1 /*
2  * UPnP WPS Device - Web connections
3  * Copyright (c) 2000-2003 Intel Corporation
4  * Copyright (c) 2006-2007 Sony Corporation
5  * Copyright (c) 2008-2009 Atheros Communications
6  * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
7  *
8  * See wps_upnp.c for more details on licensing and code history.
9  */
10 
11 #include "includes.h"
12 
13 #include "common.h"
14 #include "base64.h"
15 #include "uuid.h"
16 #include "httpread.h"
17 #include "http_server.h"
18 #include "wps_i.h"
19 #include "wps_upnp.h"
20 #include "wps_upnp_i.h"
21 #include "upnp_xml.h"
22 
23 /***************************************************************************
24  * Web connections (we serve pages of info about ourselves, handle
25  * requests, etc. etc.).
26  **************************************************************************/
27 
28 #define WEB_CONNECTION_TIMEOUT_SEC 30   /* Drop web connection after t.o. */
29 #define WEB_CONNECTION_MAX_READ 8000    /* Max we'll read for TCP request */
30 #define MAX_WEB_CONNECTIONS 10          /* max simultaneous web connects */
31 
32 
33 static const char *urn_wfawlanconfig =
34 	"urn:schemas-wifialliance-org:service:WFAWLANConfig:1";
35 static const char *http_server_hdr =
36 	"Server: unspecified, UPnP/1.0, unspecified\r\n";
37 static const char *http_connection_close =
38 	"Connection: close\r\n";
39 
40 /*
41  * "Files" that we serve via HTTP. The format of these files is given by
42  * WFA WPS specifications. Extra white space has been removed to save space.
43  */
44 
45 static const char wps_scpd_xml[] =
46 "<?xml version=\"1.0\"?>\n"
47 "<scpd xmlns=\"urn:schemas-upnp-org:service-1-0\">\n"
48 "<specVersion><major>1</major><minor>0</minor></specVersion>\n"
49 "<actionList>\n"
50 "<action>\n"
51 "<name>GetDeviceInfo</name>\n"
52 "<argumentList>\n"
53 "<argument>\n"
54 "<name>NewDeviceInfo</name>\n"
55 "<direction>out</direction>\n"
56 "<relatedStateVariable>DeviceInfo</relatedStateVariable>\n"
57 "</argument>\n"
58 "</argumentList>\n"
59 "</action>\n"
60 "<action>\n"
61 "<name>PutMessage</name>\n"
62 "<argumentList>\n"
63 "<argument>\n"
64 "<name>NewInMessage</name>\n"
65 "<direction>in</direction>\n"
66 "<relatedStateVariable>InMessage</relatedStateVariable>\n"
67 "</argument>\n"
68 "<argument>\n"
69 "<name>NewOutMessage</name>\n"
70 "<direction>out</direction>\n"
71 "<relatedStateVariable>OutMessage</relatedStateVariable>\n"
72 "</argument>\n"
73 "</argumentList>\n"
74 "</action>\n"
75 "<action>\n"
76 "<name>PutWLANResponse</name>\n"
77 "<argumentList>\n"
78 "<argument>\n"
79 "<name>NewMessage</name>\n"
80 "<direction>in</direction>\n"
81 "<relatedStateVariable>Message</relatedStateVariable>\n"
82 "</argument>\n"
83 "<argument>\n"
84 "<name>NewWLANEventType</name>\n"
85 "<direction>in</direction>\n"
86 "<relatedStateVariable>WLANEventType</relatedStateVariable>\n"
87 "</argument>\n"
88 "<argument>\n"
89 "<name>NewWLANEventMAC</name>\n"
90 "<direction>in</direction>\n"
91 "<relatedStateVariable>WLANEventMAC</relatedStateVariable>\n"
92 "</argument>\n"
93 "</argumentList>\n"
94 "</action>\n"
95 "<action>\n"
96 "<name>SetSelectedRegistrar</name>\n"
97 "<argumentList>\n"
98 "<argument>\n"
99 "<name>NewMessage</name>\n"
100 "<direction>in</direction>\n"
101 "<relatedStateVariable>Message</relatedStateVariable>\n"
102 "</argument>\n"
103 "</argumentList>\n"
104 "</action>\n"
105 "</actionList>\n"
106 "<serviceStateTable>\n"
107 "<stateVariable sendEvents=\"no\">\n"
108 "<name>Message</name>\n"
109 "<dataType>bin.base64</dataType>\n"
110 "</stateVariable>\n"
111 "<stateVariable sendEvents=\"no\">\n"
112 "<name>InMessage</name>\n"
113 "<dataType>bin.base64</dataType>\n"
114 "</stateVariable>\n"
115 "<stateVariable sendEvents=\"no\">\n"
116 "<name>OutMessage</name>\n"
117 "<dataType>bin.base64</dataType>\n"
118 "</stateVariable>\n"
119 "<stateVariable sendEvents=\"no\">\n"
120 "<name>DeviceInfo</name>\n"
121 "<dataType>bin.base64</dataType>\n"
122 "</stateVariable>\n"
123 "<stateVariable sendEvents=\"yes\">\n"
124 "<name>APStatus</name>\n"
125 "<dataType>ui1</dataType>\n"
126 "</stateVariable>\n"
127 "<stateVariable sendEvents=\"yes\">\n"
128 "<name>STAStatus</name>\n"
129 "<dataType>ui1</dataType>\n"
130 "</stateVariable>\n"
131 "<stateVariable sendEvents=\"yes\">\n"
132 "<name>WLANEvent</name>\n"
133 "<dataType>bin.base64</dataType>\n"
134 "</stateVariable>\n"
135 "<stateVariable sendEvents=\"no\">\n"
136 "<name>WLANEventType</name>\n"
137 "<dataType>ui1</dataType>\n"
138 "</stateVariable>\n"
139 "<stateVariable sendEvents=\"no\">\n"
140 "<name>WLANEventMAC</name>\n"
141 "<dataType>string</dataType>\n"
142 "</stateVariable>\n"
143 "<stateVariable sendEvents=\"no\">\n"
144 "<name>WLANResponse</name>\n"
145 "<dataType>bin.base64</dataType>\n"
146 "</stateVariable>\n"
147 "</serviceStateTable>\n"
148 "</scpd>\n"
149 ;
150 
151 
152 static const char *wps_device_xml_prefix =
153 	"<?xml version=\"1.0\"?>\n"
154 	"<root xmlns=\"urn:schemas-upnp-org:device-1-0\">\n"
155 	"<specVersion>\n"
156 	"<major>1</major>\n"
157 	"<minor>0</minor>\n"
158 	"</specVersion>\n"
159 	"<device>\n"
160 	"<deviceType>urn:schemas-wifialliance-org:device:WFADevice:1"
161 	"</deviceType>\n";
162 
163 static const char *wps_device_xml_postfix =
164 	"<serviceList>\n"
165 	"<service>\n"
166 	"<serviceType>urn:schemas-wifialliance-org:service:WFAWLANConfig:1"
167 	"</serviceType>\n"
168 	"<serviceId>urn:wifialliance-org:serviceId:WFAWLANConfig1</serviceId>"
169 	"\n"
170 	"<SCPDURL>" UPNP_WPS_SCPD_XML_FILE "</SCPDURL>\n"
171 	"<controlURL>" UPNP_WPS_DEVICE_CONTROL_FILE "</controlURL>\n"
172 	"<eventSubURL>" UPNP_WPS_DEVICE_EVENT_FILE "</eventSubURL>\n"
173 	"</service>\n"
174 	"</serviceList>\n"
175 	"</device>\n"
176 	"</root>\n";
177 
178 
179 /* format_wps_device_xml -- produce content of "file" wps_device.xml
180  * (UPNP_WPS_DEVICE_XML_FILE)
181  */
182 static void format_wps_device_xml(struct upnp_wps_device_interface *iface,
183 				  struct upnp_wps_device_sm *sm,
184 				  struct wpabuf *buf)
185 {
186 	const char *s;
187 	char uuid_string[80];
188 
189 	wpabuf_put_str(buf, wps_device_xml_prefix);
190 
191 	/*
192 	 * Add required fields with default values if not configured. Add
193 	 * optional and recommended fields only if configured.
