• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Wi-Fi Direct - P2P module
3  * Copyright (c) 2009-2010, Atheros Communications
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include <log/log.h>
12 #include "common.h"
13 #include "eloop.h"
14 #include "common/defs.h"
15 #include "common/ieee802_11_defs.h"
16 #include "common/ieee802_11_common.h"
17 #include "common/wpa_common.h"
18 #include "common/wpa_ctrl.h"
19 #include "common/sae.h"
20 #include "crypto/sha256.h"
21 #include "crypto/sha384.h"
22 #include "crypto/crypto.h"
23 #include "pasn/pasn_common.h"
24 #include "wps/wps_i.h"
25 #include "p2p_i.h"
26 #include "p2p.h"
27 
28 
29 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
30 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
31 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
32 				     const u8 *sa, const u8 *data, size_t len,
33 				     int rx_freq);
34 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
35 				      const u8 *sa, const u8 *data,
36 				      size_t len);
37 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
38 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
39 
40 
41 /*
42  * p2p_scan recovery timeout
43  *
44  * Many drivers are using 30 second timeout on scan results. Allow a bit larger
45  * timeout for this to avoid hitting P2P timeout unnecessarily.
46  */
47 #define P2P_SCAN_TIMEOUT 35
48 
49 /**
50  * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
51  * entries will be removed
52  */
53 #ifndef P2P_PEER_EXPIRATION_AGE
54 #define P2P_PEER_EXPIRATION_AGE 60
55 #endif /* P2P_PEER_EXPIRATION_AGE */
56 
57 
p2p_expire_peers(struct p2p_data * p2p)58 void p2p_expire_peers(struct p2p_data *p2p)
59 {
60 	struct p2p_device *dev, *n;
61 	struct os_reltime now;
62 	size_t i;
63 
64 	os_get_reltime(&now);
65 	dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
66 		if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
67 			continue;
68 
69 		if (dev == p2p->go_neg_peer) {
70 			/*
71 			 * GO Negotiation is in progress with the peer, so
72 			 * don't expire the peer entry until GO Negotiation
73 			 * fails or times out.
74 			 */
75 			continue;
76 		}
77 
78 		if (p2p->cfg->go_connected &&
79 		    p2p->cfg->go_connected(p2p->cfg->cb_ctx,
80 					   dev->info.p2p_device_addr)) {
81 			/*
82 			 * We are connected as a client to a group in which the
83 			 * peer is the GO, so do not expire the peer entry.
84 			 */
85 			os_get_reltime(&dev->last_seen);
86 			continue;
87 		}
88 
89 		for (i = 0; i < p2p->num_groups; i++) {
90 			if (p2p_group_is_client_connected(
91 				    p2p->groups[i], dev->info.p2p_device_addr))
92 				break;
93 		}
94 		if (i < p2p->num_groups) {
95 			/*
96 			 * The peer is connected as a client in a group where
97 			 * we are the GO, so do not expire the peer entry.
98 			 */
99 			os_get_reltime(&dev->last_seen);
100 			continue;
101 		}
102 
103 		p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
104 			MAC2STR(dev->info.p2p_device_addr));
105 		dl_list_del(&dev->list);
106 		p2p_device_free(p2p, dev);
107 	}
108 }
109 
110 
p2p_state_txt(int state)111 static const char * p2p_state_txt(int state)
112 {
113 	switch (state) {
114 	case P2P_IDLE:
115 		return "IDLE";
116 	case P2P_SEARCH:
117 		return "SEARCH";
118 	case P2P_CONNECT:
119 		return "CONNECT";
120 	case P2P_CONNECT_LISTEN:
121 		return "CONNECT_LISTEN";
122 	case P2P_GO_NEG:
123 		return "GO_NEG";
124 	case P2P_LISTEN_ONLY:
125 		return "LISTEN_ONLY";
126 	case P2P_WAIT_PEER_CONNECT:
127 		return "WAIT_PEER_CONNECT";
128 	case P2P_WAIT_PEER_IDLE:
129 		return "WAIT_PEER_IDLE";
130 	case P2P_SD_DURING_FIND:
131 		return "SD_DURING_FIND";
132 	case P2P_PROVISIONING:
133 		return "PROVISIONING";
134 	case P2P_PD_DURING_FIND:
135 		return "PD_DURING_FIND";
136 	case P2P_INVITE:
137 		return "INVITE";
138 	case P2P_INVITE_LISTEN:
139 		return "INVITE_LISTEN";
140 	default:
141 		return "?";
142 	}
143 }
144 
145 
p2p_get_state_txt(struct p2p_data * p2p)146 const char * p2p_get_state_txt(struct p2p_data *p2p)
147 {
148 	return p2p_state_txt(p2p->state);
149 }
150 
151 
p2p_get_p2ps_adv_list(struct p2p_data * p2p)152 struct p2ps_advertisement * p2p_get_p2ps_adv_list(struct p2p_data *p2p)
153 {
154 	return p2p ? p2p->p2ps_adv_list : NULL;
155 }
156 
157 
p2p_set_intended_addr(struct p2p_data * p2p,const u8 * intended_addr)158 void p2p_set_intended_addr(struct p2p_data *p2p, const u8 *intended_addr)
159 {
160 	if (p2p && intended_addr)
161 		os_memcpy(p2p->intended_addr, intended_addr, ETH_ALEN);
162 }
163 
164 
p2p_get_provisioning_info(struct p2p_data * p2p,const u8 * addr)165 u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
166 {
167 	struct p2p_device *dev = NULL;
168 
169 	if (!addr || !p2p)
170 		return 0;
171 
172 	dev = p2p_get_device(p2p, addr);
173 	if (dev)
174 		return dev->wps_prov_info;
175 	else
176 		return 0;
177 }
178 
179 
p2p_clear_provisioning_info(struct p2p_data * p2p,const u8 * addr)180 void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *addr)
181 {
182 	struct p2p_device *dev = NULL;
183 
184 	if (!addr || !p2p)
185 		return;
186 
187 	dev = p2p_get_device(p2p, addr);
188 	if (dev)
189 		dev->wps_prov_info = 0;
190 }
191 
192 
p2p_set_state(struct p2p_data * p2p,int new_state)193 void p2p_set_state(struct p2p_data *p2p, int new_state)
194 {
195 	p2p_dbg(p2p, "State %s -> %s",
196 		p2p_state_txt(p2p->state), p2p_state_txt(new_state));
197 	p2p->state = new_state;
198 
199 	if (new_state == P2P_IDLE && p2p->pending_channel) {
200 		p2p_dbg(p2p, "Apply change in listen channel");
201 		p2p->cfg->reg_class = p2p->pending_reg_class;
202 		p2p->cfg->channel = p2p->pending_channel;
203 		p2p->pending_reg_class = 0;
204 		p2p->pending_channel = 0;
205 	}
206 }
207 
208 
p2p_set_timeout(struct p2p_data * p2p,unsigned int sec,unsigned int usec)209 void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
210 {
211 	p2p_dbg(p2p, "Set timeout (state=%s): %u.%06u sec",
212 		p2p_state_txt(p2p->state), sec, usec);
213 	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
214 	eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
215 }
216 
217 
p2p_clear_timeout(struct p2p_data * p2p)218 void p2p_clear_timeout(struct p2p_data *p2p)
219 {
220 	p2p_dbg(p2p, "Clear timeout (state=%s)", p2p_state_txt(p2p->state));
221 	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
222 }
223 
224 
p2p_go_neg_failed(struct p2p_data * p2p,int status)225 void p2p_go_neg_failed(struct p2p_data *p2p, int status)
226 {
227 	struct p2p_go_neg_results res;
228 	struct p2p_device *peer = p2p->go_neg_peer;
229 
230 	if (!peer)
231 		return;
232 
233 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
234 	if (p2p->state != P2P_SEARCH) {
235 		/*
236 		 * Clear timeouts related to GO Negotiation if no new p2p_find
237 		 * has been started.
238 		 */
239 		p2p_clear_timeout(p2p);
240 		p2p_set_state(p2p, P2P_IDLE);
241 	}
242 
243 	peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
244 	peer->wps_method = WPS_NOT_READY;
245 	peer->oob_pw_id = 0;
246 	wpabuf_free(peer->go_neg_conf);
247 	peer->go_neg_conf = NULL;
248 	p2p->go_neg_peer = NULL;
249 
250 #ifdef CONFIG_PASN
251 	if (peer->p2p2 && peer->pasn)
252 		wpa_pasn_reset(peer->pasn);
253 	os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
254 	os_memset(p2p->peer_sae_password, 0, sizeof(p2p->peer_sae_password));
255 #endif /* CONFIG_PASN */
256 
257 	os_memset(&res, 0, sizeof(res));
258 	res.status = status;
259 	res.p2p2 = peer->p2p2;
260 	os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
261 	os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
262 	p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
263 }
264 
265 
p2p_listen_in_find(struct p2p_data * p2p,int dev_disc)266 static void p2p_listen_in_find(struct p2p_data *p2p, int dev_disc)
267 {
268 	unsigned int r, tu;
269 	int freq;
270 	struct wpabuf *ies;
271 
272 	p2p_dbg(p2p, "Starting short listen state (state=%s)",
273 		p2p_state_txt(p2p->state));
274 
275 	if (p2p->pending_listen_freq) {
276 		/* We have a pending p2p_listen request */
277 		p2p_dbg(p2p, "p2p_listen command pending already");
278 		return;
279 	}
280 
281 	freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
282 	if (freq < 0) {
283 		p2p_dbg(p2p, "Unknown regulatory class/channel");
284 		return;
285 	}
286 
287 	if (os_get_random((u8 *) &r, sizeof(r)) < 0)
288 		r = 0;
289 	tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
290 	      p2p->min_disc_int) * 100;
291 	if (p2p->max_disc_tu >= 0 && tu > (unsigned int) p2p->max_disc_tu)
292 		tu = p2p->max_disc_tu;
293 	if (!dev_disc && tu < 100)
294 		tu = 100; /* Need to wait in non-device discovery use cases */
295 	if (p2p->cfg->max_listen && 1024 * tu / 1000 > p2p->cfg->max_listen)
296 		tu = p2p->cfg->max_listen * 1000 / 1024;
297 
298 	if (tu == 0) {
299 		p2p_dbg(p2p, "Skip listen state since duration was 0 TU");
300 		p2p_set_timeout(p2p, 0, 0);
301 		return;
302 	}
303 
304 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
305 	if (ies == NULL)
306 		return;
307 
308 	p2p->pending_listen_freq = freq;
309 	p2p->pending_listen_sec = 0;
310 	p2p->pending_listen_usec = 1024 * tu;
311 
312 	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
313 		    ies) < 0) {
314 		p2p_dbg(p2p, "Failed to start listen mode");
315 		p2p->pending_listen_freq = 0;
316 	} else {
317 		p2p->pending_listen_wait_drv = true;
318 	}
319 	wpabuf_free(ies);
320 }
321 
322 
p2p_listen(struct p2p_data * p2p,unsigned int timeout)323 int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
324 {
325 	int freq;
326 	struct wpabuf *ies;
327 
328 	p2p_dbg(p2p, "Going to listen(only) state");
329 
330 	if (p2p->pending_listen_freq) {
331 		/* We have a pending p2p_listen request */
332 		p2p_dbg(p2p, "p2p_listen command pending already");
333 		return -1;
334 	}
335 
336 	freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
337 	if (freq < 0) {
338 		p2p_dbg(p2p, "Unknown regulatory class/channel");
339 		return -1;
340 	}
341 
342 	p2p->pending_listen_sec = timeout / 1000;
343 	p2p->pending_listen_usec = (timeout % 1000) * 1000;
344 
345 	if (p2p->p2p_scan_running) {
346 		if (p2p->start_after_scan == P2P_AFTER_SCAN_CONNECT) {
347 			p2p_dbg(p2p, "p2p_scan running - connect is already pending - skip listen");
348 			return 0;
349 		}
350 		p2p_dbg(p2p, "p2p_scan running - delay start of listen state");
351 		p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
352 		return 0;
353 	}
354 
355 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
356 	if (ies == NULL)
357 		return -1;
358 
359 	p2p->pending_listen_freq = freq;
360 
361 	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
362 		p2p_dbg(p2p, "Failed to start listen mode");
363 		p2p->pending_listen_freq = 0;
364 		wpabuf_free(ies);
365 		return -1;
366 	}
367 	p2p->pending_listen_wait_drv = true;
368 	wpabuf_free(ies);
369 
370 	p2p_set_state(p2p, P2P_LISTEN_ONLY);
371 
372 	return 0;
373 }
374 
375 
p2p_device_clear_reported(struct p2p_data * p2p)376 static void p2p_device_clear_reported(struct p2p_data *p2p)
377 {
378 	struct p2p_device *dev;
379 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
380 		dev->flags &= ~P2P_DEV_REPORTED;
381 		dev->sd_reqs = 0;
382 	}
383 }
384 
385 
386 /**
387  * p2p_get_device - Fetch a peer entry
388  * @p2p: P2P module context from p2p_init()
389  * @addr: P2P Device Address of the peer
390  * Returns: Pointer to the device entry or %NULL if not found
391  */
p2p_get_device(struct p2p_data * p2p,const u8 * addr)392 struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
393 {
394 	struct p2p_device *dev;
395 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
396 		if (ether_addr_equal(dev->info.p2p_device_addr, addr))
397 			return dev;
398 	}
399 	return NULL;
400 }
401 
402 
403 /**
404  * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
405  * @p2p: P2P module context from p2p_init()
406  * @addr: P2P Interface Address of the peer
407  * Returns: Pointer to the device entry or %NULL if not found
408  */
p2p_get_device_interface(struct p2p_data * p2p,const u8 * addr)409 struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
410 					     const u8 *addr)
411 {
412 	struct p2p_device *dev;
413 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
414 		if (ether_addr_equal(dev->interface_addr, addr))
415 			return dev;
416 	}
417 	return NULL;
418 }
419 
420 
421 /**
422  * p2p_create_device - Create a peer entry
423  * @p2p: P2P module context from p2p_init()
424  * @addr: P2P Device Address of the peer
425  * Returns: Pointer to the device entry or %NULL on failure
426  *
427  * If there is already an entry for the peer, it will be returned instead of
428  * creating a new one.
429  */
p2p_create_device(struct p2p_data * p2p,const u8 * addr)430 static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
431 					     const u8 *addr)
432 {
433 	struct p2p_device *dev, *oldest = NULL;
434 	size_t count = 0;
435 
436 	dev = p2p_get_device(p2p, addr);
437 	if (dev)
438 		return dev;
439 
440 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
441 		count++;
442 		if (oldest == NULL ||
443 		    os_reltime_before(&dev->last_seen, &oldest->last_seen))
444 			oldest = dev;
445 	}
446 	if (count + 1 > p2p->cfg->max_peers && oldest) {
447 		p2p_dbg(p2p,
448 			"Remove oldest peer entry to make room for a new peer "
449 			MACSTR, MAC2STR(oldest->info.p2p_device_addr));
450 		dl_list_del(&oldest->list);
451 		p2p_device_free(p2p, oldest);
452 	}
453 
454 	dev = os_zalloc(sizeof(*dev));
455 	if (dev == NULL)
456 		return NULL;
457 	dl_list_add(&p2p->devices, &dev->list);
458 	os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
459 	dev->support_6ghz = false;
460 
461 	return dev;
462 }
463 
464 
p2p_copy_client_info(struct p2p_device * dev,struct p2p_client_info * cli)465 static void p2p_copy_client_info(struct p2p_device *dev,
466 				 struct p2p_client_info *cli)
467 {
468 	p2p_copy_filter_devname(dev->info.device_name,
469 				sizeof(dev->info.device_name),
470 				cli->dev_name, cli->dev_name_len);
471 	dev->info.dev_capab = cli->dev_capab;
472 	dev->info.config_methods = cli->config_methods;
473 	os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
474 	dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
475 	if (dev->info.wps_sec_dev_type_list_len > WPS_SEC_DEV_TYPE_MAX_LEN) {
476 		android_errorWriteLog(0x534e4554, "172937525");
477 		dev->info.wps_sec_dev_type_list_len = WPS_SEC_DEV_TYPE_MAX_LEN;
478 	}
479 	os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
480 		  dev->info.wps_sec_dev_type_list_len);
481 }
482 
483 
p2p_add_group_clients(struct p2p_data * p2p,const u8 * go_dev_addr,const u8 * go_interface_addr,int freq,const u8 * gi,size_t gi_len,struct os_reltime * rx_time)484 static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
485 				 const u8 *go_interface_addr, int freq,
486 				 const u8 *gi, size_t gi_len,
487 				 struct os_reltime *rx_time)
488 {
489 	struct p2p_group_info info;
490 	size_t c;
491 	struct p2p_device *dev;
492 
493 	if (gi == NULL)
494 		return 0;
495 
496 	if (p2p_group_info_parse(gi, gi_len, &info) < 0)
497 		return -1;
498 
499 	/*
500 	 * Clear old data for this group; if the devices are still in the
501 	 * group, the information will be restored in the loop following this.
502 	 */
503 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
504 		if (ether_addr_equal(dev->member_in_go_iface,
505 				     go_interface_addr)) {
506 			os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
507 			os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
508 		}
509 	}
510 
511 	for (c = 0; c < info.num_clients; c++) {
512 		struct p2p_client_info *cli = &info.client[c];
513 		if (ether_addr_equal(cli->p2p_device_addr, p2p->cfg->dev_addr))
514 			continue; /* ignore our own entry */
515 		dev = p2p_get_device(p2p, cli->p2p_device_addr);
516 		if (dev) {
517 			if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
518 					  P2P_DEV_PROBE_REQ_ONLY)) {
519 				/*
520 				 * Update information since we have not
521 				 * received this directly from the client.
522 				 */
523 				p2p_copy_client_info(dev, cli);
524 			} else {
525 				/*
526 				 * Need to update P2P Client Discoverability
527 				 * flag since it is valid only in P2P Group
528 				 * Info attribute.
529 				 */
530 				dev->info.dev_capab &=
531 					~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
532 				dev->info.dev_capab |=
533 					cli->dev_capab &
534 					P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
535 			}
536 			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
537 				dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
538 			}
539 		} else {
540 			dev = p2p_create_device(p2p, cli->p2p_device_addr);
541 			if (dev == NULL)
542 				continue;
543 			dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
544 			p2p_copy_client_info(dev, cli);
545 			dev->oper_freq = freq;
546 			p2p->cfg->dev_found(p2p->cfg->cb_ctx,
547 					    dev->info.p2p_device_addr,
548 					    &dev->info, 1);
549 			dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
550 		}
551 
552 		os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
553 			  ETH_ALEN);
554 		os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
555 		os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
556 		os_memcpy(dev->member_in_go_iface, go_interface_addr,
557 			  ETH_ALEN);
558 		dev->flags |= P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT;
559 	}
560 
561 	return 0;
562 }
563 
564 
p2p_copy_wps_info(struct p2p_data * p2p,struct p2p_device * dev,int probe_req,const struct p2p_message * msg)565 static void p2p_copy_wps_info(struct p2p_data *p2p, struct p2p_device *dev,
566 			      int probe_req, const struct p2p_message *msg)
567 {
568 	os_memcpy(dev->info.device_name, msg->device_name,
569 		  sizeof(dev->info.device_name));
570 
571 	if (msg->manufacturer &&
572 	    msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
573 		os_memset(dev->info.manufacturer, 0,
574 			  sizeof(dev->info.manufacturer));
575 		os_memcpy(dev->info.manufacturer, msg->manufacturer,
576 			  msg->manufacturer_len);
577 	}
578 
579 	if (msg->model_name &&
580 	    msg->model_name_len < sizeof(dev->info.model_name)) {
581 		os_memset(dev->info.model_name, 0,
582 			  sizeof(dev->info.model_name));
583 		os_memcpy(dev->info.model_name, msg->model_name,
584 			  msg->model_name_len);
585 	}
586 
587 	if (msg->model_number &&
588 	    msg->model_number_len < sizeof(dev->info.model_number)) {
589 		os_memset(dev->info.model_number, 0,
590 			  sizeof(dev->info.model_number));
591 		os_memcpy(dev->info.model_number, msg->model_number,
592 			  msg->model_number_len);
593 	}
594 
595 	if (msg->serial_number &&
596 	    msg->serial_number_len < sizeof(dev->info.serial_number)) {
597 		os_memset(dev->info.serial_number, 0,
598 			  sizeof(dev->info.serial_number));
599 		os_memcpy(dev->info.serial_number, msg->serial_number,
600 			  msg->serial_number_len);
601 	}
602 
603 	if (msg->pri_dev_type)
604 		os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
605 			  sizeof(dev->info.pri_dev_type));
606 	else if (msg->wps_pri_dev_type)
607 		os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
608 			  sizeof(dev->info.pri_dev_type));
609 
610 	if (msg->wps_sec_dev_type_list) {
611 		os_memcpy(dev->info.wps_sec_dev_type_list,
612 			  msg->wps_sec_dev_type_list,
613 			  msg->wps_sec_dev_type_list_len);
614 		dev->info.wps_sec_dev_type_list_len =
615 			msg->wps_sec_dev_type_list_len;
616 	}
617 
618 	if (msg->capability) {
619 		/*
620 		 * P2P Client Discoverability bit is reserved in all frames
621 		 * that use this function, so do not change its value here.
622 		 */
623 		dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
624 		dev->info.dev_capab |= msg->capability[0] &
625 			~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
626 		dev->info.group_capab = msg->capability[1];
627 	}
628 
629 	p2p_update_peer_6ghz_capab(dev, msg);
630 
631 	if (msg->ext_listen_timing) {
632 		dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
633 		dev->ext_listen_interval =
634 			WPA_GET_LE16(msg->ext_listen_timing + 2);
635 	}
636 
637 	if (!probe_req) {
638 		u16 new_config_methods;
639 		new_config_methods = msg->config_methods ?
640 			msg->config_methods : msg->wps_config_methods;
641 		if (new_config_methods &&
642 		    dev->info.config_methods != new_config_methods) {
643 			p2p_dbg(p2p, "Update peer " MACSTR
644 				" config_methods 0x%x -> 0x%x",
645 				MAC2STR(dev->info.p2p_device_addr),
646 				dev->info.config_methods,
647 				new_config_methods);
648 			dev->info.config_methods = new_config_methods;
649 		}
650 	}
651 }
652 
653 
p2p_update_peer_6ghz_capab(struct p2p_device * dev,const struct p2p_message * msg)654 void p2p_update_peer_6ghz_capab(struct p2p_device *dev,
655 				const struct p2p_message *msg)
656 {
657 	if (msg->capability &&
658 	    (msg->capability[0] & P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE))
659 		dev->support_6ghz = true;
660 }
661 
662 
p2p_update_peer_vendor_elems(struct p2p_device * dev,const u8 * ies,size_t ies_len)663 static void p2p_update_peer_vendor_elems(struct p2p_device *dev, const u8 *ies,
664 					 size_t ies_len)
665 {
666 	const u8 *pos, *end;
667 	u8 id, len;
668 
669 	wpabuf_free(dev->info.vendor_elems);
670 	dev->info.vendor_elems = NULL;
671 
672 	end = ies + ies_len;
673 
674 	for (pos = ies; end - pos > 1; pos += len) {
675 		id = *pos++;
676 		len = *pos++;
677 
678 		if (len > end - pos)
679 			break;
680 
681 		if (id != WLAN_EID_VENDOR_SPECIFIC || len < 3)
682 			continue;
683 
684 		if (len >= 4) {
685 			u32 type = WPA_GET_BE32(pos);
686 
687 			if (type == WPA_IE_VENDOR_TYPE ||
688 			    type == WMM_IE_VENDOR_TYPE ||
689 			    type == WPS_IE_VENDOR_TYPE ||
690 			    type == P2P_IE_VENDOR_TYPE ||
691 			    type == WFD_IE_VENDOR_TYPE)
692 				continue;
693 		}
694 
695 		/* Unknown vendor element - make raw IE data available */
696 		if (wpabuf_resize(&dev->info.vendor_elems, 2 + len) < 0)
697 			break;
698 		wpabuf_put_data(dev->info.vendor_elems, pos - 2, 2 + len);
699 		if (wpabuf_size(dev->info.vendor_elems) > 2000)
700 			break;
701 	}
702 }
703 
704 
p2p_compare_wfd_info(struct p2p_device * dev,const struct p2p_message * msg)705 static int p2p_compare_wfd_info(struct p2p_device *dev,
706 			      const struct p2p_message *msg)
707 {
708 	if (dev->info.wfd_subelems && msg->wfd_subelems) {
709 		if (dev->info.wfd_subelems->used != msg->wfd_subelems->used)
710 			return 1;
711 
712 		return os_memcmp(dev->info.wfd_subelems->buf,
713 				 msg->wfd_subelems->buf,
714 				 dev->info.wfd_subelems->used);
715 	}
716 	if (dev->info.wfd_subelems || msg->wfd_subelems)
717 		return 1;
718 
719 	return 0;
720 }
721 
722 
723 /**
724  * p2p_add_device - Add peer entries based on scan results or P2P frames
725  * @p2p: P2P module context from p2p_init()
726  * @addr: Source address of Beacon or Probe Response frame (may be either
727  *	P2P Device Address or P2P Interface Address)
728  * @level: Signal level (signal strength of the received frame from the peer)
729  * @freq: Frequency on which the Beacon or Probe Response frame was received
730  * @rx_time: Time when the result was received
731  * @ies: IEs from the Beacon or Probe Response frame
732  * @ies_len: Length of ies buffer in octets
733  * @scan_res: Whether this was based on scan results
734  * Returns: 0 on success, -1 on failure
735  *
736  * If the scan result is for a GO, the clients in the group will also be added
737  * to the peer table. This function can also be used with some other frames
738  * like Provision Discovery Request that contains P2P Capability and P2P Device
739  * Info attributes.
740  */
p2p_add_device(struct p2p_data * p2p,const u8 * addr,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len,int scan_res)741 int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq,
742 		   struct os_reltime *rx_time, int level, const u8 *ies,
743 		   size_t ies_len, int scan_res)
744 {
745 	struct p2p_device *dev;
746 	struct p2p_message msg;
747 	const u8 *p2p_dev_addr;
748 	int wfd_changed;
749 	int dev_name_changed;
750 	int i;
751 	struct os_reltime time_now;
752 
753 	os_memset(&msg, 0, sizeof(msg));
754 	if (p2p_parse_ies(ies, ies_len, &msg)) {
755 		p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
756 		p2p_parse_free(&msg);
757 		return -1;
758 	}
759 
760 	if (msg.p2p_device_addr)
761 		p2p_dev_addr = msg.p2p_device_addr;
762 	else if (msg.device_id)
763 		p2p_dev_addr = msg.device_id;
764 	else {
765 		p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
766 		p2p_parse_free(&msg);
767 		return -1;
768 	}
769 
770 	if (!is_zero_ether_addr(p2p->peer_filter) &&
771 	    !ether_addr_equal(p2p_dev_addr, p2p->peer_filter)) {
772 		p2p_dbg(p2p, "Do not add peer filter for " MACSTR
773 			" due to peer filter", MAC2STR(p2p_dev_addr));
774 		p2p_parse_free(&msg);
775 		return 0;
776 	}
777 
778 	dev = p2p_create_device(p2p, p2p_dev_addr);
779 	if (dev == NULL) {
780 		p2p_parse_free(&msg);
781 		return -1;
782 	}
783 
784 	if (rx_time == NULL) {
785 		os_get_reltime(&time_now);
786 		rx_time = &time_now;
787 	}
788 
789 	/*
790 	 * Update the device entry only if the new peer
791 	 * entry is newer than the one previously stored, or if
792 	 * the device was previously seen as a P2P Client in a group
793 	 * and the new entry isn't older than a threshold.
794 	 */
795 	if (dev->last_seen.sec > 0 &&
796 	    os_reltime_before(rx_time, &dev->last_seen) &&
797 	    (!(dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT) ||
798 	     os_reltime_expired(&dev->last_seen, rx_time,
799 				P2P_DEV_GROUP_CLIENT_RESP_THRESHOLD))) {
800 		p2p_dbg(p2p,
801 			"Do not update peer entry based on old frame (rx_time=%u.%06u last_seen=%u.%06u flags=0x%x)",
802 			(unsigned int) rx_time->sec,
803 			(unsigned int) rx_time->usec,
804 			(unsigned int) dev->last_seen.sec,
805 			(unsigned int) dev->last_seen.usec,
806 			dev->flags);
807 		p2p_parse_free(&msg);
808 		return -1;
809 	}
810 
811 	os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
812 
813 	dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY |
814 			P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT);
815 
816 	if (!ether_addr_equal(addr, p2p_dev_addr))
817 		os_memcpy(dev->interface_addr, addr, ETH_ALEN);
818 	if (msg.ssid &&
819 	    msg.ssid[1] <= sizeof(dev->oper_ssid) &&
820 	    (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
821 	     os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
822 	     != 0)) {
823 		os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
824 		dev->oper_ssid_len = msg.ssid[1];
825 	}
826 
827 	wpabuf_free(dev->info.p2ps_instance);
828 	dev->info.p2ps_instance = NULL;
829 	if (msg.adv_service_instance && msg.adv_service_instance_len)
830 		dev->info.p2ps_instance = wpabuf_alloc_copy(
831 			msg.adv_service_instance, msg.adv_service_instance_len);
832 
833 	if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
834 	    *msg.ds_params >= 1 && *msg.ds_params <= 14) {
835 		int ds_freq;
836 		if (*msg.ds_params == 14)
837 			ds_freq = 2484;
838 		else
839 			ds_freq = 2407 + *msg.ds_params * 5;
840 		if (freq != ds_freq) {
841 			p2p_dbg(p2p, "Update Listen frequency based on DS Parameter Set IE: %d -> %d MHz",
842 				freq, ds_freq);
843 			freq = ds_freq;
844 		}
845 	}
846 
847 	if (dev->listen_freq && dev->listen_freq != freq && scan_res) {
848 		p2p_dbg(p2p, "Update Listen frequency based on scan results ("
849 			MACSTR " %d -> %d MHz (DS param %d)",
850 			MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
851 			freq, msg.ds_params ? *msg.ds_params : -1);
852 	}
853 	if (scan_res) {
854 		dev->listen_freq = freq;
855 		if (msg.group_info)
856 			dev->oper_freq = freq;
857 	}
858 	dev->info.level = level;
859 
860 	dev_name_changed = os_strncmp(dev->info.device_name, msg.device_name,
861 				      WPS_DEV_NAME_MAX_LEN) != 0;
862 
863 	p2p_copy_wps_info(p2p, dev, 0, &msg);
864 
865 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
866 		wpabuf_free(dev->info.wps_vendor_ext[i]);
867 		dev->info.wps_vendor_ext[i] = NULL;
868 	}
869 
870 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
871 		if (msg.wps_vendor_ext[i] == NULL)
872 			break;
873 		dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
874 			msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
875 		if (dev->info.wps_vendor_ext[i] == NULL)
876 			break;
877 	}
878 
879 	wfd_changed = p2p_compare_wfd_info(dev, &msg);
880 
881 	if (wfd_changed) {
882 		wpabuf_free(dev->info.wfd_subelems);
883 		if (msg.wfd_subelems)
884 			dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
885 		else
886 			dev->info.wfd_subelems = NULL;
887 	}
888 
889 	if (scan_res) {
890 		p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq,
891 				      msg.group_info, msg.group_info_len,
892 				      rx_time);
893 	}
894 
895 	p2p_parse_free(&msg);
896 
897 	p2p_update_peer_vendor_elems(dev, ies, ies_len);
898 
899 	if (dev->flags & P2P_DEV_REPORTED && !wfd_changed &&
900 	    !dev_name_changed &&
901 	    (!msg.adv_service_instance ||
902 	     (dev->flags & P2P_DEV_P2PS_REPORTED)))
903 		return 0;
904 
905 	p2p_dbg(p2p, "Peer found with Listen frequency %d MHz (rx_time=%u.%06u)",
906 		freq, (unsigned int) rx_time->sec,
907 		(unsigned int) rx_time->usec);
908 	if (dev->flags & P2P_DEV_USER_REJECTED) {
909 		p2p_dbg(p2p, "Do not report rejected device");
910 		return 0;
911 	}
912 
913 	if (dev->info.config_methods == 0 &&
914 	    (freq == 2412 || freq == 2437 || freq == 2462)) {
915 		/*
916 		 * If we have only seen a Beacon frame from a GO, we do not yet
917 		 * know what WPS config methods it supports. Since some
918 		 * applications use config_methods value from P2P-DEVICE-FOUND
919 		 * events, postpone reporting this peer until we've fully
920 		 * discovered its capabilities.
921 		 *
922 		 * At least for now, do this only if the peer was detected on
923 		 * one of the social channels since that peer can be easily be
924 		 * found again and there are no limitations of having to use
925 		 * passive scan on this channels, so this can be done through
926 		 * Probe Response frame that includes the config_methods
927 		 * information.
928 		 */
929 		p2p_dbg(p2p, "Do not report peer " MACSTR
930 			" with unknown config methods", MAC2STR(addr));
931 		return 0;
932 	}
933 
934 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
935 			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
936 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
937 
938 	if (msg.adv_service_instance)
939 		dev->flags |= P2P_DEV_P2PS_REPORTED;
940 
941 	return 0;
942 }
943 
944 
p2p_device_free(struct p2p_data * p2p,struct p2p_device * dev)945 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
946 {
947 	int i;
948 
949 	if (p2p->go_neg_peer == dev) {
950 		/*
951 		 * If GO Negotiation is in progress, report that it has failed.
