xref: /freebsd/contrib/wpa/wpa_supplicant/wmm_ac.c (revision fed1ca4b719c56c930f2259d80663cd34be812bb)
1 /*
2  * Wi-Fi Multimedia Admission Control (WMM-AC)
3  * Copyright(c) 2014, Intel Mobile Communication GmbH.
4  * Copyright(c) 2014, Intel Corporation. All rights reserved.
5  *
6  * This software may be distributed under the terms of the BSD license.
7  * See README for more details.
8  */
9 
10 #include "includes.h"
11 
12 #include "utils/common.h"
13 #include "utils/list.h"
14 #include "utils/eloop.h"
15 #include "common/ieee802_11_common.h"
16 #include "wpa_supplicant_i.h"
17 #include "bss.h"
18 #include "driver_i.h"
19 #include "wmm_ac.h"
20 
21 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx);
22 
23 static const enum wmm_ac up_to_ac[8] = {
24 	WMM_AC_BK,
25 	WMM_AC_BE,
26 	WMM_AC_BE,
27 	WMM_AC_BK,
28 	WMM_AC_VI,
29 	WMM_AC_VI,
30 	WMM_AC_VO,
31 	WMM_AC_VO
32 };
33 
34 
35 static inline u8 wmm_ac_get_tsid(const struct wmm_tspec_element *tspec)
36 {
37 	return (tspec->ts_info[0] >> 1) & 0x0f;
38 }
39 
40 
41 static u8 wmm_ac_get_direction(const struct wmm_tspec_element *tspec)
42 {
43 	return (tspec->ts_info[0] >> 5) & 0x03;
44 }
45 
46 
47 static u8 wmm_ac_get_user_priority(const struct wmm_tspec_element *tspec)
48 {
49 	return (tspec->ts_info[1] >> 3) & 0x07;
50 }
51 
52 
53 static u8 wmm_ac_direction_to_idx(u8 direction)
54 {
55 	switch (direction) {
56 	case WMM_AC_DIR_UPLINK:
57 		return TS_DIR_IDX_UPLINK;
58 	case WMM_AC_DIR_DOWNLINK:
59 		return TS_DIR_IDX_DOWNLINK;
60 	case WMM_AC_DIR_BIDIRECTIONAL:
61 		return TS_DIR_IDX_BIDI;
62 	default:
63 		wpa_printf(MSG_ERROR, "Invalid direction: %d", direction);
64 		return WMM_AC_DIR_UPLINK;
65 	}
66 }
67 
68 
69 static int wmm_ac_add_ts(struct wpa_supplicant *wpa_s, const u8 *addr,
70 			 const struct wmm_tspec_element *tspec)
71 {
72 	struct wmm_tspec_element *_tspec;
73 	int ret;
74 	u16 admitted_time = le_to_host16(tspec->medium_time);
75 	u8 up = wmm_ac_get_user_priority(tspec);
76 	u8 ac = up_to_ac[up];
77 	u8 dir = wmm_ac_get_direction(tspec);
78 	u8 tsid = wmm_ac_get_tsid(tspec);
79 	enum ts_dir_idx idx = wmm_ac_direction_to_idx(dir);
80 
81 	/* should have been verified before, but double-check here */
82 	if (wpa_s->tspecs[ac][idx]) {
83 		wpa_printf(MSG_ERROR,
84 			   "WMM AC: tspec (ac=%d, dir=%d) already exists!",
85 			   ac, dir);
86 		return -1;
87 	}
88 
89 	/* copy tspec */
90 	_tspec = os_malloc(sizeof(*_tspec));
91 	if (!_tspec)
92 		return -1;
93 
94 	/* store the admitted TSPEC */
95 	os_memcpy(_tspec, tspec, sizeof(*_tspec));
96 
97 	if (dir != WMM_AC_DIR_DOWNLINK) {
98 		ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time);
99 		wpa_printf(MSG_DEBUG,
100 			   "WMM AC: Add TS: addr=" MACSTR
101 			   " TSID=%u admitted time=%u, ret=%d",
102 			   MAC2STR(addr), tsid, admitted_time, ret);
103 		if (ret < 0) {
104 			os_free(_tspec);
105 			return -1;
106 		}
107 	}
108 
109 	wpa_s->tspecs[ac][idx] = _tspec;
110 
111 	wpa_printf(MSG_DEBUG, "Traffic stream was created successfully");
112 
113 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_ADDED
114 		"tsid=%d addr=" MACSTR " admitted_time=%d",
115 		tsid, MAC2STR(addr), admitted_time);
116 
117 	return 0;
118 }
119 
120 
121 static void wmm_ac_del_ts_idx(struct wpa_supplicant *wpa_s, u8 ac,
122 			      enum ts_dir_idx dir)
123 {
124 	struct wmm_tspec_element *tspec = wpa_s->tspecs[ac][dir];
125 	u8 tsid;
126 
127 	if (!tspec)
128 		return;
129 
130 	tsid = wmm_ac_get_tsid(tspec);
