 f80936094e
			
		
	
	
		f80936094e
		
	
	
	
	
		
			
			There is no point in flooding the log with WARNING or ERROR level messages if WMM-AC related Action frames are ignored in cases where they were not expected. In addition, WARNING/ERROR should not really be used in cases an invalid frame is dropped especially if this is not related to a security setup since external devices could otherwise generate log entries. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
		
			
				
	
	
		
			911 lines
		
	
	
	
		
			22 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			911 lines
		
	
	
	
		
			22 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Wi-Fi Multimedia Admission Control (WMM-AC)
 | |
|  * Copyright(c) 2014, Intel Mobile Communication GmbH.
 | |
|  * Copyright(c) 2014, Intel Corporation. All rights reserved.
 | |
|  *
 | |
|  * This software may be distributed under the terms of the BSD license.
 | |
|  * See README for more details.
 | |
|  */
 | |
| 
 | |
| #include "includes.h"
 | |
| 
 | |
| #include "utils/common.h"
 | |
| #include "utils/list.h"
 | |
| #include "utils/eloop.h"
 | |
| #include "common/ieee802_11_common.h"
 | |
| #include "wpa_supplicant_i.h"
 | |
| #include "bss.h"
 | |
| #include "driver_i.h"
 | |
| #include "wmm_ac.h"
 | |
| 
 | |
| static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
 | |
| 
 | |
| static const enum wmm_ac up_to_ac[8] = {
 | |
| 	WMM_AC_BK,
 | |
| 	WMM_AC_BE,
 | |
| 	WMM_AC_BE,
 | |
| 	WMM_AC_BK,
 | |
| 	WMM_AC_VI,
 | |
| 	WMM_AC_VI,
 | |
| 	WMM_AC_VO,
 | |
| 	WMM_AC_VO
 | |
| };
 | |
| 
 | |
| 
 | |
| static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	return (tspec->ts_info[0] >> 1) & 0x0f;
 | |
| }
 | |
| 
 | |
| 
 | |
| static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	return (tspec->ts_info[0] >> 5) & 0x03;
 | |
| }
 | |
| 
 | |
| 
 | |
| static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	return (tspec->ts_info[1] >> 3) & 0x07;
 | |
| }
 | |
| 
 | |
| 
 | |
| static u8 wmm_ac_direction_to_idx(u8 direction)
 | |
| {
 | |
| 	switch (direction) {
 | |
| 	case WMM_AC_DIR_UPLINK:
 | |
| 		return TS_DIR_IDX_UPLINK;
 | |
| 	case WMM_AC_DIR_DOWNLINK:
 | |
| 		return TS_DIR_IDX_DOWNLINK;
 | |
| 	case WMM_AC_DIR_BIDIRECTIONAL:
 | |
| 		return TS_DIR_IDX_BIDI;
 | |
| 	default:
 | |
| 		wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
 | |
| 		return WMM_AC_DIR_UPLINK;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
 | |
| 			 const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	struct wmm_tspec_element *_tspec;
 | |
| 	int ret;
 | |
| 	u16 admitted_time = le_to_host16(tspec->medium_time);
 | |
| 	u8 up = wmm_ac_get_user_priority(tspec);
 | |
| 	u8 ac = up_to_ac[up];
 | |
| 	u8 dir = wmm_ac_get_direction(tspec);
 | |
| 	u8 tsid = wmm_ac_get_tsid(tspec);
 | |
| 	enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
 | |
| 
 | |
| 	/* should have been verified before, but double-check here */
 | |
| 	if (wpa_s->tspecs[ac][idx]) {
 | |
| 		wpa_printf(MSG_ERROR,
 | |
| 			   "WMM AC: tspec (ac=%d, dir=%d) already exists!",
 | |
| 			   ac, dir);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	/* copy tspec */
 | |
| 	_tspec = os_malloc(sizeof(*_tspec));
 | |
| 	if (!_tspec)
 | |
| 		return -1;
 | |
| 
 | |
| 	/* store the admitted TSPEC */
 | |
| 	os_memcpy(_tspec, tspec, sizeof(*_tspec));
 | |
| 
 | |
| 	if (dir != WMM_AC_DIR_DOWNLINK) {
 | |
| 		ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Add TS: addr=" MACSTR
 | |
| 			   " TSID=%u admitted time=%u, ret=%d",
 | |
| 			   MAC2STR(addr), tsid, admitted_time, ret);
 | |
| 		if (ret < 0) {
 | |
| 			os_free(_tspec);
 | |
| 			return -1;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	wpa_s->tspecs[ac][idx] = _tspec;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
 | |
| 
 | |
| 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
 | |
