2 * http_server - HTTP server
3 * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
15 #include "http_server.h"
17 #define HTTP_SERVER_TIMEOUT 30
18 #define HTTP_SERVER_MAX_REQ_LEN 8000
19 #define HTTP_SERVER_MAX_CONNECTIONS 10
22 struct http_request *next;
23 struct http_server *srv;
25 struct sockaddr_in cli;
26 struct httpread *hread;
30 void (*cb)(void *ctx, struct http_request *req);
36 struct http_request *requests;
37 unsigned int request_count;
41 static void http_request_cb(struct httpread *handle, void *cookie,
42 enum httpread_event en)
44 struct http_request *req = cookie;
45 struct http_server *srv = req->srv;
47 if (en == HTTPREAD_EVENT_FILE_READY) {
48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
49 inet_ntoa(req->cli.sin_addr),
50 ntohs(req->cli.sin_port));
51 srv->cb(srv->cb_ctx, req);
54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
55 "completely", inet_ntoa(req->cli.sin_addr),
56 ntohs(req->cli.sin_port));
57 http_request_deinit(req);
61 static struct http_request * http_request_init(struct http_server *srv, int fd,
62 struct sockaddr_in *cli)
64 struct http_request *req;
66 if (srv->request_count >= HTTP_SERVER_MAX_CONNECTIONS) {
67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
71 req = os_zalloc(sizeof(*req));
79 req->hread = httpread_create(req->fd, http_request_cb, req,
80 HTTP_SERVER_MAX_REQ_LEN,
82 if (req->hread == NULL) {
83 http_request_deinit(req);
91 void http_request_deinit(struct http_request *req)
93 struct http_request *r, *p;
94 struct http_server *srv;
107 srv->requests = r->next;
108 srv->request_count--;
115 httpread_destroy(req->hread);
121 static void http_request_free_all(struct http_request *req)
123 struct http_request *prev;
127 http_request_deinit(prev);
132 void http_request_send(struct http_request *req, struct wpabuf *resp)
136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
137 (unsigned long) wpabuf_len(resp),
138 inet_ntoa(req->cli.sin_addr),
139 ntohs(req->cli.sin_port));
141 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0);
143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
145 } else if ((size_t) res < wpabuf_len(resp)) {
146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
147 res, (unsigned long) wpabuf_len(resp));
148 /* TODO: add eloop handler for sending rest of the data */
155 void http_request_send_and_deinit(struct http_request *req,
158 http_request_send(req, resp);
159 http_request_deinit(req);
163 enum httpread_hdr_type http_request_get_type(struct http_request *req)
165 return httpread_hdr_type_get(req->hread);
169 char * http_request_get_uri(struct http_request *req)
171 return httpread_uri_get(req->hread);
175 char * http_request_get_hdr(struct http_request *req)
177 return httpread_hdr_get(req->hread);
181 char * http_request_get_data(struct http_request *req)
183 return httpread_data_get(req->hread);
187 char * http_request_get_hdr_line(struct http_request *req, const char *tag)
189 return httpread_hdr_line_get(req->hread, tag);
193 struct sockaddr_in * http_request_get_cli_addr(struct http_request *req)
199 static void http_server_cb(int sd, void *eloop_ctx, void *sock_ctx)
201 struct sockaddr_in addr;
202 socklen_t addr_len = sizeof(addr);
203 struct http_server *srv = eloop_ctx;
205 struct http_request *req;
207 conn = accept(srv->fd, (struct sockaddr *) &addr, &addr_len);
209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
210 "%s", strerror(errno));
213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
214 inet_ntoa(addr.sin_addr), ntohs(addr.sin_port));
216 req = http_request_init(srv, conn, &addr);
222 req->next = srv->requests;
224 srv->request_count++;
228 struct http_server * http_server_init(struct in_addr *addr, int port,
229 void (*cb)(void *ctx,
230 struct http_request *req),
233 struct sockaddr_in sin;
234 struct http_server *srv;
237 srv = os_zalloc(sizeof(*srv));
241 srv->cb_ctx = cb_ctx;
243 srv->fd = socket(AF_INET, SOCK_STREAM, 0);
247 if (setsockopt(srv->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0)
249 wpa_printf(MSG_DEBUG,
250 "HTTP: setsockopt(SO_REUSEADDR) failed: %s",
252 /* try to continue anyway */
255 if (fcntl(srv->fd, F_SETFL, O_NONBLOCK) < 0)
262 os_memset(&sin, 0, sizeof(sin));
263 sin.sin_family = AF_INET;
264 sin.sin_addr.s_addr = addr->s_addr;
267 sin.sin_port = htons(srv->port);
268 if (bind(srv->fd, (struct sockaddr *) &sin, sizeof(sin)) == 0)
270 if (errno == EADDRINUSE) {
271 /* search for unused port */
272 if (++srv->port == 65535 || port >= 0)
276 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: "
277 "%s", srv->port, strerror(errno));
280 if (listen(srv->fd, 10 /* max backlog */) < 0 ||
281 fcntl(srv->fd, F_SETFL, O_NONBLOCK) < 0 ||
282 eloop_register_sock(srv->fd, EVENT_TYPE_READ, http_server_cb,
286 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d",
287 inet_ntoa(*addr), srv->port);
292 http_server_deinit(srv);
297 void http_server_deinit(struct http_server *srv)
302 eloop_unregister_sock(srv->fd, EVENT_TYPE_READ);
305 http_request_free_all(srv->requests);
311 int http_server_get_port(struct http_server *srv)