]> git.ipfire.org Git - thirdparty/hostap.git/blob - wpa_supplicant/wmm_ac.c
WMM AC: Handle TSPEC action frames
[thirdparty/hostap.git] / wpa_supplicant / wmm_ac.c
1 /*
2 * Wi-Fi Multimedia Admission Control (WMM-AC)
3 * Copyright(c) 2014, Intel Mobile Communication GmbH.
4 * Copyright(c) 2014, Intel Corporation. All rights reserved.
5 *
6 * This software may be distributed under the terms of the BSD license.
7 * See README for more details.
8 */
9
10 #include "includes.h"
11
12 #include "utils/common.h"
13 #include "utils/list.h"
14 #include "utils/eloop.h"
15 #include "common/ieee802_11_common.h"
16 #include "wpa_supplicant_i.h"
17 #include "bss.h"
18 #include "driver_i.h"
19 #include "wmm_ac.h"
20
21 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
22
23 static const enum wmm_ac up_to_ac[8] = {
24 WMM_AC_BK,
25 WMM_AC_BE,
26 WMM_AC_BE,
27 WMM_AC_BK,
28 WMM_AC_VI,
29 WMM_AC_VI,
30 WMM_AC_VO,
31 WMM_AC_VO
32 };
33
34
35 static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
36 {
37 return (tspec->ts_info[0] >> 1) & 0x0f;
38 }
39
40
41 static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
42 {
43 return (tspec->ts_info[0] >> 5) & 0x03;
44 }
45
46
47 static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
48 {
49 return (tspec->ts_info[1] >> 3) & 0x07;
50 }
51
52
53 static u8 wmm_ac_direction_to_idx(u8 direction)
54 {
55 switch (direction) {
56 case WMM_AC_DIR_UPLINK:
57 return TS_DIR_IDX_UPLINK;
58 case WMM_AC_DIR_DOWNLINK:
59 return TS_DIR_IDX_DOWNLINK;
60 case WMM_AC_DIR_BIDIRECTIONAL:
61 return TS_DIR_IDX_BIDI;
62 default:
63 wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
64 return WMM_AC_DIR_UPLINK;
65 }
66 }
67
68
69 static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
70 const struct wmm_tspec_element *tspec)
71 {
72 struct wmm_tspec_element *_tspec;
73 int ret;
74 u16 admitted_time = le_to_host16(tspec->medium_time);
75 u8 up = wmm_ac_get_user_priority(tspec);
76 u8 ac = up_to_ac[up];
77 u8 dir = wmm_ac_get_direction(tspec);
78 u8 tsid = wmm_ac_get_tsid(tspec);
79 enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
80
81 /* should have been verified before, but double-check here */
82 if (wpa_s->tspecs[ac][idx]) {
83 wpa_printf(MSG_ERROR,
84 "WMM AC: tspec (ac=%d, dir=%d) already exists!",
85 ac, dir);
86 return -1;
87 }
88
89 /* copy tspec */
90 _tspec = os_malloc(sizeof(*_tspec));
91 if (!_tspec)
92 return -1;
93
94 /* store the admitted TSPEC */
95 os_memcpy(_tspec, tspec, sizeof(*_tspec));
96
97 if (dir != WMM_AC_DIR_DOWNLINK) {
98 ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
99 wpa_printf(MSG_DEBUG,
100 "WMM AC: Add TS: addr=" MACSTR
101 " TSID=%u admitted time=%u, ret=%d",
102 MAC2STR(addr), tsid, admitted_time, ret);
103 if (ret < 0) {
104 os_free(_tspec);
105 return -1;
106 }
107 }
108
109 wpa_s->tspecs[ac][idx] = _tspec;
110
111 wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
112
113 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
114 "tsid=%d addr=" MACSTR " admitted_time=%d",
115 tsid, MAC2STR(addr), admitted_time);
116
117 return 0;
118 }
119
120
121 static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
122 enum ts_dir_idx dir)
123 {
124 struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
125 u8 tsid;
126
127 if (!tspec)
128 return;
129
130 tsid = wmm_ac_get_tsid(tspec);
131 wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
132
133 /* update the driver in case of uplink/bidi */
134 if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
135 wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
136
137 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
139
140 os_free(wpa_s->tspecs[ac][dir]);
141 wpa_s->tspecs[ac][dir] = NULL;
142 }
143
144
145 static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
146 {
147 struct wmm_ac_addts_request *req = wpa_s->addts_request;
148
149 if (!req)
150 return;
151
152 if (failed)
153 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
154 "tsid=%u", wmm_ac_get_tsid(&req->tspec));
155
156 eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
157 wpa_s->addts_request = NULL;
158 os_free(req);
159 }
160
161
162 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
163 {
164 struct wpa_supplicant *wpa_s = eloop_ctx;
165 struct wmm_ac_addts_request *addts_req = timeout_ctx;
166
167 wpa_printf(MSG_DEBUG,
168 "Timeout getting ADDTS response (tsid=%d up=%d)",
169 wmm_ac_get_tsid(&addts_req->tspec),
170 wmm_ac_get_user_priority(&addts_req->tspec));