| 		"tsid=%d addr=" MACSTR " admitted_time=%d",
 | |
| 		tsid, MAC2STR(addr), admitted_time);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
 | |
| 			      enum ts_dir_idx dir)
 | |
| {
 | |
| 	struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
 | |
| 	u8 tsid;
 | |
| 
 | |
| 	if (!tspec)
 | |
| 		return;
 | |
| 
 | |
| 	tsid = wmm_ac_get_tsid(tspec);
 | |
| 	wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
 | |
| 
 | |
| 	/* update the driver in case of uplink/bidi */
 | |
| 	if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
 | |
| 		wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
 | |
| 
 | |
| 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
 | |
| 		"tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
 | |
| 
 | |
| 	os_free(wpa_s->tspecs[ac][dir]);
 | |
| 	wpa_s->tspecs[ac][dir] = NULL;
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
 | |
| {
 | |
| 	struct wmm_ac_addts_request *req = wpa_s->addts_request;
 | |
| 
 | |
| 	if (!req)
 | |
| 		return;
 | |
| 
 | |
| 	if (failed)
 | |
| 		wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
 | |
| 			"tsid=%u", wmm_ac_get_tsid(&req->tspec));
 | |
| 
 | |
| 	eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
 | |
| 	wpa_s->addts_request = NULL;
 | |
| 	os_free(req);
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
 | |
| {
 | |
| 	struct wpa_supplicant *wpa_s = eloop_ctx;
 | |
| 	struct wmm_ac_addts_request *addts_req = timeout_ctx;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "Timeout getting ADDTS response (tsid=%d up=%d)",
 | |
| 		   wmm_ac_get_tsid(&addts_req->tspec),
 | |
| 		   wmm_ac_get_user_priority(&addts_req->tspec));
 | |
| 
 | |
| 	wmm_ac_del_req(wpa_s, 1);
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
 | |
| 				     const struct wmm_ac_addts_request *req)
 | |
| {
 | |
| 	struct wpabuf *buf;
 | |
| 	int ret;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
 | |
| 		   MAC2STR(req->address));
 | |
| 
 | |
| 	/* category + action code + dialog token + status + sizeof(tspec) */
 | |
| 	buf = wpabuf_alloc(4 + sizeof(req->tspec));
 | |
| 	if (!buf) {
 | |
| 		wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
 | |
| 	wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
 | |
| 	wpabuf_put_u8(buf, req->dialog_token);
 | |
| 	wpabuf_put_u8(buf, 0); /* status code */
 | |
| 	wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
 | |
| 
 | |
| 	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
 | |
| 				wpa_s->own_addr, wpa_s->bssid,
 | |
| 				wpabuf_head(buf), wpabuf_len(buf), 0);
 | |
| 	if (ret) {
 | |
| 		wpa_printf(MSG_WARNING,
 | |
| 			   "WMM AC: Failed to send ADDTS Request");
 | |
| 	}
 | |
| 
 | |
| 	wpabuf_free(buf);
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
 | |
| 			     const struct wmm_tspec_element *tspec,
 | |
| 			     const u8 *address)
 | |
| {
 | |
| 	struct wpabuf *buf;
 | |
| 	int ret;
 | |
| 
 | |
| 	/* category + action code + dialog token + status + sizeof(tspec) */
 | |
| 	buf = wpabuf_alloc(4 + sizeof(*tspec));
 | |
| 	if (!buf)
 | |
| 		return -1;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
 | |
| 
 | |
| 	/* category + action code + dialog token + status + sizeof(tspec) */
 | |
| 	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
 | |
| 	wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
 | |
| 	wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
 | |
| 	wpabuf_put_u8(buf, 0); /* Status Code (not used) */
 | |
| 	wpabuf_put_data(buf, tspec, sizeof(*tspec));
 | |
| 
 | |
| 	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
 | |
| 				  wpa_s->own_addr, wpa_s->bssid,
 | |
| 				  wpabuf_head(buf), wpabuf_len(buf), 0);
 | |
| 	if (ret)
 | |
| 		wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
 | |
| 
 | |
| 	wpabuf_free(buf);
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| 
 | |
| /* return the AC using the given TSPEC tid */
