OSDN Git Service

am 89ca702e: Do not inform other virtual interfaces of scan results in all cases
[android-x86/external-wpa_supplicant_8.git] / wpa_supplicant / p2p_supplicant.c
index a0995fe..f8db14e 100644 (file)
@@ -2,14 +2,8 @@
  * wpa_supplicant - P2P
  * Copyright (c) 2009-2010, Atheros Communications
  *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 as
- * published by the Free Software Foundation.
- *
- * Alternatively, this software may be distributed under the terms of BSD
- * license.
- *
- * See README and COPYING for more details.
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
  */
 
 #include "includes.h"
@@ -22,6 +16,7 @@
 #include "wps/wps_i.h"
 #include "p2p/p2p.h"
 #include "ap/hostapd.h"
+#include "ap/ap_config.h"
 #include "ap/p2p_hostapd.h"
 #include "eapol_supp/eapol_supp_sm.h"
 #include "rsn_supp/wpa.h"
 #include "ap.h"
 #include "config_ssid.h"
 #include "config.h"
-#include "mlme.h"
 #include "notify.h"
 #include "scan.h"
 #include "bss.h"
+#include "offchannel.h"
 #include "wps_supplicant.h"
 #include "p2p_supplicant.h"
 
  */
 #define P2P_MAX_JOIN_SCAN_ATTEMPTS 10
 
+#define P2P_AUTO_PD_SCAN_ATTEMPTS 5
+
+#ifndef P2P_MAX_CLIENT_IDLE
+/*
+ * How many seconds to try to reconnect to the GO when connection in P2P client
+ * role has been lost.
+ */
+#ifdef ANDROID_P2P
+#define P2P_MAX_CLIENT_IDLE 20
+#else
+#define P2P_MAX_CLIENT_IDLE 10
+#endif /* ANDROID_P2P */
+#endif /* P2P_MAX_CLIENT_IDLE */
+
+#ifndef P2P_MAX_INITIAL_CONN_WAIT
+/*
+ * How many seconds to wait for initial 4-way handshake to get completed after
+ * WPS provisioning step.
+ */
+#define P2P_MAX_INITIAL_CONN_WAIT 10
+#endif /* P2P_MAX_INITIAL_CONN_WAIT */
+
+#ifndef P2P_CONCURRENT_SEARCH_DELAY
+#define P2P_CONCURRENT_SEARCH_DELAY 500
+#endif /* P2P_CONCURRENT_SEARCH_DELAY */
+
+enum p2p_group_removal_reason {
+       P2P_GROUP_REMOVAL_UNKNOWN,
+       P2P_GROUP_REMOVAL_SILENT,
+       P2P_GROUP_REMOVAL_FORMATION_FAILED,
+       P2P_GROUP_REMOVAL_REQUESTED,
+       P2P_GROUP_REMOVAL_IDLE_TIMEOUT,
+       P2P_GROUP_REMOVAL_UNAVAILABLE,
+       P2P_GROUP_REMOVAL_GO_ENDING_SESSION,
+#ifdef ANDROID_P2P
+       P2P_GROUP_REMOVAL_FREQ_CONFLICT
+#endif
+};
+
 
 static void wpas_p2p_long_listen_timeout(void *eloop_ctx, void *timeout_ctx);
 static struct wpa_supplicant *
 wpas_p2p_get_group_iface(struct wpa_supplicant *wpa_s, int addr_allocated,
                         int go);
 static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s);
+static void wpas_p2p_join_scan_req(struct wpa_supplicant *wpa_s, int freq);
 static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx);
 static int wpas_p2p_join(struct wpa_supplicant *wpa_s, const u8 *iface_addr,
-                        const u8 *dev_addr, enum p2p_wps_method wps_method);
+                        const u8 *dev_addr, enum p2p_wps_method wps_method,
+                        int auto_join);
+static void wpas_p2p_pd_before_join_timeout(void *eloop_ctx,
+                                           void *timeout_ctx);
 static int wpas_p2p_create_iface(struct wpa_supplicant *wpa_s);
 static void wpas_p2p_cross_connect_setup(struct wpa_supplicant *wpa_s);
 static void wpas_p2p_group_idle_timeout(void *eloop_ctx, void *timeout_ctx);
 static void wpas_p2p_set_group_idle_timeout(struct wpa_supplicant *wpa_s);
+static void wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
+                                       int group_added);
 
 
 static void wpas_p2p_scan_res_handler(struct wpa_supplicant *wpa_s,
@@ -85,17 +125,31 @@ static void wpas_p2p_scan_res_handler(struct wpa_supplicant *wpa_s,
 
 static int wpas_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
                         unsigned int num_req_dev_types,
-                        const u8 *req_dev_types)
+                        const u8 *req_dev_types, const u8 *dev_id, u16 pw_id)
 {
        struct wpa_supplicant *wpa_s = ctx;
+       struct wpa_supplicant *ifs;
        struct wpa_driver_scan_params params;
        int ret;
        struct wpabuf *wps_ie, *ies;
        int social_channels[] = { 2412, 2437, 2462, 0, 0 };
+       size_t ielen;
 
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
 
+       for (ifs = wpa_s->global->ifaces; ifs; ifs = ifs->next) {
+               if (ifs->sta_scan_pending &&
+                   wpas_p2p_in_progress(wpa_s) == 2) {
+                       wpa_printf(MSG_DEBUG, "Delaying P2P scan to allow "
+                                  "pending station mode scan to be "
+                                  "completed on interface %s", ifs->ifname);
+                       wpa_s->global->p2p_cb_on_scan_complete = 1;
+                       wpa_supplicant_req_scan(ifs, 0, 0);
+                       return 1;
+               }
+       }
+
        os_memset(&params, 0, sizeof(params));
 
        /* P2P Wildcard SSID */
@@ -104,13 +158,14 @@ static int wpas_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
        params.ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
 
        wpa_s->wps->dev.p2p = 1;
-       wps_ie = wps_build_probe_req_ie(0, &wpa_s->wps->dev, wpa_s->wps->uuid,
-                                       WPS_REQ_ENROLLEE,
+       wps_ie = wps_build_probe_req_ie(pw_id, &wpa_s->wps->dev,
+                                       wpa_s->wps->uuid, WPS_REQ_ENROLLEE,
                                        num_req_dev_types, req_dev_types);
        if (wps_ie == NULL)
                return -1;
 
-       ies = wpabuf_alloc(wpabuf_len(wps_ie) + 100);
+       ielen = p2p_scan_ie_buf_len(wpa_s->global->p2p);
+       ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
        if (ies == NULL) {
                wpabuf_free(wps_ie);
                return -1;
@@ -118,8 +173,9 @@ static int wpas_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
        wpabuf_put_buf(ies, wps_ie);
        wpabuf_free(wps_ie);
 
-       p2p_scan_ie(wpa_s->global->p2p, ies);
+       p2p_scan_ie(wpa_s->global->p2p, ies, dev_id);
 
+       params.p2p_probe = 1;
        params.extra_ies = wpabuf_head(ies);
        params.extra_ies_len = wpabuf_len(ies);
 
@@ -140,37 +196,24 @@ static int wpas_p2p_scan(void *ctx, enum p2p_scan_type type, int freq,
                break;
        }
 
-       wpa_s->scan_res_handler = wpas_p2p_scan_res_handler;
-       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
-               ret = ieee80211_sta_req_scan(wpa_s, &params);
-       else
-               ret = wpa_drv_scan(wpa_s, &params);
+       ret = wpa_drv_scan(wpa_s, &params);
 
        wpabuf_free(ies);
 
-       return ret;
-}
-
-
-#ifdef CONFIG_CLIENT_MLME
-static void p2p_rx_action_mlme(void *ctx, const u8 *buf, size_t len, int freq)
-{
-       struct wpa_supplicant *wpa_s = ctx;
-       const struct ieee80211_mgmt *mgmt;
-       size_t hdr_len;
+       if (ret) {
+               for (ifs = wpa_s->global->ifaces; ifs; ifs = ifs->next) {
+                       if (ifs->scanning ||
+                           ifs->scan_res_handler == wpas_p2p_scan_res_handler) {
+                               wpa_s->global->p2p_cb_on_scan_complete = 1;
+                               ret = 1;
+                               break;
+                       }
+               }
+       } else
+               wpa_s->scan_res_handler = wpas_p2p_scan_res_handler;
 
-       if (wpa_s->global->p2p == NULL || wpa_s->global->p2p_disabled)
-               return;
-       mgmt = (const struct ieee80211_mgmt *) buf;
-       hdr_len = (const u8 *) &mgmt->u.action.u.vs_public_action.action - buf;
-       if (hdr_len > len)
-               return;
-       p2p_rx_action(wpa_s->global->p2p, mgmt->da, mgmt->sa, mgmt->bssid,
-                     mgmt->u.action.category,
-                     &mgmt->u.action.u.vs_public_action.action,
-                     len - hdr_len, freq);
+       return ret;
 }
-#endif /* CONFIG_CLIENT_MLME */
 
 
 static enum wpa_driver_if_type wpas_p2p_if_type(int p2p_group_interface)
@@ -213,14 +256,13 @@ static struct wpa_supplicant * wpas_get_p2p_group(struct wpa_supplicant *wpa_s,
 }
 
 
-static void wpas_p2p_group_delete(struct wpa_supplicant *wpa_s)
+static int wpas_p2p_group_delete(struct wpa_supplicant *wpa_s,
+                                enum p2p_group_removal_reason removal_reason)
 {
        struct wpa_ssid *ssid;
        char *gtype;
        const char *reason;
 
-       eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
-
        ssid = wpa_s->current_ssid;
        if (ssid == NULL) {
                /*
@@ -235,6 +277,13 @@ static void wpas_p2p_group_delete(struct wpa_supplicant *wpa_s)
                                break;
                        ssid = ssid->next;
                }
+               if (ssid == NULL &&
+                       wpa_s->p2p_group_interface == NOT_P2P_GROUP_INTERFACE)
+               {
+                       wpa_printf(MSG_ERROR, "P2P: P2P group interface "
+                                  "not found");
+                       return -1;
+               }
        }
        if (wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_GO)
                gtype = "GO";
@@ -253,24 +302,41 @@ static void wpas_p2p_group_delete(struct wpa_supplicant *wpa_s)
                        P2P_EVENT_CROSS_CONNECT_DISABLE "%s %s",
                        wpa_s->ifname, wpa_s->cross_connect_uplink);
        }
-       switch (wpa_s->removal_reason) {
+       switch (removal_reason) {
        case P2P_GROUP_REMOVAL_REQUESTED:
                reason = " reason=REQUESTED";
                break;
+       case P2P_GROUP_REMOVAL_FORMATION_FAILED:
+               reason = " reason=FORMATION_FAILED";
+               break;
        case P2P_GROUP_REMOVAL_IDLE_TIMEOUT:
                reason = " reason=IDLE";
                break;
        case P2P_GROUP_REMOVAL_UNAVAILABLE:
                reason = " reason=UNAVAILABLE";
                break;
+       case P2P_GROUP_REMOVAL_GO_ENDING_SESSION:
+               reason = " reason=GO_ENDING_SESSION";
+               break;
+#ifdef ANDROID_P2P
+       case P2P_GROUP_REMOVAL_FREQ_CONFLICT:
+               reason = " reason=FREQ_CONFLICT";
+               break;
+#endif
        default:
                reason = "";
                break;
        }
-       wpa_msg(wpa_s->parent, MSG_INFO, P2P_EVENT_GROUP_REMOVED "%s %s%s",
-               wpa_s->ifname, gtype, reason);
+       if (removal_reason != P2P_GROUP_REMOVAL_SILENT) {
+               wpa_msg(wpa_s->parent, MSG_INFO,
+                       P2P_EVENT_GROUP_REMOVED "%s %s%s",
+                       wpa_s->ifname, gtype, reason);
+       }
 
-       if (ssid)
+       if (eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
+               wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
+
+       if (removal_reason != P2P_GROUP_REMOVAL_SILENT && ssid)
                wpas_notify_p2p_group_removed(wpa_s, ssid, gtype);
 
        if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE) {
@@ -287,7 +353,7 @@ static void wpas_p2p_group_delete(struct wpa_supplicant *wpa_s)
                if (wpa_s && ifname)
                        wpa_drv_if_remove(wpa_s, type, ifname);
                os_free(ifname);
-               return;
+               return 1;
        }
 
        wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network");
@@ -311,11 +377,17 @@ static void wpas_p2p_group_delete(struct wpa_supplicant *wpa_s)
                 */
                wpa_config_remove_network(wpa_s->conf, id);
                wpa_supplicant_clear_status(wpa_s);
+               wpa_supplicant_cancel_sched_scan(wpa_s);
        } else {
                wpa_printf(MSG_DEBUG, "P2P: Temporary group network not "
                           "found");
        }
-       wpa_supplicant_ap_deinit(wpa_s);
+       if (wpa_s->ap_iface)
+               wpa_supplicant_ap_deinit(wpa_s);
+       else
+               wpa_drv_deinit_p2p_cli(wpa_s);
+
+       return 0;
 }
 
 
@@ -467,6 +539,76 @@ static int wpas_p2p_store_persistent_group(struct wpa_supplicant *wpa_s,
 }
 
 
+static void wpas_p2p_add_persistent_group_client(struct wpa_supplicant *wpa_s,
+                                                const u8 *addr)
+{
+       struct wpa_ssid *ssid, *s;
+       u8 *n;
+       size_t i;
+       int found = 0;
+
+       ssid = wpa_s->current_ssid;
+       if (ssid == NULL || ssid->mode != WPAS_MODE_P2P_GO ||
+           !ssid->p2p_persistent_group)
+               return;
+
+       for (s = wpa_s->parent->conf->ssid; s; s = s->next) {
+               if (s->disabled != 2 || s->mode != WPAS_MODE_P2P_GO)
+                       continue;
+
+               if (s->ssid_len == ssid->ssid_len &&
+                   os_memcmp(s->ssid, ssid->ssid, s->ssid_len) == 0)
+                       break;
+       }
+
+       if (s == NULL)
+               return;
+
+       for (i = 0; s->p2p_client_list && i < s->num_p2p_clients; i++) {
+               if (os_memcmp(s->p2p_client_list + i * ETH_ALEN, addr,
+                             ETH_ALEN) != 0)
+                       continue;
+
+               if (i == s->num_p2p_clients - 1)
+                       return; /* already the most recent entry */
+
+               /* move the entry to mark it most recent */
+               os_memmove(s->p2p_client_list + i * ETH_ALEN,
+                          s->p2p_client_list + (i + 1) * ETH_ALEN,
+                          (s->num_p2p_clients - i - 1) * ETH_ALEN);
+               os_memcpy(s->p2p_client_list +
+                         (s->num_p2p_clients - 1) * ETH_ALEN, addr, ETH_ALEN);
+               found = 1;
+               break;
+       }
+
+       if (!found && s->num_p2p_clients < P2P_MAX_STORED_CLIENTS) {
+               n = os_realloc_array(s->p2p_client_list,
+                                    s->num_p2p_clients + 1, ETH_ALEN);
+               if (n == NULL)
+                       return;
+               os_memcpy(n + s->num_p2p_clients * ETH_ALEN, addr, ETH_ALEN);
+               s->p2p_client_list = n;
+               s->num_p2p_clients++;
+       } else if (!found) {
+               /* Not enough room for an additional entry - drop the oldest
+                * entry */
+               os_memmove(s->p2p_client_list,
+                          s->p2p_client_list + ETH_ALEN,
+                          (s->num_p2p_clients - 1) * ETH_ALEN);
+               os_memcpy(s->p2p_client_list +
+                         (s->num_p2p_clients - 1) * ETH_ALEN,
+                         addr, ETH_ALEN);
+       }
+
+#ifndef CONFIG_NO_CONFIG_WRITE
+       if (wpa_s->parent->conf->update_config &&
+           wpa_config_write(wpa_s->parent->confname, wpa_s->parent->conf))
+               wpa_printf(MSG_DEBUG, "P2P: Failed to update configuration");
+#endif /* CONFIG_NO_CONFIG_WRITE */
+}
+
+
 static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
                                           int success)
 {
@@ -490,7 +632,8 @@ static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
        if (!success) {
                wpa_msg(wpa_s->parent, MSG_INFO,
                        P2P_EVENT_GROUP_FORMATION_FAILURE);
-               wpas_p2p_group_delete(wpa_s);
+               wpas_p2p_group_delete(wpa_s,
+                                     P2P_GROUP_REMOVAL_FORMATION_FAILED);
                return;
        }
 
@@ -509,15 +652,8 @@ static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
                client = ssid->mode == WPAS_MODE_INFRA;
                if (ssid->mode == WPAS_MODE_P2P_GO) {
                        persistent = ssid->p2p_persistent_group;
-#ifndef ANDROID_BRCM_P2P_PATCH
-                       os_memcpy(go_dev_addr, wpa_s->parent->own_addr,
-                                 ETH_ALEN);
-#else
-                       /* P2P_ADDR: Use p2p_dev_addr instead of own mac addr */
                        os_memcpy(go_dev_addr, wpa_s->global->p2p_dev_addr,
                                  ETH_ALEN);
-
-#endif
                } else
                        persistent = wpas_p2p_persistent_group(wpa_s,
                                                               go_dev_addr,
@@ -538,6 +674,13 @@ static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
                 * packets.
                 */
                wpa_s->show_group_started = 1;
+#ifdef ANDROID_P2P
+               /* For client Second phase of Group formation (4-way handshake) can be still pending
+                * So we need to restore wpa_s->global->p2p_group_formation */
+               wpa_printf(MSG_INFO, "Restoring back wpa_s->global->p2p_group_formation to wpa_s %p\n", wpa_s);
+               wpa_s->global->p2p_group_formation = wpa_s;
+#endif
+
        } else if (ssid && ssid->passphrase == NULL && ssid->psk_set) {
                char psk[65];
                wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32);
@@ -564,165 +707,57 @@ static void wpas_group_formation_completed(struct wpa_supplicant *wpa_s,
        if (persistent)
                network_id = wpas_p2p_store_persistent_group(wpa_s->parent,
                                                             ssid, go_dev_addr);
-       if (network_id < 0)
+       if (network_id < 0 && ssid)
                network_id = ssid->id;
        if (!client)
                wpas_notify_p2p_group_started(wpa_s, ssid, network_id, 0);
 }
 
