P2P2: Add bootstrapping support with PD frames

Add support for P2P2 bootstrapping with comeback mechanism using
Provision Discovery frames. Extend the control interface command
P2P_CONNECT to allow P2P2 bootstrapping handshake.

Signed-off-by: Shivani Baranwal <quic_shivbara@quicinc.com>
This commit is contained in:
Shivani Baranwal 2024-08-05 15:03:07 +05:30 committed by Jouni Malinen
parent 6aa9ad8f8f
commit 59299a8a7d
10 changed files with 562 additions and 31 deletions

View file

@ -954,6 +954,7 @@ static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
dev->info.wps_vendor_ext[i] = NULL;
}
os_free(dev->bootstrap_params);
wpabuf_free(dev->info.wfd_subelems);
wpabuf_free(dev->info.vendor_elems);
wpabuf_free(dev->go_neg_conf);
@ -1599,7 +1600,8 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
const u8 *force_ssid, size_t force_ssid_len,
int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id)
int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
bool p2p2, u16 bootstrap, const char *password)
{
struct p2p_device *dev;
@ -1683,6 +1685,10 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
dev->wps_method = wps_method;
dev->oob_pw_id = oob_pw_id;
dev->p2p2 = p2p2;
dev->req_bootstrap_method = bootstrap;
if (password && os_strlen(password) < sizeof(dev->password))
os_strlcpy(dev->password, password, sizeof(dev->password));
dev->status = P2P_SC_SUCCESS;
if (p2p->p2p_scan_running) {
@ -1701,7 +1707,8 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
const u8 *force_ssid, size_t force_ssid_len,
unsigned int pref_freq, u16 oob_pw_id)
unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
const char *password)
{
struct p2p_device *dev;
@ -1735,6 +1742,10 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
dev->flags &= ~P2P_DEV_USER_REJECTED;
dev->go_neg_req_sent = 0;
dev->go_state = UNKNOWN_GO;
dev->req_bootstrap_method = bootstrap;
if (password && os_strlen(password) < sizeof(dev->password))
os_strlcpy(dev->password, password, sizeof(dev->password));
p2p_set_dev_persistent(dev, persistent_group);
p2p->go_intent = go_intent;
os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
@ -1927,7 +1938,7 @@ static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
p2p_handle_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_PROV_DISC_RESP:
p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1);
p2p_handle_prov_disc_resp(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_DEV_DISC_REQ:
p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
@ -3061,6 +3072,9 @@ struct p2p_data * p2p_init(const struct p2p_config *cfg)
p2p->go_timeout = 100;
p2p->client_timeout = 20;
p2p->num_p2p_sd_queries = 0;
/* Default comeback after one second */
if (!p2p->cfg->comeback_after)
p2p->cfg->comeback_after = 977; /* TUs */
p2p_pairing_info_init(p2p);
p2p_dbg(p2p, "initialized");
@ -3439,7 +3453,7 @@ static void p2p_retry_pd(struct p2p_data *p2p)
if (!ether_addr_equal(p2p->pending_pd_devaddr,
dev->info.p2p_device_addr))
continue;
if (!dev->req_config_methods)
if (!dev->req_config_methods && !dev->req_bootstrap_method)
continue;
p2p_dbg(p2p, "Send pending Provision Discovery Request to "
@ -5868,6 +5882,7 @@ void p2p_process_usd_elems(struct p2p_data *p2p, const u8 *ies, u16 ies_len,
return;
}
dev->p2p2 = true;
/* Reset info from old IEs */
dev->info.reg_info = 0;
os_memset(&dev->info.pairing_config, 0,

