oma_dm_client.c 35 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370
  1. /*
  2. * Hotspot 2.0 - OMA DM client
  3. * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "wpa_helpers.h"
  11. #include "xml-utils.h"
  12. #include "http-utils.h"
  13. #include "utils/browser.h"
  14. #include "osu_client.h"
  15. #define DM_SERVER_INITIATED_MGMT 1200
  16. #define DM_CLIENT_INITIATED_MGMT 1201
  17. #define DM_GENERIC_ALERT 1226
  18. /* OMA-TS-SyncML-RepPro-V1_2_2 - 10. Response Status Codes */
  19. #define DM_RESP_OK 200
  20. #define DM_RESP_AUTH_ACCEPTED 212
  21. #define DM_RESP_CHUNKED_ITEM_ACCEPTED 213
  22. #define DM_RESP_NOT_EXECUTED 215
  23. #define DM_RESP_ATOMIC_ROLL_BACK_OK 216
  24. #define DM_RESP_NOT_MODIFIED 304
  25. #define DM_RESP_BAD_REQUEST 400
  26. #define DM_RESP_UNAUTHORIZED 401
  27. #define DM_RESP_FORBIDDEN 403
  28. #define DM_RESP_NOT_FOUND 404
  29. #define DM_RESP_COMMAND_NOT_ALLOWED 405
  30. #define DM_RESP_OPTIONAL_FEATURE_NOT_SUPPORTED 406
  31. #define DM_RESP_MISSING_CREDENTIALS 407
  32. #define DM_RESP_CONFLICT 409
  33. #define DM_RESP_GONE 410
  34. #define DM_RESP_INCOMPLETE_COMMAND 412
  35. #define DM_RESP_REQ_ENTITY_TOO_LARGE 413
  36. #define DM_RESP_URI_TOO_LONG 414
  37. #define DM_RESP_UNSUPPORTED_MEDIA_TYPE_OR_FORMAT 415
  38. #define DM_RESP_REQ_TOO_BIG 416
  39. #define DM_RESP_ALREADY_EXISTS 418
  40. #define DM_RESP_DEVICE_FULL 420
  41. #define DM_RESP_SIZE_MISMATCH 424
  42. #define DM_RESP_PERMISSION_DENIED 425
  43. #define DM_RESP_COMMAND_FAILED 500
  44. #define DM_RESP_COMMAND_NOT_IMPLEMENTED 501
  45. #define DM_RESP_ATOMIC_ROLL_BACK_FAILED 516
  46. #define DM_HS20_SUBSCRIPTION_CREATION \
  47. "org.wi-fi.hotspot2dot0.SubscriptionCreation"
  48. #define DM_HS20_SUBSCRIPTION_PROVISIONING \
  49. "org.wi-fi.hotspot2dot0.SubscriptionProvisioning"
  50. #define DM_HS20_SUBSCRIPTION_REMEDIATION \
  51. "org.wi-fi.hotspot2dot0.SubscriptionRemediation"
  52. #define DM_HS20_POLICY_UPDATE \
  53. "org.wi-fi.hotspot2dot0.PolicyUpdate"
  54. #define DM_URI_PPS "./Wi-Fi/org.wi-fi/PerProviderSubscription"
  55. #define DM_URI_LAUNCH_BROWSER \
  56. "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/launchBrowserToURI"
  57. static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
  58. const char *locuri, const char *data);
  59. static const char * int2str(int val)
  60. {
  61. static char buf[20];
  62. snprintf(buf, sizeof(buf), "%d", val);
  63. return buf;
  64. }
  65. static char * oma_dm_get_target_locuri(struct hs20_osu_client *ctx,
  66. xml_node_t *node)
  67. {
  68. xml_node_t *locuri;
  69. char *uri, *ret = NULL;
  70. locuri = get_node(ctx->xml, node, "Item/Target/LocURI");
  71. if (locuri == NULL)
  72. return NULL;
  73. uri = xml_node_get_text(ctx->xml, locuri);
  74. if (uri)
  75. ret = os_strdup(uri);
  76. xml_node_get_text_free(ctx->xml, uri);
  77. return ret;
  78. }
  79. static void oma_dm_add_locuri(struct hs20_osu_client *ctx, xml_node_t *parent,
  80. const char *element, const char *uri)
  81. {
  82. xml_node_t *node;
  83. node = xml_node_create(ctx->xml, parent, NULL, element);
  84. if (node == NULL)
  85. return;
  86. xml_node_create_text(ctx->xml, node, NULL, "LocURI", uri);
  87. }
  88. static xml_node_t * oma_dm_build_hdr(struct hs20_osu_client *ctx,
  89. const char *url, int msgid)
  90. {
  91. xml_node_t *syncml, *synchdr;
  92. xml_namespace_t *ns;
  93. syncml = xml_node_create_root(ctx->xml, "SYNCML:SYNCML1.2", NULL, &ns,
  94. "SyncML");
  95. synchdr = xml_node_create(ctx->xml, syncml, NULL, "SyncHdr");
  96. xml_node_create_text(ctx->xml, synchdr, NULL, "VerDTD", "1.2");
  97. xml_node_create_text(ctx->xml, synchdr, NULL, "VerProto", "DM/1.2");
  98. xml_node_create_text(ctx->xml, synchdr, NULL, "SessionID", "1");
  99. xml_node_create_text(ctx->xml, synchdr, NULL, "MsgID", int2str(msgid));
  100. oma_dm_add_locuri(ctx, synchdr, "Target", url);
  101. oma_dm_add_locuri(ctx, synchdr, "Source", ctx->devid);
  102. return syncml;
  103. }
  104. static void oma_dm_add_cmdid(struct hs20_osu_client *ctx, xml_node_t *parent,
  105. int cmdid)
  106. {
  107. xml_node_create_text(ctx->xml, parent, NULL, "CmdID", int2str(cmdid));
  108. }
  109. static xml_node_t * add_alert(struct hs20_osu_client *ctx, xml_node_t *parent,
  110. int cmdid, int data)
  111. {
  112. xml_node_t *node;
  113. node = xml_node_create(ctx->xml, parent, NULL, "Alert");
  114. if (node == NULL)
  115. return NULL;
  116. oma_dm_add_cmdid(ctx, node, cmdid);
  117. xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
  118. return node;
  119. }
  120. static xml_node_t * add_status(struct hs20_osu_client *ctx, xml_node_t *parent,
  121. int msgref, int cmdref, int cmdid,
  122. const char *cmd, int data, const char *targetref)
  123. {
  124. xml_node_t *node;
  125. node = xml_node_create(ctx->xml, parent, NULL, "Status");
  126. if (node == NULL)
  127. return NULL;
  128. oma_dm_add_cmdid(ctx, node, cmdid);
  129. xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
  130. if (cmdref)
  131. xml_node_create_text(ctx->xml, node, NULL, "CmdRef",
  132. int2str(cmdref));
  133. xml_node_create_text(ctx->xml, node, NULL, "Cmd", cmd);
  134. xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