 | |
| static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
 | |
| 			    enum ts_dir_idx *dir)
 | |
| {
 | |
| 	int ac;
 | |
| 	enum ts_dir_idx idx;
 | |
| 
 | |
| 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
 | |
| 		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
 | |
| 			if (wpa_s->tspecs[ac][idx] &&
 | |
| 			    wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
 | |
| 				if (dir)
 | |
| 					*dir = idx;
 | |
| 				return ac;
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return -1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static struct wmm_ac_addts_request *
 | |
| wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
 | |
| 		       const struct wmm_ac_ts_setup_params *params,
 | |
| 		       const u8 *address)
 | |
| {
 | |
| 	struct wmm_ac_addts_request *addts_req;
 | |
| 	struct wmm_tspec_element *tspec;
 | |
| 	u8 ac = up_to_ac[params->user_priority];
 | |
| 	u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
 | |
| 
 | |
| 	addts_req = os_zalloc(sizeof(*addts_req));
 | |
| 	if (!addts_req)
 | |
| 		return NULL;
 | |
| 
 | |
| 	tspec = &addts_req->tspec;
 | |
| 	os_memcpy(addts_req->address, address, ETH_ALEN);
 | |
| 
 | |
| 	/* The dialog token cannot be zero */
 | |
| 	if (++wpa_s->wmm_ac_last_dialog_token == 0)
 | |
| 		wpa_s->wmm_ac_last_dialog_token++;
 | |
| 
 | |
| 	addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
 | |
| 	tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
 | |
| 	tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
 | |
| 	tspec->oui[0] = 0x00;
 | |
| 	tspec->oui[1] = 0x50;
 | |
| 	tspec->oui[2] = 0xf2;
 | |
| 	tspec->oui_type = WMM_OUI_TYPE;
 | |
| 	tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
 | |
| 	tspec->version = WMM_VERSION;
 | |
| 
 | |
| 	tspec->ts_info[0] = params->tsid << 1;
 | |
| 	tspec->ts_info[0] |= params->direction << 5;
 | |
| 	tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
 | |
| 	tspec->ts_info[1] = uapsd << 2;
 | |
| 	tspec->ts_info[1] |= params->user_priority << 3;
 | |
| 	tspec->ts_info[2] = 0;
 | |
| 
 | |
| 	tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
 | |
| 	if (params->fixed_nominal_msdu)
 | |
| 		tspec->nominal_msdu_size |=
 | |
| 			host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
 | |
| 
 | |
| 	tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
 | |
| 	tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
 | |
| 	tspec->surplus_bandwidth_allowance =
 | |
| 		host_to_le16(params->surplus_bandwidth_allowance);
 | |
| 
 | |
| 	return addts_req;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int param_in_range(const char *name, long value,
 | |
| 			  long min_val, long max_val)
 | |
| {
 | |
| 	if (value < min_val || (max_val >= 0 && value > max_val)) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
 | |
| 			   name, value, min_val, max_val);
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
 | |
| 				    u8 tsid, u8 ac, u8 dir)
 | |
| {
 | |
| 	enum ts_dir_idx idx;
 | |
| 	int cur_ac, existing_ts = 0, replace_ts = 0;
 | |
| 
 | |
| 	cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
 | |
| 	if (cur_ac >= 0) {
 | |
| 		if (cur_ac != ac) {
 | |
| 			wpa_printf(MSG_DEBUG,
 | |
| 				   "WMM AC: TSID %i already exists on different ac (%d)",
 | |
| 				   tsid, cur_ac);
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		/* same tsid - this tspec will replace the current one */
 | |
| 		replace_ts |= BIT(idx);
 | |
| 	}
 | |
| 
 | |
| 	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
 | |
| 		if (wpa_s->tspecs[ac][idx])
 | |
| 			existing_ts |= BIT(idx);
 | |
| 	}
 | |
| 
 | |
| 	switch (dir) {
 | |
| 	case WMM_AC_DIR_UPLINK:
 | |
| 		/* replace existing uplink/bidi tspecs */
 | |
| 		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
 | |
| 					     BIT(TS_DIR_IDX_BIDI));
 | |
| 		break;
 | |
| 	case WMM_AC_DIR_DOWNLINK:
 | |
| 		/* replace existing downlink/bidi tspecs */
 | |
| 		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
 | |
| 					     BIT(TS_DIR_IDX_BIDI));
 | |
| 		break;
 | |
| 	case WMM_AC_DIR_BIDIRECTIONAL:
 | |
| 		/* replace all existing tspecs */
 | |
| 		replace_ts |= existing_ts;
 | |
| 		break;
 | |
| 	default:
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	return replace_ts;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
 | |
| 				  const struct wmm_ac_ts_setup_params *params)
 | |
| {
 | |
| 	enum wmm_ac req_ac;
 | |
| 
 | |
| #define PARAM_IN_RANGE(field, min_value, max_value) \
 | |
| 	param_in_range(#field, params->field, min_value, max_value)
 | |
| 
 | |
| 	if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
 | |
| 	    !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
 | |
| 	    !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
 | |
| 	    !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
 | |
| 	    !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
 | |
| 	    !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
 | |
| 			    -1))
 | |
| 		return 0;
 | |
| #undef PARAM_IN_RANGE
 | |
| 
 | |
| 	if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
 | |
| 	      params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
 | |
| 	      params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
 | |
| 			   params->direction);
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	req_ac = up_to_ac[params->user_priority];
 | |
| 
 | |
| 	/* Requested accesss category must have acm */
 | |
| 	if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
 | |
| 				     params->direction) < 0)
 | |
| 		return 0;
 | |
| 
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static struct wmm_ac_assoc_data *
 | |
| wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
 | |
| 			  size_t ies_len)
 | |
| {
 | |
| 	struct ieee802_11_elems elems;
 | |
| 	struct wmm_parameter_element *wmm_params;
 | |
| 	struct wmm_ac_assoc_data *assoc_data;
 | |
| 	int i;
 | |
| 
 | |
| 	/* Parsing WMM Parameter Element */
 | |
| 	if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) != ParseOK) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	if (!elems.wmm) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	if (elems.wmm_len != sizeof(*wmm_params)) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	wmm_params = (struct wmm_parameter_element *)(elems.wmm);
 | |
| 
 | |
| 	assoc_data = os_zalloc(sizeof(*assoc_data));
 | |
| 	if (!assoc_data)
 | |
| 		return NULL;
 | |
| 
 | |
| 	for (i = 0; i < WMM_AC_NUM; i++)
 | |
| 		assoc_data->ac_params[i].acm =
 | |
| 			!!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
 | |
| 		   assoc_data->ac_params[WMM_AC_BE].acm,
 | |
| 		   assoc_data->ac_params[WMM_AC_BK].acm,
 | |
| 		   assoc_data->ac_params[WMM_AC_VI].acm,
 | |
| 		   assoc_data->ac_params[WMM_AC_VO].acm);
 | |
| 
 | |
| 	return assoc_data;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
 | |
| 		       size_t ies_len, const struct wmm_params *wmm_params)
 | |
| {
 | |
| 	struct wmm_ac_assoc_data *assoc_data;
 | |
| 	u8 ac;
 | |
| 
 | |
| 	if (wpa_s->wmm_ac_assoc_info) {
 | |
| 		wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (!ies) {
 | |
| 		wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
 | |
| 	wpa_s->wmm_ac_last_dialog_token = 0;
 | |
| 	wpa_s->addts_request = NULL;
 | |
| 
 | |
| 	assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
 | |
| 	if (!assoc_data)
 | |
| 		return -1;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
 | |
| 		   wmm_params->uapsd_queues);
 | |
| 
 | |
| 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
 | |
| 		assoc_data->ac_params[ac].uapsd =
 | |
| 			!!(wmm_params->uapsd_queues & BIT(ac));
 | |
| 	}
 | |
| 
 | |
| 	wpa_s->wmm_ac_assoc_info = assoc_data;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
 | |
| {
