1 /*
2 * Wi-Fi Protected Setup - External Registrar
3 * Copyright (c) 2009-2013, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "base64.h"
13 #include "uuid.h"
14 #include "eloop.h"
15 #include "httpread.h"
16 #include "http_client.h"
17 #include "http_server.h"
18 #include "upnp_xml.h"
19 #include "wps_i.h"
20 #include "wps_upnp.h"
21 #include "wps_upnp_i.h"
22 #include "wps_er.h"
23
24
25 static void wps_er_deinit_finish(void *eloop_data, void *user_ctx);
26 static void wps_er_ap_timeout(void *eloop_data, void *user_ctx);
27 static void wps_er_sta_timeout(void *eloop_data, void *user_ctx);
28 static void wps_er_ap_process(struct wps_er_ap *ap, struct wpabuf *msg);
29 static int wps_er_send_get_device_info(struct wps_er_ap *ap,
30 void (*m1_handler)(struct wps_er_ap *ap,
31 struct wpabuf *m1));
32
33
wps_er_sta_event(struct wps_context * wps,struct wps_er_sta * sta,enum wps_event event)34 static void wps_er_sta_event(struct wps_context *wps, struct wps_er_sta *sta,
35 enum wps_event event)
36 {
37 union wps_event_data data;
38 struct wps_event_er_enrollee *ev = &data.enrollee;
39
40 if (wps->event_cb == NULL)
41 return;
42
43 os_memset(&data, 0, sizeof(data));
44 ev->uuid = sta->uuid;
45 ev->mac_addr = sta->addr;
46 ev->m1_received = sta->m1_received;
47 ev->config_methods = sta->config_methods;
48 ev->dev_passwd_id = sta->dev_passwd_id;
49 ev->pri_dev_type = sta->pri_dev_type;
50 ev->dev_name = sta->dev_name;
51 ev->manufacturer = sta->manufacturer;
52 ev->model_name = sta->model_name;
53 ev->model_number = sta->model_number;
54 ev->serial_number = sta->serial_number;
55 wps->event_cb(wps->cb_ctx, event, &data);
56 }
57
58
wps_er_sta_get(struct wps_er_ap * ap,const u8 * addr,const u8 * uuid)59 static struct wps_er_sta * wps_er_sta_get(struct wps_er_ap *ap, const u8 *addr,
60 const u8 *uuid)
61 {
62 struct wps_er_sta *sta;
63 dl_list_for_each(sta, &ap->sta, struct wps_er_sta, list) {
64 if ((addr == NULL ||
65 os_memcmp(sta->addr, addr, ETH_ALEN) == 0) &&
66 (uuid == NULL ||
67 os_memcmp(uuid, sta->uuid, WPS_UUID_LEN) == 0))
68 return sta;
69 }
70 return NULL;
71 }
72
73
wps_er_sta_free(struct wps_er_sta * sta)74 static void wps_er_sta_free(struct wps_er_sta *sta)
75 {
76 wps_er_sta_event(sta->ap->er->wps, sta, WPS_EV_ER_ENROLLEE_REMOVE);
77 if (sta->wps)
78 wps_deinit(sta->wps);
79 os_free(sta->manufacturer);
80 os_free(sta->model_name);
81 os_free(sta->model_number);
82 os_free(sta->serial_number);
83 os_free(sta->dev_name);
84 http_client_free(sta->http);
85 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
86 os_free(sta->cred);
87 os_free(sta);
88 }
89
90
wps_er_sta_remove_all(struct wps_er_ap * ap)91 static void wps_er_sta_remove_all(struct wps_er_ap *ap)
92 {
93 struct wps_er_sta *prev, *sta;
94 dl_list_for_each_safe(sta, prev, &ap->sta, struct wps_er_sta, list)
95 wps_er_sta_free(sta);
96 }
97
98
wps_er_ap_get(struct wps_er * er,struct in_addr * addr,const u8 * uuid,const u8 * mac_addr)99 static struct wps_er_ap * wps_er_ap_get(struct wps_er *er,
100 struct in_addr *addr, const u8 *uuid,
101 const u8 *mac_addr)
102 {
103 struct wps_er_ap *ap;
104 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
105 if ((addr == NULL || ap->addr.s_addr == addr->s_addr) &&
106 (uuid == NULL ||
107 os_memcmp(uuid, ap->uuid, WPS_UUID_LEN) == 0) &&
108 (mac_addr == NULL ||
109 os_memcmp(mac_addr, ap->mac_addr, ETH_ALEN) == 0))
110 return ap;
111 }
112 return NULL;
113 }
114
115
wps_er_ap_get_id(struct wps_er * er,unsigned int id)116 static struct wps_er_ap * wps_er_ap_get_id(struct wps_er *er, unsigned int id)
117 {
118 struct wps_er_ap *ap;
119 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
120 if (ap->id == id)
121 return ap;
122 }
123 return NULL;
124 }
125
126
wps_er_ap_event(struct wps_context * wps,struct wps_er_ap * ap,enum wps_event event)127 static void wps_er_ap_event(struct wps_context *wps, struct wps_er_ap *ap,
128 enum wps_event event)
129 {
130 union wps_event_data data;
131 struct wps_event_er_ap *evap = &data.ap;
132
133 if (wps->event_cb == NULL)
134 return;
135
136 os_memset(&data, 0, sizeof(data));
137 evap->uuid = ap->uuid;
138 evap->friendly_name = ap->friendly_name;
139 evap->manufacturer = ap->manufacturer;
140 evap->manufacturer_url = ap->manufacturer_url;
141 evap->model_description = ap->model_description;
142 evap->model_name = ap->model_name;
143 evap->model_number = ap->model_number;
144 evap->model_url = ap->model_url;
145 evap->serial_number = ap->serial_number;
146 evap->upc = ap->upc;
147 evap->pri_dev_type = ap->pri_dev_type;
148 evap->wps_state = ap->wps_state;
149 evap->mac_addr = ap->mac_addr;
150 wps->event_cb(wps->cb_ctx, event, &data);
151 }
152
153
wps_er_ap_free(struct wps_er_ap * ap)154 static void wps_er_ap_free(struct wps_er_ap *ap)
155 {
156 http_client_free(ap->http);
157 ap->http = NULL;
158
159 os_free(ap->location);
160 os_free(ap->friendly_name);
161 os_free(ap->manufacturer);
162 os_free(ap->manufacturer_url);
163 os_free(ap->model_description);
164 os_free(ap->model_name);
165 os_free(ap->model_number);
166 os_free(ap->model_url);
167 os_free(ap->serial_number);
168 os_free(ap->udn);
169 os_free(ap->upc);
170
171 os_free(ap->scpd_url);
172 os_free(ap->control_url);
173 os_free(ap->event_sub_url);
174
175 os_free(ap->ap_settings);
176
177 os_free(ap);
178 }
179
180
wps_er_ap_unsubscribed(struct wps_er * er,struct wps_er_ap * ap)181 static void wps_er_ap_unsubscribed(struct wps_er *er, struct wps_er_ap *ap)
182 {
183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
184 inet_ntoa(ap->addr), ap->location);
185 dl_list_del(&ap->list);
186 wps_er_ap_free(ap);
187
188 if (er->deinitializing && dl_list_empty(&er->ap_unsubscribing))
189 wps_er_deinit_finish(er, NULL);
190 }
191
192
wps_er_http_unsubscribe_cb(void * ctx,struct http_client * c,enum http_client_event event)193 static void wps_er_http_unsubscribe_cb(void *ctx, struct http_client *c,
194 enum http_client_event event)
195 {
196 struct wps_er_ap *ap = ctx;
197
198 switch (event) {
199 case HTTP_CLIENT_OK:
200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
201 ap->subscribed = 0;
202 break;
203 case HTTP_CLIENT_FAILED:
204 case HTTP_CLIENT_INVALID_REPLY:
205 case HTTP_CLIENT_TIMEOUT:
206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
207 "events");
208 break;
209 }
210 http_client_free(ap->http);
211 ap->http = NULL;
212
213 /*
214 * Need to get rid of the AP entry regardless of whether we managed to
215 * unsubscribe cleanly or not.
216 */
217 wps_er_ap_unsubscribed(ap->er, ap);
218 }
219
220
wps_er_ap_unsubscribe(struct wps_er * er,struct wps_er_ap * ap)221 static void wps_er_ap_unsubscribe(struct wps_er *er, struct wps_er_ap *ap)
222 {
223 struct wpabuf *req;
224 struct sockaddr_in dst;
225 char *url, *path;
226 char sid[100];
227
228 if (ap->event_sub_url == NULL) {
229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
230 "subscribe");
231 goto fail;
232 }
233 if (ap->http) {
234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
235 "send subscribe request");
236 goto fail;
237 }
238
239 url = http_client_url_parse(ap->event_sub_url, &dst, &path);
240 if (url == NULL) {
241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
242 goto fail;
243 }
244
245 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000);
246 if (req == NULL) {
247 os_free(url);
248 goto fail;
249 }
250 uuid_bin2str(ap->sid, sid, sizeof(sid));
251 wpabuf_printf(req,
252 "UNSUBSCRIBE %s HTTP/1.1\r\n"
253 "HOST: %s:%d\r\n"
254 "SID: uuid:%s\r\n"
255 "\r\n",
256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid);
257 os_free(url);
258 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Unsubscription request",
259 wpabuf_head(req), wpabuf_len(req));
260
261 ap->http = http_client_addr(&dst, req, 1000,
262 wps_er_http_unsubscribe_cb, ap);
263 if (ap->http == NULL) {
264 wpabuf_free(req);
265 goto fail;
266 }
267 return;
268
269 fail:
270 /*
271 * Need to get rid of the AP entry even when we fail to unsubscribe
272 * cleanly.
