1 /*
2  * wpa_supplicant - P2P service discovery
3  * Copyright (c) 2009-2010, Atheros Communications
4  * Copyright (c) 2010-2014, Jouni Malinen <j@w1.fi>
5  *
6  * This software may be distributed under the terms of the BSD license.
7  * See README for more details.
8  */
9 
10 #include "utils/includes.h"
11 
12 #include "utils/common.h"
13 #include "p2p/p2p.h"
14 #include "wpa_supplicant_i.h"
15 #include "notify.h"
16 #include "p2p_supplicant.h"
17 
18 
19 /*
20  * DNS Header section is used only to calculate compression pointers, so the
21  * contents of this data does not matter, but the length needs to be reserved
22  * in the virtual packet.
23  */
24 #define DNS_HEADER_LEN 12
25 
26 /*
27  * 27-octet in-memory packet from P2P specification containing two implied
28  * queries for _tcp.lcoal. PTR IN and _udp.local. PTR IN
29  */
30 #define P2P_SD_IN_MEMORY_LEN 27
31 
32 static int p2p_sd_dns_uncompress_label(char **upos, char *uend, u8 *start,
33 				       u8 **spos, const u8 *end)
34 {
35 	while (*spos < end) {
36 		u8 val = ((*spos)[0] & 0xc0) >> 6;
37 		int len;
38 
39 		if (val == 1 || val == 2) {
40 			/* These are reserved values in RFC 1035 */
41 			wpa_printf(MSG_DEBUG, "P2P: Invalid domain name "
42 				   "sequence starting with 0x%x", val);
43 			return -1;
44 		}
45 
46 		if (val == 3) {
47 			u16 offset;
48 			u8 *spos_tmp;
49 
50 			/* Offset */
51 			if (end - *spos < 2) {
52 				wpa_printf(MSG_DEBUG, "P2P: No room for full "
53 					   "DNS offset field");
54 				return -1;
55 			}
56 
57 			offset = (((*spos)[0] & 0x3f) << 8) | (*spos)[1];
58 			if (offset >= *spos - start) {
59 				wpa_printf(MSG_DEBUG, "P2P: Invalid DNS "
60 					   "pointer offset %u", offset);
61 				return -1;
62 			}
63 
64 			(*spos) += 2;
65 			spos_tmp = start + offset;
66 			return p2p_sd_dns_uncompress_label(upos, uend, start,
67 							   &spos_tmp,
68 							   *spos - 2);
69 		}
70 
71 		/* Label */
72 		len = (*spos)[0] & 0x3f;
73 		if (len == 0)
74 			return 0;
75 
76 		(*spos)++;
77 		if (len > end - *spos) {
78 			wpa_printf(MSG_DEBUG, "P2P: Invalid domain name "
79 				   "sequence - no room for label with length "
80 				   "%u", len);
81 			return -1;
82 		}
83 
84 		if (len + 2 > uend - *upos)
85 			return -2;
86 
87 		os_memcpy(*upos, *spos, len);
88 		*spos += len;
89 		*upos += len;
90 		(*upos)[0] = '.';
91 		(*upos)++;
92 		(*upos)[0] = '\0';
93 	}
94 
95 	return 0;
96 }
97 
98 
99 /* Uncompress domain names per RFC 1035 using the P2P SD in-memory packet.
100  * Returns -1 on parsing error (invalid input sequence), -2 if output buffer is
101  * not large enough */
102 static int p2p_sd_dns_uncompress(char *buf, size_t buf_len, const u8 *msg,
103 				 size_t msg_len, size_t offset)
104 {
105 	/* 27-octet in-memory packet from P2P specification */
106 	const char *prefix = "\x04_tcp\x05local\x00\x00\x0C\x00\x01"
107 		"\x04_udp\xC0\x11\x00\x0C\x00\x01";
108 	u8 *tmp, *end, *spos;
109 	char *upos, *uend;
110 	int ret = 0;
111 
112 	if (buf_len < 2)
113 		return -1;
114 	if (offset > msg_len)
115 		return -1;
116 
117 	tmp = os_malloc(DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN + msg_len);
118 	if (tmp == NULL)
119 		return -1;
120 	spos = tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN;
121 	end = spos + msg_len;
122 	spos += offset;
123 
124 	os_memset(tmp, 0, DNS_HEADER_LEN);
125 	os_memcpy(tmp + DNS_HEADER_LEN, prefix, P2P_SD_IN_MEMORY_LEN);
126 	os_memcpy(tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN, msg, msg_len);
127 
128 	upos = buf;
129 	uend = buf + buf_len;
130 
131 	ret = p2p_sd_dns_uncompress_label(&upos, uend, tmp, &spos, end);
132 	if (ret) {
133 		os_free(tmp);
134 		return ret;
135 	}
136 
137 	if (upos == buf) {
138 		upos[0] = '.';
139 		upos[1] = '\0';
140 	} else if (upos[-1] == '.')
