1 /*
2  * Wi-Fi Direct - P2P Invitation procedure
3  * Copyright (c) 2010, Atheros Communications
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "common/wpa_ctrl.h"
14 #include "p2p_i.h"
15 #include "p2p.h"
16 
17 
18 static struct wpabuf * p2p_build_invitation_req(struct p2p_data *p2p,
19 						struct p2p_device *peer,
20 						const u8 *go_dev_addr,
21 						int dev_pw_id)
22 {
23 	struct wpabuf *buf;
24 	u8 *len;
25 	const u8 *dev_addr;
26 	size_t extra = 0;
27 
28 #ifdef CONFIG_WIFI_DISPLAY
29 	struct wpabuf *wfd_ie = p2p->wfd_ie_invitation;
30 	if (wfd_ie && p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
31 		size_t i;
32 		for (i = 0; i < p2p->num_groups; i++) {
33 			struct p2p_group *g = p2p->groups[i];
34 			struct wpabuf *ie;
35 			if (os_memcmp(p2p_group_get_interface_addr(g),
36 				      p2p->inv_bssid, ETH_ALEN) != 0)
37 				continue;
38 			ie = p2p_group_get_wfd_ie(g);
39 			if (ie) {
40 				wfd_ie = ie;
41 				break;
42 			}
43 		}
44 	}
45 	if (wfd_ie)
46 		extra = wpabuf_len(wfd_ie);
47 #endif /* CONFIG_WIFI_DISPLAY */
48 
49 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ])
50 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ]);
51 
52 	buf = wpabuf_alloc(1000 + extra);
53 	if (buf == NULL)
54 		return NULL;
55 
56 	peer->dialog_token++;
57 	if (peer->dialog_token == 0)
58 		peer->dialog_token = 1;
59 	p2p_buf_add_public_action_hdr(buf, P2P_INVITATION_REQ,
60 				      peer->dialog_token);
61 
62 	len = p2p_buf_add_ie_hdr(buf);
63 	if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO || !p2p->inv_persistent)
64 		p2p_buf_add_config_timeout(buf, 0, 0);
65 	else
66 		p2p_buf_add_config_timeout(buf, p2p->go_timeout,
67 					   p2p->client_timeout);
68 	p2p_buf_add_invitation_flags(buf, p2p->inv_persistent ?
69 				     P2P_INVITATION_FLAGS_TYPE : 0);
70 	if (p2p->inv_role != P2P_INVITE_ROLE_CLIENT ||
71 	    !(peer->flags & P2P_DEV_NO_PREF_CHAN))
72 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
73 					      p2p->op_reg_class,
74 					      p2p->op_channel);
75 	if (p2p->inv_bssid_set)
76 		p2p_buf_add_group_bssid(buf, p2p->inv_bssid);
77 	p2p_buf_add_channel_list(buf, p2p->cfg->country, &p2p->channels);
78 	if (go_dev_addr)
79 		dev_addr = go_dev_addr;
80 	else if (p2p->inv_role == P2P_INVITE_ROLE_CLIENT)
81 		dev_addr = peer->info.p2p_device_addr;
82 	else
83 		dev_addr = p2p->cfg->dev_addr;
84 	p2p_buf_add_group_id(buf, dev_addr, p2p->inv_ssid, p2p->inv_ssid_len);
85 	p2p_buf_add_device_info(buf, p2p, peer);
86 	p2p_buf_update_ie_hdr(buf, len);
87 
88 	p2p_buf_add_pref_channel_list(buf, p2p->pref_freq_list,
89 				      p2p->num_pref_freq);
90 
91 #ifdef CONFIG_WIFI_DISPLAY
92 	if (wfd_ie)
93 		wpabuf_put_buf(buf, wfd_ie);
94 #endif /* CONFIG_WIFI_DISPLAY */
95 
96 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ])
97 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ]);
98 
99 	if (dev_pw_id >= 0) {
100 		/* WSC IE in Invitation Request for NFC static handover */
101 		p2p_build_wps_ie(p2p, buf, dev_pw_id, 0);
102 	}
103 
104 	return buf;
105 }
106 
107 
108 static struct wpabuf * p2p_build_invitation_resp(struct p2p_data *p2p,
109 						 struct p2p_device *peer,
110 						 u8 dialog_token, u8 status,
111 						 const u8 *group_bssid,
112 						 u8 reg_class, u8 channel,
113 						 struct p2p_channels *channels)
114 {
115 	struct wpabuf *buf;
116 	u8 *len;
117 	size_t extra = 0;
118 
119 #ifdef CONFIG_WIFI_DISPLAY
120 	struct wpabuf *wfd_ie = p2p->wfd_ie_invitation;
121 	if (wfd_ie && group_bssid) {
