p2p_sd.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955
  1. /*
  2. * Wi-Fi Direct - P2P service discovery
  3. * Copyright (c) 2009, Atheros Communications
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "common/ieee802_11_defs.h"
  17. #include "p2p_i.h"
  18. #include "p2p.h"
  19. struct p2p_sd_query * p2p_pending_sd_req(struct p2p_data *p2p,
  20. struct p2p_device *dev)
  21. {
  22. struct p2p_sd_query *q;
  23. if (!(dev->dev_capab & P2P_DEV_CAPAB_SERVICE_DISCOVERY))
  24. return 0; /* peer does not support SD */
  25. for (q = p2p->sd_queries; q; q = q->next) {
  26. if (q->for_all_peers && !(dev->flags & P2P_DEV_SD_INFO))
  27. return q;
  28. if (!q->for_all_peers &&
  29. os_memcmp(q->peer, dev->p2p_device_addr, ETH_ALEN) == 0)
  30. return q;
  31. }
  32. return NULL;
  33. }
  34. static int p2p_unlink_sd_query(struct p2p_data *p2p,
  35. struct p2p_sd_query *query)
  36. {
  37. struct p2p_sd_query *q, *prev;
  38. q = p2p->sd_queries;
  39. prev = NULL;
  40. while (q) {
  41. if (q == query) {
  42. if (prev)
  43. prev->next = q->next;
  44. else
  45. p2p->sd_queries = q->next;
  46. if (p2p->sd_query == query)
  47. p2p->sd_query = NULL;
  48. return 1;
  49. }
  50. prev = q;
  51. q = q->next;
  52. }
  53. return 0;
  54. }
  55. static void p2p_free_sd_query(struct p2p_sd_query *q)
  56. {
  57. if (q == NULL)
  58. return;
  59. wpabuf_free(q->tlvs);
  60. os_free(q);
  61. }
  62. void p2p_free_sd_queries(struct p2p_data *p2p)
  63. {
  64. struct p2p_sd_query *q, *prev;
  65. q = p2p->sd_queries;
  66. p2p->sd_queries = NULL;
  67. while (q) {
  68. prev = q;
  69. q = q->next;
  70. p2p_free_sd_query(prev);
  71. }
  72. }
  73. static struct wpabuf * p2p_build_sd_query(u16 update_indic,
  74. struct wpabuf *tlvs)
  75. {
  76. struct wpabuf *buf;
  77. u8 *len_pos, *len_pos2;
  78. buf = wpabuf_alloc(1000 + wpabuf_len(tlvs));
  79. if (buf == NULL)
  80. return NULL;
  81. wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
  82. wpabuf_put_u8(buf, WLAN_PA_GAS_INITIAL_REQ);
  83. wpabuf_put_u8(buf, 0); /* Dialog Token */
  84. /* Advertisement Protocol IE */
  85. wpabuf_put_u8(buf, WLAN_EID_ADV_PROTO);
  86. wpabuf_put_u8(buf, 2); /* Length */
  87. wpabuf_put_u8(buf, 0); /* QueryRespLenLimit | PAME-BI */
  88. wpabuf_put_u8(buf, NATIVE_QUERY_PROTOCOL); /* Advertisement Protocol */
  89. /* Query Request */
  90. len_pos = wpabuf_put(buf, 2); /* Length (to be filled) */
  91. /* NQP Query Request Frame */
  92. wpabuf_put_le16(buf, NQP_VENDOR_SPECIFIC); /* Info ID */
  93. len_pos2 = wpabuf_put(buf, 2); /* Length (to be filled) */
  94. wpabuf_put_be24(buf, OUI_WFA);
  95. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  96. wpabuf_put_le16(buf, update_indic); /* Service Update Indicator */
  97. wpabuf_put_buf(buf, tlvs);
  98. WPA_PUT_LE16(len_pos2, (u8 *) wpabuf_put(buf, 0) - len_pos2 - 2);
  99. WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(buf, 0) - len_pos - 2);
  100. return buf;
  101. }
