]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/p2p/p2p.c
Do not enable bgscan when driver takes care of BSS selection
[thirdparty/hostap.git] / src / p2p / p2p.c
CommitLineData
b22128ef
JM
1/*
2 * Wi-Fi Direct - P2P module
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#include "includes.h"
16
17#include "common.h"
18#include "eloop.h"
19#include "common/ieee802_11_defs.h"
20#include "common/ieee802_11_common.h"
21#include "wps/wps_i.h"
22#include "p2p_i.h"
23#include "p2p.h"
24
25
26static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
27static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
28static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
29 const u8 *sa, const u8 *data, size_t len,
30 int rx_freq);
31static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
32 const u8 *sa, const u8 *data,
33 size_t len);
34static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
40c03fd4 35static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
b22128ef
JM
36
37
40c03fd4
JM
38/*
39 * p2p_scan recovery timeout
40 *
41 * Many drivers are using 30 second timeout on scan results. Allow a bit larger
42 * timeout for this to avoid hitting P2P timeout unnecessarily.
43 */
44#define P2P_SCAN_TIMEOUT 35
45
b22128ef
JM
46/**
47 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
48 * entries will be removed
49 */
50#define P2P_PEER_EXPIRATION_AGE 300
51
52#define P2P_PEER_EXPIRATION_INTERVAL (P2P_PEER_EXPIRATION_AGE / 2)
53
54static void p2p_expire_peers(struct p2p_data *p2p)
55{
56 struct p2p_device *dev, *n;
57 struct os_time now;
58
59 os_get_time(&now);
60 dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
61 if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
62 continue;
63 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
c5db8e51 64 "entry " MACSTR, MAC2STR(dev->info.p2p_device_addr));
b22128ef
JM
65 dl_list_del(&dev->list);
66 p2p_device_free(p2p, dev);
67 }
68}
69
70
71static void p2p_expiration_timeout(void *eloop_ctx, void *timeout_ctx)
72{
73 struct p2p_data *p2p = eloop_ctx;
74 p2p_expire_peers(p2p);
75 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
76 p2p_expiration_timeout, p2p, NULL);
77}
78
79
80static const char * p2p_state_txt(int state)
81{
82 switch (state) {
83 case P2P_IDLE:
84 return "IDLE";
85 case P2P_SEARCH:
86 return "SEARCH";
87 case P2P_CONNECT:
88 return "CONNECT";
89 case P2P_CONNECT_LISTEN:
90 return "CONNECT_LISTEN";
91 case P2P_GO_NEG:
92 return "GO_NEG";
93 case P2P_LISTEN_ONLY:
94 return "LISTEN_ONLY";
95 case P2P_WAIT_PEER_CONNECT:
96 return "WAIT_PEER_CONNECT";
97 case P2P_WAIT_PEER_IDLE:
98 return "WAIT_PEER_IDLE";
99 case P2P_SD_DURING_FIND:
100 return "SD_DURING_FIND";
101 case P2P_PROVISIONING:
102 return "PROVISIONING";
103 case P2P_PD_DURING_FIND:
104 return "PD_DURING_FIND";
105 case P2P_INVITE:
106 return "INVITE";
107 case P2P_INVITE_LISTEN:
108 return "INVITE_LISTEN";
109 default:
110 return "?";
111 }
112}
113
114
115void p2p_set_state(struct p2p_data *p2p, int new_state)
116{
117 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
118 p2p_state_txt(p2p->state), p2p_state_txt(new_state));
119 p2p->state = new_state;
120}
121
122
123void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
124{
125 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
126 "P2P: Set timeout (state=%s): %u.%06u sec",
127 p2p_state_txt(p2p->state), sec, usec);
128 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
129 eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
130}
131
132
133void p2p_clear_timeout(struct p2p_data *p2p)
134{
135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
136 p2p_state_txt(p2p->state));
137 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
138}
139
140
141void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
142 int status)
143{
144 struct p2p_go_neg_results res;
145 p2p_clear_timeout(p2p);
146 p2p_set_state(p2p, P2P_IDLE);
147 p2p->go_neg_peer = NULL;
148
149 os_memset(&res, 0, sizeof(res));
150 res.status = status;
151 if (peer) {
c5db8e51 152 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr,
b22128ef
JM
153 ETH_ALEN);
154 os_memcpy(res.peer_interface_addr, peer->intended_addr,
155 ETH_ALEN);
156 }
157 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
158}
159
160
161static void p2p_listen_in_find(struct p2p_data *p2p)
162{
163 unsigned int r, tu;
164 int freq;
165 struct wpabuf *ies;
166
167 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
168 "P2P: Starting short listen state (state=%s)",
169 p2p_state_txt(p2p->state));
170
171 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
172 p2p->cfg->channel);
173 if (freq < 0) {
174 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
175 "P2P: Unknown regulatory class/channel");
176 return;
177 }
178
179 os_get_random((u8 *) &r, sizeof(r));
180 tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
181 p2p->min_disc_int) * 100;
182
183 p2p->pending_listen_freq = freq;
184 p2p->pending_listen_sec = 0;
185 p2p->pending_listen_usec = 1024 * tu;
186
187 ies = p2p_build_probe_resp_ies(p2p);
188 if (ies == NULL)
189 return;
190
191 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
192 ies) < 0) {
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
194 "P2P: Failed to start listen mode");
195 p2p->pending_listen_freq = 0;
196 }
197 wpabuf_free(ies);
198}
199
200
201int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
202{
203 int freq;
204 struct wpabuf *ies;
205
206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
207 "P2P: Going to listen(only) state");
208
209 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
210 p2p->cfg->channel);
211 if (freq < 0) {
212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
213 "P2P: Unknown regulatory class/channel");
214 return -1;
215 }
216
217 p2p->pending_listen_freq = freq;
218 p2p->pending_listen_sec = timeout / 1000;
219 p2p->pending_listen_usec = (timeout % 1000) * 1000;
220
221 if (p2p->p2p_scan_running) {
222 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
223 "P2P: p2p_scan running - delay start of listen state");
224 p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
225 return 0;
226 }
227
228 ies = p2p_build_probe_resp_ies(p2p);
229 if (ies == NULL)
230 return -1;
231
232 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
233 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
234 "P2P: Failed to start listen mode");
235 p2p->pending_listen_freq = 0;
236 wpabuf_free(ies);
237 return -1;
238 }
239 wpabuf_free(ies);
240
241 p2p_set_state(p2p, P2P_LISTEN_ONLY);
242
243 return 0;
244}
245
246
247static void p2p_device_clear_reported(struct p2p_data *p2p)
248{
249 struct p2p_device *dev;
250 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
251 dev->flags &= ~P2P_DEV_REPORTED;
252}
253
254
255/**
256 * p2p_get_device - Fetch a peer entry
257 * @p2p: P2P module context from p2p_init()
258 * @addr: P2P Device Address of the peer
259 * Returns: Pointer to the device entry or %NULL if not found
260 */
261struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
262{
263 struct p2p_device *dev;
264 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
c5db8e51 265 if (os_memcmp(dev->info.p2p_device_addr, addr, ETH_ALEN) == 0)
b22128ef
JM
266 return dev;
267 }
268 return NULL;
269}
270
271
272/**
273 * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
274 * @p2p: P2P module context from p2p_init()
275 * @addr: P2P Interface Address of the peer
276 * Returns: Pointer to the device entry or %NULL if not found
277 */
278struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
279 const u8 *addr)
280{
281 struct p2p_device *dev;
282 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
283 if (os_memcmp(dev->interface_addr, addr, ETH_ALEN) == 0)
284 return dev;
285 }
286 return NULL;
287}
288
289
290/**
291 * p2p_create_device - Create a peer entry
292 * @p2p: P2P module context from p2p_init()
293 * @addr: P2P Device Address of the peer
294 * Returns: Pointer to the device entry or %NULL on failure
295 *
296 * If there is already an entry for the peer, it will be returned instead of
297 * creating a new one.
298 */
299static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
300 const u8 *addr)
301{
302 struct p2p_device *dev, *oldest = NULL;
303 size_t count = 0;
304
305 dev = p2p_get_device(p2p, addr);
306 if (dev)
307 return dev;
308
309 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
310 count++;
311 if (oldest == NULL ||
312 os_time_before(&dev->last_seen, &oldest->last_seen))
313 oldest = dev;
314 }
315 if (count + 1 > p2p->cfg->max_peers && oldest) {
316 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
317 "P2P: Remove oldest peer entry to make room for a new "
318 "peer");
319 dl_list_del(&oldest->list);
320 p2p_device_free(p2p, oldest);
321 }
322
323 dev = os_zalloc(sizeof(*dev));
324 if (dev == NULL)
325 return NULL;
326 dl_list_add(&p2p->devices, &dev->list);
c5db8e51 327 os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
b22128ef
JM
328
329 return dev;
330}
331
332
333static void p2p_copy_client_info(struct p2p_device *dev,
334 struct p2p_client_info *cli)
335{
c5db8e51
KRK
336 os_memcpy(dev->info.device_name, cli->dev_name, cli->dev_name_len);
337 dev->info.device_name[cli->dev_name_len] = '\0';
338 dev->info.dev_capab = cli->dev_capab;
339 dev->info.config_methods = cli->config_methods;
340 os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
e57ae6e1
JMB
341 dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
342 os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
343 dev->info.wps_sec_dev_type_list_len);
b22128ef
JM
344}
345
346
347static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
348 const u8 *go_interface_addr, int freq,
349 const u8 *gi, size_t gi_len)
350{
351 struct p2p_group_info info;
352 size_t c;
353 struct p2p_device *dev;
354
355 if (gi == NULL)
356 return 0;
357
358 if (p2p_group_info_parse(gi, gi_len, &info) < 0)
359 return -1;
360
361 /*
362 * Clear old data for this group; if the devices are still in the
363 * group, the information will be restored in the loop following this.
364 */
365 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
366 if (os_memcpy(dev->member_in_go_iface, go_interface_addr,
367 ETH_ALEN) == 0) {
368 os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
369 os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
370 }
371 }
372
373 for (c = 0; c < info.num_clients; c++) {
374 struct p2p_client_info *cli = &info.client[c];
375 dev = p2p_get_device(p2p, cli->p2p_device_addr);
376 if (dev) {
377 /*
378 * Update information only if we have not received this
379 * directly from the client.
380 */
381 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
382 P2P_DEV_PROBE_REQ_ONLY))
383 p2p_copy_client_info(dev, cli);
384 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
385 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
386 }
387 } else {
388 dev = p2p_create_device(p2p, cli->p2p_device_addr);
389 if (dev == NULL)
390 continue;
391 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
392 p2p_copy_client_info(dev, cli);
393 dev->oper_freq = freq;
c5db8e51
KRK
394 p2p->cfg->dev_found(p2p->cfg->cb_ctx,
395 dev->info.p2p_device_addr,
8fd7dc1b
JB
396 &dev->info, 1);
397 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
398 }
399
400 os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
401 ETH_ALEN);
402 os_get_time(&dev->last_seen);
403 os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
404 os_memcpy(dev->member_in_go_iface, go_interface_addr,
405 ETH_ALEN);
406 }
407
408 return 0;
409}
410
411
b67d0d9e
JM
412static void p2p_copy_wps_info(struct p2p_device *dev, int probe_req,
413 const struct p2p_message *msg)
414{
415 os_memcpy(dev->info.device_name, msg->device_name,
416 sizeof(dev->info.device_name));
417
418 if (msg->manufacturer &&
419 msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
420 os_memset(dev->info.manufacturer, 0,
421 sizeof(dev->info.manufacturer));
422 os_memcpy(dev->info.manufacturer, msg->manufacturer,
423 msg->manufacturer_len);
424 }
425
426 if (msg->model_name &&
427 msg->model_name_len < sizeof(dev->info.model_name)) {
428 os_memset(dev->info.model_name, 0,
429 sizeof(dev->info.model_name));
430 os_memcpy(dev->info.model_name, msg->model_name,
431 msg->model_name_len);
432 }
433
434 if (msg->model_number &&
435 msg->model_number_len < sizeof(dev->info.model_number)) {
436 os_memset(dev->info.model_number, 0,
437 sizeof(dev->info.model_number));
438 os_memcpy(dev->info.model_number, msg->model_number,
439 msg->model_number_len);
440 }
441
442 if (msg->serial_number &&
443 msg->serial_number_len < sizeof(dev->info.serial_number)) {
444 os_memset(dev->info.serial_number, 0,
445 sizeof(dev->info.serial_number));
446 os_memcpy(dev->info.serial_number, msg->serial_number,
447 msg->serial_number_len);
448 }
449
450 if (msg->pri_dev_type)
451 os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
452 sizeof(dev->info.pri_dev_type));
453 else if (msg->wps_pri_dev_type)
454 os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
455 sizeof(dev->info.pri_dev_type));
456
457 if (msg->wps_sec_dev_type_list) {
458 os_memcpy(dev->info.wps_sec_dev_type_list,
459 msg->wps_sec_dev_type_list,
460 msg->wps_sec_dev_type_list_len);
461 dev->info.wps_sec_dev_type_list_len =
462 msg->wps_sec_dev_type_list_len;
463 }
464
465 if (msg->capability) {
466 dev->info.dev_capab = msg->capability[0];
467 dev->info.group_capab = msg->capability[1];
468 }
469
470 if (msg->ext_listen_timing) {
471 dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
472 dev->ext_listen_interval =
473 WPA_GET_LE16(msg->ext_listen_timing + 2);
474 }
475
476 if (!probe_req) {
477 dev->info.config_methods = msg->config_methods ?