 
-static struct wpa_supplicant *
-wpas_get_tx_interface(struct wpa_supplicant *wpa_s, const u8 *src)
-{
-       struct wpa_supplicant *iface;
-
-       if (os_memcmp(src, wpa_s->own_addr, ETH_ALEN) == 0)
-               return wpa_s;
-
-       /*
-        * Try to find a group interface that matches with the source address.
-        */
-       iface = wpa_s->global->ifaces;
-       while (iface) {
-               if (os_memcmp(wpa_s->pending_action_src,
-                             iface->own_addr, ETH_ALEN) == 0)
-                       break;
-               iface = iface->next;
-       }
-       if (iface) {
-               wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
-                          "instead of interface %s for Action TX",
-                          iface->ifname, wpa_s->ifname);
-               return iface;
-       }
-
-       return wpa_s;
-}
-
-
-static void wpas_send_action_cb(void *eloop_ctx, void *timeout_ctx)
+static void wpas_p2p_send_action_tx_status(struct wpa_supplicant *wpa_s,
+                                          unsigned int freq,
+                                          const u8 *dst, const u8 *src,
+                                          const u8 *bssid,
+                                          const u8 *data, size_t data_len,
+                                          enum offchannel_send_action_result
+                                          result)
 {
-       struct wpa_supplicant *wpa_s = eloop_ctx;
-       struct wpa_supplicant *iface;
-       int res;
-       int without_roc;
-
-       without_roc = wpa_s->pending_action_without_roc;
-       wpa_s->pending_action_without_roc = 0;
-       wpa_printf(MSG_DEBUG, "P2P: Send Action callback (without_roc=%d "
-                  "pending_action_tx=%p)",
-                  without_roc, wpa_s->pending_action_tx);
+       enum p2p_send_action_result res = P2P_SEND_ACTION_SUCCESS;
 
-       if (wpa_s->pending_action_tx == NULL)
-               return;
-
-       /*
-        * This call is likely going to be on the P2P device instance if the
-        * driver uses a separate interface for that purpose. However, some
-        * Action frames are actually sent within a P2P Group and when that is
-        * the case, we need to follow power saving (e.g., GO buffering the
-        * frame for a client in PS mode or a client following the advertised
-        * NoA from its GO). To make that easier for the driver, select the
-        * correct group interface here.
-        */
-       iface = wpas_get_tx_interface(wpa_s, wpa_s->pending_action_src);
-
-       if (wpa_s->off_channel_freq != wpa_s->pending_action_freq &&
-           wpa_s->pending_action_freq != 0 &&
-           wpa_s->pending_action_freq != iface->assoc_freq) {
-               wpa_printf(MSG_DEBUG, "P2P: Pending Action frame TX "
-                          "waiting for another freq=%u (off_channel_freq=%u "
-                          "assoc_freq=%u)",
-                          wpa_s->pending_action_freq,
-                          wpa_s->off_channel_freq,
-                          iface->assoc_freq);
-               if (without_roc && wpa_s->off_channel_freq == 0) {
-                       /*
-                        * We may get here if wpas_send_action() found us to be
-                        * on the correct channel, but remain-on-channel cancel
-                        * event was received before getting here.
-                        */
-                       wpa_printf(MSG_DEBUG, "P2P: Schedule "
-                                  "remain-on-channel to send Action frame");
-                       if (wpa_drv_remain_on_channel(
-                                   wpa_s, wpa_s->pending_action_freq, 200) <
-                           0) {
-                               wpa_printf(MSG_DEBUG, "P2P: Failed to request "
-                                          "driver to remain on channel (%u "
-                                          "MHz) for Action Frame TX",
-                                          wpa_s->pending_action_freq);
-                       } else {
-                               wpa_s->off_channel_freq = 0;
-                               wpa_s->roc_waiting_drv_freq =
-                                       wpa_s->pending_action_freq;
-                       }
-               }
-               return;
-       }
-
-       wpa_printf(MSG_DEBUG, "P2P: Sending pending Action frame to "
-                  MACSTR " using interface %s",
-                  MAC2STR(wpa_s->pending_action_dst), iface->ifname);
-       res = wpa_drv_send_action(iface, wpa_s->pending_action_freq, 0,
-                                 wpa_s->pending_action_dst,
-                                 wpa_s->pending_action_src,
-                                 wpa_s->pending_action_bssid,
-                                 wpabuf_head(wpa_s->pending_action_tx),
-                                 wpabuf_len(wpa_s->pending_action_tx));
-       if (res) {
-               wpa_printf(MSG_DEBUG, "P2P: Failed to send the pending "
-                          "Action frame");
-               /*
-                * Use fake TX status event to allow P2P state machine to
-                * continue.
-                */
-               wpas_send_action_tx_status(
-                       wpa_s, wpa_s->pending_action_dst,
-                       wpabuf_head(wpa_s->pending_action_tx),
-                       wpabuf_len(wpa_s->pending_action_tx),
-                       P2P_SEND_ACTION_FAILED);
-       }
-}
-
-
-void wpas_send_action_tx_status(struct wpa_supplicant *wpa_s, const u8 *dst,
-                               const u8 *data, size_t data_len,
-                               enum p2p_send_action_result result)
-{
        if (wpa_s->global->p2p == NULL || wpa_s->global->p2p_disabled)
                return;
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
                return;
 
-       if (wpa_s->pending_action_tx == NULL) {
-               wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - no "
-                          "pending operation");
-               return;
-       }
-
-       if (os_memcmp(dst, wpa_s->pending_action_dst, ETH_ALEN) != 0) {
-               wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - unknown "
-                          "destination address");
-               return;
+       switch (result) {
+       case OFFCHANNEL_SEND_ACTION_SUCCESS:
+               res = P2P_SEND_ACTION_SUCCESS;
+               break;
+       case OFFCHANNEL_SEND_ACTION_NO_ACK:
+               res = P2P_SEND_ACTION_NO_ACK;
+               break;
+       case OFFCHANNEL_SEND_ACTION_FAILED:
+               res = P2P_SEND_ACTION_FAILED;
+               break;
        }
 
-       wpabuf_free(wpa_s->pending_action_tx);
-       wpa_s->pending_action_tx = NULL;
-
-       p2p_send_action_cb(wpa_s->global->p2p, wpa_s->pending_action_freq,
-                          wpa_s->pending_action_dst,
-                          wpa_s->pending_action_src,
-                          wpa_s->pending_action_bssid,
-                          result);
+       p2p_send_action_cb(wpa_s->global->p2p, freq, dst, src, bssid, res);
 
-       if (wpa_s->pending_pd_before_join &&
-           (os_memcmp(wpa_s->pending_action_dst, wpa_s->pending_join_dev_addr,
-                      ETH_ALEN) == 0 ||
-            os_memcmp(wpa_s->pending_action_dst,
-                      wpa_s->pending_join_iface_addr, ETH_ALEN) == 0)) {
+       if (result != OFFCHANNEL_SEND_ACTION_SUCCESS &&
+           wpa_s->pending_pd_before_join &&
+           (os_memcmp(dst, wpa_s->pending_join_dev_addr, ETH_ALEN) == 0 ||
+            os_memcmp(dst, wpa_s->pending_join_iface_addr, ETH_ALEN) == 0)) {
                wpa_s->pending_pd_before_join = 0;
+               if (wpa_s->p2p_fallback_to_go_neg) {
+                       wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No ACK for PD Req "
+                               "during p2p_connect-auto");
+                       wpas_p2p_fallback_to_go_neg(wpa_s, 0);
+                       return;
+               }
+
                wpa_printf(MSG_DEBUG, "P2P: Starting pending "
-                          "join-existing-group operation");
+                          "join-existing-group operation (no ACK for PD "
+                          "Req)");
                wpas_p2p_join_start(wpa_s);
        }
 }
@@ -733,104 +768,16 @@ static int wpas_send_action(void *ctx, unsigned int freq, const u8 *dst,
                            size_t len, unsigned int wait_time)
 {
        struct wpa_supplicant *wpa_s = ctx;
-
-       wpa_printf(MSG_DEBUG, "P2P: Send action frame: freq=%d dst=" MACSTR
-                  " src=" MACSTR " bssid=" MACSTR " len=%d",
-                  freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid),
-                  (int) len);
-
-       if (wpa_s->pending_action_tx) {
-               wpa_printf(MSG_DEBUG, "P2P: Dropped pending Action frame TX "
-                          "to " MACSTR, MAC2STR(wpa_s->pending_action_dst));
-               wpabuf_free(wpa_s->pending_action_tx);
-       }
-       wpa_s->pending_action_tx = wpabuf_alloc(len);
-       if (wpa_s->pending_action_tx == NULL) {
-               wpa_printf(MSG_DEBUG, "P2P: Failed to allocate Action frame "
-                          "TX buffer (len=%llu)", (unsigned long long) len);
-               return -1;
-       }
-       wpabuf_put_data(wpa_s->pending_action_tx, buf, len);
-       os_memcpy(wpa_s->pending_action_src, src, ETH_ALEN);
-       os_memcpy(wpa_s->pending_action_dst, dst, ETH_ALEN);
-       os_memcpy(wpa_s->pending_action_bssid, bssid, ETH_ALEN);
-       wpa_s->pending_action_freq = freq;
-
-       if (freq != 0 && wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) {
-               struct wpa_supplicant *iface;
-
-               iface = wpas_get_tx_interface(wpa_s, wpa_s->pending_action_src);
-               wpa_s->action_tx_wait_time = wait_time;
-
-               return wpa_drv_send_action(iface, wpa_s->pending_action_freq,
-                                       wait_time, wpa_s->pending_action_dst,
-                                       wpa_s->pending_action_src,
-                                       wpa_s->pending_action_bssid,
-                                       wpabuf_head(wpa_s->pending_action_tx),
-                                       wpabuf_len(wpa_s->pending_action_tx));
-       }
-
-       if (freq) {
-               struct wpa_supplicant *tx_iface;
-               tx_iface = wpas_get_tx_interface(wpa_s, src);
-               if (tx_iface->assoc_freq == freq) {
-                       wpa_printf(MSG_DEBUG, "P2P: Already on requested "
-                                  "channel (TX interface operating channel)");
-                       freq = 0;
-               }
-       }
-
-       if (wpa_s->off_channel_freq == freq || freq == 0) {
-               wpa_printf(MSG_DEBUG, "P2P: Already on requested channel; "
-                          "send Action frame immediately");
-               /* TODO: Would there ever be need to extend the current
-                * duration on the channel? */
-               wpa_s->pending_action_without_roc = 1;
-               eloop_cancel_timeout(wpas_send_action_cb, wpa_s, NULL);
-               eloop_register_timeout(0, 0, wpas_send_action_cb, wpa_s, NULL);
-               return 0;
-       }
-       wpa_s->pending_action_without_roc = 0;
-
-       if (wpa_s->roc_waiting_drv_freq == freq) {
-               wpa_printf(MSG_DEBUG, "P2P: Already waiting for driver to get "
-                          "to frequency %u MHz; continue waiting to send the "
-                          "Action frame", freq);
-               return 0;
-       }
-
-       wpa_printf(MSG_DEBUG, "P2P: Schedule Action frame to be transmitted "
-                  "once the driver gets to the requested channel");
-       if (wait_time > wpa_s->max_remain_on_chan)
-               wait_time = wpa_s->max_remain_on_chan;
-       if (wpa_drv_remain_on_channel(wpa_s, freq, wait_time) < 0) {
-               wpa_printf(MSG_DEBUG, "P2P: Failed to request driver "
-                          "to remain on channel (%u MHz) for Action "
-                          "Frame TX", freq);
-               return -1;
-       }
-       wpa_s->off_channel_freq = 0;
-       wpa_s->roc_waiting_drv_freq = freq;
-
-       return 0;
+       return offchannel_send_action(wpa_s, freq, dst, src, bssid, buf, len,
+                                     wait_time,
+                                     wpas_p2p_send_action_tx_status, 1);
 }
 
 
 static void wpas_send_action_done(void *ctx)
 {
        struct wpa_supplicant *wpa_s = ctx;
-       wpa_printf(MSG_DEBUG, "P2P: Action frame sequence done notification");
-       wpabuf_free(wpa_s->pending_action_tx);
-       wpa_s->pending_action_tx = NULL;
-       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) {
-               if (wpa_s->action_tx_wait_time)
-                       wpa_drv_send_action_cancel_wait(wpa_s);
-               wpa_s->off_channel_freq = 0;
-       } else if (wpa_s->off_channel_freq || wpa_s->roc_waiting_drv_freq) {
-               wpa_drv_cancel_remain_on_channel(wpa_s);
-               wpa_s->off_channel_freq = 0;
-               wpa_s->roc_waiting_drv_freq = 0;
-       }
+       offchannel_send_action_done(wpa_s);
 }
 
 
@@ -887,22 +834,13 @@ static void p2p_go_configured(void *ctx, void *data)
                        wpa_ssid_txt(ssid->ssid, ssid->ssid_len),
                        ssid->frequency,
                        params->passphrase ? params->passphrase : "",
-#ifndef ANDROID_BRCM_P2P_PATCH
-                       MAC2STR(wpa_s->parent->own_addr),
-#else
-                       /* P2P_ADDR: use p2p_dev_addr instead of own addr */
                        MAC2STR(wpa_s->global->p2p_dev_addr),
-#endif
                        params->persistent_group ? " [PERSISTENT]" : "");
+
                if (params->persistent_group)
                        network_id = wpas_p2p_store_persistent_group(
                                wpa_s->parent, ssid,
-#ifndef ANDROID_BRCM_P2P_PATCH
-                               wpa_s->parent->own_addr);
-#else
-                               /* P2P_ADDR: Use p2p device address */
                                wpa_s->global->p2p_dev_addr);
-#endif
                if (network_id < 0)
                        network_id = ssid->id;
                wpas_notify_p2p_group_started(wpa_s, ssid, network_id, 0);
@@ -920,7 +858,7 @@ static void p2p_go_configured(void *ctx, void *data)
        }
        if (params->wps_method == WPS_PBC)
                wpa_supplicant_ap_wps_pbc(wpa_s, params->peer_interface_addr,
-                                         NULL);
+                                         params->peer_device_addr);
        else if (wpa_s->p2p_pin[0])
                wpa_supplicant_ap_wps_pin(wpa_s, params->peer_interface_addr,
                                          wpa_s->p2p_pin, NULL, 0);
@@ -942,6 +880,8 @@ static void wpas_start_wps_go(struct wpa_supplicant *wpa_s,
        if (ssid == NULL)
                return;
 
+       wpa_s->show_group_started = 0;
+
        wpa_config_set_network_defaults(ssid);
        ssid->temporary = 1;
        ssid->p2p_group = 1;
@@ -949,6 +889,7 @@ static void wpas_start_wps_go(struct wpa_supplicant *wpa_s,
        ssid->mode = group_formation ? WPAS_MODE_P2P_GROUP_FORMATION :
                WPAS_MODE_P2P_GO;
        ssid->frequency = params->freq;
+       ssid->ht40 = params->ht40;
        ssid->ssid = os_zalloc(params->ssid_len + 1);
        if (ssid->ssid) {
                os_memcpy(ssid->ssid, params->ssid, params->ssid_len);
@@ -959,6 +900,7 @@ static void wpas_start_wps_go(struct wpa_supplicant *wpa_s,
        ssid->proto = WPA_PROTO_RSN;
        ssid->pairwise_cipher = WPA_CIPHER_CCMP;
        ssid->passphrase = os_strdup(params->passphrase);
+       ssid->ap_max_inactivity = wpa_s->parent->conf->p2p_go_max_inactivity;
 
        wpa_s->ap_configured_cb = p2p_go_configured;
        wpa_s->ap_configured_cb_ctx = wpa_s;
@@ -995,6 +937,9 @@ static void wpas_p2p_clone_config(struct wpa_supplicant *dst,
 
        d->p2p_group_idle = s->p2p_group_idle;
        d->p2p_intra_bss = s->p2p_intra_bss;
+       d->persistent_reconnect = s->persistent_reconnect;
+       d->max_num_sta = s->max_num_sta;
+       d->pbc_in_m1 = s->pbc_in_m1;
 }
 
 
@@ -1138,13 +1083,30 @@ void wpas_go_neg_completed(void *ctx, struct p2p_go_neg_results *res)
        if (res->status) {
                wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_GO_NEG_FAILURE "status=%d",
                        res->status);
-               wpas_notify_p2p_go_neg_completed(wpa_s, res->status);
+               wpas_notify_p2p_go_neg_completed(wpa_s, res);
                wpas_p2p_remove_pending_group_interface(wpa_s);
                return;
        }
 
