oma_dm_client.c 36 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387
  1. /*
  2. * Hotspot 2.0 - OMA DM client
  3. * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "wpa_helpers.h"
  11. #include "xml-utils.h"
  12. #include "http-utils.h"
  13. #include "utils/browser.h"
  14. #include "osu_client.h"
  15. #define DM_SERVER_INITIATED_MGMT 1200
  16. #define DM_CLIENT_INITIATED_MGMT 1201
  17. #define DM_GENERIC_ALERT 1226
  18. /* OMA-TS-SyncML-RepPro-V1_2_2 - 10. Response Status Codes */
  19. #define DM_RESP_OK 200
  20. #define DM_RESP_AUTH_ACCEPTED 212
  21. #define DM_RESP_CHUNKED_ITEM_ACCEPTED 213
  22. #define DM_RESP_NOT_EXECUTED 215
  23. #define DM_RESP_ATOMIC_ROLL_BACK_OK 216
  24. #define DM_RESP_NOT_MODIFIED 304
  25. #define DM_RESP_BAD_REQUEST 400
  26. #define DM_RESP_UNAUTHORIZED 401
  27. #define DM_RESP_FORBIDDEN 403
  28. #define DM_RESP_NOT_FOUND 404
  29. #define DM_RESP_COMMAND_NOT_ALLOWED 405
  30. #define DM_RESP_OPTIONAL_FEATURE_NOT_SUPPORTED 406
  31. #define DM_RESP_MISSING_CREDENTIALS 407
  32. #define DM_RESP_CONFLICT 409
  33. #define DM_RESP_GONE 410
  34. #define DM_RESP_INCOMPLETE_COMMAND 412
  35. #define DM_RESP_REQ_ENTITY_TOO_LARGE 413
  36. #define DM_RESP_URI_TOO_LONG 414
  37. #define DM_RESP_UNSUPPORTED_MEDIA_TYPE_OR_FORMAT 415
  38. #define DM_RESP_REQ_TOO_BIG 416
  39. #define DM_RESP_ALREADY_EXISTS 418
  40. #define DM_RESP_DEVICE_FULL 420
  41. #define DM_RESP_SIZE_MISMATCH 424
  42. #define DM_RESP_PERMISSION_DENIED 425
  43. #define DM_RESP_COMMAND_FAILED 500
  44. #define DM_RESP_COMMAND_NOT_IMPLEMENTED 501
  45. #define DM_RESP_ATOMIC_ROLL_BACK_FAILED 516
  46. #define DM_HS20_SUBSCRIPTION_CREATION \
  47. "org.wi-fi.hotspot2dot0.SubscriptionCreation"
  48. #define DM_HS20_SUBSCRIPTION_PROVISIONING \
  49. "org.wi-fi.hotspot2dot0.SubscriptionProvisioning"
  50. #define DM_HS20_SUBSCRIPTION_REMEDIATION \
  51. "org.wi-fi.hotspot2dot0.SubscriptionRemediation"
  52. #define DM_HS20_POLICY_UPDATE \
  53. "org.wi-fi.hotspot2dot0.PolicyUpdate"
  54. #define DM_URI_PPS "./Wi-Fi/org.wi-fi/PerProviderSubscription"
  55. #define DM_URI_LAUNCH_BROWSER \
  56. "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/launchBrowserToURI"
  57. static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
  58. const char *locuri, const char *data);
  59. static const char * int2str(int val)
  60. {
  61. static char buf[20];
  62. snprintf(buf, sizeof(buf), "%d", val);
  63. return buf;
  64. }
  65. static char * oma_dm_get_target_locuri(struct hs20_osu_client *ctx,
  66. xml_node_t *node)
  67. {
  68. xml_node_t *locuri;
  69. char *uri, *ret = NULL;
  70. locuri = get_node(ctx->xml, node, "Item/Target/LocURI");
  71. if (locuri == NULL)
  72. return NULL;
  73. uri = xml_node_get_text(ctx->xml, locuri);
  74. if (uri)
  75. ret = os_strdup(uri);
  76. xml_node_get_text_free(ctx->xml, uri);
  77. return ret;
  78. }
  79. static void oma_dm_add_locuri(struct hs20_osu_client *ctx, xml_node_t *parent,
  80. const char *element, const char *uri)
  81. {
  82. xml_node_t *node;
  83. node = xml_node_create(ctx->xml, parent, NULL, element);
  84. if (node == NULL)
  85. return;
  86. xml_node_create_text(ctx->xml, node, NULL, "LocURI", uri);
  87. }
  88. static xml_node_t * oma_dm_build_hdr(struct hs20_osu_client *ctx,
  89. const char *url, int msgid)
  90. {
  91. xml_node_t *syncml, *synchdr;
  92. xml_namespace_t *ns;
  93. syncml = xml_node_create_root(ctx->xml, "SYNCML:SYNCML1.2", NULL, &ns,
  94. "SyncML");
  95. synchdr = xml_node_create(ctx->xml, syncml, NULL, "SyncHdr");
  96. xml_node_create_text(ctx->xml, synchdr, NULL, "VerDTD", "1.2");
  97. xml_node_create_text(ctx->xml, synchdr, NULL, "VerProto", "DM/1.2");
  98. xml_node_create_text(ctx->xml, synchdr, NULL, "SessionID", "1");
  99. xml_node_create_text(ctx->xml, synchdr, NULL, "MsgID", int2str(msgid));
  100. oma_dm_add_locuri(ctx, synchdr, "Target", url);
  101. oma_dm_add_locuri(ctx, synchdr, "Source", ctx->devid);
  102. return syncml;
  103. }
  104. static void oma_dm_add_cmdid(struct hs20_osu_client *ctx, xml_node_t *parent,
  105. int cmdid)
  106. {
  107. xml_node_create_text(ctx->xml, parent, NULL, "CmdID", int2str(cmdid));
  108. }
  109. static xml_node_t * add_alert(struct hs20_osu_client *ctx, xml_node_t *parent,
  110. int cmdid, int data)
  111. {
  112. xml_node_t *node;
  113. node = xml_node_create(ctx->xml, parent, NULL, "Alert");
  114. if (node == NULL)
  115. return NULL;
  116. oma_dm_add_cmdid(ctx, node, cmdid);
  117. xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
  118. return node;
  119. }
  120. static xml_node_t * add_status(struct hs20_osu_client *ctx, xml_node_t *parent,
  121. int msgref, int cmdref, int cmdid,
  122. const char *cmd, int data, const char *targetref)
  123. {
  124. xml_node_t *node;
  125. node = xml_node_create(ctx->xml, parent, NULL, "Status");
  126. if (node == NULL)
  127. return NULL;
  128. oma_dm_add_cmdid(ctx, node, cmdid);
  129. xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
  130. if (cmdref)
  131. xml_node_create_text(ctx->xml, node, NULL, "CmdRef",
  132. int2str(cmdref));
  133. xml_node_create_text(ctx->xml, node, NULL, "Cmd", cmd);
  134. xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
  135. if (targetref) {
  136. xml_node_create_text(ctx->xml, node, NULL, "TargetRef",
