FST: Fix search for peer's "other" connection
[mech_eap.git] / src / fst / fst_session.c
1 /*
2  * FST module - FST Session implementation
3  * Copyright (c) 2014, Qualcomm Atheros, Inc.
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "common/defs.h"
14 #include "fst/fst_internal.h"
15 #include "fst/fst_defs.h"
16 #include "fst/fst_ctrl_iface.h"
17 #ifdef CONFIG_FST_TEST
18 #include "fst/fst_ctrl_defs.h"
19 #endif /* CONFIG_FST_TEST */
20
21 #define US_80211_TU 1024
22
23 #define US_TO_TU(m) ((m) * / US_80211_TU)
24 #define TU_TO_US(m) ((m) * US_80211_TU)
25
26 #define FST_LLT_SWITCH_IMMEDIATELY 0
27
28 #define fst_printf_session(s, level, format, ...) \
29         fst_printf((level), "%u (0x%08x): [" MACSTR "," MACSTR "] :" format, \
30                    (s)->id, (s)->data.fsts_id, \
31                    MAC2STR((s)->data.old_peer_addr), \
32                    MAC2STR((s)->data.new_peer_addr), \
33                    ##__VA_ARGS__)
34
35 #define fst_printf_siface(s, iface, level, format, ...) \
36         fst_printf_session((s), (level), "%s: " format, \
37                            fst_iface_get_name(iface), ##__VA_ARGS__)
38
39 #define fst_printf_sframe(s, is_old, level, format, ...) \
40         fst_printf_siface((s), \
41                 (is_old) ? (s)->data.old_iface : (s)->data.new_iface, \
42                 (level), format, ##__VA_ARGS__)
43
44 #define FST_LLT_MS_DEFAULT 50
45 #define FST_ACTION_MAX_SUPPORTED   FST_ACTION_ON_CHANNEL_TUNNEL
46
47 static const char * const fst_action_names[] = {
48         [FST_ACTION_SETUP_REQUEST]     = "Setup Request",
49         [FST_ACTION_SETUP_RESPONSE]    = "Setup Response",
50         [FST_ACTION_TEAR_DOWN]         = "Tear Down",
51         [FST_ACTION_ACK_REQUEST]       = "Ack Request",
52         [FST_ACTION_ACK_RESPONSE]      = "Ack Response",
53         [FST_ACTION_ON_CHANNEL_TUNNEL] = "On Channel Tunnel",
54 };
55
56 struct fst_session {
57         struct {
58                 /* Session configuration that can be zeroed on reset */
59                 u8 old_peer_addr[ETH_ALEN];
60                 u8 new_peer_addr[ETH_ALEN];
61                 struct fst_iface *new_iface;
62                 struct fst_iface *old_iface;
63                 u32 llt_ms;
64                 u8 pending_setup_req_dlgt;
65                 u32 fsts_id; /* FSTS ID, see spec, 8.4.2.147
66                               * Session Transition element */
67         } data;
68         /* Session object internal fields which won't be zeroed on reset */
69         struct dl_list global_sessions_lentry;
70         u32 id; /* Session object ID used to identify
71                  * specific session object */
72         struct fst_group *group;
73         enum fst_session_state state;
74         Boolean stt_armed;
75 };
76
77 static struct dl_list global_sessions_list;
78 static u32 global_session_id = 0;
79
80 #define foreach_fst_session(s) \
81         dl_list_for_each((s), &global_sessions_list, \
82                          struct fst_session, global_sessions_lentry)
83
84 #define foreach_fst_session_safe(s, temp) \
85         dl_list_for_each_safe((s), (temp), &global_sessions_list, \
86                               struct fst_session, global_sessions_lentry)
87
88
89 static void fst_session_global_inc_id(void)
90 {
91         global_session_id++;
92         if (global_session_id == FST_INVALID_SESSION_ID)
93                 global_session_id++;
94 }
95
96
97 int fst_session_global_init(void)
98 {
99         dl_list_init(&global_sessions_list);
100         return 0;
101 }
102
103
104 void fst_session_global_deinit(void)
105 {
106         WPA_ASSERT(dl_list_empty(&global_sessions_list));
107 }
108
109
110 static inline void fst_session_notify_ctrl(struct fst_session *s,
111                                            enum fst_event_type event_type,
112                                            union fst_event_extra *extra)
113 {
114         foreach_fst_ctrl_call(on_event, event_type, NULL, s, extra);
115 }
116
117
118 static void fst_session_set_state(struct fst_session *s,
119                                   enum fst_session_state state,
120                                   union fst_session_state_switch_extra *extra)
121 {
122         if (s->state != state) {
123                 union fst_event_extra evext = {
124                         .session_state = {
125                                 .old_state = s->state,
126                                 .new_state = state,
127                         },
128                 };
129
130                 if (extra)
131                         evext.session_state.extra = *extra;
132                 fst_session_notify_ctrl(s, EVENT_FST_SESSION_STATE_CHANGED,
133                                         &evext);
134                 fst_printf_session(s, MSG_INFO, "State: %s => %s",
135                                    fst_session_state_name(s->state),
136                                    fst_session_state_name(state));
137                 s->state = state;
138         }
139 }
140
141
142 static u32 fst_find_free_session_id(void)
143 {
144         u32 i, id = FST_INVALID_SESSION_ID;
145         struct fst_session *s;
146
147         for (i = 0; i < (u32) -1; i++) {
148                 Boolean in_use = FALSE;
149
150                 foreach_fst_session(s) {
151                         if (s->id == global_session_id) {
152                                 fst_session_global_inc_id();
153                                 in_use = TRUE;
154                                 break;
155                         }
156                 }
157                 if (!in_use) {
158                         id = global_session_id;
159                         fst_session_global_inc_id();
160                         break;
161                 }
162         }
163
164         return id;
165 }
166
167
168 static void fst_session_timeout_handler(void *eloop_data, void *user_ctx)
169 {
170         struct fst_session *s = user_ctx;
171         union fst_session_state_switch_extra extra = {
172                 .to_initial = {
173                         .reason = REASON_STT,
174                 },
175         };
176
177         fst_printf_session(s, MSG_WARNING, "Session State Timeout");
178         fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &extra);
179 }
180
181
182 static void fst_session_stt_arm(struct fst_session *s)
183 {
184         /* Action frames sometimes get delayed. Use relaxed timeout (2*) */
185         eloop_register_timeout(0, 2 * TU_TO_US(FST_DEFAULT_SESSION_TIMEOUT_TU),
186                                fst_session_timeout_handler, NULL, s);
187         s->stt_armed = TRUE;
188 }
189
190
191 static void fst_session_stt_disarm(struct fst_session *s)
192 {
193         if (s->stt_armed) {
194                 eloop_cancel_timeout(fst_session_timeout_handler, NULL, s);
195                 s->stt_armed = FALSE;
196         }
197 }
198
199
200 static Boolean fst_session_is_in_transition(struct fst_session *s)
201 {
202         /* See spec, 10.32.2.2  Transitioning between states */
203         return s->stt_armed;
204 }
205
206
207 static int fst_session_is_in_progress(struct fst_session *s)
208 {
209         return s->state != FST_SESSION_STATE_INITIAL;
210 }
211
212
213 static int fst_session_is_ready_pending(struct fst_session *s)
214 {
215         return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
216                 fst_session_is_in_transition(s);
217 }
218
219
220 static int fst_session_is_ready(struct fst_session *s)
221 {
222         return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
223                 !fst_session_is_in_transition(s);
224 }
225
226
227 static int fst_session_is_switch_requested(struct fst_session *s)
228 {
229         return s->state == FST_SESSION_STATE_TRANSITION_DONE &&
230                 fst_session_is_in_transition(s);
231 }
232
233
234 static struct fst_session *
235 fst_find_session_in_progress(const u8 *peer_addr, struct fst_group *g)