194 	 */
195 	s = iface->wps->friendly_name;
196 	s = ((s && *s) ? s : "WPS Access Point");
197 	xml_add_tagged_data(buf, "friendlyName", s);
198 
199 	s = iface->wps->dev.manufacturer;
200 	s = ((s && *s) ? s : "");
201 	xml_add_tagged_data(buf, "manufacturer", s);
202 
203 	if (iface->wps->manufacturer_url)
204 		xml_add_tagged_data(buf, "manufacturerURL",
205 				    iface->wps->manufacturer_url);
206 
207 	if (iface->wps->model_description)
208 		xml_add_tagged_data(buf, "modelDescription",
209 				    iface->wps->model_description);
210 
211 	s = iface->wps->dev.model_name;
212 	s = ((s && *s) ? s : "");
213 	xml_add_tagged_data(buf, "modelName", s);
214 
215 	if (iface->wps->dev.model_number)
216 		xml_add_tagged_data(buf, "modelNumber",
217 				    iface->wps->dev.model_number);
218 
219 	if (iface->wps->model_url)
220 		xml_add_tagged_data(buf, "modelURL", iface->wps->model_url);
221 
222 	if (iface->wps->dev.serial_number)
223 		xml_add_tagged_data(buf, "serialNumber",
224 				    iface->wps->dev.serial_number);
225 
226 	uuid_bin2str(iface->wps->uuid, uuid_string, sizeof(uuid_string));
227 	s = uuid_string;
228 	/* Need "uuid:" prefix, thus we can't use xml_add_tagged_data()
229 	 * easily...
230 	 */
231 	wpabuf_put_str(buf, "<UDN>uuid:");
232 	xml_data_encode(buf, s, os_strlen(s));
233 	wpabuf_put_str(buf, "</UDN>\n");
234 
235 	if (iface->wps->upc)
236 		xml_add_tagged_data(buf, "UPC", iface->wps->upc);
237 
238 	wpabuf_put_str(buf, wps_device_xml_postfix);
239 }
240 
241 
242 static void http_put_reply_code(struct wpabuf *buf, enum http_reply_code code)
243 {
244 	wpabuf_put_str(buf, "HTTP/1.1 ");
245 	switch (code) {
246 	case HTTP_OK:
247 		wpabuf_put_str(buf, "200 OK\r\n");
248 		break;
249 	case HTTP_BAD_REQUEST:
250 		wpabuf_put_str(buf, "400 Bad request\r\n");
251 		break;
252 	case HTTP_PRECONDITION_FAILED:
253 		wpabuf_put_str(buf, "412 Precondition failed\r\n");
254 		break;
255 	case HTTP_UNIMPLEMENTED:
256 		wpabuf_put_str(buf, "501 Unimplemented\r\n");
257 		break;
258 	case HTTP_INTERNAL_SERVER_ERROR:
259 	default:
260 		wpabuf_put_str(buf, "500 Internal server error\r\n");
261 		break;
262 	}
263 }
264 
265 
266 static void http_put_date(struct wpabuf *buf)
267 {
268 	wpabuf_put_str(buf, "Date: ");
269 	format_date(buf);
270 	wpabuf_put_str(buf, "\r\n");
271 }
272 
273 
274 static void http_put_empty(struct wpabuf *buf, enum http_reply_code code)
275 {
276 	http_put_reply_code(buf, code);
277 	wpabuf_put_str(buf, http_server_hdr);
278 	wpabuf_put_str(buf, http_connection_close);
279 	wpabuf_put_str(buf, "Content-Length: 0\r\n"
280 		       "\r\n");
281 }
282 
283 
284 /* Given that we have received a header w/ GET, act upon it
285  *
286  * Format of GET (case-insensitive):
287  *
288  * First line must be:
289  *      GET /<file> HTTP/1.1
290  * Since we don't do anything fancy we just ignore other lines.
291  *
292  * Our response (if no error) which includes only required lines is:
293  * HTTP/1.1 200 OK
294  * Connection: close
295  * Content-Type: text/xml
296  * Date: <rfc1123-date>
297  *
298  * Header lines must end with \r\n
299  * Per RFC 2616, content-length: is not required but connection:close
300  * would appear to be required (given that we will be closing it!).
301  */
302 static void web_connection_parse_get(struct upnp_wps_device_sm *sm,
303 				     struct http_request *hreq,
304 				     const char *filename)
305 {
306 	struct wpabuf *buf; /* output buffer, allocated */
307 	char *put_length_here;
308 	char *body_start;
309 	enum {
310 		GET_DEVICE_XML_FILE,
311 		GET_SCPD_XML_FILE
312 	} req;
313 	size_t extra_len = 0;
314 	int body_length;
315 	char len_buf[10];
316 	struct upnp_wps_device_interface *iface;
317 
318 	iface = dl_list_first(&sm->interfaces,
319 			      struct upnp_wps_device_interface, list);
320 	if (iface == NULL) {
321 		http_request_deinit(hreq);
322 		return;
323 	}
324 
325 	/*
326 	 * It is not required that filenames be case insensitive but it is
327 	 * allowed and cannot hurt here.