952 		 */
953 		p2p_go_neg_failed(p2p, -1);
954 	}
955 	if (p2p->invite_peer == dev)
956 		p2p->invite_peer = NULL;
957 	if (p2p->sd_peer == dev)
958 		p2p->sd_peer = NULL;
959 	if (p2p->pending_client_disc_go == dev)
960 		p2p->pending_client_disc_go = NULL;
961 
962 	/* dev_lost() device, but only if it was previously dev_found() */
963 	if (dev->flags & P2P_DEV_REPORTED_ONCE)
964 		p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
965 				   dev->info.p2p_device_addr);
966 
967 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
968 		wpabuf_free(dev->info.wps_vendor_ext[i]);
969 		dev->info.wps_vendor_ext[i] = NULL;
970 	}
971 
972 	os_free(dev->bootstrap_params);
973 
974 	wpabuf_free(dev->action_frame_wrapper);
975 
976 #ifdef CONFIG_PASN
977 	if (dev->pasn) {
978 		wpa_pasn_reset(dev->pasn);
979 		pasn_data_deinit(dev->pasn);
980 	}
981 #endif /* CONFIG_PASN */
982 
983 	wpabuf_free(dev->info.wfd_subelems);
984 	wpabuf_free(dev->info.vendor_elems);
985 	wpabuf_free(dev->go_neg_conf);
986 	wpabuf_free(dev->info.p2ps_instance);
987 
988 	os_free(dev);
989 }
990 
991 
p2p_get_next_prog_freq(struct p2p_data * p2p)992 static int p2p_get_next_prog_freq(struct p2p_data *p2p)
993 {
994 	struct p2p_channels *c;
995 	struct p2p_reg_class *cla;
996 	size_t cl, ch;
997 	int found = 0;
998 	u8 reg_class;
999 	u8 channel;
1000 	int freq;
1001 
1002 	c = &p2p->cfg->channels;
1003 	for (cl = 0; cl < c->reg_classes; cl++) {
1004 		cla = &c->reg_class[cl];
1005 		if (cla->reg_class != p2p->last_prog_scan_class)
1006 			continue;
1007 		for (ch = 0; ch < cla->channels; ch++) {
1008 			if (cla->channel[ch] == p2p->last_prog_scan_chan) {
1009 				found = 1;
1010 				break;
1011 			}
1012 		}
1013 		if (found)
1014 			break;
1015 	}
1016 
1017 	if (!found) {
1018 		/* Start from beginning */
1019 		reg_class = c->reg_class[0].reg_class;
1020 		channel = c->reg_class[0].channel[0];
1021 	} else {
1022 		/* Pick the next channel */
1023 		ch++;
1024 		if (ch == cla->channels) {
1025 			cl++;
1026 			if (cl == c->reg_classes)
1027 				cl = 0;
1028 			ch = 0;
1029 		}
1030 		reg_class = c->reg_class[cl].reg_class;
1031 		channel = c->reg_class[cl].channel[ch];
1032 	}
1033 
1034 	freq = p2p_channel_to_freq(reg_class, channel);
1035 	p2p_dbg(p2p, "Next progressive search channel: reg_class %u channel %u -> %d MHz",
1036 		reg_class, channel, freq);
1037 	p2p->last_prog_scan_class = reg_class;
1038 	p2p->last_prog_scan_chan = channel;
1039 
1040 	if (freq == 2412 || freq == 2437 || freq == 2462)
1041 		return 0; /* No need to add social channels */
1042 	return freq;
1043 }
1044 
1045 
p2p_search(struct p2p_data * p2p)1046 static void p2p_search(struct p2p_data *p2p)
1047 {
1048 	int freq = 0;
1049 	enum p2p_scan_type type;
1050 	u16 pw_id = DEV_PW_DEFAULT;
1051 	int res;
1052 
1053 	if (p2p->drv_in_listen) {
1054 		p2p_dbg(p2p, "Driver is still in Listen state - wait for it to end before continuing");
1055 		return;
1056 	}
1057 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1058 	p2p->pending_listen_wait_drv = false;
1059 
1060 	if (p2p->find_pending_full &&
1061 	    (p2p->find_type == P2P_FIND_PROGRESSIVE ||
1062 	     p2p->find_type == P2P_FIND_START_WITH_FULL)) {
1063 		type = P2P_SCAN_FULL;
1064 		p2p_dbg(p2p, "Starting search (pending full scan)");
1065 		p2p->find_pending_full = 0;
1066 	} else if ((p2p->find_type == P2P_FIND_PROGRESSIVE &&
1067 	    (freq = p2p_get_next_prog_freq(p2p)) > 0) ||
1068 	    (p2p->find_type == P2P_FIND_START_WITH_FULL &&
1069 	     (freq = p2p->find_specified_freq) > 0)) {
1070 		type = P2P_SCAN_SOCIAL_PLUS_ONE;
1071 		p2p_dbg(p2p, "Starting search (+ freq %u)", freq);
1072 	} else {
1073 		type = P2P_SCAN_SOCIAL;
1074 		p2p_dbg(p2p, "Starting search");
1075 	}
1076 
1077 	res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
1078 				 p2p->num_req_dev_types, p2p->req_dev_types,
1079 				 p2p->find_dev_id, pw_id, p2p->include_6ghz);
1080 	if (res < 0) {
1081 		p2p_dbg(p2p, "Scan request schedule failed");
1082 		p2p_continue_find(p2p);
1083 	}
1084 }
1085 
1086 
p2p_find_timeout(void * eloop_ctx,void * timeout_ctx)1087 static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
1088 {
1089 	struct p2p_data *p2p = eloop_ctx;
1090 	p2p_dbg(p2p, "Find timeout -> stop");
1091 	p2p_stop_find(p2p);
1092 }
1093 
1094 
p2p_notify_scan_trigger_status(struct p2p_data * p2p,int status)1095 void p2p_notify_scan_trigger_status(struct p2p_data *p2p, int status)
1096 {
1097 	if (status != 0) {
1098 		p2p_dbg(p2p, "Scan request failed");
1099 		/* Do continue find even for the first p2p_find_scan */
1100 		p2p_continue_find(p2p);
1101 	} else {
1102 		p2p_dbg(p2p, "Running p2p_scan");
1103 		p2p->p2p_scan_running = 1;
1104 		eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1105 		eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
1106 				       p2p, NULL);
1107 	}
1108 }
1109 
1110 
p2p_run_after_scan(struct p2p_data * p2p)1111 static int p2p_run_after_scan(struct p2p_data *p2p)
1112 {
1113 	struct p2p_device *dev;
1114 	enum p2p_after_scan op;
1115 
1116 	op = p2p->start_after_scan;
1117 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1118 	switch (op) {
1119 	case P2P_AFTER_SCAN_NOTHING:
1120 		break;
1121 	case P2P_AFTER_SCAN_LISTEN:
1122 		p2p_dbg(p2p, "Start previously requested Listen state");
1123 		p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
1124 			   p2p->pending_listen_usec / 1000);
1125 		return 1;
1126 	case P2P_AFTER_SCAN_CONNECT:
1127 		p2p_dbg(p2p, "Start previously requested connect with " MACSTR,
1128 			MAC2STR(p2p->after_scan_peer));
1129 		dev = p2p_get_device(p2p, p2p->after_scan_peer);
1130 		if (dev == NULL) {
1131 			p2p_dbg(p2p, "Peer not known anymore");
1132 			break;
1133 		}
1134 		p2p_connect_send(p2p, dev);
1135 		return 1;
1136 	}
1137 
1138 	return 0;
1139 }
1140 
1141 
p2p_scan_timeout(void * eloop_ctx,void * timeout_ctx)1142 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1143 {
1144 	struct p2p_data *p2p = eloop_ctx;
1145 	int running;
1146 	p2p_dbg(p2p, "p2p_scan timeout (running=%d)", p2p->p2p_scan_running);
1147 	running = p2p->p2p_scan_running;
1148 	/* Make sure we recover from missed scan results callback */
1149 	p2p->p2p_scan_running = 0;
1150 
1151 	if (running)
1152 		p2p_run_after_scan(p2p);
1153 }
1154 
1155 
p2p_free_req_dev_types(struct p2p_data * p2p)1156 static void p2p_free_req_dev_types(struct p2p_data *p2p)
1157 {
1158 	p2p->num_req_dev_types = 0;
1159 	os_free(p2p->req_dev_types);
1160 	p2p->req_dev_types = NULL;
1161 }
1162 
1163 
p2ps_gen_hash(struct p2p_data * p2p,const char * str,u8 * hash)1164 static int p2ps_gen_hash(struct p2p_data *p2p, const char *str, u8 *hash)
1165 {
1166 	u8 buf[SHA256_MAC_LEN];
1167 	char str_buf[256];
1168 	const u8 *adv_array;
1169 	size_t i, adv_len;
1170 
1171 	if (!str || !hash)
1172 		return 0;
1173 
1174 	if (!str[0]) {
1175 		os_memcpy(hash, p2p->wild_card_hash, P2PS_HASH_LEN);
1176 		return 1;
1177 	}
1178 
1179 	adv_array = (u8 *) str_buf;
1180 	adv_len = os_strlen(str);
1181 	if (adv_len >= sizeof(str_buf))
1182 		return 0;
1183 
1184 	for (i = 0; i < adv_len; i++) {
1185 		if (str[i] >= 'A' && str[i] <= 'Z')
1186 			str_buf[i] = str[i] - 'A' + 'a';
1187 		else
1188 			str_buf[i] = str[i];
1189 	}
1190 
1191 	if (sha256_vector(1, &adv_array, &adv_len, buf))
1192 		return 0;
1193 
1194 	os_memcpy(hash, buf, P2PS_HASH_LEN);
1195 	return 1;
1196 }
1197 
1198 
p2p_find(struct p2p_data * p2p,unsigned int timeout,enum p2p_discovery_type type,unsigned int num_req_dev_types,const u8 * req_dev_types,const u8 * dev_id,unsigned int search_delay,u8 seek_count,const char ** seek,int freq,bool include_6ghz)1199 int p2p_find(struct p2p_data *p2p, unsigned int timeout,
1200 	     enum p2p_discovery_type type,
1201 	     unsigned int num_req_dev_types, const u8 *req_dev_types,
1202 	     const u8 *dev_id, unsigned int search_delay,
1203 	     u8 seek_count, const char **seek, int freq, bool include_6ghz)
1204 {
1205 	int res;
1206 	struct os_reltime start;
1207 
1208 	p2p_dbg(p2p, "Starting find (type=%d)", type);
1209 	if (p2p->p2p_scan_running) {
1210 		p2p_dbg(p2p, "p2p_scan is already running");
1211 	}
1212 
1213 	p2p_free_req_dev_types(p2p);
1214 	if (req_dev_types && num_req_dev_types) {
1215 		p2p->req_dev_types = os_memdup(req_dev_types,
1216 					       num_req_dev_types *
1217 					       WPS_DEV_TYPE_LEN);
1218 		if (p2p->req_dev_types == NULL)
1219 			return -1;
1220 		p2p->num_req_dev_types = num_req_dev_types;
1221 	}
1222 
1223 	if (dev_id) {
1224 		os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
1225 		p2p->find_dev_id = p2p->find_dev_id_buf;
1226 	} else
1227 		p2p->find_dev_id = NULL;
1228 	p2p->include_6ghz = p2p_wfd_enabled(p2p) && include_6ghz;
1229 	if (seek_count == 0 || !seek) {
1230 		/* Not an ASP search */
1231 		p2p->p2ps_seek = 0;
1232 	} else if (seek_count == 1 && seek && (!seek[0] || !seek[0][0])) {
1233 		/*
1234 		 * An empty seek string means no hash values, but still an ASP
1235 		 * search.
1236 		 */
1237 		p2p_dbg(p2p, "ASP search");
1238 		p2p->p2ps_seek_count = 0;
1239 		p2p->p2ps_seek = 1;
1240 	} else if (seek && seek_count <= P2P_MAX_QUERY_HASH) {
1241 		u8 buf[P2PS_HASH_LEN];
1242 		int i, count = 0;
1243 
1244 		for (i = 0; i < seek_count; i++) {
1245 			if (!p2ps_gen_hash(p2p, seek[i], buf))
1246 				continue;
1247 
1248 			p2p_dbg(p2p, "Seek service %s hash " MACSTR,
1249 				seek[i], MAC2STR(buf));
1250 			os_memcpy(&p2p->p2ps_seek_hash[count * P2PS_HASH_LEN],
1251 				  buf, P2PS_HASH_LEN);
1252 			count++;
1253 		}
1254 
1255 		p2p->p2ps_seek_count = count;
1256 		p2p->p2ps_seek = 1;
1257 	} else {
1258 		p2p->p2ps_seek_count = 0;
1259 		p2p->p2ps_seek = 1;
1260 	}
1261 
1262 	/* Special case to perform wildcard search */
1263 	if (p2p->p2ps_seek_count == 0 && p2p->p2ps_seek) {
1264 		p2p->p2ps_seek_count = 1;
1265 		os_memcpy(&p2p->p2ps_seek_hash, p2p->wild_card_hash,
1266 			  P2PS_HASH_LEN);
1267 	}
1268 
1269 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1270 	p2p_clear_timeout(p2p);
1271 	if (p2p->pending_listen_freq) {
1272 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_find");
1273 		p2p->pending_listen_freq = 0;
1274 	}
1275 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1276 	p2p->pending_listen_wait_drv = false;
1277 	p2p->find_pending_full = 0;
1278 	p2p->find_type = type;
1279 	if (freq != 2412 && freq != 2437 && freq != 2462 && freq != 60480)
1280 		p2p->find_specified_freq = freq;
1281 	else
1282 		p2p->find_specified_freq = 0;
1283 	p2p_device_clear_reported(p2p);
1284 	os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
1285 	p2p_set_state(p2p, P2P_SEARCH);
1286 	p2p->search_delay = search_delay;
1287 	p2p->in_search_delay = 0;
1288 	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1289 	p2p->last_p2p_find_timeout = timeout;
1290 	if (timeout)
1291 		eloop_register_timeout(timeout, 0, p2p_find_timeout,
1292 				       p2p, NULL);
1293 	os_get_reltime(&start);
1294 	switch (type) {
1295 	case P2P_FIND_START_WITH_FULL:
1296 		if (freq > 0) {
1297 			/*
1298 			 * Start with the specified channel and then move to
1299 			 * scans for social channels and this specific channel.
1300 			 */
1301 			res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx,
1302 						 P2P_SCAN_SPECIFIC, freq,
1303 						 p2p->num_req_dev_types,
1304 						 p2p->req_dev_types, dev_id,
1305 						 DEV_PW_DEFAULT,
1306 						 p2p->include_6ghz);
1307 			break;
1308 		}
1309 		/* fall through */
1310 	case P2P_FIND_PROGRESSIVE:
1311 		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
1312 					 p2p->num_req_dev_types,
1313 					 p2p->req_dev_types, dev_id,
1314 					 DEV_PW_DEFAULT, p2p->include_6ghz);
1315 		break;
1316 	case P2P_FIND_ONLY_SOCIAL:
1317 		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
1318 					 p2p->num_req_dev_types,
1319 					 p2p->req_dev_types, dev_id,
1320 					 DEV_PW_DEFAULT, p2p->include_6ghz);
1321 		break;
1322 	default:
1323 		return -1;
1324 	}
1325 
1326 	if (!res)
1327 		p2p->find_start = start;
1328 
1329 	if (res != 0 && p2p->p2p_scan_running) {
1330 		p2p_dbg(p2p, "Failed to start p2p_scan - another p2p_scan was already running");
1331 		/* wait for the previous p2p_scan to complete */
1332 		if (type == P2P_FIND_PROGRESSIVE ||
1333 		    (type == P2P_FIND_START_WITH_FULL && freq == 0))
1334 			p2p->find_pending_full = 1;
1335 		res = 0; /* do not report failure */
1336 	} else if (res != 0) {
1337 		p2p_dbg(p2p, "Failed to start p2p_scan");
1338 		p2p_set_state(p2p, P2P_IDLE);
1339 		eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1340 	}
1341 
1342 	return res;
1343 }
1344 
1345 
p2p_stop_find_for_freq(struct p2p_data * p2p,int freq)1346 void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
1347 {
1348 	p2p_dbg(p2p, "Stopping find");
1349 	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1350 	p2p_clear_timeout(p2p);
1351 	if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
1352 		p2p->cfg->find_stopped(p2p->cfg->cb_ctx);
1353 
1354 	p2p->p2ps_seek_count = 0;
1355 
1356 	p2p_set_state(p2p, P2P_IDLE);
1357 	p2p_free_req_dev_types(p2p);
1358 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1359 	if (p2p->go_neg_peer)
1360 		p2p->go_neg_peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1361 	p2p->go_neg_peer = NULL;
1362 	p2p->sd_peer = NULL;
1363 	p2p->invite_peer = NULL;
1364 	p2p_stop_listen_for_freq(p2p, freq);
1365 	p2p->send_action_in_progress = 0;
1366 }
1367 
1368 
p2p_stop_listen_for_freq(struct p2p_data * p2p,int freq)1369 void p2p_stop_listen_for_freq(struct p2p_data *p2p, int freq)
1370 {
1371 	p2p_dbg(p2p,
1372 		"%s(freq=%d) pending_listen_freq=%d in_listen=%d drv_in_listen=%d",
1373 		__func__, freq, p2p->pending_listen_freq, p2p->in_listen,
1374 		p2p->drv_in_listen);
1375 	if (freq > 0 &&
1376 	    ((p2p->drv_in_listen == freq && p2p->in_listen) ||
1377 	     p2p->pending_listen_freq == (unsigned int) freq)) {
1378 		p2p_dbg(p2p, "Skip stop_listen since we are on correct channel for response");
1379 		return;
1380 	}
1381 	if (p2p->in_listen) {
1382 		p2p->in_listen = 0;
1383 		p2p_clear_timeout(p2p);
1384 	}
1385 	if (p2p->drv_in_listen) {
1386 		/*
1387 		 * The driver may not deliver callback to p2p_listen_end()
1388 		 * when the operation gets canceled, so clear the internal
1389 		 * variable that is tracking driver state.
1390 		 */
1391 		p2p_dbg(p2p, "Clear drv_in_listen (%d)", p2p->drv_in_listen);
1392 		p2p->drv_in_listen = 0;
1393 	}
1394 	if (p2p->pending_listen_freq &&
1395 	    p2p->pending_listen_freq != (unsigned int) freq &&
1396 	    !p2p->drv_in_listen && p2p->pending_listen_wait_drv) {
1397 		p2p_dbg(p2p,
1398 			"Clear pending_listen_freq since the started listen did not complete before being stopped");
1399 		p2p->pending_listen_freq = 0;
1400 	}
1401 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1402 	p2p->pending_listen_wait_drv = false;
1403 }
1404 
1405 
p2p_stop_listen(struct p2p_data * p2p)1406 void p2p_stop_listen(struct p2p_data *p2p)
1407 {
1408 	if (p2p->state != P2P_LISTEN_ONLY) {
1409 		p2p_dbg(p2p, "Skip stop_listen since not in listen_only state.");
1410 		return;
1411 	}
1412 
1413 	p2p_stop_listen_for_freq(p2p, 0);
1414 	p2p_set_state(p2p, P2P_IDLE);
1415 }
1416 
1417 
p2p_stop_find(struct p2p_data * p2p)1418 void p2p_stop_find(struct p2p_data *p2p)
1419 {
1420 	p2p->pending_listen_freq = 0;
1421 	p2p_stop_find_for_freq(p2p, 0);
1422 }
1423 
1424 
p2p_prepare_channel_pref(struct p2p_data * p2p,unsigned int force_freq,unsigned int pref_freq,int go)1425 static int p2p_prepare_channel_pref(struct p2p_data *p2p,
1426 				    unsigned int force_freq,
1427 				    unsigned int pref_freq, int go)
1428 {
1429 	u8 op_class, op_channel;
1430 	unsigned int freq = force_freq ? force_freq : pref_freq;
1431 
1432 	p2p_dbg(p2p, "Prepare channel pref - force_freq=%u pref_freq=%u go=%d",
1433 		force_freq, pref_freq, go);
1434 	if (p2p_freq_to_channel(freq, &op_class, &op_channel) < 0) {
1435 		p2p_dbg(p2p, "Unsupported frequency %u MHz", freq);
1436 		return -1;
1437 	}
1438 
1439 	if (!p2p_channels_includes(&p2p->cfg->channels, op_class, op_channel) &&
1440 	    (go || !p2p_channels_includes(&p2p->cfg->cli_channels, op_class,
1441 					  op_channel))) {
1442 		p2p_dbg(p2p, "Frequency %u MHz (oper_class %u channel %u) not allowed for P2P",
1443 			freq, op_class, op_channel);
1444 		return -1;
1445 	}
1446 
1447 	p2p->op_reg_class = op_class;
1448 	p2p->op_channel = op_channel;
1449 
1450 	if (force_freq) {
1451 		p2p->channels.reg_classes = 1;
1452 		p2p->channels.reg_class[0].channels = 1;
1453 		p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1454 		p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1455 	} else {
1456 		p2p_copy_channels(&p2p->channels, &p2p->cfg->channels,
1457 				  p2p->allow_6ghz);
1458 	}
1459 
1460 	return 0;
1461 }
1462 
1463 
p2p_prepare_channel_best(struct p2p_data * p2p)1464 static void p2p_prepare_channel_best(struct p2p_data *p2p)
1465 {
1466 	u8 op_class, op_channel;
1467 	const int op_classes_5ghz[] = { 124, 125, 115, 0 };
1468 	const int op_classes_ht40[] = { 126, 127, 116, 117, 0 };
1469 	const int op_classes_vht[] = { 128, 0 };
1470 	const int op_classes_edmg[] = { 181, 182, 183, 0 };
1471 	const int op_classes_6ghz[] = { 131, 0 };
1472 
1473 	p2p_dbg(p2p, "Prepare channel best");
1474 
1475 	if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
1476 	    p2p_supported_freq(p2p, p2p->best_freq_overall) &&
1477 	    p2p_freq_to_channel(p2p->best_freq_overall, &op_class, &op_channel)
1478 	    == 0) {
1479 		p2p_dbg(p2p, "Select best overall channel as operating channel preference");
1480 		p2p->op_reg_class = op_class;
1481 		p2p->op_channel = op_channel;
1482 	} else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
1483 		   p2p_supported_freq(p2p, p2p->best_freq_5) &&
1484 		   p2p_freq_to_channel(p2p->best_freq_5, &op_class, &op_channel)
1485 		   == 0) {
1486 		p2p_dbg(p2p, "Select best 5 GHz channel as operating channel preference");
1487 		p2p->op_reg_class = op_class;
1488 		p2p->op_channel = op_channel;
1489 	} else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_24 > 0 &&
1490 		   p2p_supported_freq(p2p, p2p->best_freq_24) &&
1491 		   p2p_freq_to_channel(p2p->best_freq_24, &op_class,
1492 				       &op_channel) == 0) {
1493 		p2p_dbg(p2p, "Select best 2.4 GHz channel as operating channel preference");
1494 		p2p->op_reg_class = op_class;
1495 		p2p->op_channel = op_channel;
1496 	} else if (p2p->cfg->num_pref_chan > 0 &&
1497 		   p2p_channels_includes(&p2p->cfg->channels,
1498 					 p2p->cfg->pref_chan[0].op_class,
1499 					 p2p->cfg->pref_chan[0].chan)) {
1500 		p2p_dbg(p2p, "Select first pref_chan entry as operating channel preference");
1501 		p2p->op_reg_class = p2p->cfg->pref_chan[0].op_class;
1502 		p2p->op_channel = p2p->cfg->pref_chan[0].chan;
1503 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_edmg,
1504 				      &p2p->op_reg_class, &p2p->op_channel) ==
1505 		   0) {
1506 		p2p_dbg(p2p, "Select possible EDMG channel (op_class %u channel %u) as operating channel preference",
1507 			p2p->op_reg_class, p2p->op_channel);
1508 	} else if (p2p->allow_6ghz &&
1509 		   (p2p_channel_select(&p2p->cfg->channels, op_classes_6ghz,
1510 				       &p2p->op_reg_class, &p2p->op_channel) ==
1511 		    0)) {
1512 		p2p_dbg(p2p, "Select possible 6 GHz channel (op_class %u channel %u) as operating channel preference",
1513 			p2p->op_reg_class, p2p->op_channel);
1514 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_vht,
1515 				      &p2p->op_reg_class, &p2p->op_channel) ==
1516 		   0) {
1517 		p2p_dbg(p2p, "Select possible VHT channel (op_class %u channel %u) as operating channel preference",
1518 			p2p->op_reg_class, p2p->op_channel);
1519 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_ht40,
1520 				      &p2p->op_reg_class, &p2p->op_channel) ==
1521 		   0) {
1522 		p2p_dbg(p2p, "Select possible HT40 channel (op_class %u channel %u) as operating channel preference",
1523 			p2p->op_reg_class, p2p->op_channel);
1524 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_5ghz,
1525 				      &p2p->op_reg_class, &p2p->op_channel) ==
1526 		   0) {
1527 		p2p_dbg(p2p, "Select possible 5 GHz channel (op_class %u channel %u) as operating channel preference",
1528 			p2p->op_reg_class, p2p->op_channel);
1529 	} else if (p2p_channels_includes(&p2p->cfg->channels,
1530 					 p2p->cfg->op_reg_class,
1531 					 p2p->cfg->op_channel)) {
1532 		p2p_dbg(p2p, "Select pre-configured channel as operating channel preference");
1533 		p2p->op_reg_class = p2p->cfg->op_reg_class;
1534 		p2p->op_channel = p2p->cfg->op_channel;
1535 	} else if (p2p_channel_random_social(&p2p->cfg->channels,
1536 					     &p2p->op_reg_class,
1537 					     &p2p->op_channel,
1538 					     NULL, NULL) == 0) {
1539 		p2p_dbg(p2p, "Select random available social channel (op_class %u channel %u) as operating channel preference",
1540 			p2p->op_reg_class, p2p->op_channel);
1541 	} else {
1542 		/* Select any random available channel from the first available
1543 		 * operating class */
1544 		if (p2p_channel_select(&p2p->cfg->channels, NULL,
1545 				       &p2p->op_reg_class,
1546 				       &p2p->op_channel) == 0)
1547 			p2p_dbg(p2p,
1548 				"Select random available channel %d from operating class %d as operating channel preference",
1549 				p2p->op_channel, p2p->op_reg_class);
1550 	}
1551 
1552 	p2p_copy_channels(&p2p->channels, &p2p->cfg->channels, p2p->allow_6ghz);
1553 }
1554 
1555 
1556 /**
1557  * p2p_prepare_channel - Select operating channel for GO Negotiation or P2PS PD
1558  * @p2p: P2P module context from p2p_init()
1559  * @dev: Selected peer device
1560  * @force_freq: Forced frequency in MHz or 0 if not forced
1561  * @pref_freq: Preferred frequency in MHz or 0 if no preference
1562  * @go: Whether the local end will be forced to be GO
1563  * Returns: 0 on success, -1 on failure (channel not supported for P2P)
1564  *
1565  * This function is used to do initial operating channel selection for GO
1566  * Negotiation prior to having received peer information or for P2PS PD
1567  * signalling. The selected channel may be further optimized in
1568  * p2p_reselect_channel() once the peer information is available.
1569  */
p2p_prepare_channel(struct p2p_data * p2p,struct p2p_device * dev,unsigned int force_freq,unsigned int pref_freq,int go)1570 int p2p_prepare_channel(struct p2p_data *p2p, struct p2p_device *dev,
1571 			unsigned int force_freq, unsigned int pref_freq, int go)
1572 {
1573 	p2p_dbg(p2p, "Prepare channel - force_freq=%u pref_freq=%u go=%d",
1574 		force_freq, pref_freq, go);
1575 	if (force_freq || pref_freq) {
1576 		if (p2p_prepare_channel_pref(p2p, force_freq, pref_freq, go) <
1577 		    0)
1578 			return -1;
1579 	} else {
1580 		p2p_prepare_channel_best(p2p);
1581 	}
1582 	p2p_channels_dump(p2p, "prepared channels", &p2p->channels);
1583 	if (go)
1584 		p2p_channels_remove_freqs(&p2p->channels, &p2p->no_go_freq);
1585 	else if (!force_freq)
1586 		p2p_channels_union_inplace(&p2p->channels,
1587 					   &p2p->cfg->cli_channels);
1588 	p2p_channels_dump(p2p, "after go/cli filter/add", &p2p->channels);
1589 
1590 	p2p_dbg(p2p, "Own preference for operation channel: Operating Class %u Channel %u%s",
1591 		p2p->op_reg_class, p2p->op_channel,
1592 		force_freq ? " (forced)" : "");
1593 
1594 	if (force_freq)
1595 		dev->flags |= P2P_DEV_FORCE_FREQ;
1596 	else
1597 		dev->flags &= ~P2P_DEV_FORCE_FREQ;
1598 
1599 	return 0;
1600 }
1601 
1602 
p2p_set_dev_persistent(struct p2p_device * dev,int persistent_group)1603 static void p2p_set_dev_persistent(struct p2p_device *dev,
1604 				   int persistent_group)
1605 {
1606 	switch (persistent_group) {
1607 	case 0:
1608 		dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
1609 				P2P_DEV_PREFER_PERSISTENT_RECONN);
1610 		break;
1611 	case 1:
1612 		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1613 		dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
1614 		break;
1615 	case 2:
1616 		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
1617 			P2P_DEV_PREFER_PERSISTENT_RECONN;
1618 		break;
1619 	}
1620 }
1621 
1622 
p2p_connect(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,int pd_before_go_neg,unsigned int pref_freq,u16 oob_pw_id,bool p2p2,u16 bootstrap,const char * password)1623 int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1624 		enum p2p_wps_method wps_method,
1625 		int go_intent, const u8 *own_interface_addr,
1626 		unsigned int force_freq, int persistent_group,
1627 		const u8 *force_ssid, size_t force_ssid_len,
1628 		int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
1629 		bool p2p2, u16 bootstrap, const char *password)
1630 {
1631 	struct p2p_device *dev;
1632 
1633 	p2p_dbg(p2p, "Request to start group negotiation - peer=" MACSTR
1634 		"  GO Intent=%d  Intended Interface Address=" MACSTR
1635 		" wps_method=%d persistent_group=%d pd_before_go_neg=%d "
1636 		"oob_pw_id=%u allow_6ghz=%d",
1637 		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1638 		wps_method, persistent_group, pd_before_go_neg, oob_pw_id,
1639 		p2p->allow_6ghz);
1640 
1641 	dev = p2p_get_device(p2p, peer_addr);
1642 	if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1643 		p2p_dbg(p2p, "Cannot connect to unknown P2P Device " MACSTR,
1644 			MAC2STR(peer_addr));
1645 		return -1;
1646 	}
1647 
1648 	if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq,
1649 				go_intent == 15) < 0)
1650 		return -1;
1651 
1652 	if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
1653 		if (!(dev->info.dev_capab &
1654 		      P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
1655 			p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1656 				" that is in a group and is not discoverable",
1657 				MAC2STR(peer_addr));
1658 			return -1;
1659 		}
1660 		if (dev->oper_freq <= 0) {
1661 			p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1662 				" with incomplete information",
1663 				MAC2STR(peer_addr));
1664 			return -1;
1665 		}
1666 
1667 		/*
1668 		 * First, try to connect directly. If the peer does not
1669 		 * acknowledge frames, assume it is sleeping and use device
1670 		 * discoverability via the GO at that point.
1671 		 */
1672 	}
1673 
1674 	p2p->ssid_set = 0;
1675 	if (force_ssid) {
1676 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1677 				  force_ssid, force_ssid_len);
1678 		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1679 		p2p->ssid_len = force_ssid_len;
1680 		p2p->ssid_set = 1;
1681 	}
1682 
1683 	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1684 	dev->flags &= ~P2P_DEV_USER_REJECTED;
1685 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1686 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1687 	if (pd_before_go_neg)
1688 		dev->flags |= P2P_DEV_PD_BEFORE_GO_NEG;
1689 	else {
1690 		dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
1691 		/*
1692 		 * Assign dialog token and tie breaker here to use the same
1693 		 * values in each retry within the same GO Negotiation exchange.
