ieee80211_sta.c revision 190391
1/*-
2 * Copyright (c) 2007-2008 Sam Leffler, Errno Consulting
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26#include <sys/cdefs.h>
27#ifdef __FreeBSD__
28__FBSDID("$FreeBSD: head/sys/net80211/ieee80211_sta.c 190391 2009-03-24 20:39:08Z sam $");
29#endif
30
31/*
32 * IEEE 802.11 Station mode support.
33 */
34#include "opt_inet.h"
35#include "opt_wlan.h"
36
37#include <sys/param.h>
38#include <sys/systm.h>
39#include <sys/mbuf.h>
40#include <sys/malloc.h>
41#include <sys/kernel.h>
42
43#include <sys/socket.h>
44#include <sys/sockio.h>
45#include <sys/endian.h>
46#include <sys/errno.h>
47#include <sys/proc.h>
48#include <sys/sysctl.h>
49
50#include <net/if.h>
51#include <net/if_media.h>
52#include <net/if_llc.h>
53#include <net/ethernet.h>
54
55#include <net/bpf.h>
56
57#include <net80211/ieee80211_var.h>
58#include <net80211/ieee80211_sta.h>
59#include <net80211/ieee80211_input.h>
60#ifdef IEEE80211_SUPPORT_SUPERG
61#include <net80211/ieee80211_superg.h>
62#endif
63
64#define	IEEE80211_RATE2MBS(r)	(((r) & IEEE80211_RATE_VAL) / 2)
65
66static	void sta_vattach(struct ieee80211vap *);
67static	void sta_beacon_miss(struct ieee80211vap *);
68static	int sta_newstate(struct ieee80211vap *, enum ieee80211_state, int);
69static	int sta_input(struct ieee80211_node *, struct mbuf *,
70	    int rssi, int noise, uint32_t rstamp);
71static void sta_recv_mgmt(struct ieee80211_node *, struct mbuf *,
72	    int subtype, int rssi, int noise, uint32_t rstamp);
73
74void
75ieee80211_sta_attach(struct ieee80211com *ic)
76{
77	ic->ic_vattach[IEEE80211_M_STA] = sta_vattach;
78}
79
80void
81ieee80211_sta_detach(struct ieee80211com *ic)
82{
83}
84
85static void
86sta_vdetach(struct ieee80211vap *vap)
87{
88}
89
90static void
91sta_vattach(struct ieee80211vap *vap)
92{
93	vap->iv_newstate = sta_newstate;
94	vap->iv_input = sta_input;
95	vap->iv_recv_mgmt = sta_recv_mgmt;
96	vap->iv_opdetach = sta_vdetach;
97	vap->iv_bmiss = sta_beacon_miss;
98}
99
100/*
101 * Handle a beacon miss event.  The common code filters out
102 * spurious events that can happen when scanning and/or before
103 * reaching RUN state.
104 */
105static void
106sta_beacon_miss(struct ieee80211vap *vap)
107{
108	struct ieee80211com *ic = vap->iv_ic;
109
110	KASSERT((ic->ic_flags & IEEE80211_F_SCAN) == 0, ("scanning"));
111	KASSERT(vap->iv_state == IEEE80211_S_RUN,
112	    ("wrong state %d", vap->iv_state));
113
114	IEEE80211_DPRINTF(vap,
115		IEEE80211_MSG_STATE | IEEE80211_MSG_DEBUG,
116		"beacon miss, mode %u state %s\n",
117		vap->iv_opmode, ieee80211_state_name[vap->iv_state]);
118
119	if (++vap->iv_bmiss_count < vap->iv_bmiss_max) {
120		/*
121		 * Send a directed probe req before falling back to a
122		 * scan; if we receive a response ic_bmiss_count will
123		 * be reset.  Some cards mistakenly report beacon miss
124		 * so this avoids the expensive scan if the ap is
125		 * still there.
126		 */
127		ieee80211_send_probereq(vap->iv_bss, vap->iv_myaddr,
128			vap->iv_bss->ni_bssid, vap->iv_bss->ni_bssid,
129			vap->iv_bss->ni_essid, vap->iv_bss->ni_esslen);
130		return;
131	}
132	vap->iv_bmiss_count = 0;
133	vap->iv_stats.is_beacon_miss++;
134	if (vap->iv_roaming == IEEE80211_ROAMING_AUTO) {
135#ifdef IEEE80211_SUPPORT_SUPERG
136		/*
137		 * If we receive a beacon miss interrupt when using
138		 * dynamic turbo, attempt to switch modes before
139		 * reassociating.
140		 */
141		if (IEEE80211_ATH_CAP(vap, vap->iv_bss, IEEE80211_NODE_TURBOP))
142			ieee80211_dturbo_switch(vap,
143			    ic->ic_bsschan->ic_flags ^ IEEE80211_CHAN_TURBO);
144#endif
145		/*
146		 * Try to reassociate before scanning for a new ap.
147		 */
148		ieee80211_new_state(vap, IEEE80211_S_ASSOC, 1);
149	} else {
150		/*
151		 * Somebody else is controlling state changes (e.g.
152		 * a user-mode app) don't do anything that would
153		 * confuse them; just drop into scan mode so they'll
154		 * notified of the state change and given control.
155		 */
156		ieee80211_new_state(vap, IEEE80211_S_SCAN, 0);
157	}
158}
159
160/*
161 * Handle deauth with reason.  We retry only for
162 * the cases where we might succeed.  Otherwise
163 * we downgrade the ap and scan.
164 */
165static void
166sta_authretry(struct ieee80211vap *vap, struct ieee80211_node *ni, int reason)
167{
168	switch (reason) {
169	case IEEE80211_STATUS_SUCCESS:		/* NB: MLME assoc */
170	case IEEE80211_STATUS_TIMEOUT:
171	case IEEE80211_REASON_ASSOC_EXPIRE:
172	case IEEE80211_REASON_NOT_AUTHED:
173	case IEEE80211_REASON_NOT_ASSOCED:
174	case IEEE80211_REASON_ASSOC_LEAVE:
175	case IEEE80211_REASON_ASSOC_NOT_AUTHED:
176		IEEE80211_SEND_MGMT(ni, IEEE80211_FC0_SUBTYPE_AUTH, 1);
177		break;
178	default:
179		ieee80211_scan_assoc_fail(vap, vap->iv_bss->ni_macaddr, reason);
180		if (vap->iv_roaming == IEEE80211_ROAMING_AUTO)
181			ieee80211_check_scan_current(vap);
182		break;
183	}
184}
185
186/*
187 * IEEE80211_M_STA vap state machine handler.
188 * This routine handles the main states in the 802.11 protocol.
189 */
190static int
191sta_newstate(struct ieee80211vap *vap, enum ieee80211_state nstate, int arg)
192{
193	struct ieee80211com *ic = vap->iv_ic;
194	struct ieee80211_node *ni;
195	enum ieee80211_state ostate;
196
197	IEEE80211_LOCK_ASSERT(ic);
198
199	ostate = vap->iv_state;
200	IEEE80211_DPRINTF(vap, IEEE80211_MSG_STATE, "%s: %s -> %s (%d)\n",
201	    __func__, ieee80211_state_name[ostate],
202	    ieee80211_state_name[nstate], arg);
203	vap->iv_state = nstate;			/* state transition */
204	callout_stop(&vap->iv_mgtsend);		/* XXX callout_drain */
205	if (ostate != IEEE80211_S_SCAN)
206		ieee80211_cancel_scan(vap);	/* background scan */
207	ni = vap->iv_bss;			/* NB: no reference held */
208	if (vap->iv_flags_ext & IEEE80211_FEXT_SWBMISS)
209		callout_stop(&vap->iv_swbmiss);
210	switch (nstate) {
211	case IEEE80211_S_INIT:
212		switch (ostate) {
213		case IEEE80211_S_SLEEP:
214			/* XXX wakeup */
215		case IEEE80211_S_RUN:
216			IEEE80211_SEND_MGMT(ni,
217			    IEEE80211_FC0_SUBTYPE_DISASSOC,
218			    IEEE80211_REASON_ASSOC_LEAVE);
219			ieee80211_sta_leave(ni);
220			break;
221		case IEEE80211_S_ASSOC:
222			IEEE80211_SEND_MGMT(ni,
223			    IEEE80211_FC0_SUBTYPE_DEAUTH,
224			    IEEE80211_REASON_AUTH_LEAVE);
225			break;
226		case IEEE80211_S_SCAN:
227			ieee80211_cancel_scan(vap);
228			break;
229		default:
230			goto invalid;
231		}
232		if (ostate != IEEE80211_S_INIT) {
233			/* NB: optimize INIT -> INIT case */
234			ieee80211_reset_bss(vap);
235		}
236		if (vap->iv_auth->ia_detach != NULL)
237			vap->iv_auth->ia_detach(vap);
238		break;
239	case IEEE80211_S_SCAN:
240		switch (ostate) {
241		case IEEE80211_S_INIT:
242			/*
243			 * Initiate a scan.  We can come here as a result
244			 * of an IEEE80211_IOC_SCAN_REQ too in which case
245			 * the vap will be marked with IEEE80211_FEXT_SCANREQ
246			 * and the scan request parameters will be present
247			 * in iv_scanreq.  Otherwise we do the default.
