1 /*
2 * Wi-Fi Direct - P2P module
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10
11 #include <log/log.h>
12 #include "common.h"
13 #include "eloop.h"
14 #include "common/defs.h"
15 #include "common/ieee802_11_defs.h"
16 #include "common/ieee802_11_common.h"
17 #include "common/wpa_common.h"
18 #include "common/wpa_ctrl.h"
19 #include "common/sae.h"
20 #include "crypto/sha256.h"
21 #include "crypto/sha384.h"
22 #include "crypto/crypto.h"
23 #include "pasn/pasn_common.h"
24 #include "wps/wps_i.h"
25 #include "p2p_i.h"
26 #include "p2p.h"
27
28
29 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
30 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
31 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
32 const u8 *sa, const u8 *data, size_t len,
33 int rx_freq);
34 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
35 const u8 *sa, const u8 *data,
36 size_t len);
37 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
38 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
39
40
41 /*
42 * p2p_scan recovery timeout
43 *
44 * Many drivers are using 30 second timeout on scan results. Allow a bit larger
45 * timeout for this to avoid hitting P2P timeout unnecessarily.
46 */
47 #define P2P_SCAN_TIMEOUT 35
48
49 /**
50 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
51 * entries will be removed
52 */
53 #ifndef P2P_PEER_EXPIRATION_AGE
54 #define P2P_PEER_EXPIRATION_AGE 60
55 #endif /* P2P_PEER_EXPIRATION_AGE */
56
57
p2p_expire_peers(struct p2p_data * p2p)58 void p2p_expire_peers(struct p2p_data *p2p)
59 {
60 struct p2p_device *dev, *n;
61 struct os_reltime now;
62 size_t i;
63
64 os_get_reltime(&now);
65 dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
66 if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
67 continue;
68
69 if (dev == p2p->go_neg_peer) {
70 /*
71 * GO Negotiation is in progress with the peer, so
72 * don't expire the peer entry until GO Negotiation
73 * fails or times out.
74 */
75 continue;
76 }
77
78 if (p2p->cfg->go_connected &&
79 p2p->cfg->go_connected(p2p->cfg->cb_ctx,
80 dev->info.p2p_device_addr)) {
81 /*
82 * We are connected as a client to a group in which the
83 * peer is the GO, so do not expire the peer entry.
84 */
85 os_get_reltime(&dev->last_seen);
86 continue;
87 }
88
89 for (i = 0; i < p2p->num_groups; i++) {
90 if (p2p_group_is_client_connected(
91 p2p->groups[i], dev->info.p2p_device_addr))
92 break;
93 }
94 if (i < p2p->num_groups) {
95 /*
96 * The peer is connected as a client in a group where
97 * we are the GO, so do not expire the peer entry.
98 */
99 os_get_reltime(&dev->last_seen);
100 continue;
101 }
102
103 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
104 MAC2STR(dev->info.p2p_device_addr));
105 dl_list_del(&dev->list);
106 p2p_device_free(p2p, dev);
107 }
108 }
109
110
p2p_state_txt(int state)111 static const char * p2p_state_txt(int state)
112 {
113 switch (state) {
114 case P2P_IDLE:
115 return "IDLE";
116 case P2P_SEARCH:
117 return "SEARCH";
118 case P2P_CONNECT:
119 return "CONNECT";
120 case P2P_CONNECT_LISTEN:
121 return "CONNECT_LISTEN";
122 case P2P_GO_NEG:
123 return "GO_NEG";
124 case P2P_LISTEN_ONLY:
125 return "LISTEN_ONLY";
126 case P2P_WAIT_PEER_CONNECT:
127 return "WAIT_PEER_CONNECT";
128 case P2P_WAIT_PEER_IDLE:
129 return "WAIT_PEER_IDLE";
130 case P2P_SD_DURING_FIND:
131 return "SD_DURING_FIND";
132 case P2P_PROVISIONING:
133 return "PROVISIONING";
134 case P2P_PD_DURING_FIND:
135 return "PD_DURING_FIND";
136 case P2P_INVITE:
137 return "INVITE";
138 case P2P_INVITE_LISTEN:
139 return "INVITE_LISTEN";
140 default:
141 return "?";
142 }
143 }
144
145
p2p_get_state_txt(struct p2p_data * p2p)146 const char * p2p_get_state_txt(struct p2p_data *p2p)
147 {
148 return p2p_state_txt(p2p->state);
149 }
150
151
p2p_get_p2ps_adv_list(struct p2p_data * p2p)152 struct p2ps_advertisement * p2p_get_p2ps_adv_list(struct p2p_data *p2p)
153 {
154 return p2p ? p2p->p2ps_adv_list : NULL;
155 }
156
157
p2p_set_intended_addr(struct p2p_data * p2p,const u8 * intended_addr)158 void p2p_set_intended_addr(struct p2p_data *p2p, const u8 *intended_addr)
159 {
160 if (p2p && intended_addr)
161 os_memcpy(p2p->intended_addr, intended_addr, ETH_ALEN);
162 }
163
164
p2p_get_provisioning_info(struct p2p_data * p2p,const u8 * addr)165 u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
166 {
167 struct p2p_device *dev = NULL;
168
169 if (!addr || !p2p)
170 return 0;
171
172 dev = p2p_get_device(p2p, addr);
173 if (dev)
174 return dev->wps_prov_info;
175 else
176 return 0;
177 }
178
179
p2p_clear_provisioning_info(struct p2p_data * p2p,const u8 * addr)180 void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *addr)
181 {
182 struct p2p_device *dev = NULL;
183
184 if (!addr || !p2p)
185 return;
186
187 dev = p2p_get_device(p2p, addr);
188 if (dev)
189 dev->wps_prov_info = 0;
190 }
191
192
p2p_set_state(struct p2p_data * p2p,int new_state)193 void p2p_set_state(struct p2p_data *p2p, int new_state)
194 {
195 p2p_dbg(p2p, "State %s -> %s",
196 p2p_state_txt(p2p->state), p2p_state_txt(new_state));
197 p2p->state = new_state;
198
199 if (new_state == P2P_IDLE && p2p->pending_channel) {
200 p2p_dbg(p2p, "Apply change in listen channel");
201 p2p->cfg->reg_class = p2p->pending_reg_class;
202 p2p->cfg->channel = p2p->pending_channel;
203 p2p->pending_reg_class = 0;
204 p2p->pending_channel = 0;
205 }
206 }
207
208
p2p_set_timeout(struct p2p_data * p2p,unsigned int sec,unsigned int usec)209 void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
210 {
211 p2p_dbg(p2p, "Set timeout (state=%s): %u.%06u sec",
212 p2p_state_txt(p2p->state), sec, usec);
213 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
214 eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
215 }
216
217
p2p_clear_timeout(struct p2p_data * p2p)218 void p2p_clear_timeout(struct p2p_data *p2p)
219 {
220 p2p_dbg(p2p, "Clear timeout (state=%s)", p2p_state_txt(p2p->state));
221 eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
222 }
223
224
p2p_go_neg_failed(struct p2p_data * p2p,int status)225 void p2p_go_neg_failed(struct p2p_data *p2p, int status)
226 {
227 struct p2p_go_neg_results res;
228 struct p2p_device *peer = p2p->go_neg_peer;
229
230 if (!peer)
231 return;
232
233 eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
234 if (p2p->state != P2P_SEARCH) {
235 /*
236 * Clear timeouts related to GO Negotiation if no new p2p_find
237 * has been started.
238 */
239 p2p_clear_timeout(p2p);
240 p2p_set_state(p2p, P2P_IDLE);
241 }
242
243 peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
244 peer->wps_method = WPS_NOT_READY;
245 peer->oob_pw_id = 0;
246 wpabuf_free(peer->go_neg_conf);
247 peer->go_neg_conf = NULL;
248 p2p->go_neg_peer = NULL;
249
250 #ifdef CONFIG_PASN
251 if (peer->p2p2 && peer->pasn)
252 wpa_pasn_reset(peer->pasn);
253 os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
254 os_memset(p2p->peer_sae_password, 0, sizeof(p2p->peer_sae_password));
255 #endif /* CONFIG_PASN */
256
257 os_memset(&res, 0, sizeof(res));
258 res.status = status;
259 res.p2p2 = peer->p2p2;
260 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
261 os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
262 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
263 }
264
265
p2p_listen_in_find(struct p2p_data * p2p,int dev_disc)266 static void p2p_listen_in_find(struct p2p_data *p2p, int dev_disc)
267 {
268 unsigned int r, tu;
269 int freq;
270 struct wpabuf *ies;
271
272 p2p_dbg(p2p, "Starting short listen state (state=%s)",
273 p2p_state_txt(p2p->state));
274
275 if (p2p->pending_listen_freq) {
276 /* We have a pending p2p_listen request */
277 p2p_dbg(p2p, "p2p_listen command pending already");
278 return;
279 }
280
281 freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
282 if (freq < 0) {
283 p2p_dbg(p2p, "Unknown regulatory class/channel");
284 return;
285 }
286
287 if (os_get_random((u8 *) &r, sizeof(r)) < 0)
288 r = 0;
289 tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
290 p2p->min_disc_int) * 100;
291 if (p2p->max_disc_tu >= 0 && tu > (unsigned int) p2p->max_disc_tu)
292 tu = p2p->max_disc_tu;
293 if (!dev_disc && tu < 100)
294 tu = 100; /* Need to wait in non-device discovery use cases */
295 if (p2p->cfg->max_listen && 1024 * tu / 1000 > p2p->cfg->max_listen)
296 tu = p2p->cfg->max_listen * 1000 / 1024;
297
298 if (tu == 0) {
299 p2p_dbg(p2p, "Skip listen state since duration was 0 TU");
300 p2p_set_timeout(p2p, 0, 0);
301 return;
302 }
303
304 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
305 if (ies == NULL)
306 return;
307
308 p2p->pending_listen_freq = freq;
309 p2p->pending_listen_sec = 0;
310 p2p->pending_listen_usec = 1024 * tu;
311
312 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
313 ies) < 0) {
314 p2p_dbg(p2p, "Failed to start listen mode");
315 p2p->pending_listen_freq = 0;
316 } else {
317 p2p->pending_listen_wait_drv = true;
318 }
319 wpabuf_free(ies);
320 }
321
322
p2p_listen(struct p2p_data * p2p,unsigned int timeout)323 int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
324 {
325 int freq;
326 struct wpabuf *ies;
327
328 p2p_dbg(p2p, "Going to listen(only) state");
329
330 if (p2p->pending_listen_freq) {
331 /* We have a pending p2p_listen request */
332 p2p_dbg(p2p, "p2p_listen command pending already");
333 return -1;
334 }
335
336 freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
337 if (freq < 0) {
338 p2p_dbg(p2p, "Unknown regulatory class/channel");
339 return -1;
340 }
341
342 p2p->pending_listen_sec = timeout / 1000;
343 p2p->pending_listen_usec = (timeout % 1000) * 1000;
344
345 if (p2p->p2p_scan_running) {
346 if (p2p->start_after_scan == P2P_AFTER_SCAN_CONNECT) {
347 p2p_dbg(p2p, "p2p_scan running - connect is already pending - skip listen");
348 return 0;
349 }
350 p2p_dbg(p2p, "p2p_scan running - delay start of listen state");
351 p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
352 return 0;
353 }
354
355 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
356 if (ies == NULL)
357 return -1;
358
359 p2p->pending_listen_freq = freq;
360
361 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
362 p2p_dbg(p2p, "Failed to start listen mode");
363 p2p->pending_listen_freq = 0;
364 wpabuf_free(ies);
365 return -1;
366 }
367 p2p->pending_listen_wait_drv = true;
368 wpabuf_free(ies);
369
370 p2p_set_state(p2p, P2P_LISTEN_ONLY);
371
372 return 0;
373 }
374
375
p2p_device_clear_reported(struct p2p_data * p2p)376 static void p2p_device_clear_reported(struct p2p_data *p2p)
377 {
378 struct p2p_device *dev;
379 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
380 dev->flags &= ~P2P_DEV_REPORTED;
381 dev->sd_reqs = 0;
382 }
383 }
384
385
386 /**
387 * p2p_get_device - Fetch a peer entry
388 * @p2p: P2P module context from p2p_init()
389 * @addr: P2P Device Address of the peer
390 * Returns: Pointer to the device entry or %NULL if not found
391 */
p2p_get_device(struct p2p_data * p2p,const u8 * addr)392 struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
393 {
394 struct p2p_device *dev;
395 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
396 if (ether_addr_equal(dev->info.p2p_device_addr, addr))
397 return dev;
398 }
399 return NULL;
400 }
401
402
403 /**
404 * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
405 * @p2p: P2P module context from p2p_init()
406 * @addr: P2P Interface Address of the peer
407 * Returns: Pointer to the device entry or %NULL if not found
408 */
p2p_get_device_interface(struct p2p_data * p2p,const u8 * addr)409 struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
410 const u8 *addr)
411 {
412 struct p2p_device *dev;
413 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
414 if (ether_addr_equal(dev->interface_addr, addr))
415 return dev;
416 }
417 return NULL;
418 }
419
420
421 /**
422 * p2p_create_device - Create a peer entry
423 * @p2p: P2P module context from p2p_init()
424 * @addr: P2P Device Address of the peer
425 * Returns: Pointer to the device entry or %NULL on failure
426 *
427 * If there is already an entry for the peer, it will be returned instead of
428 * creating a new one.
429 */
p2p_create_device(struct p2p_data * p2p,const u8 * addr)430 static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
431 const u8 *addr)
432 {
433 struct p2p_device *dev, *oldest = NULL;
434 size_t count = 0;
435
436 dev = p2p_get_device(p2p, addr);
437 if (dev)
438 return dev;
439
440 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
441 count++;
442 if (oldest == NULL ||
443 os_reltime_before(&dev->last_seen, &oldest->last_seen))
444 oldest = dev;
445 }
446 if (count + 1 > p2p->cfg->max_peers && oldest) {
447 p2p_dbg(p2p,
448 "Remove oldest peer entry to make room for a new peer "
449 MACSTR, MAC2STR(oldest->info.p2p_device_addr));
450 dl_list_del(&oldest->list);
451 p2p_device_free(p2p, oldest);
452 }
453
454 dev = os_zalloc(sizeof(*dev));
455 if (dev == NULL)
456 return NULL;
457 dl_list_add(&p2p->devices, &dev->list);
458 os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
459 dev->support_6ghz = false;
460
461 return dev;
462 }
463
464
p2p_copy_client_info(struct p2p_device * dev,struct p2p_client_info * cli)465 static void p2p_copy_client_info(struct p2p_device *dev,
466 struct p2p_client_info *cli)
467 {
468 p2p_copy_filter_devname(dev->info.device_name,
469 sizeof(dev->info.device_name),
470 cli->dev_name, cli->dev_name_len);
471 dev->info.dev_capab = cli->dev_capab;
472 dev->info.config_methods = cli->config_methods;
473 os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
474 dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
475 if (dev->info.wps_sec_dev_type_list_len > WPS_SEC_DEV_TYPE_MAX_LEN) {
476 android_errorWriteLog(0x534e4554, "172937525");
477 dev->info.wps_sec_dev_type_list_len = WPS_SEC_DEV_TYPE_MAX_LEN;
478 }
479 os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
480 dev->info.wps_sec_dev_type_list_len);
481 }
482
483
p2p_add_group_clients(struct p2p_data * p2p,const u8 * go_dev_addr,const u8 * go_interface_addr,int freq,const u8 * gi,size_t gi_len,struct os_reltime * rx_time)484 static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
485 const u8 *go_interface_addr, int freq,
486 const u8 *gi, size_t gi_len,
487 struct os_reltime *rx_time)
488 {
489 struct p2p_group_info info;
490 size_t c;
491 struct p2p_device *dev;
492
493 if (gi == NULL)
494 return 0;
495
496 if (p2p_group_info_parse(gi, gi_len, &info) < 0)
497 return -1;
498
499 /*
500 * Clear old data for this group; if the devices are still in the
501 * group, the information will be restored in the loop following this.
502 */
503 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
504 if (ether_addr_equal(dev->member_in_go_iface,
505 go_interface_addr)) {
506 os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
507 os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
508 }
509 }
510
511 for (c = 0; c < info.num_clients; c++) {
512 struct p2p_client_info *cli = &info.client[c];
513 if (ether_addr_equal(cli->p2p_device_addr, p2p->cfg->dev_addr))
514 continue; /* ignore our own entry */
515 dev = p2p_get_device(p2p, cli->p2p_device_addr);
516 if (dev) {
517 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
518 P2P_DEV_PROBE_REQ_ONLY)) {
519 /*
520 * Update information since we have not
521 * received this directly from the client.
522 */
523 p2p_copy_client_info(dev, cli);
524 } else {
525 /*
526 * Need to update P2P Client Discoverability
527 * flag since it is valid only in P2P Group
528 * Info attribute.
529 */
530 dev->info.dev_capab &=
531 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
532 dev->info.dev_capab |=
533 cli->dev_capab &
534 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
535 }
536 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
537 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
538 }
539 } else {
540 dev = p2p_create_device(p2p, cli->p2p_device_addr);
541 if (dev == NULL)
542 continue;
543 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
544 p2p_copy_client_info(dev, cli);
545 dev->oper_freq = freq;
546 p2p->cfg->dev_found(p2p->cfg->cb_ctx,
547 dev->info.p2p_device_addr,
548 &dev->info, 1);
549 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
550 }
551
552 os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
553 ETH_ALEN);
554 os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
555 os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
556 os_memcpy(dev->member_in_go_iface, go_interface_addr,
557 ETH_ALEN);
558 dev->flags |= P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT;
559 }
560
561 return 0;
562 }
563
564
p2p_copy_wps_info(struct p2p_data * p2p,struct p2p_device * dev,int probe_req,const struct p2p_message * msg)565 static void p2p_copy_wps_info(struct p2p_data *p2p, struct p2p_device *dev,
566 int probe_req, const struct p2p_message *msg)
567 {
568 os_memcpy(dev->info.device_name, msg->device_name,
569 sizeof(dev->info.device_name));
570
571 if (msg->manufacturer &&
572 msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
573 os_memset(dev->info.manufacturer, 0,
574 sizeof(dev->info.manufacturer));
575 os_memcpy(dev->info.manufacturer, msg->manufacturer,
576 msg->manufacturer_len);
577 }
578
579 if (msg->model_name &&
580 msg->model_name_len < sizeof(dev->info.model_name)) {
581 os_memset(dev->info.model_name, 0,
582 sizeof(dev->info.model_name));
583 os_memcpy(dev->info.model_name, msg->model_name,
584 msg->model_name_len);
585 }
586
587 if (msg->model_number &&
588 msg->model_number_len < sizeof(dev->info.model_number)) {
589 os_memset(dev->info.model_number, 0,
590 sizeof(dev->info.model_number));
591 os_memcpy(dev->info.model_number, msg->model_number,
592 msg->model_number_len);
593 }
594
595 if (msg->serial_number &&
596 msg->serial_number_len < sizeof(dev->info.serial_number)) {
597 os_memset(dev->info.serial_number, 0,
598 sizeof(dev->info.serial_number));
599 os_memcpy(dev->info.serial_number, msg->serial_number,
600 msg->serial_number_len);
601 }
602
603 if (msg->pri_dev_type)
604 os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
605 sizeof(dev->info.pri_dev_type));
606 else if (msg->wps_pri_dev_type)
607 os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
608 sizeof(dev->info.pri_dev_type));
609
610 if (msg->wps_sec_dev_type_list) {
611 os_memcpy(dev->info.wps_sec_dev_type_list,
612 msg->wps_sec_dev_type_list,
613 msg->wps_sec_dev_type_list_len);
614 dev->info.wps_sec_dev_type_list_len =
615 msg->wps_sec_dev_type_list_len;
616 }
617
618 if (msg->capability) {
619 /*
620 * P2P Client Discoverability bit is reserved in all frames
621 * that use this function, so do not change its value here.
622 */
623 dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
624 dev->info.dev_capab |= msg->capability[0] &
625 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
626 dev->info.group_capab = msg->capability[1];
627 }
628
629 p2p_update_peer_6ghz_capab(dev, msg);
630
631 if (msg->ext_listen_timing) {
632 dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
633 dev->ext_listen_interval =
634 WPA_GET_LE16(msg->ext_listen_timing + 2);
635 }
636
637 if (!probe_req) {
638 u16 new_config_methods;
639 new_config_methods = msg->config_methods ?
640 msg->config_methods : msg->wps_config_methods;
641 if (new_config_methods &&
642 dev->info.config_methods != new_config_methods) {
643 p2p_dbg(p2p, "Update peer " MACSTR
644 " config_methods 0x%x -> 0x%x",
645 MAC2STR(dev->info.p2p_device_addr),
646 dev->info.config_methods,
647 new_config_methods);
648 dev->info.config_methods = new_config_methods;
649 }
650 }
651 }
652
653
p2p_update_peer_6ghz_capab(struct p2p_device * dev,const struct p2p_message * msg)654 void p2p_update_peer_6ghz_capab(struct p2p_device *dev,
655 const struct p2p_message *msg)
656 {
657 if (msg->capability &&
658 (msg->capability[0] & P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE))
659 dev->support_6ghz = true;
660 }
661
662
p2p_update_peer_vendor_elems(struct p2p_device * dev,const u8 * ies,size_t ies_len)663 static void p2p_update_peer_vendor_elems(struct p2p_device *dev, const u8 *ies,
664 size_t ies_len)
665 {
666 const u8 *pos, *end;
667 u8 id, len;
668
669 wpabuf_free(dev->info.vendor_elems);
670 dev->info.vendor_elems = NULL;
671
672 end = ies + ies_len;
673
674 for (pos = ies; end - pos > 1; pos += len) {
675 id = *pos++;
676 len = *pos++;
677
678 if (len > end - pos)
679 break;
680
681 if (id != WLAN_EID_VENDOR_SPECIFIC || len < 3)
682 continue;
683
684 if (len >= 4) {
685 u32 type = WPA_GET_BE32(pos);
686
687 if (type == WPA_IE_VENDOR_TYPE ||
688 type == WMM_IE_VENDOR_TYPE ||
689 type == WPS_IE_VENDOR_TYPE ||
690 type == P2P_IE_VENDOR_TYPE ||
691 type == WFD_IE_VENDOR_TYPE)
692 continue;
693 }
694
695 /* Unknown vendor element - make raw IE data available */
696 if (wpabuf_resize(&dev->info.vendor_elems, 2 + len) < 0)
697 break;
698 wpabuf_put_data(dev->info.vendor_elems, pos - 2, 2 + len);
699 if (wpabuf_size(dev->info.vendor_elems) > 2000)
700 break;
701 }
702 }
703
704
p2p_compare_wfd_info(struct p2p_device * dev,const struct p2p_message * msg)705 static int p2p_compare_wfd_info(struct p2p_device *dev,
706 const struct p2p_message *msg)
707 {
708 if (dev->info.wfd_subelems && msg->wfd_subelems) {
709 if (dev->info.wfd_subelems->used != msg->wfd_subelems->used)
710 return 1;
711
712 return os_memcmp(dev->info.wfd_subelems->buf,
713 msg->wfd_subelems->buf,
714 dev->info.wfd_subelems->used);
715 }
716 if (dev->info.wfd_subelems || msg->wfd_subelems)
717 return 1;
718
719 return 0;
720 }
721
722
723 /**
724 * p2p_add_device - Add peer entries based on scan results or P2P frames
725 * @p2p: P2P module context from p2p_init()
726 * @addr: Source address of Beacon or Probe Response frame (may be either
727 * P2P Device Address or P2P Interface Address)
728 * @level: Signal level (signal strength of the received frame from the peer)
729 * @freq: Frequency on which the Beacon or Probe Response frame was received
730 * @rx_time: Time when the result was received
731 * @ies: IEs from the Beacon or Probe Response frame
732 * @ies_len: Length of ies buffer in octets
733 * @scan_res: Whether this was based on scan results
734 * Returns: 0 on success, -1 on failure
735 *
736 * If the scan result is for a GO, the clients in the group will also be added
737 * to the peer table. This function can also be used with some other frames
738 * like Provision Discovery Request that contains P2P Capability and P2P Device
739 * Info attributes.
740 */
p2p_add_device(struct p2p_data * p2p,const u8 * addr,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len,int scan_res)741 int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq,
742 struct os_reltime *rx_time, int level, const u8 *ies,
743 size_t ies_len, int scan_res)
744 {
745 struct p2p_device *dev;
746 struct p2p_message msg;
747 const u8 *p2p_dev_addr;
748 int wfd_changed;
749 int dev_name_changed;
750 int i;
751 struct os_reltime time_now;
752
753 os_memset(&msg, 0, sizeof(msg));
754 if (p2p_parse_ies(ies, ies_len, &msg)) {
755 p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
756 p2p_parse_free(&msg);
757 return -1;
758 }
759
760 if (msg.p2p_device_addr)
761 p2p_dev_addr = msg.p2p_device_addr;
762 else if (msg.device_id)
763 p2p_dev_addr = msg.device_id;
764 else {
765 p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
766 p2p_parse_free(&msg);
767 return -1;
768 }
769
770 if (!is_zero_ether_addr(p2p->peer_filter) &&
771 !ether_addr_equal(p2p_dev_addr, p2p->peer_filter)) {
772 p2p_dbg(p2p, "Do not add peer filter for " MACSTR
773 " due to peer filter", MAC2STR(p2p_dev_addr));
774 p2p_parse_free(&msg);
775 return 0;
776 }
777
778 dev = p2p_create_device(p2p, p2p_dev_addr);
779 if (dev == NULL) {
780 p2p_parse_free(&msg);
781 return -1;
782 }
783
784 if (rx_time == NULL) {
785 os_get_reltime(&time_now);
786 rx_time = &time_now;
787 }
788
789 /*
790 * Update the device entry only if the new peer
791 * entry is newer than the one previously stored, or if
792 * the device was previously seen as a P2P Client in a group
793 * and the new entry isn't older than a threshold.
794 */
795 if (dev->last_seen.sec > 0 &&
796 os_reltime_before(rx_time, &dev->last_seen) &&
797 (!(dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT) ||
798 os_reltime_expired(&dev->last_seen, rx_time,
799 P2P_DEV_GROUP_CLIENT_RESP_THRESHOLD))) {
800 p2p_dbg(p2p,
801 "Do not update peer entry based on old frame (rx_time=%u.%06u last_seen=%u.%06u flags=0x%x)",
802 (unsigned int) rx_time->sec,
803 (unsigned int) rx_time->usec,
804 (unsigned int) dev->last_seen.sec,
805 (unsigned int) dev->last_seen.usec,
806 dev->flags);
807 p2p_parse_free(&msg);
808 return -1;
809 }
810
811 os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
812
813 dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY |
814 P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT);
815
816 if (!ether_addr_equal(addr, p2p_dev_addr))
817 os_memcpy(dev->interface_addr, addr, ETH_ALEN);
818 if (msg.ssid &&
819 msg.ssid[1] <= sizeof(dev->oper_ssid) &&
820 (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
821 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
822 != 0)) {
823 os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
824 dev->oper_ssid_len = msg.ssid[1];
825 }
826
827 wpabuf_free(dev->info.p2ps_instance);
828 dev->info.p2ps_instance = NULL;
829 if (msg.adv_service_instance && msg.adv_service_instance_len)
830 dev->info.p2ps_instance = wpabuf_alloc_copy(
831 msg.adv_service_instance, msg.adv_service_instance_len);
832
833 if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
834 *msg.ds_params >= 1 && *msg.ds_params <= 14) {
835 int ds_freq;
836 if (*msg.ds_params == 14)
837 ds_freq = 2484;
838 else
839 ds_freq = 2407 + *msg.ds_params * 5;
840 if (freq != ds_freq) {
841 p2p_dbg(p2p, "Update Listen frequency based on DS Parameter Set IE: %d -> %d MHz",
842 freq, ds_freq);
843 freq = ds_freq;
844 }
845 }
846
847 if (dev->listen_freq && dev->listen_freq != freq && scan_res) {
848 p2p_dbg(p2p, "Update Listen frequency based on scan results ("
849 MACSTR " %d -> %d MHz (DS param %d)",
850 MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
851 freq, msg.ds_params ? *msg.ds_params : -1);
852 }
853 if (scan_res) {
854 dev->listen_freq = freq;
855 if (msg.group_info)
856 dev->oper_freq = freq;
857 }
858 dev->info.level = level;
859
860 dev_name_changed = os_strncmp(dev->info.device_name, msg.device_name,
861 WPS_DEV_NAME_MAX_LEN) != 0;
862
863 p2p_copy_wps_info(p2p, dev, 0, &msg);
864
865 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
866 wpabuf_free(dev->info.wps_vendor_ext[i]);
867 dev->info.wps_vendor_ext[i] = NULL;
868 }
869
870 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
871 if (msg.wps_vendor_ext[i] == NULL)
872 break;
873 dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
874 msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
875 if (dev->info.wps_vendor_ext[i] == NULL)
876 break;
877 }
878
879 wfd_changed = p2p_compare_wfd_info(dev, &msg);
880
881 if (wfd_changed) {
882 wpabuf_free(dev->info.wfd_subelems);
883 if (msg.wfd_subelems)
884 dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
885 else
886 dev->info.wfd_subelems = NULL;
887 }
888
889 if (scan_res) {
890 p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq,
891 msg.group_info, msg.group_info_len,
892 rx_time);
893 }
894
895 p2p_parse_free(&msg);
896
897 p2p_update_peer_vendor_elems(dev, ies, ies_len);
898
899 if (dev->flags & P2P_DEV_REPORTED && !wfd_changed &&
900 !dev_name_changed &&
901 (!msg.adv_service_instance ||
902 (dev->flags & P2P_DEV_P2PS_REPORTED)))
903 return 0;
904
905 p2p_dbg(p2p, "Peer found with Listen frequency %d MHz (rx_time=%u.%06u)",
906 freq, (unsigned int) rx_time->sec,
907 (unsigned int) rx_time->usec);
908 if (dev->flags & P2P_DEV_USER_REJECTED) {
909 p2p_dbg(p2p, "Do not report rejected device");
910 return 0;
911 }
912
913 if (dev->info.config_methods == 0 &&
914 (freq == 2412 || freq == 2437 || freq == 2462)) {
915 /*
916 * If we have only seen a Beacon frame from a GO, we do not yet
917 * know what WPS config methods it supports. Since some
918 * applications use config_methods value from P2P-DEVICE-FOUND
919 * events, postpone reporting this peer until we've fully
920 * discovered its capabilities.
921 *
922 * At least for now, do this only if the peer was detected on
923 * one of the social channels since that peer can be easily be
924 * found again and there are no limitations of having to use
925 * passive scan on this channels, so this can be done through
926 * Probe Response frame that includes the config_methods
927 * information.
928 */
929 p2p_dbg(p2p, "Do not report peer " MACSTR
930 " with unknown config methods", MAC2STR(addr));
931 return 0;
932 }
933
934 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
935 !(dev->flags & P2P_DEV_REPORTED_ONCE));
936 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
937
938 if (msg.adv_service_instance)
939 dev->flags |= P2P_DEV_P2PS_REPORTED;
940
941 return 0;
942 }
943
944
p2p_device_free(struct p2p_data * p2p,struct p2p_device * dev)945 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
946 {
947 int i;
948
949 if (p2p->go_neg_peer == dev) {
950 /*
951 * If GO Negotiation is in progress, report that it has failed.
