1 /*
2  * Wi-Fi Direct - P2P Group Owner Negotiation
3  * Copyright (c) 2009-2010, Atheros Communications
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "utils/eloop.h"
13 #include "common/ieee802_11_defs.h"
14 #include "common/wpa_ctrl.h"
15 #include "wps/wps_defs.h"
16 #include "p2p_i.h"
17 #include "p2p.h"
18 
19 
p2p_go_det(u8 own_intent,u8 peer_value)20 static int p2p_go_det(u8 own_intent, u8 peer_value)
21 {
22 	u8 peer_intent = peer_value >> 1;
23 	if (own_intent == peer_intent) {
24 		if (own_intent == P2P_MAX_GO_INTENT)
25 			return -1; /* both devices want to become GO */
26 
27 		/* Use tie breaker bit to determine GO */
28 		return (peer_value & 0x01) ? 0 : 1;
29 	}
30 
31 	return own_intent > peer_intent;
32 }
33 
34 
p2p_peer_channels_check(struct p2p_data * p2p,struct p2p_channels * own,struct p2p_device * dev,const u8 * channel_list,size_t channel_list_len)35 int p2p_peer_channels_check(struct p2p_data *p2p, struct p2p_channels *own,
36 			    struct p2p_device *dev,
37 			    const u8 *channel_list, size_t channel_list_len)
38 {
39 	const u8 *pos, *end;
40 	struct p2p_channels *ch;
41 	size_t channels;
42 	struct p2p_channels intersection;
43 
44 	ch = &dev->channels;
45 	os_memset(ch, 0, sizeof(*ch));
46 	pos = channel_list;
47 	end = channel_list + channel_list_len;
48 
49 	if (end - pos < 3)
50 		return -1;
51 	os_memcpy(dev->country, pos, 3);
52 	wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
53 	if (pos[2] != 0x04 && os_memcmp(pos, p2p->cfg->country, 2) != 0) {
54 		p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
55 			p2p->cfg->country[0], p2p->cfg->country[1],
56 			pos[0], pos[1]);
57 		return -1;
58 	}
59 	pos += 3;
60 
61 	while (pos + 2 < end) {
62 		struct p2p_reg_class *cl = &ch->reg_class[ch->reg_classes];
63 		cl->reg_class = *pos++;
64 		if (pos + 1 + pos[0] > end) {
65 			p2p_info(p2p, "Invalid peer Channel List");
66 			return -1;
67 		}
68 		channels = *pos++;
69 		cl->channels = channels > P2P_MAX_REG_CLASS_CHANNELS ?
70 			P2P_MAX_REG_CLASS_CHANNELS : channels;
71 		os_memcpy(cl->channel, pos, cl->channels);
72 		pos += channels;
73 		ch->reg_classes++;
74 		if (ch->reg_classes == P2P_MAX_REG_CLASSES)
75 			break;
76 	}
77 
78 	p2p_channels_intersect(own, &dev->channels, &intersection);
79 	p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
80 		(int) own->reg_classes,
81 		(int) dev->channels.reg_classes,
82 		(int) intersection.reg_classes);
83 	if (intersection.reg_classes == 0) {
84 		p2p_info(p2p, "No common channels found");
85 		return -1;
86 	}
87 	return 0;
88 }
89 
90 
p2p_peer_channels(struct p2p_data * p2p,struct p2p_device * dev,const u8 * channel_list,size_t channel_list_len)91 static int p2p_peer_channels(struct p2p_data *p2p, struct p2p_device *dev,
92 			     const u8 *channel_list, size_t channel_list_len)
93 {
94 	return p2p_peer_channels_check(p2p, &p2p->channels, dev,
95 				       channel_list, channel_list_len);
96 }
97 
98 
p2p_wps_method_pw_id(enum p2p_wps_method wps_method)99 u16 p2p_wps_method_pw_id(enum p2p_wps_method wps_method)
100 {
101 	switch (wps_method) {
102 	case WPS_PIN_DISPLAY:
103 		return DEV_PW_REGISTRAR_SPECIFIED;
104 	case WPS_PIN_KEYPAD:
105 		return DEV_PW_USER_SPECIFIED;
106 	case WPS_PBC:
107 		return DEV_PW_PUSHBUTTON;
108 	case WPS_NFC:
109 		return DEV_PW_NFC_CONNECTION_HANDOVER;
110 	case WPS_P2PS:
111 		return DEV_PW_P2PS_DEFAULT;
112 	default:
113 		return DEV_PW_DEFAULT;
114 	}
115 }
116 
117 
p2p_wps_method_str(enum p2p_wps_method wps_method)118 static const char * p2p_wps_method_str(enum p2p_wps_method wps_method)
119 {
120 	switch (wps_method) {
121 	case WPS_PIN_DISPLAY:
122 		return "Display";
123 	case WPS_PIN_KEYPAD:
124 		return "Keypad";
125 	case WPS_PBC:
126 		return "PBC";
127 	case WPS_NFC:
128 		return "NFC";
129 	case WPS_P2PS:
130 		return "P2PS";
131 	default:
132 		return "??";
133 	}
134 }
135 
136 
p2p_build_go_neg_req(struct p2p_data * p2p,struct p2p_device * peer)137 static struct wpabuf * p2p_build_go_neg_req(struct p2p_data *p2p,
138 					    struct p2p_device *peer)
139 {
140 	struct wpabuf *buf;
141 	u8 *len;
142 	u8 group_capab;
143 	size_t extra = 0;
144 	u16 pw_id;
145 
146 #ifdef CONFIG_WIFI_DISPLAY
147 	if (p2p->wfd_ie_go_neg)
148 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
149 #endif /* CONFIG_WIFI_DISPLAY */
150 
151 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ])
152 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ]);
153 
154 	buf = wpabuf_alloc(1000 + extra);
155 	if (buf == NULL)
156 		return NULL;
157 
158 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
159 
160 	len = p2p_buf_add_ie_hdr(buf);
161 	group_capab = 0;
162 	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
163 		group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
164 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
165 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_RECONN;
166 	}
167 	if (p2p->cross_connect)
168 		group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
169 	if (p2p->cfg->p2p_intra_bss)
170 		group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
171 	p2p_buf_add_capability(buf, p2p->dev_capab &
172 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
173 			       group_capab);
174 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
175 	p2p_buf_add_config_timeout(buf, p2p->go_timeout, p2p->client_timeout);
176 	p2p_buf_add_listen_channel(buf, p2p->cfg->country, p2p->cfg->reg_class,
177 				   p2p->cfg->channel);
178 	if (p2p->ext_listen_interval)
179 		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
180 					      p2p->ext_listen_interval);
181 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
182 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &p2p->channels);
183 	p2p_buf_add_device_info(buf, p2p, peer);
184 	p2p_buf_add_operating_channel(buf, p2p->cfg->country,
185 				      p2p->op_reg_class, p2p->op_channel);
186 	p2p_buf_update_ie_hdr(buf, len);
187 
188 	/* WPS IE with Device Password ID attribute */
189 	pw_id = p2p_wps_method_pw_id(peer->wps_method);
190 	if (peer->oob_pw_id)
191 		pw_id = peer->oob_pw_id;
192 	if (p2p_build_wps_ie(p2p, buf, pw_id, 0) < 0) {
193 		p2p_dbg(p2p, "Failed to build WPS IE for GO Negotiation Request");