273 */
274 wps_er_ap_unsubscribed(ap->er, ap);
275 }
276
277
wps_er_ap_get_settings(struct wps_er * er,const u8 * uuid)278 static struct wps_er_ap_settings * wps_er_ap_get_settings(struct wps_er *er,
279 const u8 *uuid)
280 {
281 struct wps_er_ap_settings *s;
282 dl_list_for_each(s, &er->ap_settings, struct wps_er_ap_settings, list)
283 if (os_memcmp(uuid, s->uuid, WPS_UUID_LEN) == 0)
284 return s;
285 return NULL;
286 }
287
288
wps_er_ap_cache_settings(struct wps_er * er,struct in_addr * addr)289 int wps_er_ap_cache_settings(struct wps_er *er, struct in_addr *addr)
290 {
291 struct wps_er_ap *ap;
292 struct wps_er_ap_settings *settings;
293
294 ap = wps_er_ap_get(er, addr, NULL, NULL);
295 if (ap == NULL || ap->ap_settings == NULL)
296 return -1;
297
298 settings = wps_er_ap_get_settings(er, ap->uuid);
299 if (!settings) {
300 settings = os_zalloc(sizeof(*settings));
301 if (settings == NULL)
302 return -1;
303 os_memcpy(settings->uuid, ap->uuid, WPS_UUID_LEN);
304 dl_list_add(&er->ap_settings, &settings->list);
305 }
306 os_memcpy(&settings->ap_settings, ap->ap_settings,
307 sizeof(struct wps_credential));
308
309 return 0;
310 }
311
312
wps_er_ap_use_cached_settings(struct wps_er * er,struct wps_er_ap * ap)313 static int wps_er_ap_use_cached_settings(struct wps_er *er,
314 struct wps_er_ap *ap)
315 {
316 struct wps_er_ap_settings *s;
317
318 if (ap->ap_settings)
319 return 0;
320
321 s = wps_er_ap_get_settings(ap->er, ap->uuid);
322 if (!s)
323 return -1;
324
325 ap->ap_settings = os_memdup(&s->ap_settings, sizeof(*ap->ap_settings));
326 if (ap->ap_settings == NULL)
327 return -1;
328
329 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
330 return 0;
331 }
332
333
wps_er_ap_remove_entry(struct wps_er * er,struct wps_er_ap * ap)334 static void wps_er_ap_remove_entry(struct wps_er *er, struct wps_er_ap *ap)
335 {
336 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
337 inet_ntoa(ap->addr), ap->location);
338 eloop_cancel_timeout(wps_er_ap_timeout, er, ap);
339 wps_er_sta_remove_all(ap);
340 wps_er_ap_event(er->wps, ap, WPS_EV_ER_AP_REMOVE);
341 http_client_free(ap->http);
342 ap->http = NULL;
343 if (ap->wps) {
344 wps_deinit(ap->wps);
345 ap->wps = NULL;
346 }
347
348 dl_list_del(&ap->list);
349 if (ap->subscribed) {
350 dl_list_add(&er->ap_unsubscribing, &ap->list);
351 wps_er_ap_unsubscribe(er, ap);
352 } else
353 wps_er_ap_free(ap);
354 }
355
356
wps_er_ap_timeout(void * eloop_data,void * user_ctx)357 static void wps_er_ap_timeout(void *eloop_data, void *user_ctx)
358 {
359 struct wps_er *er = eloop_data;
360 struct wps_er_ap *ap = user_ctx;
361 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
362 wps_er_ap_remove_entry(er, ap);
363 }
364
365
wps_er_get_sid(struct wps_er_ap * ap,char * sid)366 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid)
367 {
368 char *pos;
369 char txt[100];
370
371 if (!sid) {
372 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)",
373 inet_ntoa(ap->addr), ap->location);
374 return -1;
375 }
376
377 pos = os_strstr(sid, "uuid:");
378 if (!pos) {
379 wpa_printf(MSG_DEBUG, "WPS ER: Invalid SID received from "
380 "%s (%s): '%s'", inet_ntoa(ap->addr), ap->location,
381 sid);
382 return -1;
383 }
384
385 pos += 5;
386 if (uuid_str2bin(pos, ap->sid) < 0) {
387 wpa_printf(MSG_DEBUG, "WPS ER: Invalid SID received from "
388 "%s (%s): '%s'", inet_ntoa(ap->addr), ap->location,
389 sid);
390 return -1;
391 }
392
393 uuid_bin2str(ap->sid, txt, sizeof(txt));
394 wpa_printf(MSG_DEBUG, "WPS ER: SID for subscription with %s (%s): %s",
395 inet_ntoa(ap->addr), ap->location, txt);
396
397 return 0;
398 }
399
400
wps_er_http_subscribe_cb(void * ctx,struct http_client * c,enum http_client_event event)401 static void wps_er_http_subscribe_cb(void *ctx, struct http_client *c,
402 enum http_client_event event)
403 {
404 struct wps_er_ap *ap = ctx;
405
406 switch (event) {
407 case HTTP_CLIENT_OK:
408 wpa_printf(MSG_DEBUG, "WPS ER: Subscribed to events");
409 ap->subscribed = 1;
410 wps_er_get_sid(ap, http_client_get_hdr_line(c, "SID"));
411 wps_er_ap_use_cached_settings(ap->er, ap);
412 wps_er_ap_event(ap->er->wps, ap, WPS_EV_ER_AP_ADD);
413 break;
414 case HTTP_CLIENT_FAILED:
415 case HTTP_CLIENT_INVALID_REPLY:
416 case HTTP_CLIENT_TIMEOUT:
417 wpa_printf(MSG_DEBUG, "WPS ER: Failed to subscribe to events");
418 break;
419 }
420 http_client_free(ap->http);
421 ap->http = NULL;
422 }
423
424
wps_er_subscribe(struct wps_er_ap * ap)425 static void wps_er_subscribe(struct wps_er_ap *ap)
426 {
427 struct wpabuf *req;
428 struct sockaddr_in dst;
429 char *url, *path;
430
431 if (ap->event_sub_url == NULL) {
432 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
433 "subscribe");
434 return;
435 }
436 if (ap->http) {
437 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
438 "send subscribe request");
439 return;
440 }
441
442 url = http_client_url_parse(ap->event_sub_url, &dst, &path);
443 if (url == NULL) {
444 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
445 return;
446 }
447
448 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000);
449 if (req == NULL) {
450 os_free(url);
451 return;
452 }
453 wpabuf_printf(req,
454 "SUBSCRIBE %s HTTP/1.1\r\n"
455 "HOST: %s:%d\r\n"
456 "CALLBACK: <http://%s:%d/event/%u/%u>\r\n"
457 "NT: upnp:event\r\n"
458 "TIMEOUT: Second-%d\r\n"
459 "\r\n",
460 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port),
461 ap->er->ip_addr_text, ap->er->http_port,
462 ap->er->event_id, ap->id, 1800);
463 os_free(url);
464 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Subscription request",
465 wpabuf_head(req), wpabuf_len(req));
466
467 ap->http = http_client_addr(&dst, req, 1000, wps_er_http_subscribe_cb,
468 ap);
469 if (ap->http == NULL)
470 wpabuf_free(req);
471 }
472
473
wps_er_ap_get_m1(struct wps_er_ap * ap,struct wpabuf * m1)474 static void wps_er_ap_get_m1(struct wps_er_ap *ap, struct wpabuf *m1)
475 {
476 struct wps_parse_attr attr;
477
478 if (wps_parse_msg(m1, &attr) < 0) {
479 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse M1");
480 return;
481 }
482 if (attr.primary_dev_type)
483 os_memcpy(ap->pri_dev_type, attr.primary_dev_type, 8);
484 if (attr.wps_state)
485 ap->wps_state = *attr.wps_state;
486 if (attr.mac_addr)
487 os_memcpy(ap->mac_addr, attr.mac_addr, ETH_ALEN);
488
489 wps_er_subscribe(ap);
490 }
491
492
wps_er_get_device_info(struct wps_er_ap * ap)493 static void wps_er_get_device_info(struct wps_er_ap *ap)
494 {
495 wps_er_send_get_device_info(ap, wps_er_ap_get_m1);
496 }
497
498
wps_er_find_wfadevice(const char * data)499 static const char * wps_er_find_wfadevice(const char *data)
500 {
501 const char *tag, *tagname, *end;
502 char *val;
503 int found = 0;
504
505 while (!found) {
506 /* Find next <device> */
507 for (;;) {
508 if (xml_next_tag(data, &tag, &tagname, &end))
509 return NULL;
510 data = end;
511 if (!os_strncasecmp(tagname, "device", 6) &&
512 *tag != '/' &&
513 (tagname[6] == '>' || !isgraph(tagname[6]))) {
514 break;
515 }
516 }
517
518 /* Check whether deviceType is WFADevice */
519 val = xml_get_first_item(data, "deviceType");
520 if (val == NULL)
521 return NULL;
522 wpa_printf(MSG_DEBUG, "WPS ER: Found deviceType '%s'", val);
523 found = os_strcasecmp(val, "urn:schemas-wifialliance-org:"
524 "device:WFADevice:1") == 0;
525 os_free(val);
526 }
527
528 return data;
529 }
530
531
wps_er_parse_device_description(struct wps_er_ap * ap,struct wpabuf * reply)532 static void wps_er_parse_device_description(struct wps_er_ap *ap,
533 struct wpabuf *reply)
534 {
535 /* Note: reply includes null termination after the buffer data */
536 const char *tmp, *data = wpabuf_head(reply);
537 char *pos;
538
539 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Device info",
540 wpabuf_head(reply), wpabuf_len(reply));
541
542 /*
543 * The root device description may include multiple devices, so first
544 * find the beginning of the WFADevice description to allow the
545 * simplistic parser to pick the correct entries.
