Home | History | Annotate | Download | only in p2p
      1 /*
      2  * Wi-Fi Direct - P2P Group Owner Negotiation
      3  * Copyright (c) 2009-2010, Atheros Communications
      4  *
      5  * This software may be distributed under the terms of the BSD license.
      6  * See README for more details.
      7  */
      8 
      9 #include "includes.h"
     10 
     11 #include "common.h"
     12 #include "utils/eloop.h"
     13 #include "common/ieee802_11_defs.h"
     14 #include "common/wpa_ctrl.h"
     15 #include "wps/wps_defs.h"
     16 #include "p2p_i.h"
     17 #include "p2p.h"
     18 
     19 
     20 static int p2p_go_det(u8 own_intent, u8 peer_value)
     21 {
     22 	u8 peer_intent = peer_value >> 1;
     23 	if (own_intent == peer_intent) {
     24 		if (own_intent == P2P_MAX_GO_INTENT)
     25 			return -1; /* both devices want to become GO */
     26 
     27 		/* Use tie breaker bit to determine GO */
     28 		return (peer_value & 0x01) ? 0 : 1;
     29 	}
     30 
     31 	return own_intent > peer_intent;
     32 }
     33 
     34 
     35 int p2p_peer_channels_check(struct p2p_data *p2p, struct p2p_channels *own,
     36 			    struct p2p_device *dev,
     37 			    const u8 *channel_list, size_t channel_list_len)
     38 {
     39 	const u8 *pos, *end;
     40 	struct p2p_channels *ch;
     41 	size_t channels;
     42 	struct p2p_channels intersection;
     43 
     44 	ch = &dev->channels;
     45 	os_memset(ch, 0, sizeof(*ch));
     46 	pos = channel_list;
     47 	end = channel_list + channel_list_len;
     48 
     49 	if (end - pos < 3)
     50 		return -1;
     51 	os_memcpy(dev->country, pos, 3);
     52 	wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
     53 	if (pos[2] != 0x04 && os_memcmp(pos, p2p->cfg->country, 2) != 0) {
     54 		p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
     55 			p2p->cfg->country[0], p2p->cfg->country[1],
     56 			pos[0], pos[1]);
     57 		return -1;
     58 	}
     59 	pos += 3;
     60 
     61 	while (pos + 2 < end) {
     62 		struct p2p_reg_class *cl = &ch->reg_class[ch->reg_classes];
     63 		cl->reg_class = *pos++;
     64 		if (pos + 1 + pos[0] > end) {
     65 			p2p_info(p2p, "Invalid peer Channel List");
     66 			return -1;
     67 		}
     68 		channels = *pos++;
     69 		cl->channels = channels > P2P_MAX_REG_CLASS_CHANNELS ?
     70 			P2P_MAX_REG_CLASS_CHANNELS : channels;
     71 		os_memcpy(cl->channel, pos, cl->channels);
     72 		pos += channels;
     73 		ch->reg_classes++;
     74 		if (ch->reg_classes == P2P_MAX_REG_CLASSES)
     75 			break;
     76 	}
     77 
     78 	p2p_channels_intersect(own, &dev->channels, &intersection);
     79 	p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
     80 		(int) own->reg_classes,
     81 		(int) dev->channels.reg_classes,
     82 		(int) intersection.reg_classes);
     83 	if (intersection.reg_classes == 0) {
     84 		p2p_info(p2p, "No common channels found");
     85 		return -1;
     86 	}
     87 	return 0;
     88 }
     89 
     90 
     91 static int p2p_peer_channels(struct p2p_data *p2p, struct p2p_device *dev,
     92 			     const u8 *channel_list, size_t channel_list_len)
     93 {
     94 	return p2p_peer_channels_check(p2p, &p2p->channels, dev,
     95 				       channel_list, channel_list_len);
     96 }
     97 
     98 
     99 u16 p2p_wps_method_pw_id(enum p2p_wps_method wps_method)
    100 {
    101 	switch (wps_method) {
    102 	case WPS_PIN_DISPLAY:
    103 		return DEV_PW_REGISTRAR_SPECIFIED;
    104 	case WPS_PIN_KEYPAD:
    105 		return DEV_PW_USER_SPECIFIED;
    106 	case WPS_PBC:
    107 		return DEV_PW_PUSHBUTTON;
    108 	case WPS_NFC:
    109 		return DEV_PW_NFC_CONNECTION_HANDOVER;
    110 	case WPS_P2PS:
    111 		return DEV_PW_P2PS_DEFAULT;
    112 	default:
    113 		return DEV_PW_DEFAULT;
    114 	}
    115 }
    116 
    117 
    118 static const char * p2p_wps_method_str(enum p2p_wps_method wps_method)
    119 {
    120 	switch (wps_method) {
    121 	case WPS_PIN_DISPLAY:
    122 		return "Display";
    123 	case WPS_PIN_KEYPAD:
    124 		return "Keypad";
    125 	case WPS_PBC:
    126 		return "PBC";
    127 	case WPS_NFC:
    128 		return "NFC";
    129 	case WPS_P2PS:
    130 		return "P2PS";
    131 	default:
    132 		return "??";
    133 	}
    134 }
    135 
    136 
    137 static struct wpabuf * p2p_build_go_neg_req(struct p2p_data *p2p,
    138 					    struct p2p_device *peer)
    139 {
    140 	struct wpabuf *buf;
    141 	u8 *len;
    142 	u8 group_capab;
    143 	size_t extra = 0;
    144 	u16 pw_id;
    145 
    146 #ifdef CONFIG_WIFI_DISPLAY
    147 	if (p2p->wfd_ie_go_neg)
    148 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
    149 #endif /* CONFIG_WIFI_DISPLAY */
    150 
    151 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ])
    152 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ]);
    153 
    154 	buf = wpabuf_alloc(1000 + extra);
    155 	if (buf == NULL)
    156 		return NULL;
    157 
    158 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
    159 
    160 	len = p2p_buf_add_ie_hdr(buf);
    161 	group_capab = 0;
    162 	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
    163 		group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
    164 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
    165 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_RECONN;
    166 	}
    167 	if (p2p->cross_connect)
    168 		group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
    169 	if (p2p->cfg->p2p_intra_bss)
    170 		group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
    171 	p2p_buf_add_capability(buf, p2p->dev_capab &
    172 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
    173 			       group_capab);
    174 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
    175 	p2p_buf_add_config_timeout(buf, p2p->go_timeout, p2p->client_timeout);
    176 	p2p_buf_add_listen_channel(buf, p2p->cfg->country, p2p->cfg->reg_class,
    177 				   p2p->cfg->channel);
    178 	if (p2p->ext_listen_interval)
    179 		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
    180 					      p2p->ext_listen_interval);
    181 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
    182 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &p2p->channels);
    183 	p2p_buf_add_device_info(buf, p2p, peer);
    184 	p2p_buf_add_operating_channel(buf, p2p->cfg->country,
    185 				      p2p->op_reg_class, p2p->op_channel);
    186 	p2p_buf_update_ie_hdr(buf, len);
    187 
    188 	/* WPS IE with Device Password ID attribute */
    189 	pw_id = p2p_wps_method_pw_id(peer->wps_method);
    190 	if (peer->oob_pw_id)
    191 		pw_id = peer->oob_pw_id;
    192 	if (p2p_build_wps_ie(p2p, buf, pw_id, 0) < 0) {
    193 		p2p_dbg(p2p, "Failed to build WPS IE for GO Negotiation Request");