194 		wpabuf_free(buf);
195 		return NULL;
196 	}
197 
198 #ifdef CONFIG_WIFI_DISPLAY
199 	if (p2p->wfd_ie_go_neg)
200 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
201 #endif /* CONFIG_WIFI_DISPLAY */
202 
203 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ])
204 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ]);
205 
206 	return buf;
207 }
208 
209 
p2p_connect_send(struct p2p_data * p2p,struct p2p_device * dev)210 int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev)
211 {
212 	struct wpabuf *req;
213 	int freq;
214 
215 	if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG) {
216 		u16 config_method;
217 		p2p_dbg(p2p, "Use PD-before-GO-Neg workaround for " MACSTR,
218 			MAC2STR(dev->info.p2p_device_addr));
219 		if (dev->wps_method == WPS_PIN_DISPLAY)
220 			config_method = WPS_CONFIG_KEYPAD;
221 		else if (dev->wps_method == WPS_PIN_KEYPAD)
222 			config_method = WPS_CONFIG_DISPLAY;
223 		else if (dev->wps_method == WPS_PBC)
224 			config_method = WPS_CONFIG_PUSHBUTTON;
225 		else if (dev->wps_method == WPS_P2PS)
226 			config_method = WPS_CONFIG_P2PS;
227 		else
228 			return -1;
229 		return p2p_prov_disc_req(p2p, dev->info.p2p_device_addr,
230 					 NULL, config_method, 0, 0, 1);
231 	}
232 
233 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
234 	if (dev->oob_go_neg_freq > 0)
235 		freq = dev->oob_go_neg_freq;
236 	if (freq <= 0) {
237 		p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
238 			MACSTR " to send GO Negotiation Request",
239 			MAC2STR(dev->info.p2p_device_addr));
240 		return -1;
241 	}
242 
243 	req = p2p_build_go_neg_req(p2p, dev);
244 	if (req == NULL)
245 		return -1;
246 	p2p_dbg(p2p, "Sending GO Negotiation Request");
247 	p2p_set_state(p2p, P2P_CONNECT);
248 	p2p->pending_action_state = P2P_PENDING_GO_NEG_REQUEST;
249 	p2p->go_neg_peer = dev;
250 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
251 	dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
252 	dev->connect_reqs++;
253 	if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
254 			    p2p->cfg->dev_addr, dev->info.p2p_device_addr,
255 			    wpabuf_head(req), wpabuf_len(req), 500) < 0) {
256 		p2p_dbg(p2p, "Failed to send Action frame");
257 		/* Use P2P find to recover and retry */
258 		p2p_set_timeout(p2p, 0, 0);
259 	} else
260 		dev->go_neg_req_sent++;
261 
262 	wpabuf_free(req);
263 
264 	return 0;
265 }
266 
267 
p2p_build_go_neg_resp(struct p2p_data * p2p,struct p2p_device * peer,u8 dialog_token,u8 status,u8 tie_breaker)268 static struct wpabuf * p2p_build_go_neg_resp(struct p2p_data *p2p,
269 					     struct p2p_device *peer,
270 					     u8 dialog_token, u8 status,
271 					     u8 tie_breaker)
272 {
273 	struct wpabuf *buf;
274 	u8 *len;
275 	u8 group_capab;
276 	size_t extra = 0;
277 	u16 pw_id;
278 
279 	p2p_dbg(p2p, "Building GO Negotiation Response");
280 
281 #ifdef CONFIG_WIFI_DISPLAY
282 	if (p2p->wfd_ie_go_neg)
283 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
284 #endif /* CONFIG_WIFI_DISPLAY */
285 
286 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP])
287 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP]);
288 
289 	buf = wpabuf_alloc(1000 + extra);
290 	if (buf == NULL)
291 		return NULL;
292 
293 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_RESP, dialog_token);
294 
295 	len = p2p_buf_add_ie_hdr(buf);
296 	p2p_buf_add_status(buf, status);
297 	group_capab = 0;
298 	if (peer && peer->go_state == LOCAL_GO) {
299 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
300 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
301 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
302 				group_capab |=
303 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
304 		}
305 		if (p2p->cross_connect)
306 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
307 		if (p2p->cfg->p2p_intra_bss)
308 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
309 	}
310 	p2p_buf_add_capability(buf, p2p->dev_capab &
311 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
312 			       group_capab);
313 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | tie_breaker);
314 	p2p_buf_add_config_timeout(buf, p2p->go_timeout, p2p->client_timeout);
315 	if (peer && peer->go_state == REMOTE_GO) {
316 		p2p_dbg(p2p, "Omit Operating Channel attribute");
317 	} else {
318 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
319 					      p2p->op_reg_class,
320 					      p2p->op_channel);
321 	}
322 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
323 	if (status || peer == NULL) {
324 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
325 					 &p2p->channels);
326 	} else if (peer->go_state == REMOTE_GO) {
327 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
328 					 &p2p->channels);
329 	} else {
330 		struct p2p_channels res;
331 		p2p_channels_intersect(&p2p->channels, &peer->channels,
332 				       &res);
333 		p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
334 	}
335 	p2p_buf_add_device_info(buf, p2p, peer);
336 	if (peer && peer->go_state == LOCAL_GO) {
337 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
338 				     p2p->ssid_len);
339 	}
340 	p2p_buf_update_ie_hdr(buf, len);
341 
342 	/* WPS IE with Device Password ID attribute */
343 	pw_id = p2p_wps_method_pw_id(peer ? peer->wps_method : WPS_NOT_READY);
344 	if (peer && peer->oob_pw_id)
345 		pw_id = peer->oob_pw_id;
346 	if (p2p_build_wps_ie(p2p, buf, pw_id, 0) < 0) {
347 		p2p_dbg(p2p, "Failed to build WPS IE for GO Negotiation Response");
348 		wpabuf_free(buf);
349 		return NULL;
350 	}
351 
352 #ifdef CONFIG_WIFI_DISPLAY
353 	if (p2p->wfd_ie_go_neg)
354 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
355 #endif /* CONFIG_WIFI_DISPLAY */
356 
357 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP])
358 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP]);
359 
360 	return buf;
361 }
362 
363 
364 /**
365  * p2p_reselect_channel - Re-select operating channel based on peer information
366  * @p2p: P2P module context from p2p_init()
367  * @intersection: Support channel list intersection from local and peer
368  *
369  * This function is used to re-select the best channel after having received
370  * information from the peer to allow supported channel lists to be intersected.
