]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
P2P2: Add bootstrapping support with PD frames
authorShivani Baranwal <quic_shivbara@quicinc.com>
Mon, 5 Aug 2024 09:33:07 +0000 (15:03 +0530)
committerJouni Malinen <j@w1.fi>
Tue, 27 Aug 2024 20:50:20 +0000 (23:50 +0300)
Add support for P2P2 bootstrapping with comeback mechanism using
Provision Discovery frames. Extend the control interface command
P2P_CONNECT to allow P2P2 bootstrapping handshake.

Signed-off-by: Shivani Baranwal <quic_shivbara@quicinc.com>
src/p2p/p2p.c
src/p2p/p2p.h
src/p2p/p2p_go_neg.c
src/p2p/p2p_i.h
src/p2p/p2p_pd.c
wpa_supplicant/ctrl_iface.c
wpa_supplicant/dbus/dbus_new_handlers_p2p.c
wpa_supplicant/p2p_supplicant.c
wpa_supplicant/p2p_supplicant.h
wpa_supplicant/wpa_supplicant_i.h

index c9a4626328d2084e7f50e92ae00116309719830f..cc7b4805005ee27437f3b8cf30ea8ae052cebf74 100644 (file)
@@ -954,6 +954,7 @@ static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
                dev->info.wps_vendor_ext[i] = NULL;
        }
 
+       os_free(dev->bootstrap_params);
        wpabuf_free(dev->info.wfd_subelems);
        wpabuf_free(dev->info.vendor_elems);
        wpabuf_free(dev->go_neg_conf);
@@ -1599,7 +1600,8 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
                int go_intent, const u8 *own_interface_addr,
                unsigned int force_freq, int persistent_group,
                const u8 *force_ssid, size_t force_ssid_len,
-               int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id)
+               int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
+               bool p2p2, u16 bootstrap, const char *password)
 {
        struct p2p_device *dev;
 
@@ -1683,6 +1685,10 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
 
        dev->wps_method = wps_method;
        dev->oob_pw_id = oob_pw_id;
+       dev->p2p2 = p2p2;
+       dev->req_bootstrap_method = bootstrap;
+       if (password && os_strlen(password) < sizeof(dev->password))
+               os_strlcpy(dev->password, password, sizeof(dev->password));
        dev->status = P2P_SC_SUCCESS;
 
        if (p2p->p2p_scan_running) {
@@ -1701,7 +1707,8 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
                  int go_intent, const u8 *own_interface_addr,
                  unsigned int force_freq, int persistent_group,
                  const u8 *force_ssid, size_t force_ssid_len,
-                 unsigned int pref_freq, u16 oob_pw_id)
+                 unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
+                 const char *password)
 {
        struct p2p_device *dev;
 
@@ -1735,6 +1742,10 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
        dev->flags &= ~P2P_DEV_USER_REJECTED;
        dev->go_neg_req_sent = 0;
        dev->go_state = UNKNOWN_GO;
+       dev->req_bootstrap_method = bootstrap;
+
+       if (password && os_strlen(password) < sizeof(dev->password))
+               os_strlcpy(dev->password, password, sizeof(dev->password));
        p2p_set_dev_persistent(dev, persistent_group);
        p2p->go_intent = go_intent;
        os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
@@ -1927,7 +1938,7 @@ static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
                p2p_handle_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
                break;
        case P2P_PROV_DISC_RESP:
-               p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1);
+               p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1, rx_freq);
                break;
        case P2P_DEV_DISC_REQ:
                p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
@@ -3061,6 +3072,9 @@ struct p2p_data * p2p_init(const struct p2p_config *cfg)
        p2p->go_timeout = 100;
        p2p->client_timeout = 20;
        p2p->num_p2p_sd_queries = 0;
+       /* Default comeback after one second */
+       if (!p2p->cfg->comeback_after)
+               p2p->cfg->comeback_after = 977; /* TUs */
        p2p_pairing_info_init(p2p);
 
        p2p_dbg(p2p, "initialized");
@@ -3439,7 +3453,7 @@ static void p2p_retry_pd(struct p2p_data *p2p)
                if (!ether_addr_equal(p2p->pending_pd_devaddr,
                                      dev->info.p2p_device_addr))
                        continue;
-               if (!dev->req_config_methods)
+               if (!dev->req_config_methods && !dev->req_bootstrap_method)
                        continue;
 
                p2p_dbg(p2p, "Send pending Provision Discovery Request to "
@@ -5868,6 +5882,7 @@ void p2p_process_usd_elems(struct p2p_data *p2p, const u8 *ies, u16 ies_len,
                return;
        }
 
+       dev->p2p2 = true;
        /* Reset info from old IEs */
        dev->info.reg_info = 0;
        os_memset(&dev->info.pairing_config, 0,
index 5731bdcbd13c9ca7f5567753e697bc00ec49724d..401ee32635ff1340a8db415b1ef5e04e779a8de1 100644 (file)
@@ -678,6 +678,13 @@ struct p2p_config {
         */
        bool twt_power_mgmt;
 
