p2p_sd.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947
  1. /*
  2. * Wi-Fi Direct - P2P service discovery
  3. * Copyright (c) 2009, Atheros Communications
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "common/ieee802_11_defs.h"
  11. #include "common/gas.h"
  12. #include "p2p_i.h"
  13. #include "p2p.h"
  14. #ifdef CONFIG_WIFI_DISPLAY
  15. static int wfd_wsd_supported(struct wpabuf *wfd)
  16. {
  17. const u8 *pos, *end;
  18. u8 subelem;
  19. u16 len;
  20. if (wfd == NULL)
  21. return 0;
  22. pos = wpabuf_head(wfd);
  23. end = pos + wpabuf_len(wfd);
  24. while (pos + 3 <= end) {
  25. subelem = *pos++;
  26. len = WPA_GET_BE16(pos);
  27. pos += 2;
  28. if (pos + len > end)
  29. break;
  30. if (subelem == WFD_SUBELEM_DEVICE_INFO && len >= 6) {
  31. u16 info = WPA_GET_BE16(pos);
  32. return !!(info & 0x0040);
  33. }
  34. pos += len;
  35. }
  36. return 0;
  37. }
  38. #endif /* CONFIG_WIFI_DISPLAY */
  39. struct p2p_sd_query * p2p_pending_sd_req(struct p2p_data *p2p,
  40. struct p2p_device *dev)
  41. {
  42. struct p2p_sd_query *q;
  43. int wsd = 0;
  44. if (!(dev->info.dev_capab & P2P_DEV_CAPAB_SERVICE_DISCOVERY))
  45. return NULL; /* peer does not support SD */
  46. #ifdef CONFIG_WIFI_DISPLAY
  47. if (wfd_wsd_supported(dev->info.wfd_subelems))
  48. wsd = 1;
  49. #endif /* CONFIG_WIFI_DISPLAY */
  50. for (q = p2p->sd_queries; q; q = q->next) {
  51. /* Use WSD only if the peer indicates support or it */
  52. if (q->wsd && !wsd)
  53. continue;
  54. if (q->for_all_peers && !(dev->flags & P2P_DEV_SD_INFO))
  55. return q;
  56. if (!q->for_all_peers &&
  57. os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
  58. 0)
  59. return q;
  60. }
  61. return NULL;
  62. }
  63. static int p2p_unlink_sd_query(struct p2p_data *p2p,
  64. struct p2p_sd_query *query)
  65. {
  66. struct p2p_sd_query *q, *prev;
  67. q = p2p->sd_queries;
  68. prev = NULL;
  69. while (q) {
  70. if (q == query) {
  71. if (prev)
  72. prev->next = q->next;
  73. else
  74. p2p->sd_queries = q->next;
  75. if (p2p->sd_query == query)
  76. p2p->sd_query = NULL;
  77. return 1;
  78. }
  79. prev = q;
  80. q = q->next;
  81. }
  82. return 0;
  83. }
  84. static void p2p_free_sd_query(struct p2p_sd_query *q)
  85. {
  86. if (q == NULL)
  87. return;
  88. wpabuf_free(q->tlvs);
  89. os_free(q);
  90. }
  91. void p2p_free_sd_queries(struct p2p_data *p2p)
  92. {
  93. struct p2p_sd_query *q, *prev;
  94. q = p2p->sd_queries;
  95. p2p->sd_queries = NULL;
  96. while (q) {
  97. prev = q;
  98. q = q->next;
  99. p2p_free_sd_query(prev);
  100. }
  101. }
  102. static struct wpabuf * p2p_build_sd_query(u16 update_indic,
  103. struct wpabuf *tlvs)
  104. {
  105. struct wpabuf *buf;
  106. u8 *len_pos;
  107. buf = gas_anqp_build_initial_req(0, 100 + wpabuf_len(tlvs));
  108. if (buf == NULL)
  109. return NULL;
  110. /* ANQP Query Request Frame */
  111. len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
  112. wpabuf_put_be24(buf, OUI_WFA);
  113. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  114. wpabuf_put_le16(buf, update_indic); /* Service Update Indicator */
  115. wpabuf_put_buf(buf, tlvs);
  116. gas_anqp_set_element_len(buf, len_pos);
  117. gas_anqp_set_len(buf);
  118. return buf;
  119. }
  120. static void p2p_send_gas_comeback_req(struct p2p_data *p2p, const u8 *dst,
  121. u8 dialog_token, int freq)
  122. {
  123. struct wpabuf *req;
  124. req = gas_build_comeback_req(dialog_token);
  125. if (req == NULL)
  126. return;