236 {
237         struct fst_session *s;
238
239         foreach_fst_session(s) {
240                 if (s->group == g &&
241                     (os_memcmp(s->data.old_peer_addr, peer_addr,
242                                ETH_ALEN) == 0 ||
243                      os_memcmp(s->data.new_peer_addr, peer_addr,
244                                ETH_ALEN) == 0) &&
245                     fst_session_is_in_progress(s))
246                         return s;
247         }
248
249         return NULL;
250 }
251
252
253 static void fst_session_reset_ex(struct fst_session *s, enum fst_reason reason)
254 {
255         union fst_session_state_switch_extra evext = {
256                 .to_initial = {
257                         .reason = reason,
258                 },
259         };
260
261         if (s->state == FST_SESSION_STATE_SETUP_COMPLETION ||
262             s->state == FST_SESSION_STATE_TRANSITION_DONE)
263                 fst_session_tear_down_setup(s);
264         fst_session_stt_disarm(s);
265         os_memset(&s->data, 0, sizeof(s->data));
266         fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
267 }
268
269
270 static int fst_session_send_action(struct fst_session *s, Boolean old_iface,
271                                    const void *payload, size_t size,
272                                    const struct wpabuf *extra_buf)
273 {
274         size_t len;
275         int res;
276         struct wpabuf *buf;
277         u8 action;
278         struct fst_iface *iface =
279                 old_iface ? s->data.old_iface : s->data.new_iface;
280
281         WPA_ASSERT(payload != NULL);
282         WPA_ASSERT(size != 0);
283
284         action = *(const u8 *) payload;
285
286         WPA_ASSERT(action <= FST_ACTION_MAX_SUPPORTED);
287
288         if (!iface) {
289                 fst_printf_session(s, MSG_ERROR,
290                                    "no %s interface for FST Action '%s' sending",
291                                    old_iface ? "old" : "new",
292                                    fst_action_names[action]);
293                 return -1;
294         }
295
296         len = sizeof(u8) /* category */ + size;
297         if (extra_buf)
298                 len += wpabuf_size(extra_buf);
299
300         buf = wpabuf_alloc(len);
301         if (!buf) {
302                 fst_printf_session(s, MSG_ERROR,
303                                    "cannot allocate buffer of %zu bytes for FST Action '%s' sending",
304                                    len, fst_action_names[action]);
305                 return -1;
306         }
307
308         wpabuf_put_u8(buf, WLAN_ACTION_FST);
309         wpabuf_put_data(buf, payload, size);
310         if (extra_buf)
311                 wpabuf_put_buf(buf, extra_buf);
312
313         res = fst_iface_send_action(iface,
314                                     old_iface ? s->data.old_peer_addr :
315                                     s->data.new_peer_addr, buf);
316         if (res < 0)
317                 fst_printf_siface(s, iface, MSG_ERROR,
318                                   "failed to send FST Action '%s'",
319                                   fst_action_names[action]);
320         else
321                 fst_printf_siface(s, iface, MSG_DEBUG, "FST Action '%s' sent",
322                                   fst_action_names[action]);
323         wpabuf_free(buf);
324
325         return res;
326 }
327
328
329 static int fst_session_send_tear_down(struct fst_session *s)
330 {
331         struct fst_tear_down td;
332         int res;
333
334         if (!fst_session_is_in_progress(s)) {
335                 fst_printf_session(s, MSG_ERROR, "No FST setup to tear down");
336                 return -1;
337         }
338
339         WPA_ASSERT(s->data.old_iface != NULL);
340         WPA_ASSERT(s->data.new_iface != NULL);
341
342         os_memset(&td, 0, sizeof(td));
343
344         td.action = FST_ACTION_TEAR_DOWN;
345         td.fsts_id = host_to_le32(s->data.fsts_id);
346
347         res = fst_session_send_action(s, TRUE, &td, sizeof(td), NULL);
348         if (!res)
349                 fst_printf_sframe(s, TRUE, MSG_INFO, "FST TearDown sent");
350         else
351                 fst_printf_sframe(s, TRUE, MSG_ERROR,
352                                   "failed to send FST TearDown");
353
354         return res;
355 }
356
357
358 static void fst_session_handle_setup_request(struct fst_iface *iface,
359                                              const struct ieee80211_mgmt *mgmt,
360                                              size_t frame_len)
361 {
362         struct fst_session *s;
363         const struct fst_setup_req *req;
364         struct fst_iface *new_iface = NULL;
365         struct fst_group *g;
366         u8 new_iface_peer_addr[ETH_ALEN];
367         size_t plen;
368
369         if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req))  {
370                 fst_printf_iface(iface, MSG_WARNING,
371                                  "FST Request dropped: too short (%zu < %zu)",
372                                  frame_len,
373                                  IEEE80211_HDRLEN + 1 + sizeof(*req));
374                 return;
375         }
376         plen = frame_len - IEEE80211_HDRLEN - 1;
377         req = (const struct fst_setup_req *)
378                 (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
379         if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION ||
380             req->stie.length < 11) {
381                 fst_printf_iface(iface, MSG_WARNING,
382                                  "FST Request dropped: invalid STIE");
383                 return;
384         }
385
386         if (req->stie.new_band_id == req->stie.old_band_id) {
387                 fst_printf_iface(iface, MSG_WARNING,
388                                  "FST Request dropped: new and old band IDs are the same");
389                 return;
390         }
391
392         g = fst_iface_get_group(iface);
393
394         if (plen > sizeof(*req)) {
395                 fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1),
396                                        plen - sizeof(*req));
397                 fst_printf_iface(iface, MSG_INFO,
398                                  "FST Request: MB IEs updated for " MACSTR,
399                                  MAC2STR(mgmt->sa));
400         }
401
402         new_iface = fst_group_get_peer_other_connection(iface, mgmt->sa,
403                                                         req->stie.new_band_id,
404                                                         new_iface_peer_addr);
405         if (!new_iface) {
406                 fst_printf_iface(iface, MSG_WARNING,
407                                  "FST Request dropped: new iface not found");
408                 return;
409         }
410         fst_printf_iface(iface, MSG_INFO,
411                          "FST Request: new iface (%s:" MACSTR ") found",
412                          fst_iface_get_name(new_iface),
413                          MAC2STR(new_iface_peer_addr));
414
415         s = fst_find_session_in_progress(mgmt->sa, g);
416         if (s) {
417                 union fst_session_state_switch_extra evext = {
418                         .to_initial = {
419                                 .reason = REASON_SETUP,
420                         },
421                 };
422
423                 /*
424                  * 10.32.2.2  Transitioning between states:
425                  * Upon receipt of an FST Setup Request frame, the responder
426                  * shall respond with an FST Setup Response frame unless it has
427                  * a pending FST Setup Request frame addressed to the initiator
428                  * and the responder has a numerically larger MAC address than
429                  * the initiator’s MAC address, in which case, the responder
430                  * shall delete the received FST Setup Request.