478 msg->config_methods : msg->wps_config_methods;
479 }
480}
481
482
b22128ef
JM
483/**
484 * p2p_add_device - Add peer entries based on scan results
485 * @p2p: P2P module context from p2p_init()
486 * @addr: Source address of Beacon or Probe Response frame (may be either
487 * P2P Device Address or P2P Interface Address)
488 * @level: Signal level (signal strength of the received frame from the peer)
489 * @freq: Frequency on which the Beacon or Probe Response frame was received
490 * @ies: IEs from the Beacon or Probe Response frame
491 * @ies_len: Length of ies buffer in octets
492 * Returns: 0 on success, -1 on failure
493 *
494 * If the scan result is for a GO, the clients in the group will also be added
17bef1e9
AC
495 * to the peer table. This function can also be used with some other frames
496 * like Provision Discovery Request that contains P2P Capability and P2P Device
497 * Info attributes.
b22128ef 498 */
17bef1e9
AC
499int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq, int level,
500 const u8 *ies, size_t ies_len)
b22128ef
JM
501{
502 struct p2p_device *dev;
503 struct p2p_message msg;
504 const u8 *p2p_dev_addr;
6f2c0607 505 int i;
b22128ef
JM
506
507 os_memset(&msg, 0, sizeof(msg));
508 if (p2p_parse_ies(ies, ies_len, &msg)) {
509 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
510 "P2P: Failed to parse P2P IE for a device entry");
511 p2p_parse_free(&msg);
512 return -1;
513 }
514
515 if (msg.p2p_device_addr)
516 p2p_dev_addr = msg.p2p_device_addr;
517 else if (msg.device_id)
518 p2p_dev_addr = msg.device_id;
519 else {
520 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
521 "P2P: Ignore scan data without P2P Device Info or "
522 "P2P Device Id");
523 p2p_parse_free(&msg);
524 return -1;
525 }
526
80c9582a
JM
527 if (!is_zero_ether_addr(p2p->peer_filter) &&
528 os_memcmp(p2p_dev_addr, p2p->peer_filter, ETH_ALEN) != 0) {
529 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Do not add peer "
530 "filter for " MACSTR " due to peer filter",
531 MAC2STR(p2p_dev_addr));
532 return 0;
533 }
534
b22128ef
JM
535 dev = p2p_create_device(p2p, p2p_dev_addr);
536 if (dev == NULL) {
537 p2p_parse_free(&msg);
538 return -1;
539 }
540 os_get_time(&dev->last_seen);
541 dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
542
543 if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
544 os_memcpy(dev->interface_addr, addr, ETH_ALEN);
545 if (msg.ssid &&
546 (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
547 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
548 != 0)) {
549 os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
550 dev->oper_ssid_len = msg.ssid[1];
551 }
552
553 if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
554 *msg.ds_params >= 1 && *msg.ds_params <= 14) {
555 int ds_freq;
556 if (*msg.ds_params == 14)
557 ds_freq = 2484;
558 else
559 ds_freq = 2407 + *msg.ds_params * 5;
560 if (freq != ds_freq) {
561 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
562 "P2P: Update Listen frequency based on DS "
563 "Parameter Set IE: %d -> %d MHz",
564 freq, ds_freq);
565 freq = ds_freq;
566 }
567 }
568
569 if (dev->listen_freq && dev->listen_freq != freq) {
570 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
571 "P2P: Update Listen frequency based on scan "
572 "results (" MACSTR " %d -> %d MHz (DS param %d)",
c5db8e51
KRK
573 MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
574 freq, msg.ds_params ? *msg.ds_params : -1);
b22128ef
JM
575 }
576 dev->listen_freq = freq;
f8d0131a
JM
577 if (msg.group_info)
578 dev->oper_freq = freq;
6402fc43 579 dev->info.level = level;
b22128ef 580
b67d0d9e 581 p2p_copy_wps_info(dev, 0, &msg);
e57ae6e1 582
10c5d2a5 583 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
584 wpabuf_free(dev->info.wps_vendor_ext[i]);
585 dev->info.wps_vendor_ext[i] = NULL;
586 }
587
10c5d2a5 588 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
589 if (msg.wps_vendor_ext[i] == NULL)
590 break;
591 dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
592 msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
593 if (dev->info.wps_vendor_ext[i] == NULL)
594 break;
595 }
596
b22128ef
JM
597 p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq, msg.group_info,
598 msg.group_info_len);
599
600 p2p_parse_free(&msg);
601
602 if (p2p_pending_sd_req(p2p, dev))
603 dev->flags |= P2P_DEV_SD_SCHEDULE;
604
605 if (dev->flags & P2P_DEV_REPORTED)
606 return 0;
607
608 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
609 "P2P: Peer found with Listen frequency %d MHz", freq);
610 if (dev->flags & P2P_DEV_USER_REJECTED) {
611 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
612 "P2P: Do not report rejected device");
613 return 0;
614 }
8fd7dc1b
JB
615
616 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
617 !(dev->flags & P2P_DEV_REPORTED_ONCE));
618 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
619
620 return 0;
621}
622
623
624static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
625{
6f2c0607
JMB
626 int i;
627
b22128ef
JM
628 if (p2p->go_neg_peer == dev)
629 p2p->go_neg_peer = NULL;
630 if (p2p->invite_peer == dev)
631 p2p->invite_peer = NULL;
632 if (p2p->sd_peer == dev)
633 p2p->sd_peer = NULL;
634 if (p2p->pending_client_disc_go == dev)
635 p2p->pending_client_disc_go = NULL;
636
f5fc6032
AC
637 /* dev_lost() device, but only if it was previously dev_found() */
638 if (dev->flags & P2P_DEV_REPORTED_ONCE)
639 p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
640 dev->info.p2p_device_addr);
56eeb8f2 641
10c5d2a5 642 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
643 wpabuf_free(dev->info.wps_vendor_ext[i]);
644 dev->info.wps_vendor_ext[i] = NULL;
645 }
646
b22128ef
JM
647 os_free(dev);
648}
649
650
651static int p2p_get_next_prog_freq(struct p2p_data *p2p)
652{
653 struct p2p_channels *c;
654 struct p2p_reg_class *cla;
655 size_t cl, ch;
656 int found = 0;
657 u8 reg_class;
658 u8 channel;
659 int freq;
660
661 c = &p2p->cfg->channels;
662 for (cl = 0; cl < c->reg_classes; cl++) {
663 cla = &c->reg_class[cl];
664 if (cla->reg_class != p2p->last_prog_scan_class)
665 continue;
666 for (ch = 0; ch < cla->channels; ch++) {
667 if (cla->channel[ch] == p2p->last_prog_scan_chan) {
668 found = 1;
669 break;
670 }
671 }
672 if (found)
673 break;
674 }
675
676 if (!found) {
677 /* Start from beginning */
678 reg_class = c->reg_class[0].reg_class;
679 channel = c->reg_class[0].channel[0];
680 } else {
681 /* Pick the next channel */
682 ch++;
683 if (ch == cla->channels) {
684 cl++;
685 if (cl == c->reg_classes)
686 cl = 0;
687 ch = 0;
688 }
689 reg_class = c->reg_class[cl].reg_class;
690 channel = c->reg_class[cl].channel[ch];
691 }
692
693 freq = p2p_channel_to_freq(p2p->cfg->country, reg_class, channel);
694 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Next progressive search "
695 "channel: reg_class %u channel %u -> %d MHz",
696 reg_class, channel, freq);
697 p2p->last_prog_scan_class = reg_class;
698 p2p->last_prog_scan_chan = channel;
699
700 if (freq == 2412 || freq == 2437 || freq == 2462)
701 return 0; /* No need to add social channels */
702 return freq;
703}
704
705
706static void p2p_search(struct p2p_data *p2p)
707{
708 int freq = 0;
709 enum p2p_scan_type type;
710
711 if (p2p->drv_in_listen) {
712 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is still "
713 "in Listen state - wait for it to end before "
714 "continuing");
715 return;
716 }
717 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
718
719 if (p2p->go_neg_peer) {
720 /*
721 * Only scan the known listen frequency of the peer
722 * during GO Negotiation start.
723 */
724 freq = p2p->go_neg_peer->listen_freq;
725 if (freq <= 0)
726 freq = p2p->go_neg_peer->oper_freq;
727 type = P2P_SCAN_SPECIFIC;
728 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
729 "for freq %u (GO Neg)", freq);
730 } else if (p2p->invite_peer) {
731 /*
732 * Only scan the known listen frequency of the peer
733 * during Invite start.
734 */
735 freq = p2p->invite_peer->listen_freq;
736 if (freq <= 0)
737 freq = p2p->invite_peer->oper_freq;
738 type = P2P_SCAN_SPECIFIC;
739 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
740 "for freq %u (Invite)", freq);
741 } else if (p2p->find_type == P2P_FIND_PROGRESSIVE &&
742 (freq = p2p_get_next_prog_freq(p2p)) > 0) {
743 type = P2P_SCAN_SOCIAL_PLUS_ONE;
744 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
745 "(+ freq %u)", freq);
746 } else {
747 type = P2P_SCAN_SOCIAL;
748 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search");
749 }
750
046ef4aa
JMB
751 if (p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
752 p2p->num_req_dev_types, p2p->req_dev_types) < 0)
753 {
b22128ef
JM
754 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
755 "P2P: Scan request failed");
756 p2p_continue_find(p2p);
40c03fd4
JM
757 } else {
758 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
759 p2p->p2p_scan_running = 1;
760 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
761 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
762 p2p, NULL);
b22128ef
JM
763 }
764}
765
766
767static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
768{
769 struct p2p_data *p2p = eloop_ctx;
770 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Find timeout -> stop");
771 p2p_stop_find(p2p);
772}
773
774
775static int p2p_run_after_scan(struct p2p_data *p2p)
776{
777 struct p2p_device *dev;
778 enum p2p_after_scan op;
779
3f9285ff
JM
780 if (p2p->after_scan_tx) {
781 int ret;
782 /* TODO: schedule p2p_run_after_scan to be called from TX
783 * status callback(?) */
784 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send pending "
785 "Action frame at p2p_scan completion");
786 ret = p2p->cfg->send_action(p2p->cfg->cb_ctx,
787 p2p->after_scan_tx->freq,
788 p2p->after_scan_tx->dst,
789 p2p->after_scan_tx->src,
790 p2p->after_scan_tx->bssid,
791 (u8 *) (p2p->after_scan_tx + 1),
792 p2p->after_scan_tx->len,
793 p2p->after_scan_tx->wait_time);
794 os_free(p2p->after_scan_tx);
795 p2p->after_scan_tx = NULL;
796 return 1;
797 }
798
b22128ef
JM
799 op = p2p->start_after_scan;
800 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
801 switch (op) {
802 case P2P_AFTER_SCAN_NOTHING:
803 break;
804 case P2P_AFTER_SCAN_LISTEN:
805 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
806 "requested Listen state");
807 p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
808 p2p->pending_listen_usec / 1000);
809 return 1;
810 case P2P_AFTER_SCAN_CONNECT:
811 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
812 "requested connect with " MACSTR,
813 MAC2STR(p2p->after_scan_peer));
814 dev = p2p_get_device(p2p, p2p->after_scan_peer);
815 if (dev == NULL) {
816 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer not "
817 "known anymore");
818 break;
819 }
820 p2p_connect_send(p2p, dev);
821 return 1;
822 }
823
824 return 0;
825}
826
827
b22128ef
JM
828static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
829{
830 struct p2p_data *p2p = eloop_ctx;
831 int running;
832 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan timeout "
833 "(running=%d)", p2p->p2p_scan_running);
834 running = p2p->p2p_scan_running;
835 /* Make sure we recover from missed scan results callback */
836 p2p->p2p_scan_running = 0;
837
838 if (running)
839 p2p_run_after_scan(p2p);
840}
841
842
046ef4aa
JMB
843static void p2p_free_req_dev_types(struct p2p_data *p2p)
844{
845 p2p->num_req_dev_types = 0;
846 os_free(p2p->req_dev_types);
847 p2p->req_dev_types = NULL;
848}
849
850
b22128ef 851int p2p_find(struct p2p_data *p2p, unsigned int timeout,
046ef4aa
JMB
852 enum p2p_discovery_type type,
853 unsigned int num_req_dev_types, const u8 *req_dev_types)
b22128ef
JM
854{
855 int res;
856
857 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting find (type=%d)",
858 type);
859 if (p2p->p2p_scan_running) {
860 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan is "
861 "already running");
862 }
046ef4aa
JMB
863
864 p2p_free_req_dev_types(p2p);
865 if (req_dev_types && num_req_dev_types) {
866 p2p->req_dev_types = os_malloc(num_req_dev_types *
867 WPS_DEV_TYPE_LEN);
868 if (p2p->req_dev_types == NULL)
869 return -1;
870 os_memcpy(p2p->req_dev_types, req_dev_types,
871 num_req_dev_types * WPS_DEV_TYPE_LEN);
872 p2p->num_req_dev_types = num_req_dev_types;
873 }
874
b22128ef
JM
875 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
876 p2p_clear_timeout(p2p);
877 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
878 p2p->find_type = type;
879 p2p_device_clear_reported(p2p);
880 p2p_set_state(p2p, P2P_SEARCH);
881 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
882 if (timeout)
883 eloop_register_timeout(timeout, 0, p2p_find_timeout,
884 p2p, NULL);
885 switch (type) {
886 case P2P_FIND_START_WITH_FULL:
887 case P2P_FIND_PROGRESSIVE:
046ef4aa
JMB
888 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
889 p2p->num_req_dev_types,
890 p2p->req_dev_types);
b22128ef
JM
891 break;
892 case P2P_FIND_ONLY_SOCIAL:
046ef4aa
JMB
893 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
894 p2p->num_req_dev_types,
895 p2p->req_dev_types);
b22128ef
JM
896 break;
897 default:
898 return -1;
899 }
900
901 if (res == 0) {
902 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
903 p2p->p2p_scan_running = 1;
904 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
905 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
906 p2p, NULL);
907 } else {
908 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
909 "p2p_scan");
910 }
911
912 return res;
913}
914
915
0b8889d8 916void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
b22128ef
JM
917{
918 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopping find");
919 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
920 p2p_clear_timeout(p2p);
921 p2p_set_state(p2p, P2P_IDLE);
046ef4aa 922 p2p_free_req_dev_types(p2p);
b22128ef
JM
923 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
924 p2p->go_neg_peer = NULL;
925 p2p->sd_peer = NULL;
926 p2p->invite_peer = NULL;
0b8889d8
JM
927 if (freq > 0 && p2p->drv_in_listen == freq && p2p->in_listen) {
928 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip stop_listen "
929 "since we are on correct channel for response");
930 return;
931 }
54b8f994
JM
932 if (p2p->drv_in_listen) {
933 /*
934 * The driver may not deliver callback to p2p_listen_end()
935 * when the operation gets canceled, so clear the internal
936 * variable that is tracking driver state.