952 */
953 p2p_go_neg_failed(p2p, -1);
954 }
955 if (p2p->invite_peer == dev)
956 p2p->invite_peer = NULL;
957 if (p2p->sd_peer == dev)
958 p2p->sd_peer = NULL;
959 if (p2p->pending_client_disc_go == dev)
960 p2p->pending_client_disc_go = NULL;
961
962 /* dev_lost() device, but only if it was previously dev_found() */
963 if (dev->flags & P2P_DEV_REPORTED_ONCE)
964 p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
965 dev->info.p2p_device_addr);
966
967 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
968 wpabuf_free(dev->info.wps_vendor_ext[i]);
969 dev->info.wps_vendor_ext[i] = NULL;
970 }
971
972 os_free(dev->bootstrap_params);
973
974 wpabuf_free(dev->action_frame_wrapper);
975
976 #ifdef CONFIG_PASN
977 if (dev->pasn) {
978 wpa_pasn_reset(dev->pasn);
979 pasn_data_deinit(dev->pasn);
980 }
981 #endif /* CONFIG_PASN */
982
983 wpabuf_free(dev->info.wfd_subelems);
984 wpabuf_free(dev->info.vendor_elems);
985 wpabuf_free(dev->go_neg_conf);
986 wpabuf_free(dev->info.p2ps_instance);
987
988 os_free(dev);
989 }
990
991
p2p_get_next_prog_freq(struct p2p_data * p2p)992 static int p2p_get_next_prog_freq(struct p2p_data *p2p)
993 {
994 struct p2p_channels *c;
995 struct p2p_reg_class *cla;
996 size_t cl, ch;
997 int found = 0;
998 u8 reg_class;
999 u8 channel;
1000 int freq;
1001
1002 c = &p2p->cfg->channels;
1003 for (cl = 0; cl < c->reg_classes; cl++) {
1004 cla = &c->reg_class[cl];
1005 if (cla->reg_class != p2p->last_prog_scan_class)
1006 continue;
1007 for (ch = 0; ch < cla->channels; ch++) {
1008 if (cla->channel[ch] == p2p->last_prog_scan_chan) {
1009 found = 1;
1010 break;
1011 }
1012 }
1013 if (found)
1014 break;
1015 }
1016
1017 if (!found) {
1018 /* Start from beginning */
1019 reg_class = c->reg_class[0].reg_class;
1020 channel = c->reg_class[0].channel[0];
1021 } else {
1022 /* Pick the next channel */
1023 ch++;
1024 if (ch == cla->channels) {
1025 cl++;
1026 if (cl == c->reg_classes)
1027 cl = 0;
1028 ch = 0;
1029 }
1030 reg_class = c->reg_class[cl].reg_class;
1031 channel = c->reg_class[cl].channel[ch];
1032 }
1033
1034 freq = p2p_channel_to_freq(reg_class, channel);
1035 p2p_dbg(p2p, "Next progressive search channel: reg_class %u channel %u -> %d MHz",
1036 reg_class, channel, freq);
1037 p2p->last_prog_scan_class = reg_class;
1038 p2p->last_prog_scan_chan = channel;
1039
1040 if (freq == 2412 || freq == 2437 || freq == 2462)
1041 return 0; /* No need to add social channels */
1042 return freq;
1043 }
1044
1045
p2p_search(struct p2p_data * p2p)1046 static void p2p_search(struct p2p_data *p2p)
1047 {
1048 int freq = 0;
1049 enum p2p_scan_type type;
1050 u16 pw_id = DEV_PW_DEFAULT;
1051 int res;
1052
1053 if (p2p->drv_in_listen) {
1054 p2p_dbg(p2p, "Driver is still in Listen state - wait for it to end before continuing");
1055 return;
1056 }
1057 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1058 p2p->pending_listen_wait_drv = false;
1059
1060 if (p2p->find_pending_full &&
1061 (p2p->find_type == P2P_FIND_PROGRESSIVE ||
1062 p2p->find_type == P2P_FIND_START_WITH_FULL)) {
1063 type = P2P_SCAN_FULL;
1064 p2p_dbg(p2p, "Starting search (pending full scan)");
1065 p2p->find_pending_full = 0;
1066 } else if ((p2p->find_type == P2P_FIND_PROGRESSIVE &&
1067 (freq = p2p_get_next_prog_freq(p2p)) > 0) ||
1068 (p2p->find_type == P2P_FIND_START_WITH_FULL &&
1069 (freq = p2p->find_specified_freq) > 0)) {
1070 type = P2P_SCAN_SOCIAL_PLUS_ONE;
1071 p2p_dbg(p2p, "Starting search (+ freq %u)", freq);
1072 } else {
1073 type = P2P_SCAN_SOCIAL;
1074 p2p_dbg(p2p, "Starting search");
1075 }
1076
1077 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
1078 p2p->num_req_dev_types, p2p->req_dev_types,
1079 p2p->find_dev_id, pw_id, p2p->include_6ghz);
1080 if (res < 0) {
1081 p2p_dbg(p2p, "Scan request schedule failed");
1082 p2p_continue_find(p2p);
1083 }
1084 }
1085
1086
p2p_find_timeout(void * eloop_ctx,void * timeout_ctx)1087 static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
1088 {
1089 struct p2p_data *p2p = eloop_ctx;
1090 p2p_dbg(p2p, "Find timeout -> stop");
1091 p2p_stop_find(p2p);
1092 }
1093
1094
p2p_notify_scan_trigger_status(struct p2p_data * p2p,int status)1095 void p2p_notify_scan_trigger_status(struct p2p_data *p2p, int status)
1096 {
1097 if (status != 0) {
1098 p2p_dbg(p2p, "Scan request failed");
1099 /* Do continue find even for the first p2p_find_scan */
1100 p2p_continue_find(p2p);
1101 } else {
1102 p2p_dbg(p2p, "Running p2p_scan");
1103 p2p->p2p_scan_running = 1;
1104 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1105 eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
1106 p2p, NULL);
1107 }
1108 }
1109
1110
p2p_run_after_scan(struct p2p_data * p2p)1111 static int p2p_run_after_scan(struct p2p_data *p2p)
1112 {
1113 struct p2p_device *dev;
1114 enum p2p_after_scan op;
1115
1116 op = p2p->start_after_scan;
1117 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1118 switch (op) {
1119 case P2P_AFTER_SCAN_NOTHING:
1120 break;
1121 case P2P_AFTER_SCAN_LISTEN:
1122 p2p_dbg(p2p, "Start previously requested Listen state");
1123 p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
1124 p2p->pending_listen_usec / 1000);
1125 return 1;
1126 case P2P_AFTER_SCAN_CONNECT:
1127 p2p_dbg(p2p, "Start previously requested connect with " MACSTR,
1128 MAC2STR(p2p->after_scan_peer));
1129 dev = p2p_get_device(p2p, p2p->after_scan_peer);
1130 if (dev == NULL) {
1131 p2p_dbg(p2p, "Peer not known anymore");
1132 break;
1133 }
1134 p2p_connect_send(p2p, dev);
1135 return 1;
1136 }
1137
1138 return 0;
1139 }
1140
1141
p2p_scan_timeout(void * eloop_ctx,void * timeout_ctx)1142 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1143 {
1144 struct p2p_data *p2p = eloop_ctx;
1145 int running;
1146 p2p_dbg(p2p, "p2p_scan timeout (running=%d)", p2p->p2p_scan_running);
1147 running = p2p->p2p_scan_running;
1148 /* Make sure we recover from missed scan results callback */
1149 p2p->p2p_scan_running = 0;
1150
1151 if (running)
1152 p2p_run_after_scan(p2p);
1153 }
1154
1155
p2p_free_req_dev_types(struct p2p_data * p2p)1156 static void p2p_free_req_dev_types(struct p2p_data *p2p)
1157 {
1158 p2p->num_req_dev_types = 0;
1159 os_free(p2p->req_dev_types);
1160 p2p->req_dev_types = NULL;
1161 }
1162
1163
p2ps_gen_hash(struct p2p_data * p2p,const char * str,u8 * hash)1164 static int p2ps_gen_hash(struct p2p_data *p2p, const char *str, u8 *hash)
1165 {
1166 u8 buf[SHA256_MAC_LEN];
1167 char str_buf[256];
1168 const u8 *adv_array;
1169 size_t i, adv_len;
1170
1171 if (!str || !hash)
1172 return 0;
1173
1174 if (!str[0]) {
1175 os_memcpy(hash, p2p->wild_card_hash, P2PS_HASH_LEN);
1176 return 1;
1177 }
1178
1179 adv_array = (u8 *) str_buf;
1180 adv_len = os_strlen(str);
1181 if (adv_len >= sizeof(str_buf))
1182 return 0;
1183
1184 for (i = 0; i < adv_len; i++) {
1185 if (str[i] >= 'A' && str[i] <= 'Z')
1186 str_buf[i] = str[i] - 'A' + 'a';
1187 else
1188 str_buf[i] = str[i];
1189 }
1190
1191 if (sha256_vector(1, &adv_array, &adv_len, buf))
1192 return 0;
1193
1194 os_memcpy(hash, buf, P2PS_HASH_LEN);
1195 return 1;
1196 }
1197
1198
p2p_find(struct p2p_data * p2p,unsigned int timeout,enum p2p_discovery_type type,unsigned int num_req_dev_types,const u8 * req_dev_types,const u8 * dev_id,unsigned int search_delay,u8 seek_count,const char ** seek,int freq,bool include_6ghz)1199 int p2p_find(struct p2p_data *p2p, unsigned int timeout,
1200 enum p2p_discovery_type type,
1201 unsigned int num_req_dev_types, const u8 *req_dev_types,
1202 const u8 *dev_id, unsigned int search_delay,
1203 u8 seek_count, const char **seek, int freq, bool include_6ghz)
1204 {
1205 int res;
1206 struct os_reltime start;
1207
1208 p2p_dbg(p2p, "Starting find (type=%d)", type);
1209 if (p2p->p2p_scan_running) {
1210 p2p_dbg(p2p, "p2p_scan is already running");
1211 }
1212
1213 p2p_free_req_dev_types(p2p);
1214 if (req_dev_types && num_req_dev_types) {
1215 p2p->req_dev_types = os_memdup(req_dev_types,
1216 num_req_dev_types *
1217 WPS_DEV_TYPE_LEN);
1218 if (p2p->req_dev_types == NULL)
1219 return -1;
1220 p2p->num_req_dev_types = num_req_dev_types;
1221 }
1222
1223 if (dev_id) {
1224 os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
1225 p2p->find_dev_id = p2p->find_dev_id_buf;
1226 } else
1227 p2p->find_dev_id = NULL;
1228 p2p->include_6ghz = p2p_wfd_enabled(p2p) && include_6ghz;
1229 if (seek_count == 0 || !seek) {
1230 /* Not an ASP search */
1231 p2p->p2ps_seek = 0;
1232 } else if (seek_count == 1 && seek && (!seek[0] || !seek[0][0])) {
1233 /*
1234 * An empty seek string means no hash values, but still an ASP
1235 * search.
1236 */
1237 p2p_dbg(p2p, "ASP search");
1238 p2p->p2ps_seek_count = 0;
1239 p2p->p2ps_seek = 1;
1240 } else if (seek && seek_count <= P2P_MAX_QUERY_HASH) {
1241 u8 buf[P2PS_HASH_LEN];
1242 int i, count = 0;
1243
1244 for (i = 0; i < seek_count; i++) {
1245 if (!p2ps_gen_hash(p2p, seek[i], buf))
1246 continue;
1247
1248 p2p_dbg(p2p, "Seek service %s hash " MACSTR,
1249 seek[i], MAC2STR(buf));
1250 os_memcpy(&p2p->p2ps_seek_hash[count * P2PS_HASH_LEN],
1251 buf, P2PS_HASH_LEN);
1252 count++;
1253 }
1254
1255 p2p->p2ps_seek_count = count;
1256 p2p->p2ps_seek = 1;
1257 } else {
1258 p2p->p2ps_seek_count = 0;
1259 p2p->p2ps_seek = 1;
1260 }
1261
1262 /* Special case to perform wildcard search */
1263 if (p2p->p2ps_seek_count == 0 && p2p->p2ps_seek) {
1264 p2p->p2ps_seek_count = 1;
1265 os_memcpy(&p2p->p2ps_seek_hash, p2p->wild_card_hash,
1266 P2PS_HASH_LEN);
1267 }
1268
1269 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1270 p2p_clear_timeout(p2p);
1271 if (p2p->pending_listen_freq) {
1272 p2p_dbg(p2p, "Clear pending_listen_freq for p2p_find");
1273 p2p->pending_listen_freq = 0;
1274 }
1275 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1276 p2p->pending_listen_wait_drv = false;
1277 p2p->find_pending_full = 0;
1278 p2p->find_type = type;
1279 if (freq != 2412 && freq != 2437 && freq != 2462 && freq != 60480)
1280 p2p->find_specified_freq = freq;
1281 else
1282 p2p->find_specified_freq = 0;
1283 p2p_device_clear_reported(p2p);
1284 os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
1285 p2p_set_state(p2p, P2P_SEARCH);
1286 p2p->search_delay = search_delay;
1287 p2p->in_search_delay = 0;
1288 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1289 p2p->last_p2p_find_timeout = timeout;
1290 if (timeout)
1291 eloop_register_timeout(timeout, 0, p2p_find_timeout,
1292 p2p, NULL);
1293 os_get_reltime(&start);
1294 switch (type) {
1295 case P2P_FIND_START_WITH_FULL:
1296 if (freq > 0) {
1297 /*
1298 * Start with the specified channel and then move to
1299 * scans for social channels and this specific channel.
1300 */
1301 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx,
1302 P2P_SCAN_SPECIFIC, freq,
1303 p2p->num_req_dev_types,
1304 p2p->req_dev_types, dev_id,
1305 DEV_PW_DEFAULT,
1306 p2p->include_6ghz);
1307 break;
1308 }
1309 /* fall through */
1310 case P2P_FIND_PROGRESSIVE:
1311 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
1312 p2p->num_req_dev_types,
1313 p2p->req_dev_types, dev_id,
1314 DEV_PW_DEFAULT, p2p->include_6ghz);
1315 break;
1316 case P2P_FIND_ONLY_SOCIAL:
1317 res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
1318 p2p->num_req_dev_types,
1319 p2p->req_dev_types, dev_id,
1320 DEV_PW_DEFAULT, p2p->include_6ghz);
1321 break;
1322 default:
1323 return -1;
1324 }
1325
1326 if (!res)
1327 p2p->find_start = start;
1328
1329 if (res != 0 && p2p->p2p_scan_running) {
1330 p2p_dbg(p2p, "Failed to start p2p_scan - another p2p_scan was already running");
1331 /* wait for the previous p2p_scan to complete */
1332 if (type == P2P_FIND_PROGRESSIVE ||
1333 (type == P2P_FIND_START_WITH_FULL && freq == 0))
1334 p2p->find_pending_full = 1;
1335 res = 0; /* do not report failure */
1336 } else if (res != 0) {
1337 p2p_dbg(p2p, "Failed to start p2p_scan");
1338 p2p_set_state(p2p, P2P_IDLE);
1339 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1340 }
1341
1342 return res;
1343 }
1344
1345
p2p_stop_find_for_freq(struct p2p_data * p2p,int freq)1346 void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
1347 {
1348 p2p_dbg(p2p, "Stopping find");
1349 eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1350 p2p_clear_timeout(p2p);
1351 if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
1352 p2p->cfg->find_stopped(p2p->cfg->cb_ctx);
1353
1354 p2p->p2ps_seek_count = 0;
1355
1356 p2p_set_state(p2p, P2P_IDLE);
1357 p2p_free_req_dev_types(p2p);
1358 p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1359 if (p2p->go_neg_peer)
1360 p2p->go_neg_peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1361 p2p->go_neg_peer = NULL;
1362 p2p->sd_peer = NULL;
1363 p2p->invite_peer = NULL;
1364 p2p_stop_listen_for_freq(p2p, freq);
1365 p2p->send_action_in_progress = 0;
1366 }
1367
1368
p2p_stop_listen_for_freq(struct p2p_data * p2p,int freq)1369 void p2p_stop_listen_for_freq(struct p2p_data *p2p, int freq)
1370 {
1371 p2p_dbg(p2p,
1372 "%s(freq=%d) pending_listen_freq=%d in_listen=%d drv_in_listen=%d",
1373 __func__, freq, p2p->pending_listen_freq, p2p->in_listen,
1374 p2p->drv_in_listen);
1375 if (freq > 0 &&
1376 ((p2p->drv_in_listen == freq && p2p->in_listen) ||
1377 p2p->pending_listen_freq == (unsigned int) freq)) {
1378 p2p_dbg(p2p, "Skip stop_listen since we are on correct channel for response");
1379 return;
1380 }
1381 if (p2p->in_listen) {
1382 p2p->in_listen = 0;
1383 p2p_clear_timeout(p2p);
1384 }
1385 if (p2p->drv_in_listen) {
1386 /*
1387 * The driver may not deliver callback to p2p_listen_end()
1388 * when the operation gets canceled, so clear the internal
1389 * variable that is tracking driver state.
1390 */
1391 p2p_dbg(p2p, "Clear drv_in_listen (%d)", p2p->drv_in_listen);
1392 p2p->drv_in_listen = 0;
1393 }
1394 if (p2p->pending_listen_freq &&
1395 p2p->pending_listen_freq != (unsigned int) freq &&
1396 !p2p->drv_in_listen && p2p->pending_listen_wait_drv) {
1397 p2p_dbg(p2p,
1398 "Clear pending_listen_freq since the started listen did not complete before being stopped");
1399 p2p->pending_listen_freq = 0;
1400 }
1401 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1402 p2p->pending_listen_wait_drv = false;
1403 }
1404
1405
p2p_stop_listen(struct p2p_data * p2p)1406 void p2p_stop_listen(struct p2p_data *p2p)
1407 {
1408 if (p2p->state != P2P_LISTEN_ONLY) {
1409 p2p_dbg(p2p, "Skip stop_listen since not in listen_only state.");
1410 return;
1411 }
1412
1413 p2p_stop_listen_for_freq(p2p, 0);
1414 p2p_set_state(p2p, P2P_IDLE);
1415 }
1416
1417
p2p_stop_find(struct p2p_data * p2p)1418 void p2p_stop_find(struct p2p_data *p2p)
1419 {
1420 p2p->pending_listen_freq = 0;
1421 p2p_stop_find_for_freq(p2p, 0);
1422 }
1423
1424
p2p_prepare_channel_pref(struct p2p_data * p2p,unsigned int force_freq,unsigned int pref_freq,int go)1425 static int p2p_prepare_channel_pref(struct p2p_data *p2p,
1426 unsigned int force_freq,
1427 unsigned int pref_freq, int go)
1428 {
1429 u8 op_class, op_channel;
1430 unsigned int freq = force_freq ? force_freq : pref_freq;
1431
1432 p2p_dbg(p2p, "Prepare channel pref - force_freq=%u pref_freq=%u go=%d",
1433 force_freq, pref_freq, go);
1434 if (p2p_freq_to_channel(freq, &op_class, &op_channel) < 0) {
1435 p2p_dbg(p2p, "Unsupported frequency %u MHz", freq);
1436 return -1;
1437 }
1438
1439 if (!p2p_channels_includes(&p2p->cfg->channels, op_class, op_channel) &&
1440 (go || !p2p_channels_includes(&p2p->cfg->cli_channels, op_class,
1441 op_channel))) {
1442 p2p_dbg(p2p, "Frequency %u MHz (oper_class %u channel %u) not allowed for P2P",
1443 freq, op_class, op_channel);
1444 return -1;
1445 }
1446
1447 p2p->op_reg_class = op_class;
1448 p2p->op_channel = op_channel;
1449
1450 if (force_freq) {
1451 p2p->channels.reg_classes = 1;
1452 p2p->channels.reg_class[0].channels = 1;
1453 p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1454 p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1455 } else {
1456 p2p_copy_channels(&p2p->channels, &p2p->cfg->channels,
1457 p2p->allow_6ghz);
1458 }
1459
1460 return 0;
1461 }
1462
1463
p2p_prepare_channel_best(struct p2p_data * p2p)1464 static void p2p_prepare_channel_best(struct p2p_data *p2p)
1465 {
1466 u8 op_class, op_channel;
1467 const int op_classes_5ghz[] = { 124, 125, 115, 0 };
1468 const int op_classes_ht40[] = { 126, 127, 116, 117, 0 };
1469 const int op_classes_vht[] = { 128, 0 };
1470 const int op_classes_edmg[] = { 181, 182, 183, 0 };
1471 const int op_classes_6ghz[] = { 131, 0 };
1472
1473 p2p_dbg(p2p, "Prepare channel best");
1474
1475 if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
1476 p2p_supported_freq(p2p, p2p->best_freq_overall) &&
1477 p2p_freq_to_channel(p2p->best_freq_overall, &op_class, &op_channel)
1478 == 0) {
1479 p2p_dbg(p2p, "Select best overall channel as operating channel preference");
1480 p2p->op_reg_class = op_class;
1481 p2p->op_channel = op_channel;
1482 } else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
1483 p2p_supported_freq(p2p, p2p->best_freq_5) &&
1484 p2p_freq_to_channel(p2p->best_freq_5, &op_class, &op_channel)
1485 == 0) {
1486 p2p_dbg(p2p, "Select best 5 GHz channel as operating channel preference");
1487 p2p->op_reg_class = op_class;
1488 p2p->op_channel = op_channel;
1489 } else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_24 > 0 &&
1490 p2p_supported_freq(p2p, p2p->best_freq_24) &&
1491 p2p_freq_to_channel(p2p->best_freq_24, &op_class,
1492 &op_channel) == 0) {
1493 p2p_dbg(p2p, "Select best 2.4 GHz channel as operating channel preference");
1494 p2p->op_reg_class = op_class;
1495 p2p->op_channel = op_channel;
1496 } else if (p2p->cfg->num_pref_chan > 0 &&
1497 p2p_channels_includes(&p2p->cfg->channels,
1498 p2p->cfg->pref_chan[0].op_class,
1499 p2p->cfg->pref_chan[0].chan)) {
1500 p2p_dbg(p2p, "Select first pref_chan entry as operating channel preference");
1501 p2p->op_reg_class = p2p->cfg->pref_chan[0].op_class;
1502 p2p->op_channel = p2p->cfg->pref_chan[0].chan;
1503 } else if (p2p_channel_select(&p2p->cfg->channels, op_classes_edmg,
1504 &p2p->op_reg_class, &p2p->op_channel) ==
1505 0) {
1506 p2p_dbg(p2p, "Select possible EDMG channel (op_class %u channel %u) as operating channel preference",
1507 p2p->op_reg_class, p2p->op_channel);
1508 } else if (p2p->allow_6ghz &&
1509 (p2p_channel_select(&p2p->cfg->channels, op_classes_6ghz,
1510 &p2p->op_reg_class, &p2p->op_channel) ==
1511 0)) {
1512 p2p_dbg(p2p, "Select possible 6 GHz channel (op_class %u channel %u) as operating channel preference",
1513 p2p->op_reg_class, p2p->op_channel);
1514 } else if (p2p_channel_select(&p2p->cfg->channels, op_classes_vht,
1515 &p2p->op_reg_class, &p2p->op_channel) ==
1516 0) {
1517 p2p_dbg(p2p, "Select possible VHT channel (op_class %u channel %u) as operating channel preference",
1518 p2p->op_reg_class, p2p->op_channel);
1519 } else if (p2p_channel_select(&p2p->cfg->channels, op_classes_ht40,
1520 &p2p->op_reg_class, &p2p->op_channel) ==
1521 0) {
1522 p2p_dbg(p2p, "Select possible HT40 channel (op_class %u channel %u) as operating channel preference",
1523 p2p->op_reg_class, p2p->op_channel);
1524 } else if (p2p_channel_select(&p2p->cfg->channels, op_classes_5ghz,
1525 &p2p->op_reg_class, &p2p->op_channel) ==
1526 0) {
1527 p2p_dbg(p2p, "Select possible 5 GHz channel (op_class %u channel %u) as operating channel preference",
1528 p2p->op_reg_class, p2p->op_channel);
1529 } else if (p2p_channels_includes(&p2p->cfg->channels,
1530 p2p->cfg->op_reg_class,
1531 p2p->cfg->op_channel)) {
1532 p2p_dbg(p2p, "Select pre-configured channel as operating channel preference");
1533 p2p->op_reg_class = p2p->cfg->op_reg_class;
1534 p2p->op_channel = p2p->cfg->op_channel;
1535 } else if (p2p_channel_random_social(&p2p->cfg->channels,
1536 &p2p->op_reg_class,
1537 &p2p->op_channel,
1538 NULL, NULL) == 0) {
1539 p2p_dbg(p2p, "Select random available social channel (op_class %u channel %u) as operating channel preference",
1540 p2p->op_reg_class, p2p->op_channel);
1541 } else {
1542 /* Select any random available channel from the first available
1543 * operating class */
1544 if (p2p_channel_select(&p2p->cfg->channels, NULL,
1545 &p2p->op_reg_class,
1546 &p2p->op_channel) == 0)
1547 p2p_dbg(p2p,
1548 "Select random available channel %d from operating class %d as operating channel preference",
1549 p2p->op_channel, p2p->op_reg_class);
1550 }
1551
1552 p2p_copy_channels(&p2p->channels, &p2p->cfg->channels, p2p->allow_6ghz);
1553 }
1554
1555
1556 /**
1557 * p2p_prepare_channel - Select operating channel for GO Negotiation or P2PS PD
1558 * @p2p: P2P module context from p2p_init()
1559 * @dev: Selected peer device
1560 * @force_freq: Forced frequency in MHz or 0 if not forced
1561 * @pref_freq: Preferred frequency in MHz or 0 if no preference
1562 * @go: Whether the local end will be forced to be GO
1563 * Returns: 0 on success, -1 on failure (channel not supported for P2P)
1564 *
1565 * This function is used to do initial operating channel selection for GO
1566 * Negotiation prior to having received peer information or for P2PS PD
1567 * signalling. The selected channel may be further optimized in
1568 * p2p_reselect_channel() once the peer information is available.
1569 */
p2p_prepare_channel(struct p2p_data * p2p,struct p2p_device * dev,unsigned int force_freq,unsigned int pref_freq,int go)1570 int p2p_prepare_channel(struct p2p_data *p2p, struct p2p_device *dev,
1571 unsigned int force_freq, unsigned int pref_freq, int go)
1572 {
1573 p2p_dbg(p2p, "Prepare channel - force_freq=%u pref_freq=%u go=%d",
1574 force_freq, pref_freq, go);
1575 if (force_freq || pref_freq) {
1576 if (p2p_prepare_channel_pref(p2p, force_freq, pref_freq, go) <
1577 0)
1578 return -1;
1579 } else {
1580 p2p_prepare_channel_best(p2p);
1581 }
1582 p2p_channels_dump(p2p, "prepared channels", &p2p->channels);
1583 if (go)
1584 p2p_channels_remove_freqs(&p2p->channels, &p2p->no_go_freq);
1585 else if (!force_freq)
1586 p2p_channels_union_inplace(&p2p->channels,
1587 &p2p->cfg->cli_channels);
1588 p2p_channels_dump(p2p, "after go/cli filter/add", &p2p->channels);
1589
1590 p2p_dbg(p2p, "Own preference for operation channel: Operating Class %u Channel %u%s",
1591 p2p->op_reg_class, p2p->op_channel,
1592 force_freq ? " (forced)" : "");
1593
1594 if (force_freq)
1595 dev->flags |= P2P_DEV_FORCE_FREQ;
1596 else
1597 dev->flags &= ~P2P_DEV_FORCE_FREQ;
1598
1599 return 0;
1600 }
1601
1602
p2p_set_dev_persistent(struct p2p_device * dev,int persistent_group)1603 static void p2p_set_dev_persistent(struct p2p_device *dev,
1604 int persistent_group)
1605 {
1606 switch (persistent_group) {
1607 case 0:
1608 dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
1609 P2P_DEV_PREFER_PERSISTENT_RECONN);
1610 break;
1611 case 1:
1612 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1613 dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
1614 break;
1615 case 2:
1616 dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
1617 P2P_DEV_PREFER_PERSISTENT_RECONN;
1618 break;
1619 }
1620 }
1621
1622
p2p_connect(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,int pd_before_go_neg,unsigned int pref_freq,u16 oob_pw_id,bool p2p2,u16 bootstrap,const char * password)1623 int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1624 enum p2p_wps_method wps_method,
1625 int go_intent, const u8 *own_interface_addr,
1626 unsigned int force_freq, int persistent_group,
1627 const u8 *force_ssid, size_t force_ssid_len,
1628 int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
1629 bool p2p2, u16 bootstrap, const char *password)
1630 {
1631 struct p2p_device *dev;
1632
1633 p2p_dbg(p2p, "Request to start group negotiation - peer=" MACSTR
1634 " GO Intent=%d Intended Interface Address=" MACSTR
1635 " wps_method=%d persistent_group=%d pd_before_go_neg=%d "
1636 "oob_pw_id=%u allow_6ghz=%d",
1637 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1638 wps_method, persistent_group, pd_before_go_neg, oob_pw_id,
1639 p2p->allow_6ghz);
1640
1641 dev = p2p_get_device(p2p, peer_addr);
1642 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1643 p2p_dbg(p2p, "Cannot connect to unknown P2P Device " MACSTR,
1644 MAC2STR(peer_addr));
1645 return -1;
1646 }
1647
1648 if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq,
1649 go_intent == 15) < 0)
1650 return -1;
1651
1652 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
1653 if (!(dev->info.dev_capab &
1654 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
1655 p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1656 " that is in a group and is not discoverable",
1657 MAC2STR(peer_addr));
1658 return -1;
1659 }
1660 if (dev->oper_freq <= 0) {
1661 p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1662 " with incomplete information",
1663 MAC2STR(peer_addr));
1664 return -1;
1665 }
1666
1667 /*
1668 * First, try to connect directly. If the peer does not
1669 * acknowledge frames, assume it is sleeping and use device
1670 * discoverability via the GO at that point.
1671 */
1672 }
1673
1674 p2p->ssid_set = 0;
1675 if (force_ssid) {
1676 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1677 force_ssid, force_ssid_len);
1678 os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1679 p2p->ssid_len = force_ssid_len;
1680 p2p->ssid_set = 1;
1681 }
1682
1683 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1684 dev->flags &= ~P2P_DEV_USER_REJECTED;
1685 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1686 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1687 if (pd_before_go_neg)
1688 dev->flags |= P2P_DEV_PD_BEFORE_GO_NEG;
1689 else {
1690 dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
1691 /*
1692 * Assign dialog token and tie breaker here to use the same
1693 * values in each retry within the same GO Negotiation exchange.