1694 		 */
1695 		dev->dialog_token++;
1696 		if (dev->dialog_token == 0)
1697 			dev->dialog_token = 1;
1698 		dev->tie_breaker = p2p->next_tie_breaker;
1699 		p2p->next_tie_breaker = !p2p->next_tie_breaker;
1700 	}
1701 	dev->connect_reqs = 0;
1702 	dev->go_neg_req_sent = 0;
1703 	dev->go_state = UNKNOWN_GO;
1704 	p2p_set_dev_persistent(dev, persistent_group);
1705 	p2p->go_intent = go_intent;
1706 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1707 
1708 	if (p2p->state != P2P_IDLE)
1709 		p2p_stop_find(p2p);
1710 
1711 	dev->wps_method = wps_method;
1712 	dev->oob_pw_id = oob_pw_id;
1713 	dev->p2p2 = p2p2;
1714 	dev->req_bootstrap_method = bootstrap;
1715 	if (password && os_strlen(password) < sizeof(dev->password))
1716 		os_strlcpy(dev->password, password, sizeof(dev->password));
1717 	dev->status = P2P_SC_SUCCESS;
1718 
1719 	if (p2p->p2p_scan_running) {
1720 		p2p_dbg(p2p, "p2p_scan running - delay connect send");
1721 		p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1722 		os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1723 		return 0;
1724 	}
1725 
1726 	return p2p_connect_send(p2p, dev);
1727 }
1728 
1729 
p2p_authorize(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,unsigned int pref_freq,u16 oob_pw_id,u16 bootstrap,const char * password)1730 int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1731 		  enum p2p_wps_method wps_method,
1732 		  int go_intent, const u8 *own_interface_addr,
1733 		  unsigned int force_freq, int persistent_group,
1734 		  const u8 *force_ssid, size_t force_ssid_len,
1735 		  unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
1736 		  const char *password)
1737 {
1738 	struct p2p_device *dev;
1739 
1740 	p2p_dbg(p2p, "Request to authorize group negotiation - peer=" MACSTR
1741 		"  GO Intent=%d  Intended Interface Address=" MACSTR
1742 		" wps_method=%d  persistent_group=%d oob_pw_id=%u allow_6ghz=%d",
1743 		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1744 		wps_method, persistent_group, oob_pw_id, p2p->allow_6ghz);
1745 
1746 	dev = p2p_get_device(p2p, peer_addr);
1747 	if (dev == NULL) {
1748 		p2p_dbg(p2p, "Cannot authorize unknown P2P Device " MACSTR,
1749 			MAC2STR(peer_addr));
1750 		return -1;
1751 	}
1752 
1753 	if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq, go_intent ==
1754 				15) < 0)
1755 		return -1;
1756 
1757 	p2p->ssid_set = 0;
1758 	if (force_ssid) {
1759 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1760 				  force_ssid, force_ssid_len);
1761 		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1762 		p2p->ssid_len = force_ssid_len;
1763 		p2p->ssid_set = 1;
1764 	}
1765 
1766 	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1767 	dev->flags &= ~P2P_DEV_USER_REJECTED;
1768 	dev->go_neg_req_sent = 0;
1769 	dev->go_state = UNKNOWN_GO;
1770 	dev->req_bootstrap_method = bootstrap;
1771 
1772 	if (password && os_strlen(password) < sizeof(dev->password))
1773 		os_strlcpy(dev->password, password, sizeof(dev->password));
1774 	p2p_set_dev_persistent(dev, persistent_group);
1775 	p2p->go_intent = go_intent;
1776 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1777 
1778 	dev->wps_method = wps_method;
1779 	dev->oob_pw_id = oob_pw_id;
1780 	dev->status = P2P_SC_SUCCESS;
1781 
1782 	return 0;
1783 }
1784 
1785 
p2p_add_dev_info(struct p2p_data * p2p,const u8 * addr,struct p2p_device * dev,struct p2p_message * msg)1786 void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1787 		      struct p2p_device *dev, struct p2p_message *msg)
1788 {
1789 	os_get_reltime(&dev->last_seen);
1790 
1791 	p2p_copy_wps_info(p2p, dev, 0, msg);
1792 
1793 	if (msg->listen_channel) {
1794 		int freq;
1795 		freq = p2p_channel_to_freq(msg->listen_channel[3],
1796 					   msg->listen_channel[4]);
1797 		if (freq < 0) {
1798 			p2p_dbg(p2p, "Unknown peer Listen channel: "
1799 				"country=%c%c(0x%02x) reg_class=%u channel=%u",
1800 				msg->listen_channel[0],
1801 				msg->listen_channel[1],
1802 				msg->listen_channel[2],
1803 				msg->listen_channel[3],
1804 				msg->listen_channel[4]);
1805 		} else {
1806 			p2p_dbg(p2p, "Update peer " MACSTR
1807 				" Listen channel: %u -> %u MHz",
1808 				MAC2STR(dev->info.p2p_device_addr),
1809 				dev->listen_freq, freq);
1810 			dev->listen_freq = freq;
1811 		}
1812 	}
1813 
1814 	if (msg->wfd_subelems) {
1815 		wpabuf_free(dev->info.wfd_subelems);
1816 		dev->info.wfd_subelems = wpabuf_dup(msg->wfd_subelems);
1817 	}
1818 
1819 	if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1820 		dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1821 		p2p_dbg(p2p, "Completed device entry based on data from GO Negotiation Request");
1822 	} else {
1823 		p2p_dbg(p2p, "Created device entry based on GO Neg Req: "
1824 			MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1825 			"listen_freq=%d",
1826 			MAC2STR(dev->info.p2p_device_addr),
1827 			dev->info.dev_capab, dev->info.group_capab,
1828 			dev->info.device_name, dev->listen_freq);
1829 	}
1830 
1831 	dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1832 
1833 	if (dev->flags & P2P_DEV_USER_REJECTED) {
1834 		p2p_dbg(p2p, "Do not report rejected device");
1835 		return;
1836 	}
1837 
1838 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1839 			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
1840 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
1841 }
1842 
1843 
p2p_build_ssid(struct p2p_data * p2p,u8 * ssid,size_t * ssid_len)1844 void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1845 {
1846 	os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1847 	p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1848 	os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1849 		  p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1850 	*ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1851 }
1852 
1853 
p2p_go_params(struct p2p_data * p2p,struct p2p_go_neg_results * params)1854 int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1855 {
1856 	if (p2p->ssid_set) {
1857 		os_memcpy(params->ssid, p2p->ssid, p2p->ssid_len);
1858 		params->ssid_len = p2p->ssid_len;
1859 	} else {
1860 		p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1861 	}
1862 	p2p->ssid_set = 0;
1863 
1864 	if (p2p->passphrase_set) {
1865 		os_memcpy(params->passphrase, p2p->passphrase, os_strlen(p2p->passphrase));
1866 	} else {
1867 		p2p_random(params->passphrase, p2p->cfg->passphrase_len);
1868 		params->passphrase[p2p->cfg->passphrase_len] = '\0';
1869 	}
1870 	p2p->passphrase_set = 0;
1871 	params->cipher = WPA_CIPHER_CCMP;
1872 	if (p2p->cfg->pairing_config.pasn_type & 0xc)
1873 		params->cipher |= WPA_CIPHER_GCMP_256;
1874 
1875 	if (params->p2p2) {
1876 		os_strlcpy(p2p->dev_sae_password, params->passphrase,
1877 			   sizeof(p2p->dev_sae_password));
1878 		os_strlcpy(params->sae_password, p2p->dev_sae_password,
1879 			   sizeof(params->sae_password));
1880 	}
1881 
1882 	return 0;
1883 }
1884 
1885 
p2p_set_go_role(struct p2p_data * p2p,bool val)1886 void p2p_set_go_role(struct p2p_data *p2p, bool val)
1887 {
1888 	p2p->go_role = val;
1889 }
1890 
1891 
p2p_go_complete(struct p2p_data * p2p,struct p2p_device * peer)1892 void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1893 {
1894 	struct p2p_go_neg_results res;
1895 	int go = peer->go_state == LOCAL_GO;
1896 	struct p2p_channels intersection;
1897 
1898 	p2p_dbg(p2p, "GO Negotiation with " MACSTR " completed (%s will be GO)",
1899 		MAC2STR(peer->info.p2p_device_addr), go ? "local end" : "peer");
1900 
1901 	os_memset(&res, 0, sizeof(res));
1902 	res.role_go = go;
1903 	os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
1904 	os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1905 	res.wps_method = peer->wps_method;
1906 	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
1907 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
1908 			res.persistent_group = 2;
1909 		else
1910 			res.persistent_group = 1;
1911 	}
1912 
1913 	if (go) {
1914 		/* Setup AP mode for WPS provisioning */
1915 		res.freq = p2p_channel_to_freq(p2p->op_reg_class,
1916 					       p2p->op_channel);
1917 		os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1918 		res.ssid_len = p2p->ssid_len;
1919 		p2p_random(res.passphrase, p2p->cfg->passphrase_len);
1920 		res.passphrase[p2p->cfg->passphrase_len] = '\0';
1921 	} else {
1922 		res.freq = peer->oper_freq;
1923 		if (p2p->ssid_len) {
1924 			os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1925 			res.ssid_len = p2p->ssid_len;
1926 		}
1927 	}
1928 
1929 	p2p_channels_dump(p2p, "own channels", &p2p->channels);
1930 	p2p_channels_dump(p2p, "peer channels", &peer->channels);
1931 	p2p_channels_intersect(&p2p->channels, &peer->channels,
1932 			       &intersection);
1933 	if (go) {
1934 		p2p_channels_remove_freqs(&intersection, &p2p->no_go_freq);
1935 		p2p_channels_dump(p2p, "intersection after no-GO removal",
1936 				  &intersection);
1937 	}
1938 
1939 	p2p_channels_to_freqs(&intersection, res.freq_list,
1940 			      P2P_MAX_CHANNELS);
1941 
1942 	res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1943 
1944 	p2p_clear_timeout(p2p);
1945 	p2p->ssid_set = 0;
1946 	peer->go_neg_req_sent = 0;
1947 	peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1948 	peer->wps_method = WPS_NOT_READY;
1949 	peer->oob_pw_id = 0;
1950 	wpabuf_free(peer->go_neg_conf);
1951 	peer->go_neg_conf = NULL;
1952 
1953 #ifdef CONFIG_PASN
1954 	if (peer->p2p2 && peer->pasn) {
1955 		res.p2p2 = peer->p2p2;
1956 		res.akmp = peer->pasn->akmp;
1957 		res.cipher = peer->pasn->cipher;
1958 
1959 		if (res.akmp == WPA_KEY_MGMT_PASN) {
1960 			if (go) {
1961 				os_strlcpy(res.sae_password,
1962 					   p2p->dev_sae_password,
1963 					   sizeof(res.sae_password));
1964 			} else {
1965 				if (!os_strlen(p2p->peer_sae_password)) {
1966 					p2p_dbg(p2p, "No password from peer GO for P2P2 group formation");
1967 					return;
1968 				}
1969 				os_strlcpy(res.sae_password,
1970 					   p2p->peer_sae_password,
1971 					   sizeof(res.sae_password));
1972 			}
1973 		} else if (res.akmp == WPA_KEY_MGMT_SAE) {
1974 			if (peer->role == P2P_ROLE_PAIRING_INITIATOR) {
1975 				pasn_initiator_pmksa_cache_get(
1976 					peer->pasn->pmksa,
1977 					peer->pasn->peer_addr,
1978 					res.pmkid, res.pmk, &res.pmk_len);
1979 			} else {
1980 				pasn_responder_pmksa_cache_get(
1981 					peer->pasn->pmksa,
1982 					peer->pasn->peer_addr,
1983 					res.pmkid, res.pmk, &res.pmk_len);
1984 			}
1985 		}
1986 
1987 		os_memset(p2p->dev_sae_password, 0,
1988 			  sizeof(p2p->dev_sae_password));
1989 		os_memset(p2p->peer_sae_password, 0,
1990 			  sizeof(p2p->peer_sae_password));
1991 		wpa_pasn_reset(peer->pasn);
1992 	}
1993 #endif /* CONFIG_PASN */
1994 
1995 	if (p2p->go_role && peer->p2p2) {
1996 		p2p->cfg->set_go_security_config(p2p->cfg->cb_ctx, &res);
1997 		p2p->go_role = false;
1998 	} else {
1999 		p2p_set_state(p2p, P2P_PROVISIONING);
2000 		p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
2001 	}
2002 
2003 	forced_memzero(&res, sizeof(res));
2004 }
2005 
2006 
p2p_rx_p2p_action(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)2007 static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
2008 			      const u8 *data, size_t len, int rx_freq)
2009 {
2010 	p2p_dbg(p2p, "RX P2P Public Action from " MACSTR, MAC2STR(sa));
2011 	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
2012 
2013 	if (len < 1)
2014 		return;
2015 
2016 	switch (data[0]) {
2017 	case P2P_GO_NEG_REQ:
2018 		p2p_handle_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
2019 		break;
2020 	case P2P_GO_NEG_RESP:
2021 		p2p_handle_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
2022 		break;
2023 	case P2P_GO_NEG_CONF:
2024 		p2p_handle_go_neg_conf(p2p, sa, data + 1, len - 1, false);
2025 		break;
2026 	case P2P_INVITATION_REQ:
2027 		p2p_handle_invitation_req(p2p, sa, data + 1, len - 1, rx_freq);
2028 		break;
2029 	case P2P_INVITATION_RESP:
2030 		p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
2031 		break;
2032 	case P2P_PROV_DISC_REQ:
2033 		p2p_handle_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2034 		break;
2035 	case P2P_PROV_DISC_RESP:
2036 		p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1, rx_freq);
2037 		break;
2038 	case P2P_DEV_DISC_REQ:
2039 		p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2040 		break;
2041 	case P2P_DEV_DISC_RESP:
2042 		p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
2043 		break;
2044 	default:
2045 		p2p_dbg(p2p, "Unsupported P2P Public Action frame type %d",
2046 			data[0]);
2047 		break;
2048 	}
2049 }
2050 
2051 
p2p_rx_action_public(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,const u8 * data,size_t len,int freq)2052 static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
2053 				 const u8 *sa, const u8 *bssid, const u8 *data,
2054 				 size_t len, int freq)
2055 {
2056 	if (len < 1)
2057 		return;
2058 
2059 	switch (data[0]) {
2060 	case WLAN_PA_VENDOR_SPECIFIC:
2061 		data++;
2062 		len--;
2063 		if (len < 4)
2064 			return;
2065 		if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2066 			return;
2067 
2068 		data += 4;
2069 		len -= 4;
2070 
2071 		p2p_rx_p2p_action(p2p, sa, data, len, freq);
2072 		break;
2073 	case WLAN_PA_GAS_INITIAL_REQ:
2074 		p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
2075 		break;
2076 	case WLAN_PA_GAS_INITIAL_RESP:
2077 		p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
2078 		break;
2079 	case WLAN_PA_GAS_COMEBACK_REQ:
2080 		p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
2081 		break;
2082 	case WLAN_PA_GAS_COMEBACK_RESP:
2083 		p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
2084 		break;
2085 	}
2086 }
2087 
2088 
p2p_rx_action(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,u8 category,const u8 * data,size_t len,int freq)2089 void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
2090 		   const u8 *bssid, u8 category,
2091 		   const u8 *data, size_t len, int freq)
2092 {
2093 	if (category == WLAN_ACTION_PUBLIC) {
2094 		p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
2095 		return;
2096 	}
2097 
2098 	if (category != WLAN_ACTION_VENDOR_SPECIFIC)
2099 		return;
2100 
2101 	if (len < 4)
2102 		return;
2103 
2104 	if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2105 		return;
2106 	data += 4;
2107 	len -= 4;
2108 
2109 	/* P2P action frame */
2110 	p2p_dbg(p2p, "RX P2P Action from " MACSTR, MAC2STR(sa));
2111 	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
2112 
2113 	if (len < 1)
2114 		return;
2115 	switch (data[0]) {
2116 	case P2P_NOA:
2117 		p2p_dbg(p2p, "Received P2P Action - Notice of Absence");
2118 		/* TODO */
2119 		break;
2120 	case P2P_PRESENCE_REQ:
2121 		p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
2122 		break;
2123 	case P2P_PRESENCE_RESP:
2124 		p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
2125 		break;
2126 	case P2P_GO_DISC_REQ:
2127 		p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
2128 		break;
2129 	default:
2130 		p2p_dbg(p2p, "Received P2P Action - unknown type %u", data[0]);
2131 		break;
2132 	}
2133 }
2134 
2135 
p2p_go_neg_start(void * eloop_ctx,void * timeout_ctx)2136 static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
2137 {
2138 	struct p2p_data *p2p = eloop_ctx;
2139 	if (p2p->go_neg_peer == NULL)
2140 		return;
2141 	if (p2p->pending_listen_freq) {
2142 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_go_neg_start");
2143 		p2p->pending_listen_freq = 0;
2144 	}
2145 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2146 	p2p->pending_listen_wait_drv = false;
2147 	p2p->go_neg_peer->status = P2P_SC_SUCCESS;
2148 	/*
2149 	 * Set new timeout to make sure a previously set one does not expire
2150 	 * too quickly while waiting for the GO Negotiation to complete.
2151 	 */
2152 	p2p_set_timeout(p2p, 0, 500000);
2153 	p2p_connect_send(p2p, p2p->go_neg_peer);
2154 }
2155 
2156 
p2p_invite_start(void * eloop_ctx,void * timeout_ctx)2157 static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
2158 {
2159 	struct p2p_data *p2p = eloop_ctx;
2160 	if (p2p->invite_peer == NULL)
2161 		return;
2162 	if (p2p->pending_listen_freq) {
2163 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_invite_start");
2164 		p2p->pending_listen_freq = 0;
2165 	}
2166 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2167 	p2p->pending_listen_wait_drv = false;
2168 	p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr,
2169 			p2p->invite_dev_pw_id);
2170 }
2171 
2172 
p2p_add_dev_from_probe_req(struct p2p_data * p2p,const u8 * addr,const u8 * ie,size_t ie_len)2173 static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
2174 				       const u8 *ie, size_t ie_len)
2175 {
2176 	struct p2p_message msg;
2177 	struct p2p_device *dev;
2178 
2179 	os_memset(&msg, 0, sizeof(msg));
2180 	if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
2181 	{
2182 		p2p_parse_free(&msg);
2183 		return; /* not a P2P probe */
2184 	}
2185 
2186 	if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
2187 	    os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
2188 	    != 0) {
2189 		/* The Probe Request is not part of P2P Device Discovery. It is
2190 		 * not known whether the source address of the frame is the P2P
2191 		 * Device Address or P2P Interface Address. Do not add a new
2192 		 * peer entry based on this frames.
2193 		 */
2194 		p2p_parse_free(&msg);
2195 		return;
2196 	}
2197 
2198 	dev = p2p_get_device(p2p, addr);
2199 	if (dev) {
2200 		if (msg.listen_channel) {
2201 			int freq;
2202 
2203 			if (dev->country[0] == 0)
2204 				os_memcpy(dev->country, msg.listen_channel, 3);
2205 
2206 			freq = p2p_channel_to_freq(msg.listen_channel[3],
2207 						   msg.listen_channel[4]);
2208 
2209 			if (freq > 0 && dev->listen_freq != freq) {
2210 				p2p_dbg(p2p,
2211 					"Updated peer " MACSTR " Listen channel (Probe Request): %d -> %d MHz",
2212 					MAC2STR(addr), dev->listen_freq, freq);
2213 				dev->listen_freq = freq;
2214 			}
2215 		}
2216 
2217 		p2p_update_peer_6ghz_capab(dev, &msg);
2218 		os_get_reltime(&dev->last_seen);
2219 		p2p_parse_free(&msg);
2220 		return; /* already known */
2221 	}
2222 
2223 	dev = p2p_create_device(p2p, addr);
2224 	if (dev == NULL) {
2225 		p2p_parse_free(&msg);
2226 		return;
2227 	}
2228 
2229 	os_get_reltime(&dev->last_seen);
2230 	dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
2231 
2232 	if (msg.listen_channel) {
2233 		os_memcpy(dev->country, msg.listen_channel, 3);
2234 		dev->listen_freq = p2p_channel_to_freq(msg.listen_channel[3],
2235 						       msg.listen_channel[4]);
2236 	}
2237 
2238 	p2p_copy_wps_info(p2p, dev, 1, &msg);
2239 
2240 	if (msg.wfd_subelems) {
2241 		wpabuf_free(dev->info.wfd_subelems);
2242 		dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
2243 	}
2244 
2245 	p2p_parse_free(&msg);
2246 
2247 	p2p_dbg(p2p, "Created device entry based on Probe Req: " MACSTR
2248 		" dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
2249 		MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
2250 		dev->info.group_capab, dev->info.device_name,
2251 		dev->listen_freq);
2252 }
2253 
2254 
p2p_add_dev_from_go_neg_req(struct p2p_data * p2p,const u8 * addr,struct p2p_message * msg)2255 struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
2256 						const u8 *addr,
2257 						struct p2p_message *msg)
2258 {
2259 	struct p2p_device *dev;
2260 
2261 	dev = p2p_get_device(p2p, addr);
2262 	if (dev) {
2263 		os_get_reltime(&dev->last_seen);
2264 		return dev; /* already known */
2265 	}
2266 
2267 	dev = p2p_create_device(p2p, addr);
2268 	if (dev == NULL)
2269 		return NULL;
2270 
2271 	p2p_add_dev_info(p2p, addr, dev, msg);
2272 
2273 	return dev;
2274 }
2275 
2276 
dev_type_match(const u8 * dev_type,const u8 * req_dev_type)2277 static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
2278 {
2279 	if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
2280 		return 1;
2281 	if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
2282 	    WPA_GET_BE32(&req_dev_type[2]) == 0 &&
2283 	    WPA_GET_BE16(&req_dev_type[6]) == 0)
2284 		return 1; /* Category match with wildcard OUI/sub-category */
2285 	return 0;
2286 }
2287 
2288 
dev_type_list_match(const u8 * dev_type,const u8 * req_dev_type[],size_t num_req_dev_type)2289 int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
2290 			size_t num_req_dev_type)
2291 {
2292 	size_t i;
2293 	for (i = 0; i < num_req_dev_type; i++) {
2294 		if (dev_type_match(dev_type, req_dev_type[i]))
2295 			return 1;
2296 	}
2297 	return 0;
2298 }
2299 
2300 
2301 /**
2302  * p2p_match_dev_type - Match local device type with requested type
2303  * @p2p: P2P module context from p2p_init()
2304  * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
2305  * Returns: 1 on match, 0 on mismatch
2306  *
2307  * This function can be used to match the Requested Device Type attribute in
2308  * WPS IE with the local device types for deciding whether to reply to a Probe
2309  * Request frame.
2310  */
p2p_match_dev_type(struct p2p_data * p2p,struct wpabuf * wps)2311 int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
2312 {
2313 	struct wps_parse_attr attr;
2314 	size_t i;
2315 
2316 	if (wps_parse_msg(wps, &attr))
2317 		return 1; /* assume no Requested Device Type attributes */
2318 
2319 	if (attr.num_req_dev_type == 0)
2320 		return 1; /* no Requested Device Type attributes -> match */
2321 
2322 	if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
2323 				attr.num_req_dev_type))
2324 		return 1; /* Own Primary Device Type matches */
2325 
2326 	for (i = 0; i < p2p->cfg->num_sec_dev_types; i++) {
2327 		if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
2328 					attr.req_dev_type,
2329 					attr.num_req_dev_type))
2330 			return 1; /* Own Secondary Device Type matches */
2331 	}
2332 
2333 	/* No matching device type found */
2334 	return 0;
2335 }
2336 
2337 
p2p_build_probe_resp_ies(struct p2p_data * p2p,const u8 * query_hash,u8 query_count)2338 struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p,
2339 					 const u8 *query_hash,
2340 					 u8 query_count)
2341 {
2342 	struct wpabuf *buf;
2343 	u8 *len;
2344 	int pw_id = -1;
2345 	size_t extra = 0;
2346 
2347 #ifdef CONFIG_WIFI_DISPLAY
2348 	if (p2p->wfd_ie_probe_resp)
2349 		extra = wpabuf_len(p2p->wfd_ie_probe_resp);
2350 #endif /* CONFIG_WIFI_DISPLAY */
2351 
2352 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2353 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2354 
2355 	if (query_count)
2356 		extra += MAX_SVC_ADV_IE_LEN;
2357 
2358 	buf = wpabuf_alloc(1000 + extra);
2359 	if (buf == NULL)
2360 		return NULL;
2361 
2362 	if (p2p->go_neg_peer) {
2363 		/* Advertise immediate availability of WPS credential */
2364 		pw_id = p2p_wps_method_pw_id(p2p->go_neg_peer->wps_method);
2365 	}
2366 
2367 	if (p2p_build_wps_ie(p2p, buf, pw_id, 1) < 0) {
2368 		p2p_dbg(p2p, "Failed to build WPS IE for Probe Response");
2369 		wpabuf_free(buf);
2370 		return NULL;
2371 	}
2372 
2373 #ifdef CONFIG_WIFI_DISPLAY
2374 	if (p2p->wfd_ie_probe_resp)
2375 		wpabuf_put_buf(buf, p2p->wfd_ie_probe_resp);
2376 #endif /* CONFIG_WIFI_DISPLAY */
2377 
2378 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2379 		wpabuf_put_buf(buf,
2380 			       p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2381 
2382 	/* P2P IE */
2383 	len = p2p_buf_add_ie_hdr(buf);
2384 	p2p_buf_add_capability(buf, p2p->dev_capab &
2385 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
2386 	if (p2p->ext_listen_interval)
2387 		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
2388 					      p2p->ext_listen_interval);
2389 	p2p_buf_add_device_info(buf, p2p, NULL);
2390 	p2p_buf_update_ie_hdr(buf, len);
2391 
2392 	if (query_count) {
2393 		p2p_buf_add_service_instance(buf, p2p, query_count, query_hash,
2394 					     p2p->p2ps_adv_list);
2395 	}
2396 
2397 	return buf;
2398 }
2399 
p2p_build_probe_resp_buf(struct p2p_data * p2p,struct wpabuf * buf,struct wpabuf * ies,const u8 * addr,int rx_freq)2400 static int p2p_build_probe_resp_buf(struct p2p_data *p2p, struct wpabuf *buf,
2401 				    struct wpabuf *ies,
2402 				    const u8 *addr, int rx_freq)
2403 {
2404 	struct ieee80211_mgmt *resp;
2405 	u8 channel, op_class;
2406 
2407 	resp = wpabuf_put(buf, offsetof(struct ieee80211_mgmt,
2408 					u.probe_resp.variable));
2409 
2410 	resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
2411 					   (WLAN_FC_STYPE_PROBE_RESP << 4));
2412 	os_memcpy(resp->da, addr, ETH_ALEN);
2413 	os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
2414 	os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
2415 	resp->u.probe_resp.beacon_int = host_to_le16(100);
2416 	/* hardware or low-level driver will setup seq_ctrl and timestamp */
2417 	resp->u.probe_resp.capab_info =
2418 	    host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
2419 		     WLAN_CAPABILITY_PRIVACY |
2420 		     WLAN_CAPABILITY_SHORT_SLOT_TIME);
2421 
2422 	wpabuf_put_u8(buf, WLAN_EID_SSID);
2423 	wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
2424 	wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
2425 
2426 	wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
2427 	wpabuf_put_u8(buf, 8);
2428 	wpabuf_put_u8(buf, (60 / 5) | 0x80);
2429 	wpabuf_put_u8(buf, 90 / 5);
2430 	wpabuf_put_u8(buf, (120 / 5) | 0x80);
2431 	wpabuf_put_u8(buf, 180 / 5);
2432 	wpabuf_put_u8(buf, (240 / 5) | 0x80);
2433 	wpabuf_put_u8(buf, 360 / 5);
2434 	wpabuf_put_u8(buf, 480 / 5);
2435 	wpabuf_put_u8(buf, 540 / 5);
2436 
2437 	if (!rx_freq) {
2438 		channel = p2p->cfg->channel;
2439 	} else if (p2p_freq_to_channel(rx_freq, &op_class, &channel)) {
2440 		p2p_err(p2p, "Failed to convert freq to channel");
2441 		return -1;
2442 	}
2443 
2444 	wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
2445 	wpabuf_put_u8(buf, 1);
2446 	wpabuf_put_u8(buf, channel);
2447 
2448 	wpabuf_put_buf(buf, ies);
2449 
2450 	return 0;
2451 }
2452 
p2p_service_find_asp(struct p2p_data * p2p,const u8 * hash)2453 static int p2p_service_find_asp(struct p2p_data *p2p, const u8 *hash)
2454 {
2455 	struct p2ps_advertisement *adv_data;
2456 	int any_wfa;
2457 
2458 	p2p_dbg(p2p, "ASP find - ASP list: %p", p2p->p2ps_adv_list);
2459 
2460 	/* Wildcard org.wi-fi.wfds matches any WFA spec defined service */
2461 	any_wfa = os_memcmp(hash, p2p->wild_card_hash, P2PS_HASH_LEN) == 0;
2462 
2463 	adv_data = p2p->p2ps_adv_list;
2464 	while (adv_data) {
2465 		if (os_memcmp(hash, adv_data->hash, P2PS_HASH_LEN) == 0)
2466 			return 1; /* exact hash match */
2467 		if (any_wfa &&
2468 		    os_strncmp(adv_data->svc_name, P2PS_WILD_HASH_STR,
2469 			       os_strlen(P2PS_WILD_HASH_STR)) == 0)
2470 			return 1; /* WFA service match */
2471 		adv_data = adv_data->next;
2472 	}
2473 
2474 	return 0;
2475 }
2476 
2477 
2478 static enum p2p_probe_req_status
p2p_reply_probe(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq)2479 p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2480 		const u8 *bssid, const u8 *ie, size_t ie_len,
2481 		unsigned int rx_freq)
2482 {
2483 	struct ieee802_11_elems elems;
2484 	struct wpabuf *buf;
2485 	struct p2p_message msg;
2486 	struct wpabuf *ies;
2487 
2488 	if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
2489 	    ParseFailed) {
2490 		/* Ignore invalid Probe Request frames */
2491 		p2p_dbg(p2p, "Could not parse Probe Request frame - ignore it");
2492 		return P2P_PREQ_MALFORMED;
2493 	}
2494 
2495 	if (elems.p2p == NULL) {
2496 		/* not a P2P probe - ignore it */
2497 		p2p_dbg(p2p, "Not a P2P probe - ignore it");
2498 		return P2P_PREQ_NOT_P2P;
2499 	}
2500 
2501 	if (dst && !is_broadcast_ether_addr(dst) &&
2502 	    !ether_addr_equal(dst, p2p->cfg->dev_addr)) {
2503 		/* Not sent to the broadcast address or our P2P Device Address
2504 		 */
2505 		p2p_dbg(p2p, "Probe Req DA " MACSTR " not ours - ignore it",
2506 			MAC2STR(dst));
2507 		return P2P_PREQ_NOT_PROCESSED;
2508 	}
2509 
2510 	if (bssid && !is_broadcast_ether_addr(bssid)) {
2511 		/* Not sent to the Wildcard BSSID */
2512 		p2p_dbg(p2p, "Probe Req BSSID " MACSTR " not wildcard - ignore it",
2513 			MAC2STR(bssid));
2514 		return P2P_PREQ_NOT_PROCESSED;
2515 	}
2516 
2517 	if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
2518 	    os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
2519 	    0) {
2520 		/* not using P2P Wildcard SSID - ignore */
2521 		p2p_dbg(p2p, "Probe Req not using P2P Wildcard SSID - ignore it");
2522 		return P2P_PREQ_NOT_PROCESSED;
2523 	}
2524 
2525 	if (supp_rates_11b_only(&elems)) {
2526 		/* Indicates support for 11b rates only */
2527 		p2p_dbg(p2p, "Probe Req with 11b rates only supported - ignore it");
2528 		return P2P_PREQ_NOT_P2P;
2529 	}
2530 
2531 	os_memset(&msg, 0, sizeof(msg));
2532 	if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
2533 		/* Could not parse P2P attributes */
2534 		p2p_dbg(p2p, "Could not parse P2P attributes in Probe Req - ignore it");
2535 		return P2P_PREQ_NOT_P2P;
2536 	}
2537 
2538 	if (msg.service_hash && msg.service_hash_count) {
2539 		const u8 *hash = msg.service_hash;
2540 		u8 i;
2541 		int p2ps_svc_found = 0;
2542 
2543 		p2p_dbg(p2p, "in_listen=%d drv_in_listen=%d when received P2PS Probe Request at %u MHz; own Listen channel %u, pending listen freq %u MHz",
2544 			p2p->in_listen, p2p->drv_in_listen, rx_freq,
2545 			p2p->cfg->channel, p2p->pending_listen_freq);
2546 
2547 		if (!p2p->in_listen && !p2p->drv_in_listen &&
2548 		    p2p->pending_listen_freq && rx_freq &&
2549 		    rx_freq != p2p->pending_listen_freq) {
2550 			p2p_dbg(p2p, "Do not reply to Probe Request frame that was received on %u MHz while waiting to start Listen state on %u MHz",
2551 				rx_freq, p2p->pending_listen_freq);
2552 			p2p_parse_free(&msg);
2553 			return P2P_PREQ_NOT_LISTEN;
2554 		}
2555 
2556 		for (i = 0; i < msg.service_hash_count; i++) {
2557 			if (p2p_service_find_asp(p2p, hash)) {
2558 				p2p_dbg(p2p, "Service Hash match found: "
2559 					MACSTR, MAC2STR(hash));
2560 				p2ps_svc_found = 1;
2561 				break;
2562 			}
2563 			hash += P2PS_HASH_LEN;
2564 		}
2565 
2566 		/* Probed hash unknown */
2567 		if (!p2ps_svc_found) {
2568 			p2p_dbg(p2p, "No Service Hash match found");
2569 			p2p_parse_free(&msg);
2570 			return P2P_PREQ_NOT_PROCESSED;
2571 		}
2572 	} else {
2573 		/* This is not a P2PS Probe Request */
2574 		p2p_dbg(p2p, "No P2PS Hash in Probe Request");
2575 
2576 		if (!p2p->in_listen || !p2p->drv_in_listen) {
2577 			/* not in Listen state - ignore Probe Request */
2578 			p2p_dbg(p2p, "Not in Listen state (in_listen=%d drv_in_listen=%d) - ignore Probe Request",
2579 				p2p->in_listen, p2p->drv_in_listen);
2580 			p2p_parse_free(&msg);
2581 			return P2P_PREQ_NOT_LISTEN;
2582 		}
2583 	}
2584 
2585 	if (msg.device_id &&
2586 	    !ether_addr_equal(msg.device_id, p2p->cfg->dev_addr)) {
2587 		/* Device ID did not match */
2588 		p2p_dbg(p2p, "Probe Req requested Device ID " MACSTR " did not match - ignore it",
2589 			MAC2STR(msg.device_id));
2590 		p2p_parse_free(&msg);
2591 		return P2P_PREQ_NOT_PROCESSED;
2592 	}
2593 
2594 	/* Check Requested Device Type match */
2595 	if (msg.wps_attributes &&
2596 	    !p2p_match_dev_type(p2p, msg.wps_attributes)) {
2597 		/* No match with Requested Device Type */
2598 		p2p_dbg(p2p, "Probe Req requested Device Type did not match - ignore it");
2599 		p2p_parse_free(&msg);
2600 		return P2P_PREQ_NOT_PROCESSED;
2601 	}
2602 
2603 	if (!p2p->cfg->send_probe_resp) {
2604 		/* Response generated elsewhere */
2605 		p2p_dbg(p2p, "Probe Resp generated elsewhere - do not generate additional response");
2606 		p2p_parse_free(&msg);
2607 		return P2P_PREQ_NOT_PROCESSED;
2608 	}
2609 
2610 	p2p_dbg(p2p, "Reply to P2P Probe Request in Listen state");
2611 
2612 	/*
2613 	 * We do not really have a specific BSS that this frame is advertising,
2614 	 * so build a frame that has some information in valid format. This is
2615 	 * really only used for discovery purposes, not to learn exact BSS
2616 	 * parameters.
2617 	 */
2618 	ies = p2p_build_probe_resp_ies(p2p, msg.service_hash,
2619 				       msg.service_hash_count);
2620 	p2p_parse_free(&msg);
2621 	if (ies == NULL)
2622 		return P2P_PREQ_NOT_PROCESSED;
2623 
2624 	buf = wpabuf_alloc(200 + wpabuf_len(ies));
2625 	if (buf == NULL) {
2626 		wpabuf_free(ies);
2627 		return P2P_PREQ_NOT_PROCESSED;
2628 	}
2629 
2630 	if (p2p_build_probe_resp_buf(p2p, buf, ies, addr, rx_freq)) {
2631 		wpabuf_free(ies);
2632 		wpabuf_free(buf);
2633 		return P2P_PREQ_NOT_PROCESSED;
2634 	}
2635 
2636 	wpabuf_free(ies);
2637 
2638 	p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf, rx_freq);
2639 
2640 	wpabuf_free(buf);
2641 
2642 	return P2P_PREQ_PROCESSED;
2643 }
2644 
2645 
2646 enum p2p_probe_req_status
p2p_probe_req_rx(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq,int p2p_lo_started)2647 p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2648 		 const u8 *bssid, const u8 *ie, size_t ie_len,
2649 		 unsigned int rx_freq, int p2p_lo_started)
2650 {
2651 	enum p2p_probe_req_status res;
2652 
2653 	p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
2654 
2655 	if (p2p_lo_started) {
2656 		p2p_dbg(p2p,
2657 			"Probe Response is offloaded, do not reply Probe Request");
2658 		return P2P_PREQ_PROCESSED;
2659 	}
2660 
2661 	res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len, rx_freq);
2662 	if (res != P2P_PREQ_PROCESSED && res != P2P_PREQ_NOT_PROCESSED)
2663 		return res;
2664 
2665 	/*
2666 	 * Activate a pending GO Negotiation/Invite flow if a received Probe
2667 	 * Request frame is from an expected peer. Some devices may share the
2668 	 * same address for P2P and non-P2P STA running simultaneously. The
2669 	 * P2P_PREQ_PROCESSED and P2P_PREQ_NOT_PROCESSED p2p_reply_probe()
2670 	 * return values verified above ensure we are handling a Probe Request
2671 	 * frame from a P2P peer.
