wifi-direct 流程

sniffer log: 

http://download.csdn.net/detail/myxmu/6346741

29 19:01:50.907508 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 213
30 19:01:50.911518 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 336
31 19:01:51.000118 802.11 Ack  CA:DD:C9:F2:0F:C3  6 14
32 19:01:51.010189 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 51
33 19:01:51.015564 802.11 Action CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 160
34 19:01:51.015578 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
35 19:01:51.063325 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 189
36 19:01:51.921102 802.11 Probe Rsp CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 349
37 19:01:51.921125 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
38 19:01:52.240110 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 CA:DD:C9:F2:0F:C3 6 193
39 19:01:52.243972 802.11 Action CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 148
40 19:01:52.243995 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
41 19:01:52.253126 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 CA:DD:C9:F2:0F:C3 6 111
42 19:01:52.280356 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 228
43 19:01:52.558074 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 228
44 19:01:52.566055 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 406
45 19:01:52.587744 802.11 Auth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 34
46 19:01:52.587762 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
47 19:01:52.588351 802.11 Auth 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 34
48 19:01:52.589104 802.11 Assoc Req CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 171
49 19:01:52.589119 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
50 19:01:52.616078 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 47
51 19:01:52.617200 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 76
52 19:01:52.617222 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
53 19:01:52.623121 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 56
54 19:01:52.714086 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 457
55 19:01:52.714110 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
56 19:01:52.832947 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 479
57 19:01:52.907312 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
58 19:01:52.907453 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 180
59 19:01:52.907478 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
60 19:01:52.922225 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 248
61 19:01:52.925349 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
62 19:01:52.925448 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 176
63 19:01:52.938077 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 176
64 19:01:52.941216 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
65 19:01:52.941232 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 176
66 19:01:52.941245 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
67 19:01:52.951467 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 272
68 19:01:52.954925 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
69 19:01:52.955053 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 116
70 19:01:52.955067 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
71 19:01:52.971357 EAP Failure 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 46
72 19:01:52.973495 802.11 Deauth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 30
73 19:01:52.973512 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
74 19:01:52.982749 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 225
75 19:01:52.991088 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 381
76 19:01:53.011950 802.11 Auth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 34
77 19:01:53.011975 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
78 19:01:53.022840 802.11 Assoc Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 193
79 19:01:53.049301 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
80 19:01:53.049799 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
81 19:01:53.050053 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
82 19:01:53.059328 EAPOL-Key CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 159
83 19:01:53.059359 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
84 19:01:53.066470 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 193
85 19:01:53.068333 EAPOL-Key CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 137
86 19:01:53.068350 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
87 19:01:53.195825 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14
88 19:01:53.195850 802.11 Encrypted Data CA:DD:C9:F2:0F:C3 33:33:00:00:00:02 02:08:22:30:8C:11 6 110
89 19:01:53.195864 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3  6 14

 

 

主要协议字段:

 

802.11 MAC Header

  Version:             [0 Mask 0x03]

  Type:                %00 Management [0]

  Subtype:             %1101 Action [0]

Frame Control Flags:    %00000000  [1]

                        0... .... Non-strict order

                        .0.. .... Non-Protected Frame

                        ..0. .... No More Data

                        ...0 .... Power Management - active mode

                        .... 0... This is not a Re-Transmission

                        .... .0.. Last or Unfragmented Frame

                        .... ..0. Not an Exit from the Distribution System

                        .... ...0 Not to the Distribution System

 

  Duration:            60 Microseconds [2-3]

  Destination:         02:08:22:30:8C:11 [0-5]

  Source:              CA:DD:C9:F2:0F:C3 [6-11]

  BSSID:               02:08:22:30:8C:11 [12-17]

  Seq Number:          2515 [18-19 Mask 0xFFF0]

  Frag Number:         [18 Mask 0x0F]

802.11 Management - Action

  Category Code:       Public Action [20]

  Action Code:         Vendor Specific [21]

  OUI:                 0x50-0x6F-0x9A Wi-Fi Alliance [22-24]

  Subtype:             [25]

  OUI Subtype:         GO Negotiation Request [26]

  Dialog Token:        [27]

Wi-Fi Direct

  Element ID:          221 Vendor Specific - Wi-Fi Alliance [28]

  Length:              95 [29]

