• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Wi-Fi Direct - P2P Group Owner Negotiation
3  * Copyright (c) 2009-2010, Atheros Communications
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "wps/wps_defs.h"
14 #include "p2p_i.h"
15 #include "p2p.h"
16 
17 
p2p_go_det(u8 own_intent,u8 peer_value)18 static int p2p_go_det(u8 own_intent, u8 peer_value)
19 {
20 	u8 peer_intent = peer_value >> 1;
21 	if (own_intent == peer_intent) {
22 		if (own_intent == P2P_MAX_GO_INTENT)
23 			return -1; /* both devices want to become GO */
24 
25 		/* Use tie breaker bit to determine GO */
26 		return (peer_value & 0x01) ? 0 : 1;
27 	}
28 
29 	return own_intent > peer_intent;
30 }
31 
32 
p2p_peer_channels_check(struct p2p_data * p2p,struct p2p_channels * own,struct p2p_device * dev,const u8 * channel_list,size_t channel_list_len)33 int p2p_peer_channels_check(struct p2p_data *p2p, struct p2p_channels *own,
34 			    struct p2p_device *dev,
35 			    const u8 *channel_list, size_t channel_list_len)
36 {
37 	const u8 *pos, *end;
38 	struct p2p_channels *ch;
39 	size_t channels;
40 	struct p2p_channels intersection;
41 
42 	ch = &dev->channels;
43 	os_memset(ch, 0, sizeof(*ch));
44 	pos = channel_list;
45 	end = channel_list + channel_list_len;
46 
47 	if (end - pos < 3)
48 		return -1;
49 	os_memcpy(dev->country, pos, 3);
50 	wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
51 	if (pos[2] != 0x04 && os_memcmp(pos, p2p->cfg->country, 2) != 0) {
52 		wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
53 			"P2P: Mismatching country (ours=%c%c peer's=%c%c)",
54 			p2p->cfg->country[0], p2p->cfg->country[1],
55 			pos[0], pos[1]);
56 		return -1;
57 	}
58 	pos += 3;
59 
60 	while (pos + 2 < end) {
61 		struct p2p_reg_class *cl = &ch->reg_class[ch->reg_classes];
62 		cl->reg_class = *pos++;
63 		if (pos + 1 + pos[0] > end) {
64 			wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
65 				"P2P: Invalid peer Channel List");
66 			return -1;
67 		}
68 		channels = *pos++;
69 		cl->channels = channels > P2P_MAX_REG_CLASS_CHANNELS ?
70 			P2P_MAX_REG_CLASS_CHANNELS : channels;
71 		os_memcpy(cl->channel, pos, cl->channels);
72 		pos += channels;
73 		ch->reg_classes++;
74 		if (ch->reg_classes == P2P_MAX_REG_CLASSES)
75 			break;
76 	}
77 
78 	p2p_channels_intersect(own, &dev->channels, &intersection);
79 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d "
80 		"peer reg_classes %d intersection reg_classes %d",
81 		(int) own->reg_classes,
82 		(int) dev->channels.reg_classes,
83 		(int) intersection.reg_classes);
84 	if (intersection.reg_classes == 0) {
85 		wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
86 			"P2P: No common channels found");
87 		return -1;
88 	}
89 	return 0;
90 }
91 
92 
p2p_peer_channels(struct p2p_data * p2p,struct p2p_device * dev,const u8 * channel_list,size_t channel_list_len)93 static int p2p_peer_channels(struct p2p_data *p2p, struct p2p_device *dev,
94 			     const u8 *channel_list, size_t channel_list_len)
95 {
96 	return p2p_peer_channels_check(p2p, &p2p->channels, dev,
97 				       channel_list, channel_list_len);
98 }
99 
100 
p2p_wps_method_pw_id(enum p2p_wps_method wps_method)101 static u16 p2p_wps_method_pw_id(enum p2p_wps_method wps_method)
102 {
103 	switch (wps_method) {
104 	case WPS_PIN_DISPLAY:
105 		return DEV_PW_REGISTRAR_SPECIFIED;
106 	case WPS_PIN_KEYPAD:
107 		return DEV_PW_USER_SPECIFIED;
108 	case WPS_PBC:
109 		return DEV_PW_PUSHBUTTON;
110 	default:
111 		return DEV_PW_DEFAULT;
112 	}
113 }
114 
115 
p2p_wps_method_str(enum p2p_wps_method wps_method)116 static const char * p2p_wps_method_str(enum p2p_wps_method wps_method)
117 {
118 	switch (wps_method) {
119 	case WPS_PIN_DISPLAY:
120 		return "Display";
121 	case WPS_PIN_KEYPAD:
122 		return "Keypad";
123 	case WPS_PBC:
124 		return "PBC";
125 	default:
126 		return "??";
127 	}
128 }
129 
130 
p2p_build_go_neg_req(struct p2p_data * p2p,struct p2p_device * peer)131 static struct wpabuf * p2p_build_go_neg_req(struct p2p_data *p2p,
132 					    struct p2p_device *peer)
133 {
134 	struct wpabuf *buf;
135 	u8 *len;
136 	u8 group_capab;
137 
138 	buf = wpabuf_alloc(1000);
139 	if (buf == NULL)
140 		return NULL;
141 
142 	peer->dialog_token++;
143 	if (peer->dialog_token == 0)
144 		peer->dialog_token = 1;
145 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
146 
147 	len = p2p_buf_add_ie_hdr(buf);
148 	group_capab = 0;
149 	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
150 		group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
151 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
152 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_RECONN;
153 	}
154 	if (p2p->cross_connect)
155 		group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
156 	if (p2p->cfg->p2p_intra_bss)
157 		group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
158 	p2p_buf_add_capability(buf, p2p->dev_capab, group_capab);
159 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) |