+       if (wpa_s->p2p_go_ht40)
+               res->ht40 = 1;
+
        wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_GO_NEG_SUCCESS);
-       wpas_notify_p2p_go_neg_completed(wpa_s, P2P_SC_SUCCESS);
+       wpas_notify_p2p_go_neg_completed(wpa_s, res);
+
+       if (res->role_go && wpa_s->p2p_persistent_id >= 0) {
+               struct wpa_ssid *ssid;
+               ssid = wpa_config_get_network(wpa_s->conf,
+                                             wpa_s->p2p_persistent_id);
+               if (ssid && ssid->disabled == 2 &&
+                   ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
+                       size_t len = os_strlen(ssid->passphrase);
+                       wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
+                                  "on requested persistent group");
+                       os_memcpy(res->passphrase, ssid->passphrase, len);
+                       res->passphrase[len] = '\0';
+               }
+       }
 
        if (wpa_s->create_p2p_iface) {
                struct wpa_supplicant *group_wpa_s =
@@ -1200,18 +1162,30 @@ void wpas_dev_found(void *ctx, const u8 *addr,
                    const struct p2p_peer_info *info,
                    int new_device)
 {
+#ifndef CONFIG_NO_STDOUT_DEBUG
        struct wpa_supplicant *wpa_s = ctx;
        char devtype[WPS_DEV_TYPE_BUFSIZE];
-
+#define WFD_DEV_INFO_SIZE 9
+       char wfd_dev_info_hex[2 * WFD_DEV_INFO_SIZE + 1];
+       os_memset(wfd_dev_info_hex, 0, sizeof(wfd_dev_info_hex));
+#ifdef CONFIG_WIFI_DISPLAY
+       if (info->wfd_subelems) {
+               wpa_snprintf_hex(wfd_dev_info_hex, sizeof(wfd_dev_info_hex),
+                                       wpabuf_head(info->wfd_subelems),
+                                       WFD_DEV_INFO_SIZE);
+       }
+#endif /* CONFIG_WIFI_DISPLAY */
        wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_DEVICE_FOUND MACSTR
                " p2p_dev_addr=" MACSTR
                " pri_dev_type=%s name='%s' config_methods=0x%x "
-               "dev_capab=0x%x group_capab=0x%x",
+               "dev_capab=0x%x group_capab=0x%x%s%s",
                MAC2STR(addr), MAC2STR(info->p2p_device_addr),
                wps_dev_type_bin2str(info->pri_dev_type, devtype,
                                     sizeof(devtype)),
                info->device_name, info->config_methods,
-               info->dev_capab, info->group_capab);
+               info->dev_capab, info->group_capab,
+               wfd_dev_info_hex[0] ? " wfd_dev_info=0x" : "", wfd_dev_info_hex);
+#endif /* CONFIG_NO_STDOUT_DEBUG */
 
        wpas_notify_p2p_device_found(ctx, info->p2p_device_addr, new_device);
 }
@@ -1220,10 +1194,10 @@ void wpas_dev_found(void *ctx, const u8 *addr,
 static void wpas_dev_lost(void *ctx, const u8 *dev_addr)
 {
        struct wpa_supplicant *wpa_s = ctx;
-#ifdef ANDROID_BRCM_P2P_PATCH
+
        wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_DEVICE_LOST
                "p2p_dev_addr=" MACSTR, MAC2STR(dev_addr));
-#endif
+
        wpas_notify_p2p_device_lost(wpa_s, dev_addr);
 }
 
@@ -1275,7 +1249,7 @@ static void wpas_stop_listen(void *ctx)
 static int wpas_send_probe_resp(void *ctx, const struct wpabuf *buf)
 {
        struct wpa_supplicant *wpa_s = ctx;
-       return wpa_drv_send_mlme(wpa_s, wpabuf_head(buf), wpabuf_len(buf));
+       return wpa_drv_send_mlme(wpa_s, wpabuf_head(buf), wpabuf_len(buf), 1);
 }
 
 
@@ -1544,6 +1518,62 @@ static void wpas_sd_req_upnp(struct wpa_supplicant *wpa_s,
 }
 
 
+#ifdef CONFIG_WIFI_DISPLAY
+static void wpas_sd_req_wfd(struct wpa_supplicant *wpa_s,
+                           struct wpabuf *resp, u8 srv_trans_id,
+                           const u8 *query, size_t query_len)
+{
+       const u8 *pos;
+       u8 role;
+       u8 *len_pos;
+
+       wpa_hexdump(MSG_DEBUG, "P2P: SD Request for WFD", query, query_len);
+
+       if (!wpa_s->global->wifi_display) {
+               wpa_printf(MSG_DEBUG, "P2P: WFD protocol not available");
+               wpas_sd_add_proto_not_avail(resp, P2P_SERV_WIFI_DISPLAY,
+                                           srv_trans_id);
+               return;
+       }
+
+       if (query_len < 1) {
+               wpa_printf(MSG_DEBUG, "P2P: Missing WFD Requested Device "
+                          "Role");
+               return;
+       }
+
+       if (wpabuf_tailroom(resp) < 5)
+               return;
+
+       pos = query;
+       role = *pos++;
+       wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role);
+
+       /* TODO: role specific handling */
+
+       /* Length (to be filled) */
+       len_pos = wpabuf_put(resp, 2);
+       wpabuf_put_u8(resp, P2P_SERV_WIFI_DISPLAY);
+       wpabuf_put_u8(resp, srv_trans_id);
+       wpabuf_put_u8(resp, P2P_SD_SUCCESS); /* Status Code */
+
+       while (pos < query + query_len) {
+               if (*pos < MAX_WFD_SUBELEMS &&
+                   wpa_s->global->wfd_subelem[*pos] &&
+                   wpabuf_tailroom(resp) >=
+                   wpabuf_len(wpa_s->global->wfd_subelem[*pos])) {
+                       wpa_printf(MSG_DEBUG, "P2P: Add WSD response "
+                                  "subelement %u", *pos);
+                       wpabuf_put_buf(resp, wpa_s->global->wfd_subelem[*pos]);
+               }
+               pos++;
+       }
+
+       WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
+}
+#endif /* CONFIG_WIFI_DISPLAY */
+
+
 void wpas_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
                     u16 update_indic, const u8 *tlvs, size_t tlvs_len)
 {
@@ -1570,8 +1600,11 @@ void wpas_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
                os_free(buf);
        }
 
-       if (wpa_s->p2p_sd_over_ctrl_iface)
+       if (wpa_s->p2p_sd_over_ctrl_iface) {
+               wpas_notify_p2p_sd_request(wpa_s, freq, sa, dialog_token,
+                                          update_indic, tlvs, tlvs_len);
                return; /* to be processed by an external program */
+       }
 
        resp = wpabuf_alloc(10000);
        if (resp == NULL)
@@ -1632,6 +1665,12 @@ void wpas_sd_request(void *ctx, int freq, const u8 *sa, u8 dialog_token,
                        wpas_sd_req_upnp(wpa_s, resp, srv_trans_id,
                                         pos, tlv_end - pos);
                        break;
+#ifdef CONFIG_WIFI_DISPLAY
+               case P2P_SERV_WIFI_DISPLAY:
+                       wpas_sd_req_wfd(wpa_s, resp, srv_trans_id,
+                                       pos, tlv_end - pos);
+                       break;
+#endif /* CONFIG_WIFI_DISPLAY */
                default:
                        wpa_printf(MSG_DEBUG, "P2P: Unavailable service "
                                   "protocol %u", srv_proto);
@@ -1718,26 +1757,26 @@ void wpas_sd_response(void *ctx, const u8 *sa, u16 update_indic,
 }
 
 
-void * wpas_p2p_sd_request(struct wpa_supplicant *wpa_s, const u8 *dst,
-                          const struct wpabuf *tlvs)
+u64 wpas_p2p_sd_request(struct wpa_supplicant *wpa_s, const u8 *dst,
+                       const struct wpabuf *tlvs)
 {
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
-               return (void *) wpa_drv_p2p_sd_request(wpa_s, dst, tlvs);
+               return wpa_drv_p2p_sd_request(wpa_s, dst, tlvs);
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
-               return NULL;
-       return p2p_sd_request(wpa_s->global->p2p, dst, tlvs);
+               return 0;
+       return (uintptr_t) p2p_sd_request(wpa_s->global->p2p, dst, tlvs);
 }
 
 
-void * wpas_p2p_sd_request_upnp(struct wpa_supplicant *wpa_s, const u8 *dst,
-                               u8 version, const char *query)
+u64 wpas_p2p_sd_request_upnp(struct wpa_supplicant *wpa_s, const u8 *dst,
+                            u8 version, const char *query)
 {
        struct wpabuf *tlvs;
-       void *ret;
+       u64 ret;
 
        tlvs = wpabuf_alloc(2 + 1 + 1 + 1 + os_strlen(query));
        if (tlvs == NULL)
-               return NULL;
+               return 0;
        wpabuf_put_le16(tlvs, 1 + 1 + 1 + os_strlen(query));
        wpabuf_put_u8(tlvs, P2P_SERV_UPNP); /* Service Protocol Type */
        wpabuf_put_u8(tlvs, 1); /* Service Transaction ID */
@@ -1749,13 +1788,96 @@ void * wpas_p2p_sd_request_upnp(struct wpa_supplicant *wpa_s, const u8 *dst,
 }
 
 
-int wpas_p2p_sd_cancel_request(struct wpa_supplicant *wpa_s, void *req)
+#ifdef CONFIG_WIFI_DISPLAY
+
+static u64 wpas_p2p_sd_request_wfd(struct wpa_supplicant *wpa_s, const u8 *dst,
+                                  const struct wpabuf *tlvs)
 {
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
-               return wpa_drv_p2p_sd_cancel_request(wpa_s, (u64) req);
+               return 0;
+       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
+               return 0;
+       return (uintptr_t) p2p_sd_request_wfd(wpa_s->global->p2p, dst, tlvs);
+}
+
+
+#define MAX_WFD_SD_SUBELEMS 20
+
+static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role,
+                               const char *subelems)
+{
+       u8 *len;
+       const char *pos;
+       int val;
+       int count = 0;
+
+       len = wpabuf_put(tlvs, 2);
+       wpabuf_put_u8(tlvs, P2P_SERV_WIFI_DISPLAY); /* Service Protocol Type */
+       wpabuf_put_u8(tlvs, id); /* Service Transaction ID */
+
+       wpabuf_put_u8(tlvs, role);
+
+       pos = subelems;
+       while (*pos) {
+               val = atoi(pos);
+               if (val >= 0 && val < 256) {
+                       wpabuf_put_u8(tlvs, val);
+                       count++;
+                       if (count == MAX_WFD_SD_SUBELEMS)
+                               break;
+               }
+               pos = os_strchr(pos + 1, ',');
+               if (pos == NULL)
+                       break;
+               pos++;
+       }
+
+       WPA_PUT_LE16(len, (u8 *) wpabuf_put(tlvs, 0) - len - 2);
+}
+
+
+u64 wpas_p2p_sd_request_wifi_display(struct wpa_supplicant *wpa_s,
+                                    const u8 *dst, const char *role)
+{
+       struct wpabuf *tlvs;
+       u64 ret;
+       const char *subelems;
+       u8 id = 1;
+
+       subelems = os_strchr(role, ' ');
+       if (subelems == NULL)
+               return 0;
+       subelems++;
+
+       tlvs = wpabuf_alloc(4 * (2 + 1 + 1 + 1 + MAX_WFD_SD_SUBELEMS));
+       if (tlvs == NULL)
+               return 0;
+
+       if (os_strstr(role, "[source]"))
+               wfd_add_sd_req_role(tlvs, id++, 0x00, subelems);
+       if (os_strstr(role, "[pri-sink]"))
+               wfd_add_sd_req_role(tlvs, id++, 0x01, subelems);
+       if (os_strstr(role, "[sec-sink]"))
+               wfd_add_sd_req_role(tlvs, id++, 0x02, subelems);
+       if (os_strstr(role, "[source+sink]"))
+               wfd_add_sd_req_role(tlvs, id++, 0x03, subelems);
+
+       ret = wpas_p2p_sd_request_wfd(wpa_s, dst, tlvs);
+       wpabuf_free(tlvs);
+       return ret;
+}
+
+#endif /* CONFIG_WIFI_DISPLAY */
+
+
+int wpas_p2p_sd_cancel_request(struct wpa_supplicant *wpa_s, u64 req)
+{
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
+               return wpa_drv_p2p_sd_cancel_request(wpa_s, req);
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
-       return p2p_sd_cancel_request(wpa_s->global->p2p, req);
+       return p2p_sd_cancel_request(wpa_s->global->p2p,
+                                    (void *) (uintptr_t) req);
 }
 
 
@@ -1774,15 +1896,22 @@ void wpas_p2p_sd_response(struct wpa_supplicant *wpa_s, int freq,
                        resp_tlvs);
 }
 
-
+#ifdef ANDROID_P2P
+void wpas_p2p_sd_service_update(struct wpa_supplicant *wpa_s, int action)
+#else
 void wpas_p2p_sd_service_update(struct wpa_supplicant *wpa_s)
+#endif
 {
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT) {
                wpa_drv_p2p_service_update(wpa_s);
                return;
        }
        if (wpa_s->global->p2p)
+#ifdef ANDROID_P2P
+               p2p_sd_service_update(wpa_s->global->p2p, action);
+#else
                p2p_sd_service_update(wpa_s->global->p2p);
+#endif
 }
 
 
@@ -1816,7 +1945,11 @@ void wpas_p2p_service_flush(struct wpa_supplicant *wpa_s)
                              struct p2p_srv_upnp, list)
                wpas_p2p_srv_upnp_free(usrv);
 
+#ifdef ANDROID_P2P
+       wpas_p2p_sd_service_update(wpa_s, SRV_FLUSH);
+#else
        wpas_p2p_sd_service_update(wpa_s);
+#endif
 }
 
 
@@ -1840,7 +1973,11 @@ int wpas_p2p_service_add_bonjour(struct wpa_supplicant *wpa_s,
        bsrv->resp = resp;
        dl_list_add(&wpa_s->global->p2p_srv_bonjour, &bsrv->list);
 
+#ifdef ANDROID_P2P
+       wpas_p2p_sd_service_update(wpa_s, SRV_ADD);
+#else
        wpas_p2p_sd_service_update(wpa_s);
+#endif
        return 0;
 }
 
@@ -1854,7 +1991,11 @@ int wpas_p2p_service_del_bonjour(struct wpa_supplicant *wpa_s,
        if (bsrv == NULL)
                return -1;
        wpas_p2p_srv_bonjour_free(bsrv);
+#ifdef ANDROID_P2P
+       wpas_p2p_sd_service_update(wpa_s, SRV_DEL);
+#else
        wpas_p2p_sd_service_update(wpa_s);
+#endif
        return 0;
 }
 
@@ -1877,7 +2018,11 @@ int wpas_p2p_service_add_upnp(struct wpa_supplicant *wpa_s, u8 version,
        }
        dl_list_add(&wpa_s->global->p2p_srv_upnp, &usrv->list);
 
+#ifdef ANDROID_P2P
+       wpas_p2p_sd_service_update(wpa_s, SRV_ADD);
+#else
        wpas_p2p_sd_service_update(wpa_s);
+#endif
        return 0;
 }
 
@@ -1891,7 +2036,11 @@ int wpas_p2p_service_del_upnp(struct wpa_supplicant *wpa_s, u8 version,
        if (usrv == NULL)
                return -1;
        wpas_p2p_srv_upnp_free(usrv);
+#ifdef ANDROID_P2P
+       wpas_p2p_sd_service_update(wpa_s, SRV_DEL);
+#else
        wpas_p2p_sd_service_update(wpa_s);
+#endif
        return 0;
 }
 
@@ -1916,13 +2065,28 @@ static void wpas_prov_disc_local_keypad(struct wpa_supplicant *wpa_s,
 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
                        const u8 *dev_addr, const u8 *pri_dev_type,
                        const char *dev_name, u16 supp_config_methods,
-                       u8 dev_capab, u8 group_capab)
+                       u8 dev_capab, u8 group_capab, const u8 *group_id,
+                       size_t group_id_len)
 {
        struct wpa_supplicant *wpa_s = ctx;
        char devtype[WPS_DEV_TYPE_BUFSIZE];
-       char params[200];
+       char params[300];
        u8 empty_dev_type[8];
        unsigned int generated_pin = 0;
+       struct wpa_supplicant *group = NULL;
+
+       if (group_id) {
+               for (group = wpa_s->global->ifaces; group; group = group->next)
+               {
+                       struct wpa_ssid *s = group->current_ssid;
+                       if (s != NULL &&
+                           s->mode == WPAS_MODE_P2P_GO &&
+                           group_id_len - ETH_ALEN == s->ssid_len &&
+                           os_memcmp(group_id + ETH_ALEN, s->ssid,
+                                     s->ssid_len) == 0)
+                               break;
+               }
+       }
 
        if (pri_dev_type == NULL) {
                os_memset(empty_dev_type, 0, sizeof(empty_dev_type));
@@ -1930,11 +2094,13 @@ void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
        }
        os_snprintf(params, sizeof(params), " p2p_dev_addr=" MACSTR
                    " pri_dev_type=%s name='%s' config_methods=0x%x "
-                   "dev_capab=0x%x group_capab=0x%x",
+                   "dev_capab=0x%x group_capab=0x%x%s%s",
                    MAC2STR(dev_addr),
                    wps_dev_type_bin2str(pri_dev_type, devtype,
                                         sizeof(devtype)),
-                   dev_name, supp_config_methods, dev_capab, group_capab);
+                   dev_name, supp_config_methods, dev_capab, group_capab,
+                   group ? " group=" : "",
+                   group ? group->ifname : "");
        params[sizeof(params) - 1] = '\0';
 
        if (config_methods & WPS_CONFIG_DISPLAY) {
@@ -1957,35 +2123,68 @@ void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods)
 {
        struct wpa_supplicant *wpa_s = ctx;
        unsigned int generated_pin = 0;
+       char params[20];
+
+       if (wpa_s->pending_pd_before_join &&
+           (os_memcmp(peer, wpa_s->pending_join_dev_addr, ETH_ALEN) == 0 ||
+            os_memcmp(peer, wpa_s->pending_join_iface_addr, ETH_ALEN) == 0)) {
+               wpa_s->pending_pd_before_join = 0;
+               wpa_printf(MSG_DEBUG, "P2P: Starting pending "
+                          "join-existing-group operation");
+               wpas_p2p_join_start(wpa_s);
+               return;
+       }
+
+       if (wpa_s->pending_pd_use == AUTO_PD_JOIN ||
+           wpa_s->pending_pd_use == AUTO_PD_GO_NEG)
+               os_snprintf(params, sizeof(params), " peer_go=%d",
+                           wpa_s->pending_pd_use == AUTO_PD_JOIN);
+       else
+               params[0] = '\0';
 
        if (config_methods & WPS_CONFIG_DISPLAY)
-               wpas_prov_disc_local_keypad(wpa_s, peer, "");
+               wpas_prov_disc_local_keypad(wpa_s, peer, params);
        else if (config_methods & WPS_CONFIG_KEYPAD) {
                generated_pin = wps_generate_pin();
-               wpas_prov_disc_local_display(wpa_s, peer, "", generated_pin);
+               wpas_prov_disc_local_display(wpa_s, peer, params,
+                                            generated_pin);
        } else if (config_methods & WPS_CONFIG_PUSHBUTTON)
-               wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_PBC_RESP MACSTR,
-                       MAC2STR(peer));
+               wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_PBC_RESP MACSTR
+                       "%s", MAC2STR(peer), params);
 
        wpas_notify_p2p_provision_discovery(wpa_s, peer, 0 /* response */,
                                            P2P_PROV_DISC_SUCCESS,
                                            config_methods, generated_pin);
+}
+
+
+static void wpas_prov_disc_fail(void *ctx, const u8 *peer,
+                               enum p2p_prov_disc_status status)
+{
+       struct wpa_supplicant *wpa_s = ctx;
+
+       if (wpa_s->p2p_fallback_to_go_neg) {
+               wpa_dbg(wpa_s, MSG_DEBUG, "P2P: PD for p2p_connect-auto "
+                       "failed - fall back to GO Negotiation");
+               wpas_p2p_fallback_to_go_neg(wpa_s, 0);
+               return;
+       }
 
