wps_upnp_web.c 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350
  1. /*
  2. * UPnP WPS Device - Web connections
  3. * Copyright (c) 2000-2003 Intel Corporation
  4. * Copyright (c) 2006-2007 Sony Corporation
  5. * Copyright (c) 2008-2009 Atheros Communications
  6. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  7. *
  8. * See wps_upnp.c for more details on licensing and code history.
  9. */
  10. #include "includes.h"
  11. #include "common.h"
  12. #include "base64.h"
  13. #include "uuid.h"
  14. #include "httpread.h"
  15. #include "http_server.h"
  16. #include "wps_i.h"
  17. #include "wps_upnp.h"
  18. #include "wps_upnp_i.h"
  19. #include "upnp_xml.h"
  20. /***************************************************************************
  21. * Web connections (we serve pages of info about ourselves, handle
  22. * requests, etc. etc.).
  23. **************************************************************************/
  24. #define WEB_CONNECTION_TIMEOUT_SEC 30 /* Drop web connection after t.o. */
  25. #define WEB_CONNECTION_MAX_READ 8000 /* Max we'll read for TCP request */
  26. #define MAX_WEB_CONNECTIONS 10 /* max simultaneous web connects */
  27. static const char *urn_wfawlanconfig =
  28. "urn:schemas-wifialliance-org:service:WFAWLANConfig:1";
  29. static const char *http_server_hdr =
  30. "Server: unspecified, UPnP/1.0, unspecified\r\n";
  31. static const char *http_connection_close =
  32. "Connection: close\r\n";
  33. /*
  34. * "Files" that we serve via HTTP. The format of these files is given by
  35. * WFA WPS specifications. Extra white space has been removed to save space.
  36. */
  37. static const char wps_scpd_xml[] =
  38. "<?xml version=\"1.0\"?>\n"
  39. "<scpd xmlns=\"urn:schemas-upnp-org:service-1-0\">\n"
  40. "<specVersion><major>1</major><minor>0</minor></specVersion>\n"
  41. "<actionList>\n"
  42. "<action>\n"
  43. "<name>GetDeviceInfo</name>\n"
  44. "<argumentList>\n"
  45. "<argument>\n"
  46. "<name>NewDeviceInfo</name>\n"
  47. "<direction>out</direction>\n"
  48. "<relatedStateVariable>DeviceInfo</relatedStateVariable>\n"
  49. "</argument>\n"
  50. "</argumentList>\n"
  51. "</action>\n"
  52. "<action>\n"
  53. "<name>PutMessage</name>\n"
  54. "<argumentList>\n"
  55. "<argument>\n"
  56. "<name>NewInMessage</name>\n"
  57. "<direction>in</direction>\n"
  58. "<relatedStateVariable>InMessage</relatedStateVariable>\n"
  59. "</argument>\n"
  60. "<argument>\n"
  61. "<name>NewOutMessage</name>\n"
  62. "<direction>out</direction>\n"
  63. "<relatedStateVariable>OutMessage</relatedStateVariable>\n"
  64. "</argument>\n"
  65. "</argumentList>\n"
  66. "</action>\n"
  67. "<action>\n"
  68. "<name>PutWLANResponse</name>\n"
  69. "<argumentList>\n"
  70. "<argument>\n"
  71. "<name>NewMessage</name>\n"
  72. "<direction>in</direction>\n"
  73. "<relatedStateVariable>Message</relatedStateVariable>\n"
  74. "</argument>\n"
  75. "<argument>\n"
  76. "<name>NewWLANEventType</name>\n"
  77. "<direction>in</direction>\n"
  78. "<relatedStateVariable>WLANEventType</relatedStateVariable>\n"
  79. "</argument>\n"
  80. "<argument>\n"
  81. "<name>NewWLANEventMAC</name>\n"
  82. "<direction>in</direction>\n"
  83. "<relatedStateVariable>WLANEventMAC</relatedStateVariable>\n"
  84. "</argument>\n"
  85. "</argumentList>\n"
  86. "</action>\n"
  87. "<action>\n"
  88. "<name>SetSelectedRegistrar</name>\n"
  89. "<argumentList>\n"
  90. "<argument>\n"
  91. "<name>NewMessage</name>\n"
  92. "<direction>in</direction>\n"
  93. "<relatedStateVariable>Message</relatedStateVariable>\n"
  94. "</argument>\n"
  95. "</argumentList>\n"
  96. "</action>\n"
  97. "</actionList>\n"
  98. "<serviceStateTable>\n"
  99. "<stateVariable sendEvents=\"no\">\n"
  100. "<name>Message</name>\n"
  101. "<dataType>bin.base64</dataType>\n"
  102. "</stateVariable>\n"
  103. "<stateVariable sendEvents=\"no\">\n"
  104. "<name>InMessage</name>\n"
  105. "<dataType>bin.base64</dataType>\n"
  106. "</stateVariable>\n"
  107. "<stateVariable sendEvents=\"no\">\n"
  108. "<name>OutMessage</name>\n"
  109. "<dataType>bin.base64</dataType>\n"
  110. "</stateVariable>\n"
  111. "<stateVariable sendEvents=\"no\">\n"
  112. "<name>DeviceInfo</name>\n"
  113. "<dataType>bin.base64</dataType>\n"
  114. "</stateVariable>\n"
  115. "<stateVariable sendEvents=\"yes\">\n"
  116. "<name>APStatus</name>\n"
  117. "<dataType>ui1</dataType>\n"
  118. "</stateVariable>\n"
  119. "<stateVariable sendEvents=\"yes\">\n"
  120. "<name>STAStatus</name>\n"
  121. "<dataType>ui1</dataType>\n"
  122. "</stateVariable>\n"
  123. "<stateVariable sendEvents=\"yes\">\n"
  124. "<name>WLANEvent</name>\n"
  125. "<dataType>bin.base64</dataType>\n"
  126. "</stateVariable>\n"
  127. "<stateVariable sendEvents=\"no\">\n"
  128. "<name>WLANEventType</name>\n"
  129. "<dataType>ui1</dataType>\n"
  130. "</stateVariable>\n"
  131. "<stateVariable sendEvents=\"no\">\n"
  132. "<name>WLANEventMAC</name>\n"
  133. "<dataType>string</dataType>\n"
