spp_client.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001
  1. /*
  2. * Hotspot 2.0 SPP client
  3. * Copyright (c) 2012-2013, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include <sys/stat.h>
  10. #include "common.h"
  11. #include "browser.h"
  12. #include "wpa_ctrl.h"
  13. #include "wpa_helpers.h"
  14. #include "xml-utils.h"
  15. #include "http-utils.h"
  16. #include "utils/base64.h"
  17. #include "crypto/crypto.h"
  18. #include "crypto/sha256.h"
  19. #include "osu_client.h"
  20. static int hs20_spp_update_response(struct hs20_osu_client *ctx,
  21. const char *session_id,
  22. const char *spp_status,
  23. const char *error_code);
  24. static void hs20_policy_update_complete(
  25. struct hs20_osu_client *ctx, const char *pps_fname);
  26. static char * get_spp_attr_value(struct xml_node_ctx *ctx, xml_node_t *node,
  27. char *attr_name)
  28. {
  29. return xml_node_get_attr_value_ns(ctx, node, SPP_NS_URI, attr_name);
  30. }
  31. static int hs20_spp_validate(struct hs20_osu_client *ctx, xml_node_t *node,
  32. const char *expected_name)
  33. {
  34. struct xml_node_ctx *xctx = ctx->xml;
  35. const char *name;
  36. char *err;
  37. int ret;
  38. if (!xml_node_is_element(xctx, node))
  39. return -1;
  40. name = xml_node_get_localname(xctx, node);
  41. if (name == NULL)
  42. return -1;
  43. if (strcmp(expected_name, name) != 0) {
  44. wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')",
  45. name, expected_name);
  46. write_summary(ctx, "Unexpected SOAP method name '%s' (expected '%s')",
  47. name, expected_name);
  48. return -1;
  49. }
  50. ret = xml_validate(xctx, node, "spp.xsd", &err);
  51. if (ret < 0) {
  52. wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err);
  53. write_summary(ctx, "SPP XML schema validation failed");
  54. os_free(err);
  55. }
  56. return ret;
  57. }
  58. static void add_mo_container(struct xml_node_ctx *ctx, xml_namespace_t *ns,
  59. xml_node_t *parent, const char *urn,
  60. const char *fname)
  61. {
  62. xml_node_t *node;
  63. xml_node_t *fnode, *tnds;
  64. char *str;
  65. fnode = node_from_file(ctx, fname);
  66. if (!fnode)
  67. return;
  68. tnds = mo_to_tnds(ctx, fnode, 0, urn, "syncml:dmddf1.2");
  69. xml_node_free(ctx, fnode);
  70. if (!tnds)
  71. return;
  72. str = xml_node_to_str(ctx, tnds);
  73. xml_node_free(ctx, tnds);
  74. if (str == NULL)
  75. return;
  76. node = xml_node_create_text(ctx, parent, ns, "moContainer", str);
  77. if (node)
  78. xml_node_add_attr(ctx, node, ns, "moURN", urn);
  79. os_free(str);
  80. }
  81. static xml_node_t * build_spp_post_dev_data(struct hs20_osu_client *ctx,
  82. xml_namespace_t **ret_ns,
  83. const char *session_id,
  84. const char *reason)
  85. {
  86. xml_namespace_t *ns;
  87. xml_node_t *spp_node;
  88. write_summary(ctx, "Building sppPostDevData requestReason='%s'",
  89. reason);
  90. spp_node = xml_node_create_root(ctx->xml, SPP_NS_URI, "spp", &ns,
  91. "sppPostDevData");
  92. if (spp_node == NULL)
  93. return NULL;
  94. if (ret_ns)
  95. *ret_ns = ns;
  96. xml_node_add_attr(ctx->xml, spp_node, ns, "sppVersion", "1.0");
  97. xml_node_add_attr(ctx->xml, spp_node, NULL, "requestReason", reason);
  98. if (session_id)
  99. xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID",
  100. session_id);
  101. xml_node_add_attr(ctx->xml, spp_node, NULL, "redirectURI",
  102. "http://localhost:12345/");
  103. xml_node_create_text(ctx->xml, spp_node, ns, "supportedSPPVersions",
  104. "1.0");
  105. xml_node_create_text(ctx->xml, spp_node, ns, "supportedMOList",
  106. URN_HS20_PPS " " URN_OMA_DM_DEVINFO " "