+#ifdef ANDROID_P2P
+       /* If provision discovery failed it is safe to cancel the timer here and
+        * also do not start the join */
        if (wpa_s->pending_pd_before_join &&
            (os_memcmp(peer, wpa_s->pending_join_dev_addr, ETH_ALEN) == 0 ||
             os_memcmp(peer, wpa_s->pending_join_iface_addr, ETH_ALEN) == 0)) {
                wpa_s->pending_pd_before_join = 0;
-               wpa_printf(MSG_DEBUG, "P2P: Starting pending "
+               wpa_printf(MSG_DEBUG, "P2P: Do not Start pending "
                           "join-existing-group operation");
-               wpas_p2p_join_start(wpa_s);
+               eloop_cancel_timeout(wpas_p2p_pd_before_join_timeout, wpa_s, NULL);
        }
-}
-
-
-void wpas_prov_disc_fail(void *ctx, const u8 *peer,
-                        enum p2p_prov_disc_status status)
-{
-       struct wpa_supplicant *wpa_s = ctx;
+#endif /* ANDROID_P2P */
+       wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
+               " p2p_dev_addr=" MACSTR " status=%d",
+               MAC2STR(peer), status);
 
        wpas_notify_p2p_provision_discovery(wpa_s, peer, 0 /* response */,
                                            status, 0, 0);
@@ -2110,10 +2309,10 @@ static void wpas_invitation_received(void *ctx, const u8 *sa, const u8 *bssid,
                           MAC2STR(sa), op_freq);
                if (s) {
                        wpas_p2p_group_add_persistent(
-                               wpa_s, s, s->mode == WPAS_MODE_P2P_GO, 0);
+                               wpa_s, s, s->mode == WPAS_MODE_P2P_GO, 0, 0);
                } else if (bssid) {
                        wpas_p2p_join(wpa_s, bssid, go_dev_addr,
-                                     wpa_s->p2p_wps_method);
+                                     wpa_s->p2p_wps_method, 0);
                }
                return;
        }
@@ -2177,7 +2376,34 @@ static void wpas_invitation_result(void *ctx, int status, const u8 *bssid)
        }
 
        wpas_p2p_group_add_persistent(wpa_s, ssid,
-                                     ssid->mode == WPAS_MODE_P2P_GO, 0);
+                                     ssid->mode == WPAS_MODE_P2P_GO,
+                                     wpa_s->p2p_persistent_go_freq,
+                                     wpa_s->p2p_go_ht40);
+}
+
+
+static int wpas_p2p_disallowed_freq(struct wpa_global *global,
+                                   unsigned int freq)
+{
+       unsigned int i;
+
+       if (global->p2p_disallow_freq == NULL)
+               return 0;
+
+       for (i = 0; i < global->num_p2p_disallow_freq; i++) {
+               if (freq >= global->p2p_disallow_freq[i].min &&
+                   freq <= global->p2p_disallow_freq[i].max)
+                       return 1;
+       }
+
+       return 0;
+}
+
+
+static void wpas_p2p_add_chan(struct p2p_reg_class *reg, u8 chan)
+{
+       reg->channel[reg->channels] = chan;
+       reg->channels++;
 }
 
 
@@ -2191,34 +2417,47 @@ static int wpas_p2p_default_channels(struct wpa_supplicant *wpa_s,
 
        /* Operating class 81 - 2.4 GHz band channels 1..13 */
        chan->reg_class[cla].reg_class = 81;
-       chan->reg_class[cla].channels = 11;
-       for (i = 0; i < 11; i++)
-               chan->reg_class[cla].channel[i] = i + 1;
-       cla++;
+       chan->reg_class[cla].channels = 0;
+       for (i = 0; i < 11; i++) {
+               if (!wpas_p2p_disallowed_freq(wpa_s->global, 2412 + i * 5))
+                       wpas_p2p_add_chan(&chan->reg_class[cla], i + 1);
+       }
+       if (chan->reg_class[cla].channels)
+               cla++;
 
        wpa_printf(MSG_DEBUG, "P2P: Enable operating classes for lower 5 GHz "
                   "band");
 
        /* Operating class 115 - 5 GHz, channels 36-48 */
        chan->reg_class[cla].reg_class = 115;
-       chan->reg_class[cla].channels = 4;
-       chan->reg_class[cla].channel[0] = 36;
-       chan->reg_class[cla].channel[1] = 40;
-       chan->reg_class[cla].channel[2] = 44;
-       chan->reg_class[cla].channel[3] = 48;
-       cla++;
+       chan->reg_class[cla].channels = 0;
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 36 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 36);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 40 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 40);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 44 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 44);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 48 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 48);
+       if (chan->reg_class[cla].channels)
+               cla++;
 
        wpa_printf(MSG_DEBUG, "P2P: Enable operating classes for higher 5 GHz "
                   "band");
 
        /* Operating class 124 - 5 GHz, channels 149,153,157,161 */
        chan->reg_class[cla].reg_class = 124;
-       chan->reg_class[cla].channels = 4;
-       chan->reg_class[cla].channel[0] = 149;
-       chan->reg_class[cla].channel[1] = 153;
-       chan->reg_class[cla].channel[2] = 157;
-       chan->reg_class[cla].channel[3] = 161;
-       cla++;
+       chan->reg_class[cla].channels = 0;
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 149 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 149);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 153 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 153);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 156 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 157);
+       if (!wpas_p2p_disallowed_freq(wpa_s->global, 5000 + 161 * 5))
+               wpas_p2p_add_chan(&chan->reg_class[cla], 161);
+       if (chan->reg_class[cla].channels)
+               cla++;
 
        chan->reg_classes = cla;
        return 0;
@@ -2240,9 +2479,16 @@ static struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes,
 }
 
 
-static int has_channel(struct hostapd_hw_modes *mode, u8 chan, int *flags)
+static int has_channel(struct wpa_global *global,
+                      struct hostapd_hw_modes *mode, u8 chan, int *flags)
 {
        int i;
+       unsigned int freq;
+
+       freq = (mode->mode == HOSTAPD_MODE_IEEE80211A ? 5000 : 2407) +
+               chan * 5;
+       if (wpas_p2p_disallowed_freq(global, freq))
+               return 0;
 
        for (i = 0; i < mode->num_channels; i++) {
                if (mode->channels[i].chan == chan) {
@@ -2269,30 +2515,50 @@ struct p2p_oper_class_map {
        enum { BW20, BW40PLUS, BW40MINUS } bw;
 };
 
+static struct p2p_oper_class_map op_class[] = {
+       { HOSTAPD_MODE_IEEE80211G, 81, 1, 13, 1, BW20 },
+       { HOSTAPD_MODE_IEEE80211G, 82, 14, 14, 1, BW20 },
+#if 0 /* Do not enable HT40 on 2 GHz for now */
+       { HOSTAPD_MODE_IEEE80211G, 83, 1, 9, 1, BW40PLUS },
+       { HOSTAPD_MODE_IEEE80211G, 84, 5, 13, 1, BW40MINUS },
+#endif
+       { HOSTAPD_MODE_IEEE80211A, 115, 36, 48, 4, BW20 },
+       { HOSTAPD_MODE_IEEE80211A, 124, 149, 161, 4, BW20 },
+       { HOSTAPD_MODE_IEEE80211A, 116, 36, 44, 8, BW40PLUS },
+       { HOSTAPD_MODE_IEEE80211A, 117, 40, 48, 8, BW40MINUS },
+       { HOSTAPD_MODE_IEEE80211A, 126, 149, 157, 8, BW40PLUS },
+       { HOSTAPD_MODE_IEEE80211A, 127, 153, 161, 8, BW40MINUS },
+       { -1, 0, 0, 0, 0, BW20 }
+};
+
+
+static int wpas_p2p_verify_channel(struct wpa_supplicant *wpa_s,
+                                  struct hostapd_hw_modes *mode,
+                                  u8 channel, u8 bw)
+{
+       int flag;
+
+       if (!has_channel(wpa_s->global, mode, channel, &flag))
+               return -1;
+       if (bw == BW40MINUS &&
+           (!(flag & HOSTAPD_CHAN_HT40MINUS) ||
+            !has_channel(wpa_s->global, mode, channel - 4, NULL)))
+               return 0;
+       if (bw == BW40PLUS &&
+           (!(flag & HOSTAPD_CHAN_HT40PLUS) ||
+            !has_channel(wpa_s->global, mode, channel + 4, NULL)))
+               return 0;
+       return 1;
+}
+
+
 static int wpas_p2p_setup_channels(struct wpa_supplicant *wpa_s,
                                   struct p2p_channels *chan)
 {
-       struct hostapd_hw_modes *modes, *mode;
-       u16 num_modes, flags;
+       struct hostapd_hw_modes *mode;
        int cla, op;
-       struct p2p_oper_class_map op_class[] = {
-               { HOSTAPD_MODE_IEEE80211G, 81, 1, 13, 1, BW20 },
-               { HOSTAPD_MODE_IEEE80211G, 82, 14, 14, 1, BW20 },
-#if 0 /* Do not enable HT40 on 2 GHz for now */
-               { HOSTAPD_MODE_IEEE80211G, 83, 1, 9, 1, BW40PLUS },
-               { HOSTAPD_MODE_IEEE80211G, 84, 5, 13, 1, BW40MINUS },
-#endif
-               { HOSTAPD_MODE_IEEE80211A, 115, 36, 48, 4, BW20 },
-               { HOSTAPD_MODE_IEEE80211A, 124, 149, 161, 4, BW20 },
-               { HOSTAPD_MODE_IEEE80211A, 116, 36, 44, 8, BW40PLUS },
-               { HOSTAPD_MODE_IEEE80211A, 117, 40, 48, 8, BW40MINUS },
-               { HOSTAPD_MODE_IEEE80211A, 126, 149, 157, 8, BW40PLUS },
-               { HOSTAPD_MODE_IEEE80211A, 127, 153, 161, 8, BW40MINUS },
-               { -1, 0, 0, 0, 0, BW20 }
-       };
-
-       modes = wpa_drv_get_hw_feature_data(wpa_s, &num_modes, &flags);
-       if (modes == NULL) {
+
+       if (wpa_s->hw.modes == NULL) {
                wpa_printf(MSG_DEBUG, "P2P: Driver did not support fetching "
                           "of all supported channels; assume dualband "
                           "support");
@@ -2306,20 +2572,11 @@ static int wpas_p2p_setup_channels(struct wpa_supplicant *wpa_s,
                u8 ch;
                struct p2p_reg_class *reg = NULL;
 
-               mode = get_mode(modes, num_modes, o->mode);
+               mode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes, o->mode);
                if (mode == NULL)
                        continue;
                for (ch = o->min_chan; ch <= o->max_chan; ch += o->inc) {
-                       int flag;
-                       if (!has_channel(mode, ch, &flag))
-                               continue;
-                       if (o->bw == BW40MINUS &&
-                           (!(flag & HOSTAPD_CHAN_HT40MINUS) ||
-                            !has_channel(mode, ch - 4, NULL)))
-                               continue;
-                       if (o->bw == BW40PLUS &&
-                           (!(flag & HOSTAPD_CHAN_HT40PLUS) ||
-                            !has_channel(mode, ch + 4, NULL)))
+                       if (wpas_p2p_verify_channel(wpa_s, mode, ch, o->bw) < 1)
                                continue;
                        if (reg == NULL) {
                                wpa_printf(MSG_DEBUG, "P2P: Add operating "
@@ -2339,8 +2596,32 @@ static int wpas_p2p_setup_channels(struct wpa_supplicant *wpa_s,
 
        chan->reg_classes = cla;
 
-       ieee80211_sta_free_hw_features(modes, num_modes);
+       return 0;
+}
+
+
+int wpas_p2p_get_ht40_mode(struct wpa_supplicant *wpa_s,
+                          struct hostapd_hw_modes *mode, u8 channel)
+{
+       int op, ret;
 
+       for (op = 0; op_class[op].op_class; op++) {
+               struct p2p_oper_class_map *o = &op_class[op];
+               u8 ch;
+
+               for (ch = o->min_chan; ch <= o->max_chan; ch += o->inc) {
+                       if (o->mode != HOSTAPD_MODE_IEEE80211A ||
+                           o->bw == BW20 || ch != channel)
+                               continue;
+                       ret = wpas_p2p_verify_channel(wpa_s, mode, ch, o->bw);
+                       if (ret < 0)
+                               continue;
+                       else if (ret > 0)
+                               return (o->bw == BW40MINUS) ? -1 : 1;
+                       else
+                               return 0;
+               }
+       }
        return 0;
 }
 
@@ -2361,6 +2642,27 @@ static int wpas_get_noa(void *ctx, const u8 *interface_addr, u8 *buf,
 }
 
 
+static int wpas_go_connected(void *ctx, const u8 *dev_addr)
+{
+       struct wpa_supplicant *wpa_s = ctx;
+
+       for (wpa_s = wpa_s->global->ifaces; wpa_s; wpa_s = wpa_s->next) {
+               struct wpa_ssid *ssid = wpa_s->current_ssid;
+               if (ssid == NULL)
+                       continue;
+               if (ssid->mode != WPAS_MODE_INFRA)
+                       continue;
+               if (wpa_s->wpa_state != WPA_COMPLETED &&
+                   wpa_s->wpa_state != WPA_GROUP_HANDSHAKE)
+                       continue;
+               if (os_memcmp(wpa_s->go_dev_addr, dev_addr, ETH_ALEN) == 0)
+                       return 1;
+       }
+
+       return 0;
+}
+
+
 /**
  * wpas_p2p_init - Initialize P2P module for %wpa_supplicant
  * @global: Pointer to global data from wpa_supplicant_init()
@@ -2372,25 +2674,10 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
        struct p2p_config p2p;
        unsigned int r;
        int i;
-#ifdef ANDROID_BRCM_P2P_PATCH
-       char buf[200];
-#endif
 
        if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE))
                return 0;
 
-#ifdef CONFIG_CLIENT_MLME
-       if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)) {
-               wpa_s->mlme.public_action_cb = p2p_rx_action_mlme;
-               wpa_s->mlme.public_action_cb_ctx = wpa_s;
-       }
-#endif /* CONFIG_CLIENT_MLME */
-
-       if (wpa_drv_disable_11b_rates(wpa_s, 1) < 0) {
-               wpa_printf(MSG_DEBUG, "P2P: Failed to disable 11b rates");
-               /* Continue anyway; this is not really a fatal error */
-       }
-
        if (global->p2p)
                return 0;
 
@@ -2435,21 +2722,10 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
        p2p.invitation_received = wpas_invitation_received;
        p2p.invitation_result = wpas_invitation_result;
        p2p.get_noa = wpas_get_noa;
+       p2p.go_connected = wpas_go_connected;
 
-#ifdef ANDROID_BRCM_P2P_PATCH
-       /* P2P_ADDR: Using p2p_dev_addr to hold the actual p2p device address incase if
-        * we are not using the primary interface for p2p operations.
-        */
-       wpa_drv_driver_cmd(wpa_s,  "P2P_DEV_ADDR", buf, sizeof(buf));   
-       os_memcpy(p2p.p2p_dev_addr, buf, ETH_ALEN);
-       os_memcpy(wpa_s->global->p2p_dev_addr, buf, ETH_ALEN);
-       os_memcpy(p2p.dev_addr, buf, ETH_ALEN);
-       wpa_printf(MSG_DEBUG, "P2P: Device address ("MACSTR")", MAC2STR(p2p.p2p_dev_addr));
-#else
        os_memcpy(wpa_s->global->p2p_dev_addr, wpa_s->own_addr, ETH_ALEN);
-#endif
-
-       os_memcpy(p2p.dev_addr, wpa_s->own_addr, ETH_ALEN);
+       os_memcpy(p2p.dev_addr, wpa_s->global->p2p_dev_addr, ETH_ALEN);
        p2p.dev_name = wpa_s->conf->device_name;
        p2p.manufacturer = wpa_s->conf->manufacturer;
        p2p.model_name = wpa_s->conf->model_name;
@@ -2530,9 +2806,17 @@ int wpas_p2p_init(struct wpa_global *global, struct wpa_supplicant *wpa_s)
 
        p2p.p2p_intra_bss = wpa_s->conf->p2p_intra_bss;
 