1694 */
1695 dev->dialog_token++;
1696 if (dev->dialog_token == 0)
1697 dev->dialog_token = 1;
1698 dev->tie_breaker = p2p->next_tie_breaker;
1699 p2p->next_tie_breaker = !p2p->next_tie_breaker;
1700 }
1701 dev->connect_reqs = 0;
1702 dev->go_neg_req_sent = 0;
1703 dev->go_state = UNKNOWN_GO;
1704 p2p_set_dev_persistent(dev, persistent_group);
1705 p2p->go_intent = go_intent;
1706 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1707
1708 if (p2p->state != P2P_IDLE)
1709 p2p_stop_find(p2p);
1710
1711 dev->wps_method = wps_method;
1712 dev->oob_pw_id = oob_pw_id;
1713 dev->p2p2 = p2p2;
1714 dev->req_bootstrap_method = bootstrap;
1715 if (password && os_strlen(password) < sizeof(dev->password))
1716 os_strlcpy(dev->password, password, sizeof(dev->password));
1717 dev->status = P2P_SC_SUCCESS;
1718
1719 if (p2p->p2p_scan_running) {
1720 p2p_dbg(p2p, "p2p_scan running - delay connect send");
1721 p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1722 os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1723 return 0;
1724 }
1725
1726 return p2p_connect_send(p2p, dev);
1727 }
1728
1729
p2p_authorize(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,unsigned int pref_freq,u16 oob_pw_id,u16 bootstrap,const char * password)1730 int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1731 enum p2p_wps_method wps_method,
1732 int go_intent, const u8 *own_interface_addr,
1733 unsigned int force_freq, int persistent_group,
1734 const u8 *force_ssid, size_t force_ssid_len,
1735 unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
1736 const char *password)
1737 {
1738 struct p2p_device *dev;
1739
1740 p2p_dbg(p2p, "Request to authorize group negotiation - peer=" MACSTR
1741 " GO Intent=%d Intended Interface Address=" MACSTR
1742 " wps_method=%d persistent_group=%d oob_pw_id=%u allow_6ghz=%d",
1743 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1744 wps_method, persistent_group, oob_pw_id, p2p->allow_6ghz);
1745
1746 dev = p2p_get_device(p2p, peer_addr);
1747 if (dev == NULL) {
1748 p2p_dbg(p2p, "Cannot authorize unknown P2P Device " MACSTR,
1749 MAC2STR(peer_addr));
1750 return -1;
1751 }
1752
1753 if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq, go_intent ==
1754 15) < 0)
1755 return -1;
1756
1757 p2p->ssid_set = 0;
1758 if (force_ssid) {
1759 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1760 force_ssid, force_ssid_len);
1761 os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1762 p2p->ssid_len = force_ssid_len;
1763 p2p->ssid_set = 1;
1764 }
1765
1766 dev->flags &= ~P2P_DEV_NOT_YET_READY;
1767 dev->flags &= ~P2P_DEV_USER_REJECTED;
1768 dev->go_neg_req_sent = 0;
1769 dev->go_state = UNKNOWN_GO;
1770 dev->req_bootstrap_method = bootstrap;
1771
1772 if (password && os_strlen(password) < sizeof(dev->password))
1773 os_strlcpy(dev->password, password, sizeof(dev->password));
1774 p2p_set_dev_persistent(dev, persistent_group);
1775 p2p->go_intent = go_intent;
1776 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1777
1778 dev->wps_method = wps_method;
1779 dev->oob_pw_id = oob_pw_id;
1780 dev->status = P2P_SC_SUCCESS;
1781
1782 return 0;
1783 }
1784
1785
p2p_add_dev_info(struct p2p_data * p2p,const u8 * addr,struct p2p_device * dev,struct p2p_message * msg)1786 void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1787 struct p2p_device *dev, struct p2p_message *msg)
1788 {
1789 os_get_reltime(&dev->last_seen);
1790
1791 p2p_copy_wps_info(p2p, dev, 0, msg);
1792
1793 if (msg->listen_channel) {
1794 int freq;
1795 freq = p2p_channel_to_freq(msg->listen_channel[3],
1796 msg->listen_channel[4]);
1797 if (freq < 0) {
1798 p2p_dbg(p2p, "Unknown peer Listen channel: "
1799 "country=%c%c(0x%02x) reg_class=%u channel=%u",
1800 msg->listen_channel[0],
1801 msg->listen_channel[1],
1802 msg->listen_channel[2],
1803 msg->listen_channel[3],
1804 msg->listen_channel[4]);
1805 } else {
1806 p2p_dbg(p2p, "Update peer " MACSTR
1807 " Listen channel: %u -> %u MHz",
1808 MAC2STR(dev->info.p2p_device_addr),
1809 dev->listen_freq, freq);
1810 dev->listen_freq = freq;
1811 }
1812 }
1813
1814 if (msg->wfd_subelems) {
1815 wpabuf_free(dev->info.wfd_subelems);
1816 dev->info.wfd_subelems = wpabuf_dup(msg->wfd_subelems);
1817 }
1818
1819 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1820 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1821 p2p_dbg(p2p, "Completed device entry based on data from GO Negotiation Request");
1822 } else {
1823 p2p_dbg(p2p, "Created device entry based on GO Neg Req: "
1824 MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1825 "listen_freq=%d",
1826 MAC2STR(dev->info.p2p_device_addr),
1827 dev->info.dev_capab, dev->info.group_capab,
1828 dev->info.device_name, dev->listen_freq);
1829 }
1830
1831 dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1832
1833 if (dev->flags & P2P_DEV_USER_REJECTED) {
1834 p2p_dbg(p2p, "Do not report rejected device");
1835 return;
1836 }
1837
1838 p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1839 !(dev->flags & P2P_DEV_REPORTED_ONCE));
1840 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
1841 }
1842
1843
p2p_build_ssid(struct p2p_data * p2p,u8 * ssid,size_t * ssid_len)1844 void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1845 {
1846 os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1847 p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1848 os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1849 p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1850 *ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1851 }
1852
1853
p2p_go_params(struct p2p_data * p2p,struct p2p_go_neg_results * params)1854 int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1855 {
1856 if (p2p->ssid_set) {
1857 os_memcpy(params->ssid, p2p->ssid, p2p->ssid_len);
1858 params->ssid_len = p2p->ssid_len;
1859 } else {
1860 p2p_build_ssid(p2p, params->ssid, ¶ms->ssid_len);
1861 }
1862 p2p->ssid_set = 0;
1863
1864 if (p2p->passphrase_set) {
1865 os_memcpy(params->passphrase, p2p->passphrase, os_strlen(p2p->passphrase));
1866 } else {
1867 p2p_random(params->passphrase, p2p->cfg->passphrase_len);
1868 params->passphrase[p2p->cfg->passphrase_len] = '\0';
1869 }
1870 p2p->passphrase_set = 0;
1871 params->cipher = WPA_CIPHER_CCMP;
1872 if (p2p->cfg->pairing_config.pasn_type & 0xc)
1873 params->cipher |= WPA_CIPHER_GCMP_256;
1874
1875 if (params->p2p2) {
1876 os_strlcpy(p2p->dev_sae_password, params->passphrase,
1877 sizeof(p2p->dev_sae_password));
1878 os_strlcpy(params->sae_password, p2p->dev_sae_password,
1879 sizeof(params->sae_password));
1880 }
1881
1882 return 0;
1883 }
1884
1885
p2p_set_go_role(struct p2p_data * p2p,bool val)1886 void p2p_set_go_role(struct p2p_data *p2p, bool val)
1887 {
1888 p2p->go_role = val;
1889 }
1890
1891
p2p_go_complete(struct p2p_data * p2p,struct p2p_device * peer)1892 void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1893 {
1894 struct p2p_go_neg_results res;
1895 int go = peer->go_state == LOCAL_GO;
1896 struct p2p_channels intersection;
1897
1898 p2p_dbg(p2p, "GO Negotiation with " MACSTR " completed (%s will be GO)",
1899 MAC2STR(peer->info.p2p_device_addr), go ? "local end" : "peer");
1900
1901 os_memset(&res, 0, sizeof(res));
1902 res.role_go = go;
1903 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
1904 os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1905 res.wps_method = peer->wps_method;
1906 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
1907 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
1908 res.persistent_group = 2;
1909 else
1910 res.persistent_group = 1;
1911 }
1912
1913 if (go) {
1914 /* Setup AP mode for WPS provisioning */
1915 res.freq = p2p_channel_to_freq(p2p->op_reg_class,
1916 p2p->op_channel);
1917 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1918 res.ssid_len = p2p->ssid_len;
1919 p2p_random(res.passphrase, p2p->cfg->passphrase_len);
1920 res.passphrase[p2p->cfg->passphrase_len] = '\0';
1921 } else {
1922 res.freq = peer->oper_freq;
1923 if (p2p->ssid_len) {
1924 os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1925 res.ssid_len = p2p->ssid_len;
1926 }
1927 }
1928
1929 p2p_channels_dump(p2p, "own channels", &p2p->channels);
1930 p2p_channels_dump(p2p, "peer channels", &peer->channels);
1931 p2p_channels_intersect(&p2p->channels, &peer->channels,
1932 &intersection);
1933 if (go) {
1934 p2p_channels_remove_freqs(&intersection, &p2p->no_go_freq);
1935 p2p_channels_dump(p2p, "intersection after no-GO removal",
1936 &intersection);
1937 }
1938
1939 p2p_channels_to_freqs(&intersection, res.freq_list,
1940 P2P_MAX_CHANNELS);
1941
1942 res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1943
1944 p2p_clear_timeout(p2p);
1945 p2p->ssid_set = 0;
1946 peer->go_neg_req_sent = 0;
1947 peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1948 peer->wps_method = WPS_NOT_READY;
1949 peer->oob_pw_id = 0;
1950 wpabuf_free(peer->go_neg_conf);
1951 peer->go_neg_conf = NULL;
1952
1953 #ifdef CONFIG_PASN
1954 if (peer->p2p2 && peer->pasn) {
1955 res.p2p2 = peer->p2p2;
1956 res.akmp = peer->pasn->akmp;
1957 res.cipher = peer->pasn->cipher;
1958
1959 if (res.akmp == WPA_KEY_MGMT_PASN) {
1960 if (go) {
1961 os_strlcpy(res.sae_password,
1962 p2p->dev_sae_password,
1963 sizeof(res.sae_password));
1964 } else {
1965 if (!os_strlen(p2p->peer_sae_password)) {
1966 p2p_dbg(p2p, "No password from peer GO for P2P2 group formation");
1967 return;
1968 }
1969 os_strlcpy(res.sae_password,
1970 p2p->peer_sae_password,
1971 sizeof(res.sae_password));
1972 }
1973 } else if (res.akmp == WPA_KEY_MGMT_SAE) {
1974 if (peer->role == P2P_ROLE_PAIRING_INITIATOR) {
1975 pasn_initiator_pmksa_cache_get(
1976 peer->pasn->pmksa,
1977 peer->pasn->peer_addr,
1978 res.pmkid, res.pmk, &res.pmk_len);
1979 } else {
1980 pasn_responder_pmksa_cache_get(
1981 peer->pasn->pmksa,
1982 peer->pasn->peer_addr,
1983 res.pmkid, res.pmk, &res.pmk_len);
1984 }
1985 }
1986
1987 os_memset(p2p->dev_sae_password, 0,
1988 sizeof(p2p->dev_sae_password));
1989 os_memset(p2p->peer_sae_password, 0,
1990 sizeof(p2p->peer_sae_password));
1991 wpa_pasn_reset(peer->pasn);
1992 }
1993 #endif /* CONFIG_PASN */
1994
1995 if (p2p->go_role && peer->p2p2) {
1996 p2p->cfg->set_go_security_config(p2p->cfg->cb_ctx, &res);
1997 p2p->go_role = false;
1998 } else {
1999 p2p_set_state(p2p, P2P_PROVISIONING);
2000 p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
2001 }
2002
2003 forced_memzero(&res, sizeof(res));
2004 }
2005
2006
p2p_rx_p2p_action(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)2007 static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
2008 const u8 *data, size_t len, int rx_freq)
2009 {
2010 p2p_dbg(p2p, "RX P2P Public Action from " MACSTR, MAC2STR(sa));
2011 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
2012
2013 if (len < 1)
2014 return;
2015
2016 switch (data[0]) {
2017 case P2P_GO_NEG_REQ:
2018 p2p_handle_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
2019 break;
2020 case P2P_GO_NEG_RESP:
2021 p2p_handle_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
2022 break;
2023 case P2P_GO_NEG_CONF:
2024 p2p_handle_go_neg_conf(p2p, sa, data + 1, len - 1, false);
2025 break;
2026 case P2P_INVITATION_REQ:
2027 p2p_handle_invitation_req(p2p, sa, data + 1, len - 1, rx_freq);
2028 break;
2029 case P2P_INVITATION_RESP:
2030 p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
2031 break;
2032 case P2P_PROV_DISC_REQ:
2033 p2p_handle_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2034 break;
2035 case P2P_PROV_DISC_RESP:
2036 p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1, rx_freq);
2037 break;
2038 case P2P_DEV_DISC_REQ:
2039 p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2040 break;
2041 case P2P_DEV_DISC_RESP:
2042 p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
2043 break;
2044 default:
2045 p2p_dbg(p2p, "Unsupported P2P Public Action frame type %d",
2046 data[0]);
2047 break;
2048 }
2049 }
2050
2051
p2p_rx_action_public(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,const u8 * data,size_t len,int freq)2052 static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
2053 const u8 *sa, const u8 *bssid, const u8 *data,
2054 size_t len, int freq)
2055 {
2056 if (len < 1)
2057 return;
2058
2059 switch (data[0]) {
2060 case WLAN_PA_VENDOR_SPECIFIC:
2061 data++;
2062 len--;
2063 if (len < 4)
2064 return;
2065 if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2066 return;
2067
2068 data += 4;
2069 len -= 4;
2070
2071 p2p_rx_p2p_action(p2p, sa, data, len, freq);
2072 break;
2073 case WLAN_PA_GAS_INITIAL_REQ:
2074 p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
2075 break;
2076 case WLAN_PA_GAS_INITIAL_RESP:
2077 p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
2078 break;
2079 case WLAN_PA_GAS_COMEBACK_REQ:
2080 p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
2081 break;
2082 case WLAN_PA_GAS_COMEBACK_RESP:
2083 p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
2084 break;
2085 }
2086 }
2087
2088
p2p_rx_action(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,u8 category,const u8 * data,size_t len,int freq)2089 void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
2090 const u8 *bssid, u8 category,
2091 const u8 *data, size_t len, int freq)
2092 {
2093 if (category == WLAN_ACTION_PUBLIC) {
2094 p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
2095 return;
2096 }
2097
2098 if (category != WLAN_ACTION_VENDOR_SPECIFIC)
2099 return;
2100
2101 if (len < 4)
2102 return;
2103
2104 if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2105 return;
2106 data += 4;
2107 len -= 4;
2108
2109 /* P2P action frame */
2110 p2p_dbg(p2p, "RX P2P Action from " MACSTR, MAC2STR(sa));
2111 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
2112
2113 if (len < 1)
2114 return;
2115 switch (data[0]) {
2116 case P2P_NOA:
2117 p2p_dbg(p2p, "Received P2P Action - Notice of Absence");
2118 /* TODO */
2119 break;
2120 case P2P_PRESENCE_REQ:
2121 p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
2122 break;
2123 case P2P_PRESENCE_RESP:
2124 p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
2125 break;
2126 case P2P_GO_DISC_REQ:
2127 p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
2128 break;
2129 default:
2130 p2p_dbg(p2p, "Received P2P Action - unknown type %u", data[0]);
2131 break;
2132 }
2133 }
2134
2135
p2p_go_neg_start(void * eloop_ctx,void * timeout_ctx)2136 static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
2137 {
2138 struct p2p_data *p2p = eloop_ctx;
2139 if (p2p->go_neg_peer == NULL)
2140 return;
2141 if (p2p->pending_listen_freq) {
2142 p2p_dbg(p2p, "Clear pending_listen_freq for p2p_go_neg_start");
2143 p2p->pending_listen_freq = 0;
2144 }
2145 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2146 p2p->pending_listen_wait_drv = false;
2147 p2p->go_neg_peer->status = P2P_SC_SUCCESS;
2148 /*
2149 * Set new timeout to make sure a previously set one does not expire
2150 * too quickly while waiting for the GO Negotiation to complete.
2151 */
2152 p2p_set_timeout(p2p, 0, 500000);
2153 p2p_connect_send(p2p, p2p->go_neg_peer);
2154 }
2155
2156
p2p_invite_start(void * eloop_ctx,void * timeout_ctx)2157 static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
2158 {
2159 struct p2p_data *p2p = eloop_ctx;
2160 if (p2p->invite_peer == NULL)
2161 return;
2162 if (p2p->pending_listen_freq) {
2163 p2p_dbg(p2p, "Clear pending_listen_freq for p2p_invite_start");
2164 p2p->pending_listen_freq = 0;
2165 }
2166 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2167 p2p->pending_listen_wait_drv = false;
2168 p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr,
2169 p2p->invite_dev_pw_id);
2170 }
2171
2172
p2p_add_dev_from_probe_req(struct p2p_data * p2p,const u8 * addr,const u8 * ie,size_t ie_len)2173 static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
2174 const u8 *ie, size_t ie_len)
2175 {
2176 struct p2p_message msg;
2177 struct p2p_device *dev;
2178
2179 os_memset(&msg, 0, sizeof(msg));
2180 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
2181 {
2182 p2p_parse_free(&msg);
2183 return; /* not a P2P probe */
2184 }
2185
2186 if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
2187 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
2188 != 0) {
2189 /* The Probe Request is not part of P2P Device Discovery. It is
2190 * not known whether the source address of the frame is the P2P
2191 * Device Address or P2P Interface Address. Do not add a new
2192 * peer entry based on this frames.
2193 */
2194 p2p_parse_free(&msg);
2195 return;
2196 }
2197
2198 dev = p2p_get_device(p2p, addr);
2199 if (dev) {
2200 if (msg.listen_channel) {
2201 int freq;
2202
2203 if (dev->country[0] == 0)
2204 os_memcpy(dev->country, msg.listen_channel, 3);
2205
2206 freq = p2p_channel_to_freq(msg.listen_channel[3],
2207 msg.listen_channel[4]);
2208
2209 if (freq > 0 && dev->listen_freq != freq) {
2210 p2p_dbg(p2p,
2211 "Updated peer " MACSTR " Listen channel (Probe Request): %d -> %d MHz",
2212 MAC2STR(addr), dev->listen_freq, freq);
2213 dev->listen_freq = freq;
2214 }
2215 }
2216
2217 p2p_update_peer_6ghz_capab(dev, &msg);
2218 os_get_reltime(&dev->last_seen);
2219 p2p_parse_free(&msg);
2220 return; /* already known */
2221 }
2222
2223 dev = p2p_create_device(p2p, addr);
2224 if (dev == NULL) {
2225 p2p_parse_free(&msg);
2226 return;
2227 }
2228
2229 os_get_reltime(&dev->last_seen);
2230 dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
2231
2232 if (msg.listen_channel) {
2233 os_memcpy(dev->country, msg.listen_channel, 3);
2234 dev->listen_freq = p2p_channel_to_freq(msg.listen_channel[3],
2235 msg.listen_channel[4]);
2236 }
2237
2238 p2p_copy_wps_info(p2p, dev, 1, &msg);
2239
2240 if (msg.wfd_subelems) {
2241 wpabuf_free(dev->info.wfd_subelems);
2242 dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
2243 }
2244
2245 p2p_parse_free(&msg);
2246
2247 p2p_dbg(p2p, "Created device entry based on Probe Req: " MACSTR
2248 " dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
2249 MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
2250 dev->info.group_capab, dev->info.device_name,
2251 dev->listen_freq);
2252 }
2253
2254
p2p_add_dev_from_go_neg_req(struct p2p_data * p2p,const u8 * addr,struct p2p_message * msg)2255 struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
2256 const u8 *addr,
2257 struct p2p_message *msg)
2258 {
2259 struct p2p_device *dev;
2260
2261 dev = p2p_get_device(p2p, addr);
2262 if (dev) {
2263 os_get_reltime(&dev->last_seen);
2264 return dev; /* already known */
2265 }
2266
2267 dev = p2p_create_device(p2p, addr);
2268 if (dev == NULL)
2269 return NULL;
2270
2271 p2p_add_dev_info(p2p, addr, dev, msg);
2272
2273 return dev;
2274 }
2275
2276
dev_type_match(const u8 * dev_type,const u8 * req_dev_type)2277 static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
2278 {
2279 if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
2280 return 1;
2281 if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
2282 WPA_GET_BE32(&req_dev_type[2]) == 0 &&
2283 WPA_GET_BE16(&req_dev_type[6]) == 0)
2284 return 1; /* Category match with wildcard OUI/sub-category */
2285 return 0;
2286 }
2287
2288
dev_type_list_match(const u8 * dev_type,const u8 * req_dev_type[],size_t num_req_dev_type)2289 int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
2290 size_t num_req_dev_type)
2291 {
2292 size_t i;
2293 for (i = 0; i < num_req_dev_type; i++) {
2294 if (dev_type_match(dev_type, req_dev_type[i]))
2295 return 1;
2296 }
2297 return 0;
2298 }
2299
2300
2301 /**
2302 * p2p_match_dev_type - Match local device type with requested type
2303 * @p2p: P2P module context from p2p_init()
2304 * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
2305 * Returns: 1 on match, 0 on mismatch
2306 *
2307 * This function can be used to match the Requested Device Type attribute in
2308 * WPS IE with the local device types for deciding whether to reply to a Probe
2309 * Request frame.
2310 */
p2p_match_dev_type(struct p2p_data * p2p,struct wpabuf * wps)2311 int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
2312 {
2313 struct wps_parse_attr attr;
2314 size_t i;
2315
2316 if (wps_parse_msg(wps, &attr))
2317 return 1; /* assume no Requested Device Type attributes */
2318
2319 if (attr.num_req_dev_type == 0)
2320 return 1; /* no Requested Device Type attributes -> match */
2321
2322 if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
2323 attr.num_req_dev_type))
2324 return 1; /* Own Primary Device Type matches */
2325
2326 for (i = 0; i < p2p->cfg->num_sec_dev_types; i++) {
2327 if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
2328 attr.req_dev_type,
2329 attr.num_req_dev_type))
2330 return 1; /* Own Secondary Device Type matches */
2331 }
2332
2333 /* No matching device type found */
2334 return 0;
2335 }
2336
2337
p2p_build_probe_resp_ies(struct p2p_data * p2p,const u8 * query_hash,u8 query_count)2338 struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p,
2339 const u8 *query_hash,
2340 u8 query_count)
2341 {
2342 struct wpabuf *buf;
2343 u8 *len;
2344 int pw_id = -1;
2345 size_t extra = 0;
2346
2347 #ifdef CONFIG_WIFI_DISPLAY
2348 if (p2p->wfd_ie_probe_resp)
2349 extra = wpabuf_len(p2p->wfd_ie_probe_resp);
2350 #endif /* CONFIG_WIFI_DISPLAY */
2351
2352 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2353 extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2354
2355 if (query_count)
2356 extra += MAX_SVC_ADV_IE_LEN;
2357
2358 buf = wpabuf_alloc(1000 + extra);
2359 if (buf == NULL)
2360 return NULL;
2361
2362 if (p2p->go_neg_peer) {
2363 /* Advertise immediate availability of WPS credential */
2364 pw_id = p2p_wps_method_pw_id(p2p->go_neg_peer->wps_method);
2365 }
2366
2367 if (p2p_build_wps_ie(p2p, buf, pw_id, 1) < 0) {
2368 p2p_dbg(p2p, "Failed to build WPS IE for Probe Response");
2369 wpabuf_free(buf);
2370 return NULL;
2371 }
2372
2373 #ifdef CONFIG_WIFI_DISPLAY
2374 if (p2p->wfd_ie_probe_resp)
2375 wpabuf_put_buf(buf, p2p->wfd_ie_probe_resp);
2376 #endif /* CONFIG_WIFI_DISPLAY */
2377
2378 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2379 wpabuf_put_buf(buf,
2380 p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2381
2382 /* P2P IE */
2383 len = p2p_buf_add_ie_hdr(buf);
2384 p2p_buf_add_capability(buf, p2p->dev_capab &
2385 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
2386 if (p2p->ext_listen_interval)
2387 p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
2388 p2p->ext_listen_interval);
2389 p2p_buf_add_device_info(buf, p2p, NULL);
2390 p2p_buf_update_ie_hdr(buf, len);
2391
2392 if (query_count) {
2393 p2p_buf_add_service_instance(buf, p2p, query_count, query_hash,
2394 p2p->p2ps_adv_list);
2395 }
2396
2397 return buf;
2398 }
2399
p2p_build_probe_resp_buf(struct p2p_data * p2p,struct wpabuf * buf,struct wpabuf * ies,const u8 * addr,int rx_freq)2400 static int p2p_build_probe_resp_buf(struct p2p_data *p2p, struct wpabuf *buf,
2401 struct wpabuf *ies,
2402 const u8 *addr, int rx_freq)
2403 {
2404 struct ieee80211_mgmt *resp;
2405 u8 channel, op_class;
2406
2407 resp = wpabuf_put(buf, offsetof(struct ieee80211_mgmt,
2408 u.probe_resp.variable));
2409
2410 resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
2411 (WLAN_FC_STYPE_PROBE_RESP << 4));
2412 os_memcpy(resp->da, addr, ETH_ALEN);
2413 os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
2414 os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
2415 resp->u.probe_resp.beacon_int = host_to_le16(100);
2416 /* hardware or low-level driver will setup seq_ctrl and timestamp */
2417 resp->u.probe_resp.capab_info =
2418 host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
2419 WLAN_CAPABILITY_PRIVACY |
2420 WLAN_CAPABILITY_SHORT_SLOT_TIME);
2421
2422 wpabuf_put_u8(buf, WLAN_EID_SSID);
2423 wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
2424 wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
2425
2426 wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
2427 wpabuf_put_u8(buf, 8);
2428 wpabuf_put_u8(buf, (60 / 5) | 0x80);
2429 wpabuf_put_u8(buf, 90 / 5);
2430 wpabuf_put_u8(buf, (120 / 5) | 0x80);
2431 wpabuf_put_u8(buf, 180 / 5);
2432 wpabuf_put_u8(buf, (240 / 5) | 0x80);
2433 wpabuf_put_u8(buf, 360 / 5);
2434 wpabuf_put_u8(buf, 480 / 5);
2435 wpabuf_put_u8(buf, 540 / 5);
2436
2437 if (!rx_freq) {
2438 channel = p2p->cfg->channel;
2439 } else if (p2p_freq_to_channel(rx_freq, &op_class, &channel)) {
2440 p2p_err(p2p, "Failed to convert freq to channel");
2441 return -1;
2442 }
2443
2444 wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
2445 wpabuf_put_u8(buf, 1);
2446 wpabuf_put_u8(buf, channel);
2447
2448 wpabuf_put_buf(buf, ies);
2449
2450 return 0;
2451 }
2452
p2p_service_find_asp(struct p2p_data * p2p,const u8 * hash)2453 static int p2p_service_find_asp(struct p2p_data *p2p, const u8 *hash)
2454 {
2455 struct p2ps_advertisement *adv_data;
2456 int any_wfa;
2457
2458 p2p_dbg(p2p, "ASP find - ASP list: %p", p2p->p2ps_adv_list);
2459
2460 /* Wildcard org.wi-fi.wfds matches any WFA spec defined service */
2461 any_wfa = os_memcmp(hash, p2p->wild_card_hash, P2PS_HASH_LEN) == 0;
2462
2463 adv_data = p2p->p2ps_adv_list;
2464 while (adv_data) {
2465 if (os_memcmp(hash, adv_data->hash, P2PS_HASH_LEN) == 0)
2466 return 1; /* exact hash match */
2467 if (any_wfa &&
2468 os_strncmp(adv_data->svc_name, P2PS_WILD_HASH_STR,
2469 os_strlen(P2PS_WILD_HASH_STR)) == 0)
2470 return 1; /* WFA service match */
2471 adv_data = adv_data->next;
2472 }
2473
2474 return 0;
2475 }
2476
2477
2478 static enum p2p_probe_req_status
p2p_reply_probe(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq)2479 p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2480 const u8 *bssid, const u8 *ie, size_t ie_len,
2481 unsigned int rx_freq)
2482 {
2483 struct ieee802_11_elems elems;
2484 struct wpabuf *buf;
2485 struct p2p_message msg;
2486 struct wpabuf *ies;
2487
2488 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
2489 ParseFailed) {
2490 /* Ignore invalid Probe Request frames */
2491 p2p_dbg(p2p, "Could not parse Probe Request frame - ignore it");
2492 return P2P_PREQ_MALFORMED;
2493 }
2494
2495 if (elems.p2p == NULL) {
2496 /* not a P2P probe - ignore it */
2497 p2p_dbg(p2p, "Not a P2P probe - ignore it");
2498 return P2P_PREQ_NOT_P2P;
2499 }
2500
2501 if (dst && !is_broadcast_ether_addr(dst) &&
2502 !ether_addr_equal(dst, p2p->cfg->dev_addr)) {
2503 /* Not sent to the broadcast address or our P2P Device Address
2504 */
2505 p2p_dbg(p2p, "Probe Req DA " MACSTR " not ours - ignore it",
2506 MAC2STR(dst));
2507 return P2P_PREQ_NOT_PROCESSED;
2508 }
2509
2510 if (bssid && !is_broadcast_ether_addr(bssid)) {
2511 /* Not sent to the Wildcard BSSID */
2512 p2p_dbg(p2p, "Probe Req BSSID " MACSTR " not wildcard - ignore it",
2513 MAC2STR(bssid));
2514 return P2P_PREQ_NOT_PROCESSED;
2515 }
2516
2517 if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
2518 os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
2519 0) {
2520 /* not using P2P Wildcard SSID - ignore */
2521 p2p_dbg(p2p, "Probe Req not using P2P Wildcard SSID - ignore it");
2522 return P2P_PREQ_NOT_PROCESSED;
2523 }
2524
2525 if (supp_rates_11b_only(&elems)) {
2526 /* Indicates support for 11b rates only */
2527 p2p_dbg(p2p, "Probe Req with 11b rates only supported - ignore it");
2528 return P2P_PREQ_NOT_P2P;
2529 }
2530
2531 os_memset(&msg, 0, sizeof(msg));
2532 if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
2533 /* Could not parse P2P attributes */
2534 p2p_dbg(p2p, "Could not parse P2P attributes in Probe Req - ignore it");
2535 return P2P_PREQ_NOT_P2P;
2536 }
2537
2538 if (msg.service_hash && msg.service_hash_count) {
2539 const u8 *hash = msg.service_hash;
2540 u8 i;
2541 int p2ps_svc_found = 0;
2542
2543 p2p_dbg(p2p, "in_listen=%d drv_in_listen=%d when received P2PS Probe Request at %u MHz; own Listen channel %u, pending listen freq %u MHz",
2544 p2p->in_listen, p2p->drv_in_listen, rx_freq,
2545 p2p->cfg->channel, p2p->pending_listen_freq);
2546
2547 if (!p2p->in_listen && !p2p->drv_in_listen &&
2548 p2p->pending_listen_freq && rx_freq &&
2549 rx_freq != p2p->pending_listen_freq) {
2550 p2p_dbg(p2p, "Do not reply to Probe Request frame that was received on %u MHz while waiting to start Listen state on %u MHz",
2551 rx_freq, p2p->pending_listen_freq);
2552 p2p_parse_free(&msg);
2553 return P2P_PREQ_NOT_LISTEN;
2554 }
2555
2556 for (i = 0; i < msg.service_hash_count; i++) {
2557 if (p2p_service_find_asp(p2p, hash)) {
2558 p2p_dbg(p2p, "Service Hash match found: "
2559 MACSTR, MAC2STR(hash));
2560 p2ps_svc_found = 1;
2561 break;
2562 }
2563 hash += P2PS_HASH_LEN;
2564 }
2565
2566 /* Probed hash unknown */
2567 if (!p2ps_svc_found) {
2568 p2p_dbg(p2p, "No Service Hash match found");
2569 p2p_parse_free(&msg);
2570 return P2P_PREQ_NOT_PROCESSED;
2571 }
2572 } else {
2573 /* This is not a P2PS Probe Request */
2574 p2p_dbg(p2p, "No P2PS Hash in Probe Request");
2575
2576 if (!p2p->in_listen || !p2p->drv_in_listen) {
2577 /* not in Listen state - ignore Probe Request */
2578 p2p_dbg(p2p, "Not in Listen state (in_listen=%d drv_in_listen=%d) - ignore Probe Request",
2579 p2p->in_listen, p2p->drv_in_listen);
2580 p2p_parse_free(&msg);
2581 return P2P_PREQ_NOT_LISTEN;
2582 }
2583 }
2584
2585 if (msg.device_id &&
2586 !ether_addr_equal(msg.device_id, p2p->cfg->dev_addr)) {
2587 /* Device ID did not match */
2588 p2p_dbg(p2p, "Probe Req requested Device ID " MACSTR " did not match - ignore it",
2589 MAC2STR(msg.device_id));
2590 p2p_parse_free(&msg);
2591 return P2P_PREQ_NOT_PROCESSED;
2592 }
2593
2594 /* Check Requested Device Type match */
2595 if (msg.wps_attributes &&
2596 !p2p_match_dev_type(p2p, msg.wps_attributes)) {
2597 /* No match with Requested Device Type */
2598 p2p_dbg(p2p, "Probe Req requested Device Type did not match - ignore it");
2599 p2p_parse_free(&msg);
2600 return P2P_PREQ_NOT_PROCESSED;
2601 }
2602
2603 if (!p2p->cfg->send_probe_resp) {
2604 /* Response generated elsewhere */
2605 p2p_dbg(p2p, "Probe Resp generated elsewhere - do not generate additional response");
2606 p2p_parse_free(&msg);
2607 return P2P_PREQ_NOT_PROCESSED;
2608 }
2609
2610 p2p_dbg(p2p, "Reply to P2P Probe Request in Listen state");
2611
2612 /*
2613 * We do not really have a specific BSS that this frame is advertising,
2614 * so build a frame that has some information in valid format. This is
2615 * really only used for discovery purposes, not to learn exact BSS
2616 * parameters.
2617 */
2618 ies = p2p_build_probe_resp_ies(p2p, msg.service_hash,
2619 msg.service_hash_count);
2620 p2p_parse_free(&msg);
2621 if (ies == NULL)
2622 return P2P_PREQ_NOT_PROCESSED;
2623
2624 buf = wpabuf_alloc(200 + wpabuf_len(ies));
2625 if (buf == NULL) {
2626 wpabuf_free(ies);
2627 return P2P_PREQ_NOT_PROCESSED;
2628 }
2629
2630 if (p2p_build_probe_resp_buf(p2p, buf, ies, addr, rx_freq)) {
2631 wpabuf_free(ies);
2632 wpabuf_free(buf);
2633 return P2P_PREQ_NOT_PROCESSED;
2634 }
2635
2636 wpabuf_free(ies);
2637
2638 p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf, rx_freq);
2639
2640 wpabuf_free(buf);
2641
2642 return P2P_PREQ_PROCESSED;
2643 }
2644
2645
2646 enum p2p_probe_req_status
p2p_probe_req_rx(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq,int p2p_lo_started)2647 p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2648 const u8 *bssid, const u8 *ie, size_t ie_len,
2649 unsigned int rx_freq, int p2p_lo_started)
2650 {
2651 enum p2p_probe_req_status res;
2652
2653 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
2654
2655 if (p2p_lo_started) {
2656 p2p_dbg(p2p,
2657 "Probe Response is offloaded, do not reply Probe Request");
2658 return P2P_PREQ_PROCESSED;
2659 }
2660
2661 res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len, rx_freq);
2662 if (res != P2P_PREQ_PROCESSED && res != P2P_PREQ_NOT_PROCESSED)
2663 return res;
2664
2665 /*
2666 * Activate a pending GO Negotiation/Invite flow if a received Probe
2667 * Request frame is from an expected peer. Some devices may share the
2668 * same address for P2P and non-P2P STA running simultaneously. The
2669 * P2P_PREQ_PROCESSED and P2P_PREQ_NOT_PROCESSED p2p_reply_probe()
2670 * return values verified above ensure we are handling a Probe Request
2671 * frame from a P2P peer.
