blob: bf756050b84956ef064dc8c67100890952ceee3d [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * Wi-Fi Direct - P2P service discovery
3 * Copyright (c) 2009, Atheros Communications
4 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 */
8
9#include "includes.h"
10
11#include "common.h"
12#include "common/ieee802_11_defs.h"
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080013#include "common/gas.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070014#include "p2p_i.h"
15#include "p2p.h"
16
17
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070018#ifdef CONFIG_WIFI_DISPLAY
19static int wfd_wsd_supported(struct wpabuf *wfd)
20{
21 const u8 *pos, *end;
22 u8 subelem;
23 u16 len;
24
25 if (wfd == NULL)
26 return 0;
27
28 pos = wpabuf_head(wfd);
29 end = pos + wpabuf_len(wfd);
30
31 while (pos + 3 <= end) {
32 subelem = *pos++;
33 len = WPA_GET_BE16(pos);
34 pos += 2;
35 if (pos + len > end)
36 break;
37
38 if (subelem == WFD_SUBELEM_DEVICE_INFO && len >= 6) {
39 u16 info = WPA_GET_BE16(pos);
40 return !!(info & 0x0040);
41 }
42
43 pos += len;
44 }
45
46 return 0;
47}
48#endif /* CONFIG_WIFI_DISPLAY */
49
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070050struct p2p_sd_query * p2p_pending_sd_req(struct p2p_data *p2p,
51 struct p2p_device *dev)
52{
53 struct p2p_sd_query *q;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070054 int wsd = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070055
56 if (!(dev->info.dev_capab & P2P_DEV_CAPAB_SERVICE_DISCOVERY))
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080057 return NULL; /* peer does not support SD */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070058#ifdef CONFIG_WIFI_DISPLAY
59 if (wfd_wsd_supported(dev->info.wfd_subelems))
60 wsd = 1;
61#endif /* CONFIG_WIFI_DISPLAY */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070062
63 for (q = p2p->sd_queries; q; q = q->next) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070064 /* Use WSD only if the peer indicates support or it */
65 if (q->wsd && !wsd)
66 continue;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070067 if (q->for_all_peers && !(dev->flags & P2P_DEV_SD_INFO))
68 return q;
69 if (!q->for_all_peers &&
70 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
71 0)
72 return q;
73 }
74
75 return NULL;
76}
77
78
79static int p2p_unlink_sd_query(struct p2p_data *p2p,
80 struct p2p_sd_query *query)
81{
82 struct p2p_sd_query *q, *prev;
83 q = p2p->sd_queries;
84 prev = NULL;
85 while (q) {
86 if (q == query) {
87 if (prev)
88 prev->next = q->next;
89 else
90 p2p->sd_queries = q->next;
91 if (p2p->sd_query == query)
92 p2p->sd_query = NULL;
93 return 1;
94 }
95 prev = q;
96 q = q->next;
97 }
98 return 0;
99}
100
101
102static void p2p_free_sd_query(struct p2p_sd_query *q)
103{
104 if (q == NULL)
105 return;
106 wpabuf_free(q->tlvs);
107 os_free(q);
108}
109
110
111void p2p_free_sd_queries(struct p2p_data *p2p)
112{
113 struct p2p_sd_query *q, *prev;
114 q = p2p->sd_queries;
115 p2p->sd_queries = NULL;
116 while (q) {
117 prev = q;
118 q = q->next;
119 p2p_free_sd_query(prev);
120 }
121}
122
123
124static struct wpabuf * p2p_build_sd_query(u16 update_indic,
125 struct wpabuf *tlvs)
126{
127 struct wpabuf *buf;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800128 u8 *len_pos;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700129
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800130 buf = gas_anqp_build_initial_req(0, 100 + wpabuf_len(tlvs));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700131 if (buf == NULL)
132 return NULL;
133
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800134 /* ANQP Query Request Frame */
135 len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700136 wpabuf_put_be24(buf, OUI_WFA);
137 wpabuf_put_u8(buf, P2P_OUI_TYPE);
138 wpabuf_put_le16(buf, update_indic); /* Service Update Indicator */
139 wpabuf_put_buf(buf, tlvs);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800140 gas_anqp_set_element_len(buf, len_pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700141
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800142 gas_anqp_set_len(buf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700143
