wmm_ac.c revision 281681
1/*
2 * Wi-Fi Multimedia Admission Control (WMM-AC)
3 * Copyright(c) 2014, Intel Mobile Communication GmbH.
4 * Copyright(c) 2014, Intel Corporation. All rights reserved.
5 *
6 * This software may be distributed under the terms of the BSD license.
7 * See README for more details.
8 */
9
10#include "includes.h"
11
12#include "utils/common.h"
13#include "utils/list.h"
14#include "utils/eloop.h"
15#include "common/ieee802_11_common.h"
16#include "wpa_supplicant_i.h"
17#include "bss.h"
18#include "driver_i.h"
19#include "wmm_ac.h"
20
21static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
22
23static const enum wmm_ac up_to_ac[8] = {
24	WMM_AC_BK,
25	WMM_AC_BE,
26	WMM_AC_BE,
27	WMM_AC_BK,
28	WMM_AC_VI,
29	WMM_AC_VI,
30	WMM_AC_VO,
31	WMM_AC_VO
32};
33
34
35static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
36{
37	return (tspec->ts_info[0] >> 1) & 0x0f;
38}
39
40
41static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
42{
43	return (tspec->ts_info[0] >> 5) & 0x03;
44}
45
46
47static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
48{
49	return (tspec->ts_info[1] >> 3) & 0x07;
50}
51
52
53static u8 wmm_ac_direction_to_idx(u8 direction)
54{
55	switch (direction) {
56	case WMM_AC_DIR_UPLINK:
57		return TS_DIR_IDX_UPLINK;
58	case WMM_AC_DIR_DOWNLINK:
59		return TS_DIR_IDX_DOWNLINK;
60	case WMM_AC_DIR_BIDIRECTIONAL:
61		return TS_DIR_IDX_BIDI;
62	default:
63		wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
64		return WMM_AC_DIR_UPLINK;
65	}
66}
67
68
69static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
70			 const struct wmm_tspec_element *tspec)
71{
72	struct wmm_tspec_element *_tspec;
73	int ret;
74	u16 admitted_time = le_to_host16(tspec->medium_time);
75	u8 up = wmm_ac_get_user_priority(tspec);
76	u8 ac = up_to_ac[up];
77	u8 dir = wmm_ac_get_direction(tspec);
78	u8 tsid = wmm_ac_get_tsid(tspec);
79	enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
80
81	/* should have been verified before, but double-check here */
82	if (wpa_s->tspecs[ac][idx]) {
83		wpa_printf(MSG_ERROR,
84			   "WMM AC: tspec (ac=%d, dir=%d) already exists!",
85			   ac, dir);
86		return -1;
87	}
88
89	/* copy tspec */
90	_tspec = os_malloc(sizeof(*_tspec));
91	if (!_tspec)
92		return -1;
93
94	/* store the admitted TSPEC */
95	os_memcpy(_tspec, tspec, sizeof(*_tspec));
96
97	if (dir != WMM_AC_DIR_DOWNLINK) {
98		ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
99		wpa_printf(MSG_DEBUG,
100			   "WMM AC: Add TS: addr=" MACSTR
101			   " TSID=%u admitted time=%u, ret=%d",
102			   MAC2STR(addr), tsid, admitted_time, ret);
103		if (ret < 0) {
104			os_free(_tspec);
105			return -1;
106		}
107	}
108
109	wpa_s->tspecs[ac][idx] = _tspec;
110
111	wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
112
113	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
114		"tsid=%d addr=" MACSTR " admitted_time=%d",
115		tsid, MAC2STR(addr), admitted_time);
116
117	return 0;
118}
119
120
121static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
122			      enum ts_dir_idx dir)
123{
124	struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
125	u8 tsid;
126
127	if (!tspec)
128		return;
129
130	tsid = wmm_ac_get_tsid(tspec);
131	wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
132
133	/* update the driver in case of uplink/bidi */
134	if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
135		wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
136
137	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
138		"tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
139
140	os_free(wpa_s->tspecs[ac][dir]);
141	wpa_s->tspecs[ac][dir] = NULL;
142}
143
144
145static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
146{
147	struct wmm_ac_addts_request *req = wpa_s->addts_request;
148
149	if (!req)
150		return;
151
152	if (failed)
153		wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
154			"tsid=%u", wmm_ac_get_tsid(&req->tspec));
155
156	eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
157	wpa_s->addts_request = NULL;
158	os_free(req);
159}
160
161
162static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
163{
