P2PS: PD Request processing and PD Response building
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
5fefce2747
commit
1300cc8e8f
5 changed files with 434 additions and 14 deletions
|
@ -4092,7 +4092,7 @@ int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
|
|||
"country=%c%c\n"
|
||||
"oper_freq=%d\n"
|
||||
"req_config_methods=0x%x\n"
|
||||
"flags=%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
|
||||
"flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
|
||||
"status=%d\n"
|
||||
"invitation_reqs=%u\n",
|
||||
(int) (now.sec - dev->last_seen.sec),
|
||||
|
@ -4118,6 +4118,8 @@ int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
|
|||
"[PD_PEER_DISPLAY]" : "",
|
||||
dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
|
||||
"[PD_PEER_KEYPAD]" : "",
|
||||
dev->flags & P2P_DEV_PD_PEER_P2PS ?
|
||||
"[PD_PEER_P2PS]" : "",
|
||||
dev->flags & P2P_DEV_USER_REJECTED ?
|
||||
"[USER_REJECTED]" : "",
|
||||
dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
|
||||
|
|
|
@ -1004,6 +1004,17 @@ struct p2p_config {
|
|||
* provisioning. It is mainly used for P2PS pending group creation.
|
||||
*/
|
||||
int (*prov_disc_resp_cb)(void *ctx);
|
||||
|
||||
/**
|
||||
* p2ps_group_capability - Determine group capability
|
||||
*
|
||||
* This function can be used to determine group capability based on
|
||||
* information from P2PS PD exchange and the current state of ongoing
|
||||
* groups and driver capabilities.
|
||||
*
|
||||
* P2PS_SETUP_* bitmap is used as the parameters and return value.
|
||||
*/
|
||||
u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role);
|
||||
};
|
||||
|
||||
|
||||
|
|
|
@ -106,6 +106,7 @@ struct p2p_device {
|
|||
#define P2P_DEV_NO_PREF_CHAN BIT(18)
|
||||
#define P2P_DEV_WAIT_INV_REQ_ACK BIT(19)
|
||||
#define P2P_DEV_P2PS_REPORTED BIT(20)
|
||||
#define P2P_DEV_PD_PEER_P2PS BIT(21)
|
||||
unsigned int flags;
|
||||
|
||||
int status; /* enum p2p_status_code */
|
||||
|
|
431
src/p2p/p2p_pd.c
431
src/p2p/p2p_pd.c
|
@ -165,6 +165,7 @@ static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
|
|||
u8 dialog_token = dev->dialog_token;
|
||||
u16 config_methods = dev->req_config_methods;
|
||||
struct p2p_device *go = join ? dev : NULL;
|
||||
u8 group_capab;
|
||||
|
||||
#ifdef CONFIG_WIFI_DISPLAY
|
||||
if (p2p->wfd_ie_prov_disc_req)
|
||||
|
@ -185,8 +186,19 @@ static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
|
|||
p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_REQ, dialog_token);
|
||||
|
||||
len = p2p_buf_add_ie_hdr(buf);
|
||||
|
||||
group_capab = 0;
|
||||
if (p2p->p2ps_prov) {
|
||||
group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
|
||||
group_capab |= P2P_GROUP_CAPAB_PERSISTENT_RECONN;
|
||||
if (p2p->cross_connect)
|
||||
group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
|
||||
if (p2p->cfg->p2p_intra_bss)
|
||||
group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
|
||||
}
|
||||
p2p_buf_add_capability(buf, p2p->dev_capab &
|
||||
~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
|
||||
~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
|
||||
group_capab);
|
||||
p2p_buf_add_device_info(buf, p2p, NULL);
|
||||
if (p2p->p2ps_prov) {
|
||||
p2ps_add_pd_req_attrs(p2p, dev, buf, config_methods);
|
||||
|
@ -212,13 +224,19 @@ static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