2672 	 */
2673 	if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
2674 	    p2p->go_neg_peer &&
2675 	    ether_addr_equal(addr, p2p->go_neg_peer->info.p2p_device_addr) &&
2676 	    !(p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
2677 		/* Received a Probe Request from GO Negotiation peer */
2678 		p2p_dbg(p2p, "Found GO Negotiation peer - try to start GO negotiation from timeout");
2679 		eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
2680 		eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
2681 		return res;
2682 	}
2683 
2684 	if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
2685 	    p2p->invite_peer &&
2686 	    (p2p->invite_peer->flags & P2P_DEV_WAIT_INV_REQ_ACK) &&
2687 	    ether_addr_equal(addr, p2p->invite_peer->info.p2p_device_addr)) {
2688 		/* Received a Probe Request from Invite peer */
2689 		p2p_dbg(p2p, "Found Invite peer - try to start Invite from timeout");
2690 		eloop_cancel_timeout(p2p_invite_start, p2p, NULL);
2691 		eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
2692 		return res;
2693 	}
2694 
2695 	return res;
2696 }
2697 
2698 
p2p_assoc_req_ie_wlan_ap(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,struct wpabuf * p2p_ie)2699 static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
2700 				    u8 *buf, size_t len, struct wpabuf *p2p_ie)
2701 {
2702 	struct wpabuf *tmp;
2703 	u8 *lpos;
2704 	size_t tmplen;
2705 	int res;
2706 	u8 group_capab;
2707 	struct p2p_message msg;
2708 
2709 	if (p2p_ie == NULL)
2710 		return 0; /* WLAN AP is not a P2P manager */
2711 
2712 	os_memset(&msg, 0, sizeof(msg));
2713 	if (p2p_parse_p2p_ie(p2p_ie, &msg) < 0)
2714 		return 0;
2715 
2716 	p2p_dbg(p2p, "BSS P2P manageability %s",
2717 		msg.manageability ? "enabled" : "disabled");
2718 
2719 	if (!msg.manageability)
2720 		return 0;
2721 
2722 	/*
2723 	 * (Re)Association Request - P2P IE
2724 	 * P2P Capability attribute (shall be present)
2725 	 * P2P Interface attribute (present if concurrent device and
2726 	 *	P2P Management is enabled)
2727 	 */
2728 	tmp = wpabuf_alloc(200);
2729 	if (tmp == NULL)
2730 		return -1;
2731 
2732 	lpos = p2p_buf_add_ie_hdr(tmp);
2733 	group_capab = 0;
2734 	if (p2p->num_groups > 0) {
2735 		group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
2736 		if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2737 		    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
2738 		    p2p->cross_connect)
2739 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
2740 	}
2741 	p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
2742 	if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2743 	    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
2744 		p2p_buf_add_p2p_interface(tmp, p2p);
2745 	p2p_buf_update_ie_hdr(tmp, lpos);
2746 
2747 	tmplen = wpabuf_len(tmp);
2748 	if (tmplen > len)
2749 		res = -1;
2750 	else {
2751 		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2752 		res = tmplen;
2753 	}
2754 	wpabuf_free(tmp);
2755 
2756 	return res;
2757 }
2758 
2759 
p2p_assoc_req_ie(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,int p2p_group,struct wpabuf * p2p_ie)2760 int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
2761 		     size_t len, int p2p_group, struct wpabuf *p2p_ie)
2762 {
2763 	struct wpabuf *tmp;
2764 	u8 *lpos;
2765 	struct p2p_device *peer;
2766 	size_t tmplen;
2767 	int res;
2768 	size_t extra = 0;
2769 
2770 	if (!p2p_group)
2771 		return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
2772 
2773 #ifdef CONFIG_WIFI_DISPLAY
2774 	if (p2p->wfd_ie_assoc_req)
2775 		extra = wpabuf_len(p2p->wfd_ie_assoc_req);
2776 #endif /* CONFIG_WIFI_DISPLAY */
2777 
2778 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2779 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2780 
2781 	/*
2782 	 * (Re)Association Request - P2P IE
2783 	 * P2P Capability attribute (shall be present)
2784 	 * Extended Listen Timing (may be present)
2785 	 * P2P Device Info attribute (shall be present)
2786 	 */
2787 	tmp = wpabuf_alloc(200 + extra);
2788 	if (tmp == NULL)
2789 		return -1;
2790 
2791 #ifdef CONFIG_WIFI_DISPLAY
2792 	if (p2p->wfd_ie_assoc_req)
2793 		wpabuf_put_buf(tmp, p2p->wfd_ie_assoc_req);
2794 #endif /* CONFIG_WIFI_DISPLAY */
2795 
2796 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2797 		wpabuf_put_buf(tmp,
2798 			       p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2799 
2800 	peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
2801 
2802 	lpos = p2p_buf_add_ie_hdr(tmp);
2803 	p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
2804 	if (p2p->ext_listen_interval)
2805 		p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
2806 					      p2p->ext_listen_interval);
2807 	p2p_buf_add_device_info(tmp, p2p, peer);
2808 	p2p_buf_update_ie_hdr(tmp, lpos);
2809 
2810 	tmplen = wpabuf_len(tmp);
2811 	if (tmplen > len)
2812 		res = -1;
2813 	else {
2814 		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2815 		res = tmplen;
2816 	}
2817 	wpabuf_free(tmp);
2818 
2819 	return res;
2820 }
2821 
2822 
p2p_scan_result_text(const u8 * ies,size_t ies_len,char * buf,char * end)2823 int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
2824 {
2825 	struct wpabuf *p2p_ie;
2826 	int ret;
2827 
2828 	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
2829 	if (p2p_ie == NULL)
2830 		return 0;
2831 
2832 	ret = p2p_attr_text(p2p_ie, buf, end);
2833 	wpabuf_free(p2p_ie);
2834 	return ret;
2835 }
2836 
2837 
2838 struct p2ps_advertisement *
p2p_service_p2ps_id(struct p2p_data * p2p,u32 adv_id)2839 p2p_service_p2ps_id(struct p2p_data *p2p, u32 adv_id)
2840 {
2841 	struct p2ps_advertisement *adv_data;
2842 
2843 	if (!p2p)
2844 		return NULL;
2845 
2846 	adv_data = p2p->p2ps_adv_list;
2847 	while (adv_data) {
2848 		if (adv_data->id == adv_id)
2849 			return adv_data;
2850 		adv_data = adv_data->next;
2851 	}
2852 
2853 	return NULL;
2854 }
2855 
2856 
p2p_service_del_asp(struct p2p_data * p2p,u32 adv_id)2857 int p2p_service_del_asp(struct p2p_data *p2p, u32 adv_id)
2858 {
2859 	struct p2ps_advertisement *adv_data;
2860 	struct p2ps_advertisement **prior;
2861 
2862 	if (!p2p)
2863 		return -1;
2864 
2865 	adv_data = p2p->p2ps_adv_list;
2866 	prior = &p2p->p2ps_adv_list;
2867 	while (adv_data) {
2868 		if (adv_data->id == adv_id) {
2869 			p2p_dbg(p2p, "Delete ASP adv_id=0x%x", adv_id);
2870 			*prior = adv_data->next;
2871 			os_free(adv_data);
2872 			return 0;
2873 		}
2874 		prior = &adv_data->next;
2875 		adv_data = adv_data->next;
2876 	}
2877 
2878 	return -1;
2879 }
2880 
2881 
p2p_service_add_asp(struct p2p_data * p2p,int auto_accept,u32 adv_id,const char * adv_str,u8 svc_state,u16 config_methods,const char * svc_info,const u8 * cpt_priority)2882 int p2p_service_add_asp(struct p2p_data *p2p, int auto_accept, u32 adv_id,
2883 			const char *adv_str, u8 svc_state, u16 config_methods,
2884 			const char *svc_info, const u8 *cpt_priority)
2885 {
2886 	struct p2ps_advertisement *adv_data, *tmp, **prev;
2887 	u8 buf[P2PS_HASH_LEN];
2888 	size_t adv_data_len, adv_len, info_len = 0;
2889 	int i;
2890 
2891 	if (!p2p || !adv_str || !adv_str[0] || !cpt_priority)
2892 		return -1;
2893 
2894 	if (!(config_methods & p2p->cfg->config_methods)) {
2895 		p2p_dbg(p2p, "Config methods not supported svc: 0x%x dev: 0x%x",
2896 			config_methods, p2p->cfg->config_methods);
2897 		return -1;
2898 	}
2899 
2900 	if (!p2ps_gen_hash(p2p, adv_str, buf))
2901 		return -1;
2902 
2903 	if (svc_info)
2904 		info_len = os_strlen(svc_info);
2905 	adv_len = os_strlen(adv_str);
2906 	adv_data_len = sizeof(struct p2ps_advertisement) + adv_len + 1 +
2907 		info_len + 1;
2908 
2909 	adv_data = os_zalloc(adv_data_len);
2910 	if (!adv_data)
2911 		return -1;
2912 
2913 	os_memcpy(adv_data->hash, buf, P2PS_HASH_LEN);
2914 	adv_data->id = adv_id;
2915 	adv_data->state = svc_state;
2916 	adv_data->config_methods = config_methods & p2p->cfg->config_methods;
2917 	adv_data->auto_accept = (u8) auto_accept;
2918 	os_memcpy(adv_data->svc_name, adv_str, adv_len);
2919 
2920 	for (i = 0; cpt_priority[i] && i < P2PS_FEATURE_CAPAB_CPT_MAX; i++) {
2921 		adv_data->cpt_priority[i] = cpt_priority[i];
2922 		adv_data->cpt_mask |= cpt_priority[i];
2923 	}
2924 
2925 	if (svc_info && info_len) {
2926 		adv_data->svc_info = &adv_data->svc_name[adv_len + 1];
2927 		os_memcpy(adv_data->svc_info, svc_info, info_len);
2928 	}
2929 
2930 	/*
2931 	 * Group Advertisements by service string. They do not need to be
2932 	 * sorted, but groups allow easier Probe Response instance grouping
2933 	 */
2934 	tmp = p2p->p2ps_adv_list;
2935 	prev = &p2p->p2ps_adv_list;
2936 	while (tmp) {
2937 		if (tmp->id == adv_data->id) {
2938 			if (os_strcmp(tmp->svc_name, adv_data->svc_name) != 0) {
2939 				os_free(adv_data);
2940 				return -1;
2941 			}
2942 			adv_data->next = tmp->next;
2943 			*prev = adv_data;
2944 			os_free(tmp);
2945 			goto inserted;
2946 		} else {
2947 			if (os_strcmp(tmp->svc_name, adv_data->svc_name) == 0) {
2948 				adv_data->next = tmp->next;
2949 				tmp->next = adv_data;
2950 				goto inserted;
2951 			}
2952 		}
2953 		prev = &tmp->next;
2954 		tmp = tmp->next;
2955 	}
2956 
2957 	/* No svc_name match found */
2958 	adv_data->next = p2p->p2ps_adv_list;
2959 	p2p->p2ps_adv_list = adv_data;
2960 
2961 inserted:
2962 	p2p_dbg(p2p,
2963 		"Added ASP advertisement adv_id=0x%x config_methods=0x%x svc_state=0x%x adv_str='%s' cpt_mask=0x%x",
2964 		adv_id, adv_data->config_methods, svc_state, adv_str,
2965 		adv_data->cpt_mask);
2966 
2967 	return 0;
2968 }
2969 
2970 
p2p_service_flush_asp(struct p2p_data * p2p)2971 void p2p_service_flush_asp(struct p2p_data *p2p)
2972 {
2973 	struct p2ps_advertisement *adv, *prev;
2974 
2975 	if (!p2p)
2976 		return;
2977 
2978 	adv = p2p->p2ps_adv_list;
2979 	while (adv) {
2980 		prev = adv;
2981 		adv = adv->next;
2982 		os_free(prev);
2983 	}
2984 
2985 	p2p->p2ps_adv_list = NULL;
2986 	p2ps_prov_free(p2p);
2987 	p2p_dbg(p2p, "All ASP advertisements flushed");
2988 }
2989 
2990 
p2p_parse_dev_addr_in_p2p_ie(struct wpabuf * p2p_ie,u8 * dev_addr)2991 int p2p_parse_dev_addr_in_p2p_ie(struct wpabuf *p2p_ie, u8 *dev_addr)
2992 {
2993 	struct p2p_message msg;
2994 
2995 	os_memset(&msg, 0, sizeof(msg));
2996 	if (p2p_parse_p2p_ie(p2p_ie, &msg))
2997 		return -1;
2998 
2999 	if (msg.p2p_device_addr) {
3000 		os_memcpy(dev_addr, msg.p2p_device_addr, ETH_ALEN);
3001 		return 0;
3002 	} else if (msg.device_id) {
3003 		os_memcpy(dev_addr, msg.device_id, ETH_ALEN);
3004 		return 0;
3005 	}
3006 	return -1;
3007 }
3008 
3009 
p2p_parse_dev_addr(const u8 * ies,size_t ies_len,u8 * dev_addr)3010 int p2p_parse_dev_addr(const u8 *ies, size_t ies_len, u8 *dev_addr)
3011 {
3012 	struct wpabuf *p2p_ie;
3013 	int ret;
3014 
3015 	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
3016 					     P2P_IE_VENDOR_TYPE);
3017 	if (p2p_ie == NULL)
3018 		return -1;
3019 	ret = p2p_parse_dev_addr_in_p2p_ie(p2p_ie, dev_addr);
3020 	wpabuf_free(p2p_ie);
3021 	return ret;
3022 }
3023 
3024 
p2p_clear_go_neg(struct p2p_data * p2p)3025 static void p2p_clear_go_neg(struct p2p_data *p2p)
3026 {
3027 	p2p->go_neg_peer = NULL;
3028 	p2p_clear_timeout(p2p);
3029 	p2p_set_state(p2p, P2P_IDLE);
3030 }
3031 
3032 
p2p_wps_success_cb(struct p2p_data * p2p,const u8 * mac_addr)3033 void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
3034 {
3035 	if (p2p->go_neg_peer == NULL) {
3036 		p2p_dbg(p2p, "No pending Group Formation - ignore WPS registration success notification");
3037 		return; /* No pending Group Formation */
3038 	}
3039 
3040 	if (!ether_addr_equal(mac_addr, p2p->go_neg_peer->intended_addr)) {
3041 		p2p_dbg(p2p, "Ignore WPS registration success notification for "
3042 			MACSTR " (GO Negotiation peer " MACSTR ")",
3043 			MAC2STR(mac_addr),
3044 			MAC2STR(p2p->go_neg_peer->intended_addr));
3045 		return; /* Ignore unexpected peer address */
3046 	}
3047 
3048 	p2p_dbg(p2p, "Group Formation completed successfully with " MACSTR,
3049 		MAC2STR(mac_addr));
3050 
3051 	p2p_clear_go_neg(p2p);
3052 }
3053 
3054 
p2p_group_formation_failed(struct p2p_data * p2p)3055 void p2p_group_formation_failed(struct p2p_data *p2p)
3056 {
3057 	if (p2p->go_neg_peer == NULL) {
3058 		p2p_dbg(p2p, "No pending Group Formation - ignore group formation failure notification");
3059 		return; /* No pending Group Formation */
3060 	}
3061 
3062 	p2p_dbg(p2p, "Group Formation failed with " MACSTR,
3063 		MAC2STR(p2p->go_neg_peer->intended_addr));
3064 
3065 	p2p_clear_go_neg(p2p);
3066 }
3067 
3068 
is_p2p_6ghz_disabled(struct p2p_data * p2p)3069 bool is_p2p_6ghz_disabled(struct p2p_data *p2p)
3070 {
3071 	if (p2p)
3072 		return p2p->cfg->p2p_6ghz_disable;
3073 	return false;
3074 }
3075 
3076 
is_p2p_dfs_chan_enabled(struct p2p_data * p2p)3077 bool is_p2p_dfs_chan_enabled(struct p2p_data *p2p)
3078 {
3079 	if (p2p)
3080 		return p2p->cfg->p2p_dfs_chan_enable;
3081 	return false;
3082 }
3083 
3084 
p2p_set_dev_addr(struct p2p_data * p2p,const u8 * addr)3085 void p2p_set_dev_addr(struct p2p_data *p2p, const u8 *addr)
3086 {
3087 	if (p2p && addr)
3088 		os_memcpy(p2p->cfg->dev_addr, addr, ETH_ALEN);
3089 }
3090 
3091 
p2p_pairing_info_deinit(struct p2p_data * p2p)3092 static void p2p_pairing_info_deinit(struct p2p_data *p2p)
3093 {
3094 #ifdef CONFIG_PASN
3095 	pasn_initiator_pmksa_cache_deinit(p2p->initiator_pmksa);
3096 	pasn_responder_pmksa_cache_deinit(p2p->responder_pmksa);
3097 #endif /* CONFIG_PASN */
3098 	os_free(p2p->pairing_info);
3099 }
3100 
3101 
p2p_pairing_info_init(struct p2p_data * p2p)3102 static int p2p_pairing_info_init(struct p2p_data *p2p)
3103 {
3104 	struct p2p_pairing_info *pairing_info;
3105 
3106 	if (p2p->cfg->pairing_config.dik_len > DEVICE_IDENTITY_KEY_MAX_LEN)
3107 		return -1;
3108 
3109 	pairing_info = os_zalloc(sizeof(struct p2p_pairing_info));
3110 	if (!pairing_info)
3111 		return -1;
3112 
3113 	pairing_info->enable_pairing_setup =
3114 		p2p->cfg->pairing_config.enable_pairing_setup;
3115 	pairing_info->enable_pairing_cache =
3116 		p2p->cfg->pairing_config.enable_pairing_cache;
3117 	pairing_info->supported_bootstrap =
3118 		p2p->cfg->pairing_config.bootstrap_methods;
3119 
3120 	pairing_info->dev_ik.cipher_version =
3121 		p2p->cfg->pairing_config.dik_cipher;
3122 	pairing_info->dev_ik.dik_len = p2p->cfg->pairing_config.dik_len;
3123 	os_memcpy(pairing_info->dev_ik.dik_data,
3124 		  p2p->cfg->pairing_config.dik_data,
3125 		  p2p->cfg->pairing_config.dik_len);
3126 	pairing_info->dev_ik.expiration = 24; /* hours */
3127 
3128 	p2p_pairing_info_deinit(p2p);
3129 
3130 	p2p->pairing_info = pairing_info;
3131 #ifdef CONFIG_PASN
3132 	p2p->initiator_pmksa = pasn_initiator_pmksa_cache_init();
3133 	p2p->responder_pmksa = pasn_responder_pmksa_cache_init();
3134 #endif /* CONFIG_PASN */
3135 
3136 	return 0;
3137 }
3138 
3139 
p2p_init(const struct p2p_config * cfg)3140 struct p2p_data * p2p_init(const struct p2p_config *cfg)
3141 {
3142 	struct p2p_data *p2p;
3143 
3144 	if (cfg->max_peers < 1 ||
3145 	    cfg->passphrase_len < 8 || cfg->passphrase_len > 63)
3146 		return NULL;
3147 
3148 	p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
3149 	if (p2p == NULL)
3150 		return NULL;
3151 	p2p->cfg = (struct p2p_config *) (p2p + 1);
3152 	os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
3153 	if (cfg->dev_name)
3154 		p2p->cfg->dev_name = os_strdup(cfg->dev_name);
3155 	if (cfg->manufacturer)
3156 		p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
3157 	if (cfg->model_name)
3158 		p2p->cfg->model_name = os_strdup(cfg->model_name);
3159 	if (cfg->model_number)
3160 		p2p->cfg->model_number = os_strdup(cfg->model_number);
3161 	if (cfg->serial_number)
3162 		p2p->cfg->serial_number = os_strdup(cfg->serial_number);
3163 	if (cfg->pref_chan) {
3164 		p2p->cfg->pref_chan = os_malloc(cfg->num_pref_chan *
3165 						sizeof(struct p2p_channel));
3166 		if (p2p->cfg->pref_chan) {
3167 			os_memcpy(p2p->cfg->pref_chan, cfg->pref_chan,
3168 				  cfg->num_pref_chan *
3169 				  sizeof(struct p2p_channel));
3170 		} else
3171 			p2p->cfg->num_pref_chan = 0;
3172 	}
3173 
3174 	p2ps_gen_hash(p2p, P2PS_WILD_HASH_STR, p2p->wild_card_hash);
3175 
3176 	p2p->min_disc_int = 1;
3177 	p2p->max_disc_int = 3;
3178 	p2p->max_disc_tu = -1;
3179 
3180 	if (os_get_random(&p2p->next_tie_breaker, 1) < 0)
3181 		p2p->next_tie_breaker = 0;
3182 	p2p->next_tie_breaker &= 0x01;
3183 	if (cfg->sd_request)
3184 		p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3185 	p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
3186 	if (cfg->concurrent_operations)
3187 		p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
3188 	p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3189 
3190 	dl_list_init(&p2p->devices);
3191 
3192 	p2p->go_timeout = 100;
3193 	p2p->client_timeout = 20;
3194 	p2p->num_p2p_sd_queries = 0;
3195 	/* Default comeback after one second */
3196 	if (!p2p->cfg->comeback_after)
3197 		p2p->cfg->comeback_after = 977; /* TUs */
3198 	p2p_pairing_info_init(p2p);
3199 
3200 	p2p_dbg(p2p, "initialized");
3201 	p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
3202 	p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
3203 
3204 	return p2p;
3205 }
3206 
3207 
p2p_deinit(struct p2p_data * p2p)3208 void p2p_deinit(struct p2p_data *p2p)
3209 {
3210 #ifdef CONFIG_WIFI_DISPLAY
3211 	wpabuf_free(p2p->wfd_ie_beacon);
3212 	wpabuf_free(p2p->wfd_ie_probe_req);
3213 	wpabuf_free(p2p->wfd_ie_probe_resp);
3214 	wpabuf_free(p2p->wfd_ie_assoc_req);
3215 	wpabuf_free(p2p->wfd_ie_invitation);
3216 	wpabuf_free(p2p->wfd_ie_prov_disc_req);
3217 	wpabuf_free(p2p->wfd_ie_prov_disc_resp);
3218 	wpabuf_free(p2p->wfd_ie_go_neg);
3219 	wpabuf_free(p2p->wfd_dev_info);
3220 	wpabuf_free(p2p->wfd_assoc_bssid);
3221 	wpabuf_free(p2p->wfd_coupled_sink_info);
3222 	wpabuf_free(p2p->wfd_r2_dev_info);
3223 #endif /* CONFIG_WIFI_DISPLAY */
3224 
3225 	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3226 	eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
3227 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3228 	p2p_flush(p2p);
3229 	p2p_free_req_dev_types(p2p);
3230 	os_free(p2p->cfg->dev_name);
3231 	os_free(p2p->cfg->manufacturer);
3232 	os_free(p2p->cfg->model_name);
3233 	os_free(p2p->cfg->model_number);
3234 	os_free(p2p->cfg->serial_number);
3235 	os_free(p2p->cfg->pref_chan);
3236 	os_free(p2p->groups);
3237 	p2ps_prov_free(p2p);
3238 	wpabuf_free(p2p->sd_resp);
3239 	p2p_remove_wps_vendor_extensions(p2p);
3240 	os_free(p2p->no_go_freq.range);
3241 	p2p_service_flush_asp(p2p);
3242 	p2p_pairing_info_deinit(p2p);
3243 
3244 	os_free(p2p);
3245 }
3246 
3247 
p2p_flush(struct p2p_data * p2p)3248 void p2p_flush(struct p2p_data *p2p)
3249 {
3250 	struct p2p_device *dev, *prev;
3251 
3252 	p2p_ext_listen(p2p, 0, 0);
3253 	p2p_stop_find(p2p);
3254 	dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
3255 			      list) {
3256 		dl_list_del(&dev->list);
3257 		p2p_device_free(p2p, dev);
3258 	}
3259 	p2p_free_sd_queries(p2p);
3260 	p2p->ssid_set = 0;
3261 	p2ps_prov_free(p2p);
3262 	p2p_reset_pending_pd(p2p);
3263 	p2p->override_pref_op_class = 0;
3264 	p2p->override_pref_channel = 0;
3265 }
3266 
3267 
p2p_unauthorize(struct p2p_data * p2p,const u8 * addr)3268 int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
3269 {
3270 	struct p2p_device *dev;
3271 
3272 	dev = p2p_get_device(p2p, addr);
3273 	if (dev == NULL)
3274 		return -1;
3275 
3276 	p2p_dbg(p2p, "Unauthorizing " MACSTR, MAC2STR(addr));
3277 
3278 	if (p2p->go_neg_peer == dev) {
3279 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3280 		p2p->go_neg_peer = NULL;
3281 	}
3282 
3283 	dev->wps_method = WPS_NOT_READY;
3284 	dev->oob_pw_id = 0;
3285 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
3286 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
3287 
3288 	return 0;
3289 }
3290 
3291 
p2p_set_dev_name(struct p2p_data * p2p,const char * dev_name)3292 int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
3293 {
3294 	os_free(p2p->cfg->dev_name);
3295 	if (dev_name) {
3296 		p2p->cfg->dev_name = os_strdup(dev_name);
3297 		if (p2p->cfg->dev_name == NULL)
3298 			return -1;
3299 	} else
3300 		p2p->cfg->dev_name = NULL;
3301 	return 0;
3302 }
3303 
3304 
p2p_set_manufacturer(struct p2p_data * p2p,const char * manufacturer)3305 int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
3306 {
3307 	os_free(p2p->cfg->manufacturer);
3308 	p2p->cfg->manufacturer = NULL;
3309 	if (manufacturer) {
3310 		p2p->cfg->manufacturer = os_strdup(manufacturer);
3311 		if (p2p->cfg->manufacturer == NULL)
3312 			return -1;
3313 	}
3314 
3315 	return 0;
3316 }
3317 
3318 
p2p_set_model_name(struct p2p_data * p2p,const char * model_name)3319 int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
3320 {
3321 	os_free(p2p->cfg->model_name);
3322 	p2p->cfg->model_name = NULL;
3323 	if (model_name) {
3324 		p2p->cfg->model_name = os_strdup(model_name);
3325 		if (p2p->cfg->model_name == NULL)
3326 			return -1;
3327 	}
3328 
3329 	return 0;
3330 }
3331 
3332 
p2p_set_model_number(struct p2p_data * p2p,const char * model_number)3333 int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
3334 {
3335 	os_free(p2p->cfg->model_number);
3336 	p2p->cfg->model_number = NULL;
3337 	if (model_number) {
3338 		p2p->cfg->model_number = os_strdup(model_number);
3339 		if (p2p->cfg->model_number == NULL)
3340 			return -1;
3341 	}
3342 
3343 	return 0;
3344 }
3345 
3346 
p2p_set_serial_number(struct p2p_data * p2p,const char * serial_number)3347 int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
3348 {
3349 	os_free(p2p->cfg->serial_number);
3350 	p2p->cfg->serial_number = NULL;
3351 	if (serial_number) {
3352 		p2p->cfg->serial_number = os_strdup(serial_number);
3353 		if (p2p->cfg->serial_number == NULL)
3354 			return -1;
3355 	}
3356 
3357 	return 0;
3358 }
3359 
3360 
p2p_set_config_methods(struct p2p_data * p2p,u16 config_methods)3361 void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
3362 {
3363 	p2p->cfg->config_methods = config_methods;
3364 }
3365 
3366 
p2p_set_uuid(struct p2p_data * p2p,const u8 * uuid)3367 void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
3368 {
3369 	os_memcpy(p2p->cfg->uuid, uuid, 16);
3370 }
3371 
3372 
p2p_set_pri_dev_type(struct p2p_data * p2p,const u8 * pri_dev_type)3373 int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
3374 {
3375 	os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
3376 	return 0;
3377 }
3378 
3379 
p2p_set_sec_dev_types(struct p2p_data * p2p,const u8 dev_types[][8],size_t num_dev_types)3380 int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
3381 			  size_t num_dev_types)
3382 {
3383 	if (num_dev_types > P2P_SEC_DEVICE_TYPES)
3384 		num_dev_types = P2P_SEC_DEVICE_TYPES;
3385 	p2p->cfg->num_sec_dev_types = num_dev_types;
3386 	os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
3387 	return 0;
3388 }
3389 
3390 
p2p_remove_wps_vendor_extensions(struct p2p_data * p2p)3391 void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
3392 {
3393 	int i;
3394 
3395 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3396 		wpabuf_free(p2p->wps_vendor_ext[i]);
3397 		p2p->wps_vendor_ext[i] = NULL;
3398 	}
3399 }
3400 
3401 
p2p_add_wps_vendor_extension(struct p2p_data * p2p,const struct wpabuf * vendor_ext)3402 int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
3403 				 const struct wpabuf *vendor_ext)
3404 {
3405 	int i;
3406 
3407 	if (vendor_ext == NULL)
3408 		return -1;
3409 
3410 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3411 		if (p2p->wps_vendor_ext[i] == NULL)
3412 			break;
3413 	}
3414 	if (i >= P2P_MAX_WPS_VENDOR_EXT)
3415 		return -1;
3416 
3417 	p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
3418 	if (p2p->wps_vendor_ext[i] == NULL)
3419 		return -1;
3420 
3421 	return 0;
3422 }
3423 
3424 
p2p_set_country(struct p2p_data * p2p,const char * country)3425 int p2p_set_country(struct p2p_data *p2p, const char *country)
3426 {
3427 	os_memcpy(p2p->cfg->country, country, 3);
3428 	return 0;
3429 }
3430 
3431 
p2p_pre_find_operation(struct p2p_data * p2p,struct p2p_device * dev)3432 static int p2p_pre_find_operation(struct p2p_data *p2p, struct p2p_device *dev)
3433 {
3434 	int res;
3435 
3436 	if (dev->sd_pending_bcast_queries == 0) {
3437 		/* Initialize with total number of registered broadcast
3438 		 * SD queries. */
3439 		dev->sd_pending_bcast_queries = p2p->num_p2p_sd_queries;
3440 	}
3441 
3442 	res = p2p_start_sd(p2p, dev);
3443 	if (res == -2)
3444 		return -2;
3445 	if (res == 0)
3446 		return 1;
3447 
3448 	if (dev->req_config_methods &&
3449 	    !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
3450 		p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3451 			MACSTR " (config methods 0x%x)",
3452 			MAC2STR(dev->info.p2p_device_addr),
3453 			dev->req_config_methods);
3454 		if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
3455 			return 1;
3456 	}
3457 
3458 	return 0;
3459 }
3460 
3461 
p2p_continue_find(struct p2p_data * p2p)3462 void p2p_continue_find(struct p2p_data *p2p)
3463 {
3464 	struct p2p_device *dev;
3465 	int found, res;
3466 
3467 	p2p_set_state(p2p, P2P_SEARCH);
3468 
3469 	/* Continue from the device following the last iteration */
3470 	found = 0;
3471 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3472 		if (dev == p2p->last_p2p_find_oper) {
3473 			found = 1;
3474 			continue;
3475 		}
3476 		if (!found)
3477 			continue;
3478 		res = p2p_pre_find_operation(p2p, dev);
3479 		if (res > 0) {
3480 			p2p->last_p2p_find_oper = dev;
3481 			return;
3482 		}
3483 		if (res == -2)
3484 			goto skip_sd;
3485 	}
3486 
3487 	/*
3488 	 * Wrap around to the beginning of the list and continue until the last
3489 	 * iteration device.
3490 	 */
3491 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3492 		res = p2p_pre_find_operation(p2p, dev);
3493 		if (res > 0) {
3494 			p2p->last_p2p_find_oper = dev;
3495 			return;
3496 		}
3497 		if (res == -2)
3498 			goto skip_sd;
3499 		if (dev == p2p->last_p2p_find_oper)
3500 			break;
3501 	}
3502 
3503 skip_sd:
3504 	os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
3505 	p2p_listen_in_find(p2p, 1);
3506 }
3507 
3508 
p2p_sd_query_cb(struct p2p_data * p2p,int success)3509 void p2p_sd_query_cb(struct p2p_data *p2p, int success)
3510 {
3511 	p2p_dbg(p2p, "Service Discovery Query TX callback: success=%d",
3512 		success);
3513 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3514 
3515 	if (!success) {
3516 		if (p2p->sd_peer) {
3517 			if (is_zero_ether_addr(p2p->sd_query_no_ack)) {
3518 				os_memcpy(p2p->sd_query_no_ack,
3519 					  p2p->sd_peer->info.p2p_device_addr,
3520 					  ETH_ALEN);
3521 				p2p_dbg(p2p,
3522 					"First SD Query no-ACK in this search iteration: "
3523 					MACSTR, MAC2STR(p2p->sd_query_no_ack));
3524 			}
3525 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3526 		}
3527 		p2p->sd_peer = NULL;
3528 		if (p2p->state != P2P_IDLE)
3529 			p2p_continue_find(p2p);
3530 		return;
3531 	}
3532 
3533 	if (p2p->sd_peer == NULL) {
3534 		p2p_dbg(p2p, "No SD peer entry known");
3535 		if (p2p->state != P2P_IDLE)
3536 			p2p_continue_find(p2p);
3537 		return;
3538 	}
3539 
3540 	if (p2p->sd_query && p2p->sd_query->for_all_peers) {
3541 		/* Update the pending broadcast SD query count for this device
3542 		 */
3543 		p2p->sd_peer->sd_pending_bcast_queries--;
3544 
3545 		/*
3546 		 * If there are no pending broadcast queries for this device,
3547 		 * mark it as done (-1).
3548 		 */
3549 		if (p2p->sd_peer->sd_pending_bcast_queries == 0)
3550 			p2p->sd_peer->sd_pending_bcast_queries = -1;
3551 	}
3552 
3553 	/* Wait for response from the peer */
3554 	p2p_set_state(p2p, P2P_SD_DURING_FIND);
3555 	p2p_set_timeout(p2p, 0, 200000);
3556 }
3557 
3558 
3559 /**
3560  * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
3561  * @p2p: P2P module context from p2p_init()
3562  */
p2p_retry_pd(struct p2p_data * p2p)3563 static void p2p_retry_pd(struct p2p_data *p2p)
3564 {
3565 	struct p2p_device *dev;
3566 
3567 	/*
3568 	 * Retry the prov disc req attempt only for the peer that the user had
3569 	 * requested.
3570 	 */
3571 
3572 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3573 		if (!ether_addr_equal(p2p->pending_pd_devaddr,
3574 				      dev->info.p2p_device_addr))
3575 			continue;
3576 		if (!dev->req_config_methods && !dev->req_bootstrap_method)
3577 			continue;
3578 
3579 		p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3580 			MACSTR " (config methods 0x%x)",
3581 			MAC2STR(dev->info.p2p_device_addr),
3582 			dev->req_config_methods);
3583 		p2p_send_prov_disc_req(p2p, dev,
3584 				       dev->flags & P2P_DEV_PD_FOR_JOIN,
3585 				       p2p->pd_force_freq);
3586 		return;
3587 	}
3588 }
3589 
3590 
p2p_prov_disc_cb(struct p2p_data * p2p,int success)3591 static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
3592 {
3593 	p2p_dbg(p2p, "Provision Discovery Request TX callback: success=%d",
3594 		success);
3595 
3596 	/*
3597 	 * Postpone resetting the pending action state till after we actually
3598 	 * time out. This allows us to take some action like notifying any
3599 	 * interested parties about no response to the request.
3600 	 *
3601 	 * When the timer (below) goes off we check in IDLE, SEARCH, or
3602 	 * LISTEN_ONLY state, which are the only allowed states to issue a PD
3603 	 * requests in, if this was still pending and then raise notification.
3604 	 */
3605 
3606 	if (!success) {
3607 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3608 
3609 		if (p2p->user_initiated_pd &&
3610 		    (p2p->state == P2P_SEARCH || p2p->state == P2P_LISTEN_ONLY))
3611 		{
3612 			/* Retry request from timeout to avoid busy loops */
3613 			p2p->pending_action_state = P2P_PENDING_PD;
3614 			p2p_set_timeout(p2p, 0, 50000);
3615 		} else if (p2p->state != P2P_IDLE)
3616 			p2p_continue_find(p2p);
3617 		else if (p2p->user_initiated_pd) {
3618 			p2p->pending_action_state = P2P_PENDING_PD;
3619 			p2p_set_timeout(p2p, 0, 300000);
3620 		}
3621 		return;
3622 	}
3623 
3624 	/*
3625 	 * If after PD Request the peer doesn't expect to receive PD Response
3626 	 * the PD Request ACK indicates a completion of the current PD. This
3627 	 * happens only on the advertiser side sending the follow-on PD Request
3628 	 * with the status different than 12 (Success: accepted by user).
3629 	 */
3630 	if (p2p->p2ps_prov && !p2p->p2ps_prov->pd_seeker &&
3631 	    p2p->p2ps_prov->status != P2P_SC_SUCCESS_DEFERRED) {
3632 		p2p_dbg(p2p, "P2PS PD completion on Follow-on PD Request ACK");
3633 
3634 		if (p2p->send_action_in_progress) {
3635 			p2p->send_action_in_progress = 0;
3636 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3637 		}
3638 
3639 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3640 
3641 		if (p2p->cfg->p2ps_prov_complete) {
3642 			p2p->cfg->p2ps_prov_complete(
3643 				p2p->cfg->cb_ctx,
3644 				p2p->p2ps_prov->status,
3645 				p2p->p2ps_prov->adv_mac,
3646 				p2p->p2ps_prov->adv_mac,
3647 				p2p->p2ps_prov->session_mac,
3648 				NULL, p2p->p2ps_prov->adv_id,
3649 				p2p->p2ps_prov->session_id,
3650 				0, 0, NULL, 0, 0, 0,
3651 				NULL, NULL, 0, 0, NULL, 0);
3652 		}
3653 
3654 		if (p2p->user_initiated_pd)
3655 			p2p_reset_pending_pd(p2p);
3656 
3657 		p2ps_prov_free(p2p);
3658 		return;
3659 	}
3660 
3661 	/*
3662 	 * This postponing, of resetting pending_action_state, needs to be
3663 	 * done only for user initiated PD requests and not internal ones.
3664 	 */
3665 	if (p2p->user_initiated_pd)
3666 		p2p->pending_action_state = P2P_PENDING_PD;
3667 	else
3668 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3669 
3670 	/* Wait for response from the peer */
3671 	if (p2p->state == P2P_SEARCH)
3672 		p2p_set_state(p2p, P2P_PD_DURING_FIND);
3673 	p2p_set_timeout(p2p, 0, 200000);
3674 }
3675 
3676 
p2p_prov_disc_resp_cb(struct p2p_data * p2p,int success)3677 static void p2p_prov_disc_resp_cb(struct p2p_data *p2p, int success)
3678 {
3679 	p2p_dbg(p2p, "Provision Discovery Response TX callback: success=%d",
3680 		success);
3681 
3682 	if (p2p->send_action_in_progress) {
3683 		p2p->send_action_in_progress = 0;
3684 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3685 	}
3686 
3687 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3688 
3689 	if (!success) {
3690 		if (p2p->state == P2P_SEARCH)
3691 			p2p_continue_find(p2p);
3692 		return;
3693 	}
3694 
3695 	if (!p2p->cfg->prov_disc_resp_cb ||
3696 	    p2p->cfg->prov_disc_resp_cb(p2p->cfg->cb_ctx) < 1) {
3697 		if (p2p->state == P2P_SEARCH)
3698 			p2p_continue_find(p2p);
3699 		return;
3700 	}
3701 
3702 	p2p_dbg(p2p,
3703 		"Post-Provision Discovery operations started - do not try to continue other P2P operations");
3704 }
3705 
3706 
p2p_scan_res_handler(struct p2p_data * p2p,const u8 * bssid,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len)3707 int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
3708 			 struct os_reltime *rx_time, int level, const u8 *ies,
3709 			 size_t ies_len)
3710 {
3711 	if (os_reltime_before(rx_time, &p2p->find_start)) {
3712 		/*
3713 		 * The driver may have cached (e.g., in cfg80211 BSS table) the
3714 		 * scan results for relatively long time. To avoid reporting
3715 		 * stale information, update P2P peers only based on results
3716 		 * that have based on frames received after the last p2p_find
3717 		 * operation was started.
3718 		 */
3719 		p2p_dbg(p2p, "Ignore old scan result for " MACSTR
3720 			" (rx_time=%u.%06u find_start=%u.%06u)",
3721 			MAC2STR(bssid), (unsigned int) rx_time->sec,
3722 			(unsigned int) rx_time->usec,
3723 			(unsigned int) p2p->find_start.sec,
3724 			(unsigned int) p2p->find_start.usec);
3725 		return 0;
3726 	}
3727 
3728 	p2p_add_device(p2p, bssid, freq, rx_time, level, ies, ies_len, 1);
3729 
3730 	return 0;
3731 }
3732 
3733 
p2p_scan_res_handled(struct p2p_data * p2p,unsigned int delay)3734 void p2p_scan_res_handled(struct p2p_data *p2p, unsigned int delay)
3735 {
3736 	if (!p2p->p2p_scan_running) {
3737 		p2p_dbg(p2p, "p2p_scan was not running, but scan results received");
3738 	}
3739 	p2p->p2p_scan_running = 0;
3740 
3741 	/* Use this delay only when p2p_find doesn't set it */
3742 	if (!p2p->search_delay)
3743 		p2p->search_delay = delay;
3744 
3745 	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3746 
3747 	if (p2p_run_after_scan(p2p))
3748 		return;
3749 	if (p2p->state == P2P_SEARCH)
3750 		p2p_continue_find(p2p);
3751 }
3752 
3753 
p2p_scan_ie(struct p2p_data * p2p,struct wpabuf * ies,const u8 * dev_id,unsigned int bands)3754 void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id,
3755 		 unsigned int bands)
3756 {
3757 	u8 dev_capab;
3758 	u8 *len;
3759 
3760 #ifdef CONFIG_WIFI_DISPLAY
3761 	if (p2p->wfd_ie_probe_req)
3762 		wpabuf_put_buf(ies, p2p->wfd_ie_probe_req);
3763 #endif /* CONFIG_WIFI_DISPLAY */
3764 
3765 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3766 		wpabuf_put_buf(ies,
3767 			       p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3768 
3769 	len = p2p_buf_add_ie_hdr(ies);
3770 
3771 	dev_capab = p2p->dev_capab & ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3772 
3773 	/* P2PS requires Probe Request frames to include SD bit */
3774 	if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3775 		dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3776 
3777 	p2p_buf_add_capability(ies, dev_capab, 0);
3778 
3779 	if (dev_id)
3780 		p2p_buf_add_device_id(ies, dev_id);
3781 	if (p2p->cfg->reg_class && p2p->cfg->channel)
3782 		p2p_buf_add_listen_channel(ies, p2p->cfg->country,
3783 					   p2p->cfg->reg_class,
3784 					   p2p->cfg->channel);
3785 	if (p2p->ext_listen_interval)
3786 		p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
3787 					      p2p->ext_listen_interval);
3788 
3789 	if (bands & BAND_60_GHZ)
3790 		p2p_buf_add_device_info(ies, p2p, NULL);
3791 
3792 	if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3793 		p2p_buf_add_service_hash(ies, p2p);
3794 
3795 	/* TODO: p2p_buf_add_operating_channel() if GO */
3796 	p2p_buf_update_ie_hdr(ies, len);
3797 }
3798 
3799 
p2p_scan_ie_buf_len(struct p2p_data * p2p)3800 size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
3801 {
3802 	size_t len = 100;
3803 
3804 #ifdef CONFIG_WIFI_DISPLAY
3805 	if (p2p && p2p->wfd_ie_probe_req)
3806 		len += wpabuf_len(p2p->wfd_ie_probe_req);
3807 #endif /* CONFIG_WIFI_DISPLAY */
3808 
3809 	if (p2p && p2p->vendor_elem &&
3810 	    p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3811 		len += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3812 
3813 	return len;
3814 }
3815 
3816 
p2p_ie_text(struct wpabuf * p2p_ie,char * buf,char * end)3817 int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
3818 {
3819 	return p2p_attr_text(p2p_ie, buf, end);
3820 }
3821 
3822 
p2p_go_neg_req_cb(struct p2p_data * p2p,int success)3823 static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
3824 {
3825 	struct p2p_device *dev = p2p->go_neg_peer;
3826 	int timeout;
3827 
3828 	p2p_dbg(p2p, "GO Negotiation Request TX callback: success=%d", success);
3829 
3830 	if (dev == NULL) {
3831 		p2p_dbg(p2p, "No pending GO Negotiation");
3832 		return;
3833 	}
3834 
3835 	if (success) {
3836 		if (dev->flags & P2P_DEV_USER_REJECTED) {
3837 			p2p_set_state(p2p, P2P_IDLE);
3838 			return;
3839 		}
3840 	} else if (dev->go_neg_req_sent) {
3841 		/* Cancel the increment from p2p_connect_send() on failure */
3842 		dev->go_neg_req_sent--;
3843 	}
3844 
3845 	if (!success &&
3846 	    (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
3847 	    !is_zero_ether_addr(dev->member_in_go_dev)) {
3848 		p2p_dbg(p2p, "Peer " MACSTR " did not acknowledge request - try to use device discoverability through its GO",
3849 			MAC2STR(dev->info.p2p_device_addr));
3850 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3851 		p2p_send_dev_disc_req(p2p, dev);
3852 		return;
3853 	}
3854 
3855 	/*
3856 	 * Use P2P find, if needed, to find the other device from its listen
3857 	 * channel.