2672 */
2673 if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
2674 p2p->go_neg_peer &&
2675 ether_addr_equal(addr, p2p->go_neg_peer->info.p2p_device_addr) &&
2676 !(p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
2677 /* Received a Probe Request from GO Negotiation peer */
2678 p2p_dbg(p2p, "Found GO Negotiation peer - try to start GO negotiation from timeout");
2679 eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
2680 eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
2681 return res;
2682 }
2683
2684 if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
2685 p2p->invite_peer &&
2686 (p2p->invite_peer->flags & P2P_DEV_WAIT_INV_REQ_ACK) &&
2687 ether_addr_equal(addr, p2p->invite_peer->info.p2p_device_addr)) {
2688 /* Received a Probe Request from Invite peer */
2689 p2p_dbg(p2p, "Found Invite peer - try to start Invite from timeout");
2690 eloop_cancel_timeout(p2p_invite_start, p2p, NULL);
2691 eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
2692 return res;
2693 }
2694
2695 return res;
2696 }
2697
2698
p2p_assoc_req_ie_wlan_ap(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,struct wpabuf * p2p_ie)2699 static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
2700 u8 *buf, size_t len, struct wpabuf *p2p_ie)
2701 {
2702 struct wpabuf *tmp;
2703 u8 *lpos;
2704 size_t tmplen;
2705 int res;
2706 u8 group_capab;
2707 struct p2p_message msg;
2708
2709 if (p2p_ie == NULL)
2710 return 0; /* WLAN AP is not a P2P manager */
2711
2712 os_memset(&msg, 0, sizeof(msg));
2713 if (p2p_parse_p2p_ie(p2p_ie, &msg) < 0)
2714 return 0;
2715
2716 p2p_dbg(p2p, "BSS P2P manageability %s",
2717 msg.manageability ? "enabled" : "disabled");
2718
2719 if (!msg.manageability)
2720 return 0;
2721
2722 /*
2723 * (Re)Association Request - P2P IE
2724 * P2P Capability attribute (shall be present)
2725 * P2P Interface attribute (present if concurrent device and
2726 * P2P Management is enabled)
2727 */
2728 tmp = wpabuf_alloc(200);
2729 if (tmp == NULL)
2730 return -1;
2731
2732 lpos = p2p_buf_add_ie_hdr(tmp);
2733 group_capab = 0;
2734 if (p2p->num_groups > 0) {
2735 group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
2736 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2737 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
2738 p2p->cross_connect)
2739 group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
2740 }
2741 p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
2742 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2743 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
2744 p2p_buf_add_p2p_interface(tmp, p2p);
2745 p2p_buf_update_ie_hdr(tmp, lpos);
2746
2747 tmplen = wpabuf_len(tmp);
2748 if (tmplen > len)
2749 res = -1;
2750 else {
2751 os_memcpy(buf, wpabuf_head(tmp), tmplen);
2752 res = tmplen;
2753 }
2754 wpabuf_free(tmp);
2755
2756 return res;
2757 }
2758
2759
p2p_assoc_req_ie(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,int p2p_group,struct wpabuf * p2p_ie)2760 int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
2761 size_t len, int p2p_group, struct wpabuf *p2p_ie)
2762 {
2763 struct wpabuf *tmp;
2764 u8 *lpos;
2765 struct p2p_device *peer;
2766 size_t tmplen;
2767 int res;
2768 size_t extra = 0;
2769
2770 if (!p2p_group)
2771 return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
2772
2773 #ifdef CONFIG_WIFI_DISPLAY
2774 if (p2p->wfd_ie_assoc_req)
2775 extra = wpabuf_len(p2p->wfd_ie_assoc_req);
2776 #endif /* CONFIG_WIFI_DISPLAY */
2777
2778 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2779 extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2780
2781 /*
2782 * (Re)Association Request - P2P IE
2783 * P2P Capability attribute (shall be present)
2784 * Extended Listen Timing (may be present)
2785 * P2P Device Info attribute (shall be present)
2786 */
2787 tmp = wpabuf_alloc(200 + extra);
2788 if (tmp == NULL)
2789 return -1;
2790
2791 #ifdef CONFIG_WIFI_DISPLAY
2792 if (p2p->wfd_ie_assoc_req)
2793 wpabuf_put_buf(tmp, p2p->wfd_ie_assoc_req);
2794 #endif /* CONFIG_WIFI_DISPLAY */
2795
2796 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2797 wpabuf_put_buf(tmp,
2798 p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2799
2800 peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
2801
2802 lpos = p2p_buf_add_ie_hdr(tmp);
2803 p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
2804 if (p2p->ext_listen_interval)
2805 p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
2806 p2p->ext_listen_interval);
2807 p2p_buf_add_device_info(tmp, p2p, peer);
2808 p2p_buf_update_ie_hdr(tmp, lpos);
2809
2810 tmplen = wpabuf_len(tmp);
2811 if (tmplen > len)
2812 res = -1;
2813 else {
2814 os_memcpy(buf, wpabuf_head(tmp), tmplen);
2815 res = tmplen;
2816 }
2817 wpabuf_free(tmp);
2818
2819 return res;
2820 }
2821
2822
p2p_scan_result_text(const u8 * ies,size_t ies_len,char * buf,char * end)2823 int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
2824 {
2825 struct wpabuf *p2p_ie;
2826 int ret;
2827
2828 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
2829 if (p2p_ie == NULL)
2830 return 0;
2831
2832 ret = p2p_attr_text(p2p_ie, buf, end);
2833 wpabuf_free(p2p_ie);
2834 return ret;
2835 }
2836
2837
2838 struct p2ps_advertisement *
p2p_service_p2ps_id(struct p2p_data * p2p,u32 adv_id)2839 p2p_service_p2ps_id(struct p2p_data *p2p, u32 adv_id)
2840 {
2841 struct p2ps_advertisement *adv_data;
2842
2843 if (!p2p)
2844 return NULL;
2845
2846 adv_data = p2p->p2ps_adv_list;
2847 while (adv_data) {
2848 if (adv_data->id == adv_id)
2849 return adv_data;
2850 adv_data = adv_data->next;
2851 }
2852
2853 return NULL;
2854 }
2855
2856
p2p_service_del_asp(struct p2p_data * p2p,u32 adv_id)2857 int p2p_service_del_asp(struct p2p_data *p2p, u32 adv_id)
2858 {
2859 struct p2ps_advertisement *adv_data;
2860 struct p2ps_advertisement **prior;
2861
2862 if (!p2p)
2863 return -1;
2864
2865 adv_data = p2p->p2ps_adv_list;
2866 prior = &p2p->p2ps_adv_list;
2867 while (adv_data) {
2868 if (adv_data->id == adv_id) {
2869 p2p_dbg(p2p, "Delete ASP adv_id=0x%x", adv_id);
2870 *prior = adv_data->next;
2871 os_free(adv_data);
2872 return 0;
2873 }
2874 prior = &adv_data->next;
2875 adv_data = adv_data->next;
2876 }
2877
2878 return -1;
2879 }
2880
2881
p2p_service_add_asp(struct p2p_data * p2p,int auto_accept,u32 adv_id,const char * adv_str,u8 svc_state,u16 config_methods,const char * svc_info,const u8 * cpt_priority)2882 int p2p_service_add_asp(struct p2p_data *p2p, int auto_accept, u32 adv_id,
2883 const char *adv_str, u8 svc_state, u16 config_methods,
2884 const char *svc_info, const u8 *cpt_priority)
2885 {
2886 struct p2ps_advertisement *adv_data, *tmp, **prev;
2887 u8 buf[P2PS_HASH_LEN];
2888 size_t adv_data_len, adv_len, info_len = 0;
2889 int i;
2890
2891 if (!p2p || !adv_str || !adv_str[0] || !cpt_priority)
2892 return -1;
2893
2894 if (!(config_methods & p2p->cfg->config_methods)) {
2895 p2p_dbg(p2p, "Config methods not supported svc: 0x%x dev: 0x%x",
2896 config_methods, p2p->cfg->config_methods);
2897 return -1;
2898 }
2899
2900 if (!p2ps_gen_hash(p2p, adv_str, buf))
2901 return -1;
2902
2903 if (svc_info)
2904 info_len = os_strlen(svc_info);
2905 adv_len = os_strlen(adv_str);
2906 adv_data_len = sizeof(struct p2ps_advertisement) + adv_len + 1 +
2907 info_len + 1;
2908
2909 adv_data = os_zalloc(adv_data_len);
2910 if (!adv_data)
2911 return -1;
2912
2913 os_memcpy(adv_data->hash, buf, P2PS_HASH_LEN);
2914 adv_data->id = adv_id;
2915 adv_data->state = svc_state;
2916 adv_data->config_methods = config_methods & p2p->cfg->config_methods;
2917 adv_data->auto_accept = (u8) auto_accept;
2918 os_memcpy(adv_data->svc_name, adv_str, adv_len);
2919
2920 for (i = 0; cpt_priority[i] && i < P2PS_FEATURE_CAPAB_CPT_MAX; i++) {
2921 adv_data->cpt_priority[i] = cpt_priority[i];
2922 adv_data->cpt_mask |= cpt_priority[i];
2923 }
2924
2925 if (svc_info && info_len) {
2926 adv_data->svc_info = &adv_data->svc_name[adv_len + 1];
2927 os_memcpy(adv_data->svc_info, svc_info, info_len);
2928 }
2929
2930 /*
2931 * Group Advertisements by service string. They do not need to be
2932 * sorted, but groups allow easier Probe Response instance grouping
2933 */
2934 tmp = p2p->p2ps_adv_list;
2935 prev = &p2p->p2ps_adv_list;
2936 while (tmp) {
2937 if (tmp->id == adv_data->id) {
2938 if (os_strcmp(tmp->svc_name, adv_data->svc_name) != 0) {
2939 os_free(adv_data);
2940 return -1;
2941 }
2942 adv_data->next = tmp->next;
2943 *prev = adv_data;
2944 os_free(tmp);
2945 goto inserted;
2946 } else {
2947 if (os_strcmp(tmp->svc_name, adv_data->svc_name) == 0) {
2948 adv_data->next = tmp->next;
2949 tmp->next = adv_data;
2950 goto inserted;
2951 }
2952 }
2953 prev = &tmp->next;
2954 tmp = tmp->next;
2955 }
2956
2957 /* No svc_name match found */
2958 adv_data->next = p2p->p2ps_adv_list;
2959 p2p->p2ps_adv_list = adv_data;
2960
2961 inserted:
2962 p2p_dbg(p2p,
2963 "Added ASP advertisement adv_id=0x%x config_methods=0x%x svc_state=0x%x adv_str='%s' cpt_mask=0x%x",
2964 adv_id, adv_data->config_methods, svc_state, adv_str,
2965 adv_data->cpt_mask);
2966
2967 return 0;
2968 }
2969
2970
p2p_service_flush_asp(struct p2p_data * p2p)2971 void p2p_service_flush_asp(struct p2p_data *p2p)
2972 {
2973 struct p2ps_advertisement *adv, *prev;
2974
2975 if (!p2p)
2976 return;
2977
2978 adv = p2p->p2ps_adv_list;
2979 while (adv) {
2980 prev = adv;
2981 adv = adv->next;
2982 os_free(prev);
2983 }
2984
2985 p2p->p2ps_adv_list = NULL;
2986 p2ps_prov_free(p2p);
2987 p2p_dbg(p2p, "All ASP advertisements flushed");
2988 }
2989
2990
p2p_parse_dev_addr_in_p2p_ie(struct wpabuf * p2p_ie,u8 * dev_addr)2991 int p2p_parse_dev_addr_in_p2p_ie(struct wpabuf *p2p_ie, u8 *dev_addr)
2992 {
2993 struct p2p_message msg;
2994
2995 os_memset(&msg, 0, sizeof(msg));
2996 if (p2p_parse_p2p_ie(p2p_ie, &msg))
2997 return -1;
2998
2999 if (msg.p2p_device_addr) {
3000 os_memcpy(dev_addr, msg.p2p_device_addr, ETH_ALEN);
3001 return 0;
3002 } else if (msg.device_id) {
3003 os_memcpy(dev_addr, msg.device_id, ETH_ALEN);
3004 return 0;
3005 }
3006 return -1;
3007 }
3008
3009
p2p_parse_dev_addr(const u8 * ies,size_t ies_len,u8 * dev_addr)3010 int p2p_parse_dev_addr(const u8 *ies, size_t ies_len, u8 *dev_addr)
3011 {
3012 struct wpabuf *p2p_ie;
3013 int ret;
3014
3015 p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
3016 P2P_IE_VENDOR_TYPE);
3017 if (p2p_ie == NULL)
3018 return -1;
3019 ret = p2p_parse_dev_addr_in_p2p_ie(p2p_ie, dev_addr);
3020 wpabuf_free(p2p_ie);
3021 return ret;
3022 }
3023
3024
p2p_clear_go_neg(struct p2p_data * p2p)3025 static void p2p_clear_go_neg(struct p2p_data *p2p)
3026 {
3027 p2p->go_neg_peer = NULL;
3028 p2p_clear_timeout(p2p);
3029 p2p_set_state(p2p, P2P_IDLE);
3030 }
3031
3032
p2p_wps_success_cb(struct p2p_data * p2p,const u8 * mac_addr)3033 void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
3034 {
3035 if (p2p->go_neg_peer == NULL) {
3036 p2p_dbg(p2p, "No pending Group Formation - ignore WPS registration success notification");
3037 return; /* No pending Group Formation */
3038 }
3039
3040 if (!ether_addr_equal(mac_addr, p2p->go_neg_peer->intended_addr)) {
3041 p2p_dbg(p2p, "Ignore WPS registration success notification for "
3042 MACSTR " (GO Negotiation peer " MACSTR ")",
3043 MAC2STR(mac_addr),
3044 MAC2STR(p2p->go_neg_peer->intended_addr));
3045 return; /* Ignore unexpected peer address */
3046 }
3047
3048 p2p_dbg(p2p, "Group Formation completed successfully with " MACSTR,
3049 MAC2STR(mac_addr));
3050
3051 p2p_clear_go_neg(p2p);
3052 }
3053
3054
p2p_group_formation_failed(struct p2p_data * p2p)3055 void p2p_group_formation_failed(struct p2p_data *p2p)
3056 {
3057 if (p2p->go_neg_peer == NULL) {
3058 p2p_dbg(p2p, "No pending Group Formation - ignore group formation failure notification");
3059 return; /* No pending Group Formation */
3060 }
3061
3062 p2p_dbg(p2p, "Group Formation failed with " MACSTR,
3063 MAC2STR(p2p->go_neg_peer->intended_addr));
3064
3065 p2p_clear_go_neg(p2p);
3066 }
3067
3068
is_p2p_6ghz_disabled(struct p2p_data * p2p)3069 bool is_p2p_6ghz_disabled(struct p2p_data *p2p)
3070 {
3071 if (p2p)
3072 return p2p->cfg->p2p_6ghz_disable;
3073 return false;
3074 }
3075
3076
is_p2p_dfs_chan_enabled(struct p2p_data * p2p)3077 bool is_p2p_dfs_chan_enabled(struct p2p_data *p2p)
3078 {
3079 if (p2p)
3080 return p2p->cfg->p2p_dfs_chan_enable;
3081 return false;
3082 }
3083
3084
p2p_set_dev_addr(struct p2p_data * p2p,const u8 * addr)3085 void p2p_set_dev_addr(struct p2p_data *p2p, const u8 *addr)
3086 {
3087 if (p2p && addr)
3088 os_memcpy(p2p->cfg->dev_addr, addr, ETH_ALEN);
3089 }
3090
3091
p2p_pairing_info_deinit(struct p2p_data * p2p)3092 static void p2p_pairing_info_deinit(struct p2p_data *p2p)
3093 {
3094 #ifdef CONFIG_PASN
3095 pasn_initiator_pmksa_cache_deinit(p2p->initiator_pmksa);
3096 pasn_responder_pmksa_cache_deinit(p2p->responder_pmksa);
3097 #endif /* CONFIG_PASN */
3098 os_free(p2p->pairing_info);
3099 }
3100
3101
p2p_pairing_info_init(struct p2p_data * p2p)3102 static int p2p_pairing_info_init(struct p2p_data *p2p)
3103 {
3104 struct p2p_pairing_info *pairing_info;
3105
3106 if (p2p->cfg->pairing_config.dik_len > DEVICE_IDENTITY_KEY_MAX_LEN)
3107 return -1;
3108
3109 pairing_info = os_zalloc(sizeof(struct p2p_pairing_info));
3110 if (!pairing_info)
3111 return -1;
3112
3113 pairing_info->enable_pairing_setup =
3114 p2p->cfg->pairing_config.enable_pairing_setup;
3115 pairing_info->enable_pairing_cache =
3116 p2p->cfg->pairing_config.enable_pairing_cache;
3117 pairing_info->supported_bootstrap =
3118 p2p->cfg->pairing_config.bootstrap_methods;
3119
3120 pairing_info->dev_ik.cipher_version =
3121 p2p->cfg->pairing_config.dik_cipher;
3122 pairing_info->dev_ik.dik_len = p2p->cfg->pairing_config.dik_len;
3123 os_memcpy(pairing_info->dev_ik.dik_data,
3124 p2p->cfg->pairing_config.dik_data,
3125 p2p->cfg->pairing_config.dik_len);
3126 pairing_info->dev_ik.expiration = 24; /* hours */
3127
3128 p2p_pairing_info_deinit(p2p);
3129
3130 p2p->pairing_info = pairing_info;
3131 #ifdef CONFIG_PASN
3132 p2p->initiator_pmksa = pasn_initiator_pmksa_cache_init();
3133 p2p->responder_pmksa = pasn_responder_pmksa_cache_init();
3134 #endif /* CONFIG_PASN */
3135
3136 return 0;
3137 }
3138
3139
p2p_init(const struct p2p_config * cfg)3140 struct p2p_data * p2p_init(const struct p2p_config *cfg)
3141 {
3142 struct p2p_data *p2p;
3143
3144 if (cfg->max_peers < 1 ||
3145 cfg->passphrase_len < 8 || cfg->passphrase_len > 63)
3146 return NULL;
3147
3148 p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
3149 if (p2p == NULL)
3150 return NULL;
3151 p2p->cfg = (struct p2p_config *) (p2p + 1);
3152 os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
3153 if (cfg->dev_name)
3154 p2p->cfg->dev_name = os_strdup(cfg->dev_name);
3155 if (cfg->manufacturer)
3156 p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
3157 if (cfg->model_name)
3158 p2p->cfg->model_name = os_strdup(cfg->model_name);
3159 if (cfg->model_number)
3160 p2p->cfg->model_number = os_strdup(cfg->model_number);
3161 if (cfg->serial_number)
3162 p2p->cfg->serial_number = os_strdup(cfg->serial_number);
3163 if (cfg->pref_chan) {
3164 p2p->cfg->pref_chan = os_malloc(cfg->num_pref_chan *
3165 sizeof(struct p2p_channel));
3166 if (p2p->cfg->pref_chan) {
3167 os_memcpy(p2p->cfg->pref_chan, cfg->pref_chan,
3168 cfg->num_pref_chan *
3169 sizeof(struct p2p_channel));
3170 } else
3171 p2p->cfg->num_pref_chan = 0;
3172 }
3173
3174 p2ps_gen_hash(p2p, P2PS_WILD_HASH_STR, p2p->wild_card_hash);
3175
3176 p2p->min_disc_int = 1;
3177 p2p->max_disc_int = 3;
3178 p2p->max_disc_tu = -1;
3179
3180 if (os_get_random(&p2p->next_tie_breaker, 1) < 0)
3181 p2p->next_tie_breaker = 0;
3182 p2p->next_tie_breaker &= 0x01;
3183 if (cfg->sd_request)
3184 p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3185 p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
3186 if (cfg->concurrent_operations)
3187 p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
3188 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3189
3190 dl_list_init(&p2p->devices);
3191
3192 p2p->go_timeout = 100;
3193 p2p->client_timeout = 20;
3194 p2p->num_p2p_sd_queries = 0;
3195 /* Default comeback after one second */
3196 if (!p2p->cfg->comeback_after)
3197 p2p->cfg->comeback_after = 977; /* TUs */
3198 p2p_pairing_info_init(p2p);
3199
3200 p2p_dbg(p2p, "initialized");
3201 p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
3202 p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
3203
3204 return p2p;
3205 }
3206
3207
p2p_deinit(struct p2p_data * p2p)3208 void p2p_deinit(struct p2p_data *p2p)
3209 {
3210 #ifdef CONFIG_WIFI_DISPLAY
3211 wpabuf_free(p2p->wfd_ie_beacon);
3212 wpabuf_free(p2p->wfd_ie_probe_req);
3213 wpabuf_free(p2p->wfd_ie_probe_resp);
3214 wpabuf_free(p2p->wfd_ie_assoc_req);
3215 wpabuf_free(p2p->wfd_ie_invitation);
3216 wpabuf_free(p2p->wfd_ie_prov_disc_req);
3217 wpabuf_free(p2p->wfd_ie_prov_disc_resp);
3218 wpabuf_free(p2p->wfd_ie_go_neg);
3219 wpabuf_free(p2p->wfd_dev_info);
3220 wpabuf_free(p2p->wfd_assoc_bssid);
3221 wpabuf_free(p2p->wfd_coupled_sink_info);
3222 wpabuf_free(p2p->wfd_r2_dev_info);
3223 #endif /* CONFIG_WIFI_DISPLAY */
3224
3225 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3226 eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
3227 eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3228 p2p_flush(p2p);
3229 p2p_free_req_dev_types(p2p);
3230 os_free(p2p->cfg->dev_name);
3231 os_free(p2p->cfg->manufacturer);
3232 os_free(p2p->cfg->model_name);
3233 os_free(p2p->cfg->model_number);
3234 os_free(p2p->cfg->serial_number);
3235 os_free(p2p->cfg->pref_chan);
3236 os_free(p2p->groups);
3237 p2ps_prov_free(p2p);
3238 wpabuf_free(p2p->sd_resp);
3239 p2p_remove_wps_vendor_extensions(p2p);
3240 os_free(p2p->no_go_freq.range);
3241 p2p_service_flush_asp(p2p);
3242 p2p_pairing_info_deinit(p2p);
3243
3244 os_free(p2p);
3245 }
3246
3247
p2p_flush(struct p2p_data * p2p)3248 void p2p_flush(struct p2p_data *p2p)
3249 {
3250 struct p2p_device *dev, *prev;
3251
3252 p2p_ext_listen(p2p, 0, 0);
3253 p2p_stop_find(p2p);
3254 dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
3255 list) {
3256 dl_list_del(&dev->list);
3257 p2p_device_free(p2p, dev);
3258 }
3259 p2p_free_sd_queries(p2p);
3260 p2p->ssid_set = 0;
3261 p2ps_prov_free(p2p);
3262 p2p_reset_pending_pd(p2p);
3263 p2p->override_pref_op_class = 0;
3264 p2p->override_pref_channel = 0;
3265 }
3266
3267
p2p_unauthorize(struct p2p_data * p2p,const u8 * addr)3268 int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
3269 {
3270 struct p2p_device *dev;
3271
3272 dev = p2p_get_device(p2p, addr);
3273 if (dev == NULL)
3274 return -1;
3275
3276 p2p_dbg(p2p, "Unauthorizing " MACSTR, MAC2STR(addr));
3277
3278 if (p2p->go_neg_peer == dev) {
3279 eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3280 p2p->go_neg_peer = NULL;
3281 }
3282
3283 dev->wps_method = WPS_NOT_READY;
3284 dev->oob_pw_id = 0;
3285 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
3286 dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
3287
3288 return 0;
3289 }
3290
3291
p2p_set_dev_name(struct p2p_data * p2p,const char * dev_name)3292 int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
3293 {
3294 os_free(p2p->cfg->dev_name);
3295 if (dev_name) {
3296 p2p->cfg->dev_name = os_strdup(dev_name);
3297 if (p2p->cfg->dev_name == NULL)
3298 return -1;
3299 } else
3300 p2p->cfg->dev_name = NULL;
3301 return 0;
3302 }
3303
3304
p2p_set_manufacturer(struct p2p_data * p2p,const char * manufacturer)3305 int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
3306 {
3307 os_free(p2p->cfg->manufacturer);
3308 p2p->cfg->manufacturer = NULL;
3309 if (manufacturer) {
3310 p2p->cfg->manufacturer = os_strdup(manufacturer);
3311 if (p2p->cfg->manufacturer == NULL)
3312 return -1;
3313 }
3314
3315 return 0;
3316 }
3317
3318
p2p_set_model_name(struct p2p_data * p2p,const char * model_name)3319 int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
3320 {
3321 os_free(p2p->cfg->model_name);
3322 p2p->cfg->model_name = NULL;
3323 if (model_name) {
3324 p2p->cfg->model_name = os_strdup(model_name);
3325 if (p2p->cfg->model_name == NULL)
3326 return -1;
3327 }
3328
3329 return 0;
3330 }
3331
3332
p2p_set_model_number(struct p2p_data * p2p,const char * model_number)3333 int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
3334 {
3335 os_free(p2p->cfg->model_number);
3336 p2p->cfg->model_number = NULL;
3337 if (model_number) {
3338 p2p->cfg->model_number = os_strdup(model_number);
3339 if (p2p->cfg->model_number == NULL)
3340 return -1;
3341 }
3342
3343 return 0;
3344 }
3345
3346
p2p_set_serial_number(struct p2p_data * p2p,const char * serial_number)3347 int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
3348 {
3349 os_free(p2p->cfg->serial_number);
3350 p2p->cfg->serial_number = NULL;
3351 if (serial_number) {
3352 p2p->cfg->serial_number = os_strdup(serial_number);
3353 if (p2p->cfg->serial_number == NULL)
3354 return -1;
3355 }
3356
3357 return 0;
3358 }
3359
3360
p2p_set_config_methods(struct p2p_data * p2p,u16 config_methods)3361 void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
3362 {
3363 p2p->cfg->config_methods = config_methods;
3364 }
3365
3366
p2p_set_uuid(struct p2p_data * p2p,const u8 * uuid)3367 void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
3368 {
3369 os_memcpy(p2p->cfg->uuid, uuid, 16);
3370 }
3371
3372
p2p_set_pri_dev_type(struct p2p_data * p2p,const u8 * pri_dev_type)3373 int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
3374 {
3375 os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
3376 return 0;
3377 }
3378
3379
p2p_set_sec_dev_types(struct p2p_data * p2p,const u8 dev_types[][8],size_t num_dev_types)3380 int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
3381 size_t num_dev_types)
3382 {
3383 if (num_dev_types > P2P_SEC_DEVICE_TYPES)
3384 num_dev_types = P2P_SEC_DEVICE_TYPES;
3385 p2p->cfg->num_sec_dev_types = num_dev_types;
3386 os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
3387 return 0;
3388 }
3389
3390
p2p_remove_wps_vendor_extensions(struct p2p_data * p2p)3391 void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
3392 {
3393 int i;
3394
3395 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3396 wpabuf_free(p2p->wps_vendor_ext[i]);
3397 p2p->wps_vendor_ext[i] = NULL;
3398 }
3399 }
3400
3401
p2p_add_wps_vendor_extension(struct p2p_data * p2p,const struct wpabuf * vendor_ext)3402 int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
3403 const struct wpabuf *vendor_ext)
3404 {
3405 int i;
3406
3407 if (vendor_ext == NULL)
3408 return -1;
3409
3410 for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3411 if (p2p->wps_vendor_ext[i] == NULL)
3412 break;
3413 }
3414 if (i >= P2P_MAX_WPS_VENDOR_EXT)
3415 return -1;
3416
3417 p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
3418 if (p2p->wps_vendor_ext[i] == NULL)
3419 return -1;
3420
3421 return 0;
3422 }
3423
3424
p2p_set_country(struct p2p_data * p2p,const char * country)3425 int p2p_set_country(struct p2p_data *p2p, const char *country)
3426 {
3427 os_memcpy(p2p->cfg->country, country, 3);
3428 return 0;
3429 }
3430
3431
p2p_pre_find_operation(struct p2p_data * p2p,struct p2p_device * dev)3432 static int p2p_pre_find_operation(struct p2p_data *p2p, struct p2p_device *dev)
3433 {
3434 int res;
3435
3436 if (dev->sd_pending_bcast_queries == 0) {
3437 /* Initialize with total number of registered broadcast
3438 * SD queries. */
3439 dev->sd_pending_bcast_queries = p2p->num_p2p_sd_queries;
3440 }
3441
3442 res = p2p_start_sd(p2p, dev);
3443 if (res == -2)
3444 return -2;
3445 if (res == 0)
3446 return 1;
3447
3448 if (dev->req_config_methods &&
3449 !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
3450 p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3451 MACSTR " (config methods 0x%x)",
3452 MAC2STR(dev->info.p2p_device_addr),
3453 dev->req_config_methods);
3454 if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
3455 return 1;
3456 }
3457
3458 return 0;
3459 }
3460
3461
p2p_continue_find(struct p2p_data * p2p)3462 void p2p_continue_find(struct p2p_data *p2p)
3463 {
3464 struct p2p_device *dev;
3465 int found, res;
3466
3467 p2p_set_state(p2p, P2P_SEARCH);
3468
3469 /* Continue from the device following the last iteration */
3470 found = 0;
3471 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3472 if (dev == p2p->last_p2p_find_oper) {
3473 found = 1;
3474 continue;
3475 }
3476 if (!found)
3477 continue;
3478 res = p2p_pre_find_operation(p2p, dev);
3479 if (res > 0) {
3480 p2p->last_p2p_find_oper = dev;
3481 return;
3482 }
3483 if (res == -2)
3484 goto skip_sd;
3485 }
3486
3487 /*
3488 * Wrap around to the beginning of the list and continue until the last
3489 * iteration device.
3490 */
3491 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3492 res = p2p_pre_find_operation(p2p, dev);
3493 if (res > 0) {
3494 p2p->last_p2p_find_oper = dev;
3495 return;
3496 }
3497 if (res == -2)
3498 goto skip_sd;
3499 if (dev == p2p->last_p2p_find_oper)
3500 break;
3501 }
3502
3503 skip_sd:
3504 os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
3505 p2p_listen_in_find(p2p, 1);
3506 }
3507
3508
p2p_sd_query_cb(struct p2p_data * p2p,int success)3509 void p2p_sd_query_cb(struct p2p_data *p2p, int success)
3510 {
3511 p2p_dbg(p2p, "Service Discovery Query TX callback: success=%d",
3512 success);
3513 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3514
3515 if (!success) {
3516 if (p2p->sd_peer) {
3517 if (is_zero_ether_addr(p2p->sd_query_no_ack)) {
3518 os_memcpy(p2p->sd_query_no_ack,
3519 p2p->sd_peer->info.p2p_device_addr,
3520 ETH_ALEN);
3521 p2p_dbg(p2p,
3522 "First SD Query no-ACK in this search iteration: "
3523 MACSTR, MAC2STR(p2p->sd_query_no_ack));
3524 }
3525 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3526 }
3527 p2p->sd_peer = NULL;
3528 if (p2p->state != P2P_IDLE)
3529 p2p_continue_find(p2p);
3530 return;
3531 }
3532
3533 if (p2p->sd_peer == NULL) {
3534 p2p_dbg(p2p, "No SD peer entry known");
3535 if (p2p->state != P2P_IDLE)
3536 p2p_continue_find(p2p);
3537 return;
3538 }
3539
3540 if (p2p->sd_query && p2p->sd_query->for_all_peers) {
3541 /* Update the pending broadcast SD query count for this device
3542 */
3543 p2p->sd_peer->sd_pending_bcast_queries--;
3544
3545 /*
3546 * If there are no pending broadcast queries for this device,
3547 * mark it as done (-1).
3548 */
3549 if (p2p->sd_peer->sd_pending_bcast_queries == 0)
3550 p2p->sd_peer->sd_pending_bcast_queries = -1;
3551 }
3552
3553 /* Wait for response from the peer */
3554 p2p_set_state(p2p, P2P_SD_DURING_FIND);
3555 p2p_set_timeout(p2p, 0, 200000);
3556 }
3557
3558
3559 /**
3560 * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
3561 * @p2p: P2P module context from p2p_init()
3562 */
p2p_retry_pd(struct p2p_data * p2p)3563 static void p2p_retry_pd(struct p2p_data *p2p)
3564 {
3565 struct p2p_device *dev;
3566
3567 /*
3568 * Retry the prov disc req attempt only for the peer that the user had
3569 * requested.
3570 */
3571
3572 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3573 if (!ether_addr_equal(p2p->pending_pd_devaddr,
3574 dev->info.p2p_device_addr))
3575 continue;
3576 if (!dev->req_config_methods && !dev->req_bootstrap_method)
3577 continue;
3578
3579 p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3580 MACSTR " (config methods 0x%x)",
3581 MAC2STR(dev->info.p2p_device_addr),
3582 dev->req_config_methods);
3583 p2p_send_prov_disc_req(p2p, dev,
3584 dev->flags & P2P_DEV_PD_FOR_JOIN,
3585 p2p->pd_force_freq);
3586 return;
3587 }
3588 }
3589
3590
p2p_prov_disc_cb(struct p2p_data * p2p,int success)3591 static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
3592 {
3593 p2p_dbg(p2p, "Provision Discovery Request TX callback: success=%d",
3594 success);
3595
3596 /*
3597 * Postpone resetting the pending action state till after we actually
3598 * time out. This allows us to take some action like notifying any
3599 * interested parties about no response to the request.
3600 *
3601 * When the timer (below) goes off we check in IDLE, SEARCH, or
3602 * LISTEN_ONLY state, which are the only allowed states to issue a PD
3603 * requests in, if this was still pending and then raise notification.
3604 */
3605
3606 if (!success) {
3607 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3608
3609 if (p2p->user_initiated_pd &&
3610 (p2p->state == P2P_SEARCH || p2p->state == P2P_LISTEN_ONLY))
3611 {
3612 /* Retry request from timeout to avoid busy loops */
3613 p2p->pending_action_state = P2P_PENDING_PD;
3614 p2p_set_timeout(p2p, 0, 50000);
3615 } else if (p2p->state != P2P_IDLE)
3616 p2p_continue_find(p2p);
3617 else if (p2p->user_initiated_pd) {
3618 p2p->pending_action_state = P2P_PENDING_PD;
3619 p2p_set_timeout(p2p, 0, 300000);
3620 }
3621 return;
3622 }
3623
3624 /*
3625 * If after PD Request the peer doesn't expect to receive PD Response
3626 * the PD Request ACK indicates a completion of the current PD. This
3627 * happens only on the advertiser side sending the follow-on PD Request
3628 * with the status different than 12 (Success: accepted by user).
3629 */
3630 if (p2p->p2ps_prov && !p2p->p2ps_prov->pd_seeker &&
3631 p2p->p2ps_prov->status != P2P_SC_SUCCESS_DEFERRED) {
3632 p2p_dbg(p2p, "P2PS PD completion on Follow-on PD Request ACK");
3633
3634 if (p2p->send_action_in_progress) {
3635 p2p->send_action_in_progress = 0;
3636 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3637 }
3638
3639 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3640
3641 if (p2p->cfg->p2ps_prov_complete) {
3642 p2p->cfg->p2ps_prov_complete(
3643 p2p->cfg->cb_ctx,
3644 p2p->p2ps_prov->status,
3645 p2p->p2ps_prov->adv_mac,
3646 p2p->p2ps_prov->adv_mac,
3647 p2p->p2ps_prov->session_mac,
3648 NULL, p2p->p2ps_prov->adv_id,
3649 p2p->p2ps_prov->session_id,
3650 0, 0, NULL, 0, 0, 0,
3651 NULL, NULL, 0, 0, NULL, 0);
3652 }
3653
3654 if (p2p->user_initiated_pd)
3655 p2p_reset_pending_pd(p2p);
3656
3657 p2ps_prov_free(p2p);
3658 return;
3659 }
3660
3661 /*
3662 * This postponing, of resetting pending_action_state, needs to be
3663 * done only for user initiated PD requests and not internal ones.
3664 */
3665 if (p2p->user_initiated_pd)
3666 p2p->pending_action_state = P2P_PENDING_PD;
3667 else
3668 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3669
3670 /* Wait for response from the peer */
3671 if (p2p->state == P2P_SEARCH)
3672 p2p_set_state(p2p, P2P_PD_DURING_FIND);
3673 p2p_set_timeout(p2p, 0, 200000);
3674 }
3675
3676
p2p_prov_disc_resp_cb(struct p2p_data * p2p,int success)3677 static void p2p_prov_disc_resp_cb(struct p2p_data *p2p, int success)
3678 {
3679 p2p_dbg(p2p, "Provision Discovery Response TX callback: success=%d",
3680 success);
3681
3682 if (p2p->send_action_in_progress) {
3683 p2p->send_action_in_progress = 0;
3684 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3685 }
3686
3687 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3688
3689 if (!success) {
3690 if (p2p->state == P2P_SEARCH)
3691 p2p_continue_find(p2p);
3692 return;
3693 }
3694
3695 if (!p2p->cfg->prov_disc_resp_cb ||
3696 p2p->cfg->prov_disc_resp_cb(p2p->cfg->cb_ctx) < 1) {
3697 if (p2p->state == P2P_SEARCH)
3698 p2p_continue_find(p2p);
3699 return;
3700 }
3701
3702 p2p_dbg(p2p,
3703 "Post-Provision Discovery operations started - do not try to continue other P2P operations");
3704 }
3705
3706
p2p_scan_res_handler(struct p2p_data * p2p,const u8 * bssid,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len)3707 int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
3708 struct os_reltime *rx_time, int level, const u8 *ies,
3709 size_t ies_len)
3710 {
3711 if (os_reltime_before(rx_time, &p2p->find_start)) {
3712 /*
3713 * The driver may have cached (e.g., in cfg80211 BSS table) the
3714 * scan results for relatively long time. To avoid reporting
3715 * stale information, update P2P peers only based on results
3716 * that have based on frames received after the last p2p_find
3717 * operation was started.
3718 */
3719 p2p_dbg(p2p, "Ignore old scan result for " MACSTR
3720 " (rx_time=%u.%06u find_start=%u.%06u)",
3721 MAC2STR(bssid), (unsigned int) rx_time->sec,
3722 (unsigned int) rx_time->usec,
3723 (unsigned int) p2p->find_start.sec,
3724 (unsigned int) p2p->find_start.usec);
3725 return 0;
3726 }
3727
3728 p2p_add_device(p2p, bssid, freq, rx_time, level, ies, ies_len, 1);
3729
3730 return 0;
3731 }
3732
3733
p2p_scan_res_handled(struct p2p_data * p2p,unsigned int delay)3734 void p2p_scan_res_handled(struct p2p_data *p2p, unsigned int delay)
3735 {
3736 if (!p2p->p2p_scan_running) {
3737 p2p_dbg(p2p, "p2p_scan was not running, but scan results received");
3738 }
3739 p2p->p2p_scan_running = 0;
3740
3741 /* Use this delay only when p2p_find doesn't set it */
3742 if (!p2p->search_delay)
3743 p2p->search_delay = delay;
3744
3745 eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3746
3747 if (p2p_run_after_scan(p2p))
3748 return;
3749 if (p2p->state == P2P_SEARCH)
3750 p2p_continue_find(p2p);
3751 }
3752
3753
p2p_scan_ie(struct p2p_data * p2p,struct wpabuf * ies,const u8 * dev_id,unsigned int bands)3754 void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id,
3755 unsigned int bands)
3756 {
3757 u8 dev_capab;
3758 u8 *len;
3759
3760 #ifdef CONFIG_WIFI_DISPLAY
3761 if (p2p->wfd_ie_probe_req)
3762 wpabuf_put_buf(ies, p2p->wfd_ie_probe_req);
3763 #endif /* CONFIG_WIFI_DISPLAY */
3764
3765 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3766 wpabuf_put_buf(ies,
3767 p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3768
3769 len = p2p_buf_add_ie_hdr(ies);
3770
3771 dev_capab = p2p->dev_capab & ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3772
3773 /* P2PS requires Probe Request frames to include SD bit */
3774 if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3775 dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3776
3777 p2p_buf_add_capability(ies, dev_capab, 0);
3778
3779 if (dev_id)
3780 p2p_buf_add_device_id(ies, dev_id);
3781 if (p2p->cfg->reg_class && p2p->cfg->channel)
3782 p2p_buf_add_listen_channel(ies, p2p->cfg->country,
3783 p2p->cfg->reg_class,
3784 p2p->cfg->channel);
3785 if (p2p->ext_listen_interval)
3786 p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
3787 p2p->ext_listen_interval);
3788
3789 if (bands & BAND_60_GHZ)
3790 p2p_buf_add_device_info(ies, p2p, NULL);
3791
3792 if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3793 p2p_buf_add_service_hash(ies, p2p);
3794
3795 /* TODO: p2p_buf_add_operating_channel() if GO */
3796 p2p_buf_update_ie_hdr(ies, len);
3797 }
3798
3799
p2p_scan_ie_buf_len(struct p2p_data * p2p)3800 size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
3801 {
3802 size_t len = 100;
3803
3804 #ifdef CONFIG_WIFI_DISPLAY
3805 if (p2p && p2p->wfd_ie_probe_req)
3806 len += wpabuf_len(p2p->wfd_ie_probe_req);
3807 #endif /* CONFIG_WIFI_DISPLAY */
3808
3809 if (p2p && p2p->vendor_elem &&
3810 p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3811 len += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3812
3813 return len;
3814 }
3815
3816
p2p_ie_text(struct wpabuf * p2p_ie,char * buf,char * end)3817 int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
3818 {
3819 return p2p_attr_text(p2p_ie, buf, end);
3820 }
3821
3822
p2p_go_neg_req_cb(struct p2p_data * p2p,int success)3823 static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
3824 {
3825 struct p2p_device *dev = p2p->go_neg_peer;
3826 int timeout;
3827
3828 p2p_dbg(p2p, "GO Negotiation Request TX callback: success=%d", success);
3829
3830 if (dev == NULL) {
3831 p2p_dbg(p2p, "No pending GO Negotiation");
3832 return;
3833 }
3834
3835 if (success) {
3836 if (dev->flags & P2P_DEV_USER_REJECTED) {
3837 p2p_set_state(p2p, P2P_IDLE);
3838 return;
3839 }
3840 } else if (dev->go_neg_req_sent) {
3841 /* Cancel the increment from p2p_connect_send() on failure */
3842 dev->go_neg_req_sent--;
3843 }
3844
3845 if (!success &&
3846 (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
3847 !is_zero_ether_addr(dev->member_in_go_dev)) {
3848 p2p_dbg(p2p, "Peer " MACSTR " did not acknowledge request - try to use device discoverability through its GO",
3849 MAC2STR(dev->info.p2p_device_addr));
3850 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3851 p2p_send_dev_disc_req(p2p, dev);
3852 return;
3853 }
3854
3855 /*
3856 * Use P2P find, if needed, to find the other device from its listen
3857 * channel.