  135. if (targetref) {
  136. xml_node_create_text(ctx->xml, node, NULL, "TargetRef",
  137. targetref);
  138. }
  139. return node;
  140. }
  141. static xml_node_t * add_results(struct hs20_osu_client *ctx, xml_node_t *parent,
  142. int msgref, int cmdref, int cmdid,
  143. const char *locuri, const char *data)
  144. {
  145. xml_node_t *node;
  146. node = xml_node_create(ctx->xml, parent, NULL, "Results");
  147. if (node == NULL)
  148. return NULL;
  149. oma_dm_add_cmdid(ctx, node, cmdid);
  150. xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
  151. xml_node_create_text(ctx->xml, node, NULL, "CmdRef", int2str(cmdref));
  152. add_item(ctx, node, locuri, data);
  153. return node;
  154. }
  155. static char * mo_str(struct hs20_osu_client *ctx, const char *urn,
  156. const char *fname)
  157. {
  158. xml_node_t *fnode, *tnds;
  159. char *str;
  160. fnode = node_from_file(ctx->xml, fname);
  161. if (!fnode)
  162. return NULL;
  163. tnds = mo_to_tnds(ctx->xml, fnode, 0, urn, "syncml:dmddf1.2");
  164. xml_node_free(ctx->xml, fnode);
  165. if (!tnds)
  166. return NULL;
  167. str = xml_node_to_str(ctx->xml, tnds);
  168. xml_node_free(ctx->xml, tnds);
  169. if (str == NULL)
  170. return NULL;
  171. wpa_printf(MSG_INFO, "MgmtTree: %s", str);
  172. return str;
  173. }
  174. static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
  175. const char *locuri, const char *data)
  176. {
  177. xml_node_t *item, *node;
  178. item = xml_node_create(ctx->xml, parent, NULL, "Item");
  179. oma_dm_add_locuri(ctx, item, "Source", locuri);
  180. node = xml_node_create(ctx->xml, item, NULL, "Meta");
  181. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
  182. "Chr");
  183. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type",
  184. "text/plain");
  185. xml_node_create_text(ctx->xml, item, NULL, "Data", data);
  186. }
  187. static void add_replace_devinfo(struct hs20_osu_client *ctx, xml_node_t *parent,
  188. int cmdid)
  189. {
  190. xml_node_t *info, *child, *replace;
  191. const char *name;
  192. char locuri[200], *txt;
  193. info = node_from_file(ctx->xml, "devinfo.xml");
  194. if (info == NULL) {
  195. wpa_printf(MSG_INFO, "Could not read devinfo.xml");
  196. return;
  197. }
  198. replace = xml_node_create(ctx->xml, parent, NULL, "Replace");
  199. if (replace == NULL) {
  200. xml_node_free(ctx->xml, info);
  201. return;
  202. }
  203. oma_dm_add_cmdid(ctx, replace, cmdid);
  204. xml_node_for_each_child(ctx->xml, child, info) {
  205. xml_node_for_each_check(ctx->xml, child);
  206. name = xml_node_get_localname(ctx->xml, child);
  207. os_snprintf(locuri, sizeof(locuri), "./DevInfo/%s", name);
  208. txt = xml_node_get_text(ctx->xml, child);
  209. if (txt) {
  210. add_item(ctx, replace, locuri, txt);
  211. xml_node_get_text_free(ctx->xml, txt);
  212. }
  213. }
  214. xml_node_free(ctx->xml, info);
  215. }
  216. static void oma_dm_add_hs20_generic_alert(struct hs20_osu_client *ctx,
  217. xml_node_t *syncbody,
  218. int cmdid, const char *oper,
  219. const char *data)
  220. {
  221. xml_node_t *node, *item;
  222. char buf[200];
  223. node = add_alert(ctx, syncbody, cmdid, DM_GENERIC_ALERT);
  224. item = xml_node_create(ctx->xml, node, NULL, "Item");
  225. oma_dm_add_locuri(ctx, item, "Source", DM_URI_PPS);
  226. node = xml_node_create(ctx->xml, item, NULL, "Meta");
  227. snprintf(buf, sizeof(buf), "Reversed-Domain-Name: %s", oper);
  228. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type", buf);
  229. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
  230. "xml");
  231. xml_node_create_text(ctx->xml, item, NULL, "Data", data);
  232. }
  233. static xml_node_t * build_oma_dm_1(struct hs20_osu_client *ctx,
  234. const char *url, int msgid, const char *oper)
  235. {
  236. xml_node_t *syncml, *syncbody;
  237. char *str;
  238. int cmdid = 0;
  239. syncml = oma_dm_build_hdr(ctx, url, msgid);
  240. if (syncml == NULL)
  241. return NULL;
  242. syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
  243. if (syncbody == NULL) {
  244. xml_node_free(ctx->xml, syncml);
  245. return NULL;
  246. }
  247. cmdid++;
  248. add_alert(ctx, syncbody, cmdid, DM_CLIENT_INITIATED_MGMT);
  249. str = mo_str(ctx, NULL, "devdetail.xml");
  250. if (str == NULL) {
  251. xml_node_free(ctx->xml, syncml);
  252. return NULL;
  253. }
  254. cmdid++;
  255. oma_dm_add_hs20_generic_alert(ctx, syncbody, cmdid, oper, str);
  256. os_free(str);
  257. cmdid++;
  258. add_replace_devinfo(ctx, syncbody, cmdid);
  259. xml_node_create(ctx->xml, syncbody, NULL, "Final");
  260. return syncml;
  261. }
  262. static xml_node_t * build_oma_dm_1_sub_reg(struct hs20_osu_client *ctx,
  263. const char *url, int msgid)
  264. {
  265. xml_node_t *syncml;
  266. syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_SUBSCRIPTION_CREATION);
  267. if (syncml)
  268. debug_dump_node(ctx, "OMA-DM Package 1 (sub reg)", syncml);
  269. return syncml;
  270. }
  271. static xml_node_t * build_oma_dm_1_sub_prov(struct hs20_osu_client *ctx,
  272. const char *url, int msgid)
  273. {
  274. xml_node_t *syncml;
  275. syncml = build_oma_dm_1(ctx, url, msgid,
  276. DM_HS20_SUBSCRIPTION_PROVISIONING);
  277. if (syncml)