371  * This can be used to improve initial channel selection done in
372  * p2p_prepare_channel() prior to the start of GO Negotiation. In addition, this
373  * can be used for Invitation case.
374  */
p2p_reselect_channel(struct p2p_data * p2p,struct p2p_channels * intersection)375 void p2p_reselect_channel(struct p2p_data *p2p,
376 			  struct p2p_channels *intersection)
377 {
378 	struct p2p_reg_class *cl;
379 	int freq;
380 	u8 op_reg_class, op_channel;
381 	unsigned int i;
382 	const int op_classes_5ghz[] = { 124, 125, 115, 0 };
383 	const int op_classes_ht40[] = { 126, 127, 116, 117, 0 };
384 	const int op_classes_vht[] = { 128, 0 };
385 
386 	if (p2p->own_freq_preference > 0 &&
387 	    p2p_freq_to_channel(p2p->own_freq_preference,
388 				&op_reg_class, &op_channel) == 0 &&
389 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
390 		p2p_dbg(p2p, "Pick own channel preference (reg_class %u channel %u) from intersection",
391 			op_reg_class, op_channel);
392 		p2p->op_reg_class = op_reg_class;
393 		p2p->op_channel = op_channel;
394 		return;
395 	}
396 
397 	if (p2p->best_freq_overall > 0 &&
398 	    p2p_freq_to_channel(p2p->best_freq_overall,
399 				&op_reg_class, &op_channel) == 0 &&
400 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
401 		p2p_dbg(p2p, "Pick best overall channel (reg_class %u channel %u) from intersection",
402 			op_reg_class, op_channel);
403 		p2p->op_reg_class = op_reg_class;
404 		p2p->op_channel = op_channel;
405 		return;
406 	}
407 
408 	/* First, try to pick the best channel from another band */
409 	freq = p2p_channel_to_freq(p2p->op_reg_class, p2p->op_channel);
410 	if (freq >= 2400 && freq < 2500 && p2p->best_freq_5 > 0 &&
411 	    !p2p_channels_includes(intersection, p2p->op_reg_class,
412 				   p2p->op_channel) &&
413 	    p2p_freq_to_channel(p2p->best_freq_5,
414 				&op_reg_class, &op_channel) == 0 &&
415 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
416 		p2p_dbg(p2p, "Pick best 5 GHz channel (reg_class %u channel %u) from intersection",
417 			op_reg_class, op_channel);
418 		p2p->op_reg_class = op_reg_class;
419 		p2p->op_channel = op_channel;
420 		return;
421 	}
422 
423 	if (freq >= 4900 && freq < 6000 && p2p->best_freq_24 > 0 &&
424 	    !p2p_channels_includes(intersection, p2p->op_reg_class,
425 				   p2p->op_channel) &&
426 	    p2p_freq_to_channel(p2p->best_freq_24,
427 				&op_reg_class, &op_channel) == 0 &&
428 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
429 		p2p_dbg(p2p, "Pick best 2.4 GHz channel (reg_class %u channel %u) from intersection",
430 			op_reg_class, op_channel);
431 		p2p->op_reg_class = op_reg_class;
432 		p2p->op_channel = op_channel;
433 		return;
434 	}
435 
436 	/* Select channel with highest preference if the peer supports it */
437 	for (i = 0; p2p->cfg->pref_chan && i < p2p->cfg->num_pref_chan; i++) {
438 		if (p2p_channels_includes(intersection,
439 					  p2p->cfg->pref_chan[i].op_class,
440 					  p2p->cfg->pref_chan[i].chan)) {
441 			p2p->op_reg_class = p2p->cfg->pref_chan[i].op_class;
442 			p2p->op_channel = p2p->cfg->pref_chan[i].chan;
443 			p2p_dbg(p2p, "Pick highest preferred channel (op_class %u channel %u) from intersection",
444 				p2p->op_reg_class, p2p->op_channel);
445 			return;
446 		}
447 	}
448 
449 	/* Try a channel where we might be able to use VHT */
450 	if (p2p_channel_select(intersection, op_classes_vht,
451 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
452 		p2p_dbg(p2p, "Pick possible VHT channel (op_class %u channel %u) from intersection",
453 			p2p->op_reg_class, p2p->op_channel);
454 		return;
455 	}
456 
457 	/* Try a channel where we might be able to use HT40 */
458 	if (p2p_channel_select(intersection, op_classes_ht40,
459 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
460 		p2p_dbg(p2p, "Pick possible HT40 channel (op_class %u channel %u) from intersection",
461 			p2p->op_reg_class, p2p->op_channel);
462 		return;
463 	}
464 
465 	/* Prefer a 5 GHz channel */
466 	if (p2p_channel_select(intersection, op_classes_5ghz,
467 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
468 		p2p_dbg(p2p, "Pick possible 5 GHz channel (op_class %u channel %u) from intersection",
469 			p2p->op_reg_class, p2p->op_channel);
470 		return;
471 	}
472 
473 	/*
474 	 * Try to see if the original channel is in the intersection. If
475 	 * so, no need to change anything, as it already contains some
476 	 * randomness.
477 	 */
478 	if (p2p_channels_includes(intersection, p2p->op_reg_class,
479 				  p2p->op_channel)) {
480 		p2p_dbg(p2p, "Using original operating class and channel (op_class %u channel %u) from intersection",
481 			p2p->op_reg_class, p2p->op_channel);
482 		return;
483 	}
484 
485 	/*
486 	 * Fall back to whatever is included in the channel intersection since
487 	 * no better options seems to be available.