937 */
938 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear "
939 "drv_in_listen (%d)", p2p->drv_in_listen);
940 p2p->drv_in_listen = 0;
941 }
b22128ef
JM
942 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
943}
944
945
0b8889d8
JM
946void p2p_stop_find(struct p2p_data *p2p)
947{
948 p2p_stop_find_for_freq(p2p, 0);
949}
950
951
7861cb08 952static int p2p_prepare_channel(struct p2p_data *p2p, unsigned int force_freq)
b22128ef 953{
b22128ef 954 if (force_freq) {
1e19f734 955 u8 op_reg_class, op_channel;
b22128ef 956 if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
1e19f734 957 &op_reg_class, &op_channel) < 0) {
b22128ef
JM
958 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
959 "P2P: Unsupported frequency %u MHz",
960 force_freq);
961 return -1;
962 }
1e19f734
JM
963 if (!p2p_channels_includes(&p2p->cfg->channels, op_reg_class,
964 op_channel)) {
965 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
966 "P2P: Frequency %u MHz (oper_class %u "
967 "channel %u) not allowed for P2P",
968 force_freq, op_reg_class, op_channel);
969 return -1;
970 }
971 p2p->op_reg_class = op_reg_class;
972 p2p->op_channel = op_channel;
b22128ef
JM
973 p2p->channels.reg_classes = 1;
974 p2p->channels.reg_class[0].channels = 1;
975 p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
976 p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
977 } else {
7cfc4ac3
AGS
978 u8 op_reg_class, op_channel;
979
980 if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
981 p2p_supported_freq(p2p, p2p->best_freq_overall) &&
982 p2p_freq_to_channel(p2p->cfg->country,
983 p2p->best_freq_overall,
984 &op_reg_class, &op_channel) == 0) {
985 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
986 "P2P: Select best overall channel as "
987 "operating channel preference");
988 p2p->op_reg_class = op_reg_class;
989 p2p->op_channel = op_channel;
990 } else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
991 p2p_supported_freq(p2p, p2p->best_freq_5) &&
992 p2p_freq_to_channel(p2p->cfg->country,
993 p2p->best_freq_5,
994 &op_reg_class, &op_channel) ==
995 0) {
996 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
997 "P2P: Select best 5 GHz channel as "
998 "operating channel preference");
999 p2p->op_reg_class = op_reg_class;
1000 p2p->op_channel = op_channel;
1001 } else if (!p2p->cfg->cfg_op_channel &&
1002 p2p->best_freq_24 > 0 &&
1003 p2p_supported_freq(p2p, p2p->best_freq_24) &&
1004 p2p_freq_to_channel(p2p->cfg->country,
1005 p2p->best_freq_24,
1006 &op_reg_class, &op_channel) ==
1007 0) {
1008 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1009 "P2P: Select best 2.4 GHz channel as "
1010 "operating channel preference");
1011 p2p->op_reg_class = op_reg_class;
1012 p2p->op_channel = op_channel;
1013 } else {
1014 p2p->op_reg_class = p2p->cfg->op_reg_class;
1015 p2p->op_channel = p2p->cfg->op_channel;
1016 }
1017
b22128ef
JM
1018 os_memcpy(&p2p->channels, &p2p->cfg->channels,
1019 sizeof(struct p2p_channels));
1020 }
1021 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1022 "P2P: Own preference for operation channel: "
7cfc4ac3 1023 "Operating Class %u Channel %u%s",
b22128ef
JM
1024 p2p->op_reg_class, p2p->op_channel,
1025 force_freq ? " (forced)" : "");
1026
7861cb08
JM
1027 return 0;
1028}
1029
1030
1031int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1032 enum p2p_wps_method wps_method,
1033 int go_intent, const u8 *own_interface_addr,
1034 unsigned int force_freq, int persistent_group)
1035{
1036 struct p2p_device *dev;
1037
1038 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1039 "P2P: Request to start group negotiation - peer=" MACSTR
1040 " GO Intent=%d Intended Interface Address=" MACSTR
1041 " wps_method=%d persistent_group=%d",
1042 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1043 wps_method, persistent_group);
1044
1045 if (p2p_prepare_channel(p2p, force_freq) < 0)
1046 return -1;
1047
b22128ef
JM
1048 dev = p2p_get_device(p2p, peer_addr);
1049 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1050 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1051 "P2P: Cannot connect to unknown P2P Device " MACSTR,
1052 MAC2STR(peer_addr));
1053 return -1;
1054 }
1055
1056 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
c5db8e51
KRK
1057 if (!(dev->info.dev_capab &
1058 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
b22128ef
JM
1059 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1060 "P2P: Cannot connect to P2P Device " MACSTR
1061 " that is in a group and is not discoverable",
1062 MAC2STR(peer_addr));
1063 return -1;
1064 }
1065 if (dev->oper_freq <= 0) {
1066 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1067 "P2P: Cannot connect to P2P Device " MACSTR
1068 " with incomplete information",
1069 MAC2STR(peer_addr));
1070 return -1;
1071 }
1072
1073 /*
1074 * First, try to connect directly. If the peer does not
1075 * acknowledge frames, assume it is sleeping and use device
1076 * discoverability via the GO at that point.
1077 */
1078 }
1079
1080 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1081 dev->flags &= ~P2P_DEV_USER_REJECTED;
1082 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1083 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
9dac8c3e 1084 dev->connect_reqs = 0;
b22128ef
JM
1085 dev->go_neg_req_sent = 0;
1086 dev->go_state = UNKNOWN_GO;
1087 if (persistent_group)
1088 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1089 else
1090 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_GROUP;
1091 p2p->go_intent = go_intent;
1092 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1093
1094 if (p2p->state != P2P_IDLE)
1095 p2p_stop_find(p2p);
1096
f44ae207
JM
1097 if (p2p->after_scan_tx) {
1098 /*
1099 * We need to drop the pending frame to avoid issues with the
1100 * new GO Negotiation, e.g., when the pending frame was from a
1101 * previous attempt at starting a GO Negotiation.
1102 */
1103 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
1104 "previous pending Action frame TX that was waiting "
1105 "for p2p_scan completion");
1106 os_free(p2p->after_scan_tx);
1107 p2p->after_scan_tx = NULL;
1108 }
1109
b22128ef
JM
1110 dev->wps_method = wps_method;
1111 dev->status = P2P_SC_SUCCESS;
d5b20a73
JM
1112
1113 if (force_freq)
1114 dev->flags |= P2P_DEV_FORCE_FREQ;
1115 else
1116 dev->flags &= ~P2P_DEV_FORCE_FREQ;
1117
b22128ef
JM
1118 if (p2p->p2p_scan_running) {
1119 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1120 "P2P: p2p_scan running - delay connect send");
1121 p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1122 os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1123 return 0;
1124 }
1125 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1126
1127 return p2p_connect_send(p2p, dev);
1128}
1129
1130
1131int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1132 enum p2p_wps_method wps_method,
1133 int go_intent, const u8 *own_interface_addr,
1134 unsigned int force_freq, int persistent_group)
1135{
1136 struct p2p_device *dev;
1137
1138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1139 "P2P: Request to authorize group negotiation - peer=" MACSTR
1140 " GO Intent=%d Intended Interface Address=" MACSTR
1141 " wps_method=%d persistent_group=%d",
1142 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1143 wps_method, persistent_group);
1144
7861cb08
JM
1145 if (p2p_prepare_channel(p2p, force_freq) < 0)
1146 return -1;
b22128ef
JM
1147
1148 dev = p2p_get_device(p2p, peer_addr);
1149 if (dev == NULL) {
1150 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1151 "P2P: Cannot authorize unknown P2P Device " MACSTR,
1152 MAC2STR(peer_addr));
1153 return -1;
1154 }
1155
1156 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1157 dev->flags &= ~P2P_DEV_USER_REJECTED;
1158 dev->go_neg_req_sent = 0;
1159 dev->go_state = UNKNOWN_GO;
1160 if (persistent_group)
1161 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1162 else
1163 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_GROUP;
1164 p2p->go_intent = go_intent;
1165 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1166
1167 dev->wps_method = wps_method;
1168 dev->status = P2P_SC_SUCCESS;
1169
d5b20a73
JM
1170 if (force_freq)
1171 dev->flags |= P2P_DEV_FORCE_FREQ;
1172 else
1173 dev->flags &= ~P2P_DEV_FORCE_FREQ;
1174
b22128ef
JM
1175 return 0;
1176}
1177
1178
1179void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1180 struct p2p_device *dev, struct p2p_message *msg)
1181{
1182 os_get_time(&dev->last_seen);
1183
b67d0d9e 1184 p2p_copy_wps_info(dev, 0, msg);
e57ae6e1 1185
b22128ef
JM
1186 if (msg->listen_channel) {
1187 int freq;
1188 freq = p2p_channel_to_freq((char *) msg->listen_channel,
1189 msg->listen_channel[3],
1190 msg->listen_channel[4]);
1191 if (freq < 0) {
1192 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1193 "P2P: Unknown peer Listen channel: "
1194 "country=%c%c(0x%02x) reg_class=%u channel=%u",
1195 msg->listen_channel[0],
1196 msg->listen_channel[1],
1197 msg->listen_channel[2],
1198 msg->listen_channel[3],
1199 msg->listen_channel[4]);
1200 } else {
1201 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update "
1202 "peer " MACSTR " Listen channel: %u -> %u MHz",
c5db8e51 1203 MAC2STR(dev->info.p2p_device_addr),
b22128ef
JM
1204 dev->listen_freq, freq);
1205 dev->listen_freq = freq;
1206 }
1207 }
b22128ef
JM
1208
1209 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1210 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1211 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1212 "P2P: Completed device entry based on data from "
1213 "GO Negotiation Request");
1214 } else {
1215 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1216 "P2P: Created device entry based on GO Neg Req: "
1217 MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1218 "listen_freq=%d",
c5db8e51
KRK
1219 MAC2STR(dev->info.p2p_device_addr),
1220 dev->info.dev_capab, dev->info.group_capab,
1221 dev->info.device_name, dev->listen_freq);
b22128ef
JM
1222 }
1223
1224 dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1225
1226 if (dev->flags & P2P_DEV_USER_REJECTED) {
1227 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1228 "P2P: Do not report rejected device");
1229 return;
1230 }
1231
8fd7dc1b
JB
1232 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1233 !(dev->flags & P2P_DEV_REPORTED_ONCE));
1234 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
1235}
1236
1237
1238void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1239{
1240 os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1241 p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1242 os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1243 p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1244 *ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1245}
1246
1247
1248int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1249{
1250 p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1251 p2p_random(params->passphrase, 8);
1252 return 0;
1253}
1254
1255
1256void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1257{
1258 struct p2p_go_neg_results res;
1259 int go = peer->go_state == LOCAL_GO;
1260 struct p2p_channels intersection;
1261 int freqs;
1262 size_t i, j;
1263
1264 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1265 "P2P: GO Negotiation with " MACSTR " completed (%s will be "
c5db8e51 1266 "GO)", MAC2STR(peer->info.p2p_device_addr),
b22128ef
JM
1267 go ? "local end" : "peer");
1268
1269 os_memset(&res, 0, sizeof(res));
1270 res.role_go = go;
c5db8e51 1271 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
b22128ef
JM
1272 os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1273 res.wps_method = peer->wps_method;
1274 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP)
1275 res.persistent_group = 1;
1276
1277 if (go) {
1278 /* Setup AP mode for WPS provisioning */
1279 res.freq = p2p_channel_to_freq(p2p->cfg->country,
1280 p2p->op_reg_class,
1281 p2p->op_channel);
1282 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1283 res.ssid_len = p2p->ssid_len;
1284 p2p_random(res.passphrase, 8);
e9a7ae41 1285 } else {
b22128ef 1286 res.freq = peer->oper_freq;
e9a7ae41
JM
1287 if (p2p->ssid_len) {
1288 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1289 res.ssid_len = p2p->ssid_len;
1290 }
1291 }
b22128ef
JM
1292
1293 p2p_channels_intersect(&p2p->channels, &peer->channels,
1294 &intersection);
1295 freqs = 0;
1296 for (i = 0; i < intersection.reg_classes; i++) {
1297 struct p2p_reg_class *c = &intersection.reg_class[i];
1298 if (freqs + 1 == P2P_MAX_CHANNELS)
1299 break;
1300 for (j = 0; j < c->channels; j++) {
1301 int freq;
1302 if (freqs + 1 == P2P_MAX_CHANNELS)
1303 break;
1304 freq = p2p_channel_to_freq(peer->country, c->reg_class,
1305 c->channel[j]);
1306 if (freq < 0)
1307 continue;
1308 res.freq_list[freqs++] = freq;
1309 }
1310 }
1311
ae3e3421
JM
1312 res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1313
b22128ef
JM
1314 p2p_clear_timeout(p2p);
1315 peer->go_neg_req_sent = 0;
1316 peer->wps_method = WPS_NOT_READY;
1317
1318 p2p_set_state(p2p, P2P_PROVISIONING);
1319 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
1320}
1321
1322
1323static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
1324 const u8 *data, size_t len, int rx_freq)
1325{
1326 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1327 "P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
1328 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
1329
1330 if (len < 1)
1331 return;
1332
1333 switch (data[0]) {
1334 case P2P_GO_NEG_REQ:
1335 p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
1336 break;
1337 case P2P_GO_NEG_RESP:
1338 p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
1339 break;
1340 case P2P_GO_NEG_CONF:
1341 p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
1342 break;
1343 case P2P_INVITATION_REQ:
1344 p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
1345 rx_freq);
1346 break;
1347 case P2P_INVITATION_RESP:
1348 p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
1349 break;
1350 case P2P_PROV_DISC_REQ:
1351 p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1352 break;
1353 case P2P_PROV_DISC_RESP:
1354 p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
1355 break;
1356 case P2P_DEV_DISC_REQ:
1357 p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1358 break;
1359 case P2P_DEV_DISC_RESP:
1360 p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
1361 break;
1362 default:
1363 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1364 "P2P: Unsupported P2P Public Action frame type %d",
1365 data[0]);
1366 break;
1367 }
1368}
1369
1370
1371void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1372 const u8 *bssid, const u8 *data, size_t len,
1373 int freq)
1374{
1375 if (len < 1)
1376 return;
1377
1378 switch (data[0]) {
1379 case WLAN_PA_VENDOR_SPECIFIC:
1380 data++;
1381 len--;
1382 if (len < 3)
1383 return;
1384 if (WPA_GET_BE24(data) != OUI_WFA)
1385 return;
1386
1387 data += 3;
1388 len -= 3;
1389 if (len < 1)
1390 return;
1391
1392 if (*data != P2P_OUI_TYPE)
1393 return;
1394
1395 p2p_rx_p2p_action(p2p, sa, data + 1, len - 1, freq);
1396 break;
1397 case WLAN_PA_GAS_INITIAL_REQ:
1398 p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
1399 break;
1400 case WLAN_PA_GAS_INITIAL_RESP:
18708aad
JM
1401 p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
1402 break;
1403 case WLAN_PA_GAS_COMEBACK_REQ:
1404 p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
1405 break;
1406 case WLAN_PA_GAS_COMEBACK_RESP:
1407 p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
b22128ef
JM
1408 break;
1409 }
1410}
1411
1412
1413void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1414 const u8 *bssid, u8 category,
1415 const u8 *data, size_t len, int freq)
1416{
1417 if (category == WLAN_ACTION_PUBLIC) {
1418 p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
1419 return;
1420 }
1421
1422 if (category != WLAN_ACTION_VENDOR_SPECIFIC)
1423 return;
1424
1425 if (len < 4)
1426 return;
1427
1428 if (WPA_GET_BE24(data) != OUI_WFA)
1429 return;
1430 data += 3;
1431 len -= 3;
1432
1433 if (*data != P2P_OUI_TYPE)
1434 return;
1435 data++;
1436 len--;
1437
1438 /* P2P action frame */
1439 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1440 "P2P: RX P2P Action from " MACSTR, MAC2STR(sa));
1441 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
1442
1443 if (len < 1)
1444 return;
1445 switch (data[0]) {
1446 case P2P_NOA:
1447 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1448 "P2P: Received P2P Action - Notice of Absence");
1449 /* TODO */
1450 break;
1451 case P2P_PRESENCE_REQ:
1452 p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
1453 break;
1454 case P2P_PRESENCE_RESP:
1455 p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
1456 break;
1457 case P2P_GO_DISC_REQ:
1458 p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
1459 break;
1460 default:
1461 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1462 "P2P: Received P2P Action - unknown type %u", data[0]);
1463 break;
1464 }
1465}
1466
1467
1468static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
1469{
1470 struct p2p_data *p2p = eloop_ctx;
1471 if (p2p->go_neg_peer == NULL)
1472 return;
1473 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1474 p2p->go_neg_peer->status = P2P_SC_SUCCESS;
1475 p2p_connect_send(p2p, p2p->go_neg_peer);
1476}
1477
1478
1479static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
1480{
1481 struct p2p_data *p2p = eloop_ctx;
1482 if (p2p->invite_peer == NULL)
1483 return;
1484 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1485 p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr);
1486}
1487
1488
1489static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
1490 const u8 *ie, size_t ie_len)
1491{
1492 struct p2p_message msg;
1493 struct p2p_device *dev;
1494
1495 os_memset(&msg, 0, sizeof(msg));
1496 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
1497 {
1498 p2p_parse_free(&msg);
1499 return; /* not a P2P probe */
1500 }
1501
1502 if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
1503 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
1504 != 0) {
1505 /* The Probe Request is not part of P2P Device Discovery. It is
1506 * not known whether the source address of the frame is the P2P
1507 * Device Address or P2P Interface Address. Do not add a new
1508 * peer entry based on this frames.
