1 /* 2 * UPnP WPS Device - Web connections 3 * Copyright (c) 2000-2003 Intel Corporation 4 * Copyright (c) 2006-2007 Sony Corporation 5 * Copyright (c) 2008-2009 Atheros Communications 6 * Copyright (c) 2009, Jouni Malinen <j (at) w1.fi> 7 * 8 * See wps_upnp.c for more details on licensing and code history. 9 */ 10 11 #include "includes.h" 12 13 #include "common.h" 14 #include "base64.h" 15 #include "uuid.h" 16 #include "httpread.h" 17 #include "http_server.h" 18 #include "wps_i.h" 19 #include "wps_upnp.h" 20 #include "wps_upnp_i.h" 21 #include "upnp_xml.h" 22 23 /*************************************************************************** 24 * Web connections (we serve pages of info about ourselves, handle 25 * requests, etc. etc.). 26 **************************************************************************/ 27 28 #define WEB_CONNECTION_TIMEOUT_SEC 30 /* Drop web connection after t.o. */ 29 #define WEB_CONNECTION_MAX_READ 8000 /* Max we'll read for TCP request */ 30 #define MAX_WEB_CONNECTIONS 10 /* max simultaneous web connects */ 31 32 33 static const char *urn_wfawlanconfig = 34 "urn:schemas-wifialliance-org:service:WFAWLANConfig:1"; 35 static const char *http_server_hdr = 36 "Server: unspecified, UPnP/1.0, unspecified\r\n"; 37 static const char *http_connection_close = 38 "Connection: close\r\n"; 39 40 /* 41 * "Files" that we serve via HTTP. The format of these files is given by 42 * WFA WPS specifications. Extra white space has been removed to save space. 43 */ 44 45 static const char wps_scpd_xml[] = 46 "<?xml version=\"1.0\"?>\n" 47 "<scpd xmlns=\"urn:schemas-upnp-org:service-1-0\">\n" 48 "<specVersion><major>1</major><minor>0</minor></specVersion>\n" 49 "<actionList>\n" 50 "<action>\n" 51 "<name>GetDeviceInfo</name>\n" 52 "<argumentList>\n" 53 "<argument>\n" 54 "<name>NewDeviceInfo</name>\n" 55 "<direction>out</direction>\n" 56 "<relatedStateVariable>DeviceInfo</relatedStateVariable>\n" 57 "</argument>\n" 58 "</argumentList>\n" 59 "</action>\n" 60 "<action>\n" 61 "<name>PutMessage</name>\n" 62 "<argumentList>\n" 63 "<argument>\n" 64 "<name>NewInMessage</name>\n" 65 "<direction>in</direction>\n" 66 "<relatedStateVariable>InMessage</relatedStateVariable>\n" 67 "</argument>\n" 68 "<argument>\n" 69 "<name>NewOutMessage</name>\n" 70 "<direction>out</direction>\n" 71 "<relatedStateVariable>OutMessage</relatedStateVariable>\n" 72 "</argument>\n" 73 "</argumentList>\n" 74 "</action>\n" 75 "<action>\n" 76 "<name>PutWLANResponse</name>\n" 77 "<argumentList>\n" 78 "<argument>\n" 79 "<name>NewMessage</name>\n" 80 "<direction>in</direction>\n" 81 "<relatedStateVariable>Message</relatedStateVariable>\n" 82 "</argument>\n" 83 "<argument>\n" 84 "<name>NewWLANEventType</name>\n" 85 "<direction>in</direction>\n" 86 "<relatedStateVariable>WLANEventType</relatedStateVariable>\n" 87 "</argument>\n" 88 "<argument>\n" 89 "<name>NewWLANEventMAC</name>\n" 90 "<direction>in</direction>\n" 91 "<relatedStateVariable>WLANEventMAC</relatedStateVariable>\n" 92 "</argument>\n" 93 "</argumentList>\n" 94 "</action>\n" 95 "<action>\n" 96 "<name>SetSelectedRegistrar</name>\n" 97 "<argumentList>\n" 98 "<argument>\n" 99 "<name>NewMessage</name>\n" 100 "<direction>in</direction>\n" 101 "<relatedStateVariable>Message</relatedStateVariable>\n" 102 "</argument>\n" 103 "</argumentList>\n" 104 "</action>\n" 105 "</actionList>\n" 106 "<serviceStateTable>\n" 107 "<stateVariable sendEvents=\"no\">\n" 108 "<name>Message</name>\n" 109 "<dataType>bin.base64</dataType>\n" 110 "</stateVariable>\n" 111 "<stateVariable sendEvents=\"no\">\n" 112 "<name>InMessage</name>\n" 113 "<dataType>bin.base64</dataType>\n" 114 "</stateVariable>\n" 115 "<stateVariable sendEvents=\"no\">\n" 116 "<name>OutMessage</name>\n" 117 "<dataType>bin.base64</dataType>\n" 118 "</stateVariable>\n" 119 "<stateVariable sendEvents=\"no\">\n" 120 "<name>DeviceInfo</name>\n" 121 "<dataType>bin.base64</dataType>\n" 122 "</stateVariable>\n" 123 "<stateVariable sendEvents=\"yes\">\n" 124 "<name>APStatus</name>\n" 125 "<dataType>ui1</dataType>\n" 126 "</stateVariable>\n" 127 "<stateVariable sendEvents=\"yes\">\n" 128 "<name>STAStatus</name>\n" 129 "<dataType>ui1</dataType>\n" 130 "</stateVariable>\n" 131 "<stateVariable sendEvents=\"yes\">\n" 132 "<name>WLANEvent</name>\n" 133 "<dataType>bin.base64</dataType>\n" 134 "</stateVariable>\n" 135 "<stateVariable sendEvents=\"no\">\n" 136 "<name>WLANEventType</name>\n" 137 "<dataType>ui1</dataType>\n" 138 "</stateVariable>\n" 139 "<stateVariable sendEvents=\"no\">\n" 140 "<name>WLANEventMAC</name>\n" 141 "<dataType>string</dataType>\n" 142 "</stateVariable>\n" 143 "<stateVariable sendEvents=\"no\">\n" 144 "<name>WLANResponse</name>\n" 145 "<dataType>bin.base64</dataType>\n" 146 "</stateVariable>\n" 147 "</serviceStateTable>\n" 148 "</scpd>\n" 149 ; 150 151 152 static const char *wps_device_xml_prefix = 153 "<?xml version=\"1.0\"?