2010-07-18 23:30:25 +02:00
|
|
|
/*
|
|
|
|
* wpa_supplicant - P2P
|
|
|
|
* Copyright (c) 2009-2010, Atheros Communications
|
2014-01-03 10:57:57 +01:00
|
|
|
* Copyright (c) 2010-2014, Jouni Malinen <j@w1.fi>
|
2010-07-18 23:30:25 +02:00
|
|
|
*
|
2012-02-11 15:31:36 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2010-07-18 23:30:25 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
|
|
|
|
|
|
|
#include "common.h"
|
|
|
|
#include "eloop.h"
|
|
|
|
#include "common/ieee802_11_common.h"
|
|
|
|
#include "common/ieee802_11_defs.h"
|
|
|
|
#include "common/wpa_ctrl.h"
|
|
|
|
#include "wps/wps_i.h"
|
|
|
|
#include "p2p/p2p.h"
|
|
|
|
#include "ap/hostapd.h"
|
2011-11-14 15:26:45 +01:00
|
|
|
#include "ap/ap_config.h"
|
2013-09-01 16:37:22 +02:00
|
|
|
#include "ap/sta_info.h"
|
|
|
|
#include "ap/ap_drv_ops.h"
|
2013-09-08 17:08:26 +02:00
|
|
|
#include "ap/wps_hostapd.h"
|
2010-07-09 02:14:24 +02:00
|
|
|
#include "ap/p2p_hostapd.h"
|
2015-03-05 02:31:25 +01:00
|
|
|
#include "ap/dfs.h"
|
2011-06-27 18:02:24 +02:00
|
|
|
#include "eapol_supp/eapol_supp_sm.h"
|
|
|
|
#include "rsn_supp/wpa.h"
|
2010-07-18 23:30:25 +02:00
|
|
|
#include "wpa_supplicant_i.h"
|
|
|
|
#include "driver_i.h"
|
|
|
|
#include "ap.h"
|
|
|
|
#include "config_ssid.h"
|
|
|
|
#include "config.h"
|
|
|
|
#include "notify.h"
|
|
|
|
#include "scan.h"
|
|
|
|
#include "bss.h"
|
2011-09-29 18:22:08 +02:00
|
|
|
#include "offchannel.h"
|
2010-07-18 23:30:25 +02:00
|
|
|
#include "wps_supplicant.h"
|
|
|
|
#include "p2p_supplicant.h"
|
2013-11-25 23:56:38 +01:00
|
|
|
#include "wifi_display.h"
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
|
2010-11-15 15:15:38 +01:00
|
|
|
/*
|
|
|
|
* How many times to try to scan to find the GO before giving up on join
|
|
|
|
* request.
|
|
|
|
*/
|
|
|
|
#define P2P_MAX_JOIN_SCAN_ATTEMPTS 10
|
|
|
|
|
2012-06-06 14:46:05 +02:00
|
|
|
#define P2P_AUTO_PD_SCAN_ATTEMPTS 5
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/**
|
|
|
|
* Defines time interval in seconds when a GO needs to evacuate a frequency that
|
|
|
|
* it is currently using, but is no longer valid for P2P use cases.
|
|
|
|
*/
|
|
|
|
#define P2P_GO_FREQ_CHANGE_TIME 5
|
|
|
|
|
2015-09-08 11:46:16 +02:00
|
|
|
/**
|
|
|
|
* Defines CSA parameters which are used when GO evacuates the no longer valid
|
|
|
|
* channel (and if the driver supports channel switch).
|
|
|
|
*/
|
|
|
|
#define P2P_GO_CSA_COUNT 7
|
|
|
|
#define P2P_GO_CSA_BLOCK_TX 0
|
|
|
|
|
2011-12-18 21:21:22 +01:00
|
|
|
#ifndef P2P_MAX_CLIENT_IDLE
|
|
|
|
/*
|
|
|
|
* How many seconds to try to reconnect to the GO when connection in P2P client
|
|
|
|
* role has been lost.
|
|
|
|
*/
|
|
|
|
#define P2P_MAX_CLIENT_IDLE 10
|
|
|
|
#endif /* P2P_MAX_CLIENT_IDLE */
|
|
|
|
|
2012-04-13 16:01:15 +02:00
|
|
|
#ifndef P2P_MAX_INITIAL_CONN_WAIT
|
|
|
|
/*
|
|
|
|
* How many seconds to wait for initial 4-way handshake to get completed after
|
2014-03-11 10:54:17 +01:00
|
|
|
* WPS provisioning step or after the re-invocation of a persistent group on a
|
|
|
|
* P2P Client.
|
2012-04-13 16:01:15 +02:00
|
|
|
*/
|
|
|
|
#define P2P_MAX_INITIAL_CONN_WAIT 10
|
|
|
|
#endif /* P2P_MAX_INITIAL_CONN_WAIT */
|
|
|
|
|
2013-08-27 11:23:10 +02:00
|
|
|
#ifndef P2P_MAX_INITIAL_CONN_WAIT_GO
|
|
|
|
/*
|
|
|
|
* How many seconds to wait for initial 4-way handshake to get completed after
|
|
|
|
* WPS provisioning step on the GO. This controls the extra time the P2P
|
|
|
|
* operation is considered to be in progress (e.g., to delay other scans) after
|
|
|
|
* WPS provisioning has been completed on the GO during group formation.
|
|
|
|
*/
|
|
|
|
#define P2P_MAX_INITIAL_CONN_WAIT_GO 10
|
|
|
|
#endif /* P2P_MAX_INITIAL_CONN_WAIT_GO */
|
|
|
|
|
2013-09-26 20:24:09 +02:00
|
|
|
#ifndef P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE
|
|
|
|
/*
|
|
|
|
* How many seconds to wait for initial 4-way handshake to get completed after
|
|
|
|
* re-invocation of a persistent group on the GO when the client is expected
|
|
|
|
* to connect automatically (no user interaction).
|
|
|
|
*/
|
|
|
|
#define P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE 15
|
|
|
|
#endif /* P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE */
|
|
|
|
|
2013-06-30 09:19:31 +02:00
|
|
|
#define P2P_MGMT_DEVICE_PREFIX "p2p-dev-"
|
|
|
|
|
2015-07-27 21:24:26 +02:00
|
|
|
/*
|
|
|
|
* How many seconds to wait to re-attempt to move GOs, in case previous attempt
|
|
|
|
* was not possible.
|
|
|
|
*/
|
|
|
|
#define P2P_RECONSIDER_GO_MOVE_DELAY 30
|
|
|
|
|
2012-08-11 11:41:31 +02:00
|
|
|
enum p2p_group_removal_reason {
|
|
|
|
P2P_GROUP_REMOVAL_UNKNOWN,
|
|
|
|
P2P_GROUP_REMOVAL_SILENT,
|
|
|
|
P2P_GROUP_REMOVAL_FORMATION_FAILED,
|
|
|
|
P2P_GROUP_REMOVAL_REQUESTED,
|
|
|
|
P2P_GROUP_REMOVAL_IDLE_TIMEOUT,
|
|
|
|
P2P_GROUP_REMOVAL_UNAVAILABLE,
|
2013-09-01 20:28:16 +02:00
|
|
|
P2P_GROUP_REMOVAL_GO_ENDING_SESSION,
|
2013-11-26 14:10:16 +01:00
|
|
|
P2P_GROUP_REMOVAL_PSK_FAILURE,
|
2015-07-27 21:24:19 +02:00
|
|
|
P2P_GROUP_REMOVAL_FREQ_CONFLICT,
|
|
|
|
P2P_GROUP_REMOVAL_GO_LEAVE_CHANNEL
|
2012-08-11 11:41:31 +02:00
|
|
|
};
|
|
|
|
|
2010-11-15 15:15:38 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static void wpas_p2p_long_listen_timeout(void *eloop_ctx, void *timeout_ctx);
|
|
|
|
static struct wpa_supplicant *
|
|
|
|
wpas_p2p_get_group_iface(struct wpa_supplicant *wpa_s, int addr_allocated,
|
|
|
|
int go);
|
2013-09-08 00:44:29 +02:00
|
|
|
static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
const u8 *ssid, size_t ssid_len);
|
2015-10-08 11:35:58 +02:00
|
|
|
static int wpas_p2p_setup_freqs(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
int *force_freq, int *pref_freq, int go,
|
|
|
|
unsigned int *pref_freq_list,
|
|
|
|
unsigned int *num_pref_freq);
|
2014-01-13 20:39:06 +01:00
|
|
|
static void wpas_p2p_join_scan_req(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
const u8 *ssid, size_t ssid_len);
|
2010-06-27 01:20:57 +02:00
|
|
|
static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx);
|
2010-06-27 09:11:42 +02:00
|
|
|
static int wpas_p2p_join(struct wpa_supplicant *wpa_s, const u8 *iface_addr,
|
2012-04-13 15:04:36 +02:00
|
|
|
const u8 *dev_addr, enum p2p_wps_method wps_method,
|
2013-09-08 00:44:29 +02:00
|
|
|
int auto_join, int freq,
|
|
|
|
const u8 *ssid, size_t ssid_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
static int wpas_p2p_create_iface(struct wpa_supplicant *wpa_s);
|
2010-07-10 19:19:34 +02:00
|
|
|
static void wpas_p2p_cross_connect_setup(struct wpa_supplicant *wpa_s);
|
2010-10-25 17:24:15 +02:00
|
|
|
static void wpas_p2p_group_idle_timeout(void *eloop_ctx, void *timeout_ctx);
|
|
|
|
static void wpas_p2p_set_group_idle_timeout(struct wpa_supplicant *wpa_s);
|
2013-02-10 22:36:52 +01:00
|
|
|
static void wpas_p2p_group_formation_timeout(void *eloop_ctx,
|
|
|
|
void *timeout_ctx);
|
2013-11-26 14:10:16 +01:00
|
|
|
static void wpas_p2p_group_freq_conflict(void *eloop_ctx, void *timeout_ctx);
|
2015-02-08 10:38:56 +01:00
|
|
|
static int wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
|
|
|
|
int group_added);
|
2014-08-01 18:31:07 +02:00
|
|
|
static void wpas_p2p_stop_find_oper(struct wpa_supplicant *wpa_s);
|
2014-02-13 10:24:00 +01:00
|
|
|
static void wpas_stop_listen(void *ctx);
|
2014-05-12 18:14:55 +02:00
|
|
|
static void wpas_p2p_psk_failure_removal(void *eloop_ctx, void *timeout_ctx);
|
2014-06-15 18:31:53 +02:00
|
|
|
static void wpas_p2p_group_deinit(struct wpa_supplicant *wpa_s);
|
2014-12-10 15:25:18 +01:00
|
|
|
static int wpas_p2p_add_group_interface(struct wpa_supplicant *wpa_s,
|
|
|
|
enum wpa_driver_if_type type);
|
2015-06-15 22:34:11 +02:00
|
|
|
static void wpas_p2p_group_formation_failed(struct wpa_supplicant *wpa_s,
|
|
|
|
int already_deleted);
|
2015-07-27 21:24:25 +02:00
|
|
|
static void wpas_p2p_optimize_listen_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs,
|
|
|
|
unsigned int num);
|
2015-07-27 21:24:19 +02:00
|
|
|
static void wpas_p2p_move_go(void *eloop_ctx, void *timeout_ctx);
|
2015-07-27 21:24:21 +02:00
|
|
|
static int wpas_p2p_go_is_peer_freq(struct wpa_supplicant *wpa_s, int freq);
|
2015-07-27 21:24:27 +02:00
|
|
|
static void
|
|
|
|
wpas_p2p_consider_moving_gos(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs, unsigned int num,
|
|
|
|
enum wpas_p2p_channel_update_trig trig);
|
2015-07-27 21:24:26 +02:00
|
|
|
static void wpas_p2p_reconsider_moving_go(void *eloop_ctx, void *timeout_ctx);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
/*
|
|
|
|
* Get the number of concurrent channels that the HW can operate, but that are
|
|
|
|
* currently not in use by any of the wpa_supplicant interfaces.
|
|
|
|
*/
|
|
|
|
static int wpas_p2p_num_unused_channels(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
int *freqs;
|
2013-11-05 10:07:51 +01:00
|
|
|
int num, unused;
|
2013-07-21 19:38:53 +02:00
|
|
|
|
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent, sizeof(int));
|
|
|
|
if (!freqs)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
num = get_shared_radio_freqs(wpa_s, freqs,
|
|
|
|
wpa_s->num_multichan_concurrent);
|
|
|
|
os_free(freqs);
|
|
|
|
|
2013-11-05 10:07:51 +01:00
|
|
|
unused = wpa_s->num_multichan_concurrent - num;
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused);
|
|
|
|
return unused;
|
2013-07-21 19:38:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get the frequencies that are currently in use by one or more of the virtual
|
|
|
|
* interfaces, and that are also valid for P2P operation.
|
|
|
|
*/
|
2014-05-19 09:05:35 +02:00
|
|
|
static unsigned int
|
|
|
|
wpas_p2p_valid_oper_freqs(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *p2p_freqs,
|
|
|
|
unsigned int len)
|
2013-07-21 19:38:53 +02:00
|
|
|
{
|
2014-05-19 09:05:35 +02:00
|
|
|
struct wpa_used_freq_data *freqs;
|
2013-07-21 19:38:53 +02:00
|
|
|
unsigned int num, i, j;
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent,
|
|
|
|
sizeof(struct wpa_used_freq_data));
|
2013-07-21 19:38:53 +02:00
|
|
|
if (!freqs)
|
2014-05-19 09:05:35 +02:00
|
|
|
return 0;
|
2013-07-21 19:38:53 +02:00
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
num = get_shared_radio_freqs_data(wpa_s, freqs,
|
|
|
|
wpa_s->num_multichan_concurrent);
|
2013-07-21 19:38:53 +02:00
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
os_memset(p2p_freqs, 0, sizeof(struct wpa_used_freq_data) * len);
|
2013-07-21 19:38:53 +02:00
|
|
|
|
|
|
|
for (i = 0, j = 0; i < num && j < len; i++) {
|
2014-05-19 09:05:35 +02:00
|
|
|
if (p2p_supported_freq(wpa_s->global->p2p, freqs[i].freq))
|
2013-07-21 19:38:53 +02:00
|
|
|
p2p_freqs[j++] = freqs[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(freqs);
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
dump_freq_data(wpa_s, "valid for P2P", p2p_freqs, j);
|
2013-11-05 10:07:51 +01:00
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
return j;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-14 15:22:31 +01:00
|
|
|
static void wpas_p2p_set_own_freq_preference(struct wpa_supplicant *wpa_s,
|
|
|
|
int freq)
|
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
2015-05-12 16:39:59 +02:00
|
|
|
|
|
|
|
/* Use the wpa_s used to control the P2P Device operation */
|
|
|
|
wpa_s = wpa_s->global->p2p_init_wpa_s;
|
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_ignore_shared_freq &&
|
2013-11-19 11:29:25 +01:00
|
|
|
freq > 0 && wpa_s->num_multichan_concurrent > 1 &&
|
|
|
|
wpas_p2p_num_unused_channels(wpa_s) > 0) {
|
2013-11-19 11:15:45 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration",
|
|
|
|
freq);
|
2013-03-14 15:32:35 +01:00
|
|
|
freq = 0;
|
2013-11-19 11:15:45 +01:00
|
|
|
}
|
2013-03-14 15:22:31 +01:00
|
|
|
p2p_set_own_freq_preference(wpa_s->global->p2p, freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-12-08 11:53:56 +01:00
|
|
|
static void wpas_p2p_scan_res_handled(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
unsigned int delay = wpas_p2p_search_delay(wpa_s);
|
|
|
|
|
|
|
|
/* In case of concurrent P2P and external scans, delay P2P search. */
|
2021-01-26 23:26:13 +01:00
|
|
|
if (external_scan_running(wpa_s->radio)) {
|
2020-12-08 11:53:56 +01:00
|
|
|
delay = wpa_s->conf->p2p_search_delay;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Delay next P2P search by %d ms to let externally triggered scan complete",
|
|
|
|
delay);
|
|
|
|
}
|
|
|
|
|
|
|
|
p2p_scan_res_handled(wpa_s->global->p2p, delay);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static void wpas_p2p_scan_res_handler(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_scan_results *scan_res)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
2014-01-03 10:57:57 +01:00
|
|
|
if (wpa_s->p2p_scan_work) {
|
|
|
|
struct wpa_radio_work *work = wpa_s->p2p_scan_work;
|
|
|
|
wpa_s->p2p_scan_work = NULL;
|
|
|
|
radio_work_done(work);
|
|
|
|
}
|
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)",
|
|
|
|
(int) scan_res->num);
|
|
|
|
|
|
|
|
for (i = 0; i < scan_res->num; i++) {
|
|
|
|
struct wpa_scan_res *bss = scan_res->res[i];
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime time_tmp_age, entry_ts;
|
2013-10-14 18:25:28 +02:00
|
|
|
const u8 *ies;
|
|
|
|
size_t ies_len;
|
|
|
|
|
2013-02-12 18:14:32 +01:00
|
|
|
time_tmp_age.sec = bss->age / 1000;
|
|
|
|
time_tmp_age.usec = (bss->age % 1000) * 1000;
|
2013-12-16 21:08:28 +01:00
|
|
|
os_reltime_sub(&scan_res->fetch_time, &time_tmp_age, &entry_ts);
|
2013-10-14 18:25:28 +02:00
|
|
|
|
|
|
|
ies = (const u8 *) (bss + 1);
|
|
|
|
ies_len = bss->ie_len;
|
|
|
|
if (bss->beacon_ie_len > 0 &&
|
|
|
|
!wpa_scan_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE) &&
|
|
|
|
wpa_scan_get_vendor_ie_beacon(bss, P2P_IE_VENDOR_TYPE)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for "
|
|
|
|
MACSTR, MAC2STR(bss->bssid));
|
|
|
|
ies = ies + ies_len;
|
|
|
|
ies_len = bss->beacon_ie_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (p2p_scan_res_handler(wpa_s->global->p2p, bss->bssid,
|
2013-02-12 18:14:32 +01:00
|
|
|
bss->freq, &entry_ts, bss->level,
|
2013-10-14 18:25:28 +02:00
|
|
|
ies, ies_len) > 0)
|
2010-11-05 17:17:42 +01:00
|
|
|
break;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2020-12-08 11:53:56 +01:00
|
|
|
wpas_p2p_scan_res_handled(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-12-08 07:18:13 +01:00
|
|
|
static void wpas_p2p_scan_res_fail_handler(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->p2p_scan_work) {
|
|
|
|
struct wpa_radio_work *work = wpa_s->p2p_scan_work;
|
|
|
|
|
|
|
|
wpa_s->p2p_scan_work = NULL;
|
|
|
|
radio_work_done(work);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled || !wpa_s->global->p2p)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Failed to get scan results - try to continue");
|
2020-12-08 11:53:56 +01:00
|
|
|
wpas_p2p_scan_res_handled(wpa_s);
|
2020-12-08 07:18:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-03 10:57:57 +01:00
|
|
|
static void wpas_p2p_trigger_scan_cb(struct wpa_radio_work *work, int deinit)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = work->wpa_s;
|
|
|
|
struct wpa_driver_scan_params *params = work->ctx;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (deinit) {
|
2014-02-13 10:24:00 +01:00
|
|
|
if (!work->started) {
|
|
|
|
wpa_scan_free_params(params);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_s->p2p_scan_work = NULL;
|
2014-01-03 10:57:57 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-02-07 21:48:20 +01:00
|
|
|
if (wpa_s->clear_driver_scan_cache) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Request driver to clear scan cache due to local BSS flush");
|
|
|
|
params->only_new_results = 1;
|
|
|
|
}
|
2020-10-08 14:05:43 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_6ghz_disable && !params->freqs) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: 6 GHz disabled - update the scan frequency list");
|
2020-11-20 15:28:50 +01:00
|
|
|
wpa_add_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211G, params,
|
|
|
|
0);
|
|
|
|
wpa_add_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211A, params,
|
|
|
|
0);
|
2020-10-08 14:05:43 +02:00
|
|
|
}
|
2014-01-03 10:57:57 +01:00
|
|
|
ret = wpa_drv_scan(wpa_s, params);
|
2016-11-30 05:39:38 +01:00
|
|
|
if (ret == 0)
|
|
|
|
wpa_s->curr_scan_cookie = params->scan_cookie;
|
2014-01-03 10:57:57 +01:00
|
|
|
wpa_scan_free_params(params);
|
|
|
|
work->ctx = NULL;
|
|
|
|
if (ret) {
|
|
|
|
radio_work_done(work);
|
2014-10-30 11:50:22 +01:00
|
|
|
p2p_notify_scan_trigger_status(wpa_s->global->p2p, ret);
|
2014-01-03 10:57:57 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-10-30 11:50:22 +01:00
|
|
|
p2p_notify_scan_trigger_status(wpa_s->global->p2p, ret);
|
2014-01-03 10:57:57 +01:00
|
|
|
os_get_reltime(&wpa_s->scan_trigger_time);
|
|
|
|
wpa_s->scan_res_handler = wpas_p2p_scan_res_handler;
|
2020-12-08 07:18:13 +01:00
|
|
|
wpa_s->scan_res_fail_handler = wpas_p2p_scan_res_fail_handler;
|
2014-01-03 10:57:57 +01:00
|
|
|
wpa_s->own_scan_requested = 1;
|
2017-02-07 21:48:20 +01:00
|
|
|
wpa_s->clear_driver_scan_cache = 0;
|
2014-01-03 10:57:57 +01:00
|
|
|
wpa_s->p2p_scan_work = work;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-22 19:02:48 +02:00
|
|
|
static int wpas_p2p_search_social_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
int freq)
|
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_24ghz_social_channels &&
|
|
|
|
(freq == 2412 || freq == 2437 || freq == 2462)) {
|
|
|
|
/*
|
|
|
|
* Search all social channels regardless of whether these have
|
|
|
|
* been disabled for P2P operating channel use to avoid missing
|
|
|
|
* peers.
|
|
|
|
*/
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return p2p_supported_freq(wpa_s->global->p2p, freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-19 11:57:46 +01:00
|
|
|
static int wpas_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
|
|
|
|
unsigned int num_req_dev_types,
|
2012-02-27 22:14:35 +01:00
|
|
|
const u8 *req_dev_types, const u8 *dev_id, u16 pw_id)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2014-01-03 10:57:57 +01:00
|
|
|
struct wpa_driver_scan_params *params = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
struct wpabuf *wps_ie, *ies;
|
2014-09-25 11:42:07 +02:00
|
|
|
unsigned int num_channels = 0;
|
|
|
|
int social_channels_freq[] = { 2412, 2437, 2462, 60480 };
|
2011-04-28 15:14:35 +02:00
|
|
|
size_t ielen;
|
2014-09-25 11:42:07 +02:00
|
|
|
u8 *n, i;
|
2016-02-20 15:45:58 +01:00
|
|
|
unsigned int bands;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2014-01-03 10:57:57 +01:00
|
|
|
if (wpa_s->p2p_scan_work) {
|
|
|
|
wpa_dbg(wpa_s, MSG_INFO, "P2P: Reject scan trigger since one is already pending");
|
|
|
|
return -1;
|
2012-08-23 18:42:53 +02:00
|
|
|
}
|
|
|
|
|
2014-01-03 10:57:57 +01:00
|
|
|
params = os_zalloc(sizeof(*params));
|
|
|
|
if (params == NULL)
|
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
/* P2P Wildcard SSID */
|
2014-01-03 10:57:57 +01:00
|
|
|
params->num_ssids = 1;
|
|
|
|
n = os_malloc(P2P_WILDCARD_SSID_LEN);
|
|
|
|
if (n == NULL)
|
|
|
|
goto fail;
|
|
|
|
os_memcpy(n, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
|
|
|
|
params->ssids[0].ssid = n;
|
|
|
|
params->ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
wpa_s->wps->dev.p2p = 1;
|
2012-02-27 22:14:35 +01:00
|
|
|
wps_ie = wps_build_probe_req_ie(pw_id, &wpa_s->wps->dev,
|
|
|
|
wpa_s->wps->uuid, WPS_REQ_ENROLLEE,
|
2011-03-19 11:57:46 +01:00
|
|
|
num_req_dev_types, req_dev_types);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wps_ie == NULL)
|
2014-01-03 10:57:57 +01:00
|
|
|
goto fail;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case P2P_SCAN_SOCIAL:
|
2014-09-25 11:42:07 +02:00
|
|
|
params->freqs = os_calloc(ARRAY_SIZE(social_channels_freq) + 1,
|
|
|
|
sizeof(int));
|
2014-01-03 10:57:57 +01:00
|
|
|
if (params->freqs == NULL)
|
|
|
|
goto fail;
|
2014-09-25 11:42:07 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(social_channels_freq); i++) {
|
2014-10-22 19:02:48 +02:00
|
|
|
if (wpas_p2p_search_social_channel(
|
|
|
|
wpa_s, social_channels_freq[i]))
|
2014-09-25 11:42:07 +02:00
|
|
|
params->freqs[num_channels++] =
|
|
|
|
social_channels_freq[i];
|
|
|
|
}
|
|
|
|
params->freqs[num_channels++] = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
break;
|
|
|
|
case P2P_SCAN_FULL:
|
|
|
|
break;
|
2014-11-05 12:35:08 +01:00
|
|
|
case P2P_SCAN_SPECIFIC:
|
|
|
|
params->freqs = os_calloc(2, sizeof(int));
|
|
|
|
if (params->freqs == NULL)
|
|
|
|
goto fail;
|
|
|
|
params->freqs[0] = freq;
|
|
|
|
params->freqs[1] = 0;
|
|
|
|
break;
|
2010-07-18 23:30:25 +02:00
|
|
|
case P2P_SCAN_SOCIAL_PLUS_ONE:
|
2014-09-25 11:42:07 +02:00
|
|
|
params->freqs = os_calloc(ARRAY_SIZE(social_channels_freq) + 2,
|
|
|
|
sizeof(int));
|
2014-01-03 10:57:57 +01:00
|
|
|
if (params->freqs == NULL)
|
|
|
|
goto fail;
|
2014-09-25 11:42:07 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(social_channels_freq); i++) {
|
2014-10-22 19:02:48 +02:00
|
|
|
if (wpas_p2p_search_social_channel(
|
|
|
|
wpa_s, social_channels_freq[i]))
|
2014-09-25 11:42:07 +02:00
|
|
|
params->freqs[num_channels++] =
|
|
|
|
social_channels_freq[i];
|
|
|
|
}
|
|
|
|
if (p2p_supported_freq(wpa_s->global->p2p, freq))
|
|
|
|
params->freqs[num_channels++] = freq;
|
|
|
|
params->freqs[num_channels++] = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2016-02-20 12:28:27 +01:00
|
|
|
ielen = p2p_scan_ie_buf_len(wpa_s->global->p2p);
|
|
|
|
ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
|
|
|
|
if (ies == NULL) {
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
wpabuf_put_buf(ies, wps_ie);
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
|
2016-02-20 15:45:58 +01:00
|
|
|
bands = wpas_get_bands(wpa_s, params->freqs);
|
|
|
|
p2p_scan_ie(wpa_s->global->p2p, ies, dev_id, bands);
|
2016-02-20 12:28:27 +01:00
|
|
|
|
|
|
|
params->p2p_probe = 1;
|
|
|
|
n = os_malloc(wpabuf_len(ies));
|
|
|
|
if (n == NULL) {
|
|
|
|
wpabuf_free(ies);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
os_memcpy(n, wpabuf_head(ies), wpabuf_len(ies));
|
|
|
|
params->extra_ies = n;
|
|
|
|
params->extra_ies_len = wpabuf_len(ies);
|
|
|
|
wpabuf_free(ies);
|
|
|
|
|
2014-02-13 10:24:00 +01:00
|
|
|
radio_remove_works(wpa_s, "p2p-scan", 0);
|
2014-01-03 10:57:57 +01:00
|
|
|
if (radio_add_work(wpa_s, 0, "p2p-scan", 0, wpas_p2p_trigger_scan_cb,
|
|
|
|
params) < 0)
|
|
|
|
goto fail;
|
|
|
|
return 0;
|
2011-09-29 15:52:23 +02:00
|
|
|
|
2014-01-03 10:57:57 +01:00
|
|
|
fail:
|
|
|
|
wpa_scan_free_params(params);
|
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static enum wpa_driver_if_type wpas_p2p_if_type(int p2p_group_interface)
|
|
|
|
{
|
|
|
|
switch (p2p_group_interface) {
|
|
|
|
case P2P_GROUP_INTERFACE_PENDING:
|
|
|
|
return WPA_IF_P2P_GROUP;
|
|
|
|
case P2P_GROUP_INTERFACE_GO:
|
|
|
|
return WPA_IF_P2P_GO;
|
|
|
|
case P2P_GROUP_INTERFACE_CLIENT:
|
|
|
|
return WPA_IF_P2P_CLIENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
return WPA_IF_P2P_GROUP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-19 11:57:36 +01:00
|
|
|
static struct wpa_supplicant * wpas_get_p2p_group(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *ssid,
|
|
|
|
size_t ssid_len, int *go)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
if (s->disabled != 0 || !s->p2p_group ||
|
|
|
|
s->ssid_len != ssid_len ||
|
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) != 0)
|
|
|
|
continue;
|
|
|
|
if (s->mode == WPAS_MODE_P2P_GO &&
|
|
|
|
s != wpa_s->current_ssid)
|
|
|
|
continue;
|
|
|
|
if (go)
|
|
|
|
*go = s->mode == WPAS_MODE_P2P_GO;
|
|
|
|
return wpa_s;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-18 15:20:51 +02:00
|
|
|
static void run_wpas_p2p_disconnect(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Complete previously requested removal of %s",
|
|
|
|
wpa_s->ifname);
|
|
|
|
wpas_p2p_disconnect(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_disconnect_safely(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_supplicant *calling_wpa_s)
|
|
|
|
{
|
2014-10-28 00:47:17 +01:00
|
|
|
if (calling_wpa_s == wpa_s && wpa_s &&
|
2014-10-18 15:20:51 +02:00
|
|
|
wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE) {
|
|
|
|
/*
|
|
|
|
* The calling wpa_s instance is going to be removed. Do that
|
|
|
|
* from an eloop callback to keep the instance available until
|
2020-09-30 09:14:33 +02:00
|
|
|
* the caller has returned. This may be needed, e.g., to provide
|
2014-10-18 15:20:51 +02:00
|
|
|
* control interface responses on the per-interface socket.
|
|
|
|
*/
|
|
|
|
if (eloop_register_timeout(0, 0, run_wpas_p2p_disconnect,
|
|
|
|
wpa_s, NULL) < 0)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return wpas_p2p_disconnect(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 14:43:23 +01:00
|
|
|
/* Determine total number of clients in active groups where we are the GO */
|
|
|
|
static unsigned int p2p_group_go_member_count(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
unsigned int count = 0;
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: sup:%p ssid:%p disabled:%d p2p:%d mode:%d",
|
|
|
|
wpa_s, s, s->disabled, s->p2p_group,
|
|
|
|
s->mode);
|
|
|
|
if (!s->disabled && s->p2p_group &&
|
|
|
|
s->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
count += p2p_get_group_num_members(
|
|
|
|
wpa_s->p2p_group);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-09-24 19:37:56 +02:00
|
|
|
static unsigned int p2p_is_active_persistent_group(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
return !wpa_s->p2p_mgmt && wpa_s->current_ssid &&
|
|
|
|
!wpa_s->current_ssid->disabled &&
|
|
|
|
wpa_s->current_ssid->p2p_group &&
|
|
|
|
wpa_s->current_ssid->p2p_persistent_group;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static unsigned int p2p_is_active_persistent_go(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
return p2p_is_active_persistent_group(wpa_s) &&
|
|
|
|
wpa_s->current_ssid->mode == WPAS_MODE_P2P_GO;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
/* Find an interface for a P2P group where we are the GO */
|
|
|
|
static struct wpa_supplicant *
|
|
|
|
wpas_p2p_get_go_group(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *save = NULL;
|
|
|
|
|
|
|
|
if (!wpa_s)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
2015-09-24 19:37:56 +02:00
|
|
|
if (!p2p_is_active_persistent_go(wpa_s))
|
|
|
|
continue;
|
2014-12-10 15:25:18 +01:00
|
|
|
|
2015-09-24 19:37:56 +02:00
|
|
|
/* Prefer a group with connected clients */
|
|
|
|
if (p2p_get_group_num_members(wpa_s->p2p_group))
|
|
|
|
return wpa_s;
|
|
|
|
save = wpa_s;
|
2014-12-10 15:25:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* No group with connected clients, so pick the one without (if any) */
|
|
|
|
return save;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-09-24 19:37:57 +02:00
|
|
|
static unsigned int p2p_is_active_persistent_cli(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
return p2p_is_active_persistent_group(wpa_s) &&
|
|
|
|
wpa_s->current_ssid->mode == WPAS_MODE_INFRA;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Find an interface for a P2P group where we are the P2P Client */
|
|
|
|
static struct wpa_supplicant *
|
|
|
|
wpas_p2p_get_cli_group(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (p2p_is_active_persistent_cli(wpa_s))
|
|
|
|
return wpa_s;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 09:38:56 +01:00
|
|
|
/* Find a persistent group where we are the GO */
|
|
|
|
static struct wpa_ssid *
|
|
|
|
wpas_p2p_get_persistent_go(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
if (s->disabled == 2 && s->mode == WPAS_MODE_P2P_GO)
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-10-08 11:35:58 +02:00
|
|
|
static u8 p2ps_group_capability(void *ctx, u8 incoming, u8 role,
|
|
|
|
unsigned int *force_freq,
|
|
|
|
unsigned int *pref_freq)
|
2014-12-10 15:25:18 +01:00
|
|
|
{
|
2015-09-24 19:37:57 +02:00
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2014-12-10 15:25:18 +01:00
|
|
|
struct wpa_ssid *s;
|
|
|
|
u8 conncap = P2PS_SETUP_NONE;
|
|
|
|
unsigned int owned_members = 0;
|
2015-09-24 19:37:57 +02:00
|
|
|
struct wpa_supplicant *go_wpa_s, *cli_wpa_s;
|
2014-12-10 15:25:18 +01:00
|
|
|
struct wpa_ssid *persistent_go;
|
|
|
|
int p2p_no_group_iface;
|
2015-10-08 11:35:58 +02:00
|
|
|
unsigned int pref_freq_list[P2P_MAX_PREF_CHANNELS], size;
|
2014-12-10 15:25:18 +01:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Conncap - in:%d role:%d", incoming, role);
|
|
|
|
|
2015-10-08 11:35:58 +02:00
|
|
|
if (force_freq)
|
|
|
|
*force_freq = 0;
|
|
|
|
if (pref_freq)
|
|
|
|
*pref_freq = 0;
|
|
|
|
|
|
|
|
size = P2P_MAX_PREF_CHANNELS;
|
|
|
|
if (force_freq && pref_freq &&
|
|
|
|
!wpas_p2p_setup_freqs(wpa_s, 0, (int *) force_freq,
|
|
|
|
(int *) pref_freq, 0, pref_freq_list, &size))
|
|
|
|
wpas_p2p_set_own_freq_preference(wpa_s,
|
|
|
|
*force_freq ? *force_freq :
|
|
|
|
*pref_freq);
|
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
/*
|
|
|
|
* For non-concurrent capable devices:
|
|
|
|
* If persistent_go, then no new.
|
|
|
|
* If GO, then no client.
|
|
|
|
* If client, then no GO.
|
|
|
|
*/
|
|
|
|
go_wpa_s = wpas_p2p_get_go_group(wpa_s);
|
2015-09-24 19:37:57 +02:00
|
|
|
if (go_wpa_s)
|
|
|
|
owned_members = p2p_get_group_num_members(go_wpa_s->p2p_group);
|
2014-12-10 15:25:18 +01:00
|
|
|
persistent_go = wpas_p2p_get_persistent_go(wpa_s);
|
2015-07-02 09:45:03 +02:00
|
|
|
p2p_no_group_iface = !wpas_p2p_create_iface(wpa_s);
|
2015-09-24 19:37:57 +02:00
|
|
|
cli_wpa_s = wpas_p2p_get_cli_group(wpa_s);
|
2014-12-10 15:25:18 +01:00
|
|
|
|
2015-09-24 19:37:57 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: GO(iface)=%p members=%u CLI(iface)=%p persistent(ssid)=%p",
|
|
|
|
go_wpa_s, owned_members, cli_wpa_s, persistent_go);
|
2014-12-10 15:25:18 +01:00
|
|
|
|
|
|
|
/* If not concurrent, restrict our choices */
|
|
|
|
if (p2p_no_group_iface) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: p2p_no_group_iface");
|
|
|
|
|
2015-09-24 19:37:57 +02:00
|
|
|
if (cli_wpa_s)
|
2014-12-10 15:25:18 +01:00
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
|
|
|
|
if (go_wpa_s) {
|
|
|
|
if (role == P2PS_SETUP_CLIENT ||
|
|
|
|
incoming == P2PS_SETUP_GROUP_OWNER ||
|
|
|
|
p2p_client_limit_reached(go_wpa_s->p2p_group))
|
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
|
|
|
|
return P2PS_SETUP_GROUP_OWNER;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (persistent_go) {
|
|
|
|
if (role == P2PS_SETUP_NONE || role == P2PS_SETUP_NEW) {
|
|
|
|
if (!incoming)
|
|
|
|
return P2PS_SETUP_GROUP_OWNER |
|
|
|
|
P2PS_SETUP_CLIENT;
|
|
|
|
if (incoming == P2PS_SETUP_NEW) {
|
|
|
|
u8 r;
|
|
|
|
|
|
|
|
if (os_get_random(&r, sizeof(r)) < 0 ||
|
|
|
|
(r & 1))
|
|
|
|
return P2PS_SETUP_CLIENT;
|
|
|
|
return P2PS_SETUP_GROUP_OWNER;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If a required role has been specified, handle it here */
|
|
|
|
if (role && role != P2PS_SETUP_NEW) {
|
|
|
|
switch (incoming) {
|
2015-09-24 19:37:58 +02:00
|
|
|
case P2PS_SETUP_GROUP_OWNER | P2PS_SETUP_NEW:
|
|
|
|
case P2PS_SETUP_GROUP_OWNER | P2PS_SETUP_CLIENT:
|
|
|
|
/*
|
|
|
|
* Peer has an active GO, so if the role allows it and
|
|
|
|
* we do not have any active roles, become client.
|
|
|
|
*/
|
|
|
|
if ((role & P2PS_SETUP_CLIENT) && !go_wpa_s &&
|
|
|
|
!cli_wpa_s)
|
|
|
|
return P2PS_SETUP_CLIENT;
|
|
|
|
|
|
|
|
/* fall through */
|
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
case P2PS_SETUP_NONE:
|
|
|
|
case P2PS_SETUP_NEW:
|
|
|
|
conncap = role;
|
|
|
|
goto grp_owner;
|
|
|
|
|
|
|
|
case P2PS_SETUP_GROUP_OWNER:
|
|
|
|
/*
|
|
|
|
* Must be a complimentary role - cannot be a client to
|
|
|
|
* more than one peer.
|
|
|
|
*/
|
2015-09-24 19:37:57 +02:00
|
|
|
if (incoming == role || cli_wpa_s)
|
2014-12-10 15:25:18 +01:00
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
|
|
|
|
return P2PS_SETUP_CLIENT;
|
|
|
|
|
|
|
|
case P2PS_SETUP_CLIENT:
|
|
|
|
/* Must be a complimentary role */
|
|
|
|
if (incoming != role) {
|
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER;
|
|
|
|
goto grp_owner;
|
|
|
|
}
|
2018-05-15 19:29:00 +02:00
|
|
|
/* fall through */
|
2014-12-10 15:25:18 +01:00
|
|
|
|
|
|
|
default:
|
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For now, we only will support ownership of one group, and being a
|
|
|
|
* client of one group. Therefore, if we have either an existing GO
|
|
|
|
* group, or an existing client group, we will not do a new GO
|
|
|
|
* negotiation, but rather try to re-use the existing groups.
|
|
|
|
*/
|
|
|
|
switch (incoming) {
|
|
|
|
case P2PS_SETUP_NONE:
|
|
|
|
case P2PS_SETUP_NEW:
|
2015-09-24 19:37:57 +02:00
|
|
|
if (cli_wpa_s)
|
2014-12-10 15:25:18 +01:00
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER;
|
|
|
|
else if (!owned_members)
|
|
|
|
conncap = P2PS_SETUP_NEW;
|
|
|
|
else if (incoming == P2PS_SETUP_NONE)
|
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER | P2PS_SETUP_CLIENT;
|
|
|
|
else
|
|
|
|
conncap = P2PS_SETUP_CLIENT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case P2PS_SETUP_CLIENT:
|
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case P2PS_SETUP_GROUP_OWNER:
|
2015-09-24 19:37:57 +02:00
|
|
|
if (!cli_wpa_s)
|
2014-12-10 15:25:18 +01:00
|
|
|
conncap = P2PS_SETUP_CLIENT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case P2PS_SETUP_GROUP_OWNER | P2PS_SETUP_NEW:
|
|
|
|
case P2PS_SETUP_GROUP_OWNER | P2PS_SETUP_CLIENT:
|
2015-09-24 19:37:57 +02:00
|
|
|
if (cli_wpa_s)
|
2014-12-10 15:25:18 +01:00
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER;
|
|
|
|
else {
|
|
|
|
u8 r;
|
|
|
|
|
|
|
|
if (os_get_random(&r, sizeof(r)) < 0 ||
|
|
|
|
(r & 1))
|
|
|
|
conncap = P2PS_SETUP_CLIENT;
|
|
|
|
else
|
|
|
|
conncap = P2PS_SETUP_GROUP_OWNER;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
grp_owner:
|
|
|
|
if ((conncap & P2PS_SETUP_GROUP_OWNER) ||
|
|
|
|
(!incoming && (conncap & P2PS_SETUP_NEW))) {
|
|
|
|
if (go_wpa_s && p2p_client_limit_reached(go_wpa_s->p2p_group))
|
|
|
|
conncap &= ~P2PS_SETUP_GROUP_OWNER;
|
|
|
|
|
|
|
|
s = wpas_p2p_get_persistent_go(wpa_s);
|
2015-09-24 19:37:57 +02:00
|
|
|
if (!s && !go_wpa_s && p2p_no_group_iface) {
|
2014-12-10 15:25:18 +01:00
|
|
|
p2p_set_intended_addr(wpa_s->global->p2p,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2p_mgmt ?
|
|
|
|
wpa_s->parent->own_addr :
|
2014-12-10 15:25:18 +01:00
|
|
|
wpa_s->own_addr);
|
2015-09-24 19:37:57 +02:00
|
|
|
} else if (!s && !go_wpa_s) {
|
2014-12-10 15:25:18 +01:00
|
|
|
if (wpas_p2p_add_group_interface(wpa_s,
|
2016-10-18 11:44:17 +02:00
|
|
|
WPA_IF_P2P_GROUP) < 0) {
|
2014-12-10 15:25:18 +01:00
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"P2P: Failed to allocate a new interface for the group");
|
|
|
|
return P2PS_SETUP_NONE;
|
|
|
|
}
|
2014-12-30 13:27:38 +01:00
|
|
|
wpa_s->global->pending_group_iface_for_p2ps = 1;
|
2014-12-10 15:25:18 +01:00
|
|
|
p2p_set_intended_addr(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_interface_addr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return conncap;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-11 11:41:31 +02:00
|
|
|
static int wpas_p2p_group_delete(struct wpa_supplicant *wpa_s,
|
|
|
|
enum p2p_group_removal_reason removal_reason)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
char *gtype;
|
2010-10-25 17:24:15 +02:00
|
|
|
const char *reason;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid == NULL) {
|
|
|
|
/*
|
|
|
|
* The current SSID was not known, but there may still be a
|
2012-09-23 19:28:03 +02:00
|
|
|
* pending P2P group interface waiting for provisioning or a
|
|
|
|
* P2P group that is trying to reconnect.
|
2010-07-18 23:30:25 +02:00
|
|
|
*/
|
|
|
|
ssid = wpa_s->conf->ssid;
|
|
|
|
while (ssid) {
|
2012-10-05 19:37:49 +02:00
|
|
|
if (ssid->p2p_group && ssid->disabled != 2)
|
2010-07-18 23:30:25 +02:00
|
|
|
break;
|
|
|
|
ssid = ssid->next;
|
|
|
|
}
|
2012-08-31 20:35:32 +02:00
|
|
|
if (ssid == NULL &&
|
|
|
|
wpa_s->p2p_group_interface == NOT_P2P_GROUP_INTERFACE)
|
|
|
|
{
|
2012-08-11 11:06:23 +02:00
|
|
|
wpa_printf(MSG_ERROR, "P2P: P2P group interface "
|
|
|
|
"not found");
|
|
|
|
return -1;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
if (wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_GO)
|
|
|
|
gtype = "GO";
|
|
|
|
else if (wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_CLIENT ||
|
|
|
|
(ssid && ssid->mode == WPAS_MODE_INFRA)) {
|
|
|
|
wpa_s->reassociate = 0;
|
|
|
|
wpa_s->disconnected = 1;
|
|
|
|
gtype = "client";
|
|
|
|
} else
|
|
|
|
gtype = "GO";
|
2014-08-21 05:30:24 +02:00
|
|
|
|
|
|
|
if (removal_reason != P2P_GROUP_REMOVAL_SILENT && ssid)
|
|
|
|
wpas_notify_p2p_group_removed(wpa_s, ssid, gtype);
|
|
|
|
|
2014-10-10 00:31:57 +02:00
|
|
|
if (os_strcmp(gtype, "client") == 0) {
|
2014-08-21 05:30:24 +02:00
|
|
|
wpa_supplicant_deauthenticate(wpa_s, WLAN_REASON_DEAUTH_LEAVING);
|
2014-10-10 00:31:57 +02:00
|
|
|
if (eloop_is_timeout_registered(wpas_p2p_psk_failure_removal,
|
|
|
|
wpa_s, NULL)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: PSK failure removal was scheduled, so use PSK failure as reason for group removal");
|
|
|
|
removal_reason = P2P_GROUP_REMOVAL_PSK_FAILURE;
|
|
|
|
eloop_cancel_timeout(wpas_p2p_psk_failure_removal,
|
|
|
|
wpa_s, NULL);
|
|
|
|
}
|
|
|
|
}
|
2014-08-21 05:30:24 +02:00
|
|
|
|
2010-07-10 19:19:34 +02:00
|
|
|
if (wpa_s->cross_connect_in_use) {
|
|
|
|
wpa_s->cross_connect_in_use = 0;
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_CROSS_CONNECT_DISABLE "%s %s",
|
|
|
|
wpa_s->ifname, wpa_s->cross_connect_uplink);
|
2010-07-10 19:19:34 +02:00
|
|
|
}
|
2012-08-11 11:41:31 +02:00
|
|
|
switch (removal_reason) {
|
2010-10-25 17:24:15 +02:00
|
|
|
case P2P_GROUP_REMOVAL_REQUESTED:
|
|
|
|
reason = " reason=REQUESTED";
|
|
|
|
break;
|
2012-08-11 11:41:31 +02:00
|
|
|
case P2P_GROUP_REMOVAL_FORMATION_FAILED:
|
|
|
|
reason = " reason=FORMATION_FAILED";
|
|
|
|
break;
|
2010-10-25 17:24:15 +02:00
|
|
|
case P2P_GROUP_REMOVAL_IDLE_TIMEOUT:
|
|
|
|
reason = " reason=IDLE";
|
|
|
|
break;
|
2010-10-25 18:16:11 +02:00
|
|
|
case P2P_GROUP_REMOVAL_UNAVAILABLE:
|
|
|
|
reason = " reason=UNAVAILABLE";
|
|
|
|
break;
|
2012-04-03 15:43:06 +02:00
|
|
|
case P2P_GROUP_REMOVAL_GO_ENDING_SESSION:
|
|
|
|
reason = " reason=GO_ENDING_SESSION";
|
|
|
|
break;
|
2013-09-01 20:28:16 +02:00
|
|
|
case P2P_GROUP_REMOVAL_PSK_FAILURE:
|
|
|
|
reason = " reason=PSK_FAILURE";
|
|
|
|
break;
|
2013-11-26 14:10:16 +01:00
|
|
|
case P2P_GROUP_REMOVAL_FREQ_CONFLICT:
|
|
|
|
reason = " reason=FREQ_CONFLICT";
|
|
|
|
break;
|
2010-10-25 17:24:15 +02:00
|
|
|
default:
|
|
|
|
reason = "";
|
|
|
|
break;
|
|
|
|
}
|
2012-08-11 11:41:31 +02:00
|
|
|
if (removal_reason != P2P_GROUP_REMOVAL_SILENT) {
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_GROUP_REMOVED "%s %s%s",
|
|
|
|
wpa_s->ifname, gtype, reason);
|
2012-05-08 16:13:56 +02:00
|
|
|
}
|
2011-02-24 21:27:23 +01:00
|
|
|
|
2013-11-26 14:10:16 +01:00
|
|
|
if (eloop_cancel_timeout(wpas_p2p_group_freq_conflict, wpa_s, NULL) > 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group freq_conflict timeout");
|
2012-02-19 17:16:34 +01:00
|
|
|
if (eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
|
2013-02-10 22:36:52 +01:00
|
|
|
if (eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL) > 0) {
|
2013-02-10 22:36:52 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group formation "
|
|
|
|
"timeout");
|
2013-03-11 19:47:24 +01:00
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
2015-07-30 12:14:24 +02:00
|
|
|
wpas_p2p_group_formation_failed(wpa_s, 1);
|
2013-03-11 19:47:24 +01:00
|
|
|
}
|
2012-02-19 17:10:20 +01:00
|
|
|
|
2014-03-21 13:56:02 +01:00
|
|
|
wpa_s->p2p_in_invitation = 0;
|
2015-07-27 21:24:19 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_move_go, wpa_s, NULL);
|
2015-07-27 21:24:26 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_reconsider_moving_go, wpa_s, NULL);
|
2014-03-21 13:56:02 +01:00
|
|
|
|
2013-10-06 07:15:28 +02:00
|
|
|
/*
|
|
|
|
* Make sure wait for the first client does not remain active after the
|
|
|
|
* group has been removed.
|
|
|
|
*/
|
|
|
|
wpa_s->global->p2p_go_wait_client.sec = 0;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE) {
|
|
|
|
struct wpa_global *global;
|
|
|
|
char *ifname;
|
|
|
|
enum wpa_driver_if_type type;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s",
|
|
|
|
wpa_s->ifname);
|
|
|
|
global = wpa_s->global;
|
|
|
|
ifname = os_strdup(wpa_s->ifname);
|
|
|
|
type = wpas_p2p_if_type(wpa_s->p2p_group_interface);
|
2014-10-18 15:20:51 +02:00
|
|
|
eloop_cancel_timeout(run_wpas_p2p_disconnect, wpa_s, NULL);
|
2012-01-29 19:15:48 +01:00
|
|
|
wpa_supplicant_remove_iface(wpa_s->global, wpa_s, 0);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s = global->ifaces;
|
|
|
|
if (wpa_s && ifname)
|
|
|
|
wpa_drv_if_remove(wpa_s, type, ifname);
|
|
|
|
os_free(ifname);
|
2012-08-31 21:04:41 +02:00
|
|
|
return 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
/*
|
|
|
|
* The primary interface was used for P2P group operations, so
|
|
|
|
* need to reset its p2pdev.
|
|
|
|
*/
|
|
|
|
wpa_s->p2pdev = wpa_s->parent;
|
|
|
|
|
2013-10-06 02:54:52 +02:00
|
|
|
if (!wpa_s->p2p_go_group_formation_completed) {
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
|
|
|
}
|
|
|
|
|
2013-11-01 09:31:55 +01:00
|
|
|
wpa_s->show_group_started = 0;
|
|
|
|
os_free(wpa_s->go_params);
|
|
|
|
wpa_s->go_params = NULL;
|
|
|
|
|
2014-07-07 13:20:59 +02:00
|
|
|
os_free(wpa_s->p2p_group_common_freqs);
|
|
|
|
wpa_s->p2p_group_common_freqs = NULL;
|
|
|
|
wpa_s->p2p_group_common_freqs_num = 0;
|
2019-03-08 11:30:56 +01:00
|
|
|
wpa_s->p2p_go_do_acs = 0;
|
2014-07-07 13:20:59 +02:00
|
|
|
|
2014-01-01 17:44:44 +01:00
|
|
|
wpa_s->waiting_presence_resp = 0;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network");
|
|
|
|
if (ssid && (ssid->p2p_group ||
|
|
|
|
ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION ||
|
|
|
|
(ssid->key_mgmt & WPA_KEY_MGMT_WPS))) {
|
|
|
|
int id = ssid->id;
|
2011-06-27 18:02:24 +02:00
|
|
|
if (ssid == wpa_s->current_ssid) {
|
|
|
|
wpa_sm_set_config(wpa_s->wpa, NULL);
|
|
|
|
eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->current_ssid = NULL;
|
2011-06-27 18:02:24 +02:00
|
|
|
}
|
2011-06-23 20:25:13 +02:00
|
|
|
/*
|
|
|
|
* Networks objects created during any P2P activities are not
|
|
|
|
* exposed out as they might/will confuse certain non-P2P aware
|
|
|
|
* applications since these network objects won't behave like
|
|
|
|
* regular ones.
|
|
|
|
*
|
|
|
|
* Likewise, we don't send out network removed signals for such
|
|
|
|
* network objects.
|
|
|
|
*/
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_config_remove_network(wpa_s->conf, id);
|
|
|
|
wpa_supplicant_clear_status(wpa_s);
|
2012-01-23 17:26:09 +01:00
|
|
|
wpa_supplicant_cancel_sched_scan(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Temporary group network not "
|
|
|
|
"found");
|
|
|
|
}
|
2012-04-01 20:41:23 +02:00
|
|
|
if (wpa_s->ap_iface)
|
|
|
|
wpa_supplicant_ap_deinit(wpa_s);
|
|
|
|
else
|
|
|
|
wpa_drv_deinit_p2p_cli(wpa_s);
|
2012-08-11 11:06:23 +02:00
|
|
|
|
2015-08-02 18:25:41 +02:00
|
|
|
os_memset(wpa_s->go_dev_addr, 0, ETH_ALEN);
|
|
|
|
|
2012-08-11 11:06:23 +02:00
|
|
|
return 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_persistent_group(struct wpa_supplicant *wpa_s,
|
|
|
|
u8 *go_dev_addr,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
|
|
|
const u8 *bssid;
|
|
|
|
struct wpabuf *p2p;
|
|
|
|
u8 group_capab;
|
|
|
|
const u8 *addr;
|
|
|
|
|
|
|
|
if (wpa_s->go_params)
|
|
|
|
bssid = wpa_s->go_params->peer_interface_addr;
|
|
|
|
else
|
|
|
|
bssid = wpa_s->bssid;
|
|
|
|
|
|
|
|
bss = wpa_bss_get(wpa_s, bssid, ssid, ssid_len);
|
2013-09-08 00:44:29 +02:00
|
|
|
if (bss == NULL && wpa_s->go_params &&
|
|
|
|
!is_zero_ether_addr(wpa_s->go_params->peer_device_addr))
|
|
|
|
bss = wpa_bss_get_p2p_dev_addr(
|
|
|
|
wpa_s, wpa_s->go_params->peer_device_addr);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (bss == NULL) {
|
|
|
|
u8 iface_addr[ETH_ALEN];
|
|
|
|
if (p2p_get_interface_addr(wpa_s->global->p2p, bssid,
|
|
|
|
iface_addr) == 0)
|
|
|
|
bss = wpa_bss_get(wpa_s, iface_addr, ssid, ssid_len);
|
|
|
|
}
|
|
|
|
if (bss == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
|
|
|
|
"group is persistent - BSS " MACSTR " not found",
|
|
|
|
MAC2STR(bssid));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
p2p = wpa_bss_get_vendor_ie_multi(bss, P2P_IE_VENDOR_TYPE);
|
2013-10-14 18:28:00 +02:00
|
|
|
if (p2p == NULL)
|
|
|
|
p2p = wpa_bss_get_vendor_ie_multi_beacon(bss,
|
|
|
|
P2P_IE_VENDOR_TYPE);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (p2p == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
|
|
|
|
"group is persistent - BSS " MACSTR
|
|
|
|
" did not include P2P IE", MAC2STR(bssid));
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs",
|
2020-11-16 15:21:56 +01:00
|
|
|
wpa_bss_ie_ptr(bss), bss->ie_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Beacon IEs",
|
2020-11-16 15:21:56 +01:00
|
|
|
wpa_bss_ie_ptr(bss) + bss->ie_len,
|
2010-07-18 23:30:25 +02:00
|
|
|
bss->beacon_ie_len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
group_capab = p2p_get_group_capab(p2p);
|
|
|
|
addr = p2p_get_go_dev_addr(p2p);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Checking whether group is persistent: "
|
|
|
|
"group_capab=0x%x", group_capab);
|
|
|
|
if (addr) {
|
|
|
|
os_memcpy(go_dev_addr, addr, ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR,
|
|
|
|
MAC2STR(addr));
|
|
|
|
} else
|
|
|
|
os_memset(go_dev_addr, 0, ETH_ALEN);
|
|
|
|
wpabuf_free(p2p);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x "
|
|
|
|
"go_dev_addr=" MACSTR,
|
|
|
|
MAC2STR(bssid), group_capab, MAC2STR(go_dev_addr));
|
|
|
|
|
2016-08-02 22:47:38 +02:00
|
|
|
return !!(group_capab & P2P_GROUP_CAPAB_PERSISTENT_GROUP);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-06-12 23:35:37 +02:00
|
|
|
static int wpas_p2p_store_persistent_group(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid,
|
|
|
|
const u8 *go_dev_addr)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
int changed = 0;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Storing credentials for a persistent "
|
|
|
|
"group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr));
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
if (s->disabled == 2 &&
|
|
|
|
os_memcmp(go_dev_addr, s->bssid, ETH_ALEN) == 0 &&
|
|
|
|
s->ssid_len == ssid->ssid_len &&
|
|
|
|
os_memcmp(ssid->ssid, s->ssid, ssid->ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Update existing persistent group "
|
|
|
|
"entry");
|
|
|
|
if (ssid->passphrase && !s->passphrase)
|
|
|
|
changed = 1;
|
|
|
|
else if (ssid->passphrase && s->passphrase &&
|
|
|
|
os_strcmp(ssid->passphrase, s->passphrase) != 0)
|
|
|
|
changed = 1;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Create a new persistent group "
|
|
|
|
"entry");
|
|
|
|
changed = 1;
|
|
|
|
s = wpa_config_add_network(wpa_s->conf);
|
|
|
|
if (s == NULL)
|
2011-06-12 23:35:37 +02:00
|
|
|
return -1;
|
2011-06-23 20:25:13 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Instead of network_added we emit persistent_group_added
|
|
|
|
* notification. Also to keep the defense checks in
|
|
|
|
* persistent_group obj registration method, we set the
|
|
|
|
* relevant flags in s to designate it as a persistent group.