  137. targetref);
  138. }
  139. return node;
  140. }
  141. static xml_node_t * add_results(struct hs20_osu_client *ctx, xml_node_t *parent,
  142. int msgref, int cmdref, int cmdid,
  143. const char *locuri, const char *data)
  144. {
  145. xml_node_t *node;
  146. node = xml_node_create(ctx->xml, parent, NULL, "Results");
  147. if (node == NULL)
  148. return NULL;
  149. oma_dm_add_cmdid(ctx, node, cmdid);
  150. xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
  151. xml_node_create_text(ctx->xml, node, NULL, "CmdRef", int2str(cmdref));
  152. add_item(ctx, node, locuri, data);
  153. return node;
  154. }
  155. static char * mo_str(struct hs20_osu_client *ctx, const char *urn,
  156. const char *fname)
  157. {
  158. xml_node_t *fnode, *tnds;
  159. char *str;
  160. fnode = node_from_file(ctx->xml, fname);
  161. if (!fnode)
  162. return NULL;
  163. tnds = mo_to_tnds(ctx->xml, fnode, 0, urn, "syncml:dmddf1.2");
  164. xml_node_free(ctx->xml, fnode);
  165. if (!tnds)
  166. return NULL;
  167. str = xml_node_to_str(ctx->xml, tnds);
  168. xml_node_free(ctx->xml, tnds);
  169. if (str == NULL)
  170. return NULL;
  171. wpa_printf(MSG_INFO, "MgmtTree: %s", str);
  172. return str;
  173. }
  174. static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
  175. const char *locuri, const char *data)
  176. {
  177. xml_node_t *item, *node;
  178. item = xml_node_create(ctx->xml, parent, NULL, "Item");
  179. oma_dm_add_locuri(ctx, item, "Source", locuri);
  180. node = xml_node_create(ctx->xml, item, NULL, "Meta");
  181. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
  182. "Chr");
  183. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type",
  184. "text/plain");
  185. xml_node_create_text(ctx->xml, item, NULL, "Data", data);
  186. }
  187. static void add_replace_devinfo(struct hs20_osu_client *ctx, xml_node_t *parent,
  188. int cmdid)
  189. {
  190. xml_node_t *info, *child, *replace;
  191. const char *name;
  192. char locuri[200], *txt;
  193. info = node_from_file(ctx->xml, "devinfo.xml");
  194. if (info == NULL) {
  195. wpa_printf(MSG_INFO, "Could not read devinfo.xml");
  196. return;
  197. }
  198. replace = xml_node_create(ctx->xml, parent, NULL, "Replace");
  199. if (replace == NULL) {
  200. xml_node_free(ctx->xml, info);
  201. return;
  202. }
  203. oma_dm_add_cmdid(ctx, replace, cmdid);
  204. xml_node_for_each_child(ctx->xml, child, info) {
  205. xml_node_for_each_check(ctx->xml, child);
  206. name = xml_node_get_localname(ctx->xml, child);
  207. os_snprintf(locuri, sizeof(locuri), "./DevInfo/%s", name);
  208. txt = xml_node_get_text(ctx->xml, child);
  209. if (txt) {
  210. add_item(ctx, replace, locuri, txt);
  211. xml_node_get_text_free(ctx->xml, txt);
  212. }
  213. }
  214. xml_node_free(ctx->xml, info);
  215. }
  216. static void oma_dm_add_hs20_generic_alert(struct hs20_osu_client *ctx,
  217. xml_node_t *syncbody,
  218. int cmdid, const char *oper,
  219. const char *data)
  220. {
  221. xml_node_t *node, *item;
  222. char buf[200];
  223. node = add_alert(ctx, syncbody, cmdid, DM_GENERIC_ALERT);
  224. item = xml_node_create(ctx->xml, node, NULL, "Item");
  225. oma_dm_add_locuri(ctx, item, "Source", DM_URI_PPS);
  226. node = xml_node_create(ctx->xml, item, NULL, "Meta");
  227. snprintf(buf, sizeof(buf), "Reversed-Domain-Name: %s", oper);
  228. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type", buf);
  229. xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
  230. "xml");
  231. xml_node_create_text(ctx->xml, item, NULL, "Data", data);
  232. }
  233. static xml_node_t * build_oma_dm_1(struct hs20_osu_client *ctx,
  234. const char *url, int msgid, const char *oper)
  235. {
  236. xml_node_t *syncml, *syncbody;
  237. char *str;
  238. int cmdid = 0;
  239. syncml = oma_dm_build_hdr(ctx, url, msgid);
  240. if (syncml == NULL)
  241. return NULL;
  242. syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
  243. if (syncbody == NULL) {
  244. xml_node_free(ctx->xml, syncml);
  245. return NULL;
  246. }
  247. cmdid++;
  248. add_alert(ctx, syncbody, cmdid, DM_CLIENT_INITIATED_MGMT);
  249. str = mo_str(ctx, NULL, "devdetail.xml");
  250. if (str == NULL) {
  251. xml_node_free(ctx->xml, syncml);
  252. return NULL;
  253. }
  254. cmdid++;
  255. oma_dm_add_hs20_generic_alert(ctx, syncbody, cmdid, oper, str);
  256. os_free(str);
  257. cmdid++;
  258. add_replace_devinfo(ctx, syncbody, cmdid);
  259. xml_node_create(ctx->xml, syncbody, NULL, "Final");
  260. return syncml;
  261. }
  262. static xml_node_t * build_oma_dm_1_sub_reg(struct hs20_osu_client *ctx,
  263. const char *url, int msgid)
  264. {
  265. xml_node_t *syncml;
  266. syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_SUBSCRIPTION_CREATION);
  267. if (syncml)
  268. debug_dump_node(ctx, "OMA-DM Package 1 (sub reg)", syncml);
  269. return syncml;
  270. }
  271. static xml_node_t * build_oma_dm_1_sub_prov(struct hs20_osu_client *ctx,
  272. const char *url, int msgid)
  273. {
  274. xml_node_t *syncml;
  275. syncml = build_oma_dm_1(ctx, url, msgid,
  276. DM_HS20_SUBSCRIPTION_PROVISIONING);
  277. if (syncml)
  278. debug_dump_node(ctx, "OMA-DM Package 1 (sub prov)", syncml);
  279. return syncml;
  280. }
  281. static xml_node_t * build_oma_dm_1_pol_upd(struct hs20_osu_client *ctx,
  282. const char *url, int msgid)