3858 	 */
3859 	p2p_set_state(p2p, P2P_CONNECT);
3860 	timeout = success ? 500000 : 100000;
3861 	if (!success && p2p->go_neg_peer &&
3862 	    (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE)) {
3863 		unsigned int r;
3864 		/*
3865 		 * Peer is expected to wait our response and we will skip the
3866 		 * listen phase. Add some randomness to the wait time here to
3867 		 * make it less likely to hit cases where we could end up in
3868 		 * sync with peer not listening.
3869 		 */
3870 		if (os_get_random((u8 *) &r, sizeof(r)) < 0)
3871 			r = 0;
3872 		timeout += r % 100000;
3873 	}
3874 	p2p_set_timeout(p2p, 0, timeout);
3875 }
3876 
3877 
p2p_go_neg_resp_cb(struct p2p_data * p2p,int success)3878 static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
3879 {
3880 	p2p_dbg(p2p, "GO Negotiation Response TX callback: success=%d",
3881 		success);
3882 	if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
3883 		p2p_dbg(p2p, "Ignore TX callback event - GO Negotiation is not running anymore");
3884 		return;
3885 	}
3886 	p2p_set_state(p2p, P2P_CONNECT);
3887 	p2p_set_timeout(p2p, 0, 500000);
3888 }
3889 
3890 
p2p_go_neg_resp_failure_cb(struct p2p_data * p2p,int success,const u8 * addr)3891 static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success,
3892 				       const u8 *addr)
3893 {
3894 	p2p_dbg(p2p, "GO Negotiation Response (failure) TX callback: success=%d", success);
3895 	if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
3896 		p2p_go_neg_failed(p2p, p2p->go_neg_peer->status);
3897 		return;
3898 	}
3899 
3900 	if (success) {
3901 		struct p2p_device *dev;
3902 		dev = p2p_get_device(p2p, addr);
3903 		if (dev &&
3904 		    dev->status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
3905 			dev->flags |= P2P_DEV_PEER_WAITING_RESPONSE;
3906 	}
3907 
3908 	if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
3909 		p2p_continue_find(p2p);
3910 }
3911 
3912 
p2p_go_neg_conf_cb(struct p2p_data * p2p,enum p2p_send_action_result result)3913 static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
3914 			       enum p2p_send_action_result result)
3915 {
3916 	struct p2p_device *dev;
3917 
3918 	p2p_dbg(p2p, "GO Negotiation Confirm TX callback: result=%d", result);
3919 	if (result == P2P_SEND_ACTION_FAILED) {
3920 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3921 		p2p_go_neg_failed(p2p, -1);
3922 		return;
3923 	}
3924 
3925 	dev = p2p->go_neg_peer;
3926 
3927 	if (result == P2P_SEND_ACTION_NO_ACK) {
3928 		/*
3929 		 * Retry GO Negotiation Confirmation
3930 		 * P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if we did not receive
3931 		 * ACK for confirmation.
3932 		 */
3933 		if (dev && dev->go_neg_conf &&
3934 		    dev->go_neg_conf_sent <= P2P_GO_NEG_CNF_MAX_RETRY_COUNT) {
3935 			p2p_dbg(p2p, "GO Negotiation Confirm retry %d",
3936 				dev->go_neg_conf_sent);
3937 			p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
3938 			if (p2p_send_action(p2p, dev->go_neg_conf_freq,
3939 					    dev->info.p2p_device_addr,
3940 					    p2p->cfg->dev_addr,
3941 					    dev->info.p2p_device_addr,
3942 					    wpabuf_head(dev->go_neg_conf),
3943 					    wpabuf_len(dev->go_neg_conf), 0) >=
3944 			    0) {
3945 				dev->go_neg_conf_sent++;
3946 				return;
3947 			}
3948 			p2p_dbg(p2p, "Failed to re-send Action frame");
3949 
3950 			/*
3951 			 * Continue with the assumption that the first attempt
3952 			 * went through and just the ACK frame was lost.
3953 			 */
3954 		}
3955 
3956 		/*
3957 		 * It looks like the TX status for GO Negotiation Confirm is
3958 		 * often showing failure even when the peer has actually
3959 		 * received the frame. Since the peer may change channels
3960 		 * immediately after having received the frame, we may not see
3961 		 * an Ack for retries, so just dropping a single frame may
3962 		 * trigger this. To allow the group formation to succeed if the
3963 		 * peer did indeed receive the frame, continue regardless of
3964 		 * the TX status.
3965 		 */
3966 		p2p_dbg(p2p, "Assume GO Negotiation Confirm TX was actually received by the peer even though Ack was not reported");
3967 	}
3968 
3969 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3970 
3971 	if (dev == NULL)
3972 		return;
3973 
3974 	p2p_go_complete(p2p, dev);
3975 }
3976 
3977 
p2p_send_action_cb(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,enum p2p_send_action_result result)3978 void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3979 			const u8 *src, const u8 *bssid,
3980 			enum p2p_send_action_result result)
3981 {
3982 	enum p2p_pending_action_state state;
3983 	int success;
3984 
3985 	p2p_dbg(p2p, "Action frame TX callback (state=%d freq=%u dst=" MACSTR
3986 		" src=" MACSTR " bssid=" MACSTR " result=%d p2p_state=%s)",
3987 		p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
3988 		MAC2STR(bssid), result, p2p_state_txt(p2p->state));
3989 	success = result == P2P_SEND_ACTION_SUCCESS;
3990 	state = p2p->pending_action_state;
3991 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3992 	switch (state) {
3993 	case P2P_NO_PENDING_ACTION:
3994 		if (p2p->send_action_in_progress) {
3995 			p2p->send_action_in_progress = 0;
3996 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3997 		}
3998 		break;
3999 	case P2P_PENDING_GO_NEG_REQUEST:
4000 		p2p_go_neg_req_cb(p2p, success);
4001 		break;
4002 	case P2P_PENDING_GO_NEG_RESPONSE:
4003 		p2p_go_neg_resp_cb(p2p, success);
4004 		break;
4005 	case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
4006 		p2p_go_neg_resp_failure_cb(p2p, success, dst);
4007 		break;
4008 	case P2P_PENDING_GO_NEG_CONFIRM:
4009 		p2p_go_neg_conf_cb(p2p, result);
4010 		break;
4011 	case P2P_PENDING_SD:
4012 		p2p_sd_query_cb(p2p, success);
4013 		break;
4014 	case P2P_PENDING_PD:
4015 		p2p_prov_disc_cb(p2p, success);
4016 		break;
4017 	case P2P_PENDING_PD_RESPONSE:
4018 		p2p_prov_disc_resp_cb(p2p, success);
4019 		break;
4020 	case P2P_PENDING_INVITATION_REQUEST:
4021 		p2p_invitation_req_cb(p2p, success);
4022 		break;
4023 	case P2P_PENDING_INVITATION_RESPONSE:
4024 		p2p_invitation_resp_cb(p2p, dst, success);
4025 		break;
4026 	case P2P_PENDING_DEV_DISC_REQUEST:
4027 		p2p_dev_disc_req_cb(p2p, success);
4028 		break;
4029 	case P2P_PENDING_DEV_DISC_RESPONSE:
4030 		p2p_dev_disc_resp_cb(p2p, success);
4031 		break;
4032 	case P2P_PENDING_GO_DISC_REQ:
4033 		p2p_go_disc_req_cb(p2p, success);
4034 		break;
4035 	}
4036 }
4037 
4038 
p2p_listen_cb(struct p2p_data * p2p,unsigned int freq,unsigned int duration)4039 void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
4040 		   unsigned int duration)
4041 {
4042 	if (freq == p2p->pending_client_disc_freq) {
4043 		p2p_dbg(p2p, "Client discoverability remain-awake completed");
4044 		p2p->pending_client_disc_freq = 0;
4045 		return;
4046 	}
4047 
4048 	if (freq != p2p->pending_listen_freq) {
4049 		p2p_dbg(p2p, "Unexpected listen callback for freq=%u duration=%u (pending_listen_freq=%u)",
4050 			freq, duration, p2p->pending_listen_freq);
4051 		return;
4052 	}
4053 
4054 	p2p_dbg(p2p, "Starting Listen timeout(%u,%u) on freq=%u based on callback",
4055 		p2p->pending_listen_sec, p2p->pending_listen_usec,
4056 		p2p->pending_listen_freq);
4057 	p2p->pending_listen_wait_drv = false;
4058 	p2p->in_listen = 1;
4059 	p2p->drv_in_listen = freq;
4060 	if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
4061 		/*
4062 		 * Add 20 msec extra wait to avoid race condition with driver
4063 		 * remain-on-channel end event, i.e., give driver more time to
4064 		 * complete the operation before our timeout expires.
4065 		 */
4066 		p2p_set_timeout(p2p, p2p->pending_listen_sec,
4067 				p2p->pending_listen_usec + 20000);
4068 	}
4069 
4070 	p2p->pending_listen_freq = 0;
4071 }
4072 
4073 
p2p_listen_end(struct p2p_data * p2p,unsigned int freq)4074 int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
4075 {
4076 	p2p_dbg(p2p, "Driver ended Listen state (freq=%u)", freq);
4077 	p2p->drv_in_listen = 0;
4078 	if (p2p->in_listen)
4079 		return 0; /* Internal timeout will trigger the next step */
4080 
4081 	if (p2p->state == P2P_WAIT_PEER_CONNECT && p2p->go_neg_peer &&
4082 	    p2p->pending_listen_freq) {
4083 		/*
4084 		 * Better wait a bit if the driver is unable to start
4085 		 * offchannel operation for some reason to continue with
4086 		 * P2P_WAIT_PEER_(IDLE/CONNECT) state transitions.
4087 		 */
4088 		p2p_dbg(p2p,
4089 			"Listen operation did not seem to start - delay idle phase to avoid busy loop");
4090 		p2p_set_timeout(p2p, 0, 100000);
4091 		return 1;
4092 	}
4093 
4094 	if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
4095 		if (p2p->go_neg_peer->connect_reqs >= 120) {
4096 			p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4097 			p2p_go_neg_failed(p2p, -1);
4098 			return 0;
4099 		}
4100 
4101 		p2p_set_state(p2p, P2P_CONNECT);
4102 		p2p_connect_send(p2p, p2p->go_neg_peer);
4103 		return 1;
4104 	} else if (p2p->state == P2P_SEARCH) {
4105 		if (p2p->p2p_scan_running) {
4106 			 /*
4107 			  * Search is already in progress. This can happen if
4108 			  * an Action frame RX is reported immediately after
4109 			  * the end of a remain-on-channel operation and the
4110 			  * response frame to that is sent using an offchannel
4111 			  * operation while in p2p_find. Avoid an attempt to
4112 			  * restart a scan here.
4113 			  */
4114 			p2p_dbg(p2p, "p2p_scan already in progress - do not try to start a new one");
4115 			return 1;
4116 		}
4117 		if (p2p->pending_listen_freq) {
4118 			/*
4119 			 * Better wait a bit if the driver is unable to start
4120 			 * offchannel operation for some reason. p2p_search()
4121 			 * will be started from internal timeout.
4122 			 */
4123 			p2p_dbg(p2p, "Listen operation did not seem to start - delay search phase to avoid busy loop");
4124 			p2p_set_timeout(p2p, 0, 100000);
4125 			return 1;
4126 		}
4127 		if (p2p->search_delay) {
4128 			p2p_dbg(p2p, "Delay search operation by %u ms",
4129 				p2p->search_delay);
4130 			p2p_set_timeout(p2p, p2p->search_delay / 1000,
4131 					(p2p->search_delay % 1000) * 1000);
4132 			return 1;
4133 		}
4134 		p2p_search(p2p);
4135 		return 1;
4136 	}
4137 
4138 	return 0;
4139 }
4140 
4141 
p2p_listen_failed(struct p2p_data * p2p,unsigned int freq)4142 void p2p_listen_failed(struct p2p_data *p2p, unsigned int freq)
4143 {
4144 	if (freq != p2p->pending_listen_freq) {
4145 		p2p_dbg(p2p,
4146 			"Unexpected listen failed callback for freq=%u (pending_listen_freq=%u)",
4147 			freq, p2p->pending_listen_freq);
4148 		return;
4149 	}
4150 
4151 	p2p_dbg(p2p, "Listen failed on freq=%u", freq);
4152 	p2p->pending_listen_freq = 0;
4153 }
4154 
4155 
p2p_timeout_connect(struct p2p_data * p2p)4156 static void p2p_timeout_connect(struct p2p_data *p2p)
4157 {
4158 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4159 	if (p2p->go_neg_peer &&
4160 	    (p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
4161 		p2p_dbg(p2p, "Wait for GO Negotiation Confirm timed out - assume GO Negotiation failed");
4162 		p2p_go_neg_failed(p2p, -1);
4163 		return;
4164 	}
4165 	if (p2p->go_neg_peer &&
4166 	    (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE) &&
4167 	    p2p->go_neg_peer->connect_reqs < 120) {
4168 		p2p_dbg(p2p, "Peer expected to wait our response - skip listen");
4169 		p2p_connect_send(p2p, p2p->go_neg_peer);
4170 		return;
4171 	}
4172 	if (p2p->go_neg_peer && p2p->go_neg_peer->oob_go_neg_freq > 0) {
4173 		p2p_dbg(p2p, "Skip connect-listen since GO Neg channel known (OOB)");
4174 		p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4175 		p2p_set_timeout(p2p, 0, 30000);
4176 		return;
4177 	}
4178 	p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4179 	p2p_listen_in_find(p2p, 0);
4180 }
4181 
4182 
p2p_timeout_connect_listen(struct p2p_data * p2p)4183 static void p2p_timeout_connect_listen(struct p2p_data *p2p)
4184 {
4185 	if (p2p->go_neg_peer) {
4186 		if (p2p->drv_in_listen) {
4187 			p2p_dbg(p2p, "Driver is still in Listen state; wait for it to complete");
4188 			return;
4189 		}
4190 
4191 		if (p2p->go_neg_peer->connect_reqs >= 120) {
4192 			p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4193 			p2p_go_neg_failed(p2p, -1);
4194 			return;
4195 		}
4196 
4197 		p2p_set_state(p2p, P2P_CONNECT);
4198 		p2p_connect_send(p2p, p2p->go_neg_peer);
4199 	} else
4200 		p2p_set_state(p2p, P2P_IDLE);
4201 }
4202 
4203 
p2p_timeout_wait_peer_connect(struct p2p_data * p2p)4204 static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
4205 {
4206 	p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
4207 
4208 	if (p2p->cfg->is_concurrent_session_active &&
4209 	    p2p->cfg->is_concurrent_session_active(p2p->cfg->cb_ctx))
4210 		p2p_set_timeout(p2p, 0, 500000);
4211 	else
4212 		p2p_set_timeout(p2p, 0, 200000);
4213 }
4214 
4215 
p2p_timeout_wait_peer_idle(struct p2p_data * p2p)4216 static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
4217 {
4218 	struct p2p_device *dev = p2p->go_neg_peer;
4219 
4220 	if (dev == NULL) {
4221 		p2p_dbg(p2p, "Unknown GO Neg peer - stop GO Neg wait");
4222 		return;
4223 	}
4224 
4225 	p2p_dbg(p2p, "Go to Listen state while waiting for the peer to become ready for GO Negotiation");
4226 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4227 	p2p->pending_listen_wait_drv = false;
4228 	if (p2p->pending_listen_freq) {
4229 		p2p_dbg(p2p, "Clear pending_listen_freq for %s", __func__);
4230 		p2p->pending_listen_freq = 0;
4231 	}
4232 	p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
4233 	p2p_listen_in_find(p2p, 0);
4234 }
4235 
4236 
p2p_timeout_sd_during_find(struct p2p_data * p2p)4237 static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
4238 {
4239 	p2p_dbg(p2p, "Service Discovery Query timeout");
4240 	if (p2p->sd_peer) {
4241 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4242 		p2p->sd_peer = NULL;
4243 	}
4244 	p2p_continue_find(p2p);
4245 }
4246 
4247 
p2p_timeout_prov_disc_during_find(struct p2p_data * p2p)4248 static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
4249 {
4250 	p2p_dbg(p2p, "Provision Discovery Request timeout");
4251 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4252 	p2p_continue_find(p2p);
4253 }
4254 
4255 
p2p_timeout_prov_disc_req(struct p2p_data * p2p)4256 static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
4257 {
4258 	u32 adv_id = 0;
4259 	u8 *adv_mac = NULL;
4260 
4261 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4262 
4263 	/*
4264 	 * For user initiated PD requests that we have not gotten any responses
4265 	 * for while in IDLE state, we retry them a couple of times before
4266 	 * giving up.
4267 	 */
4268 	if (!p2p->user_initiated_pd)
4269 		return;
4270 
4271 	p2p_dbg(p2p, "User initiated Provision Discovery Request timeout");
4272 
4273 	if (p2p->pd_retries) {
4274 		p2p->pd_retries--;
4275 		p2p_retry_pd(p2p);
4276 	} else {
4277 		struct p2p_device *dev;
4278 		int for_join = 0;
4279 
4280 		dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
4281 			if (!ether_addr_equal(p2p->pending_pd_devaddr,
4282 					      dev->info.p2p_device_addr))
4283 				continue;
4284 			if (dev->req_config_methods &&
4285 			    (dev->flags & P2P_DEV_PD_FOR_JOIN))
4286 				for_join = 1;
4287 		}
4288 
4289 		if (p2p->p2ps_prov) {
4290 			adv_id = p2p->p2ps_prov->adv_id;
4291 			adv_mac = p2p->p2ps_prov->adv_mac;
4292 		}
4293 
4294 		if (p2p->cfg->prov_disc_fail)
4295 			p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
4296 						 p2p->pending_pd_devaddr,
4297 						 for_join ?
4298 						 P2P_PROV_DISC_TIMEOUT_JOIN :
4299 						 P2P_PROV_DISC_TIMEOUT,
4300 						 adv_id, adv_mac, NULL);
4301 		p2p_reset_pending_pd(p2p);
4302 	}
4303 }
4304 
4305 
p2p_timeout_invite(struct p2p_data * p2p)4306 static void p2p_timeout_invite(struct p2p_data *p2p)
4307 {
4308 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4309 	p2p_set_state(p2p, P2P_INVITE_LISTEN);
4310 	if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
4311 		/*
4312 		 * Better remain on operating channel instead of listen channel
4313 		 * when running a group.
4314 		 * Wait 120 ms to let the P2P GO to send its beacon on the
4315 		 * intended TBTT.
4316 		 */
4317 		p2p_dbg(p2p, "Inviting in active GO role - wait on operating channel");
4318 		p2p_set_timeout(p2p, 0, 120000);
4319 		return;
4320 	}
4321 	p2p_listen_in_find(p2p, 0);
4322 }
4323 
4324 
p2p_timeout_invite_listen(struct p2p_data * p2p)4325 static void p2p_timeout_invite_listen(struct p2p_data *p2p)
4326 {
4327 	if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
4328 		p2p_set_state(p2p, P2P_INVITE);
4329 		p2p_invite_send(p2p, p2p->invite_peer,
4330 				p2p->invite_go_dev_addr, p2p->invite_dev_pw_id);
4331 	} else {
4332 		if (p2p->invite_peer) {
4333 			p2p_dbg(p2p, "Invitation Request retry limit reached");
4334 			if (p2p->cfg->invitation_result)
4335 				p2p->cfg->invitation_result(
4336 					p2p->cfg->cb_ctx, -1, NULL, 0, NULL,
4337 					NULL,
4338 					p2p->invite_peer->info.p2p_device_addr,
4339 					0, 0, NULL, NULL, 0,
4340 					p2p->invite_go_dev_addr);
4341 		}
4342 		p2p_set_state(p2p, P2P_IDLE);
4343 	}
4344 }
4345 
4346 
p2p_state_timeout(void * eloop_ctx,void * timeout_ctx)4347 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
4348 {
4349 	struct p2p_data *p2p = eloop_ctx;
4350 
4351 	p2p_dbg(p2p, "Timeout (state=%s)", p2p_state_txt(p2p->state));
4352 
4353 	p2p->in_listen = 0;
4354 	if (p2p->drv_in_listen) {
4355 		p2p_dbg(p2p, "Driver is still in listen state - stop it");
4356 		p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4357 		p2p->pending_listen_wait_drv = false;
4358 	}
4359 
4360 	switch (p2p->state) {
4361 	case P2P_IDLE:
4362 		/* Check if we timed out waiting for PD req */
4363 		if (p2p->pending_action_state == P2P_PENDING_PD)
4364 			p2p_timeout_prov_disc_req(p2p);
4365 		break;
4366 	case P2P_SEARCH:
4367 		/* Check if we timed out waiting for PD req */
4368 		if (p2p->pending_action_state == P2P_PENDING_PD)
4369 			p2p_timeout_prov_disc_req(p2p);
4370 		if (p2p->search_delay && !p2p->in_search_delay) {
4371 			p2p_dbg(p2p, "Delay search operation by %u ms",
4372 				p2p->search_delay);
4373 			p2p->in_search_delay = 1;
4374 			p2p_set_timeout(p2p, p2p->search_delay / 1000,
4375 					(p2p->search_delay % 1000) * 1000);
4376 			break;
4377 		}
4378 		p2p->in_search_delay = 0;
4379 		p2p_search(p2p);
4380 		break;
4381 	case P2P_CONNECT:
4382 		p2p_timeout_connect(p2p);
4383 		break;
4384 	case P2P_CONNECT_LISTEN:
4385 		p2p_timeout_connect_listen(p2p);
4386 		break;
4387 	case P2P_GO_NEG:
4388 		break;
4389 	case P2P_LISTEN_ONLY:
4390 		/* Check if we timed out waiting for PD req */
4391 		if (p2p->pending_action_state == P2P_PENDING_PD)
4392 			p2p_timeout_prov_disc_req(p2p);
4393 
4394 		if (p2p->ext_listen_only) {
4395 			p2p_dbg(p2p, "Extended Listen Timing - Listen State completed");
4396 			p2p->ext_listen_only = 0;
4397 			p2p_set_state(p2p, P2P_IDLE);
4398 		}
4399 		break;
4400 	case P2P_WAIT_PEER_CONNECT:
4401 		p2p_timeout_wait_peer_connect(p2p);
4402 		break;
4403 	case P2P_WAIT_PEER_IDLE:
4404 		p2p_timeout_wait_peer_idle(p2p);
4405 		break;
4406 	case P2P_SD_DURING_FIND:
4407 		p2p_timeout_sd_during_find(p2p);
4408 		break;
4409 	case P2P_PROVISIONING:
4410 		break;
4411 	case P2P_PD_DURING_FIND:
4412 		p2p_timeout_prov_disc_during_find(p2p);
4413 		break;
4414 	case P2P_INVITE:
4415 		p2p_timeout_invite(p2p);
4416 		break;
4417 	case P2P_INVITE_LISTEN:
4418 		p2p_timeout_invite_listen(p2p);
4419 		break;
4420 	}
4421 }
4422 
4423 
p2p_reject(struct p2p_data * p2p,const u8 * peer_addr)4424 int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
4425 {
4426 	struct p2p_device *dev;
4427 
4428 	dev = p2p_get_device(p2p, peer_addr);
4429 	p2p_dbg(p2p, "Local request to reject connection attempts by peer "
4430 		MACSTR, MAC2STR(peer_addr));
4431 	if (dev == NULL) {
4432 		p2p_dbg(p2p, "Peer " MACSTR " unknown", MAC2STR(peer_addr));
4433 		return -1;
4434 	}
4435 	dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
4436 	dev->flags |= P2P_DEV_USER_REJECTED;
4437 	return 0;
4438 }
4439 
4440 
p2p_wps_method_text(enum p2p_wps_method method)4441 const char * p2p_wps_method_text(enum p2p_wps_method method)
4442 {
4443 	switch (method) {
4444 	case WPS_NOT_READY:
4445 		return "not-ready";
4446 	case WPS_PIN_DISPLAY:
4447 		return "Display";
4448 	case WPS_PIN_KEYPAD:
4449 		return "Keypad";
4450 	case WPS_PBC:
4451 		return "PBC";
4452 	case WPS_NFC:
4453 		return "NFC";
4454 	case WPS_P2PS:
4455 		return "P2PS";
4456 	}
4457 
4458 	return "??";
4459 }
4460 
4461 
p2p_go_state_text(enum p2p_go_state go_state)4462 static const char * p2p_go_state_text(enum p2p_go_state go_state)
4463 {
4464 	switch (go_state) {
4465 	case UNKNOWN_GO:
4466 		return "unknown";
4467 	case LOCAL_GO:
4468 		return "local";
4469 	case  REMOTE_GO:
4470 		return "remote";
4471 	}
4472 
4473 	return "??";
4474 }
4475 
4476 
p2p_get_peer_info(struct p2p_data * p2p,const u8 * addr,int next)4477 const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
4478 					       const u8 *addr, int next)
4479 {
4480 	struct p2p_device *dev;
4481 
4482 	if (addr)
4483 		dev = p2p_get_device(p2p, addr);
4484 	else
4485 		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
4486 
4487 	if (dev && next) {
4488 		dev = dl_list_first(&dev->list, struct p2p_device, list);
4489 		if (&dev->list == &p2p->devices)
4490 			dev = NULL;
4491 	}
4492 
4493 	if (dev == NULL)
4494 		return NULL;
4495 
4496 	return &dev->info;
4497 }
4498 
4499 
p2p_get_peer_info_txt(const struct p2p_peer_info * info,char * buf,size_t buflen)4500 int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
4501 			  char *buf, size_t buflen)
4502 {
4503 	struct p2p_device *dev;
4504 	int res;
4505 	char *pos, *end;
4506 	struct os_reltime now;
4507 
4508 	if (info == NULL)
4509 		return -1;
4510 
4511 	dev = (struct p2p_device *) (((u8 *) info) -
4512 				     offsetof(struct p2p_device, info));
4513 
4514 	pos = buf;
4515 	end = buf + buflen;
4516 
4517 	os_get_reltime(&now);
4518 	res = os_snprintf(pos, end - pos,
4519 			  "age=%d\n"
4520 			  "listen_freq=%d\n"
4521 			  "wps_method=%s\n"
4522 			  "interface_addr=" MACSTR "\n"
4523 			  "member_in_go_dev=" MACSTR "\n"
4524 			  "member_in_go_iface=" MACSTR "\n"
4525 			  "go_neg_req_sent=%d\n"
4526 			  "go_state=%s\n"
4527 			  "dialog_token=%u\n"
4528 			  "intended_addr=" MACSTR "\n"
4529 			  "country=%c%c\n"
4530 			  "oper_freq=%d\n"
4531 			  "req_config_methods=0x%x\n"
4532 			  "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
4533 			  "status=%d\n"
4534 			  "invitation_reqs=%u\n",
4535 			  (int) (now.sec - dev->last_seen.sec),
4536 			  dev->listen_freq,
4537 			  p2p_wps_method_text(dev->wps_method),
4538 			  MAC2STR(dev->interface_addr),
4539 			  MAC2STR(dev->member_in_go_dev),
4540 			  MAC2STR(dev->member_in_go_iface),
4541 			  dev->go_neg_req_sent,
4542 			  p2p_go_state_text(dev->go_state),
4543 			  dev->dialog_token,
4544 			  MAC2STR(dev->intended_addr),
4545 			  dev->country[0] ? dev->country[0] : '_',
4546 			  dev->country[1] ? dev->country[1] : '_',
4547 			  dev->oper_freq,
4548 			  dev->req_config_methods,
4549 			  dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
4550 			  "[PROBE_REQ_ONLY]" : "",
4551 			  dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
4552 			  dev->flags & P2P_DEV_NOT_YET_READY ?
4553 			  "[NOT_YET_READY]" : "",
4554 			  dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
4555 			  "[PD_PEER_DISPLAY]" : "",
4556 			  dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
4557 			  "[PD_PEER_KEYPAD]" : "",
4558 			  dev->flags & P2P_DEV_PD_PEER_P2PS ?
4559 			  "[PD_PEER_P2PS]" : "",
4560 			  dev->flags & P2P_DEV_USER_REJECTED ?
4561 			  "[USER_REJECTED]" : "",
4562 			  dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
4563 			  "[PEER_WAITING_RESPONSE]" : "",
4564 			  dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
4565 			  "[PREFER_PERSISTENT_GROUP]" : "",
4566 			  dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
4567 			  "[WAIT_GO_NEG_RESPONSE]" : "",
4568 			  dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
4569 			  "[WAIT_GO_NEG_CONFIRM]" : "",
4570 			  dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
4571 			  "[GROUP_CLIENT_ONLY]" : "",
4572 			  dev->flags & P2P_DEV_FORCE_FREQ ?
4573 			  "[FORCE_FREQ]" : "",
4574 			  dev->flags & P2P_DEV_PD_FOR_JOIN ?
4575 			  "[PD_FOR_JOIN]" : "",
4576 			  dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT ?
4577 			  "[LAST_SEEN_AS_GROUP_CLIENT]" : "",
4578 			  dev->status,
4579 			  dev->invitation_reqs);
4580 	if (os_snprintf_error(end - pos, res))
4581 		return pos - buf;
4582 	pos += res;
4583 
4584 	if (dev->ext_listen_period) {
4585 		res = os_snprintf(pos, end - pos,
4586 				  "ext_listen_period=%u\n"
4587 				  "ext_listen_interval=%u\n",
4588 				  dev->ext_listen_period,
4589 				  dev->ext_listen_interval);
4590 		if (os_snprintf_error(end - pos, res))
4591 			return pos - buf;
4592 		pos += res;
4593 	}
4594 
4595 	if (dev->oper_ssid_len) {
4596 		res = os_snprintf(pos, end - pos,
4597 				  "oper_ssid=%s\n",
4598 				  wpa_ssid_txt(dev->oper_ssid,
4599 					       dev->oper_ssid_len));
4600 		if (os_snprintf_error(end - pos, res))
4601 			return pos - buf;
4602 		pos += res;
4603 	}
4604 
4605 #ifdef CONFIG_WIFI_DISPLAY
4606 	if (dev->info.wfd_subelems) {
4607 		res = os_snprintf(pos, end - pos, "wfd_subelems=");
4608 		if (os_snprintf_error(end - pos, res))
4609 			return pos - buf;
4610 		pos += res;
4611 
4612 		pos += wpa_snprintf_hex(pos, end - pos,
4613 					wpabuf_head(dev->info.wfd_subelems),
4614 					wpabuf_len(dev->info.wfd_subelems));
4615 
4616 		res = os_snprintf(pos, end - pos, "\n");
4617 		if (os_snprintf_error(end - pos, res))
4618 			return pos - buf;
4619 		pos += res;
4620 	}
4621 #endif /* CONFIG_WIFI_DISPLAY */
4622 
4623 	return pos - buf;
4624 }
4625 
4626 
p2p_peer_known(struct p2p_data * p2p,const u8 * addr)4627 int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
4628 {
4629 	return p2p_get_device(p2p, addr) != NULL;
4630 }
4631 
4632 
p2p_set_client_discoverability(struct p2p_data * p2p,int enabled)4633 void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
4634 {
4635 	if (enabled) {
4636 		p2p_dbg(p2p, "Client discoverability enabled");
4637 		p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4638 	} else {
4639 		p2p_dbg(p2p, "Client discoverability disabled");
4640 		p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4641 	}
4642 }
4643 
4644 
p2p_build_presence_req(u32 duration1,u32 interval1,u32 duration2,u32 interval2)4645 static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
4646 					      u32 duration2, u32 interval2)
4647 {
4648 	struct wpabuf *req;
4649 	struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
4650 	u8 *len;
4651 
4652 	req = wpabuf_alloc(100);
4653 	if (req == NULL)
4654 		return NULL;
4655 
4656 	if (duration1 || interval1) {
4657 		os_memset(&desc1, 0, sizeof(desc1));
4658 		desc1.count_type = 1;
4659 		desc1.duration = duration1;
4660 		desc1.interval = interval1;
4661 		ptr1 = &desc1;
4662 
4663 		if (duration2 || interval2) {
4664 			os_memset(&desc2, 0, sizeof(desc2));
4665 			desc2.count_type = 2;
4666 			desc2.duration = duration2;
4667 			desc2.interval = interval2;
4668 			ptr2 = &desc2;
4669 		}
4670 	}
4671 
4672 	p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
4673 	len = p2p_buf_add_ie_hdr(req);
4674 	p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
4675 	p2p_buf_update_ie_hdr(req, len);
4676 
4677 	return req;
4678 }
4679 
4680 
p2p_presence_req(struct p2p_data * p2p,const u8 * go_interface_addr,const u8 * own_interface_addr,unsigned int freq,u32 duration1,u32 interval1,u32 duration2,u32 interval2)4681 int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
4682 		     const u8 *own_interface_addr, unsigned int freq,
4683 		     u32 duration1, u32 interval1, u32 duration2,
4684 		     u32 interval2)
4685 {
4686 	struct wpabuf *req;
4687 
4688 	p2p_dbg(p2p, "Send Presence Request to GO " MACSTR
4689 		" (own interface " MACSTR ") freq=%u dur1=%u int1=%u "
4690 		"dur2=%u int2=%u",
4691 		MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
4692 		freq, duration1, interval1, duration2, interval2);
4693 
4694 	req = p2p_build_presence_req(duration1, interval1, duration2,
4695 				     interval2);
4696 	if (req == NULL)
4697 		return -1;
4698 
4699 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4700 	if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
4701 			    go_interface_addr,
4702 			    wpabuf_head(req), wpabuf_len(req), 200) < 0) {
4703 		p2p_dbg(p2p, "Failed to send Action frame");
4704 	}
4705 	wpabuf_free(req);
4706 
4707 	return 0;
4708 }
4709 
4710 
p2p_build_presence_resp(u8 status,const u8 * noa,size_t noa_len,u8 dialog_token)4711 static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
4712 					       size_t noa_len, u8 dialog_token)
4713 {
4714 	struct wpabuf *resp;
4715 	u8 *len;
4716 
4717 	resp = wpabuf_alloc(100 + noa_len);
4718 	if (resp == NULL)
4719 		return NULL;
4720 
4721 	p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
4722 	len = p2p_buf_add_ie_hdr(resp);
4723 	p2p_buf_add_status(resp, status);
4724 	if (noa) {
4725 		wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
4726 		wpabuf_put_le16(resp, noa_len);
4727 		wpabuf_put_data(resp, noa, noa_len);
4728 	} else
4729 		p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
4730 	p2p_buf_update_ie_hdr(resp, len);
4731 
4732 	return resp;
4733 }
4734 
4735 
p2p_process_presence_req(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len,int rx_freq)4736 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
4737 				     const u8 *sa, const u8 *data, size_t len,
4738 				     int rx_freq)
4739 {
4740 	struct p2p_message msg;
4741 	u8 status;
4742 	struct wpabuf *resp;
4743 	size_t g;
4744 	struct p2p_group *group = NULL;
4745 	int parsed = 0;
4746 	u8 noa[50];
4747 	int noa_len;
4748 
4749 	p2p_dbg(p2p, "Received P2P Action - P2P Presence Request");
4750 
4751 	for (g = 0; g < p2p->num_groups; g++) {
4752 		if (ether_addr_equal(
4753 			    da, p2p_group_get_interface_addr(p2p->groups[g]))) {
4754 			group = p2p->groups[g];
4755 			break;
4756 		}
4757 	}
4758 	if (group == NULL) {
4759 		p2p_dbg(p2p, "Ignore P2P Presence Request for unknown group "
4760 			MACSTR, MAC2STR(da));
4761 		return;
4762 	}
4763 
4764 	if (p2p_parse(data, len, &msg) < 0) {
4765 		p2p_dbg(p2p, "Failed to parse P2P Presence Request");
4766 		status = P2P_SC_FAIL_INVALID_PARAMS;
4767 		goto fail;
4768 	}
4769 	parsed = 1;
4770 
4771 	if (msg.noa == NULL) {
4772 		p2p_dbg(p2p, "No NoA attribute in P2P Presence Request");
4773 		status = P2P_SC_FAIL_INVALID_PARAMS;
4774 		goto fail;
4775 	}
4776 
4777 	status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
4778 
4779 fail:
4780 	if (p2p->cfg->get_noa)
4781 		noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
4782 					    sizeof(noa));
4783 	else
4784 		noa_len = -1;
4785 	resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
4786 				       noa_len > 0 ? noa_len : 0,
4787 				       msg.dialog_token);
4788 	if (parsed)
4789 		p2p_parse_free(&msg);
4790 	if (resp == NULL)
4791 		return;
4792 
4793 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4794 	if (p2p_send_action(p2p, rx_freq, sa, da, da,
4795 			    wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
4796 		p2p_dbg(p2p, "Failed to send Action frame");
4797 	}
4798 	wpabuf_free(resp);
4799 }
4800 
4801 
p2p_process_presence_resp(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len)4802 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
4803 				      const u8 *sa, const u8 *data, size_t len)
4804 {
4805 	struct p2p_message msg;
4806 
4807 	p2p_dbg(p2p, "Received P2P Action - P2P Presence Response");
4808 
4809 	if (p2p_parse(data, len, &msg) < 0) {
4810 		p2p_dbg(p2p, "Failed to parse P2P Presence Response");
4811 		return;
4812 	}
4813 
4814 	if (msg.status == NULL || msg.noa == NULL) {
4815 		p2p_dbg(p2p, "No Status or NoA attribute in P2P Presence Response");
4816 		p2p_parse_free(&msg);
4817 		return;
4818 	}
4819 
4820 	if (p2p->cfg->presence_resp) {
4821 		p2p->cfg->presence_resp(p2p->cfg->cb_ctx, sa, *msg.status,
4822 					msg.noa, msg.noa_len);
4823 	}
4824 
4825 	if (*msg.status) {
4826 		p2p_dbg(p2p, "P2P Presence Request was rejected: status %u",
4827 			*msg.status);
4828 		p2p_parse_free(&msg);
4829 		return;
4830 	}
4831 
4832 	p2p_dbg(p2p, "P2P Presence Request was accepted");
4833 	wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
4834 		    msg.noa, msg.noa_len);
4835 	/* TODO: process NoA */
4836 	p2p_parse_free(&msg);
4837 }
4838 
4839 
p2p_ext_listen_timeout(void * eloop_ctx,void * timeout_ctx)4840 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
4841 {
4842 	struct p2p_data *p2p = eloop_ctx;
4843 
4844 	if (p2p->ext_listen_interval) {
4845 		/* Schedule next extended listen timeout */
4846 		eloop_register_timeout(p2p->ext_listen_interval_sec,
4847 				       p2p->ext_listen_interval_usec,
4848 				       p2p_ext_listen_timeout, p2p, NULL);
4849 	}
4850 
4851 	if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
4852 		/*
4853 		 * This should not really happen, but it looks like the Listen
4854 		 * command may fail is something else (e.g., a scan) was
4855 		 * running at an inconvenient time. As a workaround, allow new
4856 		 * Extended Listen operation to be started.
