]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/wpa/wpa_supplicant/wmm_ac.c
Merge OpenSSL 1.1.1b.
[FreeBSD/FreeBSD.git] / contrib / wpa / wpa_supplicant / wmm_ac.c
1 /*
2  * Wi-Fi Multimedia Admission Control (WMM-AC)
3  * Copyright(c) 2014, Intel Mobile Communication GmbH.
4  * Copyright(c) 2014, Intel Corporation. All rights reserved.
5  *
6  * This software may be distributed under the terms of the BSD license.
7  * See README for more details.
8  */
9
10 #include "includes.h"
11
12 #include "utils/common.h"
13 #include "utils/list.h"
14 #include "utils/eloop.h"
15 #include "common/ieee802_11_common.h"
16 #include "wpa_supplicant_i.h"
17 #include "bss.h"
18 #include "driver_i.h"
19 #include "wmm_ac.h"
20
21 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
22
23 static const enum wmm_ac up_to_ac[8] = {
24         WMM_AC_BK,
25         WMM_AC_BE,
26         WMM_AC_BE,
27         WMM_AC_BK,
28         WMM_AC_VI,
29         WMM_AC_VI,
30         WMM_AC_VO,
31         WMM_AC_VO
32 };
33
34
35 static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
36 {
37         return (tspec->ts_info[0] >> 1) & 0x0f;
38 }
39
40
41 static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
42 {
43         return (tspec->ts_info[0] >> 5) & 0x03;
44 }
45
46
47 static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
48 {
49         return (tspec->ts_info[1] >> 3) & 0x07;
50 }
51
52
53 static u8 wmm_ac_direction_to_idx(u8 direction)
54 {
55         switch (direction) {
56         case WMM_AC_DIR_UPLINK:
57                 return TS_DIR_IDX_UPLINK;
58         case WMM_AC_DIR_DOWNLINK:
59                 return TS_DIR_IDX_DOWNLINK;
60         case WMM_AC_DIR_BIDIRECTIONAL:
61                 return TS_DIR_IDX_BIDI;
62         default:
63                 wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
64                 return WMM_AC_DIR_UPLINK;
65         }
66 }
67
68
69 static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
70                          const struct wmm_tspec_element *tspec)
71 {
72         struct wmm_tspec_element *_tspec;
73         int ret;
74         u16 admitted_time = le_to_host16(tspec->medium_time);
75         u8 up = wmm_ac_get_user_priority(tspec);
76         u8 ac = up_to_ac[up];
77         u8 dir = wmm_ac_get_direction(tspec);
78         u8 tsid = wmm_ac_get_tsid(tspec);
79         enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
80
81         /* should have been verified before, but double-check here */
82         if (wpa_s->tspecs[ac][idx]) {
83                 wpa_printf(MSG_ERROR,
84                            "WMM AC: tspec (ac=%d, dir=%d) already exists!",
85                            ac, dir);
86                 return -1;
87         }
88
89         /* copy tspec */
90         _tspec = os_memdup(tspec, sizeof(*_tspec));
91         if (!_tspec)
92                 return -1;
93
94         if (dir != WMM_AC_DIR_DOWNLINK) {
95                 ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
96                 wpa_printf(MSG_DEBUG,
97                            "WMM AC: Add TS: addr=" MACSTR
98                            " TSID=%u admitted time=%u, ret=%d",
99                            MAC2STR(addr), tsid, admitted_time, ret);
100                 if (ret < 0) {
101                         os_free(_tspec);
102                         return -1;
103                 }
104         }
105
106         wpa_s->tspecs[ac][idx] = _tspec;
107
108         wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
109
110         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
111                 "tsid=%d addr=" MACSTR " admitted_time=%d",
112                 tsid, MAC2STR(addr), admitted_time);
113
114         return 0;
115 }
116
117
118 static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
119                               enum ts_dir_idx dir)
120 {
121         struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
122         u8 tsid;
123
124         if (!tspec)
125                 return;
126
127         tsid = wmm_ac_get_tsid(tspec);
128         wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
129
130         /* update the driver in case of uplink/bidi */
131         if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
132                 wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
133
134         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
135                 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
136
137         os_free(wpa_s->tspecs[ac][dir]);
138         wpa_s->tspecs[ac][dir] = NULL;
139 }
140
141
142 static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
143 {
144         struct wmm_ac_addts_request *req = wpa_s->addts_request;
145
146         if (!req)
147                 return;
148
149         if (failed)
150                 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
151                         "tsid=%u", wmm_ac_get_tsid(&req->tspec));
152
153         eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
154         wpa_s->addts_request = NULL;
155         os_free(req);
156 }
157
158
159 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
160 {
161         struct wpa_supplicant *wpa_s = eloop_ctx;
162         struct wmm_ac_addts_request *addts_req = timeout_ctx;
163
164         wpa_printf(MSG_DEBUG,
