xref: /freebsd/contrib/wpa/src/fst/fst_session.c (revision 11b249f99e4d4891bd2a21ef796d40073ee15508)
1 /*
2  * FST module - FST Session implementation
3  * Copyright (c) 2014, Qualcomm Atheros, Inc.
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "common/defs.h"
14 #include "fst/fst_internal.h"
15 #include "fst/fst_defs.h"
16 #include "fst/fst_ctrl_iface.h"
17 #ifdef CONFIG_FST_TEST
18 #include "fst/fst_ctrl_defs.h"
19 #endif /* CONFIG_FST_TEST */
20 
21 #define US_80211_TU 1024
22 
23 #define US_TO_TU(m) ((m) * / US_80211_TU)
24 #define TU_TO_US(m) ((m) * US_80211_TU)
25 
26 #define FST_LLT_SWITCH_IMMEDIATELY 0
27 
28 #define fst_printf_session(s, level, format, ...) \
29 	fst_printf((level), "%u (0x%08x): [" MACSTR "," MACSTR "] :" format, \
30 		   (s)->id, (s)->data.fsts_id, \
31 		   MAC2STR((s)->data.old_peer_addr), \
32 		   MAC2STR((s)->data.new_peer_addr), \
33 		   ##__VA_ARGS__)
34 
35 #define fst_printf_siface(s, iface, level, format, ...) \
36 	fst_printf_session((s), (level), "%s: " format, \
37 			   fst_iface_get_name(iface), ##__VA_ARGS__)
38 
39 #define fst_printf_sframe(s, is_old, level, format, ...) \
40 	fst_printf_siface((s), \
41 		(is_old) ? (s)->data.old_iface : (s)->data.new_iface, \
42 		(level), format, ##__VA_ARGS__)
43 
44 #define FST_LLT_MS_DEFAULT 50
45 #define FST_ACTION_MAX_SUPPORTED   FST_ACTION_ON_CHANNEL_TUNNEL
46 
47 const char * const fst_action_names[] = {
48 	[FST_ACTION_SETUP_REQUEST]     = "Setup Request",
49 	[FST_ACTION_SETUP_RESPONSE]    = "Setup Response",
50 	[FST_ACTION_TEAR_DOWN]         = "Tear Down",
51 	[FST_ACTION_ACK_REQUEST]       = "Ack Request",
52 	[FST_ACTION_ACK_RESPONSE]      = "Ack Response",
53 	[FST_ACTION_ON_CHANNEL_TUNNEL] = "On Channel Tunnel",
54 };
55 
56 struct fst_session {
57 	struct {
58 		/* Session configuration that can be zeroed on reset */
59 		u8 old_peer_addr[ETH_ALEN];
60 		u8 new_peer_addr[ETH_ALEN];
61 		struct fst_iface *new_iface;
62 		struct fst_iface *old_iface;
63 		u32 llt_ms;
64 		u8 pending_setup_req_dlgt;
65 		u32 fsts_id; /* FSTS ID, see spec, 8.4.2.147
66 			      * Session Transition element */
67 	} data;
68 	/* Session object internal fields which won't be zeroed on reset */
69 	struct dl_list global_sessions_lentry;
70 	u32 id; /* Session object ID used to identify
71 		 * specific session object */
72 	struct fst_group *group;
73 	enum fst_session_state state;
74 	Boolean stt_armed;
75 };
76 
77 static struct dl_list global_sessions_list;
78 static u32 global_session_id = 0;
79 
80 #define foreach_fst_session(s) \
81 	dl_list_for_each((s), &global_sessions_list, \
82 			 struct fst_session, global_sessions_lentry)
83 
84 #define foreach_fst_session_safe(s, temp) \
85 	dl_list_for_each_safe((s), (temp), &global_sessions_list, \
86 			      struct fst_session, global_sessions_lentry)
87 
88 
89 static void fst_session_global_inc_id(void)
90 {
91 	global_session_id++;
92 	if (global_session_id == FST_INVALID_SESSION_ID)
93 		global_session_id++;
94 }
95 
96 
97 int fst_session_global_init(void)
98 {
99 	dl_list_init(&global_sessions_list);
100 	return 0;
101 }
102 
103 
104 void fst_session_global_deinit(void)
105 {
106 	WPA_ASSERT(dl_list_empty(&global_sessions_list));
107 }
108 
109 
110 static inline void fst_session_notify_ctrl(struct fst_session *s,
111 					   enum fst_event_type event_type,
112 					   union fst_event_extra *extra)
113 {
114 	foreach_fst_ctrl_call(on_event, event_type, NULL, s, extra);
115 }
116 
117 
118 static void fst_session_set_state(struct fst_session *s,
119 				  enum fst_session_state state,
120 				  union fst_session_state_switch_extra *extra)
121 {
122 	if (s->state != state) {
123 		union fst_event_extra evext = {
124 			.session_state = {
125 				.old_state = s->state,
126 				.new_state = state,
127 			},
128 		};
129 
130 		if (extra)
131 			evext.session_state.extra = *extra;
132 		fst_session_notify_ctrl(s, EVENT_FST_SESSION_STATE_CHANGED,
133 					&evext);
134 		fst_printf_session(s, MSG_INFO, "State: %s => %s",
135 				   fst_session_state_name(s->state),
136 				   fst_session_state_name(state));
137 		s->state = state;
138 	}
139 }
140 
141 
142 static u32 fst_find_free_session_id(void)
143 {
144 	u32 i, id = FST_INVALID_SESSION_ID;
145 	struct fst_session *s;
146 
147 	for (i = 0; i < (u32) -1; i++) {
148 		Boolean in_use = FALSE;
149 
150 		foreach_fst_session(s) {
151 			if (s->id == global_session_id) {
152 				fst_session_global_inc_id();
153 				in_use = TRUE;
154 				break;
155 			}
156 		}
157 		if (!in_use) {
158 			id = global_session_id;
159 			fst_session_global_inc_id();
160 			break;
161 		}
162 	}
163 
164 	return id;
165 }
166 
167 
168 static void fst_session_timeout_handler(void *eloop_data, void *user_ctx)
169 {
170 	struct fst_session *s = user_ctx;
171 	union fst_session_state_switch_extra extra = {
172 		.to_initial = {
173 			.reason = REASON_STT,
174 		},
175 	};
176 
177 	fst_printf_session(s, MSG_WARNING, "Session State Timeout");
178 	fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &extra);
179 }
180 
181 
182 static void fst_session_stt_arm(struct fst_session *s)
183 {
184 	eloop_register_timeout(0, TU_TO_US(FST_DEFAULT_SESSION_TIMEOUT_TU),
185 			       fst_session_timeout_handler, NULL, s);
186 	s->stt_armed = TRUE;
187 }
188 
189 
190 static void fst_session_stt_disarm(struct fst_session *s)
191 {
192 	if (s->stt_armed) {
193 		eloop_cancel_timeout(fst_session_timeout_handler, NULL, s);
194 		s->stt_armed = FALSE;
195 	}
196 }
197 
198 
199 static Boolean fst_session_is_in_transition(struct fst_session *s)
200 {
201 	/* See spec, 10.32.2.2  Transitioning between states */
202 	return s->stt_armed;
203 }
204 
205 
206 static int fst_session_is_in_progress(struct fst_session *s)
207 {
208 	return s->state != FST_SESSION_STATE_INITIAL;
209 }
210 
211 
212 static int fst_session_is_ready_pending(struct fst_session *s)
213 {
214 	return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
215 		fst_session_is_in_transition(s);
216 }
217 
218 
219 static int fst_session_is_ready(struct fst_session *s)
220 {
221 	return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
222 		!fst_session_is_in_transition(s);
223 }
224 
225 
226 static int fst_session_is_switch_requested(struct fst_session *s)
227 {
228 	return s->state == FST_SESSION_STATE_TRANSITION_DONE &&
229 		fst_session_is_in_transition(s);
230 }
231 
232 
233 static struct fst_session *
234 fst_find_session_in_progress(const u8 *peer_addr, struct fst_group *g)