131 	wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid);
132 
133 	/* update the driver in case of uplink/bidi */
134 	if (wmm_ac_get_direction(tspec) != WMM_AC_DIR_DOWNLINK)
135 		wpa_drv_del_ts(wpa_s, tsid, wpa_s->bssid);
136 
137 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REMOVED
138 		"tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
139 
140 	os_free(wpa_s->tspecs[ac][dir]);
141 	wpa_s->tspecs[ac][dir] = NULL;
142 }
143 
144 
145 static void wmm_ac_del_req(struct wpa_supplicant *wpa_s, int failed)
146 {
147 	struct wmm_ac_addts_request *req = wpa_s->addts_request;
148 
149 	if (!req)
150 		return;
151 
152 	if (failed)
153 		wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED
154 			"tsid=%u", wmm_ac_get_tsid(&req->tspec));
155 
156 	eloop_cancel_timeout(wmm_ac_addts_req_timeout, wpa_s, req);
157 	wpa_s->addts_request = NULL;
158 	os_free(req);
159 }
160 
161 
162 static void wmm_ac_addts_req_timeout(void *eloop_ctx, void *timeout_ctx)
163 {
164 	struct wpa_supplicant *wpa_s = eloop_ctx;
165 	struct wmm_ac_addts_request *addts_req = timeout_ctx;
166 
167 	wpa_printf(MSG_DEBUG,
168 		   "Timeout getting ADDTS response (tsid=%d up=%d)",
169 		   wmm_ac_get_tsid(&addts_req->tspec),
170 		   wmm_ac_get_user_priority(&addts_req->tspec));
171 
172 	wmm_ac_del_req(wpa_s, 1);
173 }
174 
175 
176 static int wmm_ac_send_addts_request(struct wpa_supplicant *wpa_s,
177 				     const struct wmm_ac_addts_request *req)
178 {
179 	struct wpabuf *buf;
180 	int ret;
181 
182 	wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
183 		   MAC2STR(req->address));
184 
185 	/* category + action code + dialog token + status + sizeof(tspec) */
186 	buf = wpabuf_alloc(4 + sizeof(req->tspec));
187 	if (!buf) {
188 		wpa_printf(MSG_ERROR, "WMM AC: Allocation error");
189 		return -1;
190 	}
191 
192 	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
193 	wpabuf_put_u8(buf, WMM_ACTION_CODE_ADDTS_REQ);
194 	wpabuf_put_u8(buf, req->dialog_token);
195 	wpabuf_put_u8(buf, 0); /* status code */
196 	wpabuf_put_data(buf, &req->tspec, sizeof(req->tspec));
197 
198 	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, req->address,
199 				wpa_s->own_addr, wpa_s->bssid,
200 				wpabuf_head(buf), wpabuf_len(buf), 0);
201 	if (ret) {
202 		wpa_printf(MSG_WARNING,
203 			   "WMM AC: Failed to send ADDTS Request");
204 	}
205 
206 	wpabuf_free(buf);
207 	return ret;
208 }
209 
210 
211 static int wmm_ac_send_delts(struct wpa_supplicant *wpa_s,
212 			     const struct wmm_tspec_element *tspec,
213 			     const u8 *address)
214 {
215 	struct wpabuf *buf;
216 	int ret;
217 
218 	/* category + action code + dialog token + status + sizeof(tspec) */
219 	buf = wpabuf_alloc(4 + sizeof(*tspec));
220 	if (!buf)
221 		return -1;
222 
223 	wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
224 
225 	/* category + action code + dialog token + status + sizeof(tspec) */
226 	wpabuf_put_u8(buf, WLAN_ACTION_WMM);
227 	wpabuf_put_u8(buf, WMM_ACTION_CODE_DELTS);
228 	wpabuf_put_u8(buf, 0); /* Dialog Token (not used) */
229 	wpabuf_put_u8(buf, 0); /* Status Code (not used) */
230 	wpabuf_put_data(buf, tspec, sizeof(*tspec));
231 
232 	ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, address,
233 				  wpa_s->own_addr, wpa_s->bssid,
234 				  wpabuf_head(buf), wpabuf_len(buf), 0);
235 	if (ret)
236 		wpa_printf(MSG_WARNING, "Failed to send DELTS frame");
237 
238 	wpabuf_free(buf);
239 	return ret;
240 }
241 
242 
