p2p.c 98 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819
  1. /*
  2. * Wi-Fi Direct - P2P module
  3. * Copyright (c) 2009-2010, Atheros Communications
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "eloop.h"
  17. #include "common/ieee802_11_defs.h"
  18. #include "common/ieee802_11_common.h"
  19. #include "common/wpa_ctrl.h"
  20. #include "wps/wps_i.h"
  21. #include "p2p_i.h"
  22. #include "p2p.h"
  23. static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
  24. static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
  25. static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
  26. const u8 *sa, const u8 *data, size_t len,
  27. int rx_freq);
  28. static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
  29. const u8 *sa, const u8 *data,
  30. size_t len);
  31. static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
  32. static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
  33. /*
  34. * p2p_scan recovery timeout
  35. *
  36. * Many drivers are using 30 second timeout on scan results. Allow a bit larger
  37. * timeout for this to avoid hitting P2P timeout unnecessarily.
  38. */
  39. #define P2P_SCAN_TIMEOUT 35
  40. /**
  41. * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
  42. * entries will be removed
  43. */
  44. #define P2P_PEER_EXPIRATION_AGE 300
  45. #define P2P_PEER_EXPIRATION_INTERVAL (P2P_PEER_EXPIRATION_AGE / 2)
  46. static void p2p_expire_peers(struct p2p_data *p2p)
  47. {
  48. struct p2p_device *dev, *n;
  49. struct os_time now;
  50. size_t i;
  51. os_get_time(&now);
  52. dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
  53. if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
  54. continue;
  55. if (p2p->cfg->go_connected &&
  56. p2p->cfg->go_connected(p2p->cfg->cb_ctx,
  57. dev->info.p2p_device_addr)) {
  58. /*
  59. * We are connected as a client to a group in which the
  60. * peer is the GO, so do not expire the peer entry.
  61. */
  62. os_get_time(&dev->last_seen);
  63. continue;
  64. }
  65. for (i = 0; i < p2p->num_groups; i++) {
  66. if (p2p_group_is_client_connected(
  67. p2p->groups[i], dev->info.p2p_device_addr))
  68. break;
  69. }
  70. if (i < p2p->num_groups) {
  71. /*
  72. * The peer is connected as a client in a group where
  73. * we are the GO, so do not expire the peer entry.
  74. */
  75. os_get_time(&dev->last_seen);
  76. continue;
  77. }
  78. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
  79. "entry " MACSTR, MAC2STR(dev->info.p2p_device_addr));
  80. dl_list_del(&dev->list);
  81. p2p_device_free(p2p, dev);
  82. }
  83. }
  84. static void p2p_expiration_timeout(void *eloop_ctx, void *timeout_ctx)
  85. {
  86. struct p2p_data *p2p = eloop_ctx;
  87. p2p_expire_peers(p2p);
  88. eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
  89. p2p_expiration_timeout, p2p, NULL);
  90. }
  91. static const char * p2p_state_txt(int state)
  92. {
  93. switch (state) {
  94. case P2P_IDLE:
  95. return "IDLE";
  96. case P2P_SEARCH:
  97. return "SEARCH";
  98. case P2P_CONNECT:
  99. return "CONNECT";
  100. case P2P_CONNECT_LISTEN:
  101. return "CONNECT_LISTEN";
  102. case P2P_GO_NEG:
  103. return "GO_NEG";
  104. case P2P_LISTEN_ONLY:
  105. return "LISTEN_ONLY";
  106. case P2P_WAIT_PEER_CONNECT:
  107. return "WAIT_PEER_CONNECT";
  108. case P2P_WAIT_PEER_IDLE:
  109. return "WAIT_PEER_IDLE";
  110. case P2P_SD_DURING_FIND:
  111. return "SD_DURING_FIND";
  112. case P2P_PROVISIONING:
  113. return "PROVISIONING";
  114. case P2P_PD_DURING_FIND:
  115. return "PD_DURING_FIND";
  116. case P2P_INVITE:
  117. return "INVITE";
  118. case P2P_INVITE_LISTEN:
  119. return "INVITE_LISTEN";
  120. case P2P_SEARCH_WHEN_READY:
  121. return "SEARCH_WHEN_READY";
  122. default:
  123. return "?";
  124. }
  125. }
  126. u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
  127. {
  128. struct p2p_device *dev = NULL;
  129. if (!addr || !p2p)
  130. return 0;
  131. dev = p2p_get_device(p2p, addr);
  132. if (dev)
  133. return dev->wps_prov_info;
  134. else
  135. return 0;
  136. }
  137. void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *iface_addr)
  138. {
  139. struct p2p_device *dev = NULL;
  140. if (!iface_addr || !p2p)
  141. return;
  142. dev = p2p_get_device_interface(p2p, iface_addr);
  143. if (dev)
  144. dev->wps_prov_info = 0;
  145. }
  146. void p2p_set_state(struct p2p_data *p2p, int new_state)
  147. {
  148. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
  149. p2p_state_txt(p2p->state), p2p_state_txt(new_state));
  150. p2p->state = new_state;
  151. }
  152. void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
  153. {
  154. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  155. "P2P: Set timeout (state=%s): %u.%06u sec",
  156. p2p_state_txt(p2p->state), sec, usec);
  157. eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
  158. eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
  159. }
  160. void p2p_clear_timeout(struct p2p_data *p2p)
  161. {
  162. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
  163. p2p_state_txt(p2p->state));
  164. eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
  165. }
  166. void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
  167. int status)
  168. {
  169. struct p2p_go_neg_results res;
  170. p2p_clear_timeout(p2p);
  171. p2p_set_state(p2p, P2P_IDLE);
  172. if (p2p->go_neg_peer)
  173. p2p->go_neg_peer->wps_method = WPS_NOT_READY;
  174. p2p->go_neg_peer = NULL;
  175. os_memset(&res, 0, sizeof(res));
  176. res.status = status;
  177. if (peer) {
  178. os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr,
  179. ETH_ALEN);
  180. os_memcpy(res.peer_interface_addr, peer->intended_addr,
  181. ETH_ALEN);
  182. }
  183. p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
  184. }
  185. static void p2p_listen_in_find(struct p2p_data *p2p)
  186. {
  187. unsigned int r, tu;
  188. int freq;
  189. struct wpabuf *ies;
  190. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  191. "P2P: Starting short listen state (state=%s)",
  192. p2p_state_txt(p2p->state));
  193. freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
  194. p2p->cfg->channel);
  195. if (freq < 0) {
  196. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  197. "P2P: Unknown regulatory class/channel");
  198. return;
  199. }
  200. os_get_random((u8 *) &r, sizeof(r));
  201. tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
  202. p2p->min_disc_int) * 100;
  203. p2p->pending_listen_freq = freq;
  204. p2p->pending_listen_sec = 0;
  205. p2p->pending_listen_usec = 1024 * tu;
  206. ies = p2p_build_probe_resp_ies(p2p);
  207. if (ies == NULL)
  208. return;
  209. if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
  210. ies) < 0) {
  211. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  212. "P2P: Failed to start listen mode");
  213. p2p->pending_listen_freq = 0;
  214. }
  215. wpabuf_free(ies);
  216. }
  217. int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
  218. {
  219. int freq;
  220. struct wpabuf *ies;
  221. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  222. "P2P: Going to listen(only) state");
  223. freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
  224. p2p->cfg->channel);
  225. if (freq < 0) {
  226. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  227. "P2P: Unknown regulatory class/channel");
  228. return -1;
  229. }
  230. p2p->pending_listen_freq = freq;
  231. p2p->pending_listen_sec = timeout / 1000;
  232. p2p->pending_listen_usec = (timeout % 1000) * 1000;
  233. if (p2p->p2p_scan_running) {
  234. if (p2p->start_after_scan == P2P_AFTER_SCAN_NOTHING) {
  235. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  236. "P2P: p2p_scan running - connect is already "
  237. "pending - skip listen");
  238. return 0;
  239. }
  240. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  241. "P2P: p2p_scan running - delay start of listen state");
  242. p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
  243. return 0;
  244. }
  245. ies = p2p_build_probe_resp_ies(p2p);
  246. if (ies == NULL)
  247. return -1;
  248. if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
  249. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  250. "P2P: Failed to start listen mode");
  251. p2p->pending_listen_freq = 0;
  252. wpabuf_free(ies);
  253. return -1;
  254. }
  255. wpabuf_free(ies);
  256. p2p_set_state(p2p, P2P_LISTEN_ONLY);
  257. return 0;
  258. }
  259. static void p2p_device_clear_reported(struct p2p_data *p2p)
  260. {
  261. struct p2p_device *dev;
  262. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
  263. dev->flags &= ~P2P_DEV_REPORTED;
  264. }
  265. /**
  266. * p2p_get_device - Fetch a peer entry
  267. * @p2p: P2P module context from p2p_init()
  268. * @addr: P2P Device Address of the peer
  269. * Returns: Pointer to the device entry or %NULL if not found
  270. */
  271. struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
  272. {
  273. struct p2p_device *dev;
  274. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  275. if (os_memcmp(dev->info.p2p_device_addr, addr, ETH_ALEN) == 0)
  276. return dev;
  277. }
  278. return NULL;
  279. }
  280. /**
  281. * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
  282. * @p2p: P2P module context from p2p_init()
  283. * @addr: P2P Interface Address of the peer
  284. * Returns: Pointer to the device entry or %NULL if not found
  285. */
  286. struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
  287. const u8 *addr)
  288. {
  289. struct p2p_device *dev;
  290. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  291. if (os_memcmp(dev->interface_addr, addr, ETH_ALEN) == 0)
  292. return dev;
  293. }
  294. return NULL;
  295. }
  296. /**
  297. * p2p_create_device - Create a peer entry
  298. * @p2p: P2P module context from p2p_init()
  299. * @addr: P2P Device Address of the peer
  300. * Returns: Pointer to the device entry or %NULL on failure
  301. *
  302. * If there is already an entry for the peer, it will be returned instead of
  303. * creating a new one.
  304. */
  305. static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
  306. const u8 *addr)
  307. {
  308. struct p2p_device *dev, *oldest = NULL;
  309. size_t count = 0;
  310. dev = p2p_get_device(p2p, addr);
  311. if (dev)
  312. return dev;
  313. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  314. count++;
  315. if (oldest == NULL ||
  316. os_time_before(&dev->last_seen, &oldest->last_seen))
  317. oldest = dev;
  318. }
  319. if (count + 1 > p2p->cfg->max_peers && oldest) {
  320. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  321. "P2P: Remove oldest peer entry to make room for a new "
  322. "peer");
  323. dl_list_del(&oldest->list);
  324. p2p_device_free(p2p, oldest);
  325. }
  326. dev = os_zalloc(sizeof(*dev));
  327. if (dev == NULL)
  328. return NULL;
  329. dl_list_add(&p2p->devices, &dev->list);
  330. os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
  331. return dev;
  332. }
  333. static void p2p_copy_client_info(struct p2p_device *dev,
  334. struct p2p_client_info *cli)
  335. {
  336. os_memcpy(dev->info.device_name, cli->dev_name, cli->dev_name_len);
  337. dev->info.device_name[cli->dev_name_len] = '\0';
  338. dev->info.dev_capab = cli->dev_capab;
  339. dev->info.config_methods = cli->config_methods;
  340. os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
  341. dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
  342. os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
  343. dev->info.wps_sec_dev_type_list_len);
  344. }
  345. static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
  346. const u8 *go_interface_addr, int freq,
  347. const u8 *gi, size_t gi_len)
  348. {
  349. struct p2p_group_info info;
  350. size_t c;
  351. struct p2p_device *dev;
  352. if (gi == NULL)
  353. return 0;
  354. if (p2p_group_info_parse(gi, gi_len, &info) < 0)
  355. return -1;
  356. /*
  357. * Clear old data for this group; if the devices are still in the
  358. * group, the information will be restored in the loop following this.
  359. */
  360. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  361. if (os_memcmp(dev->member_in_go_iface, go_interface_addr,
  362. ETH_ALEN) == 0) {
  363. os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
  364. os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
  365. }
  366. }
  367. for (c = 0; c < info.num_clients; c++) {
  368. struct p2p_client_info *cli = &info.client[c];
  369. if (os_memcmp(cli->p2p_device_addr, p2p->cfg->dev_addr,
  370. ETH_ALEN) == 0)
  371. continue; /* ignore our own entry */
  372. dev = p2p_get_device(p2p, cli->p2p_device_addr);
  373. if (dev) {
  374. /*
  375. * Update information only if we have not received this
  376. * directly from the client.
  377. */
  378. if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
  379. P2P_DEV_PROBE_REQ_ONLY))
  380. p2p_copy_client_info(dev, cli);
  381. if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
  382. dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
  383. }
  384. } else {
  385. dev = p2p_create_device(p2p, cli->p2p_device_addr);
  386. if (dev == NULL)
  387. continue;
  388. dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
  389. p2p_copy_client_info(dev, cli);
  390. dev->oper_freq = freq;
  391. p2p->cfg->dev_found(p2p->cfg->cb_ctx,
  392. dev->info.p2p_device_addr,
  393. &dev->info, 1);
  394. dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
  395. }
  396. os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
  397. ETH_ALEN);
  398. os_get_time(&dev->last_seen);
  399. os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
  400. os_memcpy(dev->member_in_go_iface, go_interface_addr,
  401. ETH_ALEN);
  402. }
  403. return 0;
  404. }
  405. static void p2p_copy_wps_info(struct p2p_device *dev, int probe_req,
  406. const struct p2p_message *msg)
  407. {
  408. os_memcpy(dev->info.device_name, msg->device_name,
  409. sizeof(dev->info.device_name));
  410. if (msg->manufacturer &&
  411. msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
  412. os_memset(dev->info.manufacturer, 0,
  413. sizeof(dev->info.manufacturer));
  414. os_memcpy(dev->info.manufacturer, msg->manufacturer,
  415. msg->manufacturer_len);
  416. }
  417. if (msg->model_name &&
  418. msg->model_name_len < sizeof(dev->info.model_name)) {
  419. os_memset(dev->info.model_name, 0,
  420. sizeof(dev->info.model_name));
  421. os_memcpy(dev->info.model_name, msg->model_name,
  422. msg->model_name_len);
  423. }
  424. if (msg->model_number &&
  425. msg->model_number_len < sizeof(dev->info.model_number)) {
  426. os_memset(dev->info.model_number, 0,
  427. sizeof(dev->info.model_number));
  428. os_memcpy(dev->info.model_number, msg->model_number,
  429. msg->model_number_len);
  430. }
  431. if (msg->serial_number &&
  432. msg->serial_number_len < sizeof(dev->info.serial_number)) {
  433. os_memset(dev->info.serial_number, 0,
  434. sizeof(dev->info.serial_number));
  435. os_memcpy(dev->info.serial_number, msg->serial_number,
  436. msg->serial_number_len);
  437. }
  438. if (msg->pri_dev_type)
  439. os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
  440. sizeof(dev->info.pri_dev_type));
  441. else if (msg->wps_pri_dev_type)
  442. os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
  443. sizeof(dev->info.pri_dev_type));
  444. if (msg->wps_sec_dev_type_list) {
  445. os_memcpy(dev->info.wps_sec_dev_type_list,
  446. msg->wps_sec_dev_type_list,
  447. msg->wps_sec_dev_type_list_len);
  448. dev->info.wps_sec_dev_type_list_len =
  449. msg->wps_sec_dev_type_list_len;
  450. }
  451. if (msg->capability) {
  452. dev->info.dev_capab = msg->capability[0];
  453. dev->info.group_capab = msg->capability[1];
  454. }
  455. if (msg->ext_listen_timing) {
  456. dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
  457. dev->ext_listen_interval =
  458. WPA_GET_LE16(msg->ext_listen_timing + 2);
  459. }
  460. if (!probe_req) {
  461. dev->info.config_methods = msg->config_methods ?