View file

@ -678,6 +678,13 @@ struct p2p_config {
*/
bool twt_power_mgmt;
/**
* comeback_after - Bootstrap request unauthorized for peer
*
* Ask to come back after this many TUs.
*/
u16 comeback_after;
/**
* cb_ctx - Context to use with callback functions
*/
@ -1225,6 +1232,19 @@ struct p2p_config {
int (*get_pref_freq_list)(void *ctx, int go,
unsigned int *len,
struct weighted_pcl *freq_list);
/**
* register_bootstrap_comeback - Register timeout to initiate bootstrap
* comeback request
* @ctx: Callback context from cb_ctx
* @addr: P2P Device Address to which comeback request is to be sent
* @comeback_after: Time in TUs after which comeback request is sent
*
* This function can be used to send comeback request after given
* timeout.
*/
void (*register_bootstrap_comeback)(void *ctx, const u8 *addr,
u16 comeback_after);
};
@ -1408,6 +1428,10 @@ void p2p_stop_listen(struct p2p_data *p2p);
* formation
* @pref_freq: Preferred operating frequency in MHz or 0 (this is only used if
* force_freq == 0)
* @oob_pw_id: OOB password identifier
* @p2p2: Device supports P2P2 features
* @bootstrap: Bootstrapping method requested for P2P2 provision discovery
* @password: P2P2 pairing password or %NULL for opportunistic method
* Returns: 0 on success, -1 on failure
*/
int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
@ -1415,7 +1439,8 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
const u8 *force_ssid, size_t force_ssid_len,
int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id);
int pd_before_go_neg, unsigned int pref_freq, u16 oob_pw_id,
bool p2p2, u16 bootstrap, const char *password);
/**
* p2p_authorize - Authorize P2P group formation (GO negotiation)
@ -1433,6 +1458,9 @@ int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
* @force_ssid_len: Length of $force_ssid buffer
* @pref_freq: Preferred operating frequency in MHz or 0 (this is only used if
* force_freq == 0)
* @oob_pw_id: OOB password identifier
* @bootstrap: Bootstrapping method requested for P2P2 provision discovery
* @password: P2P2 pairing password or %NULL for opportunistic method
* Returns: 0 on success, -1 on failure
*
* This is like p2p_connect(), but the actual group negotiation is not
@ -1443,7 +1471,8 @@ int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
const u8 *force_ssid, size_t force_ssid_len,
unsigned int pref_freq, u16 oob_pw_id);
unsigned int pref_freq, u16 oob_pw_id, u16 bootstrap,
const char *password);
/**
* p2p_reject - Reject peer device (explicitly block connection attempts)

View file

@ -244,6 +244,8 @@ int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev)
config_method = WPS_CONFIG_PUSHBUTTON;
else if (dev->wps_method == WPS_P2PS)
config_method = WPS_CONFIG_P2PS;
else if (dev->p2p2 && dev->req_bootstrap_method)
config_method = WPS_NOT_READY;
else
return -1;
return p2p_prov_disc_req(p2p, dev->info.p2p_device_addr,

View file

@ -36,6 +36,26 @@ enum p2p_go_state {
REMOTE_GO
};
/**
* struct bootstrap_params - P2P Device bootstrap request parameters
*/
struct p2p_bootstrap_params {
/* Bootstrap method */
u16 bootstrap_method;
/* Status code */
enum p2p_status_code status;
/* Cookie for comeback */
u8 cookie[50];
/* Cookie length */
size_t cookie_len;
/* Comeback time in TUs after which receiver is requested to retry */
int comeback_after;
};
/**
* struct p2p_device - P2P Device data (internal to P2P module)
*/
@ -150,6 +170,18 @@ struct p2p_device {
int sd_pending_bcast_queries;
bool support_6ghz;
/* Supports P2P2 */
bool p2p2;
/* Requested bootstrap method */
u16 req_bootstrap_method;
/* Bootstrap parameters received from peer */
struct p2p_bootstrap_params *bootstrap_params;
/* Password for P2P2 GO negotiation */
char password[100];
};
struct p2p_sd_query {
@ -876,7 +908,7 @@ void p2p_check_pref_chan(struct p2p_data *p2p, int go,
void p2p_handle_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
const u8 *data, size_t len, int rx_freq);
void p2p_handle_prov_disc_resp(struct p2p_data *p2p, const u8 *sa,
const u8 *data, size_t len);
const u8 *data, size_t len, int rx_freq);
int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
int join, int force_freq);
void p2p_reset_pending_pd(struct p2p_data *p2p);