3858 */
3859 p2p_set_state(p2p, P2P_CONNECT);
3860 timeout = success ? 500000 : 100000;
3861 if (!success && p2p->go_neg_peer &&
3862 (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE)) {
3863 unsigned int r;
3864 /*
3865 * Peer is expected to wait our response and we will skip the
3866 * listen phase. Add some randomness to the wait time here to
3867 * make it less likely to hit cases where we could end up in
3868 * sync with peer not listening.
3869 */
3870 if (os_get_random((u8 *) &r, sizeof(r)) < 0)
3871 r = 0;
3872 timeout += r % 100000;
3873 }
3874 p2p_set_timeout(p2p, 0, timeout);
3875 }
3876
3877
p2p_go_neg_resp_cb(struct p2p_data * p2p,int success)3878 static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
3879 {
3880 p2p_dbg(p2p, "GO Negotiation Response TX callback: success=%d",
3881 success);
3882 if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
3883 p2p_dbg(p2p, "Ignore TX callback event - GO Negotiation is not running anymore");
3884 return;
3885 }
3886 p2p_set_state(p2p, P2P_CONNECT);
3887 p2p_set_timeout(p2p, 0, 500000);
3888 }
3889
3890
p2p_go_neg_resp_failure_cb(struct p2p_data * p2p,int success,const u8 * addr)3891 static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success,
3892 const u8 *addr)
3893 {
3894 p2p_dbg(p2p, "GO Negotiation Response (failure) TX callback: success=%d", success);
3895 if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
3896 p2p_go_neg_failed(p2p, p2p->go_neg_peer->status);
3897 return;
3898 }
3899
3900 if (success) {
3901 struct p2p_device *dev;
3902 dev = p2p_get_device(p2p, addr);
3903 if (dev &&
3904 dev->status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
3905 dev->flags |= P2P_DEV_PEER_WAITING_RESPONSE;
3906 }
3907
3908 if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
3909 p2p_continue_find(p2p);
3910 }
3911
3912
p2p_go_neg_conf_cb(struct p2p_data * p2p,enum p2p_send_action_result result)3913 static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
3914 enum p2p_send_action_result result)
3915 {
3916 struct p2p_device *dev;
3917
3918 p2p_dbg(p2p, "GO Negotiation Confirm TX callback: result=%d", result);
3919 if (result == P2P_SEND_ACTION_FAILED) {
3920 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3921 p2p_go_neg_failed(p2p, -1);
3922 return;
3923 }
3924
3925 dev = p2p->go_neg_peer;
3926
3927 if (result == P2P_SEND_ACTION_NO_ACK) {
3928 /*
3929 * Retry GO Negotiation Confirmation
3930 * P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if we did not receive
3931 * ACK for confirmation.
3932 */
3933 if (dev && dev->go_neg_conf &&
3934 dev->go_neg_conf_sent <= P2P_GO_NEG_CNF_MAX_RETRY_COUNT) {
3935 p2p_dbg(p2p, "GO Negotiation Confirm retry %d",
3936 dev->go_neg_conf_sent);
3937 p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
3938 if (p2p_send_action(p2p, dev->go_neg_conf_freq,
3939 dev->info.p2p_device_addr,
3940 p2p->cfg->dev_addr,
3941 dev->info.p2p_device_addr,
3942 wpabuf_head(dev->go_neg_conf),
3943 wpabuf_len(dev->go_neg_conf), 0) >=
3944 0) {
3945 dev->go_neg_conf_sent++;
3946 return;
3947 }
3948 p2p_dbg(p2p, "Failed to re-send Action frame");
3949
3950 /*
3951 * Continue with the assumption that the first attempt
3952 * went through and just the ACK frame was lost.
3953 */
3954 }
3955
3956 /*
3957 * It looks like the TX status for GO Negotiation Confirm is
3958 * often showing failure even when the peer has actually
3959 * received the frame. Since the peer may change channels
3960 * immediately after having received the frame, we may not see
3961 * an Ack for retries, so just dropping a single frame may
3962 * trigger this. To allow the group formation to succeed if the
3963 * peer did indeed receive the frame, continue regardless of
3964 * the TX status.
3965 */
3966 p2p_dbg(p2p, "Assume GO Negotiation Confirm TX was actually received by the peer even though Ack was not reported");
3967 }
3968
3969 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3970
3971 if (dev == NULL)
3972 return;
3973
3974 p2p_go_complete(p2p, dev);
3975 }
3976
3977
p2p_send_action_cb(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,enum p2p_send_action_result result)3978 void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3979 const u8 *src, const u8 *bssid,
3980 enum p2p_send_action_result result)
3981 {
3982 enum p2p_pending_action_state state;
3983 int success;
3984
3985 p2p_dbg(p2p, "Action frame TX callback (state=%d freq=%u dst=" MACSTR
3986 " src=" MACSTR " bssid=" MACSTR " result=%d p2p_state=%s)",
3987 p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
3988 MAC2STR(bssid), result, p2p_state_txt(p2p->state));
3989 success = result == P2P_SEND_ACTION_SUCCESS;
3990 state = p2p->pending_action_state;
3991 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3992 switch (state) {
3993 case P2P_NO_PENDING_ACTION:
3994 if (p2p->send_action_in_progress) {
3995 p2p->send_action_in_progress = 0;
3996 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3997 }
3998 break;
3999 case P2P_PENDING_GO_NEG_REQUEST:
4000 p2p_go_neg_req_cb(p2p, success);
4001 break;
4002 case P2P_PENDING_GO_NEG_RESPONSE:
4003 p2p_go_neg_resp_cb(p2p, success);
4004 break;
4005 case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
4006 p2p_go_neg_resp_failure_cb(p2p, success, dst);
4007 break;
4008 case P2P_PENDING_GO_NEG_CONFIRM:
4009 p2p_go_neg_conf_cb(p2p, result);
4010 break;
4011 case P2P_PENDING_SD:
4012 p2p_sd_query_cb(p2p, success);
4013 break;
4014 case P2P_PENDING_PD:
4015 p2p_prov_disc_cb(p2p, success);
4016 break;
4017 case P2P_PENDING_PD_RESPONSE:
4018 p2p_prov_disc_resp_cb(p2p, success);
4019 break;
4020 case P2P_PENDING_INVITATION_REQUEST:
4021 p2p_invitation_req_cb(p2p, success);
4022 break;
4023 case P2P_PENDING_INVITATION_RESPONSE:
4024 p2p_invitation_resp_cb(p2p, dst, success);
4025 break;
4026 case P2P_PENDING_DEV_DISC_REQUEST:
4027 p2p_dev_disc_req_cb(p2p, success);
4028 break;
4029 case P2P_PENDING_DEV_DISC_RESPONSE:
4030 p2p_dev_disc_resp_cb(p2p, success);
4031 break;
4032 case P2P_PENDING_GO_DISC_REQ:
4033 p2p_go_disc_req_cb(p2p, success);
4034 break;
4035 }
4036 }
4037
4038
p2p_listen_cb(struct p2p_data * p2p,unsigned int freq,unsigned int duration)4039 void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
4040 unsigned int duration)
4041 {
4042 if (freq == p2p->pending_client_disc_freq) {
4043 p2p_dbg(p2p, "Client discoverability remain-awake completed");
4044 p2p->pending_client_disc_freq = 0;
4045 return;
4046 }
4047
4048 if (freq != p2p->pending_listen_freq) {
4049 p2p_dbg(p2p, "Unexpected listen callback for freq=%u duration=%u (pending_listen_freq=%u)",
4050 freq, duration, p2p->pending_listen_freq);
4051 return;
4052 }
4053
4054 p2p_dbg(p2p, "Starting Listen timeout(%u,%u) on freq=%u based on callback",
4055 p2p->pending_listen_sec, p2p->pending_listen_usec,
4056 p2p->pending_listen_freq);
4057 p2p->pending_listen_wait_drv = false;
4058 p2p->in_listen = 1;
4059 p2p->drv_in_listen = freq;
4060 if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
4061 /*
4062 * Add 20 msec extra wait to avoid race condition with driver
4063 * remain-on-channel end event, i.e., give driver more time to
4064 * complete the operation before our timeout expires.
4065 */
4066 p2p_set_timeout(p2p, p2p->pending_listen_sec,
4067 p2p->pending_listen_usec + 20000);
4068 }
4069
4070 p2p->pending_listen_freq = 0;
4071 }
4072
4073
p2p_listen_end(struct p2p_data * p2p,unsigned int freq)4074 int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
4075 {
4076 p2p_dbg(p2p, "Driver ended Listen state (freq=%u)", freq);
4077 p2p->drv_in_listen = 0;
4078 if (p2p->in_listen)
4079 return 0; /* Internal timeout will trigger the next step */
4080
4081 if (p2p->state == P2P_WAIT_PEER_CONNECT && p2p->go_neg_peer &&
4082 p2p->pending_listen_freq) {
4083 /*
4084 * Better wait a bit if the driver is unable to start
4085 * offchannel operation for some reason to continue with
4086 * P2P_WAIT_PEER_(IDLE/CONNECT) state transitions.
4087 */
4088 p2p_dbg(p2p,
4089 "Listen operation did not seem to start - delay idle phase to avoid busy loop");
4090 p2p_set_timeout(p2p, 0, 100000);
4091 return 1;
4092 }
4093
4094 if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
4095 if (p2p->go_neg_peer->connect_reqs >= 120) {
4096 p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4097 p2p_go_neg_failed(p2p, -1);
4098 return 0;
4099 }
4100
4101 p2p_set_state(p2p, P2P_CONNECT);
4102 p2p_connect_send(p2p, p2p->go_neg_peer);
4103 return 1;
4104 } else if (p2p->state == P2P_SEARCH) {
4105 if (p2p->p2p_scan_running) {
4106 /*
4107 * Search is already in progress. This can happen if
4108 * an Action frame RX is reported immediately after
4109 * the end of a remain-on-channel operation and the
4110 * response frame to that is sent using an offchannel
4111 * operation while in p2p_find. Avoid an attempt to
4112 * restart a scan here.
4113 */
4114 p2p_dbg(p2p, "p2p_scan already in progress - do not try to start a new one");
4115 return 1;
4116 }
4117 if (p2p->pending_listen_freq) {
4118 /*
4119 * Better wait a bit if the driver is unable to start
4120 * offchannel operation for some reason. p2p_search()
4121 * will be started from internal timeout.
4122 */
4123 p2p_dbg(p2p, "Listen operation did not seem to start - delay search phase to avoid busy loop");
4124 p2p_set_timeout(p2p, 0, 100000);
4125 return 1;
4126 }
4127 if (p2p->search_delay) {
4128 p2p_dbg(p2p, "Delay search operation by %u ms",
4129 p2p->search_delay);
4130 p2p_set_timeout(p2p, p2p->search_delay / 1000,
4131 (p2p->search_delay % 1000) * 1000);
4132 return 1;
4133 }
4134 p2p_search(p2p);
4135 return 1;
4136 }
4137
4138 return 0;
4139 }
4140
4141
p2p_listen_failed(struct p2p_data * p2p,unsigned int freq)4142 void p2p_listen_failed(struct p2p_data *p2p, unsigned int freq)
4143 {
4144 if (freq != p2p->pending_listen_freq) {
4145 p2p_dbg(p2p,
4146 "Unexpected listen failed callback for freq=%u (pending_listen_freq=%u)",
4147 freq, p2p->pending_listen_freq);
4148 return;
4149 }
4150
4151 p2p_dbg(p2p, "Listen failed on freq=%u", freq);
4152 p2p->pending_listen_freq = 0;
4153 }
4154
4155
p2p_timeout_connect(struct p2p_data * p2p)4156 static void p2p_timeout_connect(struct p2p_data *p2p)
4157 {
4158 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4159 if (p2p->go_neg_peer &&
4160 (p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
4161 p2p_dbg(p2p, "Wait for GO Negotiation Confirm timed out - assume GO Negotiation failed");
4162 p2p_go_neg_failed(p2p, -1);
4163 return;
4164 }
4165 if (p2p->go_neg_peer &&
4166 (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE) &&
4167 p2p->go_neg_peer->connect_reqs < 120) {
4168 p2p_dbg(p2p, "Peer expected to wait our response - skip listen");
4169 p2p_connect_send(p2p, p2p->go_neg_peer);
4170 return;
4171 }
4172 if (p2p->go_neg_peer && p2p->go_neg_peer->oob_go_neg_freq > 0) {
4173 p2p_dbg(p2p, "Skip connect-listen since GO Neg channel known (OOB)");
4174 p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4175 p2p_set_timeout(p2p, 0, 30000);
4176 return;
4177 }
4178 p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4179 p2p_listen_in_find(p2p, 0);
4180 }
4181
4182
p2p_timeout_connect_listen(struct p2p_data * p2p)4183 static void p2p_timeout_connect_listen(struct p2p_data *p2p)
4184 {
4185 if (p2p->go_neg_peer) {
4186 if (p2p->drv_in_listen) {
4187 p2p_dbg(p2p, "Driver is still in Listen state; wait for it to complete");
4188 return;
4189 }
4190
4191 if (p2p->go_neg_peer->connect_reqs >= 120) {
4192 p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4193 p2p_go_neg_failed(p2p, -1);
4194 return;
4195 }
4196
4197 p2p_set_state(p2p, P2P_CONNECT);
4198 p2p_connect_send(p2p, p2p->go_neg_peer);
4199 } else
4200 p2p_set_state(p2p, P2P_IDLE);
4201 }
4202
4203
p2p_timeout_wait_peer_connect(struct p2p_data * p2p)4204 static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
4205 {
4206 p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
4207
4208 if (p2p->cfg->is_concurrent_session_active &&
4209 p2p->cfg->is_concurrent_session_active(p2p->cfg->cb_ctx))
4210 p2p_set_timeout(p2p, 0, 500000);
4211 else
4212 p2p_set_timeout(p2p, 0, 200000);
4213 }
4214
4215
p2p_timeout_wait_peer_idle(struct p2p_data * p2p)4216 static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
4217 {
4218 struct p2p_device *dev = p2p->go_neg_peer;
4219
4220 if (dev == NULL) {
4221 p2p_dbg(p2p, "Unknown GO Neg peer - stop GO Neg wait");
4222 return;
4223 }
4224
4225 p2p_dbg(p2p, "Go to Listen state while waiting for the peer to become ready for GO Negotiation");
4226 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4227 p2p->pending_listen_wait_drv = false;
4228 if (p2p->pending_listen_freq) {
4229 p2p_dbg(p2p, "Clear pending_listen_freq for %s", __func__);
4230 p2p->pending_listen_freq = 0;
4231 }
4232 p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
4233 p2p_listen_in_find(p2p, 0);
4234 }
4235
4236
p2p_timeout_sd_during_find(struct p2p_data * p2p)4237 static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
4238 {
4239 p2p_dbg(p2p, "Service Discovery Query timeout");
4240 if (p2p->sd_peer) {
4241 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4242 p2p->sd_peer = NULL;
4243 }
4244 p2p_continue_find(p2p);
4245 }
4246
4247
p2p_timeout_prov_disc_during_find(struct p2p_data * p2p)4248 static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
4249 {
4250 p2p_dbg(p2p, "Provision Discovery Request timeout");
4251 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4252 p2p_continue_find(p2p);
4253 }
4254
4255
p2p_timeout_prov_disc_req(struct p2p_data * p2p)4256 static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
4257 {
4258 u32 adv_id = 0;
4259 u8 *adv_mac = NULL;
4260
4261 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4262
4263 /*
4264 * For user initiated PD requests that we have not gotten any responses
4265 * for while in IDLE state, we retry them a couple of times before
4266 * giving up.
4267 */
4268 if (!p2p->user_initiated_pd)
4269 return;
4270
4271 p2p_dbg(p2p, "User initiated Provision Discovery Request timeout");
4272
4273 if (p2p->pd_retries) {
4274 p2p->pd_retries--;
4275 p2p_retry_pd(p2p);
4276 } else {
4277 struct p2p_device *dev;
4278 int for_join = 0;
4279
4280 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
4281 if (!ether_addr_equal(p2p->pending_pd_devaddr,
4282 dev->info.p2p_device_addr))
4283 continue;
4284 if (dev->req_config_methods &&
4285 (dev->flags & P2P_DEV_PD_FOR_JOIN))
4286 for_join = 1;
4287 }
4288
4289 if (p2p->p2ps_prov) {
4290 adv_id = p2p->p2ps_prov->adv_id;
4291 adv_mac = p2p->p2ps_prov->adv_mac;
4292 }
4293
4294 if (p2p->cfg->prov_disc_fail)
4295 p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
4296 p2p->pending_pd_devaddr,
4297 for_join ?
4298 P2P_PROV_DISC_TIMEOUT_JOIN :
4299 P2P_PROV_DISC_TIMEOUT,
4300 adv_id, adv_mac, NULL);
4301 p2p_reset_pending_pd(p2p);
4302 }
4303 }
4304
4305
p2p_timeout_invite(struct p2p_data * p2p)4306 static void p2p_timeout_invite(struct p2p_data *p2p)
4307 {
4308 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4309 p2p_set_state(p2p, P2P_INVITE_LISTEN);
4310 if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
4311 /*
4312 * Better remain on operating channel instead of listen channel
4313 * when running a group.
4314 * Wait 120 ms to let the P2P GO to send its beacon on the
4315 * intended TBTT.
4316 */
4317 p2p_dbg(p2p, "Inviting in active GO role - wait on operating channel");
4318 p2p_set_timeout(p2p, 0, 120000);
4319 return;
4320 }
4321 p2p_listen_in_find(p2p, 0);
4322 }
4323
4324
p2p_timeout_invite_listen(struct p2p_data * p2p)4325 static void p2p_timeout_invite_listen(struct p2p_data *p2p)
4326 {
4327 if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
4328 p2p_set_state(p2p, P2P_INVITE);
4329 p2p_invite_send(p2p, p2p->invite_peer,
4330 p2p->invite_go_dev_addr, p2p->invite_dev_pw_id);
4331 } else {
4332 if (p2p->invite_peer) {
4333 p2p_dbg(p2p, "Invitation Request retry limit reached");
4334 if (p2p->cfg->invitation_result)
4335 p2p->cfg->invitation_result(
4336 p2p->cfg->cb_ctx, -1, NULL, 0, NULL,
4337 NULL,
4338 p2p->invite_peer->info.p2p_device_addr,
4339 0, 0, NULL, NULL, 0,
4340 p2p->invite_go_dev_addr);
4341 }
4342 p2p_set_state(p2p, P2P_IDLE);
4343 }
4344 }
4345
4346
p2p_state_timeout(void * eloop_ctx,void * timeout_ctx)4347 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
4348 {
4349 struct p2p_data *p2p = eloop_ctx;
4350
4351 p2p_dbg(p2p, "Timeout (state=%s)", p2p_state_txt(p2p->state));
4352
4353 p2p->in_listen = 0;
4354 if (p2p->drv_in_listen) {
4355 p2p_dbg(p2p, "Driver is still in listen state - stop it");
4356 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4357 p2p->pending_listen_wait_drv = false;
4358 }
4359
4360 switch (p2p->state) {
4361 case P2P_IDLE:
4362 /* Check if we timed out waiting for PD req */
4363 if (p2p->pending_action_state == P2P_PENDING_PD)
4364 p2p_timeout_prov_disc_req(p2p);
4365 break;
4366 case P2P_SEARCH:
4367 /* Check if we timed out waiting for PD req */
4368 if (p2p->pending_action_state == P2P_PENDING_PD)
4369 p2p_timeout_prov_disc_req(p2p);
4370 if (p2p->search_delay && !p2p->in_search_delay) {
4371 p2p_dbg(p2p, "Delay search operation by %u ms",
4372 p2p->search_delay);
4373 p2p->in_search_delay = 1;
4374 p2p_set_timeout(p2p, p2p->search_delay / 1000,
4375 (p2p->search_delay % 1000) * 1000);
4376 break;
4377 }
4378 p2p->in_search_delay = 0;
4379 p2p_search(p2p);
4380 break;
4381 case P2P_CONNECT:
4382 p2p_timeout_connect(p2p);
4383 break;
4384 case P2P_CONNECT_LISTEN:
4385 p2p_timeout_connect_listen(p2p);
4386 break;
4387 case P2P_GO_NEG:
4388 break;
4389 case P2P_LISTEN_ONLY:
4390 /* Check if we timed out waiting for PD req */
4391 if (p2p->pending_action_state == P2P_PENDING_PD)
4392 p2p_timeout_prov_disc_req(p2p);
4393
4394 if (p2p->ext_listen_only) {
4395 p2p_dbg(p2p, "Extended Listen Timing - Listen State completed");
4396 p2p->ext_listen_only = 0;
4397 p2p_set_state(p2p, P2P_IDLE);
4398 }
4399 break;
4400 case P2P_WAIT_PEER_CONNECT:
4401 p2p_timeout_wait_peer_connect(p2p);
4402 break;
4403 case P2P_WAIT_PEER_IDLE:
4404 p2p_timeout_wait_peer_idle(p2p);
4405 break;
4406 case P2P_SD_DURING_FIND:
4407 p2p_timeout_sd_during_find(p2p);
4408 break;
4409 case P2P_PROVISIONING:
4410 break;
4411 case P2P_PD_DURING_FIND:
4412 p2p_timeout_prov_disc_during_find(p2p);
4413 break;
4414 case P2P_INVITE:
4415 p2p_timeout_invite(p2p);
4416 break;
4417 case P2P_INVITE_LISTEN:
4418 p2p_timeout_invite_listen(p2p);
4419 break;
4420 }
4421 }
4422
4423
p2p_reject(struct p2p_data * p2p,const u8 * peer_addr)4424 int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
4425 {
4426 struct p2p_device *dev;
4427
4428 dev = p2p_get_device(p2p, peer_addr);
4429 p2p_dbg(p2p, "Local request to reject connection attempts by peer "
4430 MACSTR, MAC2STR(peer_addr));
4431 if (dev == NULL) {
4432 p2p_dbg(p2p, "Peer " MACSTR " unknown", MAC2STR(peer_addr));
4433 return -1;
4434 }
4435 dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
4436 dev->flags |= P2P_DEV_USER_REJECTED;
4437 return 0;
4438 }
4439
4440
p2p_wps_method_text(enum p2p_wps_method method)4441 const char * p2p_wps_method_text(enum p2p_wps_method method)
4442 {
4443 switch (method) {
4444 case WPS_NOT_READY:
4445 return "not-ready";
4446 case WPS_PIN_DISPLAY:
4447 return "Display";
4448 case WPS_PIN_KEYPAD:
4449 return "Keypad";
4450 case WPS_PBC:
4451 return "PBC";
4452 case WPS_NFC:
4453 return "NFC";
4454 case WPS_P2PS:
4455 return "P2PS";
4456 }
4457
4458 return "??";
4459 }
4460
4461
p2p_go_state_text(enum p2p_go_state go_state)4462 static const char * p2p_go_state_text(enum p2p_go_state go_state)
4463 {
4464 switch (go_state) {
4465 case UNKNOWN_GO:
4466 return "unknown";
4467 case LOCAL_GO:
4468 return "local";
4469 case REMOTE_GO:
4470 return "remote";
4471 }
4472
4473 return "??";
4474 }
4475
4476
p2p_get_peer_info(struct p2p_data * p2p,const u8 * addr,int next)4477 const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
4478 const u8 *addr, int next)
4479 {
4480 struct p2p_device *dev;
4481
4482 if (addr)
4483 dev = p2p_get_device(p2p, addr);
4484 else
4485 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
4486
4487 if (dev && next) {
4488 dev = dl_list_first(&dev->list, struct p2p_device, list);
4489 if (&dev->list == &p2p->devices)
4490 dev = NULL;
4491 }
4492
4493 if (dev == NULL)
4494 return NULL;
4495
4496 return &dev->info;
4497 }
4498
4499
p2p_get_peer_info_txt(const struct p2p_peer_info * info,char * buf,size_t buflen)4500 int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
4501 char *buf, size_t buflen)
4502 {
4503 struct p2p_device *dev;
4504 int res;
4505 char *pos, *end;
4506 struct os_reltime now;
4507
4508 if (info == NULL)
4509 return -1;
4510
4511 dev = (struct p2p_device *) (((u8 *) info) -
4512 offsetof(struct p2p_device, info));
4513
4514 pos = buf;
4515 end = buf + buflen;
4516
4517 os_get_reltime(&now);
4518 res = os_snprintf(pos, end - pos,
4519 "age=%d\n"
4520 "listen_freq=%d\n"
4521 "wps_method=%s\n"
4522 "interface_addr=" MACSTR "\n"
4523 "member_in_go_dev=" MACSTR "\n"
4524 "member_in_go_iface=" MACSTR "\n"
4525 "go_neg_req_sent=%d\n"
4526 "go_state=%s\n"
4527 "dialog_token=%u\n"
4528 "intended_addr=" MACSTR "\n"
4529 "country=%c%c\n"
4530 "oper_freq=%d\n"
4531 "req_config_methods=0x%x\n"
4532 "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
4533 "status=%d\n"
4534 "invitation_reqs=%u\n",
4535 (int) (now.sec - dev->last_seen.sec),
4536 dev->listen_freq,
4537 p2p_wps_method_text(dev->wps_method),
4538 MAC2STR(dev->interface_addr),
4539 MAC2STR(dev->member_in_go_dev),
4540 MAC2STR(dev->member_in_go_iface),
4541 dev->go_neg_req_sent,
4542 p2p_go_state_text(dev->go_state),
4543 dev->dialog_token,
4544 MAC2STR(dev->intended_addr),
4545 dev->country[0] ? dev->country[0] : '_',
4546 dev->country[1] ? dev->country[1] : '_',
4547 dev->oper_freq,
4548 dev->req_config_methods,
4549 dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
4550 "[PROBE_REQ_ONLY]" : "",
4551 dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
4552 dev->flags & P2P_DEV_NOT_YET_READY ?
4553 "[NOT_YET_READY]" : "",
4554 dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
4555 "[PD_PEER_DISPLAY]" : "",
4556 dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
4557 "[PD_PEER_KEYPAD]" : "",
4558 dev->flags & P2P_DEV_PD_PEER_P2PS ?
4559 "[PD_PEER_P2PS]" : "",
4560 dev->flags & P2P_DEV_USER_REJECTED ?
4561 "[USER_REJECTED]" : "",
4562 dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
4563 "[PEER_WAITING_RESPONSE]" : "",
4564 dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
4565 "[PREFER_PERSISTENT_GROUP]" : "",
4566 dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
4567 "[WAIT_GO_NEG_RESPONSE]" : "",
4568 dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
4569 "[WAIT_GO_NEG_CONFIRM]" : "",
4570 dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
4571 "[GROUP_CLIENT_ONLY]" : "",
4572 dev->flags & P2P_DEV_FORCE_FREQ ?
4573 "[FORCE_FREQ]" : "",
4574 dev->flags & P2P_DEV_PD_FOR_JOIN ?
4575 "[PD_FOR_JOIN]" : "",
4576 dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT ?
4577 "[LAST_SEEN_AS_GROUP_CLIENT]" : "",
4578 dev->status,
4579 dev->invitation_reqs);
4580 if (os_snprintf_error(end - pos, res))
4581 return pos - buf;
4582 pos += res;
4583
4584 if (dev->ext_listen_period) {
4585 res = os_snprintf(pos, end - pos,
4586 "ext_listen_period=%u\n"
4587 "ext_listen_interval=%u\n",
4588 dev->ext_listen_period,
4589 dev->ext_listen_interval);
4590 if (os_snprintf_error(end - pos, res))
4591 return pos - buf;
4592 pos += res;
4593 }
4594
4595 if (dev->oper_ssid_len) {
4596 res = os_snprintf(pos, end - pos,
4597 "oper_ssid=%s\n",
4598 wpa_ssid_txt(dev->oper_ssid,
4599 dev->oper_ssid_len));
4600 if (os_snprintf_error(end - pos, res))
4601 return pos - buf;
4602 pos += res;
4603 }
4604
4605 #ifdef CONFIG_WIFI_DISPLAY
4606 if (dev->info.wfd_subelems) {
4607 res = os_snprintf(pos, end - pos, "wfd_subelems=");
4608 if (os_snprintf_error(end - pos, res))
4609 return pos - buf;
4610 pos += res;
4611
4612 pos += wpa_snprintf_hex(pos, end - pos,
4613 wpabuf_head(dev->info.wfd_subelems),
4614 wpabuf_len(dev->info.wfd_subelems));
4615
4616 res = os_snprintf(pos, end - pos, "\n");
4617 if (os_snprintf_error(end - pos, res))
4618 return pos - buf;
4619 pos += res;
4620 }
4621 #endif /* CONFIG_WIFI_DISPLAY */
4622
4623 return pos - buf;
4624 }
4625
4626
p2p_peer_known(struct p2p_data * p2p,const u8 * addr)4627 int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
4628 {
4629 return p2p_get_device(p2p, addr) != NULL;
4630 }
4631
4632
p2p_set_client_discoverability(struct p2p_data * p2p,int enabled)4633 void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
4634 {
4635 if (enabled) {
4636 p2p_dbg(p2p, "Client discoverability enabled");
4637 p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4638 } else {
4639 p2p_dbg(p2p, "Client discoverability disabled");
4640 p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4641 }
4642 }
4643
4644
p2p_build_presence_req(u32 duration1,u32 interval1,u32 duration2,u32 interval2)4645 static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
4646 u32 duration2, u32 interval2)
4647 {
4648 struct wpabuf *req;
4649 struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
4650 u8 *len;
4651
4652 req = wpabuf_alloc(100);
4653 if (req == NULL)
4654 return NULL;
4655
4656 if (duration1 || interval1) {
4657 os_memset(&desc1, 0, sizeof(desc1));
4658 desc1.count_type = 1;
4659 desc1.duration = duration1;
4660 desc1.interval = interval1;
4661 ptr1 = &desc1;
4662
4663 if (duration2 || interval2) {
4664 os_memset(&desc2, 0, sizeof(desc2));
4665 desc2.count_type = 2;
4666 desc2.duration = duration2;
4667 desc2.interval = interval2;
4668 ptr2 = &desc2;
4669 }
4670 }
4671
4672 p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
4673 len = p2p_buf_add_ie_hdr(req);
4674 p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
4675 p2p_buf_update_ie_hdr(req, len);
4676
4677 return req;
4678 }
4679
4680
p2p_presence_req(struct p2p_data * p2p,const u8 * go_interface_addr,const u8 * own_interface_addr,unsigned int freq,u32 duration1,u32 interval1,u32 duration2,u32 interval2)4681 int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
4682 const u8 *own_interface_addr, unsigned int freq,
4683 u32 duration1, u32 interval1, u32 duration2,
4684 u32 interval2)
4685 {
4686 struct wpabuf *req;
4687
4688 p2p_dbg(p2p, "Send Presence Request to GO " MACSTR
4689 " (own interface " MACSTR ") freq=%u dur1=%u int1=%u "
4690 "dur2=%u int2=%u",
4691 MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
4692 freq, duration1, interval1, duration2, interval2);
4693
4694 req = p2p_build_presence_req(duration1, interval1, duration2,
4695 interval2);
4696 if (req == NULL)
4697 return -1;
4698
4699 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4700 if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
4701 go_interface_addr,
4702 wpabuf_head(req), wpabuf_len(req), 200) < 0) {
4703 p2p_dbg(p2p, "Failed to send Action frame");
4704 }
4705 wpabuf_free(req);
4706
4707 return 0;
4708 }
4709
4710
p2p_build_presence_resp(u8 status,const u8 * noa,size_t noa_len,u8 dialog_token)4711 static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
4712 size_t noa_len, u8 dialog_token)
4713 {
4714 struct wpabuf *resp;
4715 u8 *len;
4716
4717 resp = wpabuf_alloc(100 + noa_len);
4718 if (resp == NULL)
4719 return NULL;
4720
4721 p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
4722 len = p2p_buf_add_ie_hdr(resp);
4723 p2p_buf_add_status(resp, status);
4724 if (noa) {
4725 wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
4726 wpabuf_put_le16(resp, noa_len);
4727 wpabuf_put_data(resp, noa, noa_len);
4728 } else
4729 p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
4730 p2p_buf_update_ie_hdr(resp, len);
4731
4732 return resp;
4733 }
4734
4735
p2p_process_presence_req(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len,int rx_freq)4736 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
4737 const u8 *sa, const u8 *data, size_t len,
4738 int rx_freq)
4739 {
4740 struct p2p_message msg;
4741 u8 status;
4742 struct wpabuf *resp;
4743 size_t g;
4744 struct p2p_group *group = NULL;
4745 int parsed = 0;
4746 u8 noa[50];
4747 int noa_len;
4748
4749 p2p_dbg(p2p, "Received P2P Action - P2P Presence Request");
4750
4751 for (g = 0; g < p2p->num_groups; g++) {
4752 if (ether_addr_equal(
4753 da, p2p_group_get_interface_addr(p2p->groups[g]))) {
4754 group = p2p->groups[g];
4755 break;
4756 }
4757 }
4758 if (group == NULL) {
4759 p2p_dbg(p2p, "Ignore P2P Presence Request for unknown group "
4760 MACSTR, MAC2STR(da));
4761 return;
4762 }
4763
4764 if (p2p_parse(data, len, &msg) < 0) {
4765 p2p_dbg(p2p, "Failed to parse P2P Presence Request");
4766 status = P2P_SC_FAIL_INVALID_PARAMS;
4767 goto fail;
4768 }
4769 parsed = 1;
4770
4771 if (msg.noa == NULL) {
4772 p2p_dbg(p2p, "No NoA attribute in P2P Presence Request");
4773 status = P2P_SC_FAIL_INVALID_PARAMS;
4774 goto fail;
4775 }
4776
4777 status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
4778
4779 fail:
4780 if (p2p->cfg->get_noa)
4781 noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
4782 sizeof(noa));
4783 else
4784 noa_len = -1;
4785 resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
4786 noa_len > 0 ? noa_len : 0,
4787 msg.dialog_token);
4788 if (parsed)
4789 p2p_parse_free(&msg);
4790 if (resp == NULL)
4791 return;
4792
4793 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4794 if (p2p_send_action(p2p, rx_freq, sa, da, da,
4795 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
4796 p2p_dbg(p2p, "Failed to send Action frame");
4797 }
4798 wpabuf_free(resp);
4799 }
4800
4801
p2p_process_presence_resp(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len)4802 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
4803 const u8 *sa, const u8 *data, size_t len)
4804 {
4805 struct p2p_message msg;
4806
4807 p2p_dbg(p2p, "Received P2P Action - P2P Presence Response");
4808
4809 if (p2p_parse(data, len, &msg) < 0) {
4810 p2p_dbg(p2p, "Failed to parse P2P Presence Response");
4811 return;
4812 }
4813
4814 if (msg.status == NULL || msg.noa == NULL) {
4815 p2p_dbg(p2p, "No Status or NoA attribute in P2P Presence Response");
4816 p2p_parse_free(&msg);
4817 return;
4818 }
4819
4820 if (p2p->cfg->presence_resp) {
4821 p2p->cfg->presence_resp(p2p->cfg->cb_ctx, sa, *msg.status,
4822 msg.noa, msg.noa_len);
4823 }
4824
4825 if (*msg.status) {
4826 p2p_dbg(p2p, "P2P Presence Request was rejected: status %u",
4827 *msg.status);
4828 p2p_parse_free(&msg);
4829 return;
4830 }
4831
4832 p2p_dbg(p2p, "P2P Presence Request was accepted");
4833 wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
4834 msg.noa, msg.noa_len);
4835 /* TODO: process NoA */
4836 p2p_parse_free(&msg);
4837 }
4838
4839
p2p_ext_listen_timeout(void * eloop_ctx,void * timeout_ctx)4840 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
4841 {
4842 struct p2p_data *p2p = eloop_ctx;
4843
4844 if (p2p->ext_listen_interval) {
4845 /* Schedule next extended listen timeout */
4846 eloop_register_timeout(p2p->ext_listen_interval_sec,
4847 p2p->ext_listen_interval_usec,
4848 p2p_ext_listen_timeout, p2p, NULL);
4849 }
4850
4851 if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
4852 /*
4853 * This should not really happen, but it looks like the Listen
4854 * command may fail is something else (e.g., a scan) was
4855 * running at an inconvenient time. As a workaround, allow new
4856 * Extended Listen operation to be started.