243 /* return the AC using the given TSPEC tid */
244 static int wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid,
245 			    enum ts_dir_idx *dir)
246 {
247 	int ac;
248 	enum ts_dir_idx idx;
249 
250 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
251 		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
252 			if (wpa_s->tspecs[ac][idx] &&
253 			    wmm_ac_get_tsid(wpa_s->tspecs[ac][idx]) == tsid) {
254 				if (dir)
255 					*dir = idx;
256 				return ac;
257 			}
258 		}
259 	}
260 
261 	return -1;
262 }
263 
264 
265 static struct wmm_ac_addts_request *
266 wmm_ac_build_addts_req(struct wpa_supplicant *wpa_s,
267 		       const struct wmm_ac_ts_setup_params *params,
268 		       const u8 *address)
269 {
270 	struct wmm_ac_addts_request *addts_req;
271 	struct wmm_tspec_element *tspec;
272 	u8 ac = up_to_ac[params->user_priority];
273 	u8 uapsd = wpa_s->wmm_ac_assoc_info->ac_params[ac].uapsd;
274 
275 	addts_req = os_zalloc(sizeof(*addts_req));
276 	if (!addts_req)
277 		return NULL;
278 
279 	tspec = &addts_req->tspec;
280 	os_memcpy(addts_req->address, address, ETH_ALEN);
281 
282 	/* The dialog token cannot be zero */
283 	if (++wpa_s->wmm_ac_last_dialog_token == 0)
284 		wpa_s->wmm_ac_last_dialog_token++;
285 
286 	addts_req->dialog_token = wpa_s->wmm_ac_last_dialog_token;
287 	tspec->eid = WLAN_EID_VENDOR_SPECIFIC;
288 	tspec->length = sizeof(*tspec) - 2; /* reduce eid and length */
289 	tspec->oui[0] = 0x00;
290 	tspec->oui[1] = 0x50;
291 	tspec->oui[2] = 0xf2;
292 	tspec->oui_type = WMM_OUI_TYPE;
293 	tspec->oui_subtype = WMM_OUI_SUBTYPE_TSPEC_ELEMENT;
294 	tspec->version = WMM_VERSION;
295 
296 	tspec->ts_info[0] = params->tsid << 1;
297 	tspec->ts_info[0] |= params->direction << 5;
298 	tspec->ts_info[0] |= WMM_AC_ACCESS_POLICY_EDCA << 7;
299 	tspec->ts_info[1] = uapsd << 2;
300 	tspec->ts_info[1] |= params->user_priority << 3;
301 	tspec->ts_info[2] = 0;
302 
303 	tspec->nominal_msdu_size = host_to_le16(params->nominal_msdu_size);
304 	if (params->fixed_nominal_msdu)
305 		tspec->nominal_msdu_size |=
306 			host_to_le16(WMM_AC_FIXED_MSDU_SIZE);
307 
308 	tspec->mean_data_rate = host_to_le32(params->mean_data_rate);
309 	tspec->minimum_phy_rate = host_to_le32(params->minimum_phy_rate);
310 	tspec->surplus_bandwidth_allowance =
311 		host_to_le16(params->surplus_bandwidth_allowance);
312 
313 	return addts_req;
314 }
315 
316 
317 static int param_in_range(const char *name, long value,
318 			  long min_val, long max_val)
319 {
320 	if (value < min_val || (max_val >= 0 && value > max_val)) {
321 		wpa_printf(MSG_DEBUG,
322 			   "WMM AC: param %s (%ld) is out of range (%ld-%ld)",
323 			   name, value, min_val, max_val);
324 		return 0;
325 	}
326 
327 	return 1;
328 }
329 
330 
331 static int wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s,
332 				    u8 tsid, u8 ac, u8 dir)
333 {
334 	enum ts_dir_idx idx;
335 	int cur_ac, existing_ts = 0, replace_ts = 0;
336 
337 	cur_ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
338 	if (cur_ac >= 0) {
339 		if (cur_ac != ac) {
340 			wpa_printf(MSG_DEBUG,
341 				   "WMM AC: TSID %i already exists on different ac (%d)",
342 				   tsid, cur_ac);
343 			return -1;
344 		}
345 
346 		/* same tsid - this tspec will replace the current one */
347 		replace_ts |= BIT(idx);
348 	}
349 
350 	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
351 		if (wpa_s->tspecs[ac][idx])
352 			existing_ts |= BIT(idx);
353 	}
354 
355 	switch (dir) {