431                  */
432                 if (fst_session_is_ready_pending(s) &&
433                     /* waiting for Setup Response */
434                     os_memcmp(mgmt->da, mgmt->sa, ETH_ALEN) > 0) {
435                         fst_printf_session(s, MSG_WARNING,
436                                            "FST Request dropped due to MAC comparison (our MAC is "
437                                            MACSTR ")",
438                                            MAC2STR(mgmt->da));
439                         return;
440                 }
441
442                 /*
443                  * State is SETUP_COMPLETION (either in transition or not) or
444                  * TRANSITION_DONE (in transition).
445                  * Setup Request arriving in this state could mean:
446                  * 1. peer sent it before receiving our Setup Request (race
447                  *    condition)
448                  * 2. peer didn't receive our Setup Response. Peer is retrying
449                  *    after STT timeout
450                  * 3. peer's FST state machines are out of sync due to some
451                  *    other reason
452                  *
453                  * We will reset our session and create a new one instead.
454                  */
455
456                 fst_printf_session(s, MSG_WARNING,
457                         "resetting due to FST request");
458
459                 /*
460                  * If FST Setup Request arrived with the same FSTS ID as one we
461                  * initialized before, there's no need to tear down the session.
462                  * Moreover, as FSTS ID is the same, the other side will
463                  * associate this tear down with the session it initiated that
464                  * will break the sync.
465                  */
466                 if (le_to_host32(req->stie.fsts_id) != s->data.fsts_id)
467                         fst_session_send_tear_down(s);
468                 else
469                         fst_printf_session(s, MSG_WARNING,
470                                            "Skipping TearDown as the FST request has the same FSTS ID as initiated");
471                 fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
472                 fst_session_stt_disarm(s);
473         }
474
475         s = fst_session_create(g);
476         if (!s) {
477                 fst_printf(MSG_WARNING,
478                            "FST Request dropped: cannot create session for %s and %s",
479                            fst_iface_get_name(iface),
480                            fst_iface_get_name(new_iface));
481                 return;
482         }
483
484         fst_session_set_iface(s, iface, TRUE);
485         fst_session_set_peer_addr(s, mgmt->sa, TRUE);
486         fst_session_set_iface(s, new_iface, FALSE);
487         fst_session_set_peer_addr(s, new_iface_peer_addr, FALSE);
488         fst_session_set_llt(s, FST_LLT_VAL_TO_MS(le_to_host32(req->llt)));
489         s->data.pending_setup_req_dlgt = req->dialog_token;
490         s->data.fsts_id = le_to_host32(req->stie.fsts_id);
491
492         fst_session_stt_arm(s);
493
494         fst_session_notify_ctrl(s, EVENT_FST_SETUP, NULL);
495
496         fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION, NULL);
497 }
498
499
500 static void fst_session_handle_setup_response(struct fst_session *s,
501                                               struct fst_iface *iface,
502                                               const struct ieee80211_mgmt *mgmt,
503                                               size_t frame_len)
504 {
505         const struct fst_setup_res *res;
506         size_t plen = frame_len - IEEE80211_HDRLEN - 1;
507         enum hostapd_hw_mode hw_mode;
508         u8 channel;
509         union fst_session_state_switch_extra evext = {
510                 .to_initial = {
511                         .reject_code = 0,
512                 },
513         };
514
515         if (iface != s->data.old_iface) {
516                 fst_printf_session(s, MSG_WARNING,
517                                    "FST Response dropped: %s is not the old iface",
518                                    fst_iface_get_name(iface));
519                 return;
520         }
521
522         if (!fst_session_is_ready_pending(s)) {
523                 fst_printf_session(s, MSG_WARNING,
524                                    "FST Response dropped due to wrong state: %s",
525                                    fst_session_state_name(s->state));
526                 return;
527         }
528
529         if (plen < sizeof(*res)) {
530                 fst_printf_session(s, MSG_WARNING,
531                                    "Too short FST Response dropped");
532                 return;
533         }
534         res = (const struct fst_setup_res *)
535                 (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
536         if (res->stie.element_id != WLAN_EID_SESSION_TRANSITION ||
537             res->stie.length < 11) {
538                 fst_printf_iface(iface, MSG_WARNING,
539                                  "FST Response dropped: invalid STIE");
540                 return;
541         }
542
543         if (res->dialog_token != s->data.pending_setup_req_dlgt)  {
544                 fst_printf_session(s, MSG_WARNING,
545                                    "FST Response dropped due to wrong dialog token (%u != %u)",
546                                    s->data.pending_setup_req_dlgt,
547                                    res->dialog_token);
548                 return;
549         }
550
551         if (res->status_code == WLAN_STATUS_SUCCESS &&
552             le_to_host32(res->stie.fsts_id) != s->data.fsts_id) {
553                 fst_printf_session(s, MSG_WARNING,
554                                    "FST Response dropped due to wrong FST Session ID (%u)",
555                                    le_to_host32(res->stie.fsts_id));
556                 return;
557         }
558
559         fst_session_stt_disarm(s);
560
561         if (res->status_code != WLAN_STATUS_SUCCESS) {
562                 /*
563                  * 10.32.2.2  Transitioning between states
564                  * The initiator shall set the STT to the value of the
565                  * FSTSessionTimeOut field at ... and at each ACK frame sent in
566                  * response to a received FST Setup Response with the Status
567                  * Code field equal to PENDING_ADMITTING_FST_SESSION or
568                  * PENDING_GAP_IN_BA_WINDOW.