160 			      p2p->next_tie_breaker);
161 	p2p->next_tie_breaker = !p2p->next_tie_breaker;
162 	p2p_buf_add_config_timeout(buf, 100, 20);
163 	p2p_buf_add_listen_channel(buf, p2p->cfg->country, p2p->cfg->reg_class,
164 				   p2p->cfg->channel);
165 	if (p2p->ext_listen_interval)
166 		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
167 					      p2p->ext_listen_interval);
168 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
169 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &p2p->channels);
170 	p2p_buf_add_device_info(buf, p2p, peer);
171 	p2p_buf_add_operating_channel(buf, p2p->cfg->country,
172 				      p2p->op_reg_class, p2p->op_channel);
173 	p2p_buf_update_ie_hdr(buf, len);
174 
175 	/* WPS IE with Device Password ID attribute */
176 	p2p_build_wps_ie(p2p, buf, p2p_wps_method_pw_id(peer->wps_method), 0);
177 
178 	return buf;
179 }
180 
181 
p2p_connect_send(struct p2p_data * p2p,struct p2p_device * dev)182 int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev)
183 {
184 	struct wpabuf *req;
185 	int freq;
186 
187 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
188 	if (freq <= 0) {
189 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
190 			"P2P: No Listen/Operating frequency known for the "
191 			"peer " MACSTR " to send GO Negotiation Request",
192 			MAC2STR(dev->info.p2p_device_addr));
193 		return -1;
194 	}
195 
196 	req = p2p_build_go_neg_req(p2p, dev);
197 	if (req == NULL)
198 		return -1;
199 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
200 		"P2P: Sending GO Negotiation Request");
201 	p2p_set_state(p2p, P2P_CONNECT);
202 	p2p->pending_action_state = P2P_PENDING_GO_NEG_REQUEST;
203 	p2p->go_neg_peer = dev;
204 	dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
205 	dev->connect_reqs++;
206 #ifdef ANDROID_P2P
207 	dev->go_neg_req_sent++;
208 #endif
209 	if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
210 			    p2p->cfg->dev_addr, dev->info.p2p_device_addr,
211 			    wpabuf_head(req), wpabuf_len(req), 200) < 0) {
212 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
213 			"P2P: Failed to send Action frame");
214 		/* Use P2P find to recover and retry */
215 		p2p_set_timeout(p2p, 0, 0);
216 	}
217 
218 	wpabuf_free(req);
219 
220 	return 0;
221 }
222 
223 
p2p_build_go_neg_resp(struct p2p_data * p2p,struct p2p_device * peer,u8 dialog_token,u8 status,u8 tie_breaker)224 static struct wpabuf * p2p_build_go_neg_resp(struct p2p_data *p2p,
225 					     struct p2p_device *peer,
226 					     u8 dialog_token, u8 status,
227 					     u8 tie_breaker)
228 {
229 	struct wpabuf *buf;
230 	u8 *len;
231 	u8 group_capab;
232 
233 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
234 		"P2P: Building GO Negotiation Response");
235 	buf = wpabuf_alloc(1000);
236 	if (buf == NULL)
237 		return NULL;
238 
239 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_RESP, dialog_token);
240 
241 	len = p2p_buf_add_ie_hdr(buf);
242 	p2p_buf_add_status(buf, status);
243 	group_capab = 0;
244 	if (peer && peer->go_state == LOCAL_GO) {
245 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
246 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
247 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
248 				group_capab |=
249 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
250 		}
251 		if (p2p->cross_connect)
252 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
253 		if (p2p->cfg->p2p_intra_bss)
254 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
255 	}
256 	p2p_buf_add_capability(buf, p2p->dev_capab, group_capab);
257 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | tie_breaker);
258 	p2p_buf_add_config_timeout(buf, 100, 20);
259 	if (peer && peer->go_state == REMOTE_GO) {
260 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating "
261 			"Channel attribute");
262 	} else {
263 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
264 					      p2p->op_reg_class,
265 					      p2p->op_channel);
266 	}
267 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
268 	if (status || peer == NULL) {
269 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
270 					 &p2p->channels);
271 	} else if (peer->go_state == REMOTE_GO) {
272 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
273 					 &p2p->channels);
274 	} else {
275 		struct p2p_channels res;
276 		p2p_channels_intersect(&p2p->channels, &peer->channels,
277 				       &res);
278 		p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
279 	}
280 	p2p_buf_add_device_info(buf, p2p, peer);
281 	if (peer && peer->go_state == LOCAL_GO) {
282 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
283 				     p2p->ssid_len);
284 	}
285 	p2p_buf_update_ie_hdr(buf, len);
286 
287 	/* WPS IE with Device Password ID attribute */
288 	p2p_build_wps_ie(p2p, buf,
289 			 p2p_wps_method_pw_id(peer ? peer->wps_method :
290 					      WPS_NOT_READY), 0);
291 
292 	return buf;
293 }
294 
295 
p2p_reselect_channel(struct p2p_data * p2p,struct p2p_channels * intersection)296 static void p2p_reselect_channel(struct p2p_data *p2p,