  OUI:                 0x50-0x6F-0x9A Wi-Fi Alliance [30-32]

  OUI Type:            0x09 Wi-Fi Direct [33]

P2P Attribute

  ID:                  P2P Capability [34]

  Length:              [35-36]

Device Capability:      %00100100  [37]

                        xx.. .... Reserved

                        ..1. .... Processes Invitation Procedure

                        ...0 .... Device Limit not set

                        .... 0... Infrastructure Managed not set

                        .... .1.. Concurrent Operation supported

                        .... ..0. P2P Client Discovery not supported

                        .... ...0 Service Discovery not supported

 

Group Capability:       %00101010  [38]

                        x... .... Reserved

                        .0.. .... Group Formation - Not Owner

                        ..1. .... Persistent Reconnect supported

                        ...0 .... Cross Connection not supported

                        .... 1... Intra-BSS Distribution supported

                        .... .0.. P2P Group Limit not set

                        .... ..1. Persistent P2P Group set

                        .... ...0 P2P Group Owner not set

 

 

P2P Attribute

  ID:                  Group Owner Intent [39]

  Length:              [40-41]

GO Intent

  Intent:              [42 Mask 0xFE]

  Tie Breaker:         [42 Mask 0x01]

 

 

P2P Attribute

  ID:                  Configuration Timeout [43]

  Length:              [44-45]

  GO Config Timeout:   100 (1000 msec) [46]

  Client Config Timeout:20 (200 msec) [47]

 

P2P Attribute

  ID:                  Listen Channel [48]

  Length:              [49-50]

  Country String:      XX /0x04 [51-53]

  Operating Class:     81 [54]

  Channel Number:      [55]

 

P2P Attribute

  ID:                  Intended P2P Interface Address [56]

  Length:              [57-58]

  Interface Address:   CA:DD:C9:F2:0F:C3 [59-64]

 

P2P Attribute

  ID:                  11 Channel List [65]

  Length:              18 [66-67]

  Country String:      XX /0x04 [68-70]

  Operating Class:     81 [71]

  Channels:            13 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 [72-85]

 

P2P Attribute

  ID:                  13 P2P Device Info [86]

  Length:              28 [87-88]

  Device Address:      CA:DD:C9:F2:0F:C3 [89-94]

Config Methods:         0x0080  [95-96]

                        xxxx xxx. .... .... Reserved

                        .... ...0 .... .... Keypad: no

                        .... .... 1... .... Pushbutton: yes

                        .... .... .0.. .... NFC Interface: no

                        .... .... ..0. .... Integrated NFC Token: no

                        .... .... ...0 .... External NFC Token: no

                        .... .... .... 0... Display: no

                        .... .... .... .0.. Label: no

                        .... .... .... ..0. Ethernet: no

                        .... .... .... ...0 USBA (Flash Drive): no

 

  Category:             10  Telephone  [97-98]

  OUI:                 0x00-0x50-0xF2-0x04 [99-102]

  Sub Category ID:     [103-104]

 

  Secondary Device Types:[105]

  Device Name:         Android [110-116]

 

P2P Attribute

  ID:                  17 Operating Channel [117]

  Length:              [118-119]

  Country String:      XX /0x04 [120-122]

  Operating Class:     81 [123]

  Channel Number:      [124]

 

 

WPS

  Element ID:          221 WPS [125]

  Length:              25 [126]

  OUI:                 0x00-0x50-0xF2 Microsoft [127-129]

  OUI Type:            Wi-Fi Protected Setup [130]

  Version:             0x10 1.0 [135]

  Device Password ID:  0x0004 PushButton [140-141]

  Vendor Extension:    0x00372A000120 [146-151]

 