141 		upos[-1] = '\0';
142 
143 	os_free(tmp);
144 	return 0;
145 }
146 
147 
148 static struct p2p_srv_bonjour *
149 wpas_p2p_service_get_bonjour(struct wpa_supplicant *wpa_s,
150 			     const struct wpabuf *query)
151 {
152 	struct p2p_srv_bonjour *bsrv;
153 	size_t len;
154 
155 	len = wpabuf_len(query);
156 	dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour,
157 			 struct p2p_srv_bonjour, list) {
158 		if (len == wpabuf_len(bsrv->query) &&
159 		    os_memcmp(wpabuf_head(query), wpabuf_head(bsrv->query),
160 			      len) == 0)
161 			return bsrv;
162 	}
163 	return NULL;
164 }
165 
166 
167 static struct p2p_srv_upnp *
168 wpas_p2p_service_get_upnp(struct wpa_supplicant *wpa_s, u8 version,
169 			  const char *service)
170 {
171 	struct p2p_srv_upnp *usrv;
172 
173 	dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp,
174 			 struct p2p_srv_upnp, list) {
175 		if (version == usrv->version &&
176 		    os_strcmp(service, usrv->service) == 0)
177 			return usrv;
178 	}
179 	return NULL;
180 }
181 
182 
183 static void wpas_sd_add_empty(struct wpabuf *resp, u8 srv_proto,
184 			      u8 srv_trans_id, u8 status)
185 {
186 	u8 *len_pos;
187 
188 	if (wpabuf_tailroom(resp) < 5)
189 		return;
190 
191 	/* Length (to be filled) */
192 	len_pos = wpabuf_put(resp, 2);
193 	wpabuf_put_u8(resp, srv_proto);
194 	wpabuf_put_u8(resp, srv_trans_id);
195 	/* Status Code */
196 	wpabuf_put_u8(resp, status);
197 	/* Response Data: empty */
198 	WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
199 }
200 
201 
202 static void wpas_sd_add_proto_not_avail(struct wpabuf *resp, u8 srv_proto,
203 					u8 srv_trans_id)
204 {
205 	wpas_sd_add_empty(resp, srv_proto, srv_trans_id,
206 			  P2P_SD_PROTO_NOT_AVAILABLE);
207 }
208 
209 
210 static void wpas_sd_add_bad_request(struct wpabuf *resp, u8 srv_proto,
211 				    u8 srv_trans_id)
212 {
213 	wpas_sd_add_empty(resp, srv_proto, srv_trans_id, P2P_SD_BAD_REQUEST);
214 }
215 
216 
217 static void wpas_sd_add_not_found(struct wpabuf *resp, u8 srv_proto,
218 				  u8 srv_trans_id)
219 {
220 	wpas_sd_add_empty(resp, srv_proto, srv_trans_id,
221 			  P2P_SD_REQUESTED_INFO_NOT_AVAILABLE);
222 }
223 
224 
225 static void wpas_sd_all_bonjour(struct wpa_supplicant *wpa_s,
226 				struct wpabuf *resp, u8 srv_trans_id)
227 {
228 	struct p2p_srv_bonjour *bsrv;
229 	u8 *len_pos;
230 
231 	wpa_printf(MSG_DEBUG, "P2P: SD Request for all Bonjour services");
232 
233 	if (dl_list_empty(&wpa_s->global->p2p_srv_bonjour)) {
234 		wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available");
235 		return;
236 	}
237 
238 	dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour,
239 			 struct p2p_srv_bonjour, list) {
240 		if (wpabuf_tailroom(resp) <
241 		    5 + wpabuf_len(bsrv->query) + wpabuf_len(bsrv->resp))
242 			return;
243 		/* Length (to be filled) */
244 		len_pos = wpabuf_put(resp, 2);
245 		wpabuf_put_u8(resp, P2P_SERV_BONJOUR);
246 		wpabuf_put_u8(resp, srv_trans_id);
247 		/* Status Code */
248 		wpabuf_put_u8(resp, P2P_SD_SUCCESS);
249 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service",
250 				  wpabuf_head(bsrv->resp),
251 				  wpabuf_len(bsrv->resp));
252 		/* Response Data */
253 		wpabuf_put_buf(resp, bsrv->query); /* Key */
254 		wpabuf_put_buf(resp, bsrv->resp); /* Value */
255 		WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos -
256 			     2);
257 	}
258 }
259 
260 
261 static int match_bonjour_query(struct p2p_srv_bonjour *bsrv, const u8 *query,
262 			       size_t query_len)
263 {
264 	char str_rx[256], str_srv[256];
265 
266 	if (query_len < 3 || wpabuf_len(bsrv->query) < 3)
267 		return 0; /* Too short to include DNS Type and Version */
268 	if (os_memcmp(query + query_len - 3,
269 		      wpabuf_head_u8(bsrv->query) + wpabuf_len(bsrv->query) - 3,
270 		      3) != 0)
271 		return 0; /* Mismatch in DNS Type or Version */
272 	if (query_len == wpabuf_len(bsrv->query) &&
273 	    os_memcmp(query, wpabuf_head(bsrv->query), query_len - 3) == 0)
274 		return 1; /* Binary match */
275 
276 	if (p2p_sd_dns_uncompress(str_rx, sizeof(str_rx), query, query_len - 3,
277 				  0))
278 		return 0; /* Failed to uncompress query */
279 	if (p2p_sd_dns_uncompress(str_srv, sizeof(str_srv),
280 				  wpabuf_head(bsrv->query),
281 				  wpabuf_len(bsrv->query) - 3, 0))
282 		return 0; /* Failed to uncompress service */
283 
284 	return os_strcmp(str_rx, str_srv) == 0;
285 }
286 
287 
288 static void wpas_sd_req_bonjour(struct wpa_supplicant *wpa_s,
289 				struct wpabuf *resp, u8 srv_trans_id,
290 				const u8 *query, size_t query_len)
291 {
292 	struct p2p_srv_bonjour *bsrv;
293 	u8 *len_pos;
294 	int matches = 0;
295 
296 	wpa_hexdump_ascii(MSG_DEBUG, "P2P: SD Request for Bonjour",
