1 /*
2  * Wi-Fi Direct - P2P module
3  * Copyright (c) 2009-2010, Atheros Communications
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "eloop.h"
13 #include "common/defs.h"
14 #include "common/ieee802_11_defs.h"
15 #include "common/ieee802_11_common.h"
16 #include "common/wpa_common.h"
17 #include "common/wpa_ctrl.h"
18 #include "common/sae.h"
19 #include "crypto/sha256.h"
20 #include "crypto/sha384.h"
21 #include "crypto/crypto.h"
22 #include "pasn/pasn_common.h"
23 #include "wps/wps_i.h"
24 #include "p2p_i.h"
25 #include "p2p.h"
26 
27 
28 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
29 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
30 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
31 				     const u8 *sa, const u8 *data, size_t len,
32 				     int rx_freq);
33 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
34 				      const u8 *sa, const u8 *data,
35 				      size_t len);
36 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
37 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
38 
39 
40 /*
41  * p2p_scan recovery timeout
42  *
43  * Many drivers are using 30 second timeout on scan results. Allow a bit larger
44  * timeout for this to avoid hitting P2P timeout unnecessarily.
45  */
46 #define P2P_SCAN_TIMEOUT 35
47 
48 /**
49  * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
50  * entries will be removed
51  */
52 #ifndef P2P_PEER_EXPIRATION_AGE
53 #define P2P_PEER_EXPIRATION_AGE 60
54 #endif /* P2P_PEER_EXPIRATION_AGE */
55 
56 
p2p_expire_peers(struct p2p_data * p2p)57 void p2p_expire_peers(struct p2p_data *p2p)
58 {
59 	struct p2p_device *dev, *n;
60 	struct os_reltime now;
61 	size_t i;
62 
63 	os_get_reltime(&now);
64 	dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
65 		if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
66 			continue;
67 
68 		if (dev == p2p->go_neg_peer) {
69 			/*
70 			 * GO Negotiation is in progress with the peer, so
71 			 * don't expire the peer entry until GO Negotiation
72 			 * fails or times out.
73 			 */
74 			continue;
75 		}
76 
77 		if (p2p->cfg->go_connected &&
78 		    p2p->cfg->go_connected(p2p->cfg->cb_ctx,
79 					   dev->info.p2p_device_addr)) {
80 			/*
81 			 * We are connected as a client to a group in which the
82 			 * peer is the GO, so do not expire the peer entry.
83 			 */
84 			os_get_reltime(&dev->last_seen);
85 			continue;
86 		}
87 
88 		for (i = 0; i < p2p->num_groups; i++) {
89 			if (p2p_group_is_client_connected(
90 				    p2p->groups[i], dev->info.p2p_device_addr))
91 				break;
92 		}
93 		if (i < p2p->num_groups) {
94 			/*
95 			 * The peer is connected as a client in a group where
96 			 * we are the GO, so do not expire the peer entry.
97 			 */
98 			os_get_reltime(&dev->last_seen);
99 			continue;
100 		}
101 
102 		p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
103 			MAC2STR(dev->info.p2p_device_addr));
104 		dl_list_del(&dev->list);
105 		p2p_device_free(p2p, dev);
106 	}
107 }
108 
109 
p2p_state_txt(int state)110 static const char * p2p_state_txt(int state)
111 {
112 	switch (state) {
113 	case P2P_IDLE:
114 		return "IDLE";
115 	case P2P_SEARCH:
116 		return "SEARCH";
117 	case P2P_CONNECT:
118 		return "CONNECT";
119 	case P2P_CONNECT_LISTEN:
120 		return "CONNECT_LISTEN";
121 	case P2P_GO_NEG:
122 		return "GO_NEG";
123 	case P2P_LISTEN_ONLY:
124 		return "LISTEN_ONLY";
125 	case P2P_WAIT_PEER_CONNECT:
126 		return "WAIT_PEER_CONNECT";
127 	case P2P_WAIT_PEER_IDLE:
128 		return "WAIT_PEER_IDLE";
129 	case P2P_SD_DURING_FIND:
130 		return "SD_DURING_FIND";
131 	case P2P_PROVISIONING:
132 		return "PROVISIONING";
133 	case P2P_PD_DURING_FIND:
134 		return "PD_DURING_FIND";
135 	case P2P_INVITE:
136 		return "INVITE";
137 	case P2P_INVITE_LISTEN:
138 		return "INVITE_LISTEN";
139 	default:
140 		return "?";
141 	}
142 }
143 
144 
p2p_get_state_txt(struct p2p_data * p2p)145 const char * p2p_get_state_txt(struct p2p_data *p2p)
146 {
147 	return p2p_state_txt(p2p->state);
148 }
149 
150 
p2p_get_p2ps_adv_list(struct p2p_data * p2p)151 struct p2ps_advertisement * p2p_get_p2ps_adv_list(struct p2p_data *p2p)
152 {
153 	return p2p ? p2p->p2ps_adv_list : NULL;
154 }
155 
156 
p2p_set_intended_addr(struct p2p_data * p2p,const u8 * intended_addr)157 void p2p_set_intended_addr(struct p2p_data *p2p, const u8 *intended_addr)
158 {
159 	if (p2p && intended_addr)
160 		os_memcpy(p2p->intended_addr, intended_addr, ETH_ALEN);
161 }
162 
163 
p2p_get_provisioning_info(struct p2p_data * p2p,const u8 * addr)164 u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
165 {
166 	struct p2p_device *dev = NULL;
167 
168 	if (!addr || !p2p)
169 		return 0;
170 
171 	dev = p2p_get_device(p2p, addr);
172 	if (dev)
173 		return dev->wps_prov_info;
174 	else
175 		return 0;
176 }
177 
178 
p2p_clear_provisioning_info(struct p2p_data * p2p,const u8 * addr)179 void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *addr)
180 {
181 	struct p2p_device *dev = NULL;
182 
183 	if (!addr || !p2p)
184 		return;
185 
186 	dev = p2p_get_device(p2p, addr);
187 	if (dev)
188 		dev->wps_prov_info = 0;
189 }
190 
191 
p2p_set_state(struct p2p_data * p2p,int new_state)192 void p2p_set_state(struct p2p_data *p2p, int new_state)
193 {
194 	p2p_dbg(p2p, "State %s -> %s",
195 		p2p_state_txt(p2p->state), p2p_state_txt(new_state));
196 	p2p->state = new_state;
197 
198 	if (new_state == P2P_IDLE && p2p->pending_channel) {
199 		p2p_dbg(p2p, "Apply change in listen channel");
200 		p2p->cfg->reg_class = p2p->pending_reg_class;
201 		p2p->cfg->channel = p2p->pending_channel;
202 		p2p->pending_reg_class = 0;
203 		p2p->pending_channel = 0;
204 	}
205 }
206 
207 
p2p_set_timeout(struct p2p_data * p2p,unsigned int sec,unsigned int usec)208 void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
209 {
210 	p2p_dbg(p2p, "Set timeout (state=%s): %u.%06u sec",
211 		p2p_state_txt(p2p->state), sec, usec);
212 	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
213 	eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
214 }
215 
216 
p2p_clear_timeout(struct p2p_data * p2p)217 void p2p_clear_timeout(struct p2p_data *p2p)
218 {
219 	p2p_dbg(p2p, "Clear timeout (state=%s)", p2p_state_txt(p2p->state));
220 	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
221 }
222 
223 
p2p_go_neg_failed(struct p2p_data * p2p,int status)224 void p2p_go_neg_failed(struct p2p_data *p2p, int status)
225 {
226 	struct p2p_go_neg_results res;
227 	struct p2p_device *peer = p2p->go_neg_peer;
228 
229 	if (!peer)
230 		return;
231 
232 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
233 	if (p2p->state != P2P_SEARCH) {
234 		/*
235 		 * Clear timeouts related to GO Negotiation if no new p2p_find
236 		 * has been started.
237 		 */
238 		p2p_clear_timeout(p2p);
239 		p2p_set_state(p2p, P2P_IDLE);
240 	}
241 
242 	peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
243 	peer->wps_method = WPS_NOT_READY;
244 	peer->oob_pw_id = 0;
245 	wpabuf_free(peer->go_neg_conf);
246 	peer->go_neg_conf = NULL;
247 	p2p->go_neg_peer = NULL;
248 
249 #ifdef CONFIG_PASN
250 	if (peer->p2p2 && peer->pasn)
251 		wpa_pasn_reset(peer->pasn);
252 	os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
253 	os_memset(p2p->peer_sae_password, 0, sizeof(p2p->peer_sae_password));
254 #endif /* CONFIG_PASN */
255 
256 	os_memset(&res, 0, sizeof(res));
257 	res.status = status;
258 	res.p2p2 = peer->p2p2;
259 	os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
260 	os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
261 	p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
262 }
263 
264 
p2p_listen_in_find(struct p2p_data * p2p,int dev_disc)265 static void p2p_listen_in_find(struct p2p_data *p2p, int dev_disc)
266 {
267 	unsigned int r, tu;
268 	int freq;
269 	struct wpabuf *ies;
270 
271 	p2p_dbg(p2p, "Starting short listen state (state=%s)",
272 		p2p_state_txt(p2p->state));
273 
274 	if (p2p->pending_listen_freq) {
275 		/* We have a pending p2p_listen request */
276 		p2p_dbg(p2p, "p2p_listen command pending already");
277 		return;
278 	}
279 
280 	freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
281 	if (freq < 0) {
282 		p2p_dbg(p2p, "Unknown regulatory class/channel");
283 		return;
284 	}
285 
286 	if (os_get_random((u8 *) &r, sizeof(r)) < 0)
287 		r = 0;
288 	tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
289 	      p2p->min_disc_int) * 100;
290 	if (p2p->max_disc_tu >= 0 && tu > (unsigned int) p2p->max_disc_tu)
291 		tu = p2p->max_disc_tu;
292 	if (!dev_disc && tu < 100)
293 		tu = 100; /* Need to wait in non-device discovery use cases */
294 	if (p2p->cfg->max_listen && 1024 * tu / 1000 > p2p->cfg->max_listen)
295 		tu = p2p->cfg->max_listen * 1000 / 1024;
296 
297 	if (tu == 0) {
298 		p2p_dbg(p2p, "Skip listen state since duration was 0 TU");
299 		p2p_set_timeout(p2p, 0, 0);
300 		return;
301 	}
302 
303 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
304 	if (ies == NULL)
305 		return;
306 
307 	p2p->pending_listen_freq = freq;
308 	p2p->pending_listen_sec = 0;
309 	p2p->pending_listen_usec = 1024 * tu;
310 
311 	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
312 		    ies) < 0) {
313 		p2p_dbg(p2p, "Failed to start listen mode");
314 		p2p->pending_listen_freq = 0;
315 	} else {
316 		p2p->pending_listen_wait_drv = true;
317 	}
318 	wpabuf_free(ies);
319 }
320 
321 
p2p_listen(struct p2p_data * p2p,unsigned int timeout)322 int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
323 {
324 	int freq;
325 	struct wpabuf *ies;
326 
327 	p2p_dbg(p2p, "Going to listen(only) state");
328 
329 	if (p2p->pending_listen_freq) {
330 		/* We have a pending p2p_listen request */
331 		p2p_dbg(p2p, "p2p_listen command pending already");
332 		return -1;
333 	}
334 
335 	freq = p2p_channel_to_freq(p2p->cfg->reg_class, p2p->cfg->channel);
336 	if (freq < 0) {
337 		p2p_dbg(p2p, "Unknown regulatory class/channel");
338 		return -1;
339 	}
340 
341 	p2p->pending_listen_sec = timeout / 1000;
342 	p2p->pending_listen_usec = (timeout % 1000) * 1000;
343 
344 	if (p2p->p2p_scan_running) {
345 		if (p2p->start_after_scan == P2P_AFTER_SCAN_CONNECT) {
346 			p2p_dbg(p2p, "p2p_scan running - connect is already pending - skip listen");
347 			return 0;
348 		}
349 		p2p_dbg(p2p, "p2p_scan running - delay start of listen state");
350 		p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
351 		return 0;
352 	}
353 
354 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
355 	if (ies == NULL)
356 		return -1;
357 
358 	p2p->pending_listen_freq = freq;
359 
360 	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
361 		p2p_dbg(p2p, "Failed to start listen mode");
362 		p2p->pending_listen_freq = 0;
363 		wpabuf_free(ies);
364 		return -1;
365 	}
366 	p2p->pending_listen_wait_drv = true;
367 	wpabuf_free(ies);
368 
369 	p2p_set_state(p2p, P2P_LISTEN_ONLY);
370 
371 	return 0;
372 }
373 
374 
p2p_device_clear_reported(struct p2p_data * p2p)375 static void p2p_device_clear_reported(struct p2p_data *p2p)
376 {
377 	struct p2p_device *dev;
378 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
379 		dev->flags &= ~P2P_DEV_REPORTED;
380 		dev->sd_reqs = 0;
381 	}
382 }
383 
384 
385 /**
386  * p2p_get_device - Fetch a peer entry
387  * @p2p: P2P module context from p2p_init()
388  * @addr: P2P Device Address of the peer
389  * Returns: Pointer to the device entry or %NULL if not found
390  */
p2p_get_device(struct p2p_data * p2p,const u8 * addr)391 struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
392 {
393 	struct p2p_device *dev;
394 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
395 		if (ether_addr_equal(dev->info.p2p_device_addr, addr))
396 			return dev;
397 	}
398 	return NULL;
399 }
400 
401 
402 /**
403  * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
404  * @p2p: P2P module context from p2p_init()
405  * @addr: P2P Interface Address of the peer
406  * Returns: Pointer to the device entry or %NULL if not found
407  */
p2p_get_device_interface(struct p2p_data * p2p,const u8 * addr)408 struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
409 					     const u8 *addr)
410 {
411 	struct p2p_device *dev;
412 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
413 		if (ether_addr_equal(dev->interface_addr, addr))
414 			return dev;
415 	}
416 	return NULL;
417 }
418 
419 
420 /**
421  * p2p_create_device - Create a peer entry
422  * @p2p: P2P module context from p2p_init()
423  * @addr: P2P Device Address of the peer
424  * Returns: Pointer to the device entry or %NULL on failure
425  *
426  * If there is already an entry for the peer, it will be returned instead of
427  * creating a new one.
428  */
p2p_create_device(struct p2p_data * p2p,const u8 * addr)429 static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
430 					     const u8 *addr)
431 {
432 	struct p2p_device *dev, *oldest = NULL;
433 	size_t count = 0;
434 
435 	dev = p2p_get_device(p2p, addr);
436 	if (dev)
437 		return dev;
438 
439 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
440 		count++;
441 		if (oldest == NULL ||
442 		    os_reltime_before(&dev->last_seen, &oldest->last_seen))
443 			oldest = dev;
444 	}
445 	if (count + 1 > p2p->cfg->max_peers && oldest) {
446 		p2p_dbg(p2p,
447 			"Remove oldest peer entry to make room for a new peer "
448 			MACSTR, MAC2STR(oldest->info.p2p_device_addr));
449 		dl_list_del(&oldest->list);
450 		p2p_device_free(p2p, oldest);
451 	}
452 
453 	dev = os_zalloc(sizeof(*dev));
454 	if (dev == NULL)
455 		return NULL;
456 	dl_list_add(&p2p->devices, &dev->list);
457 	os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
458 	dev->support_6ghz = false;
459 
460 	return dev;
461 }
462 
463 
p2p_copy_client_info(struct p2p_device * dev,struct p2p_client_info * cli)464 static void p2p_copy_client_info(struct p2p_device *dev,
465 				 struct p2p_client_info *cli)
466 {
467 	p2p_copy_filter_devname(dev->info.device_name,
468 				sizeof(dev->info.device_name),
469 				cli->dev_name, cli->dev_name_len);
470 	dev->info.dev_capab = cli->dev_capab;
471 	dev->info.config_methods = cli->config_methods;
472 	os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
473 	dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
474 	if (dev->info.wps_sec_dev_type_list_len > WPS_SEC_DEV_TYPE_MAX_LEN)
475 		dev->info.wps_sec_dev_type_list_len = WPS_SEC_DEV_TYPE_MAX_LEN;
476 	os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
477 		  dev->info.wps_sec_dev_type_list_len);
478 }
479 
480 
p2p_add_group_clients(struct p2p_data * p2p,const u8 * go_dev_addr,const u8 * go_interface_addr,int freq,const u8 * gi,size_t gi_len,struct os_reltime * rx_time)481 static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
482 				 const u8 *go_interface_addr, int freq,
483 				 const u8 *gi, size_t gi_len,
484 				 struct os_reltime *rx_time)
485 {
486 	struct p2p_group_info info;
487 	size_t c;
488 	struct p2p_device *dev;
489 
490 	if (gi == NULL)
491 		return 0;
492 
493 	if (p2p_group_info_parse(gi, gi_len, &info) < 0)
494 		return -1;
495 
496 	/*
497 	 * Clear old data for this group; if the devices are still in the
498 	 * group, the information will be restored in the loop following this.
499 	 */
500 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
501 		if (ether_addr_equal(dev->member_in_go_iface,
502 				     go_interface_addr)) {
503 			os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
504 			os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
505 		}
506 	}
507 
508 	for (c = 0; c < info.num_clients; c++) {
509 		struct p2p_client_info *cli = &info.client[c];
510 		if (ether_addr_equal(cli->p2p_device_addr, p2p->cfg->dev_addr))
511 			continue; /* ignore our own entry */
512 		dev = p2p_get_device(p2p, cli->p2p_device_addr);
513 		if (dev) {
514 			if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
515 					  P2P_DEV_PROBE_REQ_ONLY)) {
516 				/*
517 				 * Update information since we have not
518 				 * received this directly from the client.
519 				 */
520 				p2p_copy_client_info(dev, cli);
521 			} else {
522 				/*
523 				 * Need to update P2P Client Discoverability
524 				 * flag since it is valid only in P2P Group
525 				 * Info attribute.
526 				 */
527 				dev->info.dev_capab &=
528 					~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
529 				dev->info.dev_capab |=
530 					cli->dev_capab &
531 					P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
532 			}
533 			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
534 				dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
535 			}
536 		} else {
537 			dev = p2p_create_device(p2p, cli->p2p_device_addr);
538 			if (dev == NULL)
539 				continue;
540 			dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
541 			p2p_copy_client_info(dev, cli);
542 			dev->oper_freq = freq;
543 			p2p->cfg->dev_found(p2p->cfg->cb_ctx,
544 					    dev->info.p2p_device_addr,
545 					    &dev->info, 1);
546 			dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
547 		}
548 
549 		os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
550 			  ETH_ALEN);
551 		os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
552 		os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
553 		os_memcpy(dev->member_in_go_iface, go_interface_addr,
554 			  ETH_ALEN);
555 		dev->flags |= P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT;
556 	}
557 
558 	return 0;
559 }
560 
561 
p2p_copy_wps_info(struct p2p_data * p2p,struct p2p_device * dev,int probe_req,const struct p2p_message * msg)562 static void p2p_copy_wps_info(struct p2p_data *p2p, struct p2p_device *dev,
563 			      int probe_req, const struct p2p_message *msg)
564 {
565 	os_memcpy(dev->info.device_name, msg->device_name,
566 		  sizeof(dev->info.device_name));
567 
568 	if (msg->manufacturer &&
569 	    msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
570 		os_memset(dev->info.manufacturer, 0,
571 			  sizeof(dev->info.manufacturer));
572 		os_memcpy(dev->info.manufacturer, msg->manufacturer,
573 			  msg->manufacturer_len);
574 	}
575 
576 	if (msg->model_name &&
577 	    msg->model_name_len < sizeof(dev->info.model_name)) {
578 		os_memset(dev->info.model_name, 0,
579 			  sizeof(dev->info.model_name));
580 		os_memcpy(dev->info.model_name, msg->model_name,
581 			  msg->model_name_len);
582 	}
583 
584 	if (msg->model_number &&
585 	    msg->model_number_len < sizeof(dev->info.model_number)) {
586 		os_memset(dev->info.model_number, 0,
587 			  sizeof(dev->info.model_number));
588 		os_memcpy(dev->info.model_number, msg->model_number,
589 			  msg->model_number_len);
590 	}
591 
592 	if (msg->serial_number &&
593 	    msg->serial_number_len < sizeof(dev->info.serial_number)) {
594 		os_memset(dev->info.serial_number, 0,
595 			  sizeof(dev->info.serial_number));
596 		os_memcpy(dev->info.serial_number, msg->serial_number,
597 			  msg->serial_number_len);
598 	}
599 
600 	if (msg->pri_dev_type)
601 		os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
602 			  sizeof(dev->info.pri_dev_type));
603 	else if (msg->wps_pri_dev_type)
604 		os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
605 			  sizeof(dev->info.pri_dev_type));
606 
607 	if (msg->wps_sec_dev_type_list) {
608 		os_memcpy(dev->info.wps_sec_dev_type_list,
609 			  msg->wps_sec_dev_type_list,
610 			  msg->wps_sec_dev_type_list_len);
611 		dev->info.wps_sec_dev_type_list_len =
612 			msg->wps_sec_dev_type_list_len;
613 	}
614 
615 	if (msg->capability) {
616 		/*
617 		 * P2P Client Discoverability bit is reserved in all frames
618 		 * that use this function, so do not change its value here.
619 		 */
620 		dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
621 		dev->info.dev_capab |= msg->capability[0] &
622 			~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
623 		dev->info.group_capab = msg->capability[1];
624 	}
625 
626 	p2p_update_peer_6ghz_capab(dev, msg);
627 
628 	if (msg->ext_listen_timing) {
629 		dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
630 		dev->ext_listen_interval =
631 			WPA_GET_LE16(msg->ext_listen_timing + 2);
632 	}
633 
634 	if (!probe_req) {
635 		u16 new_config_methods;
636 		new_config_methods = msg->config_methods ?
637 			msg->config_methods : msg->wps_config_methods;
638 		if (new_config_methods &&
639 		    dev->info.config_methods != new_config_methods) {
640 			p2p_dbg(p2p, "Update peer " MACSTR
641 				" config_methods 0x%x -> 0x%x",
642 				MAC2STR(dev->info.p2p_device_addr),
643 				dev->info.config_methods,
644 				new_config_methods);
645 			dev->info.config_methods = new_config_methods;
646 		}
647 	}
648 }
649 
650 
p2p_update_peer_6ghz_capab(struct p2p_device * dev,const struct p2p_message * msg)651 void p2p_update_peer_6ghz_capab(struct p2p_device *dev,
652 				const struct p2p_message *msg)
653 {
654 	if (msg->capability &&
655 	    (msg->capability[0] & P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE))
656 		dev->support_6ghz = true;
657 }
658 
659 
p2p_update_peer_vendor_elems(struct p2p_device * dev,const u8 * ies,size_t ies_len)660 static void p2p_update_peer_vendor_elems(struct p2p_device *dev, const u8 *ies,
661 					 size_t ies_len)
662 {
663 	const u8 *pos, *end;
664 	u8 id, len;
665 
666 	wpabuf_free(dev->info.vendor_elems);
667 	dev->info.vendor_elems = NULL;
668 
669 	end = ies + ies_len;
670 
671 	for (pos = ies; end - pos > 1; pos += len) {
672 		id = *pos++;
673 		len = *pos++;
674 
675 		if (len > end - pos)
676 			break;
677 
678 		if (id != WLAN_EID_VENDOR_SPECIFIC || len < 3)
679 			continue;
680 
681 		if (len >= 4) {
682 			u32 type = WPA_GET_BE32(pos);
683 
684 			if (type == WPA_IE_VENDOR_TYPE ||
685 			    type == WMM_IE_VENDOR_TYPE ||
686 			    type == WPS_IE_VENDOR_TYPE ||
687 			    type == P2P_IE_VENDOR_TYPE ||
688 			    type == WFD_IE_VENDOR_TYPE)
689 				continue;
690 		}
691 
692 		/* Unknown vendor element - make raw IE data available */
693 		if (wpabuf_resize(&dev->info.vendor_elems, 2 + len) < 0)
694 			break;
695 		wpabuf_put_data(dev->info.vendor_elems, pos - 2, 2 + len);
696 		if (wpabuf_size(dev->info.vendor_elems) > 2000)
697 			break;
698 	}
699 }
700 
701 
p2p_compare_wfd_info(struct p2p_device * dev,const struct p2p_message * msg)702 static int p2p_compare_wfd_info(struct p2p_device *dev,
703 			      const struct p2p_message *msg)
704 {
705 	if (dev->info.wfd_subelems && msg->wfd_subelems) {
706 		if (dev->info.wfd_subelems->used != msg->wfd_subelems->used)
707 			return 1;
708 
709 		return os_memcmp(dev->info.wfd_subelems->buf,
710 				 msg->wfd_subelems->buf,
711 				 dev->info.wfd_subelems->used);
712 	}
713 	if (dev->info.wfd_subelems || msg->wfd_subelems)
714 		return 1;
715 
716 	return 0;
717 }
718 
719 
720 /**
721  * p2p_add_device - Add peer entries based on scan results or P2P frames
722  * @p2p: P2P module context from p2p_init()
723  * @addr: Source address of Beacon or Probe Response frame (may be either
724  *	P2P Device Address or P2P Interface Address)
725  * @level: Signal level (signal strength of the received frame from the peer)
726  * @freq: Frequency on which the Beacon or Probe Response frame was received
727  * @rx_time: Time when the result was received
728  * @ies: IEs from the Beacon or Probe Response frame
729  * @ies_len: Length of ies buffer in octets
730  * @scan_res: Whether this was based on scan results
731  * Returns: 0 on success, -1 on failure
732  *
733  * If the scan result is for a GO, the clients in the group will also be added
734  * to the peer table. This function can also be used with some other frames
735  * like Provision Discovery Request that contains P2P Capability and P2P Device
736  * Info attributes.
737  */
p2p_add_device(struct p2p_data * p2p,const u8 * addr,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len,int scan_res)738 int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq,
739 		   struct os_reltime *rx_time, int level, const u8 *ies,
740 		   size_t ies_len, int scan_res)
741 {
742 	struct p2p_device *dev;
743 	struct p2p_message msg;
744 	const u8 *p2p_dev_addr;
745 	int wfd_changed;
746 	int dev_name_changed;
747 	int i;
748 	struct os_reltime time_now;
749 
750 	os_memset(&msg, 0, sizeof(msg));
751 	if (p2p_parse_ies(ies, ies_len, &msg)) {
752 		p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
753 		p2p_parse_free(&msg);
754 		return -1;
755 	}
756 
757 	if (msg.p2p_device_addr)
758 		p2p_dev_addr = msg.p2p_device_addr;
759 	else if (msg.device_id)
760 		p2p_dev_addr = msg.device_id;
761 	else {
762 		p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
763 		p2p_parse_free(&msg);
764 		return -1;
765 	}
766 
767 	if (!is_zero_ether_addr(p2p->peer_filter) &&
768 	    !ether_addr_equal(p2p_dev_addr, p2p->peer_filter)) {
769 		p2p_dbg(p2p, "Do not add peer filter for " MACSTR
770 			" due to peer filter", MAC2STR(p2p_dev_addr));
771 		p2p_parse_free(&msg);
772 		return 0;
773 	}
774 
775 	dev = p2p_create_device(p2p, p2p_dev_addr);
776 	if (dev == NULL) {
777 		p2p_parse_free(&msg);
778 		return -1;
779 	}
780 
781 	if (rx_time == NULL) {
782 		os_get_reltime(&time_now);
783 		rx_time = &time_now;
784 	}
785 
786 	/*
787 	 * Update the device entry only if the new peer
788 	 * entry is newer than the one previously stored, or if
789 	 * the device was previously seen as a P2P Client in a group
790 	 * and the new entry isn't older than a threshold.
791 	 */
792 	if (dev->last_seen.sec > 0 &&
793 	    os_reltime_before(rx_time, &dev->last_seen) &&
794 	    (!(dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT) ||
795 	     os_reltime_expired(&dev->last_seen, rx_time,
796 				P2P_DEV_GROUP_CLIENT_RESP_THRESHOLD))) {
797 		p2p_dbg(p2p,
798 			"Do not update peer entry based on old frame (rx_time=%u.%06u last_seen=%u.%06u flags=0x%x)",
799 			(unsigned int) rx_time->sec,
800 			(unsigned int) rx_time->usec,
801 			(unsigned int) dev->last_seen.sec,
802 			(unsigned int) dev->last_seen.usec,
803 			dev->flags);
804 		p2p_parse_free(&msg);
805 		return -1;
806 	}
807 
808 	os_memcpy(&dev->last_seen, rx_time, sizeof(struct os_reltime));
809 
810 	dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY |
811 			P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT);
812 
813 	if (!ether_addr_equal(addr, p2p_dev_addr))
814 		os_memcpy(dev->interface_addr, addr, ETH_ALEN);
815 	if (msg.ssid &&
816 	    msg.ssid[1] <= sizeof(dev->oper_ssid) &&
817 	    (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
818 	     os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
819 	     != 0)) {
820 		os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
821 		dev->oper_ssid_len = msg.ssid[1];
822 	}
823 
824 	wpabuf_free(dev->info.p2ps_instance);
825 	dev->info.p2ps_instance = NULL;
826 	if (msg.adv_service_instance && msg.adv_service_instance_len)
827 		dev->info.p2ps_instance = wpabuf_alloc_copy(
828 			msg.adv_service_instance, msg.adv_service_instance_len);
829 
830 	if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
831 	    *msg.ds_params >= 1 && *msg.ds_params <= 14) {
832 		int ds_freq;
833 		if (*msg.ds_params == 14)
834 			ds_freq = 2484;
835 		else
836 			ds_freq = 2407 + *msg.ds_params * 5;
837 		if (freq != ds_freq) {
838 			p2p_dbg(p2p, "Update Listen frequency based on DS Parameter Set IE: %d -> %d MHz",
839 				freq, ds_freq);
840 			freq = ds_freq;
841 		}
842 	}
843 
844 	if (dev->listen_freq && dev->listen_freq != freq && scan_res) {
845 		p2p_dbg(p2p, "Update Listen frequency based on scan results ("
846 			MACSTR " %d -> %d MHz (DS param %d)",
847 			MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
848 			freq, msg.ds_params ? *msg.ds_params : -1);
849 	}
850 	if (scan_res) {
851 		dev->listen_freq = freq;
852 		if (msg.group_info)
853 			dev->oper_freq = freq;
854 	}
855 	dev->info.level = level;
856 
857 	dev_name_changed = os_strncmp(dev->info.device_name, msg.device_name,
858 				      WPS_DEV_NAME_MAX_LEN) != 0;
859 
860 	p2p_copy_wps_info(p2p, dev, 0, &msg);
861 
862 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
863 		wpabuf_free(dev->info.wps_vendor_ext[i]);
864 		dev->info.wps_vendor_ext[i] = NULL;
865 	}
866 
867 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
868 		if (msg.wps_vendor_ext[i] == NULL)
869 			break;
870 		dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
871 			msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
872 		if (dev->info.wps_vendor_ext[i] == NULL)
873 			break;
874 	}
875 
876 	wfd_changed = p2p_compare_wfd_info(dev, &msg);
877 
878 	if (wfd_changed) {
879 		wpabuf_free(dev->info.wfd_subelems);
880 		if (msg.wfd_subelems)
881 			dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
882 		else
883 			dev->info.wfd_subelems = NULL;
884 	}
885 
886 	if (scan_res) {
887 		p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq,
888 				      msg.group_info, msg.group_info_len,
889 				      rx_time);
890 	}
891 
892 	p2p_parse_free(&msg);
893 
894 	p2p_update_peer_vendor_elems(dev, ies, ies_len);
895 
896 	if (dev->flags & P2P_DEV_REPORTED && !wfd_changed &&
897 	    !dev_name_changed &&
898 	    (!msg.adv_service_instance ||
899 	     (dev->flags & P2P_DEV_P2PS_REPORTED)))
900 		return 0;
901 
902 	p2p_dbg(p2p, "Peer found with Listen frequency %d MHz (rx_time=%u.%06u)",
903 		freq, (unsigned int) rx_time->sec,
904 		(unsigned int) rx_time->usec);
905 	if (dev->flags & P2P_DEV_USER_REJECTED) {
906 		p2p_dbg(p2p, "Do not report rejected device");
907 		return 0;
908 	}
909 
910 	if (dev->info.config_methods == 0 &&
911 	    (freq == 2412 || freq == 2437 || freq == 2462)) {
912 		/*
913 		 * If we have only seen a Beacon frame from a GO, we do not yet
914 		 * know what WPS config methods it supports. Since some
915 		 * applications use config_methods value from P2P-DEVICE-FOUND
916 		 * events, postpone reporting this peer until we've fully
917 		 * discovered its capabilities.
918 		 *
919 		 * At least for now, do this only if the peer was detected on
920 		 * one of the social channels since that peer can be easily be
921 		 * found again and there are no limitations of having to use
922 		 * passive scan on this channels, so this can be done through
923 		 * Probe Response frame that includes the config_methods
924 		 * information.
925 		 */
926 		p2p_dbg(p2p, "Do not report peer " MACSTR
927 			" with unknown config methods", MAC2STR(addr));
928 		return 0;
929 	}
930 
931 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
932 			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
933 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
934 
935 	if (msg.adv_service_instance)
936 		dev->flags |= P2P_DEV_P2PS_REPORTED;
937 
938 	return 0;
939 }
940 
941 
p2p_device_free(struct p2p_data * p2p,struct p2p_device * dev)942 static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
943 {
944 	int i;
945 
946 	if (p2p->go_neg_peer == dev) {
947 		/*
948 		 * If GO Negotiation is in progress, report that it has failed.