+       /**
+        * comeback_after - Bootstrap request unauthorized for peer
+        *
+        * Ask to come back after this many TUs.
+        */
+       u16 comeback_after;
+
        /**
         * cb_ctx - Context to use with callback functions
         */
@@ -1225,6 +1232,19 @@ struct p2p_config {
        int (*get_pref_freq_list)(void *ctx, int go,
                                  unsigned int *len,
                                  struct weighted_pcl *freq_list);
+
+       /**
+        * register_bootstrap_comeback - Register timeout to initiate bootstrap
+        *      comeback request
+        * @ctx: Callback context from cb_ctx
+        * @addr: P2P Device Address to which comeback request is to be sent
+        * @comeback_after: Time in TUs after which comeback request is sent
+        *
+        * This function can be used to send comeback request after given
+        * timeout.
+        */
+       void (*register_bootstrap_comeback)(void *ctx, const u8 *addr,
+                                           u16 comeback_after);
 };
 
 
@@ -1408,6 +1428,10 @@ void p2p_stop_listen(struct p2p_data *p2p);
  *     formation
  * @pref_freq: Preferred operating frequency in MHz or 0 (this is only used if
  *     force_freq == 0)
+ * @oob_pw_id: OOB password identifier
+ * @p2p2: Device supports P2P2 features
+ * @bootstrap: Bootstrapping method requested for P2P2 provision discovery
+ * @password: P2P2 pairing password or %NULL for opportunistic method
  * Returns: 0 on success, -1 on failure
  */
 int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
@@ -1415,7 +1439,8 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
                int go_intent, const u8 *own_interface_addr,
                unsigned int force_freq, int persistent_group,
                const u8 *force_ssid, size_t force_ssid_len,
-               int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id);
+               int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
+               bool p2p2, u16 bootstrap, const char *password);
 
 /**
  * p2p_authorize - Authorize P2P group formation (GO negotiation)
@@ -1433,6 +1458,9 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
  * @force_ssid_len: Length of $force_ssid buffer
  * @pref_freq: Preferred operating frequency in MHz or 0 (this is only used if
  *     force_freq == 0)
+ * @oob_pw_id: OOB password identifier
+ * @bootstrap: Bootstrapping method requested for P2P2 provision discovery
+ * @password: P2P2 pairing password or %NULL for opportunistic method
  * Returns: 0 on success, -1 on failure
  *
  * This is like p2p_connect(), but the actual group negotiation is not
@@ -1443,7 +1471,8 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
                  int go_intent, const u8 *own_interface_addr,
                  unsigned int force_freq, int persistent_group,
                  const u8 *force_ssid, size_t force_ssid_len,
-                 unsigned int pref_freq, u16 oob_pw_id);
+                 unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
+                 const char *password);
 
 /**
  * p2p_reject - Reject peer device (explicitly block connection attempts)
index 30901b34ddd535924a4f302c712fdc037eda696a..04e5139d66bea8f0606265cb300f85573a6ed97d 100644 (file)
@@ -244,6 +244,8 @@ int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev)
                        config_method = WPS_CONFIG_PUSHBUTTON;
                else if (dev->wps_method == WPS_P2PS)
                        config_method = WPS_CONFIG_P2PS;
+               else if (dev->p2p2 && dev->req_bootstrap_method)
+                       config_method = WPS_NOT_READY;
                else
                        return -1;
                return p2p_prov_disc_req(p2p, dev->info.p2p_device_addr,
index 344bece21105399c7d689ab1d9a2947579c43794..1c56175260034c7da9410f4829a565419c55d51c 100644 (file)
@@ -36,6 +36,26 @@ enum p2p_go_state {
        REMOTE_GO
 };
 
+/**
+ * struct bootstrap_params - P2P Device bootstrap request parameters
+ */
+struct p2p_bootstrap_params {
+       /* Bootstrap method */
+       u16 bootstrap_method;
+
+       /* Status code */
+       enum p2p_status_code status;
+
+       /* Cookie for comeback */
+       u8 cookie[50];
+
+       /* Cookie length */
+       size_t cookie_len;
+
+       /* Comeback time in TUs after which receiver is requested to retry */
+       int comeback_after;
+};
+
 /**
  * struct p2p_device - P2P Device data (internal to P2P module)
  */
@@ -150,6 +170,18 @@ struct p2p_device {
 
        int sd_pending_bcast_queries;
        bool support_6ghz;
+
+       /* Supports P2P2 */
+       bool p2p2;
+
+       /* Requested bootstrap method */
+       u16 req_bootstrap_method;
+
+       /* Bootstrap parameters received from peer */
+       struct p2p_bootstrap_params *bootstrap_params;
+
+       /* Password for P2P2 GO negotiation */
+       char password[100];
 };
 
 struct p2p_sd_query {
@@ -876,7 +908,7 @@ void p2p_check_pref_chan(struct p2p_data *p2p, int go,
 void p2p_handle_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
                              const u8 *data, size_t len, int rx_freq);
 void p2p_handle_prov_disc_resp(struct p2p_data *p2p, const u8 *sa,
-                              const u8 *data, size_t len);
+                              const u8 *data, size_t len, int rx_freq);
 int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
                           int join, int force_freq);
 void p2p_reset_pending_pd(struct p2p_data *p2p);
index c34f69f7f63e49407be965d17a9dde9f16e07581..77338802bf0be1d400a42cdd8f1063c415fd6bd4 100644 (file)
@@ -181,6 +181,64 @@ static void p2ps_add_pd_req_attrs(struct p2p_data *p2p, struct p2p_device *dev,
 }
 
