| /* |
| * P2P - IE builder |
| * Copyright (c) 2009-2010, Atheros Communications |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "includes.h" |
| |
| #include "common.h" |
| #include "common/ieee802_11_defs.h" |
| #include "wps/wps_i.h" |
| #include "p2p_i.h" |
| |
| |
| void p2p_buf_add_action_hdr(struct wpabuf *buf, u8 subtype, u8 dialog_token) |
| { |
| wpabuf_put_u8(buf, WLAN_ACTION_VENDOR_SPECIFIC); |
| wpabuf_put_be32(buf, P2P_IE_VENDOR_TYPE); |
| |
| wpabuf_put_u8(buf, subtype); /* OUI Subtype */ |
| wpabuf_put_u8(buf, dialog_token); |
| wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); |
| } |
| |
| |
| void p2p_buf_add_public_action_hdr(struct wpabuf *buf, u8 subtype, |
| u8 dialog_token) |
| { |
| wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC); |
| wpabuf_put_u8(buf, WLAN_PA_VENDOR_SPECIFIC); |
| wpabuf_put_be32(buf, P2P_IE_VENDOR_TYPE); |
| |
| wpabuf_put_u8(buf, subtype); /* OUI Subtype */ |
| wpabuf_put_u8(buf, dialog_token); |
| wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); |
| } |
| |
| |
| u8 * p2p_buf_add_ie_hdr(struct wpabuf *buf) |
| { |
| u8 *len; |
| |
| /* P2P IE header */ |
| wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC); |
| len = wpabuf_put(buf, 1); /* IE length to be filled */ |
| wpabuf_put_be32(buf, P2P_IE_VENDOR_TYPE); |
| wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); |
| return len; |
| } |
| |
| |
| void p2p_buf_update_ie_hdr(struct wpabuf *buf, u8 *len) |
| { |
| /* Update P2P IE Length */ |
| *len = (u8 *) wpabuf_put(buf, 0) - len - 1; |
| } |
| |
| |
| void p2p_buf_add_capability(struct wpabuf *buf, u8 dev_capab, u8 group_capab) |
| { |
| /* P2P Capability */ |
| wpabuf_put_u8(buf, P2P_ATTR_CAPABILITY); |
| wpabuf_put_le16(buf, 2); |
| wpabuf_put_u8(buf, dev_capab); /* Device Capabilities */ |
| wpabuf_put_u8(buf, group_capab); /* Group Capabilities */ |
| wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", |
| dev_capab, group_capab); |
| } |
| |
| |
| void p2p_buf_add_go_intent(struct wpabuf *buf, u8 go_intent) |
| { |
| /* Group Owner Intent */ |
| wpabuf_put_u8(buf, P2P_ATTR_GROUP_OWNER_INTENT); |
| wpabuf_put_le16(buf, 1); |
| wpabuf_put_u8(buf, go_intent); |
| wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", |
| go_intent >> 1, go_intent & 0x01); |
| } |
| |
| |
| void p2p_buf_add_listen_channel(struct wpabuf *buf, const char *country, |
| u8 reg_class, u8 channel) |
| { |
| /* Listen Channel */ |
| wpabuf_put_u8(buf, P2P_ATTR_LISTEN_CHANNEL); |
| wpabuf_put_le16(buf, 5); |
| wpabuf_put_data(buf, country, 3); |
| wpabuf_put_u8(buf, reg_class); /* Regulatory Class */ |
| wpabuf_put_u8(buf, channel); /* Channel Number */ |
| wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " |
| "Channel %u", reg_class, channel); |
| } |
| |
| |
| void p2p_buf_add_operating_channel(struct wpabuf *buf, const char *country, |
| u8 reg_class, u8 channel) |
| { |
| /* Operating Channel */ |
| wpabuf_put_u8(buf, P2P_ATTR_OPERATING_CHANNEL); |
| wpabuf_put_le16(buf, 5); |
| wpabuf_put_data(buf, country, 3); |
| wpabuf_put_u8(buf, reg_class); /* Regulatory Class */ |
| wpabuf_put_u8(buf, channel); /* Channel Number */ |
| wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " |
| "Channel %u", reg_class, channel); |
| } |
| |
| |
| void p2p_buf_add_channel_list(struct wpabuf *buf, const char *country, |
| struct p2p_channels *chan) |
| { |
| u8 *len; |
| size_t i; |
| |
| /* Channel List */ |
| wpabuf_put_u8(buf, P2P_ATTR_CHANNEL_LIST); |
| len = wpabuf_put(buf, 2); /* IE length to be filled */ |
| wpabuf_put_data(buf, country, 3); /* Country String */ |
| |
| for (i = 0; i < chan->reg_classes; i++) { |
| struct p2p_reg_class *c = &chan->reg_class[i]; |
| wpabuf_put_u8(buf, c->reg_class); |
| wpabuf_put_u8(buf, c->channels); |
| wpabuf_put_data(buf, c->channel, c->channels); |
| } |
| |
| /* Update attribute length */ |
| WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2); |
| wpa_hexdump(MSG_DEBUG, "P2P: * Channel List", |
| len + 2, (u8 *) wpabuf_put(buf, 0) - len - 2); |
| } |
| |
| |
| void p2p_buf_add_status(struct wpabuf *buf, u8 status) |
| { |
| /* Status */ |
| wpabuf_put_u8(buf, P2P_ATTR_STATUS); |
| wpabuf_put_le16(buf, 1); |
| wpabuf_put_u8(buf, status); |
| wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); |
| } |
| |
| |
| void p2p_buf_add_device_info(struct wpabuf *buf, struct p2p_data *p2p, |
| struct p2p_device *peer) |
| { |
| u8 *len; |
| u16 methods; |
| size_t nlen, i; |
| |
| /* P2P Device Info */ |
| wpabuf_put_u8(buf, P2P_ATTR_DEVICE_INFO); |
| len = wpabuf_put(buf, 2); /* IE length to be filled */ |
| |
| /* P2P Device address */ |
| wpabuf_put_data(buf, p2p->cfg->dev_addr, ETH_ALEN); |
| |
| /* Config Methods */ |
| methods = 0; |
| if (peer && peer->wps_method != WPS_NOT_READY) { |
| if (peer->wps_method == WPS_PBC) |
| methods |= WPS_CONFIG_PUSHBUTTON; |
| else if (peer->wps_method == WPS_PIN_DISPLAY || |
| peer->wps_method == WPS_PIN_KEYPAD) { |
| methods |= WPS_CONFIG_DISPLAY | WPS_CONFIG_KEYPAD; |
| methods |= WPS_CONFIG_P2PS; |
| } |
| } else if (p2p->cfg->config_methods) { |
| methods |= p2p->cfg->config_methods & |
| (WPS_CONFIG_PUSHBUTTON | WPS_CONFIG_DISPLAY | |
| WPS_CONFIG_KEYPAD | WPS_CONFIG_P2PS); |
| } else { |
| methods |= WPS_CONFIG_PUSHBUTTON; |
| methods |= WPS_CONFIG_DISPLAY | WPS_CONFIG_KEYPAD; |
| methods |= WPS_CONFIG_P2PS; |
| } |
| wpabuf_put_be16(buf, methods); |
| |
| /* Primary Device Type */ |