297 			  query, query_len);
298 	if (dl_list_empty(&wpa_s->global->p2p_srv_bonjour)) {
299 		wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available");
300 		wpas_sd_add_proto_not_avail(resp, P2P_SERV_BONJOUR,
301 					    srv_trans_id);
302 		return;
303 	}
304 
305 	if (query_len == 0) {
306 		wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id);
307 		return;
308 	}
309 
310 	dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour,
311 			 struct p2p_srv_bonjour, list) {
312 		if (!match_bonjour_query(bsrv, query, query_len))
313 			continue;
314 
315 		if (wpabuf_tailroom(resp) <
316 		    5 + query_len + wpabuf_len(bsrv->resp))
317 			return;
318 
319 		matches++;
320 
321 		/* Length (to be filled) */
322 		len_pos = wpabuf_put(resp, 2);
323 		wpabuf_put_u8(resp, P2P_SERV_BONJOUR);
324 		wpabuf_put_u8(resp, srv_trans_id);
325 
326 		/* Status Code */
327 		wpabuf_put_u8(resp, P2P_SD_SUCCESS);
328 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service",
329 				  wpabuf_head(bsrv->resp),
330 				  wpabuf_len(bsrv->resp));
331 
332 		/* Response Data */
333 		wpabuf_put_data(resp, query, query_len); /* Key */
334 		wpabuf_put_buf(resp, bsrv->resp); /* Value */
335 
336 		WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
337 	}
338 
339 	if (matches == 0) {
340 		wpa_printf(MSG_DEBUG, "P2P: Requested Bonjour service not "
341 			   "available");
342 		if (wpabuf_tailroom(resp) < 5)
343 			return;
344 
345 		/* Length (to be filled) */
346 		len_pos = wpabuf_put(resp, 2);
347 		wpabuf_put_u8(resp, P2P_SERV_BONJOUR);
348 		wpabuf_put_u8(resp, srv_trans_id);
349 
350 		/* Status Code */
351 		wpabuf_put_u8(resp, P2P_SD_REQUESTED_INFO_NOT_AVAILABLE);
352 		/* Response Data: empty */
353 		WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos -
354 			     2);
355 	}
356 }
357 
358 
359 static void wpas_sd_all_upnp(struct wpa_supplicant *wpa_s,
360 			     struct wpabuf *resp, u8 srv_trans_id)
361 {
362 	struct p2p_srv_upnp *usrv;
363 	u8 *len_pos;
364 
365 	wpa_printf(MSG_DEBUG, "P2P: SD Request for all UPnP services");
366 
367 	if (dl_list_empty(&wpa_s->global->p2p_srv_upnp)) {
368 		wpa_printf(MSG_DEBUG, "P2P: UPnP protocol not available");
369 		return;
370 	}
371 
372 	dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp,
373 			 struct p2p_srv_upnp, list) {
374 		if (wpabuf_tailroom(resp) < 5 + 1 + os_strlen(usrv->service))
375 			return;
376 
377 		/* Length (to be filled) */
378 		len_pos = wpabuf_put(resp, 2);
379 		wpabuf_put_u8(resp, P2P_SERV_UPNP);
380 		wpabuf_put_u8(resp, srv_trans_id);
381 
382 		/* Status Code */
383 		wpabuf_put_u8(resp, P2P_SD_SUCCESS);
384 		/* Response Data */
385 		wpabuf_put_u8(resp, usrv->version);
386 		wpa_printf(MSG_DEBUG, "P2P: Matching UPnP Service: %s",
387 			   usrv->service);
388 		wpabuf_put_str(resp, usrv->service);
389 		WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos -
390 			     2);
391 	}
392 }
393 
394 
395 static void wpas_sd_req_upnp(struct wpa_supplicant *wpa_s,
396 			     struct wpabuf *resp, u8 srv_trans_id,
397 			     const u8 *query, size_t query_len)
398 {
399 	struct p2p_srv_upnp *usrv;
400 	u8 *len_pos;
401 	u8 version;
402 	char *str;
403 	int count = 0;
404 
405 	wpa_hexdump_ascii(MSG_DEBUG, "P2P: SD Request for UPnP",
406 			  query, query_len);
407 
408 	if (dl_list_empty(&wpa_s->global->p2p_srv_upnp)) {
409 		wpa_printf(MSG_DEBUG, "P2P: UPnP protocol not available");
410 		wpas_sd_add_proto_not_avail(resp, P2P_SERV_UPNP,
411 					    srv_trans_id);
412 		return;
413 	}
414 
415 	if (query_len == 0) {
416 		wpas_sd_all_upnp(wpa_s, resp, srv_trans_id);
417 		return;
418 	}
419 
420 	if (wpabuf_tailroom(resp) < 5)
421 		return;
422 
423 	/* Length (to be filled) */
424 	len_pos = wpabuf_put(resp, 2);
425 	wpabuf_put_u8(resp, P2P_SERV_UPNP);
426 	wpabuf_put_u8(resp, srv_trans_id);
427 
428 	version = query[0];
429 	str = os_malloc(query_len);
430 	if (str == NULL)
431 		return;
432 	os_memcpy(str, query + 1, query_len - 1);
433 	str[query_len - 1] = '\0';
434 
435 	dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp,
436 			 struct p2p_srv_upnp, list) {
437 		if (version != usrv->version)
438 			continue;
439 
440 		if (os_strcmp(str, "ssdp:all") != 0 &&
441 		    os_strstr(usrv->service, str) == NULL)
442 			continue;
443 
444 		if (wpabuf_tailroom(resp) < 2)
445 			break;
446 		if (count == 0) {
447 			/* Status Code */
448 			wpabuf_put_u8(resp, P2P_SD_SUCCESS);
449 			/* Response Data */
450 			wpabuf_put_u8(resp, version);
451 		} else
452 			wpabuf_put_u8(resp, ',');
453 
454 		count++;
455 
456 		wpa_printf(MSG_DEBUG, "P2P: Matching UPnP Service: %s",
457 			   usrv->service);