配置文件:

root@android:/etc/wifi # cat p2p_supplicant.conf
cat p2p_supplicant.conf
ctrl_interface=DIR=/data/misc/p2p_supplicant GROUP=wifi
update_config=1

uuid=12345678-9abc-def0-1234-56789abcdef0

manufacturer=MediaTek Inc.
device_name=Wireless Client
model_name=MTK Wireless Model
model_number=1.0
serial_number=1.0
device_type=10-0050F204-5
os_version=01020300
config_methods=display push_button keypad

  root@android:/ # cd data/misc/wifi/
cd data/misc/wifi/
root@android:/data/misc/wifi # cat p2p_supplicant.conf
cat p2p_supplicant.conf
ctrl_interface=/data/misc/wpa_supplicant
driver_param=use_p2p_group_interface=1
update_config=1
uuid=12345678-9abc-def0-1234-56789abcdef0
device_name=Android_ec1d
manufacturer=MediaTek Inc.
model_name=MTK Wireless Model
model_number=1.0
serial_number=1.0
device_type=10-0050F204-5
os_version=01020300
config_methods=virtual_push_button physical_display keypad
p2p_oper_reg_class=81
p2p_oper_channel=6
p2p_ssid_postfix=-Android_ec1d
persistent_reconnect=1

network={
        ssid="DIRECT-B1-Android"
        bssid=ca:dd:c9:f2:0f:c3
        psk=c7eb7cf9555d0687ed094715463045901d724847338f259da46bb356ab3923c2
        proto=RSN
        key_mgmt=WPA-PSK
        pairwise=CCMP
        auth_alg=OPEN
        disabled=2
}

 

主要代码:

 /**
 * A class representing a Wi-Fi P2p configuration for setting up a connection
 *
 * {@see WifiP2pManager}
 */
public class WifiP2pConfig implements Parcelable {

    /**
     * The device MAC address uniquely identifies a Wi-Fi p2p device
     */
    public String deviceAddress;

    /**
     * Wi-Fi Protected Setup information
     */
    public WpsInfo wps;

    /** @hide */
    public static final int MAX_GROUP_OWNER_INTENT = 15;
    /** @hide */
    public static final int MIN_GROUP_OWNER_INTENT = 0;

    /**
     * This is an integer value between 0 and 15 where 0 indicates the least
     * inclination to be a group owner and 15 indicates the highest inclination
     * to be a group owner.
     *
     * A value of -1 indicates the system can choose an appropriate value.
     */
    public int groupOwnerIntent = -1;

    /** @hide */
    public int netId = WifiP2pGroup.PERSISTENT_NET_ID;

    public WifiP2pConfig() {
        //set defaults
        wps = new WpsInfo();
        wps.setup = WpsInfo.PBC;
    }

  /** P2P-GO-NEG-REQUEST 42:fc:89:a8:96:09 dev_passwd_id=4 {@hide}*/
    public WifiP2pConfig(String supplicantEvent) throws IllegalArgumentException {
        String[] tokens = supplicantEvent.split(" ");

        if (tokens.length < 2 || !tokens[0].equals("P2P-GO-NEG-REQUEST")) {
            throw new IllegalArgumentException("Malformed supplicant event");
        }

        deviceAddress = tokens[1];
        wps = new WpsInfo();

        if (tokens.length > 2) {
            String[] nameVal = tokens[2].split("=");
            int devPasswdId;
            try {
                devPasswdId = Integer.parseInt(nameVal[1]);
            } catch (NumberFormatException e) {
                devPasswdId = 0;
            }
            //Based on definitions in wps/wps_defs.h
            switch (devPasswdId) {
                //DEV_PW_USER_SPECIFIED = 0x0001,
                case 0x01:
                    wps.setup = WpsInfo.DISPLAY;
                    break;
                //DEV_PW_PUSHBUTTON = 0x0004,
                case 0x04:
                    wps.setup = WpsInfo.PBC;
                    break;
                //DEV_PW_REGISTRAR_SPECIFIED = 0x0005
                case 0x05:
                    wps.setup = WpsInfo.KEYPAD;
                    break;
                default:
                    wps.setup = WpsInfo.PBC;
                    break;
            }
        }
    }


 

     private void notifyInvitationReceived() {
        Resources r = Resources.getSystem();
        final WpsInfo wps = mSavedPeerConfig.wps;
        final View textEntryView = LayoutInflater.from(mContext)
                .inflate(R.layout.wifi_p2p_dialog, null);

        ViewGroup group = (ViewGroup) textEntryView.findViewById(R.id.info);
        addRowToDialog(group, R.string.wifi_p2p_from_message, getDeviceName(
                mSavedPeerConfig.deviceAddress));

        final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin);