| wpabuf_put_data(buf, p2p->cfg->pri_dev_type, |
| sizeof(p2p->cfg->pri_dev_type)); |
| |
| /* Number of Secondary Device Types */ |
| wpabuf_put_u8(buf, p2p->cfg->num_sec_dev_types); |
| |
| /* Secondary Device Type List */ |
| for (i = 0; i < p2p->cfg->num_sec_dev_types; i++) |
| wpabuf_put_data(buf, p2p->cfg->sec_dev_type[i], |
| WPS_DEV_TYPE_LEN); |
| |
| /* Device Name */ |
| nlen = p2p->cfg->dev_name ? os_strlen(p2p->cfg->dev_name) : 0; |
| wpabuf_put_be16(buf, ATTR_DEV_NAME); |
| wpabuf_put_be16(buf, nlen); |
| wpabuf_put_data(buf, p2p->cfg->dev_name, nlen); |
| |
| /* Update attribute length */ |
| WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2); |
| wpa_printf(MSG_DEBUG, "P2P: * Device Info"); |
| } |
| |
| |
| void p2p_buf_add_device_id(struct wpabuf *buf, const u8 *dev_addr) |
| { |
| /* P2P Device ID */ |
| wpabuf_put_u8(buf, P2P_ATTR_DEVICE_ID); |
| wpabuf_put_le16(buf, ETH_ALEN); |
| wpabuf_put_data(buf, dev_addr, ETH_ALEN); |
| wpa_printf(MSG_DEBUG, "P2P: * Device ID: " MACSTR, MAC2STR(dev_addr)); |
| } |
| |
| |
| void p2p_buf_add_config_timeout(struct wpabuf *buf, u8 go_timeout, |
| u8 client_timeout) |
| { |
| /* Configuration Timeout */ |
| wpabuf_put_u8(buf, P2P_ATTR_CONFIGURATION_TIMEOUT); |
| wpabuf_put_le16(buf, 2); |
| wpabuf_put_u8(buf, go_timeout); |
| wpabuf_put_u8(buf, client_timeout); |
| wpa_printf(MSG_DEBUG, "P2P: * Configuration Timeout: GO %d (*10ms) " |
| "client %d (*10ms)", go_timeout, client_timeout); |
| } |
| |
| |
| void p2p_buf_add_intended_addr(struct wpabuf *buf, const u8 *interface_addr) |
| { |
| /* Intended P2P Interface Address */ |
| wpabuf_put_u8(buf, P2P_ATTR_INTENDED_INTERFACE_ADDR); |
| wpabuf_put_le16(buf, ETH_ALEN); |
| wpabuf_put_data(buf, interface_addr, ETH_ALEN); |
| wpa_printf(MSG_DEBUG, "P2P: * Intended P2P Interface Address " MACSTR, |
| MAC2STR(interface_addr)); |
| } |
| |
| |
| void p2p_buf_add_group_bssid(struct wpabuf *buf, const u8 *bssid) |
| { |
| /* P2P Group BSSID */ |
| wpabuf_put_u8(buf, P2P_ATTR_GROUP_BSSID); |
| wpabuf_put_le16(buf, ETH_ALEN); |
| wpabuf_put_data(buf, bssid, ETH_ALEN); |
| wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID " MACSTR, |
| MAC2STR(bssid)); |
| } |
| |
| |
| void p2p_buf_add_group_id(struct wpabuf *buf, const u8 *dev_addr, |
| const u8 *ssid, size_t ssid_len) |
| { |
| /* P2P Group ID */ |
| wpabuf_put_u8(buf, P2P_ATTR_GROUP_ID); |
| wpabuf_put_le16(buf, ETH_ALEN + ssid_len); |
| wpabuf_put_data(buf, dev_addr, ETH_ALEN); |
| wpabuf_put_data(buf, ssid, ssid_len); |
| wpa_printf(MSG_DEBUG, "P2P: * P2P Group ID " MACSTR, |
| MAC2STR(dev_addr)); |
| wpa_hexdump_ascii(MSG_DEBUG, "P2P: P2P Group ID SSID", ssid, ssid_len); |
| } |
| |
| |
