]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/p2p/p2p.c
Remove the GPL notification from EAP-pwd implementation
[thirdparty/hostap.git] / src / p2p / p2p.c
CommitLineData
b22128ef
JM
1/*
2 * Wi-Fi Direct - P2P module
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#include "includes.h"
16
17#include "common.h"
18#include "eloop.h"
19#include "common/ieee802_11_defs.h"
20#include "common/ieee802_11_common.h"
8aebb0e4 21#include "common/wpa_ctrl.h"
b22128ef
JM
22#include "wps/wps_i.h"
23#include "p2p_i.h"
24#include "p2p.h"
25
26
27static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
28static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
29static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
30 const u8 *sa, const u8 *data, size_t len,
31 int rx_freq);
32static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
33 const u8 *sa, const u8 *data,
34 size_t len);
35static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
40c03fd4 36static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
b22128ef
JM
37
38
40c03fd4
JM
39/*
40 * p2p_scan recovery timeout
41 *
42 * Many drivers are using 30 second timeout on scan results. Allow a bit larger
43 * timeout for this to avoid hitting P2P timeout unnecessarily.
44 */
45#define P2P_SCAN_TIMEOUT 35
46
b22128ef
JM
47/**
48 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
49 * entries will be removed
50 */
51#define P2P_PEER_EXPIRATION_AGE 300
52
53#define P2P_PEER_EXPIRATION_INTERVAL (P2P_PEER_EXPIRATION_AGE / 2)
54
55static void p2p_expire_peers(struct p2p_data *p2p)
56{
57 struct p2p_device *dev, *n;
58 struct os_time now;
1d277f02 59 size_t i;
b22128ef
JM
60
61 os_get_time(&now);
62 dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
63 if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
64 continue;
b1aebbc4
JM
65
66 if (p2p->cfg->go_connected &&
67 p2p->cfg->go_connected(p2p->cfg->cb_ctx,
68 dev->info.p2p_device_addr)) {
69 /*
70 * We are connected as a client to a group in which the
71 * peer is the GO, so do not expire the peer entry.
72 */
73 os_get_time(&dev->last_seen);
74 continue;
75 }
76
1d277f02
JM
77 for (i = 0; i < p2p->num_groups; i++) {
78 if (p2p_group_is_client_connected(
79 p2p->groups[i], dev->info.p2p_device_addr))
80 break;
81 }
82 if (i < p2p->num_groups) {
83 /*
84 * The peer is connected as a client in a group where
85 * we are the GO, so do not expire the peer entry.
86 */
87 os_get_time(&dev->last_seen);
88 continue;
89 }
90
b22128ef 91 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
c5db8e51 92 "entry " MACSTR, MAC2STR(dev->info.p2p_device_addr));
b22128ef
JM
93 dl_list_del(&dev->list);
94 p2p_device_free(p2p, dev);
95 }
96}
97
98
99static void p2p_expiration_timeout(void *eloop_ctx, void *timeout_ctx)
100{
101 struct p2p_data *p2p = eloop_ctx;
102 p2p_expire_peers(p2p);
103 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
104 p2p_expiration_timeout, p2p, NULL);
105}
106
107
108static const char * p2p_state_txt(int state)
109{
110 switch (state) {
111 case P2P_IDLE:
112 return "IDLE";
113 case P2P_SEARCH:
114 return "SEARCH";
115 case P2P_CONNECT:
116 return "CONNECT";
117 case P2P_CONNECT_LISTEN:
118 return "CONNECT_LISTEN";
119 case P2P_GO_NEG:
120 return "GO_NEG";
121 case P2P_LISTEN_ONLY:
122 return "LISTEN_ONLY";
123 case P2P_WAIT_PEER_CONNECT:
124 return "WAIT_PEER_CONNECT";
125 case P2P_WAIT_PEER_IDLE:
126 return "WAIT_PEER_IDLE";
127 case P2P_SD_DURING_FIND:
128 return "SD_DURING_FIND";
129 case P2P_PROVISIONING:
130 return "PROVISIONING";
131 case P2P_PD_DURING_FIND:
132 return "PD_DURING_FIND";
133 case P2P_INVITE:
134 return "INVITE";
135 case P2P_INVITE_LISTEN:
136 return "INVITE_LISTEN";
39185dfa
JM
137 case P2P_SEARCH_WHEN_READY:
138 return "SEARCH_WHEN_READY";
b22128ef
JM
139 default:
140 return "?";
141 }
142}
143
144
ec437d9e
JJ
145u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
146{
147 struct p2p_device *dev = NULL;
148
149 if (!addr || !p2p)
150 return 0;
151
152 dev = p2p_get_device(p2p, addr);
153 if (dev)
154 return dev->wps_prov_info;
155 else
156 return 0;
157}
158
159
160void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *iface_addr)
161{
162 struct p2p_device *dev = NULL;
163
164 if (!iface_addr || !p2p)
165 return;
166
167 dev = p2p_get_device_interface(p2p, iface_addr);
168 if (dev)
169 dev->wps_prov_info = 0;
170}
171
172
b22128ef
JM
173void p2p_set_state(struct p2p_data *p2p, int new_state)
174{
175 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
176 p2p_state_txt(p2p->state), p2p_state_txt(new_state));
177 p2p->state = new_state;
178}
179
180
181void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
182{
183 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
184 "P2P: Set timeout (state=%s): %u.%06u sec",
185 p2p_state_txt(p2p->state), sec, usec);
186 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
187 eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
188}
189
190
191void p2p_clear_timeout(struct p2p_data *p2p)
192{
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
194 p2p_state_txt(p2p->state));
195 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
196}
197
198
199void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
200 int status)
201{
202 struct p2p_go_neg_results res;
203 p2p_clear_timeout(p2p);
204 p2p_set_state(p2p, P2P_IDLE);
eb916eb8
JB
205 if (p2p->go_neg_peer)
206 p2p->go_neg_peer->wps_method = WPS_NOT_READY;
b22128ef
JM
207 p2p->go_neg_peer = NULL;
208
209 os_memset(&res, 0, sizeof(res));
210 res.status = status;
211 if (peer) {
c5db8e51 212 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr,
b22128ef
JM
213 ETH_ALEN);
214 os_memcpy(res.peer_interface_addr, peer->intended_addr,
215 ETH_ALEN);
216 }
217 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
218}
219
220
221static void p2p_listen_in_find(struct p2p_data *p2p)
222{
223 unsigned int r, tu;
224 int freq;
225 struct wpabuf *ies;
226
227 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
228 "P2P: Starting short listen state (state=%s)",
229 p2p_state_txt(p2p->state));
230
231 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
232 p2p->cfg->channel);
233 if (freq < 0) {
234 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
235 "P2P: Unknown regulatory class/channel");
236 return;
237 }
238
239 os_get_random((u8 *) &r, sizeof(r));
240 tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
241 p2p->min_disc_int) * 100;
242
243 p2p->pending_listen_freq = freq;
244 p2p->pending_listen_sec = 0;
245 p2p->pending_listen_usec = 1024 * tu;
246
247 ies = p2p_build_probe_resp_ies(p2p);
248 if (ies == NULL)
249 return;
250
251 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
252 ies) < 0) {
253 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
254 "P2P: Failed to start listen mode");
255 p2p->pending_listen_freq = 0;
256 }
257 wpabuf_free(ies);
258}
259
260
261int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
262{
263 int freq;
264 struct wpabuf *ies;
265
266 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
267 "P2P: Going to listen(only) state");
268
269 freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
270 p2p->cfg->channel);
271 if (freq < 0) {
272 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
273 "P2P: Unknown regulatory class/channel");
274 return -1;
275 }
276
277 p2p->pending_listen_freq = freq;
278 p2p->pending_listen_sec = timeout / 1000;
279 p2p->pending_listen_usec = (timeout % 1000) * 1000;
280
281 if (p2p->p2p_scan_running) {
d9bdba9f
JM
282 if (p2p->start_after_scan == P2P_AFTER_SCAN_NOTHING) {
283 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
284 "P2P: p2p_scan running - connect is already "
285 "pending - skip listen");
286 return 0;
287 }
b22128ef
JM
288 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
289 "P2P: p2p_scan running - delay start of listen state");
290 p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
291 return 0;
292 }
293
294 ies = p2p_build_probe_resp_ies(p2p);
295 if (ies == NULL)
296 return -1;
297
298 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
299 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
300 "P2P: Failed to start listen mode");
301 p2p->pending_listen_freq = 0;
302 wpabuf_free(ies);
303 return -1;
304 }
305 wpabuf_free(ies);
306
307 p2p_set_state(p2p, P2P_LISTEN_ONLY);
308
309 return 0;
310}
311
312
313static void p2p_device_clear_reported(struct p2p_data *p2p)
314{
315 struct p2p_device *dev;
316 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
317 dev->flags &= ~P2P_DEV_REPORTED;
318}
319
320
321/**
322 * p2p_get_device - Fetch a peer entry
323 * @p2p: P2P module context from p2p_init()
324 * @addr: P2P Device Address of the peer
325 * Returns: Pointer to the device entry or %NULL if not found
326 */
327struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
328{
329 struct p2p_device *dev;
330 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
c5db8e51 331 if (os_memcmp(dev->info.p2p_device_addr, addr, ETH_ALEN) == 0)
b22128ef
JM
332 return dev;
333 }
334 return NULL;
335}
336
337
338/**
339 * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
340 * @p2p: P2P module context from p2p_init()
341 * @addr: P2P Interface Address of the peer
342 * Returns: Pointer to the device entry or %NULL if not found
343 */
344struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
345 const u8 *addr)
346{
347 struct p2p_device *dev;
348 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
349 if (os_memcmp(dev->interface_addr, addr, ETH_ALEN) == 0)
350 return dev;
351 }
352 return NULL;
353}
354
355
356/**
357 * p2p_create_device - Create a peer entry
358 * @p2p: P2P module context from p2p_init()
359 * @addr: P2P Device Address of the peer
360 * Returns: Pointer to the device entry or %NULL on failure
361 *
362 * If there is already an entry for the peer, it will be returned instead of
363 * creating a new one.
364 */
365static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
366 const u8 *addr)
367{
368 struct p2p_device *dev, *oldest = NULL;
369 size_t count = 0;
370
371 dev = p2p_get_device(p2p, addr);
372 if (dev)
373 return dev;
374
375 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
376 count++;
377 if (oldest == NULL ||
378 os_time_before(&dev->last_seen, &oldest->last_seen))
379 oldest = dev;
380 }
381 if (count + 1 > p2p->cfg->max_peers && oldest) {
382 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
383 "P2P: Remove oldest peer entry to make room for a new "
384 "peer");
385 dl_list_del(&oldest->list);
386 p2p_device_free(p2p, oldest);
387 }
388
389 dev = os_zalloc(sizeof(*dev));
390 if (dev == NULL)
391 return NULL;
392 dl_list_add(&p2p->devices, &dev->list);
c5db8e51 393 os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
b22128ef
JM
394
395 return dev;
396}
397
398
399static void p2p_copy_client_info(struct p2p_device *dev,
400 struct p2p_client_info *cli)
401{
c5db8e51
KRK
402 os_memcpy(dev->info.device_name, cli->dev_name, cli->dev_name_len);
403 dev->info.device_name[cli->dev_name_len] = '\0';
404 dev->info.dev_capab = cli->dev_capab;
405 dev->info.config_methods = cli->config_methods;
406 os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
e57ae6e1
JMB
407 dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
408 os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
409 dev->info.wps_sec_dev_type_list_len);
b22128ef
JM
410}
411
412
413static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
414 const u8 *go_interface_addr, int freq,
415 const u8 *gi, size_t gi_len)
416{
417 struct p2p_group_info info;
418 size_t c;
419 struct p2p_device *dev;
420
421 if (gi == NULL)
422 return 0;
423
424 if (p2p_group_info_parse(gi, gi_len, &info) < 0)
425 return -1;
426
427 /*
428 * Clear old data for this group; if the devices are still in the
429 * group, the information will be restored in the loop following this.
430 */
431 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
b5472a45 432 if (os_memcmp(dev->member_in_go_iface, go_interface_addr,
b22128ef
JM
433 ETH_ALEN) == 0) {
434 os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
435 os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
436 }
437 }
438
439 for (c = 0; c < info.num_clients; c++) {
440 struct p2p_client_info *cli = &info.client[c];
2f0c8936
MK
441 if (os_memcmp(cli->p2p_device_addr, p2p->cfg->dev_addr,
442 ETH_ALEN) == 0)
443 continue; /* ignore our own entry */
b22128ef
JM
444 dev = p2p_get_device(p2p, cli->p2p_device_addr);
445 if (dev) {
446 /*
447 * Update information only if we have not received this
448 * directly from the client.
449 */
450 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
451 P2P_DEV_PROBE_REQ_ONLY))
452 p2p_copy_client_info(dev, cli);
453 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
454 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
455 }
456 } else {
457 dev = p2p_create_device(p2p, cli->p2p_device_addr);
458 if (dev == NULL)
459 continue;
460 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
461 p2p_copy_client_info(dev, cli);
462 dev->oper_freq = freq;
c5db8e51
KRK
463 p2p->cfg->dev_found(p2p->cfg->cb_ctx,
464 dev->info.p2p_device_addr,
8fd7dc1b
JB
465 &dev->info, 1);
466 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
467 }
468
469 os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
470 ETH_ALEN);
471 os_get_time(&dev->last_seen);
472 os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
473 os_memcpy(dev->member_in_go_iface, go_interface_addr,
474 ETH_ALEN);
475 }
476
477 return 0;
478}
479
480
b67d0d9e
JM
481static void p2p_copy_wps_info(struct p2p_device *dev, int probe_req,
482 const struct p2p_message *msg)
483{
484 os_memcpy(dev->info.device_name, msg->device_name,
485 sizeof(dev->info.device_name));
486
487 if (msg->manufacturer &&
488 msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
489 os_memset(dev->info.manufacturer, 0,
490 sizeof(dev->info.manufacturer));
491 os_memcpy(dev->info.manufacturer, msg->manufacturer,
492 msg->manufacturer_len);
493 }
494
495 if (msg->model_name &&
496 msg->model_name_len < sizeof(dev->info.model_name)) {
497 os_memset(dev->info.model_name, 0,
498 sizeof(dev->info.model_name));
499 os_memcpy(dev->info.model_name, msg->model_name,
500 msg->model_name_len);
501 }
502
503 if (msg->model_number &&
504 msg->model_number_len < sizeof(dev->info.model_number)) {
505 os_memset(dev->info.model_number, 0,
506 sizeof(dev->info.model_number));
507 os_memcpy(dev->info.model_number, msg->model_number,
508 msg->model_number_len);
509 }
510
511 if (msg->serial_number &&
512 msg->serial_number_len < sizeof(dev->info.serial_number)) {
513 os_memset(dev->info.serial_number, 0,
514 sizeof(dev->info.serial_number));
515 os_memcpy(dev->info.serial_number, msg->serial_number,
516 msg->serial_number_len);
517 }
518
519 if (msg->pri_dev_type)
520 os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
521 sizeof(dev->info.pri_dev_type));
522 else if (msg->wps_pri_dev_type)
523 os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
524 sizeof(dev->info.pri_dev_type));
525
526 if (msg->wps_sec_dev_type_list) {
527 os_memcpy(dev->info.wps_sec_dev_type_list,
528 msg->wps_sec_dev_type_list,
529 msg->wps_sec_dev_type_list_len);
530 dev->info.wps_sec_dev_type_list_len =
531 msg->wps_sec_dev_type_list_len;
532 }
533
534 if (msg->capability) {
535 dev->info.dev_capab = msg->capability[0];
536 dev->info.group_capab = msg->capability[1];
537 }
538
539 if (msg->ext_listen_timing) {
540 dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
541 dev->ext_listen_interval =
542 WPA_GET_LE16(msg->ext_listen_timing + 2);
543 }
544
545 if (!probe_req) {
546 dev->info.config_methods = msg->config_methods ?