328 	 */
329 	if (os_strcasecmp(filename, UPNP_WPS_DEVICE_XML_FILE) == 0) {
330 		wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML");
331 		req = GET_DEVICE_XML_FILE;
332 		extra_len = 3000;
333 		if (iface->wps->friendly_name)
334 			extra_len += os_strlen(iface->wps->friendly_name);
335 		if (iface->wps->manufacturer_url)
336 			extra_len += os_strlen(iface->wps->manufacturer_url);
337 		if (iface->wps->model_description)
338 			extra_len += os_strlen(iface->wps->model_description);
339 		if (iface->wps->model_url)
340 			extra_len += os_strlen(iface->wps->model_url);
341 		if (iface->wps->upc)
342 			extra_len += os_strlen(iface->wps->upc);
343 	} else if (!os_strcasecmp(filename, UPNP_WPS_SCPD_XML_FILE)) {
344 		wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML");
345 		req = GET_SCPD_XML_FILE;
346 		extra_len = os_strlen(wps_scpd_xml);
347 	} else {
348 		/* File not found */
349 		wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s",
350 			   filename);
351 		buf = wpabuf_alloc(200);
352 		if (buf == NULL) {
353 			http_request_deinit(hreq);
354 			return;
355 		}
356 		wpabuf_put_str(buf,
357 			       "HTTP/1.1 404 Not Found\r\n"
358 			       "Connection: close\r\n");
359 
360 		http_put_date(buf);
361 
362 		/* terminating empty line */
363 		wpabuf_put_str(buf, "\r\n");
364 
365 		goto send_buf;
366 	}
367 
368 	buf = wpabuf_alloc(1000 + extra_len);
369 	if (buf == NULL) {
370 		http_request_deinit(hreq);
371 		return;
372 	}
373 
374 	wpabuf_put_str(buf,
375 		       "HTTP/1.1 200 OK\r\n"
376 		       "Content-Type: text/xml; charset=\"utf-8\"\r\n");
377 	wpabuf_put_str(buf, "Server: Unspecified, UPnP/1.0, Unspecified\r\n");
378 	wpabuf_put_str(buf, "Connection: close\r\n");
379 	wpabuf_put_str(buf, "Content-Length: ");
380 	/*
381 	 * We will paste the length in later, leaving some extra whitespace.
382 	 * HTTP code is supposed to be tolerant of extra whitespace.
383 	 */
384 	put_length_here = wpabuf_put(buf, 0);
385 	wpabuf_put_str(buf, "        \r\n");
386 
387 	http_put_date(buf);
388 
389 	/* terminating empty line */
390 	wpabuf_put_str(buf, "\r\n");
391 
392 	body_start = wpabuf_put(buf, 0);
393 
394 	switch (req) {
395 	case GET_DEVICE_XML_FILE:
396 		format_wps_device_xml(iface, sm, buf);
397 		break;
398 	case GET_SCPD_XML_FILE:
399 		wpabuf_put_str(buf, wps_scpd_xml);
400 		break;
401 	}
402 
403 	/* Now patch in the content length at the end */
404 	body_length = (char *) wpabuf_put(buf, 0) - body_start;
405 	os_snprintf(len_buf, 10, "%d", body_length);
406 	os_memcpy(put_length_here, len_buf, os_strlen(len_buf));
407 
408 send_buf:
409 	http_request_send_and_deinit(hreq, buf);
410 }
411 
412 
413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer)
414 {
415 	dl_list_del(&peer->list);
416 	if (peer->wps)
417 		wps_deinit(peer->wps);
418 	os_free(peer);
419 }
420 
421 
422 static enum http_reply_code
423 web_process_get_device_info(struct upnp_wps_device_sm *sm,
424 			    struct wpabuf **reply, const char **replyname)
425 {
426 	static const char *name = "NewDeviceInfo";
427 	struct wps_config cfg;
428 	struct upnp_wps_device_interface *iface;
429 	struct upnp_wps_peer *peer;
430 
431 	iface = dl_list_first(&sm->interfaces,
432 			      struct upnp_wps_device_interface, list);
433 
434 	wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo");
435 
436 	if (!iface || iface->ctx->ap_pin == NULL)
437 		return HTTP_INTERNAL_SERVER_ERROR;
438 
439 	peer = os_zalloc(sizeof(*peer));
440 	if (!peer)
441 		return HTTP_INTERNAL_SERVER_ERROR;
442 
443 	/*
444 	 * Request for DeviceInfo, i.e., M1 TLVs. This is a start of WPS
445 	 * registration over UPnP with the AP acting as an Enrollee. It should
446 	 * be noted that this is frequently used just to get the device data,
447 	 * i.e., there may not be any intent to actually complete the
448 	 * registration.
449 	 */
450 
451 	os_memset(&cfg, 0, sizeof(cfg));
452 	cfg.wps = iface->wps;
453 	cfg.pin = (u8 *) iface->ctx->ap_pin;
454 	cfg.pin_len = os_strlen(iface->ctx->ap_pin);
455 	peer->wps = wps_init(&cfg);
456 	if (peer->wps) {
457 		enum wsc_op_code op_code;
458 		*reply = wps_get_msg(peer->wps, &op_code);
459 		if (*reply == NULL) {
460 			wps_deinit(peer->wps);
461 			peer->wps = NULL;
462 		}
463 	} else
464 		*reply = NULL;
465 	if (*reply == NULL) {
466 		wpa_printf(MSG_INFO, "WPS UPnP: Failed to get DeviceInfo");
467 		os_free(peer);
468 		return HTTP_INTERNAL_SERVER_ERROR;
469 	}
470 
471 	if (dl_list_len(&iface->peers) > 3) {
472 		struct upnp_wps_peer *old;
473 
474 		old = dl_list_first(&iface->peers, struct upnp_wps_peer, list);
475 		if (old) {
476 			wpa_printf(MSG_DEBUG, "WPS UPnP: Drop oldest active session");
477 			wps_upnp_peer_del(old);
478 		}
479 	}
480 	dl_list_add_tail(&iface->peers, &peer->list);
481 	/* TODO: Could schedule a timeout to free the entry */
482 
483 	*replyname = name;
484 	return HTTP_OK;
485 }
486 
487 
488 static enum http_reply_code
489 web_process_put_message(struct upnp_wps_device_sm *sm, char *data,
490 			struct wpabuf **reply, const char **replyname)
491 {
492 	struct wpabuf *msg;
493 	static const char *name = "NewOutMessage";
494 	enum http_reply_code ret;
495 	enum wps_process_res res;
496 	enum wsc_op_code op_code;
497 	struct upnp_wps_device_interface *iface;
498 	struct wps_parse_attr attr;
499 	struct upnp_wps_peer *tmp, *peer;
500 
501 	iface = dl_list_first(&sm->interfaces,
502 			      struct upnp_wps_device_interface, list);
503 	if (!iface)
504 		return HTTP_INTERNAL_SERVER_ERROR;
505 
506 	/*
507 	 * PutMessage is used by external UPnP-based Registrar to perform WPS
508 	 * operation with the access point itself; as compared with
509 	 * PutWLANResponse which is for proxying.