4857 */
4858 p2p_dbg(p2p, "Previous Extended Listen operation had not been completed - try again");
4859 p2p->ext_listen_only = 0;
4860 p2p_set_state(p2p, P2P_IDLE);
4861 }
4862
4863 if ((p2p->cfg->is_p2p_in_progress &&
4864 p2p->cfg->is_p2p_in_progress(p2p->cfg->cb_ctx)) ||
4865 (p2p->pending_action_state == P2P_PENDING_PD &&
4866 p2p->pd_retries > 0)) {
4867 p2p_dbg(p2p, "Operation in progress - skip Extended Listen timeout (%s)",
4868 p2p_state_txt(p2p->state));
4869 return;
4870 }
4871
4872 if (p2p->state != P2P_IDLE) {
4873 p2p_dbg(p2p, "Skip Extended Listen timeout in active state (%s)", p2p_state_txt(p2p->state));
4874 return;
4875 }
4876
4877 p2p_dbg(p2p, "Extended Listen timeout");
4878 p2p->ext_listen_only = 1;
4879 if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
4880 p2p_dbg(p2p, "Failed to start Listen state for Extended Listen Timing");
4881 p2p->ext_listen_only = 0;
4882 }
4883 }
4884
4885
p2p_ext_listen(struct p2p_data * p2p,unsigned int period,unsigned int interval)4886 int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
4887 unsigned int interval)
4888 {
4889 if (period > 65535 || interval > 65535 || period > interval ||
4890 (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
4891 p2p_dbg(p2p, "Invalid Extended Listen Timing request: period=%u interval=%u",
4892 period, interval);
4893 return -1;
4894 }
4895
4896 eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
4897
4898 if (interval == 0) {
4899 p2p_dbg(p2p, "Disabling Extended Listen Timing");
4900 p2p->ext_listen_period = 0;
4901 p2p->ext_listen_interval = 0;
4902 return 0;
4903 }
4904
4905 p2p_dbg(p2p, "Enabling Extended Listen Timing: period %u msec, interval %u msec",
4906 period, interval);
4907 p2p->ext_listen_period = period;
4908 p2p->ext_listen_interval = interval;
4909 p2p->ext_listen_interval_sec = interval / 1000;
4910 p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
4911
4912 eloop_register_timeout(p2p->ext_listen_interval_sec,
4913 p2p->ext_listen_interval_usec,
4914 p2p_ext_listen_timeout, p2p, NULL);
4915
4916 return 0;
4917 }
4918
4919
p2p_deauth_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4920 void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4921 const u8 *ie, size_t ie_len)
4922 {
4923 struct p2p_message msg;
4924
4925 if (bssid == NULL || ie == NULL)
4926 return;
4927
4928 os_memset(&msg, 0, sizeof(msg));
4929 if (p2p_parse_ies(ie, ie_len, &msg))
4930 return;
4931 if (msg.minor_reason_code == NULL) {
4932 p2p_parse_free(&msg);
4933 return;
4934 }
4935
4936 p2p_dbg(p2p, "Deauthentication notification BSSID " MACSTR
4937 " reason_code=%u minor_reason_code=%u",
4938 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4939
4940 p2p_parse_free(&msg);
4941 }
4942
4943
p2p_disassoc_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4944 void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4945 const u8 *ie, size_t ie_len)
4946 {
4947 struct p2p_message msg;
4948
4949 if (bssid == NULL || ie == NULL)
4950 return;
4951
4952 os_memset(&msg, 0, sizeof(msg));
4953 if (p2p_parse_ies(ie, ie_len, &msg))
4954 return;
4955 if (msg.minor_reason_code == NULL) {
4956 p2p_parse_free(&msg);
4957 return;
4958 }
4959
4960 p2p_dbg(p2p, "Disassociation notification BSSID " MACSTR
4961 " reason_code=%u minor_reason_code=%u",
4962 MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4963
4964 p2p_parse_free(&msg);
4965 }
4966
4967
p2p_set_managed_oper(struct p2p_data * p2p,int enabled)4968 void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
4969 {
4970 if (enabled) {
4971 p2p_dbg(p2p, "Managed P2P Device operations enabled");
4972 p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
4973 } else {
4974 p2p_dbg(p2p, "Managed P2P Device operations disabled");
4975 p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
4976 }
4977 }
4978
4979
4980 #ifdef CONFIG_TESTING_OPTIONS
4981
p2p_set_pairing_setup(struct p2p_data * p2p,int pairing_setup)4982 void p2p_set_pairing_setup(struct p2p_data *p2p, int pairing_setup)
4983 {
4984 p2p_dbg(p2p, "Pairing Setup %s",
4985 pairing_setup ? "Enabled" : "Disabled");
4986 if (pairing_setup) {
4987 p2p->cfg->pairing_config.pairing_capable = true;
4988 p2p->cfg->pairing_config.enable_pairing_setup = true;
4989 if (p2p->pairing_info)
4990 p2p->pairing_info->enable_pairing_setup = true;
4991 } else {
4992 p2p->cfg->pairing_config.pairing_capable = false;
4993 p2p->cfg->pairing_config.enable_pairing_setup = false;
4994 if (p2p->pairing_info)
4995 p2p->pairing_info->enable_pairing_setup = false;
4996 }
4997 }
4998
4999
p2p_set_pairing_cache(struct p2p_data * p2p,int pairing_cache)5000 void p2p_set_pairing_cache(struct p2p_data *p2p, int pairing_cache)
5001 {
5002 p2p_dbg(p2p, "Pairing Cache %s",
5003 pairing_cache ? "Enabled" : "Disabled");
5004 if (pairing_cache) {
5005 p2p->cfg->pairing_config.enable_pairing_cache = true;
5006 if (p2p->pairing_info)
5007 p2p->pairing_info->enable_pairing_cache = true;
5008 } else {
5009 p2p->cfg->pairing_config.enable_pairing_cache = false;
5010 if (p2p->pairing_info)
5011 p2p->pairing_info->enable_pairing_cache = false;
5012 }
5013 }
5014
5015
p2p_set_bootstrapmethods(struct p2p_data * p2p,int bootstrap_methods)5016 void p2p_set_bootstrapmethods(struct p2p_data *p2p, int bootstrap_methods)
5017 {
5018 p2p_dbg(p2p, "Bootstraping methods: 0x%x", bootstrap_methods);
5019 p2p->cfg->pairing_config.bootstrap_methods = bootstrap_methods;
5020 if (p2p->pairing_info)
5021 p2p->pairing_info->supported_bootstrap = bootstrap_methods;
5022 }
5023
5024
p2p_set_pasn_type(struct p2p_data * p2p,u8 pasn_type)5025 void p2p_set_pasn_type(struct p2p_data *p2p, u8 pasn_type)
5026 {
5027 p2p_dbg(p2p, "PASN type: 0x%x", pasn_type);
5028 p2p->cfg->pairing_config.pasn_type = pasn_type;
5029 }
5030
5031
p2p_set_comeback_after(struct p2p_data * p2p,int comeback_after)5032 void p2p_set_comeback_after(struct p2p_data *p2p, int comeback_after)
5033 {
5034 p2p_dbg(p2p, "Comeback after: %d", comeback_after);
5035 p2p->cfg->comeback_after = comeback_after;
5036 }
5037
5038
p2p_set_reg_info(struct p2p_data * p2p,u8 val)5039 void p2p_set_reg_info(struct p2p_data *p2p, u8 val)
5040 {
5041 p2p->cfg->reg_info = val;
5042 }
5043
5044
p2p_set_twt_power_mgmt(struct p2p_data * p2p,int val)5045 void p2p_set_twt_power_mgmt(struct p2p_data *p2p, int val)
5046 {
5047 p2p_dbg(p2p, "TWT-based P2P Power Mgmt: %s",
5048 val ? "Enabled" : "Disabled");
5049 if (val)
5050 p2p->cfg->twt_power_mgmt = true;
5051 else
5052 p2p->cfg->twt_power_mgmt = false;
5053 }
5054
5055
p2p_set_chan_switch_req_enable(struct p2p_data * p2p,bool val)5056 void p2p_set_chan_switch_req_enable(struct p2p_data *p2p, bool val)
5057 {
5058 p2p->cfg->chan_switch_req_enable = val;
5059 }
5060
5061
p2p_set_invitation_op_freq(struct p2p_data * p2p,int freq)5062 void p2p_set_invitation_op_freq(struct p2p_data *p2p, int freq)
5063 {
5064 u8 op_class, channel;
5065
5066 if (freq == -1) {
5067 p2p->cfg->inv_op_class = 0;
5068 p2p->cfg->inv_op_channel = 0;
5069 return;
5070 }
5071
5072 if (p2p_freq_to_channel(freq, &op_class, &channel) < 0)
5073 return;
5074
5075 p2p->cfg->inv_op_class = op_class;
5076 p2p->cfg->inv_op_channel = channel;
5077 }
5078
5079 #endif /* CONFIG_TESTING_OPTIONS */
5080
5081
p2p_config_get_random_social(struct p2p_config * p2p,u8 * op_class,u8 * op_channel,struct wpa_freq_range_list * avoid_list,struct wpa_freq_range_list * disallow_list)5082 int p2p_config_get_random_social(struct p2p_config *p2p, u8 *op_class,
5083 u8 *op_channel,
5084 struct wpa_freq_range_list *avoid_list,
5085 struct wpa_freq_range_list *disallow_list)
5086 {
5087 return p2p_channel_random_social(&p2p->channels, op_class, op_channel,
5088 avoid_list, disallow_list);
5089 }
5090
5091
p2p_set_listen_channel(struct p2p_data * p2p,u8 reg_class,u8 channel,u8 forced)5092 int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel,
5093 u8 forced)
5094 {
5095 if (p2p_channel_to_freq(reg_class, channel) < 0)
5096 return -1;
5097
5098 /*
5099 * Listen channel was set in configuration or set by control interface;
5100 * cannot override it.
5101 */
5102 if (p2p->cfg->channel_forced && forced == 0) {
5103 p2p_dbg(p2p,
5104 "Listen channel was previously configured - do not override based on optimization");
5105 return -1;
5106 }
5107
5108 p2p_dbg(p2p, "Set Listen channel: reg_class %u channel %u",
5109 reg_class, channel);
5110
5111 if (p2p->state == P2P_IDLE) {
5112 p2p->cfg->reg_class = reg_class;
5113 p2p->cfg->channel = channel;
5114 p2p->cfg->channel_forced = forced;
5115 } else {
5116 p2p_dbg(p2p, "Defer setting listen channel");
5117 p2p->pending_reg_class = reg_class;
5118 p2p->pending_channel = channel;
5119 p2p->pending_channel_forced = forced;
5120 }
5121
5122 return 0;
5123 }
5124
5125
p2p_get_listen_channel(struct p2p_data * p2p)5126 u8 p2p_get_listen_channel(struct p2p_data *p2p)
5127 {
5128 return p2p->cfg->channel;
5129 }
5130
5131
p2p_set_ssid_postfix(struct p2p_data * p2p,const u8 * postfix,size_t len)5132 int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
5133 {
5134 p2p_dbg(p2p, "New SSID postfix: %s", wpa_ssid_txt(postfix, len));
5135 if (postfix == NULL) {
5136 p2p->cfg->ssid_postfix_len = 0;
5137 return 0;
5138 }
5139 if (len > sizeof(p2p->cfg->ssid_postfix))
5140 return -1;
5141 os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
5142 p2p->cfg->ssid_postfix_len = len;
5143 return 0;
5144 }
5145
5146
p2p_set_oper_channel(struct p2p_data * p2p,u8 op_reg_class,u8 op_channel,int cfg_op_channel)5147 int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
5148 int cfg_op_channel)
5149 {
5150 if (p2p_channel_to_freq(op_reg_class, op_channel) < 0)
5151 return -1;
5152
5153 p2p_dbg(p2p, "Set Operating channel: reg_class %u channel %u",
5154 op_reg_class, op_channel);
5155 p2p->cfg->op_reg_class = op_reg_class;
5156 p2p->cfg->op_channel = op_channel;
5157 p2p->cfg->cfg_op_channel = cfg_op_channel;
5158 return 0;
5159 }
5160
5161
p2p_set_pref_chan(struct p2p_data * p2p,unsigned int num_pref_chan,const struct p2p_channel * pref_chan)5162 int p2p_set_pref_chan(struct p2p_data *p2p, unsigned int num_pref_chan,
5163 const struct p2p_channel *pref_chan)
5164 {
5165 struct p2p_channel *n;
5166
5167 if (pref_chan) {
5168 n = os_memdup(pref_chan,
5169 num_pref_chan * sizeof(struct p2p_channel));
5170 if (n == NULL)
5171 return -1;
5172 } else
5173 n = NULL;
5174
5175 os_free(p2p->cfg->pref_chan);
5176 p2p->cfg->pref_chan = n;
5177 p2p->cfg->num_pref_chan = num_pref_chan;
5178
5179 return 0;
5180 }
5181
5182
p2p_set_no_go_freq(struct p2p_data * p2p,const struct wpa_freq_range_list * list)5183 int p2p_set_no_go_freq(struct p2p_data *p2p,
5184 const struct wpa_freq_range_list *list)
5185 {
5186 struct wpa_freq_range *tmp;
5187
5188 if (list == NULL || list->num == 0) {
5189 os_free(p2p->no_go_freq.range);
5190 p2p->no_go_freq.range = NULL;
5191 p2p->no_go_freq.num = 0;
5192 return 0;
5193 }
5194
5195 tmp = os_calloc(list->num, sizeof(struct wpa_freq_range));
5196 if (tmp == NULL)
5197 return -1;
5198 os_memcpy(tmp, list->range, list->num * sizeof(struct wpa_freq_range));
5199 os_free(p2p->no_go_freq.range);
5200 p2p->no_go_freq.range = tmp;
5201 p2p->no_go_freq.num = list->num;
5202 p2p_dbg(p2p, "Updated no GO chan list");
5203
5204 return 0;
5205 }
5206
5207
p2p_get_interface_addr(struct p2p_data * p2p,const u8 * dev_addr,u8 * iface_addr)5208 int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
5209 u8 *iface_addr)
5210 {
5211 struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
5212
5213 if (!dev || is_zero_ether_addr(dev->interface_addr)) {
5214 p2p_dbg(p2p,
5215 "P2P: Failed to get interface address from device addr "
5216 MACSTR, MAC2STR(dev_addr));
5217 return -1;
5218 }
5219 os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
5220 return 0;
5221 }
5222
5223
p2p_get_dev_addr(struct p2p_data * p2p,const u8 * iface_addr,u8 * dev_addr)5224 int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
5225 u8 *dev_addr)
5226 {
5227 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5228
5229 if (!dev) {
5230 p2p_dbg(p2p,
5231 "P2P: Failed to get device address from interface address "
5232 MACSTR, MAC2STR(iface_addr));
5233 return -1;
5234 }
5235 os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
5236 return 0;
5237 }
5238
5239
p2p_get_dev_identity_key(struct p2p_data * p2p,const u8 * dev_addr,const u8 ** dik_data,size_t * dik_len,u8 * cipher)5240 int p2p_get_dev_identity_key(struct p2p_data *p2p, const u8 *dev_addr,
5241 const u8 **dik_data, size_t *dik_len, u8 *cipher)
5242 {
5243 if (!p2p || !p2p->peer_dik_len) {
5244 wpa_printf(MSG_DEBUG,
5245 "P2P2: Failed to get device identity key for "
5246 MACSTR, MAC2STR(dev_addr));
5247 return -1;
5248 }
5249
5250 *dik_data = p2p->peer_dik_data;
5251 *dik_len = p2p->peer_dik_len;
5252 *cipher = p2p->dik_cipher_version;
5253
5254 /* Reset DIK length to invalidate DIK for successive iteration of a new
5255 * peer. */
5256 p2p->peer_dik_len = 0;
5257
5258 return 0;
5259 }
5260
5261
p2p_set_peer_filter(struct p2p_data * p2p,const u8 * addr)5262 void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
5263 {
5264 os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
5265 if (is_zero_ether_addr(p2p->peer_filter))
5266 p2p_dbg(p2p, "Disable peer filter");
5267 else
5268 p2p_dbg(p2p, "Enable peer filter for " MACSTR,
5269 MAC2STR(p2p->peer_filter));
5270 }
5271
5272
p2p_set_cross_connect(struct p2p_data * p2p,int enabled)5273 void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
5274 {
5275 p2p_dbg(p2p, "Cross connection %s", enabled ? "enabled" : "disabled");
5276 if (p2p->cross_connect == enabled)
5277 return;
5278 p2p->cross_connect = enabled;
5279 /* TODO: may need to tear down any action group where we are GO(?) */
5280 }
5281
5282
p2p_get_oper_freq(struct p2p_data * p2p,const u8 * iface_addr)5283 int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
5284 {
5285 struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5286 if (dev == NULL)
5287 return -1;
5288 if (dev->oper_freq <= 0)
5289 return -1;
5290 return dev->oper_freq;
5291 }
5292
5293
p2p_set_intra_bss_dist(struct p2p_data * p2p,int enabled)5294 void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
5295 {
5296 p2p_dbg(p2p, "Intra BSS distribution %s",
5297 enabled ? "enabled" : "disabled");
5298 p2p->cfg->p2p_intra_bss = enabled;
5299 }
5300
5301
p2p_update_channel_list(struct p2p_data * p2p,const struct p2p_channels * chan,const struct p2p_channels * cli_chan)5302 void p2p_update_channel_list(struct p2p_data *p2p,
5303 const struct p2p_channels *chan,
5304 const struct p2p_channels *cli_chan)
5305 {
5306 p2p_dbg(p2p, "Update channel list");
5307 os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
5308 p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
5309 os_memcpy(&p2p->cfg->cli_channels, cli_chan,
5310 sizeof(struct p2p_channels));
5311 p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
5312 }
5313
5314
p2p_send_action(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * buf,size_t len,unsigned int wait_time)5315 int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
5316 const u8 *src, const u8 *bssid, const u8 *buf,
5317 size_t len, unsigned int wait_time)
5318 {
5319 int res, scheduled;
5320
5321 res = p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
5322 buf, len, wait_time, &scheduled);
5323 if (res == 0 && scheduled && p2p->in_listen && freq > 0 &&
5324 p2p->drv_in_listen > 0 &&
5325 (unsigned int) p2p->drv_in_listen != freq) {
5326 p2p_dbg(p2p,
5327 "Stop listen on %d MHz to allow a frame to be sent immediately on %d MHz",
5328 p2p->drv_in_listen, freq);
5329 p2p_stop_listen_for_freq(p2p, freq);
5330 }
5331 return res;
5332 }
5333
5334
p2p_set_best_channels(struct p2p_data * p2p,int freq_24,int freq_5,int freq_overall)5335 void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
5336 int freq_overall)
5337 {
5338 p2p_dbg(p2p, "Best channel: 2.4 GHz: %d, 5 GHz: %d, overall: %d",
5339 freq_24, freq_5, freq_overall);
5340 p2p->best_freq_24 = freq_24;
5341 p2p->best_freq_5 = freq_5;
5342 p2p->best_freq_overall = freq_overall;
5343 }
5344
5345
p2p_set_own_freq_preference(struct p2p_data * p2p,int freq)5346 void p2p_set_own_freq_preference(struct p2p_data *p2p, int freq)
5347 {
5348 p2p_dbg(p2p, "Own frequency preference: %d MHz", freq);
5349 p2p->own_freq_preference = freq;
5350 }
5351
5352
p2p_get_go_neg_peer(struct p2p_data * p2p)5353 const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
5354 {
5355 if (p2p == NULL || p2p->go_neg_peer == NULL)
5356 return NULL;
5357 return p2p->go_neg_peer->info.p2p_device_addr;
5358 }
5359
5360
5361 const struct p2p_peer_info *
p2p_get_peer_found(struct p2p_data * p2p,const u8 * addr,int next)5362 p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
5363 {
5364 struct p2p_device *dev;
5365
5366 if (addr) {
5367 dev = p2p_get_device(p2p, addr);
5368 if (!dev)
5369 return NULL;
5370
5371 if (!next) {
5372 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
5373 return NULL;
5374
5375 return &dev->info;
5376 } else {
5377 do {
5378 dev = dl_list_first(&dev->list,
5379 struct p2p_device,
5380 list);
5381 if (!dev || &dev->list == &p2p->devices)
5382 return NULL;
5383 } while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
5384 }
5385 } else {
5386 dev = dl_list_first(&p2p->devices, struct p2p_device, list);
5387 if (!dev)
5388 return NULL;
5389 while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
5390 dev = dl_list_first(&dev->list,
5391 struct p2p_device,
5392 list);
5393 if (!dev || &dev->list == &p2p->devices)
5394 return NULL;
5395 }
5396 }
5397
5398 return &dev->info;
5399 }
5400
5401
p2p_in_progress(struct p2p_data * p2p)5402 int p2p_in_progress(struct p2p_data *p2p)
5403 {
5404 if (p2p == NULL)
5405 return 0;
5406 if (p2p->state == P2P_SEARCH)
5407 return 2;
5408 return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
5409 }
5410
5411
p2p_set_config_timeout(struct p2p_data * p2p,u8 go_timeout,u8 client_timeout)5412 void p2p_set_config_timeout(struct p2p_data *p2p, u8 go_timeout,
5413 u8 client_timeout)
5414 {
5415 if (p2p) {
5416 p2p->go_timeout = go_timeout;
5417 p2p->client_timeout = client_timeout;
5418 }
5419 }
5420
5421
5422 #ifdef CONFIG_WIFI_DISPLAY
5423
p2p_update_wfd_ie_groups(struct p2p_data * p2p)5424 static void p2p_update_wfd_ie_groups(struct p2p_data *p2p)
5425 {
5426 size_t g;
5427 struct p2p_group *group;
5428
5429 for (g = 0; g < p2p->num_groups; g++) {
5430 group = p2p->groups[g];
5431 p2p_group_force_beacon_update_ies(group);
5432 }
5433 }
5434
5435
p2p_set_wfd_ie_beacon(struct p2p_data * p2p,struct wpabuf * ie)5436 int p2p_set_wfd_ie_beacon(struct p2p_data *p2p, struct wpabuf *ie)
5437 {
5438 wpabuf_free(p2p->wfd_ie_beacon);
5439 p2p->wfd_ie_beacon = ie;
5440 p2p_update_wfd_ie_groups(p2p);
5441 return 0;
5442 }
5443
5444
p2p_set_wfd_ie_probe_req(struct p2p_data * p2p,struct wpabuf * ie)5445 int p2p_set_wfd_ie_probe_req(struct p2p_data *p2p, struct wpabuf *ie)
5446 {
5447 wpabuf_free(p2p->wfd_ie_probe_req);
5448 p2p->wfd_ie_probe_req = ie;
5449 return 0;
5450 }
5451
5452
p2p_set_wfd_ie_probe_resp(struct p2p_data * p2p,struct wpabuf * ie)5453 int p2p_set_wfd_ie_probe_resp(struct p2p_data *p2p, struct wpabuf *ie)
5454 {
5455 wpabuf_free(p2p->wfd_ie_probe_resp);
5456 p2p->wfd_ie_probe_resp = ie;
5457 p2p_update_wfd_ie_groups(p2p);
5458 return 0;
5459 }
5460
5461
p2p_set_wfd_ie_assoc_req(struct p2p_data * p2p,struct wpabuf * ie)5462 int p2p_set_wfd_ie_assoc_req(struct p2p_data *p2p, struct wpabuf *ie)
5463 {
5464 wpabuf_free(p2p->wfd_ie_assoc_req);
5465 p2p->wfd_ie_assoc_req = ie;
5466 return 0;
5467 }
5468
5469
p2p_set_wfd_ie_invitation(struct p2p_data * p2p,struct wpabuf * ie)5470 int p2p_set_wfd_ie_invitation(struct p2p_data *p2p, struct wpabuf *ie)
5471 {
5472 wpabuf_free(p2p->wfd_ie_invitation);
5473 p2p->wfd_ie_invitation = ie;
5474 return 0;
5475 }
5476
5477
p2p_set_wfd_ie_prov_disc_req(struct p2p_data * p2p,struct wpabuf * ie)5478 int p2p_set_wfd_ie_prov_disc_req(struct p2p_data *p2p, struct wpabuf *ie)
5479 {
5480 wpabuf_free(p2p->wfd_ie_prov_disc_req);
5481 p2p->wfd_ie_prov_disc_req = ie;
5482 return 0;
5483 }
5484
5485
p2p_set_wfd_ie_prov_disc_resp(struct p2p_data * p2p,struct wpabuf * ie)5486 int p2p_set_wfd_ie_prov_disc_resp(struct p2p_data *p2p, struct wpabuf *ie)
5487 {
5488 wpabuf_free(p2p->wfd_ie_prov_disc_resp);
5489 p2p->wfd_ie_prov_disc_resp = ie;
5490 return 0;
5491 }
5492
5493
p2p_set_wfd_ie_go_neg(struct p2p_data * p2p,struct wpabuf * ie)5494 int p2p_set_wfd_ie_go_neg(struct p2p_data *p2p, struct wpabuf *ie)
5495 {
5496 wpabuf_free(p2p->wfd_ie_go_neg);
5497 p2p->wfd_ie_go_neg = ie;
5498 return 0;
5499 }
5500
5501
p2p_set_wfd_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5502 int p2p_set_wfd_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5503 {
5504 wpabuf_free(p2p->wfd_dev_info);
5505 if (elem) {
5506 p2p->wfd_dev_info = wpabuf_dup(elem);
5507 if (p2p->wfd_dev_info == NULL)
5508 return -1;
5509 } else
5510 p2p->wfd_dev_info = NULL;
5511
5512 return 0;
5513 }
5514
5515
p2p_set_wfd_r2_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5516 int p2p_set_wfd_r2_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5517 {
5518 wpabuf_free(p2p->wfd_r2_dev_info);
5519 if (elem) {
5520 p2p->wfd_r2_dev_info = wpabuf_dup(elem);
5521 if (p2p->wfd_r2_dev_info == NULL)
5522 return -1;
5523 } else
5524 p2p->wfd_r2_dev_info = NULL;
5525
5526 return 0;
5527 }
5528
5529
p2p_set_wfd_assoc_bssid(struct p2p_data * p2p,const struct wpabuf * elem)5530 int p2p_set_wfd_assoc_bssid(struct p2p_data *p2p, const struct wpabuf *elem)
5531 {
5532 wpabuf_free(p2p->wfd_assoc_bssid);
5533 if (elem) {
5534 p2p->wfd_assoc_bssid = wpabuf_dup(elem);
5535 if (p2p->wfd_assoc_bssid == NULL)
5536 return -1;
5537 } else
5538 p2p->wfd_assoc_bssid = NULL;
5539
5540 return 0;
5541 }
5542
5543
p2p_set_wfd_coupled_sink_info(struct p2p_data * p2p,const struct wpabuf * elem)5544 int p2p_set_wfd_coupled_sink_info(struct p2p_data *p2p,
5545 const struct wpabuf *elem)
5546 {
5547 wpabuf_free(p2p->wfd_coupled_sink_info);
5548 if (elem) {
5549 p2p->wfd_coupled_sink_info = wpabuf_dup(elem);
5550 if (p2p->wfd_coupled_sink_info == NULL)
5551 return -1;
5552 } else
5553 p2p->wfd_coupled_sink_info = NULL;
5554
5555 return 0;
5556 }
5557
5558 #endif /* CONFIG_WIFI_DISPLAY */
5559
5560
p2p_set_disc_int(struct p2p_data * p2p,int min_disc_int,int max_disc_int,int max_disc_tu)5561 int p2p_set_disc_int(struct p2p_data *p2p, int min_disc_int, int max_disc_int,
5562 int max_disc_tu)
5563 {
5564 if (min_disc_int > max_disc_int || min_disc_int < 0 || max_disc_int < 0)
5565 return -1;
5566
5567 p2p->min_disc_int = min_disc_int;
5568 p2p->max_disc_int = max_disc_int;
5569 p2p->max_disc_tu = max_disc_tu;
5570 p2p_dbg(p2p, "Set discoverable interval: min=%d max=%d max_tu=%d",
5571 min_disc_int, max_disc_int, max_disc_tu);
5572
5573 return 0;
5574 }
5575
5576
p2p_dbg(struct p2p_data * p2p,const char * fmt,...)5577 void p2p_dbg(struct p2p_data *p2p, const char *fmt, ...)
5578 {
5579 va_list ap;
5580 char buf[500];
5581
5582 if (!p2p->cfg->debug_print)
5583 return;
5584
5585 va_start(ap, fmt);
5586 vsnprintf(buf, sizeof(buf), fmt, ap);
5587 buf[sizeof(buf) - 1] = '\0';
5588 va_end(ap);
5589 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf);
5590 }
5591
5592
p2p_info(struct p2p_data * p2p,const char * fmt,...)5593 void p2p_info(struct p2p_data *p2p, const char *fmt, ...)
5594 {
5595 va_list ap;
5596 char buf[500];
5597
5598 if (!p2p->cfg->debug_print)
5599 return;
5600
5601 va_start(ap, fmt);
5602 vsnprintf(buf, sizeof(buf), fmt, ap);
5603 buf[sizeof(buf) - 1] = '\0';
5604 va_end(ap);
5605 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf);
5606 }
5607
5608
p2p_err(struct p2p_data * p2p,const char * fmt,...)5609 void p2p_err(struct p2p_data *p2p, const char *fmt, ...)
5610 {
5611 va_list ap;
5612 char buf[500];
5613
5614 if (!p2p->cfg->debug_print)
5615 return;
5616
5617 va_start(ap, fmt);
5618 vsnprintf(buf, sizeof(buf), fmt, ap);
5619 buf[sizeof(buf) - 1] = '\0';
5620 va_end(ap);
5621 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
5622 }
5623
5624
p2p_loop_on_known_peers(struct p2p_data * p2p,void (* peer_callback)(struct p2p_peer_info * peer,void * user_data),void * user_data)5625 void p2p_loop_on_known_peers(struct p2p_data *p2p,
5626 void (*peer_callback)(struct p2p_peer_info *peer,
5627 void *user_data),
5628 void *user_data)
5629 {
5630 struct p2p_device *dev, *n;
5631
5632 dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
5633 peer_callback(&dev->info, user_data);
5634 }
5635 }
5636
5637
5638 #ifdef CONFIG_WPS_NFC
5639
p2p_build_nfc_handover(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5640 static struct wpabuf * p2p_build_nfc_handover(struct p2p_data *p2p,
5641 int client_freq,
5642 const u8 *go_dev_addr,
5643 const u8 *ssid, size_t ssid_len)
5644 {
5645 struct wpabuf *buf;
5646 u8 op_class, channel;
5647 enum p2p_role_indication role = P2P_DEVICE_NOT_IN_GROUP;
5648
5649 buf = wpabuf_alloc(1000);
5650 if (buf == NULL)
5651 return NULL;
5652
5653 op_class = p2p->cfg->reg_class;
5654 channel = p2p->cfg->channel;
5655
5656 p2p_buf_add_capability(buf, p2p->dev_capab &
5657 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
5658 p2p_buf_add_device_info(buf, p2p, NULL);
5659
5660 if (p2p->num_groups > 0) {
5661 int freq = p2p_group_get_freq(p2p->groups[0]);
5662 role = P2P_GO_IN_A_GROUP;
5663 if (p2p_freq_to_channel(freq, &op_class, &channel) < 0) {
5664 p2p_dbg(p2p,
5665 "Unknown GO operating frequency %d MHz for NFC handover",
5666 freq);
5667 wpabuf_free(buf);
5668 return NULL;
5669 }
5670 } else if (client_freq > 0) {
5671 role = P2P_CLIENT_IN_A_GROUP;
5672 if (p2p_freq_to_channel(client_freq, &op_class, &channel) < 0) {
5673 p2p_dbg(p2p,
5674 "Unknown client operating frequency %d MHz for NFC handover",
5675 client_freq);
5676 wpabuf_free(buf);
5677 return NULL;
5678 }
5679 }
5680
5681 p2p_buf_add_oob_go_neg_channel(buf, p2p->cfg->country, op_class,
5682 channel, role);
5683
5684 if (p2p->num_groups > 0) {
5685 /* Limit number of clients to avoid very long message */
5686 p2p_buf_add_group_info(p2p->groups[0], buf, 5);
5687 p2p_group_buf_add_id(p2p->groups[0], buf);
5688 } else if (client_freq > 0 &&
5689 go_dev_addr && !is_zero_ether_addr(go_dev_addr) &&
5690 ssid && ssid_len > 0) {
5691 /*
5692 * Add the optional P2P Group ID to indicate in which group this
5693 * device is a P2P Client.
