hostapd: Use stations nsts capability in (Re)Association Response frame
[mech_eap.git] / wpa_supplicant / wmm_ac.c
1 /*
2  * Wi-Fi Multimedia Admission Control (WMM-AC)
3  * Copyright(c) 2014, Intel Mobile Communication GmbH.
4  * Copyright(c) 2014, Intel Corporation. All rights reserved.
5  *
6  * This software may be distributed under the terms of the BSD license.
7  * See README for more details.
8  */
9
10 #include "includes.h"
11
12 #include "utils/common.h"
13 #include "utils/list.h"
14 #include "utils/eloop.h"
15 #include "common/ieee802_11_common.h"
16 #include "wpa_supplicant_i.h"
17 #include "bss.h"
18 #include "driver_i.h"
19 #include "wmm_ac.h"
20
21 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
22
23 static const enum wmm_ac up_to_ac[8] = {
24         WMM_AC_BK,
25         WMM_AC_BE,
26         WMM_AC_BE,
27         WMM_AC_BK,
28         WMM_AC_VI,
29         WMM_AC_VI,
30         WMM_AC_VO,
31         WMM_AC_VO
32 };
33
34
35 static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
36 {
37         return (tspec->ts_info[0] >> 1) & 0x0f;
38 }
39
40
41 static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
42 {
43         return (tspec->ts_info[0] >> 5) & 0x03;
44 }
45
46
47 static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
48 {
49         return (tspec->ts_info[1] >> 3) & 0x07;
50 }
51
52
53 static u8 wmm_ac_direction_to_idx(u8 direction)
54 {
55         switch (direction) {
56         case WMM_AC_DIR_UPLINK:
57                 return TS_DIR_IDX_UPLINK;
58         case WMM_AC_DIR_DOWNLINK:
59                 return TS_DIR_IDX_DOWNLINK;
60         case WMM_AC_DIR_BIDIRECTIONAL:
61                 return TS_DIR_IDX_BIDI;
62         default:
63                 wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
64                 return WMM_AC_DIR_UPLINK;
65         }
66 }
67
68
69 static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
70                          const struct wmm_tspec_element *tspec)
71 {
72         struct wmm_tspec_element *_tspec;
73         int ret;
74         u16 admitted_time = le_to_host16(tspec->medium_time);
75         u8 up = wmm_ac_get_user_priority(tspec);
76         u8 ac = up_to_ac[up];
77         u8 dir = wmm_ac_get_direction(tspec);
78         u8 tsid = wmm_ac_get_tsid(tspec);
79         enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
80
81         /* should have been verified before, but double-check here */
82         if (wpa_s->tspecs[ac][idx]) {
83                 wpa_printf(MSG_ERROR,
84                            "WMM AC: tspec (ac=%d, dir=%d) already exists!",
85                            ac, dir);
86                 return -1;
87         }
88
89         /* copy tspec */
90         _tspec = os_malloc(sizeof(*_tspec));
91         if (!_tspec)
92                 return -1;
93
94         /* store the admitted TSPEC */
95         os_memcpy(_tspec, tspec, sizeof(*_tspec));
96
97         if (dir != WMM_AC_DIR_DOWNLINK) {
98                 ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
99                 wpa_printf(MSG_DEBUG,
100                            "WMM AC: Add TS: addr=" MACSTR
101                            " TSID=%u admitted time=%u, ret=%d",
102                            MAC2STR(addr), tsid, admitted_time, ret);
103                 if (ret < 0) {
104                         os_free(_tspec);
105                         return -1;
106                 }
107         }
108
109         wpa_s->tspecs[ac][idx] = _tspec;
110
111         wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
112
113         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
114                 "tsid=%d addr=" MACSTR " admitted_time=%d",
115                 tsid, MAC2STR(addr), admitted_time);
116
117         return 0;
118 }
119
120
121 static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
122                               enum ts_dir_idx dir)
123 {
124         struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
125         u8 tsid;
126
127         if (!tspec)
128                 return;
129
130         tsid = wmm_ac_get_tsid(tspec);
131         wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
132
133         /* update the driver in case of uplink/bidi */
134         if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
135                 wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
136
137         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
138                 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
139
140         os_free(wpa_s->tspecs[ac][dir]);
141         wpa_s->tspecs[ac][dir] = NULL;
142 }
143
144
145 static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
146 {
147         struct wmm_ac_addts_request *req = wpa_s->addts_request;
148
149         if (!req)
150                 return;
151
152         if (failed)
153                 wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
154                         "tsid=%u", wmm_ac_get_tsid(&req->tspec));
155
156         eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
157         wpa_s->addts_request = NULL;
158         os_free(req);
159 }
160
161
162 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
163 {
164         struct wpa_supplicant *wpa_s = eloop_ctx;
165         struct wmm_ac_addts_request *addts_req = timeout_ctx;