122 		size_t i;
123 		for (i = 0; i < p2p->num_groups; i++) {
124 			struct p2p_group *g = p2p->groups[i];
125 			struct wpabuf *ie;
126 			if (os_memcmp(p2p_group_get_interface_addr(g),
127 				      group_bssid, ETH_ALEN) != 0)
128 				continue;
129 			ie = p2p_group_get_wfd_ie(g);
130 			if (ie) {
131 				wfd_ie = ie;
132 				break;
133 			}
134 		}
135 	}
136 	if (wfd_ie)
137 		extra = wpabuf_len(wfd_ie);
138 #endif /* CONFIG_WIFI_DISPLAY */
139 
140 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP])
141 		extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP]);
142 
143 	buf = wpabuf_alloc(1000 + extra);
144 	if (buf == NULL)
145 		return NULL;
146 
147 	p2p_buf_add_public_action_hdr(buf, P2P_INVITATION_RESP,
148 				      dialog_token);
149 
150 	len = p2p_buf_add_ie_hdr(buf);
151 	p2p_buf_add_status(buf, status);
152 	p2p_buf_add_config_timeout(buf, 0, 0); /* FIX */
153 	if (reg_class && channel)
154 		p2p_buf_add_operating_channel(buf, p2p->cfg->country,
155 					      reg_class, channel);
156 	if (group_bssid)
157 		p2p_buf_add_group_bssid(buf, group_bssid);
158 	if (channels)
159 		p2p_buf_add_channel_list(buf, p2p->cfg->country, channels);
160 	p2p_buf_update_ie_hdr(buf, len);
161 
162 #ifdef CONFIG_WIFI_DISPLAY
163 	if (wfd_ie)
164 		wpabuf_put_buf(buf, wfd_ie);
165 #endif /* CONFIG_WIFI_DISPLAY */
166 
167 	if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP])
168 		wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP]);
169 
170 	return buf;
171 }
172 
173 
174 void p2p_process_invitation_req(struct p2p_data *p2p, const u8 *sa,
175 				const u8 *data, size_t len, int rx_freq)
176 {
177 	struct p2p_device *dev;
178 	struct p2p_message msg;
179 	struct wpabuf *resp = NULL;
180 	u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
181 	int freq;
182 	int go = 0;
183 	u8 group_bssid[ETH_ALEN], *bssid;
184 	int op_freq = 0;
185 	u8 reg_class = 0, channel = 0;
186 	struct p2p_channels all_channels, intersection, *channels = NULL;
187 	int persistent;
188 
189 	os_memset(group_bssid, 0, sizeof(group_bssid));
190 
191 	p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
192 		MAC2STR(sa), rx_freq);
193 
194 	if (p2p_parse(data, len, &msg))
195 		return;
196 
197 	dev = p2p_get_device(p2p, sa);
198 	if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
199 		p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
200 			MAC2STR(sa));
201 
202 		if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1,
203 				   0)) {
204 			p2p_dbg(p2p, "Invitation Request add device failed "
205 				MACSTR, MAC2STR(sa));
206 			status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
207 			goto fail;
208 		}
209 
210 		dev = p2p_get_device(p2p, sa);
211 		if (dev == NULL) {
212 			p2p_dbg(p2p, "Reject Invitation Request from unknown peer "
213 				MACSTR, MAC2STR(sa));
214 			status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
215 			goto fail;
216 		}
217 	}
218 
219 	if (!msg.group_id || !msg.channel_list) {
220 		p2p_dbg(p2p, "Mandatory attribute missing in Invitation Request from "
221 			MACSTR, MAC2STR(sa));
222 		status = P2P_SC_FAIL_INVALID_PARAMS;
223 		goto fail;
224 	}
225 
226 	if (msg.invitation_flags)
227 		persistent = *msg.invitation_flags & P2P_INVITATION_FLAGS_TYPE;
228 	else {
229 		/* Invitation Flags is a mandatory attribute starting from P2P
230 		 * spec 1.06. As a backwards compatibility mechanism, assume
231 		 * the request was for a persistent group if the attribute is
232 		 * missing.