  462. msg->config_methods : msg->wps_config_methods;
  463. }
  464. }
  465. /**
  466. * p2p_add_device - Add peer entries based on scan results
  467. * @p2p: P2P module context from p2p_init()
  468. * @addr: Source address of Beacon or Probe Response frame (may be either
  469. * P2P Device Address or P2P Interface Address)
  470. * @level: Signal level (signal strength of the received frame from the peer)
  471. * @freq: Frequency on which the Beacon or Probe Response frame was received
  472. * @ies: IEs from the Beacon or Probe Response frame
  473. * @ies_len: Length of ies buffer in octets
  474. * Returns: 0 on success, -1 on failure
  475. *
  476. * If the scan result is for a GO, the clients in the group will also be added
  477. * to the peer table. This function can also be used with some other frames
  478. * like Provision Discovery Request that contains P2P Capability and P2P Device
  479. * Info attributes.
  480. */
  481. int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq, int level,
  482. const u8 *ies, size_t ies_len)
  483. {
  484. struct p2p_device *dev;
  485. struct p2p_message msg;
  486. const u8 *p2p_dev_addr;
  487. int i;
  488. os_memset(&msg, 0, sizeof(msg));
  489. if (p2p_parse_ies(ies, ies_len, &msg)) {
  490. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  491. "P2P: Failed to parse P2P IE for a device entry");
  492. p2p_parse_free(&msg);
  493. return -1;
  494. }
  495. if (msg.p2p_device_addr)
  496. p2p_dev_addr = msg.p2p_device_addr;
  497. else if (msg.device_id)
  498. p2p_dev_addr = msg.device_id;
  499. else {
  500. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  501. "P2P: Ignore scan data without P2P Device Info or "
  502. "P2P Device Id");
  503. p2p_parse_free(&msg);
  504. return -1;
  505. }
  506. if (!is_zero_ether_addr(p2p->peer_filter) &&
  507. os_memcmp(p2p_dev_addr, p2p->peer_filter, ETH_ALEN) != 0) {
  508. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Do not add peer "
  509. "filter for " MACSTR " due to peer filter",
  510. MAC2STR(p2p_dev_addr));
  511. return 0;
  512. }
  513. dev = p2p_create_device(p2p, p2p_dev_addr);
  514. if (dev == NULL) {
  515. p2p_parse_free(&msg);
  516. return -1;
  517. }
  518. os_get_time(&dev->last_seen);
  519. dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
  520. if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
  521. os_memcpy(dev->interface_addr, addr, ETH_ALEN);
  522. if (msg.ssid &&
  523. (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
  524. os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
  525. != 0)) {
  526. os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
  527. dev->oper_ssid_len = msg.ssid[1];
  528. }
  529. if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
  530. *msg.ds_params >= 1 && *msg.ds_params <= 14) {
  531. int ds_freq;
  532. if (*msg.ds_params == 14)
  533. ds_freq = 2484;
  534. else
  535. ds_freq = 2407 + *msg.ds_params * 5;
  536. if (freq != ds_freq) {
  537. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  538. "P2P: Update Listen frequency based on DS "
  539. "Parameter Set IE: %d -> %d MHz",
  540. freq, ds_freq);
  541. freq = ds_freq;
  542. }
  543. }
  544. if (dev->listen_freq && dev->listen_freq != freq) {
  545. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  546. "P2P: Update Listen frequency based on scan "
  547. "results (" MACSTR " %d -> %d MHz (DS param %d)",
  548. MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
  549. freq, msg.ds_params ? *msg.ds_params : -1);
  550. }
  551. dev->listen_freq = freq;
  552. if (msg.group_info)
  553. dev->oper_freq = freq;
  554. dev->info.level = level;
  555. p2p_copy_wps_info(dev, 0, &msg);
  556. for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
  557. wpabuf_free(dev->info.wps_vendor_ext[i]);
  558. dev->info.wps_vendor_ext[i] = NULL;
  559. }
  560. for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
  561. if (msg.wps_vendor_ext[i] == NULL)
  562. break;
  563. dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
  564. msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
  565. if (dev->info.wps_vendor_ext[i] == NULL)
  566. break;
  567. }
  568. p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq, msg.group_info,
  569. msg.group_info_len);
  570. p2p_parse_free(&msg);
  571. if (p2p_pending_sd_req(p2p, dev))
  572. dev->flags |= P2P_DEV_SD_SCHEDULE;
  573. if (dev->flags & P2P_DEV_REPORTED)
  574. return 0;
  575. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  576. "P2P: Peer found with Listen frequency %d MHz", freq);
  577. if (dev->flags & P2P_DEV_USER_REJECTED) {
  578. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  579. "P2P: Do not report rejected device");
  580. return 0;
  581. }
  582. p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
  583. !(dev->flags & P2P_DEV_REPORTED_ONCE));
  584. dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
  585. return 0;
  586. }
  587. static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
  588. {
  589. int i;
  590. if (p2p->go_neg_peer == dev) {
  591. /*
  592. * If GO Negotiation is in progress, report that it has failed.
  593. */
  594. p2p_go_neg_failed(p2p, dev, -1);
  595. p2p->go_neg_peer = NULL;
  596. }
  597. if (p2p->invite_peer == dev)
  598. p2p->invite_peer = NULL;
  599. if (p2p->sd_peer == dev)
  600. p2p->sd_peer = NULL;
  601. if (p2p->pending_client_disc_go == dev)
  602. p2p->pending_client_disc_go = NULL;
  603. /* dev_lost() device, but only if it was previously dev_found() */
  604. if (dev->flags & P2P_DEV_REPORTED_ONCE)
  605. p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
  606. dev->info.p2p_device_addr);
  607. for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
  608. wpabuf_free(dev->info.wps_vendor_ext[i]);
  609. dev->info.wps_vendor_ext[i] = NULL;
  610. }
  611. os_free(dev);
  612. }
  613. static int p2p_get_next_prog_freq(struct p2p_data *p2p)
  614. {
  615. struct p2p_channels *c;
  616. struct p2p_reg_class *cla;
  617. size_t cl, ch;
  618. int found = 0;
  619. u8 reg_class;
  620. u8 channel;
  621. int freq;
  622. c = &p2p->cfg->channels;
  623. for (cl = 0; cl < c->reg_classes; cl++) {
  624. cla = &c->reg_class[cl];
  625. if (cla->reg_class != p2p->last_prog_scan_class)
  626. continue;
  627. for (ch = 0; ch < cla->channels; ch++) {
  628. if (cla->channel[ch] == p2p->last_prog_scan_chan) {
  629. found = 1;
  630. break;
  631. }
  632. }
  633. if (found)
  634. break;
  635. }
  636. if (!found) {
  637. /* Start from beginning */
  638. reg_class = c->reg_class[0].reg_class;
  639. channel = c->reg_class[0].channel[0];
  640. } else {
  641. /* Pick the next channel */
  642. ch++;
  643. if (ch == cla->channels) {
  644. cl++;
  645. if (cl == c->reg_classes)
  646. cl = 0;
  647. ch = 0;
  648. }
  649. reg_class = c->reg_class[cl].reg_class;
  650. channel = c->reg_class[cl].channel[ch];
  651. }
  652. freq = p2p_channel_to_freq(p2p->cfg->country, reg_class, channel);
  653. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Next progressive search "
  654. "channel: reg_class %u channel %u -> %d MHz",
  655. reg_class, channel, freq);
  656. p2p->last_prog_scan_class = reg_class;
  657. p2p->last_prog_scan_chan = channel;
  658. if (freq == 2412 || freq == 2437 || freq == 2462)
  659. return 0; /* No need to add social channels */
  660. return freq;
  661. }
  662. static void p2p_search(struct p2p_data *p2p)
  663. {
  664. int freq = 0;
  665. enum p2p_scan_type type;
  666. if (p2p->drv_in_listen) {
  667. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is still "
  668. "in Listen state - wait for it to end before "
  669. "continuing");
  670. return;
  671. }
  672. p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
  673. if (p2p->go_neg_peer) {
  674. /*
  675. * Only scan the known listen frequency of the peer
  676. * during GO Negotiation start.
  677. */
  678. freq = p2p->go_neg_peer->listen_freq;
  679. if (freq <= 0)
  680. freq = p2p->go_neg_peer->oper_freq;
  681. type = P2P_SCAN_SPECIFIC;
  682. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
  683. "for freq %u (GO Neg)", freq);
  684. } else if (p2p->invite_peer) {
  685. /*
  686. * Only scan the known listen frequency of the peer
  687. * during Invite start.
  688. */
  689. freq = p2p->invite_peer->listen_freq;
  690. if (freq <= 0)
  691. freq = p2p->invite_peer->oper_freq;
  692. type = P2P_SCAN_SPECIFIC;
  693. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
  694. "for freq %u (Invite)", freq);
  695. } else if (p2p->find_type == P2P_FIND_PROGRESSIVE &&
  696. (freq = p2p_get_next_prog_freq(p2p)) > 0) {
  697. type = P2P_SCAN_SOCIAL_PLUS_ONE;
  698. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
  699. "(+ freq %u)", freq);
  700. } else {
  701. type = P2P_SCAN_SOCIAL;
  702. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search");
  703. }
  704. if (p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
  705. p2p->num_req_dev_types, p2p->req_dev_types,
  706. p2p->find_dev_id) < 0) {
  707. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  708. "P2P: Scan request failed");
  709. p2p_continue_find(p2p);
  710. } else {
  711. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
  712. p2p->p2p_scan_running = 1;
  713. eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
  714. eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
  715. p2p, NULL);
  716. }
  717. }
  718. static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
  719. {
  720. struct p2p_data *p2p = eloop_ctx;
  721. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Find timeout -> stop");
  722. p2p_stop_find(p2p);
  723. }
  724. static int p2p_run_after_scan(struct p2p_data *p2p)
  725. {
  726. struct p2p_device *dev;
  727. enum p2p_after_scan op;
  728. if (p2p->after_scan_tx) {
  729. /* TODO: schedule p2p_run_after_scan to be called from TX
  730. * status callback(?) */
  731. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send pending "
  732. "Action frame at p2p_scan completion");
  733. p2p->cfg->send_action(p2p->cfg->cb_ctx,
  734. p2p->after_scan_tx->freq,
  735. p2p->after_scan_tx->dst,
  736. p2p->after_scan_tx->src,
  737. p2p->after_scan_tx->bssid,
  738. (u8 *) (p2p->after_scan_tx + 1),
  739. p2p->after_scan_tx->len,
  740. p2p->after_scan_tx->wait_time);
  741. os_free(p2p->after_scan_tx);
  742. p2p->after_scan_tx = NULL;
  743. return 1;
  744. }
  745. op = p2p->start_after_scan;
  746. p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
  747. switch (op) {
  748. case P2P_AFTER_SCAN_NOTHING:
  749. break;
  750. case P2P_AFTER_SCAN_LISTEN:
  751. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
  752. "requested Listen state");
  753. p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
  754. p2p->pending_listen_usec / 1000);
  755. return 1;
  756. case P2P_AFTER_SCAN_CONNECT:
  757. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
  758. "requested connect with " MACSTR,
  759. MAC2STR(p2p->after_scan_peer));
  760. dev = p2p_get_device(p2p, p2p->after_scan_peer);
  761. if (dev == NULL) {
  762. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer not "
  763. "known anymore");
  764. break;
  765. }
  766. p2p_connect_send(p2p, dev);
  767. return 1;
  768. }
  769. return 0;
  770. }
  771. static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
  772. {
  773. struct p2p_data *p2p = eloop_ctx;
  774. int running;
  775. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan timeout "
  776. "(running=%d)", p2p->p2p_scan_running);
  777. running = p2p->p2p_scan_running;
  778. /* Make sure we recover from missed scan results callback */
  779. p2p->p2p_scan_running = 0;
  780. if (running)
  781. p2p_run_after_scan(p2p);
  782. }
  783. static void p2p_free_req_dev_types(struct p2p_data *p2p)
  784. {
  785. p2p->num_req_dev_types = 0;
  786. os_free(p2p->req_dev_types);
  787. p2p->req_dev_types = NULL;
  788. }
  789. int p2p_find(struct p2p_data *p2p, unsigned int timeout,
  790. enum p2p_discovery_type type,
  791. unsigned int num_req_dev_types, const u8 *req_dev_types,
  792. const u8 *dev_id)
  793. {
  794. int res;
  795. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting find (type=%d)",
  796. type);
  797. if (p2p->p2p_scan_running) {
  798. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan is "
  799. "already running");
  800. }
  801. p2p_free_req_dev_types(p2p);
  802. if (req_dev_types && num_req_dev_types) {
  803. p2p->req_dev_types = os_malloc(num_req_dev_types *
  804. WPS_DEV_TYPE_LEN);
  805. if (p2p->req_dev_types == NULL)
  806. return -1;
  807. os_memcpy(p2p->req_dev_types, req_dev_types,
  808. num_req_dev_types * WPS_DEV_TYPE_LEN);
  809. p2p->num_req_dev_types = num_req_dev_types;
  810. }
  811. if (dev_id) {
  812. os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
  813. p2p->find_dev_id = p2p->find_dev_id_buf;
  814. } else
  815. p2p->find_dev_id = NULL;
  816. p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
  817. p2p_clear_timeout(p2p);
  818. p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
  819. p2p->find_type = type;
  820. p2p_device_clear_reported(p2p);
  821. p2p_set_state(p2p, P2P_SEARCH);
  822. eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
  823. p2p->last_p2p_find_timeout = timeout;
  824. if (timeout)
  825. eloop_register_timeout(timeout, 0, p2p_find_timeout,
  826. p2p, NULL);
  827. switch (type) {
  828. case P2P_FIND_START_WITH_FULL:
  829. case P2P_FIND_PROGRESSIVE:
  830. res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
  831. p2p->num_req_dev_types,
  832. p2p->req_dev_types, dev_id);
  833. break;
  834. case P2P_FIND_ONLY_SOCIAL:
  835. res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
  836. p2p->num_req_dev_types,
  837. p2p->req_dev_types, dev_id);
  838. break;
  839. default:
  840. return -1;
  841. }
  842. if (res == 0) {
  843. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
  844. p2p->p2p_scan_running = 1;
  845. eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
  846. eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
  847. p2p, NULL);
  848. } else if (res == 1) {
  849. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Could not start "
  850. "p2p_scan at this point - will try again after "
  851. "previous scan completes");
  852. res = 0;
  853. p2p_set_state(p2p, P2P_SEARCH_WHEN_READY);
  854. eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
  855. } else {
  856. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
  857. "p2p_scan");
  858. p2p_set_state(p2p, P2P_IDLE);
  859. eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
  860. }
  861. return res;
  862. }
  863. int p2p_other_scan_completed(struct p2p_data *p2p)
  864. {
  865. if (p2p->state != P2P_SEARCH_WHEN_READY)
  866. return 0;
  867. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting pending P2P find "
  868. "now that previous scan was completed");
  869. if (p2p_find(p2p, p2p->last_p2p_find_timeout, p2p->find_type,
  870. p2p->num_req_dev_types, p2p->req_dev_types,
  871. p2p->find_dev_id) < 0)
  872. return 0;
  873. return 1;
  874. }
  875. void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
  876. {
  877. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopping find");
  878. eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
  879. p2p_clear_timeout(p2p);
  880. if (p2p->state == P2P_SEARCH)
  881. wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, P2P_EVENT_FIND_STOPPED);
  882. p2p_set_state(p2p, P2P_IDLE);
  883. p2p_free_req_dev_types(p2p);
  884. p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
  885. p2p->go_neg_peer = NULL;
  886. p2p->sd_peer = NULL;
  887. p2p->invite_peer = NULL;
  888. if (freq > 0 && p2p->drv_in_listen == freq && p2p->in_listen) {
  889. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip stop_listen "
  890. "since we are on correct channel for response");
  891. return;
  892. }
  893. if (p2p->drv_in_listen) {
  894. /*
  895. * The driver may not deliver callback to p2p_listen_end()
  896. * when the operation gets canceled, so clear the internal
  897. * variable that is tracking driver state.