4857 		 */
4858 		p2p_dbg(p2p, "Previous Extended Listen operation had not been completed - try again");
4859 		p2p->ext_listen_only = 0;
4860 		p2p_set_state(p2p, P2P_IDLE);
4861 	}
4862 
4863 	if ((p2p->cfg->is_p2p_in_progress &&
4864 	     p2p->cfg->is_p2p_in_progress(p2p->cfg->cb_ctx)) ||
4865 	    (p2p->pending_action_state == P2P_PENDING_PD &&
4866 	     p2p->pd_retries > 0)) {
4867 		p2p_dbg(p2p, "Operation in progress - skip Extended Listen timeout (%s)",
4868 			p2p_state_txt(p2p->state));
4869 		return;
4870 	}
4871 
4872 	if (p2p->state != P2P_IDLE) {
4873 		p2p_dbg(p2p, "Skip Extended Listen timeout in active state (%s)", p2p_state_txt(p2p->state));
4874 		return;
4875 	}
4876 
4877 	p2p_dbg(p2p, "Extended Listen timeout");
4878 	p2p->ext_listen_only = 1;
4879 	if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
4880 		p2p_dbg(p2p, "Failed to start Listen state for Extended Listen Timing");
4881 		p2p->ext_listen_only = 0;
4882 	}
4883 }
4884 
4885 
p2p_ext_listen(struct p2p_data * p2p,unsigned int period,unsigned int interval)4886 int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
4887 		   unsigned int interval)
4888 {
4889 	if (period > 65535 || interval > 65535 || period > interval ||
4890 	    (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
4891 		p2p_dbg(p2p, "Invalid Extended Listen Timing request: period=%u interval=%u",
4892 			period, interval);
4893 		return -1;
4894 	}
4895 
4896 	eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
4897 
4898 	if (interval == 0) {
4899 		p2p_dbg(p2p, "Disabling Extended Listen Timing");
4900 		p2p->ext_listen_period = 0;
4901 		p2p->ext_listen_interval = 0;
4902 		return 0;
4903 	}
4904 
4905 	p2p_dbg(p2p, "Enabling Extended Listen Timing: period %u msec, interval %u msec",
4906 		period, interval);
4907 	p2p->ext_listen_period = period;
4908 	p2p->ext_listen_interval = interval;
4909 	p2p->ext_listen_interval_sec = interval / 1000;
4910 	p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
4911 
4912 	eloop_register_timeout(p2p->ext_listen_interval_sec,
4913 			       p2p->ext_listen_interval_usec,
4914 			       p2p_ext_listen_timeout, p2p, NULL);
4915 
4916 	return 0;
4917 }
4918 
4919 
p2p_deauth_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4920 void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4921 		      const u8 *ie, size_t ie_len)
4922 {
4923 	struct p2p_message msg;
4924 
4925 	if (bssid == NULL || ie == NULL)
4926 		return;
4927 
4928 	os_memset(&msg, 0, sizeof(msg));
4929 	if (p2p_parse_ies(ie, ie_len, &msg))
4930 		return;
4931 	if (msg.minor_reason_code == NULL) {
4932 		p2p_parse_free(&msg);
4933 		return;
4934 	}
4935 
4936 	p2p_dbg(p2p, "Deauthentication notification BSSID " MACSTR
4937 		" reason_code=%u minor_reason_code=%u",
4938 		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4939 
4940 	p2p_parse_free(&msg);
4941 }
4942 
4943 
p2p_disassoc_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4944 void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4945 			const u8 *ie, size_t ie_len)
4946 {
4947 	struct p2p_message msg;
4948 
4949 	if (bssid == NULL || ie == NULL)
4950 		return;
4951 
4952 	os_memset(&msg, 0, sizeof(msg));
4953 	if (p2p_parse_ies(ie, ie_len, &msg))
4954 		return;
4955 	if (msg.minor_reason_code == NULL) {
4956 		p2p_parse_free(&msg);
4957 		return;
4958 	}
4959 
4960 	p2p_dbg(p2p, "Disassociation notification BSSID " MACSTR
4961 		" reason_code=%u minor_reason_code=%u",
4962 		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4963 
4964 	p2p_parse_free(&msg);
4965 }
4966 
4967 
p2p_set_managed_oper(struct p2p_data * p2p,int enabled)4968 void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
4969 {
4970 	if (enabled) {
4971 		p2p_dbg(p2p, "Managed P2P Device operations enabled");
4972 		p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
4973 	} else {
4974 		p2p_dbg(p2p, "Managed P2P Device operations disabled");
4975 		p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
4976 	}
4977 }
4978 
4979 
4980 #ifdef CONFIG_TESTING_OPTIONS
4981 
p2p_set_pairing_setup(struct p2p_data * p2p,int pairing_setup)4982 void p2p_set_pairing_setup(struct p2p_data *p2p, int pairing_setup)
4983 {
4984 	p2p_dbg(p2p, "Pairing Setup %s",
4985 		pairing_setup ? "Enabled" : "Disabled");
4986 	if (pairing_setup) {
4987 		p2p->cfg->pairing_config.pairing_capable = true;
4988 		p2p->cfg->pairing_config.enable_pairing_setup = true;
4989 		if (p2p->pairing_info)
4990 			p2p->pairing_info->enable_pairing_setup = true;
4991 	} else {
4992 		p2p->cfg->pairing_config.pairing_capable = false;
4993 		p2p->cfg->pairing_config.enable_pairing_setup = false;
4994 		if (p2p->pairing_info)
4995 			p2p->pairing_info->enable_pairing_setup = false;
4996 	}
4997 }
4998 
4999 
p2p_set_pairing_cache(struct p2p_data * p2p,int pairing_cache)5000 void p2p_set_pairing_cache(struct p2p_data *p2p, int pairing_cache)
5001 {
5002 	p2p_dbg(p2p, "Pairing Cache %s",
5003 		pairing_cache ? "Enabled" : "Disabled");
5004 	if (pairing_cache) {
5005 		p2p->cfg->pairing_config.enable_pairing_cache = true;
5006 		if (p2p->pairing_info)
5007 			p2p->pairing_info->enable_pairing_cache = true;
5008 	} else {
5009 		p2p->cfg->pairing_config.enable_pairing_cache = false;
5010 		if (p2p->pairing_info)
5011 			p2p->pairing_info->enable_pairing_cache = false;
5012 	}
5013 }
5014 
5015 
p2p_set_bootstrapmethods(struct p2p_data * p2p,int bootstrap_methods)5016 void p2p_set_bootstrapmethods(struct p2p_data *p2p, int bootstrap_methods)
5017 {
5018 	p2p_dbg(p2p, "Bootstraping methods: 0x%x", bootstrap_methods);
5019 	p2p->cfg->pairing_config.bootstrap_methods = bootstrap_methods;
5020 	if (p2p->pairing_info)
5021 		p2p->pairing_info->supported_bootstrap = bootstrap_methods;
5022 }
5023 
5024 
p2p_set_pasn_type(struct p2p_data * p2p,u8 pasn_type)5025 void p2p_set_pasn_type(struct p2p_data *p2p, u8 pasn_type)
5026 {
5027 	p2p_dbg(p2p, "PASN type: 0x%x", pasn_type);
5028 	p2p->cfg->pairing_config.pasn_type = pasn_type;
5029 }
5030 
5031 
p2p_set_comeback_after(struct p2p_data * p2p,int comeback_after)5032 void p2p_set_comeback_after(struct p2p_data *p2p, int comeback_after)
5033 {
5034 	p2p_dbg(p2p, "Comeback after: %d", comeback_after);
5035 	p2p->cfg->comeback_after = comeback_after;
5036 }
5037 
5038 
p2p_set_reg_info(struct p2p_data * p2p,u8 val)5039 void p2p_set_reg_info(struct p2p_data *p2p, u8 val)
5040 {
5041 	p2p->cfg->reg_info = val;
5042 }
5043 
5044 
p2p_set_twt_power_mgmt(struct p2p_data * p2p,int val)5045 void p2p_set_twt_power_mgmt(struct p2p_data *p2p, int val)
5046 {
5047 	p2p_dbg(p2p, "TWT-based P2P Power Mgmt: %s",
5048 		     val ? "Enabled" : "Disabled");
5049 	if (val)
5050 		p2p->cfg->twt_power_mgmt = true;
5051 	else
5052 		p2p->cfg->twt_power_mgmt = false;
5053 }
5054 
5055 
p2p_set_chan_switch_req_enable(struct p2p_data * p2p,bool val)5056 void p2p_set_chan_switch_req_enable(struct p2p_data *p2p, bool val)
5057 {
5058 	p2p->cfg->chan_switch_req_enable = val;
5059 }
5060 
5061 
p2p_set_invitation_op_freq(struct p2p_data * p2p,int freq)5062 void p2p_set_invitation_op_freq(struct p2p_data *p2p, int freq)
5063 {
5064 	u8 op_class, channel;
5065 
5066 	if (freq == -1) {
5067 		p2p->cfg->inv_op_class = 0;
5068 		p2p->cfg->inv_op_channel = 0;
5069 		return;
5070 	}
5071 
5072 	if (p2p_freq_to_channel(freq, &op_class, &channel) < 0)
5073 		return;
5074 
5075 	p2p->cfg->inv_op_class = op_class;
5076 	p2p->cfg->inv_op_channel = channel;
5077 }
5078 
5079 #endif /* CONFIG_TESTING_OPTIONS */
5080 
5081 
p2p_config_get_random_social(struct p2p_config * p2p,u8 * op_class,u8 * op_channel,struct wpa_freq_range_list * avoid_list,struct wpa_freq_range_list * disallow_list)5082 int p2p_config_get_random_social(struct p2p_config *p2p, u8 *op_class,
5083 				 u8 *op_channel,
5084 				 struct wpa_freq_range_list *avoid_list,
5085 				 struct wpa_freq_range_list *disallow_list)
5086 {
5087 	return p2p_channel_random_social(&p2p->channels, op_class, op_channel,
5088 					 avoid_list, disallow_list);
5089 }
5090 
5091 
p2p_set_listen_channel(struct p2p_data * p2p,u8 reg_class,u8 channel,u8 forced)5092 int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel,
5093 			   u8 forced)
5094 {
5095 	if (p2p_channel_to_freq(reg_class, channel) < 0)
5096 		return -1;
5097 
5098 	/*
5099 	 * Listen channel was set in configuration or set by control interface;
5100 	 * cannot override it.
5101 	 */
5102 	if (p2p->cfg->channel_forced && forced == 0) {
5103 		p2p_dbg(p2p,
5104 			"Listen channel was previously configured - do not override based on optimization");
5105 		return -1;
5106 	}
5107 
5108 	p2p_dbg(p2p, "Set Listen channel: reg_class %u channel %u",
5109 		reg_class, channel);
5110 
5111 	if (p2p->state == P2P_IDLE) {
5112 		p2p->cfg->reg_class = reg_class;
5113 		p2p->cfg->channel = channel;
5114 		p2p->cfg->channel_forced = forced;
5115 	} else {
5116 		p2p_dbg(p2p, "Defer setting listen channel");
5117 		p2p->pending_reg_class = reg_class;
5118 		p2p->pending_channel = channel;
5119 		p2p->pending_channel_forced = forced;
5120 	}
5121 
5122 	return 0;
5123 }
5124 
5125 
p2p_get_listen_channel(struct p2p_data * p2p)5126 u8 p2p_get_listen_channel(struct p2p_data *p2p)
5127 {
5128 	return p2p->cfg->channel;
5129 }
5130 
5131 
p2p_set_ssid_postfix(struct p2p_data * p2p,const u8 * postfix,size_t len)5132 int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
5133 {
5134 	p2p_dbg(p2p, "New SSID postfix: %s", wpa_ssid_txt(postfix, len));
5135 	if (postfix == NULL) {
5136 		p2p->cfg->ssid_postfix_len = 0;
5137 		return 0;
5138 	}
5139 	if (len > sizeof(p2p->cfg->ssid_postfix))
5140 		return -1;
5141 	os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
5142 	p2p->cfg->ssid_postfix_len = len;
5143 	return 0;
5144 }
5145 
5146 
p2p_set_oper_channel(struct p2p_data * p2p,u8 op_reg_class,u8 op_channel,int cfg_op_channel)5147 int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
5148 			 int cfg_op_channel)
5149 {
5150 	if (p2p_channel_to_freq(op_reg_class, op_channel) < 0)
5151 		return -1;
5152 
5153 	p2p_dbg(p2p, "Set Operating channel: reg_class %u channel %u",
5154 		op_reg_class, op_channel);
5155 	p2p->cfg->op_reg_class = op_reg_class;
5156 	p2p->cfg->op_channel = op_channel;
5157 	p2p->cfg->cfg_op_channel = cfg_op_channel;
5158 	return 0;
5159 }
5160 
5161 
p2p_set_pref_chan(struct p2p_data * p2p,unsigned int num_pref_chan,const struct p2p_channel * pref_chan)5162 int p2p_set_pref_chan(struct p2p_data *p2p, unsigned int num_pref_chan,
5163 		      const struct p2p_channel *pref_chan)
5164 {
5165 	struct p2p_channel *n;
5166 
5167 	if (pref_chan) {
5168 		n = os_memdup(pref_chan,
5169 			      num_pref_chan * sizeof(struct p2p_channel));
5170 		if (n == NULL)
5171 			return -1;
5172 	} else
5173 		n = NULL;
5174 
5175 	os_free(p2p->cfg->pref_chan);
5176 	p2p->cfg->pref_chan = n;
5177 	p2p->cfg->num_pref_chan = num_pref_chan;
5178 
5179 	return 0;
5180 }
5181 
5182 
p2p_set_no_go_freq(struct p2p_data * p2p,const struct wpa_freq_range_list * list)5183 int p2p_set_no_go_freq(struct p2p_data *p2p,
5184 		       const struct wpa_freq_range_list *list)
5185 {
5186 	struct wpa_freq_range *tmp;
5187 
5188 	if (list == NULL || list->num == 0) {
5189 		os_free(p2p->no_go_freq.range);
5190 		p2p->no_go_freq.range = NULL;
5191 		p2p->no_go_freq.num = 0;
5192 		return 0;
5193 	}
5194 
5195 	tmp = os_calloc(list->num, sizeof(struct wpa_freq_range));
5196 	if (tmp == NULL)
5197 		return -1;
5198 	os_memcpy(tmp, list->range, list->num * sizeof(struct wpa_freq_range));
5199 	os_free(p2p->no_go_freq.range);
5200 	p2p->no_go_freq.range = tmp;
5201 	p2p->no_go_freq.num = list->num;
5202 	p2p_dbg(p2p, "Updated no GO chan list");
5203 
5204 	return 0;
5205 }
5206 
5207 
p2p_get_interface_addr(struct p2p_data * p2p,const u8 * dev_addr,u8 * iface_addr)5208 int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
5209 			   u8 *iface_addr)
5210 {
5211 	struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
5212 
5213 	if (!dev || is_zero_ether_addr(dev->interface_addr)) {
5214 		p2p_dbg(p2p,
5215 			"P2P: Failed to get interface address from device addr "
5216 			MACSTR, MAC2STR(dev_addr));
5217 		return -1;
5218 	}
5219 	os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
5220 	return 0;
5221 }
5222 
5223 
p2p_get_dev_addr(struct p2p_data * p2p,const u8 * iface_addr,u8 * dev_addr)5224 int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
5225 			   u8 *dev_addr)
5226 {
5227 	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5228 
5229 	if (!dev) {
5230 		p2p_dbg(p2p,
5231 			"P2P: Failed to get device address from interface address "
5232 			MACSTR, MAC2STR(iface_addr));
5233 		return -1;
5234 	}
5235 	os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
5236 	return 0;
5237 }
5238 
5239 
p2p_get_dev_identity_key(struct p2p_data * p2p,const u8 * dev_addr,const u8 ** dik_data,size_t * dik_len,u8 * cipher)5240 int p2p_get_dev_identity_key(struct p2p_data *p2p, const u8 *dev_addr,
5241 			     const u8 **dik_data, size_t *dik_len, u8 *cipher)
5242 {
5243 	if (!p2p || !p2p->peer_dik_len) {
5244 		wpa_printf(MSG_DEBUG,
5245 			   "P2P2: Failed to get device identity key for "
5246 			   MACSTR, MAC2STR(dev_addr));
5247 		return -1;
5248 	}
5249 
5250 	*dik_data = p2p->peer_dik_data;
5251 	*dik_len = p2p->peer_dik_len;
5252 	*cipher = p2p->dik_cipher_version;
5253 
5254 	/* Reset DIK length to invalidate DIK for successive iteration of a new
5255 	 * peer. */
5256 	p2p->peer_dik_len = 0;
5257 
5258 	return 0;
5259 }
5260 
5261 
p2p_set_peer_filter(struct p2p_data * p2p,const u8 * addr)5262 void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
5263 {
5264 	os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
5265 	if (is_zero_ether_addr(p2p->peer_filter))
5266 		p2p_dbg(p2p, "Disable peer filter");
5267 	else
5268 		p2p_dbg(p2p, "Enable peer filter for " MACSTR,
5269 			MAC2STR(p2p->peer_filter));
5270 }
5271 
5272 
p2p_set_cross_connect(struct p2p_data * p2p,int enabled)5273 void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
5274 {
5275 	p2p_dbg(p2p, "Cross connection %s", enabled ? "enabled" : "disabled");
5276 	if (p2p->cross_connect == enabled)
5277 		return;
5278 	p2p->cross_connect = enabled;
5279 	/* TODO: may need to tear down any action group where we are GO(?) */
5280 }
5281 
5282 
p2p_get_oper_freq(struct p2p_data * p2p,const u8 * iface_addr)5283 int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
5284 {
5285 	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5286 	if (dev == NULL)
5287 		return -1;
5288 	if (dev->oper_freq <= 0)
5289 		return -1;
5290 	return dev->oper_freq;
5291 }
5292 
5293 
p2p_set_intra_bss_dist(struct p2p_data * p2p,int enabled)5294 void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
5295 {
5296 	p2p_dbg(p2p, "Intra BSS distribution %s",
5297 		enabled ? "enabled" : "disabled");
5298 	p2p->cfg->p2p_intra_bss = enabled;
5299 }
5300 
5301 
p2p_update_channel_list(struct p2p_data * p2p,const struct p2p_channels * chan,const struct p2p_channels * cli_chan)5302 void p2p_update_channel_list(struct p2p_data *p2p,
5303 			     const struct p2p_channels *chan,
5304 			     const struct p2p_channels *cli_chan)
5305 {
5306 	p2p_dbg(p2p, "Update channel list");
5307 	os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
5308 	p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
5309 	os_memcpy(&p2p->cfg->cli_channels, cli_chan,
5310 		  sizeof(struct p2p_channels));
5311 	p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
5312 }
5313 
5314 
p2p_send_action(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * buf,size_t len,unsigned int wait_time)5315 int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
5316 		    const u8 *src, const u8 *bssid, const u8 *buf,
5317 		    size_t len, unsigned int wait_time)
5318 {
5319 	int res, scheduled;
5320 
5321 	res = p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
5322 				    buf, len, wait_time, &scheduled);
5323 	if (res == 0 && scheduled && p2p->in_listen && freq > 0 &&
5324 	    p2p->drv_in_listen > 0 &&
5325 	    (unsigned int) p2p->drv_in_listen != freq) {
5326 		p2p_dbg(p2p,
5327 			"Stop listen on %d MHz to allow a frame to be sent immediately on %d MHz",
5328 			p2p->drv_in_listen, freq);
5329 		p2p_stop_listen_for_freq(p2p, freq);
5330 	}
5331 	return res;
5332 }
5333 
5334 
p2p_set_best_channels(struct p2p_data * p2p,int freq_24,int freq_5,int freq_overall)5335 void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
5336 			   int freq_overall)
5337 {
5338 	p2p_dbg(p2p, "Best channel: 2.4 GHz: %d,  5 GHz: %d,  overall: %d",
5339 		freq_24, freq_5, freq_overall);
5340 	p2p->best_freq_24 = freq_24;
5341 	p2p->best_freq_5 = freq_5;
5342 	p2p->best_freq_overall = freq_overall;
5343 }
5344 
5345 
p2p_set_own_freq_preference(struct p2p_data * p2p,int freq)5346 void p2p_set_own_freq_preference(struct p2p_data *p2p, int freq)
5347 {
5348 	p2p_dbg(p2p, "Own frequency preference: %d MHz", freq);
5349 	p2p->own_freq_preference = freq;
5350 }
5351 
5352 
p2p_get_go_neg_peer(struct p2p_data * p2p)5353 const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
5354 {
5355 	if (p2p == NULL || p2p->go_neg_peer == NULL)
5356 		return NULL;
5357 	return p2p->go_neg_peer->info.p2p_device_addr;
5358 }
5359 
5360 
5361 const struct p2p_peer_info *
p2p_get_peer_found(struct p2p_data * p2p,const u8 * addr,int next)5362 p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
5363 {
5364 	struct p2p_device *dev;
5365 
5366 	if (addr) {
5367 		dev = p2p_get_device(p2p, addr);
5368 		if (!dev)
5369 			return NULL;
5370 
5371 		if (!next) {
5372 			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
5373 				return NULL;
5374 
5375 			return &dev->info;
5376 		} else {
5377 			do {
5378 				dev = dl_list_first(&dev->list,
5379 						    struct p2p_device,
5380 						    list);
5381 				if (!dev || &dev->list == &p2p->devices)
5382 					return NULL;
5383 			} while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
5384 		}
5385 	} else {
5386 		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
5387 		if (!dev)
5388 			return NULL;
5389 		while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
5390 			dev = dl_list_first(&dev->list,
5391 					    struct p2p_device,
5392 					    list);
5393 			if (!dev || &dev->list == &p2p->devices)
5394 				return NULL;
5395 		}
5396 	}
5397 
5398 	return &dev->info;
5399 }
5400 
5401 
p2p_in_progress(struct p2p_data * p2p)5402 int p2p_in_progress(struct p2p_data *p2p)
5403 {
5404 	if (p2p == NULL)
5405 		return 0;
5406 	if (p2p->state == P2P_SEARCH)
5407 		return 2;
5408 	return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
5409 }
5410 
5411 
p2p_set_config_timeout(struct p2p_data * p2p,u8 go_timeout,u8 client_timeout)5412 void p2p_set_config_timeout(struct p2p_data *p2p, u8 go_timeout,
5413 			    u8 client_timeout)
5414 {
5415 	if (p2p) {
5416 		p2p->go_timeout = go_timeout;
5417 		p2p->client_timeout = client_timeout;
5418 	}
5419 }
5420 
5421 
5422 #ifdef CONFIG_WIFI_DISPLAY
5423 
p2p_update_wfd_ie_groups(struct p2p_data * p2p)5424 static void p2p_update_wfd_ie_groups(struct p2p_data *p2p)
5425 {
5426 	size_t g;
5427 	struct p2p_group *group;
5428 
5429 	for (g = 0; g < p2p->num_groups; g++) {
5430 		group = p2p->groups[g];
5431 		p2p_group_force_beacon_update_ies(group);
5432 	}
5433 }
5434 
5435 
p2p_set_wfd_ie_beacon(struct p2p_data * p2p,struct wpabuf * ie)5436 int p2p_set_wfd_ie_beacon(struct p2p_data *p2p, struct wpabuf *ie)
5437 {
5438 	wpabuf_free(p2p->wfd_ie_beacon);
5439 	p2p->wfd_ie_beacon = ie;
5440 	p2p_update_wfd_ie_groups(p2p);
5441 	return 0;
5442 }
5443 
5444 
p2p_set_wfd_ie_probe_req(struct p2p_data * p2p,struct wpabuf * ie)5445 int p2p_set_wfd_ie_probe_req(struct p2p_data *p2p, struct wpabuf *ie)
5446 {
5447 	wpabuf_free(p2p->wfd_ie_probe_req);
5448 	p2p->wfd_ie_probe_req = ie;
5449 	return 0;
5450 }
5451 
5452 
p2p_set_wfd_ie_probe_resp(struct p2p_data * p2p,struct wpabuf * ie)5453 int p2p_set_wfd_ie_probe_resp(struct p2p_data *p2p, struct wpabuf *ie)
5454 {
5455 	wpabuf_free(p2p->wfd_ie_probe_resp);
5456 	p2p->wfd_ie_probe_resp = ie;
5457 	p2p_update_wfd_ie_groups(p2p);
5458 	return 0;
5459 }
5460 
5461 
p2p_set_wfd_ie_assoc_req(struct p2p_data * p2p,struct wpabuf * ie)5462 int p2p_set_wfd_ie_assoc_req(struct p2p_data *p2p, struct wpabuf *ie)
5463 {
5464 	wpabuf_free(p2p->wfd_ie_assoc_req);
5465 	p2p->wfd_ie_assoc_req = ie;
5466 	return 0;
5467 }
5468 
5469 
p2p_set_wfd_ie_invitation(struct p2p_data * p2p,struct wpabuf * ie)5470 int p2p_set_wfd_ie_invitation(struct p2p_data *p2p, struct wpabuf *ie)
5471 {
5472 	wpabuf_free(p2p->wfd_ie_invitation);
5473 	p2p->wfd_ie_invitation = ie;
5474 	return 0;
5475 }
5476 
5477 
p2p_set_wfd_ie_prov_disc_req(struct p2p_data * p2p,struct wpabuf * ie)5478 int p2p_set_wfd_ie_prov_disc_req(struct p2p_data *p2p, struct wpabuf *ie)
5479 {
5480 	wpabuf_free(p2p->wfd_ie_prov_disc_req);
5481 	p2p->wfd_ie_prov_disc_req = ie;
5482 	return 0;
5483 }
5484 
5485 
p2p_set_wfd_ie_prov_disc_resp(struct p2p_data * p2p,struct wpabuf * ie)5486 int p2p_set_wfd_ie_prov_disc_resp(struct p2p_data *p2p, struct wpabuf *ie)
5487 {
5488 	wpabuf_free(p2p->wfd_ie_prov_disc_resp);
5489 	p2p->wfd_ie_prov_disc_resp = ie;
5490 	return 0;
5491 }
5492 
5493 
p2p_set_wfd_ie_go_neg(struct p2p_data * p2p,struct wpabuf * ie)5494 int p2p_set_wfd_ie_go_neg(struct p2p_data *p2p, struct wpabuf *ie)
5495 {
5496 	wpabuf_free(p2p->wfd_ie_go_neg);
5497 	p2p->wfd_ie_go_neg = ie;
5498 	return 0;
5499 }
5500 
5501 
p2p_set_wfd_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5502 int p2p_set_wfd_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5503 {
5504 	wpabuf_free(p2p->wfd_dev_info);
5505 	if (elem) {
5506 		p2p->wfd_dev_info = wpabuf_dup(elem);
5507 		if (p2p->wfd_dev_info == NULL)
5508 			return -1;
5509 	} else
5510 		p2p->wfd_dev_info = NULL;
5511 
5512 	return 0;
5513 }
5514 
5515 
p2p_set_wfd_r2_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5516 int p2p_set_wfd_r2_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5517 {
5518 	wpabuf_free(p2p->wfd_r2_dev_info);
5519 	if (elem) {
5520 		p2p->wfd_r2_dev_info = wpabuf_dup(elem);
5521 		if (p2p->wfd_r2_dev_info == NULL)
5522 			return -1;
5523 	} else
5524 		p2p->wfd_r2_dev_info = NULL;
5525 
5526 	return 0;
5527 }
5528 
5529 
p2p_set_wfd_assoc_bssid(struct p2p_data * p2p,const struct wpabuf * elem)5530 int p2p_set_wfd_assoc_bssid(struct p2p_data *p2p, const struct wpabuf *elem)
5531 {
5532 	wpabuf_free(p2p->wfd_assoc_bssid);
5533 	if (elem) {
5534 		p2p->wfd_assoc_bssid = wpabuf_dup(elem);
5535 		if (p2p->wfd_assoc_bssid == NULL)
5536 			return -1;
5537 	} else
5538 		p2p->wfd_assoc_bssid = NULL;
5539 
5540 	return 0;
5541 }
5542 
5543 
p2p_set_wfd_coupled_sink_info(struct p2p_data * p2p,const struct wpabuf * elem)5544 int p2p_set_wfd_coupled_sink_info(struct p2p_data *p2p,
5545 				  const struct wpabuf *elem)
5546 {
5547 	wpabuf_free(p2p->wfd_coupled_sink_info);
5548 	if (elem) {
5549 		p2p->wfd_coupled_sink_info = wpabuf_dup(elem);
5550 		if (p2p->wfd_coupled_sink_info == NULL)
5551 			return -1;
5552 	} else
5553 		p2p->wfd_coupled_sink_info = NULL;
5554 
5555 	return 0;
5556 }
5557 
5558 #endif /* CONFIG_WIFI_DISPLAY */
5559 
5560 
p2p_set_disc_int(struct p2p_data * p2p,int min_disc_int,int max_disc_int,int max_disc_tu)5561 int p2p_set_disc_int(struct p2p_data *p2p, int min_disc_int, int max_disc_int,
5562 		     int max_disc_tu)
5563 {
5564 	if (min_disc_int > max_disc_int || min_disc_int < 0 || max_disc_int < 0)
5565 		return -1;
5566 
5567 	p2p->min_disc_int = min_disc_int;
5568 	p2p->max_disc_int = max_disc_int;
5569 	p2p->max_disc_tu = max_disc_tu;
5570 	p2p_dbg(p2p, "Set discoverable interval: min=%d max=%d max_tu=%d",
5571 		min_disc_int, max_disc_int, max_disc_tu);
5572 
5573 	return 0;
5574 }
5575 
5576 
p2p_dbg(struct p2p_data * p2p,const char * fmt,...)5577 void p2p_dbg(struct p2p_data *p2p, const char *fmt, ...)
5578 {
5579 	va_list ap;
5580 	char buf[500];
5581 
5582 	if (!p2p->cfg->debug_print)
5583 		return;
5584 
5585 	va_start(ap, fmt);
5586 	vsnprintf(buf, sizeof(buf), fmt, ap);
5587 	buf[sizeof(buf) - 1] = '\0';
5588 	va_end(ap);
5589 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf);
5590 }
5591 
5592 
p2p_info(struct p2p_data * p2p,const char * fmt,...)5593 void p2p_info(struct p2p_data *p2p, const char *fmt, ...)
5594 {
5595 	va_list ap;
5596 	char buf[500];
5597 
5598 	if (!p2p->cfg->debug_print)
5599 		return;
5600 
5601 	va_start(ap, fmt);
5602 	vsnprintf(buf, sizeof(buf), fmt, ap);
5603 	buf[sizeof(buf) - 1] = '\0';
5604 	va_end(ap);
5605 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf);
5606 }
5607 
5608 
p2p_err(struct p2p_data * p2p,const char * fmt,...)5609 void p2p_err(struct p2p_data *p2p, const char *fmt, ...)
5610 {
5611 	va_list ap;
5612 	char buf[500];
5613 
5614 	if (!p2p->cfg->debug_print)
5615 		return;
5616 
5617 	va_start(ap, fmt);
5618 	vsnprintf(buf, sizeof(buf), fmt, ap);
5619 	buf[sizeof(buf) - 1] = '\0';
5620 	va_end(ap);
5621 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
5622 }
5623 
5624 
p2p_loop_on_known_peers(struct p2p_data * p2p,void (* peer_callback)(struct p2p_peer_info * peer,void * user_data),void * user_data)5625 void p2p_loop_on_known_peers(struct p2p_data *p2p,
5626 			     void (*peer_callback)(struct p2p_peer_info *peer,
5627 						   void *user_data),
5628 			     void *user_data)
5629 {
5630 	struct p2p_device *dev, *n;
5631 
5632 	dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
5633 		peer_callback(&dev->info, user_data);
5634 	}
5635 }
5636 
5637 
5638 #ifdef CONFIG_WPS_NFC
5639 
p2p_build_nfc_handover(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5640 static struct wpabuf * p2p_build_nfc_handover(struct p2p_data *p2p,
5641 					      int client_freq,
5642 					      const u8 *go_dev_addr,
5643 					      const u8 *ssid, size_t ssid_len)
5644 {
5645 	struct wpabuf *buf;
5646 	u8 op_class, channel;
5647 	enum p2p_role_indication role = P2P_DEVICE_NOT_IN_GROUP;
5648 
5649 	buf = wpabuf_alloc(1000);
5650 	if (buf == NULL)
5651 		return NULL;
5652 
5653 	op_class = p2p->cfg->reg_class;
5654 	channel = p2p->cfg->channel;
5655 
5656 	p2p_buf_add_capability(buf, p2p->dev_capab &
5657 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
5658 	p2p_buf_add_device_info(buf, p2p, NULL);
5659 
5660 	if (p2p->num_groups > 0) {
5661 		int freq = p2p_group_get_freq(p2p->groups[0]);
5662 		role = P2P_GO_IN_A_GROUP;
5663 		if (p2p_freq_to_channel(freq, &op_class, &channel) < 0) {
5664 			p2p_dbg(p2p,
5665 				"Unknown GO operating frequency %d MHz for NFC handover",
5666 				freq);
5667 			wpabuf_free(buf);
5668 			return NULL;
5669 		}
5670 	} else if (client_freq > 0) {
5671 		role = P2P_CLIENT_IN_A_GROUP;
5672 		if (p2p_freq_to_channel(client_freq, &op_class, &channel) < 0) {
5673 			p2p_dbg(p2p,
5674 				"Unknown client operating frequency %d MHz for NFC handover",
5675 				client_freq);
5676 			wpabuf_free(buf);
5677 			return NULL;
5678 		}
5679 	}
5680 
5681 	p2p_buf_add_oob_go_neg_channel(buf, p2p->cfg->country, op_class,
5682 				       channel, role);
5683 
5684 	if (p2p->num_groups > 0) {
5685 		/* Limit number of clients to avoid very long message */
5686 		p2p_buf_add_group_info(p2p->groups[0], buf, 5);
5687 		p2p_group_buf_add_id(p2p->groups[0], buf);
5688 	} else if (client_freq > 0 &&
5689 		   go_dev_addr && !is_zero_ether_addr(go_dev_addr) &&
5690 		   ssid && ssid_len > 0) {
5691 		/*
5692 		 * Add the optional P2P Group ID to indicate in which group this
5693 		 * device is a P2P Client.