  107. URN_OMA_DM_DEVDETAIL " " URN_HS20_DEVDETAIL_EXT);
  108. add_mo_container(ctx->xml, ns, spp_node, URN_OMA_DM_DEVINFO,
  109. "devinfo.xml");
  110. add_mo_container(ctx->xml, ns, spp_node, URN_OMA_DM_DEVDETAIL,
  111. "devdetail.xml");
  112. return spp_node;
  113. }
  114. static int process_update_node(struct hs20_osu_client *ctx, xml_node_t *pps,
  115. xml_node_t *update)
  116. {
  117. xml_node_t *node, *parent, *tnds, *unode;
  118. char *str;
  119. const char *name;
  120. char *uri, *pos;
  121. char *cdata, *cdata_end;
  122. size_t fqdn_len;
  123. wpa_printf(MSG_INFO, "Processing updateNode");
  124. debug_dump_node(ctx, "updateNode", update);
  125. uri = get_spp_attr_value(ctx->xml, update, "managementTreeURI");
  126. if (uri == NULL) {
  127. wpa_printf(MSG_INFO, "No managementTreeURI present");
  128. return -1;
  129. }
  130. wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri);
  131. name = os_strrchr(uri, '/');
  132. if (name == NULL) {
  133. wpa_printf(MSG_INFO, "Unexpected URI");
  134. xml_node_get_attr_value_free(ctx->xml, uri);
  135. return -1;
  136. }
  137. name++;
  138. wpa_printf(MSG_INFO, "Update interior node: '%s'", name);
  139. str = xml_node_get_text(ctx->xml, update);
  140. if (str == NULL) {
  141. wpa_printf(MSG_INFO, "Could not extract MO text");
  142. xml_node_get_attr_value_free(ctx->xml, uri);
  143. return -1;
  144. }
  145. wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text: '%s'", str);
  146. cdata = strstr(str, "<![CDATA[");
  147. cdata_end = strstr(str, "]]>");
  148. if (cdata && cdata_end && cdata_end > cdata &&
  149. cdata < strstr(str, "MgmtTree") &&
  150. cdata_end > strstr(str, "/MgmtTree")) {
  151. char *tmp;
  152. wpa_printf(MSG_DEBUG, "[hs20] Removing extra CDATA container");
  153. tmp = strdup(cdata + 9);
  154. if (tmp) {
  155. cdata_end = strstr(tmp, "]]>");
  156. if (cdata_end)
  157. *cdata_end = '\0';
  158. wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text with CDATA container removed: '%s'",
  159. tmp);
  160. tnds = xml_node_from_buf(ctx->xml, tmp);
  161. free(tmp);
  162. } else
  163. tnds = NULL;
  164. } else
  165. tnds = xml_node_from_buf(ctx->xml, str);
  166. xml_node_get_text_free(ctx->xml, str);
  167. if (tnds == NULL) {
  168. wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text");
  169. xml_node_get_attr_value_free(ctx->xml, uri);
  170. return -1;
  171. }
  172. unode = tnds_to_mo(ctx->xml, tnds);
  173. xml_node_free(ctx->xml, tnds);
  174. if (unode == NULL) {
  175. wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text");
  176. xml_node_get_attr_value_free(ctx->xml, uri);
  177. return -1;
  178. }
  179. debug_dump_node(ctx, "Parsed TNDS", unode);
  180. if (get_node_uri(ctx->xml, unode, name) == NULL) {
  181. wpa_printf(MSG_INFO, "[hs20] %s node not found", name);
  182. xml_node_free(ctx->xml, unode);
  183. xml_node_get_attr_value_free(ctx->xml, uri);
  184. return -1;
  185. }
  186. if (os_strncasecmp(uri, "./Wi-Fi/", 8) != 0) {
  187. wpa_printf(MSG_INFO, "Do not allow update outside ./Wi-Fi");
  188. xml_node_free(ctx->xml, unode);
  189. xml_node_get_attr_value_free(ctx->xml, uri);
  190. return -1;
  191. }
  192. pos = uri + 8;
  193. if (ctx->fqdn == NULL) {
  194. wpa_printf(MSG_INFO, "FQDN not known");
  195. xml_node_free(ctx->xml, unode);
  196. xml_node_get_attr_value_free(ctx->xml, uri);
  197. return -1;
  198. }
  199. fqdn_len = os_strlen(ctx->fqdn);
  200. if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
  201. pos[fqdn_len] != '/') {