View file

@ -181,6 +181,64 @@ static void p2ps_add_pd_req_attrs(struct p2p_data *p2p, struct p2p_device *dev,
}
static struct wpabuf * p2p_build_prov_disc_bootstrap_req(struct p2p_data *p2p,
struct p2p_device *dev)
{
struct wpabuf *buf;
u8 *len;
size_t cookie_len = 0;
const u8 *cookie = NULL;
u8 dialog_token = dev->dialog_token;
u8 group_capab;
buf = wpabuf_alloc(1000);
if (!buf)
return NULL;
p2p_dbg(p2p, "P2P2: Building bootstrapping PD Request");
p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_REQ, dialog_token);
len = p2p_buf_add_ie_hdr(buf);
group_capab = 0;
if (p2p->num_groups) {
group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
(p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
p2p->cross_connect)
group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
}
if (p2p->cfg->p2p_intra_bss)
group_capab |= P2P_GROUP_CAPAB_INTRA_BSS_DIST;
p2p_buf_add_capability(buf, p2p->dev_capab &
~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY,
group_capab);
p2p_buf_add_device_info(buf, p2p, NULL);
if (dev->bootstrap_params) {
cookie = dev->bootstrap_params->cookie;
cookie_len = dev->bootstrap_params->cookie_len;
if (dev->bootstrap_params->status == P2P_SC_COMEBACK)
p2p_buf_add_status(buf, dev->bootstrap_params->status);
}
p2p_buf_update_ie_hdr(buf, len);
len = p2p_buf_add_p2p2_ie_hdr(buf);
p2p_buf_add_pcea(buf, p2p);
p2p_buf_add_pbma(buf, dev->req_bootstrap_method, cookie, cookie_len, 0);
p2p_buf_update_ie_hdr(buf, len);
wpa_printf(MSG_DEBUG, "P2P2: Added PCEA and PBMA in PD Request");
return buf;
}
static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
struct p2p_device *dev,
int join)
@ -249,6 +307,42 @@ static struct wpabuf * p2p_build_prov_disc_req(struct p2p_data *p2p,
}
static struct wpabuf *
p2p_build_prov_disc_bootstrap_resp(struct p2p_data *p2p, struct p2p_device *dev,
u8 dialog_token, enum p2p_status_code status)
{
struct wpabuf *buf;
u8 *cookie = NULL;
size_t cookie_len = 0;
int comeback_after = 0;
u8 *len;
buf = wpabuf_alloc(1000);
if (!buf)
return NULL;
p2p_dbg(p2p, "P2P2: Building boostrapping PD Response");
if (status == P2P_SC_COMEBACK && dev->bootstrap_params) {
cookie = dev->bootstrap_params->cookie;
cookie_len = dev->bootstrap_params->cookie_len;
comeback_after = dev->bootstrap_params->comeback_after;
}
p2p_buf_add_public_action_hdr(buf, P2P_PROV_DISC_RESP, dialog_token);
len = p2p_buf_add_p2p2_ie_hdr(buf);
p2p_buf_add_status(buf, status);
p2p_buf_add_pcea(buf, p2p);
p2p_buf_add_pbma(buf, dev->req_bootstrap_method, cookie, cookie_len,
comeback_after);
p2p_buf_update_ie_hdr(buf, len);
return buf;
}
static struct wpabuf * p2p_build_prov_disc_resp(struct p2p_data *p2p,
struct p2p_device *dev,
u8 dialog_token,
@ -614,6 +708,171 @@ void p2p_process_pcea(struct p2p_data *p2p, struct p2p_message *msg,
}
static void p2p_process_prov_disc_bootstrap_req(struct p2p_data *p2p,
struct p2p_message *msg,
const u8 *sa, const u8 *data,
size_t len, int rx_freq)
{
struct p2p_device *dev;
int freq;
struct wpabuf *resp;
u16 bootstrap;
size_t cookie_len = 0;
const u8 *pos, *cookie;
enum p2p_status_code status = P2P_SC_FAIL_INVALID_PARAMS;
p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR
" with bootstrapping Attribute (freq=%d)",
MAC2STR(sa), rx_freq);
dev = p2p_get_device(p2p, sa);
if (!dev) {
p2p_dbg(p2p, "Provision Discovery Request from unknown peer "
MACSTR, MAC2STR(sa));
if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data, len, 0)) {
p2p_dbg(p2p,
"Provision Discovery Request add device failed "
MACSTR, MAC2STR(sa));
return;
}
dev = p2p_get_device(p2p, sa);
if (!dev) {
p2p_dbg(p2p,
"Provision Discovery device not found "
MACSTR, MAC2STR(sa));
return;
}
}
dev->p2p2 = true;
if (p2p->send_action_in_progress) {
p2p_dbg(p2p, "Dropping retry frame as response TX pending");
return;
}
p2p_update_peer_6ghz_capab(dev, msg);
if (msg->pcea_info && msg->pcea_info_len >= 2)
p2p_process_pcea(p2p, msg, dev);
pos = msg->pbma_info;
if (msg->pbma_info_len > 2 && msg->status &&
*msg->status == P2P_SC_COMEBACK) {
/* PBMA comeback request */
cookie_len = *pos++;
if (msg->pbma_info_len < 1 + cookie_len) {
p2p_dbg(p2p, "Truncated PBMA");
return;
}
cookie = pos;