547 msg->config_methods : msg->wps_config_methods;
548 }
549}
550
551
b22128ef
JM
552/**
553 * p2p_add_device - Add peer entries based on scan results
554 * @p2p: P2P module context from p2p_init()
555 * @addr: Source address of Beacon or Probe Response frame (may be either
556 * P2P Device Address or P2P Interface Address)
557 * @level: Signal level (signal strength of the received frame from the peer)
558 * @freq: Frequency on which the Beacon or Probe Response frame was received
559 * @ies: IEs from the Beacon or Probe Response frame
560 * @ies_len: Length of ies buffer in octets
561 * Returns: 0 on success, -1 on failure
562 *
563 * If the scan result is for a GO, the clients in the group will also be added
17bef1e9
AC
564 * to the peer table. This function can also be used with some other frames
565 * like Provision Discovery Request that contains P2P Capability and P2P Device
566 * Info attributes.
b22128ef 567 */
17bef1e9
AC
568int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq, int level,
569 const u8 *ies, size_t ies_len)
b22128ef
JM
570{
571 struct p2p_device *dev;
572 struct p2p_message msg;
573 const u8 *p2p_dev_addr;
6f2c0607 574 int i;
b22128ef
JM
575
576 os_memset(&msg, 0, sizeof(msg));
577 if (p2p_parse_ies(ies, ies_len, &msg)) {
578 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
579 "P2P: Failed to parse P2P IE for a device entry");
580 p2p_parse_free(&msg);
581 return -1;
582 }
583
584 if (msg.p2p_device_addr)
585 p2p_dev_addr = msg.p2p_device_addr;
586 else if (msg.device_id)
587 p2p_dev_addr = msg.device_id;
588 else {
589 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
590 "P2P: Ignore scan data without P2P Device Info or "
591 "P2P Device Id");
592 p2p_parse_free(&msg);
593 return -1;
594 }
595
80c9582a
JM
596 if (!is_zero_ether_addr(p2p->peer_filter) &&
597 os_memcmp(p2p_dev_addr, p2p->peer_filter, ETH_ALEN) != 0) {
598 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Do not add peer "
599 "filter for " MACSTR " due to peer filter",
600 MAC2STR(p2p_dev_addr));
601 return 0;
602 }
603
b22128ef
JM
604 dev = p2p_create_device(p2p, p2p_dev_addr);
605 if (dev == NULL) {
606 p2p_parse_free(&msg);
607 return -1;
608 }
609 os_get_time(&dev->last_seen);
610 dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
611
612 if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
613 os_memcpy(dev->interface_addr, addr, ETH_ALEN);
614 if (msg.ssid &&
615 (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
616 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
617 != 0)) {
618 os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
619 dev->oper_ssid_len = msg.ssid[1];
620 }
621
622 if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
623 *msg.ds_params >= 1 && *msg.ds_params <= 14) {
624 int ds_freq;
625 if (*msg.ds_params == 14)
626 ds_freq = 2484;
627 else
628 ds_freq = 2407 + *msg.ds_params * 5;
629 if (freq != ds_freq) {
630 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
631 "P2P: Update Listen frequency based on DS "
632 "Parameter Set IE: %d -> %d MHz",
633 freq, ds_freq);
634 freq = ds_freq;
635 }
636 }
637
638 if (dev->listen_freq && dev->listen_freq != freq) {
639 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
640 "P2P: Update Listen frequency based on scan "
641 "results (" MACSTR " %d -> %d MHz (DS param %d)",
c5db8e51
KRK
642 MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
643 freq, msg.ds_params ? *msg.ds_params : -1);
b22128ef
JM
644 }
645 dev->listen_freq = freq;
f8d0131a
JM
646 if (msg.group_info)
647 dev->oper_freq = freq;
6402fc43 648 dev->info.level = level;
b22128ef 649
b67d0d9e 650 p2p_copy_wps_info(dev, 0, &msg);
e57ae6e1 651
10c5d2a5 652 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
653 wpabuf_free(dev->info.wps_vendor_ext[i]);
654 dev->info.wps_vendor_ext[i] = NULL;
655 }
656
10c5d2a5 657 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
658 if (msg.wps_vendor_ext[i] == NULL)
659 break;
660 dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
661 msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
662 if (dev->info.wps_vendor_ext[i] == NULL)
663 break;
664 }
665
b22128ef
JM
666 p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq, msg.group_info,
667 msg.group_info_len);
668
669 p2p_parse_free(&msg);
670
671 if (p2p_pending_sd_req(p2p, dev))
672 dev->flags |= P2P_DEV_SD_SCHEDULE;
673
674 if (dev->flags & P2P_DEV_REPORTED)
675 return 0;
676
677 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
678 "P2P: Peer found with Listen frequency %d MHz", freq);
679 if (dev->flags & P2P_DEV_USER_REJECTED) {
680 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
681 "P2P: Do not report rejected device");
682 return 0;
683 }
8fd7dc1b
JB
684
685 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
686 !(dev->flags & P2P_DEV_REPORTED_ONCE));
687 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
688
689 return 0;
690}
691
692
693static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
694{
6f2c0607
JMB
695 int i;
696
5cfda25e
JJ
697 if (p2p->go_neg_peer == dev) {
698 /*
699 * If GO Negotiation is in progress, report that it has failed.
700 */
701 p2p_go_neg_failed(p2p, dev, -1);
b22128ef 702 p2p->go_neg_peer = NULL;
5cfda25e 703 }
b22128ef
JM
704 if (p2p->invite_peer == dev)
705 p2p->invite_peer = NULL;
706 if (p2p->sd_peer == dev)
707 p2p->sd_peer = NULL;
708 if (p2p->pending_client_disc_go == dev)
709 p2p->pending_client_disc_go = NULL;
710
f5fc6032
AC
711 /* dev_lost() device, but only if it was previously dev_found() */
712 if (dev->flags & P2P_DEV_REPORTED_ONCE)
713 p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
714 dev->info.p2p_device_addr);
56eeb8f2 715
10c5d2a5 716 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
6f2c0607
JMB
717 wpabuf_free(dev->info.wps_vendor_ext[i]);
718 dev->info.wps_vendor_ext[i] = NULL;
719 }
720
b22128ef
JM
721 os_free(dev);
722}
723
724
725static int p2p_get_next_prog_freq(struct p2p_data *p2p)
726{
727 struct p2p_channels *c;
728 struct p2p_reg_class *cla;
729 size_t cl, ch;
730 int found = 0;
731 u8 reg_class;
732 u8 channel;
733 int freq;
734
735 c = &p2p->cfg->channels;
736 for (cl = 0; cl < c->reg_classes; cl++) {
737 cla = &c->reg_class[cl];
738 if (cla->reg_class != p2p->last_prog_scan_class)
739 continue;
740 for (ch = 0; ch < cla->channels; ch++) {
741 if (cla->channel[ch] == p2p->last_prog_scan_chan) {
742 found = 1;
743 break;
744 }
745 }
746 if (found)
747 break;
748 }
749
750 if (!found) {
751 /* Start from beginning */
752 reg_class = c->reg_class[0].reg_class;
753 channel = c->reg_class[0].channel[0];
754 } else {
755 /* Pick the next channel */
756 ch++;
757 if (ch == cla->channels) {
758 cl++;
759 if (cl == c->reg_classes)
760 cl = 0;
761 ch = 0;
762 }
763 reg_class = c->reg_class[cl].reg_class;
764 channel = c->reg_class[cl].channel[ch];
765 }
766
767 freq = p2p_channel_to_freq(p2p->cfg->country, reg_class, channel);
768 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Next progressive search "
769 "channel: reg_class %u channel %u -> %d MHz",
770 reg_class, channel, freq);
771 p2p->last_prog_scan_class = reg_class;
772 p2p->last_prog_scan_chan = channel;
773
774 if (freq == 2412 || freq == 2437 || freq == 2462)
775 return 0; /* No need to add social channels */
776 return freq;
777}
778
779
780static void p2p_search(struct p2p_data *p2p)
781{
782 int freq = 0;
783 enum p2p_scan_type type;
784
785 if (p2p->drv_in_listen) {
786 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is still "
787 "in Listen state - wait for it to end before "
788 "continuing");
789 return;
790 }
791 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
792
793 if (p2p->go_neg_peer) {
794 /*
795 * Only scan the known listen frequency of the peer
796 * during GO Negotiation start.
797 */
798 freq = p2p->go_neg_peer->listen_freq;
799 if (freq <= 0)
800 freq = p2p->go_neg_peer->oper_freq;
801 type = P2P_SCAN_SPECIFIC;
802 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
803 "for freq %u (GO Neg)", freq);
804 } else if (p2p->invite_peer) {
805 /*
806 * Only scan the known listen frequency of the peer
807 * during Invite start.
808 */
809 freq = p2p->invite_peer->listen_freq;
810 if (freq <= 0)
811 freq = p2p->invite_peer->oper_freq;
812 type = P2P_SCAN_SPECIFIC;
813 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
814 "for freq %u (Invite)", freq);
815 } else if (p2p->find_type == P2P_FIND_PROGRESSIVE &&
816 (freq = p2p_get_next_prog_freq(p2p)) > 0) {
817 type = P2P_SCAN_SOCIAL_PLUS_ONE;
818 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
819 "(+ freq %u)", freq);
820 } else {
821 type = P2P_SCAN_SOCIAL;
822 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search");
823 }
824
046ef4aa 825 if (p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
6d92fa6e 826 p2p->num_req_dev_types, p2p->req_dev_types,
165ec730 827 p2p->find_dev_id)) {
b22128ef
JM
828 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
829 "P2P: Scan request failed");
830 p2p_continue_find(p2p);
40c03fd4
JM
831 } else {
832 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
833 p2p->p2p_scan_running = 1;
834 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
835 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
836 p2p, NULL);
b22128ef
JM
837 }
838}
839
840
841static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
842{
843 struct p2p_data *p2p = eloop_ctx;
844 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Find timeout -> stop");
845 p2p_stop_find(p2p);
846}
847
848
849static int p2p_run_after_scan(struct p2p_data *p2p)
850{
851 struct p2p_device *dev;
852 enum p2p_after_scan op;
853
3f9285ff 854 if (p2p->after_scan_tx) {
3f9285ff
JM
855 /* TODO: schedule p2p_run_after_scan to be called from TX
856 * status callback(?) */
857 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send pending "
858 "Action frame at p2p_scan completion");
46eeedac
JM
859 p2p->cfg->send_action(p2p->cfg->cb_ctx,
860 p2p->after_scan_tx->freq,
861 p2p->after_scan_tx->dst,
862 p2p->after_scan_tx->src,
863 p2p->after_scan_tx->bssid,
864 (u8 *) (p2p->after_scan_tx + 1),
865 p2p->after_scan_tx->len,
866 p2p->after_scan_tx->wait_time);
3f9285ff
JM
867 os_free(p2p->after_scan_tx);
868 p2p->after_scan_tx = NULL;
869 return 1;
870 }
871
b22128ef
JM
872 op = p2p->start_after_scan;
873 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
874 switch (op) {
875 case P2P_AFTER_SCAN_NOTHING:
876 break;
877 case P2P_AFTER_SCAN_LISTEN:
878 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
879 "requested Listen state");
880 p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
881 p2p->pending_listen_usec / 1000);
882 return 1;
883 case P2P_AFTER_SCAN_CONNECT:
884 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
885 "requested connect with " MACSTR,
886 MAC2STR(p2p->after_scan_peer));
887 dev = p2p_get_device(p2p, p2p->after_scan_peer);
888 if (dev == NULL) {
889 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer not "
890 "known anymore");
891 break;
892 }
893 p2p_connect_send(p2p, dev);
894 return 1;
895 }
896
897 return 0;
898}
899
900
b22128ef
JM
901static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
902{
903 struct p2p_data *p2p = eloop_ctx;
904 int running;
905 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan timeout "
906 "(running=%d)", p2p->p2p_scan_running);
907 running = p2p->p2p_scan_running;
908 /* Make sure we recover from missed scan results callback */
909 p2p->p2p_scan_running = 0;
910
911 if (running)
912 p2p_run_after_scan(p2p);
913}
914
915
046ef4aa
JMB
916static void p2p_free_req_dev_types(struct p2p_data *p2p)
917{
918 p2p->num_req_dev_types = 0;
919 os_free(p2p->req_dev_types);
920 p2p->req_dev_types = NULL;
921}
922
923
b22128ef 924int p2p_find(struct p2p_data *p2p, unsigned int timeout,
046ef4aa 925 enum p2p_discovery_type type,
6d92fa6e
JM
926 unsigned int num_req_dev_types, const u8 *req_dev_types,
927 const u8 *dev_id)
b22128ef
JM
928{
929 int res;
930
931 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting find (type=%d)",
932 type);
933 if (p2p->p2p_scan_running) {
934 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan is "
935 "already running");
936 }
046ef4aa
JMB
937
938 p2p_free_req_dev_types(p2p);
939 if (req_dev_types && num_req_dev_types) {
940 p2p->req_dev_types = os_malloc(num_req_dev_types *
941 WPS_DEV_TYPE_LEN);
942 if (p2p->req_dev_types == NULL)
943 return -1;
944 os_memcpy(p2p->req_dev_types, req_dev_types,
945 num_req_dev_types * WPS_DEV_TYPE_LEN);
946 p2p->num_req_dev_types = num_req_dev_types;
947 }
948
6d92fa6e
JM
949 if (dev_id) {
950 os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
951 p2p->find_dev_id = p2p->find_dev_id_buf;
952 } else
953 p2p->find_dev_id = NULL;
954
b22128ef
JM
955 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
956 p2p_clear_timeout(p2p);
957 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
958 p2p->find_type = type;
959 p2p_device_clear_reported(p2p);
960 p2p_set_state(p2p, P2P_SEARCH);
961 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
39185dfa 962 p2p->last_p2p_find_timeout = timeout;
b22128ef
JM
963 if (timeout)
964 eloop_register_timeout(timeout, 0, p2p_find_timeout,
965 p2p, NULL);
966 switch (type) {
967 case P2P_FIND_START_WITH_FULL:
968 case P2P_FIND_PROGRESSIVE:
046ef4aa
JMB
969 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
970 p2p->num_req_dev_types,
6d92fa6e 971 p2p->req_dev_types, dev_id);
b22128ef
JM
972 break;
973 case P2P_FIND_ONLY_SOCIAL:
046ef4aa
JMB
974 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
975 p2p->num_req_dev_types,
6d92fa6e 976 p2p->req_dev_types, dev_id);
b22128ef
JM
977 break;
978 default:
979 return -1;
980 }
981
982 if (res == 0) {
983 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
984 p2p->p2p_scan_running = 1;
985 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
986 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
987 p2p, NULL);
39185dfa
JM
988 } else if (res == 1) {
989 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Could not start "
990 "p2p_scan at this point - will try again after "
991 "previous scan completes");
992 res = 0;
993 p2p_set_state(p2p, P2P_SEARCH_WHEN_READY);
994 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
b22128ef
JM
995 } else {
996 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
997 "p2p_scan");
0c96fd6d
JM
998 p2p_set_state(p2p, P2P_IDLE);
999 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
b22128ef
JM
1000 }
1001
1002 return res;
1003}
1004
1005
39185dfa
JM
1006int p2p_other_scan_completed(struct p2p_data *p2p)
1007{
1008 if (p2p->state != P2P_SEARCH_WHEN_READY)
1009 return 0;
1010 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting pending P2P find "
1011 "now that previous scan was completed");
1012 if (p2p_find(p2p, p2p->last_p2p_find_timeout, p2p->find_type,
6d92fa6e
JM
1013 p2p->num_req_dev_types, p2p->req_dev_types,
1014 p2p->find_dev_id) < 0)
39185dfa
JM
1015 return 0;
1016 return 1;
1017}
1018
1019
0b8889d8 1020void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
b22128ef
JM
1021{
1022 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopping find");
1023 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1024 p2p_clear_timeout(p2p);
8aebb0e4
JJ
1025 if (p2p->state == P2P_SEARCH)
1026 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, P2P_EVENT_FIND_STOPPED);
b22128ef 1027 p2p_set_state(p2p, P2P_IDLE);
046ef4aa 1028 p2p_free_req_dev_types(p2p);
b22128ef
JM
1029 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1030 p2p->go_neg_peer = NULL;
1031 p2p->sd_peer = NULL;
1032 p2p->invite_peer = NULL;
0b8889d8
JM
1033 if (freq > 0 && p2p->drv_in_listen == freq && p2p->in_listen) {
1034 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip stop_listen "
1035 "since we are on correct channel for response");
1036 return;
1037 }
54b8f994
JM
1038 if (p2p->drv_in_listen) {
1039 /*
1040 * The driver may not deliver callback to p2p_listen_end()
1041 * when the operation gets canceled, so clear the internal
1042 * variable that is tracking driver state.