458 		if (wpabuf_tailroom(resp) < os_strlen(usrv->service))
459 			break;
460 		wpabuf_put_str(resp, usrv->service);
461 	}
462 	os_free(str);
463 
464 	if (count == 0) {
465 		wpa_printf(MSG_DEBUG, "P2P: Requested UPnP service not "
466 			   "available");
467 		/* Status Code */
468 		wpabuf_put_u8(resp, P2P_SD_REQUESTED_INFO_NOT_AVAILABLE);
469 		/* Response Data: empty */
470 	}
471 
472 	WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
473 }
474 
475 
476 #ifdef CONFIG_WIFI_DISPLAY
477 static void wpas_sd_req_wfd(struct wpa_supplicant *wpa_s,
478 			    struct wpabuf *resp, u8 srv_trans_id,
479 			    const u8 *query, size_t query_len)
480 {
481 	const u8 *pos;
482 	u8 role;
483 	u8 *len_pos;
484 
485 	wpa_hexdump(MSG_DEBUG, "P2P: SD Request for WFD", query, query_len);
486 
487 	if (!wpa_s->global->wifi_display) {
488 		wpa_printf(MSG_DEBUG, "P2P: WFD protocol not available");
489 		wpas_sd_add_proto_not_avail(resp, P2P_SERV_WIFI_DISPLAY,
490 					    srv_trans_id);
491 		return;
492 	}
493 
494 	if (query_len < 1) {
495 		wpa_printf(MSG_DEBUG, "P2P: Missing WFD Requested Device "
496 			   "Role");
497 		return;
498 	}
499 
500 	if (wpabuf_tailroom(resp) < 5)
501 		return;
502 
503 	pos = query;
504 	role = *pos++;
505 	wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role);
506 
507 	/* TODO: role specific handling */
508 
509 	/* Length (to be filled) */
510 	len_pos = wpabuf_put(resp, 2);
511 	wpabuf_put_u8(resp, P2P_SERV_WIFI_DISPLAY);
512 	wpabuf_put_u8(resp, srv_trans_id);
513 	wpabuf_put_u8(resp, P2P_SD_SUCCESS); /* Status Code */
514 
515 	while (pos < query + query_len) {
516 		if (*pos < MAX_WFD_SUBELEMS &&
517 		    wpa_s->global->wfd_subelem[*pos] &&
518 		    wpabuf_tailroom(resp) >=
519 		    wpabuf_len(wpa_s->global->wfd_subelem[*pos])) {
520 			wpa_printf(MSG_DEBUG, "P2P: Add WSD response "
521 				   "subelement %u", *pos);
522 			wpabuf_put_buf(resp, wpa_s->global->wfd_subelem[*pos]);
523 		}
524 		pos++;
525 	}
526 
527 	WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
528 }
529 #endif /* CONFIG_WIFI_DISPLAY */
530 
531 
532 static int find_p2ps_substr(struct p2ps_advertisement *adv_data,
533 			    const u8 *needle, size_t needle_len)
534 {
535 	const u8 *haystack = (const u8 *) adv_data->svc_info;
536 	size_t haystack_len, i;
537 
538 	/* Allow search term to be empty */
539 	if (!needle || !needle_len)
540 		return 1;
541 
542 	if (!haystack)
543 		return 0;
544 
545 	haystack_len = os_strlen(adv_data->svc_info);
546 	for (i = 0; i < haystack_len; i++) {
547 		if (haystack_len - i < needle_len)
548 			break;
549 		if (os_memcmp(haystack + i, needle, needle_len) == 0)
550 			return 1;
551 	}
552 
553 	return 0;
554 }
555 
556 
557 static void wpas_sd_req_asp(struct wpa_supplicant *wpa_s,
558 			    struct wpabuf *resp, u8 srv_trans_id,
559 			    const u8 *query, size_t query_len)
560 {
561 	struct p2ps_advertisement *adv_data;
562 	const u8 *svc = &query[1];
563 	const u8 *info = NULL;
564 	size_t svc_len = query[0];
565 	size_t info_len = 0;
566 	int prefix = 0;
567 	u8 *count_pos = NULL;
568 	u8 *len_pos = NULL;
569 
570 	wpa_hexdump(MSG_DEBUG, "P2P: SD Request for ASP", query, query_len);
571 
572 	if (!wpa_s->global->p2p) {
573 		wpa_printf(MSG_DEBUG, "P2P: ASP protocol not available");
574 		wpas_sd_add_proto_not_avail(resp, P2P_SERV_P2PS, srv_trans_id);
575 		return;
576 	}
577 
578 	/* Info block is optional */
579 	if (svc_len + 1 < query_len) {
580 		info = &svc[svc_len];
581 		info_len = *info++;
582 	}
583 
584 	/* Range check length of svc string and info block */
585 	if (svc_len + (info_len ? info_len + 2 : 1) > query_len) {
586 		wpa_printf(MSG_DEBUG, "P2P: ASP bad request");
587 		wpas_sd_add_bad_request(resp, P2P_SERV_P2PS, srv_trans_id);
588 		return;
589 	}
590 
591 	/* Detect and correct for prefix search */
592 	if (svc_len && svc[svc_len - 1] == '*') {
593 		prefix = 1;
594 		svc_len--;
595 	}
596 
597 	for (adv_data = p2p_get_p2ps_adv_list(wpa_s->global->p2p);
598 	     adv_data; adv_data = adv_data->next) {
599 		/* If not a prefix match, reject length mismatches */
600 		if (!prefix && svc_len != os_strlen(adv_data->svc_name))
601 			continue;
602 
603 		/* Search each service for request */
604 		if (os_memcmp(adv_data->svc_name, svc, svc_len) == 0 &&
605 		    find_p2ps_substr(adv_data, info, info_len)) {
606 			size_t len = os_strlen(adv_data->svc_name);
607 			size_t svc_info_len = 0;
608 
609 			if (adv_data->svc_info)
610 				svc_info_len = os_strlen(adv_data->svc_info);
611 
612 			if (len > 0xff || svc_info_len > 0xffff)
613 				return;
614 
615 			/* Length & Count to be filled as we go */
616 			if (!len_pos && !count_pos) {
617 				if (wpabuf_tailroom(resp) <
