summaryrefslogtreecommitdiffstats
path: root/sys/net80211/ieee80211_output.c
diff options
context:
space:
mode:
authorsam <sam@FreeBSD.org>2004-12-08 17:26:47 +0000
committersam <sam@FreeBSD.org>2004-12-08 17:26:47 +0000
commit2843bf259ec9ca475410e4e9e53e7cd47cd55333 (patch)
tree704c955cb68020dd8237664b417e3ee6141f028b /sys/net80211/ieee80211_output.c
parentd9ec783dcb4653bc5f6993ab5f154827f5a58922 (diff)
downloadFreeBSD-src-2843bf259ec9ca475410e4e9e53e7cd47cd55333.zip
FreeBSD-src-2843bf259ec9ca475410e4e9e53e7cd47cd55333.tar.gz
Update 802.11 support; too much new functionality to fully describe
here but it includes completed 802.11g, WPA, 802.11i, 802.1x, WME/WMM, AP-side power-save, crypto plugin framework, authenticator plugin framework, and access control plugin frameowrk.
Diffstat (limited to 'sys/net80211/ieee80211_output.c')
-rw-r--r--sys/net80211/ieee80211_output.c1326
1 files changed, 1171 insertions, 155 deletions
diff --git a/sys/net80211/ieee80211_output.c b/sys/net80211/ieee80211_output.c
index b08fff0..219bc25 100644
--- a/sys/net80211/ieee80211_output.c
+++ b/sys/net80211/ieee80211_output.c
@@ -1,6 +1,6 @@
/*-
* Copyright (c) 2001 Atsushi Onoe
- * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
+ * Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
@@ -38,32 +38,43 @@ __FBSDID("$FreeBSD$");
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/mbuf.h>
-#include <sys/malloc.h>
#include <sys/kernel.h>
-#include <sys/socket.h>
-#include <sys/sockio.h>
#include <sys/endian.h>
-#include <sys/errno.h>
-#include <sys/bus.h>
-#include <sys/proc.h>
-#include <sys/sysctl.h>
-#include <machine/atomic.h>
+#include <sys/socket.h>
-#include <net/if.h>
-#include <net/if_dl.h>
-#include <net/if_media.h>
-#include <net/if_arp.h>
+#include <net/bpf.h>
#include <net/ethernet.h>
+#include <net/if.h>
#include <net/if_llc.h>
+#include <net/if_media.h>
+#include <net/if_vlan_var.h>
#include <net80211/ieee80211_var.h>
-#include <net/bpf.h>
-
#ifdef INET
#include <netinet/in.h>
#include <netinet/if_ether.h>
+#include <netinet/in_systm.h>
+#include <netinet/ip.h>
+#endif
+
+#ifdef IEEE80211_DEBUG
+/*
+ * Decide if an outbound management frame should be
+ * printed when debugging is enabled. This filters some
+ * of the less interesting frames that come frequently
+ * (e.g. beacons).
+ */
+static __inline int
+doprint(struct ieee80211com *ic, int subtype)
+{
+ switch (subtype) {
+ case IEEE80211_FC0_SUBTYPE_PROBE_RESP:
+ return (ic->ic_opmode == IEEE80211_M_IBSS);
+ }
+ return 1;
+}
#endif
/*
@@ -74,14 +85,13 @@ __FBSDID("$FreeBSD$");
* reference (and potentially free'ing up any associated storage).
*/
static int
-ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni,
+ieee80211_mgmt_output(struct ieee80211com *ic, struct ieee80211_node *ni,
struct mbuf *m, int type)
{
- struct ieee80211com *ic = (void *)ifp;
+ struct ifnet *ifp = ic->ic_ifp;
struct ieee80211_frame *wh;
KASSERT(ni != NULL, ("null node"));
- ni->ni_inact = 0;
/*
* Yech, hack alert! We want to pass the node down to the
@@ -106,28 +116,46 @@ ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni,
wh->i_fc[1] = IEEE80211_FC1_DIR_NODS;
*(u_int16_t *)wh->i_dur = 0;
*(u_int16_t *)wh->i_seq =
- htole16(ni->ni_txseq << IEEE80211_SEQ_SEQ_SHIFT);
- ni->ni_txseq++;
- IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr);
- IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr);
- IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid);
+ htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT);
+ ni->ni_txseqs[0]++;
+ /*
+ * Hack. When sending PROBE_REQ frames while scanning we
+ * explicitly force a broadcast rather than (as before) clobber
+ * ni_macaddr and ni_bssid. This is stopgap, we need a way
+ * to communicate this directly rather than do something
+ * implicit based on surrounding state.