297 				 struct p2p_channels *intersection)
298 {
299 	struct p2p_reg_class *cl;
300 	int freq;
301 	u8 op_reg_class, op_channel;
302 
303 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Selected operating "
304 		"channel (reg_class %u channel %u) not acceptable to the "
305 		"peer", p2p->op_reg_class, p2p->op_channel);
306 
307 	/* First, try to pick the best channel from another band */
308 	freq = p2p_channel_to_freq(p2p->cfg->country, p2p->op_reg_class,
309 				   p2p->op_channel);
310 	if (freq >= 2400 && freq < 2500 && p2p->best_freq_5 > 0 &&
311 	    p2p_freq_to_channel(p2p->cfg->country, p2p->best_freq_5,
312 				&op_reg_class, &op_channel) == 0 &&
313 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
314 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 5 GHz "
315 			"channel (reg_class %u channel %u) from intersection",
316 			op_reg_class, op_channel);
317 		p2p->op_reg_class = op_reg_class;
318 		p2p->op_channel = op_channel;
319 		return;
320 	}
321 
322 	if (freq >= 4900 && freq < 6000 && p2p->best_freq_24 > 0 &&
323 	    p2p_freq_to_channel(p2p->cfg->country, p2p->best_freq_24,
324 				&op_reg_class, &op_channel) == 0 &&
325 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
326 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 2.4 GHz "
327 			"channel (reg_class %u channel %u) from intersection",
328 			op_reg_class, op_channel);
329 		p2p->op_reg_class = op_reg_class;
330 		p2p->op_channel = op_channel;
331 		return;
332 	}
333 
334 	/*
335 	 * Fall back to whatever is included in the channel intersection since
336 	 * no better options seems to be available.
337 	 */
338 	cl = &intersection->reg_class[0];
339 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick another channel "
340 		"(reg_class %u channel %u) from intersection",
341 		cl->reg_class, cl->channel[0]);
342 	p2p->op_reg_class = cl->reg_class;
343 	p2p->op_channel = cl->channel[0];
344 }
345 
346 
p2p_process_go_neg_req(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)347 void p2p_process_go_neg_req(struct p2p_data *p2p, const u8 *sa,
348 			    const u8 *data, size_t len, int rx_freq)
349 {
350 	struct p2p_device *dev = NULL;
351 	struct wpabuf *resp;
352 	struct p2p_message msg;
353 	u8 status = P2P_SC_FAIL_INVALID_PARAMS;
354 	int tie_breaker = 0;
355 	int freq;
356 
357 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
358 		"P2P: Received GO Negotiation Request from " MACSTR
359 		"(freq=%d)", MAC2STR(sa), rx_freq);
360 
361 	if (p2p_parse(data, len, &msg))
362 		return;
363 
364 	if (!msg.capability) {
365 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
366 			"P2P: Mandatory Capability attribute missing from GO "
367 			"Negotiation Request");
368 #ifdef CONFIG_P2P_STRICT
369 		goto fail;
370 #endif /* CONFIG_P2P_STRICT */
371 	}
372 
373 	if (msg.go_intent)
374 		tie_breaker = *msg.go_intent & 0x01;
375 	else {
376 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
377 			"P2P: Mandatory GO Intent attribute missing from GO "
378 			"Negotiation Request");
379 #ifdef CONFIG_P2P_STRICT
380 		goto fail;
381 #endif /* CONFIG_P2P_STRICT */
382 	}
383 
384 	if (!msg.config_timeout) {
385 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
386 			"P2P: Mandatory Configuration Timeout attribute "
387 			"missing from GO Negotiation Request");
388 #ifdef CONFIG_P2P_STRICT
389 		goto fail;
390 #endif /* CONFIG_P2P_STRICT */
391 	}
392 
393 	if (!msg.listen_channel) {
394 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
395 			"P2P: No Listen Channel attribute received");
396 		goto fail;
397 	}
398 	if (!msg.operating_channel) {
399 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
400 			"P2P: No Operating Channel attribute received");
401 		goto fail;
402 	}
403 	if (!msg.channel_list) {
404 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
405 			"P2P: No Channel List attribute received");
406 		goto fail;
407 	}
408 	if (!msg.intended_addr) {
409 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
410 			"P2P: No Intended P2P Interface Address attribute "
411 			"received");
412 		goto fail;
413 	}
414 	if (!msg.p2p_device_info) {
415 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
416 			"P2P: No P2P Device Info attribute received");
417 		goto fail;
418 	}
419 
420 	if (os_memcmp(msg.p2p_device_addr, sa, ETH_ALEN) != 0) {
421 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
422 			"P2P: Unexpected GO Negotiation Request SA=" MACSTR
423 			" != dev_addr=" MACSTR,
424 			MAC2STR(sa), MAC2STR(msg.p2p_device_addr));
425 		goto fail;
426 	}
427 
428 	dev = p2p_get_device(p2p, sa);
429 
430 	if (msg.status && *msg.status) {
431 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
432 			"P2P: Unexpected Status attribute (%d) in GO "
433 			"Negotiation Request", *msg.status);
434 		goto fail;
435 	}
436 
437 	if (dev == NULL)
438 		dev = p2p_add_dev_from_go_neg_req(p2p, sa, &msg);
439 	else if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