  127. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  128. if (p2p_send_action(p2p, freq, dst, p2p->cfg->dev_addr, dst,
  129. wpabuf_head(req), wpabuf_len(req), 200) < 0)
  130. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  131. "P2P: Failed to send Action frame");
  132. wpabuf_free(req);
  133. }
  134. static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code,
  135. u16 comeback_delay,
  136. u16 update_indic,
  137. const struct wpabuf *tlvs)
  138. {
  139. struct wpabuf *buf;
  140. u8 *len_pos;
  141. buf = gas_anqp_build_initial_resp(dialog_token, status_code,
  142. comeback_delay,
  143. 100 + (tlvs ? wpabuf_len(tlvs) : 0));
  144. if (buf == NULL)
  145. return NULL;
  146. if (tlvs) {
  147. /* ANQP Query Response Frame */
  148. len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
  149. wpabuf_put_be24(buf, OUI_WFA);
  150. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  151. /* Service Update Indicator */
  152. wpabuf_put_le16(buf, update_indic);
  153. wpabuf_put_buf(buf, tlvs);
  154. gas_anqp_set_element_len(buf, len_pos);
  155. }
  156. gas_anqp_set_len(buf);
  157. return buf;
  158. }
  159. static struct wpabuf * p2p_build_gas_comeback_resp(u8 dialog_token,
  160. u16 status_code,
  161. u16 update_indic,
  162. const u8 *data, size_t len,
  163. u8 frag_id, u8 more,
  164. u16 total_len)
  165. {
  166. struct wpabuf *buf;
  167. buf = gas_anqp_build_comeback_resp(dialog_token, status_code, frag_id,
  168. more, 0, 100 + len);
  169. if (buf == NULL)
  170. return NULL;
  171. if (frag_id == 0) {
  172. /* ANQP Query Response Frame */
  173. wpabuf_put_le16(buf, ANQP_VENDOR_SPECIFIC); /* Info ID */
  174. wpabuf_put_le16(buf, 3 + 1 + 2 + total_len);
  175. wpabuf_put_be24(buf, OUI_WFA);
  176. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  177. /* Service Update Indicator */
  178. wpabuf_put_le16(buf, update_indic);
  179. }
  180. wpabuf_put_data(buf, data, len);
  181. gas_anqp_set_len(buf);
  182. return buf;
  183. }
  184. int p2p_start_sd(struct p2p_data *p2p, struct p2p_device *dev)
  185. {
  186. struct wpabuf *req;
  187. int ret = 0;
  188. struct p2p_sd_query *query;
  189. int freq;
  190. freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
  191. if (freq <= 0) {
  192. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  193. "P2P: No Listen/Operating frequency known for the "
  194. "peer " MACSTR " to send SD Request",
  195. MAC2STR(dev->info.p2p_device_addr));
  196. return -1;
  197. }
  198. query = p2p_pending_sd_req(p2p, dev);
  199. if (query == NULL)
  200. return -1;
  201. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  202. "P2P: Start Service Discovery with " MACSTR,
  203. MAC2STR(dev->info.p2p_device_addr));
  204. req = p2p_build_sd_query(p2p->srv_update_indic, query->tlvs);
  205. if (req == NULL)
  206. return -1;
  207. p2p->sd_peer = dev;
  208. p2p->sd_query = query;
  209. p2p->pending_action_state = P2P_PENDING_SD;
  210. if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
  211. p2p->cfg->dev_addr, dev->info.p2p_device_addr,
  212. wpabuf_head(req), wpabuf_len(req), 5000) < 0) {
  213. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  214. "P2P: Failed to send Action frame");
  215. ret = -1;
  216. }
  217. wpabuf_free(req);
  218. return ret;
  219. }
  220. void p2p_rx_gas_initial_req(struct p2p_data *p2p, const u8 *sa,
  221. const u8 *data, size_t len, int rx_freq)
  222. {
  223. const u8 *pos = data;
  224. const u8 *end = data + len;
  225. const u8 *next;
  226. u8 dialog_token;
