]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/p2p/p2p.c
P2P: Add forgotten allow_cross_connection example
[thirdparty/hostap.git] / src / p2p / p2p.c
CommitLineData
b22128ef
JM
1/*
2 * Wi-Fi Direct - P2P module
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#include "includes.h"
16
17#include "common.h"
18#include "eloop.h"
19#include "common/ieee802_11_defs.h"
20#include "common/ieee802_11_common.h"
21#include "wps/wps_i.h"
22#include "p2p_i.h"
23#include "p2p.h"
24
25
26static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
27static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
28static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
29 const u8 *sa, const u8 *data, size_t len,
30 int rx_freq);
31static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
32 const u8 *sa, const u8 *data,
33 size_t len);
34static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
40c03fd4 35static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
b22128ef
JM
36
37
40c03fd4
JM
38/*
39 * p2p_scan recovery timeout
40 *
41 * Many drivers are using 30 second timeout on scan results. Allow a bit larger
42 * timeout for this to avoid hitting P2P timeout unnecessarily.
43 */
44#define P2P_SCAN_TIMEOUT 35
45
b22128ef
JM
46/**
47 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
48 * entries will be removed
49 */
50#define P2P_PEER_EXPIRATION_AGE 300
51
52#define P2P_PEER_EXPIRATION_INTERVAL (P2P_PEER_EXPIRATION_AGE / 2)
53
54static void p2p_expire_peers(struct p2p_data *p2p)
55{
56 struct p2p_device *dev, *n;
57 struct os_time now;
58
59 os_get_time(&now);
60 dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
61 if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
62 continue;
63 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
64 "entry " MACSTR, MAC2STR(dev->p2p_device_addr));
65 dl_list_del(&dev->list);
66 p2p_device_free(p2p, dev);
67 }
68}
69
70
71static void p2p_expiration_timeout(void *eloop_ctx, void *timeout_ctx)
72{
73 struct p2p_data *p2p = eloop_ctx;
74 p2p_expire_peers(p2p);
75 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
76 p2p_expiration_timeout, p2p, NULL);
77}
78
79
80static const char * p2p_state_txt(int state)
81{
82 switch (state) {
83 case P2P_IDLE:
84 return "IDLE";
85 case P2P_SEARCH:
86 return "SEARCH";
87 case P2P_CONNECT:
88 return "CONNECT";
89 case P2P_CONNECT_LISTEN:
90 return "CONNECT_LISTEN";
91 case P2P_GO_NEG:
92 return "GO_NEG";
93 case P2P_LISTEN_ONLY:
94 return "LISTEN_ONLY";
95 case P2P_WAIT_PEER_CONNECT:
96 return "WAIT_PEER_CONNECT";
97 case P2P_WAIT_PEER_IDLE:
98 return "WAIT_PEER_IDLE";
99 case P2P_SD_DURING_FIND:
100 return "SD_DURING_FIND";
101 case P2P_PROVISIONING:
102 return "PROVISIONING";
103 case P2P_PD_DURING_FIND:
104 return "PD_DURING_FIND";
105 case P2P_INVITE:
106 return "INVITE";
107 case P2P_INVITE_LISTEN:
108 return "INVITE_LISTEN";
109 default:
110 return "?";
111 }
112}
113
114
115void p2p_set_state(struct p2p_data *p2p, int new_state)
116{
117 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
118 p2p_state_txt(p2p->state), p2p_state_txt(new_state));
119 p2p->state = new_state;
120}
121
122
123void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
124{
125 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
126 "P2P: Set timeout (state=%s): %u.%06u sec",
127 p2p_state_txt(p2p->state), sec, usec);
128 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
129 eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
130}
131
132
133void p2p_clear_timeout(struct p2p_data *p2p)
134{
135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
136 p2p_state_txt(p2p->state));
137 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
138}
139
140
141void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
142 int status)
143{
144 struct p2p_go_neg_results res;
145 p2p_clear_timeout(p2p);
146 p2p_set_state(p2p, P2P_IDLE);
147 p2p->go_neg_peer = NULL;
148
149 os_memset(&res, 0, sizeof(res));
150 res.status = status;
151 if (peer) {
152 os_memcpy(res.peer_device_addr, peer->p2p_device_addr,
153 ETH_ALEN);
154 os_memcpy(res.peer_interface_addr, peer->intended_addr,
155 ETH_ALEN);
156 }
157 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
158}
159
160
161static void p2p_listen_in_find(struct p2p_data *p2p)
162{
163 unsigned int r, tu;
164 int freq;
165 struct wpabuf *ies;
166
167 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
168 "P2P: Starting short listen state (state=%s)",
169 p2p_state_txt(p2p->state));
170
171 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
172 p2p->cfg->channel);
173 if (freq < 0) {
174 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
175 "P2P: Unknown regulatory class/channel");
176 return;
177 }
178
179 os_get_random((u8 *) &r, sizeof(r));
180 tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
181 p2p->min_disc_int) * 100;
182
183 p2p->pending_listen_freq = freq;
184 p2p->pending_listen_sec = 0;
185 p2p->pending_listen_usec = 1024 * tu;
186
187 ies = p2p_build_probe_resp_ies(p2p);
188 if (ies == NULL)
189 return;
190
191 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
192 ies) < 0) {
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
194 "P2P: Failed to start listen mode");
195 p2p->pending_listen_freq = 0;
196 }
197 wpabuf_free(ies);
198}
199
200
201int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
202{
203 int freq;
204 struct wpabuf *ies;
205
206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
207 "P2P: Going to listen(only) state");
208
209 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
210 p2p->cfg->channel);
211 if (freq < 0) {
212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
213 "P2P: Unknown regulatory class/channel");
214 return -1;
215 }
216
217 p2p->pending_listen_freq = freq;
218 p2p->pending_listen_sec = timeout / 1000;
219 p2p->pending_listen_usec = (timeout % 1000) * 1000;
220
221 if (p2p->p2p_scan_running) {
222 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
223 "P2P: p2p_scan running - delay start of listen state");
224 p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
225 return 0;
226 }
227
228 ies = p2p_build_probe_resp_ies(p2p);
229 if (ies == NULL)
230 return -1;
231
232 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
233 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
234 "P2P: Failed to start listen mode");
235 p2p->pending_listen_freq = 0;
236 wpabuf_free(ies);
237 return -1;
238 }
239 wpabuf_free(ies);
240
241 p2p_set_state(p2p, P2P_LISTEN_ONLY);
242
243 return 0;
244}
245
246
247static void p2p_device_clear_reported(struct p2p_data *p2p)
248{
249 struct p2p_device *dev;
250 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
251 dev->flags &= ~P2P_DEV_REPORTED;
252}
253
254
255/**
256 * p2p_get_device - Fetch a peer entry
257 * @p2p: P2P module context from p2p_init()
258 * @addr: P2P Device Address of the peer
259 * Returns: Pointer to the device entry or %NULL if not found
260 */
261struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
262{
263 struct p2p_device *dev;
264 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
265 if (os_memcmp(dev->p2p_device_addr, addr, ETH_ALEN) == 0)
266 return dev;
267 }
268 return NULL;
269}
270
271
272/**
273 * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
274 * @p2p: P2P module context from p2p_init()
275 * @addr: P2P Interface Address of the peer
276 * Returns: Pointer to the device entry or %NULL if not found
277 */
278struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
279 const u8 *addr)
280{
281 struct p2p_device *dev;
282 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
283 if (os_memcmp(dev->interface_addr, addr, ETH_ALEN) == 0)
284 return dev;
285 }
286 return NULL;
287}
288
289
290/**
291 * p2p_create_device - Create a peer entry
292 * @p2p: P2P module context from p2p_init()
293 * @addr: P2P Device Address of the peer
294 * Returns: Pointer to the device entry or %NULL on failure
295 *
296 * If there is already an entry for the peer, it will be returned instead of
297 * creating a new one.
298 */
299static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
300 const u8 *addr)
301{
302 struct p2p_device *dev, *oldest = NULL;
303 size_t count = 0;
304
305 dev = p2p_get_device(p2p, addr);
306 if (dev)
307 return dev;
308
309 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
310 count++;
311 if (oldest == NULL ||
312 os_time_before(&dev->last_seen, &oldest->last_seen))
313 oldest = dev;
314 }
315 if (count + 1 > p2p->cfg->max_peers && oldest) {
316 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
317 "P2P: Remove oldest peer entry to make room for a new "
318 "peer");
319 dl_list_del(&oldest->list);
320 p2p_device_free(p2p, oldest);
321 }
322
323 dev = os_zalloc(sizeof(*dev));
324 if (dev == NULL)
325 return NULL;
326 dl_list_add(&p2p->devices, &dev->list);
327 os_memcpy(dev->p2p_device_addr, addr, ETH_ALEN);
328
329 return dev;
330}
331
332
333static void p2p_copy_client_info(struct p2p_device *dev,
334 struct p2p_client_info *cli)
335{
336 os_memcpy(dev->device_name, cli->dev_name, cli->dev_name_len);
337 dev->device_name[cli->dev_name_len] = '\0';
338 dev->dev_capab = cli->dev_capab;
339 dev->config_methods = cli->config_methods;
340 os_memcpy(dev->pri_dev_type, cli->pri_dev_type, 8);
341}
342
343
344static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
345 const u8 *go_interface_addr, int freq,
346 const u8 *gi, size_t gi_len)
347{
348 struct p2p_group_info info;
349 size_t c;
350 struct p2p_device *dev;
351
352 if (gi == NULL)
353 return 0;
354
355 if (p2p_group_info_parse(gi, gi_len, &info) < 0)
356 return -1;
357
358 /*
359 * Clear old data for this group; if the devices are still in the
360 * group, the information will be restored in the loop following this.
361 */
362 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
363 if (os_memcpy(dev->member_in_go_iface, go_interface_addr,
364 ETH_ALEN) == 0) {
365 os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
366 os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
367 }
368 }
369
370 for (c = 0; c < info.num_clients; c++) {
371 struct p2p_client_info *cli = &info.client[c];
372 dev = p2p_get_device(p2p, cli->p2p_device_addr);
373 if (dev) {
374 /*
375 * Update information only if we have not received this
376 * directly from the client.
377 */
378 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
379 P2P_DEV_PROBE_REQ_ONLY))
380 p2p_copy_client_info(dev, cli);
381 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
382 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
383 }
384 } else {
385 dev = p2p_create_device(p2p, cli->p2p_device_addr);
386 if (dev == NULL)
387 continue;
388 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
389 p2p_copy_client_info(dev, cli);
390 dev->oper_freq = freq;
391 p2p->cfg->dev_found(
392 p2p->cfg->cb_ctx, dev->p2p_device_addr,
393 dev->p2p_device_addr, dev->pri_dev_type,
394 dev->device_name, dev->config_methods,
395 dev->dev_capab, 0);
396 }
397
398 os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
399 ETH_ALEN);
400 os_get_time(&dev->last_seen);
401 os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
402 os_memcpy(dev->member_in_go_iface, go_interface_addr,
403 ETH_ALEN);
404 }
405
406 return 0;
407}
408
409
410/**
411 * p2p_add_device - Add peer entries based on scan results
412 * @p2p: P2P module context from p2p_init()
413 * @addr: Source address of Beacon or Probe Response frame (may be either
414 * P2P Device Address or P2P Interface Address)
415 * @level: Signal level (signal strength of the received frame from the peer)
416 * @freq: Frequency on which the Beacon or Probe Response frame was received
417 * @ies: IEs from the Beacon or Probe Response frame
418 * @ies_len: Length of ies buffer in octets
419 * Returns: 0 on success, -1 on failure
420 *
421 * If the scan result is for a GO, the clients in the group will also be added
422 * to the peer table.