949 		 */
950 		p2p_go_neg_failed(p2p, -1);
951 	}
952 	if (p2p->invite_peer == dev)
953 		p2p->invite_peer = NULL;
954 	if (p2p->sd_peer == dev)
955 		p2p->sd_peer = NULL;
956 	if (p2p->pending_client_disc_go == dev)
957 		p2p->pending_client_disc_go = NULL;
958 
959 	/* dev_lost() device, but only if it was previously dev_found() */
960 	if (dev->flags & P2P_DEV_REPORTED_ONCE)
961 		p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
962 				   dev->info.p2p_device_addr);
963 
964 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
965 		wpabuf_free(dev->info.wps_vendor_ext[i]);
966 		dev->info.wps_vendor_ext[i] = NULL;
967 	}
968 
969 	os_free(dev->bootstrap_params);
970 
971 	wpabuf_free(dev->action_frame_wrapper);
972 
973 #ifdef CONFIG_PASN
974 	if (dev->pasn) {
975 		wpa_pasn_reset(dev->pasn);
976 		pasn_data_deinit(dev->pasn);
977 	}
978 #endif /* CONFIG_PASN */
979 
980 	wpabuf_free(dev->info.wfd_subelems);
981 	wpabuf_free(dev->info.vendor_elems);
982 	wpabuf_free(dev->go_neg_conf);
983 	wpabuf_free(dev->info.p2ps_instance);
984 
985 	os_free(dev);
986 }
987 
988 
p2p_get_next_prog_freq(struct p2p_data * p2p)989 static int p2p_get_next_prog_freq(struct p2p_data *p2p)
990 {
991 	struct p2p_channels *c;
992 	struct p2p_reg_class *cla;
993 	size_t cl, ch;
994 	int found = 0;
995 	u8 reg_class;
996 	u8 channel;
997 	int freq;
998 
999 	c = &p2p->cfg->channels;
1000 	for (cl = 0; cl < c->reg_classes; cl++) {
1001 		cla = &c->reg_class[cl];
1002 		if (cla->reg_class != p2p->last_prog_scan_class)
1003 			continue;
1004 		for (ch = 0; ch < cla->channels; ch++) {
1005 			if (cla->channel[ch] == p2p->last_prog_scan_chan) {
1006 				found = 1;
1007 				break;
1008 			}
1009 		}
1010 		if (found)
1011 			break;
1012 	}
1013 
1014 	if (!found) {
1015 		/* Start from beginning */
1016 		reg_class = c->reg_class[0].reg_class;
1017 		channel = c->reg_class[0].channel[0];
1018 	} else {
1019 		/* Pick the next channel */
1020 		ch++;
1021 		if (ch == cla->channels) {
1022 			cl++;
1023 			if (cl == c->reg_classes)
1024 				cl = 0;
1025 			ch = 0;
1026 		}
1027 		reg_class = c->reg_class[cl].reg_class;
1028 		channel = c->reg_class[cl].channel[ch];
1029 	}
1030 
1031 	freq = p2p_channel_to_freq(reg_class, channel);
1032 	p2p_dbg(p2p, "Next progressive search channel: reg_class %u channel %u -> %d MHz",
1033 		reg_class, channel, freq);
1034 	p2p->last_prog_scan_class = reg_class;
1035 	p2p->last_prog_scan_chan = channel;
1036 
1037 	if (freq == 2412 || freq == 2437 || freq == 2462)
1038 		return 0; /* No need to add social channels */
1039 	return freq;
1040 }
1041 
1042 
p2p_search(struct p2p_data * p2p)1043 static void p2p_search(struct p2p_data *p2p)
1044 {
1045 	int freq = 0;
1046 	enum p2p_scan_type type;
1047 	u16 pw_id = DEV_PW_DEFAULT;
1048 	int res;
1049 
1050 	if (p2p->drv_in_listen) {
1051 		p2p_dbg(p2p, "Driver is still in Listen state - wait for it to end before continuing");
1052 		return;
1053 	}
1054 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1055 	p2p->pending_listen_wait_drv = false;
1056 
1057 	if (p2p->find_pending_full &&
1058 	    (p2p->find_type == P2P_FIND_PROGRESSIVE ||
1059 	     p2p->find_type == P2P_FIND_START_WITH_FULL)) {
1060 		type = P2P_SCAN_FULL;
1061 		p2p_dbg(p2p, "Starting search (pending full scan)");
1062 		p2p->find_pending_full = 0;
1063 	} else if ((p2p->find_type == P2P_FIND_PROGRESSIVE &&
1064 	    (freq = p2p_get_next_prog_freq(p2p)) > 0) ||
1065 	    (p2p->find_type == P2P_FIND_START_WITH_FULL &&
1066 	     (freq = p2p->find_specified_freq) > 0)) {
1067 		type = P2P_SCAN_SOCIAL_PLUS_ONE;
1068 		p2p_dbg(p2p, "Starting search (+ freq %u)", freq);
1069 	} else {
1070 		type = P2P_SCAN_SOCIAL;
1071 		p2p_dbg(p2p, "Starting search");
1072 	}
1073 
1074 	res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
1075 				 p2p->num_req_dev_types, p2p->req_dev_types,
1076 				 p2p->find_dev_id, pw_id, p2p->include_6ghz);
1077 	if (res < 0) {
1078 		p2p_dbg(p2p, "Scan request schedule failed");
1079 		p2p_continue_find(p2p);
1080 	}
1081 }
1082 
1083 
p2p_find_timeout(void * eloop_ctx,void * timeout_ctx)1084 static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
1085 {
1086 	struct p2p_data *p2p = eloop_ctx;
1087 	p2p_dbg(p2p, "Find timeout -> stop");
1088 	p2p_stop_find(p2p);
1089 }
1090 
1091 
p2p_notify_scan_trigger_status(struct p2p_data * p2p,int status)1092 void p2p_notify_scan_trigger_status(struct p2p_data *p2p, int status)
1093 {
1094 	if (status != 0) {
1095 		p2p_dbg(p2p, "Scan request failed");
1096 		/* Do continue find even for the first p2p_find_scan */
1097 		p2p_continue_find(p2p);
1098 	} else {
1099 		p2p_dbg(p2p, "Running p2p_scan");
1100 		p2p->p2p_scan_running = 1;
1101 		eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1102 		eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
1103 				       p2p, NULL);
1104 	}
1105 }
1106 
1107 
p2p_run_after_scan(struct p2p_data * p2p)1108 static int p2p_run_after_scan(struct p2p_data *p2p)
1109 {
1110 	struct p2p_device *dev;
1111 	enum p2p_after_scan op;
1112 
1113 	op = p2p->start_after_scan;
1114 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1115 	switch (op) {
1116 	case P2P_AFTER_SCAN_NOTHING:
1117 		break;
1118 	case P2P_AFTER_SCAN_LISTEN:
1119 		p2p_dbg(p2p, "Start previously requested Listen state");
1120 		p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
1121 			   p2p->pending_listen_usec / 1000);
1122 		return 1;
1123 	case P2P_AFTER_SCAN_CONNECT:
1124 		p2p_dbg(p2p, "Start previously requested connect with " MACSTR,
1125 			MAC2STR(p2p->after_scan_peer));
1126 		dev = p2p_get_device(p2p, p2p->after_scan_peer);
1127 		if (dev == NULL) {
1128 			p2p_dbg(p2p, "Peer not known anymore");
1129 			break;
1130 		}
1131 		p2p_connect_send(p2p, dev);
1132 		return 1;
1133 	}
1134 
1135 	return 0;
1136 }
1137 
1138 
p2p_scan_timeout(void * eloop_ctx,void * timeout_ctx)1139 static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1140 {
1141 	struct p2p_data *p2p = eloop_ctx;
1142 	int running;
1143 	p2p_dbg(p2p, "p2p_scan timeout (running=%d)", p2p->p2p_scan_running);
1144 	running = p2p->p2p_scan_running;
1145 	/* Make sure we recover from missed scan results callback */
1146 	p2p->p2p_scan_running = 0;
1147 
1148 	if (running)
1149 		p2p_run_after_scan(p2p);
1150 }
1151 
1152 
p2p_free_req_dev_types(struct p2p_data * p2p)1153 static void p2p_free_req_dev_types(struct p2p_data *p2p)
1154 {
1155 	p2p->num_req_dev_types = 0;
1156 	os_free(p2p->req_dev_types);
1157 	p2p->req_dev_types = NULL;
1158 }
1159 
1160 
p2ps_gen_hash(struct p2p_data * p2p,const char * str,u8 * hash)1161 static int p2ps_gen_hash(struct p2p_data *p2p, const char *str, u8 *hash)
1162 {
1163 	u8 buf[SHA256_MAC_LEN];
1164 	char str_buf[256];
1165 	const u8 *adv_array;
1166 	size_t i, adv_len;
1167 
1168 	if (!str || !hash)
1169 		return 0;
1170 
1171 	if (!str[0]) {
1172 		os_memcpy(hash, p2p->wild_card_hash, P2PS_HASH_LEN);
1173 		return 1;
1174 	}
1175 
1176 	adv_array = (u8 *) str_buf;
1177 	adv_len = os_strlen(str);
1178 	if (adv_len >= sizeof(str_buf))
1179 		return 0;
1180 
1181 	for (i = 0; i < adv_len; i++) {
1182 		if (str[i] >= 'A' && str[i] <= 'Z')
1183 			str_buf[i] = str[i] - 'A' + 'a';
1184 		else
1185 			str_buf[i] = str[i];
1186 	}
1187 
1188 	if (sha256_vector(1, &adv_array, &adv_len, buf))
1189 		return 0;
1190 
1191 	os_memcpy(hash, buf, P2PS_HASH_LEN);
1192 	return 1;
1193 }
1194 
1195 
p2p_find(struct p2p_data * p2p,unsigned int timeout,enum p2p_discovery_type type,unsigned int num_req_dev_types,const u8 * req_dev_types,const u8 * dev_id,unsigned int search_delay,u8 seek_count,const char ** seek,int freq,bool include_6ghz)1196 int p2p_find(struct p2p_data *p2p, unsigned int timeout,
1197 	     enum p2p_discovery_type type,
1198 	     unsigned int num_req_dev_types, const u8 *req_dev_types,
1199 	     const u8 *dev_id, unsigned int search_delay,
1200 	     u8 seek_count, const char **seek, int freq, bool include_6ghz)
1201 {
1202 	int res;
1203 	struct os_reltime start;
1204 
1205 	p2p_dbg(p2p, "Starting find (type=%d)", type);
1206 	if (p2p->p2p_scan_running) {
1207 		p2p_dbg(p2p, "p2p_scan is already running");
1208 	}
1209 
1210 	p2p_free_req_dev_types(p2p);
1211 	if (req_dev_types && num_req_dev_types) {
1212 		p2p->req_dev_types = os_memdup(req_dev_types,
1213 					       num_req_dev_types *
1214 					       WPS_DEV_TYPE_LEN);
1215 		if (p2p->req_dev_types == NULL)
1216 			return -1;
1217 		p2p->num_req_dev_types = num_req_dev_types;
1218 	}
1219 
1220 	if (dev_id) {
1221 		os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
1222 		p2p->find_dev_id = p2p->find_dev_id_buf;
1223 	} else
1224 		p2p->find_dev_id = NULL;
1225 	p2p->include_6ghz = p2p_wfd_enabled(p2p) && include_6ghz;
1226 	if (seek_count == 0 || !seek) {
1227 		/* Not an ASP search */
1228 		p2p->p2ps_seek = 0;
1229 	} else if (seek_count == 1 && seek && (!seek[0] || !seek[0][0])) {
1230 		/*
1231 		 * An empty seek string means no hash values, but still an ASP
1232 		 * search.
1233 		 */
1234 		p2p_dbg(p2p, "ASP search");
1235 		p2p->p2ps_seek_count = 0;
1236 		p2p->p2ps_seek = 1;
1237 	} else if (seek && seek_count <= P2P_MAX_QUERY_HASH) {
1238 		u8 buf[P2PS_HASH_LEN];
1239 		int i, count = 0;
1240 
1241 		for (i = 0; i < seek_count; i++) {
1242 			if (!p2ps_gen_hash(p2p, seek[i], buf))
1243 				continue;
1244 
1245 			p2p_dbg(p2p, "Seek service %s hash " MACSTR,
1246 				seek[i], MAC2STR(buf));
1247 			os_memcpy(&p2p->p2ps_seek_hash[count * P2PS_HASH_LEN],
1248 				  buf, P2PS_HASH_LEN);
1249 			count++;
1250 		}
1251 
1252 		p2p->p2ps_seek_count = count;
1253 		p2p->p2ps_seek = 1;
1254 	} else {
1255 		p2p->p2ps_seek_count = 0;
1256 		p2p->p2ps_seek = 1;
1257 	}
1258 
1259 	/* Special case to perform wildcard search */
1260 	if (p2p->p2ps_seek_count == 0 && p2p->p2ps_seek) {
1261 		p2p->p2ps_seek_count = 1;
1262 		os_memcpy(&p2p->p2ps_seek_hash, p2p->wild_card_hash,
1263 			  P2PS_HASH_LEN);
1264 	}
1265 
1266 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1267 	p2p_clear_timeout(p2p);
1268 	if (p2p->pending_listen_freq) {
1269 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_find");
1270 		p2p->pending_listen_freq = 0;
1271 	}
1272 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1273 	p2p->pending_listen_wait_drv = false;
1274 	p2p->find_pending_full = 0;
1275 	p2p->find_type = type;
1276 	if (freq != 2412 && freq != 2437 && freq != 2462 && freq != 60480)
1277 		p2p->find_specified_freq = freq;
1278 	else
1279 		p2p->find_specified_freq = 0;
1280 	p2p_device_clear_reported(p2p);
1281 	os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
1282 	p2p_set_state(p2p, P2P_SEARCH);
1283 	p2p->search_delay = search_delay;
1284 	p2p->in_search_delay = 0;
1285 	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1286 	p2p->last_p2p_find_timeout = timeout;
1287 	if (timeout)
1288 		eloop_register_timeout(timeout, 0, p2p_find_timeout,
1289 				       p2p, NULL);
1290 	os_get_reltime(&start);
1291 	switch (type) {
1292 	case P2P_FIND_START_WITH_FULL:
1293 		if (freq > 0) {
1294 			/*
1295 			 * Start with the specified channel and then move to
1296 			 * scans for social channels and this specific channel.
1297 			 */
1298 			res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx,
1299 						 P2P_SCAN_SPECIFIC, freq,
1300 						 p2p->num_req_dev_types,
1301 						 p2p->req_dev_types, dev_id,
1302 						 DEV_PW_DEFAULT,
1303 						 p2p->include_6ghz);
1304 			break;
1305 		}
1306 		/* fall through */
1307 	case P2P_FIND_PROGRESSIVE:
1308 		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
1309 					 p2p->num_req_dev_types,
1310 					 p2p->req_dev_types, dev_id,
1311 					 DEV_PW_DEFAULT, p2p->include_6ghz);
1312 		break;
1313 	case P2P_FIND_ONLY_SOCIAL:
1314 		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
1315 					 p2p->num_req_dev_types,
1316 					 p2p->req_dev_types, dev_id,
1317 					 DEV_PW_DEFAULT, p2p->include_6ghz);
1318 		break;
1319 	default:
1320 		return -1;
1321 	}
1322 
1323 	if (!res)
1324 		p2p->find_start = start;
1325 
1326 	if (res != 0 && p2p->p2p_scan_running) {
1327 		p2p_dbg(p2p, "Failed to start p2p_scan - another p2p_scan was already running");
1328 		/* wait for the previous p2p_scan to complete */
1329 		if (type == P2P_FIND_PROGRESSIVE ||
1330 		    (type == P2P_FIND_START_WITH_FULL && freq == 0))
1331 			p2p->find_pending_full = 1;
1332 		res = 0; /* do not report failure */
1333 	} else if (res != 0) {
1334 		p2p_dbg(p2p, "Failed to start p2p_scan");
1335 		p2p_set_state(p2p, P2P_IDLE);
1336 		eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1337 	}
1338 
1339 	return res;
1340 }
1341 
1342 
p2p_stop_find_for_freq(struct p2p_data * p2p,int freq)1343 void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
1344 {
1345 	p2p_dbg(p2p, "Stopping find");
1346 	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1347 	p2p_clear_timeout(p2p);
1348 	if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
1349 		p2p->cfg->find_stopped(p2p->cfg->cb_ctx);
1350 
1351 	p2p->p2ps_seek_count = 0;
1352 
1353 	p2p_set_state(p2p, P2P_IDLE);
1354 	p2p_free_req_dev_types(p2p);
1355 	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1356 	if (p2p->go_neg_peer)
1357 		p2p->go_neg_peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1358 	p2p->go_neg_peer = NULL;
1359 	p2p->sd_peer = NULL;
1360 	p2p->invite_peer = NULL;
1361 	p2p_stop_listen_for_freq(p2p, freq);
1362 	p2p->send_action_in_progress = 0;
1363 }
1364 
1365 
p2p_stop_listen_for_freq(struct p2p_data * p2p,int freq)1366 void p2p_stop_listen_for_freq(struct p2p_data *p2p, int freq)
1367 {
1368 	p2p_dbg(p2p,
1369 		"%s(freq=%d) pending_listen_freq=%d in_listen=%d drv_in_listen=%d",
1370 		__func__, freq, p2p->pending_listen_freq, p2p->in_listen,
1371 		p2p->drv_in_listen);
1372 	if (freq > 0 &&
1373 	    ((p2p->drv_in_listen == freq && p2p->in_listen) ||
1374 	     p2p->pending_listen_freq == (unsigned int) freq)) {
1375 		p2p_dbg(p2p, "Skip stop_listen since we are on correct channel for response");
1376 		return;
1377 	}
1378 	if (p2p->in_listen) {
1379 		p2p->in_listen = 0;
1380 		p2p_clear_timeout(p2p);
1381 	}
1382 	if (p2p->drv_in_listen) {
1383 		/*
1384 		 * The driver may not deliver callback to p2p_listen_end()
1385 		 * when the operation gets canceled, so clear the internal
1386 		 * variable that is tracking driver state.
1387 		 */
1388 		p2p_dbg(p2p, "Clear drv_in_listen (%d)", p2p->drv_in_listen);
1389 		p2p->drv_in_listen = 0;
1390 	}
1391 	if (p2p->pending_listen_freq &&
1392 	    p2p->pending_listen_freq != (unsigned int) freq &&
1393 	    !p2p->drv_in_listen && p2p->pending_listen_wait_drv) {
1394 		p2p_dbg(p2p,
1395 			"Clear pending_listen_freq since the started listen did not complete before being stopped");
1396 		p2p->pending_listen_freq = 0;
1397 	}
1398 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1399 	p2p->pending_listen_wait_drv = false;
1400 }
1401 
1402 
p2p_stop_listen(struct p2p_data * p2p)1403 void p2p_stop_listen(struct p2p_data *p2p)
1404 {
1405 	if (p2p->state != P2P_LISTEN_ONLY) {
1406 		p2p_dbg(p2p, "Skip stop_listen since not in listen_only state.");
1407 		return;
1408 	}
1409 
1410 	p2p_stop_listen_for_freq(p2p, 0);
1411 	p2p_set_state(p2p, P2P_IDLE);
1412 }
1413 
1414 
p2p_stop_find(struct p2p_data * p2p)1415 void p2p_stop_find(struct p2p_data *p2p)
1416 {
1417 	p2p->pending_listen_freq = 0;
1418 	p2p_stop_find_for_freq(p2p, 0);
1419 }
1420 
1421 
p2p_prepare_channel_pref(struct p2p_data * p2p,unsigned int force_freq,unsigned int pref_freq,int go)1422 static int p2p_prepare_channel_pref(struct p2p_data *p2p,
1423 				    unsigned int force_freq,
1424 				    unsigned int pref_freq, int go)
1425 {
1426 	u8 op_class, op_channel;
1427 	unsigned int freq = force_freq ? force_freq : pref_freq;
1428 
1429 	p2p_dbg(p2p, "Prepare channel pref - force_freq=%u pref_freq=%u go=%d",
1430 		force_freq, pref_freq, go);
1431 	if (p2p_freq_to_channel(freq, &op_class, &op_channel) < 0) {
1432 		p2p_dbg(p2p, "Unsupported frequency %u MHz", freq);
1433 		return -1;
1434 	}
1435 
1436 	if (!p2p_channels_includes(&p2p->cfg->channels, op_class, op_channel) &&
1437 	    (go || !p2p_channels_includes(&p2p->cfg->cli_channels, op_class,
1438 					  op_channel))) {
1439 		p2p_dbg(p2p, "Frequency %u MHz (oper_class %u channel %u) not allowed for P2P",
1440 			freq, op_class, op_channel);
1441 		return -1;
1442 	}
1443 
1444 	p2p->op_reg_class = op_class;
1445 	p2p->op_channel = op_channel;
1446 
1447 	if (force_freq) {
1448 		p2p->channels.reg_classes = 1;
1449 		p2p->channels.reg_class[0].channels = 1;
1450 		p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1451 		p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1452 	} else {
1453 		p2p_copy_channels(&p2p->channels, &p2p->cfg->channels,
1454 				  p2p->allow_6ghz);
1455 	}
1456 
1457 	return 0;
1458 }
1459 
1460 
p2p_prepare_channel_best(struct p2p_data * p2p)1461 static void p2p_prepare_channel_best(struct p2p_data *p2p)
1462 {
1463 	u8 op_class, op_channel;
1464 	const int op_classes_5ghz[] = { 124, 125, 115, 0 };
1465 	const int op_classes_ht40[] = { 126, 127, 116, 117, 0 };
1466 	const int op_classes_vht[] = { 128, 0 };
1467 	const int op_classes_edmg[] = { 181, 182, 183, 0 };
1468 	const int op_classes_6ghz[] = { 131, 0 };
1469 
1470 	p2p_dbg(p2p, "Prepare channel best");
1471 
1472 	if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
1473 	    p2p_supported_freq(p2p, p2p->best_freq_overall) &&
1474 	    p2p_freq_to_channel(p2p->best_freq_overall, &op_class, &op_channel)
1475 	    == 0) {
1476 		p2p_dbg(p2p, "Select best overall channel as operating channel preference");
1477 		p2p->op_reg_class = op_class;
1478 		p2p->op_channel = op_channel;
1479 	} else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
1480 		   p2p_supported_freq(p2p, p2p->best_freq_5) &&
1481 		   p2p_freq_to_channel(p2p->best_freq_5, &op_class, &op_channel)
1482 		   == 0) {
1483 		p2p_dbg(p2p, "Select best 5 GHz channel as operating channel preference");
1484 		p2p->op_reg_class = op_class;
1485 		p2p->op_channel = op_channel;
1486 	} else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_24 > 0 &&
1487 		   p2p_supported_freq(p2p, p2p->best_freq_24) &&
1488 		   p2p_freq_to_channel(p2p->best_freq_24, &op_class,
1489 				       &op_channel) == 0) {
1490 		p2p_dbg(p2p, "Select best 2.4 GHz channel as operating channel preference");
1491 		p2p->op_reg_class = op_class;
1492 		p2p->op_channel = op_channel;
1493 	} else if (p2p->cfg->num_pref_chan > 0 &&
1494 		   p2p_channels_includes(&p2p->cfg->channels,
1495 					 p2p->cfg->pref_chan[0].op_class,
1496 					 p2p->cfg->pref_chan[0].chan)) {
1497 		p2p_dbg(p2p, "Select first pref_chan entry as operating channel preference");
1498 		p2p->op_reg_class = p2p->cfg->pref_chan[0].op_class;
1499 		p2p->op_channel = p2p->cfg->pref_chan[0].chan;
1500 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_edmg,
1501 				      &p2p->op_reg_class, &p2p->op_channel) ==
1502 		   0) {
1503 		p2p_dbg(p2p, "Select possible EDMG channel (op_class %u channel %u) as operating channel preference",
1504 			p2p->op_reg_class, p2p->op_channel);
1505 	} else if (p2p->allow_6ghz &&
1506 		   (p2p_channel_select(&p2p->cfg->channels, op_classes_6ghz,
1507 				       &p2p->op_reg_class, &p2p->op_channel) ==
1508 		    0)) {
1509 		p2p_dbg(p2p, "Select possible 6 GHz channel (op_class %u channel %u) as operating channel preference",
1510 			p2p->op_reg_class, p2p->op_channel);
1511 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_vht,
1512 				      &p2p->op_reg_class, &p2p->op_channel) ==
1513 		   0) {
1514 		p2p_dbg(p2p, "Select possible VHT channel (op_class %u channel %u) as operating channel preference",
1515 			p2p->op_reg_class, p2p->op_channel);
1516 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_ht40,
1517 				      &p2p->op_reg_class, &p2p->op_channel) ==
1518 		   0) {
1519 		p2p_dbg(p2p, "Select possible HT40 channel (op_class %u channel %u) as operating channel preference",
1520 			p2p->op_reg_class, p2p->op_channel);
1521 	} else if (p2p_channel_select(&p2p->cfg->channels, op_classes_5ghz,
1522 				      &p2p->op_reg_class, &p2p->op_channel) ==
1523 		   0) {
1524 		p2p_dbg(p2p, "Select possible 5 GHz channel (op_class %u channel %u) as operating channel preference",
1525 			p2p->op_reg_class, p2p->op_channel);
1526 	} else if (p2p_channels_includes(&p2p->cfg->channels,
1527 					 p2p->cfg->op_reg_class,
1528 					 p2p->cfg->op_channel)) {
1529 		p2p_dbg(p2p, "Select pre-configured channel as operating channel preference");
1530 		p2p->op_reg_class = p2p->cfg->op_reg_class;
1531 		p2p->op_channel = p2p->cfg->op_channel;
1532 	} else if (p2p_channel_random_social(&p2p->cfg->channels,
1533 					     &p2p->op_reg_class,
1534 					     &p2p->op_channel,
1535 					     NULL, NULL) == 0) {
1536 		p2p_dbg(p2p, "Select random available social channel (op_class %u channel %u) as operating channel preference",
1537 			p2p->op_reg_class, p2p->op_channel);
1538 	} else {
1539 		/* Select any random available channel from the first available
1540 		 * operating class */
1541 		if (p2p_channel_select(&p2p->cfg->channels, NULL,
1542 				       &p2p->op_reg_class,
1543 				       &p2p->op_channel) == 0)
1544 			p2p_dbg(p2p,
1545 				"Select random available channel %d from operating class %d as operating channel preference",
1546 				p2p->op_channel, p2p->op_reg_class);
1547 	}
1548 
1549 	p2p_copy_channels(&p2p->channels, &p2p->cfg->channels, p2p->allow_6ghz);
1550 }
1551 
1552 
1553 /**
1554  * p2p_prepare_channel - Select operating channel for GO Negotiation or P2PS PD
1555  * @p2p: P2P module context from p2p_init()
1556  * @dev: Selected peer device
1557  * @force_freq: Forced frequency in MHz or 0 if not forced
1558  * @pref_freq: Preferred frequency in MHz or 0 if no preference
1559  * @go: Whether the local end will be forced to be GO
1560  * Returns: 0 on success, -1 on failure (channel not supported for P2P)
1561  *
1562  * This function is used to do initial operating channel selection for GO
1563  * Negotiation prior to having received peer information or for P2PS PD
1564  * signalling. The selected channel may be further optimized in
1565  * p2p_reselect_channel() once the peer information is available.
1566  */
p2p_prepare_channel(struct p2p_data * p2p,struct p2p_device * dev,unsigned int force_freq,unsigned int pref_freq,int go)1567 int p2p_prepare_channel(struct p2p_data *p2p, struct p2p_device *dev,
1568 			unsigned int force_freq, unsigned int pref_freq, int go)
1569 {
1570 	p2p_dbg(p2p, "Prepare channel - force_freq=%u pref_freq=%u go=%d",
1571 		force_freq, pref_freq, go);
1572 	if (force_freq || pref_freq) {
1573 		if (p2p_prepare_channel_pref(p2p, force_freq, pref_freq, go) <
1574 		    0)
1575 			return -1;
1576 	} else {
1577 		p2p_prepare_channel_best(p2p);
1578 	}
1579 	p2p_channels_dump(p2p, "prepared channels", &p2p->channels);
1580 	if (go)
1581 		p2p_channels_remove_freqs(&p2p->channels, &p2p->no_go_freq);
1582 	else if (!force_freq)
1583 		p2p_channels_union_inplace(&p2p->channels,
1584 					   &p2p->cfg->cli_channels);
1585 	p2p_channels_dump(p2p, "after go/cli filter/add", &p2p->channels);
1586 
1587 	p2p_dbg(p2p, "Own preference for operation channel: Operating Class %u Channel %u%s",
1588 		p2p->op_reg_class, p2p->op_channel,
1589 		force_freq ? " (forced)" : "");
1590 
1591 	if (force_freq)
1592 		dev->flags |= P2P_DEV_FORCE_FREQ;
1593 	else
1594 		dev->flags &= ~P2P_DEV_FORCE_FREQ;
1595 
1596 	return 0;
1597 }
1598 
1599 
p2p_set_dev_persistent(struct p2p_device * dev,int persistent_group)1600 static void p2p_set_dev_persistent(struct p2p_device *dev,
1601 				   int persistent_group)
1602 {
1603 	switch (persistent_group) {
1604 	case 0:
1605 		dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
1606 				P2P_DEV_PREFER_PERSISTENT_RECONN);
1607 		break;
1608 	case 1:
1609 		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1610 		dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
1611 		break;
1612 	case 2:
1613 		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
1614 			P2P_DEV_PREFER_PERSISTENT_RECONN;
1615 		break;
1616 	}
1617 }
1618 
1619 
p2p_connect(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,int pd_before_go_neg,unsigned int pref_freq,u16 oob_pw_id,bool p2p2,u16 bootstrap,const char * password)1620 int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1621 		enum p2p_wps_method wps_method,
1622 		int go_intent, const u8 *own_interface_addr,
1623 		unsigned int force_freq, int persistent_group,
1624 		const u8 *force_ssid, size_t force_ssid_len,
1625 		int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
1626 		bool p2p2, u16 bootstrap, const char *password)
1627 {
1628 	struct p2p_device *dev;
1629 
1630 	p2p_dbg(p2p, "Request to start group negotiation - peer=" MACSTR
1631 		"  GO Intent=%d  Intended Interface Address=" MACSTR
1632 		" wps_method=%d persistent_group=%d pd_before_go_neg=%d "
1633 		"oob_pw_id=%u allow_6ghz=%d",
1634 		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1635 		wps_method, persistent_group, pd_before_go_neg, oob_pw_id,
1636 		p2p->allow_6ghz);
1637 
1638 	dev = p2p_get_device(p2p, peer_addr);
1639 	if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1640 		p2p_dbg(p2p, "Cannot connect to unknown P2P Device " MACSTR,
1641 			MAC2STR(peer_addr));
1642 		return -1;
1643 	}
1644 
1645 	if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq,
1646 				go_intent == 15) < 0)
1647 		return -1;
1648 
1649 	if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
1650 		if (!(dev->info.dev_capab &
1651 		      P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
1652 			p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1653 				" that is in a group and is not discoverable",
1654 				MAC2STR(peer_addr));
1655 			return -1;
1656 		}
1657 		if (dev->oper_freq <= 0) {
1658 			p2p_dbg(p2p, "Cannot connect to P2P Device " MACSTR
1659 				" with incomplete information",
1660 				MAC2STR(peer_addr));
1661 			return -1;
1662 		}
1663 
1664 		/*
1665 		 * First, try to connect directly. If the peer does not
1666 		 * acknowledge frames, assume it is sleeping and use device
1667 		 * discoverability via the GO at that point.
1668 		 */
1669 	}
1670 
1671 	p2p->ssid_set = 0;
1672 	if (force_ssid) {
1673 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1674 				  force_ssid, force_ssid_len);
1675 		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1676 		p2p->ssid_len = force_ssid_len;
1677 		p2p->ssid_set = 1;
1678 	}
1679 
1680 	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1681 	dev->flags &= ~P2P_DEV_USER_REJECTED;
1682 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1683 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1684 	if (pd_before_go_neg)
1685 		dev->flags |= P2P_DEV_PD_BEFORE_GO_NEG;
1686 	else {
1687 		dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
1688 		/*
1689 		 * Assign dialog token and tie breaker here to use the same
1690 		 * values in each retry within the same GO Negotiation exchange.
1691 		 */
1692 		dev->dialog_token++;
1693 		if (dev->dialog_token == 0)
1694 			dev->dialog_token = 1;
1695 		dev->tie_breaker = p2p->next_tie_breaker;
1696 		p2p->next_tie_breaker = !p2p->next_tie_breaker;
1697 	}
1698 	dev->connect_reqs = 0;
1699 	dev->go_neg_req_sent = 0;
1700 	dev->go_state = UNKNOWN_GO;
1701 	p2p_set_dev_persistent(dev, persistent_group);
1702 	p2p->go_intent = go_intent;
1703 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1704 
1705 	if (p2p->state != P2P_IDLE)
1706 		p2p_stop_find(p2p);
1707 
1708 	dev->wps_method = wps_method;
1709 	dev->oob_pw_id = oob_pw_id;
1710 	dev->p2p2 = p2p2;
1711 	dev->req_bootstrap_method = bootstrap;
1712 	if (password && os_strlen(password) < sizeof(dev->password))
1713 		os_strlcpy(dev->password, password, sizeof(dev->password));
1714 	dev->status = P2P_SC_SUCCESS;
1715 
1716 	if (p2p->p2p_scan_running) {
1717 		p2p_dbg(p2p, "p2p_scan running - delay connect send");
1718 		p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1719 		os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1720 		return 0;
1721 	}
1722 
1723 	return p2p_connect_send(p2p, dev);
1724 }
1725 
1726 
p2p_authorize(struct p2p_data * p2p,const u8 * peer_addr,enum p2p_wps_method wps_method,int go_intent,const u8 * own_interface_addr,unsigned int force_freq,int persistent_group,const u8 * force_ssid,size_t force_ssid_len,unsigned int pref_freq,u16 oob_pw_id,u16 bootstrap,const char * password)1727 int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1728 		  enum p2p_wps_method wps_method,
1729 		  int go_intent, const u8 *own_interface_addr,
1730 		  unsigned int force_freq, int persistent_group,
1731 		  const u8 *force_ssid, size_t force_ssid_len,
1732 		  unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
1733 		  const char *password)
1734 {
1735 	struct p2p_device *dev;
1736 
1737 	p2p_dbg(p2p, "Request to authorize group negotiation - peer=" MACSTR
1738 		"  GO Intent=%d  Intended Interface Address=" MACSTR
1739 		" wps_method=%d  persistent_group=%d oob_pw_id=%u allow_6ghz=%d",
1740 		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1741 		wps_method, persistent_group, oob_pw_id, p2p->allow_6ghz);
1742 
1743 	dev = p2p_get_device(p2p, peer_addr);
1744 	if (dev == NULL) {
1745 		p2p_dbg(p2p, "Cannot authorize unknown P2P Device " MACSTR,
1746 			MAC2STR(peer_addr));
1747 		return -1;
1748 	}
1749 
1750 	if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq, go_intent ==
1751 				15) < 0)
1752 		return -1;
1753 
1754 	p2p->ssid_set = 0;
1755 	if (force_ssid) {
1756 		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1757 				  force_ssid, force_ssid_len);
1758 		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1759 		p2p->ssid_len = force_ssid_len;
1760 		p2p->ssid_set = 1;
1761 	}
1762 
1763 	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1764 	dev->flags &= ~P2P_DEV_USER_REJECTED;
1765 	dev->go_neg_req_sent = 0;
1766 	dev->go_state = UNKNOWN_GO;
1767 	dev->req_bootstrap_method = bootstrap;
1768 
1769 	if (password && os_strlen(password) < sizeof(dev->password))
1770 		os_strlcpy(dev->password, password, sizeof(dev->password));
1771 	p2p_set_dev_persistent(dev, persistent_group);
1772 	p2p->go_intent = go_intent;
1773 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1774 
1775 	dev->wps_method = wps_method;
1776 	dev->oob_pw_id = oob_pw_id;
1777 	dev->status = P2P_SC_SUCCESS;
1778 
1779 	return 0;
1780 }
1781 
1782 
p2p_add_dev_info(struct p2p_data * p2p,const u8 * addr,struct p2p_device * dev,struct p2p_message * msg)1783 void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1784 		      struct p2p_device *dev, struct p2p_message *msg)
1785 {
1786 	os_get_reltime(&dev->last_seen);
1787 
1788 	p2p_copy_wps_info(p2p, dev, 0, msg);
1789 
1790 	if (msg->listen_channel) {
1791 		int freq;
1792 		freq = p2p_channel_to_freq(msg->listen_channel[3],
1793 					   msg->listen_channel[4]);
1794 		if (freq < 0) {
1795 			p2p_dbg(p2p, "Unknown peer Listen channel: "
1796 				"country=%c%c(0x%02x) reg_class=%u channel=%u",
1797 				msg->listen_channel[0],
1798 				msg->listen_channel[1],
1799 				msg->listen_channel[2],
1800 				msg->listen_channel[3],
1801 				msg->listen_channel[4]);
1802 		} else {
1803 			p2p_dbg(p2p, "Update peer " MACSTR
1804 				" Listen channel: %u -> %u MHz",
1805 				MAC2STR(dev->info.p2p_device_addr),
1806 				dev->listen_freq, freq);
1807 			dev->listen_freq = freq;
1808 		}
1809 	}
1810 
1811 	if (msg->wfd_subelems) {
1812 		wpabuf_free(dev->info.wfd_subelems);
1813 		dev->info.wfd_subelems = wpabuf_dup(msg->wfd_subelems);
1814 	}
1815 
1816 	if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1817 		dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1818 		p2p_dbg(p2p, "Completed device entry based on data from GO Negotiation Request");
1819 	} else {
1820 		p2p_dbg(p2p, "Created device entry based on GO Neg Req: "
1821 			MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1822 			"listen_freq=%d",
1823 			MAC2STR(dev->info.p2p_device_addr),
1824 			dev->info.dev_capab, dev->info.group_capab,
1825 			dev->info.device_name, dev->listen_freq);
1826 	}
1827 
1828 	dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1829 
1830 	if (dev->flags & P2P_DEV_USER_REJECTED) {
1831 		p2p_dbg(p2p, "Do not report rejected device");
1832 		return;
1833 	}
1834 
1835 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1836 			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
1837 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
1838 }
1839 
1840 
p2p_build_ssid(struct p2p_data * p2p,u8 * ssid,size_t * ssid_len)1841 void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1842 {
1843 	os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1844 	p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1845 	os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1846 		  p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1847 	*ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1848 }
1849 
1850 
p2p_go_params(struct p2p_data * p2p,struct p2p_go_neg_results * params)1851 int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1852 {
1853 	if (p2p->ssid_set) {
1854 		os_memcpy(params->ssid, p2p->ssid, p2p->ssid_len);
1855 		params->ssid_len = p2p->ssid_len;
1856 	} else {
1857 		p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1858 	}
1859 	p2p->ssid_set = 0;
1860 
1861 	params->cipher = WPA_CIPHER_CCMP;
1862 	if (p2p->cfg->pairing_config.pasn_type & 0xc)
1863 		params->cipher |= WPA_CIPHER_GCMP_256;
1864 
1865 	p2p_random(params->passphrase, p2p->cfg->passphrase_len);
1866 	params->passphrase[p2p->cfg->passphrase_len] = '\0';
1867 
1868 	if (params->p2p2) {
1869 		os_strlcpy(p2p->dev_sae_password, params->passphrase,
1870 			   sizeof(p2p->dev_sae_password));
1871 		os_strlcpy(params->sae_password, p2p->dev_sae_password,
1872 			   sizeof(params->sae_password));
1873 	}
1874 
1875 	return 0;
1876 }
1877 
1878 
p2p_set_go_role(struct p2p_data * p2p,bool val)1879 void p2p_set_go_role(struct p2p_data *p2p, bool val)
1880 {
1881 	p2p->go_role = val;
1882 }
1883 
1884 
p2p_go_complete(struct p2p_data * p2p,struct p2p_device * peer)1885 void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1886 {
1887 	struct p2p_go_neg_results res;
1888 	int go = peer->go_state == LOCAL_GO;
1889 	struct p2p_channels intersection;
1890 
1891 	p2p_dbg(p2p, "GO Negotiation with " MACSTR " completed (%s will be GO)",
1892 		MAC2STR(peer->info.p2p_device_addr), go ? "local end" : "peer");
1893 
1894 	os_memset(&res, 0, sizeof(res));
1895 	res.role_go = go;
1896 	os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
1897 	os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1898 	res.wps_method = peer->wps_method;
1899 	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
1900 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
1901 			res.persistent_group = 2;
1902 		else
1903 			res.persistent_group = 1;
1904 	}
1905 
1906 	if (go) {
1907 		/* Setup AP mode for WPS provisioning */
1908 		res.freq = p2p_channel_to_freq(p2p->op_reg_class,
1909 					       p2p->op_channel);
1910 		os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1911 		res.ssid_len = p2p->ssid_len;
1912 		p2p_random(res.passphrase, p2p->cfg->passphrase_len);
1913 		res.passphrase[p2p->cfg->passphrase_len] = '\0';
1914 	} else {
1915 		res.freq = peer->oper_freq;
1916 		if (p2p->ssid_len) {
1917 			os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1918 			res.ssid_len = p2p->ssid_len;
1919 		}
1920 	}
1921 
1922 	p2p_channels_dump(p2p, "own channels", &p2p->channels);
1923 	p2p_channels_dump(p2p, "peer channels", &peer->channels);
1924 	p2p_channels_intersect(&p2p->channels, &peer->channels,
1925 			       &intersection);
1926 	if (go) {
1927 		p2p_channels_remove_freqs(&intersection, &p2p->no_go_freq);
1928 		p2p_channels_dump(p2p, "intersection after no-GO removal",
1929 				  &intersection);
1930 	}
1931 
1932 	p2p_channels_to_freqs(&intersection, res.freq_list,
1933 			      P2P_MAX_CHANNELS);
1934 
1935 	res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1936 
1937 	p2p_clear_timeout(p2p);
1938 	p2p->ssid_set = 0;
1939 	peer->go_neg_req_sent = 0;
1940 	peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE;
1941 	peer->wps_method = WPS_NOT_READY;
1942 	peer->oob_pw_id = 0;
1943 	wpabuf_free(peer->go_neg_conf);
1944 	peer->go_neg_conf = NULL;
1945 
1946 #ifdef CONFIG_PASN
1947 	if (peer->p2p2 && peer->pasn) {
1948 		res.p2p2 = peer->p2p2;
1949 		res.akmp = peer->pasn->akmp;
1950 		res.cipher = peer->pasn->cipher;
1951 
1952 		if (res.akmp == WPA_KEY_MGMT_PASN) {
1953 			if (go) {
1954 				os_strlcpy(res.sae_password,
1955 					   p2p->dev_sae_password,
1956 					   sizeof(res.sae_password));
1957 			} else {
1958 				if (!os_strlen(p2p->peer_sae_password)) {
1959 					p2p_dbg(p2p, "No password from peer GO for P2P2 group formation");
1960 					return;
1961 				}
1962 				os_strlcpy(res.sae_password,
1963 					   p2p->peer_sae_password,
1964 					   sizeof(res.sae_password));
1965 			}
1966 		} else if (res.akmp == WPA_KEY_MGMT_SAE) {
1967 			if (peer->role == P2P_ROLE_PAIRING_INITIATOR) {
1968 				pasn_initiator_pmksa_cache_get(
1969 					peer->pasn->pmksa,
1970 					peer->pasn->peer_addr,
1971 					res.pmkid, res.pmk, &res.pmk_len);
1972 			} else {
1973 				pasn_responder_pmksa_cache_get(
1974 					peer->pasn->pmksa,
1975 					peer->pasn->peer_addr,
1976 					res.pmkid, res.pmk, &res.pmk_len);
1977 			}
1978 		}
1979 
1980 		os_memset(p2p->dev_sae_password, 0,
1981 			  sizeof(p2p->dev_sae_password));
1982 		os_memset(p2p->peer_sae_password, 0,
1983 			  sizeof(p2p->peer_sae_password));
1984 		wpa_pasn_reset(peer->pasn);
1985 	}
1986 #endif /* CONFIG_PASN */
1987 
1988 	if (p2p->go_role && peer->p2p2) {
1989 		p2p->cfg->set_go_security_config(p2p->cfg->cb_ctx, &res);
1990 		p2p->go_role = false;
1991 	} else {
1992 		p2p_set_state(p2p, P2P_PROVISIONING);
1993 		p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
1994 	}
1995 
1996 	forced_memzero(&res, sizeof(res));
1997 }
1998 
1999 
p2p_rx_p2p_action(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)2000 static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
2001 			      const u8 *data, size_t len, int rx_freq)
2002 {
2003 	p2p_dbg(p2p, "RX P2P Public Action from " MACSTR, MAC2STR(sa));
2004 	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
2005 
2006 	if (len < 1)
2007 		return;
2008 
2009 	switch (data[0]) {
2010 	case P2P_GO_NEG_REQ:
2011 		p2p_handle_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
2012 		break;
2013 	case P2P_GO_NEG_RESP:
2014 		p2p_handle_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
2015 		break;
2016 	case P2P_GO_NEG_CONF:
2017 		p2p_handle_go_neg_conf(p2p, sa, data + 1, len - 1, false);
2018 		break;
2019 	case P2P_INVITATION_REQ:
2020 		p2p_handle_invitation_req(p2p, sa, data + 1, len - 1, rx_freq);
2021 		break;
2022 	case P2P_INVITATION_RESP:
2023 		p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
2024 		break;
2025 	case P2P_PROV_DISC_REQ:
2026 		p2p_handle_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2027 		break;
2028 	case P2P_PROV_DISC_RESP:
2029 		p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1, rx_freq);
2030 		break;
2031 	case P2P_DEV_DISC_REQ:
2032 		p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
2033 		break;
2034 	case P2P_DEV_DISC_RESP:
2035 		p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
2036 		break;
2037 	default:
2038 		p2p_dbg(p2p, "Unsupported P2P Public Action frame type %d",
2039 			data[0]);
2040 		break;
2041 	}
2042 }
2043 
2044 
p2p_rx_action_public(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,const u8 * data,size_t len,int freq)2045 static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
2046 				 const u8 *sa, const u8 *bssid, const u8 *data,
2047 				 size_t len, int freq)
2048 {
2049 	if (len < 1)
2050 		return;
2051 
2052 	switch (data[0]) {
2053 	case WLAN_PA_VENDOR_SPECIFIC:
2054 		data++;
2055 		len--;
2056 		if (len < 4)
2057 			return;
2058 		if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2059 			return;
2060 
2061 		data += 4;
2062 		len -= 4;
2063 
2064 		p2p_rx_p2p_action(p2p, sa, data, len, freq);
2065 		break;
2066 	case WLAN_PA_GAS_INITIAL_REQ:
2067 		p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
2068 		break;
2069 	case WLAN_PA_GAS_INITIAL_RESP:
2070 		p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
2071 		break;
2072 	case WLAN_PA_GAS_COMEBACK_REQ:
2073 		p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
2074 		break;
2075 	case WLAN_PA_GAS_COMEBACK_RESP:
2076 		p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
2077 		break;
2078 	}
2079 }
2080 
2081 
p2p_rx_action(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * bssid,u8 category,const u8 * data,size_t len,int freq)2082 void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
2083 		   const u8 *bssid, u8 category,
2084 		   const u8 *data, size_t len, int freq)
2085 {
2086 	if (category == WLAN_ACTION_PUBLIC) {
2087 		p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
2088 		return;
2089 	}
2090 
2091 	if (category != WLAN_ACTION_VENDOR_SPECIFIC)
2092 		return;
2093 
2094 	if (len < 4)
2095 		return;
2096 
2097 	if (WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE)
2098 		return;
2099 	data += 4;
2100 	len -= 4;
2101 
2102 	/* P2P action frame */
2103 	p2p_dbg(p2p, "RX P2P Action from " MACSTR, MAC2STR(sa));
2104 	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
2105 
2106 	if (len < 1)
2107 		return;
2108 	switch (data[0]) {
2109 	case P2P_NOA:
2110 		p2p_dbg(p2p, "Received P2P Action - Notice of Absence");
2111 		/* TODO */
2112 		break;
2113 	case P2P_PRESENCE_REQ:
2114 		p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
2115 		break;
2116 	case P2P_PRESENCE_RESP:
2117 		p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
2118 		break;
2119 	case P2P_GO_DISC_REQ:
2120 		p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
2121 		break;
2122 	default:
2123 		p2p_dbg(p2p, "Received P2P Action - unknown type %u", data[0]);
2124 		break;
2125 	}
2126 }
2127 
2128 
p2p_go_neg_start(void * eloop_ctx,void * timeout_ctx)2129 static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
2130 {
2131 	struct p2p_data *p2p = eloop_ctx;
2132 	if (p2p->go_neg_peer == NULL)
2133 		return;
2134 	if (p2p->pending_listen_freq) {
2135 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_go_neg_start");
2136 		p2p->pending_listen_freq = 0;
2137 	}
2138 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2139 	p2p->pending_listen_wait_drv = false;
2140 	p2p->go_neg_peer->status = P2P_SC_SUCCESS;
2141 	/*
2142 	 * Set new timeout to make sure a previously set one does not expire
2143 	 * too quickly while waiting for the GO Negotiation to complete.