    194 		wpabuf_free(buf);
    195 		return NULL;
    196 	}
    197 
    198 #ifdef CONFIG_WIFI_DISPLAY
    199 	if (p2p->wfd_ie_go_neg)
    200 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
    201 #endif /* CONFIG_WIFI_DISPLAY */
    202 
    203 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ])
    204 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_REQ]);
    205 
    206 	return buf;
    207 }
    208 
    209 
    210 int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev)
    211 {
    212 	struct wpabuf *req;
    213 	int freq;
    214 
    215 	if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG) {
    216 		u16 config_method;
    217 		p2p_dbg(p2p, "Use PD-before-GO-Neg workaround for " MACSTR,
    218 			MAC2STR(dev->info.p2p_device_addr));
    219 		if (dev->wps_method == WPS_PIN_DISPLAY)
    220 			config_method = WPS_CONFIG_KEYPAD;
    221 		else if (dev->wps_method == WPS_PIN_KEYPAD)
    222 			config_method = WPS_CONFIG_DISPLAY;
    223 		else if (dev->wps_method == WPS_PBC)
    224 			config_method = WPS_CONFIG_PUSHBUTTON;
    225 		else if (dev->wps_method == WPS_P2PS)
    226 			config_method = WPS_CONFIG_P2PS;
    227 		else
    228 			return -1;
    229 		return p2p_prov_disc_req(p2p, dev->info.p2p_device_addr,
    230 					 NULL, config_method, 0, 0, 1);
    231 	}
    232 
    233 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
    234 	if (dev->oob_go_neg_freq > 0)
    235 		freq = dev->oob_go_neg_freq;
    236 	if (freq <= 0) {
    237 		p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
    238 			MACSTR " to send GO Negotiation Request",
    239 			MAC2STR(dev->info.p2p_device_addr));
    240 		return -1;
    241 	}
    242 
    243 	req = p2p_build_go_neg_req(p2p, dev);
    244 	if (req == NULL)
    245 		return -1;
    246 	p2p_dbg(p2p, "Sending GO Negotiation Request");
    247 	p2p_set_state(p2p, P2P_CONNECT);
    248 	p2p->pending_action_state = P2P_PENDING_GO_NEG_REQUEST;
    249 	p2p->go_neg_peer = dev;
    250 	eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
    251 	dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE;
    252 	dev->connect_reqs++;
    253 	if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
    254 			    p2p->cfg->dev_addr, dev->info.p2p_device_addr,
    255 			    wpabuf_head(req), wpabuf_len(req), 500) < 0) {
    256 		p2p_dbg(p2p, "Failed to send Action frame");
    257 		/* Use P2P find to recover and retry */
    258 		p2p_set_timeout(p2p, 0, 0);
    259 	} else
    260 		dev->go_neg_req_sent++;
    261 
    262 	wpabuf_free(req);
    263 
    264 	return 0;
    265 }
    266 
    267 
    268 static struct wpabuf * p2p_build_go_neg_resp(struct p2p_data *p2p,
    269 					     struct p2p_device *peer,
    270 					     u8 dialog_token, u8 status,
    271 					     u8 tie_breaker)
    272 {
    273 	struct wpabuf *buf;
    274 	u8 *len;
    275 	u8 group_capab;
    276 	size_t extra = 0;
    277 	u16 pw_id;
    278 
    279 	p2p_dbg(p2p, "Building GO Negotiation Response");
    280 
    281 #ifdef CONFIG_WIFI_DISPLAY
    282 	if (p2p->wfd_ie_go_neg)
    283 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
    284 #endif /* CONFIG_WIFI_DISPLAY */
    285 
    286 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP])
    287 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP]);
    288 
    289 	buf = wpabuf_alloc(1000 + extra);
    290 	if (buf == NULL)
    291 		return NULL;
    292 
    293 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_RESP, dialog_token);
    294 
    295 	len = p2p_buf_add_ie_hdr(buf);
    296 	p2p_buf_add_status(buf, status);
    297 	group_capab = 0;
    298 	if (peer && peer->go_state == LOCAL_GO) {
    299 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
    300 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
    301 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
    302 				group_capab |=
    303 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
    304 		}
    305 		if (p2p->cross_connect)
    306 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
    307 		if (p2p->cfg->p2p_intra_bss)
    308 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
    309 	}
    310 	p2p_buf_add_capability(buf, p2p->dev_capab &
    311 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
    312 			       group_capab);
    313 	p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | tie_breaker);
    314 	p2p_buf_add_config_timeout(buf, p2p->go_timeout, p2p->client_timeout);
    315 	if (peer && peer->go_state == REMOTE_GO) {
    316 		p2p_dbg(p2p, "Omit Operating Channel attribute");
    317 	} else {
    318 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
    319 					      p2p->op_reg_class,
    320 					      p2p->op_channel);
    321 	}
    322 	p2p_buf_add_intended_addr(buf, p2p->intended_addr);
    323 	if (status || peer == NULL) {
    324 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
    325 					 &p2p->channels);
    326 	} else if (peer->go_state == REMOTE_GO) {
    327 		p2p_buf_add_channel_list(buf, p2p->cfg->country,
    328 					 &p2p->channels);
    329 	} else {
    330 		struct p2p_channels res;
    331 		p2p_channels_intersect(&p2p->channels, &peer->channels,
    332 				       &res);
    333 		p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
    334 	}
    335 	p2p_buf_add_device_info(buf, p2p, peer);
    336 	if (peer && peer->go_state == LOCAL_GO) {
    337 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
    338 				     p2p->ssid_len);
    339 	}
    340 	p2p_buf_update_ie_hdr(buf, len);
    341 
    342 	/* WPS IE with Device Password ID attribute */
    343 	pw_id = p2p_wps_method_pw_id(peer ? peer->wps_method : WPS_NOT_READY);
    344 	if (peer && peer->oob_pw_id)
    345 		pw_id = peer->oob_pw_id;
    346 	if (p2p_build_wps_ie(p2p, buf, pw_id, 0) < 0) {
    347 		p2p_dbg(p2p, "Failed to build WPS IE for GO Negotiation Response");
    348 		wpabuf_free(buf);
    349 		return NULL;
    350 	}
    351 
    352 #ifdef CONFIG_WIFI_DISPLAY
    353 	if (p2p->wfd_ie_go_neg)
    354 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
    355 #endif /* CONFIG_WIFI_DISPLAY */
    356 
    357 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP])
    358 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_RESP]);
    359 
    360 	return buf;
    361 }
    362 
    363 
    364 /**
    365  * p2p_reselect_channel - Re-select operating channel based on peer information
    366  * @p2p: P2P module context from p2p_init()
    367  * @intersection: Support channel list intersection from local and peer
    368  *
    369  * This function is used to re-select the best channel after having received
    370  * information from the peer to allow supported channel lists to be intersected.