171
172 wmm_ac_del_req(wpa_s, 1);
173 }
174
175
176 static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
177 const struct wmm_ac_addts_request *req)
178 {
179 struct wpabuf *buf;
180 int ret;
181
182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
183 MAC2STR(req->address));
184
185 /* category + action code + dialog token + status + sizeof(tspec) */
186 buf = wpabuf_alloc(4 + sizeof(req->tspec));
187 if (!buf) {
188 wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
189 return -1;
190 }
191
192 wpabuf_put_u8(buf, WLAN_ACTION_WMM);
193 wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
194 wpabuf_put_u8(buf, req->dialog_token);
195 wpabuf_put_u8(buf, 0); /* status code */
196 wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
197
198 ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
199 wpa_s->own_addr, wpa_s->bssid,
200 wpabuf_head(buf), wpabuf_len(buf), 0);
201 if (ret) {
202 wpa_printf(MSG_WARNING,
203 "WMM AC: Failed to send ADDTS Request");
204 }
205
206 wpabuf_free(buf);
207 return ret;
208 }
209
210
211 static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
212 const struct wmm_tspec_element *tspec,
213 const u8 *address)
214 {
215 struct wpabuf *buf;
216 int ret;
217
218 /* category + action code + dialog token + status + sizeof(tspec) */
219 buf = wpabuf_alloc(4 + sizeof(*tspec));
220 if (!buf)
221 return -1;
222
223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
224
225 /* category + action code + dialog token + status + sizeof(tspec) */
226 wpabuf_put_u8(buf, WLAN_ACTION_WMM);
227 wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
228 wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
229 wpabuf_put_u8(buf, 0); /* Status Code (not used) */
230 wpabuf_put_data(buf, tspec, sizeof(*tspec));
231
232 ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
233 wpa_s->own_addr, wpa_s->bssid,
234 wpabuf_head(buf), wpabuf_len(buf), 0);
235 if (ret)
236 wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
237
238 wpabuf_free(buf);
239 return ret;
240 }
241
242
243 /* return the AC using the given TSPEC tid */
244 static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
245 enum ts_dir_idx *dir)
246 {
247 int ac;
248 enum ts_dir_idx idx;
249
250 for (ac = 0; ac < WMM_AC_NUM; ac++) {
251 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
252 if (wpa_s->tspecs[ac][idx] &&
253 wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
254 if (dir)
255 *dir = idx;
256 return ac;
257 }
258 }
259 }
260
261 return -1;
262 }
263
264
265 static struct wmm_ac_addts_request *
266 wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
267 const struct wmm_ac_ts_setup_params *params,
268 const u8 *address)
269 {
270 struct wmm_ac_addts_request *addts_req;
271 struct wmm_tspec_element *tspec;
272 u8 ac = up_to_ac[params->user_priority];
273 u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
274
275 addts_req = os_zalloc(sizeof(*addts_req));
276 if (!addts_req)
277 return NULL;
278
279 tspec = &addts_req->tspec;
280 os_memcpy(addts_req->address, address, ETH_ALEN);
281
282 /* The dialog token cannot be zero */
283 if (++wpa_s->wmm_ac_last_dialog_token == 0)
284 wpa_s->wmm_ac_last_dialog_token++;
285
286 addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
287 tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
288 tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
289 tspec->oui[0] = 0x00;
290 tspec->oui[1] = 0x50;
291 tspec->oui[2] = 0xf2;
292 tspec->oui_type = WMM_OUI_TYPE;
293 tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
294 tspec->version = WMM_VERSION;
295
296 tspec->ts_info[0] = params->tsid << 1;
297 tspec->ts_info[0] |= params->direction << 5;
298 tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
299 tspec->ts_info[1] = uapsd << 2;
300 tspec->ts_info[1] |= params->user_priority << 3;
301 tspec->ts_info[2] = 0;
302
303 tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
304 if (params->fixed_nominal_msdu)
305 tspec->nominal_msdu_size |=
306 host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
307
308 tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
309 tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
310 tspec->surplus_bandwidth_allowance =
311 host_to_le16(params->surplus_bandwidth_allowance);
312
313 return addts_req;
314 }
315
316
317 static int param_in_range(const char *name, long value,
318 long min_val, long max_val)
319 {