248			 */
249			if (vap->iv_flags_ext & IEEE80211_FEXT_SCANREQ) {
250				ieee80211_check_scan(vap,
251				    vap->iv_scanreq_flags,
252				    vap->iv_scanreq_duration,
253				    vap->iv_scanreq_mindwell,
254				    vap->iv_scanreq_maxdwell,
255				    vap->iv_scanreq_nssid, vap->iv_scanreq_ssid);
256				vap->iv_flags_ext &= ~IEEE80211_FEXT_SCANREQ;
257			} else
258				ieee80211_check_scan_current(vap);
259			break;
260		case IEEE80211_S_SCAN:
261		case IEEE80211_S_AUTH:
262		case IEEE80211_S_ASSOC:
263			/*
264			 * These can happen either because of a timeout
265			 * on an assoc/auth response or because of a
266			 * change in state that requires a reset.  For
267			 * the former we're called with a non-zero arg
268			 * that is the cause for the failure; pass this
269			 * to the scan code so it can update state.
270			 * Otherwise trigger a new scan unless we're in
271			 * manual roaming mode in which case an application
272			 * must issue an explicit scan request.
273			 */
274			if (arg != 0)
275				ieee80211_scan_assoc_fail(vap,
276					vap->iv_bss->ni_macaddr, arg);
277			if (vap->iv_roaming == IEEE80211_ROAMING_AUTO)
278				ieee80211_check_scan_current(vap);
279			break;
280		case IEEE80211_S_RUN:		/* beacon miss */
281			/*
282			 * Beacon miss.  Notify user space and if not
283			 * under control of a user application (roaming
284			 * manual) kick off a scan to re-connect.
285			 */
286			ieee80211_sta_leave(ni);
287			if (vap->iv_roaming == IEEE80211_ROAMING_AUTO)
288				ieee80211_check_scan_current(vap);
289			break;
290		default:
291			goto invalid;
292		}
293		break;
294	case IEEE80211_S_AUTH:
295		switch (ostate) {
296		case IEEE80211_S_INIT:
297		case IEEE80211_S_SCAN:
298			IEEE80211_SEND_MGMT(ni,
299			    IEEE80211_FC0_SUBTYPE_AUTH, 1);
300			break;
301		case IEEE80211_S_AUTH:
302		case IEEE80211_S_ASSOC:
303			switch (arg & 0xff) {
304			case IEEE80211_FC0_SUBTYPE_AUTH:
305				/* ??? */
306				IEEE80211_SEND_MGMT(ni,
307				    IEEE80211_FC0_SUBTYPE_AUTH, 2);
308				break;
309			case IEEE80211_FC0_SUBTYPE_DEAUTH:
310				sta_authretry(vap, ni, arg>>8);
311				break;
312			}
313			break;
314		case IEEE80211_S_RUN:
315			switch (arg & 0xff) {
316			case IEEE80211_FC0_SUBTYPE_AUTH:
317				IEEE80211_SEND_MGMT(ni,
318				    IEEE80211_FC0_SUBTYPE_AUTH, 2);
319				vap->iv_state = ostate;	/* stay RUN */
320				break;
321			case IEEE80211_FC0_SUBTYPE_DEAUTH:
322				ieee80211_sta_leave(ni);
323				if (vap->iv_roaming == IEEE80211_ROAMING_AUTO) {
324					/* try to reauth */
325					IEEE80211_SEND_MGMT(ni,
326					    IEEE80211_FC0_SUBTYPE_AUTH, 1);
327				}
328				break;
329			}
330			break;
331		default:
332			goto invalid;
333		}
334		break;
335	case IEEE80211_S_ASSOC:
336		switch (ostate) {
337		case IEEE80211_S_AUTH:
338		case IEEE80211_S_ASSOC:
339			IEEE80211_SEND_MGMT(ni,
340			    IEEE80211_FC0_SUBTYPE_ASSOC_REQ, 0);
341			break;
342		case IEEE80211_S_SLEEP:		/* cannot happen */
343		case IEEE80211_S_RUN:
344			ieee80211_sta_leave(ni);
345			if (vap->iv_roaming == IEEE80211_ROAMING_AUTO) {
346				IEEE80211_SEND_MGMT(ni, arg ?
347				    IEEE80211_FC0_SUBTYPE_REASSOC_REQ :
348				    IEEE80211_FC0_SUBTYPE_ASSOC_REQ, 0);
349			}
350			break;
351		default:
352			goto invalid;
353		}
354		break;
355	case IEEE80211_S_RUN:
356		if (vap->iv_flags & IEEE80211_F_WPA) {
357			/* XXX validate prerequisites */
358		}
359		switch (ostate) {
360		case IEEE80211_S_RUN:
361			break;
362		case IEEE80211_S_AUTH:		/* when join is done in fw */
363		case IEEE80211_S_ASSOC:
364#ifdef IEEE80211_DEBUG
365			if (ieee80211_msg_debug(vap)) {
366				ieee80211_note(vap, "%s with %s ssid ",
367				    (vap->iv_opmode == IEEE80211_M_STA ?
368				    "associated" : "synchronized"),
369				    ether_sprintf(ni->ni_bssid));
370				ieee80211_print_essid(vap->iv_bss->ni_essid,
371				    ni->ni_esslen);
372				/* XXX MCS/HT */
373				printf(" channel %d start %uMb\n",
374				    ieee80211_chan2ieee(ic, ic->ic_curchan),
375				    IEEE80211_RATE2MBS(ni->ni_txrate));
376			}
377#endif
378			ieee80211_scan_assoc_success(vap, ni->ni_macaddr);
379			ieee80211_notify_node_join(ni,
380			    arg == IEEE80211_FC0_SUBTYPE_ASSOC_RESP);
381			break;
382		case IEEE80211_S_SLEEP:
383			ieee80211_sta_pwrsave(vap, 0);
384			break;
385		default:
386			goto invalid;
387		}
388		ieee80211_sync_curchan(ic);
389		if (ostate != IEEE80211_S_RUN &&
390		    (vap->iv_flags_ext & IEEE80211_FEXT_SWBMISS)) {
391			/*
392			 * Start s/w beacon miss timer for devices w/o
393			 * hardware support.  We fudge a bit here since
394			 * we're doing this in software.
395			 */
396			vap->iv_swbmiss_period = IEEE80211_TU_TO_TICKS(
397				2 * vap->iv_bmissthreshold * ni->ni_intval);
398			vap->iv_swbmiss_count = 0;
399			callout_reset(&vap->iv_swbmiss, vap->iv_swbmiss_period,
400				ieee80211_swbmiss, vap);
401		}
402		/*
403		 * When 802.1x is not in use mark the port authorized
404		 * at this point so traffic can flow.
405		 */
406		if (ni->ni_authmode != IEEE80211_AUTH_8021X)
407			ieee80211_node_authorize(ni);
408		/*
409		 * Fake association when joining an existing bss.
410		 */
411		if (ic->ic_newassoc != NULL)
412			ic->ic_newassoc(vap->iv_bss, ostate != IEEE80211_S_RUN);
413		break;
414	case IEEE80211_S_SLEEP:
415		ieee80211_sta_pwrsave(vap, 0);
416		break;
417	default:
418	invalid:
419		IEEE80211_DPRINTF(vap, IEEE80211_MSG_STATE,
420		    "%s: unexpected state transition %s -> %s\n", __func__,
421		    ieee80211_state_name[ostate], ieee80211_state_name[nstate]);
422		break;
423	}
424	return 0;
425}
426
427/*
428 * Return non-zero if the frame is an echo of a multicast
429 * frame sent by ourself.  The dir is known to be DSTODS.
430 */
431static __inline int
432isdstods_mcastecho(struct ieee80211vap *vap, const struct ieee80211_frame *wh)
433{
434#define	QWH4(wh)	((const struct ieee80211_qosframe_addr4 *)wh)
435#define	WH4(wh)		((const struct ieee80211_frame_addr4 *)wh)
436	const uint8_t *sa;
437
438	KASSERT(vap->iv_opmode == IEEE80211_M_STA, ("wrong mode"));
439
440	if (!IEEE80211_IS_MULTICAST(wh->i_addr3))
441		return 0;
442	sa = IEEE80211_QOS_HAS_SEQ(wh) ? QWH4(wh)->i_addr4 : WH4(wh)->i_addr4;
443	return IEEE80211_ADDR_EQ(sa, vap->iv_myaddr);
444#undef WH4
445#undef QWH4
446}
447
448/*
449 * Return non-zero if the frame is an echo of a multicast
450 * frame sent by ourself.  The dir is known to be FROMDS.