  283. {
  284. xml_node_t *syncml;
  285. syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_POLICY_UPDATE);
  286. if (syncml)
  287. debug_dump_node(ctx, "OMA-DM Package 1 (pol upd)", syncml);
  288. return syncml;
  289. }
  290. static xml_node_t * build_oma_dm_1_sub_rem(struct hs20_osu_client *ctx,
  291. const char *url, int msgid)
  292. {
  293. xml_node_t *syncml;
  294. syncml = build_oma_dm_1(ctx, url, msgid,
  295. DM_HS20_SUBSCRIPTION_REMEDIATION);
  296. if (syncml)
  297. debug_dump_node(ctx, "OMA-DM Package 1 (sub rem)", syncml);
  298. return syncml;
  299. }
  300. static int oma_dm_exec_browser(struct hs20_osu_client *ctx, xml_node_t *exec)
  301. {
  302. xml_node_t *node;
  303. char *data;
  304. int res;
  305. node = get_node(ctx->xml, exec, "Item/Data");
  306. if (node == NULL) {
  307. wpa_printf(MSG_INFO, "No Data node found");
  308. return DM_RESP_BAD_REQUEST;
  309. }
  310. data = xml_node_get_text(ctx->xml, node);
  311. if (data == NULL) {
  312. wpa_printf(MSG_INFO, "Invalid data");
  313. return DM_RESP_BAD_REQUEST;
  314. }
  315. wpa_printf(MSG_INFO, "Data: %s", data);
  316. wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data);
  317. write_summary(ctx, "Launch browser to URI '%s'", data);
  318. res = hs20_web_browser(data);
  319. xml_node_get_text_free(ctx->xml, data);
  320. if (res > 0) {
  321. wpa_printf(MSG_INFO, "User response in browser completed successfully");
  322. write_summary(ctx, "User response in browser completed successfully");
  323. return DM_RESP_OK;
  324. } else {
  325. wpa_printf(MSG_INFO, "Failed to receive user response");
  326. write_summary(ctx, "Failed to receive user response");
  327. return DM_RESP_COMMAND_FAILED;
  328. }
  329. }
  330. static int oma_dm_exec_get_cert(struct hs20_osu_client *ctx, xml_node_t *exec)
  331. {
  332. xml_node_t *node, *getcert;
  333. char *data;
  334. const char *name;
  335. int res;
  336. wpa_printf(MSG_INFO, "Client certificate enrollment");
  337. write_summary(ctx, "Client certificate enrollment");
  338. node = get_node(ctx->xml, exec, "Item/Data");
  339. if (node == NULL) {
  340. wpa_printf(MSG_INFO, "No Data node found");
  341. return DM_RESP_BAD_REQUEST;
  342. }
  343. data = xml_node_get_text(ctx->xml, node);
  344. if (data == NULL) {
  345. wpa_printf(MSG_INFO, "Invalid data");
  346. return DM_RESP_BAD_REQUEST;
  347. }
  348. wpa_printf(MSG_INFO, "Data: %s", data);
  349. getcert = xml_node_from_buf(ctx->xml, data);
  350. xml_node_get_text_free(ctx->xml, data);
  351. if (getcert == NULL) {
  352. wpa_printf(MSG_INFO, "Could not parse Item/Data node contents");
  353. return DM_RESP_BAD_REQUEST;
  354. }
  355. debug_dump_node(ctx, "OMA-DM getCertificate", getcert);
  356. name = xml_node_get_localname(ctx->xml, getcert);
  357. if (name == NULL || os_strcasecmp(name, "getCertificate") != 0) {
  358. wpa_printf(MSG_INFO, "Unexpected getCertificate node name '%s'",
  359. name);
  360. return DM_RESP_BAD_REQUEST;
  361. }
  362. res = osu_get_certificate(ctx, getcert);
  363. xml_node_free(ctx->xml, getcert);
  364. return res == 0 ? DM_RESP_OK : DM_RESP_COMMAND_FAILED;
  365. }
  366. static int oma_dm_exec(struct hs20_osu_client *ctx, xml_node_t *exec)
  367. {
  368. char *locuri;
  369. int ret;
  370. locuri = oma_dm_get_target_locuri(ctx, exec);
  371. if (locuri == NULL) {
  372. wpa_printf(MSG_INFO, "No Target LocURI node found");
  373. return DM_RESP_BAD_REQUEST;
  374. }
  375. wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
  376. if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
  377. "launchBrowserToURI") == 0) {
  378. ret = oma_dm_exec_browser(ctx, exec);
  379. } else if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
  380. "getCertificate") == 0) {
  381. ret = oma_dm_exec_get_cert(ctx, exec);
  382. } else {
  383. wpa_printf(MSG_INFO, "Unsupported exec Target LocURI");
  384. ret = DM_RESP_NOT_FOUND;
  385. }
  386. os_free(locuri);
  387. return ret;
  388. }
  389. static int oma_dm_run_add(struct hs20_osu_client *ctx, const char *locuri,
  390. xml_node_t *add, xml_node_t *pps,
  391. const char *pps_fname)
  392. {
  393. const char *pos;
  394. size_t fqdn_len;
  395. xml_node_t *node, *tnds, *unode, *pps_node;
  396. char *data, *uri, *upos, *end;
  397. int use_tnds = 0;
  398. size_t uri_len;
  399. wpa_printf(MSG_INFO, "Add command target LocURI: %s", locuri);
  400. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  401. wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi");
  402. return DM_RESP_PERMISSION_DENIED;
  403. }
  404. pos = locuri + 8;
  405. if (ctx->fqdn == NULL)
  406. return DM_RESP_COMMAND_FAILED;
  407. fqdn_len = os_strlen(ctx->fqdn);
  408. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  409. pos[fqdn_len] != '/') {
  410. wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi/%s",
  411. ctx->fqdn);
  412. return DM_RESP_PERMISSION_DENIED;
  413. }
  414. pos += fqdn_len + 1;
  415. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  416. wpa_printf(MSG_INFO,
  417. "Do not allow Add outside ./Wi-Fi/%s/PerProviderSubscription",
  418. ctx->fqdn);
  419. return DM_RESP_PERMISSION_DENIED;
  420. }
  421. pos += 24;
  422. wpa_printf(MSG_INFO, "Add command for PPS node %s", pos);
  423. pps_node = get_node(ctx->xml, pps, pos);
  424. if (pps_node) {