235 {
236 	struct fst_session *s;
237 
238 	foreach_fst_session(s) {
239 		if (s->group == g &&
240 		    (os_memcmp(s->data.old_peer_addr, peer_addr,
241 			       ETH_ALEN) == 0 ||
242 		     os_memcmp(s->data.new_peer_addr, peer_addr,
243 			       ETH_ALEN) == 0) &&
244 		    fst_session_is_in_progress(s))
245 			return s;
246 	}
247 
248 	return NULL;
249 }
250 
251 
252 static void fst_session_reset_ex(struct fst_session *s, enum fst_reason reason)
253 {
254 	union fst_session_state_switch_extra evext = {
255 		.to_initial = {
256 			.reason = reason,
257 		},
258 	};
259 
260 	if (s->state == FST_SESSION_STATE_SETUP_COMPLETION ||
261 	    s->state == FST_SESSION_STATE_TRANSITION_DONE)
262 		fst_session_tear_down_setup(s);
263 	fst_session_stt_disarm(s);
264 	os_memset(&s->data, 0, sizeof(s->data));
265 	fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
266 }
267 
268 
269 static int fst_session_send_action(struct fst_session *s, Boolean old_iface,
270 				   const void *payload, size_t size,
271 				   const struct wpabuf *extra_buf)
272 {
273 	size_t len;
274 	int res;
275 	struct wpabuf *buf;
276 	u8 action;
277 	struct fst_iface *iface =
278 		old_iface ? s->data.old_iface : s->data.new_iface;
279 
280 	WPA_ASSERT(payload != NULL);
281 	WPA_ASSERT(size != 0);
282 
283 	action = *(const u8 *) payload;
284 
285 	WPA_ASSERT(action <= FST_ACTION_MAX_SUPPORTED);
286 
287 	if (!iface) {
288 		fst_printf_session(s, MSG_ERROR,
289 				   "no %s interface for FST Action '%s' sending",
290 				   old_iface ? "old" : "new",
291 				   fst_action_names[action]);
292 		return -1;
293 	}
294 
295 	len = sizeof(u8) /* category */ + size;
296 	if (extra_buf)
297 		len += wpabuf_size(extra_buf);
298 
299 	buf = wpabuf_alloc(len);
300 	if (!buf) {
301 		fst_printf_session(s, MSG_ERROR,
302 				   "cannot allocate buffer of %zu bytes for FST Action '%s' sending",
303 				   len, fst_action_names[action]);
304 		return -1;
305 	}
306 
307 	wpabuf_put_u8(buf, WLAN_ACTION_FST);
308 	wpabuf_put_data(buf, payload, size);
309 	if (extra_buf)
310 		wpabuf_put_buf(buf, extra_buf);
311 
312 	res = fst_iface_send_action(iface,
313 				    old_iface ? s->data.old_peer_addr :
314 				    s->data.new_peer_addr, buf);
315 	if (res < 0)
316 		fst_printf_siface(s, iface, MSG_ERROR,
317 				  "failed to send FST Action '%s'",
318 				  fst_action_names[action]);
319 	else
320 		fst_printf_siface(s, iface, MSG_DEBUG, "FST Action '%s' sent",
321 				  fst_action_names[action]);
322 	wpabuf_free(buf);
323 
324 	return res;
325 }
326 
327 
328 static int fst_session_send_tear_down(struct fst_session *s)
329 {
330 	struct fst_tear_down td;
331 	int res;
332 
333 	if (!fst_session_is_in_progress(s)) {
334 		fst_printf_session(s, MSG_ERROR, "No FST setup to tear down");
335 		return -1;
336 	}
337 
338 	WPA_ASSERT(s->data.old_iface != NULL);
339 	WPA_ASSERT(s->data.new_iface != NULL);
340 
341 	os_memset(&td, 0, sizeof(td));
342 
343 	td.action = FST_ACTION_TEAR_DOWN;
344 	td.fsts_id = host_to_le32(s->data.fsts_id);
345 
346 	res = fst_session_send_action(s, TRUE, &td, sizeof(td), NULL);
347 	if (!res)
348 		fst_printf_sframe(s, TRUE, MSG_INFO, "FST TearDown sent");
349 	else
350 		fst_printf_sframe(s, TRUE, MSG_ERROR,
351 				  "failed to send FST TearDown");
352 
353 	return res;
354 }
355 
356 
357 static void fst_session_handle_setup_request(struct fst_iface *iface,
358 					     const struct ieee80211_mgmt *mgmt,
359 					     size_t frame_len)
360 {
361 	struct fst_session *s;
362 	const struct fst_setup_req *req;
363 	struct fst_iface *new_iface = NULL;
364 	struct fst_group *g;
365 	u8 new_iface_peer_addr[ETH_ALEN];
366 	const struct wpabuf *peer_mbies;
367 	size_t plen;
368 
369 	if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req))  {
370 		fst_printf_iface(iface, MSG_WARNING,
371 				 "FST Request dropped: too short (%zu < %zu)",
372 				 frame_len,
373 				 IEEE80211_HDRLEN + 1 + sizeof(*req));
374 		return;
375 	}
376 	plen = frame_len - IEEE80211_HDRLEN - 1;
377 	req = (const struct fst_setup_req *)
378 		(((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
379 	if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION ||
380 	    req->stie.length < 11) {
381 		fst_printf_iface(iface, MSG_WARNING,
382 				 "FST Request dropped: invalid STIE");
383 		return;
384 	}
385 
386 	if (req->stie.new_band_id == req->stie.old_band_id) {
387 		fst_printf_iface(iface, MSG_WARNING,
388 				 "FST Request dropped: new and old band IDs are the same");
389 		return;
390 	}
391 
392 	g = fst_iface_get_group(iface);
393 
394 	if (plen > sizeof(*req)) {
395 		fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1),
396 				       plen - sizeof(*req));
397 		fst_printf_iface(iface, MSG_INFO,
398 				 "FST Request: MB IEs updated for " MACSTR,
399 				 MAC2STR(mgmt->sa));
400 	}
401 
402 	peer_mbies = fst_iface_get_peer_mb_ie(iface, mgmt->sa);
403 	if (peer_mbies) {
404 		new_iface = fst_group_get_new_iface_by_stie_and_mbie(
405 			g, wpabuf_head(peer_mbies), wpabuf_len(peer_mbies),
406 			&req->stie, new_iface_peer_addr);
407 		if (new_iface)
408 			fst_printf_iface(iface, MSG_INFO,
409 					 "FST Request: new iface (%s:" MACSTR
410 					 ") found by MB IEs",
411 					 fst_iface_get_name(new_iface),
412 					 MAC2STR(new_iface_peer_addr));
413 	}
414 
415 	if (!new_iface) {
416 		new_iface = fst_group_find_new_iface_by_stie(
417 			g, iface, mgmt->sa, &req->stie,
418 			new_iface_peer_addr);
419 		if (new_iface)
420 			fst_printf_iface(iface, MSG_INFO,
421 					 "FST Request: new iface (%s:" MACSTR
422 					 ") found by others",
423 					 fst_iface_get_name(new_iface),
424 					 MAC2STR(new_iface_peer_addr));
425 	}
426 
427 	if (!new_iface) {
428 		fst_printf_iface(iface, MSG_WARNING,
429 				 "FST Request dropped: new iface not found");
430 		return;
431 	}
432 
433 	s = fst_find_session_in_progress(mgmt->sa, g);
434 	if (s) {
435 		union fst_session_state_switch_extra evext = {
436 			.to_initial = {
437 				.reason = REASON_SETUP,
438 			},
439 		};
440 
441 		/*
442 		 * 10.32.2.2  Transitioning between states:
443 		 * Upon receipt of an FST Setup Request frame, the responder
444 		 * shall respond with an FST Setup Response frame unless it has
445 		 * a pending FST Setup Request frame addressed to the initiator
446 		 * and the responder has a numerically larger MAC address than
447 		 * the initiator’s MAC address, in which case, the responder
448 		 * shall delete the received FST Setup Request.