|
|
|
|
*/
|
|
|
|
s->p2p_group = 1;
|
|
|
|
s->p2p_persistent_group = 1;
|
|
|
|
wpas_notify_persistent_group_added(wpa_s, s);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_config_set_network_defaults(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
s->p2p_group = 1;
|
|
|
|
s->p2p_persistent_group = 1;
|
|
|
|
s->disabled = 2;
|
|
|
|
s->bssid_set = 1;
|
|
|
|
os_memcpy(s->bssid, go_dev_addr, ETH_ALEN);
|
|
|
|
s->mode = ssid->mode;
|
|
|
|
s->auth_alg = WPA_AUTH_ALG_OPEN;
|
|
|
|
s->key_mgmt = WPA_KEY_MGMT_PSK;
|
|
|
|
s->proto = WPA_PROTO_RSN;
|
2016-03-23 17:44:10 +01:00
|
|
|
s->pbss = ssid->pbss;
|
|
|
|
s->pairwise_cipher = ssid->pbss ? WPA_CIPHER_GCMP : WPA_CIPHER_CCMP;
|
2011-02-02 16:00:12 +01:00
|
|
|
s->export_keys = 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
if (ssid->passphrase) {
|
|
|
|
os_free(s->passphrase);
|
|
|
|
s->passphrase = os_strdup(ssid->passphrase);
|
|
|
|
}
|
|
|
|
if (ssid->psk_set) {
|
|
|
|
s->psk_set = 1;
|
|
|
|
os_memcpy(s->psk, ssid->psk, 32);
|
|
|
|
}
|
|
|
|
if (s->passphrase && !s->psk_set)
|
|
|
|
wpa_config_update_psk(s);
|
|
|
|
if (s->ssid == NULL || s->ssid_len < ssid->ssid_len) {
|
|
|
|
os_free(s->ssid);
|
|
|
|
s->ssid = os_malloc(ssid->ssid_len);
|
|
|
|
}
|
|
|
|
if (s->ssid) {
|
|
|
|
s->ssid_len = ssid->ssid_len;
|
|
|
|
os_memcpy(s->ssid, ssid->ssid, s->ssid_len);
|
|
|
|
}
|
2013-09-01 12:40:33 +02:00
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GO && wpa_s->global->add_psk) {
|
|
|
|
dl_list_add(&s->psk_list, &wpa_s->global->add_psk->list);
|
|
|
|
wpa_s->global->add_psk = NULL;
|
|
|
|
changed = 1;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (changed && wpa_s->conf->update_config &&
|
|
|
|
wpa_config_write(wpa_s->confname, wpa_s->conf)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
|
|
|
|
}
|
2011-06-12 23:35:37 +02:00
|
|
|
|
|
|
|
return s->id;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-22 21:47:41 +01:00
|
|
|
static void wpas_p2p_add_persistent_group_client(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *addr)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid, *s;
|
|
|
|
u8 *n;
|
|
|
|
size_t i;
|
2012-08-23 22:56:51 +02:00
|
|
|
int found = 0;
|
2015-05-12 16:40:00 +02:00
|
|
|
struct wpa_supplicant *p2p_wpa_s = wpa_s->global->p2p_init_wpa_s;
|
2011-12-22 21:47:41 +01:00
|
|
|
|
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid == NULL || ssid->mode != WPAS_MODE_P2P_GO ||
|
|
|
|
!ssid->p2p_persistent_group)
|
|
|
|
return;
|
|
|
|
|
2015-05-12 16:40:00 +02:00
|
|
|
for (s = p2p_wpa_s->conf->ssid; s; s = s->next) {
|
2011-12-22 21:47:41 +01:00
|
|
|
if (s->disabled != 2 || s->mode != WPAS_MODE_P2P_GO)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (s->ssid_len == ssid->ssid_len &&
|
|
|
|
os_memcmp(s->ssid, ssid->ssid, s->ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; s->p2p_client_list && i < s->num_p2p_clients; i++) {
|
2015-01-05 21:10:16 +01:00
|
|
|
if (os_memcmp(s->p2p_client_list + i * 2 * ETH_ALEN, addr,
|
2012-08-23 22:56:51 +02:00
|
|
|
ETH_ALEN) != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (i == s->num_p2p_clients - 1)
|
|
|
|
return; /* already the most recent entry */
|
|
|
|
|
|
|
|
/* move the entry to mark it most recent */
|
2015-01-05 21:10:16 +01:00
|
|
|
os_memmove(s->p2p_client_list + i * 2 * ETH_ALEN,
|
|
|
|
s->p2p_client_list + (i + 1) * 2 * ETH_ALEN,
|
|
|
|
(s->num_p2p_clients - i - 1) * 2 * ETH_ALEN);
|
2012-08-23 22:56:51 +02:00
|
|
|
os_memcpy(s->p2p_client_list +
|
2015-01-05 21:10:16 +01:00
|
|
|
(s->num_p2p_clients - 1) * 2 * ETH_ALEN, addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
os_memset(s->p2p_client_list +
|
|
|
|
(s->num_p2p_clients - 1) * 2 * ETH_ALEN + ETH_ALEN,
|
|
|
|
0xff, ETH_ALEN);
|
2012-08-23 22:56:51 +02:00
|
|
|
found = 1;
|
|
|
|
break;
|
2011-12-22 21:47:41 +01:00
|
|
|
}
|
|
|
|
|
2012-08-23 23:23:44 +02:00
|
|
|
if (!found && s->num_p2p_clients < P2P_MAX_STORED_CLIENTS) {
|
2012-08-23 22:56:51 +02:00
|
|
|
n = os_realloc_array(s->p2p_client_list,
|
2015-01-05 21:10:16 +01:00
|
|
|
s->num_p2p_clients + 1, 2 * ETH_ALEN);
|
2012-08-23 22:56:51 +02:00
|
|
|
if (n == NULL)
|
|
|
|
return;
|
2015-01-05 21:10:16 +01:00
|
|
|
os_memcpy(n + s->num_p2p_clients * 2 * ETH_ALEN, addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
os_memset(n + s->num_p2p_clients * 2 * ETH_ALEN + ETH_ALEN,
|
|
|
|
0xff, ETH_ALEN);
|
2012-08-23 22:56:51 +02:00
|
|
|
s->p2p_client_list = n;
|
|
|
|
s->num_p2p_clients++;
|
2014-07-02 23:53:13 +02:00
|
|
|
} else if (!found && s->p2p_client_list) {
|
2012-08-23 23:23:44 +02:00
|
|
|
/* Not enough room for an additional entry - drop the oldest
|
|
|
|
* entry */
|
|
|
|
os_memmove(s->p2p_client_list,
|
2015-01-05 21:10:16 +01:00
|
|
|
s->p2p_client_list + 2 * ETH_ALEN,
|
|
|
|
(s->num_p2p_clients - 1) * 2 * ETH_ALEN);
|
2012-08-23 23:23:44 +02:00
|
|
|
os_memcpy(s->p2p_client_list +
|
2015-01-05 21:10:16 +01:00
|
|
|
(s->num_p2p_clients - 1) * 2 * ETH_ALEN,
|
2012-08-23 23:23:44 +02:00
|
|
|
addr, ETH_ALEN);
|
2015-01-05 21:10:16 +01:00
|
|
|
os_memset(s->p2p_client_list +
|
|
|
|
(s->num_p2p_clients - 1) * 2 * ETH_ALEN + ETH_ALEN,
|
|
|
|
0xff, ETH_ALEN);
|
2012-08-23 22:56:51 +02:00
|
|
|
}
|
2011-12-22 21:47:41 +01:00
|
|
|
|
2015-05-12 16:40:00 +02:00
|
|
|
if (p2p_wpa_s->conf->update_config &&
|
|
|
|
wpa_config_write(p2p_wpa_s->confname, p2p_wpa_s->conf))
|
2011-12-22 21:47:41 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-07-26 12:09:17 +02:00
|
|
|
static void wpas_p2p_group_started(struct wpa_supplicant *wpa_s,
|
|
|
|
int go, struct wpa_ssid *ssid, int freq,
|
|
|
|
const u8 *psk, const char *passphrase,
|
|
|
|
const u8 *go_dev_addr, int persistent,
|
|
|
|
const char *extra)
|
|
|
|
{
|
|
|
|
const char *ssid_txt;
|
|
|
|
char psk_txt[65];
|
|
|
|
|
|
|
|
if (psk)
|
|
|
|
wpa_snprintf_hex(psk_txt, sizeof(psk_txt), psk, 32);
|
|
|
|
else
|
|
|
|
psk_txt[0] = '\0';
|
|
|
|
|
|
|
|
if (ssid)
|
|
|
|
ssid_txt = wpa_ssid_txt(ssid->ssid, ssid->ssid_len);
|
|
|
|
else
|
|
|
|
ssid_txt = "";
|
|
|
|
|
|
|
|
if (passphrase && passphrase[0] == '\0')
|
|
|
|
passphrase = NULL;
|
|
|
|
|
2014-07-26 12:11:34 +02:00
|
|
|
/*
|
|
|
|
* Include PSK/passphrase only in the control interface message and
|
|
|
|
* leave it out from the debug log entry.
|
|
|
|
*/
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global_ctrl(wpa_s->p2pdev, MSG_INFO,
|
2014-07-26 12:11:34 +02:00
|
|
|
P2P_EVENT_GROUP_STARTED
|
|
|
|
"%s %s ssid=\"%s\" freq=%d%s%s%s%s%s go_dev_addr="
|
|
|
|
MACSTR "%s%s",
|
|
|
|
wpa_s->ifname, go ? "GO" : "client", ssid_txt, freq,
|
|
|
|
psk ? " psk=" : "", psk_txt,
|
|
|
|
passphrase ? " passphrase=\"" : "",
|
|
|
|
passphrase ? passphrase : "",
|
|
|
|
passphrase ? "\"" : "",
|
|
|
|
MAC2STR(go_dev_addr),
|
|
|
|
persistent ? " [PERSISTENT]" : "", extra);
|
|
|
|
wpa_printf(MSG_INFO, P2P_EVENT_GROUP_STARTED
|
|
|
|
"%s %s ssid=\"%s\" freq=%d go_dev_addr=" MACSTR "%s%s",
|
|
|
|
wpa_s->ifname, go ? "GO" : "client", ssid_txt, freq,
|
|
|
|
MAC2STR(go_dev_addr), persistent ? " [PERSISTENT]" : "",
|
|
|
|
extra);
|
2014-07-26 12:09:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
|
2015-06-15 22:34:11 +02:00
|
|
|
int success, int already_deleted)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
int client;
|
|
|
|
int persistent;
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This callback is likely called for the main interface. Update wpa_s
|
|
|
|
* to use the group interface if a new interface was created for the
|
|
|
|
* group.
|
|
|
|
*/
|
|
|
|
if (wpa_s->global->p2p_group_formation)
|
|
|
|
wpa_s = wpa_s->global->p2p_group_formation;
|
2013-09-26 19:32:44 +02:00
|
|
|
if (wpa_s->p2p_go_group_formation_completed) {
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
2017-06-13 13:45:49 +02:00
|
|
|
} else if (wpa_s->p2p_in_provisioning && !success) {
|
|
|
|
wpa_msg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Stop provisioning state due to failure");
|
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
2013-09-26 19:32:44 +02:00
|
|
|
}
|
2014-04-07 11:26:04 +02:00
|
|
|
wpa_s->p2p_in_invitation = 0;
|
2014-10-01 14:36:53 +02:00
|
|
|
wpa_s->group_formation_reported = 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (!success) {
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_GROUP_FORMATION_FAILURE);
|
2015-08-20 12:58:33 +02:00
|
|
|
wpas_notify_p2p_group_formation_failure(wpa_s, "");
|
2015-06-15 22:34:11 +02:00
|
|
|
if (already_deleted)
|
|
|
|
return;
|
2012-08-11 11:41:31 +02:00
|
|
|
wpas_p2p_group_delete(wpa_s,
|
|
|
|
P2P_GROUP_REMOVAL_FORMATION_FAILED);
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_GROUP_FORMATION_SUCCESS);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid && ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION) {
|
|
|
|
ssid->mode = WPAS_MODE_P2P_GO;
|
|
|
|
p2p_group_notif_formation_done(wpa_s->p2p_group);
|
|
|
|
wpa_supplicant_ap_mac_addr_filter(wpa_s, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
persistent = 0;
|
|
|
|
if (ssid) {
|
|
|
|
client = ssid->mode == WPAS_MODE_INFRA;
|
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
persistent = ssid->p2p_persistent_group;
|
2011-12-25 22:58:03 +01:00
|
|
|
os_memcpy(go_dev_addr, wpa_s->global->p2p_dev_addr,
|
2010-07-18 23:30:25 +02:00
|
|
|
ETH_ALEN);
|
|
|
|
} else
|
|
|
|
persistent = wpas_p2p_persistent_group(wpa_s,
|
|
|
|
go_dev_addr,
|
|
|
|
ssid->ssid,
|
|
|
|
ssid->ssid_len);
|
|
|
|
} else {
|
|
|
|
client = wpa_s->p2p_group_interface ==
|
|
|
|
P2P_GROUP_INTERFACE_CLIENT;
|
2011-04-13 21:03:52 +02:00
|
|
|
os_memset(go_dev_addr, 0, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
wpa_s->show_group_started = 0;
|
|
|
|
if (client) {
|
|
|
|
/*
|
|
|
|
* Indicate event only after successfully completed 4-way
|
|
|
|
* handshake, i.e., when the interface is ready for data
|
|
|
|
* packets.
|
|
|
|
*/
|
|
|
|
wpa_s->show_group_started = 1;
|
|
|
|
} else {
|
2014-07-26 12:09:17 +02:00
|
|
|
wpas_p2p_group_started(wpa_s, 1, ssid,
|
|
|
|
ssid ? ssid->frequency : 0,
|
|
|
|
ssid && ssid->passphrase == NULL &&
|
|
|
|
ssid->psk_set ? ssid->psk : NULL,
|
|
|
|
ssid ? ssid->passphrase : NULL,
|
|
|
|
go_dev_addr, persistent, "");
|
2010-07-10 19:19:34 +02:00
|
|
|
wpas_p2p_cross_connect_setup(wpa_s);
|
2010-10-25 17:24:15 +02:00
|
|
|
wpas_p2p_set_group_idle_timeout(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (persistent)
|
2016-05-30 09:38:31 +02:00
|
|
|
wpas_p2p_store_persistent_group(wpa_s->p2pdev,
|
|
|
|
ssid, go_dev_addr);
|
2013-09-01 12:40:33 +02:00
|
|
|
else {
|
|
|
|
os_free(wpa_s->global->add_psk);
|
|
|
|
wpa_s->global->add_psk = NULL;
|
|
|
|
}
|
2016-05-30 09:38:31 +02:00
|
|
|
|
2013-08-27 11:23:10 +02:00
|
|
|
if (!client) {
|
2016-11-02 11:20:28 +01:00
|
|
|
wpas_notify_p2p_group_started(wpa_s, ssid, persistent, 0, NULL);
|
2013-12-16 21:08:40 +01:00
|
|
|
os_get_reltime(&wpa_s->global->p2p_go_wait_client);
|
2013-08-27 11:23:10 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-07 08:39:30 +01:00
|
|
|
struct send_action_work {
|
|
|
|
unsigned int freq;
|
|
|
|
u8 dst[ETH_ALEN];
|
|
|
|
u8 src[ETH_ALEN];
|
|
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
size_t len;
|
|
|
|
unsigned int wait_time;
|
|
|
|
u8 buf[0];
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-10-15 20:20:22 +02:00
|
|
|
static void wpas_p2p_free_send_action_work(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct send_action_work *awork = wpa_s->p2p_send_action_work->ctx;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Free Action frame radio work @%p (freq=%u dst="
|
|
|
|
MACSTR " src=" MACSTR " bssid=" MACSTR " wait_time=%u)",
|
|
|
|
wpa_s->p2p_send_action_work, awork->freq,
|
|
|
|
MAC2STR(awork->dst), MAC2STR(awork->src),
|
|
|
|
MAC2STR(awork->bssid), awork->wait_time);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Freeing pending Action frame",
|
|
|
|
awork->buf, awork->len);
|
|
|
|
os_free(awork);
|
|
|
|
wpa_s->p2p_send_action_work->ctx = NULL;
|
|
|
|
radio_work_done(wpa_s->p2p_send_action_work);
|
|
|
|
wpa_s->p2p_send_action_work = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-07 08:39:30 +01:00
|
|
|
static void wpas_p2p_send_action_work_timeout(void *eloop_ctx,
|
|
|
|
void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
|
|
|
|
if (!wpa_s->p2p_send_action_work)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Send Action frame radio work timed out");
|
2015-10-15 20:20:22 +02:00
|
|
|
wpas_p2p_free_send_action_work(wpa_s);
|
2014-01-07 08:39:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-07-29 15:04:32 +02:00
|
|
|
static void wpas_p2p_action_tx_clear(struct wpa_supplicant *wpa_s)
|
2010-11-02 18:35:40 +01:00
|
|
|
{
|
2014-01-07 08:39:30 +01:00
|
|
|
if (wpa_s->p2p_send_action_work) {
|
|
|
|
struct send_action_work *awork;
|
2015-10-15 20:20:22 +02:00
|
|
|
|
2014-01-07 08:39:30 +01:00
|
|
|
awork = wpa_s->p2p_send_action_work->ctx;
|
2015-10-15 20:20:22 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Clear Action TX work @%p (wait_time=%u)",
|
|
|
|
wpa_s->p2p_send_action_work, awork->wait_time);
|
2014-01-07 08:39:30 +01:00
|
|
|
if (awork->wait_time == 0) {
|
2015-10-15 20:20:22 +02:00
|
|
|
wpas_p2p_free_send_action_work(wpa_s);
|
2014-01-07 08:39:30 +01:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* In theory, this should not be needed, but number of
|
|
|
|
* places in the P2P code is still using non-zero wait
|
|
|
|
* time for the last Action frame in the sequence and
|
|
|
|
* some of these do not call send_action_done().
|
|
|
|
*/
|
|
|
|
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
eloop_register_timeout(
|
|
|
|
0, awork->wait_time * 1000,
|
|
|
|
wpas_p2p_send_action_work_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
}
|
|
|
|
}
|
2014-07-29 15:04:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_send_action_tx_status(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int freq,
|
|
|
|
const u8 *dst, const u8 *src,
|
|
|
|
const u8 *bssid,
|
|
|
|
const u8 *data, size_t data_len,
|
|
|
|
enum offchannel_send_action_result
|
|
|
|
result)
|
|
|
|
{
|
|
|
|
enum p2p_send_action_result res = P2P_SEND_ACTION_SUCCESS;
|
|
|
|
|
|
|
|
wpas_p2p_action_tx_clear(wpa_s);
|
2014-01-07 08:39:30 +01:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p == NULL || wpa_s->global->p2p_disabled)
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
|
2011-09-29 18:22:08 +02:00
|
|
|
switch (result) {
|
|
|
|
case OFFCHANNEL_SEND_ACTION_SUCCESS:
|
|
|
|
res = P2P_SEND_ACTION_SUCCESS;
|
|
|
|
break;
|
|
|
|
case OFFCHANNEL_SEND_ACTION_NO_ACK:
|
|
|
|
res = P2P_SEND_ACTION_NO_ACK;
|
|
|
|
break;
|
|
|
|
case OFFCHANNEL_SEND_ACTION_FAILED:
|
|
|
|
res = P2P_SEND_ACTION_FAILED;
|
|
|
|
break;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2011-09-29 18:22:08 +02:00
|
|
|
p2p_send_action_cb(wpa_s->global->p2p, freq, dst, src, bssid, res);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-02-05 19:52:24 +01:00
|
|
|
if (result != OFFCHANNEL_SEND_ACTION_SUCCESS &&
|
|
|
|
wpa_s->pending_pd_before_join &&
|
2011-09-29 18:22:08 +02:00
|
|
|
(os_memcmp(dst, wpa_s->pending_join_dev_addr, ETH_ALEN) == 0 ||
|
2012-11-22 23:53:42 +01:00
|
|
|
os_memcmp(dst, wpa_s->pending_join_iface_addr, ETH_ALEN) == 0) &&
|
|
|
|
wpa_s->p2p_fallback_to_go_neg) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->pending_pd_before_join = 0;
|
2012-11-22 23:53:42 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No ACK for PD Req "
|
|
|
|
"during p2p_connect-auto");
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2015-02-08 11:04:15 +01:00
|
|
|
P2P_EVENT_FALLBACK_TO_GO_NEG
|
|
|
|
"reason=no-ACK-to-PD-Req");
|
2012-11-22 23:53:42 +01:00
|
|
|
wpas_p2p_fallback_to_go_neg(wpa_s, 0);
|
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-07 08:39:30 +01:00
|
|
|
static void wpas_send_action_cb(struct wpa_radio_work *work, int deinit)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = work->wpa_s;
|
|
|
|
struct send_action_work *awork = work->ctx;
|
|
|
|
|
|
|
|
if (deinit) {
|
2014-02-13 10:24:00 +01:00
|
|
|
if (work->started) {
|
|
|
|
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
wpa_s->p2p_send_action_work = NULL;
|
|
|
|
offchannel_send_action_done(wpa_s);
|
|
|
|
}
|
2014-01-07 08:39:30 +01:00
|
|
|
os_free(awork);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offchannel_send_action(wpa_s, awork->freq, awork->dst, awork->src,
|
|
|
|
awork->bssid, awork->buf, awork->len,
|
|
|
|
awork->wait_time,
|
|
|
|
wpas_p2p_send_action_tx_status, 1) < 0) {
|
|
|
|
os_free(awork);
|
|
|
|
radio_work_done(work);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_s->p2p_send_action_work = work;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_send_action_work(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int freq, const u8 *dst,
|
|
|
|
const u8 *src, const u8 *bssid, const u8 *buf,
|
|
|
|
size_t len, unsigned int wait_time)
|
|
|
|
{
|
|
|
|
struct send_action_work *awork;
|
|
|
|
|
2019-05-09 13:05:03 +02:00
|
|
|
if (radio_work_pending(wpa_s, "p2p-send-action")) {
|
2014-01-07 08:39:30 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cannot schedule new p2p-send-action work since one is already pending");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
awork = os_zalloc(sizeof(*awork) + len);
|
|
|
|
if (awork == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
awork->freq = freq;
|
|
|
|
os_memcpy(awork->dst, dst, ETH_ALEN);
|
|
|
|
os_memcpy(awork->src, src, ETH_ALEN);
|
|
|
|
os_memcpy(awork->bssid, bssid, ETH_ALEN);
|
|
|
|
awork->len = len;
|
|
|
|
awork->wait_time = wait_time;
|
|
|
|
os_memcpy(awork->buf, buf, len);
|
|
|
|
|
2019-05-09 13:26:45 +02:00
|
|
|
if (radio_add_work(wpa_s, freq, "p2p-send-action", 1,
|
2014-01-07 08:39:30 +01:00
|
|
|
wpas_send_action_cb, awork) < 0) {
|
|
|
|
os_free(awork);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static int wpas_send_action(void *ctx, unsigned int freq, const u8 *dst,
|
|
|
|
const u8 *src, const u8 *bssid, const u8 *buf,
|
2019-02-17 15:53:03 +01:00
|
|
|
size_t len, unsigned int wait_time, int *scheduled)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2014-01-07 08:39:30 +01:00
|
|
|
int listen_freq = -1, send_freq = -1;
|
|
|
|
|
2019-02-17 15:53:03 +01:00
|
|
|
if (scheduled)
|
|
|
|
*scheduled = 0;
|
2014-01-07 08:39:30 +01:00
|
|
|
if (wpa_s->p2p_listen_work)
|
|
|
|
listen_freq = wpa_s->p2p_listen_work->freq;
|
|
|
|
if (wpa_s->p2p_send_action_work)
|
|
|
|
send_freq = wpa_s->p2p_send_action_work->freq;
|
|
|
|
if (listen_freq != (int) freq && send_freq != (int) freq) {
|
2019-02-17 15:53:03 +01:00
|
|
|
int res;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Schedule new radio work for Action frame TX (listen_freq=%d send_freq=%d freq=%u)",
|
|
|
|
listen_freq, send_freq, freq);
|
|
|
|
res = wpas_send_action_work(wpa_s, freq, dst, src, bssid, buf,
|
|
|
|
len, wait_time);
|
|
|
|
if (res == 0 && scheduled)
|
|
|
|
*scheduled = 1;
|
|
|
|
return res;
|
2014-01-07 08:39:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use ongoing radio work for Action frame TX");
|
2011-09-29 18:22:08 +02:00
|
|
|
return offchannel_send_action(wpa_s, freq, dst, src, bssid, buf, len,
|
|
|
|
wait_time,
|
2011-10-29 20:49:46 +02:00
|
|
|
wpas_p2p_send_action_tx_status, 1);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_send_action_done(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2014-01-07 08:39:30 +01:00
|
|
|
|
|
|
|
if (wpa_s->p2p_send_action_work) {
|
|
|
|
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
os_free(wpa_s->p2p_send_action_work->ctx);
|
|
|
|
radio_work_done(wpa_s->p2p_send_action_work);
|
|
|
|
wpa_s->p2p_send_action_work = NULL;
|
|
|
|
}
|
|
|
|
|
2011-09-29 18:22:08 +02:00
|
|
|
offchannel_send_action_done(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_copy_go_neg_results(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params)
|
|
|
|
{
|
|
|
|
if (wpa_s->go_params == NULL) {
|
|
|
|
wpa_s->go_params = os_malloc(sizeof(*params));
|
|
|
|
if (wpa_s->go_params == NULL)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
os_memcpy(wpa_s->go_params, params, sizeof(*params));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_start_wps_enrollee(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *res)
|
|
|
|
{
|
2014-10-01 14:36:53 +02:00
|
|
|
wpa_s->group_formation_reported = 0;
|
2013-09-08 00:44:29 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR
|
2013-09-08 18:45:04 +02:00
|
|
|
" dev_addr " MACSTR " wps_method %d",
|
2013-09-08 00:44:29 +02:00
|
|
|
MAC2STR(res->peer_interface_addr),
|
2013-09-08 18:45:04 +02:00
|
|
|
MAC2STR(res->peer_device_addr), res->wps_method);
|
2010-08-05 18:15:11 +02:00
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, "P2P: Start WPS Enrollee for SSID",
|
|
|
|
res->ssid, res->ssid_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_supplicant_ap_deinit(wpa_s);
|
|
|
|
wpas_copy_go_neg_results(wpa_s, res);
|
2013-04-27 17:50:14 +02:00
|
|
|
if (res->wps_method == WPS_PBC) {
|
2019-02-12 15:35:25 +01:00
|
|
|
wpas_wps_start_pbc(wpa_s, res->peer_interface_addr, 1, 0);
|
2013-04-27 17:50:14 +02:00
|
|
|
#ifdef CONFIG_WPS_NFC
|
|
|
|
} else if (res->wps_method == WPS_NFC) {
|
2013-09-08 00:44:29 +02:00
|
|
|
wpas_wps_start_nfc(wpa_s, res->peer_device_addr,
|
|
|
|
res->peer_interface_addr,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw,
|
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw_id, 1,
|
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw_id ==
|
2013-04-27 17:50:14 +02:00
|
|
|
DEV_PW_NFC_CONNECTION_HANDOVER ?
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev->p2p_peer_oob_pubkey_hash :
|
2013-04-27 17:50:14 +02:00
|
|
|
NULL,
|
2013-11-28 16:48:35 +01:00
|
|
|
NULL, 0, 0);
|
2013-04-27 17:50:14 +02:00
|
|
|
#endif /* CONFIG_WPS_NFC */
|
|
|
|
} else {
|
2010-06-27 07:49:41 +02:00
|
|
|
u16 dev_pw_id = DEV_PW_DEFAULT;
|
2014-09-11 17:27:44 +02:00
|
|
|
if (wpa_s->p2p_wps_method == WPS_P2PS)
|
|
|
|
dev_pw_id = DEV_PW_P2PS_DEFAULT;
|
2010-06-27 07:49:41 +02:00
|
|
|
if (wpa_s->p2p_wps_method == WPS_PIN_KEYPAD)
|
|
|
|
dev_pw_id = DEV_PW_REGISTRAR_SPECIFIED;
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_wps_start_pin(wpa_s, res->peer_interface_addr,
|
2010-06-27 07:49:41 +02:00
|
|
|
wpa_s->p2p_pin, 1, dev_pw_id);
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-01 12:40:33 +02:00
|
|
|
static void wpas_p2p_add_psk_list(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *persistent;
|
|
|
|
struct psk_list_entry *psk;
|
|
|
|
struct hostapd_data *hapd;
|
|
|
|
|
|
|
|
if (!wpa_s->ap_iface)
|
|
|
|
return;
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
persistent = wpas_p2p_get_persistent(wpa_s->p2pdev, NULL, ssid->ssid,
|
2013-09-01 12:40:33 +02:00
|
|
|
ssid->ssid_len);
|
|
|
|
if (persistent == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hapd = wpa_s->ap_iface->bss[0];
|
|
|
|
|
|
|
|
dl_list_for_each(psk, &persistent->psk_list, struct psk_list_entry,
|
|
|
|
list) {
|
|
|
|
struct hostapd_wpa_psk *hpsk;
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Add persistent group PSK entry for "
|
|
|
|
MACSTR " psk=%d",
|
|
|
|
MAC2STR(psk->addr), psk->p2p);
|
|
|
|
hpsk = os_zalloc(sizeof(*hpsk));
|
|
|
|
if (hpsk == NULL)
|
|
|
|
break;
|
|
|
|
os_memcpy(hpsk->psk, psk->psk, PMK_LEN);
|
|
|
|
if (psk->p2p)
|
|
|
|
os_memcpy(hpsk->p2p_dev_addr, psk->addr, ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memcpy(hpsk->addr, psk->addr, ETH_ALEN);
|
|
|
|
hpsk->next = hapd->conf->ssid.wpa_psk;
|
|
|
|
hapd->conf->ssid.wpa_psk = hpsk;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-07-07 13:20:59 +02:00
|
|
|
static void p2p_go_dump_common_freqs(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2018-06-15 20:55:26 +02:00
|
|
|
char buf[20 + P2P_MAX_CHANNELS * 6];
|
|
|
|
char *pos, *end;
|
2014-07-07 13:20:59 +02:00
|
|
|
unsigned int i;
|
2018-06-15 20:55:26 +02:00
|
|
|
int res;
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
end = pos + sizeof(buf);
|
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
|
|
|
res = os_snprintf(pos, end - pos, " %d",
|
|
|
|
wpa_s->p2p_group_common_freqs[i]);
|
|
|
|
if (os_snprintf_error(end - pos, res))
|
|
|
|
break;
|
|
|
|
pos += res;
|
|
|
|
}
|
|
|
|
*pos = '\0';
|
2014-07-07 13:20:59 +02:00
|
|
|
|
2018-06-15 20:55:26 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Common group frequencies:%s", buf);
|
2014-07-07 13:20:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void p2p_go_save_group_common_freqs(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params)
|
|
|
|
{
|
|
|
|
unsigned int i, len = int_array_len(wpa_s->go_params->freq_list);
|
|
|
|
|
|
|
|
wpa_s->p2p_group_common_freqs_num = 0;
|
|
|
|
os_free(wpa_s->p2p_group_common_freqs);
|
|
|
|
wpa_s->p2p_group_common_freqs = os_calloc(len, sizeof(int));
|
|
|
|
if (!wpa_s->p2p_group_common_freqs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
if (!wpa_s->go_params->freq_list[i])
|
|
|
|
break;
|
|
|
|
wpa_s->p2p_group_common_freqs[i] =
|
|
|
|
wpa_s->go_params->freq_list[i];
|
|
|
|
}
|
|
|
|
wpa_s->p2p_group_common_freqs_num = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 14:38:17 +01:00
|
|
|
static void p2p_config_write(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
#ifndef CONFIG_NO_CONFIG_WRITE
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2pdev->conf->update_config &&
|
|
|
|
wpa_config_write(wpa_s->p2pdev->confname, wpa_s->p2pdev->conf))
|
2014-12-10 14:38:17 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
|
|
|
|
#endif /* CONFIG_NO_CONFIG_WRITE */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static void p2p_go_configured(void *ctx, void *data)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct p2p_go_neg_results *params = data;
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
2015-11-30 00:25:24 +01:00
|
|
|
wpa_s->ap_configured_cb = NULL;
|
|
|
|
wpa_s->ap_configured_cb_ctx = NULL;
|
|
|
|
wpa_s->ap_configured_cb_data = NULL;
|
|
|
|
if (!wpa_s->go_params) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"P2P: p2p_go_configured() called with wpa_s->go_params == NULL");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-07-07 13:20:59 +02:00
|
|
|
p2p_go_save_group_common_freqs(wpa_s, params);
|
|
|
|
p2p_go_dump_common_freqs(wpa_s);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid && ssid->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Group setup without provisioning");
|
2010-11-18 11:41:27 +01:00
|
|
|
if (wpa_s->global->p2p_group_formation == wpa_s)
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
2014-07-26 12:09:17 +02:00
|
|
|
wpas_p2p_group_started(wpa_s, 1, ssid, ssid->frequency,
|
|
|
|
params->passphrase[0] == '\0' ?
|
|
|
|
params->psk : NULL,
|
|
|
|
params->passphrase,
|
|
|
|
wpa_s->global->p2p_dev_addr,
|
|
|
|
params->persistent_group, "");
|
2014-10-01 14:36:53 +02:00
|
|
|
wpa_s->group_formation_reported = 1;
|
2011-06-12 23:35:37 +02:00
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2pdev->p2ps_method_config_any) {
|
|
|
|
if (is_zero_ether_addr(wpa_s->p2pdev->p2ps_join_addr)) {
|
2015-07-30 08:00:06 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2PS: Setting default PIN for ANY");
|
|
|
|
wpa_supplicant_ap_wps_pin(wpa_s, NULL,
|
|
|
|
"12345670", NULL, 0,
|
|
|
|
0);
|
|
|
|
} else {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2PS: Setting default PIN for " MACSTR,
|
2016-01-24 16:36:49 +01:00
|
|
|
MAC2STR(wpa_s->p2pdev->p2ps_join_addr));
|
2015-07-30 08:00:06 +02:00
|
|
|
wpa_supplicant_ap_wps_pin(
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s, wpa_s->p2pdev->p2ps_join_addr,
|
2015-07-30 08:00:06 +02:00
|
|
|
"12345670", NULL, 0, 0);
|
|
|
|
}
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev->p2ps_method_config_any = 0;
|
2014-12-15 12:40:31 +01:00
|
|
|
}
|
|
|
|
|
2013-12-16 21:08:40 +01:00
|
|
|
os_get_reltime(&wpa_s->global->p2p_go_wait_client);
|
2013-09-01 12:40:33 +02:00
|
|
|
if (params->persistent_group) {
|
2016-05-30 09:38:31 +02:00
|
|
|
wpas_p2p_store_persistent_group(
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, ssid,
|
2011-12-25 22:58:03 +01:00
|
|
|
wpa_s->global->p2p_dev_addr);
|
2013-09-01 12:40:33 +02:00
|
|
|
wpas_p2p_add_psk_list(wpa_s, ssid);
|
|
|
|
}
|
2016-05-30 09:38:31 +02:00
|
|
|
|
|
|
|
wpas_notify_p2p_group_started(wpa_s, ssid,
|
2016-11-02 11:20:28 +01:00
|
|
|
params->persistent_group, 0,
|
|
|
|
NULL);
|
2010-07-10 19:19:34 +02:00
|
|
|
wpas_p2p_cross_connect_setup(wpa_s);
|
2010-10-25 17:24:15 +02:00
|
|
|
wpas_p2p_set_group_idle_timeout(wpa_s);
|
2013-09-26 20:24:09 +02:00
|
|
|
|
|
|
|
if (wpa_s->p2p_first_connection_timeout) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Start group formation timeout of %d seconds until first data connection on GO",
|
|
|
|
wpa_s->p2p_first_connection_timeout);
|
|
|
|
wpa_s->p2p_go_group_formation_completed = 0;
|
|
|
|
wpa_s->global->p2p_group_formation = wpa_s;
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-09-26 20:24:09 +02:00
|
|
|
eloop_register_timeout(
|
|
|
|
wpa_s->p2p_first_connection_timeout, 0,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-09-26 20:24:09 +02:00
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Setting up WPS for GO provisioning");
|
|
|
|
if (wpa_supplicant_ap_mac_addr_filter(wpa_s,
|
|
|
|
params->peer_interface_addr)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to setup MAC address "
|
|
|
|
"filtering");
|
|
|
|
return;
|
|
|
|
}
|
2013-04-27 17:50:14 +02:00
|
|
|
if (params->wps_method == WPS_PBC) {
|
2011-02-07 17:28:36 +01:00
|
|
|
wpa_supplicant_ap_wps_pbc(wpa_s, params->peer_interface_addr,
|
2011-12-11 11:03:18 +01:00
|
|
|
params->peer_device_addr);
|
2013-04-27 17:50:14 +02:00
|
|
|
#ifdef CONFIG_WPS_NFC
|
|
|
|
} else if (params->wps_method == WPS_NFC) {
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2pdev->p2p_oob_dev_pw_id !=
|
2013-04-27 17:50:14 +02:00
|
|
|
DEV_PW_NFC_CONNECTION_HANDOVER &&
|
2016-01-24 16:36:49 +01:00
|
|
|
!wpa_s->p2pdev->p2p_oob_dev_pw) {
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No NFC Dev Pw known");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpas_ap_wps_add_nfc_pw(
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s, wpa_s->p2pdev->p2p_oob_dev_pw_id,
|
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw,
|
|
|
|
wpa_s->p2pdev->p2p_peer_oob_pk_hash_known ?
|
|
|
|
wpa_s->p2pdev->p2p_peer_oob_pubkey_hash : NULL);
|
2013-04-27 17:50:14 +02:00
|
|
|
#endif /* CONFIG_WPS_NFC */
|
|
|
|
} else if (wpa_s->p2p_pin[0])
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_supplicant_ap_wps_pin(wpa_s, params->peer_interface_addr,
|
2012-10-10 16:22:35 +02:00
|
|
|
wpa_s->p2p_pin, NULL, 0, 0);
|
2010-07-18 23:30:25 +02:00
|
|
|
os_free(wpa_s->go_params);
|
|
|
|
wpa_s->go_params = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-17 19:44:14 +02:00
|
|
|
/**
|
|
|
|
* wpas_p2p_freq_to_edmg_channel - Convert frequency into EDMG channel
|
|
|
|
* @freq: Frequency (MHz) to convert
|
|
|
|
* @op_class: Buffer for returning operating class
|
|
|
|
* @op_edmg_channel: Buffer for returning channel number
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This can be used to find the highest channel bonding which includes the
|
|
|
|
* specified frequency.
|
|
|
|
*/
|
|
|
|
static int wpas_p2p_freq_to_edmg_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int freq,
|
|
|
|
u8 *op_class, u8 *op_edmg_channel)
|
|
|
|
{
|
|
|
|
struct hostapd_hw_modes *hwmode;
|
|
|
|
struct ieee80211_edmg_config edmg;
|
|
|
|
unsigned int i;
|
|
|
|
enum chan_width chanwidth[] = {
|
|
|
|
CHAN_WIDTH_8640,
|
|
|
|
CHAN_WIDTH_6480,
|
|
|
|
CHAN_WIDTH_4320,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!wpa_s->hw.modes)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
hwmode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes,
|
2020-12-11 16:18:09 +01:00
|
|
|
HOSTAPD_MODE_IEEE80211AD, false);
|
2019-10-17 19:44:14 +02:00
|
|
|
if (!hwmode) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"Unsupported AP mode: HOSTAPD_MODE_IEEE80211AD");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find the highest EDMG channel bandwidth to start the P2P GO */
|
|
|
|
for (i = 0; i < ARRAY_SIZE(chanwidth); i++) {
|
|
|
|
if (ieee80211_chaninfo_to_channel(freq, chanwidth[i], 0,
|
|
|
|
op_class,
|
|
|
|
op_edmg_channel) < 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
hostapd_encode_edmg_chan(1, *op_edmg_channel, 0, &edmg);
|
|
|
|
if (edmg.channels &&
|
|
|
|
ieee802_edmg_is_allowed(hwmode->edmg, edmg)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Freq %u to EDMG channel %u at opclass %u",
|
|
|
|
freq, *op_edmg_channel, *op_class);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_try_edmg_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params)
|
|
|
|
{
|
|
|
|
u8 op_channel, op_class;
|
|
|
|
int freq;
|
|
|
|
|
|
|
|
/* Try social channel as primary channel frequency */
|
|
|
|
freq = (!params->freq) ? 58320 + 1 * 2160 : params->freq;
|
|
|
|
|
|
|
|
if (wpas_p2p_freq_to_edmg_channel(wpa_s, freq, &op_class,
|
|
|
|
&op_channel) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Freq %d will be used to set an EDMG connection (channel=%u opclass=%u)",
|
|
|
|
freq, op_channel, op_class);
|
|
|
|
params->freq = freq;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static void wpas_start_wps_go(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params,
|
|
|
|
int group_formation)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
2012-09-24 00:05:51 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Starting GO");
|
|
|
|
if (wpas_copy_go_neg_results(wpa_s, params) < 0) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Could not copy GO Negotiation "
|
|
|
|
"results");
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
2012-09-24 00:05:51 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
ssid = wpa_config_add_network(wpa_s->conf);
|
2012-09-24 00:05:51 +02:00
|
|
|
if (ssid == NULL) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Could not add network for GO");
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
2012-09-24 00:05:51 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-12-01 09:46:06 +01:00
|
|
|
wpa_s->show_group_started = 0;
|
2014-10-10 14:53:22 +02:00
|
|
|
wpa_s->p2p_go_group_formation_completed = 0;
|
2014-10-01 14:36:53 +02:00
|
|
|
wpa_s->group_formation_reported = 0;
|
2015-08-02 18:25:41 +02:00
|
|
|
os_memset(wpa_s->go_dev_addr, 0, ETH_ALEN);
|
2011-12-01 09:46:06 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_config_set_network_defaults(ssid);
|
|
|
|
ssid->temporary = 1;
|
|
|
|
ssid->p2p_group = 1;
|
2016-09-20 17:00:22 +02:00
|
|
|
ssid->p2p_persistent_group = !!params->persistent_group;
|
2010-07-18 23:30:25 +02:00
|
|
|
ssid->mode = group_formation ? WPAS_MODE_P2P_GROUP_FORMATION :
|
|
|
|
WPAS_MODE_P2P_GO;
|
|
|
|
ssid->frequency = params->freq;
|
2012-08-15 21:53:01 +02:00
|
|
|
ssid->ht40 = params->ht40;
|
2013-10-27 18:46:17 +01:00
|
|
|
ssid->vht = params->vht;
|
2015-10-28 22:14:10 +01:00
|
|
|
ssid->max_oper_chwidth = params->max_oper_chwidth;
|
|
|
|
ssid->vht_center_freq2 = params->vht_center_freq2;
|
2018-12-21 19:20:28 +01:00
|
|
|
ssid->he = params->he;
|
2019-10-17 19:44:14 +02:00
|
|
|
if (params->edmg) {
|
|
|
|
u8 op_channel, op_class;
|
|
|
|
|
|
|
|
if (!wpas_p2p_freq_to_edmg_channel(wpa_s, params->freq,
|
|
|
|
&op_class, &op_channel)) {
|
|
|
|
ssid->edmg_channel = op_channel;
|
|
|
|
ssid->enable_edmg = params->edmg;
|
|
|
|
} else {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Could not match EDMG channel, freq %d, for GO",
|
|
|
|
params->freq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
ssid->ssid = os_zalloc(params->ssid_len + 1);
|
|
|
|
if (ssid->ssid) {
|
|
|
|
os_memcpy(ssid->ssid, params->ssid, params->ssid_len);
|
|
|
|
ssid->ssid_len = params->ssid_len;
|
|
|
|
}
|
|
|
|
ssid->auth_alg = WPA_AUTH_ALG_OPEN;
|
|
|
|
ssid->key_mgmt = WPA_KEY_MGMT_PSK;
|
|
|
|
ssid->proto = WPA_PROTO_RSN;
|
|
|
|
ssid->pairwise_cipher = WPA_CIPHER_CCMP;
|
2014-10-26 13:04:29 +01:00
|
|
|
ssid->group_cipher = WPA_CIPHER_CCMP;
|
|
|
|
if (params->freq > 56160) {
|
|
|
|
/*
|
|
|
|
* Enable GCMP instead of CCMP as pairwise_cipher and
|
|
|
|
* group_cipher in 60 GHz.
|
|
|
|
*/
|
|
|
|
ssid->pairwise_cipher = WPA_CIPHER_GCMP;
|
|
|
|
ssid->group_cipher = WPA_CIPHER_GCMP;
|
2016-02-08 11:30:04 +01:00
|
|
|
/* P2P GO in 60 GHz is always a PCP (PBSS) */
|
|
|
|
ssid->pbss = 1;
|
2014-10-26 13:04:29 +01:00
|
|
|
}
|
2012-12-25 13:15:07 +01:00
|
|
|
if (os_strlen(params->passphrase) > 0) {
|
|
|
|
ssid->passphrase = os_strdup(params->passphrase);
|
|
|
|
if (ssid->passphrase == NULL) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_ERROR,
|
|
|
|
"P2P: Failed to copy passphrase for GO");
|
2012-12-25 13:15:07 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf, ssid->id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
ssid->passphrase = NULL;
|
2012-11-11 10:39:24 +01:00
|
|
|
ssid->psk_set = params->psk_set;
|
|
|
|
if (ssid->psk_set)
|
|
|
|
os_memcpy(ssid->psk, params->psk, sizeof(ssid->psk));
|
2012-12-25 18:35:15 +01:00
|
|
|
else if (ssid->passphrase)
|
2012-11-11 10:39:24 +01:00
|
|
|
wpa_config_update_psk(ssid);
|
2016-01-24 16:36:49 +01:00
|
|
|
ssid->ap_max_inactivity = wpa_s->p2pdev->conf->p2p_go_max_inactivity;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
wpa_s->ap_configured_cb = p2p_go_configured;
|
|
|
|
wpa_s->ap_configured_cb_ctx = wpa_s;
|
|
|
|
wpa_s->ap_configured_cb_data = wpa_s->go_params;
|
2014-05-14 01:13:18 +02:00
|
|
|
wpa_s->scan_req = NORMAL_SCAN_REQ;
|
2011-06-21 10:47:03 +02:00
|
|
|
wpa_s->connect_without_scan = ssid;
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->reassociate = 1;
|
|
|
|
wpa_s->disconnected = 0;
|
2012-09-24 00:05:51 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Request scan (that will be skipped) to "
|
|
|
|
"start GO)");
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_supplicant_req_scan(wpa_s, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_clone_config(struct wpa_supplicant *dst,
|
|
|
|
const struct wpa_supplicant *src)
|
|
|
|
{
|
|
|
|
struct wpa_config *d;
|
|
|
|
const struct wpa_config *s;
|
|
|
|
|
|
|
|
d = dst->conf;
|
|
|
|
s = src->conf;
|
|
|
|
|
2016-04-07 12:32:08 +02:00
|
|
|
#define C(n) \
|
|
|
|
do { \
|
|
|
|
if (s->n && !d->n) \
|
|
|
|
d->n = os_strdup(s->n); \
|
|
|
|
} while (0)
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
C(device_name);
|
|
|
|
C(manufacturer);
|
|
|
|
C(model_name);
|
|
|
|
C(model_number);
|
|
|
|
C(serial_number);
|
|
|
|
C(config_methods);
|
|
|
|
#undef C
|
2010-10-25 17:24:15 +02:00
|
|
|
|
2011-03-17 17:50:22 +01:00
|
|
|
os_memcpy(d->device_type, s->device_type, WPS_DEV_TYPE_LEN);
|
|
|
|
os_memcpy(d->sec_device_type, s->sec_device_type,
|
|
|
|
sizeof(d->sec_device_type));
|
|
|
|
d->num_sec_device_types = s->num_sec_device_types;
|
|
|
|
|
2010-10-25 17:24:15 +02:00
|
|
|
d->p2p_group_idle = s->p2p_group_idle;
|
2015-07-27 21:24:19 +02:00
|
|
|
d->p2p_go_freq_change_policy = s->p2p_go_freq_change_policy;
|
2010-11-04 15:53:09 +01:00
|
|
|
d->p2p_intra_bss = s->p2p_intra_bss;
|
2011-10-24 16:29:37 +02:00
|
|
|
d->persistent_reconnect = s->persistent_reconnect;
|
2012-05-03 15:41:15 +02:00
|
|
|
d->max_num_sta = s->max_num_sta;
|
2012-05-03 15:51:04 +02:00
|
|
|
d->pbc_in_m1 = s->pbc_in_m1;
|
2013-03-31 16:52:23 +02:00
|
|
|
d->ignore_old_scan_res = s->ignore_old_scan_res;
|
2013-05-04 10:25:29 +02:00
|
|
|
d->beacon_int = s->beacon_int;
|
2014-01-22 15:05:44 +01:00
|
|
|
d->dtim_period = s->dtim_period;
|
2015-02-18 03:35:12 +01:00
|
|
|
d->p2p_go_ctwindow = s->p2p_go_ctwindow;
|
2013-08-25 08:28:50 +02:00
|
|
|
d->disassoc_low_ack = s->disassoc_low_ack;
|
2013-10-03 01:14:55 +02:00
|
|
|
d->disable_scan_offload = s->disable_scan_offload;
|
2015-01-22 19:50:01 +01:00
|
|
|
d->passive_scan = s->passive_scan;
|
2013-07-11 16:01:49 +02:00
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
if (s->wps_nfc_dh_privkey && s->wps_nfc_dh_pubkey &&
|
2016-04-07 12:32:08 +02:00
|
|
|
!d->wps_nfc_pw_from_config) {
|
|
|
|
wpabuf_free(d->wps_nfc_dh_privkey);
|
|
|
|
wpabuf_free(d->wps_nfc_dh_pubkey);
|
2016-01-24 16:36:49 +01:00
|
|
|
d->wps_nfc_dh_privkey = wpabuf_dup(s->wps_nfc_dh_privkey);
|
|
|
|
d->wps_nfc_dh_pubkey = wpabuf_dup(s->wps_nfc_dh_pubkey);
|
|
|
|
}
|
2016-04-07 12:32:08 +02:00
|
|
|
d->p2p_cli_probe = s->p2p_cli_probe;
|
2017-07-31 14:35:05 +02:00
|
|
|
d->go_interworking = s->go_interworking;
|
|
|
|
d->go_access_network_type = s->go_access_network_type;
|
|
|
|
d->go_internet = s->go_internet;
|
|
|
|
d->go_venue_group = s->go_venue_group;
|
|
|
|
d->go_venue_type = s->go_venue_type;
|
2020-09-24 12:38:27 +02:00
|
|
|
d->p2p_add_cli_chan = s->p2p_add_cli_chan;
|
2016-01-24 16:36:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-30 09:19:31 +02:00
|
|
|
static void wpas_p2p_get_group_ifname(struct wpa_supplicant *wpa_s,
|
|
|
|
char *ifname, size_t len)
|
|
|
|
{
|
|
|
|
char *ifname_ptr = wpa_s->ifname;
|
|
|
|
|
|
|
|
if (os_strncmp(wpa_s->ifname, P2P_MGMT_DEVICE_PREFIX,
|
|
|
|
os_strlen(P2P_MGMT_DEVICE_PREFIX)) == 0) {
|
|
|
|
ifname_ptr = os_strrchr(wpa_s->ifname, '-') + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_snprintf(ifname, len, "p2p-%s-%d", ifname_ptr, wpa_s->p2p_group_idx);
|
|
|
|
if (os_strlen(ifname) >= IFNAMSIZ &&
|
|
|
|
os_strlen(wpa_s->ifname) < IFNAMSIZ) {
|
2014-12-06 20:40:31 +01:00
|
|
|
int res;
|
|
|
|
|
2013-06-30 09:19:31 +02:00
|
|
|
/* Try to avoid going over the IFNAMSIZ length limit */
|
2014-12-06 20:40:31 +01:00
|
|
|
res = os_snprintf(ifname, len, "p2p-%d", wpa_s->p2p_group_idx);
|
|
|
|
if (os_snprintf_error(len, res) && len)
|
|
|
|
ifname[len - 1] = '\0';
|
2013-06-30 09:19:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static int wpas_p2p_add_group_interface(struct wpa_supplicant *wpa_s,
|
|
|
|
enum wpa_driver_if_type type)
|
|
|
|
{
|
|
|
|
char ifname[120], force_ifname[120];
|
|
|
|
|
|
|
|
if (wpa_s->pending_interface_name[0]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Pending virtual interface exists "
|
|
|
|
"- skip creation of a new one");
|
|
|
|
if (is_zero_ether_addr(wpa_s->pending_interface_addr)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Pending virtual address "
|
|
|
|
"unknown?! ifname='%s'",
|
|
|
|
wpa_s->pending_interface_name);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-06-30 09:19:31 +02:00
|
|
|
wpas_p2p_get_group_ifname(wpa_s, ifname, sizeof(ifname));
|
2010-07-18 23:30:25 +02:00
|
|
|
force_ifname[0] = '\0';
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Create a new interface %s for the group",
|
|
|
|
ifname);
|
|
|
|
wpa_s->p2p_group_idx++;
|
|
|
|
|
|
|
|
wpa_s->pending_interface_type = type;
|
|
|
|
if (wpa_drv_if_add(wpa_s, type, ifname, NULL, NULL, force_ifname,
|
2011-03-15 12:02:49 +01:00
|
|
|
wpa_s->pending_interface_addr, NULL) < 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to create new group "
|
|
|
|
"interface");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-11-29 09:46:43 +01:00
|
|
|
if (wpa_s->conf->p2p_interface_random_mac_addr) {
|
|
|
|
random_mac_addr(wpa_s->pending_interface_addr);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Generate random MAC address " MACSTR
|
|
|
|
" for the group",
|
|
|
|
MAC2STR(wpa_s->pending_interface_addr));
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (force_ifname[0]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Driver forced interface name %s",
|
|
|
|
force_ifname);
|
|
|
|
os_strlcpy(wpa_s->pending_interface_name, force_ifname,
|
|
|
|
sizeof(wpa_s->pending_interface_name));
|
|
|
|
} else
|
|
|
|
os_strlcpy(wpa_s->pending_interface_name, ifname,
|
|
|
|
sizeof(wpa_s->pending_interface_name));
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Created pending virtual interface %s addr "
|
|
|
|
MACSTR, wpa_s->pending_interface_name,
|
|
|
|
MAC2STR(wpa_s->pending_interface_addr));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_remove_pending_group_interface(
|
|
|
|
struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (!wpa_s->pending_interface_name[0] ||
|
|
|
|
is_zero_ether_addr(wpa_s->pending_interface_addr))
|
|
|
|
return; /* No pending virtual interface */
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Removing pending group interface %s",
|
|
|
|
wpa_s->pending_interface_name);
|
|
|
|
wpa_drv_if_remove(wpa_s, wpa_s->pending_interface_type,
|
|
|
|
wpa_s->pending_interface_name);
|
|
|
|
os_memset(wpa_s->pending_interface_addr, 0, ETH_ALEN);
|
|
|
|
wpa_s->pending_interface_name[0] = '\0';
|
2014-12-30 13:27:38 +01:00
|
|
|
wpa_s->global->pending_group_iface_for_p2ps = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpa_supplicant *
|
|
|
|
wpas_p2p_init_group_interface(struct wpa_supplicant *wpa_s, int go)
|
|
|
|
{
|
|
|
|
struct wpa_interface iface;
|
|
|
|
struct wpa_supplicant *group_wpa_s;
|
|
|
|
|
|
|
|
if (!wpa_s->pending_interface_name[0]) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: No pending group interface");
|
2010-10-18 16:00:50 +02:00
|
|
|
if (!wpas_p2p_create_iface(wpa_s))
|
|
|
|
return NULL;
|
|
|
|
/*
|
|
|
|
* Something has forced us to remove the pending interface; try
|
|
|
|
* to create a new one and hope for the best that we will get
|
|
|
|
* the same local address.