 | |
| 	enum ts_dir_idx idx;
 | |
| 
 | |
| 	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
 | |
| 		if (!(dir_bitmap & BIT(idx)))
 | |
| 			continue;
 | |
| 
 | |
| 		wmm_ac_del_ts_idx(wpa_s, ac, idx);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
 | |
| {
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < WMM_AC_NUM; i++)
 | |
| 		wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
 | |
| 
 | |
| 	/* delete pending add_ts requset */
 | |
| 	wmm_ac_del_req(wpa_s, 1);
 | |
| 
 | |
| 	os_free(wpa_s->wmm_ac_assoc_info);
 | |
| 	wpa_s->wmm_ac_assoc_info = NULL;
 | |
| }
 | |
| 
 | |
| 
 | |
| void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
 | |
| 			 size_t ies_len, const struct wmm_params *wmm_params)
 | |
| {
 | |
| 	if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
 | |
| 		return;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "WMM AC: Valid WMM association, WMM AC is enabled");
 | |
| }
 | |
| 
 | |
| 
 | |
| void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
 | |
| {
 | |
| 	if (!wpa_s->wmm_ac_assoc_info)
 | |
| 		return;
 | |
| 
 | |
| 	wmm_ac_deinit(wpa_s);
 | |
| 	wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
 | |
| }
 | |
| 
 | |
| 
 | |
| int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
 | |
| {
 | |
| 	struct wmm_tspec_element tspec;
 | |
| 	int ac;
 | |
| 	enum ts_dir_idx dir;
 | |
| 
 | |
| 	if (!wpa_s->wmm_ac_assoc_info) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Failed to delete TS, WMM AC is disabled");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
 | |
| 	if (ac < 0) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	tspec = *wpa_s->tspecs[ac][dir];
 | |
| 
 | |
| 	wmm_ac_del_ts_idx(wpa_s, ac, dir);
 | |
| 
 | |
| 	wmm_ac_send_delts(wpa_s, &tspec, wpa_s->bssid);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
 | |
| 		      struct wmm_ac_ts_setup_params *params)
 | |
| {
 | |
| 	struct wmm_ac_addts_request *addts_req;
 | |
| 
 | |
| 	if (!wpa_s->wmm_ac_assoc_info) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Cannot add TS - missing assoc data");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (wpa_s->addts_request) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: can't add TS - ADDTS request is already pending");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	/*
 | |
| 	 * we can setup downlink TS even without driver support.
 | |
| 	 * however, we need driver support for the other directions.
 | |
| 	 */
 | |
| 	if (params->direction != WMM_AC_DIR_DOWNLINK &&
 | |
| 	    !wpa_s->wmm_ac_supported) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "Cannot set uplink/bidi TS without driver support");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (!wmm_ac_ts_req_is_valid(wpa_s, params))
 | |
| 		return -1;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
 | |
| 		   " tsid=%u user priority=%u direction=%d)",
 | |
| 		   MAC2STR(wpa_s->bssid), params->tsid,
 | |
| 		   params->user_priority, params->direction);
 | |
| 
 | |
| 	addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
 | |
| 	if (!addts_req)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (wmm_ac_send_addts_request(wpa_s, addts_req))
 | |
| 		goto err;
 | |
| 
 | |
| 	/* save as pending and set ADDTS resp timeout to 1 second */
 | |
| 	wpa_s->addts_request = addts_req;
 | |
| 	eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
 | |
| 			       wpa_s, addts_req);
 | |
| 	return 0;
 | |
| err:
 | |
| 	os_free(addts_req);
 | |
| 	return -1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
 | |
| 				const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	int ac;
 | |
| 	u8 tsid;
 | |
| 	enum ts_dir_idx idx;
 | |
| 
 | |
| 	tsid = wmm_ac_get_tsid(tspec);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "WMM AC: DELTS frame has been received TSID=%u addr="
 | |
| 		   MACSTR, tsid, MAC2STR(sa));
 | |
| 
 | |