1043 */
1044 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear "
1045 "drv_in_listen (%d)", p2p->drv_in_listen);
1046 p2p->drv_in_listen = 0;
1047 }
b22128ef
JM
1048 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1049}
1050
1051
0b8889d8
JM
1052void p2p_stop_find(struct p2p_data *p2p)
1053{
1054 p2p_stop_find_for_freq(p2p, 0);
1055}
1056
1057
7861cb08 1058static int p2p_prepare_channel(struct p2p_data *p2p, unsigned int force_freq)
b22128ef 1059{
b22128ef 1060 if (force_freq) {
1e19f734 1061 u8 op_reg_class, op_channel;
b22128ef 1062 if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
1e19f734 1063 &op_reg_class, &op_channel) < 0) {
b22128ef
JM
1064 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1065 "P2P: Unsupported frequency %u MHz",
1066 force_freq);
1067 return -1;
1068 }
1e19f734
JM
1069 if (!p2p_channels_includes(&p2p->cfg->channels, op_reg_class,
1070 op_channel)) {
1071 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1072 "P2P: Frequency %u MHz (oper_class %u "
1073 "channel %u) not allowed for P2P",
1074 force_freq, op_reg_class, op_channel);
1075 return -1;
1076 }
1077 p2p->op_reg_class = op_reg_class;
1078 p2p->op_channel = op_channel;
b22128ef
JM
1079 p2p->channels.reg_classes = 1;
1080 p2p->channels.reg_class[0].channels = 1;
1081 p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1082 p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1083 } else {
7cfc4ac3
AGS
1084 u8 op_reg_class, op_channel;
1085
1086 if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
1087 p2p_supported_freq(p2p, p2p->best_freq_overall) &&
1088 p2p_freq_to_channel(p2p->cfg->country,
1089 p2p->best_freq_overall,
1090 &op_reg_class, &op_channel) == 0) {
1091 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1092 "P2P: Select best overall channel as "
1093 "operating channel preference");
1094 p2p->op_reg_class = op_reg_class;
1095 p2p->op_channel = op_channel;
1096 } else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
1097 p2p_supported_freq(p2p, p2p->best_freq_5) &&
1098 p2p_freq_to_channel(p2p->cfg->country,
1099 p2p->best_freq_5,
1100 &op_reg_class, &op_channel) ==
1101 0) {
1102 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1103 "P2P: Select best 5 GHz channel as "
1104 "operating channel preference");
1105 p2p->op_reg_class = op_reg_class;
1106 p2p->op_channel = op_channel;
1107 } else if (!p2p->cfg->cfg_op_channel &&
1108 p2p->best_freq_24 > 0 &&
1109 p2p_supported_freq(p2p, p2p->best_freq_24) &&
1110 p2p_freq_to_channel(p2p->cfg->country,
1111 p2p->best_freq_24,
1112 &op_reg_class, &op_channel) ==
1113 0) {
1114 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1115 "P2P: Select best 2.4 GHz channel as "
1116 "operating channel preference");
1117 p2p->op_reg_class = op_reg_class;
1118 p2p->op_channel = op_channel;
1119 } else {
1120 p2p->op_reg_class = p2p->cfg->op_reg_class;
1121 p2p->op_channel = p2p->cfg->op_channel;
1122 }
1123
b22128ef
JM
1124 os_memcpy(&p2p->channels, &p2p->cfg->channels,
1125 sizeof(struct p2p_channels));
1126 }
1127 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1128 "P2P: Own preference for operation channel: "
7cfc4ac3 1129 "Operating Class %u Channel %u%s",
b22128ef
JM
1130 p2p->op_reg_class, p2p->op_channel,
1131 force_freq ? " (forced)" : "");
1132
7861cb08
JM
1133 return 0;
1134}
1135
1136
acc247b2
JM
1137static void p2p_set_dev_persistent(struct p2p_device *dev,
1138 int persistent_group)
1139{
1140 switch (persistent_group) {
1141 case 0:
1142 dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
1143 P2P_DEV_PREFER_PERSISTENT_RECONN);
1144 break;
1145 case 1:
1146 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1147 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
1148 break;
1149 case 2:
1150 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
1151 P2P_DEV_PREFER_PERSISTENT_RECONN;
1152 break;
1153 }
1154}
1155
1156
7861cb08
JM
1157int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1158 enum p2p_wps_method wps_method,
1159 int go_intent, const u8 *own_interface_addr,
1160 unsigned int force_freq, int persistent_group)
1161{
1162 struct p2p_device *dev;
1163
1164 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1165 "P2P: Request to start group negotiation - peer=" MACSTR
1166 " GO Intent=%d Intended Interface Address=" MACSTR
1167 " wps_method=%d persistent_group=%d",
1168 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1169 wps_method, persistent_group);
1170
1171 if (p2p_prepare_channel(p2p, force_freq) < 0)
1172 return -1;
1173
4458d915 1174 p2p->ssid_set = 0;
b22128ef
JM
1175 dev = p2p_get_device(p2p, peer_addr);
1176 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1177 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1178 "P2P: Cannot connect to unknown P2P Device " MACSTR,
1179 MAC2STR(peer_addr));
1180 return -1;
1181 }
1182
1183 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
c5db8e51
KRK
1184 if (!(dev->info.dev_capab &
1185 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
b22128ef
JM
1186 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1187 "P2P: Cannot connect to P2P Device " MACSTR
1188 " that is in a group and is not discoverable",
1189 MAC2STR(peer_addr));
1190 return -1;
1191 }
1192 if (dev->oper_freq <= 0) {
1193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1194 "P2P: Cannot connect to P2P Device " MACSTR
1195 " with incomplete information",
1196 MAC2STR(peer_addr));
1197 return -1;
1198 }
1199
1200 /*
1201 * First, try to connect directly. If the peer does not
1202 * acknowledge frames, assume it is sleeping and use device
1203 * discoverability via the GO at that point.
1204 */
1205 }
1206
1207 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1208 dev->flags &= ~P2P_DEV_USER_REJECTED;
1209 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1210 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
9dac8c3e 1211 dev->connect_reqs = 0;
b22128ef
JM
1212 dev->go_neg_req_sent = 0;
1213 dev->go_state = UNKNOWN_GO;
acc247b2 1214 p2p_set_dev_persistent(dev, persistent_group);
b22128ef
JM
1215 p2p->go_intent = go_intent;
1216 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1217
1218 if (p2p->state != P2P_IDLE)
1219 p2p_stop_find(p2p);
1220
f44ae207
JM
1221 if (p2p->after_scan_tx) {
1222 /*
1223 * We need to drop the pending frame to avoid issues with the
1224 * new GO Negotiation, e.g., when the pending frame was from a
1225 * previous attempt at starting a GO Negotiation.
1226 */
1227 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
1228 "previous pending Action frame TX that was waiting "
1229 "for p2p_scan completion");
1230 os_free(p2p->after_scan_tx);
1231 p2p->after_scan_tx = NULL;
1232 }
1233
b22128ef
JM
1234 dev->wps_method = wps_method;
1235 dev->status = P2P_SC_SUCCESS;
d5b20a73
JM
1236
1237 if (force_freq)
1238 dev->flags |= P2P_DEV_FORCE_FREQ;
1239 else
1240 dev->flags &= ~P2P_DEV_FORCE_FREQ;
1241
b22128ef
JM
1242 if (p2p->p2p_scan_running) {
1243 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1244 "P2P: p2p_scan running - delay connect send");
1245 p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1246 os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1247 return 0;
1248 }
1249 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1250
1251 return p2p_connect_send(p2p, dev);
1252}
1253
1254
1255int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1256 enum p2p_wps_method wps_method,
1257 int go_intent, const u8 *own_interface_addr,
1258 unsigned int force_freq, int persistent_group)
1259{
1260 struct p2p_device *dev;
1261
1262 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1263 "P2P: Request to authorize group negotiation - peer=" MACSTR
1264 " GO Intent=%d Intended Interface Address=" MACSTR
1265 " wps_method=%d persistent_group=%d",
1266 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1267 wps_method, persistent_group);
1268
7861cb08
JM
1269 if (p2p_prepare_channel(p2p, force_freq) < 0)
1270 return -1;
b22128ef
JM
1271
1272 dev = p2p_get_device(p2p, peer_addr);
1273 if (dev == NULL) {
1274 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1275 "P2P: Cannot authorize unknown P2P Device " MACSTR,
1276 MAC2STR(peer_addr));
1277 return -1;
1278 }
1279
1280 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1281 dev->flags &= ~P2P_DEV_USER_REJECTED;
1282 dev->go_neg_req_sent = 0;
1283 dev->go_state = UNKNOWN_GO;
acc247b2 1284 p2p_set_dev_persistent(dev, persistent_group);
b22128ef
JM
1285 p2p->go_intent = go_intent;
1286 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1287
1288 dev->wps_method = wps_method;
1289 dev->status = P2P_SC_SUCCESS;
1290
d5b20a73
JM
1291 if (force_freq)
1292 dev->flags |= P2P_DEV_FORCE_FREQ;
1293 else
1294 dev->flags &= ~P2P_DEV_FORCE_FREQ;
1295
b22128ef
JM
1296 return 0;
1297}
1298
1299
1300void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1301 struct p2p_device *dev, struct p2p_message *msg)
1302{
1303 os_get_time(&dev->last_seen);
1304
b67d0d9e 1305 p2p_copy_wps_info(dev, 0, msg);
e57ae6e1 1306
b22128ef
JM
1307 if (msg->listen_channel) {
1308 int freq;
1309 freq = p2p_channel_to_freq((char *) msg->listen_channel,
1310 msg->listen_channel[3],
1311 msg->listen_channel[4]);
1312 if (freq < 0) {
1313 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1314 "P2P: Unknown peer Listen channel: "
1315 "country=%c%c(0x%02x) reg_class=%u channel=%u",
1316 msg->listen_channel[0],
1317 msg->listen_channel[1],
1318 msg->listen_channel[2],
1319 msg->listen_channel[3],
1320 msg->listen_channel[4]);
1321 } else {
1322 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update "
1323 "peer " MACSTR " Listen channel: %u -> %u MHz",
c5db8e51 1324 MAC2STR(dev->info.p2p_device_addr),
b22128ef
JM
1325 dev->listen_freq, freq);
1326 dev->listen_freq = freq;
1327 }
1328 }
b22128ef
JM
1329
1330 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1331 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1332 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1333 "P2P: Completed device entry based on data from "
1334 "GO Negotiation Request");
1335 } else {
1336 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1337 "P2P: Created device entry based on GO Neg Req: "
1338 MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1339 "listen_freq=%d",
c5db8e51
KRK
1340 MAC2STR(dev->info.p2p_device_addr),
1341 dev->info.dev_capab, dev->info.group_capab,
1342 dev->info.device_name, dev->listen_freq);
b22128ef
JM
1343 }
1344
1345 dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1346
1347 if (dev->flags & P2P_DEV_USER_REJECTED) {
1348 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1349 "P2P: Do not report rejected device");
1350 return;
1351 }
1352
8fd7dc1b
JB
1353 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1354 !(dev->flags & P2P_DEV_REPORTED_ONCE));
1355 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
b22128ef
JM
1356}
1357
1358
1359void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1360{
1361 os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1362 p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1363 os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1364 p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1365 *ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1366}
1367
1368
1369int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1370{
1371 p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1372 p2p_random(params->passphrase, 8);
1373 return 0;
1374}
1375
1376
1377void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1378{
1379 struct p2p_go_neg_results res;
1380 int go = peer->go_state == LOCAL_GO;
1381 struct p2p_channels intersection;
1382 int freqs;
1383 size_t i, j;
1384
1385 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1386 "P2P: GO Negotiation with " MACSTR " completed (%s will be "
c5db8e51 1387 "GO)", MAC2STR(peer->info.p2p_device_addr),
b22128ef
JM
1388 go ? "local end" : "peer");
1389
1390 os_memset(&res, 0, sizeof(res));
1391 res.role_go = go;
c5db8e51 1392 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
b22128ef
JM
1393 os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1394 res.wps_method = peer->wps_method;
acc247b2
JM
1395 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
1396 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
1397 res.persistent_group = 2;
1398 else
1399 res.persistent_group = 1;
1400 }
b22128ef
JM
1401
1402 if (go) {
1403 /* Setup AP mode for WPS provisioning */
1404 res.freq = p2p_channel_to_freq(p2p->cfg->country,
1405 p2p->op_reg_class,
1406 p2p->op_channel);
1407 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1408 res.ssid_len = p2p->ssid_len;
1409 p2p_random(res.passphrase, 8);
e9a7ae41 1410 } else {
b22128ef 1411 res.freq = peer->oper_freq;
e9a7ae41
JM
1412 if (p2p->ssid_len) {
1413 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1414 res.ssid_len = p2p->ssid_len;
1415 }
1416 }
b22128ef
JM
1417
1418 p2p_channels_intersect(&p2p->channels, &peer->channels,
1419 &intersection);
1420 freqs = 0;
1421 for (i = 0; i < intersection.reg_classes; i++) {
1422 struct p2p_reg_class *c = &intersection.reg_class[i];
1423 if (freqs + 1 == P2P_MAX_CHANNELS)
1424 break;
1425 for (j = 0; j < c->channels; j++) {
1426 int freq;
1427 if (freqs + 1 == P2P_MAX_CHANNELS)
1428 break;
1429 freq = p2p_channel_to_freq(peer->country, c->reg_class,