|
|
|
|
*/
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, go ? WPA_IF_P2P_GO :
|
|
|
|
WPA_IF_P2P_CLIENT) < 0)
|
|
|
|
return NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(&iface, 0, sizeof(iface));
|
|
|
|
iface.ifname = wpa_s->pending_interface_name;
|
|
|
|
iface.driver = wpa_s->driver->name;
|
2013-06-30 22:32:13 +02:00
|
|
|
if (wpa_s->conf->ctrl_interface == NULL &&
|
|
|
|
wpa_s->parent != wpa_s &&
|
|
|
|
wpa_s->p2p_mgmt &&
|
|
|
|
(wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE))
|
|
|
|
iface.ctrl_interface = wpa_s->parent->conf->ctrl_interface;
|
|
|
|
else
|
|
|
|
iface.ctrl_interface = wpa_s->conf->ctrl_interface;
|
2010-07-18 23:30:25 +02:00
|
|
|
iface.driver_param = wpa_s->conf->driver_param;
|
2015-03-01 20:50:34 +01:00
|
|
|
group_wpa_s = wpa_supplicant_add_iface(wpa_s->global, &iface, wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (group_wpa_s == NULL) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to create new "
|
|
|
|
"wpa_supplicant interface");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
wpa_s->pending_interface_name[0] = '\0';
|
|
|
|
group_wpa_s->p2p_group_interface = go ? P2P_GROUP_INTERFACE_GO :
|
|
|
|
P2P_GROUP_INTERFACE_CLIENT;
|
|
|
|
wpa_s->global->p2p_group_formation = group_wpa_s;
|
2014-12-30 13:27:38 +01:00
|
|
|
wpa_s->global->pending_group_iface_for_p2ps = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
wpas_p2p_clone_config(group_wpa_s, wpa_s);
|
|
|
|
|
2018-11-29 09:46:43 +01:00
|
|
|
if (wpa_s->conf->p2p_interface_random_mac_addr) {
|
|
|
|
if (wpa_drv_set_mac_addr(group_wpa_s,
|
|
|
|
wpa_s->pending_interface_addr) < 0) {
|
|
|
|
wpa_msg(group_wpa_s, MSG_INFO,
|
|
|
|
"Failed to set random MAC address");
|
|
|
|
wpa_supplicant_remove_iface(wpa_s->global, group_wpa_s,
|
|
|
|
0);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_supplicant_update_mac_addr(group_wpa_s) < 0) {
|
|
|
|
wpa_msg(group_wpa_s, MSG_INFO,
|
|
|
|
"Could not update MAC address information");
|
|
|
|
wpa_supplicant_remove_iface(wpa_s->global, group_wpa_s,
|
|
|
|
0);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Using random MAC address " MACSTR
|
|
|
|
" for the group",
|
|
|
|
MAC2STR(wpa_s->pending_interface_addr));
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return group_wpa_s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_group_formation_timeout(void *eloop_ctx,
|
|
|
|
void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Group Formation timed out");
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_p2p_group_formation_failed(wpa_s, 0);
|
2013-07-11 15:42:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-15 22:34:11 +02:00
|
|
|
static void wpas_p2p_group_formation_failed(struct wpa_supplicant *wpa_s,
|
|
|
|
int already_deleted)
|
2013-07-11 15:42:13 +02:00
|
|
|
{
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->global->p2p)
|
|
|
|
p2p_group_formation_failed(wpa_s->global->p2p);
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_group_formation_completed(wpa_s, 0, already_deleted);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-06 16:56:50 +01:00
|
|
|
static void wpas_p2p_grpform_fail_after_wps(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Reject group formation due to WPS provisioning failure");
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2014-01-06 16:56:50 +01:00
|
|
|
eloop_register_timeout(0, 0, wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2014-01-06 16:56:50 +01:00
|
|
|
wpa_s->global->p2p_fail_on_wps_complete = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-03 10:17:21 +02:00
|
|
|
void wpas_p2p_ap_setup_failed(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_group_formation != wpa_s)
|
|
|
|
return;
|
|
|
|
/* Speed up group formation timeout since this cannot succeed */
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-09-03 10:17:21 +02:00
|
|
|
eloop_register_timeout(0, 0, wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-09-03 10:17:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-29 17:20:47 +01:00
|
|
|
static void wpas_go_neg_completed(void *ctx, struct p2p_go_neg_results *res)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2016-01-24 16:36:49 +01:00
|
|
|
struct wpa_supplicant *group_wpa_s;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2010-11-05 17:39:15 +01:00
|
|
|
if (wpa_s->off_channel_freq || wpa_s->roc_waiting_drv_freq) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_drv_cancel_remain_on_channel(wpa_s);
|
|
|
|
wpa_s->off_channel_freq = 0;
|
2010-06-24 06:51:38 +02:00
|
|
|
wpa_s->roc_waiting_drv_freq = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (res->status) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_GO_NEG_FAILURE "status=%d",
|
|
|
|
res->status);
|
2011-12-18 15:52:33 +01:00
|
|
|
wpas_notify_p2p_go_neg_completed(wpa_s, res);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-07-24 02:07:55 +02:00
|
|
|
if (!res->role_go) {
|
|
|
|
/* Inform driver of the operating channel of GO. */
|
|
|
|
wpa_drv_set_prob_oper_freq(wpa_s, res->freq);
|
|
|
|
}
|
|
|
|
|
2012-08-15 22:07:44 +02:00
|
|
|
if (wpa_s->p2p_go_ht40)
|
|
|
|
res->ht40 = 1;
|
2013-10-27 18:46:17 +01:00
|
|
|
if (wpa_s->p2p_go_vht)
|
|
|
|
res->vht = 1;
|
2019-07-29 08:59:48 +02:00
|
|
|
if (wpa_s->p2p_go_he)
|
|
|
|
res->he = 1;
|
2019-10-17 19:44:14 +02:00
|
|
|
if (wpa_s->p2p_go_edmg)
|
|
|
|
res->edmg = 1;
|
2015-10-28 22:14:10 +01:00
|
|
|
res->max_oper_chwidth = wpa_s->p2p_go_max_oper_chwidth;
|
|
|
|
res->vht_center_freq2 = wpa_s->p2p_go_vht_center_freq2;
|
2012-08-15 22:07:44 +02:00
|
|
|
|
2013-08-26 12:35:44 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_GO_NEG_SUCCESS "role=%s "
|
|
|
|
"freq=%d ht40=%d peer_dev=" MACSTR " peer_iface=" MACSTR
|
|
|
|
" wps_method=%s",
|
|
|
|
res->role_go ? "GO" : "client", res->freq, res->ht40,
|
|
|
|
MAC2STR(res->peer_device_addr),
|
|
|
|
MAC2STR(res->peer_interface_addr),
|
|
|
|
p2p_wps_method_text(res->wps_method));
|
2011-12-18 15:52:33 +01:00
|
|
|
wpas_notify_p2p_go_neg_completed(wpa_s, res);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-04-27 17:17:10 +02:00
|
|
|
if (res->role_go && wpa_s->p2p_persistent_id >= 0) {
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
ssid = wpa_config_get_network(wpa_s->conf,
|
|
|
|
wpa_s->p2p_persistent_id);
|
|
|
|
if (ssid && ssid->disabled == 2 &&
|
|
|
|
ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
|
|
|
|
size_t len = os_strlen(ssid->passphrase);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
|
|
|
|
"on requested persistent group");
|
|
|
|
os_memcpy(res->passphrase, ssid->passphrase, len);
|
|
|
|
res->passphrase[len] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->create_p2p_iface) {
|
2016-01-24 16:36:49 +01:00
|
|
|
group_wpa_s =
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_init_group_interface(wpa_s, res->role_go);
|
|
|
|
if (group_wpa_s == NULL) {
|
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
2014-03-20 13:43:31 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_long_listen_timeout,
|
|
|
|
wpa_s, NULL);
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_p2p_group_formation_failed(wpa_s, 1);
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
os_memset(wpa_s->pending_interface_addr, 0, ETH_ALEN);
|
|
|
|
wpa_s->pending_interface_name[0] = '\0';
|
|
|
|
} else {
|
2016-01-24 16:36:49 +01:00
|
|
|
group_wpa_s = wpa_s->parent;
|
|
|
|
wpa_s->global->p2p_group_formation = group_wpa_s;
|
|
|
|
if (group_wpa_s != wpa_s)
|
2016-04-07 12:32:08 +02:00
|
|
|
wpas_p2p_clone_config(group_wpa_s, wpa_s);
|
2016-01-24 16:36:49 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
group_wpa_s->p2p_in_provisioning = 1;
|
|
|
|
group_wpa_s->p2pdev = wpa_s;
|
|
|
|
if (group_wpa_s != wpa_s) {
|
|
|
|
os_memcpy(group_wpa_s->p2p_pin, wpa_s->p2p_pin,
|
|
|
|
sizeof(group_wpa_s->p2p_pin));
|
|
|
|
group_wpa_s->p2p_wps_method = wpa_s->p2p_wps_method;
|
|
|
|
}
|
|
|
|
if (res->role_go) {
|
|
|
|
wpas_start_wps_go(group_wpa_s, res, 1);
|
|
|
|
} else {
|
|
|
|
os_get_reltime(&group_wpa_s->scan_min_time);
|
|
|
|
wpas_start_wps_enrollee(group_wpa_s, res);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
|
|
|
|
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s, NULL);
|
2010-09-06 20:04:01 +02:00
|
|
|
eloop_register_timeout(15 + res->peer_config_timeout / 100,
|
|
|
|
(res->peer_config_timeout % 100) * 10000,
|
|
|
|
wpas_p2p_group_formation_timeout, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-02 07:47:33 +02:00
|
|
|
static void wpas_go_neg_req_rx(void *ctx, const u8 *src, u16 dev_passwd_id,
|
|
|
|
u8 go_intent)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_GO_NEG_REQUEST MACSTR
|
2015-06-02 07:47:33 +02:00
|
|
|
" dev_passwd_id=%u go_intent=%u", MAC2STR(src),
|
|
|
|
dev_passwd_id, go_intent);
|
2011-02-24 21:30:19 +01:00
|
|
|
|
2015-06-02 07:47:33 +02:00
|
|
|
wpas_notify_p2p_go_neg_req(wpa_s, src, dev_passwd_id, go_intent);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-29 17:20:47 +01:00
|
|
|
static void wpas_dev_found(void *ctx, const u8 *addr,
|
|
|
|
const struct p2p_peer_info *info,
|
|
|
|
int new_device)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-12-11 17:19:24 +01:00
|
|
|
#ifndef CONFIG_NO_STDOUT_DEBUG
|
2010-07-18 23:30:25 +02:00
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
char devtype[WPS_DEV_TYPE_BUFSIZE];
|
2013-11-25 23:56:38 +01:00
|
|
|
char *wfd_dev_info_hex = NULL;
|
|
|
|
|
|
|
|
#ifdef CONFIG_WIFI_DISPLAY
|
|
|
|
wfd_dev_info_hex = wifi_display_subelem_hex(info->wfd_subelems,
|
|
|
|
WFD_SUBELEM_DEVICE_INFO);
|
|
|
|
#endif /* CONFIG_WIFI_DISPLAY */
|
2011-02-24 20:51:17 +01:00
|
|
|
|
2014-09-11 17:18:50 +02:00
|
|
|
if (info->p2ps_instance) {
|
|
|
|
char str[256];
|
|
|
|
const u8 *buf = wpabuf_head(info->p2ps_instance);
|
|
|
|
size_t len = wpabuf_len(info->p2ps_instance);
|
|
|
|
|
|
|
|
while (len) {
|
|
|
|
u32 id;
|
|
|
|
u16 methods;
|
|
|
|
u8 str_len;
|
|
|
|
|
|
|
|
if (len < 4 + 2 + 1)
|
|
|
|
break;
|
|
|
|
id = WPA_GET_LE32(buf);
|
|
|
|
buf += sizeof(u32);
|
|
|
|
methods = WPA_GET_BE16(buf);
|
|
|
|
buf += sizeof(u16);
|
|
|
|
str_len = *buf++;
|
|
|
|
if (str_len > len - 4 - 2 - 1)
|
|
|
|
break;
|
|
|
|
os_memcpy(str, buf, str_len);
|
|
|
|
str[str_len] = '\0';
|
|
|
|
buf += str_len;
|
|
|
|
len -= str_len + sizeof(u32) + sizeof(u16) + sizeof(u8);
|
|
|
|
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_DEVICE_FOUND MACSTR
|
|
|
|
" p2p_dev_addr=" MACSTR
|
|
|
|
" pri_dev_type=%s name='%s'"
|
|
|
|
" config_methods=0x%x"
|
|
|
|
" dev_capab=0x%x"
|
|
|
|
" group_capab=0x%x"
|
|
|
|
" adv_id=%x asp_svc=%s%s",
|
|
|
|
MAC2STR(addr),
|
|
|
|
MAC2STR(info->p2p_device_addr),
|
|
|
|
wps_dev_type_bin2str(
|
|
|
|
info->pri_dev_type,
|
|
|
|
devtype, sizeof(devtype)),
|
|
|
|
info->device_name, methods,
|
|
|
|
info->dev_capab, info->group_capab,
|
|
|
|
id, str,
|
|
|
|
info->vendor_elems ?
|
|
|
|
" vendor_elems=1" : "");
|
|
|
|
}
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_DEVICE_FOUND MACSTR
|
|
|
|
" p2p_dev_addr=" MACSTR
|
|
|
|
" pri_dev_type=%s name='%s' config_methods=0x%x "
|
2014-10-12 15:45:33 +02:00
|
|
|
"dev_capab=0x%x group_capab=0x%x%s%s%s new=%d",
|
2013-05-18 17:59:51 +02:00
|
|
|
MAC2STR(addr), MAC2STR(info->p2p_device_addr),
|
|
|
|
wps_dev_type_bin2str(info->pri_dev_type, devtype,
|
|
|
|
sizeof(devtype)),
|
2013-11-25 23:56:38 +01:00
|
|
|
info->device_name, info->config_methods,
|
|
|
|
info->dev_capab, info->group_capab,
|
|
|
|
wfd_dev_info_hex ? " wfd_dev_info=0x" : "",
|
2014-07-04 19:14:19 +02:00
|
|
|
wfd_dev_info_hex ? wfd_dev_info_hex : "",
|
2014-10-12 15:45:33 +02:00
|
|
|
info->vendor_elems ? " vendor_elems=1" : "",
|
|
|
|
new_device);
|
2011-02-24 21:08:18 +01:00
|
|
|
|
2014-09-11 17:18:50 +02:00
|
|
|
done:
|
2013-11-25 23:56:38 +01:00
|
|
|
os_free(wfd_dev_info_hex);
|
2014-02-03 13:19:02 +01:00
|
|
|
#endif /* CONFIG_NO_STDOUT_DEBUG */
|
2013-11-25 23:56:38 +01:00
|
|
|
|
2011-02-24 21:08:18 +01:00
|
|
|
wpas_notify_p2p_device_found(ctx, info->p2p_device_addr, new_device);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-02-24 21:22:16 +01:00
|
|
|
static void wpas_dev_lost(void *ctx, const u8 *dev_addr)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_DEVICE_LOST
|
|
|
|
"p2p_dev_addr=" MACSTR, MAC2STR(dev_addr));
|
2011-10-28 21:13:18 +02:00
|
|
|
|
2011-02-24 21:22:16 +01:00
|
|
|
wpas_notify_p2p_device_lost(wpa_s, dev_addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-18 15:06:40 +02:00
|
|
|
static void wpas_find_stopped(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2016-02-29 13:30:04 +01:00
|
|
|
|
|
|
|
if (wpa_s->p2p_scan_work && wpas_abort_ongoing_scan(wpa_s) < 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Abort ongoing scan failed");
|
|
|
|
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_FIND_STOPPED);
|
2015-05-13 14:03:48 +02:00
|
|
|
wpas_notify_p2p_find_stopped(wpa_s);
|
2013-05-18 15:06:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-04 08:36:13 +01:00
|
|
|
struct wpas_p2p_listen_work {
|
|
|
|
unsigned int freq;
|
|
|
|
unsigned int duration;
|
|
|
|
struct wpabuf *probe_resp_ie;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_listen_work_free(struct wpas_p2p_listen_work *lwork)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2014-01-04 08:36:13 +01:00
|
|
|
if (lwork == NULL)
|
|
|
|
return;
|
|
|
|
wpabuf_free(lwork->probe_resp_ie);
|
|
|
|
os_free(lwork);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_listen_work_done(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpas_p2p_listen_work *lwork;
|
|
|
|
|
|
|
|
if (!wpa_s->p2p_listen_work)
|
|
|
|
return;
|
|
|
|
|
|
|
|
lwork = wpa_s->p2p_listen_work->ctx;
|
|
|
|
wpas_p2p_listen_work_free(lwork);
|
|
|
|
radio_work_done(wpa_s->p2p_listen_work);
|
|
|
|
wpa_s->p2p_listen_work = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_start_listen_cb(struct wpa_radio_work *work, int deinit)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = work->wpa_s;
|
|
|
|
struct wpas_p2p_listen_work *lwork = work->ctx;
|
2014-10-25 20:25:00 +02:00
|
|
|
unsigned int duration;
|
2014-01-04 08:36:13 +01:00
|
|
|
|
|
|
|
if (deinit) {
|
2014-02-13 10:24:00 +01:00
|
|
|
if (work->started) {
|
|
|
|
wpa_s->p2p_listen_work = NULL;
|
|
|
|
wpas_stop_listen(wpa_s);
|
|
|
|
}
|
2014-01-04 08:36:13 +01:00
|
|
|
wpas_p2p_listen_work_free(lwork);
|
|
|
|
return;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2014-01-04 08:36:13 +01:00
|
|
|
wpa_s->p2p_listen_work = work;
|
|
|
|
|
|
|
|
wpa_drv_set_ap_wps_ie(wpa_s, NULL, lwork->probe_resp_ie, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (wpa_drv_probe_req_report(wpa_s, 1) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to request the driver to "
|
|
|
|
"report received Probe Request frames");
|
2014-01-04 08:36:13 +01:00
|
|
|
wpas_p2p_listen_work_done(wpa_s);
|
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2014-01-04 08:36:13 +01:00
|
|
|
wpa_s->pending_listen_freq = lwork->freq;
|
|
|
|
wpa_s->pending_listen_duration = lwork->duration;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2014-10-25 20:25:00 +02:00
|
|
|
duration = lwork->duration;
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
if (wpa_s->extra_roc_dur) {
|
|
|
|
wpa_printf(MSG_DEBUG, "TESTING: Increase ROC duration %u -> %u",
|
|
|
|
duration, duration + wpa_s->extra_roc_dur);
|
|
|
|
duration += wpa_s->extra_roc_dur;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
|
|
|
|
if (wpa_drv_remain_on_channel(wpa_s, lwork->freq, duration) < 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to request the driver "
|
|
|
|
"to remain on channel (%u MHz) for Listen "
|
2014-01-04 08:36:13 +01:00
|
|
|
"state", lwork->freq);
|
|
|
|
wpas_p2p_listen_work_done(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->pending_listen_freq = 0;
|
2014-01-04 08:36:13 +01:00
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2010-11-05 17:39:42 +01:00
|
|
|
wpa_s->off_channel_freq = 0;
|
2014-01-04 08:36:13 +01:00
|
|
|
wpa_s->roc_waiting_drv_freq = lwork->freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_start_listen(void *ctx, unsigned int freq,
|
|
|
|
unsigned int duration,
|
|
|
|
const struct wpabuf *probe_resp_ie)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpas_p2p_listen_work *lwork;
|
|
|
|
|
|
|
|
if (wpa_s->p2p_listen_work) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Reject start_listen since p2p_listen_work already exists");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
lwork = os_zalloc(sizeof(*lwork));
|
|
|
|
if (lwork == NULL)
|
|
|
|
return -1;
|
|
|
|
lwork->freq = freq;
|
|
|
|
lwork->duration = duration;
|
|
|
|
if (probe_resp_ie) {
|
|
|
|
lwork->probe_resp_ie = wpabuf_dup(probe_resp_ie);
|
|
|
|
if (lwork->probe_resp_ie == NULL) {
|
|
|
|
wpas_p2p_listen_work_free(lwork);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (radio_add_work(wpa_s, freq, "p2p-listen", 0, wpas_start_listen_cb,
|
|
|
|
lwork) < 0) {
|
|
|
|
wpas_p2p_listen_work_free(lwork);
|
|
|
|
return -1;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_stop_listen(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2010-10-10 16:52:13 +02:00
|
|
|
if (wpa_s->off_channel_freq || wpa_s->roc_waiting_drv_freq) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_drv_cancel_remain_on_channel(wpa_s);
|
|
|
|
wpa_s->off_channel_freq = 0;
|
2010-06-24 06:51:38 +02:00
|
|
|
wpa_s->roc_waiting_drv_freq = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2011-02-01 17:30:33 +01:00
|
|
|
wpa_drv_set_ap_wps_ie(wpa_s, NULL, NULL, NULL);
|
2015-06-10 10:43:32 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't cancel Probe Request RX reporting for a connected P2P Client
|
|
|
|
* handling Probe Request frames.
|
|
|
|
*/
|
|
|
|
if (!wpa_s->p2p_cli_probe)
|
|
|
|
wpa_drv_probe_req_report(wpa_s, 0);
|
|
|
|
|
2014-01-04 08:36:13 +01:00
|
|
|
wpas_p2p_listen_work_done(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-10 10:43:35 +02:00
|
|
|
static int wpas_send_probe_resp(void *ctx, const struct wpabuf *buf,
|
|
|
|
unsigned int freq)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2015-06-10 10:43:35 +02:00
|
|
|
return wpa_drv_send_mlme(wpa_s, wpabuf_head(buf), wpabuf_len(buf), 1,
|
2020-02-24 10:14:27 +01:00
|
|
|
freq, 0);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_prov_disc_local_display(struct wpa_supplicant *wpa_s,
|
2011-02-02 16:12:37 +01:00
|
|
|
const u8 *peer, const char *params,
|
|
|
|
unsigned int generated_pin)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_SHOW_PIN MACSTR
|
|
|
|
" %08d%s", MAC2STR(peer), generated_pin, params);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_prov_disc_local_keypad(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer, const char *params)
|
|
|
|
{
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_ENTER_PIN MACSTR
|
|
|
|
"%s", MAC2STR(peer), params);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-29 17:20:47 +01:00
|
|
|
static void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
|
|
|
|
const u8 *dev_addr, const u8 *pri_dev_type,
|
|
|
|
const char *dev_name, u16 supp_config_methods,
|
|
|
|
u8 dev_capab, u8 group_capab, const u8 *group_id,
|
|
|
|
size_t group_id_len)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
char devtype[WPS_DEV_TYPE_BUFSIZE];
|
2011-12-06 20:57:17 +01:00
|
|
|
char params[300];
|
2010-07-18 23:30:25 +02:00
|
|
|
u8 empty_dev_type[8];
|
2011-02-02 16:12:37 +01:00
|
|
|
unsigned int generated_pin = 0;
|
2011-12-06 20:57:17 +01:00
|
|
|
struct wpa_supplicant *group = NULL;
|
2014-12-06 20:40:31 +01:00
|
|
|
int res;
|
2011-12-06 20:57:17 +01:00
|
|
|
|
|
|
|
if (group_id) {
|
|
|
|
for (group = wpa_s->global->ifaces; group; group = group->next)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *s = group->current_ssid;
|
|
|
|
if (s != NULL &&
|
|
|
|
s->mode == WPAS_MODE_P2P_GO &&
|
|
|
|
group_id_len - ETH_ALEN == s->ssid_len &&
|
|
|
|
os_memcmp(group_id + ETH_ALEN, s->ssid,
|
|
|
|
s->ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (pri_dev_type == NULL) {
|
|
|
|
os_memset(empty_dev_type, 0, sizeof(empty_dev_type));
|
|
|
|
pri_dev_type = empty_dev_type;
|
|
|
|
}
|
2014-12-06 20:40:31 +01:00
|
|
|
res = os_snprintf(params, sizeof(params), " p2p_dev_addr=" MACSTR
|
|
|
|
" pri_dev_type=%s name='%s' config_methods=0x%x "
|
|
|
|
"dev_capab=0x%x group_capab=0x%x%s%s",
|
|
|
|
MAC2STR(dev_addr),
|
|
|
|
wps_dev_type_bin2str(pri_dev_type, devtype,
|
|
|
|
sizeof(devtype)),
|
|
|
|
dev_name, supp_config_methods, dev_capab, group_capab,
|
|
|
|
group ? " group=" : "",
|
|
|
|
group ? group->ifname : "");
|
|
|
|
if (os_snprintf_error(sizeof(params), res))
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: PD Request event truncated");
|
2010-07-18 23:30:25 +02:00
|
|
|
params[sizeof(params) - 1] = '\0';
|
|
|
|
|
2011-02-02 16:12:37 +01:00
|
|
|
if (config_methods & WPS_CONFIG_DISPLAY) {
|
2016-02-09 15:47:47 +01:00
|
|
|
if (wps_generate_pin(&generated_pin) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not generate PIN");
|
|
|
|
wpas_notify_p2p_provision_discovery(
|
|
|
|
wpa_s, peer, 0 /* response */,
|
|
|
|
P2P_PROV_DISC_INFO_UNAVAILABLE, 0, 0);
|
|
|
|
return;
|
|
|
|
}
|
2011-02-02 16:12:37 +01:00
|
|
|
wpas_prov_disc_local_display(wpa_s, peer, params,
|
|
|
|
generated_pin);
|
|
|
|
} else if (config_methods & WPS_CONFIG_KEYPAD)
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_prov_disc_local_keypad(wpa_s, peer, params);
|
|
|
|
else if (config_methods & WPS_CONFIG_PUSHBUTTON)
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_PBC_REQ
|
|
|
|
MACSTR "%s", MAC2STR(peer), params);
|
2011-06-12 23:31:56 +02:00
|
|
|
|
|
|
|
wpas_notify_p2p_provision_discovery(wpa_s, peer, 1 /* request */,
|
|
|
|
P2P_PROV_DISC_SUCCESS,
|
|
|
|
config_methods, generated_pin);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-29 17:20:47 +01:00
|
|
|
static void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2011-02-02 16:12:37 +01:00
|
|
|
unsigned int generated_pin = 0;
|
2012-04-26 16:13:03 +02:00
|
|
|
char params[20];
|
2011-02-02 16:12:37 +01:00
|
|
|
|
2012-02-05 19:20:36 +01:00
|
|
|
if (wpa_s->pending_pd_before_join &&
|
|
|
|
(os_memcmp(peer, wpa_s->pending_join_dev_addr, ETH_ALEN) == 0 ||
|
|
|
|
os_memcmp(peer, wpa_s->pending_join_iface_addr, ETH_ALEN) == 0)) {
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Starting pending "
|
|
|
|
"join-existing-group operation");
|
2013-09-08 00:44:29 +02:00
|
|
|
wpas_p2p_join_start(wpa_s, 0, NULL, 0);
|
2012-02-05 19:20:36 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-04-26 16:13:03 +02:00
|
|
|
if (wpa_s->pending_pd_use == AUTO_PD_JOIN ||
|
2014-12-06 20:40:31 +01:00
|
|
|
wpa_s->pending_pd_use == AUTO_PD_GO_NEG) {
|
|
|
|
int res;
|
|
|
|
|
|
|
|
res = os_snprintf(params, sizeof(params), " peer_go=%d",
|
|
|
|
wpa_s->pending_pd_use == AUTO_PD_JOIN);
|
|
|
|
if (os_snprintf_error(sizeof(params), res))
|
|
|
|
params[sizeof(params) - 1] = '\0';
|
|
|
|
} else
|
2012-04-26 16:13:03 +02:00
|
|
|
params[0] = '\0';
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (config_methods & WPS_CONFIG_DISPLAY)
|
2012-04-26 16:13:03 +02:00
|
|
|
wpas_prov_disc_local_keypad(wpa_s, peer, params);
|
2011-02-02 16:12:37 +01:00
|
|
|
else if (config_methods & WPS_CONFIG_KEYPAD) {
|
2016-02-09 15:47:47 +01:00
|
|
|
if (wps_generate_pin(&generated_pin) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not generate PIN");
|
|
|
|
wpas_notify_p2p_provision_discovery(
|
|
|
|
wpa_s, peer, 0 /* response */,
|
|
|
|
P2P_PROV_DISC_INFO_UNAVAILABLE, 0, 0);
|
|
|
|
return;
|
|
|
|
}
|
2012-04-26 16:13:03 +02:00
|
|
|
wpas_prov_disc_local_display(wpa_s, peer, params,
|
|
|
|
generated_pin);
|
2011-02-02 16:12:37 +01:00
|
|
|
} else if (config_methods & WPS_CONFIG_PUSHBUTTON)
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_PBC_RESP
|
|
|
|
MACSTR "%s", MAC2STR(peer), params);
|
2010-08-04 23:34:56 +02:00
|
|
|
|
2011-06-12 23:31:56 +02:00
|
|
|
wpas_notify_p2p_provision_discovery(wpa_s, peer, 0 /* response */,
|
|
|
|
P2P_PROV_DISC_SUCCESS,
|
|
|
|
config_methods, generated_pin);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-18 20:53:36 +01:00
|
|
|
static void wpas_prov_disc_fail(void *ctx, const u8 *peer,
|
2014-12-10 12:51:09 +01:00
|
|
|
enum p2p_prov_disc_status status,
|
|
|
|
u32 adv_id, const u8 *adv_mac,
|
|
|
|
const char *deferred_session_resp)
|
2011-06-12 23:31:56 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
if (wpa_s->p2p_fallback_to_go_neg) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: PD for p2p_connect-auto "
|
|
|
|
"failed - fall back to GO Negotiation");
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2015-02-08 11:04:15 +01:00
|
|
|
P2P_EVENT_FALLBACK_TO_GO_NEG
|
|
|
|
"reason=PD-failed");
|
2012-05-08 16:13:56 +02:00
|
|
|
wpas_p2p_fallback_to_go_neg(wpa_s, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-22 23:53:42 +01:00
|
|
|
if (status == P2P_PROV_DISC_TIMEOUT_JOIN) {
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Starting pending "
|
|
|
|
"join-existing-group operation (no ACK for PD "
|
|
|
|
"Req attempts)");
|
2013-09-08 00:44:29 +02:00
|
|
|
wpas_p2p_join_start(wpa_s, 0, NULL, 0);
|
2012-11-22 23:53:42 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-10 12:51:09 +01:00
|
|
|
if (adv_id && adv_mac && deferred_session_resp) {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
|
|
|
|
" p2p_dev_addr=" MACSTR " status=%d adv_id=%x"
|
|
|
|
" deferred_session_resp='%s'",
|
|
|
|
MAC2STR(peer), status, adv_id,
|
|
|
|
deferred_session_resp);
|
|
|
|
} else if (adv_id && adv_mac) {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
|
|
|
|
" p2p_dev_addr=" MACSTR " status=%d adv_id=%x",
|
|
|
|
MAC2STR(peer), status, adv_id);
|
|
|
|
} else {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
|
|
|
|
" p2p_dev_addr=" MACSTR " status=%d",
|
|
|
|
MAC2STR(peer), status);
|
|
|
|
}
|
2012-04-17 18:44:13 +02:00
|
|
|
|
2011-06-12 23:31:56 +02:00
|
|
|
wpas_notify_p2p_provision_discovery(wpa_s, peer, 0 /* response */,
|
|
|
|
status, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:21 +02:00
|
|
|
static int freq_included(struct wpa_supplicant *wpa_s,
|
|
|
|
const struct p2p_channels *channels,
|
|
|
|
unsigned int freq)
|
2013-05-22 12:29:46 +02:00
|
|
|
{
|
2015-07-27 21:24:21 +02:00
|
|
|
if ((channels == NULL || p2p_channels_includes_freq(channels, freq)) &&
|
|
|
|
wpas_p2p_go_is_peer_freq(wpa_s, freq))
|
|
|
|
return 1;
|
|
|
|
return 0;
|
2013-05-22 12:29:46 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:20 +02:00
|
|
|
static void wpas_p2p_go_update_common_freqs(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
unsigned int num = P2P_MAX_CHANNELS;
|
|
|
|
int *common_freqs;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
p2p_go_dump_common_freqs(wpa_s);
|
|
|
|
common_freqs = os_calloc(num, sizeof(int));
|
|
|
|
if (!common_freqs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ret = p2p_group_get_common_freqs(wpa_s->p2p_group, common_freqs, &num);
|
|
|
|
if (ret < 0) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Failed to get group common freqs");
|
|
|
|
os_free(common_freqs);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(wpa_s->p2p_group_common_freqs);
|
|
|
|
wpa_s->p2p_group_common_freqs = common_freqs;
|
|
|
|
wpa_s->p2p_group_common_freqs_num = num;
|
|
|
|
p2p_go_dump_common_freqs(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/*
|
|
|
|
* Check if the given frequency is one of the possible operating frequencies
|
|
|
|
* set after the completion of the GO Negotiation.
|
|
|
|
*/
|
|
|
|
static int wpas_p2p_go_is_peer_freq(struct wpa_supplicant *wpa_s, int freq)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
p2p_go_dump_common_freqs(wpa_s);
|
|
|
|
|
|
|
|
/* assume no restrictions */
|
|
|
|
if (!wpa_s->p2p_group_common_freqs_num)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
|
|
|
if (wpa_s->p2p_group_common_freqs[i] == freq)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-09-08 11:46:20 +02:00
|
|
|
static int wpas_sta_check_ecsa(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta, void *ctx)
|
|
|
|
{
|
|
|
|
int *ecsa_support = ctx;
|
|
|
|
|
|
|
|
*ecsa_support &= sta->ecsa_supported;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Check if all the peers support eCSA */
|
|
|
|
static int wpas_p2p_go_clients_support_ecsa(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
int ecsa_support = 1;
|
|
|
|
|
|
|
|
ap_for_each_sta(wpa_s->ap_iface->bss[0], wpas_sta_check_ecsa,
|
|
|
|
&ecsa_support);
|
|
|
|
|
|
|
|
return ecsa_support;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
/**
|
|
|
|
* Pick the best frequency to use from all the currently used frequencies.
|
|
|
|
*/
|
|
|
|
static int wpas_p2p_pick_best_used_freq(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs,
|
|
|
|
unsigned int num)
|
|
|
|
{
|
|
|
|
unsigned int i, c;
|
|
|
|
|
|
|
|
/* find a candidate freq that is supported by P2P */
|
|
|
|
for (c = 0; c < num; c++)
|
|
|
|
if (p2p_supported_freq(wpa_s->global->p2p, freqs[c].freq))
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (c == num)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* once we have a candidate, try to find a 'better' one */
|
|
|
|
for (i = c + 1; i < num; i++) {
|
|
|
|
if (!p2p_supported_freq(wpa_s->global->p2p, freqs[i].freq))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* 1. Infrastructure station interfaces have higher preference.
|
|
|
|
* 2. P2P Clients have higher preference.
|
|
|
|
* 3. All others.
|
|
|
|
*/
|
|
|
|
if (freqs[i].flags & WPA_FREQ_USED_BY_INFRA_STATION) {
|
|
|
|
c = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((freqs[i].flags & WPA_FREQ_USED_BY_P2P_CLIENT))
|
|
|
|
c = i;
|
|
|
|
}
|
|
|
|
return freqs[c].freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static u8 wpas_invitation_process(void *ctx, const u8 *sa, const u8 *bssid,
|
|
|
|
const u8 *go_dev_addr, const u8 *ssid,
|
|
|
|
size_t ssid_len, int *go, u8 *group_bssid,
|
2013-05-22 12:29:46 +02:00
|
|
|
int *force_freq, int persistent_group,
|
2013-09-08 18:45:04 +02:00
|
|
|
const struct p2p_channels *channels,
|
|
|
|
int dev_pw_id)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *s;
|
2014-05-19 09:05:35 +02:00
|
|
|
struct wpa_used_freq_data *freqs;
|
2010-11-19 11:58:31 +01:00
|
|
|
struct wpa_supplicant *grp;
|
2014-05-19 09:05:35 +02:00
|
|
|
int best_freq;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (!persistent_group) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Invitation from " MACSTR
|
2014-01-13 20:39:06 +01:00
|
|
|
" to join an active group (SSID: %s)",
|
|
|
|
MAC2STR(sa), wpa_ssid_txt(ssid, ssid_len));
|
2010-06-27 09:11:42 +02:00
|
|
|
if (!is_zero_ether_addr(wpa_s->p2p_auth_invite) &&
|
2010-07-02 07:57:03 +02:00
|
|
|
(os_memcmp(go_dev_addr, wpa_s->p2p_auth_invite, ETH_ALEN)
|
|
|
|
== 0 ||
|
|
|
|
os_memcmp(sa, wpa_s->p2p_auth_invite, ETH_ALEN) == 0)) {
|
2010-06-27 09:11:42 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Accept previously "
|
|
|
|
"authorized invitation");
|
|
|
|
goto accept_inv;
|
|
|
|
}
|
2013-09-08 18:45:04 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_WPS_NFC
|
2015-01-19 02:44:05 +01:00
|
|
|
if (dev_pw_id >= 0 && wpa_s->p2p_nfc_tag_enabled &&
|
|
|
|
dev_pw_id == wpa_s->p2p_oob_dev_pw_id) {
|
2013-09-08 18:45:04 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Accept invitation based on local enabled NFC Tag");
|
2015-01-19 02:44:05 +01:00
|
|
|
wpa_s->p2p_wps_method = WPS_NFC;
|
|
|
|
wpa_s->pending_join_wps_method = WPS_NFC;
|
|
|
|
os_memcpy(wpa_s->pending_join_dev_addr,
|
2013-09-08 18:45:04 +02:00
|
|
|
go_dev_addr, ETH_ALEN);
|
2015-01-19 02:44:05 +01:00
|
|
|
os_memcpy(wpa_s->pending_join_iface_addr,
|
2013-09-08 18:45:04 +02:00
|
|
|
bssid, ETH_ALEN);
|
|
|
|
goto accept_inv;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_WPS_NFC */
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
/*
|
|
|
|
* Do not accept the invitation automatically; notify user and
|
|
|
|
* request approval.
|
|
|
|
*/
|
|
|
|
return P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
|
|
|
|
}
|
|
|
|
|
2010-11-19 11:58:31 +01:00
|
|
|
grp = wpas_get_p2p_group(wpa_s, ssid, ssid_len, go);
|
|
|
|
if (grp) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Accept invitation to already "
|
|
|
|
"running persistent group");
|
|
|
|
if (*go)
|
|
|
|
os_memcpy(group_bssid, grp->own_addr, ETH_ALEN);
|
|
|
|
goto accept_inv;
|
|
|
|
}
|
|
|
|
|
2013-03-01 20:32:33 +01:00
|
|
|
if (!is_zero_ether_addr(wpa_s->p2p_auth_invite) &&
|
|
|
|
os_memcmp(sa, wpa_s->p2p_auth_invite, ETH_ALEN) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Accept previously initiated "
|
|
|
|
"invitation to re-invoke a persistent group");
|
2014-05-27 11:09:25 +02:00
|
|
|
os_memset(wpa_s->p2p_auth_invite, 0, ETH_ALEN);
|
2013-03-01 20:32:33 +01:00
|
|
|
} else if (!wpa_s->conf->persistent_reconnect)
|
2010-07-18 23:30:25 +02:00
|
|
|
return P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
|
|
|
|
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
if (s->disabled == 2 &&
|
|
|
|
os_memcmp(s->bssid, go_dev_addr, ETH_ALEN) == 0 &&
|
|
|
|
s->ssid_len == ssid_len &&
|
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!s) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Invitation from " MACSTR
|
|
|
|
" requested reinvocation of an unknown group",
|
|
|
|
MAC2STR(sa));
|
|
|
|
return P2P_SC_FAIL_UNKNOWN_GROUP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s->mode == WPAS_MODE_P2P_GO && !wpas_p2p_create_iface(wpa_s)) {
|
|
|
|
*go = 1;
|
|
|
|
if (wpa_s->wpa_state >= WPA_AUTHENTICATING) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: The only available "
|
|
|
|
"interface is already in use - reject "
|
|
|
|
"invitation");
|
|
|
|
return P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
|
|
|
|
}
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2p_mgmt)
|
|
|
|
os_memcpy(group_bssid, wpa_s->parent->own_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memcpy(group_bssid, wpa_s->own_addr, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
} else if (s->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
*go = 1;
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, WPA_IF_P2P_GO) < 0)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to allocate a new "
|
|
|
|
"interface address for the group");
|
|
|
|
return P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
|
|
|
|
}
|
|
|
|
os_memcpy(group_bssid, wpa_s->pending_interface_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
}
|
|
|
|
|
2010-06-27 09:11:42 +02:00
|
|
|
accept_inv:
|
2013-03-14 15:22:31 +01:00
|
|
|
wpas_p2p_set_own_freq_preference(wpa_s, 0);
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
best_freq = 0;
|
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent,
|
|
|
|
sizeof(struct wpa_used_freq_data));
|
|
|
|
if (freqs) {
|
|
|
|
int num_channels = wpa_s->num_multichan_concurrent;
|
|
|
|
int num = wpas_p2p_valid_oper_freqs(wpa_s, freqs, num_channels);
|
|
|
|
best_freq = wpas_p2p_pick_best_used_freq(wpa_s, freqs, num);
|
|
|
|
os_free(freqs);
|
|
|
|
}
|
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
/* Get one of the frequencies currently in use */
|
2014-05-19 09:05:35 +02:00
|
|
|
if (best_freq > 0) {
|
2013-11-19 11:15:45 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Trying to prefer a channel already used by one of the interfaces");
|
2014-05-19 09:05:35 +02:00
|
|
|
wpas_p2p_set_own_freq_preference(wpa_s, best_freq);
|
2013-11-19 11:15:45 +01:00
|
|
|
|
|
|
|
if (wpa_s->num_multichan_concurrent < 2 ||
|
|
|
|
wpas_p2p_num_unused_channels(wpa_s) < 1) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No extra channels available - trying to force channel to match a channel already used by one of the interfaces");
|
2014-05-19 09:05:35 +02:00
|
|
|
*force_freq = best_freq;
|
2013-11-19 11:15:45 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
if (*force_freq > 0 && wpa_s->num_multichan_concurrent > 1 &&
|
|
|
|
wpas_p2p_num_unused_channels(wpa_s) > 0) {
|
2013-05-22 12:29:46 +02:00
|
|
|
if (*go == 0) {
|
|
|
|
/* We are the client */
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Peer was found to be "
|
|
|
|
"running a GO but we are capable of MCC, "
|
|
|
|
"figure out the best channel to use");
|
|
|
|
*force_freq = 0;
|
2015-07-27 21:24:21 +02:00
|
|
|
} else if (!freq_included(wpa_s, channels, *force_freq)) {
|
2013-05-22 12:29:46 +02:00
|
|
|
/* We are the GO, and *force_freq is not in the
|
|
|
|
* intersection */
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Forced GO freq %d MHz not "
|
|
|
|
"in intersection but we are capable of MCC, "
|
|
|
|
"figure out the best channel to use",
|
|
|
|
*force_freq);
|
|
|
|
*force_freq = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return P2P_SC_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_invitation_received(void *ctx, const u8 *sa, const u8 *bssid,
|
|
|
|
const u8 *ssid, size_t ssid_len,
|
|
|
|
const u8 *go_dev_addr, u8 status,
|
|
|
|
int op_freq)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
|
|
|
if (s->disabled == 2 &&
|
|
|
|
s->ssid_len == ssid_len &&
|
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status == P2P_SC_SUCCESS) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Invitation from peer " MACSTR
|
2014-01-13 20:39:06 +01:00
|
|
|
" was accepted; op_freq=%d MHz, SSID=%s",
|
|
|
|
MAC2STR(sa), op_freq, wpa_ssid_txt(ssid, ssid_len));
|
2010-07-18 23:30:25 +02:00
|
|
|
if (s) {
|
2012-09-24 21:15:58 +02:00
|
|
|
int go = s->mode == WPAS_MODE_P2P_GO;
|
2016-04-10 16:10:22 +02:00
|
|
|
if (go) {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_INVITATION_ACCEPTED
|
|
|
|
"sa=" MACSTR
|
|
|
|
" persistent=%d freq=%d",
|
|
|
|
MAC2STR(sa), s->id, op_freq);
|
|
|
|
} else {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_INVITATION_ACCEPTED
|
|
|
|
"sa=" MACSTR
|
|
|
|
" persistent=%d",
|
|
|
|
MAC2STR(sa), s->id);
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_group_add_persistent(
|
2020-04-03 13:52:03 +02:00
|
|
|
wpa_s, s, go, 0, op_freq, 0,
|
|
|
|
wpa_s->conf->p2p_go_ht40,
|
|
|
|
wpa_s->conf->p2p_go_vht,
|
|
|
|
0,
|
|
|
|
wpa_s->conf->p2p_go_he,
|
|
|
|
wpa_s->conf->p2p_go_edmg, NULL,
|
2015-08-21 17:28:28 +02:00
|
|
|
go ? P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE : 0,
|
|
|
|
1);
|
2010-09-07 16:35:42 +02:00
|
|
|
} else if (bssid) {
|
2012-11-22 23:48:58 +01:00
|
|
|
wpa_s->user_initiated_pd = 0;
|
2016-04-10 16:10:22 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_INVITATION_ACCEPTED
|
|
|
|
"sa=" MACSTR " go_dev_addr=" MACSTR
|
|
|
|
" bssid=" MACSTR " unknown-network",
|
|
|
|
MAC2STR(sa), MAC2STR(go_dev_addr),
|
|
|
|
MAC2STR(bssid));
|
2010-06-27 09:11:42 +02:00
|
|
|
wpas_p2p_join(wpa_s, bssid, go_dev_addr,
|
2013-09-08 00:44:29 +02:00
|
|
|
wpa_s->p2p_wps_method, 0, op_freq,
|
2014-01-13 20:39:06 +01:00
|
|
|
ssid, ssid_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status != P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Invitation from peer " MACSTR
|
|
|
|
" was rejected (status %u)", MAC2STR(sa), status);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!s) {
|
|
|
|
if (bssid) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_INVITATION_RECEIVED
|
|
|
|
"sa=" MACSTR " go_dev_addr=" MACSTR
|
|
|
|
" bssid=" MACSTR " unknown-network",
|
|
|
|
MAC2STR(sa), MAC2STR(go_dev_addr),
|
|
|
|
MAC2STR(bssid));
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_INVITATION_RECEIVED
|
|
|
|
"sa=" MACSTR " go_dev_addr=" MACSTR
|
|
|
|
" unknown-network",
|
|
|
|
MAC2STR(sa), MAC2STR(go_dev_addr));
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2015-06-18 06:16:34 +02:00
|
|
|
wpas_notify_p2p_invitation_received(wpa_s, sa, go_dev_addr,
|
|
|
|
bssid, 0, op_freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-03-01 20:27:31 +01:00
|
|
|
if (s->mode == WPAS_MODE_P2P_GO && op_freq) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_INVITATION_RECEIVED
|
|
|
|
"sa=" MACSTR " persistent=%d freq=%d",
|
|
|
|
MAC2STR(sa), s->id, op_freq);
|
2013-03-01 20:27:31 +01:00
|
|
|
} else {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_INVITATION_RECEIVED
|
|
|
|
"sa=" MACSTR " persistent=%d",
|
|
|
|
MAC2STR(sa), s->id);
|
2013-03-01 20:27:31 +01:00
|
|
|
}
|
2015-06-18 06:16:34 +02:00
|
|
|
wpas_notify_p2p_invitation_received(wpa_s, sa, go_dev_addr, bssid,
|
|
|
|
s->id, op_freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-15 15:31:31 +01:00
|
|
|
static void wpas_remove_persistent_peer(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid,
|
2013-09-01 16:37:22 +02:00
|
|
|
const u8 *peer, int inv)
|
2013-03-15 15:31:31 +01:00
|
|
|
{
|
|
|
|
size_t i;
|
2015-05-12 16:40:01 +02:00
|
|
|
struct wpa_supplicant *p2p_wpa_s = wpa_s->global->p2p_init_wpa_s;
|
2013-03-15 15:31:31 +01:00
|
|
|
|
|
|
|
if (ssid == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; ssid->p2p_client_list && i < ssid->num_p2p_clients; i++) {
|
2015-01-05 21:10:16 +01:00
|
|
|
if (os_memcmp(ssid->p2p_client_list + i * 2 * ETH_ALEN, peer,
|
2013-03-15 15:31:31 +01:00
|
|
|
ETH_ALEN) == 0)
|
|
|
|
break;
|
|
|
|
}
|
2014-07-02 23:53:13 +02:00
|
|
|
if (i >= ssid->num_p2p_clients || !ssid->p2p_client_list) {
|
2013-03-15 15:31:31 +01:00
|
|
|
if (ssid->mode != WPAS_MODE_P2P_GO &&
|
|
|
|
os_memcmp(ssid->bssid, peer, ETH_ALEN) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Remove persistent group %d "
|
|
|
|
"due to invitation result", ssid->id);
|
|
|
|
wpas_notify_network_removed(wpa_s, ssid);
|
|
|
|
wpa_config_remove_network(wpa_s->conf, ssid->id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return; /* Peer not found in client list */
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Remove peer " MACSTR " from persistent "
|
2013-09-01 16:37:22 +02:00
|
|
|
"group %d client list%s",
|
|
|
|
MAC2STR(peer), ssid->id,
|
|
|
|
inv ? " due to invitation result" : "");
|
2015-01-05 21:10:16 +01:00
|
|
|
os_memmove(ssid->p2p_client_list + i * 2 * ETH_ALEN,
|
|
|
|
ssid->p2p_client_list + (i + 1) * 2 * ETH_ALEN,
|
|
|
|
(ssid->num_p2p_clients - i - 1) * 2 * ETH_ALEN);
|
2013-03-15 15:31:31 +01:00
|
|
|
ssid->num_p2p_clients--;
|
2015-05-12 16:40:01 +02:00
|
|
|
if (p2p_wpa_s->conf->update_config &&
|
|
|
|
wpa_config_write(p2p_wpa_s->confname, p2p_wpa_s->conf))
|
2013-03-15 15:31:31 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_remove_persistent_client(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
|
|
|
wpa_s = wpa_s->global->p2p_invite_group;
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return; /* No known invitation group */
|
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid == NULL || ssid->mode != WPAS_MODE_P2P_GO ||
|
|
|
|
!ssid->p2p_persistent_group)
|
|
|
|
return; /* Not operating as a GO in persistent group */
|
2016-01-24 16:36:49 +01:00
|
|
|
ssid = wpas_p2p_get_persistent(wpa_s->p2pdev, peer,
|
2013-03-15 15:31:31 +01:00
|
|
|
ssid->ssid, ssid->ssid_len);
|
2013-09-01 16:37:22 +02:00
|
|
|
wpas_remove_persistent_peer(wpa_s, ssid, peer, 1);
|
2013-03-15 15:31:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-01 13:22:29 +01:00
|
|
|
static void wpas_invitation_result(void *ctx, int status, const u8 *bssid,
|
2013-03-15 15:31:31 +01:00
|
|
|
const struct p2p_channels *channels,
|
2014-03-21 13:56:02 +01:00
|
|
|
const u8 *peer, int neg_freq,
|
|
|
|
int peer_oper_freq)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *ssid;
|
2014-03-21 13:56:02 +01:00
|
|
|
int freq;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (bssid) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_INVITATION_RESULT
|
|
|
|
"status=%d " MACSTR,
|
|
|
|
status, MAC2STR(bssid));
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_INVITATION_RESULT
|
|
|
|
"status=%d ", status);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2011-02-24 21:40:21 +01:00
|
|
|
wpas_notify_p2p_invitation_result(wpa_s, status, bssid);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2013-03-15 15:31:31 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Invitation result - status=%d peer=" MACSTR,
|
|
|
|
status, MAC2STR(peer));
|
|
|
|
if (wpa_s->pending_invite_ssid_id == -1) {
|
2015-11-22 14:57:50 +01:00
|
|
|
struct wpa_supplicant *group_if =
|
|
|
|
wpa_s->global->p2p_invite_group;
|
|
|
|
|
2013-03-15 15:31:31 +01:00
|
|
|
if (status == P2P_SC_FAIL_UNKNOWN_GROUP)
|
|
|
|
wpas_remove_persistent_client(wpa_s, peer);
|
2015-11-22 14:57:50 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Invitation to an active group. If this is successful and we
|
|
|
|
* are the GO, set the client wait to postpone some concurrent
|
|
|
|
* operations and to allow provisioning and connection to happen
|
|
|
|
* more quickly.
|
|
|
|
*/
|
|
|
|
if (status == P2P_SC_SUCCESS &&
|
|
|
|
group_if && group_if->current_ssid &&
|
2015-11-22 14:57:51 +01:00
|
|
|
group_if->current_ssid->mode == WPAS_MODE_P2P_GO) {
|
2015-11-22 14:57:50 +01:00
|
|
|
os_get_reltime(&wpa_s->global->p2p_go_wait_client);
|
2015-11-22 14:57:51 +01:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
if (group_if->p2p_go_csa_on_inv) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Testing: force P2P GO CSA after invitation");
|
|
|
|
eloop_cancel_timeout(
|
|
|
|
wpas_p2p_reconsider_moving_go,
|
|
|
|
wpa_s, NULL);
|
|
|
|
eloop_register_timeout(
|
|
|
|
0, 50000,
|
|
|
|
wpas_p2p_reconsider_moving_go,
|
|
|
|
wpa_s, NULL);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
}
|
2015-11-22 14:57:50 +01:00
|
|
|
return;
|
2013-03-15 15:31:31 +01:00
|
|
|
}
|
2010-06-27 09:27:08 +02:00
|
|
|
|
2013-03-01 20:32:33 +01:00
|
|
|
if (status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Waiting for peer to start another "
|
|
|
|
"invitation exchange to indicate readiness for "
|
|
|
|
"re-invocation");
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (status != P2P_SC_SUCCESS) {
|
2013-03-15 15:31:31 +01:00
|
|
|
if (status == P2P_SC_FAIL_UNKNOWN_GROUP) {
|
|
|
|
ssid = wpa_config_get_network(
|
|
|
|
wpa_s->conf, wpa_s->pending_invite_ssid_id);
|
2013-09-01 16:37:22 +02:00
|
|
|
wpas_remove_persistent_peer(wpa_s, ssid, peer, 1);
|
2013-03-15 15:31:31 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssid = wpa_config_get_network(wpa_s->conf,
|
|
|
|
wpa_s->pending_invite_ssid_id);
|
|
|
|
if (ssid == NULL) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Could not find persistent group "
|
|
|
|
"data matching with invitation");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-10-13 16:33:16 +02:00
|
|
|
/*
|
|
|
|
* The peer could have missed our ctrl::ack frame for Invitation
|
|
|
|
* Response and continue retransmitting the frame. To reduce the
|
|
|
|
* likelihood of the peer not getting successful TX status for the
|
|
|
|
* Invitation Response frame, wait a short time here before starting
|
|
|
|
* the persistent group so that we will remain on the current channel to
|
|
|
|
* acknowledge any possible retransmission from the peer.
|
|
|
|
*/
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: 50 ms wait on current channel before "
|
|
|
|
"starting persistent group");
|
|
|
|
os_sleep(0, 50000);
|
|
|
|
|
2014-03-21 13:56:02 +01:00
|
|
|
if (neg_freq > 0 && ssid->mode == WPAS_MODE_P2P_GO &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, neg_freq))
|
2014-03-21 13:56:02 +01:00
|
|
|
freq = neg_freq;
|
|
|
|
else if (peer_oper_freq > 0 && ssid->mode != WPAS_MODE_P2P_GO &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, peer_oper_freq))
|
2014-03-21 13:56:02 +01:00
|
|
|
freq = peer_oper_freq;
|
|
|
|
else
|
|
|
|
freq = 0;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Persistent group invitation success - op_freq=%d MHz SSID=%s",
|
|
|
|
freq, wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_group_add_persistent(wpa_s, ssid,
|
2012-08-31 20:20:51 +02:00
|
|
|
ssid->mode == WPAS_MODE_P2P_GO,
|
2014-01-27 15:46:02 +01:00
|
|
|
wpa_s->p2p_persistent_go_freq,
|
2014-03-21 13:56:02 +01:00
|
|
|
freq,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht_center_freq2,
|
2013-10-27 18:46:17 +01:00
|
|
|
wpa_s->p2p_go_ht40, wpa_s->p2p_go_vht,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_max_oper_chwidth,
|
2018-12-21 19:20:28 +01:00
|
|
|
wpa_s->p2p_go_he,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_edmg,
|
2013-10-27 18:46:17 +01:00
|
|
|
channels,
|
2013-09-26 20:24:09 +02:00
|
|
|
ssid->mode == WPAS_MODE_P2P_GO ?
|
|
|
|
P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE :
|
2015-08-21 17:28:28 +02:00
|
|
|
0, 1);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-02-17 21:57:13 +01:00
|
|
|
static int wpas_p2p_disallowed_freq(struct wpa_global *global,
|
|
|
|
unsigned int freq)
|
|
|
|
{
|
2014-01-24 15:14:29 +01:00
|
|
|
if (freq_range_list_includes(&global->p2p_go_avoid_freq, freq))
|
|
|
|
return 1;
|
2013-10-22 18:10:56 +02:00
|
|
|
return freq_range_list_includes(&global->p2p_disallow_freq, freq);
|
2012-02-17 21:57:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_add_chan(struct p2p_reg_class *reg, u8 chan)
|
|
|
|
{
|
|
|
|
reg->channel[reg->channels] = chan;
|
|
|
|
reg->channels++;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-10-15 17:51:37 +02:00
|
|
|
static int wpas_p2p_default_channels(struct wpa_supplicant *wpa_s,
|
2013-10-22 20:00:49 +02:00
|
|
|
struct p2p_channels *chan,
|
|
|
|
struct p2p_channels *cli_chan)
|
2010-10-15 17:51:37 +02:00
|
|
|
{
|
|
|
|
int i, cla = 0;
|
|
|
|
|
2014-10-22 19:02:48 +02:00
|
|
|
wpa_s->global->p2p_24ghz_social_channels = 1;
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
os_memset(cli_chan, 0, sizeof(*cli_chan));
|
|
|
|
|
2010-10-15 17:51:37 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Enable operating classes for 2.4 GHz "
|
|
|
|
"band");
|
|
|
|
|
|
|
|
/* Operating class 81 - 2.4 GHz band channels 1..13 */
|
|
|
|
chan->reg_class[cla].reg_class = 81;
|
2012-02-17 21:57:13 +01:00
|
|
|
chan->reg_class[cla].channels = 0;
|
|
|
|
for (i = 0; i < 11; i++) {
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 2412 + i * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], i + 1);
|
|
|
|
}
|
|
|
|
if (chan->reg_class[cla].channels)
|
|
|
|
cla++;
|
2010-10-15 17:51:37 +02:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Enable operating classes for lower 5 GHz "
|
|
|
|
"band");
|
|
|
|
|
|
|
|
/* Operating class 115 - 5 GHz, channels 36-48 */
|
|
|
|
chan->reg_class[cla].reg_class = 115;
|
2012-02-17 21:57:13 +01:00
|
|
|
chan->reg_class[cla].channels = 0;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 36 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 36);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 40 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 40);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 44 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 44);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 48 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 48);
|
|
|
|
if (chan->reg_class[cla].channels)
|
|
|
|
cla++;
|
2010-10-15 17:51:37 +02:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Enable operating classes for higher 5 GHz "
|
|
|
|
"band");
|
|
|
|
|
|
|
|
/* Operating class 124 - 5 GHz, channels 149,153,157,161 */
|
|
|
|
chan->reg_class[cla].reg_class = 124;
|
2012-02-17 21:57:13 +01:00
|
|
|
chan->reg_class[cla].channels = 0;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 149 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 149);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 153 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 153);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 156 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 157);
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 161 * 5))
|
|
|
|
wpas_p2p_add_chan(&chan->reg_class[cla], 161);
|
|
|
|
if (chan->reg_class[cla].channels)
|
|
|
|
cla++;
|
2010-10-15 17:51:37 +02:00
|
|
|
|
|
|
|
chan->reg_classes = cla;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-06-08 11:45:58 +02:00
|
|
|
static enum chan_allowed has_channel(struct wpa_global *global,
|
|
|
|
struct hostapd_hw_modes *mode, u8 chan,
|
|
|
|
int *flags)
|
2010-10-15 17:51:37 +02:00
|
|
|
{
|
|
|
|
int i;
|
2012-02-17 21:57:13 +01:00
|
|
|
unsigned int freq;
|
|
|
|
|
|
|
|
freq = (mode->mode == HOSTAPD_MODE_IEEE80211A ? 5000 : 2407) +
|
|
|
|
chan * 5;
|
|
|
|
if (wpas_p2p_disallowed_freq(global, freq))
|
2013-10-22 20:00:49 +02:00
|
|
|
return NOT_ALLOWED;
|
2010-10-15 17:51:37 +02:00
|
|
|
|
|
|
|
for (i = 0; i < mode->num_channels; i++) {
|
|
|
|
if (mode->channels[i].chan == chan) {
|
2010-11-12 17:14:12 +01:00
|
|
|
if (flags)
|
|
|
|
*flags = mode->channels[i].flag;
|
2013-10-22 20:00:49 +02:00
|
|
|
if (mode->channels[i].flag &
|
|
|
|
(HOSTAPD_CHAN_DISABLED |
|
|
|
|
HOSTAPD_CHAN_RADAR))
|
|
|
|
return NOT_ALLOWED;
|
2014-07-07 13:20:54 +02:00
|
|
|
if (mode->channels[i].flag & HOSTAPD_CHAN_NO_IR)
|
|
|
|
return NO_IR;
|
2013-10-22 20:00:49 +02:00
|
|
|
return ALLOWED;
|
2010-10-15 17:51:37 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
return NOT_ALLOWED;
|
2010-10-15 17:51:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-27 19:08:36 +01:00
|
|
|
static int wpas_p2p_get_center_80mhz(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel)
|
|
|
|
{
|
2020-11-23 09:00:02 +01:00
|
|
|
u8 center_channels[] = { 42, 58, 106, 122, 138, 155, 171 };
|
2016-09-06 08:44:33 +02:00
|
|
|
size_t i;
|
2013-10-27 19:08:36 +01:00
|
|
|
|
|
|
|
if (mode->mode != HOSTAPD_MODE_IEEE80211A)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(center_channels); i++)
|
|
|
|
/*
|
|
|
|
* In 80 MHz, the bandwidth "spans" 12 channels (e.g., 36-48),
|
|
|
|
* so the center channel is 6 channels away from the start/end.
|
|
|
|
*/
|
|
|
|
if (channel >= center_channels[i] - 6 &&
|
|
|
|
channel <= center_channels[i] + 6)
|
|
|
|
return center_channels[i];
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static enum chan_allowed wpas_p2p_verify_80mhz(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel, u8 bw)
|
|
|
|
{
|
|
|
|
u8 center_chan;
|
|
|
|
int i, flags;
|
|
|
|
enum chan_allowed res, ret = ALLOWED;
|
|
|
|
|
|
|
|
center_chan = wpas_p2p_get_center_80mhz(wpa_s, mode, channel);
|
|
|
|
if (!center_chan)
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (center_chan >= 58 && center_chan <= 138)
|
|
|
|
return NOT_ALLOWED; /* Do not allow DFS channels for P2P */
|
|
|
|
|
|
|
|
/* check all the channels are available */
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
int adj_chan = center_chan - 6 + i * 4;
|
|
|
|
|
|
|
|
res = has_channel(wpa_s->global, mode, adj_chan, &flags);
|
|
|
|
if (res == NOT_ALLOWED)
|
|
|
|
return NOT_ALLOWED;
|
2014-07-07 13:20:54 +02:00
|
|
|
if (res == NO_IR)
|
|
|
|
ret = NO_IR;
|
2013-10-27 19:08:36 +01:00
|
|
|
|
|
|
|
if (i == 0 && !(flags & HOSTAPD_CHAN_VHT_10_70))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 1 && !(flags & HOSTAPD_CHAN_VHT_30_50))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 2 && !(flags & HOSTAPD_CHAN_VHT_50_30))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 3 && !(flags & HOSTAPD_CHAN_VHT_70_10))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-10-28 22:14:10 +01:00
|
|
|
static int wpas_p2p_get_center_160mhz(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel)
|
|
|
|
{
|
2020-11-23 09:00:02 +01:00
|
|
|
u8 center_channels[] = { 50, 114, 163 };
|
2015-10-28 22:14:10 +01:00
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
if (mode->mode != HOSTAPD_MODE_IEEE80211A)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(center_channels); i++)
|
|
|
|
/*
|
|
|
|
* In 160 MHz, the bandwidth "spans" 28 channels (e.g., 36-64),
|
|
|
|
* so the center channel is 14 channels away from the start/end.