510 	 */
511 	wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage");
512 	msg = xml_get_base64_item(data, "NewInMessage", &ret);
513 	if (msg == NULL)
514 		return ret;
515 
516 	if (wps_parse_msg(msg, &attr)) {
517 		wpa_printf(MSG_DEBUG,
518 			   "WPS UPnP: Could not parse PutMessage - NewInMessage");
519 		wpabuf_free(msg);
520 		return HTTP_BAD_REQUEST;
521 	}
522 
523 	/* Find a matching active peer session */
524 	peer = NULL;
525 	dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) {
526 		if (!tmp->wps)
527 			continue;
528 		if (attr.enrollee_nonce &&
529 		    os_memcmp(tmp->wps->nonce_e, attr.enrollee_nonce,
530 			      WPS_NONCE_LEN) != 0)
531 			continue; /* Enrollee nonce mismatch */
532 		if (attr.msg_type &&
533 		    *attr.msg_type != WPS_M2 &&
534 		    *attr.msg_type != WPS_M2D &&
535 		    attr.registrar_nonce &&
536 		    os_memcmp(tmp->wps->nonce_r, attr.registrar_nonce,
537 			      WPS_NONCE_LEN) != 0)
538 			continue; /* Registrar nonce mismatch */
539 		peer = tmp;
540 		break;
541 	}
542 	if (!peer) {
543 		/*
544 		  Try to use the first entry in case message could work with
545 		 * it. The actual handler function will reject this, if needed.
546 		 * This maintains older behavior where only a single peer entry
547 		 * was supported.
548 		 */
549 		peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list);
550 	}
551 	if (!peer || !peer->wps) {
552 		wpa_printf(MSG_DEBUG, "WPS UPnP: No active peer entry found");
553 		wpabuf_free(msg);
554 		return HTTP_BAD_REQUEST;
555 	}
556 
557 	res = wps_process_msg(peer->wps, WSC_UPnP, msg);
558 	if (res == WPS_FAILURE) {
559 		*reply = NULL;
560 		wpa_printf(MSG_DEBUG, "WPS UPnP: Drop active peer session");
561 		wps_upnp_peer_del(peer);
562 	} else {
563 		*reply = wps_get_msg(peer->wps, &op_code);
564 	}
565 	wpabuf_free(msg);
566 	if (*reply == NULL)
567 		return HTTP_INTERNAL_SERVER_ERROR;
568 	*replyname = name;
569 	return HTTP_OK;
570 }
571 
572 
573 static enum http_reply_code
574 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data,
575 			      struct wpabuf **reply, const char **replyname)
576 {
577 	struct wpabuf *msg;
578 	enum http_reply_code ret;
579 	u8 macaddr[ETH_ALEN];
580 	int ev_type;
581 	int type;
582 	char *val;
583 	struct upnp_wps_device_interface *iface;
584 	int ok = 0;
585 
586 	/*
587 	 * External UPnP-based Registrar is passing us a message to be proxied
588 	 * over to a Wi-Fi -based client of ours.
589 	 */
590 
591 	wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse");
592 	msg = xml_get_base64_item(data, "NewMessage", &ret);
593 	if (msg == NULL) {
594 		wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage "
595 			   "from PutWLANResponse");
596 		return ret;
597 	}
598 	val = xml_get_first_item(data, "NewWLANEventType");
599 	if (val == NULL) {
600 		wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in "
601 			   "PutWLANResponse");
602 		wpabuf_free(msg);
603 		return UPNP_ARG_VALUE_INVALID;
604 	}
605 	ev_type = atol(val);
606 	os_free(val);
607 	val = xml_get_first_item(data, "NewWLANEventMAC");
608 	if (val == NULL) {
609 		wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in "
610 			   "PutWLANResponse");
611 		wpabuf_free(msg);
612 		return UPNP_ARG_VALUE_INVALID;
613 	}
614 	if (hwaddr_aton(val, macaddr)) {
615 		wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid NewWLANEventMAC in "
616 			   "PutWLANResponse: '%s'", val);
617 #ifdef CONFIG_WPS_STRICT
618 		{
619 			struct wps_parse_attr attr;
620 			if (wps_parse_msg(msg, &attr) < 0 || attr.version2) {
621 				wpabuf_free(msg);
622 				os_free(val);
623 				return UPNP_ARG_VALUE_INVALID;
624 			}
625 		}
626 #endif /* CONFIG_WPS_STRICT */
627 		if (hwaddr_aton2(val, macaddr) > 0) {
628 			/*
629 			 * At least some versions of Intel PROset seem to be
630 			 * using dot-deliminated MAC address format here.
631 			 */
632 			wpa_printf(MSG_DEBUG, "WPS UPnP: Workaround - allow "
633 				   "incorrect MAC address format in "
634 				   "NewWLANEventMAC: %s -> " MACSTR,
635 				   val, MAC2STR(macaddr));
636 		} else {
637 			wpabuf_free(msg);
638 			os_free(val);
639 			return UPNP_ARG_VALUE_INVALID;
640 		}
641 	}
642 	os_free(val);
643 	if (ev_type == UPNP_WPS_WLANEVENT_TYPE_EAP) {
644 		struct wps_parse_attr attr;
645 		if (wps_parse_msg(msg, &attr) < 0 ||
646 		    attr.msg_type == NULL)
647 			type = -1;
648 		else
649 			type = *attr.msg_type;
650 		wpa_printf(MSG_DEBUG, "WPS UPnP: Message Type %d", type);
651 	} else
652 		type = -1;
653 	dl_list_for_each(iface, &sm->interfaces,
654 			 struct upnp_wps_device_interface, list) {
655 		if (iface->ctx->rx_req_put_wlan_response &&
656 		    iface->ctx->rx_req_put_wlan_response(iface->priv, ev_type,
657 							 macaddr, msg, type)
658 		    == 0)
659 			ok = 1;
660 	}
661 
662 	if (!ok) {
663 		wpa_printf(MSG_INFO, "WPS UPnP: Fail: sm->ctx->"
664 			   "rx_req_put_wlan_response");
665 		wpabuf_free(msg);
666 		return HTTP_INTERNAL_SERVER_ERROR;
667 	}
668 	wpabuf_free(msg);
669 	*replyname = NULL;
670 	*reply = NULL;
671 	return HTTP_OK;
672 }
673 
674 
675 static int find_er_addr(struct subscription *s, struct sockaddr_in *cli)
676 {
677 	struct subscr_addr *a;
678 
679 	dl_list_for_each(a, &s->addr_list, struct subscr_addr, list) {
680 		if (cli->sin_addr.s_addr == a->saddr.sin_addr.s_addr)
681 			return 1;
682 	}
683 	return 0;
684 }
685 
686 
687 static struct subscription * find_er(struct upnp_wps_device_sm *sm,
688 				     struct sockaddr_in *cli)
689 {
690 	struct subscription *s;
691 	dl_list_for_each(s, &sm->subscriptions, struct subscription, list)
692 		if (find_er_addr(s, cli))
693 			return s;
694 	return NULL;
695 }
696 
697 
698 static enum http_reply_code
699 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm,
700 				   struct sockaddr_in *cli, char *data,
701 				   struct wpabuf **reply,
702 				   const char **replyname)
703 {
704 	struct wpabuf *msg;
705 	enum http_reply_code ret;
706 	struct subscription *s;
707 	struct upnp_wps_device_interface *iface;
708 	int err = 0;
709 
710 	wpa_printf(MSG_DEBUG, "WPS UPnP: SetSelectedRegistrar");