if (!dev->bootstrap_params ||
dev->bootstrap_params->cookie_len != cookie_len ||
os_memcmp(cookie, dev->bootstrap_params->cookie,
cookie_len) != 0) {
status = P2P_SC_FAIL_REJECTED_BY_USER;
goto out;
}
bootstrap = dev->bootstrap_params->bootstrap_method;
if (!dev->req_bootstrap_method) {
status = P2P_SC_COMEBACK;
goto out;
}
} else {
/* PBMA request */
bootstrap = WPA_GET_LE16(pos);
os_free(dev->bootstrap_params);
dev->bootstrap_params = NULL;
if (!dev->req_bootstrap_method) {
dev->bootstrap_params =
os_zalloc(sizeof(struct p2p_bootstrap_params));
if (!dev->bootstrap_params)
return;
dev->bootstrap_params->bootstrap_method = bootstrap;
dev->bootstrap_params->cookie_len = 4;
if (os_get_random(dev->bootstrap_params->cookie,
dev->bootstrap_params->cookie_len) <
0) {
os_free(dev->bootstrap_params);
dev->bootstrap_params = NULL;
return;
}
dev->bootstrap_params->comeback_after =
p2p->cfg->comeback_after;
status = P2P_SC_COMEBACK;
goto out;
}
}
if (bootstrap == P2P_PBMA_PIN_CODE_DISPLAY &&
dev->req_bootstrap_method == P2P_PBMA_PIN_CODE_KEYPAD)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_PIN_CODE_KEYPAD &&
dev->req_bootstrap_method == P2P_PBMA_PIN_CODE_DISPLAY)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_PASSPHRASE_DISPLAY &&
dev->req_bootstrap_method == P2P_PBMA_PASSPHRASE_KEYPAD)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_PASSPHRASE_KEYPAD &&
dev->req_bootstrap_method == P2P_PBMA_PASSPHRASE_DISPLAY)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_NFC_TAG &&
dev->req_bootstrap_method == P2P_PBMA_NFC_READER)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_NFC_READER &&
dev->req_bootstrap_method == P2P_PBMA_NFC_TAG)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_QR_DISPLAY &&
dev->req_bootstrap_method == P2P_PBMA_QR_SCAN)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_QR_SCAN &&
dev->req_bootstrap_method == P2P_PBMA_QR_DISPLAY)
status = P2P_SC_SUCCESS;
else if (bootstrap == P2P_PBMA_OPPORTUNISTIC &&
dev->req_bootstrap_method == P2P_PBMA_OPPORTUNISTIC)
status = P2P_SC_SUCCESS;
else
status = P2P_SC_FAIL_INVALID_PARAMS;
wpa_printf(MSG_ERROR, "Bootstrap received %d", bootstrap);
out:
/* Send PD Bootstrapping Response for the PD Request */
resp = p2p_build_prov_disc_bootstrap_resp(p2p, dev, msg->dialog_token,
status);
if (!resp)
return;
p2p_dbg(p2p, "Sending Provision Discovery Bootstrap Response");
if (rx_freq > 0)
freq = rx_freq;
else
freq = p2p_channel_to_freq(p2p->cfg->reg_class,
p2p->cfg->channel);
if (freq < 0) {
p2p_dbg(p2p, "Unknown operating class/channel");
wpabuf_free(resp);
return;
}
p2p->pending_action_state = P2P_PENDING_PD_RESPONSE;
if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
p2p->cfg->dev_addr, wpabuf_head(resp),
wpabuf_len(resp), 50) < 0)
p2p_dbg(p2p, "Failed to send Action frame");
else
p2p->send_action_in_progress = 1;
wpabuf_free(resp);
}
static void p2p_process_prov_disc_req(struct p2p_data *p2p,
struct p2p_message *msg, const u8 *sa,
const u8 *data, size_t len, int rx_freq)
@ -1257,7 +1516,13 @@ void p2p_handle_prov_disc_req(struct p2p_data *p2p, const u8 *sa,
if (p2p_parse(data, len, &msg))
return;
p2p_process_prov_disc_req(p2p, &msg, sa, data + 1, len - 1, rx_freq);
if (msg.pcea_info && msg.pbma_info)
p2p_process_prov_disc_bootstrap_req(p2p, &msg, sa, data + 1,
len - 1, rx_freq);
else
p2p_process_prov_disc_req(p2p, &msg, sa, data + 1, len - 1,
rx_freq);
p2p_parse_free(&msg);
}
@ -1360,6 +1625,91 @@ static int p2p_validate_p2ps_pd_resp(struct p2p_data *p2p,
}
static void p2p_process_prov_disc_bootstrap_resp(struct p2p_data *p2p,
struct p2p_message *msg,
const u8 *sa, const u8 *data,
size_t len, int rx_freq)
{
struct p2p_device *dev;
u8 status = P2P_SC_SUCCESS;
size_t cookie_len = 0;
const u8 *pos, *cookie;
u16 comeback_after;
/* Parse the P2P status present */
if (msg->status)
status = *msg->status;
p2p_dbg(p2p, "Received Provision Discovery Bootstrap Response from "
MACSTR, MAC2STR(sa));
dev = p2p_get_device(p2p, sa);
if (!dev || !dev->req_bootstrap_method) {
p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR
" with no pending request", MAC2STR(sa));
return;
}
p2p_update_peer_6ghz_capab(dev, msg);