  202. wpa_printf(MSG_INFO, "Do not allow update outside ./Wi-Fi/%s",
  203. ctx->fqdn);
  204. xml_node_free(ctx->xml, unode);
  205. xml_node_get_attr_value_free(ctx->xml, uri);
  206. return -1;
  207. }
  208. pos += fqdn_len + 1;
  209. if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
  210. wpa_printf(MSG_INFO, "Do not allow update outside ./Wi-Fi/%s/PerProviderSubscription",
  211. ctx->fqdn);
  212. xml_node_free(ctx->xml, unode);
  213. xml_node_get_attr_value_free(ctx->xml, uri);
  214. return -1;
  215. }
  216. pos += 24;
  217. wpa_printf(MSG_INFO, "Update command for PPS node %s", pos);
  218. node = get_node(ctx->xml, pps, pos);
  219. if (node) {
  220. parent = xml_node_get_parent(ctx->xml, node);
  221. xml_node_detach(ctx->xml, node);
  222. wpa_printf(MSG_INFO, "Replace '%s' node", name);
  223. } else {
  224. char *pos2;
  225. pos2 = os_strrchr(pos, '/');
  226. if (pos2 == NULL) {
  227. parent = pps;
  228. } else {
  229. *pos2 = '\0';
  230. parent = get_node(ctx->xml, pps, pos);
  231. }
  232. if (parent == NULL) {
  233. wpa_printf(MSG_INFO, "Could not find parent %s", pos);
  234. xml_node_free(ctx->xml, unode);
  235. xml_node_get_attr_value_free(ctx->xml, uri);
  236. return -1;
  237. }
  238. wpa_printf(MSG_INFO, "Add '%s' node", name);
  239. }
  240. xml_node_add_child(ctx->xml, parent, unode);
  241. xml_node_get_attr_value_free(ctx->xml, uri);
  242. return 0;
  243. }
  244. static int update_pps(struct hs20_osu_client *ctx, xml_node_t *update,
  245. const char *pps_fname, xml_node_t *pps)
  246. {
  247. wpa_printf(MSG_INFO, "Updating PPS based on updateNode element(s)");
  248. xml_node_for_each_sibling(ctx->xml, update) {
  249. xml_node_for_each_check(ctx->xml, update);
  250. if (process_update_node(ctx, pps, update) < 0)
  251. return -1;
  252. }
  253. return update_pps_file(ctx, pps_fname, pps);
  254. }
  255. static void hs20_sub_rem_complete(struct hs20_osu_client *ctx,
  256. const char *pps_fname)
  257. {
  258. /*
  259. * Update wpa_supplicant credentials and reconnect using updated
  260. * information.
  261. */
  262. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  263. cmd_set_pps(ctx, pps_fname);
  264. if (ctx->no_reconnect)
  265. return;
  266. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  267. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0)
  268. wpa_printf(MSG_ERROR, "Failed to request wpa_supplicant to reconnect");
  269. }
  270. static xml_node_t * hs20_spp_upload_mo(struct hs20_osu_client *ctx,
  271. xml_node_t *cmd,
  272. const char *session_id,
  273. const char *pps_fname)
  274. {
  275. xml_namespace_t *ns;
  276. xml_node_t *node, *ret_node;
  277. char *urn;
  278. urn = get_spp_attr_value(ctx->xml, cmd, "moURN");
  279. if (!urn) {
  280. wpa_printf(MSG_INFO, "No URN included");
  281. return NULL;
  282. }
  283. wpa_printf(MSG_INFO, "Upload MO request - URN=%s", urn);
  284. if (strcasecmp(urn, URN_HS20_PPS) != 0) {
  285. wpa_printf(MSG_INFO, "Unsupported moURN");
  286. xml_node_get_attr_value_free(ctx->xml, urn);
  287. return NULL;
  288. }
  289. xml_node_get_attr_value_free(ctx->xml, urn);
  290. if (!pps_fname) {
  291. wpa_printf(MSG_INFO, "PPS file name no known");
  292. return NULL;
  293. }
  294. node = build_spp_post_dev_data(ctx, &ns, session_id,
  295. "MO upload");
  296. if (node == NULL)
  297. return NULL;
  298. add_mo_container(ctx->xml, ns, node, URN_HS20_PPS, pps_fname);
  299. ret_node = soap_send_receive(ctx->http, node);
  300. if (ret_node == NULL)
  301. return NULL;
  302. debug_dump_node(ctx, "Received response to MO upload", ret_node);