711 	s = find_er(sm, cli);
712 	if (s == NULL) {
713 		wpa_printf(MSG_DEBUG, "WPS UPnP: Ignore SetSelectedRegistrar "
714 			   "from unknown ER");
715 		return UPNP_ACTION_FAILED;
716 	}
717 	msg = xml_get_base64_item(data, "NewMessage", &ret);
718 	if (msg == NULL)
719 		return ret;
720 	dl_list_for_each(iface, &sm->interfaces,
721 			 struct upnp_wps_device_interface, list) {
722 		if (upnp_er_set_selected_registrar(iface->wps->registrar, s,
723 						   msg))
724 			err = 1;
725 	}
726 	wpabuf_free(msg);
727 	if (err)
728 		return HTTP_INTERNAL_SERVER_ERROR;
729 	*replyname = NULL;
730 	*reply = NULL;
731 	return HTTP_OK;
732 }
733 
734 
735 static const char *soap_prefix =
736 	"<?xml version=\"1.0\"?>\n"
737 	"<s:Envelope xmlns:s=\"http://schemas.xmlsoap.org/soap/envelope/\" "
738 	"s:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">\n"
739 	"<s:Body>\n";
740 static const char *soap_postfix =
741 	"</s:Body>\n</s:Envelope>\n";
742 
743 static const char *soap_error_prefix =
744 	"<s:Fault>\n"
745 	"<faultcode>s:Client</faultcode>\n"
746 	"<faultstring>UPnPError</faultstring>\n"
747 	"<detail>\n"
748 	"<UPnPError xmlns=\"urn:schemas-upnp-org:control-1-0\">\n";
749 static const char *soap_error_postfix =
750 	"<errorDescription>Error</errorDescription>\n"
751 	"</UPnPError>\n"
752 	"</detail>\n"
753 	"</s:Fault>\n";
754 
755 static void web_connection_send_reply(struct http_request *req,
756 				      enum http_reply_code ret,
757 				      const char *action, int action_len,
758 				      const struct wpabuf *reply,
759 				      const char *replyname)
760 {
761 	struct wpabuf *buf;
762 	char *replydata;
763 	char *put_length_here = NULL;
764 	char *body_start = NULL;
765 
766 	if (reply) {
767 		size_t len;
768 		replydata = (char *) base64_encode(wpabuf_head(reply),
769 						   wpabuf_len(reply), &len);
770 	} else
771 		replydata = NULL;
772 
773 	/* Parameters of the response:
774 	 *      action(action_len) -- action we are responding to
775 	 *      replyname -- a name we need for the reply
776 	 *      replydata -- NULL or null-terminated string
777 	 */
778 	buf = wpabuf_alloc(1000 + (replydata ? os_strlen(replydata) : 0U) +
779 			   (action_len > 0 ? action_len * 2 : 0));
780 	if (buf == NULL) {
781 		wpa_printf(MSG_INFO, "WPS UPnP: Cannot allocate reply to "
782 			   "POST");
783 		os_free(replydata);
784 		http_request_deinit(req);
785 		return;
786 	}
787 
788 	/*
789 	 * Assuming we will be successful, put in the output header first.
790 	 * Note: we do not keep connections alive (and httpread does
791 	 * not support it)... therefore we must have Connection: close.
792 	 */
793 	if (ret == HTTP_OK) {
794 		wpabuf_put_str(buf,
795 			       "HTTP/1.1 200 OK\r\n"
796 			       "Content-Type: text/xml; "
797 			       "charset=\"utf-8\"\r\n");
798 	} else {
799 		wpabuf_printf(buf, "HTTP/1.1 %d Error\r\n", ret);
800 	}
801 	wpabuf_put_str(buf, http_connection_close);
802 
803 	wpabuf_put_str(buf, "Content-Length: ");
804 	/*
805 	 * We will paste the length in later, leaving some extra whitespace.
806 	 * HTTP code is supposed to be tolerant of extra whitespace.
807 	 */
808 	put_length_here = wpabuf_put(buf, 0);
809 	wpabuf_put_str(buf, "        \r\n");
810 
811 	http_put_date(buf);
812 
813 	/* terminating empty line */
814 	wpabuf_put_str(buf, "\r\n");
815 
816 	body_start = wpabuf_put(buf, 0);
817 
818 	if (ret == HTTP_OK) {
819 		wpabuf_put_str(buf, soap_prefix);
820 		wpabuf_put_str(buf, "<u:");
821 		wpabuf_put_data(buf, action, action_len);
822 		wpabuf_put_str(buf, "Response xmlns:u=\"");
823 		wpabuf_put_str(buf, urn_wfawlanconfig);
824 		wpabuf_put_str(buf, "\">\n");
825 		if (replydata && replyname) {
826 			/* TODO: might possibly need to escape part of reply
827 			 * data? ...
828 			 * probably not, unlikely to have ampersand(&) or left
829 			 * angle bracket (<) in it...
830 			 */
831 			wpabuf_printf(buf, "<%s>", replyname);
832 			wpabuf_put_str(buf, replydata);
833 			wpabuf_printf(buf, "</%s>\n", replyname);
834 		}
835 		wpabuf_put_str(buf, "</u:");
836 		wpabuf_put_data(buf, action, action_len);
837 		wpabuf_put_str(buf, "Response>\n");
838 		wpabuf_put_str(buf, soap_postfix);
839 	} else {
840 		/* Error case */
841 		wpabuf_put_str(buf, soap_prefix);
842 		wpabuf_put_str(buf, soap_error_prefix);
843 		wpabuf_printf(buf, "<errorCode>%d</errorCode>\n", ret);
844 		wpabuf_put_str(buf, soap_error_postfix);
845 		wpabuf_put_str(buf, soap_postfix);
846 	}
847 	os_free(replydata);
848 
849 	/* Now patch in the content length at the end */
850 	if (body_start && put_length_here) {
851 		int body_length = (char *) wpabuf_put(buf, 0) - body_start;
852 		char len_buf[10];
853 		os_snprintf(len_buf, sizeof(len_buf), "%d", body_length);
854 		os_memcpy(put_length_here, len_buf, os_strlen(len_buf));
855 	}
856 
857 	http_request_send_and_deinit(req, buf);
858 }
859 
860 
861 static const char * web_get_action(struct http_request *req,
862 				   size_t *action_len)
863 {
864 	const char *match;
865 	int match_len;
866 	char *b;
867 	char *action;
868 
869 	*action_len = 0;
870 	/* The SOAPAction line of the header tells us what we want to do */
871 	b = http_request_get_hdr_line(req, "SOAPAction:");
872 	if (b == NULL)
873 		return NULL;
874 	if (*b == '"')
875 		b++;
876 	else
877 		return NULL;
878 	match = urn_wfawlanconfig;
879 	match_len = os_strlen(urn_wfawlanconfig) - 1;
880 	if (os_strncasecmp(b, match, match_len))
881 		return NULL;
882 	b += match_len;
883 	/* skip over version */
884 	while (isgraph(*b) && *b != '#')
885 		b++;
886 	if (*b != '#')
887 		return NULL;
888 	b++;
889 	/* Following the sharp(#) should be the action and a double quote */
890 	action = b;
891 	while (isgraph(*b) && *b != '"')
892 		b++;
893 	if (*b != '"')
894 		return NULL;
895 	*action_len = b - action;
896 	return action;
897 }
898 
899 
900 /* Given that we have received a header w/ POST, act upon it
901  *
902  * Format of POST (case-insensitive):
903  *
904  * First line must be:
905  *      POST /<file> HTTP/1.1
906  * Since we don't do anything fancy we just ignore other lines.