423 */
424static int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq,
425 int level, const u8 *ies, size_t ies_len)
426{
427 struct p2p_device *dev;
428 struct p2p_message msg;
429 const u8 *p2p_dev_addr;
430
431 os_memset(&msg, 0, sizeof(msg));
432 if (p2p_parse_ies(ies, ies_len, &msg)) {
433 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
434 "P2P: Failed to parse P2P IE for a device entry");
435 p2p_parse_free(&msg);
436 return -1;
437 }
438
439 if (msg.p2p_device_addr)
440 p2p_dev_addr = msg.p2p_device_addr;
441 else if (msg.device_id)
442 p2p_dev_addr = msg.device_id;
443 else {
444 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
445 "P2P: Ignore scan data without P2P Device Info or "
446 "P2P Device Id");
447 p2p_parse_free(&msg);
448 return -1;
449 }
450
80c9582a
JM
451 if (!is_zero_ether_addr(p2p->peer_filter) &&
452 os_memcmp(p2p_dev_addr, p2p->peer_filter, ETH_ALEN) != 0) {
453 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Do not add peer "
454 "filter for " MACSTR " due to peer filter",
455 MAC2STR(p2p_dev_addr));
456 return 0;
457 }
458
b22128ef
JM
459 dev = p2p_create_device(p2p, p2p_dev_addr);
460 if (dev == NULL) {
461 p2p_parse_free(&msg);
462 return -1;
463 }
464 os_get_time(&dev->last_seen);
465 dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
466
467 if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
468 os_memcpy(dev->interface_addr, addr, ETH_ALEN);
469 if (msg.ssid &&
470 (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
471 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
472 != 0)) {
473 os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
474 dev->oper_ssid_len = msg.ssid[1];
475 }
476
477 if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
478 *msg.ds_params >= 1 && *msg.ds_params <= 14) {
479 int ds_freq;
480 if (*msg.ds_params == 14)
481 ds_freq = 2484;
482 else
483 ds_freq = 2407 + *msg.ds_params * 5;
484 if (freq != ds_freq) {
485 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
486 "P2P: Update Listen frequency based on DS "
487 "Parameter Set IE: %d -> %d MHz",
488 freq, ds_freq);
489 freq = ds_freq;
490 }
491 }
492
493 if (dev->listen_freq && dev->listen_freq != freq) {
494 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
495 "P2P: Update Listen frequency based on scan "
496 "results (" MACSTR " %d -> %d MHz (DS param %d)",
497 MAC2STR(dev->p2p_device_addr), dev->listen_freq, freq,
498 msg.ds_params ? *msg.ds_params : -1);
499 }
500 dev->listen_freq = freq;
501 dev->level = level;
502
503 if (msg.pri_dev_type)
504 os_memcpy(dev->pri_dev_type, msg.pri_dev_type,
505 sizeof(dev->pri_dev_type));
506 os_memcpy(dev->device_name, msg.device_name, sizeof(dev->device_name));
507 dev->config_methods = msg.config_methods ? msg.config_methods :
508 msg.wps_config_methods;
509 if (msg.capability) {
510 dev->dev_capab = msg.capability[0];
511 dev->group_capab = msg.capability[1];
512 }
513
514 if (msg.ext_listen_timing) {
515 dev->ext_listen_period = WPA_GET_LE16(msg.ext_listen_timing);
516 dev->ext_listen_interval =
517 WPA_GET_LE16(msg.ext_listen_timing + 2);
518 }
519
520 p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq, msg.group_info,
521 msg.group_info_len);
522
523 p2p_parse_free(&msg);
524
525 if (p2p_pending_sd_req(p2p, dev))
526 dev->flags |= P2P_DEV_SD_SCHEDULE;
527
528 if (dev->flags & P2P_DEV_REPORTED)
529 return 0;
530
531 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
532 "P2P: Peer found with Listen frequency %d MHz", freq);
533 if (dev->flags & P2P_DEV_USER_REJECTED) {
534 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
535 "P2P: Do not report rejected device");
536 return 0;
537 }
538 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, dev->p2p_device_addr,
539 dev->pri_dev_type, dev->device_name,
540 dev->config_methods, dev->dev_capab,
541 dev->group_capab);
542 dev->flags |= P2P_DEV_REPORTED;
543
544 return 0;
545}
546
547
548static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
549{
550 if (p2p->go_neg_peer == dev)
551 p2p->go_neg_peer = NULL;
552 if (p2p->invite_peer == dev)
553 p2p->invite_peer = NULL;
554 if (p2p->sd_peer == dev)
555 p2p->sd_peer = NULL;
556 if (p2p->pending_client_disc_go == dev)
557 p2p->pending_client_disc_go = NULL;
558
559 os_free(dev);
560}
561
562
563static int p2p_get_next_prog_freq(struct p2p_data *p2p)
564{
565 struct p2p_channels *c;
566 struct p2p_reg_class *cla;
567 size_t cl, ch;
568 int found = 0;
569 u8 reg_class;
570 u8 channel;
571 int freq;
572
573 c = &p2p->cfg->channels;
574 for (cl = 0; cl < c->reg_classes; cl++) {
575 cla = &c->reg_class[cl];
576 if (cla->reg_class != p2p->last_prog_scan_class)
577 continue;
578 for (ch = 0; ch < cla->channels; ch++) {
579 if (cla->channel[ch] == p2p->last_prog_scan_chan) {
580 found = 1;
581 break;
582 }
583 }
584 if (found)
585 break;
586 }
587
588 if (!found) {
589 /* Start from beginning */
590 reg_class = c->reg_class[0].reg_class;
591 channel = c->reg_class[0].channel[0];
592 } else {
593 /* Pick the next channel */
594 ch++;
595 if (ch == cla->channels) {
596 cl++;
597 if (cl == c->reg_classes)
598 cl = 0;
599 ch = 0;
600 }
601 reg_class = c->reg_class[cl].reg_class;
602 channel = c->reg_class[cl].channel[ch];
603 }
604
605 freq = p2p_channel_to_freq(p2p->cfg->country, reg_class, channel);
606 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Next progressive search "
607 "channel: reg_class %u channel %u -> %d MHz",
608 reg_class, channel, freq);
609 p2p->last_prog_scan_class = reg_class;
610 p2p->last_prog_scan_chan = channel;
611
612 if (freq == 2412 || freq == 2437 || freq == 2462)
613 return 0; /* No need to add social channels */
614 return freq;
615}
616
617
618static void p2p_search(struct p2p_data *p2p)
619{
620 int freq = 0;
621 enum p2p_scan_type type;
622
623 if (p2p->drv_in_listen) {
624 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is still "
625 "in Listen state - wait for it to end before "
626 "continuing");
627 return;
628 }
629 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
630
631 if (p2p->go_neg_peer) {
632 /*
633 * Only scan the known listen frequency of the peer
634 * during GO Negotiation start.
635 */
636 freq = p2p->go_neg_peer->listen_freq;
637 if (freq <= 0)
638 freq = p2p->go_neg_peer->oper_freq;
639 type = P2P_SCAN_SPECIFIC;
640 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
641 "for freq %u (GO Neg)", freq);
642 } else if (p2p->invite_peer) {
643 /*
644 * Only scan the known listen frequency of the peer
645 * during Invite start.
646 */
647 freq = p2p->invite_peer->listen_freq;
648 if (freq <= 0)
649 freq = p2p->invite_peer->oper_freq;
650 type = P2P_SCAN_SPECIFIC;
651 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
652 "for freq %u (Invite)", freq);
653 } else if (p2p->find_type == P2P_FIND_PROGRESSIVE &&
654 (freq = p2p_get_next_prog_freq(p2p)) > 0) {
655 type = P2P_SCAN_SOCIAL_PLUS_ONE;
656 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
657 "(+ freq %u)", freq);
658 } else {
659 type = P2P_SCAN_SOCIAL;
660 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search");
661 }
662
663 if (p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq) < 0) {
664 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
665 "P2P: Scan request failed");
666 p2p_continue_find(p2p);
40c03fd4
JM
667 } else {
668 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
669 p2p->p2p_scan_running = 1;
670 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
671 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
672 p2p, NULL);
b22128ef
JM
673 }
674}
675
676
677static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
678{
679 struct p2p_data *p2p = eloop_ctx;
680 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Find timeout -> stop");
681 p2p_stop_find(p2p);
682}
683
684
685static int p2p_run_after_scan(struct p2p_data *p2p)
686{
687 struct p2p_device *dev;
688 enum p2p_after_scan op;
689
690 op = p2p->start_after_scan;
691 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
692 switch (op) {
693 case P2P_AFTER_SCAN_NOTHING:
694 break;
695 case P2P_AFTER_SCAN_LISTEN:
696 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
697 "requested Listen state");
698 p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
699 p2p->pending_listen_usec / 1000);
700 return 1;
701 case P2P_AFTER_SCAN_CONNECT:
702 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
703 "requested connect with " MACSTR,
704 MAC2STR(p2p->after_scan_peer));
705 dev = p2p_get_device(p2p, p2p->after_scan_peer);
706 if (dev == NULL) {
707 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer not "
708 "known anymore");
709 break;
710 }
711 p2p_connect_send(p2p, dev);
712 return 1;
713 }
714
715 return 0;
716}
717
718
b22128ef
JM
719static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
720{
721 struct p2p_data *p2p = eloop_ctx;
722 int running;
723 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan timeout "
724 "(running=%d)", p2p->p2p_scan_running);
725 running = p2p->p2p_scan_running;
726 /* Make sure we recover from missed scan results callback */
727 p2p->p2p_scan_running = 0;
728
729 if (running)
730 p2p_run_after_scan(p2p);
731}
732
733
734int p2p_find(struct p2p_data *p2p, unsigned int timeout,
735 enum p2p_discovery_type type)
736{
737 int res;
738
739 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting find (type=%d)",
740 type);
741 if (p2p->p2p_scan_running) {
742 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan is "
743 "already running");
744 }
745 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
746 p2p_clear_timeout(p2p);
747 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
748 p2p->find_type = type;
749 p2p_device_clear_reported(p2p);
750 p2p_set_state(p2p, P2P_SEARCH);
751 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
752 if (timeout)
753 eloop_register_timeout(timeout, 0, p2p_find_timeout,
754 p2p, NULL);
755 switch (type) {
756 case P2P_FIND_START_WITH_FULL:
757 case P2P_FIND_PROGRESSIVE:
758 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0);
759 break;
760 case P2P_FIND_ONLY_SOCIAL:
761 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0);
762 break;
763 default:
764 return -1;
765 }
766
767 if (res == 0) {
768 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
769 p2p->p2p_scan_running = 1;
770 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
771 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
772 p2p, NULL);
773 } else {
774 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
775 "p2p_scan");
776 }
777
778 return res;
779}
780
781
782void p2p_stop_find(struct p2p_data *p2p)
783{
784 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopping find");
785 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
786 p2p_clear_timeout(p2p);
787 p2p_set_state(p2p, P2P_IDLE);
788 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
789 p2p->go_neg_peer = NULL;
790 p2p->sd_peer = NULL;
791 p2p->invite_peer = NULL;
792 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
793}
794
795
796int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
797 enum p2p_wps_method wps_method,
798 int go_intent, const u8 *own_interface_addr,
799 unsigned int force_freq, int persistent_group)
800{
801 struct p2p_device *dev;
802
803 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
804 "P2P: Request to start group negotiation - peer=" MACSTR
805 " GO Intent=%d Intended Interface Address=" MACSTR
806 " wps_method=%d persistent_group=%d",
807 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
808 wps_method, persistent_group);
809
810 if (force_freq) {
811 if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
812 &p2p->op_reg_class, &p2p->op_channel) <
813 0) {
814 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
815 "P2P: Unsupported frequency %u MHz",
816 force_freq);
817 return -1;
818 }
819 p2p->channels.reg_classes = 1;
820 p2p->channels.reg_class[0].channels = 1;
821 p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
822 p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
823 } else {
824 p2p->op_reg_class = p2p->cfg->op_reg_class;
825 p2p->op_channel = p2p->cfg->op_channel;
826 os_memcpy(&p2p->channels, &p2p->cfg->channels,
827 sizeof(struct p2p_channels));
828 }
829 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
830 "P2P: Own preference for operation channel: "
831 "Regulatory Class %u Channel %u%s",
832 p2p->op_reg_class, p2p->op_channel,
833 force_freq ? " (forced)" : "");
834
835 dev = p2p_get_device(p2p, peer_addr);
836 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
837 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
838 "P2P: Cannot connect to unknown P2P Device " MACSTR,
839 MAC2STR(peer_addr));
840 return -1;
841 }
842
843 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
844 if (!(dev->dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
845 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
846 "P2P: Cannot connect to P2P Device " MACSTR
847 " that is in a group and is not discoverable",
848 MAC2STR(peer_addr));
849 return -1;
850 }
851 if (dev->oper_freq <= 0) {
852 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
853 "P2P: Cannot connect to P2P Device " MACSTR
854 " with incomplete information",
855 MAC2STR(peer_addr));
856 return -1;
857 }
858
859 /*
860 * First, try to connect directly. If the peer does not
861 * acknowledge frames, assume it is sleeping and use device
862 * discoverability via the GO at that point.