5694 */
5695 p2p_buf_add_group_id(buf, go_dev_addr, ssid, ssid_len);
5696 }
5697
5698 return buf;
5699 }
5700
5701
p2p_build_nfc_handover_req(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5702 struct wpabuf * p2p_build_nfc_handover_req(struct p2p_data *p2p,
5703 int client_freq,
5704 const u8 *go_dev_addr,
5705 const u8 *ssid, size_t ssid_len)
5706 {
5707 return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5708 ssid_len);
5709 }
5710
5711
p2p_build_nfc_handover_sel(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5712 struct wpabuf * p2p_build_nfc_handover_sel(struct p2p_data *p2p,
5713 int client_freq,
5714 const u8 *go_dev_addr,
5715 const u8 *ssid, size_t ssid_len)
5716 {
5717 return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5718 ssid_len);
5719 }
5720
5721
p2p_process_nfc_connection_handover(struct p2p_data * p2p,struct p2p_nfc_params * params)5722 int p2p_process_nfc_connection_handover(struct p2p_data *p2p,
5723 struct p2p_nfc_params *params)
5724 {
5725 struct p2p_message msg;
5726 struct p2p_device *dev;
5727 const u8 *p2p_dev_addr;
5728 int freq;
5729 enum p2p_role_indication role;
5730
5731 params->next_step = NO_ACTION;
5732
5733 if (p2p_parse_ies_separate(params->wsc_attr, params->wsc_len,
5734 params->p2p_attr, params->p2p_len, &msg)) {
5735 p2p_dbg(p2p, "Failed to parse WSC/P2P attributes from NFC");
5736 p2p_parse_free(&msg);
5737 return -1;
5738 }
5739
5740 if (msg.p2p_device_addr)
5741 p2p_dev_addr = msg.p2p_device_addr;
5742 else if (msg.device_id)
5743 p2p_dev_addr = msg.device_id;
5744 else {
5745 p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
5746 p2p_parse_free(&msg);
5747 return -1;
5748 }
5749
5750 if (msg.oob_dev_password) {
5751 os_memcpy(params->oob_dev_pw, msg.oob_dev_password,
5752 msg.oob_dev_password_len);
5753 params->oob_dev_pw_len = msg.oob_dev_password_len;
5754 }
5755
5756 dev = p2p_create_device(p2p, p2p_dev_addr);
5757 if (dev == NULL) {
5758 p2p_parse_free(&msg);
5759 return -1;
5760 }
5761
5762 params->peer = &dev->info;
5763
5764 os_get_reltime(&dev->last_seen);
5765 dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
5766 p2p_copy_wps_info(p2p, dev, 0, &msg);
5767
5768 if (!msg.oob_go_neg_channel) {
5769 p2p_dbg(p2p, "OOB GO Negotiation Channel attribute not included");
5770 p2p_parse_free(&msg);
5771 return -1;
5772 }
5773
5774 if (msg.oob_go_neg_channel[3] == 0 &&
5775 msg.oob_go_neg_channel[4] == 0)
5776 freq = 0;
5777 else
5778 freq = p2p_channel_to_freq(msg.oob_go_neg_channel[3],
5779 msg.oob_go_neg_channel[4]);
5780 if (freq < 0) {
5781 p2p_dbg(p2p, "Unknown peer OOB GO Neg channel");
5782 p2p_parse_free(&msg);
5783 return -1;
5784 }
5785 role = msg.oob_go_neg_channel[5];
5786
5787 if (role == P2P_GO_IN_A_GROUP) {
5788 p2p_dbg(p2p, "Peer OOB GO operating channel: %u MHz", freq);
5789 params->go_freq = freq;
5790 } else if (role == P2P_CLIENT_IN_A_GROUP) {
5791 p2p_dbg(p2p, "Peer (client) OOB GO operating channel: %u MHz",
5792 freq);
5793 params->go_freq = freq;
5794 } else
5795 p2p_dbg(p2p, "Peer OOB GO Neg channel: %u MHz", freq);
5796 dev->oob_go_neg_freq = freq;
5797
5798 if (!params->sel && role != P2P_GO_IN_A_GROUP) {
5799 freq = p2p_channel_to_freq(p2p->cfg->reg_class,
5800 p2p->cfg->channel);
5801 if (freq < 0) {
5802 p2p_dbg(p2p, "Own listen channel not known");
5803 p2p_parse_free(&msg);
5804 return -1;
5805 }
5806 p2p_dbg(p2p, "Use own Listen channel as OOB GO Neg channel: %u MHz", freq);
5807 dev->oob_go_neg_freq = freq;
5808 }
5809
5810 if (msg.group_id) {
5811 os_memcpy(params->go_dev_addr, msg.group_id, ETH_ALEN);
5812 params->go_ssid_len = msg.group_id_len - ETH_ALEN;
5813 os_memcpy(params->go_ssid, msg.group_id + ETH_ALEN,
5814 params->go_ssid_len);
5815 }
5816
5817 if (dev->flags & P2P_DEV_USER_REJECTED) {
5818 p2p_dbg(p2p, "Do not report rejected device");
5819 p2p_parse_free(&msg);
5820 return 0;
5821 }
5822
5823 if (!(dev->flags & P2P_DEV_REPORTED)) {
5824 p2p->cfg->dev_found(p2p->cfg->cb_ctx, p2p_dev_addr, &dev->info,
5825 !(dev->flags & P2P_DEV_REPORTED_ONCE));
5826 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
5827 }
5828 p2p_parse_free(&msg);
5829
5830 if (role == P2P_GO_IN_A_GROUP && p2p->num_groups > 0)
5831 params->next_step = BOTH_GO;
5832 else if (role == P2P_GO_IN_A_GROUP)
5833 params->next_step = JOIN_GROUP;
5834 else if (role == P2P_CLIENT_IN_A_GROUP) {
5835 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
5836 params->next_step = PEER_CLIENT;
5837 } else if (p2p->num_groups > 0)
5838 params->next_step = AUTH_JOIN;
5839 else if (params->sel)
5840 params->next_step = INIT_GO_NEG;
5841 else
5842 params->next_step = RESP_GO_NEG;
5843
5844 return 0;
5845 }
5846
5847
p2p_set_authorized_oob_dev_pw_id(struct p2p_data * p2p,u16 dev_pw_id,int go_intent,const u8 * own_interface_addr)5848 void p2p_set_authorized_oob_dev_pw_id(struct p2p_data *p2p, u16 dev_pw_id,
5849 int go_intent,
5850 const u8 *own_interface_addr)
5851 {
5852
5853 p2p->authorized_oob_dev_pw_id = dev_pw_id;
5854 if (dev_pw_id == 0) {
5855 p2p_dbg(p2p, "NFC OOB Password unauthorized for static handover");
5856 return;
5857 }
5858
5859 p2p_dbg(p2p, "NFC OOB Password (id=%u) authorized for static handover",
5860 dev_pw_id);
5861
5862 p2p->go_intent = go_intent;
5863 os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
5864 }
5865
5866 #endif /* CONFIG_WPS_NFC */
5867
5868
p2p_set_passphrase_len(struct p2p_data * p2p,unsigned int len)5869 int p2p_set_passphrase_len(struct p2p_data *p2p, unsigned int len)
5870 {
5871 if (len < 8 || len > 63)
5872 return -1;
5873 p2p->cfg->passphrase_len = len;
5874 return 0;
5875 }
5876
5877
p2p_set_vendor_elems(struct p2p_data * p2p,struct wpabuf ** vendor_elem)5878 void p2p_set_vendor_elems(struct p2p_data *p2p, struct wpabuf **vendor_elem)
5879 {
5880 p2p->vendor_elem = vendor_elem;
5881 }
5882
5883
p2p_go_neg_wait_timeout(void * eloop_ctx,void * timeout_ctx)5884 void p2p_go_neg_wait_timeout(void *eloop_ctx, void *timeout_ctx)
5885 {
5886 struct p2p_data *p2p = eloop_ctx;
5887
5888 p2p_dbg(p2p,
5889 "Timeout on waiting peer to become ready for GO Negotiation");
5890 p2p_go_neg_failed(p2p, -1);
5891 }
5892
5893
p2p_set_own_pref_freq_list(struct p2p_data * p2p,const struct weighted_pcl * pref_freq_list,unsigned int size)5894 void p2p_set_own_pref_freq_list(struct p2p_data *p2p,
5895 const struct weighted_pcl *pref_freq_list,
5896 unsigned int size)
5897 {
5898 unsigned int i;
5899
5900 if (size > P2P_MAX_PREF_CHANNELS)
5901 size = P2P_MAX_PREF_CHANNELS;
5902 p2p->num_pref_freq = size;
5903 os_memcpy(p2p->pref_freq_list, pref_freq_list,
5904 size * sizeof(struct weighted_pcl));
5905 for (i = 0; i < size; i++) {
5906 p2p_dbg(p2p, "Own preferred frequency list[%u]=%u MHz",
5907 i, p2p->pref_freq_list[i].freq);
5908 }
5909 }
5910
5911
p2p_set_override_pref_op_chan(struct p2p_data * p2p,u8 op_class,u8 chan)5912 void p2p_set_override_pref_op_chan(struct p2p_data *p2p, u8 op_class,
5913 u8 chan)
5914 {
5915 p2p->override_pref_op_class = op_class;
5916 p2p->override_pref_channel = chan;
5917 }
5918
5919
p2p_build_probe_resp_template(struct p2p_data * p2p,unsigned int freq)5920 struct wpabuf * p2p_build_probe_resp_template(struct p2p_data *p2p,
5921 unsigned int freq)
5922 {
5923 struct wpabuf *ies, *buf;
5924 u8 addr[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
5925 int ret;
5926
5927 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
5928 if (!ies) {
5929 wpa_printf(MSG_ERROR,
5930 "CTRL: Failed to build Probe Response IEs");
5931 return NULL;
5932 }
5933
5934 buf = wpabuf_alloc(200 + wpabuf_len(ies));
5935 if (!buf) {
5936 wpabuf_free(ies);
5937 return NULL;
5938 }
5939
5940 ret = p2p_build_probe_resp_buf(p2p, buf, ies, addr, freq);
5941 wpabuf_free(ies);
5942 if (ret) {
5943 wpabuf_free(buf);
5944 return NULL;
5945 }
5946
5947 return buf;
5948 }
5949
5950
p2p_is_peer_6ghz_capab(struct p2p_data * p2p,const u8 * addr)5951 bool p2p_is_peer_6ghz_capab(struct p2p_data *p2p, const u8 *addr)
5952 {
5953 struct p2p_device *dev;
5954
5955 dev = p2p_get_device(p2p, addr);
5956 if (!dev)
5957 return false;
5958
5959 return dev->support_6ghz;
5960 }
5961
5962
p2p_set_6ghz_dev_capab(struct p2p_data * p2p,bool allow_6ghz)5963 void p2p_set_6ghz_dev_capab(struct p2p_data *p2p, bool allow_6ghz)
5964 {
5965 p2p->p2p_6ghz_capable = allow_6ghz;
5966 p2p->allow_6ghz = allow_6ghz;
5967 p2p_dbg(p2p, "Set 6 GHz capability to %d", allow_6ghz);
5968
5969 if (allow_6ghz)
5970 p2p->dev_capab |= P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5971 else
5972 p2p->dev_capab &= ~P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5973 }
5974
5975
is_p2p_6ghz_capable(struct p2p_data * p2p)5976 bool is_p2p_6ghz_capable(struct p2p_data *p2p)
5977 {
5978 return p2p->p2p_6ghz_capable;
5979 }
5980
5981
p2p_wfd_enabled(struct p2p_data * p2p)5982 bool p2p_wfd_enabled(struct p2p_data *p2p)
5983 {
5984 #ifdef CONFIG_WIFI_DISPLAY
5985 return p2p->wfd_ie_probe_req != NULL;
5986 #else /* CONFIG_WIFI_DISPLAY */
5987 return false;
5988 #endif /* CONFIG_WIFI_DISPLAY */
5989 }
5990
5991
p2p_peer_wfd_enabled(struct p2p_data * p2p,const u8 * peer_addr)5992 bool p2p_peer_wfd_enabled(struct p2p_data *p2p, const u8 *peer_addr)
5993 {
5994 #ifdef CONFIG_WIFI_DISPLAY
5995 struct p2p_device *dev;
5996
5997 dev = p2p_get_device(p2p, peer_addr);
5998 return dev && dev->info.wfd_subelems != NULL;
5999 #else /* CONFIG_WIFI_DISPLAY */
6000 return false;
6001 #endif /* CONFIG_WIFI_DISPLAY */
6002 }
6003
6004
is_p2p_allow_6ghz(struct p2p_data * p2p)6005 bool is_p2p_allow_6ghz(struct p2p_data *p2p)
6006 {
6007 return p2p->allow_6ghz;
6008 }
6009
6010
set_p2p_allow_6ghz(struct p2p_data * p2p,bool value)6011 void set_p2p_allow_6ghz(struct p2p_data *p2p, bool value)
6012 {
6013 p2p->allow_6ghz = value;
6014 }
6015
6016
p2p_derive_nonce_tag(struct p2p_data * p2p)6017 static int p2p_derive_nonce_tag(struct p2p_data *p2p)
6018 {
6019 u8 dira_nonce[DEVICE_IDENTITY_NONCE_LEN];
6020 u8 dira_tag[DEVICE_MAX_HASH_LEN];
6021 u8 data[DIR_STR_LEN + DEVICE_IDENTITY_NONCE_LEN + ETH_ALEN];
6022 struct p2p_id_key *dev_ik;
6023
6024 dev_ik = &p2p->pairing_info->dev_ik;
6025
6026 if (dev_ik->cipher_version != DIRA_CIPHER_VERSION_128) {
6027 wpa_printf(MSG_INFO,
6028 "P2P: Unsupported DIRA Cipher version = %d",
6029 dev_ik->cipher_version);
6030 return -1;
6031 }
6032
6033 if (dev_ik->dik_len != DEVICE_IDENTITY_KEY_LEN) {
6034 wpa_printf(MSG_INFO, "P2P: Invalid DIK length = %zu",
6035 dev_ik->dik_len);
6036 return -1;
6037 }
6038
6039 os_memset(data, 0, sizeof(data));
6040
6041 if (os_get_random(dira_nonce, DEVICE_IDENTITY_NONCE_LEN) < 0) {
6042 wpa_printf(MSG_ERROR, "P2P: Failed to generate DIRA nonce");
6043 return -1;
6044 }
6045
6046 /* Tag = Truncate-64(HMAC-SHA-256(DevIK,
6047 * "DIR" || P2P Device Address || Nonce))
6048 */
6049 os_memcpy(data, "DIR", DIR_STR_LEN);
6050 os_memcpy(&data[DIR_STR_LEN], p2p->cfg->dev_addr, ETH_ALEN);
6051 os_memcpy(&data[DIR_STR_LEN + ETH_ALEN], dira_nonce,
6052 DEVICE_IDENTITY_NONCE_LEN);
6053
6054 if (hmac_sha256(dev_ik->dik_data, dev_ik->dik_len, data, sizeof(data),
6055 dira_tag) < 0) {
6056 wpa_printf(MSG_ERROR, "P2P: Could not derive DIRA tag");
6057 return -1;
6058 }
6059
6060 dev_ik->dira_nonce_len = DEVICE_IDENTITY_NONCE_LEN;
6061 os_memcpy(dev_ik->dira_nonce, dira_nonce, DEVICE_IDENTITY_NONCE_LEN);
6062 dev_ik->dira_tag_len = DEVICE_IDENTITY_TAG_LEN;
6063 os_memcpy(dev_ik->dira_tag, dira_tag, DEVICE_IDENTITY_TAG_LEN);
6064
6065 wpa_hexdump_key(MSG_DEBUG, "P2P: DIK", dev_ik->dik_data,
6066 dev_ik->dik_len);
6067 wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-NONCE", dev_ik->dira_nonce,
6068 dev_ik->dira_nonce_len);
6069 wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-TAG", dev_ik->dira_tag,
6070 dev_ik->dira_tag_len);
6071 return 0;
6072 }
6073
6074
p2p_validate_dira(struct p2p_data * p2p,struct p2p_device * dev,const u8 * dira,u16 dira_len)6075 static int p2p_validate_dira(struct p2p_data *p2p, struct p2p_device *dev,
6076 const u8 *dira, u16 dira_len)
6077 {
6078 if (dira_len < 1 || dira[0] != DIRA_CIPHER_VERSION_128) {
6079 p2p_dbg(p2p, "Unsupported DIRA cipher version %d",
6080 dira[0]);
6081 return 0;
6082 }
6083
6084 if (dira_len < 1 + DEVICE_IDENTITY_NONCE_LEN + DEVICE_IDENTITY_TAG_LEN)
6085 {
6086 p2p_dbg(p2p, "Truncated DIRA (length %u)", dira_len);
6087 return 0;
6088 }
6089
6090 if (p2p->cfg->validate_dira) {
6091 const u8 *nonce = &dira[1];
6092 const u8 *tag = &dira[1 + DEVICE_IDENTITY_NONCE_LEN];
6093
6094 return p2p->cfg->validate_dira(p2p->cfg->cb_ctx,
6095 dev->info.p2p_device_addr,
6096 nonce, tag);
6097 }
6098
6099 return 0;
6100 }
6101
6102
p2p_usd_service_hash(struct p2p_data * p2p,const char * service_name)6103 void p2p_usd_service_hash(struct p2p_data *p2p, const char *service_name)
6104 {
6105 u8 buf[P2PS_HASH_LEN];
6106
6107 p2p->usd_service = false;
6108
6109 if (!service_name)
6110 return;
6111
6112 if (!p2ps_gen_hash(p2p, service_name, buf))
6113 return;
6114 p2p_dbg(p2p, "USD service %s hash " MACSTR,
6115 service_name, MAC2STR(buf));
6116 p2p->usd_service = true;
6117 os_memcpy(&p2p->p2p_service_hash, buf, P2PS_HASH_LEN);
6118 }
6119
6120
p2p_usd_elems(struct p2p_data * p2p)6121 struct wpabuf * p2p_usd_elems(struct p2p_data *p2p)
6122 {
6123 struct wpabuf *buf;
6124 u8 *len;
6125 u8 group_capab;
6126
6127 buf = wpabuf_alloc(1000);
6128 if (!buf)
6129 return NULL;
6130
6131 len = p2p_buf_add_ie_hdr(buf);
6132
6133 /* P2P Capability attribute */
6134 group_capab = 0;
6135 if (p2p->num_groups) {
6136 group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
6137 if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
6138 (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
6139 p2p->cross_connect)
6140 group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
6141 }
6142 if (p2p->cfg->p2p_intra_bss)
6143 group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
6144 p2p_buf_add_capability(buf, p2p->dev_capab &
6145 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
6146 group_capab);
6147
6148 /* P2P Device Info attribute */
6149 p2p_buf_add_device_info(buf, p2p, NULL);
6150
6151 p2p_buf_update_ie_hdr(buf, len);
6152
6153 len = p2p_buf_add_p2p2_ie_hdr(buf);
6154
6155 /* P2P Capability Extension attribute */
6156 p2p_buf_add_pcea(buf, p2p);
6157
6158 /* P2P Pairing Bootstrapping Method attribute */
6159 p2p_buf_add_pbma(buf, p2p->cfg->pairing_config.bootstrap_methods, NULL,
6160 0, 0);
6161
6162 /* P2P Device Identity Resolution attribute */
6163 if (p2p->pairing_info &&
6164 p2p->cfg->pairing_config.pairing_capable &&
6165 p2p->cfg->pairing_config.enable_pairing_cache &&
6166 p2p_derive_nonce_tag(p2p) == 0)
6167 p2p_buf_add_dira(buf, p2p);
6168
6169 p2p_buf_update_ie_hdr(buf, len);
6170
6171 return buf;
6172 }
6173
6174
p2p_process_usd_elems(struct p2p_data * p2p,const u8 * ies,u16 ies_len,const u8 * peer_addr,unsigned int freq)6175 void p2p_process_usd_elems(struct p2p_data *p2p, const u8 *ies, u16 ies_len,
6176 const u8 *peer_addr, unsigned int freq)
6177 {
6178 struct p2p_device *dev;
6179 struct p2p_message msg;
6180 const u8 *p2p_dev_addr;
6181
6182 os_memset(&msg, 0, sizeof(msg));
6183 if (p2p_parse_ies(ies, ies_len, &msg)) {
6184 p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
6185 p2p_parse_free(&msg);
6186 return;
6187 }
6188 if (msg.p2p_device_addr)
6189 p2p_dev_addr = msg.p2p_device_addr;
6190 else
6191 p2p_dev_addr = peer_addr;
6192
6193 dev = p2p_create_device(p2p, p2p_dev_addr);
6194 if (!dev) {
6195 p2p_parse_free(&msg);
6196 p2p_dbg(p2p, "Failed to add a peer P2P Device");
6197 return;
6198 }
6199
6200 dev->p2p2 = true;
6201 /* Reset info from old IEs */
6202 dev->info.reg_info = 0;
6203 os_memset(&dev->info.pairing_config, 0,
6204 sizeof(struct p2p_pairing_config));
6205
6206 os_get_reltime(&dev->last_seen);
6207 dev->listen_freq = freq;
6208 dev->oper_freq = freq;
6209
6210 if (msg.capability) {
6211 /*
6212 * P2P Client Discoverability bit is reserved in all frames
6213 * that use this function, so do not change its value here.
6214 */
6215 dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6216 dev->info.dev_capab |= msg.capability[0] &
6217 ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6218 dev->info.group_capab = msg.capability[1];
6219 }
6220
6221 if (msg.pcea_info && msg.pcea_info_len >= 2)
6222 p2p_process_pcea(p2p, &msg, dev);
6223
6224 if (msg.pbma_info && msg.pbma_info_len == 2)
6225 dev->info.pairing_config.bootstrap_methods =
6226 WPA_GET_LE16(msg.pbma_info);
6227
6228 if (!ether_addr_equal(peer_addr, p2p_dev_addr))
6229 os_memcpy(dev->interface_addr, peer_addr, ETH_ALEN);
6230
6231 if (msg.dira && msg.dira_len) {
6232 dev->info.nonce_tag_valid = false;
6233 dev->info.dik_id = p2p_validate_dira(p2p, dev, msg.dira,
6234 msg.dira_len);
6235 if (dev->info.dik_id) {
6236 os_memcpy(dev->info.nonce, &msg.dira[1],
6237 DEVICE_IDENTITY_NONCE_LEN);
6238 os_memcpy(dev->info.tag,
6239 &msg.dira[1 + DEVICE_IDENTITY_NONCE_LEN],
6240 DEVICE_IDENTITY_TAG_LEN);
6241 dev->info.pairing_config.dik_cipher = msg.dira[0];
6242 dev->info.nonce_tag_valid = true;
6243 }
6244 }
6245
6246 p2p_dbg(p2p, "Updated device entry based on USD frame: " MACSTR
6247 " dev_capab=0x%x group_capab=0x%x listen_freq=%d",
6248 MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
6249 dev->info.group_capab, dev->listen_freq);
6250
6251 p2p->cfg->dev_found(p2p->cfg->cb_ctx, dev->info.p2p_device_addr,
6252 &dev->info, !(dev->flags & P2P_DEV_REPORTED_ONCE));
6253 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
6254
6255 p2p_parse_free(&msg);
6256 }
6257
6258
p2p_get_dik_id(struct p2p_data * p2p,const u8 * peer)6259 int p2p_get_dik_id(struct p2p_data *p2p, const u8 *peer)
6260 {
6261 struct p2p_device *dev;
6262
6263 dev = p2p_get_device(p2p, peer);
6264 if (!dev)
6265 return 0;
6266
6267 return dev->info.dik_id;
6268 }
6269
6270
6271 #ifdef CONFIG_PASN
6272
p2p_config_sae_password(struct p2p_data * p2p,const char * pw)6273 int p2p_config_sae_password(struct p2p_data *p2p, const char *pw)
6274 {
6275 os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
6276 if (os_strlen(pw) >= sizeof(p2p->dev_sae_password))
6277 return -1;
6278
6279 os_strlcpy(p2p->dev_sae_password, pw, sizeof(p2p->dev_sae_password));
6280 return 0;
6281 }
6282
6283
p2p_prepare_pasn_extra_ie(struct p2p_data * p2p,struct wpabuf * extra_ies,const struct wpabuf * frame,bool add_dira)6284 static int p2p_prepare_pasn_extra_ie(struct p2p_data *p2p,
6285 struct wpabuf *extra_ies,
6286 const struct wpabuf *frame, bool add_dira)
6287 {
6288 struct wpabuf *buf, *buf2;
6289 size_t len;
6290
6291 len = 100;
6292 if (frame)
6293 len += wpabuf_len(frame);
6294 buf = wpabuf_alloc(len);
6295 if (!buf)
6296 return -1;
6297
6298 /* P2P Capability Extension attribute */
6299 p2p_buf_add_pcea(buf, p2p);
6300
6301 if (add_dira) {
6302 /* Device Identity Resolution attribute */
6303 p2p_buf_add_dira(buf, p2p);
6304 }
6305
6306 if (frame) {
6307 p2p_dbg(p2p, "Add Action frame wrapper for PASN");
6308 wpabuf_put_u8(buf, P2P_ATTR_ACTION_FRAME_WRAPPER);
6309 wpabuf_put_le16(buf, wpabuf_len(frame));
6310 wpabuf_put_buf(buf, frame);
6311 }
6312
6313 buf2 = p2p_encaps_ie(buf, P2P2_IE_VENDOR_TYPE);
6314 wpabuf_free(buf);
6315
6316 if (wpabuf_tailroom(extra_ies) < wpabuf_len(buf2)) {
6317 p2p_err(p2p, "Not enough room for P2P2 IE in PASN extra IEs");
6318 wpabuf_free(buf2);
6319 return -1;
6320 }
6321 wpabuf_put_buf(extra_ies, buf2);
6322 wpabuf_free(buf2);
6323
6324 return 0;
6325 }
6326
6327
p2p_pasn_service_hash(struct p2p_data * p2p,struct wpabuf * extra_ies)6328 static struct wpabuf * p2p_pasn_service_hash(struct p2p_data *p2p,
6329 struct wpabuf *extra_ies)
6330 {
6331 struct wpabuf *buf;
6332 u8 *ie_len = NULL;
6333
6334 if (!p2p->usd_service)
6335 return extra_ies;
6336
6337 p2p_dbg(p2p, "Add P2P2 USD service hash in extra IE");
6338 buf = wpabuf_alloc(100);
6339 if (!buf) {
6340 wpabuf_free(extra_ies);
6341 return NULL;
6342 }
6343
6344 ie_len = p2p_buf_add_ie_hdr(buf);
6345 p2p_buf_add_usd_service_hash(buf, p2p);
6346 p2p_buf_update_ie_hdr(buf, ie_len);
6347
6348 return wpabuf_concat(buf, extra_ies);
6349 }
6350
6351
p2p_pairing_generate_rsnxe(struct p2p_data * p2p,int akmp)6352 static struct wpabuf * p2p_pairing_generate_rsnxe(struct p2p_data *p2p,
6353 int akmp)
6354 {
6355 u32 capab;
6356 size_t flen = 0;
6357 struct wpabuf *buf;
6358
6359 capab = BIT(WLAN_RSNX_CAPAB_KEK_IN_PASN);
6360
6361 if (wpa_key_mgmt_sae(akmp))
6362 capab |= BIT(WLAN_RSNX_CAPAB_SAE_H2E);
6363
6364 while (capab >> flen * 8)
6365 flen++;
6366
6367 buf = wpabuf_alloc(2 + flen);
6368 if (!buf)
6369 return NULL;
6370
6371 if (wpabuf_tailroom(buf) < 2 + flen) {
6372 p2p_dbg(p2p, "wpabuf tail room too small");
6373 wpabuf_free(buf);
6374 return NULL;
6375 }
6376 capab |= flen - 1; /* bit 0-3 = Field length (n - 1) */
6377
6378 p2p_dbg(p2p, "RSNXE capabilities: %04x", capab);
6379 wpabuf_put_u8(buf, WLAN_EID_RSNX);
6380 wpabuf_put_u8(buf, flen);
6381 while (flen--) {
6382 wpabuf_put_u8(buf, (capab & 0xff));
6383 capab = capab >> 8;
6384 }
6385 return buf;
6386 }
6387
6388
6389 /* SSID used for deriving SAE pt for pairing */
6390 #define P2P_PAIRING_SSID "516F9A020000"
6391
p2p_pairing_set_password(struct pasn_data * pasn,u8 pasn_type,const char * passphrase)6392 static void p2p_pairing_set_password(struct pasn_data *pasn, u8 pasn_type,
6393 const char *passphrase)
6394 {
6395 int pasn_groups[4] = { 0 };
6396 size_t len;
6397
6398 if (!passphrase)
6399 return;
6400
6401 len = os_strlen(passphrase);
6402
6403 if (pasn_type & 0xc && pasn_type & 0x3) {
6404 pasn_groups[0] = 20;
6405 pasn_groups[1] = 19;
6406 } else if (pasn_type & 0xc) {
6407 pasn_groups[0] = 20;
6408 } else {
6409 pasn_groups[0] = 19;
6410 }
6411 pasn->pt = sae_derive_pt(pasn_groups, (const u8 *) P2P_PAIRING_SSID,
6412 os_strlen(P2P_PAIRING_SSID),
6413 (const u8 *) passphrase, len, NULL);
6414 /* Set passphrase for pairing responder to validate PASN auth 1 frame */
6415 pasn->password = passphrase;
6416 }
6417
6418
p2p_pasn_initialize(struct p2p_data * p2p,struct p2p_device * dev,const u8 * addr,int freq,bool verify,bool derive_kek)6419 void p2p_pasn_initialize(struct p2p_data *p2p, struct p2p_device *dev,
6420 const u8 *addr, int freq, bool verify, bool derive_kek)
6421 {
6422 struct pasn_data *pasn;
6423 struct wpabuf *rsnxe;
6424
6425 if (!p2p || !dev)
6426 return;
6427
6428 if (dev->pasn) {
6429 wpa_pasn_reset(dev->pasn);
6430 } else {
6431 dev->pasn = pasn_data_init();
6432 if (!dev->pasn)
6433 return;
6434 }
6435
6436 pasn = dev->pasn;
6437
6438 os_memcpy(pasn->own_addr, p2p->cfg->dev_addr, ETH_ALEN);
6439 os_memcpy(pasn->peer_addr, addr, ETH_ALEN);
6440
6441 os_memcpy(pasn->bssid, dev->role == P2P_ROLE_PAIRING_INITIATOR ?