  278. debug_dump_node(ctx, "OMA-DM Package 1 (sub prov)", syncml);
  279. return syncml;
  280. }
  281. static xml_node_t * build_oma_dm_1_pol_upd(struct hs20_osu_client *ctx,
  282. const char *url, int msgid)
  283. {
  284. xml_node_t *syncml;
  285. syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_POLICY_UPDATE);
  286. if (syncml)
  287. debug_dump_node(ctx, "OMA-DM Package 1 (pol upd)", syncml);
  288. return syncml;
  289. }
  290. static xml_node_t * build_oma_dm_1_sub_rem(struct hs20_osu_client *ctx,
  291. const char *url, int msgid)
  292. {
  293. xml_node_t *syncml;
  294. syncml = build_oma_dm_1(ctx, url, msgid,
  295. DM_HS20_SUBSCRIPTION_REMEDIATION);
  296. if (syncml)
  297. debug_dump_node(ctx, "OMA-DM Package 1 (sub rem)", syncml);
  298. return syncml;
  299. }
  300. static int oma_dm_exec_browser(struct hs20_osu_client *ctx, xml_node_t *exec)
  301. {
  302. xml_node_t *node;
  303. char *data;
  304. int res;
  305. node = get_node(ctx->xml, exec, "Item/Data");
  306. if (node == NULL) {
  307. wpa_printf(MSG_INFO, "No Data node found");
  308. return DM_RESP_BAD_REQUEST;
  309. }
  310. data = xml_node_get_text(ctx->xml, node);
  311. wpa_printf(MSG_INFO, "Data: %s", data);
  312. wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data);
  313. write_summary(ctx, "Launch browser to URI '%s'", data);
  314. res = hs20_web_browser(data);
  315. xml_node_get_text_free(ctx->xml, data);
  316. if (res > 0) {
  317. wpa_printf(MSG_INFO, "User response in browser completed successfully");
  318. write_summary(ctx, "User response in browser completed successfully");
  319. return DM_RESP_OK;
  320. } else {
  321. wpa_printf(MSG_INFO, "Failed to receive user response");
  322. write_summary(ctx, "Failed to receive user response");
  323. return DM_RESP_COMMAND_FAILED;
  324. }
  325. }
  326. static int oma_dm_exec_get_cert(struct hs20_osu_client *ctx, xml_node_t *exec)
  327. {
  328. xml_node_t *node, *getcert;
  329. char *data;
  330. const char *name;
  331. int res;
  332. wpa_printf(MSG_INFO, "Client certificate enrollment");
  333. write_summary(ctx, "Client certificate enrollment");
  334. node = get_node(ctx->xml, exec, "Item/Data");
  335. if (node == NULL) {
  336. wpa_printf(MSG_INFO, "No Data node found");
  337. return DM_RESP_BAD_REQUEST;
  338. }
  339. data = xml_node_get_text(ctx->xml, node);
  340. wpa_printf(MSG_INFO, "Data: %s", data);
  341. getcert = xml_node_from_buf(ctx->xml, data);
  342. xml_node_get_text_free(ctx->xml, data);
  343. if (getcert == NULL) {
  344. wpa_printf(MSG_INFO, "Could not parse Item/Data node contents");
  345. return DM_RESP_BAD_REQUEST;
  346. }
  347. debug_dump_node(ctx, "OMA-DM getCertificate", getcert);
  348. name = xml_node_get_localname(ctx->xml, getcert);
  349. if (name == NULL || os_strcasecmp(name, "getCertificate") != 0) {
  350. wpa_printf(MSG_INFO, "Unexpected getCertificate node name '%s'",
  351. name);
  352. return DM_RESP_BAD_REQUEST;
  353. }
  354. res = osu_get_certificate(ctx, getcert);
  355. xml_node_free(ctx->xml, getcert);
  356. return res == 0 ? DM_RESP_OK : DM_RESP_COMMAND_FAILED;
  357. }
  358. static int oma_dm_exec(struct hs20_osu_client *ctx, xml_node_t *exec)
  359. {
  360. char *locuri;
  361. int ret;
  362. locuri = oma_dm_get_target_locuri(ctx, exec);
  363. if (locuri == NULL) {
  364. wpa_printf(MSG_INFO, "No Target LocURI node found");
  365. return DM_RESP_BAD_REQUEST;
  366. }
  367. wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
  368. if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
  369. "launchBrowserToURI") == 0) {
  370. ret = oma_dm_exec_browser(ctx, exec);
  371. } else if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
  372. "getCertificate") == 0) {
  373. ret = oma_dm_exec_get_cert(ctx, exec);
  374. } else {
  375. wpa_printf(MSG_INFO, "Unsupported exec Target LocURI");
  376. ret = DM_RESP_NOT_FOUND;
  377. }
  378. os_free(locuri);
  379. return ret;
  380. }
  381. static int oma_dm_run_add(struct hs20_osu_client *ctx, const char *locuri,
  382. xml_node_t *add, xml_node_t *pps,
  383. const char *pps_fname)
  384. {
  385. const char *pos;
  386. size_t fqdn_len;
  387. xml_node_t *node, *tnds, *unode, *pps_node;
  388. char *data, *uri, *upos, *end;
  389. int use_tnds = 0;
  390. size_t uri_len;
  391. wpa_printf(MSG_INFO, "Add command target LocURI: %s", locuri);
  392. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  393. wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi");
  394. return DM_RESP_PERMISSION_DENIED;
  395. }
  396. pos = locuri + 8;
  397. if (ctx->fqdn == NULL)
  398. return DM_RESP_COMMAND_FAILED;
  399. fqdn_len = os_strlen(ctx->fqdn);
  400. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  401. pos[fqdn_len] != '/') {
  402. wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi/%s",
  403. ctx->fqdn);
  404. return DM_RESP_PERMISSION_DENIED;
  405. }
  406. pos += fqdn_len + 1;
  407. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  408. wpa_printf(MSG_INFO,
  409. "Do not allow Add outside ./Wi-Fi/%s/PerProviderSubscription",
  410. ctx->fqdn);
  411. return DM_RESP_PERMISSION_DENIED;
  412. }
  413. pos += 24;
  414. wpa_printf(MSG_INFO, "Add command for PPS node %s", pos);
