1 /* 2 * wpa_supplicant - P2P service discovery 3 * Copyright (c) 2009-2010, Atheros Communications 4 * Copyright (c) 2010-2014, Jouni Malinen <j@w1.fi> 5 * 6 * This software may be distributed under the terms of the BSD license. 7 * See README for more details. 8 */ 9 10 #include "utils/includes.h" 11 12 #include "utils/common.h" 13 #include "p2p/p2p.h" 14 #include "wpa_supplicant_i.h" 15 #include "notify.h" 16 #include "p2p_supplicant.h" 17 18 19 /* 20 * DNS Header section is used only to calculate compression pointers, so the 21 * contents of this data does not matter, but the length needs to be reserved 22 * in the virtual packet. 23 */ 24 #define DNS_HEADER_LEN 12 25 26 /* 27 * 27-octet in-memory packet from P2P specification containing two implied 28 * queries for _tcp.lcoal. PTR IN and _udp.local. PTR IN 29 */ 30 #define P2P_SD_IN_MEMORY_LEN 27 31 32 static int p2p_sd_dns_uncompress_label(char **upos, char *uend, u8 *start, 33 u8 **spos, const u8 *end) 34 { 35 while (*spos < end) { 36 u8 val = ((*spos)[0] & 0xc0) >> 6; 37 int len; 38 39 if (val == 1 || val == 2) { 40 /* These are reserved values in RFC 1035 */ 41 wpa_printf(MSG_DEBUG, "P2P: Invalid domain name " 42 "sequence starting with 0x%x", val); 43 return -1; 44 } 45 46 if (val == 3) { 47 u16 offset; 48 u8 *spos_tmp; 49 50 /* Offset */ 51 if (end - *spos < 2) { 52 wpa_printf(MSG_DEBUG, "P2P: No room for full " 53 "DNS offset field"); 54 return -1; 55 } 56 57 offset = (((*spos)[0] & 0x3f) << 8) | (*spos)[1]; 58 if (offset >= *spos - start) { 59 wpa_printf(MSG_DEBUG, "P2P: Invalid DNS " 60 "pointer offset %u", offset); 61 return -1; 62 } 63 64 (*spos) += 2; 65 spos_tmp = start + offset; 66 return p2p_sd_dns_uncompress_label(upos, uend, start, 67 &spos_tmp, 68 *spos - 2); 69 } 70 71 /* Label */ 72 len = (*spos)[0] & 0x3f; 73 if (len == 0) 74 return 0; 75 76 (*spos)++; 77 if (len > end - *spos) { 78 wpa_printf(MSG_DEBUG, "P2P: Invalid domain name " 79 "sequence - no room for label with length " 80 "%u", len); 81 return -1; 82 } 83 84 if (len + 2 > uend - *upos) 85 return -2; 86 87 os_memcpy(*upos, *spos, len); 88 *spos += len; 89 *upos += len; 90 (*upos)[0] = '.'; 91 (*upos)++; 92 (*upos)[0] = '\0'; 93 } 94 95 return 0; 96 } 97 98 99 /* Uncompress domain names per RFC 1035 using the P2P SD in-memory packet. 100 * Returns -1 on parsing error (invalid input sequence), -2 if output buffer is 101 * not large enough */ 102 static int p2p_sd_dns_uncompress(char *buf, size_t buf_len, const u8 *msg, 103 size_t msg_len, size_t offset) 104 { 105 /* 27-octet in-memory packet from P2P specification */ 106 const char *prefix = "\x04_tcp\x05local\x00\x00\x0C\x00\x01" 107 "\x04_udp\xC0\x11\x00\x0C\x00\x01"; 108 u8 *tmp, *end, *spos; 109 char *upos, *uend; 110 int ret = 0; 111 112 if (buf_len < 2) 113 return -1; 114 if (offset > msg_len) 115 return -1; 116 117 tmp = os_malloc(DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN + msg_len); 118 if (tmp == NULL) 119 return -1; 120 spos = tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN; 121 end = spos + msg_len; 122 spos += offset; 123 124 os_memset(tmp, 0, DNS_HEADER_LEN); 125 os_memcpy(tmp + DNS_HEADER_LEN, prefix, P2P_SD_IN_MEMORY_LEN); 126 os_memcpy(tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN, msg, msg_len); 127 128 upos = buf; 129 uend = buf + buf_len; 130 131 ret = p2p_sd_dns_uncompress_label(&upos, uend, tmp, &spos, end); 132 if (ret) { 133 os_free(tmp); 134 return ret; 135 } 136 137 if (upos == buf) { 138 upos[0] = '.'; 139 upos[1] = '\0'; 140 } else if (upos[-1] == '.') 141 upos[-1] = '\0'; 142 143 os_free(tmp); 144 return 0; 145 } 146 147 148 static struct p2p_srv_bonjour * 149 wpas_p2p_service_get_bonjour(struct wpa_supplicant *wpa_s, 150 const struct wpabuf *query) 151 { 152 struct p2p_srv_bonjour *bsrv; 153 size_t len; 154 155 len = wpabuf_len(query); 156 dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour, 157 struct p2p_srv_bonjour, list) { 158 if (len == wpabuf_len(bsrv->query) && 159 os_memcmp(wpabuf_head(query), wpabuf_head(bsrv->query), 160 len) == 0) 161 return bsrv; 162 } 163 return NULL; 164 } 165 166 167 static struct p2p_srv_upnp * 168 wpas_p2p_service_get_upnp(struct wpa_supplicant *wpa_s, u8 version, 169 const char *service) 170 { 171 struct p2p_srv_upnp *usrv; 172 173 dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp, 174 struct p2p_srv_upnp, list) { 175 if (version == usrv->version && 176 os_strcmp(service, usrv->service) == 0) 177 return usrv; 178 } 179 return NULL; 180 } 181 182 183 static void wpas_sd_add_empty(struct wpabuf *resp, u8 srv_proto, 184 u8 srv_trans_id, u8 status) 185 { 186 u8 *len_pos; 187 188 if (wpabuf_tailroom(resp) < 5) 189 return; 190 191 /* Length (to be filled) */ 192 len_pos = wpabuf_put(resp, 2); 193 wpabuf_put_u8(resp, srv_proto); 194 wpabuf_put_u8(resp, srv_trans_id); 195 /* Status Code */ 196 wpabuf_put_u8(resp, status); 197 /* Response Data: empty */ 198 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 199 } 200 201 202 static void wpas_sd_add_proto_not_avail(struct wpabuf *resp, u8 srv_proto, 203 u8 srv_trans_id) 204 { 205 wpas_sd_add_empty(resp, srv_proto, srv_trans_id, 206 P2P_SD_PROTO_NOT_AVAILABLE); 207 } 208 209 210 static void wpas_sd_add_bad_request(struct wpabuf *resp, u8 srv_proto, 211 u8 srv_trans_id) 212 { 213 wpas_sd_add_empty(resp, srv_proto, srv_trans_id, P2P_SD_BAD_REQUEST); 214 } 215 216 217 static void wpas_sd_add_not_found(struct wpabuf *resp, u8 srv_proto, 218 u8 srv_trans_id) 219 { 220 wpas_sd_add_empty(resp, srv_proto, srv_trans_id, 221 P2P_SD_REQUESTED_INFO_NOT_AVAILABLE); 222 } 223 224 225 static void wpas_sd_all_bonjour(struct wpa_supplicant *wpa_s, 226 struct wpabuf *resp, u8 srv_trans_id) 227 { 228 struct p2p_srv_bonjour *bsrv; 229 u8 *len_pos; 230 231 wpa_printf(MSG_DEBUG, "P2P: SD Request for all Bonjour services"); 232 233 if (dl_list_empty(&wpa_s->global->p2p_srv_bonjour)) { 234 wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available"); 235 return; 236 } 237 238 dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour, 239 struct p2p_srv_bonjour, list) { 240 if (wpabuf_tailroom(resp) < 241 5 + wpabuf_len(bsrv->query) + wpabuf_len(bsrv->resp)) 242 return; 243 /* Length (to be filled) */ 244 len_pos = wpabuf_put(resp, 2); 245 wpabuf_put_u8(resp, P2P_SERV_BONJOUR); 246 wpabuf_put_u8(resp, srv_trans_id); 247 /* Status Code */ 248 wpabuf_put_u8(resp, P2P_SD_SUCCESS); 249 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service", 250 wpabuf_head(bsrv->resp), 251 wpabuf_len(bsrv->resp)); 252 /* Response Data */ 253 wpabuf_put_buf(resp, bsrv->query); /* Key */ 254 wpabuf_put_buf(resp, bsrv->resp); /* Value */ 255 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 256 2); 257 } 258 } 259 260 261 static int match_bonjour_query(struct p2p_srv_bonjour *bsrv, const u8 *query, 262 size_t query_len) 263 { 264 char str_rx[256], str_srv[256]; 265 266 if (query_len < 3 || wpabuf_len(bsrv->query) < 3) 267 return 0; /* Too short to include DNS Type and Version */ 268 if (os_memcmp(query + query_len - 3, 269 wpabuf_head_u8(bsrv->query) + wpabuf_len(bsrv->query) - 3, 270 3) != 0) 271 return 0; /* Mismatch in DNS Type or Version */ 272 if (query_len == wpabuf_len(bsrv->query) && 273 os_memcmp(query, wpabuf_head(bsrv->query), query_len - 3) == 0) 274 return 1; /* Binary match */ 275 276 if (p2p_sd_dns_uncompress(str_rx, sizeof(str_rx), query, query_len - 3, 277 0)) 278 return 0; /* Failed to uncompress query */ 279 if (p2p_sd_dns_uncompress(str_srv, sizeof(str_srv), 280 wpabuf_head(bsrv->query), 281 wpabuf_len(bsrv->query) - 3, 0)) 282 return 0; /* Failed to uncompress service */ 283 284 return os_strcmp(str_rx, str_srv) == 0; 285 } 286 287 288 static void wpas_sd_req_bonjour(struct wpa_supplicant *wpa_s, 289 struct wpabuf *resp, u8 srv_trans_id, 290 const u8 *query, size_t query_len) 291 { 292 struct p2p_srv_bonjour *bsrv; 293 u8 *len_pos; 294 int matches = 0; 295 296 wpa_hexdump_ascii(MSG_DEBUG, "P2P: SD Request for Bonjour", 297 query, query_len); 298 if (dl_list_empty(&wpa_s->global->p2p_srv_bonjour)) { 299 wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available"); 300 wpas_sd_add_proto_not_avail(resp, P2P_SERV_BONJOUR, 301 srv_trans_id); 302 return; 303 } 304 305 if (query_len == 0) { 306 wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id); 307 return; 308 } 309 310 dl_list_for_each(bsrv, &wpa_s->global->p2p_srv_bonjour, 311 struct p2p_srv_bonjour, list) { 312 if (!match_bonjour_query(bsrv, query, query_len)) 313 continue; 314 315 if (wpabuf_tailroom(resp) < 316 5 + query_len + wpabuf_len(bsrv->resp)) 317 return; 318 319 matches++; 320 321 /* Length (to be filled) */ 322 len_pos = wpabuf_put(resp, 2); 323 wpabuf_put_u8(resp, P2P_SERV_BONJOUR); 324 wpabuf_put_u8(resp, srv_trans_id); 325 326 /* Status Code */ 327 wpabuf_put_u8(resp, P2P_SD_SUCCESS); 328 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service", 329 wpabuf_head(bsrv->resp), 330 wpabuf_len(bsrv->resp)); 331 332 /* Response Data */ 333 wpabuf_put_data(resp, query, query_len); /* Key */ 334 wpabuf_put_buf(resp, bsrv->resp); /* Value */ 335 336 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 337 } 338 339 if (matches == 0) { 340 wpa_printf(MSG_DEBUG, "P2P: Requested Bonjour service not " 341 "available"); 342 if (wpabuf_tailroom(resp) < 5) 343 return; 344 345 /* Length (to be filled) */ 346 len_pos = wpabuf_put(resp, 2); 347 wpabuf_put_u8(resp, P2P_SERV_BONJOUR); 348 wpabuf_put_u8(resp, srv_trans_id); 349 350 /* Status Code */ 351 wpabuf_put_u8(resp, P2P_SD_REQUESTED_INFO_NOT_AVAILABLE); 352 /* Response Data: empty */ 353 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 354 2); 355 } 356 } 357 358 359 static void wpas_sd_all_upnp(struct wpa_supplicant *wpa_s, 360 struct wpabuf *resp, u8 srv_trans_id) 361 { 362 struct p2p_srv_upnp *usrv; 363 u8 *len_pos; 364 365 wpa_printf(MSG_DEBUG, "P2P: SD Request for all UPnP services"); 366 367 if (dl_list_empty(&wpa_s->global->p2p_srv_upnp)) { 368 wpa_printf(MSG_DEBUG, "P2P: UPnP protocol not available"); 369 return; 370 } 371 372 dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp, 373 struct p2p_srv_upnp, list) { 374 if (wpabuf_tailroom(resp) < 5 + 1 + os_strlen(usrv->service)) 375 return; 376 377 /* Length (to be filled) */ 378 len_pos = wpabuf_put(resp, 2); 379 wpabuf_put_u8(resp, P2P_SERV_UPNP); 380 wpabuf_put_u8(resp, srv_trans_id); 381 382 /* Status Code */ 383 wpabuf_put_u8(resp, P2P_SD_SUCCESS); 384 /* Response Data */ 385 wpabuf_put_u8(resp, usrv->version); 386 wpa_printf(MSG_DEBUG, "P2P: Matching UPnP Service: %s", 387 usrv->service); 388 wpabuf_put_str(resp, usrv->service); 389 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 390 2); 391 } 392 } 393 394 395 static void wpas_sd_req_upnp(struct wpa_supplicant *wpa_s, 396 struct wpabuf *resp, u8 srv_trans_id, 397 const u8 *query, size_t query_len) 398 { 399 struct p2p_srv_upnp *usrv; 400 u8 *len_pos; 401 u8 version; 402 char *str; 403 int count = 0; 404 405 wpa_hexdump_ascii(MSG_DEBUG, "P2P: SD Request for UPnP", 406 query, query_len); 407 408 if (dl_list_empty(&wpa_s->global->p2p_srv_upnp)) { 409 wpa_printf(MSG_DEBUG, "P2P: UPnP protocol not available"); 410 wpas_sd_add_proto_not_avail(resp, P2P_SERV_UPNP, 411 srv_trans_id); 412 return; 413 } 414 415 if (query_len == 0) { 416 wpas_sd_all_upnp(wpa_s, resp, srv_trans_id); 417 return; 418 } 419 420 if (wpabuf_tailroom(resp) < 5) 421 return; 422 423 /* Length (to be filled) */ 424 len_pos = wpabuf_put(resp, 2); 425 wpabuf_put_u8(resp, P2P_SERV_UPNP); 426 wpabuf_put_u8(resp, srv_trans_id); 427 428 version = query[0]; 429 str = os_malloc(query_len); 430 if (str == NULL) 431 return; 432 os_memcpy(str, query + 1, query_len - 1); 433 str[query_len - 1] = '\0'; 434 435 dl_list_for_each(usrv, &wpa_s->global->p2p_srv_upnp, 436 struct p2p_srv_upnp, list) { 437 if (version != usrv->version) 438 continue; 439 440 if (os_strcmp(str, "ssdp:all") != 0 && 441 os_strstr(usrv->service, str) == NULL) 442 continue; 443 444 if (wpabuf_tailroom(resp) < 2) 445 break; 446 if (count == 0) { 447 /* Status Code */ 448 wpabuf_put_u8(resp, P2P_SD_SUCCESS); 449 /* Response Data */ 450 wpabuf_put_u8(resp, version); 451 } else 452 wpabuf_put_u8(resp, ','); 453 454 count++; 455 456 wpa_printf(MSG_DEBUG, "P2P: Matching UPnP Service: %s", 457 usrv->service); 458 if (wpabuf_tailroom(resp) < os_strlen(usrv->service)) 459 break; 460 wpabuf_put_str(resp, usrv->service); 461 } 462 os_free(str); 463 464 if (count == 0) { 465 wpa_printf(MSG_DEBUG, "P2P: Requested UPnP service not " 466 "available"); 467 /* Status Code */ 468 wpabuf_put_u8(resp, P2P_SD_REQUESTED_INFO_NOT_AVAILABLE); 469 /* Response Data: empty */ 470 } 471 472 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 473 } 474 475 476 #ifdef CONFIG_WIFI_DISPLAY 477 static void wpas_sd_req_wfd(struct wpa_supplicant *wpa_s, 478 struct wpabuf *resp, u8 srv_trans_id, 479 const u8 *query, size_t query_len) 480 { 481 const u8 *pos; 482 u8 role; 483 u8 *len_pos; 484 485 wpa_hexdump(MSG_DEBUG, "P2P: SD Request for WFD", query, query_len); 486 487 if (!wpa_s->global->wifi_display) { 488 wpa_printf(MSG_DEBUG, "P2P: WFD protocol not available"); 489 wpas_sd_add_proto_not_avail(resp, P2P_SERV_WIFI_DISPLAY, 490 srv_trans_id); 491 return; 492 } 493 494 if (query_len < 1) { 495 wpa_printf(MSG_DEBUG, "P2P: Missing WFD Requested Device " 496 "Role"); 497 return; 498 } 499 500 if (wpabuf_tailroom(resp) < 5) 501 return; 502 503 pos = query; 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 506 507 /* TODO: role specific handling */ 508 509 /* Length (to be filled) */ 510 len_pos = wpabuf_put(resp, 2); 511 wpabuf_put_u8(resp, P2P_SERV_WIFI_DISPLAY); 512 wpabuf_put_u8(resp, srv_trans_id); 513 wpabuf_put_u8(resp, P2P_SD_SUCCESS); /* Status Code */ 514 515 while (pos < query + query_len) { 516 if (*pos < MAX_WFD_SUBELEMS && 517 wpa_s->global->wfd_subelem[*pos] && 518 wpabuf_tailroom(resp) >= 519 wpabuf_len(wpa_s->global->wfd_subelem[*pos])) { 520 wpa_printf(MSG_DEBUG, "P2P: Add WSD response " 521 "subelement %u", *pos); 522 wpabuf_put_buf(resp, wpa_s->global->wfd_subelem[*pos]); 523 } 524 pos++; 525 } 526 527 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 528 } 529 #endif /* CONFIG_WIFI_DISPLAY */ 530 531 532 static int find_p2ps_substr(struct p2ps_advertisement *adv_data, 533 const u8 *needle, size_t needle_len) 534 { 535 const u8 *haystack = (const u8 *) adv_data->svc_info; 536 size_t haystack_len, i; 537 538 /* Allow search term to be empty */ 539 if (!needle || !needle_len) 540 return 1; 541 542 if (!haystack) 543 return 0; 544 545 haystack_len = os_strlen(adv_data->svc_info); 546 for (i = 0; i < haystack_len; i++) { 547 if (haystack_len - i < needle_len) 548 break; 549 if (os_memcmp(haystack + i, needle, needle_len) == 0) 550 return 1; 551 } 552 553 return 0; 554 } 555 556 557 static void wpas_sd_req_asp(struct wpa_supplicant *wpa_s, 558 struct wpabuf *resp, u8 srv_trans_id, 559 const u8 *query, size_t query_len) 560 { 561 struct p2ps_advertisement *adv_data; 562 const u8 *svc = &query[1]; 563 const u8 *info = NULL; 564 size_t svc_len = query[0]; 565 size_t info_len = 0; 566 int prefix = 0; 567 u8 *count_pos = NULL; 568 u8 *len_pos = NULL; 569 570 wpa_hexdump(MSG_DEBUG, "P2P: SD Request for ASP", query, query_len); 571 572 if (!wpa_s->global->p2p) { 573 wpa_printf(MSG_DEBUG, "P2P: ASP protocol not available"); 574 wpas_sd_add_proto_not_avail(resp, P2P_SERV_P2PS, srv_trans_id); 575 return; 576 } 577 578 /* Info block is optional */ 579 if (svc_len + 1 < query_len) { 580 info = &svc[svc_len]; 581 info_len = *info++; 582 } 583 584 /* Range check length of svc string and info block */ 585 if (svc_len + (info_len ? info_len + 2 : 1) > query_len) { 586 wpa_printf(MSG_DEBUG, "P2P: ASP bad request"); 587 wpas_sd_add_bad_request(resp, P2P_SERV_P2PS, srv_trans_id); 588 return; 589 } 590 591 /* Detect and correct for prefix search */ 592 if (svc_len && svc[svc_len - 1] == '*') { 593 prefix = 1; 594 svc_len--; 595 } 596 597 for (adv_data = p2p_get_p2ps_adv_list(wpa_s->global->p2p); 598 adv_data; adv_data = adv_data->next) { 599 /* If not a prefix match, reject length mismatches */ 600 if (!prefix && svc_len != os_strlen(adv_data->svc_name)) 601 continue; 602 603 /* Search each service for request */ 604 if (os_memcmp(adv_data->svc_name, svc, svc_len) == 0 && 605 find_p2ps_substr(adv_data, info, info_len)) { 606 size_t len = os_strlen(adv_data->svc_name); 607 size_t svc_info_len = 0; 608 609 if (adv_data->svc_info) 610 svc_info_len = os_strlen(adv_data->svc_info); 611 612 if (len > 0xff || svc_info_len > 0xffff) 613 return; 614 615 /* Length & Count to be filled as we go */ 616 if (!len_pos && !count_pos) { 617 if (wpabuf_tailroom(resp) < 618 len + svc_info_len + 16) 619 return; 620 621 len_pos = wpabuf_put(resp, 2); 622 wpabuf_put_u8(resp, P2P_SERV_P2PS); 623 wpabuf_put_u8(resp, srv_trans_id); 624 /* Status Code */ 625 wpabuf_put_u8(resp, P2P_SD_SUCCESS); 626 count_pos = wpabuf_put(resp, 1); 627 *count_pos = 0; 628 } else if (wpabuf_tailroom(resp) < 629 len + svc_info_len + 10) 630 return; 631 632 if (svc_info_len) { 633 