|
|||
|
||||
|
||||
static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
|
||||
struct p2p_device *dev,
|
||||
u8 dialog_token,
|
||||
enum p2p_status_code status,
|
||||
u16 config_methods,
|
||||
u32 adv_id,
|
||||
const u8 *group_id,
|
||||
size_t group_id_len)
|
||||
size_t group_id_len,
|
||||
const u8 *persist_ssid,
|
||||
size_t persist_ssid_len)
|
||||
{
|
||||
struct wpabuf *buf;
|
||||
size_t extra = 0;
|
||||
int persist = 0;
|
||||
|
||||
#ifdef CONFIG_WIFI_DISPLAY
|
||||
struct wpabuf *wfd_ie = p2p->wfd_ie_prov_disc_resp;
|
||||
|
@ -244,12 +262,103 @@ static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
|
|||
if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_PD_RESP])
|
||||
extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_PD_RESP]);
|
||||
|
||||
buf = wpabuf_alloc(100 + extra);
|
||||
buf = wpabuf_alloc(1000 + extra);
|
||||
if (buf == NULL)
|
||||
return NULL;
|
||||
|
||||
p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_RESP, dialog_token);
|
||||
|
||||
/* Add P2P IE for P2PS */
|
||||
if (p2p->p2ps_prov && p2p->p2ps_prov->adv_id == adv_id) {
|
||||
u8 feat_cap_mask[] = { 1, 0 };
|
||||
u8 *len = p2p_buf_add_ie_hdr(buf);
|
||||
struct p2ps_provision *prov = p2p->p2ps_prov;
|
||||
u8 group_capab;
|
||||
|
||||
if (!status && prov->status != -1)
|
||||
status = prov->status;
|
||||
|
||||
p2p_buf_add_status(buf, status);
|
||||
group_capab = P2P_GROUP_CAPAB_PERSISTENT_GROUP |
|
||||
P2P_GROUP_CAPAB_PERSISTENT_RECONN;
|
||||
if (p2p->cross_connect)
|
||||
group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
|
||||
if (p2p->cfg->p2p_intra_bss)
|
||||
group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
|
||||
p2p_buf_add_capability(buf, p2p->dev_capab &
|
||||
~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
|
||||
group_capab);
|
||||
p2p_buf_add_device_info(buf, p2p, NULL);
|
||||
|
||||
if (persist_ssid && p2p->cfg->get_persistent_group &&
|
||||
(status == P2P_SC_SUCCESS ||
|
||||
status == P2P_SC_SUCCESS_DEFERRED)) {
|
||||
u8 ssid[32];
|
||||
size_t ssid_len;
|
||||
u8 go_dev_addr[ETH_ALEN];
|
||||
|
||||
persist = p2p->cfg->get_persistent_group(
|
||||
p2p->cfg->cb_ctx,
|
||||
dev->info.p2p_device_addr,
|
||||
persist_ssid, persist_ssid_len, go_dev_addr,
|
||||
ssid, &ssid_len);
|
||||
if (persist)
|
||||
p2p_buf_add_persistent_group_info(
|
||||
buf, go_dev_addr, ssid, ssid_len);
|
||||
}
|
||||
|
||||
if (!persist && (prov->conncap & P2PS_SETUP_GROUP_OWNER))
|
||||
p2ps_add_new_group_info(p2p, buf);
|
||||
|
||||
/* Add Operating Channel if conncap indicates GO */
|
||||
if (persist || (prov->conncap & P2PS_SETUP_GROUP_OWNER)) {
|
||||
u8 tmp;
|
||||
|
||||
if (dev)
|
||||
p2p_go_select_channel(p2p, dev, &tmp);
|
||||
|
||||
if (p2p->op_reg_class && p2p->op_channel)
|
||||
p2p_buf_add_operating_channel(
|
||||
buf, p2p->cfg->country,
|
||||
p2p->op_reg_class,
|
||||
p2p->op_channel);
|
||||
else
|
||||
p2p_buf_add_operating_channel(
|
||||
buf, p2p->cfg->country,
|
||||
p2p->cfg->op_reg_class,
|
||||
p2p->cfg->op_channel);
|
||||
}
|
||||
|
||||
p2p_buf_add_channel_list(buf, p2p->cfg->country,
|
||||
&p2p->cfg->channels);
|
||||
|
||||
if (!persist && (status == P2P_SC_SUCCESS ||
|
||||
status == P2P_SC_SUCCESS_DEFERRED))
|
||||
p2p_buf_add_connection_capability(buf, prov->conncap);
|
||||
|
||||