    371  * This can be used to improve initial channel selection done in
    372  * p2p_prepare_channel() prior to the start of GO Negotiation. In addition, this
    373  * can be used for Invitation case.
    374  */
    375 void p2p_reselect_channel(struct p2p_data *p2p,
    376 			  struct p2p_channels *intersection)
    377 {
    378 	struct p2p_reg_class *cl;
    379 	int freq;
    380 	u8 op_reg_class, op_channel;
    381 	unsigned int i;
    382 	const int op_classes_5ghz[] = { 124, 125, 115, 0 };
    383 	const int op_classes_ht40[] = { 126, 127, 116, 117, 0 };
    384 	const int op_classes_vht[] = { 128, 0 };
    385 
    386 	if (p2p->own_freq_preference > 0 &&
    387 	    p2p_freq_to_channel(p2p->own_freq_preference,
    388 				&op_reg_class, &op_channel) == 0 &&
    389 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
    390 		p2p_dbg(p2p, "Pick own channel preference (reg_class %u channel %u) from intersection",
    391 			op_reg_class, op_channel);
    392 		p2p->op_reg_class = op_reg_class;
    393 		p2p->op_channel = op_channel;
    394 		return;
    395 	}
    396 
    397 	if (p2p->best_freq_overall > 0 &&
    398 	    p2p_freq_to_channel(p2p->best_freq_overall,
    399 				&op_reg_class, &op_channel) == 0 &&
    400 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
    401 		p2p_dbg(p2p, "Pick best overall channel (reg_class %u channel %u) from intersection",
    402 			op_reg_class, op_channel);
    403 		p2p->op_reg_class = op_reg_class;
    404 		p2p->op_channel = op_channel;
    405 		return;
    406 	}
    407 
    408 	/* First, try to pick the best channel from another band */
    409 	freq = p2p_channel_to_freq(p2p->op_reg_class, p2p->op_channel);
    410 	if (freq >= 2400 && freq < 2500 && p2p->best_freq_5 > 0 &&
    411 	    !p2p_channels_includes(intersection, p2p->op_reg_class,
    412 				   p2p->op_channel) &&
    413 	    p2p_freq_to_channel(p2p->best_freq_5,
    414 				&op_reg_class, &op_channel) == 0 &&
    415 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
    416 		p2p_dbg(p2p, "Pick best 5 GHz channel (reg_class %u channel %u) from intersection",
    417 			op_reg_class, op_channel);
    418 		p2p->op_reg_class = op_reg_class;
    419 		p2p->op_channel = op_channel;
    420 		return;
    421 	}
    422 
    423 	if (freq >= 4900 && freq < 6000 && p2p->best_freq_24 > 0 &&
    424 	    !p2p_channels_includes(intersection, p2p->op_reg_class,
    425 				   p2p->op_channel) &&
    426 	    p2p_freq_to_channel(p2p->best_freq_24,
    427 				&op_reg_class, &op_channel) == 0 &&
    428 	    p2p_channels_includes(intersection, op_reg_class, op_channel)) {
    429 		p2p_dbg(p2p, "Pick best 2.4 GHz channel (reg_class %u channel %u) from intersection",
    430 			op_reg_class, op_channel);
    431 		p2p->op_reg_class = op_reg_class;
    432 		p2p->op_channel = op_channel;
    433 		return;
    434 	}
    435 
    436 	/* Select channel with highest preference if the peer supports it */
    437 	for (i = 0; p2p->cfg->pref_chan && i < p2p->cfg->num_pref_chan; i++) {
    438 		if (p2p_channels_includes(intersection,
    439 					  p2p->cfg->pref_chan[i].op_class,
    440 					  p2p->cfg->pref_chan[i].chan)) {
    441 			p2p->op_reg_class = p2p->cfg->pref_chan[i].op_class;
    442 			p2p->op_channel = p2p->cfg->pref_chan[i].chan;
    443 			p2p_dbg(p2p, "Pick highest preferred channel (op_class %u channel %u) from intersection",
    444 				p2p->op_reg_class, p2p->op_channel);
    445 			return;
    446 		}
    447 	}
    448 
    449 	/* Try a channel where we might be able to use VHT */
    450 	if (p2p_channel_select(intersection, op_classes_vht,
    451 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
    452 		p2p_dbg(p2p, "Pick possible VHT channel (op_class %u channel %u) from intersection",
    453 			p2p->op_reg_class, p2p->op_channel);
    454 		return;
    455 	}
    456 
    457 	/* Try a channel where we might be able to use HT40 */
    458 	if (p2p_channel_select(intersection, op_classes_ht40,
    459 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
    460 		p2p_dbg(p2p, "Pick possible HT40 channel (op_class %u channel %u) from intersection",
    461 			p2p->op_reg_class, p2p->op_channel);
    462 		return;
    463 	}
    464 
    465 	/* Prefer a 5 GHz channel */
    466 	if (p2p_channel_select(intersection, op_classes_5ghz,
    467 			       &p2p->op_reg_class, &p2p->op_channel) == 0) {
    468 		p2p_dbg(p2p, "Pick possible 5 GHz channel (op_class %u channel %u) from intersection",
    469 			p2p->op_reg_class, p2p->op_channel);
    470 		return;
    471 	}
    472 
    473 	/*
    474 	 * Try to see if the original channel is in the intersection. If
    475 	 * so, no need to change anything, as it already contains some
    476 	 * randomness.
    477 	 */
    478 	if (p2p_channels_includes(intersection, p2p->op_reg_class,
    479 				  p2p->op_channel)) {
    480 		p2p_dbg(p2p, "Using original operating class and channel (op_class %u channel %u) from intersection",
    481 			p2p->op_reg_class, p2p->op_channel);
    482 		return;
    483 	}
    484 
    485 	/*
    486 	 * Fall back to whatever is included in the channel intersection since
    487 	 * no better options seems to be available.