233 		 */
234 		p2p_dbg(p2p, "Mandatory Invitation Flags attribute missing from Invitation Request");
235 		persistent = 1;
236 	}
237 
238 	p2p_channels_union(&p2p->cfg->channels, &p2p->cfg->cli_channels,
239 			   &all_channels);
240 
241 	if (p2p_peer_channels_check(p2p, &all_channels, dev,
242 				    msg.channel_list, msg.channel_list_len) <
243 	    0) {
244 		p2p_dbg(p2p, "No common channels found");
245 		status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
246 		goto fail;
247 	}
248 
249 	p2p_channels_dump(p2p, "own channels", &p2p->cfg->channels);
250 	p2p_channels_dump(p2p, "own client channels", &all_channels);
251 	p2p_channels_dump(p2p, "peer channels", &dev->channels);
252 	p2p_channels_intersect(&all_channels, &dev->channels,
253 			       &intersection);
254 	p2p_channels_dump(p2p, "intersection", &intersection);
255 
256 	if (p2p->cfg->invitation_process) {
257 		status = p2p->cfg->invitation_process(
258 			p2p->cfg->cb_ctx, sa, msg.group_bssid, msg.group_id,
259 			msg.group_id + ETH_ALEN, msg.group_id_len - ETH_ALEN,
260 			&go, group_bssid, &op_freq, persistent, &intersection,
261 			msg.dev_password_id_present ? msg.dev_password_id : -1);
262 	}
263 
264 	if (go) {
265 		p2p_channels_intersect(&p2p->cfg->channels, &dev->channels,
266 				       &intersection);
267 		p2p_channels_dump(p2p, "intersection(GO)", &intersection);
268 		if (intersection.reg_classes == 0) {
269 			p2p_dbg(p2p, "No common channels found (GO)");
270 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
271 			goto fail;
272 		}
273 	}
274 
275 	if (op_freq) {
276 		p2p_dbg(p2p, "Invitation processing forced frequency %d MHz",
277 			op_freq);
278 		if (p2p_freq_to_channel(op_freq, &reg_class, &channel) < 0) {
279 			p2p_dbg(p2p, "Unknown forced freq %d MHz from invitation_process()",
280 				op_freq);
281 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
282 			goto fail;
283 		}
284 
285 		if (!p2p_channels_includes(&intersection, reg_class, channel))
286 		{
287 			p2p_dbg(p2p, "forced freq %d MHz not in the supported channels intersection",
288 				op_freq);
289 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
290 			goto fail;
291 		}
292 
293 		if (status == P2P_SC_SUCCESS)
294 			channels = &intersection;
295 	} else {
296 		p2p_dbg(p2p, "No forced channel from invitation processing - figure out best one to use");
297 
298 		/* Default to own configuration as a starting point */
299 		p2p->op_reg_class = p2p->cfg->op_reg_class;
300 		p2p->op_channel = p2p->cfg->op_channel;
301 		p2p_dbg(p2p, "Own default op_class %d channel %d",
302 			p2p->op_reg_class, p2p->op_channel);
303 
304 		/* Use peer preference if specified and compatible */
305 		if (msg.operating_channel) {
306 			int req_freq;
307 			req_freq = p2p_channel_to_freq(
308 				msg.operating_channel[3],
309 				msg.operating_channel[4]);
310 			p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
311 				req_freq);
312 			if (req_freq > 0 &&
313 			    p2p_channels_includes(&intersection,