320 if (value < min_val || (max_val >= 0 && value > max_val)) {
321 wpa_printf(MSG_DEBUG,
322 "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
323 name, value, min_val, max_val);
324 return 0;
325 }
326
327 return 1;
328 }
329
330
331 static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
332 u8 tsid, u8 ac, u8 dir)
333 {
334 enum ts_dir_idx idx;
335 int cur_ac, existing_ts = 0, replace_ts = 0;
336
337 cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
338 if (cur_ac >= 0) {
339 if (cur_ac != ac) {
340 wpa_printf(MSG_DEBUG,
341 "WMM AC: TSID %i already exists on different ac (%d)",
342 tsid, cur_ac);
343 return -1;
344 }
345
346 /* same tsid - this tspec will replace the current one */
347 replace_ts |= BIT(idx);
348 }
349
350 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
351 if (wpa_s->tspecs[ac][idx])
352 existing_ts |= BIT(idx);
353 }
354
355 switch (dir) {
356 case WMM_AC_DIR_UPLINK:
357 /* replace existing uplink/bidi tspecs */
358 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
359 BIT(TS_DIR_IDX_BIDI));
360 break;
361 case WMM_AC_DIR_DOWNLINK:
362 /* replace existing downlink/bidi tspecs */
363 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
364 BIT(TS_DIR_IDX_BIDI));
365 break;
366 case WMM_AC_DIR_BIDIRECTIONAL:
367 /* replace all existing tspecs */
368 replace_ts |= existing_ts;
369 break;
370 default:
371 return -1;
372 }
373
374 return replace_ts;
375 }
376
377
378 static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
379 const struct wmm_ac_ts_setup_params *params)
380 {
381 enum wmm_ac req_ac;
382
383 #define PARAM_IN_RANGE(field, min_value, max_value) \
384 param_in_range(#field, params->field, min_value, max_value)
385
386 if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
387 !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
388 !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
389 !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
390 !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
391 !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
392 -1))
393 return 0;
394 #undef PARAM_IN_RANGE
395
396 if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
397 params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
398 params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
399 wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
400 params->direction);
401 return 0;
402 }
403
404 req_ac = up_to_ac[params->user_priority];
405
406 /* Requested accesss category must have acm */
407 if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
408 wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
409 return 0;
410 }
411
412 if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
413 params->direction) < 0)
414 return 0;
415
416 return 1;
417 }
418
419
420 static struct wmm_ac_assoc_data *
421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
422 size_t ies_len)
423 {
424 struct ieee802_11_elems elems;
425 struct wmm_parameter_element *wmm_params;
426 struct wmm_ac_assoc_data *assoc_data;
427 int i;
428
429 /* Parsing WMM Parameter Element */
430 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) != ParseOK) {
431 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
432 return NULL;
433 }
434
435 if (!elems.wmm) {
436 wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
437 return NULL;
438 }
439
440 if (elems.wmm_len != sizeof(*wmm_params)) {
441 wpa_printf(MSG_WARNING, "WMM AC: Invalid WMM ie length");
442 return NULL;
443 }
444
445 wmm_params = (struct wmm_parameter_element *)(elems.wmm);
446
447 assoc_data = os_zalloc(sizeof(*assoc_data));
448 if (!assoc_data)
449 return NULL;
450
451 for (i = 0; i < WMM_AC_NUM; i++)
452 assoc_data->ac_params[i].acm =
453 !!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
454
455 wpa_printf(MSG_DEBUG,
456 "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
457 assoc_data->ac_params[WMM_AC_BE].acm,
458 assoc_data->ac_params[WMM_AC_BK].acm,
459 assoc_data->ac_params[WMM_AC_VI].acm,
460 assoc_data->ac_params[WMM_AC_VO].acm);
461
462 return assoc_data;
463 }
464
465
466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
467 size_t ies_len, const struct wmm_params *wmm_params)
468 {
469 struct wmm_ac_assoc_data *assoc_data;
470 u8 ac;
471
472 if (wpa_s->wmm_ac_assoc_info) {
473 wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
474 return -1;
475 }
476
477 if (!ies) {
478 wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
479 return -1;
480 }
481