 
+static struct wpabuf * p2p_build_prov_disc_bootstrap_req(struct p2p_data *p2p,
+                                                        struct p2p_device *dev)
+{
+       struct wpabuf *buf;
+       u8 *len;
+       size_t cookie_len = 0;
+       const u8 *cookie = NULL;
+       u8 dialog_token = dev->dialog_token;
+       u8 group_capab;
+
+       buf = wpabuf_alloc(1000);
+       if (!buf)
+               return NULL;
+
+       p2p_dbg(p2p, "P2P2: Building bootstrapping PD Request");
+       p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_REQ, dialog_token);
+
+       len = p2p_buf_add_ie_hdr(buf);
+
+       group_capab = 0;
+
+       if (p2p->num_groups) {
+               group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
+               if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
+                   (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
+                   p2p->cross_connect)
+                       group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
+       }
+       if (p2p->cfg->p2p_intra_bss)
+               group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
+
+       p2p_buf_add_capability(buf, p2p->dev_capab &
+                              ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
+                              group_capab);
+       p2p_buf_add_device_info(buf, p2p, NULL);
+
+       if (dev->bootstrap_params) {
+               cookie = dev->bootstrap_params->cookie;
+               cookie_len = dev->bootstrap_params->cookie_len;
+
+               if (dev->bootstrap_params->status == P2P_SC_COMEBACK)
+                       p2p_buf_add_status(buf, dev->bootstrap_params->status);
+       }
+
+       p2p_buf_update_ie_hdr(buf, len);
+
+       len = p2p_buf_add_p2p2_ie_hdr(buf);
+
+       p2p_buf_add_pcea(buf, p2p);
+       p2p_buf_add_pbma(buf, dev->req_bootstrap_method, cookie, cookie_len, 0);
+
+       p2p_buf_update_ie_hdr(buf, len);
+
+       wpa_printf(MSG_DEBUG, "P2P2: Added PCEA and PBMA in PD Request");
+       return buf;
+}
+
+
 static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
                                               struct p2p_device *dev,
                                               int join)
@@ -249,6 +307,42 @@ static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
 }
 
 
+static struct wpabuf *
+p2p_build_prov_disc_bootstrap_resp(struct p2p_data *p2p, struct p2p_device *dev,
+                                  u8 dialog_token, enum p2p_status_code status)
+{
+       struct wpabuf *buf;
+       u8 *cookie = NULL;
+       size_t cookie_len = 0;
+       int comeback_after = 0;
+       u8 *len;
+
+       buf = wpabuf_alloc(1000);
+       if (!buf)
+               return NULL;
+
+       p2p_dbg(p2p, "P2P2: Building boostrapping PD Response");
+       if (status == P2P_SC_COMEBACK && dev->bootstrap_params) {
+               cookie = dev->bootstrap_params->cookie;
+               cookie_len = dev->bootstrap_params->cookie_len;
+               comeback_after = dev->bootstrap_params->comeback_after;
+       }
+
+       p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_RESP, dialog_token);
+
+       len = p2p_buf_add_p2p2_ie_hdr(buf);
+
+       p2p_buf_add_status(buf, status);
+       p2p_buf_add_pcea(buf, p2p);
+       p2p_buf_add_pbma(buf, dev->req_bootstrap_method, cookie, cookie_len,
+                        comeback_after);
+
+       p2p_buf_update_ie_hdr(buf, len);
+
+       return buf;
+}
+
+
 static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
                                                struct p2p_device *dev,
                                                u8 dialog_token,
@@ -614,6 +708,171 @@ void p2p_process_pcea(struct p2p_data *p2p, struct p2p_message *msg,
 }
 