1509 */
1510 p2p_parse_free(&msg);
1511 return;
1512 }
1513
1514 dev = p2p_get_device(p2p, addr);
1515 if (dev) {
1516 if (dev->country[0] == 0 && msg.listen_channel)
1517 os_memcpy(dev->country, msg.listen_channel, 3);
1518 p2p_parse_free(&msg);
1519 return; /* already known */
1520 }
1521
1522 dev = p2p_create_device(p2p, addr);
1523 if (dev == NULL) {
1524 p2p_parse_free(&msg);
1525 return;
1526 }
1527
1528 os_get_time(&dev->last_seen);
1529 dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
1530
b22128ef
JM
1531 if (msg.listen_channel) {
1532 os_memcpy(dev->country, msg.listen_channel, 3);
1533 dev->listen_freq = p2p_channel_to_freq(dev->country,
1534 msg.listen_channel[3],
1535 msg.listen_channel[4]);
1536 }
1537
b67d0d9e 1538 p2p_copy_wps_info(dev, 1, &msg);
e57ae6e1 1539
b22128ef
JM
1540 p2p_parse_free(&msg);
1541
1542 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1543 "P2P: Created device entry based on Probe Req: " MACSTR
1544 " dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
c5db8e51
KRK
1545 MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
1546 dev->info.group_capab, dev->info.device_name,
1547 dev->listen_freq);
b22128ef
JM
1548}
1549
1550
1551struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
1552 const u8 *addr,
1553 struct p2p_message *msg)
1554{
1555 struct p2p_device *dev;
1556
1557 dev = p2p_get_device(p2p, addr);
1558 if (dev) {
1559 os_get_time(&dev->last_seen);
1560 return dev; /* already known */
1561 }
1562
1563 dev = p2p_create_device(p2p, addr);
1564 if (dev == NULL)
1565 return NULL;
1566
1567 p2p_add_dev_info(p2p, addr, dev, msg);
1568
1569 return dev;
1570}
1571
1572
1573static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
1574{
1575 if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
1576 return 1;
1577 if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
1578 WPA_GET_BE32(&req_dev_type[2]) == 0 &&
1579 WPA_GET_BE16(&req_dev_type[6]) == 0)
1580 return 1; /* Category match with wildcard OUI/sub-category */
1581 return 0;
1582}
1583
1584
1585int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
1586 size_t num_req_dev_type)
1587{
1588 size_t i;
1589 for (i = 0; i < num_req_dev_type; i++) {
1590 if (dev_type_match(dev_type, req_dev_type[i]))
1591 return 1;
1592 }
1593 return 0;
1594}
1595
1596
1597/**
1598 * p2p_match_dev_type - Match local device type with requested type
1599 * @p2p: P2P module context from p2p_init()
1600 * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
1601 * Returns: 1 on match, 0 on mismatch
1602 *
1603 * This function can be used to match the Requested Device Type attribute in
1604 * WPS IE with the local device types for deciding whether to reply to a Probe
1605 * Request frame.
1606 */
1607int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
1608{
1609 struct wps_parse_attr attr;
1610 size_t i;
1611
1612 if (wps_parse_msg(wps, &attr))
1613 return 1; /* assume no Requested Device Type attributes */
1614
1615 if (attr.num_req_dev_type == 0)
1616 return 1; /* no Requested Device Type attributes -> match */
1617
1618 if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
1619 attr.num_req_dev_type))
1620 return 1; /* Own Primary Device Type matches */
1621
1622 for (i = 0; i < p2p->cfg->num_sec_dev_types; i++)
1623 if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
1624 attr.req_dev_type,
1625 attr.num_req_dev_type))
1626 return 1; /* Own Secondary Device Type matches */
1627
1628 /* No matching device type found */
1629 return 0;
1630}
1631
1632
1633struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p)
1634{
1635 struct wpabuf *buf;
1636 u8 *len;
1637
1638 buf = wpabuf_alloc(1000);
1639 if (buf == NULL)
1640 return NULL;
1641
b22128ef
JM
1642 p2p_build_wps_ie(p2p, buf, DEV_PW_DEFAULT, 1);
1643
1644 /* P2P IE */
1645 len = p2p_buf_add_ie_hdr(buf);
1646 p2p_buf_add_capability(buf, p2p->dev_capab, 0);
1647 if (p2p->ext_listen_interval)
1648 p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
1649 p2p->ext_listen_interval);
1650 p2p_buf_add_device_info(buf, p2p, NULL);
1651 p2p_buf_update_ie_hdr(buf, len);
1652
1653 return buf;
1654}
1655
1656
e1d52629
JM
1657static int is_11b(u8 rate)
1658{
1659 return rate == 0x02 || rate == 0x04 || rate == 0x0b || rate == 0x16;
1660}
1661
1662
1663static int supp_rates_11b_only(struct ieee802_11_elems *elems)
1664{
1665 int num_11b = 0, num_others = 0;
1666 int i;
1667
1668 if (elems->supp_rates == NULL && elems->ext_supp_rates == NULL)
1669 return 0;
1670
1671 for (i = 0; elems->supp_rates && i < elems->supp_rates_len; i++) {
1672 if (is_11b(elems->supp_rates[i]))
1673 num_11b++;
1674 else
1675 num_others++;
1676 }
1677
70dbe3b6
JM
1678 for (i = 0; elems->ext_supp_rates && i < elems->ext_supp_rates_len;
1679 i++) {
1680 if (is_11b(elems->ext_supp_rates[i]))
1681 num_11b++;
1682 else
1683 num_others++;
1684 }
1685
e1d52629
JM
1686 return num_11b > 0 && num_others == 0;
1687}
1688
1689
04a85e44
JM
1690static void p2p_reply_probe(struct p2p_data *p2p, const u8 *addr,
1691 const u8 *dst, const u8 *bssid, const u8 *ie,
b22128ef
JM
1692 size_t ie_len)
1693{
1694 struct ieee802_11_elems elems;
1695 struct wpabuf *buf;
1696 struct ieee80211_mgmt *resp;
97c5b3c4 1697 struct p2p_message msg;
b22128ef
JM
1698 struct wpabuf *ies;
1699
1700 if (!p2p->in_listen || !p2p->drv_in_listen) {
1701 /* not in Listen state - ignore Probe Request */
1702 return;
1703 }
1704
1705 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
1706 ParseFailed) {
1707 /* Ignore invalid Probe Request frames */
1708 return;
1709 }
1710
1711 if (elems.p2p == NULL) {
1712 /* not a P2P probe - ignore it */
1713 return;
1714 }
1715
04a85e44
JM
1716 if (dst && !is_broadcast_ether_addr(dst) &&
1717 os_memcmp(dst, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
1718 /* Not sent to the broadcast address or our P2P Device Address
1719 */
1720 return;
1721 }
1722
1723 if (bssid && !is_broadcast_ether_addr(bssid)) {
1724 /* Not sent to the Wildcard BSSID */
1725 return;
1726 }
1727
b22128ef
JM
1728 if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
1729 os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
1730 0) {
1731 /* not using P2P Wildcard SSID - ignore */
1732 return;
1733 }
1734
e1d52629
JM
1735 if (supp_rates_11b_only(&elems)) {
1736 /* Indicates support for 11b rates only */
1737 return;
1738 }
1739
97c5b3c4
JM
1740 os_memset(&msg, 0, sizeof(msg));
1741 if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
1742 /* Could not parse P2P attributes */
1743 return;
1744 }
1745
1746 if (msg.device_id &&
1747 os_memcmp(msg.device_id, p2p->cfg->dev_addr, ETH_ALEN != 0)) {
1748 /* Device ID did not match */
1749 p2p_parse_free(&msg);
1750 return;
1751 }
1752
b22128ef 1753 /* Check Requested Device Type match */
97c5b3c4
JM
1754 if (msg.wps_attributes &&
1755 !p2p_match_dev_type(p2p, msg.wps_attributes)) {
b22128ef 1756 /* No match with Requested Device Type */
97c5b3c4 1757 p2p_parse_free(&msg);
b22128ef
JM
1758 return;
1759 }
97c5b3c4 1760 p2p_parse_free(&msg);
b22128ef
JM
1761
1762 if (!p2p->cfg->send_probe_resp)
1763 return; /* Response generated elsewhere */
1764
1765 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1766 "P2P: Reply to P2P Probe Request in Listen state");
1767
1768 /*
1769 * We do not really have a specific BSS that this frame is advertising,
1770 * so build a frame that has some information in valid format. This is
1771 * really only used for discovery purposes, not to learn exact BSS
1772 * parameters.