    488 	 */
    489 	cl = &intersection->reg_class[0];
    490 	p2p_dbg(p2p, "Pick another channel (reg_class %u channel %u) from intersection",
    491 		cl->reg_class, cl->channel[0]);
    492 	p2p->op_reg_class = cl->reg_class;
    493 	p2p->op_channel = cl->channel[0];
    494 }
    495 
    496 
    497 int p2p_go_select_channel(struct p2p_data *p2p, struct p2p_device *dev,
    498 			  u8 *status)
    499 {
    500 	struct p2p_channels tmp, intersection;
    501 
    502 	p2p_channels_dump(p2p, "own channels", &p2p->channels);
    503 	p2p_channels_dump(p2p, "peer channels", &dev->channels);
    504 	p2p_channels_intersect(&p2p->channels, &dev->channels, &tmp);
    505 	p2p_channels_dump(p2p, "intersection", &tmp);
    506 	p2p_channels_remove_freqs(&tmp, &p2p->no_go_freq);
    507 	p2p_channels_dump(p2p, "intersection after no-GO removal", &tmp);
    508 	p2p_channels_intersect(&tmp, &p2p->cfg->channels, &intersection);
    509 	p2p_channels_dump(p2p, "intersection with local channel list",
    510 			  &intersection);
    511 	if (intersection.reg_classes == 0 ||
    512 	    intersection.reg_class[0].channels == 0) {
    513 		*status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
    514 		p2p_dbg(p2p, "No common channels found");
    515 		return -1;
    516 	}
    517 
    518 	if (!p2p_channels_includes(&intersection, p2p->op_reg_class,
    519 				   p2p->op_channel)) {
    520 		if (dev->flags & P2P_DEV_FORCE_FREQ) {
    521 			*status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
    522 			p2p_dbg(p2p, "Peer does not support the forced channel");
    523 			return -1;
    524 		}
    525 
    526 		p2p_dbg(p2p, "Selected operating channel (op_class %u channel %u) not acceptable to the peer",
    527 			p2p->op_reg_class, p2p->op_channel);
    528 		p2p_reselect_channel(p2p, &intersection);
    529 	} else if (!(dev->flags & P2P_DEV_FORCE_FREQ) &&
    530 		   !p2p->cfg->cfg_op_channel) {
    531 		p2p_dbg(p2p, "Try to optimize channel selection with peer information received; previously selected op_class %u channel %u",
    532 			p2p->op_reg_class, p2p->op_channel);
    533 		p2p_reselect_channel(p2p, &intersection);
    534 	}
    535 
    536 	if (!p2p->ssid_set) {
    537 		p2p_build_ssid(p2p, p2p->ssid, &p2p->ssid_len);
    538 		p2p->ssid_set = 1;
    539 	}
    540 
    541 	return 0;
    542 }
    543 
    544 
    545 void p2p_process_go_neg_req(struct p2p_data *p2p, const u8 *sa,
    546 			    const u8 *data, size_t len, int rx_freq)
    547 {
    548 	struct p2p_device *dev = NULL;
    549 	struct wpabuf *resp;
    550 	struct p2p_message msg;
    551 	u8 status = P2P_SC_FAIL_INVALID_PARAMS;
    552 	int tie_breaker = 0;
    553 	int freq;
    554 
    555 	p2p_dbg(p2p, "Received GO Negotiation Request from " MACSTR "(freq=%d)",
    556 		MAC2STR(sa), rx_freq);
    557 
    558 	if (p2p_parse(data, len, &msg))
    559 		return;
    560 
    561 	if (!msg.capability) {
    562 		p2p_dbg(p2p, "Mandatory Capability attribute missing from GO Negotiation Request");
    563 #ifdef CONFIG_P2P_STRICT
    564 		goto fail;
    565 #endif /* CONFIG_P2P_STRICT */
    566 	}
    567 
    568 	if (msg.go_intent)
    569 		tie_breaker = *msg.go_intent & 0x01;
    570 	else {
    571 		p2p_dbg(p2p, "Mandatory GO Intent attribute missing from GO Negotiation Request");
    572 #ifdef CONFIG_P2P_STRICT
    573 		goto fail;
    574 #endif /* CONFIG_P2P_STRICT */
    575 	}
    576 
    577 	if (!msg.config_timeout) {
    578 		p2p_dbg(p2p, "Mandatory Configuration Timeout attribute missing from GO Negotiation Request");
    579 #ifdef CONFIG_P2P_STRICT
    580 		goto fail;
    581 #endif /* CONFIG_P2P_STRICT */
    582 	}
    583 
    584 	if (!msg.listen_channel) {
    585 		p2p_dbg(p2p, "No Listen Channel attribute received");
    586 		goto fail;
    587 	}
    588 	if (!msg.operating_channel) {
    589 		p2p_dbg(p2p, "No Operating Channel attribute received");
    590 		goto fail;
    591 	}
    592 	if (!msg.channel_list) {
    593 		p2p_dbg(p2p, "No Channel List attribute received");
    594 		goto fail;
    595 	}
    596 	if (!msg.intended_addr) {
    597 		p2p_dbg(p2p, "No Intended P2P Interface Address attribute received");
    598 		goto fail;
    599 	}
    600 	if (!msg.p2p_device_info) {
    601 		p2p_dbg(p2p, "No P2P Device Info attribute received");
    602 		goto fail;
    603 	}
    604 
    605 	if (os_memcmp(msg.p2p_device_addr, sa, ETH_ALEN) != 0) {
    606 		p2p_dbg(p2p, "Unexpected GO Negotiation Request SA=" MACSTR
    607 			" != dev_addr=" MACSTR,
    608 			MAC2STR(sa), MAC2STR(msg.p2p_device_addr));
    609 		goto fail;
    610 	}
    611 
    612 	dev = p2p_get_device(p2p, sa);
    613 
    614 	if (msg.status && *msg.status) {
    615 		p2p_dbg(p2p, "Unexpected Status attribute (%d) in GO Negotiation Request",
    616 			*msg.status);
    617 		if (dev && p2p->go_neg_peer == dev &&
    618 		    *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) {
    619 			/*
    620 			 * This mechanism for using Status attribute in GO
    621 			 * Negotiation Request is not compliant with the P2P
    622 			 * specification, but some deployed devices use it to
    623 			 * indicate rejection of GO Negotiation in a case where
    624 			 * they have sent out GO Negotiation Response with
    625 			 * status 1. The P2P specification explicitly disallows
    626 			 * this. To avoid unnecessary interoperability issues
    627 			 * and extra frames, mark the pending negotiation as
    628 			 * failed and do not reply to this GO Negotiation
    629 			 * Request frame.
    630 			 */
    631 			p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
    632 			p2p_go_neg_failed(p2p, *msg.status);
    633 			p2p_parse_free(&msg);
    634 			return;
    635 		}
    636 		goto fail;
    637 	}
    638 
    639 	if (dev == NULL)
    640 		dev = p2p_add_dev_from_go_neg_req(p2p, sa, &msg);
    641 	else if ((dev->flags & P2P_DEV_PROBE_REQ_ONLY) ||
    642 		  !(dev->flags & P2P_DEV_REPORTED))
    643 		p2p_add_dev_info(p2p, sa, dev, &msg);
    644 	else if (!dev->listen_freq && !dev->oper_freq) {
    645 		/*
    646 		 * This may happen if the peer entry was added based on PD
    647 		 * Request and no Probe Request/Response frame has been received
    648 		 * from this peer (or that information has timed out).