+#ifdef ANDROID_P2P
+       if(wpa_s->drv_flags & WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT)
+               p2p.p2p_concurrency = P2P_MULTI_CHANNEL_CONCURRENT;
+       else if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CONCURRENT)
+               p2p.p2p_concurrency = P2P_SINGLE_CHANNEL_CONCURRENT;
+#endif
+
        global->p2p = p2p_init(&p2p);
        if (global->p2p == NULL)
                return -1;
+       global->p2p_init_wpa_s = wpa_s;
 
        for (i = 0; i < MAX_WPS_VENDOR_EXT; i++) {
                if (wpa_s->conf->wps_vendor_ext[i] == NULL)
@@ -2555,13 +2839,19 @@ void wpas_p2p_deinit(struct wpa_supplicant *wpa_s)
 {
        if (wpa_s->driver && wpa_s->drv_priv)
                wpa_drv_probe_req_report(wpa_s, 0);
+
+       if (wpa_s->go_params) {
+               /* Clear any stored provisioning info */
+               p2p_clear_provisioning_info(
+                       wpa_s->global->p2p,
+                       wpa_s->go_params->peer_device_addr);
+       }
+
        os_free(wpa_s->go_params);
        wpa_s->go_params = NULL;
-       wpabuf_free(wpa_s->pending_action_tx);
-       wpa_s->pending_action_tx = NULL;
-       eloop_cancel_timeout(wpas_send_action_cb, wpa_s, NULL);
        eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s, NULL);
        eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
+       eloop_cancel_timeout(wpas_p2p_pd_before_join_timeout, wpa_s, NULL);
        wpa_s->p2p_long_listen = 0;
        eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
        eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
@@ -2581,19 +2871,18 @@ void wpas_p2p_deinit(struct wpa_supplicant *wpa_s)
 void wpas_p2p_deinit_global(struct wpa_global *global)
 {
        struct wpa_supplicant *wpa_s, *tmp;
-       char *ifname;
+
+       wpa_s = global->ifaces;
+       if (wpa_s)
+               wpas_p2p_service_flush(wpa_s);
 
        if (global->p2p == NULL)
                return;
 
        /* Remove remaining P2P group interfaces */
-       wpa_s = global->ifaces;
-       if (wpa_s)
-               wpas_p2p_service_flush(wpa_s);
        while (wpa_s && wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE)
                wpa_s = wpa_s->next;
        while (wpa_s) {
-               enum wpa_driver_if_type type;
                tmp = global->ifaces;
                while (tmp &&
                       (tmp == wpa_s ||
@@ -2602,12 +2891,8 @@ void wpas_p2p_deinit_global(struct wpa_global *global)
                }
                if (tmp == NULL)
                        break;
-               ifname = os_strdup(tmp->ifname);
-               type = wpas_p2p_if_type(tmp->p2p_group_interface);
-               wpa_supplicant_remove_iface(global, tmp, 0);
-               if (ifname)
-                       wpa_drv_if_remove(wpa_s, type, ifname);
-               os_free(ifname);
+               /* Disconnect from the P2P group and deinit the interface */
+               wpas_p2p_disconnect(tmp);
        }
 
        /*
@@ -2621,6 +2906,7 @@ void wpas_p2p_deinit_global(struct wpa_global *global)
 
        p2p_deinit(global->p2p);
        global->p2p = NULL;
+       global->p2p_init_wpa_s = NULL;
 }
 
 
@@ -2645,17 +2931,30 @@ static int wpas_p2p_start_go_neg(struct wpa_supplicant *wpa_s,
                                 const u8 *peer_addr,
                                 enum p2p_wps_method wps_method,
                                 int go_intent, const u8 *own_interface_addr,
-                                unsigned int force_freq, int persistent_group)
+                                unsigned int force_freq, int persistent_group,
+                                struct wpa_ssid *ssid)
 {
+       if (persistent_group && wpa_s->conf->persistent_reconnect)
+               persistent_group = 2;
+
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT) {
                return wpa_drv_p2p_connect(wpa_s, peer_addr, wps_method,
                                           go_intent, own_interface_addr,
                                           force_freq, persistent_group);
        }
 
+       /*
+        * Increase GO config timeout if HT40 is used since it takes some time
+        * to scan channels for coex purposes before the BSS can be started.
+        */
+       p2p_set_config_timeout(wpa_s->global->p2p,
+                              wpa_s->p2p_go_ht40 ? 255 : 100, 20);
+
        return p2p_connect(wpa_s->global->p2p, peer_addr, wps_method,
                           go_intent, own_interface_addr, force_freq,
-                          persistent_group);
+                          persistent_group, ssid ? ssid->ssid : NULL,
+                          ssid ? ssid->ssid_len : 0,
+                          wpa_s->p2p_pd_before_go_neg);
 }
 
 
@@ -2663,14 +2962,19 @@ static int wpas_p2p_auth_go_neg(struct wpa_supplicant *wpa_s,
                                const u8 *peer_addr,
                                enum p2p_wps_method wps_method,
                                int go_intent, const u8 *own_interface_addr,
-                               unsigned int force_freq, int persistent_group)
+                               unsigned int force_freq, int persistent_group,
+                               struct wpa_ssid *ssid)
 {
+       if (persistent_group && wpa_s->conf->persistent_reconnect)
+               persistent_group = 2;
+
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
                return -1;
 
        return p2p_authorize(wpa_s->global->p2p, peer_addr, wps_method,
                             go_intent, own_interface_addr, force_freq,
-                            persistent_group);
+                            persistent_group, ssid ? ssid->ssid : NULL,
+                            ssid ? ssid->ssid_len : 0);
 }
 
 
@@ -2684,12 +2988,101 @@ static void wpas_p2p_check_join_scan_limit(struct wpa_supplicant *wpa_s)
                           " for join operationg - stop join attempt",
                           MAC2STR(wpa_s->pending_join_iface_addr));
                eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
+               if (wpa_s->p2p_auto_pd) {
+                       wpa_s->p2p_auto_pd = 0;
+                       wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
+                               " p2p_dev_addr=" MACSTR " status=N/A",
+                               MAC2STR(wpa_s->pending_join_dev_addr));
+                       return;
+               }
                wpa_msg(wpa_s->parent, MSG_INFO,
                        P2P_EVENT_GROUP_FORMATION_FAILURE);
        }
 }
 
 
+static void wpas_p2p_pd_before_join_timeout(void *eloop_ctx, void *timeout_ctx)
+{
+       struct wpa_supplicant *wpa_s = eloop_ctx;
+       if (!wpa_s->pending_pd_before_join)
+               return;
+       /*
+        * Provision Discovery Response may have been lost - try to connect
+        * anyway since we do not need any information from this PD.
+        */
+       wpa_printf(MSG_DEBUG, "P2P: PD timeout for join-existing-group - "
+                  "try to connect anyway");
+       wpas_p2p_join_start(wpa_s);
+}
+
+
+static int wpas_check_freq_conflict(struct wpa_supplicant *wpa_s, int freq)
+{
+       struct wpa_supplicant *iface;
+       int shared_freq;
+       u8 bssid[ETH_ALEN];
+
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT)
+               return 0;
+
+       for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
+               if (!wpas_p2p_create_iface(wpa_s) && iface == wpa_s)
+                       continue;
+               if (iface->current_ssid == NULL || iface->assoc_freq == 0)
+                       continue;
+               if (iface->current_ssid->mode == WPAS_MODE_AP ||
+                   iface->current_ssid->mode == WPAS_MODE_P2P_GO)
+                       shared_freq = iface->current_ssid->frequency;
+               else if (wpa_drv_get_bssid(iface, bssid) == 0)
+                       shared_freq = iface->assoc_freq;
+               else
+                       shared_freq = 0;
+
+               if (shared_freq && freq != shared_freq) {
+                       wpa_printf(MSG_DEBUG, "P2P: Frequency conflict - %s "
+                                  "connected on %d MHz - new connection on "
+                                  "%d MHz", iface->ifname, shared_freq, freq);
+                       return 1;
+               }
+       }
+
+       shared_freq = wpa_drv_shared_freq(wpa_s);
+       if (shared_freq > 0 && shared_freq != freq) {
+               wpa_printf(MSG_DEBUG, "P2P: Frequency conflict - shared "
+                          "virtual interface connected on %d MHz - new "
+                          "connection on %d MHz", shared_freq, freq);
+               return 1;
+       }
+
+       return 0;
+}
+
+
+static int wpas_p2p_peer_go(struct wpa_supplicant *wpa_s,
+                           const u8 *peer_dev_addr)
+{
+       struct wpa_bss *bss;
+       int updated;
+
+       bss = wpa_bss_get_p2p_dev_addr(wpa_s, peer_dev_addr);
+       if (bss == NULL)
+               return -1;
+       if (bss->last_update_idx < wpa_s->bss_update_idx) {
+               wpa_printf(MSG_DEBUG, "P2P: Peer BSS entry not updated in the "
+                          "last scan");
+               return 0;
+       }
+
+       updated = os_time_before(&wpa_s->p2p_auto_started, &bss->last_update);
+       wpa_printf(MSG_DEBUG, "P2P: Current BSS entry for peer updated at "
+                  "%ld.%06ld (%supdated in last scan)",
+                  bss->last_update.sec, bss->last_update.usec,
+                  updated ? "": "not ");
+
+       return updated;
+}
+
+
 static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
                                   struct wpa_scan_results *scan_res)
 {
@@ -2702,12 +3095,77 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
        if (wpa_s->global->p2p_disabled)
                return;
 
-       wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS) for join",
-                  scan_res ? (int) scan_res->num : -1);
+       wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS) for %sjoin",
+                  scan_res ? (int) scan_res->num : -1,
+                  wpa_s->p2p_auto_join ? "auto_" : "");
 
        if (scan_res)
                wpas_p2p_scan_res_handler(wpa_s, scan_res);
 
+       if (wpa_s->p2p_auto_pd) {
+               int join = wpas_p2p_peer_go(wpa_s,
+                                           wpa_s->pending_join_dev_addr);
+               if (join == 0 &&
+                   wpa_s->auto_pd_scan_retry < P2P_AUTO_PD_SCAN_ATTEMPTS) {
+                       wpa_s->auto_pd_scan_retry++;
+                       bss = wpa_bss_get_bssid(wpa_s,
+                                               wpa_s->pending_join_dev_addr);
+                       if (bss) {
+                               freq = bss->freq;
+                               wpa_printf(MSG_DEBUG, "P2P: Scan retry %d for "
+                                          "the peer " MACSTR " at %d MHz",
+                                          wpa_s->auto_pd_scan_retry,
+                                          MAC2STR(wpa_s->
+                                                  pending_join_dev_addr),
+                                          freq);
+                               wpas_p2p_join_scan_req(wpa_s, freq);
+                               return;
+                       }
+               }
+
+               if (join < 0)
+                       join = 0;
+
+               wpa_s->p2p_auto_pd = 0;
+               wpa_s->pending_pd_use = join ? AUTO_PD_JOIN : AUTO_PD_GO_NEG;
+               wpa_printf(MSG_DEBUG, "P2P: Auto PD with " MACSTR " join=%d",
+                          MAC2STR(wpa_s->pending_join_dev_addr), join);
+               if (p2p_prov_disc_req(wpa_s->global->p2p,
+                                     wpa_s->pending_join_dev_addr,
+                                     wpa_s->pending_pd_config_methods, join,
+                                     0) < 0) {
+                       wpa_s->p2p_auto_pd = 0;
+                       wpa_msg(wpa_s, MSG_INFO, P2P_EVENT_PROV_DISC_FAILURE
+                               " p2p_dev_addr=" MACSTR " status=N/A",
+                               MAC2STR(wpa_s->pending_join_dev_addr));
+               }
+               return;
+       }
+
+       if (wpa_s->p2p_auto_join) {
+               int join = wpas_p2p_peer_go(wpa_s,
+                                           wpa_s->pending_join_dev_addr);
+               if (join < 0) {
+                       wpa_printf(MSG_DEBUG, "P2P: Peer was not found to be "
+                                  "running a GO -> use GO Negotiation");
+                       wpas_p2p_connect(wpa_s, wpa_s->pending_join_dev_addr,
+                                        wpa_s->p2p_pin, wpa_s->p2p_wps_method,
+                                        wpa_s->p2p_persistent_group, 0, 0, 0,
+                                        wpa_s->p2p_go_intent,
+                                        wpa_s->p2p_connect_freq,
+                                        wpa_s->p2p_persistent_id,
+                                        wpa_s->p2p_pd_before_go_neg,
+                                        wpa_s->p2p_go_ht40);
+                       return;
+               }
+
+               wpa_printf(MSG_DEBUG, "P2P: Peer was found running GO%s -> "
+                          "try to join the group", join ? "" :
+                          " in older scan");
+               if (!join)
+                       wpa_s->p2p_fallback_to_go_neg = 1;
+       }
+
        freq = p2p_get_oper_freq(wpa_s->global->p2p,
                                 wpa_s->pending_join_iface_addr);
        if (freq < 0 &&
@@ -2740,6 +3198,13 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
        if (freq > 0) {
                u16 method;
 
+               if (wpas_check_freq_conflict(wpa_s, freq) > 0) {
+                       wpa_msg(wpa_s->parent, MSG_INFO,
+                               P2P_EVENT_GROUP_FORMATION_FAILURE
+                               "reason=FREQ_CONFLICT");
+                       return;
+               }
+
                wpa_printf(MSG_DEBUG, "P2P: Send Provision Discovery Request "
                           "prior to joining an existing group (GO " MACSTR
                           " freq=%u MHz)",
@@ -2747,7 +3212,6 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
                wpa_s->pending_pd_before_join = 1;
 
                switch (wpa_s->pending_join_wps_method) {
-               case WPS_PIN_LABEL:
                case WPS_PIN_DISPLAY:
                        method = WPS_CONFIG_KEYPAD;
                        break;
@@ -2762,9 +3226,24 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
                        break;
                }
 
+               if ((p2p_get_provisioning_info(wpa_s->global->p2p,
+                                              wpa_s->pending_join_dev_addr) ==
+                    method)) {
+                       /*
+                        * We have already performed provision discovery for
+                        * joining the group. Proceed directly to join
+                        * operation without duplicated provision discovery. */
+                       wpa_printf(MSG_DEBUG, "P2P: Provision discovery "
+                                  "with " MACSTR " already done - proceed to "
+                                  "join",
+                                  MAC2STR(wpa_s->pending_join_dev_addr));
+                       wpa_s->pending_pd_before_join = 0;
+                       goto start;
+               }
+
                if (p2p_prov_disc_req(wpa_s->global->p2p,
-                                     wpa_s->pending_join_dev_addr, method, 1)
-                   < 0) {
+                                     wpa_s->pending_join_dev_addr, method, 1,
+                                     freq) < 0) {
                        wpa_printf(MSG_DEBUG, "P2P: Failed to send Provision "
                                   "Discovery Request before joining an "
                                   "existing group");
@@ -2774,8 +3253,15 @@ static void wpas_p2p_scan_res_join(struct wpa_supplicant *wpa_s,
 
                /*
                 * Actual join operation will be started from the Action frame
-                * TX status callback.
+                * TX status callback (if no ACK is received) or when the
+                * Provision Discovery Response is received. Use a short
+                * timeout as a backup mechanism should the Provision Discovery
+                * Response be lost for any reason.
                 */
+               eloop_cancel_timeout(wpas_p2p_pd_before_join_timeout, wpa_s,
+                                    NULL);
+               eloop_register_timeout(2, 0, wpas_p2p_pd_before_join_timeout,
+                                      wpa_s, NULL);
                return;
        }
 
@@ -2791,13 +3277,24 @@ start:
 }
 
 
-static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
+static void wpas_p2p_join_scan_req(struct wpa_supplicant *wpa_s, int freq)
 {
-       struct wpa_supplicant *wpa_s = eloop_ctx;
        int ret;
        struct wpa_driver_scan_params params;
        struct wpabuf *wps_ie, *ies;
+       size_t ielen;
+       int freqs[2] = { 0, 0 };
+#ifdef ANDROID_P2P
+       int oper_freq;
 
+       /* If freq is not provided, check the operating freq of the GO and do a
+        * a directed scan to save time
+        */
+       if(!freq) {
+               freq = (oper_freq = p2p_get_oper_freq(wpa_s->global->p2p,
+                        wpa_s->pending_join_iface_addr) == -1) ? 0 : oper_freq; 
+       }
+#endif
        os_memset(&params, 0, sizeof(params));
 
        /* P2P Wildcard SSID */
@@ -2806,14 +3303,16 @@ static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
        params.ssids[0].ssid_len = P2P_WILDCARD_SSID_LEN;
 
        wpa_s->wps->dev.p2p = 1;
-       wps_ie = wps_build_probe_req_ie(0, &wpa_s->wps->dev, wpa_s->wps->uuid,
-                                       WPS_REQ_ENROLLEE, 0, NULL);
+       wps_ie = wps_build_probe_req_ie(DEV_PW_DEFAULT, &wpa_s->wps->dev,
+                                       wpa_s->wps->uuid, WPS_REQ_ENROLLEE, 0,
+                                       NULL);
        if (wps_ie == NULL) {
                wpas_p2p_scan_res_join(wpa_s, NULL);
                return;
        }
 
-       ies = wpabuf_alloc(wpabuf_len(wps_ie) + 100);
+       ielen = p2p_scan_ie_buf_len(wpa_s->global->p2p);
+       ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
        if (ies == NULL) {
                wpabuf_free(wps_ie);
                wpas_p2p_scan_res_join(wpa_s, NULL);
@@ -2822,20 +3321,23 @@ static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
        wpabuf_put_buf(ies, wps_ie);
        wpabuf_free(wps_ie);
 
-       p2p_scan_ie(wpa_s->global->p2p, ies);
+       p2p_scan_ie(wpa_s->global->p2p, ies, NULL);
 
+       params.p2p_probe = 1;
        params.extra_ies = wpabuf_head(ies);
        params.extra_ies_len = wpabuf_len(ies);
+       if (freq > 0) {
+               freqs[0] = freq;
+               params.freqs = freqs;
+       }
 