164	struct wpa_supplicant *wpa_s = eloop_ctx;
165	struct wmm_ac_addts_request *addts_req = timeout_ctx;
166
167	wpa_printf(MSG_DEBUG,
168		   "Timeout getting ADDTS response (tsid=%d up=%d)",
169		   wmm_ac_get_tsid(&addts_req->tspec),
170		   wmm_ac_get_user_priority(&addts_req->tspec));
171
172	wmm_ac_del_req(wpa_s, 1);
173}
174
175
176static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
177				     const struct wmm_ac_addts_request *req)
178{
179	struct wpabuf *buf;
180	int ret;
181
182	wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
183		   MAC2STR(req->address));
184
185	/* category + action code + dialog token + status + sizeof(tspec) */
186	buf = wpabuf_alloc(4 + sizeof(req->tspec));
187	if (!buf) {
188		wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
189		return -1;
190	}
191
192	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
193	wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
194	wpabuf_put_u8(buf, req->dialog_token);
195	wpabuf_put_u8(buf, 0); /* status code */
196	wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
197
198	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
199				wpa_s->own_addr, wpa_s->bssid,
200				wpabuf_head(buf), wpabuf_len(buf), 0);
201	if (ret) {
202		wpa_printf(MSG_WARNING,
203			   "WMM AC: Failed to send ADDTS Request");
204	}
205
206	wpabuf_free(buf);
207	return ret;
208}
209
210
211static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
212			     const struct wmm_tspec_element *tspec,
213			     const u8 *address)
214{
215	struct wpabuf *buf;
216	int ret;
217
218	/* category + action code + dialog token + status + sizeof(tspec) */
219	buf = wpabuf_alloc(4 + sizeof(*tspec));
220	if (!buf)
221		return -1;
222
223	wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
224
225	/* category + action code + dialog token + status + sizeof(tspec) */
226	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
227	wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
228	wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
229	wpabuf_put_u8(buf, 0); /* Status Code (not used) */
230	wpabuf_put_data(buf, tspec, sizeof(*tspec));
231
232	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
233				  wpa_s->own_addr, wpa_s->bssid,
234				  wpabuf_head(buf), wpabuf_len(buf), 0);
235	if (ret)
236		wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
237
238	wpabuf_free(buf);
239	return ret;
240}
241
242
243/* return the AC using the given TSPEC tid */
244static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
245			    enum ts_dir_idx *dir)
246{
247	int ac;
248	enum ts_dir_idx idx;
249
250	for (ac = 0; ac < WMM_AC_NUM; ac++) {
251		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
252			if (wpa_s->tspecs[ac][idx] &&
253			    wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
254				if (dir)
255					*dir = idx;
256				return ac;
257			}
258		}
259	}
260
261	return -1;
262}
263
264
265static struct wmm_ac_addts_request *
266wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
267		       const struct wmm_ac_ts_setup_params *params,
268		       const u8 *address)
269{
270	struct wmm_ac_addts_request *addts_req;
271	struct wmm_tspec_element *tspec;
272	u8 ac = up_to_ac[params->user_priority];
273	u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
274
275	addts_req = os_zalloc(sizeof(*addts_req));
276	if (!addts_req)
277		return NULL;
278
279	tspec = &addts_req->tspec;
280	os_memcpy(addts_req->address, address, ETH_ALEN);
281
282	/* The dialog token cannot be zero */
283	if (++wpa_s->wmm_ac_last_dialog_token == 0)
284		wpa_s->wmm_ac_last_dialog_token++;
285
286	addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
287	tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
288	tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
289	tspec->oui[0] = 0x00;
290	tspec->oui[1] = 0x50;
291	tspec->oui[2] = 0xf2;
292	tspec->oui_type = WMM_OUI_TYPE;
293	tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
294	tspec->version = WMM_VERSION;
295
296	tspec->ts_info[0] = params->tsid << 1;
297	tspec->ts_info[0] |= params->direction << 5;
298	tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
299	tspec->ts_info[1] = uapsd << 2;