1430 c->channel[j]);
1431 if (freq < 0)
1432 continue;
1433 res.freq_list[freqs++] = freq;
1434 }
1435 }
1436
ae3e3421
JM
1437 res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1438
b22128ef 1439 p2p_clear_timeout(p2p);
4458d915 1440 p2p->ssid_set = 0;
b22128ef
JM
1441 peer->go_neg_req_sent = 0;
1442 peer->wps_method = WPS_NOT_READY;
1443
1444 p2p_set_state(p2p, P2P_PROVISIONING);
1445 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
1446}
1447
1448
1449static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
1450 const u8 *data, size_t len, int rx_freq)
1451{
1452 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1453 "P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
1454 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
1455
1456 if (len < 1)
1457 return;
1458
1459 switch (data[0]) {
1460 case P2P_GO_NEG_REQ:
1461 p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
1462 break;
1463 case P2P_GO_NEG_RESP:
1464 p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
1465 break;
1466 case P2P_GO_NEG_CONF:
1467 p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
1468 break;
1469 case P2P_INVITATION_REQ:
1470 p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
1471 rx_freq);
1472 break;
1473 case P2P_INVITATION_RESP:
1474 p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
1475 break;
1476 case P2P_PROV_DISC_REQ:
1477 p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1478 break;
1479 case P2P_PROV_DISC_RESP:
1480 p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
1481 break;
1482 case P2P_DEV_DISC_REQ:
1483 p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1484 break;
1485 case P2P_DEV_DISC_RESP:
1486 p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
1487 break;
1488 default:
1489 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1490 "P2P: Unsupported P2P Public Action frame type %d",
1491 data[0]);
1492 break;
1493 }
1494}
1495
1496
19df9b07
JM
1497static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
1498 const u8 *sa, const u8 *bssid, const u8 *data,
1499 size_t len, int freq)
b22128ef
JM
1500{
1501 if (len < 1)
1502 return;
1503
1504 switch (data[0]) {
1505 case WLAN_PA_VENDOR_SPECIFIC:
1506 data++;
1507 len--;
1508 if (len < 3)
1509 return;
1510 if (WPA_GET_BE24(data) != OUI_WFA)
1511 return;
1512
1513 data += 3;
1514 len -= 3;
1515 if (len < 1)
1516 return;
1517
1518 if (*data != P2P_OUI_TYPE)
1519 return;
1520
1521 p2p_rx_p2p_action(p2p, sa, data + 1, len - 1, freq);
1522 break;
1523 case WLAN_PA_GAS_INITIAL_REQ:
1524 p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
1525 break;
1526 case WLAN_PA_GAS_INITIAL_RESP:
18708aad
JM
1527 p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
1528 break;
1529 case WLAN_PA_GAS_COMEBACK_REQ:
1530 p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
1531 break;
1532 case WLAN_PA_GAS_COMEBACK_RESP:
1533 p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
b22128ef
JM
1534 break;
1535 }
1536}
1537
1538
1539void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1540 const u8 *bssid, u8 category,
1541 const u8 *data, size_t len, int freq)
1542{
1543 if (category == WLAN_ACTION_PUBLIC) {
1544 p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
1545 return;
1546 }
1547
1548 if (category != WLAN_ACTION_VENDOR_SPECIFIC)
1549 return;
1550
1551 if (len < 4)
1552 return;
1553
1554 if (WPA_GET_BE24(data) != OUI_WFA)
1555 return;
1556 data += 3;
1557 len -= 3;
1558
1559 if (*data != P2P_OUI_TYPE)
1560 return;
1561 data++;
1562 len--;
1563
1564 /* P2P action frame */
1565 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1566 "P2P: RX P2P Action from " MACSTR, MAC2STR(sa));
1567 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
1568
1569 if (len < 1)
1570 return;
1571 switch (data[0]) {
1572 case P2P_NOA:
1573 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1574 "P2P: Received P2P Action - Notice of Absence");
1575 /* TODO */
1576 break;
1577 case P2P_PRESENCE_REQ:
1578 p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
1579 break;
1580 case P2P_PRESENCE_RESP:
1581 p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
1582 break;
1583 case P2P_GO_DISC_REQ:
1584 p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
1585 break;
1586 default:
1587 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1588 "P2P: Received P2P Action - unknown type %u", data[0]);
1589 break;
1590 }
1591}
1592
1593
1594static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
1595{
1596 struct p2p_data *p2p = eloop_ctx;
1597 if (p2p->go_neg_peer == NULL)
1598 return;
1599 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1600 p2p->go_neg_peer->status = P2P_SC_SUCCESS;
1601 p2p_connect_send(p2p, p2p->go_neg_peer);
1602}
1603
1604
1605static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
1606{
1607 struct p2p_data *p2p = eloop_ctx;
1608 if (p2p->invite_peer == NULL)
1609 return;
1610 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1611 p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr);
1612}
1613
1614
1615static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
1616 const u8 *ie, size_t ie_len)
1617{
1618 struct p2p_message msg;
1619 struct p2p_device *dev;
1620
1621 os_memset(&msg, 0, sizeof(msg));
1622 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
1623 {
1624 p2p_parse_free(&msg);
1625 return; /* not a P2P probe */
1626 }
1627
1628 if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
1629 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
1630 != 0) {
1631 /* The Probe Request is not part of P2P Device Discovery. It is
1632 * not known whether the source address of the frame is the P2P
1633 * Device Address or P2P Interface Address. Do not add a new
1634 * peer entry based on this frames.
1635 */
1636 p2p_parse_free(&msg);
1637 return;
1638 }
1639
1640 dev = p2p_get_device(p2p, addr);
1641 if (dev) {
1642 if (dev->country[0] == 0 && msg.listen_channel)
1643 os_memcpy(dev->country, msg.listen_channel, 3);
ed908a55 1644 os_get_time(&dev->last_seen);
b22128ef
JM
1645 p2p_parse_free(&msg);
1646 return; /* already known */
1647 }
1648
1649 dev = p2p_create_device(p2p, addr);
1650 if (dev == NULL) {
1651 p2p_parse_free(&msg);
1652 return;
1653 }
1654
1655 os_get_time(&dev->last_seen);
1656 dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
1657
b22128ef
JM
1658 if (msg.listen_channel) {
1659 os_memcpy(dev->country, msg.listen_channel, 3);
1660 dev->listen_freq = p2p_channel_to_freq(dev->country,
1661 msg.listen_channel[3],
1662 msg.listen_channel[4]);
1663 }
1664
b67d0d9e 1665 p2p_copy_wps_info(dev, 1, &msg);
e57ae6e1 1666
b22128ef
JM
1667 p2p_parse_free(&msg);
1668
1669 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1670 "P2P: Created device entry based on Probe Req: " MACSTR
1671 " dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
c5db8e51
KRK
1672 MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
1673 dev->info.group_capab, dev->info.device_name,
1674 dev->listen_freq);
b22128ef
JM
1675}
1676
1677
1678struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
1679 const u8 *addr,
1680 struct p2p_message *msg)
1681{
1682 struct p2p_device *dev;
1683
1684 dev = p2p_get_device(p2p, addr);
1685 if (dev) {
1686 os_get_time(&dev->last_seen);
1687 return dev; /* already known */
1688 }
1689
1690 dev = p2p_create_device(p2p, addr);
1691 if (dev == NULL)
1692 return NULL;
1693
1694 p2p_add_dev_info(p2p, addr, dev, msg);
1695
1696 return dev;
1697}
1698
1699
1700static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
1701{
1702 if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
1703 return 1;
1704 if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
1705 WPA_GET_BE32(&req_dev_type[2]) == 0 &&
1706 WPA_GET_BE16(&req_dev_type[6]) == 0)
1707 return 1; /* Category match with wildcard OUI/sub-category */
1708 return 0;
1709}
1710
1711
1712int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
1713 size_t num_req_dev_type)
1714{
1715 size_t i;
1716 for (i = 0; i < num_req_dev_type; i++) {
1717 if (dev_type_match(dev_type, req_dev_type[i]))
1718 return 1;
1719 }
1720 return 0;
1721}
1722
1723
1724/**
1725 * p2p_match_dev_type - Match local device type with requested type
1726 * @p2p: P2P module context from p2p_init()
1727 * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
1728 * Returns: 1 on match, 0 on mismatch
1729 *
1730 * This function can be used to match the Requested Device Type attribute in
1731 * WPS IE with the local device types for deciding whether to reply to a Probe
1732 * Request frame.
1733 */
1734int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
1735{
1736 struct wps_parse_attr attr;
1737 size_t i;
1738
1739 if (wps_parse_msg(wps, &attr))
1740 return 1; /* assume no Requested Device Type attributes */
1741
1742 if (attr.num_req_dev_type == 0)
1743 return 1; /* no Requested Device Type attributes -> match */
1744
1745 if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
1746 attr.num_req_dev_type))
1747 return 1; /* Own Primary Device Type matches */
1748
1749 for (i = 0; i < p2p->cfg->num_sec_dev_types; i++)
1750 if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
1751 attr.req_dev_type,
1752 attr.num_req_dev_type))
1753 return 1; /* Own Secondary Device Type matches */
1754
1755 /* No matching device type found */
1756 return 0;
1757}
1758
1759
1760struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p)
1761{
1762 struct wpabuf *buf;
1763 u8 *len;
1764
1765 buf = wpabuf_alloc(1000);
1766 if (buf == NULL)
1767 return NULL;
1768
b22128ef
JM
1769 p2p_build_wps_ie(p2p, buf, DEV_PW_DEFAULT, 1);
1770
1771 /* P2P IE */
1772 len = p2p_buf_add_ie_hdr(buf);
1773 p2p_buf_add_capability(buf, p2p->dev_capab, 0);
1774 if (p2p->ext_listen_interval)
1775 p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
1776 p2p->ext_listen_interval);
1777 p2p_buf_add_device_info(buf, p2p, NULL);
1778 p2p_buf_update_ie_hdr(buf, len);
1779
1780 return buf;
1781}
1782
1783
e1d52629
JM
1784static int is_11b(u8 rate)
1785{
1786 return rate == 0x02 || rate == 0x04 || rate == 0x0b || rate == 0x16;
1787}
1788
1789
1790static int supp_rates_11b_only(struct ieee802_11_elems *elems)
1791{
1792 int num_11b = 0, num_others = 0;
1793 int i;
1794
1795 if (elems->supp_rates == NULL && elems->ext_supp_rates == NULL)
1796 return 0;
1797
1798 for (i = 0; elems->supp_rates && i < elems->supp_rates_len; i++) {
1799 if (is_11b(elems->supp_rates[i]))
1800 num_11b++;
1801 else
1802 num_others++;
1803 }
1804
70dbe3b6
JM
1805 for (i = 0; elems->ext_supp_rates && i < elems->ext_supp_rates_len;
1806 i++) {
1807 if (is_11b(elems->ext_supp_rates[i]))
1808 num_11b++;
1809 else
1810 num_others++;
1811 }
1812
e1d52629
JM
1813 return num_11b > 0 && num_others == 0;
1814}
1815
1816
04a85e44
JM
1817static void p2p_reply_probe(struct p2p_data *p2p, const u8 *addr,
1818 const u8 *dst, const u8 *bssid, const u8 *ie,
b22128ef
JM
1819 size_t ie_len)
1820{
1821 struct ieee802_11_elems elems;
1822 struct wpabuf *buf;
1823 struct ieee80211_mgmt *resp;
97c5b3c4 1824 struct p2p_message msg;
b22128ef
JM
1825 struct wpabuf *ies;
1826
1827 if (!p2p->in_listen || !p2p->drv_in_listen) {
1828 /* not in Listen state - ignore Probe Request */
1829 return;
1830 }
1831
1832 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
1833 ParseFailed) {
1834 /* Ignore invalid Probe Request frames */
1835 return;
1836 }
1837
1838 if (elems.p2p == NULL) {
1839 /* not a P2P probe - ignore it */
1840 return;
1841 }
1842
04a85e44
JM
1843 if (dst && !is_broadcast_ether_addr(dst) &&
1844 os_memcmp(dst, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
1845 /* Not sent to the broadcast address or our P2P Device Address
1846 */
1847 return;
1848 }
1849
1850 if (bssid && !is_broadcast_ether_addr(bssid)) {
1851 /* Not sent to the Wildcard BSSID */
1852 return;
1853 }
1854
b22128ef
JM
1855 if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
1856 os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
1857 0) {
1858 /* not using P2P Wildcard SSID - ignore */
1859 return;
1860 }
1861
e1d52629
JM
1862 if (supp_rates_11b_only(&elems)) {
1863 /* Indicates support for 11b rates only */
1864 return;
1865 }
1866
97c5b3c4
JM
1867 os_memset(&msg, 0, sizeof(msg));
1868 if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
1869 /* Could not parse P2P attributes */
1870 return;
1871 }
1872
1873 if (msg.device_id &&
1874 os_memcmp(msg.device_id, p2p->cfg->dev_addr, ETH_ALEN != 0)) {
1875 /* Device ID did not match */
1876 p2p_parse_free(&msg);
1877 return;
1878 }
1879
b22128ef 1880 /* Check Requested Device Type match */
97c5b3c4
JM
1881 if (msg.wps_attributes &&
1882 !p2p_match_dev_type(p2p, msg.wps_attributes)) {
b22128ef 1883 /* No match with Requested Device Type */
97c5b3c4 1884 p2p_parse_free(&msg);
b22128ef
JM
1885 return;
1886 }
97c5b3c4 1887 p2p_parse_free(&msg);
b22128ef
JM
1888
1889 if (!p2p->cfg->send_probe_resp)
1890 return; /* Response generated elsewhere */
1891
1892 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1893 "P2P: Reply to P2P Probe Request in Listen state");
1894
1895 /*
1896 * We do not really have a specific BSS that this frame is advertising,
1897 * so build a frame that has some information in valid format. This is
1898 * really only used for discovery purposes, not to learn exact BSS
1899 * parameters.