546 */
547 tmp = wps_er_find_wfadevice(data);
548 if (tmp == NULL) {
549 wpa_printf(MSG_DEBUG, "WPS ER: WFADevice:1 device not found - "
550 "trying to parse invalid data");
551 } else
552 data = tmp;
553
554 ap->friendly_name = xml_get_first_item(data, "friendlyName");
555 wpa_printf(MSG_DEBUG, "WPS ER: friendlyName='%s'", ap->friendly_name);
556
557 ap->manufacturer = xml_get_first_item(data, "manufacturer");
558 wpa_printf(MSG_DEBUG, "WPS ER: manufacturer='%s'", ap->manufacturer);
559
560 ap->manufacturer_url = xml_get_first_item(data, "manufacturerURL");
561 wpa_printf(MSG_DEBUG, "WPS ER: manufacturerURL='%s'",
562 ap->manufacturer_url);
563
564 ap->model_description = xml_get_first_item(data, "modelDescription");
565 wpa_printf(MSG_DEBUG, "WPS ER: modelDescription='%s'",
566 ap->model_description);
567
568 ap->model_name = xml_get_first_item(data, "modelName");
569 wpa_printf(MSG_DEBUG, "WPS ER: modelName='%s'", ap->model_name);
570
571 ap->model_number = xml_get_first_item(data, "modelNumber");
572 wpa_printf(MSG_DEBUG, "WPS ER: modelNumber='%s'", ap->model_number);
573
574 ap->model_url = xml_get_first_item(data, "modelURL");
575 wpa_printf(MSG_DEBUG, "WPS ER: modelURL='%s'", ap->model_url);
576
577 ap->serial_number = xml_get_first_item(data, "serialNumber");
578 wpa_printf(MSG_DEBUG, "WPS ER: serialNumber='%s'", ap->serial_number);
579
580 ap->udn = xml_get_first_item(data, "UDN");
581 if (ap->udn) {
582 wpa_printf(MSG_DEBUG, "WPS ER: UDN='%s'", ap->udn);
583 pos = os_strstr(ap->udn, "uuid:");
584 if (pos) {
585 pos += 5;
586 if (uuid_str2bin(pos, ap->uuid) < 0)
587 wpa_printf(MSG_DEBUG,
588 "WPS ER: Invalid UUID in UDN");
589 }
590 }
591
592 ap->upc = xml_get_first_item(data, "UPC");
593 wpa_printf(MSG_DEBUG, "WPS ER: UPC='%s'", ap->upc);
594
595 ap->scpd_url = http_link_update(
596 xml_get_first_item(data, "SCPDURL"), ap->location);
597 wpa_printf(MSG_DEBUG, "WPS ER: SCPDURL='%s'", ap->scpd_url);
598
599 ap->control_url = http_link_update(
600 xml_get_first_item(data, "controlURL"), ap->location);
601 wpa_printf(MSG_DEBUG, "WPS ER: controlURL='%s'", ap->control_url);
602
603 ap->event_sub_url = http_link_update(
604 xml_get_first_item(data, "eventSubURL"), ap->location);
605 wpa_printf(MSG_DEBUG, "WPS ER: eventSubURL='%s'", ap->event_sub_url);
606 }
607
608
wps_er_http_dev_desc_cb(void * ctx,struct http_client * c,enum http_client_event event)609 static void wps_er_http_dev_desc_cb(void *ctx, struct http_client *c,
610 enum http_client_event event)
611 {
612 struct wps_er_ap *ap = ctx;
613 struct wpabuf *reply;
614 int ok = 0;
615
616 switch (event) {
617 case HTTP_CLIENT_OK:
618 reply = http_client_get_body(c);
619 if (reply == NULL)
620 break;
621 wps_er_parse_device_description(ap, reply);
622 ok = 1;
623 break;
624 case HTTP_CLIENT_FAILED:
625 case HTTP_CLIENT_INVALID_REPLY:
626 case HTTP_CLIENT_TIMEOUT:
627 wpa_printf(MSG_DEBUG, "WPS ER: Failed to fetch device info");
628 break;
629 }
630 http_client_free(ap->http);
631 ap->http = NULL;
632 if (ok)
633 wps_er_get_device_info(ap);
634 }
635
636
wps_er_ap_add(struct wps_er * er,const u8 * uuid,struct in_addr * addr,const char * location,int max_age)637 void wps_er_ap_add(struct wps_er *er, const u8 *uuid, struct in_addr *addr,
638 const char *location, int max_age)
639 {
640 struct wps_er_ap *ap;
641
642 ap = wps_er_ap_get(er, addr, uuid, NULL);
643 if (ap) {
644 /* Update advertisement timeout */
645 eloop_cancel_timeout(wps_er_ap_timeout, er, ap);
646 eloop_register_timeout(max_age, 0, wps_er_ap_timeout, er, ap);
647 return;
648 }
649
650 ap = os_zalloc(sizeof(*ap));
651 if (ap == NULL)
652 return;
653 dl_list_init(&ap->sta);
654 ap->er = er;
655 ap->id = ++er->next_ap_id;
656 ap->location = os_strdup(location);
657 if (ap->location == NULL) {
658 os_free(ap);
659 return;
660 }
661 dl_list_add(&er->ap, &ap->list);
662
663 ap->addr.s_addr = addr->s_addr;
664 os_memcpy(ap->uuid, uuid, WPS_UUID_LEN);
665 eloop_register_timeout(max_age, 0, wps_er_ap_timeout, er, ap);
666
667 wpa_printf(MSG_DEBUG, "WPS ER: Added AP entry for %s (%s)",
668 inet_ntoa(ap->addr), ap->location);
669
670 /* Fetch device description */
671 ap->http = http_client_url(ap->location, NULL, 10000,
672 wps_er_http_dev_desc_cb, ap);
673 }
674
675
wps_er_ap_remove(struct wps_er * er,struct in_addr * addr)676 void wps_er_ap_remove(struct wps_er *er, struct in_addr *addr)
677 {
678 struct wps_er_ap *ap;
679 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
680 if (ap->addr.s_addr == addr->s_addr) {
681 wps_er_ap_remove_entry(er, ap);
682 return;
683 }
684 }
685 }
686
687
wps_er_ap_remove_all(struct wps_er * er)688 static void wps_er_ap_remove_all(struct wps_er *er)
689 {
690 struct wps_er_ap *prev, *ap;
691 struct wps_er_ap_settings *prev_s, *s;
692 dl_list_for_each_safe(ap, prev, &er->ap, struct wps_er_ap, list)
693 wps_er_ap_remove_entry(er, ap);
694 dl_list_for_each_safe(s, prev_s, &er->ap_settings,
695 struct wps_er_ap_settings, list)
696 os_free(s);
697 }
698
699
http_put_date(struct wpabuf * buf)700 static void http_put_date(struct wpabuf *buf)
701 {
702 wpabuf_put_str(buf, "Date: ");
703 format_date(buf);
704 wpabuf_put_str(buf, "\r\n");
705 }
706
707
wps_er_http_resp_not_found(struct http_request * req)708 static void wps_er_http_resp_not_found(struct http_request *req)
709 {
710 struct wpabuf *buf;
711 buf = wpabuf_alloc(200);
712 if (buf == NULL) {
713 http_request_deinit(req);
714 return;
715 }
716
717 wpabuf_put_str(buf,
718 "HTTP/1.1 404 Not Found\r\n"
719 "Server: unspecified, UPnP/1.0, unspecified\r\n"
720 "Connection: close\r\n");
721 http_put_date(buf);
722 wpabuf_put_str(buf, "\r\n");
723 http_request_send_and_deinit(req, buf);
724 }
725
726
wps_er_http_resp_ok(struct http_request * req)727 static void wps_er_http_resp_ok(struct http_request *req)
728 {
729 struct wpabuf *buf;
730 buf = wpabuf_alloc(200);
731 if (buf == NULL) {
732 http_request_deinit(req);
733 return;
734 }
735
736 wpabuf_put_str(buf,
737 "HTTP/1.1 200 OK\r\n"
738 "Server: unspecified, UPnP/1.0, unspecified\r\n"
739 "Connection: close\r\n"
740 "Content-Length: 0\r\n");
741 http_put_date(buf);
742 wpabuf_put_str(buf, "\r\n");
743 http_request_send_and_deinit(req, buf);
744 }
745
746
wps_er_sta_timeout(void * eloop_data,void * user_ctx)747 static void wps_er_sta_timeout(void *eloop_data, void *user_ctx)
748 {
749 struct wps_er_sta *sta = eloop_data;
750 wpa_printf(MSG_DEBUG, "WPS ER: STA entry timed out");
751 dl_list_del(&sta->list);
752 wps_er_sta_free(sta);
753 }
754
755
wps_er_add_sta_data(struct wps_er_ap * ap,const u8 * addr,struct wps_parse_attr * attr,int probe_req)756 static struct wps_er_sta * wps_er_add_sta_data(struct wps_er_ap *ap,
757 const u8 *addr,
758 struct wps_parse_attr *attr,
759 int probe_req)
760 {
761 struct wps_er_sta *sta = wps_er_sta_get(ap, addr, NULL);
762 int new_sta = 0;
763 int m1;
764
765 m1 = !probe_req && attr->msg_type && *attr->msg_type == WPS_M1;
766
767 if (sta == NULL) {
768 /*
769 * Only allow new STA entry to be added based on Probe Request
770 * or M1. This will filter out bogus events and anything that
771 * may have been ongoing at the time ER subscribed for events.