>\n" 154 "<root xmlns=\"urn:schemas-upnp-org:device-1-0\">\n" 155 "<specVersion>\n" 156 "<major>1</major>\n" 157 "<minor>0</minor>\n" 158 "</specVersion>\n" 159 "<device>\n" 160 "<deviceType>urn:schemas-wifialliance-org:device:WFADevice:1" 161 "</deviceType>\n"; 162 163 static const char *wps_device_xml_postfix = 164 "<serviceList>\n" 165 "<service>\n" 166 "<serviceType>urn:schemas-wifialliance-org:service:WFAWLANConfig:1" 167 "</serviceType>\n" 168 "<serviceId>urn:wifialliance-org:serviceId:WFAWLANConfig1</serviceId>" 169 "\n" 170 "<SCPDURL>" UPNP_WPS_SCPD_XML_FILE "</SCPDURL>\n" 171 "<controlURL>" UPNP_WPS_DEVICE_CONTROL_FILE "</controlURL>\n" 172 "<eventSubURL>" UPNP_WPS_DEVICE_EVENT_FILE "</eventSubURL>\n" 173 "</service>\n" 174 "</serviceList>\n" 175 "</device>\n" 176 "</root>\n"; 177 178 179 /* format_wps_device_xml -- produce content of "file" wps_device.xml 180 * (UPNP_WPS_DEVICE_XML_FILE) 181 */ 182 static void format_wps_device_xml(struct upnp_wps_device_interface *iface, 183 struct upnp_wps_device_sm *sm, 184 struct wpabuf *buf) 185 { 186 const char *s; 187 char uuid_string[80]; 188 189 wpabuf_put_str(buf, wps_device_xml_prefix); 190 191 /* 192 * Add required fields with default values if not configured. Add 193 * optional and recommended fields only if configured. 194 */ 195 s = iface->wps->friendly_name; 196 s = ((s && *s) ? s : "WPS Access Point"); 197 xml_add_tagged_data(buf, "friendlyName", s); 198 199 s = iface->wps->dev.manufacturer; 200 s = ((s && *s) ? s : ""); 201 xml_add_tagged_data(buf, "manufacturer", s); 202 203 if (iface->wps->manufacturer_url) 204 xml_add_tagged_data(buf, "manufacturerURL", 205 iface->wps->manufacturer_url); 206 207 if (iface->wps->model_description) 208 xml_add_tagged_data(buf, "modelDescription", 209 iface->wps->model_description); 210 211 s = iface->wps->dev.model_name; 212 s = ((s && *s) ? s : ""); 213 xml_add_tagged_data(buf, "modelName", s); 214 215 if (iface->wps->dev.model_number) 216 xml_add_tagged_data(buf, "modelNumber", 217 iface->wps->dev.model_number); 218 219 if (iface->wps->model_url) 220 xml_add_tagged_data(buf, "modelURL", iface->wps->model_url); 221 222 if (iface->wps->dev.serial_number) 223 xml_add_tagged_data(buf, "serialNumber", 224 iface->wps->dev.serial_number); 225 226 uuid_bin2str(iface->wps->uuid, uuid_string, sizeof(uuid_string)); 227 s = uuid_string; 228 /* Need "uuid:" prefix, thus we can't use xml_add_tagged_data() 229 * easily... 230 */ 231 wpabuf_put_str(buf, "<UDN>uuid:"); 232 xml_data_encode(buf, s, os_strlen(s)); 233 wpabuf_put_str(buf, "</UDN>\n"); 234 235 if (iface->wps->upc) 236 xml_add_tagged_data(buf, "UPC", iface->wps->upc); 237 238 wpabuf_put_str(buf, wps_device_xml_postfix); 239 } 240 241 242 static void http_put_reply_code(struct wpabuf *buf, enum http_reply_code code) 243 { 244 wpabuf_put_str(buf, "HTTP/1.1 "); 245 switch (code) { 246 case HTTP_OK: 247 wpabuf_put_str(buf, "200 OK\r\n"); 248 break; 249 case HTTP_BAD_REQUEST: 250 wpabuf_put_str(buf, "400 Bad request\r\n"); 251 break; 252 case HTTP_PRECONDITION_FAILED: 253 wpabuf_put_str(buf, "412 Precondition failed\r\n"); 254 break; 255 case HTTP_UNIMPLEMENTED: 256 wpabuf_put_str(buf, "501 Unimplemented\r\n"); 257 break; 258 case HTTP_INTERNAL_SERVER_ERROR: 259 default: 260 wpabuf_put_str(buf, "500 Internal server error\r\n"); 261 break; 262 } 263 } 264 265 266 static void http_put_date(struct wpabuf *buf) 267 { 268 wpabuf_put_str(buf, "Date: "); 269 format_date(buf); 270 wpabuf_put_str(buf, "\r\n"); 271 } 272 273 274 static void http_put_empty(struct wpabuf *buf, enum http_reply_code code) 275 { 276 http_put_reply_code(buf, code); 277 wpabuf_put_str(buf, http_server_hdr); 278 wpabuf_put_str(buf, http_connection_close); 279 wpabuf_put_str(buf, "Content-Length: 0\r\n" 280 "\r\n"); 281 } 282 283 284 /* Given that we have received a header w/ GET, act upon it 285 * 286 * Format of GET (case-insensitive): 287 * 288 * First line must be: 289 * GET /<file> HTTP/1.1 290 * Since we don't do anything fancy we just ignore other lines. 291 * 292 * Our response (if no error) which includes only required lines is: 293 * HTTP/1.1 200 OK 294 * Connection: close 295 * Content-Type: text/xml 296 * Date: <rfc1123-date> 297 * 298 * Header lines must end with \r\n 299 * Per RFC 2616, content-length: is not required but connection:close 300 * would appear to be required (given that we will be closing it!). 301 */ 302 static void web_connection_parse_get(struct upnp_wps_device_sm *sm, 303 struct http_request *hreq, 304 const char *filename) 305 { 306 struct wpabuf *buf; /* output buffer, allocated */ 307 char *put_length_here; 308 char *body_start; 309 enum { 310 GET_DEVICE_XML_FILE, 311 GET_SCPD_XML_FILE 312 } req; 313 size_t extra_len = 0; 314 int body_length; 315 char len_buf[10]; 316 struct upnp_wps_device_interface *iface; 317 318 iface = dl_list_first(&sm->interfaces, 319 struct upnp_wps_device_interface, list); 320 if (iface == NULL) { 321 http_request_deinit(hreq); 322 return; 323 } 324 325 /* 326 * It is not required that filenames be case insensitive but it is 327 * allowed and cannot hurt here. 328 */ 329 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_XML_FILE) == 0) { 330 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML"); 331 req = GET_DEVICE_XML_FILE; 332 extra_len = 3000; 333 if (iface->wps->friendly_name) 334 extra_len += os_strlen(iface->wps->friendly_name); 335 if (iface->wps->manufacturer_url) 336 extra_len += os_strlen(iface->wps->manufacturer_url); 337 if (iface->wps->model_description) 338 extra_len += os_strlen(iface->wps->model_description); 