314 						  msg.operating_channel[3],
315 						  msg.operating_channel[4])) {
316 				p2p->op_reg_class = msg.operating_channel[3];
317 				p2p->op_channel = msg.operating_channel[4];
318 				p2p_dbg(p2p, "Use peer preference op_class %d channel %d",
319 					p2p->op_reg_class, p2p->op_channel);
320 			} else {
321 				p2p_dbg(p2p, "Cannot use peer channel preference");
322 			}
323 		}
324 
325 		/* Reselect the channel only for the case of the GO */
326 		if (go &&
327 		    !p2p_channels_includes(&intersection, p2p->op_reg_class,
328 					   p2p->op_channel)) {
329 			p2p_dbg(p2p, "Initially selected channel (op_class %d channel %d) not in channel intersection - try to reselect",
330 				p2p->op_reg_class, p2p->op_channel);
331 			p2p_reselect_channel(p2p, &intersection);
332 			p2p_dbg(p2p, "Re-selection result: op_class %d channel %d",
333 				p2p->op_reg_class, p2p->op_channel);
334 			if (!p2p_channels_includes(&intersection,
335 						   p2p->op_reg_class,
336 						   p2p->op_channel)) {
337 				p2p_dbg(p2p, "Peer does not support selected operating channel (reg_class=%u channel=%u)",
338 					p2p->op_reg_class, p2p->op_channel);
339 				status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
340 				goto fail;
341 			}
342 		} else if (go && !(dev->flags & P2P_DEV_FORCE_FREQ) &&
343 			   !p2p->cfg->cfg_op_channel) {
344 			p2p_dbg(p2p, "Try to reselect channel selection with peer information received; previously selected op_class %u channel %u",
345 				p2p->op_reg_class, p2p->op_channel);
346 			p2p_reselect_channel(p2p, &intersection);
347 		}
348 
349 		/*
350 		 * Use the driver preferred frequency list extension if
351 		 * supported.
352 		 */
353 		p2p_check_pref_chan(p2p, go, dev, &msg);
354 
355 		op_freq = p2p_channel_to_freq(p2p->op_reg_class,
356 					      p2p->op_channel);
357 		if (op_freq < 0) {
358 			p2p_dbg(p2p, "Unknown operational channel (country=%c%c reg_class=%u channel=%u)",
359 				p2p->cfg->country[0], p2p->cfg->country[1],
360 				p2p->op_reg_class, p2p->op_channel);
361 			status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
362 			goto fail;
363 		}
364 		p2p_dbg(p2p, "Selected operating channel - %d MHz", op_freq);
365 
366 		if (status == P2P_SC_SUCCESS) {
367 			reg_class = p2p->op_reg_class;
368 			channel = p2p->op_channel;
369 			channels = &intersection;
370 		}
371 	}
372 
373 fail:
374 	if (go && status == P2P_SC_SUCCESS && !is_zero_ether_addr(group_bssid))
375 		bssid = group_bssid;
376 	else
377 		bssid = NULL;
378 	resp = p2p_build_invitation_resp(p2p, dev, msg.dialog_token, status,
379 					 bssid, reg_class, channel, channels);
380 
381 	if (resp == NULL)
382 		goto out;
383 
384 	if (rx_freq > 0)
385 		freq = rx_freq;
386 	else
387 		freq = p2p_channel_to_freq(p2p->cfg->reg_class,
388 					   p2p->cfg->channel);
389 	if (freq < 0) {
390 		p2p_dbg(p2p, "Unknown regulatory class/channel");
391 		goto out;
392 	}
393 
394 	/*
395 	 * Store copy of invitation data to be used when processing TX status
396 	 * callback for the Acton frame.