  303. if (hs20_spp_validate(ctx, ret_node, "sppPostDevDataResponse") < 0) {
  304. wpa_printf(MSG_INFO, "SPP validation failed");
  305. xml_node_free(ctx->xml, ret_node);
  306. return NULL;
  307. }
  308. return ret_node;
  309. }
  310. static int hs20_add_mo(struct hs20_osu_client *ctx, xml_node_t *add_mo,
  311. char *fname, size_t fname_len)
  312. {
  313. char *uri, *urn;
  314. int ret;
  315. debug_dump_node(ctx, "Received addMO", add_mo);
  316. urn = get_spp_attr_value(ctx->xml, add_mo, "moURN");
  317. if (urn == NULL) {
  318. wpa_printf(MSG_INFO, "[hs20] No moURN in addMO");
  319. return -1;
  320. }
  321. wpa_printf(MSG_INFO, "addMO - moURN: '%s'", urn);
  322. if (strcasecmp(urn, URN_HS20_PPS) != 0) {
  323. wpa_printf(MSG_INFO, "[hs20] Unsupported MO in addMO");
  324. xml_node_get_attr_value_free(ctx->xml, urn);
  325. return -1;
  326. }
  327. xml_node_get_attr_value_free(ctx->xml, urn);
  328. uri = get_spp_attr_value(ctx->xml, add_mo, "managementTreeURI");
  329. if (uri == NULL) {
  330. wpa_printf(MSG_INFO, "[hs20] No managementTreeURI in addMO");
  331. return -1;
  332. }
  333. wpa_printf(MSG_INFO, "addMO - managementTreeURI: '%s'", uri);
  334. ret = hs20_add_pps_mo(ctx, uri, add_mo, fname, fname_len);
  335. xml_node_get_attr_value_free(ctx->xml, uri);
  336. return ret;
  337. }
  338. static int process_spp_user_input_response(struct hs20_osu_client *ctx,
  339. const char *session_id,
  340. xml_node_t *add_mo)
  341. {
  342. int ret;
  343. char fname[300];
  344. debug_dump_node(ctx, "addMO", add_mo);
  345. wpa_printf(MSG_INFO, "Subscription registration completed");
  346. if (hs20_add_mo(ctx, add_mo, fname, sizeof(fname)) < 0) {
  347. wpa_printf(MSG_INFO, "Could not add MO");
  348. ret = hs20_spp_update_response(
  349. ctx, session_id,
  350. "Error occurred",
  351. "MO addition or update failed");
  352. return 0;
  353. }
  354. ret = hs20_spp_update_response(ctx, session_id, "OK", NULL);
  355. if (ret == 0)
  356. hs20_sub_rem_complete(ctx, fname);
  357. return 0;
  358. }
  359. static xml_node_t * hs20_spp_user_input_completed(struct hs20_osu_client *ctx,
  360. const char *session_id)
  361. {
  362. xml_node_t *node, *ret_node;
  363. node = build_spp_post_dev_data(ctx, NULL, session_id,
  364. "User input completed");
  365. if (node == NULL)
  366. return NULL;
  367. ret_node = soap_send_receive(ctx->http, node);
  368. if (!ret_node) {
  369. if (soap_reinit_client(ctx->http) < 0)
  370. return NULL;
  371. wpa_printf(MSG_INFO, "Try to finish with re-opened connection");
  372. node = build_spp_post_dev_data(ctx, NULL, session_id,
  373. "User input completed");
  374. if (node == NULL)
  375. return NULL;
  376. ret_node = soap_send_receive(ctx->http, node);
  377. if (ret_node == NULL)
  378. return NULL;
  379. wpa_printf(MSG_INFO, "Continue with new connection");
  380. }
  381. if (hs20_spp_validate(ctx, ret_node, "sppPostDevDataResponse") < 0) {
  382. wpa_printf(MSG_INFO, "SPP validation failed");
  383. xml_node_free(ctx->xml, ret_node);
  384. return NULL;
  385. }
  386. return ret_node;
  387. }
  388. static xml_node_t * hs20_spp_get_certificate(struct hs20_osu_client *ctx,
  389. xml_node_t *cmd,
  390. const char *session_id,
  391. const char *pps_fname)
  392. {
  393. xml_namespace_t *ns;
  394. xml_node_t *node, *ret_node;
  395. int res;
  396. wpa_printf(MSG_INFO, "Client certificate enrollment");
  397. res = osu_get_certificate(ctx, cmd);
  398. if (res < 0)
  399. wpa_printf(MSG_INFO, "EST simpleEnroll failed");
  400. node = build_spp_post_dev_data(ctx, &ns, session_id,
  401. res == 0 ?