907  *
908  * Our response (if no error) which includes only required lines is:
909  * HTTP/1.1 200 OK
910  * Connection: close
911  * Content-Type: text/xml
912  * Date: <rfc1123-date>
913  *
914  * Header lines must end with \r\n
915  * Per RFC 2616, content-length: is not required but connection:close
916  * would appear to be required (given that we will be closing it!).
917  */
918 static void web_connection_parse_post(struct upnp_wps_device_sm *sm,
919 				      struct sockaddr_in *cli,
920 				      struct http_request *req,
921 				      const char *filename)
922 {
923 	enum http_reply_code ret;
924 	char *data = http_request_get_data(req); /* body of http msg */
925 	const char *action = NULL;
926 	size_t action_len = 0;
927 	const char *replyname = NULL; /* argument name for the reply */
928 	struct wpabuf *reply = NULL; /* data for the reply */
929 
930 	if (os_strcasecmp(filename, UPNP_WPS_DEVICE_CONTROL_FILE)) {
931 		wpa_printf(MSG_INFO, "WPS UPnP: Invalid POST filename %s",
932 			   filename);
933 		ret = HTTP_NOT_FOUND;
934 		goto bad;
935 	}
936 
937 	ret = UPNP_INVALID_ACTION;
938 	action = web_get_action(req, &action_len);
939 	if (action == NULL)
940 		goto bad;
941 
942 	if (!os_strncasecmp("GetDeviceInfo", action, action_len))
943 		ret = web_process_get_device_info(sm, &reply, &replyname);
944 	else if (!os_strncasecmp("PutMessage", action, action_len))
945 		ret = web_process_put_message(sm, data, &reply, &replyname);
946 	else if (!os_strncasecmp("PutWLANResponse", action, action_len))
947 		ret = web_process_put_wlan_response(sm, data, &reply,
948 						    &replyname);
949 	else if (!os_strncasecmp("SetSelectedRegistrar", action, action_len))
950 		ret = web_process_set_selected_registrar(sm, cli, data, &reply,
951 							 &replyname);
952 	else
953 		wpa_printf(MSG_INFO, "WPS UPnP: Unknown POST type");
954 
955 bad:
956 	if (ret != HTTP_OK)
957 		wpa_printf(MSG_INFO, "WPS UPnP: POST failure ret=%d", ret);
958 	web_connection_send_reply(req, ret, action, action_len, reply,
959 				  replyname);
960 	wpabuf_free(reply);
961 }
962 
963 
964 /* Given that we have received a header w/ SUBSCRIBE, act upon it
965  *
966  * Format of SUBSCRIBE (case-insensitive):
967  *
968  * First line must be:
969  *      SUBSCRIBE /wps_event HTTP/1.1
970  *
971  * Our response (if no error) which includes only required lines is:
972  * HTTP/1.1 200 OK
973  * Server: xx, UPnP/1.0, xx
974  * SID: uuid:xxxxxxxxx
975  * Timeout: Second-<n>
976  * Content-Length: 0
977  * Date: xxxx
978  *
979  * Header lines must end with \r\n
980  * Per RFC 2616, content-length: is not required but connection:close
981  * would appear to be required (given that we will be closing it!).
982  */
983 static void web_connection_parse_subscribe(struct upnp_wps_device_sm *sm,
984 					   struct http_request *req,
985 					   const char *filename)
986 {
987 	struct wpabuf *buf;
988 	char *b;
989 	char *hdr = http_request_get_hdr(req);
990 	char *h;
991 	char *match;
992 	int match_len;
993 	char *end;
994 	int len;
995 	int got_nt = 0;
996 	u8 uuid[UUID_LEN];
997 	int got_uuid = 0;
998 	char *callback_urls = NULL;
999 	struct subscription *s = NULL;
1000 	enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR;
1001 
1002 	buf = wpabuf_alloc(1000);
1003 	if (buf == NULL) {
1004 		http_request_deinit(req);
1005 		return;
1006 	}
1007 
1008 	wpa_hexdump_ascii(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE",
1009 			  (u8 *) hdr, os_strlen(hdr));
1010 
1011 	/* Parse/validate headers */
1012 	h = hdr;
1013 	/* First line: SUBSCRIBE /wps_event HTTP/1.1
1014 	 * has already been parsed.
1015 	 */
1016 	if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) {
1017 		ret = HTTP_PRECONDITION_FAILED;
1018 		goto error;
1019 	}
1020 	wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP SUBSCRIBE for event");
1021 	end = os_strchr(h, '\n');
1022 
1023 	while (end) {
1024 		/* Option line by option line */
1025 		h = end + 1;
1026 		end = os_strchr(h, '\n');
1027 		if (end == NULL)
1028 			break; /* no unterminated lines allowed */
1029 
1030 		/* NT assures that it is our type of subscription;
1031 		 * not used for a renewal.
1032 		 **/
1033 		match = "NT:";
1034 		match_len = os_strlen(match);
1035 		if (os_strncasecmp(h, match, match_len) == 0) {
1036 			h += match_len;
1037 			while (*h == ' ' || *h == '\t')
1038 				h++;
1039 			match = "upnp:event";
1040 			match_len = os_strlen(match);
1041 			if (os_strncasecmp(h, match, match_len) != 0) {
1042 				ret = HTTP_BAD_REQUEST;
1043 				goto error;
1044 			}
1045 			got_nt = 1;
1046 			continue;
1047 		}
1048 		/* HOST should refer to us */
1049 #if 0
1050 		match = "HOST:";
1051 		match_len = os_strlen(match);
1052 		if (os_strncasecmp(h, match, match_len) == 0) {
1053 			h += match_len;
1054 			while (*h == ' ' || *h == '\t')
1055 				h++;
1056 			.....
1057 		}
1058 #endif
1059 		/* CALLBACK gives one or more URLs for NOTIFYs
1060 		 * to be sent as a result of the subscription.
1061 		 * Each URL is enclosed in angle brackets.