| void p2p_buf_add_invitation_flags(struct wpabuf *buf, u8 flags) |
| { |
| /* Invitation Flags */ |
| wpabuf_put_u8(buf, P2P_ATTR_INVITATION_FLAGS); |
| wpabuf_put_le16(buf, 1); |
| wpabuf_put_u8(buf, flags); |
| wpa_printf(MSG_DEBUG, "P2P: * Invitation Flags: bitmap 0x%x", flags); |
| } |
| |
| |
| static void p2p_buf_add_noa_desc(struct wpabuf *buf, struct p2p_noa_desc *desc) |
| { |
| if (desc == NULL) |
| return; |
| |
| wpabuf_put_u8(buf, desc->count_type); |
| wpabuf_put_le32(buf, desc->duration); |
| wpabuf_put_le32(buf, desc->interval); |
| wpabuf_put_le32(buf, desc->start_time); |
| } |
| |
| |
| void p2p_buf_add_noa(struct wpabuf *buf, u8 noa_index, u8 opp_ps, u8 ctwindow, |
| struct p2p_noa_desc *desc1, struct p2p_noa_desc *desc2) |
| { |
| /* Notice of Absence */ |
| wpabuf_put_u8(buf, P2P_ATTR_NOTICE_OF_ABSENCE); |
| wpabuf_put_le16(buf, 2 + (desc1 ? 13 : 0) + (desc2 ? 13 : 0)); |
| wpabuf_put_u8(buf, noa_index); |
| wpabuf_put_u8(buf, (opp_ps ? 0x80 : 0) | (ctwindow & 0x7f)); |
| p2p_buf_add_noa_desc(buf, desc1); |
| p2p_buf_add_noa_desc(buf, desc2); |
| wpa_printf(MSG_DEBUG, "P2P: * Notice of Absence"); |
| } |
| |
| |
| void p2p_buf_add_ext_listen_timing(struct wpabuf *buf, u16 period, |
| u16 interval) |
| { |
| /* Extended Listen Timing */ |
| wpabuf_put_u8(buf, P2P_ATTR_EXT_LISTEN_TIMING); |
| wpabuf_put_le16(buf, 4); |
| wpabuf_put_le16(buf, period); |
| wpabuf_put_le16(buf, interval); |
| wpa_printf(MSG_DEBUG, "P2P: * Extended Listen Timing (period %u msec " |
| "interval %u msec)", period, interval); |
| } |
| |
| |
| void p2p_buf_add_p2p_interface(struct wpabuf *buf, struct p2p_data *p2p) |
| { |
| /* P2P Interface */ |
| wpabuf_put_u8(buf, P2P_ATTR_INTERFACE); |
| wpabuf_put_le16(buf, ETH_ALEN + 1 + ETH_ALEN); |
| /* P2P Device address */ |
| wpabuf_put_data(buf, p2p->cfg->dev_addr, ETH_ALEN); |
| /* |
| * FIX: Fetch interface address list from driver. Do not include |
| * the P2P Device address if it is never used as interface address. |
| */ |
| /* P2P Interface Address Count */ |
| wpabuf_put_u8(buf, 1); |
| wpabuf_put_data(buf, p2p->cfg->dev_addr, ETH_ALEN); |
| } |
| |
| |
| void p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, |
| u8 oper_class, u8 channel, |
| enum p2p_role_indication role) |
| { |
| /* OOB Group Owner Negotiation Channel */ |
| wpabuf_put_u8(buf, P2P_ATTR_OOB_GO_NEG_CHANNEL); |
| wpabuf_put_le16(buf, 6); |
| wpabuf_put_data(buf, country, 3); |
| wpabuf_put_u8(buf, oper_class); /* Operating Class */ |
| wpabuf_put_u8(buf, channel); /* Channel Number */ |
| wpabuf_put_u8(buf, (u8) role); /* Role indication */ |
| wpa_printf(MSG_DEBUG, "P2P: * OOB GO Negotiation Channel: Operating " |
| "Class %u Channel %u Role %d", |