if (dev->dialog_token != msg->dialog_token) {
p2p_dbg(p2p,
"Ignore Provision Discovery Response with unexpected Dialog Token %u (expected %u)",
msg->dialog_token, dev->dialog_token);
return;
}
if (p2p->pending_action_state == P2P_PENDING_PD) {
os_memset(p2p->pending_pd_devaddr, 0, ETH_ALEN);
p2p->pending_action_state = P2P_NO_PENDING_ACTION;
}
os_free(dev->bootstrap_params);
dev->bootstrap_params = NULL;
/* If the response is from the peer to whom a user initiated request
* was sent earlier, we reset that state information here. */
if (p2p->user_initiated_pd &&
ether_addr_equal(p2p->pending_pd_devaddr, sa))
p2p_reset_pending_pd(p2p);
if (status == P2P_SC_COMEBACK) {
/* PBMA comeback response */
pos = msg->pbma_info;
if (msg->pbma_info_len < 2 + 1)
return;
comeback_after = WPA_GET_LE16(pos);
pos += 2;
cookie_len = *pos++;
if (msg->pbma_info_len < 2 + 1 + cookie_len) {
p2p_dbg(p2p, "Truncated PBMA");
return;
}
cookie = pos;
dev->bootstrap_params =
os_zalloc(sizeof(struct p2p_bootstrap_params));
if (!dev->bootstrap_params)
return;
dev->bootstrap_params->cookie_len = cookie_len;
os_memcpy(dev->bootstrap_params->cookie, cookie, cookie_len);
dev->bootstrap_params->comeback_after = comeback_after;
dev->bootstrap_params->bootstrap_method =
dev->req_bootstrap_method;
dev->bootstrap_params->status = status;
p2p->cfg->register_bootstrap_comeback(p2p->cfg->cb_ctx, sa,
comeback_after);
p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
return;
}
p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG)
dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
}
static void p2p_process_prov_disc_resp(struct p2p_data *p2p,
struct p2p_message *msg, const u8 *sa,
const u8 *data, size_t len)
@ -1650,14 +2000,19 @@ out:
void p2p_handle_prov_disc_resp(struct p2p_data *p2p, const u8 *sa,
const u8 *data, size_t len)
const u8 *data, size_t len, int rx_freq)
{
struct p2p_message msg;
if (p2p_parse(data, len, &msg))
return;
p2p_process_prov_disc_resp(p2p, &msg, sa, data + 1, len - 1);
if (msg.pcea_info && msg.pbma_info)
p2p_process_prov_disc_bootstrap_resp(p2p, &msg, sa, data + 1,
len - 1, rx_freq);
else
p2p_process_prov_disc_resp(p2p, &msg, sa, data + 1, len - 1);
p2p_parse_free(&msg);
}
@ -1691,7 +2046,7 @@ int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
/* TODO: use device discoverability request through GO */
}
if (p2p->p2ps_prov) {
if (!dev->p2p2 && p2p->p2ps_prov) {
if (p2p->p2ps_prov->status == P2P_SC_SUCCESS_DEFERRED) {
if (p2p->p2ps_prov->method == WPS_CONFIG_DISPLAY)
dev->req_config_methods = WPS_CONFIG_KEYPAD;
@ -1721,7 +2076,11 @@ int p2p_send_prov_disc_req(struct p2p_data *p2p, struct p2p_device *dev,
return -1;
}
req = p2p_build_prov_disc_req(p2p, dev, join);
if (dev->p2p2)
req = p2p_build_prov_disc_bootstrap_req(p2p, dev);
else
req = p2p_build_prov_disc_req(p2p, dev, join);
if (req == NULL)
return -1;
@ -1760,13 +2119,22 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
return -1;
}
if (dev->p2p2 && dev->req_bootstrap_method) {
p2p_dbg(p2p, "Provision Discovery Request with " MACSTR
" (bootstrap methods 0x%x)",
MAC2STR(peer_addr), dev->req_bootstrap_method);
goto out;
}
p2p_dbg(p2p, "Provision Discovery Request with " MACSTR
" (config methods 0x%x)",
MAC2STR(peer_addr), config_methods);
if (config_methods == 0 && !p2ps_prov) {
os_free(p2ps_prov);
return -1;
}
dev->req_config_methods = config_methods;
if (p2ps_prov && p2ps_prov->status == P2P_SC_SUCCESS_DEFERRED &&
p2p->p2ps_prov) {
@ -1774,12 +2142,12 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
p2ps_prov->method = p2p->p2ps_prov->method;
}
out:
/* Reset provisioning info */
dev->wps_prov_info = 0;
p2ps_prov_free(p2p);
p2p->p2ps_prov = p2ps_prov;
dev->req_config_methods = config_methods;
if (join)
dev->flags |= P2P_DEV_PD_FOR_JOIN;
else
@ -1788,8 +2156,7 @@ int p2p_prov_disc_req(struct p2p_data *p2p, const u8 *peer_addr,
if (p2p->state != P2P_IDLE && p2p->state != P2P_SEARCH &&
p2p->state != P2P_LISTEN_ONLY) {
p2p_dbg(p2p, "Busy with other operations; postpone Provision Discovery Request with "
MACSTR " (config methods 0x%x)",
MAC2STR(peer_addr), config_methods);
MACSTR, MAC2STR(peer_addr));
return 0;
}