    649 		 */
    650 		p2p_dbg(p2p, "Update peer " MACSTR
    651 			" based on GO Neg Req since listen/oper freq not known",
    652 			MAC2STR(dev->info.p2p_device_addr));
    653 		p2p_add_dev_info(p2p, sa, dev, &msg);
    654 	}
    655 
    656 	if (p2p->go_neg_peer && p2p->go_neg_peer == dev)
    657 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
    658 
    659 	if (dev && dev->flags & P2P_DEV_USER_REJECTED) {
    660 		p2p_dbg(p2p, "User has rejected this peer");
    661 		status = P2P_SC_FAIL_REJECTED_BY_USER;
    662 	} else if (dev == NULL ||
    663 		   (dev->wps_method == WPS_NOT_READY &&
    664 		    (p2p->authorized_oob_dev_pw_id == 0 ||
    665 		     p2p->authorized_oob_dev_pw_id !=
    666 		     msg.dev_password_id))) {
    667 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
    668 			MAC2STR(sa));
    669 		status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
    670 		p2p->cfg->go_neg_req_rx(p2p->cfg->cb_ctx, sa,
    671 					msg.dev_password_id,
    672 					msg.go_intent ? (*msg.go_intent >> 1) :
    673 					0);
    674 	} else if (p2p->go_neg_peer && p2p->go_neg_peer != dev) {
    675 		p2p_dbg(p2p, "Already in Group Formation with another peer");
    676 		status = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE;
    677 	} else {
    678 		int go;
    679 
    680 		if (!p2p->go_neg_peer) {
    681 			p2p_dbg(p2p, "Starting GO Negotiation with previously authorized peer");
    682 			if (!(dev->flags & P2P_DEV_FORCE_FREQ)) {
    683 				p2p_dbg(p2p, "Use default channel settings");
    684 				p2p->op_reg_class = p2p->cfg->op_reg_class;
    685 				p2p->op_channel = p2p->cfg->op_channel;
    686 				os_memcpy(&p2p->channels, &p2p->cfg->channels,
    687 					  sizeof(struct p2p_channels));
    688 			} else {
    689 				p2p_dbg(p2p, "Use previously configured forced channel settings");
    690 			}
    691 		}
    692 
    693 		dev->flags &= ~P2P_DEV_NOT_YET_READY;
    694 
    695 		if (!msg.go_intent) {
    696 			p2p_dbg(p2p, "No GO Intent attribute received");
    697 			goto fail;
    698 		}
    699 		if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
    700 			p2p_dbg(p2p, "Invalid GO Intent value (%u) received",
    701 				*msg.go_intent >> 1);
    702 			goto fail;
    703 		}
    704 
    705 		if (dev->go_neg_req_sent &&
    706 		    os_memcmp(sa, p2p->cfg->dev_addr, ETH_ALEN) > 0) {
    707 			p2p_dbg(p2p, "Do not reply since peer has higher address and GO Neg Request already sent");
    708 			p2p_parse_free(&msg);
    709 			return;
    710 		}
    711 
    712 		go = p2p_go_det(p2p->go_intent, *msg.go_intent);
    713 		if (go < 0) {
    714 			p2p_dbg(p2p, "Incompatible GO Intent");
    715 			status = P2P_SC_FAIL_BOTH_GO_INTENT_15;
    716 			goto fail;
    717 		}
    718 
    719 		if (p2p_peer_channels(p2p, dev, msg.channel_list,
    720 				      msg.channel_list_len) < 0) {
    721 			p2p_dbg(p2p, "No common channels found");
    722 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
    723 			goto fail;
    724 		}
    725 
    726 		switch (msg.dev_password_id) {
    727 		case DEV_PW_REGISTRAR_SPECIFIED:
    728 			p2p_dbg(p2p, "PIN from peer Display");
    729 			if (dev->wps_method != WPS_PIN_KEYPAD) {
    730 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
    731 					p2p_wps_method_str(dev->wps_method));
    732 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    733 				goto fail;
    734 			}
    735 			break;
    736 		case DEV_PW_USER_SPECIFIED:
    737 			p2p_dbg(p2p, "Peer entered PIN on Keypad");
    738 			if (dev->wps_method != WPS_PIN_DISPLAY) {
    739 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
    740 					p2p_wps_method_str(dev->wps_method));
    741 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    742 				goto fail;
    743 			}
    744 			break;
    745 		case DEV_PW_PUSHBUTTON:
    746 			p2p_dbg(p2p, "Peer using pushbutton");
    747 			if (dev->wps_method != WPS_PBC) {
    748 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
    749 					p2p_wps_method_str(dev->wps_method));
    750 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    751 				goto fail;
    752 			}
    753 			break;
    754 		case DEV_PW_P2PS_DEFAULT:
    755 			p2p_dbg(p2p, "Peer using P2PS pin");
    756 			if (dev->wps_method != WPS_P2PS) {
    757 				p2p_dbg(p2p,
    758 					"We have wps_method=%s -> incompatible",
    759 					p2p_wps_method_str(dev->wps_method));
    760 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    761 				goto fail;
    762 			}
    763 			break;
    764 		default:
    765 			if (msg.dev_password_id &&
    766 			    msg.dev_password_id == dev->oob_pw_id) {
    767 				p2p_dbg(p2p, "Peer using NFC");
    768 				if (dev->wps_method != WPS_NFC) {
    769 					p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
    770 						p2p_wps_method_str(
    771 							dev->wps_method));
    772 					status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    773 					goto fail;
    774 				}
    775 				break;
    776 			}
    777 #ifdef CONFIG_WPS_NFC
    778 			if (p2p->authorized_oob_dev_pw_id &&
    779 			    msg.dev_password_id ==
    780 			    p2p->authorized_oob_dev_pw_id) {
    781 				p2p_dbg(p2p, "Using static handover with our device password from NFC Tag");
    782 				dev->wps_method = WPS_NFC;
    783 				dev->oob_pw_id = p2p->authorized_oob_dev_pw_id;
    784 				break;
    785 			}
    786 #endif /* CONFIG_WPS_NFC */
    787 			p2p_dbg(p2p, "Unsupported Device Password ID %d",
    788 				msg.dev_password_id);
    789 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
    790 			goto fail;
    791 		}
    792 
    793 		if (go && p2p_go_select_channel(p2p, dev, &status) < 0)
    794 			goto fail;
    795 
    796 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
    797 		dev->oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
    798 						     msg.operating_channel[4]);
    799 		p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
    800 			dev->oper_freq);
    801 
    802 		if (msg.config_timeout) {
    803 			dev->go_timeout = msg.config_timeout[0];
    804 			dev->client_timeout = msg.config_timeout[1];
    805 		}
    806 
    807 		p2p_dbg(p2p, "GO Negotiation with " MACSTR, MAC2STR(sa));
    808 		if (p2p->state != P2P_IDLE)
    809 			p2p_stop_find_for_freq(p2p, rx_freq);
    810 		p2p_set_state(p2p, P2P_GO_NEG);
    811 		p2p_clear_timeout(p2p);
    812 		dev->dialog_token = msg.dialog_token;
    813 		os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
    814 		p2p->go_neg_peer = dev;
    815 		eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p, NULL);
    816 		status = P2P_SC_SUCCESS;
    817 	}
    818 
    819 fail:
    820 	if (dev)
    821 		dev->status = status;
    822 	resp = p2p_build_go_neg_resp(p2p, dev, msg.dialog_token, status,
    823 				     !tie_breaker);
    824 	p2p_parse_free(&msg);
    825 	if (resp == NULL)
    826 		return;
    827 	p2p_dbg(p2p, "Sending GO Negotiation Response");
    828 	if (rx_freq > 0)
    829 		freq = rx_freq;
    830 	else
    831 		freq = p2p_channel_to_freq(p2p->cfg->reg_class,
    832 					   p2p->cfg->channel);
    833 	if (freq < 0) {
    834 		p2p_dbg(p2p, "Unknown regulatory class/channel");
    835 		wpabuf_free(resp);
    836 		return;
    837 	}
    838 	if (status == P2P_SC_SUCCESS) {
    839 		p2p->pending_action_state = P2P_PENDING_GO_NEG_RESPONSE;
    840 		dev->flags |= P2P_DEV_WAIT_GO_NEG_CONFIRM;
    841 		if (os_memcmp(sa, p2p->cfg->dev_addr, ETH_ALEN) < 0) {
    842 			/*
    843 			 * Peer has smaller address, so the GO Negotiation
    844 			 * Response from us is expected to complete
    845 			 * negotiation. Ignore a GO Negotiation Response from
    846 			 * the peer if it happens to be received after this
    847 			 * point due to a race condition in GO Negotiation
    848 			 * Request transmission and processing.