144 return buf;
145}
146
147
148static void p2p_send_gas_comeback_req(struct p2p_data *p2p, const u8 *dst,
149 u8 dialog_token, int freq)
150{
151 struct wpabuf *req;
152
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800153 req = gas_build_comeback_req(dialog_token);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700154 if (req == NULL)
155 return;
156
157 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
158 if (p2p_send_action(p2p, freq, dst, p2p->cfg->dev_addr, dst,
159 wpabuf_head(req), wpabuf_len(req), 200) < 0)
160 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
161 "P2P: Failed to send Action frame");
162
163 wpabuf_free(req);
164}
165
166
167static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code,
168 u16 comeback_delay,
169 u16 update_indic,
170 const struct wpabuf *tlvs)
171{
172 struct wpabuf *buf;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800173 u8 *len_pos;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700174
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800175 buf = gas_anqp_build_initial_resp(dialog_token, status_code,
176 comeback_delay,
177 100 + (tlvs ? wpabuf_len(tlvs) : 0));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700178 if (buf == NULL)
179 return NULL;
180
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700181 if (tlvs) {
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800182 /* ANQP Query Response Frame */
183 len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700184 wpabuf_put_be24(buf, OUI_WFA);
185 wpabuf_put_u8(buf, P2P_OUI_TYPE);
186 /* Service Update Indicator */
187 wpabuf_put_le16(buf, update_indic);
188 wpabuf_put_buf(buf, tlvs);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800189 gas_anqp_set_element_len(buf, len_pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700190 }
191
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800192 gas_anqp_set_len(buf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700193
194 return buf;
195}
196
197
198static struct wpabuf * p2p_build_gas_comeback_resp(u8 dialog_token,
199 u16 status_code,
200 u16 update_indic,
201 const u8 *data, size_t len,
202 u8 frag_id, u8 more,
203 u16 total_len)
204{
205 struct wpabuf *buf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700206
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800207 buf = gas_anqp_build_comeback_resp(dialog_token, status_code, frag_id,
208 more, 0, 100 + len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700209 if (buf == NULL)
210 return NULL;
211
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700212 if (frag_id == 0) {
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800213 /* ANQP Query Response Frame */
214 wpabuf_put_le16(buf, ANQP_VENDOR_SPECIFIC); /* Info ID */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700215 wpabuf_put_le16(buf, 3 + 1 + 2 + total_len);
216 wpabuf_put_be24(buf, OUI_WFA);
217 wpabuf_put_u8(buf, P2P_OUI_TYPE);
218 /* Service Update Indicator */
219 wpabuf_put_le16(buf, update_indic);
220 }
221
222 wpabuf_put_data(buf, data, len);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800223 gas_anqp_set_len(buf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700224
225 return buf;
226}
227
228
229int p2p_start_sd(struct p2p_data *p2p, struct p2p_device *dev)
230{
231 struct wpabuf *req;
232 int ret = 0;
233 struct p2p_sd_query *query;
234 int freq;
235
236 freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
237 if (freq <= 0) {
238 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
239 "P2P: No Listen/Operating frequency known for the "
240 "peer " MACSTR " to send SD Request",
241 MAC2STR(dev->info.p2p_device_addr));
242 return -1;
243 }
244
245 query = p2p_pending_sd_req(p2p, dev);
246 if (query == NULL)
247 return -1;
248
249 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
250 "P2P: Start Service Discovery with " MACSTR,
251 MAC2STR(dev->info.p2p_device_addr));
252
253 req = p2p_build_sd_query(p2p->srv_update_indic, query->tlvs);
254 if (req == NULL)
255 return -1;
256
257 p2p->sd_peer = dev;
258 p2p->sd_query = query;