  898. */
  899. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear "
  900. "drv_in_listen (%d)", p2p->drv_in_listen);
  901. p2p->drv_in_listen = 0;
  902. }
  903. p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
  904. }
  905. void p2p_stop_find(struct p2p_data *p2p)
  906. {
  907. p2p_stop_find_for_freq(p2p, 0);
  908. }
  909. static int p2p_prepare_channel(struct p2p_data *p2p, unsigned int force_freq)
  910. {
  911. if (force_freq) {
  912. u8 op_reg_class, op_channel;
  913. if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
  914. &op_reg_class, &op_channel) < 0) {
  915. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  916. "P2P: Unsupported frequency %u MHz",
  917. force_freq);
  918. return -1;
  919. }
  920. if (!p2p_channels_includes(&p2p->cfg->channels, op_reg_class,
  921. op_channel)) {
  922. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  923. "P2P: Frequency %u MHz (oper_class %u "
  924. "channel %u) not allowed for P2P",
  925. force_freq, op_reg_class, op_channel);
  926. return -1;
  927. }
  928. p2p->op_reg_class = op_reg_class;
  929. p2p->op_channel = op_channel;
  930. p2p->channels.reg_classes = 1;
  931. p2p->channels.reg_class[0].channels = 1;
  932. p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
  933. p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
  934. } else {
  935. u8 op_reg_class, op_channel;
  936. if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
  937. p2p_supported_freq(p2p, p2p->best_freq_overall) &&
  938. p2p_freq_to_channel(p2p->cfg->country,
  939. p2p->best_freq_overall,
  940. &op_reg_class, &op_channel) == 0) {
  941. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  942. "P2P: Select best overall channel as "
  943. "operating channel preference");
  944. p2p->op_reg_class = op_reg_class;
  945. p2p->op_channel = op_channel;
  946. } else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
  947. p2p_supported_freq(p2p, p2p->best_freq_5) &&
  948. p2p_freq_to_channel(p2p->cfg->country,
  949. p2p->best_freq_5,
  950. &op_reg_class, &op_channel) ==
  951. 0) {
  952. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  953. "P2P: Select best 5 GHz channel as "
  954. "operating channel preference");
  955. p2p->op_reg_class = op_reg_class;
  956. p2p->op_channel = op_channel;
  957. } else if (!p2p->cfg->cfg_op_channel &&
  958. p2p->best_freq_24 > 0 &&
  959. p2p_supported_freq(p2p, p2p->best_freq_24) &&
  960. p2p_freq_to_channel(p2p->cfg->country,
  961. p2p->best_freq_24,
  962. &op_reg_class, &op_channel) ==
  963. 0) {
  964. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  965. "P2P: Select best 2.4 GHz channel as "
  966. "operating channel preference");
  967. p2p->op_reg_class = op_reg_class;
  968. p2p->op_channel = op_channel;
  969. } else {
  970. p2p->op_reg_class = p2p->cfg->op_reg_class;
  971. p2p->op_channel = p2p->cfg->op_channel;
  972. }
  973. os_memcpy(&p2p->channels, &p2p->cfg->channels,
  974. sizeof(struct p2p_channels));
  975. }
  976. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  977. "P2P: Own preference for operation channel: "
  978. "Operating Class %u Channel %u%s",
  979. p2p->op_reg_class, p2p->op_channel,
  980. force_freq ? " (forced)" : "");
  981. return 0;
  982. }
  983. static void p2p_set_dev_persistent(struct p2p_device *dev,
  984. int persistent_group)
  985. {
  986. switch (persistent_group) {
  987. case 0:
  988. dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
  989. P2P_DEV_PREFER_PERSISTENT_RECONN);
  990. break;
  991. case 1:
  992. dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
  993. dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
  994. break;
  995. case 2:
  996. dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
  997. P2P_DEV_PREFER_PERSISTENT_RECONN;
  998. break;
  999. }
  1000. }
  1001. int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
  1002. enum p2p_wps_method wps_method,
  1003. int go_intent, const u8 *own_interface_addr,
  1004. unsigned int force_freq, int persistent_group)
  1005. {
  1006. struct p2p_device *dev;
  1007. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1008. "P2P: Request to start group negotiation - peer=" MACSTR
  1009. " GO Intent=%d Intended Interface Address=" MACSTR
  1010. " wps_method=%d persistent_group=%d",
  1011. MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
  1012. wps_method, persistent_group);
  1013. if (p2p_prepare_channel(p2p, force_freq) < 0)
  1014. return -1;
  1015. p2p->ssid_set = 0;
  1016. dev = p2p_get_device(p2p, peer_addr);
  1017. if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
  1018. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1019. "P2P: Cannot connect to unknown P2P Device " MACSTR,
  1020. MAC2STR(peer_addr));
  1021. return -1;
  1022. }
  1023. if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
  1024. if (!(dev->info.dev_capab &
  1025. P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
  1026. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1027. "P2P: Cannot connect to P2P Device " MACSTR
  1028. " that is in a group and is not discoverable",
  1029. MAC2STR(peer_addr));
  1030. return -1;
  1031. }
  1032. if (dev->oper_freq <= 0) {
  1033. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1034. "P2P: Cannot connect to P2P Device " MACSTR
  1035. " with incomplete information",
  1036. MAC2STR(peer_addr));
  1037. return -1;
  1038. }
  1039. /*
  1040. * First, try to connect directly. If the peer does not
  1041. * acknowledge frames, assume it is sleeping and use device
  1042. * discoverability via the GO at that point.
  1043. */
  1044. }
  1045. dev->flags &= ~P2P_DEV_NOT_YET_READY;
  1046. dev->flags &= ~P2P_DEV_USER_REJECTED;
  1047. dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
  1048. dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
  1049. dev->connect_reqs = 0;
  1050. dev->go_neg_req_sent = 0;
  1051. dev->go_state = UNKNOWN_GO;
  1052. p2p_set_dev_persistent(dev, persistent_group);
  1053. p2p->go_intent = go_intent;
  1054. os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
  1055. if (p2p->state != P2P_IDLE)
  1056. p2p_stop_find(p2p);
  1057. if (p2p->after_scan_tx) {
  1058. /*
  1059. * We need to drop the pending frame to avoid issues with the
  1060. * new GO Negotiation, e.g., when the pending frame was from a
  1061. * previous attempt at starting a GO Negotiation.
  1062. */
  1063. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
  1064. "previous pending Action frame TX that was waiting "
  1065. "for p2p_scan completion");
  1066. os_free(p2p->after_scan_tx);
  1067. p2p->after_scan_tx = NULL;
  1068. }
  1069. dev->wps_method = wps_method;
  1070. dev->status = P2P_SC_SUCCESS;
  1071. if (force_freq)
  1072. dev->flags |= P2P_DEV_FORCE_FREQ;
  1073. else
  1074. dev->flags &= ~P2P_DEV_FORCE_FREQ;
  1075. if (p2p->p2p_scan_running) {
  1076. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1077. "P2P: p2p_scan running - delay connect send");
  1078. p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
  1079. os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
  1080. return 0;
  1081. }
  1082. p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
  1083. return p2p_connect_send(p2p, dev);
  1084. }
  1085. int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
  1086. enum p2p_wps_method wps_method,
  1087. int go_intent, const u8 *own_interface_addr,
  1088. unsigned int force_freq, int persistent_group)
  1089. {
  1090. struct p2p_device *dev;
  1091. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1092. "P2P: Request to authorize group negotiation - peer=" MACSTR
  1093. " GO Intent=%d Intended Interface Address=" MACSTR
  1094. " wps_method=%d persistent_group=%d",
  1095. MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
  1096. wps_method, persistent_group);
  1097. if (p2p_prepare_channel(p2p, force_freq) < 0)
  1098. return -1;
  1099. dev = p2p_get_device(p2p, peer_addr);
  1100. if (dev == NULL) {
  1101. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1102. "P2P: Cannot authorize unknown P2P Device " MACSTR,
  1103. MAC2STR(peer_addr));
  1104. return -1;
  1105. }
  1106. dev->flags &= ~P2P_DEV_NOT_YET_READY;
  1107. dev->flags &= ~P2P_DEV_USER_REJECTED;
  1108. dev->go_neg_req_sent = 0;
  1109. dev->go_state = UNKNOWN_GO;
  1110. p2p_set_dev_persistent(dev, persistent_group);
  1111. p2p->go_intent = go_intent;
  1112. os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
  1113. dev->wps_method = wps_method;
  1114. dev->status = P2P_SC_SUCCESS;
  1115. if (force_freq)
  1116. dev->flags |= P2P_DEV_FORCE_FREQ;
  1117. else
  1118. dev->flags &= ~P2P_DEV_FORCE_FREQ;
  1119. return 0;
  1120. }
  1121. void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
  1122. struct p2p_device *dev, struct p2p_message *msg)
  1123. {
  1124. os_get_time(&dev->last_seen);
  1125. p2p_copy_wps_info(dev, 0, msg);
  1126. if (msg->listen_channel) {
  1127. int freq;
  1128. freq = p2p_channel_to_freq((char *) msg->listen_channel,
  1129. msg->listen_channel[3],
  1130. msg->listen_channel[4]);
  1131. if (freq < 0) {
  1132. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1133. "P2P: Unknown peer Listen channel: "
  1134. "country=%c%c(0x%02x) reg_class=%u channel=%u",
  1135. msg->listen_channel[0],
  1136. msg->listen_channel[1],
  1137. msg->listen_channel[2],
  1138. msg->listen_channel[3],
  1139. msg->listen_channel[4]);
  1140. } else {
  1141. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update "
  1142. "peer " MACSTR " Listen channel: %u -> %u MHz",
  1143. MAC2STR(dev->info.p2p_device_addr),
  1144. dev->listen_freq, freq);
  1145. dev->listen_freq = freq;
  1146. }
  1147. }
  1148. if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
  1149. dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
  1150. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1151. "P2P: Completed device entry based on data from "
  1152. "GO Negotiation Request");
  1153. } else {
  1154. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1155. "P2P: Created device entry based on GO Neg Req: "
  1156. MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
  1157. "listen_freq=%d",
  1158. MAC2STR(dev->info.p2p_device_addr),
  1159. dev->info.dev_capab, dev->info.group_capab,
  1160. dev->info.device_name, dev->listen_freq);
  1161. }
  1162. dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
  1163. if (dev->flags & P2P_DEV_USER_REJECTED) {
  1164. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1165. "P2P: Do not report rejected device");
  1166. return;
  1167. }
  1168. p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
  1169. !(dev->flags & P2P_DEV_REPORTED_ONCE));
  1170. dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
  1171. }
  1172. void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
  1173. {
  1174. os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
  1175. p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
  1176. os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
  1177. p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
  1178. *ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
  1179. }
  1180. int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
  1181. {
  1182. p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
  1183. p2p_random(params->passphrase, 8);
  1184. return 0;
  1185. }
  1186. void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
  1187. {
  1188. struct p2p_go_neg_results res;
  1189. int go = peer->go_state == LOCAL_GO;
  1190. struct p2p_channels intersection;
  1191. int freqs;
  1192. size_t i, j;
  1193. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1194. "P2P: GO Negotiation with " MACSTR " completed (%s will be "
  1195. "GO)", MAC2STR(peer->info.p2p_device_addr),
  1196. go ? "local end" : "peer");
  1197. os_memset(&res, 0, sizeof(res));
  1198. res.role_go = go;
  1199. os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
  1200. os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
  1201. res.wps_method = peer->wps_method;
  1202. if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
  1203. if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
  1204. res.persistent_group = 2;
  1205. else
  1206. res.persistent_group = 1;
  1207. }
  1208. if (go) {
  1209. /* Setup AP mode for WPS provisioning */
  1210. res.freq = p2p_channel_to_freq(p2p->cfg->country,
  1211. p2p->op_reg_class,
  1212. p2p->op_channel);
  1213. os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
  1214. res.ssid_len = p2p->ssid_len;
  1215. p2p_random(res.passphrase, 8);
  1216. } else {
  1217. res.freq = peer->oper_freq;
  1218. if (p2p->ssid_len) {
  1219. os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
  1220. res.ssid_len = p2p->ssid_len;
  1221. }
  1222. }
  1223. p2p_channels_intersect(&p2p->channels, &peer->channels,
  1224. &intersection);
  1225. freqs = 0;
  1226. for (i = 0; i < intersection.reg_classes; i++) {
  1227. struct p2p_reg_class *c = &intersection.reg_class[i];
  1228. if (freqs + 1 == P2P_MAX_CHANNELS)
  1229. break;
  1230. for (j = 0; j < c->channels; j++) {
  1231. int freq;
  1232. if (freqs + 1 == P2P_MAX_CHANNELS)
  1233. break;
  1234. freq = p2p_channel_to_freq(peer->country, c->reg_class,
  1235. c->channel[j]);
  1236. if (freq < 0)
  1237. continue;
  1238. res.freq_list[freqs++] = freq;
  1239. }
  1240. }