|
|
|
|
*/
|
|
|
|
if (channel >= center_channels[i] - 14 &&
|
|
|
|
channel <= center_channels[i] + 14)
|
|
|
|
return center_channels[i];
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static enum chan_allowed wpas_p2p_verify_160mhz(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel, u8 bw)
|
|
|
|
{
|
|
|
|
u8 center_chan;
|
|
|
|
int i, flags;
|
|
|
|
enum chan_allowed res, ret = ALLOWED;
|
|
|
|
|
|
|
|
center_chan = wpas_p2p_get_center_160mhz(wpa_s, mode, channel);
|
|
|
|
if (!center_chan)
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
/* VHT 160 MHz uses DFS channels in most countries. */
|
|
|
|
|
|
|
|
/* Check all the channels are available */
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
|
|
int adj_chan = center_chan - 14 + i * 4;
|
|
|
|
|
|
|
|
res = has_channel(wpa_s->global, mode, adj_chan, &flags);
|
|
|
|
if (res == NOT_ALLOWED)
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
|
|
|
|
if (res == NO_IR)
|
|
|
|
ret = NO_IR;
|
|
|
|
|
|
|
|
if (i == 0 && !(flags & HOSTAPD_CHAN_VHT_10_150))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 1 && !(flags & HOSTAPD_CHAN_VHT_30_130))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 2 && !(flags & HOSTAPD_CHAN_VHT_50_110))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 3 && !(flags & HOSTAPD_CHAN_VHT_70_90))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 4 && !(flags & HOSTAPD_CHAN_VHT_90_70))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 5 && !(flags & HOSTAPD_CHAN_VHT_110_50))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 6 && !(flags & HOSTAPD_CHAN_VHT_130_30))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
if (i == 7 && !(flags & HOSTAPD_CHAN_VHT_150_10))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-17 19:44:14 +02:00
|
|
|
static enum chan_allowed wpas_p2p_verify_edmg(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel)
|
|
|
|
{
|
|
|
|
struct ieee80211_edmg_config edmg;
|
|
|
|
|
|
|
|
hostapd_encode_edmg_chan(1, channel, 0, &edmg);
|
|
|
|
if (edmg.channels && ieee802_edmg_is_allowed(mode->edmg, edmg))
|
|
|
|
return ALLOWED;
|
|
|
|
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
static enum chan_allowed wpas_p2p_verify_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode,
|
|
|
|
u8 channel, u8 bw)
|
2012-08-15 21:44:34 +02:00
|
|
|
{
|
2014-02-10 11:55:05 +01:00
|
|
|
int flag = 0;
|
2013-10-22 20:00:49 +02:00
|
|
|
enum chan_allowed res, res2;
|
|
|
|
|
|
|
|
res2 = res = has_channel(wpa_s->global, mode, channel, &flag);
|
|
|
|
if (bw == BW40MINUS) {
|
|
|
|
if (!(flag & HOSTAPD_CHAN_HT40MINUS))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
res2 = has_channel(wpa_s->global, mode, channel - 4, NULL);
|
|
|
|
} else if (bw == BW40PLUS) {
|
|
|
|
if (!(flag & HOSTAPD_CHAN_HT40PLUS))
|
|
|
|
return NOT_ALLOWED;
|
|
|
|
res2 = has_channel(wpa_s->global, mode, channel + 4, NULL);
|
2013-10-27 19:08:36 +01:00
|
|
|
} else if (bw == BW80) {
|
|
|
|
res2 = wpas_p2p_verify_80mhz(wpa_s, mode, channel, bw);
|
2015-10-28 22:14:10 +01:00
|
|
|
} else if (bw == BW160) {
|
|
|
|
res2 = wpas_p2p_verify_160mhz(wpa_s, mode, channel, bw);
|
2019-10-17 19:44:14 +02:00
|
|
|
} else if (bw == BW4320 || bw == BW6480 || bw == BW8640) {
|
|
|
|
return wpas_p2p_verify_edmg(wpa_s, mode, channel);
|
2013-10-22 20:00:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (res == NOT_ALLOWED || res2 == NOT_ALLOWED)
|
|
|
|
return NOT_ALLOWED;
|
2014-07-07 13:20:54 +02:00
|
|
|
if (res == NO_IR || res2 == NO_IR)
|
|
|
|
return NO_IR;
|
2013-10-22 20:00:49 +02:00
|
|
|
return res;
|
2012-08-15 21:44:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static int wpas_p2p_setup_channels(struct wpa_supplicant *wpa_s,
|
2013-10-22 20:00:49 +02:00
|
|
|
struct p2p_channels *chan,
|
2020-10-29 14:45:47 +01:00
|
|
|
struct p2p_channels *cli_chan,
|
|
|
|
bool p2p_disable_6ghz)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-10-23 10:58:54 +02:00
|
|
|
struct hostapd_hw_modes *mode;
|
2013-10-22 20:00:49 +02:00
|
|
|
int cla, op, cli_cla;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-10-23 10:58:54 +02:00
|
|
|
if (wpa_s->hw.modes == NULL) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Driver did not support fetching "
|
|
|
|
"of all supported channels; assume dualband "
|
|
|
|
"support");
|
2013-10-22 20:00:49 +02:00
|
|
|
return wpas_p2p_default_channels(wpa_s, chan, cli_chan);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
cla = cli_cla = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2016-02-15 15:53:32 +01:00
|
|
|
for (op = 0; global_op_class[op].op_class; op++) {
|
|
|
|
const struct oper_class_map *o = &global_op_class[op];
|
2010-10-15 17:51:37 +02:00
|
|
|
u8 ch;
|
2013-10-22 20:00:49 +02:00
|
|
|
struct p2p_reg_class *reg = NULL, *cli_reg = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2020-10-08 14:05:43 +02:00
|
|
|
if (o->p2p == NO_P2P_SUPP ||
|
2020-10-29 14:45:47 +01:00
|
|
|
(is_6ghz_op_class(o->op_class) && p2p_disable_6ghz))
|
2016-02-15 15:53:32 +01:00
|
|
|
continue;
|
|
|
|
|
2019-12-30 10:42:12 +01:00
|
|
|
mode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes, o->mode,
|
|
|
|
is_6ghz_op_class(o->op_class));
|
2010-10-15 17:51:37 +02:00
|
|
|
if (mode == NULL)
|
|
|
|
continue;
|
2014-10-22 19:02:48 +02:00
|
|
|
if (mode->mode == HOSTAPD_MODE_IEEE80211G)
|
|
|
|
wpa_s->global->p2p_24ghz_social_channels = 1;
|
2010-10-15 17:51:37 +02:00
|
|
|
for (ch = o->min_chan; ch <= o->max_chan; ch += o->inc) {
|
2013-10-22 20:00:49 +02:00
|
|
|
enum chan_allowed res;
|
2020-08-18 18:16:12 +02:00
|
|
|
|
|
|
|
/* Check for non-continuous jump in channel index
|
|
|
|
* incrementation */
|
2020-11-23 09:00:02 +01:00
|
|
|
if ((o->op_class >= 128 && o->op_class <= 130) &&
|
2020-08-18 18:16:12 +02:00
|
|
|
ch < 149 && ch + o->inc > 149)
|
|
|
|
ch = 149;
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
res = wpas_p2p_verify_channel(wpa_s, mode, ch, o->bw);
|
|
|
|
if (res == ALLOWED) {
|
|
|
|
if (reg == NULL) {
|
2020-02-12 10:44:59 +01:00
|
|
|
if (cla == P2P_MAX_REG_CLASSES)
|
|
|
|
continue;
|
2013-10-22 20:00:49 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Add operating class %u",
|
|
|
|
o->op_class);
|
|
|
|
reg = &chan->reg_class[cla];
|
|
|
|
cla++;
|
|
|
|
reg->reg_class = o->op_class;
|
|
|
|
}
|
2020-02-12 10:44:59 +01:00
|
|
|
if (reg->channels == P2P_MAX_REG_CLASS_CHANNELS)
|
|
|
|
continue;
|
2013-10-22 20:00:49 +02:00
|
|
|
reg->channel[reg->channels] = ch;
|
|
|
|
reg->channels++;
|
2014-07-07 13:20:54 +02:00
|
|
|
} else if (res == NO_IR &&
|
2013-10-22 20:00:49 +02:00
|
|
|
wpa_s->conf->p2p_add_cli_chan) {
|
|
|
|
if (cli_reg == NULL) {
|
2020-02-12 10:44:59 +01:00
|
|
|
if (cli_cla == P2P_MAX_REG_CLASSES)
|
|
|
|
continue;
|
2013-10-22 20:00:49 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Add operating class %u (client only)",
|
|
|
|
o->op_class);
|
|
|
|
cli_reg = &cli_chan->reg_class[cli_cla];
|
|
|
|
cli_cla++;
|
|
|
|
cli_reg->reg_class = o->op_class;
|
|
|
|
}
|
2020-02-12 10:44:59 +01:00
|
|
|
if (cli_reg->channels ==
|
|
|
|
P2P_MAX_REG_CLASS_CHANNELS)
|
|
|
|
continue;
|
2013-10-22 20:00:49 +02:00
|
|
|
cli_reg->channel[cli_reg->channels] = ch;
|
|
|
|
cli_reg->channels++;
|
2010-10-15 17:51:37 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (reg) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Channels",
|
|
|
|
reg->channel, reg->channels);
|
|
|
|
}
|
2013-10-22 20:00:49 +02:00
|
|
|
if (cli_reg) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Channels (client only)",
|
|
|
|
cli_reg->channel, cli_reg->channels);
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2010-10-15 17:51:37 +02:00
|
|
|
chan->reg_classes = cla;
|
2013-10-22 20:00:49 +02:00
|
|
|
cli_chan->reg_classes = cli_cla;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-15 21:53:01 +02:00
|
|
|
int wpas_p2p_get_ht40_mode(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode, u8 channel)
|
|
|
|
{
|
2013-10-22 20:00:49 +02:00
|
|
|
int op;
|
|
|
|
enum chan_allowed ret;
|
2012-08-15 21:53:01 +02:00
|
|
|
|
2016-02-15 15:53:32 +01:00
|
|
|
for (op = 0; global_op_class[op].op_class; op++) {
|
|
|
|
const struct oper_class_map *o = &global_op_class[op];
|
2012-08-15 21:53:01 +02:00
|
|
|
u8 ch;
|
|
|
|
|
2020-10-08 14:05:43 +02:00
|
|
|
if (o->p2p == NO_P2P_SUPP ||
|
|
|
|
(is_6ghz_op_class(o->op_class) &&
|
|
|
|
wpa_s->conf->p2p_6ghz_disable))
|
2016-02-15 15:53:32 +01:00
|
|
|
continue;
|
|
|
|
|
2012-08-15 21:53:01 +02:00
|
|
|
for (ch = o->min_chan; ch <= o->max_chan; ch += o->inc) {
|
|
|
|
if (o->mode != HOSTAPD_MODE_IEEE80211A ||
|
2015-06-17 15:18:14 +02:00
|
|
|
(o->bw != BW40PLUS && o->bw != BW40MINUS) ||
|
|
|
|
ch != channel)
|
2012-08-15 21:53:01 +02:00
|
|
|
continue;
|
|
|
|
ret = wpas_p2p_verify_channel(wpa_s, mode, ch, o->bw);
|
2013-10-22 20:00:49 +02:00
|
|
|
if (ret == ALLOWED)
|
2012-08-15 21:53:01 +02:00
|
|
|
return (o->bw == BW40MINUS) ? -1 : 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-27 19:08:36 +01:00
|
|
|
int wpas_p2p_get_vht80_center(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode, u8 channel)
|
|
|
|
{
|
|
|
|
if (!wpas_p2p_verify_channel(wpa_s, mode, channel, BW80))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return wpas_p2p_get_center_80mhz(wpa_s, mode, channel);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-10-28 22:14:10 +01:00
|
|
|
int wpas_p2p_get_vht160_center(struct wpa_supplicant *wpa_s,
|
|
|
|
struct hostapd_hw_modes *mode, u8 channel)
|
|
|
|
{
|
|
|
|
if (!wpas_p2p_verify_channel(wpa_s, mode, channel, BW160))
|
|
|
|
return 0;
|
|
|
|
return wpas_p2p_get_center_160mhz(wpa_s, mode, channel);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
static int wpas_get_noa(void *ctx, const u8 *interface_addr, u8 *buf,
|
|
|
|
size_t buf_len)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (os_memcmp(wpa_s->own_addr, interface_addr, ETH_ALEN) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return wpa_drv_get_noa(wpa_s, buf, buf_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-02 16:42:04 +02:00
|
|
|
struct wpa_supplicant * wpas_get_p2p_go_iface(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
2012-01-25 16:27:47 +01:00
|
|
|
{
|
2014-06-02 16:42:04 +02:00
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
struct wpa_ssid *s = wpa_s->current_ssid;
|
|
|
|
if (s == NULL)
|
|
|
|
continue;
|
|
|
|
if (s->mode != WPAS_MODE_P2P_GO &&
|
|
|
|
s->mode != WPAS_MODE_AP &&
|
|
|
|
s->mode != WPAS_MODE_P2P_GROUP_FORMATION)
|
|
|
|
continue;
|
|
|
|
if (s->ssid_len != ssid_len ||
|
2014-08-08 12:51:23 +02:00
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) != 0)
|
2014-06-02 16:42:04 +02:00
|
|
|
continue;
|
|
|
|
return wpa_s;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2012-01-25 16:27:47 +01:00
|
|
|
|
2014-06-02 16:42:04 +02:00
|
|
|
struct wpa_supplicant * wpas_get_p2p_client_iface(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer_dev_addr)
|
|
|
|
{
|
2012-01-25 16:27:47 +01:00
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
2015-08-02 18:25:41 +02:00
|
|
|
if (ssid && (ssid->mode != WPAS_MODE_INFRA || !ssid->p2p_group))
|
2012-01-25 16:27:47 +01:00
|
|
|
continue;
|
2014-06-02 16:42:04 +02:00
|
|
|
if (os_memcmp(wpa_s->go_dev_addr, peer_dev_addr, ETH_ALEN) == 0)
|
|
|
|
return wpa_s;
|
2012-01-25 16:27:47 +01:00
|
|
|
}
|
|
|
|
|
2014-06-02 16:42:04 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_go_connected(void *ctx, const u8 *dev_addr)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
|
|
|
|
return wpas_get_p2p_client_iface(wpa_s, dev_addr) != NULL;
|
2012-01-25 16:27:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-20 21:55:09 +01:00
|
|
|
static int wpas_is_concurrent_session_active(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_supplicant *ifs;
|
|
|
|
|
|
|
|
for (ifs = wpa_s->global->ifaces; ifs; ifs = ifs->next) {
|
|
|
|
if (ifs == wpa_s)
|
|
|
|
continue;
|
|
|
|
if (ifs->wpa_state > WPA_ASSOCIATED)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-18 17:47:36 +02:00
|
|
|
static void wpas_p2p_debug_print(void *ctx, int level, const char *msg)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, level, "P2P: %s", msg);
|
2013-05-18 17:47:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-03 21:50:21 +02:00
|
|
|
int wpas_p2p_add_p2pdev_interface(struct wpa_supplicant *wpa_s,
|
|
|
|
const char *conf_p2p_dev)
|
2013-06-30 09:17:47 +02:00
|
|
|
{
|
|
|
|
struct wpa_interface iface;
|
|
|
|
struct wpa_supplicant *p2pdev_wpa_s;
|
|
|
|
char ifname[100];
|
|
|
|
char force_name[100];
|
|
|
|
int ret;
|
2021-01-24 16:33:58 +01:00
|
|
|
const u8 *if_addr = NULL;
|
2013-06-30 09:17:47 +02:00
|
|
|
|
2014-12-06 20:40:31 +01:00
|
|
|
ret = os_snprintf(ifname, sizeof(ifname), P2P_MGMT_DEVICE_PREFIX "%s",
|
|
|
|
wpa_s->ifname);
|
|
|
|
if (os_snprintf_error(sizeof(ifname), ret))
|
|
|
|
return -1;
|
2020-08-25 08:29:02 +02:00
|
|
|
/* Cut length at the maximum size. Note that we don't need to ensure
|
|
|
|
* collision free names here as the created interface is not a netdev.
|
|
|
|
*/
|
|
|
|
ifname[IFNAMSIZ - 1] = '\0';
|
2013-06-30 09:17:47 +02:00
|
|
|
force_name[0] = '\0';
|
|
|
|
wpa_s->pending_interface_type = WPA_IF_P2P_DEVICE;
|
2021-01-24 16:33:58 +01:00
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_device_random_mac_addr == 2 &&
|
|
|
|
!is_zero_ether_addr(wpa_s->conf->p2p_device_persistent_mac_addr))
|
|
|
|
if_addr = wpa_s->conf->p2p_device_persistent_mac_addr;
|
|
|
|
|
|
|
|
ret = wpa_drv_if_add(wpa_s, WPA_IF_P2P_DEVICE, ifname, if_addr, NULL,
|
2013-06-30 09:17:47 +02:00
|
|
|
force_name, wpa_s->pending_interface_addr, NULL);
|
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to create P2P Device interface");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
os_strlcpy(wpa_s->pending_interface_name, ifname,
|
|
|
|
sizeof(wpa_s->pending_interface_name));
|
|
|
|
|
|
|
|
os_memset(&iface, 0, sizeof(iface));
|
|
|
|
iface.p2p_mgmt = 1;
|
|
|
|
iface.ifname = wpa_s->pending_interface_name;
|
|
|
|
iface.driver = wpa_s->driver->name;
|
|
|
|
iface.driver_param = wpa_s->conf->driver_param;
|
2013-09-02 14:41:00 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If a P2P Device configuration file was given, use it as the interface
|
|
|
|
* configuration file (instead of using parent's configuration file.
|
|
|
|
*/
|
2014-10-03 21:50:21 +02:00
|
|
|
if (conf_p2p_dev) {
|
|
|
|
iface.confname = conf_p2p_dev;
|
2013-09-02 14:41:00 +02:00
|
|
|
iface.ctrl_interface = NULL;
|
|
|
|
} else {
|
|
|
|
iface.confname = wpa_s->confname;
|
|
|
|
iface.ctrl_interface = wpa_s->conf->ctrl_interface;
|
|
|
|
}
|
|
|
|
|
2015-03-01 20:50:34 +01:00
|
|
|
p2pdev_wpa_s = wpa_supplicant_add_iface(wpa_s->global, &iface, wpa_s);
|
2013-06-30 09:17:47 +02:00
|
|
|
if (!p2pdev_wpa_s) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to add P2P Device interface");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
p2pdev_wpa_s->p2pdev = p2pdev_wpa_s;
|
2013-06-30 09:17:47 +02:00
|
|
|
wpa_s->pending_interface_name[0] = '\0';
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-01 17:44:44 +01:00
|
|
|
static void wpas_presence_resp(void *ctx, const u8 *src, u8 status,
|
|
|
|
const u8 *noa, size_t noa_len)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s, *intf = ctx;
|
|
|
|
char hex[100];
|
|
|
|
|
|
|
|
for (wpa_s = intf->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (wpa_s->waiting_presence_resp)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!wpa_s) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No group interface was waiting for presence response");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_s->waiting_presence_resp = 0;
|
|
|
|
|
|
|
|
wpa_snprintf_hex(hex, sizeof(hex), noa, noa_len);
|
|
|
|
wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PRESENCE_RESPONSE "src=" MACSTR
|
|
|
|
" status=%u noa=%s", MAC2STR(src), status, hex);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 09:38:56 +01:00
|
|
|
static int wpas_get_persistent_group(void *ctx, const u8 *addr, const u8 *ssid,
|
|
|
|
size_t ssid_len, u8 *go_dev_addr,
|
2015-07-02 09:45:05 +02:00
|
|
|
u8 *ret_ssid, size_t *ret_ssid_len,
|
|
|
|
u8 *intended_iface_addr)
|
2014-12-10 09:38:56 +01:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
|
|
|
s = wpas_p2p_get_persistent(wpa_s, addr, ssid, ssid_len);
|
|
|
|
if (s) {
|
|
|
|
os_memcpy(ret_ssid, s->ssid, s->ssid_len);
|
|
|
|
*ret_ssid_len = s->ssid_len;
|
|
|
|
os_memcpy(go_dev_addr, s->bssid, ETH_ALEN);
|
2015-07-02 09:45:05 +02:00
|
|
|
|
|
|
|
if (s->mode != WPAS_MODE_P2P_GO) {
|
|
|
|
os_memset(intended_iface_addr, 0, ETH_ALEN);
|
|
|
|
} else if (wpas_p2p_create_iface(wpa_s)) {
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, WPA_IF_P2P_GO))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
os_memcpy(intended_iface_addr,
|
|
|
|
wpa_s->pending_interface_addr, ETH_ALEN);
|
|
|
|
} else {
|
|
|
|
os_memcpy(intended_iface_addr, wpa_s->own_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
}
|
2014-12-10 09:38:56 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_get_go_info(void *ctx, u8 *intended_addr,
|
2015-10-08 11:35:58 +02:00
|
|
|
u8 *ssid, size_t *ssid_len, int *group_iface,
|
|
|
|
unsigned int *freq)
|
2014-12-10 09:38:56 +01:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
2015-10-08 11:35:58 +02:00
|
|
|
struct wpa_supplicant *go;
|
2014-12-10 09:38:56 +01:00
|
|
|
struct wpa_ssid *s;
|
|
|
|
|
2015-07-02 09:45:07 +02:00
|
|
|
/*
|
|
|
|
* group_iface will be set to 1 only if a dedicated interface for P2P
|
|
|
|
* role is required. First, we try to reuse an active GO. However,
|
|
|
|
* if it is not present, we will try to reactivate an existing
|
|
|
|
* persistent group and set group_iface to 1, so the caller will know
|
|
|
|
* that the pending interface should be used.
|
|
|
|
*/
|
|
|
|
*group_iface = 0;
|
2015-10-08 11:35:58 +02:00
|
|
|
|
|
|
|
if (freq)
|
|
|
|
*freq = 0;
|
|
|
|
|
|
|
|
go = wpas_p2p_get_go_group(wpa_s);
|
|
|
|
if (!go) {
|
2014-12-10 09:38:56 +01:00
|
|
|
s = wpas_p2p_get_persistent_go(wpa_s);
|
2015-07-02 09:45:07 +02:00
|
|
|
*group_iface = wpas_p2p_create_iface(wpa_s);
|
2014-12-10 09:38:56 +01:00
|
|
|
if (s)
|
2015-10-08 11:35:58 +02:00
|
|
|
os_memcpy(intended_addr, s->bssid, ETH_ALEN);
|
2015-07-02 09:45:07 +02:00
|
|
|
else
|
|
|
|
return 0;
|
2015-10-08 11:35:58 +02:00
|
|
|
} else {
|
|
|
|
s = go->current_ssid;
|
|
|
|
os_memcpy(intended_addr, go->own_addr, ETH_ALEN);
|
|
|
|
if (freq)
|
|
|
|
*freq = go->assoc_freq;
|
2014-12-10 09:38:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
os_memcpy(ssid, s->ssid, s->ssid_len);
|
|
|
|
*ssid_len = s->ssid_len;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 14:38:17 +01:00
|
|
|
static int wpas_remove_stale_groups(void *ctx, const u8 *peer, const u8 *go,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
int save_config = 0;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* Start with our first choice of Persistent Groups */
|
|
|
|
while ((s = wpas_p2p_get_persistent(wpa_s, peer, NULL, 0))) {
|
|
|
|
if (go && ssid && ssid_len &&
|
|
|
|
s->ssid_len == ssid_len &&
|
|
|
|
os_memcmp(go, s->bssid, ETH_ALEN) == 0 &&
|
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Remove stale persistent group */
|
|
|
|
if (s->mode != WPAS_MODE_P2P_GO || s->num_p2p_clients <= 1) {
|
2019-01-03 16:47:26 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove stale persistent group id=%d",
|
|
|
|
s->id);
|
|
|
|
wpas_notify_persistent_group_removed(wpa_s, s);
|
2014-12-10 14:38:17 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf, s->id);
|
|
|
|
save_config = 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < s->num_p2p_clients; i++) {
|
|
|
|
if (os_memcmp(s->p2p_client_list + i * 2 * ETH_ALEN,
|
|
|
|
peer, ETH_ALEN) != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
os_memmove(s->p2p_client_list + i * 2 * ETH_ALEN,
|
|
|
|
s->p2p_client_list + (i + 1) * 2 * ETH_ALEN,
|
|
|
|
(s->num_p2p_clients - i - 1) * 2 * ETH_ALEN);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
s->num_p2p_clients--;
|
|
|
|
save_config = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (save_config)
|
|
|
|
p2p_config_write(wpa_s);
|
|
|
|
|
|
|
|
/* Return TRUE if valid SSID remains */
|
|
|
|
return s != NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-02 15:21:23 +02:00
|
|
|
static void wpas_p2ps_get_feat_cap_str(char *buf, size_t buf_len,
|
|
|
|
const u8 *feat_cap, size_t feat_cap_len)
|
|
|
|
{
|
|
|
|
static const char pref[] = " feature_cap=";
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
buf[0] = '\0';
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We expect a feature capability to contain at least one byte to be
|
|
|
|
* reported. The string buffer provided by the caller function is
|
|
|
|
* expected to be big enough to contain all bytes of the attribute for
|
|
|
|
* known specifications. This function truncates the reported bytes if
|
|
|
|
* the feature capability data exceeds the string buffer size.
|
|
|
|
*/
|
|
|
|
if (!feat_cap || !feat_cap_len || buf_len < sizeof(pref) + 2)
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memcpy(buf, pref, sizeof(pref));
|
|
|
|
ret = wpa_snprintf_hex(&buf[sizeof(pref) - 1],
|
|
|
|
buf_len - sizeof(pref) + 1,
|
|
|
|
feat_cap, feat_cap_len);
|
|
|
|
|
|
|
|
if (ret != (2 * (int) feat_cap_len))
|
|
|
|
wpa_printf(MSG_WARNING, "P2PS feature_cap bytes truncated");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 14:43:23 +01:00
|
|
|
static void wpas_p2ps_prov_complete(void *ctx, u8 status, const u8 *dev,
|
|
|
|
const u8 *adv_mac, const u8 *ses_mac,
|
|
|
|
const u8 *grp_mac, u32 adv_id, u32 ses_id,
|
|
|
|
u8 conncap, int passwd_id,
|
|
|
|
const u8 *persist_ssid,
|
|
|
|
size_t persist_ssid_size, int response_done,
|
2015-07-02 15:21:23 +02:00
|
|
|
int prov_start, const char *session_info,
|
2015-10-08 11:36:01 +02:00
|
|
|
const u8 *feat_cap, size_t feat_cap_len,
|
2015-12-30 17:59:03 +01:00
|
|
|
unsigned int freq,
|
|
|
|
const u8 *group_ssid, size_t group_ssid_len)
|
2014-12-10 14:43:23 +01:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
u8 mac[ETH_ALEN];
|
2015-10-08 11:36:03 +02:00
|
|
|
struct wpa_ssid *persistent_go, *stale, *s = NULL;
|
2014-12-10 14:43:23 +01:00
|
|
|
int save_config = 0;
|
|
|
|
struct wpa_supplicant *go_wpa_s;
|
2015-07-02 15:21:23 +02:00
|
|
|
char feat_cap_str[256];
|
2014-12-10 14:43:23 +01:00
|
|
|
|
|
|
|
if (!dev)
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(mac, 0, ETH_ALEN);
|
|
|
|
if (!adv_mac)
|
|
|
|
adv_mac = mac;
|
|
|
|
if (!ses_mac)
|
|
|
|
ses_mac = mac;
|
|
|
|
if (!grp_mac)
|
|
|
|
grp_mac = mac;
|
|
|
|
|
2015-07-02 15:21:23 +02:00
|
|
|
wpas_p2ps_get_feat_cap_str(feat_cap_str, sizeof(feat_cap_str),
|
|
|
|
feat_cap, feat_cap_len);
|
|
|
|
|
2014-12-10 14:43:23 +01:00
|
|
|
if (prov_start) {
|
|
|
|
if (session_info == NULL) {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_START MACSTR
|
|
|
|
" adv_id=%x conncap=%x"
|
|
|
|
" adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" dev_passwd_id=%d%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), adv_id, conncap,
|
|
|
|
MAC2STR(adv_mac),
|
|
|
|
ses_id, MAC2STR(ses_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
passwd_id, feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
} else {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_START MACSTR
|
|
|
|
" adv_id=%x conncap=%x"
|
|
|
|
" adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" dev_passwd_id=%d info='%s'%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), adv_id, conncap,
|
|
|
|
MAC2STR(adv_mac),
|
|
|
|
ses_id, MAC2STR(ses_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
passwd_id, session_info, feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
go_wpa_s = wpas_p2p_get_go_group(wpa_s);
|
|
|
|
persistent_go = wpas_p2p_get_persistent_go(wpa_s);
|
|
|
|
|
|
|
|
if (status && status != P2P_SC_SUCCESS_DEFERRED) {
|
|
|
|
if (go_wpa_s && !p2p_group_go_member_count(wpa_s))
|
|
|
|
wpas_p2p_group_remove(wpa_s, go_wpa_s->ifname);
|
|
|
|
|
|
|
|
if (persistent_go && !persistent_go->num_p2p_clients) {
|
|
|
|
/* remove empty persistent GO */
|
2019-01-04 12:18:26 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove empty persistent group id=%d",
|
|
|
|
persistent_go->id);
|
|
|
|
wpas_notify_persistent_group_removed(wpa_s,
|
|
|
|
persistent_go);
|
2014-12-10 14:43:23 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf,
|
|
|
|
persistent_go->id);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_DONE MACSTR
|
|
|
|
" status=%d"
|
|
|
|
" adv_id=%x adv_mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" session=%x mac=" MACSTR "%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), status,
|
|
|
|
adv_id, MAC2STR(adv_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
ses_id, MAC2STR(ses_mac), feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Clean up stale persistent groups with this device */
|
2015-10-08 11:36:03 +02:00
|
|
|
if (persist_ssid && persist_ssid_size)
|
|
|
|
s = wpas_p2p_get_persistent(wpa_s, dev, persist_ssid,
|
|
|
|
persist_ssid_size);
|
2015-07-02 09:45:06 +02:00
|
|
|
|
|
|
|
if (persist_ssid && s && s->mode != WPAS_MODE_P2P_GO &&
|
2015-08-06 19:43:25 +02:00
|
|
|
is_zero_ether_addr(grp_mac)) {
|
2015-07-02 09:45:06 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_ERROR,
|
|
|
|
"P2P: Peer device is a GO in a persistent group, but it did not provide the intended MAC address");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-10 14:43:23 +01:00
|
|
|
for (;;) {
|
|
|
|
stale = wpas_p2p_get_persistent(wpa_s, dev, NULL, 0);
|
|
|
|
if (!stale)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (s && s->ssid_len == stale->ssid_len &&
|
|
|
|
os_memcmp(stale->bssid, s->bssid, ETH_ALEN) == 0 &&
|
|
|
|
os_memcmp(stale->ssid, s->ssid, s->ssid_len) == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Remove stale persistent group */
|
|
|
|
if (stale->mode != WPAS_MODE_P2P_GO ||
|
|
|
|
stale->num_p2p_clients <= 1) {
|
2019-01-04 12:18:26 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove stale persistent group id=%d",
|
|
|
|
stale->id);
|
|
|
|
wpas_notify_persistent_group_removed(wpa_s, stale);
|
2014-12-10 14:43:23 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf, stale->id);
|
|
|
|
} else {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < stale->num_p2p_clients; i++) {
|
|
|
|
if (os_memcmp(stale->p2p_client_list +
|
|
|
|
i * ETH_ALEN,
|
|
|
|
dev, ETH_ALEN) == 0) {
|
|
|
|
os_memmove(stale->p2p_client_list +
|
|
|
|
i * ETH_ALEN,
|
|
|
|
stale->p2p_client_list +
|
|
|
|
(i + 1) * ETH_ALEN,
|
|
|
|
(stale->num_p2p_clients -
|
|
|
|
i - 1) * ETH_ALEN);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
stale->num_p2p_clients--;
|
|
|
|
}
|
|
|
|
save_config = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (save_config)
|
|
|
|
p2p_config_write(wpa_s);
|
|
|
|
|
|
|
|
if (s) {
|
|
|
|
if (go_wpa_s && !p2p_group_go_member_count(wpa_s))
|
|
|
|
wpas_p2p_group_remove(wpa_s, go_wpa_s->ifname);
|
|
|
|
|
|
|
|
if (persistent_go && s != persistent_go &&
|
|
|
|
!persistent_go->num_p2p_clients) {
|
|
|
|
/* remove empty persistent GO */
|
2019-01-04 12:18:26 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove empty persistent group id=%d",
|
|
|
|
persistent_go->id);
|
|
|
|
wpas_notify_persistent_group_removed(wpa_s,
|
|
|
|
persistent_go);
|
2014-12-10 14:43:23 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf,
|
|
|
|
persistent_go->id);
|
|
|
|
/* Save config */
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_DONE MACSTR
|
|
|
|
" status=%d"
|
|
|
|
" adv_id=%x adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" persist=%d%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), status,
|
|
|
|
adv_id, MAC2STR(adv_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
ses_id, MAC2STR(ses_mac), s->id, feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-03 17:17:19 +02:00
|
|
|
wpa_s->global->pending_p2ps_group = 0;
|
|
|
|
wpa_s->global->pending_p2ps_group_freq = 0;
|
|
|
|
|
2014-12-10 14:43:23 +01:00
|
|
|
if (conncap == P2PS_SETUP_GROUP_OWNER) {
|
2015-07-02 09:45:04 +02:00
|
|
|
/*
|
|
|
|
* We need to copy the interface name. Simply saving a
|
|
|
|
* pointer isn't enough, since if we use pending_interface_name
|
|
|
|
* it will be overwritten when the group is added.
|
|
|
|
*/
|
|
|
|
char go_ifname[100];
|
|
|
|
|
|
|
|
go_ifname[0] = '\0';
|
2014-12-10 14:43:23 +01:00
|
|
|
if (!go_wpa_s) {
|
2019-04-03 17:17:19 +02:00
|
|
|
if (!response_done) {
|
|
|
|
wpa_s->global->pending_p2ps_group = 1;
|
|
|
|
wpa_s->global->pending_p2ps_group_freq = freq;
|
|
|
|
}
|
2014-12-10 14:43:23 +01:00
|
|
|
|
2015-07-02 09:45:03 +02:00
|
|
|
if (!wpas_p2p_create_iface(wpa_s))
|
2015-07-02 09:45:04 +02:00
|
|
|
os_memcpy(go_ifname, wpa_s->ifname,
|
|
|
|
sizeof(go_ifname));
|
2014-12-10 14:43:23 +01:00
|
|
|
else if (wpa_s->pending_interface_name[0])
|
2015-07-02 09:45:04 +02:00
|
|
|
os_memcpy(go_ifname,
|
|
|
|
wpa_s->pending_interface_name,
|
|
|
|
sizeof(go_ifname));
|
2014-12-10 14:43:23 +01:00
|
|
|
|
2015-07-02 09:45:04 +02:00
|
|
|
if (!go_ifname[0]) {
|
2014-12-10 14:43:23 +01:00
|
|
|
wpas_p2ps_prov_complete(
|
|
|
|
wpa_s, P2P_SC_FAIL_UNKNOWN_GROUP,
|
|
|
|
dev, adv_mac, ses_mac,
|
2015-08-06 19:43:25 +02:00
|
|
|
grp_mac, adv_id, ses_id, 0, 0,
|
2015-12-30 17:59:03 +01:00
|
|
|
NULL, 0, 0, 0, NULL, NULL, 0, 0,
|
|
|
|
NULL, 0);
|
2014-12-10 14:43:23 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If PD Resp complete, start up the GO */
|
|
|
|
if (response_done && persistent_go) {
|
|
|
|
wpas_p2p_group_add_persistent(
|
|
|
|
wpa_s, persistent_go,
|
2019-10-17 19:44:14 +02:00
|
|
|
0, 0, freq, 0, 0, 0, 0, 0, 0, NULL,
|
2014-12-10 14:43:23 +01:00
|
|
|
persistent_go->mode ==
|
|
|
|
WPAS_MODE_P2P_GO ?
|
|
|
|
P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE :
|
2015-08-21 17:28:28 +02:00
|
|
|
0, 0);
|
2014-12-10 14:43:23 +01:00
|
|
|
} else if (response_done) {
|
2018-12-21 19:20:28 +01:00
|
|
|
wpas_p2p_group_add(wpa_s, 1, freq,
|
2019-10-17 19:44:14 +02:00
|
|
|
0, 0, 0, 0, 0, 0);
|
2014-12-10 14:43:23 +01:00
|
|
|
}
|
2014-12-15 12:40:31 +01:00
|
|
|
|
|
|
|
if (passwd_id == DEV_PW_P2PS_DEFAULT) {
|
2015-07-30 08:00:06 +02:00
|
|
|
os_memcpy(wpa_s->p2ps_join_addr, grp_mac,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_s->p2ps_method_config_any = 1;
|
2014-12-15 12:40:31 +01:00
|
|
|
}
|
2014-12-10 14:43:23 +01:00
|
|
|
} else if (passwd_id == DEV_PW_P2PS_DEFAULT) {
|
2015-07-02 09:45:04 +02:00
|
|
|
os_memcpy(go_ifname, go_wpa_s->ifname,
|
|
|
|
sizeof(go_ifname));
|
2014-12-10 14:43:23 +01:00
|
|
|
|
2015-07-30 08:00:06 +02:00
|
|
|
if (is_zero_ether_addr(grp_mac)) {
|
|
|
|
wpa_dbg(go_wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Setting PIN-1 for ANY");
|
|
|
|
wpa_supplicant_ap_wps_pin(go_wpa_s, NULL,
|
|
|
|
"12345670", NULL, 0,
|
|
|
|
0);
|
|
|
|
} else {
|
|
|
|
wpa_dbg(go_wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Setting PIN-1 for " MACSTR,
|
|
|
|
MAC2STR(grp_mac));
|
|
|
|
wpa_supplicant_ap_wps_pin(go_wpa_s, grp_mac,
|
|
|
|
"12345670", NULL, 0,
|
|
|
|
0);
|
|
|
|
}
|
2014-12-15 12:40:31 +01:00
|
|
|
|
2015-07-30 08:00:06 +02:00
|
|
|
os_memcpy(wpa_s->p2ps_join_addr, grp_mac, ETH_ALEN);
|
|
|
|
wpa_s->p2ps_method_config_any = 1;
|
2014-12-10 14:43:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_DONE MACSTR
|
|
|
|
" status=%d conncap=%x"
|
|
|
|
" adv_id=%x adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" dev_passwd_id=%d go=%s%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), status, conncap,
|
|
|
|
adv_id, MAC2STR(adv_mac),
|
|
|
|
ses_id, MAC2STR(ses_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
passwd_id, go_ifname, feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (go_wpa_s && !p2p_group_go_member_count(wpa_s))
|
|
|
|
wpas_p2p_group_remove(wpa_s, go_wpa_s->ifname);
|
|
|
|
|
|
|
|
if (persistent_go && !persistent_go->num_p2p_clients) {
|
|
|
|
/* remove empty persistent GO */
|
2019-01-04 12:18:26 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove empty persistent group id=%d",
|
|
|
|
persistent_go->id);
|
|
|
|
wpas_notify_persistent_group_removed(wpa_s, persistent_go);
|
2014-12-10 14:43:23 +01:00
|
|
|
wpa_config_remove_network(wpa_s->conf, persistent_go->id);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conncap == P2PS_SETUP_CLIENT) {
|
2015-12-30 17:59:03 +01:00
|
|
|
char ssid_hex[32 * 2 + 1];
|
|
|
|
|
|
|
|
if (group_ssid)
|
|
|
|
wpa_snprintf_hex(ssid_hex, sizeof(ssid_hex),
|
|
|
|
group_ssid, group_ssid_len);
|
|
|
|
else
|
|
|
|
ssid_hex[0] = '\0';
|
2014-12-10 14:43:23 +01:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_DONE MACSTR
|
|
|
|
" status=%d conncap=%x"
|
|
|
|
" adv_id=%x adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-12-30 17:59:03 +01:00
|
|
|
" dev_passwd_id=%d join=" MACSTR "%s%s%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), status, conncap,
|
|
|
|
adv_id, MAC2STR(adv_mac),
|
|
|
|
ses_id, MAC2STR(ses_mac),
|
2015-12-30 17:59:03 +01:00
|
|
|
passwd_id, MAC2STR(grp_mac), feat_cap_str,
|
|
|
|
group_ssid ? " group_ssid=" : "", ssid_hex);
|
2014-12-10 14:43:23 +01:00
|
|
|
} else {
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_P2PS_PROVISION_DONE MACSTR
|
|
|
|
" status=%d conncap=%x"
|
|
|
|
" adv_id=%x adv_mac=" MACSTR
|
|
|
|
" session=%x mac=" MACSTR
|
2015-07-02 15:21:23 +02:00
|
|
|
" dev_passwd_id=%d%s",
|
2014-12-10 14:43:23 +01:00
|
|
|
MAC2STR(dev), status, conncap,
|
|
|
|
adv_id, MAC2STR(adv_mac),
|
|
|
|
ses_id, MAC2STR(ses_mac),
|
2015-07-02 15:21:23 +02:00
|
|
|
passwd_id, feat_cap_str);
|
2014-12-10 14:43:23 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-06 18:34:37 +02:00
|
|
|
static int _wpas_p2p_in_progress(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
return wpas_p2p_in_progress(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-12-10 12:29:29 +01:00
|
|
|
static int wpas_prov_disc_resp_cb(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
struct wpa_ssid *persistent_go;
|
2015-10-08 11:36:01 +02:00
|
|
|
unsigned int freq;
|
2014-12-10 12:29:29 +01:00
|
|
|
|
|
|
|
if (!wpa_s->global->pending_p2ps_group)
|
|
|
|
return 0;
|
|
|
|
|
2015-10-08 11:36:01 +02:00
|
|
|
freq = wpa_s->global->pending_p2ps_group_freq;
|
|
|
|
wpa_s->global->pending_p2ps_group_freq = 0;
|
2014-12-10 12:29:29 +01:00
|
|
|
wpa_s->global->pending_p2ps_group = 0;
|
|
|
|
|
|
|
|
if (wpas_p2p_get_go_group(wpa_s))
|
|
|
|
return 0;
|
|
|
|
persistent_go = wpas_p2p_get_persistent_go(wpa_s);
|
|
|
|
|
|
|
|
if (persistent_go) {
|
|
|
|
wpas_p2p_group_add_persistent(
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s, persistent_go, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
NULL,
|
2014-12-10 12:29:29 +01:00
|
|
|
persistent_go->mode == WPAS_MODE_P2P_GO ?
|
2015-08-21 17:28:28 +02:00
|
|
|
P2P_MAX_INITIAL_CONN_WAIT_GO_REINVOKE : 0, 0);
|
2014-12-10 12:29:29 +01:00
|
|
|
} else {
|
2019-10-17 19:44:14 +02:00
|
|
|
wpas_p2p_group_add(wpa_s, 1, freq, 0, 0, 0, 0, 0, 0);
|
2014-12-10 12:29:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-24 10:23:24 +02:00
|
|
|
static int wpas_p2p_get_pref_freq_list(void *ctx, int go,
|
|
|
|
unsigned int *len,
|
|
|
|
unsigned int *freq_list)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
|
|
|
|
return wpa_drv_get_pref_freq_list(wpa_s, go ? WPA_IF_P2P_GO :
|
|
|
|
WPA_IF_P2P_CLIENT, len, freq_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-11-13 08:19:57 +01:00
|
|
|
int wpas_p2p_mac_setup(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
u8 addr[ETH_ALEN] = {0};
|
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_device_random_mac_addr == 0)
|
|
|
|
return 0;
|
|
|
|
|
2021-01-24 16:33:58 +01:00
|
|
|
if (wpa_s->conf->p2p_device_random_mac_addr == 2) {
|
|
|
|
if (is_zero_ether_addr(
|
|
|
|
wpa_s->conf->p2p_device_persistent_mac_addr) &&
|
|
|
|
!is_zero_ether_addr(wpa_s->own_addr)) {
|
|
|
|
os_memcpy(wpa_s->conf->p2p_device_persistent_mac_addr,
|
|
|
|
wpa_s->own_addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-13 08:19:57 +01:00
|
|
|
if (!wpa_s->conf->ssid) {
|
|
|
|
if (random_mac_addr(addr) < 0) {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO,
|
|
|
|
"Failed to generate random MAC address");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Store generated MAC address. */
|
|
|
|
os_memcpy(wpa_s->conf->p2p_device_persistent_mac_addr, addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
} else {
|
|
|
|
/* If there are existing saved groups, restore last MAC address.
|
|
|
|
* if there is no last used MAC address, the last one is
|
|
|
|
* factory MAC. */
|
|
|
|
if (is_zero_ether_addr(
|
|
|
|
wpa_s->conf->p2p_device_persistent_mac_addr))
|
|
|
|
return 0;
|
|
|
|
os_memcpy(addr, wpa_s->conf->p2p_device_persistent_mac_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_msg(wpa_s, MSG_DEBUG, "Restore last used MAC address.");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_drv_set_mac_addr(wpa_s, addr) < 0) {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO,
|
|
|
|
"Failed to set random MAC address");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_supplicant_update_mac_addr(wpa_s) < 0) {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO,
|
|
|
|
"Could not update MAC address information");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_msg(wpa_s, MSG_DEBUG, "Using random MAC address " MACSTR,
|
|
|
|
MAC2STR(addr));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
/**
|
|
|
|
* wpas_p2p_init - Initialize P2P module for %wpa_supplicant
|
|
|
|
* @global: Pointer to global data from wpa_supplicant_init()
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*/
|
|
|
|
int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct p2p_config p2p;
|
2011-03-19 10:57:10 +01:00
|
|
|
int i;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2013-08-31 10:59:05 +02:00
|
|
|
if (wpa_s->conf->p2p_disabled)
|
|
|
|
return 0;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (global->p2p)
|
|
|
|
return 0;
|
|
|
|
|
2018-11-13 08:19:57 +01:00
|
|
|
if (wpas_p2p_mac_setup(wpa_s) < 0) {
|
|
|
|
wpa_msg(wpa_s, MSG_ERROR,
|
|
|
|
"Failed to initialize P2P random MAC address.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
os_memset(&p2p, 0, sizeof(p2p));
|
|
|
|
p2p.cb_ctx = wpa_s;
|
2013-05-18 17:47:36 +02:00
|
|
|
p2p.debug_print = wpas_p2p_debug_print;
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p.p2p_scan = wpas_p2p_scan;
|
|
|
|
p2p.send_action = wpas_send_action;
|
|
|
|
p2p.send_action_done = wpas_send_action_done;
|
|
|
|
p2p.go_neg_completed = wpas_go_neg_completed;
|
|
|
|
p2p.go_neg_req_rx = wpas_go_neg_req_rx;
|
|
|
|
p2p.dev_found = wpas_dev_found;
|
2011-02-24 21:22:16 +01:00
|
|
|
p2p.dev_lost = wpas_dev_lost;
|
2013-05-18 15:06:40 +02:00
|
|
|
p2p.find_stopped = wpas_find_stopped;
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p.start_listen = wpas_start_listen;
|
|
|
|
p2p.stop_listen = wpas_stop_listen;
|
|
|
|
p2p.send_probe_resp = wpas_send_probe_resp;
|
|
|
|
p2p.sd_request = wpas_sd_request;
|
|
|
|
p2p.sd_response = wpas_sd_response;
|
|
|
|
p2p.prov_disc_req = wpas_prov_disc_req;
|
|
|
|
p2p.prov_disc_resp = wpas_prov_disc_resp;
|
2011-06-12 23:31:56 +02:00
|
|
|
p2p.prov_disc_fail = wpas_prov_disc_fail;
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p.invitation_process = wpas_invitation_process;
|
|
|
|
p2p.invitation_received = wpas_invitation_received;
|
|
|
|
p2p.invitation_result = wpas_invitation_result;
|
|
|
|
p2p.get_noa = wpas_get_noa;
|
2012-01-25 16:27:47 +01:00
|
|
|
p2p.go_connected = wpas_go_connected;
|
2014-01-01 17:44:44 +01:00
|
|
|
p2p.presence_resp = wpas_presence_resp;
|
2014-01-20 21:55:09 +01:00
|
|
|
p2p.is_concurrent_session_active = wpas_is_concurrent_session_active;
|
2014-05-06 18:34:37 +02:00
|
|
|
p2p.is_p2p_in_progress = _wpas_p2p_in_progress;
|
2014-12-10 09:38:56 +01:00
|
|
|
p2p.get_persistent_group = wpas_get_persistent_group;
|
|
|
|
p2p.get_go_info = wpas_get_go_info;
|
2014-12-10 14:38:17 +01:00
|
|
|
p2p.remove_stale_groups = wpas_remove_stale_groups;
|
2014-12-10 14:43:23 +01:00
|
|
|
p2p.p2ps_prov_complete = wpas_p2ps_prov_complete;
|
2014-12-10 12:29:29 +01:00
|
|
|
p2p.prov_disc_resp_cb = wpas_prov_disc_resp_cb;
|
2014-12-10 11:53:54 +01:00
|
|
|
p2p.p2ps_group_capability = p2ps_group_capability;
|
2015-07-24 10:23:24 +02:00
|
|
|
p2p.get_pref_freq_list = wpas_p2p_get_pref_freq_list;
|
2020-10-29 14:45:47 +01:00
|
|
|
p2p.p2p_6ghz_disable = wpa_s->conf->p2p_6ghz_disable;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
os_memcpy(wpa_s->global->p2p_dev_addr, wpa_s->own_addr, ETH_ALEN);
|
2011-12-25 22:58:03 +01:00
|
|
|
os_memcpy(p2p.dev_addr, wpa_s->global->p2p_dev_addr, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p.dev_name = wpa_s->conf->device_name;
|
2011-03-28 14:24:12 +02:00
|
|
|
p2p.manufacturer = wpa_s->conf->manufacturer;
|
|
|
|
p2p.model_name = wpa_s->conf->model_name;
|
|
|
|
p2p.model_number = wpa_s->conf->model_number;
|
|
|
|
p2p.serial_number = wpa_s->conf->serial_number;
|
|
|
|
if (wpa_s->wps) {
|
|
|
|
os_memcpy(p2p.uuid, wpa_s->wps->uuid, 16);
|
|
|
|
p2p.config_methods = wpa_s->wps->config_methods;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2020-10-29 14:45:47 +01:00
|
|
|
if (wpas_p2p_setup_channels(wpa_s, &p2p.channels, &p2p.cli_channels,
|
|
|
|
p2p.p2p_6ghz_disable)) {
|
2014-09-25 11:42:07 +02:00
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"P2P: Failed to configure supported channel list");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->conf->p2p_listen_reg_class &&
|
|
|
|
wpa_s->conf->p2p_listen_channel) {
|
|
|
|
p2p.reg_class = wpa_s->conf->p2p_listen_reg_class;
|
|
|
|
p2p.channel = wpa_s->conf->p2p_listen_channel;
|
2014-05-19 09:05:39 +02:00
|
|
|
p2p.channel_forced = 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Pick one of the social channels randomly as the listen
|
|
|
|
* channel.
|
|
|
|
*/
|
2014-09-25 11:42:07 +02:00
|
|
|
if (p2p_config_get_random_social(&p2p, &p2p.reg_class,
|
2018-12-28 13:42:00 +01:00
|
|
|
&p2p.channel,
|
|
|
|
&global->p2p_go_avoid_freq,
|
|
|
|
&global->p2p_disallow_freq) !=
|
|
|
|
0) {
|
2015-04-26 12:59:06 +02:00
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"P2P: No social channels supported by the driver - do not enable P2P");
|
|
|
|
return 0;
|
2014-09-25 11:42:07 +02:00
|
|
|
}
|
2014-05-19 09:05:39 +02:00
|
|
|
p2p.channel_forced = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2014-09-25 11:42:07 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Own listen channel: %d:%d",
|
|
|
|
p2p.reg_class, p2p.channel);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_oper_reg_class &&
|
|
|
|
wpa_s->conf->p2p_oper_channel) {
|
|
|
|
p2p.op_reg_class = wpa_s->conf->p2p_oper_reg_class;
|
|
|
|
p2p.op_channel = wpa_s->conf->p2p_oper_channel;
|
2010-11-10 12:33:47 +01:00
|
|
|
p2p.cfg_op_channel = 1;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Configured operating channel: "
|
|
|
|
"%d:%d", p2p.op_reg_class, p2p.op_channel);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
|
|
|
/*
|
2014-09-25 11:42:07 +02:00
|
|
|
* Use random operation channel from 2.4 GHz band social
|
|
|
|
* channels (1, 6, 11) or band 60 GHz social channel (2) if no
|
|
|
|
* other preference is indicated.
|
2010-07-18 23:30:25 +02:00
|
|
|
*/
|
2014-09-25 11:42:07 +02:00
|
|
|
if (p2p_config_get_random_social(&p2p, &p2p.op_reg_class,
|
2018-12-28 13:42:00 +01:00
|
|
|
&p2p.op_channel, NULL,
|
|
|
|
NULL) != 0) {
|
|
|
|
wpa_printf(MSG_INFO,
|
2014-09-25 11:42:07 +02:00
|
|
|
"P2P: Failed to select random social channel as operation channel");
|
2018-12-28 13:42:00 +01:00
|
|
|
p2p.op_reg_class = 0;
|
|
|
|
p2p.op_channel = 0;
|
|
|
|
/* This will be overridden during group setup in
|
|
|
|
* p2p_prepare_channel(), so allow setup to continue. */
|
2014-09-25 11:42:07 +02:00
|
|
|
}
|
2010-11-10 12:33:47 +01:00
|
|
|
p2p.cfg_op_channel = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Random operating channel: "
|
|
|
|
"%d:%d", p2p.op_reg_class, p2p.op_channel);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2013-05-17 10:03:52 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_pref_chan && wpa_s->conf->num_p2p_pref_chan) {
|
|
|
|
p2p.pref_chan = wpa_s->conf->p2p_pref_chan;
|
|
|
|
p2p.num_pref_chan = wpa_s->conf->num_p2p_pref_chan;
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->conf->country[0] && wpa_s->conf->country[1]) {
|
|
|
|
os_memcpy(p2p.country, wpa_s->conf->country, 2);
|
|
|
|
p2p.country[2] = 0x04;
|
|
|
|
} else
|
2010-11-10 15:22:22 +01:00
|
|
|
os_memcpy(p2p.country, "XX\x04", 3);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-03-17 17:50:22 +01:00
|
|
|
os_memcpy(p2p.pri_dev_type, wpa_s->conf->device_type,
|
|
|
|
WPS_DEV_TYPE_LEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-03-17 17:50:22 +01:00
|
|
|
p2p.num_sec_dev_types = wpa_s->conf->num_sec_device_types;
|
|
|
|
os_memcpy(p2p.sec_dev_type, wpa_s->conf->sec_device_type,
|
|
|
|
p2p.num_sec_dev_types * WPS_DEV_TYPE_LEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
p2p.concurrent_operations = !!(wpa_s->drv_flags &
|
|
|
|
WPA_DRIVER_FLAGS_P2P_CONCURRENT);
|
|
|
|
|
2010-10-19 16:17:04 +02:00
|
|
|
p2p.max_peers = 100;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_ssid_postfix) {
|
|
|
|
p2p.ssid_postfix_len =
|
|
|
|
os_strlen(wpa_s->conf->p2p_ssid_postfix);
|
|
|
|
if (p2p.ssid_postfix_len > sizeof(p2p.ssid_postfix))
|
|
|
|
p2p.ssid_postfix_len = sizeof(p2p.ssid_postfix);
|
|
|
|
os_memcpy(p2p.ssid_postfix, wpa_s->conf->p2p_ssid_postfix,
|
|
|
|
p2p.ssid_postfix_len);
|
|
|
|
}
|
|
|
|
|
2010-09-08 20:18:10 +02:00
|
|
|
p2p.p2p_intra_bss = wpa_s->conf->p2p_intra_bss;
|
|
|
|
|
2012-10-30 14:12:04 +01:00
|
|
|
p2p.max_listen = wpa_s->max_remain_on_chan;
|
|
|
|
|
2014-06-21 23:15:53 +02:00
|
|
|
if (wpa_s->conf->p2p_passphrase_len >= 8 &&
|
|
|
|
wpa_s->conf->p2p_passphrase_len <= 63)
|
|
|
|
p2p.passphrase_len = wpa_s->conf->p2p_passphrase_len;
|
|
|
|
else
|
|
|
|
p2p.passphrase_len = 8;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
global->p2p = p2p_init(&p2p);
|
|
|
|
if (global->p2p == NULL)
|
|
|
|
return -1;
|
2012-05-10 09:49:22 +02:00
|
|
|
global->p2p_init_wpa_s = wpa_s;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-03-19 10:57:10 +01:00
|
|
|
for (i = 0; i < MAX_WPS_VENDOR_EXT; i++) {
|
|
|
|
if (wpa_s->conf->wps_vendor_ext[i] == NULL)
|
|
|
|
continue;
|
|
|
|
p2p_add_wps_vendor_extension(
|
|
|
|
global->p2p, wpa_s->conf->wps_vendor_ext[i]);
|
|
|
|
}
|
|
|
|
|
2013-10-22 18:45:46 +02:00
|
|
|
p2p_set_no_go_freq(global->p2p, &wpa_s->conf->p2p_no_go_freq);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_deinit - Deinitialize per-interface P2P data
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
*
|
|
|
|
* This function deinitialize per-interface P2P data.
|
|
|
|
*/
|
|
|
|
void wpas_p2p_deinit(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->driver && wpa_s->drv_priv)
|
|
|
|
wpa_drv_probe_req_report(wpa_s, 0);
|
2011-12-06 20:44:57 +01:00
|
|
|
|
|
|
|
if (wpa_s->go_params) {
|
|
|
|
/* Clear any stored provisioning info */
|
|
|
|
p2p_clear_provisioning_info(
|
|
|
|
wpa_s->global->p2p,
|
2012-03-01 21:06:03 +01:00
|
|
|
wpa_s->go_params->peer_device_addr);
|
2011-12-06 20:44:57 +01:00
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
os_free(wpa_s->go_params);
|
|
|
|
wpa_s->go_params = NULL;
|
2014-05-12 18:14:55 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_psk_failure_removal, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s, NULL);
|
2010-06-27 01:20:57 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
|
2010-10-25 17:24:15 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
2013-11-26 14:10:16 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_freq_conflict, wpa_s, NULL);
|
2020-10-01 14:44:19 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_reconsider_moving_go, wpa_s, NULL);
|
2014-01-04 08:36:13 +01:00
|
|
|
wpas_p2p_listen_work_done(wpa_s);
|
2014-01-07 08:39:30 +01:00
|
|
|
if (wpa_s->p2p_send_action_work) {
|
|
|
|
os_free(wpa_s->p2p_send_action_work->ctx);
|
|
|
|
radio_work_done(wpa_s->p2p_send_action_work);
|
|
|
|
wpa_s->p2p_send_action_work = NULL;
|
|
|
|
}
|
|
|
|
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
wpabuf_free(wpa_s->p2p_oob_dev_pw);
|
|
|
|
wpa_s->p2p_oob_dev_pw = NULL;
|
|
|
|
|
2014-07-07 13:20:59 +02:00
|
|
|
os_free(wpa_s->p2p_group_common_freqs);
|
|
|
|
wpa_s->p2p_group_common_freqs = NULL;
|
|
|
|
wpa_s->p2p_group_common_freqs_num = 0;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
/* TODO: remove group interface from the driver if this wpa_s instance
|
|
|
|
* is on top of a P2P group interface */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_deinit_global - Deinitialize global P2P module
|
|
|
|
* @global: Pointer to global data from wpa_supplicant_init()
|
|
|
|
*
|
|
|
|
* This function deinitializes the global (per device) P2P module.
|
|
|
|
*/
|
2014-06-15 18:31:53 +02:00
|
|
|
static void wpas_p2p_deinit_global(struct wpa_global *global)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s, *tmp;
|
|
|
|
|
2012-08-24 19:45:22 +02:00
|
|
|
wpa_s = global->ifaces;
|
2014-09-20 22:51:00 +02:00
|
|
|
|
|
|
|
wpas_p2p_service_flush(global->p2p_init_wpa_s);
|
2012-08-24 19:45:22 +02:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
/* Remove remaining P2P group interfaces */
|
|
|
|
while (wpa_s && wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE)
|
|
|
|
wpa_s = wpa_s->next;
|
|
|
|
while (wpa_s) {
|
|
|
|
tmp = global->ifaces;
|
|
|
|
while (tmp &&
|
|
|
|
(tmp == wpa_s ||
|
|
|
|
tmp->p2p_group_interface == NOT_P2P_GROUP_INTERFACE)) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
}
|
|
|
|
if (tmp == NULL)
|
|
|
|
break;
|
2012-04-06 17:41:06 +02:00
|
|
|
/* Disconnect from the P2P group and deinit the interface */
|
|
|
|
wpas_p2p_disconnect(tmp);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2010-08-05 04:13:00 +02:00
|
|
|
/*
|
|
|
|
* Deinit GO data on any possibly remaining interface (if main
|
|
|
|
* interface is used as GO).