2144 	 */
2145 	p2p_set_timeout(p2p, 0, 500000);
2146 	p2p_connect_send(p2p, p2p->go_neg_peer);
2147 }
2148 
2149 
p2p_invite_start(void * eloop_ctx,void * timeout_ctx)2150 static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
2151 {
2152 	struct p2p_data *p2p = eloop_ctx;
2153 	if (p2p->invite_peer == NULL)
2154 		return;
2155 	if (p2p->pending_listen_freq) {
2156 		p2p_dbg(p2p, "Clear pending_listen_freq for p2p_invite_start");
2157 		p2p->pending_listen_freq = 0;
2158 	}
2159 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
2160 	p2p->pending_listen_wait_drv = false;
2161 	p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr,
2162 			p2p->invite_dev_pw_id);
2163 }
2164 
2165 
p2p_add_dev_from_probe_req(struct p2p_data * p2p,const u8 * addr,const u8 * ie,size_t ie_len)2166 static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
2167 				       const u8 *ie, size_t ie_len)
2168 {
2169 	struct p2p_message msg;
2170 	struct p2p_device *dev;
2171 
2172 	os_memset(&msg, 0, sizeof(msg));
2173 	if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
2174 	{
2175 		p2p_parse_free(&msg);
2176 		return; /* not a P2P probe */
2177 	}
2178 
2179 	if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
2180 	    os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
2181 	    != 0) {
2182 		/* The Probe Request is not part of P2P Device Discovery. It is
2183 		 * not known whether the source address of the frame is the P2P
2184 		 * Device Address or P2P Interface Address. Do not add a new
2185 		 * peer entry based on this frames.
2186 		 */
2187 		p2p_parse_free(&msg);
2188 		return;
2189 	}
2190 
2191 	dev = p2p_get_device(p2p, addr);
2192 	if (dev) {
2193 		if (msg.listen_channel) {
2194 			int freq;
2195 
2196 			if (dev->country[0] == 0)
2197 				os_memcpy(dev->country, msg.listen_channel, 3);
2198 
2199 			freq = p2p_channel_to_freq(msg.listen_channel[3],
2200 						   msg.listen_channel[4]);
2201 
2202 			if (freq > 0 && dev->listen_freq != freq) {
2203 				p2p_dbg(p2p,
2204 					"Updated peer " MACSTR " Listen channel (Probe Request): %d -> %d MHz",
2205 					MAC2STR(addr), dev->listen_freq, freq);
2206 				dev->listen_freq = freq;
2207 			}
2208 		}
2209 
2210 		p2p_update_peer_6ghz_capab(dev, &msg);
2211 		os_get_reltime(&dev->last_seen);
2212 		p2p_parse_free(&msg);
2213 		return; /* already known */
2214 	}
2215 
2216 	dev = p2p_create_device(p2p, addr);
2217 	if (dev == NULL) {
2218 		p2p_parse_free(&msg);
2219 		return;
2220 	}
2221 
2222 	os_get_reltime(&dev->last_seen);
2223 	dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
2224 
2225 	if (msg.listen_channel) {
2226 		os_memcpy(dev->country, msg.listen_channel, 3);
2227 		dev->listen_freq = p2p_channel_to_freq(msg.listen_channel[3],
2228 						       msg.listen_channel[4]);
2229 	}
2230 
2231 	p2p_copy_wps_info(p2p, dev, 1, &msg);
2232 
2233 	if (msg.wfd_subelems) {
2234 		wpabuf_free(dev->info.wfd_subelems);
2235 		dev->info.wfd_subelems = wpabuf_dup(msg.wfd_subelems);
2236 	}
2237 
2238 	p2p_parse_free(&msg);
2239 
2240 	p2p_dbg(p2p, "Created device entry based on Probe Req: " MACSTR
2241 		" dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
2242 		MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
2243 		dev->info.group_capab, dev->info.device_name,
2244 		dev->listen_freq);
2245 }
2246 
2247 
p2p_add_dev_from_go_neg_req(struct p2p_data * p2p,const u8 * addr,struct p2p_message * msg)2248 struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
2249 						const u8 *addr,
2250 						struct p2p_message *msg)
2251 {
2252 	struct p2p_device *dev;
2253 
2254 	dev = p2p_get_device(p2p, addr);
2255 	if (dev) {
2256 		os_get_reltime(&dev->last_seen);
2257 		return dev; /* already known */
2258 	}
2259 
2260 	dev = p2p_create_device(p2p, addr);
2261 	if (dev == NULL)
2262 		return NULL;
2263 
2264 	p2p_add_dev_info(p2p, addr, dev, msg);
2265 
2266 	return dev;
2267 }
2268 
2269 
dev_type_match(const u8 * dev_type,const u8 * req_dev_type)2270 static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
2271 {
2272 	if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
2273 		return 1;
2274 	if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
2275 	    WPA_GET_BE32(&req_dev_type[2]) == 0 &&
2276 	    WPA_GET_BE16(&req_dev_type[6]) == 0)
2277 		return 1; /* Category match with wildcard OUI/sub-category */
2278 	return 0;
2279 }
2280 
2281 
dev_type_list_match(const u8 * dev_type,const u8 * req_dev_type[],size_t num_req_dev_type)2282 int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
2283 			size_t num_req_dev_type)
2284 {
2285 	size_t i;
2286 	for (i = 0; i < num_req_dev_type; i++) {
2287 		if (dev_type_match(dev_type, req_dev_type[i]))
2288 			return 1;
2289 	}
2290 	return 0;
2291 }
2292 
2293 
2294 /**
2295  * p2p_match_dev_type - Match local device type with requested type
2296  * @p2p: P2P module context from p2p_init()
2297  * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
2298  * Returns: 1 on match, 0 on mismatch
2299  *
2300  * This function can be used to match the Requested Device Type attribute in
2301  * WPS IE with the local device types for deciding whether to reply to a Probe
2302  * Request frame.
2303  */
p2p_match_dev_type(struct p2p_data * p2p,struct wpabuf * wps)2304 int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
2305 {
2306 	struct wps_parse_attr attr;
2307 	size_t i;
2308 
2309 	if (wps_parse_msg(wps, &attr))
2310 		return 1; /* assume no Requested Device Type attributes */
2311 
2312 	if (attr.num_req_dev_type == 0)
2313 		return 1; /* no Requested Device Type attributes -> match */
2314 
2315 	if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
2316 				attr.num_req_dev_type))
2317 		return 1; /* Own Primary Device Type matches */
2318 
2319 	for (i = 0; i < p2p->cfg->num_sec_dev_types; i++) {
2320 		if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
2321 					attr.req_dev_type,
2322 					attr.num_req_dev_type))
2323 			return 1; /* Own Secondary Device Type matches */
2324 	}
2325 
2326 	/* No matching device type found */
2327 	return 0;
2328 }
2329 
2330 
p2p_build_probe_resp_ies(struct p2p_data * p2p,const u8 * query_hash,u8 query_count)2331 struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p,
2332 					 const u8 *query_hash,
2333 					 u8 query_count)
2334 {
2335 	struct wpabuf *buf;
2336 	u8 *len;
2337 	int pw_id = -1;
2338 	size_t extra = 0;
2339 
2340 #ifdef CONFIG_WIFI_DISPLAY
2341 	if (p2p->wfd_ie_probe_resp)
2342 		extra = wpabuf_len(p2p->wfd_ie_probe_resp);
2343 #endif /* CONFIG_WIFI_DISPLAY */
2344 
2345 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2346 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2347 
2348 	if (query_count)
2349 		extra += MAX_SVC_ADV_IE_LEN;
2350 
2351 	buf = wpabuf_alloc(1000 + extra);
2352 	if (buf == NULL)
2353 		return NULL;
2354 
2355 	if (p2p->go_neg_peer) {
2356 		/* Advertise immediate availability of WPS credential */
2357 		pw_id = p2p_wps_method_pw_id(p2p->go_neg_peer->wps_method);
2358 	}
2359 
2360 	if (p2p_build_wps_ie(p2p, buf, pw_id, 1) < 0) {
2361 		p2p_dbg(p2p, "Failed to build WPS IE for Probe Response");
2362 		wpabuf_free(buf);
2363 		return NULL;
2364 	}
2365 
2366 #ifdef CONFIG_WIFI_DISPLAY
2367 	if (p2p->wfd_ie_probe_resp)
2368 		wpabuf_put_buf(buf, p2p->wfd_ie_probe_resp);
2369 #endif /* CONFIG_WIFI_DISPLAY */
2370 
2371 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P])
2372 		wpabuf_put_buf(buf,
2373 			       p2p->vendor_elem[VENDOR_ELEM_PROBE_RESP_P2P]);
2374 
2375 	/* P2P IE */
2376 	len = p2p_buf_add_ie_hdr(buf);
2377 	p2p_buf_add_capability(buf, p2p->dev_capab &
2378 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
2379 	if (p2p->ext_listen_interval)
2380 		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
2381 					      p2p->ext_listen_interval);
2382 	p2p_buf_add_device_info(buf, p2p, NULL);
2383 	p2p_buf_update_ie_hdr(buf, len);
2384 
2385 	if (query_count) {
2386 		p2p_buf_add_service_instance(buf, p2p, query_count, query_hash,
2387 					     p2p->p2ps_adv_list);
2388 	}
2389 
2390 	return buf;
2391 }
2392 
p2p_build_probe_resp_buf(struct p2p_data * p2p,struct wpabuf * buf,struct wpabuf * ies,const u8 * addr,int rx_freq)2393 static int p2p_build_probe_resp_buf(struct p2p_data *p2p, struct wpabuf *buf,
2394 				    struct wpabuf *ies,
2395 				    const u8 *addr, int rx_freq)
2396 {
2397 	struct ieee80211_mgmt *resp;
2398 	u8 channel, op_class;
2399 
2400 	resp = wpabuf_put(buf, offsetof(struct ieee80211_mgmt,
2401 					u.probe_resp.variable));
2402 
2403 	resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
2404 					   (WLAN_FC_STYPE_PROBE_RESP << 4));
2405 	os_memcpy(resp->da, addr, ETH_ALEN);
2406 	os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
2407 	os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
2408 	resp->u.probe_resp.beacon_int = host_to_le16(100);
2409 	/* hardware or low-level driver will setup seq_ctrl and timestamp */
2410 	resp->u.probe_resp.capab_info =
2411 	    host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
2412 		     WLAN_CAPABILITY_PRIVACY |
2413 		     WLAN_CAPABILITY_SHORT_SLOT_TIME);
2414 
2415 	wpabuf_put_u8(buf, WLAN_EID_SSID);
2416 	wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
2417 	wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
2418 
2419 	wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
2420 	wpabuf_put_u8(buf, 8);
2421 	wpabuf_put_u8(buf, (60 / 5) | 0x80);
2422 	wpabuf_put_u8(buf, 90 / 5);
2423 	wpabuf_put_u8(buf, (120 / 5) | 0x80);
2424 	wpabuf_put_u8(buf, 180 / 5);
2425 	wpabuf_put_u8(buf, (240 / 5) | 0x80);
2426 	wpabuf_put_u8(buf, 360 / 5);
2427 	wpabuf_put_u8(buf, 480 / 5);
2428 	wpabuf_put_u8(buf, 540 / 5);
2429 
2430 	if (!rx_freq) {
2431 		channel = p2p->cfg->channel;
2432 	} else if (p2p_freq_to_channel(rx_freq, &op_class, &channel)) {
2433 		p2p_err(p2p, "Failed to convert freq to channel");
2434 		return -1;
2435 	}
2436 
2437 	wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
2438 	wpabuf_put_u8(buf, 1);
2439 	wpabuf_put_u8(buf, channel);
2440 
2441 	wpabuf_put_buf(buf, ies);
2442 
2443 	return 0;
2444 }
2445 
p2p_service_find_asp(struct p2p_data * p2p,const u8 * hash)2446 static int p2p_service_find_asp(struct p2p_data *p2p, const u8 *hash)
2447 {
2448 	struct p2ps_advertisement *adv_data;
2449 	int any_wfa;
2450 
2451 	p2p_dbg(p2p, "ASP find - ASP list: %p", p2p->p2ps_adv_list);
2452 
2453 	/* Wildcard org.wi-fi.wfds matches any WFA spec defined service */
2454 	any_wfa = os_memcmp(hash, p2p->wild_card_hash, P2PS_HASH_LEN) == 0;
2455 
2456 	adv_data = p2p->p2ps_adv_list;
2457 	while (adv_data) {
2458 		if (os_memcmp(hash, adv_data->hash, P2PS_HASH_LEN) == 0)
2459 			return 1; /* exact hash match */
2460 		if (any_wfa &&
2461 		    os_strncmp(adv_data->svc_name, P2PS_WILD_HASH_STR,
2462 			       os_strlen(P2PS_WILD_HASH_STR)) == 0)
2463 			return 1; /* WFA service match */
2464 		adv_data = adv_data->next;
2465 	}
2466 
2467 	return 0;
2468 }
2469 
2470 
2471 static enum p2p_probe_req_status
p2p_reply_probe(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq)2472 p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2473 		const u8 *bssid, const u8 *ie, size_t ie_len,
2474 		unsigned int rx_freq)
2475 {
2476 	struct ieee802_11_elems elems;
2477 	struct wpabuf *buf;
2478 	struct p2p_message msg;
2479 	struct wpabuf *ies;
2480 
2481 	if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
2482 	    ParseFailed) {
2483 		/* Ignore invalid Probe Request frames */
2484 		p2p_dbg(p2p, "Could not parse Probe Request frame - ignore it");
2485 		return P2P_PREQ_MALFORMED;
2486 	}
2487 
2488 	if (elems.p2p == NULL) {
2489 		/* not a P2P probe - ignore it */
2490 		p2p_dbg(p2p, "Not a P2P probe - ignore it");
2491 		return P2P_PREQ_NOT_P2P;
2492 	}
2493 
2494 	if (dst && !is_broadcast_ether_addr(dst) &&
2495 	    !ether_addr_equal(dst, p2p->cfg->dev_addr)) {
2496 		/* Not sent to the broadcast address or our P2P Device Address
2497 		 */
2498 		p2p_dbg(p2p, "Probe Req DA " MACSTR " not ours - ignore it",
2499 			MAC2STR(dst));
2500 		return P2P_PREQ_NOT_PROCESSED;
2501 	}
2502 
2503 	if (bssid && !is_broadcast_ether_addr(bssid)) {
2504 		/* Not sent to the Wildcard BSSID */
2505 		p2p_dbg(p2p, "Probe Req BSSID " MACSTR " not wildcard - ignore it",
2506 			MAC2STR(bssid));
2507 		return P2P_PREQ_NOT_PROCESSED;
2508 	}
2509 
2510 	if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
2511 	    os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
2512 	    0) {
2513 		/* not using P2P Wildcard SSID - ignore */
2514 		p2p_dbg(p2p, "Probe Req not using P2P Wildcard SSID - ignore it");
2515 		return P2P_PREQ_NOT_PROCESSED;
2516 	}
2517 
2518 	if (supp_rates_11b_only(&elems)) {
2519 		/* Indicates support for 11b rates only */
2520 		p2p_dbg(p2p, "Probe Req with 11b rates only supported - ignore it");
2521 		return P2P_PREQ_NOT_P2P;
2522 	}
2523 
2524 	os_memset(&msg, 0, sizeof(msg));
2525 	if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
2526 		/* Could not parse P2P attributes */
2527 		p2p_dbg(p2p, "Could not parse P2P attributes in Probe Req - ignore it");
2528 		return P2P_PREQ_NOT_P2P;
2529 	}
2530 
2531 	if (msg.service_hash && msg.service_hash_count) {
2532 		const u8 *hash = msg.service_hash;
2533 		u8 i;
2534 		int p2ps_svc_found = 0;
2535 
2536 		p2p_dbg(p2p, "in_listen=%d drv_in_listen=%d when received P2PS Probe Request at %u MHz; own Listen channel %u, pending listen freq %u MHz",
2537 			p2p->in_listen, p2p->drv_in_listen, rx_freq,
2538 			p2p->cfg->channel, p2p->pending_listen_freq);
2539 
2540 		if (!p2p->in_listen && !p2p->drv_in_listen &&
2541 		    p2p->pending_listen_freq && rx_freq &&
2542 		    rx_freq != p2p->pending_listen_freq) {
2543 			p2p_dbg(p2p, "Do not reply to Probe Request frame that was received on %u MHz while waiting to start Listen state on %u MHz",
2544 				rx_freq, p2p->pending_listen_freq);
2545 			p2p_parse_free(&msg);
2546 			return P2P_PREQ_NOT_LISTEN;
2547 		}
2548 
2549 		for (i = 0; i < msg.service_hash_count; i++) {
2550 			if (p2p_service_find_asp(p2p, hash)) {
2551 				p2p_dbg(p2p, "Service Hash match found: "
2552 					MACSTR, MAC2STR(hash));
2553 				p2ps_svc_found = 1;
2554 				break;
2555 			}
2556 			hash += P2PS_HASH_LEN;
2557 		}
2558 
2559 		/* Probed hash unknown */
2560 		if (!p2ps_svc_found) {
2561 			p2p_dbg(p2p, "No Service Hash match found");
2562 			p2p_parse_free(&msg);
2563 			return P2P_PREQ_NOT_PROCESSED;
2564 		}
2565 	} else {
2566 		/* This is not a P2PS Probe Request */
2567 		p2p_dbg(p2p, "No P2PS Hash in Probe Request");
2568 
2569 		if (!p2p->in_listen || !p2p->drv_in_listen) {
2570 			/* not in Listen state - ignore Probe Request */
2571 			p2p_dbg(p2p, "Not in Listen state (in_listen=%d drv_in_listen=%d) - ignore Probe Request",
2572 				p2p->in_listen, p2p->drv_in_listen);
2573 			p2p_parse_free(&msg);
2574 			return P2P_PREQ_NOT_LISTEN;
2575 		}
2576 	}
2577 
2578 	if (msg.device_id &&
2579 	    !ether_addr_equal(msg.device_id, p2p->cfg->dev_addr)) {
2580 		/* Device ID did not match */
2581 		p2p_dbg(p2p, "Probe Req requested Device ID " MACSTR " did not match - ignore it",
2582 			MAC2STR(msg.device_id));
2583 		p2p_parse_free(&msg);
2584 		return P2P_PREQ_NOT_PROCESSED;
2585 	}
2586 
2587 	/* Check Requested Device Type match */
2588 	if (msg.wps_attributes &&
2589 	    !p2p_match_dev_type(p2p, msg.wps_attributes)) {
2590 		/* No match with Requested Device Type */
2591 		p2p_dbg(p2p, "Probe Req requested Device Type did not match - ignore it");
2592 		p2p_parse_free(&msg);
2593 		return P2P_PREQ_NOT_PROCESSED;
2594 	}
2595 
2596 	if (!p2p->cfg->send_probe_resp) {
2597 		/* Response generated elsewhere */
2598 		p2p_dbg(p2p, "Probe Resp generated elsewhere - do not generate additional response");
2599 		p2p_parse_free(&msg);
2600 		return P2P_PREQ_NOT_PROCESSED;
2601 	}
2602 
2603 	p2p_dbg(p2p, "Reply to P2P Probe Request in Listen state");
2604 
2605 	/*
2606 	 * We do not really have a specific BSS that this frame is advertising,
2607 	 * so build a frame that has some information in valid format. This is
2608 	 * really only used for discovery purposes, not to learn exact BSS
2609 	 * parameters.
2610 	 */
2611 	ies = p2p_build_probe_resp_ies(p2p, msg.service_hash,
2612 				       msg.service_hash_count);
2613 	p2p_parse_free(&msg);
2614 	if (ies == NULL)
2615 		return P2P_PREQ_NOT_PROCESSED;
2616 
2617 	buf = wpabuf_alloc(200 + wpabuf_len(ies));
2618 	if (buf == NULL) {
2619 		wpabuf_free(ies);
2620 		return P2P_PREQ_NOT_PROCESSED;
2621 	}
2622 
2623 	if (p2p_build_probe_resp_buf(p2p, buf, ies, addr, rx_freq)) {
2624 		wpabuf_free(ies);
2625 		wpabuf_free(buf);
2626 		return P2P_PREQ_NOT_PROCESSED;
2627 	}
2628 
2629 	wpabuf_free(ies);
2630 
2631 	p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf, rx_freq);
2632 
2633 	wpabuf_free(buf);
2634 
2635 	return P2P_PREQ_PROCESSED;
2636 }
2637 
2638 
2639 enum p2p_probe_req_status
p2p_probe_req_rx(struct p2p_data * p2p,const u8 * addr,const u8 * dst,const u8 * bssid,const u8 * ie,size_t ie_len,unsigned int rx_freq,int p2p_lo_started)2640 p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2641 		 const u8 *bssid, const u8 *ie, size_t ie_len,
2642 		 unsigned int rx_freq, int p2p_lo_started)
2643 {
2644 	enum p2p_probe_req_status res;
2645 
2646 	p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
2647 
2648 	if (p2p_lo_started) {
2649 		p2p_dbg(p2p,
2650 			"Probe Response is offloaded, do not reply Probe Request");
2651 		return P2P_PREQ_PROCESSED;
2652 	}
2653 
2654 	res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len, rx_freq);
2655 	if (res != P2P_PREQ_PROCESSED && res != P2P_PREQ_NOT_PROCESSED)
2656 		return res;
2657 
2658 	/*
2659 	 * Activate a pending GO Negotiation/Invite flow if a received Probe
2660 	 * Request frame is from an expected peer. Some devices may share the
2661 	 * same address for P2P and non-P2P STA running simultaneously. The
2662 	 * P2P_PREQ_PROCESSED and P2P_PREQ_NOT_PROCESSED p2p_reply_probe()
2663 	 * return values verified above ensure we are handling a Probe Request
2664 	 * frame from a P2P peer.
