]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/wps/wps_er.c
WPS 2.0: Make WSC 2.0 support to be build option (CONFIG_WPS2)
[thirdparty/hostap.git] / src / wps / wps_er.c
1 /*
2 * Wi-Fi Protected Setup - External Registrar
3 * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15 #include "includes.h"
16
17 #include "common.h"
18 #include "base64.h"
19 #include "uuid.h"
20 #include "eloop.h"
21 #include "httpread.h"
22 #include "http_client.h"
23 #include "http_server.h"
24 #include "upnp_xml.h"
25 #include "wps_i.h"
26 #include "wps_upnp.h"
27 #include "wps_upnp_i.h"
28 #include "wps_er.h"
29
30
31 static void wps_er_deinit_finish(void *eloop_data, void *user_ctx);
32 static void wps_er_ap_timeout(void *eloop_data, void *user_ctx);
33 static void wps_er_sta_timeout(void *eloop_data, void *user_ctx);
34 static void wps_er_ap_process(struct wps_er_ap *ap, struct wpabuf *msg);
35 static int wps_er_send_get_device_info(struct wps_er_ap *ap,
36 void (*m1_handler)(struct wps_er_ap *ap,
37 struct wpabuf *m1));
38
39
40 static void wps_er_sta_event(struct wps_context *wps, struct wps_er_sta *sta,
41 enum wps_event event)
42 {
43 union wps_event_data data;
44 struct wps_event_er_enrollee *ev = &data.enrollee;
45
46 if (wps->event_cb == NULL)
47 return;
48
49 os_memset(&data, 0, sizeof(data));
50 ev->uuid = sta->uuid;
51 ev->mac_addr = sta->addr;
52 ev->m1_received = sta->m1_received;
53 ev->config_methods = sta->config_methods;
54 ev->dev_passwd_id = sta->dev_passwd_id;
55 ev->pri_dev_type = sta->pri_dev_type;
56 ev->dev_name = sta->dev_name;
57 ev->manufacturer = sta->manufacturer;
58 ev->model_name = sta->model_name;
59 ev->model_number = sta->model_number;
60 ev->serial_number = sta->serial_number;
61 wps->event_cb(wps->cb_ctx, event, &data);
62 }
63
64
65 static struct wps_er_sta * wps_er_sta_get(struct wps_er_ap *ap, const u8 *addr)
66 {
67 struct wps_er_sta *sta;
68 dl_list_for_each(sta, &ap->sta, struct wps_er_sta, list) {
69 if (os_memcmp(sta->addr, addr, ETH_ALEN) == 0)
70 return sta;
71 }
72 return NULL;
73 }
74
75
76 static void wps_er_sta_free(struct wps_er_sta *sta)
77 {
78 wps_er_sta_event(sta->ap->er->wps, sta, WPS_EV_ER_ENROLLEE_REMOVE);
79 if (sta->wps)
80 wps_deinit(sta->wps);
81 os_free(sta->manufacturer);
82 os_free(sta->model_name);
83 os_free(sta->model_number);
84 os_free(sta->serial_number);
85 os_free(sta->dev_name);
86 http_client_free(sta->http);
87 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
88 os_free(sta->cred);
89 os_free(sta);
90 }
91
92
93 static void wps_er_sta_remove_all(struct wps_er_ap *ap)
94 {
95 struct wps_er_sta *prev, *sta;
96 dl_list_for_each_safe(sta, prev, &ap->sta, struct wps_er_sta, list)
97 wps_er_sta_free(sta);
98 }
99
100
101 static struct wps_er_ap * wps_er_ap_get(struct wps_er *er,
102 struct in_addr *addr, const u8 *uuid)
103 {
104 struct wps_er_ap *ap;
105 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
106 if ((addr == NULL || ap->addr.s_addr == addr->s_addr) &&
107 (uuid == NULL ||
108 os_memcmp(uuid, ap->uuid, WPS_UUID_LEN) == 0))
109 return ap;
110 }
111 return NULL;
112 }
113
114
115 static struct wps_er_ap * wps_er_ap_get_id(struct wps_er *er, unsigned int id)
116 {
117 struct wps_er_ap *ap;
118 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
119 if (ap->id == id)
120 return ap;
121 }
122 return NULL;
123 }
124
125
126 static void wps_er_ap_event(struct wps_context *wps, struct wps_er_ap *ap,
127 enum wps_event event)
128 {
129 union wps_event_data data;
130 struct wps_event_er_ap *evap = &data.ap;
131
132 if (wps->event_cb == NULL)
133 return;
134
135 os_memset(&data, 0, sizeof(data));
136 evap->uuid = ap->uuid;
137 evap->friendly_name = ap->friendly_name;
138 evap->manufacturer = ap->manufacturer;
139 evap->manufacturer_url = ap->manufacturer_url;
140 evap->model_description = ap->model_description;
141 evap->model_name = ap->model_name;
142 evap->model_number = ap->model_number;
143 evap->model_url = ap->model_url;
144 evap->serial_number = ap->serial_number;
145 evap->upc = ap->upc;
146 evap->pri_dev_type = ap->pri_dev_type;
147 evap->wps_state = ap->wps_state;
148 evap->mac_addr = ap->mac_addr;
149 wps->event_cb(wps->cb_ctx, event, &data);
150 }
151
152
153 static void wps_er_ap_free(struct wps_er_ap *ap)
154 {
155 http_client_free(ap->http);
156 ap->http = NULL;
157
158 os_free(ap->location);
159 os_free(ap->friendly_name);
160 os_free(ap->manufacturer);
161 os_free(ap->manufacturer_url);
162 os_free(ap->model_description);
163 os_free(ap->model_name);
164 os_free(ap->model_number);
165 os_free(ap->model_url);
166 os_free(ap->serial_number);
167 os_free(ap->udn);
168 os_free(ap->upc);
169
170 os_free(ap->scpd_url);
171 os_free(ap->control_url);
172 os_free(ap->event_sub_url);
173
174 os_free(ap->ap_settings);
175
176 os_free(ap);
177 }
178
179
180 static void wps_er_ap_unsubscribed(struct wps_er *er, struct wps_er_ap *ap)
181 {
182 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
183 inet_ntoa(ap->addr), ap->location);
184 dl_list_del(&ap->list);
185 wps_er_ap_free(ap);
186
187 if (er->deinitializing && dl_list_empty(&er->ap_unsubscribing)) {
188 eloop_cancel_timeout(wps_er_deinit_finish, er, NULL);
189 wps_er_deinit_finish(er, NULL);
190 }
191 }
192
193
194 static void wps_er_http_unsubscribe_cb(void *ctx, struct http_client *c,
195 enum http_client_event event)
196 {
197 struct wps_er_ap *ap = ctx;
198
199 switch (event) {
200 case HTTP_CLIENT_OK:
201 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
202 ap->subscribed = 0;
203 break;
204 case HTTP_CLIENT_FAILED:
205 case HTTP_CLIENT_INVALID_REPLY:
206 case HTTP_CLIENT_TIMEOUT:
207 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
208 "events");
209 break;
210 }
211 http_client_free(ap->http);
212 ap->http = NULL;
213
214 /*
215 * Need to get rid of the AP entry regardless of whether we managed to
216 * unsubscribe cleanly or not.