440 		p2p_add_dev_info(p2p, sa, dev, &msg);
441 	if (dev && dev->flags & P2P_DEV_USER_REJECTED) {
442 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
443 			"P2P: User has rejected this peer");
444 		status = P2P_SC_FAIL_REJECTED_BY_USER;
445 	} else if (dev == NULL || dev->wps_method == WPS_NOT_READY) {
446 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
447 			"P2P: Not ready for GO negotiation with " MACSTR,
448 			MAC2STR(sa));
449 		status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
450 		if (dev)
451 			dev->flags |= P2P_DEV_PEER_WAITING_RESPONSE;
452 		p2p->cfg->go_neg_req_rx(p2p->cfg->cb_ctx, sa,
453 					msg.dev_password_id);
454 	} else if (p2p->go_neg_peer && p2p->go_neg_peer != dev) {
455 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
456 			"P2P: Already in Group Formation with another peer");
457 		status = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
458 	} else {
459 		int go;
460 
461 		if (!p2p->go_neg_peer) {
462 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting "
463 				"GO Negotiation with previously authorized "
464 				"peer");
465 			if (!(dev->flags & P2P_DEV_FORCE_FREQ)) {
466 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
467 					"P2P: Use default channel settings");
468 				p2p->op_reg_class = p2p->cfg->op_reg_class;
469 				p2p->op_channel = p2p->cfg->op_channel;
470 				os_memcpy(&p2p->channels, &p2p->cfg->channels,
471 					  sizeof(struct p2p_channels));
472 			} else {
473 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
474 					"P2P: Use previously configured "
475 					"forced channel settings");
476 			}
477 		}
478 
479 		dev->flags &= ~P2P_DEV_NOT_YET_READY;
480 
481 		if (!msg.go_intent) {
482 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
483 				"P2P: No GO Intent attribute received");
484 			goto fail;
485 		}
486 		if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
487 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
488 				"P2P: Invalid GO Intent value (%u) received",
489 				*msg.go_intent >> 1);
490 			goto fail;
491 		}
492 
493 		if (dev->go_neg_req_sent &&
494 		    os_memcmp(sa, p2p->cfg->dev_addr, ETH_ALEN) > 0) {
495 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
496 				"P2P: Do not reply since peer has higher "
497 				"address and GO Neg Request already sent");
498 			p2p_parse_free(&msg);
499 			return;
500 		}
501 
502 		go = p2p_go_det(p2p->go_intent, *msg.go_intent);
503 		if (go < 0) {
504 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
505 				"P2P: Incompatible GO Intent");
506 			status = P2P_SC_FAIL_BOTH_GO_INTENT_15;
507 			goto fail;
508 		}
509 
510 		if (p2p_peer_channels(p2p, dev, msg.channel_list,
511 				      msg.channel_list_len) < 0) {
512 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
513 				"P2P: No common channels found");
514 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
515 			goto fail;
516 		}
517 
518 		switch (msg.dev_password_id) {
519 		case DEV_PW_REGISTRAR_SPECIFIED:
520 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
521 				"P2P: PIN from peer Display");
522 			if (dev->wps_method != WPS_PIN_KEYPAD) {
523 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
524 					"P2P: We have wps_method=%s -> "
525 					"incompatible",
526 					p2p_wps_method_str(dev->wps_method));
527 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
528 				goto fail;
529 			}
530 			break;
531 		case DEV_PW_USER_SPECIFIED:
532 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
533 				"P2P: Peer entered PIN on Keypad");
534 			if (dev->wps_method != WPS_PIN_DISPLAY) {
535 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
536 					"P2P: We have wps_method=%s -> "
537 					"incompatible",
538 					p2p_wps_method_str(dev->wps_method));
539 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
540 				goto fail;
541 			}
542 			break;
543 		case DEV_PW_PUSHBUTTON:
544 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
545 				"P2P: Peer using pushbutton");
546 			if (dev->wps_method != WPS_PBC) {
547 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
548 					"P2P: We have wps_method=%s -> "
549 					"incompatible",
550 					p2p_wps_method_str(dev->wps_method));
551 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
552 				goto fail;
553 			}
554 			break;
555 		default:
556 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
557 				"P2P: Unsupported Device Password ID %d",
558 				msg.dev_password_id);
559 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
560 			goto fail;
561 		}
562 
563 		if (go) {
564 			struct p2p_channels intersection;
565 			size_t i;
566 			p2p_channels_intersect(&p2p->channels, &dev->channels,
567 					       &intersection);
568 			if (intersection.reg_classes == 0 ||
569 			    intersection.reg_class[0].channels == 0) {
570 				status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
571 				wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
