aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/ctrl_iface.c
Commit message (Collapse)AuthorAgeFilesLines
* P2PS: Allow P2P_CONNECT command for P2PS connection with/without PINPurushottam Kushwaha2016-05-191-2/+2
| | | | | | | | | | | | | This allows using P2PS config method with or without PIN for connection. wpa_supplicant should internally handle the default PIN "12345670" and shall also allow connection irrespective of PIN used in P2P_CONNECT. For example, 1. P2P_CONNECT 02:2a:fb:22:22:33 p2ps 2. P2P_CONNECT 02:2a:fb:22:22:33 xxxxxxxx p2ps Where the second one is maintained for backwards compatibility. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Fix external radio work debug printing on removalJouni Malinen2016-05-161-0/+7
| | | | | | | | | | work->type was pointing to the allocated work->ctx buffer and the debug print in radio_work_free() ended up using freed memory if a started external radio work was removed as part of FLUSH command operations. Fix this by updating work->type to point to a constant string in case the dynamic version gets freed. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Add MGMT_RX_PROCESS test command for wpa_supplicantJouni Malinen2016-05-131-0/+73
| | | | | | | | | | This makes it easier to write hwsim test cases to verify management frame processing sequences with dropped or modified frames. When ext_mgmt_frame_handling is used, this new command can be used to request wpa_supplicant to process a received a management frame, e.g., based on information reported in the MGMT-RX events. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Add P2P_GROUP_MEMBER command to fetch client interface addressPurushottam Kushwaha2016-04-181-0/+27
| | | | | | | | | | | | | | | This allows local GO to fetch the P2P Interface Address of a P2P Client in the group based on the P2P Device Address for the client. This command should be sent only on a group interface (the same peer may be in multiple concurrent groups). Usage: P2P_GROUP_MEMBER <P2P Device Address> Output: <P2P Interface Address> Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
* RRM: Modify the processing of a received neighbor reportIlan Peer2016-04-171-6/+94
| | | | | | | | | | | | Parse a received neighbor report and report for each neighbor report the data received for it: RRM-NEIGHBOR-REP-RECEIVED bssid=<BSSID> info=0x<hex> op_class=<class> chan=<chan> [lci=hex] [civic=hex] Note that this modifies the previous format that originally reported only the length of the received frame. Signed-off-by: Ilan Peer <ilan.peer@intel.com>
* wpa_supplicant: Handle LCI requestDavid Spinadel2016-04-171-0/+29
| | | | | | | | | | | | | | Handle radio measurement request that contains LCI request. Send measurement report based on a configurable LCI report element. The LCI report element is configured over the control interface with SET lci <hexdump of the element> and cleared with SET lci "" Signed-off-by: David Spinadel <david.spinadel@intel.com>
* Fix spelling of "neighbor" in a function nameJouni Malinen2016-04-161-3/+3
| | | | | | The missing letter 'h' made it more difficult to find this function. Signed-off-by: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Add LCI and civic request to Neighbor Report RequestDavid Spinadel2016-04-161-8/+26
| | | | | | | | | | | | | | | | Add an option to request LCI and Location Civic Measurement in Neighbor Report Request frame, as described in IEEE P802.11-REVmc/D5.0, 9.6.7.6. Note: This changes the encoding format of the NEIGHBOR_REP_REQUEST ssid=<val> parameter. This used to be parsed as raw SSID data which is problematic for accepting additional parameters. The new encoding allows either a string within double-quotation marks or a hexdump of the raw SSID. Thew new format: NEIGHBOR_REP_REQUEST [ssid=<SSID>] [lci] [civic] Signed-off-by: David Spinadel <david.spinadel@intel.com>
* Do not clear PMKSA entry or EAP session cache if config does not changeBala Krishna Bhamidipati2016-03-311-1/+6