217 */
218 wps_er_ap_unsubscribed(ap->er, ap);
219 }
220
221
222 static void wps_er_ap_unsubscribe(struct wps_er *er, struct wps_er_ap *ap)
223 {
224 struct wpabuf *req;
225 struct sockaddr_in dst;
226 char *url, *path;
227 char sid[100];
228
229 if (ap->event_sub_url == NULL) {
230 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
231 "subscribe");
232 goto fail;
233 }
234 if (ap->http) {
235 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
236 "send subscribe request");
237 goto fail;
238 }
239
240 url = http_client_url_parse(ap->event_sub_url, &dst, &path);
241 if (url == NULL) {
242 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
243 goto fail;
244 }
245
246 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000);
247 if (req == NULL) {
248 os_free(url);
249 goto fail;
250 }
251 uuid_bin2str(ap->sid, sid, sizeof(sid));
252 wpabuf_printf(req,
253 "UNSUBSCRIBE %s HTTP/1.1\r\n"
254 "HOST: %s:%d\r\n"
255 "SID: uuid:%s\r\n"
256 "\r\n",
257 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid);
258 os_free(url);
259 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Unsubscription request",
260 wpabuf_head(req), wpabuf_len(req));
261
262 ap->http = http_client_addr(&dst, req, 1000,
263 wps_er_http_unsubscribe_cb, ap);
264 if (ap->http == NULL) {
265 wpabuf_free(req);
266 goto fail;
267 }
268 return;
269
270 fail:
271 /*
272 * Need to get rid of the AP entry even when we fail to unsubscribe
273 * cleanly.
274 */
275 wps_er_ap_unsubscribed(ap->er, ap);
276 }
277
278 static void wps_er_ap_remove_entry(struct wps_er *er, struct wps_er_ap *ap)
279 {
280 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
281 inet_ntoa(ap->addr), ap->location);
282 eloop_cancel_timeout(wps_er_ap_timeout, er, ap);
283 wps_er_sta_remove_all(ap);
284 wps_er_ap_event(er->wps, ap, WPS_EV_ER_AP_REMOVE);
285 http_client_free(ap->http);
286 ap->http = NULL;
287 if (ap->wps) {
288 wps_deinit(ap->wps);
289 ap->wps = NULL;
290 }
291
292 dl_list_del(&ap->list);
293 if (ap->subscribed) {
294 dl_list_add(&er->ap_unsubscribing, &ap->list);
295 wps_er_ap_unsubscribe(er, ap);
296 } else
297 wps_er_ap_free(ap);
298 }
299
300
301 static void wps_er_ap_timeout(void *eloop_data, void *user_ctx)
302 {
303 struct wps_er *er = eloop_data;
304 struct wps_er_ap *ap = user_ctx;
305 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
306 wps_er_ap_remove_entry(er, ap);
307 }
308
309
310 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid)
311 {
312 char *pos;
313 char txt[100];
314
315 if (!sid) {
316 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)",
317 inet_ntoa(ap->addr), ap->location);
318 return -1;
319 }
320
321 pos = os_strstr(sid, "uuid:");
322 if (!pos) {
323 wpa_printf(MSG_DEBUG, "WPS ER: Invalid SID received from "
324 "%s (%s): '%s'", inet_ntoa(ap->addr), ap->location,
325 sid);
326 return -1;
327 }
328
329 pos += 5;
330 if (uuid_str2bin(pos, ap->sid) < 0) {
331 wpa_printf(MSG_DEBUG, "WPS ER: Invalid SID received from "
332 "%s (%s): '%s'", inet_ntoa(ap->addr), ap->location,
333 sid);
334 return -1;
335 }
336
337 uuid_bin2str(ap->sid, txt, sizeof(txt));
338 wpa_printf(MSG_DEBUG, "WPS ER: SID for subscription with %s (%s): %s",
339 inet_ntoa(ap->addr), ap->location, txt);
340
341 return 0;
342 }
343
344
345 static void wps_er_http_subscribe_cb(void *ctx, struct http_client *c,
346 enum http_client_event event)
347 {
348 struct wps_er_ap *ap = ctx;
349
350 switch (event) {
351 case HTTP_CLIENT_OK:
352 wpa_printf(MSG_DEBUG, "WPS ER: Subscribed to events");
353 ap->subscribed = 1;
354 wps_er_get_sid(ap, http_client_get_hdr_line(c, "SID"));
355 wps_er_ap_event(ap->er->wps, ap, WPS_EV_ER_AP_ADD);
356 break;
357 case HTTP_CLIENT_FAILED:
358 case HTTP_CLIENT_INVALID_REPLY:
359 case HTTP_CLIENT_TIMEOUT:
360 wpa_printf(MSG_DEBUG, "WPS ER: Failed to subscribe to events");
361 break;
362 }
363 http_client_free(ap->http);
364 ap->http = NULL;
365 }
366
367
368 static void wps_er_subscribe(struct wps_er_ap *ap)
369 {
370 struct wpabuf *req;
371 struct sockaddr_in dst;
372 char *url, *path;
373
374 if (ap->event_sub_url == NULL) {
375 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
376 "subscribe");
377 return;
378 }
379 if (ap->http) {
380 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
381 "send subscribe request");
382 return;
383 }
384
385 url = http_client_url_parse(ap->event_sub_url, &dst, &path);
386 if (url == NULL) {
387 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
388 return;
389 }
390
391 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000);
392 if (req == NULL) {
393 os_free(url);
394 return;
395 }
396 wpabuf_printf(req,
397 "SUBSCRIBE %s HTTP/1.1\r\n"
398 "HOST: %s:%d\r\n"
399 "CALLBACK: <http://%s:%d/event/%u/%u>\r\n"
400 "NT: upnp:event\r\n"
401 "TIMEOUT: Second-%d\r\n"
402 "\r\n",
403 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port),
404 ap->er->ip_addr_text, ap->er->http_port,
405 ap->er->event_id, ap->id, 1800);
406 os_free(url);
407 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Subscription request",
408 wpabuf_head(req), wpabuf_len(req));
409
410 ap->http = http_client_addr(&dst, req, 1000, wps_er_http_subscribe_cb,
411 ap);
412 if (ap->http == NULL)
413 wpabuf_free(req);
414 }
415
416
417 static void wps_er_ap_get_m1(struct wps_er_ap *ap, struct wpabuf *m1)
418 {
419 struct wps_parse_attr attr;
420
421 if (wps_parse_msg(m1, &attr) < 0) {
422 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse M1");
423 return;
424 }
425 if (attr.primary_dev_type)
426 os_memcpy(ap->pri_dev_type, attr.primary_dev_type, 8);
427 if (attr.wps_state)
428 ap->wps_state = *attr.wps_state;
429 if (attr.mac_addr)
430 os_memcpy(ap->mac_addr, attr.mac_addr, ETH_ALEN);
431
432 wps_er_subscribe(ap);
433 }
434
435
436 static void wps_er_get_device_info(struct wps_er_ap *ap)
437 {
438 wps_er_send_get_device_info(ap, wps_er_ap_get_m1);
439 }
440
441
442 static void wps_er_parse_device_description(struct wps_er_ap *ap,
443 struct wpabuf *reply)
444 {
445 /* Note: reply includes null termination after the buffer data */
446 const char *data = wpabuf_head(reply);
447 char *pos;
448
449 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Device info",
450 wpabuf_head(reply), wpabuf_len(reply));
