169 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			PHP
		
	
	
	
			
		
		
	
	
			169 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			PHP
		
	
	
	
<?php
 | 
						|
 | 
						|
require('config.php');
 | 
						|
 | 
						|
if (!stristr($_SERVER["CONTENT_TYPE"], "application/soap+xml")) {
 | 
						|
  error_log("spp.php - Unexpected Content-Type " . $_SERVER["CONTENT_TYPE"]);
 | 
						|
  die("Unexpected Content-Type");
 | 
						|
}
 | 
						|
 | 
						|
if ($_SERVER["REQUEST_METHOD"] != "POST") {
 | 
						|
  error_log("spp.php - Unexpected method " . $_SERVER["REQUEST_METHOD"]);
 | 
						|
  die("Unexpected method");
 | 
						|
}
 | 
						|
 | 
						|
if (isset($_GET["realm"])) {
 | 
						|
  $realm = $_GET["realm"];
 | 
						|
  $realm = PREG_REPLACE("/[^0-9a-zA-Z\.\-]/i", '', $realm);
 | 
						|
} else {
 | 
						|
  error_log("spp.php - Realm not specified");
 | 
						|
  die("Realm not specified");
 | 
						|
}
 | 
						|
 | 
						|
if (isset($_GET["test"]))
 | 
						|
  $test = PREG_REPLACE("/[^0-9a-zA-Z\_\-]/i", '', $_GET["test"]);
 | 
						|
else
 | 
						|
  $test = "";
 | 
						|
 | 
						|
unset($user);
 | 
						|
putenv("HS20CERT");
 | 
						|
 | 
						|
if (!empty($_SERVER['PHP_AUTH_DIGEST'])) {
 | 
						|
  $needed = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1,
 | 
						|
		  'uri'=>1, 'response'=>1);
 | 
						|
  $data = array();
 | 
						|
  $keys = implode('|', array_keys($needed));
 | 
						|
  preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@',
 | 
						|
		 $_SERVER['PHP_AUTH_DIGEST'], $matches, PREG_SET_ORDER);
 | 
						|
  foreach ($matches as $m) {
 | 
						|
    $data[$m[1]] = $m[3] ? $m[3] : $m[4];
 | 
						|
    unset($needed[$m[1]]);
 | 
						|
  }
 | 
						|
  if ($needed) {
 | 
						|
    error_log("spp.php - Authentication failed - missing: " . print_r($needed));
 | 
						|
    die('Authentication failed');
 | 
						|
  }
 | 
						|
  $user = $data['username'];
 | 
						|
  if (strlen($user) < 1) {
 | 
						|
    error_log("spp.php - Authentication failed - empty username");
 | 
						|
    die('Authentication failed');
 | 
						|
  }
 | 
						|
 | 
						|
 | 
						|
  $db = new PDO($osu_db);
 | 
						|
  if (!$db) {
 | 
						|
    error_log("spp.php - Could not access database");
 | 
						|
    die("Could not access database");
 | 
						|
  }
 | 
						|
  $row = $db->query("SELECT password FROM users " .
 | 
						|
		    "WHERE identity='$user' AND realm='$realm'")->fetch();
 | 
						|
  if (!$row) {
 | 
						|
    $row = $db->query("SELECT osu_password FROM users " .
 | 
						|
		      "WHERE osu_user='$user' AND realm='$realm'")->fetch();
 | 
						|
    $pw = $row['osu_password'];
 | 
						|
  } else
 | 
						|
    $pw = $row['password'];
 | 
						|
  if (!$row) {
 | 
						|
    error_log("spp.php - Authentication failed - user '$user' not found");
 | 
						|
    die('Authentication failed');
 | 
						|
  }
 | 
						|
  if (strlen($pw) < 1) {
 | 
						|
    error_log("spp.php - Authentication failed - empty password");
 | 
						|
    die('Authentication failed');
 | 
						|
  }
 | 
						|
 | 
						|
  $A1 = md5($user . ':' . $realm . ':' . $pw);
 | 
						|
  $A2 = md5($_SERVER['REQUEST_METHOD'] . ':' . $data['uri']);
 | 
						|
  $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' .
 | 
						|
	      $data['cnonce'] . ':' . $data['qop'] . ':' . $A2);
 | 
						|
  if ($data['response'] != $resp) {
 | 
						|
    error_log("Authentication failure - response mismatch");
 | 
						|
    die('Authentication failed');
 | 
						|
  }
 | 
						|
} else if (isset($_SERVER["SSL_CLIENT_VERIFY"]) &&
 | 
						|
	   $_SERVER["SSL_CLIENT_VERIFY"] == "SUCCESS" &&