|
|
|
|
*/
|
|
|
|
for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (wpa_s->ap_iface)
|
|
|
|
wpas_p2p_group_deinit(wpa_s);
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p_deinit(global->p2p);
|
|
|
|
global->p2p = NULL;
|
2012-05-10 09:49:22 +02:00
|
|
|
global->p2p_init_wpa_s = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_create_iface(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->conf->p2p_no_group_iface)
|
2012-10-29 14:02:30 +01:00
|
|
|
return 0; /* separate interface disabled per configuration */
|
2010-11-26 14:52:16 +01:00
|
|
|
if (wpa_s->drv_flags &
|
|
|
|
(WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE |
|
|
|
|
WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P))
|
2010-07-18 23:30:25 +02:00
|
|
|
return 1; /* P2P group requires a new interface in every case
|
|
|
|
*/
|
|
|
|
if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CONCURRENT))
|
|
|
|
return 0; /* driver does not support concurrent operations */
|
|
|
|
if (wpa_s->global->ifaces->next)
|
|
|
|
return 1; /* more that one interface already in use */
|
|
|
|
if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
|
|
|
|
return 1; /* this interface is already in use */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer_addr,
|
|
|
|
enum p2p_wps_method wps_method,
|
|
|
|
int go_intent, const u8 *own_interface_addr,
|
2012-04-27 17:17:10 +02:00
|
|
|
unsigned int force_freq, int persistent_group,
|
2012-10-26 17:10:46 +02:00
|
|
|
struct wpa_ssid *ssid, unsigned int pref_freq)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-10-24 16:29:37 +02:00
|
|
|
if (persistent_group && wpa_s->conf->persistent_reconnect)
|
|
|
|
persistent_group = 2;
|
|
|
|
|
2012-08-15 22:19:11 +02:00
|
|
|
/*
|
|
|
|
* Increase GO config timeout if HT40 is used since it takes some time
|
|
|
|
* to scan channels for coex purposes before the BSS can be started.
|
|
|
|
*/
|
|
|
|
p2p_set_config_timeout(wpa_s->global->p2p,
|
|
|
|
wpa_s->p2p_go_ht40 ? 255 : 100, 20);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_connect(wpa_s->global->p2p, peer_addr, wps_method,
|
|
|
|
go_intent, own_interface_addr, force_freq,
|
2012-04-27 17:17:10 +02:00
|
|
|
persistent_group, ssid ? ssid->ssid : NULL,
|
2012-05-11 15:25:47 +02:00
|
|
|
ssid ? ssid->ssid_len : 0,
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_s->p2p_pd_before_go_neg, pref_freq,
|
|
|
|
wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
|
|
|
|
0);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer_addr,
|
|
|
|
enum p2p_wps_method wps_method,
|
|
|
|
int go_intent, const u8 *own_interface_addr,
|
2012-04-27 17:17:10 +02:00
|
|
|
unsigned int force_freq, int persistent_group,
|
2012-10-26 17:10:46 +02:00
|
|
|
struct wpa_ssid *ssid, unsigned int pref_freq)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-10-24 16:29:37 +02:00
|
|
|
if (persistent_group && wpa_s->conf->persistent_reconnect)
|
|
|
|
persistent_group = 2;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_authorize(wpa_s->global->p2p, peer_addr, wps_method,
|
|
|
|
go_intent, own_interface_addr, force_freq,
|
2012-04-27 17:17:10 +02:00
|
|
|
persistent_group, ssid ? ssid->ssid : NULL,
|
2013-04-27 17:50:14 +02:00
|
|
|
ssid ? ssid->ssid_len : 0, pref_freq,
|
|
|
|
wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
|
|
|
|
0);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-15 15:15:38 +01:00
|
|
|
static void wpas_p2p_check_join_scan_limit(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
wpa_s->p2p_join_scan_count++;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Join scan attempt %d",
|
|
|
|
wpa_s->p2p_join_scan_count);
|
|
|
|
if (wpa_s->p2p_join_scan_count > P2P_MAX_JOIN_SCAN_ATTEMPTS) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to find GO " MACSTR
|
|
|
|
" for join operationg - stop join attempt",
|
|
|
|
MAC2STR(wpa_s->pending_join_iface_addr));
|
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
2012-04-26 16:13:03 +02:00
|
|
|
if (wpa_s->p2p_auto_pd) {
|
|
|
|
wpa_s->p2p_auto_pd = 0;
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_PROV_DISC_FAILURE
|
|
|
|
" p2p_dev_addr=" MACSTR " status=N/A",
|
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr));
|
2012-04-26 16:13:03 +02:00
|
|
|
return;
|
|
|
|
}
|
2020-09-02 10:50:11 +02:00
|
|
|
if (wpa_s->p2p_fallback_to_go_neg) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Join operation failed - fall back to GO Negotiation");
|
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
|
|
|
P2P_EVENT_FALLBACK_TO_GO_NEG
|
|
|
|
"reason=join-failed");
|
|
|
|
wpas_p2p_fallback_to_go_neg(wpa_s, 0);
|
|
|
|
return;
|
|
|
|
}
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_GROUP_FORMATION_FAILURE);
|
2015-08-20 12:58:33 +02:00
|
|
|
wpas_notify_p2p_group_formation_failure(wpa_s, "");
|
2010-11-15 15:15:38 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-04-08 19:12:05 +02:00
|
|
|
static int wpas_check_freq_conflict(struct wpa_supplicant *wpa_s, int freq)
|
|
|
|
{
|
2014-05-19 09:05:35 +02:00
|
|
|
int res;
|
|
|
|
unsigned int num, i;
|
|
|
|
struct wpa_used_freq_data *freqs;
|
2012-04-08 19:12:05 +02:00
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
if (wpas_p2p_num_unused_channels(wpa_s) > 0) {
|
|
|
|
/* Multiple channels are supported and not all are in use */
|
2012-04-08 19:12:05 +02:00
|
|
|
return 0;
|
2013-07-21 19:38:53 +02:00
|
|
|
}
|
2012-04-08 19:12:05 +02:00
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent,
|
|
|
|
sizeof(struct wpa_used_freq_data));
|
2013-07-21 19:38:53 +02:00
|
|
|
if (!freqs)
|
|
|
|
return 1;
|
2012-04-08 19:42:45 +02:00
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
num = wpas_p2p_valid_oper_freqs(wpa_s, freqs,
|
|
|
|
wpa_s->num_multichan_concurrent);
|
2012-04-08 19:12:05 +02:00
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
for (i = 0; i < num; i++) {
|
2014-05-19 09:05:35 +02:00
|
|
|
if (freqs[i].freq == freq) {
|
2013-07-21 19:38:53 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Frequency %d MHz in use by another virtual interface and can be used",
|
|
|
|
freq);
|
|
|
|
res = 0;
|
|
|
|
goto exit_free;
|
|
|
|
}
|
2012-04-08 19:12:05 +02:00
|
|
|
}
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No valid operating frequencies");
|
2013-07-21 19:38:53 +02:00
|
|
|
res = 1;
|
|
|
|
|
|
|
|
exit_free:
|
|
|
|
os_free(freqs);
|
|
|
|
return res;
|
2012-04-08 19:12:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-04-13 15:04:36 +02:00
|
|
|
static int wpas_p2p_peer_go(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer_dev_addr)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
|
|
|
int updated;
|
|
|
|
|
|
|
|
bss = wpa_bss_get_p2p_dev_addr(wpa_s, peer_dev_addr);
|
|
|
|
if (bss == NULL)
|
2012-05-08 16:13:56 +02:00
|
|
|
return -1;
|
2012-04-13 15:04:36 +02:00
|
|
|
if (bss->last_update_idx < wpa_s->bss_update_idx) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Peer BSS entry not updated in the "
|
|
|
|
"last scan");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-12-16 21:08:28 +01:00
|
|
|
updated = os_reltime_before(&wpa_s->p2p_auto_started,
|
|
|
|
&bss->last_update);
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Current BSS entry for peer updated at "
|
|
|
|
"%ld.%06ld (%supdated in last scan)",
|
|
|
|
bss->last_update.sec, bss->last_update.usec,
|
|
|
|
updated ? "": "not ");
|
|
|
|
|
|
|
|
return updated;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_scan_results *scan_res)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2014-01-13 20:39:06 +01:00
|
|
|
struct wpa_bss *bss = NULL;
|
2010-08-05 01:00:21 +02:00
|
|
|
int freq;
|
2010-11-15 15:16:39 +01:00
|
|
|
u8 iface_addr[ETH_ALEN];
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS) for %sjoin",
|
|
|
|
scan_res ? (int) scan_res->num : -1,
|
|
|
|
wpa_s->p2p_auto_join ? "auto_" : "");
|
2010-06-27 01:20:57 +02:00
|
|
|
|
|
|
|
if (scan_res)
|
|
|
|
wpas_p2p_scan_res_handler(wpa_s, scan_res);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-04-26 16:13:03 +02:00
|
|
|
if (wpa_s->p2p_auto_pd) {
|
|
|
|
int join = wpas_p2p_peer_go(wpa_s,
|
|
|
|
wpa_s->pending_join_dev_addr);
|
2012-06-06 14:46:05 +02:00
|
|
|
if (join == 0 &&
|
|
|
|
wpa_s->auto_pd_scan_retry < P2P_AUTO_PD_SCAN_ATTEMPTS) {
|
|
|
|
wpa_s->auto_pd_scan_retry++;
|
2013-03-31 16:15:39 +02:00
|
|
|
bss = wpa_bss_get_bssid_latest(
|
|
|
|
wpa_s, wpa_s->pending_join_dev_addr);
|
2012-06-06 14:46:05 +02:00
|
|
|
if (bss) {
|
|
|
|
freq = bss->freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Scan retry %d for "
|
|
|
|
"the peer " MACSTR " at %d MHz",
|
|
|
|
wpa_s->auto_pd_scan_retry,
|
|
|
|
MAC2STR(wpa_s->
|
|
|
|
pending_join_dev_addr),
|
|
|
|
freq);
|
2014-01-13 20:39:06 +01:00
|
|
|
wpas_p2p_join_scan_req(wpa_s, freq, NULL, 0);
|
2012-06-06 14:46:05 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
if (join < 0)
|
|
|
|
join = 0;
|
2012-06-06 14:46:05 +02:00
|
|
|
|
2012-04-26 16:13:03 +02:00
|
|
|
wpa_s->p2p_auto_pd = 0;
|
|
|
|
wpa_s->pending_pd_use = join ? AUTO_PD_JOIN : AUTO_PD_GO_NEG;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Auto PD with " MACSTR " join=%d",
|
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr), join);
|
|
|
|
if (p2p_prov_disc_req(wpa_s->global->p2p,
|
2014-12-10 09:38:56 +01:00
|
|
|
wpa_s->pending_join_dev_addr, NULL,
|
2012-04-26 16:13:03 +02:00
|
|
|
wpa_s->pending_pd_config_methods, join,
|
2012-11-22 23:48:58 +01:00
|
|
|
0, wpa_s->user_initiated_pd) < 0) {
|
2012-04-26 16:13:03 +02:00
|
|
|
wpa_s->p2p_auto_pd = 0;
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_INFO,
|
|
|
|
P2P_EVENT_PROV_DISC_FAILURE
|
|
|
|
" p2p_dev_addr=" MACSTR " status=N/A",
|
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr));
|
2012-04-26 16:13:03 +02:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-04-13 15:04:36 +02:00
|
|
|
if (wpa_s->p2p_auto_join) {
|
2012-05-08 16:13:56 +02:00
|
|
|
int join = wpas_p2p_peer_go(wpa_s,
|
|
|
|
wpa_s->pending_join_dev_addr);
|
|
|
|
if (join < 0) {
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Peer was not found to be "
|
|
|
|
"running a GO -> use GO Negotiation");
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2015-02-08 11:04:15 +01:00
|
|
|
P2P_EVENT_FALLBACK_TO_GO_NEG
|
|
|
|
"reason=peer-not-running-GO");
|
2012-04-13 15:04:36 +02:00
|
|
|
wpas_p2p_connect(wpa_s, wpa_s->pending_join_dev_addr,
|
|
|
|
wpa_s->p2p_pin, wpa_s->p2p_wps_method,
|
|
|
|
wpa_s->p2p_persistent_group, 0, 0, 0,
|
|
|
|
wpa_s->p2p_go_intent,
|
2012-04-27 17:17:10 +02:00
|
|
|
wpa_s->p2p_connect_freq,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht_center_freq2,
|
2012-05-11 15:25:47 +02:00
|
|
|
wpa_s->p2p_persistent_id,
|
2012-08-15 22:07:44 +02:00
|
|
|
wpa_s->p2p_pd_before_go_neg,
|
2013-10-27 18:46:17 +01:00
|
|
|
wpa_s->p2p_go_ht40,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht,
|
2015-12-30 18:08:51 +01:00
|
|
|
wpa_s->p2p_go_max_oper_chwidth,
|
2018-12-21 19:20:28 +01:00
|
|
|
wpa_s->p2p_go_he,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_edmg,
|
2015-12-30 18:08:51 +01:00
|
|
|
NULL, 0);
|
2012-04-13 15:04:36 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Peer was found running GO%s -> "
|
|
|
|
"try to join the group", join ? "" :
|
|
|
|
" in older scan");
|
2015-02-08 11:04:15 +01:00
|
|
|
if (!join) {
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2015-02-08 11:04:15 +01:00
|
|
|
P2P_EVENT_FALLBACK_TO_GO_NEG_ENABLED);
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_s->p2p_fallback_to_go_neg = 1;
|
2015-02-08 11:04:15 +01:00
|
|
|
}
|
2012-04-13 15:04:36 +02:00
|
|
|
}
|
|
|
|
|
2010-08-05 01:00:21 +02:00
|
|
|
freq = p2p_get_oper_freq(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_join_iface_addr);
|
2010-11-15 15:16:39 +01:00
|
|
|
if (freq < 0 &&
|
|
|
|
p2p_get_interface_addr(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_join_dev_addr,
|
|
|
|
iface_addr) == 0 &&
|
P2P: Overwrite pending interface only after verifying BSS entry
Previously, the P2P Interface Address of the peer gets updated in the
peer table every time based on the scan results.
For example, in a two port concurrency scenario, where the peer device
has two interfaces with unique P2P Interface Addresses and with same P2P
Device Address, based on the Probe Response/Beacon frames from these two
interfaces, their peer table gets updated, but each of these updates
happens in the peer table only based on the P2P Device Address. So, the
same peer's P2P Interface address is updated every time and hence, at
any instant, only one P2P Device Address to P2P Interface Address
mapping entry exist in the peer table for the peer which has two
interfaces.
When we try to join a group operated by the peer, lookup happens in the
peer table and when an interface entry is not available, the pending
interface address gets overwritten with the P2P Device Address and hence
the P2P connection can fail. Since the BSS table is the one that is
up-to-date, this fix will ensure that the interface overwriting will
happen only when there is no BSS entry for the pending P2P Interface
Address as well.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2014-08-14 13:14:32 +02:00
|
|
|
os_memcmp(iface_addr, wpa_s->pending_join_dev_addr, ETH_ALEN) != 0
|
|
|
|
&& !wpa_bss_get_bssid(wpa_s, wpa_s->pending_join_iface_addr)) {
|
2010-11-15 15:16:39 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Overwrite pending interface "
|
|
|
|
"address for join from " MACSTR " to " MACSTR
|
|
|
|
" based on newly discovered P2P peer entry",
|
|
|
|
MAC2STR(wpa_s->pending_join_iface_addr),
|
|
|
|
MAC2STR(iface_addr));
|
|
|
|
os_memcpy(wpa_s->pending_join_iface_addr, iface_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
|
|
|
|
freq = p2p_get_oper_freq(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_join_iface_addr);
|
|
|
|
}
|
2010-08-05 01:00:21 +02:00
|
|
|
if (freq >= 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Target GO operating frequency "
|
|
|
|
"from P2P peer table: %d MHz", freq);
|
|
|
|
}
|
2014-01-13 20:39:06 +01:00
|
|
|
if (wpa_s->p2p_join_ssid_len) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Trying to find target GO BSS entry based on BSSID "
|
|
|
|
MACSTR " and SSID %s",
|
|
|
|
MAC2STR(wpa_s->pending_join_iface_addr),
|
|
|
|
wpa_ssid_txt(wpa_s->p2p_join_ssid,
|
|
|
|
wpa_s->p2p_join_ssid_len));
|
|
|
|
bss = wpa_bss_get(wpa_s, wpa_s->pending_join_iface_addr,
|
|
|
|
wpa_s->p2p_join_ssid,
|
|
|
|
wpa_s->p2p_join_ssid_len);
|
2015-12-30 18:06:19 +01:00
|
|
|
} else if (!bss) {
|
2014-01-13 20:39:06 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Trying to find target GO BSS entry based on BSSID "
|
|
|
|
MACSTR, MAC2STR(wpa_s->pending_join_iface_addr));
|
|
|
|
bss = wpa_bss_get_bssid_latest(wpa_s,
|
|
|
|
wpa_s->pending_join_iface_addr);
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
if (bss) {
|
2015-06-14 22:14:26 +02:00
|
|
|
u8 dev_addr[ETH_ALEN];
|
|
|
|
|
2010-08-05 01:00:21 +02:00
|
|
|
freq = bss->freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Target GO operating frequency "
|
2013-10-20 16:53:46 +02:00
|
|
|
"from BSS table: %d MHz (SSID %s)", freq,
|
|
|
|
wpa_ssid_txt(bss->ssid, bss->ssid_len));
|
2020-11-16 15:21:56 +01:00
|
|
|
if (p2p_parse_dev_addr(wpa_bss_ie_ptr(bss), bss->ie_len,
|
2015-06-14 22:14:26 +02:00
|
|
|
dev_addr) == 0 &&
|
|
|
|
os_memcmp(wpa_s->pending_join_dev_addr,
|
|
|
|
wpa_s->pending_join_iface_addr, ETH_ALEN) == 0 &&
|
|
|
|
os_memcmp(dev_addr, wpa_s->pending_join_dev_addr,
|
|
|
|
ETH_ALEN) != 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Update target GO device address based on BSS entry: " MACSTR " (was " MACSTR ")",
|
|
|
|
MAC2STR(dev_addr),
|
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr));
|
|
|
|
os_memcpy(wpa_s->pending_join_dev_addr, dev_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
}
|
2010-08-05 01:00:21 +02:00
|
|
|
}
|
|
|
|
if (freq > 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
u16 method;
|
|
|
|
|
2012-04-08 19:12:05 +02:00
|
|
|
if (wpas_check_freq_conflict(wpa_s, freq) > 0) {
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_GROUP_FORMATION_FAILURE
|
|
|
|
"reason=FREQ_CONFLICT");
|
2015-08-20 12:58:33 +02:00
|
|
|
wpas_notify_p2p_group_formation_failure(
|
|
|
|
wpa_s, "FREQ_CONFLICT");
|
2012-04-08 19:12:05 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Send Provision Discovery Request "
|
|
|
|
"prior to joining an existing group (GO " MACSTR
|
|
|
|
" freq=%u MHz)",
|
2010-08-05 01:00:21 +02:00
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr), freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->pending_pd_before_join = 1;
|
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
switch (wpa_s->pending_join_wps_method) {
|
2010-07-18 23:30:25 +02:00
|
|
|
case WPS_PIN_DISPLAY:
|
|
|
|
method = WPS_CONFIG_KEYPAD;
|
|
|
|
break;
|
|
|
|
case WPS_PIN_KEYPAD:
|
|
|
|
method = WPS_CONFIG_DISPLAY;
|
|
|
|
break;
|
|
|
|
case WPS_PBC:
|
|
|
|
method = WPS_CONFIG_PUSHBUTTON;
|
|
|
|
break;
|
2015-07-13 08:49:16 +02:00
|
|
|
case WPS_P2PS:
|
|
|
|
method = WPS_CONFIG_P2PS;
|
|
|
|
break;
|
2010-07-18 23:30:25 +02:00
|
|
|
default:
|
|
|
|
method = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-12-06 20:44:57 +01:00
|
|
|
if ((p2p_get_provisioning_info(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_join_dev_addr) ==
|
|
|
|
method)) {
|
|
|
|
/*
|
|
|
|
* We have already performed provision discovery for
|
|
|
|
* joining the group. Proceed directly to join
|
|
|
|
* operation without duplicated provision discovery. */
|
2011-12-11 16:36:38 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Provision discovery "
|
2011-12-06 20:44:57 +01:00
|
|
|
"with " MACSTR " already done - proceed to "
|
|
|
|
"join",
|
|
|
|
MAC2STR(wpa_s->pending_join_dev_addr));
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
|
|
|
goto start;
|
|
|
|
}
|
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
if (p2p_prov_disc_req(wpa_s->global->p2p,
|
2014-12-10 09:38:56 +01:00
|
|
|
wpa_s->pending_join_dev_addr,
|
|
|
|
NULL, method, 1,
|
2012-11-22 23:48:58 +01:00
|
|
|
freq, wpa_s->user_initiated_pd) < 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to send Provision "
|
|
|
|
"Discovery Request before joining an "
|
|
|
|
"existing group");
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
|
|
|
goto start;
|
|
|
|
}
|
2010-06-27 01:20:57 +02:00
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
2010-11-15 15:15:38 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to find BSS/GO - try again later");
|
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
|
|
|
eloop_register_timeout(1, 0, wpas_p2p_join_scan, wpa_s, NULL);
|
|
|
|
wpas_p2p_check_join_scan_limit(wpa_s);
|
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
start:
|
|
|
|
/* Start join operation immediately */
|
2015-12-30 18:04:43 +01:00
|
|
|
wpas_p2p_join_start(wpa_s, 0, wpa_s->p2p_join_ssid,
|
|
|
|
wpa_s->p2p_join_ssid_len);
|
2010-06-27 01:20:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-13 20:39:06 +01:00
|
|
|
static void wpas_p2p_join_scan_req(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
2010-06-27 01:20:57 +02:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct wpa_driver_scan_params params;
|
|
|
|
struct wpabuf *wps_ie, *ies;
|
2011-04-28 15:14:35 +02:00
|
|
|
size_t ielen;
|
2012-06-06 14:46:05 +02:00
|
|
|
int freqs[2] = { 0, 0 };
|
2016-02-20 15:45:58 +01:00
|
|
|
unsigned int bands;
|
2010-06-27 01:20:57 +02:00
|
|
|
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
|
|
|
|
|
|
/* P2P Wildcard SSID */
|
|
|
|
params.num_ssids = 1;
|
2014-01-13 20:39:06 +01:00
|
|
|
if (ssid && ssid_len) {
|
|
|
|
params.ssids[0].ssid = ssid;
|
|
|
|
params.ssids[0].ssid_len = ssid_len;
|
|
|
|
os_memcpy(wpa_s->p2p_join_ssid, ssid, ssid_len);
|
|
|
|
wpa_s->p2p_join_ssid_len = ssid_len;
|
|
|
|
} else {
|
|
|
|
params.ssids[0].ssid = (u8 *) P2P_WILDCARD_SSID;
|
|
|
|
params.ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
|
|
|
|
wpa_s->p2p_join_ssid_len = 0;
|
|
|
|
}
|
2010-06-27 01:20:57 +02:00
|
|
|
|
|
|
|
wpa_s->wps->dev.p2p = 1;
|
2012-02-27 22:14:35 +01:00
|
|
|
wps_ie = wps_build_probe_req_ie(DEV_PW_DEFAULT, &wpa_s->wps->dev,
|
|
|
|
wpa_s->wps->uuid, WPS_REQ_ENROLLEE, 0,
|
|
|
|
NULL);
|
2010-06-27 01:20:57 +02:00
|
|
|
if (wps_ie == NULL) {
|
|
|
|
wpas_p2p_scan_res_join(wpa_s, NULL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-01-15 14:47:19 +01:00
|
|
|
if (!freq) {
|
|
|
|
int oper_freq;
|
|
|
|
/*
|
|
|
|
* If freq is not provided, check the operating freq of the GO
|
|
|
|
* and use a single channel scan on if possible.
|
|
|
|
*/
|
|
|
|
oper_freq = p2p_get_oper_freq(wpa_s->global->p2p,
|
|
|
|
wpa_s->pending_join_iface_addr);
|
|
|
|
if (oper_freq > 0)
|
|
|
|
freq = oper_freq;
|
|
|
|
}
|
2012-06-06 14:46:05 +02:00
|
|
|
if (freq > 0) {
|
|
|
|
freqs[0] = freq;
|
|
|
|
params.freqs = freqs;
|
2020-10-08 14:05:43 +02:00
|
|
|
} else if (wpa_s->conf->p2p_6ghz_disable) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: 6 GHz disabled - update the scan frequency list");
|
2020-11-20 15:28:50 +01:00
|
|
|
wpa_add_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211G, ¶ms,
|
|
|
|
0);
|
|
|
|
wpa_add_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211A, ¶ms,
|
|
|
|
0);
|
2012-06-06 14:46:05 +02:00
|
|
|
}
|
2010-06-27 01:20:57 +02:00
|
|
|
|
2016-02-20 12:28:27 +01:00
|
|
|
ielen = p2p_scan_ie_buf_len(wpa_s->global->p2p);
|
|
|
|
ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
|
|
|
|
if (ies == NULL) {
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
wpas_p2p_scan_res_join(wpa_s, NULL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpabuf_put_buf(ies, wps_ie);
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
|
2016-02-20 15:45:58 +01:00
|
|
|
bands = wpas_get_bands(wpa_s, freqs);
|
|
|
|
p2p_scan_ie(wpa_s->global->p2p, ies, NULL, bands);
|
2016-02-20 12:28:27 +01:00
|
|
|
|
|
|
|
params.p2p_probe = 1;
|
|
|
|
params.extra_ies = wpabuf_head(ies);
|
|
|
|
params.extra_ies_len = wpabuf_len(ies);
|
|
|
|
|
2017-02-07 21:48:20 +01:00
|
|
|
if (wpa_s->clear_driver_scan_cache) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Request driver to clear scan cache due to local BSS flush");
|
|
|
|
params.only_new_results = 1;
|
|
|
|
}
|
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
/*
|
|
|
|
* Run a scan to update BSS table and start Provision Discovery once
|
|
|
|
* the new scan results become available.
|
|
|
|
*/
|
2011-10-22 21:45:38 +02:00
|
|
|
ret = wpa_drv_scan(wpa_s, ¶ms);
|
2020-10-08 14:05:43 +02:00
|
|
|
if (wpa_s->conf->p2p_6ghz_disable && params.freqs != freqs)
|
|
|
|
os_free(params.freqs);
|
2013-03-31 16:52:23 +02:00
|
|
|
if (!ret) {
|
2013-12-16 21:08:28 +01:00
|
|
|
os_get_reltime(&wpa_s->scan_trigger_time);
|
2012-04-13 15:13:14 +02:00
|
|
|
wpa_s->scan_res_handler = wpas_p2p_scan_res_join;
|
2013-12-26 16:33:26 +01:00
|
|
|
wpa_s->own_scan_requested = 1;
|
2017-02-07 21:48:20 +01:00
|
|
|
wpa_s->clear_driver_scan_cache = 0;
|
2013-03-31 16:52:23 +02:00
|
|
|
}
|
2010-06-27 01:20:57 +02:00
|
|
|
|
|
|
|
wpabuf_free(ies);
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to start scan for join - "
|
|
|
|
"try again later");
|
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
|
|
|
eloop_register_timeout(1, 0, wpas_p2p_join_scan, wpa_s, NULL);
|
2010-11-15 15:15:38 +01:00
|
|
|
wpas_p2p_check_join_scan_limit(wpa_s);
|
2010-06-27 01:20:57 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-06-06 14:46:05 +02:00
|
|
|
static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
2014-01-13 20:39:06 +01:00
|
|
|
wpas_p2p_join_scan_req(wpa_s, 0, NULL, 0);
|
2012-06-06 14:46:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-06-27 01:20:57 +02:00
|
|
|
static int wpas_p2p_join(struct wpa_supplicant *wpa_s, const u8 *iface_addr,
|
2012-04-13 15:04:36 +02:00
|
|
|
const u8 *dev_addr, enum p2p_wps_method wps_method,
|
2013-09-08 00:44:29 +02:00
|
|
|
int auto_join, int op_freq,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
2010-06-27 01:20:57 +02:00
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Request to join existing group (iface "
|
2013-09-08 00:44:29 +02:00
|
|
|
MACSTR " dev " MACSTR " op_freq=%d)%s",
|
|
|
|
MAC2STR(iface_addr), MAC2STR(dev_addr), op_freq,
|
2012-04-13 15:04:36 +02:00
|
|
|
auto_join ? " (auto_join)" : "");
|
2014-01-13 20:39:06 +01:00
|
|
|
if (ssid && ssid_len) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Group SSID specified: %s",
|
|
|
|
wpa_ssid_txt(ssid, ssid_len));
|
|
|
|
}
|
2010-06-27 01:20:57 +02:00
|
|
|
|
2012-04-26 16:13:03 +02:00
|
|
|
wpa_s->p2p_auto_pd = 0;
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_s->p2p_auto_join = !!auto_join;
|
2010-06-27 01:20:57 +02:00
|
|
|
os_memcpy(wpa_s->pending_join_iface_addr, iface_addr, ETH_ALEN);
|
|
|
|
os_memcpy(wpa_s->pending_join_dev_addr, dev_addr, ETH_ALEN);
|
|
|
|
wpa_s->pending_join_wps_method = wps_method;
|
|
|
|
|
|
|
|
/* Make sure we are not running find during connection establishment */
|
|
|
|
wpas_p2p_stop_find(wpa_s);
|
|
|
|
|
2010-11-15 15:15:38 +01:00
|
|
|
wpa_s->p2p_join_scan_count = 0;
|
2013-09-08 00:44:29 +02:00
|
|
|
wpas_p2p_join_scan_req(wpa_s, op_freq, ssid, ssid_len);
|
2010-06-27 01:20:57 +02:00
|
|
|
return 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-08 00:44:29 +02:00
|
|
|
static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *group;
|
|
|
|
struct p2p_go_neg_results res;
|
2012-02-28 23:22:58 +01:00
|
|
|
struct wpa_bss *bss;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
group = wpas_p2p_get_group_iface(wpa_s, 0, 0);
|
|
|
|
if (group == NULL)
|
|
|
|
return -1;
|
2010-06-27 07:49:41 +02:00
|
|
|
if (group != wpa_s) {
|
2010-07-18 23:30:25 +02:00
|
|
|
os_memcpy(group->p2p_pin, wpa_s->p2p_pin,
|
|
|
|
sizeof(group->p2p_pin));
|
2010-06-27 07:49:41 +02:00
|
|
|
group->p2p_wps_method = wpa_s->p2p_wps_method;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2017-08-21 18:36:22 +02:00
|
|
|
/*
|
|
|
|
* Need to mark the current interface for p2p_group_formation
|
|
|
|
* when a separate group interface is not used. This is needed
|
|
|
|
* to allow p2p_cancel stop a pending p2p_connect-join.
|
|
|
|
* wpas_p2p_init_group_interface() addresses this for the case
|
|
|
|
* where a separate group interface is used.
|
|
|
|
*/
|
|
|
|
if (group == wpa_s->parent)
|
|
|
|
wpa_s->global->p2p_group_formation = group;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
group->p2p_in_provisioning = 1;
|
2012-05-08 16:13:56 +02:00
|
|
|
group->p2p_fallback_to_go_neg = wpa_s->p2p_fallback_to_go_neg;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
os_memset(&res, 0, sizeof(res));
|
2013-09-08 00:44:29 +02:00
|
|
|
os_memcpy(res.peer_device_addr, wpa_s->pending_join_dev_addr, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
os_memcpy(res.peer_interface_addr, wpa_s->pending_join_iface_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
res.wps_method = wpa_s->pending_join_wps_method;
|
2013-09-08 00:44:29 +02:00
|
|
|
if (freq && ssid && ssid_len) {
|
|
|
|
res.freq = freq;
|
|
|
|
res.ssid_len = ssid_len;
|
|
|
|
os_memcpy(res.ssid, ssid, ssid_len);
|
|
|
|
} else {
|
2015-12-30 18:02:33 +01:00
|
|
|
if (ssid && ssid_len) {
|
|
|
|
bss = wpa_bss_get(wpa_s, wpa_s->pending_join_iface_addr,
|
|
|
|
ssid, ssid_len);
|
|
|
|
} else {
|
|
|
|
bss = wpa_bss_get_bssid_latest(
|
|
|
|
wpa_s, wpa_s->pending_join_iface_addr);
|
|
|
|
}
|
2013-09-08 00:44:29 +02:00
|
|
|
if (bss) {
|
|
|
|
res.freq = bss->freq;
|
|
|
|
res.ssid_len = bss->ssid_len;
|
|
|
|
os_memcpy(res.ssid, bss->ssid, bss->ssid_len);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Join target GO operating frequency from BSS table: %d MHz (SSID %s)",
|
|
|
|
bss->freq,
|
|
|
|
wpa_ssid_txt(bss->ssid, bss->ssid_len));
|
2015-12-30 18:00:56 +01:00
|
|
|
} else if (ssid && ssid_len) {
|
|
|
|
res.ssid_len = ssid_len;
|
|
|
|
os_memcpy(res.ssid, ssid, ssid_len);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Join target GO (SSID %s)",
|
|
|
|
wpa_ssid_txt(ssid, ssid_len));
|
2013-09-08 00:44:29 +02:00
|
|
|
}
|
2012-02-28 23:22:58 +01:00
|
|
|
}
|
|
|
|
|
2011-12-29 12:28:17 +01:00
|
|
|
if (wpa_s->off_channel_freq || wpa_s->roc_waiting_drv_freq) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancel remain-on-channel prior to "
|
|
|
|
"starting client");
|
|
|
|
wpa_drv_cancel_remain_on_channel(wpa_s);
|
|
|
|
wpa_s->off_channel_freq = 0;
|
|
|
|
wpa_s->roc_waiting_drv_freq = 0;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_start_wps_enrollee(group, &res);
|
|
|
|
|
2010-09-07 12:21:33 +02:00
|
|
|
/*
|
|
|
|
* Allow a longer timeout for join-a-running-group than normal 15
|
|
|
|
* second group formation timeout since the GO may not have authorized
|
|
|
|
* our connection yet.
|
|
|
|
*/
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s, NULL);
|
|
|
|
eloop_register_timeout(60, 0, wpas_p2p_group_formation_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-25 18:30:14 +01:00
|
|
|
static int wpas_p2p_setup_freqs(struct wpa_supplicant *wpa_s, int freq,
|
2015-07-24 02:39:45 +02:00
|
|
|
int *force_freq, int *pref_freq, int go,
|
|
|
|
unsigned int *pref_freq_list,
|
|
|
|
unsigned int *num_pref_freq)
|
2013-02-25 18:30:14 +01:00
|
|
|
{
|
2014-05-19 09:05:35 +02:00
|
|
|
struct wpa_used_freq_data *freqs;
|
|
|
|
int res, best_freq, num_unused;
|
2015-07-24 02:39:45 +02:00
|
|
|
unsigned int freq_in_use = 0, num, i, max_pref_freq;
|
|
|
|
|
|
|
|
max_pref_freq = *num_pref_freq;
|
|
|
|
*num_pref_freq = 0;
|
2013-07-21 19:38:53 +02:00
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent,
|
|
|
|
sizeof(struct wpa_used_freq_data));
|
2013-07-21 19:38:53 +02:00
|
|
|
if (!freqs)
|
|
|
|
return -1;
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
num = wpas_p2p_valid_oper_freqs(wpa_s, freqs,
|
|
|
|
wpa_s->num_multichan_concurrent);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* It is possible that the total number of used frequencies is bigger
|
|
|
|
* than the number of frequencies used for P2P, so get the system wide
|
|
|
|
* number of unused frequencies.
|
|
|
|
*/
|
|
|
|
num_unused = wpas_p2p_num_unused_channels(wpa_s);
|
|
|
|
|
2013-08-26 13:08:03 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
2014-05-19 09:05:35 +02:00
|
|
|
"P2P: Setup freqs: freq=%d num_MCC=%d shared_freqs=%u num_unused=%d",
|
|
|
|
freq, wpa_s->num_multichan_concurrent, num, num_unused);
|
2013-07-21 19:38:53 +02:00
|
|
|
|
2013-02-25 18:30:14 +01:00
|
|
|
if (freq > 0) {
|
2013-10-22 20:00:49 +02:00
|
|
|
int ret;
|
|
|
|
if (go)
|
|
|
|
ret = p2p_supported_freq(wpa_s->global->p2p, freq);
|
|
|
|
else
|
|
|
|
ret = p2p_supported_freq_cli(wpa_s->global->p2p, freq);
|
|
|
|
if (!ret) {
|
2015-03-05 02:31:25 +01:00
|
|
|
if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
|
2018-04-13 11:55:40 +02:00
|
|
|
ieee80211_is_dfs(freq, wpa_s->hw.modes,
|
|
|
|
wpa_s->hw.num_modes)) {
|
2015-03-05 02:31:25 +01:00
|
|
|
/*
|
|
|
|
* If freq is a DFS channel and DFS is offloaded
|
|
|
|
* to the driver, allow P2P GO to use it.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: The forced channel for GO (%u MHz) is DFS, and DFS is offloaded to the driver",
|
|
|
|
freq);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: The forced channel (%u MHz) is not supported for P2P uses",
|
|
|
|
freq);
|
|
|
|
res = -3;
|
|
|
|
goto exit_free;
|
|
|
|
}
|
2013-02-25 18:30:14 +01:00
|
|
|
}
|
|
|
|
|
2013-07-21 19:38:53 +02:00
|
|
|
for (i = 0; i < num; i++) {
|
2014-05-19 09:05:35 +02:00
|
|
|
if (freqs[i].freq == freq)
|
2013-07-21 19:38:53 +02:00
|
|
|
freq_in_use = 1;
|
|
|
|
}
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
if (num_unused <= 0 && !freq_in_use) {
|
2013-07-21 19:38:53 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cannot start P2P group on %u MHz as there are no available channels",
|
|
|
|
freq);
|
|
|
|
res = -2;
|
|
|
|
goto exit_free;
|
2013-02-25 18:30:14 +01:00
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Trying to force us to use the "
|
|
|
|
"requested channel (%u MHz)", freq);
|
|
|
|
*force_freq = freq;
|
2013-07-21 19:38:53 +02:00
|
|
|
goto exit_ok;
|
|
|
|
}
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
best_freq = wpas_p2p_pick_best_used_freq(wpa_s, freqs, num);
|
2013-07-21 19:38:53 +02:00
|
|
|
|
2015-07-24 02:39:45 +02:00
|
|
|
if (!wpa_s->conf->num_p2p_pref_chan && *pref_freq == 0) {
|
|
|
|
enum wpa_driver_if_type iface_type;
|
|
|
|
|
|
|
|
if (go)
|
|
|
|
iface_type = WPA_IF_P2P_GO;
|
|
|
|
else
|
|
|
|
iface_type = WPA_IF_P2P_CLIENT;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: best_freq=%d, go=%d",
|
|
|
|
best_freq, go);
|
|
|
|
|
|
|
|
res = wpa_drv_get_pref_freq_list(wpa_s, iface_type,
|
|
|
|
&max_pref_freq,
|
|
|
|
pref_freq_list);
|
|
|
|
if (!res && max_pref_freq > 0) {
|
|
|
|
*num_pref_freq = max_pref_freq;
|
|
|
|
i = 0;
|
2016-12-09 14:25:59 +01:00
|
|
|
while (i < *num_pref_freq &&
|
|
|
|
(!p2p_supported_freq(wpa_s->global->p2p,
|
2016-10-21 08:43:16 +02:00
|
|
|
pref_freq_list[i]) ||
|
|
|
|
wpas_p2p_disallowed_freq(wpa_s->global,
|
2016-12-09 14:25:59 +01:00
|
|
|
pref_freq_list[i]))) {
|
2015-07-24 02:39:45 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: preferred_freq_list[%d]=%d is disallowed",
|
|
|
|
i, pref_freq_list[i]);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
if (i != *num_pref_freq) {
|
|
|
|
best_freq = pref_freq_list[i];
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Using preferred_freq_list[%d]=%d",
|
|
|
|
i, best_freq);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: All driver preferred frequencies are disallowed for P2P use");
|
|
|
|
*num_pref_freq = 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: No preferred frequency list available");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-19 09:05:35 +02:00
|
|
|
/* We have a candidate frequency to use */
|
|
|
|
if (best_freq > 0) {
|
|
|
|
if (*pref_freq == 0 && num_unused > 0) {
|
2013-11-18 15:53:44 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Try to prefer a frequency (%u MHz) we are already using",
|
2014-05-19 09:05:35 +02:00
|
|
|
best_freq);
|
|
|
|
*pref_freq = best_freq;
|
2013-11-18 15:53:44 +01:00
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Try to force us to use frequency (%u MHz) which is already in use",
|
2014-05-19 09:05:35 +02:00
|
|
|
best_freq);
|
|
|
|
*force_freq = best_freq;
|
2013-07-21 19:38:53 +02:00
|
|
|
}
|
2014-05-19 09:05:35 +02:00
|
|
|
} else if (num_unused > 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Current operating channels are not available for P2P. Try to use another channel");
|
|
|
|
*force_freq = 0;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: All channels are in use and none of them are P2P enabled. Cannot start P2P group");
|
|
|
|
res = -2;
|
|
|
|
goto exit_free;
|
2013-07-21 19:38:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
exit_ok:
|
|
|
|
res = 0;
|
|
|
|
exit_free:
|
|
|
|
os_free(freqs);
|
|
|
|
return res;
|
2013-02-25 18:30:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
/**
|
|
|
|
* wpas_p2p_connect - Request P2P Group Formation to be started
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* @peer_addr: Address of the peer P2P Device
|
|
|
|
* @pin: PIN to use during provisioning or %NULL to indicate PBC mode
|
|
|
|
* @persistent_group: Whether to create a persistent group
|
2012-04-13 15:04:36 +02:00
|
|
|
* @auto_join: Whether to select join vs. GO Negotiation automatically
|
2010-07-18 23:30:25 +02:00
|
|
|
* @join: Whether to join an existing group (as a client) instead of starting
|
|
|
|
* Group Owner negotiation; @peer_addr is BSSID in that case
|
|
|
|
* @auth: Whether to only authorize the connection instead of doing that and
|
|
|
|
* initiating Group Owner negotiation
|
|
|
|
* @go_intent: GO Intent or -1 to use default
|
|
|
|
* @freq: Frequency for the group or 0 for auto-selection
|
2015-10-28 22:14:10 +01:00
|
|
|
* @freq2: Center frequency of segment 1 for the GO operating in VHT 80P80 mode
|
2012-04-27 17:17:10 +02:00
|
|
|
* @persistent_id: Persistent group credentials to use for forcing GO
|
|
|
|
* parameters or -1 to generate new values (SSID/passphrase)
|
2012-05-11 15:25:47 +02:00
|
|
|
* @pd: Whether to send Provision Discovery prior to GO Negotiation as an
|
|
|
|
* interoperability workaround when initiating group formation
|
2012-08-15 22:07:44 +02:00
|
|
|
* @ht40: Start GO with 40 MHz channel width
|
2013-10-27 18:46:17 +01:00
|
|
|
* @vht: Start GO with VHT support
|
2015-10-28 22:14:10 +01:00
|
|
|
* @vht_chwidth: Channel width supported by GO operating with VHT support
|
2019-05-20 09:55:06 +02:00
|
|
|
* (CHANWIDTH_*).
|
2015-12-30 18:08:51 +01:00
|
|
|
* @group_ssid: Specific Group SSID for join or %NULL if not set
|
|
|
|
* @group_ssid_len: Length of @group_ssid in octets
|
2010-10-14 13:24:56 +02:00
|
|
|
* Returns: 0 or new PIN (if pin was %NULL) on success, -1 on unspecified
|
|
|
|
* failure, -2 on failure due to channel not currently available,
|
|
|
|
* -3 if forced channel is not supported
|
2010-07-18 23:30:25 +02:00
|
|
|
*/
|
|
|
|
int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
|
|
|
|
const char *pin, enum p2p_wps_method wps_method,
|
2012-04-13 15:04:36 +02:00
|
|
|
int persistent_group, int auto_join, int join, int auth,
|
2015-10-28 22:14:10 +01:00
|
|
|
int go_intent, int freq, unsigned int vht_center_freq2,
|
|
|
|
int persistent_id, int pd, int ht40, int vht,
|
2019-10-17 19:44:14 +02:00
|
|
|
unsigned int vht_chwidth, int he, int edmg,
|
|
|
|
const u8 *group_ssid, size_t group_ssid_len)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2013-07-21 19:38:53 +02:00
|
|
|
int force_freq = 0, pref_freq = 0;
|
2013-02-25 18:30:14 +01:00
|
|
|
int ret = 0, res;
|
2010-07-18 23:30:25 +02:00
|
|
|
enum wpa_driver_if_type iftype;
|
2011-11-18 22:32:03 +01:00
|
|
|
const u8 *if_addr;
|
2012-04-27 17:17:10 +02:00
|
|
|
struct wpa_ssid *ssid = NULL;
|
2015-07-24 02:39:45 +02:00
|
|
|
unsigned int pref_freq_list[P2P_MAX_PREF_CHANNELS], size;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2012-04-27 17:17:10 +02:00
|
|
|
if (persistent_id >= 0) {
|
|
|
|
ssid = wpa_config_get_network(wpa_s->conf, persistent_id);
|
|
|
|
if (ssid == NULL || ssid->disabled != 2 ||
|
|
|
|
ssid->mode != WPAS_MODE_P2P_GO)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-10-08 14:05:43 +02:00
|
|
|
if (is_6ghz_freq(freq) && wpa_s->conf->p2p_6ghz_disable)
|
|
|
|
return -2;
|
|
|
|
|
2013-09-01 12:40:33 +02:00
|
|
|
os_free(wpa_s->global->add_psk);
|
|
|
|
wpa_s->global->add_psk = NULL;
|
|
|
|
|
2014-01-06 16:56:50 +01:00
|
|
|
wpa_s->global->p2p_fail_on_wps_complete = 0;
|
2014-12-10 12:29:29 +01:00
|
|
|
wpa_s->global->pending_p2ps_group = 0;
|
2015-10-08 11:36:01 +02:00
|
|
|
wpa_s->global->pending_p2ps_group_freq = 0;
|
2015-07-30 08:00:06 +02:00
|
|
|
wpa_s->p2ps_method_config_any = 0;
|
2014-01-06 16:56:50 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (go_intent < 0)
|
|
|
|
go_intent = wpa_s->conf->p2p_go_intent;
|
|
|
|
|
|
|
|
if (!auth)
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2010-06-27 07:49:41 +02:00
|
|
|
wpa_s->p2p_wps_method = wps_method;
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_s->p2p_persistent_group = !!persistent_group;
|
2012-04-27 17:17:10 +02:00
|
|
|
wpa_s->p2p_persistent_id = persistent_id;
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_s->p2p_go_intent = go_intent;
|
|
|
|
wpa_s->p2p_connect_freq = freq;
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_s->p2p_fallback_to_go_neg = 0;
|
2012-05-11 15:25:47 +02:00
|
|
|
wpa_s->p2p_pd_before_go_neg = !!pd;
|
2012-08-15 22:07:44 +02:00
|
|
|
wpa_s->p2p_go_ht40 = !!ht40;
|
2013-10-27 18:46:17 +01:00
|
|
|
wpa_s->p2p_go_vht = !!vht;
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht_center_freq2 = vht_center_freq2;
|
|
|
|
wpa_s->p2p_go_max_oper_chwidth = vht_chwidth;
|
2018-12-21 19:20:28 +01:00
|
|
|
wpa_s->p2p_go_he = !!he;
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_edmg = !!edmg;
|
2010-06-27 07:49:41 +02:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (pin)
|
|
|
|
os_strlcpy(wpa_s->p2p_pin, pin, sizeof(wpa_s->p2p_pin));
|
|
|
|
else if (wps_method == WPS_PIN_DISPLAY) {
|
2016-02-09 15:47:47 +01:00
|
|
|
if (wps_generate_pin((unsigned int *) &ret) < 0)
|
|
|
|
return -1;
|
2014-12-06 20:40:31 +01:00
|
|
|
res = os_snprintf(wpa_s->p2p_pin, sizeof(wpa_s->p2p_pin),
|
|
|
|
"%08d", ret);
|
|
|
|
if (os_snprintf_error(sizeof(wpa_s->p2p_pin), res))
|
|
|
|
wpa_s->p2p_pin[sizeof(wpa_s->p2p_pin) - 1] = '\0';
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Randomly generated PIN: %s",
|
|
|
|
wpa_s->p2p_pin);
|
2016-04-29 12:50:12 +02:00
|
|
|
} else if (wps_method == WPS_P2PS) {
|
|
|
|
/* Force the P2Ps default PIN to be used */
|
|
|
|
os_strlcpy(wpa_s->p2p_pin, "12345670", sizeof(wpa_s->p2p_pin));
|
2010-07-18 23:30:25 +02:00
|
|
|
} else
|
|
|
|
wpa_s->p2p_pin[0] = '\0';
|
|
|
|
|
2012-04-13 15:04:36 +02:00
|
|
|
if (join || auto_join) {
|
2010-07-10 22:07:08 +02:00
|
|
|
u8 iface_addr[ETH_ALEN], dev_addr[ETH_ALEN];
|
2010-06-27 09:11:42 +02:00
|
|
|
if (auth) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Authorize invitation to "
|
|
|
|
"connect a running group from " MACSTR,
|
|
|
|
MAC2STR(peer_addr));
|
|
|
|
os_memcpy(wpa_s->p2p_auth_invite, peer_addr, ETH_ALEN);
|
|
|
|
return ret;
|
|
|
|
}
|
2010-07-10 22:07:08 +02:00
|
|
|
os_memcpy(dev_addr, peer_addr, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
if (p2p_get_interface_addr(wpa_s->global->p2p, peer_addr,
|
2010-07-10 22:07:08 +02:00
|
|
|
iface_addr) < 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
os_memcpy(iface_addr, peer_addr, ETH_ALEN);
|
2010-07-10 22:07:08 +02:00
|
|
|
p2p_get_dev_addr(wpa_s->global->p2p, peer_addr,
|
|
|
|
dev_addr);
|
|
|
|
}
|
2012-04-13 15:04:36 +02:00
|
|
|
if (auto_join) {
|
2013-12-16 21:08:28 +01:00
|
|
|
os_get_reltime(&wpa_s->p2p_auto_started);
|
2012-04-13 15:04:36 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Auto join started at "
|
|
|
|
"%ld.%06ld",
|
|
|
|
wpa_s->p2p_auto_started.sec,
|
|
|
|
wpa_s->p2p_auto_started.usec);
|
|
|
|
}
|
2012-11-22 23:48:58 +01:00
|
|
|
wpa_s->user_initiated_pd = 1;
|
2012-04-13 15:04:36 +02:00
|
|
|
if (wpas_p2p_join(wpa_s, iface_addr, dev_addr, wps_method,
|
2015-12-30 18:08:51 +01:00
|
|
|
auto_join, freq,
|
|
|
|
group_ssid, group_ssid_len) < 0)
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-07-24 02:39:45 +02:00
|
|
|
size = P2P_MAX_PREF_CHANNELS;
|
2013-10-22 20:00:49 +02:00
|
|
|
res = wpas_p2p_setup_freqs(wpa_s, freq, &force_freq, &pref_freq,
|
2015-07-24 02:39:45 +02:00
|
|
|
go_intent == 15, pref_freq_list, &size);
|
2013-02-25 18:30:14 +01:00
|
|
|
if (res)
|
|
|
|
return res;
|
2013-11-19 11:39:29 +01:00
|
|
|
wpas_p2p_set_own_freq_preference(wpa_s,
|
|
|
|
force_freq ? force_freq : pref_freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2015-07-24 02:39:45 +02:00
|
|
|
p2p_set_own_pref_freq_list(wpa_s->global->p2p, pref_freq_list, size);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s->create_p2p_iface = wpas_p2p_create_iface(wpa_s);
|
|
|
|
|
2011-11-18 22:32:03 +01:00
|
|
|
if (wpa_s->create_p2p_iface) {
|
|
|
|
/* Prepare to add a new interface for the group */
|
|
|
|
iftype = WPA_IF_P2P_GROUP;
|
|
|
|
if (go_intent == 15)
|
|
|
|
iftype = WPA_IF_P2P_GO;
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, iftype) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to allocate a new "
|
|
|
|
"interface for the group");
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
2011-11-18 22:32:03 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-11-18 22:32:03 +01:00
|
|
|
if_addr = wpa_s->pending_interface_addr;
|
2015-08-02 18:25:41 +02:00
|
|
|
} else {
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2p_mgmt)
|
|
|
|
if_addr = wpa_s->parent->own_addr;
|
|
|
|
else
|
|
|
|
if_addr = wpa_s->own_addr;
|
2015-08-02 18:25:41 +02:00
|
|
|
os_memset(wpa_s->go_dev_addr, 0, ETH_ALEN);
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (auth) {
|
|
|
|
if (wpas_p2p_auth_go_neg(wpa_s, peer_addr, wps_method,
|
2011-11-18 22:32:03 +01:00
|
|
|
go_intent, if_addr,
|
2012-10-26 17:10:46 +02:00
|
|
|
force_freq, persistent_group, ssid,
|
|
|
|
pref_freq) < 0)
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
|
|
|
return ret;
|
|
|
|
}
|
2011-11-18 22:32:03 +01:00
|
|
|
|
|
|
|
if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method,
|
|
|
|
go_intent, if_addr, force_freq,
|
2012-10-26 17:10:46 +02:00
|
|
|
persistent_group, ssid, pref_freq) < 0) {
|
2011-11-18 22:32:03 +01:00
|
|
|
if (wpa_s->create_p2p_iface)
|
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_remain_on_channel_cb - Indication of remain-on-channel start
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* @freq: Frequency of the channel in MHz
|
|
|
|
* @duration: Duration of the stay on the channel in milliseconds
|
|
|
|
*
|
|
|
|
* This callback is called when the driver indicates that it has started the
|
|
|
|
* requested remain-on-channel duration.
|
|
|
|
*/
|
|
|
|
void wpas_p2p_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int freq, unsigned int duration)
|
|
|
|
{
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
2015-02-02 12:32:06 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: remain-on-channel callback (off_channel_freq=%u pending_listen_freq=%d roc_waiting_drv_freq=%d freq=%u duration=%u)",
|
|
|
|
wpa_s->off_channel_freq, wpa_s->pending_listen_freq,
|
|
|
|
wpa_s->roc_waiting_drv_freq, freq, duration);
|
|
|
|
if (wpa_s->off_channel_freq &&
|
|
|
|
wpa_s->off_channel_freq == wpa_s->pending_listen_freq) {
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p_listen_cb(wpa_s->global->p2p, wpa_s->pending_listen_freq,
|
|
|
|
wpa_s->pending_listen_duration);
|
|
|
|
wpa_s->pending_listen_freq = 0;
|
2014-02-20 15:59:29 +01:00
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore remain-on-channel callback (off_channel_freq=%u pending_listen_freq=%d freq=%u duration=%u)",
|
|
|
|
wpa_s->off_channel_freq, wpa_s->pending_listen_freq,
|
|
|
|
freq, duration);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-08-20 18:25:06 +02:00
|
|
|
int wpas_p2p_listen_start(struct wpa_supplicant *wpa_s, unsigned int timeout)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
/* Limit maximum Listen state time based on driver limitation. */
|
|
|
|
if (timeout > wpa_s->max_remain_on_chan)
|
|
|
|
timeout = wpa_s->max_remain_on_chan;
|
|
|
|
|
|
|
|
return p2p_listen(wpa_s->global->p2p, timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_cancel_remain_on_channel_cb - Remain-on-channel timeout
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* @freq: Frequency of the channel in MHz
|
|
|
|
*
|
|
|
|
* This callback is called when the driver indicates that a remain-on-channel
|
|
|
|
* operation has been completed, i.e., the duration on the requested channel
|
|
|
|
* has timed out.
|
|
|
|
*/
|
|
|
|
void wpas_p2p_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int freq)
|
|
|
|
{
|
2010-08-03 05:40:54 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancel remain-on-channel callback "
|
2011-02-01 17:09:38 +01:00
|
|
|
"(p2p_long_listen=%d ms pending_action_tx=%p)",
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen,
|
|
|
|
offchannel_pending_action_tx(wpa_s));
|
2014-01-04 08:36:13 +01:00
|
|
|
wpas_p2p_listen_work_done(wpa_s);
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
2020-01-04 22:11:28 +01:00
|
|
|
if (wpa_s->global->p2p_long_listen > 0)
|
|
|
|
wpa_s->global->p2p_long_listen -= wpa_s->max_remain_on_chan;
|
2010-07-18 23:30:25 +02:00
|
|
|
if (p2p_listen_end(wpa_s->global->p2p, freq) > 0)
|
|
|
|
return; /* P2P module started a new operation */
|
2012-12-22 10:22:12 +01:00
|
|
|
if (offchannel_pending_action_tx(wpa_s))
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
2020-01-04 22:11:28 +01:00
|
|
|
if (wpa_s->global->p2p_long_listen > 0) {
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Continuing long Listen state");
|
2020-01-04 22:11:28 +01:00
|
|
|
wpas_p2p_listen_start(wpa_s, wpa_s->global->p2p_long_listen);
|
2013-08-31 17:09:15 +02:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* When listen duration is over, stop listen & update p2p_state
|
|
|
|
* to IDLE.
|
|
|
|
*/
|
|
|
|
p2p_stop_listen(wpa_s->global->p2p);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_group_remove - Remove a P2P group
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* @ifname: Network interface name of the group interface or "*" to remove all
|
|
|
|
* groups
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This function is used to remove a P2P group. This can be used to disconnect
|
|
|
|
* from a group in which the local end is a P2P Client or to end a P2P Group in
|
|
|
|
* case the local end is the Group Owner. If a virtual network interface was
|
|
|
|
* created for this group, that interface will be removed. Otherwise, only the
|
|
|
|
* configured P2P group network will be removed from the interface.