166
167         wpa_printf(MSG_DEBUG,
168                    "Timeout getting ADDTS response (tsid=%d up=%d)",
169                    wmm_ac_get_tsid(&addts_req->tspec),
170                    wmm_ac_get_user_priority(&addts_req->tspec));
171
172         wmm_ac_del_req(wpa_s, 1);
173 }
174
175
176 static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
177                                      const struct wmm_ac_addts_request *req)
178 {
179         struct wpabuf *buf;
180         int ret;
181
182         wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
183                    MAC2STR(req->address));
184
185         /* category + action code + dialog token + status + sizeof(tspec) */
186         buf = wpabuf_alloc(4 + sizeof(req->tspec));
187         if (!buf) {
188                 wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
189                 return -1;
190         }
191
192         wpabuf_put_u8(buf, WLAN_ACTION_WMM);
193         wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
194         wpabuf_put_u8(buf, req->dialog_token);
195         wpabuf_put_u8(buf, 0); /* status code */
196         wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
197
198         ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
199                                 wpa_s->own_addr, wpa_s->bssid,
200                                 wpabuf_head(buf), wpabuf_len(buf), 0);
201         if (ret) {
202                 wpa_printf(MSG_WARNING,
203                            "WMM AC: Failed to send ADDTS Request");
204         }
205
206         wpabuf_free(buf);
207         return ret;
208 }
209
210
211 static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
212                              const struct wmm_tspec_element *tspec,
213                              const u8 *address)
214 {
215         struct wpabuf *buf;
216         int ret;
217
218         /* category + action code + dialog token + status + sizeof(tspec) */
219         buf = wpabuf_alloc(4 + sizeof(*tspec));
220         if (!buf)
221                 return -1;
222
223         wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
224
225         /* category + action code + dialog token + status + sizeof(tspec) */
226         wpabuf_put_u8(buf, WLAN_ACTION_WMM);
227         wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
228         wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
229         wpabuf_put_u8(buf, 0); /* Status Code (not used) */
230         wpabuf_put_data(buf, tspec, sizeof(*tspec));
231
232         ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
233                                   wpa_s->own_addr, wpa_s->bssid,
234                                   wpabuf_head(buf), wpabuf_len(buf), 0);
235         if (ret)
236                 wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
237
238         wpabuf_free(buf);
239         return ret;
240 }
241
242
243 /* return the AC using the given TSPEC tid */
244 static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
245                             enum ts_dir_idx *dir)
246 {
247         int ac;
248         enum ts_dir_idx idx;
249
250         for (ac = 0; ac < WMM_AC_NUM; ac++) {
251                 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
252                         if (wpa_s->tspecs[ac][idx] &&
253                             wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
254                                 if (dir)
255                                         *dir = idx;
256                                 return ac;
257                         }
258                 }
259         }
260
261         return -1;
262 }
263
264
265 static struct wmm_ac_addts_request *
266 wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
267                        const struct wmm_ac_ts_setup_params *params,
268                        const u8 *address)
269 {
270         struct wmm_ac_addts_request *addts_req;
271         struct wmm_tspec_element *tspec;
272         u8 ac = up_to_ac[params->user_priority];
273         u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
274
275         addts_req = os_zalloc(sizeof(*addts_req));
276         if (!addts_req)
277                 return NULL;
278
279         tspec = &addts_req->tspec;
280         os_memcpy(addts_req->address, address, ETH_ALEN);
281
282         /* The dialog token cannot be zero */
283         if (++wpa_s->wmm_ac_last_dialog_token == 0)
284                 wpa_s->wmm_ac_last_dialog_token++;
285
286         addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
287         tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
288         tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
289         tspec->oui[0] = 0x00;
290         tspec->oui[1] = 0x50;
291         tspec->oui[2] = 0xf2;
292         tspec->oui_type = WMM_OUI_TYPE;
293         tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
294         tspec->version = WMM_VERSION;
295
296         tspec->ts_info[0] = params->tsid << 1;
297         tspec->ts_info[0] |= params->direction << 5;
298         tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
299         tspec->ts_info[1] = uapsd << 2;
300         tspec->ts_info[1] |= params->user_priority << 3;
301         tspec->ts_info[2] = 0;