    849 			 */
    850 			dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
    851 		}
    852 	} else
    853 		p2p->pending_action_state =
    854 			P2P_PENDING_GO_NEG_RESPONSE_FAILURE;
    855 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
    856 			    p2p->cfg->dev_addr,
    857 			    wpabuf_head(resp), wpabuf_len(resp), 500) < 0) {
    858 		p2p_dbg(p2p, "Failed to send Action frame");
    859 	}
    860 
    861 	wpabuf_free(resp);
    862 }
    863 
    864 
    865 static struct wpabuf * p2p_build_go_neg_conf(struct p2p_data *p2p,
    866 					     struct p2p_device *peer,
    867 					     u8 dialog_token, u8 status,
    868 					     const u8 *resp_chan, int go)
    869 {
    870 	struct wpabuf *buf;
    871 	u8 *len;
    872 	struct p2p_channels res;
    873 	u8 group_capab;
    874 	size_t extra = 0;
    875 
    876 	p2p_dbg(p2p, "Building GO Negotiation Confirm");
    877 
    878 #ifdef CONFIG_WIFI_DISPLAY
    879 	if (p2p->wfd_ie_go_neg)
    880 		extra = wpabuf_len(p2p->wfd_ie_go_neg);
    881 #endif /* CONFIG_WIFI_DISPLAY */
    882 
    883 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF])
    884 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF]);
    885 
    886 	buf = wpabuf_alloc(1000 + extra);
    887 	if (buf == NULL)
    888 		return NULL;
    889 
    890 	p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_CONF, dialog_token);
    891 
    892 	len = p2p_buf_add_ie_hdr(buf);
    893 	p2p_buf_add_status(buf, status);
    894 	group_capab = 0;
    895 	if (peer->go_state == LOCAL_GO) {
    896 		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
    897 			group_capab |= P2P_GROUP_CAPAB_PERSISTENT_GROUP;
    898 			if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
    899 				group_capab |=
    900 					P2P_GROUP_CAPAB_PERSISTENT_RECONN;
    901 		}
    902 		if (p2p->cross_connect)
    903 			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
    904 		if (p2p->cfg->p2p_intra_bss)
    905 			group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
    906 	}
    907 	p2p_buf_add_capability(buf, p2p->dev_capab &
    908 			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
    909 			       group_capab);
    910 	if (go || resp_chan == NULL)
    911 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
    912 					      p2p->op_reg_class,
    913 					      p2p->op_channel);
    914 	else
    915 		p2p_buf_add_operating_channel(buf, (const char *) resp_chan,
    916 					      resp_chan[3], resp_chan[4]);
    917 	p2p_channels_intersect(&p2p->channels, &peer->channels, &res);
    918 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &res);
    919 	if (go) {
    920 		p2p_buf_add_group_id(buf, p2p->cfg->dev_addr, p2p->ssid,
    921 				     p2p->ssid_len);
    922 	}
    923 	p2p_buf_update_ie_hdr(buf, len);
    924 
    925 #ifdef CONFIG_WIFI_DISPLAY
    926 	if (p2p->wfd_ie_go_neg)
    927 		wpabuf_put_buf(buf, p2p->wfd_ie_go_neg);
    928 #endif /* CONFIG_WIFI_DISPLAY */
    929 
    930 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF])
    931 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_GO_NEG_CONF]);
    932 
    933 	return buf;
    934 }
    935 
    936 
    937 void p2p_process_go_neg_resp(struct p2p_data *p2p, const u8 *sa,
    938 			     const u8 *data, size_t len, int rx_freq)
    939 {
    940 	struct p2p_device *dev;
    941 	int go = -1;
    942 	struct p2p_message msg;
    943 	u8 status = P2P_SC_SUCCESS;
    944 	int freq;
    945 
    946 	p2p_dbg(p2p, "Received GO Negotiation Response from " MACSTR
    947 		" (freq=%d)", MAC2STR(sa), rx_freq);
    948 	dev = p2p_get_device(p2p, sa);
    949 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
    950 	    dev != p2p->go_neg_peer) {
    951 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
    952 			MAC2STR(sa));
    953 		return;
    954 	}
    955 
    956 	if (p2p_parse(data, len, &msg))
    957 		return;
    958 
    959 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE)) {
    960 		p2p_dbg(p2p, "Was not expecting GO Negotiation Response - ignore");
    961 		p2p_parse_free(&msg);
    962 		return;
    963 	}
    964 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
    965 
    966 	if (msg.dialog_token != dev->dialog_token) {
    967 		p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
    968 			msg.dialog_token, dev->dialog_token);
    969 		p2p_parse_free(&msg);
    970 		return;
    971 	}
    972 
    973 	if (!msg.status) {
    974 		p2p_dbg(p2p, "No Status attribute received");
    975 		status = P2P_SC_FAIL_INVALID_PARAMS;
    976 		goto fail;
    977 	}
    978 	if (*msg.status) {
    979 		p2p_dbg(p2p, "GO Negotiation rejected: status %d", *msg.status);
    980 		dev->go_neg_req_sent = 0;
    981 		if (*msg.status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) {
    982 			p2p_dbg(p2p, "Wait for the peer to become ready for GO Negotiation");
    983 			dev->flags |= P2P_DEV_NOT_YET_READY;
    984 			eloop_cancel_timeout(p2p_go_neg_wait_timeout, p2p,
    985 					     NULL);
    986 			eloop_register_timeout(120, 0, p2p_go_neg_wait_timeout,
    987 					       p2p, NULL);
    988 			if (p2p->state == P2P_CONNECT_LISTEN)
    989 				p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
    990 			else
    991 				p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
    992 			p2p_set_timeout(p2p, 0, 0);
    993 		} else {
    994 			p2p_dbg(p2p, "Stop GO Negotiation attempt");
    995 			p2p_go_neg_failed(p2p, *msg.status);
    996 		}
    997 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
    998 		p2p_parse_free(&msg);
    999 		return;
   1000 	}
   1001 
   1002 	if (!msg.capability) {
   1003 		p2p_dbg(p2p, "Mandatory Capability attribute missing from GO Negotiation Response");