1900 */
1901 ies = p2p_build_probe_resp_ies(p2p);
1902 if (ies == NULL)
1903 return;
1904
1905 buf = wpabuf_alloc(200 + wpabuf_len(ies));
1906 if (buf == NULL) {
1907 wpabuf_free(ies);
1908 return;
1909 }
1910
1911 resp = NULL;
1912 resp = wpabuf_put(buf, resp->u.probe_resp.variable - (u8 *) resp);
1913
1914 resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
1915 (WLAN_FC_STYPE_PROBE_RESP << 4));
1916 os_memcpy(resp->da, addr, ETH_ALEN);
1917 os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
1918 os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
1919 resp->u.probe_resp.beacon_int = host_to_le16(100);
1920 /* hardware or low-level driver will setup seq_ctrl and timestamp */
1921 resp->u.probe_resp.capab_info =
1922 host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
1923 WLAN_CAPABILITY_PRIVACY |
1924 WLAN_CAPABILITY_SHORT_SLOT_TIME);
1925
1926 wpabuf_put_u8(buf, WLAN_EID_SSID);
1927 wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
1928 wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1929
1930 wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
1931 wpabuf_put_u8(buf, 8);
1932 wpabuf_put_u8(buf, (60 / 5) | 0x80);
1933 wpabuf_put_u8(buf, 90 / 5);
1934 wpabuf_put_u8(buf, (120 / 5) | 0x80);
1935 wpabuf_put_u8(buf, 180 / 5);
1936 wpabuf_put_u8(buf, (240 / 5) | 0x80);
1937 wpabuf_put_u8(buf, 360 / 5);
1938 wpabuf_put_u8(buf, 480 / 5);
1939 wpabuf_put_u8(buf, 540 / 5);
1940
1941 wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
1942 wpabuf_put_u8(buf, 1);
1943 wpabuf_put_u8(buf, p2p->cfg->channel);
1944
1945 wpabuf_put_buf(buf, ies);
1946 wpabuf_free(ies);
1947
1948 p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf);
1949
1950 wpabuf_free(buf);
1951}
1952
1953
04a85e44
JM
1954int p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
1955 const u8 *bssid, const u8 *ie, size_t ie_len)
b22128ef
JM
1956{
1957 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
1958
04a85e44 1959 p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len);
b22128ef
JM
1960
1961 if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
1962 p2p->go_neg_peer &&
c5db8e51
KRK
1963 os_memcmp(addr, p2p->go_neg_peer->info.p2p_device_addr, ETH_ALEN)
1964 == 0) {
b22128ef
JM
1965 /* Received a Probe Request from GO Negotiation peer */
1966 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1967 "P2P: Found GO Negotiation peer - try to start GO "
1968 "negotiation from timeout");
1969 eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
1970 return 1;
1971 }
1972
1973 if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
1974 p2p->invite_peer &&
c5db8e51
KRK
1975 os_memcmp(addr, p2p->invite_peer->info.p2p_device_addr, ETH_ALEN)
1976 == 0) {
b22128ef
JM
1977 /* Received a Probe Request from Invite peer */
1978 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1979 "P2P: Found Invite peer - try to start Invite from "
1980 "timeout");
1981 eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
1982 return 1;
1983 }
1984
1985 return 0;
1986}
1987
1988
1989static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
4c08c0bd 1990 u8 *buf, size_t len, struct wpabuf *p2p_ie)
b22128ef
JM
1991{
1992 struct wpabuf *tmp;
1993 u8 *lpos;
1994 size_t tmplen;
1995 int res;
72044390 1996 u8 group_capab;
b22128ef 1997
4c08c0bd
JM
1998 if (p2p_ie == NULL)
1999 return 0; /* WLAN AP is not a P2P manager */
b22128ef
JM
2000
2001 /*
2002 * (Re)Association Request - P2P IE
2003 * P2P Capability attribute (shall be present)
4c08c0bd
JM
2004 * P2P Interface attribute (present if concurrent device and
2005 * P2P Management is enabled)
b22128ef
JM
2006 */
2007 tmp = wpabuf_alloc(200);
2008 if (tmp == NULL)
2009 return -1;
2010
2011 lpos = p2p_buf_add_ie_hdr(tmp);
72044390
JM
2012 group_capab = 0;
2013 if (p2p->num_groups > 0) {
2014 group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
2015 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2016 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
2017 p2p->cross_connect)
2018 group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
2019 }
2020 p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
4c08c0bd
JM
2021 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2022 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
b22128ef
JM
2023 p2p_buf_add_p2p_interface(tmp, p2p);
2024 p2p_buf_update_ie_hdr(tmp, lpos);
2025
2026 tmplen = wpabuf_len(tmp);
2027 if (tmplen > len)
2028 res = -1;
2029 else {
2030 os_memcpy(buf, wpabuf_head(tmp), tmplen);
2031 res = tmplen;
2032 }
2033 wpabuf_free(tmp);
2034
2035 return res;
2036}
2037
2038
2039int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
4c08c0bd 2040 size_t len, int p2p_group, struct wpabuf *p2p_ie)
b22128ef
JM
2041{
2042 struct wpabuf *tmp;
2043 u8 *lpos;
2044 struct p2p_device *peer;
2045 size_t tmplen;
2046 int res;
2047
2048 if (!p2p_group)
4c08c0bd 2049 return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
b22128ef
JM
2050
2051 /*
2052 * (Re)Association Request - P2P IE
2053 * P2P Capability attribute (shall be present)
2054 * Extended Listen Timing (may be present)
2055 * P2P Device Info attribute (shall be present)
2056 */
2057 tmp = wpabuf_alloc(200);
2058 if (tmp == NULL)
2059 return -1;
2060
2061 peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
2062
2063 lpos = p2p_buf_add_ie_hdr(tmp);
2064 p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
5be5305b
JM
2065 if (p2p->ext_listen_interval)
2066 p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
2067 p2p->ext_listen_interval);
b22128ef
JM
2068 p2p_buf_add_device_info(tmp, p2p, peer);
2069 p2p_buf_update_ie_hdr(tmp, lpos);
2070
2071 tmplen = wpabuf_len(tmp);
2072 if (tmplen > len)
2073 res = -1;
2074 else {
2075 os_memcpy(buf, wpabuf_head(tmp), tmplen);
2076 res = tmplen;
2077 }
2078 wpabuf_free(tmp);
2079
2080 return res;
2081}
2082
2083
2084int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
2085{
2086 struct wpabuf *p2p_ie;
2087 int ret;
2088
2089 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
2090 if (p2p_ie == NULL)
2091 return 0;
2092
2093 ret = p2p_attr_text(p2p_ie, buf, end);
2094 wpabuf_free(p2p_ie);
2095 return ret;
2096}
2097
2098
0a70f34f
JM
2099int p2p_parse_dev_addr(const u8 *ies, size_t ies_len, u8 *dev_addr)
2100{
2101 struct wpabuf *p2p_ie;
2102 struct p2p_message msg;
2103
2104 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
2105 P2P_IE_VENDOR_TYPE);
2106 if (p2p_ie == NULL)
2107 return -1;
2108 os_memset(&msg, 0, sizeof(msg));
2109 if (p2p_parse_p2p_ie(p2p_ie, &msg)) {
2110 wpabuf_free(p2p_ie);
2111 return -1;
2112 }
2113
2114 if (msg.p2p_device_addr == NULL) {
2115 wpabuf_free(p2p_ie);
2116 return -1;
2117 }
2118
2119 os_memcpy(dev_addr, msg.p2p_device_addr, ETH_ALEN);
2120 wpabuf_free(p2p_ie);
2121 return 0;
2122}
2123
2124
b22128ef
JM
2125static void p2p_clear_go_neg(struct p2p_data *p2p)
2126{
2127 p2p->go_neg_peer = NULL;
2128 p2p_clear_timeout(p2p);
2129 p2p_set_state(p2p, P2P_IDLE);
2130}
2131
2132
2133void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
2134{
2135 if (p2p->go_neg_peer == NULL) {
2136 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2137 "P2P: No pending Group Formation - "
2138 "ignore WPS registration success notification");
2139 return; /* No pending Group Formation */
2140 }
2141
2142 if (os_memcmp(mac_addr, p2p->go_neg_peer->intended_addr, ETH_ALEN) !=
2143 0) {
2144 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2145 "P2P: Ignore WPS registration success notification "
2146 "for " MACSTR " (GO Negotiation peer " MACSTR ")",
2147 MAC2STR(mac_addr),
2148 MAC2STR(p2p->go_neg_peer->intended_addr));
2149 return; /* Ignore unexpected peer address */
2150 }
2151
2152 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2153 "P2P: Group Formation completed successfully with " MACSTR,
2154 MAC2STR(mac_addr));
2155
2156 p2p_clear_go_neg(p2p);
2157}
2158
2159
2160void p2p_group_formation_failed(struct p2p_data *p2p)
2161{
2162 if (p2p->go_neg_peer == NULL) {
2163 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2164 "P2P: No pending Group Formation - "
2165 "ignore group formation failure notification");
2166 return; /* No pending Group Formation */
2167 }
2168
2169 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2170 "P2P: Group Formation failed with " MACSTR,
2171 MAC2STR(p2p->go_neg_peer->intended_addr));
2172
2173 p2p_clear_go_neg(p2p);
2174}
2175
2176
2177struct p2p_data * p2p_init(const struct p2p_config *cfg)
2178{
2179 struct p2p_data *p2p;
2180
2181 if (cfg->max_peers < 1)
2182 return NULL;
2183
2184 p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
2185 if (p2p == NULL)
2186 return NULL;
2187 p2p->cfg = (struct p2p_config *) (p2p + 1);
2188 os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
2189 if (cfg->dev_name)
2190 p2p->cfg->dev_name = os_strdup(cfg->dev_name);
b6e01800
JM
2191 if (cfg->manufacturer)
2192 p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
2193 if (cfg->model_name)
2194 p2p->cfg->model_name = os_strdup(cfg->model_name);
2195 if (cfg->model_number)
2196 p2p->cfg->model_number = os_strdup(cfg->model_number);
2197 if (cfg->serial_number)
2198 p2p->cfg->serial_number = os_strdup(cfg->serial_number);
b22128ef
JM
2199
2200 p2p->min_disc_int = 1;
2201 p2p->max_disc_int = 3;
2202
2203 os_get_random(&p2p->next_tie_breaker, 1);
2204 p2p->next_tie_breaker &= 0x01;
2205 if (cfg->sd_request)
2206 p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
2207 p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
2208 if (cfg->concurrent_operations)
2209 p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
2210 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
2211
2212 dl_list_init(&p2p->devices);
2213
2214 eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
2215 p2p_expiration_timeout, p2p, NULL);
2216
2217 return p2p;
2218}
2219
2220
2221void p2p_deinit(struct p2p_data *p2p)
2222{
2223 eloop_cancel_timeout(p2p_expiration_timeout, p2p, NULL);
2224 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
2225 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2226 p2p_flush(p2p);
046ef4aa 2227 p2p_free_req_dev_types(p2p);
b22128ef 2228 os_free(p2p->cfg->dev_name);
b6e01800
JM
2229 os_free(p2p->cfg->manufacturer);
2230 os_free(p2p->cfg->model_name);
2231 os_free(p2p->cfg->model_number);
2232 os_free(p2p->cfg->serial_number);
b22128ef 2233 os_free(p2p->groups);
18708aad 2234 wpabuf_free(p2p->sd_resp);
3f9285ff 2235 os_free(p2p->after_scan_tx);
f95cac27 2236 p2p_remove_wps_vendor_extensions(p2p);
b22128ef
JM
2237 os_free(p2p);
2238}
2239
2240
2241void p2p_flush(struct p2p_data *p2p)
2242{
2243 struct p2p_device *dev, *prev;
2244 p2p_clear_timeout(p2p);
2245 p2p_set_state(p2p, P2P_IDLE);
2246 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
2247 p2p->go_neg_peer = NULL;
2248 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
2249 dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
2250 list) {
2251 dl_list_del(&dev->list);
2252 p2p_device_free(p2p, dev);
2253 }
2254 p2p_free_sd_queries(p2p);
f44ae207
JM
2255 os_free(p2p->after_scan_tx);
2256 p2p->after_scan_tx = NULL;
b22128ef
JM
2257}
2258
2259
9d562b79
SS
2260int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
2261{
2262 struct p2p_device *dev;
2263
2264 dev = p2p_get_device(p2p, addr);
2265 if (dev == NULL)
2266 return -1;
2267
2268 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unauthorizing " MACSTR,
2269 MAC2STR(addr));
2270
2271 if (p2p->go_neg_peer == dev)
2272 p2p->go_neg_peer = NULL;
2273
2274 dev->wps_method = WPS_NOT_READY;
2275 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
2276 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
2277
2278 /* Check if after_scan_tx is for this peer. If so free it */
2279 if (p2p->after_scan_tx &&
2280 os_memcmp(addr, p2p->after_scan_tx->dst, ETH_ALEN) == 0) {
2281 os_free(p2p->after_scan_tx);
2282 p2p->after_scan_tx = NULL;
2283 }
2284
2285 return 0;
2286}
2287
2288
b22128ef
JM
2289int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
2290{
2291 os_free(p2p->cfg->dev_name);
2292 if (dev_name) {
2293 p2p->cfg->dev_name = os_strdup(dev_name);
2294 if (p2p->cfg->dev_name == NULL)
2295 return -1;
2296 } else
2297 p2p->cfg->dev_name = NULL;
2298 return 0;
2299}
2300
2301
b6e01800
JM
2302int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
2303{
2304 os_free(p2p->cfg->manufacturer);
2305 p2p->cfg->manufacturer = NULL;
2306 if (manufacturer) {
2307 p2p->cfg->manufacturer = os_strdup(manufacturer);
2308 if (p2p->cfg->manufacturer == NULL)
2309 return -1;
2310 }
2311
2312 return 0;
2313}
2314
2315
2316int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
2317{
2318 os_free(p2p->cfg->model_name);
2319 p2p->cfg->model_name = NULL;
2320 if (model_name) {
2321 p2p->cfg->model_name = os_strdup(model_name);
2322 if (p2p->cfg->model_name == NULL)
2323 return -1;
2324 }
2325
2326 return 0;
2327}
2328
2329
2330int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
2331{
2332 os_free(p2p->cfg->model_number);
2333 p2p->cfg->model_number = NULL;
2334 if (model_number) {
2335 p2p->cfg->model_number = os_strdup(model_number);
2336 if (p2p->cfg->model_number == NULL)
2337 return -1;
2338 }
2339
2340 return 0;
2341}
2342
2343
2344int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
2345{
2346 os_free(p2p->cfg->serial_number);
2347 p2p->cfg->serial_number = NULL;
2348 if (serial_number) {
2349 p2p->cfg->serial_number = os_strdup(serial_number);
2350 if (p2p->cfg->serial_number == NULL)
2351 return -1;
2352 }
2353
2354 return 0;
2355}
2356
2357
2358void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
2359{
2360 p2p->cfg->config_methods = config_methods;
2361}
2362
2363
2364void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
2365{
2366 os_memcpy(p2p->cfg->uuid, uuid, 16);
2367}
2368
2369
b22128ef
JM
2370int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
2371{
2372 os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
2373 return 0;
2374}
2375
2376
2377int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
2378 size_t num_dev_types)
2379{
2380 if (num_dev_types > P2P_SEC_DEVICE_TYPES)
2381 num_dev_types = P2P_SEC_DEVICE_TYPES;
2382 p2p->cfg->num_sec_dev_types = num_dev_types;
2383 os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
2384 return 0;
2385}
2386
2387
f95cac27
JMB
2388void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
2389{
2390 int i;
2391
10c5d2a5 2392 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
f95cac27
JMB
2393 wpabuf_free(p2p->wps_vendor_ext[i]);
2394 p2p->wps_vendor_ext[i] = NULL;
2395 }
2396}
2397
2398
2399int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
2400 const struct wpabuf *vendor_ext)
2401{
2402 int i;
2403
2404 if (vendor_ext == NULL)
2405 return -1;
2406
10c5d2a5 2407 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
f95cac27
JMB
2408 if (p2p->wps_vendor_ext[i] == NULL)
2409 break;
2410 }
10c5d2a5 2411 if (i >= P2P_MAX_WPS_VENDOR_EXT)
f95cac27
JMB
2412 return -1;
2413
2414 p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
2415 if (p2p->wps_vendor_ext[i] == NULL)
2416 return -1;
2417
2418 return 0;
2419}
2420
2421
b22128ef
JM
2422int p2p_set_country(struct p2p_data *p2p, const char *country)
2423{
2424 os_memcpy(p2p->cfg->country, country, 3);
2425 return 0;
2426}
2427
2428
2429void p2p_continue_find(struct p2p_data *p2p)
2430{
2431 struct p2p_device *dev;
2432 p2p_set_state(p2p, P2P_SEARCH);
2433 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2434 if (dev->flags & P2P_DEV_SD_SCHEDULE) {
2435 if (p2p_start_sd(p2p, dev) == 0)
2436 return;
2437 else
2438 break;
10c4edde
JM
2439 } else if (dev->req_config_methods &&
2440 !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
2441 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
e3a0706b 2442 "pending Provision Discovery Request to "
10c4edde 2443 MACSTR " (config methods 0x%x)",
c5db8e51 2444 MAC2STR(dev->info.p2p_device_addr),
10c4edde 2445 dev->req_config_methods);
1ef2f7ff 2446 if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
b22128ef
JM
2447 return;
2448 }
2449 }
2450
2451 p2p_listen_in_find(p2p);
2452}
2453
2454
2455static void p2p_sd_cb(struct p2p_data *p2p, int success)
2456{
2457 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2458 "P2P: Service Discovery Query TX callback: success=%d",
2459 success);
2460 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2461
2462 if (!success) {
2463 if (p2p->sd_peer) {
2464 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2465 p2p->sd_peer = NULL;
2466 }
2467 p2p_continue_find(p2p);
2468 return;
2469 }
2470
2471 if (p2p->sd_peer == NULL) {
2472 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2473 "P2P: No SD peer entry known");
2474 p2p_continue_find(p2p);
2475 return;
2476 }
2477
2478 /* Wait for response from the peer */
2479 p2p_set_state(p2p, P2P_SD_DURING_FIND);
2480 p2p_set_timeout(p2p, 0, 200000);
2481}
2482
6b56cc2d
JS
2483
2484/**
2485 * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
2486 * @p2p: P2P module context from p2p_init()
2487 */
19df9b07 2488static void p2p_retry_pd(struct p2p_data *p2p)
6b56cc2d
JS
2489{
2490 struct p2p_device *dev;
2491
2492 if (p2p->state != P2P_IDLE)
2493 return;
2494
2495 /*
2496 * Retry the prov disc req attempt only for the peer that the user had
2497 * requested for and provided a join has not been initiated on it
2498 * in the meantime.
