SCy Schubert #undef STR
966c1d255d3SCy Schubert #undef INT
967c1d255d3SCy Schubert #undef INT_DEF
968c1d255d3SCy Schubert
969c1d255d3SCy Schubert RegCloseKey(netw);
970c1d255d3SCy Schubert
971c1d255d3SCy Schubert return errors ? -1 : 0;
972c1d255d3SCy Schubert }
973c1d255d3SCy Schubert
974c1d255d3SCy Schubert
wpa_config_write_blob(HKEY hk,struct wpa_config_blob * blob)975c1d255d3SCy Schubert static int wpa_config_write_blob(HKEY hk, struct wpa_config_blob *blob)
976c1d255d3SCy Schubert {
977c1d255d3SCy Schubert HKEY bhk;
978c1d255d3SCy Schubert LONG ret;
979c1d255d3SCy Schubert TCHAR *name;
980c1d255d3SCy Schubert
981c1d255d3SCy Schubert ret = RegCreateKeyEx(hk, TEXT("blobs"), 0, NULL, 0, KEY_WRITE, NULL,
982c1d255d3SCy Schubert &bhk, NULL);
983c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
984c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "WINREG: Could not add blobs key: "
985c1d255d3SCy Schubert "error 0x%x (%d)",
986c1d255d3SCy Schubert (unsigned int) ret, (int) GetLastError());
987c1d255d3SCy Schubert return -1;
988c1d255d3SCy Schubert }
989c1d255d3SCy Schubert
990c1d255d3SCy Schubert name = wpa_strdup_tchar(blob->name);
991c1d255d3SCy Schubert ret = RegSetValueEx(bhk, name, 0, REG_BINARY, blob->data,
992c1d255d3SCy Schubert blob->len);
993c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
994c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "WINREG: Failed to set blob %s': "
995c1d255d3SCy Schubert "error 0x%x (%d)", blob->name, (unsigned int) ret,
996c1d255d3SCy Schubert (int) GetLastError());
997c1d255d3SCy Schubert RegCloseKey(bhk);
998c1d255d3SCy Schubert os_free(name);
999c1d255d3SCy Schubert return -1;
1000c1d255d3SCy Schubert }
1001c1d255d3SCy Schubert os_free(name);
1002c1d255d3SCy Schubert
1003c1d255d3SCy Schubert RegCloseKey(bhk);
1004c1d255d3SCy Schubert
1005c1d255d3SCy Schubert return 0;
1006c1d255d3SCy Schubert }
1007c1d255d3SCy Schubert
1008c1d255d3SCy Schubert
wpa_config_write(const char * name,struct wpa_config * config)1009c1d255d3SCy Schubert int wpa_config_write(const char *name, struct wpa_config *config)
1010c1d255d3SCy Schubert {
1011c1d255d3SCy Schubert TCHAR buf[256];
1012c1d255d3SCy Schubert HKEY hk;
1013c1d255d3SCy Schubert LONG ret;
1014c1d255d3SCy Schubert int errors = 0;
1015c1d255d3SCy Schubert struct wpa_ssid *ssid;
1016c1d255d3SCy Schubert struct wpa_config_blob *blob;
1017c1d255d3SCy Schubert int id;
1018c1d255d3SCy Schubert
1019c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
1020c1d255d3SCy Schubert
1021c1d255d3SCy Schubert #ifdef UNICODE
1022c1d255d3SCy Schubert _snwprintf(buf, 256, WPA_KEY_PREFIX TEXT("\\configs\\%S"), name);
1023c1d255d3SCy Schubert #else /* UNICODE */
1024c1d255d3SCy Schubert os_snprintf(buf, 256, WPA_KEY_PREFIX TEXT("\\configs\\%s"), name);
1025c1d255d3SCy Schubert #endif /* UNICODE */
1026c1d255d3SCy Schubert
1027c1d255d3SCy Schubert ret = RegOpenKeyEx(WPA_KEY_ROOT, buf, 0, KEY_SET_VALUE | DELETE, &hk);
1028c1d255d3SCy Schubert if (ret != ERROR_SUCCESS) {
1029c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Could not open wpa_supplicant "
1030c1d255d3SCy Schubert "configuration registry %s: error %d", buf,
1031c1d255d3SCy Schubert (int) GetLastError());
1032c1d255d3SCy Schubert return -1;
1033c1d255d3SCy Schubert }
1034c1d255d3SCy Schubert
1035c1d255d3SCy Schubert if (wpa_config_write_global(config, hk)) {
1036c1d255d3SCy Schubert wpa_printf(MSG_ERROR, "Failed to write global configuration "
1037c1d255d3SCy Schubert "data");
1038c1d255d3SCy Schubert errors++;
1039c1d255d3SCy Schubert }
1040c1d255d3SCy Schubert
1041c1d255d3SCy Schubert wpa_config_delete_subkeys(hk, TEXT("networks"));
1042c1d255d3SCy Schubert for (ssid = config->ssid, id = 0; ssid; ssid = ssid->next, id++) {
1043c1d255d3SCy Schubert if (ssid->key_mgmt == WPA_KEY_MGMT_WPS)
1044c1d255d3SCy Schubert continue; /* do not save temporary WPS networks */
1045c1d255d3SCy Schubert if (wpa_config_write_network(hk, ssid, id))
1046c1d255d3SCy Schubert errors++;
1047c1d255d3SCy Schubert }
1048c1d255d3SCy Schubert
1049c1d255d3SCy Schubert RegDeleteKey(hk, TEXT("blobs"));
1050c1d255d3SCy Schubert for (blob = config->blobs; blob; blob = blob->next) {
1051c1d255d3SCy Schubert if (wpa_config_write_blob(hk, blob))
1052c1d255d3SCy Schubert errors++;
1053c1d255d3SCy Schubert }
1054c1d255d3SCy Schubert
1055c1d255d3SCy Schubert RegCloseKey(hk);
1056c1d255d3SCy Schubert
1057c1d255d3SCy Schubert wpa_printf(MSG_DEBUG, "Configuration '%s' written %ssuccessfully",
1058c1d255d3SCy Schubert name, errors ? "un" : "");
1059c1d255d3SCy Schubert return errors ? -1 : 0;
1060c1d255d3SCy Schubert }
1061