| oper_class, channel, role); |
| } |
| |
| |
| void p2p_buf_add_service_hash(struct wpabuf *buf, struct p2p_data *p2p) |
| { |
| if (!p2p) |
| return; |
| |
| /* Service Hash */ |
| wpabuf_put_u8(buf, P2P_ATTR_SERVICE_HASH); |
| wpabuf_put_le16(buf, p2p->p2ps_seek_count * P2PS_HASH_LEN); |
| wpabuf_put_data(buf, p2p->query_hash, |
| p2p->p2ps_seek_count * P2PS_HASH_LEN); |
| wpa_hexdump(MSG_DEBUG, "P2P: * Service Hash", |
| p2p->query_hash, p2p->p2ps_seek_count * P2PS_HASH_LEN); |
| } |
| |
| |
| void p2p_buf_add_session_info(struct wpabuf *buf, const char *info) |
| { |
| size_t info_len = 0; |
| |
| if (info && info[0]) |
| info_len = os_strlen(info); |
| |
| /* Session Information Data Info */ |
| wpabuf_put_u8(buf, P2P_ATTR_SESSION_INFORMATION_DATA); |
| wpabuf_put_le16(buf, (u16) info_len); |
| |
| if (info) { |
| wpabuf_put_data(buf, info, info_len); |
| wpa_printf(MSG_DEBUG, "P2P: * Session Info Data (%s)", info); |
| } |
| } |
| |
| |
| void p2p_buf_add_connection_capability(struct wpabuf *buf, u8 connection_cap) |
| { |
| /* Connection Capability Info */ |
| wpabuf_put_u8(buf, P2P_ATTR_CONNECTION_CAPABILITY); |
| wpabuf_put_le16(buf, 1); |
| wpabuf_put_u8(buf, connection_cap); |
| wpa_printf(MSG_DEBUG, "P2P: * Connection Capability: 0x%x", |
| connection_cap); |
| } |
| |
| |
| void p2p_buf_add_advertisement_id(struct wpabuf *buf, u32 id, const u8 *mac) |
| { |
| if (!buf || !mac) |
| return; |
| |
| /* Advertisement ID Info */ |
| wpabuf_put_u8(buf, P2P_ATTR_ADVERTISEMENT_ID); |
| wpabuf_put_le16(buf, (u16) (sizeof(u32) + ETH_ALEN)); |
| wpabuf_put_le32(buf, id); |
| wpabuf_put_data(buf, mac, ETH_ALEN); |
| wpa_printf(MSG_DEBUG, "P2P: * Advertisement ID (%x) " MACSTR, |
| id, MAC2STR(mac)); |
| } |
| |
| |
| void p2p_buf_add_service_instance(struct wpabuf *buf, struct p2p_data *p2p, |
| u8 hash_count, const u8 *hash, |
| struct p2ps_advertisement *adv_list) |
| { |
| struct p2ps_advertisement *adv; |
| struct wpabuf *tmp_buf; |
| u8 *tag_len = NULL, *ie_len = NULL; |
| size_t svc_len = 0, remaining = 0, total_len = 0; |
| |
| if (!adv_list || !hash) |
| return; |
| |
| /* Allocate temp buffer, allowing for overflow of 1 instance */ |
| tmp_buf = wpabuf_alloc(MAX_SVC_ADV_IE_LEN + 256 + P2PS_HASH_LEN); |
| if (!tmp_buf) |
| return; |
| |
| for (adv = adv_list; adv && total_len <= MAX_SVC_ADV_LEN; |
| adv = adv->next) { |
| u8 count = hash_count; |
| const u8 *test = hash; |
| |
| while (count--) { |
| /* Check for wildcard */ |
| if (os_memcmp(test, p2p->wild_card_hash, |
| P2PS_HASH_LEN) == 0) { |
| total_len = MAX_SVC_ADV_LEN + 1; |
| goto wild_hash; |
| } |
| |
| if (os_memcmp(test, adv->hash, P2PS_HASH_LEN) == 0) |
| goto hash_match; |
| |
| test += P2PS_HASH_LEN; |