5694 		 */
5695 		p2p_buf_add_group_id(buf, go_dev_addr, ssid, ssid_len);
5696 	}
5697 
5698 	return buf;
5699 }
5700 
5701 
p2p_build_nfc_handover_req(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5702 struct wpabuf * p2p_build_nfc_handover_req(struct p2p_data *p2p,
5703 					   int client_freq,
5704 					   const u8 *go_dev_addr,
5705 					   const u8 *ssid, size_t ssid_len)
5706 {
5707 	return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5708 				      ssid_len);
5709 }
5710 
5711 
p2p_build_nfc_handover_sel(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5712 struct wpabuf * p2p_build_nfc_handover_sel(struct p2p_data *p2p,
5713 					   int client_freq,
5714 					   const u8 *go_dev_addr,
5715 					   const u8 *ssid, size_t ssid_len)
5716 {
5717 	return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5718 				      ssid_len);
5719 }
5720 
5721 
p2p_process_nfc_connection_handover(struct p2p_data * p2p,struct p2p_nfc_params * params)5722 int p2p_process_nfc_connection_handover(struct p2p_data *p2p,
5723 					struct p2p_nfc_params *params)
5724 {
5725 	struct p2p_message msg;
5726 	struct p2p_device *dev;
5727 	const u8 *p2p_dev_addr;
5728 	int freq;
5729 	enum p2p_role_indication role;
5730 
5731 	params->next_step = NO_ACTION;
5732 
5733 	if (p2p_parse_ies_separate(params->wsc_attr, params->wsc_len,
5734 				   params->p2p_attr, params->p2p_len, &msg)) {
5735 		p2p_dbg(p2p, "Failed to parse WSC/P2P attributes from NFC");
5736 		p2p_parse_free(&msg);
5737 		return -1;
5738 	}
5739 
5740 	if (msg.p2p_device_addr)
5741 		p2p_dev_addr = msg.p2p_device_addr;
5742 	else if (msg.device_id)
5743 		p2p_dev_addr = msg.device_id;
5744 	else {
5745 		p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
5746 		p2p_parse_free(&msg);
5747 		return -1;
5748 	}
5749 
5750 	if (msg.oob_dev_password) {
5751 		os_memcpy(params->oob_dev_pw, msg.oob_dev_password,
5752 			  msg.oob_dev_password_len);
5753 		params->oob_dev_pw_len = msg.oob_dev_password_len;
5754 	}
5755 
5756 	dev = p2p_create_device(p2p, p2p_dev_addr);
5757 	if (dev == NULL) {
5758 		p2p_parse_free(&msg);
5759 		return -1;
5760 	}
5761 
5762 	params->peer = &dev->info;
5763 
5764 	os_get_reltime(&dev->last_seen);
5765 	dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
5766 	p2p_copy_wps_info(p2p, dev, 0, &msg);
5767 
5768 	if (!msg.oob_go_neg_channel) {
5769 		p2p_dbg(p2p, "OOB GO Negotiation Channel attribute not included");
5770 		p2p_parse_free(&msg);
5771 		return -1;
5772 	}
5773 
5774 	if (msg.oob_go_neg_channel[3] == 0 &&
5775 	    msg.oob_go_neg_channel[4] == 0)
5776 		freq = 0;
5777 	else
5778 		freq = p2p_channel_to_freq(msg.oob_go_neg_channel[3],
5779 					   msg.oob_go_neg_channel[4]);
5780 	if (freq < 0) {
5781 		p2p_dbg(p2p, "Unknown peer OOB GO Neg channel");
5782 		p2p_parse_free(&msg);
5783 		return -1;
5784 	}
5785 	role = msg.oob_go_neg_channel[5];
5786 
5787 	if (role == P2P_GO_IN_A_GROUP) {
5788 		p2p_dbg(p2p, "Peer OOB GO operating channel: %u MHz", freq);
5789 		params->go_freq = freq;
5790 	} else if (role == P2P_CLIENT_IN_A_GROUP) {
5791 		p2p_dbg(p2p, "Peer (client) OOB GO operating channel: %u MHz",
5792 			freq);
5793 		params->go_freq = freq;
5794 	} else
5795 		p2p_dbg(p2p, "Peer OOB GO Neg channel: %u MHz", freq);
5796 	dev->oob_go_neg_freq = freq;
5797 
5798 	if (!params->sel && role != P2P_GO_IN_A_GROUP) {
5799 		freq = p2p_channel_to_freq(p2p->cfg->reg_class,
5800 					   p2p->cfg->channel);
5801 		if (freq < 0) {
5802 			p2p_dbg(p2p, "Own listen channel not known");
5803 			p2p_parse_free(&msg);
5804 			return -1;
5805 		}
5806 		p2p_dbg(p2p, "Use own Listen channel as OOB GO Neg channel: %u MHz", freq);
5807 		dev->oob_go_neg_freq = freq;
5808 	}
5809 
5810 	if (msg.group_id) {
5811 		os_memcpy(params->go_dev_addr, msg.group_id, ETH_ALEN);
5812 		params->go_ssid_len = msg.group_id_len - ETH_ALEN;
5813 		os_memcpy(params->go_ssid, msg.group_id + ETH_ALEN,
5814 			  params->go_ssid_len);
5815 	}
5816 
5817 	if (dev->flags & P2P_DEV_USER_REJECTED) {
5818 		p2p_dbg(p2p, "Do not report rejected device");
5819 		p2p_parse_free(&msg);
5820 		return 0;
5821 	}
5822 
5823 	if (!(dev->flags & P2P_DEV_REPORTED)) {
5824 		p2p->cfg->dev_found(p2p->cfg->cb_ctx, p2p_dev_addr, &dev->info,
5825 				    !(dev->flags & P2P_DEV_REPORTED_ONCE));
5826 		dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
5827 	}
5828 	p2p_parse_free(&msg);
5829 
5830 	if (role == P2P_GO_IN_A_GROUP && p2p->num_groups > 0)
5831 		params->next_step = BOTH_GO;
5832 	else if (role == P2P_GO_IN_A_GROUP)
5833 		params->next_step = JOIN_GROUP;
5834 	else if (role == P2P_CLIENT_IN_A_GROUP) {
5835 		dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
5836 		params->next_step = PEER_CLIENT;
5837 	} else if (p2p->num_groups > 0)
5838 		params->next_step = AUTH_JOIN;
5839 	else if (params->sel)
5840 		params->next_step = INIT_GO_NEG;
5841 	else
5842 		params->next_step = RESP_GO_NEG;
5843 
5844 	return 0;
5845 }
5846 
5847 
p2p_set_authorized_oob_dev_pw_id(struct p2p_data * p2p,u16 dev_pw_id,int go_intent,const u8 * own_interface_addr)5848 void p2p_set_authorized_oob_dev_pw_id(struct p2p_data *p2p, u16 dev_pw_id,
5849 				      int go_intent,
5850 				      const u8 *own_interface_addr)
5851 {
5852 
5853 	p2p->authorized_oob_dev_pw_id = dev_pw_id;
5854 	if (dev_pw_id == 0) {
5855 		p2p_dbg(p2p, "NFC OOB Password unauthorized for static handover");
5856 		return;
5857 	}
5858 
5859 	p2p_dbg(p2p, "NFC OOB Password (id=%u) authorized for static handover",
5860 		dev_pw_id);
5861 
5862 	p2p->go_intent = go_intent;
5863 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
5864 }
5865 
5866 #endif /* CONFIG_WPS_NFC */
5867 
5868 
p2p_set_passphrase_len(struct p2p_data * p2p,unsigned int len)5869 int p2p_set_passphrase_len(struct p2p_data *p2p, unsigned int len)
5870 {
5871 	if (len < 8 || len > 63)
5872 		return -1;
5873 	p2p->cfg->passphrase_len = len;
5874 	return 0;
5875 }
5876 
5877 
p2p_set_vendor_elems(struct p2p_data * p2p,struct wpabuf ** vendor_elem)5878 void p2p_set_vendor_elems(struct p2p_data *p2p, struct wpabuf **vendor_elem)
5879 {
5880 	p2p->vendor_elem = vendor_elem;
5881 }
5882 
5883 
p2p_go_neg_wait_timeout(void * eloop_ctx,void * timeout_ctx)5884 void p2p_go_neg_wait_timeout(void *eloop_ctx, void *timeout_ctx)
5885 {
5886 	struct p2p_data *p2p = eloop_ctx;
5887 
5888 	p2p_dbg(p2p,
5889 		"Timeout on waiting peer to become ready for GO Negotiation");
5890 	p2p_go_neg_failed(p2p, -1);
5891 }
5892 
5893 
p2p_set_own_pref_freq_list(struct p2p_data * p2p,const struct weighted_pcl * pref_freq_list,unsigned int size)5894 void p2p_set_own_pref_freq_list(struct p2p_data *p2p,
5895 				const struct weighted_pcl *pref_freq_list,
5896 				unsigned int size)
5897 {
5898 	unsigned int i;
5899 
5900 	if (size > P2P_MAX_PREF_CHANNELS)
5901 		size = P2P_MAX_PREF_CHANNELS;
5902 	p2p->num_pref_freq = size;
5903 	os_memcpy(p2p->pref_freq_list, pref_freq_list,
5904 		  size * sizeof(struct weighted_pcl));
5905 	for (i = 0; i < size; i++) {
5906 		p2p_dbg(p2p, "Own preferred frequency list[%u]=%u MHz",
5907 			i, p2p->pref_freq_list[i].freq);
5908 	}
5909 }
5910 
5911 
p2p_set_override_pref_op_chan(struct p2p_data * p2p,u8 op_class,u8 chan)5912 void p2p_set_override_pref_op_chan(struct p2p_data *p2p, u8 op_class,
5913 				   u8 chan)
5914 {
5915 	p2p->override_pref_op_class = op_class;
5916 	p2p->override_pref_channel = chan;
5917 }
5918 
5919 
p2p_build_probe_resp_template(struct p2p_data * p2p,unsigned int freq)5920 struct wpabuf * p2p_build_probe_resp_template(struct p2p_data *p2p,
5921 					      unsigned int freq)
5922 {
5923 	struct wpabuf *ies, *buf;
5924 	u8 addr[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
5925 	int ret;
5926 
5927 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
5928 	if (!ies) {
5929 		wpa_printf(MSG_ERROR,
5930 			   "CTRL: Failed to build Probe Response IEs");
5931 		return NULL;
5932 	}
5933 
5934 	buf = wpabuf_alloc(200 + wpabuf_len(ies));
5935 	if (!buf) {
5936 		wpabuf_free(ies);
5937 		return NULL;
5938 	}
5939 
5940 	ret = p2p_build_probe_resp_buf(p2p, buf, ies, addr, freq);
5941 	wpabuf_free(ies);
5942 	if (ret) {
5943 		wpabuf_free(buf);
5944 		return NULL;
5945 	}
5946 
5947 	return buf;
5948 }
5949 
5950 
p2p_is_peer_6ghz_capab(struct p2p_data * p2p,const u8 * addr)5951 bool p2p_is_peer_6ghz_capab(struct p2p_data *p2p, const u8 *addr)
5952 {
5953 	struct p2p_device *dev;
5954 
5955 	dev = p2p_get_device(p2p, addr);
5956 	if (!dev)
5957 		return false;
5958 
5959 	return dev->support_6ghz;
5960 }
5961 
5962 
p2p_set_6ghz_dev_capab(struct p2p_data * p2p,bool allow_6ghz)5963 void p2p_set_6ghz_dev_capab(struct p2p_data *p2p, bool allow_6ghz)
5964 {
5965 	p2p->p2p_6ghz_capable = allow_6ghz;
5966 	p2p->allow_6ghz = allow_6ghz;
5967 	p2p_dbg(p2p, "Set 6 GHz capability to %d", allow_6ghz);
5968 
5969 	if (allow_6ghz)
5970 		p2p->dev_capab |= P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5971 	else
5972 		p2p->dev_capab &= ~P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5973 }
5974 
5975 
is_p2p_6ghz_capable(struct p2p_data * p2p)5976 bool is_p2p_6ghz_capable(struct p2p_data *p2p)
5977 {
5978 	return p2p->p2p_6ghz_capable;
5979 }
5980 
5981 
p2p_wfd_enabled(struct p2p_data * p2p)5982 bool p2p_wfd_enabled(struct p2p_data *p2p)
5983 {
5984 #ifdef CONFIG_WIFI_DISPLAY
5985 	return p2p->wfd_ie_probe_req != NULL;
5986 #else /* CONFIG_WIFI_DISPLAY */
5987 	return false;
5988 #endif /* CONFIG_WIFI_DISPLAY */
5989 }
5990 
5991 
p2p_peer_wfd_enabled(struct p2p_data * p2p,const u8 * peer_addr)5992 bool p2p_peer_wfd_enabled(struct p2p_data *p2p, const u8 *peer_addr)
5993 {
5994 #ifdef CONFIG_WIFI_DISPLAY
5995 	struct p2p_device *dev;
5996 
5997 	dev = p2p_get_device(p2p, peer_addr);
5998 	return dev && dev->info.wfd_subelems != NULL;
5999 #else /* CONFIG_WIFI_DISPLAY */
6000 	return false;
6001 #endif /* CONFIG_WIFI_DISPLAY */
6002 }
6003 
6004 
is_p2p_allow_6ghz(struct p2p_data * p2p)6005 bool is_p2p_allow_6ghz(struct p2p_data *p2p)
6006 {
6007 	return p2p->allow_6ghz;
6008 }
6009 
6010 
set_p2p_allow_6ghz(struct p2p_data * p2p,bool value)6011 void set_p2p_allow_6ghz(struct p2p_data *p2p, bool value)
6012 {
6013 	p2p->allow_6ghz = value;
6014 }
6015 
6016 
p2p_derive_nonce_tag(struct p2p_data * p2p)6017 static int p2p_derive_nonce_tag(struct p2p_data *p2p)
6018 {
6019 	u8 dira_nonce[DEVICE_IDENTITY_NONCE_LEN];
6020 	u8 dira_tag[DEVICE_MAX_HASH_LEN];
6021 	u8 data[DIR_STR_LEN + DEVICE_IDENTITY_NONCE_LEN + ETH_ALEN];
6022 	struct p2p_id_key *dev_ik;
6023 
6024 	dev_ik = &p2p->pairing_info->dev_ik;
6025 
6026 	if (dev_ik->cipher_version != DIRA_CIPHER_VERSION_128) {
6027 		wpa_printf(MSG_INFO,
6028 			   "P2P: Unsupported DIRA Cipher version = %d",
6029 			   dev_ik->cipher_version);
6030 		return -1;
6031 	}
6032 
6033 	if (dev_ik->dik_len != DEVICE_IDENTITY_KEY_LEN) {
6034 		wpa_printf(MSG_INFO, "P2P: Invalid DIK length = %zu",
6035 			   dev_ik->dik_len);
6036 		return -1;
6037 	}
6038 
6039 	os_memset(data, 0, sizeof(data));
6040 
6041 	if (os_get_random(dira_nonce, DEVICE_IDENTITY_NONCE_LEN) < 0) {
6042 		wpa_printf(MSG_ERROR, "P2P: Failed to generate DIRA nonce");
6043 		return -1;
6044 	}
6045 
6046 	/* Tag = Truncate-64(HMAC-SHA-256(DevIK,
6047 	 *                                "DIR" || P2P Device Address || Nonce))
6048 	 */
6049 	os_memcpy(data, "DIR", DIR_STR_LEN);
6050 	os_memcpy(&data[DIR_STR_LEN], p2p->cfg->dev_addr, ETH_ALEN);
6051 	os_memcpy(&data[DIR_STR_LEN + ETH_ALEN], dira_nonce,
6052 		  DEVICE_IDENTITY_NONCE_LEN);
6053 
6054 	if (hmac_sha256(dev_ik->dik_data, dev_ik->dik_len, data, sizeof(data),
6055 			dira_tag) < 0) {
6056 		wpa_printf(MSG_ERROR, "P2P: Could not derive DIRA tag");
6057 		return -1;
6058 	}
6059 
6060 	dev_ik->dira_nonce_len = DEVICE_IDENTITY_NONCE_LEN;
6061 	os_memcpy(dev_ik->dira_nonce, dira_nonce, DEVICE_IDENTITY_NONCE_LEN);
6062 	dev_ik->dira_tag_len = DEVICE_IDENTITY_TAG_LEN;
6063 	os_memcpy(dev_ik->dira_tag, dira_tag, DEVICE_IDENTITY_TAG_LEN);
6064 
6065 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIK", dev_ik->dik_data,
6066 			dev_ik->dik_len);
6067 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-NONCE", dev_ik->dira_nonce,
6068 			dev_ik->dira_nonce_len);
6069 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-TAG", dev_ik->dira_tag,
6070 			dev_ik->dira_tag_len);
6071 	return 0;
6072 }
6073 
6074 
p2p_validate_dira(struct p2p_data * p2p,struct p2p_device * dev,const u8 * dira,u16 dira_len)6075 static int p2p_validate_dira(struct p2p_data *p2p, struct p2p_device *dev,
6076 			     const u8 *dira, u16 dira_len)
6077 {
6078 	if (dira_len < 1 || dira[0] != DIRA_CIPHER_VERSION_128) {
6079 		p2p_dbg(p2p, "Unsupported DIRA cipher version %d",
6080 			dira[0]);
6081 		return 0;
6082 	}
6083 
6084 	if (dira_len < 1 + DEVICE_IDENTITY_NONCE_LEN + DEVICE_IDENTITY_TAG_LEN)
6085 	{
6086 		p2p_dbg(p2p, "Truncated DIRA (length %u)", dira_len);
6087 		return 0;
6088 	}
6089 
6090 	if (p2p->cfg->validate_dira) {
6091 		const u8 *nonce = &dira[1];
6092 		const u8 *tag = &dira[1 + DEVICE_IDENTITY_NONCE_LEN];
6093 
6094 		return p2p->cfg->validate_dira(p2p->cfg->cb_ctx,
6095 					       dev->info.p2p_device_addr,
6096 					       nonce, tag);
6097 	}
6098 
6099 	return 0;
6100 }
6101 
6102 
p2p_usd_service_hash(struct p2p_data * p2p,const char * service_name)6103 void p2p_usd_service_hash(struct p2p_data *p2p, const char *service_name)
6104 {
6105 	u8 buf[P2PS_HASH_LEN];
6106 
6107 	p2p->usd_service = false;
6108 
6109 	if (!service_name)
6110 		return;
6111 
6112 	if (!p2ps_gen_hash(p2p, service_name, buf))
6113 		return;
6114 	p2p_dbg(p2p, "USD service %s hash " MACSTR,
6115 		service_name, MAC2STR(buf));
6116 	p2p->usd_service = true;
6117 	os_memcpy(&p2p->p2p_service_hash, buf, P2PS_HASH_LEN);
6118 }
6119 
6120 
p2p_usd_elems(struct p2p_data * p2p)6121 struct wpabuf * p2p_usd_elems(struct p2p_data *p2p)
6122 {
6123 	struct wpabuf *buf;
6124 	u8 *len;
6125 	u8 group_capab;
6126 
6127 	buf = wpabuf_alloc(1000);
6128 	if (!buf)
6129 		return NULL;
6130 
6131 	len = p2p_buf_add_ie_hdr(buf);
6132 
6133 	/* P2P Capability attribute */
6134 	group_capab = 0;
6135 	if (p2p->num_groups) {
6136 		group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
6137 		if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
6138 		    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
6139 		    p2p->cross_connect)
6140 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
6141 	}
6142 	if (p2p->cfg->p2p_intra_bss)
6143 		group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
6144 	p2p_buf_add_capability(buf, p2p->dev_capab &
6145 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
6146 			       group_capab);
6147 
6148 	/* P2P Device Info attribute */
6149 	p2p_buf_add_device_info(buf, p2p, NULL);
6150 
6151 	p2p_buf_update_ie_hdr(buf, len);
6152 
6153 	len = p2p_buf_add_p2p2_ie_hdr(buf);
6154 
6155 	/* P2P Capability Extension attribute */
6156 	p2p_buf_add_pcea(buf, p2p);
6157 
6158 	/* P2P Pairing Bootstrapping Method attribute */
6159 	p2p_buf_add_pbma(buf, p2p->cfg->pairing_config.bootstrap_methods, NULL,
6160 			 0, 0);
6161 
6162 	/* P2P Device Identity Resolution attribute */
6163 	if (p2p->pairing_info &&
6164 	    p2p->cfg->pairing_config.pairing_capable &&
6165 	    p2p->cfg->pairing_config.enable_pairing_cache &&
6166 	    p2p_derive_nonce_tag(p2p) == 0)
6167 		p2p_buf_add_dira(buf, p2p);
6168 
6169 	p2p_buf_update_ie_hdr(buf, len);
6170 
6171 	return buf;
6172 }
6173 
6174 
p2p_process_usd_elems(struct p2p_data * p2p,const u8 * ies,u16 ies_len,const u8 * peer_addr,unsigned int freq)6175 void p2p_process_usd_elems(struct p2p_data *p2p, const u8 *ies, u16 ies_len,
6176 			   const u8 *peer_addr, unsigned int freq)
6177 {
6178 	struct p2p_device *dev;
6179 	struct p2p_message msg;
6180 	const u8 *p2p_dev_addr;
6181 
6182 	os_memset(&msg, 0, sizeof(msg));
6183 	if (p2p_parse_ies(ies, ies_len, &msg)) {
6184 		p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
6185 		p2p_parse_free(&msg);
6186 		return;
6187 	}
6188 	if (msg.p2p_device_addr)
6189 		p2p_dev_addr = msg.p2p_device_addr;
6190 	else
6191 		p2p_dev_addr = peer_addr;
6192 
6193 	dev = p2p_create_device(p2p, p2p_dev_addr);
6194 	if (!dev) {
6195 		p2p_parse_free(&msg);
6196 		p2p_dbg(p2p, "Failed to add a peer P2P Device");
6197 		return;
6198 	}
6199 
6200 	dev->p2p2 = true;
6201 	/* Reset info from old IEs */
6202 	dev->info.reg_info = 0;
6203 	os_memset(&dev->info.pairing_config, 0,
6204 		  sizeof(struct p2p_pairing_config));
6205 
6206 	os_get_reltime(&dev->last_seen);
6207 	dev->listen_freq = freq;
6208 	dev->oper_freq = freq;
6209 
6210 	if (msg.capability) {
6211 		/*
6212 		 * P2P Client Discoverability bit is reserved in all frames
6213 		 * that use this function, so do not change its value here.
6214 		 */
6215 		dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6216 		dev->info.dev_capab |= msg.capability[0] &
6217 			~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6218 		dev->info.group_capab = msg.capability[1];
6219 	}
6220 
6221 	if (msg.pcea_info && msg.pcea_info_len >= 2)
6222 		p2p_process_pcea(p2p, &msg, dev);
6223 
6224 	if (msg.pbma_info && msg.pbma_info_len == 2)
6225 		dev->info.pairing_config.bootstrap_methods =
6226 			WPA_GET_LE16(msg.pbma_info);
6227 
6228 	if (!ether_addr_equal(peer_addr, p2p_dev_addr))
6229 		os_memcpy(dev->interface_addr, peer_addr, ETH_ALEN);
6230 
6231 	if (msg.dira && msg.dira_len) {
6232 		dev->info.nonce_tag_valid = false;
6233 		dev->info.dik_id = p2p_validate_dira(p2p, dev, msg.dira,
6234 						     msg.dira_len);
6235 		if (dev->info.dik_id) {
6236 			os_memcpy(dev->info.nonce, &msg.dira[1],
6237 				  DEVICE_IDENTITY_NONCE_LEN);
6238 			os_memcpy(dev->info.tag,
6239 				  &msg.dira[1 + DEVICE_IDENTITY_NONCE_LEN],
6240 				  DEVICE_IDENTITY_TAG_LEN);
6241 			dev->info.pairing_config.dik_cipher = msg.dira[0];
6242 			dev->info.nonce_tag_valid = true;
6243 		}
6244 	}
6245 
6246 	p2p_dbg(p2p, "Updated device entry based on USD frame: " MACSTR
6247 		" dev_capab=0x%x group_capab=0x%x listen_freq=%d",
6248 		MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
6249 		dev->info.group_capab, dev->listen_freq);
6250 
6251 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, dev->info.p2p_device_addr,
6252 			    &dev->info, !(dev->flags & P2P_DEV_REPORTED_ONCE));
6253 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
6254 
6255 	p2p_parse_free(&msg);
6256 }
6257 
6258 
p2p_get_dik_id(struct p2p_data * p2p,const u8 * peer)6259 int p2p_get_dik_id(struct p2p_data *p2p, const u8 *peer)
6260 {
6261 	struct p2p_device *dev;
6262 
6263 	dev = p2p_get_device(p2p, peer);
6264 	if (!dev)
6265 		return 0;
6266 
6267 	return dev->info.dik_id;
6268 }
6269 
6270 
6271 #ifdef CONFIG_PASN
6272 
p2p_config_sae_password(struct p2p_data * p2p,const char * pw)6273 int p2p_config_sae_password(struct p2p_data *p2p, const char *pw)
6274 {
6275 	os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
6276 	if (os_strlen(pw) >= sizeof(p2p->dev_sae_password))
6277 		return -1;
6278 
6279 	os_strlcpy(p2p->dev_sae_password, pw, sizeof(p2p->dev_sae_password));
6280 	return 0;
6281 }
6282 
6283 
p2p_prepare_pasn_extra_ie(struct p2p_data * p2p,struct wpabuf * extra_ies,const struct wpabuf * frame,bool add_dira)6284 static int p2p_prepare_pasn_extra_ie(struct p2p_data *p2p,
6285 				     struct wpabuf *extra_ies,
6286 				     const struct wpabuf *frame, bool add_dira)
6287 {
6288 	struct wpabuf *buf, *buf2;
6289 	size_t len;
6290 
6291 	len = 100;
6292 	if (frame)
6293 		len += wpabuf_len(frame);
6294 	buf = wpabuf_alloc(len);
6295 	if (!buf)
6296 		return -1;
6297 
6298 	/* P2P Capability Extension attribute */
6299 	p2p_buf_add_pcea(buf, p2p);
6300 
6301 	if (add_dira) {
6302 		/* Device Identity Resolution attribute */
6303 		p2p_buf_add_dira(buf, p2p);
6304 	}
6305 
6306 	if (frame) {
6307 		p2p_dbg(p2p, "Add Action frame wrapper for PASN");
6308 		wpabuf_put_u8(buf, P2P_ATTR_ACTION_FRAME_WRAPPER);
6309 		wpabuf_put_le16(buf, wpabuf_len(frame));
6310 		wpabuf_put_buf(buf, frame);
6311 	}
6312 
6313 	buf2 = p2p_encaps_ie(buf, P2P2_IE_VENDOR_TYPE);
6314 	wpabuf_free(buf);
6315 
6316 	if (wpabuf_tailroom(extra_ies) < wpabuf_len(buf2)) {
6317 		p2p_err(p2p, "Not enough room for P2P2 IE in PASN extra IEs");
6318 		wpabuf_free(buf2);
6319 		return -1;
6320 	}
6321 	wpabuf_put_buf(extra_ies, buf2);
6322 	wpabuf_free(buf2);
6323 
6324 	return 0;
6325 }
6326 
6327 
p2p_pasn_service_hash(struct p2p_data * p2p,struct wpabuf * extra_ies)6328 static struct wpabuf * p2p_pasn_service_hash(struct p2p_data *p2p,
6329 					     struct wpabuf *extra_ies)
6330 {
6331 	struct wpabuf *buf;
6332 	u8 *ie_len = NULL;
6333 
6334 	if (!p2p->usd_service)
6335 		return extra_ies;
6336 
6337 	p2p_dbg(p2p, "Add P2P2 USD service hash in extra IE");
6338 	buf = wpabuf_alloc(100);
6339 	if (!buf) {
6340 		wpabuf_free(extra_ies);
6341 		return NULL;
6342 	}
6343 
6344 	ie_len = p2p_buf_add_ie_hdr(buf);
6345 	p2p_buf_add_usd_service_hash(buf, p2p);
6346 	p2p_buf_update_ie_hdr(buf, ie_len);
6347 
6348 	return wpabuf_concat(buf, extra_ies);
6349 }
6350 
6351 
p2p_pairing_generate_rsnxe(struct p2p_data * p2p,int akmp)6352 static struct wpabuf * p2p_pairing_generate_rsnxe(struct p2p_data *p2p,
6353 						  int akmp)
6354 {
6355 	u32 capab;
6356 	size_t flen = 0;
6357 	struct wpabuf *buf;
6358 
6359 	capab = BIT(WLAN_RSNX_CAPAB_KEK_IN_PASN);
6360 
6361 	if (wpa_key_mgmt_sae(akmp))
6362 		capab |= BIT(WLAN_RSNX_CAPAB_SAE_H2E);
6363 
6364 	while (capab >> flen * 8)
6365 		flen++;
6366 
6367 	buf = wpabuf_alloc(2 + flen);
6368 	if (!buf)
6369 		return NULL;
6370 
6371 	if (wpabuf_tailroom(buf) < 2 + flen) {
6372 		p2p_dbg(p2p, "wpabuf tail room too small");
6373 		wpabuf_free(buf);
6374 		return NULL;
6375 	}
6376 	capab |= flen - 1; /* bit 0-3 = Field length (n - 1) */
6377 
6378 	p2p_dbg(p2p, "RSNXE capabilities: %04x", capab);
6379 	wpabuf_put_u8(buf, WLAN_EID_RSNX);
6380 	wpabuf_put_u8(buf, flen);
6381 	while (flen--) {
6382 		wpabuf_put_u8(buf, (capab & 0xff));
6383 		capab = capab >> 8;
6384 	}
6385 	return buf;
6386 }
6387 
6388 
6389 /* SSID used for deriving SAE pt for pairing */
6390 #define P2P_PAIRING_SSID "516F9A020000"
6391 
p2p_pairing_set_password(struct pasn_data * pasn,u8 pasn_type,const char * passphrase)6392 static void p2p_pairing_set_password(struct pasn_data *pasn, u8 pasn_type,
6393 				     const char *passphrase)
6394 {
6395 	int pasn_groups[4] = { 0 };
6396 	size_t len;
6397 
6398 	if (!passphrase)
6399 		return;
6400 
6401 	len = os_strlen(passphrase);
6402 
6403 	if (pasn_type & 0xc && pasn_type & 0x3) {
6404 		pasn_groups[0] = 20;
6405 		pasn_groups[1] = 19;
6406 	} else if (pasn_type & 0xc) {
6407 		pasn_groups[0] = 20;
6408 	} else {
6409 		pasn_groups[0] = 19;
6410 	}
6411 	pasn->pt = sae_derive_pt(pasn_groups, (const u8 *) P2P_PAIRING_SSID,
6412 				 os_strlen(P2P_PAIRING_SSID),
6413 				 (const u8 *) passphrase, len, NULL);
6414 	/* Set passphrase for pairing responder to validate PASN auth 1 frame */
6415 	pasn->password = passphrase;
6416 }
6417 
6418 
p2p_pasn_initialize(struct p2p_data * p2p,struct p2p_device * dev,const u8 * addr,int freq,bool verify,bool derive_kek)6419 void p2p_pasn_initialize(struct p2p_data *p2p, struct p2p_device *dev,
6420 			 const u8 *addr, int freq, bool verify, bool derive_kek)
6421 {
6422 	struct pasn_data *pasn;
6423 	struct wpabuf *rsnxe;
6424 
6425 	if (!p2p || !dev)
6426 		return;
6427 
6428 	if (dev->pasn) {
6429 		wpa_pasn_reset(dev->pasn);
6430 	} else {
6431 		dev->pasn = pasn_data_init();
6432 		if (!dev->pasn)
6433 			return;
6434 	}
6435 
6436 	pasn = dev->pasn;
6437 
6438 	os_memcpy(pasn->own_addr, p2p->cfg->dev_addr, ETH_ALEN);
6439 	os_memcpy(pasn->peer_addr, addr, ETH_ALEN);
6440 
6441 	os_memcpy(pasn->bssid, dev->role == P2P_ROLE_PAIRING_INITIATOR ?