  102. static struct wpabuf * p2p_build_gas_comeback_req(u8 dialog_token)
  103. {
  104. struct wpabuf *buf;
  105. buf = wpabuf_alloc(3);
  106. if (buf == NULL)
  107. return NULL;
  108. wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
  109. wpabuf_put_u8(buf, WLAN_PA_GAS_COMEBACK_REQ);
  110. wpabuf_put_u8(buf, dialog_token);
  111. return buf;
  112. }
  113. static void p2p_send_gas_comeback_req(struct p2p_data *p2p, const u8 *dst,
  114. u8 dialog_token, int freq)
  115. {
  116. struct wpabuf *req;
  117. req = p2p_build_gas_comeback_req(dialog_token);
  118. if (req == NULL)
  119. return;
  120. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  121. if (p2p->cfg->send_action(p2p->cfg->cb_ctx, freq,
  122. dst, p2p->cfg->dev_addr, dst,
  123. wpabuf_head(req), wpabuf_len(req), 200) < 0)
  124. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  125. "P2P: Failed to send Action frame");
  126. wpabuf_free(req);
  127. }
  128. static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code,
  129. u16 comeback_delay,
  130. u16 update_indic,
  131. const struct wpabuf *tlvs)
  132. {
  133. struct wpabuf *buf;
  134. u8 *len_pos, *len_pos2;
  135. buf = wpabuf_alloc(1000 + (tlvs ? wpabuf_len(tlvs) : 0));
  136. if (buf == NULL)
  137. return NULL;
  138. wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
  139. wpabuf_put_u8(buf, WLAN_PA_GAS_INITIAL_RESP);
  140. wpabuf_put_u8(buf, dialog_token);
  141. wpabuf_put_le16(buf, status_code);
  142. wpabuf_put_le16(buf, comeback_delay);
  143. /* Advertisement Protocol IE */
  144. wpabuf_put_u8(buf, WLAN_EID_ADV_PROTO);
  145. wpabuf_put_u8(buf, 2); /* Length */
  146. wpabuf_put_u8(buf, 0x7f); /* QueryRespLenLimit | PAME-BI */
  147. wpabuf_put_u8(buf, NATIVE_QUERY_PROTOCOL); /* Advertisement Protocol */
  148. /* Query Response */
  149. len_pos = wpabuf_put(buf, 2); /* Length (to be filled) */
  150. if (tlvs) {
  151. /* NQP Query Response Frame */
  152. wpabuf_put_le16(buf, NQP_VENDOR_SPECIFIC); /* Info ID */
  153. len_pos2 = wpabuf_put(buf, 2); /* Length (to be filled) */
  154. wpabuf_put_be24(buf, OUI_WFA);
  155. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  156. /* Service Update Indicator */
  157. wpabuf_put_le16(buf, update_indic);
  158. wpabuf_put_buf(buf, tlvs);
  159. WPA_PUT_LE16(len_pos2,
  160. (u8 *) wpabuf_put(buf, 0) - len_pos2 - 2);
  161. }
  162. WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(buf, 0) - len_pos - 2);
  163. return buf;
  164. }
  165. static struct wpabuf * p2p_build_gas_comeback_resp(u8 dialog_token,
  166. u16 status_code,
  167. u16 update_indic,
  168. const u8 *data, size_t len,
  169. u8 frag_id, u8 more,
  170. u16 total_len)
  171. {
  172. struct wpabuf *buf;
  173. u8 *len_pos;
  174. buf = wpabuf_alloc(1000 + len);
  175. if (buf == NULL)
  176. return NULL;
  177. wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
  178. wpabuf_put_u8(buf, WLAN_PA_GAS_COMEBACK_RESP);
  179. wpabuf_put_u8(buf, dialog_token);
  180. wpabuf_put_le16(buf, status_code);