339 if (iface->wps->model_url) 340 extra_len += os_strlen(iface->wps->model_url); 341 if (iface->wps->upc) 342 extra_len += os_strlen(iface->wps->upc); 343 } else if (!os_strcasecmp(filename, UPNP_WPS_SCPD_XML_FILE)) { 344 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML"); 345 req = GET_SCPD_XML_FILE; 346 extra_len = os_strlen(wps_scpd_xml); 347 } else { 348 /* File not found */ 349 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s", 350 filename); 351 buf = wpabuf_alloc(200); 352 if (buf == NULL) { 353 http_request_deinit(hreq); 354 return; 355 } 356 wpabuf_put_str(buf, 357 "HTTP/1.1 404 Not Found\r\n" 358 "Connection: close\r\n"); 359 360 http_put_date(buf); 361 362 /* terminating empty line */ 363 wpabuf_put_str(buf, "\r\n"); 364 365 goto send_buf; 366 } 367 368 buf = wpabuf_alloc(1000 + extra_len); 369 if (buf == NULL) { 370 http_request_deinit(hreq); 371 return; 372 } 373 374 wpabuf_put_str(buf, 375 "HTTP/1.1 200 OK\r\n" 376 "Content-Type: text/xml; charset=\"utf-8\"\r\n"); 377 wpabuf_put_str(buf, "Server: Unspecified, UPnP/1.0, Unspecified\r\n"); 378 wpabuf_put_str(buf, "Connection: close\r\n"); 379 wpabuf_put_str(buf, "Content-Length: "); 380 /* 381 * We will paste the length in later, leaving some extra whitespace. 382 * HTTP code is supposed to be tolerant of extra whitespace. 383 */ 384 put_length_here = wpabuf_put(buf, 0); 385 wpabuf_put_str(buf, " \r\n"); 386 387 http_put_date(buf); 388 389 /* terminating empty line */ 390 wpabuf_put_str(buf, "\r\n"); 391 392 body_start = wpabuf_put(buf, 0); 393 394 switch (req) { 395 case GET_DEVICE_XML_FILE: 396 format_wps_device_xml(iface, sm, buf); 397 break; 398 case GET_SCPD_XML_FILE: 399 wpabuf_put_str(buf, wps_scpd_xml); 400 break; 401 } 402 403 /* Now patch in the content length at the end */ 404 body_length = (char *) wpabuf_put(buf, 0) - body_start; 405 os_snprintf(len_buf, 10, "%d", body_length); 406 os_memcpy(put_length_here, len_buf, os_strlen(len_buf)); 407 408 send_buf: 409 http_request_send_and_deinit(hreq, buf); 410 } 411 412 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) 414 { 415 dl_list_del(&peer->list); 416 if (peer->wps) 417 wps_deinit(peer->wps); 418 os_free(peer); 419 } 420 421 422 static enum http_reply_code 423 web_process_get_device_info(struct upnp_wps_device_sm *sm, 424 struct wpabuf **reply, const char **replyname) 425 { 426 static const char *name = "NewDeviceInfo"; 427 struct wps_config cfg; 428 struct upnp_wps_device_interface *iface; 429 struct upnp_wps_peer *peer; 430 431 iface = dl_list_first(&sm->interfaces, 432 struct upnp_wps_device_interface, list); 433 434 wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo"); 435 436 if (!iface || iface->ctx->ap_pin == NULL) 437 return HTTP_INTERNAL_SERVER_ERROR; 438 439 peer = os_zalloc(sizeof(*peer)); 440 if (!peer) 441 return HTTP_INTERNAL_SERVER_ERROR; 442 443 /* 444 * Request for DeviceInfo, i.e., M1 TLVs. This is a start of WPS 445 * registration over UPnP with the AP acting as an Enrollee. It should 446 * be noted that this is frequently used just to get the device data, 447 * i.e., there may not be any intent to actually complete the 448 * registration. 449 */ 450 451 os_memset(&cfg, 0, sizeof(cfg)); 452 cfg.wps = iface->wps; 453 cfg.pin = (u8 *) iface->ctx->ap_pin; 454 cfg.pin_len = os_strlen(iface->ctx->ap_pin); 455 peer->wps = wps_init(&cfg); 456 if (peer->wps) { 457 enum wsc_op_code op_code; 458 *reply = wps_get_msg(peer->wps, &op_code); 459 if (*reply == NULL) { 460 wps_deinit(peer->wps); 461 peer->wps = NULL; 462 } 463 } else 464 *reply = NULL; 465 if (*reply == NULL) { 466 wpa_printf(MSG_INFO, "WPS UPnP: Failed to get DeviceInfo"); 467 os_free(peer); 468 return HTTP_INTERNAL_SERVER_ERROR; 469 } 470 471 if (dl_list_len(&iface->peers) > 3) { 472 struct upnp_wps_peer *old; 473 474 old = dl_list_first(&iface->peers, struct upnp_wps_peer, list); 475 if (old) { 476 wpa_printf(MSG_DEBUG, "WPS UPnP: Drop oldest active session"); 477 wps_upnp_peer_del(old); 478 } 479 } 480 dl_list_add_tail(&iface->peers, &peer->list); 481 /* TODO: Could schedule a timeout to free the entry */ 482 483 *replyname = name; 484 return HTTP_OK; 485 } 486 487 488 static enum http_reply_code 489 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, 490 struct wpabuf **reply, const char **replyname) 491 { 492 struct wpabuf *msg; 493 static const char *name = "NewOutMessage"; 494 enum http_reply_code ret; 495 enum wps_process_res res; 496 enum wsc_op_code op_code; 497 struct upnp_wps_device_interface *iface; 498 struct wps_parse_attr attr; 499 struct upnp_wps_peer *tmp, *peer; 500 501 iface = dl_list_first(&sm->interfaces, 502 struct upnp_wps_device_interface, list); 503 if (!iface) 504 return HTTP_INTERNAL_SERVER_ERROR; 505 506 /* 507 * PutMessage is used by external UPnP-based Registrar to perform WPS 508 * operation with the access point itself; as compared with 509 * PutWLANResponse which is for proxying. 