        AlertDialog dialog = new AlertDialog.Builder(mContext)
            .setTitle(r.getString(R.string.wifi_p2p_invitation_to_connect_title))
            .setView(textEntryView)
            .setPositiveButton(r.getString(R.string.accept), new OnClickListener() {
                        public void onClick(DialogInterface dialog, int which) {
                            if (wps.setup == WpsInfo.KEYPAD) {
                                mSavedPeerConfig.wps.pin = pin.getText().toString();
                            }
                            if (DBG) logd(getName() + " accept invitation " + mSavedPeerConfig);
                            sendMessage(PEER_CONNECTION_USER_ACCEPT);
                        }
                    })  


 

static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
         const u8 *data, size_t len, int rx_freq)
{
 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
  "P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
 wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);

 if (len < 1)
  return;

 switch (data[0]) {
 case P2P_GO_NEG_REQ:
  p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
  break;
 case P2P_GO_NEG_RESP:
  p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
  break;
 case P2P_GO_NEG_CONF:
  p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
  break;
 case P2P_INVITATION_REQ:
  p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
        rx_freq);
  break;
 case P2P_INVITATION_RESP:
  p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
  break;
 case P2P_PROV_DISC_REQ:
  p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
  break;
 case P2P_PROV_DISC_RESP:
  p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
  break;
 case P2P_DEV_DISC_REQ:
  p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
  break;
 case P2P_DEV_DISC_RESP:
  p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
  break;
 default:
  wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
   "P2P: Unsupported P2P Public Action frame type %d",
   data[0]);
  break;
 }
}

 

 android主要log:

 

 09-10 20:21:40.948  3757  3757 D wpa_supplicant: p2p0: Event RX_ACTION (21) received
09-10 20:21:40.948  3757  3757 D wpa_supplicant: p2p0: Received Action frame: SA=ca:dd:c9:f2:0f:c3 Category=4 DataLen=101 freq=2462 MHz
09-10 20:21:40.948  3757  3757 D wpa_supplicant: p2p0: P2P: RX P2P Public Action from ca:dd:c9:f2:0f:c3
09-10 20:21:40.948  3757  3757 D wpa_supplicant: p2p0: P2P: Received Invitation Request from ca:dd:c9:f2:0f:c3 (freq=2462)

09-10 20:21:40.952  3757  3757 D wpa_supplicant: p2p0: P2P: Action frame TX callback (state=8 freq=2462 dst=ca:dd:c9:f2:0f:c3 src=ca:dd:c9:79:0a:89 bssid=ca:dd:c9:79:0a:89 result=0
09-10 20:21:40.952  3757  3757 D wpa_supplicant: p2p0: P2P: Invitation ResponseTX callback: success=1
09-10 20:21:40.952  3757  3757 D wpa_supplicant: Off-channel: Action frame sequence done notification
09-10 20:21:40.952  3757  3757 D wpa_supplicant: nl80211: Cancel remain-on-channel with cookie 0x17d
09-10 20:21:40.952  3757  3757 D wpa_supplicant: P2P: Invitation from peer ca:dd:c9:f2:0f:c3 was rejected (status 8)

09-10 20:21:44.048   545   614 D WifiP2pService: WifiP2pService accept invitation
09-10 20:21:44.048   545   614 D WifiP2pService:  address: ca:dd:c9:f2:0f:c3
09-10 20:21:44.048   545   614 D WifiP2pService:  wps:  setup: 0
09-10 20:21:44.048   545   614 D WifiP2pService:  BSSID: null
09-10 20:21:44.048   545   614 D WifiP2pService:  pin: null
09-10 20:21:44.048   545   614 D WifiP2pService:
09-10 20:21:44.048   545   614 D WifiP2pService:  groupOwnerIntent: -1
09-10 20:21:44.048   545   614 D WifiP2pService:  persist: -2

 