451 */
452static __inline int
453isfromds_mcastecho(struct ieee80211vap *vap, const struct ieee80211_frame *wh)
454{
455	KASSERT(vap->iv_opmode == IEEE80211_M_STA, ("wrong mode"));
456
457	if (!IEEE80211_IS_MULTICAST(wh->i_addr1))
458		return 0;
459	return IEEE80211_ADDR_EQ(wh->i_addr3, vap->iv_myaddr);
460}
461
462/*
463 * Decide if a received management frame should be
464 * printed when debugging is enabled.  This filters some
465 * of the less interesting frames that come frequently
466 * (e.g. beacons).
467 */
468static __inline int
469doprint(struct ieee80211vap *vap, int subtype)
470{
471	switch (subtype) {
472	case IEEE80211_FC0_SUBTYPE_BEACON:
473		return (vap->iv_ic->ic_flags & IEEE80211_F_SCAN);
474	case IEEE80211_FC0_SUBTYPE_PROBE_REQ:
475		return 0;
476	}
477	return 1;
478}
479
480/*
481 * Process a received frame.  The node associated with the sender
482 * should be supplied.  If nothing was found in the node table then
483 * the caller is assumed to supply a reference to iv_bss instead.
484 * The RSSI and a timestamp are also supplied.  The RSSI data is used
485 * during AP scanning to select a AP to associate with; it can have
486 * any units so long as values have consistent units and higher values
487 * mean ``better signal''.  The receive timestamp is currently not used
488 * by the 802.11 layer.
489 */
490static int
491sta_input(struct ieee80211_node *ni, struct mbuf *m,
492	int rssi, int noise, uint32_t rstamp)
493{
494#define	SEQ_LEQ(a,b)	((int)((a)-(b)) <= 0)
495#define	HAS_SEQ(type)	((type & 0x4) == 0)
496	struct ieee80211vap *vap = ni->ni_vap;
497	struct ieee80211com *ic = ni->ni_ic;
498	struct ifnet *ifp = vap->iv_ifp;
499	struct ieee80211_frame *wh;
500	struct ieee80211_key *key;
501	struct ether_header *eh;
502	int hdrspace, need_tap;
503	uint8_t dir, type, subtype, qos;
504	uint8_t *bssid;
505	uint16_t rxseq;
506
507	if (m->m_flags & M_AMPDU_MPDU) {
508		/*
509		 * Fastpath for A-MPDU reorder q resubmission.  Frames
510		 * w/ M_AMPDU_MPDU marked have already passed through
511		 * here but were received out of order and been held on
512		 * the reorder queue.  When resubmitted they are marked
513		 * with the M_AMPDU_MPDU flag and we can bypass most of
514		 * the normal processing.
515		 */
516		wh = mtod(m, struct ieee80211_frame *);
517		type = IEEE80211_FC0_TYPE_DATA;
518		dir = wh->i_fc[1] & IEEE80211_FC1_DIR_MASK;
519		subtype = IEEE80211_FC0_SUBTYPE_QOS;
520		hdrspace = ieee80211_hdrspace(ic, wh);	/* XXX optimize? */
521		goto resubmit_ampdu;
522	}
523
524	KASSERT(ni != NULL, ("null node"));
525	ni->ni_inact = ni->ni_inact_reload;
526
527	need_tap = 1;			/* mbuf need to be tapped. */
528	type = -1;			/* undefined */
529
530	if (m->m_pkthdr.len < sizeof(struct ieee80211_frame_min)) {
531		IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_ANY,
532		    ni->ni_macaddr, NULL,
533		    "too short (1): len %u", m->m_pkthdr.len);
534		vap->iv_stats.is_rx_tooshort++;
535		goto out;
536	}
537	/*
538	 * Bit of a cheat here, we use a pointer for a 3-address
539	 * frame format but don't reference fields past outside
540	 * ieee80211_frame_min w/o first validating the data is
541	 * present.
542	 */
543	wh = mtod(m, struct ieee80211_frame *);
544
545	if ((wh->i_fc[0] & IEEE80211_FC0_VERSION_MASK) !=
546	    IEEE80211_FC0_VERSION_0) {
547		IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_ANY,
548		    ni->ni_macaddr, NULL, "wrong version %x", wh->i_fc[0]);
549		vap->iv_stats.is_rx_badversion++;
550		goto err;
551	}
552
553	dir = wh->i_fc[1] & IEEE80211_FC1_DIR_MASK;
554	type = wh->i_fc[0] & IEEE80211_FC0_TYPE_MASK;
555	subtype = wh->i_fc[0] & IEEE80211_FC0_SUBTYPE_MASK;
556	if ((ic->ic_flags & IEEE80211_F_SCAN) == 0) {
557		bssid = wh->i_addr2;
558		if (!IEEE80211_ADDR_EQ(bssid, ni->ni_bssid)) {
559			/* not interested in */
560			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
561			    bssid, NULL, "%s", "not to bss");
562			vap->iv_stats.is_rx_wrongbss++;
563			goto out;
564		}
565		IEEE80211_RSSI_LPF(ni->ni_avgrssi, rssi);
566		ni->ni_noise = noise;
567		ni->ni_rstamp = rstamp;
568		if (HAS_SEQ(type)) {
569			uint8_t tid = ieee80211_gettid(wh);
570			if (IEEE80211_QOS_HAS_SEQ(wh) &&
571			    TID_TO_WME_AC(tid) >= WME_AC_VI)
572				ic->ic_wme.wme_hipri_traffic++;
573			rxseq = le16toh(*(uint16_t *)wh->i_seq);
574			if ((ni->ni_flags & IEEE80211_NODE_HT) == 0 &&
575			    (wh->i_fc[1] & IEEE80211_FC1_RETRY) &&
576			    SEQ_LEQ(rxseq, ni->ni_rxseqs[tid])) {
577				/* duplicate, discard */
578				IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
579				    bssid, "duplicate",
580				    "seqno <%u,%u> fragno <%u,%u> tid %u",
581				    rxseq >> IEEE80211_SEQ_SEQ_SHIFT,
582				    ni->ni_rxseqs[tid] >>
583					IEEE80211_SEQ_SEQ_SHIFT,
584				    rxseq & IEEE80211_SEQ_FRAG_MASK,
585				    ni->ni_rxseqs[tid] &
586					IEEE80211_SEQ_FRAG_MASK,
587				    tid);
588				vap->iv_stats.is_rx_dup++;
589				IEEE80211_NODE_STAT(ni, rx_dup);
590				goto out;
591			}
592			ni->ni_rxseqs[tid] = rxseq;
593		}
594	}
595
596	switch (type) {
597	case IEEE80211_FC0_TYPE_DATA:
598		hdrspace = ieee80211_hdrspace(ic, wh);
599		if (m->m_len < hdrspace &&
600		    (m = m_pullup(m, hdrspace)) == NULL) {
601			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_ANY,
602			    ni->ni_macaddr, NULL,
603			    "data too short: expecting %u", hdrspace);
604			vap->iv_stats.is_rx_tooshort++;
605			goto out;		/* XXX */
606		}
607		/*
608		 * Handle A-MPDU re-ordering.  If the frame is to be
609		 * processed directly then ieee80211_ampdu_reorder
610		 * will return 0; otherwise it has consumed the mbuf
611		 * and we should do nothing more with it.
612		 */
613		if ((m->m_flags & M_AMPDU) &&
614		    (dir == IEEE80211_FC1_DIR_FROMDS ||
615		     dir == IEEE80211_FC1_DIR_DSTODS) &&
616		    ieee80211_ampdu_reorder(ni, m) != 0) {
617			m = NULL;
618			goto out;
619		}
620	resubmit_ampdu:
621		if (dir == IEEE80211_FC1_DIR_FROMDS) {
622			if ((ifp->if_flags & IFF_SIMPLEX) &&
623			    isfromds_mcastecho(vap, wh)) {
624				/*
625				 * In IEEE802.11 network, multicast
626				 * packets sent from "me" are broadcast
627				 * from the AP; silently discard for
628				 * SIMPLEX interface.