 
+static void p2p_process_prov_disc_bootstrap_req(struct p2p_data *p2p,
+                                               struct p2p_message *msg,
+                                               const u8 *sa, const u8 *data,
+                                               size_t len, int rx_freq)
+{
+       struct p2p_device *dev;
+       int freq;
+       struct wpabuf *resp;
+       u16 bootstrap;
+       size_t cookie_len = 0;
+       const u8 *pos, *cookie;
+       enum p2p_status_code status = P2P_SC_FAIL_INVALID_PARAMS;
+
+       p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR
+               " with bootstrapping Attribute (freq=%d)",
+               MAC2STR(sa), rx_freq);
+
+       dev = p2p_get_device(p2p, sa);
+       if (!dev) {
+               p2p_dbg(p2p, "Provision Discovery Request from unknown peer "
+                       MACSTR, MAC2STR(sa));
+
+               if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data, len, 0)) {
+                       p2p_dbg(p2p,
+                               "Provision Discovery Request add device failed "
+                               MACSTR, MAC2STR(sa));
+                       return;
+               }
+
+               dev = p2p_get_device(p2p, sa);
+               if (!dev) {
+                       p2p_dbg(p2p,
+                               "Provision Discovery device not found "
+                               MACSTR, MAC2STR(sa));
+                       return;
+               }
+       }
+       dev->p2p2 = true;
+
+       if (p2p->send_action_in_progress) {
+               p2p_dbg(p2p, "Dropping retry frame as response TX pending");
+               return;
+       }
+
+       p2p_update_peer_6ghz_capab(dev, msg);
+
+       if (msg->pcea_info && msg->pcea_info_len >= 2)
+               p2p_process_pcea(p2p, msg, dev);
+
+       pos = msg->pbma_info;
+
+       if (msg->pbma_info_len > 2 && msg->status &&
+           *msg->status == P2P_SC_COMEBACK) {
+               /* PBMA comeback request */
+               cookie_len = *pos++;
+               if (msg->pbma_info_len < 1 + cookie_len) {
+                       p2p_dbg(p2p, "Truncated PBMA");
+                       return;
+               }
+               cookie = pos;
+
+               if (!dev->bootstrap_params ||
+                   dev->bootstrap_params->cookie_len != cookie_len ||
+                   os_memcmp(cookie, dev->bootstrap_params->cookie,
+                             cookie_len) != 0) {
+                       status = P2P_SC_FAIL_REJECTED_BY_USER;
+                       goto out;
+               }
+
+               bootstrap = dev->bootstrap_params->bootstrap_method;
+
+               if (!dev->req_bootstrap_method) {
+                       status = P2P_SC_COMEBACK;
+                       goto out;
+               }
+       } else {
+               /* PBMA request */
+               bootstrap = WPA_GET_LE16(pos);
+
+               os_free(dev->bootstrap_params);
+               dev->bootstrap_params = NULL;
+
+               if (!dev->req_bootstrap_method) {
+                       dev->bootstrap_params =
+                               os_zalloc(sizeof(struct p2p_bootstrap_params));
+                       if (!dev->bootstrap_params)
+                               return;
+                       dev->bootstrap_params->bootstrap_method = bootstrap;
+                       dev->bootstrap_params->cookie_len = 4;
+                       if (os_get_random(dev->bootstrap_params->cookie,
+                                         dev->bootstrap_params->cookie_len) <
+                           0) {
+                               os_free(dev->bootstrap_params);
+                               dev->bootstrap_params = NULL;
+                               return;
+                       }
+                       dev->bootstrap_params->comeback_after =
+                               p2p->cfg->comeback_after;
+                       status = P2P_SC_COMEBACK;
+                       goto out;
+               }
+       }
+
+       if (bootstrap == P2P_PBMA_PIN_CODE_DISPLAY &&
+           dev->req_bootstrap_method == P2P_PBMA_PIN_CODE_KEYPAD)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_PIN_CODE_KEYPAD &&
+                dev->req_bootstrap_method == P2P_PBMA_PIN_CODE_DISPLAY)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_PASSPHRASE_DISPLAY &&
+                dev->req_bootstrap_method == P2P_PBMA_PASSPHRASE_KEYPAD)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_PASSPHRASE_KEYPAD &&
+                dev->req_bootstrap_method == P2P_PBMA_PASSPHRASE_DISPLAY)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_NFC_TAG &&
+                dev->req_bootstrap_method == P2P_PBMA_NFC_READER)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_NFC_READER &&
+                dev->req_bootstrap_method == P2P_PBMA_NFC_TAG)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_QR_DISPLAY &&
+                dev->req_bootstrap_method == P2P_PBMA_QR_SCAN)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_QR_SCAN &&
+                dev->req_bootstrap_method == P2P_PBMA_QR_DISPLAY)
+               status = P2P_SC_SUCCESS;
+       else if (bootstrap == P2P_PBMA_OPPORTUNISTIC &&
+                dev->req_bootstrap_method == P2P_PBMA_OPPORTUNISTIC)
+               status = P2P_SC_SUCCESS;
+       else
+               status = P2P_SC_FAIL_INVALID_PARAMS;
+
+       wpa_printf(MSG_ERROR, "Bootstrap received %d", bootstrap);
+
+out:
+       /* Send PD Bootstrapping Response for the PD Request */
+       resp = p2p_build_prov_disc_bootstrap_resp(p2p, dev, msg->dialog_token,
+                                                 status);
+       if (!resp)
+               return;
+
+       p2p_dbg(p2p, "Sending Provision Discovery Bootstrap Response");
+       if (rx_freq > 0)
+               freq = rx_freq;
+       else
+               freq = p2p_channel_to_freq(p2p->cfg->reg_class,
+                                          p2p->cfg->channel);
+       if (freq < 0) {
+               p2p_dbg(p2p, "Unknown operating class/channel");
+               wpabuf_free(resp);
+               return;
+       }
+       p2p->pending_action_state = P2P_PENDING_PD_RESPONSE;
+       if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
+                           p2p->cfg->dev_addr, wpabuf_head(resp),
+                           wpabuf_len(resp), 50) < 0)
+               p2p_dbg(p2p, "Failed to send Action frame");
+       else
+               p2p->send_action_in_progress = 1;
+
+       wpabuf_free(resp);
+}
+
+
 static void p2p_process_prov_disc_req(struct p2p_data *p2p,
                                      struct p2p_message *msg, const u8 *sa,
                                      const u8 *data, size_t len, int rx_freq)
@@ -1257,7 +1516,13 @@ void p2p_handle_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
        if (p2p_parse(data, len, &msg))
                return;
 
-       p2p_process_prov_disc_req(p2p, &msg, sa, data + 1, len - 1, rx_freq);
+       if (msg.pcea_info && msg.pbma_info)
+               p2p_process_prov_disc_bootstrap_req(p2p, &msg, sa, data + 1,
+                                                   len - 1, rx_freq);
+       else
+               p2p_process_prov_disc_req(p2p, &msg, sa, data + 1, len - 1,
+                                         rx_freq);
+
        p2p_parse_free(&msg);
 }
 
@@ -1360,6 +1625,91 @@ static int p2p_validate_p2ps_pd_resp(struct p2p_data *p2p,
 }
 
