7fd2f24962
This adds new control interface commands TWT_SETUP and TWT_TEARDOWN. For now, these are only for testing purposes to be able to trigger transmission of the TWT Action frames without configuring any local behavior for TWT in the driver. Signed-off-by: Ben Greear <greearb@candelatech.com>
143 lines
4 KiB
C
143 lines
4 KiB
C
/*
|
|
* wpa_supplicant - TWT
|
|
* Copyright (c) 2003-2016, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "wpa_supplicant_i.h"
|
|
#include "driver_i.h"
|
|
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
/**
|
|
* wpas_twt_send_setup - Send TWT Setup frame (Request) to our AP
|
|
* @wpa_s: Pointer to wpa_supplicant
|
|
* @dtok: Dialog token
|
|
* @exponent: Wake-interval exponent
|
|
* @mantissa: Wake-interval mantissa
|
|
* @min_twt: Minimum TWT wake duration in units of 256 usec
|
|
* @setup_cmd: 0 == request, 1 == suggest, etc. Table 9-297
|
|
* Returns: 0 in case of success, negative error code otherwise
|
|
*
|
|
*/
|
|
int wpas_twt_send_setup(struct wpa_supplicant *wpa_s, u8 dtok, int exponent,
|
|
int mantissa, u8 min_twt, int setup_cmd, u64 twt,
|
|
bool requestor, bool trigger, bool implicit,
|
|
bool flow_type, u8 flow_id, bool protection,
|
|
u8 twt_channel)
|
|
{
|
|
struct wpabuf *buf;
|
|
u16 req_type = 0;
|
|
int ret = 0;
|
|
|
|
if (wpa_s->wpa_state != WPA_COMPLETED || !wpa_s->current_ssid) {
|
|
wpa_printf(MSG_DEBUG,
|
|
"TWT: No connection - cannot send TWT Setup frame");
|
|
return -ENOTCONN;
|
|
}
|
|
|
|
/* 3 = Action category + Action code + Dialog token */
|
|
/* 17 = TWT element */
|
|
buf = wpabuf_alloc(3 + 17);
|
|
if (!buf) {
|
|
wpa_printf(MSG_DEBUG,
|
|
"TWT: Failed to allocate TWT Setup frame (Request)");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
"TWT: Setup request, dtok: %d exponent: %d mantissa: %d min-twt: %d",
|
|
dtok, exponent, mantissa, min_twt);
|
|
|
|
wpabuf_put_u8(buf, WLAN_ACTION_S1G);
|
|
wpabuf_put_u8(buf, S1G_ACT_TWT_SETUP);
|
|
wpabuf_put_u8(buf, dtok);
|
|
|
|
wpabuf_put_u8(buf, WLAN_EID_TWT);
|
|
wpabuf_put_u8(buf, 15); /* len */
|
|
|
|
wpabuf_put_u8(buf, BIT(4)); /* Control field:
|
|
* B4 = TWT Information Frame Disabled */
|
|
|
|
if (requestor)
|
|
req_type |= BIT(0); /* This STA is a TWT Requesting STA */
|
|
/* TWT Setup Command field */
|
|
req_type |= (setup_cmd & 0x7) << 1;
|
|
if (trigger)
|
|
req_type |= BIT(4); /* TWT SP includes trigger frames */
|
|
if (implicit)
|
|
req_type |= BIT(5); /* Implicit TWT */
|
|
if (flow_type)
|
|
req_type |= BIT(6); /* Flow Type: Unannounced TWT */
|
|
req_type |= (flow_id & 0x7) << 7;
|
|
req_type |= (exponent & 0x1f) << 10; /* TWT Wake Interval Exponent */
|
|
if (protection)
|
|
req_type |= BIT(15);
|
|
wpabuf_put_le16(buf, req_type);
|
|
wpabuf_put_le64(buf, twt);
|
|
wpabuf_put_u8(buf, min_twt); /* Nominal Minimum TWT Wake Duration */
|
|
wpabuf_put_le16(buf, mantissa); /* TWT Wake Interval Mantissa */
|
|
wpabuf_put_u8(buf, twt_channel); /* TWT Channel */
|
|
|
|
if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
|
|
wpa_s->own_addr, wpa_s->bssid,
|
|
wpabuf_head(buf), wpabuf_len(buf), 0) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TWT: Failed to send TWT Setup Request");
|
|
ret = -ECANCELED;
|
|
}
|
|
|
|
wpabuf_free(buf);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* wpas_twt_send_teardown - Send TWT teardown request to our AP
|
|
* @wpa_s: Pointer to wpa_supplicant
|
|
* @flags: The byte that goes inside the TWT Teardown element
|
|
* Returns: 0 in case of success, negative error code otherwise
|
|
*
|
|
*/
|
|
int wpas_twt_send_teardown(struct wpa_supplicant *wpa_s, u8 flags)
|
|
{
|
|
struct wpabuf *buf;
|
|
int ret = 0;
|
|
|
|
if (wpa_s->wpa_state != WPA_COMPLETED || !wpa_s->current_ssid) {
|
|
wpa_printf(MSG_DEBUG,
|
|
"TWT: No connection - cannot send TWT Teardown frame");
|
|
return -ENOTCONN;
|
|
}
|
|
|
|
/* 3 = Action category + Action code + flags */
|
|
buf = wpabuf_alloc(3);
|
|
if (!buf) {
|
|
wpa_printf(MSG_DEBUG,
|
|
"TWT: Failed to allocate TWT Teardown frame");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TWT: Teardown request, flags: 0x%x", flags);
|
|
|
|
wpabuf_put_u8(buf, WLAN_ACTION_S1G);
|
|
wpabuf_put_u8(buf, S1G_ACT_TWT_TEARDOWN);
|
|
wpabuf_put_u8(buf, flags);
|
|
|
|
if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
|
|
wpa_s->own_addr, wpa_s->bssid,
|
|
wpabuf_head(buf), wpabuf_len(buf), 0) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TWT: Failed to send TWT Teardown frame");
|
|
ret = -ECANCELED;
|
|
}
|
|
|
|
wpabuf_free(buf);
|
|
return ret;
|
|
}
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|