  402. "Certificate enrollment completed" :
  403. "Certificate enrollment failed");
  404. if (node == NULL)
  405. return NULL;
  406. ret_node = soap_send_receive(ctx->http, node);
  407. if (ret_node == NULL)
  408. return NULL;
  409. debug_dump_node(ctx, "Received response to certificate enrollment "
  410. "completed", ret_node);
  411. if (hs20_spp_validate(ctx, ret_node, "sppPostDevDataResponse") < 0) {
  412. wpa_printf(MSG_INFO, "SPP validation failed");
  413. xml_node_free(ctx->xml, ret_node);
  414. return NULL;
  415. }
  416. return ret_node;
  417. }
  418. static int hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec,
  419. const char *session_id, const char *pps_fname,
  420. xml_node_t *pps, xml_node_t **ret_node)
  421. {
  422. xml_node_t *cmd;
  423. const char *name;
  424. char *uri;
  425. char *id = strdup(session_id);
  426. if (id == NULL)
  427. return -1;
  428. *ret_node = NULL;
  429. debug_dump_node(ctx, "exec", exec);
  430. xml_node_for_each_child(ctx->xml, cmd, exec) {
  431. xml_node_for_each_check(ctx->xml, cmd);
  432. break;
  433. }
  434. if (!cmd) {
  435. wpa_printf(MSG_INFO, "exec command element not found (cmd=%p)",
  436. cmd);
  437. free(id);
  438. return -1;
  439. }
  440. name = xml_node_get_localname(ctx->xml, cmd);
  441. if (strcasecmp(name, "launchBrowserToURI") == 0) {
  442. int res;
  443. uri = xml_node_get_text(ctx->xml, cmd);
  444. if (!uri) {
  445. wpa_printf(MSG_INFO, "No URI found");
  446. free(id);
  447. return -1;
  448. }
  449. wpa_printf(MSG_INFO, "Launch browser to URI '%s'", uri);
  450. write_summary(ctx, "Launch browser to URI '%s'", uri);
  451. res = hs20_web_browser(uri);
  452. xml_node_get_text_free(ctx->xml, uri);
  453. if (res > 0) {
  454. wpa_printf(MSG_INFO, "User response in browser completed successfully - sessionid='%s'",
  455. id);
  456. write_summary(ctx, "User response in browser completed successfully");
  457. *ret_node = hs20_spp_user_input_completed(ctx, id);
  458. free(id);
  459. return *ret_node ? 0 : -1;
  460. } else {
  461. wpa_printf(MSG_INFO, "Failed to receive user response");
  462. write_summary(ctx, "Failed to receive user response");
  463. hs20_spp_update_response(
  464. ctx, id, "Error occurred", "Other");
  465. free(id);
  466. return -1;
  467. }
  468. return 0;
  469. }
  470. if (strcasecmp(name, "uploadMO") == 0) {
  471. if (pps_fname == NULL)
  472. return -1;
  473. *ret_node = hs20_spp_upload_mo(ctx, cmd, id,
  474. pps_fname);
  475. free(id);
  476. return *ret_node ? 0 : -1;
  477. }
  478. if (strcasecmp(name, "getCertificate") == 0) {
  479. *ret_node = hs20_spp_get_certificate(ctx, cmd, id,
  480. pps_fname);
  481. free(id);
  482. return *ret_node ? 0 : -1;
  483. }
  484. wpa_printf(MSG_INFO, "Unsupported exec command: '%s'", name);
  485. free(id);
  486. return -1;
  487. }
  488. enum spp_post_dev_data_use {
  489. SPP_SUBSCRIPTION_REMEDIATION,
  490. SPP_POLICY_UPDATE,
  491. SPP_SUBSCRIPTION_REGISTRATION,
  492. };
  493. static void process_spp_post_dev_data_response(
  494. struct hs20_osu_client *ctx,
  495. enum spp_post_dev_data_use use, xml_node_t *node,
  496. const char *pps_fname, xml_node_t *pps)
  497. {
  498. xml_node_t *child;
  499. char *status = NULL;
  500. xml_node_t *update = NULL, *exec = NULL, *add_mo = NULL, *no_mo = NULL;
  501. char *session_id = NULL;
  502. debug_dump_node(ctx, "sppPostDevDataResponse node", node);
  503. status = get_spp_attr_value(ctx->xml, node, "sppStatus");
  504. if (status == NULL) {
  505. wpa_printf(MSG_INFO, "No sppStatus attribute");
  506. goto out;
  507. }
  508. write_summary(ctx, "Received sppPostDevDataResponse sppStatus='%s'",
  509. status);
  510. session_id = get_spp_attr_value(ctx->xml, node, "sessionID");
  511. if (session_id == NULL) {
  512. wpa_printf(MSG_INFO, "No sessionID attribute");
  513. goto out;
  514. }
  515. wpa_printf(MSG_INFO, "[hs20] sppPostDevDataResponse - sppStatus: '%s' sessionID: '%s'",
  516. status, session_id);