  134. "</stateVariable>\n"
  135. "<stateVariable sendEvents=\"no\">\n"
  136. "<name>WLANResponse</name>\n"
  137. "<dataType>bin.base64</dataType>\n"
  138. "</stateVariable>\n"
  139. "</serviceStateTable>\n"
  140. "</scpd>\n"
  141. ;
  142. static const char *wps_device_xml_prefix =
  143. "<?xml version=\"1.0\"?>\n"
  144. "<root xmlns=\"urn:schemas-upnp-org:device-1-0\">\n"
  145. "<specVersion>\n"
  146. "<major>1</major>\n"
  147. "<minor>0</minor>\n"
  148. "</specVersion>\n"
  149. "<device>\n"
  150. "<deviceType>urn:schemas-wifialliance-org:device:WFADevice:1"
  151. "</deviceType>\n";
  152. static const char *wps_device_xml_postfix =
  153. "<serviceList>\n"
  154. "<service>\n"
  155. "<serviceType>urn:schemas-wifialliance-org:service:WFAWLANConfig:1"
  156. "</serviceType>\n"
  157. "<serviceId>urn:wifialliance-org:serviceId:WFAWLANConfig1</serviceId>"
  158. "\n"
  159. "<SCPDURL>" UPNP_WPS_SCPD_XML_FILE "</SCPDURL>\n"
  160. "<controlURL>" UPNP_WPS_DEVICE_CONTROL_FILE "</controlURL>\n"
  161. "<eventSubURL>" UPNP_WPS_DEVICE_EVENT_FILE "</eventSubURL>\n"
  162. "</service>\n"
  163. "</serviceList>\n"
  164. "</device>\n"
  165. "</root>\n";
  166. /* format_wps_device_xml -- produce content of "file" wps_device.xml
  167. * (UPNP_WPS_DEVICE_XML_FILE)
  168. */
  169. static void format_wps_device_xml(struct upnp_wps_device_interface *iface,
  170. struct upnp_wps_device_sm *sm,
  171. struct wpabuf *buf)
  172. {
  173. const char *s;
  174. char uuid_string[80];
  175. wpabuf_put_str(buf, wps_device_xml_prefix);
  176. /*
  177. * Add required fields with default values if not configured. Add
  178. * optional and recommended fields only if configured.
  179. */
  180. s = iface->wps->friendly_name;
  181. s = ((s && *s) ? s : "WPS Access Point");
  182. xml_add_tagged_data(buf, "friendlyName", s);
  183. s = iface->wps->dev.manufacturer;
  184. s = ((s && *s) ? s : "");
  185. xml_add_tagged_data(buf, "manufacturer", s);
  186. if (iface->wps->manufacturer_url)
  187. xml_add_tagged_data(buf, "manufacturerURL",
  188. iface->wps->manufacturer_url);
  189. if (iface->wps->model_description)
  190. xml_add_tagged_data(buf, "modelDescription",
  191. iface->wps->model_description);
  192. s = iface->wps->dev.model_name;
  193. s = ((s && *s) ? s : "");
  194. xml_add_tagged_data(buf, "modelName", s);
  195. if (iface->wps->dev.model_number)
  196. xml_add_tagged_data(buf, "modelNumber",
  197. iface->wps->dev.model_number);
  198. if (iface->wps->model_url)
  199. xml_add_tagged_data(buf, "modelURL", iface->wps->model_url);
  200. if (iface->wps->dev.serial_number)
  201. xml_add_tagged_data(buf, "serialNumber",
  202. iface->wps->dev.serial_number);
  203. uuid_bin2str(iface->wps->uuid, uuid_string, sizeof(uuid_string));
  204. s = uuid_string;
  205. /* Need "uuid:" prefix, thus we can't use xml_add_tagged_data()
  206. * easily...
  207. */
  208. wpabuf_put_str(buf, "<UDN>uuid:");
  209. xml_data_encode(buf, s, os_strlen(s));
  210. wpabuf_put_str(buf, "</UDN>\n");
  211. if (iface->wps->upc)
  212. xml_add_tagged_data(buf, "UPC", iface->wps->upc);
  213. wpabuf_put_str(buf, wps_device_xml_postfix);
  214. }
  215. static void http_put_reply_code(struct wpabuf *buf, enum http_reply_code code)
  216. {
  217. wpabuf_put_str(buf, "HTTP/1.1 ");
  218. switch (code) {
  219. case HTTP_OK:
  220. wpabuf_put_str(buf, "200 OK\r\n");
  221. break;
  222. case HTTP_BAD_REQUEST:
  223. wpabuf_put_str(buf, "400 Bad request\r\n");
  224. break;
  225. case HTTP_PRECONDITION_FAILED:
  226. wpabuf_put_str(buf, "412 Precondition failed\r\n");
  227. break;
  228. case HTTP_UNIMPLEMENTED:
  229. wpabuf_put_str(buf, "501 Unimplemented\r\n");
  230. break;
  231. case HTTP_INTERNAL_SERVER_ERROR:
  232. default:
  233. wpabuf_put_str(buf, "500 Internal server error\r\n");
  234. break;
  235. }
  236. }
  237. static void http_put_date(struct wpabuf *buf)
  238. {
  239. wpabuf_put_str(buf, "Date: ");
  240. format_date(buf);
  241. wpabuf_put_str(buf, "\r\n");
  242. }
  243. static void http_put_empty(struct wpabuf *buf, enum http_reply_code code)
  244. {
  245. http_put_reply_code(buf, code);
  246. wpabuf_put_str(buf, http_server_hdr);
  247. wpabuf_put_str(buf, http_connection_close);
  248. wpabuf_put_str(buf, "Content-Length: 0\r\n"
  249. "\r\n");
  250. }
  251. /* Given that we have received a header w/ GET, act upon it
  252. *
  253. * Format of GET (case-insensitive):
  254. *
  255. * First line must be:
  256. * GET /<file> HTTP/1.1
  257. * Since we don't do anything fancy we just ignore other lines.
  258. *
  259. * Our response (if no error) which includes only required lines is:
  260. * HTTP/1.1 200 OK
  261. * Connection: close
  262. * Content-Type: text/xml
  263. * Date: <rfc1123-date>
  264. *
  265. * Header lines must end with \r\n
  266. * Per RFC 2616, content-length: is not required but connection:close
  267. * would appear to be required (given that we will be closing it!).