  227. u16 slen;
  228. int freq;
  229. u16 update_indic;
  230. if (p2p->cfg->sd_request == NULL)
  231. return;
  232. if (rx_freq > 0)
  233. freq = rx_freq;
  234. else
  235. freq = p2p_channel_to_freq(p2p->cfg->country,
  236. p2p->cfg->reg_class,
  237. p2p->cfg->channel);
  238. if (freq < 0)
  239. return;
  240. if (len < 1 + 2)
  241. return;
  242. dialog_token = *pos++;
  243. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  244. "P2P: GAS Initial Request from " MACSTR " (dialog token %u, "
  245. "freq %d)",
  246. MAC2STR(sa), dialog_token, rx_freq);
  247. if (*pos != WLAN_EID_ADV_PROTO) {
  248. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  249. "P2P: Unexpected IE in GAS Initial Request: %u", *pos);
  250. return;
  251. }
  252. pos++;
  253. slen = *pos++;
  254. next = pos + slen;
  255. if (next > end || slen < 2) {
  256. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  257. "P2P: Invalid IE in GAS Initial Request");
  258. return;
  259. }
  260. pos++; /* skip QueryRespLenLimit and PAME-BI */
  261. if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
  262. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  263. "P2P: Unsupported GAS advertisement protocol id %u",
  264. *pos);
  265. return;
  266. }
  267. pos = next;
  268. /* Query Request */
  269. if (pos + 2 > end)
  270. return;
  271. slen = WPA_GET_LE16(pos);
  272. pos += 2;
  273. if (pos + slen > end)
  274. return;
  275. end = pos + slen;
  276. /* ANQP Query Request */
  277. if (pos + 4 > end)
  278. return;
  279. if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
  280. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  281. "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
  282. return;
  283. }
  284. pos += 2;
  285. slen = WPA_GET_LE16(pos);
  286. pos += 2;
  287. if (pos + slen > end || slen < 3 + 1) {
  288. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  289. "P2P: Invalid ANQP Query Request length");
  290. return;
  291. }
  292. if (WPA_GET_BE24(pos) != OUI_WFA) {
  293. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  294. "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
  295. return;
  296. }
  297. pos += 3;
  298. if (*pos != P2P_OUI_TYPE) {
  299. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  300. "P2P: Unsupported ANQP vendor type %u", *pos);
  301. return;
  302. }
  303. pos++;
  304. if (pos + 2 > end)
  305. return;
  306. update_indic = WPA_GET_LE16(pos);
  307. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  308. "P2P: Service Update Indicator: %u", update_indic);
  309. pos += 2;
  310. p2p->cfg->sd_request(p2p->cfg->cb_ctx, freq, sa, dialog_token,
  311. update_indic, pos, end - pos);
  312. /* the response will be indicated with a call to p2p_sd_response() */
  313. }
  314. void p2p_sd_response(struct p2p_data *p2p, int freq, const u8 *dst,
  315. u8 dialog_token, const struct wpabuf *resp_tlvs)
  316. {
  317. struct wpabuf *resp;
  318. /* TODO: fix the length limit to match with the maximum frame length */
  319. if (wpabuf_len(resp_tlvs) > 1400) {
  320. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response long "
  321. "enough to require fragmentation");
  322. if (p2p->sd_resp) {
  323. /*
  324. * TODO: Could consider storing the fragmented response
  325. * separately for each peer to avoid having to drop old
  326. * one if there is more than one pending SD query.
  327. * Though, that would eat more memory, so there are
  328. * also benefits to just using a single buffer.