629				 */
630				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT,
631				    wh, "data", "%s", "multicast echo");
632				vap->iv_stats.is_rx_mcastecho++;
633				goto out;
634			}
635			if ((vap->iv_flags & IEEE80211_F_DWDS) &&
636			    IEEE80211_IS_MULTICAST(wh->i_addr1)) {
637				/*
638				 * DWDS sta's must drop 3-address mcast frames
639				 * as they will be sent separately as a 4-addr
640				 * frame.  Accepting the 3-addr frame will
641				 * confuse the bridge into thinking the sending
642				 * sta is located at the end of WDS link.
643				 */
644				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT, wh,
645				    "3-address data", "%s", "DWDS enabled");
646				vap->iv_stats.is_rx_mcastecho++;
647				goto out;
648			}
649		} else if (dir == IEEE80211_FC1_DIR_DSTODS) {
650			if ((vap->iv_flags & IEEE80211_F_DWDS) == 0) {
651				IEEE80211_DISCARD(vap,
652				    IEEE80211_MSG_INPUT, wh, "4-address data",
653				    "%s", "DWDS not enabled");
654				vap->iv_stats.is_rx_wrongdir++;
655				goto out;
656			}
657			if ((ifp->if_flags & IFF_SIMPLEX) &&
658			    isdstods_mcastecho(vap, wh)) {
659				/*
660				 * In IEEE802.11 network, multicast
661				 * packets sent from "me" are broadcast
662				 * from the AP; silently discard for
663				 * SIMPLEX interface.
664				 */
665				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT, wh,
666				    "4-address data", "%s", "multicast echo");
667				vap->iv_stats.is_rx_mcastecho++;
668				goto out;
669			}
670		} else {
671			IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT, wh,
672			    "data", "incorrect dir 0x%x", dir);
673			vap->iv_stats.is_rx_wrongdir++;
674			goto out;
675		}
676
677		/*
678		 * Handle privacy requirements.  Note that we
679		 * must not be preempted from here until after
680		 * we (potentially) call ieee80211_crypto_demic;
681		 * otherwise we may violate assumptions in the
682		 * crypto cipher modules used to do delayed update
683		 * of replay sequence numbers.
684		 */
685		if (wh->i_fc[1] & IEEE80211_FC1_WEP) {
686			if ((vap->iv_flags & IEEE80211_F_PRIVACY) == 0) {
687				/*
688				 * Discard encrypted frames when privacy is off.
689				 */
690				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT,
691				    wh, "WEP", "%s", "PRIVACY off");
692				vap->iv_stats.is_rx_noprivacy++;
693				IEEE80211_NODE_STAT(ni, rx_noprivacy);
694				goto out;
695			}
696			key = ieee80211_crypto_decap(ni, m, hdrspace);
697			if (key == NULL) {
698				/* NB: stats+msgs handled in crypto_decap */
699				IEEE80211_NODE_STAT(ni, rx_wepfail);
700				goto out;
701			}
702			wh = mtod(m, struct ieee80211_frame *);
703			wh->i_fc[1] &= ~IEEE80211_FC1_WEP;
704		} else {
705			/* XXX M_WEP and IEEE80211_F_PRIVACY */
706			key = NULL;
707		}
708
709		/*
710		 * Save QoS bits for use below--before we strip the header.
711		 */
712		if (subtype == IEEE80211_FC0_SUBTYPE_QOS) {
713			qos = (dir == IEEE80211_FC1_DIR_DSTODS) ?
714			    ((struct ieee80211_qosframe_addr4 *)wh)->i_qos[0] :
715			    ((struct ieee80211_qosframe *)wh)->i_qos[0];
716		} else
717			qos = 0;
718
719		/*
720		 * Next up, any fragmentation.
721		 */
722		if (!IEEE80211_IS_MULTICAST(wh->i_addr1)) {
723			m = ieee80211_defrag(ni, m, hdrspace);
724			if (m == NULL) {
725				/* Fragment dropped or frame not complete yet */
726				goto out;
727			}
728		}
729		wh = NULL;		/* no longer valid, catch any uses */
730
731		/*
732		 * Next strip any MSDU crypto bits.
733		 */
734		if (key != NULL && !ieee80211_crypto_demic(vap, key, m, 0)) {
735			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
736			    ni->ni_macaddr, "data", "%s", "demic error");
737			vap->iv_stats.is_rx_demicfail++;
738			IEEE80211_NODE_STAT(ni, rx_demicfail);
739			goto out;
740		}
741
742		/* copy to listener after decrypt */
743		if (bpf_peers_present(vap->iv_rawbpf))
744			bpf_mtap(vap->iv_rawbpf, m);
745		need_tap = 0;
746
747		/*
748		 * Finally, strip the 802.11 header.
749		 */
750		m = ieee80211_decap(vap, m, hdrspace);
751		if (m == NULL) {
752			/* XXX mask bit to check for both */
753			/* don't count Null data frames as errors */
754			if (subtype == IEEE80211_FC0_SUBTYPE_NODATA ||
755			    subtype == IEEE80211_FC0_SUBTYPE_QOS_NULL)
756				goto out;
757			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
758			    ni->ni_macaddr, "data", "%s", "decap error");
759			vap->iv_stats.is_rx_decap++;
760			IEEE80211_NODE_STAT(ni, rx_decap);
761			goto err;
762		}
763		eh = mtod(m, struct ether_header *);
764		if (!ieee80211_node_is_authorized(ni)) {
765			/*
766			 * Deny any non-PAE frames received prior to
767			 * authorization.  For open/shared-key
768			 * authentication the port is mark authorized
769			 * after authentication completes.  For 802.1x
770			 * the port is not marked authorized by the
771			 * authenticator until the handshake has completed.
772			 */
773			if (eh->ether_type != htons(ETHERTYPE_PAE)) {
774				IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
775				    eh->ether_shost, "data",
776				    "unauthorized port: ether type 0x%x len %u",
777				    eh->ether_type, m->m_pkthdr.len);
778				vap->iv_stats.is_rx_unauth++;
779				IEEE80211_NODE_STAT(ni, rx_unauth);
780				goto err;
781			}
782		} else {
783			/*
784			 * When denying unencrypted frames, discard
785			 * any non-PAE frames received without encryption.
786			 */
787			if ((vap->iv_flags & IEEE80211_F_DROPUNENC) &&
788			    (key == NULL && (m->m_flags & M_WEP) == 0) &&
789			    eh->ether_type != htons(ETHERTYPE_PAE)) {
790				/*
791				 * Drop unencrypted frames.
792				 */
793				vap->iv_stats.is_rx_unencrypted++;
794				IEEE80211_NODE_STAT(ni, rx_unencrypted);
795				goto out;
796			}
797		}
798		/* XXX require HT? */
799		if (qos & IEEE80211_QOS_AMSDU) {
800			m = ieee80211_decap_amsdu(ni, m);
801			if (m == NULL)
802				return IEEE80211_FC0_TYPE_DATA;
803		} else {
804#ifdef IEEE80211_SUPPORT_SUPERG
805			m = ieee80211_decap_fastframe(vap, ni, m);
806			if (m == NULL)
807				return IEEE80211_FC0_TYPE_DATA;
808#endif
809		}
810		ieee80211_deliver_data(vap, ni, m);
811		return IEEE80211_FC0_TYPE_DATA;
812
813	case IEEE80211_FC0_TYPE_MGT:
814		vap->iv_stats.is_rx_mgmt++;
815		IEEE80211_NODE_STAT(ni, rx_mgmt);
816		if (dir != IEEE80211_FC1_DIR_NODS) {
817			IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT,
818			    wh, "data", "incorrect dir 0x%x", dir);
819			vap->iv_stats.is_rx_wrongdir++;
820			goto err;
821		}
822		if (m->m_pkthdr.len < sizeof(struct ieee80211_frame)) {
823			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_ANY,
824			    ni->ni_macaddr, "mgt", "too short: len %u",
825			    m->m_pkthdr.len);
826			vap->iv_stats.is_rx_tooshort++;
827			goto out;
828		}
829#ifdef IEEE80211_DEBUG
830		if ((ieee80211_msg_debug(vap) && doprint(vap, subtype)) ||
831		    ieee80211_msg_dumppkts(vap)) {
832			if_printf(ifp, "received %s from %s rssi %d\n",
833			    ieee80211_mgt_subtype_name[subtype >>
834				IEEE80211_FC0_SUBTYPE_SHIFT],
835			    ether_sprintf(wh->i_addr2), rssi);
836		}
837#endif
838		if (wh->i_fc[1] & IEEE80211_FC1_WEP) {
839			if (subtype != IEEE80211_FC0_SUBTYPE_AUTH) {
840				/*
841				 * Only shared key auth frames with a challenge
842				 * should be encrypted, discard all others.