302
303         tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
304         if (params->fixed_nominal_msdu)
305                 tspec->nominal_msdu_size |=
306                         host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
307
308         tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
309         tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
310         tspec->surplus_bandwidth_allowance =
311                 host_to_le16(params->surplus_bandwidth_allowance);
312
313         return addts_req;
314 }
315
316
317 static int param_in_range(const char *name, long value,
318                           long min_val, long max_val)
319 {
320         if (value < min_val || (max_val >= 0 && value > max_val)) {
321                 wpa_printf(MSG_DEBUG,
322                            "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
323                            name, value, min_val, max_val);
324                 return 0;
325         }
326
327         return 1;
328 }
329
330
331 static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
332                                     u8 tsid, u8 ac, u8 dir)
333 {
334         enum ts_dir_idx idx;
335         int cur_ac, existing_ts = 0, replace_ts = 0;
336
337         cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
338         if (cur_ac >= 0) {
339                 if (cur_ac != ac) {
340                         wpa_printf(MSG_DEBUG,
341                                    "WMM AC: TSID %i already exists on different ac (%d)",
342                                    tsid, cur_ac);
343                         return -1;
344                 }
345
346                 /* same tsid - this tspec will replace the current one */
347                 replace_ts |= BIT(idx);
348         }
349
350         for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
351                 if (wpa_s->tspecs[ac][idx])
352                         existing_ts |= BIT(idx);
353         }
354
355         switch (dir) {
356         case WMM_AC_DIR_UPLINK:
357                 /* replace existing uplink/bidi tspecs */
358                 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
359                                              BIT(TS_DIR_IDX_BIDI));
360                 break;
361         case WMM_AC_DIR_DOWNLINK:
362                 /* replace existing downlink/bidi tspecs */
363                 replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
364                                              BIT(TS_DIR_IDX_BIDI));
365                 break;
366         case WMM_AC_DIR_BIDIRECTIONAL:
367                 /* replace all existing tspecs */
368                 replace_ts |= existing_ts;
369                 break;
370         default:
371                 return -1;
372         }
373
374         return replace_ts;
375 }
376
377
378 static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
379                                   const struct wmm_ac_ts_setup_params *params)
380 {
381         enum wmm_ac req_ac;
382
383 #define PARAM_IN_RANGE(field, min_value, max_value) \
384         param_in_range(#field, params->field, min_value, max_value)
385
386         if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
387             !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
388             !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
389             !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
390             !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
391             !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
392                             -1))
393                 return 0;
394 #undef PARAM_IN_RANGE
395
396         if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
397               params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
398               params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
399                 wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
400                            params->direction);
401                 return 0;
402         }
403
404         req_ac = up_to_ac[params->user_priority];
405
406         /* Requested accesss category must have acm */
407         if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
408                 wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
409                 return 0;
410         }
411
412         if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
413                                      params->direction) < 0)
414                 return 0;
415
416         return 1;
417 }
418
419
420 static struct wmm_ac_assoc_data *
421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
422                           size_t ies_len)
423 {
424         struct ieee802_11_elems elems;
425         struct wmm_parameter_element *wmm_params;
426         struct wmm_ac_assoc_data *assoc_data;
427         int i;
428
429         /* Parsing WMM Parameter Element */
430         if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
431                 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
432                 return NULL;
433         }
434
435         if (!elems.wmm) {
436                 wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
437                 return NULL;