  329. */
  330. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
  331. "previous SD response");
  332. wpabuf_free(p2p->sd_resp);
  333. }
  334. p2p->sd_resp = wpabuf_dup(resp_tlvs);
  335. if (p2p->sd_resp == NULL) {
  336. wpa_msg(p2p->cfg->msg_ctx, MSG_ERROR, "P2P: Failed to "
  337. "allocate SD response fragmentation area");
  338. return;
  339. }
  340. os_memcpy(p2p->sd_resp_addr, dst, ETH_ALEN);
  341. p2p->sd_resp_dialog_token = dialog_token;
  342. p2p->sd_resp_pos = 0;
  343. p2p->sd_frag_id = 0;
  344. resp = p2p_build_sd_response(dialog_token, WLAN_STATUS_SUCCESS,
  345. 1, p2p->srv_update_indic, NULL);
  346. } else {
  347. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response fits "
  348. "in initial response");
  349. resp = p2p_build_sd_response(dialog_token,
  350. WLAN_STATUS_SUCCESS, 0,
  351. p2p->srv_update_indic, resp_tlvs);
  352. }
  353. if (resp == NULL)
  354. return;
  355. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  356. if (p2p_send_action(p2p, freq, dst, p2p->cfg->dev_addr,
  357. p2p->cfg->dev_addr,
  358. wpabuf_head(resp), wpabuf_len(resp), 200) < 0)
  359. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  360. "P2P: Failed to send Action frame");
  361. wpabuf_free(resp);
  362. }
  363. void p2p_rx_gas_initial_resp(struct p2p_data *p2p, const u8 *sa,
  364. const u8 *data, size_t len, int rx_freq)
  365. {
  366. const u8 *pos = data;
  367. const u8 *end = data + len;
  368. const u8 *next;
  369. u8 dialog_token;
  370. u16 status_code;
  371. u16 comeback_delay;
  372. u16 slen;
  373. u16 update_indic;
  374. if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
  375. os_memcmp(sa, p2p->sd_peer->info.p2p_device_addr, ETH_ALEN) != 0) {
  376. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  377. "P2P: Ignore unexpected GAS Initial Response from "
  378. MACSTR, MAC2STR(sa));
  379. return;
  380. }
  381. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  382. p2p_clear_timeout(p2p);
  383. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  384. "P2P: Received GAS Initial Response from " MACSTR " (len=%d)",
  385. MAC2STR(sa), (int) len);
  386. if (len < 5 + 2) {
  387. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  388. "P2P: Too short GAS Initial Response frame");
  389. return;
  390. }
  391. dialog_token = *pos++;
  392. /* TODO: check dialog_token match */
  393. status_code = WPA_GET_LE16(pos);
  394. pos += 2;
  395. comeback_delay = WPA_GET_LE16(pos);
  396. pos += 2;
  397. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  398. "P2P: dialog_token=%u status_code=%u comeback_delay=%u",
  399. dialog_token, status_code, comeback_delay);
  400. if (status_code) {
  401. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  402. "P2P: Service Discovery failed: status code %u",
  403. status_code);
  404. return;
  405. }
  406. if (*pos != WLAN_EID_ADV_PROTO) {
  407. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  408. "P2P: Unexpected IE in GAS Initial Response: %u",
  409. *pos);
  410. return;
  411. }
  412. pos++;
  413. slen = *pos++;
  414. next = pos + slen;
  415. if (next > end || slen < 2) {
  416. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  417. "P2P: Invalid IE in GAS Initial Response");
  418. return;
  419. }
  420. pos++; /* skip QueryRespLenLimit and PAME-BI */
  421. if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
  422. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  423. "P2P: Unsupported GAS advertisement protocol id %u",
  424. *pos);
  425. return;
  426. }
  427. pos = next;
  428. /* Query Response */
  429. if (pos + 2 > end) {
  430. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
  431. "Response");
  432. return;
  433. }
  434. slen = WPA_GET_LE16(pos);
  435. pos += 2;
  436. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
  437. slen);
  438. if (pos + slen > end) {
  439. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
  440. "Response data");
  441. return;
  442. }
  443. end = pos + slen;