+ */
+ if (type == IEEE80211_FC0_SUBTYPE_PROBE_REQ &&
+ (ic->ic_flags & IEEE80211_F_SCAN)) {
+ IEEE80211_ADDR_COPY(wh->i_addr1, ifp->if_broadcastaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr3, ifp->if_broadcastaddr);
+ } else {
+ IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid);
+ }
- if (ifp->if_flags & IFF_DEBUG) {
- /* avoid to print too many frames */
- if (ic->ic_opmode == IEEE80211_M_IBSS ||
+ if ((m->m_flags & M_LINK0) != 0 && ni->ni_challenge != NULL) {
+ m->m_flags &= ~M_LINK0;
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH,
+ "[%s] encrypting frame (%s)\n",
+ ether_sprintf(wh->i_addr1), __func__);
+ wh->i_fc[1] |= IEEE80211_FC1_WEP;
+ }
#ifdef IEEE80211_DEBUG
- ieee80211_debug > 1 ||
-#endif
- (type & IEEE80211_FC0_SUBTYPE_MASK) !=
- IEEE80211_FC0_SUBTYPE_PROBE_RESP)
- if_printf(ifp, "sending %s to %s on channel %u\n",
- ieee80211_mgt_subtype_name[
- (type & IEEE80211_FC0_SUBTYPE_MASK)
- >> IEEE80211_FC0_SUBTYPE_SHIFT],
- ether_sprintf(ni->ni_macaddr),
- ieee80211_chan2ieee(ic, ni->ni_chan));
+ /* avoid printing too many frames */
+ if ((ieee80211_msg_debug(ic) && doprint(ic, type)) ||
+ ieee80211_msg_dumppkts(ic)) {
+ printf("[%s] send %s on channel %u\n",
+ ether_sprintf(wh->i_addr1),
+ ieee80211_mgt_subtype_name[
+ (type & IEEE80211_FC0_SUBTYPE_MASK) >>
+ IEEE80211_FC0_SUBTYPE_SHIFT],
+ ieee80211_chan2ieee(ic, ni->ni_chan));
}
-
+#endif
+ IEEE80211_NODE_STAT(ni, tx_mgmt);
IF_ENQUEUE(&ic->ic_mgtq, m);
ifp->if_timer = 1;
if_start(ifp);
@@ -135,41 +163,315 @@ ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni,
}
/*
- * Encapsulate an outbound data frame. The mbuf chain is updated and
- * a reference to the destination node is returned. If an error is
- * encountered NULL is returned and the node reference will also be NULL.
- *
- * NB: The caller is responsible for free'ing a returned node reference.
- * The convention is ic_bss is not reference counted; the caller must
- * maintain that.
+ * Send a null data frame to the specified node.
+ */
+int
+ieee80211_send_nulldata(struct ieee80211com *ic, struct ieee80211_node *ni)
+{
+ struct ifnet *ifp = ic->ic_ifp;
+ struct mbuf *m;
+ struct ieee80211_frame *wh;
+
+ MGETHDR(m, M_NOWAIT, MT_HEADER);
+ if (m == NULL) {
+ /* XXX debug msg */
+ ic->ic_stats.is_tx_nobuf++;
+ return ENOMEM;
+ }
+ m->m_pkthdr.rcvif = (void *) ieee80211_ref_node(ni);
+
+ wh = mtod(m, struct ieee80211_frame *);
+ wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_DATA |
+ IEEE80211_FC0_SUBTYPE_NODATA;
+ *(u_int16_t *)wh->i_dur = 0;
+ *(u_int16_t *)wh->i_seq =
+ htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT);
+ ni->ni_txseqs[0]++;
+
+ /* XXX WDS */
+ wh->i_fc[1] = IEEE80211_FC1_DIR_FROMDS;
+ IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr2, ni->ni_bssid);
+ IEEE80211_ADDR_COPY(wh->i_addr3, ic->ic_myaddr);
+ m->m_len = m->m_pkthdr.len = sizeof(struct ieee80211_frame);
+
+ IEEE80211_NODE_STAT(ni, tx_data);
+
+ IF_ENQUEUE(&ic->ic_mgtq, m); /* cheat */
+ if_start(ifp);
+
+ return 0;
+}
+
+/*
+ * Insure there is sufficient contiguous space to encapsulate the
+ * 802.11 data frame. If room isn't already there, arrange for it.
+ * Drivers and cipher modules assume we have done the necessary work
+ * and fail rudely if they don't find the space they need.
+ */
+static struct mbuf *
+ieee80211_mbuf_adjust(struct ieee80211com *ic, int hdrsize,
+ struct ieee80211_key *key, struct mbuf *m)
+{
+#define TO_BE_RECLAIMED (sizeof(struct ether_header) - sizeof(struct llc))
+ int needed_space = hdrsize;
+
+ if (key != NULL) {
+ /* XXX belongs in crypto code? */
+ needed_space += key->wk_cipher->ic_header;
+ /* XXX frags */
+ }
+ /*
+ * We know we are called just before stripping an Ethernet
+ * header and prepending an LLC header. This means we know
+ * there will be
+ * sizeof(struct ether_header) - sizeof(struct llc)
+ * bytes recovered to which we need additional space for the
+ * 802.11 header and any crypto header.