  425. wpa_printf(MSG_INFO, "Specified PPS node exists already");
  426. return DM_RESP_ALREADY_EXISTS;
  427. }
  428. uri = os_strdup(pos);
  429. if (uri == NULL)
  430. return DM_RESP_COMMAND_FAILED;
  431. while (!pps_node) {
  432. upos = os_strrchr(uri, '/');
  433. if (!upos)
  434. break;
  435. upos[0] = '\0';
  436. pps_node = get_node(ctx->xml, pps, uri);
  437. wpa_printf(MSG_INFO, "Node %s %s", uri,
  438. pps_node ? "exists" : "does not exist");
  439. }
  440. wpa_printf(MSG_INFO, "Parent URI: %s", uri);
  441. if (!pps_node) {
  442. /* Add at root of PPS MO */
  443. pps_node = pps;
  444. }
  445. uri_len = os_strlen(uri);
  446. os_strlcpy(uri, pos + uri_len, os_strlen(pos));
  447. upos = uri;
  448. while (*upos == '/')
  449. upos++;
  450. wpa_printf(MSG_INFO, "Nodes to add: %s", upos);
  451. for (;;) {
  452. end = os_strchr(upos, '/');
  453. if (!end)
  454. break;
  455. *end = '\0';
  456. wpa_printf(MSG_INFO, "Adding interim node %s", upos);
  457. pps_node = xml_node_create(ctx->xml, pps_node, NULL, upos);
  458. if (pps_node == NULL) {
  459. os_free(uri);
  460. return DM_RESP_COMMAND_FAILED;
  461. }
  462. upos = end + 1;
  463. }
  464. wpa_printf(MSG_INFO, "Adding node %s", upos);
  465. node = get_node(ctx->xml, add, "Item/Meta/Type");
  466. if (node) {
  467. char *type;
  468. type = xml_node_get_text(ctx->xml, node);
  469. if (type == NULL) {
  470. wpa_printf(MSG_ERROR, "Could not find type text");
  471. os_free(uri);
  472. return DM_RESP_BAD_REQUEST;
  473. }
  474. use_tnds = node &&
  475. os_strstr(type, "application/vnd.syncml.dmtnds+xml");
  476. }
  477. node = get_node(ctx->xml, add, "Item/Data");
  478. if (node == NULL) {
  479. wpa_printf(MSG_INFO, "No Add/Item/Data found");
  480. os_free(uri);
  481. return DM_RESP_BAD_REQUEST;
  482. }
  483. data = xml_node_get_text(ctx->xml, node);
  484. if (data == NULL) {
  485. wpa_printf(MSG_INFO, "Could not get Add/Item/Data text");
  486. os_free(uri);
  487. return DM_RESP_BAD_REQUEST;
  488. }
  489. wpa_printf(MSG_DEBUG, "Add/Item/Data: %s", data);
  490. if (use_tnds) {
  491. tnds = xml_node_from_buf(ctx->xml, data);
  492. xml_node_get_text_free(ctx->xml, data);
  493. if (tnds == NULL) {
  494. wpa_printf(MSG_INFO,
  495. "Could not parse Add/Item/Data text");
  496. os_free(uri);
  497. return DM_RESP_BAD_REQUEST;
  498. }
  499. unode = tnds_to_mo(ctx->xml, tnds);
  500. xml_node_free(ctx->xml, tnds);
  501. if (unode == NULL) {
  502. wpa_printf(MSG_INFO, "Could not parse TNDS text");
  503. os_free(uri);
  504. return DM_RESP_BAD_REQUEST;
  505. }
  506. debug_dump_node(ctx, "Parsed TNDS", unode);
  507. xml_node_add_child(ctx->xml, pps_node, unode);
  508. } else {
  509. /* TODO: What to do here? */
  510. os_free(uri);
  511. return DM_RESP_BAD_REQUEST;
  512. }
  513. os_free(uri);
  514. if (update_pps_file(ctx, pps_fname, pps) < 0)
  515. return DM_RESP_COMMAND_FAILED;
  516. ctx->pps_updated = 1;
  517. return DM_RESP_OK;
  518. }
  519. static int oma_dm_add(struct hs20_osu_client *ctx, xml_node_t *add,
  520. xml_node_t *pps, const char *pps_fname)
  521. {
  522. xml_node_t *node;
  523. char *locuri;
  524. char fname[300];
  525. int ret;
  526. node = get_node(ctx->xml, add, "Item/Target/LocURI");
  527. if (node == NULL) {
  528. wpa_printf(MSG_INFO, "No Target LocURI node found");
  529. return DM_RESP_BAD_REQUEST;
  530. }
  531. locuri = xml_node_get_text(ctx->xml, node);
  532. if (locuri == NULL) {
  533. wpa_printf(MSG_ERROR, "No LocURI node text found");
  534. return DM_RESP_BAD_REQUEST;
  535. }
  536. wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
  537. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  538. wpa_printf(MSG_INFO, "Unsupported Add Target LocURI");
  539. xml_node_get_text_free(ctx->xml, locuri);
  540. return DM_RESP_PERMISSION_DENIED;
  541. }
  542. node = get_node(ctx->xml, add, "Item/Data");
  543. if (node == NULL) {
  544. wpa_printf(MSG_INFO, "No Data node found");
  545. xml_node_get_text_free(ctx->xml, locuri);
  546. return DM_RESP_BAD_REQUEST;
  547. }
  548. if (pps_fname && os_file_exists(pps_fname)) {
  549. ret = oma_dm_run_add(ctx, locuri, add, pps, pps_fname);
  550. if (ret != DM_RESP_OK) {
  551. xml_node_get_text_free(ctx->xml, locuri);
  552. return ret;
  553. }
  554. ret = 0;
  555. os_strlcpy(fname, pps_fname, sizeof(fname));
  556. } else
  557. ret = hs20_add_pps_mo(ctx, locuri, node, fname, sizeof(fname));
  558. xml_node_get_text_free(ctx->xml, locuri);
  559. if (ret < 0)
  560. return ret == -2 ? DM_RESP_ALREADY_EXISTS :
  561. DM_RESP_COMMAND_FAILED;
  562. if (ctx->no_reconnect == 2) {
  563. os_snprintf(ctx->pps_fname, sizeof(ctx->pps_fname), "%s",
  564. fname);
  565. ctx->pps_cred_set = 1;
  566. return DM_RESP_OK;
  567. }
  568. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  569. cmd_set_pps(ctx, fname);
  570. if (ctx->no_reconnect)
  571. return DM_RESP_OK;
  572. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  573. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0)
  574. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  575. return DM_RESP_OK;
  576. }
  577. static int oma_dm_replace(struct hs20_osu_client *ctx, xml_node_t *replace,
  578. xml_node_t *pps, const char *pps_fname)
  579. {
  580. char *locuri, *pos;
  581. size_t fqdn_len;