843				 */
844				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT,
845				    wh, ieee80211_mgt_subtype_name[subtype >>
846					IEEE80211_FC0_SUBTYPE_SHIFT],
847				    "%s", "WEP set but not permitted");
848				vap->iv_stats.is_rx_mgtdiscard++; /* XXX */
849				goto out;
850			}
851			if ((vap->iv_flags & IEEE80211_F_PRIVACY) == 0) {
852				/*
853				 * Discard encrypted frames when privacy is off.
854				 */
855				IEEE80211_DISCARD(vap, IEEE80211_MSG_INPUT,
856				    wh, "mgt", "%s", "WEP set but PRIVACY off");
857				vap->iv_stats.is_rx_noprivacy++;
858				goto out;
859			}
860			hdrspace = ieee80211_hdrspace(ic, wh);
861			key = ieee80211_crypto_decap(ni, m, hdrspace);
862			if (key == NULL) {
863				/* NB: stats+msgs handled in crypto_decap */
864				goto out;
865			}
866			wh = mtod(m, struct ieee80211_frame *);
867			wh->i_fc[1] &= ~IEEE80211_FC1_WEP;
868		}
869		if (bpf_peers_present(vap->iv_rawbpf))
870			bpf_mtap(vap->iv_rawbpf, m);
871		vap->iv_recv_mgmt(ni, m, subtype, rssi, noise, rstamp);
872		m_freem(m);
873		return IEEE80211_FC0_TYPE_MGT;
874
875	case IEEE80211_FC0_TYPE_CTL:
876		vap->iv_stats.is_rx_ctl++;
877		IEEE80211_NODE_STAT(ni, rx_ctrl);
878		goto out;
879	default:
880		IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
881		    wh, NULL, "bad frame type 0x%x", type);
882		/* should not come here */
883		break;
884	}
885err:
886	ifp->if_ierrors++;
887out:
888	if (m != NULL) {
889		if (bpf_peers_present(vap->iv_rawbpf) && need_tap)
890			bpf_mtap(vap->iv_rawbpf, m);
891		m_freem(m);
892	}
893	return type;
894#undef SEQ_LEQ
895}
896
897static void
898sta_auth_open(struct ieee80211_node *ni, struct ieee80211_frame *wh,
899    int rssi, int noise, uint32_t rstamp, uint16_t seq, uint16_t status)
900{
901	struct ieee80211vap *vap = ni->ni_vap;
902
903	if (ni->ni_authmode == IEEE80211_AUTH_SHARED) {
904		IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
905		    ni->ni_macaddr, "open auth",
906		    "bad sta auth mode %u", ni->ni_authmode);
907		vap->iv_stats.is_rx_bad_auth++;	/* XXX */
908		return;
909	}
910	if (vap->iv_state != IEEE80211_S_AUTH ||
911	    seq != IEEE80211_AUTH_OPEN_RESPONSE) {
912		vap->iv_stats.is_rx_bad_auth++;
913		return;
914	}
915	if (status != 0) {
916		IEEE80211_NOTE(vap, IEEE80211_MSG_DEBUG | IEEE80211_MSG_AUTH,
917		    ni, "open auth failed (reason %d)", status);
918		vap->iv_stats.is_rx_auth_fail++;
919		vap->iv_stats.is_rx_authfail_code = status;
920		ieee80211_new_state(vap, IEEE80211_S_SCAN,
921		    IEEE80211_SCAN_FAIL_STATUS);
922	} else
923		ieee80211_new_state(vap, IEEE80211_S_ASSOC, 0);
924}
925
926static void
927sta_auth_shared(struct ieee80211_node *ni, struct ieee80211_frame *wh,
928    uint8_t *frm, uint8_t *efrm, int rssi, int noise, uint32_t rstamp,
929    uint16_t seq, uint16_t status)
930{
931	struct ieee80211vap *vap = ni->ni_vap;
932	uint8_t *challenge;
933	int estatus;
934
935	/*
936	 * NB: this can happen as we allow pre-shared key
937	 * authentication to be enabled w/o wep being turned
938	 * on so that configuration of these can be done
939	 * in any order.  It may be better to enforce the
940	 * ordering in which case this check would just be
941	 * for sanity/consistency.
942	 */
943	if ((vap->iv_flags & IEEE80211_F_PRIVACY) == 0) {
944		IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
945		    ni->ni_macaddr, "shared key auth",
946		    "%s", " PRIVACY is disabled");
947		estatus = IEEE80211_STATUS_ALG;
948		goto bad;
949	}
950	/*
951	 * Pre-shared key authentication is evil; accept
952	 * it only if explicitly configured (it is supported
953	 * mainly for compatibility with clients like OS X).
954	 */
955	if (ni->ni_authmode != IEEE80211_AUTH_AUTO &&
956	    ni->ni_authmode != IEEE80211_AUTH_SHARED) {
957		IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
958		    ni->ni_macaddr, "shared key auth",
959		    "bad sta auth mode %u", ni->ni_authmode);
960		vap->iv_stats.is_rx_bad_auth++;	/* XXX maybe a unique error? */
961		estatus = IEEE80211_STATUS_ALG;
962		goto bad;
963	}
964
965	challenge = NULL;
966	if (frm + 1 < efrm) {
967		if ((frm[1] + 2) > (efrm - frm)) {
968			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
969			    ni->ni_macaddr, "shared key auth",
970			    "ie %d/%d too long",
971			    frm[0], (frm[1] + 2) - (efrm - frm));
972			vap->iv_stats.is_rx_bad_auth++;
973			estatus = IEEE80211_STATUS_CHALLENGE;
974			goto bad;
975		}
976		if (*frm == IEEE80211_ELEMID_CHALLENGE)
977			challenge = frm;
978		frm += frm[1] + 2;
979	}
980	switch (seq) {
981	case IEEE80211_AUTH_SHARED_CHALLENGE:
982	case IEEE80211_AUTH_SHARED_RESPONSE:
983		if (challenge == NULL) {
984			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
985			    ni->ni_macaddr, "shared key auth",
986			    "%s", "no challenge");
987			vap->iv_stats.is_rx_bad_auth++;
988			estatus = IEEE80211_STATUS_CHALLENGE;
989			goto bad;
990		}
991		if (challenge[1] != IEEE80211_CHALLENGE_LEN) {
992			IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_AUTH,
993			    ni->ni_macaddr, "shared key auth",
994			    "bad challenge len %d", challenge[1]);
995			vap->iv_stats.is_rx_bad_auth++;
996			estatus = IEEE80211_STATUS_CHALLENGE;
997			goto bad;
998		}
999	default:
1000		break;
1001	}
1002	if (vap->iv_state != IEEE80211_S_AUTH)
1003		return;
1004	switch (seq) {
1005	case IEEE80211_AUTH_SHARED_PASS:
1006		if (ni->ni_challenge != NULL) {
1007			free(ni->ni_challenge, M_80211_NODE);
1008			ni->ni_challenge = NULL;
1009		}
1010		if (status != 0) {
1011			IEEE80211_NOTE_FRAME(vap,
1012			    IEEE80211_MSG_DEBUG | IEEE80211_MSG_AUTH, wh,
1013			    "shared key auth failed (reason %d)", status);
1014			vap->iv_stats.is_rx_auth_fail++;
1015			vap->iv_stats.is_rx_authfail_code = status;
1016			return;
1017		}
1018		ieee80211_new_state(vap, IEEE80211_S_ASSOC, 0);
1019		break;
1020	case IEEE80211_AUTH_SHARED_CHALLENGE:
1021		if (!ieee80211_alloc_challenge(ni))
1022			return;
1023		/* XXX could optimize by passing recvd challenge */
1024		memcpy(ni->ni_challenge, &challenge[2], challenge[1]);
1025		IEEE80211_SEND_MGMT(ni,
1026			IEEE80211_FC0_SUBTYPE_AUTH, seq + 1);
1027		break;
1028	default:
1029		IEEE80211_DISCARD(vap, IEEE80211_MSG_AUTH,
1030		    wh, "shared key auth", "bad seq %d", seq);
1031		vap->iv_stats.is_rx_bad_auth++;
1032		return;
1033	}
1034	return;
1035bad:
1036	/*
1037	 * Kick the state machine.  This short-circuits
1038	 * using the mgt frame timeout to trigger the
1039	 * state transition.