1062 		 */
1063 		match = "CALLBACK:";
1064 		match_len = os_strlen(match);
1065 		if (os_strncasecmp(h, match, match_len) == 0) {
1066 			h += match_len;
1067 			while (*h == ' ' || *h == '\t')
1068 				h++;
1069 			len = end - h;
1070 			os_free(callback_urls);
1071 			callback_urls = dup_binstr(h, len);
1072 			if (callback_urls == NULL) {
1073 				ret = HTTP_INTERNAL_SERVER_ERROR;
1074 				goto error;
1075 			}
1076 			if (len > 0 && callback_urls[len - 1] == '\r')
1077 				callback_urls[len - 1] = '\0';
1078 			continue;
1079 		}
1080 		/* SID is only for renewal */
1081 		match = "SID:";
1082 		match_len = os_strlen(match);
1083 		if (os_strncasecmp(h, match, match_len) == 0) {
1084 			h += match_len;
1085 			while (*h == ' ' || *h == '\t')
1086 				h++;
1087 			match = "uuid:";
1088 			match_len = os_strlen(match);
1089 			if (os_strncasecmp(h, match, match_len) != 0) {
1090 				ret = HTTP_BAD_REQUEST;
1091 				goto error;
1092 			}
1093 			h += match_len;
1094 			while (*h == ' ' || *h == '\t')
1095 				h++;
1096 			if (uuid_str2bin(h, uuid)) {
1097 				ret = HTTP_BAD_REQUEST;
1098 				goto error;
1099 			}
1100 			got_uuid = 1;
1101 			continue;
1102 		}
1103 		/* TIMEOUT is requested timeout, but apparently we can
1104 		 * just ignore this.
1105 		 */
1106 	}
1107 
1108 	if (got_uuid) {
1109 		/* renewal */
1110 		wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription renewal");
1111 		if (callback_urls) {
1112 			ret = HTTP_BAD_REQUEST;
1113 			goto error;
1114 		}
1115 		s = subscription_renew(sm, uuid);
1116 		if (s == NULL) {
1117 			char str[80];
1118 			uuid_bin2str(uuid, str, sizeof(str));
1119 			wpa_printf(MSG_DEBUG, "WPS UPnP: Could not find "
1120 				   "SID %s", str);
1121 			ret = HTTP_PRECONDITION_FAILED;
1122 			goto error;
1123 		}
1124 	} else if (callback_urls) {
1125 		wpa_printf(MSG_DEBUG, "WPS UPnP: New subscription");
1126 		if (!got_nt) {
1127 			ret = HTTP_PRECONDITION_FAILED;
1128 			goto error;
1129 		}
1130 		s = subscription_start(sm, callback_urls);
1131 		if (s == NULL) {
1132 			ret = HTTP_INTERNAL_SERVER_ERROR;
1133 			goto error;
1134 		}
1135 	} else {
1136 		ret = HTTP_PRECONDITION_FAILED;
1137 		goto error;
1138 	}
1139 
1140 	/* success */
1141 	http_put_reply_code(buf, HTTP_OK);
1142 	wpabuf_put_str(buf, http_server_hdr);
1143 	wpabuf_put_str(buf, http_connection_close);
1144 	wpabuf_put_str(buf, "Content-Length: 0\r\n");
1145 	wpabuf_put_str(buf, "SID: uuid:");
1146 	/* subscription id */
1147 	b = wpabuf_put(buf, 0);
1148 	uuid_bin2str(s->uuid, b, 80);
1149 	wpa_printf(MSG_DEBUG, "WPS UPnP: Assigned SID %s", b);
1150 	wpabuf_put(buf, os_strlen(b));
1151 	wpabuf_put_str(buf, "\r\n");
1152 	wpabuf_printf(buf, "Timeout: Second-%d\r\n", UPNP_SUBSCRIBE_SEC);
1153 	http_put_date(buf);
1154 	/* And empty line to terminate header: */
1155 	wpabuf_put_str(buf, "\r\n");
1156 
1157 	os_free(callback_urls);
1158 	http_request_send_and_deinit(req, buf);
1159 	return;
1160 
1161 error:
1162 	/* Per UPnP spec:
1163 	* Errors
1164 	* Incompatible headers
1165 	*   400 Bad Request. If SID header and one of NT or CALLBACK headers
1166 	*     are present, the publisher must respond with HTTP error
1167 	*     400 Bad Request.
1168 	* Missing or invalid CALLBACK
1169 	*   412 Precondition Failed. If CALLBACK header is missing or does not
1170 	*     contain a valid HTTP URL, the publisher must respond with HTTP
1171 	*     error 412 Precondition Failed.
1172 	* Invalid NT
1173 	*   412 Precondition Failed. If NT header does not equal upnp:event,
1174 	*     the publisher must respond with HTTP error 412 Precondition
1175 	*     Failed.
1176 	* [For resubscription, use 412 if unknown uuid].
1177 	* Unable to accept subscription
1178 	*   5xx. If a publisher is not able to accept a subscription (such as
1179 	*     due to insufficient resources), it must respond with a
1180 	*     HTTP 500-series error code.
1181 	*   599 Too many subscriptions (not a standard HTTP error)
1182 	*/
1183 	wpa_printf(MSG_DEBUG, "WPS UPnP: SUBSCRIBE failed - return %d", ret);
1184 	http_put_empty(buf, ret);
1185 	http_request_send_and_deinit(req, buf);
1186 	os_free(callback_urls);
1187 }
1188 
1189 
1190 /* Given that we have received a header w/ UNSUBSCRIBE, act upon it
1191  *
1192  * Format of UNSUBSCRIBE (case-insensitive):
1193  *
1194  * First line must be:
1195  *      UNSUBSCRIBE /wps_event HTTP/1.1
1196  *
1197  * Our response (if no error) which includes only required lines is:
1198  * HTTP/1.1 200 OK
1199  * Content-Length: 0
1200  *
1201  * Header lines must end with \r\n
1202  * Per RFC 2616, content-length: is not required but connection:close
1203  * would appear to be required (given that we will be closing it!).
1204  */
1205 static void web_connection_parse_unsubscribe(struct upnp_wps_device_sm *sm,
1206 					     struct http_request *req,
1207 					     const char *filename)
1208 {
1209 	struct wpabuf *buf;
1210 	char *hdr = http_request_get_hdr(req);
1211 	char *h;
1212 	char *match;
1213 	int match_len;
1214 	char *end;
1215 	u8 uuid[UUID_LEN];
1216 	int got_uuid = 0;
1217 	struct subscription *s = NULL;
1218 	enum http_reply_code ret = HTTP_INTERNAL_SERVER_ERROR;
1219 
1220 	/* Parse/validate headers */
1221 	h = hdr;
1222 	/* First line: UNSUBSCRIBE /wps_event HTTP/1.1
1223 	 * has already been parsed.