569                  */
570                 evext.to_initial.reason = REASON_REJECT;
571                 evext.to_initial.reject_code = res->status_code;
572                 evext.to_initial.initiator = FST_INITIATOR_REMOTE;
573                 fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
574                 fst_printf_session(s, MSG_WARNING,
575                                    "FST Setup rejected by remote side with status %u",
576                                    res->status_code);
577                 return;
578         }
579
580         fst_iface_get_channel_info(s->data.new_iface, &hw_mode, &channel);
581
582         if (fst_hw_mode_to_band(hw_mode) != res->stie.new_band_id) {
583                 evext.to_initial.reason = REASON_ERROR_PARAMS;
584                 fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
585                 fst_printf_session(s, MSG_WARNING,
586                                    "invalid FST Setup parameters");
587                 fst_session_tear_down_setup(s);
588                 return;
589         }
590
591         fst_printf_session(s, MSG_INFO,
592                            "%s: FST Setup established for %s (llt=%u)",
593                            fst_iface_get_name(s->data.old_iface),
594                            fst_iface_get_name(s->data.new_iface),
595                            s->data.llt_ms);
596
597         fst_session_notify_ctrl(s, EVENT_FST_ESTABLISHED, NULL);
598
599         if (s->data.llt_ms == FST_LLT_SWITCH_IMMEDIATELY)
600                 fst_session_initiate_switch(s);
601 }
602
603
604 static void fst_session_handle_tear_down(struct fst_session *s,
605                                          struct fst_iface *iface,
606                                          const struct ieee80211_mgmt *mgmt,
607                                          size_t frame_len)
608 {
609         const struct fst_tear_down *td;
610         size_t plen = frame_len - IEEE80211_HDRLEN - 1;
611         union fst_session_state_switch_extra evext = {
612                 .to_initial = {
613                         .reason = REASON_TEARDOWN,
614                         .initiator = FST_INITIATOR_REMOTE,
615                 },
616         };
617
618         if (plen < sizeof(*td)) {
619                 fst_printf_session(s, MSG_WARNING,
620                                    "Too short FST Tear Down dropped");
621                 return;
622         }
623         td = (const struct fst_tear_down *)
624                 (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
625
626         if (le_to_host32(td->fsts_id) != s->data.fsts_id) {
627                 fst_printf_siface(s, iface, MSG_WARNING,
628                                   "tear down for wrong FST Setup ID (%u)",
629                                   le_to_host32(td->fsts_id));
630                 return;
631         }
632
633         fst_session_stt_disarm(s);
634
635         fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
636 }
637
638
639 static void fst_session_handle_ack_request(struct fst_session *s,
640                                            struct fst_iface *iface,
641                                            const struct ieee80211_mgmt *mgmt,
642                                            size_t frame_len)
643 {
644         const struct fst_ack_req *req;
645         size_t plen = frame_len - IEEE80211_HDRLEN - 1;
646         struct fst_ack_res res;
647         union fst_session_state_switch_extra evext = {
648                 .to_initial = {
649                         .reason = REASON_SWITCH,
650                         .initiator = FST_INITIATOR_REMOTE,
651                 },
652         };
653
654         if (!fst_session_is_ready(s) && !fst_session_is_switch_requested(s)) {
655                 fst_printf_siface(s, iface, MSG_ERROR,
656                                   "cannot initiate switch due to wrong session state (%s)",
657                                   fst_session_state_name(s->state));
658                 return;
659         }
660
661         WPA_ASSERT(s->data.new_iface != NULL);
662
663         if (iface != s->data.new_iface) {
664                 fst_printf_siface(s, iface, MSG_ERROR,
665                                   "Ack received on wrong interface");
666                 return;
667         }
668
669         if (plen < sizeof(*req)) {
670                 fst_printf_session(s, MSG_WARNING,
671                                    "Too short FST Ack Request dropped");
672                 return;
673         }
674         req = (const struct fst_ack_req *)
675                 (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
676
677         if (le_to_host32(req->fsts_id) != s->data.fsts_id) {
678                 fst_printf_siface(s, iface, MSG_WARNING,
679                                   "Ack for wrong FST Setup ID (%u)",
680                                   le_to_host32(req->fsts_id));
681                 return;
682         }
683
684         os_memset(&res, 0, sizeof(res));
685
686         res.action = FST_ACTION_ACK_RESPONSE;
687         res.dialog_token = req->dialog_token;
688         res.fsts_id = req->fsts_id;
689
690         if (!fst_session_send_action(s, FALSE, &res, sizeof(res), NULL)) {
691                 fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Response sent");
692                 fst_session_stt_disarm(s);
693                 fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
694                                       NULL);
695                 fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED,
696                                       NULL);
697                 fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
698         }
699 }
700
701
702 static void
703 fst_session_handle_ack_response(struct fst_session *s,
704                                 struct fst_iface *iface,
705                                 const struct ieee80211_mgmt *mgmt,
706                                 size_t frame_len)
707 {
708         const struct fst_ack_res *res;
709         size_t plen = frame_len - IEEE80211_HDRLEN - 1;
710         union fst_session_state_switch_extra evext = {
711                 .to_initial = {
712                         .reason = REASON_SWITCH,
713                         .initiator = FST_INITIATOR_LOCAL,
714                 },
715         };
716
717         if (!fst_session_is_switch_requested(s)) {
718                 fst_printf_siface(s, iface, MSG_ERROR,
719                                   "Ack Response in inappropriate session state (%s)",
720                                   fst_session_state_name(s->state));
721                 return;
722         }
723
724         WPA_ASSERT(s->data.new_iface != NULL);
725
726         if (iface != s->data.new_iface) {
727                 fst_printf_siface(s, iface, MSG_ERROR,
728                                   "Ack response received on wrong interface");
729                 return;
730         }
731
732         if (plen < sizeof(*res)) {
733                 fst_printf_session(s, MSG_WARNING,
734                                    "Too short FST Ack Response dropped");
735                 return;
736         }
737         res = (const struct fst_ack_res *)
738                 (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
739
740         if (le_to_host32(res->fsts_id) != s->data.fsts_id) {
741                 fst_printf_siface(s, iface, MSG_ERROR,
742                                   "Ack response for wrong FST Setup ID (%u)",
743                                   le_to_host32(res->fsts_id));
744                 return;
745         }
746
747         fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED, NULL);
748         fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
749
750         fst_session_stt_disarm(s);
751 }
752
753
754 struct fst_session * fst_session_create(struct fst_group *g)
755 {
756         struct fst_session *s;
757         u32 id;
758
759         WPA_ASSERT(!is_zero_ether_addr(own_addr));
760
761         id = fst_find_free_session_id();
762         if (id == FST_INVALID_SESSION_ID) {
763                 fst_printf(MSG_ERROR, "Cannot assign new session ID");
764                 return NULL;