1040	 */
1041	if (vap->iv_state == IEEE80211_S_AUTH)
1042		ieee80211_new_state(vap, IEEE80211_S_SCAN,
1043		    IEEE80211_SCAN_FAIL_STATUS);
1044}
1045
1046static int
1047ieee80211_parse_wmeparams(struct ieee80211vap *vap, uint8_t *frm,
1048	const struct ieee80211_frame *wh)
1049{
1050#define	MS(_v, _f)	(((_v) & _f) >> _f##_S)
1051	struct ieee80211_wme_state *wme = &vap->iv_ic->ic_wme;
1052	u_int len = frm[1], qosinfo;
1053	int i;
1054
1055	if (len < sizeof(struct ieee80211_wme_param)-2) {
1056		IEEE80211_DISCARD_IE(vap,
1057		    IEEE80211_MSG_ELEMID | IEEE80211_MSG_WME,
1058		    wh, "WME", "too short, len %u", len);
1059		return -1;
1060	}
1061	qosinfo = frm[__offsetof(struct ieee80211_wme_param, param_qosInfo)];
1062	qosinfo &= WME_QOSINFO_COUNT;
1063	/* XXX do proper check for wraparound */
1064	if (qosinfo == wme->wme_wmeChanParams.cap_info)
1065		return 0;
1066	frm += __offsetof(struct ieee80211_wme_param, params_acParams);
1067	for (i = 0; i < WME_NUM_AC; i++) {
1068		struct wmeParams *wmep =
1069			&wme->wme_wmeChanParams.cap_wmeParams[i];
1070		/* NB: ACI not used */
1071		wmep->wmep_acm = MS(frm[0], WME_PARAM_ACM);
1072		wmep->wmep_aifsn = MS(frm[0], WME_PARAM_AIFSN);
1073		wmep->wmep_logcwmin = MS(frm[1], WME_PARAM_LOGCWMIN);
1074		wmep->wmep_logcwmax = MS(frm[1], WME_PARAM_LOGCWMAX);
1075		wmep->wmep_txopLimit = LE_READ_2(frm+2);
1076		frm += 4;
1077	}
1078	wme->wme_wmeChanParams.cap_info = qosinfo;
1079	return 1;
1080#undef MS
1081}
1082
1083/*
1084 * Return non-zero if a background scan may be continued:
1085 * o bg scan is active
1086 * o no channel switch is pending
1087 * o there has not been any traffic recently
1088 *
1089 * Note we do not check if there is an administrative enable;
1090 * this is only done to start the scan.  We assume that any
1091 * change in state will be accompanied by a request to cancel
1092 * active scans which will otherwise cause this test to fail.
1093 */
1094static __inline int
1095contbgscan(struct ieee80211vap *vap)
1096{
1097	struct ieee80211com *ic = vap->iv_ic;
1098
1099	return ((ic->ic_flags_ext & IEEE80211_FEXT_BGSCAN) &&
1100	    (ic->ic_flags & IEEE80211_F_CSAPENDING) == 0 &&
1101	    vap->iv_state == IEEE80211_S_RUN &&		/* XXX? */
1102	    time_after(ticks, ic->ic_lastdata + vap->iv_bgscanidle));
1103}
1104
1105/*
1106 * Return non-zero if a backgrond scan may be started:
1107 * o bg scanning is administratively enabled
1108 * o no channel switch is pending
1109 * o we are not boosted on a dynamic turbo channel
1110 * o there has not been a scan recently
1111 * o there has not been any traffic recently
1112 */
1113static __inline int
1114startbgscan(struct ieee80211vap *vap)
1115{
1116	struct ieee80211com *ic = vap->iv_ic;
1117
1118	return ((vap->iv_flags & IEEE80211_F_BGSCAN) &&
1119	    (ic->ic_flags & IEEE80211_F_CSAPENDING) == 0 &&
1120#ifdef IEEE80211_SUPPORT_SUPERG
1121	    !IEEE80211_IS_CHAN_DTURBO(ic->ic_curchan) &&
1122#endif
1123	    time_after(ticks, ic->ic_lastscan + vap->iv_bgscanintvl) &&
1124	    time_after(ticks, ic->ic_lastdata + vap->iv_bgscanidle));
1125}
1126
1127static void
1128sta_recv_mgmt(struct ieee80211_node *ni, struct mbuf *m0,
1129	int subtype, int rssi, int noise, uint32_t rstamp)
1130{
1131#define	ISPROBE(_st)	((_st) == IEEE80211_FC0_SUBTYPE_PROBE_RESP)
1132#define	ISREASSOC(_st)	((_st) == IEEE80211_FC0_SUBTYPE_REASSOC_RESP)
1133	struct ieee80211vap *vap = ni->ni_vap;
1134	struct ieee80211com *ic = ni->ni_ic;
1135	struct ieee80211_frame *wh;
1136	uint8_t *frm, *efrm;
1137	uint8_t *rates, *xrates, *wme, *htcap, *htinfo;
1138	uint8_t rate;
1139
1140	wh = mtod(m0, struct ieee80211_frame *);
1141	frm = (uint8_t *)&wh[1];
1142	efrm = mtod(m0, uint8_t *) + m0->m_len;
1143	switch (subtype) {
1144	case IEEE80211_FC0_SUBTYPE_PROBE_RESP:
1145	case IEEE80211_FC0_SUBTYPE_BEACON: {
1146		struct ieee80211_scanparams scan;
1147		/*
1148		 * We process beacon/probe response frames:
1149		 *    o when scanning, or
1150		 *    o station mode when associated (to collect state
1151		 *      updates such as 802.11g slot time), or
1152		 * Frames otherwise received are discarded.
1153		 */
1154		if (!((ic->ic_flags & IEEE80211_F_SCAN) || ni->ni_associd)) {
1155			vap->iv_stats.is_rx_mgtdiscard++;
1156			return;
1157		}
1158		/* XXX probe response in sta mode when !scanning? */
1159		if (ieee80211_parse_beacon(ni, m0, &scan) != 0)
1160			return;
1161		/*
1162		 * Count frame now that we know it's to be processed.
1163		 */
1164		if (subtype == IEEE80211_FC0_SUBTYPE_BEACON) {
1165			vap->iv_stats.is_rx_beacon++;		/* XXX remove */
1166			IEEE80211_NODE_STAT(ni, rx_beacons);
1167		} else
1168			IEEE80211_NODE_STAT(ni, rx_proberesp);
1169		/*
1170		 * When operating in station mode, check for state updates.
1171		 * Be careful to ignore beacons received while doing a
1172		 * background scan.  We consider only 11g/WMM stuff right now.
1173		 */
1174		if (ni->ni_associd != 0 &&
1175		    ((ic->ic_flags & IEEE80211_F_SCAN) == 0 ||
1176		     IEEE80211_ADDR_EQ(wh->i_addr2, ni->ni_bssid))) {
1177			/* record tsf of last beacon */
1178			memcpy(ni->ni_tstamp.data, scan.tstamp,
1179				sizeof(ni->ni_tstamp));
1180			/* count beacon frame for s/w bmiss handling */
1181			vap->iv_swbmiss_count++;
1182			vap->iv_bmiss_count = 0;
1183			if (ni->ni_erp != scan.erp) {
1184				IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ASSOC,
1185				    wh->i_addr2,
1186				    "erp change: was 0x%x, now 0x%x",
1187				    ni->ni_erp, scan.erp);
1188				if (IEEE80211_IS_CHAN_ANYG(ic->ic_curchan) &&
1189				    (ni->ni_erp & IEEE80211_ERP_USE_PROTECTION))
1190					ic->ic_flags |= IEEE80211_F_USEPROT;
1191				else
1192					ic->ic_flags &= ~IEEE80211_F_USEPROT;
1193				ni->ni_erp = scan.erp;
1194				/* XXX statistic */
1195				/* XXX driver notification */
1196			}
1197			if ((ni->ni_capinfo ^ scan.capinfo) & IEEE80211_CAPINFO_SHORT_SLOTTIME) {
1198				IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ASSOC,
1199				    wh->i_addr2,
1200				    "capabilities change: was 0x%x, now 0x%x",
1201				    ni->ni_capinfo, scan.capinfo);
1202				/*
1203				 * NB: we assume short preamble doesn't
1204				 *     change dynamically
1205				 */
1206				ieee80211_set_shortslottime(ic,
1207					IEEE80211_IS_CHAN_A(ic->ic_bsschan) ||
1208					(scan.capinfo & IEEE80211_CAPINFO_SHORT_SLOTTIME));
1209				ni->ni_capinfo = (ni->ni_capinfo &~ IEEE80211_CAPINFO_SHORT_SLOTTIME)
1210					       | (scan.capinfo & IEEE80211_CAPINFO_SHORT_SLOTTIME);
1211				/* XXX statistic */
1212			}
1213			if (scan.wme != NULL &&
1214			    (ni->ni_flags & IEEE80211_NODE_QOS) &&
1215			    ieee80211_parse_wmeparams(vap, scan.wme, wh) > 0)
1216				ieee80211_wme_updateparams(vap);
1217#ifdef IEEE80211_SUPPORT_SUPERG
1218			if (scan.ath != NULL)
1219				ieee80211_parse_athparams(ni, scan.ath, wh);
1220#endif
1221			if (scan.htcap != NULL && scan.htinfo != NULL &&
1222			    (vap->iv_flags_ext & IEEE80211_FEXT_HT)) {
1223				ieee80211_ht_updateparams(ni,
1224				    scan.htcap, scan.htinfo);
1225				/* XXX state changes? */
1226			}
1227			if (scan.tim != NULL) {
1228				struct ieee80211_tim_ie *tim =
1229				    (struct ieee80211_tim_ie *) scan.tim;
1230#if 0
1231				int aid = IEEE80211_AID(ni->ni_associd);
1232				int ix = aid / NBBY;
1233				int min = tim->tim_bitctl &~ 1;
1234				int max = tim->tim_len + min - 4;
1235				if ((tim->tim_bitctl&1) ||
1236				    (min <= ix && ix <= max &&
1237				     isset(tim->tim_bitmap - min, aid))) {
1238					/*
1239					 * XXX Do not let bg scan kick off
1240					 * we are expecting data.