356 	case WMM_AC_DIR_UPLINK:
357 		/* replace existing uplink/bidi tspecs */
358 		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_UPLINK) |
359 					     BIT(TS_DIR_IDX_BIDI));
360 		break;
361 	case WMM_AC_DIR_DOWNLINK:
362 		/* replace existing downlink/bidi tspecs */
363 		replace_ts |= existing_ts & (BIT(TS_DIR_IDX_DOWNLINK) |
364 					     BIT(TS_DIR_IDX_BIDI));
365 		break;
366 	case WMM_AC_DIR_BIDIRECTIONAL:
367 		/* replace all existing tspecs */
368 		replace_ts |= existing_ts;
369 		break;
370 	default:
371 		return -1;
372 	}
373 
374 	return replace_ts;
375 }
376 
377 
378 static int wmm_ac_ts_req_is_valid(struct wpa_supplicant *wpa_s,
379 				  const struct wmm_ac_ts_setup_params *params)
380 {
381 	enum wmm_ac req_ac;
382 
383 #define PARAM_IN_RANGE(field, min_value, max_value) \
384 	param_in_range(#field, params->field, min_value, max_value)
385 
386 	if (!PARAM_IN_RANGE(tsid, 0, WMM_AC_MAX_TID) ||
387 	    !PARAM_IN_RANGE(user_priority, 0, WMM_AC_MAX_USER_PRIORITY) ||
388 	    !PARAM_IN_RANGE(nominal_msdu_size, 1, WMM_AC_MAX_NOMINAL_MSDU) ||
389 	    !PARAM_IN_RANGE(mean_data_rate, 1, -1) ||
390 	    !PARAM_IN_RANGE(minimum_phy_rate, 1, -1) ||
391 	    !PARAM_IN_RANGE(surplus_bandwidth_allowance, WMM_AC_MIN_SBA_UNITY,
392 			    -1))
393 		return 0;
394 #undef PARAM_IN_RANGE
395 
396 	if (!(params->direction == WMM_TSPEC_DIRECTION_UPLINK ||
397 	      params->direction == WMM_TSPEC_DIRECTION_DOWNLINK ||
398 	      params->direction == WMM_TSPEC_DIRECTION_BI_DIRECTIONAL)) {
399 		wpa_printf(MSG_DEBUG, "WMM AC: invalid TS direction: %d",
400 			   params->direction);
401 		return 0;
402 	}
403 
404 	req_ac = up_to_ac[params->user_priority];
405 
406 	/* Requested accesss category must have acm */
407 	if (!wpa_s->wmm_ac_assoc_info->ac_params[req_ac].acm) {
408 		wpa_printf(MSG_DEBUG, "WMM AC: AC %d is not ACM", req_ac);
409 		return 0;
410 	}
411 
412 	if (wmm_ac_should_replace_ts(wpa_s, params->tsid, req_ac,
413 				     params->direction) < 0)
414 		return 0;
415 
416 	return 1;
417 }
418 
419 
420 static struct wmm_ac_assoc_data *
421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
422 			  size_t ies_len)
423 {
424 	struct ieee802_11_elems elems;
425 	struct wmm_parameter_element *wmm_params;
426 	struct wmm_ac_assoc_data *assoc_data;
427 	int i;
428 
429 	/* Parsing WMM Parameter Element */
430 	if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
431 		wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
432 		return NULL;
433 	}
434 
435 	if (!elems.wmm) {
436 		wpa_printf(MSG_DEBUG, "WMM AC: No WMM IE");
437 		return NULL;
438 	}
439 
440 	if (elems.wmm_len != sizeof(*wmm_params)) {
441 		wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
442 		return NULL;
443 	}
444 
445 	wmm_params = (struct wmm_parameter_element *)(elems.wmm);
446 
447 	assoc_data = os_zalloc(sizeof(*assoc_data));
448 	if (!assoc_data)
449 		return NULL;
450 
451 	for (i = 0; i < WMM_AC_NUM; i++)
452 		assoc_data->ac_params[i].acm =
453 			!!(wmm_params->ac[i].aci_aifsn & WMM_AC_ACM);
454 
455 	wpa_printf(MSG_DEBUG,
456 		   "WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u",
457 		   assoc_data->ac_params[WMM_AC_BE].acm,
458 		   assoc_data->ac_params[WMM_AC_BK].acm,
459 		   assoc_data->ac_params[WMM_AC_VI].acm,
460 		   assoc_data->ac_params[WMM_AC_VO].acm);
461 
462 	return assoc_data;
463 }
464 
465 
466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
467 		       size_t ies_len, const struct wmm_params *wmm_params)