  268. */
  269. static void web_connection_parse_get(struct upnp_wps_device_sm *sm,
  270. struct http_request *hreq, char *filename)
  271. {
  272. struct wpabuf *buf; /* output buffer, allocated */
  273. char *put_length_here;
  274. char *body_start;
  275. enum {
  276. GET_DEVICE_XML_FILE,
  277. GET_SCPD_XML_FILE
  278. } req;
  279. size_t extra_len = 0;
  280. int body_length;
  281. char len_buf[10];
  282. struct upnp_wps_device_interface *iface;
  283. iface = dl_list_first(&sm->interfaces,
  284. struct upnp_wps_device_interface, list);
  285. if (iface == NULL) {
  286. http_request_deinit(hreq);
  287. return;
  288. }
  289. /*
  290. * It is not required that filenames be case insensitive but it is
  291. * allowed and cannot hurt here.
  292. */
  293. if (os_strcasecmp(filename, UPNP_WPS_DEVICE_XML_FILE) == 0) {
  294. wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML");
  295. req = GET_DEVICE_XML_FILE;
  296. extra_len = 3000;
  297. if (iface->wps->friendly_name)
  298. extra_len += os_strlen(iface->wps->friendly_name);
  299. if (iface->wps->manufacturer_url)
  300. extra_len += os_strlen(iface->wps->manufacturer_url);
  301. if (iface->wps->model_description)
  302. extra_len += os_strlen(iface->wps->model_description);
  303. if (iface->wps->model_url)
  304. extra_len += os_strlen(iface->wps->model_url);
  305. if (iface->wps->upc)
  306. extra_len += os_strlen(iface->wps->upc);
  307. } else if (!os_strcasecmp(filename, UPNP_WPS_SCPD_XML_FILE)) {
  308. wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML");
  309. req = GET_SCPD_XML_FILE;
  310. extra_len = os_strlen(wps_scpd_xml);
  311. } else {
  312. /* File not found */
  313. wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s",
  314. filename);
  315. buf = wpabuf_alloc(200);
  316. if (buf == NULL) {
  317. http_request_deinit(hreq);
  318. return;
  319. }
  320. wpabuf_put_str(buf,
  321. "HTTP/1.1 404 Not Found\r\n"
  322. "Connection: close\r\n");
  323. http_put_date(buf);
  324. /* terminating empty line */
  325. wpabuf_put_str(buf, "\r\n");
  326. goto send_buf;
  327. }
  328. buf = wpabuf_alloc(1000 + extra_len);
  329. if (buf == NULL) {
  330. http_request_deinit(hreq);
  331. return;
  332. }
  333. wpabuf_put_str(buf,
  334. "HTTP/1.1 200 OK\r\n"
  335. "Content-Type: text/xml; charset=\"utf-8\"\r\n");
  336. wpabuf_put_str(buf, "Server: Unspecified, UPnP/1.0, Unspecified\r\n");
  337. wpabuf_put_str(buf, "Connection: close\r\n");
  338. wpabuf_put_str(buf, "Content-Length: ");
  339. /*
  340. * We will paste the length in later, leaving some extra whitespace.
  341. * HTTP code is supposed to be tolerant of extra whitespace.
  342. */
  343. put_length_here = wpabuf_put(buf, 0);
  344. wpabuf_put_str(buf, " \r\n");
  345. http_put_date(buf);
  346. /* terminating empty line */
  347. wpabuf_put_str(buf, "\r\n");
  348. body_start = wpabuf_put(buf, 0);
  349. switch (req) {
  350. case GET_DEVICE_XML_FILE:
  351. format_wps_device_xml(iface, sm, buf);
  352. break;
  353. case GET_SCPD_XML_FILE:
  354. wpabuf_put_str(buf, wps_scpd_xml);
  355. break;
  356. }
  357. /* Now patch in the content length at the end */
  358. body_length = (char *) wpabuf_put(buf, 0) - body_start;
  359. os_snprintf(len_buf, 10, "%d", body_length);
  360. os_memcpy(put_length_here, len_buf, os_strlen(len_buf));
  361. send_buf:
  362. http_request_send_and_deinit(hreq, buf);
  363. }
  364. static enum http_reply_code
  365. web_process_get_device_info(struct upnp_wps_device_sm *sm,
  366. struct wpabuf **reply, const char **replyname)
  367. {
  368. static const char *name = "NewDeviceInfo";
  369. struct wps_config cfg;
  370. struct upnp_wps_device_interface *iface;
  371. struct upnp_wps_peer *peer;
  372. iface = dl_list_first(&sm->interfaces,
  373. struct upnp_wps_device_interface, list);
  374. wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo");
  375. if (!iface || iface->ctx->ap_pin == NULL)
  376. return HTTP_INTERNAL_SERVER_ERROR;
  377. peer = &iface->peer;
  378. /*
  379. * Request for DeviceInfo, i.e., M1 TLVs. This is a start of WPS
  380. * registration over UPnP with the AP acting as an Enrollee. It should
  381. * be noted that this is frequently used just to get the device data,
  382. * i.e., there may not be any intent to actually complete the
  383. * registration.
  384. */
  385. if (peer->wps)
  386. wps_deinit(peer->wps);
  387. os_memset(&cfg, 0, sizeof(cfg));
  388. cfg.wps = iface->wps;
  389. cfg.pin = (u8 *) iface->ctx->ap_pin;
  390. cfg.pin_len = os_strlen(iface->ctx->ap_pin);
  391. peer->wps = wps_init(&cfg);
  392. if (peer->wps) {
  393. enum wsc_op_code op_code;
  394. *reply = wps_get_msg(peer->wps, &op_code);
  395. if (*reply == NULL) {
  396. wps_deinit(peer->wps);
  397. peer->wps = NULL;
  398. }
  399. } else
  400. *reply = NULL;
  401. if (*reply == NULL) {
  402. wpa_printf(MSG_INFO, "WPS UPnP: Failed to get DeviceInfo");
  403. return HTTP_INTERNAL_SERVER_ERROR;
  404. }
  405. *replyname = name;
  406. return HTTP_OK;
  407. }
  408. static enum http_reply_code
  409. web_process_put_message(struct upnp_wps_device_sm *sm, char *data,
  410. struct wpabuf **reply, const char **replyname)
  411. {
  412. struct wpabuf *msg;
  413. static const char *name = "NewOutMessage";
  414. enum http_reply_code ret;
  415. enum wps_process_res res;
  416. enum wsc_op_code op_code;
  417. struct upnp_wps_device_interface *iface;
  418. iface = dl_list_first(&sm->interfaces,
  419. struct upnp_wps_device_interface, list);
  420. if (!iface)
  421. return HTTP_INTERNAL_SERVER_ERROR;
  422. /*
  423. * PutMessage is used by external UPnP-based Registrar to perform WPS
  424. * operation with the access point itself; as compared with
  425. * PutWLANResponse which is for proxying.