  582. xml_node_t *node, *tnds, *unode, *pps_node, *parent;
  583. char *data;
  584. int use_tnds = 0;
  585. locuri = oma_dm_get_target_locuri(ctx, replace);
  586. if (locuri == NULL)
  587. return DM_RESP_BAD_REQUEST;
  588. wpa_printf(MSG_INFO, "Replace command target LocURI: %s", locuri);
  589. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  590. wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi");
  591. os_free(locuri);
  592. return DM_RESP_PERMISSION_DENIED;
  593. }
  594. pos = locuri + 8;
  595. if (ctx->fqdn == NULL) {
  596. os_free(locuri);
  597. return DM_RESP_COMMAND_FAILED;
  598. }
  599. fqdn_len = os_strlen(ctx->fqdn);
  600. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  601. pos[fqdn_len] != '/') {
  602. wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi/%s",
  603. ctx->fqdn);
  604. os_free(locuri);
  605. return DM_RESP_PERMISSION_DENIED;
  606. }
  607. pos += fqdn_len + 1;
  608. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  609. wpa_printf(MSG_INFO,
  610. "Do not allow Replace outside ./Wi-Fi/%s/PerProviderSubscription",
  611. ctx->fqdn);
  612. os_free(locuri);
  613. return DM_RESP_PERMISSION_DENIED;
  614. }
  615. pos += 24;
  616. wpa_printf(MSG_INFO, "Replace command for PPS node %s", pos);
  617. pps_node = get_node(ctx->xml, pps, pos);
  618. if (pps_node == NULL) {
  619. wpa_printf(MSG_INFO, "Specified PPS node not found");
  620. os_free(locuri);
  621. return DM_RESP_NOT_FOUND;
  622. }
  623. node = get_node(ctx->xml, replace, "Item/Meta/Type");
  624. if (node) {
  625. char *type;
  626. type = xml_node_get_text(ctx->xml, node);
  627. use_tnds = node &&
  628. os_strstr(type, "application/vnd.syncml.dmtnds+xml");
  629. }
  630. node = get_node(ctx->xml, replace, "Item/Data");
  631. if (node == NULL) {
  632. wpa_printf(MSG_INFO, "No Replace/Item/Data found");
  633. os_free(locuri);
  634. return DM_RESP_BAD_REQUEST;
  635. }
  636. data = xml_node_get_text(ctx->xml, node);
  637. if (data == NULL) {
  638. wpa_printf(MSG_INFO, "Could not get Replace/Item/Data text");
  639. os_free(locuri);
  640. return DM_RESP_BAD_REQUEST;
  641. }
  642. wpa_printf(MSG_DEBUG, "Replace/Item/Data: %s", data);
  643. if (use_tnds) {
  644. tnds = xml_node_from_buf(ctx->xml, data);
  645. xml_node_get_text_free(ctx->xml, data);
  646. if (tnds == NULL) {
  647. wpa_printf(MSG_INFO,
  648. "Could not parse Replace/Item/Data text");
  649. os_free(locuri);
  650. return DM_RESP_BAD_REQUEST;
  651. }
  652. unode = tnds_to_mo(ctx->xml, tnds);
  653. xml_node_free(ctx->xml, tnds);
  654. if (unode == NULL) {
  655. wpa_printf(MSG_INFO, "Could not parse TNDS text");
  656. os_free(locuri);
  657. return DM_RESP_BAD_REQUEST;
  658. }
  659. debug_dump_node(ctx, "Parsed TNDS", unode);
  660. parent = xml_node_get_parent(ctx->xml, pps_node);
  661. xml_node_detach(ctx->xml, pps_node);
  662. xml_node_add_child(ctx->xml, parent, unode);
  663. } else {
  664. xml_node_set_text(ctx->xml, pps_node, data);
  665. xml_node_get_text_free(ctx->xml, data);
  666. }
  667. os_free(locuri);
  668. if (update_pps_file(ctx, pps_fname, pps) < 0)
  669. return DM_RESP_COMMAND_FAILED;
  670. ctx->pps_updated = 1;
  671. return DM_RESP_OK;
  672. }
  673. static int oma_dm_get(struct hs20_osu_client *ctx, xml_node_t *get,
  674. xml_node_t *pps, const char *pps_fname, char **value)
  675. {
  676. char *locuri, *pos;
  677. size_t fqdn_len;
  678. xml_node_t *pps_node;
  679. const char *name;
  680. *value = NULL;
  681. locuri = oma_dm_get_target_locuri(ctx, get);
  682. if (locuri == NULL)
  683. return DM_RESP_BAD_REQUEST;
  684. wpa_printf(MSG_INFO, "Get command target LocURI: %s", locuri);
  685. if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
  686. wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi");
  687. os_free(locuri);
  688. return DM_RESP_PERMISSION_DENIED;
  689. }
  690. pos = locuri + 8;
  691. if (ctx->fqdn == NULL)
  692. return DM_RESP_COMMAND_FAILED;
  693. fqdn_len = os_strlen(ctx->fqdn);
  694. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  695. pos[fqdn_len] != '/') {
  696. wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi/%s",
  697. ctx->fqdn);
  698. os_free(locuri);
  699. return DM_RESP_PERMISSION_DENIED;
  700. }
  701. pos += fqdn_len + 1;
  702. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  703. wpa_printf(MSG_INFO,
  704. "Do not allow Get outside ./Wi-Fi/%s/PerProviderSubscription",
  705. ctx->fqdn);
  706. os_free(locuri);
  707. return DM_RESP_PERMISSION_DENIED;
  708. }
  709. pos += 24;
  710. wpa_printf(MSG_INFO, "Get command for PPS node %s", pos);
  711. pps_node = get_node(ctx->xml, pps, pos);
  712. if (pps_node == NULL) {
  713. wpa_printf(MSG_INFO, "Specified PPS node not found");
  714. os_free(locuri);
  715. return DM_RESP_NOT_FOUND;
  716. }
  717. name = xml_node_get_localname(ctx->xml, pps_node);
  718. wpa_printf(MSG_INFO, "Get command returned node with name '%s'", name);
  719. if (os_strcasecmp(name, "Password") == 0) {
  720. wpa_printf(MSG_INFO, "Do not allow Get for Password node");
  721. os_free(locuri);
  722. return DM_RESP_PERMISSION_DENIED;
  723. }
  724. /*
  725. * TODO: No support for DMTNDS, so if interior node, reply with a
  726. * list of children node names in Results element. The child list type is
  727. * defined in [DMTND].