618 				    len + svc_info_len + 16)
619 					return;
620 
621 				len_pos = wpabuf_put(resp, 2);
622 				wpabuf_put_u8(resp, P2P_SERV_P2PS);
623 				wpabuf_put_u8(resp, srv_trans_id);
624 				/* Status Code */
625 				wpabuf_put_u8(resp, P2P_SD_SUCCESS);
626 				count_pos = wpabuf_put(resp, 1);
627 				*count_pos = 0;
628 			} else if (wpabuf_tailroom(resp) <
629 				   len + svc_info_len + 10)
630 				return;
631 
632 			if (svc_info_len) {
633 				wpa_printf(MSG_DEBUG,
634 					   "P2P: Add Svc: %s info: %s",
635 					   adv_data->svc_name,
636 					   adv_data->svc_info);
637 			} else {
638 				wpa_printf(MSG_DEBUG, "P2P: Add Svc: %s",
639 					   adv_data->svc_name);
640 			}
641 
642 			/* Advertisement ID */
643 			wpabuf_put_le32(resp, adv_data->id);
644 
645 			/* Config Methods */
646 			wpabuf_put_be16(resp, adv_data->config_methods);
647 
648 			/* Service Name */
649 			wpabuf_put_u8(resp, (u8) len);
650 			wpabuf_put_data(resp, adv_data->svc_name, len);
651 
652 			/* Service State */
653 			wpabuf_put_u8(resp, adv_data->state);
654 
655 			/* Service Information */
656 			wpabuf_put_le16(resp, (u16) svc_info_len);
657 			wpabuf_put_data(resp, adv_data->svc_info, svc_info_len);
658 
659 			/* Update length and count */
660 			(*count_pos)++;
661 			WPA_PUT_LE16(len_pos,
662 				     (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
663 		}
664 	}
665 
666 	/* Return error if no matching svc found */
667 	if (count_pos == NULL) {
668 		wpa_printf(MSG_DEBUG, "P2P: ASP service not found");
669 		wpas_sd_add_not_found(resp, P2P_SERV_P2PS, srv_trans_id);
670 	}
671 }
672 
673 
674 static void wpas_sd_all_asp(struct wpa_supplicant *wpa_s,
675 			    struct wpabuf *resp, u8 srv_trans_id)
676 {
677 	/* Query data to add all P2PS advertisements:
678 	 *  - Service name length: 1
679 	 *  - Service name: '*'
680 	 *  - Service Information Request Length: 0
681 	 */
682 	const u8 q[] = { 1, (const u8) '*', 0 };
683 
684 	if (p2p_get_p2ps_adv_list(wpa_s->global->p2p))
685 		wpas_sd_req_asp(wpa_s, resp, srv_trans_id, q, sizeof(q));
686 }
687 
688 
689 void wpas_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
690 		     u16 update_indic, const u8 *tlvs, size_t tlvs_len)
691 {
692 	struct wpa_supplicant *wpa_s = ctx;
693 	const u8 *pos = tlvs;
694 	const u8 *end = tlvs + tlvs_len;
695 	const u8 *tlv_end;
696 	u16 slen;
697 	struct wpabuf *resp;
698 	u8 srv_proto, srv_trans_id;
699 	size_t buf_len;
700 	char *buf;
701 
702 	wpa_hexdump(MSG_MSGDUMP, "P2P: Service Discovery Request TLVs",
703 		    tlvs, tlvs_len);
704 	buf_len = 2 * tlvs_len + 1;
705 	buf = os_malloc(buf_len);
706 	if (buf) {
707 		wpa_snprintf_hex(buf, buf_len, tlvs, tlvs_len);
708 		wpa_msg_ctrl(wpa_s, MSG_INFO, P2P_EVENT_SERV_DISC_REQ "%d "
709 			     MACSTR " %u %u %s",
710 			     freq, MAC2STR(sa), dialog_token, update_indic,
711 			     buf);
712 		os_free(buf);
713 	}
714 
715 	if (wpa_s->p2p_sd_over_ctrl_iface) {
716 		wpas_notify_p2p_sd_request(wpa_s, freq, sa, dialog_token,
717 					   update_indic, tlvs, tlvs_len);
718 		return; /* to be processed by an external program */
719 	}
720 
721 	resp = wpabuf_alloc(10000);
722 	if (resp == NULL)
723 		return;
724 
725 	while (end - pos > 1) {
726 		wpa_printf(MSG_DEBUG, "P2P: Service Request TLV");
727 		slen = WPA_GET_LE16(pos);
728 		pos += 2;
729 		if (slen > end - pos || slen < 2) {
730 			wpa_printf(MSG_DEBUG, "P2P: Unexpected Query Data "
731 				   "length");
732 			wpabuf_free(resp);
733 			return;
734 		}
735 		tlv_end = pos + slen;
736 
737 		srv_proto = *pos++;
738 		wpa_printf(MSG_DEBUG, "P2P: Service Protocol Type %u",
739 			   srv_proto);
740 		srv_trans_id = *pos++;
741 		wpa_printf(MSG_DEBUG, "P2P: Service Transaction ID %u",
742 			   srv_trans_id);
743 
744 		wpa_hexdump(MSG_MSGDUMP, "P2P: Query Data",
745 			    pos, tlv_end - pos);
746 
747 
748 		if (wpa_s->force_long_sd) {
749 			wpa_printf(MSG_DEBUG, "P2P: SD test - force long "
750 				   "response");
751 			wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id);
752 			wpas_sd_all_upnp(wpa_s, resp, srv_trans_id);
753 			wpas_sd_all_asp(wpa_s, resp, srv_trans_id);
754 			goto done;
755 		}
756 
757 		switch (srv_proto) {
758 		case P2P_SERV_ALL_SERVICES:
759 			wpa_printf(MSG_DEBUG, "P2P: Service Discovery Request "
760 				   "for all services");
761 			if (dl_list_empty(&wpa_s->global->p2p_srv_upnp) &&
762 			    dl_list_empty(&wpa_s->global->p2p_srv_bonjour) &&
763 			    !p2p_get_p2ps_adv_list(wpa_s->global->p2p)) {
764 				wpa_printf(MSG_DEBUG, "P2P: No service "
765 					   "discovery protocols available");
766 				wpas_sd_add_proto_not_avail(
767 					resp, P2P_SERV_ALL_SERVICES,
768 					srv_trans_id);
769 				break;
770 			}