View file

@ -6376,6 +6376,10 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
size_t group_ssid_len = 0;
int he;
bool allow_6ghz;
bool p2p2;
u16 bootstrap = 0;
const char *password = NULL;
char *token, *context = NULL;
if (!wpa_s->global->p2p_init_wpa_s)
return -1;
@ -6388,7 +6392,9 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
/* <addr> <"pbc" | "pin" | PIN> [label|display|keypad|p2ps]
* [persistent|persistent=<network id>]
* [join] [auth] [go_intent=<0..15>] [freq=<in MHz>] [provdisc]
* [ht40] [vht] [he] [edmg] [auto] [ssid=<hexdump>] */
* [ht40] [vht] [he] [edmg] [auto] [ssid=<hexdump>]
* [p2p2] [bstrapmethod=<value>] [password=<string>]
*/
if (hwaddr_aton(cmd, addr))
return -1;
@ -6422,6 +6428,7 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
vht;
he = (os_strstr(cmd, " he") != NULL) || wpa_s->conf->p2p_go_he;
edmg = (os_strstr(cmd, " edmg") != NULL) || wpa_s->conf->p2p_go_edmg;
p2p2 = os_strstr(pos, " p2p2") != NULL;
pos2 = os_strstr(pos, " go_intent=");
if (pos2) {
@ -6477,6 +6484,8 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
wps_method = WPS_PBC;
} else if (os_strstr(pos, "p2ps") != NULL) {
wps_method = WPS_P2PS;
} else if (p2p2) {
wps_method = WPS_NOT_READY;
} else {
pin = pos;
pos = os_strchr(pin, ' ');
@ -6492,11 +6501,26 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
}
}
pos2 = os_strstr(pos, "bstrapmethod=");
if (pos2) {
pos2 += 13;
bootstrap = atoi(pos2);
pd = true;
}
while ((token = str_token(pos, " ", &context))) {
if (os_strncmp(token, "password=", 9) == 0) {
password = token + 9;
continue;
}
}
new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method,
persistent_group, automatic, join,
auth, go_intent, freq, freq2, persistent_id,
pd, ht40, vht, max_oper_chwidth, he, edmg,
group_ssid, group_ssid_len, allow_6ghz);
group_ssid, group_ssid_len, allow_6ghz, p2p2,
bootstrap, password);
if (new_pin == -2) {
os_memcpy(buf, "FAIL-CHANNEL-UNAVAILABLE\n", 25);
return 25;

View file

@ -706,7 +706,7 @@ DBusMessage * wpas_dbus_handler_p2p_connect(DBusMessage *message,
new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method,
persistent_group, 0, join, authorize_only,
go_intent, freq, 0, -1, 0, 0, 0, 0, 0, 0,
NULL, 0, false);
NULL, 0, false, 0, 0, NULL);
if (new_pin >= 0) {
char npin[9];