6442 		  pasn->peer_addr : pasn->own_addr, ETH_ALEN);
6443 
6444 	pasn->noauth = 1;
6445 
6446 	if ((p2p->cfg->pairing_config.pasn_type & 0xc) &&
6447 	    (dev->info.pairing_config.pasn_type & 0xc)) {
6448 		pasn->group = 20;
6449 		pasn->cipher = WPA_CIPHER_GCMP_256;
6450 		pasn->kek_len = 32;
6451 		pasn->derive_kek = true;
6452 	} else {
6453 		pasn->group = 19;
6454 		pasn->cipher = WPA_CIPHER_CCMP;
6455 		pasn->kek_len = 16;
6456 		pasn->derive_kek = true;
6457 	}
6458 
6459 	if (!derive_kek) {
6460 		pasn->derive_kek = false;
6461 		pasn->kek_len = 0;
6462 	}
6463 
6464 	if (dev->password[0]) {
6465 		pasn->akmp = WPA_KEY_MGMT_SAE;
6466 		p2p_pairing_set_password(pasn,
6467 					 p2p->cfg->pairing_config.pasn_type,
6468 					 dev->password);
6469 	} else if (verify) {
6470 		pasn->akmp = WPA_KEY_MGMT_SAE;
6471 	} else {
6472 		pasn->akmp = WPA_KEY_MGMT_PASN;
6473 	}
6474 
6475 	pasn->rsn_pairwise = pasn->cipher;
6476 	pasn->wpa_key_mgmt = pasn->akmp;
6477 
6478 	rsnxe = p2p_pairing_generate_rsnxe(p2p, pasn->akmp);
6479 	if (rsnxe) {
6480 		os_free(pasn->rsnxe_ie);
6481 		pasn->rsnxe_ie = os_memdup(wpabuf_head_u8(rsnxe),
6482 					   wpabuf_len(rsnxe));
6483 		if (!pasn->rsnxe_ie) {
6484 			wpabuf_free(rsnxe);
6485 			return;
6486 		}
6487 		wpabuf_free(rsnxe);
6488 	}
6489 
6490 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
6491 		pasn->pmksa = p2p->initiator_pmksa;
6492 	else
6493 		pasn->pmksa = p2p->responder_pmksa;
6494 
6495 	pasn->cb_ctx = p2p->cfg->cb_ctx;
6496 	pasn->send_mgmt = p2p->cfg->pasn_send_mgmt;
6497 	pasn->prepare_data_element = p2p->cfg->prepare_data_element;
6498 	pasn->parse_data_element = p2p->cfg->parse_data_element;
6499 	pasn->validate_custom_pmkid = p2p->cfg->pasn_validate_pmkid;
6500 
6501 	pasn->freq = freq;
6502 }
6503 
6504 
p2p_get_listen_freq(struct p2p_data * p2p,const u8 * peer_addr)6505 int p2p_get_listen_freq(struct p2p_data *p2p, const u8 *peer_addr)
6506 {
6507 	int freq;
6508 	struct p2p_device *dev;
6509 
6510 	if (!peer_addr) {
6511 		p2p_dbg(p2p, "Peer address NULL");
6512 		return -1;
6513 	}
6514 
6515 	dev = p2p_get_device(p2p, peer_addr);
6516 	if (!dev) {
6517 		p2p_dbg(p2p, "Peer not known");
6518 		return -1;
6519 	}
6520 
6521 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6522 	if (freq <= 0)
6523 		freq = dev->oob_go_neg_freq;
6524 	if (freq <= 0) {
6525 		p2p_dbg(p2p, "No listen/operating frequency known for the peer "
6526 			MACSTR, MAC2STR(dev->info.p2p_device_addr));
6527 		return -1;
6528 	}
6529 	return freq;
6530 }
6531 
6532 
p2p_initiate_pasn_verify(struct p2p_data * p2p,const u8 * peer_addr,int freq,enum p2p_invite_role role,const u8 * bssid,const u8 * ssid,size_t ssid_len,unsigned int force_freq,const u8 * go_dev_addr,unsigned int pref_freq)6533 int p2p_initiate_pasn_verify(struct p2p_data *p2p, const u8 *peer_addr,
6534 			     int freq, enum p2p_invite_role role,
6535 			     const u8 *bssid, const u8 *ssid, size_t ssid_len,
6536 			     unsigned int force_freq, const u8 *go_dev_addr,
6537 			     unsigned int pref_freq)
6538 {
6539 	struct pasn_data *pasn;
6540 	struct p2p_device *dev;
6541 	struct wpabuf *extra_ies, *req;
6542 	int ret = 0;
6543 	u8 *pasn_extra_ies = NULL;
6544 	u8 pmkid[PMKID_LEN];
6545 
6546 	if (!peer_addr) {
6547 		p2p_dbg(p2p, "Peer address NULL");
6548 		return -1;
6549 	}
6550 
6551 	dev = p2p_get_device(p2p, peer_addr);
6552 	if (!dev) {
6553 		p2p_dbg(p2p, "Peer not known");
6554 		return -1;
6555 	}
6556 
6557 	if (p2p_invite(p2p, peer_addr, role, bssid, ssid, ssid_len, force_freq,
6558 		       go_dev_addr, 1, pref_freq, -1, 1)) {
6559 		p2p_dbg(p2p, "p2p_invite() failed");
6560 		return -1;
6561 	}
6562 
6563 	dev->role = P2P_ROLE_PAIRING_INITIATOR;
6564 	p2p_pasn_initialize(p2p, dev, peer_addr, freq, true, true);
6565 	pasn = dev->pasn;
6566 
6567 	req = p2p_build_invitation_req(p2p, dev, go_dev_addr, -1);
6568 	if (!req)
6569 		return -1;
6570 
6571 	p2p_set_state(p2p, P2P_INVITE);
6572 	p2p->pending_action_state = P2P_PENDING_INVITATION_REQUEST;
6573 	p2p->invite_peer = dev;
6574 	dev->invitation_reqs++;
6575 
6576 	extra_ies = wpabuf_alloc(1500);
6577 	if (!extra_ies) {
6578 		wpabuf_free(req);
6579 		p2p_dbg(p2p, "Memory allocation failed for extra_ies");
6580 		return -1;
6581 	}
6582 
6583 	if (os_get_random(pmkid, PMKID_LEN) < 0) {
6584 		wpabuf_free(req);
6585 		wpabuf_free(extra_ies);
6586 		return -1;
6587 	}
6588 	wpa_hexdump(MSG_DEBUG,
6589 		    "P2P2: Use new random PMKID for pairing verification",
6590 		    pmkid, PMKID_LEN);
6591 	pasn_set_custom_pmkid(pasn, pmkid);
6592 
6593 	if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, true)) {
6594 		p2p_dbg(p2p, "Prepare PASN extra IEs failed");
6595 		ret = -1;
6596 		goto out;
6597 	}
6598 
6599 	extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6600 	if (!extra_ies)
6601 		goto out;
6602 
6603 	pasn_extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6604 				   wpabuf_len(extra_ies));
6605 	if (!pasn_extra_ies) {
6606 		p2p_dbg(p2p, "Memory allocation failed for PASN extra IEs");
6607 		ret = -1;
6608 		goto out;
6609 	}
6610 
6611 	pasn->extra_ies = pasn_extra_ies;
6612 	pasn->extra_ies_len = wpabuf_len(extra_ies);
6613 
6614 	/* Start PASN verify */
6615 	if (wpa_pasn_verify(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6616 			    pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6617 			    NULL, 0, NULL, 0, NULL)) {
6618 		p2p_dbg(p2p, "PASN verify failed");
6619 		ret = -1;
6620 	} else {
6621 		dev->flags |= P2P_DEV_WAIT_INV_REQ_ACK;
6622 	}
6623 out:
6624 	pasn->extra_ies = NULL;
6625 	pasn->extra_ies_len = 0;
6626 	os_free(pasn_extra_ies);
6627 	wpabuf_free(req);
6628 	wpabuf_free(extra_ies);
6629 	return ret;
6630 }
6631 
6632 
p2p_initiate_pasn_auth(struct p2p_data * p2p,const u8 * addr,int freq)6633 int p2p_initiate_pasn_auth(struct p2p_data *p2p, const u8 *addr, int freq)
6634 {
6635 	struct pasn_data *pasn;
6636 	struct p2p_device *dev;
6637 	struct wpabuf *extra_ies, *req;
6638 	u8 *ies = NULL;
6639 	int ret = 0;
6640 	size_t ies_len;
6641 
6642 	if (!addr) {
6643 		p2p_dbg(p2p, "Peer address NULL");
6644 		return -1;
6645 	}
6646 
6647 	dev = p2p_get_device(p2p, addr);
6648 	if (!dev) {
6649 		p2p_dbg(p2p, "Peer not known");
6650 		return -1;
6651 	}
6652 
6653 	if (freq == 0)
6654 		freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6655 
6656 	dev->role = P2P_ROLE_PAIRING_INITIATOR;
6657 	p2p_pasn_initialize(p2p, dev, addr, freq, false, true);
6658 	pasn = dev->pasn;
6659 
6660 	pasn_initiator_pmksa_cache_remove(pasn->pmksa, (u8 *)addr);
6661 
6662 	req = p2p_build_go_neg_req(p2p, dev);
6663 	if (!req)
6664 		return -1;
6665 
6666 	p2p->go_neg_peer = dev;
6667 	dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
6668 
6669 	extra_ies = wpabuf_alloc(1500);
6670 	if (!extra_ies) {
6671 		wpabuf_free(req);
6672 		return -1;
6673 	}
6674 
6675 	if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, false)) {
6676 		p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6677 		ret = -1;
6678 		goto out;
6679 	}
6680 
6681 	extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6682 	if (!extra_ies)
6683 		goto out;
6684 
6685 	ies_len = wpabuf_len(extra_ies);
6686 	ies = os_memdup(wpabuf_head_u8(extra_ies), ies_len);
6687 	if (!ies) {
6688 		ret = -1;
6689 		goto out;
6690 	}
6691 
6692 	pasn->extra_ies = ies;
6693 	pasn->extra_ies_len = ies_len;
6694 
6695 	/* Start PASN authentication */
6696 	if (wpas_pasn_start(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6697 			    pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6698 			    NULL, 0, NULL, 0, NULL)) {
6699 		p2p_dbg(p2p, "Failed to start PASN");
6700 		ret = -1;
6701 	}
6702 out:
6703 	os_free(ies);
6704 	pasn->extra_ies = NULL;
6705 	pasn->extra_ies_len = 0;
6706 	wpabuf_free(req);
6707 	wpabuf_free(extra_ies);
6708 	return ret;
6709 }
6710 
6711 
p2p_pasn_handle_action_wrapper(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq,int trans_seq)6712 static int p2p_pasn_handle_action_wrapper(struct p2p_data *p2p,
6713 					  struct p2p_device *dev,
6714 					  const struct ieee80211_mgmt *mgmt,
6715 					  size_t len, int freq, int trans_seq)
6716 {
6717 	const u8 *ies;
6718 	size_t ies_len;
6719 	size_t data_len = 0;
6720 	bool derive_kek;
6721 	const u8 *data = NULL;
6722 	struct p2p_message msg;
6723 	struct ieee802_11_elems elems;
6724 
6725 	ies = mgmt->u.auth.variable;
6726 	ies_len = len - offsetof(struct ieee80211_mgmt, u.auth.variable);
6727 
6728 	os_memset(&msg, 0, sizeof(msg));
6729 	if (p2p_parse_ies(ies, ies_len, &msg)) {
6730 		p2p_dbg(p2p,
6731 			"Failed to parse P2P IE from PASN Authentication frame");
6732 		p2p_parse_free(&msg);
6733 		return -1;
6734 	}
6735 
6736 	if (msg.action_frame_wrapper && msg.action_frame_wrapper_len) {
6737 		data = msg.action_frame_wrapper;
6738 		data_len = msg.action_frame_wrapper_len;
6739 		if (data_len >= 2 &&
6740 		    data[0] == WLAN_ACTION_PUBLIC &&
6741 		    data[1] == WLAN_PA_VENDOR_SPECIFIC) {
6742 			data += 2;
6743 			data_len -= 2;
6744 			if (data_len < 4 ||
6745 			    WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE) {
6746 				p2p_parse_free(&msg);
6747 				return -1;
6748 			}
6749 			data += 4;
6750 			data_len -= 4;
6751 		} else {
6752 			p2p_dbg(p2p,
6753 				"Invalid category in Action frame wrapper in Authentication frame seq %d",
6754 				trans_seq);
6755 			p2p_parse_free(&msg);
6756 			return -1;
6757 		}
6758 	}
6759 
6760 	if (trans_seq == 1) {
6761 		if (ieee802_11_parse_elems(mgmt->u.auth.variable,
6762 					   len - offsetof(struct ieee80211_mgmt,
6763 							  u.auth.variable),
6764 					   &elems, 0) == ParseFailed) {
6765 			wpa_printf(MSG_DEBUG,
6766 				   "PASN: Failed parsing Authentication frame");
6767 			return -1;
6768 		}
6769 		derive_kek = ieee802_11_rsnx_capab_len(
6770 			elems.rsnxe, elems.rsnxe_len,
6771 			WLAN_RSNX_CAPAB_KEK_IN_PASN);
6772 		if (data && data_len >= 1 && data[0] == P2P_INVITATION_REQ) {
6773 			struct wpabuf *resp;
6774 
6775 			resp = p2p_process_invitation_req(p2p, mgmt->sa,
6776 							  data + 1,
6777 							  data_len - 1, freq,
6778 							  true);
6779 			if (!resp)
6780 				p2p_dbg(p2p, "No Invitation Response found");
6781 
6782 			dev->role = P2P_ROLE_PAIRING_RESPONDER;
6783 			p2p_pasn_initialize(p2p, dev, mgmt->sa, freq, true,
6784 					    derive_kek);
6785 			wpabuf_free(dev->action_frame_wrapper);
6786 			dev->action_frame_wrapper = resp;
6787 			if (msg.dira && msg.dira_len &&
6788 			    p2p_validate_dira(p2p, dev, msg.dira,
6789 					      msg.dira_len)) {
6790 				struct wpa_ie_data rsn_data;
6791 
6792 				if (wpa_parse_wpa_ie_rsn(elems.rsn_ie - 2,
6793 							 elems.rsn_ie_len + 2,
6794 							 &rsn_data) == 0 &&
6795 				    rsn_data.num_pmkid)
6796 					pasn_set_custom_pmkid(dev->pasn,
6797 							      rsn_data.pmkid);
6798 			}
6799 		} else if (data && data_len >= 1 && data[0] == P2P_GO_NEG_REQ) {
6800 			struct wpabuf *resp;
6801 
6802 			if (!derive_kek) {
6803 				p2p_dbg(p2p, "KEK-in-PASN not set in RSNXE");
6804 				return -1;
6805 			}
6806 			resp = p2p_process_go_neg_req(p2p, mgmt->sa, data + 1,
6807 						      data_len - 1, freq, true);
6808 			if (!resp)
6809 				p2p_dbg(p2p,
6810 					"No GO Negotiation Response found");
6811 			wpabuf_free(dev->action_frame_wrapper);
6812 			dev->action_frame_wrapper = resp;
6813 		} else {
6814 			p2p_dbg(p2p, "Invalid action frame wrapper in Auth1");
6815 		}
6816 	} else if (trans_seq == 2) {
6817 		if (data && data_len >= 1 && data[0] == P2P_INVITATION_RESP) {
6818 			p2p_process_invitation_resp(p2p, mgmt->sa, data + 1,
6819 						    data_len - 1);
6820 			wpabuf_free(dev->action_frame_wrapper);
6821 			dev->action_frame_wrapper = NULL;
6822 		} else if (data && data_len >= 1 &&
6823 			   data[0] == P2P_GO_NEG_RESP) {
6824 			struct wpabuf *conf;
6825 
6826 			conf = p2p_process_go_neg_resp(p2p, mgmt->sa, data + 1,
6827 						       data_len - 1, freq,
6828 						       true);
6829 			if (!conf)
6830 				p2p_dbg(p2p, "No GO Negotiation Confirm found");
6831 			wpabuf_free(dev->action_frame_wrapper);
6832 			dev->action_frame_wrapper = conf;
6833 		} else {
6834 			p2p_dbg(p2p, "Invalid action frame wrapper in Auth2");
6835 		}
6836 	} else if (trans_seq == 3) {
6837 		if (data && data_len >= 1 && data[0] == P2P_GO_NEG_CONF)
6838 			p2p_handle_go_neg_conf(p2p, mgmt->sa, data + 1,
6839 					       data_len - 1, true);
6840 		else
6841 			p2p_invitation_resp_cb(p2p, mgmt->sa,
6842 					       P2P_SEND_ACTION_SUCCESS);
6843 	}
6844 	p2p_parse_free(&msg);
6845 	return 0;
6846 }
6847 
6848 
p2p_pasn_add_encrypted_data(struct p2p_data * p2p,struct p2p_device * dev,struct wpabuf * buf)6849 static int p2p_pasn_add_encrypted_data(struct p2p_data *p2p,
6850 				       struct p2p_device *dev,
6851 				       struct wpabuf *buf)
6852 {
6853 	struct pasn_data *pasn;
6854 	struct wpabuf *p2p2_ie;
6855 	u8 *dika_len, *p2p2_ie_len;
6856 	int ret;
6857 
6858 	if (!p2p || !dev || !dev->pasn)
6859 		return 0;
6860 
6861 	pasn = dev->pasn;
6862 
6863 	if (dev->req_bootstrap_method != P2P_PBMA_OPPORTUNISTIC &&
6864 	    !p2p->pairing_info->enable_pairing_cache)
6865 		return 0;
6866 
6867 	p2p2_ie = wpabuf_alloc(100);
6868 	if (!p2p2_ie)
6869 		return -1;
6870 
6871 	p2p2_ie_len = p2p_buf_add_p2p2_ie_hdr(p2p2_ie);
6872 
6873 	if (p2p->pairing_info->enable_pairing_cache) {
6874 		wpabuf_put_u8(p2p2_ie, P2P_ATTR_DEVICE_IDENTITY_KEY);
6875 		dika_len = wpabuf_put(p2p2_ie, 2);
6876 
6877 		wpabuf_put_u8(p2p2_ie,
6878 			      p2p->pairing_info->dev_ik.cipher_version);
6879 		wpabuf_put_data(p2p2_ie, p2p->pairing_info->dev_ik.dik_data,
6880 				p2p->pairing_info->dev_ik.dik_len);
6881 		wpabuf_put_be32(p2p2_ie, p2p->pairing_info->dev_ik.expiration);
6882 
6883 		WPA_PUT_LE16(dika_len,
6884 			     (u8 *) wpabuf_put(p2p2_ie, 0) - dika_len - 2);
6885 	}
6886 
6887 	if (dev->req_bootstrap_method == P2P_PBMA_OPPORTUNISTIC) {
6888 		if (!p2p->dev_sae_password[0]) {
6889 			int password_len;
6890 
6891 			/* SAE password is not available as the request is not
6892 			 * for an existing GO. Pick a random SAE password of
6893 			 * length between 10 and 20. */
6894 			password_len = 10 + os_random() % 10;
6895 			if (p2p_random(p2p->dev_sae_password,
6896 				       password_len) < 0) {
6897 				wpabuf_free(p2p2_ie);
6898 				return -1;
6899 			}
6900 			p2p->dev_sae_password[password_len] = '\0';
6901 		}
6902 
6903 		wpabuf_put_u8(p2p2_ie, P2P_ATTR_PASSWORD);
6904 		wpabuf_put_le16(p2p2_ie, os_strlen(p2p->dev_sae_password));
6905 		wpabuf_put_str(p2p2_ie, p2p->dev_sae_password);
6906 	}
6907 
6908 	p2p_buf_update_ie_hdr(p2p2_ie, p2p2_ie_len);
6909 
6910 	ret = pasn_add_encrypted_data(pasn, buf, wpabuf_mhead_u8(p2p2_ie),
6911 				      wpabuf_len(p2p2_ie));
6912 	wpabuf_free(p2p2_ie);
6913 	return ret;
6914 }
6915 
6916 
p2p_prepare_data_element(struct p2p_data * p2p,const u8 * peer_addr)6917 int p2p_prepare_data_element(struct p2p_data *p2p, const u8 *peer_addr)
6918 {
6919 	int ret = -1;
6920 	struct p2p_device *dev;
6921 	struct pasn_data *pasn;
6922 	struct wpabuf *extra_ies;
6923 
6924 	if (!p2p)
6925 		return -1;
6926 
6927 	dev = p2p_get_device(p2p, peer_addr);
6928 	if (!dev || !dev->pasn) {
6929 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
6930 			MAC2STR(peer_addr));
6931 		return -1;
6932 	}
6933 	pasn = dev->pasn;
6934 
6935 	extra_ies = wpabuf_alloc(1500);
6936 	if (!extra_ies ||
6937 	    p2p_prepare_pasn_extra_ie(p2p, extra_ies,
6938 				      dev->action_frame_wrapper, false)) {
6939 		p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6940 		goto out;
6941 	}
6942 
6943 	if (p2p_pasn_add_encrypted_data(p2p, dev, extra_ies) < 0)
6944 		p2p_dbg(p2p, "Failed to add PASN encrypted elements");
6945 
6946 	pasn->extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6947 				    wpabuf_len(extra_ies));
6948 	if (!pasn->extra_ies)
6949 		goto out;
6950 	pasn->extra_ies_len = wpabuf_len(extra_ies);
6951 	ret = 0;
6952 
6953 out:
6954 	wpabuf_free(extra_ies);
6955 	wpabuf_free(dev->action_frame_wrapper);
6956 	dev->action_frame_wrapper = NULL;
6957 
6958 	return ret;
6959 }
6960 
6961 
p2p_parse_data_element(struct p2p_data * p2p,const u8 * data,size_t len)6962 int p2p_parse_data_element(struct p2p_data *p2p, const u8 *data, size_t len)
6963 {
6964 	u8 attr_id;
6965 	const u8 *pos, *next;
6966 	u16 rem_len, attr_len;
6967 
6968 	if (!p2p || !data || !len)
6969 		return -1;
6970 
6971 	pos = data;
6972 	rem_len = len;
6973 
6974 	if (rem_len < 6 ||
6975 	    pos[0] != WLAN_EID_VENDOR_SPECIFIC ||
6976 	    pos[1] < 4 ||
6977 	    rem_len < 2 + pos[1] ||
6978 	    WPA_GET_BE32(&pos[2]) != P2P2_IE_VENDOR_TYPE) {
6979 		p2p_dbg(p2p,
6980 			"P2P: P2P2 IE not present in PASN Encrypted Data element");
6981 		return -1;
6982 	}
6983 
6984 	pos += 6;
6985 	rem_len -= 6;
6986 
6987 	while (rem_len >= 3) {
6988 		attr_id = *pos++;
6989 		attr_len = WPA_GET_LE16(pos);
6990 		pos += 2;
6991 		rem_len -= 3;
6992 		if (rem_len < attr_len)
6993 			return -1;
6994 		next = pos + attr_len;
6995 		rem_len -= attr_len;
6996 
6997 		switch (attr_id) {
6998 		case P2P_ATTR_DEVICE_IDENTITY_KEY:
6999 			if (attr_len < 1) {
7000 				p2p_dbg(p2p,
7001 					"Too short Device Identity Key attribute");
7002 				return -1;
7003 			}
7004 			p2p->dik_cipher_version = *pos++;
7005 			attr_len--;
7006 			if (p2p->dik_cipher_version ==
7007 			    DIRA_CIPHER_VERSION_128) {
7008 				if (attr_len < DEVICE_IDENTITY_KEY_LEN) {
7009 					p2p_dbg(p2p, "Too short DevIK");
7010 					return -1;
7011 				}
7012 				os_memcpy(p2p->peer_dik_data, pos,
7013 					  DEVICE_IDENTITY_KEY_LEN);
7014 				p2p->peer_dik_len = DEVICE_IDENTITY_KEY_LEN;
7015 				pos += DEVICE_IDENTITY_KEY_LEN;
7016 				attr_len -= DEVICE_IDENTITY_KEY_LEN;
7017 			} else {
7018 				p2p_dbg(p2p,
7019 					"Unsupported cipher version %u in Device Identity Key attribute",
7020 					p2p->dik_cipher_version);
7021 				return -1;
7022 			}
7023 			if (attr_len < 4) {
7024 				p2p_dbg(p2p,
7025 					"Not enough room for DevIK lifetime");
7026 				return -1;
7027 			}
7028 			p2p->peer_dik_lifetime = WPA_GET_BE32(pos);
7029 			p2p_dbg(p2p,
7030 				"Received peer DevIK of length %zu octets and lifetime %u",
7031 				p2p->peer_dik_len, p2p->peer_dik_lifetime);
7032 			break;
7033 		case P2P_ATTR_PASSWORD:
7034 			if (attr_len < 1 ||
7035 			    attr_len > sizeof(p2p->peer_sae_password) - 1) {
7036 				p2p_dbg(p2p,
7037 					"P2P: Invalid password length %d",
7038 					attr_len);
7039 				return -1;
7040 			}
7041 			os_memset(p2p->peer_sae_password, 0,
7042 				  sizeof(p2p->peer_sae_password));
7043 			os_memcpy(p2p->peer_sae_password, pos, attr_len);
7044 			break;
7045 		default:
7046 			p2p_dbg(p2p,
7047 				"Unsupported Attribute ID %u in P2P2 IE in PASN Encrypted Data element",
7048 				attr_id);
7049 			break;
7050 		}
7051 		pos = next;
7052 	}
7053 
7054 	return 0;
7055 }
7056 
7057 
p2p_validate_custom_pmkid(struct p2p_data * p2p,struct p2p_device * dev,const u8 * pmkid)7058 static int p2p_validate_custom_pmkid(struct p2p_data *p2p,
7059 				     struct p2p_device *dev, const u8 *pmkid)
7060 {
7061 	if (dev->pasn->custom_pmkid_valid &&
7062 	    os_memcmp(dev->pasn->custom_pmkid, pmkid, PMKID_LEN) == 0) {
7063 		p2p_dbg(p2p, "Customized PMKID valid");
7064 		return 0;
7065 	}
7066 	return -1;
7067 }
7068 
7069 
p2p_pasn_pmksa_get_pmk(struct p2p_data * p2p,const u8 * addr,u8 * pmkid,u8 * pmk,size_t * pmk_len)7070 static int p2p_pasn_pmksa_get_pmk(struct p2p_data *p2p, const u8 *addr,
7071 				  u8 *pmkid, u8 *pmk, size_t *pmk_len)
7072 {
7073 	struct p2p_device *dev;
7074 
7075 	dev = p2p_get_device(p2p, addr);
7076 	if (!dev) {
7077 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR, MAC2STR(addr));
7078 		return -1;
7079 	}
7080 
7081 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
7082 		return pasn_initiator_pmksa_cache_get(p2p->initiator_pmksa,
7083 						      addr, pmkid, pmk,
7084 						      pmk_len);
7085 	else
7086 		return pasn_responder_pmksa_cache_get(p2p->responder_pmksa,
7087 						      addr, pmkid, pmk,
7088 						      pmk_len);
7089 }
7090 
7091 
p2p_pasn_validate_and_update_pmkid(struct p2p_data * p2p,const u8 * addr,const u8 * rsn_pmkid)7092 int p2p_pasn_validate_and_update_pmkid(struct p2p_data *p2p, const u8 *addr,
7093 				       const u8 *rsn_pmkid)
7094 {
7095 	size_t pmk_len;
7096 	u8 pmkid[PMKID_LEN];
7097 	u8 pmk[PMK_LEN_MAX];
7098 	struct p2p_device *dev;
7099 
7100 	if (!p2p)
7101 		return -1;
7102 
7103 	dev = p2p_get_device(p2p, addr);
7104 	if (!dev || !dev->pasn) {
7105 		p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7106 			MAC2STR(addr));
7107 		return -1;
7108 	}
7109 
7110 	if (p2p_validate_custom_pmkid(p2p, dev, rsn_pmkid))
7111 		return -1;
7112 
7113 	if (p2p_pasn_pmksa_get_pmk(p2p, addr, pmkid, pmk, &pmk_len)) {
7114 		p2p_dbg(p2p, "P2P PASN: Failed to get PMK from cache");
7115 		return -1;
7116 	}
7117 
7118 	p2p_pasn_pmksa_set_pmk(p2p, p2p->cfg->dev_addr, addr, pmk, pmk_len,
7119 			       rsn_pmkid);
7120 	return 0;
7121 }
7122 
7123 
p2p_pasn_auth_tx_status(struct p2p_data * p2p,const u8 * data,size_t data_len,bool acked,bool verify)7124 int p2p_pasn_auth_tx_status(struct p2p_data *p2p, const u8 *data,
7125 			    size_t data_len, bool acked, bool verify)
7126 {
7127 	int ret = 0;
7128 	struct p2p_device *dev;
7129 	struct pasn_data *pasn;
7130 	const struct ieee80211_mgmt *mgmt =
7131 		(const struct ieee80211_mgmt *) data;
7132 
7133 	if (!p2p)
7134 		return -1;
7135 
7136 	dev = p2p_get_device(p2p, mgmt->da);
7137 	if (!dev || !dev->pasn) {
7138 		p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7139 			MAC2STR(mgmt->da));
7140 		return -1;
7141 	}
7142 
7143 	pasn = dev->pasn;
7144 
7145 	ret = wpa_pasn_auth_tx_status(pasn, data, data_len, acked);
7146 	if (ret != 1 && !acked && pasn->frame)
7147 		return pasn->send_mgmt(pasn->cb_ctx, wpabuf_head(pasn->frame),
7148 				       wpabuf_len(pasn->frame), 0, pasn->freq,
7149 				       1000);
7150 
7151 	wpabuf_free(pasn->frame);
7152 	pasn->frame = NULL;
7153 
7154 	if (ret != 1)
7155 		return ret;
7156 
7157 	if (verify && dev == p2p->invite_peer)
7158 		p2p_start_invitation_connect(p2p, dev);
7159 	else if (dev == p2p->go_neg_peer)
7160 		p2p_go_complete(p2p, dev);
7161 
7162 	return 0;
7163 }
7164 
7165 
p2p_handle_pasn_auth(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7166 static int p2p_handle_pasn_auth(struct p2p_data *p2p, struct p2p_device *dev,
7167 				const struct ieee80211_mgmt *mgmt, size_t len,
7168 				int freq)
7169 {
7170 	struct pasn_data *pasn;
7171 	u8 pasn_type;
7172 	int pasn_groups[4] = { 0 };
7173 	u16 auth_alg, auth_transaction, status_code;
7174 
7175 	if (!p2p || !dev || !dev->pasn)
7176 		return -1;
7177 
7178 	if (os_memcmp(mgmt->da, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
7179 		p2p_dbg(p2p, "PASN Responder: Not our frame");
7180 		return -1;
7181 	}
7182 
7183 	if (len < offsetof(struct ieee80211_mgmt, u.auth.variable))
7184 		return -1;
7185 
7186 	pasn = dev->pasn;
7187 	auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
7188 	status_code = le_to_host16(mgmt->u.auth.status_code);
7189 
7190 	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7191 
7192 	if (status_code != WLAN_STATUS_SUCCESS &&
7193 	    status_code != WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) {
7194 		p2p_dbg(p2p, "PASN: Authentication rejected - status=%u",
7195 			status_code);
7196 		return -1;
7197 	}
7198 
7199 	if (auth_alg != WLAN_AUTH_PASN || auth_transaction == 2) {
7200 		p2p_dbg(p2p,
7201 			"PASN Responder: Not a PASN frame or unexpected Authentication frame, auth_alg=%d",
7202 			auth_alg);
7203 		return -1;
7204 	}
7205 	if (auth_transaction == 1) {
7206 		pasn_type = p2p->cfg->pairing_config.pasn_type;
7207 		if (pasn_type & 0xc && pasn_type & 0x3) {
7208 			pasn_groups[0] = 20;
7209 			pasn_groups[1] = 19;
7210 		} else if (pasn_type & 0xc) {
7211 			pasn_groups[0] = 20;
7212 		} else {
7213 			pasn_groups[0] = 19;
7214 		}
7215 		pasn->pasn_groups = pasn_groups;
7216 
7217 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7218 						   auth_transaction)) {
7219 			p2p_dbg(p2p,
7220 				"PASN Responder: Handle Auth 1 action wrapper failed");
7221 			return -1;
7222 		}
7223 		if (handle_auth_pasn_1(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7224 				       len, false) < 0) {
7225 			p2p_dbg(p2p,
7226 				"PASN Responder: Handle Auth 1 failed");
7227 			return -1;
7228 		}
7229 	} else if (auth_transaction == 3) {
7230 		if (handle_auth_pasn_3(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7231 				       len) < 0) {
7232 			p2p_dbg(p2p,
7233 				"PASN Responder: Handle Auth 3 failed");
7234 			return -1;
7235 		}
7236 #ifdef CONFIG_TESTING_OPTIONS
7237 		p2p_pasn_store_ptk(p2p, &pasn->ptk);
7238 #endif /* CONFIG_TESTING_OPTIONS */
7239 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7240 						   auth_transaction)) {
7241 			p2p_dbg(p2p,
7242 				"PASN Responder: Handle Auth 3 action wrapper failed");
7243 			/* Drop keying material from a failed pairing attempt */
7244 			os_memset(p2p->peer_dik_data, 0,
7245 				  sizeof(p2p->peer_dik_data));
7246 			os_memset(p2p->peer_sae_password, 0,
7247 				  sizeof(p2p->peer_sae_password));
7248 			return -1;
7249 		}
7250 		forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7251 	}
7252 	return 0;
7253 }
7254 
7255 
p2p_pasn_auth_rx(struct p2p_data * p2p,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7256 int p2p_pasn_auth_rx(struct p2p_data *p2p, const struct ieee80211_mgmt *mgmt,
7257 		     size_t len, int freq)
7258 {
7259 	int ret = 0;
7260 	u8 auth_transaction;
7261 	struct p2p_device *dev;
7262 	struct pasn_data *pasn;
7263 	struct wpa_pasn_params_data pasn_data;
7264 
7265 	dev = p2p_get_device(p2p, mgmt->sa);
7266 	if (!dev) {
7267 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
7268 			MAC2STR(mgmt->sa));
7269 		return -1;
7270 	}
7271 
7272 	if (!dev->pasn) {
7273 		p2p_dbg(p2p, "PASN: Uninitialized");
7274 		return -1;
7275 	}
7276 
7277 	pasn = dev->pasn;
7278 
7279 	wpabuf_free(pasn->frame);
7280 	pasn->frame = NULL;
7281 
7282 	pasn_register_callbacks(pasn, p2p->cfg->cb_ctx,
7283 				p2p->cfg->pasn_send_mgmt,
7284 				p2p->cfg->pasn_validate_pmkid);
7285 	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7286 
7287 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR && auth_transaction == 2) {
7288 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7289 						   auth_transaction)) {
7290 			p2p_dbg(p2p,
7291 				"PASN Initiator: Handle Auth 2 action wrapper failed");
7292 			return -1;
7293 		}
7294 		ret = wpa_pasn_auth_rx(pasn, (const u8 *) mgmt, len,
7295 				       &pasn_data);
7296 		if (ret < 0) {
7297 			p2p_dbg(p2p, "PASN: wpa_pasn_auth_rx() failed");
7298 			dev->role = P2P_ROLE_IDLE;
7299 		}
7300 #ifdef CONFIG_TESTING_OPTIONS
7301 		p2p_pasn_store_ptk(p2p, &pasn->ptk);
7302 #endif /* CONFIG_TESTING_OPTIONS */
7303 		forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7304 	} else {
7305 		ret = p2p_handle_pasn_auth(p2p, dev, mgmt, len, freq);
7306 	}
7307 	return ret;
7308 }
7309 
7310 
p2p_pasn_pmksa_set_pmk(struct p2p_data * p2p,const u8 * src,const u8 * dst,const u8 * pmk,size_t pmk_len,const u8 * pmkid)7311 void p2p_pasn_pmksa_set_pmk(struct p2p_data *p2p, const u8 *src, const u8 *dst,
7312 			    const u8 *pmk, size_t pmk_len, const u8 *pmkid)
7313 {
7314 	pasn_initiator_pmksa_cache_add(p2p->initiator_pmksa, src, dst, pmk,
7315 				       pmk_len, pmkid);
7316 	pasn_responder_pmksa_cache_add(p2p->responder_pmksa, src, dst, pmk,
7317 				       pmk_len, pmkid);
7318 }
7319 
7320 
7321 #ifdef CONFIG_TESTING_OPTIONS
7322 
p2p_pasn_store_ptk(struct p2p_data * p2p,struct wpa_ptk * ptk)7323 void p2p_pasn_store_ptk(struct p2p_data *p2p, struct wpa_ptk *ptk)
7324 {
7325 	u8 *pos;
7326 
7327 	if (ptk->ptk_len > sizeof(p2p->pasn_ptk)) {
7328 		p2p_dbg(p2p, "P2P PASN PTK exceeds: (len=%ld)", ptk->ptk_len);
7329 		return;
7330 	}
7331 
7332 	pos = p2p->pasn_ptk;
7333 	p2p->pasn_ptk_len = ptk->ptk_len;
7334 	if (ptk->kck_len) {
7335 		os_memcpy(pos, ptk->kck, ptk->kck_len);
7336 		pos += ptk->kck_len;
7337 	}
7338 	if (ptk->kek_len) {
7339 		os_memcpy(pos, ptk->kek, ptk->kek_len);
7340 		pos += ptk->kek_len;
7341 	}
7342 	if (ptk->tk_len) {
7343 		os_memcpy(pos, ptk->tk, ptk->tk_len);
7344 		pos += ptk->tk_len;
7345 	}
7346 	if (ptk->kdk_len) {
7347 		os_memcpy(pos, ptk->kdk, ptk->kdk_len);
7348 		pos += ptk->kdk_len;
7349 	}
7350 }
7351 
7352 
p2p_pasn_get_ptk(struct p2p_data * p2p,const u8 ** buf,size_t * buf_len)7353 int p2p_pasn_get_ptk(struct p2p_data *p2p, const u8 **buf, size_t *buf_len)
7354 {
7355 	if (!p2p || !p2p->pasn_ptk_len)
7356 		return -1;
7357 
7358 	*buf_len = p2p->pasn_ptk_len;
7359 	*buf = p2p->pasn_ptk;
7360 	return 0;
7361 }
7362 
7363 #endif /* CONFIG_TESTING_OPTIONS */
7364 
7365 #endif /* CONFIG_PASN */
7366 
7367 
p2p_get_dira_info(struct p2p_data * p2p,char * buf,size_t buflen)7368 int p2p_get_dira_info(struct p2p_data *p2p, char *buf, size_t buflen)
7369 {
7370 	int res;
7371 	char *pos, *end;
7372 	struct p2p_id_key *dev_ik;
7373 
7374 	if (!p2p->pairing_info ||
7375 	    !p2p->cfg->pairing_config.pairing_capable ||
7376 	    !p2p->cfg->pairing_config.enable_pairing_cache)
7377 		return 0;
7378 
7379 	if (p2p_derive_nonce_tag(p2p))
7380 		return 0;
7381 
7382 	pos = buf;
7383 	end = buf + buflen;
7384 	dev_ik = &p2p->pairing_info->dev_ik;
7385 
7386 	res = os_snprintf(pos, end - pos, MACSTR,
7387 			  MAC2STR(p2p->cfg->dev_addr));
7388 	if (os_snprintf_error(end - pos, res))
7389 		return pos - buf;
7390 	pos += res;
7391 
7392 	res = os_snprintf(pos, end - pos, " ");
7393 	if (os_snprintf_error(end - pos, res))
7394 		return pos - buf;
7395 	pos += res;
7396 
7397 	pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_nonce,
7398 				dev_ik->dira_nonce_len);
7399 
7400 	res = os_snprintf(pos, end - pos, " ");
7401 	if (os_snprintf_error(end - pos, res))
7402 		return pos - buf;
7403 	pos += res;
7404 
7405 	pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_tag,
7406 				dev_ik->dira_tag_len);
7407 
7408 	res = os_snprintf(pos, end - pos, "\n");
7409 	if (os_snprintf_error(end - pos, res))
7410 		return pos - buf;
7411 	pos += res;
7412 
7413 	return pos - buf;
7414 }
7415