438         }
439
440         if (elems.wmm_len != sizeof(*wmm_params)) {
441                 wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
442                 return NULL;
443         }
444
445         wmm_params = (struct wmm_parameter_element *)(elems.wmm);
446
447         assoc_data = os_zalloc(sizeof(*assoc_data));
448         if (!assoc_data)
449                 return NULL;
450
451         for (i = 0; i < WMM_AC_NUM; i++)
452                 assoc_data->ac_params[i].acm =
453                         !!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
454
455         wpa_printf(MSG_DEBUG,
456                    "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
457                    assoc_data->ac_params[WMM_AC_BE].acm,
458                    assoc_data->ac_params[WMM_AC_BK].acm,
459                    assoc_data->ac_params[WMM_AC_VI].acm,
460                    assoc_data->ac_params[WMM_AC_VO].acm);
461
462         return assoc_data;
463 }
464
465
466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
467                        size_t ies_len, const struct wmm_params *wmm_params)
468 {
469         struct wmm_ac_assoc_data *assoc_data;
470         u8 ac;
471
472         if (wpa_s->wmm_ac_assoc_info) {
473                 wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
474                 return -1;
475         }
476
477         if (!ies) {
478                 wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
479                 return -1;
480         }
481
482         if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
483                 wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
484                 return -1;
485         }
486
487         os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
488         wpa_s->wmm_ac_last_dialog_token = 0;
489         wpa_s->addts_request = NULL;
490
491         assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
492         if (!assoc_data)
493                 return -1;
494
495         wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
496                    wmm_params->uapsd_queues);
497
498         for (ac = 0; ac < WMM_AC_NUM; ac++) {
499                 assoc_data->ac_params[ac].uapsd =
500                         !!(wmm_params->uapsd_queues & BIT(ac));
501         }
502
503         wpa_s->wmm_ac_assoc_info = assoc_data;
504         return 0;
505 }
506
507
508 static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
509 {
510         enum ts_dir_idx idx;
511
512         for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
513                 if (!(dir_bitmap & BIT(idx)))
514                         continue;
515
516                 wmm_ac_del_ts_idx(wpa_s, ac, idx);
517         }
518 }
519
520
521 static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
522 {
523         int i;
524
525         for (i = 0; i < WMM_AC_NUM; i++)
526                 wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
527
528         /* delete pending add_ts requset */
529         wmm_ac_del_req(wpa_s, 1);
530
531         os_free(wpa_s->wmm_ac_assoc_info);
532         wpa_s->wmm_ac_assoc_info = NULL;
533 }
534
535
536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
537                          size_t ies_len, const struct wmm_params *wmm_params)
538 {
539         if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
540                 return;
541
542         wpa_printf(MSG_DEBUG,
543                    "WMM AC: Valid WMM association, WMM AC is enabled");
544 }
545
546
547 void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
548 {
549         if (!wpa_s->wmm_ac_assoc_info)
550                 return;
551
552         wmm_ac_deinit(wpa_s);
553         wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
554 }
555
556
557 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
558 {
559         struct wmm_tspec_element tspec;
560         int ac;
561         enum ts_dir_idx dir;
562
563         if (!wpa_s->wmm_ac_assoc_info) {
564                 wpa_printf(MSG_DEBUG,
565                            "WMM AC: Failed to delete TS, WMM AC is disabled");
566                 return -1;
567         }
568
569         ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
570         if (ac < 0) {
571                 wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
572                 return -1;
573         }
574
575         tspec = *wpa_s->tspecs[ac][dir];
576
577         wmm_ac_del_ts_idx(wpa_s, ac, dir);
578
579         wmm_ac_send_delts(wpa_s, &tspec, wpa_s->bssid);
580
581         return 0;
582 }
583
584
585 int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
586                       struct wmm_ac_ts_setup_params *params)
587 {
588         struct wmm_ac_addts_request *addts_req;
589
590         if (!wpa_s->wmm_ac_assoc_info) {
591                 wpa_printf(MSG_DEBUG,
592                            "WMM AC: Cannot add TS - missing assoc data");
593                 return -1;
594         }
595
596         if (wpa_s->addts_request) {
597                 wpa_printf(MSG_DEBUG,
598                            "WMM AC: can't add TS - ADDTS request is already pending");
599                 return -1;
600         }
601
602         /*
603          * we can setup downlink TS even without driver support.