| } |
| |
| /* No matches found - Skip this Adv Instance */ |
| continue; |
| |
| hash_match: |
| if (!tag_len) { |
| tag_len = p2p_buf_add_ie_hdr(tmp_buf); |
| remaining = 255 - 4; |
| if (!ie_len) { |
| wpabuf_put_u8(tmp_buf, |
| P2P_ATTR_ADVERTISED_SERVICE); |
| ie_len = wpabuf_put(tmp_buf, sizeof(u16)); |
| remaining -= (sizeof(u8) + sizeof(u16)); |
| } |
| } |
| |
| svc_len = os_strlen(adv->svc_name); |
| |
| if (7 + svc_len + total_len > MAX_SVC_ADV_LEN) { |
| /* Can't fit... return wildcard */ |
| total_len = MAX_SVC_ADV_LEN + 1; |
| break; |
| } |
| |
| if (remaining <= (sizeof(adv->id) + |
| sizeof(adv->config_methods))) { |
| size_t front = remaining; |
| size_t back = (sizeof(adv->id) + |
| sizeof(adv->config_methods)) - front; |
| u8 holder[sizeof(adv->id) + |
| sizeof(adv->config_methods)]; |
| |
| /* This works even if front or back == 0 */ |
| WPA_PUT_LE32(holder, adv->id); |
| WPA_PUT_BE16(&holder[sizeof(adv->id)], |
| adv->config_methods); |
| wpabuf_put_data(tmp_buf, holder, front); |
| p2p_buf_update_ie_hdr(tmp_buf, tag_len); |
| tag_len = p2p_buf_add_ie_hdr(tmp_buf); |
| wpabuf_put_data(tmp_buf, &holder[front], back); |
| remaining = 255 - (sizeof(adv->id) + |
| sizeof(adv->config_methods)) - back; |
| } else { |
| wpabuf_put_le32(tmp_buf, adv->id); |
| wpabuf_put_be16(tmp_buf, adv->config_methods); |
| remaining -= (sizeof(adv->id) + |
| sizeof(adv->config_methods)); |
| } |
| |
| /* We are guaranteed at least one byte for svc_len */ |
| wpabuf_put_u8(tmp_buf, svc_len); |
| remaining -= sizeof(u8); |
| |
| if (remaining < svc_len) { |
| size_t front = remaining; |
| size_t back = svc_len - front; |
| |
| wpabuf_put_data(tmp_buf, adv->svc_name, front); |
| p2p_buf_update_ie_hdr(tmp_buf, tag_len); |
| tag_len = p2p_buf_add_ie_hdr(tmp_buf); |
| |
| /* In rare cases, we must split across 3 attributes */ |
| if (back > 255 - 4) { |
| wpabuf_put_data(tmp_buf, |
| &adv->svc_name[front], 255 - 4); |
| back -= 255 - 4; |
| front += 255 - 4; |
| p2p_buf_update_ie_hdr(tmp_buf, tag_len); |
| tag_len = p2p_buf_add_ie_hdr(tmp_buf); |
| } |
| |
| wpabuf_put_data(tmp_buf, &adv->svc_name[front], back); |
| remaining = 255 - 4 - back; |
| } else { |
| wpabuf_put_data(tmp_buf, adv->svc_name, svc_len); |
| remaining -= svc_len; |
| } |
| |
| /* adv_id config_methods svc_string */ |
| total_len += sizeof(u32) + sizeof(u16) + sizeof(u8) + svc_len; |
| } |
| |
| if (tag_len) |
| p2p_buf_update_ie_hdr(tmp_buf, tag_len); |
| |
| if (ie_len) |
| WPA_PUT_LE16(ie_len, (u16) total_len); |
| |
| wild_hash: |
| /* If all fit, return matching instances, otherwise the wildcard */ |
| if (total_len <= MAX_SVC_ADV_LEN) { |
| wpabuf_put_buf(buf, tmp_buf); |
| } else { |