|
|
|
|
*/
|
|
|
|
int wpas_p2p_group_remove(struct wpa_supplicant *wpa_s, const char *ifname)
|
|
|
|
{
|
|
|
|
struct wpa_global *global = wpa_s->global;
|
2014-10-18 15:20:51 +02:00
|
|
|
struct wpa_supplicant *calling_wpa_s = wpa_s;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (os_strcmp(ifname, "*") == 0) {
|
|
|
|
struct wpa_supplicant *prev;
|
2020-09-25 14:39:00 +02:00
|
|
|
bool calling_wpa_s_group_removed = false;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_s = global->ifaces;
|
|
|
|
while (wpa_s) {
|
|
|
|
prev = wpa_s;
|
|
|
|
wpa_s = wpa_s->next;
|
2013-08-25 10:17:14 +02:00
|
|
|
if (prev->p2p_group_interface !=
|
|
|
|
NOT_P2P_GROUP_INTERFACE ||
|
|
|
|
(prev->current_ssid &&
|
2020-09-25 14:39:00 +02:00
|
|
|
prev->current_ssid->p2p_group)) {
|
2014-10-18 15:20:51 +02:00
|
|
|
wpas_p2p_disconnect_safely(prev, calling_wpa_s);
|
2020-09-25 14:39:00 +02:00
|
|
|
if (prev == calling_wpa_s)
|
|
|
|
calling_wpa_s_group_removed = true;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2020-09-25 14:39:00 +02:00
|
|
|
|
|
|
|
if (!calling_wpa_s_group_removed &&
|
|
|
|
(calling_wpa_s->p2p_group_interface !=
|
|
|
|
NOT_P2P_GROUP_INTERFACE ||
|
|
|
|
(calling_wpa_s->current_ssid &&
|
|
|
|
calling_wpa_s->current_ssid->p2p_group))) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Remove calling_wpa_s P2P group");
|
|
|
|
wpas_p2p_disconnect_safely(calling_wpa_s,
|
|
|
|
calling_wpa_s);
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (os_strcmp(wpa_s->ifname, ifname) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-10-18 15:20:51 +02:00
|
|
|
return wpas_p2p_disconnect_safely(wpa_s, calling_wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-05 01:03:26 +02:00
|
|
|
static int wpas_p2p_select_go_freq(struct wpa_supplicant *wpa_s, int freq)
|
|
|
|
{
|
|
|
|
unsigned int r;
|
|
|
|
|
2015-08-10 02:44:12 +02:00
|
|
|
if (!wpa_s->conf->num_p2p_pref_chan && !freq) {
|
|
|
|
unsigned int i, size = P2P_MAX_PREF_CHANNELS;
|
|
|
|
unsigned int pref_freq_list[P2P_MAX_PREF_CHANNELS];
|
|
|
|
int res;
|
|
|
|
|
|
|
|
res = wpa_drv_get_pref_freq_list(wpa_s, WPA_IF_P2P_GO,
|
|
|
|
&size, pref_freq_list);
|
|
|
|
if (!res && size > 0) {
|
|
|
|
i = 0;
|
2016-12-09 14:29:16 +01:00
|
|
|
while (i < size &&
|
2017-05-24 17:40:53 +02:00
|
|
|
(!p2p_supported_freq(wpa_s->global->p2p,
|
|
|
|
pref_freq_list[i]) ||
|
|
|
|
wpas_p2p_disallowed_freq(wpa_s->global,
|
|
|
|
pref_freq_list[i]))) {
|
2015-08-10 02:44:12 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: preferred_freq_list[%d]=%d is disallowed",
|
|
|
|
i, pref_freq_list[i]);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
if (i != size) {
|
|
|
|
freq = pref_freq_list[i];
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Using preferred_freq_list[%d]=%d",
|
|
|
|
i, freq);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: All driver preferred frequencies are disallowed for P2P use");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: No preferred frequency list available");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-05 01:03:26 +02:00
|
|
|
if (freq == 2) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Request to start GO on 2.4 GHz "
|
|
|
|
"band");
|
|
|
|
if (wpa_s->best_24_freq > 0 &&
|
2013-10-22 18:45:46 +02:00
|
|
|
p2p_supported_freq_go(wpa_s->global->p2p,
|
|
|
|
wpa_s->best_24_freq)) {
|
2013-06-05 01:03:26 +02:00
|
|
|
freq = wpa_s->best_24_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use best 2.4 GHz band "
|
|
|
|
"channel: %d MHz", freq);
|
|
|
|
} else {
|
2014-09-13 15:27:52 +02:00
|
|
|
if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
|
|
|
return -1;
|
2013-06-05 01:03:26 +02:00
|
|
|
freq = 2412 + (r % 3) * 25;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use random 2.4 GHz band "
|
|
|
|
"channel: %d MHz", freq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (freq == 5) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Request to start GO on 5 GHz "
|
|
|
|
"band");
|
|
|
|
if (wpa_s->best_5_freq > 0 &&
|
2013-10-22 18:45:46 +02:00
|
|
|
p2p_supported_freq_go(wpa_s->global->p2p,
|
2013-06-05 01:03:26 +02:00
|
|
|
wpa_s->best_5_freq)) {
|
|
|
|
freq = wpa_s->best_5_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use best 5 GHz band "
|
|
|
|
"channel: %d MHz", freq);
|
|
|
|
} else {
|
2020-10-12 04:23:40 +02:00
|
|
|
const int freqs[] = {
|
|
|
|
/* operating class 115 */
|
|
|
|
5180, 5200, 5220, 5240,
|
|
|
|
/* operating class 124 */
|
|
|
|
5745, 5765, 5785, 5805,
|
|
|
|
};
|
|
|
|
unsigned int i, num_freqs = ARRAY_SIZE(freqs);
|
|
|
|
|
2014-09-13 15:27:52 +02:00
|
|
|
if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
|
|
|
return -1;
|
2020-10-12 04:23:40 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Most of the 5 GHz channels require DFS. Only
|
|
|
|
* operating classes 115 and 124 are available possibly
|
|
|
|
* without that requirement. Check these for
|
|
|
|
* availability starting from a randomly picked
|
|
|
|
* position.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < num_freqs; i++, r++) {
|
|
|
|
freq = freqs[r % num_freqs];
|
|
|
|
if (p2p_supported_freq_go(wpa_s->global->p2p,
|
|
|
|
freq))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i >= num_freqs) {
|
2013-06-05 01:03:26 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not select "
|
|
|
|
"5 GHz channel for P2P group");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Use random 5 GHz band "
|
|
|
|
"channel: %d MHz", freq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-22 18:45:46 +02:00
|
|
|
if (freq > 0 && !p2p_supported_freq_go(wpa_s->global->p2p, freq)) {
|
2015-03-05 02:31:25 +01:00
|
|
|
if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
|
2018-04-13 11:55:40 +02:00
|
|
|
ieee80211_is_dfs(freq, wpa_s->hw.modes,
|
|
|
|
wpa_s->hw.num_modes)) {
|
2015-03-05 02:31:25 +01:00
|
|
|
/*
|
|
|
|
* If freq is a DFS channel and DFS is offloaded to the
|
|
|
|
* driver, allow P2P GO to use it.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: "
|
|
|
|
"%s: The forced channel for GO (%u MHz) is DFS, and DFS is offloaded",
|
|
|
|
__func__, freq);
|
|
|
|
return freq;
|
|
|
|
}
|
2013-06-05 01:03:26 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: The forced channel for GO "
|
|
|
|
"(%u MHz) is not supported for P2P uses",
|
|
|
|
freq);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
static int wpas_p2p_supported_freq_go(struct wpa_supplicant *wpa_s,
|
|
|
|
const struct p2p_channels *channels,
|
|
|
|
int freq)
|
|
|
|
{
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, freq) &&
|
|
|
|
p2p_supported_freq_go(wpa_s->global->p2p, freq) &&
|
|
|
|
freq_included(wpa_s, channels, freq))
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_select_go_freq_no_pref(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params,
|
|
|
|
const struct p2p_channels *channels)
|
2014-05-19 09:05:38 +02:00
|
|
|
{
|
|
|
|
unsigned int i, r;
|
|
|
|
|
2015-02-24 07:43:33 +01:00
|
|
|
/* try all channels in operating class 115 */
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
params->freq = 5180 + i * 20;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, params->freq) &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, params->freq) &&
|
2015-02-24 07:43:33 +01:00
|
|
|
p2p_supported_freq(wpa_s->global->p2p, params->freq))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try all channels in operating class 124 */
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
params->freq = 5745 + i * 20;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, params->freq) &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, params->freq) &&
|
2015-02-24 07:43:33 +01:00
|
|
|
p2p_supported_freq(wpa_s->global->p2p, params->freq))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2014-09-25 11:42:07 +02:00
|
|
|
/* try social channel class 180 channel 2 */
|
|
|
|
params->freq = 58320 + 1 * 2160;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, params->freq) &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, params->freq) &&
|
2014-09-25 11:42:07 +02:00
|
|
|
p2p_supported_freq(wpa_s->global->p2p, params->freq))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* try all channels in reg. class 180 */
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
params->freq = 58320 + i * 2160;
|
|
|
|
if (!wpas_p2p_disallowed_freq(wpa_s->global, params->freq) &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, params->freq) &&
|
2014-09-25 11:42:07 +02:00
|
|
|
p2p_supported_freq(wpa_s->global->p2p, params->freq))
|
2014-05-19 09:05:38 +02:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2017-10-08 07:33:21 +02:00
|
|
|
/* try some random selection of the social channels */
|
|
|
|
if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
|
|
params->freq = 2412 + ((r + i) % 3) * 25;
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, params->freq))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try all other channels in operating class 81 */
|
|
|
|
for (i = 0; i < 11; i++) {
|
|
|
|
params->freq = 2412 + i * 5;
|
|
|
|
|
|
|
|
/* skip social channels; covered in the previous loop */
|
|
|
|
if (params->freq == 2412 ||
|
|
|
|
params->freq == 2437 ||
|
|
|
|
params->freq == 2462)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, params->freq))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
params->freq = 0;
|
2015-02-24 07:43:33 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No 2.4, 5, or 60 GHz channel allowed");
|
2015-07-27 21:24:23 +02:00
|
|
|
return;
|
2014-05-19 09:05:38 +02:00
|
|
|
out:
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq %d MHz (no preference known)",
|
|
|
|
params->freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-06-15 20:47:29 +02:00
|
|
|
static int wpas_same_band(int freq1, int freq2)
|
|
|
|
{
|
|
|
|
enum hostapd_hw_mode mode1, mode2;
|
|
|
|
u8 chan1, chan2;
|
|
|
|
|
|
|
|
mode1 = ieee80211_freq_to_chan(freq1, &chan1);
|
|
|
|
mode2 = ieee80211_freq_to_chan(freq2, &chan2);
|
|
|
|
if (mode1 == NUM_HOSTAPD_MODES)
|
|
|
|
return 0;
|
|
|
|
return mode1 == mode2;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-27 22:21:45 +01:00
|
|
|
static int wpas_p2p_init_go_params(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_go_neg_results *params,
|
2015-10-28 22:14:10 +01:00
|
|
|
int freq, int vht_center_freq2, int ht40,
|
2018-12-21 19:20:28 +01:00
|
|
|
int vht, int max_oper_chwidth, int he,
|
2019-10-17 19:44:14 +02:00
|
|
|
int edmg,
|
2013-03-01 13:22:29 +01:00
|
|
|
const struct p2p_channels *channels)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2014-05-19 09:05:35 +02:00
|
|
|
struct wpa_used_freq_data *freqs;
|
2015-07-27 21:24:23 +02:00
|
|
|
unsigned int cand;
|
2013-07-21 19:38:53 +02:00
|
|
|
unsigned int num, i;
|
2015-09-08 11:46:17 +02:00
|
|
|
int ignore_no_freqs = 0;
|
2016-03-03 17:18:30 +01:00
|
|
|
int unused_channels = wpas_p2p_num_unused_channels(wpa_s) > 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
os_memset(params, 0, sizeof(*params));
|
|
|
|
params->role_go = 1;
|
2012-08-15 21:53:01 +02:00
|
|
|
params->ht40 = ht40;
|
2013-10-27 18:46:17 +01:00
|
|
|
params->vht = vht;
|
2018-12-21 19:20:28 +01:00
|
|
|
params->he = he;
|
2015-10-28 22:14:10 +01:00
|
|
|
params->max_oper_chwidth = max_oper_chwidth;
|
|
|
|
params->vht_center_freq2 = vht_center_freq2;
|
2019-10-17 19:44:14 +02:00
|
|
|
params->edmg = edmg;
|
2015-07-27 21:24:21 +02:00
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
freqs = os_calloc(wpa_s->num_multichan_concurrent,
|
|
|
|
sizeof(struct wpa_used_freq_data));
|
|
|
|
if (!freqs)
|
|
|
|
return -1;
|
|
|
|
|
2015-09-08 11:46:17 +02:00
|
|
|
num = get_shared_radio_freqs_data(wpa_s, freqs,
|
|
|
|
wpa_s->num_multichan_concurrent);
|
|
|
|
|
|
|
|
if (wpa_s->current_ssid &&
|
|
|
|
wpa_s->current_ssid->mode == WPAS_MODE_P2P_GO &&
|
|
|
|
wpa_s->wpa_state == WPA_COMPLETED) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: %s called for an active GO",
|
|
|
|
__func__);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the frequency selection is done for an active P2P GO that
|
|
|
|
* is not sharing a frequency, allow to select a new frequency
|
|
|
|
* even if there are no unused frequencies as we are about to
|
|
|
|
* move the P2P GO so its frequency can be re-used.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if (freqs[i].freq == wpa_s->current_ssid->frequency &&
|
|
|
|
freqs[i].flags == 0) {
|
|
|
|
ignore_no_freqs = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-07-27 21:24:23 +02:00
|
|
|
|
2019-10-17 19:44:14 +02:00
|
|
|
/* Try to use EDMG channel */
|
|
|
|
if (params->edmg) {
|
|
|
|
if (wpas_p2p_try_edmg_channel(wpa_s, params) == 0)
|
|
|
|
goto success;
|
|
|
|
params->edmg = 0;
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
/* try using the forced freq */
|
2010-11-10 12:33:47 +01:00
|
|
|
if (freq) {
|
2017-06-13 13:52:02 +02:00
|
|
|
if (wpas_p2p_disallowed_freq(wpa_s->global, freq) ||
|
|
|
|
!freq_included(wpa_s, channels, freq)) {
|
2015-07-27 21:24:23 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
2017-06-13 13:52:02 +02:00
|
|
|
"P2P: Forced GO freq %d MHz disallowed",
|
2015-07-27 21:24:23 +02:00
|
|
|
freq);
|
|
|
|
goto fail;
|
|
|
|
}
|
2017-06-13 13:52:02 +02:00
|
|
|
if (!p2p_supported_freq_go(wpa_s->global->p2p, freq)) {
|
|
|
|
if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
|
2018-04-13 11:55:40 +02:00
|
|
|
ieee80211_is_dfs(freq, wpa_s->hw.modes,
|
|
|
|
wpa_s->hw.num_modes)) {
|
2017-06-13 13:52:02 +02:00
|
|
|
/*
|
|
|
|
* If freq is a DFS channel and DFS is offloaded
|
|
|
|
* to the driver, allow P2P GO to use it.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: %s: The forced channel for GO (%u MHz) requires DFS and DFS is offloaded",
|
|
|
|
__func__, freq);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: The forced channel for GO (%u MHz) is not supported for P2P uses",
|
|
|
|
freq);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
2015-07-27 21:24:23 +02:00
|
|
|
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if (freqs[i].freq == freq) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: forced freq (%d MHz) is also shared",
|
|
|
|
freq);
|
|
|
|
params->freq = freq;
|
|
|
|
goto success;
|
|
|
|
}
|
2013-03-01 13:22:29 +01:00
|
|
|
}
|
2015-07-27 21:24:23 +02:00
|
|
|
|
2016-03-03 17:18:30 +01:00
|
|
|
if (!ignore_no_freqs && !unused_channels) {
|
2015-07-27 21:24:23 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Cannot force GO on freq (%d MHz) as all the channels are in use",
|
|
|
|
freq);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: force GO freq (%d MHz) on a free channel",
|
|
|
|
freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
params->freq = freq;
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* consider using one of the shared frequencies */
|
2016-03-03 17:18:30 +01:00
|
|
|
if (num &&
|
|
|
|
(!wpa_s->conf->p2p_ignore_shared_freq || !unused_channels)) {
|
2015-07-27 21:24:23 +02:00
|
|
|
cand = wpas_p2p_pick_best_used_freq(wpa_s, freqs, num);
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use shared freq (%d MHz) for GO",
|
2016-03-03 17:18:29 +01:00
|
|
|
cand);
|
2015-07-27 21:24:23 +02:00
|
|
|
params->freq = cand;
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try using one of the shared freqs */
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels,
|
|
|
|
freqs[i].freq)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use shared freq (%d MHz) for GO",
|
2016-03-03 17:18:29 +01:00
|
|
|
freqs[i].freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
params->freq = freqs[i].freq;
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-03 17:18:30 +01:00
|
|
|
if (!ignore_no_freqs && !unused_channels) {
|
2015-07-27 21:24:23 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Cannot force GO on any of the channels we are already using");
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try using the setting from the configuration file */
|
|
|
|
if (wpa_s->conf->p2p_oper_reg_class == 81 &&
|
|
|
|
wpa_s->conf->p2p_oper_channel >= 1 &&
|
|
|
|
wpa_s->conf->p2p_oper_channel <= 11 &&
|
|
|
|
wpas_p2p_supported_freq_go(
|
|
|
|
wpa_s, channels,
|
|
|
|
2407 + 5 * wpa_s->conf->p2p_oper_channel)) {
|
2010-07-18 23:30:25 +02:00
|
|
|
params->freq = 2407 + 5 * wpa_s->conf->p2p_oper_channel;
|
2010-11-10 12:33:47 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on configured "
|
|
|
|
"frequency %d MHz", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((wpa_s->conf->p2p_oper_reg_class == 115 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 116 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 117 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 124 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 125 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 126 ||
|
|
|
|
wpa_s->conf->p2p_oper_reg_class == 127) &&
|
|
|
|
wpas_p2p_supported_freq_go(wpa_s, channels,
|
|
|
|
5000 +
|
|
|
|
5 * wpa_s->conf->p2p_oper_channel)) {
|
2010-07-18 23:30:25 +02:00
|
|
|
params->freq = 5000 + 5 * wpa_s->conf->p2p_oper_channel;
|
2010-11-10 12:33:47 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on configured "
|
|
|
|
"frequency %d MHz", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try using best channels */
|
|
|
|
if (wpa_s->conf->p2p_oper_channel == 0 &&
|
|
|
|
wpa_s->best_overall_freq > 0 &&
|
|
|
|
wpas_p2p_supported_freq_go(wpa_s, channels,
|
|
|
|
wpa_s->best_overall_freq)) {
|
2010-11-10 12:33:47 +01:00
|
|
|
params->freq = wpa_s->best_overall_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on best overall "
|
|
|
|
"channel %d MHz", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_oper_channel == 0 &&
|
|
|
|
wpa_s->best_24_freq > 0 &&
|
|
|
|
wpas_p2p_supported_freq_go(wpa_s, channels,
|
|
|
|
wpa_s->best_24_freq)) {
|
2010-11-10 12:33:47 +01:00
|
|
|
params->freq = wpa_s->best_24_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on best 2.4 GHz "
|
|
|
|
"channel %d MHz", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->conf->p2p_oper_channel == 0 &&
|
|
|
|
wpa_s->best_5_freq > 0 &&
|
|
|
|
wpas_p2p_supported_freq_go(wpa_s, channels,
|
|
|
|
wpa_s->best_5_freq)) {
|
2010-11-10 12:33:47 +01:00
|
|
|
params->freq = wpa_s->best_5_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on best 5 GHz "
|
|
|
|
"channel %d MHz", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try using preferred channels */
|
|
|
|
cand = p2p_get_pref_freq(wpa_s->global->p2p, channels);
|
|
|
|
if (cand && wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
params->freq = cand;
|
2013-05-17 10:27:02 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set GO freq %d MHz from preferred "
|
|
|
|
"channels", params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
|
2018-06-15 20:47:29 +02:00
|
|
|
/* Try using a channel that allows VHT to be used with 80 MHz */
|
|
|
|
if (wpa_s->hw.modes && wpa_s->p2p_group_common_freqs) {
|
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
|
|
|
enum hostapd_hw_mode mode;
|
|
|
|
struct hostapd_hw_modes *hwmode;
|
|
|
|
u8 chan;
|
|
|
|
|
|
|
|
cand = wpa_s->p2p_group_common_freqs[i];
|
|
|
|
mode = ieee80211_freq_to_chan(cand, &chan);
|
|
|
|
hwmode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes,
|
2019-12-30 10:42:12 +01:00
|
|
|
mode, is_6ghz_freq(cand));
|
2018-06-15 20:47:29 +02:00
|
|
|
if (!hwmode ||
|
|
|
|
wpas_p2p_verify_channel(wpa_s, hwmode, chan,
|
|
|
|
BW80) != ALLOWED)
|
|
|
|
continue;
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
params->freq = cand;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use freq %d MHz common with the peer and allowing VHT80",
|
|
|
|
params->freq);
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try using a channel that allows HT to be used with 40 MHz on the same
|
|
|
|
* band so that CSA can be used */
|
|
|
|
if (wpa_s->current_ssid && wpa_s->hw.modes &&
|
|
|
|
wpa_s->p2p_group_common_freqs) {
|
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
|
|
|
enum hostapd_hw_mode mode;
|
|
|
|
struct hostapd_hw_modes *hwmode;
|
|
|
|
u8 chan;
|
|
|
|
|
|
|
|
cand = wpa_s->p2p_group_common_freqs[i];
|
|
|
|
mode = ieee80211_freq_to_chan(cand, &chan);
|
|
|
|
hwmode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes,
|
2019-12-30 10:42:12 +01:00
|
|
|
mode, is_6ghz_freq(cand));
|
2018-06-15 20:47:29 +02:00
|
|
|
if (!wpas_same_band(wpa_s->current_ssid->frequency,
|
|
|
|
cand) ||
|
|
|
|
!hwmode ||
|
|
|
|
(wpas_p2p_verify_channel(wpa_s, hwmode, chan,
|
|
|
|
BW40MINUS) != ALLOWED &&
|
|
|
|
wpas_p2p_verify_channel(wpa_s, hwmode, chan,
|
|
|
|
BW40PLUS) != ALLOWED))
|
|
|
|
continue;
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
params->freq = cand;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use freq %d MHz common with the peer, allowing HT40, and maintaining same band",
|
|
|
|
params->freq);
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try using one of the group common freqs on the same band so that CSA
|
|
|
|
* can be used */
|
|
|
|
if (wpa_s->current_ssid && wpa_s->p2p_group_common_freqs) {
|
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
|
|
|
cand = wpa_s->p2p_group_common_freqs[i];
|
|
|
|
if (!wpas_same_band(wpa_s->current_ssid->frequency,
|
|
|
|
cand))
|
|
|
|
continue;
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
params->freq = cand;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use freq %d MHz common with the peer and maintaining same band",
|
|
|
|
params->freq);
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
/* Try using one of the group common freqs */
|
|
|
|
if (wpa_s->p2p_group_common_freqs) {
|
2015-07-27 21:24:21 +02:00
|
|
|
for (i = 0; i < wpa_s->p2p_group_common_freqs_num; i++) {
|
2015-07-27 21:24:23 +02:00
|
|
|
cand = wpa_s->p2p_group_common_freqs[i];
|
|
|
|
if (wpas_p2p_supported_freq_go(wpa_s, channels, cand)) {
|
|
|
|
params->freq = cand;
|
2015-07-27 21:24:21 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Use freq %d MHz common with the peer",
|
|
|
|
params->freq);
|
2015-07-27 21:24:23 +02:00
|
|
|
goto success;
|
2015-07-27 21:24:21 +02:00
|
|
|
}
|
|
|
|
}
|
2010-11-10 12:33:47 +01:00
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
/* no preference, select some channel */
|
|
|
|
wpas_p2p_select_go_freq_no_pref(wpa_s, params, channels);
|
2014-05-19 09:05:35 +02:00
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
if (params->freq == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: did not find a freq for GO use");
|
|
|
|
goto fail;
|
2013-07-21 19:38:53 +02:00
|
|
|
}
|
2013-11-18 17:13:15 +01:00
|
|
|
|
2015-07-27 21:24:23 +02:00
|
|
|
success:
|
2013-07-21 19:38:53 +02:00
|
|
|
os_free(freqs);
|
2011-12-27 22:21:45 +01:00
|
|
|
return 0;
|
2015-07-27 21:24:23 +02:00
|
|
|
fail:
|
|
|
|
os_free(freqs);
|
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpa_supplicant *
|
|
|
|
wpas_p2p_get_group_iface(struct wpa_supplicant *wpa_s, int addr_allocated,
|
|
|
|
int go)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *group_wpa_s;
|
|
|
|
|
2012-09-24 00:05:51 +02:00
|
|
|
if (!wpas_p2p_create_iface(wpa_s)) {
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2p_mgmt) {
|
|
|
|
/*
|
|
|
|
* We may be called on the p2p_dev interface which
|
|
|
|
* cannot be used for group operations, so always use
|
|
|
|
* the primary interface.
|
|
|
|
*/
|
|
|
|
wpa_s->parent->p2pdev = wpa_s;
|
|
|
|
wpa_s = wpa_s->parent;
|
|
|
|
}
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Use primary interface for group operations");
|
2013-09-26 20:24:09 +02:00
|
|
|
wpa_s->p2p_first_connection_timeout = 0;
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s != wpa_s->p2pdev)
|
2016-04-07 12:32:08 +02:00
|
|
|
wpas_p2p_clone_config(wpa_s, wpa_s->p2pdev);
|
2010-07-18 23:30:25 +02:00
|
|
|
return wpa_s;
|
2012-09-24 00:05:51 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, go ? WPA_IF_P2P_GO :
|
2012-09-24 00:05:51 +02:00
|
|
|
WPA_IF_P2P_CLIENT) < 0) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_ERROR,
|
|
|
|
"P2P: Failed to add group interface");
|
2010-07-18 23:30:25 +02:00
|
|
|
return NULL;
|
2012-09-24 00:05:51 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
group_wpa_s = wpas_p2p_init_group_interface(wpa_s, go);
|
|
|
|
if (group_wpa_s == NULL) {
|
2013-05-18 17:59:51 +02:00
|
|
|
wpa_msg_global(wpa_s, MSG_ERROR,
|
|
|
|
"P2P: Failed to initialize group interface");
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-09-25 17:56:52 +02:00
|
|
|
if (go && wpa_s->p2p_go_do_acs) {
|
|
|
|
group_wpa_s->p2p_go_do_acs = wpa_s->p2p_go_do_acs;
|
|
|
|
group_wpa_s->p2p_go_acs_band = wpa_s->p2p_go_acs_band;
|
|
|
|
wpa_s->p2p_go_do_acs = 0;
|
|
|
|
}
|
|
|
|
|
2012-09-24 00:05:51 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Use separate group interface %s",
|
|
|
|
group_wpa_s->ifname);
|
2013-09-26 20:24:09 +02:00
|
|
|
group_wpa_s->p2p_first_connection_timeout = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
return group_wpa_s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_group_add - Add a new P2P group with local end as Group Owner
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data from wpa_supplicant_add_iface()
|
|
|
|
* @persistent_group: Whether to create a persistent group
|
|
|
|
* @freq: Frequency for the group or 0 to indicate no hardcoding
|
2015-10-28 22:14:10 +01:00
|
|
|
* @vht_center_freq2: segment_1 center frequency for GO operating in VHT 80P80
|
2013-10-27 18:46:17 +01:00
|
|
|
* @ht40: Start GO with 40 MHz channel width
|
|
|
|
* @vht: Start GO with VHT support
|
2015-10-28 22:14:10 +01:00
|
|
|
* @vht_chwidth: channel bandwidth for GO operating with VHT support
|
2019-10-17 19:44:14 +02:00
|
|
|
* @edmg: Start GO with EDMG support
|
2010-07-18 23:30:25 +02:00
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This function creates a new P2P group with the local end as the Group Owner,
|
|
|
|
* i.e., without using Group Owner Negotiation.
|
|
|
|
*/
|
|
|
|
int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,
|
2015-10-28 22:14:10 +01:00
|
|
|
int freq, int vht_center_freq2, int ht40, int vht,
|
2019-10-17 19:44:14 +02:00
|
|
|
int max_oper_chwidth, int he, int edmg)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct p2p_go_neg_results params;
|
2010-11-10 12:33:47 +01:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2013-09-01 12:40:33 +02:00
|
|
|
os_free(wpa_s->global->add_psk);
|
|
|
|
wpa_s->global->add_psk = NULL;
|
|
|
|
|
2011-10-26 00:28:51 +02:00
|
|
|
/* Make sure we are not running find during connection establishment */
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Stop any on-going P2P FIND");
|
2012-11-11 19:45:27 +01:00
|
|
|
wpas_p2p_stop_find_oper(wpa_s);
|
2011-10-26 00:28:51 +02:00
|
|
|
|
2017-09-25 17:56:52 +02:00
|
|
|
if (!wpa_s->p2p_go_do_acs) {
|
|
|
|
freq = wpas_p2p_select_go_freq(wpa_s, freq);
|
|
|
|
if (freq < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
2010-10-15 17:46:02 +02:00
|
|
|
|
2015-10-28 22:14:10 +01:00
|
|
|
if (wpas_p2p_init_go_params(wpa_s, ¶ms, freq, vht_center_freq2,
|
2019-10-17 19:44:14 +02:00
|
|
|
ht40, vht, max_oper_chwidth, he, edmg,
|
|
|
|
NULL))
|
2011-12-27 22:21:45 +01:00
|
|
|
return -1;
|
2017-06-13 13:52:02 +02:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p_go_params(wpa_s->global->p2p, ¶ms);
|
|
|
|
params.persistent_group = persistent_group;
|
|
|
|
|
|
|
|
wpa_s = wpas_p2p_get_group_iface(wpa_s, 0, 1);
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return -1;
|
|
|
|
wpas_start_wps_go(wpa_s, ¶ms, 0);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_start_p2p_client(struct wpa_supplicant *wpa_s,
|
2014-03-21 13:56:02 +01:00
|
|
|
struct wpa_ssid *params, int addr_allocated,
|
2015-08-21 17:28:28 +02:00
|
|
|
int freq, int force_scan)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
|
|
|
wpa_s = wpas_p2p_get_group_iface(wpa_s, addr_allocated, 0);
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return -1;
|
2015-08-21 17:28:28 +02:00
|
|
|
if (force_scan)
|
|
|
|
os_get_reltime(&wpa_s->scan_min_time);
|
2013-09-01 20:28:16 +02:00
|
|
|
wpa_s->p2p_last_4way_hs_fail = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
wpa_supplicant_ap_deinit(wpa_s);
|
|
|
|
|
|
|
|
ssid = wpa_config_add_network(wpa_s->conf);
|
|
|
|
if (ssid == NULL)
|
|
|
|
return -1;
|
2015-08-02 18:25:41 +02:00
|
|
|
os_memset(wpa_s->go_dev_addr, 0, ETH_ALEN);
|
2010-07-18 23:30:25 +02:00
|
|
|
wpa_config_set_network_defaults(ssid);
|
|
|
|
ssid->temporary = 1;
|
|
|
|
ssid->proto = WPA_PROTO_RSN;
|
2016-03-23 17:44:10 +01:00
|
|
|
ssid->pbss = params->pbss;
|
|
|
|
ssid->pairwise_cipher = params->pbss ? WPA_CIPHER_GCMP :
|
|
|
|
WPA_CIPHER_CCMP;
|
|
|
|
ssid->group_cipher = params->pbss ? WPA_CIPHER_GCMP : WPA_CIPHER_CCMP;
|
2010-07-18 23:30:25 +02:00
|
|
|
ssid->key_mgmt = WPA_KEY_MGMT_PSK;
|
|
|
|
ssid->ssid = os_malloc(params->ssid_len);
|
|
|
|
if (ssid->ssid == NULL) {
|
|
|
|
wpa_config_remove_network(wpa_s->conf, ssid->id);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
os_memcpy(ssid->ssid, params->ssid, params->ssid_len);
|
|
|
|
ssid->ssid_len = params->ssid_len;
|
|
|
|
ssid->p2p_group = 1;
|
2011-02-02 16:00:12 +01:00
|
|
|
ssid->export_keys = 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
if (params->psk_set) {
|
|
|
|
os_memcpy(ssid->psk, params->psk, 32);
|
|
|
|
ssid->psk_set = 1;
|
|
|
|
}
|
|
|
|
if (params->passphrase)
|
|
|
|
ssid->passphrase = os_strdup(params->passphrase);
|
|
|
|
|
|
|
|
wpa_s->show_group_started = 1;
|
2014-03-21 13:56:02 +01:00
|
|
|
wpa_s->p2p_in_invitation = 1;
|
|
|
|
wpa_s->p2p_invite_go_freq = freq;
|
2015-12-04 22:11:10 +01:00
|
|
|
wpa_s->p2p_go_group_formation_completed = 0;
|
|
|
|
wpa_s->global->p2p_group_formation = wpa_s;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s->p2pdev,
|
2014-03-11 10:54:17 +01:00
|
|
|
NULL);
|
|
|
|
eloop_register_timeout(P2P_MAX_INITIAL_CONN_WAIT, 0,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-11-12 15:17:35 +01:00
|
|
|
wpa_supplicant_select_network(wpa_s, ssid);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_group_add_persistent(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid, int addr_allocated,
|
2015-10-28 22:14:10 +01:00
|
|
|
int force_freq, int neg_freq,
|
|
|
|
int vht_center_freq2, int ht40,
|
2018-12-21 19:20:28 +01:00
|
|
|
int vht, int max_oper_chwidth, int he,
|
2019-10-17 19:44:14 +02:00
|
|
|
int edmg,
|
2015-10-28 22:14:10 +01:00
|
|
|
const struct p2p_channels *channels,
|
2015-08-21 17:28:28 +02:00
|
|
|
int connection_timeout, int force_scan)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct p2p_go_neg_results params;
|
2014-01-27 15:46:02 +01:00
|
|
|
int go = 0, freq;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (ssid->disabled != 2 || ssid->ssid == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2010-11-19 11:57:36 +01:00
|
|
|
if (wpas_get_p2p_group(wpa_s, ssid->ssid, ssid->ssid_len, &go) &&
|
|
|
|
go == (ssid->mode == WPAS_MODE_P2P_GO)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Requested persistent group is "
|
|
|
|
"already running");
|
2015-05-28 16:17:41 +02:00
|
|
|
if (go == 0 &&
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL)) {
|
2015-05-28 16:17:41 +02:00
|
|
|
/*
|
|
|
|
* This can happen if Invitation Response frame was lost
|
|
|
|
* and the peer (GO of a persistent group) tries to
|
|
|
|
* invite us again. Reschedule the timeout to avoid
|
|
|
|
* terminating the wait for the connection too early
|
|
|
|
* since we now know that the peer is still trying to
|
|
|
|
* invite us instead of having already started the GO.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Reschedule group formation timeout since peer is still trying to invite us");
|
|
|
|
eloop_register_timeout(P2P_MAX_INITIAL_CONN_WAIT, 0,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2015-05-28 16:17:41 +02:00
|
|
|
}
|
2010-11-19 11:57:36 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-09-01 12:40:33 +02:00
|
|
|
os_free(wpa_s->global->add_psk);
|
|
|
|
wpa_s->global->add_psk = NULL;
|
|
|
|
|
2010-11-19 11:58:03 +01:00
|
|
|
/* Make sure we are not running find during connection establishment */
|
2012-11-11 19:45:27 +01:00
|
|
|
wpas_p2p_stop_find_oper(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_s->p2p_fallback_to_go_neg = 0;
|
|
|
|
|
2014-10-21 12:08:30 +02:00
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
if (force_freq > 0) {
|
|
|
|
freq = wpas_p2p_select_go_freq(wpa_s, force_freq);
|
|
|
|
if (freq < 0)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
freq = wpas_p2p_select_go_freq(wpa_s, neg_freq);
|
|
|
|
if (freq < 0 ||
|
2015-07-27 21:24:21 +02:00
|
|
|
(freq > 0 && !freq_included(wpa_s, channels, freq)))
|
2014-10-21 12:08:30 +02:00
|
|
|
freq = 0;
|
|
|
|
}
|
2015-03-29 12:10:36 +02:00
|
|
|
} else if (ssid->mode == WPAS_MODE_INFRA) {
|
2014-10-21 12:08:30 +02:00
|
|
|
freq = neg_freq;
|
2015-07-27 21:24:21 +02:00
|
|
|
if (freq <= 0 || !freq_included(wpa_s, channels, freq)) {
|
2015-03-29 12:10:36 +02:00
|
|
|
struct os_reltime now;
|
|
|
|
struct wpa_bss *bss =
|
|
|
|
wpa_bss_get_p2p_dev_addr(wpa_s, ssid->bssid);
|
|
|
|
|
|
|
|
os_get_reltime(&now);
|
|
|
|
if (bss &&
|
|
|
|
!os_reltime_expired(&now, &bss->last_update, 5) &&
|
2015-07-27 21:24:21 +02:00
|
|
|
freq_included(wpa_s, channels, bss->freq))
|
2015-03-29 12:10:36 +02:00
|
|
|
freq = bss->freq;
|
|
|
|
else
|
|
|
|
freq = 0;
|
|
|
|
}
|
2013-06-05 01:03:26 +02:00
|
|
|
|
2015-08-21 17:28:28 +02:00
|
|
|
return wpas_start_p2p_client(wpa_s, ssid, addr_allocated, freq,
|
|
|
|
force_scan);
|
2015-03-29 12:10:36 +02:00
|
|
|
} else {
|
2014-03-21 13:56:02 +01:00
|
|
|
return -1;
|
2015-03-29 12:10:36 +02:00
|
|
|
}
|
2014-03-21 13:56:02 +01:00
|
|
|
|
2015-10-28 22:14:10 +01:00
|
|
|
if (wpas_p2p_init_go_params(wpa_s, ¶ms, freq, vht_center_freq2,
|
2019-10-17 19:44:14 +02:00
|
|
|
ht40, vht, max_oper_chwidth, he, edmg,
|
|
|
|
channels))
|
2011-12-27 22:21:45 +01:00
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
params.role_go = 1;
|
2012-11-11 10:39:24 +01:00
|
|
|
params.psk_set = ssid->psk_set;
|
|
|
|
if (params.psk_set)
|
|
|
|
os_memcpy(params.psk, ssid->psk, sizeof(params.psk));
|
2012-12-25 13:15:07 +01:00
|
|
|
if (ssid->passphrase) {
|
|
|
|
if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
|
|
|
|
"persistent group");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
os_strlcpy(params.passphrase, ssid->passphrase,
|
|
|
|
sizeof(params.passphrase));
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
os_memcpy(params.ssid, ssid->ssid, ssid->ssid_len);
|
|
|
|
params.ssid_len = ssid->ssid_len;
|
|
|
|
params.persistent_group = 1;
|
|
|
|
|
|
|
|
wpa_s = wpas_p2p_get_group_iface(wpa_s, addr_allocated, 1);
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2014-07-07 13:21:01 +02:00
|
|
|
p2p_channels_to_freqs(channels, params.freq_list, P2P_MAX_CHANNELS);
|
|
|
|
|
2013-09-26 20:24:09 +02:00
|
|
|
wpa_s->p2p_first_connection_timeout = connection_timeout;
|
2010-07-18 23:30:25 +02:00
|
|
|
wpas_start_wps_go(wpa_s, ¶ms, 0);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_ie_update(void *ctx, struct wpabuf *beacon_ies,
|
|
|
|
struct wpabuf *proberesp_ies)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
if (wpa_s->ap_iface) {
|
|
|
|
struct hostapd_data *hapd = wpa_s->ap_iface->bss[0];
|
2011-11-14 15:26:45 +01:00
|
|
|
if (!(hapd->conf->p2p & P2P_GROUP_OWNER)) {
|
|
|
|
wpabuf_free(beacon_ies);
|
|
|
|
wpabuf_free(proberesp_ies);
|
|
|
|
return;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
if (beacon_ies) {
|
|
|
|
wpabuf_free(hapd->p2p_beacon_ie);
|
|
|
|
hapd->p2p_beacon_ie = beacon_ies;
|
|
|
|
}
|
|
|
|
wpabuf_free(hapd->p2p_probe_resp_ie);
|
|
|
|
hapd->p2p_probe_resp_ie = proberesp_ies;
|
|
|
|
} else {
|
|
|
|
wpabuf_free(beacon_ies);
|
|
|
|
wpabuf_free(proberesp_ies);
|
|
|
|
}
|
|
|
|
wpa_supplicant_ap_update_beacon(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-10-25 17:24:15 +02:00
|
|
|
static void wpas_p2p_idle_update(void *ctx, int idle)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
|
|
if (!wpa_s->ap_iface)
|
|
|
|
return;
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: GO - group %sidle", idle ? "" : "not ");
|
2014-01-06 16:56:50 +01:00
|
|
|
if (idle) {
|
|
|
|
if (wpa_s->global->p2p_fail_on_wps_complete &&
|
|
|
|
wpa_s->p2p_in_provisioning) {
|
|
|
|
wpas_p2p_grpform_fail_after_wps(wpa_s);
|
|
|
|
return;
|
|
|
|
}
|
2010-10-25 17:24:15 +02:00
|
|
|
wpas_p2p_set_group_idle_timeout(wpa_s);
|
2014-01-06 16:56:50 +01:00
|
|
|
} else
|
2010-10-25 17:24:15 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
struct p2p_group * wpas_p2p_group_init(struct wpa_supplicant *wpa_s,
|
2012-05-08 16:33:14 +02:00
|
|
|
struct wpa_ssid *ssid)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
struct p2p_group *group;
|
|
|
|
struct p2p_group_config *cfg;
|
|
|
|
|
2016-05-14 18:39:10 +02:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL ||
|
|
|
|
!ssid->p2p_group)
|
2011-02-24 20:13:30 +01:00
|
|
|
return NULL;
|
2010-12-30 11:48:55 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
cfg = os_zalloc(sizeof(*cfg));
|
|
|
|
if (cfg == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2012-05-08 16:33:14 +02:00
|
|
|
if (ssid->p2p_persistent_group && wpa_s->conf->persistent_reconnect)
|
2011-10-24 16:29:37 +02:00
|
|
|
cfg->persistent_group = 2;
|
2012-05-08 16:33:14 +02:00
|
|
|
else if (ssid->p2p_persistent_group)
|
2011-10-24 16:29:37 +02:00
|
|
|
cfg->persistent_group = 1;
|
2010-07-18 23:30:25 +02:00
|
|
|
os_memcpy(cfg->interface_addr, wpa_s->own_addr, ETH_ALEN);
|
2010-10-19 17:10:28 +02:00
|
|
|
if (wpa_s->max_stations &&
|
|
|
|
wpa_s->max_stations < wpa_s->conf->max_num_sta)
|
|
|
|
cfg->max_clients = wpa_s->max_stations;
|
|
|
|
else
|
|
|
|
cfg->max_clients = wpa_s->conf->max_num_sta;
|
2012-05-08 16:33:14 +02:00
|
|
|
os_memcpy(cfg->ssid, ssid->ssid, ssid->ssid_len);
|
|
|
|
cfg->ssid_len = ssid->ssid_len;
|
2013-03-16 19:45:21 +01:00
|
|
|
cfg->freq = ssid->frequency;
|
2010-07-18 23:30:25 +02:00
|
|
|
cfg->cb_ctx = wpa_s;
|
|
|
|
cfg->ie_update = wpas_p2p_ie_update;
|
2010-10-25 17:24:15 +02:00
|
|
|
cfg->idle_update = wpas_p2p_idle_update;
|
2016-03-20 10:46:04 +01:00
|
|
|
cfg->ip_addr_alloc = WPA_GET_BE32(wpa_s->p2pdev->conf->ip_addr_start)
|
|
|
|
!= 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
group = p2p_group_init(wpa_s->global->p2p, cfg);
|
|
|
|
if (group == NULL)
|
|
|
|
os_free(cfg);
|
2012-05-08 16:33:14 +02:00
|
|
|
if (ssid->mode != WPAS_MODE_P2P_GROUP_FORMATION)
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p_group_notif_formation_done(group);
|
|
|
|
wpa_s->p2p_group = group;
|
|
|
|
return group;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_wps_success(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
|
|
|
|
int registrar)
|
|
|
|
{
|
2012-03-01 21:06:03 +01:00
|
|
|
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (!wpa_s->p2p_in_provisioning) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore WPS success event - P2P "
|
|
|
|
"provisioning not in progress");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-03-01 21:06:03 +01:00
|
|
|
if (ssid && ssid->mode == WPAS_MODE_INFRA) {
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
os_memcpy(go_dev_addr, wpa_s->bssid, ETH_ALEN);
|
|
|
|
wpas_p2p_persistent_group(wpa_s, go_dev_addr, ssid->ssid,
|
|
|
|
ssid->ssid_len);
|
|
|
|
/* Clear any stored provisioning info */
|
|
|
|
p2p_clear_provisioning_info(wpa_s->global->p2p, go_dev_addr);
|
|
|
|
}
|
2011-12-06 20:44:57 +01:00
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s->p2pdev,
|
2010-07-18 23:30:25 +02:00
|
|
|
NULL);
|
2013-09-26 19:32:44 +02:00
|
|
|
wpa_s->p2p_go_group_formation_completed = 1;
|
2012-04-13 16:01:15 +02:00
|
|
|
if (ssid && ssid->mode == WPAS_MODE_INFRA) {
|
|
|
|
/*
|
|
|
|
* Use a separate timeout for initial data connection to
|
|
|
|
* complete to allow the group to be removed automatically if
|
|
|
|
* something goes wrong in this step before the P2P group idle
|
|
|
|
* timeout mechanism is taken into use.
|
|
|
|
*/
|
2013-09-26 19:32:44 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Re-start group formation timeout (%d seconds) as client for initial connection",
|
|
|
|
P2P_MAX_INITIAL_CONN_WAIT);
|
2012-04-13 16:01:15 +02:00
|
|
|
eloop_register_timeout(P2P_MAX_INITIAL_CONN_WAIT, 0,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2015-11-30 20:35:16 +01:00
|
|
|
/* Complete group formation on successful data connection. */
|
|
|
|
wpa_s->p2p_go_group_formation_completed = 0;
|
2013-09-26 19:32:44 +02:00
|
|
|
} else if (ssid) {
|
|
|
|
/*
|
|
|
|
* Use a separate timeout for initial data connection to
|
|
|
|
* complete to allow the group to be removed automatically if
|
|
|
|
* the client does not complete data connection successfully.
|
|
|
|
*/
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Re-start group formation timeout (%d seconds) as GO for initial connection",
|
|
|
|
P2P_MAX_INITIAL_CONN_WAIT_GO);
|
|
|
|
eloop_register_timeout(P2P_MAX_INITIAL_CONN_WAIT_GO, 0,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2013-09-26 19:32:44 +02:00
|
|
|
/*
|
|
|
|
* Complete group formation on first successful data connection
|
|
|
|
*/
|
|
|
|
wpa_s->p2p_go_group_formation_completed = 0;
|
2012-04-13 16:01:15 +02:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->global->p2p)
|
|
|
|
p2p_wps_success_cb(wpa_s->global->p2p, peer_addr);
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_group_formation_completed(wpa_s, 1, 0);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-06-25 10:47:04 +02:00
|
|
|
void wpas_p2p_wps_failed(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wps_event_fail *fail)
|
|
|
|
{
|
|
|
|
if (!wpa_s->p2p_in_provisioning) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore WPS fail event - P2P "
|
|
|
|
"provisioning not in progress");
|
|
|
|
return;
|
|
|
|
}
|
2011-12-06 20:44:57 +01:00
|
|
|
|
|
|
|
if (wpa_s->go_params) {
|
|
|
|
p2p_clear_provisioning_info(
|
|
|
|
wpa_s->global->p2p,
|
2012-03-01 21:06:03 +01:00
|
|
|
wpa_s->go_params->peer_device_addr);
|
2011-12-06 20:44:57 +01:00
|
|
|
}
|
|
|
|
|
2011-06-25 10:47:04 +02:00
|
|
|
wpas_notify_p2p_wps_failed(wpa_s, fail);
|
2014-01-06 16:56:50 +01:00
|
|
|
|
|
|
|
if (wpa_s == wpa_s->global->p2p_group_formation) {
|
|
|
|
/*
|
|
|
|
* Allow some time for the failed WPS negotiation exchange to
|
|
|
|
* complete, but remove the group since group formation cannot
|
|
|
|
* succeed after provisioning failure.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: WPS step failed during group formation - reject connection from timeout");
|
|
|
|
wpa_s->global->p2p_fail_on_wps_complete = 1;
|
|
|
|
eloop_deplete_timeout(0, 50000,
|
|
|
|
wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2014-01-06 16:56:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_wps_eapol_cb(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (!wpa_s->global->p2p_fail_on_wps_complete ||
|
|
|
|
!wpa_s->p2p_in_provisioning)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
wpas_p2p_grpform_fail_after_wps(wpa_s);
|
|
|
|
|
|
|
|
return 1;
|
2011-06-25 10:47:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
int wpas_p2p_prov_disc(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
|
2012-04-26 16:13:03 +02:00
|
|
|
const char *config_method,
|
2014-12-10 15:25:18 +01:00
|
|
|
enum wpas_p2p_prov_disc_use use,
|
|
|
|
struct p2ps_provision *p2ps_prov)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
u16 config_methods;
|
|
|
|
|
2014-12-10 12:29:29 +01:00
|
|
|
wpa_s->global->pending_p2ps_group = 0;
|
2015-10-08 11:36:01 +02:00
|
|
|
wpa_s->global->pending_p2ps_group_freq = 0;
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_s->p2p_fallback_to_go_neg = 0;
|
2012-04-26 16:13:03 +02:00
|
|
|
wpa_s->pending_pd_use = NORMAL_PD;
|
2014-12-10 15:25:18 +01:00
|
|
|
if (p2ps_prov && use == WPAS_P2P_PD_FOR_ASP) {
|
|
|
|
p2ps_prov->conncap = p2ps_group_capability(
|
2015-10-08 11:35:58 +02:00
|
|
|
wpa_s, P2PS_SETUP_NONE, p2ps_prov->role,
|
|
|
|
&p2ps_prov->force_freq, &p2ps_prov->pref_freq);
|
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: %s conncap: %d - ASP parsed: %x %x %d %s",
|
|
|
|
__func__, p2ps_prov->conncap,
|
|
|
|
p2ps_prov->adv_id, p2ps_prov->conncap,
|
|
|
|
p2ps_prov->status, p2ps_prov->info);
|
|
|
|
|
|
|
|
config_methods = 0;
|
|
|
|
} else if (os_strncmp(config_method, "display", 7) == 0)
|
2010-07-18 23:30:25 +02:00
|
|
|
config_methods = WPS_CONFIG_DISPLAY;
|
2011-12-06 20:28:02 +01:00
|
|
|
else if (os_strncmp(config_method, "keypad", 6) == 0)
|
2010-07-18 23:30:25 +02:00
|
|
|
config_methods = WPS_CONFIG_KEYPAD;
|
2011-12-06 20:28:02 +01:00
|
|
|
else if (os_strncmp(config_method, "pbc", 3) == 0 ||
|
|
|
|
os_strncmp(config_method, "pushbutton", 10) == 0)
|
2010-07-18 23:30:25 +02:00
|
|
|
config_methods = WPS_CONFIG_PUSHBUTTON;
|
2011-12-06 20:28:02 +01:00
|
|
|
else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Unknown config method");
|
2014-12-10 15:25:18 +01:00
|
|
|
os_free(p2ps_prov);
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
2011-12-06 20:28:02 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-04-26 16:13:03 +02:00
|
|
|
if (use == WPAS_P2P_PD_AUTO) {
|
|
|
|
os_memcpy(wpa_s->pending_join_dev_addr, peer_addr, ETH_ALEN);
|
|
|
|
wpa_s->pending_pd_config_methods = config_methods;
|
|
|
|
wpa_s->p2p_auto_pd = 1;
|
|
|
|
wpa_s->p2p_auto_join = 0;
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
2012-06-06 14:46:05 +02:00
|
|
|
wpa_s->auto_pd_scan_retry = 0;
|
2012-04-26 16:13:03 +02:00
|
|
|
wpas_p2p_stop_find(wpa_s);
|
|
|
|
wpa_s->p2p_join_scan_count = 0;
|
2013-12-16 21:08:28 +01:00
|
|
|
os_get_reltime(&wpa_s->p2p_auto_started);
|
2012-06-06 14:46:05 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Auto PD started at %ld.%06ld",
|
|
|
|
wpa_s->p2p_auto_started.sec,
|
|
|
|
wpa_s->p2p_auto_started.usec);
|
2012-04-26 16:13:03 +02:00
|
|
|
wpas_p2p_join_scan(wpa_s, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
if (wpa_s->global->p2p == NULL || wpa_s->global->p2p_disabled) {
|
|
|
|
os_free(p2ps_prov);
|
2010-07-18 23:30:25 +02:00
|
|
|
return -1;
|
2014-12-10 15:25:18 +01:00
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2014-12-10 15:25:18 +01:00
|
|
|
return p2p_prov_disc_req(wpa_s->global->p2p, peer_addr, p2ps_prov,
|
2012-04-26 16:13:03 +02:00
|
|
|
config_methods, use == WPAS_P2P_PD_FOR_JOIN,
|
2012-11-22 23:48:58 +01:00
|
|
|
0, 1);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
|
|
|
|
char *end)
|
|
|
|
{
|
|
|
|
return p2p_scan_result_text(ies, ies_len, buf, end);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-08-03 05:40:54 +02:00
|
|
|
static void wpas_p2p_clear_pending_action_tx(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2012-12-22 10:22:12 +01:00
|
|
|
if (!offchannel_pending_action_tx(wpa_s))
|
2010-08-03 05:40:54 +02:00
|
|
|
return;
|
|
|
|
|
2015-12-30 23:03:21 +01:00
|
|
|
if (wpa_s->p2p_send_action_work) {
|
2015-11-03 15:25:01 +01:00
|
|
|
wpas_p2p_free_send_action_work(wpa_s);
|
2015-12-30 23:03:21 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
offchannel_send_action_done(wpa_s);
|
|
|
|
}
|
2014-07-29 15:04:32 +02:00
|
|
|
|
2010-08-03 05:40:54 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Drop pending Action TX due to new "
|
|
|
|
"operation request");
|
2012-12-22 10:22:12 +01:00
|
|
|
offchannel_clear_pending_action_tx(wpa_s);
|
2010-08-03 05:40:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
int wpas_p2p_find(struct wpa_supplicant *wpa_s, unsigned int timeout,
|
2011-03-19 11:57:46 +01:00
|
|
|
enum p2p_discovery_type type,
|
2012-01-08 18:25:29 +01:00
|
|
|
unsigned int num_req_dev_types, const u8 *req_dev_types,
|
2014-09-05 16:27:20 +02:00
|
|
|
const u8 *dev_id, unsigned int search_delay,
|
2014-11-05 12:35:09 +01:00
|
|
|
u8 seek_cnt, const char **seek_string, int freq)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2010-08-03 05:40:54 +02:00
|
|
|
wpas_p2p_clear_pending_action_tx(wpa_s);
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-06-25 13:05:49 +02:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL ||
|
2017-06-13 13:50:51 +02:00
|
|
|
wpa_s->p2p_in_provisioning) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Reject p2p_find operation%s%s",
|
|
|
|
(wpa_s->global->p2p_disabled || !wpa_s->global->p2p) ?
|
|
|
|
" (P2P disabled)" : "",
|
|
|
|
wpa_s->p2p_in_provisioning ?
|
|
|
|
" (p2p_in_provisioning)" : "");
|
2011-02-24 20:13:30 +01:00
|
|
|
return -1;
|
2017-06-13 13:50:51 +02:00
|
|
|
}
|
2011-02-24 20:13:30 +01:00
|
|
|
|
2012-01-23 17:26:09 +01:00
|
|
|
wpa_supplicant_cancel_sched_scan(wpa_s);
|
|
|
|
|
2011-03-19 11:57:46 +01:00
|
|
|
return p2p_find(wpa_s->global->p2p, timeout, type,
|
2012-08-23 17:20:58 +02:00
|
|
|
num_req_dev_types, req_dev_types, dev_id,
|
2014-11-05 12:35:09 +01:00
|
|
|
search_delay, seek_cnt, seek_string, freq);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-30 16:21:52 +01:00
|
|
|
static void wpas_p2p_scan_res_ignore_search(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_scan_results *scan_res)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore scan results");
|
|
|
|
|
|
|
|
if (wpa_s->p2p_scan_work) {
|
|
|
|
struct wpa_radio_work *work = wpa_s->p2p_scan_work;
|
|
|
|
wpa_s->p2p_scan_work = NULL;
|
|
|
|
radio_work_done(work);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Indicate that results have been processed so that the P2P module can
|
|
|
|
* continue pending tasks.
|
|
|
|
*/
|
2020-12-08 11:53:56 +01:00
|
|
|
wpas_p2p_scan_res_handled(wpa_s);
|
2014-10-30 16:21:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-08-01 18:31:07 +02:00
|
|
|
static void wpas_p2p_stop_find_oper(struct wpa_supplicant *wpa_s)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2010-08-03 05:40:54 +02:00
|
|
|
wpas_p2p_clear_pending_action_tx(wpa_s);
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-11-19 11:58:03 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
|
2010-06-27 01:20:57 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p)
|
|
|
|
p2p_stop_find(wpa_s->global->p2p);
|
2014-10-30 16:21:52 +01:00
|
|
|
|
|
|
|
if (wpa_s->scan_res_handler == wpas_p2p_scan_res_handler) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Do not consider the scan results after stop_find");
|
|
|
|
wpa_s->scan_res_handler = wpas_p2p_scan_res_ignore_search;
|
|
|
|
}
|
2012-11-11 19:45:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_stop_find(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2014-08-01 18:31:07 +02:00
|
|
|
wpas_p2p_stop_find_oper(wpa_s);
|
2014-12-30 13:27:38 +01:00
|
|
|
if (!wpa_s->global->pending_group_iface_for_p2ps)
|
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_long_listen_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_listen(struct wpa_supplicant *wpa_s, unsigned int timeout)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2016-06-24 20:36:18 +02:00
|
|
|
if (wpa_s->p2p_lo_started) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Cannot start P2P listen, it is offloaded");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2012-01-23 17:26:09 +01:00
|
|
|
wpa_supplicant_cancel_sched_scan(wpa_s);
|
2010-08-03 05:40:54 +02:00
|
|
|
wpas_p2p_clear_pending_action_tx(wpa_s);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (timeout == 0) {
|
|
|
|
/*
|
|
|
|
* This is a request for unlimited Listen state. However, at
|
|
|
|
* least for now, this is mapped to a Listen state for one
|
|
|
|
* hour.
|
|
|
|
*/
|
|
|
|
timeout = 3600;
|
|
|
|
}
|
|
|
|
eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-11-17 15:21:11 +01:00
|
|
|
/*
|
|
|
|
* Stop previous find/listen operation to avoid trying to request a new
|
|
|
|
* remain-on-channel operation while the driver is still running the
|
|
|
|
* previous one.
|
|
|
|
*/
|
|
|
|
if (wpa_s->global->p2p)
|
|
|
|
p2p_stop_find(wpa_s->global->p2p);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
res = wpas_p2p_listen_start(wpa_s, timeout * 1000);
|
|
|
|
if (res == 0 && timeout * 1000 > wpa_s->max_remain_on_chan) {
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = timeout * 1000;
|
2010-07-18 23:30:25 +02:00
|
|
|
eloop_register_timeout(timeout, 0,
|
|
|
|
wpas_p2p_long_listen_timeout,
|
|
|
|
wpa_s, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-07-07 06:37:20 +02:00
|
|
|
int wpas_p2p_assoc_req_ie(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
2010-07-18 23:30:25 +02:00
|
|
|
u8 *buf, size_t len, int p2p_group)
|
|
|
|
{
|
2010-07-07 06:37:20 +02:00
|
|
|
struct wpabuf *p2p_ie;
|
|
|
|
int ret;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return -1;
|
2015-05-09 11:25:03 +02:00
|
|
|
/*
|
|
|
|
* Advertize mandatory cross connection capability even on
|
|
|
|
* p2p_disabled=1 interface when associating with a P2P Manager WLAN AP.