09-10 20:21:44.079   545   614 D WifiCommon: [p2p0] SET "P2P_PEER ca:dd:c9:f2:0f:c3"
09-10 20:21:44.080  3757  3757 D wpa_supplicant: p2p0: Control interface command 'P2P_PEER ca:dd:c9:f2:0f:c3'
09-10 20:21:44.081   545   614 D WifiP2pService: target ssid is null join:false
09-10 20:21:44.081   545   614 D WifiP2pService: netId related with ca:dd:c9:f2:0f:c3 = -1
09-10 20:21:44.081   545   614 D WifiNative-p2p0: doBoolean: P2P_STOP_FIND
09-10 20:21:44.082   545   614 D WifiCommon: [p2p0] SET "P2P_STOP_FIND"
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: Control interface command 'P2P_STOP_FIND'
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: P2P: Stopping find
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=SEARCH)
09-10 20:21:44.082  3757  3757 I wpa_supplicant: p2p0: P2P-FIND-STOPPED
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: P2P: State SEARCH -> IDLE
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=IDLE)
09-10 20:21:44.082  3757  3757 D wpa_supplicant: p2p0: P2P: Clear drv_in_listen (2462)
09-10 20:21:44.082  3757  3757 D wpa_supplicant: nl80211: Cancel remain-on-channel with cookie 0x187
09-10 20:21:44.082   545  9671 D WifiCommon: [p2p0]GET "P2P-FIND-STOPPED "

 

09-10 20:21:44.085   545   614 D WifiNative-p2p0: doString: P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7
09-10 20:21:44.085   545   614 D WifiCommon: [p2p0] SET "P2P_CONNECTca:dd:c9:f2:0f:c3pbcpersistentgo_intent=7 "
09-10 20:21:44.085  3757  3757 D wpa_supplicant: p2p0: Control interface command 'P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 '

 

09-10 20:21:44.086  3757  3757 D wpa_supplicant: p2p0: P2P: Request to start group negotiation - peer=ca:dd:c9:f2:0f:c3  GO Intent=7  Intended Interface Address=ca:dd:c9:79:0a:89 wps_method=3 persistent_group=2 pd_before_go_neg=0 force_freq 2437
09-10 20:21:44.086  3757  3757 D wpa_supplicant: p2p0: Single channel list 6
09-10 20:21:44.086  3757  3757 D wpa_supplicant: p2p0: P2P: Own preference for operation channel: Operating Class 81 Channel 6 (forced)
09-10 20:21:44.086  3757  3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.086  3757  3757 D wpa_supplicant: P2P: * P2P IE header
09-10 20:21:44.086  3757  3757 D wpa_supplicant: P2P: * Capability dev=24 group=2a
09-10 20:21:44.086  3757  3757 D wpa_supplicant: P2P: * GO Intent: Intent 7 Tie breaker 1
09-10 20:21:44.086  3757  3757 D wpa_supplicant: P2P: * Configuration Timeout: GO 100 (*10ms)  client 20 (*10ms)
09-10 20:21:44.087  3757  3757 D wpa_supplicant: P2P: * Listen Channel: Regulatory Class 81 Channel 11
09-10 20:21:44.087  3757  3757 D wpa_supplicant: P2P: * Intended P2P Interface Address ca:dd:c9:79:0a:89
09-10 20:21:44.087  3757  3757 D wpa_supplicant: P2P: * Device Info
09-10 20:21:44.087  3757  3757 D wpa_supplicant: P2P: * Operating Channel: Regulatory Class 81 Channel 6
09-10 20:21:44.087  3757  3757 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
09-10 20:21:44.087  3757  3757 D wpa_supplicant: P2P: WPS IE Device Password ID: 4
09-10 20:21:44.087  3757  3757 D wpa_supplicant: WPS:  * Version2 (0x20)
09-10 20:21:44.087  3757  3757 D wpa_supplicant: p2p0: P2P: Sending GO Negotiation Request
09-10 20:21:44.087  3757  3757 D wpa_supplicant: p2p0: P2P: State IDLE -> CONNECT
09-10 20:21:44.087  3757  3757 D wpa_supplicant: Off-channel: Send action frame: freq=2437 dst=ca:dd:c9:f2:0f:c3 src=ca:dd:c9:79:0a:89 bssid=ca:dd:c9:f2:0f:c3 len=125

09-10 20:21:44.085   545   614 D WifiNative-p2p0: doString: P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7
09-10 20:21:44.085   545   614 D WifiCommon: [p2p0] SET "P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 "
09-10 20:21:44.085  3757  3757 D wpa_supplicant: p2p0: Control interface command 'P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 '