  181. wpabuf_put_u8(buf, frag_id | (more ? 0x80 : 0));
  182. wpabuf_put_le16(buf, 0); /* Comeback Delay */
  183. /* Advertisement Protocol IE */
  184. wpabuf_put_u8(buf, WLAN_EID_ADV_PROTO);
  185. wpabuf_put_u8(buf, 2); /* Length */
  186. wpabuf_put_u8(buf, 0x7f); /* QueryRespLenLimit | PAME-BI */
  187. wpabuf_put_u8(buf, NATIVE_QUERY_PROTOCOL); /* Advertisement Protocol */
  188. /* Query Response */
  189. len_pos = wpabuf_put(buf, 2); /* Length (to be filled) */
  190. if (frag_id == 0) {
  191. /* NQP Query Response Frame */
  192. wpabuf_put_le16(buf, NQP_VENDOR_SPECIFIC); /* Info ID */
  193. wpabuf_put_le16(buf, 3 + 1 + 2 + total_len);
  194. wpabuf_put_be24(buf, OUI_WFA);
  195. wpabuf_put_u8(buf, P2P_OUI_TYPE);
  196. /* Service Update Indicator */
  197. wpabuf_put_le16(buf, update_indic);
  198. }
  199. wpabuf_put_data(buf, data, len);
  200. WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(buf, 0) - len_pos - 2);
  201. return buf;
  202. }
  203. int p2p_start_sd(struct p2p_data *p2p, struct p2p_device *dev)
  204. {
  205. struct wpabuf *req;
  206. int ret = 0;
  207. struct p2p_sd_query *query;
  208. int freq;
  209. freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
  210. if (freq <= 0) {
  211. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  212. "P2P: No Listen/Operating frequency known for the "
  213. "peer " MACSTR " to send SD Request",
  214. MAC2STR(dev->p2p_device_addr));
  215. return -1;
  216. }
  217. query = p2p_pending_sd_req(p2p, dev);
  218. if (query == NULL)
  219. return -1;
  220. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  221. "P2P: Start Service Discovery with " MACSTR,
  222. MAC2STR(dev->p2p_device_addr));
  223. req = p2p_build_sd_query(p2p->srv_update_indic, query->tlvs);
  224. if (req == NULL)
  225. return -1;
  226. p2p->sd_peer = dev;
  227. p2p->sd_query = query;
  228. p2p->pending_action_state = P2P_PENDING_SD;
  229. if (p2p->cfg->send_action(p2p->cfg->cb_ctx, freq,
  230. dev->p2p_device_addr, p2p->cfg->dev_addr,
  231. dev->p2p_device_addr,
  232. wpabuf_head(req), wpabuf_len(req), 5000) < 0)
  233. {
  234. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  235. "P2P: Failed to send Action frame");
  236. ret = -1;
  237. }
  238. wpabuf_free(req);
  239. return ret;
  240. }
  241. void p2p_rx_gas_initial_req(struct p2p_data *p2p, const u8 *sa,
  242. const u8 *data, size_t len, int rx_freq)
  243. {
  244. const u8 *pos = data;
  245. const u8 *end = data + len;
  246. const u8 *next;
  247. u8 dialog_token;
  248. u16 slen;
  249. int freq;
  250. u16 update_indic;
  251. if (p2p->cfg->sd_request == NULL)
  252. return;
  253. if (rx_freq > 0)
  254. freq = rx_freq;
  255. else
  256. freq = p2p_channel_to_freq(p2p->cfg->country,
  257. p2p->cfg->reg_class,
  258. p2p->cfg->channel);
  259. if (freq < 0)
  260. return;
  261. if (len < 1 + 2)
  262. return;
  263. dialog_token = *pos++;
  264. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  265. "P2P: GAS Initial Request from " MACSTR " (dialog token %u, "