765         }
766
767         s = os_zalloc(sizeof(*s));
768         if (!s) {
769                 fst_printf(MSG_ERROR, "Cannot allocate new session object");
770                 return NULL;
771         }
772
773         s->id = id;
774         s->group = g;
775         s->state = FST_SESSION_STATE_INITIAL;
776
777         s->data.llt_ms = FST_LLT_MS_DEFAULT;
778
779         fst_printf(MSG_INFO, "Session %u created", s->id);
780
781         dl_list_add_tail(&global_sessions_list, &s->global_sessions_lentry);
782
783         foreach_fst_ctrl_call(on_session_added, s);
784
785         return s;
786 }
787
788
789 void fst_session_set_iface(struct fst_session *s, struct fst_iface *iface,
790                            Boolean is_old)
791 {
792         if (is_old)
793                 s->data.old_iface = iface;
794         else
795                 s->data.new_iface = iface;
796
797 }
798
799
800 void fst_session_set_llt(struct fst_session *s, u32 llt)
801 {
802         s->data.llt_ms = llt;
803 }
804
805
806 void fst_session_set_peer_addr(struct fst_session *s, const u8 *addr,
807                                Boolean is_old)
808 {
809         u8 *a = is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
810
811         os_memcpy(a, addr, ETH_ALEN);
812 }
813
814
815 int fst_session_initiate_setup(struct fst_session *s)
816 {
817         struct fst_setup_req req;
818         int res;
819         u32 fsts_id;
820         u8 dialog_token;
821         struct fst_session *_s;
822
823         if (fst_session_is_in_progress(s)) {
824                 fst_printf_session(s, MSG_ERROR, "Session in progress");
825                 return -EINVAL;
826         }
827
828         if (is_zero_ether_addr(s->data.old_peer_addr)) {
829                 fst_printf_session(s, MSG_ERROR, "No old peer MAC address");
830                 return -EINVAL;
831         }
832
833         if (is_zero_ether_addr(s->data.new_peer_addr)) {
834                 fst_printf_session(s, MSG_ERROR, "No new peer MAC address");
835                 return -EINVAL;
836         }
837
838         if (!s->data.old_iface) {
839                 fst_printf_session(s, MSG_ERROR, "No old interface defined");
840                 return -EINVAL;
841         }
842
843         if (!s->data.new_iface) {
844                 fst_printf_session(s, MSG_ERROR, "No new interface defined");
845                 return -EINVAL;
846         }
847
848         if (s->data.new_iface == s->data.old_iface) {
849                 fst_printf_session(s, MSG_ERROR,
850                                    "Same interface set as old and new");
851                 return -EINVAL;
852         }
853
854         if (!fst_iface_is_connected(s->data.old_iface, s->data.old_peer_addr,
855                                     FALSE)) {
856                 fst_printf_session(s, MSG_ERROR,
857                                    "The preset old peer address is not connected");
858                 return -EINVAL;
859         }
860
861         if (!fst_iface_is_connected(s->data.new_iface, s->data.new_peer_addr,
862                                     FALSE)) {
863                 fst_printf_session(s, MSG_ERROR,
864                                    "The preset new peer address is not connected");
865                 return -EINVAL;
866         }
867
868         _s = fst_find_session_in_progress(s->data.old_peer_addr, s->group);
869         if (_s) {
870                 fst_printf_session(s, MSG_ERROR,
871                                    "There is another session in progress (old): %u",
872                                    _s->id);
873                 return -EINVAL;
874         }
875
876         _s = fst_find_session_in_progress(s->data.new_peer_addr, s->group);
877         if (_s) {
878                 fst_printf_session(s, MSG_ERROR,
879                                    "There is another session in progress (new): %u",
880                                    _s->id);
881                 return -EINVAL;
882         }
883
884         dialog_token = fst_group_assign_dialog_token(s->group);
885         fsts_id = fst_group_assign_fsts_id(s->group);
886
887         os_memset(&req, 0, sizeof(req));
888
889         fst_printf_siface(s, s->data.old_iface, MSG_INFO,
890                 "initiating FST setup for %s (llt=%u ms)",
891                 fst_iface_get_name(s->data.new_iface), s->data.llt_ms);
892
893         req.action = FST_ACTION_SETUP_REQUEST;
894         req.dialog_token = dialog_token;
895         req.llt = host_to_le32(FST_LLT_MS_TO_VAL(s->data.llt_ms));
896         /* 8.4.2.147 Session Transition element */
897         req.stie.element_id = WLAN_EID_SESSION_TRANSITION;
898         req.stie.length = sizeof(req.stie) - 2;
899         req.stie.fsts_id = host_to_le32(fsts_id);
900         req.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
901
902         req.stie.new_band_id = fst_iface_get_band_id(s->data.new_iface);
903         req.stie.new_band_op = 1;
904         req.stie.new_band_setup = 0;
905
906         req.stie.old_band_id = fst_iface_get_band_id(s->data.old_iface);
907         req.stie.old_band_op = 1;
908         req.stie.old_band_setup = 0;
909
910         res = fst_session_send_action(s, TRUE, &req, sizeof(req),
911                                       fst_iface_get_mbie(s->data.old_iface));
912         if (!res) {
913                 s->data.fsts_id = fsts_id;
914                 s->data.pending_setup_req_dlgt = dialog_token;
915                 fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Request sent");
916                 fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION,
917                                       NULL);
918
919                 fst_session_stt_arm(s);
920         }
921
922         return res;
923 }
924
925
926 int fst_session_respond(struct fst_session *s, u8 status_code)
927 {
928         struct fst_setup_res res;
929         enum hostapd_hw_mode hw_mode;
930         u8 channel;
931
932         if (!fst_session_is_ready_pending(s)) {
933                 fst_printf_session(s, MSG_ERROR, "incorrect state: %s",
934                                    fst_session_state_name(s->state));
935                 return -EINVAL;
936         }
937
938         if (is_zero_ether_addr(s->data.old_peer_addr)) {
939                 fst_printf_session(s, MSG_ERROR, "No peer MAC address");
940                 return -EINVAL;
941         }
942
943         if (!s->data.old_iface) {
944                 fst_printf_session(s, MSG_ERROR, "No old interface defined");
945                 return -EINVAL;
946         }
947
948         if (!s->data.new_iface) {
949                 fst_printf_session(s, MSG_ERROR, "No new interface defined");
950                 return -EINVAL;
951         }
952
953         if (s->data.new_iface == s->data.old_iface) {
954                 fst_printf_session(s, MSG_ERROR,
955                                    "Same interface set as old and new");
956                 return -EINVAL;
957         }
958
959         if (!fst_iface_is_connected(s->data.old_iface,
960                                     s->data.old_peer_addr, FALSE)) {
961                 fst_printf_session(s, MSG_ERROR,
962                                    "The preset peer address is not in the peer list");
963                 return -EINVAL;
964         }
965
966         fst_session_stt_disarm(s);
967
968         os_memset(&res, 0, sizeof(res));
969
970         res.action = FST_ACTION_SETUP_RESPONSE;
971         res.dialog_token = s->data.pending_setup_req_dlgt;
972         res.status_code = status_code;
973
974         res.stie.element_id = WLAN_EID_SESSION_TRANSITION;
975         res.stie.length = sizeof(res.stie) - 2;
976
977         if (status_code == WLAN_STATUS_SUCCESS) {
978                 res.stie.fsts_id = host_to_le32(s->data.fsts_id);
979                 res.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
980
981                 fst_iface_get_channel_info(s->data.new_iface, &hw_mode,
982                                            &channel);
983                 res.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
984                 res.stie.new_band_op = 1;
985                 res.stie.new_band_setup = 0;