09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: Event RX_ACTION (21) received
09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: Received Action frame: SA=ca:dd:c9:f2:0f:c3 Category=4 DataLen=107 freq=2437 MHz
09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: P2P: RX P2P Public Action from ca:dd:c9:f2:0f:c3
09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: P2P: Received GO Negotiation Response from ca:dd:c9:f2:0f:c3 (freq=2437)
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Parsing the received message
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Parsing WPS IE
09-10 20:21:44.184  3757  3757 E wpa_supplicant: WPS: WFA subelement id=0 len=1
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Device Password ID: 4
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Parsing P2P IE
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 0 length 1
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Status: 0
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 2 length 2
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Device Capability 24 Group Capability 00
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 4 length 1
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * GO Intent: Intent 7 Tie breaker 0
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 5 length 2
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Configuration Timeout
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 9 length 6
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Intended P2P Interface Address: ca:dd:c9:f2:0f:c3
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 11 length 6
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Channel List: Country String 'XX(0x04)'
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: Attribute 13 length 28
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: * Device Info: addr ca:dd:c9:f2:0f:c3 primary device type 10-0050F204-5device name 'Android'config methods 0x80
09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: P2P: Own reg_classes 1 peer reg_classes 1 intersection reg_classes 1
09-10 20:21:44.184  3757  3757 D wpa_supplicant: p2p0: P2P: Peer using pushbutton
09-10 20:21:44.184  3757  3757 D wpa_supplicant: P2P: reg_class 81
09-10 20:21:44.186  3757  3757 D wpa_supplicant: p2p0: P2P: State CONNECT -> GO_NEG
09-10 20:21:44.186  3757  3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=GO_NEG)
09-10 20:21:44.186  3757  3757 D wpa_supplicant: p2p0: P2P: GO Negotiation with ca:dd:c9:f2:0f:c3
09-10 20:21:44.186  3757  3757 D wpa_supplicant: p2p0: P2P: Building GO Negotiation Confirm
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * P2P IE header
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * Status: 0
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * Capability dev=24 group=00
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * Operating Channel: Regulatory Class 81 Channel 6
09-10 20:21:44.186  3757  3757 D wpa_supplicant: P2P: * P2P Group ID ca:dd:c9:79:0a:89
09-10 20:21:44.186  3757  3757 D wpa_supplicant: p2p0: P2P: Sending GO Negotiation Confirm


09-10 20:21:44.188  3757  3757 D wpa_supplicant: p2p0: P2P: GO Negotiation with ca:dd:c9:f2:0f:c3 completed (local end will be GO)

09-10 20:21:44.190  3757  3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=GO_NEG)
09-10 20:21:44.190  3757  3757 D wpa_supplicant: p2p0: P2P: State GO_NEG -> PROVISIONING
09-10 20:21:44.190  3757  3757 I wpa_supplicant: p2p0: P2P-GO-NEG-SUCCESS
09-10 20:21:44.190  3757  3757 D wpa_supplicant: p2p0: P2P: Starting GO
09-10 20:21:44.190   545  9671 D WifiCommon: [p2p0]GET "P2P-GO-NEG-SUCCESS "

09-10 20:21:44.289  3757  3757 D wpa_supplicant: p2p0: P2P: Request scan (that will be skipped) to start GO)

09-10 20:21:44.289  3757  3757 D wpa_supplicant: Start a pre-selected network without scan step
 09-10 20:21:44.289  3757  3757 D wpa_supplicant: Setting up AP (SSID='DIRECT-af-Android_ec1d')
09-10 20:21:44.289  3757  3757 D wpa_supplicant: nl80211: Setup AP operations for P2P group (GO)
09-10 20:21:44.289  3757  3757 D wpa_supplicant: nl80211: Set mode ifindex 12 iftype 9 (P2P_GO)

 

09-10 20:21:44.402  3757  3757 D wpa_supplicant: p2p0: State: SCANNING -> COMPLETED
09-10 20:21:44.402  3757  3757 D wpa_supplicant: p2p0: Find the channel for p2p. wpa_s assoc_freq 2437 ifname p2p0
09-10 20:21:44.402  3757  3757 I wpa_supplicant: p2p0: CTRL-EVENT-CONNECTED - Connection to ca:dd:c9:79:0a:89 completed (auth) [id=0 id_str=]
09-10 20:21:44.402  3757  3757 D wpa_supplicant: wpa_driver_nl80211_set_operstate: operstate 1->1 (UP)
09-10 20:21:44.402  3757  3757 D wpa_supplicant: netlink: Operstate: linkmode=-1, operstate=6
09-10 20:21:44.402  3757  3757 D wpa_supplicant: P2P: Setting up WPS for GO provisioning
09-10 20:21:44.402   545  9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-CONNECTED - Connection to ca:dd:c9:79:0a:89 completed (auth) [id=0 id_str=]"
09-10 20:21:44.402  3757  3757 D wpa_supplicant: AP: Set MAC address filter: ca:dd:c9:f2:0f:c3
09-10 20:21:44.402  3757  3757 D wpa_supplicant: WPS: Button pushed - PBC mode started