View file

@ -4823,6 +4823,42 @@ static int wpas_p2p_get_pref_freq_list(void *ctx, int go,
}
static void wpas_p2p_send_bootstrap_comeback(void *eloop_ctx, void *timeout_ctx)
{
struct wpa_supplicant *wpa_s = eloop_ctx;
wpa_printf(MSG_DEBUG, "P2P2: Send bootstrapping comeback PD Request");
wpas_p2p_connect(wpa_s, wpa_s->p2p_bootstrap_dev_addr, wpa_s->p2p_pin,
wpa_s->p2p_wps_method, wpa_s->p2p_persistent_group, 0,
0, 0, wpa_s->p2p_go_intent, wpa_s->p2p_connect_freq,
wpa_s->p2p_go_vht_center_freq2,
wpa_s->p2p_persistent_id,
wpa_s->p2p_pd_before_go_neg,
wpa_s->p2p_go_ht40,
wpa_s->p2p_go_vht,
wpa_s->p2p_go_max_oper_chwidth,
wpa_s->p2p_go_he,
wpa_s->p2p_go_edmg,
NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p),
wpa_s->p2p2, wpa_s->p2p_bootstrap, NULL);
}
static void wpas_p2p_register_bootstrap_comeback(void *ctx, const u8 *addr,
u16 comeback_after)
{
unsigned int timeout_us;
struct wpa_supplicant *wpa_s = ctx;
timeout_us = comeback_after * 1024;
os_memcpy(wpa_s->p2p_bootstrap_dev_addr, addr, ETH_ALEN);
eloop_cancel_timeout(wpas_p2p_send_bootstrap_comeback, wpa_s, NULL);
eloop_register_timeout(0, timeout_us, wpas_p2p_send_bootstrap_comeback,
wpa_s, NULL);
}
int wpas_p2p_mac_setup(struct wpa_supplicant *wpa_s)
{
u8 addr[ETH_ALEN] = {0};
@ -4942,6 +4978,7 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
p2p.p2ps_group_capability = p2ps_group_capability;
p2p.get_pref_freq_list = wpas_p2p_get_pref_freq_list;
p2p.p2p_6ghz_disable = wpa_s->conf->p2p_6ghz_disable;
p2p.register_bootstrap_comeback = wpas_p2p_register_bootstrap_comeback;
os_memcpy(wpa_s->global->p2p_dev_addr, wpa_s->own_addr, ETH_ALEN);
os_memcpy(p2p.dev_addr, wpa_s->global->p2p_dev_addr, ETH_ALEN);
@ -5139,6 +5176,7 @@ void wpas_p2p_deinit(struct wpa_supplicant *wpa_s)
wpa_s->p2p_send_action_work = NULL;
}
eloop_cancel_timeout(wpas_p2p_send_action_work_timeout, wpa_s, NULL);
eloop_cancel_timeout(wpas_p2p_send_bootstrap_comeback, wpa_s, NULL);
wpabuf_free(wpa_s->p2p_oob_dev_pw);
wpa_s->p2p_oob_dev_pw = NULL;
@ -5221,7 +5259,8 @@ static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
enum p2p_wps_method wps_method,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
struct wpa_ssid *ssid, unsigned int pref_freq)
struct wpa_ssid *ssid, unsigned int pref_freq,
bool p2p2, u16 bootstrap, const char *password)
{
if (persistent_group && wpa_s->conf->persistent_reconnect)
persistent_group = 2;
@ -5239,7 +5278,7 @@ static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
ssid ? ssid->ssid_len : 0,
wpa_s->p2p_pd_before_go_neg, pref_freq,
wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
0);
0, p2p2, bootstrap, password);
}
@ -5248,7 +5287,8 @@ static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
enum p2p_wps_method wps_method,
int go_intent, const u8 *own_interface_addr,
unsigned int force_freq, int persistent_group,
struct wpa_ssid *ssid, unsigned int pref_freq)
struct wpa_ssid *ssid, unsigned int pref_freq,
u16 bootstrap, const char *password)
{
if (persistent_group && wpa_s->conf->persistent_reconnect)
persistent_group = 2;
@ -5258,7 +5298,7 @@ static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
persistent_group, ssid ? ssid->ssid : NULL,
ssid ? ssid->ssid_len : 0, pref_freq,
wps_method == WPS_NFC ? wpa_s->p2p_oob_dev_pw_id :
0);
0, bootstrap, password);
}
@ -5442,7 +5482,9 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
wpa_s->p2p_go_he,
wpa_s->p2p_go_edmg,
NULL, 0,
is_p2p_allow_6ghz(wpa_s->global->p2p));
is_p2p_allow_6ghz(wpa_s->global->p2p),
wpa_s->p2p2, wpa_s->p2p_bootstrap,
NULL);
return;
}
@ -5936,6 +5978,9 @@ static bool is_p2p_6ghz_supported(struct wpa_supplicant *wpa_s,
HOSTAPD_MODE_IEEE80211A, true))
return false;
if (wpa_s->p2p2)
return true;
if (!p2p_wfd_enabled(wpa_s->global->p2p))
return false;
if (peer_addr && !p2p_peer_wfd_enabled(wpa_s->global->p2p, peer_addr))
@ -5987,6 +6032,10 @@ static int wpas_p2p_check_6ghz(struct wpa_supplicant *wpa_s,
* @group_ssid: Specific Group SSID for join or %NULL if not set
* @group_ssid_len: Length of @group_ssid in octets
* @allow_6ghz: Allow P2P connection on 6 GHz channels
* @p2p2: Whether device is in P2P R2 mode
* @bootstrap: Requested bootstrap method for pairing in P2P2
* @password: Password for pairing setup or NULL for oppurtunistic method
* in P2P2
* Returns: 0 or new PIN (if pin was %NULL) on success, -1 on unspecified
* failure, -2 on failure due to channel not currently available,
* -3 if forced channel is not supported
@ -5998,7 +6047,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
int persistent_id, int pd, int ht40, int vht,
unsigned int vht_chwidth, int he, int edmg,
const u8 *group_ssid, size_t group_ssid_len,
bool allow_6ghz)
bool allow_6ghz, bool p2p2, u16 bootstrap,
const char *password)
{
int force_freq = 0, pref_freq = 0;
int ret = 0, res;
@ -6018,6 +6068,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
return -1;
}
wpa_s->p2p2 = p2p2;
if (wpas_p2p_check_6ghz(wpa_s, peer_addr, allow_6ghz, freq))
return -2;
@ -6048,6 +6100,7 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
wpa_s->p2p_go_max_oper_chwidth = vht_chwidth;
wpa_s->p2p_go_he = !!he;
wpa_s->p2p_go_edmg = !!edmg;
wpa_s->p2p_bootstrap = bootstrap;
if (pin)
os_strlcpy(wpa_s->p2p_pin, pin, sizeof(wpa_s->p2p_pin));
@ -6133,14 +6186,15 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
if (wpas_p2p_auth_go_neg(wpa_s, peer_addr, wps_method,
go_intent, if_addr,
force_freq, persistent_group, ssid,
pref_freq) < 0)
pref_freq, bootstrap, password) < 0)
return -1;
return ret;
}
if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method,
go_intent, if_addr, force_freq,
persistent_group, ssid, pref_freq) < 0) {
persistent_group, ssid, pref_freq, p2p2,
bootstrap, password) < 0) {
if (wpa_s->create_p2p_iface)
wpas_p2p_remove_pending_group_interface(wpa_s);
return -1;
@ -8768,7 +8822,8 @@ static int wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
wpa_s->p2p_go_max_oper_chwidth,
wpa_s->p2p_go_he,
wpa_s->p2p_go_edmg,
NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p));
NULL, 0, is_p2p_allow_6ghz(wpa_s->global->p2p),
wpa_s->p2p2, wpa_s->p2p_bootstrap, NULL);
return ret;
}
@ -9306,7 +9361,8 @@ static int wpas_p2p_nfc_join_group(struct wpa_supplicant *wpa_s,
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
params->go_ssid_len ? params->go_ssid : NULL,
params->go_ssid_len, false);
params->go_ssid_len, false, wpa_s->p2p2,
wpa_s->p2p_bootstrap, NULL);
}
@ -9385,7 +9441,8 @@ static int wpas_p2p_nfc_init_go_neg(struct wpa_supplicant *wpa_s,
forced_freq, wpa_s->p2p_go_vht_center_freq2,
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
NULL, 0, false);
NULL, 0, false, wpa_s->p2p2,
wpa_s->p2p_bootstrap, NULL);
}
@ -9402,7 +9459,8 @@ static int wpas_p2p_nfc_resp_go_neg(struct wpa_supplicant *wpa_s,
forced_freq, wpa_s->p2p_go_vht_center_freq2,
-1, 0, 1, 1, wpa_s->p2p_go_max_oper_chwidth,
wpa_s->p2p_go_he, wpa_s->p2p_go_edmg,
NULL, 0, false);
NULL, 0, false, wpa_s->p2p2,
wpa_s->p2p_bootstrap, NULL);
if (res)
return res;