2499 */
2500
2501 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2502 if (os_memcmp(p2p->pending_pd_devaddr,
2503 dev->info.p2p_device_addr, ETH_ALEN) != 0)
2504 continue;
2505 if (!dev->req_config_methods)
2506 continue;
2507 if (dev->flags & P2P_DEV_PD_FOR_JOIN)
2508 continue;
2509
2510 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
e3a0706b 2511 "pending Provision Discovery Request to "
6b56cc2d
JS
2512 MACSTR " (config methods 0x%x)",
2513 MAC2STR(dev->info.p2p_device_addr),
2514 dev->req_config_methods);
1ef2f7ff 2515 p2p_send_prov_disc_req(p2p, dev, 0, 0);
6b56cc2d
JS
2516 return;
2517 }
2518}
2519
2520
b22128ef
JM
2521static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
2522{
2523 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2524 "P2P: Provision Discovery Request TX callback: success=%d",
2525 success);
6b56cc2d
JS
2526
2527 /*
2528 * Postpone resetting the pending action state till after we actually
2529 * time out. This allows us to take some action like notifying any
2530 * interested parties about no response to the request.
2531 *
2532 * When the timer (below) goes off we check in IDLE, SEARCH, or
2533 * LISTEN_ONLY state, which are the only allowed states to issue a PD
2534 * requests in, if this was still pending and then raise notification.
2535 */
b22128ef
JM
2536
2537 if (!success) {
6b56cc2d
JS
2538 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2539
b22128ef
JM
2540 if (p2p->state != P2P_IDLE)
2541 p2p_continue_find(p2p);
6b56cc2d
JS
2542 else if (p2p->user_initiated_pd) {
2543 p2p->pending_action_state = P2P_PENDING_PD;
2544 p2p_set_timeout(p2p, 0, 300000);
2545 }
b22128ef
JM
2546 return;
2547 }
2548
6b56cc2d
JS
2549 /*
2550 * This postponing, of resetting pending_action_state, needs to be
2551 * done only for user initiated PD requests and not internal ones.
2552 */
2553 if (p2p->user_initiated_pd)
2554 p2p->pending_action_state = P2P_PENDING_PD;
2555 else
2556 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2557
b22128ef
JM
2558 /* Wait for response from the peer */
2559 if (p2p->state == P2P_SEARCH)
2560 p2p_set_state(p2p, P2P_PD_DURING_FIND);
2561 p2p_set_timeout(p2p, 0, 200000);
2562}
2563
2564
2565int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
2566 int level, const u8 *ies, size_t ies_len)
2567{
2568 p2p_add_device(p2p, bssid, freq, level, ies, ies_len);
2569
2570 if (p2p->go_neg_peer && p2p->state == P2P_SEARCH &&
c5db8e51
KRK
2571 os_memcmp(p2p->go_neg_peer->info.p2p_device_addr, bssid, ETH_ALEN)
2572 == 0) {
b22128ef
JM
2573 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2574 "P2P: Found GO Negotiation peer - try to start GO "
2575 "negotiation");
2576 p2p_connect_send(p2p, p2p->go_neg_peer);
2577 return 1;
2578 }
2579
2580 return 0;
2581}
2582
2583
2584void p2p_scan_res_handled(struct p2p_data *p2p)
2585{
2586 if (!p2p->p2p_scan_running) {
2587 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan was not "
2588 "running, but scan results received");
2589 }
2590 p2p->p2p_scan_running = 0;
2591 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2592
2593 if (p2p_run_after_scan(p2p))
2594 return;
2595 if (p2p->state == P2P_SEARCH)
2596 p2p_continue_find(p2p);
2597}
2598
2599
6d92fa6e 2600void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id)
b22128ef
JM
2601{
2602 u8 *len = p2p_buf_add_ie_hdr(ies);
2603 p2p_buf_add_capability(ies, p2p->dev_capab, 0);
6d92fa6e
JM
2604 if (dev_id)
2605 p2p_buf_add_device_id(ies, dev_id);
b22128ef
JM
2606 if (p2p->cfg->reg_class && p2p->cfg->channel)
2607 p2p_buf_add_listen_channel(ies, p2p->cfg->country,
2608 p2p->cfg->reg_class,
2609 p2p->cfg->channel);
2610 if (p2p->ext_listen_interval)
2611 p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
2612 p2p->ext_listen_interval);
2613 /* TODO: p2p_buf_add_operating_channel() if GO */
2614 p2p_buf_update_ie_hdr(ies, len);
2615}
2616
2617
206e1f42
JM
2618size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
2619{
2620 return 100;
2621}
2622
2623
b22128ef
JM
2624int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
2625{
2626 return p2p_attr_text(p2p_ie, buf, end);
2627}
2628
2629
2630static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
2631{
2632 struct p2p_device *dev = p2p->go_neg_peer;
2633
2634 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2635 "P2P: GO Negotiation Request TX callback: success=%d",
2636 success);
2637
2638 if (dev == NULL) {
2639 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2640 "P2P: No pending GO Negotiation");
2641 return;
2642 }
2643
2644 if (success) {
2645 dev->go_neg_req_sent++;
2646 if (dev->flags & P2P_DEV_USER_REJECTED) {
2647 p2p_set_state(p2p, P2P_IDLE);
2648 return;
2649 }
2650 }
2651
2652 if (!success &&
c5db8e51 2653 (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
b22128ef
JM
2654 !is_zero_ether_addr(dev->member_in_go_dev)) {
2655 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2656 "P2P: Peer " MACSTR " did not acknowledge request - "
2657 "try to use device discoverability through its GO",
c5db8e51 2658 MAC2STR(dev->info.p2p_device_addr));
b22128ef
JM
2659 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2660 p2p_send_dev_disc_req(p2p, dev);
2661 return;
2662 }
2663
2664 /*
2665 * Use P2P find, if needed, to find the other device from its listen
2666 * channel.
2667 */
2668 p2p_set_state(p2p, P2P_CONNECT);
2669 p2p_set_timeout(p2p, 0, 100000);
2670}
2671
2672
2673static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
2674{
2675 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2676 "P2P: GO Negotiation Response TX callback: success=%d",
2677 success);
2678 if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
2679 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2680 "P2P: Ignore TX callback event - GO Negotiation is "
2681 "not running anymore");
2682 return;
2683 }
2684 p2p_set_state(p2p, P2P_CONNECT);
2685 p2p_set_timeout(p2p, 0, 100000);
2686}
2687
2688
2689static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success)
2690{
2691 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2692 "P2P: GO Negotiation Response (failure) TX callback: "
2693 "success=%d", success);
fbe70272
JM
2694 if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
2695 p2p_go_neg_failed(p2p, p2p->go_neg_peer,
2696 p2p->go_neg_peer->status);
2697 }
b22128ef
JM
2698}
2699
2700
93b7ddd0
JM
2701static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
2702 enum p2p_send_action_result result)
b22128ef
JM
2703{
2704 struct p2p_device *dev;
2705
2706 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
93b7ddd0
JM
2707 "P2P: GO Negotiation Confirm TX callback: result=%d",
2708 result);
b22128ef 2709 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
93b7ddd0
JM
2710 if (result == P2P_SEND_ACTION_FAILED) {
2711 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2712 return;
2713 }
2714 if (result == P2P_SEND_ACTION_NO_ACK) {
b22128ef
JM
2715 /*
2716 * It looks like the TX status for GO Negotiation Confirm is
2717 * often showing failure even when the peer has actually
2718 * received the frame. Since the peer may change channels
2719 * immediately after having received the frame, we may not see
2720 * an Ack for retries, so just dropping a single frame may
2721 * trigger this. To allow the group formation to succeed if the
2722 * peer did indeed receive the frame, continue regardless of
2723 * the TX status.
2724 */
2725 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2726 "P2P: Assume GO Negotiation Confirm TX was actually "
2727 "received by the peer even though Ack was not "
2728 "reported");
2729 }
2730
2731 dev = p2p->go_neg_peer;
2732 if (dev == NULL)
2733 return;
2734
2735 p2p_go_complete(p2p, dev);
2736}
2737
2738
2739void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
93b7ddd0
JM
2740 const u8 *src, const u8 *bssid,
2741 enum p2p_send_action_result result)
b22128ef
JM
2742{
2743 enum p2p_pending_action_state state;
93b7ddd0 2744 int success;
b22128ef
JM
2745
2746 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2747 "P2P: Action frame TX callback (state=%d freq=%u dst=" MACSTR
93b7ddd0 2748 " src=" MACSTR " bssid=" MACSTR " result=%d",
b22128ef 2749 p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
93b7ddd0
JM
2750 MAC2STR(bssid), result);
2751 success = result == P2P_SEND_ACTION_SUCCESS;
b22128ef
JM
2752 state = p2p->pending_action_state;
2753 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2754 switch (state) {
2755 case P2P_NO_PENDING_ACTION:
2756 break;
2757 case P2P_PENDING_GO_NEG_REQUEST:
2758 p2p_go_neg_req_cb(p2p, success);
2759 break;
2760 case P2P_PENDING_GO_NEG_RESPONSE:
2761 p2p_go_neg_resp_cb(p2p, success);
2762 break;
2763 case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
2764 p2p_go_neg_resp_failure_cb(p2p, success);
2765 break;
2766 case P2P_PENDING_GO_NEG_CONFIRM:
93b7ddd0 2767 p2p_go_neg_conf_cb(p2p, result);
b22128ef
JM
2768 break;
2769 case P2P_PENDING_SD:
2770 p2p_sd_cb(p2p, success);
2771 break;
2772 case P2P_PENDING_PD:
2773 p2p_prov_disc_cb(p2p, success);
2774 break;
2775 case P2P_PENDING_INVITATION_REQUEST:
2776 p2p_invitation_req_cb(p2p, success);
2777 break;
2778 case P2P_PENDING_INVITATION_RESPONSE:
2779 p2p_invitation_resp_cb(p2p, success);
2780 break;
2781 case P2P_PENDING_DEV_DISC_REQUEST:
2782 p2p_dev_disc_req_cb(p2p, success);
2783 break;
2784 case P2P_PENDING_DEV_DISC_RESPONSE:
2785 p2p_dev_disc_resp_cb(p2p, success);
2786 break;
2787 case P2P_PENDING_GO_DISC_REQ:
2788 p2p_go_disc_req_cb(p2p, success);
2789 break;
2790 }
2791}
2792
2793
2794void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
2795 unsigned int duration)
2796{
2797 if (freq == p2p->pending_client_disc_freq) {
2798 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2799 "P2P: Client discoverability remain-awake completed");
2800 p2p->pending_client_disc_freq = 0;
2801 return;
2802 }
2803
2804 if (freq != p2p->pending_listen_freq) {
2805 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2806 "P2P: Unexpected listen callback for freq=%u "
2807 "duration=%u (pending_listen_freq=%u)",
2808 freq, duration, p2p->pending_listen_freq);
2809 return;
2810 }
2811
2812 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2813 "P2P: Starting Listen timeout(%u,%u) on freq=%u based on "
2814 "callback",
2815 p2p->pending_listen_sec, p2p->pending_listen_usec,
2816 p2p->pending_listen_freq);
2817 p2p->in_listen = 1;
0b8889d8 2818 p2p->drv_in_listen = freq;
b22128ef
JM
2819 if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
2820 /*
2821 * Add 20 msec extra wait to avoid race condition with driver
2822 * remain-on-channel end event, i.e., give driver more time to
2823 * complete the operation before our timeout expires.
2824 */
2825 p2p_set_timeout(p2p, p2p->pending_listen_sec,
2826 p2p->pending_listen_usec + 20000);
2827 }
2828
2829 p2p->pending_listen_freq = 0;
2830}
2831
2832
2833int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
2834{
2835 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver ended Listen "
2836 "state (freq=%u)", freq);
2837 p2p->drv_in_listen = 0;
2838 if (p2p->in_listen)
2839 return 0; /* Internal timeout will trigger the next step */
2840
2841 if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
e24cf97c
JM
2842 if (p2p->go_neg_peer->connect_reqs >= 120) {
2843 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2844 "P2P: Timeout on sending GO Negotiation "
2845 "Request without getting response");
2846 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2847 return 0;
2848 }
2849
b22128ef
JM
2850 p2p_set_state(p2p, P2P_CONNECT);
2851 p2p_connect_send(p2p, p2p->go_neg_peer);
2852 return 1;
2853 } else if (p2p->state == P2P_SEARCH) {
59acfe87
JM
2854 if (p2p->p2p_scan_running) {
2855 /*
2856 * Search is already in progress. This can happen if
2857 * an Action frame RX is reported immediately after
2858 * the end of a remain-on-channel operation and the
2859 * response frame to that is sent using an offchannel
2860 * operation while in p2p_find. Avoid an attempt to
2861 * restart a scan here.