 
+static void p2p_process_prov_disc_bootstrap_resp(struct p2p_data *p2p,
+                                                struct p2p_message *msg,
+                                                const u8 *sa, const u8 *data,
+                                                size_t len, int rx_freq)
+{
+       struct p2p_device *dev;
+       u8 status = P2P_SC_SUCCESS;
+       size_t cookie_len = 0;
+       const u8 *pos, *cookie;
+       u16 comeback_after;
+
+       /* Parse the P2P status present */
+       if (msg->status)
+               status = *msg->status;
+
+       p2p_dbg(p2p, "Received Provision Discovery Bootstrap Response from "
+               MACSTR, MAC2STR(sa));
+
+       dev = p2p_get_device(p2p, sa);
+       if (!dev || !dev->req_bootstrap_method) {
+               p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR
+                       " with no pending request", MAC2STR(sa));
+               return;
+       }
+
+       p2p_update_peer_6ghz_capab(dev, msg);
+
+       if (dev->dialog_token != msg->dialog_token) {
+               p2p_dbg(p2p,
+                       "Ignore Provision Discovery Response with unexpected Dialog Token %u (expected %u)",
+                       msg->dialog_token, dev->dialog_token);
+               return;
+       }
+
+       if (p2p->pending_action_state == P2P_PENDING_PD) {
+               os_memset(p2p->pending_pd_devaddr, 0, ETH_ALEN);
+               p2p->pending_action_state = P2P_NO_PENDING_ACTION;
+       }
+
+       os_free(dev->bootstrap_params);
+       dev->bootstrap_params = NULL;
+
+       /* If the response is from the peer to whom a user initiated request
+        * was sent earlier, we reset that state information here. */
+       if (p2p->user_initiated_pd &&
+           ether_addr_equal(p2p->pending_pd_devaddr, sa))
+               p2p_reset_pending_pd(p2p);
+
+       if (status == P2P_SC_COMEBACK) {
+               /* PBMA comeback response */
+               pos = msg->pbma_info;
+               if (msg->pbma_info_len < 2 + 1)
+                       return;
+               comeback_after = WPA_GET_LE16(pos);
+               pos += 2;
+               cookie_len = *pos++;
+               if (msg->pbma_info_len < 2 + 1 + cookie_len) {
+                       p2p_dbg(p2p, "Truncated PBMA");
+                       return;
+               }
+               cookie = pos;
+
+               dev->bootstrap_params =
+                       os_zalloc(sizeof(struct p2p_bootstrap_params));
+               if (!dev->bootstrap_params)
+                       return;
+               dev->bootstrap_params->cookie_len = cookie_len;
+               os_memcpy(dev->bootstrap_params->cookie, cookie, cookie_len);
+               dev->bootstrap_params->comeback_after = comeback_after;
+               dev->bootstrap_params->bootstrap_method =
+                                               dev->req_bootstrap_method;
+               dev->bootstrap_params->status = status;
+
+               p2p->cfg->register_bootstrap_comeback(p2p->cfg->cb_ctx, sa,
+                                                     comeback_after);
+               p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
+               return;
+       }
+
+       p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
+       if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG)
+               dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
+}
+
+
 static void p2p_process_prov_disc_resp(struct p2p_data *p2p,
                                       struct p2p_message *msg, const u8 *sa,
                                       const u8 *data, size_t len)
@@ -1650,14 +2000,19 @@ out:
 
 
 void p2p_handle_prov_disc_resp(struct p2p_data *p2p, const u8 *sa,
-                              const u8 *data, size_t len)
+                              const u8 *data, size_t len, int rx_freq)
 {
        struct p2p_message msg;
 
        if (p2p_parse(data, len, &msg))
                return;
 
-       p2p_process_prov_disc_resp(p2p, &msg, sa, data + 1, len - 1);
+       if (msg.pcea_info && msg.pbma_info)
+               p2p_process_prov_disc_bootstrap_resp(p2p, &msg, sa, data + 1,
+                                                    len - 1, rx_freq);
+       else
+               p2p_process_prov_disc_resp(p2p, &msg, sa, data + 1, len - 1);
+
        p2p_parse_free(&msg);
 }
 
@@ -1691,7 +2046,7 @@ int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
                /* TODO: use device discoverability request through GO */
        }
 
-       if (p2p->p2ps_prov) {
+       if (!dev->p2p2 && p2p->p2ps_prov) {
                if (p2p->p2ps_prov->status == P2P_SC_SUCCESS_DEFERRED) {
                        if (p2p->p2ps_prov->method == WPS_CONFIG_DISPLAY)
                                dev->req_config_methods = WPS_CONFIG_KEYPAD;
@@ -1721,7 +2076,11 @@ int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
                        return -1;
        }
 
-       req = p2p_build_prov_disc_req(p2p, dev, join);
+       if (dev->p2p2)
+               req = p2p_build_prov_disc_bootstrap_req(p2p, dev);
+       else
+               req = p2p_build_prov_disc_req(p2p, dev, join);
+
        if (req == NULL)
                return -1;
 
@@ -1760,13 +2119,22 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
                return -1;
        }
 
+       if (dev->p2p2 && dev->req_bootstrap_method) {
+               p2p_dbg(p2p, "Provision Discovery Request with " MACSTR
+                       " (bootstrap methods 0x%x)",
+                       MAC2STR(peer_addr), dev->req_bootstrap_method);
+               goto out;
+       }
+
        p2p_dbg(p2p, "Provision Discovery Request with " MACSTR
                " (config methods 0x%x)",
                MAC2STR(peer_addr), config_methods);
+
        if (config_methods == 0 && !p2ps_prov) {
                os_free(p2ps_prov);
                return -1;
        }
+       dev->req_config_methods = config_methods;
 
        if (p2ps_prov && p2ps_prov->status == P2P_SC_SUCCESS_DEFERRED &&
            p2p->p2ps_prov) {
@@ -1774,12 +2142,12 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
                p2ps_prov->method = p2p->p2ps_prov->method;
        }
 