2665 	 */
2666 	if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
2667 	    p2p->go_neg_peer &&
2668 	    ether_addr_equal(addr, p2p->go_neg_peer->info.p2p_device_addr) &&
2669 	    !(p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
2670 		/* Received a Probe Request from GO Negotiation peer */
2671 		p2p_dbg(p2p, "Found GO Negotiation peer - try to start GO negotiation from timeout");
2672 		eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
2673 		eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
2674 		return res;
2675 	}
2676 
2677 	if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
2678 	    p2p->invite_peer &&
2679 	    (p2p->invite_peer->flags & P2P_DEV_WAIT_INV_REQ_ACK) &&
2680 	    ether_addr_equal(addr, p2p->invite_peer->info.p2p_device_addr)) {
2681 		/* Received a Probe Request from Invite peer */
2682 		p2p_dbg(p2p, "Found Invite peer - try to start Invite from timeout");
2683 		eloop_cancel_timeout(p2p_invite_start, p2p, NULL);
2684 		eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
2685 		return res;
2686 	}
2687 
2688 	return res;
2689 }
2690 
2691 
p2p_assoc_req_ie_wlan_ap(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,struct wpabuf * p2p_ie)2692 static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
2693 				    u8 *buf, size_t len, struct wpabuf *p2p_ie)
2694 {
2695 	struct wpabuf *tmp;
2696 	u8 *lpos;
2697 	size_t tmplen;
2698 	int res;
2699 	u8 group_capab;
2700 	struct p2p_message msg;
2701 
2702 	if (p2p_ie == NULL)
2703 		return 0; /* WLAN AP is not a P2P manager */
2704 
2705 	os_memset(&msg, 0, sizeof(msg));
2706 	if (p2p_parse_p2p_ie(p2p_ie, &msg) < 0)
2707 		return 0;
2708 
2709 	p2p_dbg(p2p, "BSS P2P manageability %s",
2710 		msg.manageability ? "enabled" : "disabled");
2711 
2712 	if (!msg.manageability)
2713 		return 0;
2714 
2715 	/*
2716 	 * (Re)Association Request - P2P IE
2717 	 * P2P Capability attribute (shall be present)
2718 	 * P2P Interface attribute (present if concurrent device and
2719 	 *	P2P Management is enabled)
2720 	 */
2721 	tmp = wpabuf_alloc(200);
2722 	if (tmp == NULL)
2723 		return -1;
2724 
2725 	lpos = p2p_buf_add_ie_hdr(tmp);
2726 	group_capab = 0;
2727 	if (p2p->num_groups > 0) {
2728 		group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
2729 		if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2730 		    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
2731 		    p2p->cross_connect)
2732 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
2733 	}
2734 	p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
2735 	if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2736 	    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
2737 		p2p_buf_add_p2p_interface(tmp, p2p);
2738 	p2p_buf_update_ie_hdr(tmp, lpos);
2739 
2740 	tmplen = wpabuf_len(tmp);
2741 	if (tmplen > len)
2742 		res = -1;
2743 	else {
2744 		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2745 		res = tmplen;
2746 	}
2747 	wpabuf_free(tmp);
2748 
2749 	return res;
2750 }
2751 
2752 
p2p_assoc_req_ie(struct p2p_data * p2p,const u8 * bssid,u8 * buf,size_t len,int p2p_group,struct wpabuf * p2p_ie)2753 int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
2754 		     size_t len, int p2p_group, struct wpabuf *p2p_ie)
2755 {
2756 	struct wpabuf *tmp;
2757 	u8 *lpos;
2758 	struct p2p_device *peer;
2759 	size_t tmplen;
2760 	int res;
2761 	size_t extra = 0;
2762 
2763 	if (!p2p_group)
2764 		return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
2765 
2766 #ifdef CONFIG_WIFI_DISPLAY
2767 	if (p2p->wfd_ie_assoc_req)
2768 		extra = wpabuf_len(p2p->wfd_ie_assoc_req);
2769 #endif /* CONFIG_WIFI_DISPLAY */
2770 
2771 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2772 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2773 
2774 	/*
2775 	 * (Re)Association Request - P2P IE
2776 	 * P2P Capability attribute (shall be present)
2777 	 * Extended Listen Timing (may be present)
2778 	 * P2P Device Info attribute (shall be present)
2779 	 */
2780 	tmp = wpabuf_alloc(200 + extra);
2781 	if (tmp == NULL)
2782 		return -1;
2783 
2784 #ifdef CONFIG_WIFI_DISPLAY
2785 	if (p2p->wfd_ie_assoc_req)
2786 		wpabuf_put_buf(tmp, p2p->wfd_ie_assoc_req);
2787 #endif /* CONFIG_WIFI_DISPLAY */
2788 
2789 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ])
2790 		wpabuf_put_buf(tmp,
2791 			       p2p->vendor_elem[VENDOR_ELEM_P2P_ASSOC_REQ]);
2792 
2793 	peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
2794 
2795 	lpos = p2p_buf_add_ie_hdr(tmp);
2796 	p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
2797 	if (p2p->ext_listen_interval)
2798 		p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
2799 					      p2p->ext_listen_interval);
2800 	p2p_buf_add_device_info(tmp, p2p, peer);
2801 	p2p_buf_update_ie_hdr(tmp, lpos);
2802 
2803 	tmplen = wpabuf_len(tmp);
2804 	if (tmplen > len)
2805 		res = -1;
2806 	else {
2807 		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2808 		res = tmplen;
2809 	}
2810 	wpabuf_free(tmp);
2811 
2812 	return res;
2813 }
2814 
2815 
p2p_scan_result_text(const u8 * ies,size_t ies_len,char * buf,char * end)2816 int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
2817 {
2818 	struct wpabuf *p2p_ie;
2819 	int ret;
2820 
2821 	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
2822 	if (p2p_ie == NULL)
2823 		return 0;
2824 
2825 	ret = p2p_attr_text(p2p_ie, buf, end);
2826 	wpabuf_free(p2p_ie);
2827 	return ret;
2828 }
2829 
2830 
2831 struct p2ps_advertisement *
p2p_service_p2ps_id(struct p2p_data * p2p,u32 adv_id)2832 p2p_service_p2ps_id(struct p2p_data *p2p, u32 adv_id)
2833 {
2834 	struct p2ps_advertisement *adv_data;
2835 
2836 	if (!p2p)
2837 		return NULL;
2838 
2839 	adv_data = p2p->p2ps_adv_list;
2840 	while (adv_data) {
2841 		if (adv_data->id == adv_id)
2842 			return adv_data;
2843 		adv_data = adv_data->next;
2844 	}
2845 
2846 	return NULL;
2847 }
2848 
2849 
p2p_service_del_asp(struct p2p_data * p2p,u32 adv_id)2850 int p2p_service_del_asp(struct p2p_data *p2p, u32 adv_id)
2851 {
2852 	struct p2ps_advertisement *adv_data;
2853 	struct p2ps_advertisement **prior;
2854 
2855 	if (!p2p)
2856 		return -1;
2857 
2858 	adv_data = p2p->p2ps_adv_list;
2859 	prior = &p2p->p2ps_adv_list;
2860 	while (adv_data) {
2861 		if (adv_data->id == adv_id) {
2862 			p2p_dbg(p2p, "Delete ASP adv_id=0x%x", adv_id);
2863 			*prior = adv_data->next;
2864 			os_free(adv_data);
2865 			return 0;
2866 		}
2867 		prior = &adv_data->next;
2868 		adv_data = adv_data->next;
2869 	}
2870 
2871 	return -1;
2872 }
2873 
2874 
p2p_service_add_asp(struct p2p_data * p2p,int auto_accept,u32 adv_id,const char * adv_str,u8 svc_state,u16 config_methods,const char * svc_info,const u8 * cpt_priority)2875 int p2p_service_add_asp(struct p2p_data *p2p, int auto_accept, u32 adv_id,
2876 			const char *adv_str, u8 svc_state, u16 config_methods,
2877 			const char *svc_info, const u8 *cpt_priority)
2878 {
2879 	struct p2ps_advertisement *adv_data, *tmp, **prev;
2880 	u8 buf[P2PS_HASH_LEN];
2881 	size_t adv_data_len, adv_len, info_len = 0;
2882 	int i;
2883 
2884 	if (!p2p || !adv_str || !adv_str[0] || !cpt_priority)
2885 		return -1;
2886 
2887 	if (!(config_methods & p2p->cfg->config_methods)) {
2888 		p2p_dbg(p2p, "Config methods not supported svc: 0x%x dev: 0x%x",
2889 			config_methods, p2p->cfg->config_methods);
2890 		return -1;
2891 	}
2892 
2893 	if (!p2ps_gen_hash(p2p, adv_str, buf))
2894 		return -1;
2895 
2896 	if (svc_info)
2897 		info_len = os_strlen(svc_info);
2898 	adv_len = os_strlen(adv_str);
2899 	adv_data_len = sizeof(struct p2ps_advertisement) + adv_len + 1 +
2900 		info_len + 1;
2901 
2902 	adv_data = os_zalloc(adv_data_len);
2903 	if (!adv_data)
2904 		return -1;
2905 
2906 	os_memcpy(adv_data->hash, buf, P2PS_HASH_LEN);
2907 	adv_data->id = adv_id;
2908 	adv_data->state = svc_state;
2909 	adv_data->config_methods = config_methods & p2p->cfg->config_methods;
2910 	adv_data->auto_accept = (u8) auto_accept;
2911 	os_memcpy(adv_data->svc_name, adv_str, adv_len);
2912 
2913 	for (i = 0; cpt_priority[i] && i < P2PS_FEATURE_CAPAB_CPT_MAX; i++) {
2914 		adv_data->cpt_priority[i] = cpt_priority[i];
2915 		adv_data->cpt_mask |= cpt_priority[i];
2916 	}
2917 
2918 	if (svc_info && info_len) {
2919 		adv_data->svc_info = &adv_data->svc_name[adv_len + 1];
2920 		os_memcpy(adv_data->svc_info, svc_info, info_len);
2921 	}
2922 
2923 	/*
2924 	 * Group Advertisements by service string. They do not need to be
2925 	 * sorted, but groups allow easier Probe Response instance grouping
2926 	 */
2927 	tmp = p2p->p2ps_adv_list;
2928 	prev = &p2p->p2ps_adv_list;
2929 	while (tmp) {
2930 		if (tmp->id == adv_data->id) {
2931 			if (os_strcmp(tmp->svc_name, adv_data->svc_name) != 0) {
2932 				os_free(adv_data);
2933 				return -1;
2934 			}
2935 			adv_data->next = tmp->next;
2936 			*prev = adv_data;
2937 			os_free(tmp);
2938 			goto inserted;
2939 		} else {
2940 			if (os_strcmp(tmp->svc_name, adv_data->svc_name) == 0) {
2941 				adv_data->next = tmp->next;
2942 				tmp->next = adv_data;
2943 				goto inserted;
2944 			}
2945 		}
2946 		prev = &tmp->next;
2947 		tmp = tmp->next;
2948 	}
2949 
2950 	/* No svc_name match found */
2951 	adv_data->next = p2p->p2ps_adv_list;
2952 	p2p->p2ps_adv_list = adv_data;
2953 
2954 inserted:
2955 	p2p_dbg(p2p,
2956 		"Added ASP advertisement adv_id=0x%x config_methods=0x%x svc_state=0x%x adv_str='%s' cpt_mask=0x%x",
2957 		adv_id, adv_data->config_methods, svc_state, adv_str,
2958 		adv_data->cpt_mask);
2959 
2960 	return 0;
2961 }
2962 
2963 
p2p_service_flush_asp(struct p2p_data * p2p)2964 void p2p_service_flush_asp(struct p2p_data *p2p)
2965 {
2966 	struct p2ps_advertisement *adv, *prev;
2967 
2968 	if (!p2p)
2969 		return;
2970 
2971 	adv = p2p->p2ps_adv_list;
2972 	while (adv) {
2973 		prev = adv;
2974 		adv = adv->next;
2975 		os_free(prev);
2976 	}
2977 
2978 	p2p->p2ps_adv_list = NULL;
2979 	p2ps_prov_free(p2p);
2980 	p2p_dbg(p2p, "All ASP advertisements flushed");
2981 }
2982 
2983 
p2p_parse_dev_addr_in_p2p_ie(struct wpabuf * p2p_ie,u8 * dev_addr)2984 int p2p_parse_dev_addr_in_p2p_ie(struct wpabuf *p2p_ie, u8 *dev_addr)
2985 {
2986 	struct p2p_message msg;
2987 
2988 	os_memset(&msg, 0, sizeof(msg));
2989 	if (p2p_parse_p2p_ie(p2p_ie, &msg))
2990 		return -1;
2991 
2992 	if (msg.p2p_device_addr) {
2993 		os_memcpy(dev_addr, msg.p2p_device_addr, ETH_ALEN);
2994 		return 0;
2995 	} else if (msg.device_id) {
2996 		os_memcpy(dev_addr, msg.device_id, ETH_ALEN);
2997 		return 0;
2998 	}
2999 	return -1;
3000 }
3001 
3002 
p2p_parse_dev_addr(const u8 * ies,size_t ies_len,u8 * dev_addr)3003 int p2p_parse_dev_addr(const u8 *ies, size_t ies_len, u8 *dev_addr)
3004 {
3005 	struct wpabuf *p2p_ie;
3006 	int ret;
3007 
3008 	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
3009 					     P2P_IE_VENDOR_TYPE);
3010 	if (p2p_ie == NULL)
3011 		return -1;
3012 	ret = p2p_parse_dev_addr_in_p2p_ie(p2p_ie, dev_addr);
3013 	wpabuf_free(p2p_ie);
3014 	return ret;
3015 }
3016 
3017 
p2p_clear_go_neg(struct p2p_data * p2p)3018 static void p2p_clear_go_neg(struct p2p_data *p2p)
3019 {
3020 	p2p->go_neg_peer = NULL;
3021 	p2p_clear_timeout(p2p);
3022 	p2p_set_state(p2p, P2P_IDLE);
3023 }
3024 
3025 
p2p_wps_success_cb(struct p2p_data * p2p,const u8 * mac_addr)3026 void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
3027 {
3028 	if (p2p->go_neg_peer == NULL) {
3029 		p2p_dbg(p2p, "No pending Group Formation - ignore WPS registration success notification");
3030 		return; /* No pending Group Formation */
3031 	}
3032 
3033 	if (!ether_addr_equal(mac_addr, p2p->go_neg_peer->intended_addr)) {
3034 		p2p_dbg(p2p, "Ignore WPS registration success notification for "
3035 			MACSTR " (GO Negotiation peer " MACSTR ")",
3036 			MAC2STR(mac_addr),
3037 			MAC2STR(p2p->go_neg_peer->intended_addr));
3038 		return; /* Ignore unexpected peer address */
3039 	}
3040 
3041 	p2p_dbg(p2p, "Group Formation completed successfully with " MACSTR,
3042 		MAC2STR(mac_addr));
3043 
3044 	p2p_clear_go_neg(p2p);
3045 }
3046 
3047 
p2p_group_formation_failed(struct p2p_data * p2p)3048 void p2p_group_formation_failed(struct p2p_data *p2p)
3049 {
3050 	if (p2p->go_neg_peer == NULL) {
3051 		p2p_dbg(p2p, "No pending Group Formation - ignore group formation failure notification");
3052 		return; /* No pending Group Formation */
3053 	}
3054 
3055 	p2p_dbg(p2p, "Group Formation failed with " MACSTR,
3056 		MAC2STR(p2p->go_neg_peer->intended_addr));
3057 
3058 	p2p_clear_go_neg(p2p);
3059 }
3060 
3061 
is_p2p_6ghz_disabled(struct p2p_data * p2p)3062 bool is_p2p_6ghz_disabled(struct p2p_data *p2p)
3063 {
3064 	if (p2p)
3065 		return p2p->cfg->p2p_6ghz_disable;
3066 	return false;
3067 }
3068 
3069 
p2p_set_dev_addr(struct p2p_data * p2p,const u8 * addr)3070 void p2p_set_dev_addr(struct p2p_data *p2p, const u8 *addr)
3071 {
3072 	if (p2p && addr)
3073 		os_memcpy(p2p->cfg->dev_addr, addr, ETH_ALEN);
3074 }
3075 
3076 
p2p_pairing_info_deinit(struct p2p_data * p2p)3077 static void p2p_pairing_info_deinit(struct p2p_data *p2p)
3078 {
3079 #ifdef CONFIG_PASN
3080 	pasn_initiator_pmksa_cache_deinit(p2p->initiator_pmksa);
3081 	pasn_responder_pmksa_cache_deinit(p2p->responder_pmksa);
3082 #endif /* CONFIG_PASN */
3083 	os_free(p2p->pairing_info);
3084 }
3085 
3086 
p2p_pairing_info_init(struct p2p_data * p2p)3087 static int p2p_pairing_info_init(struct p2p_data *p2p)
3088 {
3089 	struct p2p_pairing_info *pairing_info;
3090 
3091 	if (p2p->cfg->pairing_config.dik_len > DEVICE_IDENTITY_KEY_MAX_LEN)
3092 		return -1;
3093 
3094 	pairing_info = os_zalloc(sizeof(struct p2p_pairing_info));
3095 	if (!pairing_info)
3096 		return -1;
3097 
3098 	pairing_info->enable_pairing_setup =
3099 		p2p->cfg->pairing_config.enable_pairing_setup;
3100 	pairing_info->enable_pairing_cache =
3101 		p2p->cfg->pairing_config.enable_pairing_cache;
3102 	pairing_info->supported_bootstrap =
3103 		p2p->cfg->pairing_config.bootstrap_methods;
3104 
3105 	pairing_info->dev_ik.cipher_version =
3106 		p2p->cfg->pairing_config.dik_cipher;
3107 	pairing_info->dev_ik.dik_len = p2p->cfg->pairing_config.dik_len;
3108 	os_memcpy(pairing_info->dev_ik.dik_data,
3109 		  p2p->cfg->pairing_config.dik_data,
3110 		  p2p->cfg->pairing_config.dik_len);
3111 	pairing_info->dev_ik.expiration = 24; /* hours */
3112 
3113 	p2p_pairing_info_deinit(p2p);
3114 
3115 	p2p->pairing_info = pairing_info;
3116 #ifdef CONFIG_PASN
3117 	p2p->initiator_pmksa = pasn_initiator_pmksa_cache_init();
3118 	p2p->responder_pmksa = pasn_responder_pmksa_cache_init();
3119 #endif /* CONFIG_PASN */
3120 
3121 	return 0;
3122 }
3123 
3124 
p2p_init(const struct p2p_config * cfg)3125 struct p2p_data * p2p_init(const struct p2p_config *cfg)
3126 {
3127 	struct p2p_data *p2p;
3128 
3129 	if (cfg->max_peers < 1 ||
3130 	    cfg->passphrase_len < 8 || cfg->passphrase_len > 63)
3131 		return NULL;
3132 
3133 	p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
3134 	if (p2p == NULL)
3135 		return NULL;
3136 	p2p->cfg = (struct p2p_config *) (p2p + 1);
3137 	os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
3138 	if (cfg->dev_name)
3139 		p2p->cfg->dev_name = os_strdup(cfg->dev_name);
3140 	if (cfg->manufacturer)
3141 		p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
3142 	if (cfg->model_name)
3143 		p2p->cfg->model_name = os_strdup(cfg->model_name);
3144 	if (cfg->model_number)
3145 		p2p->cfg->model_number = os_strdup(cfg->model_number);
3146 	if (cfg->serial_number)
3147 		p2p->cfg->serial_number = os_strdup(cfg->serial_number);
3148 	if (cfg->pref_chan) {
3149 		p2p->cfg->pref_chan = os_malloc(cfg->num_pref_chan *
3150 						sizeof(struct p2p_channel));
3151 		if (p2p->cfg->pref_chan) {
3152 			os_memcpy(p2p->cfg->pref_chan, cfg->pref_chan,
3153 				  cfg->num_pref_chan *
3154 				  sizeof(struct p2p_channel));
3155 		} else
3156 			p2p->cfg->num_pref_chan = 0;
3157 	}
3158 
3159 	p2ps_gen_hash(p2p, P2PS_WILD_HASH_STR, p2p->wild_card_hash);
3160 
3161 	p2p->min_disc_int = 1;
3162 	p2p->max_disc_int = 3;
3163 	p2p->max_disc_tu = -1;
3164 
3165 	if (os_get_random(&p2p->next_tie_breaker, 1) < 0)
3166 		p2p->next_tie_breaker = 0;
3167 	p2p->next_tie_breaker &= 0x01;
3168 	if (cfg->sd_request)
3169 		p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3170 	p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
3171 	if (cfg->concurrent_operations)
3172 		p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
3173 	p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3174 
3175 	dl_list_init(&p2p->devices);
3176 
3177 	p2p->go_timeout = 100;
3178 	p2p->client_timeout = 20;
3179 	p2p->num_p2p_sd_queries = 0;
3180 	/* Default comeback after one second */
3181 	if (!p2p->cfg->comeback_after)
3182 		p2p->cfg->comeback_after = 977; /* TUs */
3183 	p2p_pairing_info_init(p2p);
3184 
3185 	p2p_dbg(p2p, "initialized");
3186 	p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
3187 	p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
3188 
3189 	return p2p;
3190 }
3191 
3192 
p2p_deinit(struct p2p_data * p2p)3193 void p2p_deinit(struct p2p_data *p2p)
3194 {
3195 #ifdef CONFIG_WIFI_DISPLAY
3196 	wpabuf_free(p2p->wfd_ie_beacon);
3197 	wpabuf_free(p2p->wfd_ie_probe_req);
3198 	wpabuf_free(p2p->wfd_ie_probe_resp);
3199 	wpabuf_free(p2p->wfd_ie_assoc_req);
3200 	wpabuf_free(p2p->wfd_ie_invitation);
3201 	wpabuf_free(p2p->wfd_ie_prov_disc_req);
3202 	wpabuf_free(p2p->wfd_ie_prov_disc_resp);
3203 	wpabuf_free(p2p->wfd_ie_go_neg);
3204 	wpabuf_free(p2p->wfd_dev_info);
3205 	wpabuf_free(p2p->wfd_assoc_bssid);
3206 	wpabuf_free(p2p->wfd_coupled_sink_info);
3207 	wpabuf_free(p2p->wfd_r2_dev_info);
3208 #endif /* CONFIG_WIFI_DISPLAY */
3209 
3210 	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3211 	eloop_cancel_timeout(p2p_go_neg_start, p2p, NULL);
3212 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3213 	p2p_flush(p2p);
3214 	p2p_free_req_dev_types(p2p);
3215 	os_free(p2p->cfg->dev_name);
3216 	os_free(p2p->cfg->manufacturer);
3217 	os_free(p2p->cfg->model_name);
3218 	os_free(p2p->cfg->model_number);
3219 	os_free(p2p->cfg->serial_number);
3220 	os_free(p2p->cfg->pref_chan);
3221 	os_free(p2p->groups);
3222 	p2ps_prov_free(p2p);
3223 	wpabuf_free(p2p->sd_resp);
3224 	p2p_remove_wps_vendor_extensions(p2p);
3225 	os_free(p2p->no_go_freq.range);
3226 	p2p_service_flush_asp(p2p);
3227 	p2p_pairing_info_deinit(p2p);
3228 
3229 	os_free(p2p);
3230 }
3231 
3232 
p2p_flush(struct p2p_data * p2p)3233 void p2p_flush(struct p2p_data *p2p)
3234 {
3235 	struct p2p_device *dev, *prev;
3236 
3237 	p2p_ext_listen(p2p, 0, 0);
3238 	p2p_stop_find(p2p);
3239 	dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
3240 			      list) {
3241 		dl_list_del(&dev->list);
3242 		p2p_device_free(p2p, dev);
3243 	}
3244 	p2p_free_sd_queries(p2p);
3245 	p2p->ssid_set = 0;
3246 	p2ps_prov_free(p2p);
3247 	p2p_reset_pending_pd(p2p);
3248 	p2p->override_pref_op_class = 0;
3249 	p2p->override_pref_channel = 0;
3250 }
3251 
3252 
p2p_unauthorize(struct p2p_data * p2p,const u8 * addr)3253 int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
3254 {
3255 	struct p2p_device *dev;
3256 
3257 	dev = p2p_get_device(p2p, addr);
3258 	if (dev == NULL)
3259 		return -1;
3260 
3261 	p2p_dbg(p2p, "Unauthorizing " MACSTR, MAC2STR(addr));
3262 
3263 	if (p2p->go_neg_peer == dev) {
3264 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
3265 		p2p->go_neg_peer = NULL;
3266 	}
3267 
3268 	dev->wps_method = WPS_NOT_READY;
3269 	dev->oob_pw_id = 0;
3270 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
3271 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
3272 
3273 	return 0;
3274 }
3275 
3276 
p2p_set_dev_name(struct p2p_data * p2p,const char * dev_name)3277 int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
3278 {
3279 	os_free(p2p->cfg->dev_name);
3280 	if (dev_name) {
3281 		p2p->cfg->dev_name = os_strdup(dev_name);
3282 		if (p2p->cfg->dev_name == NULL)
3283 			return -1;
3284 	} else
3285 		p2p->cfg->dev_name = NULL;
3286 	return 0;
3287 }
3288 
3289 
p2p_set_manufacturer(struct p2p_data * p2p,const char * manufacturer)3290 int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
3291 {
3292 	os_free(p2p->cfg->manufacturer);
3293 	p2p->cfg->manufacturer = NULL;
3294 	if (manufacturer) {
3295 		p2p->cfg->manufacturer = os_strdup(manufacturer);
3296 		if (p2p->cfg->manufacturer == NULL)
3297 			return -1;
3298 	}
3299 
3300 	return 0;
3301 }
3302 
3303 
p2p_set_model_name(struct p2p_data * p2p,const char * model_name)3304 int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
3305 {
3306 	os_free(p2p->cfg->model_name);
3307 	p2p->cfg->model_name = NULL;
3308 	if (model_name) {
3309 		p2p->cfg->model_name = os_strdup(model_name);
3310 		if (p2p->cfg->model_name == NULL)
3311 			return -1;
3312 	}
3313 
3314 	return 0;
3315 }
3316 
3317 
p2p_set_model_number(struct p2p_data * p2p,const char * model_number)3318 int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
3319 {
3320 	os_free(p2p->cfg->model_number);
3321 	p2p->cfg->model_number = NULL;
3322 	if (model_number) {
3323 		p2p->cfg->model_number = os_strdup(model_number);
3324 		if (p2p->cfg->model_number == NULL)
3325 			return -1;
3326 	}
3327 
3328 	return 0;
3329 }
3330 
3331 
p2p_set_serial_number(struct p2p_data * p2p,const char * serial_number)3332 int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
3333 {
3334 	os_free(p2p->cfg->serial_number);
3335 	p2p->cfg->serial_number = NULL;
3336 	if (serial_number) {
3337 		p2p->cfg->serial_number = os_strdup(serial_number);
3338 		if (p2p->cfg->serial_number == NULL)
3339 			return -1;
3340 	}
3341 
3342 	return 0;
3343 }
3344 
3345 
p2p_set_config_methods(struct p2p_data * p2p,u16 config_methods)3346 void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
3347 {
3348 	p2p->cfg->config_methods = config_methods;
3349 }
3350 
3351 
p2p_set_uuid(struct p2p_data * p2p,const u8 * uuid)3352 void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
3353 {
3354 	os_memcpy(p2p->cfg->uuid, uuid, 16);
3355 }
3356 
3357 
p2p_set_pri_dev_type(struct p2p_data * p2p,const u8 * pri_dev_type)3358 int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
3359 {
3360 	os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
3361 	return 0;
3362 }
3363 
3364 
p2p_set_sec_dev_types(struct p2p_data * p2p,const u8 dev_types[][8],size_t num_dev_types)3365 int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
3366 			  size_t num_dev_types)
3367 {
3368 	if (num_dev_types > P2P_SEC_DEVICE_TYPES)
3369 		num_dev_types = P2P_SEC_DEVICE_TYPES;
3370 	p2p->cfg->num_sec_dev_types = num_dev_types;
3371 	os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
3372 	return 0;
3373 }
3374 
3375 
p2p_remove_wps_vendor_extensions(struct p2p_data * p2p)3376 void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
3377 {
3378 	int i;
3379 
3380 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3381 		wpabuf_free(p2p->wps_vendor_ext[i]);
3382 		p2p->wps_vendor_ext[i] = NULL;
3383 	}
3384 }
3385 
3386 
p2p_add_wps_vendor_extension(struct p2p_data * p2p,const struct wpabuf * vendor_ext)3387 int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
3388 				 const struct wpabuf *vendor_ext)
3389 {
3390 	int i;
3391 
3392 	if (vendor_ext == NULL)
3393 		return -1;
3394 
3395 	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
3396 		if (p2p->wps_vendor_ext[i] == NULL)
3397 			break;
3398 	}
3399 	if (i >= P2P_MAX_WPS_VENDOR_EXT)
3400 		return -1;
3401 
3402 	p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
3403 	if (p2p->wps_vendor_ext[i] == NULL)
3404 		return -1;
3405 
3406 	return 0;
3407 }
3408 
3409 
p2p_set_country(struct p2p_data * p2p,const char * country)3410 int p2p_set_country(struct p2p_data *p2p, const char *country)
3411 {
3412 	os_memcpy(p2p->cfg->country, country, 3);
3413 	return 0;
3414 }
3415 
3416 
p2p_pre_find_operation(struct p2p_data * p2p,struct p2p_device * dev)3417 static int p2p_pre_find_operation(struct p2p_data *p2p, struct p2p_device *dev)
3418 {
3419 	int res;
3420 
3421 	if (dev->sd_pending_bcast_queries == 0) {
3422 		/* Initialize with total number of registered broadcast
3423 		 * SD queries. */
3424 		dev->sd_pending_bcast_queries = p2p->num_p2p_sd_queries;
3425 	}
3426 
3427 	res = p2p_start_sd(p2p, dev);
3428 	if (res == -2)
3429 		return -2;
3430 	if (res == 0)
3431 		return 1;
3432 
3433 	if (dev->req_config_methods &&
3434 	    !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
3435 		p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3436 			MACSTR " (config methods 0x%x)",
3437 			MAC2STR(dev->info.p2p_device_addr),
3438 			dev->req_config_methods);
3439 		if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
3440 			return 1;
3441 	}
3442 
3443 	return 0;
3444 }
3445 
3446 
p2p_continue_find(struct p2p_data * p2p)3447 void p2p_continue_find(struct p2p_data *p2p)
3448 {
3449 	struct p2p_device *dev;
3450 	int found, res;
3451 
3452 	p2p_set_state(p2p, P2P_SEARCH);
3453 
3454 	/* Continue from the device following the last iteration */
3455 	found = 0;
3456 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3457 		if (dev == p2p->last_p2p_find_oper) {
3458 			found = 1;
3459 			continue;
3460 		}
3461 		if (!found)
3462 			continue;
3463 		res = p2p_pre_find_operation(p2p, dev);
3464 		if (res > 0) {
3465 			p2p->last_p2p_find_oper = dev;
3466 			return;
3467 		}
3468 		if (res == -2)
3469 			goto skip_sd;
3470 	}
3471 
3472 	/*
3473 	 * Wrap around to the beginning of the list and continue until the last
3474 	 * iteration device.
3475 	 */
3476 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3477 		res = p2p_pre_find_operation(p2p, dev);
3478 		if (res > 0) {
3479 			p2p->last_p2p_find_oper = dev;
3480 			return;
3481 		}
3482 		if (res == -2)
3483 			goto skip_sd;
3484 		if (dev == p2p->last_p2p_find_oper)
3485 			break;
3486 	}
3487 
3488 skip_sd:
3489 	os_memset(p2p->sd_query_no_ack, 0, ETH_ALEN);
3490 	p2p_listen_in_find(p2p, 1);
3491 }
3492 
3493 
p2p_sd_query_cb(struct p2p_data * p2p,int success)3494 void p2p_sd_query_cb(struct p2p_data *p2p, int success)
3495 {
3496 	p2p_dbg(p2p, "Service Discovery Query TX callback: success=%d",
3497 		success);
3498 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3499 
3500 	if (!success) {
3501 		if (p2p->sd_peer) {
3502 			if (is_zero_ether_addr(p2p->sd_query_no_ack)) {
3503 				os_memcpy(p2p->sd_query_no_ack,
3504 					  p2p->sd_peer->info.p2p_device_addr,
3505 					  ETH_ALEN);
3506 				p2p_dbg(p2p,
3507 					"First SD Query no-ACK in this search iteration: "
3508 					MACSTR, MAC2STR(p2p->sd_query_no_ack));
3509 			}
3510 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3511 		}
3512 		p2p->sd_peer = NULL;
3513 		if (p2p->state != P2P_IDLE)
3514 			p2p_continue_find(p2p);
3515 		return;
3516 	}
3517 
3518 	if (p2p->sd_peer == NULL) {
3519 		p2p_dbg(p2p, "No SD peer entry known");
3520 		if (p2p->state != P2P_IDLE)
3521 			p2p_continue_find(p2p);
3522 		return;
3523 	}
3524 
3525 	if (p2p->sd_query && p2p->sd_query->for_all_peers) {
3526 		/* Update the pending broadcast SD query count for this device
3527 		 */
3528 		p2p->sd_peer->sd_pending_bcast_queries--;
3529 
3530 		/*
3531 		 * If there are no pending broadcast queries for this device,
3532 		 * mark it as done (-1).
3533 		 */
3534 		if (p2p->sd_peer->sd_pending_bcast_queries == 0)
3535 			p2p->sd_peer->sd_pending_bcast_queries = -1;
3536 	}
3537 
3538 	/* Wait for response from the peer */
3539 	p2p_set_state(p2p, P2P_SD_DURING_FIND);
3540 	p2p_set_timeout(p2p, 0, 200000);
3541 }
3542 
3543 
3544 /**
3545  * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
3546  * @p2p: P2P module context from p2p_init()
3547  */
p2p_retry_pd(struct p2p_data * p2p)3548 static void p2p_retry_pd(struct p2p_data *p2p)
3549 {
3550 	struct p2p_device *dev;
3551 
3552 	/*
3553 	 * Retry the prov disc req attempt only for the peer that the user had
3554 	 * requested.
3555 	 */
3556 
3557 	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
3558 		if (!ether_addr_equal(p2p->pending_pd_devaddr,
3559 				      dev->info.p2p_device_addr))
3560 			continue;
3561 		if (!dev->req_config_methods && !dev->req_bootstrap_method)
3562 			continue;
3563 
3564 		p2p_dbg(p2p, "Send pending Provision Discovery Request to "
3565 			MACSTR " (config methods 0x%x)",
3566 			MAC2STR(dev->info.p2p_device_addr),
3567 			dev->req_config_methods);
3568 		p2p_send_prov_disc_req(p2p, dev,
3569 				       dev->flags & P2P_DEV_PD_FOR_JOIN,
3570 				       p2p->pd_force_freq);
3571 		return;
3572 	}
3573 }
3574 
3575 
p2p_prov_disc_cb(struct p2p_data * p2p,int success)3576 static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
3577 {
3578 	p2p_dbg(p2p, "Provision Discovery Request TX callback: success=%d",
3579 		success);
3580 
3581 	/*
3582 	 * Postpone resetting the pending action state till after we actually
3583 	 * time out. This allows us to take some action like notifying any
3584 	 * interested parties about no response to the request.
3585 	 *
3586 	 * When the timer (below) goes off we check in IDLE, SEARCH, or
3587 	 * LISTEN_ONLY state, which are the only allowed states to issue a PD
3588 	 * requests in, if this was still pending and then raise notification.
3589 	 */
3590 
3591 	if (!success) {
3592 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3593 
3594 		if (p2p->user_initiated_pd &&
3595 		    (p2p->state == P2P_SEARCH || p2p->state == P2P_LISTEN_ONLY))
3596 		{
3597 			/* Retry request from timeout to avoid busy loops */
3598 			p2p->pending_action_state = P2P_PENDING_PD;
3599 			p2p_set_timeout(p2p, 0, 50000);
3600 		} else if (p2p->state != P2P_IDLE)
3601 			p2p_continue_find(p2p);
3602 		else if (p2p->user_initiated_pd) {
3603 			p2p->pending_action_state = P2P_PENDING_PD;
3604 			p2p_set_timeout(p2p, 0, 300000);
3605 		}
3606 		return;
3607 	}
3608 
3609 	/*
3610 	 * If after PD Request the peer doesn't expect to receive PD Response
3611 	 * the PD Request ACK indicates a completion of the current PD. This
3612 	 * happens only on the advertiser side sending the follow-on PD Request
3613 	 * with the status different than 12 (Success: accepted by user).
3614 	 */
3615 	if (p2p->p2ps_prov && !p2p->p2ps_prov->pd_seeker &&
3616 	    p2p->p2ps_prov->status != P2P_SC_SUCCESS_DEFERRED) {
3617 		p2p_dbg(p2p, "P2PS PD completion on Follow-on PD Request ACK");
3618 
3619 		if (p2p->send_action_in_progress) {
3620 			p2p->send_action_in_progress = 0;
3621 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3622 		}
3623 
3624 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3625 
3626 		if (p2p->cfg->p2ps_prov_complete) {
3627 			p2p->cfg->p2ps_prov_complete(
3628 				p2p->cfg->cb_ctx,
3629 				p2p->p2ps_prov->status,
3630 				p2p->p2ps_prov->adv_mac,
3631 				p2p->p2ps_prov->adv_mac,
3632 				p2p->p2ps_prov->session_mac,
3633 				NULL, p2p->p2ps_prov->adv_id,
3634 				p2p->p2ps_prov->session_id,
3635 				0, 0, NULL, 0, 0, 0,
3636 				NULL, NULL, 0, 0, NULL, 0);
3637 		}
3638 
3639 		if (p2p->user_initiated_pd)
3640 			p2p_reset_pending_pd(p2p);
3641 
3642 		p2ps_prov_free(p2p);
3643 		return;
3644 	}
3645 
3646 	/*
3647 	 * This postponing, of resetting pending_action_state, needs to be
3648 	 * done only for user initiated PD requests and not internal ones.
3649 	 */
3650 	if (p2p->user_initiated_pd)
3651 		p2p->pending_action_state = P2P_PENDING_PD;
3652 	else
3653 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3654 
3655 	/* Wait for response from the peer */
3656 	if (p2p->state == P2P_SEARCH)
3657 		p2p_set_state(p2p, P2P_PD_DURING_FIND);
3658 	p2p_set_timeout(p2p, 0, 200000);
3659 }
3660 
3661 
p2p_prov_disc_resp_cb(struct p2p_data * p2p,int success)3662 static void p2p_prov_disc_resp_cb(struct p2p_data *p2p, int success)
3663 {
3664 	p2p_dbg(p2p, "Provision Discovery Response TX callback: success=%d",
3665 		success);
3666 
3667 	if (p2p->send_action_in_progress) {
3668 		p2p->send_action_in_progress = 0;
3669 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3670 	}
3671 
3672 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3673 
3674 	if (!success) {
3675 		if (p2p->state == P2P_SEARCH)
3676 			p2p_continue_find(p2p);
3677 		return;
3678 	}
3679 
3680 	if (!p2p->cfg->prov_disc_resp_cb ||
3681 	    p2p->cfg->prov_disc_resp_cb(p2p->cfg->cb_ctx) < 1) {
3682 		if (p2p->state == P2P_SEARCH)
3683 			p2p_continue_find(p2p);
3684 		return;
3685 	}
3686 
3687 	p2p_dbg(p2p,
3688 		"Post-Provision Discovery operations started - do not try to continue other P2P operations");
3689 }
3690 
3691 
p2p_scan_res_handler(struct p2p_data * p2p,const u8 * bssid,int freq,struct os_reltime * rx_time,int level,const u8 * ies,size_t ies_len)3692 int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
3693 			 struct os_reltime *rx_time, int level, const u8 *ies,
3694 			 size_t ies_len)
3695 {
3696 	if (os_reltime_before(rx_time, &p2p->find_start)) {
3697 		/*
3698 		 * The driver may have cached (e.g., in cfg80211 BSS table) the
3699 		 * scan results for relatively long time. To avoid reporting
3700 		 * stale information, update P2P peers only based on results
3701 		 * that have based on frames received after the last p2p_find
3702 		 * operation was started.
3703 		 */
3704 		p2p_dbg(p2p, "Ignore old scan result for " MACSTR
3705 			" (rx_time=%u.%06u find_start=%u.%06u)",
3706 			MAC2STR(bssid), (unsigned int) rx_time->sec,
3707 			(unsigned int) rx_time->usec,
3708 			(unsigned int) p2p->find_start.sec,
3709 			(unsigned int) p2p->find_start.usec);
3710 		return 0;
3711 	}
3712 
3713 	p2p_add_device(p2p, bssid, freq, rx_time, level, ies, ies_len, 1);
3714 
3715 	return 0;
3716 }
3717 
3718 
p2p_scan_res_handled(struct p2p_data * p2p,unsigned int delay)3719 void p2p_scan_res_handled(struct p2p_data *p2p, unsigned int delay)
3720 {
3721 	if (!p2p->p2p_scan_running) {
3722 		p2p_dbg(p2p, "p2p_scan was not running, but scan results received");
3723 	}
3724 	p2p->p2p_scan_running = 0;
3725 
3726 	/* Use this delay only when p2p_find doesn't set it */
3727 	if (!p2p->search_delay)
3728 		p2p->search_delay = delay;
3729 
3730 	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
3731 
3732 	if (p2p_run_after_scan(p2p))
3733 		return;
3734 	if (p2p->state == P2P_SEARCH)
3735 		p2p_continue_find(p2p);
3736 }
3737 
3738 
p2p_scan_ie(struct p2p_data * p2p,struct wpabuf * ies,const u8 * dev_id,unsigned int bands)3739 void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id,
3740 		 unsigned int bands)
3741 {
3742 	u8 dev_capab;
3743 	u8 *len;
3744 
3745 #ifdef CONFIG_WIFI_DISPLAY
3746 	if (p2p->wfd_ie_probe_req)
3747 		wpabuf_put_buf(ies, p2p->wfd_ie_probe_req);
3748 #endif /* CONFIG_WIFI_DISPLAY */
3749 
3750 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3751 		wpabuf_put_buf(ies,
3752 			       p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3753 
3754 	len = p2p_buf_add_ie_hdr(ies);
3755 
3756 	dev_capab = p2p->dev_capab & ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3757 
3758 	/* P2PS requires Probe Request frames to include SD bit */
3759 	if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3760 		dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
3761 
3762 	p2p_buf_add_capability(ies, dev_capab, 0);
3763 
3764 	if (dev_id)
3765 		p2p_buf_add_device_id(ies, dev_id);
3766 	if (p2p->cfg->reg_class && p2p->cfg->channel)
3767 		p2p_buf_add_listen_channel(ies, p2p->cfg->country,
3768 					   p2p->cfg->reg_class,
3769 					   p2p->cfg->channel);
3770 	if (p2p->ext_listen_interval)
3771 		p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
3772 					      p2p->ext_listen_interval);
3773 
3774 	if (bands & BAND_60_GHZ)
3775 		p2p_buf_add_device_info(ies, p2p, NULL);
3776 
3777 	if (p2p->p2ps_seek && p2p->p2ps_seek_count)
3778 		p2p_buf_add_service_hash(ies, p2p);
3779 
3780 	/* TODO: p2p_buf_add_operating_channel() if GO */
3781 	p2p_buf_update_ie_hdr(ies, len);
3782 }
3783 
3784 
p2p_scan_ie_buf_len(struct p2p_data * p2p)3785 size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
3786 {
3787 	size_t len = 100;
3788 
3789 #ifdef CONFIG_WIFI_DISPLAY
3790 	if (p2p && p2p->wfd_ie_probe_req)
3791 		len += wpabuf_len(p2p->wfd_ie_probe_req);
3792 #endif /* CONFIG_WIFI_DISPLAY */
3793 
3794 	if (p2p && p2p->vendor_elem &&
3795 	    p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P])
3796 		len += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_PROBE_REQ_P2P]);
3797 
3798 	return len;
3799 }
3800 
3801 
p2p_ie_text(struct wpabuf * p2p_ie,char * buf,char * end)3802 int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
3803 {
3804 	return p2p_attr_text(p2p_ie, buf, end);
3805 }
3806 
3807 
p2p_go_neg_req_cb(struct p2p_data * p2p,int success)3808 static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
3809 {
3810 	struct p2p_device *dev = p2p->go_neg_peer;
3811 	int timeout;
3812 
3813 	p2p_dbg(p2p, "GO Negotiation Request TX callback: success=%d", success);
3814 
3815 	if (dev == NULL) {
3816 		p2p_dbg(p2p, "No pending GO Negotiation");
3817 		return;
3818 	}
3819 
3820 	if (success) {
3821 		if (dev->flags & P2P_DEV_USER_REJECTED) {
3822 			p2p_set_state(p2p, P2P_IDLE);
3823 			return;
3824 		}
3825 	} else if (dev->go_neg_req_sent) {
3826 		/* Cancel the increment from p2p_connect_send() on failure */
3827 		dev->go_neg_req_sent--;
3828 	}
3829 
3830 	if (!success &&
3831 	    (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
3832 	    !is_zero_ether_addr(dev->member_in_go_dev)) {
3833 		p2p_dbg(p2p, "Peer " MACSTR " did not acknowledge request - try to use device discoverability through its GO",
3834 			MAC2STR(dev->info.p2p_device_addr));
3835 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3836 		p2p_send_dev_disc_req(p2p, dev);
3837 		return;
3838 	}
3839 
3840 	/*
3841 	 * Use P2P find, if needed, to find the other device from its listen
3842 	 * channel.