300	tspec->ts_info[1] |= params->user_priority << 3;
301	tspec->ts_info[2] = 0;
302
303	tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
304	if (params->fixed_nominal_msdu)
305		tspec->nominal_msdu_size |=
306			host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
307
308	tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
309	tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
310	tspec->surplus_bandwidth_allowance =
311		host_to_le16(params->surplus_bandwidth_allowance);
312
313	return addts_req;
314}
315
316
317static int param_in_range(const char *name, long value,
318			  long min_val, long max_val)
319{
320	if (value < min_val || (max_val >= 0 && value > max_val)) {
321		wpa_printf(MSG_DEBUG,
322			   "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
323			   name, value, min_val, max_val);
324		return 0;
325	}
326
327	return 1;
328}
329
330
331static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
332				    u8 tsid, u8 ac, u8 dir)
333{
334	enum ts_dir_idx idx;
335	int cur_ac, existing_ts = 0, replace_ts = 0;
336
337	cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
338	if (cur_ac >= 0) {
339		if (cur_ac != ac) {
340			wpa_printf(MSG_DEBUG,
341				   "WMM AC: TSID %i already exists on different ac (%d)",
342				   tsid, cur_ac);
343			return -1;
344		}
345
346		/* same tsid - this tspec will replace the current one */
347		replace_ts |= BIT(idx);
348	}
349
350	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
351		if (wpa_s->tspecs[ac][idx])
352			existing_ts |= BIT(idx);
353	}
354
355	switch (dir) {
356	case WMM_AC_DIR_UPLINK:
357		/* replace existing uplink/bidi tspecs */
358		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
359					     BIT(TS_DIR_IDX_BIDI));
360		break;
361	case WMM_AC_DIR_DOWNLINK:
362		/* replace existing downlink/bidi tspecs */
363		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
364					     BIT(TS_DIR_IDX_BIDI));
365		break;
366	case WMM_AC_DIR_BIDIRECTIONAL:
367		/* replace all existing tspecs */
368		replace_ts |= existing_ts;
369		break;
370	default:
371		return -1;
372	}
373
374	return replace_ts;
375}
376
377
378static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
379				  const struct wmm_ac_ts_setup_params *params)
380{
381	enum wmm_ac req_ac;
382
383#define PARAM_IN_RANGE(field, min_value, max_value) \
384	param_in_range(#field, params->field, min_value, max_value)
385
386	if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
387	    !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
388	    !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
389	    !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
390	    !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
391	    !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
392			    -1))
393		return 0;
394#undef PARAM_IN_RANGE
395
396	if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
397	      params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
398	      params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
399		wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
400			   params->direction);
401		return 0;
402	}
403
404	req_ac = up_to_ac[params->user_priority];
405
406	/* Requested accesss category must have acm */
407	if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
408		wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
409		return 0;
410	}
411
412	if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
413				     params->direction) < 0)
414		return 0;
415
416	return 1;
417}
418
419
420static struct wmm_ac_assoc_data *
421wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
422			  size_t ies_len)
423{
424	struct ieee802_11_elems elems;
425	struct wmm_parameter_element *wmm_params;
426	struct wmm_ac_assoc_data *assoc_data;
427	int i;
428
429	/* Parsing WMM Parameter Element */
430	if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
431		wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
432		return NULL;
433	}
434
435	if (!elems.wmm) {
436		wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
437		return NULL;
438	}
439
440	if (elems.wmm_len != sizeof(*wmm_params)) {