  426. */
  427. wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage");
  428. msg = xml_get_base64_item(data, "NewInMessage", &ret);
  429. if (msg == NULL)
  430. return ret;
  431. res = wps_process_msg(iface->peer.wps, WSC_UPnP, msg);
  432. if (res == WPS_FAILURE)
  433. *reply = NULL;
  434. else
  435. *reply = wps_get_msg(iface->peer.wps, &op_code);
  436. wpabuf_free(msg);
  437. if (*reply == NULL)
  438. return HTTP_INTERNAL_SERVER_ERROR;
  439. *replyname = name;
  440. return HTTP_OK;
  441. }
  442. static enum http_reply_code
  443. web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data,
  444. struct wpabuf **reply, const char **replyname)
  445. {
  446. struct wpabuf *msg;
  447. enum http_reply_code ret;
  448. u8 macaddr[ETH_ALEN];
  449. int ev_type;
  450. int type;
  451. char *val;
  452. struct upnp_wps_device_interface *iface;
  453. int ok = 0;
  454. /*
  455. * External UPnP-based Registrar is passing us a message to be proxied
  456. * over to a Wi-Fi -based client of ours.
  457. */
  458. wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse");
  459. msg = xml_get_base64_item(data, "NewMessage", &ret);
  460. if (msg == NULL) {
  461. wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage "
  462. "from PutWLANResponse");
  463. return ret;
  464. }
  465. val = xml_get_first_item(data, "NewWLANEventType");
  466. if (val == NULL) {
  467. wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in "
  468. "PutWLANResponse");
  469. wpabuf_free(msg);
  470. return UPNP_ARG_VALUE_INVALID;
  471. }
  472. ev_type = atol(val);
  473. os_free(val);
  474. val = xml_get_first_item(data, "NewWLANEventMAC");
  475. if (val == NULL) {
  476. wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in "
  477. "PutWLANResponse");
  478. wpabuf_free(msg);
  479. return UPNP_ARG_VALUE_INVALID;
  480. }
  481. if (hwaddr_aton(val, macaddr)) {
  482. wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid NewWLANEventMAC in "
  483. "PutWLANResponse: '%s'", val);
  484. #ifdef CONFIG_WPS_STRICT
  485. {
  486. struct wps_parse_attr attr;
  487. if (wps_parse_msg(msg, &attr) < 0 || attr.version2) {
  488. wpabuf_free(msg);
  489. os_free(val);
  490. return UPNP_ARG_VALUE_INVALID;
  491. }
  492. }
  493. #endif /* CONFIG_WPS_STRICT */
  494. if (hwaddr_aton2(val, macaddr) > 0) {
  495. /*
  496. * At least some versions of Intel PROset seem to be
  497. * using dot-deliminated MAC address format here.
  498. */
  499. wpa_printf(MSG_DEBUG, "WPS UPnP: Workaround - allow "
  500. "incorrect MAC address format in "
  501. "NewWLANEventMAC: %s -> " MACSTR,
  502. val, MAC2STR(macaddr));
  503. } else {
  504. wpabuf_free(msg);
  505. os_free(val);
  506. return UPNP_ARG_VALUE_INVALID;
  507. }
  508. }
  509. os_free(val);
  510. if (ev_type == UPNP_WPS_WLANEVENT_TYPE_EAP) {
  511. struct wps_parse_attr attr;
  512. if (wps_parse_msg(msg, &attr) < 0 ||
  513. attr.msg_type == NULL)
  514. type = -1;
  515. else
  516. type = *attr.msg_type;
  517. wpa_printf(MSG_DEBUG, "WPS UPnP: Message Type %d", type);
  518. } else
  519. type = -1;
  520. dl_list_for_each(iface, &sm->interfaces,
  521. struct upnp_wps_device_interface, list) {
  522. if (iface->ctx->rx_req_put_wlan_response &&
  523. iface->ctx->rx_req_put_wlan_response(iface->priv, ev_type,
  524. macaddr, msg, type)
  525. == 0)
  526. ok = 1;
  527. }
  528. if (!ok) {
  529. wpa_printf(MSG_INFO, "WPS UPnP: Fail: sm->ctx->"
  530. "rx_req_put_wlan_response");
  531. wpabuf_free(msg);
  532. return HTTP_INTERNAL_SERVER_ERROR;
  533. }
  534. wpabuf_free(msg);
  535. *replyname = NULL;
  536. *reply = NULL;
  537. return HTTP_OK;
  538. }
  539. static int find_er_addr(struct subscription *s, struct sockaddr_in *cli)
  540. {
  541. struct subscr_addr *a;
  542. dl_list_for_each(a, &s->addr_list, struct subscr_addr, list) {
  543. if (cli->sin_addr.s_addr == a->saddr.sin_addr.s_addr)
  544. return 1;
  545. }
  546. return 0;
  547. }
  548. static struct subscription * find_er(struct upnp_wps_device_sm *sm,
  549. struct sockaddr_in *cli)
  550. {
  551. struct subscription *s;
  552. dl_list_for_each(s, &sm->subscriptions, struct subscription, list)
  553. if (find_er_addr(s, cli))
  554. return s;
  555. return NULL;
  556. }
  557. static enum http_reply_code
  558. web_process_set_selected_registrar(struct upnp_wps_device_sm *sm,
  559. struct sockaddr_in *cli, char *data,
  560. struct wpabuf **reply,
  561. const char **replyname)
  562. {
  563. struct wpabuf *msg;
  564. enum http_reply_code ret;
  565. struct subscription *s;
  566. struct upnp_wps_device_interface *iface;
  567. int err = 0;
  568. wpa_printf(MSG_DEBUG, "WPS UPnP: SetSelectedRegistrar");
  569. s = find_er(sm, cli);
  570. if (s == NULL) {
  571. wpa_printf(MSG_DEBUG, "WPS UPnP: Ignore SetSelectedRegistrar "
  572. "from unknown ER");
  573. return UPNP_ACTION_FAILED;
  574. }
  575. msg = xml_get_base64_item(data, "NewMessage", &ret);
  576. if (msg == NULL)
  577. return ret;
  578. dl_list_for_each(iface, &sm->interfaces,
  579. struct upnp_wps_device_interface, list) {
  580. if (upnp_er_set_selected_registrar(iface->wps->registrar, s,
  581. msg))
  582. err = 1;
  583. }
  584. wpabuf_free(msg);
  585. if (err)
  586. return HTTP_INTERNAL_SERVER_ERROR;
  587. *replyname = NULL;
  588. *reply = NULL;
  589. return HTTP_OK;
  590. }
  591. static const char *soap_prefix =
  592. "<?xml version=\"1.0\"?>\n"