451
452 ap->friendly_name = xml_get_first_item(data, "friendlyName");
453 wpa_printf(MSG_DEBUG, "WPS ER: friendlyName='%s'", ap->friendly_name);
454
455 ap->manufacturer = xml_get_first_item(data, "manufacturer");
456 wpa_printf(MSG_DEBUG, "WPS ER: manufacturer='%s'", ap->manufacturer);
457
458 ap->manufacturer_url = xml_get_first_item(data, "manufacturerURL");
459 wpa_printf(MSG_DEBUG, "WPS ER: manufacturerURL='%s'",
460 ap->manufacturer_url);
461
462 ap->model_description = xml_get_first_item(data, "modelDescription");
463 wpa_printf(MSG_DEBUG, "WPS ER: modelDescription='%s'",
464 ap->model_description);
465
466 ap->model_name = xml_get_first_item(data, "modelName");
467 wpa_printf(MSG_DEBUG, "WPS ER: modelName='%s'", ap->model_name);
468
469 ap->model_number = xml_get_first_item(data, "modelNumber");
470 wpa_printf(MSG_DEBUG, "WPS ER: modelNumber='%s'", ap->model_number);
471
472 ap->model_url = xml_get_first_item(data, "modelURL");
473 wpa_printf(MSG_DEBUG, "WPS ER: modelURL='%s'", ap->model_url);
474
475 ap->serial_number = xml_get_first_item(data, "serialNumber");
476 wpa_printf(MSG_DEBUG, "WPS ER: serialNumber='%s'", ap->serial_number);
477
478 ap->udn = xml_get_first_item(data, "UDN");
479 wpa_printf(MSG_DEBUG, "WPS ER: UDN='%s'", ap->udn);
480 pos = os_strstr(ap->udn, "uuid:");
481 if (pos) {
482 pos += 5;
483 if (uuid_str2bin(pos, ap->uuid) < 0)
484 wpa_printf(MSG_DEBUG, "WPS ER: Invalid UUID in UDN");
485 }
486
487 ap->upc = xml_get_first_item(data, "UPC");
488 wpa_printf(MSG_DEBUG, "WPS ER: UPC='%s'", ap->upc);
489
490 ap->scpd_url = http_link_update(
491 xml_get_first_item(data, "SCPDURL"), ap->location);
492 wpa_printf(MSG_DEBUG, "WPS ER: SCPDURL='%s'", ap->scpd_url);
493
494 ap->control_url = http_link_update(
495 xml_get_first_item(data, "controlURL"), ap->location);
496 wpa_printf(MSG_DEBUG, "WPS ER: controlURL='%s'", ap->control_url);
497
498 ap->event_sub_url = http_link_update(
499 xml_get_first_item(data, "eventSubURL"), ap->location);
500 wpa_printf(MSG_DEBUG, "WPS ER: eventSubURL='%s'", ap->event_sub_url);
501 }
502
503
504 static void wps_er_http_dev_desc_cb(void *ctx, struct http_client *c,
505 enum http_client_event event)
506 {
507 struct wps_er_ap *ap = ctx;
508 struct wpabuf *reply;
509 int ok = 0;
510
511 switch (event) {
512 case HTTP_CLIENT_OK:
513 reply = http_client_get_body(c);
514 if (reply == NULL)
515 break;
516 wps_er_parse_device_description(ap, reply);
517 ok = 1;
518 break;
519 case HTTP_CLIENT_FAILED:
520 case HTTP_CLIENT_INVALID_REPLY:
521 case HTTP_CLIENT_TIMEOUT:
522 wpa_printf(MSG_DEBUG, "WPS ER: Failed to fetch device info");
523 break;
524 }
525 http_client_free(ap->http);
526 ap->http = NULL;
527 if (ok)
528 wps_er_get_device_info(ap);
529 }
530
531
532 void wps_er_ap_add(struct wps_er *er, const u8 *uuid, struct in_addr *addr,
533 const char *location, int max_age)
534 {
535 struct wps_er_ap *ap;
536
537 ap = wps_er_ap_get(er, addr, uuid);
538 if (ap) {
539 /* Update advertisement timeout */
540 eloop_cancel_timeout(wps_er_ap_timeout, er, ap);
541 eloop_register_timeout(max_age, 0, wps_er_ap_timeout, er, ap);
542 return;
543 }
544
545 ap = os_zalloc(sizeof(*ap));
546 if (ap == NULL)
547 return;
548 dl_list_init(&ap->sta);
549 ap->er = er;
550 ap->id = ++er->next_ap_id;
551 ap->location = os_strdup(location);
552 if (ap->location == NULL) {
553 os_free(ap);
554 return;
555 }
556 dl_list_add(&er->ap, &ap->list);
557
558 ap->addr.s_addr = addr->s_addr;
559 os_memcpy(ap->uuid, uuid, WPS_UUID_LEN);
560 eloop_register_timeout(max_age, 0, wps_er_ap_timeout, er, ap);
561
562 wpa_printf(MSG_DEBUG, "WPS ER: Added AP entry for %s (%s)",
563 inet_ntoa(ap->addr), ap->location);
564
565 /* Fetch device description */
566 ap->http = http_client_url(ap->location, NULL, 10000,
567 wps_er_http_dev_desc_cb, ap);
568 }
569
570
571 void wps_er_ap_remove(struct wps_er *er, struct in_addr *addr)
572 {
573 struct wps_er_ap *ap;
574 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
575 if (ap->addr.s_addr == addr->s_addr) {
576 wps_er_ap_remove_entry(er, ap);
577 return;
578 }
579 }
580 }
581
582
583 static void wps_er_ap_remove_all(struct wps_er *er)
584 {
585 struct wps_er_ap *prev, *ap;
586 dl_list_for_each_safe(ap, prev, &er->ap, struct wps_er_ap, list)
587 wps_er_ap_remove_entry(er, ap);
588 }
589
590
591 static void http_put_date(struct wpabuf *buf)
592 {
593 wpabuf_put_str(buf, "Date: ");
594 format_date(buf);
595 wpabuf_put_str(buf, "\r\n");
596 }
597
598
599 static void wps_er_http_resp_not_found(struct http_request *req)
600 {
601 struct wpabuf *buf;
602 buf = wpabuf_alloc(200);
603 if (buf == NULL) {
604 http_request_deinit(req);
605 return;
606 }
607
608 wpabuf_put_str(buf,
609 "HTTP/1.1 404 Not Found\r\n"
610 "Server: unspecified, UPnP/1.0, unspecified\r\n"
611 "Connection: close\r\n");
612 http_put_date(buf);
613 wpabuf_put_str(buf, "\r\n");
614 http_request_send_and_deinit(req, buf);
615 }
616
617
618 static void wps_er_http_resp_ok(struct http_request *req)
619 {
620 struct wpabuf *buf;
621 buf = wpabuf_alloc(200);
622 if (buf == NULL) {
623 http_request_deinit(req);
624 return;
625 }
626
627 wpabuf_put_str(buf,
628 "HTTP/1.1 200 OK\r\n"
629 "Server: unspecified, UPnP/1.0, unspecified\r\n"
630 "Connection: close\r\n"
631 "Content-Length: 0\r\n");
632 http_put_date(buf);
633 wpabuf_put_str(buf, "\r\n");
634 http_request_send_and_deinit(req, buf);
635 }
636
637
638 static void wps_er_sta_timeout(void *eloop_data, void *user_ctx)
639 {
640 struct wps_er_sta *sta = eloop_data;
641 wpa_printf(MSG_DEBUG, "WPS ER: STA entry timed out");
642 dl_list_del(&sta->list);
643 wps_er_sta_free(sta);
644 }
645
646
647 static struct wps_er_sta * wps_er_add_sta_data(struct wps_er_ap *ap,
648 const u8 *addr,
649 struct wps_parse_attr *attr,
650 int probe_req)
651 {
652 struct wps_er_sta *sta = wps_er_sta_get(ap, addr);
653 int new_sta = 0;
654 int m1;
655
656 m1 = !probe_req && attr->msg_type && *attr->msg_type == WPS_M1;
657
658 if (sta == NULL) {
659 /*
660 * Only allow new STA entry to be added based on Probe Request
661 * or M1. This will filter out bogus events and anything that
662 * may have been ongoing at the time ER subscribed for events.