  266. "freq %d)",
  267. MAC2STR(sa), dialog_token, rx_freq);
  268. if (*pos != WLAN_EID_ADV_PROTO) {
  269. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  270. "P2P: Unexpected IE in GAS Initial Request: %u", *pos);
  271. return;
  272. }
  273. pos++;
  274. slen = *pos++;
  275. next = pos + slen;
  276. if (next > end || slen < 2) {
  277. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  278. "P2P: Invalid IE in GAS Initial Request");
  279. return;
  280. }
  281. pos++; /* skip QueryRespLenLimit and PAME-BI */
  282. if (*pos != NATIVE_QUERY_PROTOCOL) {
  283. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  284. "P2P: Unsupported GAS advertisement protocol id %u",
  285. *pos);
  286. return;
  287. }
  288. pos = next;
  289. /* Query Request */
  290. if (pos + 2 > end)
  291. return;
  292. slen = WPA_GET_LE16(pos);
  293. pos += 2;
  294. if (pos + slen > end)
  295. return;
  296. end = pos + slen;
  297. /* NQP Query Request */
  298. if (pos + 4 > end)
  299. return;
  300. if (WPA_GET_LE16(pos) != NQP_VENDOR_SPECIFIC) {
  301. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  302. "P2P: Unsupported NQP Info ID %u", WPA_GET_LE16(pos));
  303. return;
  304. }
  305. pos += 2;
  306. slen = WPA_GET_LE16(pos);
  307. pos += 2;
  308. if (pos + slen > end || slen < 3 + 1) {
  309. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  310. "P2P: Invalid NQP Query Request length");
  311. return;
  312. }
  313. if (WPA_GET_BE24(pos) != OUI_WFA) {
  314. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  315. "P2P: Unsupported NQP OUI %06x", WPA_GET_BE24(pos));
  316. return;
  317. }
  318. pos += 3;
  319. if (*pos != P2P_OUI_TYPE) {
  320. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  321. "P2P: Unsupported NQP vendor type %u", *pos);
  322. return;
  323. }
  324. pos++;
  325. if (pos + 2 > end)
  326. return;
  327. update_indic = WPA_GET_LE16(pos);
  328. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  329. "P2P: Service Update Indicator: %u", update_indic);
  330. pos += 2;
  331. p2p->cfg->sd_request(p2p->cfg->cb_ctx, freq, sa, dialog_token,
  332. update_indic, pos, end - pos);
  333. /* the response will be indicated with a call to p2p_sd_response() */
  334. }
  335. void p2p_sd_response(struct p2p_data *p2p, int freq, const u8 *dst,
  336. u8 dialog_token, const struct wpabuf *resp_tlvs)
  337. {
  338. struct wpabuf *resp;
  339. /* TODO: fix the length limit to match with the maximum frame length */
  340. if (wpabuf_len(resp_tlvs) > 1400) {
  341. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response long "
  342. "enough to require fragmentation");
  343. if (p2p->sd_resp) {
  344. /*
  345. * TODO: Could consider storing the fragmented response
  346. * separately for each peer to avoid having to drop old
  347. * one if there is more than one pending SD query.
  348. * Though, that would eat more memory, so there are
  349. * also benefits to just using a single buffer.