449 		 */
450 		if (os_memcmp(mgmt->da, mgmt->sa, ETH_ALEN) > 0) {
451 			fst_printf_session(s, MSG_WARNING,
452 					   "FST Request dropped due to MAC comparison (our MAC is "
453 					   MACSTR ")",
454 					   MAC2STR(mgmt->da));
455 			return;
456 		}
457 
458 		if (!fst_session_is_ready_pending(s)) {
459 			fst_printf_session(s, MSG_WARNING,
460 					   "FST Request from " MACSTR
461 					   " dropped due to inappropriate state %s",
462 					   MAC2STR(mgmt->da),
463 					   fst_session_state_name(s->state));
464 			return;
465 		}
466 
467 
468 		/*
469 		 * If FST Setup Request arrived with the same FSTS ID as one we
470 		 * initialized before, it means the other side either didn't
471 		 * receive our FST Request or skipped it for some reason (for
472 		 * example, due to numerical MAC comparison).
473 		 *
474 		 * In this case, there's no need to tear down the session.
475 		 * Moreover, as FSTS ID is the same, the other side will
476 		 * associate this tear down with the session it initiated that
477 		 * will break the sync.
478 		 */
479 		if (le_to_host32(req->stie.fsts_id) != s->data.fsts_id)
480 			fst_session_send_tear_down(s);
481 		else
482 			fst_printf_session(s, MSG_WARNING,
483 					   "Skipping TearDown as the FST request has the same FSTS ID as initiated");
484 		fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
485 		fst_session_stt_disarm(s);
486 		fst_printf_session(s, MSG_WARNING, "reset due to FST request");
487 	}
488 
489 	s = fst_session_create(g);
490 	if (!s) {
491 		fst_printf(MSG_WARNING,
492 			   "FST Request dropped: cannot create session for %s and %s",
493 			   fst_iface_get_name(iface),
494 			   fst_iface_get_name(new_iface));
495 		return;
496 	}
497 
498 	fst_session_set_iface(s, iface, TRUE);
499 	fst_session_set_peer_addr(s, mgmt->sa, TRUE);
500 	fst_session_set_iface(s, new_iface, FALSE);
501 	fst_session_set_peer_addr(s, new_iface_peer_addr, FALSE);
502 	fst_session_set_llt(s, FST_LLT_VAL_TO_MS(le_to_host32(req->llt)));
503 	s->data.pending_setup_req_dlgt = req->dialog_token;
504 	s->data.fsts_id = le_to_host32(req->stie.fsts_id);
505 
506 	fst_session_stt_arm(s);
507 
508 	fst_session_notify_ctrl(s, EVENT_FST_SETUP, NULL);
509 
510 	fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION, NULL);
511 }
512 
513 
514 static void fst_session_handle_setup_response(struct fst_session *s,
515 					      struct fst_iface *iface,
516 					      const struct ieee80211_mgmt *mgmt,
517 					      size_t frame_len)
518 {
519 	const struct fst_setup_res *res;
520 	size_t plen = frame_len - IEEE80211_HDRLEN - 1;
521 	enum hostapd_hw_mode hw_mode;
522 	u8 channel;
523 	union fst_session_state_switch_extra evext = {
524 		.to_initial = {0},
525 	};
526 
527 	if (iface != s->data.old_iface) {
528 		fst_printf_session(s, MSG_WARNING,
529 				   "FST Response dropped: %s is not the old iface",
530 				   fst_iface_get_name(iface));
531 		return;
532 	}
533 
534 	if (!fst_session_is_ready_pending(s)) {
535 		fst_printf_session(s, MSG_WARNING,
536 				   "FST Response dropped due to wrong state: %s",
537 				   fst_session_state_name(s->state));
538 		return;
539 	}
540 
541 	if (plen < sizeof(*res)) {
542 		fst_printf_session(s, MSG_WARNING,
543 				   "Too short FST Response dropped");
544 		return;
545 	}
546 	res = (const struct fst_setup_res *)
547 		(((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
548 	if (res->stie.element_id != WLAN_EID_SESSION_TRANSITION ||
549 	    res->stie.length < 11) {
550 		fst_printf_iface(iface, MSG_WARNING,
551 				 "FST Response dropped: invalid STIE");
552 		return;
553 	}
554 
555 	if (res->dialog_token != s->data.pending_setup_req_dlgt)  {
556 		fst_printf_session(s, MSG_WARNING,
557 				   "FST Response dropped due to wrong dialog token (%u != %u)",
558 				   s->data.pending_setup_req_dlgt,
559 				   res->dialog_token);
560 		return;
561 	}
562 
563 	if (res->status_code == WLAN_STATUS_SUCCESS &&
564 	    le_to_host32(res->stie.fsts_id) != s->data.fsts_id) {
565 		fst_printf_session(s, MSG_WARNING,
566 				   "FST Response dropped due to wrong FST Session ID (%u)",
567 				   le_to_host32(res->stie.fsts_id));
568 		return;
569 	}
570 
571 	fst_session_stt_disarm(s);
572 
573 	if (res->status_code != WLAN_STATUS_SUCCESS) {
574 		/*
575 		 * 10.32.2.2  Transitioning between states
576 		 * The initiator shall set the STT to the value of the
577 		 * FSTSessionTimeOut field at ... and at each ACK frame sent in
578 		 * response to a received FST Setup Response with the Status
579 		 * Code field equal to PENDING_ADMITTING_FST_SESSION or
580 		 * PENDING_GAP_IN_BA_WINDOW.