  444. if (comeback_delay) {
  445. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Fragmented "
  446. "response - request fragments");
  447. if (p2p->sd_rx_resp) {
  448. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
  449. "old SD reassembly buffer");
  450. wpabuf_free(p2p->sd_rx_resp);
  451. p2p->sd_rx_resp = NULL;
  452. }
  453. p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
  454. return;
  455. }
  456. /* ANQP Query Response */
  457. if (pos + 4 > end)
  458. return;
  459. if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
  460. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  461. "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
  462. return;
  463. }
  464. pos += 2;
  465. slen = WPA_GET_LE16(pos);
  466. pos += 2;
  467. if (pos + slen > end || slen < 3 + 1) {
  468. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  469. "P2P: Invalid ANQP Query Response length");
  470. return;
  471. }
  472. if (WPA_GET_BE24(pos) != OUI_WFA) {
  473. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  474. "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
  475. return;
  476. }
  477. pos += 3;
  478. if (*pos != P2P_OUI_TYPE) {
  479. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  480. "P2P: Unsupported ANQP vendor type %u", *pos);
  481. return;
  482. }
  483. pos++;
  484. if (pos + 2 > end)
  485. return;
  486. update_indic = WPA_GET_LE16(pos);
  487. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  488. "P2P: Service Update Indicator: %u", update_indic);
  489. pos += 2;
  490. p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
  491. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  492. p2p->sd_peer = NULL;
  493. if (p2p->sd_query) {
  494. if (!p2p->sd_query->for_all_peers) {
  495. struct p2p_sd_query *q;
  496. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  497. "P2P: Remove completed SD query %p",
  498. p2p->sd_query);
  499. q = p2p->sd_query;
  500. p2p_unlink_sd_query(p2p, p2p->sd_query);
  501. p2p_free_sd_query(q);
  502. }
  503. p2p->sd_query = NULL;
  504. }
  505. if (p2p->cfg->sd_response)
  506. p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa, update_indic,
  507. pos, end - pos);
  508. p2p_continue_find(p2p);
  509. }
  510. void p2p_rx_gas_comeback_req(struct p2p_data *p2p, const u8 *sa,
  511. const u8 *data, size_t len, int rx_freq)
  512. {
  513. struct wpabuf *resp;
  514. u8 dialog_token;
  515. size_t frag_len;
  516. int more = 0;
  517. wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Request", data, len);
  518. if (len < 1)
  519. return;
  520. dialog_token = *data;
  521. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dialog Token: %u",
  522. dialog_token);
  523. if (dialog_token != p2p->sd_resp_dialog_token) {
  524. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  525. "response fragment for dialog token %u", dialog_token);
  526. return;
  527. }
  528. if (p2p->sd_resp == NULL) {
  529. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  530. "response fragment available");
  531. return;
  532. }
  533. if (os_memcmp(sa, p2p->sd_resp_addr, ETH_ALEN) != 0) {
  534. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  535. "response fragment for " MACSTR, MAC2STR(sa));
  536. return;
  537. }
  538. frag_len = wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos;
  539. if (frag_len > 1400) {
  540. frag_len = 1400;
  541. more = 1;
  542. }
  543. resp = p2p_build_gas_comeback_resp(dialog_token, WLAN_STATUS_SUCCESS,
  544. p2p->srv_update_indic,
  545. wpabuf_head_u8(p2p->sd_resp) +
  546. p2p->sd_resp_pos, frag_len,
  547. p2p->sd_frag_id, more,
  548. wpabuf_len(p2p->sd_resp));
  549. if (resp == NULL)
  550. return;
  551. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send GAS Comeback "
  552. "Response (frag_id %d more=%d frag_len=%d)",
  553. p2p->sd_frag_id, more, (int) frag_len);
  554. p2p->sd_frag_id++;
  555. p2p->sd_resp_pos += frag_len;
  556. if (more) {
  557. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: %d more bytes "