3843 	 */
3844 	p2p_set_state(p2p, P2P_CONNECT);
3845 	timeout = success ? 500000 : 100000;
3846 	if (!success && p2p->go_neg_peer &&
3847 	    (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE)) {
3848 		unsigned int r;
3849 		/*
3850 		 * Peer is expected to wait our response and we will skip the
3851 		 * listen phase. Add some randomness to the wait time here to
3852 		 * make it less likely to hit cases where we could end up in
3853 		 * sync with peer not listening.
3854 		 */
3855 		if (os_get_random((u8 *) &r, sizeof(r)) < 0)
3856 			r = 0;
3857 		timeout += r % 100000;
3858 	}
3859 	p2p_set_timeout(p2p, 0, timeout);
3860 }
3861 
3862 
p2p_go_neg_resp_cb(struct p2p_data * p2p,int success)3863 static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
3864 {
3865 	p2p_dbg(p2p, "GO Negotiation Response TX callback: success=%d",
3866 		success);
3867 	if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
3868 		p2p_dbg(p2p, "Ignore TX callback event - GO Negotiation is not running anymore");
3869 		return;
3870 	}
3871 	p2p_set_state(p2p, P2P_CONNECT);
3872 	p2p_set_timeout(p2p, 0, 500000);
3873 }
3874 
3875 
p2p_go_neg_resp_failure_cb(struct p2p_data * p2p,int success,const u8 * addr)3876 static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success,
3877 				       const u8 *addr)
3878 {
3879 	p2p_dbg(p2p, "GO Negotiation Response (failure) TX callback: success=%d", success);
3880 	if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
3881 		p2p_go_neg_failed(p2p, p2p->go_neg_peer->status);
3882 		return;
3883 	}
3884 
3885 	if (success) {
3886 		struct p2p_device *dev;
3887 		dev = p2p_get_device(p2p, addr);
3888 		if (dev &&
3889 		    dev->status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
3890 			dev->flags |= P2P_DEV_PEER_WAITING_RESPONSE;
3891 	}
3892 
3893 	if (p2p->state == P2P_SEARCH || p2p->state == P2P_SD_DURING_FIND)
3894 		p2p_continue_find(p2p);
3895 }
3896 
3897 
p2p_go_neg_conf_cb(struct p2p_data * p2p,enum p2p_send_action_result result)3898 static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
3899 			       enum p2p_send_action_result result)
3900 {
3901 	struct p2p_device *dev;
3902 
3903 	p2p_dbg(p2p, "GO Negotiation Confirm TX callback: result=%d", result);
3904 	if (result == P2P_SEND_ACTION_FAILED) {
3905 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3906 		p2p_go_neg_failed(p2p, -1);
3907 		return;
3908 	}
3909 
3910 	dev = p2p->go_neg_peer;
3911 
3912 	if (result == P2P_SEND_ACTION_NO_ACK) {
3913 		/*
3914 		 * Retry GO Negotiation Confirmation
3915 		 * P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if we did not receive
3916 		 * ACK for confirmation.
3917 		 */
3918 		if (dev && dev->go_neg_conf &&
3919 		    dev->go_neg_conf_sent <= P2P_GO_NEG_CNF_MAX_RETRY_COUNT) {
3920 			p2p_dbg(p2p, "GO Negotiation Confirm retry %d",
3921 				dev->go_neg_conf_sent);
3922 			p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
3923 			if (p2p_send_action(p2p, dev->go_neg_conf_freq,
3924 					    dev->info.p2p_device_addr,
3925 					    p2p->cfg->dev_addr,
3926 					    dev->info.p2p_device_addr,
3927 					    wpabuf_head(dev->go_neg_conf),
3928 					    wpabuf_len(dev->go_neg_conf), 0) >=
3929 			    0) {
3930 				dev->go_neg_conf_sent++;
3931 				return;
3932 			}
3933 			p2p_dbg(p2p, "Failed to re-send Action frame");
3934 
3935 			/*
3936 			 * Continue with the assumption that the first attempt
3937 			 * went through and just the ACK frame was lost.
3938 			 */
3939 		}
3940 
3941 		/*
3942 		 * It looks like the TX status for GO Negotiation Confirm is
3943 		 * often showing failure even when the peer has actually
3944 		 * received the frame. Since the peer may change channels
3945 		 * immediately after having received the frame, we may not see
3946 		 * an Ack for retries, so just dropping a single frame may
3947 		 * trigger this. To allow the group formation to succeed if the
3948 		 * peer did indeed receive the frame, continue regardless of
3949 		 * the TX status.
3950 		 */
3951 		p2p_dbg(p2p, "Assume GO Negotiation Confirm TX was actually received by the peer even though Ack was not reported");
3952 	}
3953 
3954 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3955 
3956 	if (dev == NULL)
3957 		return;
3958 
3959 	p2p_go_complete(p2p, dev);
3960 }
3961 
3962 
p2p_send_action_cb(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,enum p2p_send_action_result result)3963 void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3964 			const u8 *src, const u8 *bssid,
3965 			enum p2p_send_action_result result)
3966 {
3967 	enum p2p_pending_action_state state;
3968 	int success;
3969 
3970 	p2p_dbg(p2p, "Action frame TX callback (state=%d freq=%u dst=" MACSTR
3971 		" src=" MACSTR " bssid=" MACSTR " result=%d p2p_state=%s)",
3972 		p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
3973 		MAC2STR(bssid), result, p2p_state_txt(p2p->state));
3974 	success = result == P2P_SEND_ACTION_SUCCESS;
3975 	state = p2p->pending_action_state;
3976 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3977 	switch (state) {
3978 	case P2P_NO_PENDING_ACTION:
3979 		if (p2p->send_action_in_progress) {
3980 			p2p->send_action_in_progress = 0;
3981 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3982 		}
3983 		break;
3984 	case P2P_PENDING_GO_NEG_REQUEST:
3985 		p2p_go_neg_req_cb(p2p, success);
3986 		break;
3987 	case P2P_PENDING_GO_NEG_RESPONSE:
3988 		p2p_go_neg_resp_cb(p2p, success);
3989 		break;
3990 	case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
3991 		p2p_go_neg_resp_failure_cb(p2p, success, dst);
3992 		break;
3993 	case P2P_PENDING_GO_NEG_CONFIRM:
3994 		p2p_go_neg_conf_cb(p2p, result);
3995 		break;
3996 	case P2P_PENDING_SD:
3997 		p2p_sd_query_cb(p2p, success);
3998 		break;
3999 	case P2P_PENDING_PD:
4000 		p2p_prov_disc_cb(p2p, success);
4001 		break;
4002 	case P2P_PENDING_PD_RESPONSE:
4003 		p2p_prov_disc_resp_cb(p2p, success);
4004 		break;
4005 	case P2P_PENDING_INVITATION_REQUEST:
4006 		p2p_invitation_req_cb(p2p, success);
4007 		break;
4008 	case P2P_PENDING_INVITATION_RESPONSE:
4009 		p2p_invitation_resp_cb(p2p, dst, success);
4010 		break;
4011 	case P2P_PENDING_DEV_DISC_REQUEST:
4012 		p2p_dev_disc_req_cb(p2p, success);
4013 		break;
4014 	case P2P_PENDING_DEV_DISC_RESPONSE:
4015 		p2p_dev_disc_resp_cb(p2p, success);
4016 		break;
4017 	case P2P_PENDING_GO_DISC_REQ:
4018 		p2p_go_disc_req_cb(p2p, success);
4019 		break;
4020 	}
4021 }
4022 
4023 
p2p_listen_cb(struct p2p_data * p2p,unsigned int freq,unsigned int duration)4024 void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
4025 		   unsigned int duration)
4026 {
4027 	if (freq == p2p->pending_client_disc_freq) {
4028 		p2p_dbg(p2p, "Client discoverability remain-awake completed");
4029 		p2p->pending_client_disc_freq = 0;
4030 		return;
4031 	}
4032 
4033 	if (freq != p2p->pending_listen_freq) {
4034 		p2p_dbg(p2p, "Unexpected listen callback for freq=%u duration=%u (pending_listen_freq=%u)",
4035 			freq, duration, p2p->pending_listen_freq);
4036 		return;
4037 	}
4038 
4039 	p2p_dbg(p2p, "Starting Listen timeout(%u,%u) on freq=%u based on callback",
4040 		p2p->pending_listen_sec, p2p->pending_listen_usec,
4041 		p2p->pending_listen_freq);
4042 	p2p->pending_listen_wait_drv = false;
4043 	p2p->in_listen = 1;
4044 	p2p->drv_in_listen = freq;
4045 	if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
4046 		/*
4047 		 * Add 20 msec extra wait to avoid race condition with driver
4048 		 * remain-on-channel end event, i.e., give driver more time to
4049 		 * complete the operation before our timeout expires.
4050 		 */
4051 		p2p_set_timeout(p2p, p2p->pending_listen_sec,
4052 				p2p->pending_listen_usec + 20000);
4053 	}
4054 
4055 	p2p->pending_listen_freq = 0;
4056 }
4057 
4058 
p2p_listen_end(struct p2p_data * p2p,unsigned int freq)4059 int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
4060 {
4061 	p2p_dbg(p2p, "Driver ended Listen state (freq=%u)", freq);
4062 	p2p->drv_in_listen = 0;
4063 	if (p2p->in_listen)
4064 		return 0; /* Internal timeout will trigger the next step */
4065 
4066 	if (p2p->state == P2P_WAIT_PEER_CONNECT && p2p->go_neg_peer &&
4067 	    p2p->pending_listen_freq) {
4068 		/*
4069 		 * Better wait a bit if the driver is unable to start
4070 		 * offchannel operation for some reason to continue with
4071 		 * P2P_WAIT_PEER_(IDLE/CONNECT) state transitions.
4072 		 */
4073 		p2p_dbg(p2p,
4074 			"Listen operation did not seem to start - delay idle phase to avoid busy loop");
4075 		p2p_set_timeout(p2p, 0, 100000);
4076 		return 1;
4077 	}
4078 
4079 	if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
4080 		if (p2p->go_neg_peer->connect_reqs >= 120) {
4081 			p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4082 			p2p_go_neg_failed(p2p, -1);
4083 			return 0;
4084 		}
4085 
4086 		p2p_set_state(p2p, P2P_CONNECT);
4087 		p2p_connect_send(p2p, p2p->go_neg_peer);
4088 		return 1;
4089 	} else if (p2p->state == P2P_SEARCH) {
4090 		if (p2p->p2p_scan_running) {
4091 			 /*
4092 			  * Search is already in progress. This can happen if
4093 			  * an Action frame RX is reported immediately after
4094 			  * the end of a remain-on-channel operation and the
4095 			  * response frame to that is sent using an offchannel
4096 			  * operation while in p2p_find. Avoid an attempt to
4097 			  * restart a scan here.
4098 			  */
4099 			p2p_dbg(p2p, "p2p_scan already in progress - do not try to start a new one");
4100 			return 1;
4101 		}
4102 		if (p2p->pending_listen_freq) {
4103 			/*
4104 			 * Better wait a bit if the driver is unable to start
4105 			 * offchannel operation for some reason. p2p_search()
4106 			 * will be started from internal timeout.
4107 			 */
4108 			p2p_dbg(p2p, "Listen operation did not seem to start - delay search phase to avoid busy loop");
4109 			p2p_set_timeout(p2p, 0, 100000);
4110 			return 1;
4111 		}
4112 		if (p2p->search_delay) {
4113 			p2p_dbg(p2p, "Delay search operation by %u ms",
4114 				p2p->search_delay);
4115 			p2p_set_timeout(p2p, p2p->search_delay / 1000,
4116 					(p2p->search_delay % 1000) * 1000);
4117 			return 1;
4118 		}
4119 		p2p_search(p2p);
4120 		return 1;
4121 	}
4122 
4123 	return 0;
4124 }
4125 
4126 
p2p_listen_failed(struct p2p_data * p2p,unsigned int freq)4127 void p2p_listen_failed(struct p2p_data *p2p, unsigned int freq)
4128 {
4129 	if (freq != p2p->pending_listen_freq) {
4130 		p2p_dbg(p2p,
4131 			"Unexpected listen failed callback for freq=%u (pending_listen_freq=%u)",
4132 			freq, p2p->pending_listen_freq);
4133 		return;
4134 	}
4135 
4136 	p2p_dbg(p2p, "Listen failed on freq=%u", freq);
4137 	p2p->pending_listen_freq = 0;
4138 }
4139 
4140 
p2p_timeout_connect(struct p2p_data * p2p)4141 static void p2p_timeout_connect(struct p2p_data *p2p)
4142 {
4143 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4144 	if (p2p->go_neg_peer &&
4145 	    (p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
4146 		p2p_dbg(p2p, "Wait for GO Negotiation Confirm timed out - assume GO Negotiation failed");
4147 		p2p_go_neg_failed(p2p, -1);
4148 		return;
4149 	}
4150 	if (p2p->go_neg_peer &&
4151 	    (p2p->go_neg_peer->flags & P2P_DEV_PEER_WAITING_RESPONSE) &&
4152 	    p2p->go_neg_peer->connect_reqs < 120) {
4153 		p2p_dbg(p2p, "Peer expected to wait our response - skip listen");
4154 		p2p_connect_send(p2p, p2p->go_neg_peer);
4155 		return;
4156 	}
4157 	if (p2p->go_neg_peer && p2p->go_neg_peer->oob_go_neg_freq > 0) {
4158 		p2p_dbg(p2p, "Skip connect-listen since GO Neg channel known (OOB)");
4159 		p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4160 		p2p_set_timeout(p2p, 0, 30000);
4161 		return;
4162 	}
4163 	p2p_set_state(p2p, P2P_CONNECT_LISTEN);
4164 	p2p_listen_in_find(p2p, 0);
4165 }
4166 
4167 
p2p_timeout_connect_listen(struct p2p_data * p2p)4168 static void p2p_timeout_connect_listen(struct p2p_data *p2p)
4169 {
4170 	if (p2p->go_neg_peer) {
4171 		if (p2p->drv_in_listen) {
4172 			p2p_dbg(p2p, "Driver is still in Listen state; wait for it to complete");
4173 			return;
4174 		}
4175 
4176 		if (p2p->go_neg_peer->connect_reqs >= 120) {
4177 			p2p_dbg(p2p, "Timeout on sending GO Negotiation Request without getting response");
4178 			p2p_go_neg_failed(p2p, -1);
4179 			return;
4180 		}
4181 
4182 		p2p_set_state(p2p, P2P_CONNECT);
4183 		p2p_connect_send(p2p, p2p->go_neg_peer);
4184 	} else
4185 		p2p_set_state(p2p, P2P_IDLE);
4186 }
4187 
4188 
p2p_timeout_wait_peer_connect(struct p2p_data * p2p)4189 static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
4190 {
4191 	p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
4192 
4193 	if (p2p->cfg->is_concurrent_session_active &&
4194 	    p2p->cfg->is_concurrent_session_active(p2p->cfg->cb_ctx))
4195 		p2p_set_timeout(p2p, 0, 500000);
4196 	else
4197 		p2p_set_timeout(p2p, 0, 200000);
4198 }
4199 
4200 
p2p_timeout_wait_peer_idle(struct p2p_data * p2p)4201 static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
4202 {
4203 	struct p2p_device *dev = p2p->go_neg_peer;
4204 
4205 	if (dev == NULL) {
4206 		p2p_dbg(p2p, "Unknown GO Neg peer - stop GO Neg wait");
4207 		return;
4208 	}
4209 
4210 	p2p_dbg(p2p, "Go to Listen state while waiting for the peer to become ready for GO Negotiation");
4211 	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4212 	p2p->pending_listen_wait_drv = false;
4213 	if (p2p->pending_listen_freq) {
4214 		p2p_dbg(p2p, "Clear pending_listen_freq for %s", __func__);
4215 		p2p->pending_listen_freq = 0;
4216 	}
4217 	p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
4218 	p2p_listen_in_find(p2p, 0);
4219 }
4220 
4221 
p2p_timeout_sd_during_find(struct p2p_data * p2p)4222 static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
4223 {
4224 	p2p_dbg(p2p, "Service Discovery Query timeout");
4225 	if (p2p->sd_peer) {
4226 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4227 		p2p->sd_peer = NULL;
4228 	}
4229 	p2p_continue_find(p2p);
4230 }
4231 
4232 
p2p_timeout_prov_disc_during_find(struct p2p_data * p2p)4233 static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
4234 {
4235 	p2p_dbg(p2p, "Provision Discovery Request timeout");
4236 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4237 	p2p_continue_find(p2p);
4238 }
4239 
4240 
p2p_timeout_prov_disc_req(struct p2p_data * p2p)4241 static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
4242 {
4243 	u32 adv_id = 0;
4244 	u8 *adv_mac = NULL;
4245 
4246 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4247 
4248 	/*
4249 	 * For user initiated PD requests that we have not gotten any responses
4250 	 * for while in IDLE state, we retry them a couple of times before
4251 	 * giving up.
4252 	 */
4253 	if (!p2p->user_initiated_pd)
4254 		return;
4255 
4256 	p2p_dbg(p2p, "User initiated Provision Discovery Request timeout");
4257 
4258 	if (p2p->pd_retries) {
4259 		p2p->pd_retries--;
4260 		p2p_retry_pd(p2p);
4261 	} else {
4262 		struct p2p_device *dev;
4263 		int for_join = 0;
4264 
4265 		dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
4266 			if (!ether_addr_equal(p2p->pending_pd_devaddr,
4267 					      dev->info.p2p_device_addr))
4268 				continue;
4269 			if (dev->req_config_methods &&
4270 			    (dev->flags & P2P_DEV_PD_FOR_JOIN))
4271 				for_join = 1;
4272 		}
4273 
4274 		if (p2p->p2ps_prov) {
4275 			adv_id = p2p->p2ps_prov->adv_id;
4276 			adv_mac = p2p->p2ps_prov->adv_mac;
4277 		}
4278 
4279 		if (p2p->cfg->prov_disc_fail)
4280 			p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
4281 						 p2p->pending_pd_devaddr,
4282 						 for_join ?
4283 						 P2P_PROV_DISC_TIMEOUT_JOIN :
4284 						 P2P_PROV_DISC_TIMEOUT,
4285 						 adv_id, adv_mac, NULL);
4286 		p2p_reset_pending_pd(p2p);
4287 	}
4288 }
4289 
4290 
p2p_timeout_invite(struct p2p_data * p2p)4291 static void p2p_timeout_invite(struct p2p_data *p2p)
4292 {
4293 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
4294 	p2p_set_state(p2p, P2P_INVITE_LISTEN);
4295 	if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
4296 		/*
4297 		 * Better remain on operating channel instead of listen channel
4298 		 * when running a group.
4299 		 * Wait 120 ms to let the P2P GO to send its beacon on the
4300 		 * intended TBTT.
4301 		 */
4302 		p2p_dbg(p2p, "Inviting in active GO role - wait on operating channel");
4303 		p2p_set_timeout(p2p, 0, 120000);
4304 		return;
4305 	}
4306 	p2p_listen_in_find(p2p, 0);
4307 }
4308 
4309 
p2p_timeout_invite_listen(struct p2p_data * p2p)4310 static void p2p_timeout_invite_listen(struct p2p_data *p2p)
4311 {
4312 	if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
4313 		p2p_set_state(p2p, P2P_INVITE);
4314 		p2p_invite_send(p2p, p2p->invite_peer,
4315 				p2p->invite_go_dev_addr, p2p->invite_dev_pw_id);
4316 	} else {
4317 		if (p2p->invite_peer) {
4318 			p2p_dbg(p2p, "Invitation Request retry limit reached");
4319 			if (p2p->cfg->invitation_result)
4320 				p2p->cfg->invitation_result(
4321 					p2p->cfg->cb_ctx, -1, NULL, 0, NULL,
4322 					NULL,
4323 					p2p->invite_peer->info.p2p_device_addr,
4324 					0, 0, NULL, NULL, 0,
4325 					p2p->invite_go_dev_addr);
4326 		}
4327 		p2p_set_state(p2p, P2P_IDLE);
4328 	}
4329 }
4330 
4331 
p2p_state_timeout(void * eloop_ctx,void * timeout_ctx)4332 static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
4333 {
4334 	struct p2p_data *p2p = eloop_ctx;
4335 
4336 	p2p_dbg(p2p, "Timeout (state=%s)", p2p_state_txt(p2p->state));
4337 
4338 	p2p->in_listen = 0;
4339 	if (p2p->drv_in_listen) {
4340 		p2p_dbg(p2p, "Driver is still in listen state - stop it");
4341 		p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
4342 		p2p->pending_listen_wait_drv = false;
4343 	}
4344 
4345 	switch (p2p->state) {
4346 	case P2P_IDLE:
4347 		/* Check if we timed out waiting for PD req */
4348 		if (p2p->pending_action_state == P2P_PENDING_PD)
4349 			p2p_timeout_prov_disc_req(p2p);
4350 		break;
4351 	case P2P_SEARCH:
4352 		/* Check if we timed out waiting for PD req */
4353 		if (p2p->pending_action_state == P2P_PENDING_PD)
4354 			p2p_timeout_prov_disc_req(p2p);
4355 		if (p2p->search_delay && !p2p->in_search_delay) {
4356 			p2p_dbg(p2p, "Delay search operation by %u ms",
4357 				p2p->search_delay);
4358 			p2p->in_search_delay = 1;
4359 			p2p_set_timeout(p2p, p2p->search_delay / 1000,
4360 					(p2p->search_delay % 1000) * 1000);
4361 			break;
4362 		}
4363 		p2p->in_search_delay = 0;
4364 		p2p_search(p2p);
4365 		break;
4366 	case P2P_CONNECT:
4367 		p2p_timeout_connect(p2p);
4368 		break;
4369 	case P2P_CONNECT_LISTEN:
4370 		p2p_timeout_connect_listen(p2p);
4371 		break;
4372 	case P2P_GO_NEG:
4373 		break;
4374 	case P2P_LISTEN_ONLY:
4375 		/* Check if we timed out waiting for PD req */
4376 		if (p2p->pending_action_state == P2P_PENDING_PD)
4377 			p2p_timeout_prov_disc_req(p2p);
4378 
4379 		if (p2p->ext_listen_only) {
4380 			p2p_dbg(p2p, "Extended Listen Timing - Listen State completed");
4381 			p2p->ext_listen_only = 0;
4382 			p2p_set_state(p2p, P2P_IDLE);
4383 		}
4384 		break;
4385 	case P2P_WAIT_PEER_CONNECT:
4386 		p2p_timeout_wait_peer_connect(p2p);
4387 		break;
4388 	case P2P_WAIT_PEER_IDLE:
4389 		p2p_timeout_wait_peer_idle(p2p);
4390 		break;
4391 	case P2P_SD_DURING_FIND:
4392 		p2p_timeout_sd_during_find(p2p);
4393 		break;
4394 	case P2P_PROVISIONING:
4395 		break;
4396 	case P2P_PD_DURING_FIND:
4397 		p2p_timeout_prov_disc_during_find(p2p);
4398 		break;
4399 	case P2P_INVITE:
4400 		p2p_timeout_invite(p2p);
4401 		break;
4402 	case P2P_INVITE_LISTEN:
4403 		p2p_timeout_invite_listen(p2p);
4404 		break;
4405 	}
4406 }
4407 
4408 
p2p_reject(struct p2p_data * p2p,const u8 * peer_addr)4409 int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
4410 {
4411 	struct p2p_device *dev;
4412 
4413 	dev = p2p_get_device(p2p, peer_addr);
4414 	p2p_dbg(p2p, "Local request to reject connection attempts by peer "
4415 		MACSTR, MAC2STR(peer_addr));
4416 	if (dev == NULL) {
4417 		p2p_dbg(p2p, "Peer " MACSTR " unknown", MAC2STR(peer_addr));
4418 		return -1;
4419 	}
4420 	dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
4421 	dev->flags |= P2P_DEV_USER_REJECTED;
4422 	return 0;
4423 }
4424 
4425 
p2p_wps_method_text(enum p2p_wps_method method)4426 const char * p2p_wps_method_text(enum p2p_wps_method method)
4427 {
4428 	switch (method) {
4429 	case WPS_NOT_READY:
4430 		return "not-ready";
4431 	case WPS_PIN_DISPLAY:
4432 		return "Display";
4433 	case WPS_PIN_KEYPAD:
4434 		return "Keypad";
4435 	case WPS_PBC:
4436 		return "PBC";
4437 	case WPS_NFC:
4438 		return "NFC";
4439 	case WPS_P2PS:
4440 		return "P2PS";
4441 	}
4442 
4443 	return "??";
4444 }
4445 
4446 
p2p_go_state_text(enum p2p_go_state go_state)4447 static const char * p2p_go_state_text(enum p2p_go_state go_state)
4448 {
4449 	switch (go_state) {
4450 	case UNKNOWN_GO:
4451 		return "unknown";
4452 	case LOCAL_GO:
4453 		return "local";
4454 	case  REMOTE_GO:
4455 		return "remote";
4456 	}
4457 
4458 	return "??";
4459 }
4460 
4461 
p2p_get_peer_info(struct p2p_data * p2p,const u8 * addr,int next)4462 const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
4463 					       const u8 *addr, int next)
4464 {
4465 	struct p2p_device *dev;
4466 
4467 	if (addr)
4468 		dev = p2p_get_device(p2p, addr);
4469 	else
4470 		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
4471 
4472 	if (dev && next) {
4473 		dev = dl_list_first(&dev->list, struct p2p_device, list);
4474 		if (&dev->list == &p2p->devices)
4475 			dev = NULL;
4476 	}
4477 
4478 	if (dev == NULL)
4479 		return NULL;
4480 
4481 	return &dev->info;
4482 }
4483 
4484 
p2p_get_peer_info_txt(const struct p2p_peer_info * info,char * buf,size_t buflen)4485 int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
4486 			  char *buf, size_t buflen)
4487 {
4488 	struct p2p_device *dev;
4489 	int res;
4490 	char *pos, *end;
4491 	struct os_reltime now;
4492 
4493 	if (info == NULL)
4494 		return -1;
4495 
4496 	dev = (struct p2p_device *) (((u8 *) info) -
4497 				     offsetof(struct p2p_device, info));
4498 
4499 	pos = buf;
4500 	end = buf + buflen;
4501 
4502 	os_get_reltime(&now);
4503 	res = os_snprintf(pos, end - pos,
4504 			  "age=%d\n"
4505 			  "listen_freq=%d\n"
4506 			  "wps_method=%s\n"
4507 			  "interface_addr=" MACSTR "\n"
4508 			  "member_in_go_dev=" MACSTR "\n"
4509 			  "member_in_go_iface=" MACSTR "\n"
4510 			  "go_neg_req_sent=%d\n"
4511 			  "go_state=%s\n"
4512 			  "dialog_token=%u\n"
4513 			  "intended_addr=" MACSTR "\n"
4514 			  "country=%c%c\n"
4515 			  "oper_freq=%d\n"
4516 			  "req_config_methods=0x%x\n"
4517 			  "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
4518 			  "status=%d\n"
4519 			  "invitation_reqs=%u\n",
4520 			  (int) (now.sec - dev->last_seen.sec),
4521 			  dev->listen_freq,
4522 			  p2p_wps_method_text(dev->wps_method),
4523 			  MAC2STR(dev->interface_addr),
4524 			  MAC2STR(dev->member_in_go_dev),
4525 			  MAC2STR(dev->member_in_go_iface),
4526 			  dev->go_neg_req_sent,
4527 			  p2p_go_state_text(dev->go_state),
4528 			  dev->dialog_token,
4529 			  MAC2STR(dev->intended_addr),
4530 			  dev->country[0] ? dev->country[0] : '_',
4531 			  dev->country[1] ? dev->country[1] : '_',
4532 			  dev->oper_freq,
4533 			  dev->req_config_methods,
4534 			  dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
4535 			  "[PROBE_REQ_ONLY]" : "",
4536 			  dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
4537 			  dev->flags & P2P_DEV_NOT_YET_READY ?
4538 			  "[NOT_YET_READY]" : "",
4539 			  dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
4540 			  "[PD_PEER_DISPLAY]" : "",
4541 			  dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
4542 			  "[PD_PEER_KEYPAD]" : "",
4543 			  dev->flags & P2P_DEV_PD_PEER_P2PS ?
4544 			  "[PD_PEER_P2PS]" : "",
4545 			  dev->flags & P2P_DEV_USER_REJECTED ?
4546 			  "[USER_REJECTED]" : "",
4547 			  dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
4548 			  "[PEER_WAITING_RESPONSE]" : "",
4549 			  dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
4550 			  "[PREFER_PERSISTENT_GROUP]" : "",
4551 			  dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
4552 			  "[WAIT_GO_NEG_RESPONSE]" : "",
4553 			  dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
4554 			  "[WAIT_GO_NEG_CONFIRM]" : "",
4555 			  dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
4556 			  "[GROUP_CLIENT_ONLY]" : "",
4557 			  dev->flags & P2P_DEV_FORCE_FREQ ?
4558 			  "[FORCE_FREQ]" : "",
4559 			  dev->flags & P2P_DEV_PD_FOR_JOIN ?
4560 			  "[PD_FOR_JOIN]" : "",
4561 			  dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT ?
4562 			  "[LAST_SEEN_AS_GROUP_CLIENT]" : "",
4563 			  dev->status,
4564 			  dev->invitation_reqs);
4565 	if (os_snprintf_error(end - pos, res))
4566 		return pos - buf;
4567 	pos += res;
4568 
4569 	if (dev->ext_listen_period) {
4570 		res = os_snprintf(pos, end - pos,
4571 				  "ext_listen_period=%u\n"
4572 				  "ext_listen_interval=%u\n",
4573 				  dev->ext_listen_period,
4574 				  dev->ext_listen_interval);
4575 		if (os_snprintf_error(end - pos, res))
4576 			return pos - buf;
4577 		pos += res;
4578 	}
4579 
4580 	if (dev->oper_ssid_len) {
4581 		res = os_snprintf(pos, end - pos,
4582 				  "oper_ssid=%s\n",
4583 				  wpa_ssid_txt(dev->oper_ssid,
4584 					       dev->oper_ssid_len));
4585 		if (os_snprintf_error(end - pos, res))
4586 			return pos - buf;
4587 		pos += res;
4588 	}
4589 
4590 #ifdef CONFIG_WIFI_DISPLAY
4591 	if (dev->info.wfd_subelems) {
4592 		res = os_snprintf(pos, end - pos, "wfd_subelems=");
4593 		if (os_snprintf_error(end - pos, res))
4594 			return pos - buf;
4595 		pos += res;
4596 
4597 		pos += wpa_snprintf_hex(pos, end - pos,
4598 					wpabuf_head(dev->info.wfd_subelems),
4599 					wpabuf_len(dev->info.wfd_subelems));
4600 
4601 		res = os_snprintf(pos, end - pos, "\n");
4602 		if (os_snprintf_error(end - pos, res))
4603 			return pos - buf;
4604 		pos += res;
4605 	}
4606 #endif /* CONFIG_WIFI_DISPLAY */
4607 
4608 	return pos - buf;
4609 }
4610 
4611 
p2p_peer_known(struct p2p_data * p2p,const u8 * addr)4612 int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
4613 {
4614 	return p2p_get_device(p2p, addr) != NULL;
4615 }
4616 
4617 
p2p_set_client_discoverability(struct p2p_data * p2p,int enabled)4618 void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
4619 {
4620 	if (enabled) {
4621 		p2p_dbg(p2p, "Client discoverability enabled");
4622 		p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4623 	} else {
4624 		p2p_dbg(p2p, "Client discoverability disabled");
4625 		p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
4626 	}
4627 }
4628 
4629 
p2p_build_presence_req(u32 duration1,u32 interval1,u32 duration2,u32 interval2)4630 static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
4631 					      u32 duration2, u32 interval2)
4632 {
4633 	struct wpabuf *req;
4634 	struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
4635 	u8 *len;
4636 
4637 	req = wpabuf_alloc(100);
4638 	if (req == NULL)
4639 		return NULL;
4640 
4641 	if (duration1 || interval1) {
4642 		os_memset(&desc1, 0, sizeof(desc1));
4643 		desc1.count_type = 1;
4644 		desc1.duration = duration1;
4645 		desc1.interval = interval1;
4646 		ptr1 = &desc1;
4647 
4648 		if (duration2 || interval2) {
4649 			os_memset(&desc2, 0, sizeof(desc2));
4650 			desc2.count_type = 2;
4651 			desc2.duration = duration2;
4652 			desc2.interval = interval2;
4653 			ptr2 = &desc2;
4654 		}
4655 	}
4656 
4657 	p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
4658 	len = p2p_buf_add_ie_hdr(req);
4659 	p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
4660 	p2p_buf_update_ie_hdr(req, len);
4661 
4662 	return req;
4663 }
4664 
4665 
p2p_presence_req(struct p2p_data * p2p,const u8 * go_interface_addr,const u8 * own_interface_addr,unsigned int freq,u32 duration1,u32 interval1,u32 duration2,u32 interval2)4666 int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
4667 		     const u8 *own_interface_addr, unsigned int freq,
4668 		     u32 duration1, u32 interval1, u32 duration2,
4669 		     u32 interval2)
4670 {
4671 	struct wpabuf *req;
4672 
4673 	p2p_dbg(p2p, "Send Presence Request to GO " MACSTR
4674 		" (own interface " MACSTR ") freq=%u dur1=%u int1=%u "
4675 		"dur2=%u int2=%u",
4676 		MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
4677 		freq, duration1, interval1, duration2, interval2);
4678 
4679 	req = p2p_build_presence_req(duration1, interval1, duration2,
4680 				     interval2);
4681 	if (req == NULL)
4682 		return -1;
4683 
4684 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4685 	if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
4686 			    go_interface_addr,
4687 			    wpabuf_head(req), wpabuf_len(req), 200) < 0) {
4688 		p2p_dbg(p2p, "Failed to send Action frame");
4689 	}
4690 	wpabuf_free(req);
4691 
4692 	return 0;
4693 }
4694 
4695 
p2p_build_presence_resp(u8 status,const u8 * noa,size_t noa_len,u8 dialog_token)4696 static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
4697 					       size_t noa_len, u8 dialog_token)
4698 {
4699 	struct wpabuf *resp;
4700 	u8 *len;
4701 
4702 	resp = wpabuf_alloc(100 + noa_len);
4703 	if (resp == NULL)
4704 		return NULL;
4705 
4706 	p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
4707 	len = p2p_buf_add_ie_hdr(resp);
4708 	p2p_buf_add_status(resp, status);
4709 	if (noa) {
4710 		wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
4711 		wpabuf_put_le16(resp, noa_len);
4712 		wpabuf_put_data(resp, noa, noa_len);
4713 	} else
4714 		p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
4715 	p2p_buf_update_ie_hdr(resp, len);
4716 
4717 	return resp;
4718 }
4719 
4720 
p2p_process_presence_req(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len,int rx_freq)4721 static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
4722 				     const u8 *sa, const u8 *data, size_t len,
4723 				     int rx_freq)
4724 {
4725 	struct p2p_message msg;
4726 	u8 status;
4727 	struct wpabuf *resp;
4728 	size_t g;
4729 	struct p2p_group *group = NULL;
4730 	int parsed = 0;
4731 	u8 noa[50];
4732 	int noa_len;
4733 
4734 	p2p_dbg(p2p, "Received P2P Action - P2P Presence Request");
4735 
4736 	for (g = 0; g < p2p->num_groups; g++) {
4737 		if (ether_addr_equal(
4738 			    da, p2p_group_get_interface_addr(p2p->groups[g]))) {
4739 			group = p2p->groups[g];
4740 			break;
4741 		}
4742 	}
4743 	if (group == NULL) {
4744 		p2p_dbg(p2p, "Ignore P2P Presence Request for unknown group "
4745 			MACSTR, MAC2STR(da));
4746 		return;
4747 	}
4748 
4749 	if (p2p_parse(data, len, &msg) < 0) {
4750 		p2p_dbg(p2p, "Failed to parse P2P Presence Request");
4751 		status = P2P_SC_FAIL_INVALID_PARAMS;
4752 		goto fail;
4753 	}
4754 	parsed = 1;
4755 
4756 	if (msg.noa == NULL) {
4757 		p2p_dbg(p2p, "No NoA attribute in P2P Presence Request");
4758 		status = P2P_SC_FAIL_INVALID_PARAMS;
4759 		goto fail;
4760 	}
4761 
4762 	status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
4763 
4764 fail:
4765 	if (p2p->cfg->get_noa)
4766 		noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
4767 					    sizeof(noa));
4768 	else
4769 		noa_len = -1;
4770 	resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
4771 				       noa_len > 0 ? noa_len : 0,
4772 				       msg.dialog_token);
4773 	if (parsed)
4774 		p2p_parse_free(&msg);
4775 	if (resp == NULL)
4776 		return;
4777 
4778 	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
4779 	if (p2p_send_action(p2p, rx_freq, sa, da, da,
4780 			    wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
4781 		p2p_dbg(p2p, "Failed to send Action frame");
4782 	}
4783 	wpabuf_free(resp);
4784 }
4785 
4786 
p2p_process_presence_resp(struct p2p_data * p2p,const u8 * da,const u8 * sa,const u8 * data,size_t len)4787 static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
4788 				      const u8 *sa, const u8 *data, size_t len)
4789 {
4790 	struct p2p_message msg;
4791 
4792 	p2p_dbg(p2p, "Received P2P Action - P2P Presence Response");
4793 
4794 	if (p2p_parse(data, len, &msg) < 0) {
4795 		p2p_dbg(p2p, "Failed to parse P2P Presence Response");
4796 		return;
4797 	}
4798 
4799 	if (msg.status == NULL || msg.noa == NULL) {
4800 		p2p_dbg(p2p, "No Status or NoA attribute in P2P Presence Response");
4801 		p2p_parse_free(&msg);
4802 		return;
4803 	}
4804 
4805 	if (p2p->cfg->presence_resp) {
4806 		p2p->cfg->presence_resp(p2p->cfg->cb_ctx, sa, *msg.status,
4807 					msg.noa, msg.noa_len);
4808 	}
4809 
4810 	if (*msg.status) {
4811 		p2p_dbg(p2p, "P2P Presence Request was rejected: status %u",
4812 			*msg.status);
4813 		p2p_parse_free(&msg);
4814 		return;
4815 	}
4816 
4817 	p2p_dbg(p2p, "P2P Presence Request was accepted");
4818 	wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
4819 		    msg.noa, msg.noa_len);
4820 	/* TODO: process NoA */
4821 	p2p_parse_free(&msg);
4822 }
4823 
4824 
p2p_ext_listen_timeout(void * eloop_ctx,void * timeout_ctx)4825 static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
4826 {
4827 	struct p2p_data *p2p = eloop_ctx;
4828 
4829 	if (p2p->ext_listen_interval) {
4830 		/* Schedule next extended listen timeout */
4831 		eloop_register_timeout(p2p->ext_listen_interval_sec,
4832 				       p2p->ext_listen_interval_usec,
4833 				       p2p_ext_listen_timeout, p2p, NULL);
4834 	}
4835 
4836 	if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
4837 		/*
4838 		 * This should not really happen, but it looks like the Listen
4839 		 * command may fail is something else (e.g., a scan) was
4840 		 * running at an inconvenient time. As a workaround, allow new
4841 		 * Extended Listen operation to be started.