397 	 */
398 	os_memcpy(p2p->inv_sa, sa, ETH_ALEN);
399 	if (msg.group_bssid) {
400 		os_memcpy(p2p->inv_group_bssid, msg.group_bssid, ETH_ALEN);
401 		p2p->inv_group_bssid_ptr = p2p->inv_group_bssid;
402 	} else
403 		p2p->inv_group_bssid_ptr = NULL;
404 	if (msg.group_id) {
405 		if (msg.group_id_len - ETH_ALEN <= SSID_MAX_LEN) {
406 			os_memcpy(p2p->inv_ssid, msg.group_id + ETH_ALEN,
407 				  msg.group_id_len - ETH_ALEN);
408 			p2p->inv_ssid_len = msg.group_id_len - ETH_ALEN;
409 		}
410 		os_memcpy(p2p->inv_go_dev_addr, msg.group_id, ETH_ALEN);
411 	} else {
412 		p2p->inv_ssid_len = 0;
413 		os_memset(p2p->inv_go_dev_addr, 0, ETH_ALEN);
414 	}
415 	p2p->inv_status = status;
416 	p2p->inv_op_freq = op_freq;
417 
418 	p2p->pending_action_state = P2P_PENDING_INVITATION_RESPONSE;
419 	if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
420 			    p2p->cfg->dev_addr,
421 			    wpabuf_head(resp), wpabuf_len(resp), 50) < 0) {
422 		p2p_dbg(p2p, "Failed to send Action frame");
423 	}
424 
425 out:
426 	wpabuf_free(resp);
427 	p2p_parse_free(&msg);
428 }
429 
430 
431 void p2p_process_invitation_resp(struct p2p_data *p2p, const u8 *sa,
432 				 const u8 *data, size_t len)
433 {
434 	struct p2p_device *dev;
435 	struct p2p_message msg;
436 	struct p2p_channels intersection, *channels = NULL;
437 
438 	p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
439 		MAC2STR(sa));
440 
441 	dev = p2p_get_device(p2p, sa);
442 	if (dev == NULL) {
443 		p2p_dbg(p2p, "Ignore Invitation Response from unknown peer "
444 			MACSTR, MAC2STR(sa));
445 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
446 		return;
447 	}
448 
449 	if (dev != p2p->invite_peer) {
450 		p2p_dbg(p2p, "Ignore unexpected Invitation Response from peer "
451 			MACSTR, MAC2STR(sa));
452 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
453 		return;
454 	}
455 
456 	if (p2p_parse(data, len, &msg)) {
457 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
458 		return;
459 	}
460 
461 	if (!msg.status) {
462 		p2p_dbg(p2p, "Mandatory Status attribute missing in Invitation Response from "
463 			MACSTR, MAC2STR(sa));
464 		p2p_parse_free(&msg);
465 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
466 		return;
467 	}
468 
469 	/*
470 	 * We should not really receive a replayed response twice since
471 	 * duplicate frames are supposed to be dropped. However, not all drivers
472 	 * do that for pre-association frames. We did not use to verify dialog
473 	 * token matches for invitation response frames, but that check can be
474 	 * safely used to drop a replayed response to the previous Invitation
475 	 * Request in case the suggested operating channel was changed. This
476 	 * allows a duplicated reject frame to be dropped with the assumption
477 	 * that the real response follows after it.
478 	 */
479 	if (*msg.status == P2P_SC_FAIL_NO_COMMON_CHANNELS &&
480 	    p2p->retry_invite_req_sent &&
481 	    msg.dialog_token != dev->dialog_token) {
482 		p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
483 			msg.dialog_token, dev->dialog_token);
484 		p2p_parse_free(&msg);
485 		return;
486 	}
487 
488 	if (*msg.status == P2P_SC_FAIL_NO_COMMON_CHANNELS &&
489 	    p2p->retry_invite_req &&
490 	    p2p_channel_random_social(&p2p->cfg->channels, &p2p->op_reg_class,
491 				      &p2p->op_channel, NULL, NULL) == 0) {
492 		p2p->retry_invite_req = 0;
493 		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
494 		p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
495 		p2p_set_state(p2p, P2P_INVITE);
496 		p2p_dbg(p2p, "Resend Invitation Request setting op_class %u channel %u as operating channel",
497 			p2p->op_reg_class, p2p->op_channel);
498 		p2p->retry_invite_req_sent = 1;