p2p_buf_add_advertisement_id(buf, adv_id, prov->adv_mac);
|
||||
|
||||
p2p_buf_add_config_timeout(buf, p2p->go_timeout,
|
||||
p2p->client_timeout);
|
||||
|
||||
p2p_buf_add_session_id(buf, prov->session_id,
|
||||
prov->session_mac);
|
||||
|
||||
p2p_buf_add_feature_capability(buf, sizeof(feat_cap_mask),
|
||||
feat_cap_mask);
|
||||
p2p_buf_update_ie_hdr(buf, len);
|
||||
} else if (status != P2P_SC_SUCCESS || adv_id) {
|
||||
u8 *len = p2p_buf_add_ie_hdr(buf);
|
||||
|
||||
p2p_buf_add_status(buf, status);
|
||||
|
||||
if (p2p->p2ps_prov)
|
||||
p2p_buf_add_advertisement_id(buf, adv_id,
|
||||
p2p->p2ps_prov->adv_mac);
|
||||
|
||||
p2p_buf_update_ie_hdr(buf, len);
|
||||
}
|
||||
|
||||
/* WPS IE with Config Methods attribute */
|
||||
p2p_build_wps_ie_config_methods(buf, config_methods);
|
||||
|
||||
|
@ -265,14 +374,50 @@ static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
|
|||
}
|
||||
|
||||
|
||||
static int p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id,
|
||||
u32 session_id, u16 method,
|
||||
const u8 *session_mac, const u8 *adv_mac)
|
||||
{
|
||||
struct p2ps_provision *tmp;
|
||||
|
||||
if (!p2p->p2ps_prov) {
|
||||
p2p->p2ps_prov = os_zalloc(sizeof(struct p2ps_provision) + 1);
|
||||
if (!p2p->p2ps_prov)
|
||||
return -1;
|
||||
} else {
|
||||
os_memset(p2p->p2ps_prov, 0, sizeof(struct p2ps_provision) + 1);
|
||||
}
|
||||
|
||||
tmp = p2p->p2ps_prov;
|
||||
tmp->adv_id = adv_id;
|
||||
tmp->session_id = session_id;
|
||||
tmp->method = method;
|
||||
os_memcpy(tmp->session_mac, session_mac, ETH_ALEN);
|
||||
os_memcpy(tmp->adv_mac, adv_mac, ETH_ALEN);
|
||||
tmp->info[0] = '\0';
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
void p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
|
||||
const u8 *data, size_t len, int rx_freq)
|
||||
{
|
||||
struct p2p_message msg;
|
||||
struct p2p_device *dev;
|
||||
int freq;
|
||||
int reject = 1;
|
||||
enum p2p_status_code reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
struct wpabuf *resp;
|
||||
u32 adv_id = 0;
|
||||
struct p2ps_advertisement *p2ps_adv = NULL;
|
||||
u8 conncap = P2PS_SETUP_NEW;
|
||||
u8 auto_accept = 0;
|
||||
u32 session_id = 0;
|
||||
u8 session_mac[ETH_ALEN];
|
||||
u8 adv_mac[ETH_ALEN];
|
||||
u8 group_mac[ETH_ALEN];
|
||||
int passwd_id = DEV_PW_DEFAULT;
|
||||
u16 config_methods;
|
||||
|
||||
if (p2p_parse(data, len, &msg))
|
||||
return;
|
||||
|
@ -298,12 +443,13 @@ void p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
|
|||
|
||||
if (!(msg.wps_config_methods &
|
||||
(WPS_CONFIG_DISPLAY | WPS_CONFIG_KEYPAD |
|
||||
WPS_CONFIG_PUSHBUTTON))) {
|
||||
WPS_CONFIG_PUSHBUTTON | WPS_CONFIG_P2PS))) {
|
||||
p2p_dbg(p2p, "Unsupported Config Methods in Provision Discovery Request");
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (msg.group_id) {
|
||||
/* Legacy (non-P2PS) - Unknown groups allowed for P2PS */
|
||||
if (!msg.adv_id && msg.group_id) {
|
||||
size_t i;
|
||||
for (i = 0; i < p2p->num_groups; i++) {
|
||||
if (p2p_group_is_group_id_match(p2p->groups[i],
|
||||
|
@ -317,28 +463,203 @@ void p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
|
|||
}
|
||||
}
|
||||
|
||||
if (dev)
|
||||
if (dev) {
|
||||
dev->flags &= ~(P2P_DEV_PD_PEER_DISPLAY |
|
||||
P2P_DEV_PD_PEER_KEYPAD);
|
||||
P2P_DEV_PD_PEER_KEYPAD |
|
||||
P2P_DEV_PD_PEER_P2PS);
|
||||
|
||||