1241					 */
1242					ic->ic_lastdata = ticks;
1243					ieee80211_sta_pwrsave(vap, 0);
1244				}
1245#endif
1246				ni->ni_dtim_count = tim->tim_count;
1247				ni->ni_dtim_period = tim->tim_period;
1248			}
1249			/*
1250			 * If scanning, pass the info to the scan module.
1251			 * Otherwise, check if it's the right time to do
1252			 * a background scan.  Background scanning must
1253			 * be enabled and we must not be operating in the
1254			 * turbo phase of dynamic turbo mode.  Then,
1255			 * it's been a while since the last background
1256			 * scan and if no data frames have come through
1257			 * recently, kick off a scan.  Note that this
1258			 * is the mechanism by which a background scan
1259			 * is started _and_ continued each time we
1260			 * return on-channel to receive a beacon from
1261			 * our ap.
1262			 */
1263			if (ic->ic_flags & IEEE80211_F_SCAN) {
1264				ieee80211_add_scan(vap, &scan, wh,
1265					subtype, rssi, noise, rstamp);
1266			} else if (contbgscan(vap)) {
1267				ieee80211_bg_scan(vap, 0);
1268			} else if (startbgscan(vap)) {
1269				vap->iv_stats.is_scan_bg++;
1270#if 0
1271				/* wakeup if we are sleeing */
1272				ieee80211_set_pwrsave(vap, 0);
1273#endif
1274				ieee80211_bg_scan(vap, 0);
1275			}
1276			return;
1277		}
1278		/*
1279		 * If scanning, just pass information to the scan module.
1280		 */
1281		if (ic->ic_flags & IEEE80211_F_SCAN) {
1282			if (ic->ic_flags_ext & IEEE80211_FEXT_PROBECHAN) {
1283				/*
1284				 * Actively scanning a channel marked passive;
1285				 * send a probe request now that we know there
1286				 * is 802.11 traffic present.
1287				 *
1288				 * XXX check if the beacon we recv'd gives
1289				 * us what we need and suppress the probe req
1290				 */
1291				ieee80211_probe_curchan(vap, 1);
1292				ic->ic_flags_ext &= ~IEEE80211_FEXT_PROBECHAN;
1293			}
1294			ieee80211_add_scan(vap, &scan, wh,
1295				subtype, rssi, noise, rstamp);
1296			return;
1297		}
1298		break;
1299	}
1300
1301	case IEEE80211_FC0_SUBTYPE_AUTH: {
1302		uint16_t algo, seq, status;
1303		/*
1304		 * auth frame format
1305		 *	[2] algorithm
1306		 *	[2] sequence
1307		 *	[2] status
1308		 *	[tlv*] challenge
1309		 */
1310		IEEE80211_VERIFY_LENGTH(efrm - frm, 6, return);
1311		algo   = le16toh(*(uint16_t *)frm);
1312		seq    = le16toh(*(uint16_t *)(frm + 2));
1313		status = le16toh(*(uint16_t *)(frm + 4));
1314		IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_AUTH, wh->i_addr2,
1315		    "recv auth frame with algorithm %d seq %d", algo, seq);
1316
1317		if (vap->iv_flags & IEEE80211_F_COUNTERM) {
1318			IEEE80211_DISCARD(vap,
1319			    IEEE80211_MSG_AUTH | IEEE80211_MSG_CRYPTO,
1320			    wh, "auth", "%s", "TKIP countermeasures enabled");
1321			vap->iv_stats.is_rx_auth_countermeasures++;
1322			if (vap->iv_opmode == IEEE80211_M_HOSTAP) {
1323				ieee80211_send_error(ni, wh->i_addr2,
1324					IEEE80211_FC0_SUBTYPE_AUTH,
1325					IEEE80211_REASON_MIC_FAILURE);
1326			}
1327			return;
1328		}
1329		if (algo == IEEE80211_AUTH_ALG_SHARED)
1330			sta_auth_shared(ni, wh, frm + 6, efrm, rssi,
1331			    noise, rstamp, seq, status);
1332		else if (algo == IEEE80211_AUTH_ALG_OPEN)
1333			sta_auth_open(ni, wh, rssi, noise, rstamp,
1334			    seq, status);
1335		else {
1336			IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
1337			    wh, "auth", "unsupported alg %d", algo);
1338			vap->iv_stats.is_rx_auth_unsupported++;
1339			return;
1340		}
1341		break;
1342	}
1343
1344	case IEEE80211_FC0_SUBTYPE_ASSOC_RESP:
1345	case IEEE80211_FC0_SUBTYPE_REASSOC_RESP: {
1346		uint16_t capinfo, associd;
1347		uint16_t status;
1348
1349		if (vap->iv_state != IEEE80211_S_ASSOC) {
1350			vap->iv_stats.is_rx_mgtdiscard++;
1351			return;
1352		}
1353
1354		/*
1355		 * asresp frame format
1356		 *	[2] capability information
1357		 *	[2] status
1358		 *	[2] association ID
1359		 *	[tlv] supported rates
1360		 *	[tlv] extended supported rates
1361		 *	[tlv] WME
1362		 *	[tlv] HT capabilities
1363		 *	[tlv] HT info
1364		 */
1365		IEEE80211_VERIFY_LENGTH(efrm - frm, 6, return);
1366		ni = vap->iv_bss;
1367		capinfo = le16toh(*(uint16_t *)frm);
1368		frm += 2;
1369		status = le16toh(*(uint16_t *)frm);
1370		frm += 2;
1371		if (status != 0) {
1372			IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ASSOC,
1373			    wh->i_addr2, "%sassoc failed (reason %d)",
1374			    ISREASSOC(subtype) ?  "re" : "", status);
1375			vap->iv_stats.is_rx_auth_fail++;	/* XXX */
1376			return;
1377		}
1378		associd = le16toh(*(uint16_t *)frm);
1379		frm += 2;
1380
1381		rates = xrates = wme = htcap = htinfo = NULL;
1382		while (efrm - frm > 1) {
1383			IEEE80211_VERIFY_LENGTH(efrm - frm, frm[1] + 2, return);
1384			switch (*frm) {
1385			case IEEE80211_ELEMID_RATES:
1386				rates = frm;
1387				break;
1388			case IEEE80211_ELEMID_XRATES:
1389				xrates = frm;
1390				break;
1391			case IEEE80211_ELEMID_HTCAP:
1392				htcap = frm;
1393				break;
1394			case IEEE80211_ELEMID_HTINFO:
1395				htinfo = frm;
1396				break;
1397			case IEEE80211_ELEMID_VENDOR:
1398				if (iswmeoui(frm))
1399					wme = frm;
1400				else if (vap->iv_flags_ext & IEEE80211_FEXT_HTCOMPAT) {
1401					/*
1402					 * Accept pre-draft HT ie's if the
1403					 * standard ones have not been seen.
1404					 */
1405					if (ishtcapoui(frm)) {
1406						if (htcap == NULL)
1407							htcap = frm;
1408					} else if (ishtinfooui(frm)) {
1409						if (htinfo == NULL)
1410							htcap = frm;
1411					}
1412				}
1413				/* XXX Atheros OUI support */
1414				break;
1415			}
1416			frm += frm[1] + 2;
1417		}
1418
1419		IEEE80211_VERIFY_ELEMENT(rates, IEEE80211_RATE_MAXSIZE, return);
1420		if (xrates != NULL)
1421			IEEE80211_VERIFY_ELEMENT(xrates,
1422				IEEE80211_RATE_MAXSIZE - rates[1], return);
1423		rate = ieee80211_setup_rates(ni, rates, xrates,
1424				IEEE80211_F_JOIN |
1425				IEEE80211_F_DOSORT | IEEE80211_F_DOFRATE |
1426				IEEE80211_F_DONEGO | IEEE80211_F_DODEL);
1427		if (rate & IEEE80211_RATE_BASIC) {
1428			IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ASSOC,
1429			    wh->i_addr2,
1430			    "%sassoc failed (rate set mismatch)",
1431			    ISREASSOC(subtype) ?  "re" : "");
1432			vap->iv_stats.is_rx_assoc_norate++;
1433			ieee80211_new_state(vap, IEEE80211_S_SCAN,
1434			    IEEE80211_SCAN_FAIL_STATUS);
1435			return;
1436		}
1437
1438		ni->ni_capinfo = capinfo;
1439		ni->ni_associd = associd;
1440		if (ni->ni_jointime == 0)
1441			ni->ni_jointime = time_uptime;
1442		if (wme != NULL &&
1443		    ieee80211_parse_wmeparams(vap, wme, wh) >= 0) {
1444			ni->ni_flags |= IEEE80211_NODE_QOS;
1445			ieee80211_wme_updateparams(vap);
1446		} else
1447			ni->ni_flags &= ~IEEE80211_NODE_QOS;
1448		/*
1449		 * Setup HT state according to the negotiation.