510 */ 511 wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage"); 512 msg = xml_get_base64_item(data, "NewInMessage", &ret); 513 if (msg == NULL) 514 return ret; 515 516 if (wps_parse_msg(msg, &attr)) { 517 wpa_printf(MSG_DEBUG, 518 "WPS UPnP: Could not parse PutMessage - NewInMessage"); 519 wpabuf_free(msg); 520 return HTTP_BAD_REQUEST; 521 } 522 523 /* Find a matching active peer session */ 524 peer = NULL; 525 dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) { 526 if (!tmp->wps) 527 continue; 528 if (attr.enrollee_nonce && 529 os_memcmp(tmp->wps->nonce_e, attr.enrollee_nonce, 530 WPS_NONCE_LEN) != 0) 531 continue; /* Enrollee nonce mismatch */ 532 if (attr.msg_type && 533 *attr.msg_type != WPS_M2 && 534 *attr.msg_type != WPS_M2D && 535 attr.registrar_nonce && 536 os_memcmp(tmp->wps->nonce_r, attr.registrar_nonce, 537 WPS_NONCE_LEN) != 0) 538 continue; /* Registrar nonce mismatch */ 539 peer = tmp; 540 break; 541 } 542 if (!peer) { 543 /* 544 Try to use the first entry in case message could work with 545 * it. The actual handler function will reject this, if needed. 546 * This maintains older behavior where only a single peer entry 547 * was supported. 548 */ 549 peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list); 550 } 551 if (!peer || !peer->wps) { 552 wpa_printf(MSG_DEBUG, "WPS UPnP: No active peer entry found"); 553 wpabuf_free(msg); 554 return HTTP_BAD_REQUEST; 555 } 556 557 res = wps_process_msg(peer->wps, WSC_UPnP, msg); 558 if (res == WPS_FAILURE) { 559 *reply = NULL; 560 wpa_printf(MSG_DEBUG, "WPS UPnP: Drop active peer session"); 561 wps_upnp_peer_del(peer); 562 } else { 563 *reply = wps_get_msg(peer->wps, &op_code); 564 } 565 wpabuf_free(msg); 566 if (*reply == NULL) 567 return HTTP_INTERNAL_SERVER_ERROR; 568 *replyname = name; 569 return HTTP_OK; 570 } 571 572 573 static enum http_reply_code 574 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, 575 struct wpabuf **reply, const char **replyname) 576 { 577 struct wpabuf *msg; 578 enum http_reply_code ret; 579 u8 macaddr[ETH_ALEN]; 580 int ev_type; 581 int type; 582 char *val; 583 struct upnp_wps_device_interface *iface; 584 int ok = 0; 585 586 /* 587 * External UPnP-based Registrar is passing us a message to be proxied 588 * over to a Wi-Fi -based client of ours. 589 */ 590 591 wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse"); 592 msg = xml_get_base64_item(data, "NewMessage", &ret); 593 if (msg == NULL) { 594 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage " 595 "from PutWLANResponse"); 596 return ret; 597 } 598 val = xml_get_first_item(data, "NewWLANEventType"); 599 if (val == NULL) { 600 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in " 601 "PutWLANResponse"); 602 wpabuf_free(msg); 603 return UPNP_ARG_VALUE_INVALID; 604 } 605 ev_type = atol(val); 606 os_free(val); 607 val = xml_get_first_item(data, "NewWLANEventMAC"); 608 if (val == NULL) { 609 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in " 610 "PutWLANResponse"); 611 wpabuf_free(msg); 612 return UPNP_ARG_VALUE_INVALID; 613 } 614 if (hwaddr_aton(val, macaddr)) { 615 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid NewWLANEventMAC in " 616 "PutWLANResponse: '%s'", val); 617 #ifdef CONFIG_WPS_STRICT 618 { 619 struct wps_parse_attr attr; 620 if (wps_parse_msg(msg, &attr) < 0 || attr.version2) { 621 wpabuf_free(msg); 622 os_free(val); 623 return UPNP_ARG_VALUE_INVALID; 624 } 625 } 626 #endif /* CONFIG_WPS_STRICT */ 627 if (hwaddr_aton2(val, macaddr) > 0) { 628 /* 629 * At least some versions of Intel PROset seem to be 630 * using dot-deliminated MAC address format here. 631 */ 632 wpa_printf(MSG_DEBUG, "WPS UPnP: Workaround - allow " 633 "incorrect MAC address format in " 634 "NewWLANEventMAC: %s -> " MACSTR, 635 val, MAC2STR(macaddr)); 636 } else { 637 wpabuf_free(msg); 638 os_free(val); 639 return UPNP_ARG_VALUE_INVALID; 640 } 641 } 642 os_free(val); 643 if (ev_type == UPNP_WPS_WLANEVENT_TYPE_EAP) { 644 struct wps_parse_attr attr; 645 if (wps_parse_msg(msg, &attr) < 0 || 646 attr.msg_type == NULL) 647 type = -1; 648 else 649 type = *attr.msg_type; 650 wpa_printf(MSG_DEBUG, "WPS UPnP: Message Type %d", type); 651 } else 652 type = -1; 653 dl_list_for_each(iface, &sm->interfaces, 654 struct upnp_wps_device_interface, list) { 655 if (iface->ctx->rx_req_put_wlan_response && 656 iface->ctx->rx_req_put_wlan_response(iface->priv, ev_type, 657 macaddr, msg, type) 658 == 0) 659 ok = 1; 660 } 661 662 if (!ok) { 663 wpa_printf(MSG_INFO, "WPS UPnP: Fail: sm->ctx->" 664 "rx_req_put_wlan_response"); 665 wpabuf_free(msg); 666 return HTTP_INTERNAL_SERVER_ERROR; 667 } 668 wpabuf_free(msg); 669 *replyname = NULL; 670 *reply = NULL; 671 return HTTP_OK; 672 } 673 674 675 static int find_er_addr(struct subscription *s, struct sockaddr_in *cli) 676 { 677 struct subscr_addr *a; 678 679 dl_list_for_each(a, &s->addr_list, struct subscr_addr, list) { 680 if (cli->sin_addr.s_addr == a->saddr.sin_addr.s_addr) 681 return 1; 682 } 683 return 0; 684 } 685 686 687 static struct subscription * find_er(struct upnp_wps_device_sm *sm, 688 struct sockaddr_in *cli) 689 { 690 struct subscription *s; 691 dl_list_for_each(s, &sm->subscriptions, struct subscription, list) 692 if (find_er_addr(s, cli)) 693 return s; 694 return NULL; 695 } 696 697 698 static enum http_reply_code 699 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, 700 struct sockaddr_in *cli, char *data, 701 struct wpabuf **reply, 702 const char **replyname) 703 { 704 struct wpabuf *msg; 705 enum