 

09-10 20:21:44.904  3757  3757 D wpa_supplicant: WPS: Probe Request for PBC received from ca:dd:c9:f2:0f:c3
09-10 20:21:44.904  3757  3757 D wpa_supplicant: WPS: Checking active PBC sessions for overlap
09-10 20:21:44.904  3757  3757 D wpa_supplicant: WPS: Add one for the requested UUID
09-10 20:21:44.904  3757  3757 D wpa_supplicant: WPS: Consider PBC session with ca:dd:c9:f2:0f:c3
09-10 20:21:44.904  3757  3757 D wpa_supplicant: WPS: 1 active PBC session(s) found

09-10 20:21:44.998  3757  3757 D wpa_supplicant: STA included WPS IE in (Re)AssocReq
09-10 20:21:44.998  3757  3757 D wpa_supplicant:   New STA
09-10 20:21:44.998  3757  3757 D wpa_supplicant: ap_sta_add: register ap_handle_timer timeout for ca:dd:c9:f2:0f:c3 (300 seconds - ap_max_inactivity)
09-10 20:21:44.998  3757  3757 E wpa_supplicant: WPS: WFA subelement id=0 len=1
09-10 20:21:44.998  3757  3757 D wpa_supplicant: WPS: STA supports WPS 2.0
09-10 20:21:44.998  3757  3757 D wpa_supplicant: hostapd_logger: STA ca:dd:c9:f2:0f:c3 - start authentication
09-10 20:21:44.998  3757  3757 D wpa_supplicant: EAP: Server state machine created
09-10 20:21:44.998  3757  3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 BE_AUTH entering state IDLE
09-10 20:21:44.998  3757  3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 CTRL_DIR entering state FORCE_BOTH
09-10 20:21:44.998  3757  3757 D wpa_supplicant: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for ca:dd:c9:f2:0f:c3 (300 seconds - ap_max_inactivity)
09-10 20:21:44.999  3757  3757 D wpa_supplicant: WPS: Building WPS IE for (Re)Association Response
09-10 20:21:44.999  3757  3757 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
09-10 20:21:44.999  3757  3757 D wpa_supplicant: WPS:  * Response Type (3)
09-10 20:21:44.999  3757  3757 D wpa_supplicant: WPS:  * Version2 (0x20)
09-10 20:21:44.999  3757  3757 D wpa_supplicant: P2P: * P2P IE header

09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state INITIALIZE
09-10 20:21:45.001  3757  3757 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-STARTED ca:dd:c9:f2:0f:c3
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state SELECT_ACTION
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: getDecision: no identity known yet -> CONTINUE
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state PROPOSE_METHOD
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: getNextMethod: vendor 0 type 1
09-10 20:21:45.001  3757  3757 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state METHOD_REQUEST
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: building EAP-Request: Identifier 75
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state SEND_REQUEST
09-10 20:21:45.001   545  9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-EAP-STARTED ca:dd:c9:f2:0f:c3"
09-10 20:21:45.001  3757  3757 D wpa_supplicant: EAP: EAP entering state IDLE
09-10 20:21:45.002   545  9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1"
09-10 20:21:45.002   139   389 D SurfaceFlinger: postEvent(770, v/c=65286)
09-10 20:21:45.002  3757  3757 D wpa_supplicant: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
09-10 20:21:45.002   770   770 D DisplayEventReceiver: rev(0x69fffc70) w/ vsync, t=4156958911789, id=0, c=65286
09-10 20:21:45.002  3757  3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 AUTH_PAE entering state CONNECTING
09-10 20:21:45.002  3757  3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 AUTH_PAE entering state AUTHENTICATING
09-10 20:21:45.002  3757  3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 BE_AUTH entering state REQUEST

你可能感兴趣的:(wifi-direct 流程)