441		wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
442		return NULL;
443	}
444
445	wmm_params = (struct wmm_parameter_element *)(elems.wmm);
446
447	assoc_data = os_zalloc(sizeof(*assoc_data));
448	if (!assoc_data)
449		return NULL;
450
451	for (i = 0; i < WMM_AC_NUM; i++)
452		assoc_data->ac_params[i].acm =
453			!!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
454
455	wpa_printf(MSG_DEBUG,
456		   "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
457		   assoc_data->ac_params[WMM_AC_BE].acm,
458		   assoc_data->ac_params[WMM_AC_BK].acm,
459		   assoc_data->ac_params[WMM_AC_VI].acm,
460		   assoc_data->ac_params[WMM_AC_VO].acm);
461
462	return assoc_data;
463}
464
465
466static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
467		       size_t ies_len, const struct wmm_params *wmm_params)
468{
469	struct wmm_ac_assoc_data *assoc_data;
470	u8 ac;
471
472	if (wpa_s->wmm_ac_assoc_info) {
473		wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
474		return -1;
475	}
476
477	if (!ies) {
478		wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
479		return -1;
480	}
481
482	if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
483		wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
484		return -1;
485	}
486
487	os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
488	wpa_s->wmm_ac_last_dialog_token = 0;
489	wpa_s->addts_request = NULL;
490
491	assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
492	if (!assoc_data)
493		return -1;
494
495	wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
496		   wmm_params->uapsd_queues);
497
498	for (ac = 0; ac < WMM_AC_NUM; ac++) {
499		assoc_data->ac_params[ac].uapsd =
500			!!(wmm_params->uapsd_queues & BIT(ac));
501	}
502
503	wpa_s->wmm_ac_assoc_info = assoc_data;
504	return 0;
505}
506
507
508static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
509{
510	enum ts_dir_idx idx;
511
512	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
513		if (!(dir_bitmap & BIT(idx)))
514			continue;
515
516		wmm_ac_del_ts_idx(wpa_s, ac, idx);
517	}
518}
519
520
521static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
522{
523	int i;
524
525	for (i = 0; i < WMM_AC_NUM; i++)
526		wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
527
528	/* delete pending add_ts requset */
529	wmm_ac_del_req(wpa_s, 1);
530
531	os_free(wpa_s->wmm_ac_assoc_info);
532	wpa_s->wmm_ac_assoc_info = NULL;
533}
534
535
536void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
537			 size_t ies_len, const struct wmm_params *wmm_params)
538{
539	if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
540		return;
541
542	wpa_printf(MSG_DEBUG,
543		   "WMM AC: Valid WMM association, WMM AC is enabled");
544}
545
546
547void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
548{
549	if (!wpa_s->wmm_ac_assoc_info)
550		return;
551
552	wmm_ac_deinit(wpa_s);
553	wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
554}
555
556
557int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
558{
559	struct wmm_tspec_element tspec;
560	int ac;
561	enum ts_dir_idx dir;
562
563	if (!wpa_s->wmm_ac_assoc_info) {
564		wpa_printf(MSG_DEBUG,
565			   "WMM AC: Failed to delete TS, WMM AC is disabled");
566		return -1;
567	}
568
569	ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
570	if (ac < 0) {
571		wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
572		return -1;
573	}
574
575	tspec = *wpa_s->tspecs[ac][dir];
576
577	wmm_ac_del_ts_idx(wpa_s, ac, dir);
578
579	wmm_ac_send_delts(wpa_s, &tspec, wpa_s->bssid);
580
581	return 0;
582}
583
584
585int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
586		      struct wmm_ac_ts_setup_params *params)
587{
588	struct wmm_ac_addts_request *addts_req;
589
590	if (!wpa_s->wmm_ac_assoc_info) {
591		wpa_printf(MSG_DEBUG,
592			   "WMM AC: Cannot add TS - missing assoc data");
593		return -1;
594	}
595
596	if (wpa_s->addts_request) {
597		wpa_printf(MSG_DEBUG,
598			   "WMM AC: can't add TS - ADDTS request is already pending");
599		return -1;
600	}
601
602	/*
603	 * we can setup downlink TS even without driver support.
604	 * however, we need driver support for the other directions.