986
987                 fst_iface_get_channel_info(s->data.old_iface, &hw_mode,
988                                            &channel);
989                 res.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
990                 res.stie.old_band_op = 1;
991                 res.stie.old_band_setup = 0;
992
993                 fst_printf_session(s, MSG_INFO,
994                                    "%s: FST Setup Request accepted for %s (llt=%u)",
995                                    fst_iface_get_name(s->data.old_iface),
996                                    fst_iface_get_name(s->data.new_iface),
997                                    s->data.llt_ms);
998         } else {
999                 fst_printf_session(s, MSG_WARNING,
1000                                    "%s: FST Setup Request rejected with code %d",
1001                                    fst_iface_get_name(s->data.old_iface),
1002                                    status_code);
1003         }
1004
1005         if (fst_session_send_action(s, TRUE, &res, sizeof(res),
1006                                     fst_iface_get_mbie(s->data.old_iface))) {
1007                 fst_printf_sframe(s, TRUE, MSG_ERROR,
1008                                   "cannot send FST Setup Response with code %d",
1009                                   status_code);
1010                 return -EINVAL;
1011         }
1012
1013         fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Response sent");
1014
1015         if (status_code != WLAN_STATUS_SUCCESS) {
1016                 union fst_session_state_switch_extra evext = {
1017                         .to_initial = {
1018                                 .reason = REASON_REJECT,
1019                                 .reject_code = status_code,
1020                                 .initiator = FST_INITIATOR_LOCAL,
1021                         },
1022                 };
1023                 fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
1024         }
1025
1026         return 0;
1027 }
1028
1029
1030 int fst_session_initiate_switch(struct fst_session *s)
1031 {
1032         struct fst_ack_req req;
1033         int res;
1034         u8 dialog_token;
1035
1036         if (!fst_session_is_ready(s)) {
1037                 fst_printf_session(s, MSG_ERROR,
1038                                    "cannot initiate switch due to wrong setup state (%d)",
1039                                    s->state);
1040                 return -1;
1041         }
1042
1043         dialog_token = fst_group_assign_dialog_token(s->group);
1044
1045         WPA_ASSERT(s->data.new_iface != NULL);
1046         WPA_ASSERT(s->data.old_iface != NULL);
1047
1048         fst_printf_session(s, MSG_INFO, "initiating FST switch: %s => %s",
1049                            fst_iface_get_name(s->data.old_iface),
1050                            fst_iface_get_name(s->data.new_iface));
1051
1052         os_memset(&req, 0, sizeof(req));
1053
1054         req.action = FST_ACTION_ACK_REQUEST;
1055         req.dialog_token = dialog_token;
1056         req.fsts_id = host_to_le32(s->data.fsts_id);
1057
1058         res = fst_session_send_action(s, FALSE, &req, sizeof(req), NULL);
1059         if (!res) {
1060                 fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Request sent");
1061                 fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
1062                                       NULL);
1063                 fst_session_stt_arm(s);
1064         } else {
1065                 fst_printf_sframe(s, FALSE, MSG_ERROR,
1066                                   "Cannot send FST Ack Request");
1067         }
1068
1069         return res;
1070 }
1071
1072
1073 void fst_session_handle_action(struct fst_session *s,
1074                                struct fst_iface *iface,
1075                                const struct ieee80211_mgmt *mgmt,
1076                                size_t frame_len)
1077 {
1078         switch (mgmt->u.action.u.fst_action.action) {
1079         case FST_ACTION_SETUP_REQUEST:
1080                 WPA_ASSERT(0);
1081                 break;
1082         case FST_ACTION_SETUP_RESPONSE:
1083                 fst_session_handle_setup_response(s, iface, mgmt, frame_len);
1084                 break;
1085         case FST_ACTION_TEAR_DOWN:
1086                 fst_session_handle_tear_down(s, iface, mgmt, frame_len);
1087                 break;
1088         case FST_ACTION_ACK_REQUEST:
1089                 fst_session_handle_ack_request(s, iface, mgmt, frame_len);
1090                 break;
1091         case FST_ACTION_ACK_RESPONSE:
1092                 fst_session_handle_ack_response(s, iface, mgmt, frame_len);
1093                 break;
1094         case FST_ACTION_ON_CHANNEL_TUNNEL:
1095         default:
1096                 fst_printf_sframe(s, FALSE, MSG_ERROR,
1097                                   "Unsupported FST Action frame");
1098                 break;
1099         }
1100 }
1101
1102
1103 int fst_session_tear_down_setup(struct fst_session *s)
1104 {
1105         int res;
1106         union fst_session_state_switch_extra evext = {
1107                 .to_initial = {
1108                         .reason = REASON_TEARDOWN,
1109                         .initiator = FST_INITIATOR_LOCAL,
1110                 },
1111         };
1112
1113         res = fst_session_send_tear_down(s);
1114
1115         fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
1116
1117         return res;
1118 }
1119
1120
1121 void fst_session_reset(struct fst_session *s)
1122 {
1123         fst_session_reset_ex(s, REASON_RESET);
1124 }
1125
1126
1127 void fst_session_delete(struct fst_session *s)
1128 {
1129         fst_printf(MSG_INFO, "Session %u deleted", s->id);
1130         dl_list_del(&s->global_sessions_lentry);
1131         foreach_fst_ctrl_call(on_session_removed, s);
1132         os_free(s);
1133 }
1134
1135
1136 struct fst_group * fst_session_get_group(struct fst_session *s)
1137 {
1138         return s->group;
1139 }
1140
1141
1142 struct fst_iface * fst_session_get_iface(struct fst_session *s, Boolean is_old)
1143 {
1144         return is_old ? s->data.old_iface : s->data.new_iface;
1145 }
1146
1147
1148 u32 fst_session_get_id(struct fst_session *s)
1149 {
1150         return s->id;
1151 }
1152
1153
1154 const u8 * fst_session_get_peer_addr(struct fst_session *s, Boolean is_old)
1155 {
1156         return is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
1157 }
1158
1159
1160 u32 fst_session_get_llt(struct fst_session *s)
1161 {
1162         return s->data.llt_ms;
1163 }
1164
1165
1166 enum fst_session_state fst_session_get_state(struct fst_session *s)
1167 {
1168         return s->state;
1169 }
1170
1171
1172 struct fst_session * fst_session_get_by_id(u32 id)
1173 {
1174         struct fst_session *s;
1175
1176         foreach_fst_session(s) {
1177                 if (id == s->id)
1178                         return s;
1179         }
1180
1181         return NULL;
1182 }
1183
1184
1185 void fst_session_enum(struct fst_group *g, fst_session_enum_clb clb, void *ctx)
1186 {
1187         struct fst_session *s;
1188
1189         foreach_fst_session(s) {
1190                 if (!g || s->group == g)
1191                         clb(s->group, s, ctx);
1192         }
1193 }
1194
1195
1196 void fst_session_on_action_rx(struct fst_iface *iface,
1197                               const struct ieee80211_mgmt *mgmt,
1198                               size_t len)
1199 {
1200         struct fst_session *s;
1201
1202         if (len < IEEE80211_HDRLEN + 2 ||
1203             mgmt->u.action.category != WLAN_ACTION_FST) {
1204                 fst_printf_iface(iface, MSG_ERROR,
1205                                  "invalid Action frame received");
1206                 return;
1207         }
1208
1209         if (mgmt->u.action.u.fst_action.action <= FST_ACTION_MAX_SUPPORTED) {
1210                 fst_printf_iface(iface, MSG_DEBUG,
1211                                  "FST Action '%s' received!",
1212                                  fst_action_names[mgmt->u.action.u.fst_action.action]);
1213         } else {
1214                 fst_printf_iface(iface, MSG_WARNING,