863 */
864 }
865
866 dev->flags &= ~P2P_DEV_NOT_YET_READY;
867 dev->flags &= ~P2P_DEV_USER_REJECTED;
868 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
869 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
870 dev->go_neg_req_sent = 0;
871 dev->go_state = UNKNOWN_GO;
872 if (persistent_group)
873 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
874 else
875 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_GROUP;
876 p2p->go_intent = go_intent;
877 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
878
879 if (p2p->state != P2P_IDLE)
880 p2p_stop_find(p2p);
881
882 dev->wps_method = wps_method;
883 dev->status = P2P_SC_SUCCESS;
d5b20a73
JM
884
885 if (force_freq)
886 dev->flags |= P2P_DEV_FORCE_FREQ;
887 else
888 dev->flags &= ~P2P_DEV_FORCE_FREQ;
889
b22128ef
JM
890 if (p2p->p2p_scan_running) {
891 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
892 "P2P: p2p_scan running - delay connect send");
893 p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
894 os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
895 return 0;
896 }
897 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
898
899 return p2p_connect_send(p2p, dev);
900}
901
902
903int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
904 enum p2p_wps_method wps_method,
905 int go_intent, const u8 *own_interface_addr,
906 unsigned int force_freq, int persistent_group)
907{
908 struct p2p_device *dev;
909
910 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
911 "P2P: Request to authorize group negotiation - peer=" MACSTR
912 " GO Intent=%d Intended Interface Address=" MACSTR
913 " wps_method=%d persistent_group=%d",
914 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
915 wps_method, persistent_group);
916
917 if (force_freq) {
918 if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
919 &p2p->op_reg_class, &p2p->op_channel) <
920 0) {
921 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
922 "P2P: Unsupported frequency %u MHz",
923 force_freq);
924 return -1;
925 }
926 p2p->channels.reg_classes = 1;
927 p2p->channels.reg_class[0].channels = 1;
928 p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
929 p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
930 } else {
931 p2p->op_reg_class = p2p->cfg->op_reg_class;
932 p2p->op_channel = p2p->cfg->op_channel;
933 os_memcpy(&p2p->channels, &p2p->cfg->channels,
934 sizeof(struct p2p_channels));
935 }
936 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
937 "P2P: Own preference for operation channel: "
938 "Regulatory Class %u Channel %u%s",
939 p2p->op_reg_class, p2p->op_channel,
940 force_freq ? " (forced)" : "");
941
942 dev = p2p_get_device(p2p, peer_addr);
943 if (dev == NULL) {
944 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
945 "P2P: Cannot authorize unknown P2P Device " MACSTR,
946 MAC2STR(peer_addr));
947 return -1;
948 }
949
950 dev->flags &= ~P2P_DEV_NOT_YET_READY;
951 dev->flags &= ~P2P_DEV_USER_REJECTED;
952 dev->go_neg_req_sent = 0;
953 dev->go_state = UNKNOWN_GO;
954 if (persistent_group)
955 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
956 else
957 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_GROUP;
958 p2p->go_intent = go_intent;
959 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
960
961 dev->wps_method = wps_method;
962 dev->status = P2P_SC_SUCCESS;
963
d5b20a73
JM
964 if (force_freq)
965 dev->flags |= P2P_DEV_FORCE_FREQ;
966 else
967 dev->flags &= ~P2P_DEV_FORCE_FREQ;
968
b22128ef
JM
969 return 0;
970}
971
972
973void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
974 struct p2p_device *dev, struct p2p_message *msg)
975{
976 os_get_time(&dev->last_seen);
977
978 if (msg->pri_dev_type)
979 os_memcpy(dev->pri_dev_type, msg->pri_dev_type,
980 sizeof(dev->pri_dev_type));
981 os_memcpy(dev->device_name, msg->device_name,
982 sizeof(dev->device_name));
983 dev->config_methods = msg->config_methods ? msg->config_methods :
984 msg->wps_config_methods;
985 if (msg->capability) {
986 dev->dev_capab = msg->capability[0];
987 dev->group_capab = msg->capability[1];
988 }
989 if (msg->listen_channel) {
990 int freq;
991 freq = p2p_channel_to_freq((char *) msg->listen_channel,
992 msg->listen_channel[3],
993 msg->listen_channel[4]);
994 if (freq < 0) {
995 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
996 "P2P: Unknown peer Listen channel: "
997 "country=%c%c(0x%02x) reg_class=%u channel=%u",
998 msg->listen_channel[0],
999 msg->listen_channel[1],
1000 msg->listen_channel[2],
1001 msg->listen_channel[3],
1002 msg->listen_channel[4]);
1003 } else {
1004 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update "
1005 "peer " MACSTR " Listen channel: %u -> %u MHz",
1006 MAC2STR(dev->p2p_device_addr),
1007 dev->listen_freq, freq);
1008 dev->listen_freq = freq;
1009 }
1010 }
1011 if (msg->ext_listen_timing) {
1012 dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
1013 dev->ext_listen_interval =
1014 WPA_GET_LE16(msg->ext_listen_timing + 2);
1015 }
1016
1017 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1018 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1019 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1020 "P2P: Completed device entry based on data from "
1021 "GO Negotiation Request");
1022 } else {
1023 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1024 "P2P: Created device entry based on GO Neg Req: "
1025 MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1026 "listen_freq=%d",
1027 MAC2STR(dev->p2p_device_addr), dev->dev_capab,
1028 dev->group_capab, dev->device_name, dev->listen_freq);
1029 }
1030
1031 dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1032
1033 if (dev->flags & P2P_DEV_USER_REJECTED) {
1034 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1035 "P2P: Do not report rejected device");
1036 return;
1037 }
1038
1039 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, dev->p2p_device_addr,
1040 dev->pri_dev_type, dev->device_name,
1041 dev->config_methods, dev->dev_capab,
1042 dev->group_capab);
1043}
1044
1045
1046void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1047{
1048 os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1049 p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1050 os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1051 p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1052 *ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1053}
1054
1055
1056int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1057{
1058 p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1059 p2p_random(params->passphrase, 8);
1060 return 0;
1061}
1062
1063
1064void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1065{
1066 struct p2p_go_neg_results res;
1067 int go = peer->go_state == LOCAL_GO;
1068 struct p2p_channels intersection;
1069 int freqs;
1070 size_t i, j;
1071
1072 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1073 "P2P: GO Negotiation with " MACSTR " completed (%s will be "
1074 "GO)", MAC2STR(peer->p2p_device_addr),
1075 go ? "local end" : "peer");
1076
1077 os_memset(&res, 0, sizeof(res));
1078 res.role_go = go;
1079 os_memcpy(res.peer_device_addr, peer->p2p_device_addr, ETH_ALEN);
1080 os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1081 res.wps_method = peer->wps_method;
1082 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP)
1083 res.persistent_group = 1;
1084
1085 if (go) {
1086 /* Setup AP mode for WPS provisioning */
1087 res.freq = p2p_channel_to_freq(p2p->cfg->country,
1088 p2p->op_reg_class,
1089 p2p->op_channel);
1090 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1091 res.ssid_len = p2p->ssid_len;
1092 p2p_random(res.passphrase, 8);
1093 } else
1094 res.freq = peer->oper_freq;
1095
1096 p2p_channels_intersect(&p2p->channels, &peer->channels,
1097 &intersection);
1098 freqs = 0;
1099 for (i = 0; i < intersection.reg_classes; i++) {
1100 struct p2p_reg_class *c = &intersection.reg_class[i];
1101 if (freqs + 1 == P2P_MAX_CHANNELS)
1102 break;
1103 for (j = 0; j < c->channels; j++) {
1104 int freq;
1105 if (freqs + 1 == P2P_MAX_CHANNELS)
1106 break;
1107 freq = p2p_channel_to_freq(peer->country, c->reg_class,
1108 c->channel[j]);
1109 if (freq < 0)
1110 continue;
1111 res.freq_list[freqs++] = freq;
1112 }
1113 }
1114
1115 p2p_clear_timeout(p2p);
1116 peer->go_neg_req_sent = 0;
1117 peer->wps_method = WPS_NOT_READY;
1118
1119 p2p_set_state(p2p, P2P_PROVISIONING);
1120 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
1121}
1122
1123
1124static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
1125 const u8 *data, size_t len, int rx_freq)
1126{
1127 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1128 "P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
1129 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
1130
1131 if (len < 1)
1132 return;
1133
1134 switch (data[0]) {
1135 case P2P_GO_NEG_REQ:
1136 p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
1137 break;
1138 case P2P_GO_NEG_RESP:
1139 p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
1140 break;
1141 case P2P_GO_NEG_CONF:
1142 p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
1143 break;
1144 case P2P_INVITATION_REQ:
1145 p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
1146 rx_freq);
1147 break;
1148 case P2P_INVITATION_RESP:
1149 p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
1150 break;
1151 case P2P_PROV_DISC_REQ:
1152 p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1153 break;
1154 case P2P_PROV_DISC_RESP:
1155 p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
1156 break;
1157 case P2P_DEV_DISC_REQ:
1158 p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1159 break;
1160 case P2P_DEV_DISC_RESP:
1161 p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
1162 break;
1163 default:
1164 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1165 "P2P: Unsupported P2P Public Action frame type %d",