4842 		 */
4843 		p2p_dbg(p2p, "Previous Extended Listen operation had not been completed - try again");
4844 		p2p->ext_listen_only = 0;
4845 		p2p_set_state(p2p, P2P_IDLE);
4846 	}
4847 
4848 	if ((p2p->cfg->is_p2p_in_progress &&
4849 	     p2p->cfg->is_p2p_in_progress(p2p->cfg->cb_ctx)) ||
4850 	    (p2p->pending_action_state == P2P_PENDING_PD &&
4851 	     p2p->pd_retries > 0)) {
4852 		p2p_dbg(p2p, "Operation in progress - skip Extended Listen timeout (%s)",
4853 			p2p_state_txt(p2p->state));
4854 		return;
4855 	}
4856 
4857 	if (p2p->state != P2P_IDLE) {
4858 		p2p_dbg(p2p, "Skip Extended Listen timeout in active state (%s)", p2p_state_txt(p2p->state));
4859 		return;
4860 	}
4861 
4862 	p2p_dbg(p2p, "Extended Listen timeout");
4863 	p2p->ext_listen_only = 1;
4864 	if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
4865 		p2p_dbg(p2p, "Failed to start Listen state for Extended Listen Timing");
4866 		p2p->ext_listen_only = 0;
4867 	}
4868 }
4869 
4870 
p2p_ext_listen(struct p2p_data * p2p,unsigned int period,unsigned int interval)4871 int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
4872 		   unsigned int interval)
4873 {
4874 	if (period > 65535 || interval > 65535 || period > interval ||
4875 	    (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
4876 		p2p_dbg(p2p, "Invalid Extended Listen Timing request: period=%u interval=%u",
4877 			period, interval);
4878 		return -1;
4879 	}
4880 
4881 	eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
4882 
4883 	if (interval == 0) {
4884 		p2p_dbg(p2p, "Disabling Extended Listen Timing");
4885 		p2p->ext_listen_period = 0;
4886 		p2p->ext_listen_interval = 0;
4887 		return 0;
4888 	}
4889 
4890 	p2p_dbg(p2p, "Enabling Extended Listen Timing: period %u msec, interval %u msec",
4891 		period, interval);
4892 	p2p->ext_listen_period = period;
4893 	p2p->ext_listen_interval = interval;
4894 	p2p->ext_listen_interval_sec = interval / 1000;
4895 	p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
4896 
4897 	eloop_register_timeout(p2p->ext_listen_interval_sec,
4898 			       p2p->ext_listen_interval_usec,
4899 			       p2p_ext_listen_timeout, p2p, NULL);
4900 
4901 	return 0;
4902 }
4903 
4904 
p2p_deauth_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4905 void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4906 		      const u8 *ie, size_t ie_len)
4907 {
4908 	struct p2p_message msg;
4909 
4910 	if (bssid == NULL || ie == NULL)
4911 		return;
4912 
4913 	os_memset(&msg, 0, sizeof(msg));
4914 	if (p2p_parse_ies(ie, ie_len, &msg))
4915 		return;
4916 	if (msg.minor_reason_code == NULL) {
4917 		p2p_parse_free(&msg);
4918 		return;
4919 	}
4920 
4921 	p2p_dbg(p2p, "Deauthentication notification BSSID " MACSTR
4922 		" reason_code=%u minor_reason_code=%u",
4923 		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4924 
4925 	p2p_parse_free(&msg);
4926 }
4927 
4928 
p2p_disassoc_notif(struct p2p_data * p2p,const u8 * bssid,u16 reason_code,const u8 * ie,size_t ie_len)4929 void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
4930 			const u8 *ie, size_t ie_len)
4931 {
4932 	struct p2p_message msg;
4933 
4934 	if (bssid == NULL || ie == NULL)
4935 		return;
4936 
4937 	os_memset(&msg, 0, sizeof(msg));
4938 	if (p2p_parse_ies(ie, ie_len, &msg))
4939 		return;
4940 	if (msg.minor_reason_code == NULL) {
4941 		p2p_parse_free(&msg);
4942 		return;
4943 	}
4944 
4945 	p2p_dbg(p2p, "Disassociation notification BSSID " MACSTR
4946 		" reason_code=%u minor_reason_code=%u",
4947 		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
4948 
4949 	p2p_parse_free(&msg);
4950 }
4951 
4952 
p2p_set_managed_oper(struct p2p_data * p2p,int enabled)4953 void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
4954 {
4955 	if (enabled) {
4956 		p2p_dbg(p2p, "Managed P2P Device operations enabled");
4957 		p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
4958 	} else {
4959 		p2p_dbg(p2p, "Managed P2P Device operations disabled");
4960 		p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
4961 	}
4962 }
4963 
4964 
4965 #ifdef CONFIG_TESTING_OPTIONS
4966 
p2p_set_pairing_setup(struct p2p_data * p2p,int pairing_setup)4967 void p2p_set_pairing_setup(struct p2p_data *p2p, int pairing_setup)
4968 {
4969 	p2p_dbg(p2p, "Pairing Setup %s",
4970 		pairing_setup ? "Enabled" : "Disabled");
4971 	if (pairing_setup) {
4972 		p2p->cfg->pairing_config.pairing_capable = true;
4973 		p2p->cfg->pairing_config.enable_pairing_setup = true;
4974 		if (p2p->pairing_info)
4975 			p2p->pairing_info->enable_pairing_setup = true;
4976 	} else {
4977 		p2p->cfg->pairing_config.pairing_capable = false;
4978 		p2p->cfg->pairing_config.enable_pairing_setup = false;
4979 		if (p2p->pairing_info)
4980 			p2p->pairing_info->enable_pairing_setup = false;
4981 	}
4982 }
4983 
4984 
p2p_set_pairing_cache(struct p2p_data * p2p,int pairing_cache)4985 void p2p_set_pairing_cache(struct p2p_data *p2p, int pairing_cache)
4986 {
4987 	p2p_dbg(p2p, "Pairing Cache %s",
4988 		pairing_cache ? "Enabled" : "Disabled");
4989 	if (pairing_cache) {
4990 		p2p->cfg->pairing_config.enable_pairing_cache = true;
4991 		if (p2p->pairing_info)
4992 			p2p->pairing_info->enable_pairing_cache = true;
4993 	} else {
4994 		p2p->cfg->pairing_config.enable_pairing_cache = false;
4995 		if (p2p->pairing_info)
4996 			p2p->pairing_info->enable_pairing_cache = false;
4997 	}
4998 }
4999 
5000 
p2p_set_bootstrapmethods(struct p2p_data * p2p,int bootstrap_methods)5001 void p2p_set_bootstrapmethods(struct p2p_data *p2p, int bootstrap_methods)
5002 {
5003 	p2p_dbg(p2p, "Bootstraping methods: 0x%x", bootstrap_methods);
5004 	p2p->cfg->pairing_config.bootstrap_methods = bootstrap_methods;
5005 	if (p2p->pairing_info)
5006 		p2p->pairing_info->supported_bootstrap = bootstrap_methods;
5007 }
5008 
5009 
p2p_set_pasn_type(struct p2p_data * p2p,u8 pasn_type)5010 void p2p_set_pasn_type(struct p2p_data *p2p, u8 pasn_type)
5011 {
5012 	p2p_dbg(p2p, "PASN type: 0x%x", pasn_type);
5013 	p2p->cfg->pairing_config.pasn_type = pasn_type;
5014 }
5015 
5016 
p2p_set_comeback_after(struct p2p_data * p2p,int comeback_after)5017 void p2p_set_comeback_after(struct p2p_data *p2p, int comeback_after)
5018 {
5019 	p2p_dbg(p2p, "Comeback after: %d", comeback_after);
5020 	p2p->cfg->comeback_after = comeback_after;
5021 }
5022 
5023 
p2p_set_reg_info(struct p2p_data * p2p,u8 val)5024 void p2p_set_reg_info(struct p2p_data *p2p, u8 val)
5025 {
5026 	p2p->cfg->reg_info = val;
5027 }
5028 
5029 
p2p_set_twt_power_mgmt(struct p2p_data * p2p,int val)5030 void p2p_set_twt_power_mgmt(struct p2p_data *p2p, int val)
5031 {
5032 	p2p_dbg(p2p, "TWT-based P2P Power Mgmt: %s",
5033 		     val ? "Enabled" : "Disabled");
5034 	if (val)
5035 		p2p->cfg->twt_power_mgmt = true;
5036 	else
5037 		p2p->cfg->twt_power_mgmt = false;
5038 }
5039 
5040 
p2p_set_chan_switch_req_enable(struct p2p_data * p2p,bool val)5041 void p2p_set_chan_switch_req_enable(struct p2p_data *p2p, bool val)
5042 {
5043 	p2p->cfg->chan_switch_req_enable = val;
5044 }
5045 
5046 
p2p_set_invitation_op_freq(struct p2p_data * p2p,int freq)5047 void p2p_set_invitation_op_freq(struct p2p_data *p2p, int freq)
5048 {
5049 	u8 op_class, channel;
5050 
5051 	if (freq == -1) {
5052 		p2p->cfg->inv_op_class = 0;
5053 		p2p->cfg->inv_op_channel = 0;
5054 		return;
5055 	}
5056 
5057 	if (p2p_freq_to_channel(freq, &op_class, &channel) < 0)
5058 		return;
5059 
5060 	p2p->cfg->inv_op_class = op_class;
5061 	p2p->cfg->inv_op_channel = channel;
5062 }
5063 
5064 #endif /* CONFIG_TESTING_OPTIONS */
5065 
5066 
p2p_config_get_random_social(struct p2p_config * p2p,u8 * op_class,u8 * op_channel,struct wpa_freq_range_list * avoid_list,struct wpa_freq_range_list * disallow_list)5067 int p2p_config_get_random_social(struct p2p_config *p2p, u8 *op_class,
5068 				 u8 *op_channel,
5069 				 struct wpa_freq_range_list *avoid_list,
5070 				 struct wpa_freq_range_list *disallow_list)
5071 {
5072 	return p2p_channel_random_social(&p2p->channels, op_class, op_channel,
5073 					 avoid_list, disallow_list);
5074 }
5075 
5076 
p2p_set_listen_channel(struct p2p_data * p2p,u8 reg_class,u8 channel,u8 forced)5077 int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel,
5078 			   u8 forced)
5079 {
5080 	if (p2p_channel_to_freq(reg_class, channel) < 0)
5081 		return -1;
5082 
5083 	/*
5084 	 * Listen channel was set in configuration or set by control interface;
5085 	 * cannot override it.
5086 	 */
5087 	if (p2p->cfg->channel_forced && forced == 0) {
5088 		p2p_dbg(p2p,
5089 			"Listen channel was previously configured - do not override based on optimization");
5090 		return -1;
5091 	}
5092 
5093 	p2p_dbg(p2p, "Set Listen channel: reg_class %u channel %u",
5094 		reg_class, channel);
5095 
5096 	if (p2p->state == P2P_IDLE) {
5097 		p2p->cfg->reg_class = reg_class;
5098 		p2p->cfg->channel = channel;
5099 		p2p->cfg->channel_forced = forced;
5100 	} else {
5101 		p2p_dbg(p2p, "Defer setting listen channel");
5102 		p2p->pending_reg_class = reg_class;
5103 		p2p->pending_channel = channel;
5104 		p2p->pending_channel_forced = forced;
5105 	}
5106 
5107 	return 0;
5108 }
5109 
5110 
p2p_get_listen_channel(struct p2p_data * p2p)5111 u8 p2p_get_listen_channel(struct p2p_data *p2p)
5112 {
5113 	return p2p->cfg->channel;
5114 }
5115 
5116 
p2p_set_ssid_postfix(struct p2p_data * p2p,const u8 * postfix,size_t len)5117 int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
5118 {
5119 	p2p_dbg(p2p, "New SSID postfix: %s", wpa_ssid_txt(postfix, len));
5120 	if (postfix == NULL) {
5121 		p2p->cfg->ssid_postfix_len = 0;
5122 		return 0;
5123 	}
5124 	if (len > sizeof(p2p->cfg->ssid_postfix))
5125 		return -1;
5126 	os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
5127 	p2p->cfg->ssid_postfix_len = len;
5128 	return 0;
5129 }
5130 
5131 
p2p_set_oper_channel(struct p2p_data * p2p,u8 op_reg_class,u8 op_channel,int cfg_op_channel)5132 int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
5133 			 int cfg_op_channel)
5134 {
5135 	if (p2p_channel_to_freq(op_reg_class, op_channel) < 0)
5136 		return -1;
5137 
5138 	p2p_dbg(p2p, "Set Operating channel: reg_class %u channel %u",
5139 		op_reg_class, op_channel);
5140 	p2p->cfg->op_reg_class = op_reg_class;
5141 	p2p->cfg->op_channel = op_channel;
5142 	p2p->cfg->cfg_op_channel = cfg_op_channel;
5143 	return 0;
5144 }
5145 
5146 
p2p_set_pref_chan(struct p2p_data * p2p,unsigned int num_pref_chan,const struct p2p_channel * pref_chan)5147 int p2p_set_pref_chan(struct p2p_data *p2p, unsigned int num_pref_chan,
5148 		      const struct p2p_channel *pref_chan)
5149 {
5150 	struct p2p_channel *n;
5151 
5152 	if (pref_chan) {
5153 		n = os_memdup(pref_chan,
5154 			      num_pref_chan * sizeof(struct p2p_channel));
5155 		if (n == NULL)
5156 			return -1;
5157 	} else
5158 		n = NULL;
5159 
5160 	os_free(p2p->cfg->pref_chan);
5161 	p2p->cfg->pref_chan = n;
5162 	p2p->cfg->num_pref_chan = num_pref_chan;
5163 
5164 	return 0;
5165 }
5166 
5167 
p2p_set_no_go_freq(struct p2p_data * p2p,const struct wpa_freq_range_list * list)5168 int p2p_set_no_go_freq(struct p2p_data *p2p,
5169 		       const struct wpa_freq_range_list *list)
5170 {
5171 	struct wpa_freq_range *tmp;
5172 
5173 	if (list == NULL || list->num == 0) {
5174 		os_free(p2p->no_go_freq.range);
5175 		p2p->no_go_freq.range = NULL;
5176 		p2p->no_go_freq.num = 0;
5177 		return 0;
5178 	}
5179 
5180 	tmp = os_calloc(list->num, sizeof(struct wpa_freq_range));
5181 	if (tmp == NULL)
5182 		return -1;
5183 	os_memcpy(tmp, list->range, list->num * sizeof(struct wpa_freq_range));
5184 	os_free(p2p->no_go_freq.range);
5185 	p2p->no_go_freq.range = tmp;
5186 	p2p->no_go_freq.num = list->num;
5187 	p2p_dbg(p2p, "Updated no GO chan list");
5188 
5189 	return 0;
5190 }
5191 
5192 
p2p_get_interface_addr(struct p2p_data * p2p,const u8 * dev_addr,u8 * iface_addr)5193 int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
5194 			   u8 *iface_addr)
5195 {
5196 	struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
5197 
5198 	if (!dev || is_zero_ether_addr(dev->interface_addr)) {
5199 		p2p_dbg(p2p,
5200 			"P2P: Failed to get interface address from device addr "
5201 			MACSTR, MAC2STR(dev_addr));
5202 		return -1;
5203 	}
5204 	os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
5205 	return 0;
5206 }
5207 
5208 
p2p_get_dev_addr(struct p2p_data * p2p,const u8 * iface_addr,u8 * dev_addr)5209 int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
5210 			   u8 *dev_addr)
5211 {
5212 	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5213 
5214 	if (!dev) {
5215 		p2p_dbg(p2p,
5216 			"P2P: Failed to get device address from interface address "
5217 			MACSTR, MAC2STR(iface_addr));
5218 		return -1;
5219 	}
5220 	os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
5221 	return 0;
5222 }
5223 
5224 
p2p_get_dev_identity_key(struct p2p_data * p2p,const u8 * dev_addr,const u8 ** dik_data,size_t * dik_len,u8 * cipher)5225 int p2p_get_dev_identity_key(struct p2p_data *p2p, const u8 *dev_addr,
5226 			     const u8 **dik_data, size_t *dik_len, u8 *cipher)
5227 {
5228 	if (!p2p || !p2p->peer_dik_len) {
5229 		wpa_printf(MSG_DEBUG,
5230 			   "P2P2: Failed to get device identity key for "
5231 			   MACSTR, MAC2STR(dev_addr));
5232 		return -1;
5233 	}
5234 
5235 	*dik_data = p2p->peer_dik_data;
5236 	*dik_len = p2p->peer_dik_len;
5237 	*cipher = p2p->dik_cipher_version;
5238 
5239 	/* Reset DIK length to invalidate DIK for successive iteration of a new
5240 	 * peer. */
5241 	p2p->peer_dik_len = 0;
5242 
5243 	return 0;
5244 }
5245 
5246 
p2p_set_peer_filter(struct p2p_data * p2p,const u8 * addr)5247 void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
5248 {
5249 	os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
5250 	if (is_zero_ether_addr(p2p->peer_filter))
5251 		p2p_dbg(p2p, "Disable peer filter");
5252 	else
5253 		p2p_dbg(p2p, "Enable peer filter for " MACSTR,
5254 			MAC2STR(p2p->peer_filter));
5255 }
5256 
5257 
p2p_set_cross_connect(struct p2p_data * p2p,int enabled)5258 void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
5259 {
5260 	p2p_dbg(p2p, "Cross connection %s", enabled ? "enabled" : "disabled");
5261 	if (p2p->cross_connect == enabled)
5262 		return;
5263 	p2p->cross_connect = enabled;
5264 	/* TODO: may need to tear down any action group where we are GO(?) */
5265 }
5266 
5267 
p2p_get_oper_freq(struct p2p_data * p2p,const u8 * iface_addr)5268 int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
5269 {
5270 	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
5271 	if (dev == NULL)
5272 		return -1;
5273 	if (dev->oper_freq <= 0)
5274 		return -1;
5275 	return dev->oper_freq;
5276 }
5277 
5278 
p2p_set_intra_bss_dist(struct p2p_data * p2p,int enabled)5279 void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
5280 {
5281 	p2p_dbg(p2p, "Intra BSS distribution %s",
5282 		enabled ? "enabled" : "disabled");
5283 	p2p->cfg->p2p_intra_bss = enabled;
5284 }
5285 
5286 
p2p_update_channel_list(struct p2p_data * p2p,const struct p2p_channels * chan,const struct p2p_channels * cli_chan)5287 void p2p_update_channel_list(struct p2p_data *p2p,
5288 			     const struct p2p_channels *chan,
5289 			     const struct p2p_channels *cli_chan)
5290 {
5291 	p2p_dbg(p2p, "Update channel list");
5292 	os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
5293 	p2p_channels_dump(p2p, "channels", &p2p->cfg->channels);
5294 	os_memcpy(&p2p->cfg->cli_channels, cli_chan,
5295 		  sizeof(struct p2p_channels));
5296 	p2p_channels_dump(p2p, "cli_channels", &p2p->cfg->cli_channels);
5297 }
5298 
5299 
p2p_send_action(struct p2p_data * p2p,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * buf,size_t len,unsigned int wait_time)5300 int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
5301 		    const u8 *src, const u8 *bssid, const u8 *buf,
5302 		    size_t len, unsigned int wait_time)
5303 {
5304 	int res, scheduled;
5305 
5306 	res = p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
5307 				    buf, len, wait_time, &scheduled);
5308 	if (res == 0 && scheduled && p2p->in_listen && freq > 0 &&
5309 	    p2p->drv_in_listen > 0 &&
5310 	    (unsigned int) p2p->drv_in_listen != freq) {
5311 		p2p_dbg(p2p,
5312 			"Stop listen on %d MHz to allow a frame to be sent immediately on %d MHz",
5313 			p2p->drv_in_listen, freq);
5314 		p2p_stop_listen_for_freq(p2p, freq);
5315 	}
5316 	return res;
5317 }
5318 
5319 
p2p_set_best_channels(struct p2p_data * p2p,int freq_24,int freq_5,int freq_overall)5320 void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
5321 			   int freq_overall)
5322 {
5323 	p2p_dbg(p2p, "Best channel: 2.4 GHz: %d,  5 GHz: %d,  overall: %d",
5324 		freq_24, freq_5, freq_overall);
5325 	p2p->best_freq_24 = freq_24;
5326 	p2p->best_freq_5 = freq_5;
5327 	p2p->best_freq_overall = freq_overall;
5328 }
5329 
5330 
p2p_set_own_freq_preference(struct p2p_data * p2p,int freq)5331 void p2p_set_own_freq_preference(struct p2p_data *p2p, int freq)
5332 {
5333 	p2p_dbg(p2p, "Own frequency preference: %d MHz", freq);
5334 	p2p->own_freq_preference = freq;
5335 }
5336 
5337 
p2p_get_go_neg_peer(struct p2p_data * p2p)5338 const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
5339 {
5340 	if (p2p == NULL || p2p->go_neg_peer == NULL)
5341 		return NULL;
5342 	return p2p->go_neg_peer->info.p2p_device_addr;
5343 }
5344 
5345 
5346 const struct p2p_peer_info *
p2p_get_peer_found(struct p2p_data * p2p,const u8 * addr,int next)5347 p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
5348 {
5349 	struct p2p_device *dev;
5350 
5351 	if (addr) {
5352 		dev = p2p_get_device(p2p, addr);
5353 		if (!dev)
5354 			return NULL;
5355 
5356 		if (!next) {
5357 			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
5358 				return NULL;
5359 
5360 			return &dev->info;
5361 		} else {
5362 			do {
5363 				dev = dl_list_first(&dev->list,
5364 						    struct p2p_device,
5365 						    list);
5366 				if (!dev || &dev->list == &p2p->devices)
5367 					return NULL;
5368 			} while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
5369 		}
5370 	} else {
5371 		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
5372 		if (!dev)
5373 			return NULL;
5374 		while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
5375 			dev = dl_list_first(&dev->list,
5376 					    struct p2p_device,
5377 					    list);
5378 			if (!dev || &dev->list == &p2p->devices)
5379 				return NULL;
5380 		}
5381 	}
5382 
5383 	return &dev->info;
5384 }
5385 
5386 
p2p_in_progress(struct p2p_data * p2p)5387 int p2p_in_progress(struct p2p_data *p2p)
5388 {
5389 	if (p2p == NULL)
5390 		return 0;
5391 	if (p2p->state == P2P_SEARCH)
5392 		return 2;
5393 	return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
5394 }
5395 
5396 
p2p_set_config_timeout(struct p2p_data * p2p,u8 go_timeout,u8 client_timeout)5397 void p2p_set_config_timeout(struct p2p_data *p2p, u8 go_timeout,
5398 			    u8 client_timeout)
5399 {
5400 	if (p2p) {
5401 		p2p->go_timeout = go_timeout;
5402 		p2p->client_timeout = client_timeout;
5403 	}
5404 }
5405 
5406 
5407 #ifdef CONFIG_WIFI_DISPLAY
5408 
p2p_update_wfd_ie_groups(struct p2p_data * p2p)5409 static void p2p_update_wfd_ie_groups(struct p2p_data *p2p)
5410 {
5411 	size_t g;
5412 	struct p2p_group *group;
5413 
5414 	for (g = 0; g < p2p->num_groups; g++) {
5415 		group = p2p->groups[g];
5416 		p2p_group_force_beacon_update_ies(group);
5417 	}
5418 }
5419 
5420 
p2p_set_wfd_ie_beacon(struct p2p_data * p2p,struct wpabuf * ie)5421 int p2p_set_wfd_ie_beacon(struct p2p_data *p2p, struct wpabuf *ie)
5422 {
5423 	wpabuf_free(p2p->wfd_ie_beacon);
5424 	p2p->wfd_ie_beacon = ie;
5425 	p2p_update_wfd_ie_groups(p2p);
5426 	return 0;
5427 }
5428 
5429 
p2p_set_wfd_ie_probe_req(struct p2p_data * p2p,struct wpabuf * ie)5430 int p2p_set_wfd_ie_probe_req(struct p2p_data *p2p, struct wpabuf *ie)
5431 {
5432 	wpabuf_free(p2p->wfd_ie_probe_req);
5433 	p2p->wfd_ie_probe_req = ie;
5434 	return 0;
5435 }
5436 
5437 
p2p_set_wfd_ie_probe_resp(struct p2p_data * p2p,struct wpabuf * ie)5438 int p2p_set_wfd_ie_probe_resp(struct p2p_data *p2p, struct wpabuf *ie)
5439 {
5440 	wpabuf_free(p2p->wfd_ie_probe_resp);
5441 	p2p->wfd_ie_probe_resp = ie;
5442 	p2p_update_wfd_ie_groups(p2p);
5443 	return 0;
5444 }
5445 
5446 
p2p_set_wfd_ie_assoc_req(struct p2p_data * p2p,struct wpabuf * ie)5447 int p2p_set_wfd_ie_assoc_req(struct p2p_data *p2p, struct wpabuf *ie)
5448 {
5449 	wpabuf_free(p2p->wfd_ie_assoc_req);
5450 	p2p->wfd_ie_assoc_req = ie;
5451 	return 0;
5452 }
5453 
5454 
p2p_set_wfd_ie_invitation(struct p2p_data * p2p,struct wpabuf * ie)5455 int p2p_set_wfd_ie_invitation(struct p2p_data *p2p, struct wpabuf *ie)
5456 {
5457 	wpabuf_free(p2p->wfd_ie_invitation);
5458 	p2p->wfd_ie_invitation = ie;
5459 	return 0;
5460 }
5461 
5462 
p2p_set_wfd_ie_prov_disc_req(struct p2p_data * p2p,struct wpabuf * ie)5463 int p2p_set_wfd_ie_prov_disc_req(struct p2p_data *p2p, struct wpabuf *ie)
5464 {
5465 	wpabuf_free(p2p->wfd_ie_prov_disc_req);
5466 	p2p->wfd_ie_prov_disc_req = ie;
5467 	return 0;
5468 }
5469 
5470 
p2p_set_wfd_ie_prov_disc_resp(struct p2p_data * p2p,struct wpabuf * ie)5471 int p2p_set_wfd_ie_prov_disc_resp(struct p2p_data *p2p, struct wpabuf *ie)
5472 {
5473 	wpabuf_free(p2p->wfd_ie_prov_disc_resp);
5474 	p2p->wfd_ie_prov_disc_resp = ie;
5475 	return 0;
5476 }
5477 
5478 
p2p_set_wfd_ie_go_neg(struct p2p_data * p2p,struct wpabuf * ie)5479 int p2p_set_wfd_ie_go_neg(struct p2p_data *p2p, struct wpabuf *ie)
5480 {
5481 	wpabuf_free(p2p->wfd_ie_go_neg);
5482 	p2p->wfd_ie_go_neg = ie;
5483 	return 0;
5484 }
5485 
5486 
p2p_set_wfd_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5487 int p2p_set_wfd_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5488 {
5489 	wpabuf_free(p2p->wfd_dev_info);
5490 	if (elem) {
5491 		p2p->wfd_dev_info = wpabuf_dup(elem);
5492 		if (p2p->wfd_dev_info == NULL)
5493 			return -1;
5494 	} else
5495 		p2p->wfd_dev_info = NULL;
5496 
5497 	return 0;
5498 }
5499 
5500 
p2p_set_wfd_r2_dev_info(struct p2p_data * p2p,const struct wpabuf * elem)5501 int p2p_set_wfd_r2_dev_info(struct p2p_data *p2p, const struct wpabuf *elem)
5502 {
5503 	wpabuf_free(p2p->wfd_r2_dev_info);
5504 	if (elem) {
5505 		p2p->wfd_r2_dev_info = wpabuf_dup(elem);
5506 		if (p2p->wfd_r2_dev_info == NULL)
5507 			return -1;
5508 	} else
5509 		p2p->wfd_r2_dev_info = NULL;
5510 
5511 	return 0;
5512 }
5513 
5514 
p2p_set_wfd_assoc_bssid(struct p2p_data * p2p,const struct wpabuf * elem)5515 int p2p_set_wfd_assoc_bssid(struct p2p_data *p2p, const struct wpabuf *elem)
5516 {
5517 	wpabuf_free(p2p->wfd_assoc_bssid);
5518 	if (elem) {
5519 		p2p->wfd_assoc_bssid = wpabuf_dup(elem);
5520 		if (p2p->wfd_assoc_bssid == NULL)
5521 			return -1;
5522 	} else
5523 		p2p->wfd_assoc_bssid = NULL;
5524 
5525 	return 0;
5526 }
5527 
5528 
p2p_set_wfd_coupled_sink_info(struct p2p_data * p2p,const struct wpabuf * elem)5529 int p2p_set_wfd_coupled_sink_info(struct p2p_data *p2p,
5530 				  const struct wpabuf *elem)
5531 {
5532 	wpabuf_free(p2p->wfd_coupled_sink_info);
5533 	if (elem) {
5534 		p2p->wfd_coupled_sink_info = wpabuf_dup(elem);
5535 		if (p2p->wfd_coupled_sink_info == NULL)
5536 			return -1;
5537 	} else
5538 		p2p->wfd_coupled_sink_info = NULL;
5539 
5540 	return 0;
5541 }
5542 
5543 #endif /* CONFIG_WIFI_DISPLAY */
5544 
5545 
p2p_set_disc_int(struct p2p_data * p2p,int min_disc_int,int max_disc_int,int max_disc_tu)5546 int p2p_set_disc_int(struct p2p_data *p2p, int min_disc_int, int max_disc_int,
5547 		     int max_disc_tu)
5548 {
5549 	if (min_disc_int > max_disc_int || min_disc_int < 0 || max_disc_int < 0)
5550 		return -1;
5551 
5552 	p2p->min_disc_int = min_disc_int;
5553 	p2p->max_disc_int = max_disc_int;
5554 	p2p->max_disc_tu = max_disc_tu;
5555 	p2p_dbg(p2p, "Set discoverable interval: min=%d max=%d max_tu=%d",
5556 		min_disc_int, max_disc_int, max_disc_tu);
5557 
5558 	return 0;
5559 }
5560 
5561 
p2p_dbg(struct p2p_data * p2p,const char * fmt,...)5562 void p2p_dbg(struct p2p_data *p2p, const char *fmt, ...)
5563 {
5564 	va_list ap;
5565 	char buf[500];
5566 
5567 	if (!p2p->cfg->debug_print)
5568 		return;
5569 
5570 	va_start(ap, fmt);
5571 	vsnprintf(buf, sizeof(buf), fmt, ap);
5572 	buf[sizeof(buf) - 1] = '\0';
5573 	va_end(ap);
5574 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf);
5575 }
5576 
5577 
p2p_info(struct p2p_data * p2p,const char * fmt,...)5578 void p2p_info(struct p2p_data *p2p, const char *fmt, ...)
5579 {
5580 	va_list ap;
5581 	char buf[500];
5582 
5583 	if (!p2p->cfg->debug_print)
5584 		return;
5585 
5586 	va_start(ap, fmt);
5587 	vsnprintf(buf, sizeof(buf), fmt, ap);
5588 	buf[sizeof(buf) - 1] = '\0';
5589 	va_end(ap);
5590 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf);
5591 }
5592 
5593 
p2p_err(struct p2p_data * p2p,const char * fmt,...)5594 void p2p_err(struct p2p_data *p2p, const char *fmt, ...)
5595 {
5596 	va_list ap;
5597 	char buf[500];
5598 
5599 	if (!p2p->cfg->debug_print)
5600 		return;
5601 
5602 	va_start(ap, fmt);
5603 	vsnprintf(buf, sizeof(buf), fmt, ap);
5604 	buf[sizeof(buf) - 1] = '\0';
5605 	va_end(ap);
5606 	p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
5607 }
5608 
5609 
p2p_loop_on_known_peers(struct p2p_data * p2p,void (* peer_callback)(struct p2p_peer_info * peer,void * user_data),void * user_data)5610 void p2p_loop_on_known_peers(struct p2p_data *p2p,
5611 			     void (*peer_callback)(struct p2p_peer_info *peer,
5612 						   void *user_data),
5613 			     void *user_data)
5614 {
5615 	struct p2p_device *dev, *n;
5616 
5617 	dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
5618 		peer_callback(&dev->info, user_data);
5619 	}
5620 }
5621 
5622 
5623 #ifdef CONFIG_WPS_NFC
5624 
p2p_build_nfc_handover(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5625 static struct wpabuf * p2p_build_nfc_handover(struct p2p_data *p2p,
5626 					      int client_freq,
5627 					      const u8 *go_dev_addr,
5628 					      const u8 *ssid, size_t ssid_len)
5629 {
5630 	struct wpabuf *buf;
5631 	u8 op_class, channel;
5632 	enum p2p_role_indication role = P2P_DEVICE_NOT_IN_GROUP;
5633 
5634 	buf = wpabuf_alloc(1000);
5635 	if (buf == NULL)
5636 		return NULL;
5637 
5638 	op_class = p2p->cfg->reg_class;
5639 	channel = p2p->cfg->channel;
5640 
5641 	p2p_buf_add_capability(buf, p2p->dev_capab &
5642 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
5643 	p2p_buf_add_device_info(buf, p2p, NULL);
5644 
5645 	if (p2p->num_groups > 0) {
5646 		int freq = p2p_group_get_freq(p2p->groups[0]);
5647 		role = P2P_GO_IN_A_GROUP;
5648 		if (p2p_freq_to_channel(freq, &op_class, &channel) < 0) {
5649 			p2p_dbg(p2p,
5650 				"Unknown GO operating frequency %d MHz for NFC handover",
5651 				freq);
5652 			wpabuf_free(buf);
5653 			return NULL;
5654 		}
5655 	} else if (client_freq > 0) {
5656 		role = P2P_CLIENT_IN_A_GROUP;
5657 		if (p2p_freq_to_channel(client_freq, &op_class, &channel) < 0) {
5658 			p2p_dbg(p2p,
5659 				"Unknown client operating frequency %d MHz for NFC handover",
5660 				client_freq);
5661 			wpabuf_free(buf);
5662 			return NULL;
5663 		}
5664 	}
5665 
5666 	p2p_buf_add_oob_go_neg_channel(buf, p2p->cfg->country, op_class,
5667 				       channel, role);
5668 
5669 	if (p2p->num_groups > 0) {
5670 		/* Limit number of clients to avoid very long message */
5671 		p2p_buf_add_group_info(p2p->groups[0], buf, 5);
5672 		p2p_group_buf_add_id(p2p->groups[0], buf);
5673 	} else if (client_freq > 0 &&
5674 		   go_dev_addr && !is_zero_ether_addr(go_dev_addr) &&
5675 		   ssid && ssid_len > 0) {
5676 		/*
5677 		 * Add the optional P2P Group ID to indicate in which group this
5678 		 * device is a P2P Client.