| | | | | | | | | | | | | | | | | | | This avoids unnecessary flushing of the PMKSA cache entry and EAP session data when processing SET_NETWORK commands that set a network profile parameter to the same value that the parameter already has. Introduce a new wpa_config_set() and wpa_config_set_quoted() return value (==1) signifying that the new value being set for the corresponding field equals to the already configured one so that the caller can determine that nothing changed in the profile. For now, this does not cover all the network profile parameters, but number of the most commonly used parameters are included to cover the Android use cases where the framework may have issued SET_NETWORK commands that would have unnecessarily prevented use of PMKSA caching or EAP fast reauthentication. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* mesh: Add support for PMKSA cachingMasashi Honma2016-03-201-1/+11
| | | | | | | | | | | | | | | | | | | | | | | | | This patch add functionality of mesh SAE PMKSA caching. If the local STA already has peer's PMKSA entry in the cache, skip SAE authentication and start AMPE with the cached value. If the peer does not support PMKSA caching or does not have the local STA's PMKSA entry in the cache, AMPE will fail and the PMKSA cache entry of the peer will be removed. Then STA retries with ordinary SAE authentication. If the peer does not support PMKSA caching and the local STA uses no_auto_peer=1, the local STA can not retry SAE authentication because NEW_PEER_CANDIDATE event cannot start SAE authentication when no_auto_peer=1. So this patch extends MESH_PEER_ADD command to use duration(sec). Throughout the duration, the local STA can start SAE authentication triggered by NEW_PEER_CANDIDATE even though no_auto_peer=1. This commit requires commit 70c93963edefa37ef84b73efb9d04ea10268341c ('SAE: Fix PMKID calculation for PMKSA cache'). Without that commit, chosen PMK comparison will fail. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* PMKSA: Flush AP/mesh PMKSA cache by PMKSA_FLUSH commandMasashi Honma2016-03-201-1/+10
| | | | | | | | | This extends the wpa_supplicant PMKSA_FLUSH control interface command to allow the PMKSA list from the authenticator side to be flushed for AP and mesh mode. In addition, this adds a hostapd PMKSA_FLUSH control interface command to flush the PMKSA entries. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* PMKSA: Show AP/mesh PMKSA list in PMKSA commandMasashi Honma2016-03-201-2/+15
| | | | | | | | | This extends the wpa_supplicant PMKSA control interface command to allow the PMKSA list from the authenticator side to be listed for AP and mesh mode. In addition, this adds a hostapd PMKSA control interface command to show the same list for the AP case. Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* mesh: Add MESH_PEER_ADD commandMasashi Honma2016-03-201-0/+15
| | | | | | | | This allows a mesh peer connection to be initiated manually in no_auto_peer mesh networks. Signed-off-by: Natsuki Itaya <Natsuki.Itaya@jp.sony.com> Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* mesh: Add MESH_PEER_REMOVE commandMasashi Honma2016-03-201-0/+15
| | | | | | | This command allows the specified mesh peer to be disconnected. Signed-off-by: Natsuki Itaya <Natsuki.Itaya@jp.sony.com> Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
* Do not invalidate EAP session cache on all network block parameter changesJouni Malinen2016-03-161-7/+9
| | | | | | | | | | | The bssid and priority parameters in a network block do not have any effect on the validity of an EAP session entry, so avoid flushing the cached session when only these parameters are changed. This is mainly to allow forced roaming or network selection changes without causing fast reauthentication to be disabled if the changes are done during RSN association that used EAP. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Add optional op_class argument to P2P_SET listen_channelLior David2016-03-071-2/+9
| | | | | | | | | | | The existing implementation in p2p_ctrl_set used a hard-coded operating class 81 which is only suitable for the social channels in the 2.4 GHz band, and will not work for the social channel in the 60 GHz band. Extend this by adding an optional op_class argument to P2P_SET listen_channel. If not specified, use the default value of 81 to match existing behavior. Signed-off-by: Lior David <qca_liord@qca.qualcomm.com>