468 {
469 	struct wmm_ac_assoc_data *assoc_data;
470 	u8 ac;
471 
472 	if (wpa_s->wmm_ac_assoc_info) {
473 		wpa_printf(MSG_ERROR, "WMM AC: Already initialized");
474 		return -1;
475 	}
476 
477 	if (!ies) {
478 		wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
479 		return -1;
480 	}
481 
482 	if (!(wmm_params->info_bitmap & WMM_PARAMS_UAPSD_QUEUES_INFO)) {
483 		wpa_printf(MSG_DEBUG, "WMM AC: Missing U-APSD configuration");
484 		return -1;
485 	}
486 
487 	os_memset(wpa_s->tspecs, 0, sizeof(wpa_s->tspecs));
488 	wpa_s->wmm_ac_last_dialog_token = 0;
489 	wpa_s->addts_request = NULL;
490 
491 	assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
492 	if (!assoc_data)
493 		return -1;
494 
495 	wpa_printf(MSG_DEBUG, "WMM AC: U-APSD queues=0x%x",
496 		   wmm_params->uapsd_queues);
497 
498 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
499 		assoc_data->ac_params[ac].uapsd =
500 			!!(wmm_params->uapsd_queues & BIT(ac));
501 	}
502 
503 	wpa_s->wmm_ac_assoc_info = assoc_data;
504 	return 0;
505 }
506 
507 
508 static void wmm_ac_del_ts(struct wpa_supplicant *wpa_s, u8 ac, int dir_bitmap)
509 {
510 	enum ts_dir_idx idx;
511 
512 	for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
513 		if (!(dir_bitmap & BIT(idx)))
514 			continue;
515 
516 		wmm_ac_del_ts_idx(wpa_s, ac, idx);
517 	}
518 }
519 
520 
521 static void wmm_ac_deinit(struct wpa_supplicant *wpa_s)
522 {
523 	int i;
524 
525 	for (i = 0; i < WMM_AC_NUM; i++)
526 		wmm_ac_del_ts(wpa_s, i, TS_DIR_IDX_ALL);
527 
528 	/* delete pending add_ts requset */
529 	wmm_ac_del_req(wpa_s, 1);
530 
531 	os_free(wpa_s->wmm_ac_assoc_info);
532 	wpa_s->wmm_ac_assoc_info = NULL;
533 }
534 
535 
536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
537 			 size_t ies_len, const struct wmm_params *wmm_params)
538 {
539 	if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
540 		return;
541 
542 	wpa_printf(MSG_DEBUG,
543 		   "WMM AC: Valid WMM association, WMM AC is enabled");
544 }
545 
546 
547 void wmm_ac_notify_disassoc(struct wpa_supplicant *wpa_s)
548 {
549 	if (!wpa_s->wmm_ac_assoc_info)
550 		return;
551 
552 	wmm_ac_deinit(wpa_s);
553 	wpa_printf(MSG_DEBUG, "WMM AC: WMM AC is disabled");
554 }
555 
556 
557 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid)
558 {
559 	struct wmm_tspec_element tspec;
560 	int ac;
561 	enum ts_dir_idx dir;
562 
563 	if (!wpa_s->wmm_ac_assoc_info) {
564 		wpa_printf(MSG_DEBUG,
565 			   "WMM AC: Failed to delete TS, WMM AC is disabled");
566 		return -1;
567 	}
568 
569 	ac = wmm_ac_find_tsid(wpa_s, tsid, &dir);
570 	if (ac < 0) {
571 		wpa_printf(MSG_DEBUG, "WMM AC: TS does not exist");
572 		return -1;
573 	}
574 
575 	tspec = *wpa_s->tspecs[ac][dir];
576 
577 	wmm_ac_del_ts_idx(wpa_s, ac, dir);
578 
579 	wmm_ac_send_delts(wpa_s, &tspec, wpa_s->bssid);
580 
581 	return 0;
582 }
583 
584 
585 int wpas_wmm_ac_addts(struct wpa_supplicant *wpa_s,
586 		      struct wmm_ac_ts_setup_params *params)
587 {
588 	struct wmm_ac_addts_request *addts_req;
589 
590 	if (!wpa_s->wmm_ac_assoc_info) {
591 		wpa_printf(MSG_DEBUG,
592 			   "WMM AC: Cannot add TS - missing assoc data");
593 		return -1;
594 	}
595 
596 	if (wpa_s->addts_request) {
597 		wpa_printf(MSG_DEBUG,
598 			   "WMM AC: can't add TS - ADDTS request is already pending");
599 		return -1;
600 	}
601 
602 	/*
603 	 * we can setup downlink TS even without driver support.
604 	 * however, we need driver support for the other directions.