5679 		 */
5680 		p2p_buf_add_group_id(buf, go_dev_addr, ssid, ssid_len);
5681 	}
5682 
5683 	return buf;
5684 }
5685 
5686 
p2p_build_nfc_handover_req(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5687 struct wpabuf * p2p_build_nfc_handover_req(struct p2p_data *p2p,
5688 					   int client_freq,
5689 					   const u8 *go_dev_addr,
5690 					   const u8 *ssid, size_t ssid_len)
5691 {
5692 	return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5693 				      ssid_len);
5694 }
5695 
5696 
p2p_build_nfc_handover_sel(struct p2p_data * p2p,int client_freq,const u8 * go_dev_addr,const u8 * ssid,size_t ssid_len)5697 struct wpabuf * p2p_build_nfc_handover_sel(struct p2p_data *p2p,
5698 					   int client_freq,
5699 					   const u8 *go_dev_addr,
5700 					   const u8 *ssid, size_t ssid_len)
5701 {
5702 	return p2p_build_nfc_handover(p2p, client_freq, go_dev_addr, ssid,
5703 				      ssid_len);
5704 }
5705 
5706 
p2p_process_nfc_connection_handover(struct p2p_data * p2p,struct p2p_nfc_params * params)5707 int p2p_process_nfc_connection_handover(struct p2p_data *p2p,
5708 					struct p2p_nfc_params *params)
5709 {
5710 	struct p2p_message msg;
5711 	struct p2p_device *dev;
5712 	const u8 *p2p_dev_addr;
5713 	int freq;
5714 	enum p2p_role_indication role;
5715 
5716 	params->next_step = NO_ACTION;
5717 
5718 	if (p2p_parse_ies_separate(params->wsc_attr, params->wsc_len,
5719 				   params->p2p_attr, params->p2p_len, &msg)) {
5720 		p2p_dbg(p2p, "Failed to parse WSC/P2P attributes from NFC");
5721 		p2p_parse_free(&msg);
5722 		return -1;
5723 	}
5724 
5725 	if (msg.p2p_device_addr)
5726 		p2p_dev_addr = msg.p2p_device_addr;
5727 	else if (msg.device_id)
5728 		p2p_dev_addr = msg.device_id;
5729 	else {
5730 		p2p_dbg(p2p, "Ignore scan data without P2P Device Info or P2P Device Id");
5731 		p2p_parse_free(&msg);
5732 		return -1;
5733 	}
5734 
5735 	if (msg.oob_dev_password) {
5736 		os_memcpy(params->oob_dev_pw, msg.oob_dev_password,
5737 			  msg.oob_dev_password_len);
5738 		params->oob_dev_pw_len = msg.oob_dev_password_len;
5739 	}
5740 
5741 	dev = p2p_create_device(p2p, p2p_dev_addr);
5742 	if (dev == NULL) {
5743 		p2p_parse_free(&msg);
5744 		return -1;
5745 	}
5746 
5747 	params->peer = &dev->info;
5748 
5749 	os_get_reltime(&dev->last_seen);
5750 	dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
5751 	p2p_copy_wps_info(p2p, dev, 0, &msg);
5752 
5753 	if (!msg.oob_go_neg_channel) {
5754 		p2p_dbg(p2p, "OOB GO Negotiation Channel attribute not included");
5755 		p2p_parse_free(&msg);
5756 		return -1;
5757 	}
5758 
5759 	if (msg.oob_go_neg_channel[3] == 0 &&
5760 	    msg.oob_go_neg_channel[4] == 0)
5761 		freq = 0;
5762 	else
5763 		freq = p2p_channel_to_freq(msg.oob_go_neg_channel[3],
5764 					   msg.oob_go_neg_channel[4]);
5765 	if (freq < 0) {
5766 		p2p_dbg(p2p, "Unknown peer OOB GO Neg channel");
5767 		p2p_parse_free(&msg);
5768 		return -1;
5769 	}
5770 	role = msg.oob_go_neg_channel[5];
5771 
5772 	if (role == P2P_GO_IN_A_GROUP) {
5773 		p2p_dbg(p2p, "Peer OOB GO operating channel: %u MHz", freq);
5774 		params->go_freq = freq;
5775 	} else if (role == P2P_CLIENT_IN_A_GROUP) {
5776 		p2p_dbg(p2p, "Peer (client) OOB GO operating channel: %u MHz",
5777 			freq);
5778 		params->go_freq = freq;
5779 	} else
5780 		p2p_dbg(p2p, "Peer OOB GO Neg channel: %u MHz", freq);
5781 	dev->oob_go_neg_freq = freq;
5782 
5783 	if (!params->sel && role != P2P_GO_IN_A_GROUP) {
5784 		freq = p2p_channel_to_freq(p2p->cfg->reg_class,
5785 					   p2p->cfg->channel);
5786 		if (freq < 0) {
5787 			p2p_dbg(p2p, "Own listen channel not known");
5788 			p2p_parse_free(&msg);
5789 			return -1;
5790 		}
5791 		p2p_dbg(p2p, "Use own Listen channel as OOB GO Neg channel: %u MHz", freq);
5792 		dev->oob_go_neg_freq = freq;
5793 	}
5794 
5795 	if (msg.group_id) {
5796 		os_memcpy(params->go_dev_addr, msg.group_id, ETH_ALEN);
5797 		params->go_ssid_len = msg.group_id_len - ETH_ALEN;
5798 		os_memcpy(params->go_ssid, msg.group_id + ETH_ALEN,
5799 			  params->go_ssid_len);
5800 	}
5801 
5802 	if (dev->flags & P2P_DEV_USER_REJECTED) {
5803 		p2p_dbg(p2p, "Do not report rejected device");
5804 		p2p_parse_free(&msg);
5805 		return 0;
5806 	}
5807 
5808 	if (!(dev->flags & P2P_DEV_REPORTED)) {
5809 		p2p->cfg->dev_found(p2p->cfg->cb_ctx, p2p_dev_addr, &dev->info,
5810 				    !(dev->flags & P2P_DEV_REPORTED_ONCE));
5811 		dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
5812 	}
5813 	p2p_parse_free(&msg);
5814 
5815 	if (role == P2P_GO_IN_A_GROUP && p2p->num_groups > 0)
5816 		params->next_step = BOTH_GO;
5817 	else if (role == P2P_GO_IN_A_GROUP)
5818 		params->next_step = JOIN_GROUP;
5819 	else if (role == P2P_CLIENT_IN_A_GROUP) {
5820 		dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
5821 		params->next_step = PEER_CLIENT;
5822 	} else if (p2p->num_groups > 0)
5823 		params->next_step = AUTH_JOIN;
5824 	else if (params->sel)
5825 		params->next_step = INIT_GO_NEG;
5826 	else
5827 		params->next_step = RESP_GO_NEG;
5828 
5829 	return 0;
5830 }
5831 
5832 
p2p_set_authorized_oob_dev_pw_id(struct p2p_data * p2p,u16 dev_pw_id,int go_intent,const u8 * own_interface_addr)5833 void p2p_set_authorized_oob_dev_pw_id(struct p2p_data *p2p, u16 dev_pw_id,
5834 				      int go_intent,
5835 				      const u8 *own_interface_addr)
5836 {
5837 
5838 	p2p->authorized_oob_dev_pw_id = dev_pw_id;
5839 	if (dev_pw_id == 0) {
5840 		p2p_dbg(p2p, "NFC OOB Password unauthorized for static handover");
5841 		return;
5842 	}
5843 
5844 	p2p_dbg(p2p, "NFC OOB Password (id=%u) authorized for static handover",
5845 		dev_pw_id);
5846 
5847 	p2p->go_intent = go_intent;
5848 	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
5849 }
5850 
5851 #endif /* CONFIG_WPS_NFC */
5852 
5853 
p2p_set_passphrase_len(struct p2p_data * p2p,unsigned int len)5854 int p2p_set_passphrase_len(struct p2p_data *p2p, unsigned int len)
5855 {
5856 	if (len < 8 || len > 63)
5857 		return -1;
5858 	p2p->cfg->passphrase_len = len;
5859 	return 0;
5860 }
5861 
5862 
p2p_set_vendor_elems(struct p2p_data * p2p,struct wpabuf ** vendor_elem)5863 void p2p_set_vendor_elems(struct p2p_data *p2p, struct wpabuf **vendor_elem)
5864 {
5865 	p2p->vendor_elem = vendor_elem;
5866 }
5867 
5868 
p2p_go_neg_wait_timeout(void * eloop_ctx,void * timeout_ctx)5869 void p2p_go_neg_wait_timeout(void *eloop_ctx, void *timeout_ctx)
5870 {
5871 	struct p2p_data *p2p = eloop_ctx;
5872 
5873 	p2p_dbg(p2p,
5874 		"Timeout on waiting peer to become ready for GO Negotiation");
5875 	p2p_go_neg_failed(p2p, -1);
5876 }
5877 
5878 
p2p_set_own_pref_freq_list(struct p2p_data * p2p,const struct weighted_pcl * pref_freq_list,unsigned int size)5879 void p2p_set_own_pref_freq_list(struct p2p_data *p2p,
5880 				const struct weighted_pcl *pref_freq_list,
5881 				unsigned int size)
5882 {
5883 	unsigned int i;
5884 
5885 	if (size > P2P_MAX_PREF_CHANNELS)
5886 		size = P2P_MAX_PREF_CHANNELS;
5887 	p2p->num_pref_freq = size;
5888 	os_memcpy(p2p->pref_freq_list, pref_freq_list,
5889 		  size * sizeof(struct weighted_pcl));
5890 	for (i = 0; i < size; i++) {
5891 		p2p_dbg(p2p, "Own preferred frequency list[%u]=%u MHz",
5892 			i, p2p->pref_freq_list[i].freq);
5893 	}
5894 }
5895 
5896 
p2p_set_override_pref_op_chan(struct p2p_data * p2p,u8 op_class,u8 chan)5897 void p2p_set_override_pref_op_chan(struct p2p_data *p2p, u8 op_class,
5898 				   u8 chan)
5899 {
5900 	p2p->override_pref_op_class = op_class;
5901 	p2p->override_pref_channel = chan;
5902 }
5903 
5904 
p2p_build_probe_resp_template(struct p2p_data * p2p,unsigned int freq)5905 struct wpabuf * p2p_build_probe_resp_template(struct p2p_data *p2p,
5906 					      unsigned int freq)
5907 {
5908 	struct wpabuf *ies, *buf;
5909 	u8 addr[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
5910 	int ret;
5911 
5912 	ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
5913 	if (!ies) {
5914 		wpa_printf(MSG_ERROR,
5915 			   "CTRL: Failed to build Probe Response IEs");
5916 		return NULL;
5917 	}
5918 
5919 	buf = wpabuf_alloc(200 + wpabuf_len(ies));
5920 	if (!buf) {
5921 		wpabuf_free(ies);
5922 		return NULL;
5923 	}
5924 
5925 	ret = p2p_build_probe_resp_buf(p2p, buf, ies, addr, freq);
5926 	wpabuf_free(ies);
5927 	if (ret) {
5928 		wpabuf_free(buf);
5929 		return NULL;
5930 	}
5931 
5932 	return buf;
5933 }
5934 
5935 
p2p_is_peer_6ghz_capab(struct p2p_data * p2p,const u8 * addr)5936 bool p2p_is_peer_6ghz_capab(struct p2p_data *p2p, const u8 *addr)
5937 {
5938 	struct p2p_device *dev;
5939 
5940 	dev = p2p_get_device(p2p, addr);
5941 	if (!dev)
5942 		return false;
5943 
5944 	return dev->support_6ghz;
5945 }
5946 
5947 
p2p_set_6ghz_dev_capab(struct p2p_data * p2p,bool allow_6ghz)5948 void p2p_set_6ghz_dev_capab(struct p2p_data *p2p, bool allow_6ghz)
5949 {
5950 	p2p->p2p_6ghz_capable = allow_6ghz;
5951 	p2p->allow_6ghz = allow_6ghz;
5952 	p2p_dbg(p2p, "Set 6 GHz capability to %d", allow_6ghz);
5953 
5954 	if (allow_6ghz)
5955 		p2p->dev_capab |= P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5956 	else
5957 		p2p->dev_capab &= ~P2P_DEV_CAPAB_6GHZ_BAND_CAPABLE;
5958 }
5959 
5960 
is_p2p_6ghz_capable(struct p2p_data * p2p)5961 bool is_p2p_6ghz_capable(struct p2p_data *p2p)
5962 {
5963 	return p2p->p2p_6ghz_capable;
5964 }
5965 
5966 
p2p_wfd_enabled(struct p2p_data * p2p)5967 bool p2p_wfd_enabled(struct p2p_data *p2p)
5968 {
5969 #ifdef CONFIG_WIFI_DISPLAY
5970 	return p2p->wfd_ie_probe_req != NULL;
5971 #else /* CONFIG_WIFI_DISPLAY */
5972 	return false;
5973 #endif /* CONFIG_WIFI_DISPLAY */
5974 }
5975 
5976 
p2p_peer_wfd_enabled(struct p2p_data * p2p,const u8 * peer_addr)5977 bool p2p_peer_wfd_enabled(struct p2p_data *p2p, const u8 *peer_addr)
5978 {
5979 #ifdef CONFIG_WIFI_DISPLAY
5980 	struct p2p_device *dev;
5981 
5982 	dev = p2p_get_device(p2p, peer_addr);
5983 	return dev && dev->info.wfd_subelems != NULL;
5984 #else /* CONFIG_WIFI_DISPLAY */
5985 	return false;
5986 #endif /* CONFIG_WIFI_DISPLAY */
5987 }
5988 
5989 
is_p2p_allow_6ghz(struct p2p_data * p2p)5990 bool is_p2p_allow_6ghz(struct p2p_data *p2p)
5991 {
5992 	return p2p->allow_6ghz;
5993 }
5994 
5995 
set_p2p_allow_6ghz(struct p2p_data * p2p,bool value)5996 void set_p2p_allow_6ghz(struct p2p_data *p2p, bool value)
5997 {
5998 	p2p->allow_6ghz = value;
5999 }
6000 
6001 
p2p_derive_nonce_tag(struct p2p_data * p2p)6002 static int p2p_derive_nonce_tag(struct p2p_data *p2p)
6003 {
6004 	u8 dira_nonce[DEVICE_IDENTITY_NONCE_LEN];
6005 	u8 dira_tag[DEVICE_MAX_HASH_LEN];
6006 	u8 data[DIR_STR_LEN + DEVICE_IDENTITY_NONCE_LEN + ETH_ALEN];
6007 	struct p2p_id_key *dev_ik;
6008 
6009 	dev_ik = &p2p->pairing_info->dev_ik;
6010 
6011 	if (dev_ik->cipher_version != DIRA_CIPHER_VERSION_128) {
6012 		wpa_printf(MSG_INFO,
6013 			   "P2P: Unsupported DIRA Cipher version = %d",
6014 			   dev_ik->cipher_version);
6015 		return -1;
6016 	}
6017 
6018 	if (dev_ik->dik_len != DEVICE_IDENTITY_KEY_LEN) {
6019 		wpa_printf(MSG_INFO, "P2P: Invalid DIK length = %zu",
6020 			   dev_ik->dik_len);
6021 		return -1;
6022 	}
6023 
6024 	os_memset(data, 0, sizeof(data));
6025 
6026 	if (os_get_random(dira_nonce, DEVICE_IDENTITY_NONCE_LEN) < 0) {
6027 		wpa_printf(MSG_ERROR, "P2P: Failed to generate DIRA nonce");
6028 		return -1;
6029 	}
6030 
6031 	/* Tag = Truncate-64(HMAC-SHA-256(DevIK,
6032 	 *                                "DIR" || P2P Device Address || Nonce))
6033 	 */
6034 	os_memcpy(data, "DIR", DIR_STR_LEN);
6035 	os_memcpy(&data[DIR_STR_LEN], p2p->cfg->dev_addr, ETH_ALEN);
6036 	os_memcpy(&data[DIR_STR_LEN + ETH_ALEN], dira_nonce,
6037 		  DEVICE_IDENTITY_NONCE_LEN);
6038 
6039 	if (hmac_sha256(dev_ik->dik_data, dev_ik->dik_len, data, sizeof(data),
6040 			dira_tag) < 0) {
6041 		wpa_printf(MSG_ERROR, "P2P: Could not derive DIRA tag");
6042 		return -1;
6043 	}
6044 
6045 	dev_ik->dira_nonce_len = DEVICE_IDENTITY_NONCE_LEN;
6046 	os_memcpy(dev_ik->dira_nonce, dira_nonce, DEVICE_IDENTITY_NONCE_LEN);
6047 	dev_ik->dira_tag_len = DEVICE_IDENTITY_TAG_LEN;
6048 	os_memcpy(dev_ik->dira_tag, dira_tag, DEVICE_IDENTITY_TAG_LEN);
6049 
6050 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIK", dev_ik->dik_data,
6051 			dev_ik->dik_len);
6052 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-NONCE", dev_ik->dira_nonce,
6053 			dev_ik->dira_nonce_len);
6054 	wpa_hexdump_key(MSG_DEBUG, "P2P: DIRA-TAG", dev_ik->dira_tag,
6055 			dev_ik->dira_tag_len);
6056 	return 0;
6057 }
6058 
6059 
p2p_validate_dira(struct p2p_data * p2p,struct p2p_device * dev,const u8 * dira,u16 dira_len)6060 static int p2p_validate_dira(struct p2p_data *p2p, struct p2p_device *dev,
6061 			     const u8 *dira, u16 dira_len)
6062 {
6063 	if (dira_len < 1 || dira[0] != DIRA_CIPHER_VERSION_128) {
6064 		p2p_dbg(p2p, "Unsupported DIRA cipher version %d",
6065 			dira[0]);
6066 		return 0;
6067 	}
6068 
6069 	if (dira_len < 1 + DEVICE_IDENTITY_NONCE_LEN + DEVICE_IDENTITY_TAG_LEN)
6070 	{
6071 		p2p_dbg(p2p, "Truncated DIRA (length %u)", dira_len);
6072 		return 0;
6073 	}
6074 
6075 	if (p2p->cfg->validate_dira) {
6076 		const u8 *nonce = &dira[1];
6077 		const u8 *tag = &dira[1 + DEVICE_IDENTITY_NONCE_LEN];
6078 
6079 		return p2p->cfg->validate_dira(p2p->cfg->cb_ctx,
6080 					       dev->info.p2p_device_addr,
6081 					       nonce, tag);
6082 	}
6083 
6084 	return 0;
6085 }
6086 
6087 
p2p_usd_service_hash(struct p2p_data * p2p,const char * service_name)6088 void p2p_usd_service_hash(struct p2p_data *p2p, const char *service_name)
6089 {
6090 	u8 buf[P2PS_HASH_LEN];
6091 
6092 	p2p->usd_service = false;
6093 
6094 	if (!service_name)
6095 		return;
6096 
6097 	if (!p2ps_gen_hash(p2p, service_name, buf))
6098 		return;
6099 	p2p_dbg(p2p, "USD service %s hash " MACSTR,
6100 		service_name, MAC2STR(buf));
6101 	p2p->usd_service = true;
6102 	os_memcpy(&p2p->p2p_service_hash, buf, P2PS_HASH_LEN);
6103 }
6104 
6105 
p2p_usd_elems(struct p2p_data * p2p)6106 struct wpabuf * p2p_usd_elems(struct p2p_data *p2p)
6107 {
6108 	struct wpabuf *buf;
6109 	u8 *len;
6110 	u8 group_capab;
6111 
6112 	buf = wpabuf_alloc(1000);
6113 	if (!buf)
6114 		return NULL;
6115 
6116 	len = p2p_buf_add_ie_hdr(buf);
6117 
6118 	/* P2P Capability attribute */
6119 	group_capab = 0;
6120 	if (p2p->num_groups) {
6121 		group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
6122 		if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
6123 		    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
6124 		    p2p->cross_connect)
6125 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
6126 	}
6127 	if (p2p->cfg->p2p_intra_bss)
6128 		group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
6129 	p2p_buf_add_capability(buf, p2p->dev_capab &
6130 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
6131 			       group_capab);
6132 
6133 	/* P2P Device Info attribute */
6134 	p2p_buf_add_device_info(buf, p2p, NULL);
6135 
6136 	p2p_buf_update_ie_hdr(buf, len);
6137 
6138 	len = p2p_buf_add_p2p2_ie_hdr(buf);
6139 
6140 	/* P2P Capability Extension attribute */
6141 	p2p_buf_add_pcea(buf, p2p);
6142 
6143 	/* P2P Pairing Bootstrapping Method attribute */
6144 	p2p_buf_add_pbma(buf, p2p->cfg->pairing_config.bootstrap_methods, NULL,
6145 			 0, 0);
6146 
6147 	/* P2P Device Identity Resolution attribute */
6148 	if (p2p->pairing_info &&
6149 	    p2p->cfg->pairing_config.pairing_capable &&
6150 	    p2p->cfg->pairing_config.enable_pairing_cache &&
6151 	    p2p_derive_nonce_tag(p2p) == 0)
6152 		p2p_buf_add_dira(buf, p2p);
6153 
6154 	p2p_buf_update_ie_hdr(buf, len);
6155 
6156 	return buf;
6157 }
6158 
6159 
p2p_process_usd_elems(struct p2p_data * p2p,const u8 * ies,u16 ies_len,const u8 * peer_addr,unsigned int freq)6160 void p2p_process_usd_elems(struct p2p_data *p2p, const u8 *ies, u16 ies_len,
6161 			   const u8 *peer_addr, unsigned int freq)
6162 {
6163 	struct p2p_device *dev;
6164 	struct p2p_message msg;
6165 	const u8 *p2p_dev_addr;
6166 
6167 	os_memset(&msg, 0, sizeof(msg));
6168 	if (p2p_parse_ies(ies, ies_len, &msg)) {
6169 		p2p_dbg(p2p, "Failed to parse P2P IE for a device entry");
6170 		p2p_parse_free(&msg);
6171 		return;
6172 	}
6173 	if (msg.p2p_device_addr)
6174 		p2p_dev_addr = msg.p2p_device_addr;
6175 	else
6176 		p2p_dev_addr = peer_addr;
6177 
6178 	dev = p2p_create_device(p2p, p2p_dev_addr);
6179 	if (!dev) {
6180 		p2p_parse_free(&msg);
6181 		p2p_dbg(p2p, "Failed to add a peer P2P Device");
6182 		return;
6183 	}
6184 
6185 	dev->p2p2 = true;
6186 	/* Reset info from old IEs */
6187 	dev->info.reg_info = 0;
6188 	os_memset(&dev->info.pairing_config, 0,
6189 		  sizeof(struct p2p_pairing_config));
6190 
6191 	os_get_reltime(&dev->last_seen);
6192 	dev->listen_freq = freq;
6193 	dev->oper_freq = freq;
6194 
6195 	if (msg.capability) {
6196 		/*
6197 		 * P2P Client Discoverability bit is reserved in all frames
6198 		 * that use this function, so do not change its value here.
6199 		 */
6200 		dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6201 		dev->info.dev_capab |= msg.capability[0] &
6202 			~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
6203 		dev->info.group_capab = msg.capability[1];
6204 	}
6205 
6206 	if (msg.pcea_info && msg.pcea_info_len >= 2)
6207 		p2p_process_pcea(p2p, &msg, dev);
6208 
6209 	if (msg.pbma_info && msg.pbma_info_len == 2)
6210 		dev->info.pairing_config.bootstrap_methods =
6211 			WPA_GET_LE16(msg.pbma_info);
6212 
6213 	if (!ether_addr_equal(peer_addr, p2p_dev_addr))
6214 		os_memcpy(dev->interface_addr, peer_addr, ETH_ALEN);
6215 
6216 	if (msg.dira && msg.dira_len) {
6217 		dev->info.nonce_tag_valid = false;
6218 		dev->info.dik_id = p2p_validate_dira(p2p, dev, msg.dira,
6219 						     msg.dira_len);
6220 		if (dev->info.dik_id) {
6221 			os_memcpy(dev->info.nonce, &msg.dira[1],
6222 				  DEVICE_IDENTITY_NONCE_LEN);
6223 			os_memcpy(dev->info.tag,
6224 				  &msg.dira[1 + DEVICE_IDENTITY_NONCE_LEN],
6225 				  DEVICE_IDENTITY_TAG_LEN);
6226 			dev->info.pairing_config.dik_cipher = msg.dira[0];
6227 			dev->info.nonce_tag_valid = true;
6228 		}
6229 	}
6230 
6231 	p2p_dbg(p2p, "Updated device entry based on USD frame: " MACSTR
6232 		" dev_capab=0x%x group_capab=0x%x listen_freq=%d",
6233 		MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
6234 		dev->info.group_capab, dev->listen_freq);
6235 
6236 	p2p->cfg->dev_found(p2p->cfg->cb_ctx, dev->info.p2p_device_addr,
6237 			    &dev->info, !(dev->flags & P2P_DEV_REPORTED_ONCE));
6238 	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
6239 
6240 	p2p_parse_free(&msg);
6241 }
6242 
6243 
p2p_get_dik_id(struct p2p_data * p2p,const u8 * peer)6244 int p2p_get_dik_id(struct p2p_data *p2p, const u8 *peer)
6245 {
6246 	struct p2p_device *dev;
6247 
6248 	dev = p2p_get_device(p2p, peer);
6249 	if (!dev)
6250 		return 0;
6251 
6252 	return dev->info.dik_id;
6253 }
6254 
6255 
6256 #ifdef CONFIG_PASN
6257 
p2p_config_sae_password(struct p2p_data * p2p,const char * pw)6258 int p2p_config_sae_password(struct p2p_data *p2p, const char *pw)
6259 {
6260 	os_memset(p2p->dev_sae_password, 0, sizeof(p2p->dev_sae_password));
6261 	if (os_strlen(pw) >= sizeof(p2p->dev_sae_password))
6262 		return -1;
6263 
6264 	os_strlcpy(p2p->dev_sae_password, pw, sizeof(p2p->dev_sae_password));
6265 	return 0;
6266 }
6267 
6268 
p2p_prepare_pasn_extra_ie(struct p2p_data * p2p,struct wpabuf * extra_ies,const struct wpabuf * frame,bool add_dira)6269 static int p2p_prepare_pasn_extra_ie(struct p2p_data *p2p,
6270 				     struct wpabuf *extra_ies,
6271 				     const struct wpabuf *frame, bool add_dira)
6272 {
6273 	struct wpabuf *buf, *buf2;
6274 	size_t len;
6275 
6276 	len = 100;
6277 	if (frame)
6278 		len += wpabuf_len(frame);
6279 	buf = wpabuf_alloc(len);
6280 	if (!buf)
6281 		return -1;
6282 
6283 	/* P2P Capability Extension attribute */
6284 	p2p_buf_add_pcea(buf, p2p);
6285 
6286 	if (add_dira) {
6287 		/* Device Identity Resolution attribute */
6288 		p2p_buf_add_dira(buf, p2p);
6289 	}
6290 
6291 	if (frame) {
6292 		p2p_dbg(p2p, "Add Action frame wrapper for PASN");
6293 		wpabuf_put_u8(buf, P2P_ATTR_ACTION_FRAME_WRAPPER);
6294 		wpabuf_put_le16(buf, wpabuf_len(frame));
6295 		wpabuf_put_buf(buf, frame);
6296 	}
6297 
6298 	buf2 = p2p_encaps_ie(buf, P2P2_IE_VENDOR_TYPE);
6299 	wpabuf_free(buf);
6300 
6301 	if (wpabuf_tailroom(extra_ies) < wpabuf_len(buf2)) {
6302 		p2p_err(p2p, "Not enough room for P2P2 IE in PASN extra IEs");
6303 		wpabuf_free(buf2);
6304 		return -1;
6305 	}
6306 	wpabuf_put_buf(extra_ies, buf2);
6307 	wpabuf_free(buf2);
6308 
6309 	return 0;
6310 }
6311 
6312 
p2p_pasn_service_hash(struct p2p_data * p2p,struct wpabuf * extra_ies)6313 static struct wpabuf * p2p_pasn_service_hash(struct p2p_data *p2p,
6314 					     struct wpabuf *extra_ies)
6315 {
6316 	struct wpabuf *buf;
6317 	u8 *ie_len = NULL;
6318 
6319 	if (!p2p->usd_service)
6320 		return extra_ies;
6321 
6322 	p2p_dbg(p2p, "Add P2P2 USD service hash in extra IE");
6323 	buf = wpabuf_alloc(100);
6324 	if (!buf) {
6325 		wpabuf_free(extra_ies);
6326 		return NULL;
6327 	}
6328 
6329 	ie_len = p2p_buf_add_ie_hdr(buf);
6330 	p2p_buf_add_usd_service_hash(buf, p2p);
6331 	p2p_buf_update_ie_hdr(buf, ie_len);
6332 
6333 	return wpabuf_concat(buf, extra_ies);
6334 }
6335 
6336 
p2p_pairing_generate_rsnxe(struct p2p_data * p2p,int akmp)6337 static struct wpabuf * p2p_pairing_generate_rsnxe(struct p2p_data *p2p,
6338 						  int akmp)
6339 {
6340 	u32 capab;
6341 	size_t flen = 0;
6342 	struct wpabuf *buf;
6343 
6344 	capab = BIT(WLAN_RSNX_CAPAB_KEK_IN_PASN);
6345 
6346 	if (wpa_key_mgmt_sae(akmp))
6347 		capab |= BIT(WLAN_RSNX_CAPAB_SAE_H2E);
6348 
6349 	while (capab >> flen * 8)
6350 		flen++;
6351 
6352 	buf = wpabuf_alloc(2 + flen);
6353 	if (!buf)
6354 		return NULL;
6355 
6356 	if (wpabuf_tailroom(buf) < 2 + flen) {
6357 		p2p_dbg(p2p, "wpabuf tail room too small");
6358 		wpabuf_free(buf);
6359 		return NULL;
6360 	}
6361 	capab |= flen - 1; /* bit 0-3 = Field length (n - 1) */
6362 
6363 	p2p_dbg(p2p, "RSNXE capabilities: %04x", capab);
6364 	wpabuf_put_u8(buf, WLAN_EID_RSNX);
6365 	wpabuf_put_u8(buf, flen);
6366 	while (flen--) {
6367 		wpabuf_put_u8(buf, (capab & 0xff));
6368 		capab = capab >> 8;
6369 	}
6370 	return buf;
6371 }
6372 
6373 
6374 /* SSID used for deriving SAE pt for pairing */
6375 #define P2P_PAIRING_SSID "516F9A020000"
6376 
p2p_pairing_set_password(struct pasn_data * pasn,u8 pasn_type,const char * passphrase)6377 static void p2p_pairing_set_password(struct pasn_data *pasn, u8 pasn_type,
6378 				     const char *passphrase)
6379 {
6380 	int pasn_groups[4] = { 0 };
6381 	size_t len;
6382 
6383 	if (!passphrase)
6384 		return;
6385 
6386 	len = os_strlen(passphrase);
6387 
6388 	if (pasn_type & 0xc && pasn_type & 0x3) {
6389 		pasn_groups[0] = 20;
6390 		pasn_groups[1] = 19;
6391 	} else if (pasn_type & 0xc) {
6392 		pasn_groups[0] = 20;
6393 	} else {
6394 		pasn_groups[0] = 19;
6395 	}
6396 	pasn->pt = sae_derive_pt(pasn_groups, (const u8 *) P2P_PAIRING_SSID,
6397 				 os_strlen(P2P_PAIRING_SSID),
6398 				 (const u8 *) passphrase, len, NULL);
6399 	/* Set passphrase for pairing responder to validate PASN auth 1 frame */
6400 	pasn->password = passphrase;
6401 }
6402 
6403 
p2p_pasn_initialize(struct p2p_data * p2p,struct p2p_device * dev,const u8 * addr,int freq,bool verify,bool derive_kek)6404 void p2p_pasn_initialize(struct p2p_data *p2p, struct p2p_device *dev,
6405 			 const u8 *addr, int freq, bool verify, bool derive_kek)
6406 {
6407 	struct pasn_data *pasn;
6408 	struct wpabuf *rsnxe;
6409 
6410 	if (!p2p || !dev)
6411 		return;
6412 
6413 	if (dev->pasn) {
6414 		wpa_pasn_reset(dev->pasn);
6415 	} else {
6416 		dev->pasn = pasn_data_init();
6417 		if (!dev->pasn)
6418 			return;
6419 	}
6420 
6421 	pasn = dev->pasn;
6422 
6423 	os_memcpy(pasn->own_addr, p2p->cfg->dev_addr, ETH_ALEN);
6424 	os_memcpy(pasn->peer_addr, addr, ETH_ALEN);
6425 
6426 	os_memcpy(pasn->bssid, dev->role == P2P_ROLE_PAIRING_INITIATOR ?