663 */
664 if (!probe_req && !m1)
665 return NULL;
666
667 sta = os_zalloc(sizeof(*sta));
668 if (sta == NULL)
669 return NULL;
670 os_memcpy(sta->addr, addr, ETH_ALEN);
671 sta->ap = ap;
672 dl_list_add(&ap->sta, &sta->list);
673 new_sta = 1;
674 }
675
676 if (m1)
677 sta->m1_received = 1;
678
679 if (attr->config_methods && (!probe_req || !sta->m1_received))
680 sta->config_methods = WPA_GET_BE16(attr->config_methods);
681 if (attr->uuid_e && (!probe_req || !sta->m1_received))
682 os_memcpy(sta->uuid, attr->uuid_e, WPS_UUID_LEN);
683 if (attr->primary_dev_type && (!probe_req || !sta->m1_received))
684 os_memcpy(sta->pri_dev_type, attr->primary_dev_type, 8);
685 if (attr->dev_password_id && (!probe_req || !sta->m1_received))
686 sta->dev_passwd_id = WPA_GET_BE16(attr->dev_password_id);
687
688 if (attr->manufacturer) {
689 os_free(sta->manufacturer);
690 sta->manufacturer = os_malloc(attr->manufacturer_len + 1);
691 if (sta->manufacturer) {
692 os_memcpy(sta->manufacturer, attr->manufacturer,
693 attr->manufacturer_len);
694 sta->manufacturer[attr->manufacturer_len] = '\0';
695 }
696 }
697
698 if (attr->model_name) {
699 os_free(sta->model_name);
700 sta->model_name = os_malloc(attr->model_name_len + 1);
701 if (sta->model_name) {
702 os_memcpy(sta->model_name, attr->model_name,
703 attr->model_name_len);
704 sta->model_name[attr->model_name_len] = '\0';
705 }
706 }
707
708 if (attr->model_number) {
709 os_free(sta->model_number);
710 sta->model_number = os_malloc(attr->model_number_len + 1);
711 if (sta->model_number) {
712 os_memcpy(sta->model_number, attr->model_number,
713 attr->model_number_len);
714 sta->model_number[attr->model_number_len] = '\0';
715 }
716 }
717
718 if (attr->serial_number) {
719 os_free(sta->serial_number);
720 sta->serial_number = os_malloc(attr->serial_number_len + 1);
721 if (sta->serial_number) {
722 os_memcpy(sta->serial_number, attr->serial_number,
723 attr->serial_number_len);
724 sta->serial_number[attr->serial_number_len] = '\0';
725 }
726 }
727
728 if (attr->dev_name) {
729 os_free(sta->dev_name);
730 sta->dev_name = os_malloc(attr->dev_name_len + 1);
731 if (sta->dev_name) {
732 os_memcpy(sta->dev_name, attr->dev_name,
733 attr->dev_name_len);
734 sta->dev_name[attr->dev_name_len] = '\0';
735 }
736 }
737
738 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
739 eloop_register_timeout(300, 0, wps_er_sta_timeout, sta, NULL);
740
741 if (m1 || new_sta)
742 wps_er_sta_event(ap->er->wps, sta, WPS_EV_ER_ENROLLEE_ADD);
743
744 return sta;
745 }
746
747
748 static void wps_er_process_wlanevent_probe_req(struct wps_er_ap *ap,
749 const u8 *addr,
750 struct wpabuf *msg)
751 {
752 struct wps_parse_attr attr;
753
754 wpa_printf(MSG_DEBUG, "WPS ER: WLANEvent - Probe Request - from "
755 MACSTR, MAC2STR(addr));
756 wpa_hexdump_buf(MSG_MSGDUMP, "WPS ER: WLANEvent - Enrollee's message "
757 "(TLVs from Probe Request)", msg);
758
759 if (wps_parse_msg(msg, &attr) < 0) {
760 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse TLVs in "
761 "WLANEvent message");
762 return;
763 }
764
765 wps_er_add_sta_data(ap, addr, &attr, 1);
766 }
767
768
769 static void wps_er_http_put_wlan_response_cb(void *ctx, struct http_client *c,
770 enum http_client_event event)
771 {
772 struct wps_er_sta *sta = ctx;
773
774 switch (event) {
775 case HTTP_CLIENT_OK:
776 wpa_printf(MSG_DEBUG, "WPS ER: PutWLANResponse OK");
777 break;
778 case HTTP_CLIENT_FAILED:
779 case HTTP_CLIENT_INVALID_REPLY:
780 case HTTP_CLIENT_TIMEOUT:
781 wpa_printf(MSG_DEBUG, "WPS ER: PutWLANResponse failed");
782 break;
783 }
784 http_client_free(sta->http);
785 sta->http = NULL;
786 }
787
788
789 static const char *soap_prefix =
790 "<?xml version=\"1.0\"?>\n"
791 "<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" "
792 "s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">\n"
793 "<s:Body>\n";
794 static const char *soap_postfix =
795 "</s:Body>\n</s:Envelope>\n";
796 static const char *urn_wfawlanconfig =
797 "urn:schemas-wifialliance-org:service:WFAWLANConfig:1";
798
799 static struct wpabuf * wps_er_soap_hdr(const struct wpabuf *msg,
800 const char *name, const char *arg_name,
801 const char *path,
802 const struct sockaddr_in *dst,
803 char **len_ptr, char **body_ptr)
804 {
805 unsigned char *encoded;
806 size_t encoded_len;
807 struct wpabuf *buf;
808
809 if (msg) {
810 encoded = base64_encode(wpabuf_head(msg), wpabuf_len(msg),
811 &encoded_len);
812 if (encoded == NULL)
813 return NULL;
814 } else {
815 encoded = NULL;
816 encoded_len = 0;
817 }
818
819 buf = wpabuf_alloc(1000 + encoded_len);
820 if (buf == NULL) {
821 os_free(encoded);
822 return NULL;
823 }
824
825 wpabuf_printf(buf,
826 "POST %s HTTP/1.1\r\n"
827 "Host: %s:%d\r\n"
828 "Content-Type: text/xml; charset=\"utf-8\"\r\n"
829 "Content-Length: ",
830 path, inet_ntoa(dst->sin_addr), ntohs(dst->sin_port));
831
832 *len_ptr = wpabuf_put(buf, 0);
833 wpabuf_printf(buf,
834 " \r\n"
835 "SOAPACTION: \"%s#%s\"\r\n"
836 "\r\n",
837 urn_wfawlanconfig, name);
838
839 *body_ptr = wpabuf_put(buf, 0);
840
841 wpabuf_put_str(buf, soap_prefix);
842 wpabuf_printf(buf, "<u:%s xmlns:u=\"", name);
843 wpabuf_put_str(buf, urn_wfawlanconfig);
844 wpabuf_put_str(buf, "\">\n");
845 if (encoded) {
846 wpabuf_printf(buf, "<%s>%s</%s>\n",
847 arg_name, (char *) encoded, arg_name);
848 os_free(encoded);
849 }
850
851 return buf;
852 }
853
854
855 static void wps_er_soap_end(struct wpabuf *buf, const char *name,
856 char *len_ptr, char *body_ptr)
857 {
858 char len_buf[10];
859 wpabuf_printf(buf, "</u:%s>\n", name);
860 wpabuf_put_str(buf, soap_postfix);
861 os_snprintf(len_buf, sizeof(len_buf), "%d",
862 (int) ((char *) wpabuf_put(buf, 0) - body_ptr));
863 os_memcpy(len_ptr, len_buf, os_strlen(len_buf));
864 }
865
866
867 static void wps_er_sta_send_msg(struct wps_er_sta *sta, struct wpabuf *msg)