  1241. res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
  1242. p2p_clear_timeout(p2p);
  1243. p2p->ssid_set = 0;
  1244. peer->go_neg_req_sent = 0;
  1245. peer->wps_method = WPS_NOT_READY;
  1246. p2p_set_state(p2p, P2P_PROVISIONING);
  1247. p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
  1248. }
  1249. static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
  1250. const u8 *data, size_t len, int rx_freq)
  1251. {
  1252. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1253. "P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
  1254. wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
  1255. if (len < 1)
  1256. return;
  1257. switch (data[0]) {
  1258. case P2P_GO_NEG_REQ:
  1259. p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
  1260. break;
  1261. case P2P_GO_NEG_RESP:
  1262. p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
  1263. break;
  1264. case P2P_GO_NEG_CONF:
  1265. p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
  1266. break;
  1267. case P2P_INVITATION_REQ:
  1268. p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
  1269. rx_freq);
  1270. break;
  1271. case P2P_INVITATION_RESP:
  1272. p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
  1273. break;
  1274. case P2P_PROV_DISC_REQ:
  1275. p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
  1276. break;
  1277. case P2P_PROV_DISC_RESP:
  1278. p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
  1279. break;
  1280. case P2P_DEV_DISC_REQ:
  1281. p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
  1282. break;
  1283. case P2P_DEV_DISC_RESP:
  1284. p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
  1285. break;
  1286. default:
  1287. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1288. "P2P: Unsupported P2P Public Action frame type %d",
  1289. data[0]);
  1290. break;
  1291. }
  1292. }
  1293. static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
  1294. const u8 *sa, const u8 *bssid, const u8 *data,
  1295. size_t len, int freq)
  1296. {
  1297. if (len < 1)
  1298. return;
  1299. switch (data[0]) {
  1300. case WLAN_PA_VENDOR_SPECIFIC:
  1301. data++;
  1302. len--;
  1303. if (len < 3)
  1304. return;
  1305. if (WPA_GET_BE24(data) != OUI_WFA)
  1306. return;
  1307. data += 3;
  1308. len -= 3;
  1309. if (len < 1)
  1310. return;
  1311. if (*data != P2P_OUI_TYPE)
  1312. return;
  1313. p2p_rx_p2p_action(p2p, sa, data + 1, len - 1, freq);
  1314. break;
  1315. case WLAN_PA_GAS_INITIAL_REQ:
  1316. p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
  1317. break;
  1318. case WLAN_PA_GAS_INITIAL_RESP:
  1319. p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
  1320. break;
  1321. case WLAN_PA_GAS_COMEBACK_REQ:
  1322. p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
  1323. break;
  1324. case WLAN_PA_GAS_COMEBACK_RESP:
  1325. p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
  1326. break;
  1327. }
  1328. }
  1329. void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
  1330. const u8 *bssid, u8 category,
  1331. const u8 *data, size_t len, int freq)
  1332. {
  1333. if (category == WLAN_ACTION_PUBLIC) {
  1334. p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
  1335. return;
  1336. }
  1337. if (category != WLAN_ACTION_VENDOR_SPECIFIC)
  1338. return;
  1339. if (len < 4)
  1340. return;
  1341. if (WPA_GET_BE24(data) != OUI_WFA)
  1342. return;
  1343. data += 3;
  1344. len -= 3;
  1345. if (*data != P2P_OUI_TYPE)
  1346. return;
  1347. data++;
  1348. len--;
  1349. /* P2P action frame */
  1350. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1351. "P2P: RX P2P Action from " MACSTR, MAC2STR(sa));
  1352. wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
  1353. if (len < 1)
  1354. return;
  1355. switch (data[0]) {
  1356. case P2P_NOA:
  1357. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1358. "P2P: Received P2P Action - Notice of Absence");
  1359. /* TODO */
  1360. break;
  1361. case P2P_PRESENCE_REQ:
  1362. p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
  1363. break;
  1364. case P2P_PRESENCE_RESP:
  1365. p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
  1366. break;
  1367. case P2P_GO_DISC_REQ:
  1368. p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
  1369. break;
  1370. default:
  1371. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1372. "P2P: Received P2P Action - unknown type %u", data[0]);
  1373. break;
  1374. }
  1375. }
  1376. static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
  1377. {
  1378. struct p2p_data *p2p = eloop_ctx;
  1379. if (p2p->go_neg_peer == NULL)
  1380. return;
  1381. p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
  1382. p2p->go_neg_peer->status = P2P_SC_SUCCESS;
  1383. p2p_connect_send(p2p, p2p->go_neg_peer);
  1384. }
  1385. static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
  1386. {
  1387. struct p2p_data *p2p = eloop_ctx;
  1388. if (p2p->invite_peer == NULL)
  1389. return;
  1390. p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
  1391. p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr);
  1392. }
  1393. static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
  1394. const u8 *ie, size_t ie_len)
  1395. {
  1396. struct p2p_message msg;
  1397. struct p2p_device *dev;
  1398. os_memset(&msg, 0, sizeof(msg));
  1399. if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
  1400. {
  1401. p2p_parse_free(&msg);
  1402. return; /* not a P2P probe */
  1403. }
  1404. if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
  1405. os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
  1406. != 0) {
  1407. /* The Probe Request is not part of P2P Device Discovery. It is
  1408. * not known whether the source address of the frame is the P2P
  1409. * Device Address or P2P Interface Address. Do not add a new
  1410. * peer entry based on this frames.
  1411. */
  1412. p2p_parse_free(&msg);
  1413. return;
  1414. }
  1415. dev = p2p_get_device(p2p, addr);
  1416. if (dev) {
  1417. if (dev->country[0] == 0 && msg.listen_channel)
  1418. os_memcpy(dev->country, msg.listen_channel, 3);
  1419. os_get_time(&dev->last_seen);
  1420. p2p_parse_free(&msg);
  1421. return; /* already known */
  1422. }
  1423. dev = p2p_create_device(p2p, addr);
  1424. if (dev == NULL) {
  1425. p2p_parse_free(&msg);
  1426. return;
  1427. }
  1428. os_get_time(&dev->last_seen);
  1429. dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
  1430. if (msg.listen_channel) {
  1431. os_memcpy(dev->country, msg.listen_channel, 3);
  1432. dev->listen_freq = p2p_channel_to_freq(dev->country,
  1433. msg.listen_channel[3],
  1434. msg.listen_channel[4]);
  1435. }
  1436. p2p_copy_wps_info(dev, 1, &msg);
  1437. p2p_parse_free(&msg);
  1438. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1439. "P2P: Created device entry based on Probe Req: " MACSTR
  1440. " dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
  1441. MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
  1442. dev->info.group_capab, dev->info.device_name,
  1443. dev->listen_freq);
  1444. }
  1445. struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
  1446. const u8 *addr,
  1447. struct p2p_message *msg)
  1448. {
  1449. struct p2p_device *dev;
  1450. dev = p2p_get_device(p2p, addr);
  1451. if (dev) {
  1452. os_get_time(&dev->last_seen);
  1453. return dev; /* already known */
  1454. }
  1455. dev = p2p_create_device(p2p, addr);
  1456. if (dev == NULL)
  1457. return NULL;
  1458. p2p_add_dev_info(p2p, addr, dev, msg);
  1459. return dev;
  1460. }
  1461. static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
  1462. {
  1463. if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
  1464. return 1;
  1465. if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
  1466. WPA_GET_BE32(&req_dev_type[2]) == 0 &&
  1467. WPA_GET_BE16(&req_dev_type[6]) == 0)
  1468. return 1; /* Category match with wildcard OUI/sub-category */
  1469. return 0;
  1470. }
  1471. int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
  1472. size_t num_req_dev_type)
  1473. {
  1474. size_t i;
  1475. for (i = 0; i < num_req_dev_type; i++) {
  1476. if (dev_type_match(dev_type, req_dev_type[i]))
  1477. return 1;
  1478. }
  1479. return 0;
  1480. }
  1481. /**
  1482. * p2p_match_dev_type - Match local device type with requested type
  1483. * @p2p: P2P module context from p2p_init()
  1484. * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
  1485. * Returns: 1 on match, 0 on mismatch
  1486. *
  1487. * This function can be used to match the Requested Device Type attribute in
  1488. * WPS IE with the local device types for deciding whether to reply to a Probe
  1489. * Request frame.
  1490. */
  1491. int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
  1492. {
  1493. struct wps_parse_attr attr;
  1494. size_t i;
  1495. if (wps_parse_msg(wps, &attr))
  1496. return 1; /* assume no Requested Device Type attributes */
  1497. if (attr.num_req_dev_type == 0)
  1498. return 1; /* no Requested Device Type attributes -> match */
  1499. if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
  1500. attr.num_req_dev_type))
  1501. return 1; /* Own Primary Device Type matches */
  1502. for (i = 0; i < p2p->cfg->num_sec_dev_types; i++)
  1503. if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
  1504. attr.req_dev_type,
  1505. attr.num_req_dev_type))
  1506. return 1; /* Own Secondary Device Type matches */
  1507. /* No matching device type found */
  1508. return 0;
  1509. }
  1510. struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p)
  1511. {
  1512. struct wpabuf *buf;
  1513. u8 *len;
  1514. buf = wpabuf_alloc(1000);
  1515. if (buf == NULL)
  1516. return NULL;
  1517. p2p_build_wps_ie(p2p, buf, DEV_PW_DEFAULT, 1);
  1518. /* P2P IE */
  1519. len = p2p_buf_add_ie_hdr(buf);
  1520. p2p_buf_add_capability(buf, p2p->dev_capab, 0);
  1521. if (p2p->ext_listen_interval)
  1522. p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
  1523. p2p->ext_listen_interval);
  1524. p2p_buf_add_device_info(buf, p2p, NULL);
  1525. p2p_buf_update_ie_hdr(buf, len);
  1526. return buf;
  1527. }
  1528. static int is_11b(u8 rate)
  1529. {
  1530. return rate == 0x02 || rate == 0x04 || rate == 0x0b || rate == 0x16;
  1531. }
  1532. static int supp_rates_11b_only(struct ieee802_11_elems *elems)
  1533. {
  1534. int num_11b = 0, num_others = 0;
  1535. int i;
  1536. if (elems->supp_rates == NULL && elems->ext_supp_rates == NULL)
  1537. return 0;
  1538. for (i = 0; elems->supp_rates && i < elems->supp_rates_len; i++) {
  1539. if (is_11b(elems->supp_rates[i]))
  1540. num_11b++;
  1541. else
  1542. num_others++;
  1543. }
  1544. for (i = 0; elems->ext_supp_rates && i < elems->ext_supp_rates_len;
  1545. i++) {
  1546. if (is_11b(elems->ext_supp_rates[i]))
  1547. num_11b++;
  1548. else
  1549. num_others++;
  1550. }
  1551. return num_11b > 0 && num_others == 0;
  1552. }
  1553. static void p2p_reply_probe(struct p2p_data *p2p, const u8 *addr,
  1554. const u8 *dst, const u8 *bssid, const u8 *ie,
  1555. size_t ie_len)
  1556. {
  1557. struct ieee802_11_elems elems;
  1558. struct wpabuf *buf;
  1559. struct ieee80211_mgmt *resp;
  1560. struct p2p_message msg;
  1561. struct wpabuf *ies;
  1562. if (!p2p->in_listen || !p2p->drv_in_listen) {
  1563. /* not in Listen state - ignore Probe Request */
  1564. return;
  1565. }
  1566. if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
  1567. ParseFailed) {
  1568. /* Ignore invalid Probe Request frames */
  1569. return;
  1570. }
  1571. if (elems.p2p == NULL) {
  1572. /* not a P2P probe - ignore it */
  1573. return;
  1574. }
  1575. if (dst && !is_broadcast_ether_addr(dst) &&
  1576. os_memcmp(dst, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
  1577. /* Not sent to the broadcast address or our P2P Device Address
  1578. */
  1579. return;
  1580. }
  1581. if (bssid && !is_broadcast_ether_addr(bssid)) {
  1582. /* Not sent to the Wildcard BSSID */
  1583. return;
  1584. }
  1585. if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
  1586. os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
  1587. 0) {
  1588. /* not using P2P Wildcard SSID - ignore */
  1589. return;
  1590. }
  1591. if (supp_rates_11b_only(&elems)) {
  1592. /* Indicates support for 11b rates only */
  1593. return;
  1594. }
  1595. os_memset(&msg, 0, sizeof(msg));
  1596. if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
  1597. /* Could not parse P2P attributes */
  1598. return;
  1599. }
  1600. if (msg.device_id &&
  1601. os_memcmp(msg.device_id, p2p->cfg->dev_addr, ETH_ALEN != 0)) {
  1602. /* Device ID did not match */
  1603. p2p_parse_free(&msg);
  1604. return;
  1605. }
  1606. /* Check Requested Device Type match */
  1607. if (msg.wps_attributes &&
  1608. !p2p_match_dev_type(p2p, msg.wps_attributes)) {
  1609. /* No match with Requested Device Type */
  1610. p2p_parse_free(&msg);
  1611. return;
  1612. }
  1613. p2p_parse_free(&msg);
  1614. if (!p2p->cfg->send_probe_resp)
  1615. return; /* Response generated elsewhere */
  1616. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1617. "P2P: Reply to P2P Probe Request in Listen state");
  1618. /*
  1619. * We do not really have a specific BSS that this frame is advertising,
  1620. * so build a frame that has some information in valid format. This is
  1621. * really only used for discovery purposes, not to learn exact BSS
  1622. * parameters.