   1004 #ifdef CONFIG_P2P_STRICT
   1005 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1006 		goto fail;
   1007 #endif /* CONFIG_P2P_STRICT */
   1008 	}
   1009 
   1010 	if (!msg.p2p_device_info) {
   1011 		p2p_dbg(p2p, "Mandatory P2P Device Info attribute missing from GO Negotiation Response");
   1012 #ifdef CONFIG_P2P_STRICT
   1013 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1014 		goto fail;
   1015 #endif /* CONFIG_P2P_STRICT */
   1016 	}
   1017 
   1018 	if (!msg.intended_addr) {
   1019 		p2p_dbg(p2p, "No Intended P2P Interface Address attribute received");
   1020 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1021 		goto fail;
   1022 	}
   1023 
   1024 	if (!msg.go_intent) {
   1025 		p2p_dbg(p2p, "No GO Intent attribute received");
   1026 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1027 		goto fail;
   1028 	}
   1029 	if ((*msg.go_intent >> 1) > P2P_MAX_GO_INTENT) {
   1030 		p2p_dbg(p2p, "Invalid GO Intent value (%u) received",
   1031 			*msg.go_intent >> 1);
   1032 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1033 		goto fail;
   1034 	}
   1035 
   1036 	go = p2p_go_det(p2p->go_intent, *msg.go_intent);
   1037 	if (go < 0) {
   1038 		p2p_dbg(p2p, "Incompatible GO Intent");
   1039 		status = P2P_SC_FAIL_INCOMPATIBLE_PARAMS;
   1040 		goto fail;
   1041 	}
   1042 
   1043 	if (!go && msg.group_id) {
   1044 		/* Store SSID for Provisioning step */
   1045 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
   1046 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
   1047 	} else if (!go) {
   1048 		p2p_dbg(p2p, "Mandatory P2P Group ID attribute missing from GO Negotiation Response");
   1049 		p2p->ssid_len = 0;
   1050 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1051 		goto fail;
   1052 	}
   1053 
   1054 	if (!msg.config_timeout) {
   1055 		p2p_dbg(p2p, "Mandatory Configuration Timeout attribute missing from GO Negotiation Response");
   1056 #ifdef CONFIG_P2P_STRICT
   1057 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1058 		goto fail;
   1059 #endif /* CONFIG_P2P_STRICT */
   1060 	} else {
   1061 		dev->go_timeout = msg.config_timeout[0];
   1062 		dev->client_timeout = msg.config_timeout[1];
   1063 	}
   1064 
   1065 	if (!msg.operating_channel && !go) {
   1066 		/*
   1067 		 * Note: P2P Client may omit Operating Channel attribute to
   1068 		 * indicate it does not have a preference.
   1069 		 */
   1070 		p2p_dbg(p2p, "No Operating Channel attribute received");
   1071 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1072 		goto fail;
   1073 	}
   1074 	if (!msg.channel_list) {
   1075 		p2p_dbg(p2p, "No Channel List attribute received");
   1076 		status = P2P_SC_FAIL_INVALID_PARAMS;
   1077 		goto fail;
   1078 	}
   1079 
   1080 	if (p2p_peer_channels(p2p, dev, msg.channel_list,
   1081 			      msg.channel_list_len) < 0) {
   1082 		p2p_dbg(p2p, "No common channels found");
   1083 		status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
   1084 		goto fail;
   1085 	}
   1086 
   1087 	if (msg.operating_channel) {
   1088 		dev->oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
   1089 						     msg.operating_channel[4]);
   1090 		p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
   1091 			dev->oper_freq);
   1092 	} else
   1093 		dev->oper_freq = 0;
   1094 
   1095 	switch (msg.dev_password_id) {
   1096 	case DEV_PW_REGISTRAR_SPECIFIED:
   1097 		p2p_dbg(p2p, "PIN from peer Display");
   1098 		if (dev->wps_method != WPS_PIN_KEYPAD) {
   1099 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
   1100 				p2p_wps_method_str(dev->wps_method));
   1101 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1102 			goto fail;
   1103 		}
   1104 		break;
   1105 	case DEV_PW_USER_SPECIFIED:
   1106 		p2p_dbg(p2p, "Peer entered PIN on Keypad");
   1107 		if (dev->wps_method != WPS_PIN_DISPLAY) {
   1108 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
   1109 				p2p_wps_method_str(dev->wps_method));
   1110 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1111 			goto fail;
   1112 		}
   1113 		break;
   1114 	case DEV_PW_PUSHBUTTON:
   1115 		p2p_dbg(p2p, "Peer using pushbutton");
   1116 		if (dev->wps_method != WPS_PBC) {
   1117 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
   1118 				p2p_wps_method_str(dev->wps_method));
   1119 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1120 			goto fail;
   1121 		}
   1122 		break;
   1123 	case DEV_PW_P2PS_DEFAULT:
   1124 		p2p_dbg(p2p, "P2P: Peer using P2PS default pin");
   1125 		if (dev->wps_method != WPS_P2PS) {
   1126 			p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
   1127 				p2p_wps_method_str(dev->wps_method));
   1128 			status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1129 			goto fail;
   1130 		}
   1131 		break;
   1132 	default:
   1133 		if (msg.dev_password_id &&
   1134 		    msg.dev_password_id == dev->oob_pw_id) {
   1135 			p2p_dbg(p2p, "Peer using NFC");
   1136 			if (dev->wps_method != WPS_NFC) {
   1137 				p2p_dbg(p2p, "We have wps_method=%s -> incompatible",
   1138 					p2p_wps_method_str(dev->wps_method));
   1139 				status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1140 				goto fail;
   1141 			}
   1142 			break;
   1143 		}
   1144 		p2p_dbg(p2p, "Unsupported Device Password ID %d",
   1145 			msg.dev_password_id);
   1146 		status = P2P_SC_FAIL_INCOMPATIBLE_PROV_METHOD;
   1147 		goto fail;
   1148 	}
   1149 
   1150 	if (go && p2p_go_select_channel(p2p, dev, &status) < 0)
   1151 		goto fail;
   1152 
   1153 	p2p_set_state(p2p, P2P_GO_NEG);
   1154 	p2p_clear_timeout(p2p);
   1155 
   1156 	p2p_dbg(p2p, "GO Negotiation with " MACSTR, MAC2STR(sa));
   1157 	os_memcpy(dev->intended_addr, msg.intended_addr, ETH_ALEN);