499 		p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr,
500 				p2p->invite_dev_pw_id);
501 		p2p_parse_free(&msg);
502 		return;
503 	}
504 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
505 	p2p->retry_invite_req = 0;
506 
507 	if (!msg.channel_list && *msg.status == P2P_SC_SUCCESS) {
508 		p2p_dbg(p2p, "Mandatory Channel List attribute missing in Invitation Response from "
509 			MACSTR, MAC2STR(sa));
510 #ifdef CONFIG_P2P_STRICT
511 		p2p_parse_free(&msg);
512 		return;
513 #endif /* CONFIG_P2P_STRICT */
514 		/* Try to survive without peer channel list */
515 		channels = &p2p->channels;
516 	} else if (!msg.channel_list) {
517 		/* Non-success cases are not required to include Channel List */
518 		channels = &p2p->channels;
519 	} else if (p2p_peer_channels_check(p2p, &p2p->channels, dev,
520 					   msg.channel_list,
521 					   msg.channel_list_len) < 0) {
522 		p2p_dbg(p2p, "No common channels found");
523 		p2p_parse_free(&msg);
524 		return;
525 	} else {
526 		p2p_channels_intersect(&p2p->channels, &dev->channels,
527 				       &intersection);
528 		channels = &intersection;
529 	}
530 
531 	if (p2p->cfg->invitation_result) {
532 		int peer_oper_freq = 0;
533 		int freq = p2p_channel_to_freq(p2p->op_reg_class,
534 					       p2p->op_channel);
535 		if (freq < 0)
536 			freq = 0;
537 
538 		if (msg.operating_channel) {
539 			peer_oper_freq = p2p_channel_to_freq(
540 				msg.operating_channel[3],
541 				msg.operating_channel[4]);
542 			if (peer_oper_freq < 0)
543 				peer_oper_freq = 0;
544 		}
545 
546 		/*
547 		 * Use the driver preferred frequency list extension if
548 		 * supported.
549 		 */
550 		p2p_check_pref_chan(p2p, 0, dev, &msg);
551 
552 		p2p->cfg->invitation_result(p2p->cfg->cb_ctx, *msg.status,
553 					    msg.group_bssid, channels, sa,
554 					    freq, peer_oper_freq);
555 	}
556 
557 	p2p_parse_free(&msg);
558 
559 	p2p_clear_timeout(p2p);
560 	p2p_set_state(p2p, P2P_IDLE);
561 	p2p->invite_peer = NULL;
562 }
563 
564 
565 int p2p_invite_send(struct p2p_data *p2p, struct p2p_device *dev,
566 		    const u8 *go_dev_addr, int dev_pw_id)
567 {
568 	struct wpabuf *req;
569 	int freq;
570 
571 	freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
572 	if (freq <= 0)
573 		freq = dev->oob_go_neg_freq;
574 	if (freq <= 0) {
575 		p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
576 			MACSTR " to send Invitation Request",
577 			MAC2STR(dev->info.p2p_device_addr));
578 		return -1;
579 	}
580 
581 	req = p2p_build_invitation_req(p2p, dev, go_dev_addr, dev_pw_id);
582 	if (req == NULL)
583 		return -1;
584 	if (p2p->state != P2P_IDLE)
585 		p2p_stop_listen_for_freq(p2p, freq);
586 	p2p_dbg(p2p, "Sending Invitation Request");
587 	p2p_set_state(p2p, P2P_INVITE);
588 	p2p->pending_action_state = P2P_PENDING_INVITATION_REQUEST;
589 	p2p->invite_peer = dev;
590 	dev->invitation_reqs++;
591 	if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
592 			    p2p->cfg->dev_addr, dev->info.p2p_device_addr,
593 			    wpabuf_head(req), wpabuf_len(req), 500) < 0) {
594 		p2p_dbg(p2p, "Failed to send Action frame");
595 		/* Use P2P find to recover and retry */
596 		p2p_set_timeout(p2p, 0, 0);
597 	} else {
598 		dev->flags |= P2P_DEV_WAIT_INV_REQ_ACK;
599 	}
600 
601 	wpabuf_free(req);
602 
603 	return 0;
604 }
605 
606 
607 void p2p_invitation_req_cb(struct p2p_data *p2p, int success)
608 {
609 	p2p_dbg(p2p, "Invitation Request TX callback: success=%d", success);
610 
611 	if (p2p->invite_peer == NULL) {
612 		p2p_dbg(p2p, "No pending Invite");
613 		return;
614 	}
615 
616 	if (success)
617 		p2p->invite_peer->flags &= ~P2P_DEV_WAIT_INV_REQ_ACK;
618 
619 	/*
620 	 * Use P2P find, if needed, to find the other device from its listen
621 	 * channel.