581 		 */
582 		evext.to_initial.reason = REASON_REJECT;
583 		evext.to_initial.reject_code = res->status_code;
584 		evext.to_initial.initiator = FST_INITIATOR_REMOTE;
585 		fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
586 		fst_printf_session(s, MSG_WARNING,
587 				   "FST Setup rejected by remote side with status %u",
588 				   res->status_code);
589 		return;
590 	}
591 
592 	fst_iface_get_channel_info(s->data.new_iface, &hw_mode, &channel);
593 
594 	if (fst_hw_mode_to_band(hw_mode) != res->stie.new_band_id) {
595 		evext.to_initial.reason = REASON_ERROR_PARAMS;
596 		fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
597 		fst_printf_session(s, MSG_WARNING,
598 				   "invalid FST Setup parameters");
599 		fst_session_tear_down_setup(s);
600 		return;
601 	}
602 
603 	fst_printf_session(s, MSG_INFO,
604 			   "%s: FST Setup established for %s (llt=%u)",
605 			   fst_iface_get_name(s->data.old_iface),
606 			   fst_iface_get_name(s->data.new_iface),
607 			   s->data.llt_ms);
608 
609 	fst_session_notify_ctrl(s, EVENT_FST_ESTABLISHED, NULL);
610 
611 	if (s->data.llt_ms == FST_LLT_SWITCH_IMMEDIATELY)
612 		fst_session_initiate_switch(s);
613 }
614 
615 
616 static void fst_session_handle_tear_down(struct fst_session *s,
617 					 struct fst_iface *iface,
618 					 const struct ieee80211_mgmt *mgmt,
619 					 size_t frame_len)
620 {
621 	const struct fst_tear_down *td;
622 	size_t plen = frame_len - IEEE80211_HDRLEN - 1;
623 	union fst_session_state_switch_extra evext = {
624 		.to_initial = {
625 			.reason = REASON_TEARDOWN,
626 			.initiator = FST_INITIATOR_REMOTE,
627 		},
628 	};
629 
630 	if (plen < sizeof(*td)) {
631 		fst_printf_session(s, MSG_WARNING,
632 				   "Too short FST Tear Down dropped");
633 		return;
634 	}
635 	td = (const struct fst_tear_down *)
636 		(((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
637 
638 	if (le_to_host32(td->fsts_id) != s->data.fsts_id) {
639 		fst_printf_siface(s, iface, MSG_WARNING,
640 				  "tear down for wrong FST Setup ID (%u)",
641 				  le_to_host32(td->fsts_id));
642 		return;
643 	}
644 
645 	fst_session_stt_disarm(s);
646 
647 	fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
648 }
649 
650 
651 static void fst_session_handle_ack_request(struct fst_session *s,
652 					   struct fst_iface *iface,
653 					   const struct ieee80211_mgmt *mgmt,
654 					   size_t frame_len)
655 {
656 	const struct fst_ack_req *req;
657 	size_t plen = frame_len - IEEE80211_HDRLEN - 1;
658 	struct fst_ack_res res;
659 	union fst_session_state_switch_extra evext = {
660 		.to_initial = {
661 			.reason = REASON_SWITCH,
662 			.initiator = FST_INITIATOR_REMOTE,
663 		},
664 	};
665 
666 	if (!fst_session_is_ready(s) && !fst_session_is_switch_requested(s)) {
667 		fst_printf_siface(s, iface, MSG_ERROR,
668 				  "cannot initiate switch due to wrong session state (%s)",
669 				  fst_session_state_name(s->state));
670 		return;
671 	}
672 
673 	WPA_ASSERT(s->data.new_iface != NULL);
674 
675 	if (iface != s->data.new_iface) {
676 		fst_printf_siface(s, iface, MSG_ERROR,
677 				  "Ack received on wrong interface");
678 		return;
679 	}
680 
681 	if (plen < sizeof(*req)) {
682 		fst_printf_session(s, MSG_WARNING,
683 				   "Too short FST Ack Request dropped");
684 		return;
685 	}
686 	req = (const struct fst_ack_req *)
687 		(((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
688 
689 	if (le_to_host32(req->fsts_id) != s->data.fsts_id) {
690 		fst_printf_siface(s, iface, MSG_WARNING,
691 				  "Ack for wrong FST Setup ID (%u)",
692 				  le_to_host32(req->fsts_id));
693 		return;
694 	}
695 
696 	os_memset(&res, 0, sizeof(res));
697 
698 	res.action = FST_ACTION_ACK_RESPONSE;
699 	res.dialog_token = req->dialog_token;
700 	res.fsts_id = req->fsts_id;
701 
702 	if (!fst_session_send_action(s, FALSE, &res, sizeof(res), NULL)) {
703 		fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Response sent");
704 		fst_session_stt_disarm(s);
705 		fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
706 				      NULL);
707 		fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED,
708 				      NULL);
709 		fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
710 	}
711 }
712 
713 
714 static void
715 fst_session_handle_ack_response(struct fst_session *s,
716 				struct fst_iface *iface,
717 				const struct ieee80211_mgmt *mgmt,
718 				size_t frame_len)
719 {
720 	const struct fst_ack_res *res;
721 	size_t plen = frame_len - IEEE80211_HDRLEN - 1;
722 	union fst_session_state_switch_extra evext = {
723 		.to_initial = {
724 			.reason = REASON_SWITCH,
725 			.initiator = FST_INITIATOR_LOCAL,
726 		},
727 	};
728 
729 	if (!fst_session_is_switch_requested(s)) {
730 		fst_printf_siface(s, iface, MSG_ERROR,
731 				  "Ack Response in inappropriate session state (%s)",
732 				  fst_session_state_name(s->state));
733 		return;
734 	}
735 
736 	WPA_ASSERT(s->data.new_iface != NULL);
737 
738 	if (iface != s->data.new_iface) {
739 		fst_printf_siface(s, iface, MSG_ERROR,
740 				  "Ack response received on wrong interface");
741 		return;
742 	}
743 
744 	if (plen < sizeof(*res)) {
745 		fst_printf_session(s, MSG_WARNING,
746 				   "Too short FST Ack Response dropped");
747 		return;
748 	}
749 	res = (const struct fst_ack_res *)
750 		(((const u8 *) mgmt) + IEEE80211_HDRLEN + 1);
751 
752 	if (le_to_host32(res->fsts_id) != s->data.fsts_id) {
753 		fst_printf_siface(s, iface, MSG_ERROR,
754 				  "Ack response for wrong FST Setup ID (%u)",
755 				  le_to_host32(res->fsts_id));
756 		return;
757 	}
758 
759 	fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED, NULL);
760 	fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
761 
762 	fst_session_stt_disarm(s);
763 }
764 
765 
766 struct fst_session * fst_session_create(struct fst_group *g)
767 {
768 	struct fst_session *s;
769 	u32 id;
770 
771 	WPA_ASSERT(!is_zero_ether_addr(own_addr));
772 
773 	id = fst_find_free_session_id();
774 	if (id == FST_INVALID_SESSION_ID) {
775 		fst_printf(MSG_ERROR, "Cannot assign new session ID");
776 		return NULL;
777 	}
778 
779 	s = os_zalloc(sizeof(*s));
780 	if (!s) {
781 		fst_printf(MSG_ERROR, "Cannot allocate new session object");
782 		return NULL;
783 	}
784 
785 	s->id = id;
786 	s->group = g;
787 	s->state = FST_SESSION_STATE_INITIAL;
788 
789 	s->data.llt_ms = FST_LLT_MS_DEFAULT;
790 
