blob: f7ff06c0e6972619e8d72bf3a4cb297e9c4e0db0 [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * Wi-Fi Direct - P2P provision discovery
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#include "includes.h"
16
17#include "common.h"
18#include "common/ieee802_11_defs.h"
19#include "wps/wps_defs.h"
20#include "p2p_i.h"
21#include "p2p.h"
22
23
Jouni Malinen75ecf522011-06-27 15:19:46 -070024/*
25 * Number of retries to attempt for provision discovery requests during IDLE
26 * state in case the peer is not listening.
27 */
28#define MAX_PROV_DISC_REQ_RETRIES 10
29
30
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070031static void p2p_build_wps_ie_config_methods(struct wpabuf *buf,
32 u16 config_methods)
33{
34 u8 *len;
35 wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
36 len = wpabuf_put(buf, 1);
37 wpabuf_put_be32(buf, WPS_DEV_OUI_WFA);
38
39 /* Config Methods */
40 wpabuf_put_be16(buf, ATTR_CONFIG_METHODS);
41 wpabuf_put_be16(buf, 2);
42 wpabuf_put_be16(buf, config_methods);
43
44 p2p_buf_update_ie_hdr(buf, len);
45}
46
47
48static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
49 u8 dialog_token,
50 u16 config_methods,
51 struct p2p_device *go)
52{
53 struct wpabuf *buf;
54 u8 *len;
55
56 buf = wpabuf_alloc(1000);
57 if (buf == NULL)
58 return NULL;
59
60 p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_REQ, dialog_token);
61
62 len = p2p_buf_add_ie_hdr(buf);
63 p2p_buf_add_capability(buf, p2p->dev_capab, 0);
64 p2p_buf_add_device_info(buf, p2p, NULL);
65 if (go) {
66 p2p_buf_add_group_id(buf, go->info.p2p_device_addr,
67 go->oper_ssid, go->oper_ssid_len);
68 }
69 p2p_buf_update_ie_hdr(buf, len);
70
71 /* WPS IE with Config Methods attribute */
72 p2p_build_wps_ie_config_methods(buf, config_methods);
73
74 return buf;
75}
76
77
78static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
79 u8 dialog_token,
80 u16 config_methods)
81{
82 struct wpabuf *buf;
83
84 buf = wpabuf_alloc(100);
85 if (buf == NULL)
86 return NULL;
87
88 p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_RESP, dialog_token);
89
90 /* WPS IE with Config Methods attribute */
91 p2p_build_wps_ie_config_methods(buf, config_methods);
92
93 return buf;
94}
95
96
97void p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
98 const u8 *data, size_t len, int rx_freq)
99{
100 struct p2p_message msg;
101 struct p2p_device *dev;
102 int freq;
103 int reject = 1;
104 struct wpabuf *resp;
105
106 if (p2p_parse(data, len, &msg))
107 return;
108
109 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
110 "P2P: Received Provision Discovery Request from " MACSTR
111 " with config methods 0x%x (freq=%d)",
112 MAC2STR(sa), msg.wps_config_methods, rx_freq);
113
114 dev = p2p_get_device(p2p, sa);
115 if (dev == NULL || !(dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
116 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
117 "P2P: Provision Discovery Request from "
118 "unknown peer " MACSTR, MAC2STR(sa));
119 if (p2p_add_device(p2p, sa, rx_freq, 0, data + 1, len - 1)) {
120 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
121 "P2P: Provision Discovery Request add device "
122 "failed " MACSTR, MAC2STR(sa));
123 }
124 }
125
126 if (!(msg.wps_config_methods &
127 (WPS_CONFIG_DISPLAY | WPS_CONFIG_KEYPAD |
128 WPS_CONFIG_PUSHBUTTON))) {
129 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unsupported "
130 "Config Methods in Provision Discovery Request");
131 goto out;
132 }
133
134 if (dev)