  350. */
  351. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
  352. "previous SD response");
  353. wpabuf_free(p2p->sd_resp);
  354. }
  355. os_memcpy(p2p->sd_resp_addr, dst, ETH_ALEN);
  356. p2p->sd_resp_dialog_token = dialog_token;
  357. p2p->sd_resp = wpabuf_dup(resp_tlvs);
  358. p2p->sd_resp_pos = 0;
  359. p2p->sd_frag_id = 0;
  360. resp = p2p_build_sd_response(dialog_token, WLAN_STATUS_SUCCESS,
  361. 1, p2p->srv_update_indic, NULL);
  362. } else {
  363. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: SD response fits "
  364. "in initial response");
  365. resp = p2p_build_sd_response(dialog_token,
  366. WLAN_STATUS_SUCCESS, 0,
  367. p2p->srv_update_indic, resp_tlvs);
  368. }
  369. if (resp == NULL)
  370. return;
  371. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  372. if (p2p->cfg->send_action(p2p->cfg->cb_ctx, freq,
  373. dst, p2p->cfg->dev_addr, p2p->cfg->dev_addr,
  374. wpabuf_head(resp), wpabuf_len(resp), 200) <
  375. 0)
  376. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  377. "P2P: Failed to send Action frame");
  378. wpabuf_free(resp);
  379. }
  380. void p2p_rx_gas_initial_resp(struct p2p_data *p2p, const u8 *sa,
  381. const u8 *data, size_t len, int rx_freq)
  382. {
  383. const u8 *pos = data;
  384. const u8 *end = data + len;
  385. const u8 *next;
  386. u8 dialog_token;
  387. u16 status_code;
  388. u16 comeback_delay;
  389. u16 slen;
  390. u16 update_indic;
  391. if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
  392. os_memcmp(sa, p2p->sd_peer->p2p_device_addr, ETH_ALEN) != 0) {
  393. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  394. "P2P: Ignore unexpected GAS Initial Response from "
  395. MACSTR, MAC2STR(sa));
  396. return;
  397. }
  398. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  399. p2p_clear_timeout(p2p);
  400. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  401. "P2P: Received GAS Initial Response from " MACSTR " (len=%d)",
  402. MAC2STR(sa), (int) len);
  403. if (len < 5 + 2) {
  404. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  405. "P2P: Too short GAS Initial Response frame");
  406. return;
  407. }
  408. dialog_token = *pos++;
  409. /* TODO: check dialog_token match */
  410. status_code = WPA_GET_LE16(pos);
  411. pos += 2;
  412. comeback_delay = WPA_GET_LE16(pos);
  413. pos += 2;
  414. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  415. "P2P: dialog_token=%u status_code=%u comeback_delay=%u",
  416. dialog_token, status_code, comeback_delay);
  417. if (status_code) {
  418. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  419. "P2P: Service Discovery failed: status code %u",
  420. status_code);
  421. return;
  422. }
  423. if (*pos != WLAN_EID_ADV_PROTO) {
  424. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  425. "P2P: Unexpected IE in GAS Initial Response: %u",
  426. *pos);
  427. return;
  428. }
  429. pos++;
  430. slen = *pos++;
  431. next = pos + slen;
  432. if (next > end || slen < 2) {
  433. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  434. "P2P: Invalid IE in GAS Initial Response");
  435. return;
  436. }
  437. pos++; /* skip QueryRespLenLimit and PAME-BI */
  438. if (*pos != NATIVE_QUERY_PROTOCOL) {
  439. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  440. "P2P: Unsupported GAS advertisement protocol id %u",
  441. *pos);
  442. return;
  443. }
  444. pos = next;
  445. /* Query Response */
  446. if (pos + 2 > end) {
  447. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
  448. "Response");
  449. return;
  450. }
  451. slen = WPA_GET_LE16(pos);
  452. pos += 2;
  453. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
  454. slen);
  455. if (pos + slen > end) {
  456. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
  457. "Response data");
  458. return;
  459. }
  460. end = pos + slen;
  461. if (comeback_delay) {
  462. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Fragmented "
  463. "response - request fragments");