771 			wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id);
772 			wpas_sd_all_upnp(wpa_s, resp, srv_trans_id);
773 			wpas_sd_all_asp(wpa_s, resp, srv_trans_id);
774 			break;
775 		case P2P_SERV_BONJOUR:
776 			wpas_sd_req_bonjour(wpa_s, resp, srv_trans_id,
777 					    pos, tlv_end - pos);
778 			break;
779 		case P2P_SERV_UPNP:
780 			wpas_sd_req_upnp(wpa_s, resp, srv_trans_id,
781 					 pos, tlv_end - pos);
782 			break;
783 #ifdef CONFIG_WIFI_DISPLAY
784 		case P2P_SERV_WIFI_DISPLAY:
785 			wpas_sd_req_wfd(wpa_s, resp, srv_trans_id,
786 					pos, tlv_end - pos);
787 			break;
788 #endif /* CONFIG_WIFI_DISPLAY */
789 		case P2P_SERV_P2PS:
790 			wpas_sd_req_asp(wpa_s, resp, srv_trans_id,
791 					pos, tlv_end - pos);
792 			break;
793 		default:
794 			wpa_printf(MSG_DEBUG, "P2P: Unavailable service "
795 				   "protocol %u", srv_proto);
796 			wpas_sd_add_proto_not_avail(resp, srv_proto,
797 						    srv_trans_id);
798 			break;
799 		}
800 
801 		pos = tlv_end;
802 	}
803 
804 done:
805 	wpas_notify_p2p_sd_request(wpa_s, freq, sa, dialog_token,
806 				   update_indic, tlvs, tlvs_len);
807 
808 	wpas_p2p_sd_response(wpa_s, freq, sa, dialog_token, resp);
809 
810 	wpabuf_free(resp);
811 }
812 
813 
814 static void wpas_sd_p2ps_serv_response(struct wpa_supplicant *wpa_s,
815 				       const u8 *sa, u8 srv_trans_id,
816 				       const u8 *pos, const u8 *tlv_end)
817 {
818 	u8 left = *pos++;
819 	u32 adv_id;
820 	u8 svc_status;
821 	u16 config_methods;
822 	char svc_str[256];
823 
824 	while (left-- && pos < tlv_end) {
825 		char *buf = NULL;
826 		size_t buf_len;
827 		u8 svc_len;
828 
829 		/* Sanity check fixed length+svc_str */
830 		if (6 >= tlv_end - pos)
831 			break;
832 		svc_len = pos[6];
833 		if (svc_len + 10 > tlv_end - pos)
834 			break;
835 
836 		/* Advertisement ID */
837 		adv_id = WPA_GET_LE32(pos);
838 		pos += sizeof(u32);
839 
840 		/* Config Methods */
841 		config_methods = WPA_GET_BE16(pos);
842 		pos += sizeof(u16);
843 
844 		/* Service Name */
845 		pos++; /* svc_len */
846 		os_memcpy(svc_str, pos, svc_len);
847 		svc_str[svc_len] = '\0';
848 		pos += svc_len;
849 
850 		/* Service Status */
851 		svc_status = *pos++;
852 
853 		/* Service Information Length */
854 		buf_len = WPA_GET_LE16(pos);
855 		pos += sizeof(u16);
856 
857 		/* Sanity check buffer length */
858 		if (buf_len > (unsigned int) (tlv_end - pos))
859 			break;
860 
861 		if (buf_len) {
862 			buf = os_zalloc(2 * buf_len + 1);
863 			if (buf) {
864 				utf8_escape((const char *) pos, buf_len, buf,
865 					    2 * buf_len + 1);
866 			}
867 		}
868 
869 		pos += buf_len;
870 
871 		if (buf) {
872 			wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_SERV_ASP_RESP
873 				       MACSTR " %x %x %x %x %s '%s'",
874 				       MAC2STR(sa), srv_trans_id, adv_id,
875 				       svc_status, config_methods, svc_str,
876 				       buf);
877 			os_free(buf);
878 		} else {
879 			wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_SERV_ASP_RESP
880 				       MACSTR " %x %x %x %x %s",
881 				       MAC2STR(sa), srv_trans_id, adv_id,
882 				       svc_status, config_methods, svc_str);
883 		}
884 	}
885 }
886 
887 
888 void wpas_sd_response(void *ctx, const u8 *sa, u16 update_indic,
889 		      const u8 *tlvs, size_t tlvs_len)
890 {
891 	struct wpa_supplicant *wpa_s = ctx;
892 	const u8 *pos = tlvs;
893 	const u8 *end = tlvs + tlvs_len;
894 	const u8 *tlv_end;
895 	u16 slen;
896 	size_t buf_len;
897 	char *buf;
898 
899 	wpa_hexdump(MSG_MSGDUMP, "P2P: Service Discovery Response TLVs",
900 		    tlvs, tlvs_len);
901 	if (tlvs_len > 1500) {
902 		/* TODO: better way for handling this */
903 		wpa_msg_ctrl(wpa_s, MSG_INFO,
904 			     P2P_EVENT_SERV_DISC_RESP MACSTR
905 			     " %u <long response: %u bytes>",
906 			     MAC2STR(sa), update_indic,
907 			     (unsigned int) tlvs_len);
908 	} else {
909 		buf_len = 2 * tlvs_len + 1;
910 		buf = os_malloc(buf_len);
911 		if (buf) {
912 			wpa_snprintf_hex(buf, buf_len, tlvs, tlvs_len);
913 			wpa_msg_ctrl(wpa_s, MSG_INFO,
914 				     P2P_EVENT_SERV_DISC_RESP MACSTR " %u %s",
915 				     MAC2STR(sa), update_indic, buf);
916 			os_free(buf);
917 		}
918 	}
919 
920 	while (end - pos >= 2) {
921 		u8 srv_proto, srv_trans_id, status;
922 
923 		wpa_printf(MSG_DEBUG, "P2P: Service Response TLV");
924 		slen = WPA_GET_LE16(pos);
925 		pos += 2;
926 		if (slen > end - pos || slen < 3) {
927 			wpa_printf(MSG_DEBUG, "P2P: Unexpected Response Data "
928 				   "length");
929 			return;
930 		}
931 		tlv_end = pos + slen;
932 
933 		srv_proto = *pos++;
934 		wpa_printf(MSG_DEBUG, "P2P: Service Protocol Type %u",
935 			   srv_proto);
936 		srv_trans_id = *pos++;