/* Remove stale persistent groups */
|
||||
if (p2p->cfg->remove_stale_groups) {
|
||||
p2p->cfg->remove_stale_groups(
|
||||
p2p->cfg->cb_ctx, dev->info.p2p_device_addr,
|
||||
msg.persistent_dev,
|
||||
msg.persistent_ssid, msg.persistent_ssid_len);
|
||||
}
|
||||
}
|
||||
if (msg.wps_config_methods & WPS_CONFIG_DISPLAY) {
|
||||
p2p_dbg(p2p, "Peer " MACSTR
|
||||
" requested us to show a PIN on display", MAC2STR(sa));
|
||||
if (dev)
|
||||
dev->flags |= P2P_DEV_PD_PEER_KEYPAD;
|
||||
passwd_id = DEV_PW_USER_SPECIFIED;
|
||||
} else if (msg.wps_config_methods & WPS_CONFIG_KEYPAD) {
|
||||
p2p_dbg(p2p, "Peer " MACSTR
|
||||
" requested us to write its PIN using keypad",
|
||||
MAC2STR(sa));
|
||||
if (dev)
|
||||
dev->flags |= P2P_DEV_PD_PEER_DISPLAY;
|
||||
passwd_id = DEV_PW_REGISTRAR_SPECIFIED;
|
||||
} else if (msg.wps_config_methods & WPS_CONFIG_P2PS) {
|
||||
p2p_dbg(p2p, "Peer " MACSTR " requesting P2PS PIN",
|
||||
MAC2STR(sa));
|
||||
if (dev)
|
||||
dev->flags |= P2P_DEV_PD_PEER_P2PS;
|
||||
passwd_id = DEV_PW_P2PS_DEFAULT;
|
||||
}
|
||||
|
||||
reject = 0;
|
||||
reject = P2P_SC_SUCCESS;
|
||||
|
||||
os_memset(session_mac, 0, ETH_ALEN);
|
||||
os_memset(adv_mac, 0, ETH_ALEN);
|
||||
os_memset(group_mac, 0, ETH_ALEN);
|
||||
|
||||
if (msg.adv_id && msg.session_id && msg.session_mac && msg.adv_mac &&
|
||||
(msg.status || msg.conn_cap)) {
|
||||
u8 remote_conncap;
|
||||
|
||||
if (msg.intended_addr)
|
||||
os_memcpy(group_mac, msg.intended_addr, ETH_ALEN);
|
||||
|
||||
os_memcpy(session_mac, msg.session_mac, ETH_ALEN);
|
||||
os_memcpy(adv_mac, msg.adv_mac, ETH_ALEN);
|
||||
|
||||
session_id = WPA_GET_LE32(msg.session_id);
|
||||
adv_id = WPA_GET_LE32(msg.adv_id);
|
||||
|
||||
if (!msg.status)
|
||||
p2ps_adv = p2p_service_p2ps_id(p2p, adv_id);
|
||||
|
||||
p2p_dbg(p2p, "adv_id: %x - p2ps_adv - %p", adv_id, p2ps_adv);
|
||||
|
||||
if (msg.conn_cap)
|
||||
conncap = *msg.conn_cap;
|
||||
remote_conncap = conncap;
|
||||
|
||||
if (p2ps_adv) {
|
||||
auto_accept = p2ps_adv->auto_accept;
|
||||
conncap = p2p->cfg->p2ps_group_capability(
|
||||
p2p->cfg->cb_ctx, conncap, auto_accept);
|
||||
|
||||
p2p_dbg(p2p, "Conncap: local:%d remote:%d result:%d",
|
||||
auto_accept, remote_conncap, conncap);
|
||||
|
||||
if (p2ps_adv->config_methods &&
|
||||
!(msg.wps_config_methods &
|
||||
p2ps_adv->config_methods)) {
|
||||
p2p_dbg(p2p,
|
||||
"Unsupported config methods in Provision Discovery Request (own=0x%x peer=0x%x)",
|
||||
p2ps_adv->config_methods,
|
||||
msg.wps_config_methods);
|
||||
reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
} else if (!p2ps_adv->state) {
|
||||
p2p_dbg(p2p, "P2PS state unavailable");
|
||||
reject = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
|
||||
} else if (!conncap) {
|
||||
p2p_dbg(p2p, "Conncap resolution failed");
|
||||
reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
}
|
||||
|
||||
if (msg.wps_config_methods & WPS_CONFIG_KEYPAD) {
|
||||
p2p_dbg(p2p, "Keypad - always defer");
|
||||
auto_accept = 0;
|
||||
}
|
||||
|
||||
if (auto_accept || reject != P2P_SC_SUCCESS) {
|
||||
struct p2ps_provision *tmp;
|
||||
|
||||
if (reject == P2P_SC_SUCCESS && !conncap) {
|
||||
reject =
|
||||
P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
}
|
||||
|
||||
if (p2ps_setup_p2ps_prov(
|
||||
p2p, adv_id, session_id,
|
||||