1773 */
1774 ies = p2p_build_probe_resp_ies(p2p);
1775 if (ies == NULL)
1776 return;
1777
1778 buf = wpabuf_alloc(200 + wpabuf_len(ies));
1779 if (buf == NULL) {
1780 wpabuf_free(ies);
1781 return;
1782 }
1783
1784 resp = NULL;
1785 resp = wpabuf_put(buf, resp->u.probe_resp.variable - (u8 *) resp);
1786
1787 resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
1788 (WLAN_FC_STYPE_PROBE_RESP << 4));
1789 os_memcpy(resp->da, addr, ETH_ALEN);
1790 os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
1791 os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
1792 resp->u.probe_resp.beacon_int = host_to_le16(100);
1793 /* hardware or low-level driver will setup seq_ctrl and timestamp */
1794 resp->u.probe_resp.capab_info =
1795 host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
1796 WLAN_CAPABILITY_PRIVACY |
1797 WLAN_CAPABILITY_SHORT_SLOT_TIME);
1798
1799 wpabuf_put_u8(buf, WLAN_EID_SSID);
1800 wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
1801 wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1802
1803 wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
1804 wpabuf_put_u8(buf, 8);
1805 wpabuf_put_u8(buf, (60 / 5) | 0x80);
1806 wpabuf_put_u8(buf, 90 / 5);
1807 wpabuf_put_u8(buf, (120 / 5) | 0x80);
1808 wpabuf_put_u8(buf, 180 / 5);
1809 wpabuf_put_u8(buf, (240 / 5) | 0x80);
1810 wpabuf_put_u8(buf, 360 / 5);
1811 wpabuf_put_u8(buf, 480 / 5);
1812 wpabuf_put_u8(buf, 540 / 5);
1813
1814 wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
1815 wpabuf_put_u8(buf, 1);
1816 wpabuf_put_u8(buf, p2p->cfg->channel);
1817
1818 wpabuf_put_buf(buf, ies);
1819 wpabuf_free(ies);
1820
1821 p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf);
1822
1823 wpabuf_free(buf);
1824}
1825
1826
04a85e44
JM
1827int p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
1828 const u8 *bssid, const u8 *ie, size_t ie_len)
b22128ef
JM
1829{
1830 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
1831
04a85e44 1832 p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len);
b22128ef
JM
1833
1834 if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
1835 p2p->go_neg_peer &&
c5db8e51
KRK
1836 os_memcmp(addr, p2p->go_neg_peer->info.p2p_device_addr, ETH_ALEN)
1837 == 0) {
b22128ef
JM
1838 /* Received a Probe Request from GO Negotiation peer */
1839 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1840 "P2P: Found GO Negotiation peer - try to start GO "
1841 "negotiation from timeout");
1842 eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
1843 return 1;
1844 }
1845
1846 if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
1847 p2p->invite_peer &&
c5db8e51
KRK
1848 os_memcmp(addr, p2p->invite_peer->info.p2p_device_addr, ETH_ALEN)
1849 == 0) {
b22128ef
JM
1850 /* Received a Probe Request from Invite peer */
1851 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1852 "P2P: Found Invite peer - try to start Invite from "
1853 "timeout");
1854 eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
1855 return 1;
1856 }
1857
1858 return 0;
1859}
1860
1861
1862static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
4c08c0bd 1863 u8 *buf, size_t len, struct wpabuf *p2p_ie)
b22128ef
JM
1864{
1865 struct wpabuf *tmp;
1866 u8 *lpos;
1867 size_t tmplen;
1868 int res;
72044390 1869 u8 group_capab;
b22128ef 1870
4c08c0bd
JM
1871 if (p2p_ie == NULL)
1872 return 0; /* WLAN AP is not a P2P manager */
b22128ef
JM
1873
1874 /*
1875 * (Re)Association Request - P2P IE
1876 * P2P Capability attribute (shall be present)
4c08c0bd
JM
1877 * P2P Interface attribute (present if concurrent device and
1878 * P2P Management is enabled)
b22128ef
JM
1879 */
1880 tmp = wpabuf_alloc(200);
1881 if (tmp == NULL)
1882 return -1;
1883
1884 lpos = p2p_buf_add_ie_hdr(tmp);
72044390
JM
1885 group_capab = 0;
1886 if (p2p->num_groups > 0) {
1887 group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
1888 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
1889 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
1890 p2p->cross_connect)
1891 group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
1892 }
1893 p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
4c08c0bd
JM
1894 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
1895 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
b22128ef
JM
1896 p2p_buf_add_p2p_interface(tmp, p2p);
1897 p2p_buf_update_ie_hdr(tmp, lpos);
1898
1899 tmplen = wpabuf_len(tmp);
1900 if (tmplen > len)
1901 res = -1;
1902 else {
1903 os_memcpy(buf, wpabuf_head(tmp), tmplen);
1904 res = tmplen;
1905 }
1906 wpabuf_free(tmp);
1907
1908 return res;
1909}
1910
1911
1912int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
4c08c0bd 1913 size_t len, int p2p_group, struct wpabuf *p2p_ie)
b22128ef
JM
1914{
1915 struct wpabuf *tmp;
1916 u8 *lpos;
1917 struct p2p_device *peer;
1918 size_t tmplen;
1919 int res;
1920
1921 if (!p2p_group)
4c08c0bd 1922 return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
b22128ef
JM
1923
1924 /*
1925 * (Re)Association Request - P2P IE
1926 * P2P Capability attribute (shall be present)
1927 * Extended Listen Timing (may be present)
1928 * P2P Device Info attribute (shall be present)
1929 */
1930 tmp = wpabuf_alloc(200);
1931 if (tmp == NULL)
1932 return -1;
1933
1934 peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
1935
1936 lpos = p2p_buf_add_ie_hdr(tmp);
1937 p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
5be5305b
JM
1938 if (p2p->ext_listen_interval)
1939 p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
1940 p2p->ext_listen_interval);
b22128ef
JM
1941 p2p_buf_add_device_info(tmp, p2p, peer);
1942 p2p_buf_update_ie_hdr(tmp, lpos);
1943
1944 tmplen = wpabuf_len(tmp);
1945 if (tmplen > len)
1946 res = -1;
1947 else {
1948 os_memcpy(buf, wpabuf_head(tmp), tmplen);
1949 res = tmplen;
1950 }
1951 wpabuf_free(tmp);
1952
1953 return res;
1954}
1955
1956
1957int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
1958{
1959 struct wpabuf *p2p_ie;
1960 int ret;
1961
1962 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
1963 if (p2p_ie == NULL)
1964 return 0;
1965
1966 ret = p2p_attr_text(p2p_ie, buf, end);
1967 wpabuf_free(p2p_ie);
1968 return ret;
1969}
1970
1971
1972static void p2p_clear_go_neg(struct p2p_data *p2p)
1973{
1974 p2p->go_neg_peer = NULL;
1975 p2p_clear_timeout(p2p);
1976 p2p_set_state(p2p, P2P_IDLE);
1977}
1978
1979
1980void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
1981{
1982 if (p2p->go_neg_peer == NULL) {
1983 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1984 "P2P: No pending Group Formation - "
1985 "ignore WPS registration success notification");
1986 return; /* No pending Group Formation */
1987 }
1988
1989 if (os_memcmp(mac_addr, p2p->go_neg_peer->intended_addr, ETH_ALEN) !=
1990 0) {
1991 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1992 "P2P: Ignore WPS registration success notification "
1993 "for " MACSTR " (GO Negotiation peer " MACSTR ")",
1994 MAC2STR(mac_addr),
1995 MAC2STR(p2p->go_neg_peer->intended_addr));
1996 return; /* Ignore unexpected peer address */
1997 }
1998
1999 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2000 "P2P: Group Formation completed successfully with " MACSTR,
2001 MAC2STR(mac_addr));
2002
2003 p2p_clear_go_neg(p2p);
2004}
2005
2006
2007void p2p_group_formation_failed(struct p2p_data *p2p)
2008{
2009 if (p2p->go_neg_peer == NULL) {
2010 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2011 "P2P: No pending Group Formation - "
2012 "ignore group formation failure notification");
2013 return; /* No pending Group Formation */
2014 }
2015
2016 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2017 "P2P: Group Formation failed with " MACSTR,
2018 MAC2STR(p2p->go_neg_peer->intended_addr));
2019
2020 p2p_clear_go_neg(p2p);
2021}
2022
2023
2024struct p2p_data * p2p_init(const struct p2p_config *cfg)
2025{
2026 struct p2p_data *p2p;
2027
2028 if (cfg->max_peers < 1)
2029 return NULL;
2030
2031 p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
2032 if (p2p == NULL)
2033 return NULL;
2034 p2p->cfg = (struct p2p_config *) (p2p + 1);
2035 os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
2036 if (cfg->dev_name)
2037 p2p->cfg->dev_name = os_strdup(cfg->dev_name);
b6e01800
JM
2038 if (cfg->manufacturer)
2039 p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
2040 if (cfg->model_name)
2041 p2p->cfg->model_name = os_strdup(cfg->model_name);
2042 if (cfg->model_number)
2043 p2p->cfg->model_number = os_strdup(cfg->model_number);
2044 if (cfg->serial_number)
2045 p2p->cfg->serial_number = os_strdup(cfg->serial_number);
b22128ef
JM
2046
2047 p2p->min_disc_int = 1;
2048 p2p->max_disc_int = 3;
2049
2050 os_get_random(&p2p->next_tie_breaker, 1);
2051 p2p->next_tie_breaker &= 0x01;
2052 if (cfg->sd_request)
2053 p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
2054 p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
2055 if (cfg->concurrent_operations)
2056 p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
2057 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
2058
2059 dl_list_init(&p2p->devices);
2060
2061 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
2062 p2p_expiration_timeout, p2p, NULL);
2063
2064 return p2p;
2065}
2066
2067
2068void p2p_deinit(struct p2p_data *p2p)
2069{
2070 eloop_cancel_timeout(p2p_expiration_timeout, p2p, NULL);
2071 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
2072 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2073 p2p_flush(p2p);
046ef4aa 2074 p2p_free_req_dev_types(p2p);
b22128ef 2075 os_free(p2p->cfg->dev_name);
b6e01800
JM
2076 os_free(p2p->cfg->manufacturer);
2077 os_free(p2p->cfg->model_name);
2078 os_free(p2p->cfg->model_number);
2079 os_free(p2p->cfg->serial_number);
b22128ef 2080 os_free(p2p->groups);
18708aad 2081 wpabuf_free(p2p->sd_resp);
3f9285ff 2082 os_free(p2p->after_scan_tx);
f95cac27 2083 p2p_remove_wps_vendor_extensions(p2p);
b22128ef
JM
2084 os_free(p2p);
2085}
2086
2087
2088void p2p_flush(struct p2p_data *p2p)
2089{
2090 struct p2p_device *dev, *prev;
2091 p2p_clear_timeout(p2p);
2092 p2p_set_state(p2p, P2P_IDLE);
2093 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
2094 p2p->go_neg_peer = NULL;
2095 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
2096 dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
2097 list) {
2098 dl_list_del(&dev->list);
2099 p2p_device_free(p2p, dev);
2100 }
2101 p2p_free_sd_queries(p2p);
f44ae207
JM
2102 os_free(p2p->after_scan_tx);
2103 p2p->after_scan_tx = NULL;
b22128ef
JM
2104}
2105
2106
9d562b79
SS
2107int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
2108{
2109 struct p2p_device *dev;
2110
2111 dev = p2p_get_device(p2p, addr);
2112 if (dev == NULL)
2113 return -1;
2114
2115 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unauthorizing " MACSTR,
2116 MAC2STR(addr));
2117
2118 if (p2p->go_neg_peer == dev)
2119 p2p->go_neg_peer = NULL;
2120
2121 dev->wps_method = WPS_NOT_READY;
2122 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
2123 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
2124
2125 /* Check if after_scan_tx is for this peer. If so free it */
2126 if (p2p->after_scan_tx &&
2127 os_memcmp(addr, p2p->after_scan_tx->dst, ETH_ALEN) == 0) {
2128 os_free(p2p->after_scan_tx);
2129 p2p->after_scan_tx = NULL;
2130 }
2131
2132 return 0;
2133}
2134
2135
b22128ef
JM
2136int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
2137{
2138 os_free(p2p->cfg->dev_name);
2139 if (dev_name) {
2140 p2p->cfg->dev_name = os_strdup(dev_name);
2141 if (p2p->cfg->dev_name == NULL)
2142 return -1;
2143 } else
2144 p2p->cfg->dev_name = NULL;
2145 return 0;
2146}
2147
2148
b6e01800
JM
2149int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
2150{
2151 os_free(p2p->cfg->manufacturer);
2152 p2p->cfg->manufacturer = NULL;
2153 if (manufacturer) {
2154 p2p->cfg->manufacturer = os_strdup(manufacturer);
2155 if (p2p->cfg->manufacturer == NULL)
2156 return -1;
2157 }
2158
2159 return 0;
2160}
2161
2162
2163int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
2164{
2165 os_free(p2p->cfg->model_name);
2166 p2p->cfg->model_name = NULL;
2167 if (model_name) {
2168 p2p->cfg->model_name = os_strdup(model_name);
2169 if (p2p->cfg->model_name == NULL)
2170 return -1;
2171 }
2172
2173 return 0;
2174}
2175
2176
2177int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
2178{
2179 os_free(p2p->cfg->model_number);
2180 p2p->cfg->model_number = NULL;
2181 if (model_number) {
2182 p2p->cfg->model_number = os_strdup(model_number);
2183 if (p2p->cfg->model_number == NULL)
2184 return -1;
2185 }
2186
2187 return 0;
2188}
2189
2190
2191int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
2192{
2193 os_free(p2p->cfg->serial_number);
2194 p2p->cfg->serial_number = NULL;
2195 if (serial_number) {
2196 p2p->cfg->serial_number = os_strdup(serial_number);
2197 if (p2p->cfg->serial_number == NULL)
2198 return -1;
2199 }
2200
2201 return 0;
2202}
2203
2204
2205void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
2206{
2207 p2p->cfg->config_methods = config_methods;
2208}
2209
2210
2211void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
2212{
2213 os_memcpy(p2p->cfg->uuid, uuid, 16);
2214}
2215
2216
b22128ef
JM
2217int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
2218{
2219 os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
2220 return 0;
2221}
2222
2223
2224int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
2225 size_t num_dev_types)
2226{
2227 if (num_dev_types > P2P_SEC_DEVICE_TYPES)
2228 num_dev_types = P2P_SEC_DEVICE_TYPES;
2229 p2p->cfg->num_sec_dev_types = num_dev_types;
2230 os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
2231 return 0;
2232}
2233
2234
f95cac27
JMB
2235void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
2236{
2237 int i;
2238
10c5d2a5 2239 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
f95cac27
JMB
2240 wpabuf_free(p2p->wps_vendor_ext[i]);
2241 p2p->wps_vendor_ext[i] = NULL;
2242 }
2243}
2244
2245
2246int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
2247 const struct wpabuf *vendor_ext)
2248{
2249 int i;
2250
2251 if (vendor_ext == NULL)
2252 return -1;
2253
10c5d2a5 2254 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
f95cac27
JMB
2255 if (p2p->wps_vendor_ext[i] == NULL)
2256 break;
2257 }
10c5d2a5 2258 if (i >= P2P_MAX_WPS_VENDOR_EXT)
f95cac27
JMB
2259 return -1;
2260
2261 p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
2262 if (p2p->wps_vendor_ext[i] == NULL)
2263 return -1;
2264
2265 return 0;
2266}
2267
2268
b22128ef
JM
2269int p2p_set_country(struct p2p_data *p2p, const char *country)
2270{
2271 os_memcpy(p2p->cfg->country, country, 3);
2272 return 0;
2273}
2274
2275
2276void p2p_continue_find(struct p2p_data *p2p)
2277{
2278 struct p2p_device *dev;
2279 p2p_set_state(p2p, P2P_SEARCH);
2280 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2281 if (dev->flags & P2P_DEV_SD_SCHEDULE) {
2282 if (p2p_start_sd(p2p, dev) == 0)
2283 return;
2284 else
2285 break;
10c4edde
JM
2286 } else if (dev->req_config_methods &&
2287 !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
2288 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
2289 "pending Provisioning Discovery Request to "
2290 MACSTR " (config methods 0x%x)",
c5db8e51 2291 MAC2STR(dev->info.p2p_device_addr),
10c4edde 2292 dev->req_config_methods);
b22128ef
JM
2293 if (p2p_send_prov_disc_req(p2p, dev, 0) == 0)
2294 return;
2295 }
2296 }
2297
2298 p2p_listen_in_find(p2p);
2299}
2300
2301
2302static void p2p_sd_cb(struct p2p_data *p2p, int success)
2303{
2304 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2305 "P2P: Service Discovery Query TX callback: success=%d",
2306 success);
2307 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2308
2309 if (!success) {
2310 if (p2p->sd_peer) {
2311 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2312 p2p->sd_peer = NULL;
2313 }
2314 p2p_continue_find(p2p);
2315 return;
2316 }
2317
2318 if (p2p->sd_peer == NULL) {
2319 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2320 "P2P: No SD peer entry known");
2321 p2p_continue_find(p2p);
2322 return;
2323 }
2324
2325 /* Wait for response from the peer */
2326 p2p_set_state(p2p, P2P_SD_DURING_FIND);
2327 p2p_set_timeout(p2p, 0, 200000);
2328}
2329
6b56cc2d
JS
2330
2331/**
2332 * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
2333 * @p2p: P2P module context from p2p_init()
2334 */
2335void p2p_retry_pd(struct p2p_data *p2p)
2336{
2337 struct p2p_device *dev;
2338
2339 if (p2p->state != P2P_IDLE)
2340 return;
2341
2342 /*
2343 * Retry the prov disc req attempt only for the peer that the user had
2344 * requested for and provided a join has not been initiated on it
2345 * in the meantime.