View file

@ -39,7 +39,8 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
int persistent_id, int pd, int ht40, int vht,
unsigned int vht_chwidth, int he, int edmg,
const u8 *group_ssid, size_t group_ssid_len,
bool allow_6ghz);
bool allow_6ghz, bool p2p2, u16 bootstrap,
const char *password);
int wpas_p2p_handle_frequency_conflicts(struct wpa_supplicant *wpa_s,
int freq, struct wpa_ssid *ssid);
int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,

View file

@ -1113,6 +1113,7 @@ struct wpa_supplicant {
int pending_pd_before_join;
u8 pending_join_iface_addr[ETH_ALEN];
u8 pending_join_dev_addr[ETH_ALEN];
u8 p2p_bootstrap_dev_addr[ETH_ALEN];
int pending_join_wps_method;
u8 p2p_join_ssid[SSID_MAX_LEN];
size_t p2p_join_ssid_len;
@ -1167,6 +1168,8 @@ struct wpa_supplicant {
unsigned int p2ps_method_config_any:1;
unsigned int p2p_cli_probe:1;
unsigned int p2p_go_allow_dfs:1;
unsigned int p2p2:1;
u16 p2p_bootstrap;
enum hostapd_hw_mode p2p_go_acs_band;
int p2p_persistent_go_freq;
int p2p_persistent_id;