  558. "remain to be sent",
  559. (int) (wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos));
  560. } else {
  561. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: All fragments of "
  562. "SD response sent");
  563. wpabuf_free(p2p->sd_resp);
  564. p2p->sd_resp = NULL;
  565. }
  566. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  567. if (p2p_send_action(p2p, rx_freq, sa, p2p->cfg->dev_addr,
  568. p2p->cfg->dev_addr,
  569. wpabuf_head(resp), wpabuf_len(resp), 200) < 0)
  570. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  571. "P2P: Failed to send Action frame");
  572. wpabuf_free(resp);
  573. }
  574. void p2p_rx_gas_comeback_resp(struct p2p_data *p2p, const u8 *sa,
  575. const u8 *data, size_t len, int rx_freq)
  576. {
  577. const u8 *pos = data;
  578. const u8 *end = data + len;
  579. const u8 *next;
  580. u8 dialog_token;
  581. u16 status_code;
  582. u8 frag_id;
  583. u8 more_frags;
  584. u16 comeback_delay;
  585. u16 slen;
  586. wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Response", data, len);
  587. if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
  588. os_memcmp(sa, p2p->sd_peer->info.p2p_device_addr, ETH_ALEN) != 0) {
  589. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  590. "P2P: Ignore unexpected GAS Comeback Response from "
  591. MACSTR, MAC2STR(sa));
  592. return;
  593. }
  594. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  595. p2p_clear_timeout(p2p);
  596. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  597. "P2P: Received GAS Comeback Response from " MACSTR " (len=%d)",
  598. MAC2STR(sa), (int) len);
  599. if (len < 6 + 2) {
  600. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  601. "P2P: Too short GAS Comeback Response frame");
  602. return;
  603. }
  604. dialog_token = *pos++;
  605. /* TODO: check dialog_token match */
  606. status_code = WPA_GET_LE16(pos);
  607. pos += 2;
  608. frag_id = *pos & 0x7f;
  609. more_frags = (*pos & 0x80) >> 7;
  610. pos++;
  611. comeback_delay = WPA_GET_LE16(pos);
  612. pos += 2;
  613. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  614. "P2P: dialog_token=%u status_code=%u frag_id=%d more_frags=%d "
  615. "comeback_delay=%u",
  616. dialog_token, status_code, frag_id, more_frags,
  617. comeback_delay);
  618. /* TODO: check frag_id match */
  619. if (status_code) {
  620. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  621. "P2P: Service Discovery failed: status code %u",
  622. status_code);
  623. return;
  624. }
  625. if (*pos != WLAN_EID_ADV_PROTO) {
  626. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  627. "P2P: Unexpected IE in GAS Comeback Response: %u",
  628. *pos);
  629. return;
  630. }
  631. pos++;
  632. slen = *pos++;
  633. next = pos + slen;
  634. if (next > end || slen < 2) {
  635. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  636. "P2P: Invalid IE in GAS Comeback Response");
  637. return;
  638. }
  639. pos++; /* skip QueryRespLenLimit and PAME-BI */
  640. if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
  641. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  642. "P2P: Unsupported GAS advertisement protocol id %u",
  643. *pos);
  644. return;
  645. }
  646. pos = next;
  647. /* Query Response */
  648. if (pos + 2 > end) {
  649. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
  650. "Response");
  651. return;
  652. }
  653. slen = WPA_GET_LE16(pos);
  654. pos += 2;
  655. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
  656. slen);
  657. if (pos + slen > end) {
  658. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
  659. "Response data");
  660. return;
  661. }
  662. if (slen == 0) {
  663. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No Query Response "
  664. "data");
  665. return;
  666. }
  667. end = pos + slen;
  668. if (p2p->sd_rx_resp) {
  669. /*
  670. * ANQP header is only included in the first fragment; rest of
  671. * the fragments start with continue TLVs.