772 */
773 if (!probe_req && !m1)
774 return NULL;
775
776 sta = os_zalloc(sizeof(*sta));
777 if (sta == NULL)
778 return NULL;
779 os_memcpy(sta->addr, addr, ETH_ALEN);
780 sta->ap = ap;
781 dl_list_add(&ap->sta, &sta->list);
782 new_sta = 1;
783 }
784
785 if (m1)
786 sta->m1_received = 1;
787
788 if (attr->config_methods && (!probe_req || !sta->m1_received))
789 sta->config_methods = WPA_GET_BE16(attr->config_methods);
790 if (attr->uuid_e && (!probe_req || !sta->m1_received))
791 os_memcpy(sta->uuid, attr->uuid_e, WPS_UUID_LEN);
792 if (attr->primary_dev_type && (!probe_req || !sta->m1_received))
793 os_memcpy(sta->pri_dev_type, attr->primary_dev_type, 8);
794 if (attr->dev_password_id && (!probe_req || !sta->m1_received))
795 sta->dev_passwd_id = WPA_GET_BE16(attr->dev_password_id);
796
797 if (attr->manufacturer) {
798 os_free(sta->manufacturer);
799 sta->manufacturer = dup_binstr(attr->manufacturer,
800 attr->manufacturer_len);
801 }
802
803 if (attr->model_name) {
804 os_free(sta->model_name);
805 sta->model_name = dup_binstr(attr->model_name,
806 attr->model_name_len);
807 }
808
809 if (attr->model_number) {
810 os_free(sta->model_number);
811 sta->model_number = dup_binstr(attr->model_number,
812 attr->model_number_len);
813 }
814
815 if (attr->serial_number) {
816 os_free(sta->serial_number);
817 sta->serial_number = dup_binstr(attr->serial_number,
818 attr->serial_number_len);
819 }
820
821 if (attr->dev_name) {
822 os_free(sta->dev_name);
823 sta->dev_name = dup_binstr(attr->dev_name, attr->dev_name_len);
824 }
825
826 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
827 eloop_register_timeout(300, 0, wps_er_sta_timeout, sta, NULL);
828
829 if (m1 || new_sta)
830 wps_er_sta_event(ap->er->wps, sta, WPS_EV_ER_ENROLLEE_ADD);
831
832 return sta;
833 }
834
835
wps_er_process_wlanevent_probe_req(struct wps_er_ap * ap,const u8 * addr,struct wpabuf * msg)836 static void wps_er_process_wlanevent_probe_req(struct wps_er_ap *ap,
837 const u8 *addr,
838 struct wpabuf *msg)
839 {
840 struct wps_parse_attr attr;
841
842 wpa_printf(MSG_DEBUG, "WPS ER: WLANEvent - Probe Request - from "
843 MACSTR, MAC2STR(addr));
844 wpa_hexdump_buf(MSG_MSGDUMP, "WPS ER: WLANEvent - Enrollee's message "
845 "(TLVs from Probe Request)", msg);
846
847 if (wps_validate_probe_req(msg, addr) < 0) {
848 wpa_printf(MSG_INFO, "WPS-STRICT: ER: Ignore invalid proxied "
849 "Probe Request frame from " MACSTR, MAC2STR(addr));
850 return;
851 }
852
853 if (wps_parse_msg(msg, &attr) < 0) {
854 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse TLVs in "
855 "WLANEvent message");
856 return;
857 }
858
859 wps_er_add_sta_data(ap, addr, &attr, 1);
860 wps_registrar_probe_req_rx(ap->er->wps->registrar, addr, msg, 0);
861 }
862
863
wps_er_http_put_wlan_response_cb(void * ctx,struct http_client * c,enum http_client_event event)864 static void wps_er_http_put_wlan_response_cb(void *ctx, struct http_client *c,
865 enum http_client_event event)
866 {
867 struct wps_er_sta *sta = ctx;
868
869 switch (event) {
870 case HTTP_CLIENT_OK:
871 wpa_printf(MSG_DEBUG, "WPS ER: PutWLANResponse OK");
872 break;
873 case HTTP_CLIENT_FAILED:
874 case HTTP_CLIENT_INVALID_REPLY:
875 case HTTP_CLIENT_TIMEOUT:
876 wpa_printf(MSG_DEBUG, "WPS ER: PutWLANResponse failed");
877 break;
878 }
879 http_client_free(sta->http);
880 sta->http = NULL;
881 }
882
883
884 static const char *soap_prefix =
885 "<?xml version=\"1.0\"?>\n"
886 "<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" "
887 "s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">\n"
888 "<s:Body>\n";
889 static const char *soap_postfix =
890 "</s:Body>\n</s:Envelope>\n";
891 static const char *urn_wfawlanconfig =
892 "urn:schemas-wifialliance-org:service:WFAWLANConfig:1";
893
wps_er_soap_hdr(const struct wpabuf * msg,const char * name,const char * arg_name,const char * path,const struct sockaddr_in * dst,char ** len_ptr,char ** body_ptr)894 static struct wpabuf * wps_er_soap_hdr(const struct wpabuf *msg,
895 const char *name, const char *arg_name,
896 const char *path,
897 const struct sockaddr_in *dst,
898 char **len_ptr, char **body_ptr)
899 {
900 unsigned char *encoded;
901 size_t encoded_len;
902 struct wpabuf *buf;
903
904 if (msg) {
905 encoded = base64_encode(wpabuf_head(msg), wpabuf_len(msg),
906 &encoded_len);
907 if (encoded == NULL)
908 return NULL;
909 } else {
910 encoded = NULL;
911 encoded_len = 0;
912 }
913
914 buf = wpabuf_alloc(1000 + encoded_len);
915 if (buf == NULL) {
916 os_free(encoded);
917 return NULL;
918 }
919
920 wpabuf_printf(buf,
921 "POST %s HTTP/1.1\r\n"
922 "Host: %s:%d\r\n"
923 "Content-Type: text/xml; charset=\"utf-8\"\r\n"
924 "Content-Length: ",
925 path, inet_ntoa(dst->sin_addr), ntohs(dst->sin_port));
926
927 *len_ptr = wpabuf_put(buf, 0);
928 wpabuf_printf(buf,
929 " \r\n"
930 "SOAPACTION: \"%s#%s\"\r\n"
931 "\r\n",
932 urn_wfawlanconfig, name);
933
934 *body_ptr = wpabuf_put(buf, 0);
935
936 wpabuf_put_str(buf, soap_prefix);
937 wpabuf_printf(buf, "<u:%s xmlns:u=\"", name);
938 wpabuf_put_str(buf, urn_wfawlanconfig);
939 wpabuf_put_str(buf, "\">\n");
940 if (encoded) {
941 wpabuf_printf(buf, "<%s>%s</%s>\n",
942 arg_name, (char *) encoded, arg_name);
943 os_free(encoded);
944 }
945
946 return buf;
947 }
948
949
wps_er_soap_end(struct wpabuf * buf,const char * name,char * len_ptr,char * body_ptr)950 static void wps_er_soap_end(struct wpabuf *buf, const char *name,
951 char *len_ptr, char *body_ptr)
952 {
953 char len_buf[10];
954 wpabuf_printf(buf, "</u:%s>\n", name);
955 wpabuf_put_str(buf, soap_postfix);
956 os_snprintf(len_buf, sizeof(len_buf), "%d",
957 (int) ((char *) wpabuf_put(buf, 0) - body_ptr));
958 os_memcpy(len_ptr, len_buf, os_strlen(len_buf));
959 }
960
961
wps_er_sta_send_msg(struct wps_er_sta * sta,struct wpabuf * msg)962 static void wps_er_sta_send_msg(struct wps_er_sta *sta, struct wpabuf *msg)
963 {
964 struct wpabuf *buf;
965 char *len_ptr, *body_ptr;
966 struct sockaddr_in dst;
967 char *url, *path;
968
969 if (sta->http) {
970 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request for STA - "
971 "ignore new request");
972 wpabuf_free(msg);
973 return;
974 }
975
976 if (sta->ap->control_url == NULL) {
977 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
978 wpabuf_free(msg);
979 return;
980 }
981
982 url = http_client_url_parse(sta->ap->control_url, &dst, &path);
983 if (url == NULL) {
984 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
985 wpabuf_free(msg);
986 return;
987 }
988
989 buf = wps_er_soap_hdr(msg, "PutWLANResponse", "NewMessage", path, &dst,
990 &len_ptr, &body_ptr);
991 wpabuf_free(msg);
992 os_free(url);
993 if (buf == NULL)
994 return;
995 wpabuf_printf(buf, "<NewWLANEventType>%d</NewWLANEventType>\n",
996 UPNP_WPS_WLANEVENT_TYPE_EAP);
997 wpabuf_printf(buf, "<NewWLANEventMAC>" MACSTR "</NewWLANEventMAC>\n",
998 MAC2STR(sta->addr));
999
1000 wps_er_soap_end(buf, "PutWLANResponse", len_ptr, body_ptr);
1001
1002 sta->http = http_client_addr(&dst, buf, 1000,
1003 wps_er_http_put_wlan_response_cb, sta);
1004 if (sta->http == NULL)
1005 wpabuf_free(buf);
1006 }
1007
1008
wps_er_sta_process(struct wps_er_sta * sta,struct wpabuf * msg,enum wsc_op_code op_code)1009 static void wps_er_sta_process(struct wps_er_sta *sta, struct wpabuf *msg,
1010 enum wsc_op_code op_code)
1011 {
1012 enum wps_process_res res;
1013
1014 res = wps_process_msg(sta->wps, op_code, msg);
1015 if (res == WPS_CONTINUE) {
1016 struct wpabuf *next = wps_get_msg(sta->wps, &op_code);
1017 if (next)
1018 wps_er_sta_send_msg(sta, next);
1019 } else {
1020 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run %s with the "