605	 */
606	if (params->direction != WMM_AC_DIR_DOWNLINK &&
607	    !wpa_s->wmm_ac_supported) {
608		wpa_printf(MSG_DEBUG,
609			   "Cannot set uplink/bidi TS without driver support");
610		return -1;
611	}
612
613	if (!wmm_ac_ts_req_is_valid(wpa_s, params))
614		return -1;
615
616	wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
617		   " tsid=%u user priority=%u direction=%d)",
618		   MAC2STR(wpa_s->bssid), params->tsid,
619		   params->user_priority, params->direction);
620
621	addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
622	if (!addts_req)
623		return -1;
624
625	if (wmm_ac_send_addts_request(wpa_s, addts_req))
626		goto err;
627
628	/* save as pending and set ADDTS resp timeout to 1 second */
629	wpa_s->addts_request = addts_req;
630	eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
631			       wpa_s, addts_req);
632	return 0;
633err:
634	os_free(addts_req);
635	return -1;
636}
637
638
639static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
640				const struct wmm_tspec_element *tspec)
641{
642	int ac;
643	u8 tsid;
644	enum ts_dir_idx idx;
645
646	tsid = wmm_ac_get_tsid(tspec);
647
648	wpa_printf(MSG_DEBUG,
649		   "WMM AC: DELTS frame has been received TSID=%u addr="
650		   MACSTR, tsid, MAC2STR(sa));
651
652	ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
653	if (ac < 0) {
654		wpa_printf(MSG_DEBUG,
655			   "WMM AC: Ignoring DELTS frame - TSID does not exist");
656		return;
657	}
658
659	wmm_ac_del_ts_idx(wpa_s, ac, idx);
660
661	wpa_printf(MSG_DEBUG,
662		   "TS was deleted successfully (tsid=%u address=" MACSTR ")",
663		   tsid, MAC2STR(sa));
664}
665
666
667static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
668		const u8 resp_dialog_token, const u8 status_code,
669		const struct wmm_tspec_element *tspec)
670{
671	struct wmm_ac_addts_request *req = wpa_s->addts_request;
672	u8 ac, tsid, up, dir;
673	int replace_tspecs;
674
675	tsid = wmm_ac_get_tsid(tspec);
676	dir = wmm_ac_get_direction(tspec);
677	up = wmm_ac_get_user_priority(tspec);
678	ac = up_to_ac[up];
679
680	/* make sure we have a matching addts request */
681	if (!req || req->dialog_token != resp_dialog_token) {
682		wpa_printf(MSG_DEBUG,
683			   "WMM AC: no req with dialog=%u, ignoring frame",
684			   resp_dialog_token);
685		return;
686	}
687
688	/* make sure the params are the same */
689	if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
690	    tsid != wmm_ac_get_tsid(&req->tspec) ||
691	    up != wmm_ac_get_user_priority(&req->tspec) ||
692	    dir != wmm_ac_get_direction(&req->tspec)) {
693		wpa_printf(MSG_DEBUG,
694			   "WMM AC: ADDTS params do not match, ignoring frame");
695		return;
696	}
697
698	/* delete pending request */
699	wmm_ac_del_req(wpa_s, 0);
700
701	wpa_printf(MSG_DEBUG,
702		   "ADDTS response status=%d tsid=%u up=%u direction=%u",
703		   status_code, tsid, up, dir);
704
705	if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
706		wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
707		goto err_msg;
708	}
709
710	replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
711	if (replace_tspecs < 0)
712		goto err_delts;
713
714	wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
715
716	/* when replacing tspecs - delete first */
717	wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
718
719	/* Creating a new traffic stream */
720	wpa_printf(MSG_DEBUG,
721		   "WMM AC: adding a new TS with TSID=%u address="MACSTR