* wpa_supplicant: Add ctrl parameter to INTERFACES commandJanusz Dziedzic2016-03-051-5/+19
| | | | | | | | "INTERFACES ctrl" can now be used to fetch a list of network interfaces and their control interfaces, e.g., to fetch the UDP port information for the control interface. Signed-off-by: Janusz Dziedzic <janusz.dziedzic@tieto.com>
* MBO: Send WNM-Notification when cellular capabilities changeAvraham Stern2016-02-221-0/+2
| | | | | | | Send a WNM-Notification to the associated AP to indicate changes in cellular data capabilities. Signed-off-by: Avraham Stern <avraham.stern@intel.com>
* WNM: Add candidate list to BSS transition queryAvraham Stern2016-02-221-4/+17
| | | | | | | | | | Add an option to configure a candidate list to BSS transition query ("list" as the second argument to WNM_BSS_QUERY). The candidate list is built from the available scan results. If no updated scan results (< 10 sec) are available, the command fails. Signed-off-by: David Spinadel <david.spinadel@intel.com> Signed-off-by: Avraham Stern <avraham.stern@intel.com>
* MBO: Implement MBO non-preferred channel report in Association RequestDavid Spinadel2016-02-221-0/+4
| | | | | | | Add MBO IE with non-preferred channels to (Re)Association Request frames. Signed-off-by: David Spinadel <david.spinadel@intel.com>
* WPS: Use only os_get_random() for PIN generationNick Lowe2016-02-191-1/+2
| | | | | | | | | Remove the fallback dependency on os_random() when generating a WPS pin. This is exceptionally unlikely to ever be called as the call to os_get_random() is unlikely to fail. The intention is to facilitate future removal of os_random() as it uses a low quality PRNG. Signed-off-by: Nick Lowe <nick.lowe@lugatech.com>
* ctype functions require an unsigned charRoy Marples2016-02-181-3/+3
| | | | | | | | Ensure that characters are represented as unsigned char when using isblank() and isspace(). These function take in a "int c" argument, but it needs to be unsigned for the cases where EOF is not indicated. Signed-off-by: Roy Marples <roy@marples.name>
* wpa_supplicant: Parse ifname argument from DATA_TEST_CONFIGMichael Braun2016-02-171-1/+9
| | | | | | This is required to test tagged VLANs. Signed-off-by: Michael Braun <michael-dev@fami-braun.de>
* P2P: Clear groups first on FLUSH commandJouni Malinen2016-01-061-1/+1
| | | | | | | | | | This is needed to get proper P2P group removal processing for some test cases. discovery_group_client followed by nfc_p2p_client was able to hit a case where the P2P group idle timeout survived to the next group instance because of the FLUSH command not clearing the group and this timeout properly. Signed-off-by: Jouni Malinen <j@w1.fi>
* Clear wpa_supplicant state to DISCONNECTED on FLUSH commandJouni Malinen2016-01-041-0/+8
| | | | | | | | | | | | | | It was possible for the FLUSH command to trigger auto connect mechanism to schedule a new scan in 100 ms. This is not desired since all the network profiles will be removed immediately and the scan or an attempt to reconnect would not be of any benefit here. Such a scan in 100 ms can cause issues for cases where multiple test sequences are run back to back, so prevent this by clearing wpa_supplicant state to DISCONNECTED (which avoids scheduling of the 100 ms scan trigger on disconnection) if the state was AUTHENTICATING or higher when the FLUSH command was issued. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS: Testing mechanism to force auth/encr type flagsJouni Malinen2016-01-011-0/+16
| | | | | | | | | | The new wps_force_{auth,encr}_types parameters can be used in test build (CONFIG_WPS_TESTING) to force wpa_supplicant to use the specified value in the Authentication/Encryption Type flags attribute. This can be used to test AP behavior on various error cases for which there are workarounds to cover deployed device behavior. Signed-off-by: Jouni Malinen <j@w1.fi>
* P2P: Add an option to specify group SSID in P2P_CONNECT join caseJouni Malinen2015-12-301-2/+21