482 if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
483 wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
484 return -1;
485 }
486
487 os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
488 wpa_s->wmm_ac_last_dialog_token = 0;
489 wpa_s->addts_request = NULL;
490
491 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
492 if (!assoc_data)
493 return -1;
494
495 wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
496 wmm_params->uapsd_queues);
497
498 for (ac = 0; ac < WMM_AC_NUM; ac++) {
499 assoc_data->ac_params[ac].uapsd =
500 !!(wmm_params->uapsd_queues & BIT(ac));
501 }
502
503 wpa_s->wmm_ac_assoc_info = assoc_data;
504 return 0;
505 }
506
507
508 static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
509 {
510 enum ts_dir_idx idx;
511
512 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
513 if (!(dir_bitmap & BIT(idx)))
514 continue;
515
516 wmm_ac_del_ts_idx(wpa_s, ac, idx);
517 }
518 }
519
520
521 static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
522 {
523 int i;
524
525 for (i = 0; i < WMM_AC_NUM; i++)
526 wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
527
528 /* delete pending add_ts requset */
529 wmm_ac_del_req(wpa_s, 1);
530
531 os_free(wpa_s->wmm_ac_assoc_info);
532 wpa_s->wmm_ac_assoc_info = NULL;
533 }
534
535
536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
537 size_t ies_len, const struct wmm_params *wmm_params)
538 {
539 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
540 return;
541
542 wpa_printf(MSG_DEBUG,
543 "WMM AC: Valid WMM association, WMM AC is enabled");
544 }
545
546
547 void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
548 {
549 if (!wpa_s->wmm_ac_assoc_info)
550 return;
551
552 wmm_ac_deinit(wpa_s);
553 wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
554 }
555
556
557 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
558 {
559 struct wmm_tspec_element *tspec;
560 int ac;
561 enum ts_dir_idx dir;
562
563 if (!wpa_s->wmm_ac_assoc_info) {
564 wpa_printf(MSG_DEBUG,
565 "WMM AC: Failed to delete TS, WMM AC is disabled");
566 return -1;
567 }
568
569 ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
570 if (ac < 0) {
571 wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
572 return -1;
573 }
574
575 tspec = wpa_s->tspecs[ac][dir];
576 wmm_ac_send_delts(wpa_s, tspec, wpa_s->bssid);
577
578 wmm_ac_del_ts_idx(wpa_s, ac, dir);
579
580 return 0;
581 }
582
583
584 int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
585 struct wmm_ac_ts_setup_params *params)
586 {
587 struct wmm_ac_addts_request *addts_req;
588
589 if (!wpa_s->wmm_ac_assoc_info) {
590 wpa_printf(MSG_DEBUG,
591 "WMM AC: Cannot add TS - missing assoc data");
592 return -1;
593 }
594
595 if (wpa_s->addts_request) {
596 wpa_printf(MSG_DEBUG,
597 "WMM AC: can't add TS - ADDTS request is already pending");
598 return -1;
599 }
600
601 /*
602 * we can setup downlink TS even without driver support.
603 * however, we need driver support for the other directions.
604 */
605 if (params->direction != WMM_AC_DIR_DOWNLINK &&
606 !wpa_s->wmm_ac_supported) {
607 wpa_printf(MSG_DEBUG,
608 "Cannot set uplink/bidi TS without driver support");
609 return -1;
610 }
611
612 if (!wmm_ac_ts_req_is_valid(wpa_s, params))
613 return -1;
614
615 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
616 " tsid=%u user priority=%u direction=%d)",
617 MAC2STR(wpa_s->bssid), params->tsid,
618 params->user_priority, params->direction);
619
620 addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
621 if (!addts_req)
622 return -1;
623
624 if (wmm_ac_send_addts_request(wpa_s, addts_req))
625 goto err;
626
627 /* save as pending and set ADDTS resp timeout to 1 second */
628 wpa_s->addts_request = addts_req;
629 eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
630 wpa_s, addts_req);
631 return 0;
632 err:
633 os_free(addts_req);
634 return -1;
635 }
636
637
638 static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
639 const struct wmm_tspec_element *tspec)
640 {
641 int ac;
642 u8 tsid;
643 enum ts_dir_idx idx;
644
645 tsid = wmm_ac_get_tsid(tspec);
646
647 wpa_printf(MSG_DEBUG,
648 "WMM AC: DELTS frame has been received TSID=%u addr="
649 MACSTR, tsid, MAC2STR(sa));
650
651 ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
652 if (ac < 0) {
653 wpa_printf(MSG_DEBUG,
654 "WMM AC: Ignoring DELTS frame - TSID does not exist");
655 return;
656 }
657
658 wmm_ac_del_ts_idx(wpa_s, ac, idx);
659
660 wpa_printf(MSG_INFO,