6442 pasn->peer_addr : pasn->own_addr, ETH_ALEN);
6443
6444 pasn->noauth = 1;
6445
6446 if ((p2p->cfg->pairing_config.pasn_type & 0xc) &&
6447 (dev->info.pairing_config.pasn_type & 0xc)) {
6448 pasn->group = 20;
6449 pasn->cipher = WPA_CIPHER_GCMP_256;
6450 pasn->kek_len = 32;
6451 pasn->derive_kek = true;
6452 } else {
6453 pasn->group = 19;
6454 pasn->cipher = WPA_CIPHER_CCMP;
6455 pasn->kek_len = 16;
6456 pasn->derive_kek = true;
6457 }
6458
6459 if (!derive_kek) {
6460 pasn->derive_kek = false;
6461 pasn->kek_len = 0;
6462 }
6463
6464 if (dev->password[0]) {
6465 pasn->akmp = WPA_KEY_MGMT_SAE;
6466 p2p_pairing_set_password(pasn,
6467 p2p->cfg->pairing_config.pasn_type,
6468 dev->password);
6469 } else if (verify) {
6470 pasn->akmp = WPA_KEY_MGMT_SAE;
6471 } else {
6472 pasn->akmp = WPA_KEY_MGMT_PASN;
6473 }
6474
6475 pasn->rsn_pairwise = pasn->cipher;
6476 pasn->wpa_key_mgmt = pasn->akmp;
6477
6478 rsnxe = p2p_pairing_generate_rsnxe(p2p, pasn->akmp);
6479 if (rsnxe) {
6480 os_free(pasn->rsnxe_ie);
6481 pasn->rsnxe_ie = os_memdup(wpabuf_head_u8(rsnxe),
6482 wpabuf_len(rsnxe));
6483 if (!pasn->rsnxe_ie) {
6484 wpabuf_free(rsnxe);
6485 return;
6486 }
6487 wpabuf_free(rsnxe);
6488 }
6489
6490 if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
6491 pasn->pmksa = p2p->initiator_pmksa;
6492 else
6493 pasn->pmksa = p2p->responder_pmksa;
6494
6495 pasn->cb_ctx = p2p->cfg->cb_ctx;
6496 pasn->send_mgmt = p2p->cfg->pasn_send_mgmt;
6497 pasn->prepare_data_element = p2p->cfg->prepare_data_element;
6498 pasn->parse_data_element = p2p->cfg->parse_data_element;
6499 pasn->validate_custom_pmkid = p2p->cfg->pasn_validate_pmkid;
6500
6501 pasn->freq = freq;
6502 }
6503
6504
p2p_get_listen_freq(struct p2p_data * p2p,const u8 * peer_addr)6505 int p2p_get_listen_freq(struct p2p_data *p2p, const u8 *peer_addr)
6506 {
6507 int freq;
6508 struct p2p_device *dev;
6509
6510 if (!peer_addr) {
6511 p2p_dbg(p2p, "Peer address NULL");
6512 return -1;
6513 }
6514
6515 dev = p2p_get_device(p2p, peer_addr);
6516 if (!dev) {
6517 p2p_dbg(p2p, "Peer not known");
6518 return -1;
6519 }
6520
6521 freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6522 if (freq <= 0)
6523 freq = dev->oob_go_neg_freq;
6524 if (freq <= 0) {
6525 p2p_dbg(p2p, "No listen/operating frequency known for the peer "
6526 MACSTR, MAC2STR(dev->info.p2p_device_addr));
6527 return -1;
6528 }
6529 return freq;
6530 }
6531
6532
p2p_initiate_pasn_verify(struct p2p_data * p2p,const u8 * peer_addr,int freq,enum p2p_invite_role role,const u8 * bssid,const u8 * ssid,size_t ssid_len,unsigned int force_freq,const u8 * go_dev_addr,unsigned int pref_freq)6533 int p2p_initiate_pasn_verify(struct p2p_data *p2p, const u8 *peer_addr,
6534 int freq, enum p2p_invite_role role,
6535 const u8 *bssid, const u8 *ssid, size_t ssid_len,
6536 unsigned int force_freq, const u8 *go_dev_addr,
6537 unsigned int pref_freq)
6538 {
6539 struct pasn_data *pasn;
6540 struct p2p_device *dev;
6541 struct wpabuf *extra_ies, *req;
6542 int ret = 0;
6543 u8 *pasn_extra_ies = NULL;
6544 u8 pmkid[PMKID_LEN];
6545
6546 if (!peer_addr) {
6547 p2p_dbg(p2p, "Peer address NULL");
6548 return -1;
6549 }
6550
6551 dev = p2p_get_device(p2p, peer_addr);
6552 if (!dev) {
6553 p2p_dbg(p2p, "Peer not known");
6554 return -1;
6555 }
6556
6557 if (p2p_invite(p2p, peer_addr, role, bssid, ssid, ssid_len, force_freq,
6558 go_dev_addr, 1, pref_freq, -1, 1)) {
6559 p2p_dbg(p2p, "p2p_invite() failed");
6560 return -1;
6561 }
6562
6563 dev->role = P2P_ROLE_PAIRING_INITIATOR;
6564 p2p_pasn_initialize(p2p, dev, peer_addr, freq, true, true);
6565 pasn = dev->pasn;
6566
6567 req = p2p_build_invitation_req(p2p, dev, go_dev_addr, -1);
6568 if (!req)
6569 return -1;
6570
6571 p2p_set_state(p2p, P2P_INVITE);
6572 p2p->pending_action_state = P2P_PENDING_INVITATION_REQUEST;
6573 p2p->invite_peer = dev;
6574 dev->invitation_reqs++;
6575
6576 extra_ies = wpabuf_alloc(1500);
6577 if (!extra_ies) {
6578 wpabuf_free(req);
6579 p2p_dbg(p2p, "Memory allocation failed for extra_ies");
6580 return -1;
6581 }
6582
6583 if (os_get_random(pmkid, PMKID_LEN) < 0) {
6584 wpabuf_free(req);
6585 wpabuf_free(extra_ies);
6586 return -1;
6587 }
6588 wpa_hexdump(MSG_DEBUG,
6589 "P2P2: Use new random PMKID for pairing verification",
6590 pmkid, PMKID_LEN);
6591 pasn_set_custom_pmkid(pasn, pmkid);
6592
6593 if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, true)) {
6594 p2p_dbg(p2p, "Prepare PASN extra IEs failed");
6595 ret = -1;
6596 goto out;
6597 }
6598
6599 extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6600 if (!extra_ies)
6601 goto out;
6602
6603 pasn_extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6604 wpabuf_len(extra_ies));
6605 if (!pasn_extra_ies) {
6606 p2p_dbg(p2p, "Memory allocation failed for PASN extra IEs");
6607 ret = -1;
6608 goto out;
6609 }
6610
6611 pasn->extra_ies = pasn_extra_ies;
6612 pasn->extra_ies_len = wpabuf_len(extra_ies);
6613
6614 /* Start PASN verify */
6615 if (wpa_pasn_verify(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6616 pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6617 NULL, 0, NULL, 0, NULL)) {
6618 p2p_dbg(p2p, "PASN verify failed");
6619 ret = -1;
6620 } else {
6621 dev->flags |= P2P_DEV_WAIT_INV_REQ_ACK;
6622 }
6623 out:
6624 pasn->extra_ies = NULL;
6625 pasn->extra_ies_len = 0;
6626 os_free(pasn_extra_ies);
6627 wpabuf_free(req);
6628 wpabuf_free(extra_ies);
6629 return ret;
6630 }
6631
6632
p2p_initiate_pasn_auth(struct p2p_data * p2p,const u8 * addr,int freq)6633 int p2p_initiate_pasn_auth(struct p2p_data *p2p, const u8 *addr, int freq)
6634 {
6635 struct pasn_data *pasn;
6636 struct p2p_device *dev;
6637 struct wpabuf *extra_ies, *req;
6638 u8 *ies = NULL;
6639 int ret = 0;
6640 size_t ies_len;
6641
6642 if (!addr) {
6643 p2p_dbg(p2p, "Peer address NULL");
6644 return -1;
6645 }
6646
6647 dev = p2p_get_device(p2p, addr);
6648 if (!dev) {
6649 p2p_dbg(p2p, "Peer not known");
6650 return -1;
6651 }
6652
6653 if (freq == 0)
6654 freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6655
6656 dev->role = P2P_ROLE_PAIRING_INITIATOR;
6657 p2p_pasn_initialize(p2p, dev, addr, freq, false, true);
6658 pasn = dev->pasn;
6659
6660 pasn_initiator_pmksa_cache_remove(pasn->pmksa, (u8 *)addr);
6661
6662 req = p2p_build_go_neg_req(p2p, dev);
6663 if (!req)
6664 return -1;
6665
6666 p2p->go_neg_peer = dev;
6667 dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
6668
6669 extra_ies = wpabuf_alloc(1500);
6670 if (!extra_ies) {
6671 wpabuf_free(req);
6672 return -1;
6673 }
6674
6675 if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, false)) {
6676 p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6677 ret = -1;
6678 goto out;
6679 }
6680
6681 extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6682 if (!extra_ies)
6683 goto out;
6684
6685 ies_len = wpabuf_len(extra_ies);
6686 ies = os_memdup(wpabuf_head_u8(extra_ies), ies_len);
6687 if (!ies) {
6688 ret = -1;
6689 goto out;
6690 }
6691
6692 pasn->extra_ies = ies;
6693 pasn->extra_ies_len = ies_len;
6694
6695 /* Start PASN authentication */
6696 if (wpas_pasn_start(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6697 pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6698 NULL, 0, NULL, 0, NULL)) {
6699 p2p_dbg(p2p, "Failed to start PASN");
6700 ret = -1;
6701 }
6702 out:
6703 os_free(ies);
6704 pasn->extra_ies = NULL;
6705 pasn->extra_ies_len = 0;
6706 wpabuf_free(req);
6707 wpabuf_free(extra_ies);
6708 return ret;
6709 }
6710
6711
p2p_pasn_handle_action_wrapper(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq,int trans_seq)6712 static int p2p_pasn_handle_action_wrapper(struct p2p_data *p2p,
6713 struct p2p_device *dev,
6714 const struct ieee80211_mgmt *mgmt,
6715 size_t len, int freq, int trans_seq)
6716 {
6717 const u8 *ies;
6718 size_t ies_len;
6719 size_t data_len = 0;
6720 bool derive_kek;
6721 const u8 *data = NULL;
6722 struct p2p_message msg;
6723 struct ieee802_11_elems elems;
6724
6725 ies = mgmt->u.auth.variable;
6726 ies_len = len - offsetof(struct ieee80211_mgmt, u.auth.variable);
6727
6728 os_memset(&msg, 0, sizeof(msg));
6729 if (p2p_parse_ies(ies, ies_len, &msg)) {
6730 p2p_dbg(p2p,
6731 "Failed to parse P2P IE from PASN Authentication frame");
6732 p2p_parse_free(&msg);
6733 return -1;
6734 }
6735
6736 if (msg.action_frame_wrapper && msg.action_frame_wrapper_len) {
6737 data = msg.action_frame_wrapper;
6738 data_len = msg.action_frame_wrapper_len;
6739 if (data_len >= 2 &&
6740 data[0] == WLAN_ACTION_PUBLIC &&
6741 data[1] == WLAN_PA_VENDOR_SPECIFIC) {
6742 data += 2;
6743 data_len -= 2;
6744 if (data_len < 4 ||
6745 WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE) {
6746 p2p_parse_free(&msg);
6747 return -1;
6748 }
6749 data += 4;
6750 data_len -= 4;
6751 } else {
6752 p2p_dbg(p2p,
6753 "Invalid category in Action frame wrapper in Authentication frame seq %d",
6754 trans_seq);
6755 p2p_parse_free(&msg);
6756 return -1;
6757 }
6758 }
6759
6760 if (trans_seq == 1) {
6761 if (ieee802_11_parse_elems(mgmt->u.auth.variable,
6762 len - offsetof(struct ieee80211_mgmt,
6763 u.auth.variable),
6764 &elems, 0) == ParseFailed) {
6765 wpa_printf(MSG_DEBUG,
6766 "PASN: Failed parsing Authentication frame");
6767 return -1;
6768 }
6769 derive_kek = ieee802_11_rsnx_capab_len(
6770 elems.rsnxe, elems.rsnxe_len,
6771 WLAN_RSNX_CAPAB_KEK_IN_PASN);
6772 if (data && data_len >= 1 && data[0] == P2P_INVITATION_REQ) {
6773 struct wpabuf *resp;
6774
6775 resp = p2p_process_invitation_req(p2p, mgmt->sa,
6776 data + 1,
6777 data_len - 1, freq,
6778 true);
6779 if (!resp)
6780 p2p_dbg(p2p, "No Invitation Response found");
6781
6782 dev->role = P2P_ROLE_PAIRING_RESPONDER;
6783 p2p_pasn_initialize(p2p, dev, mgmt->sa, freq, true,
6784 derive_kek);
6785 wpabuf_free(dev->action_frame_wrapper);
6786 dev->action_frame_wrapper = resp;
6787 if (msg.dira && msg.dira_len &&
6788 p2p_validate_dira(p2p, dev, msg.dira,
6789 msg.dira_len)) {
6790 struct wpa_ie_data rsn_data;
6791
6792 if (wpa_parse_wpa_ie_rsn(elems.rsn_ie - 2,
6793 elems.rsn_ie_len + 2,
6794 &rsn_data) == 0 &&
6795 rsn_data.num_pmkid)
6796 pasn_set_custom_pmkid(dev->pasn,
6797 rsn_data.pmkid);
6798 }
6799 } else if (data && data_len >= 1 && data[0] == P2P_GO_NEG_REQ) {
6800 struct wpabuf *resp;
6801
6802 if (!derive_kek) {
6803 p2p_dbg(p2p, "KEK-in-PASN not set in RSNXE");
6804 return -1;
6805 }
6806 resp = p2p_process_go_neg_req(p2p, mgmt->sa, data + 1,
6807 data_len - 1, freq, true);
6808 if (!resp)
6809 p2p_dbg(p2p,
6810 "No GO Negotiation Response found");
6811 wpabuf_free(dev->action_frame_wrapper);
6812 dev->action_frame_wrapper = resp;
6813 } else {
6814 p2p_dbg(p2p, "Invalid action frame wrapper in Auth1");
6815 }
6816 } else if (trans_seq == 2) {
6817 if (data && data_len >= 1 && data[0] == P2P_INVITATION_RESP) {
6818 p2p_process_invitation_resp(p2p, mgmt->sa, data + 1,
6819 data_len - 1);
6820 wpabuf_free(dev->action_frame_wrapper);
6821 dev->action_frame_wrapper = NULL;
6822 } else if (data && data_len >= 1 &&
6823 data[0] == P2P_GO_NEG_RESP) {
6824 struct wpabuf *conf;
6825
6826 conf = p2p_process_go_neg_resp(p2p, mgmt->sa, data + 1,
6827 data_len - 1, freq,
6828 true);
6829 if (!conf)
6830 p2p_dbg(p2p, "No GO Negotiation Confirm found");
6831 wpabuf_free(dev->action_frame_wrapper);
6832 dev->action_frame_wrapper = conf;
6833 } else {
6834 p2p_dbg(p2p, "Invalid action frame wrapper in Auth2");
6835 }
6836 } else if (trans_seq == 3) {
6837 if (data && data_len >= 1 && data[0] == P2P_GO_NEG_CONF)
6838 p2p_handle_go_neg_conf(p2p, mgmt->sa, data + 1,
6839 data_len - 1, true);
6840 else
6841 p2p_invitation_resp_cb(p2p, mgmt->sa,
6842 P2P_SEND_ACTION_SUCCESS);
6843 }
6844 p2p_parse_free(&msg);
6845 return 0;
6846 }
6847
6848
p2p_pasn_add_encrypted_data(struct p2p_data * p2p,struct p2p_device * dev,struct wpabuf * buf)6849 static int p2p_pasn_add_encrypted_data(struct p2p_data *p2p,
6850 struct p2p_device *dev,
6851 struct wpabuf *buf)
6852 {
6853 struct pasn_data *pasn;
6854 struct wpabuf *p2p2_ie;
6855 u8 *dika_len, *p2p2_ie_len;
6856 int ret;
6857
6858 if (!p2p || !dev || !dev->pasn)
6859 return 0;
6860
6861 pasn = dev->pasn;
6862
6863 if (dev->req_bootstrap_method != P2P_PBMA_OPPORTUNISTIC &&
6864 !p2p->pairing_info->enable_pairing_cache)
6865 return 0;
6866
6867 p2p2_ie = wpabuf_alloc(100);
6868 if (!p2p2_ie)
6869 return -1;
6870
6871 p2p2_ie_len = p2p_buf_add_p2p2_ie_hdr(p2p2_ie);
6872
6873 if (p2p->pairing_info->enable_pairing_cache) {
6874 wpabuf_put_u8(p2p2_ie, P2P_ATTR_DEVICE_IDENTITY_KEY);
6875 dika_len = wpabuf_put(p2p2_ie, 2);
6876
6877 wpabuf_put_u8(p2p2_ie,
6878 p2p->pairing_info->dev_ik.cipher_version);
6879 wpabuf_put_data(p2p2_ie, p2p->pairing_info->dev_ik.dik_data,
6880 p2p->pairing_info->dev_ik.dik_len);
6881 wpabuf_put_be32(p2p2_ie, p2p->pairing_info->dev_ik.expiration);
6882
6883 WPA_PUT_LE16(dika_len,
6884 (u8 *) wpabuf_put(p2p2_ie, 0) - dika_len - 2);
6885 }
6886
6887 if (dev->req_bootstrap_method == P2P_PBMA_OPPORTUNISTIC) {
6888 if (!p2p->dev_sae_password[0]) {
6889 int password_len;
6890
6891 /* SAE password is not available as the request is not
6892 * for an existing GO. Pick a random SAE password of
6893 * length between 10 and 20. */
6894 password_len = 10 + os_random() % 10;
6895 if (p2p_random(p2p->dev_sae_password,
6896 password_len) < 0) {
6897 wpabuf_free(p2p2_ie);
6898 return -1;
6899 }
6900 p2p->dev_sae_password[password_len] = '\0';
6901 }
6902
6903 wpabuf_put_u8(p2p2_ie, P2P_ATTR_PASSWORD);
6904 wpabuf_put_le16(p2p2_ie, os_strlen(p2p->dev_sae_password));
6905 wpabuf_put_str(p2p2_ie, p2p->dev_sae_password);
6906 }
6907
6908 p2p_buf_update_ie_hdr(p2p2_ie, p2p2_ie_len);
6909
6910 ret = pasn_add_encrypted_data(pasn, buf, wpabuf_mhead_u8(p2p2_ie),
6911 wpabuf_len(p2p2_ie));
6912 wpabuf_free(p2p2_ie);
6913 return ret;
6914 }
6915
6916
p2p_prepare_data_element(struct p2p_data * p2p,const u8 * peer_addr)6917 int p2p_prepare_data_element(struct p2p_data *p2p, const u8 *peer_addr)
6918 {
6919 int ret = -1;
6920 struct p2p_device *dev;
6921 struct pasn_data *pasn;
6922 struct wpabuf *extra_ies;
6923
6924 if (!p2p)
6925 return -1;
6926
6927 dev = p2p_get_device(p2p, peer_addr);
6928 if (!dev || !dev->pasn) {
6929 p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
6930 MAC2STR(peer_addr));
6931 return -1;
6932 }
6933 pasn = dev->pasn;
6934
6935 extra_ies = wpabuf_alloc(1500);
6936 if (!extra_ies ||
6937 p2p_prepare_pasn_extra_ie(p2p, extra_ies,
6938 dev->action_frame_wrapper, false)) {
6939 p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6940 goto out;
6941 }
6942
6943 if (p2p_pasn_add_encrypted_data(p2p, dev, extra_ies) < 0)
6944 p2p_dbg(p2p, "Failed to add PASN encrypted elements");
6945
6946 pasn->extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6947 wpabuf_len(extra_ies));
6948 if (!pasn->extra_ies)
6949 goto out;
6950 pasn->extra_ies_len = wpabuf_len(extra_ies);
6951 ret = 0;
6952
6953 out:
6954 wpabuf_free(extra_ies);
6955 wpabuf_free(dev->action_frame_wrapper);
6956 dev->action_frame_wrapper = NULL;
6957
6958 return ret;
6959 }
6960
6961
p2p_parse_data_element(struct p2p_data * p2p,const u8 * data,size_t len)6962 int p2p_parse_data_element(struct p2p_data *p2p, const u8 *data, size_t len)
6963 {
6964 u8 attr_id;
6965 const u8 *pos, *next;
6966 u16 rem_len, attr_len;
6967
6968 if (!p2p || !data || !len)
6969 return -1;
6970
6971 pos = data;
6972 rem_len = len;
6973
6974 if (rem_len < 6 ||
6975 pos[0] != WLAN_EID_VENDOR_SPECIFIC ||
6976 pos[1] < 4 ||
6977 rem_len < 2 + pos[1] ||
6978 WPA_GET_BE32(&pos[2]) != P2P2_IE_VENDOR_TYPE) {
6979 p2p_dbg(p2p,
6980 "P2P: P2P2 IE not present in PASN Encrypted Data element");
6981 return -1;
6982 }
6983
6984 pos += 6;
6985 rem_len -= 6;
6986
6987 while (rem_len >= 3) {
6988 attr_id = *pos++;
6989 attr_len = WPA_GET_LE16(pos);
6990 pos += 2;
6991 rem_len -= 3;
6992 if (rem_len < attr_len)
6993 return -1;
6994 next = pos + attr_len;
6995 rem_len -= attr_len;
6996
6997 switch (attr_id) {
6998 case P2P_ATTR_DEVICE_IDENTITY_KEY:
6999 if (attr_len < 1) {
7000 p2p_dbg(p2p,
7001 "Too short Device Identity Key attribute");
7002 return -1;
7003 }
7004 p2p->dik_cipher_version = *pos++;
7005 attr_len--;
7006 if (p2p->dik_cipher_version ==
7007 DIRA_CIPHER_VERSION_128) {
7008 if (attr_len < DEVICE_IDENTITY_KEY_LEN) {
7009 p2p_dbg(p2p, "Too short DevIK");
7010 return -1;
7011 }
7012 os_memcpy(p2p->peer_dik_data, pos,
7013 DEVICE_IDENTITY_KEY_LEN);
7014 p2p->peer_dik_len = DEVICE_IDENTITY_KEY_LEN;
7015 pos += DEVICE_IDENTITY_KEY_LEN;
7016 attr_len -= DEVICE_IDENTITY_KEY_LEN;
7017 } else {
7018 p2p_dbg(p2p,
7019 "Unsupported cipher version %u in Device Identity Key attribute",
7020 p2p->dik_cipher_version);
7021 return -1;
7022 }
7023 if (attr_len < 4) {
7024 p2p_dbg(p2p,
7025 "Not enough room for DevIK lifetime");
7026 return -1;
7027 }
7028 p2p->peer_dik_lifetime = WPA_GET_BE32(pos);
7029 p2p_dbg(p2p,
7030 "Received peer DevIK of length %zu octets and lifetime %u",
7031 p2p->peer_dik_len, p2p->peer_dik_lifetime);
7032 break;
7033 case P2P_ATTR_PASSWORD:
7034 if (attr_len < 1 ||
7035 attr_len > sizeof(p2p->peer_sae_password) - 1) {
7036 p2p_dbg(p2p,
7037 "P2P: Invalid password length %d",
7038 attr_len);
7039 return -1;
7040 }
7041 os_memset(p2p->peer_sae_password, 0,
7042 sizeof(p2p->peer_sae_password));
7043 os_memcpy(p2p->peer_sae_password, pos, attr_len);
7044 break;
7045 default:
7046 p2p_dbg(p2p,
7047 "Unsupported Attribute ID %u in P2P2 IE in PASN Encrypted Data element",
7048 attr_id);
7049 break;
7050 }
7051 pos = next;
7052 }
7053
7054 return 0;
7055 }
7056
7057
p2p_validate_custom_pmkid(struct p2p_data * p2p,struct p2p_device * dev,const u8 * pmkid)7058 static int p2p_validate_custom_pmkid(struct p2p_data *p2p,
7059 struct p2p_device *dev, const u8 *pmkid)
7060 {
7061 if (dev->pasn->custom_pmkid_valid &&
7062 os_memcmp(dev->pasn->custom_pmkid, pmkid, PMKID_LEN) == 0) {
7063 p2p_dbg(p2p, "Customized PMKID valid");
7064 return 0;
7065 }
7066 return -1;
7067 }
7068
7069
p2p_pasn_pmksa_get_pmk(struct p2p_data * p2p,const u8 * addr,u8 * pmkid,u8 * pmk,size_t * pmk_len)7070 static int p2p_pasn_pmksa_get_pmk(struct p2p_data *p2p, const u8 *addr,
7071 u8 *pmkid, u8 *pmk, size_t *pmk_len)
7072 {
7073 struct p2p_device *dev;
7074
7075 dev = p2p_get_device(p2p, addr);
7076 if (!dev) {
7077 p2p_dbg(p2p, "PASN: Peer not found " MACSTR, MAC2STR(addr));
7078 return -1;
7079 }
7080
7081 if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
7082 return pasn_initiator_pmksa_cache_get(p2p->initiator_pmksa,
7083 addr, pmkid, pmk,
7084 pmk_len);
7085 else
7086 return pasn_responder_pmksa_cache_get(p2p->responder_pmksa,
7087 addr, pmkid, pmk,
7088 pmk_len);
7089 }
7090
7091
p2p_pasn_validate_and_update_pmkid(struct p2p_data * p2p,const u8 * addr,const u8 * rsn_pmkid)7092 int p2p_pasn_validate_and_update_pmkid(struct p2p_data *p2p, const u8 *addr,
7093 const u8 *rsn_pmkid)
7094 {
7095 size_t pmk_len;
7096 u8 pmkid[PMKID_LEN];
7097 u8 pmk[PMK_LEN_MAX];
7098 struct p2p_device *dev;
7099
7100 if (!p2p)
7101 return -1;
7102
7103 dev = p2p_get_device(p2p, addr);
7104 if (!dev || !dev->pasn) {
7105 p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7106 MAC2STR(addr));
7107 return -1;
7108 }
7109
7110 if (p2p_validate_custom_pmkid(p2p, dev, rsn_pmkid))
7111 return -1;
7112
7113 if (p2p_pasn_pmksa_get_pmk(p2p, addr, pmkid, pmk, &pmk_len)) {
7114 p2p_dbg(p2p, "P2P PASN: Failed to get PMK from cache");
7115 return -1;
7116 }
7117
7118 p2p_pasn_pmksa_set_pmk(p2p, p2p->cfg->dev_addr, addr, pmk, pmk_len,
7119 rsn_pmkid);
7120 return 0;
7121 }
7122
7123
p2p_pasn_auth_tx_status(struct p2p_data * p2p,const u8 * data,size_t data_len,bool acked,bool verify)7124 int p2p_pasn_auth_tx_status(struct p2p_data *p2p, const u8 *data,
7125 size_t data_len, bool acked, bool verify)
7126 {
7127 int ret = 0;
7128 struct p2p_device *dev;
7129 struct pasn_data *pasn;
7130 const struct ieee80211_mgmt *mgmt =
7131 (const struct ieee80211_mgmt *) data;
7132
7133 if (!p2p)
7134 return -1;
7135
7136 dev = p2p_get_device(p2p, mgmt->da);
7137 if (!dev || !dev->pasn) {
7138 p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7139 MAC2STR(mgmt->da));
7140 return -1;
7141 }
7142
7143 pasn = dev->pasn;
7144
7145 ret = wpa_pasn_auth_tx_status(pasn, data, data_len, acked);
7146 if (ret != 1 && !acked && pasn->frame)
7147 return pasn->send_mgmt(pasn->cb_ctx, wpabuf_head(pasn->frame),
7148 wpabuf_len(pasn->frame), 0, pasn->freq,
7149 1000);
7150
7151 wpabuf_free(pasn->frame);
7152 pasn->frame = NULL;
7153
7154 if (ret != 1)
7155 return ret;
7156
7157 if (verify && dev == p2p->invite_peer)
7158 p2p_start_invitation_connect(p2p, dev);
7159 else if (dev == p2p->go_neg_peer)
7160 p2p_go_complete(p2p, dev);
7161
7162 return 0;
7163 }
7164
7165
p2p_handle_pasn_auth(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7166 static int p2p_handle_pasn_auth(struct p2p_data *p2p, struct p2p_device *dev,
7167 const struct ieee80211_mgmt *mgmt, size_t len,
7168 int freq)
7169 {
7170 struct pasn_data *pasn;
7171 u8 pasn_type;
7172 int pasn_groups[4] = { 0 };
7173 u16 auth_alg, auth_transaction, status_code;
7174
7175 if (!p2p || !dev || !dev->pasn)
7176 return -1;
7177
7178 if (os_memcmp(mgmt->da, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
7179 p2p_dbg(p2p, "PASN Responder: Not our frame");
7180 return -1;
7181 }
7182
7183 if (len < offsetof(struct ieee80211_mgmt, u.auth.variable))
7184 return -1;
7185
7186 pasn = dev->pasn;
7187 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
7188 status_code = le_to_host16(mgmt->u.auth.status_code);
7189
7190 auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7191
7192 if (status_code != WLAN_STATUS_SUCCESS &&
7193 status_code != WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) {
7194 p2p_dbg(p2p, "PASN: Authentication rejected - status=%u",
7195 status_code);
7196 return -1;
7197 }
7198
7199 if (auth_alg != WLAN_AUTH_PASN || auth_transaction == 2) {
7200 p2p_dbg(p2p,
7201 "PASN Responder: Not a PASN frame or unexpected Authentication frame, auth_alg=%d",
7202 auth_alg);
7203 return -1;
7204 }
7205 if (auth_transaction == 1) {
7206 pasn_type = p2p->cfg->pairing_config.pasn_type;
7207 if (pasn_type & 0xc && pasn_type & 0x3) {
7208 pasn_groups[0] = 20;
7209 pasn_groups[1] = 19;
7210 } else if (pasn_type & 0xc) {
7211 pasn_groups[0] = 20;
7212 } else {
7213 pasn_groups[0] = 19;
7214 }
7215 pasn->pasn_groups = pasn_groups;
7216
7217 if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7218 auth_transaction)) {
7219 p2p_dbg(p2p,
7220 "PASN Responder: Handle Auth 1 action wrapper failed");
7221 return -1;
7222 }
7223 if (handle_auth_pasn_1(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7224 len, false) < 0) {
7225 p2p_dbg(p2p,
7226 "PASN Responder: Handle Auth 1 failed");
7227 return -1;
7228 }
7229 } else if (auth_transaction == 3) {
7230 if (handle_auth_pasn_3(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7231 len) < 0) {
7232 p2p_dbg(p2p,
7233 "PASN Responder: Handle Auth 3 failed");
7234 return -1;
7235 }
7236 #ifdef CONFIG_TESTING_OPTIONS
7237 p2p_pasn_store_ptk(p2p, &pasn->ptk);
7238 #endif /* CONFIG_TESTING_OPTIONS */
7239 if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7240 auth_transaction)) {
7241 p2p_dbg(p2p,
7242 "PASN Responder: Handle Auth 3 action wrapper failed");
7243 /* Drop keying material from a failed pairing attempt */
7244 os_memset(p2p->peer_dik_data, 0,
7245 sizeof(p2p->peer_dik_data));
7246 os_memset(p2p->peer_sae_password, 0,
7247 sizeof(p2p->peer_sae_password));
7248 return -1;
7249 }
7250 forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7251 }
7252 return 0;
7253 }
7254
7255
p2p_pasn_auth_rx(struct p2p_data * p2p,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7256 int p2p_pasn_auth_rx(struct p2p_data *p2p, const struct ieee80211_mgmt *mgmt,
7257 size_t len, int freq)
7258 {
7259 int ret = 0;
7260 u8 auth_transaction;
7261 struct p2p_device *dev;
7262 struct pasn_data *pasn;
7263 struct wpa_pasn_params_data pasn_data;
7264
7265 dev = p2p_get_device(p2p, mgmt->sa);
7266 if (!dev) {
7267 p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
7268 MAC2STR(mgmt->sa));
7269 return -1;
7270 }
7271
7272 if (!dev->pasn) {
7273 p2p_dbg(p2p, "PASN: Uninitialized");
7274 return -1;
7275 }
7276
7277 pasn = dev->pasn;
7278
7279 wpabuf_free(pasn->frame);
7280 pasn->frame = NULL;
7281
7282 pasn_register_callbacks(pasn, p2p->cfg->cb_ctx,
7283 p2p->cfg->pasn_send_mgmt,
7284 p2p->cfg->pasn_validate_pmkid);
7285 auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7286
7287 if (dev->role == P2P_ROLE_PAIRING_INITIATOR && auth_transaction == 2) {
7288 if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7289 auth_transaction)) {
7290 p2p_dbg(p2p,
7291 "PASN Initiator: Handle Auth 2 action wrapper failed");
7292 return -1;
7293 }
7294 ret = wpa_pasn_auth_rx(pasn, (const u8 *) mgmt, len,
7295 &pasn_data);
7296 if (ret < 0) {
7297 p2p_dbg(p2p, "PASN: wpa_pasn_auth_rx() failed");
7298 dev->role = P2P_ROLE_IDLE;
7299 }
7300 #ifdef CONFIG_TESTING_OPTIONS
7301 p2p_pasn_store_ptk(p2p, &pasn->ptk);
7302 #endif /* CONFIG_TESTING_OPTIONS */
7303 forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7304 } else {
7305 ret = p2p_handle_pasn_auth(p2p, dev, mgmt, len, freq);
7306 }
7307 return ret;
7308 }
7309
7310
p2p_pasn_pmksa_set_pmk(struct p2p_data * p2p,const u8 * src,const u8 * dst,const u8 * pmk,size_t pmk_len,const u8 * pmkid)7311 void p2p_pasn_pmksa_set_pmk(struct p2p_data *p2p, const u8 *src, const u8 *dst,
7312 const u8 *pmk, size_t pmk_len, const u8 *pmkid)
7313 {
7314 pasn_initiator_pmksa_cache_add(p2p->initiator_pmksa, src, dst, pmk,
7315 pmk_len, pmkid);
7316 pasn_responder_pmksa_cache_add(p2p->responder_pmksa, src, dst, pmk,
7317 pmk_len, pmkid);
7318 }
7319
7320
7321 #ifdef CONFIG_TESTING_OPTIONS
7322
p2p_pasn_store_ptk(struct p2p_data * p2p,struct wpa_ptk * ptk)7323 void p2p_pasn_store_ptk(struct p2p_data *p2p, struct wpa_ptk *ptk)
7324 {
7325 u8 *pos;
7326
7327 if (ptk->ptk_len > sizeof(p2p->pasn_ptk)) {
7328 p2p_dbg(p2p, "P2P PASN PTK exceeds: (len=%ld)", ptk->ptk_len);
7329 return;
7330 }
7331
7332 pos = p2p->pasn_ptk;
7333 p2p->pasn_ptk_len = ptk->ptk_len;
7334 if (ptk->kck_len) {
7335 os_memcpy(pos, ptk->kck, ptk->kck_len);
7336 pos += ptk->kck_len;
7337 }
7338 if (ptk->kek_len) {
7339 os_memcpy(pos, ptk->kek, ptk->kek_len);
7340 pos += ptk->kek_len;
7341 }
7342 if (ptk->tk_len) {
7343 os_memcpy(pos, ptk->tk, ptk->tk_len);
7344 pos += ptk->tk_len;
7345 }
7346 if (ptk->kdk_len) {
7347 os_memcpy(pos, ptk->kdk, ptk->kdk_len);
7348 pos += ptk->kdk_len;
7349 }
7350 }
7351
7352
p2p_pasn_get_ptk(struct p2p_data * p2p,const u8 ** buf,size_t * buf_len)7353 int p2p_pasn_get_ptk(struct p2p_data *p2p, const u8 **buf, size_t *buf_len)
7354 {
7355 if (!p2p || !p2p->pasn_ptk_len)
7356 return -1;
7357
7358 *buf_len = p2p->pasn_ptk_len;
7359 *buf = p2p->pasn_ptk;
7360 return 0;
7361 }
7362
7363 #endif /* CONFIG_TESTING_OPTIONS */
7364
7365 #endif /* CONFIG_PASN */
7366
7367
p2p_get_dira_info(struct p2p_data * p2p,char * buf,size_t buflen)7368 int p2p_get_dira_info(struct p2p_data *p2p, char *buf, size_t buflen)
7369 {
7370 int res;
7371 char *pos, *end;
7372 struct p2p_id_key *dev_ik;
7373
7374 if (!p2p->pairing_info ||
7375 !p2p->cfg->pairing_config.pairing_capable ||
7376 !p2p->cfg->pairing_config.enable_pairing_cache)
7377 return 0;
7378
7379 if (p2p_derive_nonce_tag(p2p))
7380 return 0;
7381
7382 pos = buf;
7383 end = buf + buflen;
7384 dev_ik = &p2p->pairing_info->dev_ik;
7385
7386 res = os_snprintf(pos, end - pos, MACSTR,
7387 MAC2STR(p2p->cfg->dev_addr));
7388 if (os_snprintf_error(end - pos, res))
7389 return pos - buf;
7390 pos += res;
7391
7392 res = os_snprintf(pos, end - pos, " ");
7393 if (os_snprintf_error(end - pos, res))
7394 return pos - buf;
7395 pos += res;
7396
7397 pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_nonce,
7398 dev_ik->dira_nonce_len);
7399
7400 res = os_snprintf(pos, end - pos, " ");
7401 if (os_snprintf_error(end - pos, res))
7402 return pos - buf;
7403 pos += res;
7404
7405 pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_tag,
7406 dev_ik->dira_tag_len);
7407
7408 res = os_snprintf(pos, end - pos, "\n");
7409 if (os_snprintf_error(end - pos, res))
7410 return pos - buf;
7411 pos += res;
7412
7413 return pos - buf;
7414 }
7415