259 p2p->pending_action_state = P2P_PENDING_SD;
260
261 if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
262 p2p->cfg->dev_addr, dev->info.p2p_device_addr,
263 wpabuf_head(req), wpabuf_len(req), 5000) < 0) {
264 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
265 "P2P: Failed to send Action frame");
266 ret = -1;
267 }
268
269 wpabuf_free(req);
270
271 return ret;
272}
273
274
275void p2p_rx_gas_initial_req(struct p2p_data *p2p, const u8 *sa,
276 const u8 *data, size_t len, int rx_freq)
277{
278 const u8 *pos = data;
279 const u8 *end = data + len;
280 const u8 *next;
281 u8 dialog_token;
282 u16 slen;
283 int freq;
284 u16 update_indic;
285
286
287 if (p2p->cfg->sd_request == NULL)
288 return;
289
290 if (rx_freq > 0)
291 freq = rx_freq;
292 else
293 freq = p2p_channel_to_freq(p2p->cfg->country,
294 p2p->cfg->reg_class,
295 p2p->cfg->channel);
296 if (freq < 0)
297 return;
298
299 if (len < 1 + 2)
300 return;
301
302 dialog_token = *pos++;
303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
304 "P2P: GAS Initial Request from " MACSTR " (dialog token %u, "
305 "freq %d)",
306 MAC2STR(sa), dialog_token, rx_freq);
307
308 if (*pos != WLAN_EID_ADV_PROTO) {
309 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
310 "P2P: Unexpected IE in GAS Initial Request: %u", *pos);
311 return;
312 }
313 pos++;
314
315 slen = *pos++;
316 next = pos + slen;
317 if (next > end || slen < 2) {
318 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
319 "P2P: Invalid IE in GAS Initial Request");
320 return;
321 }
322 pos++; /* skip QueryRespLenLimit and PAME-BI */
323
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800324 if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700325 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
326 "P2P: Unsupported GAS advertisement protocol id %u",
327 *pos);
328 return;
329 }
330
331 pos = next;
332 /* Query Request */
333 if (pos + 2 > end)
334 return;
335 slen = WPA_GET_LE16(pos);
336 pos += 2;
337 if (pos + slen > end)
338 return;
339 end = pos + slen;
340
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800341 /* ANQP Query Request */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700342 if (pos + 4 > end)
343 return;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800344 if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700345 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800346 "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700347 return;
348 }
349 pos += 2;
350
351 slen = WPA_GET_LE16(pos);
352 pos += 2;
353 if (pos + slen > end || slen < 3 + 1) {
354 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800355 "P2P: Invalid ANQP Query Request length");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700356 return;
357 }
358
359 if (WPA_GET_BE24(pos) != OUI_WFA) {
360 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800361 "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700362 return;
363 }
364 pos += 3;
365
366 if (*pos != P2P_OUI_TYPE) {
367 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800368 "P2P: Unsupported ANQP vendor type %u", *pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700369 return;
370 }
371 pos++;
372
373 if (pos + 2 > end)
374 return;
375 update_indic = WPA_GET_LE16(pos);
376 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
377 "P2P: Service Update Indicator: %u", update_indic);
378 pos += 2;
379
380 p2p->cfg->sd_request(p2p->cfg->cb_ctx, freq, sa, dialog_token,
381 update_indic, pos, end - pos);
382 /* the response will be indicated with a call to p2p_sd_response() */
383}
384
385
386void p2p_sd_response(struct p2p_data *p2p, int freq, const u8 *dst,
387 u8 dialog_token, const struct wpabuf *resp_tlvs)
388{
389 struct wpabuf *resp;
390
391 /* TODO: fix the length limit to match with the maximum frame length */
392 if (wpabuf_len(resp_tlvs) > 1400) {
393 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response long "
394 "enough to require fragmentation");
395 if (p2p->sd_resp) {
396 /*
397 * TODO: Could consider storing the fragmented response
398 * separately for each peer to avoid having to drop old
399 * one if there is more than one pending SD query.