622 	 */
623 	p2p_set_state(p2p, P2P_INVITE);
624 	p2p_set_timeout(p2p, 0, success ? 500000 : 100000);
625 }
626 
627 
628 void p2p_invitation_resp_cb(struct p2p_data *p2p, int success)
629 {
630 	p2p_dbg(p2p, "Invitation Response TX callback: success=%d", success);
631 	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
632 
633 	if (!success)
634 		p2p_dbg(p2p, "Assume Invitation Response was actually received by the peer even though Ack was not reported");
635 
636 	if (p2p->cfg->invitation_received) {
637 		p2p->cfg->invitation_received(p2p->cfg->cb_ctx,
638 					      p2p->inv_sa,
639 					      p2p->inv_group_bssid_ptr,
640 					      p2p->inv_ssid, p2p->inv_ssid_len,
641 					      p2p->inv_go_dev_addr,
642 					      p2p->inv_status,
643 					      p2p->inv_op_freq);
644 	}
645 }
646 
647 
648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
649 	       const u8 *bssid, const u8 *ssid, size_t ssid_len,
650 	       unsigned int force_freq, const u8 *go_dev_addr,
651 	       int persistent_group, unsigned int pref_freq, int dev_pw_id)
652 {
653 	struct p2p_device *dev;
654 
655 	p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
656 		"force_freq=%u",
657 		MAC2STR(peer), role, persistent_group, force_freq);
658 	if (bssid)
659 		p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid));
660 	if (go_dev_addr) {
661 		p2p_dbg(p2p, "Invitation for GO Device Address " MACSTR,
662 			MAC2STR(go_dev_addr));
663 		os_memcpy(p2p->invite_go_dev_addr_buf, go_dev_addr, ETH_ALEN);
664 		p2p->invite_go_dev_addr = p2p->invite_go_dev_addr_buf;
665 	} else
666 		p2p->invite_go_dev_addr = NULL;
667 	wpa_hexdump_ascii(MSG_DEBUG, "Invitation for SSID",
668 			  ssid, ssid_len);
669 	if (dev_pw_id >= 0) {
670 		p2p_dbg(p2p, "Invitation to use Device Password ID %d",
671 			dev_pw_id);
672 	}
673 	p2p->invite_dev_pw_id = dev_pw_id;
674 	p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO &&
675 		persistent_group && !force_freq;
676 	p2p->retry_invite_req_sent = 0;
677 
678 	dev = p2p_get_device(p2p, peer);
679 	if (dev == NULL || (dev->listen_freq <= 0 && dev->oper_freq <= 0 &&
680 			    dev->oob_go_neg_freq <= 0)) {
681 		p2p_dbg(p2p, "Cannot invite unknown P2P Device " MACSTR,
682 			MAC2STR(peer));
683 		return -1;
684 	}
685 
686 	if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq,
687 				role != P2P_INVITE_ROLE_CLIENT) < 0)
688 		return -1;
689 
690 	if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
691 	    !pref_freq)
692 		dev->flags |= P2P_DEV_NO_PREF_CHAN;
693 	else
694 		dev->flags &= ~P2P_DEV_NO_PREF_CHAN;
695 
696 	if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
697 		if (!(dev->info.dev_capab &
698 		      P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
699 			p2p_dbg(p2p, "Cannot invite a P2P Device " MACSTR
700 				" that is in a group and is not discoverable",
701 				MAC2STR(peer));
702 		}
703 		/* TODO: use device discoverability request through GO */
704 	}
705 
706 	dev->invitation_reqs = 0;
707 
708 	if (p2p->state != P2P_IDLE)
709 		p2p_stop_find(p2p);
710 
711 	p2p->inv_role = role;
712 	p2p->inv_bssid_set = bssid != NULL;
713 	if (bssid)
714 		os_memcpy(p2p->inv_bssid, bssid, ETH_ALEN);
715 	os_memcpy(p2p->inv_ssid, ssid, ssid_len);
716 	p2p->inv_ssid_len = ssid_len;
717 	p2p->inv_persistent = persistent_group;
718 	return p2p_invite_send(p2p, dev, go_dev_addr, dev_pw_id);
719 }
720