  517. xml_node_for_each_child(ctx->xml, child, node) {
  518. const char *name;
  519. xml_node_for_each_check(ctx->xml, child);
  520. debug_dump_node(ctx, "child", child);
  521. name = xml_node_get_localname(ctx->xml, child);
  522. wpa_printf(MSG_INFO, "localname: '%s'", name);
  523. if (!update && strcasecmp(name, "updateNode") == 0)
  524. update = child;
  525. if (!exec && strcasecmp(name, "exec") == 0)
  526. exec = child;
  527. if (!add_mo && strcasecmp(name, "addMO") == 0)
  528. add_mo = child;
  529. if (!no_mo && strcasecmp(name, "noMOUpdate") == 0)
  530. no_mo = child;
  531. }
  532. if (use == SPP_SUBSCRIPTION_REMEDIATION &&
  533. strcasecmp(status,
  534. "Remediation complete, request sppUpdateResponse") == 0)
  535. {
  536. int res, ret;
  537. if (!update && !no_mo) {
  538. wpa_printf(MSG_INFO, "No updateNode or noMOUpdate element");
  539. goto out;
  540. }
  541. wpa_printf(MSG_INFO, "Subscription remediation completed");
  542. res = update_pps(ctx, update, pps_fname, pps);
  543. if (res < 0)
  544. wpa_printf(MSG_INFO, "Failed to update PPS MO");
  545. ret = hs20_spp_update_response(
  546. ctx, session_id,
  547. res < 0 ? "Error occurred" : "OK",
  548. res < 0 ? "MO addition or update failed" : NULL);
  549. if (res == 0 && ret == 0)
  550. hs20_sub_rem_complete(ctx, pps_fname);
  551. goto out;
  552. }
  553. if (use == SPP_SUBSCRIPTION_REMEDIATION &&
  554. strcasecmp(status, "Exchange complete, release TLS connection") ==
  555. 0) {
  556. if (!no_mo) {
  557. wpa_printf(MSG_INFO, "No noMOUpdate element");
  558. goto out;
  559. }
  560. wpa_printf(MSG_INFO, "Subscription remediation completed (no MO update)");
  561. goto out;
  562. }
  563. if (use == SPP_POLICY_UPDATE &&
  564. strcasecmp(status, "Update complete, request sppUpdateResponse") ==
  565. 0) {
  566. int res, ret;
  567. wpa_printf(MSG_INFO, "Policy update received - update PPS");
  568. res = update_pps(ctx, update, pps_fname, pps);
  569. ret = hs20_spp_update_response(
  570. ctx, session_id,
  571. res < 0 ? "Error occurred" : "OK",
  572. res < 0 ? "MO addition or update failed" : NULL);
  573. if (res == 0 && ret == 0)
  574. hs20_policy_update_complete(ctx, pps_fname);
  575. goto out;
  576. }
  577. if (use == SPP_SUBSCRIPTION_REGISTRATION &&
  578. strcasecmp(status, "Provisioning complete, request "
  579. "sppUpdateResponse") == 0) {
  580. if (!add_mo) {
  581. wpa_printf(MSG_INFO, "No addMO element - not sure what to do next");
  582. goto out;
  583. }
  584. process_spp_user_input_response(ctx, session_id, add_mo);
  585. node = NULL;
  586. goto out;
  587. }
  588. if (strcasecmp(status, "No update available at this time") == 0) {
  589. wpa_printf(MSG_INFO, "No update available at this time");
  590. goto out;
  591. }
  592. if (strcasecmp(status, "OK") == 0) {
  593. int res;
  594. xml_node_t *ret;
  595. if (!exec) {
  596. wpa_printf(MSG_INFO, "No exec element - not sure what to do next");
  597. goto out;
  598. }
  599. res = hs20_spp_exec(ctx, exec, session_id,
  600. pps_fname, pps, &ret);
  601. /* xml_node_free(ctx->xml, node); */
  602. node = NULL;
  603. if (res == 0 && ret)
  604. process_spp_post_dev_data_response(ctx, use,
  605. ret, pps_fname, pps);
  606. goto out;
  607. }
  608. if (strcasecmp(status, "Error occurred") == 0) {
  609. xml_node_t *err;
  610. char *code = NULL;
  611. err = get_node(ctx->xml, node, "sppError");
  612. if (err)
  613. code = xml_node_get_attr_value(ctx->xml, err,
  614. "errorCode");
  615. wpa_printf(MSG_INFO, "Error occurred - errorCode=%s",
  616. code ? code : "N/A");
  617. xml_node_get_attr_value_free(ctx->xml, code);
  618. goto out;
  619. }
  620. wpa_printf(MSG_INFO,
  621. "[hs20] Unsupported sppPostDevDataResponse sppStatus '%s'",
  622. status);
  623. out:
  624. xml_node_get_attr_value_free(ctx->xml, status);
  625. xml_node_get_attr_value_free(ctx->xml, session_id);
  626. xml_node_free(ctx->xml, node);
  627. }
  628. static int spp_post_dev_data(struct hs20_osu_client *ctx,