  728. */
  729. *value = xml_node_get_text(ctx->xml, pps_node);
  730. if (*value == NULL)
  731. return DM_RESP_COMMAND_FAILED;
  732. return DM_RESP_OK;
  733. }
  734. static int oma_dm_get_cmdid(struct hs20_osu_client *ctx, xml_node_t *node)
  735. {
  736. xml_node_t *cnode;
  737. char *str;
  738. int ret;
  739. cnode = get_node(ctx->xml, node, "CmdID");
  740. if (cnode == NULL)
  741. return 0;
  742. str = xml_node_get_text(ctx->xml, cnode);
  743. if (str == NULL)
  744. return 0;
  745. ret = atoi(str);
  746. xml_node_get_text_free(ctx->xml, str);
  747. return ret;
  748. }
  749. static xml_node_t * oma_dm_send_recv(struct hs20_osu_client *ctx,
  750. const char *url, xml_node_t *syncml,
  751. const char *ext_hdr,
  752. const char *username, const char *password,
  753. const char *client_cert,
  754. const char *client_key)
  755. {
  756. xml_node_t *resp;
  757. char *str, *res;
  758. char *resp_uri = NULL;
  759. str = xml_node_to_str(ctx->xml, syncml);
  760. xml_node_free(ctx->xml, syncml);
  761. if (str == NULL)
  762. return NULL;
  763. wpa_printf(MSG_INFO, "Send OMA DM Package");
  764. write_summary(ctx, "Send OMA DM Package");
  765. os_free(ctx->server_url);
  766. ctx->server_url = os_strdup(url);
  767. res = http_post(ctx->http, url, str, "application/vnd.syncml.dm+xml",
  768. ext_hdr, ctx->ca_fname, username, password,
  769. client_cert, client_key, NULL);
  770. os_free(str);
  771. os_free(resp_uri);
  772. resp_uri = NULL;
  773. if (res == NULL) {
  774. const char *err = http_get_err(ctx->http);
  775. if (err) {
  776. wpa_printf(MSG_INFO, "HTTP error: %s", err);
  777. write_result(ctx, "HTTP error: %s", err);
  778. } else {
  779. write_summary(ctx, "Failed to send OMA DM Package");
  780. }
  781. return NULL;
  782. }
  783. wpa_printf(MSG_DEBUG, "Server response: %s", res);
  784. wpa_printf(MSG_INFO, "Process OMA DM Package");
  785. write_summary(ctx, "Process received OMA DM Package");
  786. resp = xml_node_from_buf(ctx->xml, res);
  787. os_free(res);
  788. if (resp == NULL) {
  789. wpa_printf(MSG_INFO, "Failed to parse OMA DM response");
  790. return NULL;
  791. }
  792. debug_dump_node(ctx, "OMA DM Package", resp);
  793. return resp;
  794. }
  795. static xml_node_t * oma_dm_process(struct hs20_osu_client *ctx, const char *url,
  796. xml_node_t *resp, int msgid,
  797. char **ret_resp_uri,
  798. xml_node_t *pps, const char *pps_fname)
  799. {
  800. xml_node_t *syncml, *syncbody, *hdr, *body, *child;
  801. const char *name;
  802. char *resp_uri = NULL;
  803. int server_msgid = 0;
  804. int cmdid = 0;
  805. int server_cmdid;
  806. int resp_needed = 0;
  807. char *tmp;
  808. int final = 0;
  809. char *locuri;
  810. *ret_resp_uri = NULL;
  811. name = xml_node_get_localname(ctx->xml, resp);
  812. if (name == NULL || os_strcasecmp(name, "SyncML") != 0) {
  813. wpa_printf(MSG_INFO, "SyncML node not found");
  814. return NULL;
  815. }
  816. hdr = get_node(ctx->xml, resp, "SyncHdr");
  817. body = get_node(ctx->xml, resp, "SyncBody");
  818. if (hdr == NULL || body == NULL) {
  819. wpa_printf(MSG_INFO, "Could not find SyncHdr or SyncBody");
  820. return NULL;
  821. }
  822. xml_node_for_each_child(ctx->xml, child, hdr) {
  823. xml_node_for_each_check(ctx->xml, child);
  824. name = xml_node_get_localname(ctx->xml, child);
  825. wpa_printf(MSG_INFO, "SyncHdr %s", name);
  826. if (os_strcasecmp(name, "RespURI") == 0) {
  827. tmp = xml_node_get_text(ctx->xml, child);
  828. if (tmp)
  829. resp_uri = os_strdup(tmp);
  830. xml_node_get_text_free(ctx->xml, tmp);
  831. } else if (os_strcasecmp(name, "MsgID") == 0) {
  832. tmp = xml_node_get_text(ctx->xml, child);
  833. if (tmp)
  834. server_msgid = atoi(tmp);
  835. xml_node_get_text_free(ctx->xml, tmp);
  836. }
  837. }
  838. wpa_printf(MSG_INFO, "Server MsgID: %d", server_msgid);
  839. if (resp_uri)
  840. wpa_printf(MSG_INFO, "RespURI: %s", resp_uri);
  841. syncml = oma_dm_build_hdr(ctx, resp_uri ? resp_uri : url, msgid);
  842. if (syncml == NULL) {
  843. os_free(resp_uri);
  844. return NULL;
  845. }
  846. syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
  847. cmdid++;
  848. add_status(ctx, syncbody, server_msgid, 0, cmdid, "SyncHdr",
  849. DM_RESP_AUTH_ACCEPTED, NULL);
  850. xml_node_for_each_child(ctx->xml, child, body) {
  851. xml_node_for_each_check(ctx->xml, child);
  852. server_cmdid = oma_dm_get_cmdid(ctx, child);
  853. name = xml_node_get_localname(ctx->xml, child);
  854. wpa_printf(MSG_INFO, "SyncBody CmdID=%d - %s",
  855. server_cmdid, name);
  856. if (os_strcasecmp(name, "Exec") == 0) {
  857. int res = oma_dm_exec(ctx, child);
  858. cmdid++;
  859. locuri = oma_dm_get_target_locuri(ctx, child);
  860. if (locuri == NULL)
  861. res = DM_RESP_BAD_REQUEST;
  862. add_status(ctx, syncbody, server_msgid, server_cmdid,
  863. cmdid, name, res, locuri);
  864. os_free(locuri);