|
|
|
|
*/
|
|
|
|
if (wpa_s->conf->p2p_disabled && p2p_group)
|
2014-09-02 07:03:44 +02:00
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
2010-07-30 01:09:38 +02:00
|
|
|
if (bss == NULL)
|
|
|
|
return -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2010-07-07 06:37:20 +02:00
|
|
|
p2p_ie = wpa_bss_get_vendor_ie_multi(bss, P2P_IE_VENDOR_TYPE);
|
|
|
|
ret = p2p_assoc_req_ie(wpa_s->global->p2p, bss->bssid, buf, len,
|
|
|
|
p2p_group, p2p_ie);
|
|
|
|
wpabuf_free(p2p_ie);
|
|
|
|
|
|
|
|
return ret;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_probe_req_rx(struct wpa_supplicant *wpa_s, const u8 *addr,
|
2011-07-15 19:25:53 +02:00
|
|
|
const u8 *dst, const u8 *bssid,
|
2015-06-10 10:43:31 +02:00
|
|
|
const u8 *ie, size_t ie_len,
|
|
|
|
unsigned int rx_freq, int ssi_signal)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return 0;
|
|
|
|
if (wpa_s->global->p2p == NULL)
|
|
|
|
return 0;
|
|
|
|
|
2012-04-01 20:13:38 +02:00
|
|
|
switch (p2p_probe_req_rx(wpa_s->global->p2p, addr, dst, bssid,
|
2016-06-24 20:36:18 +02:00
|
|
|
ie, ie_len, rx_freq, wpa_s->p2p_lo_started)) {
|
2012-04-01 20:13:38 +02:00
|
|
|
case P2P_PREQ_NOT_P2P:
|
|
|
|
wpas_notify_preq(wpa_s, addr, dst, bssid, ie, ie_len,
|
|
|
|
ssi_signal);
|
|
|
|
/* fall through */
|
|
|
|
case P2P_PREQ_MALFORMED:
|
|
|
|
case P2P_PREQ_NOT_LISTEN:
|
|
|
|
case P2P_PREQ_NOT_PROCESSED:
|
|
|
|
default: /* make gcc happy */
|
|
|
|
return 0;
|
|
|
|
case P2P_PREQ_PROCESSED:
|
|
|
|
return 1;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
|
|
|
|
const u8 *sa, const u8 *bssid,
|
|
|
|
u8 category, const u8 *data, size_t len, int freq)
|
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return;
|
|
|
|
if (wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
p2p_rx_action(wpa_s->global->p2p, da, sa, bssid, category, data, len,
|
|
|
|
freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies)
|
|
|
|
{
|
2016-02-20 15:45:58 +01:00
|
|
|
unsigned int bands;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return;
|
|
|
|
if (wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
2016-02-20 15:45:58 +01:00
|
|
|
bands = wpas_get_bands(wpa_s, NULL);
|
|
|
|
p2p_scan_ie(wpa_s->global->p2p, ies, NULL, bands);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-15 18:31:53 +02:00
|
|
|
static void wpas_p2p_group_deinit(struct wpa_supplicant *wpa_s)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
p2p_group_deinit(wpa_s->p2p_group);
|
|
|
|
wpa_s->p2p_group = NULL;
|
2011-10-12 20:06:39 +02:00
|
|
|
|
|
|
|
wpa_s->ap_configured_cb = NULL;
|
|
|
|
wpa_s->ap_configured_cb_ctx = NULL;
|
|
|
|
wpa_s->ap_configured_cb_data = NULL;
|
|
|
|
wpa_s->connect_without_scan = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_reject(struct wpa_supplicant *wpa_s, const u8 *addr)
|
|
|
|
{
|
2020-01-04 22:11:28 +01:00
|
|
|
wpa_s->global->p2p_long_listen = 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_reject(wpa_s->global->p2p, addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Invite to reinvoke a persistent group */
|
|
|
|
int wpas_p2p_invite(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
|
2012-08-31 20:20:51 +02:00
|
|
|
struct wpa_ssid *ssid, const u8 *go_dev_addr, int freq,
|
2015-10-28 22:14:10 +01:00
|
|
|
int vht_center_freq2, int ht40, int vht, int max_chwidth,
|
2019-10-17 19:44:14 +02:00
|
|
|
int pref_freq, int he, int edmg)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
|
|
|
enum p2p_invite_role role;
|
2013-07-21 19:38:53 +02:00
|
|
|
u8 *bssid = NULL;
|
|
|
|
int force_freq = 0;
|
2013-02-25 18:30:14 +01:00
|
|
|
int res;
|
2013-11-19 11:26:16 +01:00
|
|
|
int no_pref_freq_given = pref_freq == 0;
|
2015-07-24 02:39:45 +02:00
|
|
|
unsigned int pref_freq_list[P2P_MAX_PREF_CHANNELS], size;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2013-03-15 15:31:31 +01:00
|
|
|
wpa_s->global->p2p_invite_group = NULL;
|
2013-03-01 20:32:33 +01:00
|
|
|
if (peer_addr)
|
|
|
|
os_memcpy(wpa_s->p2p_auth_invite, peer_addr, ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memset(wpa_s->p2p_auth_invite, 0, ETH_ALEN);
|
|
|
|
|
2012-08-31 20:20:51 +02:00
|
|
|
wpa_s->p2p_persistent_go_freq = freq;
|
|
|
|
wpa_s->p2p_go_ht40 = !!ht40;
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht = !!vht;
|
2018-12-21 19:20:28 +01:00
|
|
|
wpa_s->p2p_go_he = !!he;
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_max_oper_chwidth = max_chwidth;
|
|
|
|
wpa_s->p2p_go_vht_center_freq2 = vht_center_freq2;
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_edmg = !!edmg;
|
2010-07-18 23:30:25 +02:00
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
role = P2P_INVITE_ROLE_GO;
|
|
|
|
if (peer_addr == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Missing peer "
|
|
|
|
"address in invitation command");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (wpas_p2p_create_iface(wpa_s)) {
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s,
|
|
|
|
WPA_IF_P2P_GO) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to "
|
|
|
|
"allocate a new interface for the "
|
|
|
|
"group");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
bssid = wpa_s->pending_interface_addr;
|
2016-01-24 16:36:49 +01:00
|
|
|
} else if (wpa_s->p2p_mgmt)
|
|
|
|
bssid = wpa_s->parent->own_addr;
|
|
|
|
else
|
2010-07-18 23:30:25 +02:00
|
|
|
bssid = wpa_s->own_addr;
|
|
|
|
} else {
|
|
|
|
role = P2P_INVITE_ROLE_CLIENT;
|
|
|
|
peer_addr = ssid->bssid;
|
|
|
|
}
|
|
|
|
wpa_s->pending_invite_ssid_id = ssid->id;
|
|
|
|
|
2015-07-24 02:39:45 +02:00
|
|
|
size = P2P_MAX_PREF_CHANNELS;
|
2013-10-22 20:00:49 +02:00
|
|
|
res = wpas_p2p_setup_freqs(wpa_s, freq, &force_freq, &pref_freq,
|
2015-07-24 02:39:45 +02:00
|
|
|
role == P2P_INVITE_ROLE_GO,
|
|
|
|
pref_freq_list, &size);
|
2013-02-25 18:30:14 +01:00
|
|
|
if (res)
|
|
|
|
return res;
|
2013-02-25 17:41:32 +01:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2015-12-10 11:56:02 +01:00
|
|
|
p2p_set_own_pref_freq_list(wpa_s->global->p2p, pref_freq_list, size);
|
|
|
|
|
2013-11-19 11:26:16 +01:00
|
|
|
if (wpa_s->parent->conf->p2p_ignore_shared_freq &&
|
|
|
|
no_pref_freq_given && pref_freq > 0 &&
|
|
|
|
wpa_s->num_multichan_concurrent > 1 &&
|
|
|
|
wpas_p2p_num_unused_channels(wpa_s) > 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz for invitation due to p2p_ignore_shared_freq=1 configuration",
|
|
|
|
pref_freq);
|
|
|
|
pref_freq = 0;
|
|
|
|
}
|
|
|
|
|
2015-01-19 02:44:12 +01:00
|
|
|
/*
|
|
|
|
* Stop any find/listen operations before invitation and possibly
|
|
|
|
* connection establishment.
|
|
|
|
*/
|
|
|
|
wpas_p2p_stop_find_oper(wpa_s);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_invite(wpa_s->global->p2p, peer_addr, role, bssid,
|
2013-02-25 17:41:32 +01:00
|
|
|
ssid->ssid, ssid->ssid_len, force_freq, go_dev_addr,
|
2013-09-08 18:45:04 +02:00
|
|
|
1, pref_freq, -1);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Invite to join an active group */
|
|
|
|
int wpas_p2p_invite_group(struct wpa_supplicant *wpa_s, const char *ifname,
|
|
|
|
const u8 *peer_addr, const u8 *go_dev_addr)
|
|
|
|
{
|
|
|
|
struct wpa_global *global = wpa_s->global;
|
|
|
|
enum p2p_invite_role role;
|
2013-07-21 19:38:53 +02:00
|
|
|
u8 *bssid = NULL;
|
2010-07-18 23:30:25 +02:00
|
|
|
struct wpa_ssid *ssid;
|
2012-02-06 20:54:36 +01:00
|
|
|
int persistent;
|
2013-10-20 17:33:17 +02:00
|
|
|
int freq = 0, force_freq = 0, pref_freq = 0;
|
2013-02-25 18:30:14 +01:00
|
|
|
int res;
|
2015-07-24 02:39:45 +02:00
|
|
|
unsigned int pref_freq_list[P2P_MAX_PREF_CHANNELS], size;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-08-31 20:20:51 +02:00
|
|
|
wpa_s->p2p_persistent_go_freq = 0;
|
|
|
|
wpa_s->p2p_go_ht40 = 0;
|
2013-10-27 18:46:17 +01:00
|
|
|
wpa_s->p2p_go_vht = 0;
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht_center_freq2 = 0;
|
|
|
|
wpa_s->p2p_go_max_oper_chwidth = 0;
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_edmg = 0;
|
2012-08-31 20:20:51 +02:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (os_strcmp(wpa_s->ifname, ifname) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (wpa_s == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Interface '%s' not found", ifname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
if (ssid == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No current SSID to use for "
|
|
|
|
"invitation");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-03-15 15:31:31 +01:00
|
|
|
wpa_s->global->p2p_invite_group = wpa_s;
|
2012-02-06 20:54:36 +01:00
|
|
|
persistent = ssid->p2p_persistent_group &&
|
2016-01-24 16:36:49 +01:00
|
|
|
wpas_p2p_get_persistent(wpa_s->p2pdev, peer_addr,
|
2012-02-06 20:54:36 +01:00
|
|
|
ssid->ssid, ssid->ssid_len);
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GO) {
|
|
|
|
role = P2P_INVITE_ROLE_ACTIVE_GO;
|
|
|
|
bssid = wpa_s->own_addr;
|
|
|
|
if (go_dev_addr == NULL)
|
2011-12-25 22:58:03 +01:00
|
|
|
go_dev_addr = wpa_s->global->p2p_dev_addr;
|
2013-10-20 17:33:17 +02:00
|
|
|
freq = ssid->frequency;
|
2010-07-18 23:30:25 +02:00
|
|
|
} else {
|
|
|
|
role = P2P_INVITE_ROLE_CLIENT;
|
|
|
|
if (wpa_s->wpa_state < WPA_ASSOCIATED) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Not associated - cannot "
|
|
|
|
"invite to current group");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
bssid = wpa_s->bssid;
|
|
|
|
if (go_dev_addr == NULL &&
|
|
|
|
!is_zero_ether_addr(wpa_s->go_dev_addr))
|
|
|
|
go_dev_addr = wpa_s->go_dev_addr;
|
2013-10-20 17:33:17 +02:00
|
|
|
freq = wpa_s->current_bss ? wpa_s->current_bss->freq :
|
|
|
|
(int) wpa_s->assoc_freq;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev->pending_invite_ssid_id = -1;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2015-07-24 02:39:45 +02:00
|
|
|
size = P2P_MAX_PREF_CHANNELS;
|
2013-10-22 20:00:49 +02:00
|
|
|
res = wpas_p2p_setup_freqs(wpa_s, freq, &force_freq, &pref_freq,
|
2015-07-24 02:39:45 +02:00
|
|
|
role == P2P_INVITE_ROLE_ACTIVE_GO,
|
|
|
|
pref_freq_list, &size);
|
2013-02-25 18:30:14 +01:00
|
|
|
if (res)
|
|
|
|
return res;
|
2013-07-21 19:38:53 +02:00
|
|
|
wpas_p2p_set_own_freq_preference(wpa_s, force_freq);
|
2013-02-25 17:41:32 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_invite(wpa_s->global->p2p, peer_addr, role, bssid,
|
2013-02-25 17:41:32 +01:00
|
|
|
ssid->ssid, ssid->ssid_len, force_freq,
|
2013-09-08 18:45:04 +02:00
|
|
|
go_dev_addr, persistent, pref_freq, -1);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_completed(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
int persistent;
|
2011-10-28 21:26:30 +02:00
|
|
|
int freq;
|
2019-04-15 19:27:52 +02:00
|
|
|
u8 ip[3 * 4], *ip_ptr = NULL;
|
2013-03-16 18:13:31 +01:00
|
|
|
char ip_addr[100];
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-06-08 17:22:03 +02:00
|
|
|
if (ssid == NULL || ssid->mode != WPAS_MODE_P2P_GROUP_FORMATION) {
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2012-06-08 17:22:03 +02:00
|
|
|
}
|
2012-04-13 16:01:15 +02:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (!wpa_s->show_group_started || !ssid)
|
2014-01-03 10:57:57 +01:00
|
|
|
return;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
wpa_s->show_group_started = 0;
|
2015-11-30 20:35:16 +01:00
|
|
|
if (!wpa_s->p2p_go_group_formation_completed &&
|
|
|
|
wpa_s->global->p2p_group_formation == wpa_s) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Marking group formation completed on client on data connection");
|
|
|
|
wpa_s->p2p_go_group_formation_completed = 1;
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
|
|
|
wpa_s->p2p_in_invitation = 0;
|
|
|
|
}
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
os_memset(go_dev_addr, 0, ETH_ALEN);
|
|
|
|
if (ssid->bssid_set)
|
|
|
|
os_memcpy(go_dev_addr, ssid->bssid, ETH_ALEN);
|
|
|
|
persistent = wpas_p2p_persistent_group(wpa_s, go_dev_addr, ssid->ssid,
|
|
|
|
ssid->ssid_len);
|
|
|
|
os_memcpy(wpa_s->go_dev_addr, go_dev_addr, ETH_ALEN);
|
|
|
|
|
2010-11-04 10:59:44 +01:00
|
|
|
if (wpa_s->global->p2p_group_formation == wpa_s)
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
|
|
|
|
2011-10-28 21:26:30 +02:00
|
|
|
freq = wpa_s->current_bss ? wpa_s->current_bss->freq :
|
|
|
|
(int) wpa_s->assoc_freq;
|
2013-03-16 18:13:31 +01:00
|
|
|
|
|
|
|
ip_addr[0] = '\0';
|
|
|
|
if (wpa_sm_get_p2p_ip_addr(wpa_s->wpa, ip) == 0) {
|
2014-12-06 20:40:31 +01:00
|
|
|
int res;
|
|
|
|
|
|
|
|
res = os_snprintf(ip_addr, sizeof(ip_addr),
|
|
|
|
" ip_addr=%u.%u.%u.%u "
|
|
|
|
"ip_mask=%u.%u.%u.%u go_ip_addr=%u.%u.%u.%u",
|
|
|
|
ip[0], ip[1], ip[2], ip[3],
|
|
|
|
ip[4], ip[5], ip[6], ip[7],
|
|
|
|
ip[8], ip[9], ip[10], ip[11]);
|
|
|
|
if (os_snprintf_error(sizeof(ip_addr), res))
|
|
|
|
ip_addr[0] = '\0';
|
2019-04-15 19:27:52 +02:00
|
|
|
ip_ptr = ip;
|
2013-03-16 18:13:31 +01:00
|
|
|
}
|
|
|
|
|
2014-07-26 12:09:17 +02:00
|
|
|
wpas_p2p_group_started(wpa_s, 0, ssid, freq,
|
|
|
|
ssid->passphrase == NULL && ssid->psk_set ?
|
|
|
|
ssid->psk : NULL,
|
|
|
|
ssid->passphrase, go_dev_addr, persistent,
|
|
|
|
ip_addr);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
|
|
|
if (persistent)
|
2016-05-30 09:38:31 +02:00
|
|
|
wpas_p2p_store_persistent_group(wpa_s->p2pdev,
|
|
|
|
ssid, go_dev_addr);
|
|
|
|
|
2019-04-15 19:27:52 +02:00
|
|
|
wpas_notify_p2p_group_started(wpa_s, ssid, persistent, 1, ip_ptr);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_presence_req(struct wpa_supplicant *wpa_s, u32 duration1,
|
|
|
|
u32 interval1, u32 duration2, u32 interval2)
|
|
|
|
{
|
2014-01-01 17:44:44 +01:00
|
|
|
int ret;
|
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
2010-12-30 11:48:55 +01:00
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->wpa_state < WPA_ASSOCIATED ||
|
|
|
|
wpa_s->current_ssid == NULL ||
|
|
|
|
wpa_s->current_ssid->mode != WPAS_MODE_INFRA)
|
|
|
|
return -1;
|
|
|
|
|
2014-01-01 17:44:44 +01:00
|
|
|
ret = p2p_presence_req(wpa_s->global->p2p, wpa_s->bssid,
|
|
|
|
wpa_s->own_addr, wpa_s->assoc_freq,
|
|
|
|
duration1, interval1, duration2, interval2);
|
|
|
|
if (ret == 0)
|
|
|
|
wpa_s->waiting_presence_resp = 1;
|
|
|
|
|
|
|
|
return ret;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_ext_listen(struct wpa_supplicant *wpa_s, unsigned int period,
|
|
|
|
unsigned int interval)
|
|
|
|
{
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
return p2p_ext_listen(wpa_s->global->p2p, period, interval);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-18 21:21:22 +01:00
|
|
|
static int wpas_p2p_is_client(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2012-10-28 20:37:15 +01:00
|
|
|
if (wpa_s->current_ssid == NULL) {
|
|
|
|
/*
|
2012-11-11 15:09:36 +01:00
|
|
|
* current_ssid can be cleared when P2P client interface gets
|
2012-10-28 20:37:15 +01:00
|
|
|
* disconnected, so assume this interface was used as P2P
|
|
|
|
* client.
|
|
|
|
*/
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return wpa_s->current_ssid->p2p_group &&
|
2011-12-18 21:21:22 +01:00
|
|
|
wpa_s->current_ssid->mode == WPAS_MODE_INFRA;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-10-25 17:24:15 +02:00
|
|
|
static void wpas_p2p_group_idle_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
|
2011-12-18 21:21:22 +01:00
|
|
|
if (wpa_s->conf->p2p_group_idle == 0 && !wpas_p2p_is_client(wpa_s)) {
|
2010-10-25 17:24:15 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore group idle timeout - "
|
|
|
|
"disabled");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Group idle timeout reached - terminate "
|
|
|
|
"group");
|
2012-08-11 11:41:31 +02:00
|
|
|
wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_IDLE_TIMEOUT);
|
2010-10-25 17:24:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_set_group_idle_timeout(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2012-04-13 16:03:27 +02:00
|
|
|
int timeout;
|
2011-12-18 21:21:22 +01:00
|
|
|
|
2012-02-19 17:16:34 +01:00
|
|
|
if (eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
|
|
|
|
|
2011-12-18 21:21:22 +01:00
|
|
|
if (wpa_s->current_ssid == NULL || !wpa_s->current_ssid->p2p_group)
|
2010-10-25 17:24:15 +02:00
|
|
|
return;
|
|
|
|
|
2011-12-18 21:21:22 +01:00
|
|
|
timeout = wpa_s->conf->p2p_group_idle;
|
|
|
|
if (wpa_s->current_ssid->mode == WPAS_MODE_INFRA &&
|
|
|
|
(timeout == 0 || timeout > P2P_MAX_CLIENT_IDLE))
|
|
|
|
timeout = P2P_MAX_CLIENT_IDLE;
|
|
|
|
|
|
|
|
if (timeout == 0)
|
2010-10-25 17:24:15 +02:00
|
|
|
return;
|
|
|
|
|
2012-04-13 16:03:27 +02:00
|
|
|
if (timeout < 0) {
|
|
|
|
if (wpa_s->current_ssid->mode == WPAS_MODE_INFRA)
|
|
|
|
timeout = 0; /* special client mode no-timeout */
|
|
|
|
else
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-03-27 17:04:06 +02:00
|
|
|
if (wpa_s->p2p_in_provisioning) {
|
|
|
|
/*
|
|
|
|
* Use the normal group formation timeout during the
|
|
|
|
* provisioning phase to avoid terminating this process too
|
|
|
|
* early due to group idle timeout.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Do not use P2P group idle timeout "
|
|
|
|
"during provisioning");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-04-13 16:01:15 +02:00
|
|
|
if (wpa_s->show_group_started) {
|
|
|
|
/*
|
|
|
|
* Use the normal group formation timeout between the end of
|
|
|
|
* the provisioning phase and completion of 4-way handshake to
|
|
|
|
* avoid terminating this process too early due to group idle
|
|
|
|
* timeout.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Do not use P2P group idle timeout "
|
|
|
|
"while waiting for initial 4-way handshake to "
|
|
|
|
"complete");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-10-25 17:24:15 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Set P2P group idle timeout to %u seconds",
|
2011-12-18 21:21:22 +01:00
|
|
|
timeout);
|
|
|
|
eloop_register_timeout(timeout, 0, wpas_p2p_group_idle_timeout,
|
|
|
|
wpa_s, NULL);
|
2010-10-25 17:24:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-31 21:04:41 +02:00
|
|
|
/* Returns 1 if the interface was removed */
|
|
|
|
int wpas_p2p_deauth_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
|
|
|
|
u16 reason_code, const u8 *ie, size_t ie_len,
|
|
|
|
int locally_generated)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
2012-08-31 21:04:41 +02:00
|
|
|
return 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2012-04-03 15:43:06 +02:00
|
|
|
if (!locally_generated)
|
|
|
|
p2p_deauth_notif(wpa_s->global->p2p, bssid, reason_code, ie,
|
|
|
|
ie_len);
|
|
|
|
|
|
|
|
if (reason_code == WLAN_REASON_DEAUTH_LEAVING && !locally_generated &&
|
|
|
|
wpa_s->current_ssid &&
|
|
|
|
wpa_s->current_ssid->p2p_group &&
|
|
|
|
wpa_s->current_ssid->mode == WPAS_MODE_INFRA) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: GO indicated that the P2P Group "
|
|
|
|
"session is ending");
|
2012-08-31 21:04:41 +02:00
|
|
|
if (wpas_p2p_group_delete(wpa_s,
|
|
|
|
P2P_GROUP_REMOVAL_GO_ENDING_SESSION)
|
|
|
|
> 0)
|
|
|
|
return 1;
|
2012-04-03 15:43:06 +02:00
|
|
|
}
|
2012-08-31 21:04:41 +02:00
|
|
|
|
|
|
|
return 0;
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_disassoc_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
|
2012-04-03 15:43:06 +02:00
|
|
|
u16 reason_code, const u8 *ie, size_t ie_len,
|
|
|
|
int locally_generated)
|
2010-07-18 23:30:25 +02:00
|
|
|
{
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
2010-07-18 23:30:25 +02:00
|
|
|
return;
|
|
|
|
|
2012-04-03 15:43:06 +02:00
|
|
|
if (!locally_generated)
|
|
|
|
p2p_disassoc_notif(wpa_s->global->p2p, bssid, reason_code, ie,
|
|
|
|
ie_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_update_config(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct p2p_data *p2p = wpa_s->global->p2p;
|
|
|
|
|
|
|
|
if (p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
2010-09-07 16:08:52 +02:00
|
|
|
if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE))
|
|
|
|
return;
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_DEVICE_NAME)
|
|
|
|
p2p_set_dev_name(p2p, wpa_s->conf->device_name);
|
|
|
|
|
2011-03-17 17:50:22 +01:00
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_DEVICE_TYPE)
|
|
|
|
p2p_set_pri_dev_type(p2p, wpa_s->conf->device_type);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-03-28 14:24:12 +02:00
|
|
|
if (wpa_s->wps &&
|
|
|
|
(wpa_s->conf->changed_parameters & CFG_CHANGED_CONFIG_METHODS))
|
|
|
|
p2p_set_config_methods(p2p, wpa_s->wps->config_methods);
|
|
|
|
|
|
|
|
if (wpa_s->wps && (wpa_s->conf->changed_parameters & CFG_CHANGED_UUID))
|
|
|
|
p2p_set_uuid(p2p, wpa_s->wps->uuid);
|
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_WPS_STRING) {
|
|
|
|
p2p_set_manufacturer(p2p, wpa_s->conf->manufacturer);
|
|
|
|
p2p_set_model_name(p2p, wpa_s->conf->model_name);
|
|
|
|
p2p_set_model_number(p2p, wpa_s->conf->model_number);
|
|
|
|
p2p_set_serial_number(p2p, wpa_s->conf->serial_number);
|
|
|
|
}
|
|
|
|
|
2011-03-17 17:50:22 +01:00
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_SEC_DEVICE_TYPE)
|
|
|
|
p2p_set_sec_dev_types(p2p,
|
|
|
|
(void *) wpa_s->conf->sec_device_type,
|
|
|
|
wpa_s->conf->num_sec_device_types);
|
2010-07-18 23:30:25 +02:00
|
|
|
|
2011-03-19 10:57:10 +01:00
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_VENDOR_EXTENSION) {
|
|
|
|
int i;
|
|
|
|
p2p_remove_wps_vendor_extensions(p2p);
|
|
|
|
for (i = 0; i < MAX_WPS_VENDOR_EXT; i++) {
|
|
|
|
if (wpa_s->conf->wps_vendor_ext[i] == NULL)
|
|
|
|
continue;
|
|
|
|
p2p_add_wps_vendor_extension(
|
|
|
|
p2p, wpa_s->conf->wps_vendor_ext[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
if ((wpa_s->conf->changed_parameters & CFG_CHANGED_COUNTRY) &&
|
|
|
|
wpa_s->conf->country[0] && wpa_s->conf->country[1]) {
|
|
|
|
char country[3];
|
|
|
|
country[0] = wpa_s->conf->country[0];
|
|
|
|
country[1] = wpa_s->conf->country[1];
|
|
|
|
country[2] = 0x04;
|
|
|
|
p2p_set_country(p2p, country);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_SSID_POSTFIX) {
|
|
|
|
p2p_set_ssid_postfix(p2p, (u8 *) wpa_s->conf->p2p_ssid_postfix,
|
|
|
|
wpa_s->conf->p2p_ssid_postfix ?
|
|
|
|
os_strlen(wpa_s->conf->p2p_ssid_postfix) :
|
|
|
|
0);
|
|
|
|
}
|
2010-09-08 20:18:10 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_INTRA_BSS)
|
|
|
|
p2p_set_intra_bss_dist(p2p, wpa_s->conf->p2p_intra_bss);
|
2011-06-25 11:08:43 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_LISTEN_CHANNEL) {
|
|
|
|
u8 reg_class, channel;
|
|
|
|
int ret;
|
|
|
|
unsigned int r;
|
2014-05-19 09:05:39 +02:00
|
|
|
u8 channel_forced;
|
|
|
|
|
2011-06-25 11:08:43 +02:00
|
|
|
if (wpa_s->conf->p2p_listen_reg_class &&
|
|
|
|
wpa_s->conf->p2p_listen_channel) {
|
|
|
|
reg_class = wpa_s->conf->p2p_listen_reg_class;
|
|
|
|
channel = wpa_s->conf->p2p_listen_channel;
|
2014-05-19 09:05:39 +02:00
|
|
|
channel_forced = 1;
|
2011-06-25 11:08:43 +02:00
|
|
|
} else {
|
|
|
|
reg_class = 81;
|
|
|
|
/*
|
|
|
|
* Pick one of the social channels randomly as the
|
|
|
|
* listen channel.
|
|
|
|
*/
|
2014-09-13 15:27:52 +02:00
|
|
|
if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
|
|
|
channel = 1;
|
|
|
|
else
|
|
|
|
channel = 1 + (r % 3) * 5;
|
2014-05-19 09:05:39 +02:00
|
|
|
channel_forced = 0;
|
2011-06-25 11:08:43 +02:00
|
|
|
}
|
2014-05-19 09:05:39 +02:00
|
|
|
ret = p2p_set_listen_channel(p2p, reg_class, channel,
|
|
|
|
channel_forced);
|
2011-06-25 11:08:43 +02:00
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Own listen channel update "
|
|
|
|
"failed: %d", ret);
|
|
|
|
}
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_OPER_CHANNEL) {
|
|
|
|
u8 op_reg_class, op_channel, cfg_op_channel;
|
|
|
|
int ret = 0;
|
|
|
|
unsigned int r;
|
|
|
|
if (wpa_s->conf->p2p_oper_reg_class &&
|
|
|
|
wpa_s->conf->p2p_oper_channel) {
|
|
|
|
op_reg_class = wpa_s->conf->p2p_oper_reg_class;
|
|
|
|
op_channel = wpa_s->conf->p2p_oper_channel;
|
|
|
|
cfg_op_channel = 1;
|
|
|
|
} else {
|
|
|
|
op_reg_class = 81;
|
|
|
|
/*
|
|
|
|
* Use random operation channel from (1, 6, 11)
|
|
|
|
*if no other preference is indicated.
|
|
|
|
*/
|
2014-09-13 15:27:52 +02:00
|
|
|
if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
|
|
|
op_channel = 1;
|
|
|
|
else
|
|
|
|
op_channel = 1 + (r % 3) * 5;
|
2011-06-25 11:08:43 +02:00
|
|
|
cfg_op_channel = 0;
|
|
|
|
}
|
|
|
|
ret = p2p_set_oper_channel(p2p, op_reg_class, op_channel,
|
|
|
|
cfg_op_channel);
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Own oper channel update "
|
|
|
|
"failed: %d", ret);
|
|
|
|
}
|
2012-03-29 20:28:34 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_PREF_CHAN) {
|
|
|
|
if (p2p_set_pref_chan(p2p, wpa_s->conf->num_p2p_pref_chan,
|
|
|
|
wpa_s->conf->p2p_pref_chan) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Preferred channel list "
|
|
|
|
"update failed");
|
|
|
|
}
|
2013-10-22 18:45:46 +02:00
|
|
|
|
|
|
|
if (p2p_set_no_go_freq(p2p, &wpa_s->conf->p2p_no_go_freq) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: No GO channel list "
|
|
|
|
"update failed");
|
|
|
|
}
|
2012-03-29 20:28:34 +02:00
|
|
|
}
|
2014-06-21 23:15:53 +02:00
|
|
|
|
|
|
|
if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_PASSPHRASE_LEN)
|
|
|
|
p2p_set_passphrase_len(p2p, wpa_s->conf->p2p_passphrase_len);
|
2010-07-18 23:30:25 +02:00
|
|
|
}
|
2010-07-09 02:14:24 +02:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_set_noa(struct wpa_supplicant *wpa_s, u8 count, int start,
|
|
|
|
int duration)
|
|
|
|
{
|
|
|
|
if (!wpa_s->ap_iface)
|
|
|
|
return -1;
|
|
|
|
return hostapd_p2p_set_noa(wpa_s->ap_iface->bss[0], count, start,
|
|
|
|
duration);
|
|
|
|
}
|
2010-07-10 19:19:34 +02:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_set_cross_connect(struct wpa_supplicant *wpa_s, int enabled)
|
|
|
|
{
|
2011-02-24 20:13:30 +01:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
2010-07-10 19:19:34 +02:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_s->global->cross_connection = enabled;
|
|
|
|
p2p_set_cross_connect(wpa_s->global->p2p, enabled);
|
|
|
|
|
|
|
|
if (!enabled) {
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next)
|
|
|
|
{
|
|
|
|
if (iface->cross_connect_enabled == 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
iface->cross_connect_enabled = 0;
|
|
|
|
iface->cross_connect_in_use = 0;
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(iface->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_CROSS_CONNECT_DISABLE "%s %s",
|
|
|
|
iface->ifname,
|
|
|
|
iface->cross_connect_uplink);
|
2010-07-10 19:19:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_enable_cross_connect(struct wpa_supplicant *uplink)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
|
|
|
if (!uplink->global->cross_connection)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (iface = uplink->global->ifaces; iface; iface = iface->next) {
|
|
|
|
if (!iface->cross_connect_enabled)
|
|
|
|
continue;
|
|
|
|
if (os_strcmp(uplink->ifname, iface->cross_connect_uplink) !=
|
|
|
|
0)
|
|
|
|
continue;
|
|
|
|
if (iface->ap_iface == NULL)
|
|
|
|
continue;
|
|
|
|
if (iface->cross_connect_in_use)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
iface->cross_connect_in_use = 1;
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(iface->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_CROSS_CONNECT_ENABLE "%s %s",
|
|
|
|
iface->ifname, iface->cross_connect_uplink);
|
2010-07-10 19:19:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_disable_cross_connect(struct wpa_supplicant *uplink)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
|
|
|
for (iface = uplink->global->ifaces; iface; iface = iface->next) {
|
|
|
|
if (!iface->cross_connect_enabled)
|
|
|
|
continue;
|
|
|
|
if (os_strcmp(uplink->ifname, iface->cross_connect_uplink) !=
|
|
|
|
0)
|
|
|
|
continue;
|
|
|
|
if (!iface->cross_connect_in_use)
|
|
|
|
continue;
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(iface->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_CROSS_CONNECT_DISABLE "%s %s",
|
|
|
|
iface->ifname, iface->cross_connect_uplink);
|
2010-07-10 19:19:34 +02:00
|
|
|
iface->cross_connect_in_use = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_notif_connected(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->ap_iface || wpa_s->current_ssid == NULL ||
|
|
|
|
wpa_s->current_ssid->mode != WPAS_MODE_INFRA ||
|
|
|
|
wpa_s->cross_connect_disallowed)
|
|
|
|
wpas_p2p_disable_cross_connect(wpa_s);
|
|
|
|
else
|
|
|
|
wpas_p2p_enable_cross_connect(wpa_s);
|
2012-02-19 17:16:34 +01:00
|
|
|
if (!wpa_s->ap_iface &&
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
|
2010-07-10 19:19:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_notif_disconnected(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
wpas_p2p_disable_cross_connect(wpa_s);
|
2011-12-18 21:18:42 +01:00
|
|
|
if (!wpa_s->ap_iface &&
|
|
|
|
!eloop_is_timeout_registered(wpas_p2p_group_idle_timeout,
|
|
|
|
wpa_s, NULL))
|
2010-10-25 17:24:15 +02:00
|
|
|
wpas_p2p_set_group_idle_timeout(wpa_s);
|
2010-07-10 19:19:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_cross_connect_setup(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
|
|
|
if (!wpa_s->global->cross_connection)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
|
|
|
|
if (iface == wpa_s)
|
|
|
|
continue;
|
|
|
|
if (iface->drv_flags &
|
|
|
|
WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE)
|
|
|
|
continue;
|
2014-12-10 00:54:27 +01:00
|
|
|
if ((iface->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE) &&
|
|
|
|
iface != wpa_s->parent)
|
2010-07-10 19:19:34 +02:00
|
|
|
continue;
|
|
|
|
|
|
|
|
wpa_s->cross_connect_enabled = 1;
|
|
|
|
os_strlcpy(wpa_s->cross_connect_uplink, iface->ifname,
|
|
|
|
sizeof(wpa_s->cross_connect_uplink));
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Enable cross connection from "
|
|
|
|
"%s to %s whenever uplink is available",
|
|
|
|
wpa_s->ifname, wpa_s->cross_connect_uplink);
|
|
|
|
|
|
|
|
if (iface->ap_iface || iface->current_ssid == NULL ||
|
|
|
|
iface->current_ssid->mode != WPAS_MODE_INFRA ||
|
|
|
|
iface->cross_connect_disallowed ||
|
|
|
|
iface->wpa_state != WPA_COMPLETED)
|
|
|
|
break;
|
|
|
|
|
|
|
|
wpa_s->cross_connect_in_use = 1;
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-05-18 17:59:51 +02:00
|
|
|
P2P_EVENT_CROSS_CONNECT_ENABLE "%s %s",
|
|
|
|
wpa_s->ifname, wpa_s->cross_connect_uplink);
|
2010-07-10 19:19:34 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2010-09-07 12:42:55 +02:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_notif_pbc_overlap(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->p2p_group_interface != P2P_GROUP_INTERFACE_CLIENT &&
|
|
|
|
!wpa_s->p2p_in_provisioning)
|
|
|
|
return 0; /* not P2P client operation */
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Terminate connection due to WPS PBC "
|
|
|
|
"session overlap");
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s != wpa_s->p2pdev)
|
|
|
|
wpa_msg_ctrl(wpa_s->p2pdev, MSG_INFO, WPS_EVENT_OVERLAP);
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_p2p_group_formation_failed(wpa_s, 0);
|
2010-09-07 12:42:55 +02:00
|
|
|
return 1;
|
|
|
|
}
|
2010-10-15 17:55:22 +02:00
|
|
|
|
|
|
|
|
2014-03-27 07:58:30 +01:00
|
|
|
void wpas_p2p_pbc_overlap_cb(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
wpas_p2p_notif_pbc_overlap(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:27 +02:00
|
|
|
void wpas_p2p_update_channel_list(struct wpa_supplicant *wpa_s,
|
|
|
|
enum wpas_p2p_channel_update_trig trig)
|
2010-10-15 17:55:22 +02:00
|
|
|
{
|
2013-10-22 20:00:49 +02:00
|
|
|
struct p2p_channels chan, cli_chan;
|
2015-07-27 21:24:25 +02:00
|
|
|
struct wpa_used_freq_data *freqs = NULL;
|
|
|
|
unsigned int num = wpa_s->num_multichan_concurrent;
|
2010-10-15 17:55:22 +02:00
|
|
|
|
|
|
|
if (wpa_s->global == NULL || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
2015-07-27 21:24:25 +02:00
|
|
|
freqs = os_calloc(num, sizeof(struct wpa_used_freq_data));
|
|
|
|
if (!freqs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
num = get_shared_radio_freqs_data(wpa_s, freqs, num);
|
|
|
|
|
2010-10-15 17:55:22 +02:00
|
|
|
os_memset(&chan, 0, sizeof(chan));
|
2013-10-22 20:00:49 +02:00
|
|
|
os_memset(&cli_chan, 0, sizeof(cli_chan));
|
2020-10-29 14:45:47 +01:00
|
|
|
if (wpas_p2p_setup_channels(wpa_s, &chan, &cli_chan,
|
|
|
|
is_p2p_6ghz_disabled(wpa_s->global->p2p))) {
|
2010-10-15 17:55:22 +02:00
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to update supported "
|
|
|
|
"channel list");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-10-22 20:00:49 +02:00
|
|
|
p2p_update_channel_list(wpa_s->global->p2p, &chan, &cli_chan);
|
2014-05-05 08:33:21 +02:00
|
|
|
|
2015-07-27 21:24:25 +02:00
|
|
|
wpas_p2p_optimize_listen_channel(wpa_s, freqs, num);
|
2014-05-05 08:33:21 +02:00
|
|
|
|
2015-07-27 21:24:25 +02:00
|
|
|
/*
|
|
|
|
* The used frequencies map changed, so it is possible that a GO is
|
|
|
|
* using a channel that is no longer valid for P2P use. It is also
|
|
|
|
* possible that due to policy consideration, it would be preferable to
|
|
|
|
* move it to a frequency already used by other station interfaces.
|
|
|
|
*/
|
2015-07-27 21:24:27 +02:00
|
|
|
wpas_p2p_consider_moving_gos(wpa_s, freqs, num, trig);
|
2015-07-27 21:24:25 +02:00
|
|
|
|
|
|
|
os_free(freqs);
|
2010-10-15 17:55:22 +02:00
|
|
|
}
|
2010-10-19 14:53:28 +02:00
|
|
|
|
|
|
|
|
2012-12-18 09:39:34 +01:00
|
|
|
static void wpas_p2p_scan_res_ignore(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_scan_results *scan_res)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Ignore scan results");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-10-19 14:53:28 +02:00
|
|
|
int wpas_p2p_cancel(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_global *global = wpa_s->global;
|
|
|
|
int found = 0;
|
2010-12-17 14:05:35 +01:00
|
|
|
const u8 *peer;
|
2010-10-19 14:53:28 +02:00
|
|
|
|
2011-02-24 20:13:30 +01:00
|
|
|
if (global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2010-10-19 14:53:28 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Request to cancel group formation");
|
|
|
|
|
|
|
|
if (wpa_s->pending_interface_name[0] &&
|
|
|
|
!is_zero_ether_addr(wpa_s->pending_interface_addr))
|
|
|
|
found = 1;
|
|
|
|
|
2010-12-17 14:05:35 +01:00
|
|
|
peer = p2p_get_go_neg_peer(global->p2p);
|
|
|
|
if (peer) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Unauthorize pending GO Neg peer "
|
|
|
|
MACSTR, MAC2STR(peer));
|
|
|
|
p2p_unauthorize(global->p2p, peer);
|
2012-03-01 00:16:06 +01:00
|
|
|
found = 1;
|
2010-12-17 14:05:35 +01:00
|
|
|
}
|
|
|
|
|
2012-12-18 09:39:34 +01:00
|
|
|
if (wpa_s->scan_res_handler == wpas_p2p_scan_res_join) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Stop pending scan for join");
|
|
|
|
wpa_s->scan_res_handler = wpas_p2p_scan_res_ignore;
|
|
|
|
found = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->pending_pd_before_join) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Stop pending PD before join");
|
|
|
|
wpa_s->pending_pd_before_join = 0;
|
|
|
|
found = 1;
|
|
|
|
}
|
|
|
|
|
2010-10-19 14:53:28 +02:00
|
|
|
wpas_p2p_stop_find(wpa_s);
|
|
|
|
|
|
|
|
for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
|
|
|
if (wpa_s == global->p2p_group_formation &&
|
2010-11-04 10:59:44 +01:00
|
|
|
(wpa_s->p2p_in_provisioning ||
|
|
|
|
wpa_s->parent->pending_interface_type ==
|
|
|
|
WPA_IF_P2P_CLIENT)) {
|
2010-10-19 14:53:28 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Interface %s in group "
|
|
|
|
"formation found - cancelling",
|
|
|
|
wpa_s->ifname);
|
|
|
|
found = 1;
|
2010-12-17 14:06:48 +01:00
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2012-09-28 21:01:48 +02:00
|
|
|
if (wpa_s->p2p_in_provisioning) {
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_group_formation_completed(wpa_s, 0, 0);
|
2012-09-28 21:01:48 +02:00
|
|
|
break;
|
|
|
|
}
|
2012-08-11 11:41:31 +02:00
|
|
|
wpas_p2p_group_delete(wpa_s,
|
|
|
|
P2P_GROUP_REMOVAL_REQUESTED);
|
2010-10-19 14:53:28 +02:00
|
|
|
break;
|
2014-04-07 11:26:04 +02:00
|
|
|
} else if (wpa_s->p2p_in_invitation) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Interface %s in invitation found - cancelling",
|
|
|
|
wpa_s->ifname);
|
|
|
|
found = 1;
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_p2p_group_formation_failed(wpa_s, 0);
|
2015-12-04 21:49:59 +01:00
|
|
|
break;
|
2010-10-19 14:53:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No ongoing group formation found");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2010-10-25 18:16:11 +02:00
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_interface_unavailable(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->current_ssid == NULL || !wpa_s->current_ssid->p2p_group)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Remove group due to driver resource not "
|
|
|
|
"being available anymore");
|
2012-08-11 11:41:31 +02:00
|
|
|
wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_UNAVAILABLE);
|
2010-10-25 18:16:11 +02:00
|
|
|
}
|
2010-11-10 12:33:47 +01:00
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_update_best_channels(struct wpa_supplicant *wpa_s,
|
|
|
|
int freq_24, int freq_5, int freq_overall)
|
|
|
|
{
|
|
|
|
struct p2p_data *p2p = wpa_s->global->p2p;
|
2013-12-29 17:20:47 +01:00
|
|
|
if (p2p == NULL)
|
2010-11-10 12:33:47 +01:00
|
|
|
return;
|
|
|
|
p2p_set_best_channels(p2p, freq_24, freq_5, freq_overall);
|
|
|
|
}
|
2010-11-25 12:09:50 +01:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_unauthorize(struct wpa_supplicant *wpa_s, const char *addr)
|
|
|
|
{
|
|
|
|
u8 peer[ETH_ALEN];
|
|
|
|
struct p2p_data *p2p = wpa_s->global->p2p;
|
|
|
|
|
2013-12-29 17:20:47 +01:00
|
|
|
if (p2p == NULL)
|
2010-11-25 12:09:50 +01:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (hwaddr_aton(addr, peer))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return p2p_unauthorize(p2p, peer);
|
|
|
|
}
|
2011-02-02 16:30:15 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpas_p2p_disconnect - Disconnect from a P2P Group
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This can be used to disconnect from a group in which the local end is a P2P
|
|
|
|
* Client or to end a P2P Group in case the local end is the Group Owner. If a
|
|
|
|
* virtual network interface was created for this group, that interface will be
|
|
|
|
* removed. Otherwise, only the configured P2P group network will be removed
|
|
|
|
* from the interface.
|
|
|
|
*/
|
|
|
|
int wpas_p2p_disconnect(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (wpa_s == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2012-08-31 21:04:41 +02:00
|
|
|
return wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_REQUESTED) < 0 ?
|
|
|
|
-1 : 0;
|
2011-02-02 16:30:15 +01:00
|
|
|
}
|
2011-09-29 15:53:55 +02:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_in_progress(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2013-02-11 11:21:03 +01:00
|
|
|
int ret;
|
|
|
|
|
2011-09-29 15:53:55 +02:00
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return 0;
|
|
|
|
|
2013-02-11 11:21:03 +01:00
|
|
|
ret = p2p_in_progress(wpa_s->global->p2p);
|
|
|
|
if (ret == 0) {
|
|
|
|
/*
|
|
|
|
* Check whether there is an ongoing WPS provisioning step (or
|
|
|
|
* other parts of group formation) on another interface since
|
|
|
|
* p2p_in_progress() does not report this to avoid issues for
|
|
|
|
* scans during such provisioning step.
|
|
|
|
*/
|
|
|
|
if (wpa_s->global->p2p_group_formation &&
|
|
|
|
wpa_s->global->p2p_group_formation != wpa_s) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Another interface (%s) "
|
|
|
|
"in group formation",
|
|
|
|
wpa_s->global->p2p_group_formation->ifname);
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-27 11:23:10 +02:00
|
|
|
if (!ret && wpa_s->global->p2p_go_wait_client.sec) {
|
2013-12-16 21:08:40 +01:00
|
|
|
struct os_reltime now;
|
|
|
|
os_get_reltime(&now);
|
|
|
|
if (os_reltime_expired(&now, &wpa_s->global->p2p_go_wait_client,
|
|
|
|
P2P_MAX_INITIAL_CONN_WAIT_GO)) {
|
2013-08-27 11:23:10 +02:00
|
|
|
/* Wait for the first client has expired */
|
|
|
|
wpa_s->global->p2p_go_wait_client.sec = 0;
|
|
|
|
} else {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Waiting for initial client connection during group formation");
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-11 11:21:03 +01:00
|
|
|
return ret;
|
2011-09-29 15:53:55 +02:00
|
|
|
}
|
2011-12-10 11:56:42 +01:00
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_network_removed(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid)
|
|
|
|
{
|
|
|
|
if (wpa_s->p2p_in_provisioning && ssid->p2p_group &&
|
|
|
|
eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL) > 0) {
|
2012-04-06 17:22:03 +02:00
|
|
|
/**
|
|
|
|
* Remove the network by scheduling the group formation
|
|
|
|
* timeout to happen immediately. The teardown code
|
|
|
|
* needs to be scheduled to run asynch later so that we
|
|
|
|
* don't delete data from under ourselves unexpectedly.
|
|
|
|
* Calling wpas_p2p_group_formation_timeout directly
|
|
|
|
* causes a series of crashes in WPS failure scenarios.
|
|
|
|
*/
|
2011-12-10 11:56:42 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Canceled group formation due to "
|
|
|
|
"P2P group network getting removed");
|
2012-04-06 17:22:03 +02:00
|
|
|
eloop_register_timeout(0, 0, wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL);
|
2011-12-10 11:56:42 +01:00
|
|
|
}
|
|
|
|
}
|
2011-12-22 20:45:20 +01:00
|
|
|
|
|
|
|
|
|
|
|
struct wpa_ssid * wpas_p2p_get_persistent(struct wpa_supplicant *wpa_s,
|
2012-02-06 20:54:36 +01:00
|
|
|
const u8 *addr, const u8 *ssid,
|
|
|
|
size_t ssid_len)
|
2011-12-22 20:45:20 +01:00
|
|
|
{
|
|
|
|
struct wpa_ssid *s;
|
2011-12-22 21:47:41 +01:00
|
|
|
size_t i;
|
2011-12-22 20:45:20 +01:00
|
|
|
|
|
|
|
for (s = wpa_s->conf->ssid; s; s = s->next) {
|
2011-12-22 21:47:41 +01:00
|
|
|
if (s->disabled != 2)
|
|
|
|
continue;
|
2012-02-06 20:54:36 +01:00
|
|
|
if (ssid &&
|
|
|
|
(ssid_len != s->ssid_len ||
|
|
|
|
os_memcmp(ssid, s->ssid, ssid_len) != 0))
|
|
|
|
continue;
|
2013-09-01 12:40:33 +02:00
|
|
|
if (addr == NULL) {
|
|
|
|
if (s->mode == WPAS_MODE_P2P_GO)
|
|
|
|
return s;
|
|
|
|
continue;
|
|
|
|
}
|
2011-12-22 21:47:41 +01:00
|
|
|
if (os_memcmp(s->bssid, addr, ETH_ALEN) == 0)
|
|
|
|
return s; /* peer is GO in the persistent group */
|
|
|
|
if (s->mode != WPAS_MODE_P2P_GO || s->p2p_client_list == NULL)
|
|
|
|
continue;
|
|
|
|
for (i = 0; i < s->num_p2p_clients; i++) {
|
2015-01-05 21:10:16 +01:00
|
|
|
if (os_memcmp(s->p2p_client_list + i * 2 * ETH_ALEN,
|
2011-12-22 21:47:41 +01:00
|
|
|
addr, ETH_ALEN) == 0)
|
|
|
|
return s; /* peer is P2P client in persistent
|
|
|
|
* group */
|
|
|
|
}
|
2011-12-22 20:45:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2011-12-22 21:47:41 +01:00
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *addr)
|
|
|
|
{
|
2013-09-14 19:39:50 +02:00
|
|
|
if (eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_s->p2pdev, NULL) > 0) {
|
2013-09-14 19:39:50 +02:00
|
|
|
/*
|
|
|
|
* This can happen if WPS provisioning step is not terminated
|
|
|
|
* cleanly (e.g., P2P Client does not send WSC_Done). Since the
|
|
|
|
* peer was able to connect, there is no need to time out group
|
2013-09-26 19:32:44 +02:00
|
|
|
* formation after this, though. In addition, this is used with
|
|
|
|
* the initial connection wait on the GO as a separate formation
|
|
|
|
* timeout and as such, expected to be hit after the initial WPS
|
|
|
|
* provisioning step.
|
2013-09-14 19:39:50 +02:00
|
|
|
*/
|
2013-09-26 19:32:44 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Canceled P2P group formation timeout on data connection");
|
2014-10-01 14:36:53 +02:00
|
|
|
|
|
|
|
if (!wpa_s->p2p_go_group_formation_completed &&
|
|
|
|
!wpa_s->group_formation_reported) {
|
|
|
|
/*
|
|
|
|
* GO has not yet notified group formation success since
|
|
|
|
* the WPS step was not completed cleanly. Do that
|
|
|
|
* notification now since the P2P Client was able to
|
|
|
|
* connect and as such, must have received the
|
|
|
|
* credential from the WPS step.
|
|
|
|
*/
|
|
|
|
if (wpa_s->global->p2p)
|
|
|
|
p2p_wps_success_cb(wpa_s->global->p2p, addr);
|
2015-06-15 22:34:11 +02:00
|
|
|
wpas_group_formation_completed(wpa_s, 1, 0);
|
2014-10-01 14:36:53 +02:00
|
|
|
}
|
2013-09-26 19:32:44 +02:00
|
|
|
}
|
|
|
|
if (!wpa_s->p2p_go_group_formation_completed) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Marking group formation completed on GO on first data connection");
|
|
|
|
wpa_s->p2p_go_group_formation_completed = 1;
|
|
|
|
wpa_s->global->p2p_group_formation = NULL;
|
|
|
|
wpa_s->p2p_in_provisioning = 0;
|
2014-04-07 11:26:04 +02:00
|
|
|
wpa_s->p2p_in_invitation = 0;
|
2013-09-14 19:39:50 +02:00
|
|
|
}
|
2013-08-27 11:23:10 +02:00
|
|
|
wpa_s->global->p2p_go_wait_client.sec = 0;
|
2011-12-22 21:47:41 +01:00
|
|
|
if (addr == NULL)
|
|
|
|
return;
|
|
|
|
wpas_p2p_add_persistent_group_client(wpa_s, addr);
|
|
|
|
}
|
2012-05-08 16:13:56 +02:00
|
|
|
|
|
|
|
|
2015-02-08 10:38:56 +01:00
|
|
|
static int wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
|
|
|
|
int group_added)
|
2012-05-08 16:13:56 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *group = wpa_s;
|
2015-02-08 10:38:56 +01:00
|
|
|
int ret = 0;
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
if (wpa_s->global->p2p_group_formation)
|
|
|
|
group = wpa_s->global->p2p_group_formation;
|
2015-06-17 15:24:54 +02:00
|
|
|
wpa_s = wpa_s->global->p2p_init_wpa_s;
|
2012-05-15 04:55:43 +02:00
|
|
|
offchannel_send_action_done(wpa_s);
|
2012-05-08 16:13:56 +02:00
|
|
|
if (group_added)
|
2015-02-08 10:38:56 +01:00
|
|
|
ret = wpas_p2p_group_delete(group, P2P_GROUP_REMOVAL_SILENT);
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Fall back to GO Negotiation");
|
|
|
|
wpas_p2p_connect(wpa_s, wpa_s->pending_join_dev_addr, wpa_s->p2p_pin,
|
|
|
|
wpa_s->p2p_wps_method, wpa_s->p2p_persistent_group, 0,
|
|
|
|
0, 0, wpa_s->p2p_go_intent, wpa_s->p2p_connect_freq,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht_center_freq2,
|
2012-05-11 15:25:47 +02:00
|
|
|
wpa_s->p2p_persistent_id,
|
2012-08-15 22:07:44 +02:00
|
|
|
wpa_s->p2p_pd_before_go_neg,
|
2013-10-27 18:46:17 +01:00
|
|
|
wpa_s->p2p_go_ht40,
|
2015-10-28 22:14:10 +01:00
|
|
|
wpa_s->p2p_go_vht,
|
2018-12-21 19:20:28 +01:00
|
|
|
wpa_s->p2p_go_max_oper_chwidth,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_he,
|
|
|
|
wpa_s->p2p_go_edmg,
|
|
|
|
NULL, 0);
|
2015-02-08 10:38:56 +01:00
|
|
|
return ret;
|
2012-05-08 16:13:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_scan_no_go_seen(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2015-02-08 10:38:56 +01:00
|
|
|
int res;
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
if (!wpa_s->p2p_fallback_to_go_neg ||
|
|
|
|
wpa_s->p2p_in_provisioning <= 5)
|
|
|
|
return 0;
|
|
|
|
|
2012-05-15 04:55:43 +02:00
|
|
|
if (wpas_p2p_peer_go(wpa_s, wpa_s->pending_join_dev_addr) > 0)
|
|
|
|
return 0; /* peer operating as a GO */
|
|
|
|
|
2012-05-08 16:13:56 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: GO not found for p2p_connect-auto - "
|
|
|
|
"fallback to GO Negotiation");
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO, P2P_EVENT_FALLBACK_TO_GO_NEG
|
2015-02-08 11:04:15 +01:00
|
|
|
"reason=GO-not-found");
|
2015-02-08 10:38:56 +01:00
|
|
|
res = wpas_p2p_fallback_to_go_neg(wpa_s, 1);
|
2012-05-08 16:13:56 +02:00
|
|
|
|
2015-02-08 10:38:56 +01:00
|
|
|
return res == 1 ? 2 : 1;
|
2012-05-08 16:13:56 +02:00
|
|
|
}
|
2012-08-23 17:34:57 +02:00
|
|
|
|
|
|
|
|
|
|
|
unsigned int wpas_p2p_search_delay(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *ifs;
|
|
|
|
|
|
|
|
if (wpa_s->wpa_state > WPA_SCANNING) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Use %u ms search delay due to "
|
|
|
|
"concurrent operation",
|
2014-06-09 18:43:26 +02:00
|
|
|
wpa_s->conf->p2p_search_delay);
|
|
|
|
return wpa_s->conf->p2p_search_delay;
|
2012-08-23 17:34:57 +02:00
|
|
|
}
|
|
|
|
|
2013-11-24 19:01:07 +01:00
|
|
|
dl_list_for_each(ifs, &wpa_s->radio->ifaces, struct wpa_supplicant,
|
|
|
|
radio_list) {
|
|
|
|
if (ifs != wpa_s && ifs->wpa_state > WPA_SCANNING) {
|
2012-08-23 17:34:57 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Use %u ms search "
|
|
|
|
"delay due to concurrent operation on "
|
|
|
|
"interface %s",
|
2014-06-09 18:43:26 +02:00
|
|
|
wpa_s->conf->p2p_search_delay,
|
|
|
|
ifs->ifname);
|
|
|
|
return wpa_s->conf->p2p_search_delay;
|
2012-08-23 17:34:57 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-03-18 15:31:09 +01:00
|
|
|
|
|
|
|
|
2013-09-01 16:47:05 +02:00
|
|
|
static int wpas_p2p_remove_psk_entry(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *s, const u8 *addr,
|
|
|
|
int iface_addr)
|
|
|
|
{
|
|
|
|
struct psk_list_entry *psk, *tmp;
|
|
|
|
int changed = 0;
|
|
|
|
|
|
|
|
dl_list_for_each_safe(psk, tmp, &s->psk_list, struct psk_list_entry,
|
|
|
|
list) {
|
|
|
|
if ((iface_addr && !psk->p2p &&
|
|
|
|
os_memcmp(addr, psk->addr, ETH_ALEN) == 0) ||
|
|
|
|
(!iface_addr && psk->p2p &&
|
|
|
|
os_memcmp(addr, psk->addr, ETH_ALEN) == 0)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Remove persistent group PSK list entry for "
|
|
|
|
MACSTR " p2p=%u",
|
|
|
|
MAC2STR(psk->addr), psk->p2p);
|
|
|
|
dl_list_del(&psk->list);
|
|
|
|
os_free(psk);
|
|
|
|
changed++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return changed;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-01 12:40:33 +02:00
|
|
|
void wpas_p2p_new_psk_cb(struct wpa_supplicant *wpa_s, const u8 *mac_addr,
|
|
|
|
const u8 *p2p_dev_addr,
|
|
|
|
const u8 *psk, size_t psk_len)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
|
|
|
struct wpa_ssid *persistent;
|
2014-04-26 10:43:25 +02:00
|
|
|
struct psk_list_entry *p, *last;
|
2013-09-01 12:40:33 +02:00
|
|
|
|
|
|
|
if (psk_len != sizeof(p->psk))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (p2p_dev_addr) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: New PSK for addr=" MACSTR
|
|
|
|
" p2p_dev_addr=" MACSTR,
|
|
|
|
MAC2STR(mac_addr), MAC2STR(p2p_dev_addr));
|
|
|
|
if (is_zero_ether_addr(p2p_dev_addr))
|
|
|
|
p2p_dev_addr = NULL;
|
|
|
|
} else {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: New PSK for addr=" MACSTR,
|
|
|
|
MAC2STR(mac_addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: new_psk_cb during group formation");
|
|
|
|
/* To be added to persistent group once created */
|
|
|
|
if (wpa_s->global->add_psk == NULL) {
|
|
|
|
wpa_s->global->add_psk = os_zalloc(sizeof(*p));
|
|
|
|
if (wpa_s->global->add_psk == NULL)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
p = wpa_s->global->add_psk;
|
|
|
|
if (p2p_dev_addr) {
|
|
|
|
p->p2p = 1;
|
|
|
|
os_memcpy(p->addr, p2p_dev_addr, ETH_ALEN);
|
|
|
|
} else {
|
|
|
|
p->p2p = 0;
|
|
|
|
os_memcpy(p->addr, mac_addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
os_memcpy(p->psk, psk, psk_len);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ssid->mode != WPAS_MODE_P2P_GO || !ssid->p2p_persistent_group) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Ignore new_psk_cb on not-persistent GO");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
persistent = wpas_p2p_get_persistent(wpa_s->p2pdev, NULL, ssid->ssid,
|
2013-09-01 12:40:33 +02:00
|
|
|
ssid->ssid_len);
|
|
|
|
if (!persistent) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Could not find persistent group information to store the new PSK");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = os_zalloc(sizeof(*p));
|
|
|
|
if (p == NULL)
|
|
|
|
return;
|
|
|
|
if (p2p_dev_addr) {
|
|
|
|
p->p2p = 1;
|
|
|
|
os_memcpy(p->addr, p2p_dev_addr, ETH_ALEN);
|
|
|
|
} else {
|
|
|
|
p->p2p = 0;
|
|
|
|
os_memcpy(p->addr, mac_addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
os_memcpy(p->psk, psk, psk_len);
|
|
|
|
|
2014-04-26 10:43:25 +02:00
|
|
|
if (dl_list_len(&persistent->psk_list) > P2P_MAX_STORED_CLIENTS &&
|
|
|
|
(last = dl_list_last(&persistent->psk_list,
|
|
|
|
struct psk_list_entry, list))) {
|
2013-09-01 12:40:33 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Remove oldest PSK entry for "
|
|
|
|
MACSTR " (p2p=%u) to make room for a new one",
|
|
|
|
MAC2STR(last->addr), last->p2p);
|
|
|
|
dl_list_del(&last->list);
|
|
|
|
os_free(last);
|
|
|
|
}
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
wpas_p2p_remove_psk_entry(wpa_s->p2pdev, persistent,
|
2013-09-01 16:47:05 +02:00
|
|
|
p2p_dev_addr ? p2p_dev_addr : mac_addr,
|
|
|
|
p2p_dev_addr == NULL);
|
|
|
|
if (p2p_dev_addr) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Add new PSK for p2p_dev_addr="
|
|
|
|
MACSTR, MAC2STR(p2p_dev_addr));
|
|
|
|
} else {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Add new PSK for addr=" MACSTR,
|
|
|
|
MAC2STR(mac_addr));
|
|
|
|
}
|
2013-09-01 12:40:33 +02:00
|
|
|
dl_list_add(&persistent->psk_list, &p->list);
|
|
|
|
|
2016-01-24 16:36:49 +01:00
|
|
|
if (wpa_s->p2pdev->conf->update_config &&
|
|
|
|
wpa_config_write(wpa_s->p2pdev->confname, wpa_s->p2pdev->conf))
|
2013-09-01 12:40:33 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
|
|
|
|
}
|
2013-09-01 16:37:22 +02:00
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_remove_psk(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *s, const u8 *addr,
|
|
|
|
int iface_addr)
|
|
|
|
{
|
2013-09-01 16:47:05 +02:00
|
|
|
int res;
|
2013-09-01 16:37:22 +02:00
|
|
|
|
2013-09-01 16:47:05 +02:00
|
|
|
res = wpas_p2p_remove_psk_entry(wpa_s, s, addr, iface_addr);
|
2014-02-25 18:29:05 +01:00
|
|
|
if (res > 0 && wpa_s->conf->update_config &&
|
|
|
|
wpa_config_write(wpa_s->confname, wpa_s->conf))
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Failed to update configuration");
|
2013-09-01 16:37:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_remove_client_go(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *peer, int iface_addr)
|
|
|
|
{
|
|
|
|
struct hostapd_data *hapd;
|
|
|
|
struct hostapd_wpa_psk *psk, *prev, *rem;
|
|
|
|
struct sta_info *sta;
|
|
|
|
|
|
|
|
if (wpa_s->ap_iface == NULL || wpa_s->current_ssid == NULL ||
|
|
|
|
wpa_s->current_ssid->mode != WPAS_MODE_P2P_GO)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Remove per-station PSK entry */
|
|
|
|
hapd = wpa_s->ap_iface->bss[0];
|
|
|
|
prev = NULL;
|
|
|
|
psk = hapd->conf->ssid.wpa_psk;
|
|
|
|
while (psk) {
|
|
|
|
if ((iface_addr && os_memcmp(peer, psk->addr, ETH_ALEN) == 0) ||
|
|
|
|
(!iface_addr &&
|
|
|
|
os_memcmp(peer, psk->p2p_dev_addr, ETH_ALEN) == 0)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Remove operating group PSK entry for "
|
|
|
|
MACSTR " iface_addr=%d",
|
|
|
|
MAC2STR(peer), iface_addr);
|
|
|
|
if (prev)
|
|
|
|
prev->next = psk->next;
|
|
|
|
else
|
|
|
|
hapd->conf->ssid.wpa_psk = psk->next;
|
|
|
|
rem = psk;
|
|
|
|
psk = psk->next;
|
|
|
|
os_free(rem);
|
|
|
|
} else {
|
|
|
|
prev = psk;
|
|
|
|
psk = psk->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Disconnect from group */
|
|
|
|
if (iface_addr)
|
|
|
|
sta = ap_get_sta(hapd, peer);
|
|
|
|
else
|
|
|
|
sta = ap_get_sta_p2p(hapd, peer);
|
|
|
|
if (sta) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Disconnect peer " MACSTR
|
|
|
|
" (iface_addr=%d) from group",
|
|
|
|
MAC2STR(peer), iface_addr);
|
|
|
|
hostapd_drv_sta_deauth(hapd, sta->addr,
|
|
|
|
WLAN_REASON_DEAUTH_LEAVING);
|
|
|
|
ap_sta_deauthenticate(hapd, sta, WLAN_REASON_DEAUTH_LEAVING);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
|
|
|
int iface_addr)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *s;
|
|
|
|
struct wpa_supplicant *w;
|
2015-05-12 16:39:57 +02:00
|
|
|
struct wpa_supplicant *p2p_wpa_s = wpa_s->global->p2p_init_wpa_s;
|
2013-09-01 16:37:22 +02:00
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Remove client " MACSTR, MAC2STR(peer));
|
|
|
|
|
|
|
|
/* Remove from any persistent group */
|
2015-05-12 16:39:57 +02:00
|
|
|
for (s = p2p_wpa_s->conf->ssid; s; s = s->next) {
|
2013-09-01 16:37:22 +02:00
|
|
|
if (s->disabled != 2 || s->mode != WPAS_MODE_P2P_GO)
|
|
|
|
continue;
|
|
|
|
if (!iface_addr)
|
2015-05-12 16:39:57 +02:00
|
|
|
wpas_remove_persistent_peer(p2p_wpa_s, s, peer, 0);
|
|
|
|
wpas_p2p_remove_psk(p2p_wpa_s, s, peer, iface_addr);
|
2013-09-01 16:37:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove from any operating group */
|
|
|
|
for (w = wpa_s->global->ifaces; w; w = w->next)
|
|
|
|
wpas_p2p_remove_client_go(w, peer, iface_addr);
|
|
|
|
}
|
2013-09-01 20:28:16 +02:00
|
|
|
|
|
|
|
|
2013-09-02 15:33:42 +02:00
|
|
|
static void wpas_p2p_psk_failure_removal(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_PSK_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-26 14:10:16 +01:00
|
|
|
static void wpas_p2p_group_freq_conflict(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Frequency conflict - terminate group");
|
|
|
|
wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_FREQ_CONFLICT);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_handle_frequency_conflicts(struct wpa_supplicant *wpa_s, int freq,
|
|
|
|
struct wpa_ssid *ssid)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
|
|
|
|
if (!iface->current_ssid ||
|
|
|
|
iface->current_ssid->frequency == freq ||
|
|
|
|
(iface->p2p_group_interface == NOT_P2P_GROUP_INTERFACE &&
|
|
|
|
!iface->current_ssid->p2p_group))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Remove the connection with least priority */
|
|
|
|
if (!wpas_is_p2p_prioritized(iface)) {
|
|
|
|
/* STA connection has priority over existing
|
|
|
|
* P2P connection, so remove the interface. */
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Removing P2P connection due to single channel concurrent mode frequency conflict");
|
|
|
|
eloop_register_timeout(0, 0,
|
|
|
|
wpas_p2p_group_freq_conflict,
|
|
|
|
iface, NULL);
|
|
|
|
/* If connection in progress is P2P connection, do not
|
|
|
|
* proceed for the connection. */
|
|
|
|
if (wpa_s == iface)
|
|
|
|
return -1;
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
/* P2P connection has priority, disable the STA network
|
|
|
|
*/
|
|
|
|
wpa_supplicant_disable_network(wpa_s->global->ifaces,
|
|
|
|
ssid);
|
|
|
|
wpa_msg(wpa_s->global->ifaces, MSG_INFO,
|
|
|
|
WPA_EVENT_FREQ_CONFLICT " id=%d", ssid->id);
|
|
|
|
os_memset(wpa_s->global->ifaces->pending_bssid, 0,
|
|
|
|
ETH_ALEN);
|
|
|
|
/* If P2P connection is in progress, continue
|
|
|
|
* connecting...*/
|
|
|
|
if (wpa_s == iface)
|
|
|
|
return 0;
|
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-01 20:28:16 +02:00
|
|
|
int wpas_p2p_4way_hs_failed(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
|
|
|
|
|
|
|
if (ssid == NULL || !ssid->p2p_group)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (wpa_s->p2p_last_4way_hs_fail &&
|
|
|
|
wpa_s->p2p_last_4way_hs_fail == ssid) {
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
struct wpa_ssid *persistent;
|
|
|
|
|
|
|
|
if (wpas_p2p_persistent_group(wpa_s, go_dev_addr,
|
|
|
|
ssid->ssid,
|
|
|
|
ssid->ssid_len) <= 0) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Could not determine whether 4-way handshake failures were for a persistent group");
|
|
|
|
goto disconnect;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Two 4-way handshake failures for a P2P group - go_dev_addr="
|
|
|
|
MACSTR, MAC2STR(go_dev_addr));
|
2016-01-24 16:36:49 +01:00
|
|
|
persistent = wpas_p2p_get_persistent(wpa_s->p2pdev, go_dev_addr,
|
2013-09-01 20:28:16 +02:00
|
|
|
ssid->ssid,
|
|
|
|
ssid->ssid_len);
|
|
|
|
if (persistent == NULL || persistent->mode != WPAS_MODE_INFRA) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No matching persistent group stored");
|
|
|
|
goto disconnect;
|
|
|
|
}
|
2016-01-24 16:36:49 +01:00
|
|
|
wpa_msg_global(wpa_s->p2pdev, MSG_INFO,
|
2013-09-01 20:28:16 +02:00
|
|
|
P2P_EVENT_PERSISTENT_PSK_FAIL "%d",
|
|
|
|
persistent->id);
|
|
|
|
disconnect:
|
|
|
|
wpa_s->p2p_last_4way_hs_fail = NULL;
|
2013-09-02 15:33:42 +02:00
|
|
|
/*
|
|
|
|
* Remove the group from a timeout to avoid issues with caller
|
|
|
|
* continuing to use the interface if this is on a P2P group
|
|
|
|
* interface.