+out:
        /* Reset provisioning info */
        dev->wps_prov_info = 0;
        p2ps_prov_free(p2p);
        p2p->p2ps_prov = p2ps_prov;
 
-       dev->req_config_methods = config_methods;
        if (join)
                dev->flags |= P2P_DEV_PD_FOR_JOIN;
        else
@@ -1788,8 +2156,7 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
        if (p2p->state != P2P_IDLE && p2p->state != P2P_SEARCH &&
            p2p->state != P2P_LISTEN_ONLY) {
                p2p_dbg(p2p, "Busy with other operations; postpone Provision Discovery Request with "
-                       MACSTR " (config methods 0x%x)",
-                       MAC2STR(peer_addr), config_methods);
+                       MACSTR, MAC2STR(peer_addr));
                return 0;
        }
 
index 743e42e51536c68ca6e00eae920fb07b3ea85d35..b886c2226af69a9e8b6c1b38d86a2282b6778e77 100644 (file)
@@ -6376,6 +6376,10 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
        size_t group_ssid_len = 0;
        int he;
        bool allow_6ghz;
+       bool p2p2;
+       u16 bootstrap = 0;
+       const char *password = NULL;
+       char *token, *context = NULL;
 
        if (!wpa_s->global->p2p_init_wpa_s)
                return -1;
@@ -6388,7 +6392,9 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
        /* <addr> <"pbc" | "pin" | PIN> [label|display|keypad|p2ps]
         * [persistent|persistent=<network id>]
         * [join] [auth] [go_intent=<0..15>] [freq=<in MHz>] [provdisc]
-        * [ht40] [vht] [he] [edmg] [auto] [ssid=<hexdump>] */
+        * [ht40] [vht] [he] [edmg] [auto] [ssid=<hexdump>]
+        * [p2p2] [bstrapmethod=<value>] [password=<string>]
+        */
 
        if (hwaddr_aton(cmd, addr))
                return -1;
@@ -6422,6 +6428,7 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
                vht;
        he = (os_strstr(cmd, " he") != NULL) || wpa_s->conf->p2p_go_he;
        edmg = (os_strstr(cmd, " edmg") != NULL) || wpa_s->conf->p2p_go_edmg;
+       p2p2 = os_strstr(pos, " p2p2") != NULL;
 
        pos2 = os_strstr(pos, " go_intent=");
        if (pos2) {
@@ -6477,6 +6484,8 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
                wps_method = WPS_PBC;
        } else if (os_strstr(pos, "p2ps") != NULL) {
                wps_method = WPS_P2PS;
+       } else if (p2p2) {
+               wps_method = WPS_NOT_READY;
        } else {
                pin = pos;
                pos = os_strchr(pin, ' ');
@@ -6492,11 +6501,26 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
                }
        }
 
+       pos2 = os_strstr(pos, "bstrapmethod=");
+       if (pos2) {
+               pos2 += 13;
+               bootstrap = atoi(pos2);
+               pd = true;
+       }
+
+       while ((token = str_token(pos, " ", &context))) {
+               if (os_strncmp(token, "password=", 9) == 0) {
+                       password = token + 9;
+                       continue;
+               }
+       }
+
        new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method,
                                   persistent_group, automatic, join,
                                   auth, go_intent, freq, freq2, persistent_id,
                                   pd, ht40, vht, max_oper_chwidth, he, edmg,
-                                  group_ssid, group_ssid_len, allow_6ghz);
+                                  group_ssid, group_ssid_len, allow_6ghz, p2p2,
+                                  bootstrap, password);
        if (new_pin == -2) {
                os_memcpy(buf, "FAIL-CHANNEL-UNAVAILABLE\n", 25);
                return 25;
index 3de6ed89fa399ec87131b590c6cbe8b654aa1750..65bd478c1f61b2e38d7b237320316ff3773e94d2 100644 (file)
@@ -706,7 +706,7 @@ DBusMessage * wpas_dbus_handler_p2p_connect(DBusMessage *message,
        new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method,
                                   persistent_group, 0, join, authorize_only,
                                   go_intent, freq, 0, -1, 0, 0, 0, 0, 0, 0,
-                                  NULL, 0, false);
+                                  NULL, 0, false, 0, 0, NULL);
 
        if (new_pin >= 0) {
                char npin[9];
index cb23ddc501ea82ea9cc931a9bdf652b5937ff8d6..679d2df4fc3535c4a3a925c6a218a4678bf2270b 100644 (file)
@@ -4823,6 +4823,42 @@ static int wpas_p2p_get_pref_freq_list(void *ctx, int go,
 }
 