722		   " medium time=%u access category=%d dir=%d ",
723		   tsid, MAC2STR(sa),
724		   le_to_host16(tspec->medium_time), ac, dir);
725
726	if (wmm_ac_add_ts(wpa_s, sa, tspec))
727		goto err_delts;
728
729	return;
730
731err_delts:
732	/* ask the ap to delete the tspec */
733	wmm_ac_send_delts(wpa_s, tspec, sa);
734err_msg:
735	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
736		tsid);
737}
738
739
740void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
741			const u8 *sa, const u8 *data, size_t len)
742{
743	u8 action;
744	u8 dialog_token;
745	u8 status_code;
746	struct ieee802_11_elems elems;
747	struct wmm_tspec_element *tspec;
748
749	if (wpa_s->wmm_ac_assoc_info == NULL) {
750		wpa_printf(MSG_DEBUG,
751			   "WMM AC: WMM AC is disabled, ignoring action frame");
752		return;
753	}
754
755	action = data[0];
756
757	if (action != WMM_ACTION_CODE_ADDTS_RESP &&
758	    action != WMM_ACTION_CODE_DELTS) {
759		wpa_printf(MSG_DEBUG,
760			   "WMM AC: Unknown action (%d), ignoring action frame",
761			   action);
762		return;
763	}
764
765	/* WMM AC action frame */
766	if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
767		wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
768			   " is other than ours, ignoring frame", MAC2STR(da));
769		return;
770	}
771
772	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
773		wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
774			   " different other than our bssid", MAC2STR(da));
775		return;
776	}
777
778	if (len < 2 + sizeof(struct wmm_tspec_element)) {
779		wpa_printf(MSG_DEBUG,
780			   "WMM AC: Short ADDTS response ignored (len=%lu)",
781			   (unsigned long) len);
782		return;
783	}
784
785	data++;
786	len--;
787	dialog_token = data[0];
788	status_code = data[1];
789
790	if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
791		wpa_printf(MSG_DEBUG,
792			   "WMM AC: Could not parse WMM AC action from " MACSTR,
793			   MAC2STR(sa));
794		return;
795	}
796
797	/* the struct also contains the type and value, so decrease it */
798	if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
799		wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
800		return;
801	}
802
803	tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
804
805	wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
806		   MAC2STR(sa));
807	wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
808
809	switch (action) {
810	case WMM_ACTION_CODE_ADDTS_RESP:
811		wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
812					 tspec);
813		break;
814	case WMM_ACTION_CODE_DELTS:
815		wmm_ac_handle_delts(wpa_s, sa, tspec);
816		break;
817	default:
818		break;
819	}
820}
821
822
823static const char * get_ac_str(u8 ac)
824{
825	switch (ac) {
826	case WMM_AC_BE:
827		return "BE";
828	case WMM_AC_BK:
829		return "BK";
830	case WMM_AC_VI:
831		return "VI";
832	case WMM_AC_VO:
833		return "VO";
834	default:
835		return "N/A";
836	}
837}
838
839
840static const char * get_direction_str(u8 direction)
841{
842	switch (direction) {
843	case WMM_AC_DIR_DOWNLINK:
844		return "Downlink";
845	case WMM_AC_DIR_UPLINK:
846		return "Uplink";
847	case WMM_AC_DIR_BIDIRECTIONAL:
848		return "Bi-directional";
849	default:
850		return "N/A";
851	}
852}
853
854
855int wpas_wmm_ac_status(struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
856{
857	struct wmm_ac_assoc_data *assoc_info = wpa_s->wmm_ac_assoc_info;
858	enum ts_dir_idx idx;
859	int pos = 0;
860	u8 ac, up;
861
862	if (!assoc_info) {