400 * Though, that would eat more memory, so there are
401 * also benefits to just using a single buffer.
402 */
403 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
404 "previous SD response");
405 wpabuf_free(p2p->sd_resp);
406 }
Dmitry Shmidt04949592012-07-19 12:16:46 -0700407 p2p->sd_resp = wpabuf_dup(resp_tlvs);
408 if (p2p->sd_resp == NULL) {
409 wpa_msg(p2p->cfg->msg_ctx, MSG_ERROR, "P2P: Failed to "
410 "allocate SD response fragmentation area");
411 return;
412 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700413 os_memcpy(p2p->sd_resp_addr, dst, ETH_ALEN);
414 p2p->sd_resp_dialog_token = dialog_token;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700415 p2p->sd_resp_pos = 0;
416 p2p->sd_frag_id = 0;
417 resp = p2p_build_sd_response(dialog_token, WLAN_STATUS_SUCCESS,
418 1, p2p->srv_update_indic, NULL);
419 } else {
420 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response fits "
421 "in initial response");
422 resp = p2p_build_sd_response(dialog_token,
423 WLAN_STATUS_SUCCESS, 0,
424 p2p->srv_update_indic, resp_tlvs);
425 }
426 if (resp == NULL)
427 return;
428
429 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
430 if (p2p_send_action(p2p, freq, dst, p2p->cfg->dev_addr,
431 p2p->cfg->dev_addr,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700432 wpabuf_head(resp), wpabuf_len(resp), 200) < 0)
433 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
434 "P2P: Failed to send Action frame");
435
436 wpabuf_free(resp);
437}
438
439
440void p2p_rx_gas_initial_resp(struct p2p_data *p2p, const u8 *sa,
441 const u8 *data, size_t len, int rx_freq)
442{
443 const u8 *pos = data;
444 const u8 *end = data + len;
445 const u8 *next;
446 u8 dialog_token;
447 u16 status_code;
448 u16 comeback_delay;
449 u16 slen;
450 u16 update_indic;
451
Dmitry Shmidt04949592012-07-19 12:16:46 -0700452#ifdef ANDROID_P2P
453 if (p2p->state != P2P_SD_DURING_FIND) {
454 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
455 "P2P: #### Not ignoring unexpected GAS Initial Response from "
456 MACSTR " state %d", MAC2STR(sa), p2p->state);
457 }
458 if (p2p->sd_peer == NULL ||
459#else
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700460 if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
Dmitry Shmidt04949592012-07-19 12:16:46 -0700461#endif
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700462 os_memcmp(sa, p2p->sd_peer->info.p2p_device_addr, ETH_ALEN) != 0) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -0700463 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700464 "P2P: Ignore unexpected GAS Initial Response from "
465 MACSTR, MAC2STR(sa));
466 return;
467 }
468 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
469 p2p_clear_timeout(p2p);
470
471 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
472 "P2P: Received GAS Initial Response from " MACSTR " (len=%d)",
473 MAC2STR(sa), (int) len);
474
475 if (len < 5 + 2) {
476 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
477 "P2P: Too short GAS Initial Response frame");
478 return;
479 }
480
481 dialog_token = *pos++;
482 /* TODO: check dialog_token match */
483 status_code = WPA_GET_LE16(pos);
484 pos += 2;
485 comeback_delay = WPA_GET_LE16(pos);
486 pos += 2;
487 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
488 "P2P: dialog_token=%u status_code=%u comeback_delay=%u",
489 dialog_token, status_code, comeback_delay);
490 if (status_code) {
491 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
492 "P2P: Service Discovery failed: status code %u",
493 status_code);
494 return;
495 }
496
497 if (*pos != WLAN_EID_ADV_PROTO) {
498 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
499 "P2P: Unexpected IE in GAS Initial Response: %u",
500 *pos);
501 return;
502 }
503 pos++;
504
505 slen = *pos++;
506 next = pos + slen;
507 if (next > end || slen < 2) {
508 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
509 "P2P: Invalid IE in GAS Initial Response");
510 return;
511 }
512 pos++; /* skip QueryRespLenLimit and PAME-BI */
513
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800514 if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700515 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
516 "P2P: Unsupported GAS advertisement protocol id %u",
517 *pos);
518 return;
519 }
520
521 pos = next;
522 /* Query Response */
523 if (pos + 2 > end) {
524 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