868 {
869 struct wpabuf *buf;
870 char *len_ptr, *body_ptr;
871 struct sockaddr_in dst;
872 char *url, *path;
873
874 if (sta->http) {
875 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request for STA - "
876 "ignore new request");
877 wpabuf_free(msg);
878 return;
879 }
880
881 if (sta->ap->control_url == NULL) {
882 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
883 wpabuf_free(msg);
884 return;
885 }
886
887 url = http_client_url_parse(sta->ap->control_url, &dst, &path);
888 if (url == NULL) {
889 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
890 wpabuf_free(msg);
891 return;
892 }
893
894 buf = wps_er_soap_hdr(msg, "PutWLANResponse", "NewMessage", path, &dst,
895 &len_ptr, &body_ptr);
896 wpabuf_free(msg);
897 os_free(url);
898 if (buf == NULL)
899 return;
900 wpabuf_printf(buf, "<NewWLANEventType>%d</NewWLANEventType>\n",
901 UPNP_WPS_WLANEVENT_TYPE_EAP);
902 wpabuf_printf(buf, "<NewWLANEventMAC>" MACSTR "</NewWLANEventMAC>\n",
903 MAC2STR(sta->addr));
904
905 wps_er_soap_end(buf, "PutWLANResponse", len_ptr, body_ptr);
906
907 sta->http = http_client_addr(&dst, buf, 1000,
908 wps_er_http_put_wlan_response_cb, sta);
909 if (sta->http == NULL)
910 wpabuf_free(buf);
911 }
912
913
914 static void wps_er_sta_process(struct wps_er_sta *sta, struct wpabuf *msg,
915 enum wsc_op_code op_code)
916 {
917 enum wps_process_res res;
918
919 res = wps_process_msg(sta->wps, op_code, msg);
920 if (res == WPS_CONTINUE) {
921 struct wpabuf *next = wps_get_msg(sta->wps, &op_code);
922 if (next)
923 wps_er_sta_send_msg(sta, next);
924 } else {
925 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run %s with the "
926 "enrollee (res=%d)",
927 res == WPS_DONE ? "succeeded" : "failed", res);
928 wps_deinit(sta->wps);
929 sta->wps = NULL;
930 if (res == WPS_DONE) {
931 /* Remove the STA entry after short timeout */
932 eloop_cancel_timeout(wps_er_sta_timeout, sta, NULL);
933 eloop_register_timeout(10, 0, wps_er_sta_timeout, sta,
934 NULL);
935 }
936 }
937 }
938
939
940 static void wps_er_sta_start(struct wps_er_sta *sta, struct wpabuf *msg)
941 {
942 struct wps_config cfg;
943
944 if (sta->wps)
945 wps_deinit(sta->wps);
946
947 os_memset(&cfg, 0, sizeof(cfg));
948 cfg.wps = sta->ap->er->wps;
949 cfg.registrar = 1;
950 cfg.peer_addr = sta->addr;
951
952 sta->wps = wps_init(&cfg);
953 if (sta->wps == NULL)
954 return;
955 sta->wps->er = 1;
956 sta->wps->use_cred = sta->ap->ap_settings;
957 if (sta->ap->ap_settings) {
958 os_free(sta->cred);
959 sta->cred = os_malloc(sizeof(*sta->cred));
960 if (sta->cred) {
961 os_memcpy(sta->cred, sta->ap->ap_settings,
962 sizeof(*sta->cred));
963 sta->cred->cred_attr = NULL;
964 os_memcpy(sta->cred->mac_addr, sta->addr, ETH_ALEN);
965 sta->wps->use_cred = sta->cred;
966 }
967 }
968
969 wps_er_sta_process(sta, msg, WSC_MSG);
970 }
971
972
973 static void wps_er_process_wlanevent_eap(struct wps_er_ap *ap, const u8 *addr,
974 struct wpabuf *msg)
975 {
976 struct wps_parse_attr attr;
977 struct wps_er_sta *sta;
978
979 wpa_printf(MSG_DEBUG, "WPS ER: WLANEvent - EAP - from " MACSTR,
980 MAC2STR(addr));
981 wpa_hexdump_buf(MSG_MSGDUMP, "WPS ER: WLANEvent - Enrollee's message "
982 "(TLVs from EAP-WSC)", msg);
983
984 if (wps_parse_msg(msg, &attr) < 0) {
985 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse TLVs in "
986 "WLANEvent message");
987 return;
988 }
989
990 sta = wps_er_add_sta_data(ap, addr, &attr, 0);
991 if (sta == NULL)
992 return;
993
994 if (attr.msg_type && *attr.msg_type == WPS_M1)
995 wps_er_sta_start(sta, msg);
996 else if (sta->wps) {
997 enum wsc_op_code op_code = WSC_MSG;
998 if (attr.msg_type) {
999 switch (*attr.msg_type) {
1000 case WPS_WSC_ACK:
1001 op_code = WSC_ACK;
1002 break;
1003 case WPS_WSC_NACK:
1004 op_code = WSC_NACK;
1005 break;
1006 case WPS_WSC_DONE:
1007 op_code = WSC_Done;
1008 break;
1009 }
1010 }
1011 wps_er_sta_process(sta, msg, op_code);
1012 }
1013 }
1014
1015
1016 static void wps_er_process_wlanevent(struct wps_er_ap *ap,
1017 struct wpabuf *event)
1018 {
1019 u8 *data;
1020 u8 wlan_event_type;
1021 u8 wlan_event_mac[ETH_ALEN];
1022 struct wpabuf msg;
1023
1024 wpa_hexdump(MSG_MSGDUMP, "WPS ER: Received WLANEvent",
1025 wpabuf_head(event), wpabuf_len(event));
1026 if (wpabuf_len(event) < 1 + 17) {
1027 wpa_printf(MSG_DEBUG, "WPS ER: Too short WLANEvent");
1028 return;
1029 }
1030
1031 data = wpabuf_mhead(event);
1032 wlan_event_type = data[0];
1033 if (hwaddr_aton((char *) data + 1, wlan_event_mac) < 0) {
1034 wpa_printf(MSG_DEBUG, "WPS ER: Invalid WLANEventMAC in "
1035 "WLANEvent");
1036 return;
1037 }
1038
1039 wpabuf_set(&msg, data + 1 + 17, wpabuf_len(event) - (1 + 17));
1040
1041 switch (wlan_event_type) {
1042 case 1:
1043 wps_er_process_wlanevent_probe_req(ap, wlan_event_mac, &msg);
1044 break;
1045 case 2:
1046 wps_er_process_wlanevent_eap(ap, wlan_event_mac, &msg);
1047 break;
1048 default:
1049 wpa_printf(MSG_DEBUG, "WPS ER: Unknown WLANEventType %d",
1050 wlan_event_type);
1051 break;
1052 }
1053 }
1054
1055
1056 static void wps_er_http_event(struct wps_er *er, struct http_request *req,
1057 unsigned int ap_id)
1058 {
1059 struct wps_er_ap *ap = wps_er_ap_get_id(er, ap_id);
1060 struct wpabuf *event;
1061 enum http_reply_code ret;
1062
1063 if (ap == NULL) {
1064 wpa_printf(MSG_DEBUG, "WPS ER: HTTP event from unknown AP id "
1065 "%u", ap_id);
1066 wps_er_http_resp_not_found(req);
1067 return;
1068 }
1069 wpa_printf(MSG_MSGDUMP, "WPS ER: HTTP event from AP id %u: %s",
1070 ap_id, http_request_get_data(req));
1071
1072 event = xml_get_base64_item(http_request_get_data(req), "WLANEvent",
1073 &ret);
1074 if (event == NULL) {
1075 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract WLANEvent "
1076 "from the event notification");
1077 /*
1078 * Reply with OK anyway to avoid getting unregistered from
1079 * events.