605 	 */
606 	if (params->direction != WMM_AC_DIR_DOWNLINK &&
607 	    !wpa_s->wmm_ac_supported) {
608 		wpa_printf(MSG_DEBUG,
609 			   "Cannot set uplink/bidi TS without driver support");
610 		return -1;
611 	}
612 
613 	if (!wmm_ac_ts_req_is_valid(wpa_s, params))
614 		return -1;
615 
616 	wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
617 		   " tsid=%u user priority=%u direction=%d)",
618 		   MAC2STR(wpa_s->bssid), params->tsid,
619 		   params->user_priority, params->direction);
620 
621 	addts_req = wmm_ac_build_addts_req(wpa_s, params, wpa_s->bssid);
622 	if (!addts_req)
623 		return -1;
624 
625 	if (wmm_ac_send_addts_request(wpa_s, addts_req))
626 		goto err;
627 
628 	/* save as pending and set ADDTS resp timeout to 1 second */
629 	wpa_s->addts_request = addts_req;
630 	eloop_register_timeout(1, 0, wmm_ac_addts_req_timeout,
631 			       wpa_s, addts_req);
632 	return 0;
633 err:
634 	os_free(addts_req);
635 	return -1;
636 }
637 
638 
639 static void wmm_ac_handle_delts(struct wpa_supplicant *wpa_s, const u8 *sa,
640 				const struct wmm_tspec_element *tspec)
641 {
642 	int ac;
643 	u8 tsid;
644 	enum ts_dir_idx idx;
645 
646 	tsid = wmm_ac_get_tsid(tspec);
647 
648 	wpa_printf(MSG_DEBUG,
649 		   "WMM AC: DELTS frame has been received TSID=%u addr="
650 		   MACSTR, tsid, MAC2STR(sa));
651 
652 	ac = wmm_ac_find_tsid(wpa_s, tsid, &idx);
653 	if (ac < 0) {
654 		wpa_printf(MSG_DEBUG,
655 			   "WMM AC: Ignoring DELTS frame - TSID does not exist");
656 		return;
657 	}
658 
659 	wmm_ac_del_ts_idx(wpa_s, ac, idx);
660 
661 	wpa_printf(MSG_DEBUG,
662 		   "TS was deleted successfully (tsid=%u address=" MACSTR ")",
663 		   tsid, MAC2STR(sa));
664 }
665 
666 
667 static void wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa,
668 		const u8 resp_dialog_token, const u8 status_code,
669 		const struct wmm_tspec_element *tspec)
670 {
671 	struct wmm_ac_addts_request *req = wpa_s->addts_request;
672 	u8 ac, tsid, up, dir;
673 	int replace_tspecs;
674 
675 	tsid = wmm_ac_get_tsid(tspec);
676 	dir = wmm_ac_get_direction(tspec);
677 	up = wmm_ac_get_user_priority(tspec);
678 	ac = up_to_ac[up];
679 
680 	/* make sure we have a matching addts request */
681 	if (!req || req->dialog_token != resp_dialog_token) {
682 		wpa_printf(MSG_DEBUG,
683 			   "WMM AC: no req with dialog=%u, ignoring frame",
684 			   resp_dialog_token);
685 		return;
686 	}
687 
688 	/* make sure the params are the same */
689 	if (os_memcmp(req->address, sa, ETH_ALEN) != 0 ||
690 	    tsid != wmm_ac_get_tsid(&req->tspec) ||
691 	    up != wmm_ac_get_user_priority(&req->tspec) ||
692 	    dir != wmm_ac_get_direction(&req->tspec)) {
693 		wpa_printf(MSG_DEBUG,
694 			   "WMM AC: ADDTS params do not match, ignoring frame");
695 		return;
696 	}
697 
698 	/* delete pending request */
699 	wmm_ac_del_req(wpa_s, 0);
700 
701 	wpa_printf(MSG_DEBUG,
702 		   "ADDTS response status=%d tsid=%u up=%u direction=%u",
703 		   status_code, tsid, up, dir);
704 
705 	if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) {
706 		wpa_printf(MSG_INFO, "WMM AC: ADDTS request was rejected");
707 		goto err_msg;
708 	}
709 
710 	replace_tspecs = wmm_ac_should_replace_ts(wpa_s, tsid, ac, dir);
711 	if (replace_tspecs < 0)
712 		goto err_delts;
713 
714 	wpa_printf(MSG_DEBUG, "ts idx replace bitmap: 0x%x", replace_tspecs);
715 
716 	/* when replacing tspecs - delete first */
717 	wmm_ac_del_ts(wpa_s, ac, replace_tspecs);
718 
719 	/* Creating a new traffic stream */
720 	wpa_printf(MSG_DEBUG,
721 		   "WMM AC: adding a new TS with TSID=%u address="MACSTR
722 		   " medium time=%u access category=%d dir=%d ",