1215                                  "unknown FST Action (%u) received!",
1216                                  mgmt->u.action.u.fst_action.action);
1217                 return;
1218         }
1219
1220         if (mgmt->u.action.u.fst_action.action == FST_ACTION_SETUP_REQUEST) {
1221                 fst_session_handle_setup_request(iface, mgmt, len);
1222                 return;
1223         }
1224
1225         s = fst_find_session_in_progress(mgmt->sa, fst_iface_get_group(iface));
1226         if (s) {
1227                 fst_session_handle_action(s, iface, mgmt, len);
1228         } else {
1229                 fst_printf_iface(iface, MSG_WARNING,
1230                                  "FST Action '%s' dropped: no session in progress found",
1231                                  fst_action_names[mgmt->u.action.u.fst_action.action]);
1232         }
1233 }
1234
1235
1236 int fst_session_set_str_ifname(struct fst_session *s, const char *ifname,
1237                                Boolean is_old)
1238 {
1239         struct fst_group *g = fst_session_get_group(s);
1240         struct fst_iface *i;
1241
1242         i = fst_group_get_iface_by_name(g, ifname);
1243         if (!i) {
1244                 fst_printf_session(s, MSG_WARNING,
1245                                    "Cannot set iface %s: no such iface within group '%s'",
1246                                    ifname, fst_group_get_id(g));
1247                 return -1;
1248         }
1249
1250         fst_session_set_iface(s, i, is_old);
1251
1252         return 0;
1253 }
1254
1255
1256 int fst_session_set_str_peer_addr(struct fst_session *s, const char *mac,
1257                                   Boolean is_old)
1258 {
1259         u8 peer_addr[ETH_ALEN];
1260         int res = fst_read_peer_addr(mac, peer_addr);
1261
1262         if (res)
1263                 return res;
1264
1265         fst_session_set_peer_addr(s, peer_addr, is_old);
1266
1267         return 0;
1268 }
1269
1270
1271 int fst_session_set_str_llt(struct fst_session *s, const char *llt_str)
1272 {
1273         char *endp;
1274         long int llt = strtol(llt_str, &endp, 0);
1275
1276         if (*endp || llt < 0 || (unsigned long int) llt > FST_MAX_LLT_MS) {
1277                 fst_printf_session(s, MSG_WARNING,
1278                                    "Cannot set llt %s: Invalid llt value (1..%u expected)",
1279                                    llt_str, FST_MAX_LLT_MS);
1280                 return -1;
1281         }
1282         fst_session_set_llt(s, (u32) llt);
1283
1284         return 0;
1285 }
1286
1287
1288 void fst_session_global_on_iface_detached(struct fst_iface *iface)
1289 {
1290         struct fst_session *s;
1291
1292         foreach_fst_session(s) {
1293                 if (fst_session_is_in_progress(s) &&
1294                     (s->data.new_iface == iface ||
1295                      s->data.old_iface == iface))
1296                         fst_session_reset_ex(s, REASON_DETACH_IFACE);
1297         }
1298 }
1299
1300
1301 struct fst_session * fst_session_global_get_first_by_group(struct fst_group *g)
1302 {
1303         struct fst_session *s;
1304
1305         foreach_fst_session(s) {
1306                 if (s->group == g)
1307                         return s;
1308         }
1309
1310         return NULL;
1311 }
1312
1313
1314 #ifdef CONFIG_FST_TEST
1315
1316 static int get_group_fill_session(struct fst_group **g, struct fst_session *s)
1317 {
1318         const u8 *old_addr, *new_addr;
1319         struct fst_get_peer_ctx *ctx;
1320
1321         os_memset(s, 0, sizeof(*s));
1322         foreach_fst_group(*g) {
1323                 s->data.new_iface = fst_group_first_iface(*g);
1324                 if (s->data.new_iface)
1325                         break;
1326         }
1327         if (!s->data.new_iface)
1328                 return -EINVAL;
1329
1330         s->data.old_iface = dl_list_entry(s->data.new_iface->group_lentry.next,
1331                                           struct fst_iface, group_lentry);
1332         if (!s->data.old_iface)
1333                 return -EINVAL;
1334
1335         old_addr = fst_iface_get_peer_first(s->data.old_iface, &ctx, TRUE);
1336         if (!old_addr)
1337                 return -EINVAL;
1338
1339         new_addr = fst_iface_get_peer_first(s->data.new_iface, &ctx, TRUE);
1340         if (!new_addr)
1341                 return -EINVAL;
1342
1343         os_memcpy(s->data.old_peer_addr, old_addr, ETH_ALEN);
1344         os_memcpy(s->data.new_peer_addr, new_addr, ETH_ALEN);
1345
1346         return 0;
1347 }
1348
1349
1350 #define FST_MAX_COMMAND_WORD_NAME_LENGTH 16
1351
1352 int fst_test_req_send_fst_request(const char *params)
1353 {
1354         int fsts_id;
1355         Boolean is_valid;
1356         char *endp;
1357         struct fst_setup_req req;
1358         struct fst_session s;
1359         struct fst_group *g;
1360         enum hostapd_hw_mode hw_mode;
1361         u8 channel;
1362         char additional_param[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1363
1364         if (params[0] != ' ')
1365                 return -EINVAL;
1366         params++;
1367         fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1368         if (!is_valid)
1369                 return -EINVAL;
1370
1371         if (get_group_fill_session(&g, &s))
1372                 return -EINVAL;
1373
1374         req.action = FST_ACTION_SETUP_REQUEST;
1375         req.dialog_token = g->dialog_token;
1376         req.llt = host_to_le32(FST_LLT_MS_DEFAULT);
1377         /* 8.4.2.147 Session Transition element */
1378         req.stie.element_id = WLAN_EID_SESSION_TRANSITION;
1379         req.stie.length = sizeof(req.stie) - 2;
1380         req.stie.fsts_id = host_to_le32(fsts_id);
1381         req.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
1382
1383         fst_iface_get_channel_info(s.data.new_iface, &hw_mode, &channel);
1384         req.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
1385         req.stie.new_band_op = 1;
1386         req.stie.new_band_setup = 0;
1387
1388         fst_iface_get_channel_info(s.data.old_iface, &hw_mode, &channel);
1389         req.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
1390         req.stie.old_band_op = 1;
1391         req.stie.old_band_setup = 0;
1392
1393         if (!fst_read_next_text_param(endp, additional_param,
1394                                        sizeof(additional_param), &endp)) {
1395                 if (!os_strcasecmp(additional_param, FST_CTR_PVAL_BAD_NEW_BAND))
1396                         req.stie.new_band_id = req.stie.old_band_id;
1397         }
1398
1399         return fst_session_send_action(&s, TRUE, &req, sizeof(req),
1400                                        s.data.old_iface->mb_ie);
1401 }
1402
1403
1404 int fst_test_req_send_fst_response(const char *params)
1405 {
1406         int fsts_id;
1407         Boolean is_valid;
1408         char *endp;
1409         struct fst_setup_res res;
1410         struct fst_session s;
1411         struct fst_group *g;
1412         enum hostapd_hw_mode hw_mode;
1413         u8 status_code;
1414         u8 channel;
1415         char response[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1416         struct fst_session *_s;
1417
1418         if (params[0] != ' ')
1419                 return -EINVAL;
1420         params++;
1421         fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1422         if (!is_valid)
1423                 return -EINVAL;
1424
1425         if (get_group_fill_session(&g, &s))
1426                 return -EINVAL;
1427
1428         status_code = WLAN_STATUS_SUCCESS;
1429         if (!fst_read_next_text_param(endp, response, sizeof(response),
1430                                       &endp)) {
1431                 if (!os_strcasecmp(response, FST_CS_PVAL_RESPONSE_REJECT))
1432                         status_code = WLAN_STATUS_PENDING_ADMITTING_FST_SESSION;
1433         }
1434
1435         os_memset(&res, 0, sizeof(res));
1436
1437         res.action = FST_ACTION_SETUP_RESPONSE;
1438         /*
1439          * If some session has just received an FST Setup Request, then
1440          * use the correct dialog token copied from this request.