+ */
+ if (M_LEADINGSPACE(m) < needed_space - TO_BE_RECLAIMED) {
+ struct mbuf *n = m_gethdr(M_NOWAIT, m->m_type);
+ if (n == NULL) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_OUTPUT,
+ "%s: cannot expand storage\n", __func__);
+ ic->ic_stats.is_tx_nobuf++;
+ m_freem(m);
+ return NULL;
+ }
+ KASSERT(needed_space <= MHLEN,
+ ("not enough room, need %u got %u\n", needed_space, MHLEN));
+ /*
+ * Setup new mbuf to have leading space to prepend the
+ * 802.11 header and any crypto header bits that are
+ * required (the latter are added when the driver calls
+ * back to ieee80211_crypto_encap to do crypto encapsulation).
+ */
+ /* NB: must be first 'cuz it clobbers m_data */
+ m_move_pkthdr(n, m);
+ n->m_len = 0; /* NB: m_gethdr does not set */
+ n->m_data += needed_space;
+ /*
+ * Pull up Ethernet header to create the expected layout.
+ * We could use m_pullup but that's overkill (i.e. we don't
+ * need the actual data) and it cannot fail so do it inline
+ * for speed.
+ */
+ /* NB: struct ether_header is known to be contiguous */
+ n->m_len += sizeof(struct ether_header);
+ m->m_len -= sizeof(struct ether_header);
+ m->m_data += sizeof(struct ether_header);
+ /*
+ * Replace the head of the chain.
+ */
+ n->m_next = m;
+ m = n;
+ }
+ return m;
+#undef TO_BE_RECLAIMED
+}
+
+/*
+ * Assign priority to a frame based on any vlan tag assigned
+ * to the station and/or any Diffserv setting in an IP header.
+ * Finally, if an ACM policy is setup (in station mode) it's
+ * applied.
+ */
+int
+ieee80211_classify(struct ieee80211com *ic, struct mbuf *m, struct ieee80211_node *ni)
+{
+ int v_wme_ac, d_wme_ac, ac;
+#ifdef INET
+ struct ether_header *eh;
+#endif
+
+ if ((ni->ni_flags & IEEE80211_NODE_QOS) == 0) {
+ ac = WME_AC_BE;
+ goto done;
+ }
+
+ /*
+ * If node has a vlan tag then all traffic
+ * to it must have a matching tag.
+ */
+ v_wme_ac = 0;
+ if (ni->ni_vlan != 0) {
+ struct m_tag *mtag = VLAN_OUTPUT_TAG(ic->ic_ifp, m);
+ if (mtag != NULL) {
+ IEEE80211_NODE_STAT(ni, tx_novlantag);
+ return 1;
+ }
+ if (EVL_VLANOFTAG(VLAN_TAG_VALUE(mtag)) !=
+ EVL_VLANOFTAG(ni->ni_vlan)) {
+ IEEE80211_NODE_STAT(ni, tx_vlanmismatch);
+ return 1;
+ }
+ /* map vlan priority to AC */
+ switch (EVL_PRIOFTAG(ni->ni_vlan)) {
+ case 1:
+ case 2:
+ v_wme_ac = WME_AC_BK;
+ break;
+ case 0:
+ case 3:
+ v_wme_ac = WME_AC_BE;
+ break;
+ case 4:
+ case 5:
+ v_wme_ac = WME_AC_VI;
+ break;
+ case 6:
+ case 7:
+ v_wme_ac = WME_AC_VO;
+ break;
+ }
+ }
+
+#ifdef INET
+ eh = mtod(m, struct ether_header *);
+ if (eh->ether_type == htons(ETHERTYPE_IP)) {
+ const struct ip *ip = (struct ip *)
+ (mtod(m, u_int8_t *) + sizeof (*eh));
+ /*
+ * IP frame, map the TOS field.
+ */
+ switch (ip->ip_tos) {
+ case 0x08:
+ case 0x20:
+ d_wme_ac = WME_AC_BK; /* background */
+ break;
+ case 0x28:
+ case 0xa0:
+ d_wme_ac = WME_AC_VI; /* video */
+ break;
+ case 0x30: /* voice */
+ case 0xe0:
+ case 0x88: /* XXX UPSD */
+ case 0xb8:
+ d_wme_ac = WME_AC_VO;
+ break;
+ default:
+ d_wme_ac = WME_AC_BE;
+ break;
+ }
+ } else {
+#endif /* INET */
+ d_wme_ac = WME_AC_BE;
+#ifdef INET
+ }
+#endif
+ /*
+ * Use highest priority AC.