http_reply_code ret; 706 struct subscription *s; 707 struct upnp_wps_device_interface *iface; 708 int err = 0; 709 710 wpa_printf(MSG_DEBUG, "WPS UPnP: SetSelectedRegistrar"); 711 s = find_er(sm, cli); 712 if (s == NULL) { 713 wpa_printf(MSG_DEBUG, "WPS UPnP: Ignore SetSelectedRegistrar " 714 "from unknown ER"); 715 return UPNP_ACTION_FAILED; 716 } 717 msg = xml_get_base64_item(data, "NewMessage", &ret); 718 if (msg == NULL) 719 return ret; 720 dl_list_for_each(iface, &sm->interfaces, 721 struct upnp_wps_device_interface, list) { 722 if (upnp_er_set_selected_registrar(iface->wps->registrar, s, 723 msg)) 724 err = 1; 725 } 726 wpabuf_free(msg); 727 if (err) 728 return HTTP_INTERNAL_SERVER_ERROR; 729 *replyname = NULL; 730 *reply = NULL; 731 return HTTP_OK; 732 } 733 734 735 static const char *soap_prefix = 736 "<?xml version=\"1.0\"?>\n" 737 "<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" " 738 "s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">\n" 739 "<s:Body>\n"; 740 static const char *soap_postfix = 741 "</s:Body>\n</s:Envelope>\n"; 742 743 static const char *soap_error_prefix = 744 "<s:Fault>\n" 745 "<faultcode>s:Client</faultcode>\n" 746 "<faultstring>UPnPError</faultstring>\n" 747 "<detail>\n" 748 "<UPnPError xmlns=\"urn:schemas-upnp-org:control-1-0\">\n"; 749 static const char *soap_error_postfix = 750 "<errorDescription>Error</errorDescription>\n" 751 "</UPnPError>\n" 752 "</detail>\n" 753 "</s:Fault>\n"; 754 755 static void web_connection_send_reply(struct http_request *req, 756 enum http_reply_code ret, 757 const char *action, int action_len, 758 const struct wpabuf *reply, 759 const char *replyname) 760 { 761 struct wpabuf *buf; 762 char *replydata; 763 char *put_length_here = NULL; 764 char *body_start = NULL; 765 766 if (reply) { 767 size_t len; 768 replydata = (char *) base64_encode(wpabuf_head(reply), 769 wpabuf_len(reply), &len); 770 } else 771 replydata = NULL; 772 773 /* Parameters of the response: 774 * action(action_len) -- action we are responding to 775 * replyname -- a name we need for the reply 776 * replydata -- NULL or null-terminated string 777 */ 778 buf = wpabuf_alloc(1000 + (replydata ? os_strlen(replydata) : 0U) + 779 (action_len > 0 ? action_len * 2 : 0)); 780 if (buf == NULL) { 781 wpa_printf(MSG_INFO, "WPS UPnP: Cannot allocate reply to " 782 "POST"); 783 os_free(replydata); 784 http_request_deinit(req); 785 return; 786 } 787 788 /* 789 * Assuming we will be successful, put in the output header first. 790 * Note: we do not keep connections alive (and httpread does 791 * not support it)... therefore we must have Connection: close. 792 */ 793 if (ret == HTTP_OK) { 794 wpabuf_put_str(buf, 795 "HTTP/1.1 200 OK\r\n" 796 "Content-Type: text/xml; " 797 "charset=\"utf-8\"\r\n"); 798 } else { 799 wpabuf_printf(buf, "HTTP/1.1 %d Error\r\n", ret); 800 } 801 wpabuf_put_str(buf, http_connection_close); 802 803 wpabuf_put_str(buf, "Content-Length: "); 804 /* 805 * We will paste the length in later, leaving some extra whitespace. 806 * HTTP code is supposed to be tolerant of extra whitespace. 807 */ 808 put_length_here = wpabuf_put(buf, 0); 809 wpabuf_put_str(buf, " \r\n"); 810 811 http_put_date(buf); 812 813 /* terminating empty line */ 814 wpabuf_put_str(buf, "\r\n"); 815 816 body_start = wpabuf_put(buf, 0); 817 818 if (ret == HTTP_OK) { 819 wpabuf_put_str(buf, soap_prefix); 820 wpabuf_put_str(buf, "<u:"); 821 wpabuf_put_data(buf, action, action_len); 822 wpabuf_put_str(buf, "Response xmlns:u=\""); 823 wpabuf_put_str(buf, urn_wfawlanconfig); 824 wpabuf_put_str(buf, "\">\n"); 825 if (replydata && replyname) { 826 /* TODO: might possibly need to escape part of reply 827 * data? ... 828 * probably not, unlikely to have ampersand(&) or left 829 * angle bracket (<) in it... 830 */ 831 wpabuf_printf(buf, "<%s>", replyname); 832 wpabuf_put_str(buf, replydata); 833 wpabuf_printf(buf, "</%s>\n", replyname); 834 } 835 wpabuf_put_str(buf, "</u:"); 836 wpabuf_put_data(buf, action, action_len); 837 wpabuf_put_str(buf, "Response>\n"); 838 wpabuf_put_str(buf, soap_postfix); 839 } else { 840 /* Error case */ 841 wpabuf_put_str(buf, soap_prefix); 842 wpabuf_put_str(buf, soap_error_prefix); 843 wpabuf_printf(buf, "<errorCode>%d</errorCode>\n", ret); 844 wpabuf_put_str(buf, soap_error_postfix); 845 wpabuf_put_str(buf, soap_postfix); 846 } 847 os_free(replydata); 848 849 /* Now patch in the content length at the end */ 850 if (body_start && put_length_here) { 851 int body_length = (char *) wpabuf_put(buf, 0) - body_start; 852 char len_buf[10]; 853 os_snprintf(len_buf, sizeof(len_buf), "%d", body_length); 854 os_memcpy(put_length_here, len_buf, os_strlen(len_buf)); 855 } 856 857 http_request_send_and_deinit(req, buf); 858 } 859 860 861 static const char * web_get_action(struct http_request *req, 862 size_t *action_len) 863 { 864 const char *match; 865 int match_len; 866 char *b; 867 char *action; 868 869 *action_len = 0; 870 /* The SOAPAction line of the header tells us what we want to do */ 871 b = http_request_get_hdr_line(req, "SOAPAction:"); 872 if (b == NULL) 873 return NULL; 874 if (*b == '"') 875 b++; 876 else 877 return NULL; 878 match = urn_wfawlanconfig; 879 match_len = os_strlen(urn_wfawlanconfig) - 1; 880 if (os_strncasecmp(b, match, match_len)) 881 return NULL; 882 b += match_len; 883 /* skip over version */ 884 while (isgraph(*b) && *b != '#') 885 b++; 886 if (*b != '#') 887 return NULL; 888 b++; 889 /* Following the sharp(#) should be the action and a double quote */ 890 action = b; 891 while (isgraph(*b) && *b != '"') 892 b++; 893 if (*b != '"') 894 return NULL; 895 *action_len = b - action; 896 return action; 897 } 898 899 900 /* Given that we have received a header w/ POST, act upon it 901 * 902 * Format of POST (case-insensitive): 903 * 904 * First line must be: 905 * POST /<file> HTTP/1.1 906 * Since we don't do anything fancy we just ignore other lines. 