wpa_printf(MSG_DEBUG, 634 "P2P: Add Svc: %s info: %s", 635 adv_data->svc_name, 636 adv_data->svc_info); 637 } else { 638 wpa_printf(MSG_DEBUG, "P2P: Add Svc: %s", 639 adv_data->svc_name); 640 } 641 642 /* Advertisement ID */ 643 wpabuf_put_le32(resp, adv_data->id); 644 645 /* Config Methods */ 646 wpabuf_put_be16(resp, adv_data->config_methods); 647 648 /* Service Name */ 649 wpabuf_put_u8(resp, (u8) len); 650 wpabuf_put_data(resp, adv_data->svc_name, len); 651 652 /* Service State */ 653 wpabuf_put_u8(resp, adv_data->state); 654 655 /* Service Information */ 656 wpabuf_put_le16(resp, (u16) svc_info_len); 657 wpabuf_put_data(resp, adv_data->svc_info, svc_info_len); 658 659 /* Update length and count */ 660 (*count_pos)++; 661 WPA_PUT_LE16(len_pos, 662 (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 663 } 664 } 665 666 /* Return error if no matching svc found */ 667 if (count_pos == NULL) { 668 wpa_printf(MSG_DEBUG, "P2P: ASP service not found"); 669 wpas_sd_add_not_found(resp, P2P_SERV_P2PS, srv_trans_id); 670 } 671 } 672 673 674 static void wpas_sd_all_asp(struct wpa_supplicant *wpa_s, 675 struct wpabuf *resp, u8 srv_trans_id) 676 { 677 /* Query data to add all P2PS advertisements: 678 * - Service name length: 1 679 * - Service name: '*' 680 * - Service Information Request Length: 0 681 */ 682 const u8 q[] = { 1, (const u8) '*', 0 }; 683 684 if (p2p_get_p2ps_adv_list(wpa_s->global->p2p)) 685 wpas_sd_req_asp(wpa_s, resp, srv_trans_id, q, sizeof(q)); 686 } 687 688 689 void wpas_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token, 690 u16 update_indic, const u8 *tlvs, size_t tlvs_len) 691 { 692 struct wpa_supplicant *wpa_s = ctx; 693 const u8 *pos = tlvs; 694 const u8 *end = tlvs + tlvs_len; 695 const u8 *tlv_end; 696 u16 slen; 697 struct wpabuf *resp; 698 u8 srv_proto, srv_trans_id; 699 size_t buf_len; 700 char *buf; 701 702 wpa_hexdump(MSG_MSGDUMP, "P2P: Service Discovery Request TLVs", 703 tlvs, tlvs_len); 704 buf_len = 2 * tlvs_len + 1; 705 buf = os_malloc(buf_len); 706 if (buf) { 707 wpa_snprintf_hex(buf, buf_len, tlvs, tlvs_len); 708 wpa_msg_ctrl(wpa_s, MSG_INFO, P2P_EVENT_SERV_DISC_REQ "%d " 709 MACSTR " %u %u %s", 710 freq, MAC2STR(sa), dialog_token, update_indic, 711 buf); 712 os_free(buf); 713 } 714 715 if (wpa_s->p2p_sd_over_ctrl_iface) { 716 wpas_notify_p2p_sd_request(wpa_s, freq, sa, dialog_token, 717 update_indic, tlvs, tlvs_len); 718 return; /* to be processed by an external program */ 719 } 720 721 resp = wpabuf_alloc(10000); 722 if (resp == NULL) 723 return; 724 725 while (end - pos > 1) { 726 wpa_printf(MSG_DEBUG, "P2P: Service Request TLV"); 727 slen = WPA_GET_LE16(pos); 728 pos += 2; 729 if (slen > end - pos || slen < 2) { 730 wpa_printf(MSG_DEBUG, "P2P: Unexpected Query Data " 731 "length"); 732 wpabuf_free(resp); 733 return; 734 } 735 tlv_end = pos + slen; 736 737 srv_proto = *pos++; 738 wpa_printf(MSG_DEBUG, "P2P: Service Protocol Type %u", 739 srv_proto); 740 srv_trans_id = *pos++; 741 wpa_printf(MSG_DEBUG, "P2P: Service Transaction ID %u", 742 srv_trans_id); 743 744 wpa_hexdump(MSG_MSGDUMP, "P2P: Query Data", 745 pos, tlv_end - pos); 746 747 748 if (wpa_s->force_long_sd) { 749 wpa_printf(MSG_DEBUG, "P2P: SD test - force long " 750 "response"); 751 wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id); 752 wpas_sd_all_upnp(wpa_s, resp, srv_trans_id); 753 wpas_sd_all_asp(wpa_s, resp, srv_trans_id); 754 goto done; 755 } 756 757 switch (srv_proto) { 758 case P2P_SERV_ALL_SERVICES: 759 wpa_printf(MSG_DEBUG, "P2P: Service Discovery Request " 760 "for all services"); 761 if (dl_list_empty(&wpa_s->global->p2p_srv_upnp) && 762 dl_list_empty(&wpa_s->global->p2p_srv_bonjour) && 763 !p2p_get_p2ps_adv_list(wpa_s->global->p2p)) { 764 wpa_printf(MSG_DEBUG, "P2P: No service " 765 "discovery protocols available"); 766 wpas_sd_add_proto_not_avail( 767 resp, P2P_SERV_ALL_SERVICES, 768 srv_trans_id); 769 break; 770 } 771 wpas_sd_all_bonjour(wpa_s, resp, srv_trans_id); 772 wpas_sd_all_upnp(wpa_s, resp, srv_trans_id); 773 wpas_sd_all_asp(wpa_s, resp, srv_trans_id); 774 break; 775 case P2P_SERV_BONJOUR: 776 wpas_sd_req_bonjour(wpa_s, resp, srv_trans_id, 777 pos, tlv_end - pos); 778 break; 779 case P2P_SERV_UPNP: 780 wpas_sd_req_upnp(wpa_s, resp, srv_trans_id, 781 pos, tlv_end - pos); 