1224 	 */
1225 	if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) {
1226 		ret = HTTP_PRECONDITION_FAILED;
1227 		goto send_msg;
1228 	}
1229 	wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP UNSUBSCRIBE for event");
1230 	end = os_strchr(h, '\n');
1231 
1232 	while (end) {
1233 		/* Option line by option line */
1234 		h = end + 1;
1235 		end = os_strchr(h, '\n');
1236 		if (end == NULL)
1237 			break; /* no unterminated lines allowed */
1238 
1239 		/* HOST should refer to us */
1240 #if 0
1241 		match = "HOST:";
1242 		match_len = os_strlen(match);
1243 		if (os_strncasecmp(h, match, match_len) == 0) {
1244 			h += match_len;
1245 			while (*h == ' ' || *h == '\t')
1246 				h++;
1247 			.....
1248 		}
1249 #endif
1250 		match = "SID:";
1251 		match_len = os_strlen(match);
1252 		if (os_strncasecmp(h, match, match_len) == 0) {
1253 			h += match_len;
1254 			while (*h == ' ' || *h == '\t')
1255 				h++;
1256 			match = "uuid:";
1257 			match_len = os_strlen(match);
1258 			if (os_strncasecmp(h, match, match_len) != 0) {
1259 				ret = HTTP_BAD_REQUEST;
1260 				goto send_msg;
1261 			}
1262 			h += match_len;
1263 			while (*h == ' ' || *h == '\t')
1264 				h++;
1265 			if (uuid_str2bin(h, uuid)) {
1266 				ret = HTTP_BAD_REQUEST;
1267 				goto send_msg;
1268 			}
1269 			got_uuid = 1;
1270 			continue;
1271 		}
1272 
1273 		match = "NT:";
1274 		match_len = os_strlen(match);
1275 		if (os_strncasecmp(h, match, match_len) == 0) {
1276 			ret = HTTP_BAD_REQUEST;
1277 			goto send_msg;
1278 		}
1279 
1280 		match = "CALLBACK:";
1281 		match_len = os_strlen(match);
1282 		if (os_strncasecmp(h, match, match_len) == 0) {
1283 			ret = HTTP_BAD_REQUEST;
1284 			goto send_msg;
1285 		}
1286 	}
1287 
1288 	if (got_uuid) {
1289 		char str[80];
1290 
1291 		uuid_bin2str(uuid, str, sizeof(str));
1292 
1293 		s = subscription_find(sm, uuid);
1294 		if (s) {
1295 			struct subscr_addr *sa;
1296 			sa = dl_list_first(&s->addr_list, struct subscr_addr,
1297 					   list);
1298 			wpa_printf(MSG_DEBUG,
1299 				   "WPS UPnP: Unsubscribing %p (SID %s) %s",
1300 				   s, str, (sa && sa->domain_and_port) ?
1301 				   sa->domain_and_port : "-null-");
1302 			dl_list_del(&s->list);
1303 			subscription_destroy(s);
1304 		} else {
1305 			wpa_printf(MSG_INFO,
1306 				   "WPS UPnP: Could not find matching subscription to unsubscribe (SID %s)",
1307 				   str);
1308 			ret = HTTP_PRECONDITION_FAILED;
1309 			goto send_msg;
1310 		}
1311 	} else {
1312 		wpa_printf(MSG_INFO, "WPS UPnP: Unsubscribe fails (not "
1313 			   "found)");
1314 		ret = HTTP_PRECONDITION_FAILED;
1315 		goto send_msg;
1316 	}
1317 
1318 	ret = HTTP_OK;
1319 
1320 send_msg:
1321 	buf = wpabuf_alloc(200);
1322 	if (buf == NULL) {
1323 		http_request_deinit(req);
1324 		return;
1325 	}
1326 	http_put_empty(buf, ret);
1327 	http_request_send_and_deinit(req, buf);
1328 }
1329 
1330 
1331 /* Send error in response to unknown requests */
1332 static void web_connection_unimplemented(struct http_request *req)
1333 {
1334 	struct wpabuf *buf;
1335 	buf = wpabuf_alloc(200);
1336 	if (buf == NULL) {
1337 		http_request_deinit(req);
1338 		return;
1339 	}
1340 	http_put_empty(buf, HTTP_UNIMPLEMENTED);
1341 	http_request_send_and_deinit(req, buf);
1342 }
1343 
1344 
1345 
1346 /* Called when we have gotten an apparently valid http request.
1347  */
1348 static void web_connection_check_data(void *ctx, struct http_request *req)
1349 {
1350 	struct upnp_wps_device_sm *sm = ctx;
1351 	enum httpread_hdr_type htype = http_request_get_type(req);
1352 	char *filename = http_request_get_uri(req);
1353 	struct sockaddr_in *cli = http_request_get_cli_addr(req);
1354 
1355 	if (!filename) {
1356 		wpa_printf(MSG_INFO, "WPS UPnP: Could not get HTTP URI");
1357 		http_request_deinit(req);
1358 		return;
1359 	}
1360 	/* Trim leading slashes from filename */
1361 	while (*filename == '/')
1362 		filename++;
1363 
1364 	wpa_printf(MSG_DEBUG, "WPS UPnP: Got HTTP request type %d from %s:%d",
1365 		   htype, inet_ntoa(cli->sin_addr), htons(cli->sin_port));
1366 
1367 	switch (htype) {
1368 	case HTTPREAD_HDR_TYPE_GET:
1369 		web_connection_parse_get(sm, req, filename);
1370 		break;
1371 	case HTTPREAD_HDR_TYPE_POST:
1372 		web_connection_parse_post(sm, cli, req, filename);
1373 		break;
1374 	case HTTPREAD_HDR_TYPE_SUBSCRIBE:
1375 		web_connection_parse_subscribe(sm, req, filename);
1376 		break;
1377 	case HTTPREAD_HDR_TYPE_UNSUBSCRIBE:
1378 		web_connection_parse_unsubscribe(sm, req, filename);
1379 		break;
1380 
1381 		/* We are not required to support M-POST; just plain
1382 		 * POST is supposed to work, so we only support that.
1383 		 * If for some reason we need to support M-POST, it is
1384 		 * mostly the same as POST, with small differences.
1385 		 */
1386 	default:
1387 		/* Send 501 for anything else */
1388 		web_connection_unimplemented(req);
1389 		break;
1390 	}
1391 }
1392 
1393 
1394 /*
1395  * Listening for web connections
1396  * We have a single TCP listening port, and hand off connections as we get
1397  * them.
1398  */
1399 
1400 void web_listener_stop(struct upnp_wps_device_sm *sm)
1401 {
1402 	http_server_deinit(sm->web_srv);
1403 	sm->web_srv = NULL;
1404 }
1405 
1406 
1407 int web_listener_start(struct upnp_wps_device_sm *sm)
1408 {
1409 	struct in_addr addr;
1410 	addr.s_addr = sm->ip_addr;
1411 	sm->web_srv = http_server_init(&addr, -1, web_connection_check_data,
1412 				       sm);
1413 	if (sm->web_srv == NULL) {
1414 		web_listener_stop(sm);
1415 		return -1;
1416 	}
1417 	sm->web_port = http_server_get_port(sm->web_srv);
1418 
1419 	return 0;
1420 }
1421