791 	fst_printf(MSG_INFO, "Session %u created", s->id);
792 
793 	dl_list_add_tail(&global_sessions_list, &s->global_sessions_lentry);
794 
795 	foreach_fst_ctrl_call(on_session_added, s);
796 
797 	return s;
798 }
799 
800 
801 void fst_session_set_iface(struct fst_session *s, struct fst_iface *iface,
802 			   Boolean is_old)
803 {
804 	if (is_old)
805 		s->data.old_iface = iface;
806 	else
807 		s->data.new_iface = iface;
808 
809 }
810 
811 
812 void fst_session_set_llt(struct fst_session *s, u32 llt)
813 {
814 	s->data.llt_ms = llt;
815 }
816 
817 
818 void fst_session_set_peer_addr(struct fst_session *s, const u8 *addr,
819 			       Boolean is_old)
820 {
821 	u8 *a = is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
822 
823 	os_memcpy(a, addr, ETH_ALEN);
824 }
825 
826 
827 int fst_session_initiate_setup(struct fst_session *s)
828 {
829 	struct fst_setup_req req;
830 	int res;
831 	u32 fsts_id;
832 	u8 dialog_token;
833 	struct fst_session *_s;
834 
835 	if (fst_session_is_in_progress(s)) {
836 		fst_printf_session(s, MSG_ERROR, "Session in progress");
837 		return -EINVAL;
838 	}
839 
840 	if (is_zero_ether_addr(s->data.old_peer_addr)) {
841 		fst_printf_session(s, MSG_ERROR, "No old peer MAC address");
842 		return -EINVAL;
843 	}
844 
845 	if (is_zero_ether_addr(s->data.new_peer_addr)) {
846 		fst_printf_session(s, MSG_ERROR, "No new peer MAC address");
847 		return -EINVAL;
848 	}
849 
850 	if (!s->data.old_iface) {
851 		fst_printf_session(s, MSG_ERROR, "No old interface defined");
852 		return -EINVAL;
853 	}
854 
855 	if (!s->data.new_iface) {
856 		fst_printf_session(s, MSG_ERROR, "No new interface defined");
857 		return -EINVAL;
858 	}
859 
860 	if (s->data.new_iface == s->data.old_iface) {
861 		fst_printf_session(s, MSG_ERROR,
862 				   "Same interface set as old and new");
863 		return -EINVAL;
864 	}
865 
866 	if (!fst_iface_is_connected(s->data.old_iface, s->data.old_peer_addr)) {
867 		fst_printf_session(s, MSG_ERROR,
868 				   "The preset old peer address is not connected");
869 		return -EINVAL;
870 	}
871 
872 	if (!fst_iface_is_connected(s->data.new_iface, s->data.new_peer_addr)) {
873 		fst_printf_session(s, MSG_ERROR,
874 				   "The preset new peer address is not connected");
875 		return -EINVAL;
876 	}
877 
878 	_s = fst_find_session_in_progress(s->data.old_peer_addr, s->group);
879 	if (_s) {
880 		fst_printf_session(s, MSG_ERROR,
881 				   "There is another session in progress (old): %u",
882 				   _s->id);
883 		return -EINVAL;
884 	}
885 
886 	_s = fst_find_session_in_progress(s->data.new_peer_addr, s->group);
887 	if (_s) {
888 		fst_printf_session(s, MSG_ERROR,
889 				   "There is another session in progress (new): %u",
890 				   _s->id);
891 		return -EINVAL;
892 	}
893 
894 	dialog_token = fst_group_assign_dialog_token(s->group);
895 	fsts_id = fst_group_assign_fsts_id(s->group);
896 
897 	os_memset(&req, 0, sizeof(req));
898 
899 	fst_printf_siface(s, s->data.old_iface, MSG_INFO,
900 		"initiating FST setup for %s (llt=%u ms)",
901 		fst_iface_get_name(s->data.new_iface), s->data.llt_ms);
902 
903 	req.action = FST_ACTION_SETUP_REQUEST;
904 	req.dialog_token = dialog_token;
905 	req.llt = host_to_le32(FST_LLT_MS_TO_VAL(s->data.llt_ms));
906 	/* 8.4.2.147 Session Transition element */
907 	req.stie.element_id = WLAN_EID_SESSION_TRANSITION;
908 	req.stie.length = sizeof(req.stie) - 2;
909 	req.stie.fsts_id = host_to_le32(fsts_id);
910 	req.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
911 
912 	req.stie.new_band_id = fst_iface_get_band_id(s->data.new_iface);
913 	req.stie.new_band_op = 1;
914 	req.stie.new_band_setup = 0;
915 
916 	req.stie.old_band_id = fst_iface_get_band_id(s->data.old_iface);
917 	req.stie.old_band_op = 1;
918 	req.stie.old_band_setup = 0;
919 
920 	res = fst_session_send_action(s, TRUE, &req, sizeof(req),
921 				      fst_iface_get_mbie(s->data.old_iface));
922 	if (!res) {
923 		s->data.fsts_id = fsts_id;
924 		s->data.pending_setup_req_dlgt = dialog_token;
925 		fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Request sent");
926 		fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION,
927 				      NULL);
928 
929 		fst_session_stt_arm(s);
930 	}
931 
932 	return res;
933 }
934 
935 
936 int fst_session_respond(struct fst_session *s, u8 status_code)
937 {
938 	struct fst_setup_res res;
939 	enum hostapd_hw_mode hw_mode;
940 	u8 channel;
941 
942 	if (!fst_session_is_ready_pending(s)) {
943 		fst_printf_session(s, MSG_ERROR, "incorrect state: %s",
944 				   fst_session_state_name(s->state));
945 		return -EINVAL;
946 	}
947 
948 	if (is_zero_ether_addr(s->data.old_peer_addr)) {
949 		fst_printf_session(s, MSG_ERROR, "No peer MAC address");
950 		return -EINVAL;
951 	}
952 
953 	if (!s->data.old_iface) {
954 		fst_printf_session(s, MSG_ERROR, "No old interface defined");
955 		return -EINVAL;
956 	}
957 
958 	if (!s->data.new_iface) {
959 		fst_printf_session(s, MSG_ERROR, "No new interface defined");
960 		return -EINVAL;
961 	}
962 
963 	if (s->data.new_iface == s->data.old_iface) {
964 		fst_printf_session(s, MSG_ERROR,
965 				   "Same interface set as old and new");
966 		return -EINVAL;
967 	}
968 
969 	if (!fst_iface_is_connected(s->data.old_iface, s->data.old_peer_addr)) {
970 		fst_printf_session(s, MSG_ERROR,
971 				   "The preset peer address is not in the peer list");
972 		return -EINVAL;
973 	}
974 
975 	fst_session_stt_disarm(s);
976 
977 	os_memset(&res, 0, sizeof(res));
978 
979 	res.action = FST_ACTION_SETUP_RESPONSE;
980 	res.dialog_token = s->data.pending_setup_req_dlgt;
981 	res.status_code = status_code;
982 
983 	res.stie.element_id = WLAN_EID_SESSION_TRANSITION;
984 	res.stie.length = sizeof(res.stie) - 2;
985 
986 	if (status_code == WLAN_STATUS_SUCCESS) {
987 		res.stie.fsts_id = s->data.fsts_id;
988 		res.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
989 
990 		fst_iface_get_channel_info(s->data.new_iface, &hw_mode,
991 					   &channel);
992 		res.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
993 		res.stie.new_band_op = 1;
994 		res.stie.new_band_setup = 0;
995 
996 		fst_iface_get_channel_info(s->data.old_iface, &hw_mode,
997 					   &channel);
998 		res.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
999 		res.stie.old_band_op = 1;
1000 		res.stie.old_band_setup = 0;
1001 
1002 		fst_printf_session(s, MSG_INFO,