907 * 908 * Our response (if no error) which includes only required lines is: 909 * HTTP/1.1 200 OK 910 * Connection: close 911 * Content-Type: text/xml 912 * Date: <rfc1123-date> 913 * 914 * Header lines must end with \r\n 915 * Per RFC 2616, content-length: is not required but connection:close 916 * would appear to be required (given that we will be closing it!). 917 */ 918 static void web_connection_parse_post(struct upnp_wps_device_sm *sm, 919 struct sockaddr_in *cli, 920 struct http_request *req, 921 const char *filename) 922 { 923 enum http_reply_code ret; 924 char *data = http_request_get_data(req); /* body of http msg */ 925 const char *action = NULL; 926 size_t action_len = 0; 927 const char *replyname = NULL; /* argument name for the reply */ 928 struct wpabuf *reply = NULL; /* data for the reply */ 929 930 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_CONTROL_FILE)) { 931 wpa_printf(MSG_INFO, "WPS UPnP: Invalid POST filename %s", 932 filename); 933 ret = HTTP_NOT_FOUND; 934 goto bad; 935 } 936 937 ret = UPNP_INVALID_ACTION; 938 action = web_get_action(req, &action_len); 939 if (action == NULL) 940 goto bad; 941 942 if (!os_strncasecmp("GetDeviceInfo", action, action_len)) 943 ret = web_process_get_device_info(sm, &reply, &replyname); 944 else if (!os_strncasecmp("PutMessage", action, action_len)) 945 ret = web_process_put_message(sm, data, &reply, &replyname); 946 else if (!os_strncasecmp("PutWLANResponse", action, action_len)) 947 ret = web_process_put_wlan_response(sm, data, &reply, 948 &replyname); 949 else if (!os_strncasecmp("SetSelectedRegistrar", action, action_len)) 950 ret = web_process_set_selected_registrar(sm, cli, data, &reply, 951 &replyname); 952 else 953 wpa_printf(MSG_INFO, "WPS UPnP: Unknown POST type"); 954 955 bad: 956 if (ret != HTTP_OK) 957 wpa_printf(MSG_INFO, "WPS UPnP: POST failure ret=%d", ret); 958 web_connection_send_reply(req, ret, action, action_len, reply, 959 replyname); 960 wpabuf_free(reply); 961 } 962 963 964 /* Given that we have received a header w/ SUBSCRIBE, act upon it 965 * 966 * Format of SUBSCRIBE (case-insensitive): 967 * 968 * First line must be: 969 * SUBSCRIBE /wps_event HTTP/1.1 970 * 971 * Our response (if no error) which includes only required lines is: 972 * HTTP/1.1 200 OK 973 * Server: xx, UPnP/1.0, xx 974 * SID: uuid:xxxxxxxxx 975 * Timeout: Second-<n> 976 * Content-Length: 0 977 * Date: xxxx 978 * 979 * Header lines must end with \r\n 980 * Per RFC 2616, content-length: is not required but connection:close 981 * would appear to be required (given that we will be closing it!). 982 */ 983 static void web_connection_parse_subscribe(struct upnp_wps_device_sm *sm, 984 struct http_request *req, 985 const char *filename) 986 { 987 struct wpabuf *buf; 988 char *b; 989 char *hdr = http_request_get_hdr(req); 990 char *h; 991 char *match; 992 int match_len; 993 char *end; 994 int len; 995 int got_nt = 0; 996 u8 uuid[UUID_LEN]; 997 int got_uuid = 0; 998 char *callback_urls = NULL; 999 struct subscription *s = NULL; 1000 enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR; 1001 1002 buf = wpabuf_alloc(1000); 1003 if (buf == NULL) { 1004 http_request_deinit(req); 1005 return; 1006 } 1007 1008 wpa_hexdump_ascii(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE", 1009 (u8 *) hdr, os_strlen(hdr)); 1010 1011 /* Parse/validate headers */ 1012 h = hdr; 1013 /* First line: SUBSCRIBE /wps_event HTTP/1.1 1014 * has already been parsed. 1015 */ 1016 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) { 1017 ret = HTTP_PRECONDITION_FAILED; 1018 goto error; 1019 } 1020 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE for event"); 1021 end = os_strchr(h, '\n'); 1022 1023 while (end) { 1024 /* Option line by option line */ 1025 h = end + 1; 1026 end = os_strchr(h, '\n'); 1027 if (end == NULL) 1028 break; /* no unterminated lines allowed */ 1029 1030 /* NT assures that it is our type of subscription; 1031 * not used for a renewal. 1032 **/ 1033 match = "NT:"; 1034 match_len = os_strlen(match); 1035 if (os_strncasecmp(h, match, match_len) == 0) { 1036 h += match_len; 1037 while (*h == ' ' || *h == '\t') 1038 h++; 1039 match = "upnp:event"; 1040 match_len = os_strlen(match); 1041 if (os_strncasecmp(h, match, match_len) != 0) { 1042 ret = HTTP_BAD_REQUEST; 1043 goto error; 1044 } 1045 got_nt = 1; 1046 continue; 1047 } 1048 /* HOST should refer to us */ 1049 #if 0 1050 match = "HOST:"; 1051 match_len = os_strlen(match); 1052 if (os_strncasecmp(h, match, match_len) == 0) { 1053 h += match_len; 1054 while (*h == ' ' || *h == '\t') 1055 h++; 1056 ..... 