782 break; 783 #ifdef CONFIG_WIFI_DISPLAY 784 case P2P_SERV_WIFI_DISPLAY: 785 wpas_sd_req_wfd(wpa_s, resp, srv_trans_id, 786 pos, tlv_end - pos); 787 break; 788 #endif /* CONFIG_WIFI_DISPLAY */ 789 case P2P_SERV_P2PS: 790 wpas_sd_req_asp(wpa_s, resp, srv_trans_id, 791 pos, tlv_end - pos); 792 break; 793 default: 794 wpa_printf(MSG_DEBUG, "P2P: Unavailable service " 795 "protocol %u", srv_proto); 796 wpas_sd_add_proto_not_avail(resp, srv_proto, 797 srv_trans_id); 798 break; 799 } 800 801 pos = tlv_end; 802 } 803 804 done: 805 wpas_notify_p2p_sd_request(wpa_s, freq, sa, dialog_token, 806 update_indic, tlvs, tlvs_len); 807 808 wpas_p2p_sd_response(wpa_s, freq, sa, dialog_token, resp); 809 810 wpabuf_free(resp); 811 } 812 813 814 static void wpas_sd_p2ps_serv_response(struct wpa_supplicant *wpa_s, 815 const u8 *sa, u8 srv_trans_id, 816 const u8 *pos, const u8 *tlv_end) 817 { 818 u8 left = *pos++; 819 u32 adv_id; 820 u8 svc_status; 821 u16 config_methods; 822 char svc_str[256]; 823 824 while (left-- && pos < tlv_end) { 825 char *buf = NULL; 826 size_t buf_len; 827 u8 svc_len; 828 829 /* Validity check fixed length+svc_str */ 830 if (6 >= tlv_end - pos) 831 break; 832 svc_len = pos[6]; 833 if (svc_len + 10 > tlv_end - pos) 834 break; 835 836 /* Advertisement ID */ 837 adv_id = WPA_GET_LE32(pos); 838 pos += sizeof(u32); 839 840 /* Config Methods */ 841 config_methods = WPA_GET_BE16(pos); 842 pos += sizeof(u16); 843 844 /* Service Name */ 845 pos++; /* svc_len */ 846 os_memcpy(svc_str, pos, svc_len); 847 svc_str[svc_len] = '\0'; 848 pos += svc_len; 849 850 /* Service Status */ 851 svc_status = *pos++; 852 853 /* Service Information Length */ 854 buf_len = WPA_GET_LE16(pos); 855 pos += sizeof(u16); 856 857 /* Validity check buffer length */ 858 if (buf_len > (unsigned int) (tlv_end - pos)) 859 break; 860 861 if (buf_len) { 862 buf = os_zalloc(2 * buf_len + 1); 863 if (buf) { 864 utf8_escape((const char *) pos, buf_len, buf, 865 2 * buf_len + 1); 866 } 867 } 868 869 pos += buf_len; 870 871 if (buf) { 872 wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_SERV_ASP_RESP 873 MACSTR " %x %x %x %x %s '%s'", 874 MAC2STR(sa), srv_trans_id, adv_id, 875 svc_status, config_methods, svc_str, 876 buf); 877 os_free(buf); 878 } else { 879 wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_SERV_ASP_RESP 880 MACSTR " %x %x %x %x %s", 881 MAC2STR(sa), srv_trans_id, adv_id, 882 svc_status, config_methods, svc_str); 883 } 884 } 885 } 886 887 888 void wpas_sd_response(void *ctx, const u8 *sa, u16 update_indic, 889 const u8 *tlvs, size_t tlvs_len) 890 { 891 struct wpa_supplicant *wpa_s = ctx; 892 const u8 *pos = tlvs; 893 const u8 *end = tlvs + tlvs_len; 894 const u8 *tlv_end; 895 u16 slen; 896 size_t buf_len; 897 char *buf; 898 899 wpa_hexdump(MSG_MSGDUMP, "P2P: Service Discovery Response TLVs", 900 tlvs, tlvs_len); 901 if (tlvs_len > 1500) { 902 /* TODO: better way for handling this */ 903 wpa_msg_ctrl(wpa_s, MSG_INFO, 904 P2P_EVENT_SERV_DISC_RESP MACSTR 905 " %u <long response: %u bytes>", 906 MAC2STR(sa), update_indic, 907 (unsigned int) tlvs_len); 908 } else { 909 buf_len = 2 * tlvs_len + 1; 910 buf = os_malloc(buf_len); 911 if (buf) { 912 wpa_snprintf_hex(buf, buf_len, tlvs, tlvs_len); 913 wpa_msg_ctrl(wpa_s, MSG_INFO, 914 P2P_EVENT_SERV_DISC_RESP MACSTR " %u %s", 915 MAC2STR(sa), update_indic, buf); 916 os_free(buf); 917 } 918 } 919 920 while (end - pos >= 2) { 921 u8 srv_proto, srv_trans_id, status; 922 923 wpa_printf(MSG_DEBUG, "P2P: Service Response TLV"); 924 slen = WPA_GET_LE16(pos); 925 pos += 2; 926 if (slen > end - pos || slen < 3) { 927 wpa_printf(MSG_DEBUG, "P2P: Unexpected Response Data " 928 "length"); 929 return; 930 } 931 tlv_end = pos + slen; 932 933 srv_proto = *pos++; 934 wpa_printf(MSG_DEBUG, "P2P: Service Protocol Type %u", 935 srv_proto); 936 srv_trans_id = *pos++; 937 wpa_printf(MSG_DEBUG, "P2P: Service Transaction ID %u", 938 srv_trans_id); 939 status = *pos++; 940 wpa_printf(MSG_DEBUG, "P2P: Status Code ID %u", 941 status); 942 943 wpa_hexdump(MSG_MSGDUMP, "P2P: Response Data", 944 pos, tlv_end - pos); 945 946 if (srv_proto == P2P_SERV_P2PS && pos < tlv_end) { 947 wpas_sd_p2ps_serv_response(wpa_s, sa, srv_trans_id, 948 pos, tlv_end); 949 } 950 951 pos = tlv_end; 952 } 953 954 