| char *wild_card = P2PS_WILD_HASH_STR; |
| u8 wild_len; |
| |
| /* Insert wildcard instance */ |
| tag_len = p2p_buf_add_ie_hdr(buf); |
| wpabuf_put_u8(buf, P2P_ATTR_ADVERTISED_SERVICE); |
| ie_len = wpabuf_put(buf, sizeof(u16)); |
| |
| wild_len = (u8) os_strlen(wild_card); |
| wpabuf_put_le32(buf, 0); |
| wpabuf_put_be16(buf, 0); |
| wpabuf_put_u8(buf, wild_len); |
| wpabuf_put_data(buf, wild_card, wild_len); |
| |
| WPA_PUT_LE16(ie_len, 4 + 2 + 1 + wild_len); |
| p2p_buf_update_ie_hdr(buf, tag_len); |
| } |
| |
| wpabuf_free(tmp_buf); |
| } |
| |
| |
| void p2p_buf_add_session_id(struct wpabuf *buf, u32 id, const u8 *mac) |
| { |
| if (!buf || !mac) |
| return; |
| |
| /* Session ID Info */ |
| wpabuf_put_u8(buf, P2P_ATTR_SESSION_ID); |
| wpabuf_put_le16(buf, (u16) (sizeof(u32) + ETH_ALEN)); |
| wpabuf_put_le32(buf, id); |
| wpabuf_put_data(buf, mac, ETH_ALEN); |
| wpa_printf(MSG_DEBUG, "P2P: * Session ID Info (%x) " MACSTR, |
| id, MAC2STR(mac)); |
| } |
| |
| |
| void p2p_buf_add_feature_capability(struct wpabuf *buf, u16 len, const u8 *mask) |
| { |
| if (!buf || !len || !mask) |
| return; |
| |
| /* Feature Capability */ |
| wpabuf_put_u8(buf, P2P_ATTR_FEATURE_CAPABILITY); |
| wpabuf_put_le16(buf, len); |
| wpabuf_put_data(buf, mask, len); |
| wpa_printf(MSG_DEBUG, "P2P: * Feature Capability (%d)", len); |
| } |
| |
| |
| void p2p_buf_add_persistent_group_info(struct wpabuf *buf, const u8 *dev_addr, |
| const u8 *ssid, size_t ssid_len) |
| { |
| /* P2P Group ID */ |
| wpabuf_put_u8(buf, P2P_ATTR_PERSISTENT_GROUP); |
| wpabuf_put_le16(buf, ETH_ALEN + ssid_len); |
| wpabuf_put_data(buf, dev_addr, ETH_ALEN); |
| wpabuf_put_data(buf, ssid, ssid_len); |
| wpa_printf(MSG_DEBUG, "P2P: * P2P Group ID " MACSTR, |
| MAC2STR(dev_addr)); |
| } |
| |
| |
| static int p2p_add_wps_string(struct wpabuf *buf, enum wps_attribute attr, |
| const char *val) |
| { |
| size_t len; |
| |
| len = val ? os_strlen(val) : 0; |
| if (wpabuf_tailroom(buf) < 4 + len) |
| return -1; |
| wpabuf_put_be16(buf, attr); |
| #ifndef CONFIG_WPS_STRICT |
| if (len == 0) { |
| /* |
| * Some deployed WPS implementations fail to parse zeor-length |
| * attributes. As a workaround, send a space character if the |
| * device attribute string is empty. |
| */ |
| if (wpabuf_tailroom(buf) < 3) |
| return -1; |
| wpabuf_put_be16(buf, 1); |
| wpabuf_put_u8(buf, ' '); |
| return 0; |
| } |
| #endif /* CONFIG_WPS_STRICT */ |
| wpabuf_put_be16(buf, len); |
| if (val) |
| wpabuf_put_data(buf, val, len); |
| return 0; |
| } |
| |
| |
| int p2p_build_wps_ie(struct p2p_data *p2p, struct wpabuf *buf, int pw_id, |
| int all_attr) |
| { |
| u8 *len; |
| int i; |
| |
| if (wpabuf_tailroom(buf) < 6) |
| return -1; |
| wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC); |
| len = wpabuf_put(buf, 1); |
| wpabuf_put_be32(buf, WPS_DEV_OUI_WFA); |
| |
| if (wps_build_version(buf) < 0) |
| return -1; |
| |
| if (all_attr) { |
| if (wpabuf_tailroom(buf) < 5) |
| return -1; |
| wpabuf_put_be16(buf, ATTR_WPS_STATE); |
| wpabuf_put_be16(buf, 1); |
| wpabuf_put_u8(buf, WPS_STATE_NOT_CONFIGURED); |
| } |
| |
| if (pw_id >= 0) { |
| if (wpabuf_tailroom(buf) < 6) |
| return -1; |
| /* Device Password ID */ |
| wpabuf_put_be16(buf, ATTR_DEV_PASSWORD_ID); |
| wpabuf_put_be16(buf, 2); |
| wpa_printf(MSG_DEBUG, "P2P: WPS IE Device Password ID: %d", |
| pw_id); |
| wpabuf_put_be16(buf, pw_id); |
| } |
| |
| if (all_attr) { |
| if (wpabuf_tailroom(buf) < 5) |
| return -1; |
| wpabuf_put_be16(buf, ATTR_RESPONSE_TYPE); |
| wpabuf_put_be16(buf, 1); |
| wpabuf_put_u8(buf, WPS_RESP_ENROLLEE_INFO); |
| |
| if (wps_build_uuid_e(buf, p2p->cfg->uuid) < 0 || |
| p2p_add_wps_string(buf, ATTR_MANUFACTURER, |
| p2p->cfg->manufacturer) < 0 || |
| p2p_add_wps_string(buf, ATTR_MODEL_NAME, |
| p2p->cfg->model_name) < 0 || |
| p2p_add_wps_string(buf, ATTR_MODEL_NUMBER, |
| p2p->cfg->model_number) < 0 || |
| p2p_add_wps_string(buf, ATTR_SERIAL_NUMBER, |
| p2p->cfg->serial_number) < 0) |
| return -1; |
| |
| if (wpabuf_tailroom(buf) < 4 + WPS_DEV_TYPE_LEN) |
| return -1; |
| wpabuf_put_be16(buf, ATTR_PRIMARY_DEV_TYPE); |
| wpabuf_put_be16(buf, WPS_DEV_TYPE_LEN); |
| wpabuf_put_data(buf, p2p->cfg->pri_dev_type, WPS_DEV_TYPE_LEN); |
| |
| if (p2p_add_wps_string(buf, ATTR_DEV_NAME, p2p->cfg->dev_name) |
| < 0) |
| return -1; |
| |
| if (wpabuf_tailroom(buf) < 6) |
| return -1; |
| wpabuf_put_be16(buf, ATTR_CONFIG_METHODS); |
| wpabuf_put_be16(buf, 2); |
| wpabuf_put_be16(buf, p2p->cfg->config_methods); |
| } |
| |
| if (wps_build_wfa_ext(buf, 0, NULL, 0) < 0) |
| return -1; |
| |
| if (all_attr && p2p->cfg->num_sec_dev_types) { |
| if (wpabuf_tailroom(buf) < |
| 4 + WPS_DEV_TYPE_LEN * p2p->cfg->num_sec_dev_types) |
| return -1; |
| wpabuf_put_be16(buf, ATTR_SECONDARY_DEV_TYPE_LIST); |
| wpabuf_put_be16(buf, WPS_DEV_TYPE_LEN * |
| p2p->cfg->num_sec_dev_types); |
| wpabuf_put_data(buf, p2p->cfg->sec_dev_type, |
| WPS_DEV_TYPE_LEN * |
| p2p->cfg->num_sec_dev_types); |
| } |
| |
| /* Add the WPS vendor extensions */ |
| for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) { |
| if (p2p->wps_vendor_ext[i] == NULL) |
| break; |
| if (wpabuf_tailroom(buf) < |
| 4 + wpabuf_len(p2p->wps_vendor_ext[i])) |
| continue; |
| wpabuf_put_be16(buf, ATTR_VENDOR_EXT); |
| wpabuf_put_be16(buf, wpabuf_len(p2p->wps_vendor_ext[i])); |
| wpabuf_put_buf(buf, p2p->wps_vendor_ext[i]); |
| } |
| |
| p2p_buf_update_ie_hdr(buf, len); |
| |
| return 0; |
| } |