525 "Response");
526 return;
527 }
528 slen = WPA_GET_LE16(pos);
529 pos += 2;
530 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
531 slen);
532 if (pos + slen > end) {
533 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
534 "Response data");
535 return;
536 }
537 end = pos + slen;
538
539 if (comeback_delay) {
540 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Fragmented "
541 "response - request fragments");
542 if (p2p->sd_rx_resp) {
543 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
544 "old SD reassembly buffer");
545 wpabuf_free(p2p->sd_rx_resp);
546 p2p->sd_rx_resp = NULL;
547 }
548 p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
549 return;
550 }
551
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800552 /* ANQP Query Response */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700553 if (pos + 4 > end)
554 return;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800555 if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700556 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800557 "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700558 return;
559 }
560 pos += 2;
561
562 slen = WPA_GET_LE16(pos);
563 pos += 2;
564 if (pos + slen > end || slen < 3 + 1) {
565 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800566 "P2P: Invalid ANQP Query Response length");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700567 return;
568 }
569
570 if (WPA_GET_BE24(pos) != OUI_WFA) {
571 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800572 "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700573 return;
574 }
575 pos += 3;
576
577 if (*pos != P2P_OUI_TYPE) {
578 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800579 "P2P: Unsupported ANQP vendor type %u", *pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700580 return;
581 }
582 pos++;
583
584 if (pos + 2 > end)
585 return;
586 update_indic = WPA_GET_LE16(pos);
587 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
588 "P2P: Service Update Indicator: %u", update_indic);
589 pos += 2;
590
591 p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
592 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
593 p2p->sd_peer = NULL;
594
595 if (p2p->sd_query) {
596 if (!p2p->sd_query->for_all_peers) {
597 struct p2p_sd_query *q;
598 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
599 "P2P: Remove completed SD query %p",
600 p2p->sd_query);
601 q = p2p->sd_query;
602 p2p_unlink_sd_query(p2p, p2p->sd_query);
603 p2p_free_sd_query(q);
604 }
605 p2p->sd_query = NULL;
606 }
607
608 if (p2p->cfg->sd_response)
609 p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa, update_indic,
610 pos, end - pos);
611 p2p_continue_find(p2p);
612}
613
614
615void p2p_rx_gas_comeback_req(struct p2p_data *p2p, const u8 *sa,
616 const u8 *data, size_t len, int rx_freq)
617{
618 struct wpabuf *resp;
619 u8 dialog_token;
620 size_t frag_len;
621 int more = 0;
622
623 wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Request", data, len);
624 if (len < 1)
625 return;
626 dialog_token = *data;
627 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dialog Token: %u",
628 dialog_token);
629 if (dialog_token != p2p->sd_resp_dialog_token) {
630 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
631 "response fragment for dialog token %u", dialog_token);
632 return;
633 }
634
635 if (p2p->sd_resp == NULL) {
636 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
637 "response fragment available");
638 return;
639 }
640 if (os_memcmp(sa, p2p->sd_resp_addr, ETH_ALEN) != 0) {
641 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
642 "response fragment for " MACSTR, MAC2STR(sa));
643 return;
644 }
645
646 frag_len = wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos;
647 if (frag_len > 1400) {
648 frag_len = 1400;
649 more = 1;
650 }
651 resp = p2p_build_gas_comeback_resp(dialog_token, WLAN_STATUS_SUCCESS,
652 p2p->srv_update_indic,
653 wpabuf_head_u8(p2p->sd_resp) +
654 p2p->sd_resp_pos, frag_len,
655 p2p->sd_frag_id, more,
656 wpabuf_len(p2p->sd_resp));
657 if (resp == NULL)
658 return;
659 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send GAS Comeback "
660 "Response (frag_id %d more=%d frag_len=%d)",
661 p2p->sd_frag_id, more, (int) frag_len);
662 p2p->sd_frag_id++;
663 p2p->sd_resp_pos += frag_len;
664
665 if (more) {
666 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: %d more bytes "