  629. enum spp_post_dev_data_use use,
  630. const char *reason,
  631. const char *pps_fname, xml_node_t *pps)
  632. {
  633. xml_node_t *payload;
  634. xml_node_t *ret_node;
  635. payload = build_spp_post_dev_data(ctx, NULL, NULL, reason);
  636. if (payload == NULL)
  637. return -1;
  638. ret_node = soap_send_receive(ctx->http, payload);
  639. if (!ret_node) {
  640. const char *err = http_get_err(ctx->http);
  641. if (err) {
  642. wpa_printf(MSG_INFO, "HTTP error: %s", err);
  643. write_result(ctx, "HTTP error: %s", err);
  644. } else {
  645. write_summary(ctx, "Failed to send SOAP message");
  646. }
  647. return -1;
  648. }
  649. if (hs20_spp_validate(ctx, ret_node, "sppPostDevDataResponse") < 0) {
  650. wpa_printf(MSG_INFO, "SPP validation failed");
  651. xml_node_free(ctx->xml, ret_node);
  652. return -1;
  653. }
  654. process_spp_post_dev_data_response(ctx, use, ret_node,
  655. pps_fname, pps);
  656. return 0;
  657. }
  658. void spp_sub_rem(struct hs20_osu_client *ctx, const char *address,
  659. const char *pps_fname, const char *ca_fname,
  660. const char *client_cert, const char *client_key,
  661. const char *cred_username, const char *cred_password,
  662. xml_node_t *pps)
  663. {
  664. wpa_printf(MSG_INFO, "SPP subscription remediation");
  665. write_summary(ctx, "SPP subscription remediation");
  666. os_free(ctx->server_url);
  667. ctx->server_url = os_strdup(address);
  668. if (soap_init_client(ctx->http, address, ca_fname,
  669. cred_username, cred_password, client_cert,
  670. client_key) == 0) {
  671. spp_post_dev_data(ctx, SPP_SUBSCRIPTION_REMEDIATION,
  672. "Subscription remediation", pps_fname, pps);
  673. }
  674. }
  675. static void hs20_policy_update_complete(struct hs20_osu_client *ctx,
  676. const char *pps_fname)
  677. {
  678. wpa_printf(MSG_INFO, "Policy update completed");
  679. /*
  680. * Update wpa_supplicant credentials and reconnect using updated
  681. * information.
  682. */
  683. wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
  684. cmd_set_pps(ctx, pps_fname);
  685. wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
  686. if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0)
  687. wpa_printf(MSG_ERROR, "Failed to request wpa_supplicant to reconnect");
  688. }
  689. static int process_spp_exchange_complete(struct hs20_osu_client *ctx,
  690. xml_node_t *node)
  691. {
  692. char *status, *session_id;
  693. debug_dump_node(ctx, "sppExchangeComplete", node);
  694. status = get_spp_attr_value(ctx->xml, node, "sppStatus");
  695. if (status == NULL) {
  696. wpa_printf(MSG_INFO, "No sppStatus attribute");
  697. return -1;
  698. }
  699. write_summary(ctx, "Received sppExchangeComplete sppStatus='%s'",
  700. status);
  701. session_id = get_spp_attr_value(ctx->xml, node, "sessionID");
  702. if (session_id == NULL) {
  703. wpa_printf(MSG_INFO, "No sessionID attribute");
  704. xml_node_get_attr_value_free(ctx->xml, status);
  705. return -1;
  706. }
  707. wpa_printf(MSG_INFO, "[hs20] sppStatus: '%s' sessionID: '%s'",
  708. status, session_id);
  709. xml_node_get_attr_value_free(ctx->xml, session_id);
  710. if (strcasecmp(status, "Exchange complete, release TLS connection") ==
  711. 0) {
  712. xml_node_get_attr_value_free(ctx->xml, status);
  713. return 0;
  714. }
  715. wpa_printf(MSG_INFO, "Unexpected sppStatus '%s'", status);
  716. write_summary(ctx, "Unexpected sppStatus '%s'", status);
  717. xml_node_get_attr_value_free(ctx->xml, status);
  718. return -1;
  719. }
  720. static xml_node_t * build_spp_update_response(struct hs20_osu_client *ctx,
  721. const char *session_id,
  722. const char *spp_status,
  723. const char *error_code)
  724. {
  725. xml_namespace_t *ns;
  726. xml_node_t *spp_node, *node;
  727. spp_node = xml_node_create_root(ctx->xml, SPP_NS_URI, "spp", &ns,
  728. "sppUpdateResponse");
  729. if (spp_node == NULL)
  730. return NULL;
  731. xml_node_add_attr(ctx->xml, spp_node, ns, "sppVersion", "1.0");