  593. "<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" "
  594. "s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">\n"
  595. "<s:Body>\n";
  596. static const char *soap_postfix =
  597. "</s:Body>\n</s:Envelope>\n";
  598. static const char *soap_error_prefix =
  599. "<s:Fault>\n"
  600. "<faultcode>s:Client</faultcode>\n"
  601. "<faultstring>UPnPError</faultstring>\n"
  602. "<detail>\n"
  603. "<UPnPError xmlns=\"urn:schemas-upnp-org:control-1-0\">\n";
  604. static const char *soap_error_postfix =
  605. "<errorDescription>Error</errorDescription>\n"
  606. "</UPnPError>\n"
  607. "</detail>\n"
  608. "</s:Fault>\n";
  609. static void web_connection_send_reply(struct http_request *req,
  610. enum http_reply_code ret,
  611. const char *action, int action_len,
  612. const struct wpabuf *reply,
  613. const char *replyname)
  614. {
  615. struct wpabuf *buf;
  616. char *replydata;
  617. char *put_length_here = NULL;
  618. char *body_start = NULL;
  619. if (reply) {
  620. size_t len;
  621. replydata = (char *) base64_encode(wpabuf_head(reply),
  622. wpabuf_len(reply), &len);
  623. } else
  624. replydata = NULL;
  625. /* Parameters of the response:
  626. * action(action_len) -- action we are responding to
  627. * replyname -- a name we need for the reply
  628. * replydata -- NULL or null-terminated string
  629. */
  630. buf = wpabuf_alloc(1000 + (replydata ? os_strlen(replydata) : 0U) +
  631. (action_len > 0 ? action_len * 2 : 0));
  632. if (buf == NULL) {
  633. wpa_printf(MSG_INFO, "WPS UPnP: Cannot allocate reply to "
  634. "POST");
  635. os_free(replydata);
  636. http_request_deinit(req);
  637. return;
  638. }
  639. /*
  640. * Assuming we will be successful, put in the output header first.
  641. * Note: we do not keep connections alive (and httpread does
  642. * not support it)... therefore we must have Connection: close.
  643. */
  644. if (ret == HTTP_OK) {
  645. wpabuf_put_str(buf,
  646. "HTTP/1.1 200 OK\r\n"
  647. "Content-Type: text/xml; "
  648. "charset=\"utf-8\"\r\n");
  649. } else {
  650. wpabuf_printf(buf, "HTTP/1.1 %d Error\r\n", ret);
  651. }
  652. wpabuf_put_str(buf, http_connection_close);
  653. wpabuf_put_str(buf, "Content-Length: ");
  654. /*
  655. * We will paste the length in later, leaving some extra whitespace.
  656. * HTTP code is supposed to be tolerant of extra whitespace.
  657. */
  658. put_length_here = wpabuf_put(buf, 0);
  659. wpabuf_put_str(buf, " \r\n");
  660. http_put_date(buf);
  661. /* terminating empty line */
  662. wpabuf_put_str(buf, "\r\n");
  663. body_start = wpabuf_put(buf, 0);
  664. if (ret == HTTP_OK) {
  665. wpabuf_put_str(buf, soap_prefix);
  666. wpabuf_put_str(buf, "<u:");
  667. wpabuf_put_data(buf, action, action_len);
  668. wpabuf_put_str(buf, "Response xmlns:u=\"");
  669. wpabuf_put_str(buf, urn_wfawlanconfig);
  670. wpabuf_put_str(buf, "\">\n");
  671. if (replydata && replyname) {
  672. /* TODO: might possibly need to escape part of reply
  673. * data? ...
  674. * probably not, unlikely to have ampersand(&) or left
  675. * angle bracket (<) in it...
  676. */
  677. wpabuf_printf(buf, "<%s>", replyname);
  678. wpabuf_put_str(buf, replydata);
  679. wpabuf_printf(buf, "</%s>\n", replyname);
  680. }
  681. wpabuf_put_str(buf, "</u:");
  682. wpabuf_put_data(buf, action, action_len);
  683. wpabuf_put_str(buf, "Response>\n");
  684. wpabuf_put_str(buf, soap_postfix);
  685. } else {
  686. /* Error case */
  687. wpabuf_put_str(buf, soap_prefix);
  688. wpabuf_put_str(buf, soap_error_prefix);
  689. wpabuf_printf(buf, "<errorCode>%d</errorCode>\n", ret);
  690. wpabuf_put_str(buf, soap_error_postfix);
  691. wpabuf_put_str(buf, soap_postfix);
  692. }
  693. os_free(replydata);
  694. /* Now patch in the content length at the end */
  695. if (body_start && put_length_here) {
  696. int body_length = (char *) wpabuf_put(buf, 0) - body_start;
  697. char len_buf[10];
  698. os_snprintf(len_buf, sizeof(len_buf), "%d", body_length);
  699. os_memcpy(put_length_here, len_buf, os_strlen(len_buf));
  700. }
  701. http_request_send_and_deinit(req, buf);
  702. }
  703. static const char * web_get_action(struct http_request *req,
  704. size_t *action_len)
  705. {
  706. const char *match;
  707. int match_len;
  708. char *b;
  709. char *action;
  710. *action_len = 0;
  711. /* The SOAPAction line of the header tells us what we want to do */
  712. b = http_request_get_hdr_line(req, "SOAPAction:");
  713. if (b == NULL)
  714. return NULL;
  715. if (*b == '"')
  716. b++;
  717. else
  718. return NULL;
  719. match = urn_wfawlanconfig;
  720. match_len = os_strlen(urn_wfawlanconfig) - 1;
  721. if (os_strncasecmp(b, match, match_len))
  722. return NULL;
  723. b += match_len;
  724. /* skip over version */
  725. while (isgraph(*b) && *b != '#')
  726. b++;
  727. if (*b != '#')
  728. return NULL;
  729. b++;
  730. /* Following the sharp(#) should be the action and a double quote */
  731. action = b;
  732. while (isgraph(*b) && *b != '"')
  733. b++;
  734. if (*b != '"')
  735. return NULL;
  736. *action_len = b - action;
  737. return action;
  738. }
  739. /* Given that we have received a header w/ POST, act upon it
  740. *
  741. * Format of POST (case-insensitive):
  742. *
  743. * First line must be:
  744. * POST /<file> HTTP/1.1
  745. * Since we don't do anything fancy we just ignore other lines.