2862 */
2863 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan "
2864 "already in progress - do not try to start a "
2865 "new one");
2866 return 1;
2867 }
b22128ef
JM
2868 p2p_search(p2p);
2869 return 1;
2870 }
2871
2872 return 0;
2873}
2874
2875
2876static void p2p_timeout_connect(struct p2p_data *p2p)
2877{
2878 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2879 p2p_set_state(p2p, P2P_CONNECT_LISTEN);
2880 p2p_listen_in_find(p2p);
2881}
2882
2883
2884static void p2p_timeout_connect_listen(struct p2p_data *p2p)
2885{
2886 if (p2p->go_neg_peer) {
2887 if (p2p->drv_in_listen) {
2888 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is "
2889 "still in Listen state; wait for it to "
2890 "complete");
2891 return;
2892 }
9dac8c3e
FM
2893
2894 if (p2p->go_neg_peer->connect_reqs >= 120) {
2895 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2896 "P2P: Timeout on sending GO Negotiation "
2897 "Request without getting response");
2898 p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2899 return;
2900 }
2901
b22128ef
JM
2902 p2p_set_state(p2p, P2P_CONNECT);
2903 p2p_connect_send(p2p, p2p->go_neg_peer);
2904 } else
2905 p2p_set_state(p2p, P2P_IDLE);
2906}
2907
2908
2909static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
2910{
2911 /*
2912 * TODO: could remain constantly in Listen state for some time if there
2913 * are no other concurrent uses for the radio. For now, go to listen
2914 * state once per second to give other uses a chance to use the radio.
2915 */
2916 p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
d58ed4e3 2917 p2p_set_timeout(p2p, 0, 500000);
b22128ef
JM
2918}
2919
2920
2921static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
2922{
2923 struct p2p_device *dev = p2p->go_neg_peer;
2924
2925 if (dev == NULL) {
2926 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2927 "P2P: Unknown GO Neg peer - stop GO Neg wait");
2928 return;
2929 }
2930
2931 dev->wait_count++;
2932 if (dev->wait_count >= 120) {
2933 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2934 "P2P: Timeout on waiting peer to become ready for GO "
2935 "Negotiation");
2936 p2p_go_neg_failed(p2p, dev, -1);
2937 return;
2938 }
2939
2940 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2941 "P2P: Go to Listen state while waiting for the peer to become "
2942 "ready for GO Negotiation");
2943 p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
2944 p2p_listen_in_find(p2p);
2945}
2946
2947
2948static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
2949{
2950 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2951 "P2P: Service Discovery Query timeout");
2952 if (p2p->sd_peer) {
2953 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2954 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2955 p2p->sd_peer = NULL;
2956 }
2957 p2p_continue_find(p2p);
2958}
2959
2960
2961static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
2962{
2963 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2964 "P2P: Provision Discovery Request timeout");
2965 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2966 p2p_continue_find(p2p);
2967}
2968
2969
6b56cc2d
JS
2970static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
2971{
2972 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2973
2974 /*
2975 * For user initiated PD requests that we have not gotten any responses
2976 * for while in IDLE state, we retry them a couple of times before
2977 * giving up.
2978 */
2979 if (!p2p->user_initiated_pd)
2980 return;
2981
2982 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2983 "P2P: User initiated Provision Discovery Request timeout");
2984
2985 if (p2p->pd_retries) {
2986 p2p->pd_retries--;
2987 p2p_retry_pd(p2p);
2988 } else {
349b213c
JS
2989 if (p2p->cfg->prov_disc_fail)
2990 p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
2991 p2p->pending_pd_devaddr,
2992 P2P_PROV_DISC_TIMEOUT);
6b56cc2d
JS
2993 p2p_reset_pending_pd(p2p);
2994 }
2995}
2996
2997
b22128ef
JM
2998static void p2p_timeout_invite(struct p2p_data *p2p)
2999{
3000 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3001 p2p_set_state(p2p, P2P_INVITE_LISTEN);
04d8dad5
JM
3002 if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
3003 /*
3004 * Better remain on operating channel instead of listen channel
3005 * when running a group.
3006 */
3007 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Inviting in "
3008 "active GO role - wait on operating channel");
3009 p2p_set_timeout(p2p, 0, 100000);
3010 return;
3011 }
b22128ef
JM
3012 p2p_listen_in_find(p2p);
3013}
3014
3015
3016static void p2p_timeout_invite_listen(struct p2p_data *p2p)
3017{
3018 if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
3019 p2p_set_state(p2p, P2P_INVITE);
3020 p2p_invite_send(p2p, p2p->invite_peer,
3021 p2p->invite_go_dev_addr);
3022 } else {
3023 if (p2p->invite_peer) {
3024 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3025 "P2P: Invitation Request retry limit reached");
3026 if (p2p->cfg->invitation_result)
3027 p2p->cfg->invitation_result(
3028 p2p->cfg->cb_ctx, -1, NULL);
3029 }
3030 p2p_set_state(p2p, P2P_IDLE);
3031 }
3032}
3033
3034
3035static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
3036{
3037 struct p2p_data *p2p = eloop_ctx;
3038
3039 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Timeout (state=%s)",
3040 p2p_state_txt(p2p->state));
3041
3042 p2p->in_listen = 0;
3043
3044 switch (p2p->state) {
3045 case P2P_IDLE:
6b56cc2d
JS
3046 /* Check if we timed out waiting for PD req */
3047 if (p2p->pending_action_state == P2P_PENDING_PD)
3048 p2p_timeout_prov_disc_req(p2p);
b22128ef
JM
3049 break;
3050 case P2P_SEARCH:
6b56cc2d
JS
3051 /* Check if we timed out waiting for PD req */
3052 if (p2p->pending_action_state == P2P_PENDING_PD)
3053 p2p_timeout_prov_disc_req(p2p);
b22128ef
JM
3054 p2p_search(p2p);
3055 break;
3056 case P2P_CONNECT:
3057 p2p_timeout_connect(p2p);
3058 break;
3059 case P2P_CONNECT_LISTEN:
3060 p2p_timeout_connect_listen(p2p);
3061 break;
3062 case P2P_GO_NEG:
3063 break;
3064 case P2P_LISTEN_ONLY:
6b56cc2d
JS
3065 /* Check if we timed out waiting for PD req */
3066 if (p2p->pending_action_state == P2P_PENDING_PD)
3067 p2p_timeout_prov_disc_req(p2p);
3068
b22128ef
JM
3069 if (p2p->ext_listen_only) {
3070 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3071 "P2P: Extended Listen Timing - Listen State "
3072 "completed");
3073 p2p->ext_listen_only = 0;
3074 p2p_set_state(p2p, P2P_IDLE);
3075 }
3076 break;
3077 case P2P_WAIT_PEER_CONNECT:
3078 p2p_timeout_wait_peer_connect(p2p);
3079 break;
3080 case P2P_WAIT_PEER_IDLE:
3081 p2p_timeout_wait_peer_idle(p2p);
3082 break;
3083 case P2P_SD_DURING_FIND:
3084 p2p_timeout_sd_during_find(p2p);
3085 break;
3086 case P2P_PROVISIONING:
3087 break;
3088 case P2P_PD_DURING_FIND:
3089 p2p_timeout_prov_disc_during_find(p2p);
3090 break;
3091 case P2P_INVITE:
3092 p2p_timeout_invite(p2p);
3093 break;
3094 case P2P_INVITE_LISTEN:
3095 p2p_timeout_invite_listen(p2p);
3096 break;
39185dfa
JM
3097 case P2P_SEARCH_WHEN_READY:
3098 break;
b22128ef
JM
3099 }
3100}
3101
3102
3103int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
3104{
3105 struct p2p_device *dev;
3106
3107 dev = p2p_get_device(p2p, peer_addr);
3108 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Local request to reject "
3109 "connection attempts by peer " MACSTR, MAC2STR(peer_addr));
3110 if (dev == NULL) {
3111 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
3112 " unknown", MAC2STR(peer_addr));
3113 return -1;
3114 }
3115 dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
3116 dev->flags |= P2P_DEV_USER_REJECTED;
3117 return 0;
3118}
3119
3120
e5a359cf 3121const char * p2p_wps_method_text(enum p2p_wps_method method)
b22128ef
JM
3122{
3123 switch (method) {
3124 case WPS_NOT_READY:
3125 return "not-ready";
b22128ef
JM
3126 case WPS_PIN_DISPLAY:
3127 return "Display";
3128 case WPS_PIN_KEYPAD:
3129 return "Keypad";
3130 case WPS_PBC:
3131 return "PBC";
3132 }
3133
3134 return "??";
3135}
3136
3137
3138static const char * p2p_go_state_text(enum p2p_go_state go_state)
3139{
3140 switch (go_state) {
3141 case UNKNOWN_GO:
3142 return "unknown";
3143 case LOCAL_GO:
3144 return "local";
3145 case REMOTE_GO:
3146 return "remote";
3147 }
3148
3149 return "??";
3150}
3151
3152
b3ffc80b
JM
3153const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
3154 const u8 *addr, int next)
b22128ef
JM
3155{
3156 struct p2p_device *dev;
b22128ef
JM
3157
3158 if (addr)
3159 dev = p2p_get_device(p2p, addr);
3160 else
3161 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
3162
3163 if (dev && next) {
3164 dev = dl_list_first(&dev->list, struct p2p_device, list);
3165 if (&dev->list == &p2p->devices)
3166 dev = NULL;
3167 }
3168
3169 if (dev == NULL)
b3ffc80b
JM
3170 return NULL;
3171
3172 return &dev->info;
3173}
3174
3175
3176int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
3177 char *buf, size_t buflen)
3178{
3179 struct p2p_device *dev;
3180 int res;
3181 char *pos, *end;
3182 struct os_time now;
3183
3184 if (info == NULL)
b22128ef
JM
3185 return -1;
3186
b3ffc80b
JM
3187 dev = (struct p2p_device *) (((u8 *) info) -
3188 offsetof(struct p2p_device, info));
3189
b22128ef
JM
3190 pos = buf;
3191 end = buf + buflen;
3192
b22128ef
JM
3193 os_get_time(&now);
3194 res = os_snprintf(pos, end - pos,
3195 "age=%d\n"
3196 "listen_freq=%d\n"
b22128ef
JM
3197 "wps_method=%s\n"
3198 "interface_addr=" MACSTR "\n"
3199 "member_in_go_dev=" MACSTR "\n"
3200 "member_in_go_iface=" MACSTR "\n"
b22128ef
JM
3201 "go_neg_req_sent=%d\n"
3202 "go_state=%s\n"
3203 "dialog_token=%u\n"
3204 "intended_addr=" MACSTR "\n"
3205 "country=%c%c\n"
3206 "oper_freq=%d\n"
3207 "req_config_methods=0x%x\n"
10c4edde 3208 "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
b22128ef
JM
3209 "status=%d\n"
3210 "wait_count=%u\n"
3211 "invitation_reqs=%u\n",
3212 (int) (now.sec - dev->last_seen.sec),
3213 dev->listen_freq,
b22128ef
JM
3214 p2p_wps_method_text(dev->wps_method),
3215 MAC2STR(dev->interface_addr),
3216 MAC2STR(dev->member_in_go_dev),
3217 MAC2STR(dev->member_in_go_iface),
b22128ef
JM
3218 dev->go_neg_req_sent,
3219 p2p_go_state_text(dev->go_state),
3220 dev->dialog_token,
3221 MAC2STR(dev->intended_addr),
3222 dev->country[0] ? dev->country[0] : '_',
3223 dev->country[1] ? dev->country[1] : '_',
3224 dev->oper_freq,
3225 dev->req_config_methods,
3226 dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
3227 "[PROBE_REQ_ONLY]" : "",
3228 dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
3229 dev->flags & P2P_DEV_NOT_YET_READY ?
3230 "[NOT_YET_READY]" : "",
3231 dev->flags & P2P_DEV_SD_INFO ? "[SD_INFO]" : "",
3232 dev->flags & P2P_DEV_SD_SCHEDULE ? "[SD_SCHEDULE]" :
3233 "",
3234 dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
3235 "[PD_PEER_DISPLAY]" : "",
3236 dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
3237 "[PD_PEER_KEYPAD]" : "",
3238 dev->flags & P2P_DEV_USER_REJECTED ?
3239 "[USER_REJECTED]" : "",
3240 dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
3241 "[PEER_WAITING_RESPONSE]" : "",
3242 dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
3243 "[PREFER_PERSISTENT_GROUP]" : "",
3244 dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
3245 "[WAIT_GO_NEG_RESPONSE]" : "",
3246 dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
3247 "[WAIT_GO_NEG_CONFIRM]" : "",
3248 dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
3249 "[GROUP_CLIENT_ONLY]" : "",
d5b20a73 3250 dev->flags & P2P_DEV_FORCE_FREQ ?
10c4edde
JM
3251 "[FORCE_FREQ]" : "",
3252 dev->flags & P2P_DEV_PD_FOR_JOIN ?