723 		   tsid, MAC2STR(sa),
724 		   le_to_host16(tspec->medium_time), ac, dir);
725 
726 	if (wmm_ac_add_ts(wpa_s, sa, tspec))
727 		goto err_delts;
728 
729 	return;
730 
731 err_delts:
732 	/* ask the ap to delete the tspec */
733 	wmm_ac_send_delts(wpa_s, tspec, sa);
734 err_msg:
735 	wpa_msg(wpa_s, MSG_INFO, WMM_AC_EVENT_TSPEC_REQ_FAILED "tsid=%u",
736 		tsid);
737 }
738 
739 
740 void wmm_ac_rx_action(struct wpa_supplicant *wpa_s, const u8 *da,
741 			const u8 *sa, const u8 *data, size_t len)
742 {
743 	u8 action;
744 	u8 dialog_token;
745 	u8 status_code;
746 	struct ieee802_11_elems elems;
747 	struct wmm_tspec_element *tspec;
748 
749 	if (wpa_s->wmm_ac_assoc_info == NULL) {
750 		wpa_printf(MSG_DEBUG,
751 			   "WMM AC: WMM AC is disabled, ignoring action frame");
752 		return;
753 	}
754 
755 	action = data[0];
756 
757 	if (action != WMM_ACTION_CODE_ADDTS_RESP &&
758 	    action != WMM_ACTION_CODE_DELTS) {
759 		wpa_printf(MSG_DEBUG,
760 			   "WMM AC: Unknown action (%d), ignoring action frame",
761 			   action);
762 		return;
763 	}
764 
765 	/* WMM AC action frame */
766 	if (os_memcmp(da, wpa_s->own_addr, ETH_ALEN) != 0) {
767 		wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
768 			   " is other than ours, ignoring frame", MAC2STR(da));
769 		return;
770 	}
771 
772 	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0) {
773 		wpa_printf(MSG_DEBUG, "WMM AC: ignore frame with sa " MACSTR
774 			   " different other than our bssid", MAC2STR(da));
775 		return;
776 	}
777 
778 	if (len < 2 + sizeof(struct wmm_tspec_element)) {
779 		wpa_printf(MSG_DEBUG,
780 			   "WMM AC: Short ADDTS response ignored (len=%lu)",
781 			   (unsigned long) len);
782 		return;
783 	}
784 
785 	data++;
786 	len--;
787 	dialog_token = data[0];
788 	status_code = data[1];
789 
790 	if (ieee802_11_parse_elems(data + 2, len - 2, &elems, 1) != ParseOK) {
791 		wpa_printf(MSG_DEBUG,
792 			   "WMM AC: Could not parse WMM AC action from " MACSTR,
793 			   MAC2STR(sa));
794 		return;
795 	}
796 
797 	/* the struct also contains the type and value, so decrease it */
798 	if (elems.wmm_tspec_len != sizeof(struct wmm_tspec_element) - 2) {
799 		wpa_printf(MSG_DEBUG, "WMM AC: missing or wrong length TSPEC");
800 		return;
801 	}
802 
803 	tspec = (struct wmm_tspec_element *)(elems.wmm_tspec - 2);
804 
805 	wpa_printf(MSG_DEBUG, "WMM AC: RX WMM AC Action from " MACSTR,
806 		   MAC2STR(sa));
807 	wpa_hexdump(MSG_MSGDUMP, "WMM AC: WMM AC Action content", data, len);
808 
809 	switch (action) {
810 	case WMM_ACTION_CODE_ADDTS_RESP:
811 		wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code,
812 					 tspec);
813 		break;
814 	case WMM_ACTION_CODE_DELTS:
815 		wmm_ac_handle_delts(wpa_s, sa, tspec);
816 		break;
817 	default:
818 		break;
819 	}
820 }
821 
822 
823 static const char * get_ac_str(u8 ac)
824 {
825 	switch (ac) {
826 	case WMM_AC_BE:
827 		return "BE";
828 	case WMM_AC_BK:
829 		return "BK";
830 	case WMM_AC_VI:
831 		return "VI";
832 	case WMM_AC_VO:
833 		return "VO";
834 	default:
835 		return "N/A";
836 	}
837 }
838 
839 
840 static const char * get_direction_str(u8 direction)
841 {
842 	switch (direction) {
843 	case WMM_AC_DIR_DOWNLINK:
844 		return "Downlink";
845 	case WMM_AC_DIR_UPLINK:
846 		return "Uplink";
847 	case WMM_AC_DIR_BIDIRECTIONAL:
848 		return "Bi-directional";
849 	default:
850 		return "N/A";
851 	}
852 }
853 
854 
855 int wpas_wmm_ac_status(struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
856 {
857 	struct wmm_ac_assoc_data *assoc_info = wpa_s->wmm_ac_assoc_info;
858 	enum ts_dir_idx idx;
859 	int pos = 0;
860 	u8 ac, up;
861 