1441          */
1442         _s = fst_find_session_in_progress(fst_session_get_peer_addr(&s, TRUE),
1443                                           g);
1444         res.dialog_token = (_s && fst_session_is_ready_pending(_s)) ?
1445                 _s->data.pending_setup_req_dlgt : g->dialog_token;
1446         res.status_code  = status_code;
1447
1448         res.stie.element_id = WLAN_EID_SESSION_TRANSITION;
1449         res.stie.length = sizeof(res.stie) - 2;
1450
1451         if (res.status_code == WLAN_STATUS_SUCCESS) {
1452                 res.stie.fsts_id = host_to_le32(fsts_id);
1453                 res.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
1454
1455                 fst_iface_get_channel_info(s.data.new_iface, &hw_mode,
1456                                             &channel);
1457                 res.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
1458                 res.stie.new_band_op = 1;
1459                 res.stie.new_band_setup = 0;
1460
1461                 fst_iface_get_channel_info(s.data.old_iface, &hw_mode,
1462                                            &channel);
1463                 res.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
1464                 res.stie.old_band_op = 1;
1465                 res.stie.old_band_setup = 0;
1466         }
1467
1468         if (!fst_read_next_text_param(endp, response, sizeof(response),
1469                                       &endp)) {
1470                 if (!os_strcasecmp(response, FST_CTR_PVAL_BAD_NEW_BAND))
1471                         res.stie.new_band_id = res.stie.old_band_id;
1472         }
1473
1474         return fst_session_send_action(&s, TRUE, &res, sizeof(res),
1475                                        s.data.old_iface->mb_ie);
1476 }
1477
1478
1479 int fst_test_req_send_ack_request(const char *params)
1480 {
1481         int fsts_id;
1482         Boolean is_valid;
1483         char *endp;
1484         struct fst_ack_req req;
1485         struct fst_session s;
1486         struct fst_group *g;
1487
1488         if (params[0] != ' ')
1489                 return -EINVAL;
1490         params++;
1491         fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1492         if (!is_valid)
1493                 return -EINVAL;
1494
1495         if (get_group_fill_session(&g, &s))
1496                 return -EINVAL;
1497
1498         os_memset(&req, 0, sizeof(req));
1499         req.action = FST_ACTION_ACK_REQUEST;
1500         req.dialog_token = g->dialog_token;
1501         req.fsts_id = host_to_le32(fsts_id);
1502
1503         return fst_session_send_action(&s, FALSE, &req, sizeof(req), NULL);
1504 }
1505
1506
1507 int fst_test_req_send_ack_response(const char *params)
1508 {
1509         int fsts_id;
1510         Boolean is_valid;
1511         char *endp;
1512         struct fst_ack_res res;
1513         struct fst_session s;
1514         struct fst_group *g;
1515
1516         if (params[0] != ' ')
1517                 return -EINVAL;
1518         params++;
1519         fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1520         if (!is_valid)
1521                 return -EINVAL;
1522
1523         if (get_group_fill_session(&g, &s))
1524                 return -EINVAL;
1525
1526         os_memset(&res, 0, sizeof(res));
1527         res.action = FST_ACTION_ACK_RESPONSE;
1528         res.dialog_token = g->dialog_token;
1529         res.fsts_id = host_to_le32(fsts_id);
1530
1531         return fst_session_send_action(&s, FALSE, &res, sizeof(res), NULL);
1532 }
1533
1534
1535 int fst_test_req_send_tear_down(const char *params)
1536 {
1537         int fsts_id;
1538         Boolean is_valid;
1539         char *endp;
1540         struct fst_tear_down td;
1541         struct fst_session s;
1542         struct fst_group *g;
1543
1544         if (params[0] != ' ')
1545                 return -EINVAL;
1546         params++;
1547         fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1548         if (!is_valid)
1549                 return -EINVAL;
1550
1551         if (get_group_fill_session(&g, &s))
1552                 return -EINVAL;
1553
1554         os_memset(&td, 0, sizeof(td));
1555         td.action = FST_ACTION_TEAR_DOWN;
1556         td.fsts_id = host_to_le32(fsts_id);
1557
1558         return fst_session_send_action(&s, TRUE, &td, sizeof(td), NULL);
1559 }
1560
1561
1562 u32 fst_test_req_get_fsts_id(const char *params)
1563 {
1564         int sid;
1565         Boolean is_valid;
1566         char *endp;
1567         struct fst_session *s;
1568
1569         if (params[0] != ' ')
1570                 return FST_FSTS_ID_NOT_FOUND;
1571         params++;
1572         sid = fst_read_next_int_param(params, &is_valid, &endp);
1573         if (!is_valid)
1574                 return FST_FSTS_ID_NOT_FOUND;
1575
1576         s = fst_session_get_by_id(sid);
1577         if (!s)
1578                 return FST_FSTS_ID_NOT_FOUND;
1579
1580         return s->data.fsts_id;
1581 }
1582
1583
1584 int fst_test_req_get_local_mbies(const char *request, char *buf, size_t buflen)
1585 {
1586         char *endp;
1587         char ifname[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1588         struct fst_group *g;
1589         struct fst_iface *iface;
1590
1591         if (request[0] != ' ')
1592                 return -EINVAL;
1593         request++;
1594         if (fst_read_next_text_param(request, ifname, sizeof(ifname), &endp) ||
1595             !*ifname)
1596                 goto problem;
1597         g = dl_list_first(&fst_global_groups_list, struct fst_group,
1598                           global_groups_lentry);
1599         if (!g)
1600                 goto problem;
1601         iface = fst_group_get_iface_by_name(g, ifname);
1602         if (!iface || !iface->mb_ie)
1603                 goto problem;
1604         return wpa_snprintf_hex(buf, buflen, wpabuf_head(iface->mb_ie),
1605                                 wpabuf_len(iface->mb_ie));
1606
1607 problem:
1608         return os_snprintf(buf, buflen, "FAIL\n");
1609 }
1610
1611 #endif /* CONFIG_FST_TEST */