572 					"P2P: No common channels found");
573 				goto fail;
574 			}
575 			for (i = 0; i < intersection.reg_classes; i++) {
576 				struct p2p_reg_class *c;
577 				c = &intersection.reg_class[i];
578 				wpa_printf(MSG_DEBUG, "P2P: reg_class %u",
579 					   c->reg_class);
580 				wpa_hexdump(MSG_DEBUG, "P2P: channels",
581 					    c->channel, c->channels);
582 			}
583 			if (!p2p_channels_includes(&intersection,
584 						   p2p->op_reg_class,
585 						   p2p->op_channel))
586 				p2p_reselect_channel(p2p, &intersection);
587 
588 			if (!p2p->ssid_set) {
589 				p2p_build_ssid(p2p, p2p->ssid, &p2p->ssid_len);
590 				p2p->ssid_set = 1;
591 			}
592 		}
593 
594 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
595 		dev->oper_freq = p2p_channel_to_freq((const char *)
596 						     msg.operating_channel,
597 						     msg.operating_channel[3],
598 						     msg.operating_channel[4]);
599 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer operating "
600 			"channel preference: %d MHz", dev->oper_freq);
601 
602 		if (msg.config_timeout) {
603 			dev->go_timeout = msg.config_timeout[0];
604 			dev->client_timeout = msg.config_timeout[1];
605 		}
606 
607 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
608 			"P2P: GO Negotiation with " MACSTR, MAC2STR(sa));
609 		if (p2p->state != P2P_IDLE)
610 			p2p_stop_find_for_freq(p2p, rx_freq);
611 		p2p_set_state(p2p, P2P_GO_NEG);
612 		p2p_clear_timeout(p2p);
613 		dev->dialog_token = msg.dialog_token;
614 		os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
615 		p2p->go_neg_peer = dev;
616 		status = P2P_SC_SUCCESS;
617 	}
618 
619 fail:
620 	if (dev)
621 		dev->status = status;
622 	resp = p2p_build_go_neg_resp(p2p, dev, msg.dialog_token, status,
623 				     !tie_breaker);
624 	p2p_parse_free(&msg);
625 	if (resp == NULL)
626 		return;
627 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
628 		"P2P: Sending GO Negotiation Response");
629 	if (rx_freq > 0)
630 		freq = rx_freq;
631 	else
632 		freq = p2p_channel_to_freq(p2p->cfg->country,
633 					   p2p->cfg->reg_class,
634 					   p2p->cfg->channel);
635 	if (freq < 0) {
636 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
637 			"P2P: Unknown regulatory class/channel");
638 		wpabuf_free(resp);
639 		return;
640 	}
641 	if (status == P2P_SC_SUCCESS) {
642 		p2p->pending_action_state = P2P_PENDING_GO_NEG_RESPONSE;
643 		dev->flags |= P2P_DEV_WAIT_GO_NEG_CONFIRM;
644 	} else
645 		p2p->pending_action_state =
646 			P2P_PENDING_GO_NEG_RESPONSE_FAILURE;
647 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
648 			    p2p->cfg->dev_addr,
649 			    wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
650 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
651 			"P2P: Failed to send Action frame");
652 	}
653 
654 	wpabuf_free(resp);
655 }
656 
657 
p2p_build_go_neg_conf(struct p2p_data * p2p,struct p2p_device * peer,u8 dialog_token,u8 status,const u8 * resp_chan,int go)658 static struct wpabuf * p2p_build_go_neg_conf(struct p2p_data *p2p,
659 					     struct p2p_device *peer,
660 					     u8 dialog_token, u8 status,
661 					     const u8 *resp_chan, int go)
662 {
663 	struct wpabuf *buf;
664 	u8 *len;
665 	struct p2p_channels res;
666 	u8 group_capab;
667 
668 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
669 		"P2P: Building GO Negotiation Confirm");
670 	buf = wpabuf_alloc(1000);
671 	if (buf == NULL)
672 		return NULL;
673 
674 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_CONF, dialog_token);
675 
676 	len = p2p_buf_add_ie_hdr(buf);
677 	p2p_buf_add_status(buf, status);
678 	group_capab = 0;
679 	if (peer->go_state == LOCAL_GO) {
680 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
681 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
682 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
683 				group_capab |=
684 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
685 		}
686 		if (p2p->cross_connect)
687 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
688 		if (p2p->cfg->p2p_intra_bss)
689 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
690 	}
691 	p2p_buf_add_capability(buf, p2p->dev_capab, group_capab);
692 	if (go || resp_chan == NULL)
693 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
694 					      p2p->op_reg_class,
695 					      p2p->op_channel);
696 	else
697 		p2p_buf_add_operating_channel(buf, (const char *) resp_chan,
698 					      resp_chan[3], resp_chan[4]);
699 	p2p_channels_intersect(&p2p->channels, &peer->channels, &res);
700 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
701 	if (go) {
702 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
703 				     p2p->ssid_len);
704 	}
705 	p2p_buf_update_ie_hdr(buf, len);
706 
707 	return buf;
708 }
709 
710 
p2p_process_go_neg_resp(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)711 void p2p_process_go_neg_resp(struct p2p_data *p2p, const u8 *sa,
712 			     const u8 *data, size_t len, int rx_freq)
713 {
714 	struct p2p_device *dev;
715 	struct wpabuf *conf;