   1158 
   1159 fail:
   1160 	/* Store GO Negotiation Confirmation to allow retransmission */
   1161 	wpabuf_free(dev->go_neg_conf);
   1162 	dev->go_neg_conf = p2p_build_go_neg_conf(p2p, dev, msg.dialog_token,
   1163 						 status, msg.operating_channel,
   1164 						 go);
   1165 	p2p_parse_free(&msg);
   1166 	if (dev->go_neg_conf == NULL)
   1167 		return;
   1168 	p2p_dbg(p2p, "Sending GO Negotiation Confirm");
   1169 	if (status == P2P_SC_SUCCESS) {
   1170 		p2p->pending_action_state = P2P_PENDING_GO_NEG_CONFIRM;
   1171 		dev->go_state = go ? LOCAL_GO : REMOTE_GO;
   1172 	} else
   1173 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
   1174 	if (rx_freq > 0)
   1175 		freq = rx_freq;
   1176 	else
   1177 		freq = dev->listen_freq;
   1178 
   1179 	dev->go_neg_conf_freq = freq;
   1180 	dev->go_neg_conf_sent = 0;
   1181 
   1182 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr, sa,
   1183 			    wpabuf_head(dev->go_neg_conf),
   1184 			    wpabuf_len(dev->go_neg_conf), 200) < 0) {
   1185 		p2p_dbg(p2p, "Failed to send Action frame");
   1186 		p2p_go_neg_failed(p2p, -1);
   1187 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
   1188 	} else
   1189 		dev->go_neg_conf_sent++;
   1190 	if (status != P2P_SC_SUCCESS) {
   1191 		p2p_dbg(p2p, "GO Negotiation failed");
   1192 		p2p_go_neg_failed(p2p, status);
   1193 	}
   1194 }
   1195 
   1196 
   1197 void p2p_process_go_neg_conf(struct p2p_data *p2p, const u8 *sa,
   1198 			     const u8 *data, size_t len)
   1199 {
   1200 	struct p2p_device *dev;
   1201 	struct p2p_message msg;
   1202 
   1203 	p2p_dbg(p2p, "Received GO Negotiation Confirm from " MACSTR,
   1204 		MAC2STR(sa));
   1205 	dev = p2p_get_device(p2p, sa);
   1206 	if (dev == NULL || dev->wps_method == WPS_NOT_READY ||
   1207 	    dev != p2p->go_neg_peer) {
   1208 		p2p_dbg(p2p, "Not ready for GO negotiation with " MACSTR,
   1209 			MAC2STR(sa));
   1210 		return;
   1211 	}
   1212 
   1213 	if (p2p->pending_action_state == P2P_PENDING_GO_NEG_RESPONSE) {
   1214 		p2p_dbg(p2p, "Stopped waiting for TX status on GO Negotiation Response since we already received Confirmation");
   1215 		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
   1216 	}
   1217 
   1218 	if (p2p_parse(data, len, &msg))
   1219 		return;
   1220 
   1221 	if (!(dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
   1222 		p2p_dbg(p2p, "Was not expecting GO Negotiation Confirm - ignore");
   1223 		p2p_parse_free(&msg);
   1224 		return;
   1225 	}
   1226 	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
   1227 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
   1228 
   1229 	if (msg.dialog_token != dev->dialog_token) {
   1230 		p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
   1231 			msg.dialog_token, dev->dialog_token);
   1232 		p2p_parse_free(&msg);
   1233 		return;
   1234 	}
   1235 
   1236 	if (!msg.status) {
   1237 		p2p_dbg(p2p, "No Status attribute received");
   1238 		p2p_parse_free(&msg);
   1239 		return;
   1240 	}
   1241 	if (*msg.status) {
   1242 		p2p_dbg(p2p, "GO Negotiation rejected: status %d", *msg.status);
   1243 		p2p_go_neg_failed(p2p, *msg.status);
   1244 		p2p_parse_free(&msg);
   1245 		return;
   1246 	}
   1247 
   1248 	if (dev->go_state == REMOTE_GO && msg.group_id) {
   1249 		/* Store SSID for Provisioning step */
   1250 		p2p->ssid_len = msg.group_id_len - ETH_ALEN;
   1251 		os_memcpy(p2p->ssid, msg.group_id + ETH_ALEN, p2p->ssid_len);
   1252 	} else if (dev->go_state == REMOTE_GO) {
   1253 		p2p_dbg(p2p, "Mandatory P2P Group ID attribute missing from GO Negotiation Confirmation");
   1254 		p2p->ssid_len = 0;
   1255 		p2p_go_neg_failed(p2p, P2P_SC_FAIL_INVALID_PARAMS);
   1256 		p2p_parse_free(&msg);
   1257 		return;
   1258 	}
   1259 
   1260 	if (!msg.operating_channel) {
   1261 		p2p_dbg(p2p, "Mandatory Operating Channel attribute missing from GO Negotiation Confirmation");
   1262 #ifdef CONFIG_P2P_STRICT
   1263 		p2p_parse_free(&msg);
   1264 		return;
   1265 #endif /* CONFIG_P2P_STRICT */
   1266 	} else if (dev->go_state == REMOTE_GO) {
   1267 		int oper_freq = p2p_channel_to_freq(msg.operating_channel[3],
   1268 						    msg.operating_channel[4]);
   1269 		if (oper_freq != dev->oper_freq) {
   1270 			p2p_dbg(p2p, "Updated peer (GO) operating channel preference from %d MHz to %d MHz",
   1271 				dev->oper_freq, oper_freq);
   1272 			dev->oper_freq = oper_freq;
   1273 		}
   1274 	}
   1275 
   1276 	if (!msg.channel_list) {
   1277 		p2p_dbg(p2p, "Mandatory Operating Channel attribute missing from GO Negotiation Confirmation");
   1278 #ifdef CONFIG_P2P_STRICT
   1279 		p2p_parse_free(&msg);
   1280 		return;
   1281 #endif /* CONFIG_P2P_STRICT */
   1282 	}
   1283 
   1284 	p2p_parse_free(&msg);
   1285 
   1286 	if (dev->go_state == UNKNOWN_GO) {
   1287 		/*
   1288 		 * This should not happen since GO negotiation has already
   1289 		 * been completed.
   1290 		 */
   1291 		p2p_dbg(p2p, "Unexpected GO Neg state - do not know which end becomes GO");
   1292 		return;
   1293 	}
   1294 
   1295 	/*
   1296 	 * The peer could have missed our ctrl::ack frame for GO Negotiation
   1297 	 * Confirm and continue retransmitting the frame. To reduce the
   1298 	 * likelihood of the peer not getting successful TX status for the
   1299 	 * GO Negotiation Confirm frame, wait a short time here before starting
   1300 	 * the group so that we will remain on the current channel to
   1301 	 * acknowledge any possible retransmission from the peer.
   1302 	 */
   1303 	p2p_dbg(p2p, "20 ms wait on current channel before starting group");
   1304 	os_sleep(0, 20000);
   1305 
   1306 	p2p_go_complete(p2p, dev);
   1307 }
   1308