  464. if (p2p->sd_rx_resp) {
  465. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Drop "
  466. "old SD reassembly buffer");
  467. wpabuf_free(p2p->sd_rx_resp);
  468. p2p->sd_rx_resp = NULL;
  469. }
  470. p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
  471. return;
  472. }
  473. /* NQP Query Response */
  474. if (pos + 4 > end)
  475. return;
  476. if (WPA_GET_LE16(pos) != NQP_VENDOR_SPECIFIC) {
  477. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  478. "P2P: Unsupported NQP Info ID %u", WPA_GET_LE16(pos));
  479. return;
  480. }
  481. pos += 2;
  482. slen = WPA_GET_LE16(pos);
  483. pos += 2;
  484. if (pos + slen > end || slen < 3 + 1) {
  485. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  486. "P2P: Invalid NQP Query Response length");
  487. return;
  488. }
  489. if (WPA_GET_BE24(pos) != OUI_WFA) {
  490. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  491. "P2P: Unsupported NQP OUI %06x", WPA_GET_BE24(pos));
  492. return;
  493. }
  494. pos += 3;
  495. if (*pos != P2P_OUI_TYPE) {
  496. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  497. "P2P: Unsupported NQP vendor type %u", *pos);
  498. return;
  499. }
  500. pos++;
  501. if (pos + 2 > end)
  502. return;
  503. update_indic = WPA_GET_LE16(pos);
  504. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  505. "P2P: Service Update Indicator: %u", update_indic);
  506. pos += 2;
  507. p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
  508. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  509. p2p->sd_peer = NULL;
  510. if (p2p->sd_query) {
  511. if (!p2p->sd_query->for_all_peers) {
  512. struct p2p_sd_query *q;
  513. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  514. "P2P: Remove completed SD query %p",
  515. p2p->sd_query);
  516. q = p2p->sd_query;
  517. p2p_unlink_sd_query(p2p, p2p->sd_query);
  518. p2p_free_sd_query(q);
  519. }
  520. p2p->sd_query = NULL;
  521. }
  522. if (p2p->cfg->sd_response)
  523. p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa, update_indic,
  524. pos, end - pos);
  525. p2p_continue_find(p2p);
  526. }
  527. void p2p_rx_gas_comeback_req(struct p2p_data *p2p, const u8 *sa,
  528. const u8 *data, size_t len, int rx_freq)
  529. {
  530. struct wpabuf *resp;
  531. u8 dialog_token;
  532. size_t frag_len;
  533. int more = 0;
  534. wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Request", data, len);
  535. if (len < 1)
  536. return;
  537. dialog_token = *data;
  538. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dialog Token: %u",
  539. dialog_token);
  540. if (dialog_token != p2p->sd_resp_dialog_token) {
  541. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  542. "response fragment for dialog token %u", dialog_token);
  543. return;
  544. }
  545. if (p2p->sd_resp == NULL) {
  546. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  547. "response fragment available");
  548. return;
  549. }
  550. if (os_memcmp(sa, p2p->sd_resp_addr, ETH_ALEN) != 0) {
  551. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No pending SD "
  552. "response fragment for " MACSTR, MAC2STR(sa));
  553. return;
  554. }
  555. frag_len = wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos;
  556. if (frag_len > 1400) {
  557. frag_len = 1400;
  558. more = 1;
  559. }
  560. resp = p2p_build_gas_comeback_resp(dialog_token, WLAN_STATUS_SUCCESS,
  561. p2p->srv_update_indic,
  562. wpabuf_head_u8(p2p->sd_resp) +
  563. p2p->sd_resp_pos, frag_len,
  564. p2p->sd_frag_id, more,
  565. wpabuf_len(p2p->sd_resp));
  566. if (resp == NULL)
  567. return;
  568. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send GAS Comeback "
  569. "Response (frag_id %d more=%d frag_len=%d)",
  570. p2p->sd_frag_id, more, (int) frag_len);
  571. p2p->sd_frag_id++;
  572. p2p->sd_resp_pos += frag_len;
  573. if (more) {
  574. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: %d more bytes "
  575. "remain to be sent",