1057 } 1058 #endif 1059 /* CALLBACK gives one or more URLs for NOTIFYs 1060 * to be sent as a result of the subscription. 1061 * Each URL is enclosed in angle brackets. 1062 */ 1063 match = "CALLBACK:"; 1064 match_len = os_strlen(match); 1065 if (os_strncasecmp(h, match, match_len) == 0) { 1066 h += match_len; 1067 while (*h == ' ' || *h == '\t') 1068 h++; 1069 len = end - h; 1070 os_free(callback_urls); 1071 callback_urls = dup_binstr(h, len); 1072 if (callback_urls == NULL) { 1073 ret = HTTP_INTERNAL_SERVER_ERROR; 1074 goto error; 1075 } 1076 if (len > 0 && callback_urls[len - 1] == '\r') 1077 callback_urls[len - 1] = '\0'; 1078 continue; 1079 } 1080 /* SID is only for renewal */ 1081 match = "SID:"; 1082 match_len = os_strlen(match); 1083 if (os_strncasecmp(h, match, match_len) == 0) { 1084 h += match_len; 1085 while (*h == ' ' || *h == '\t') 1086 h++; 1087 match = "uuid:"; 1088 match_len = os_strlen(match); 1089 if (os_strncasecmp(h, match, match_len) != 0) { 1090 ret = HTTP_BAD_REQUEST; 1091 goto error; 1092 } 1093 h += match_len; 1094 while (*h == ' ' || *h == '\t') 1095 h++; 1096 if (uuid_str2bin(h, uuid)) { 1097 ret = HTTP_BAD_REQUEST; 1098 goto error; 1099 } 1100 got_uuid = 1; 1101 continue; 1102 } 1103 /* TIMEOUT is requested timeout, but apparently we can 1104 * just ignore this. 1105 */ 1106 } 1107 1108 if (got_uuid) { 1109 /* renewal */ 1110 wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription renewal"); 1111 if (callback_urls) { 1112 ret = HTTP_BAD_REQUEST; 1113 goto error; 1114 } 1115 s = subscription_renew(sm, uuid); 1116 if (s == NULL) { 1117 char str[80]; 1118 uuid_bin2str(uuid, str, sizeof(str)); 1119 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not find " 1120 "SID %s", str); 1121 ret = HTTP_PRECONDITION_FAILED; 1122 goto error; 1123 } 1124 } else if (callback_urls) { 1125 wpa_printf(MSG_DEBUG, "WPS UPnP: New subscription"); 1126 if (!got_nt) { 1127 ret = HTTP_PRECONDITION_FAILED; 1128 goto error; 1129 } 1130 s = subscription_start(sm, callback_urls); 1131 if (s == NULL) { 1132 ret = HTTP_INTERNAL_SERVER_ERROR; 1133 goto error; 1134 } 1135 } else { 1136 ret = HTTP_PRECONDITION_FAILED; 1137 goto error; 1138 } 1139 1140 /* success */ 1141 http_put_reply_code(buf, HTTP_OK); 1142 wpabuf_put_str(buf, http_server_hdr); 1143 wpabuf_put_str(buf, http_connection_close); 1144 wpabuf_put_str(buf, "Content-Length: 0\r\n"); 1145 wpabuf_put_str(buf, "SID: uuid:"); 1146 /* subscription id */ 1147 b = wpabuf_put(buf, 0); 1148 uuid_bin2str(s->uuid, b, 80); 1149 wpa_printf(MSG_DEBUG, "WPS UPnP: Assigned SID %s", b); 1150 wpabuf_put(buf, os_strlen(b)); 1151 wpabuf_put_str(buf, "\r\n"); 1152 wpabuf_printf(buf, "Timeout: Second-%d\r\n", UPNP_SUBSCRIBE_SEC); 1153 http_put_date(buf); 1154 /* And empty line to terminate header: */ 1155 wpabuf_put_str(buf, "\r\n"); 1156 1157 os_free(callback_urls); 1158 http_request_send_and_deinit(req, buf); 1159 return; 1160 1161 error: 1162 /* Per UPnP spec: 1163 * Errors 1164 * Incompatible headers 1165 * 400 Bad Request. If SID header and one of NT or CALLBACK headers 1166 * are present, the publisher must respond with HTTP error 1167 * 400 Bad Request. 1168 * Missing or invalid CALLBACK 1169 * 412 Precondition Failed. If CALLBACK header is missing or does not 1170 * contain a valid HTTP URL, the publisher must respond with HTTP 1171 * error 412 Precondition Failed. 1172 * Invalid NT 1173 * 412 Precondition Failed. If NT header does not equal upnp:event, 1174 * the publisher must respond with HTTP error 412 Precondition 1175 * Failed. 1176 * [For resubscription, use 412 if unknown uuid]. 1177 * Unable to accept subscription 1178 * 5xx. If a publisher is not able to accept a subscription (such as 1179 * due to insufficient resources), it must respond with a 1180 * HTTP 500-series error code. 1181 * 599 Too many subscriptions (not a standard HTTP error) 1182 */ 1183 wpa_printf(MSG_DEBUG, "WPS UPnP: SUBSCRIBE failed - return %d", ret); 1184 http_put_empty(buf, ret); 1185 http_request_send_and_deinit(req, buf); 1186 os_free(callback_urls); 1187 } 1188 1189 1190 /* Given that we have received a header w/ UNSUBSCRIBE, act upon it 1191 * 1192 * Format of UNSUBSCRIBE (case-insensitive): 1193 * 1194 * First line must be: 1195 * UNSUBSCRIBE /wps_event HTTP/1.1 1196 * 1197 * Our response (if no error) which includes only required lines is: 1198 * HTTP/1.1 200 OK 1199 * Content-Length: 0 1200 * 1201 * Header lines must end with \r\n 1202 * Per RFC 2616, content-length: is not required but connection:close 1203 * would appear to be required (given that we will be closing it!). 1204 */ 1205 static void web_connection_parse_unsubscribe(struct upnp_wps_device_sm *sm, 1206 struct http_request *req, 1207 const char *filename) 1208 { 1209 struct wpabuf *buf; 1210 char *hdr = http_request_get_hdr(req); 1211 char *h; 1212 char *match; 1213 int match_len; 1214 char *end; 1215 u8 uuid[UUID_LEN]; 1216 int got_uuid = 0; 1217 struct subscription *s = NULL; 1218 enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR; 1219 1220 /* Parse/validate headers */ 1221 h = hdr; 1222 /* First line: UNSUBSCRIBE /wps_event HTTP/1.1 1223 * has already been parsed. 