 | 
						|
	   isset($_SERVER["SSL_CLIENT_M_SERIAL"])) {
 | 
						|
  $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"];
 | 
						|
  putenv("HS20CERT=yes");
 | 
						|
} else if (isset($_GET["hotspot2dot0-mobile-identifier-hash"])) {
 | 
						|
  $id_hash = $_GET["hotspot2dot0-mobile-identifier-hash"];
 | 
						|
  $id_hash = PREG_REPLACE("/[^0-9a-h]/i", '', $id_hash);
 | 
						|
 | 
						|
  $db = new PDO($osu_db);
 | 
						|
  if (!$db) {
 | 
						|
    error_log("spp.php - Could not access database");
 | 
						|
    die("Could not access database");
 | 
						|
  }
 | 
						|
 | 
						|
  $row = $db->query("SELECT * FROM sim_provisioning " .
 | 
						|
		    "WHERE mobile_identifier_hash='$id_hash'")->fetch();
 | 
						|
  if (!$row) {
 | 
						|
    error_log("spp.php - SIM provisioning failed - mobile_identifier_hash not found");
 | 
						|
    die('SIM provisioning failed - mobile_identifier_hash not found');
 | 
						|
  }
 | 
						|
 | 
						|
  $imsi = $row['imsi'];
 | 
						|
  $mac_addr = $row['mac_addr'];
 | 
						|
  $eap_method = $row['eap_method'];
 | 
						|
 | 
						|
  $row = $db->query("SELECT COUNT(*) FROM osu_config " .
 | 
						|
		    "WHERE realm='$realm'")->fetch();
 | 
						|
  if (!$row || intval($row[0]) < 1) {
 | 
						|
    error_log("spp.php - SIM provisioning failed - realm $realm not found");
 | 
						|
    die('SIM provisioning failed');
 | 
						|
  }
 | 
						|
 | 
						|
  error_log("spp.php - SIM provisioning for IMSI $imsi");
 | 
						|
  putenv("HS20SIMPROV=yes");
 | 
						|
  putenv("HS20IMSI=$imsi");
 | 
						|
  putenv("HS20MACADDR=$mac_addr");
 | 
						|
  putenv("HS20EAPMETHOD=$eap_method");
 | 
						|
  putenv("HS20IDHASH=$id_hash");
 | 
						|
} else if (!isset($_SERVER["PATH_INFO"]) ||
 | 
						|
	   $_SERVER["PATH_INFO"] != "/signup") {
 | 
						|
  header('HTTP/1.1 401 Unauthorized');
 | 
						|
  header('WWW-Authenticate: Digest realm="'.$realm.
 | 
						|
	 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
 | 
						|
  error_log("spp.php - Authentication required (not signup)");
 | 
						|
  die('Authentication required (not signup)');
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
if (isset($user) && strlen($user) > 0)
 | 
						|
  putenv("HS20USER=$user");
 | 
						|
else
 | 
						|
  putenv("HS20USER");
 | 
						|
 | 
						|
putenv("HS20REALM=$realm");
 | 
						|
$postdata = file_get_contents("php://input");
 | 
						|
putenv("HS20POST=$postdata");
 | 
						|
$addr = $_SERVER["REMOTE_ADDR"];
 | 
						|
putenv("HS20ADDR=$addr");
 | 
						|
putenv("HS20TEST=$test");
 | 
						|
 | 
						|
$last = exec("$osu_root/spp/hs20_spp_server -r$osu_root -f/tmp/hs20_spp_server.log", $output, $ret);
 | 
						|
 | 
						|
if ($ret == 2) {
 | 
						|
  if (empty($_SERVER['PHP_AUTH_DIGEST'])) {
 | 
						|
    header('HTTP/1.1 401 Unauthorized');
 | 
						|
    header('WWW-Authenticate: Digest realm="'.$realm.
 | 
						|
           '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
 | 
						|
    error_log("spp.php - Authentication required (ret 2)");
 | 
						|
    die('Authentication required');
 | 
						|
  } else {
 | 
						|
    error_log("spp.php - Unexpected authentication error");
 | 
						|
    die("Unexpected authentication error");
 | 
						|
  }
 | 
						|
}
 | 
						|
if ($ret != 0) {
 | 
						|
  error_log("spp.php - Failed to process SPP request");
 | 
						|
  die("Failed to process SPP request");
 | 
						|
}
 | 
						|
//error_log("spp.php: Response: " . implode($output));
 | 
						|
 | 
						|
header("Content-Type: application/soap+xml");
 | 
						|
 | 
						|
echo implode($output);
 | 
						|
 | 
						|
?>
 |