  1623. */
  1624. ies = p2p_build_probe_resp_ies(p2p);
  1625. if (ies == NULL)
  1626. return;
  1627. buf = wpabuf_alloc(200 + wpabuf_len(ies));
  1628. if (buf == NULL) {
  1629. wpabuf_free(ies);
  1630. return;
  1631. }
  1632. resp = NULL;
  1633. resp = wpabuf_put(buf, resp->u.probe_resp.variable - (u8 *) resp);
  1634. resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
  1635. (WLAN_FC_STYPE_PROBE_RESP << 4));
  1636. os_memcpy(resp->da, addr, ETH_ALEN);
  1637. os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
  1638. os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
  1639. resp->u.probe_resp.beacon_int = host_to_le16(100);
  1640. /* hardware or low-level driver will setup seq_ctrl and timestamp */
  1641. resp->u.probe_resp.capab_info =
  1642. host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
  1643. WLAN_CAPABILITY_PRIVACY |
  1644. WLAN_CAPABILITY_SHORT_SLOT_TIME);
  1645. wpabuf_put_u8(buf, WLAN_EID_SSID);
  1646. wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
  1647. wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
  1648. wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
  1649. wpabuf_put_u8(buf, 8);
  1650. wpabuf_put_u8(buf, (60 / 5) | 0x80);
  1651. wpabuf_put_u8(buf, 90 / 5);
  1652. wpabuf_put_u8(buf, (120 / 5) | 0x80);
  1653. wpabuf_put_u8(buf, 180 / 5);
  1654. wpabuf_put_u8(buf, (240 / 5) | 0x80);
  1655. wpabuf_put_u8(buf, 360 / 5);
  1656. wpabuf_put_u8(buf, 480 / 5);
  1657. wpabuf_put_u8(buf, 540 / 5);
  1658. wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
  1659. wpabuf_put_u8(buf, 1);
  1660. wpabuf_put_u8(buf, p2p->cfg->channel);
  1661. wpabuf_put_buf(buf, ies);
  1662. wpabuf_free(ies);
  1663. p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf);
  1664. wpabuf_free(buf);
  1665. }
  1666. int p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
  1667. const u8 *bssid, const u8 *ie, size_t ie_len)
  1668. {
  1669. p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
  1670. p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len);
  1671. if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
  1672. p2p->go_neg_peer &&
  1673. os_memcmp(addr, p2p->go_neg_peer->info.p2p_device_addr, ETH_ALEN)
  1674. == 0) {
  1675. /* Received a Probe Request from GO Negotiation peer */
  1676. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1677. "P2P: Found GO Negotiation peer - try to start GO "
  1678. "negotiation from timeout");
  1679. eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
  1680. return 1;
  1681. }
  1682. if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
  1683. p2p->invite_peer &&
  1684. os_memcmp(addr, p2p->invite_peer->info.p2p_device_addr, ETH_ALEN)
  1685. == 0) {
  1686. /* Received a Probe Request from Invite peer */
  1687. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1688. "P2P: Found Invite peer - try to start Invite from "
  1689. "timeout");
  1690. eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
  1691. return 1;
  1692. }
  1693. return 0;
  1694. }
  1695. static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
  1696. u8 *buf, size_t len, struct wpabuf *p2p_ie)
  1697. {
  1698. struct wpabuf *tmp;
  1699. u8 *lpos;
  1700. size_t tmplen;
  1701. int res;
  1702. u8 group_capab;
  1703. if (p2p_ie == NULL)
  1704. return 0; /* WLAN AP is not a P2P manager */
  1705. /*
  1706. * (Re)Association Request - P2P IE
  1707. * P2P Capability attribute (shall be present)
  1708. * P2P Interface attribute (present if concurrent device and
  1709. * P2P Management is enabled)
  1710. */
  1711. tmp = wpabuf_alloc(200);
  1712. if (tmp == NULL)
  1713. return -1;
  1714. lpos = p2p_buf_add_ie_hdr(tmp);
  1715. group_capab = 0;
  1716. if (p2p->num_groups > 0) {
  1717. group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
  1718. if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
  1719. (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
  1720. p2p->cross_connect)
  1721. group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
  1722. }
  1723. p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
  1724. if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
  1725. (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
  1726. p2p_buf_add_p2p_interface(tmp, p2p);
  1727. p2p_buf_update_ie_hdr(tmp, lpos);
  1728. tmplen = wpabuf_len(tmp);
  1729. if (tmplen > len)
  1730. res = -1;
  1731. else {
  1732. os_memcpy(buf, wpabuf_head(tmp), tmplen);
  1733. res = tmplen;
  1734. }
  1735. wpabuf_free(tmp);
  1736. return res;
  1737. }
  1738. int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
  1739. size_t len, int p2p_group, struct wpabuf *p2p_ie)
  1740. {
  1741. struct wpabuf *tmp;
  1742. u8 *lpos;
  1743. struct p2p_device *peer;
  1744. size_t tmplen;
  1745. int res;
  1746. if (!p2p_group)
  1747. return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
  1748. /*
  1749. * (Re)Association Request - P2P IE
  1750. * P2P Capability attribute (shall be present)
  1751. * Extended Listen Timing (may be present)
  1752. * P2P Device Info attribute (shall be present)
  1753. */
  1754. tmp = wpabuf_alloc(200);
  1755. if (tmp == NULL)
  1756. return -1;
  1757. peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
  1758. lpos = p2p_buf_add_ie_hdr(tmp);
  1759. p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
  1760. if (p2p->ext_listen_interval)
  1761. p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
  1762. p2p->ext_listen_interval);
  1763. p2p_buf_add_device_info(tmp, p2p, peer);
  1764. p2p_buf_update_ie_hdr(tmp, lpos);
  1765. tmplen = wpabuf_len(tmp);
  1766. if (tmplen > len)
  1767. res = -1;
  1768. else {
  1769. os_memcpy(buf, wpabuf_head(tmp), tmplen);
  1770. res = tmplen;
  1771. }
  1772. wpabuf_free(tmp);
  1773. return res;
  1774. }
  1775. int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
  1776. {
  1777. struct wpabuf *p2p_ie;
  1778. int ret;
  1779. p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
  1780. if (p2p_ie == NULL)
  1781. return 0;
  1782. ret = p2p_attr_text(p2p_ie, buf, end);
  1783. wpabuf_free(p2p_ie);
  1784. return ret;
  1785. }
  1786. static void p2p_clear_go_neg(struct p2p_data *p2p)
  1787. {
  1788. p2p->go_neg_peer = NULL;
  1789. p2p_clear_timeout(p2p);
  1790. p2p_set_state(p2p, P2P_IDLE);
  1791. }
  1792. void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
  1793. {
  1794. if (p2p->go_neg_peer == NULL) {
  1795. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1796. "P2P: No pending Group Formation - "
  1797. "ignore WPS registration success notification");
  1798. return; /* No pending Group Formation */
  1799. }
  1800. if (os_memcmp(mac_addr, p2p->go_neg_peer->intended_addr, ETH_ALEN) !=
  1801. 0) {
  1802. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1803. "P2P: Ignore WPS registration success notification "
  1804. "for " MACSTR " (GO Negotiation peer " MACSTR ")",
  1805. MAC2STR(mac_addr),
  1806. MAC2STR(p2p->go_neg_peer->intended_addr));
  1807. return; /* Ignore unexpected peer address */
  1808. }
  1809. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1810. "P2P: Group Formation completed successfully with " MACSTR,
  1811. MAC2STR(mac_addr));
  1812. p2p_clear_go_neg(p2p);
  1813. }
  1814. void p2p_group_formation_failed(struct p2p_data *p2p)
  1815. {
  1816. if (p2p->go_neg_peer == NULL) {
  1817. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1818. "P2P: No pending Group Formation - "
  1819. "ignore group formation failure notification");
  1820. return; /* No pending Group Formation */
  1821. }
  1822. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  1823. "P2P: Group Formation failed with " MACSTR,
  1824. MAC2STR(p2p->go_neg_peer->intended_addr));
  1825. p2p_clear_go_neg(p2p);
  1826. }
  1827. struct p2p_data * p2p_init(const struct p2p_config *cfg)
  1828. {
  1829. struct p2p_data *p2p;
  1830. if (cfg->max_peers < 1)
  1831. return NULL;
  1832. p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
  1833. if (p2p == NULL)
  1834. return NULL;
  1835. p2p->cfg = (struct p2p_config *) (p2p + 1);
  1836. os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
  1837. if (cfg->dev_name)
  1838. p2p->cfg->dev_name = os_strdup(cfg->dev_name);
  1839. if (cfg->manufacturer)
  1840. p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
  1841. if (cfg->model_name)
  1842. p2p->cfg->model_name = os_strdup(cfg->model_name);
  1843. if (cfg->model_number)
  1844. p2p->cfg->model_number = os_strdup(cfg->model_number);
  1845. if (cfg->serial_number)
  1846. p2p->cfg->serial_number = os_strdup(cfg->serial_number);
  1847. p2p->min_disc_int = 1;
  1848. p2p->max_disc_int = 3;
  1849. os_get_random(&p2p->next_tie_breaker, 1);
  1850. p2p->next_tie_breaker &= 0x01;
  1851. if (cfg->sd_request)
  1852. p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
  1853. p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
  1854. if (cfg->concurrent_operations)
  1855. p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
  1856. p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
  1857. dl_list_init(&p2p->devices);
  1858. eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
  1859. p2p_expiration_timeout, p2p, NULL);
  1860. return p2p;
  1861. }
  1862. void p2p_deinit(struct p2p_data *p2p)
  1863. {
  1864. eloop_cancel_timeout(p2p_expiration_timeout, p2p, NULL);
  1865. eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
  1866. eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
  1867. p2p_flush(p2p);
  1868. p2p_free_req_dev_types(p2p);
  1869. os_free(p2p->cfg->dev_name);
  1870. os_free(p2p->cfg->manufacturer);
  1871. os_free(p2p->cfg->model_name);
  1872. os_free(p2p->cfg->model_number);
  1873. os_free(p2p->cfg->serial_number);
  1874. os_free(p2p->groups);
  1875. wpabuf_free(p2p->sd_resp);
  1876. os_free(p2p->after_scan_tx);
  1877. p2p_remove_wps_vendor_extensions(p2p);
  1878. os_free(p2p);
  1879. }
  1880. void p2p_flush(struct p2p_data *p2p)
  1881. {
  1882. struct p2p_device *dev, *prev;
  1883. p2p_clear_timeout(p2p);
  1884. p2p_set_state(p2p, P2P_IDLE);
  1885. p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
  1886. p2p->go_neg_peer = NULL;
  1887. eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
  1888. dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
  1889. list) {
  1890. dl_list_del(&dev->list);
  1891. p2p_device_free(p2p, dev);
  1892. }
  1893. p2p_free_sd_queries(p2p);
  1894. os_free(p2p->after_scan_tx);
  1895. p2p->after_scan_tx = NULL;
  1896. }
  1897. int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
  1898. {
  1899. struct p2p_device *dev;
  1900. dev = p2p_get_device(p2p, addr);
  1901. if (dev == NULL)
  1902. return -1;
  1903. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unauthorizing " MACSTR,
  1904. MAC2STR(addr));
  1905. if (p2p->go_neg_peer == dev)
  1906. p2p->go_neg_peer = NULL;
  1907. dev->wps_method = WPS_NOT_READY;
  1908. dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
  1909. dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
  1910. /* Check if after_scan_tx is for this peer. If so free it */
  1911. if (p2p->after_scan_tx &&
  1912. os_memcmp(addr, p2p->after_scan_tx->dst, ETH_ALEN) == 0) {
  1913. os_free(p2p->after_scan_tx);
  1914. p2p->after_scan_tx = NULL;
  1915. }
  1916. return 0;
  1917. }
  1918. int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
  1919. {
  1920. os_free(p2p->cfg->dev_name);
  1921. if (dev_name) {
  1922. p2p->cfg->dev_name = os_strdup(dev_name);
  1923. if (p2p->cfg->dev_name == NULL)
  1924. return -1;
  1925. } else
  1926. p2p->cfg->dev_name = NULL;
  1927. return 0;
  1928. }
  1929. int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
  1930. {
  1931. os_free(p2p->cfg->manufacturer);
  1932. p2p->cfg->manufacturer = NULL;
  1933. if (manufacturer) {
  1934. p2p->cfg->manufacturer = os_strdup(manufacturer);
  1935. if (p2p->cfg->manufacturer == NULL)
  1936. return -1;
  1937. }
  1938. return 0;
  1939. }
  1940. int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
  1941. {
  1942. os_free(p2p->cfg->model_name);
  1943. p2p->cfg->model_name = NULL;
  1944. if (model_name) {
  1945. p2p->cfg->model_name = os_strdup(model_name);
  1946. if (p2p->cfg->model_name == NULL)
  1947. return -1;
  1948. }
  1949. return 0;
  1950. }
  1951. int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
  1952. {
  1953. os_free(p2p->cfg->model_number);
  1954. p2p->cfg->model_number = NULL;
  1955. if (model_number) {
  1956. p2p->cfg->model_number = os_strdup(model_number);
  1957. if (p2p->cfg->model_number == NULL)
  1958. return -1;
  1959. }
  1960. return 0;
  1961. }
  1962. int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
  1963. {
  1964. os_free(p2p->cfg->serial_number);
  1965. p2p->cfg->serial_number = NULL;
  1966. if (serial_number) {
  1967. p2p->cfg->serial_number = os_strdup(serial_number);
  1968. if (p2p->cfg->serial_number == NULL)
  1969. return -1;
  1970. }
  1971. return 0;
  1972. }
  1973. void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
  1974. {
  1975. p2p->cfg->config_methods = config_methods;
  1976. }
  1977. void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
  1978. {
  1979. os_memcpy(p2p->cfg->uuid, uuid, 16);
  1980. }
  1981. int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
  1982. {
  1983. os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
  1984. return 0;
  1985. }
  1986. int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
  1987. size_t num_dev_types)
  1988. {
  1989. if (num_dev_types > P2P_SEC_DEVICE_TYPES)
  1990. num_dev_types = P2P_SEC_DEVICE_TYPES;
  1991. p2p->cfg->num_sec_dev_types = num_dev_types;
  1992. os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
  1993. return 0;
  1994. }
  1995. void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
  1996. {
  1997. int i;
  1998. for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
  1999. wpabuf_free(p2p->wps_vendor_ext[i]);
  2000. p2p->wps_vendor_ext[i] = NULL;
  2001. }
  2002. }
  2003. int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
  2004. const struct wpabuf *vendor_ext)
  2005. {
  2006. int i;
  2007. if (vendor_ext == NULL)
  2008. return -1;
  2009. for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
  2010. if (p2p->wps_vendor_ext[i] == NULL)
  2011. break;
  2012. }
  2013. if (i >= P2P_MAX_WPS_VENDOR_EXT)
  2014. return -1;
  2015. p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
  2016. if (p2p->wps_vendor_ext[i] == NULL)
  2017. return -1;
  2018. return 0;
  2019. }
  2020. int p2p_set_country(struct p2p_data *p2p, const char *country)
  2021. {
  2022. os_memcpy(p2p->cfg->country, country, 3);
  2023. return 0;
  2024. }
  2025. void p2p_continue_find(struct p2p_data *p2p)
  2026. {
  2027. struct p2p_device *dev;
  2028. p2p_set_state(p2p, P2P_SEARCH);
  2029. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  2030. if (dev->flags & P2P_DEV_SD_SCHEDULE) {
  2031. if (p2p_start_sd(p2p, dev) == 0)
  2032. return;
  2033. else
  2034. break;
  2035. } else if (dev->req_config_methods &&
  2036. !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
  2037. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
  2038. "pending Provision Discovery Request to "
  2039. MACSTR " (config methods 0x%x)",
  2040. MAC2STR(dev->info.p2p_device_addr),
  2041. dev->req_config_methods);
  2042. if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
  2043. return;
  2044. }
  2045. }
  2046. p2p_listen_in_find(p2p);
  2047. }
  2048. static void p2p_sd_cb(struct p2p_data *p2p, int success)
  2049. {
  2050. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2051. "P2P: Service Discovery Query TX callback: success=%d",
  2052. success);
  2053. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2054. if (!success) {
  2055. if (p2p->sd_peer) {
  2056. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  2057. p2p->sd_peer = NULL;
  2058. }
  2059. p2p_continue_find(p2p);
  2060. return;
  2061. }
  2062. if (p2p->sd_peer == NULL) {
  2063. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2064. "P2P: No SD peer entry known");
  2065. p2p_continue_find(p2p);
  2066. return;
  2067. }
  2068. /* Wait for response from the peer */
  2069. p2p_set_state(p2p, P2P_SD_DURING_FIND);
  2070. p2p_set_timeout(p2p, 0, 200000);
  2071. }
  2072. /**
  2073. * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
  2074. * @p2p: P2P module context from p2p_init()
  2075. */
  2076. static void p2p_retry_pd(struct p2p_data *p2p)
  2077. {
  2078. struct p2p_device *dev;
  2079. if (p2p->state != P2P_IDLE)
  2080. return;
  2081. /*
  2082. * Retry the prov disc req attempt only for the peer that the user had
  2083. * requested for and provided a join has not been initiated on it
  2084. * in the meantime.