1003 				   "%s: FST Setup Request accepted for %s (llt=%u)",
1004 				   fst_iface_get_name(s->data.old_iface),
1005 				   fst_iface_get_name(s->data.new_iface),
1006 				   s->data.llt_ms);
1007 	} else {
1008 		fst_printf_session(s, MSG_WARNING,
1009 				   "%s: FST Setup Request rejected with code %d",
1010 				   fst_iface_get_name(s->data.old_iface),
1011 				   status_code);
1012 	}
1013 
1014 	if (fst_session_send_action(s, TRUE, &res, sizeof(res),
1015 				    fst_iface_get_mbie(s->data.old_iface))) {
1016 		fst_printf_sframe(s, TRUE, MSG_ERROR,
1017 				  "cannot send FST Setup Response with code %d",
1018 				  status_code);
1019 		return -EINVAL;
1020 	}
1021 
1022 	fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Response sent");
1023 
1024 	if (status_code != WLAN_STATUS_SUCCESS) {
1025 		union fst_session_state_switch_extra evext = {
1026 			.to_initial = {
1027 				.reason = REASON_REJECT,
1028 				.reject_code = status_code,
1029 				.initiator = FST_INITIATOR_LOCAL,
1030 			},
1031 		};
1032 		fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
1033 	}
1034 
1035 	return 0;
1036 }
1037 
1038 
1039 int fst_session_initiate_switch(struct fst_session *s)
1040 {
1041 	struct fst_ack_req req;
1042 	int res;
1043 	u8 dialog_token;
1044 
1045 	if (!fst_session_is_ready(s)) {
1046 		fst_printf_session(s, MSG_ERROR,
1047 				   "cannot initiate switch due to wrong setup state (%d)",
1048 				   s->state);
1049 		return -1;
1050 	}
1051 
1052 	dialog_token = fst_group_assign_dialog_token(s->group);
1053 
1054 	WPA_ASSERT(s->data.new_iface != NULL);
1055 	WPA_ASSERT(s->data.old_iface != NULL);
1056 
1057 	fst_printf_session(s, MSG_INFO, "initiating FST switch: %s => %s",
1058 			   fst_iface_get_name(s->data.old_iface),
1059 			   fst_iface_get_name(s->data.new_iface));
1060 
1061 	os_memset(&req, 0, sizeof(req));
1062 
1063 	req.action = FST_ACTION_ACK_REQUEST;
1064 	req.dialog_token = dialog_token;
1065 	req.fsts_id = host_to_le32(s->data.fsts_id);
1066 
1067 	res = fst_session_send_action(s, FALSE, &req, sizeof(req), NULL);
1068 	if (!res) {
1069 		fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Request sent");
1070 		fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
1071 				      NULL);
1072 		fst_session_stt_arm(s);
1073 	} else {
1074 		fst_printf_sframe(s, FALSE, MSG_ERROR,
1075 				  "Cannot send FST Ack Request");
1076 	}
1077 
1078 	return res;
1079 }
1080 
1081 
1082 void fst_session_handle_action(struct fst_session *s,
1083 			       struct fst_iface *iface,
1084 			       const struct ieee80211_mgmt *mgmt,
1085 			       size_t frame_len)
1086 {
1087 	switch (mgmt->u.action.u.fst_action.action) {
1088 	case FST_ACTION_SETUP_REQUEST:
1089 		WPA_ASSERT(0);
1090 		break;
1091 	case FST_ACTION_SETUP_RESPONSE:
1092 		fst_session_handle_setup_response(s, iface, mgmt, frame_len);
1093 		break;
1094 	case FST_ACTION_TEAR_DOWN:
1095 		fst_session_handle_tear_down(s, iface, mgmt, frame_len);
1096 		break;
1097 	case FST_ACTION_ACK_REQUEST:
1098 		fst_session_handle_ack_request(s, iface, mgmt, frame_len);
1099 		break;
1100 	case FST_ACTION_ACK_RESPONSE:
1101 		fst_session_handle_ack_response(s, iface, mgmt, frame_len);
1102 		break;
1103 	case FST_ACTION_ON_CHANNEL_TUNNEL:
1104 	default:
1105 		fst_printf_sframe(s, FALSE, MSG_ERROR,
1106 				  "Unsupported FST Action frame");
1107 		break;
1108 	}
1109 }
1110 
1111 
1112 int fst_session_tear_down_setup(struct fst_session *s)
1113 {
1114 	int res;
1115 	union fst_session_state_switch_extra evext = {
1116 		.to_initial = {
1117 			.reason = REASON_TEARDOWN,
1118 			.initiator = FST_INITIATOR_LOCAL,
1119 		},
1120 	};
1121 
1122 	res = fst_session_send_tear_down(s);
1123 
1124 	fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
1125 
1126 	return res;
1127 }
1128 
1129 
1130 void fst_session_reset(struct fst_session *s)
1131 {
1132 	fst_session_reset_ex(s, REASON_RESET);
1133 }
1134 
1135 
1136 void fst_session_delete(struct fst_session *s)
1137 {
1138 	fst_printf(MSG_INFO, "Session %u deleted", s->id);
1139 	dl_list_del(&s->global_sessions_lentry);
1140 	foreach_fst_ctrl_call(on_session_removed, s);
1141 	os_free(s);
1142 }
1143 
1144 
1145 struct fst_group * fst_session_get_group(struct fst_session *s)
1146 {
1147 	return s->group;
1148 }
1149 
1150 
1151 struct fst_iface * fst_session_get_iface(struct fst_session *s, Boolean is_old)
1152 {
1153 	return is_old ? s->data.old_iface : s->data.new_iface;
1154 }
1155 
1156 
1157 u32 fst_session_get_id(struct fst_session *s)
1158 {
1159 	return s->id;
1160 }
1161 
1162 
1163 const u8 * fst_session_get_peer_addr(struct fst_session *s, Boolean is_old)
1164 {
1165 	return is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
1166 }
1167 
1168 
1169 u32 fst_session_get_llt(struct fst_session *s)
1170 {
1171 	return s->data.llt_ms;
1172 }
1173 
1174 
1175 enum fst_session_state fst_session_get_state(struct fst_session *s)
1176 {
1177 	return s->state;
1178 }
1179 
1180 
1181 struct fst_session * fst_session_get_by_id(u32 id)
1182 {
1183 	struct fst_session *s;
1184 
1185 	foreach_fst_session(s) {
1186 		if (id == s->id)
1187 			return s;
1188 	}
1189 
1190 	return NULL;
1191 }
1192 
1193 
1194 void fst_session_enum(struct fst_group *g, fst_session_enum_clb clb, void *ctx)
1195 {
1196 	struct fst_session *s;
1197 
1198 	foreach_fst_session(s) {
1199 		if (!g || s->group == g)
1200 			clb(s->group, s, ctx);
1201 	}
1202 }
1203 
1204 
1205 void fst_session_on_action_rx(struct fst_iface *iface,
1206 			      const struct ieee80211_mgmt *mgmt,
1207 			      size_t len)
1208 {
1209 	struct fst_session *s;
1210 
1211 	if (len < IEEE80211_HDRLEN + 2 ||
1212 	    mgmt->u.action.category != WLAN_ACTION_FST) {
1213 		fst_printf_iface(iface, MSG_ERROR,
1214 				 "invalid Action frame received");
1215 		return;
1216 	}
1217 
1218 	if (mgmt->u.action.u.fst_action.action <= FST_ACTION_MAX_SUPPORTED) {
1219 		fst_printf_iface(iface, MSG_DEBUG,
1220 				 "FST Action '%s' received!",
1221 				 fst_action_names[mgmt->u.action.u.fst_action.action]);
1222 	} else {
1223 		fst_printf_iface(iface, MSG_WARNING,
1224 				 "unknown FST Action (%u) received!",
1225 				 mgmt->u.action.u.fst_action.action);
1226 		return;
1227 	}
1228 
1229 	if (mgmt->u.action.u.fst_action.action == FST_ACTION_SETUP_REQUEST) {
1230 		fst_session_handle_setup_request(iface, mgmt, len);
1231 		return;
1232 	}
1233 