  746. *
  747. * Our response (if no error) which includes only required lines is:
  748. * HTTP/1.1 200 OK
  749. * Connection: close
  750. * Content-Type: text/xml
  751. * Date: <rfc1123-date>
  752. *
  753. * Header lines must end with \r\n
  754. * Per RFC 2616, content-length: is not required but connection:close
  755. * would appear to be required (given that we will be closing it!).
  756. */
  757. static void web_connection_parse_post(struct upnp_wps_device_sm *sm,
  758. struct sockaddr_in *cli,
  759. struct http_request *req,
  760. const char *filename)
  761. {
  762. enum http_reply_code ret;
  763. char *data = http_request_get_data(req); /* body of http msg */
  764. const char *action = NULL;
  765. size_t action_len = 0;
  766. const char *replyname = NULL; /* argument name for the reply */
  767. struct wpabuf *reply = NULL; /* data for the reply */
  768. if (os_strcasecmp(filename, UPNP_WPS_DEVICE_CONTROL_FILE)) {
  769. wpa_printf(MSG_INFO, "WPS UPnP: Invalid POST filename %s",
  770. filename);
  771. ret = HTTP_NOT_FOUND;
  772. goto bad;
  773. }
  774. ret = UPNP_INVALID_ACTION;
  775. action = web_get_action(req, &action_len);
  776. if (action == NULL)
  777. goto bad;
  778. if (!os_strncasecmp("GetDeviceInfo", action, action_len))
  779. ret = web_process_get_device_info(sm, &reply, &replyname);
  780. else if (!os_strncasecmp("PutMessage", action, action_len))
  781. ret = web_process_put_message(sm, data, &reply, &replyname);
  782. else if (!os_strncasecmp("PutWLANResponse", action, action_len))
  783. ret = web_process_put_wlan_response(sm, data, &reply,
  784. &replyname);
  785. else if (!os_strncasecmp("SetSelectedRegistrar", action, action_len))
  786. ret = web_process_set_selected_registrar(sm, cli, data, &reply,
  787. &replyname);
  788. else
  789. wpa_printf(MSG_INFO, "WPS UPnP: Unknown POST type");
  790. bad:
  791. if (ret != HTTP_OK)
  792. wpa_printf(MSG_INFO, "WPS UPnP: POST failure ret=%d", ret);
  793. web_connection_send_reply(req, ret, action, action_len, reply,
  794. replyname);
  795. wpabuf_free(reply);
  796. }
  797. /* Given that we have received a header w/ SUBSCRIBE, act upon it
  798. *
  799. * Format of SUBSCRIBE (case-insensitive):
  800. *
  801. * First line must be:
  802. * SUBSCRIBE /wps_event HTTP/1.1
  803. *
  804. * Our response (if no error) which includes only required lines is:
  805. * HTTP/1.1 200 OK
  806. * Server: xx, UPnP/1.0, xx
  807. * SID: uuid:xxxxxxxxx
  808. * Timeout: Second-<n>
  809. * Content-Length: 0
  810. * Date: xxxx
  811. *
  812. * Header lines must end with \r\n
  813. * Per RFC 2616, content-length: is not required but connection:close
  814. * would appear to be required (given that we will be closing it!).
  815. */
  816. static void web_connection_parse_subscribe(struct upnp_wps_device_sm *sm,
  817. struct http_request *req,
  818. const char *filename)
  819. {
  820. struct wpabuf *buf;
  821. char *b;
  822. char *hdr = http_request_get_hdr(req);
  823. char *h;
  824. char *match;
  825. int match_len;
  826. char *end;
  827. int len;
  828. int got_nt = 0;
  829. u8 uuid[UUID_LEN];
  830. int got_uuid = 0;
  831. char *callback_urls = NULL;
  832. struct subscription *s = NULL;
  833. enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR;
  834. buf = wpabuf_alloc(1000);
  835. if (buf == NULL) {
  836. http_request_deinit(req);
  837. return;
  838. }
  839. wpa_hexdump_ascii(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE",
  840. (u8 *) hdr, os_strlen(hdr));
  841. /* Parse/validate headers */
  842. h = hdr;
  843. /* First line: SUBSCRIBE /wps_event HTTP/1.1
  844. * has already been parsed.
  845. */
  846. if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) {
  847. ret = HTTP_PRECONDITION_FAILED;
  848. goto error;
  849. }
  850. wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE for event");
  851. end = os_strchr(h, '\n');
  852. while (end) {
  853. /* Option line by option line */
  854. h = end + 1;
  855. end = os_strchr(h, '\n');
  856. if (end == NULL)
  857. break; /* no unterminated lines allowed */
  858. /* NT assures that it is our type of subscription;
  859. * not used for a renewal.
  860. **/
  861. match = "NT:";
  862. match_len = os_strlen(match);
  863. if (os_strncasecmp(h, match, match_len) == 0) {
  864. h += match_len;
  865. while (*h == ' ' || *h == '\t')
  866. h++;
  867. match = "upnp:event";
  868. match_len = os_strlen(match);
  869. if (os_strncasecmp(h, match, match_len) != 0) {
  870. ret = HTTP_BAD_REQUEST;
  871. goto error;
  872. }
  873. got_nt = 1;
  874. continue;
  875. }
  876. /* HOST should refer to us */
  877. #if 0
  878. match = "HOST:";
  879. match_len = os_strlen(match);
  880. if (os_strncasecmp(h, match, match_len) == 0) {
  881. h += match_len;
  882. while (*h == ' ' || *h == '\t')
  883. h++;
  884. .....
  885. }
  886. #endif
  887. /* CALLBACK gives one or more URLs for NOTIFYs
  888. * to be sent as a result of the subscription.
  889. * Each URL is enclosed in angle brackets.