wpas_notify_p2p_sd_response(wpa_s, sa, update_indic, tlvs, tlvs_len); 955 } 956 957 958 u64 wpas_p2p_sd_request(struct wpa_supplicant *wpa_s, const u8 *dst, 959 const struct wpabuf *tlvs) 960 { 961 if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL) 962 return 0; 963 return (uintptr_t) p2p_sd_request(wpa_s->global->p2p, dst, tlvs); 964 } 965 966 967 u64 wpas_p2p_sd_request_upnp(struct wpa_supplicant *wpa_s, const u8 *dst, 968 u8 version, const char *query) 969 { 970 struct wpabuf *tlvs; 971 u64 ret; 972 973 tlvs = wpabuf_alloc(2 + 1 + 1 + 1 + os_strlen(query)); 974 if (tlvs == NULL) 975 return 0; 976 wpabuf_put_le16(tlvs, 1 + 1 + 1 + os_strlen(query)); 977 wpabuf_put_u8(tlvs, P2P_SERV_UPNP); /* Service Protocol Type */ 978 wpabuf_put_u8(tlvs, 1); /* Service Transaction ID */ 979 wpabuf_put_u8(tlvs, version); 980 wpabuf_put_str(tlvs, query); 981 ret = wpas_p2p_sd_request(wpa_s, dst, tlvs); 982 wpabuf_free(tlvs); 983 return ret; 984 } 985 986 987 u64 wpas_p2p_sd_request_asp(struct wpa_supplicant *wpa_s, const u8 *dst, u8 id, 988 const char *svc_str, const char *info_substr) 989 { 990 struct wpabuf *tlvs; 991 size_t plen, svc_len, substr_len = 0; 992 u64 ret; 993 994 svc_len = os_strlen(svc_str); 995 if (info_substr) 996 substr_len = os_strlen(info_substr); 997 998 if (svc_len > 0xff || substr_len > 0xff) 999 return 0; 1000 1001 plen = 1 + 1 + 1 + svc_len + 1 + substr_len; 1002 tlvs = wpabuf_alloc(2 + plen); 1003 if (tlvs == NULL) 1004 return 0; 1005 1006 wpabuf_put_le16(tlvs, plen); 1007 wpabuf_put_u8(tlvs, P2P_SERV_P2PS); 1008 wpabuf_put_u8(tlvs, id); /* Service Transaction ID */ 1009 wpabuf_put_u8(tlvs, (u8) svc_len); /* Service String Length */ 1010 wpabuf_put_data(tlvs, svc_str, svc_len); 1011 wpabuf_put_u8(tlvs, (u8) substr_len); /* Info Substring Length */ 1012 wpabuf_put_data(tlvs, info_substr, substr_len); 1013 ret = wpas_p2p_sd_request(wpa_s, dst, tlvs); 1014 wpabuf_free(tlvs); 1015 1016 return ret; 1017 } 1018 1019 1020 #ifdef CONFIG_WIFI_DISPLAY 1021 1022 static u64 wpas_p2p_sd_request_wfd(struct wpa_supplicant *wpa_s, const u8 *dst, 1023 const struct wpabuf *tlvs) 1024 { 1025 if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL) 1026 return 0; 1027 return (uintptr_t) p2p_sd_request_wfd(wpa_s->global->p2p, dst, tlvs); 1028 } 1029 1030 1031 #define MAX_WFD_SD_SUBELEMS 20 1032 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, 1034 const char *subelems) 1035 { 1036 u8 *len; 1037 const char *pos; 1038 int val; 1039 int count = 0; 1040 1041 len = wpabuf_put(tlvs, 2); 1042 wpabuf_put_u8(tlvs, P2P_SERV_WIFI_DISPLAY); /* Service Protocol Type */ 1043 wpabuf_put_u8(tlvs, id); /* Service Transaction ID */ 1044 1045 wpabuf_put_u8(tlvs, role); 1046 1047 pos = subelems; 1048 while (*pos) { 1049 val = atoi(pos); 1050 if (val >= 0 && val < 256) { 1051 wpabuf_put_u8(tlvs, val); 1052 count++; 1053 if (count == MAX_WFD_SD_SUBELEMS) 1054 break; 1055 } 1056 pos = os_strchr(pos + 1, ','); 1057 if (pos == NULL) 1058 break; 1059 pos++; 1060 } 1061 1062 WPA_PUT_LE16(len, (u8 *) wpabuf_put(tlvs, 0) - len - 2); 1063 } 1064 1065 1066 u64 wpas_p2p_sd_request_wifi_display(struct wpa_supplicant *wpa_s, 1067 const u8 *dst, const char *role) 1068 { 1069 struct wpabuf *tlvs; 1070 u64 ret; 1071 const char *subelems; 1072 u8 id = 1; 1073 1074 subelems = os_strchr(role, ' '); 1075 if (subelems == NULL) 1076 return 0; 1077 subelems++; 1078 1079 tlvs = wpabuf_alloc(4 * (2 + 1 + 1 + 1 + MAX_WFD_SD_SUBELEMS)); 1080 if (tlvs == NULL) 1081 return 0; 1082 1083 if (os_strstr(role, "[source]")) 1084 wfd_add_sd_req_role(tlvs, id++, 0x00, subelems); 1085 if (os_strstr(role, "[pri-sink]")) 1086 wfd_add_sd_req_role(tlvs, id++, 0x01, subelems); 1087 if (os_strstr(role, "[sec-sink]")) 1088 wfd_add_sd_req_role(tlvs, id++, 0x02, subelems); 1089 if (os_strstr(role, "[source+sink]")) 1090 wfd_add_sd_req_role(tlvs, id++, 0x03, subelems); 1091 1092 ret = wpas_p2p_sd_request_wfd(wpa_s, dst, tlvs); 1093 wpabuf_free(tlvs); 1094 return ret; 1095 } 1096 1097 #endif /* CONFIG_WIFI_DISPLAY */ 1098 1099 1100 int wpas_p2p_sd_cancel_request(struct wpa_supplicant *wpa_s, u64 req) 1101 { 1102 if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL) 1103 return -1; 1104 return p2p_sd_cancel_request(wpa_s->global->p2p, 1105 (void *) (uintptr_t) req); 1106 } 1107 1108 1109 void wpas_p2p_sd_response(struct wpa_supplicant *wpa_s, int freq, 1110 const u8 *dst, u8 dialog_token, 1111 const struct wpabuf *resp_tlvs) 1112 { 1113 if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL) 1114 return; 1115 p2p_sd_response(wpa_s->global->p2p, freq, dst, dialog_token, 1116 resp_tlvs); 1117 } 1118 1119 1120 void wpas_p2p_sd_service_update(struct wpa_supplicant *wpa_s) 1121 { 1122 if (wpa_s->global->p2p) 1123 p2p_sd_service_update(wpa_s->global->p2p); 1124 } 1125 1126 1127 static void wpas_p2p_srv_bonjour_free(struct p2p_srv_bonjour *bsrv) 1128 { 1129 dl_list_del(&bsrv->list); 1130 wpabuf_free(bsrv->query); 1131 wpabuf_free(bsrv->resp); 1132 os_free(bsrv); 1133 } 1134 1135 1136 static void wpas_p2p_srv_upnp_free(struct p2p_srv_upnp *usrv) 1137 { 1138 dl_list_del(&usrv->list); 1139 os_free(usrv->service); 1140 os_free(usrv); 1141 } 1142 1143 1144 void wpas_p2p_service_flush(struct wpa_supplicant *wpa_s) 1145 { 1146 struct p2p_srv_bonjour *bsrv, *bn; 1147 struct p2p_srv_upnp *usrv, *un; 1148 1149 dl_list_for_each_safe(bsrv, bn, &wpa_s->global->p2p_srv_bonjour, 1150 struct p2p_srv_bonjour, list) 1151 wpas_p2p_srv_bonjour_free(bsrv); 1152 1153 dl_list_for_each_safe(usrv, un, &wpa_s->global->p2p_srv_upnp, 1154 struct p2p_srv_upnp, list) 1155 wpas_p2p_srv_upnp_free(usrv); 1156 1157 wpas_p2p_service_flush_asp(wpa_s); 1158 wpas_p2p_sd_service_update(wpa_s); 1159 } 1160 1161 1162 int wpas_p2p_service_p2ps_id_exists(struct wpa_supplicant *wpa_s, u32 adv_id) 1163 { 1164 if (adv_id == 0) 1165 return 1; 1166 1167 if (p2p_service_p2ps_id(wpa_s->global->p2p, adv_id)) 1168 return 1; 1169 1170 return 0; 1171 } 1172 1173 1174 int wpas_p2p_service_del_asp(struct wpa_supplicant *wpa_s, u32 adv_id) 1175 { 1176 int ret; 1177 1178 ret = p2p_service_del_asp(wpa_s->global->p2p, adv_id); 1179 if (ret == 0) 1180 wpas_p2p_sd_service_update(wpa_s); 1181 return ret; 1182 } 1183 1184 1185 int wpas_p2p_service_add_asp(struct wpa_supplicant *wpa_s, 1186 int auto_accept, u32 adv_id, 1187 const char *adv_str, u8 svc_state, 1188 u16 config_methods, const char *svc_info, 1189 const u8 *cpt_priority) 1190 { 1191 int ret; 1192 1193 ret = p2p_service_add_asp(wpa_s->global->p2p, auto_accept, adv_id, 1194 adv_str, svc_state, config_methods, 1195 svc_info, cpt_priority); 1196 if (ret == 0) 1197 wpas_p2p_sd_service_update(wpa_s); 1198 return ret; 1199 } 1200 1201 1202 void wpas_p2p_service_flush_asp(struct wpa_supplicant *wpa_s) 1203 { 1204 p2p_service_flush_asp(wpa_s->global->p2p); 1205 } 1206 1207 1208 int wpas_p2p_service_add_bonjour(struct wpa_supplicant *wpa_s, 1209 struct wpabuf *query, struct wpabuf *resp) 1210 { 1211 struct p2p_srv_bonjour *bsrv; 1212 1213 bsrv = os_zalloc(sizeof(*bsrv)); 1214 if (bsrv == NULL) 1215 return -1; 1216 bsrv->query = query; 1217 bsrv->resp = resp; 1218 dl_list_add(&wpa_s->global->p2p_srv_bonjour, &bsrv->list); 1219 1220 wpas_p2p_sd_service_update(wpa_s); 1221 return 0; 1222 } 1223 1224 1225 int wpas_p2p_service_del_bonjour(struct wpa_supplicant *wpa_s, 1226 const struct wpabuf *query) 1227 { 1228 struct p2p_srv_bonjour *bsrv; 1229 1230 bsrv = wpas_p2p_service_get_bonjour(wpa_s, query); 1231 if (bsrv == NULL) 1232 return -1; 1233 wpas_p2p_srv_bonjour_free(bsrv); 1234 wpas_p2p_sd_service_update(wpa_s); 1235 return 0; 1236 } 1237 1238 1239 int wpas_p2p_service_add_upnp(struct wpa_supplicant *wpa_s, u8 version, 1240 const char *service) 1241 { 1242 struct p2p_srv_upnp *usrv; 1243 1244 if (wpas_p2p_service_get_upnp(wpa_s, version, service)) 1245 return 0; /* Already listed */ 1246 usrv = os_zalloc(sizeof(*usrv)); 1247 if (usrv == NULL) 1248 return -1; 1249 usrv->version = version; 1250 usrv->service = os_strdup(service); 1251 if (usrv->service == NULL) { 1252 os_free(usrv); 1253 return -1; 1254 } 1255 dl_list_add(&wpa_s->global->p2p_srv_upnp, &usrv->list); 1256 1257 wpas_p2p_sd_service_update(wpa_s); 1258 return 0; 1259 } 1260 1261 1262 int wpas_p2p_service_del_upnp(struct wpa_supplicant *wpa_s, u8 version, 1263 const char *service) 1264 { 1265 struct p2p_srv_upnp *usrv; 1266 1267 usrv = wpas_p2p_service_get_upnp(wpa_s, version, service); 1268 if (usrv == NULL) 1269 return -1; 1270 wpas_p2p_srv_upnp_free(usrv); 1271 wpas_p2p_sd_service_update(wpa_s); 1272 return 0; 1273 } 1274