1166 data[0]);
1167 break;
1168 }
1169}
1170
1171
1172void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1173 const u8 *bssid, const u8 *data, size_t len,
1174 int freq)
1175{
1176 if (len < 1)
1177 return;
1178
1179 switch (data[0]) {
1180 case WLAN_PA_VENDOR_SPECIFIC:
1181 data++;
1182 len--;
1183 if (len < 3)
1184 return;
1185 if (WPA_GET_BE24(data) != OUI_WFA)
1186 return;
1187
1188 data += 3;
1189 len -= 3;
1190 if (len < 1)
1191 return;
1192
1193 if (*data != P2P_OUI_TYPE)
1194 return;
1195
1196 p2p_rx_p2p_action(p2p, sa, data + 1, len - 1, freq);
1197 break;
1198 case WLAN_PA_GAS_INITIAL_REQ:
1199 p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
1200 break;
1201 case WLAN_PA_GAS_INITIAL_RESP:
18708aad
JM
1202 p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
1203 break;
1204 case WLAN_PA_GAS_COMEBACK_REQ:
1205 p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
1206 break;
1207 case WLAN_PA_GAS_COMEBACK_RESP:
1208 p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
b22128ef
JM
1209 break;
1210 }
1211}
1212
1213
1214void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1215 const u8 *bssid, u8 category,
1216 const u8 *data, size_t len, int freq)
1217{
1218 if (category == WLAN_ACTION_PUBLIC) {
1219 p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
1220 return;
1221 }
1222
1223 if (category != WLAN_ACTION_VENDOR_SPECIFIC)
1224 return;
1225
1226 if (len < 4)
1227 return;
1228
1229 if (WPA_GET_BE24(data) != OUI_WFA)
1230 return;
1231 data += 3;
1232 len -= 3;
1233
1234 if (*data != P2P_OUI_TYPE)
1235 return;
1236 data++;
1237 len--;
1238
1239 /* P2P action frame */
1240 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1241 "P2P: RX P2P Action from " MACSTR, MAC2STR(sa));
1242 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
1243
1244 if (len < 1)
1245 return;
1246 switch (data[0]) {
1247 case P2P_NOA:
1248 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1249 "P2P: Received P2P Action - Notice of Absence");
1250 /* TODO */
1251 break;
1252 case P2P_PRESENCE_REQ:
1253 p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
1254 break;
1255 case P2P_PRESENCE_RESP:
1256 p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
1257 break;
1258 case P2P_GO_DISC_REQ:
1259 p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
1260 break;
1261 default:
1262 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1263 "P2P: Received P2P Action - unknown type %u", data[0]);
1264 break;
1265 }
1266}
1267
1268
1269static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
1270{
1271 struct p2p_data *p2p = eloop_ctx;
1272 if (p2p->go_neg_peer == NULL)
1273 return;
1274 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1275 p2p->go_neg_peer->status = P2P_SC_SUCCESS;
1276 p2p_connect_send(p2p, p2p->go_neg_peer);
1277}
1278
1279
1280static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
1281{
1282 struct p2p_data *p2p = eloop_ctx;
1283 if (p2p->invite_peer == NULL)
1284 return;
1285 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1286 p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr);
1287}
1288
1289
1290static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
1291 const u8 *ie, size_t ie_len)
1292{
1293 struct p2p_message msg;
1294 struct p2p_device *dev;
1295
1296 os_memset(&msg, 0, sizeof(msg));
1297 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
1298 {
1299 p2p_parse_free(&msg);
1300 return; /* not a P2P probe */
1301 }
1302
1303 if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
1304 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
1305 != 0) {
1306 /* The Probe Request is not part of P2P Device Discovery. It is
1307 * not known whether the source address of the frame is the P2P
1308 * Device Address or P2P Interface Address. Do not add a new
1309 * peer entry based on this frames.
1310 */
1311 p2p_parse_free(&msg);
1312 return;
1313 }
1314
1315 dev = p2p_get_device(p2p, addr);
1316 if (dev) {
1317 if (dev->country[0] == 0 && msg.listen_channel)
1318 os_memcpy(dev->country, msg.listen_channel, 3);
1319 p2p_parse_free(&msg);
1320 return; /* already known */
1321 }
1322
1323 dev = p2p_create_device(p2p, addr);
1324 if (dev == NULL) {
1325 p2p_parse_free(&msg);
1326 return;
1327 }
1328
1329 os_get_time(&dev->last_seen);
1330 dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
1331
1332 if (msg.capability) {
1333 dev->dev_capab = msg.capability[0];
1334 dev->group_capab = msg.capability[1];
1335 }
1336
1337 if (msg.listen_channel) {
1338 os_memcpy(dev->country, msg.listen_channel, 3);
1339 dev->listen_freq = p2p_channel_to_freq(dev->country,
1340 msg.listen_channel[3],
1341 msg.listen_channel[4]);
1342 }
1343
1344 os_memcpy(dev->device_name, msg.device_name, sizeof(dev->device_name));
1345
1346 if (msg.wps_pri_dev_type)
1347 os_memcpy(dev->pri_dev_type, msg.wps_pri_dev_type,
1348 sizeof(dev->pri_dev_type));
1349
1350 p2p_parse_free(&msg);
1351
1352 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1353 "P2P: Created device entry based on Probe Req: " MACSTR
1354 " dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
1355 MAC2STR(dev->p2p_device_addr), dev->dev_capab,
1356 dev->group_capab, dev->device_name, dev->listen_freq);
1357}
1358
1359
1360struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
1361 const u8 *addr,
1362 struct p2p_message *msg)
1363{
1364 struct p2p_device *dev;
1365
1366 dev = p2p_get_device(p2p, addr);
1367 if (dev) {
1368 os_get_time(&dev->last_seen);
1369 return dev; /* already known */
1370 }
1371
1372 dev = p2p_create_device(p2p, addr);
1373 if (dev == NULL)
1374 return NULL;
1375
1376 p2p_add_dev_info(p2p, addr, dev, msg);
1377
1378 return dev;
1379}
1380
1381
1382static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
1383{
1384 if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
1385 return 1;
1386 if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
1387 WPA_GET_BE32(&req_dev_type[2]) == 0 &&
1388 WPA_GET_BE16(&req_dev_type[6]) == 0)
1389 return 1; /* Category match with wildcard OUI/sub-category */
1390 return 0;
1391}
1392
1393
1394int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
1395 size_t num_req_dev_type)
1396{
1397 size_t i;
1398 for (i = 0; i < num_req_dev_type; i++) {
1399 if (dev_type_match(dev_type, req_dev_type[i]))
1400 return 1;
1401 }
1402 return 0;
1403}
1404
1405
1406/**
1407 * p2p_match_dev_type - Match local device type with requested type
1408 * @p2p: P2P module context from p2p_init()
1409 * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
1410 * Returns: 1 on match, 0 on mismatch
1411 *
1412 * This function can be used to match the Requested Device Type attribute in
1413 * WPS IE with the local device types for deciding whether to reply to a Probe
1414 * Request frame.
1415 */
1416int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
1417{
1418 struct wps_parse_attr attr;
1419 size_t i;
1420
1421 if (wps_parse_msg(wps, &attr))
1422 return 1; /* assume no Requested Device Type attributes */
1423
1424 if (attr.num_req_dev_type == 0)
1425 return 1; /* no Requested Device Type attributes -> match */
1426
1427 if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
1428 attr.num_req_dev_type))
1429 return 1; /* Own Primary Device Type matches */
1430
1431 for (i = 0; i < p2p->cfg->num_sec_dev_types; i++)
1432 if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
1433 attr.req_dev_type,
1434 attr.num_req_dev_type))
1435 return 1; /* Own Secondary Device Type matches */
1436
1437 /* No matching device type found */
1438 return 0;
1439}
1440
1441
1442struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p)
1443{
1444 struct wpabuf *buf;
1445 u8 *len;
1446
1447 buf = wpabuf_alloc(1000);
1448 if (buf == NULL)
1449 return NULL;
1450
1451 /* TODO: add more info into WPS IE; maybe get from WPS module? */
1452 p2p_build_wps_ie(p2p, buf, DEV_PW_DEFAULT, 1);
1453
1454 /* P2P IE */
1455 len = p2p_buf_add_ie_hdr(buf);
1456 p2p_buf_add_capability(buf, p2p->dev_capab, 0);
1457 if (p2p->ext_listen_interval)
1458 p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
1459 p2p->ext_listen_interval);
1460 p2p_buf_add_device_info(buf, p2p, NULL);
1461 p2p_buf_update_ie_hdr(buf, len);
1462
1463 return buf;
1464}
1465
1466
1467static void p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *ie,
1468 size_t ie_len)
1469{
1470 struct ieee802_11_elems elems;
1471 struct wpabuf *buf;
1472 struct ieee80211_mgmt *resp;
1473 struct wpabuf *wps;
1474 struct wpabuf *ies;
1475
1476 if (!p2p->in_listen || !p2p->drv_in_listen) {
1477 /* not in Listen state - ignore Probe Request */
1478 return;
1479 }
1480
1481 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
1482 ParseFailed) {
1483 /* Ignore invalid Probe Request frames */
1484 return;
1485 }
1486
1487 if (elems.p2p == NULL) {
1488 /* not a P2P probe - ignore it */
1489 return;
1490 }
1491
1492 if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
1493 os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
1494 0) {
1495 /* not using P2P Wildcard SSID - ignore */
1496 return;
1497 }
1498
1499 /* Check Requested Device Type match */
1500 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA);
1501 if (wps && !p2p_match_dev_type(p2p, wps)) {
1502 wpabuf_free(wps);
1503 /* No match with Requested Device Type */
1504 return;
1505 }
1506 wpabuf_free(wps);
1507
1508 if (!p2p->cfg->send_probe_resp)
1509 return; /* Response generated elsewhere */
1510
1511 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1512 "P2P: Reply to P2P Probe Request in Listen state");
1513
1514 /*
1515 * We do not really have a specific BSS that this frame is advertising,
1516 * so build a frame that has some information in valid format. This is
1517 * really only used for discovery purposes, not to learn exact BSS
1518 * parameters.