  2085. */
  2086. dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
  2087. if (os_memcmp(p2p->pending_pd_devaddr,
  2088. dev->info.p2p_device_addr, ETH_ALEN) != 0)
  2089. continue;
  2090. if (!dev->req_config_methods)
  2091. continue;
  2092. if (dev->flags & P2P_DEV_PD_FOR_JOIN)
  2093. continue;
  2094. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
  2095. "pending Provision Discovery Request to "
  2096. MACSTR " (config methods 0x%x)",
  2097. MAC2STR(dev->info.p2p_device_addr),
  2098. dev->req_config_methods);
  2099. p2p_send_prov_disc_req(p2p, dev, 0, 0);
  2100. return;
  2101. }
  2102. }
  2103. static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
  2104. {
  2105. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2106. "P2P: Provision Discovery Request TX callback: success=%d",
  2107. success);
  2108. /*
  2109. * Postpone resetting the pending action state till after we actually
  2110. * time out. This allows us to take some action like notifying any
  2111. * interested parties about no response to the request.
  2112. *
  2113. * When the timer (below) goes off we check in IDLE, SEARCH, or
  2114. * LISTEN_ONLY state, which are the only allowed states to issue a PD
  2115. * requests in, if this was still pending and then raise notification.
  2116. */
  2117. if (!success) {
  2118. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2119. if (p2p->state != P2P_IDLE)
  2120. p2p_continue_find(p2p);
  2121. else if (p2p->user_initiated_pd) {
  2122. p2p->pending_action_state = P2P_PENDING_PD;
  2123. p2p_set_timeout(p2p, 0, 300000);
  2124. }
  2125. return;
  2126. }
  2127. /*
  2128. * This postponing, of resetting pending_action_state, needs to be
  2129. * done only for user initiated PD requests and not internal ones.
  2130. */
  2131. if (p2p->user_initiated_pd)
  2132. p2p->pending_action_state = P2P_PENDING_PD;
  2133. else
  2134. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2135. /* Wait for response from the peer */
  2136. if (p2p->state == P2P_SEARCH)
  2137. p2p_set_state(p2p, P2P_PD_DURING_FIND);
  2138. p2p_set_timeout(p2p, 0, 200000);
  2139. }
  2140. int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
  2141. int level, const u8 *ies, size_t ies_len)
  2142. {
  2143. p2p_add_device(p2p, bssid, freq, level, ies, ies_len);
  2144. if (p2p->go_neg_peer && p2p->state == P2P_SEARCH &&
  2145. os_memcmp(p2p->go_neg_peer->info.p2p_device_addr, bssid, ETH_ALEN)
  2146. == 0) {
  2147. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2148. "P2P: Found GO Negotiation peer - try to start GO "
  2149. "negotiation");
  2150. p2p_connect_send(p2p, p2p->go_neg_peer);
  2151. return 1;
  2152. }
  2153. return 0;
  2154. }
  2155. void p2p_scan_res_handled(struct p2p_data *p2p)
  2156. {
  2157. if (!p2p->p2p_scan_running) {
  2158. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan was not "
  2159. "running, but scan results received");
  2160. }
  2161. p2p->p2p_scan_running = 0;
  2162. eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
  2163. if (p2p_run_after_scan(p2p))
  2164. return;
  2165. if (p2p->state == P2P_SEARCH)
  2166. p2p_continue_find(p2p);
  2167. }
  2168. void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id)
  2169. {
  2170. u8 *len = p2p_buf_add_ie_hdr(ies);
  2171. p2p_buf_add_capability(ies, p2p->dev_capab, 0);
  2172. if (dev_id)
  2173. p2p_buf_add_device_id(ies, dev_id);
  2174. if (p2p->cfg->reg_class && p2p->cfg->channel)
  2175. p2p_buf_add_listen_channel(ies, p2p->cfg->country,
  2176. p2p->cfg->reg_class,
  2177. p2p->cfg->channel);
  2178. if (p2p->ext_listen_interval)
  2179. p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
  2180. p2p->ext_listen_interval);
  2181. /* TODO: p2p_buf_add_operating_channel() if GO */
  2182. p2p_buf_update_ie_hdr(ies, len);
  2183. }
  2184. size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
  2185. {
  2186. return 100;
  2187. }
  2188. int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
  2189. {
  2190. return p2p_attr_text(p2p_ie, buf, end);
  2191. }
  2192. static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
  2193. {
  2194. struct p2p_device *dev = p2p->go_neg_peer;
  2195. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2196. "P2P: GO Negotiation Request TX callback: success=%d",
  2197. success);
  2198. if (dev == NULL) {
  2199. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2200. "P2P: No pending GO Negotiation");
  2201. return;
  2202. }
  2203. if (success) {
  2204. dev->go_neg_req_sent++;
  2205. if (dev->flags & P2P_DEV_USER_REJECTED) {
  2206. p2p_set_state(p2p, P2P_IDLE);
  2207. return;
  2208. }
  2209. }
  2210. if (!success &&
  2211. (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
  2212. !is_zero_ether_addr(dev->member_in_go_dev)) {
  2213. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2214. "P2P: Peer " MACSTR " did not acknowledge request - "
  2215. "try to use device discoverability through its GO",
  2216. MAC2STR(dev->info.p2p_device_addr));
  2217. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2218. p2p_send_dev_disc_req(p2p, dev);
  2219. return;
  2220. }
  2221. /*
  2222. * Use P2P find, if needed, to find the other device from its listen
  2223. * channel.
  2224. */
  2225. p2p_set_state(p2p, P2P_CONNECT);
  2226. p2p_set_timeout(p2p, 0, 100000);
  2227. }
  2228. static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
  2229. {
  2230. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2231. "P2P: GO Negotiation Response TX callback: success=%d",
  2232. success);
  2233. if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
  2234. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2235. "P2P: Ignore TX callback event - GO Negotiation is "
  2236. "not running anymore");
  2237. return;
  2238. }
  2239. p2p_set_state(p2p, P2P_CONNECT);
  2240. p2p_set_timeout(p2p, 0, 100000);
  2241. }
  2242. static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success)
  2243. {
  2244. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2245. "P2P: GO Negotiation Response (failure) TX callback: "
  2246. "success=%d", success);
  2247. if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
  2248. p2p_go_neg_failed(p2p, p2p->go_neg_peer,
  2249. p2p->go_neg_peer->status);
  2250. }
  2251. }
  2252. static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
  2253. enum p2p_send_action_result result)
  2254. {
  2255. struct p2p_device *dev;
  2256. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2257. "P2P: GO Negotiation Confirm TX callback: result=%d",
  2258. result);
  2259. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2260. if (result == P2P_SEND_ACTION_FAILED) {
  2261. p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
  2262. return;
  2263. }
  2264. if (result == P2P_SEND_ACTION_NO_ACK) {
  2265. /*
  2266. * It looks like the TX status for GO Negotiation Confirm is
  2267. * often showing failure even when the peer has actually
  2268. * received the frame. Since the peer may change channels
  2269. * immediately after having received the frame, we may not see
  2270. * an Ack for retries, so just dropping a single frame may
  2271. * trigger this. To allow the group formation to succeed if the
  2272. * peer did indeed receive the frame, continue regardless of
  2273. * the TX status.
  2274. */
  2275. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2276. "P2P: Assume GO Negotiation Confirm TX was actually "
  2277. "received by the peer even though Ack was not "
  2278. "reported");
  2279. }
  2280. dev = p2p->go_neg_peer;
  2281. if (dev == NULL)
  2282. return;
  2283. p2p_go_complete(p2p, dev);
  2284. }
  2285. void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
  2286. const u8 *src, const u8 *bssid,
  2287. enum p2p_send_action_result result)
  2288. {
  2289. enum p2p_pending_action_state state;
  2290. int success;
  2291. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2292. "P2P: Action frame TX callback (state=%d freq=%u dst=" MACSTR
  2293. " src=" MACSTR " bssid=" MACSTR " result=%d",
  2294. p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
  2295. MAC2STR(bssid), result);
  2296. success = result == P2P_SEND_ACTION_SUCCESS;
  2297. state = p2p->pending_action_state;
  2298. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2299. switch (state) {
  2300. case P2P_NO_PENDING_ACTION:
  2301. break;
  2302. case P2P_PENDING_GO_NEG_REQUEST:
  2303. p2p_go_neg_req_cb(p2p, success);
  2304. break;
  2305. case P2P_PENDING_GO_NEG_RESPONSE:
  2306. p2p_go_neg_resp_cb(p2p, success);
  2307. break;
  2308. case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
  2309. p2p_go_neg_resp_failure_cb(p2p, success);
  2310. break;
  2311. case P2P_PENDING_GO_NEG_CONFIRM:
  2312. p2p_go_neg_conf_cb(p2p, result);
  2313. break;
  2314. case P2P_PENDING_SD:
  2315. p2p_sd_cb(p2p, success);
  2316. break;
  2317. case P2P_PENDING_PD:
  2318. p2p_prov_disc_cb(p2p, success);
  2319. break;
  2320. case P2P_PENDING_INVITATION_REQUEST:
  2321. p2p_invitation_req_cb(p2p, success);
  2322. break;
  2323. case P2P_PENDING_INVITATION_RESPONSE:
  2324. p2p_invitation_resp_cb(p2p, success);
  2325. break;
  2326. case P2P_PENDING_DEV_DISC_REQUEST:
  2327. p2p_dev_disc_req_cb(p2p, success);
  2328. break;
  2329. case P2P_PENDING_DEV_DISC_RESPONSE:
  2330. p2p_dev_disc_resp_cb(p2p, success);
  2331. break;
  2332. case P2P_PENDING_GO_DISC_REQ:
  2333. p2p_go_disc_req_cb(p2p, success);
  2334. break;
  2335. }
  2336. }
  2337. void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
  2338. unsigned int duration)
  2339. {
  2340. if (freq == p2p->pending_client_disc_freq) {
  2341. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2342. "P2P: Client discoverability remain-awake completed");
  2343. p2p->pending_client_disc_freq = 0;
  2344. return;
  2345. }
  2346. if (freq != p2p->pending_listen_freq) {
  2347. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2348. "P2P: Unexpected listen callback for freq=%u "
  2349. "duration=%u (pending_listen_freq=%u)",
  2350. freq, duration, p2p->pending_listen_freq);
  2351. return;
  2352. }
  2353. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2354. "P2P: Starting Listen timeout(%u,%u) on freq=%u based on "
  2355. "callback",
  2356. p2p->pending_listen_sec, p2p->pending_listen_usec,
  2357. p2p->pending_listen_freq);
  2358. p2p->in_listen = 1;
  2359. p2p->drv_in_listen = freq;
  2360. if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
  2361. /*
  2362. * Add 20 msec extra wait to avoid race condition with driver
  2363. * remain-on-channel end event, i.e., give driver more time to
  2364. * complete the operation before our timeout expires.
  2365. */
  2366. p2p_set_timeout(p2p, p2p->pending_listen_sec,
  2367. p2p->pending_listen_usec + 20000);
  2368. }
  2369. p2p->pending_listen_freq = 0;
  2370. }
  2371. int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
  2372. {
  2373. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver ended Listen "
  2374. "state (freq=%u)", freq);
  2375. p2p->drv_in_listen = 0;
  2376. if (p2p->in_listen)
  2377. return 0; /* Internal timeout will trigger the next step */
  2378. if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
  2379. if (p2p->go_neg_peer->connect_reqs >= 120) {
  2380. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2381. "P2P: Timeout on sending GO Negotiation "
  2382. "Request without getting response");
  2383. p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
  2384. return 0;
  2385. }
  2386. p2p_set_state(p2p, P2P_CONNECT);
  2387. p2p_connect_send(p2p, p2p->go_neg_peer);
  2388. return 1;
  2389. } else if (p2p->state == P2P_SEARCH) {
  2390. p2p_search(p2p);
  2391. return 1;
  2392. }
  2393. return 0;
  2394. }
  2395. static void p2p_timeout_connect(struct p2p_data *p2p)
  2396. {
  2397. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2398. p2p_set_state(p2p, P2P_CONNECT_LISTEN);
  2399. p2p_listen_in_find(p2p);
  2400. }
  2401. static void p2p_timeout_connect_listen(struct p2p_data *p2p)
  2402. {
  2403. if (p2p->go_neg_peer) {
  2404. if (p2p->drv_in_listen) {
  2405. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is "
  2406. "still in Listen state; wait for it to "
  2407. "complete");
  2408. return;
  2409. }
  2410. if (p2p->go_neg_peer->connect_reqs >= 120) {
  2411. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2412. "P2P: Timeout on sending GO Negotiation "
  2413. "Request without getting response");
  2414. p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
  2415. return;
  2416. }
  2417. p2p_set_state(p2p, P2P_CONNECT);
  2418. p2p_connect_send(p2p, p2p->go_neg_peer);
  2419. } else
  2420. p2p_set_state(p2p, P2P_IDLE);
  2421. }
  2422. static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
  2423. {
  2424. /*
  2425. * TODO: could remain constantly in Listen state for some time if there
  2426. * are no other concurrent uses for the radio. For now, go to listen
  2427. * state once per second to give other uses a chance to use the radio.