| 	ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
 | |
| 	if (ac < 0) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Ignoring DELTS frame - TSID does not exist");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	wmm_ac_del_ts_idx(wpa_s, ac, idx);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "TS was deleted successfully (tsid=%u address=" MACSTR ")",
 | |
| 		   tsid, MAC2STR(sa));
 | |
| }
 | |
| 
 | |
| 
 | |
| static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
 | |
| 		const u8 resp_dialog_token, const u8 status_code,
 | |
| 		const struct wmm_tspec_element *tspec)
 | |
| {
 | |
| 	struct wmm_ac_addts_request *req = wpa_s->addts_request;
 | |
| 	u8 ac, tsid, up, dir;
 | |
| 	int replace_tspecs;
 | |
| 
 | |
| 	tsid = wmm_ac_get_tsid(tspec);
 | |
| 	dir = wmm_ac_get_direction(tspec);
 | |
| 	up = wmm_ac_get_user_priority(tspec);
 | |
| 	ac = up_to_ac[up];
 | |
| 
 | |
| 	/* make sure we have a matching addts request */
 | |
| 	if (!req || req->dialog_token != resp_dialog_token) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: no req with dialog=%u, ignoring frame",
 | |
| 			   resp_dialog_token);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	/* make sure the params are the same */
 | |
| 	if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
 | |
| 	    tsid != wmm_ac_get_tsid(&req->tspec) ||
 | |
| 	    up != wmm_ac_get_user_priority(&req->tspec) ||
 | |
| 	    dir != wmm_ac_get_direction(&req->tspec)) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: ADDTS params do not match, ignoring frame");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	/* delete pending request */
 | |
| 	wmm_ac_del_req(wpa_s, 0);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "ADDTS response status=%d tsid=%u up=%u direction=%u",
 | |
| 		   status_code, tsid, up, dir);
 | |
| 
 | |
| 	if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
 | |
| 		wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
 | |
| 		goto err_msg;
 | |
| 	}
 | |
| 
 | |
| 	replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
 | |
| 	if (replace_tspecs < 0)
 | |
| 		goto err_delts;
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
 | |
| 
 | |
| 	/* when replacing tspecs - delete first */
 | |
| 	wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
 | |
| 
 | |
| 	/* Creating a new traffic stream */
 | |
| 	wpa_printf(MSG_DEBUG,
 | |
| 		   "WMM AC: adding a new TS with TSID=%u address="MACSTR
 | |
| 		   " medium time=%u access category=%d dir=%d ",
 | |
| 		   tsid, MAC2STR(sa),
 | |
| 		   le_to_host16(tspec->medium_time), ac, dir);
 | |
| 
 | |
| 	if (wmm_ac_add_ts(wpa_s, sa, tspec))
 | |
| 		goto err_delts;
 | |
| 
 | |
| 	return;
 | |
| 
 | |
| err_delts:
 | |
| 	/* ask the ap to delete the tspec */
 | |
| 	wmm_ac_send_delts(wpa_s, tspec, sa);
 | |
| err_msg:
 | |
| 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
 | |
| 		tsid);
 | |
| }
 | |
| 
 | |
| 
 | |
| void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
 | |
| 			const u8 *sa, const u8 *data, size_t len)
 | |
| {
 | |
| 	u8 action;
 | |
| 	u8 dialog_token;
 | |
| 	u8 status_code;
 | |
| 	struct ieee802_11_elems elems;
 | |
| 	struct wmm_tspec_element *tspec;
 | |
| 
 | |
| 	if (wpa_s->wmm_ac_assoc_info == NULL) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: WMM AC is disabled, ignoring action frame");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	action = data[0];
 | |
| 
 | |
| 	if (action != WMM_ACTION_CODE_ADDTS_RESP &&
 | |
| 	    action != WMM_ACTION_CODE_DELTS) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Unknown action (%d), ignoring action frame",
 | |
| 			   action);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	/* WMM AC action frame */
 | |
| 	if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
 | |
| 			   " is other than ours, ignoring frame", MAC2STR(da));