165                    "Timeout getting ADDTS response (tsid=%d up=%d)",
166                    wmm_ac_get_tsid(&addts_req->tspec),
167                    wmm_ac_get_user_priority(&addts_req->tspec));
168
169         wmm_ac_del_req(wpa_s, 1);
170 }
171
172
173 static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
174                                      const struct wmm_ac_addts_request *req)
175 {
176         struct wpabuf *buf;
177         int ret;
178
179         wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
180                    MAC2STR(req->address));
181
182         /* category + action code + dialog token + status + sizeof(tspec) */
183         buf = wpabuf_alloc(4 + sizeof(req->tspec));
184         if (!buf) {
185                 wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
186                 return -1;
187         }
188
189         wpabuf_put_u8(buf, WLAN_ACTION_WMM);
190         wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
191         wpabuf_put_u8(buf, req->dialog_token);
192         wpabuf_put_u8(buf, 0); /* status code */
193         wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
194
195         ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
196                                 wpa_s->own_addr, wpa_s->bssid,
197                                 wpabuf_head(buf), wpabuf_len(buf), 0);
198         if (ret) {
199                 wpa_printf(MSG_WARNING,
200                            "WMM AC: Failed to send ADDTS Request");
201         }
202
203         wpabuf_free(buf);
204         return ret;
205 }
206
207
208 static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
209                              const struct wmm_tspec_element *tspec,
210                              const u8 *address)
211 {
212         struct wpabuf *buf;
213         int ret;
214
215         /* category + action code + dialog token + status + sizeof(tspec) */
216         buf = wpabuf_alloc(4 + sizeof(*tspec));
217         if (!buf)
218                 return -1;
219
220         wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
221
222         /* category + action code + dialog token + status + sizeof(tspec) */
223         wpabuf_put_u8(buf, WLAN_ACTION_WMM);
224         wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
225         wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
226         wpabuf_put_u8(buf, 0); /* Status Code (not used) */
227         wpabuf_put_data(buf, tspec, sizeof(*tspec));
228
229         ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
230                                   wpa_s->own_addr, wpa_s->bssid,
231                                   wpabuf_head(buf), wpabuf_len(buf), 0);
232         if (ret)
233                 wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
234
235         wpabuf_free(buf);
236         return ret;
237 }
238
239
240 /* return the AC using the given TSPEC tid */
241 static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
242                             enum ts_dir_idx *dir)
243 {
244         int ac;
245         enum ts_dir_idx idx;
246
247         for (ac = 0; ac < WMM_AC_NUM; ac++) {
248                 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
249                         if (wpa_s->tspecs[ac][idx] &&
250                             wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
251                                 if (dir)
252                                         *dir = idx;
253                                 return ac;
254                         }
255                 }
256         }
257
258         return -1;
259 }
260
261
262 static struct wmm_ac_addts_request *
263 wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
264                        const struct wmm_ac_ts_setup_params *params,
265                        const u8 *address)
266 {
267         struct wmm_ac_addts_request *addts_req;
268         struct wmm_tspec_element *tspec;
269         u8 ac = up_to_ac[params->user_priority];
270         u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
271
272         addts_req = os_zalloc(sizeof(*addts_req));
273         if (!addts_req)
274                 return NULL;
275
276         tspec = &addts_req->tspec;
277         os_memcpy(addts_req->address, address, ETH_ALEN);
278
279         /* The dialog token cannot be zero */
280         if (++wpa_s->wmm_ac_last_dialog_token == 0)
281                 wpa_s->wmm_ac_last_dialog_token++;
282
283         addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
284         tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
285         tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
286         tspec->oui[0] = 0x00;
287         tspec->oui[1] = 0x50;
288         tspec->oui[2] = 0xf2;
289         tspec->oui_type = WMM_OUI_TYPE;
290         tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
291         tspec->version = WMM_VERSION;
292
293         tspec->ts_info[0] = params->tsid << 1;
294         tspec->ts_info[0] |= params->direction << 5;
295         tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
296         tspec->ts_info[1] = uapsd << 2;
297         tspec->ts_info[1] |= params->user_priority << 3;
298         tspec->ts_info[2] = 0;
299
300         tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