2346 */
2347
2348 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2349 if (os_memcmp(p2p->pending_pd_devaddr,
2350 dev->info.p2p_device_addr, ETH_ALEN) != 0)
2351 continue;
2352 if (!dev->req_config_methods)
2353 continue;
2354 if (dev->flags & P2P_DEV_PD_FOR_JOIN)
2355 continue;
2356
2357 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
2358 "pending Provisioning Discovery Request to "
2359 MACSTR " (config methods 0x%x)",
2360 MAC2STR(dev->info.p2p_device_addr),
2361 dev->req_config_methods);
2362 p2p_send_prov_disc_req(p2p, dev, 0);
2363 return;
2364 }
2365}
2366
2367
b22128ef
JM
2368static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
2369{
2370 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2371 "P2P: Provision Discovery Request TX callback: success=%d",
2372 success);
6b56cc2d
JS
2373
2374 /*
2375 * Postpone resetting the pending action state till after we actually
2376 * time out. This allows us to take some action like notifying any
2377 * interested parties about no response to the request.
2378 *
2379 * When the timer (below) goes off we check in IDLE, SEARCH, or
2380 * LISTEN_ONLY state, which are the only allowed states to issue a PD
2381 * requests in, if this was still pending and then raise notification.
2382 */
b22128ef
JM
2383
2384 if (!success) {
6b56cc2d
JS
2385 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2386
b22128ef
JM
2387 if (p2p->state != P2P_IDLE)
2388 p2p_continue_find(p2p);
6b56cc2d
JS
2389 else if (p2p->user_initiated_pd) {
2390 p2p->pending_action_state = P2P_PENDING_PD;
2391 p2p_set_timeout(p2p, 0, 300000);
2392 }
b22128ef
JM
2393 return;
2394 }
2395
6b56cc2d
JS
2396 /*
2397 * This postponing, of resetting pending_action_state, needs to be
2398 * done only for user initiated PD requests and not internal ones.
2399 */
2400 if (p2p->user_initiated_pd)
2401 p2p->pending_action_state = P2P_PENDING_PD;
2402 else
2403 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2404
b22128ef
JM
2405 /* Wait for response from the peer */
2406 if (p2p->state == P2P_SEARCH)
2407 p2p_set_state(p2p, P2P_PD_DURING_FIND);
2408 p2p_set_timeout(p2p, 0, 200000);
2409}
2410
2411
2412int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
2413 int level, const u8 *ies, size_t ies_len)
2414{
2415 p2p_add_device(p2p, bssid, freq, level, ies, ies_len);
2416
2417 if (p2p->go_neg_peer && p2p->state == P2P_SEARCH &&
c5db8e51
KRK
2418 os_memcmp(p2p->go_neg_peer->info.p2p_device_addr, bssid, ETH_ALEN)
2419 == 0) {
b22128ef
JM
2420 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2421 "P2P: Found GO Negotiation peer - try to start GO "
2422 "negotiation");
2423 p2p_connect_send(p2p, p2p->go_neg_peer);
2424 return 1;
2425 }
2426
2427 return 0;
2428}
2429
2430
2431void p2p_scan_res_handled(struct p2p_data *p2p)
2432{
2433 if (!p2p->p2p_scan_running) {
2434 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan was not "
2435 "running, but scan results received");
2436 }
2437 p2p->p2p_scan_running = 0;
2438 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2439
2440 if (p2p_run_after_scan(p2p))
2441 return;
2442 if (p2p->state == P2P_SEARCH)
2443 p2p_continue_find(p2p);
2444}
2445
2446
2447void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies)
2448{
2449 u8 *len = p2p_buf_add_ie_hdr(ies);
2450 p2p_buf_add_capability(ies, p2p->dev_capab, 0);
2451 if (p2p->cfg->reg_class && p2p->cfg->channel)
2452 p2p_buf_add_listen_channel(ies, p2p->cfg->country,
2453 p2p->cfg->reg_class,
2454 p2p->cfg->channel);
2455 if (p2p->ext_listen_interval)
2456 p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
2457 p2p->ext_listen_interval);
2458 /* TODO: p2p_buf_add_operating_channel() if GO */
2459 p2p_buf_update_ie_hdr(ies, len);
2460}
2461
2462
2463int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
2464{
2465 return p2p_attr_text(p2p_ie, buf, end);
2466}
2467
2468
2469static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
2470{
2471 struct p2p_device *dev = p2p->go_neg_peer;
2472
2473 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2474 "P2P: GO Negotiation Request TX callback: success=%d",
2475 success);
2476
2477 if (dev == NULL) {
2478 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2479 "P2P: No pending GO Negotiation");
2480 return;
2481 }
2482
2483 if (success) {
2484 dev->go_neg_req_sent++;
2485 if (dev->flags & P2P_DEV_USER_REJECTED) {
2486 p2p_set_state(p2p, P2P_IDLE);
2487 return;
2488 }
2489 }
2490
2491 if (!success &&
c5db8e51 2492 (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
b22128ef
JM
2493 !is_zero_ether_addr(dev->member_in_go_dev)) {
2494 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2495 "P2P: Peer " MACSTR " did not acknowledge request - "
2496 "try to use device discoverability through its GO",
c5db8e51 2497 MAC2STR(dev->info.p2p_device_addr));
b22128ef
JM
2498 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2499 p2p_send_dev_disc_req(p2p, dev);
2500 return;
2501 }
2502
2503 /*
2504 * Use P2P find, if needed, to find the other device from its listen
2505 * channel.
2506 */
2507 p2p_set_state(p2p, P2P_CONNECT);
2508 p2p_set_timeout(p2p, 0, 100000);
2509}
2510
2511
2512static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
2513{
2514 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2515 "P2P: GO Negotiation Response TX callback: success=%d",
2516 success);
2517 if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
2518 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2519 "P2P: Ignore TX callback event - GO Negotiation is "
2520 "not running anymore");
2521 return;
2522 }
2523 p2p_set_state(p2p, P2P_CONNECT);
2524 p2p_set_timeout(p2p, 0, 100000);
2525}
2526
2527
2528static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success)
2529{
2530 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2531 "P2P: GO Negotiation Response (failure) TX callback: "
2532 "success=%d", success);
fbe70272
JM
2533 if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
2534 p2p_go_neg_failed(p2p, p2p->go_neg_peer,
2535 p2p->go_neg_peer->status);
2536 }
b22128ef
JM
2537}
2538
2539
93b7ddd0
JM
2540static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
2541 enum p2p_send_action_result result)
b22128ef
JM
2542{
2543 struct p2p_device *dev;
2544
2545 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
93b7ddd0
JM
2546 "P2P: GO Negotiation Confirm TX callback: result=%d",
2547 result);
b22128ef 2548 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
93b7ddd0
JM
2549 if (result == P2P_SEND_ACTION_FAILED) {
2550 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2551 return;
2552 }
2553 if (result == P2P_SEND_ACTION_NO_ACK) {
b22128ef
JM
2554 /*
2555 * It looks like the TX status for GO Negotiation Confirm is
2556 * often showing failure even when the peer has actually
2557 * received the frame. Since the peer may change channels
2558 * immediately after having received the frame, we may not see
2559 * an Ack for retries, so just dropping a single frame may
2560 * trigger this. To allow the group formation to succeed if the
2561 * peer did indeed receive the frame, continue regardless of
2562 * the TX status.
2563 */
2564 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2565 "P2P: Assume GO Negotiation Confirm TX was actually "
2566 "received by the peer even though Ack was not "
2567 "reported");
2568 }
2569
2570 dev = p2p->go_neg_peer;
2571 if (dev == NULL)
2572 return;
2573
2574 p2p_go_complete(p2p, dev);
2575}
2576
2577
2578void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
93b7ddd0
JM
2579 const u8 *src, const u8 *bssid,
2580 enum p2p_send_action_result result)
b22128ef
JM
2581{
2582 enum p2p_pending_action_state state;
93b7ddd0 2583 int success;
b22128ef
JM
2584
2585 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2586 "P2P: Action frame TX callback (state=%d freq=%u dst=" MACSTR
93b7ddd0 2587 " src=" MACSTR " bssid=" MACSTR " result=%d",
b22128ef 2588 p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
93b7ddd0
JM
2589 MAC2STR(bssid), result);
2590 success = result == P2P_SEND_ACTION_SUCCESS;
b22128ef
JM
2591 state = p2p->pending_action_state;
2592 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2593 switch (state) {
2594 case P2P_NO_PENDING_ACTION:
2595 break;
2596 case P2P_PENDING_GO_NEG_REQUEST:
2597 p2p_go_neg_req_cb(p2p, success);
2598 break;
2599 case P2P_PENDING_GO_NEG_RESPONSE:
2600 p2p_go_neg_resp_cb(p2p, success);
2601 break;
2602 case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
2603 p2p_go_neg_resp_failure_cb(p2p, success);
2604 break;
2605 case P2P_PENDING_GO_NEG_CONFIRM:
93b7ddd0 2606 p2p_go_neg_conf_cb(p2p, result);
b22128ef
JM
2607 break;
2608 case P2P_PENDING_SD:
2609 p2p_sd_cb(p2p, success);
2610 break;
2611 case P2P_PENDING_PD:
2612 p2p_prov_disc_cb(p2p, success);
2613 break;
2614 case P2P_PENDING_INVITATION_REQUEST:
2615 p2p_invitation_req_cb(p2p, success);
2616 break;
2617 case P2P_PENDING_INVITATION_RESPONSE:
2618 p2p_invitation_resp_cb(p2p, success);
2619 break;
2620 case P2P_PENDING_DEV_DISC_REQUEST:
2621 p2p_dev_disc_req_cb(p2p, success);
2622 break;
2623 case P2P_PENDING_DEV_DISC_RESPONSE:
2624 p2p_dev_disc_resp_cb(p2p, success);
2625 break;
2626 case P2P_PENDING_GO_DISC_REQ:
2627 p2p_go_disc_req_cb(p2p, success);
2628 break;
2629 }
2630}
2631
2632
2633void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
2634 unsigned int duration)
2635{
2636 if (freq == p2p->pending_client_disc_freq) {
2637 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2638 "P2P: Client discoverability remain-awake completed");
2639 p2p->pending_client_disc_freq = 0;
2640 return;
2641 }
2642
2643 if (freq != p2p->pending_listen_freq) {
2644 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2645 "P2P: Unexpected listen callback for freq=%u "
2646 "duration=%u (pending_listen_freq=%u)",
2647 freq, duration, p2p->pending_listen_freq);
2648 return;
2649 }
2650
2651 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2652 "P2P: Starting Listen timeout(%u,%u) on freq=%u based on "
2653 "callback",
2654 p2p->pending_listen_sec, p2p->pending_listen_usec,
2655 p2p->pending_listen_freq);
2656 p2p->in_listen = 1;
0b8889d8 2657 p2p->drv_in_listen = freq;
b22128ef
JM
2658 if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
2659 /*
2660 * Add 20 msec extra wait to avoid race condition with driver
2661 * remain-on-channel end event, i.e., give driver more time to
2662 * complete the operation before our timeout expires.
2663 */
2664 p2p_set_timeout(p2p, p2p->pending_listen_sec,
2665 p2p->pending_listen_usec + 20000);
2666 }
2667
2668 p2p->pending_listen_freq = 0;
2669}
2670
2671
2672int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
2673{
2674 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver ended Listen "
2675 "state (freq=%u)", freq);
2676 p2p->drv_in_listen = 0;
2677 if (p2p->in_listen)
2678 return 0; /* Internal timeout will trigger the next step */
2679
2680 if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
e24cf97c
JM
2681 if (p2p->go_neg_peer->connect_reqs >= 120) {
2682 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2683 "P2P: Timeout on sending GO Negotiation "
2684 "Request without getting response");
2685 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2686 return 0;
2687 }
2688
b22128ef
JM
2689 p2p_set_state(p2p, P2P_CONNECT);
2690 p2p_connect_send(p2p, p2p->go_neg_peer);
2691 return 1;
2692 } else if (p2p->state == P2P_SEARCH) {
2693 p2p_search(p2p);
2694 return 1;
2695 }
2696
2697 return 0;
2698}
2699
2700
2701static void p2p_timeout_connect(struct p2p_data *p2p)
2702{
2703 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2704 p2p_set_state(p2p, P2P_CONNECT_LISTEN);
2705 p2p_listen_in_find(p2p);
2706}
2707
2708
2709static void p2p_timeout_connect_listen(struct p2p_data *p2p)
2710{
2711 if (p2p->go_neg_peer) {
2712 if (p2p->drv_in_listen) {
2713 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is "
2714 "still in Listen state; wait for it to "
2715 "complete");
2716 return;
2717 }
9dac8c3e
FM
2718
2719 if (p2p->go_neg_peer->connect_reqs >= 120) {
2720 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2721 "P2P: Timeout on sending GO Negotiation "
2722 "Request without getting response");
2723 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2724 return;
2725 }
2726
b22128ef
JM
2727 p2p_set_state(p2p, P2P_CONNECT);
2728 p2p_connect_send(p2p, p2p->go_neg_peer);
2729 } else
2730 p2p_set_state(p2p, P2P_IDLE);
2731}
2732
2733
2734static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
2735{
2736 /*
2737 * TODO: could remain constantly in Listen state for some time if there
2738 * are no other concurrent uses for the radio. For now, go to listen
2739 * state once per second to give other uses a chance to use the radio.