  576. (int) (wpabuf_len(p2p->sd_resp) - p2p->sd_resp_pos));
  577. } else {
  578. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: All fragments of "
  579. "SD response sent");
  580. wpabuf_free(p2p->sd_resp);
  581. p2p->sd_resp = NULL;
  582. }
  583. p2p->pending_action_state = P2P_NO_PENDING_ACTION;
  584. if (p2p->cfg->send_action(p2p->cfg->cb_ctx, rx_freq,
  585. sa, p2p->cfg->dev_addr, p2p->cfg->dev_addr,
  586. wpabuf_head(resp), wpabuf_len(resp), 200) <
  587. 0)
  588. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  589. "P2P: Failed to send Action frame");
  590. wpabuf_free(resp);
  591. }
  592. void p2p_rx_gas_comeback_resp(struct p2p_data *p2p, const u8 *sa,
  593. const u8 *data, size_t len, int rx_freq)
  594. {
  595. const u8 *pos = data;
  596. const u8 *end = data + len;
  597. const u8 *next;
  598. u8 dialog_token;
  599. u16 status_code;
  600. u8 frag_id;
  601. u8 more_frags;
  602. u16 comeback_delay;
  603. u16 slen;
  604. wpa_hexdump(MSG_DEBUG, "P2P: RX GAS Comeback Response", data, len);
  605. if (p2p->state != P2P_SD_DURING_FIND || p2p->sd_peer == NULL ||
  606. os_memcmp(sa, p2p->sd_peer->p2p_device_addr, ETH_ALEN) != 0) {
  607. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  608. "P2P: Ignore unexpected GAS Comeback Response from "
  609. MACSTR, MAC2STR(sa));
  610. return;
  611. }
  612. p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
  613. p2p_clear_timeout(p2p);
  614. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  615. "P2P: Received GAS Comeback Response from " MACSTR " (len=%d)",
  616. MAC2STR(sa), (int) len);
  617. if (len < 6 + 2) {
  618. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  619. "P2P: Too short GAS Comeback Response frame");
  620. return;
  621. }
  622. dialog_token = *pos++;
  623. /* TODO: check dialog_token match */
  624. status_code = WPA_GET_LE16(pos);
  625. pos += 2;
  626. frag_id = *pos & 0x7f;
  627. more_frags = (*pos & 0x80) >> 7;
  628. pos++;
  629. comeback_delay = WPA_GET_LE16(pos);
  630. pos += 2;
  631. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  632. "P2P: dialog_token=%u status_code=%u frag_id=%d more_frags=%d "
  633. "comeback_delay=%u",
  634. dialog_token, status_code, frag_id, more_frags,
  635. comeback_delay);
  636. /* TODO: check frag_id match */
  637. if (status_code) {
  638. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  639. "P2P: Service Discovery failed: status code %u",
  640. status_code);
  641. return;
  642. }
  643. if (*pos != WLAN_EID_ADV_PROTO) {
  644. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  645. "P2P: Unexpected IE in GAS Comeback Response: %u",
  646. *pos);
  647. return;
  648. }
  649. pos++;
  650. slen = *pos++;
  651. next = pos + slen;
  652. if (next > end || slen < 2) {
  653. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  654. "P2P: Invalid IE in GAS Comeback Response");
  655. return;
  656. }
  657. pos++; /* skip QueryRespLenLimit and PAME-BI */
  658. if (*pos != NATIVE_QUERY_PROTOCOL) {
  659. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  660. "P2P: Unsupported GAS advertisement protocol id %u",
  661. *pos);
  662. return;
  663. }
  664. pos = next;
  665. /* Query Response */
  666. if (pos + 2 > end) {
  667. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too short Query "
  668. "Response");
  669. return;
  670. }
  671. slen = WPA_GET_LE16(pos);
  672. pos += 2;
  673. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Query Response Length: %d",
  674. slen);
  675. if (pos + slen > end) {
  676. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Not enough Query "
  677. "Response data");
  678. return;
  679. }
  680. if (slen == 0) {
  681. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: No Query Response "
  682. "data");
  683. return;
  684. }
  685. end = pos + slen;
  686. if (p2p->sd_rx_resp) {
  687. /*
  688. * NQP header is only included in the first fragment; rest of
  689. * the fragments start with continue TLVs.