  2428. */
  2429. p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
  2430. p2p_set_timeout(p2p, 0, 500000);
  2431. }
  2432. static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
  2433. {
  2434. struct p2p_device *dev = p2p->go_neg_peer;
  2435. if (dev == NULL) {
  2436. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2437. "P2P: Unknown GO Neg peer - stop GO Neg wait");
  2438. return;
  2439. }
  2440. dev->wait_count++;
  2441. if (dev->wait_count >= 120) {
  2442. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2443. "P2P: Timeout on waiting peer to become ready for GO "
  2444. "Negotiation");
  2445. p2p_go_neg_failed(p2p, dev, -1);
  2446. return;
  2447. }
  2448. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2449. "P2P: Go to Listen state while waiting for the peer to become "
  2450. "ready for GO Negotiation");
  2451. p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
  2452. p2p_listen_in_find(p2p);
  2453. }
  2454. static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
  2455. {
  2456. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2457. "P2P: Service Discovery Query timeout");
  2458. if (p2p->sd_peer) {
  2459. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2460. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  2461. p2p->sd_peer = NULL;
  2462. }
  2463. p2p_continue_find(p2p);
  2464. }
  2465. static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
  2466. {
  2467. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2468. "P2P: Provision Discovery Request timeout");
  2469. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2470. p2p_continue_find(p2p);
  2471. }
  2472. static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
  2473. {
  2474. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2475. /*
  2476. * For user initiated PD requests that we have not gotten any responses
  2477. * for while in IDLE state, we retry them a couple of times before
  2478. * giving up.
  2479. */
  2480. if (!p2p->user_initiated_pd)
  2481. return;
  2482. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2483. "P2P: User initiated Provision Discovery Request timeout");
  2484. if (p2p->pd_retries) {
  2485. p2p->pd_retries--;
  2486. p2p_retry_pd(p2p);
  2487. } else {
  2488. if (p2p->cfg->prov_disc_fail)
  2489. p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
  2490. p2p->pending_pd_devaddr,
  2491. P2P_PROV_DISC_TIMEOUT);
  2492. p2p_reset_pending_pd(p2p);
  2493. }
  2494. }
  2495. static void p2p_timeout_invite(struct p2p_data *p2p)
  2496. {
  2497. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  2498. p2p_set_state(p2p, P2P_INVITE_LISTEN);
  2499. if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
  2500. /*
  2501. * Better remain on operating channel instead of listen channel
  2502. * when running a group.
  2503. */
  2504. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Inviting in "
  2505. "active GO role - wait on operating channel");
  2506. p2p_set_timeout(p2p, 0, 100000);
  2507. return;
  2508. }
  2509. p2p_listen_in_find(p2p);
  2510. }
  2511. static void p2p_timeout_invite_listen(struct p2p_data *p2p)
  2512. {
  2513. if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
  2514. p2p_set_state(p2p, P2P_INVITE);
  2515. p2p_invite_send(p2p, p2p->invite_peer,
  2516. p2p->invite_go_dev_addr);
  2517. } else {
  2518. if (p2p->invite_peer) {
  2519. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2520. "P2P: Invitation Request retry limit reached");
  2521. if (p2p->cfg->invitation_result)
  2522. p2p->cfg->invitation_result(
  2523. p2p->cfg->cb_ctx, -1, NULL);
  2524. }
  2525. p2p_set_state(p2p, P2P_IDLE);
  2526. }
  2527. }
  2528. static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
  2529. {
  2530. struct p2p_data *p2p = eloop_ctx;
  2531. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Timeout (state=%s)",
  2532. p2p_state_txt(p2p->state));
  2533. p2p->in_listen = 0;
  2534. switch (p2p->state) {
  2535. case P2P_IDLE:
  2536. /* Check if we timed out waiting for PD req */
  2537. if (p2p->pending_action_state == P2P_PENDING_PD)
  2538. p2p_timeout_prov_disc_req(p2p);
  2539. break;
  2540. case P2P_SEARCH:
  2541. /* Check if we timed out waiting for PD req */
  2542. if (p2p->pending_action_state == P2P_PENDING_PD)
  2543. p2p_timeout_prov_disc_req(p2p);
  2544. p2p_search(p2p);
  2545. break;
  2546. case P2P_CONNECT:
  2547. p2p_timeout_connect(p2p);
  2548. break;
  2549. case P2P_CONNECT_LISTEN:
  2550. p2p_timeout_connect_listen(p2p);
  2551. break;
  2552. case P2P_GO_NEG:
  2553. break;
  2554. case P2P_LISTEN_ONLY:
  2555. /* Check if we timed out waiting for PD req */
  2556. if (p2p->pending_action_state == P2P_PENDING_PD)
  2557. p2p_timeout_prov_disc_req(p2p);
  2558. if (p2p->ext_listen_only) {
  2559. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2560. "P2P: Extended Listen Timing - Listen State "
  2561. "completed");
  2562. p2p->ext_listen_only = 0;
  2563. p2p_set_state(p2p, P2P_IDLE);
  2564. }
  2565. break;
  2566. case P2P_WAIT_PEER_CONNECT:
  2567. p2p_timeout_wait_peer_connect(p2p);
  2568. break;
  2569. case P2P_WAIT_PEER_IDLE:
  2570. p2p_timeout_wait_peer_idle(p2p);
  2571. break;
  2572. case P2P_SD_DURING_FIND:
  2573. p2p_timeout_sd_during_find(p2p);
  2574. break;
  2575. case P2P_PROVISIONING:
  2576. break;
  2577. case P2P_PD_DURING_FIND:
  2578. p2p_timeout_prov_disc_during_find(p2p);
  2579. break;
  2580. case P2P_INVITE:
  2581. p2p_timeout_invite(p2p);
  2582. break;
  2583. case P2P_INVITE_LISTEN:
  2584. p2p_timeout_invite_listen(p2p);
  2585. break;
  2586. case P2P_SEARCH_WHEN_READY:
  2587. break;
  2588. }
  2589. }
  2590. int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
  2591. {
  2592. struct p2p_device *dev;
  2593. dev = p2p_get_device(p2p, peer_addr);
  2594. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Local request to reject "
  2595. "connection attempts by peer " MACSTR, MAC2STR(peer_addr));
  2596. if (dev == NULL) {
  2597. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
  2598. " unknown", MAC2STR(peer_addr));
  2599. return -1;
  2600. }
  2601. dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
  2602. dev->flags |= P2P_DEV_USER_REJECTED;
  2603. return 0;
  2604. }
  2605. const char * p2p_wps_method_text(enum p2p_wps_method method)
  2606. {
  2607. switch (method) {
  2608. case WPS_NOT_READY:
  2609. return "not-ready";
  2610. case WPS_PIN_DISPLAY:
  2611. return "Display";
  2612. case WPS_PIN_KEYPAD:
  2613. return "Keypad";
  2614. case WPS_PBC:
  2615. return "PBC";
  2616. }
  2617. return "??";
  2618. }
  2619. static const char * p2p_go_state_text(enum p2p_go_state go_state)
  2620. {
  2621. switch (go_state) {
  2622. case UNKNOWN_GO:
  2623. return "unknown";
  2624. case LOCAL_GO:
  2625. return "local";
  2626. case REMOTE_GO:
  2627. return "remote";
  2628. }
  2629. return "??";
  2630. }
  2631. const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
  2632. const u8 *addr, int next)
  2633. {
  2634. struct p2p_device *dev;
  2635. if (addr)
  2636. dev = p2p_get_device(p2p, addr);
  2637. else
  2638. dev = dl_list_first(&p2p->devices, struct p2p_device, list);
  2639. if (dev && next) {
  2640. dev = dl_list_first(&dev->list, struct p2p_device, list);
  2641. if (&dev->list == &p2p->devices)
  2642. dev = NULL;
  2643. }
  2644. if (dev == NULL)
  2645. return NULL;
  2646. return &dev->info;
  2647. }
  2648. int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
  2649. char *buf, size_t buflen)
  2650. {
  2651. struct p2p_device *dev;
  2652. int res;
  2653. char *pos, *end;
  2654. struct os_time now;
  2655. if (info == NULL)
  2656. return -1;
  2657. dev = (struct p2p_device *) (((u8 *) info) -
  2658. offsetof(struct p2p_device, info));
  2659. pos = buf;
  2660. end = buf + buflen;
  2661. os_get_time(&now);
  2662. res = os_snprintf(pos, end - pos,
  2663. "age=%d\n"
  2664. "listen_freq=%d\n"
  2665. "wps_method=%s\n"
  2666. "interface_addr=" MACSTR "\n"
  2667. "member_in_go_dev=" MACSTR "\n"
  2668. "member_in_go_iface=" MACSTR "\n"
  2669. "go_neg_req_sent=%d\n"
  2670. "go_state=%s\n"
  2671. "dialog_token=%u\n"
  2672. "intended_addr=" MACSTR "\n"
  2673. "country=%c%c\n"
  2674. "oper_freq=%d\n"
  2675. "req_config_methods=0x%x\n"
  2676. "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
  2677. "status=%d\n"
  2678. "wait_count=%u\n"
  2679. "invitation_reqs=%u\n",
  2680. (int) (now.sec - dev->last_seen.sec),
  2681. dev->listen_freq,
  2682. p2p_wps_method_text(dev->wps_method),
  2683. MAC2STR(dev->interface_addr),
  2684. MAC2STR(dev->member_in_go_dev),
  2685. MAC2STR(dev->member_in_go_iface),
  2686. dev->go_neg_req_sent,
  2687. p2p_go_state_text(dev->go_state),
  2688. dev->dialog_token,
  2689. MAC2STR(dev->intended_addr),
  2690. dev->country[0] ? dev->country[0] : '_',
  2691. dev->country[1] ? dev->country[1] : '_',
  2692. dev->oper_freq,
  2693. dev->req_config_methods,
  2694. dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
  2695. "[PROBE_REQ_ONLY]" : "",
  2696. dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
  2697. dev->flags & P2P_DEV_NOT_YET_READY ?
  2698. "[NOT_YET_READY]" : "",
  2699. dev->flags & P2P_DEV_SD_INFO ? "[SD_INFO]" : "",
  2700. dev->flags & P2P_DEV_SD_SCHEDULE ? "[SD_SCHEDULE]" :
  2701. "",
  2702. dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
  2703. "[PD_PEER_DISPLAY]" : "",
  2704. dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
  2705. "[PD_PEER_KEYPAD]" : "",
  2706. dev->flags & P2P_DEV_USER_REJECTED ?
  2707. "[USER_REJECTED]" : "",
  2708. dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
  2709. "[PEER_WAITING_RESPONSE]" : "",
  2710. dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
  2711. "[PREFER_PERSISTENT_GROUP]" : "",
  2712. dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
  2713. "[WAIT_GO_NEG_RESPONSE]" : "",
  2714. dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
  2715. "[WAIT_GO_NEG_CONFIRM]" : "",
  2716. dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
  2717. "[GROUP_CLIENT_ONLY]" : "",
  2718. dev->flags & P2P_DEV_FORCE_FREQ ?
  2719. "[FORCE_FREQ]" : "",
  2720. dev->flags & P2P_DEV_PD_FOR_JOIN ?