        /*
         * Run a scan to update BSS table and start Provision Discovery once
         * the new scan results become available.
         */
-       wpa_s->scan_res_handler = wpas_p2p_scan_res_join;
-       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
-               ret = ieee80211_sta_req_scan(wpa_s, &params);
-       else
-               ret = wpa_drv_scan(wpa_s, &params);
+       ret = wpa_drv_scan(wpa_s, &params);
+       if (!ret)
+               wpa_s->scan_res_handler = wpas_p2p_scan_res_join;
 
        wpabuf_free(ies);
 
@@ -2849,13 +3351,24 @@ static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
 }
 
 
+static void wpas_p2p_join_scan(void *eloop_ctx, void *timeout_ctx)
+{
+       struct wpa_supplicant *wpa_s = eloop_ctx;
+       wpas_p2p_join_scan_req(wpa_s, 0);
+}
+
+
 static int wpas_p2p_join(struct wpa_supplicant *wpa_s, const u8 *iface_addr,
-                        const u8 *dev_addr, enum p2p_wps_method wps_method)
+                        const u8 *dev_addr, enum p2p_wps_method wps_method,
+                        int auto_join)
 {
        wpa_printf(MSG_DEBUG, "P2P: Request to join existing group (iface "
-                  MACSTR " dev " MACSTR ")",
-                  MAC2STR(iface_addr), MAC2STR(dev_addr));
+                  MACSTR " dev " MACSTR ")%s",
+                  MAC2STR(iface_addr), MAC2STR(dev_addr),
+                  auto_join ? " (auto_join)" : "");
 
+       wpa_s->p2p_auto_pd = 0;
+       wpa_s->p2p_auto_join = !!auto_join;
        os_memcpy(wpa_s->pending_join_iface_addr, iface_addr, ETH_ALEN);
        os_memcpy(wpa_s->pending_join_dev_addr, dev_addr, ETH_ALEN);
        wpa_s->pending_join_wps_method = wps_method;
@@ -2873,7 +3386,9 @@ static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s)
 {
        struct wpa_supplicant *group;
        struct p2p_go_neg_results res;
+       struct wpa_bss *bss;
 
+       eloop_cancel_timeout(wpas_p2p_pd_before_join_timeout, wpa_s, NULL);
        group = wpas_p2p_get_group_iface(wpa_s, 0, 0);
        if (group == NULL)
                return -1;
@@ -2884,11 +3399,26 @@ static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s)
        }
 
        group->p2p_in_provisioning = 1;
+       group->p2p_fallback_to_go_neg = wpa_s->p2p_fallback_to_go_neg;
 
        os_memset(&res, 0, sizeof(res));
        os_memcpy(res.peer_interface_addr, wpa_s->pending_join_iface_addr,
                  ETH_ALEN);
        res.wps_method = wpa_s->pending_join_wps_method;
+       bss = wpa_bss_get_bssid(wpa_s, wpa_s->pending_join_iface_addr);
+       if (bss) {
+               res.freq = bss->freq;
+               res.ssid_len = bss->ssid_len;
+               os_memcpy(res.ssid, bss->ssid, bss->ssid_len);
+       }
+
+       if (wpa_s->off_channel_freq || wpa_s->roc_waiting_drv_freq) {
+               wpa_printf(MSG_DEBUG, "P2P: Cancel remain-on-channel prior to "
+                          "starting client");
+               wpa_drv_cancel_remain_on_channel(wpa_s);
+               wpa_s->off_channel_freq = 0;
+               wpa_s->roc_waiting_drv_freq = 0;
+       }
        wpas_start_wps_enrollee(group, &res);
 
        /*
@@ -2910,29 +3440,45 @@ static int wpas_p2p_join_start(struct wpa_supplicant *wpa_s)
  * @peer_addr: Address of the peer P2P Device
  * @pin: PIN to use during provisioning or %NULL to indicate PBC mode
  * @persistent_group: Whether to create a persistent group
+ * @auto_join: Whether to select join vs. GO Negotiation automatically
  * @join: Whether to join an existing group (as a client) instead of starting
  *     Group Owner negotiation; @peer_addr is BSSID in that case
  * @auth: Whether to only authorize the connection instead of doing that and
  *     initiating Group Owner negotiation
  * @go_intent: GO Intent or -1 to use default
  * @freq: Frequency for the group or 0 for auto-selection
+ * @persistent_id: Persistent group credentials to use for forcing GO
+ *     parameters or -1 to generate new values (SSID/passphrase)
+ * @pd: Whether to send Provision Discovery prior to GO Negotiation as an
+ *     interoperability workaround when initiating group formation
+ * @ht40: Start GO with 40 MHz channel width
  * Returns: 0 or new PIN (if pin was %NULL) on success, -1 on unspecified
  *     failure, -2 on failure due to channel not currently available,
  *     -3 if forced channel is not supported
  */
 int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                     const char *pin, enum p2p_wps_method wps_method,
-                    int persistent_group, int join, int auth, int go_intent,
-                    int freq)
+                    int persistent_group, int auto_join, int join, int auth,
+                    int go_intent, int freq, int persistent_id, int pd,
+                    int ht40)
 {
        int force_freq = 0, oper_freq = 0;
        u8 bssid[ETH_ALEN];
        int ret = 0;
        enum wpa_driver_if_type iftype;
+       const u8 *if_addr;
+       struct wpa_ssid *ssid = NULL;
 
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
 
+       if (persistent_id >= 0) {
+               ssid = wpa_config_get_network(wpa_s->conf, persistent_id);
+               if (ssid == NULL || ssid->disabled != 2 ||
+                   ssid->mode != WPAS_MODE_P2P_GO)
+                       return -1;
+       }
+
        if (go_intent < 0)
                go_intent = wpa_s->conf->p2p_go_intent;
 
@@ -2940,6 +3486,13 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                wpa_s->p2p_long_listen = 0;
 
        wpa_s->p2p_wps_method = wps_method;
+       wpa_s->p2p_persistent_group = !!persistent_group;
+       wpa_s->p2p_persistent_id = persistent_id;
+       wpa_s->p2p_go_intent = go_intent;
+       wpa_s->p2p_connect_freq = freq;
+       wpa_s->p2p_fallback_to_go_neg = 0;
+       wpa_s->p2p_pd_before_go_neg = !!pd;
+       wpa_s->p2p_go_ht40 = !!ht40;
 
        if (pin)
                os_strlcpy(wpa_s->p2p_pin, pin, sizeof(wpa_s->p2p_pin));
@@ -2952,7 +3505,7 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
        } else
                wpa_s->p2p_pin[0] = '\0';
 
-       if (join) {
+       if (join || auto_join) {
                u8 iface_addr[ETH_ALEN], dev_addr[ETH_ALEN];
                if (auth) {
                        wpa_printf(MSG_DEBUG, "P2P: Authorize invitation to "
@@ -2968,8 +3521,15 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                        p2p_get_dev_addr(wpa_s->global->p2p, peer_addr,
                                         dev_addr);
                }
-               if (wpas_p2p_join(wpa_s, iface_addr, dev_addr, wps_method) <
-                   0)
+               if (auto_join) {
+                       os_get_time(&wpa_s->p2p_auto_started);
+                       wpa_printf(MSG_DEBUG, "P2P: Auto join started at "
+                                  "%ld.%06ld",
+                                  wpa_s->p2p_auto_started.sec,
+                                  wpa_s->p2p_auto_started.usec);
+               }
+               if (wpas_p2p_join(wpa_s, iface_addr, dev_addr, wps_method,
+                                 auto_join) < 0)
                        return -1;
                return ret;
        }
@@ -3024,46 +3584,35 @@ int wpas_p2p_connect(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
 
        wpa_s->create_p2p_iface = wpas_p2p_create_iface(wpa_s);
 
-       if (!wpa_s->create_p2p_iface) {
-               if (auth) {
-                       if (wpas_p2p_auth_go_neg(wpa_s, peer_addr, wps_method,
-                                                go_intent, wpa_s->own_addr,
-                                                force_freq, persistent_group)
-                           < 0)
-                               return -1;
-                       return ret;
-               }
-               if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method,
-                                         go_intent, wpa_s->own_addr,
-                                         force_freq, persistent_group) < 0)
+       if (wpa_s->create_p2p_iface) {
+               /* Prepare to add a new interface for the group */
+               iftype = WPA_IF_P2P_GROUP;
+               if (go_intent == 15)
+                       iftype = WPA_IF_P2P_GO;
+               if (wpas_p2p_add_group_interface(wpa_s, iftype) < 0) {
+                       wpa_printf(MSG_ERROR, "P2P: Failed to allocate a new "
+                                  "interface for the group");
                        return -1;
-               return ret;
-       }
+               }
 
-       /* Prepare to add a new interface for the group */
-       iftype = WPA_IF_P2P_GROUP;
-       if (join)
-               iftype = WPA_IF_P2P_CLIENT;
-       else if (go_intent == 15)
-               iftype = WPA_IF_P2P_GO;
-       if (wpas_p2p_add_group_interface(wpa_s, iftype) < 0) {
-               wpa_printf(MSG_ERROR, "P2P: Failed to allocate a new "
-                          "interface for the group");
-               return -1;
-       }
+               if_addr = wpa_s->pending_interface_addr;
+       } else
+               if_addr = wpa_s->own_addr;
 
        if (auth) {
                if (wpas_p2p_auth_go_neg(wpa_s, peer_addr, wps_method,
-                                        go_intent,
-                                        wpa_s->pending_interface_addr,
-                                        force_freq, persistent_group) < 0)
+                                        go_intent, if_addr,
+                                        force_freq, persistent_group, ssid) <
+                   0)
                        return -1;
                return ret;
        }
-       if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method, go_intent,
-                                 wpa_s->pending_interface_addr,
-                                 force_freq, persistent_group) < 0) {
-               wpas_p2p_remove_pending_group_interface(wpa_s);
+
+       if (wpas_p2p_start_go_neg(wpa_s, peer_addr, wps_method,
+                                 go_intent, if_addr, force_freq,
+                                 persistent_group, ssid) < 0) {
+               if (wpa_s->create_p2p_iface)
+                       wpas_p2p_remove_pending_group_interface(wpa_s);
                return -1;
        }
        return ret;
@@ -3084,9 +3633,6 @@ void wpas_p2p_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
 {
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return;
-       wpa_s->roc_waiting_drv_freq = 0;
-       wpa_s->off_channel_freq = freq;
-       wpas_send_action_cb(wpa_s, NULL);
        if (wpa_s->off_channel_freq == wpa_s->pending_listen_freq) {
                p2p_listen_cb(wpa_s->global->p2p, wpa_s->pending_listen_freq,
                              wpa_s->pending_listen_duration);
@@ -3124,7 +3670,6 @@ void wpas_p2p_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
        wpa_printf(MSG_DEBUG, "P2P: Cancel remain-on-channel callback "
                   "(p2p_long_listen=%d ms pending_action_tx=%p)",
                   wpa_s->p2p_long_listen, wpa_s->pending_action_tx);
-       wpa_s->off_channel_freq = 0;
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return;
        if (p2p_listen_end(wpa_s->global->p2p, freq) > 0)
@@ -3177,15 +3722,16 @@ int wpas_p2p_group_remove(struct wpa_supplicant *wpa_s, const char *ifname)
 }
 
 
-static void wpas_p2p_init_go_params(struct wpa_supplicant *wpa_s,
-                                   struct p2p_go_neg_results *params,
-                                   int freq)
+static int wpas_p2p_init_go_params(struct wpa_supplicant *wpa_s,
+                                  struct p2p_go_neg_results *params,
+                                  int freq, int ht40)
 {
        u8 bssid[ETH_ALEN];
        int res;
 
        os_memset(params, 0, sizeof(*params));
        params->role_go = 1;
+       params->ht40 = ht40;
        if (freq) {
                wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on forced "
                           "frequency %d MHz", freq);
@@ -3223,7 +3769,18 @@ static void wpas_p2p_init_go_params(struct wpa_supplicant *wpa_s,
                wpa_printf(MSG_DEBUG, "P2P: Set GO freq based on best 5 GHz "
                           "channel %d MHz", params->freq);
        } else {
-               params->freq = 2412;
+               int chan;
+               for (chan = 0; chan < 11; chan++) {
+                       params->freq = 2412 + chan * 5;
+                       if (!wpas_p2p_disallowed_freq(wpa_s->global,
+                                                     params->freq))
+                               break;
+               }
+               if (chan == 11) {
+                       wpa_printf(MSG_DEBUG, "P2P: No 2.4 GHz channel "
+                                  "allowed");
+                       return -1;
+               }
                wpa_printf(MSG_DEBUG, "P2P: Set GO freq %d MHz (no preference "
                           "known)", params->freq);
        }
@@ -3240,7 +3797,16 @@ static void wpas_p2p_init_go_params(struct wpa_supplicant *wpa_s,
                wpa_printf(MSG_DEBUG, "P2P: Force GO on the channel we are "
                           "already using on a shared interface");
                params->freq = res;
+       } else if (res > 0 && freq != res &&
+                  !(wpa_s->drv_flags &
+                    WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT)) {
+               wpa_printf(MSG_DEBUG, "P2P: Cannot start P2P group on %u MHz "
+                          "while connected on another channel (%u MHz)",
+                          freq, res);
+               return -1;
        }
+
+       return 0;
 }
 
 
@@ -3277,7 +3843,7 @@ wpas_p2p_get_group_iface(struct wpa_supplicant *wpa_s, int addr_allocated,
  * i.e., without using Group Owner Negotiation.
  */
 int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,
-                      int freq)
+                      int freq, int ht40)
 {
        struct p2p_go_neg_results params;
        unsigned int r;
@@ -3285,6 +3851,10 @@ int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
 
+       /* Make sure we are not running find during connection establishment */
+       wpa_printf(MSG_DEBUG, "P2P: Stop any on-going P2P FIND");
+       wpas_p2p_stop_find(wpa_s);
+
        if (freq == 2) {
                wpa_printf(MSG_DEBUG, "P2P: Request to start GO on 2.4 GHz "
                           "band");
@@ -3331,7 +3901,15 @@ int wpas_p2p_group_add(struct wpa_supplicant *wpa_s, int persistent_group,
                return -1;
        }
 
-       wpas_p2p_init_go_params(wpa_s, &params, freq);
+       if (wpas_p2p_init_go_params(wpa_s, &params, freq, ht40))
+               return -1;
+       if (params.freq &&
+           !p2p_supported_freq(wpa_s->global->p2p, params.freq)) {
+               wpa_printf(MSG_DEBUG, "P2P: The selected channel for GO "
+                          "(%u MHz) is not supported for P2P uses",
+                          params.freq);
+               return -1;
+       }
        p2p_go_params(wpa_s->global->p2p, &params);
        params.persistent_group = persistent_group;
 
@@ -3390,7 +3968,7 @@ static int wpas_start_p2p_client(struct wpa_supplicant *wpa_s,
 
 int wpas_p2p_group_add_persistent(struct wpa_supplicant *wpa_s,
                                  struct wpa_ssid *ssid, int addr_allocated,
-                                 int freq)
+                                 int freq, int ht40)
 {
        struct p2p_go_neg_results params;
        int go = 0;
@@ -3408,13 +3986,16 @@ int wpas_p2p_group_add_persistent(struct wpa_supplicant *wpa_s,
        /* Make sure we are not running find during connection establishment */
        wpas_p2p_stop_find(wpa_s);
 
+       wpa_s->p2p_fallback_to_go_neg = 0;
+
        if (ssid->mode == WPAS_MODE_INFRA)
                return wpas_start_p2p_client(wpa_s, ssid, addr_allocated);
 
        if (ssid->mode != WPAS_MODE_P2P_GO)
                return -1;
 
-       wpas_p2p_init_go_params(wpa_s, &params, freq);
+       if (wpas_p2p_init_go_params(wpa_s, &params, freq, ht40))
+               return -1;
 
        params.role_go = 1;
        if (ssid->passphrase == NULL ||
@@ -3445,6 +4026,11 @@ static void wpas_p2p_ie_update(void *ctx, struct wpabuf *beacon_ies,
        struct wpa_supplicant *wpa_s = ctx;
        if (wpa_s->ap_iface) {
                struct hostapd_data *hapd = wpa_s->ap_iface->bss[0];
+               if (!(hapd->conf->p2p & P2P_GROUP_OWNER)) {
+                       wpabuf_free(beacon_ies);
+                       wpabuf_free(proberesp_ies);
+                       return;
+               }
                if (beacon_ies) {
                        wpabuf_free(hapd->p2p_beacon_ie);
                        hapd->p2p_beacon_ie = beacon_ies;
@@ -3473,8 +4059,7 @@ static void wpas_p2p_idle_update(void *ctx, int idle)
 
 
 struct p2p_group * wpas_p2p_group_init(struct wpa_supplicant *wpa_s,
-                                      int persistent_group,
-                                      int group_formation)
+                                      struct wpa_ssid *ssid)
 {
        struct p2p_group *group;
        struct p2p_group_config *cfg;
@@ -3488,13 +4073,18 @@ struct p2p_group * wpas_p2p_group_init(struct wpa_supplicant *wpa_s,
        if (cfg == NULL)
                return NULL;
 