301         if (params->fixed_nominal_msdu)
302                 tspec->nominal_msdu_size |=
303                         host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
304
305         tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
306         tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
307         tspec->surplus_bandwidth_allowance =
308                 host_to_le16(params->surplus_bandwidth_allowance);
309
310         return addts_req;
311 }
312
313
314 static int param_in_range(const char *name, long value,
315                           long min_val, long max_val)
316 {
317         if (value < min_val || (max_val >= 0 && value > max_val)) {
318                 wpa_printf(MSG_DEBUG,
319                            "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
320                            name, value, min_val, max_val);
321                 return 0;
322         }
323
324         return 1;
325 }
326
327
328 static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
329                                     u8 tsid, u8 ac, u8 dir)
330 {
331         enum ts_dir_idx idx;
332         int cur_ac, existing_ts = 0, replace_ts = 0;
333
334         cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
335         if (cur_ac >= 0) {
336                 if (cur_ac != ac) {
337                         wpa_printf(MSG_DEBUG,
338                                    "WMM AC: TSID %i already exists on different ac (%d)",
339                                    tsid, cur_ac);
340                         return -1;
341                 }
342
343                 /* same tsid - this tspec will replace the current one */
344                 replace_ts |= BIT(idx);
345         }
346
347         for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
348                 if (wpa_s->tspecs[ac][idx])
349                         existing_ts |= BIT(idx);
350         }
351
352         switch (dir) {
353         case WMM_AC_DIR_UPLINK:
354                 /* replace existing uplink/bidi tspecs */
355                 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
356                                              BIT(TS_DIR_IDX_BIDI));
357                 break;
358         case WMM_AC_DIR_DOWNLINK:
359                 /* replace existing downlink/bidi tspecs */
360                 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
361                                              BIT(TS_DIR_IDX_BIDI));
362                 break;
363         case WMM_AC_DIR_BIDIRECTIONAL:
364                 /* replace all existing tspecs */
365                 replace_ts |= existing_ts;
366                 break;
367         default:
368                 return -1;
369         }
370
371         return replace_ts;
372 }
373
374
375 static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
376                                   const struct wmm_ac_ts_setup_params *params)
377 {
378         enum wmm_ac req_ac;
379
380 #define PARAM_IN_RANGE(field, min_value, max_value) \
381         param_in_range(#field, params->field, min_value, max_value)
382
383         if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
384             !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
385             !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
386             !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
387             !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
388             !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
389                             -1))
390                 return 0;
391 #undef PARAM_IN_RANGE
392
393         if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
394               params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
395               params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
396                 wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
397                            params->direction);
398                 return 0;
399         }
400
401         req_ac = up_to_ac[params->user_priority];
402
403         /* Requested accesss category must have acm */
404         if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
405                 wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
406                 return 0;
407         }
408
409         if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
410                                      params->direction) < 0)
411                 return 0;
412
413         return 1;
414 }
415
416
417 static struct wmm_ac_assoc_data *
418 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
419                           size_t ies_len)
420 {
421         struct ieee802_11_elems elems;
422         struct wmm_parameter_element *wmm_params;
423         struct wmm_ac_assoc_data *assoc_data;
424         int i;
425
426         /* Parsing WMM Parameter Element */
427         if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
428                 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
429                 return NULL;
430         }
431
432         if (!elems.wmm) {
433                 wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
434                 return NULL;
435         }
436
437         if (elems.wmm_len != sizeof(*wmm_params)) {