604          * however, we need driver support for the other directions.
605          */
606         if (params->direction != WMM_AC_DIR_DOWNLINK &&
607             !wpa_s->wmm_ac_supported) {
608                 wpa_printf(MSG_DEBUG,
609                            "Cannot set uplink/bidi TS without driver support");
610                 return -1;
611         }
612
613         if (!wmm_ac_ts_req_is_valid(wpa_s, params))
614                 return -1;
615
616         wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
617                    " tsid=%u user priority=%u direction=%d)",
618                    MAC2STR(wpa_s->bssid), params->tsid,
619                    params->user_priority, params->direction);
620
621         addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
622         if (!addts_req)
623                 return -1;
624
625         if (wmm_ac_send_addts_request(wpa_s, addts_req))
626                 goto err;
627
628         /* save as pending and set ADDTS resp timeout to 1 second */
629         wpa_s->addts_request = addts_req;
630         eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
631                                wpa_s, addts_req);
632         return 0;
633 err:
634         os_free(addts_req);
635         return -1;
636 }
637
638
639 static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
640                                 const struct wmm_tspec_element *tspec)
641 {
642         int ac;
643         u8 tsid;
644         enum ts_dir_idx idx;
645
646         tsid = wmm_ac_get_tsid(tspec);
647
648         wpa_printf(MSG_DEBUG,
649                    "WMM AC: DELTS frame has been received TSID=%u addr="
650                    MACSTR, tsid, MAC2STR(sa));
651
652         ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
653         if (ac < 0) {
654                 wpa_printf(MSG_DEBUG,
655                            "WMM AC: Ignoring DELTS frame - TSID does not exist");
656                 return;
657         }
658
659         wmm_ac_del_ts_idx(wpa_s, ac, idx);
660
661         wpa_printf(MSG_DEBUG,
662                    "TS was deleted successfully (tsid=%u address=" MACSTR ")",
663                    tsid, MAC2STR(sa));
664 }
665
666
667 static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
668                 const u8 resp_dialog_token, const u8 status_code,
669                 const struct wmm_tspec_element *tspec)
670 {
671         struct wmm_ac_addts_request *req = wpa_s->addts_request;
672         u8 ac, tsid, up, dir;
673         int replace_tspecs;
674
675         tsid = wmm_ac_get_tsid(tspec);
676         dir = wmm_ac_get_direction(tspec);
677         up = wmm_ac_get_user_priority(tspec);
678         ac = up_to_ac[up];
679
680         /* make sure we have a matching addts request */
681         if (!req || req->dialog_token != resp_dialog_token) {
682                 wpa_printf(MSG_DEBUG,
683                            "WMM AC: no req with dialog=%u, ignoring frame",
684                            resp_dialog_token);
685                 return;
686         }
687
688         /* make sure the params are the same */
689         if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
690             tsid != wmm_ac_get_tsid(&req->tspec) ||
691             up != wmm_ac_get_user_priority(&req->tspec) ||
692             dir != wmm_ac_get_direction(&req->tspec)) {
693                 wpa_printf(MSG_DEBUG,
694                            "WMM AC: ADDTS params do not match, ignoring frame");
695                 return;
696         }
697
698         /* delete pending request */
699         wmm_ac_del_req(wpa_s, 0);
700
701         wpa_printf(MSG_DEBUG,
702                    "ADDTS response status=%d tsid=%u up=%u direction=%u",
703                    status_code, tsid, up, dir);
704
705         if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
706                 wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
707                 goto err_msg;
708         }
709
710         replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
711         if (replace_tspecs < 0)
712                 goto err_delts;
713
714         wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
715
716         /* when replacing tspecs - delete first */
717         wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
718
719         /* Creating a new traffic stream */
720         wpa_printf(MSG_DEBUG,
721                    "WMM AC: adding a new TS with TSID=%u address="MACSTR
722                    " medium time=%u access category=%d dir=%d ",
723                    tsid, MAC2STR(sa),
724                    le_to_host16(tspec->medium_time), ac, dir);
725
726         if (wmm_ac_add_ts(wpa_s, sa, tspec))
727                 goto err_delts;