  415. pps_node = get_node(ctx->xml, pps, pos);
  416. if (pps_node) {
  417. wpa_printf(MSG_INFO, "Specified PPS node exists already");
  418. return DM_RESP_ALREADY_EXISTS;
  419. }
  420. uri = os_strdup(pos);
  421. if (uri == NULL)
  422. return DM_RESP_COMMAND_FAILED;
  423. while (!pps_node) {
  424. upos = os_strrchr(uri, '/');
  425. if (!upos)
  426. break;
  427. upos[0] = '\0';
  428. pps_node = get_node(ctx->xml, pps, uri);
  429. wpa_printf(MSG_INFO, "Node %s %s", uri,
  430. pps_node ? "exists" : "does not exist");
  431. }
  432. wpa_printf(MSG_INFO, "Parent URI: %s", uri);
  433. if (!pps_node) {
  434. /* Add at root of PPS MO */
  435. pps_node = pps;
  436. }
  437. uri_len = os_strlen(uri);
  438. os_strlcpy(uri, pos + uri_len, os_strlen(pos));
  439. upos = uri;
  440. while (*upos == '/')
  441. upos++;
  442. wpa_printf(MSG_INFO, "Nodes to add: %s", upos);
  443. for (;;) {
  444. end = os_strchr(upos, '/');
  445. if (!end)
  446. break;
  447. *end = '\0';
  448. wpa_printf(MSG_INFO, "Adding interim node %s", upos);
  449. pps_node = xml_node_create(ctx->xml, pps_node, NULL, upos);
  450. if (pps_node == NULL) {
  451. os_free(uri);
  452. return DM_RESP_COMMAND_FAILED;
  453. }
  454. upos = end + 1;
  455. }
  456. wpa_printf(MSG_INFO, "Adding node %s", upos);
  457. node = get_node(ctx->xml, add, "Item/Meta/Type");
  458. if (node) {
  459. char *type;
  460. type = xml_node_get_text(ctx->xml, node);
  461. use_tnds = node &&
  462. os_strstr(type, "application/vnd.syncml.dmtnds+xml");
  463. }
  464. node = get_node(ctx->xml, add, "Item/Data");
  465. if (node == NULL) {
  466. wpa_printf(MSG_INFO, "No Add/Item/Data found");
  467. os_free(uri);
  468. return DM_RESP_BAD_REQUEST;
  469. }
  470. data = xml_node_get_text(ctx->xml, node);
  471. if (data == NULL) {
  472. wpa_printf(MSG_INFO, "Could not get Add/Item/Data text");
  473. os_free(uri);
  474. return DM_RESP_BAD_REQUEST;
  475. }
  476. wpa_printf(MSG_DEBUG, "Add/Item/Data: %s", data);
  477. if (use_tnds) {
  478. tnds = xml_node_from_buf(ctx->xml, data);
  479. xml_node_get_text_free(ctx->xml, data);
  480. if (tnds == NULL) {
  481. wpa_printf(MSG_INFO,
  482. "Could not parse Add/Item/Data text");
  483. os_free(uri);
  484. return DM_RESP_BAD_REQUEST;
  485. }
  486. unode = tnds_to_mo(ctx->xml, tnds);
  487. xml_node_free(ctx->xml, tnds);
  488. if (unode == NULL) {
  489. wpa_printf(MSG_INFO, "Could not parse TNDS text");
  490. os_free(uri);
  491. return DM_RESP_BAD_REQUEST;
  492. }
  493. debug_dump_node(ctx, "Parsed TNDS", unode);
  494. xml_node_add_child(ctx->xml, pps_node, unode);
  495. } else {
  496. /* TODO: What to do here? */
  497. os_free(uri);
  498. return DM_RESP_BAD_REQUEST;
  499. }
  500. os_free(uri);
  501. if (update_pps_file(ctx, pps_fname, pps) < 0)
  502. return DM_RESP_COMMAND_FAILED;
  503. ctx->pps_updated = 1;
  504. return DM_RESP_OK;
  505. }
  506. static int oma_dm_add(struct hs20_osu_client *ctx, xml_node_t *add,
  507. xml_node_t *pps, const char *pps_fname)
  508. {
  509. xml_node_t *node;
  510. char *locuri;
  511. char fname[300];
  512. int ret;
  513. node = get_node(ctx->xml, add, "Item/Target/LocURI");
  514. if (node == NULL) {
  515. wpa_printf(MSG_INFO, "No Target LocURI node found");
  516. return DM_RESP_BAD_REQUEST;
  517. }
  518. locuri = xml_node_get_text(ctx->xml, node);
  519. wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
  520. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  521. wpa_printf(MSG_INFO, "Unsupported Add Target LocURI");
  522. xml_node_get_text_free(ctx->xml, locuri);
  523. return DM_RESP_PERMISSION_DENIED;
  524. }
  525. node = get_node(ctx->xml, add, "Item/Data");
  526. if (node == NULL) {
  527. wpa_printf(MSG_INFO, "No Data node found");
  528. xml_node_get_text_free(ctx->xml, locuri);
  529. return DM_RESP_BAD_REQUEST;
  530. }
  531. if (pps_fname && os_file_exists(pps_fname)) {
  532. ret = oma_dm_run_add(ctx, locuri, add, pps, pps_fname);
  533. if (ret != DM_RESP_OK) {
  534. xml_node_get_text_free(ctx->xml, locuri);
  535. return ret;
  536. }
  537. ret = 0;
  538. os_strlcpy(fname, pps_fname, sizeof(fname));
  539. } else
  540. ret = hs20_add_pps_mo(ctx, locuri, node, fname, sizeof(fname));
  541. xml_node_get_text_free(ctx->xml, locuri);
  542. if (ret < 0)
  543. return ret == -2 ? DM_RESP_ALREADY_EXISTS :
  544. DM_RESP_COMMAND_FAILED;
  545. if (ctx->no_reconnect == 2) {
  546. os_snprintf(ctx->pps_fname, sizeof(ctx->pps_fname), "%s",
  547. fname);
  548. ctx->pps_cred_set = 1;
  549. return DM_RESP_OK;
  550. }
  551. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  552. cmd_set_pps(ctx, fname);
  553. if (ctx->no_reconnect)
  554. return DM_RESP_OK;
  555. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  556. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0)
  557. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  558. return DM_RESP_OK;
  559. }
  560. static int oma_dm_replace(struct hs20_osu_client *ctx, xml_node_t *replace,
  561. xml_node_t *pps, const char *pps_fname)
  562. {
  563. char *locuri, *pos;
  564. size_t fqdn_len;
  565. xml_node_t *node, *tnds, *unode, *pps_node, *parent;
  566. char *data;
  567. int use_tnds = 0;