135 dev->flags &= ~(P2P_DEV_PD_PEER_DISPLAY |
136 P2P_DEV_PD_PEER_KEYPAD);
137 if (msg.wps_config_methods & WPS_CONFIG_DISPLAY) {
138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
139 " requested us to show a PIN on display", MAC2STR(sa));
140 if (dev)
141 dev->flags |= P2P_DEV_PD_PEER_KEYPAD;
142 } else if (msg.wps_config_methods & WPS_CONFIG_KEYPAD) {
143 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
144 " requested us to write its PIN using keypad",
145 MAC2STR(sa));
146 if (dev)
147 dev->flags |= P2P_DEV_PD_PEER_DISPLAY;
148 }
149
150 reject = 0;
151
152out:
153 resp = p2p_build_prov_disc_resp(p2p, msg.dialog_token,
154 reject ? 0 : msg.wps_config_methods);
155 if (resp == NULL) {
156 p2p_parse_free(&msg);
157 return;
158 }
159 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
160 "P2P: Sending Provision Discovery Response");
161 if (rx_freq > 0)
162 freq = rx_freq;
163 else
164 freq = p2p_channel_to_freq(p2p->cfg->country,
165 p2p->cfg->reg_class,
166 p2p->cfg->channel);
167 if (freq < 0) {
168 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
169 "P2P: Unknown regulatory class/channel");
170 wpabuf_free(resp);
171 p2p_parse_free(&msg);
172 return;
173 }
174 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
175 if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
176 p2p->cfg->dev_addr,
177 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
178 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
179 "P2P: Failed to send Action frame");
180 }
181
182 wpabuf_free(resp);
183
184 if (!reject && p2p->cfg->prov_disc_req) {
185 const u8 *dev_addr = sa;
186 if (msg.p2p_device_addr)
187 dev_addr = msg.p2p_device_addr;
188 p2p->cfg->prov_disc_req(p2p->cfg->cb_ctx, sa,
189 msg.wps_config_methods,
190 dev_addr, msg.pri_dev_type,
191 msg.device_name, msg.config_methods,
192 msg.capability ? msg.capability[0] : 0,
193 msg.capability ? msg.capability[1] :
194 0);
195
196 }
197 p2p_parse_free(&msg);
198}
199
200
201void p2p_process_prov_disc_resp(struct p2p_data *p2p, const u8 *sa,
202 const u8 *data, size_t len)
203{
204 struct p2p_message msg;
205 struct p2p_device *dev;
206 u16 report_config_methods = 0;
207
208 if (p2p_parse(data, len, &msg))
209 return;
210
211 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
212 "P2P: Received Provisioning Discovery Response from " MACSTR
213 " with config methods 0x%x",
214 MAC2STR(sa), msg.wps_config_methods);
215
216 dev = p2p_get_device(p2p, sa);
217 if (dev == NULL || !dev->req_config_methods) {
218 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
219 "P2P: Ignore Provisioning Discovery Response from "
220 MACSTR " with no pending request", MAC2STR(sa));
221 p2p_parse_free(&msg);
222 return;
223 }
224
Jouni Malinen75ecf522011-06-27 15:19:46 -0700225 if (p2p->pending_action_state == P2P_PENDING_PD) {
226 os_memset(p2p->pending_pd_devaddr, 0, ETH_ALEN);
227 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
228 }
229
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700230 if (dev->dialog_token != msg.dialog_token) {
231 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
232 "P2P: Ignore Provisioning Discovery Response with "
233 "unexpected Dialog Token %u (expected %u)",
234 msg.dialog_token, dev->dialog_token);
235 p2p_parse_free(&msg);
236 return;
237 }
238
Jouni Malinen75ecf522011-06-27 15:19:46 -0700239 /*
240 * If the response is from the peer to whom a user initiated request
241 * was sent earlier, we reset that state info here.