 
+static void wpas_p2p_send_bootstrap_comeback(void *eloop_ctx, void *timeout_ctx)
+{
+       struct wpa_supplicant *wpa_s = eloop_ctx;
+
+       wpa_printf(MSG_DEBUG, "P2P2: Send bootstrapping comeback PD Request");
+       wpas_p2p_connect(wpa_s, wpa_s->p2p_bootstrap_dev_addr, wpa_s->p2p_pin,
+                        wpa_s->p2p_wps_method, wpa_s->p2p_persistent_group, 0,
+                        0, 0, wpa_s->p2p_go_intent, wpa_s->p2p_connect_freq,
+                        wpa_s->p2p_go_vht_center_freq2,
+                        wpa_s->p2p_persistent_id,
+                        wpa_s->p2p_pd_before_go_neg,
+                        wpa_s->p2p_go_ht40,
+                        wpa_s->p2p_go_vht,
+                        wpa_s->p2p_go_max_oper_chwidth,
+                        wpa_s->p2p_go_he,
+                        wpa_s->p2p_go_edmg,
+                        NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p),
+                        wpa_s->p2p2, wpa_s->p2p_bootstrap, NULL);
+}
+
+
+static void wpas_p2p_register_bootstrap_comeback(void *ctx, const u8 *addr,
+                                                u16 comeback_after)
+{
+       unsigned int timeout_us;
+       struct wpa_supplicant *wpa_s = ctx;
+
+       timeout_us = comeback_after * 1024;
+       os_memcpy(wpa_s->p2p_bootstrap_dev_addr, addr, ETH_ALEN);
+
+       eloop_cancel_timeout(wpas_p2p_send_bootstrap_comeback, wpa_s, NULL);
+       eloop_register_timeout(0, timeout_us, wpas_p2p_send_bootstrap_comeback,
+                              wpa_s, NULL);
+}
+
+
 int wpas_p2p_mac_setup(struct wpa_supplicant *wpa_s)
 {
        u8 addr[ETH_ALEN] = {0};
@@ -4942,6 +4978,7 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
        p2p.p2ps_group_capability = p2ps_group_capability;
        p2p.get_pref_freq_list = wpas_p2p_get_pref_freq_list;
        p2p.p2p_6ghz_disable = wpa_s->conf->p2p_6ghz_disable;
+       p2p.register_bootstrap_comeback = wpas_p2p_register_bootstrap_comeback;
 
        os_memcpy(wpa_s->global->p2p_dev_addr, wpa_s->own_addr, ETH_ALEN);
        os_memcpy(p2p.dev_addr, wpa_s->global->p2p_dev_addr, ETH_ALEN);
@@ -5139,6 +5176,7 @@ void wpas_p2p_deinit(struct wpa_supplicant *wpa_s)
                wpa_s->p2p_send_action_work = NULL;
        }
        eloop_cancel_timeout(wpas_p2p_send_action_work_timeout, wpa_s, NULL);
+       eloop_cancel_timeout(wpas_p2p_send_bootstrap_comeback, wpa_s, NULL);
 
        wpabuf_free(wpa_s->p2p_oob_dev_pw);
        wpa_s->p2p_oob_dev_pw = NULL;
@@ -5221,7 +5259,8 @@ static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
                                 enum p2p_wps_method wps_method,
                                 int go_intent, const u8 *own_interface_addr,
                                 unsigned int force_freq, int persistent_group,
-                                struct wpa_ssid *ssid, unsigned int pref_freq)
+                                struct wpa_ssid *ssid, unsigned int pref_freq,
+                                bool p2p2, u16 bootstrap, const char *password)
 {
        if (persistent_group && wpa_s->conf->persistent_reconnect)
                persistent_group = 2;
@@ -5239,7 +5278,7 @@ static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
                           ssid ? ssid->ssid_len : 0,
                           wpa_s->p2p_pd_before_go_neg, pref_freq,
                           wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
-                          0);
+                          0, p2p2, bootstrap, password);
 }
 
 
@@ -5248,7 +5287,8 @@ static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
                                enum p2p_wps_method wps_method,
                                int go_intent, const u8 *own_interface_addr,
                                unsigned int force_freq, int persistent_group,
-                               struct wpa_ssid *ssid, unsigned int pref_freq)
+                               struct wpa_ssid *ssid, unsigned int pref_freq,
+                               u16 bootstrap, const char *password)
 {
        if (persistent_group && wpa_s->conf->persistent_reconnect)
                persistent_group = 2;
@@ -5258,7 +5298,7 @@ static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
                             persistent_group, ssid ? ssid->ssid : NULL,
                             ssid ? ssid->ssid_len : 0, pref_freq,
                             wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
-                            0);
+                            0, bootstrap, password);
 }
 
 
@@ -5442,7 +5482,9 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
                                         wpa_s->p2p_go_he,
                                         wpa_s->p2p_go_edmg,
                                         NULL, 0,
-                                        is_p2p_allow_6ghz(wpa_s->global->p2p));
+                                        is_p2p_allow_6ghz(wpa_s->global->p2p),
+                                        wpa_s->p2p2, wpa_s->p2p_bootstrap,
+                                        NULL);
                        return;
                }
 
@@ -5936,6 +5978,9 @@ static bool is_p2p_6ghz_supported(struct wpa_supplicant *wpa_s,
                      HOSTAPD_MODE_IEEE80211A, true))
                return false;
 