1519 */
1520 ies = p2p_build_probe_resp_ies(p2p);
1521 if (ies == NULL)
1522 return;
1523
1524 buf = wpabuf_alloc(200 + wpabuf_len(ies));
1525 if (buf == NULL) {
1526 wpabuf_free(ies);
1527 return;
1528 }
1529
1530 resp = NULL;
1531 resp = wpabuf_put(buf, resp->u.probe_resp.variable - (u8 *) resp);
1532
1533 resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
1534 (WLAN_FC_STYPE_PROBE_RESP << 4));
1535 os_memcpy(resp->da, addr, ETH_ALEN);
1536 os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
1537 os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
1538 resp->u.probe_resp.beacon_int = host_to_le16(100);
1539 /* hardware or low-level driver will setup seq_ctrl and timestamp */
1540 resp->u.probe_resp.capab_info =
1541 host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
1542 WLAN_CAPABILITY_PRIVACY |
1543 WLAN_CAPABILITY_SHORT_SLOT_TIME);
1544
1545 wpabuf_put_u8(buf, WLAN_EID_SSID);
1546 wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
1547 wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1548
1549 wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
1550 wpabuf_put_u8(buf, 8);
1551 wpabuf_put_u8(buf, (60 / 5) | 0x80);
1552 wpabuf_put_u8(buf, 90 / 5);
1553 wpabuf_put_u8(buf, (120 / 5) | 0x80);
1554 wpabuf_put_u8(buf, 180 / 5);
1555 wpabuf_put_u8(buf, (240 / 5) | 0x80);
1556 wpabuf_put_u8(buf, 360 / 5);
1557 wpabuf_put_u8(buf, 480 / 5);
1558 wpabuf_put_u8(buf, 540 / 5);
1559
1560 wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
1561 wpabuf_put_u8(buf, 1);
1562 wpabuf_put_u8(buf, p2p->cfg->channel);
1563
1564 wpabuf_put_buf(buf, ies);
1565 wpabuf_free(ies);
1566
1567 p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf);
1568
1569 wpabuf_free(buf);
1570}
1571
1572
1573int p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *ie,
1574 size_t ie_len)
1575{
1576 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
1577
1578 p2p_reply_probe(p2p, addr, ie, ie_len);
1579
1580 if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
1581 p2p->go_neg_peer &&
1582 os_memcmp(addr, p2p->go_neg_peer->p2p_device_addr, ETH_ALEN) == 0)
1583 {
1584 /* Received a Probe Request from GO Negotiation peer */
1585 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1586 "P2P: Found GO Negotiation peer - try to start GO "
1587 "negotiation from timeout");
1588 eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
1589 return 1;
1590 }
1591
1592 if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
1593 p2p->invite_peer &&
1594 os_memcmp(addr, p2p->invite_peer->p2p_device_addr, ETH_ALEN) == 0)
1595 {
1596 /* Received a Probe Request from Invite peer */
1597 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1598 "P2P: Found Invite peer - try to start Invite from "
1599 "timeout");
1600 eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
1601 return 1;
1602 }
1603
1604 return 0;
1605}
1606
1607
1608static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
1609 u8 *buf, size_t len)
1610{
1611 struct wpabuf *tmp;
1612 u8 *lpos;
1613 size_t tmplen;
1614 int res;
1615
1616 if (!(p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
1617 return 0;
1618
1619 /*
1620 * (Re)Association Request - P2P IE
1621 * P2P Capability attribute (shall be present)
1622 * P2P Interface attribute (present if concurrent device)
1623 */
1624 tmp = wpabuf_alloc(200);
1625 if (tmp == NULL)
1626 return -1;
1627
1628 lpos = p2p_buf_add_ie_hdr(tmp);
1629 p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
1630 if (p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER)
1631 p2p_buf_add_p2p_interface(tmp, p2p);
1632 p2p_buf_update_ie_hdr(tmp, lpos);
1633
1634 tmplen = wpabuf_len(tmp);
1635 if (tmplen > len)
1636 res = -1;
1637 else {
1638 os_memcpy(buf, wpabuf_head(tmp), tmplen);
1639 res = tmplen;
1640 }
1641 wpabuf_free(tmp);
1642
1643 return res;
1644}
1645
1646
1647int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
1648 size_t len, int p2p_group)
1649{
1650 struct wpabuf *tmp;
1651 u8 *lpos;
1652 struct p2p_device *peer;
1653 size_t tmplen;
1654 int res;
1655
1656 if (!p2p_group)
1657 return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len);
1658
1659 /*
1660 * (Re)Association Request - P2P IE
1661 * P2P Capability attribute (shall be present)
1662 * Extended Listen Timing (may be present)
1663 * P2P Device Info attribute (shall be present)
1664 */
1665 tmp = wpabuf_alloc(200);
1666 if (tmp == NULL)
1667 return -1;
1668
1669 peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
1670
1671 lpos = p2p_buf_add_ie_hdr(tmp);
1672 p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
1673 p2p_buf_add_device_info(tmp, p2p, peer);
1674 p2p_buf_update_ie_hdr(tmp, lpos);
1675
1676 tmplen = wpabuf_len(tmp);
1677 if (tmplen > len)
1678 res = -1;
1679 else {
1680 os_memcpy(buf, wpabuf_head(tmp), tmplen);
1681 res = tmplen;
1682 }
1683 wpabuf_free(tmp);
1684
1685 return res;
1686}
1687
1688
1689int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
1690{
1691 struct wpabuf *p2p_ie;
1692 int ret;
1693
1694 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
1695 if (p2p_ie == NULL)
1696 return 0;
1697
1698 ret = p2p_attr_text(p2p_ie, buf, end);
1699 wpabuf_free(p2p_ie);
1700 return ret;
1701}
1702
1703
1704static void p2p_clear_go_neg(struct p2p_data *p2p)
1705{
1706 p2p->go_neg_peer = NULL;
1707 p2p_clear_timeout(p2p);
1708 p2p_set_state(p2p, P2P_IDLE);
1709}
1710
1711
1712void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
1713{
1714 if (p2p->go_neg_peer == NULL) {
1715 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1716 "P2P: No pending Group Formation - "
1717 "ignore WPS registration success notification");
1718 return; /* No pending Group Formation */
1719 }
1720
1721 if (os_memcmp(mac_addr, p2p->go_neg_peer->intended_addr, ETH_ALEN) !=
1722 0) {
1723 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1724 "P2P: Ignore WPS registration success notification "
1725 "for " MACSTR " (GO Negotiation peer " MACSTR ")",
1726 MAC2STR(mac_addr),
1727 MAC2STR(p2p->go_neg_peer->intended_addr));
1728 return; /* Ignore unexpected peer address */
1729 }
1730
1731 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1732 "P2P: Group Formation completed successfully with " MACSTR,
1733 MAC2STR(mac_addr));
1734
1735 p2p_clear_go_neg(p2p);
1736}
1737
1738
1739void p2p_group_formation_failed(struct p2p_data *p2p)
1740{
1741 if (p2p->go_neg_peer == NULL) {
1742 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1743 "P2P: No pending Group Formation - "
1744 "ignore group formation failure notification");
1745 return; /* No pending Group Formation */
1746 }
1747
1748 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1749 "P2P: Group Formation failed with " MACSTR,
1750 MAC2STR(p2p->go_neg_peer->intended_addr));
1751
1752 p2p_clear_go_neg(p2p);
1753}
1754
1755
1756struct p2p_data * p2p_init(const struct p2p_config *cfg)
1757{
1758 struct p2p_data *p2p;
1759
1760 if (cfg->max_peers < 1)
1761 return NULL;
1762
1763 p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
1764 if (p2p == NULL)
1765 return NULL;
1766 p2p->cfg = (struct p2p_config *) (p2p + 1);
1767 os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
1768 if (cfg->dev_name)
1769 p2p->cfg->dev_name = os_strdup(cfg->dev_name);
1770
1771 p2p->min_disc_int = 1;
1772 p2p->max_disc_int = 3;
1773
1774 os_get_random(&p2p->next_tie_breaker, 1);
1775 p2p->next_tie_breaker &= 0x01;
1776 if (cfg->sd_request)
1777 p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
1778 p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
1779 if (cfg->concurrent_operations)
1780 p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
1781 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
1782
1783 dl_list_init(&p2p->devices);
1784
1785 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
1786 p2p_expiration_timeout, p2p, NULL);
1787
1788 return p2p;
1789}
1790
1791
1792void p2p_deinit(struct p2p_data *p2p)
1793{
1794 eloop_cancel_timeout(p2p_expiration_timeout, p2p, NULL);
1795 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
1796 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1797 p2p_flush(p2p);
1798 os_free(p2p->cfg->dev_name);
1799 os_free(p2p->groups);
18708aad 1800 wpabuf_free(p2p->sd_resp);
b22128ef
JM
1801 os_free(p2p);
1802}
1803
1804
1805void p2p_flush(struct p2p_data *p2p)
1806{
1807 struct p2p_device *dev, *prev;
1808 p2p_clear_timeout(p2p);
1809 p2p_set_state(p2p, P2P_IDLE);
1810 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1811 p2p->go_neg_peer = NULL;
1812 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1813 dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
1814 list) {
1815 dl_list_del(&dev->list);
1816 p2p_device_free(p2p, dev);
1817 }
1818 p2p_free_sd_queries(p2p);
1819}
1820
1821
1822int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
1823{
1824 os_free(p2p->cfg->dev_name);
1825 if (dev_name) {
1826 p2p->cfg->dev_name = os_strdup(dev_name);
1827 if (p2p->cfg->dev_name == NULL)
1828 return -1;
1829 } else
1830 p2p->cfg->dev_name = NULL;
1831 return 0;
1832}
1833
1834
1835int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
1836{
1837 os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
1838 return 0;
1839}
1840
1841
1842int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
1843 size_t num_dev_types)
1844{
1845 if (num_dev_types > P2P_SEC_DEVICE_TYPES)
1846 num_dev_types = P2P_SEC_DEVICE_TYPES;
1847 p2p->cfg->num_sec_dev_types = num_dev_types;
1848 os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
1849 return 0;
1850}
1851
1852
1853int p2p_set_country(struct p2p_data *p2p, const char *country)
1854{
1855 os_memcpy(p2p->cfg->country, country, 3);
1856 return 0;
1857}
1858
1859
1860void p2p_continue_find(struct p2p_data *p2p)
1861{
1862 struct p2p_device *dev;
1863 p2p_set_state(p2p, P2P_SEARCH);
1864 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
1865 if (dev->flags & P2P_DEV_SD_SCHEDULE) {
1866 if (p2p_start_sd(p2p, dev) == 0)
1867 return;
1868 else
1869 break;
1870 } else if (dev->req_config_methods) {
1871 if (p2p_send_prov_disc_req(p2p, dev, 0) == 0)
1872 return;
1873 }
1874 }
1875
1876 p2p_listen_in_find(p2p);
1877}
1878
1879
1880static void p2p_sd_cb(struct p2p_data *p2p, int success)
1881{
1882 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1883 "P2P: Service Discovery Query TX callback: success=%d",
1884 success);