728
729         return;
730
731 err_delts:
732         /* ask the ap to delete the tspec */
733         wmm_ac_send_delts(wpa_s, tspec, sa);
734 err_msg:
735         wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
736                 tsid);
737 }
738
739
740 void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
741                         const u8 *sa, const u8 *data, size_t len)
742 {
743         u8 action;
744         u8 dialog_token;
745         u8 status_code;
746         struct ieee802_11_elems elems;
747         struct wmm_tspec_element *tspec;
748
749         if (wpa_s->wmm_ac_assoc_info == NULL) {
750                 wpa_printf(MSG_DEBUG,
751                            "WMM AC: WMM AC is disabled, ignoring action frame");
752                 return;
753         }
754
755         action = data[0];
756
757         if (action != WMM_ACTION_CODE_ADDTS_RESP &&
758             action != WMM_ACTION_CODE_DELTS) {
759                 wpa_printf(MSG_DEBUG,
760                            "WMM AC: Unknown action (%d), ignoring action frame",
761                            action);
762                 return;
763         }
764
765         /* WMM AC action frame */
766         if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
767                 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
768                            " is other than ours, ignoring frame", MAC2STR(da));
769                 return;
770         }
771
772         if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
773                 wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
774                            " different other than our bssid", MAC2STR(da));
775                 return;
776         }
777
778         if (len < 2 + sizeof(struct wmm_tspec_element)) {
779                 wpa_printf(MSG_DEBUG,
780                            "WMM AC: Short ADDTS response ignored (len=%lu)",
781                            (unsigned long) len);
782                 return;
783         }
784
785         data++;
786         len--;
787         dialog_token = data[0];
788         status_code = data[1];
789
790         if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
791                 wpa_printf(MSG_DEBUG,
792                            "WMM AC: Could not parse WMM AC action from " MACSTR,
793                            MAC2STR(sa));
794                 return;
795         }
796
797         /* the struct also contains the type and value, so decrease it */
798         if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
799                 wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
800                 return;
801         }
802
803         tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
804
805         wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
806                    MAC2STR(sa));
807         wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
808
809         switch (action) {
810         case WMM_ACTION_CODE_ADDTS_RESP:
811                 wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
812                                          tspec);
813                 break;
814         case WMM_ACTION_CODE_DELTS:
815                 wmm_ac_handle_delts(wpa_s, sa, tspec);
816                 break;
817         default:
818                 break;
819         }
820 }
821
822
823 static const char * get_ac_str(u8 ac)
824 {
825         switch (ac) {
826         case WMM_AC_BE:
827                 return "BE";
828         case WMM_AC_BK:
829                 return "BK";
830         case WMM_AC_VI:
831                 return "VI";
832         case WMM_AC_VO:
833                 return "VO";
834         default:
835                 return "N/A";
836         }
837 }
838
839
840 static const char * get_direction_str(u8 direction)
841 {
842         switch (direction) {
843         case WMM_AC_DIR_DOWNLINK:
844                 return "Downlink";
845         case WMM_AC_DIR_UPLINK:
846                 return "Uplink";
847         case WMM_AC_DIR_BIDIRECTIONAL:
848                 return "Bi-directional";
849         default:
850                 return "N/A";
851         }
852 }
853
854
855 int wpas_wmm_ac_status(struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
856 {
857         struct wmm_ac_assoc_data *assoc_info = wpa_s->wmm_ac_assoc_info;
858         enum ts_dir_idx idx;
859         int pos = 0;
860         u8 ac, up;
861
862         if (!assoc_info) {
863                 return wpa_scnprintf(buf, buflen - pos,
864                                      "Not associated to a WMM AP, WMM AC is Disabled\n");
865         }
866
867         pos += wpa_scnprintf(buf + pos, buflen - pos, "WMM AC is Enabled\n");
868