-       cfg->persistent_group = persistent_group;
+       if (ssid->p2p_persistent_group && wpa_s->conf->persistent_reconnect)
+               cfg->persistent_group = 2;
+       else if (ssid->p2p_persistent_group)
+               cfg->persistent_group = 1;
        os_memcpy(cfg->interface_addr, wpa_s->own_addr, ETH_ALEN);
        if (wpa_s->max_stations &&
            wpa_s->max_stations < wpa_s->conf->max_num_sta)
                cfg->max_clients = wpa_s->max_stations;
        else
                cfg->max_clients = wpa_s->conf->max_num_sta;
+       os_memcpy(cfg->ssid, ssid->ssid, ssid->ssid_len);
+       cfg->ssid_len = ssid->ssid_len;
        cfg->cb_ctx = wpa_s;
        cfg->ie_update = wpas_p2p_ie_update;
        cfg->idle_update = wpas_p2p_idle_update;
@@ -3502,7 +4092,7 @@ struct p2p_group * wpas_p2p_group_init(struct wpa_supplicant *wpa_s,
        group = p2p_group_init(wpa_s->global->p2p, cfg);
        if (group == NULL)
                os_free(cfg);
-       if (!group_formation)
+       if (ssid->mode != WPAS_MODE_P2P_GROUP_FORMATION)
                p2p_group_notif_formation_done(group);
        wpa_s->p2p_group = group;
        return group;
@@ -3512,14 +4102,36 @@ struct p2p_group * wpas_p2p_group_init(struct wpa_supplicant *wpa_s,
 void wpas_p2p_wps_success(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                          int registrar)
 {
+       struct wpa_ssid *ssid = wpa_s->current_ssid;
+
        if (!wpa_s->p2p_in_provisioning) {
                wpa_printf(MSG_DEBUG, "P2P: Ignore WPS success event - P2P "
                           "provisioning not in progress");
                return;
        }
 
+       if (ssid && ssid->mode == WPAS_MODE_INFRA) {
+               u8 go_dev_addr[ETH_ALEN];
+               os_memcpy(go_dev_addr, wpa_s->bssid, ETH_ALEN);
+               wpas_p2p_persistent_group(wpa_s, go_dev_addr, ssid->ssid,
+                                         ssid->ssid_len);
+               /* Clear any stored provisioning info */
+               p2p_clear_provisioning_info(wpa_s->global->p2p, go_dev_addr);
+       }
+
        eloop_cancel_timeout(wpas_p2p_group_formation_timeout, wpa_s->parent,
                             NULL);
+       if (ssid && ssid->mode == WPAS_MODE_INFRA) {
+               /*
+                * Use a separate timeout for initial data connection to
+                * complete to allow the group to be removed automatically if
+                * something goes wrong in this step before the P2P group idle
+                * timeout mechanism is taken into use.
+                */
+               eloop_register_timeout(P2P_MAX_INITIAL_CONN_WAIT, 0,
+                                      wpas_p2p_group_formation_timeout,
+                                      wpa_s->parent, NULL);
+       }
        if (wpa_s->global->p2p)
                p2p_wps_success_cb(wpa_s->global->p2p, peer_addr);
        else if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
@@ -3536,35 +4148,66 @@ void wpas_p2p_wps_failed(struct wpa_supplicant *wpa_s,
                           "provisioning not in progress");
                return;
        }
+
+       if (wpa_s->go_params) {
+               p2p_clear_provisioning_info(
+                       wpa_s->global->p2p,
+                       wpa_s->go_params->peer_device_addr);
+       }
+
        wpas_notify_p2p_wps_failed(wpa_s, fail);
 }
 
 
 int wpas_p2p_prov_disc(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
-                      const char *config_method)
+                      const char *config_method,
+                      enum wpas_p2p_prov_disc_use use)
 {
        u16 config_methods;
 
-       if (os_strcmp(config_method, "display") == 0)
+       wpa_s->p2p_fallback_to_go_neg = 0;
+       wpa_s->pending_pd_use = NORMAL_PD;
+       if (os_strncmp(config_method, "display", 7) == 0)
                config_methods = WPS_CONFIG_DISPLAY;
-       else if (os_strcmp(config_method, "keypad") == 0)
+       else if (os_strncmp(config_method, "keypad", 6) == 0)
                config_methods = WPS_CONFIG_KEYPAD;
-       else if (os_strcmp(config_method, "pbc") == 0 ||
-                os_strcmp(config_method, "pushbutton") == 0)
+       else if (os_strncmp(config_method, "pbc", 3) == 0 ||
+                os_strncmp(config_method, "pushbutton", 10) == 0)
                config_methods = WPS_CONFIG_PUSHBUTTON;
-       else
+       else {
+               wpa_printf(MSG_DEBUG, "P2P: Unknown config method");
                return -1;
+       }
+
+       if (use == WPAS_P2P_PD_AUTO) {
+               os_memcpy(wpa_s->pending_join_dev_addr, peer_addr, ETH_ALEN);
+               wpa_s->pending_pd_config_methods = config_methods;
+               wpa_s->p2p_auto_pd = 1;
+               wpa_s->p2p_auto_join = 0;
+               wpa_s->pending_pd_before_join = 0;
+               wpa_s->auto_pd_scan_retry = 0;
+               wpas_p2p_stop_find(wpa_s);
+               wpa_s->p2p_join_scan_count = 0;
+               os_get_time(&wpa_s->p2p_auto_started);
+               wpa_printf(MSG_DEBUG, "P2P: Auto PD started at %ld.%06ld",
+                          wpa_s->p2p_auto_started.sec,
+                          wpa_s->p2p_auto_started.usec);
+               wpas_p2p_join_scan(wpa_s, NULL);
+               return 0;
+       }
 
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT) {
                return wpa_drv_p2p_prov_disc_req(wpa_s, peer_addr,
-                                                config_methods);
+                                                config_methods,
+                                                use == WPAS_P2P_PD_FOR_JOIN);
        }
 
        if (wpa_s->global->p2p == NULL || wpa_s->global->p2p_disabled)
                return -1;
 
        return p2p_prov_disc_req(wpa_s->global->p2p, peer_addr,
-                                config_methods, 0);
+                                config_methods, use == WPAS_P2P_PD_FOR_JOIN,
+                                0);
 }
 
 
@@ -3589,7 +4232,8 @@ static void wpas_p2p_clear_pending_action_tx(struct wpa_supplicant *wpa_s)
 
 int wpas_p2p_find(struct wpa_supplicant *wpa_s, unsigned int timeout,
                  enum p2p_discovery_type type,
-                 unsigned int num_req_dev_types, const u8 *req_dev_types)
+                 unsigned int num_req_dev_types, const u8 *req_dev_types,
+                 const u8 *dev_id, unsigned int search_delay)
 {
        wpas_p2p_clear_pending_action_tx(wpa_s);
        wpa_s->p2p_long_listen = 0;
@@ -3597,11 +4241,15 @@ int wpas_p2p_find(struct wpa_supplicant *wpa_s, unsigned int timeout,
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
                return wpa_drv_p2p_find(wpa_s, timeout, type);
 
-       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
+       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL ||
+           wpa_s->p2p_in_provisioning)
                return -1;
 
+       wpa_supplicant_cancel_sched_scan(wpa_s);
+
        return p2p_find(wpa_s->global->p2p, timeout, type,
-                       num_req_dev_types, req_dev_types);
+                       num_req_dev_types, req_dev_types, dev_id,
+                       search_delay);
 }
 
 
@@ -3611,6 +4259,7 @@ void wpas_p2p_stop_find(struct wpa_supplicant *wpa_s)
        wpa_s->p2p_long_listen = 0;
        eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
        eloop_cancel_timeout(wpas_p2p_join_scan, wpa_s, NULL);
+       wpa_s->global->p2p_cb_on_scan_complete = 0;
 
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT) {
                wpa_drv_p2p_stop_find(wpa_s);
@@ -3638,6 +4287,7 @@ int wpas_p2p_listen(struct wpa_supplicant *wpa_s, unsigned int timeout)
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
 
+       wpa_supplicant_cancel_sched_scan(wpa_s);
        wpas_p2p_clear_pending_action_tx(wpa_s);
 
        if (timeout == 0) {
@@ -3651,6 +4301,14 @@ int wpas_p2p_listen(struct wpa_supplicant *wpa_s, unsigned int timeout)
        eloop_cancel_timeout(wpas_p2p_long_listen_timeout, wpa_s, NULL);
        wpa_s->p2p_long_listen = 0;
 
+       /*
+        * Stop previous find/listen operation to avoid trying to request a new
+        * remain-on-channel operation while the driver is still running the
+        * previous one.
+        */
+       if (wpa_s->global->p2p)
+               p2p_stop_find(wpa_s->global->p2p);
+
        res = wpas_p2p_listen_start(wpa_s, timeout * 1000);
        if (res == 0 && timeout * 1000 > wpa_s->max_remain_on_chan) {
                wpa_s->p2p_long_listen = timeout * 1000;
@@ -3677,9 +4335,6 @@ int wpas_p2p_assoc_req_ie(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
                return -1;
 
        p2p_ie = wpa_bss_get_vendor_ie_multi(bss, P2P_IE_VENDOR_TYPE);
-#ifdef ANDROID_BRCM_P2P_PATCH 
-       if (p2p_ie == NULL) return -1;
-#endif
        ret = p2p_assoc_req_ie(wpa_s->global->p2p, bss->bssid, buf, len,
                               p2p_group, p2p_ie);
        wpabuf_free(p2p_ie);
@@ -3689,14 +4344,28 @@ int wpas_p2p_assoc_req_ie(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
 
 
 int wpas_p2p_probe_req_rx(struct wpa_supplicant *wpa_s, const u8 *addr,
-                         const u8 *ie, size_t ie_len)
+                         const u8 *dst, const u8 *bssid,
+                         const u8 *ie, size_t ie_len, int ssi_signal)
 {
        if (wpa_s->global->p2p_disabled)
                return 0;
        if (wpa_s->global->p2p == NULL)
                return 0;
 
-       return p2p_probe_req_rx(wpa_s->global->p2p, addr, ie, ie_len);
+       switch (p2p_probe_req_rx(wpa_s->global->p2p, addr, dst, bssid,
+                                ie, ie_len)) {
+       case P2P_PREQ_NOT_P2P:
+               wpas_notify_preq(wpa_s, addr, dst, bssid, ie, ie_len,
+                                ssi_signal);
+               /* fall through */
+       case P2P_PREQ_MALFORMED:
+       case P2P_PREQ_NOT_LISTEN:
+       case P2P_PREQ_NOT_PROCESSED:
+       default: /* make gcc happy */
+               return 0;
+       case P2P_PREQ_PROCESSED:
+               return 1;
+       }
 }
 
 
@@ -3721,7 +4390,7 @@ void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies)
        if (wpa_s->global->p2p == NULL)
                return;
 
-       p2p_scan_ie(wpa_s->global->p2p, ies);
+       p2p_scan_ie(wpa_s->global->p2p, ies, NULL);
 }
 
 
@@ -3729,6 +4398,11 @@ void wpas_p2p_group_deinit(struct wpa_supplicant *wpa_s)
 {
        p2p_group_deinit(wpa_s->p2p_group);
        wpa_s->p2p_group = NULL;
+
+       wpa_s->ap_configured_cb = NULL;
+       wpa_s->ap_configured_cb_ctx = NULL;
+       wpa_s->ap_configured_cb_data = NULL;
+       wpa_s->connect_without_scan = NULL;
 }
 
 
@@ -3748,14 +4422,14 @@ int wpas_p2p_reject(struct wpa_supplicant *wpa_s, const u8 *addr)
 
 /* Invite to reinvoke a persistent group */
 int wpas_p2p_invite(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
-                   struct wpa_ssid *ssid, const u8 *go_dev_addr)
+                   struct wpa_ssid *ssid, const u8 *go_dev_addr, int freq,
+                   int ht40)
 {
        enum p2p_invite_role role;
        u8 *bssid = NULL;
-#ifdef ANDROID_BRCM_P2P_PATCH
-       int go;
-#endif
 
+       wpa_s->p2p_persistent_go_freq = freq;
+       wpa_s->p2p_go_ht40 = !!ht40;
        if (ssid->mode == WPAS_MODE_P2P_GO) {
                role = P2P_INVITE_ROLE_GO;
                if (peer_addr == NULL) {
@@ -3763,19 +4437,6 @@ int wpas_p2p_invite(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                                   "address in invitation command");
                        return -1;
                }
-
-#ifdef ANDROID_BRCM_P2P_PATCH
-       wpa_printf(MSG_DEBUG, "P2P: Check to see if already runnig persistent wpa_s %p grp ssid %s ssid_len %d", wpa_s, ssid->ssid, ssid->ssid_len);
-       if(wpas_get_p2p_group(wpa_s, ssid->ssid, ssid->ssid_len, &go)) {
-               wpa_printf(MSG_DEBUG, "P2P: We are already running persistent group");
-               if (go)
-                       bssid = wpa_s->own_addr;
-               else
-                       wpa_printf(MSG_DEBUG, "P2P: We are running persistent group but go is not set");
-       } else {
-               wpa_printf(MSG_DEBUG, "P2P: We are NOT already running persistent group");
-#endif
-
                if (wpas_p2p_create_iface(wpa_s)) {
                        if (wpas_p2p_add_group_interface(wpa_s,
                                                         WPA_IF_P2P_GO) < 0) {
@@ -3787,9 +4448,6 @@ int wpas_p2p_invite(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                        bssid = wpa_s->pending_interface_addr;
                } else
                        bssid = wpa_s->own_addr;
-#ifdef ANDROID_BRCM_P2P_PATCH
-       }
-#endif
        } else {
                role = P2P_INVITE_ROLE_CLIENT;
                peer_addr = ssid->bssid;
@@ -3805,7 +4463,7 @@ int wpas_p2p_invite(struct wpa_supplicant *wpa_s, const u8 *peer_addr,
                return -1;
 
        return p2p_invite(wpa_s->global->p2p, peer_addr, role, bssid,
-                         ssid->ssid, ssid->ssid_len, 0, go_dev_addr, 1);
+                         ssid->ssid, ssid->ssid_len, freq, go_dev_addr, 1);
 }
 
 
@@ -3817,6 +4475,10 @@ int wpas_p2p_invite_group(struct wpa_supplicant *wpa_s, const char *ifname,
        enum p2p_invite_role role;
        u8 *bssid = NULL;
        struct wpa_ssid *ssid;
+       int persistent;
+
+       wpa_s->p2p_persistent_go_freq = 0;
+       wpa_s->p2p_go_ht40 = 0;
 
        for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
                if (os_strcmp(wpa_s->ifname, ifname) == 0)
@@ -3834,11 +4496,15 @@ int wpas_p2p_invite_group(struct wpa_supplicant *wpa_s, const char *ifname,
                return -1;
        }
 
+       persistent = ssid->p2p_persistent_group &&
+               wpas_p2p_get_persistent(wpa_s->parent, peer_addr,
+                                       ssid->ssid, ssid->ssid_len);
+
        if (ssid->mode == WPAS_MODE_P2P_GO) {
                role = P2P_INVITE_ROLE_ACTIVE_GO;
                bssid = wpa_s->own_addr;
                if (go_dev_addr == NULL)
-                       go_dev_addr = wpa_s->parent->own_addr;
+                       go_dev_addr = wpa_s->global->p2p_dev_addr;
        } else {
                role = P2P_INVITE_ROLE_CLIENT;
                if (wpa_s->wpa_state < WPA_ASSOCIATED) {
@@ -3856,14 +4522,14 @@ int wpas_p2p_invite_group(struct wpa_supplicant *wpa_s, const char *ifname,
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
                return wpa_drv_p2p_invite(wpa_s, peer_addr, role, bssid,
                                          ssid->ssid, ssid->ssid_len,
-                                         go_dev_addr, 0);
+                                         go_dev_addr, persistent);
 
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return -1;
 
        return p2p_invite(wpa_s->global->p2p, peer_addr, role, bssid,
                          ssid->ssid, ssid->ssid_len, wpa_s->assoc_freq,
-                         go_dev_addr, 0);
+                         go_dev_addr, persistent);
 }
 
 
@@ -3874,9 +4540,15 @@ void wpas_p2p_completed(struct wpa_supplicant *wpa_s)
        u8 go_dev_addr[ETH_ALEN];
        int network_id = -1;
        int persistent;
+       int freq;
+
+       if (ssid == NULL || ssid->mode != WPAS_MODE_P2P_GROUP_FORMATION) {
+               eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
+                                    wpa_s->parent, NULL);
+       }
 
        if (!wpa_s->show_group_started || !ssid)
-               return;
+               goto done;
 
        wpa_s->show_group_started = 0;
 
@@ -3891,28 +4563,22 @@ void wpas_p2p_completed(struct wpa_supplicant *wpa_s)
        if (wpa_s->global->p2p_group_formation == wpa_s)
                wpa_s->global->p2p_group_formation = NULL;
 
+       freq = wpa_s->current_bss ? wpa_s->current_bss->freq :
+               (int) wpa_s->assoc_freq;
        if (ssid->passphrase == NULL && ssid->psk_set) {
                char psk[65];
                wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32);
                wpa_msg(wpa_s->parent, MSG_INFO, P2P_EVENT_GROUP_STARTED
                        "%s client ssid=\"%s\" freq=%d psk=%s go_dev_addr="
                        MACSTR "%s",
-               #ifdef ANDROID_BRCM_P2P_PATCH
-                       wpa_s->ifname, ssid_txt, wpa_s->current_bss->freq, psk,
-               #else
-                       wpa_s->ifname, ssid_txt, ssid->frequency, psk,
-               #endif
+                       wpa_s->ifname, ssid_txt, freq, psk,
                        MAC2STR(go_dev_addr),
                        persistent ? " [PERSISTENT]" : "");
        } else {
                wpa_msg(wpa_s->parent, MSG_INFO, P2P_EVENT_GROUP_STARTED
                        "%s client ssid=\"%s\" freq=%d passphrase=\"%s\" "
                        "go_dev_addr=" MACSTR "%s",
-               #ifdef ANDROID_BRCM_P2P_PATCH
-                       wpa_s->ifname, ssid_txt, wpa_s->current_bss->freq,
-               #else
-                       wpa_s->ifname, ssid_txt, ssid->frequency,
-               #endif
+                       wpa_s->ifname, ssid_txt, freq,
                        ssid->passphrase ? ssid->passphrase : "",
                        MAC2STR(go_dev_addr),
                        persistent ? " [PERSISTENT]" : "");
@@ -3924,6 +4590,19 @@ void wpas_p2p_completed(struct wpa_supplicant *wpa_s)
        if (network_id < 0)
                network_id = ssid->id;
        wpas_notify_p2p_group_started(wpa_s, ssid, network_id, 1);
+
+done:
+       if (wpa_s->global->p2p_cb_on_scan_complete && !wpa_s->global->p2p_disabled &&
+           wpa_s->global->p2p != NULL) {
+               wpa_s->global->p2p_cb_on_scan_complete = 0;
+               if (p2p_other_scan_completed(wpa_s->global->p2p) == 1) {
+                       wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Pending P2P operation "
+                               "continued after successful connection");
+                       p2p_increase_search_delay(
+                               wpa_s->global->p2p,
+                               wpas_p2p_search_delay(wpa_s));
+               }
+       }
 }
 