937 		wpa_printf(MSG_DEBUG, "P2P: Service Transaction ID %u",
938 			   srv_trans_id);
939 		status = *pos++;
940 		wpa_printf(MSG_DEBUG, "P2P: Status Code ID %u",
941 			   status);
942 
943 		wpa_hexdump(MSG_MSGDUMP, "P2P: Response Data",
944 			    pos, tlv_end - pos);
945 
946 		if (srv_proto == P2P_SERV_P2PS && pos < tlv_end) {
947 			wpas_sd_p2ps_serv_response(wpa_s, sa, srv_trans_id,
948 						   pos, tlv_end);
949 		}
950 
951 		pos = tlv_end;
952 	}
953 
954 	wpas_notify_p2p_sd_response(wpa_s, sa, update_indic, tlvs, tlvs_len);
955 }
956 
957 
958 u64 wpas_p2p_sd_request(struct wpa_supplicant *wpa_s, const u8 *dst,
959 			const struct wpabuf *tlvs)
960 {
961 	if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
962 		return 0;
963 	return (uintptr_t) p2p_sd_request(wpa_s->global->p2p, dst, tlvs);
964 }
965 
966 
967 u64 wpas_p2p_sd_request_upnp(struct wpa_supplicant *wpa_s, const u8 *dst,
968 			     u8 version, const char *query)
969 {
970 	struct wpabuf *tlvs;
971 	u64 ret;
972 
973 	tlvs = wpabuf_alloc(2 + 1 + 1 + 1 + os_strlen(query));
974 	if (tlvs == NULL)
975 		return 0;
976 	wpabuf_put_le16(tlvs, 1 + 1 + 1 + os_strlen(query));
977 	wpabuf_put_u8(tlvs, P2P_SERV_UPNP); /* Service Protocol Type */
978 	wpabuf_put_u8(tlvs, 1); /* Service Transaction ID */
979 	wpabuf_put_u8(tlvs, version);
980 	wpabuf_put_str(tlvs, query);
981 	ret = wpas_p2p_sd_request(wpa_s, dst, tlvs);
982 	wpabuf_free(tlvs);
983 	return ret;
984 }
985 
986 
987 u64 wpas_p2p_sd_request_asp(struct wpa_supplicant *wpa_s, const u8 *dst, u8 id,
988 			    const char *svc_str, const char *info_substr)
989 {
990 	struct wpabuf *tlvs;
991 	size_t plen, svc_len, substr_len = 0;
992 	u64 ret;
993 
994 	svc_len = os_strlen(svc_str);
995 	if (info_substr)
996 		substr_len = os_strlen(info_substr);
997 
998 	if (svc_len > 0xff || substr_len > 0xff)
999 		return 0;
1000 
1001 	plen = 1 + 1 + 1 + svc_len + 1 + substr_len;
1002 	tlvs = wpabuf_alloc(2 + plen);
1003 	if (tlvs == NULL)
1004 		return 0;
1005 
1006 	wpabuf_put_le16(tlvs, plen);
1007 	wpabuf_put_u8(tlvs, P2P_SERV_P2PS);
1008 	wpabuf_put_u8(tlvs, id); /* Service Transaction ID */
1009 	wpabuf_put_u8(tlvs, (u8) svc_len); /* Service String Length */
1010 	wpabuf_put_data(tlvs, svc_str, svc_len);
1011 	wpabuf_put_u8(tlvs, (u8) substr_len); /* Info Substring Length */
1012 	wpabuf_put_data(tlvs, info_substr, substr_len);
1013 	ret = wpas_p2p_sd_request(wpa_s, dst, tlvs);
1014 	wpabuf_free(tlvs);
1015 
1016 	return ret;
1017 }
1018 
1019 
1020 #ifdef CONFIG_WIFI_DISPLAY
1021 
1022 static u64 wpas_p2p_sd_request_wfd(struct wpa_supplicant *wpa_s, const u8 *dst,
1023 				   const struct wpabuf *tlvs)
1024 {
1025 	if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
1026 		return 0;
1027 	return (uintptr_t) p2p_sd_request_wfd(wpa_s->global->p2p, dst, tlvs);
1028 }
1029 
1030 
1031 #define MAX_WFD_SD_SUBELEMS 20
1032 
1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role,
1034 				const char *subelems)
1035 {
1036 	u8 *len;
1037 	const char *pos;
1038 	int val;
1039 	int count = 0;
1040 
1041 	len = wpabuf_put(tlvs, 2);
1042 	wpabuf_put_u8(tlvs, P2P_SERV_WIFI_DISPLAY); /* Service Protocol Type */
1043 	wpabuf_put_u8(tlvs, id); /* Service Transaction ID */
1044 
1045 	wpabuf_put_u8(tlvs, role);
1046 
1047 	pos = subelems;
1048 	while (*pos) {
1049 		val = atoi(pos);
1050 		if (val >= 0 && val < 256) {
1051 			wpabuf_put_u8(tlvs, val);
1052 			count++;
1053 			if (count == MAX_WFD_SD_SUBELEMS)
1054 				break;
1055 		}
1056 		pos = os_strchr(pos + 1, ',');
1057 		if (pos == NULL)
1058 			break;
1059 		pos++;
1060 	}
1061 
1062 	WPA_PUT_LE16(len, (u8 *) wpabuf_put(tlvs, 0) - len - 2);
1063 }
1064 
1065 
1066 u64 wpas_p2p_sd_request_wifi_display(struct wpa_supplicant *wpa_s,
1067 				     const u8 *dst, const char *role)
1068 {
1069 	struct wpabuf *tlvs;
1070 	u64 ret;
1071 	const char *subelems;
1072 	u8 id = 1;
1073 
1074 	subelems = os_strchr(role, ' ');
1075 	if (subelems == NULL)
1076 		return 0;
1077 	subelems++;
1078 
1079 	tlvs = wpabuf_alloc(4 * (2 + 1 + 1 + 1 + MAX_WFD_SD_SUBELEMS));
1080 	if (tlvs == NULL)
1081 		return 0;
1082 
1083 	if (os_strstr(role, "[source]"))
1084 		wfd_add_sd_req_role(tlvs, id++, 0x00, subelems);
1085 	if (os_strstr(role, "[pri-sink]"))
1086 		wfd_add_sd_req_role(tlvs, id++, 0x01, subelems);
1087 	if (os_strstr(role, "[sec-sink]"))
1088 		wfd_add_sd_req_role(tlvs, id++, 0x02, subelems);
1089 	if (os_strstr(role, "[source+sink]"))
1090 		wfd_add_sd_req_role(tlvs, id++, 0x03, subelems);
1091 
1092 	ret = wpas_p2p_sd_request_wfd(wpa_s, dst, tlvs);
1093 	wpabuf_free(tlvs);
1094 	return ret;
1095 }
1096 
1097 #endif /* CONFIG_WIFI_DISPLAY */
1098 
1099 
1100 int wpas_p2p_sd_cancel_request(struct wpa_supplicant *wpa_s, u64 req)