716 	int go = -1;
717 	struct p2p_message msg;
718 	u8 status = P2P_SC_SUCCESS;
719 	int freq;
720 
721 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
722 		"P2P: Received GO Negotiation Response from " MACSTR
723 		" (freq=%d)", MAC2STR(sa), rx_freq);
724 	dev = p2p_get_device(p2p, sa);
725 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
726 	    dev != p2p->go_neg_peer) {
727 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
728 			"P2P: Not ready for GO negotiation with " MACSTR,
729 			MAC2STR(sa));
730 		return;
731 	}
732 
733 	if (p2p_parse(data, len, &msg))
734 		return;
735 
736 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE)) {
737 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
738 			"P2P: Was not expecting GO Negotiation Response - "
739 			"ignore");
740 		p2p_parse_free(&msg);
741 		return;
742 	}
743 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
744 
745 	if (msg.dialog_token != dev->dialog_token) {
746 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
747 			"P2P: Unexpected Dialog Token %u (expected %u)",
748 			msg.dialog_token, dev->dialog_token);
749 		p2p_parse_free(&msg);
750 		return;
751 	}
752 
753 	if (!msg.status) {
754 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
755 			"P2P: No Status attribute received");
756 		status = P2P_SC_FAIL_INVALID_PARAMS;
757 		goto fail;
758 	}
759 	if (*msg.status) {
760 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
761 			"P2P: GO Negotiation rejected: status %d",
762 			*msg.status);
763 		dev->go_neg_req_sent = 0;
764 		if (*msg.status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
765 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
766 				"P2P: Wait for the peer to become ready for "
767 				"GO Negotiation");
768 			dev->flags |= P2P_DEV_NOT_YET_READY;
769 			dev->wait_count = 0;
770 			p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
771 			p2p_set_timeout(p2p, 0, 0);
772 		} else {
773 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
774 				"P2P: Stop GO Negotiation attempt");
775 			p2p_go_neg_failed(p2p, dev, *msg.status);
776 		}
777 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
778 		p2p_parse_free(&msg);
779 		return;
780 	}
781 
782 	if (!msg.capability) {
783 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
784 			"P2P: Mandatory Capability attribute missing from GO "
785 			"Negotiation Response");
786 #ifdef CONFIG_P2P_STRICT
787 		status = P2P_SC_FAIL_INVALID_PARAMS;
788 		goto fail;
789 #endif /* CONFIG_P2P_STRICT */
790 	}
791 
792 	if (!msg.p2p_device_info) {
793 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
794 			"P2P: Mandatory P2P Device Info attribute missing "
795 			"from GO Negotiation Response");
796 #ifdef CONFIG_P2P_STRICT
797 		status = P2P_SC_FAIL_INVALID_PARAMS;
798 		goto fail;
799 #endif /* CONFIG_P2P_STRICT */
800 	}
801 
802 	if (!msg.intended_addr) {
803 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
804 			"P2P: No Intended P2P Interface Address attribute "
805 			"received");
806 		status = P2P_SC_FAIL_INVALID_PARAMS;
807 		goto fail;
808 	}
809 
810 	if (!msg.go_intent) {
811 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
812 			"P2P: No GO Intent attribute received");
813 		status = P2P_SC_FAIL_INVALID_PARAMS;
814 		goto fail;
815 	}
816 	if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
817 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
818 			"P2P: Invalid GO Intent value (%u) received",
819 			*msg.go_intent >> 1);
820 		status = P2P_SC_FAIL_INVALID_PARAMS;
821 		goto fail;
822 	}
823 
824 	go = p2p_go_det(p2p->go_intent, *msg.go_intent);
825 	if (go < 0) {
826 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
827 			"P2P: Incompatible GO Intent");
828 		status = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
829 		goto fail;
830 	}
831 
832 	if (!go && msg.group_id) {
833 		/* Store SSID for Provisioning step */
834 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
835 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
836 	} else if (!go) {
837 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
838 			"P2P: Mandatory P2P Group ID attribute missing from "
839 			"GO Negotiation Response");
840 		p2p->ssid_len = 0;
841 #ifdef CONFIG_P2P_STRICT
842 		status = P2P_SC_FAIL_INVALID_PARAMS;
843 		goto fail;
844 #endif /* CONFIG_P2P_STRICT */
845 	}
846 
847 	if (!msg.config_timeout) {
848 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
849 			"P2P: Mandatory Configuration Timeout attribute "
850 			"missing from GO Negotiation Response");
851 #ifdef CONFIG_P2P_STRICT
852 		status = P2P_SC_FAIL_INVALID_PARAMS;
853 		goto fail;
854 #endif /* CONFIG_P2P_STRICT */
855 	} else {
856 		dev->go_timeout = msg.config_timeout[0];
857 		dev->client_timeout = msg.config_timeout[1];
858 	}
859 
860 	if (!msg.operating_channel && !go) {
861 		/*
862 		 * Note: P2P Client may omit Operating Channel attribute to
863 		 * indicate it does not have a preference.