  732. xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id);
  733. xml_node_add_attr(ctx->xml, spp_node, ns, "sppStatus", spp_status);
  734. if (error_code) {
  735. node = xml_node_create(ctx->xml, spp_node, ns, "sppError");
  736. if (node)
  737. xml_node_add_attr(ctx->xml, node, NULL, "errorCode",
  738. error_code);
  739. }
  740. return spp_node;
  741. }
  742. static int hs20_spp_update_response(struct hs20_osu_client *ctx,
  743. const char *session_id,
  744. const char *spp_status,
  745. const char *error_code)
  746. {
  747. xml_node_t *node, *ret_node;
  748. int ret;
  749. write_summary(ctx, "Building sppUpdateResponse sppStatus='%s' error_code='%s'",
  750. spp_status, error_code);
  751. node = build_spp_update_response(ctx, session_id, spp_status,
  752. error_code);
  753. if (node == NULL)
  754. return -1;
  755. ret_node = soap_send_receive(ctx->http, node);
  756. if (!ret_node) {
  757. if (soap_reinit_client(ctx->http) < 0)
  758. return -1;
  759. wpa_printf(MSG_INFO, "Try to finish with re-opened connection");
  760. node = build_spp_update_response(ctx, session_id, spp_status,
  761. error_code);
  762. if (node == NULL)
  763. return -1;
  764. ret_node = soap_send_receive(ctx->http, node);
  765. if (ret_node == NULL)
  766. return -1;
  767. wpa_printf(MSG_INFO, "Continue with new connection");
  768. }
  769. if (hs20_spp_validate(ctx, ret_node, "sppExchangeComplete") < 0) {
  770. wpa_printf(MSG_INFO, "SPP validation failed");
  771. xml_node_free(ctx->xml, ret_node);
  772. return -1;
  773. }
  774. ret = process_spp_exchange_complete(ctx, ret_node);
  775. xml_node_free(ctx->xml, ret_node);
  776. return ret;
  777. }
  778. void spp_pol_upd(struct hs20_osu_client *ctx, const char *address,
  779. const char *pps_fname, const char *ca_fname,
  780. const char *client_cert, const char *client_key,
  781. const char *cred_username, const char *cred_password,
  782. xml_node_t *pps)
  783. {
  784. wpa_printf(MSG_INFO, "SPP policy update");
  785. write_summary(ctx, "SPP policy update");
  786. os_free(ctx->server_url);
  787. ctx->server_url = os_strdup(address);
  788. if (soap_init_client(ctx->http, address, ca_fname, cred_username,
  789. cred_password, client_cert, client_key) == 0) {
  790. spp_post_dev_data(ctx, SPP_POLICY_UPDATE, "Policy update",
  791. pps_fname, pps);
  792. }
  793. }
  794. int cmd_prov(struct hs20_osu_client *ctx, const char *url,
  795. const char *ca_fname)
  796. {
  797. unlink("Cert/est_cert.der");
  798. unlink("Cert/est_cert.pem");
  799. ctx->ca_fname = ca_fname;
  800. if (url == NULL) {
  801. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  802. return -1;
  803. }
  804. wpa_printf(MSG_INFO, "Credential provisioning requested");
  805. os_free(ctx->server_url);
  806. ctx->server_url = os_strdup(url);
  807. if (soap_init_client(ctx->http, url, ca_fname, NULL, NULL, NULL, NULL) <
  808. 0)
  809. return -1;
  810. spp_post_dev_data(ctx, SPP_SUBSCRIPTION_REGISTRATION,
  811. "Subscription registration", NULL, NULL);
  812. return ctx->pps_cred_set ? 0 : -1;
  813. }
  814. int cmd_sim_prov(struct hs20_osu_client *ctx, const char *url,
  815. const char *ca_fname)
  816. {
  817. ctx->ca_fname = ca_fname;
  818. if (url == NULL) {
  819. wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
  820. return -1;
  821. }
  822. wpa_printf(MSG_INFO, "SIM provisioning requested");
  823. os_free(ctx->server_url);
  824. ctx->server_url = os_strdup(url);
  825. wpa_printf(MSG_INFO, "Wait for IP address before starting SIM provisioning");
  826. if (wait_ip_addr(ctx->ifname, 15) < 0) {
  827. wpa_printf(MSG_INFO, "Could not get IP address for WLAN - try connection anyway");
  828. }
  829. if (soap_init_client(ctx->http, url, ca_fname, NULL, NULL, NULL, NULL) <
  830. 0)
  831. return -1;
  832. spp_post_dev_data(ctx, SPP_SUBSCRIPTION_REGISTRATION,
  833. "Subscription provisioning", NULL, NULL);
  834. return ctx->pps_cred_set ? 0 : -1;
  835. }