|
|
|
|
*/
|
|
|
|
eloop_register_timeout(0, 0, wpas_p2p_psk_failure_removal,
|
|
|
|
wpa_s, NULL);
|
2013-09-01 20:28:16 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_s->p2p_last_4way_hs_fail = ssid;
|
|
|
|
return 0;
|
|
|
|
}
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
|
|
|
|
#ifdef CONFIG_WPS_NFC
|
|
|
|
|
|
|
|
static struct wpabuf * wpas_p2p_nfc_handover(int ndef, struct wpabuf *wsc,
|
|
|
|
struct wpabuf *p2p)
|
|
|
|
{
|
|
|
|
struct wpabuf *ret;
|
2013-04-04 15:18:46 +02:00
|
|
|
size_t wsc_len;
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
if (p2p == NULL) {
|
|
|
|
wpabuf_free(wsc);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No p2p buffer for handover");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-04-04 15:18:46 +02:00
|
|
|
wsc_len = wsc ? wpabuf_len(wsc) : 0;
|
|
|
|
ret = wpabuf_alloc(2 + wsc_len + 2 + wpabuf_len(p2p));
|
2013-02-15 16:07:28 +01:00
|
|
|
if (ret == NULL) {
|
|
|
|
wpabuf_free(wsc);
|
|
|
|
wpabuf_free(p2p);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-04-04 15:18:46 +02:00
|
|
|
wpabuf_put_be16(ret, wsc_len);
|
|
|
|
if (wsc)
|
|
|
|
wpabuf_put_buf(ret, wsc);
|
2013-02-15 16:07:28 +01:00
|
|
|
wpabuf_put_be16(ret, wpabuf_len(p2p));
|
|
|
|
wpabuf_put_buf(ret, p2p);
|
|
|
|
|
|
|
|
wpabuf_free(wsc);
|
|
|
|
wpabuf_free(p2p);
|
|
|
|
wpa_hexdump_buf(MSG_DEBUG,
|
|
|
|
"P2P: Generated NFC connection handover message", ret);
|
|
|
|
|
|
|
|
if (ndef && ret) {
|
|
|
|
struct wpabuf *tmp;
|
|
|
|
tmp = ndef_build_p2p(ret);
|
|
|
|
wpabuf_free(ret);
|
|
|
|
if (tmp == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Failed to NDEF encapsulate handover request");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
ret = tmp;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-08 02:51:04 +02:00
|
|
|
static int wpas_p2p_cli_freq(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid **ssid, u8 *go_dev_addr)
|
2013-04-04 15:18:46 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *iface;
|
|
|
|
|
2013-09-08 02:51:04 +02:00
|
|
|
if (go_dev_addr)
|
|
|
|
os_memset(go_dev_addr, 0, ETH_ALEN);
|
|
|
|
if (ssid)
|
|
|
|
*ssid = NULL;
|
2013-04-04 15:18:46 +02:00
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
|
|
|
|
if (iface->wpa_state < WPA_ASSOCIATING ||
|
|
|
|
iface->current_ssid == NULL || iface->assoc_freq == 0 ||
|
|
|
|
!iface->current_ssid->p2p_group ||
|
|
|
|
iface->current_ssid->mode != WPAS_MODE_INFRA)
|
|
|
|
continue;
|
2013-09-08 02:51:04 +02:00
|
|
|
if (ssid)
|
|
|
|
*ssid = iface->current_ssid;
|
|
|
|
if (go_dev_addr)
|
|
|
|
os_memcpy(go_dev_addr, iface->go_dev_addr, ETH_ALEN);
|
2013-04-04 15:18:46 +02:00
|
|
|
return iface->assoc_freq;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 16:07:28 +01:00
|
|
|
struct wpabuf * wpas_p2p_nfc_handover_req(struct wpa_supplicant *wpa_s,
|
|
|
|
int ndef)
|
|
|
|
{
|
|
|
|
struct wpabuf *wsc, *p2p;
|
2013-09-08 02:51:04 +02:00
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
int cli_freq = wpas_p2p_cli_freq(wpa_s, &ssid, go_dev_addr);
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: P2P disabled - cannot build handover request");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->conf->wps_nfc_dh_pubkey == NULL &&
|
|
|
|
wps_nfc_gen_dh(&wpa_s->conf->wps_nfc_dh_pubkey,
|
|
|
|
&wpa_s->conf->wps_nfc_dh_privkey) < 0) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No DH key available for handover request");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-04-04 15:18:46 +02:00
|
|
|
if (cli_freq == 0) {
|
|
|
|
wsc = wps_build_nfc_handover_req_p2p(
|
|
|
|
wpa_s->parent->wps, wpa_s->conf->wps_nfc_dh_pubkey);
|
|
|
|
} else
|
|
|
|
wsc = NULL;
|
2013-09-08 02:51:04 +02:00
|
|
|
p2p = p2p_build_nfc_handover_req(wpa_s->global->p2p, cli_freq,
|
|
|
|
go_dev_addr, ssid ? ssid->ssid : NULL,
|
|
|
|
ssid ? ssid->ssid_len : 0);
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
return wpas_p2p_nfc_handover(ndef, wsc, p2p);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
struct wpabuf * wpas_p2p_nfc_handover_sel(struct wpa_supplicant *wpa_s,
|
|
|
|
int ndef, int tag)
|
|
|
|
{
|
|
|
|
struct wpabuf *wsc, *p2p;
|
2013-09-08 02:51:04 +02:00
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
u8 go_dev_addr[ETH_ALEN];
|
|
|
|
int cli_freq = wpas_p2p_cli_freq(wpa_s, &ssid, go_dev_addr);
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!tag && wpa_s->conf->wps_nfc_dh_pubkey == NULL &&
|
|
|
|
wps_nfc_gen_dh(&wpa_s->conf->wps_nfc_dh_pubkey,
|
|
|
|
&wpa_s->conf->wps_nfc_dh_privkey) < 0)
|
|
|
|
return NULL;
|
|
|
|
|
2013-04-04 15:18:46 +02:00
|
|
|
if (cli_freq == 0) {
|
|
|
|
wsc = wps_build_nfc_handover_sel_p2p(
|
|
|
|
wpa_s->parent->wps,
|
|
|
|
tag ? wpa_s->conf->wps_nfc_dev_pw_id :
|
|
|
|
DEV_PW_NFC_CONNECTION_HANDOVER,
|
|
|
|
wpa_s->conf->wps_nfc_dh_pubkey,
|
|
|
|
tag ? wpa_s->conf->wps_nfc_dev_pw : NULL);
|
|
|
|
} else
|
|
|
|
wsc = NULL;
|
2013-09-08 02:51:04 +02:00
|
|
|
p2p = p2p_build_nfc_handover_sel(wpa_s->global->p2p, cli_freq,
|
|
|
|
go_dev_addr, ssid ? ssid->ssid : NULL,
|
|
|
|
ssid ? ssid->ssid_len : 0);
|
2013-02-15 16:07:28 +01:00
|
|
|
|
|
|
|
return wpas_p2p_nfc_handover(ndef, wsc, p2p);
|
|
|
|
}
|
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
|
|
|
|
static int wpas_p2p_nfc_join_group(struct wpa_supplicant *wpa_s,
|
|
|
|
struct p2p_nfc_params *params)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Initiate join-group based on NFC "
|
2013-09-08 00:44:29 +02:00
|
|
|
"connection handover (freq=%d)",
|
|
|
|
params->go_freq);
|
|
|
|
|
|
|
|
if (params->go_freq && params->go_ssid_len) {
|
|
|
|
wpa_s->p2p_wps_method = WPS_NFC;
|
|
|
|
wpa_s->pending_join_wps_method = WPS_NFC;
|
|
|
|
os_memset(wpa_s->pending_join_iface_addr, 0, ETH_ALEN);
|
|
|
|
os_memcpy(wpa_s->pending_join_dev_addr, params->go_dev_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
return wpas_p2p_join_start(wpa_s, params->go_freq,
|
|
|
|
params->go_ssid,
|
|
|
|
params->go_ssid_len);
|
|
|
|
}
|
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
return wpas_p2p_connect(wpa_s, params->peer->p2p_device_addr, NULL,
|
|
|
|
WPS_NFC, 0, 0, 1, 0, wpa_s->conf->p2p_go_intent,
|
2015-10-28 22:14:10 +01:00
|
|
|
params->go_freq, wpa_s->p2p_go_vht_center_freq2,
|
2015-12-30 18:08:51 +01:00
|
|
|
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
|
2015-12-30 18:08:51 +01:00
|
|
|
params->go_ssid_len ? params->go_ssid : NULL,
|
|
|
|
params->go_ssid_len);
|
2013-04-27 17:50:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_nfc_auth_join(struct wpa_supplicant *wpa_s,
|
2013-09-08 18:45:04 +02:00
|
|
|
struct p2p_nfc_params *params, int tag)
|
2013-04-27 17:50:14 +02:00
|
|
|
{
|
2013-09-08 18:45:04 +02:00
|
|
|
int res, persistent;
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Authorize join-group based on NFC "
|
|
|
|
"connection handover");
|
|
|
|
for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
|
2013-09-08 18:45:04 +02:00
|
|
|
ssid = wpa_s->current_ssid;
|
2013-04-27 17:50:14 +02:00
|
|
|
if (ssid == NULL)
|
|
|
|
continue;
|
|
|
|
if (ssid->mode != WPAS_MODE_P2P_GO)
|
|
|
|
continue;
|
|
|
|
if (wpa_s->ap_iface == NULL)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (wpa_s == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not find GO interface");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-04-07 12:32:07 +02:00
|
|
|
if (wpa_s->p2pdev->p2p_oob_dev_pw_id !=
|
2013-04-27 17:50:14 +02:00
|
|
|
DEV_PW_NFC_CONNECTION_HANDOVER &&
|
2016-04-07 12:32:07 +02:00
|
|
|
!wpa_s->p2pdev->p2p_oob_dev_pw) {
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No NFC Dev Pw known");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-09-08 18:45:04 +02:00
|
|
|
res = wpas_ap_wps_add_nfc_pw(
|
2016-04-07 12:32:07 +02:00
|
|
|
wpa_s, wpa_s->p2pdev->p2p_oob_dev_pw_id,
|
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw,
|
|
|
|
wpa_s->p2pdev->p2p_peer_oob_pk_hash_known ?
|
|
|
|
wpa_s->p2pdev->p2p_peer_oob_pubkey_hash : NULL);
|
2013-09-08 18:45:04 +02:00
|
|
|
if (res)
|
|
|
|
return res;
|
|
|
|
|
|
|
|
if (!tag) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Negotiated handover - wait for peer to join without invitation");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!params->peer ||
|
|
|
|
!(params->peer->dev_capab & P2P_DEV_CAPAB_INVITATION_PROCEDURE))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Static handover - invite peer " MACSTR
|
|
|
|
" to join", MAC2STR(params->peer->p2p_device_addr));
|
|
|
|
|
|
|
|
wpa_s->global->p2p_invite_group = wpa_s;
|
|
|
|
persistent = ssid->p2p_persistent_group &&
|
2016-04-07 12:32:07 +02:00
|
|
|
wpas_p2p_get_persistent(wpa_s->p2pdev,
|
2013-09-08 18:45:04 +02:00
|
|
|
params->peer->p2p_device_addr,
|
|
|
|
ssid->ssid, ssid->ssid_len);
|
2016-04-07 12:32:07 +02:00
|
|
|
wpa_s->p2pdev->pending_invite_ssid_id = -1;
|
2013-09-08 18:45:04 +02:00
|
|
|
|
|
|
|
return p2p_invite(wpa_s->global->p2p, params->peer->p2p_device_addr,
|
|
|
|
P2P_INVITE_ROLE_ACTIVE_GO, wpa_s->own_addr,
|
|
|
|
ssid->ssid, ssid->ssid_len, ssid->frequency,
|
|
|
|
wpa_s->global->p2p_dev_addr, persistent, 0,
|
2016-04-07 12:32:07 +02:00
|
|
|
wpa_s->p2pdev->p2p_oob_dev_pw_id);
|
2013-04-27 17:50:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_nfc_init_go_neg(struct wpa_supplicant *wpa_s,
|
2013-12-04 04:44:56 +01:00
|
|
|
struct p2p_nfc_params *params,
|
|
|
|
int forced_freq)
|
2013-04-27 17:50:14 +02:00
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Initiate GO Negotiation based on NFC "
|
|
|
|
"connection handover");
|
|
|
|
return wpas_p2p_connect(wpa_s, params->peer->p2p_device_addr, NULL,
|
|
|
|
WPS_NFC, 0, 0, 0, 0, wpa_s->conf->p2p_go_intent,
|
2015-10-28 22:14:10 +01:00
|
|
|
forced_freq, wpa_s->p2p_go_vht_center_freq2,
|
2015-12-30 18:08:51 +01:00
|
|
|
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
|
|
|
|
NULL, 0);
|
2013-04-27 17:50:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_nfc_resp_go_neg(struct wpa_supplicant *wpa_s,
|
2013-12-04 04:44:56 +01:00
|
|
|
struct p2p_nfc_params *params,
|
|
|
|
int forced_freq)
|
2013-04-27 17:50:14 +02:00
|
|
|
{
|
|
|
|
int res;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Authorize GO Negotiation based on NFC "
|
|
|
|
"connection handover");
|
|
|
|
res = wpas_p2p_connect(wpa_s, params->peer->p2p_device_addr, NULL,
|
|
|
|
WPS_NFC, 0, 0, 0, 1, wpa_s->conf->p2p_go_intent,
|
2015-10-28 22:14:10 +01:00
|
|
|
forced_freq, wpa_s->p2p_go_vht_center_freq2,
|
2015-12-30 18:08:51 +01:00
|
|
|
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
|
2019-10-17 19:44:14 +02:00
|
|
|
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
|
|
|
|
NULL, 0);
|
2013-04-27 17:50:14 +02:00
|
|
|
if (res)
|
|
|
|
return res;
|
|
|
|
|
|
|
|
res = wpas_p2p_listen(wpa_s, 60);
|
|
|
|
if (res) {
|
|
|
|
p2p_unauthorize(wpa_s->global->p2p,
|
|
|
|
params->peer->p2p_device_addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpas_p2p_nfc_connection_handover(struct wpa_supplicant *wpa_s,
|
|
|
|
const struct wpabuf *data,
|
2013-12-04 04:44:56 +01:00
|
|
|
int sel, int tag, int forced_freq)
|
2013-04-27 17:50:14 +02:00
|
|
|
{
|
|
|
|
const u8 *pos, *end;
|
|
|
|
u16 len, id;
|
|
|
|
struct p2p_nfc_params params;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
|
|
params.sel = sel;
|
|
|
|
|
|
|
|
wpa_hexdump_buf(MSG_DEBUG, "P2P: Received NFC tag payload", data);
|
|
|
|
|
|
|
|
pos = wpabuf_head(data);
|
|
|
|
end = pos + wpabuf_len(data);
|
|
|
|
|
|
|
|
if (end - pos < 2) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Not enough data for Length of WSC "
|
|
|
|
"attributes");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
len = WPA_GET_BE16(pos);
|
|
|
|
pos += 2;
|
2014-10-11 17:34:25 +02:00
|
|
|
if (len > end - pos) {
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Not enough data for WSC "
|
|
|
|
"attributes");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
params.wsc_attr = pos;
|
|
|
|
params.wsc_len = len;
|
|
|
|
pos += len;
|
|
|
|
|
|
|
|
if (end - pos < 2) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Not enough data for Length of P2P "
|
|
|
|
"attributes");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
len = WPA_GET_BE16(pos);
|
|
|
|
pos += 2;
|
2014-10-11 17:34:25 +02:00
|
|
|
if (len > end - pos) {
|
2013-04-27 17:50:14 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Not enough data for P2P "
|
|
|
|
"attributes");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
params.p2p_attr = pos;
|
|
|
|
params.p2p_len = len;
|
|
|
|
pos += len;
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: WSC attributes",
|
|
|
|
params.wsc_attr, params.wsc_len);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: P2P attributes",
|
|
|
|
params.p2p_attr, params.p2p_len);
|
|
|
|
if (pos < end) {
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
"P2P: Ignored extra data after P2P attributes",
|
|
|
|
pos, end - pos);
|
|
|
|
}
|
|
|
|
|
|
|
|
res = p2p_process_nfc_connection_handover(wpa_s->global->p2p, ¶ms);
|
|
|
|
if (res)
|
|
|
|
return res;
|
|
|
|
|
2013-04-04 14:32:09 +02:00
|
|
|
if (params.next_step == NO_ACTION)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (params.next_step == BOTH_GO) {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_NFC_BOTH_GO "peer=" MACSTR,
|
|
|
|
MAC2STR(params.peer->p2p_device_addr));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-04-04 15:18:46 +02:00
|
|
|
if (params.next_step == PEER_CLIENT) {
|
2013-09-08 02:51:04 +02:00
|
|
|
if (!is_zero_ether_addr(params.go_dev_addr)) {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_NFC_PEER_CLIENT
|
|
|
|
"peer=" MACSTR " freq=%d go_dev_addr=" MACSTR
|
|
|
|
" ssid=\"%s\"",
|
|
|
|
MAC2STR(params.peer->p2p_device_addr),
|
|
|
|
params.go_freq,
|
|
|
|
MAC2STR(params.go_dev_addr),
|
|
|
|
wpa_ssid_txt(params.go_ssid,
|
|
|
|
params.go_ssid_len));
|
|
|
|
} else {
|
|
|
|
wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_NFC_PEER_CLIENT
|
|
|
|
"peer=" MACSTR " freq=%d",
|
|
|
|
MAC2STR(params.peer->p2p_device_addr),
|
|
|
|
params.go_freq);
|
|
|
|
}
|
2013-04-04 15:18:46 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-09-08 02:51:04 +02:00
|
|
|
if (wpas_p2p_cli_freq(wpa_s, NULL, NULL)) {
|
2013-04-04 15:18:46 +02:00
|
|
|
wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_NFC_WHILE_CLIENT "peer="
|
|
|
|
MACSTR, MAC2STR(params.peer->p2p_device_addr));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
wpabuf_free(wpa_s->p2p_oob_dev_pw);
|
|
|
|
wpa_s->p2p_oob_dev_pw = NULL;
|
|
|
|
|
|
|
|
if (params.oob_dev_pw_len < WPS_OOB_PUBKEY_HASH_LEN + 2) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: No peer OOB Dev Pw "
|
|
|
|
"received");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
id = WPA_GET_BE16(params.oob_dev_pw + WPS_OOB_PUBKEY_HASH_LEN);
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Peer OOB Dev Pw %u", id);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "P2P: Peer OOB Public Key hash",
|
|
|
|
params.oob_dev_pw, WPS_OOB_PUBKEY_HASH_LEN);
|
|
|
|
os_memcpy(wpa_s->p2p_peer_oob_pubkey_hash,
|
|
|
|
params.oob_dev_pw, WPS_OOB_PUBKEY_HASH_LEN);
|
|
|
|
wpa_s->p2p_peer_oob_pk_hash_known = 1;
|
|
|
|
|
|
|
|
if (tag) {
|
|
|
|
if (id < 0x10) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Static handover - invalid "
|
|
|
|
"peer OOB Device Password Id %u", id);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Static handover - use peer OOB "
|
|
|
|
"Device Password Id %u", id);
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "P2P: Peer OOB Device Password",
|
|
|
|
params.oob_dev_pw + WPS_OOB_PUBKEY_HASH_LEN + 2,
|
|
|
|
params.oob_dev_pw_len -
|
|
|
|
WPS_OOB_PUBKEY_HASH_LEN - 2);
|
|
|
|
wpa_s->p2p_oob_dev_pw_id = id;
|
|
|
|
wpa_s->p2p_oob_dev_pw = wpabuf_alloc_copy(
|
|
|
|
params.oob_dev_pw + WPS_OOB_PUBKEY_HASH_LEN + 2,
|
|
|
|
params.oob_dev_pw_len -
|
|
|
|
WPS_OOB_PUBKEY_HASH_LEN - 2);
|
|
|
|
if (wpa_s->p2p_oob_dev_pw == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (wpa_s->conf->wps_nfc_dh_pubkey == NULL &&
|
|
|
|
wps_nfc_gen_dh(&wpa_s->conf->wps_nfc_dh_pubkey,
|
|
|
|
&wpa_s->conf->wps_nfc_dh_privkey) < 0)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Using abbreviated WPS handshake "
|
|
|
|
"without Device Password");
|
|
|
|
wpa_s->p2p_oob_dev_pw_id = DEV_PW_NFC_CONNECTION_HANDOVER;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (params.next_step) {
|
|
|
|
case NO_ACTION:
|
2013-04-04 14:32:09 +02:00
|
|
|
case BOTH_GO:
|
2013-04-04 15:18:46 +02:00
|
|
|
case PEER_CLIENT:
|
2013-04-04 14:32:09 +02:00
|
|
|
/* already covered above */
|
2013-04-27 17:50:14 +02:00
|
|
|
return 0;
|
|
|
|
case JOIN_GROUP:
|
|
|
|
return wpas_p2p_nfc_join_group(wpa_s, ¶ms);
|
|
|
|
case AUTH_JOIN:
|
2013-09-08 18:45:04 +02:00
|
|
|
return wpas_p2p_nfc_auth_join(wpa_s, ¶ms, tag);
|
2013-04-27 17:50:14 +02:00
|
|
|
case INIT_GO_NEG:
|
2013-12-04 04:44:56 +01:00
|
|
|
return wpas_p2p_nfc_init_go_neg(wpa_s, ¶ms, forced_freq);
|
2013-04-27 17:50:14 +02:00
|
|
|
case RESP_GO_NEG:
|
|
|
|
/* TODO: use own OOB Dev Pw */
|
2013-12-04 04:44:56 +01:00
|
|
|
return wpas_p2p_nfc_resp_go_neg(wpa_s, ¶ms, forced_freq);
|
2013-04-27 17:50:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-04-27 17:38:41 +02:00
|
|
|
int wpas_p2p_nfc_tag_process(struct wpa_supplicant *wpa_s,
|
2013-12-04 04:44:56 +01:00
|
|
|
const struct wpabuf *data, int forced_freq)
|
2013-04-27 17:38:41 +02:00
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2013-12-04 04:44:56 +01:00
|
|
|
return wpas_p2p_nfc_connection_handover(wpa_s, data, 1, 1, forced_freq);
|
2013-04-27 17:38:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-04-27 17:50:14 +02:00
|
|
|
int wpas_p2p_nfc_report_handover(struct wpa_supplicant *wpa_s, int init,
|
|
|
|
const struct wpabuf *req,
|
2013-12-04 04:44:56 +01:00
|
|
|
const struct wpabuf *sel, int forced_freq)
|
2013-04-27 17:50:14 +02:00
|
|
|
{
|
|
|
|
struct wpabuf *tmp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "NFC: P2P connection handover reported");
|
|
|
|
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, "NFC: Req",
|
|
|
|
wpabuf_head(req), wpabuf_len(req));
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, "NFC: Sel",
|
|
|
|
wpabuf_head(sel), wpabuf_len(sel));
|
2013-12-04 04:44:56 +01:00
|
|
|
if (forced_freq)
|
|
|
|
wpa_printf(MSG_DEBUG, "NFC: Forced freq %d", forced_freq);
|
2013-04-27 17:50:14 +02:00
|
|
|
tmp = ndef_parse_p2p(init ? sel : req);
|
|
|
|
if (tmp == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Could not parse NDEF");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-12-04 04:44:56 +01:00
|
|
|
ret = wpas_p2p_nfc_connection_handover(wpa_s, tmp, init, 0,
|
|
|
|
forced_freq);
|
2013-04-27 17:50:14 +02:00
|
|
|
wpabuf_free(tmp);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-04-27 16:50:50 +02:00
|
|
|
|
|
|
|
int wpas_p2p_nfc_tag_enabled(struct wpa_supplicant *wpa_s, int enabled)
|
|
|
|
{
|
|
|
|
const u8 *if_addr;
|
|
|
|
int go_intent = wpa_s->conf->p2p_go_intent;
|
2013-09-08 17:08:26 +02:00
|
|
|
struct wpa_supplicant *iface;
|
2013-04-27 16:50:50 +02:00
|
|
|
|
|
|
|
if (wpa_s->global->p2p == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (!enabled) {
|
2013-09-08 17:08:26 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Disable use of own NFC Tag");
|
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next)
|
|
|
|
{
|
|
|
|
if (!iface->ap_iface)
|
|
|
|
continue;
|
|
|
|
hostapd_wps_nfc_token_disable(iface->ap_iface->bss[0]);
|
|
|
|
}
|
2013-04-27 16:50:50 +02:00
|
|
|
p2p_set_authorized_oob_dev_pw_id(wpa_s->global->p2p, 0,
|
|
|
|
0, NULL);
|
|
|
|
if (wpa_s->p2p_nfc_tag_enabled)
|
|
|
|
wpas_p2p_remove_pending_group_interface(wpa_s);
|
|
|
|
wpa_s->p2p_nfc_tag_enabled = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->global->p2p_disabled)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (wpa_s->conf->wps_nfc_dh_pubkey == NULL ||
|
|
|
|
wpa_s->conf->wps_nfc_dh_privkey == NULL ||
|
|
|
|
wpa_s->conf->wps_nfc_dev_pw == NULL ||
|
|
|
|
wpa_s->conf->wps_nfc_dev_pw_id < 0x10) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: NFC password token not configured "
|
|
|
|
"to allow static handover cases");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-09-08 17:08:26 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Enable use of own NFC Tag");
|
|
|
|
|
2013-04-27 16:50:50 +02:00
|
|
|
wpa_s->p2p_oob_dev_pw_id = wpa_s->conf->wps_nfc_dev_pw_id;
|
|
|
|
wpabuf_free(wpa_s->p2p_oob_dev_pw);
|
|
|
|
wpa_s->p2p_oob_dev_pw = wpabuf_dup(wpa_s->conf->wps_nfc_dev_pw);
|
|
|
|
if (wpa_s->p2p_oob_dev_pw == NULL)
|
|
|
|
return -1;
|
|
|
|
wpa_s->p2p_peer_oob_pk_hash_known = 0;
|
|
|
|
|
2014-03-14 15:55:10 +01:00
|
|
|
if (wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_GO ||
|
|
|
|
wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_CLIENT) {
|
|
|
|
/*
|
|
|
|
* P2P Group Interface present and the command came on group
|
|
|
|
* interface, so enable the token for the current interface.
|
|
|
|
*/
|
|
|
|
wpa_s->create_p2p_iface = 0;
|
|
|
|
} else {
|
|
|
|
wpa_s->create_p2p_iface = wpas_p2p_create_iface(wpa_s);
|
|
|
|
}
|
2013-04-27 16:50:50 +02:00
|
|
|
|
|
|
|
if (wpa_s->create_p2p_iface) {
|
|
|
|
enum wpa_driver_if_type iftype;
|
|
|
|
/* Prepare to add a new interface for the group */
|
|
|
|
iftype = WPA_IF_P2P_GROUP;
|
|
|
|
if (go_intent == 15)
|
|
|
|
iftype = WPA_IF_P2P_GO;
|
|
|
|
if (wpas_p2p_add_group_interface(wpa_s, iftype) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Failed to allocate a new "
|
|
|
|
"interface for the group");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if_addr = wpa_s->pending_interface_addr;
|
2016-01-24 16:36:49 +01:00
|
|
|
} else if (wpa_s->p2p_mgmt)
|
|
|
|
if_addr = wpa_s->parent->own_addr;
|
|
|
|
else
|
2013-04-27 16:50:50 +02:00
|
|
|
if_addr = wpa_s->own_addr;
|
|
|
|
|
|
|
|
wpa_s->p2p_nfc_tag_enabled = enabled;
|
|
|
|
|
2013-09-08 17:08:26 +02:00
|
|
|
for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
|
|
|
|
struct hostapd_data *hapd;
|
|
|
|
if (iface->ap_iface == NULL)
|
|
|
|
continue;
|
|
|
|
hapd = iface->ap_iface->bss[0];
|
|
|
|
wpabuf_free(hapd->conf->wps_nfc_dh_pubkey);
|
|
|
|
hapd->conf->wps_nfc_dh_pubkey =
|
|
|
|
wpabuf_dup(wpa_s->conf->wps_nfc_dh_pubkey);
|
|
|
|
wpabuf_free(hapd->conf->wps_nfc_dh_privkey);
|
|
|
|
hapd->conf->wps_nfc_dh_privkey =
|
|
|
|
wpabuf_dup(wpa_s->conf->wps_nfc_dh_privkey);
|
|
|
|
wpabuf_free(hapd->conf->wps_nfc_dev_pw);
|
|
|
|
hapd->conf->wps_nfc_dev_pw =
|
|
|
|
wpabuf_dup(wpa_s->conf->wps_nfc_dev_pw);
|
|
|
|
hapd->conf->wps_nfc_dev_pw_id = wpa_s->conf->wps_nfc_dev_pw_id;
|
|
|
|
|
|
|
|
if (hostapd_wps_nfc_token_enable(iface->ap_iface->bss[0]) < 0) {
|
|
|
|
wpa_dbg(iface, MSG_DEBUG,
|
|
|
|
"P2P: Failed to enable NFC Tag for GO");
|
|
|
|
}
|
|
|
|
}
|
2013-04-27 16:50:50 +02:00
|
|
|
p2p_set_authorized_oob_dev_pw_id(
|
|
|
|
wpa_s->global->p2p, wpa_s->conf->wps_nfc_dev_pw_id, go_intent,
|
|
|
|
if_addr);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-02-15 16:07:28 +01:00
|
|
|
#endif /* CONFIG_WPS_NFC */
|
2014-05-19 09:05:39 +02:00
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_optimize_listen_channel(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs,
|
|
|
|
unsigned int num)
|
|
|
|
{
|
|
|
|
u8 curr_chan, cand, chan;
|
|
|
|
unsigned int i;
|
|
|
|
|
2015-07-27 21:24:25 +02:00
|
|
|
/*
|
|
|
|
* If possible, optimize the Listen channel to be a channel that is
|
|
|
|
* already used by one of the other interfaces.
|
|
|
|
*/
|
|
|
|
if (!wpa_s->conf->p2p_optimize_listen_chan)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!wpa_s->current_ssid || wpa_s->wpa_state != WPA_COMPLETED)
|
|
|
|
return;
|
|
|
|
|
2014-05-19 09:05:39 +02:00
|
|
|
curr_chan = p2p_get_listen_channel(wpa_s->global->p2p);
|
|
|
|
for (i = 0, cand = 0; i < num; i++) {
|
|
|
|
ieee80211_freq_to_chan(freqs[i].freq, &chan);
|
|
|
|
if (curr_chan == chan) {
|
|
|
|
cand = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (chan == 1 || chan == 6 || chan == 11)
|
|
|
|
cand = chan;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cand) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
2015-02-03 15:13:35 +01:00
|
|
|
"P2P: Update Listen channel to %u based on operating channel",
|
2014-05-19 09:05:39 +02:00
|
|
|
cand);
|
|
|
|
p2p_set_listen_channel(wpa_s->global->p2p, 81, cand, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
static int wpas_p2p_move_go_csa(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
2015-09-08 11:46:16 +02:00
|
|
|
struct hostapd_config *conf;
|
|
|
|
struct p2p_go_neg_results params;
|
|
|
|
struct csa_settings csa_settings;
|
|
|
|
struct wpa_ssid *current_ssid = wpa_s->current_ssid;
|
|
|
|
int old_freq = current_ssid->frequency;
|
|
|
|
int ret;
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_AP_CSA)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "CSA is not enabled");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-09-08 11:46:16 +02:00
|
|
|
/*
|
|
|
|
* TODO: This function may not always work correctly. For example,
|
|
|
|
* when we have a running GO and a BSS on a DFS channel.
|
|
|
|
*/
|
2019-10-17 19:44:14 +02:00
|
|
|
if (wpas_p2p_init_go_params(wpa_s, ¶ms, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
NULL)) {
|
2015-09-08 11:46:16 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: Failed to select new frequency for GO");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (current_ssid->frequency == params.freq) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: Selected same frequency - not moving GO");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
conf = hostapd_config_defaults();
|
|
|
|
if (!conf) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: Failed to allocate default config");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
current_ssid->frequency = params.freq;
|
|
|
|
if (wpa_supplicant_conf_ap_ht(wpa_s, current_ssid, conf)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: Failed to create new GO config");
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conf->hw_mode != wpa_s->ap_iface->current_mode->mode) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: CSA to a different band is not supported");
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(&csa_settings, 0, sizeof(csa_settings));
|
|
|
|
csa_settings.cs_count = P2P_GO_CSA_COUNT;
|
|
|
|
csa_settings.block_tx = P2P_GO_CSA_BLOCK_TX;
|
|
|
|
csa_settings.freq_params.freq = params.freq;
|
|
|
|
csa_settings.freq_params.sec_channel_offset = conf->secondary_channel;
|
|
|
|
csa_settings.freq_params.ht_enabled = conf->ieee80211n;
|
|
|
|
csa_settings.freq_params.bandwidth = conf->secondary_channel ? 40 : 20;
|
|
|
|
|
|
|
|
if (conf->ieee80211ac) {
|
|
|
|
int freq1 = 0, freq2 = 0;
|
2015-09-08 11:46:30 +02:00
|
|
|
u8 chan, opclass;
|
|
|
|
|
|
|
|
if (ieee80211_freq_to_channel_ext(params.freq,
|
|
|
|
conf->secondary_channel,
|
|
|
|
conf->vht_oper_chwidth,
|
|
|
|
&opclass, &chan) ==
|
|
|
|
NUM_HOSTAPD_MODES) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P CSA: Bad freq");
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
2015-09-08 11:46:16 +02:00
|
|
|
|
|
|
|
if (conf->vht_oper_centr_freq_seg0_idx)
|
|
|
|
freq1 = ieee80211_chan_to_freq(
|
2015-09-08 11:46:30 +02:00
|
|
|
NULL, opclass,
|
2015-09-08 11:46:16 +02:00
|
|
|
conf->vht_oper_centr_freq_seg0_idx);
|
|
|
|
|
|
|
|
if (conf->vht_oper_centr_freq_seg1_idx)
|
|
|
|
freq2 = ieee80211_chan_to_freq(
|
2015-09-08 11:46:30 +02:00
|
|
|
NULL, opclass,
|
2015-09-08 11:46:16 +02:00
|
|
|
conf->vht_oper_centr_freq_seg1_idx);
|
|
|
|
|
|
|
|
if (freq1 < 0 || freq2 < 0) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P CSA: Selected invalid VHT center freqs");
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
csa_settings.freq_params.vht_enabled = conf->ieee80211ac;
|
|
|
|
csa_settings.freq_params.center_freq1 = freq1;
|
|
|
|
csa_settings.freq_params.center_freq2 = freq2;
|
|
|
|
|
|
|
|
switch (conf->vht_oper_chwidth) {
|
2019-05-20 09:55:06 +02:00
|
|
|
case CHANWIDTH_80MHZ:
|
|
|
|
case CHANWIDTH_80P80MHZ:
|
2015-09-08 11:46:16 +02:00
|
|
|
csa_settings.freq_params.bandwidth = 80;
|
|
|
|
break;
|
2019-05-20 09:55:06 +02:00
|
|
|
case CHANWIDTH_160MHZ:
|
2015-09-08 11:46:16 +02:00
|
|
|
csa_settings.freq_params.bandwidth = 160;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ap_switch_channel(wpa_s, &csa_settings);
|
|
|
|
out:
|
|
|
|
current_ssid->frequency = old_freq;
|
|
|
|
hostapd_config_free(conf);
|
|
|
|
return ret;
|
2015-07-27 21:24:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_move_go_no_csa(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct p2p_go_neg_results params;
|
|
|
|
struct wpa_ssid *current_ssid = wpa_s->current_ssid;
|
2020-08-26 12:55:45 +02:00
|
|
|
void (*ap_configured_cb)(void *ctx, void *data);
|
|
|
|
void *ap_configured_cb_ctx, *ap_configured_cb_data;
|
2015-07-27 21:24:19 +02:00
|
|
|
|
|
|
|
wpa_msg_global(wpa_s, MSG_INFO, P2P_EVENT_REMOVE_AND_REFORM_GROUP);
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Move GO from freq=%d MHz",
|
|
|
|
current_ssid->frequency);
|
|
|
|
|
|
|
|
/* Stop the AP functionality */
|
|
|
|
/* TODO: Should do this in a way that does not indicated to possible
|
|
|
|
* P2P Clients in the group that the group is terminated. */
|
2020-08-26 12:55:45 +02:00
|
|
|
/* If this action occurs before a group is started, the callback should
|
|
|
|
* be preserved, or GROUP-STARTED event would be lost. If this action
|
|
|
|
* occurs after a group is started, these pointers are all NULL and
|
|
|
|
* harmless. */
|
|
|
|
ap_configured_cb = wpa_s->ap_configured_cb;
|
|
|
|
ap_configured_cb_ctx = wpa_s->ap_configured_cb_ctx;
|
|
|
|
ap_configured_cb_data = wpa_s->ap_configured_cb_data;
|
2015-07-27 21:24:19 +02:00
|
|
|
wpa_supplicant_ap_deinit(wpa_s);
|
|
|
|
|
|
|
|
/* Reselect the GO frequency */
|
2019-10-17 19:44:14 +02:00
|
|
|
if (wpas_p2p_init_go_params(wpa_s, ¶ms, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
NULL)) {
|
2015-07-27 21:24:19 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Failed to reselect freq");
|
|
|
|
wpas_p2p_group_delete(wpa_s,
|
|
|
|
P2P_GROUP_REMOVAL_GO_LEAVE_CHANNEL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: New freq selected for the GO (%u MHz)",
|
|
|
|
params.freq);
|
|
|
|
|
|
|
|
if (params.freq &&
|
|
|
|
!p2p_supported_freq_go(wpa_s->global->p2p, params.freq)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: Selected freq (%u MHz) is not valid for P2P",
|
|
|
|
params.freq);
|
|
|
|
wpas_p2p_group_delete(wpa_s,
|
|
|
|
P2P_GROUP_REMOVAL_GO_LEAVE_CHANNEL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-08-26 12:55:45 +02:00
|
|
|
/* Restore preserved callback parameters */
|
|
|
|
wpa_s->ap_configured_cb = ap_configured_cb;
|
|
|
|
wpa_s->ap_configured_cb_ctx = ap_configured_cb_ctx;
|
|
|
|
wpa_s->ap_configured_cb_data = ap_configured_cb_data;
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/* Update the frequency */
|
|
|
|
current_ssid->frequency = params.freq;
|
|
|
|
wpa_s->connect_without_scan = current_ssid;
|
|
|
|
wpa_s->reassociate = 1;
|
|
|
|
wpa_s->disconnected = 0;
|
|
|
|
wpa_supplicant_req_scan(wpa_s, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_move_go(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
|
|
|
|
if (!wpa_s->ap_iface || !wpa_s->current_ssid)
|
|
|
|
return;
|
|
|
|
|
2015-07-27 21:24:20 +02:00
|
|
|
wpas_p2p_go_update_common_freqs(wpa_s);
|
|
|
|
|
2015-09-08 11:46:19 +02:00
|
|
|
/* Do not move GO in the middle of a CSA */
|
|
|
|
if (hostapd_csa_in_progress(wpa_s->ap_iface)) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"P2P: CSA is in progress - not moving GO");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/*
|
|
|
|
* First, try a channel switch flow. If it is not supported or fails,
|
|
|
|
* take down the GO and bring it up again.
|
|
|
|
*/
|
|
|
|
if (wpas_p2p_move_go_csa(wpa_s) < 0)
|
|
|
|
wpas_p2p_move_go_no_csa(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:26 +02:00
|
|
|
static void wpas_p2p_reconsider_moving_go(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
|
|
struct wpa_used_freq_data *freqs = NULL;
|
|
|
|
unsigned int num = wpa_s->num_multichan_concurrent;
|
|
|
|
|
|
|
|
freqs = os_calloc(num, sizeof(struct wpa_used_freq_data));
|
|
|
|
if (!freqs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
num = get_shared_radio_freqs_data(wpa_s, freqs, num);
|
|
|
|
|
|
|
|
/* Previous attempt to move a GO was not possible -- try again. */
|
2015-07-27 21:24:27 +02:00
|
|
|
wpas_p2p_consider_moving_gos(wpa_s, freqs, num,
|
|
|
|
WPAS_P2P_CHANNEL_UPDATE_ANY);
|
2015-07-27 21:24:26 +02:00
|
|
|
|
|
|
|
os_free(freqs);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/*
|
|
|
|
* Consider moving a GO from its currently used frequency:
|
|
|
|
* 1. It is possible that due to regulatory consideration the frequency
|
|
|
|
* can no longer be used and there is a need to evacuate the GO.
|
|
|
|
* 2. It is possible that due to MCC considerations, it would be preferable
|
|
|
|
* to move the GO to a channel that is currently used by some other
|
|
|
|
* station interface.
|
|
|
|
*
|
|
|
|
* In case a frequency that became invalid is once again valid, cancel a
|
|
|
|
* previously initiated GO frequency change.
|
|
|
|
*/
|
|
|
|
static void wpas_p2p_consider_moving_one_go(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs,
|
|
|
|
unsigned int num)
|
|
|
|
{
|
|
|
|
unsigned int i, invalid_freq = 0, policy_move = 0, flags = 0;
|
|
|
|
unsigned int timeout;
|
|
|
|
int freq;
|
2017-09-27 12:43:11 +02:00
|
|
|
int dfs_offload;
|
2015-07-27 21:24:19 +02:00
|
|
|
|
2015-07-27 21:24:20 +02:00
|
|
|
wpas_p2p_go_update_common_freqs(wpa_s);
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
freq = wpa_s->current_ssid->frequency;
|
2017-09-27 12:43:11 +02:00
|
|
|
dfs_offload = (wpa_s->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
|
2018-04-13 11:55:40 +02:00
|
|
|
ieee80211_is_dfs(freq, wpa_s->hw.modes, wpa_s->hw.num_modes);
|
2015-07-27 21:24:19 +02:00
|
|
|
for (i = 0, invalid_freq = 0; i < num; i++) {
|
|
|
|
if (freqs[i].freq == freq) {
|
|
|
|
flags = freqs[i].flags;
|
|
|
|
|
|
|
|
/* The channel is invalid, must change it */
|
2017-09-27 12:43:11 +02:00
|
|
|
if (!p2p_supported_freq_go(wpa_s->global->p2p, freq) &&
|
|
|
|
!dfs_offload) {
|
2015-07-27 21:24:19 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Freq=%d MHz no longer valid for GO",
|
|
|
|
freq);
|
|
|
|
invalid_freq = 1;
|
|
|
|
}
|
|
|
|
} else if (freqs[i].flags == 0) {
|
|
|
|
/* Freq is not used by any other station interface */
|
|
|
|
continue;
|
|
|
|
} else if (!p2p_supported_freq(wpa_s->global->p2p,
|
2017-09-27 12:43:11 +02:00
|
|
|
freqs[i].freq) && !dfs_offload) {
|
2015-07-27 21:24:19 +02:00
|
|
|
/* Freq is not valid for P2P use cases */
|
|
|
|
continue;
|
|
|
|
} else if (wpa_s->conf->p2p_go_freq_change_policy ==
|
|
|
|
P2P_GO_FREQ_MOVE_SCM) {
|
|
|
|
policy_move = 1;
|
|
|
|
} else if (wpa_s->conf->p2p_go_freq_change_policy ==
|
|
|
|
P2P_GO_FREQ_MOVE_SCM_PEER_SUPPORTS &&
|
|
|
|
wpas_p2p_go_is_peer_freq(wpa_s, freqs[i].freq)) {
|
|
|
|
policy_move = 1;
|
2015-09-08 11:46:20 +02:00
|
|
|
} else if ((wpa_s->conf->p2p_go_freq_change_policy ==
|
|
|
|
P2P_GO_FREQ_MOVE_SCM_ECSA) &&
|
|
|
|
wpas_p2p_go_is_peer_freq(wpa_s, freqs[i].freq)) {
|
|
|
|
if (!p2p_get_group_num_members(wpa_s->p2p_group)) {
|
|
|
|
policy_move = 1;
|
|
|
|
} else if ((wpa_s->drv_flags &
|
|
|
|
WPA_DRIVER_FLAGS_AP_CSA) &&
|
|
|
|
wpas_p2p_go_clients_support_ecsa(wpa_s)) {
|
|
|
|
u8 chan;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We do not support CSA between bands, so move
|
|
|
|
* GO only within the same band.
|
|
|
|
*/
|
|
|
|
if (wpa_s->ap_iface->current_mode->mode ==
|
|
|
|
ieee80211_freq_to_chan(freqs[i].freq,
|
|
|
|
&chan))
|
|
|
|
policy_move = 1;
|
|
|
|
}
|
2015-07-27 21:24:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: GO move: invalid_freq=%u, policy_move=%u, flags=0x%X",
|
|
|
|
invalid_freq, policy_move, flags);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The channel is valid, or we are going to have a policy move, so
|
|
|
|
* cancel timeout.
|
|
|
|
*/
|
|
|
|
if (!invalid_freq || policy_move) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Cancel a GO move from freq=%d MHz", freq);
|
|
|
|
eloop_cancel_timeout(wpas_p2p_move_go, wpa_s, NULL);
|
2015-07-27 21:24:26 +02:00
|
|
|
|
|
|
|
if (wpas_p2p_in_progress(wpa_s)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: GO move: policy CS is not allowed - setting timeout to re-consider GO move");
|
|
|
|
eloop_cancel_timeout(wpas_p2p_reconsider_moving_go,
|
|
|
|
wpa_s, NULL);
|
|
|
|
eloop_register_timeout(P2P_RECONSIDER_GO_MOVE_DELAY, 0,
|
|
|
|
wpas_p2p_reconsider_moving_go,
|
|
|
|
wpa_s, NULL);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-27 21:24:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!invalid_freq && (!policy_move || flags != 0)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Not initiating a GO frequency change");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-09-08 11:46:19 +02:00
|
|
|
/*
|
|
|
|
* Do not consider moving GO if it is in the middle of a CSA. When the
|
|
|
|
* CSA is finished this flow should be retriggered.
|
|
|
|
*/
|
|
|
|
if (hostapd_csa_in_progress(wpa_s->ap_iface)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Not initiating a GO frequency change - CSA is in progress");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
if (invalid_freq && !wpas_p2p_disallowed_freq(wpa_s->global, freq))
|
|
|
|
timeout = P2P_GO_FREQ_CHANGE_TIME;
|
|
|
|
else
|
|
|
|
timeout = 0;
|
|
|
|
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Move GO from freq=%d MHz in %d secs",
|
|
|
|
freq, timeout);
|
|
|
|
eloop_cancel_timeout(wpas_p2p_move_go, wpa_s, NULL);
|
|
|
|
eloop_register_timeout(timeout, 0, wpas_p2p_move_go, wpa_s, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpas_p2p_consider_moving_gos(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_used_freq_data *freqs,
|
2015-07-27 21:24:27 +02:00
|
|
|
unsigned int num,
|
|
|
|
enum wpas_p2p_channel_update_trig trig)
|
2015-07-27 21:24:19 +02:00
|
|
|
{
|
|
|
|
struct wpa_supplicant *ifs;
|
|
|
|
|
2015-07-27 21:24:26 +02:00
|
|
|
eloop_cancel_timeout(wpas_p2p_reconsider_moving_go, ELOOP_ALL_CTX,
|
|
|
|
NULL);
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
/*
|
|
|
|
* Travers all the radio interfaces, and for each GO interface, check
|
|
|
|
* if there is a need to move the GO from the frequency it is using,
|
|
|
|
* or in case the frequency is valid again, cancel the evacuation flow.
|
|
|
|
*/
|
|
|
|
dl_list_for_each(ifs, &wpa_s->radio->ifaces, struct wpa_supplicant,
|
|
|
|
radio_list) {
|
|
|
|
if (ifs->current_ssid == NULL ||
|
|
|
|
ifs->current_ssid->mode != WPAS_MODE_P2P_GO)
|
|
|
|
continue;
|
|
|
|
|
2015-07-27 21:24:27 +02:00
|
|
|
/*
|
|
|
|
* The GO was just started or completed channel switch, no need
|
|
|
|
* to move it.
|
|
|
|
*/
|
|
|
|
if (wpa_s == ifs &&
|
|
|
|
(trig == WPAS_P2P_CHANNEL_UPDATE_STATE_CHANGE ||
|
|
|
|
trig == WPAS_P2P_CHANNEL_UPDATE_CS)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: GO move - schedule re-consideration");
|
|
|
|
eloop_register_timeout(P2P_RECONSIDER_GO_MOVE_DELAY, 0,
|
|
|
|
wpas_p2p_reconsider_moving_go,
|
|
|
|
wpa_s, NULL);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:24:19 +02:00
|
|
|
wpas_p2p_consider_moving_one_go(ifs, freqs, num);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-19 09:05:39 +02:00
|
|
|
void wpas_p2p_indicate_state_change(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
|
|
|
|
return;
|
|
|
|
|
2015-07-27 21:24:27 +02:00
|
|
|
wpas_p2p_update_channel_list(wpa_s,
|
|
|
|
WPAS_P2P_CHANNEL_UPDATE_STATE_CHANGE);
|
2014-05-19 09:05:39 +02:00
|
|
|
}
|
2014-06-15 18:31:53 +02:00
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_deinit_iface(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s == wpa_s->global->p2p_init_wpa_s && wpa_s->global->p2p) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Disable P2P since removing "
|
|
|
|
"the management interface is being removed");
|
|
|
|
wpas_p2p_deinit_global(wpa_s->global);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void wpas_p2p_ap_deinit(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
if (wpa_s->ap_iface->bss)
|
|
|
|
wpa_s->ap_iface->bss[0]->p2p_group = NULL;
|
|
|
|
wpas_p2p_group_deinit(wpa_s);
|
|
|
|
}
|
2016-06-24 20:36:18 +02:00
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_lo_start(struct wpa_supplicant *wpa_s, unsigned int freq,
|
|
|
|
unsigned int period, unsigned int interval,
|
|
|
|
unsigned int count)
|
|
|
|
{
|
|
|
|
struct p2p_data *p2p = wpa_s->global->p2p;
|
|
|
|
u8 *device_types;
|
|
|
|
size_t dev_types_len;
|
|
|
|
struct wpabuf *buf;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (wpa_s->p2p_lo_started) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P Listen offload is already started");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_s->global->p2p == NULL ||
|
|
|
|
!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "P2P: Listen offload not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!p2p_supported_freq(wpa_s->global->p2p, freq)) {
|
|
|
|
wpa_printf(MSG_ERROR, "P2P: Input channel not supported: %u",
|
|
|
|
freq);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get device type */
|
|
|
|
dev_types_len = (wpa_s->conf->num_sec_device_types + 1) *
|
|
|
|
WPS_DEV_TYPE_LEN;
|
|
|
|
device_types = os_malloc(dev_types_len);
|
|
|
|
if (!device_types)
|
|
|
|
return -1;
|
|
|
|
os_memcpy(device_types, wpa_s->conf->device_type, WPS_DEV_TYPE_LEN);
|
|
|
|
os_memcpy(&device_types[WPS_DEV_TYPE_LEN], wpa_s->conf->sec_device_type,
|
|
|
|
wpa_s->conf->num_sec_device_types * WPS_DEV_TYPE_LEN);
|
|
|
|
|
|
|
|
/* Get Probe Response IE(s) */
|
|
|
|
buf = p2p_build_probe_resp_template(p2p, freq);
|
|
|
|
if (!buf) {
|
|
|
|
os_free(device_types);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wpa_drv_p2p_lo_start(wpa_s, freq, period, interval, count,
|
|
|
|
device_types, dev_types_len,
|
|
|
|
wpabuf_mhead_u8(buf), wpabuf_len(buf));
|
|
|
|
if (ret < 0)
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Failed to start P2P listen offload");
|
|
|
|
|
|
|
|
os_free(device_types);
|
|
|
|
wpabuf_free(buf);
|
|
|
|
|
|
|
|
if (ret == 0) {
|
|
|
|
wpa_s->p2p_lo_started = 1;
|
|
|
|
|
|
|
|
/* Stop current P2P listen if any */
|
|
|
|
wpas_stop_listen(wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int wpas_p2p_lo_stop(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!wpa_s->p2p_lo_started)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = wpa_drv_p2p_lo_stop(wpa_s);
|
|
|
|
if (ret < 0)
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"P2P: Failed to stop P2P listen offload");
|
|
|
|
|
|
|
|
wpa_s->p2p_lo_started = 0;
|
|
|
|
return ret;
|
|
|
|
}
|