  865. resp_needed = 1;
  866. } else if (os_strcasecmp(name, "Add") == 0) {
  867. int res = oma_dm_add(ctx, child, pps, pps_fname);
  868. cmdid++;
  869. locuri = oma_dm_get_target_locuri(ctx, child);
  870. if (locuri == NULL)
  871. res = DM_RESP_BAD_REQUEST;
  872. add_status(ctx, syncbody, server_msgid, server_cmdid,
  873. cmdid, name, res, locuri);
  874. os_free(locuri);
  875. resp_needed = 1;
  876. } else if (os_strcasecmp(name, "Replace") == 0) {
  877. int res;
  878. res = oma_dm_replace(ctx, child, pps, pps_fname);
  879. cmdid++;
  880. locuri = oma_dm_get_target_locuri(ctx, child);
  881. if (locuri == NULL)
  882. res = DM_RESP_BAD_REQUEST;
  883. add_status(ctx, syncbody, server_msgid, server_cmdid,
  884. cmdid, name, res, locuri);
  885. os_free(locuri);
  886. resp_needed = 1;
  887. } else if (os_strcasecmp(name, "Status") == 0) {
  888. /* TODO: Verify success */
  889. } else if (os_strcasecmp(name, "Get") == 0) {
  890. int res;
  891. char *value;
  892. res = oma_dm_get(ctx, child, pps, pps_fname, &value);
  893. cmdid++;
  894. locuri = oma_dm_get_target_locuri(ctx, child);
  895. if (locuri == NULL)
  896. res = DM_RESP_BAD_REQUEST;
  897. add_status(ctx, syncbody, server_msgid, server_cmdid,
  898. cmdid, name, res, locuri);
  899. if (res == DM_RESP_OK && value) {
  900. cmdid++;
  901. add_results(ctx, syncbody, server_msgid,
  902. server_cmdid, cmdid, locuri, value);
  903. }
  904. os_free(locuri);
  905. xml_node_get_text_free(ctx->xml, value);
  906. resp_needed = 1;
  907. #if 0 /* TODO: MUST support */
  908. } else if (os_strcasecmp(name, "Delete") == 0) {
  909. #endif
  910. #if 0 /* TODO: MUST support */
  911. } else if (os_strcasecmp(name, "Sequence") == 0) {
  912. #endif
  913. } else if (os_strcasecmp(name, "Final") == 0) {
  914. final = 1;
  915. break;
  916. } else {
  917. locuri = oma_dm_get_target_locuri(ctx, child);
  918. add_status(ctx, syncbody, server_msgid, server_cmdid,
  919. cmdid, name, DM_RESP_COMMAND_NOT_IMPLEMENTED,
  920. locuri);
  921. os_free(locuri);
  922. resp_needed = 1;
  923. }
  924. }
  925. if (!final) {
  926. wpa_printf(MSG_INFO, "Final node not found");
  927. xml_node_free(ctx->xml, syncml);
  928. os_free(resp_uri);
  929. return NULL;
  930. }
  931. if (!resp_needed) {
  932. wpa_printf(MSG_INFO, "Exchange completed - no response needed");
  933. xml_node_free(ctx->xml, syncml);
  934. os_free(resp_uri);
  935. return NULL;
  936. }
  937. xml_node_create(ctx->xml, syncbody, NULL, "Final");
  938. debug_dump_node(ctx, "OMA-DM Package 3", syncml);
  939. *ret_resp_uri = resp_uri;
  940. return syncml;
  941. }
  942. int cmd_oma_dm_prov(struct hs20_osu_client *ctx, const char *url)
  943. {
  944. xml_node_t *syncml, *resp;
  945. char *resp_uri = NULL;
  946. int msgid = 0;
  947. if (url == NULL) {
  948. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  949. return -1;
  950. }
  951. wpa_printf(MSG_INFO, "OMA-DM credential provisioning requested");
  952. write_summary(ctx, "OMA-DM credential provisioning");
  953. msgid++;
  954. syncml = build_oma_dm_1_sub_reg(ctx, url, msgid);
  955. if (syncml == NULL)
  956. return -1;
  957. while (syncml) {
  958. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
  959. syncml, NULL, NULL, NULL, NULL, NULL);
  960. if (resp == NULL)
  961. return -1;
  962. msgid++;
  963. syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
  964. NULL, NULL);
  965. xml_node_free(ctx->xml, resp);
  966. }
  967. os_free(resp_uri);
  968. return ctx->pps_cred_set ? 0 : -1;
  969. }
  970. int cmd_oma_dm_sim_prov(struct hs20_osu_client *ctx, const char *url)
  971. {
  972. xml_node_t *syncml, *resp;
  973. char *resp_uri = NULL;
  974. int msgid = 0;
  975. if (url == NULL) {
  976. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  977. return -1;
  978. }
  979. wpa_printf(MSG_INFO, "OMA-DM SIM provisioning requested");
  980. ctx->no_reconnect = 2;
  981. wpa_printf(MSG_INFO, "Wait for IP address before starting SIM provisioning");
  982. write_summary(ctx, "Wait for IP address before starting SIM provisioning");
  983. if (wait_ip_addr(ctx->ifname, 15) < 0) {
  984. wpa_printf(MSG_INFO, "Could not get IP address for WLAN - try connection anyway");
  985. }
  986. write_summary(ctx, "OMA-DM SIM provisioning");
  987. msgid++;
  988. syncml = build_oma_dm_1_sub_prov(ctx, url, msgid);
  989. if (syncml == NULL)
  990. return -1;
  991. while (syncml) {
  992. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
  993. syncml, NULL, NULL, NULL, NULL, NULL);
  994. if (resp == NULL)
  995. return -1;
  996. msgid++;
  997. syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
  998. NULL, NULL);
  999. xml_node_free(ctx->xml, resp);
  1000. }
  1001. os_free(resp_uri);
  1002. if (ctx->pps_cred_set) {
  1003. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  1004. cmd_set_pps(ctx, ctx->pps_fname);