6427 		  pasn->peer_addr : pasn->own_addr, ETH_ALEN);
6428 
6429 	pasn->noauth = 1;
6430 
6431 	if ((p2p->cfg->pairing_config.pasn_type & 0xc) &&
6432 	    (dev->info.pairing_config.pasn_type & 0xc)) {
6433 		pasn->group = 20;
6434 		pasn->cipher = WPA_CIPHER_GCMP_256;
6435 		pasn->kek_len = 32;
6436 		pasn->derive_kek = true;
6437 	} else {
6438 		pasn->group = 19;
6439 		pasn->cipher = WPA_CIPHER_CCMP;
6440 		pasn->kek_len = 16;
6441 		pasn->derive_kek = true;
6442 	}
6443 
6444 	if (!derive_kek) {
6445 		pasn->derive_kek = false;
6446 		pasn->kek_len = 0;
6447 	}
6448 
6449 	if (dev->password[0]) {
6450 		pasn->akmp = WPA_KEY_MGMT_SAE;
6451 		p2p_pairing_set_password(pasn,
6452 					 p2p->cfg->pairing_config.pasn_type,
6453 					 dev->password);
6454 	} else if (verify) {
6455 		pasn->akmp = WPA_KEY_MGMT_SAE;
6456 	} else {
6457 		pasn->akmp = WPA_KEY_MGMT_PASN;
6458 	}
6459 
6460 	pasn->rsn_pairwise = pasn->cipher;
6461 	pasn->wpa_key_mgmt = pasn->akmp;
6462 
6463 	rsnxe = p2p_pairing_generate_rsnxe(p2p, pasn->akmp);
6464 	if (rsnxe) {
6465 		os_free(pasn->rsnxe_ie);
6466 		pasn->rsnxe_ie = os_memdup(wpabuf_head_u8(rsnxe),
6467 					   wpabuf_len(rsnxe));
6468 		if (!pasn->rsnxe_ie) {
6469 			wpabuf_free(rsnxe);
6470 			return;
6471 		}
6472 		wpabuf_free(rsnxe);
6473 	}
6474 
6475 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
6476 		pasn->pmksa = p2p->initiator_pmksa;
6477 	else
6478 		pasn->pmksa = p2p->responder_pmksa;
6479 
6480 	pasn->cb_ctx = p2p->cfg->cb_ctx;
6481 	pasn->send_mgmt = p2p->cfg->pasn_send_mgmt;
6482 	pasn->prepare_data_element = p2p->cfg->prepare_data_element;
6483 	pasn->parse_data_element = p2p->cfg->parse_data_element;
6484 	pasn->validate_custom_pmkid = p2p->cfg->pasn_validate_pmkid;
6485 
6486 	pasn->freq = freq;
6487 }
6488 
6489 
p2p_get_listen_freq(struct p2p_data * p2p,const u8 * peer_addr)6490 int p2p_get_listen_freq(struct p2p_data *p2p, const u8 *peer_addr)
6491 {
6492 	int freq;
6493 	struct p2p_device *dev;
6494 
6495 	if (!peer_addr) {
6496 		p2p_dbg(p2p, "Peer address NULL");
6497 		return -1;
6498 	}
6499 
6500 	dev = p2p_get_device(p2p, peer_addr);
6501 	if (!dev) {
6502 		p2p_dbg(p2p, "Peer not known");
6503 		return -1;
6504 	}
6505 
6506 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6507 	if (freq <= 0)
6508 		freq = dev->oob_go_neg_freq;
6509 	if (freq <= 0) {
6510 		p2p_dbg(p2p, "No listen/operating frequency known for the peer "
6511 			MACSTR, MAC2STR(dev->info.p2p_device_addr));
6512 		return -1;
6513 	}
6514 	return freq;
6515 }
6516 
6517 
p2p_initiate_pasn_verify(struct p2p_data * p2p,const u8 * peer_addr,int freq,enum p2p_invite_role role,const u8 * bssid,const u8 * ssid,size_t ssid_len,unsigned int force_freq,const u8 * go_dev_addr,unsigned int pref_freq)6518 int p2p_initiate_pasn_verify(struct p2p_data *p2p, const u8 *peer_addr,
6519 			     int freq, enum p2p_invite_role role,
6520 			     const u8 *bssid, const u8 *ssid, size_t ssid_len,
6521 			     unsigned int force_freq, const u8 *go_dev_addr,
6522 			     unsigned int pref_freq)
6523 {
6524 	struct pasn_data *pasn;
6525 	struct p2p_device *dev;
6526 	struct wpabuf *extra_ies, *req;
6527 	int ret = 0;
6528 	u8 *pasn_extra_ies = NULL;
6529 	u8 pmkid[PMKID_LEN];
6530 
6531 	if (!peer_addr) {
6532 		p2p_dbg(p2p, "Peer address NULL");
6533 		return -1;
6534 	}
6535 
6536 	dev = p2p_get_device(p2p, peer_addr);
6537 	if (!dev) {
6538 		p2p_dbg(p2p, "Peer not known");
6539 		return -1;
6540 	}
6541 
6542 	if (p2p_invite(p2p, peer_addr, role, bssid, ssid, ssid_len, force_freq,
6543 		       go_dev_addr, 1, pref_freq, -1, 1)) {
6544 		p2p_dbg(p2p, "p2p_invite() failed");
6545 		return -1;
6546 	}
6547 
6548 	dev->role = P2P_ROLE_PAIRING_INITIATOR;
6549 	p2p_pasn_initialize(p2p, dev, peer_addr, freq, true, true);
6550 	pasn = dev->pasn;
6551 
6552 	req = p2p_build_invitation_req(p2p, dev, go_dev_addr, -1);
6553 	if (!req)
6554 		return -1;
6555 
6556 	p2p_set_state(p2p, P2P_INVITE);
6557 	p2p->pending_action_state = P2P_PENDING_INVITATION_REQUEST;
6558 	p2p->invite_peer = dev;
6559 	dev->invitation_reqs++;
6560 
6561 	extra_ies = wpabuf_alloc(1500);
6562 	if (!extra_ies) {
6563 		wpabuf_free(req);
6564 		p2p_dbg(p2p, "Memory allocation failed for extra_ies");
6565 		return -1;
6566 	}
6567 
6568 	if (os_get_random(pmkid, PMKID_LEN) < 0) {
6569 		wpabuf_free(req);
6570 		wpabuf_free(extra_ies);
6571 		return -1;
6572 	}
6573 	wpa_hexdump(MSG_DEBUG,
6574 		    "P2P2: Use new random PMKID for pairing verification",
6575 		    pmkid, PMKID_LEN);
6576 	pasn_set_custom_pmkid(pasn, pmkid);
6577 
6578 	if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, true)) {
6579 		p2p_dbg(p2p, "Prepare PASN extra IEs failed");
6580 		ret = -1;
6581 		goto out;
6582 	}
6583 
6584 	extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6585 	if (!extra_ies)
6586 		goto out;
6587 
6588 	pasn_extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6589 				   wpabuf_len(extra_ies));
6590 	if (!pasn_extra_ies) {
6591 		p2p_dbg(p2p, "Memory allocation failed for PASN extra IEs");
6592 		ret = -1;
6593 		goto out;
6594 	}
6595 
6596 	pasn->extra_ies = pasn_extra_ies;
6597 	pasn->extra_ies_len = wpabuf_len(extra_ies);
6598 
6599 	/* Start PASN verify */
6600 	if (wpa_pasn_verify(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6601 			    pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6602 			    NULL, 0, NULL, 0, NULL)) {
6603 		p2p_dbg(p2p, "PASN verify failed");
6604 		ret = -1;
6605 	} else {
6606 		dev->flags |= P2P_DEV_WAIT_INV_REQ_ACK;
6607 	}
6608 out:
6609 	pasn->extra_ies = NULL;
6610 	pasn->extra_ies_len = 0;
6611 	os_free(pasn_extra_ies);
6612 	wpabuf_free(req);
6613 	wpabuf_free(extra_ies);
6614 	return ret;
6615 }
6616 
6617 
p2p_initiate_pasn_auth(struct p2p_data * p2p,const u8 * addr,int freq)6618 int p2p_initiate_pasn_auth(struct p2p_data *p2p, const u8 *addr, int freq)
6619 {
6620 	struct pasn_data *pasn;
6621 	struct p2p_device *dev;
6622 	struct wpabuf *extra_ies, *req;
6623 	u8 *ies = NULL;
6624 	int ret = 0;
6625 	size_t ies_len;
6626 
6627 	if (!addr) {
6628 		p2p_dbg(p2p, "Peer address NULL");
6629 		return -1;
6630 	}
6631 
6632 	dev = p2p_get_device(p2p, addr);
6633 	if (!dev) {
6634 		p2p_dbg(p2p, "Peer not known");
6635 		return -1;
6636 	}
6637 
6638 	if (freq == 0)
6639 		freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
6640 
6641 	dev->role = P2P_ROLE_PAIRING_INITIATOR;
6642 	p2p_pasn_initialize(p2p, dev, addr, freq, false, true);
6643 	pasn = dev->pasn;
6644 
6645 	pasn_initiator_pmksa_cache_remove(pasn->pmksa, (u8 *)addr);
6646 
6647 	req = p2p_build_go_neg_req(p2p, dev);
6648 	if (!req)
6649 		return -1;
6650 
6651 	p2p->go_neg_peer = dev;
6652 	dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
6653 
6654 	extra_ies = wpabuf_alloc(1500);
6655 	if (!extra_ies) {
6656 		wpabuf_free(req);
6657 		return -1;
6658 	}
6659 
6660 	if (p2p_prepare_pasn_extra_ie(p2p, extra_ies, req, false)) {
6661 		p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6662 		ret = -1;
6663 		goto out;
6664 	}
6665 
6666 	extra_ies = p2p_pasn_service_hash(p2p, extra_ies);
6667 	if (!extra_ies)
6668 		goto out;
6669 
6670 	ies_len = wpabuf_len(extra_ies);
6671 	ies = os_memdup(wpabuf_head_u8(extra_ies), ies_len);
6672 	if (!ies) {
6673 		ret = -1;
6674 		goto out;
6675 	}
6676 
6677 	pasn->extra_ies = ies;
6678 	pasn->extra_ies_len = ies_len;
6679 
6680 	/* Start PASN authentication */
6681 	if (wpas_pasn_start(pasn, pasn->own_addr, pasn->peer_addr, pasn->bssid,
6682 			    pasn->akmp, pasn->cipher, pasn->group, pasn->freq,
6683 			    NULL, 0, NULL, 0, NULL)) {
6684 		p2p_dbg(p2p, "Failed to start PASN");
6685 		ret = -1;
6686 	}
6687 out:
6688 	os_free(ies);
6689 	pasn->extra_ies = NULL;
6690 	pasn->extra_ies_len = 0;
6691 	wpabuf_free(req);
6692 	wpabuf_free(extra_ies);
6693 	return ret;
6694 }
6695 
6696 
p2p_pasn_handle_action_wrapper(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq,int trans_seq)6697 static int p2p_pasn_handle_action_wrapper(struct p2p_data *p2p,
6698 					  struct p2p_device *dev,
6699 					  const struct ieee80211_mgmt *mgmt,
6700 					  size_t len, int freq, int trans_seq)
6701 {
6702 	const u8 *ies;
6703 	size_t ies_len;
6704 	size_t data_len = 0;
6705 	bool derive_kek;
6706 	const u8 *data = NULL;
6707 	struct p2p_message msg;
6708 	struct ieee802_11_elems elems;
6709 
6710 	ies = mgmt->u.auth.variable;
6711 	ies_len = len - offsetof(struct ieee80211_mgmt, u.auth.variable);
6712 
6713 	os_memset(&msg, 0, sizeof(msg));
6714 	if (p2p_parse_ies(ies, ies_len, &msg)) {
6715 		p2p_dbg(p2p,
6716 			"Failed to parse P2P IE from PASN Authentication frame");
6717 		p2p_parse_free(&msg);
6718 		return -1;
6719 	}
6720 
6721 	if (msg.action_frame_wrapper && msg.action_frame_wrapper_len) {
6722 		data = msg.action_frame_wrapper;
6723 		data_len = msg.action_frame_wrapper_len;
6724 		if (data_len >= 2 &&
6725 		    data[0] == WLAN_ACTION_PUBLIC &&
6726 		    data[1] == WLAN_PA_VENDOR_SPECIFIC) {
6727 			data += 2;
6728 			data_len -= 2;
6729 			if (data_len < 4 ||
6730 			    WPA_GET_BE32(data) != P2P_IE_VENDOR_TYPE) {
6731 				p2p_parse_free(&msg);
6732 				return -1;
6733 			}
6734 			data += 4;
6735 			data_len -= 4;
6736 		} else {
6737 			p2p_dbg(p2p,
6738 				"Invalid category in Action frame wrapper in Authentication frame seq %d",
6739 				trans_seq);
6740 			p2p_parse_free(&msg);
6741 			return -1;
6742 		}
6743 	}
6744 
6745 	if (trans_seq == 1) {
6746 		if (ieee802_11_parse_elems(mgmt->u.auth.variable,
6747 					   len - offsetof(struct ieee80211_mgmt,
6748 							  u.auth.variable),
6749 					   &elems, 0) == ParseFailed) {
6750 			wpa_printf(MSG_DEBUG,
6751 				   "PASN: Failed parsing Authentication frame");
6752 			return -1;
6753 		}
6754 		derive_kek = ieee802_11_rsnx_capab_len(
6755 			elems.rsnxe, elems.rsnxe_len,
6756 			WLAN_RSNX_CAPAB_KEK_IN_PASN);
6757 		if (data && data_len >= 1 && data[0] == P2P_INVITATION_REQ) {
6758 			struct wpabuf *resp;
6759 
6760 			resp = p2p_process_invitation_req(p2p, mgmt->sa,
6761 							  data + 1,
6762 							  data_len - 1, freq,
6763 							  true);
6764 			if (!resp)
6765 				p2p_dbg(p2p, "No Invitation Response found");
6766 
6767 			dev->role = P2P_ROLE_PAIRING_RESPONDER;
6768 			p2p_pasn_initialize(p2p, dev, mgmt->sa, freq, true,
6769 					    derive_kek);
6770 			wpabuf_free(dev->action_frame_wrapper);
6771 			dev->action_frame_wrapper = resp;
6772 			if (msg.dira && msg.dira_len &&
6773 			    p2p_validate_dira(p2p, dev, msg.dira,
6774 					      msg.dira_len)) {
6775 				struct wpa_ie_data rsn_data;
6776 
6777 				if (wpa_parse_wpa_ie_rsn(elems.rsn_ie - 2,
6778 							 elems.rsn_ie_len + 2,
6779 							 &rsn_data) == 0 &&
6780 				    rsn_data.num_pmkid)
6781 					pasn_set_custom_pmkid(dev->pasn,
6782 							      rsn_data.pmkid);
6783 			}
6784 		} else if (data && data_len >= 1 && data[0] == P2P_GO_NEG_REQ) {
6785 			struct wpabuf *resp;
6786 
6787 			if (!derive_kek) {
6788 				p2p_dbg(p2p, "KEK-in-PASN not set in RSNXE");
6789 				return -1;
6790 			}
6791 			resp = p2p_process_go_neg_req(p2p, mgmt->sa, data + 1,
6792 						      data_len - 1, freq, true);
6793 			if (!resp)
6794 				p2p_dbg(p2p,
6795 					"No GO Negotiation Response found");
6796 			wpabuf_free(dev->action_frame_wrapper);
6797 			dev->action_frame_wrapper = resp;
6798 		} else {
6799 			p2p_dbg(p2p, "Invalid action frame wrapper in Auth1");
6800 		}
6801 	} else if (trans_seq == 2) {
6802 		if (data && data_len >= 1 && data[0] == P2P_INVITATION_RESP) {
6803 			p2p_process_invitation_resp(p2p, mgmt->sa, data + 1,
6804 						    data_len - 1);
6805 			wpabuf_free(dev->action_frame_wrapper);
6806 			dev->action_frame_wrapper = NULL;
6807 		} else if (data && data_len >= 1 &&
6808 			   data[0] == P2P_GO_NEG_RESP) {
6809 			struct wpabuf *conf;
6810 
6811 			conf = p2p_process_go_neg_resp(p2p, mgmt->sa, data + 1,
6812 						       data_len - 1, freq,
6813 						       true);
6814 			if (!conf)
6815 				p2p_dbg(p2p, "No GO Negotiation Confirm found");
6816 			wpabuf_free(dev->action_frame_wrapper);
6817 			dev->action_frame_wrapper = conf;
6818 		} else {
6819 			p2p_dbg(p2p, "Invalid action frame wrapper in Auth2");
6820 		}
6821 	} else if (trans_seq == 3) {
6822 		if (data && data_len >= 1 && data[0] == P2P_GO_NEG_CONF)
6823 			p2p_handle_go_neg_conf(p2p, mgmt->sa, data + 1,
6824 					       data_len - 1, true);
6825 		else
6826 			p2p_invitation_resp_cb(p2p, mgmt->sa,
6827 					       P2P_SEND_ACTION_SUCCESS);
6828 	}
6829 	p2p_parse_free(&msg);
6830 	return 0;
6831 }
6832 
6833 
p2p_pasn_add_encrypted_data(struct p2p_data * p2p,struct p2p_device * dev,struct wpabuf * buf)6834 static int p2p_pasn_add_encrypted_data(struct p2p_data *p2p,
6835 				       struct p2p_device *dev,
6836 				       struct wpabuf *buf)
6837 {
6838 	struct pasn_data *pasn;
6839 	struct wpabuf *p2p2_ie;
6840 	u8 *dika_len, *p2p2_ie_len;
6841 	int ret;
6842 
6843 	if (!p2p || !dev || !dev->pasn)
6844 		return 0;
6845 
6846 	pasn = dev->pasn;
6847 
6848 	if (dev->req_bootstrap_method != P2P_PBMA_OPPORTUNISTIC &&
6849 	    !p2p->pairing_info->enable_pairing_cache)
6850 		return 0;
6851 
6852 	p2p2_ie = wpabuf_alloc(100);
6853 	if (!p2p2_ie)
6854 		return -1;
6855 
6856 	p2p2_ie_len = p2p_buf_add_p2p2_ie_hdr(p2p2_ie);
6857 
6858 	if (p2p->pairing_info->enable_pairing_cache) {
6859 		wpabuf_put_u8(p2p2_ie, P2P_ATTR_DEVICE_IDENTITY_KEY);
6860 		dika_len = wpabuf_put(p2p2_ie, 2);
6861 
6862 		wpabuf_put_u8(p2p2_ie,
6863 			      p2p->pairing_info->dev_ik.cipher_version);
6864 		wpabuf_put_data(p2p2_ie, p2p->pairing_info->dev_ik.dik_data,
6865 				p2p->pairing_info->dev_ik.dik_len);
6866 		wpabuf_put_be32(p2p2_ie, p2p->pairing_info->dev_ik.expiration);
6867 
6868 		WPA_PUT_LE16(dika_len,
6869 			     (u8 *) wpabuf_put(p2p2_ie, 0) - dika_len - 2);
6870 	}
6871 
6872 	if (dev->req_bootstrap_method == P2P_PBMA_OPPORTUNISTIC) {
6873 		if (!p2p->dev_sae_password[0]) {
6874 			int password_len;
6875 
6876 			/* SAE password is not available as the request is not
6877 			 * for an existing GO. Pick a random SAE password of
6878 			 * length between 10 and 20. */
6879 			password_len = 10 + os_random() % 10;
6880 			if (p2p_random(p2p->dev_sae_password,
6881 				       password_len) < 0) {
6882 				wpabuf_free(p2p2_ie);
6883 				return -1;
6884 			}
6885 			p2p->dev_sae_password[password_len] = '\0';
6886 		}
6887 
6888 		wpabuf_put_u8(p2p2_ie, P2P_ATTR_PASSWORD);
6889 		wpabuf_put_le16(p2p2_ie, os_strlen(p2p->dev_sae_password));
6890 		wpabuf_put_str(p2p2_ie, p2p->dev_sae_password);
6891 	}
6892 
6893 	p2p_buf_update_ie_hdr(p2p2_ie, p2p2_ie_len);
6894 
6895 	ret = pasn_add_encrypted_data(pasn, buf, wpabuf_mhead_u8(p2p2_ie),
6896 				      wpabuf_len(p2p2_ie));
6897 	wpabuf_free(p2p2_ie);
6898 	return ret;
6899 }
6900 
6901 
p2p_prepare_data_element(struct p2p_data * p2p,const u8 * peer_addr)6902 int p2p_prepare_data_element(struct p2p_data *p2p, const u8 *peer_addr)
6903 {
6904 	int ret = -1;
6905 	struct p2p_device *dev;
6906 	struct pasn_data *pasn;
6907 	struct wpabuf *extra_ies;
6908 
6909 	if (!p2p)
6910 		return -1;
6911 
6912 	dev = p2p_get_device(p2p, peer_addr);
6913 	if (!dev || !dev->pasn) {
6914 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
6915 			MAC2STR(peer_addr));
6916 		return -1;
6917 	}
6918 	pasn = dev->pasn;
6919 
6920 	extra_ies = wpabuf_alloc(1500);
6921 	if (!extra_ies ||
6922 	    p2p_prepare_pasn_extra_ie(p2p, extra_ies,
6923 				      dev->action_frame_wrapper, false)) {
6924 		p2p_dbg(p2p, "Failed to prepare PASN extra elements");
6925 		goto out;
6926 	}
6927 
6928 	if (p2p_pasn_add_encrypted_data(p2p, dev, extra_ies) < 0)
6929 		p2p_dbg(p2p, "Failed to add PASN encrypted elements");
6930 
6931 	pasn->extra_ies = os_memdup(wpabuf_head_u8(extra_ies),
6932 				    wpabuf_len(extra_ies));
6933 	if (!pasn->extra_ies)
6934 		goto out;
6935 	pasn->extra_ies_len = wpabuf_len(extra_ies);
6936 	ret = 0;
6937 
6938 out:
6939 	wpabuf_free(extra_ies);
6940 	wpabuf_free(dev->action_frame_wrapper);
6941 	dev->action_frame_wrapper = NULL;
6942 
6943 	return ret;
6944 }
6945 
6946 
p2p_parse_data_element(struct p2p_data * p2p,const u8 * data,size_t len)6947 int p2p_parse_data_element(struct p2p_data *p2p, const u8 *data, size_t len)
6948 {
6949 	u8 attr_id;
6950 	const u8 *pos, *next;
6951 	u16 rem_len, attr_len;
6952 
6953 	if (!p2p || !data || !len)
6954 		return -1;
6955 
6956 	pos = data;
6957 	rem_len = len;
6958 
6959 	if (rem_len < 6 ||
6960 	    pos[0] != WLAN_EID_VENDOR_SPECIFIC ||
6961 	    pos[1] < 4 ||
6962 	    rem_len < 2 + pos[1] ||
6963 	    WPA_GET_BE32(&pos[2]) != P2P2_IE_VENDOR_TYPE) {
6964 		p2p_dbg(p2p,
6965 			"P2P: P2P2 IE not present in PASN Encrypted Data element");
6966 		return -1;
6967 	}
6968 
6969 	pos += 6;
6970 	rem_len -= 6;
6971 
6972 	while (rem_len >= 3) {
6973 		attr_id = *pos++;
6974 		attr_len = WPA_GET_LE16(pos);
6975 		pos += 2;
6976 		rem_len -= 3;
6977 		if (rem_len < attr_len)
6978 			return -1;
6979 		next = pos + attr_len;
6980 		rem_len -= attr_len;
6981 
6982 		switch (attr_id) {
6983 		case P2P_ATTR_DEVICE_IDENTITY_KEY:
6984 			if (attr_len < 1) {
6985 				p2p_dbg(p2p,
6986 					"Too short Device Identity Key attribute");
6987 				return -1;
6988 			}
6989 			p2p->dik_cipher_version = *pos++;
6990 			attr_len--;
6991 			if (p2p->dik_cipher_version ==
6992 			    DIRA_CIPHER_VERSION_128) {
6993 				if (attr_len < DEVICE_IDENTITY_KEY_LEN) {
6994 					p2p_dbg(p2p, "Too short DevIK");
6995 					return -1;
6996 				}
6997 				os_memcpy(p2p->peer_dik_data, pos,
6998 					  DEVICE_IDENTITY_KEY_LEN);
6999 				p2p->peer_dik_len = DEVICE_IDENTITY_KEY_LEN;
7000 				pos += DEVICE_IDENTITY_KEY_LEN;
7001 				attr_len -= DEVICE_IDENTITY_KEY_LEN;
7002 			} else {
7003 				p2p_dbg(p2p,
7004 					"Unsupported cipher version %u in Device Identity Key attribute",
7005 					p2p->dik_cipher_version);
7006 				return -1;
7007 			}
7008 			if (attr_len < 4) {
7009 				p2p_dbg(p2p,
7010 					"Not enough room for DevIK lifetime");
7011 				return -1;
7012 			}
7013 			p2p->peer_dik_lifetime = WPA_GET_BE32(pos);
7014 			p2p_dbg(p2p,
7015 				"Received peer DevIK of length %zu octets and lifetime %u",
7016 				p2p->peer_dik_len, p2p->peer_dik_lifetime);
7017 			break;
7018 		case P2P_ATTR_PASSWORD:
7019 			if (attr_len < 1 ||
7020 			    attr_len > sizeof(p2p->peer_sae_password) - 1) {
7021 				p2p_dbg(p2p,
7022 					"P2P: Invalid password length %d",
7023 					attr_len);
7024 				return -1;
7025 			}
7026 			os_memset(p2p->peer_sae_password, 0,
7027 				  sizeof(p2p->peer_sae_password));
7028 			os_memcpy(p2p->peer_sae_password, pos, attr_len);
7029 			break;
7030 		default:
7031 			p2p_dbg(p2p,
7032 				"Unsupported Attribute ID %u in P2P2 IE in PASN Encrypted Data element",
7033 				attr_id);
7034 			break;
7035 		}
7036 		pos = next;
7037 	}
7038 
7039 	return 0;
7040 }
7041 
7042 
p2p_validate_custom_pmkid(struct p2p_data * p2p,struct p2p_device * dev,const u8 * pmkid)7043 static int p2p_validate_custom_pmkid(struct p2p_data *p2p,
7044 				     struct p2p_device *dev, const u8 *pmkid)
7045 {
7046 	if (dev->pasn->custom_pmkid_valid &&
7047 	    os_memcmp(dev->pasn->custom_pmkid, pmkid, PMKID_LEN) == 0) {
7048 		p2p_dbg(p2p, "Customized PMKID valid");
7049 		return 0;
7050 	}
7051 	return -1;
7052 }
7053 
7054 
p2p_pasn_pmksa_get_pmk(struct p2p_data * p2p,const u8 * addr,u8 * pmkid,u8 * pmk,size_t * pmk_len)7055 static int p2p_pasn_pmksa_get_pmk(struct p2p_data *p2p, const u8 *addr,
7056 				  u8 *pmkid, u8 *pmk, size_t *pmk_len)
7057 {
7058 	struct p2p_device *dev;
7059 
7060 	dev = p2p_get_device(p2p, addr);
7061 	if (!dev) {
7062 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR, MAC2STR(addr));
7063 		return -1;
7064 	}
7065 
7066 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR)
7067 		return pasn_initiator_pmksa_cache_get(p2p->initiator_pmksa,
7068 						      addr, pmkid, pmk,
7069 						      pmk_len);
7070 	else
7071 		return pasn_responder_pmksa_cache_get(p2p->responder_pmksa,
7072 						      addr, pmkid, pmk,
7073 						      pmk_len);
7074 }
7075 
7076 
p2p_pasn_validate_and_update_pmkid(struct p2p_data * p2p,const u8 * addr,const u8 * rsn_pmkid)7077 int p2p_pasn_validate_and_update_pmkid(struct p2p_data *p2p, const u8 *addr,
7078 				       const u8 *rsn_pmkid)
7079 {
7080 	size_t pmk_len;
7081 	u8 pmkid[PMKID_LEN];
7082 	u8 pmk[PMK_LEN_MAX];
7083 	struct p2p_device *dev;
7084 
7085 	if (!p2p)
7086 		return -1;
7087 
7088 	dev = p2p_get_device(p2p, addr);
7089 	if (!dev || !dev->pasn) {
7090 		p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7091 			MAC2STR(addr));
7092 		return -1;
7093 	}
7094 
7095 	if (p2p_validate_custom_pmkid(p2p, dev, rsn_pmkid))
7096 		return -1;
7097 
7098 	if (p2p_pasn_pmksa_get_pmk(p2p, addr, pmkid, pmk, &pmk_len)) {
7099 		p2p_dbg(p2p, "P2P PASN: Failed to get PMK from cache");
7100 		return -1;
7101 	}
7102 
7103 	p2p_pasn_pmksa_set_pmk(p2p, p2p->cfg->dev_addr, addr, pmk, pmk_len,
7104 			       rsn_pmkid);
7105 	return 0;
7106 }
7107 
7108 
p2p_pasn_auth_tx_status(struct p2p_data * p2p,const u8 * data,size_t data_len,bool acked,bool verify)7109 int p2p_pasn_auth_tx_status(struct p2p_data *p2p, const u8 *data,
7110 			    size_t data_len, bool acked, bool verify)
7111 {
7112 	int ret = 0;
7113 	struct p2p_device *dev;
7114 	struct pasn_data *pasn;
7115 	const struct ieee80211_mgmt *mgmt =
7116 		(const struct ieee80211_mgmt *) data;
7117 
7118 	if (!p2p)
7119 		return -1;
7120 
7121 	dev = p2p_get_device(p2p, mgmt->da);
7122 	if (!dev || !dev->pasn) {
7123 		p2p_dbg(p2p, "P2P PASN: Peer not found " MACSTR,
7124 			MAC2STR(mgmt->da));
7125 		return -1;
7126 	}
7127 
7128 	pasn = dev->pasn;
7129 
7130 	ret = wpa_pasn_auth_tx_status(pasn, data, data_len, acked);
7131 	if (ret != 1 && !acked && pasn->frame)
7132 		return pasn->send_mgmt(pasn->cb_ctx, wpabuf_head(pasn->frame),
7133 				       wpabuf_len(pasn->frame), 0, pasn->freq,
7134 				       1000);
7135 
7136 	wpabuf_free(pasn->frame);
7137 	pasn->frame = NULL;
7138 
7139 	if (ret != 1)
7140 		return ret;
7141 
7142 	if (verify && dev == p2p->invite_peer)
7143 		p2p_start_invitation_connect(p2p, dev);
7144 	else if (dev == p2p->go_neg_peer)
7145 		p2p_go_complete(p2p, dev);
7146 
7147 	return 0;
7148 }
7149 
7150 
p2p_handle_pasn_auth(struct p2p_data * p2p,struct p2p_device * dev,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7151 static int p2p_handle_pasn_auth(struct p2p_data *p2p, struct p2p_device *dev,
7152 				const struct ieee80211_mgmt *mgmt, size_t len,
7153 				int freq)
7154 {
7155 	struct pasn_data *pasn;
7156 	u8 pasn_type;
7157 	int pasn_groups[4] = { 0 };
7158 	u16 auth_alg, auth_transaction, status_code;
7159 
7160 	if (!p2p || !dev || !dev->pasn)
7161 		return -1;
7162 
7163 	if (os_memcmp(mgmt->da, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
7164 		p2p_dbg(p2p, "PASN Responder: Not our frame");
7165 		return -1;
7166 	}
7167 
7168 	if (len < offsetof(struct ieee80211_mgmt, u.auth.variable))
7169 		return -1;
7170 
7171 	pasn = dev->pasn;
7172 	auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
7173 	status_code = le_to_host16(mgmt->u.auth.status_code);
7174 
7175 	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7176 
7177 	if (status_code != WLAN_STATUS_SUCCESS &&
7178 	    status_code != WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) {
7179 		p2p_dbg(p2p, "PASN: Authentication rejected - status=%u",
7180 			status_code);
7181 		return -1;
7182 	}
7183 
7184 	if (auth_alg != WLAN_AUTH_PASN || auth_transaction == 2) {
7185 		p2p_dbg(p2p,
7186 			"PASN Responder: Not a PASN frame or unexpected Authentication frame, auth_alg=%d",
7187 			auth_alg);
7188 		return -1;
7189 	}
7190 	if (auth_transaction == 1) {
7191 		pasn_type = p2p->cfg->pairing_config.pasn_type;
7192 		if (pasn_type & 0xc && pasn_type & 0x3) {
7193 			pasn_groups[0] = 20;
7194 			pasn_groups[1] = 19;
7195 		} else if (pasn_type & 0xc) {
7196 			pasn_groups[0] = 20;
7197 		} else {
7198 			pasn_groups[0] = 19;
7199 		}
7200 		pasn->pasn_groups = pasn_groups;
7201 
7202 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7203 						   auth_transaction)) {
7204 			p2p_dbg(p2p,
7205 				"PASN Responder: Handle Auth 1 action wrapper failed");
7206 			return -1;
7207 		}
7208 		if (handle_auth_pasn_1(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7209 				       len, false) < 0) {
7210 			p2p_dbg(p2p,
7211 				"PASN Responder: Handle Auth 1 failed");
7212 			return -1;
7213 		}
7214 	} else if (auth_transaction == 3) {
7215 		if (handle_auth_pasn_3(pasn, p2p->cfg->dev_addr, mgmt->sa, mgmt,
7216 				       len) < 0) {
7217 			p2p_dbg(p2p,
7218 				"PASN Responder: Handle Auth 3 failed");
7219 			return -1;
7220 		}
7221 #ifdef CONFIG_TESTING_OPTIONS
7222 		p2p_pasn_store_ptk(p2p, &pasn->ptk);
7223 #endif /* CONFIG_TESTING_OPTIONS */
7224 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7225 						   auth_transaction)) {
7226 			p2p_dbg(p2p,
7227 				"PASN Responder: Handle Auth 3 action wrapper failed");
7228 			/* Drop keying material from a failed pairing attempt */
7229 			os_memset(p2p->peer_dik_data, 0,
7230 				  sizeof(p2p->peer_dik_data));
7231 			os_memset(p2p->peer_sae_password, 0,
7232 				  sizeof(p2p->peer_sae_password));
7233 			return -1;
7234 		}
7235 		forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7236 	}
7237 	return 0;
7238 }
7239 
7240 
p2p_pasn_auth_rx(struct p2p_data * p2p,const struct ieee80211_mgmt * mgmt,size_t len,int freq)7241 int p2p_pasn_auth_rx(struct p2p_data *p2p, const struct ieee80211_mgmt *mgmt,
7242 		     size_t len, int freq)
7243 {
7244 	int ret = 0;
7245 	u8 auth_transaction;
7246 	struct p2p_device *dev;
7247 	struct pasn_data *pasn;
7248 	struct wpa_pasn_params_data pasn_data;
7249 
7250 	dev = p2p_get_device(p2p, mgmt->sa);
7251 	if (!dev) {
7252 		p2p_dbg(p2p, "PASN: Peer not found " MACSTR,
7253 			MAC2STR(mgmt->sa));
7254 		return -1;
7255 	}
7256 
7257 	if (!dev->pasn) {
7258 		p2p_dbg(p2p, "PASN: Uninitialized");
7259 		return -1;
7260 	}
7261 
7262 	pasn = dev->pasn;
7263 
7264 	wpabuf_free(pasn->frame);
7265 	pasn->frame = NULL;
7266 
7267 	pasn_register_callbacks(pasn, p2p->cfg->cb_ctx,
7268 				p2p->cfg->pasn_send_mgmt,
7269 				p2p->cfg->pasn_validate_pmkid);
7270 	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
7271 
7272 	if (dev->role == P2P_ROLE_PAIRING_INITIATOR && auth_transaction == 2) {
7273 		if (p2p_pasn_handle_action_wrapper(p2p, dev, mgmt, len, freq,
7274 						   auth_transaction)) {
7275 			p2p_dbg(p2p,
7276 				"PASN Initiator: Handle Auth 2 action wrapper failed");
7277 			return -1;
7278 		}
7279 		ret = wpa_pasn_auth_rx(pasn, (const u8 *) mgmt, len,
7280 				       &pasn_data);
7281 		if (ret < 0) {
7282 			p2p_dbg(p2p, "PASN: wpa_pasn_auth_rx() failed");
7283 			dev->role = P2P_ROLE_IDLE;
7284 		}
7285 #ifdef CONFIG_TESTING_OPTIONS
7286 		p2p_pasn_store_ptk(p2p, &pasn->ptk);
7287 #endif /* CONFIG_TESTING_OPTIONS */
7288 		forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk));
7289 	} else {
7290 		ret = p2p_handle_pasn_auth(p2p, dev, mgmt, len, freq);
7291 	}
7292 	return ret;
7293 }
7294 
7295 
p2p_pasn_pmksa_set_pmk(struct p2p_data * p2p,const u8 * src,const u8 * dst,const u8 * pmk,size_t pmk_len,const u8 * pmkid)7296 void p2p_pasn_pmksa_set_pmk(struct p2p_data *p2p, const u8 *src, const u8 *dst,
7297 			    const u8 *pmk, size_t pmk_len, const u8 *pmkid)
7298 {
7299 	pasn_initiator_pmksa_cache_add(p2p->initiator_pmksa, src, dst, pmk,
7300 				       pmk_len, pmkid);
7301 	pasn_responder_pmksa_cache_add(p2p->responder_pmksa, src, dst, pmk,
7302 				       pmk_len, pmkid);
7303 }
7304 
7305 
7306 #ifdef CONFIG_TESTING_OPTIONS
7307 
p2p_pasn_store_ptk(struct p2p_data * p2p,struct wpa_ptk * ptk)7308 void p2p_pasn_store_ptk(struct p2p_data *p2p, struct wpa_ptk *ptk)
7309 {
7310 	u8 *pos;
7311 
7312 	if (ptk->ptk_len > sizeof(p2p->pasn_ptk)) {
7313 		p2p_dbg(p2p, "P2P PASN PTK exceeds: (len=%ld)", ptk->ptk_len);
7314 		return;
7315 	}
7316 
7317 	pos = p2p->pasn_ptk;
7318 	p2p->pasn_ptk_len = ptk->ptk_len;
7319 	if (ptk->kck_len) {
7320 		os_memcpy(pos, ptk->kck, ptk->kck_len);
7321 		pos += ptk->kck_len;
7322 	}
7323 	if (ptk->kek_len) {
7324 		os_memcpy(pos, ptk->kek, ptk->kek_len);
7325 		pos += ptk->kek_len;
7326 	}
7327 	if (ptk->tk_len) {
7328 		os_memcpy(pos, ptk->tk, ptk->tk_len);
7329 		pos += ptk->tk_len;
7330 	}
7331 	if (ptk->kdk_len) {
7332 		os_memcpy(pos, ptk->kdk, ptk->kdk_len);
7333 		pos += ptk->kdk_len;
7334 	}
7335 }
7336 
7337 
p2p_pasn_get_ptk(struct p2p_data * p2p,const u8 ** buf,size_t * buf_len)7338 int p2p_pasn_get_ptk(struct p2p_data *p2p, const u8 **buf, size_t *buf_len)
7339 {
7340 	if (!p2p || !p2p->pasn_ptk_len)
7341 		return -1;
7342 
7343 	*buf_len = p2p->pasn_ptk_len;
7344 	*buf = p2p->pasn_ptk;
7345 	return 0;
7346 }
7347 
7348 #endif /* CONFIG_TESTING_OPTIONS */
7349 
7350 #endif /* CONFIG_PASN */
7351 
7352 
p2p_get_dira_info(struct p2p_data * p2p,char * buf,size_t buflen)7353 int p2p_get_dira_info(struct p2p_data *p2p, char *buf, size_t buflen)
7354 {
7355 	int res;
7356 	char *pos, *end;
7357 	struct p2p_id_key *dev_ik;
7358 
7359 	if (!p2p->pairing_info ||
7360 	    !p2p->cfg->pairing_config.pairing_capable ||
7361 	    !p2p->cfg->pairing_config.enable_pairing_cache)
7362 		return 0;
7363 
7364 	if (p2p_derive_nonce_tag(p2p))
7365 		return 0;
7366 
7367 	pos = buf;
7368 	end = buf + buflen;
7369 	dev_ik = &p2p->pairing_info->dev_ik;
7370 
7371 	res = os_snprintf(pos, end - pos, MACSTR,
7372 			  MAC2STR(p2p->cfg->dev_addr));
7373 	if (os_snprintf_error(end - pos, res))
7374 		return pos - buf;
7375 	pos += res;
7376 
7377 	res = os_snprintf(pos, end - pos, " ");
7378 	if (os_snprintf_error(end - pos, res))
7379 		return pos - buf;
7380 	pos += res;
7381 
7382 	pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_nonce,
7383 				dev_ik->dira_nonce_len);
7384 
7385 	res = os_snprintf(pos, end - pos, " ");
7386 	if (os_snprintf_error(end - pos, res))
7387 		return pos - buf;
7388 	pos += res;
7389 
7390 	pos += wpa_snprintf_hex(pos, end - pos, dev_ik->dira_tag,
7391 				dev_ik->dira_tag_len);
7392 
7393 	res = os_snprintf(pos, end - pos, "\n");
7394 	if (os_snprintf_error(end - pos, res))
7395 		return pos - buf;
7396 	pos += res;
7397 
7398 	return pos - buf;
7399 }
7400