 
@@ -3959,11 +4638,19 @@ int wpas_p2p_ext_listen(struct wpa_supplicant *wpa_s, unsigned int period,
 }
 
 
+static int wpas_p2p_is_client(struct wpa_supplicant *wpa_s)
+{
+       return wpa_s->current_ssid != NULL &&
+               wpa_s->current_ssid->p2p_group &&
+               wpa_s->current_ssid->mode == WPAS_MODE_INFRA;
+}
+
+
 static void wpas_p2p_group_idle_timeout(void *eloop_ctx, void *timeout_ctx)
 {
        struct wpa_supplicant *wpa_s = eloop_ctx;
 
-       if (wpa_s->conf->p2p_group_idle == 0) {
+       if (wpa_s->conf->p2p_group_idle == 0 && !wpas_p2p_is_client(wpa_s)) {
                wpa_printf(MSG_DEBUG, "P2P: Ignore group idle timeout - "
                           "disabled");
                return;
@@ -3971,64 +4658,109 @@ static void wpas_p2p_group_idle_timeout(void *eloop_ctx, void *timeout_ctx)
 
        wpa_printf(MSG_DEBUG, "P2P: Group idle timeout reached - terminate "
                   "group");
-       wpa_s->removal_reason = P2P_GROUP_REMOVAL_IDLE_TIMEOUT;
-       wpas_p2p_group_delete(wpa_s);
+       wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_IDLE_TIMEOUT);
 }
 
 
 static void wpas_p2p_set_group_idle_timeout(struct wpa_supplicant *wpa_s)
 {
-       eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
-       if (wpa_s->conf->p2p_group_idle == 0)
-               return;
+       int timeout;
+
+       if (eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
+               wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
 
        if (wpa_s->current_ssid == NULL || !wpa_s->current_ssid->p2p_group)
                return;
 
-       wpa_printf(MSG_DEBUG, "P2P: Set P2P group idle timeout to %u seconds",
-                  wpa_s->conf->p2p_group_idle);
-       eloop_register_timeout(wpa_s->conf->p2p_group_idle, 0,
-                              wpas_p2p_group_idle_timeout, wpa_s, NULL);
-}
+       timeout = wpa_s->conf->p2p_group_idle;
+       if (wpa_s->current_ssid->mode == WPAS_MODE_INFRA &&
+           (timeout == 0 || timeout > P2P_MAX_CLIENT_IDLE))
+           timeout = P2P_MAX_CLIENT_IDLE;
 
+       if (timeout == 0)
+               return;
 
-void wpas_p2p_deauth_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
-                          u16 reason_code, const u8 *ie, size_t ie_len)
-{
-       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
+       if (timeout < 0) {
+               if (wpa_s->current_ssid->mode == WPAS_MODE_INFRA)
+                       timeout = 0; /* special client mode no-timeout */
+               else
+                       return;
+       }
+
+       if (wpa_s->p2p_in_provisioning) {
+               /*
+                * Use the normal group formation timeout during the
+                * provisioning phase to avoid terminating this process too
+                * early due to group idle timeout.
+                */
+               wpa_printf(MSG_DEBUG, "P2P: Do not use P2P group idle timeout "
+                          "during provisioning");
                return;
-       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
+       }
+#ifndef ANDROID_P2P
+       if (wpa_s->show_group_started) {
+               /*
+                * Use the normal group formation timeout between the end of
+                * the provisioning phase and completion of 4-way handshake to
+                * avoid terminating this process too early due to group idle
+                * timeout.
+                */
+               wpa_printf(MSG_DEBUG, "P2P: Do not use P2P group idle timeout "
+                          "while waiting for initial 4-way handshake to "
+                          "complete");
                return;
+       }
+#endif
 
-       p2p_deauth_notif(wpa_s->global->p2p, bssid, reason_code, ie, ie_len);
+       wpa_printf(MSG_DEBUG, "P2P: Set P2P group idle timeout to %u seconds",
+                  timeout);
+       eloop_register_timeout(timeout, 0, wpas_p2p_group_idle_timeout,
+                              wpa_s, NULL);
 }
 
-#ifdef ANDROID_BRCM_P2P_PATCH
-void wpas_p2p_group_remove_notif(struct wpa_supplicant *wpa_s, u16 reason_code)
+
+/* Returns 1 if the interface was removed */
+int wpas_p2p_deauth_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
+                         u16 reason_code, const u8 *ie, size_t ie_len,
+                         int locally_generated)
 {
-       if(wpa_s->global->p2p_disabled)
-               return;
+       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
+               return 0;
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
+               return 0;
 
-       /* If we are running a P2P Client and we received a Deauth/Disassoc from the Go, then remove 
-          the virutal interface on which the client is running. */
-       if((wpa_s != wpa_s->parent) && (wpa_s->p2p_group_interface == P2P_GROUP_INTERFACE_CLIENT) && (wpa_s->key_mgmt != WPA_KEY_MGMT_WPS)) {
+       if (!locally_generated)
+               p2p_deauth_notif(wpa_s->global->p2p, bssid, reason_code, ie,
+                                ie_len);
 
-               wpa_printf(MSG_DEBUG, "P2P: [EVENT_DEAUTH] Removing P2P_CLIENT virtual intf.");
-               wpa_supplicant_cancel_scan(wpa_s);
-               wpas_p2p_interface_unavailable(wpa_s);
+       if (reason_code == WLAN_REASON_DEAUTH_LEAVING && !locally_generated &&
+           wpa_s->current_ssid &&
+           wpa_s->current_ssid->p2p_group &&
+           wpa_s->current_ssid->mode == WPAS_MODE_INFRA) {
+               wpa_printf(MSG_DEBUG, "P2P: GO indicated that the P2P Group "
+                          "session is ending");
+               if (wpas_p2p_group_delete(wpa_s,
+                                         P2P_GROUP_REMOVAL_GO_ENDING_SESSION)
+                   > 0)
+                       return 1;
        }
+
+       return 0;
 }
-#endif
+
 
 void wpas_p2p_disassoc_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
-                            u16 reason_code, const u8 *ie, size_t ie_len)
+                            u16 reason_code, const u8 *ie, size_t ie_len,
+                            int locally_generated)
 {
        if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
                return;
        if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_MGMT)
                return;
 
-       p2p_disassoc_notif(wpa_s->global->p2p, bssid, reason_code, ie, ie_len);
+       if (!locally_generated)
+               p2p_disassoc_notif(wpa_s->global->p2p, bssid, reason_code, ie,
+                                  ie_len);
 }
 
 
@@ -4144,6 +4876,14 @@ void wpas_p2p_update_config(struct wpa_supplicant *wpa_s)
                        wpa_printf(MSG_ERROR, "P2P: Own oper channel update "
                                   "failed: %d", ret);
        }
+
+       if (wpa_s->conf->changed_parameters & CFG_CHANGED_P2P_PREF_CHAN) {
+               if (p2p_set_pref_chan(p2p, wpa_s->conf->num_p2p_pref_chan,
+                                     wpa_s->conf->p2p_pref_chan) < 0) {
+                       wpa_printf(MSG_ERROR, "P2P: Preferred channel list "
+                                  "update failed");
+               }
+       }
 }
 
 
@@ -4242,15 +4982,18 @@ void wpas_p2p_notif_connected(struct wpa_supplicant *wpa_s)
                wpas_p2p_disable_cross_connect(wpa_s);
        else
                wpas_p2p_enable_cross_connect(wpa_s);
-       if (!wpa_s->ap_iface)
-               eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL);
+       if (!wpa_s->ap_iface &&
+           eloop_cancel_timeout(wpas_p2p_group_idle_timeout, wpa_s, NULL) > 0)
+               wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
 }
 
 
 void wpas_p2p_notif_disconnected(struct wpa_supplicant *wpa_s)
 {
        wpas_p2p_disable_cross_connect(wpa_s);
-       if (!wpa_s->ap_iface)
+       if (!wpa_s->ap_iface &&
+           !eloop_is_timeout_registered(wpas_p2p_group_idle_timeout,
+                                        wpa_s, NULL))
                wpas_p2p_set_group_idle_timeout(wpa_s);
 }
 
@@ -4353,6 +5096,7 @@ int wpas_p2p_cancel(struct wpa_supplicant *wpa_s)
                wpa_printf(MSG_DEBUG, "P2P: Unauthorize pending GO Neg peer "
                           MACSTR, MAC2STR(peer));
                p2p_unauthorize(global->p2p, peer);
+               found = 1;
        }
 
        wpas_p2p_stop_find(wpa_s);
@@ -4368,7 +5112,8 @@ int wpas_p2p_cancel(struct wpa_supplicant *wpa_s)
                        found = 1;
                        eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
                                             wpa_s->parent, NULL);
-                       wpas_p2p_group_delete(wpa_s);
+                       wpas_p2p_group_delete(wpa_s,
+                                             P2P_GROUP_REMOVAL_REQUESTED);
                        break;
                }
        }
@@ -4389,8 +5134,7 @@ void wpas_p2p_interface_unavailable(struct wpa_supplicant *wpa_s)
 
        wpa_printf(MSG_DEBUG, "P2P: Remove group due to driver resource not "
                   "being available anymore");
-       wpa_s->removal_reason = P2P_GROUP_REMOVAL_UNAVAILABLE;
-       wpas_p2p_group_delete(wpa_s);
+       wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_UNAVAILABLE);
 }
 
 
@@ -4436,8 +5180,194 @@ int wpas_p2p_disconnect(struct wpa_supplicant *wpa_s)
        if (wpa_s == NULL)
                return -1;
 
-       wpa_s->removal_reason = P2P_GROUP_REMOVAL_REQUESTED;
-       wpas_p2p_group_delete(wpa_s);
+       return wpas_p2p_group_delete(wpa_s, P2P_GROUP_REMOVAL_REQUESTED) < 0 ?
+               -1 : 0;
+}
+
+
+int wpas_p2p_in_progress(struct wpa_supplicant *wpa_s)
+{
+       if (wpa_s->global->p2p_disabled || wpa_s->global->p2p == NULL)
+               return 0;
+
+       return p2p_in_progress(wpa_s->global->p2p);
+}
+
+
+void wpas_p2p_network_removed(struct wpa_supplicant *wpa_s,
+                             struct wpa_ssid *ssid)
+{
+       if (wpa_s->p2p_in_provisioning && ssid->p2p_group &&
+           eloop_cancel_timeout(wpas_p2p_group_formation_timeout,
+                                wpa_s->parent, NULL) > 0) {
+               /**
+                * Remove the network by scheduling the group formation
+                * timeout to happen immediately. The teardown code
+                * needs to be scheduled to run asynch later so that we
+                * don't delete data from under ourselves unexpectedly.
+                * Calling wpas_p2p_group_formation_timeout directly
+                * causes a series of crashes in WPS failure scenarios.
+                */
+               wpa_printf(MSG_DEBUG, "P2P: Canceled group formation due to "
+                          "P2P group network getting removed");
+               eloop_register_timeout(0, 0, wpas_p2p_group_formation_timeout,
+                                      wpa_s->parent, NULL);
+       }
+}
+
+
+struct wpa_ssid * wpas_p2p_get_persistent(struct wpa_supplicant *wpa_s,
+                                         const u8 *addr, const u8 *ssid,
+                                         size_t ssid_len)
+{
+       struct wpa_ssid *s;
+       size_t i;
+
+       for (s = wpa_s->conf->ssid; s; s = s->next) {
+               if (s->disabled != 2)
+                       continue;
+               if (ssid &&
+                   (ssid_len != s->ssid_len ||
+                    os_memcmp(ssid, s->ssid, ssid_len) != 0))
+                       continue;
+               if (os_memcmp(s->bssid, addr, ETH_ALEN) == 0)
+                       return s; /* peer is GO in the persistent group */
+               if (s->mode != WPAS_MODE_P2P_GO || s->p2p_client_list == NULL)
+                       continue;
+               for (i = 0; i < s->num_p2p_clients; i++) {
+                       if (os_memcmp(s->p2p_client_list + i * ETH_ALEN,
+                                     addr, ETH_ALEN) == 0)
+                               return s; /* peer is P2P client in persistent
+                                          * group */
+               }
+       }
+
+       return NULL;
+}
+
+
+void wpas_p2p_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
+                                      const u8 *addr)
+{
+       if (addr == NULL)
+               return;
+       wpas_p2p_add_persistent_group_client(wpa_s, addr);
+}
+
+
+static void wpas_p2p_fallback_to_go_neg(struct wpa_supplicant *wpa_s,
+                                       int group_added)
+{
+       struct wpa_supplicant *group = wpa_s;
+       eloop_cancel_timeout(wpas_p2p_pd_before_join_timeout, wpa_s, NULL);
+       if (wpa_s->global->p2p_group_formation)
+               group = wpa_s->global->p2p_group_formation;
+       wpa_s = wpa_s->parent;
+       offchannel_send_action_done(wpa_s);
+       if (group_added)
+               wpas_p2p_group_delete(group, P2P_GROUP_REMOVAL_SILENT);
+       wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Fall back to GO Negotiation");
+       wpas_p2p_connect(wpa_s, wpa_s->pending_join_dev_addr, wpa_s->p2p_pin,
+                        wpa_s->p2p_wps_method, wpa_s->p2p_persistent_group, 0,
+                        0, 0, wpa_s->p2p_go_intent, wpa_s->p2p_connect_freq,
+                        wpa_s->p2p_persistent_id,
+                        wpa_s->p2p_pd_before_go_neg,
+                        wpa_s->p2p_go_ht40);
+}
+
+
+int wpas_p2p_scan_no_go_seen(struct wpa_supplicant *wpa_s)
+{
+       if (!wpa_s->p2p_fallback_to_go_neg ||
+           wpa_s->p2p_in_provisioning <= 5)
+               return 0;
+
+       if (wpas_p2p_peer_go(wpa_s, wpa_s->pending_join_dev_addr) > 0)
+               return 0; /* peer operating as a GO */
+
+       wpa_dbg(wpa_s, MSG_DEBUG, "P2P: GO not found for p2p_connect-auto - "
+               "fallback to GO Negotiation");
+       wpas_p2p_fallback_to_go_neg(wpa_s, 1);
 
+       return 1;
+}
+
+
+unsigned int wpas_p2p_search_delay(struct wpa_supplicant *wpa_s)
+{
+       const char *rn, *rn2;
+       struct wpa_supplicant *ifs;
+
+       if (wpa_s->wpa_state > WPA_SCANNING) {
+               wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Use %u ms search delay due to "
+                       "concurrent operation",
+                       P2P_CONCURRENT_SEARCH_DELAY);
+               return P2P_CONCURRENT_SEARCH_DELAY;
+       }
+
+       if (!wpa_s->driver->get_radio_name)
+               return 0;
+       rn = wpa_s->driver->get_radio_name(wpa_s->drv_priv);
+       if (rn == NULL || rn[0] == '\0')
+               return 0;
+
+       for (ifs = wpa_s->global->ifaces; ifs; ifs = ifs->next) {
+               if (ifs == wpa_s || !ifs->driver->get_radio_name)
+                       continue;
+
+               rn2 = ifs->driver->get_radio_name(ifs->drv_priv);
+               if (!rn2 || os_strcmp(rn, rn2) != 0)
+                       continue;
+               if (ifs->wpa_state > WPA_SCANNING) {
+                       wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Use %u ms search "
+                               "delay due to concurrent operation on "
+                               "interface %s",
+                               P2P_CONCURRENT_SEARCH_DELAY, ifs->ifname);
+                       return P2P_CONCURRENT_SEARCH_DELAY;
+               }
+       }
+
+       return 0;
+}
+
+#ifdef ANDROID_P2P
+int wpas_p2p_handle_frequency_conflicts(struct wpa_supplicant *wpa_s, int freq)
+{
+       struct wpa_supplicant *iface = NULL;
+       struct p2p_data *p2p = wpa_s->global->p2p;
+
+       for (iface = wpa_s->global->ifaces; iface; iface = iface->next) {
+               if((iface->p2p_group_interface) && (iface->current_ssid) &&
+                       (iface->current_ssid->frequency != freq)) {
+
+                       if (iface->p2p_group_interface == P2P_GROUP_INTERFACE_GO) {
+                                       /* Try to see whether we can move the GO. If it
+                                        * is not possible, remove the GO interface
+                                        */
+                                       if(wpa_drv_switch_channel(iface, freq) == 0) {
+                                                       wpa_printf(MSG_ERROR, "P2P: GO Moved to freq(%d)", freq);
+                                                       iface->current_ssid->frequency = freq;
+                                                       continue;
+                                       }
+                       }
+
+                       /* If GO cannot be moved or if the conflicting interface is a
+                        * P2P Client, remove the interface depending up on the connection
+                        * priority */
+                       if(!wpas_is_p2p_prioritized(wpa_s)) {
+                               /* STA connection has priority over existing
+                                * P2P connection. So remove the interface */
+                               wpa_printf(MSG_DEBUG, "P2P: Removing P2P connection due to Single channel"
+                                               "concurrent mode frequency conflict");
+                               wpas_p2p_group_delete(iface, P2P_GROUP_REMOVAL_FREQ_CONFLICT);
+                       } else {
+                               /* Existing connection has the priority. Disable the newly
+                 * selected network and let the application know about it.
+                                */
+                               return -1;
+                       }
+               }
+       }
        return 0;
 }
+#endif