1450		 *
1451		 * NB: shouldn't need to check if HT use is enabled but some
1452		 *     ap's send back HT ie's even when we don't indicate we
1453		 *     are HT capable in our AssocReq.
1454		 */
1455		if (htcap != NULL && htinfo != NULL &&
1456		    (vap->iv_flags_ext & IEEE80211_FEXT_HT)) {
1457			ieee80211_ht_node_init(ni);
1458			ieee80211_ht_updateparams(ni, htcap, htinfo);
1459			ieee80211_setup_htrates(ni, htcap,
1460			     IEEE80211_F_JOIN | IEEE80211_F_DOBRS);
1461			ieee80211_setup_basic_htrates(ni, htinfo);
1462		}
1463		/*
1464		 * Configure state now that we are associated.
1465		 *
1466		 * XXX may need different/additional driver callbacks?
1467		 */
1468		if (IEEE80211_IS_CHAN_A(ic->ic_curchan) ||
1469		    (ni->ni_capinfo & IEEE80211_CAPINFO_SHORT_PREAMBLE)) {
1470			ic->ic_flags |= IEEE80211_F_SHPREAMBLE;
1471			ic->ic_flags &= ~IEEE80211_F_USEBARKER;
1472		} else {
1473			ic->ic_flags &= ~IEEE80211_F_SHPREAMBLE;
1474			ic->ic_flags |= IEEE80211_F_USEBARKER;
1475		}
1476		ieee80211_set_shortslottime(ic,
1477			IEEE80211_IS_CHAN_A(ic->ic_curchan) ||
1478			(ni->ni_capinfo & IEEE80211_CAPINFO_SHORT_SLOTTIME));
1479		/*
1480		 * Honor ERP protection.
1481		 *
1482		 * NB: ni_erp should zero for non-11g operation.
1483		 */
1484		if (IEEE80211_IS_CHAN_ANYG(ic->ic_curchan) &&
1485		    (ni->ni_erp & IEEE80211_ERP_USE_PROTECTION))
1486			ic->ic_flags |= IEEE80211_F_USEPROT;
1487		else
1488			ic->ic_flags &= ~IEEE80211_F_USEPROT;
1489		IEEE80211_NOTE_MAC(vap,
1490		    IEEE80211_MSG_ASSOC | IEEE80211_MSG_DEBUG, wh->i_addr2,
1491		    "%sassoc success at aid %d: %s preamble, %s slot time%s%s%s%s%s%s%s%s",
1492		    ISREASSOC(subtype) ? "re" : "",
1493		    IEEE80211_NODE_AID(ni),
1494		    ic->ic_flags&IEEE80211_F_SHPREAMBLE ? "short" : "long",
1495		    ic->ic_flags&IEEE80211_F_SHSLOT ? "short" : "long",
1496		    ic->ic_flags&IEEE80211_F_USEPROT ? ", protection" : "",
1497		    ni->ni_flags & IEEE80211_NODE_QOS ? ", QoS" : "",
1498		    ni->ni_flags & IEEE80211_NODE_HT ?
1499			(ni->ni_chw == 40 ? ", HT40" : ", HT20") : "",
1500		    ni->ni_flags & IEEE80211_NODE_AMPDU ? " (+AMPDU)" : "",
1501		    ni->ni_flags & IEEE80211_NODE_MIMO_RTS ? " (+SMPS-DYN)" :
1502			ni->ni_flags & IEEE80211_NODE_MIMO_PS ? " (+SMPS)" : "",
1503		    ni->ni_flags & IEEE80211_NODE_RIFS ? " (+RIFS)" : "",
1504		    IEEE80211_ATH_CAP(vap, ni, IEEE80211_NODE_FF) ?
1505			", fast-frames" : "",
1506		    IEEE80211_ATH_CAP(vap, ni, IEEE80211_NODE_TURBOP) ?
1507			", turbo" : ""
1508		);
1509		ieee80211_new_state(vap, IEEE80211_S_RUN, subtype);
1510		break;
1511	}
1512
1513	case IEEE80211_FC0_SUBTYPE_DEAUTH: {
1514		uint16_t reason;
1515
1516		if (vap->iv_state == IEEE80211_S_SCAN) {
1517			vap->iv_stats.is_rx_mgtdiscard++;
1518			return;
1519		}
1520		if (!IEEE80211_ADDR_EQ(wh->i_addr1, vap->iv_myaddr)) {
1521			/* NB: can happen when in promiscuous mode */
1522			vap->iv_stats.is_rx_mgtdiscard++;
1523			break;
1524		}
1525
1526		/*
1527		 * deauth frame format
1528		 *	[2] reason
1529		 */
1530		IEEE80211_VERIFY_LENGTH(efrm - frm, 2, return);
1531		reason = le16toh(*(uint16_t *)frm);
1532
1533		vap->iv_stats.is_rx_deauth++;
1534		vap->iv_stats.is_rx_deauth_code = reason;
1535		IEEE80211_NODE_STAT(ni, rx_deauth);
1536
1537		IEEE80211_NOTE(vap, IEEE80211_MSG_AUTH, ni,
1538		    "recv deauthenticate (reason %d)", reason);
1539		ieee80211_new_state(vap, IEEE80211_S_AUTH,
1540		    (reason << 8) | IEEE80211_FC0_SUBTYPE_DEAUTH);
1541		break;
1542	}
1543
1544	case IEEE80211_FC0_SUBTYPE_DISASSOC: {
1545		uint16_t reason;
1546
1547		if (vap->iv_state != IEEE80211_S_RUN &&
1548		    vap->iv_state != IEEE80211_S_ASSOC &&
1549		    vap->iv_state != IEEE80211_S_AUTH) {
1550			vap->iv_stats.is_rx_mgtdiscard++;
1551			return;
1552		}
1553		if (!IEEE80211_ADDR_EQ(wh->i_addr1, vap->iv_myaddr)) {
1554			/* NB: can happen when in promiscuous mode */
1555			vap->iv_stats.is_rx_mgtdiscard++;
1556			break;
1557		}
1558
1559		/*
1560		 * disassoc frame format
1561		 *	[2] reason
1562		 */
1563		IEEE80211_VERIFY_LENGTH(efrm - frm, 2, return);
1564		reason = le16toh(*(uint16_t *)frm);
1565
1566		vap->iv_stats.is_rx_disassoc++;
1567		vap->iv_stats.is_rx_disassoc_code = reason;
1568		IEEE80211_NODE_STAT(ni, rx_disassoc);
1569
1570		IEEE80211_NOTE(vap, IEEE80211_MSG_ASSOC, ni,
1571		    "recv disassociate (reason %d)", reason);
1572		ieee80211_new_state(vap, IEEE80211_S_ASSOC, 0);
1573		break;
1574	}
1575
1576	case IEEE80211_FC0_SUBTYPE_ACTION:
1577		if (vap->iv_state == IEEE80211_S_RUN) {
1578			if (ieee80211_parse_action(ni, m0) == 0)
1579				ic->ic_recv_action(ni, frm, efrm);
1580		} else
1581			vap->iv_stats.is_rx_mgtdiscard++;
1582		break;
1583
1584	case IEEE80211_FC0_SUBTYPE_PROBE_REQ:
1585	case IEEE80211_FC0_SUBTYPE_ASSOC_REQ:
1586	case IEEE80211_FC0_SUBTYPE_REASSOC_REQ:
1587		vap->iv_stats.is_rx_mgtdiscard++;
1588		return;
1589	default:
1590		IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
1591		     wh, "mgt", "subtype 0x%x not handled", subtype);
1592		vap->iv_stats.is_rx_badsubtype++;
1593		break;
1594	}
1595#undef ISREASSOC
1596#undef ISPROBE
1597}
1598