667 "remain to be sent",
668 (int) (wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos));
669 } else {
670 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: All fragments of "
671 "SD response sent");
672 wpabuf_free(p2p->sd_resp);
673 p2p->sd_resp = NULL;
674 }
675
676 p2p->pending_action_state = P2P_NO_PENDING_ACTION;
677 if (p2p_send_action(p2p, rx_freq, sa, p2p->cfg->dev_addr,
678 p2p->cfg->dev_addr,
679 wpabuf_head(resp), wpabuf_len(resp), 200) < 0)
680 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
681 "P2P: Failed to send Action frame");
682
683 wpabuf_free(resp);
684}
685
686
687void p2p_rx_gas_comeback_resp(struct p2p_data *p2p, const u8 *sa,
688 const u8 *data, size_t len, int rx_freq)
689{
690 const u8 *pos = data;
691 const u8 *end = data + len;
692 const u8 *next;
693 u8 dialog_token;
694 u16 status_code;
695 u8 frag_id;
696 u8 more_frags;
697 u16 comeback_delay;
698 u16 slen;
699
700 wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Response", data, len);
701
Dmitry Shmidt04949592012-07-19 12:16:46 -0700702#ifdef ANDROID_P2P
703 if (p2p->state != P2P_SD_DURING_FIND) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700704 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt04949592012-07-19 12:16:46 -0700705 "P2P: #### Not ignoring unexpected GAS Comeback Response from "
706 MACSTR " state %d", MAC2STR(sa), p2p->state);
707 }
708 if (p2p->sd_peer == NULL ||
709#else
710 if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
711#endif
712 os_memcmp(sa, p2p->sd_peer->info.p2p_device_addr, ETH_ALEN) != 0) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -0700713 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700714 "P2P: Ignore unexpected GAS Comeback Response from "
715 MACSTR, MAC2STR(sa));
716 return;
717 }
718 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
719 p2p_clear_timeout(p2p);
720
721 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
722 "P2P: Received GAS Comeback Response from " MACSTR " (len=%d)",
723 MAC2STR(sa), (int) len);
724
725 if (len < 6 + 2) {
726 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
727 "P2P: Too short GAS Comeback Response frame");
728 return;
729 }
730
731 dialog_token = *pos++;
732 /* TODO: check dialog_token match */
733 status_code = WPA_GET_LE16(pos);
734 pos += 2;
735 frag_id = *pos & 0x7f;
736 more_frags = (*pos & 0x80) >> 7;
737 pos++;
738 comeback_delay = WPA_GET_LE16(pos);
739 pos += 2;
740 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
741 "P2P: dialog_token=%u status_code=%u frag_id=%d more_frags=%d "
742 "comeback_delay=%u",
743 dialog_token, status_code, frag_id, more_frags,
744 comeback_delay);
745 /* TODO: check frag_id match */
746 if (status_code) {
747 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
748 "P2P: Service Discovery failed: status code %u",
749 status_code);
750 return;
751 }
752
753 if (*pos != WLAN_EID_ADV_PROTO) {
754 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
755 "P2P: Unexpected IE in GAS Comeback Response: %u",
756 *pos);
757 return;
758 }
759 pos++;
760
761 slen = *pos++;
762 next = pos + slen;
763 if (next > end || slen < 2) {
764 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
765 "P2P: Invalid IE in GAS Comeback Response");
766 return;
767 }
768 pos++; /* skip QueryRespLenLimit and PAME-BI */
769
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800770 if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700771 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
772 "P2P: Unsupported GAS advertisement protocol id %u",
773 *pos);
774 return;
775 }
776
777 pos = next;
778 /* Query Response */
779 if (pos + 2 > end) {
780 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
781 "Response");
782 return;
783 }
784 slen = WPA_GET_LE16(pos);
785 pos += 2;
786 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
787 slen);
788 if (pos + slen > end) {
789 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
790 "Response data");
791 return;
792 }
793 if (slen == 0) {
794 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No Query Response "
795 "data");
796 return;
797 }
798 end = pos + slen;
799
800 if (p2p->sd_rx_resp) {
801 /*
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800802 * ANQP header is only included in the first fragment; rest of
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700803 * the fragments start with continue TLVs.