438                 wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
439                 return NULL;
440         }
441
442         wmm_params = (struct wmm_parameter_element *)(elems.wmm);
443
444         assoc_data = os_zalloc(sizeof(*assoc_data));
445         if (!assoc_data)
446                 return NULL;
447
448         for (i = 0; i < WMM_AC_NUM; i++)
449                 assoc_data->ac_params[i].acm =
450                         !!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
451
452         wpa_printf(MSG_DEBUG,
453                    "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
454                    assoc_data->ac_params[WMM_AC_BE].acm,
455                    assoc_data->ac_params[WMM_AC_BK].acm,
456                    assoc_data->ac_params[WMM_AC_VI].acm,
457                    assoc_data->ac_params[WMM_AC_VO].acm);
458
459         return assoc_data;
460 }
461
462
463 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
464                        size_t ies_len, const struct wmm_params *wmm_params)
465 {
466         struct wmm_ac_assoc_data *assoc_data;
467         u8 ac;
468
469         if (wpa_s->wmm_ac_assoc_info) {
470                 wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
471                 return -1;
472         }
473
474         if (!ies) {
475                 wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
476                 return -1;
477         }
478
479         if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
480                 wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
481                 return -1;
482         }
483
484         os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
485         wpa_s->wmm_ac_last_dialog_token = 0;
486         wpa_s->addts_request = NULL;
487
488         assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
489         if (!assoc_data)
490                 return -1;
491
492         wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
493                    wmm_params->uapsd_queues);
494
495         for (ac = 0; ac < WMM_AC_NUM; ac++) {
496                 assoc_data->ac_params[ac].uapsd =
497                         !!(wmm_params->uapsd_queues & BIT(ac));
498         }
499
500         wpa_s->wmm_ac_assoc_info = assoc_data;
501         return 0;
502 }
503
504
505 static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
506 {
507         enum ts_dir_idx idx;
508
509         for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
510                 if (!(dir_bitmap & BIT(idx)))
511                         continue;
512
513                 wmm_ac_del_ts_idx(wpa_s, ac, idx);
514         }
515 }
516
517
518 static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
519 {
520         int i;
521
522         for (i = 0; i < WMM_AC_NUM; i++)
523                 wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
524
525         /* delete pending add_ts requset */
526         wmm_ac_del_req(wpa_s, 1);
527
528         os_free(wpa_s->wmm_ac_assoc_info);
529         wpa_s->wmm_ac_assoc_info = NULL;
530 }
531
532
533 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
534                          size_t ies_len, const struct wmm_params *wmm_params)
535 {
536         if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
537                 return;
538
539         wpa_printf(MSG_DEBUG,
540                    "WMM AC: Valid WMM association, WMM AC is enabled");
541 }
542
543
544 void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
545 {
546         if (!wpa_s->wmm_ac_assoc_info)
547                 return;
548
549         wmm_ac_deinit(wpa_s);
550         wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
551 }
552
553
554 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
555 {
556         struct wmm_tspec_element tspec;
557         int ac;
558         enum ts_dir_idx dir;
559
560         if (!wpa_s->wmm_ac_assoc_info) {
561                 wpa_printf(MSG_DEBUG,
562                            "WMM AC: Failed to delete TS, WMM AC is disabled");
563                 return -1;
564         }
565
566         ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
567         if (ac < 0) {
568                 wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
569                 return -1;
570         }
571
572         tspec = *wpa_s->tspecs[ac][dir];
573
574         wmm_ac_del_ts_idx(wpa_s, ac, dir);
575
576         wmm_ac_send_delts(wpa_s, &tspec, wpa_s->bssid);
577
578         return 0;
579 }
580
581
582 int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
583                       struct wmm_ac_ts_setup_params *params)
584 {
585         struct wmm_ac_addts_request *addts_req;
586
587         if (!wpa_s->wmm_ac_assoc_info) {
588                 wpa_printf(MSG_DEBUG,
589                            "WMM AC: Cannot add TS - missing assoc data");
590                 return -1;
591         }
592
593         if (wpa_s->addts_request) {
594                 wpa_printf(MSG_DEBUG,
595                            "WMM AC: can't add TS - ADDTS request is already pending");
596                 return -1;
597         }
598
599         /*
600          * we can setup downlink TS even without driver support.
601          * however, we need driver support for the other directions.