661 "TS was deleted successfully (tsid=%u address=" MACSTR ")",
662 tsid, MAC2STR(sa));
663 }
664
665
666 static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
667 const u8 resp_dialog_token, const u8 status_code,
668 const struct wmm_tspec_element *tspec)
669 {
670 struct wmm_ac_addts_request *req = wpa_s->addts_request;
671 u8 ac, tsid, up, dir;
672 int replace_tspecs;
673
674 tsid = wmm_ac_get_tsid(tspec);
675 dir = wmm_ac_get_direction(tspec);
676 up = wmm_ac_get_user_priority(tspec);
677 ac = up_to_ac[up];
678
679 /* make sure we have a matching addts request */
680 if (!req || req->dialog_token != resp_dialog_token) {
681 wpa_printf(MSG_ERROR,
682 "WMM AC: no req with dialog=%u, ignoring frame",
683 resp_dialog_token);
684 return;
685 }
686
687 /* make sure the params are the same */
688 if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
689 tsid != wmm_ac_get_tsid(&req->tspec) ||
690 up != wmm_ac_get_user_priority(&req->tspec) ||
691 dir != wmm_ac_get_direction(&req->tspec)) {
692 wpa_printf(MSG_ERROR,
693 "WMM AC: ADDTS params do not match, ignoring frame");
694 return;
695 }
696
697 /* delete pending request */
698 wmm_ac_del_req(wpa_s, 0);
699
700 wpa_printf(MSG_INFO,
701 "ADDTS response status=%d tsid=%u up=%u direction=%u",
702 status_code, tsid, up, dir);
703
704 if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
705 wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
706 goto err_msg;
707 }
708
709 replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
710 if (replace_tspecs < 0)
711 goto err_delts;
712
713 wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
714
715 /* when replacing tspecs - delete first */
716 wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
717
718 /* Creating a new traffic stream */
719 wpa_printf(MSG_DEBUG,
720 "WMM AC: adding a new TS with TSID=%u address="MACSTR
721 " medium time=%u access category=%d dir=%d ",
722 tsid, MAC2STR(sa),
723 le_to_host16(tspec->medium_time), ac, dir);
724
725 if (wmm_ac_add_ts(wpa_s, sa, tspec))
726 goto err_delts;
727
728 return;
729
730 err_delts:
731 /* ask the ap to delete the tspec */
732 wmm_ac_send_delts(wpa_s, tspec, sa);
733 err_msg:
734 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
735 tsid);
736 }
737
738
739 void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
740 const u8 *sa, const u8 *data, size_t len)
741 {
742 u8 action;
743 u8 dialog_token;
744 u8 status_code;
745 struct ieee802_11_elems elems;
746 struct wmm_tspec_element *tspec;
747
748 if (wpa_s->wmm_ac_assoc_info == NULL) {
749 wpa_printf(MSG_WARNING,
750 "WMM AC: WMM AC is disabled, ignoring action frame");
751 return;
752 }
753
754 action = data[0];
755
756 if (action != WMM_ACTION_CODE_ADDTS_RESP &&
757 action != WMM_ACTION_CODE_DELTS) {
758 wpa_printf(MSG_WARNING,
759 "WMM AC: Unknown action (%d), ignoring action frame",
760 action);
761 return;
762 }
763
764 /* WMM AC action frame */
765 if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
766 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
767 " is other than ours, ignoring frame", MAC2STR(da));
768 return;
769 }
770
771 if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
772 wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
773 " different other than our bssid", MAC2STR(da));
774 return;
775 }
776
777 if (len < 2 + sizeof(struct wmm_tspec_element)) {
778 wpa_printf(MSG_DEBUG,
779 "WMM AC: Short ADDTS response ignored (len=%lu)",
780 (unsigned long) len);
781 return;
782 }
783
784 data++;
785 len--;
786 dialog_token = data[0];
787 status_code = data[1];
788
789 if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
790 wpa_printf(MSG_DEBUG,
791 "WMM AC: Could not parse WMM AC action from " MACSTR,
792 MAC2STR(sa));
793 return;
794 }
795
796 /* the struct also contains the type and value, so decrease it */
797 if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
798 wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
799 return;
800 }
801
802 tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
803
804 wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
805 MAC2STR(sa));
806 wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
807
808 switch (action) {
809 case WMM_ACTION_CODE_ADDTS_RESP:
810 wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
811 tspec);
812 break;
813 case WMM_ACTION_CODE_DELTS:
814 wmm_ac_handle_delts(wpa_s, sa, tspec);
815 break;
816 default:
817 break;
818 }
819 }