| | | | | | | | | | | The new optional ssid=<hexdump> argument to P2P_CONNECT can be used to make P2P Client operations during join-an-existing-group more robust by filtering out scan results based on the SSID in addition to the P2P Device/Interface Address. This can help if the same MAC address has been used in multiple groups recently and the cached scan results may still include an older BSS. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Provide group SSID, if specified, to P2P Client join stepJouni Malinen2015-12-301-1/+1
| | | | | | | | | At least one of the wpas_p2p_connect() callers (NFC join case) already had access to the Group SSID. Pass that information through wpas_p2p_connect() to wpas_p2p_join() so that the join operation can filter out incorrect groups more easily. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Add "GET_CAPABILITY acs" to allow ACS build option to be detectedJouni Malinen2015-12-241-0/+9
| | | | | | | This allows upper layer software to check whether wpa_supplicant can use ACS for AP mode. Signed-off-by: Jouni Malinen <j@w1.fi>
* HS 2.0: Add a command to retrieve icon with in-memory storageJan Nordqvist2015-12-191-6/+60
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds a new command based Hotspot 2.0 icon retrieval option. In short, here is the new command sequence: 1. REQ_HS20_ICON <bssid> <file-name> 2. event: RX-HS20-ICON <bssid> <file-name> <size> 3. GET_HS20_ICON <bssid> <file-name> <offset> <size> (if needed, repeat with larger offset values until full icon is fetched) 5. DEL_HS20_ICON <bssid> <file-name> REQ_HS20_ICON is a new command that is analogous to HS20_ICON_REQUEST with the slight difference that an entry to store the icon in memory is prepared. The RX-HS20-ICON event has been augmented with BSSID, file-name and size, and GET_HS20_ICON is used to retrieve a chunk of up to <size> bytes of icon data at offset <offset>. Each chunk is returned as a base64 encoded fragment, preceded by "HS20-ICON-DATA", BSSID, and file-name as well as the starting offset of the data. If there is no entry prepared for the icon when the ANQP result comes back, hs20_process_icon_binary_file falls back to legacy behavior. Finally the DEL_HS20_ICON command deletes (all) icons associated with BSSID and file-name (there could be several if retries are used and they have different dialog tokens). Signed-off-by: Jan Nordqvist <jannq@google.com>
* wpa_supplicant: Add SIGNAL_MONITOR commandDmitry Shmidt2015-12-181-0/+25
| | | | | | | | | | | | | | | | | | | SIGNAL_MONITOR THRESHOLD=DD HYSTERESIS=DD command will request signal strength monitoring events based on there having been requested amount of drop in the signal strength. The threshold value is the RSSI threshold in dBm for the event to be sent. 0 threshold can be used to disable monitoring. The hysteresis value is RSSI hysteresis in dB to specify the minimum amount of change before a consecutive event is reported. With nl80211 driver interface, these values map to the NL80211_CMD_SET_CQM command with NL80211_ATTR_CQM_RSSI_THOLD and NL80211_ATTR_CQM_RSSI_HYST attributes to the driver. This command cannot be used when bgscan module is in use since that depends on being able to control the connection monitoring parameters. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Add TEST_ASSOC_IE for WPA/RSN IE testing on AP sideJouni Malinen2015-12-061-0/+33
| | | | | | | | | The new wpa_supplicant control interface command "TEST_ASSOC_IE <hexdump>" can now be used to override the WPA/RSN IE for Association Request frame and following 4-way handshake to allow protocol testing of AP side processing of WPA/RSN IE. Signed-off-by: Jouni Malinen <j@w1.fi>
* dbus: Add support for vendor specific elementsAvichal Agarwal2015-12-061-86/+9
| | | | | | | | | | | | | | | | | | The new methods are 1. VendorElemAdd "i" "ay" i=integer ay=array of bytes 2. VendorElemGet "i" i=integer (output array of bytes) 3. VendorElemRem "i" "ay" i=integer ay=array of bytes These provide functionality similar to the control interface commands VENDOR_ELEM_ADD, VENDOR_ELEM_GET, and VENDOR_ELEM_REMOVE. Signed-off-by: Avichal Agarwal <avichal.a@samsung.com> Signed-off-by: Purushottam Kushwaha <p.kushwaha@samsung.com> Signed-off-by: Kyeong-Chae Lim <kcya.lim@samsung.com> Signed-off-by: Mayank Haarit <mayank.h@samsung.com> Signed-off-by: Dilshad Ahmad <dilshad.a@samsung.com> [VendorElemGet to return array of bytes instead of string; cleanup] Signed-off-by: Jouni Malinen <j@w1.fi>