1234 	s = fst_find_session_in_progress(mgmt->sa, fst_iface_get_group(iface));
1235 	if (s) {
1236 		fst_session_handle_action(s, iface, mgmt, len);
1237 	} else {
1238 		fst_printf_iface(iface, MSG_WARNING,
1239 				 "FST Action '%s' dropped: no session in progress found",
1240 				 fst_action_names[mgmt->u.action.u.fst_action.action]);
1241 	}
1242 }
1243 
1244 
1245 int fst_session_set_str_ifname(struct fst_session *s, const char *ifname,
1246 			       Boolean is_old)
1247 {
1248 	struct fst_group *g = fst_session_get_group(s);
1249 	struct fst_iface *i;
1250 
1251 	i = fst_group_get_iface_by_name(g, ifname);
1252 	if (!i) {
1253 		fst_printf_session(s, MSG_WARNING,
1254 				   "Cannot set iface %s: no such iface within group '%s'",
1255 				   ifname, fst_group_get_id(g));
1256 		return -1;
1257 	}
1258 
1259 	fst_session_set_iface(s, i, is_old);
1260 
1261 	return 0;
1262 }
1263 
1264 
1265 int fst_session_set_str_peer_addr(struct fst_session *s, const char *mac,
1266 				  Boolean is_old)
1267 {
1268 	u8 peer_addr[ETH_ALEN];
1269 	int res = fst_read_peer_addr(mac, peer_addr);
1270 
1271 	if (res)
1272 		return res;
1273 
1274 	fst_session_set_peer_addr(s, peer_addr, is_old);
1275 
1276 	return 0;
1277 }
1278 
1279 
1280 int fst_session_set_str_llt(struct fst_session *s, const char *llt_str)
1281 {
1282 	char *endp;
1283 	long int llt = strtol(llt_str, &endp, 0);
1284 
1285 	if (*endp || llt < 0 || (unsigned long int) llt > FST_MAX_LLT_MS) {
1286 		fst_printf_session(s, MSG_WARNING,
1287 				   "Cannot set llt %s: Invalid llt value (1..%u expected)",
1288 				   llt_str, FST_MAX_LLT_MS);
1289 		return -1;
1290 	}
1291 	fst_session_set_llt(s, (u32) llt);
1292 
1293 	return 0;
1294 }
1295 
1296 
1297 void fst_session_global_on_iface_detached(struct fst_iface *iface)
1298 {
1299 	struct fst_session *s;
1300 
1301 	foreach_fst_session(s) {
1302 		if (fst_session_is_in_progress(s) &&
1303 		    (s->data.new_iface == iface ||
1304 		     s->data.old_iface == iface))
1305 			fst_session_reset_ex(s, REASON_DETACH_IFACE);
1306 	}
1307 }
1308 
1309 
1310 struct fst_session * fst_session_global_get_first_by_group(struct fst_group *g)
1311 {
1312 	struct fst_session *s;
1313 
1314 	foreach_fst_session(s) {
1315 		if (s->group == g)
1316 			return s;
1317 	}
1318 
1319 	return NULL;
1320 }
1321 
1322 
1323 #ifdef CONFIG_FST_TEST
1324 
1325 static int get_group_fill_session(struct fst_group **g, struct fst_session *s)
1326 {
1327 	const u8 *old_addr, *new_addr;
1328 	struct fst_get_peer_ctx *ctx;
1329 
1330 	os_memset(s, 0, sizeof(*s));
1331 	foreach_fst_group(*g) {
1332 		s->data.new_iface = fst_group_first_iface(*g);
1333 		if (s->data.new_iface)
1334 			break;
1335 	}
1336 	if (!s->data.new_iface)
1337 		return -EINVAL;
1338 
1339 	s->data.old_iface = dl_list_entry(s->data.new_iface->group_lentry.next,
1340 					  struct fst_iface, group_lentry);
1341 	if (!s->data.old_iface)
1342 		return -EINVAL;
1343 
1344 	old_addr = fst_iface_get_peer_first(s->data.old_iface, &ctx, TRUE);
1345 	if (!old_addr)
1346 		return -EINVAL;
1347 
1348 	new_addr = fst_iface_get_peer_first(s->data.new_iface, &ctx, TRUE);
1349 	if (!new_addr)
1350 		return -EINVAL;
1351 
1352 	os_memcpy(s->data.old_peer_addr, old_addr, ETH_ALEN);
1353 	os_memcpy(s->data.new_peer_addr, new_addr, ETH_ALEN);
1354 
1355 	return 0;
1356 }
1357 
1358 
1359 #define FST_MAX_COMMAND_WORD_NAME_LENGTH 16
1360 
1361 int fst_test_req_send_fst_request(const char *params)
1362 {
1363 	int fsts_id;
1364 	Boolean is_valid;
1365 	char *endp;
1366 	struct fst_setup_req req;
1367 	struct fst_session s;
1368 	struct fst_group *g;
1369 	enum hostapd_hw_mode hw_mode;
1370 	u8 channel;
1371 	char additional_param[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1372 
1373 	if (params[0] != ' ')
1374 		return -EINVAL;
1375 	params++;
1376 	fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1377 	if (!is_valid)
1378 		return -EINVAL;
1379 
1380 	if (get_group_fill_session(&g, &s))
1381 		return -EINVAL;
1382 
1383 	req.action = FST_ACTION_SETUP_REQUEST;
1384 	req.dialog_token = g->dialog_token;
1385 	req.llt = host_to_le32(FST_LLT_MS_DEFAULT);
1386 	/* 8.4.2.147 Session Transition element */
1387 	req.stie.element_id = WLAN_EID_SESSION_TRANSITION;
1388 	req.stie.length = sizeof(req.stie) - 2;
1389 	req.stie.fsts_id = host_to_le32(fsts_id);
1390 	req.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
1391 
1392 	fst_iface_get_channel_info(s.data.new_iface, &hw_mode, &channel);
1393 	req.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
1394 	req.stie.new_band_op = 1;
1395 	req.stie.new_band_setup = 0;
1396 
1397 	fst_iface_get_channel_info(s.data.old_iface, &hw_mode, &channel);
1398 	req.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
1399 	req.stie.old_band_op = 1;
1400 	req.stie.old_band_setup = 0;
1401 
1402 	if (!fst_read_next_text_param(endp, additional_param,
1403 				       sizeof(additional_param), &endp)) {
1404 		if (!os_strcasecmp(additional_param, FST_CTR_PVAL_BAD_NEW_BAND))
1405 			req.stie.new_band_id = req.stie.old_band_id;
1406 	}
1407 
1408 	return fst_session_send_action(&s, TRUE, &req, sizeof(req),
1409 				       s.data.old_iface->mb_ie);
1410 }
1411 
1412 
1413 int fst_test_req_send_fst_response(const char *params)
1414 {
1415 	int fsts_id;
1416 	Boolean is_valid;
1417 	char *endp;
1418 	struct fst_setup_res res;
1419 	struct fst_session s;
1420 	struct fst_group *g;
1421 	enum hostapd_hw_mode hw_mode;
1422 	u8 status_code;
1423 	u8 channel;
1424 	char response[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1425 	struct fst_session *_s;
1426 
1427 	if (params[0] != ' ')
1428 		return -EINVAL;
1429 	params++;
1430 	fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1431 	if (!is_valid)
1432 		return -EINVAL;
1433 
1434 	if (get_group_fill_session(&g, &s))
1435 		return -EINVAL;
1436 
1437 	status_code = WLAN_STATUS_SUCCESS;
1438 	if (!fst_read_next_text_param(endp, response, sizeof(response),
1439 				      &endp)) {
1440 		if (!os_strcasecmp(response, FST_CS_PVAL_RESPONSE_REJECT))
1441 			status_code = WLAN_STATUS_PENDING_ADMITTING_FST_SESSION;
1442 	}
1443 
1444 	os_memset(&res, 0, sizeof(res));
1445 
1446 	res.action = FST_ACTION_SETUP_RESPONSE;
1447 	/*
1448 	 * If some session has just received an FST Setup Request, then
1449 	 * use the correct dialog token copied from this request.