  568. locuri = oma_dm_get_target_locuri(ctx, replace);
  569. if (locuri == NULL)
  570. return DM_RESP_BAD_REQUEST;
  571. wpa_printf(MSG_INFO, "Replace command target LocURI: %s", locuri);
  572. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  573. wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi");
  574. os_free(locuri);
  575. return DM_RESP_PERMISSION_DENIED;
  576. }
  577. pos = locuri + 8;
  578. if (ctx->fqdn == NULL) {
  579. os_free(locuri);
  580. return DM_RESP_COMMAND_FAILED;
  581. }
  582. fqdn_len = os_strlen(ctx->fqdn);
  583. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  584. pos[fqdn_len] != '/') {
  585. wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi/%s",
  586. ctx->fqdn);
  587. os_free(locuri);
  588. return DM_RESP_PERMISSION_DENIED;
  589. }
  590. pos += fqdn_len + 1;
  591. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  592. wpa_printf(MSG_INFO,
  593. "Do not allow Replace outside ./Wi-Fi/%s/PerProviderSubscription",
  594. ctx->fqdn);
  595. os_free(locuri);
  596. return DM_RESP_PERMISSION_DENIED;
  597. }
  598. pos += 24;
  599. wpa_printf(MSG_INFO, "Replace command for PPS node %s", pos);
  600. pps_node = get_node(ctx->xml, pps, pos);
  601. if (pps_node == NULL) {
  602. wpa_printf(MSG_INFO, "Specified PPS node not found");
  603. os_free(locuri);
  604. return DM_RESP_NOT_FOUND;
  605. }
  606. node = get_node(ctx->xml, replace, "Item/Meta/Type");
  607. if (node) {
  608. char *type;
  609. type = xml_node_get_text(ctx->xml, node);
  610. use_tnds = node &&
  611. os_strstr(type, "application/vnd.syncml.dmtnds+xml");
  612. }
  613. node = get_node(ctx->xml, replace, "Item/Data");
  614. if (node == NULL) {
  615. wpa_printf(MSG_INFO, "No Replace/Item/Data found");
  616. os_free(locuri);
  617. return DM_RESP_BAD_REQUEST;
  618. }
  619. data = xml_node_get_text(ctx->xml, node);
  620. if (data == NULL) {
  621. wpa_printf(MSG_INFO, "Could not get Replace/Item/Data text");
  622. os_free(locuri);
  623. return DM_RESP_BAD_REQUEST;
  624. }
  625. wpa_printf(MSG_DEBUG, "Replace/Item/Data: %s", data);
  626. if (use_tnds) {
  627. tnds = xml_node_from_buf(ctx->xml, data);
  628. xml_node_get_text_free(ctx->xml, data);
  629. if (tnds == NULL) {
  630. wpa_printf(MSG_INFO,
  631. "Could not parse Replace/Item/Data text");
  632. os_free(locuri);
  633. return DM_RESP_BAD_REQUEST;
  634. }
  635. unode = tnds_to_mo(ctx->xml, tnds);
  636. xml_node_free(ctx->xml, tnds);
  637. if (unode == NULL) {
  638. wpa_printf(MSG_INFO, "Could not parse TNDS text");
  639. os_free(locuri);
  640. return DM_RESP_BAD_REQUEST;
  641. }
  642. debug_dump_node(ctx, "Parsed TNDS", unode);
  643. parent = xml_node_get_parent(ctx->xml, pps_node);
  644. xml_node_detach(ctx->xml, pps_node);
  645. xml_node_add_child(ctx->xml, parent, unode);
  646. } else {
  647. xml_node_set_text(ctx->xml, pps_node, data);
  648. xml_node_get_text_free(ctx->xml, data);
  649. }
  650. os_free(locuri);
  651. if (update_pps_file(ctx, pps_fname, pps) < 0)
  652. return DM_RESP_COMMAND_FAILED;
  653. ctx->pps_updated = 1;
  654. return DM_RESP_OK;
  655. }
  656. static int oma_dm_get(struct hs20_osu_client *ctx, xml_node_t *get,
  657. xml_node_t *pps, const char *pps_fname, char **value)
  658. {
  659. char *locuri, *pos;
  660. size_t fqdn_len;
  661. xml_node_t *pps_node;
  662. const char *name;
  663. *value = NULL;
  664. locuri = oma_dm_get_target_locuri(ctx, get);
  665. if (locuri == NULL)
  666. return DM_RESP_BAD_REQUEST;
  667. wpa_printf(MSG_INFO, "Get command target LocURI: %s", locuri);
  668. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  669. wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi");
  670. os_free(locuri);
  671. return DM_RESP_PERMISSION_DENIED;
  672. }
  673. pos = locuri + 8;
  674. if (ctx->fqdn == NULL)
  675. return DM_RESP_COMMAND_FAILED;
  676. fqdn_len = os_strlen(ctx->fqdn);
  677. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  678. pos[fqdn_len] != '/') {
  679. wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi/%s",
  680. ctx->fqdn);
  681. os_free(locuri);
  682. return DM_RESP_PERMISSION_DENIED;
  683. }
  684. pos += fqdn_len + 1;
  685. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  686. wpa_printf(MSG_INFO,
  687. "Do not allow Get outside ./Wi-Fi/%s/PerProviderSubscription",
  688. ctx->fqdn);
  689. os_free(locuri);
  690. return DM_RESP_PERMISSION_DENIED;
  691. }
  692. pos += 24;
  693. wpa_printf(MSG_INFO, "Get command for PPS node %s", pos);
  694. pps_node = get_node(ctx->xml, pps, pos);
  695. if (pps_node == NULL) {
  696. wpa_printf(MSG_INFO, "Specified PPS node not found");
  697. os_free(locuri);
  698. return DM_RESP_NOT_FOUND;
  699. }
  700. name = xml_node_get_localname(ctx->xml, pps_node);
  701. wpa_printf(MSG_INFO, "Get command returned node with name '%s'", name);
  702. if (os_strcasecmp(name, "Password") == 0) {
  703. wpa_printf(MSG_INFO, "Do not allow Get for Password node");
  704. os_free(locuri);
  705. return DM_RESP_PERMISSION_DENIED;
  706. }
  707. /*
  708. * TODO: No support for DMTNDS, so if interior node, reply with a
  709. * list of children node names in Results element. The child list type is
  710. * defined in [DMTND].