1224 */ 1225 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) { 1226 ret = HTTP_PRECONDITION_FAILED; 1227 goto send_msg; 1228 } 1229 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP UNSUBSCRIBE for event"); 1230 end = os_strchr(h, '\n'); 1231 1232 while (end) { 1233 /* Option line by option line */ 1234 h = end + 1; 1235 end = os_strchr(h, '\n'); 1236 if (end == NULL) 1237 break; /* no unterminated lines allowed */ 1238 1239 /* HOST should refer to us */ 1240 #if 0 1241 match = "HOST:"; 1242 match_len = os_strlen(match); 1243 if (os_strncasecmp(h, match, match_len) == 0) { 1244 h += match_len; 1245 while (*h == ' ' || *h == '\t') 1246 h++; 1247 ..... 1248 } 1249 #endif 1250 match = "SID:"; 1251 match_len = os_strlen(match); 1252 if (os_strncasecmp(h, match, match_len) == 0) { 1253 h += match_len; 1254 while (*h == ' ' || *h == '\t') 1255 h++; 1256 match = "uuid:"; 1257 match_len = os_strlen(match); 1258 if (os_strncasecmp(h, match, match_len) != 0) { 1259 ret = HTTP_BAD_REQUEST; 1260 goto send_msg; 1261 } 1262 h += match_len; 1263 while (*h == ' ' || *h == '\t') 1264 h++; 1265 if (uuid_str2bin(h, uuid)) { 1266 ret = HTTP_BAD_REQUEST; 1267 goto send_msg; 1268 } 1269 got_uuid = 1; 1270 continue; 1271 } 1272 1273 match = "NT:"; 1274 match_len = os_strlen(match); 1275 if (os_strncasecmp(h, match, match_len) == 0) { 1276 ret = HTTP_BAD_REQUEST; 1277 goto send_msg; 1278 } 1279 1280 match = "CALLBACK:"; 1281 match_len = os_strlen(match); 1282 if (os_strncasecmp(h, match, match_len) == 0) { 1283 ret = HTTP_BAD_REQUEST; 1284 goto send_msg; 1285 } 1286 } 1287 1288 if (got_uuid) { 1289 char str[80]; 1290 1291 uuid_bin2str(uuid, str, sizeof(str)); 1292 1293 s = subscription_find(sm, uuid); 1294 if (s) { 1295 struct subscr_addr *sa; 1296 sa = dl_list_first(&s->addr_list, struct subscr_addr, 1297 list); 1298 wpa_printf(MSG_DEBUG, 1299 "WPS UPnP: Unsubscribing %p (SID %s) %s", 1300 s, str, (sa && sa->domain_and_port) ? 1301 sa->domain_and_port : "-null-"); 1302 dl_list_del(&s->list); 1303 subscription_destroy(s); 1304 } else { 1305 wpa_printf(MSG_INFO, 1306 "WPS UPnP: Could not find matching subscription to unsubscribe (SID %s)", 1307 str); 1308 ret = HTTP_PRECONDITION_FAILED; 1309 goto send_msg; 1310 } 1311 } else { 1312 wpa_printf(MSG_INFO, "WPS UPnP: Unsubscribe fails (not " 1313 "found)"); 1314 ret = HTTP_PRECONDITION_FAILED; 1315 goto send_msg; 1316 } 1317 1318 ret = HTTP_OK; 1319 1320 send_msg: 1321 buf = wpabuf_alloc(200); 1322 if (buf == NULL) { 1323 http_request_deinit(req); 1324 return; 1325 } 1326 http_put_empty(buf, ret); 1327 http_request_send_and_deinit(req, buf); 1328 } 1329 1330 1331 /* Send error in response to unknown requests */ 1332 static void web_connection_unimplemented(struct http_request *req) 1333 { 1334 struct wpabuf *buf; 1335 buf = wpabuf_alloc(200); 1336 if (buf == NULL) { 1337 http_request_deinit(req); 1338 return; 1339 } 1340 http_put_empty(buf, HTTP_UNIMPLEMENTED); 1341 http_request_send_and_deinit(req, buf); 1342 } 1343 1344 1345 1346 /* Called when we have gotten an apparently valid http request. 1347 */ 1348 static void web_connection_check_data(void *ctx, struct http_request *req) 1349 { 1350 struct upnp_wps_device_sm *sm = ctx; 1351 enum httpread_hdr_type htype = http_request_get_type(req); 1352 char *filename = http_request_get_uri(req); 1353 struct sockaddr_in *cli = http_request_get_cli_addr(req); 1354 1355 if (!filename) { 1356 wpa_printf(MSG_INFO, "WPS UPnP: Could not get HTTP URI"); 1357 http_request_deinit(req); 1358 return; 1359 } 1360 /* Trim leading slashes from filename */ 1361 while (*filename == '/') 1362 filename++; 1363 1364 wpa_printf(MSG_DEBUG, "WPS UPnP: Got HTTP request type %d from %s:%d", 1365 htype, inet_ntoa(cli->sin_addr), htons(cli->sin_port)); 1366 1367 switch (htype) { 1368 case HTTPREAD_HDR_TYPE_GET: 1369 web_connection_parse_get(sm, req, filename); 1370 break; 1371 case HTTPREAD_HDR_TYPE_POST: 1372 web_connection_parse_post(sm, cli, req, filename); 1373 break; 1374 case HTTPREAD_HDR_TYPE_SUBSCRIBE: 1375 web_connection_parse_subscribe(sm, req, filename); 1376 break; 1377 case HTTPREAD_HDR_TYPE_UNSUBSCRIBE: 1378 web_connection_parse_unsubscribe(sm, req, filename); 1379 break; 1380 1381 /* We are not required to support M-POST; just plain 1382 * POST is supposed to work, so we only support that. 1383 * If for some reason we need to support M-POST, it is 1384 * mostly the same as POST, with small differences. 1385 */ 1386 default: 1387 /* Send 501 for anything else */ 1388 web_connection_unimplemented(req); 1389 break; 1390 } 1391 } 1392 1393 1394 /* 1395 * Listening for web connections 1396 * We have a single TCP listening port, and hand off connections as we get 1397 * them. 1398 */ 1399 1400 void web_listener_stop(struct upnp_wps_device_sm *sm) 1401 { 1402 http_server_deinit(sm->web_srv); 1403 sm->web_srv = NULL; 1404 } 1405 1406 1407 int web_listener_start(struct upnp_wps_device_sm *sm) 1408 { 1409 struct in_addr addr; 1410 addr.s_addr = sm->ip_addr; 1411 sm->web_srv = http_server_init(&addr, -1, web_connection_check_data, 1412 sm); 1413 if (sm->web_srv == NULL) { 1414 web_listener_stop(sm); 1415 return -1; 1416 } 1417 sm->web_port = http_server_get_port(sm->web_srv); 1418 1419 return 0; 1420 } 1421