488 	 */
489 	cl = &intersection->reg_class[0];
490 	p2p_dbg(p2p, "Pick another channel (reg_class %u channel %u) from intersection",
491 		cl->reg_class, cl->channel[0]);
492 	p2p->op_reg_class = cl->reg_class;
493 	p2p->op_channel = cl->channel[0];
494 }
495 
496 
p2p_go_select_channel(struct p2p_data * p2p,struct p2p_device * dev,u8 * status)497 int p2p_go_select_channel(struct p2p_data *p2p, struct p2p_device *dev,
498 			  u8 *status)
499 {
500 	struct p2p_channels tmp, intersection;
501 
502 	p2p_channels_dump(p2p, "own channels", &p2p->channels);
503 	p2p_channels_dump(p2p, "peer channels", &dev->channels);
504 	p2p_channels_intersect(&p2p->channels, &dev->channels, &tmp);
505 	p2p_channels_dump(p2p, "intersection", &tmp);
506 	p2p_channels_remove_freqs(&tmp, &p2p->no_go_freq);
507 	p2p_channels_dump(p2p, "intersection after no-GO removal", &tmp);
508 	p2p_channels_intersect(&tmp, &p2p->cfg->channels, &intersection);
509 	p2p_channels_dump(p2p, "intersection with local channel list",
510 			  &intersection);
511 	if (intersection.reg_classes == 0 ||
512 	    intersection.reg_class[0].channels == 0) {
513 		*status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
514 		p2p_dbg(p2p, "No common channels found");
515 		return -1;
516 	}
517 
518 	if (!p2p_channels_includes(&intersection, p2p->op_reg_class,
519 				   p2p->op_channel)) {
520 		if (dev->flags & P2P_DEV_FORCE_FREQ) {
521 			*status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
522 			p2p_dbg(p2p, "Peer does not support the forced channel");
523 			return -1;
524 		}
525 
526 		p2p_dbg(p2p, "Selected operating channel (op_class %u channel %u) not acceptable to the peer",
527 			p2p->op_reg_class, p2p->op_channel);
528 		p2p_reselect_channel(p2p, &intersection);
529 	} else if (!(dev->flags & P2P_DEV_FORCE_FREQ) &&
530 		   !p2p->cfg->cfg_op_channel) {
531 		p2p_dbg(p2p, "Try to optimize channel selection with peer information received; previously selected op_class %u channel %u",
532 			p2p->op_reg_class, p2p->op_channel);
533 		p2p_reselect_channel(p2p, &intersection);
534 	}
535 
536 	if (!p2p->ssid_set) {
537 		p2p_build_ssid(p2p, p2p->ssid, &p2p->ssid_len);
538 		p2p->ssid_set = 1;
539 	}
540 
541 	return 0;
542 }
543 
544 
p2p_process_go_neg_req(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)545 void p2p_process_go_neg_req(struct p2p_data *p2p, const u8 *sa,
546 			    const u8 *data, size_t len, int rx_freq)
547 {
548 	struct p2p_device *dev = NULL;
549 	struct wpabuf *resp;
550 	struct p2p_message msg;
551 	u8 status = P2P_SC_FAIL_INVALID_PARAMS;
552 	int tie_breaker = 0;
553 	int freq;
554 
555 	p2p_dbg(p2p, "Received GO Negotiation Request from " MACSTR "(freq=%d)",
556 		MAC2STR(sa), rx_freq);
557 
558 	if (p2p_parse(data, len, &msg))
559 		return;
560 
561 	if (!msg.capability) {
562 		p2p_dbg(p2p, "Mandatory Capability attribute missing from GO Negotiation Request");
563 #ifdef CONFIG_P2P_STRICT
564 		goto fail;
565 #endif /* CONFIG_P2P_STRICT */
566 	}
567 
568 	if (msg.go_intent)
569 		tie_breaker = *msg.go_intent & 0x01;
570 	else {
571 		p2p_dbg(p2p, "Mandatory GO Intent attribute missing from GO Negotiation Request");
572 #ifdef CONFIG_P2P_STRICT
573 		goto fail;
574 #endif /* CONFIG_P2P_STRICT */
575 	}
576 
577 	if (!msg.config_timeout) {
578 		p2p_dbg(p2p, "Mandatory Configuration Timeout attribute missing from GO Negotiation Request");
579 #ifdef CONFIG_P2P_STRICT
580 		goto fail;
581 #endif /* CONFIG_P2P_STRICT */
582 	}
583 
584 	if (!msg.listen_channel) {
585 		p2p_dbg(p2p, "No Listen Channel attribute received");
586 		goto fail;
587 	}
588 	if (!msg.operating_channel) {
589 		p2p_dbg(p2p, "No Operating Channel attribute received");
590 		goto fail;
591 	}
592 	if (!msg.channel_list) {
593 		p2p_dbg(p2p, "No Channel List attribute received");
594 		goto fail;
595 	}
596 	if (!msg.intended_addr) {
597 		p2p_dbg(p2p, "No Intended P2P Interface Address attribute received");
598 		goto fail;
599 	}
600 	if (!msg.p2p_device_info) {
601 		p2p_dbg(p2p, "No P2P Device Info attribute received");
602 		goto fail;
603 	}
604 
605 	if (os_memcmp(msg.p2p_device_addr, sa, ETH_ALEN) != 0) {
606 		p2p_dbg(p2p, "Unexpected GO Negotiation Request SA=" MACSTR
607 			" != dev_addr=" MACSTR,
608 			MAC2STR(sa), MAC2STR(msg.p2p_device_addr));
609 		goto fail;
610 	}
611 
612 	dev = p2p_get_device(p2p, sa);
613 
614 	if (msg.status && *msg.status) {
615 		p2p_dbg(p2p, "Unexpected Status attribute (%d) in GO Negotiation Request",
616 			*msg.status);
617 		if (dev && p2p->go_neg_peer == dev &&
618 		    *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) {
619 			/*
620 			 * This mechanism for using Status attribute in GO
621 			 * Negotiation Request is not compliant with the P2P
622 			 * specification, but some deployed devices use it to
623 			 * indicate rejection of GO Negotiation in a case where
624 			 * they have sent out GO Negotiation Response with
625 			 * status 1. The P2P specification explicitly disallows
626 			 * this. To avoid unnecessary interoperability issues
627 			 * and extra frames, mark the pending negotiation as
628 			 * failed and do not reply to this GO Negotiation
629 			 * Request frame.
630 			 */
631 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
632 			p2p_go_neg_failed(p2p, *msg.status);
633 			p2p_parse_free(&msg);
634 			return;
635 		}
636 		goto fail;
637 	}
638 
639 	if (dev == NULL)
640 		dev = p2p_add_dev_from_go_neg_req(p2p, sa, &msg);
641 	else if ((dev->flags & P2P_DEV_PROBE_REQ_ONLY) ||
642 		  !(dev->flags & P2P_DEV_REPORTED))
643 		p2p_add_dev_info(p2p, sa, dev, &msg);
644 	else if (!dev->listen_freq && !dev->oper_freq) {
645 		/*
646 		 * This may happen if the peer entry was added based on PD
647 		 * Request and no Probe Request/Response frame has been received
648 		 * from this peer (or that information has timed out).