  711. */
  712. *value = xml_node_get_text(ctx->xml, pps_node);
  713. if (*value == NULL)
  714. return DM_RESP_COMMAND_FAILED;
  715. return DM_RESP_OK;
  716. }
  717. static int oma_dm_get_cmdid(struct hs20_osu_client *ctx, xml_node_t *node)
  718. {
  719. xml_node_t *cnode;
  720. char *str;
  721. int ret;
  722. cnode = get_node(ctx->xml, node, "CmdID");
  723. if (cnode == NULL)
  724. return 0;
  725. str = xml_node_get_text(ctx->xml, cnode);
  726. if (str == NULL)
  727. return 0;
  728. ret = atoi(str);
  729. xml_node_get_text_free(ctx->xml, str);
  730. return ret;
  731. }
  732. static xml_node_t * oma_dm_send_recv(struct hs20_osu_client *ctx,
  733. const char *url, xml_node_t *syncml,
  734. const char *ext_hdr,
  735. const char *username, const char *password,
  736. const char *client_cert,
  737. const char *client_key)
  738. {
  739. xml_node_t *resp;
  740. char *str, *res;
  741. char *resp_uri = NULL;
  742. str = xml_node_to_str(ctx->xml, syncml);
  743. xml_node_free(ctx->xml, syncml);
  744. if (str == NULL)
  745. return NULL;
  746. wpa_printf(MSG_INFO, "Send OMA DM Package");
  747. write_summary(ctx, "Send OMA DM Package");
  748. os_free(ctx->server_url);
  749. ctx->server_url = os_strdup(url);
  750. res = http_post(ctx->http, url, str, "application/vnd.syncml.dm+xml",
  751. ext_hdr, ctx->ca_fname, username, password,
  752. client_cert, client_key, NULL);
  753. os_free(str);
  754. os_free(resp_uri);
  755. resp_uri = NULL;
  756. if (res == NULL) {
  757. const char *err = http_get_err(ctx->http);
  758. if (err) {
  759. wpa_printf(MSG_INFO, "HTTP error: %s", err);
  760. write_result(ctx, "HTTP error: %s", err);
  761. } else {
  762. write_summary(ctx, "Failed to send OMA DM Package");
  763. }
  764. return NULL;
  765. }
  766. wpa_printf(MSG_DEBUG, "Server response: %s", res);
  767. wpa_printf(MSG_INFO, "Process OMA DM Package");
  768. write_summary(ctx, "Process received OMA DM Package");
  769. resp = xml_node_from_buf(ctx->xml, res);
  770. os_free(res);
  771. if (resp == NULL) {
  772. wpa_printf(MSG_INFO, "Failed to parse OMA DM response");
  773. return NULL;
  774. }
  775. debug_dump_node(ctx, "OMA DM Package", resp);
  776. return resp;
  777. }
  778. static xml_node_t * oma_dm_process(struct hs20_osu_client *ctx, const char *url,
  779. xml_node_t *resp, int msgid,
  780. char **ret_resp_uri,
  781. xml_node_t *pps, const char *pps_fname)
  782. {
  783. xml_node_t *syncml, *syncbody, *hdr, *body, *child;
  784. const char *name;
  785. char *resp_uri = NULL;
  786. int server_msgid = 0;
  787. int cmdid = 0;
  788. int server_cmdid;
  789. int resp_needed = 0;
  790. char *tmp;
  791. int final = 0;
  792. char *locuri;
  793. *ret_resp_uri = NULL;
  794. name = xml_node_get_localname(ctx->xml, resp);
  795. if (name == NULL || os_strcasecmp(name, "SyncML") != 0) {
  796. wpa_printf(MSG_INFO, "SyncML node not found");
  797. return NULL;
  798. }
  799. hdr = get_node(ctx->xml, resp, "SyncHdr");
  800. body = get_node(ctx->xml, resp, "SyncBody");
  801. if (hdr == NULL || body == NULL) {
  802. wpa_printf(MSG_INFO, "Could not find SyncHdr or SyncBody");
  803. return NULL;
  804. }
  805. xml_node_for_each_child(ctx->xml, child, hdr) {
  806. xml_node_for_each_check(ctx->xml, child);
  807. name = xml_node_get_localname(ctx->xml, child);
  808. wpa_printf(MSG_INFO, "SyncHdr %s", name);
  809. if (os_strcasecmp(name, "RespURI") == 0) {
  810. tmp = xml_node_get_text(ctx->xml, child);
  811. if (tmp)
  812. resp_uri = os_strdup(tmp);
  813. xml_node_get_text_free(ctx->xml, tmp);
  814. } else if (os_strcasecmp(name, "MsgID") == 0) {
  815. tmp = xml_node_get_text(ctx->xml, child);
  816. if (tmp)
  817. server_msgid = atoi(tmp);
  818. xml_node_get_text_free(ctx->xml, tmp);
  819. }
  820. }
  821. wpa_printf(MSG_INFO, "Server MsgID: %d", server_msgid);
  822. if (resp_uri)
  823. wpa_printf(MSG_INFO, "RespURI: %s", resp_uri);
  824. syncml = oma_dm_build_hdr(ctx, resp_uri ? resp_uri : url, msgid);
  825. if (syncml == NULL) {
  826. os_free(resp_uri);
  827. return NULL;
  828. }
  829. syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
  830. cmdid++;
  831. add_status(ctx, syncbody, server_msgid, 0, cmdid, "SyncHdr",
  832. DM_RESP_AUTH_ACCEPTED, NULL);
  833. xml_node_for_each_child(ctx->xml, child, body) {
  834. xml_node_for_each_check(ctx->xml, child);
  835. server_cmdid = oma_dm_get_cmdid(ctx, child);
  836. name = xml_node_get_localname(ctx->xml, child);
  837. wpa_printf(MSG_INFO, "SyncBody CmdID=%d - %s",
  838. server_cmdid, name);
  839. if (os_strcasecmp(name, "Exec") == 0) {
  840. int res = oma_dm_exec(ctx, child);
  841. cmdid++;
  842. locuri = oma_dm_get_target_locuri(ctx, child);
  843. if (locuri == NULL)
  844. res = DM_RESP_BAD_REQUEST;
  845. add_status(ctx, syncbody, server_msgid, server_cmdid,
  846. cmdid, name, res, locuri);
  847. os_free(locuri);