1450 	 */
1451 	_s = fst_find_session_in_progress(fst_session_get_peer_addr(&s, TRUE),
1452 					  g);
1453 	res.dialog_token = (_s && fst_session_is_ready_pending(_s)) ?
1454 		_s->data.pending_setup_req_dlgt : g->dialog_token;
1455 	res.status_code  = status_code;
1456 
1457 	res.stie.element_id = WLAN_EID_SESSION_TRANSITION;
1458 	res.stie.length = sizeof(res.stie) - 2;
1459 
1460 	if (res.status_code == WLAN_STATUS_SUCCESS) {
1461 		res.stie.fsts_id = fsts_id;
1462 		res.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
1463 
1464 		fst_iface_get_channel_info(s.data.new_iface, &hw_mode,
1465 					    &channel);
1466 		res.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
1467 		res.stie.new_band_op = 1;
1468 		res.stie.new_band_setup = 0;
1469 
1470 		fst_iface_get_channel_info(s.data.old_iface, &hw_mode,
1471 					   &channel);
1472 		res.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
1473 		res.stie.old_band_op = 1;
1474 		res.stie.old_band_setup = 0;
1475 	}
1476 
1477 	if (!fst_read_next_text_param(endp, response, sizeof(response),
1478 				      &endp)) {
1479 		if (!os_strcasecmp(response, FST_CTR_PVAL_BAD_NEW_BAND))
1480 			res.stie.new_band_id = res.stie.old_band_id;
1481 	}
1482 
1483 	return fst_session_send_action(&s, TRUE, &res, sizeof(res),
1484 				       s.data.old_iface->mb_ie);
1485 }
1486 
1487 
1488 int fst_test_req_send_ack_request(const char *params)
1489 {
1490 	int fsts_id;
1491 	Boolean is_valid;
1492 	char *endp;
1493 	struct fst_ack_req req;
1494 	struct fst_session s;
1495 	struct fst_group *g;
1496 
1497 	if (params[0] != ' ')
1498 		return -EINVAL;
1499 	params++;
1500 	fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1501 	if (!is_valid)
1502 		return -EINVAL;
1503 
1504 	if (get_group_fill_session(&g, &s))
1505 		return -EINVAL;
1506 
1507 	os_memset(&req, 0, sizeof(req));
1508 	req.action = FST_ACTION_ACK_REQUEST;
1509 	req.dialog_token = g->dialog_token;
1510 	req.fsts_id = fsts_id;
1511 
1512 	return fst_session_send_action(&s, FALSE, &req, sizeof(req), NULL);
1513 }
1514 
1515 
1516 int fst_test_req_send_ack_response(const char *params)
1517 {
1518 	int fsts_id;
1519 	Boolean is_valid;
1520 	char *endp;
1521 	struct fst_ack_res res;
1522 	struct fst_session s;
1523 	struct fst_group *g;
1524 
1525 	if (params[0] != ' ')
1526 		return -EINVAL;
1527 	params++;
1528 	fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1529 	if (!is_valid)
1530 		return -EINVAL;
1531 
1532 	if (get_group_fill_session(&g, &s))
1533 		return -EINVAL;
1534 
1535 	os_memset(&res, 0, sizeof(res));
1536 	res.action = FST_ACTION_ACK_RESPONSE;
1537 	res.dialog_token = g->dialog_token;
1538 	res.fsts_id = fsts_id;
1539 
1540 	return fst_session_send_action(&s, FALSE, &res, sizeof(res), NULL);
1541 }
1542 
1543 
1544 int fst_test_req_send_tear_down(const char *params)
1545 {
1546 	int fsts_id;
1547 	Boolean is_valid;
1548 	char *endp;
1549 	struct fst_tear_down td;
1550 	struct fst_session s;
1551 	struct fst_group *g;
1552 
1553 	if (params[0] != ' ')
1554 		return -EINVAL;
1555 	params++;
1556 	fsts_id = fst_read_next_int_param(params, &is_valid, &endp);
1557 	if (!is_valid)
1558 		return -EINVAL;
1559 
1560 	if (get_group_fill_session(&g, &s))
1561 		return -EINVAL;
1562 
1563 	os_memset(&td, 0, sizeof(td));
1564 	td.action = FST_ACTION_TEAR_DOWN;
1565 	td.fsts_id = fsts_id;
1566 
1567 	return fst_session_send_action(&s, TRUE, &td, sizeof(td), NULL);
1568 }
1569 
1570 
1571 u32 fst_test_req_get_fsts_id(const char *params)
1572 {
1573 	int sid;
1574 	Boolean is_valid;
1575 	char *endp;
1576 	struct fst_session *s;
1577 
1578 	if (params[0] != ' ')
1579 		return FST_FSTS_ID_NOT_FOUND;
1580 	params++;
1581 	sid = fst_read_next_int_param(params, &is_valid, &endp);
1582 	if (!is_valid)
1583 		return FST_FSTS_ID_NOT_FOUND;
1584 
1585 	s = fst_session_get_by_id(sid);
1586 	if (!s)
1587 		return FST_FSTS_ID_NOT_FOUND;
1588 
1589 	return s->data.fsts_id;
1590 }
1591 
1592 
1593 int fst_test_req_get_local_mbies(const char *request, char *buf, size_t buflen)
1594 {
1595 	char *endp;
1596 	char ifname[FST_MAX_COMMAND_WORD_NAME_LENGTH];
1597 	struct fst_group *g;
1598 	struct fst_iface *iface;
1599 
1600 	if (request[0] != ' ')
1601 		return -EINVAL;
1602 	request++;
1603 	if (fst_read_next_text_param(request, ifname, sizeof(ifname), &endp) ||
1604 	    !*ifname)
1605 		goto problem;
1606 	g = dl_list_first(&fst_global_groups_list, struct fst_group,
1607 			  global_groups_lentry);
1608 	if (!g)
1609 		goto problem;
1610 	iface = fst_group_get_iface_by_name(g, ifname);
1611 	if (!iface || !iface->mb_ie)
1612 		goto problem;
1613 	return wpa_snprintf_hex(buf, buflen, wpabuf_head(iface->mb_ie),
1614 				wpabuf_len(iface->mb_ie));
1615 
1616 problem:
1617 	return os_snprintf(buf, buflen, "FAIL\n");
1618 }
1619 
1620 #endif /* CONFIG_FST_TEST */
1621