  1005. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  1006. write_summary(ctx, "Requesting reconnection with updated configuration");
  1007. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  1008. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  1009. write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
  1010. return -1;
  1011. }
  1012. }
  1013. return ctx->pps_cred_set ? 0 : -1;
  1014. }
  1015. void oma_dm_pol_upd(struct hs20_osu_client *ctx, const char *address,
  1016. const char *pps_fname,
  1017. const char *client_cert, const char *client_key,
  1018. const char *cred_username, const char *cred_password,
  1019. xml_node_t *pps)
  1020. {
  1021. xml_node_t *syncml, *resp;
  1022. char *resp_uri = NULL;
  1023. int msgid = 0;
  1024. wpa_printf(MSG_INFO, "OMA-DM policy update");
  1025. write_summary(ctx, "OMA-DM policy update");
  1026. msgid++;
  1027. syncml = build_oma_dm_1_pol_upd(ctx, address, msgid);
  1028. if (syncml == NULL)
  1029. return;
  1030. while (syncml) {
  1031. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
  1032. syncml, NULL, cred_username,
  1033. cred_password, client_cert, client_key);
  1034. if (resp == NULL)
  1035. return;
  1036. msgid++;
  1037. syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
  1038. pps, pps_fname);
  1039. xml_node_free(ctx->xml, resp);
  1040. }
  1041. os_free(resp_uri);
  1042. if (ctx->pps_updated) {
  1043. wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO");
  1044. write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request connection");
  1045. cmd_set_pps(ctx, pps_fname);
  1046. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  1047. wpa_printf(MSG_INFO,
  1048. "Failed to request wpa_supplicant to reconnect");
  1049. write_summary(ctx,
  1050. "Failed to request wpa_supplicant to reconnect");
  1051. }
  1052. }
  1053. }
  1054. void oma_dm_sub_rem(struct hs20_osu_client *ctx, const char *address,
  1055. const char *pps_fname,
  1056. const char *client_cert, const char *client_key,
  1057. const char *cred_username, const char *cred_password,
  1058. xml_node_t *pps)
  1059. {
  1060. xml_node_t *syncml, *resp;
  1061. char *resp_uri = NULL;
  1062. int msgid = 0;
  1063. wpa_printf(MSG_INFO, "OMA-DM subscription remediation");
  1064. write_summary(ctx, "OMA-DM subscription remediation");
  1065. msgid++;
  1066. syncml = build_oma_dm_1_sub_rem(ctx, address, msgid);
  1067. if (syncml == NULL)
  1068. return;
  1069. while (syncml) {
  1070. resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
  1071. syncml, NULL, cred_username,
  1072. cred_password, client_cert, client_key);
  1073. if (resp == NULL)
  1074. return;
  1075. msgid++;
  1076. syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
  1077. pps, pps_fname);
  1078. xml_node_free(ctx->xml, resp);
  1079. }
  1080. os_free(resp_uri);
  1081. wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
  1082. write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
  1083. cmd_set_pps(ctx, pps_fname);
  1084. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
  1085. wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
  1086. write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
  1087. }
  1088. }
  1089. void cmd_oma_dm_add(struct hs20_osu_client *ctx, const char *pps_fname,
  1090. const char *add_fname)
  1091. {
  1092. xml_node_t *pps, *add;
  1093. int res;
  1094. ctx->fqdn = os_strdup("wi-fi.org");
  1095. pps = node_from_file(ctx->xml, pps_fname);
  1096. if (pps == NULL) {
  1097. wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
  1098. pps_fname);
  1099. return;
  1100. }
  1101. add = node_from_file(ctx->xml, add_fname);
  1102. if (add == NULL) {
  1103. wpa_printf(MSG_INFO, "Add file %s could not be parsed",
  1104. add_fname);
  1105. xml_node_free(ctx->xml, pps);
  1106. return;
  1107. }
  1108. res = oma_dm_add(ctx, add, pps, pps_fname);
  1109. wpa_printf(MSG_INFO, "oma_dm_add --> %d", res);
  1110. xml_node_free(ctx->xml, pps);
  1111. xml_node_free(ctx->xml, add);
  1112. }
  1113. void cmd_oma_dm_replace(struct hs20_osu_client *ctx, const char *pps_fname,
  1114. const char *replace_fname)
  1115. {
  1116. xml_node_t *pps, *replace;
  1117. int res;
  1118. ctx->fqdn = os_strdup("wi-fi.org");
  1119. pps = node_from_file(ctx->xml, pps_fname);
  1120. if (pps == NULL) {
  1121. wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
  1122. pps_fname);
  1123. return;
  1124. }
  1125. replace = node_from_file(ctx->xml, replace_fname);
  1126. if (replace == NULL) {
  1127. wpa_printf(MSG_INFO, "Replace file %s could not be parsed",
  1128. replace_fname);
  1129. xml_node_free(ctx->xml, pps);
  1130. return;
  1131. }
  1132. res = oma_dm_replace(ctx, replace, pps, pps_fname);
  1133. wpa_printf(MSG_INFO, "oma_dm_replace --> %d", res);
  1134. xml_node_free(ctx->xml, pps);
  1135. xml_node_free(ctx->xml, replace);
  1136. }