1080 */
1081 wps_er_http_resp_ok(req);
1082 return;
1083 }
1084
1085 wps_er_process_wlanevent(ap, event);
1086
1087 wpabuf_free(event);
1088 wps_er_http_resp_ok(req);
1089 }
1090
1091
1092 static void wps_er_http_notify(struct wps_er *er, struct http_request *req)
1093 {
1094 char *uri = http_request_get_uri(req);
1095
1096 if (os_strncmp(uri, "/event/", 7) == 0) {
1097 unsigned int event_id;
1098 char *pos;
1099 event_id = atoi(uri + 7);
1100 if (event_id != er->event_id) {
1101 wpa_printf(MSG_DEBUG, "WPS ER: HTTP event for an "
1102 "unknown event id %u", event_id);
1103 return;
1104 }
1105 pos = os_strchr(uri + 7, '/');
1106 if (pos == NULL)
1107 return;
1108 pos++;
1109 wps_er_http_event(er, req, atoi(pos));
1110 } else {
1111 wpa_printf(MSG_DEBUG, "WPS ER: Unknown HTTP NOTIFY for '%s'",
1112 uri);
1113 wps_er_http_resp_not_found(req);
1114 }
1115 }
1116
1117
1118 static void wps_er_http_req(void *ctx, struct http_request *req)
1119 {
1120 struct wps_er *er = ctx;
1121 struct sockaddr_in *cli = http_request_get_cli_addr(req);
1122 enum httpread_hdr_type type = http_request_get_type(req);
1123 struct wpabuf *buf;
1124
1125 wpa_printf(MSG_DEBUG, "WPS ER: HTTP request: '%s' (type %d) from "
1126 "%s:%d",
1127 http_request_get_uri(req), type,
1128 inet_ntoa(cli->sin_addr), ntohs(cli->sin_port));
1129
1130 switch (type) {
1131 case HTTPREAD_HDR_TYPE_NOTIFY:
1132 wps_er_http_notify(er, req);
1133 break;
1134 default:
1135 wpa_printf(MSG_DEBUG, "WPS ER: Unsupported HTTP request type "
1136 "%d", type);
1137 buf = wpabuf_alloc(200);
1138 if (buf == NULL) {
1139 http_request_deinit(req);
1140 return;
1141 }
1142 wpabuf_put_str(buf,
1143 "HTTP/1.1 501 Unimplemented\r\n"
1144 "Connection: close\r\n");
1145 http_put_date(buf);
1146 wpabuf_put_str(buf, "\r\n");
1147 http_request_send_and_deinit(req, buf);
1148 break;
1149 }
1150 }
1151
1152
1153 struct wps_er *
1154 wps_er_init(struct wps_context *wps, const char *ifname, const char *filter)
1155 {
1156 struct wps_er *er;
1157 struct in_addr addr;
1158
1159 er = os_zalloc(sizeof(*er));
1160 if (er == NULL)
1161 return NULL;
1162 dl_list_init(&er->ap);
1163 dl_list_init(&er->ap_unsubscribing);
1164
1165 er->multicast_sd = -1;
1166 er->ssdp_sd = -1;
1167
1168 os_strlcpy(er->ifname, ifname, sizeof(er->ifname));
1169 er->wps = wps;
1170 if (os_get_random((unsigned char *) &er->event_id,
1171 sizeof(er->event_id)) < 0) {
1172 wps_er_deinit(er, NULL, NULL);
1173 return NULL;
1174 }
1175 /* Limit event_id to < 32 bits to avoid issues with atoi() */
1176 er->event_id &= 0x0fffffff;
1177
1178 if (filter) {
1179 if (inet_aton(filter, &er->filter_addr) == 0) {
1180 wpa_printf(MSG_INFO, "WPS UPnP: Invalid filter "
1181 "address %s", filter);
1182 wps_er_deinit(er, NULL, NULL);
1183 return NULL;
1184 }
1185 wpa_printf(MSG_DEBUG, "WPS UPnP: Only accepting connections "
1186 "with %s", filter);
1187 }
1188 if (get_netif_info(ifname, &er->ip_addr, &er->ip_addr_text,
1189 er->mac_addr)) {
1190 wpa_printf(MSG_INFO, "WPS UPnP: Could not get IP/MAC address "
1191 "for %s. Does it have IP address?", ifname);
1192 wps_er_deinit(er, NULL, NULL);
1193 return NULL;
1194 }
1195
1196 if (wps_er_ssdp_init(er) < 0) {
1197 wps_er_deinit(er, NULL, NULL);
1198 return NULL;
1199 }
1200
1201 addr.s_addr = er->ip_addr;
1202 er->http_srv = http_server_init(&addr, -1, wps_er_http_req, er);
1203 if (er->http_srv == NULL) {
1204 wps_er_deinit(er, NULL, NULL);
1205 return NULL;
1206 }
1207 er->http_port = http_server_get_port(er->http_srv);
1208
1209 wpa_printf(MSG_DEBUG, "WPS ER: Start (ifname=%s ip_addr=%s)",
1210 er->ifname, er->ip_addr_text);
1211
1212 return er;
1213 }
1214
1215
1216 void wps_er_refresh(struct wps_er *er)
1217 {
1218 struct wps_er_ap *ap;
1219 struct wps_er_sta *sta;
1220
1221 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list) {
1222 wps_er_ap_event(er->wps, ap, WPS_EV_ER_AP_ADD);
1223 dl_list_for_each(sta, &ap->sta, struct wps_er_sta, list)
1224 wps_er_sta_event(er->wps, sta, WPS_EV_ER_ENROLLEE_ADD);
1225 }
1226
1227 wps_er_send_ssdp_msearch(er);
1228 }
1229
1230
1231 static void wps_er_deinit_finish(void *eloop_data, void *user_ctx)
1232 {
1233 struct wps_er *er = eloop_data;
1234 void (*deinit_done_cb)(void *ctx);
1235 void *deinit_done_ctx;
1236
1237 wpa_printf(MSG_DEBUG, "WPS ER: Finishing deinit");
1238
1239 deinit_done_cb = er->deinit_done_cb;
1240 deinit_done_ctx = er->deinit_done_ctx;
1241 os_free(er->ip_addr_text);
1242 os_free(er);
1243
1244 if (deinit_done_cb)
1245 deinit_done_cb(deinit_done_ctx);
1246 }
1247
1248
1249 void wps_er_deinit(struct wps_er *er, void (*cb)(void *ctx), void *ctx)
1250 {
1251 if (er == NULL)
1252 return;
1253 http_server_deinit(er->http_srv);
1254 wps_er_ap_remove_all(er);
1255 wps_er_ssdp_deinit(er);
1256 eloop_register_timeout(dl_list_empty(&er->ap_unsubscribing) ? 0 : 5, 0,
1257 wps_er_deinit_finish, er, NULL);
1258 wpa_printf(MSG_DEBUG, "WPS ER: Finish deinit from timeout");
1259 er->deinitializing = 1;
1260 er->deinit_done_cb = cb;
1261 er->deinit_done_ctx = ctx;
1262 }
1263
1264
1265 static void wps_er_http_set_sel_reg_cb(void *ctx, struct http_client *c,
1266 enum http_client_event event)
1267 {
1268 struct wps_er_ap *ap = ctx;
1269
1270 switch (event) {
1271 case HTTP_CLIENT_OK:
1272 wpa_printf(MSG_DEBUG, "WPS ER: SetSelectedRegistrar OK");
1273 break;
1274 case HTTP_CLIENT_FAILED:
1275 case HTTP_CLIENT_INVALID_REPLY:
1276 case HTTP_CLIENT_TIMEOUT:
1277 wpa_printf(MSG_DEBUG, "WPS ER: SetSelectedRegistrar failed");
1278 break;
1279 }
1280 http_client_free(ap->http);
1281 ap->http = NULL;
1282 }
1283
1284
1285 static void wps_er_send_set_sel_reg(struct wps_er_ap *ap, struct wpabuf *msg)
1286 {
1287 struct wpabuf *buf;
1288 char *len_ptr, *body_ptr;
1289 struct sockaddr_in dst;
1290 char *url, *path;
1291
1292 if (ap->control_url == NULL) {
1293 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1294 return;
1295 }
1296
1297 if (ap->http) {
1298 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request for AP - "
1299 "ignore new request");
1300 return;
1301 }
1302
1303 url = http_client_url_parse(ap->control_url, &dst, &path);
1304 if (url == NULL) {