602          */
603         if (params->direction != WMM_AC_DIR_DOWNLINK &&
604             !wpa_s->wmm_ac_supported) {
605                 wpa_printf(MSG_DEBUG,
606                            "Cannot set uplink/bidi TS without driver support");
607                 return -1;
608         }
609
610         if (!wmm_ac_ts_req_is_valid(wpa_s, params))
611                 return -1;
612
613         wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
614                    " tsid=%u user priority=%u direction=%d)",
615                    MAC2STR(wpa_s->bssid), params->tsid,
616                    params->user_priority, params->direction);
617
618         addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
619         if (!addts_req)
620                 return -1;
621
622         if (wmm_ac_send_addts_request(wpa_s, addts_req))
623                 goto err;
624
625         /* save as pending and set ADDTS resp timeout to 1 second */
626         wpa_s->addts_request = addts_req;
627         eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
628                                wpa_s, addts_req);
629         return 0;
630 err:
631         os_free(addts_req);
632         return -1;
633 }
634
635
636 static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
637                                 const struct wmm_tspec_element *tspec)
638 {
639         int ac;
640         u8 tsid;
641         enum ts_dir_idx idx;
642
643         tsid = wmm_ac_get_tsid(tspec);
644
645         wpa_printf(MSG_DEBUG,
646                    "WMM AC: DELTS frame has been received TSID=%u addr="
647                    MACSTR, tsid, MAC2STR(sa));
648
649         ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
650         if (ac < 0) {
651                 wpa_printf(MSG_DEBUG,
652                            "WMM AC: Ignoring DELTS frame - TSID does not exist");
653                 return;
654         }
655
656         wmm_ac_del_ts_idx(wpa_s, ac, idx);
657
658         wpa_printf(MSG_DEBUG,
659                    "TS was deleted successfully (tsid=%u address=" MACSTR ")",
660                    tsid, MAC2STR(sa));
661 }
662
663
664 static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
665                 const u8 resp_dialog_token, const u8 status_code,
666                 const struct wmm_tspec_element *tspec)
667 {
668         struct wmm_ac_addts_request *req = wpa_s->addts_request;
669         u8 ac, tsid, up, dir;
670         int replace_tspecs;
671
672         tsid = wmm_ac_get_tsid(tspec);
673         dir = wmm_ac_get_direction(tspec);
674         up = wmm_ac_get_user_priority(tspec);
675         ac = up_to_ac[up];
676
677         /* make sure we have a matching addts request */
678         if (!req || req->dialog_token != resp_dialog_token) {
679                 wpa_printf(MSG_DEBUG,
680                            "WMM AC: no req with dialog=%u, ignoring frame",
681                            resp_dialog_token);
682                 return;
683         }
684
685         /* make sure the params are the same */
686         if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
687             tsid != wmm_ac_get_tsid(&req->tspec) ||
688             up != wmm_ac_get_user_priority(&req->tspec) ||
689             dir != wmm_ac_get_direction(&req->tspec)) {
690                 wpa_printf(MSG_DEBUG,
691                            "WMM AC: ADDTS params do not match, ignoring frame");
692                 return;
693         }
694
695         /* delete pending request */
696         wmm_ac_del_req(wpa_s, 0);
697
698         wpa_printf(MSG_DEBUG,
699                    "ADDTS response status=%d tsid=%u up=%u direction=%u",
700                    status_code, tsid, up, dir);
701
702         if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
703                 wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
704                 goto err_msg;
705         }
706
707         replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
708         if (replace_tspecs < 0)
709                 goto err_delts;
710
711         wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
712
713         /* when replacing tspecs - delete first */
714         wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
715
716         /* Creating a new traffic stream */
717         wpa_printf(MSG_DEBUG,
718                    "WMM AC: adding a new TS with TSID=%u address="MACSTR
719                    " medium time=%u access category=%d dir=%d ",
720                    tsid, MAC2STR(sa),
721                    le_to_host16(tspec->medium_time), ac, dir);
722
723         if (wmm_ac_add_ts(wpa_s, sa, tspec))
724                 goto err_delts;
725
726         return;
727
728 err_delts:
729         /* ask the ap to delete the tspec */
730         wmm_ac_send_delts(wpa_s, tspec, sa);
731 err_msg:
732         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
733                 tsid);
734 }
735
736
737 void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
738                         const u8 *sa, const u8 *data, size_t len)
739 {
740         u8 action;
741         u8 dialog_token;
742         u8 status_code;
743         struct ieee802_11_elems elems;
744         struct wmm_tspec_element *tspec;
745
746         if (wpa_s->wmm_ac_assoc_info == NULL) {
747                 wpa_printf(MSG_DEBUG,
748                            "WMM AC: WMM AC is disabled, ignoring action frame");
749                 return;
750         }
751
752         action = data[0];
753
754         if (action != WMM_ACTION_CODE_ADDTS_RESP &&
755             action != WMM_ACTION_CODE_DELTS) {
756                 wpa_printf(MSG_DEBUG,
757                            "WMM AC: Unknown action (%d), ignoring action frame",
758                            action);
759                 return;
760         }
761
762         /* WMM AC action frame */
763         if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
764                 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
765                            " is other than ours, ignoring frame", MAC2STR(da));
766                 return;
767         }
768
769         if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
770                 wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
771                            " different other than our bssid", MAC2STR(da));
772                 return;
773         }
774
775         if (len < 2 + sizeof(struct wmm_tspec_element)) {
776                 wpa_printf(MSG_DEBUG,
777                            "WMM AC: Short ADDTS response ignored (len=%lu)",
778                            (unsigned long) len);
779                 return;
780         }
781
782         data++;
783         len--;
784         dialog_token = data[0];
785         status_code = data[1];
786
787         if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
788                 wpa_printf(MSG_DEBUG,
789                            "WMM AC: Could not parse WMM AC action from " MACSTR,
790                            MAC2STR(sa));
791                 return;
792         }
793
794         /* the struct also contains the type and value, so decrease it */
795         if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
796                 wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
797                 return;
798         }
799
800         tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
801
802         wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
803                    MAC2STR(sa));
804         wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
805
806         switch (action) {
807         case WMM_ACTION_CODE_ADDTS_RESP:
808                 wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
809                                          tspec);
810                 break;
811         case WMM_ACTION_CODE_DELTS:
812                 wmm_ac_handle_delts(wpa_s, sa, tspec);
813                 break;
814         default:
815                 break;
816         }
817 }
818
819
820 static const char * get_ac_str(u8 ac)
821 {
822         switch (ac) {
823         case WMM_AC_BE:
824                 return "BE";
825         case WMM_AC_BK:
826                 return "BK";
827         case WMM_AC_VI:
828                 return "VI";
829         case WMM_AC_VO:
830                 return "VO";
831         default:
832                 return "N/A";
833         }
834 }
835
836
837 static const char * get_direction_str(u8 direction)
838 {
839         switch (direction) {
840         case WMM_AC_DIR_DOWNLINK:
841                 return "Downlink";
842         case WMM_AC_DIR_UPLINK:
843                 return "Uplink";
844         case WMM_AC_DIR_BIDIRECTIONAL:
845                 return "Bi-directional";
846         default:
847                 return "N/A";
848         }
849 }
850
851
852 int wpas_wmm_ac_status(struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
853 {
854         struct wmm_ac_assoc_data *assoc_info = wpa_s->wmm_ac_assoc_info;
855         enum ts_dir_idx idx;
856         int pos = 0;
857         u8 ac, up;
858
859         if (!assoc_info) {
860                 return wpa_scnprintf(buf, buflen - pos,
861                                      "Not associated to a WMM AP, WMM AC is Disabled\n");
862         }
863
864         pos += wpa_scnprintf(buf + pos, buflen - pos, "WMM AC is Enabled\n");
865
866         for (ac = 0; ac < WMM_AC_NUM; ac++) {