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
 | |
| 			   " different other than our bssid", MAC2STR(da));
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (len < 2 + sizeof(struct wmm_tspec_element)) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Short ADDTS response ignored (len=%lu)",
 | |
| 			   (unsigned long) len);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	data++;
 | |
| 	len--;
 | |
| 	dialog_token = data[0];
 | |
| 	status_code = data[1];
 | |
| 
 | |
| 	if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
 | |
| 		wpa_printf(MSG_DEBUG,
 | |
| 			   "WMM AC: Could not parse WMM AC action from " MACSTR,
 | |
| 			   MAC2STR(sa));
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	/* the struct also contains the type and value, so decrease it */
 | |
| 	if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
 | |
| 		wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
 | |
| 		   MAC2STR(sa));
 | |
| 	wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
 | |
| 
 | |
| 	switch (action) {
 | |
| 	case WMM_ACTION_CODE_ADDTS_RESP:
 | |
| 		wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
 | |
| 					 tspec);
 | |
| 		break;
 | |
| 	case WMM_ACTION_CODE_DELTS:
 | |
| 		wmm_ac_handle_delts(wpa_s, sa, tspec);
 | |
| 		break;
 | |
| 	default:
 | |
| 		break;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| static const char * get_ac_str(u8 ac)
 | |
| {
 | |
| 	switch (ac) {
 | |
| 	case WMM_AC_BE:
 | |
| 		return "BE";
 | |
| 	case WMM_AC_BK:
 | |
| 		return "BK";
 | |
| 	case WMM_AC_VI:
 | |
| 		return "VI";
 | |
| 	case WMM_AC_VO:
 | |
| 		return "VO";
 | |
| 	default:
 | |
| 		return "N/A";
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| static const char * get_direction_str(u8 direction)
 | |
| {
 | |
| 	switch (direction) {
 | |
| 	case WMM_AC_DIR_DOWNLINK:
 | |
| 		return "Downlink";
 | |
| 	case WMM_AC_DIR_UPLINK:
 | |
| 		return "Uplink";
 | |
| 	case WMM_AC_DIR_BIDIRECTIONAL:
 | |
| 		return "Bi-directional";
 | |
| 	default:
 | |
| 		return "N/A";
 | |
| 	}
 | |
| }
 | |
| 
 | |
| 
 | |
| int wpas_wmm_ac_status(struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
 | |
| {
 | |
| 	struct wmm_ac_assoc_data *assoc_info = wpa_s->wmm_ac_assoc_info;
 | |
| 	enum ts_dir_idx idx;
 | |
| 	int pos = 0;
 | |
| 	u8 ac;
 | |
| 
 | |
| 	if (!assoc_info) {
 | |
| 		return wpa_scnprintf(buf, buflen - pos,
 | |
| 				     "Not associated to a WMM AP, WMM AC is Disabled\n");
 | |
| 	}
 | |
| 
 | |
| 	pos += wpa_scnprintf(buf + pos, buflen - pos, "WMM AC is Enabled\n");
 | |
| 
 | |
| 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
 | |
| 		int ts_count = 0;
 | |
| 
 | |
| 		pos += wpa_scnprintf(buf + pos, buflen - pos,
 | |
| 				     "%s: acm=%d uapsd=%d\n",
 | |
| 				     get_ac_str(ac),
 | |
| 				     assoc_info->ac_params[ac].acm,
 | |
| 				     assoc_info->ac_params[ac].uapsd);
 | |
| 
 | |
| 		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
 | |
| 			struct wmm_tspec_element *tspec;
 | |
| 			u8 dir, tsid;
 | |
| 			const char *dir_str;
 | |
| 
 | |
| 			tspec = wpa_s->tspecs[ac][idx];
 | |
| 			if (!tspec)
 | |
| 				continue;
 | |
| 
 | |
| 			ts_count++;
 | |
| 
 | |
| 			dir = wmm_ac_get_direction(tspec);
 | |
| 			dir_str = get_direction_str(dir);
 | |
| 			tsid = wmm_ac_get_tsid(tspec);
 | |
| 
 | |
| 			pos += wpa_scnprintf(buf + pos, buflen - pos,
 | |
| 					     "\tTSID = %u\n"
 | |
| 					     "\tAddress = "MACSTR"\n"
 | |
| 					     "\tWMM AC dir = %s\n"
 | |
| 					     "\tTotal admitted time = %u\n\n",
 | |
| 					     tsid,
 | |
| 					     MAC2STR(wpa_s->bssid),
 | |
| 					     dir_str,
 | |
| 					     le_to_host16(tspec->medium_time));
 | |
| 		}
 | |
| 
 | |
| 		if (!ts_count) {
 | |
| 			pos += wpa_scnprintf(buf + pos, buflen - pos,
 | |
| 					     "\t(No Traffic Stream)\n\n");
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return pos;
 | |
| }
 |