864 		 */
865 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
866 			"P2P: No Operating Channel attribute received");
867 		status = P2P_SC_FAIL_INVALID_PARAMS;
868 		goto fail;
869 	}
870 	if (!msg.channel_list) {
871 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
872 			"P2P: No Channel List attribute received");
873 		status = P2P_SC_FAIL_INVALID_PARAMS;
874 		goto fail;
875 	}
876 
877 	if (p2p_peer_channels(p2p, dev, msg.channel_list,
878 			      msg.channel_list_len) < 0) {
879 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
880 			"P2P: No common channels found");
881 		status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
882 		goto fail;
883 	}
884 
885 	if (msg.operating_channel) {
886 		dev->oper_freq = p2p_channel_to_freq((const char *)
887 						     msg.operating_channel,
888 						     msg.operating_channel[3],
889 						     msg.operating_channel[4]);
890 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer operating "
891 			"channel preference: %d MHz", dev->oper_freq);
892 	} else
893 		dev->oper_freq = 0;
894 
895 	switch (msg.dev_password_id) {
896 	case DEV_PW_REGISTRAR_SPECIFIED:
897 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
898 			"P2P: PIN from peer Display");
899 		if (dev->wps_method != WPS_PIN_KEYPAD) {
900 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
901 				"P2P: We have wps_method=%s -> "
902 				"incompatible",
903 				p2p_wps_method_str(dev->wps_method));
904 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
905 			goto fail;
906 		}
907 		break;
908 	case DEV_PW_USER_SPECIFIED:
909 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
910 			"P2P: Peer entered PIN on Keypad");
911 		if (dev->wps_method != WPS_PIN_DISPLAY) {
912 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
913 				"P2P: We have wps_method=%s -> "
914 				"incompatible",
915 				p2p_wps_method_str(dev->wps_method));
916 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
917 			goto fail;
918 		}
919 		break;
920 	case DEV_PW_PUSHBUTTON:
921 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
922 			"P2P: Peer using pushbutton");
923 		if (dev->wps_method != WPS_PBC) {
924 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
925 				"P2P: We have wps_method=%s -> "
926 				"incompatible",
927 				p2p_wps_method_str(dev->wps_method));
928 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
929 			goto fail;
930 		}
931 		break;
932 	default:
933 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
934 			"P2P: Unsupported Device Password ID %d",
935 			msg.dev_password_id);
936 		status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
937 		goto fail;
938 	}
939 
940 	if (go) {
941 		struct p2p_channels intersection;
942 		size_t i;
943 		p2p_channels_intersect(&p2p->channels, &dev->channels,
944 				       &intersection);
945 		if (intersection.reg_classes == 0 ||
946 		    intersection.reg_class[0].channels == 0) {
947 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
948 			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
949 				"P2P: No common channels found");
950 			goto fail;
951 		}
952 		for (i = 0; i < intersection.reg_classes; i++) {
953 			struct p2p_reg_class *c;
954 			c = &intersection.reg_class[i];
955 			wpa_printf(MSG_DEBUG, "P2P: reg_class %u",
956 				   c->reg_class);
957 			wpa_hexdump(MSG_DEBUG, "P2P: channels",
958 				    c->channel, c->channels);
959 		}
960 		if (!p2p_channels_includes(&intersection, p2p->op_reg_class,
961 					   p2p->op_channel))
962 			p2p_reselect_channel(p2p, &intersection);
963 
964 		if (!p2p->ssid_set) {
965 			p2p_build_ssid(p2p, p2p->ssid, &p2p->ssid_len);
966 			p2p->ssid_set = 1;
967 		}
968 	}
969 
970 	p2p_set_state(p2p, P2P_GO_NEG);
971 	p2p_clear_timeout(p2p);
972 
973 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
974 		"P2P: GO Negotiation with " MACSTR, MAC2STR(sa));
975 	os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
976 
977 fail:
978 	conf = p2p_build_go_neg_conf(p2p, dev, msg.dialog_token, status,
979 				     msg.operating_channel, go);
980 	p2p_parse_free(&msg);
981 	if (conf == NULL)
982 		return;
983 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
984 		"P2P: Sending GO Negotiation Confirm");
985 	if (status == P2P_SC_SUCCESS) {