1305 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1306 return;
1307 }
1308
1309 buf = wps_er_soap_hdr(msg, "SetSelectedRegistrar", "NewMessage", path,
1310 &dst, &len_ptr, &body_ptr);
1311 os_free(url);
1312 if (buf == NULL)
1313 return;
1314
1315 wps_er_soap_end(buf, "SetSelectedRegistrar", len_ptr, body_ptr);
1316
1317 ap->http = http_client_addr(&dst, buf, 1000,
1318 wps_er_http_set_sel_reg_cb, ap);
1319 if (ap->http == NULL)
1320 wpabuf_free(buf);
1321 }
1322
1323
1324 static int wps_er_build_selected_registrar(struct wpabuf *msg, int sel_reg)
1325 {
1326 wpabuf_put_be16(msg, ATTR_SELECTED_REGISTRAR);
1327 wpabuf_put_be16(msg, 1);
1328 wpabuf_put_u8(msg, !!sel_reg);
1329 return 0;
1330 }
1331
1332
1333 static int wps_er_build_dev_password_id(struct wpabuf *msg, u16 dev_passwd_id)
1334 {
1335 wpabuf_put_be16(msg, ATTR_DEV_PASSWORD_ID);
1336 wpabuf_put_be16(msg, 2);
1337 wpabuf_put_be16(msg, dev_passwd_id);
1338 return 0;
1339 }
1340
1341
1342 static int wps_er_build_sel_reg_config_methods(struct wpabuf *msg,
1343 u16 sel_reg_config_methods)
1344 {
1345 wpabuf_put_be16(msg, ATTR_SELECTED_REGISTRAR_CONFIG_METHODS);
1346 wpabuf_put_be16(msg, 2);
1347 wpabuf_put_be16(msg, sel_reg_config_methods);
1348 return 0;
1349 }
1350
1351
1352 static int wps_er_build_uuid_r(struct wpabuf *msg, const u8 *uuid_r)
1353 {
1354 #ifdef CONFIG_WPS2
1355 wpabuf_put_be16(msg, ATTR_UUID_R);
1356 wpabuf_put_be16(msg, WPS_UUID_LEN);
1357 wpabuf_put_data(msg, uuid_r, WPS_UUID_LEN);
1358 #endif /* CONFIG_WPS2 */
1359 return 0;
1360 }
1361
1362
1363 void wps_er_set_sel_reg(struct wps_er *er, int sel_reg, u16 dev_passwd_id,
1364 u16 sel_reg_config_methods)
1365 {
1366 struct wpabuf *msg;
1367 struct wps_er_ap *ap;
1368
1369 msg = wpabuf_alloc(500);
1370 if (msg == NULL)
1371 return;
1372
1373 if (wps_build_version(msg) ||
1374 wps_er_build_selected_registrar(msg, sel_reg) ||
1375 wps_er_build_dev_password_id(msg, dev_passwd_id) ||
1376 wps_er_build_sel_reg_config_methods(msg, sel_reg_config_methods) ||
1377 wps_build_version2(msg) ||
1378 wps_build_authorized_macs(er->wps->registrar, msg) ||
1379 wps_er_build_uuid_r(msg, er->wps->uuid)) {
1380 wpabuf_free(msg);
1381 return;
1382 }
1383
1384 dl_list_for_each(ap, &er->ap, struct wps_er_ap, list)
1385 wps_er_send_set_sel_reg(ap, msg);
1386
1387 wpabuf_free(msg);
1388 }
1389
1390
1391 int wps_er_pbc(struct wps_er *er, const u8 *uuid)
1392 {
1393 if (er == NULL || er->wps == NULL)
1394 return -1;
1395
1396 /*
1397 * TODO: Should enable PBC mode only in a single AP based on which AP
1398 * the Enrollee (uuid) is using. Now, we may end up enabling multiple
1399 * APs in PBC mode which could result in session overlap at the
1400 * Enrollee.
1401 */
1402 if (wps_registrar_button_pushed(er->wps->registrar))
1403 return -1;
1404
1405 return 0;
1406 }
1407
1408
1409 static void wps_er_ap_settings_cb(void *ctx, const struct wps_credential *cred)
1410 {
1411 struct wps_er_ap *ap = ctx;
1412 union wps_event_data data;
1413
1414 wpa_printf(MSG_DEBUG, "WPS ER: AP Settings received");
1415 os_free(ap->ap_settings);
1416 ap->ap_settings = os_malloc(sizeof(*cred));
1417 if (ap->ap_settings) {
1418 os_memcpy(ap->ap_settings, cred, sizeof(*cred));
1419 ap->ap_settings->cred_attr = NULL;
1420 }
1421
1422 os_memset(&data, 0, sizeof(data));
1423 data.ap_settings.uuid = ap->uuid;
1424 data.ap_settings.cred = cred;
1425 ap->er->wps->event_cb(ap->er->wps->cb_ctx, WPS_EV_ER_AP_SETTINGS,
1426 &data);
1427 }
1428
1429
1430 static void wps_er_http_put_message_cb(void *ctx, struct http_client *c,
1431 enum http_client_event event)
1432 {
1433 struct wps_er_ap *ap = ctx;
1434 struct wpabuf *reply;
1435 char *msg = NULL;
1436
1437 switch (event) {
1438 case HTTP_CLIENT_OK:
1439 wpa_printf(MSG_DEBUG, "WPS ER: PutMessage OK");
1440 reply = http_client_get_body(c);
1441 if (reply == NULL)
1442 break;
1443 msg = os_zalloc(wpabuf_len(reply) + 1);
1444 if (msg == NULL)
1445 break;
1446 os_memcpy(msg, wpabuf_head(reply), wpabuf_len(reply));
1447 break;
1448 case HTTP_CLIENT_FAILED:
1449 case HTTP_CLIENT_INVALID_REPLY:
1450 case HTTP_CLIENT_TIMEOUT:
1451 wpa_printf(MSG_DEBUG, "WPS ER: PutMessage failed");
1452 if (ap->wps) {
1453 wps_deinit(ap->wps);
1454 ap->wps = NULL;
1455 }
1456 break;
1457 }
1458 http_client_free(ap->http);
1459 ap->http = NULL;
1460
1461 if (msg) {
1462 struct wpabuf *buf;
1463 enum http_reply_code ret;
1464 buf = xml_get_base64_item(msg, "NewOutMessage", &ret);
1465 os_free(msg);
1466 if (buf == NULL) {
1467 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract "
1468 "NewOutMessage from PutMessage response");
1469 return;
1470 }
1471 wps_er_ap_process(ap, buf);
1472 wpabuf_free(buf);
1473 }
1474 }
1475
1476
1477 static void wps_er_ap_put_message(struct wps_er_ap *ap,
1478 const struct wpabuf *msg)
1479 {
1480 struct wpabuf *buf;
1481 char *len_ptr, *body_ptr;
1482 struct sockaddr_in dst;
1483 char *url, *path;
1484
1485 if (ap->http) {
1486 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP operation ongoing "
1487 "with the AP - cannot continue learn");
1488 return;
1489 }
1490
1491 if (ap->control_url == NULL) {
1492 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1493 return;
1494 }
1495
1496 url = http_client_url_parse(ap->control_url, &dst, &path);
1497 if (url == NULL) {
1498 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1499 return;
1500 }
1501
1502 buf = wps_er_soap_hdr(msg, "PutMessage", "NewInMessage", path, &dst,
1503 &len_ptr, &body_ptr);
1504 os_free(url);
1505 if (buf == NULL)
1506 return;
1507
1508 wps_er_soap_end(buf, "PutMessage", len_ptr, body_ptr);
1509
1510 ap->http = http_client_addr(&dst, buf, 10000,
1511 wps_er_http_put_message_cb, ap);
1512 if (ap->http == NULL)
1513 wpabuf_free(buf);
1514 }
1515
1516
1517 static void wps_er_ap_process(struct wps_er_ap *ap, struct wpabuf *msg)
1518 {
1519 enum wps_process_res res;
1520 struct wps_parse_attr attr;
1521 enum wsc_op_code op_code;
1522
1523 op_code = WSC_MSG;
1524 if (wps_parse_msg(msg, &attr) == 0 && attr.msg_type) {
1525 switch (*attr.msg_type) {
1526 case WPS_WSC_ACK:
1527 op_code = WSC_ACK;
1528 break;
1529 case WPS_WSC_NACK:
1530 op_code = WSC_NACK;
1531 break;
1532 case WPS_WSC_DONE:
1533 op_code = WSC_Done;
1534 break;
1535 }
1536 }
1537
1538 res = wps_process_msg(ap->wps, op_code, msg);
1539 if (res == WPS_CONTINUE) {
1540 struct wpabuf *next = wps_get_msg(ap->wps, &op_code);
1541 if (next) {
1542 wps_er_ap_put_message(ap, next);
1543 wpabuf_free(next);
1544 } else {
1545 wpa_printf(MSG_DEBUG, "WPS ER: Failed to build "
1546 "message");
1547 wps_deinit(ap->wps);
1548 ap->wps = NULL;
1549 }
1550 } else {
1551 wpa_printf(MSG_DEBUG, "WPS ER: Failed to process message from "
1552 "AP (res=%d)", res);
1553 wps_deinit(ap->wps);
1554 ap->wps = NULL;
1555 }
1556 }
1557
1558
1559 static void wps_er_ap_learn_m1(struct wps_er_ap *ap, struct wpabuf *m1)
1560 {
1561 struct wps_config cfg;
1562
1563 if (ap->wps) {
1564 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run already in "
1565 "progress with this AP");
1566 return;
1567 }
1568
1569 os_memset(&cfg, 0, sizeof(cfg));
1570 cfg.wps = ap->er->wps;
1571 cfg.registrar = 1;
1572 ap->wps = wps_init(&cfg);
1573 if (ap->wps == NULL)
1574 return;
1575 ap->wps->ap_settings_cb = wps_er_ap_settings_cb;
1576 ap->wps->ap_settings_cb_ctx = ap;
1577
1578 wps_er_ap_process(ap, m1);
1579 }
1580
1581
1582 static void wps_er_ap_learn(struct wps_er_ap *ap, const char *dev_info)
1583 {
1584 struct wpabuf *info;
1585 enum http_reply_code ret;
1586
1587 wpa_printf(MSG_DEBUG, "WPS ER: Received GetDeviceInfo response (M1) "
1588 "from the AP");
1589 info = xml_get_base64_item(dev_info, "NewDeviceInfo", &ret);
1590 if (info == NULL) {
1591 wpa_printf(MSG_DEBUG, "WPS ER: Could not extract "
1592 "NewDeviceInfo from GetDeviceInfo response");
1593 return;
1594 }
1595
1596 ap->m1_handler(ap, info);
1597 wpabuf_free(info);
1598 }
1599
1600
1601 static void wps_er_http_get_dev_info_cb(void *ctx, struct http_client *c,
1602 enum http_client_event event)
1603 {
1604 struct wps_er_ap *ap = ctx;
1605 struct wpabuf *reply;
1606 char *dev_info = NULL;
1607
1608 switch (event) {
1609 case HTTP_CLIENT_OK:
1610 wpa_printf(MSG_DEBUG, "WPS ER: GetDeviceInfo OK");
1611 reply = http_client_get_body(c);
1612 if (reply == NULL)
1613 break;
1614 dev_info = os_zalloc(wpabuf_len(reply) + 1);
1615 if (dev_info == NULL)
1616 break;
1617 os_memcpy(dev_info, wpabuf_head(reply), wpabuf_len(reply));
1618 break;
1619 case HTTP_CLIENT_FAILED:
1620 case HTTP_CLIENT_INVALID_REPLY:
1621 case HTTP_CLIENT_TIMEOUT:
1622 wpa_printf(MSG_DEBUG, "WPS ER: GetDeviceInfo failed");
1623 break;
1624 }
1625 http_client_free(ap->http);
1626 ap->http = NULL;
1627
1628 if (dev_info) {
1629 wps_er_ap_learn(ap, dev_info);
1630 os_free(dev_info);
1631 }
1632 }
1633
1634
1635 static int wps_er_send_get_device_info(struct wps_er_ap *ap,
1636 void (*m1_handler)(struct wps_er_ap *ap,
1637 struct wpabuf *m1))
1638 {
1639 struct wpabuf *buf;
1640 char *len_ptr, *body_ptr;
1641 struct sockaddr_in dst;
1642 char *url, *path;
1643
1644 if (ap->http) {
1645 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP operation ongoing "
1646 "with the AP - cannot get device info");
1647 return -1;
1648 }
1649
1650 if (ap->control_url == NULL) {
1651 wpa_printf(MSG_DEBUG, "WPS ER: No controlURL for AP");
1652 return -1;
1653 }
1654
1655 url = http_client_url_parse(ap->control_url, &dst, &path);
1656 if (url == NULL) {
1657 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse controlURL");
1658 return -1;
1659 }
1660
1661 buf = wps_er_soap_hdr(NULL, "GetDeviceInfo", NULL, path, &dst,
1662 &len_ptr, &body_ptr);
1663 os_free(url);
1664 if (buf == NULL)
1665 return -1;
1666
1667 wps_er_soap_end(buf, "GetDeviceInfo", len_ptr, body_ptr);
1668
1669 ap->http = http_client_addr(&dst, buf, 10000,
1670 wps_er_http_get_dev_info_cb, ap);
1671 if (ap->http == NULL) {
1672 wpabuf_free(buf);
1673 return -1;
1674 }
1675
1676 ap->m1_handler = m1_handler;
1677
1678 return 0;
1679 }
1680
1681
1682 int wps_er_learn(struct wps_er *er, const u8 *uuid, const u8 *pin,
1683 size_t pin_len)
1684 {
1685 struct wps_er_ap *ap;
1686
1687 if (er == NULL)
1688 return -1;
1689
1690 ap = wps_er_ap_get(er, NULL, uuid);
1691 if (ap == NULL) {
1692 wpa_printf(MSG_DEBUG, "WPS ER: AP not found for learn "
1693 "request");
1694 return -1;
1695 }
1696 if (ap->wps) {
1697 wpa_printf(MSG_DEBUG, "WPS ER: Pending operation ongoing "
1698 "with the AP - cannot start learn");
1699 return -1;
1700 }
1701
1702 if (wps_er_send_get_device_info(ap, wps_er_ap_learn_m1) < 0)
1703 return -1;
1704
1705 /* TODO: add PIN without SetSelectedRegistrar trigger to all APs */
1706 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0);
1707
1708 return 0;
1709 }
1710
1711
1712 static void wps_er_ap_config_m1(struct wps_er_ap *ap, struct wpabuf *m1)
1713 {
1714 struct wps_config cfg;
1715
1716 if (ap->wps) {
1717 wpa_printf(MSG_DEBUG, "WPS ER: Protocol run already in "
1718 "progress with this AP");
1719 return;
1720 }
1721
1722 os_memset(&cfg, 0, sizeof(cfg));
1723 cfg.wps = ap->er->wps;
1724 cfg.registrar = 1;
1725 cfg.new_ap_settings = ap->ap_settings;
1726 ap->wps = wps_init(&cfg);
1727 if (ap->wps == NULL)
1728 return;
1729 ap->wps->ap_settings_cb = NULL;
1730 ap->wps->ap_settings_cb_ctx = NULL;
1731
1732 wps_er_ap_process(ap, m1);
1733 }
1734
1735
1736 int wps_er_config(struct wps_er *er, const u8 *uuid, const u8 *pin,
1737 size_t pin_len, const struct wps_credential *cred)
1738 {
1739 struct wps_er_ap *ap;
1740
1741 if (er == NULL)
1742 return -1;
1743
1744 ap = wps_er_ap_get(er, NULL, uuid);
1745 if (ap == NULL) {
1746 wpa_printf(MSG_DEBUG, "WPS ER: AP not found for config "
1747 "request");
1748 return -1;
1749 }
1750 if (ap->wps) {
1751 wpa_printf(MSG_DEBUG, "WPS ER: Pending operation ongoing "
1752 "with the AP - cannot start config");
1753 return -1;
1754 }
1755
1756 os_free(ap->ap_settings);
1757 ap->ap_settings = os_malloc(sizeof(*cred));
1758 if (ap->ap_settings == NULL)
1759 return -1;
1760 os_memcpy(ap->ap_settings, cred, sizeof(*cred));
1761 ap->ap_settings->cred_attr = NULL;
1762
1763 if (wps_er_send_get_device_info(ap, wps_er_ap_config_m1) < 0)
1764 return -1;
1765
1766 /* TODO: add PIN without SetSelectedRegistrar trigger to all APs */
1767 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0);
1768
1769 return 0;
1770 }