649 		 */
650 		p2p_dbg(p2p, "Update peer " MACSTR
651 			" based on GO Neg Req since listen/oper freq not known",
652 			MAC2STR(dev->info.p2p_device_addr));
653 		p2p_add_dev_info(p2p, sa, dev, &msg);
654 	}
655 
656 	if (p2p->go_neg_peer && p2p->go_neg_peer == dev)
657 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
658 
659 	if (dev && dev->flags & P2P_DEV_USER_REJECTED) {
660 		p2p_dbg(p2p, "User has rejected this peer");
661 		status = P2P_SC_FAIL_REJECTED_BY_USER;
662 	} else if (dev == NULL ||
663 		   (dev->wps_method == WPS_NOT_READY &&
664 		    (p2p->authorized_oob_dev_pw_id == 0 ||
665 		     p2p->authorized_oob_dev_pw_id !=
666 		     msg.dev_password_id))) {
667 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
668 			MAC2STR(sa));
669 		status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
670 		p2p->cfg->go_neg_req_rx(p2p->cfg->cb_ctx, sa,
671 					msg.dev_password_id,
672 					msg.go_intent ? (*msg.go_intent >> 1) :
673 					0);
674 	} else if (p2p->go_neg_peer && p2p->go_neg_peer != dev) {
675 		p2p_dbg(p2p, "Already in Group Formation with another peer");
676 		status = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
677 	} else {
678 		int go;
679 
680 		if (!p2p->go_neg_peer) {
681 			p2p_dbg(p2p, "Starting GO Negotiation with previously authorized peer");
682 			if (!(dev->flags & P2P_DEV_FORCE_FREQ)) {
683 				p2p_dbg(p2p, "Use default channel settings");
684 				p2p->op_reg_class = p2p->cfg->op_reg_class;
685 				p2p->op_channel = p2p->cfg->op_channel;
686 				os_memcpy(&p2p->channels, &p2p->cfg->channels,
687 					  sizeof(struct p2p_channels));
688 			} else {
689 				p2p_dbg(p2p, "Use previously configured forced channel settings");
690 			}
691 		}
692 
693 		dev->flags &= ~P2P_DEV_NOT_YET_READY;
694 
695 		if (!msg.go_intent) {
696 			p2p_dbg(p2p, "No GO Intent attribute received");
697 			goto fail;
698 		}
699 		if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
700 			p2p_dbg(p2p, "Invalid GO Intent value (%u) received",
701 				*msg.go_intent >> 1);
702 			goto fail;
703 		}
704 
705 		if (dev->go_neg_req_sent &&
706 		    os_memcmp(sa, p2p->cfg->dev_addr, ETH_ALEN) > 0) {
707 			p2p_dbg(p2p, "Do not reply since peer has higher address and GO Neg Request already sent");
708 			p2p_parse_free(&msg);
709 			return;
710 		}
711 
712 		go = p2p_go_det(p2p->go_intent, *msg.go_intent);
713 		if (go < 0) {
714 			p2p_dbg(p2p, "Incompatible GO Intent");
715 			status = P2P_SC_FAIL_BOTH_GO_INTENT_15;
716 			goto fail;
717 		}
718 
719 		if (p2p_peer_channels(p2p, dev, msg.channel_list,
720 				      msg.channel_list_len) < 0) {
721 			p2p_dbg(p2p, "No common channels found");
722 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
723 			goto fail;
724 		}
725 
726 		switch (msg.dev_password_id) {
727 		case DEV_PW_REGISTRAR_SPECIFIED:
728 			p2p_dbg(p2p, "PIN from peer Display");
729 			if (dev->wps_method != WPS_PIN_KEYPAD) {
730 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
731 					p2p_wps_method_str(dev->wps_method));
732 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
733 				goto fail;
734 			}
735 			break;
736 		case DEV_PW_USER_SPECIFIED:
737 			p2p_dbg(p2p, "Peer entered PIN on Keypad");
738 			if (dev->wps_method != WPS_PIN_DISPLAY) {
739 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
740 					p2p_wps_method_str(dev->wps_method));
741 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
742 				goto fail;
743 			}
744 			break;
745 		case DEV_PW_PUSHBUTTON:
746 			p2p_dbg(p2p, "Peer using pushbutton");
747 			if (dev->wps_method != WPS_PBC) {
748 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
749 					p2p_wps_method_str(dev->wps_method));
750 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
751 				goto fail;
752 			}
753 			break;
754 		case DEV_PW_P2PS_DEFAULT:
755 			p2p_dbg(p2p, "Peer using P2PS pin");
756 			if (dev->wps_method != WPS_P2PS) {
757 				p2p_dbg(p2p,
758 					"We have wps_method=%s -> incompatible",
759 					p2p_wps_method_str(dev->wps_method));
760 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
761 				goto fail;
762 			}
763 			break;
764 		default:
765 			if (msg.dev_password_id &&
766 			    msg.dev_password_id == dev->oob_pw_id) {
767 				p2p_dbg(p2p, "Peer using NFC");
768 				if (dev->wps_method != WPS_NFC) {
769 					p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
770 						p2p_wps_method_str(
771 							dev->wps_method));
772 					status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
773 					goto fail;
774 				}
775 				break;
776 			}
777 #ifdef CONFIG_WPS_NFC
778 			if (p2p->authorized_oob_dev_pw_id &&
779 			    msg.dev_password_id ==
780 			    p2p->authorized_oob_dev_pw_id) {
781 				p2p_dbg(p2p, "Using static handover with our device password from NFC Tag");
782 				dev->wps_method = WPS_NFC;
783 				dev->oob_pw_id = p2p->authorized_oob_dev_pw_id;
784 				break;
785 			}
786 #endif /* CONFIG_WPS_NFC */
787 			p2p_dbg(p2p, "Unsupported Device Password ID %d",
788 				msg.dev_password_id);
789 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
790 			goto fail;
791 		}
792 
793 		if (go && p2p_go_select_channel(p2p, dev, &status) < 0)
794 			goto fail;
795 
796 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
797 		dev->oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
798 						     msg.operating_channel[4]);
799 		p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
800 			dev->oper_freq);
801 
802 		if (msg.config_timeout) {
803 			dev->go_timeout = msg.config_timeout[0];
804 			dev->client_timeout = msg.config_timeout[1];
805 		}
806 
807 		p2p_dbg(p2p, "GO Negotiation with " MACSTR, MAC2STR(sa));
808 		if (p2p->state != P2P_IDLE)
809 			p2p_stop_find_for_freq(p2p, rx_freq);
810 		p2p_set_state(p2p, P2P_GO_NEG);
811 		p2p_clear_timeout(p2p);
812 		dev->dialog_token = msg.dialog_token;
813 		os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
814 		p2p->go_neg_peer = dev;
815 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
816 		status = P2P_SC_SUCCESS;
817 	}
818 
819 fail:
820 	if (dev)
821 		dev->status = status;
822 	resp = p2p_build_go_neg_resp(p2p, dev, msg.dialog_token, status,
823 				     !tie_breaker);
824 	p2p_parse_free(&msg);
825 	if (resp == NULL)
826 		return;
827 	p2p_dbg(p2p, "Sending GO Negotiation Response");
828 	if (rx_freq > 0)
829 		freq = rx_freq;
830 	else
831 		freq = p2p_channel_to_freq(p2p->cfg->reg_class,
832 					   p2p->cfg->channel);
833 	if (freq < 0) {
834 		p2p_dbg(p2p, "Unknown regulatory class/channel");
835 		wpabuf_free(resp);
836 		return;
837 	}
838 	if (status == P2P_SC_SUCCESS) {
839 		p2p->pending_action_state = P2P_PENDING_GO_NEG_RESPONSE;
840 		dev->flags |= P2P_DEV_WAIT_GO_NEG_CONFIRM;
841 		if (os_memcmp(sa, p2p->cfg->dev_addr, ETH_ALEN) < 0) {
842 			/*
843 			 * Peer has smaller address, so the GO Negotiation
844 			 * Response from us is expected to complete
845 			 * negotiation. Ignore a GO Negotiation Response from
846 			 * the peer if it happens to be received after this
847 			 * point due to a race condition in GO Negotiation
848 			 * Request transmission and processing.