  690. */
  691. goto skip_nqp_header;
  692. }
  693. /* NQP Query Response */
  694. if (pos + 4 > end)
  695. return;
  696. if (WPA_GET_LE16(pos) != NQP_VENDOR_SPECIFIC) {
  697. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  698. "P2P: Unsupported NQP Info ID %u", WPA_GET_LE16(pos));
  699. return;
  700. }
  701. pos += 2;
  702. slen = WPA_GET_LE16(pos);
  703. pos += 2;
  704. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: NQP Query Response "
  705. "length: %u", slen);
  706. if (slen < 3 + 1) {
  707. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  708. "P2P: Invalid NQP Query Response length");
  709. return;
  710. }
  711. if (pos + 4 > end)
  712. return;
  713. if (WPA_GET_BE24(pos) != OUI_WFA) {
  714. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  715. "P2P: Unsupported NQP OUI %06x", WPA_GET_BE24(pos));
  716. return;
  717. }
  718. pos += 3;
  719. if (*pos != P2P_OUI_TYPE) {
  720. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  721. "P2P: Unsupported NQP vendor type %u", *pos);
  722. return;
  723. }
  724. pos++;
  725. if (pos + 2 > end)
  726. return;
  727. p2p->sd_rx_update_indic = WPA_GET_LE16(pos);
  728. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  729. "P2P: Service Update Indicator: %u", p2p->sd_rx_update_indic);
  730. pos += 2;
  731. skip_nqp_header:
  732. if (wpabuf_resize(&p2p->sd_rx_resp, end - pos) < 0)
  733. return;
  734. wpabuf_put_data(p2p->sd_rx_resp, pos, end - pos);
  735. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Current SD reassembly "
  736. "buffer length: %u",
  737. (unsigned int) wpabuf_len(p2p->sd_rx_resp));
  738. if (more_frags) {
  739. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: More fragments "
  740. "remains");
  741. /* TODO: what would be a good size limit? */
  742. if (wpabuf_len(p2p->sd_rx_resp) > 64000) {
  743. wpabuf_free(p2p->sd_rx_resp);
  744. p2p->sd_rx_resp = NULL;
  745. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Too long "
  746. "SD response - drop it");
  747. return;
  748. }
  749. p2p_send_gas_comeback_req(p2p, sa, dialog_token, rx_freq);
  750. return;
  751. }
  752. p2p->sd_peer->flags |= P2P_DEV_SD_INFO;
  753. p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
  754. p2p->sd_peer = NULL;
  755. if (p2p->sd_query) {
  756. if (!p2p->sd_query->for_all_peers) {
  757. struct p2p_sd_query *q;
  758. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  759. "P2P: Remove completed SD query %p",
  760. p2p->sd_query);
  761. q = p2p->sd_query;
  762. p2p_unlink_sd_query(p2p, p2p->sd_query);
  763. p2p_free_sd_query(q);
  764. }
  765. p2p->sd_query = NULL;
  766. }
  767. if (p2p->cfg->sd_response)
  768. p2p->cfg->sd_response(p2p->cfg->cb_ctx, sa,
  769. p2p->sd_rx_update_indic,
  770. wpabuf_head(p2p->sd_rx_resp),
  771. wpabuf_len(p2p->sd_rx_resp));
  772. wpabuf_free(p2p->sd_rx_resp);
  773. p2p->sd_rx_resp = NULL;
  774. p2p_continue_find(p2p);
  775. }
  776. void * p2p_sd_request(struct p2p_data *p2p, const u8 *dst,
  777. const struct wpabuf *tlvs)
  778. {
  779. struct p2p_sd_query *q;
  780. q = os_zalloc(sizeof(*q));
  781. if (q == NULL)
  782. return NULL;
  783. if (dst)
  784. os_memcpy(q->peer, dst, ETH_ALEN);
  785. else
  786. q->for_all_peers = 1;
  787. q->tlvs = wpabuf_dup(tlvs);
  788. if (q->tlvs == NULL) {
  789. p2p_free_sd_query(q);
  790. return NULL;
  791. }
  792. q->next = p2p->sd_queries;
  793. p2p->sd_queries = q;
  794. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Added SD Query %p", q);
  795. return q;
  796. }
  797. void p2p_sd_service_update(struct p2p_data *p2p)
  798. {
  799. p2p->srv_update_indic++;
  800. }
  801. int p2p_sd_cancel_request(struct p2p_data *p2p, void *req)
  802. {
  803. if (p2p_unlink_sd_query(p2p, req)) {
  804. wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  805. "P2P: Cancel pending SD query %p", req);
  806. p2p_free_sd_query(req);
  807. return 0;
  808. }
  809. return -1;
  810. }