* Abort ongoing scans on FLUSH commandJouni Malinen2015-11-261-0/+2
| | | | | | | This may speed up some hwsim test case sequencies by avoiding a wait for a scan at the end of a test case to complete. Signed-off-by: Jouni Malinen <j@w1.fi>
* Add control interface command for aborting an ongoing scanJouni Malinen2015-11-261-0/+3
| | | | | | | The new ABORT_SCAN command can be used to request an ongoing scan to be aborted. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Add support for VHT 80+80 MHz and 160 MHzAhmad Kholaif2015-11-251-12/+71
| | | | | | | | | The new max_oper_chwidth and freq2 arguments to P2P_CONNECT, P2P_INVITE, and P2P_GROUP_ADD control interface commands can be used to request larger VHT operating channel bandwidth to be used than the previously used maximum 80 MHz. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Add a testing option to force P2P GO CSAIlan Peer2015-11-221-0/+3
| | | | | | | Add a testing option to force a P2P GO CSA on successful invitation to join an active P2P GO. Signed-off-by: Ilan Peer <ilan.peer@intel.com>
* Add an option to create interface of a certain type with INTERFACE_ADDAvraham Stern2015-11-221-4/+18
| | | | | | | | | | | | | | Some drivers do not support having two station interfaces, so the fact that wpa_supplicant always creates a new interface in station mode, even if it will be used as another type of interface, may prevent wpa_supplicant from creating new interfaces. Allow setting the interface type when a new interface is created so that interfaces of supported types can be created. Currently supported types are station ("sta") and AP ("ap"). If the interface type is not specified, a station interface will be created. Signed-off-by: Avraham Stern <avraham.stern@intel.com>
* WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been usedJouni Malinen2015-11-101-0/+1
| | | | | | | | The AP is not expected to send out a WNM-Sleep Mode Response frame without the STA trying to use WNM-Sleep Mode. Drop such unexpected responses to reduce unnecessary processing of the frame. Signed-off-by: Jouni Malinen <j@w1.fi>
* P2P: Add P2P_ASSOC_RESP to P2P vendor elementsAvraham Stern2015-10-161-0/+1
| | | | | | | | | | | Vendor specific IEs added to frame type P2P_ASSOC_RESP are saved in the interface context, but as they are added as part of the P2P IEs, they need to be saved in the global P2P context. Fix this by directing vendor specific IEs added to P2P_ASSOC_RESP frame type to the P2P context. Signed-off-by: Avraham Stern <avraham.stern@intel.com>
* P2PS: Indicate the chosen operating frequencyIlan Peer2015-10-111-0/+1
| | | | | | | | On successful P2P PD, report the chosen frequency in case the local device is going to be the P2P GO, so in can later be used to instantiate the new P2P GO, etc. Signed-off-by: Ilan Peer <ilan.peer@intel.com>
* Interworking: Fix wpa_supplicant build without CONFIG_HS20=yJouni Malinen2015-10-071-0/+2
| | | | Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Interworking: Support unknown ANQP-elements in BSS tableJouni Malinen2015-10-071-0/+11
| | | | | | | | | | This allows wpa_supplicant to expose internally unknown ANQP-elements in the BSS command. For example, "ANQP_GET <BSSID> 265" can be used to fetch the AP Geospatial Location ANQP-element and if the AP has this information, the "BSS <BSSID>" command will include the response as "anqp[265]=<hexdump>". Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Add wpa_supplicant EVENT_TEST control interface commandJouni Malinen2015-10-041-0/+30
| | | | | | This testing command makes it easier to debug bursts of event message. Signed-off-by: Jouni Malinen <j@w1.fi>
* Reduce debug verbosity for read-only control interface commandsJouni Malinen2015-09-101-6/+17