849 			 */
850 			dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
851 		}
852 	} else
853 		p2p->pending_action_state =
854 			P2P_PENDING_GO_NEG_RESPONSE_FAILURE;
855 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
856 			    p2p->cfg->dev_addr,
857 			    wpabuf_head(resp), wpabuf_len(resp), 500) < 0) {
858 		p2p_dbg(p2p, "Failed to send Action frame");
859 	}
860 
861 	wpabuf_free(resp);
862 }
863 
864 
p2p_build_go_neg_conf(struct p2p_data * p2p,struct p2p_device * peer,u8 dialog_token,u8 status,const u8 * resp_chan,int go)865 static struct wpabuf * p2p_build_go_neg_conf(struct p2p_data *p2p,
866 					     struct p2p_device *peer,
867 					     u8 dialog_token, u8 status,
868 					     const u8 *resp_chan, int go)
869 {
870 	struct wpabuf *buf;
871 	u8 *len;
872 	struct p2p_channels res;
873 	u8 group_capab;
874 	size_t extra = 0;
875 
876 	p2p_dbg(p2p, "Building GO Negotiation Confirm");
877 
878 #ifdef CONFIG_WIFI_DISPLAY
879 	if (p2p->wfd_ie_go_neg)
880 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
881 #endif /* CONFIG_WIFI_DISPLAY */
882 
883 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF])
884 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF]);
885 
886 	buf = wpabuf_alloc(1000 + extra);
887 	if (buf == NULL)
888 		return NULL;
889 
890 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_CONF, dialog_token);
891 
892 	len = p2p_buf_add_ie_hdr(buf);
893 	p2p_buf_add_status(buf, status);
894 	group_capab = 0;
895 	if (peer->go_state == LOCAL_GO) {
896 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
897 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
898 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
899 				group_capab |=
900 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
901 		}
902 		if (p2p->cross_connect)
903 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
904 		if (p2p->cfg->p2p_intra_bss)
905 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
906 	}
907 	p2p_buf_add_capability(buf, p2p->dev_capab &
908 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
909 			       group_capab);
910 	if (go || resp_chan == NULL)
911 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
912 					      p2p->op_reg_class,
913 					      p2p->op_channel);
914 	else
915 		p2p_buf_add_operating_channel(buf, (const char *) resp_chan,
916 					      resp_chan[3], resp_chan[4]);
917 	p2p_channels_intersect(&p2p->channels, &peer->channels, &res);
918 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
919 	if (go) {
920 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
921 				     p2p->ssid_len);
922 	}
923 	p2p_buf_update_ie_hdr(buf, len);
924 
925 #ifdef CONFIG_WIFI_DISPLAY
926 	if (p2p->wfd_ie_go_neg)
927 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
928 #endif /* CONFIG_WIFI_DISPLAY */
929 
930 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF])
931 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF]);
932 
933 	return buf;
934 }
935 
936 
p2p_process_go_neg_resp(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)937 void p2p_process_go_neg_resp(struct p2p_data *p2p, const u8 *sa,
938 			     const u8 *data, size_t len, int rx_freq)
939 {
940 	struct p2p_device *dev;
941 	int go = -1;
942 	struct p2p_message msg;
943 	u8 status = P2P_SC_SUCCESS;
944 	int freq;
945 
946 	p2p_dbg(p2p, "Received GO Negotiation Response from " MACSTR
947 		" (freq=%d)", MAC2STR(sa), rx_freq);
948 	dev = p2p_get_device(p2p, sa);
949 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
950 	    dev != p2p->go_neg_peer) {
951 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
952 			MAC2STR(sa));
953 		return;
954 	}
955 
956 	if (p2p_parse(data, len, &msg))
957 		return;
958 
959 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE)) {
960 		p2p_dbg(p2p, "Was not expecting GO Negotiation Response - ignore");
961 		p2p_parse_free(&msg);
962 		return;
963 	}
964 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
965 
966 	if (msg.dialog_token != dev->dialog_token) {
967 		p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
968 			msg.dialog_token, dev->dialog_token);
969 		p2p_parse_free(&msg);
970 		return;
971 	}
972 
973 	if (!msg.status) {
974 		p2p_dbg(p2p, "No Status attribute received");
975 		status = P2P_SC_FAIL_INVALID_PARAMS;
976 		goto fail;
977 	}
978 	if (*msg.status) {
979 		p2p_dbg(p2p, "GO Negotiation rejected: status %d", *msg.status);
980 		dev->go_neg_req_sent = 0;
981 		if (*msg.status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
982 			p2p_dbg(p2p, "Wait for the peer to become ready for GO Negotiation");
983 			dev->flags |= P2P_DEV_NOT_YET_READY;
984 			eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p,
985 					     NULL);
986 			eloop_register_timeout(120, 0, p2p_go_neg_wait_timeout,
987 					       p2p, NULL);
988 			if (p2p->state == P2P_CONNECT_LISTEN)
989 				p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
990 			else
991 				p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
992 			p2p_set_timeout(p2p, 0, 0);
993 		} else {
994 			p2p_dbg(p2p, "Stop GO Negotiation attempt");
995 			p2p_go_neg_failed(p2p, *msg.status);
996 		}
997 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
998 		p2p_parse_free(&msg);
999 		return;
1000 	}
1001 
1002 	if (!msg.capability) {