msg.wps_config_methods,
|
||||
session_mac, adv_mac) < 0) {
|
||||
reject = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
|
||||
goto out;
|
||||
}
|
||||
|
||||
tmp = p2p->p2ps_prov;
|
||||
if (conncap) {
|
||||
tmp->conncap = conncap;
|
||||
tmp->status = P2P_SC_SUCCESS;
|
||||
} else {
|
||||
tmp->conncap = auto_accept;
|
||||
tmp->status = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
}
|
||||
|
||||
if (reject != P2P_SC_SUCCESS)
|
||||
goto out;
|
||||
}
|
||||
} else if (!msg.status) {
|
||||
reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!msg.status && !auto_accept &&
|
||||
(!p2p->p2ps_prov || p2p->p2ps_prov->adv_id != adv_id)) {
|
||||
struct p2ps_provision *tmp;
|
||||
|
||||
if (!conncap) {
|
||||
reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id,
|
||||
msg.wps_config_methods,
|
||||
session_mac, adv_mac) < 0) {
|
||||
reject = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
|
||||
goto out;
|
||||
}
|
||||
tmp = p2p->p2ps_prov;
|
||||
reject = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
|
||||
tmp->status = reject;
|
||||
}
|
||||
|
||||
if (msg.status) {
|
||||
if (*msg.status &&
|
||||
*msg.status != P2P_SC_SUCCESS_DEFERRED) {
|
||||
reject = *msg.status;
|
||||
} else if (*msg.status == P2P_SC_SUCCESS_DEFERRED &&
|
||||
p2p->p2ps_prov) {
|
||||
u16 method = p2p->p2ps_prov->method;
|
||||
|
||||
conncap = p2p->cfg->p2ps_group_capability(
|
||||
p2p->cfg->cb_ctx, remote_conncap,
|
||||
p2p->p2ps_prov->conncap);
|
||||
|
||||
p2p_dbg(p2p,
|
||||
"Conncap: local:%d remote:%d result:%d",
|
||||
p2p->p2ps_prov->conncap,
|
||||
remote_conncap, conncap);
|
||||
|
||||
/*
|
||||
* Ensure that if we asked for PIN originally,
|
||||
* our method is consistent with original
|
||||
* request.
|
||||
*/
|
||||
if (method & WPS_CONFIG_DISPLAY)
|
||||
method = WPS_CONFIG_KEYPAD;
|
||||
else if (method & WPS_CONFIG_KEYPAD)
|
||||
method = WPS_CONFIG_DISPLAY;
|
||||
|
||||
/* Reject this "Deferred Accept* if incompatible
|
||||
* conncap or method */
|
||||
if (!conncap ||
|
||||
!(msg.wps_config_methods & method))
|
||||
reject =
|
||||
P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
|
||||
else
|
||||
reject = P2P_SC_SUCCESS;
|
||||
|
||||
p2p->p2ps_prov->status = reject;
|
||||
p2p->p2ps_prov->conncap = conncap;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
out:
|
||||
resp = p2p_build_prov_disc_resp(p2p, msg.dialog_token,
|
||||
reject ? 0 : msg.wps_config_methods,
|
||||
msg.group_id, msg.group_id_len);
|
||||
if (reject == P2P_SC_SUCCESS ||
|
||||
reject == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE)
|
||||
config_methods = msg.wps_config_methods;
|
||||
else
|
||||
config_methods = 0;
|
||||
resp = p2p_build_prov_disc_resp(p2p, dev, msg.dialog_token, reject,
|
||||
config_methods, adv_id,
|
||||
msg.group_id, msg.group_id_len,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len);
|
||||
if (resp == NULL) {
|
||||
p2p_parse_free(&msg);
|
||||
return;
|
||||
|
@ -365,7 +686,91 @@ out:
|
|||
|
||||
wpabuf_free(resp);
|
||||
|
||||
if (!reject && p2p->cfg->prov_disc_req) {
|
||||
if (!p2p->cfg->p2ps_prov_complete) {
|
||||
/* Don't emit anything */
|
||||
} else if (msg.status && *msg.status != P2P_SC_SUCCESS &&
|
||||
*msg.status != P2P_SC_SUCCESS_DEFERRED) {
|
||||
reject = *msg.status;
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx, reject,