869         for (ac = 0; ac < WMM_AC_NUM; ac++) {
870                 int ts_count = 0;
871
872                 pos += wpa_scnprintf(buf + pos, buflen - pos,
873                                      "%s: acm=%d uapsd=%d\n",
874                                      get_ac_str(ac),
875                                      assoc_info->ac_params[ac].acm,
876                                      assoc_info->ac_params[ac].uapsd);
877
878                 for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
879                         struct wmm_tspec_element *tspec;
880                         u8 dir, tsid;
881                         const char *dir_str;
882
883                         tspec = wpa_s->tspecs[ac][idx];
884                         if (!tspec)
885                                 continue;
886
887                         ts_count++;
888
889                         dir = wmm_ac_get_direction(tspec);
890                         dir_str = get_direction_str(dir);
891                         tsid = wmm_ac_get_tsid(tspec);
892                         up = wmm_ac_get_user_priority(tspec);
893
894                         pos += wpa_scnprintf(buf + pos, buflen - pos,
895                                              "\tTSID=%u UP=%u\n"
896                                              "\tAddress = "MACSTR"\n"
897                                              "\tWMM AC dir = %s\n"
898                                              "\tTotal admitted time = %u\n\n",
899                                              tsid, up,
900                                              MAC2STR(wpa_s->bssid),
901                                              dir_str,
902                                              le_to_host16(tspec->medium_time));
903                 }
904
905                 if (!ts_count) {
906                         pos += wpa_scnprintf(buf + pos, buflen - pos,
907                                              "\t(No Traffic Stream)\n\n");
908                 }
909         }
910
911         return pos;
912 }
913
914
915 static u8 wmm_ac_get_tspecs_count(struct wpa_supplicant *wpa_s)
916 {
917         int ac, dir, tspecs_count = 0;
918
919         for (ac = 0; ac < WMM_AC_NUM; ac++) {
920                 for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
921                         if (wpa_s->tspecs[ac][dir])
922                                 tspecs_count++;
923                 }
924         }
925
926         return tspecs_count;
927 }
928
929
930 void wmm_ac_save_tspecs(struct wpa_supplicant *wpa_s)
931 {
932         int ac, dir, tspecs_count;
933
934         wpa_printf(MSG_DEBUG, "WMM AC: Save last configured tspecs");
935
936         if (!wpa_s->wmm_ac_assoc_info)
937                 return;
938
939         tspecs_count = wmm_ac_get_tspecs_count(wpa_s);
940         if (!tspecs_count) {
941                 wpa_printf(MSG_DEBUG, "WMM AC: No configured TSPECs");
942                 return;
943         }
944
945         wpa_printf(MSG_DEBUG, "WMM AC: Saving tspecs");
946
947         wmm_ac_clear_saved_tspecs(wpa_s);
948         wpa_s->last_tspecs = os_calloc(tspecs_count,
949                                        sizeof(*wpa_s->last_tspecs));
950         if (!wpa_s->last_tspecs) {
951                 wpa_printf(MSG_ERROR, "WMM AC: Failed to save tspecs!");
952                 return;
953         }
954
955         for (ac = 0; ac < WMM_AC_NUM; ac++) {
956                 for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
957                         if (!wpa_s->tspecs[ac][dir])
958                                 continue;
959
960                         wpa_s->last_tspecs[wpa_s->last_tspecs_count++] =
961                                 *wpa_s->tspecs[ac][dir];
962                 }
963         }
964
965         wpa_printf(MSG_DEBUG, "WMM AC: Successfully saved %d TSPECs",
966                    wpa_s->last_tspecs_count);
967 }
968
969
970 void wmm_ac_clear_saved_tspecs(struct wpa_supplicant *wpa_s)
971 {
972         if (wpa_s->last_tspecs) {
973                 wpa_printf(MSG_DEBUG, "WMM AC: Clear saved tspecs");
974                 os_free(wpa_s->last_tspecs);
975                 wpa_s->last_tspecs = NULL;
976                 wpa_s->last_tspecs_count = 0;
977         }
978 }
979
980
981 int wmm_ac_restore_tspecs(struct wpa_supplicant *wpa_s)
982 {
983         unsigned int i;
984
985         if (!wpa_s->wmm_ac_assoc_info || !wpa_s->last_tspecs_count)
986                 return 0;
987
988         wpa_printf(MSG_DEBUG, "WMM AC: Restore %u saved tspecs",
989                    wpa_s->last_tspecs_count);
990
991         for (i = 0; i < wpa_s->last_tspecs_count; i++)
992                 wmm_ac_add_ts(wpa_s, wpa_s->bssid, &wpa_s->last_tspecs[i]);
993
994         return 0;
995 }