867                 int ts_count = 0;
868
869                 pos += wpa_scnprintf(buf + pos, buflen - pos,
870                                      "%s: acm=%d uapsd=%d\n",
871                                      get_ac_str(ac),
872                                      assoc_info->ac_params[ac].acm,
873                                      assoc_info->ac_params[ac].uapsd);
874
875                 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
876                         struct wmm_tspec_element *tspec;
877                         u8 dir, tsid;
878                         const char *dir_str;
879
880                         tspec = wpa_s->tspecs[ac][idx];
881                         if (!tspec)
882                                 continue;
883
884                         ts_count++;
885
886                         dir = wmm_ac_get_direction(tspec);
887                         dir_str = get_direction_str(dir);
888                         tsid = wmm_ac_get_tsid(tspec);
889                         up = wmm_ac_get_user_priority(tspec);
890
891                         pos += wpa_scnprintf(buf + pos, buflen - pos,
892                                              "\tTSID=%u UP=%u\n"
893                                              "\tAddress = "MACSTR"\n"
894                                              "\tWMM AC dir = %s\n"
895                                              "\tTotal admitted time = %u\n\n",
896                                              tsid, up,
897                                              MAC2STR(wpa_s->bssid),
898                                              dir_str,
899                                              le_to_host16(tspec->medium_time));
900                 }
901
902                 if (!ts_count) {
903                         pos += wpa_scnprintf(buf + pos, buflen - pos,
904                                              "\t(No Traffic Stream)\n\n");
905                 }
906         }
907
908         return pos;
909 }
910
911
912 static u8 wmm_ac_get_tspecs_count(struct wpa_supplicant *wpa_s)
913 {
914         int ac, dir, tspecs_count = 0;
915
916         for (ac = 0; ac < WMM_AC_NUM; ac++) {
917                 for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
918                         if (wpa_s->tspecs[ac][dir])
919                                 tspecs_count++;
920                 }
921         }
922
923         return tspecs_count;
924 }
925
926
927 void wmm_ac_save_tspecs(struct wpa_supplicant *wpa_s)
928 {
929         int ac, dir, tspecs_count;
930
931         wpa_printf(MSG_DEBUG, "WMM AC: Save last configured tspecs");
932
933         if (!wpa_s->wmm_ac_assoc_info)
934                 return;
935
936         tspecs_count = wmm_ac_get_tspecs_count(wpa_s);
937         if (!tspecs_count) {
938                 wpa_printf(MSG_DEBUG, "WMM AC: No configured TSPECs");
939                 return;
940         }
941
942         wpa_printf(MSG_DEBUG, "WMM AC: Saving tspecs");
943
944         wmm_ac_clear_saved_tspecs(wpa_s);
945         wpa_s->last_tspecs = os_calloc(tspecs_count,
946                                        sizeof(*wpa_s->last_tspecs));
947         if (!wpa_s->last_tspecs) {
948                 wpa_printf(MSG_ERROR, "WMM AC: Failed to save tspecs!");
949                 return;
950         }
951
952         for (ac = 0; ac < WMM_AC_NUM; ac++) {
953                 for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
954                         if (!wpa_s->tspecs[ac][dir])
955                                 continue;
956
957                         wpa_s->last_tspecs[wpa_s->last_tspecs_count++] =
958                                 *wpa_s->tspecs[ac][dir];
959                 }
960         }
961
962         wpa_printf(MSG_DEBUG, "WMM AC: Successfully saved %d TSPECs",
963                    wpa_s->last_tspecs_count);
964 }
965
966
967 void wmm_ac_clear_saved_tspecs(struct wpa_supplicant *wpa_s)
968 {
969         if (wpa_s->last_tspecs) {
970                 wpa_printf(MSG_DEBUG, "WMM AC: Clear saved tspecs");
971                 os_free(wpa_s->last_tspecs);
972                 wpa_s->last_tspecs = NULL;
973                 wpa_s->last_tspecs_count = 0;
974         }
975 }
976
977
978 int wmm_ac_restore_tspecs(struct wpa_supplicant *wpa_s)
979 {
980         unsigned int i;
981
982         if (!wpa_s->wmm_ac_assoc_info || !wpa_s->last_tspecs_count)
983                 return 0;
984
985         wpa_printf(MSG_DEBUG, "WMM AC: Restore %u saved tspecs",
986                    wpa_s->last_tspecs_count);
987
988         for (i = 0; i < wpa_s->last_tspecs_count; i++)
989                 wmm_ac_add_ts(wpa_s, wpa_s->bssid, &wpa_s->last_tspecs[i]);
990
991         return 0;
992 }