  890. */
  891. match = "CALLBACK:";
  892. match_len = os_strlen(match);
  893. if (os_strncasecmp(h, match, match_len) == 0) {
  894. h += match_len;
  895. while (*h == ' ' || *h == '\t')
  896. h++;
  897. len = end - h;
  898. os_free(callback_urls);
  899. callback_urls = dup_binstr(h, len);
  900. if (callback_urls == NULL) {
  901. ret = HTTP_INTERNAL_SERVER_ERROR;
  902. goto error;
  903. }
  904. if (len > 0 && callback_urls[len - 1] == '\r')
  905. callback_urls[len - 1] = '\0';
  906. continue;
  907. }
  908. /* SID is only for renewal */
  909. match = "SID:";
  910. match_len = os_strlen(match);
  911. if (os_strncasecmp(h, match, match_len) == 0) {
  912. h += match_len;
  913. while (*h == ' ' || *h == '\t')
  914. h++;
  915. match = "uuid:";
  916. match_len = os_strlen(match);
  917. if (os_strncasecmp(h, match, match_len) != 0) {
  918. ret = HTTP_BAD_REQUEST;
  919. goto error;
  920. }
  921. h += match_len;
  922. while (*h == ' ' || *h == '\t')
  923. h++;
  924. if (uuid_str2bin(h, uuid)) {
  925. ret = HTTP_BAD_REQUEST;
  926. goto error;
  927. }
  928. got_uuid = 1;
  929. continue;
  930. }
  931. /* TIMEOUT is requested timeout, but apparently we can
  932. * just ignore this.
  933. */
  934. }
  935. if (got_uuid) {
  936. /* renewal */
  937. wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription renewal");
  938. if (callback_urls) {
  939. ret = HTTP_BAD_REQUEST;
  940. goto error;
  941. }
  942. s = subscription_renew(sm, uuid);
  943. if (s == NULL) {
  944. char str[80];
  945. uuid_bin2str(uuid, str, sizeof(str));
  946. wpa_printf(MSG_DEBUG, "WPS UPnP: Could not find "
  947. "SID %s", str);
  948. ret = HTTP_PRECONDITION_FAILED;
  949. goto error;
  950. }
  951. } else if (callback_urls) {
  952. wpa_printf(MSG_DEBUG, "WPS UPnP: New subscription");
  953. if (!got_nt) {
  954. ret = HTTP_PRECONDITION_FAILED;
  955. goto error;
  956. }
  957. s = subscription_start(sm, callback_urls);
  958. if (s == NULL) {
  959. ret = HTTP_INTERNAL_SERVER_ERROR;
  960. goto error;
  961. }
  962. } else {
  963. ret = HTTP_PRECONDITION_FAILED;
  964. goto error;
  965. }
  966. /* success */
  967. http_put_reply_code(buf, HTTP_OK);
  968. wpabuf_put_str(buf, http_server_hdr);
  969. wpabuf_put_str(buf, http_connection_close);
  970. wpabuf_put_str(buf, "Content-Length: 0\r\n");
  971. wpabuf_put_str(buf, "SID: uuid:");
  972. /* subscription id */
  973. b = wpabuf_put(buf, 0);
  974. uuid_bin2str(s->uuid, b, 80);
  975. wpa_printf(MSG_DEBUG, "WPS UPnP: Assigned SID %s", b);
  976. wpabuf_put(buf, os_strlen(b));
  977. wpabuf_put_str(buf, "\r\n");
  978. wpabuf_printf(buf, "Timeout: Second-%d\r\n", UPNP_SUBSCRIBE_SEC);
  979. http_put_date(buf);
  980. /* And empty line to terminate header: */
  981. wpabuf_put_str(buf, "\r\n");
  982. os_free(callback_urls);
  983. http_request_send_and_deinit(req, buf);
  984. return;
  985. error:
  986. /* Per UPnP spec:
  987. * Errors
  988. * Incompatible headers
  989. * 400 Bad Request. If SID header and one of NT or CALLBACK headers
  990. * are present, the publisher must respond with HTTP error
  991. * 400 Bad Request.
  992. * Missing or invalid CALLBACK
  993. * 412 Precondition Failed. If CALLBACK header is missing or does not
  994. * contain a valid HTTP URL, the publisher must respond with HTTP
  995. * error 412 Precondition Failed.
  996. * Invalid NT
  997. * 412 Precondition Failed. If NT header does not equal upnp:event,
  998. * the publisher must respond with HTTP error 412 Precondition
  999. * Failed.
  1000. * [For resubscription, use 412 if unknown uuid].
  1001. * Unable to accept subscription
  1002. * 5xx. If a publisher is not able to accept a subscription (such as
  1003. * due to insufficient resources), it must respond with a
  1004. * HTTP 500-series error code.
  1005. * 599 Too many subscriptions (not a standard HTTP error)
  1006. */
  1007. wpa_printf(MSG_DEBUG, "WPS UPnP: SUBSCRIBE failed - return %d", ret);
  1008. http_put_empty(buf, ret);
  1009. http_request_send_and_deinit(req, buf);
  1010. os_free(callback_urls);
  1011. }
  1012. /* Given that we have received a header w/ UNSUBSCRIBE, act upon it
  1013. *
  1014. * Format of UNSUBSCRIBE (case-insensitive):
  1015. *
  1016. * First line must be:
  1017. * UNSUBSCRIBE /wps_event HTTP/1.1
  1018. *
  1019. * Our response (if no error) which includes only required lines is:
  1020. * HTTP/1.1 200 OK
  1021. * Content-Length: 0
  1022. *
  1023. * Header lines must end with \r\n
  1024. * Per RFC 2616, content-length: is not required but connection:close
  1025. * would appear to be required (given that we will be closing it!).
  1026. */
  1027. static void web_connection_parse_unsubscribe(struct upnp_wps_device_sm *sm,
  1028. struct http_request *req,
  1029. const char *filename)
  1030. {
  1031. struct wpabuf *buf;
  1032. char *hdr = http_request_get_hdr(req);
  1033. char *h;
  1034. char *match;
  1035. int match_len;
  1036. char *end;
  1037. u8 uuid[UUID_LEN];
  1038. int got_uuid = 0;
  1039. struct subscription *s = NULL;
  1040. enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR;
  1041. /* Parse/validate headers */
  1042. h = hdr;
  1043. /* First line: UNSUBSCRIBE /wps_event HTTP/1.1
  1044. * has already been parsed.
  1045. */
  1046. if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) {
  1047. ret = HTTP_PRECONDITION_FAILED;
  1048. goto send_msg;
  1049. }
  1050. wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP UNSUBSCRIBE for event");
  1051. end = os_strchr(h, '\n');
  1052. while (end) {
  1053. /* Option line by option line */
  1054. h = end + 1;
  1055. end = os_strchr(h, '\n');
  1056. if (end == NULL)
  1057. break; /* no unterminated lines allowed */
  1058. /* HOST should refer to us */
  1059. #if 0
  1060. match = "HOST:";
  1061. match_len = os_strlen(match);
  1062. if (os_strncasecmp(h, match, match_len) == 0) {
  1063. h += match_len;
  1064. while (*h == ' ' || *h == '\t')
  1065. h++;
  1066. .....