1885 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
1886
1887 if (!success) {
1888 if (p2p->sd_peer) {
1889 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
1890 p2p->sd_peer = NULL;
1891 }
1892 p2p_continue_find(p2p);
1893 return;
1894 }
1895
1896 if (p2p->sd_peer == NULL) {
1897 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1898 "P2P: No SD peer entry known");
1899 p2p_continue_find(p2p);
1900 return;
1901 }
1902
1903 /* Wait for response from the peer */
1904 p2p_set_state(p2p, P2P_SD_DURING_FIND);
1905 p2p_set_timeout(p2p, 0, 200000);
1906}
1907
1908
1909static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
1910{
1911 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1912 "P2P: Provision Discovery Request TX callback: success=%d",
1913 success);
1914 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
1915
1916 if (!success) {
1917 if (p2p->state != P2P_IDLE)
1918 p2p_continue_find(p2p);
1919 return;
1920 }
1921
1922 /* Wait for response from the peer */
1923 if (p2p->state == P2P_SEARCH)
1924 p2p_set_state(p2p, P2P_PD_DURING_FIND);
1925 p2p_set_timeout(p2p, 0, 200000);
1926}
1927
1928
1929int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
1930 int level, const u8 *ies, size_t ies_len)
1931{
1932 p2p_add_device(p2p, bssid, freq, level, ies, ies_len);
1933
1934 if (p2p->go_neg_peer && p2p->state == P2P_SEARCH &&
1935 os_memcmp(p2p->go_neg_peer->p2p_device_addr, bssid, ETH_ALEN) == 0)
1936 {
1937 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1938 "P2P: Found GO Negotiation peer - try to start GO "
1939 "negotiation");
1940 p2p_connect_send(p2p, p2p->go_neg_peer);
1941 return 1;
1942 }
1943
1944 return 0;
1945}
1946
1947
1948void p2p_scan_res_handled(struct p2p_data *p2p)
1949{
1950 if (!p2p->p2p_scan_running) {
1951 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan was not "
1952 "running, but scan results received");
1953 }
1954 p2p->p2p_scan_running = 0;
1955 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1956
1957 if (p2p_run_after_scan(p2p))
1958 return;
1959 if (p2p->state == P2P_SEARCH)
1960 p2p_continue_find(p2p);
1961}
1962
1963
1964void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies)
1965{
1966 u8 *len = p2p_buf_add_ie_hdr(ies);
1967 p2p_buf_add_capability(ies, p2p->dev_capab, 0);
1968 if (p2p->cfg->reg_class && p2p->cfg->channel)
1969 p2p_buf_add_listen_channel(ies, p2p->cfg->country,
1970 p2p->cfg->reg_class,
1971 p2p->cfg->channel);
1972 if (p2p->ext_listen_interval)
1973 p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
1974 p2p->ext_listen_interval);
1975 /* TODO: p2p_buf_add_operating_channel() if GO */
1976 p2p_buf_update_ie_hdr(ies, len);
1977}
1978
1979
1980int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
1981{
1982 return p2p_attr_text(p2p_ie, buf, end);
1983}
1984
1985
1986static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
1987{
1988 struct p2p_device *dev = p2p->go_neg_peer;
1989
1990 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1991 "P2P: GO Negotiation Request TX callback: success=%d",
1992 success);
1993
1994 if (dev == NULL) {
1995 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1996 "P2P: No pending GO Negotiation");
1997 return;
1998 }
1999
2000 if (success) {
2001 dev->go_neg_req_sent++;
2002 if (dev->flags & P2P_DEV_USER_REJECTED) {
2003 p2p_set_state(p2p, P2P_IDLE);
2004 return;
2005 }
2006 }
2007
2008 if (!success &&
2009 (dev->dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
2010 !is_zero_ether_addr(dev->member_in_go_dev)) {
2011 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2012 "P2P: Peer " MACSTR " did not acknowledge request - "
2013 "try to use device discoverability through its GO",
2014 MAC2STR(dev->p2p_device_addr));
2015 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2016 p2p_send_dev_disc_req(p2p, dev);
2017 return;
2018 }
2019
2020 /*
2021 * Use P2P find, if needed, to find the other device from its listen
2022 * channel.
2023 */
2024 p2p_set_state(p2p, P2P_CONNECT);
2025 p2p_set_timeout(p2p, 0, 100000);
2026}
2027
2028
2029static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
2030{
2031 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2032 "P2P: GO Negotiation Response TX callback: success=%d",
2033 success);
2034 if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
2035 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2036 "P2P: Ignore TX callback event - GO Negotiation is "
2037 "not running anymore");
2038 return;
2039 }
2040 p2p_set_state(p2p, P2P_CONNECT);
2041 p2p_set_timeout(p2p, 0, 100000);
2042}
2043
2044
2045static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success)
2046{
2047 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2048 "P2P: GO Negotiation Response (failure) TX callback: "
2049 "success=%d", success);
2050}
2051
2052
2053static void p2p_go_neg_conf_cb(struct p2p_data *p2p, int success)
2054{
2055 struct p2p_device *dev;
2056
2057 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2058 "P2P: GO Negotiation Confirm TX callback: success=%d",
2059 success);
2060 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2061 if (!success) {
2062 /*
2063 * It looks like the TX status for GO Negotiation Confirm is
2064 * often showing failure even when the peer has actually
2065 * received the frame. Since the peer may change channels
2066 * immediately after having received the frame, we may not see
2067 * an Ack for retries, so just dropping a single frame may
2068 * trigger this. To allow the group formation to succeed if the
2069 * peer did indeed receive the frame, continue regardless of
2070 * the TX status.
2071 */
2072 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2073 "P2P: Assume GO Negotiation Confirm TX was actually "
2074 "received by the peer even though Ack was not "
2075 "reported");
2076 }
2077
2078 dev = p2p->go_neg_peer;
2079 if (dev == NULL)
2080 return;
2081
2082 p2p_go_complete(p2p, dev);
2083}
2084
2085
2086void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
2087 const u8 *src, const u8 *bssid, int success)
2088{
2089 enum p2p_pending_action_state state;
2090
2091 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2092 "P2P: Action frame TX callback (state=%d freq=%u dst=" MACSTR
2093 " src=" MACSTR " bssid=" MACSTR " success=%d",
2094 p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
2095 MAC2STR(bssid), success);
2096 state = p2p->pending_action_state;
2097 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2098 switch (state) {
2099 case P2P_NO_PENDING_ACTION:
2100 break;
2101 case P2P_PENDING_GO_NEG_REQUEST:
2102 p2p_go_neg_req_cb(p2p, success);
2103 break;
2104 case P2P_PENDING_GO_NEG_RESPONSE:
2105 p2p_go_neg_resp_cb(p2p, success);
2106 break;
2107 case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
2108 p2p_go_neg_resp_failure_cb(p2p, success);
2109 break;
2110 case P2P_PENDING_GO_NEG_CONFIRM:
2111 p2p_go_neg_conf_cb(p2p, success);
2112 break;
2113 case P2P_PENDING_SD:
2114 p2p_sd_cb(p2p, success);
2115 break;
2116 case P2P_PENDING_PD:
2117 p2p_prov_disc_cb(p2p, success);
2118 break;
2119 case P2P_PENDING_INVITATION_REQUEST:
2120 p2p_invitation_req_cb(p2p, success);
2121 break;
2122 case P2P_PENDING_INVITATION_RESPONSE:
2123 p2p_invitation_resp_cb(p2p, success);
2124 break;
2125 case P2P_PENDING_DEV_DISC_REQUEST:
2126 p2p_dev_disc_req_cb(p2p, success);
2127 break;
2128 case P2P_PENDING_DEV_DISC_RESPONSE:
2129 p2p_dev_disc_resp_cb(p2p, success);
2130 break;
2131 case P2P_PENDING_GO_DISC_REQ:
2132 p2p_go_disc_req_cb(p2p, success);
2133 break;
2134 }
2135}
2136
2137
2138void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
2139 unsigned int duration)
2140{
2141 if (freq == p2p->pending_client_disc_freq) {
2142 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2143 "P2P: Client discoverability remain-awake completed");
2144 p2p->pending_client_disc_freq = 0;
2145 return;
2146 }
2147
2148 if (freq != p2p->pending_listen_freq) {
2149 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2150 "P2P: Unexpected listen callback for freq=%u "
2151 "duration=%u (pending_listen_freq=%u)",
2152 freq, duration, p2p->pending_listen_freq);
2153 return;
2154 }
2155
2156 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2157 "P2P: Starting Listen timeout(%u,%u) on freq=%u based on "
2158 "callback",
2159 p2p->pending_listen_sec, p2p->pending_listen_usec,
2160 p2p->pending_listen_freq);
2161 p2p->in_listen = 1;
2162 p2p->drv_in_listen = 1;
2163 if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
2164 /*
2165 * Add 20 msec extra wait to avoid race condition with driver
2166 * remain-on-channel end event, i.e., give driver more time to
2167 * complete the operation before our timeout expires.
2168 */
2169 p2p_set_timeout(p2p, p2p->pending_listen_sec,
2170 p2p->pending_listen_usec + 20000);
2171 }
2172
2173 p2p->pending_listen_freq = 0;
2174}
2175
2176
2177int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
2178{
2179 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver ended Listen "
2180 "state (freq=%u)", freq);
2181 p2p->drv_in_listen = 0;
2182 if (p2p->in_listen)
2183 return 0; /* Internal timeout will trigger the next step */
2184
2185 if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
2186 p2p_set_state(p2p, P2P_CONNECT);
2187 p2p_connect_send(p2p, p2p->go_neg_peer);
2188 return 1;
2189 } else if (p2p->state == P2P_SEARCH) {
2190 p2p_search(p2p);
2191 return 1;
2192 }
2193
2194 return 0;
2195}
2196
2197
2198static void p2p_timeout_connect(struct p2p_data *p2p)
2199{
2200 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2201 p2p_set_state(p2p, P2P_CONNECT_LISTEN);
2202 p2p_listen_in_find(p2p);
2203}
2204
2205
2206static void p2p_timeout_connect_listen(struct p2p_data *p2p)
2207{
2208 if (p2p->go_neg_peer) {
2209 if (p2p->drv_in_listen) {
2210 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is "
2211 "still in Listen state; wait for it to "
2212 "complete");
2213 return;
2214 }
2215 p2p_set_state(p2p, P2P_CONNECT);
2216 p2p_connect_send(p2p, p2p->go_neg_peer);
2217 } else
2218 p2p_set_state(p2p, P2P_IDLE);
2219}
2220
2221
2222static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
2223{
2224 /*
2225 * TODO: could remain constantly in Listen state for some time if there
2226 * are no other concurrent uses for the radio. For now, go to listen
2227 * state once per second to give other uses a chance to use the radio.