  848. resp_needed = 1;
  849. } else if (os_strcasecmp(name, "Add") == 0) {
  850. int res = oma_dm_add(ctx, child, pps, pps_fname);
  851. cmdid++;
  852. locuri = oma_dm_get_target_locuri(ctx, child);
  853. if (locuri == NULL)
  854. res = DM_RESP_BAD_REQUEST;
  855. add_status(ctx, syncbody, server_msgid, server_cmdid,
  856. cmdid, name, res, locuri);
  857. os_free(locuri);
  858. resp_needed = 1;
  859. } else if (os_strcasecmp(name, "Replace") == 0) {
  860. int res;
  861. res = oma_dm_replace(ctx, child, pps, pps_fname);
  862. cmdid++;
  863. locuri = oma_dm_get_target_locuri(ctx, child);
  864. if (locuri == NULL)
  865. res = DM_RESP_BAD_REQUEST;
  866. add_status(ctx, syncbody, server_msgid, server_cmdid,
  867. cmdid, name, res, locuri);
  868. os_free(locuri);
  869. resp_needed = 1;
  870. } else if (os_strcasecmp(name, "Status") == 0) {
  871. /* TODO: Verify success */
  872. } else if (os_strcasecmp(name, "Get") == 0) {
  873. int res;
  874. char *value;
  875. res = oma_dm_get(ctx, child, pps, pps_fname, &value);
  876. cmdid++;
  877. locuri = oma_dm_get_target_locuri(ctx, child);
  878. if (locuri == NULL)
  879. res = DM_RESP_BAD_REQUEST;
  880. add_status(ctx, syncbody, server_msgid, server_cmdid,
  881. cmdid, name, res, locuri);
  882. if (res == DM_RESP_OK && value) {
  883. cmdid++;
  884. add_results(ctx, syncbody, server_msgid,
  885. server_cmdid, cmdid, locuri, value);
  886. }
  887. os_free(locuri);
  888. xml_node_get_text_free(ctx->xml, value);
  889. resp_needed = 1;
  890. #if 0 /* TODO: MUST support */
  891. } else if (os_strcasecmp(name, "Delete") == 0) {
  892. #endif
  893. #if 0 /* TODO: MUST support */
  894. } else if (os_strcasecmp(name, "Sequence") == 0) {
  895. #endif
  896. } else if (os_strcasecmp(name, "Final") == 0) {
  897. final = 1;
  898. break;
  899. } else {
  900. locuri = oma_dm_get_target_locuri(ctx, child);
  901. add_status(ctx, syncbody, server_msgid, server_cmdid,
  902. cmdid, name, DM_RESP_COMMAND_NOT_IMPLEMENTED,
  903. locuri);
  904. os_free(locuri);
  905. resp_needed = 1;
  906. }
  907. }
  908. if (!final) {
  909. wpa_printf(MSG_INFO, "Final node not found");
  910. xml_node_free(ctx->xml, syncml);
  911. os_free(resp_uri);
  912. return NULL;
  913. }
  914. if (!resp_needed) {
  915. wpa_printf(MSG_INFO, "Exchange completed - no response needed");
  916. xml_node_free(ctx->xml, syncml);
  917. os_free(resp_uri);
  918. return NULL;
  919. }
  920. xml_node_create(ctx->xml, syncbody, NULL, "Final");
  921. debug_dump_node(ctx, "OMA-DM Package 3", syncml);
  922. *ret_resp_uri = resp_uri;
  923. return syncml;
  924. }
  925. int cmd_oma_dm_prov(struct hs20_osu_client *ctx, const char *url)
  926. {
  927. xml_node_t *syncml, *resp;
  928. char *resp_uri = NULL;
  929. int msgid = 0;
  930. if (url == NULL) {
  931. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  932. return -1;
  933. }
  934. wpa_printf(MSG_INFO, "OMA-DM credential provisioning requested");
  935. write_summary(ctx, "OMA-DM credential provisioning");
  936. msgid++;
  937. syncml = build_oma_dm_1_sub_reg(ctx, url, msgid);
  938. if (syncml == NULL)
  939. return -1;
  940. while (syncml) {
  941. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
  942. syncml, NULL, NULL, NULL, NULL, NULL);
  943. if (resp == NULL)
  944. return -1;
  945. msgid++;
  946. syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
  947. NULL, NULL);
  948. xml_node_free(ctx->xml, resp);
  949. }
  950. os_free(resp_uri);
  951. return ctx->pps_cred_set ? 0 : -1;
  952. }
  953. int cmd_oma_dm_sim_prov(struct hs20_osu_client *ctx, const char *url)
  954. {
  955. xml_node_t *syncml, *resp;
  956. char *resp_uri = NULL;
  957. int msgid = 0;
  958. if (url == NULL) {
  959. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  960. return -1;
  961. }
  962. wpa_printf(MSG_INFO, "OMA-DM SIM provisioning requested");
  963. ctx->no_reconnect = 2;
  964. wpa_printf(MSG_INFO, "Wait for IP address before starting SIM provisioning");
  965. write_summary(ctx, "Wait for IP address before starting SIM provisioning");
  966. if (wait_ip_addr(ctx->ifname, 15) < 0) {
  967. wpa_printf(MSG_INFO, "Could not get IP address for WLAN - try connection anyway");
  968. }
  969. write_summary(ctx, "OMA-DM SIM provisioning");
  970. msgid++;
  971. syncml = build_oma_dm_1_sub_prov(ctx, url, msgid);
  972. if (syncml == NULL)
  973. return -1;
  974. while (syncml) {
  975. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
  976. syncml, NULL, NULL, NULL, NULL, NULL);
  977. if (resp == NULL)
  978. return -1;
  979. msgid++;
  980. syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
  981. NULL, NULL);
  982. xml_node_free(ctx->xml, resp);
  983. }
  984. os_free(resp_uri);
  985. if (ctx->pps_cred_set) {
  986. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  987. cmd_set_pps(ctx, ctx->pps_fname);