1021 "enrollee (res=%d)",
1022 res == WPS_DONE ? "succeeded" : "failed", res);
1023 wps_deinit(sta->wps);
1024 sta->wps = NULL;
1025 if (res == WPS_DONE) {
1026 /* Remove the STA entry after short timeout */
1027 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
1028 eloop_register_timeout(10, 0, wps_er_sta_timeout, sta,
1029 NULL);
1030 }
1031 }
1032 }
1033
1034
wps_er_sta_start(struct wps_er_sta * sta,struct wpabuf * msg)1035 static void wps_er_sta_start(struct wps_er_sta *sta, struct wpabuf *msg)
1036 {
1037 struct wps_config cfg;
1038
1039 if (sta->wps)
1040 wps_deinit(sta->wps);
1041
1042 os_memset(&cfg, 0, sizeof(cfg));
1043 cfg.wps = sta->ap->er->wps;
1044 cfg.registrar = 1;
1045 cfg.peer_addr = sta->addr;
1046
1047 sta->wps = wps_init(&cfg);
1048 if (sta->wps == NULL)
1049 return;
1050 sta->wps->er = 1;
1051 sta->wps->use_cred = sta->ap->ap_settings;
1052 if (sta->ap->ap_settings) {
1053 os_free(sta->cred);
1054 sta->cred = os_malloc(sizeof(*sta->cred));
1055 if (sta->cred) {
1056 os_memcpy(sta->cred, sta->ap->ap_settings,
1057 sizeof(*sta->cred));
1058 sta->cred->cred_attr = NULL;
1059 os_memcpy(sta->cred->mac_addr, sta->addr, ETH_ALEN);
1060 sta->wps->use_cred = sta->cred;
1061 }
1062 }
1063
1064 wps_er_sta_process(sta, msg, WSC_MSG);
1065 }
1066
1067
wps_er_process_wlanevent_eap(struct wps_er_ap * ap,const u8 * addr,struct wpabuf * msg)1068 static void wps_er_process_wlanevent_eap(struct wps_er_ap *ap, const u8 *addr,
1069 struct wpabuf *msg)
1070 {
1071 struct wps_parse_attr attr;
1072 struct wps_er_sta *sta;
1073
1074 wpa_printf(MSG_DEBUG, "WPS ER: WLANEvent - EAP - from " MACSTR,
1075 MAC2STR(addr));
1076 wpa_hexdump_buf(MSG_MSGDUMP, "WPS ER: WLANEvent - Enrollee's message "
1077 "(TLVs from EAP-WSC)", msg);
1078
1079 if (wps_parse_msg(msg, &attr) < 0) {
1080 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse TLVs in "
1081 "WLANEvent message");
1082 return;
1083 }
1084
1085 sta = wps_er_add_sta_data(ap, addr, &attr, 0);
1086 if (sta == NULL)
1087 return;
1088
1089 if (attr.msg_type && *attr.msg_type == WPS_M1)
1090 wps_er_sta_start(sta, msg);
1091 else if (sta->wps) {
1092 enum wsc_op_code op_code = WSC_MSG;
1093 if (attr.msg_type) {
1094 switch (*attr.msg_type) {
1095 case WPS_WSC_ACK:
1096 op_code = WSC_ACK;
1097 break;
1098 case WPS_WSC_NACK:
1099 op_code = WSC_NACK;
1100 break;
1101 case WPS_WSC_DONE:
1102 op_code = WSC_Done;
1103 break;
1104 }
1105 }
1106 wps_er_sta_process(sta, msg, op_code);
1107 }
1108 }
1109
1110
wps_er_process_wlanevent(struct wps_er_ap * ap,struct wpabuf * event)1111 static void wps_er_process_wlanevent(struct wps_er_ap *ap,
1112 struct wpabuf *event)
1113 {
1114 u8 *data;
1115 u8 wlan_event_type;
1116 u8 wlan_event_mac[ETH_ALEN];
1117 struct wpabuf msg;
1118
1119 wpa_hexdump(MSG_MSGDUMP, "WPS ER: Received WLANEvent",
1120 wpabuf_head(event), wpabuf_len(event));
1121 if (wpabuf_len(event) < 1 + 17) {
1122 wpa_printf(MSG_DEBUG, "WPS ER: Too short WLANEvent");
1123 return;
1124 }
1125
1126 data = wpabuf_mhead(event);
1127 wlan_event_type = data[0];
1128 if (hwaddr_aton((char *) data + 1, wlan_event_mac) < 0) {
1129 wpa_printf(MSG_DEBUG, "WPS ER: Invalid WLANEventMAC in "
1130 "WLANEvent");
1131 return;
1132 }
1133
1134 wpabuf_set(&msg, data + 1 + 17, wpabuf_len(event) - (1 + 17));
1135
1136 switch (wlan_event_type) {
1137 case 1:
1138 wps_er_process_wlanevent_probe_req(ap, wlan_event_mac, &msg);
1139 break;
1140 case 2:
1141 wps_er_process_wlanevent_eap(ap, wlan_event_mac, &msg);
1142 break;
1143 default:
1144 wpa_printf(MSG_DEBUG, "WPS ER: Unknown WLANEventType %d",
1145 wlan_event_type);
1146 break;
1147 }
1148 }
1149
1150
wps_er_http_event(struct wps_er * er,struct http_request * req,unsigned int ap_id)1151 static void wps_er_http_event(struct wps_er *er, struct http_request *req,
1152 unsigned int ap_id)
1153 {
1154 struct wps_er_ap *ap = wps_er_ap_get_id(er, ap_id);
1155 struct wpabuf *event;
1156 enum http_reply_code ret;
1157
1158 if (ap == NULL) {
1159 wpa_printf(MSG_DEBUG, "WPS ER: HTTP event from unknown AP id "
1160 "%u", ap_id);
1161 wps_er_http_resp_not_found(req);
1162 return;
1163 }
1164 wpa_printf(MSG_MSGDUMP, "WPS ER: HTTP event from AP id %u: %s",
1165 ap_id, http_request_get_data(req));
1166
1167 event = xml_get_base64_item(http_request_get_data(req), "WLANEvent",
1168 &ret);
1169 if (event == NULL) {
1170 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract WLANEvent "
1171 "from the event notification");
1172 /*
1173 * Reply with OK anyway to avoid getting unregistered from
1174 * events.
1175 */
1176 wps_er_http_resp_ok(req);
1177 return;
1178 }
1179
1180 wps_er_process_wlanevent(ap, event);
1181
1182 wpabuf_free(event);
1183 wps_er_http_resp_ok(req);
1184 }
1185
1186
wps_er_http_notify(struct wps_er * er,struct http_request * req)1187 static void wps_er_http_notify(struct wps_er *er, struct http_request *req)
1188 {
1189 char *uri = http_request_get_uri(req);
1190
1191 if (os_strncmp(uri, "/event/", 7) == 0) {
1192 unsigned int event_id;
1193 char *pos;
1194 event_id = atoi(uri + 7);
1195 if (event_id != er->event_id) {
1196 wpa_printf(MSG_DEBUG, "WPS ER: HTTP event for an "
1197 "unknown event id %u", event_id);
1198 return;
1199 }
1200 pos = os_strchr(uri + 7, '/');
1201 if (pos == NULL)
1202 return;
1203 pos++;
1204 wps_er_http_event(er, req, atoi(pos));
1205 } else {
1206 wpa_printf(MSG_DEBUG, "WPS ER: Unknown HTTP NOTIFY for '%s'",
1207 uri);
1208 wps_er_http_resp_not_found(req);
1209 }
1210 }
1211
1212
wps_er_http_req(void * ctx,struct http_request * req)1213 static void wps_er_http_req(void *ctx, struct http_request *req)
1214 {
1215 struct wps_er *er = ctx;
1216 struct sockaddr_in *cli = http_request_get_cli_addr(req);
1217 enum httpread_hdr_type type = http_request_get_type(req);
1218 struct wpabuf *buf;
1219
1220 wpa_printf(MSG_DEBUG, "WPS ER: HTTP request: '%s' (type %d) from "
1221 "%s:%d",
1222 http_request_get_uri(req), type,
1223 inet_ntoa(cli->sin_addr), ntohs(cli->sin_port));
1224
1225 switch (type) {
1226 case HTTPREAD_HDR_TYPE_NOTIFY:
1227 wps_er_http_notify(er, req);
1228 break;
1229 default:
1230 wpa_printf(MSG_DEBUG, "WPS ER: Unsupported HTTP request type "
1231 "%d", type);
1232 buf = wpabuf_alloc(200);
1233 if (buf == NULL) {
1234 http_request_deinit(req);
1235 return;
1236 }
1237 wpabuf_put_str(buf,
1238 "HTTP/1.1 501 Unimplemented\r\n"
1239 "Connection: close\r\n");
1240 http_put_date(buf);
1241 wpabuf_put_str(buf, "\r\n");
1242 http_request_send_and_deinit(req, buf);
1243 break;
1244 }
1245 }
1246
1247
1248 struct wps_er *
wps_er_init(struct wps_context * wps,const char * ifname,const char * filter)1249 wps_er_init(struct wps_context *wps, const char *ifname, const char *filter)
1250 {
1251 struct wps_er *er;
1252 struct in_addr addr;
1253
1254 er = os_zalloc(sizeof(*er));
1255 if (er == NULL)
1256 return NULL;
1257 dl_list_init(&er->ap);
1258 dl_list_init(&er->ap_unsubscribing);
1259 dl_list_init(&er->ap_settings);
1260
1261 er->multicast_sd = -1;
1262 er->ssdp_sd = -1;
1263
1264 os_strlcpy(er->ifname, ifname, sizeof(er->ifname));
1265 er->wps = wps;
1266 if (os_get_random((unsigned char *) &er->event_id,
1267 sizeof(er->event_id)) < 0) {
1268 wps_er_deinit(er, NULL, NULL);
1269 return NULL;
1270 }
1271 /* Limit event_id to < 32 bits to avoid issues with atoi() */
1272 er->event_id &= 0x0fffffff;
1273
1274 if (filter && os_strncmp(filter, "ifname=", 7) == 0) {
1275 const char *pos, *end;
1276 pos = filter + 7;
1277 end = os_strchr(pos, ' ');
1278 if (end) {
1279 size_t len = end - pos;
1280 os_strlcpy(er->ifname, pos, len < sizeof(er->ifname) ?