2228 */
2229 p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
2230 p2p_set_timeout(p2p, 1, 0);
2231}
2232
2233
2234static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
2235{
2236 struct p2p_device *dev = p2p->go_neg_peer;
2237
2238 if (dev == NULL) {
2239 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2240 "P2P: Unknown GO Neg peer - stop GO Neg wait");
2241 return;
2242 }
2243
2244 dev->wait_count++;
2245 if (dev->wait_count >= 120) {
2246 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2247 "P2P: Timeout on waiting peer to become ready for GO "
2248 "Negotiation");
2249 p2p_go_neg_failed(p2p, dev, -1);
2250 return;
2251 }
2252
2253 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2254 "P2P: Go to Listen state while waiting for the peer to become "
2255 "ready for GO Negotiation");
2256 p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
2257 p2p_listen_in_find(p2p);
2258}
2259
2260
2261static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
2262{
2263 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2264 "P2P: Service Discovery Query timeout");
2265 if (p2p->sd_peer) {
2266 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2267 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2268 p2p->sd_peer = NULL;
2269 }
2270 p2p_continue_find(p2p);
2271}
2272
2273
2274static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
2275{
2276 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2277 "P2P: Provision Discovery Request timeout");
2278 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2279 p2p_continue_find(p2p);
2280}
2281
2282
2283static void p2p_timeout_invite(struct p2p_data *p2p)
2284{
2285 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2286 p2p_set_state(p2p, P2P_INVITE_LISTEN);
04d8dad5
JM
2287 if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
2288 /*
2289 * Better remain on operating channel instead of listen channel
2290 * when running a group.
2291 */
2292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Inviting in "
2293 "active GO role - wait on operating channel");
2294 p2p_set_timeout(p2p, 0, 100000);
2295 return;
2296 }
b22128ef
JM
2297 p2p_listen_in_find(p2p);
2298}
2299
2300
2301static void p2p_timeout_invite_listen(struct p2p_data *p2p)
2302{
2303 if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
2304 p2p_set_state(p2p, P2P_INVITE);
2305 p2p_invite_send(p2p, p2p->invite_peer,
2306 p2p->invite_go_dev_addr);
2307 } else {
2308 if (p2p->invite_peer) {
2309 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2310 "P2P: Invitation Request retry limit reached");
2311 if (p2p->cfg->invitation_result)
2312 p2p->cfg->invitation_result(
2313 p2p->cfg->cb_ctx, -1, NULL);
2314 }
2315 p2p_set_state(p2p, P2P_IDLE);
2316 }
2317}
2318
2319
2320static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
2321{
2322 struct p2p_data *p2p = eloop_ctx;
2323
2324 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Timeout (state=%s)",
2325 p2p_state_txt(p2p->state));
2326
2327 p2p->in_listen = 0;
2328
2329 switch (p2p->state) {
2330 case P2P_IDLE:
2331 break;
2332 case P2P_SEARCH:
2333 p2p_search(p2p);
2334 break;
2335 case P2P_CONNECT:
2336 p2p_timeout_connect(p2p);
2337 break;
2338 case P2P_CONNECT_LISTEN:
2339 p2p_timeout_connect_listen(p2p);
2340 break;
2341 case P2P_GO_NEG:
2342 break;
2343 case P2P_LISTEN_ONLY:
2344 if (p2p->ext_listen_only) {
2345 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2346 "P2P: Extended Listen Timing - Listen State "
2347 "completed");
2348 p2p->ext_listen_only = 0;
2349 p2p_set_state(p2p, P2P_IDLE);
2350 }
2351 break;
2352 case P2P_WAIT_PEER_CONNECT:
2353 p2p_timeout_wait_peer_connect(p2p);
2354 break;
2355 case P2P_WAIT_PEER_IDLE:
2356 p2p_timeout_wait_peer_idle(p2p);
2357 break;
2358 case P2P_SD_DURING_FIND:
2359 p2p_timeout_sd_during_find(p2p);
2360 break;
2361 case P2P_PROVISIONING:
2362 break;
2363 case P2P_PD_DURING_FIND:
2364 p2p_timeout_prov_disc_during_find(p2p);
2365 break;
2366 case P2P_INVITE:
2367 p2p_timeout_invite(p2p);
2368 break;
2369 case P2P_INVITE_LISTEN:
2370 p2p_timeout_invite_listen(p2p);
2371 break;
2372 }
2373}
2374
2375
2376int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
2377{
2378 struct p2p_device *dev;
2379
2380 dev = p2p_get_device(p2p, peer_addr);
2381 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Local request to reject "
2382 "connection attempts by peer " MACSTR, MAC2STR(peer_addr));
2383 if (dev == NULL) {
2384 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
2385 " unknown", MAC2STR(peer_addr));
2386 return -1;
2387 }
2388 dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
2389 dev->flags |= P2P_DEV_USER_REJECTED;
2390 return 0;
2391}
2392
2393
2394static const char * p2p_wps_method_text(enum p2p_wps_method method)
2395{
2396 switch (method) {
2397 case WPS_NOT_READY:
2398 return "not-ready";
2399 case WPS_PIN_LABEL:
2400 return "Label";
2401 case WPS_PIN_DISPLAY:
2402 return "Display";
2403 case WPS_PIN_KEYPAD:
2404 return "Keypad";
2405 case WPS_PBC:
2406 return "PBC";
2407 }
2408
2409 return "??";
2410}
2411
2412
2413static const char * p2p_go_state_text(enum p2p_go_state go_state)
2414{
2415 switch (go_state) {
2416 case UNKNOWN_GO:
2417 return "unknown";
2418 case LOCAL_GO:
2419 return "local";
2420 case REMOTE_GO:
2421 return "remote";
2422 }
2423
2424 return "??";
2425}
2426
2427
2428int p2p_get_peer_info(struct p2p_data *p2p, const u8 *addr, int next,
2429 char *buf, size_t buflen)
2430{
2431 struct p2p_device *dev;
2432 int res;
2433 char *pos, *end;
2434 struct os_time now;
2435 char devtype[WPS_DEV_TYPE_BUFSIZE];
2436
2437 if (addr)
2438 dev = p2p_get_device(p2p, addr);
2439 else
2440 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
2441
2442 if (dev && next) {
2443 dev = dl_list_first(&dev->list, struct p2p_device, list);
2444 if (&dev->list == &p2p->devices)
2445 dev = NULL;
2446 }
2447
2448 if (dev == NULL)
2449 return -1;
2450
2451 pos = buf;
2452 end = buf + buflen;
2453
2454 res = os_snprintf(pos, end - pos, MACSTR "\n",
2455 MAC2STR(dev->p2p_device_addr));
2456 if (res < 0 || res >= end - pos)
2457 return pos - buf;
2458 pos += res;
2459
2460 os_get_time(&now);
2461 res = os_snprintf(pos, end - pos,
2462 "age=%d\n"
2463 "listen_freq=%d\n"
2464 "level=%d\n"
2465 "wps_method=%s\n"
2466 "interface_addr=" MACSTR "\n"
2467 "member_in_go_dev=" MACSTR "\n"
2468 "member_in_go_iface=" MACSTR "\n"
2469 "pri_dev_type=%s\n"
2470 "device_name=%s\n"
2471 "config_methods=0x%x\n"
2472 "dev_capab=0x%x\n"
2473 "group_capab=0x%x\n"
2474 "go_neg_req_sent=%d\n"
2475 "go_state=%s\n"
2476 "dialog_token=%u\n"
2477 "intended_addr=" MACSTR "\n"
2478 "country=%c%c\n"
2479 "oper_freq=%d\n"
2480 "req_config_methods=0x%x\n"
d5b20a73 2481 "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
b22128ef
JM
2482 "status=%d\n"
2483 "wait_count=%u\n"
2484 "invitation_reqs=%u\n",
2485 (int) (now.sec - dev->last_seen.sec),
2486 dev->listen_freq,
2487 dev->level,
2488 p2p_wps_method_text(dev->wps_method),
2489 MAC2STR(dev->interface_addr),
2490 MAC2STR(dev->member_in_go_dev),
2491 MAC2STR(dev->member_in_go_iface),
2492 wps_dev_type_bin2str(dev->pri_dev_type,
2493 devtype, sizeof(devtype)),
2494 dev->device_name,
2495 dev->config_methods,
2496 dev->dev_capab,
2497 dev->group_capab,
2498 dev->go_neg_req_sent,
2499 p2p_go_state_text(dev->go_state),
2500 dev->dialog_token,
2501 MAC2STR(dev->intended_addr),
2502 dev->country[0] ? dev->country[0] : '_',
2503 dev->country[1] ? dev->country[1] : '_',
2504 dev->oper_freq,
2505 dev->req_config_methods,
2506 dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
2507 "[PROBE_REQ_ONLY]" : "",
2508 dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
2509 dev->flags & P2P_DEV_NOT_YET_READY ?
2510 "[NOT_YET_READY]" : "",
2511 dev->flags & P2P_DEV_SD_INFO ? "[SD_INFO]" : "",
2512 dev->flags & P2P_DEV_SD_SCHEDULE ? "[SD_SCHEDULE]" :
2513 "",
2514 dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
2515 "[PD_PEER_DISPLAY]" : "",
2516 dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
2517 "[PD_PEER_KEYPAD]" : "",
2518 dev->flags & P2P_DEV_USER_REJECTED ?
2519 "[USER_REJECTED]" : "",
2520 dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
2521 "[PEER_WAITING_RESPONSE]" : "",
2522 dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
2523 "[PREFER_PERSISTENT_GROUP]" : "",
2524 dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
2525 "[WAIT_GO_NEG_RESPONSE]" : "",
2526 dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
2527 "[WAIT_GO_NEG_CONFIRM]" : "",
2528 dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
2529 "[GROUP_CLIENT_ONLY]" : "",
d5b20a73
JM
2530 dev->flags & P2P_DEV_FORCE_FREQ ?