  988. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  989. write_summary(ctx, "Requesting reconnection with updated configuration");
  990. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  991. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  992. write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
  993. return -1;
  994. }
  995. }
  996. return ctx->pps_cred_set ? 0 : -1;
  997. }
  998. void oma_dm_pol_upd(struct hs20_osu_client *ctx, const char *address,
  999. const char *pps_fname,
  1000. const char *client_cert, const char *client_key,
  1001. const char *cred_username, const char *cred_password,
  1002. xml_node_t *pps)
  1003. {
  1004. xml_node_t *syncml, *resp;
  1005. char *resp_uri = NULL;
  1006. int msgid = 0;
  1007. wpa_printf(MSG_INFO, "OMA-DM policy update");
  1008. write_summary(ctx, "OMA-DM policy update");
  1009. msgid++;
  1010. syncml = build_oma_dm_1_pol_upd(ctx, address, msgid);
  1011. if (syncml == NULL)
  1012. return;
  1013. while (syncml) {
  1014. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
  1015. syncml, NULL, cred_username,
  1016. cred_password, client_cert, client_key);
  1017. if (resp == NULL)
  1018. return;
  1019. msgid++;
  1020. syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
  1021. pps, pps_fname);
  1022. xml_node_free(ctx->xml, resp);
  1023. }
  1024. os_free(resp_uri);
  1025. if (ctx->pps_updated) {
  1026. wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO");
  1027. write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request connection");
  1028. cmd_set_pps(ctx, pps_fname);
  1029. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  1030. wpa_printf(MSG_INFO,
  1031. "Failed to request wpa_supplicant to reconnect");
  1032. write_summary(ctx,
  1033. "Failed to request wpa_supplicant to reconnect");
  1034. }
  1035. }
  1036. }
  1037. void oma_dm_sub_rem(struct hs20_osu_client *ctx, const char *address,
  1038. const char *pps_fname,
  1039. const char *client_cert, const char *client_key,
  1040. const char *cred_username, const char *cred_password,
  1041. xml_node_t *pps)
  1042. {
  1043. xml_node_t *syncml, *resp;
  1044. char *resp_uri = NULL;
  1045. int msgid = 0;
  1046. wpa_printf(MSG_INFO, "OMA-DM subscription remediation");
  1047. write_summary(ctx, "OMA-DM subscription remediation");
  1048. msgid++;
  1049. syncml = build_oma_dm_1_sub_rem(ctx, address, msgid);
  1050. if (syncml == NULL)
  1051. return;
  1052. while (syncml) {
  1053. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
  1054. syncml, NULL, cred_username,
  1055. cred_password, client_cert, client_key);
  1056. if (resp == NULL)
  1057. return;
  1058. msgid++;
  1059. syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
  1060. pps, pps_fname);
  1061. xml_node_free(ctx->xml, resp);
  1062. }
  1063. os_free(resp_uri);
  1064. wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
  1065. write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
  1066. cmd_set_pps(ctx, pps_fname);
  1067. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  1068. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  1069. write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
  1070. }
  1071. }
  1072. void cmd_oma_dm_add(struct hs20_osu_client *ctx, const char *pps_fname,
  1073. const char *add_fname)
  1074. {
  1075. xml_node_t *pps, *add;
  1076. int res;
  1077. ctx->fqdn = os_strdup("wi-fi.org");
  1078. pps = node_from_file(ctx->xml, pps_fname);
  1079. if (pps == NULL) {
  1080. wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
  1081. pps_fname);
  1082. return;
  1083. }
  1084. add = node_from_file(ctx->xml, add_fname);
  1085. if (add == NULL) {
  1086. wpa_printf(MSG_INFO, "Add file %s could not be parsed",
  1087. add_fname);
  1088. xml_node_free(ctx->xml, pps);
  1089. return;
  1090. }
  1091. res = oma_dm_add(ctx, add, pps, pps_fname);
  1092. wpa_printf(MSG_INFO, "oma_dm_add --> %d", res);
  1093. xml_node_free(ctx->xml, pps);
  1094. xml_node_free(ctx->xml, add);
  1095. }
  1096. void cmd_oma_dm_replace(struct hs20_osu_client *ctx, const char *pps_fname,
  1097. const char *replace_fname)
  1098. {
  1099. xml_node_t *pps, *replace;
  1100. int res;
  1101. ctx->fqdn = os_strdup("wi-fi.org");
  1102. pps = node_from_file(ctx->xml, pps_fname);
  1103. if (pps == NULL) {
  1104. wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
  1105. pps_fname);
  1106. return;
  1107. }
  1108. replace = node_from_file(ctx->xml, replace_fname);
  1109. if (replace == NULL) {
  1110. wpa_printf(MSG_INFO, "Replace file %s could not be parsed",
  1111. replace_fname);
  1112. xml_node_free(ctx->xml, pps);
  1113. return;
  1114. }
  1115. res = oma_dm_replace(ctx, replace, pps, pps_fname);
  1116. wpa_printf(MSG_INFO, "oma_dm_replace --> %d", res);
  1117. xml_node_free(ctx->xml, pps);
  1118. xml_node_free(ctx->xml, replace);
  1119. }