3253 "[PD_FOR_JOIN]" : "",
b22128ef
JM
3254 dev->status,
3255 dev->wait_count,
3256 dev->invitation_reqs);
3257 if (res < 0 || res >= end - pos)
3258 return pos - buf;
3259 pos += res;
3260
3261 if (dev->ext_listen_period) {
3262 res = os_snprintf(pos, end - pos,
3263 "ext_listen_period=%u\n"
3264 "ext_listen_interval=%u\n",
3265 dev->ext_listen_period,
3266 dev->ext_listen_interval);
3267 if (res < 0 || res >= end - pos)
3268 return pos - buf;
3269 pos += res;
3270 }
3271
3272 if (dev->oper_ssid_len) {
3273 res = os_snprintf(pos, end - pos,
3274 "oper_ssid=%s\n",
3275 wpa_ssid_txt(dev->oper_ssid,
3276 dev->oper_ssid_len));
3277 if (res < 0 || res >= end - pos)
3278 return pos - buf;
3279 pos += res;
3280 }
3281
3282 return pos - buf;
3283}
3284
3285
b3bcc0f5
JM
3286int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
3287{
3288 return p2p_get_device(p2p, addr) != NULL;
3289}
3290
3291
b22128ef
JM
3292void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
3293{
3294 if (enabled) {
3295 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3296 "discoverability enabled");
3297 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3298 } else {
3299 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3300 "discoverability disabled");
3301 p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3302 }
3303}
3304
3305
3306static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
3307 u32 duration2, u32 interval2)
3308{
3309 struct wpabuf *req;
3310 struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
3311 u8 *len;
3312
3313 req = wpabuf_alloc(100);
3314 if (req == NULL)
3315 return NULL;
3316
3317 if (duration1 || interval1) {
3318 os_memset(&desc1, 0, sizeof(desc1));
3319 desc1.count_type = 1;
3320 desc1.duration = duration1;
3321 desc1.interval = interval1;
3322 ptr1 = &desc1;
3323
3324 if (duration2 || interval2) {
3325 os_memset(&desc2, 0, sizeof(desc2));
3326 desc2.count_type = 2;
3327 desc2.duration = duration2;
3328 desc2.interval = interval2;
3329 ptr2 = &desc2;
3330 }
3331 }
3332
3333 p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
3334 len = p2p_buf_add_ie_hdr(req);
3335 p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
3336 p2p_buf_update_ie_hdr(req, len);
3337
3338 return req;
3339}
3340
3341
3342int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
3343 const u8 *own_interface_addr, unsigned int freq,
3344 u32 duration1, u32 interval1, u32 duration2,
3345 u32 interval2)
3346{
3347 struct wpabuf *req;
3348
3349 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send Presence Request to "
3350 "GO " MACSTR " (own interface " MACSTR ") freq=%u dur1=%u "
3351 "int1=%u dur2=%u int2=%u",
3352 MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
3353 freq, duration1, interval1, duration2, interval2);
3354
3355 req = p2p_build_presence_req(duration1, interval1, duration2,
3356 interval2);
3357 if (req == NULL)
3358 return -1;
3359
3360 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3f9285ff
JM
3361 if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
3362 go_interface_addr,
3363 wpabuf_head(req), wpabuf_len(req), 200) < 0) {
b22128ef
JM
3364 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3365 "P2P: Failed to send Action frame");
3366 }
3367 wpabuf_free(req);
3368
3369 return 0;
3370}
3371
3372
3373static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
3374 size_t noa_len, u8 dialog_token)
3375{
3376 struct wpabuf *resp;
3377 u8 *len;
3378
3379 resp = wpabuf_alloc(100 + noa_len);
3380 if (resp == NULL)
3381 return NULL;
3382
3383 p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
3384 len = p2p_buf_add_ie_hdr(resp);
3385 p2p_buf_add_status(resp, status);
3386 if (noa) {
3387 wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
3388 wpabuf_put_le16(resp, noa_len);
3389 wpabuf_put_data(resp, noa, noa_len);
3390 } else
3391 p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
3392 p2p_buf_update_ie_hdr(resp, len);
3393
3394 return resp;
3395}
3396
3397
3398static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
3399 const u8 *sa, const u8 *data, size_t len,
3400 int rx_freq)
3401{
3402 struct p2p_message msg;
3403 u8 status;
3404 struct wpabuf *resp;
3405 size_t g;
3406 struct p2p_group *group = NULL;
3407 int parsed = 0;
3408 u8 noa[50];
3409 int noa_len;
3410
3411 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3412 "P2P: Received P2P Action - P2P Presence Request");
3413
3414 for (g = 0; g < p2p->num_groups; g++) {
3415 if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]),
3416 ETH_ALEN) == 0) {
3417 group = p2p->groups[g];
3418 break;
3419 }
3420 }
3421 if (group == NULL) {
3422 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3423 "P2P: Ignore P2P Presence Request for unknown group "
3424 MACSTR, MAC2STR(da));
3425 return;
3426 }
3427
3428 if (p2p_parse(data, len, &msg) < 0) {
3429 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3430 "P2P: Failed to parse P2P Presence Request");
3431 status = P2P_SC_FAIL_INVALID_PARAMS;
3432 goto fail;
3433 }
3434 parsed = 1;
3435
3436 if (msg.noa == NULL) {
3437 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3438 "P2P: No NoA attribute in P2P Presence Request");
3439 status = P2P_SC_FAIL_INVALID_PARAMS;
3440 goto fail;
3441 }
3442
3443 status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
3444
3445fail:
3446 if (p2p->cfg->get_noa)
3447 noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
3448 sizeof(noa));
3449 else
3450 noa_len = -1;
3451 resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
3452 noa_len > 0 ? noa_len : 0,
3453 msg.dialog_token);
3454 if (parsed)
3455 p2p_parse_free(&msg);
3456 if (resp == NULL)
3457 return;
3458
3459 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3f9285ff
JM
3460 if (p2p_send_action(p2p, rx_freq, sa, da, da,
3461 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
b22128ef
JM
3462 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3463 "P2P: Failed to send Action frame");
3464 }
3465 wpabuf_free(resp);
3466}
3467
3468
3469static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
3470 const u8 *sa, const u8 *data, size_t len)
3471{
3472 struct p2p_message msg;
3473
3474 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3475 "P2P: Received P2P Action - P2P Presence Response");
3476
3477 if (p2p_parse(data, len, &msg) < 0) {
3478 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3479 "P2P: Failed to parse P2P Presence Response");
3480 return;
3481 }
3482
3483 if (msg.status == NULL || msg.noa == NULL) {
3484 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3485 "P2P: No Status or NoA attribute in P2P Presence "
3486 "Response");
3487 p2p_parse_free(&msg);
3488 return;
3489 }
3490
3491 if (*msg.status) {
3492 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3493 "P2P: P2P Presence Request was rejected: status %u",
3494 *msg.status);
3495 p2p_parse_free(&msg);
3496 return;
3497 }
3498
3499 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3500 "P2P: P2P Presence Request was accepted");
3501 wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
3502 msg.noa, msg.noa_len);
3503 /* TODO: process NoA */
3504 p2p_parse_free(&msg);
3505}
3506
3507
3508static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
3509{
3510 struct p2p_data *p2p = eloop_ctx;
3511
3512 if (p2p->ext_listen_interval) {
3513 /* Schedule next extended listen timeout */
3514 eloop_register_timeout(p2p->ext_listen_interval_sec,
3515 p2p->ext_listen_interval_usec,
3516 p2p_ext_listen_timeout, p2p, NULL);
3517 }
3518
f7a69057
JM
3519 if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
3520 /*
3521 * This should not really happen, but it looks like the Listen
3522 * command may fail is something else (e.g., a scan) was
3523 * running at an inconvenient time. As a workaround, allow new
3524 * Extended Listen operation to be started.
3525 */
3526 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Previous "
3527 "Extended Listen operation had not been completed - "
3528 "try again");
3529 p2p->ext_listen_only = 0;
3530 p2p_set_state(p2p, P2P_IDLE);
3531 }
3532
b22128ef
JM
3533 if (p2p->state != P2P_IDLE) {
3534 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip Extended "
3535 "Listen timeout in active state (%s)",
3536 p2p_state_txt(p2p->state));
3537 return;
3538 }
3539
3540 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Extended Listen timeout");
3541 p2p->ext_listen_only = 1;
3542 if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
3543 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
3544 "Listen state for Extended Listen Timing");
3545 p2p->ext_listen_only = 0;
3546 }
3547}
3548
3549
3550int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
3551 unsigned int interval)
3552{
3553 if (period > 65535 || interval > 65535 || period > interval ||
3554 (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
3555 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3556 "P2P: Invalid Extended Listen Timing request: "
3557 "period=%u interval=%u", period, interval);
3558 return -1;
3559 }
3560
3561 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
3562
3563 if (interval == 0) {
3564 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3565 "P2P: Disabling Extended Listen Timing");
3566 p2p->ext_listen_period = 0;
3567 p2p->ext_listen_interval = 0;
3568 return 0;
3569 }
3570
3571 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3572 "P2P: Enabling Extended Listen Timing: period %u msec, "
3573 "interval %u msec", period, interval);
3574 p2p->ext_listen_period = period;
3575 p2p->ext_listen_interval = interval;
3576 p2p->ext_listen_interval_sec = interval / 1000;
3577 p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
3578
3579 eloop_register_timeout(p2p->ext_listen_interval_sec,
3580 p2p->ext_listen_interval_usec,
3581 p2p_ext_listen_timeout, p2p, NULL);
3582
3583 return 0;
3584}
3585
3586
3587void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3588 const u8 *ie, size_t ie_len)
3589{
3590 struct p2p_message msg;
3591
3592 if (bssid == NULL || ie == NULL)
3593 return;
3594
3595 os_memset(&msg, 0, sizeof(msg));
3596 if (p2p_parse_ies(ie, ie_len, &msg))
3597 return;
3598 if (msg.minor_reason_code == NULL)
3599 return;
3600
3601 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3602 "P2P: Deauthentication notification BSSID " MACSTR
3603 " reason_code=%u minor_reason_code=%u",
3604 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3605
3606 p2p_parse_free(&msg);
3607}
3608
3609
3610void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3611 const u8 *ie, size_t ie_len)
3612{
3613 struct p2p_message msg;
3614
3615 if (bssid == NULL || ie == NULL)
3616 return;
3617
3618 os_memset(&msg, 0, sizeof(msg));
3619 if (p2p_parse_ies(ie, ie_len, &msg))
3620 return;
3621 if (msg.minor_reason_code == NULL)
3622 return;
3623
3624 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3625 "P2P: Disassociation notification BSSID " MACSTR
3626 " reason_code=%u minor_reason_code=%u",
3627 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3628
3629 p2p_parse_free(&msg);
3630}
3631
3632
3633void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
3634{
3635 if (enabled) {
3636 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3637 "Device operations enabled");
3638 p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
3639 } else {
3640 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3641 "Device operations disabled");
3642 p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
3643 }
3644}
3645
3646
3647int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel)
3648{
3649 if (p2p_channel_to_freq(p2p->cfg->country, reg_class, channel) < 0)
3650 return -1;
3651
3652 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Set Listen channel: "
3653 "reg_class %u channel %u", reg_class, channel);
3654 p2p->cfg->reg_class = reg_class;
3655 p2p->cfg->channel = channel;
3656
3657 return 0;
3658}
3659
3660
3661int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
3662{
3663 wpa_hexdump_ascii(MSG_DEBUG, "P2P: New SSID postfix", postfix, len);
3664 if (postfix == NULL) {
3665 p2p->cfg->ssid_postfix_len = 0;
3666 return 0;
3667 }
3668 if (len > sizeof(p2p->cfg->ssid_postfix))
3669 return -1;
3670 os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
3671 p2p->cfg->ssid_postfix_len = len;
3672 return 0;
3673}
3674
3675
2463ba70
JS
3676int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
3677 int cfg_op_channel)
3678{
3679 if (p2p_channel_to_freq(p2p->cfg->country, op_reg_class, op_channel)
3680 < 0)
3681 return -1;
3682
3683 wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, "P2P: Set Operating channel: "
3684 "reg_class %u channel %u", op_reg_class, op_channel);
3685 p2p->cfg->op_reg_class = op_reg_class;
3686 p2p->cfg->op_channel = op_channel;
3687 p2p->cfg->cfg_op_channel = cfg_op_channel;
3688 return 0;
3689}
3690
3691
b22128ef
JM
3692int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
3693 u8 *iface_addr)
3694{
3695 struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
3696 if (dev == NULL || is_zero_ether_addr(dev->interface_addr))
3697 return -1;
3698 os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
3699 return 0;
3700}
80c9582a
JM
3701
3702
4147a2cc
JM
3703int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
3704 u8 *dev_addr)
3705{
3706 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3707 if (dev == NULL)
3708 return -1;
c5db8e51 3709 os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
4147a2cc
JM
3710 return 0;
3711}
3712
3713
80c9582a
JM
3714void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
3715{
3716 os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
3717 if (is_zero_ether_addr(p2p->peer_filter))
3718 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Disable peer "
3719 "filter");
3720 else
3721 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Enable peer "
3722 "filter for " MACSTR, MAC2STR(p2p->peer_filter));
3723}
72044390
JM
3724
3725
3726void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
3727{
3728 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Cross connection %s",
3729 enabled ? "enabled" : "disabled");
3730 if (p2p->cross_connect == enabled)
3731 return;
3732 p2p->cross_connect = enabled;
3733 /* TODO: may need to tear down any action group where we are GO(?) */
3734}
f8d0131a
JM
3735
3736
3737int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
3738{
3739 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3740 if (dev == NULL)
3741 return -1;
3742 if (dev->oper_freq <= 0)
3743 return -1;
3744 return dev->oper_freq;
3745}
0f66abd2
SS
3746
3747
3748void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
3749{
3750 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Intra BSS distribution %s",
3751 enabled ? "enabled" : "disabled");
3752 p2p->cfg->p2p_intra_bss = enabled;
3753}
b5c9da8d
JM
3754
3755
3756void p2p_update_channel_list(struct p2p_data *p2p, struct p2p_channels *chan)
3757{
3758 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update channel list");
3759 os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
3760}
3f9285ff
JM
3761
3762
3763int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3764 const u8 *src, const u8 *bssid, const u8 *buf,
3765 size_t len, unsigned int wait_time)
3766{
3767 if (p2p->p2p_scan_running) {
3768 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Delay Action "
3769 "frame TX until p2p_scan completes");
3770 if (p2p->after_scan_tx) {
3771 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
3772 "previous pending Action frame TX");
3773 os_free(p2p->after_scan_tx);
3774 }
3775 p2p->after_scan_tx = os_malloc(sizeof(*p2p->after_scan_tx) +
3776 len);
3777 if (p2p->after_scan_tx == NULL)
3778 return -1;
3779 p2p->after_scan_tx->freq = freq;
3780 os_memcpy(p2p->after_scan_tx->dst, dst, ETH_ALEN);
3781 os_memcpy(p2p->after_scan_tx->src, src, ETH_ALEN);
3782 os_memcpy(p2p->after_scan_tx->bssid, bssid, ETH_ALEN);
3783 p2p->after_scan_tx->len = len;
3784 p2p->after_scan_tx->wait_time = wait_time;
3785 os_memcpy(p2p->after_scan_tx + 1, buf, len);
3786 return 0;
3787 }
3788
3789 return p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
3790 buf, len, wait_time);
3791}
7cfc4ac3
AGS
3792
3793
3794void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
3795 int freq_overall)
3796{
3797 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Best channel: 2.4 GHz: %d,"
3798 " 5 GHz: %d, overall: %d", freq_24, freq_5, freq_overall);
3799 p2p->best_freq_24 = freq_24;
3800 p2p->best_freq_5 = freq_5;
3801 p2p->best_freq_overall = freq_overall;
3802}
231bbd03
SS
3803
3804
3805const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
3806{
3807 if (p2p == NULL || p2p->go_neg_peer == NULL)
3808 return NULL;
c5db8e51 3809 return p2p->go_neg_peer->info.p2p_device_addr;
231bbd03 3810}
c165d81e
JB
3811
3812
3813const struct p2p_peer_info *
3814p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
3815{
3816 struct p2p_device *dev;
3817
3818 if (addr) {
3819 dev = p2p_get_device(p2p, addr);
3820 if (!dev)
3821 return NULL;
3822
3823 if (!next) {
3824 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
3825 return NULL;
3826
3827 return &dev->info;
3828 } else {
3829 do {
3830 dev = dl_list_first(&dev->list,
3831 struct p2p_device,
3832 list);
3833 if (&dev->list == &p2p->devices)
3834 return NULL;
3835 } while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
3836 }
3837 } else {
3838 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
3839 if (!dev)
3840 return NULL;
3841 while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
3842 dev = dl_list_first(&dev->list,
3843 struct p2p_device,
3844 list);
3845 if (&dev->list == &p2p->devices)
3846 return NULL;
3847 }
3848 }
3849
3850 return &dev->info;
3851}
303f60d3
JM
3852
3853
3854int p2p_in_progress(struct p2p_data *p2p)
3855{
3856 if (p2p == NULL)
3857 return 0;
fc6997b3 3858 return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
303f60d3 3859}