804 */
805 goto skip_nqp_header;
806 }
807
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800808 /* ANQP Query Response */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700809 if (pos + 4 > end)
810 return;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800811 if (WPA_GET_LE16(pos) != ANQP_VENDOR_SPECIFIC) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700812 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800813 "P2P: Unsupported ANQP Info ID %u", WPA_GET_LE16(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700814 return;
815 }
816 pos += 2;
817
818 slen = WPA_GET_LE16(pos);
819 pos += 2;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800820 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: ANQP Query Response "
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700821 "length: %u", slen);
822 if (slen < 3 + 1) {
823 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800824 "P2P: Invalid ANQP Query Response length");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700825 return;
826 }
827 if (pos + 4 > end)
828 return;
829
830 if (WPA_GET_BE24(pos) != OUI_WFA) {
831 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800832 "P2P: Unsupported ANQP OUI %06x", WPA_GET_BE24(pos));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700833 return;
834 }
835 pos += 3;
836
837 if (*pos != P2P_OUI_TYPE) {
838 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800839 "P2P: Unsupported ANQP vendor type %u", *pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700840 return;
841 }
842 pos++;
843
844 if (pos + 2 > end)
845 return;
846 p2p->sd_rx_update_indic = WPA_GET_LE16(pos);
847 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
848 "P2P: Service Update Indicator: %u", p2p->sd_rx_update_indic);
849 pos += 2;
850
851skip_nqp_header:
852 if (wpabuf_resize(&p2p->sd_rx_resp, end - pos) < 0)
853 return;
854 wpabuf_put_data(p2p->sd_rx_resp, pos, end - pos);
855 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Current SD reassembly "
856 "buffer length: %u",
857 (unsigned int) wpabuf_len(p2p->sd_rx_resp));
858
859 if (more_frags) {
860 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: More fragments "
861 "remains");
862 /* TODO: what would be a good size limit? */
863 if (wpabuf_len(p2p->sd_rx_resp) > 64000) {
864 wpabuf_free(p2p->sd_rx_resp);
865 p2p->sd_rx_resp = NULL;
866 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too long "
867 "SD response - drop it");
868 return;
869 }
870 p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
871 return;
872 }
873
874 p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
875 p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
876 p2p->sd_peer = NULL;
877
878 if (p2p->sd_query) {
879 if (!p2p->sd_query->for_all_peers) {
880 struct p2p_sd_query *q;
881 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
882 "P2P: Remove completed SD query %p",
883 p2p->sd_query);
884 q = p2p->sd_query;
885 p2p_unlink_sd_query(p2p, p2p->sd_query);
886 p2p_free_sd_query(q);
887 }
888 p2p->sd_query = NULL;
889 }
890
891 if (p2p->cfg->sd_response)
892 p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa,
893 p2p->sd_rx_update_indic,
894 wpabuf_head(p2p->sd_rx_resp),
895 wpabuf_len(p2p->sd_rx_resp));
896 wpabuf_free(p2p->sd_rx_resp);
897 p2p->sd_rx_resp = NULL;
898
899 p2p_continue_find(p2p);
900}
901
902
903void * p2p_sd_request(struct p2p_data *p2p, const u8 *dst,
904 const struct wpabuf *tlvs)
905{
906 struct p2p_sd_query *q;
Irfan Sherifff44b9c42012-06-13 11:09:23 -0700907#ifdef ANDROID_P2P
Dmitry Shmidt04949592012-07-19 12:16:46 -0700908 /* Currently, supplicant doesn't support more than one pending broadcast SD request.