242 */
243 if (p2p->user_initiated_pd &&
244 os_memcmp(p2p->pending_pd_devaddr, sa, ETH_ALEN) == 0)
245 p2p_reset_pending_pd(p2p);
246
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700247 if (msg.wps_config_methods != dev->req_config_methods) {
248 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer rejected "
249 "our Provisioning Discovery Request");
Jouni Malinen75ecf522011-06-27 15:19:46 -0700250 if (p2p->cfg->prov_disc_fail)
251 p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx, sa,
252 P2P_PROV_DISC_REJECTED);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700253 p2p_parse_free(&msg);
254 goto out;
255 }
256
257 report_config_methods = dev->req_config_methods;
258 dev->flags &= ~(P2P_DEV_PD_PEER_DISPLAY |
259 P2P_DEV_PD_PEER_KEYPAD);
260 if (dev->req_config_methods & WPS_CONFIG_DISPLAY) {
261 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
262 " accepted to show a PIN on display", MAC2STR(sa));
263 dev->flags |= P2P_DEV_PD_PEER_DISPLAY;
264 } else if (msg.wps_config_methods & WPS_CONFIG_KEYPAD) {
265 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
266 " accepted to write our PIN using keypad",
267 MAC2STR(sa));
268 dev->flags |= P2P_DEV_PD_PEER_KEYPAD;
269 }
270 p2p_parse_free(&msg);
271
272out:
273 dev->req_config_methods = 0;
274 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
275 if (p2p->cfg->prov_disc_resp)
276 p2p->cfg->prov_disc_resp(p2p->cfg->cb_ctx, sa,
277 report_config_methods);
278}
279
280
281int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
282 int join)
283{
284 struct wpabuf *req;
285 int freq;
286
287 freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
288 if (freq <= 0) {
289 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
290 "P2P: No Listen/Operating frequency known for the "
291 "peer " MACSTR " to send Provision Discovery Request",
292 MAC2STR(dev->info.p2p_device_addr));
293 return -1;
294 }
295
296 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
297 if (!(dev->info.dev_capab &
298 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
299 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
300 "P2P: Cannot use PD with P2P Device " MACSTR
301 " that is in a group and is not discoverable",
302 MAC2STR(dev->info.p2p_device_addr));
303 return -1;
304 }
305 /* TODO: use device discoverability request through GO */
306 }
307
308 dev->dialog_token++;
309 if (dev->dialog_token == 0)
310 dev->dialog_token = 1;
311 req = p2p_build_prov_disc_req(p2p, dev->dialog_token,
312 dev->req_config_methods,
313 join ? dev : NULL);
314 if (req == NULL)
315 return -1;
316
317 p2p->pending_action_state = P2P_PENDING_PD;
318 if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
319 p2p->cfg->dev_addr, dev->info.p2p_device_addr,
320 wpabuf_head(req), wpabuf_len(req), 200) < 0) {
321 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
322 "P2P: Failed to send Action frame");
323 wpabuf_free(req);
324 return -1;
325 }
326
Jouni Malinen75ecf522011-06-27 15:19:46 -0700327 os_memcpy(p2p->pending_pd_devaddr, dev->info.p2p_device_addr, ETH_ALEN);
328
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700329 wpabuf_free(req);
330 return 0;
331}
332
333
334int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
335 u16 config_methods, int join)
336{
337 struct p2p_device *dev;
338
339 dev = p2p_get_device(p2p, peer_addr);
340 if (dev == NULL)
341 dev = p2p_get_device_interface(p2p, peer_addr);
342 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
343 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Provision "
344 "Discovery Request destination " MACSTR
345 " not yet known", MAC2STR(peer_addr));
346 return -1;
347 }
348
349 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Provision Discovery "
350 "Request with " MACSTR " (config methods 0x%x)",
351 MAC2STR(peer_addr), config_methods);
352 if (config_methods == 0)
353 return -1;
354
355 dev->req_config_methods = config_methods;
356 if (join)
357 dev->flags |= P2P_DEV_PD_FOR_JOIN;
358 else
359 dev->flags &= ~P2P_DEV_PD_FOR_JOIN;
360
361 if (p2p->go_neg_peer ||
362 (p2p->state != P2P_IDLE && p2p->state != P2P_SEARCH &&
363 p2p->state != P2P_LISTEN_ONLY)) {
364 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Busy with other "
365 "operations; postpone Provision Discovery Request "
366 "with " MACSTR " (config methods 0x%x)",
367 MAC2STR(peer_addr), config_methods);
368 return 0;
369 }
370
Jouni Malinen75ecf522011-06-27 15:19:46 -0700371 /*
372 * We use the join param as a cue to differentiate between user
373 * initiated PD request and one issued during finds (internal).
374 */
375 p2p->user_initiated_pd = !join;
376
377 /* Also set some retries to attempt in case of IDLE state */
378 if (p2p->user_initiated_pd && p2p->state == P2P_IDLE)
379 p2p->pd_retries = MAX_PROV_DISC_REQ_RETRIES;
380
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700381 return p2p_send_prov_disc_req(p2p, dev, join);
382}
Jouni Malinen75ecf522011-06-27 15:19:46 -0700383
384
385void p2p_reset_pending_pd(struct p2p_data *p2p)
386{
387 p2p->user_initiated_pd = 0;
388 os_memset(p2p->pending_pd_devaddr, 0, ETH_ALEN);
389 p2p->pd_retries = 0;
390}