1281 len + 1 : sizeof(er->ifname));
1282 filter = end + 1;
1283 } else {
1284 os_strlcpy(er->ifname, pos, sizeof(er->ifname));
1285 filter = NULL;
1286 }
1287 er->forced_ifname = 1;
1288 }
1289
1290 if (filter) {
1291 if (inet_aton(filter, &er->filter_addr) == 0) {
1292 wpa_printf(MSG_INFO, "WPS UPnP: Invalid filter "
1293 "address %s", filter);
1294 wps_er_deinit(er, NULL, NULL);
1295 return NULL;
1296 }
1297 wpa_printf(MSG_DEBUG, "WPS UPnP: Only accepting connections "
1298 "with %s", filter);
1299 }
1300 if (get_netif_info(er->ifname, &er->ip_addr, &er->ip_addr_text,
1301 er->mac_addr)) {
1302 wpa_printf(MSG_INFO, "WPS UPnP: Could not get IP/MAC address "
1303 "for %s. Does it have IP address?", er->ifname);
1304 wps_er_deinit(er, NULL, NULL);
1305 return NULL;
1306 }
1307
1308 if (wps_er_ssdp_init(er) < 0) {
1309 wpa_printf(MSG_INFO, "WPS UPnP: SSDP initialization failed");
1310 wps_er_deinit(er, NULL, NULL);
1311 return NULL;
1312 }
1313
1314 addr.s_addr = er->ip_addr;
1315 er->http_srv = http_server_init(&addr, -1, wps_er_http_req, er);
1316 if (er->http_srv == NULL) {
1317 wpa_printf(MSG_INFO, "WPS UPnP: HTTP initialization failed");
1318 wps_er_deinit(er, NULL, NULL);
1319 return NULL;
1320 }
1321 er->http_port = http_server_get_port(er->http_srv);
1322
1323 wpa_printf(MSG_DEBUG, "WPS ER: Start (ifname=%s ip_addr=%s)",
1324 er->ifname, er->ip_addr_text);
1325
1326 return er;
1327 }
1328
1329
wps_er_refresh(struct wps_er * er)1330 void wps_er_refresh(struct wps_er *er)
1331 {
1332 struct wps_er_ap *ap;
1333 struct wps_er_sta *sta;
1334
1335 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
1336 wps_er_ap_event(er->wps, ap, WPS_EV_ER_AP_ADD);
1337 dl_list_for_each(sta, &ap->sta, struct wps_er_sta, list)
1338 wps_er_sta_event(er->wps, sta, WPS_EV_ER_ENROLLEE_ADD);
1339 }
1340
1341 wps_er_send_ssdp_msearch(er);
1342 }
1343
1344
wps_er_deinit_finish(void * eloop_data,void * user_ctx)1345 static void wps_er_deinit_finish(void *eloop_data, void *user_ctx)
1346 {
1347 struct wps_er *er = eloop_data;
1348 void (*deinit_done_cb)(void *ctx);
1349 void *deinit_done_ctx;
1350 struct wps_er_ap *ap, *tmp;
1351
1352 wpa_printf(MSG_DEBUG, "WPS ER: Finishing deinit");
1353
1354 dl_list_for_each_safe(ap, tmp, &er->ap_unsubscribing, struct wps_er_ap,
1355 list) {
1356 wpa_printf(MSG_DEBUG, "WPS ER: AP entry for %s (%s) still in ap_unsubscribing list - free it",
1357 inet_ntoa(ap->addr), ap->location);
1358 dl_list_del(&ap->list);
1359 wps_er_ap_free(ap);
1360 }
1361
1362 eloop_cancel_timeout(wps_er_deinit_finish, er, NULL);
1363 deinit_done_cb = er->deinit_done_cb;
1364 deinit_done_ctx = er->deinit_done_ctx;
1365 os_free(er->ip_addr_text);
1366 os_free(er);
1367
1368 if (deinit_done_cb)
1369 deinit_done_cb(deinit_done_ctx);
1370 }
1371
1372
wps_er_deinit(struct wps_er * er,void (* cb)(void * ctx),void * ctx)1373 void wps_er_deinit(struct wps_er *er, void (*cb)(void *ctx), void *ctx)
1374 {
1375 if (er == NULL)
1376 return;
1377 http_server_deinit(er->http_srv);
1378 wps_er_ap_remove_all(er);
1379 wps_er_ssdp_deinit(er);
1380 eloop_register_timeout(dl_list_empty(&er->ap_unsubscribing) ? 0 : 5, 0,
1381 wps_er_deinit_finish, er, NULL);
1382 wpa_printf(MSG_DEBUG, "WPS ER: Finish deinit from timeout");
1383 er->deinitializing = 1;
1384 er->deinit_done_cb = cb;
1385 er->deinit_done_ctx = ctx;
1386 }
1387
1388
wps_er_http_set_sel_reg_cb(void * ctx,struct http_client * c,enum http_client_event event)1389 static void wps_er_http_set_sel_reg_cb(void *ctx, struct http_client *c,
1390 enum http_client_event event)
1391 {
1392 struct wps_er_ap *ap = ctx;
1393 union wps_event_data data;
1394
1395 os_memset(&data, 0, sizeof(data));
1396
1397 switch (event) {
1398 case HTTP_CLIENT_OK:
1399 wpa_printf(MSG_DEBUG, "WPS ER: SetSelectedRegistrar OK");
1400 data.set_sel_reg.state = WPS_ER_SET_SEL_REG_DONE;
1401 data.set_sel_reg.uuid = ap->uuid;
1402 break;
1403 case HTTP_CLIENT_FAILED:
1404 case HTTP_CLIENT_INVALID_REPLY:
1405 case HTTP_CLIENT_TIMEOUT:
1406 wpa_printf(MSG_DEBUG, "WPS ER: SetSelectedRegistrar failed");
1407 data.set_sel_reg.state = WPS_ER_SET_SEL_REG_FAILED;
1408 data.set_sel_reg.uuid = ap->uuid;
1409 break;
1410 }
1411 http_client_free(ap->http);
1412 ap->http = NULL;
1413
1414 if (data.set_sel_reg.uuid)
1415 ap->er->wps->event_cb(ap->er->wps->cb_ctx,
1416 WPS_EV_ER_SET_SELECTED_REGISTRAR, &data);
1417 }
1418
1419
wps_er_send_set_sel_reg(struct wps_er_ap * ap,struct wpabuf * msg)1420 static void wps_er_send_set_sel_reg(struct wps_er_ap *ap, struct wpabuf *msg)
1421 {
1422 struct wpabuf *buf;
1423 char *len_ptr, *body_ptr;
1424 struct sockaddr_in dst;
1425 char *url, *path;
1426
1427 if (ap->control_url == NULL) {
1428 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1429 return;
1430 }
1431
1432 if (ap->http) {
1433 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request for AP - "
1434 "ignore new request");
1435 return;
1436 }
1437
1438 if (ap->wps) {
1439 wpa_printf(MSG_DEBUG, "WPS ER: Pending WPS operation for AP - "
1440 "skip SetSelectedRegistrar");
1441 return;
1442 }
1443
1444 url = http_client_url_parse(ap->control_url, &dst, &path);
1445 if (url == NULL) {
1446 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1447 return;
1448 }
1449
1450 buf = wps_er_soap_hdr(msg, "SetSelectedRegistrar", "NewMessage", path,
1451 &dst, &len_ptr, &body_ptr);
1452 os_free(url);
1453 if (buf == NULL)
1454 return;
1455
1456 wps_er_soap_end(buf, "SetSelectedRegistrar", len_ptr, body_ptr);
1457
1458 ap->http = http_client_addr(&dst, buf, 1000,
1459 wps_er_http_set_sel_reg_cb, ap);
1460 if (ap->http == NULL)
1461 wpabuf_free(buf);
1462 }
1463
1464
wps_er_build_selected_registrar(struct wpabuf * msg,int sel_reg)1465 static int wps_er_build_selected_registrar(struct wpabuf *msg, int sel_reg)
1466 {
1467 wpabuf_put_be16(msg, ATTR_SELECTED_REGISTRAR);
1468 wpabuf_put_be16(msg, 1);
1469 wpabuf_put_u8(msg, !!sel_reg);
1470 return 0;
1471 }
1472
1473
wps_er_build_dev_password_id(struct wpabuf * msg,u16 dev_passwd_id)1474 static int wps_er_build_dev_password_id(struct wpabuf *msg, u16 dev_passwd_id)
1475 {
1476 wpabuf_put_be16(msg, ATTR_DEV_PASSWORD_ID);
1477 wpabuf_put_be16(msg, 2);
1478 wpabuf_put_be16(msg, dev_passwd_id);
1479 return 0;
1480 }
1481
1482
wps_er_build_sel_reg_config_methods(struct wpabuf * msg,u16 sel_reg_config_methods)1483 static int wps_er_build_sel_reg_config_methods(struct wpabuf *msg,
1484 u16 sel_reg_config_methods)
1485 {
1486 wpabuf_put_be16(msg, ATTR_SELECTED_REGISTRAR_CONFIG_METHODS);
1487 wpabuf_put_be16(msg, 2);
1488 wpabuf_put_be16(msg, sel_reg_config_methods);
1489 return 0;
1490 }
1491
1492
wps_er_build_uuid_r(struct wpabuf * msg,const u8 * uuid_r)1493 static int wps_er_build_uuid_r(struct wpabuf *msg, const u8 *uuid_r)
1494 {
1495 wpabuf_put_be16(msg, ATTR_UUID_R);
1496 wpabuf_put_be16(msg, WPS_UUID_LEN);
1497 wpabuf_put_data(msg, uuid_r, WPS_UUID_LEN);
1498 return 0;
1499 }
1500
1501
wps_er_set_sel_reg(struct wps_er * er,int sel_reg,u16 dev_passwd_id,u16 sel_reg_config_methods)1502 void wps_er_set_sel_reg(struct wps_er *er, int sel_reg, u16 dev_passwd_id,
1503 u16 sel_reg_config_methods)
1504 {
1505 struct wpabuf *msg;
1506 struct wps_er_ap *ap;
1507 struct wps_registrar *reg = er->wps->registrar;
1508 const u8 *auth_macs;
1509 u8 bcast[ETH_ALEN];
1510 size_t count;
1511 union wps_event_data data;
1512
1513 if (er->skip_set_sel_reg) {
1514 wpa_printf(MSG_DEBUG, "WPS ER: Skip SetSelectedRegistrar");
1515 return;
1516 }
1517
1518 msg = wpabuf_alloc(500);
1519 if (msg == NULL)
1520 return;
1521
1522 auth_macs = wps_authorized_macs(reg, &count);
1523 if (count == 0) {
1524 os_memset(bcast, 0xff, ETH_ALEN);
1525 auth_macs = bcast;
1526 count = 1;
1527 }
1528
1529 if (wps_build_version(msg) ||
1530 wps_er_build_selected_registrar(msg, sel_reg) ||
1531 wps_er_build_dev_password_id(msg, dev_passwd_id) ||
1532 wps_er_build_sel_reg_config_methods(msg, sel_reg_config_methods) ||
1533 wps_build_wfa_ext(msg, 0, auth_macs, count, 0) ||
1534 wps_er_build_uuid_r(msg, er->wps->uuid)) {