  2721. "[PD_FOR_JOIN]" : "",
  2722. dev->status,
  2723. dev->wait_count,
  2724. dev->invitation_reqs);
  2725. if (res < 0 || res >= end - pos)
  2726. return pos - buf;
  2727. pos += res;
  2728. if (dev->ext_listen_period) {
  2729. res = os_snprintf(pos, end - pos,
  2730. "ext_listen_period=%u\n"
  2731. "ext_listen_interval=%u\n",
  2732. dev->ext_listen_period,
  2733. dev->ext_listen_interval);
  2734. if (res < 0 || res >= end - pos)
  2735. return pos - buf;
  2736. pos += res;
  2737. }
  2738. if (dev->oper_ssid_len) {
  2739. res = os_snprintf(pos, end - pos,
  2740. "oper_ssid=%s\n",
  2741. wpa_ssid_txt(dev->oper_ssid,
  2742. dev->oper_ssid_len));
  2743. if (res < 0 || res >= end - pos)
  2744. return pos - buf;
  2745. pos += res;
  2746. }
  2747. return pos - buf;
  2748. }
  2749. int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
  2750. {
  2751. return p2p_get_device(p2p, addr) != NULL;
  2752. }
  2753. void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
  2754. {
  2755. if (enabled) {
  2756. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
  2757. "discoverability enabled");
  2758. p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
  2759. } else {
  2760. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
  2761. "discoverability disabled");
  2762. p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
  2763. }
  2764. }
  2765. static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
  2766. u32 duration2, u32 interval2)
  2767. {
  2768. struct wpabuf *req;
  2769. struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
  2770. u8 *len;
  2771. req = wpabuf_alloc(100);
  2772. if (req == NULL)
  2773. return NULL;
  2774. if (duration1 || interval1) {
  2775. os_memset(&desc1, 0, sizeof(desc1));
  2776. desc1.count_type = 1;
  2777. desc1.duration = duration1;
  2778. desc1.interval = interval1;
  2779. ptr1 = &desc1;
  2780. if (duration2 || interval2) {
  2781. os_memset(&desc2, 0, sizeof(desc2));
  2782. desc2.count_type = 2;
  2783. desc2.duration = duration2;
  2784. desc2.interval = interval2;
  2785. ptr2 = &desc2;
  2786. }
  2787. }
  2788. p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
  2789. len = p2p_buf_add_ie_hdr(req);
  2790. p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
  2791. p2p_buf_update_ie_hdr(req, len);
  2792. return req;
  2793. }
  2794. int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
  2795. const u8 *own_interface_addr, unsigned int freq,
  2796. u32 duration1, u32 interval1, u32 duration2,
  2797. u32 interval2)
  2798. {
  2799. struct wpabuf *req;
  2800. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send Presence Request to "
  2801. "GO " MACSTR " (own interface " MACSTR ") freq=%u dur1=%u "
  2802. "int1=%u dur2=%u int2=%u",
  2803. MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
  2804. freq, duration1, interval1, duration2, interval2);
  2805. req = p2p_build_presence_req(duration1, interval1, duration2,
  2806. interval2);
  2807. if (req == NULL)
  2808. return -1;
  2809. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2810. if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
  2811. go_interface_addr,
  2812. wpabuf_head(req), wpabuf_len(req), 200) < 0) {
  2813. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2814. "P2P: Failed to send Action frame");
  2815. }
  2816. wpabuf_free(req);
  2817. return 0;
  2818. }
  2819. static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
  2820. size_t noa_len, u8 dialog_token)
  2821. {
  2822. struct wpabuf *resp;
  2823. u8 *len;
  2824. resp = wpabuf_alloc(100 + noa_len);
  2825. if (resp == NULL)
  2826. return NULL;
  2827. p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
  2828. len = p2p_buf_add_ie_hdr(resp);
  2829. p2p_buf_add_status(resp, status);
  2830. if (noa) {
  2831. wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
  2832. wpabuf_put_le16(resp, noa_len);
  2833. wpabuf_put_data(resp, noa, noa_len);
  2834. } else
  2835. p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
  2836. p2p_buf_update_ie_hdr(resp, len);
  2837. return resp;
  2838. }
  2839. static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
  2840. const u8 *sa, const u8 *data, size_t len,
  2841. int rx_freq)
  2842. {
  2843. struct p2p_message msg;
  2844. u8 status;
  2845. struct wpabuf *resp;
  2846. size_t g;
  2847. struct p2p_group *group = NULL;
  2848. int parsed = 0;
  2849. u8 noa[50];
  2850. int noa_len;
  2851. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2852. "P2P: Received P2P Action - P2P Presence Request");
  2853. for (g = 0; g < p2p->num_groups; g++) {
  2854. if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]),
  2855. ETH_ALEN) == 0) {
  2856. group = p2p->groups[g];
  2857. break;
  2858. }
  2859. }
  2860. if (group == NULL) {
  2861. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2862. "P2P: Ignore P2P Presence Request for unknown group "
  2863. MACSTR, MAC2STR(da));
  2864. return;
  2865. }
  2866. if (p2p_parse(data, len, &msg) < 0) {
  2867. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2868. "P2P: Failed to parse P2P Presence Request");
  2869. status = P2P_SC_FAIL_INVALID_PARAMS;
  2870. goto fail;
  2871. }
  2872. parsed = 1;
  2873. if (msg.noa == NULL) {
  2874. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2875. "P2P: No NoA attribute in P2P Presence Request");
  2876. status = P2P_SC_FAIL_INVALID_PARAMS;
  2877. goto fail;
  2878. }
  2879. status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
  2880. fail:
  2881. if (p2p->cfg->get_noa)
  2882. noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
  2883. sizeof(noa));
  2884. else
  2885. noa_len = -1;
  2886. resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
  2887. noa_len > 0 ? noa_len : 0,
  2888. msg.dialog_token);
  2889. if (parsed)
  2890. p2p_parse_free(&msg);
  2891. if (resp == NULL)
  2892. return;
  2893. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  2894. if (p2p_send_action(p2p, rx_freq, sa, da, da,
  2895. wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
  2896. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2897. "P2P: Failed to send Action frame");
  2898. }
  2899. wpabuf_free(resp);
  2900. }
  2901. static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
  2902. const u8 *sa, const u8 *data, size_t len)
  2903. {
  2904. struct p2p_message msg;
  2905. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2906. "P2P: Received P2P Action - P2P Presence Response");
  2907. if (p2p_parse(data, len, &msg) < 0) {
  2908. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2909. "P2P: Failed to parse P2P Presence Response");
  2910. return;
  2911. }
  2912. if (msg.status == NULL || msg.noa == NULL) {
  2913. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2914. "P2P: No Status or NoA attribute in P2P Presence "
  2915. "Response");
  2916. p2p_parse_free(&msg);
  2917. return;
  2918. }
  2919. if (*msg.status) {
  2920. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2921. "P2P: P2P Presence Request was rejected: status %u",
  2922. *msg.status);
  2923. p2p_parse_free(&msg);
  2924. return;
  2925. }
  2926. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2927. "P2P: P2P Presence Request was accepted");
  2928. wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
  2929. msg.noa, msg.noa_len);
  2930. /* TODO: process NoA */
  2931. p2p_parse_free(&msg);
  2932. }
  2933. static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
  2934. {
  2935. struct p2p_data *p2p = eloop_ctx;
  2936. if (p2p->ext_listen_interval) {
  2937. /* Schedule next extended listen timeout */
  2938. eloop_register_timeout(p2p->ext_listen_interval_sec,
  2939. p2p->ext_listen_interval_usec,
  2940. p2p_ext_listen_timeout, p2p, NULL);
  2941. }
  2942. if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
  2943. /*
  2944. * This should not really happen, but it looks like the Listen
  2945. * command may fail is something else (e.g., a scan) was
  2946. * running at an inconvenient time. As a workaround, allow new
  2947. * Extended Listen operation to be started.
  2948. */
  2949. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Previous "
  2950. "Extended Listen operation had not been completed - "
  2951. "try again");
  2952. p2p->ext_listen_only = 0;
  2953. p2p_set_state(p2p, P2P_IDLE);
  2954. }
  2955. if (p2p->state != P2P_IDLE) {
  2956. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip Extended "
  2957. "Listen timeout in active state (%s)",
  2958. p2p_state_txt(p2p->state));
  2959. return;
  2960. }
  2961. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Extended Listen timeout");
  2962. p2p->ext_listen_only = 1;
  2963. if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
  2964. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
  2965. "Listen state for Extended Listen Timing");
  2966. p2p->ext_listen_only = 0;
  2967. }
  2968. }
  2969. int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
  2970. unsigned int interval)
  2971. {
  2972. if (period > 65535 || interval > 65535 || period > interval ||
  2973. (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
  2974. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2975. "P2P: Invalid Extended Listen Timing request: "
  2976. "period=%u interval=%u", period, interval);
  2977. return -1;
  2978. }
  2979. eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
  2980. if (interval == 0) {
  2981. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2982. "P2P: Disabling Extended Listen Timing");
  2983. p2p->ext_listen_period = 0;
  2984. p2p->ext_listen_interval = 0;
  2985. return 0;
  2986. }
  2987. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  2988. "P2P: Enabling Extended Listen Timing: period %u msec, "
  2989. "interval %u msec", period, interval);
  2990. p2p->ext_listen_period = period;
  2991. p2p->ext_listen_interval = interval;
  2992. p2p->ext_listen_interval_sec = interval / 1000;
  2993. p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
  2994. eloop_register_timeout(p2p->ext_listen_interval_sec,
  2995. p2p->ext_listen_interval_usec,
  2996. p2p_ext_listen_timeout, p2p, NULL);
  2997. return 0;
  2998. }
  2999. void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
  3000. const u8 *ie, size_t ie_len)
  3001. {
  3002. struct p2p_message msg;
  3003. if (bssid == NULL || ie == NULL)
  3004. return;
  3005. os_memset(&msg, 0, sizeof(msg));
  3006. if (p2p_parse_ies(ie, ie_len, &msg))
  3007. return;
  3008. if (msg.minor_reason_code == NULL)
  3009. return;
  3010. wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
  3011. "P2P: Deauthentication notification BSSID " MACSTR
  3012. " reason_code=%u minor_reason_code=%u",
  3013. MAC2STR(bssid), reason_code, *msg.minor_reason_code);
  3014. p2p_parse_free(&msg);
  3015. }
  3016. void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
  3017. const u8 *ie, size_t ie_len)
  3018. {
  3019. struct p2p_message msg;
  3020. if (bssid == NULL || ie == NULL)
  3021. return;
  3022. os_memset(&msg, 0, sizeof(msg));
  3023. if (p2p_parse_ies(ie, ie_len, &msg))
  3024. return;
  3025. if (msg.minor_reason_code == NULL)
  3026. return;
  3027. wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
  3028. "P2P: Disassociation notification BSSID " MACSTR
  3029. " reason_code=%u minor_reason_code=%u",
  3030. MAC2STR(bssid), reason_code, *msg.minor_reason_code);
  3031. p2p_parse_free(&msg);
  3032. }
  3033. void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
  3034. {
  3035. if (enabled) {
  3036. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
  3037. "Device operations enabled");
  3038. p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
  3039. } else {
  3040. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
  3041. "Device operations disabled");
  3042. p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
  3043. }
  3044. }
  3045. int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel)
  3046. {
  3047. if (p2p_channel_to_freq(p2p->cfg->country, reg_class, channel) < 0)
  3048. return -1;
  3049. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Set Listen channel: "
  3050. "reg_class %u channel %u", reg_class, channel);
  3051. p2p->cfg->reg_class = reg_class;
  3052. p2p->cfg->channel = channel;
  3053. return 0;
  3054. }
  3055. int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
  3056. {
  3057. wpa_hexdump_ascii(MSG_DEBUG, "P2P: New SSID postfix", postfix, len);
  3058. if (postfix == NULL) {
  3059. p2p->cfg->ssid_postfix_len = 0;
  3060. return 0;
  3061. }
  3062. if (len > sizeof(p2p->cfg->ssid_postfix))
  3063. return -1;
  3064. os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
  3065. p2p->cfg->ssid_postfix_len = len;
  3066. return 0;
  3067. }
  3068. int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
  3069. int cfg_op_channel)
  3070. {
  3071. if (p2p_channel_to_freq(p2p->cfg->country, op_reg_class, op_channel)
  3072. < 0)
  3073. return -1;
  3074. wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, "P2P: Set Operating channel: "
  3075. "reg_class %u channel %u", op_reg_class, op_channel);
  3076. p2p->cfg->op_reg_class = op_reg_class;
  3077. p2p->cfg->op_channel = op_channel;
  3078. p2p->cfg->cfg_op_channel = cfg_op_channel;
  3079. return 0;
  3080. }
  3081. int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
  3082. u8 *iface_addr)
  3083. {
  3084. struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
  3085. if (dev == NULL || is_zero_ether_addr(dev->interface_addr))
  3086. return -1;
  3087. os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
  3088. return 0;
  3089. }
  3090. int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
  3091. u8 *dev_addr)
  3092. {
  3093. struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
  3094. if (dev == NULL)
  3095. return -1;
  3096. os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
  3097. return 0;
  3098. }
  3099. void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
  3100. {
  3101. os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
  3102. if (is_zero_ether_addr(p2p->peer_filter))
  3103. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Disable peer "
  3104. "filter");
  3105. else
  3106. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Enable peer "
  3107. "filter for " MACSTR, MAC2STR(p2p->peer_filter));
  3108. }
  3109. void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
  3110. {
  3111. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Cross connection %s",
  3112. enabled ? "enabled" : "disabled");
  3113. if (p2p->cross_connect == enabled)
  3114. return;
  3115. p2p->cross_connect = enabled;
  3116. /* TODO: may need to tear down any action group where we are GO(?) */
  3117. }
  3118. int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
  3119. {
  3120. struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
  3121. if (dev == NULL)
  3122. return -1;
  3123. if (dev->oper_freq <= 0)
  3124. return -1;
  3125. return dev->oper_freq;
  3126. }
  3127. void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
  3128. {
  3129. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Intra BSS distribution %s",
  3130. enabled ? "enabled" : "disabled");
  3131. p2p->cfg->p2p_intra_bss = enabled;
  3132. }
  3133. void p2p_update_channel_list(struct p2p_data *p2p, struct p2p_channels *chan)
  3134. {
  3135. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update channel list");
  3136. os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
  3137. }
  3138. int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
  3139. const u8 *src, const u8 *bssid, const u8 *buf,
  3140. size_t len, unsigned int wait_time)
  3141. {
  3142. if (p2p->p2p_scan_running) {
  3143. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Delay Action "
  3144. "frame TX until p2p_scan completes");
  3145. if (p2p->after_scan_tx) {
  3146. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
  3147. "previous pending Action frame TX");
  3148. os_free(p2p->after_scan_tx);
  3149. }
  3150. p2p->after_scan_tx = os_malloc(sizeof(*p2p->after_scan_tx) +
  3151. len);
  3152. if (p2p->after_scan_tx == NULL)
  3153. return -1;
  3154. p2p->after_scan_tx->freq = freq;
  3155. os_memcpy(p2p->after_scan_tx->dst, dst, ETH_ALEN);
  3156. os_memcpy(p2p->after_scan_tx->src, src, ETH_ALEN);
  3157. os_memcpy(p2p->after_scan_tx->bssid, bssid, ETH_ALEN);
  3158. p2p->after_scan_tx->len = len;
  3159. p2p->after_scan_tx->wait_time = wait_time;
  3160. os_memcpy(p2p->after_scan_tx + 1, buf, len);
  3161. return 0;
  3162. }
  3163. return p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
  3164. buf, len, wait_time);
  3165. }
  3166. void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
  3167. int freq_overall)
  3168. {
  3169. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Best channel: 2.4 GHz: %d,"
  3170. " 5 GHz: %d, overall: %d", freq_24, freq_5, freq_overall);
  3171. p2p->best_freq_24 = freq_24;
  3172. p2p->best_freq_5 = freq_5;
  3173. p2p->best_freq_overall = freq_overall;
  3174. }
  3175. const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
  3176. {
  3177. if (p2p == NULL || p2p->go_neg_peer == NULL)
  3178. return NULL;
  3179. return p2p->go_neg_peer->info.p2p_device_addr;
  3180. }
  3181. const struct p2p_peer_info *
  3182. p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
  3183. {
  3184. struct p2p_device *dev;
  3185. if (addr) {
  3186. dev = p2p_get_device(p2p, addr);
  3187. if (!dev)
  3188. return NULL;
  3189. if (!next) {
  3190. if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
  3191. return NULL;
  3192. return &dev->info;
  3193. } else {
  3194. do {
  3195. dev = dl_list_first(&dev->list,
  3196. struct p2p_device,
  3197. list);
  3198. if (&dev->list == &p2p->devices)
  3199. return NULL;
  3200. } while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
  3201. }
  3202. } else {
  3203. dev = dl_list_first(&p2p->devices, struct p2p_device, list);
  3204. if (!dev)
  3205. return NULL;
  3206. while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
  3207. dev = dl_list_first(&dev->list,
  3208. struct p2p_device,
  3209. list);
  3210. if (&dev->list == &p2p->devices)
  3211. return NULL;
  3212. }
  3213. }
  3214. return &dev->info;
  3215. }
  3216. int p2p_in_progress(struct p2p_data *p2p)
  3217. {
  3218. if (p2p == NULL)
  3219. return 0;
  3220. return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
  3221. }