Irfan Sherifff44b9c42012-06-13 11:09:23 -0700909 * So reject if application is registering another one before cancelling the existing one.
910 */
911 for (q = p2p->sd_queries; q; q = q->next) {
912 if( (q->for_all_peers == 1) && (!dst)) {
913 wpa_printf(MSG_ERROR, "P2P: Already one pending"
914 " Broadcast request. Please cancel the current one"
915 " before adding a new one");
916 return NULL;
917 }
918 }
919#endif
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700920
921 q = os_zalloc(sizeof(*q));
922 if (q == NULL)
923 return NULL;
924
925 if (dst)
926 os_memcpy(q->peer, dst, ETH_ALEN);
927 else
928 q->for_all_peers = 1;
929
930 q->tlvs = wpabuf_dup(tlvs);
931 if (q->tlvs == NULL) {
932 p2p_free_sd_query(q);
933 return NULL;
934 }
935
936 q->next = p2p->sd_queries;
937 p2p->sd_queries = q;
Dmitry Shmidt04949592012-07-19 12:16:46 -0700938 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Added SD Query %p", q);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700939
Irfan Sheriff96161872012-04-11 18:07:13 -0700940 if (dst == NULL) {
941 struct p2p_device *dev;
942 dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
943 dev->flags &= ~P2P_DEV_SD_INFO;
944 }
945
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700946 return q;
947}
948
949
Dmitry Shmidt61d9df32012-08-29 16:22:06 -0700950#ifdef CONFIG_WIFI_DISPLAY
951void * p2p_sd_request_wfd(struct p2p_data *p2p, const u8 *dst,
952 const struct wpabuf *tlvs)
953{
954 struct p2p_sd_query *q;
955 q = p2p_sd_request(p2p, dst, tlvs);
956 if (q)
957 q->wsd = 1;
958 return q;
959}
960#endif /* CONFIG_WIFI_DISPLAY */
961
962
Dmitry Shmidtb5e8f062012-08-08 10:56:33 -0700963#ifdef ANDROID_P2P
964void p2p_sd_service_update(struct p2p_data *p2p, int action)
965#else
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700966void p2p_sd_service_update(struct p2p_data *p2p)
Dmitry Shmidtb5e8f062012-08-08 10:56:33 -0700967#endif
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700968{
969 p2p->srv_update_indic++;
Dmitry Shmidtb5e8f062012-08-08 10:56:33 -0700970#ifdef ANDROID_P2P
971 if(action == SRV_FLUSH)
972 p2p->srv_count = 0;
973 else if (action == SRV_DEL)
974 p2p->srv_count--;
975 else if (action == SRV_ADD)
976 p2p->srv_count++;
977
978 if(p2p->cfg->sd_request) {
979 if (p2p->srv_count == 1) {
980 /* First Service Registered. Enable SD capability */
981 p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
982 } else if (p2p->srv_count == 0 && !p2p->sd_queries) {
983 /* No services remaining + No queries registered .
984 * Remove the SD Capability
985 */
986 p2p->dev_capab &= ~P2P_DEV_CAPAB_SERVICE_DISCOVERY;
987 }
988 }
989#endif
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700990}
991
992
993int p2p_sd_cancel_request(struct p2p_data *p2p, void *req)
994{
995 if (p2p_unlink_sd_query(p2p, req)) {
996 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
997 "P2P: Cancel pending SD query %p", req);
Irfan Sherifff44b9c42012-06-13 11:09:23 -0700998#ifdef ANDROID_P2P
Dmitry Shmidt04949592012-07-19 12:16:46 -0700999 p2p->sd_dev_list = NULL;
Irfan Sherifff44b9c42012-06-13 11:09:23 -07001000#endif
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001001 p2p_free_sd_query(req);
1002 return 0;
1003 }
1004 return -1;
1005}