1003 		p2p_dbg(p2p, "Mandatory Capability attribute missing from GO Negotiation Response");
1004 #ifdef CONFIG_P2P_STRICT
1005 		status = P2P_SC_FAIL_INVALID_PARAMS;
1006 		goto fail;
1007 #endif /* CONFIG_P2P_STRICT */
1008 	}
1009 
1010 	if (!msg.p2p_device_info) {
1011 		p2p_dbg(p2p, "Mandatory P2P Device Info attribute missing from GO Negotiation Response");
1012 #ifdef CONFIG_P2P_STRICT
1013 		status = P2P_SC_FAIL_INVALID_PARAMS;
1014 		goto fail;
1015 #endif /* CONFIG_P2P_STRICT */
1016 	}
1017 
1018 	if (!msg.intended_addr) {
1019 		p2p_dbg(p2p, "No Intended P2P Interface Address attribute received");
1020 		status = P2P_SC_FAIL_INVALID_PARAMS;
1021 		goto fail;
1022 	}
1023 
1024 	if (!msg.go_intent) {
1025 		p2p_dbg(p2p, "No GO Intent attribute received");
1026 		status = P2P_SC_FAIL_INVALID_PARAMS;
1027 		goto fail;
1028 	}
1029 	if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
1030 		p2p_dbg(p2p, "Invalid GO Intent value (%u) received",
1031 			*msg.go_intent >> 1);
1032 		status = P2P_SC_FAIL_INVALID_PARAMS;
1033 		goto fail;
1034 	}
1035 
1036 	go = p2p_go_det(p2p->go_intent, *msg.go_intent);
1037 	if (go < 0) {
1038 		p2p_dbg(p2p, "Incompatible GO Intent");
1039 		status = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
1040 		goto fail;
1041 	}
1042 
1043 	if (!go && msg.group_id) {
1044 		/* Store SSID for Provisioning step */
1045 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
1046 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
1047 	} else if (!go) {
1048 		p2p_dbg(p2p, "Mandatory P2P Group ID attribute missing from GO Negotiation Response");
1049 		p2p->ssid_len = 0;
1050 		status = P2P_SC_FAIL_INVALID_PARAMS;
1051 		goto fail;
1052 	}
1053 
1054 	if (!msg.config_timeout) {
1055 		p2p_dbg(p2p, "Mandatory Configuration Timeout attribute missing from GO Negotiation Response");
1056 #ifdef CONFIG_P2P_STRICT
1057 		status = P2P_SC_FAIL_INVALID_PARAMS;
1058 		goto fail;
1059 #endif /* CONFIG_P2P_STRICT */
1060 	} else {
1061 		dev->go_timeout = msg.config_timeout[0];
1062 		dev->client_timeout = msg.config_timeout[1];
1063 	}
1064 
1065 	if (!msg.operating_channel && !go) {
1066 		/*
1067 		 * Note: P2P Client may omit Operating Channel attribute to
1068 		 * indicate it does not have a preference.
1069 		 */
1070 		p2p_dbg(p2p, "No Operating Channel attribute received");
1071 		status = P2P_SC_FAIL_INVALID_PARAMS;
1072 		goto fail;
1073 	}
1074 	if (!msg.channel_list) {
1075 		p2p_dbg(p2p, "No Channel List attribute received");
1076 		status = P2P_SC_FAIL_INVALID_PARAMS;
1077 		goto fail;
1078 	}
1079 
1080 	if (p2p_peer_channels(p2p, dev, msg.channel_list,
1081 			      msg.channel_list_len) < 0) {
1082 		p2p_dbg(p2p, "No common channels found");
1083 		status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
1084 		goto fail;
1085 	}
1086 
1087 	if (msg.operating_channel) {
1088 		dev->oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
1089 						     msg.operating_channel[4]);
1090 		p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
1091 			dev->oper_freq);
1092 	} else
1093 		dev->oper_freq = 0;
1094 
1095 	switch (msg.dev_password_id) {
1096 	case DEV_PW_REGISTRAR_SPECIFIED:
1097 		p2p_dbg(p2p, "PIN from peer Display");
1098 		if (dev->wps_method != WPS_PIN_KEYPAD) {
1099 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
1100 				p2p_wps_method_str(dev->wps_method));
1101 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1102 			goto fail;
1103 		}
1104 		break;
1105 	case DEV_PW_USER_SPECIFIED:
1106 		p2p_dbg(p2p, "Peer entered PIN on Keypad");
1107 		if (dev->wps_method != WPS_PIN_DISPLAY) {
1108 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
1109 				p2p_wps_method_str(dev->wps_method));
1110 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1111 			goto fail;
1112 		}
1113 		break;
1114 	case DEV_PW_PUSHBUTTON:
1115 		p2p_dbg(p2p, "Peer using pushbutton");
1116 		if (dev->wps_method != WPS_PBC) {
1117 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
1118 				p2p_wps_method_str(dev->wps_method));
1119 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1120 			goto fail;
1121 		}
1122 		break;
1123 	case DEV_PW_P2PS_DEFAULT:
1124 		p2p_dbg(p2p, "P2P: Peer using P2PS default pin");
1125 		if (dev->wps_method != WPS_P2PS) {
1126 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
1127 				p2p_wps_method_str(dev->wps_method));
1128 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1129 			goto fail;
1130 		}
1131 		break;
1132 	default:
1133 		if (msg.dev_password_id &&
1134 		    msg.dev_password_id == dev->oob_pw_id) {
1135 			p2p_dbg(p2p, "Peer using NFC");
1136 			if (dev->wps_method != WPS_NFC) {
1137 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
1138 					p2p_wps_method_str(dev->wps_method));
1139 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1140 				goto fail;
1141 			}
1142 			break;
1143 		}
1144 		p2p_dbg(p2p, "Unsupported Device Password ID %d",
1145 			msg.dev_password_id);
1146 		status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
1147 		goto fail;
1148 	}
1149 
1150 	if (go && p2p_go_select_channel(p2p, dev, &status) < 0)
1151 		goto fail;
1152 
1153 	p2p_set_state(p2p, P2P_GO_NEG);
1154 	p2p_clear_timeout(p2p);
1155 
1156 	p2p_dbg(p2p, "GO Negotiation with " MACSTR, MAC2STR(sa));
1157 	os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
1158 
1159 fail:
1160 	/* Store GO Negotiation Confirmation to allow retransmission */
1161 	wpabuf_free(dev->go_neg_conf);
1162 	dev->go_neg_conf = p2p_build_go_neg_conf(p2p, dev, msg.dialog_token,
1163 						 status, msg.operating_channel,
1164 						 go);
1165 	p2p_parse_free(&msg);
1166 	if (dev->go_neg_conf == NULL)
1167 		return;
1168 	p2p_dbg(p2p, "Sending GO Negotiation Confirm");
1169 	if (status == P2P_SC_SUCCESS) {
1170 		p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
1171 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
1172 	} else
1173 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
1174 	if (rx_freq > 0)
1175 		freq = rx_freq;
1176 	else
1177 		freq = dev->listen_freq;
1178 
1179 	dev->go_neg_conf_freq = freq;
1180 	dev->go_neg_conf_sent = 0;
1181 
1182 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr, sa,
1183 			    wpabuf_head(dev->go_neg_conf),
1184 			    wpabuf_len(dev->go_neg_conf), 200) < 0) {
1185 		p2p_dbg(p2p, "Failed to send Action frame");
1186 		p2p_go_neg_failed(p2p, -1);
1187 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
1188 	} else
1189 		dev->go_neg_conf_sent++;
1190 	if (status != P2P_SC_SUCCESS) {
1191 		p2p_dbg(p2p, "GO Negotiation failed");
1192 		p2p_go_neg_failed(p2p, status);
1193 	}
1194 }
1195 
1196 
p2p_process_go_neg_conf(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len)1197 void p2p_process_go_neg_conf(struct p2p_data *p2p, const u8 *sa,
1198 			     const u8 *data, size_t len)
1199 {
1200 	struct p2p_device *dev;
1201 	struct p2p_message msg;
1202 
1203 	p2p_dbg(p2p, "Received GO Negotiation Confirm from " MACSTR,
1204 		MAC2STR(sa));
1205 	dev = p2p_get_device(p2p, sa);
1206 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
1207 	    dev != p2p->go_neg_peer) {
1208 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
1209 			MAC2STR(sa));
1210 		return;
1211 	}
1212 
1213 	if (p2p->pending_action_state == P2P_PENDING_GO_NEG_RESPONSE) {
1214 		p2p_dbg(p2p, "Stopped waiting for TX status on GO Negotiation Response since we already received Confirmation");
1215 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
1216 	}
1217 
1218 	if (p2p_parse(data, len, &msg))
1219 		return;
1220 
1221 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
1222 		p2p_dbg(p2p, "Was not expecting GO Negotiation Confirm - ignore");
1223 		p2p_parse_free(&msg);
1224 		return;
1225 	}
1226 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1227 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
1228 
1229 	if (msg.dialog_token != dev->dialog_token) {
1230 		p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
1231 			msg.dialog_token, dev->dialog_token);
1232 		p2p_parse_free(&msg);
1233 		return;
1234 	}
1235 
1236 	if (!msg.status) {
1237 		p2p_dbg(p2p, "No Status attribute received");
1238 		p2p_parse_free(&msg);
1239 		return;
1240 	}
1241 	if (*msg.status) {
1242 		p2p_dbg(p2p, "GO Negotiation rejected: status %d", *msg.status);
1243 		p2p_go_neg_failed(p2p, *msg.status);
1244 		p2p_parse_free(&msg);
1245 		return;
1246 	}
1247 
1248 	if (dev->go_state == REMOTE_GO && msg.group_id) {
1249 		/* Store SSID for Provisioning step */
1250 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
1251 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
1252 	} else if (dev->go_state == REMOTE_GO) {
1253 		p2p_dbg(p2p, "Mandatory P2P Group ID attribute missing from GO Negotiation Confirmation");
1254 		p2p->ssid_len = 0;
1255 		p2p_go_neg_failed(p2p, P2P_SC_FAIL_INVALID_PARAMS);
1256 		p2p_parse_free(&msg);
1257 		return;
1258 	}
1259 
1260 	if (!msg.operating_channel) {
1261 		p2p_dbg(p2p, "Mandatory Operating Channel attribute missing from GO Negotiation Confirmation");
1262 #ifdef CONFIG_P2P_STRICT
1263 		p2p_parse_free(&msg);
1264 		return;
1265 #endif /* CONFIG_P2P_STRICT */
1266 	} else if (dev->go_state == REMOTE_GO) {
1267 		int oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
1268 						    msg.operating_channel[4]);
1269 		if (oper_freq != dev->oper_freq) {
1270 			p2p_dbg(p2p, "Updated peer (GO) operating channel preference from %d MHz to %d MHz",
1271 				dev->oper_freq, oper_freq);
1272 			dev->oper_freq = oper_freq;
1273 		}
1274 	}
1275 
1276 	if (!msg.channel_list) {
1277 		p2p_dbg(p2p, "Mandatory Operating Channel attribute missing from GO Negotiation Confirmation");
1278 #ifdef CONFIG_P2P_STRICT
1279 		p2p_parse_free(&msg);
1280 		return;
1281 #endif /* CONFIG_P2P_STRICT */
1282 	}
1283 
1284 	p2p_parse_free(&msg);
1285 
1286 	if (dev->go_state == UNKNOWN_GO) {
1287 		/*
1288 		 * This should not happen since GO negotiation has already
1289 		 * been completed.
1290 		 */
1291 		p2p_dbg(p2p, "Unexpected GO Neg state - do not know which end becomes GO");
1292 		return;
1293 	}
1294 
1295 	/*
1296 	 * The peer could have missed our ctrl::ack frame for GO Negotiation
1297 	 * Confirm and continue retransmitting the frame. To reduce the
1298 	 * likelihood of the peer not getting successful TX status for the
1299 	 * GO Negotiation Confirm frame, wait a short time here before starting
1300 	 * the group so that we will remain on the current channel to
1301 	 * acknowledge any possible retransmission from the peer.
1302 	 */
1303 	p2p_dbg(p2p, "20 ms wait on current channel before starting group");
1304 	os_sleep(0, 20000);
1305 
1306 	p2p_go_complete(p2p, dev);
1307 }
1308