  1067. }
  1068. #endif
  1069. match = "SID:";
  1070. match_len = os_strlen(match);
  1071. if (os_strncasecmp(h, match, match_len) == 0) {
  1072. h += match_len;
  1073. while (*h == ' ' || *h == '\t')
  1074. h++;
  1075. match = "uuid:";
  1076. match_len = os_strlen(match);
  1077. if (os_strncasecmp(h, match, match_len) != 0) {
  1078. ret = HTTP_BAD_REQUEST;
  1079. goto send_msg;
  1080. }
  1081. h += match_len;
  1082. while (*h == ' ' || *h == '\t')
  1083. h++;
  1084. if (uuid_str2bin(h, uuid)) {
  1085. ret = HTTP_BAD_REQUEST;
  1086. goto send_msg;
  1087. }
  1088. got_uuid = 1;
  1089. continue;
  1090. }
  1091. match = "NT:";
  1092. match_len = os_strlen(match);
  1093. if (os_strncasecmp(h, match, match_len) == 0) {
  1094. ret = HTTP_BAD_REQUEST;
  1095. goto send_msg;
  1096. }
  1097. match = "CALLBACK:";
  1098. match_len = os_strlen(match);
  1099. if (os_strncasecmp(h, match, match_len) == 0) {
  1100. ret = HTTP_BAD_REQUEST;
  1101. goto send_msg;
  1102. }
  1103. }
  1104. if (got_uuid) {
  1105. char str[80];
  1106. uuid_bin2str(uuid, str, sizeof(str));
  1107. s = subscription_find(sm, uuid);
  1108. if (s) {
  1109. struct subscr_addr *sa;
  1110. sa = dl_list_first(&s->addr_list, struct subscr_addr,
  1111. list);
  1112. wpa_printf(MSG_DEBUG,
  1113. "WPS UPnP: Unsubscribing %p (SID %s) %s",
  1114. s, str, (sa && sa->domain_and_port) ?
  1115. sa->domain_and_port : "-null-");
  1116. dl_list_del(&s->list);
  1117. subscription_destroy(s);
  1118. } else {
  1119. wpa_printf(MSG_INFO,
  1120. "WPS UPnP: Could not find matching subscription to unsubscribe (SID %s)",
  1121. str);
  1122. ret = HTTP_PRECONDITION_FAILED;
  1123. goto send_msg;
  1124. }
  1125. } else {
  1126. wpa_printf(MSG_INFO, "WPS UPnP: Unsubscribe fails (not "
  1127. "found)");
  1128. ret = HTTP_PRECONDITION_FAILED;
  1129. goto send_msg;
  1130. }
  1131. ret = HTTP_OK;
  1132. send_msg:
  1133. buf = wpabuf_alloc(200);
  1134. if (buf == NULL) {
  1135. http_request_deinit(req);
  1136. return;
  1137. }
  1138. http_put_empty(buf, ret);
  1139. http_request_send_and_deinit(req, buf);
  1140. }
  1141. /* Send error in response to unknown requests */
  1142. static void web_connection_unimplemented(struct http_request *req)
  1143. {
  1144. struct wpabuf *buf;
  1145. buf = wpabuf_alloc(200);
  1146. if (buf == NULL) {
  1147. http_request_deinit(req);
  1148. return;
  1149. }
  1150. http_put_empty(buf, HTTP_UNIMPLEMENTED);
  1151. http_request_send_and_deinit(req, buf);
  1152. }
  1153. /* Called when we have gotten an apparently valid http request.
  1154. */
  1155. static void web_connection_check_data(void *ctx, struct http_request *req)
  1156. {
  1157. struct upnp_wps_device_sm *sm = ctx;
  1158. enum httpread_hdr_type htype = http_request_get_type(req);
  1159. char *filename = http_request_get_uri(req);
  1160. struct sockaddr_in *cli = http_request_get_cli_addr(req);
  1161. if (!filename) {
  1162. wpa_printf(MSG_INFO, "WPS UPnP: Could not get HTTP URI");
  1163. http_request_deinit(req);
  1164. return;
  1165. }
  1166. /* Trim leading slashes from filename */
  1167. while (*filename == '/')
  1168. filename++;
  1169. wpa_printf(MSG_DEBUG, "WPS UPnP: Got HTTP request type %d from %s:%d",
  1170. htype, inet_ntoa(cli->sin_addr), htons(cli->sin_port));
  1171. switch (htype) {
  1172. case HTTPREAD_HDR_TYPE_GET:
  1173. web_connection_parse_get(sm, req, filename);
  1174. break;
  1175. case HTTPREAD_HDR_TYPE_POST:
  1176. web_connection_parse_post(sm, cli, req, filename);
  1177. break;
  1178. case HTTPREAD_HDR_TYPE_SUBSCRIBE:
  1179. web_connection_parse_subscribe(sm, req, filename);
  1180. break;
  1181. case HTTPREAD_HDR_TYPE_UNSUBSCRIBE:
  1182. web_connection_parse_unsubscribe(sm, req, filename);
  1183. break;
  1184. /* We are not required to support M-POST; just plain
  1185. * POST is supposed to work, so we only support that.
  1186. * If for some reason we need to support M-POST, it is
  1187. * mostly the same as POST, with small differences.
  1188. */
  1189. default:
  1190. /* Send 501 for anything else */
  1191. web_connection_unimplemented(req);
  1192. break;
  1193. }
  1194. }
  1195. /*
  1196. * Listening for web connections
  1197. * We have a single TCP listening port, and hand off connections as we get
  1198. * them.
  1199. */
  1200. void web_listener_stop(struct upnp_wps_device_sm *sm)
  1201. {
  1202. http_server_deinit(sm->web_srv);
  1203. sm->web_srv = NULL;
  1204. }
  1205. int web_listener_start(struct upnp_wps_device_sm *sm)
  1206. {
  1207. struct in_addr addr;
  1208. addr.s_addr = sm->ip_addr;
  1209. sm->web_srv = http_server_init(&addr, -1, web_connection_check_data,
  1210. sm);
  1211. if (sm->web_srv == NULL) {
  1212. web_listener_stop(sm);
  1213. return -1;
  1214. }
  1215. sm->web_port = http_server_get_port(sm->web_srv);
  1216. return 0;
  1217. }