|
||||
sa, adv_mac, session_mac,
|
||||
NULL, adv_id, session_id,
|
||||
0, 0, msg.persistent_ssid,
|
||||
msg.persistent_ssid_len,
|
||||
0, 0, NULL);
|
||||
} else if (msg.status && *msg.status == P2P_SC_SUCCESS_DEFERRED &&
|
||||
p2p->p2ps_prov) {
|
||||
p2p->p2ps_prov->status = reject;
|
||||
p2p->p2ps_prov->conncap = conncap;
|
||||
|
||||
if (reject != P2P_SC_SUCCESS)
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx, reject,
|
||||
sa, adv_mac, session_mac,
|
||||
NULL, adv_id,
|
||||
session_id, conncap, 0,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len, 0,
|
||||
0, NULL);
|
||||
else
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx,
|
||||
*msg.status,
|
||||
sa, adv_mac, session_mac,
|
||||
group_mac, adv_id,
|
||||
session_id, conncap,
|
||||
passwd_id,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len, 0,
|
||||
0, NULL);
|
||||
} else if (msg.status && p2p->p2ps_prov) {
|
||||
p2p->p2ps_prov->status = P2P_SC_SUCCESS;
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx, *msg.status, sa,
|
||||
adv_mac, session_mac, group_mac,
|
||||
adv_id, session_id, conncap,
|
||||
passwd_id,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len,
|
||||
0, 0, NULL);
|
||||
} else if (msg.status) {
|
||||
} else if (auto_accept && reject == P2P_SC_SUCCESS) {
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx, P2P_SC_SUCCESS,
|
||||
sa, adv_mac, session_mac,
|
||||
group_mac, adv_id, session_id,
|
||||
conncap, passwd_id,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len,
|
||||
0, 0, NULL);
|
||||
} else if (reject == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE &&
|
||||
(!msg.session_info || !msg.session_info_len)) {
|
||||
p2p->p2ps_prov->method = msg.wps_config_methods;
|
||||
|
||||
p2p->cfg->p2ps_prov_complete(p2p->cfg->cb_ctx, P2P_SC_SUCCESS,
|
||||
sa, adv_mac, session_mac,
|
||||
group_mac, adv_id, session_id,
|
||||
conncap, passwd_id,
|
||||
msg.persistent_ssid,
|
||||
msg.persistent_ssid_len,
|
||||
0, 1, NULL);
|
||||
} else if (reject == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
|
||||
size_t buf_len = msg.session_info_len;
|
||||
char *buf = os_malloc(2 * buf_len + 1);
|
||||
|
||||
if (buf) {
|
||||
p2p->p2ps_prov->method = msg.wps_config_methods;
|
||||
|
||||
utf8_escape((char *) msg.session_info, buf_len,
|
||||
buf, 2 * buf_len + 1);
|
||||
|
||||
p2p->cfg->p2ps_prov_complete(
|
||||
p2p->cfg->cb_ctx, P2P_SC_SUCCESS, sa,
|
||||
adv_mac, session_mac, group_mac, adv_id,
|
||||
session_id, conncap, passwd_id,
|
||||
msg.persistent_ssid, msg.persistent_ssid_len,
|
||||
0, 1, buf);
|
||||
|
||||
os_free(buf);
|
||||
}
|
||||
}
|
||||
|
||||
if (reject == P2P_SC_SUCCESS && p2p->cfg->prov_disc_req) {
|
||||
const u8 *dev_addr = sa;
|
||||
if (msg.p2p_device_addr)
|
||||
dev_addr = msg.p2p_device_addr;
|
||||
|
|
|
@ -5067,6 +5067,7 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
|
|||
p2p.remove_stale_groups = wpas_remove_stale_groups;
|
||||
p2p.p2ps_prov_complete = wpas_p2ps_prov_complete;
|
||||
p2p.prov_disc_resp_cb = wpas_prov_disc_resp_cb;
|
||||
p2p.p2ps_group_capability = p2ps_group_capability;
|
||||
|
||||
os_memcpy(wpa_s->global->p2p_dev_addr, wpa_s->own_addr, ETH_ALEN);
|
||||
os_memcpy(p2p.dev_addr, wpa_s->global->p2p_dev_addr, ETH_ALEN);
|
||||
|
|
Loading…
Reference in a new issue