| | | | | | | | | | | Commands like BSS and GET_NETWORK are used in some cases very frequently and those can increase the amount of debug information from wpa_supplicant without significant benefit. These were logged at the DEBUG level (-d). Move logging of such read-only commands (i.e., no new wpa_supplicant operation is started based on it) to EXCESSIVE level (-ddd) which was already used for the PING command. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* Allow BSS to return information for AP that uses an invalid WSC IEJouni Malinen2015-08-291-2/+3
| | | | | | | | | Previously, the BSS command returned an error if the WSC IE(s) in scan results could not be parsed. This may be not ideal for all cases, to instead of rejecting the command completely, return all other information apart from the WPS information in such a case. Signed-off-by: Jouni Malinen <j@w1.fi>
* Remove unnecessary NULL check from LOG_LEVEL handlerJouni Malinen2015-08-211-1/+1
| | | | | | | cmd cannot be NULL here, so there is no need to check it before calling os_strlen(). Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2P: Require fresh scan results for persistent group re-invocationJouni Malinen2015-08-211-1/+5
| | | | | | | | | | | | | | | | | | The P2P group is not yet operating when going through invitation exchange for re-invocation. Previously, an old cached scan result could be used to skip the scan immediately after the invitation exchange. While this may result in the fastest possible connection, it does have some issues with cases where the GO takes some time to start up. It would also be at least theoretically possible for some of the BSS parameters to be different, so having a fresh scan result from the new GO instance may be desired in any case. Add a mechanism to skip scan results that have been last updated before a specific point in time and as the first user for this mechanism, require chan results to be more recent than the invitation message exchange for the P2P Client role in persistent group re-invocation case. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* P2PS: Authorize any peer for P2PS method if interface address not knownAndrei Otcheretianski2015-08-061-0/+1
| | | | | | | | | | | | | | | | | When P2PS PD with default P2PS method is done, the peer that becomes GO should authorize the client. However, P2PS specification doesn't require the client to include its intended interface address in PD Request/Response. As a result, the P2P Client's interface address may not be known and any address may need to be authorized. Previously, client's P2P Device Address was used for authorization, which is not correct when a dedicated interface is used for P2P Client. This is not resulting in a connection failure, however it causes a significant delay (until WPS_PIN_TIME_IGNORE_SEL_REG elapses). Fix this by authorizing the intended interface address, if known; or any address, if not known. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* P2PS: Fix PD PIN event notificationsMax Stepanov2015-08-061-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Change P2PS P2P-PROV-SHOW-PIN/P2P-PROV-ENTER-PIN event notifications on PD Request/Response handling to meet required P2PS behavior. The new implemented scheme: 1. For a legacy P2P provision discovery the event behavior remains without changes 2. P2PS PD, advertiser method: DISPLAY, autoaccept: TRUE: Advertiser: SHOW-PIN on PD request replied with a status SUCCESS Seeker: ENTER-PIN on PD response received with a status SUCCESS 3. P2PS PD, advertiser method: DISPLAY, autoaccept: FALSE: Advertiser: SHOW-PIN on PD request replied with a status INFO_CURRENTLY_UNAVAILABLE Seeker: ENTER-PIN on Follow-on PD request with a status SUCCESS_DEFERRED 4. P2PS PD, advertiser method: KEYPAD, autoaccept: TRUE/FALSE: Advertiser: ENTER-PIN on PD request replied with a status INFO_CURRENTLY_UNAVAILABLE Seeker: SHOW-PIN on PD response received with a status INFO_CURRENTLY_UNAVAILABLE This change in behavior breaks the existing test cases p2ps_connect_keypad_method_nonautoaccept and p2ps_connect_display_method_nonautoaccept. Those will be fixed in a followup commit. Signed-off-by: Max Stepanov <Max.Stepanov@intel.com> Reviewed-by: Ilan Peer <ilan.peer@intel.com>