2740 */
2741 p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
2742 p2p_set_timeout(p2p, 1, 0);
2743}
2744
2745
2746static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
2747{
2748 struct p2p_device *dev = p2p->go_neg_peer;
2749
2750 if (dev == NULL) {
2751 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2752 "P2P: Unknown GO Neg peer - stop GO Neg wait");
2753 return;
2754 }
2755
2756 dev->wait_count++;
2757 if (dev->wait_count >= 120) {
2758 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2759 "P2P: Timeout on waiting peer to become ready for GO "
2760 "Negotiation");
2761 p2p_go_neg_failed(p2p, dev, -1);
2762 return;
2763 }
2764
2765 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2766 "P2P: Go to Listen state while waiting for the peer to become "
2767 "ready for GO Negotiation");
2768 p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
2769 p2p_listen_in_find(p2p);
2770}
2771
2772
2773static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
2774{
2775 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2776 "P2P: Service Discovery Query timeout");
2777 if (p2p->sd_peer) {
2778 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2779 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2780 p2p->sd_peer = NULL;
2781 }
2782 p2p_continue_find(p2p);
2783}
2784
2785
2786static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
2787{
2788 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2789 "P2P: Provision Discovery Request timeout");
2790 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2791 p2p_continue_find(p2p);
2792}
2793
2794
6b56cc2d
JS
2795static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
2796{
2797 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2798
2799 /*
2800 * For user initiated PD requests that we have not gotten any responses
2801 * for while in IDLE state, we retry them a couple of times before
2802 * giving up.
2803 */
2804 if (!p2p->user_initiated_pd)
2805 return;
2806
2807 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2808 "P2P: User initiated Provision Discovery Request timeout");
2809
2810 if (p2p->pd_retries) {
2811 p2p->pd_retries--;
2812 p2p_retry_pd(p2p);
2813 } else {
349b213c
JS
2814 if (p2p->cfg->prov_disc_fail)
2815 p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
2816 p2p->pending_pd_devaddr,
2817 P2P_PROV_DISC_TIMEOUT);
6b56cc2d
JS
2818 p2p_reset_pending_pd(p2p);
2819 }
2820}
2821
2822
b22128ef
JM
2823static void p2p_timeout_invite(struct p2p_data *p2p)
2824{
2825 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2826 p2p_set_state(p2p, P2P_INVITE_LISTEN);
04d8dad5
JM
2827 if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
2828 /*
2829 * Better remain on operating channel instead of listen channel
2830 * when running a group.
2831 */
2832 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Inviting in "
2833 "active GO role - wait on operating channel");
2834 p2p_set_timeout(p2p, 0, 100000);
2835 return;
2836 }
b22128ef
JM
2837 p2p_listen_in_find(p2p);
2838}
2839
2840
2841static void p2p_timeout_invite_listen(struct p2p_data *p2p)
2842{
2843 if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
2844 p2p_set_state(p2p, P2P_INVITE);
2845 p2p_invite_send(p2p, p2p->invite_peer,
2846 p2p->invite_go_dev_addr);
2847 } else {
2848 if (p2p->invite_peer) {
2849 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2850 "P2P: Invitation Request retry limit reached");
2851 if (p2p->cfg->invitation_result)
2852 p2p->cfg->invitation_result(
2853 p2p->cfg->cb_ctx, -1, NULL);
2854 }
2855 p2p_set_state(p2p, P2P_IDLE);
2856 }
2857}
2858
2859
2860static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
2861{
2862 struct p2p_data *p2p = eloop_ctx;
2863
2864 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Timeout (state=%s)",
2865 p2p_state_txt(p2p->state));
2866
2867 p2p->in_listen = 0;
2868
2869 switch (p2p->state) {
2870 case P2P_IDLE:
6b56cc2d
JS
2871 /* Check if we timed out waiting for PD req */
2872 if (p2p->pending_action_state == P2P_PENDING_PD)
2873 p2p_timeout_prov_disc_req(p2p);
b22128ef
JM
2874 break;
2875 case P2P_SEARCH:
6b56cc2d
JS
2876 /* Check if we timed out waiting for PD req */
2877 if (p2p->pending_action_state == P2P_PENDING_PD)
2878 p2p_timeout_prov_disc_req(p2p);
b22128ef
JM
2879 p2p_search(p2p);
2880 break;
2881 case P2P_CONNECT:
2882 p2p_timeout_connect(p2p);
2883 break;
2884 case P2P_CONNECT_LISTEN:
2885 p2p_timeout_connect_listen(p2p);
2886 break;
2887 case P2P_GO_NEG:
2888 break;
2889 case P2P_LISTEN_ONLY:
6b56cc2d
JS
2890 /* Check if we timed out waiting for PD req */
2891 if (p2p->pending_action_state == P2P_PENDING_PD)
2892 p2p_timeout_prov_disc_req(p2p);
2893
b22128ef
JM
2894 if (p2p->ext_listen_only) {
2895 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2896 "P2P: Extended Listen Timing - Listen State "
2897 "completed");
2898 p2p->ext_listen_only = 0;
2899 p2p_set_state(p2p, P2P_IDLE);
2900 }
2901 break;
2902 case P2P_WAIT_PEER_CONNECT:
2903 p2p_timeout_wait_peer_connect(p2p);
2904 break;
2905 case P2P_WAIT_PEER_IDLE:
2906 p2p_timeout_wait_peer_idle(p2p);
2907 break;
2908 case P2P_SD_DURING_FIND:
2909 p2p_timeout_sd_during_find(p2p);
2910 break;
2911 case P2P_PROVISIONING:
2912 break;
2913 case P2P_PD_DURING_FIND:
2914 p2p_timeout_prov_disc_during_find(p2p);
2915 break;
2916 case P2P_INVITE:
2917 p2p_timeout_invite(p2p);
2918 break;
2919 case P2P_INVITE_LISTEN:
2920 p2p_timeout_invite_listen(p2p);
2921 break;
2922 }
2923}
2924
2925
2926int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
2927{
2928 struct p2p_device *dev;
2929
2930 dev = p2p_get_device(p2p, peer_addr);
2931 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Local request to reject "
2932 "connection attempts by peer " MACSTR, MAC2STR(peer_addr));
2933 if (dev == NULL) {
2934 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
2935 " unknown", MAC2STR(peer_addr));
2936 return -1;
2937 }
2938 dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
2939 dev->flags |= P2P_DEV_USER_REJECTED;
2940 return 0;
2941}
2942
2943
2944static const char * p2p_wps_method_text(enum p2p_wps_method method)
2945{
2946 switch (method) {
2947 case WPS_NOT_READY:
2948 return "not-ready";
b22128ef
JM
2949 case WPS_PIN_DISPLAY:
2950 return "Display";
2951 case WPS_PIN_KEYPAD:
2952 return "Keypad";
2953 case WPS_PBC:
2954 return "PBC";
2955 }
2956
2957 return "??";
2958}
2959
2960
2961static const char * p2p_go_state_text(enum p2p_go_state go_state)
2962{
2963 switch (go_state) {
2964 case UNKNOWN_GO:
2965 return "unknown";
2966 case LOCAL_GO:
2967 return "local";
2968 case REMOTE_GO:
2969 return "remote";
2970 }
2971
2972 return "??";
2973}
2974
2975
2976int p2p_get_peer_info(struct p2p_data *p2p, const u8 *addr, int next,
2977 char *buf, size_t buflen)
2978{
2979 struct p2p_device *dev;
2980 int res;
2981 char *pos, *end;
2982 struct os_time now;
2983 char devtype[WPS_DEV_TYPE_BUFSIZE];
2984
2985 if (addr)
2986 dev = p2p_get_device(p2p, addr);
2987 else
2988 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
2989
2990 if (dev && next) {
2991 dev = dl_list_first(&dev->list, struct p2p_device, list);
2992 if (&dev->list == &p2p->devices)
2993 dev = NULL;
2994 }
2995
2996 if (dev == NULL)
2997 return -1;
2998
2999 pos = buf;
3000 end = buf + buflen;
3001
3002 res = os_snprintf(pos, end - pos, MACSTR "\n",
c5db8e51 3003 MAC2STR(dev->info.p2p_device_addr));
b22128ef
JM
3004 if (res < 0 || res >= end - pos)
3005 return pos - buf;
3006 pos += res;
3007
3008 os_get_time(&now);
3009 res = os_snprintf(pos, end - pos,
3010 "age=%d\n"
3011 "listen_freq=%d\n"
3012 "level=%d\n"
3013 "wps_method=%s\n"
3014 "interface_addr=" MACSTR "\n"
3015 "member_in_go_dev=" MACSTR "\n"
3016 "member_in_go_iface=" MACSTR "\n"
3017 "pri_dev_type=%s\n"
3018 "device_name=%s\n"
b67d0d9e
JM
3019 "manufacturer=%s\n"
3020 "model_name=%s\n"
3021 "model_number=%s\n"
3022 "serial_number=%s\n"
b22128ef
JM
3023 "config_methods=0x%x\n"
3024 "dev_capab=0x%x\n"
3025 "group_capab=0x%x\n"
3026 "go_neg_req_sent=%d\n"
3027 "go_state=%s\n"
3028 "dialog_token=%u\n"
3029 "intended_addr=" MACSTR "\n"
3030 "country=%c%c\n"
3031 "oper_freq=%d\n"
3032 "req_config_methods=0x%x\n"
10c4edde 3033 "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
b22128ef
JM
3034 "status=%d\n"
3035 "wait_count=%u\n"
3036 "invitation_reqs=%u\n",
3037 (int) (now.sec - dev->last_seen.sec),
3038 dev->listen_freq,
6402fc43 3039 dev->info.level,
b22128ef
JM
3040 p2p_wps_method_text(dev->wps_method),
3041 MAC2STR(dev->interface_addr),
3042 MAC2STR(dev->member_in_go_dev),
3043 MAC2STR(dev->member_in_go_iface),
c5db8e51 3044 wps_dev_type_bin2str(dev->info.pri_dev_type,
b22128ef 3045 devtype, sizeof(devtype)),
c5db8e51 3046 dev->info.device_name,
b67d0d9e
JM
3047 dev->info.manufacturer,
3048 dev->info.model_name,
3049 dev->info.model_number,
3050 dev->info.serial_number,
c5db8e51
KRK
3051 dev->info.config_methods,
3052 dev->info.dev_capab,
3053 dev->info.group_capab,
b22128ef
JM
3054 dev->go_neg_req_sent,
3055 p2p_go_state_text(dev->go_state),
3056 dev->dialog_token,
3057 MAC2STR(dev->intended_addr),
3058 dev->country[0] ? dev->country[0] : '_',
3059 dev->country[1] ? dev->country[1] : '_',
3060 dev->oper_freq,
3061 dev->req_config_methods,
3062 dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
3063 "[PROBE_REQ_ONLY]" : "",
3064 dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
3065 dev->flags & P2P_DEV_NOT_YET_READY ?
3066 "[NOT_YET_READY]" : "",
3067 dev->flags & P2P_DEV_SD_INFO ? "[SD_INFO]" : "",
3068 dev->flags & P2P_DEV_SD_SCHEDULE ? "[SD_SCHEDULE]" :
3069 "",
3070 dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
3071 "[PD_PEER_DISPLAY]" : "",
3072 dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
3073 "[PD_PEER_KEYPAD]" : "",
3074 dev->flags & P2P_DEV_USER_REJECTED ?
3075 "[USER_REJECTED]" : "",
3076 dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
3077 "[PEER_WAITING_RESPONSE]" : "",
3078 dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
3079 "[PREFER_PERSISTENT_GROUP]" : "",
3080 dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
3081 "[WAIT_GO_NEG_RESPONSE]" : "",
3082 dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
3083 "[WAIT_GO_NEG_CONFIRM]" : "",
3084 dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
3085 "[GROUP_CLIENT_ONLY]" : "",
d5b20a73 3086 dev->flags & P2P_DEV_FORCE_FREQ ?
10c4edde
JM
3087 "[FORCE_FREQ]" : "",
3088 dev->flags & P2P_DEV_PD_FOR_JOIN ?