1101 {
1102 	if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
1103 		return -1;
1104 	return p2p_sd_cancel_request(wpa_s->global->p2p,
1105 				     (void *) (uintptr_t) req);
1106 }
1107 
1108 
1109 void wpas_p2p_sd_response(struct wpa_supplicant *wpa_s, int freq,
1110 			  const u8 *dst, u8 dialog_token,
1111 			  const struct wpabuf *resp_tlvs)
1112 {
1113 	if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
1114 		return;
1115 	p2p_sd_response(wpa_s->global->p2p, freq, dst, dialog_token,
1116 			resp_tlvs);
1117 }
1118 
1119 
1120 void wpas_p2p_sd_service_update(struct wpa_supplicant *wpa_s)
1121 {
1122 	if (wpa_s->global->p2p)
1123 		p2p_sd_service_update(wpa_s->global->p2p);
1124 }
1125 
1126 
1127 static void wpas_p2p_srv_bonjour_free(struct p2p_srv_bonjour *bsrv)
1128 {
1129 	dl_list_del(&bsrv->list);
1130 	wpabuf_free(bsrv->query);
1131 	wpabuf_free(bsrv->resp);
1132 	os_free(bsrv);
1133 }
1134 
1135 
1136 static void wpas_p2p_srv_upnp_free(struct p2p_srv_upnp *usrv)
1137 {
1138 	dl_list_del(&usrv->list);
1139 	os_free(usrv->service);
1140 	os_free(usrv);
1141 }
1142 
1143 
1144 void wpas_p2p_service_flush(struct wpa_supplicant *wpa_s)
1145 {
1146 	struct p2p_srv_bonjour *bsrv, *bn;
1147 	struct p2p_srv_upnp *usrv, *un;
1148 
1149 	dl_list_for_each_safe(bsrv, bn, &wpa_s->global->p2p_srv_bonjour,
1150 			      struct p2p_srv_bonjour, list)
1151 		wpas_p2p_srv_bonjour_free(bsrv);
1152 
1153 	dl_list_for_each_safe(usrv, un, &wpa_s->global->p2p_srv_upnp,
1154 			      struct p2p_srv_upnp, list)
1155 		wpas_p2p_srv_upnp_free(usrv);
1156 
1157 	wpas_p2p_service_flush_asp(wpa_s);
1158 	wpas_p2p_sd_service_update(wpa_s);
1159 }
1160 
1161 
1162 int wpas_p2p_service_p2ps_id_exists(struct wpa_supplicant *wpa_s, u32 adv_id)
1163 {
1164 	if (adv_id == 0)
1165 		return 1;
1166 
1167 	if (p2p_service_p2ps_id(wpa_s->global->p2p, adv_id))
1168 		return 1;
1169 
1170 	return 0;
1171 }
1172 
1173 
1174 int wpas_p2p_service_del_asp(struct wpa_supplicant *wpa_s, u32 adv_id)
1175 {
1176 	int ret;
1177 
1178 	ret = p2p_service_del_asp(wpa_s->global->p2p, adv_id);
1179 	if (ret == 0)
1180 		wpas_p2p_sd_service_update(wpa_s);
1181 	return ret;
1182 }
1183 
1184 
1185 int wpas_p2p_service_add_asp(struct wpa_supplicant *wpa_s,
1186 			     int auto_accept, u32 adv_id,
1187 			     const char *adv_str, u8 svc_state,
1188 			     u16 config_methods, const char *svc_info,
1189 			     const u8 *cpt_priority)
1190 {
1191 	int ret;
1192 
1193 	ret = p2p_service_add_asp(wpa_s->global->p2p, auto_accept, adv_id,
1194 				  adv_str, svc_state, config_methods,
1195 				  svc_info, cpt_priority);
1196 	if (ret == 0)
1197 		wpas_p2p_sd_service_update(wpa_s);
1198 	return ret;
1199 }
1200 
1201 
1202 void wpas_p2p_service_flush_asp(struct wpa_supplicant *wpa_s)
1203 {
1204 	p2p_service_flush_asp(wpa_s->global->p2p);
1205 }
1206 
1207 
1208 int wpas_p2p_service_add_bonjour(struct wpa_supplicant *wpa_s,
1209 				 struct wpabuf *query, struct wpabuf *resp)
1210 {
1211 	struct p2p_srv_bonjour *bsrv;
1212 
1213 	bsrv = os_zalloc(sizeof(*bsrv));
1214 	if (bsrv == NULL)
1215 		return -1;
1216 	bsrv->query = query;
1217 	bsrv->resp = resp;
1218 	dl_list_add(&wpa_s->global->p2p_srv_bonjour, &bsrv->list);
1219 
1220 	wpas_p2p_sd_service_update(wpa_s);
1221 	return 0;
1222 }
1223 
1224 
1225 int wpas_p2p_service_del_bonjour(struct wpa_supplicant *wpa_s,
1226 				 const struct wpabuf *query)
1227 {
1228 	struct p2p_srv_bonjour *bsrv;
1229 
1230 	bsrv = wpas_p2p_service_get_bonjour(wpa_s, query);
1231 	if (bsrv == NULL)
1232 		return -1;
1233 	wpas_p2p_srv_bonjour_free(bsrv);
1234 	wpas_p2p_sd_service_update(wpa_s);
1235 	return 0;
1236 }
1237 
1238 
1239 int wpas_p2p_service_add_upnp(struct wpa_supplicant *wpa_s, u8 version,
1240 			      const char *service)
1241 {
1242 	struct p2p_srv_upnp *usrv;
1243 
1244 	if (wpas_p2p_service_get_upnp(wpa_s, version, service))
1245 		return 0; /* Already listed */
1246 	usrv = os_zalloc(sizeof(*usrv));
1247 	if (usrv == NULL)
1248 		return -1;
1249 	usrv->version = version;
1250 	usrv->service = os_strdup(service);
1251 	if (usrv->service == NULL) {
1252 		os_free(usrv);
1253 		return -1;
1254 	}
1255 	dl_list_add(&wpa_s->global->p2p_srv_upnp, &usrv->list);
1256 
1257 	wpas_p2p_sd_service_update(wpa_s);
1258 	return 0;
1259 }
1260 
1261 
1262 int wpas_p2p_service_del_upnp(struct wpa_supplicant *wpa_s, u8 version,
1263 			      const char *service)
1264 {
1265 	struct p2p_srv_upnp *usrv;
1266 
1267 	usrv = wpas_p2p_service_get_upnp(wpa_s, version, service);
1268 	if (usrv == NULL)
1269 		return -1;
1270 	wpas_p2p_srv_upnp_free(usrv);
1271 	wpas_p2p_sd_service_update(wpa_s);
1272 	return 0;
1273 }
1274