1535 wpabuf_free(msg);
1536 return;
1537 }
1538
1539 os_memset(&data, 0, sizeof(data));
1540 data.set_sel_reg.sel_reg = sel_reg;
1541 data.set_sel_reg.dev_passwd_id = dev_passwd_id;
1542 data.set_sel_reg.sel_reg_config_methods = sel_reg_config_methods;
1543 data.set_sel_reg.state = WPS_ER_SET_SEL_REG_START;
1544
1545 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
1546 if (er->set_sel_reg_uuid_filter &&
1547 os_memcmp(ap->uuid, er->set_sel_reg_uuid_filter,
1548 WPS_UUID_LEN) != 0)
1549 continue;
1550 data.set_sel_reg.uuid = ap->uuid;
1551 er->wps->event_cb(er->wps->cb_ctx,
1552 WPS_EV_ER_SET_SELECTED_REGISTRAR, &data);
1553 wps_er_send_set_sel_reg(ap, msg);
1554 }
1555
1556 wpabuf_free(msg);
1557 }
1558
1559
wps_er_pbc(struct wps_er * er,const u8 * uuid,const u8 * addr)1560 int wps_er_pbc(struct wps_er *er, const u8 *uuid, const u8 *addr)
1561 {
1562 int res;
1563 struct wps_er_ap *ap;
1564
1565 if (er == NULL || er->wps == NULL)
1566 return -1;
1567
1568 if (wps_registrar_pbc_overlap(er->wps->registrar, NULL, NULL)) {
1569 wpa_printf(MSG_DEBUG, "WPS ER: PBC overlap - do not start PBC "
1570 "mode");
1571 return -2;
1572 }
1573
1574 if (uuid)
1575 ap = wps_er_ap_get(er, NULL, uuid, NULL);
1576 else
1577 ap = NULL;
1578 if (ap == NULL) {
1579 struct wps_er_sta *sta = NULL;
1580 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
1581 sta = wps_er_sta_get(ap, addr, uuid);
1582 if (sta) {
1583 uuid = ap->uuid;
1584 break;
1585 }
1586 }
1587 if (sta == NULL)
1588 return -3; /* Unknown UUID */
1589 }
1590
1591 if (ap->ap_settings == NULL) {
1592 wpa_printf(MSG_DEBUG, "WPS ER: AP settings not known");
1593 return -4;
1594 }
1595
1596 er->set_sel_reg_uuid_filter = uuid;
1597 res = wps_registrar_button_pushed(er->wps->registrar, NULL);
1598 er->set_sel_reg_uuid_filter = NULL;
1599 if (res)
1600 return -1;
1601
1602 return 0;
1603 }
1604
1605
wps_er_ap_settings_cb(void * ctx,const struct wps_credential * cred)1606 static void wps_er_ap_settings_cb(void *ctx, const struct wps_credential *cred)
1607 {
1608 struct wps_er_ap *ap = ctx;
1609 union wps_event_data data;
1610
1611 wpa_printf(MSG_DEBUG, "WPS ER: AP Settings received");
1612 os_free(ap->ap_settings);
1613 ap->ap_settings = os_malloc(sizeof(*cred));
1614 if (ap->ap_settings) {
1615 os_memcpy(ap->ap_settings, cred, sizeof(*cred));
1616 ap->ap_settings->cred_attr = NULL;
1617 }
1618
1619 os_memset(&data, 0, sizeof(data));
1620 data.ap_settings.uuid = ap->uuid;
1621 data.ap_settings.cred = cred;
1622 ap->er->wps->event_cb(ap->er->wps->cb_ctx, WPS_EV_ER_AP_SETTINGS,
1623 &data);
1624 }
1625
1626
wps_er_get_sta_uuid(struct wps_er * er,const u8 * addr)1627 const u8 * wps_er_get_sta_uuid(struct wps_er *er, const u8 *addr)
1628 {
1629 struct wps_er_ap *ap;
1630 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
1631 struct wps_er_sta *sta;
1632 sta = wps_er_sta_get(ap, addr, NULL);
1633 if (sta)
1634 return sta->uuid;
1635 }
1636 return NULL;
1637 }
1638
1639
wps_er_http_put_message_cb(void * ctx,struct http_client * c,enum http_client_event event)1640 static void wps_er_http_put_message_cb(void *ctx, struct http_client *c,
1641 enum http_client_event event)
1642 {
1643 struct wps_er_ap *ap = ctx;
1644 struct wpabuf *reply;
1645 char *msg = NULL;
1646
1647 switch (event) {
1648 case HTTP_CLIENT_OK:
1649 wpa_printf(MSG_DEBUG, "WPS ER: PutMessage OK");
1650 reply = http_client_get_body(c);
1651 if (reply)
1652 msg = os_zalloc(wpabuf_len(reply) + 1);
1653 if (msg == NULL) {
1654 if (ap->wps) {
1655 wps_deinit(ap->wps);
1656 ap->wps = NULL;
1657 }
1658 break;
1659 }
1660 os_memcpy(msg, wpabuf_head(reply), wpabuf_len(reply));
1661 break;
1662 case HTTP_CLIENT_FAILED:
1663 case HTTP_CLIENT_INVALID_REPLY:
1664 case HTTP_CLIENT_TIMEOUT:
1665 wpa_printf(MSG_DEBUG, "WPS ER: PutMessage failed");
1666 if (ap->wps) {
1667 wps_deinit(ap->wps);
1668 ap->wps = NULL;
1669 }
1670 break;
1671 }
1672 http_client_free(ap->http);
1673 ap->http = NULL;
1674
1675 if (msg) {
1676 struct wpabuf *buf;
1677 enum http_reply_code ret;
1678 buf = xml_get_base64_item(msg, "NewOutMessage", &ret);
1679 os_free(msg);
1680 if (buf == NULL) {
1681 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract "
1682 "NewOutMessage from PutMessage response");
1683 wps_deinit(ap->wps);
1684 ap->wps = NULL;
1685 return;
1686 }
1687 wps_er_ap_process(ap, buf);
1688 wpabuf_free(buf);
1689 }
1690 }
1691
1692
wps_er_ap_put_message(struct wps_er_ap * ap,const struct wpabuf * msg)1693 static void wps_er_ap_put_message(struct wps_er_ap *ap,
1694 const struct wpabuf *msg)
1695 {
1696 struct wpabuf *buf;
1697 char *len_ptr, *body_ptr;
1698 struct sockaddr_in dst;
1699 char *url, *path;
1700
1701 if (ap->http) {
1702 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP operation ongoing "
1703 "with the AP - cannot continue learn");
1704 return;
1705 }
1706
1707 if (ap->control_url == NULL) {
1708 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1709 return;
1710 }
1711
1712 url = http_client_url_parse(ap->control_url, &dst, &path);
1713 if (url == NULL) {
1714 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1715 goto fail;
1716 }
1717
1718 buf = wps_er_soap_hdr(msg, "PutMessage", "NewInMessage", path, &dst,
1719 &len_ptr, &body_ptr);
1720 os_free(url);
1721 if (buf == NULL)
1722 goto fail;
1723
1724 wps_er_soap_end(buf, "PutMessage", len_ptr, body_ptr);
1725
1726 ap->http = http_client_addr(&dst, buf, 10000,
1727 wps_er_http_put_message_cb, ap);
1728 if (ap->http == NULL) {
1729 wpabuf_free(buf);
1730 goto fail;
1731 }
1732 return;
1733
1734 fail:
1735 if (ap->wps) {
1736 wps_deinit(ap->wps);
1737 ap->wps = NULL;
1738 }
1739 }
1740
1741
wps_er_ap_process(struct wps_er_ap * ap,struct wpabuf * msg)1742 static void wps_er_ap_process(struct wps_er_ap *ap, struct wpabuf *msg)
1743 {
1744 enum wps_process_res res;
1745 struct wps_parse_attr attr;
1746 enum wsc_op_code op_code;
1747
1748 op_code = WSC_MSG;
1749 if (wps_parse_msg(msg, &attr) == 0 && attr.msg_type) {
1750 switch (*attr.msg_type) {
1751 case WPS_WSC_ACK:
1752 op_code = WSC_ACK;
1753 break;
1754 case WPS_WSC_NACK:
1755 op_code = WSC_NACK;
1756 break;
1757 case WPS_WSC_DONE:
1758 op_code = WSC_Done;
1759 break;
1760 }
1761 }
1762
1763 res = wps_process_msg(ap->wps, op_code, msg);
1764 if (res == WPS_CONTINUE) {
1765 struct wpabuf *next = wps_get_msg(ap->wps, &op_code);
1766 if (next) {
1767 wps_er_ap_put_message(ap, next);
1768 wpabuf_free(next);
1769 } else {
1770 wpa_printf(MSG_DEBUG, "WPS ER: Failed to build "
1771 "message");
1772 wps_deinit(ap->wps);
1773 ap->wps = NULL;
1774 }
1775 } else if (res == WPS_DONE) {
1776 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run done");
1777 wps_deinit(ap->wps);
1778 ap->wps = NULL;
1779 } else {
1780 wpa_printf(MSG_DEBUG, "WPS ER: Failed to process message from "
1781 "AP (res=%d)", res);
1782 wps_deinit(ap->wps);
1783 ap->wps = NULL;
1784 }
1785 }
1786
1787
wps_er_ap_learn_m1(struct wps_er_ap * ap,struct wpabuf * m1)1788 static void wps_er_ap_learn_m1(struct wps_er_ap *ap, struct wpabuf *m1)
1789 {
1790 struct wps_config cfg;
1791
1792 if (ap->wps) {
1793 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run already in "
1794 "progress with this AP");
1795 return;
1796 }
1797
1798 os_memset(&cfg, 0, sizeof(cfg));
1799 cfg.wps = ap->er->wps;
1800 cfg.registrar = 1;
1801 ap->wps = wps_init(&cfg);
1802 if (ap->wps == NULL)
1803 return;
1804 ap->wps->ap_settings_cb = wps_er_ap_settings_cb;
1805 ap->wps->ap_settings_cb_ctx = ap;
1806
1807 wps_er_ap_process(ap, m1);
1808 }
1809
1810
wps_er_ap_learn(struct wps_er_ap * ap,const char * dev_info)1811 static void wps_er_ap_learn(struct wps_er_ap *ap, const char *dev_info)
1812 {
1813 struct wpabuf *info;
1814 enum http_reply_code ret;
1815
1816 wpa_printf(MSG_DEBUG, "WPS ER: Received GetDeviceInfo response (M1) "
1817 "from the AP");
1818 info = xml_get_base64_item(dev_info, "NewDeviceInfo", &ret);
1819 if (info == NULL) {
1820 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract "
1821 "NewDeviceInfo from GetDeviceInfo response");
1822 return;
1823 }
1824
1825 ap->m1_handler(ap, info);
1826 wpabuf_free(info);
1827 }
1828
1829
wps_er_http_get_dev_info_cb(void * ctx,struct http_client * c,enum http_client_event event)1830 static void wps_er_http_get_dev_info_cb(void *ctx, struct http_client *c,
1831 enum http_client_event event)
1832 {
1833 struct wps_er_ap *ap = ctx;
1834 struct wpabuf *reply;
1835 char *dev_info = NULL;
1836
1837 switch (event) {
1838 case HTTP_CLIENT_OK:
1839 wpa_printf(MSG_DEBUG, "WPS ER: GetDeviceInfo OK");
1840 reply = http_client_get_body(c);
1841 if (reply == NULL)
1842 break;
1843 dev_info = os_zalloc(wpabuf_len(reply) + 1);
1844 if (dev_info == NULL)
1845 break;
1846 os_memcpy(dev_info, wpabuf_head(reply), wpabuf_len(reply));
1847 break;
1848 case HTTP_CLIENT_FAILED:
1849 case HTTP_CLIENT_INVALID_REPLY:
1850 case HTTP_CLIENT_TIMEOUT:
1851 wpa_printf(MSG_DEBUG, "WPS ER: GetDeviceInfo failed");
1852 break;
1853 }
1854 http_client_free(ap->http);
1855 ap->http = NULL;
1856
1857 if (dev_info) {
1858 wps_er_ap_learn(ap, dev_info);
1859 os_free(dev_info);
1860 }
1861 }
1862
1863
wps_er_send_get_device_info(struct wps_er_ap * ap,void (* m1_handler)(struct wps_er_ap * ap,struct wpabuf * m1))1864 static int wps_er_send_get_device_info(struct wps_er_ap *ap,
1865 void (*m1_handler)(struct wps_er_ap *ap,
1866 struct wpabuf *m1))
1867 {
1868 struct wpabuf *buf;
1869 char *len_ptr, *body_ptr;
1870 struct sockaddr_in dst;
1871 char *url, *path;
1872
1873 if (ap->http) {
1874 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP operation ongoing "
1875 "with the AP - cannot get device info");
1876 return -1;
1877 }
1878
1879 if (ap->control_url == NULL) {
1880 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1881 return -1;
1882 }
1883
1884 url = http_client_url_parse(ap->control_url, &dst, &path);
1885 if (url == NULL) {
1886 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1887 return -1;
1888 }
1889
1890 buf = wps_er_soap_hdr(NULL, "GetDeviceInfo", NULL, path, &dst,
1891 &len_ptr, &body_ptr);
1892 os_free(url);
1893 if (buf == NULL)
1894 return -1;
1895
1896 wps_er_soap_end(buf, "GetDeviceInfo", len_ptr, body_ptr);
1897
1898 ap->http = http_client_addr(&dst, buf, 10000,
1899 wps_er_http_get_dev_info_cb, ap);
1900 if (ap->http == NULL) {
1901 wpabuf_free(buf);
1902 return -1;
1903 }
1904
1905 ap->m1_handler = m1_handler;
1906
1907 return 0;
1908 }
1909
1910
wps_er_learn(struct wps_er * er,const u8 * uuid,const u8 * addr,const u8 * pin,size_t pin_len)1911 int wps_er_learn(struct wps_er *er, const u8 *uuid, const u8 *addr,
1912 const u8 *pin, size_t pin_len)
1913 {
1914 struct wps_er_ap *ap;
1915
1916 if (er == NULL)
1917 return -1;
1918
1919 ap = wps_er_ap_get(er, NULL, uuid, addr);
1920 if (ap == NULL) {
1921 wpa_printf(MSG_DEBUG, "WPS ER: AP not found for learn "
1922 "request");
1923 return -1;
1924 }
1925 if (uuid == NULL)
1926 uuid = ap->uuid;
1927 if (ap->wps) {
1928 wpa_printf(MSG_DEBUG, "WPS ER: Pending operation ongoing "
1929 "with the AP - cannot start learn");
1930 return -1;
1931 }
1932
1933 if (wps_er_send_get_device_info(ap, wps_er_ap_learn_m1) < 0)
1934 return -1;
1935
1936 er->skip_set_sel_reg = 1;
1937 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0);
1938 er->skip_set_sel_reg = 0;
1939
1940 return 0;
1941 }
1942
1943
wps_er_set_config(struct wps_er * er,const u8 * uuid,const u8 * addr,const struct wps_credential * cred)1944 int wps_er_set_config(struct wps_er *er, const u8 *uuid, const u8 *addr,
1945 const struct wps_credential *cred)
1946 {
1947 struct wps_er_ap *ap;
1948
1949 if (er == NULL)
1950 return -1;
1951
1952 ap = wps_er_ap_get(er, NULL, uuid, addr);
1953 if (ap == NULL) {
1954 wpa_printf(MSG_DEBUG, "WPS ER: AP not found for set config "
1955 "request");
1956 return -1;
1957 }
1958
1959 os_free(ap->ap_settings);
1960 ap->ap_settings = os_memdup(cred, sizeof(*cred));
1961 if (ap->ap_settings == NULL)
1962 return -1;
1963 ap->ap_settings->cred_attr = NULL;
1964 wpa_printf(MSG_DEBUG, "WPS ER: Updated local AP settings based set "
1965 "config request");
1966
1967 return 0;
1968 }
1969
1970
wps_er_ap_config_m1(struct wps_er_ap * ap,struct wpabuf * m1)1971 static void wps_er_ap_config_m1(struct wps_er_ap *ap, struct wpabuf *m1)
1972 {
1973 struct wps_config cfg;
1974
1975 if (ap->wps) {
1976 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run already in "
1977 "progress with this AP");
1978 return;
1979 }
1980
1981 os_memset(&cfg, 0, sizeof(cfg));
1982 cfg.wps = ap->er->wps;
1983 cfg.registrar = 1;
1984 cfg.new_ap_settings = ap->ap_settings;
1985 ap->wps = wps_init(&cfg);
1986 if (ap->wps == NULL)
1987 return;
1988 ap->wps->ap_settings_cb = NULL;
1989 ap->wps->ap_settings_cb_ctx = NULL;
1990
1991 wps_er_ap_process(ap, m1);
1992 }
1993
1994
wps_er_config(struct wps_er * er,const u8 * uuid,const u8 * addr,const u8 * pin,size_t pin_len,const struct wps_credential * cred)1995 int wps_er_config(struct wps_er *er, const u8 *uuid, const u8 *addr,
1996 const u8 *pin, size_t pin_len,
1997 const struct wps_credential *cred)
1998 {
1999 struct wps_er_ap *ap;
2000
2001 if (er == NULL)
2002 return -1;
2003
2004 ap = wps_er_ap_get(er, NULL, uuid, addr);
2005 if (ap == NULL) {
2006 wpa_printf(MSG_DEBUG, "WPS ER: AP not found for config "
2007 "request");
2008 return -1;
2009 }
2010 if (uuid == NULL)
2011 uuid = ap->uuid;
2012 if (ap->wps) {
2013 wpa_printf(MSG_DEBUG, "WPS ER: Pending operation ongoing "
2014 "with the AP - cannot start config");
2015 return -1;
2016 }
2017
2018 os_free(ap->ap_settings);
2019 ap->ap_settings = os_memdup(cred, sizeof(*cred));
2020 if (ap->ap_settings == NULL)
2021 return -1;
2022 ap->ap_settings->cred_attr = NULL;
2023
2024 if (wps_er_send_get_device_info(ap, wps_er_ap_config_m1) < 0)
2025 return -1;
2026
2027 er->skip_set_sel_reg = 1;
2028 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0);
2029 er->skip_set_sel_reg = 0;
2030
2031 return 0;
2032 }
2033
2034
2035 #ifdef CONFIG_WPS_NFC
2036
wps_er_config_token_from_cred(struct wps_context * wps,struct wps_credential * cred)2037 struct wpabuf * wps_er_config_token_from_cred(struct wps_context *wps,
2038 struct wps_credential *cred)
2039 {
2040 struct wpabuf *ret;
2041 struct wps_data data;
2042
2043 ret = wpabuf_alloc(500);
2044 if (ret == NULL)
2045 return NULL;
2046
2047 os_memset(&data, 0, sizeof(data));
2048 data.wps = wps;
2049 data.use_cred = cred;
2050 if (wps_build_cred(&data, ret) ||
2051 wps_build_wfa_ext(ret, 0, NULL, 0, 0)) {
2052 wpabuf_free(ret);
2053 return NULL;
2054 }
2055
2056 return ret;
2057 }
2058
2059
wps_er_nfc_config_token(struct wps_er * er,const u8 * uuid,const u8 * addr)2060 struct wpabuf * wps_er_nfc_config_token(struct wps_er *er, const u8 *uuid,
2061 const u8 *addr)
2062 {
2063 struct wps_er_ap *ap;
2064
2065 if (er == NULL)
2066 return NULL;
2067
2068 ap = wps_er_ap_get(er, NULL, uuid, addr);
2069 if (ap == NULL)
2070 return NULL;
2071 if (ap->ap_settings == NULL) {
2072 wpa_printf(MSG_DEBUG, "WPS ER: No settings known for the "
2073 "selected AP");
2074 return NULL;
2075 }
2076
2077 return wps_er_config_token_from_cred(er->wps, ap->ap_settings);
2078 }
2079
2080
wps_er_nfc_handover_sel(struct wps_er * er,struct wps_context * wps,const u8 * uuid,const u8 * addr,struct wpabuf * pubkey)2081 struct wpabuf * wps_er_nfc_handover_sel(struct wps_er *er,
2082 struct wps_context *wps, const u8 *uuid,
2083 const u8 *addr, struct wpabuf *pubkey)
2084 {
2085 struct wps_er_ap *ap;
2086
2087 if (er == NULL)
2088 return NULL;
2089
2090 ap = wps_er_ap_get(er, NULL, uuid, addr);
2091 if (ap == NULL)
2092 return NULL;
2093 if (ap->ap_settings == NULL) {
2094 wpa_printf(MSG_DEBUG, "WPS ER: No settings known for the "
2095 "selected AP");
2096 return NULL;
2097 }
2098
2099 os_memcpy(wps->ssid, ap->ap_settings->ssid, ap->ap_settings->ssid_len);
2100 wps->ssid_len = ap->ap_settings->ssid_len;
2101
2102 return wps_build_nfc_handover_sel(wps, pubkey, addr, 0);
2103 }
2104
2105 #endif /* CONFIG_WPS_NFC */
2106