3089 "[PD_FOR_JOIN]" : "",
b22128ef
JM
3090 dev->status,
3091 dev->wait_count,
3092 dev->invitation_reqs);
3093 if (res < 0 || res >= end - pos)
3094 return pos - buf;
3095 pos += res;
3096
3097 if (dev->ext_listen_period) {
3098 res = os_snprintf(pos, end - pos,
3099 "ext_listen_period=%u\n"
3100 "ext_listen_interval=%u\n",
3101 dev->ext_listen_period,
3102 dev->ext_listen_interval);
3103 if (res < 0 || res >= end - pos)
3104 return pos - buf;
3105 pos += res;
3106 }
3107
3108 if (dev->oper_ssid_len) {
3109 res = os_snprintf(pos, end - pos,
3110 "oper_ssid=%s\n",
3111 wpa_ssid_txt(dev->oper_ssid,
3112 dev->oper_ssid_len));
3113 if (res < 0 || res >= end - pos)
3114 return pos - buf;
3115 pos += res;
3116 }
3117
3118 return pos - buf;
3119}
3120
3121
3122void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
3123{
3124 if (enabled) {
3125 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3126 "discoverability enabled");
3127 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3128 } else {
3129 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3130 "discoverability disabled");
3131 p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3132 }
3133}
3134
3135
3136static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
3137 u32 duration2, u32 interval2)
3138{
3139 struct wpabuf *req;
3140 struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
3141 u8 *len;
3142
3143 req = wpabuf_alloc(100);
3144 if (req == NULL)
3145 return NULL;
3146
3147 if (duration1 || interval1) {
3148 os_memset(&desc1, 0, sizeof(desc1));
3149 desc1.count_type = 1;
3150 desc1.duration = duration1;
3151 desc1.interval = interval1;
3152 ptr1 = &desc1;
3153
3154 if (duration2 || interval2) {
3155 os_memset(&desc2, 0, sizeof(desc2));
3156 desc2.count_type = 2;
3157 desc2.duration = duration2;
3158 desc2.interval = interval2;
3159 ptr2 = &desc2;
3160 }
3161 }
3162
3163 p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
3164 len = p2p_buf_add_ie_hdr(req);
3165 p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
3166 p2p_buf_update_ie_hdr(req, len);
3167
3168 return req;
3169}
3170
3171
3172int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
3173 const u8 *own_interface_addr, unsigned int freq,
3174 u32 duration1, u32 interval1, u32 duration2,
3175 u32 interval2)
3176{
3177 struct wpabuf *req;
3178
3179 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send Presence Request to "
3180 "GO " MACSTR " (own interface " MACSTR ") freq=%u dur1=%u "
3181 "int1=%u dur2=%u int2=%u",
3182 MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
3183 freq, duration1, interval1, duration2, interval2);
3184
3185 req = p2p_build_presence_req(duration1, interval1, duration2,
3186 interval2);
3187 if (req == NULL)
3188 return -1;
3189
3190 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3f9285ff
JM
3191 if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
3192 go_interface_addr,
3193 wpabuf_head(req), wpabuf_len(req), 200) < 0) {
b22128ef
JM
3194 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3195 "P2P: Failed to send Action frame");
3196 }
3197 wpabuf_free(req);
3198
3199 return 0;
3200}
3201
3202
3203static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
3204 size_t noa_len, u8 dialog_token)
3205{
3206 struct wpabuf *resp;
3207 u8 *len;
3208
3209 resp = wpabuf_alloc(100 + noa_len);
3210 if (resp == NULL)
3211 return NULL;
3212
3213 p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
3214 len = p2p_buf_add_ie_hdr(resp);
3215 p2p_buf_add_status(resp, status);
3216 if (noa) {
3217 wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
3218 wpabuf_put_le16(resp, noa_len);
3219 wpabuf_put_data(resp, noa, noa_len);
3220 } else
3221 p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
3222 p2p_buf_update_ie_hdr(resp, len);
3223
3224 return resp;
3225}
3226
3227
3228static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
3229 const u8 *sa, const u8 *data, size_t len,
3230 int rx_freq)
3231{
3232 struct p2p_message msg;
3233 u8 status;
3234 struct wpabuf *resp;
3235 size_t g;
3236 struct p2p_group *group = NULL;
3237 int parsed = 0;
3238 u8 noa[50];
3239 int noa_len;
3240
3241 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3242 "P2P: Received P2P Action - P2P Presence Request");
3243
3244 for (g = 0; g < p2p->num_groups; g++) {
3245 if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]),
3246 ETH_ALEN) == 0) {
3247 group = p2p->groups[g];
3248 break;
3249 }
3250 }
3251 if (group == NULL) {
3252 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3253 "P2P: Ignore P2P Presence Request for unknown group "
3254 MACSTR, MAC2STR(da));
3255 return;
3256 }
3257
3258 if (p2p_parse(data, len, &msg) < 0) {
3259 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3260 "P2P: Failed to parse P2P Presence Request");
3261 status = P2P_SC_FAIL_INVALID_PARAMS;
3262 goto fail;
3263 }
3264 parsed = 1;
3265
3266 if (msg.noa == NULL) {
3267 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3268 "P2P: No NoA attribute in P2P Presence Request");
3269 status = P2P_SC_FAIL_INVALID_PARAMS;
3270 goto fail;
3271 }
3272
3273 status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
3274
3275fail:
3276 if (p2p->cfg->get_noa)
3277 noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
3278 sizeof(noa));
3279 else
3280 noa_len = -1;
3281 resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
3282 noa_len > 0 ? noa_len : 0,
3283 msg.dialog_token);
3284 if (parsed)
3285 p2p_parse_free(&msg);
3286 if (resp == NULL)
3287 return;
3288
3289 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3f9285ff
JM
3290 if (p2p_send_action(p2p, rx_freq, sa, da, da,
3291 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
b22128ef
JM
3292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3293 "P2P: Failed to send Action frame");
3294 }
3295 wpabuf_free(resp);
3296}
3297
3298
3299static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
3300 const u8 *sa, const u8 *data, size_t len)
3301{
3302 struct p2p_message msg;
3303
3304 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3305 "P2P: Received P2P Action - P2P Presence Response");
3306
3307 if (p2p_parse(data, len, &msg) < 0) {
3308 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3309 "P2P: Failed to parse P2P Presence Response");
3310 return;
3311 }
3312
3313 if (msg.status == NULL || msg.noa == NULL) {
3314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3315 "P2P: No Status or NoA attribute in P2P Presence "
3316 "Response");
3317 p2p_parse_free(&msg);
3318 return;
3319 }
3320
3321 if (*msg.status) {
3322 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3323 "P2P: P2P Presence Request was rejected: status %u",
3324 *msg.status);
3325 p2p_parse_free(&msg);
3326 return;
3327 }
3328
3329 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3330 "P2P: P2P Presence Request was accepted");
3331 wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
3332 msg.noa, msg.noa_len);
3333 /* TODO: process NoA */
3334 p2p_parse_free(&msg);
3335}
3336
3337
3338static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
3339{
3340 struct p2p_data *p2p = eloop_ctx;
3341
3342 if (p2p->ext_listen_interval) {
3343 /* Schedule next extended listen timeout */
3344 eloop_register_timeout(p2p->ext_listen_interval_sec,
3345 p2p->ext_listen_interval_usec,
3346 p2p_ext_listen_timeout, p2p, NULL);
3347 }
3348
f7a69057
JM
3349 if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
3350 /*
3351 * This should not really happen, but it looks like the Listen
3352 * command may fail is something else (e.g., a scan) was
3353 * running at an inconvenient time. As a workaround, allow new
3354 * Extended Listen operation to be started.
3355 */
3356 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Previous "
3357 "Extended Listen operation had not been completed - "
3358 "try again");
3359 p2p->ext_listen_only = 0;
3360 p2p_set_state(p2p, P2P_IDLE);
3361 }
3362
b22128ef
JM
3363 if (p2p->state != P2P_IDLE) {
3364 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip Extended "
3365 "Listen timeout in active state (%s)",
3366 p2p_state_txt(p2p->state));
3367 return;
3368 }
3369
3370 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Extended Listen timeout");
3371 p2p->ext_listen_only = 1;
3372 if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
3373 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
3374 "Listen state for Extended Listen Timing");
3375 p2p->ext_listen_only = 0;
3376 }
3377}
3378
3379
3380int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
3381 unsigned int interval)
3382{
3383 if (period > 65535 || interval > 65535 || period > interval ||
3384 (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
3385 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3386 "P2P: Invalid Extended Listen Timing request: "
3387 "period=%u interval=%u", period, interval);
3388 return -1;
3389 }
3390
3391 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
3392
3393 if (interval == 0) {
3394 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3395 "P2P: Disabling Extended Listen Timing");
3396 p2p->ext_listen_period = 0;
3397 p2p->ext_listen_interval = 0;
3398 return 0;
3399 }
3400
3401 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3402 "P2P: Enabling Extended Listen Timing: period %u msec, "
3403 "interval %u msec", period, interval);
3404 p2p->ext_listen_period = period;
3405 p2p->ext_listen_interval = interval;
3406 p2p->ext_listen_interval_sec = interval / 1000;
3407 p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
3408
3409 eloop_register_timeout(p2p->ext_listen_interval_sec,
3410 p2p->ext_listen_interval_usec,
3411 p2p_ext_listen_timeout, p2p, NULL);
3412
3413 return 0;
3414}
3415
3416
3417void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3418 const u8 *ie, size_t ie_len)
3419{
3420 struct p2p_message msg;
3421
3422 if (bssid == NULL || ie == NULL)
3423 return;
3424
3425 os_memset(&msg, 0, sizeof(msg));
3426 if (p2p_parse_ies(ie, ie_len, &msg))
3427 return;
3428 if (msg.minor_reason_code == NULL)
3429 return;
3430
3431 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3432 "P2P: Deauthentication notification BSSID " MACSTR
3433 " reason_code=%u minor_reason_code=%u",
3434 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3435
3436 p2p_parse_free(&msg);
3437}
3438
3439
3440void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3441 const u8 *ie, size_t ie_len)
3442{
3443 struct p2p_message msg;
3444
3445 if (bssid == NULL || ie == NULL)
3446 return;
3447
3448 os_memset(&msg, 0, sizeof(msg));
3449 if (p2p_parse_ies(ie, ie_len, &msg))
3450 return;
3451 if (msg.minor_reason_code == NULL)
3452 return;
3453
3454 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3455 "P2P: Disassociation notification BSSID " MACSTR
3456 " reason_code=%u minor_reason_code=%u",
3457 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3458
3459 p2p_parse_free(&msg);
3460}
3461
3462
3463void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
3464{
3465 if (enabled) {
3466 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3467 "Device operations enabled");
3468 p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
3469 } else {
3470 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3471 "Device operations disabled");
3472 p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
3473 }
3474}
3475
3476
3477int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel)
3478{
3479 if (p2p_channel_to_freq(p2p->cfg->country, reg_class, channel) < 0)
3480 return -1;
3481
3482 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Set Listen channel: "
3483 "reg_class %u channel %u", reg_class, channel);
3484 p2p->cfg->reg_class = reg_class;
3485 p2p->cfg->channel = channel;
3486
3487 return 0;
3488}
3489
3490
3491int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
3492{
3493 wpa_hexdump_ascii(MSG_DEBUG, "P2P: New SSID postfix", postfix, len);
3494 if (postfix == NULL) {
3495 p2p->cfg->ssid_postfix_len = 0;
3496 return 0;
3497 }
3498 if (len > sizeof(p2p->cfg->ssid_postfix))
3499 return -1;
3500 os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
3501 p2p->cfg->ssid_postfix_len = len;
3502 return 0;
3503}
3504
3505
2463ba70
JS
3506int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
3507 int cfg_op_channel)
3508{
3509 if (p2p_channel_to_freq(p2p->cfg->country, op_reg_class, op_channel)
3510 < 0)
3511 return -1;
3512
3513 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, "P2P: Set Operating channel: "
3514 "reg_class %u channel %u", op_reg_class, op_channel);
3515 p2p->cfg->op_reg_class = op_reg_class;
3516 p2p->cfg->op_channel = op_channel;
3517 p2p->cfg->cfg_op_channel = cfg_op_channel;
3518 return 0;
3519}
3520
3521
b22128ef
JM
3522int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
3523 u8 *iface_addr)
3524{
3525 struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
3526 if (dev == NULL || is_zero_ether_addr(dev->interface_addr))
3527 return -1;
3528 os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
3529 return 0;
3530}
80c9582a
JM
3531
3532
4147a2cc
JM
3533int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
3534 u8 *dev_addr)
3535{
3536 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3537 if (dev == NULL)
3538 return -1;
c5db8e51 3539 os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
4147a2cc
JM
3540 return 0;
3541}
3542
3543
80c9582a
JM
3544void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
3545{
3546 os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
3547 if (is_zero_ether_addr(p2p->peer_filter))
3548 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Disable peer "
3549 "filter");
3550 else
3551 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Enable peer "
3552 "filter for " MACSTR, MAC2STR(p2p->peer_filter));
3553}
72044390
JM
3554
3555
3556void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
3557{
3558 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Cross connection %s",
3559 enabled ? "enabled" : "disabled");
3560 if (p2p->cross_connect == enabled)
3561 return;
3562 p2p->cross_connect = enabled;
3563 /* TODO: may need to tear down any action group where we are GO(?) */
3564}
f8d0131a
JM
3565
3566
3567int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
3568{
3569 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3570 if (dev == NULL)
3571 return -1;
3572 if (dev->oper_freq <= 0)
3573 return -1;
3574 return dev->oper_freq;
3575}
0f66abd2
SS
3576
3577
3578void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
3579{
3580 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Intra BSS distribution %s",
3581 enabled ? "enabled" : "disabled");
3582 p2p->cfg->p2p_intra_bss = enabled;
3583}
b5c9da8d
JM
3584
3585
3586void p2p_update_channel_list(struct p2p_data *p2p, struct p2p_channels *chan)
3587{
3588 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update channel list");
3589 os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
3590}
3f9285ff
JM
3591
3592
3593int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3594 const u8 *src, const u8 *bssid, const u8 *buf,
3595 size_t len, unsigned int wait_time)
3596{
3597 if (p2p->p2p_scan_running) {
3598 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Delay Action "
3599 "frame TX until p2p_scan completes");
3600 if (p2p->after_scan_tx) {
3601 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
3602 "previous pending Action frame TX");
3603 os_free(p2p->after_scan_tx);
3604 }
3605 p2p->after_scan_tx = os_malloc(sizeof(*p2p->after_scan_tx) +
3606 len);
3607 if (p2p->after_scan_tx == NULL)
3608 return -1;
3609 p2p->after_scan_tx->freq = freq;
3610 os_memcpy(p2p->after_scan_tx->dst, dst, ETH_ALEN);
3611 os_memcpy(p2p->after_scan_tx->src, src, ETH_ALEN);
3612 os_memcpy(p2p->after_scan_tx->bssid, bssid, ETH_ALEN);
3613 p2p->after_scan_tx->len = len;
3614 p2p->after_scan_tx->wait_time = wait_time;
3615 os_memcpy(p2p->after_scan_tx + 1, buf, len);
3616 return 0;
3617 }
3618
3619 return p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
3620 buf, len, wait_time);
3621}
7cfc4ac3
AGS
3622
3623
3624void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
3625 int freq_overall)
3626{
3627 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Best channel: 2.4 GHz: %d,"
3628 " 5 GHz: %d, overall: %d", freq_24, freq_5, freq_overall);
3629 p2p->best_freq_24 = freq_24;
3630 p2p->best_freq_5 = freq_5;
3631 p2p->best_freq_overall = freq_overall;
3632}
231bbd03
SS
3633
3634
3635const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
3636{
3637 if (p2p == NULL || p2p->go_neg_peer == NULL)
3638 return NULL;
c5db8e51 3639 return p2p->go_neg_peer->info.p2p_device_addr;
231bbd03 3640}
c165d81e
JB
3641
3642
3643const struct p2p_peer_info *
3644p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
3645{
3646 struct p2p_device *dev;
3647
3648 if (addr) {
3649 dev = p2p_get_device(p2p, addr);
3650 if (!dev)
3651 return NULL;
3652
3653 if (!next) {
3654 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
3655 return NULL;
3656
3657 return &dev->info;
3658 } else {
3659 do {
3660 dev = dl_list_first(&dev->list,
3661 struct p2p_device,
3662 list);
3663 if (&dev->list == &p2p->devices)
3664 return NULL;
3665 } while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
3666 }
3667 } else {
3668 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
3669 if (!dev)
3670 return NULL;
3671 while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
3672 dev = dl_list_first(&dev->list,
3673 struct p2p_device,
3674 list);
3675 if (&dev->list == &p2p->devices)
3676 return NULL;
3677 }
3678 }
3679
3680 return &dev->info;
3681}