863		return wpa_scnprintf(buf, buflen - pos,
864				     "Not associated to a WMM AP, WMM AC is Disabled\n");
865	}
866
867	pos += wpa_scnprintf(buf + pos, buflen - pos, "WMM AC is Enabled\n");
868
869	for (ac = 0; ac < WMM_AC_NUM; ac++) {
870		int ts_count = 0;
871
872		pos += wpa_scnprintf(buf + pos, buflen - pos,
873				     "%s: acm=%d uapsd=%d\n",
874				     get_ac_str(ac),
875				     assoc_info->ac_params[ac].acm,
876				     assoc_info->ac_params[ac].uapsd);
877
878		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
879			struct wmm_tspec_element *tspec;
880			u8 dir, tsid;
881			const char *dir_str;
882
883			tspec = wpa_s->tspecs[ac][idx];
884			if (!tspec)
885				continue;
886
887			ts_count++;
888
889			dir = wmm_ac_get_direction(tspec);
890			dir_str = get_direction_str(dir);
891			tsid = wmm_ac_get_tsid(tspec);
892			up = wmm_ac_get_user_priority(tspec);
893
894			pos += wpa_scnprintf(buf + pos, buflen - pos,
895					     "\tTSID=%u UP=%u\n"
896					     "\tAddress = "MACSTR"\n"
897					     "\tWMM AC dir = %s\n"
898					     "\tTotal admitted time = %u\n\n",
899					     tsid, up,
900					     MAC2STR(wpa_s->bssid),
901					     dir_str,
902					     le_to_host16(tspec->medium_time));
903		}
904
905		if (!ts_count) {
906			pos += wpa_scnprintf(buf + pos, buflen - pos,
907					     "\t(No Traffic Stream)\n\n");
908		}
909	}
910
911	return pos;
912}
913
914
915static u8 wmm_ac_get_tspecs_count(struct wpa_supplicant *wpa_s)
916{
917	int ac, dir, tspecs_count = 0;
918
919	for (ac = 0; ac < WMM_AC_NUM; ac++) {
920		for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
921			if (wpa_s->tspecs[ac][dir])
922				tspecs_count++;
923		}
924	}
925
926	return tspecs_count;
927}
928
929
930void wmm_ac_save_tspecs(struct wpa_supplicant *wpa_s)
931{
932	int ac, dir, tspecs_count;
933
934	wpa_printf(MSG_DEBUG, "WMM AC: Save last configured tspecs");
935
936	if (!wpa_s->wmm_ac_assoc_info)
937		return;
938
939	tspecs_count = wmm_ac_get_tspecs_count(wpa_s);
940	if (!tspecs_count) {
941		wpa_printf(MSG_DEBUG, "WMM AC: No configured TSPECs");
942		return;
943	}
944
945	wpa_printf(MSG_DEBUG, "WMM AC: Saving tspecs");
946
947	wmm_ac_clear_saved_tspecs(wpa_s);
948	wpa_s->last_tspecs = os_calloc(tspecs_count,
949				       sizeof(*wpa_s->last_tspecs));
950	if (!wpa_s->last_tspecs) {
951		wpa_printf(MSG_ERROR, "WMM AC: Failed to save tspecs!");
952		return;
953	}
954
955	for (ac = 0; ac < WMM_AC_NUM; ac++) {
956		for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
957			if (!wpa_s->tspecs[ac][dir])
958				continue;
959
960			wpa_s->last_tspecs[wpa_s->last_tspecs_count++] =
961				*wpa_s->tspecs[ac][dir];
962		}
963	}
964
965	wpa_printf(MSG_DEBUG, "WMM AC: Successfully saved %d TSPECs",
966		   wpa_s->last_tspecs_count);
967}
968
969
970void wmm_ac_clear_saved_tspecs(struct wpa_supplicant *wpa_s)
971{
972	if (wpa_s->last_tspecs) {
973		wpa_printf(MSG_DEBUG, "WMM AC: Clear saved tspecs");
974		os_free(wpa_s->last_tspecs);
975		wpa_s->last_tspecs = NULL;
976		wpa_s->last_tspecs_count = 0;
977	}
978}
979
980
981int wmm_ac_restore_tspecs(struct wpa_supplicant *wpa_s)
982{
983	unsigned int i;
984
985	if (!wpa_s->wmm_ac_assoc_info || !wpa_s->last_tspecs_count)
986		return 0;
987
988	wpa_printf(MSG_DEBUG, "WMM AC: Restore %u saved tspecs",
989		   wpa_s->last_tspecs_count);
990
991	for (i = 0; i < wpa_s->last_tspecs_count; i++)
992		wmm_ac_add_ts(wpa_s, wpa_s->bssid, &wpa_s->last_tspecs[i]);
993
994	return 0;
995}
996