862 	if (!assoc_info) {
863 		return wpa_scnprintf(buf, buflen - pos,
864 				     "Not associated to a WMM AP, WMM AC is Disabled\n");
865 	}
866 
867 	pos += wpa_scnprintf(buf + pos, buflen - pos, "WMM AC is Enabled\n");
868 
869 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
870 		int ts_count = 0;
871 
872 		pos += wpa_scnprintf(buf + pos, buflen - pos,
873 				     "%s: acm=%d uapsd=%d\n",
874 				     get_ac_str(ac),
875 				     assoc_info->ac_params[ac].acm,
876 				     assoc_info->ac_params[ac].uapsd);
877 
878 		for (idx = 0; idx < TS_DIR_IDX_COUNT; idx++) {
879 			struct wmm_tspec_element *tspec;
880 			u8 dir, tsid;
881 			const char *dir_str;
882 
883 			tspec = wpa_s->tspecs[ac][idx];
884 			if (!tspec)
885 				continue;
886 
887 			ts_count++;
888 
889 			dir = wmm_ac_get_direction(tspec);
890 			dir_str = get_direction_str(dir);
891 			tsid = wmm_ac_get_tsid(tspec);
892 			up = wmm_ac_get_user_priority(tspec);
893 
894 			pos += wpa_scnprintf(buf + pos, buflen - pos,
895 					     "\tTSID=%u UP=%u\n"
896 					     "\tAddress = "MACSTR"\n"
897 					     "\tWMM AC dir = %s\n"
898 					     "\tTotal admitted time = %u\n\n",
899 					     tsid, up,
900 					     MAC2STR(wpa_s->bssid),
901 					     dir_str,
902 					     le_to_host16(tspec->medium_time));
903 		}
904 
905 		if (!ts_count) {
906 			pos += wpa_scnprintf(buf + pos, buflen - pos,
907 					     "\t(No Traffic Stream)\n\n");
908 		}
909 	}
910 
911 	return pos;
912 }
913 
914 
915 static u8 wmm_ac_get_tspecs_count(struct wpa_supplicant *wpa_s)
916 {
917 	int ac, dir, tspecs_count = 0;
918 
919 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
920 		for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
921 			if (wpa_s->tspecs[ac][dir])
922 				tspecs_count++;
923 		}
924 	}
925 
926 	return tspecs_count;
927 }
928 
929 
930 void wmm_ac_save_tspecs(struct wpa_supplicant *wpa_s)
931 {
932 	int ac, dir, tspecs_count;
933 
934 	wpa_printf(MSG_DEBUG, "WMM AC: Save last configured tspecs");
935 
936 	if (!wpa_s->wmm_ac_assoc_info)
937 		return;
938 
939 	tspecs_count = wmm_ac_get_tspecs_count(wpa_s);
940 	if (!tspecs_count) {
941 		wpa_printf(MSG_DEBUG, "WMM AC: No configured TSPECs");
942 		return;
943 	}
944 
945 	wpa_printf(MSG_DEBUG, "WMM AC: Saving tspecs");
946 
947 	wmm_ac_clear_saved_tspecs(wpa_s);
948 	wpa_s->last_tspecs = os_calloc(tspecs_count,
949 				       sizeof(*wpa_s->last_tspecs));
950 	if (!wpa_s->last_tspecs) {
951 		wpa_printf(MSG_ERROR, "WMM AC: Failed to save tspecs!");
952 		return;
953 	}
954 
955 	for (ac = 0; ac < WMM_AC_NUM; ac++) {
956 		for (dir = 0; dir < TS_DIR_IDX_COUNT; dir++) {
957 			if (!wpa_s->tspecs[ac][dir])
958 				continue;
959 
960 			wpa_s->last_tspecs[wpa_s->last_tspecs_count++] =
961 				*wpa_s->tspecs[ac][dir];
962 		}
963 	}
964 
965 	wpa_printf(MSG_DEBUG, "WMM AC: Successfully saved %d TSPECs",
966 		   wpa_s->last_tspecs_count);
967 }
968 
969 
970 void wmm_ac_clear_saved_tspecs(struct wpa_supplicant *wpa_s)
971 {
972 	if (wpa_s->last_tspecs) {
973 		wpa_printf(MSG_DEBUG, "WMM AC: Clear saved tspecs");
974 		os_free(wpa_s->last_tspecs);
975 		wpa_s->last_tspecs = NULL;
976 		wpa_s->last_tspecs_count = 0;
977 	}
978 }
979 
980 
981 int wmm_ac_restore_tspecs(struct wpa_supplicant *wpa_s)
982 {
983 	unsigned int i;
984 
985 	if (!wpa_s->wmm_ac_assoc_info || !wpa_s->last_tspecs_count)
986 		return 0;
987 
988 	wpa_printf(MSG_DEBUG, "WMM AC: Restore %u saved tspecs",
989 		   wpa_s->last_tspecs_count);
990 
991 	for (i = 0; i < wpa_s->last_tspecs_count; i++)
992 		wmm_ac_add_ts(wpa_s, wpa_s->bssid, &wpa_s->last_tspecs[i]);
993 
994 	return 0;
995 }
996