+       if (wpa_s->p2p2)
+               return true;
+
        if (!p2p_wfd_enabled(wpa_s->global->p2p))
                return false;
        if (peer_addr && !p2p_peer_wfd_enabled(wpa_s->global->p2p, peer_addr))
@@ -5987,6 +6032,10 @@ static int wpas_p2p_check_6ghz(struct wpa_supplicant *wpa_s,
  * @group_ssid: Specific Group SSID for join or %NULL if not set
  * @group_ssid_len: Length of @group_ssid in octets
  * @allow_6ghz: Allow P2P connection on 6 GHz channels
+ * @p2p2: Whether device is in P2P R2 mode
+ * @bootstrap: Requested bootstrap method for pairing in P2P2
+ * @password: Password for pairing setup or NULL for oppurtunistic method
+ *     in P2P2
  * Returns: 0 or new PIN (if pin was %NULL) on success, -1 on unspecified
  *     failure, -2 on failure due to channel not currently available,
  *     -3 if forced channel is not supported
@@ -5998,7 +6047,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                     int persistent_id, int pd, int ht40, int vht,
                     unsigned int vht_chwidth, int he, int edmg,
                     const u8 *group_ssid, size_t group_ssid_len,
-                    bool allow_6ghz)
+                    bool allow_6ghz, bool p2p2, u16 bootstrap,
+                    const char *password)
 {
        int force_freq = 0, pref_freq = 0;
        int ret = 0, res;
@@ -6018,6 +6068,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                        return -1;
        }
 
+       wpa_s->p2p2 = p2p2;
+
        if (wpas_p2p_check_6ghz(wpa_s, peer_addr, allow_6ghz, freq))
                return -2;
 
@@ -6048,6 +6100,7 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
        wpa_s->p2p_go_max_oper_chwidth = vht_chwidth;
        wpa_s->p2p_go_he = !!he;
        wpa_s->p2p_go_edmg = !!edmg;
+       wpa_s->p2p_bootstrap = bootstrap;
 
        if (pin)
                os_strlcpy(wpa_s->p2p_pin, pin, sizeof(wpa_s->p2p_pin));
@@ -6133,14 +6186,15 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                if (wpas_p2p_auth_go_neg(wpa_s, peer_addr, wps_method,
                                         go_intent, if_addr,
                                         force_freq, persistent_group, ssid,
-                                        pref_freq) < 0)
+                                        pref_freq, bootstrap, password) < 0)
                        return -1;
                return ret;
        }
 
        if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method,
                                  go_intent, if_addr, force_freq,
-                                 persistent_group, ssid, pref_freq) < 0) {
+                                 persistent_group, ssid, pref_freq, p2p2,
+                                 bootstrap, password) < 0) {
                if (wpa_s->create_p2p_iface)
                        wpas_p2p_remove_pending_group_interface(wpa_s);
                return -1;
@@ -8768,7 +8822,8 @@ static int wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
                         wpa_s->p2p_go_max_oper_chwidth,
                         wpa_s->p2p_go_he,
                         wpa_s->p2p_go_edmg,
-                        NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p));
+                        NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p),
+                        wpa_s->p2p2, wpa_s->p2p_bootstrap, NULL);
        return ret;
 }
 
@@ -9306,7 +9361,8 @@ static int wpas_p2p_nfc_join_group(struct wpa_supplicant *wpa_s,
                                -1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
                                wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
                                params->go_ssid_len ? params->go_ssid : NULL,
-                               params->go_ssid_len, false);
+                               params->go_ssid_len, false, wpa_s->p2p2,
+                               wpa_s->p2p_bootstrap, NULL);
 }
 
 
@@ -9385,7 +9441,8 @@ static int wpas_p2p_nfc_init_go_neg(struct wpa_supplicant *wpa_s,
                                forced_freq, wpa_s->p2p_go_vht_center_freq2,
                                -1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
                                wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
-                               NULL, 0, false);
+                               NULL, 0, false, wpa_s->p2p2,
+                               wpa_s->p2p_bootstrap, NULL);
 }
 
 
@@ -9402,7 +9459,8 @@ static int wpas_p2p_nfc_resp_go_neg(struct wpa_supplicant *wpa_s,
                               forced_freq, wpa_s->p2p_go_vht_center_freq2,
                               -1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
                               wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
-                              NULL, 0, false);
+                              NULL, 0, false, wpa_s->p2p2,
+                              wpa_s->p2p_bootstrap, NULL);
        if (res)
                return res;
 
index f864b6d95ad098c1e420849617868c30e2116857..a0fbddcea7fd212a4c7b0ccb114cae9822719f4f 100644 (file)
@@ -39,7 +39,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                     int persistent_id, int pd, int ht40, int vht,
                     unsigned int vht_chwidth, int he, int edmg,
                     const u8 *group_ssid, size_t group_ssid_len,
-                    bool allow_6ghz);
+                    bool allow_6ghz, bool p2p2, u16 bootstrap,
+                    const char *password);
 int wpas_p2p_handle_frequency_conflicts(struct wpa_supplicant *wpa_s,
                                           int freq, struct wpa_ssid *ssid);
 int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,
index 7f9d722b5c17ed02e12c27fd23fe3268ad6d20f1..3f704ecfd95dbe682816e8dfd02fc19ad2ff9433 100644 (file)
@@ -1113,6 +1113,7 @@ struct wpa_supplicant {
        int pending_pd_before_join;
        u8 pending_join_iface_addr[ETH_ALEN];
        u8 pending_join_dev_addr[ETH_ALEN];
+       u8 p2p_bootstrap_dev_addr[ETH_ALEN];
        int pending_join_wps_method;
        u8 p2p_join_ssid[SSID_MAX_LEN];
        size_t p2p_join_ssid_len;
@@ -1167,6 +1168,8 @@ struct wpa_supplicant {
        unsigned int p2ps_method_config_any:1;
        unsigned int p2p_cli_probe:1;
        unsigned int p2p_go_allow_dfs:1;
+       unsigned int p2p2:1;
+       u16 p2p_bootstrap;
        enum hostapd_hw_mode p2p_go_acs_band;
        int p2p_persistent_go_freq;
        int p2p_persistent_id;