2531 "[FORCE_FREQ" : "",
b22128ef
JM
2532 dev->status,
2533 dev->wait_count,
2534 dev->invitation_reqs);
2535 if (res < 0 || res >= end - pos)
2536 return pos - buf;
2537 pos += res;
2538
2539 if (dev->ext_listen_period) {
2540 res = os_snprintf(pos, end - pos,
2541 "ext_listen_period=%u\n"
2542 "ext_listen_interval=%u\n",
2543 dev->ext_listen_period,
2544 dev->ext_listen_interval);
2545 if (res < 0 || res >= end - pos)
2546 return pos - buf;
2547 pos += res;
2548 }
2549
2550 if (dev->oper_ssid_len) {
2551 res = os_snprintf(pos, end - pos,
2552 "oper_ssid=%s\n",
2553 wpa_ssid_txt(dev->oper_ssid,
2554 dev->oper_ssid_len));
2555 if (res < 0 || res >= end - pos)
2556 return pos - buf;
2557 pos += res;
2558 }
2559
2560 return pos - buf;
2561}
2562
2563
2564void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
2565{
2566 if (enabled) {
2567 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
2568 "discoverability enabled");
2569 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
2570 } else {
2571 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
2572 "discoverability disabled");
2573 p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
2574 }
2575}
2576
2577
2578static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
2579 u32 duration2, u32 interval2)
2580{
2581 struct wpabuf *req;
2582 struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
2583 u8 *len;
2584
2585 req = wpabuf_alloc(100);
2586 if (req == NULL)
2587 return NULL;
2588
2589 if (duration1 || interval1) {
2590 os_memset(&desc1, 0, sizeof(desc1));
2591 desc1.count_type = 1;
2592 desc1.duration = duration1;
2593 desc1.interval = interval1;
2594 ptr1 = &desc1;
2595
2596 if (duration2 || interval2) {
2597 os_memset(&desc2, 0, sizeof(desc2));
2598 desc2.count_type = 2;
2599 desc2.duration = duration2;
2600 desc2.interval = interval2;
2601 ptr2 = &desc2;
2602 }
2603 }
2604
2605 p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
2606 len = p2p_buf_add_ie_hdr(req);
2607 p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
2608 p2p_buf_update_ie_hdr(req, len);
2609
2610 return req;
2611}
2612
2613
2614int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
2615 const u8 *own_interface_addr, unsigned int freq,
2616 u32 duration1, u32 interval1, u32 duration2,
2617 u32 interval2)
2618{
2619 struct wpabuf *req;
2620
2621 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send Presence Request to "
2622 "GO " MACSTR " (own interface " MACSTR ") freq=%u dur1=%u "
2623 "int1=%u dur2=%u int2=%u",
2624 MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
2625 freq, duration1, interval1, duration2, interval2);
2626
2627 req = p2p_build_presence_req(duration1, interval1, duration2,
2628 interval2);
2629 if (req == NULL)
2630 return -1;
2631
2632 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2633 if (p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, go_interface_addr,
2634 own_interface_addr,
2635 go_interface_addr,
2636 wpabuf_head(req), wpabuf_len(req), 200) < 0)
2637 {
2638 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2639 "P2P: Failed to send Action frame");
2640 }
2641 wpabuf_free(req);
2642
2643 return 0;
2644}
2645
2646
2647static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
2648 size_t noa_len, u8 dialog_token)
2649{
2650 struct wpabuf *resp;
2651 u8 *len;
2652
2653 resp = wpabuf_alloc(100 + noa_len);
2654 if (resp == NULL)
2655 return NULL;
2656
2657 p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
2658 len = p2p_buf_add_ie_hdr(resp);
2659 p2p_buf_add_status(resp, status);
2660 if (noa) {
2661 wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
2662 wpabuf_put_le16(resp, noa_len);
2663 wpabuf_put_data(resp, noa, noa_len);
2664 } else
2665 p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
2666 p2p_buf_update_ie_hdr(resp, len);
2667
2668 return resp;
2669}
2670
2671
2672static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
2673 const u8 *sa, const u8 *data, size_t len,
2674 int rx_freq)
2675{
2676 struct p2p_message msg;
2677 u8 status;
2678 struct wpabuf *resp;
2679 size_t g;
2680 struct p2p_group *group = NULL;
2681 int parsed = 0;
2682 u8 noa[50];
2683 int noa_len;
2684
2685 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2686 "P2P: Received P2P Action - P2P Presence Request");
2687
2688 for (g = 0; g < p2p->num_groups; g++) {
2689 if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]),
2690 ETH_ALEN) == 0) {
2691 group = p2p->groups[g];
2692 break;
2693 }
2694 }
2695 if (group == NULL) {
2696 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2697 "P2P: Ignore P2P Presence Request for unknown group "
2698 MACSTR, MAC2STR(da));
2699 return;
2700 }
2701
2702 if (p2p_parse(data, len, &msg) < 0) {
2703 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2704 "P2P: Failed to parse P2P Presence Request");
2705 status = P2P_SC_FAIL_INVALID_PARAMS;
2706 goto fail;
2707 }
2708 parsed = 1;
2709
2710 if (msg.noa == NULL) {
2711 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2712 "P2P: No NoA attribute in P2P Presence Request");
2713 status = P2P_SC_FAIL_INVALID_PARAMS;
2714 goto fail;
2715 }
2716
2717 status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
2718
2719fail:
2720 if (p2p->cfg->get_noa)
2721 noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
2722 sizeof(noa));
2723 else
2724 noa_len = -1;
2725 resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
2726 noa_len > 0 ? noa_len : 0,
2727 msg.dialog_token);
2728 if (parsed)
2729 p2p_parse_free(&msg);
2730 if (resp == NULL)
2731 return;
2732
2733 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2734 if (p2p->cfg->send_action(p2p->cfg->cb_ctx, rx_freq, sa, da, da,
2735 wpabuf_head(resp), wpabuf_len(resp), 200) <
2736 0) {
2737 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2738 "P2P: Failed to send Action frame");
2739 }
2740 wpabuf_free(resp);
2741}
2742
2743
2744static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
2745 const u8 *sa, const u8 *data, size_t len)
2746{
2747 struct p2p_message msg;
2748
2749 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2750 "P2P: Received P2P Action - P2P Presence Response");
2751
2752 if (p2p_parse(data, len, &msg) < 0) {
2753 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2754 "P2P: Failed to parse P2P Presence Response");
2755 return;
2756 }
2757
2758 if (msg.status == NULL || msg.noa == NULL) {
2759 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2760 "P2P: No Status or NoA attribute in P2P Presence "
2761 "Response");
2762 p2p_parse_free(&msg);
2763 return;
2764 }
2765
2766 if (*msg.status) {
2767 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2768 "P2P: P2P Presence Request was rejected: status %u",
2769 *msg.status);
2770 p2p_parse_free(&msg);
2771 return;
2772 }
2773
2774 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2775 "P2P: P2P Presence Request was accepted");
2776 wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
2777 msg.noa, msg.noa_len);
2778 /* TODO: process NoA */
2779 p2p_parse_free(&msg);
2780}
2781
2782
2783static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
2784{
2785 struct p2p_data *p2p = eloop_ctx;
2786
2787 if (p2p->ext_listen_interval) {
2788 /* Schedule next extended listen timeout */
2789 eloop_register_timeout(p2p->ext_listen_interval_sec,
2790 p2p->ext_listen_interval_usec,
2791 p2p_ext_listen_timeout, p2p, NULL);
2792 }
2793
2794 if (p2p->state != P2P_IDLE) {
2795 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip Extended "
2796 "Listen timeout in active state (%s)",
2797 p2p_state_txt(p2p->state));
2798 return;
2799 }
2800
2801 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Extended Listen timeout");
2802 p2p->ext_listen_only = 1;
2803 if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
2804 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
2805 "Listen state for Extended Listen Timing");
2806 p2p->ext_listen_only = 0;
2807 }
2808}
2809
2810
2811int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
2812 unsigned int interval)
2813{
2814 if (period > 65535 || interval > 65535 || period > interval ||
2815 (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
2816 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2817 "P2P: Invalid Extended Listen Timing request: "
2818 "period=%u interval=%u", period, interval);
2819 return -1;
2820 }
2821
2822 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
2823
2824 if (interval == 0) {
2825 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2826 "P2P: Disabling Extended Listen Timing");
2827 p2p->ext_listen_period = 0;
2828 p2p->ext_listen_interval = 0;
2829 return 0;
2830 }
2831
2832 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2833 "P2P: Enabling Extended Listen Timing: period %u msec, "
2834 "interval %u msec", period, interval);
2835 p2p->ext_listen_period = period;
2836 p2p->ext_listen_interval = interval;
2837 p2p->ext_listen_interval_sec = interval / 1000;
2838 p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
2839
2840 eloop_register_timeout(p2p->ext_listen_interval_sec,
2841 p2p->ext_listen_interval_usec,
2842 p2p_ext_listen_timeout, p2p, NULL);
2843
2844 return 0;
2845}
2846
2847
2848void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
2849 const u8 *ie, size_t ie_len)
2850{
2851 struct p2p_message msg;
2852
2853 if (bssid == NULL || ie == NULL)
2854 return;
2855
2856 os_memset(&msg, 0, sizeof(msg));
2857 if (p2p_parse_ies(ie, ie_len, &msg))
2858 return;
2859 if (msg.minor_reason_code == NULL)
2860 return;
2861
2862 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
2863 "P2P: Deauthentication notification BSSID " MACSTR
2864 " reason_code=%u minor_reason_code=%u",
2865 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
2866
2867 p2p_parse_free(&msg);
2868}
2869
2870
2871void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
2872 const u8 *ie, size_t ie_len)
2873{
2874 struct p2p_message msg;
2875
2876 if (bssid == NULL || ie == NULL)
2877 return;
2878
2879 os_memset(&msg, 0, sizeof(msg));
2880 if (p2p_parse_ies(ie, ie_len, &msg))
2881 return;
2882 if (msg.minor_reason_code == NULL)
2883 return;
2884
2885 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
2886 "P2P: Disassociation notification BSSID " MACSTR
2887 " reason_code=%u minor_reason_code=%u",
2888 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
2889
2890 p2p_parse_free(&msg);
2891}
2892
2893
2894void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
2895{
2896 if (enabled) {
2897 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
2898 "Device operations enabled");
2899 p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
2900 } else {
2901 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
2902 "Device operations disabled");
2903 p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
2904 }
2905}
2906
2907
2908int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel)
2909{
2910 if (p2p_channel_to_freq(p2p->cfg->country, reg_class, channel) < 0)
2911 return -1;
2912
2913 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Set Listen channel: "
2914 "reg_class %u channel %u", reg_class, channel);
2915 p2p->cfg->reg_class = reg_class;
2916 p2p->cfg->channel = channel;
2917
2918 return 0;
2919}
2920
2921
2922int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
2923{
2924 wpa_hexdump_ascii(MSG_DEBUG, "P2P: New SSID postfix", postfix, len);
2925 if (postfix == NULL) {
2926 p2p->cfg->ssid_postfix_len = 0;
2927 return 0;
2928 }
2929 if (len > sizeof(p2p->cfg->ssid_postfix))
2930 return -1;
2931 os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
2932 p2p->cfg->ssid_postfix_len = len;
2933 return 0;
2934}
2935
2936
2937int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
2938 u8 *iface_addr)
2939{
2940 struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
2941 if (dev == NULL || is_zero_ether_addr(dev->interface_addr))
2942 return -1;
2943 os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
2944 return 0;
2945}
80c9582a
JM
2946
2947
2948void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
2949{
2950 os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
2951 if (is_zero_ether_addr(p2p->peer_filter))
2952 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Disable peer "
2953 "filter");
2954 else
2955 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Enable peer "
2956 "filter for " MACSTR, MAC2STR(p2p->peer_filter));
2957}