986 		p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
987 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
988 	} else
989 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
990 	if (rx_freq > 0)
991 		freq = rx_freq;
992 	else
993 		freq = dev->listen_freq;
994 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr, sa,
995 			    wpabuf_head(conf), wpabuf_len(conf), 200) < 0) {
996 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
997 			"P2P: Failed to send Action frame");
998 		p2p_go_neg_failed(p2p, dev, -1);
999 	}
1000 	wpabuf_free(conf);
1001 }
1002 
1003 
p2p_process_go_neg_conf(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len)1004 void p2p_process_go_neg_conf(struct p2p_data *p2p, const u8 *sa,
1005 			     const u8 *data, size_t len)
1006 {
1007 	struct p2p_device *dev;
1008 	struct p2p_message msg;
1009 
1010 	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1011 		"P2P: Received GO Negotiation Confirm from " MACSTR,
1012 		MAC2STR(sa));
1013 	dev = p2p_get_device(p2p, sa);
1014 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
1015 	    dev != p2p->go_neg_peer) {
1016 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1017 			"P2P: Not ready for GO negotiation with " MACSTR,
1018 			MAC2STR(sa));
1019 		return;
1020 	}
1021 
1022 	if (p2p->pending_action_state == P2P_PENDING_GO_NEG_RESPONSE) {
1023 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopped waiting "
1024 			"for TX status on GO Negotiation Response since we "
1025 			"already received Confirmation");
1026 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
1027 	}
1028 
1029 	if (p2p_parse(data, len, &msg))
1030 		return;
1031 
1032 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
1033 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1034 			"P2P: Was not expecting GO Negotiation Confirm - "
1035 			"ignore");
1036 		return;
1037 	}
1038 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1039 
1040 	if (msg.dialog_token != dev->dialog_token) {
1041 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1042 			"P2P: Unexpected Dialog Token %u (expected %u)",
1043 			msg.dialog_token, dev->dialog_token);
1044 		p2p_parse_free(&msg);
1045 		return;
1046 	}
1047 
1048 	if (!msg.status) {
1049 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1050 			"P2P: No Status attribute received");
1051 		p2p_parse_free(&msg);
1052 		return;
1053 	}
1054 	if (*msg.status) {
1055 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1056 			"P2P: GO Negotiation rejected: status %d",
1057 			*msg.status);
1058 		p2p_parse_free(&msg);
1059 		return;
1060 	}
1061 
1062 	if (dev->go_state == REMOTE_GO && msg.group_id) {
1063 		/* Store SSID for Provisioning step */
1064 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
1065 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
1066 	} else if (dev->go_state == REMOTE_GO) {
1067 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1068 			"P2P: Mandatory P2P Group ID attribute missing from "
1069 			"GO Negotiation Confirmation");
1070 		p2p->ssid_len = 0;
1071 #ifdef CONFIG_P2P_STRICT
1072 		p2p_parse_free(&msg);
1073 		return;
1074 #endif /* CONFIG_P2P_STRICT */
1075 	}
1076 
1077 	if (!msg.operating_channel) {
1078 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1079 			"P2P: Mandatory Operating Channel attribute missing "
1080 			"from GO Negotiation Confirmation");
1081 #ifdef CONFIG_P2P_STRICT
1082 		p2p_parse_free(&msg);
1083 		return;
1084 #endif /* CONFIG_P2P_STRICT */
1085 	}
1086 
1087 	if (!msg.channel_list) {
1088 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1089 			"P2P: Mandatory Operating Channel attribute missing "
1090 			"from GO Negotiation Confirmation");
1091 #ifdef CONFIG_P2P_STRICT
1092 		p2p_parse_free(&msg);
1093 		return;
1094 #endif /* CONFIG_P2P_STRICT */
1095 	}
1096 
1097 	p2p_parse_free(&msg);
1098 
1099 	if (dev->go_state == UNKNOWN_GO) {
1100 		/*
1101 		 * This should not happen since GO negotiation has already
1102 		 * been completed.
1103 		 */
1104 		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1105 			"P2P: Unexpected GO Neg state - do not know which end "
1106 			"becomes GO");
1107 		return;
1108 	}
1109 
1110 	p2p_go_complete(p2p, dev);
1111 }
1112