  672. */
  673. goto skip_nqp_header;
  674. }
  675. /* ANQP Query Response */
  676. if (pos + 4 > end)
  677. return;
  678. if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
  679. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  680. "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
  681. return;
  682. }
  683. pos += 2;
  684. slen = WPA_GET_LE16(pos);
  685. pos += 2;
  686. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: ANQP Query Response "
  687. "length: %u", slen);
  688. if (slen < 3 + 1) {
  689. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  690. "P2P: Invalid ANQP Query Response length");
  691. return;
  692. }
  693. if (pos + 4 > end)
  694. return;
  695. if (WPA_GET_BE24(pos) != OUI_WFA) {
  696. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  697. "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
  698. return;
  699. }
  700. pos += 3;
  701. if (*pos != P2P_OUI_TYPE) {
  702. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  703. "P2P: Unsupported ANQP vendor type %u", *pos);
  704. return;
  705. }
  706. pos++;
  707. if (pos + 2 > end)
  708. return;
  709. p2p->sd_rx_update_indic = WPA_GET_LE16(pos);
  710. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  711. "P2P: Service Update Indicator: %u", p2p->sd_rx_update_indic);
  712. pos += 2;
  713. skip_nqp_header:
  714. if (wpabuf_resize(&p2p->sd_rx_resp, end - pos) < 0)
  715. return;
  716. wpabuf_put_data(p2p->sd_rx_resp, pos, end - pos);
  717. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Current SD reassembly "
  718. "buffer length: %u",
  719. (unsigned int) wpabuf_len(p2p->sd_rx_resp));
  720. if (more_frags) {
  721. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: More fragments "
  722. "remains");
  723. /* TODO: what would be a good size limit? */
  724. if (wpabuf_len(p2p->sd_rx_resp) > 64000) {
  725. wpabuf_free(p2p->sd_rx_resp);
  726. p2p->sd_rx_resp = NULL;
  727. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too long "
  728. "SD response - drop it");
  729. return;
  730. }
  731. p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
  732. return;
  733. }
  734. p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
  735. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  736. p2p->sd_peer = NULL;
  737. if (p2p->sd_query) {
  738. if (!p2p->sd_query->for_all_peers) {
  739. struct p2p_sd_query *q;
  740. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  741. "P2P: Remove completed SD query %p",
  742. p2p->sd_query);
  743. q = p2p->sd_query;
  744. p2p_unlink_sd_query(p2p, p2p->sd_query);
  745. p2p_free_sd_query(q);
  746. }
  747. p2p->sd_query = NULL;
  748. }
  749. if (p2p->cfg->sd_response)
  750. p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa,
  751. p2p->sd_rx_update_indic,
  752. wpabuf_head(p2p->sd_rx_resp),
  753. wpabuf_len(p2p->sd_rx_resp));
  754. wpabuf_free(p2p->sd_rx_resp);
  755. p2p->sd_rx_resp = NULL;
  756. p2p_continue_find(p2p);
  757. }
  758. void * p2p_sd_request(struct p2p_data *p2p, const u8 *dst,
  759. const struct wpabuf *tlvs)
  760. {
  761. struct p2p_sd_query *q;
  762. q = os_zalloc(sizeof(*q));
  763. if (q == NULL)
  764. return NULL;
  765. if (dst)
  766. os_memcpy(q->peer, dst, ETH_ALEN);
  767. else
  768. q->for_all_peers = 1;
  769. q->tlvs = wpabuf_dup(tlvs);
  770. if (q->tlvs == NULL) {
  771. p2p_free_sd_query(q);
  772. return NULL;
  773. }
  774. q->next = p2p->sd_queries;
  775. p2p->sd_queries = q;
  776. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Added SD Query %p", q);
  777. if (dst == NULL) {
  778. struct p2p_device *dev;
  779. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
  780. dev->flags &= ~P2P_DEV_SD_INFO;
  781. }
  782. return q;
  783. }
  784. #ifdef CONFIG_WIFI_DISPLAY
  785. void * p2p_sd_request_wfd(struct p2p_data *p2p, const u8 *dst,
  786. const struct wpabuf *tlvs)
  787. {
  788. struct p2p_sd_query *q;
  789. q = p2p_sd_request(p2p, dst, tlvs);
  790. if (q)
  791. q->wsd = 1;
  792. return q;
  793. }
  794. #endif /* CONFIG_WIFI_DISPLAY */
  795. void p2p_sd_service_update(struct p2p_data *p2p)
  796. {
  797. p2p->srv_update_indic++;
  798. }
  799. int p2p_sd_cancel_request(struct p2p_data *p2p, void *req)
  800. {
  801. if (p2p_unlink_sd_query(p2p, req)) {
  802. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  803. "P2P: Cancel pending SD query %p", req);
  804. p2p_free_sd_query(req);
  805. return 0;
  806. }
  807. return -1;
  808. }