+ */
+ if (v_wme_ac > d_wme_ac)
+ ac = v_wme_ac;
+ else
+ ac = d_wme_ac;
+
+ /*
+ * Apply ACM policy.
+ */
+ if (ic->ic_opmode == IEEE80211_M_STA) {
+ static const int acmap[4] = {
+ WME_AC_BK, /* WME_AC_BE */
+ WME_AC_BK, /* WME_AC_BK */
+ WME_AC_BE, /* WME_AC_VI */
+ WME_AC_VI, /* WME_AC_VO */
+ };
+ while (ac != WME_AC_BK &&
+ ic->ic_wme.wme_wmeBssChanParams.cap_wmeParams[ac].wmep_acm)
+ ac = acmap[ac];
+ }
+done:
+ M_WME_SETAC(m, ac);
+ return 0;
+}
+
+/*
+ * Return the transmit key to use in sending a frame to the specified
+ * destination. Multicast traffic always uses the group key which is
+ * installed the default tx key. Otherwise if a unicast key is set
+ * we use that. When no unicast key is set we fall back to the default
+ * transmit key unless WPA is enabled in which case there should be
+ * a unicast frame so we don't want to use a default key (which in
+ * this case is the group/multicast key).
+ */
+static __inline struct ieee80211_key *
+ieee80211_crypto_getkey(struct ieee80211com *ic,
+ const u_int8_t mac[IEEE80211_ADDR_LEN], struct ieee80211_node *ni)
+{
+#define KEY_UNDEFINED(k) ((k).wk_cipher == &ieee80211_cipher_none)
+ if (IEEE80211_IS_MULTICAST(mac)) {
+ if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE ||
+ KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey]))
+ return NULL;
+ return &ic->ic_nw_keys[ic->ic_def_txkey];
+ } else if (KEY_UNDEFINED(ni->ni_ucastkey)) {
+ if ((ic->ic_flags & IEEE80211_F_WPA) ||
+ ic->ic_def_txkey == IEEE80211_KEYIX_NONE ||
+ KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey]))
+ return NULL;
+ return &ic->ic_nw_keys[ic->ic_def_txkey];
+ } else {
+ return &ni->ni_ucastkey;
+ }
+#undef KEY_UNDEFINED
+}
+
+/*
+ * Encapsulate an outbound data frame. The mbuf chain is updated.
+ * If an error is encountered NULL is returned. The caller is required
+ * to provide a node reference and pullup the ethernet header in the
+ * first mbuf.
*/
struct mbuf *
-ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni)
+ieee80211_encap(struct ieee80211com *ic, struct mbuf *m,
+ struct ieee80211_node *ni)
{
- struct ieee80211com *ic = (void *)ifp;
struct ether_header eh;
struct ieee80211_frame *wh;
- struct ieee80211_node *ni = NULL;
+ struct ieee80211_key *key;
struct llc *llc;
+ int hdrsize, datalen;
- if (m->m_len < sizeof(struct ether_header)) {
- m = m_pullup(m, sizeof(struct ether_header));
- if (m == NULL) {
- ic->ic_stats.is_tx_nombuf++;
- goto bad;
- }
- }
+ KASSERT(m->m_len >= sizeof(eh), ("no ethernet header!"));
memcpy(&eh, mtod(m, caddr_t), sizeof(struct ether_header));
- ni = ieee80211_find_txnode(ic, eh.ether_dhost);
- if (ni == NULL) {
- IEEE80211_DPRINTF(("%s: no node for dst %s, discard frame\n",
- __func__, ether_sprintf(eh.ether_dhost)));
- ic->ic_stats.is_tx_nonode++;
+ /*
+ * Insure space for additional headers. First identify
+ * transmit key to use in calculating any buffer adjustments
+ * required. This is also used below to do privacy
+ * encapsulation work. Then calculate the 802.11 header
+ * size and any padding required by the driver.
+ *
+ * Note key may be NULL if we fall back to the default
+ * transmit key and that is not set. In that case the
+ * buffer may not be expanded as needed by the cipher
+ * routines, but they will/should discard it.
+ */
+ if (ic->ic_flags & IEEE80211_F_PRIVACY) {
+ key = ieee80211_crypto_getkey(ic, eh.ether_dhost, ni);
+ if (key == NULL && eh.ether_type != htons(ETHERTYPE_PAE)) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
+ "[%s] no default transmit key\n",
+ ether_sprintf(ni->ni_macaddr));
+ /* XXX statistic */
+ }
+ } else
+ key = NULL;
+ /* XXX 4-address format */
+ if (ni->ni_flags & IEEE80211_NODE_QOS)
+ hdrsize = sizeof(struct ieee80211_qosframe);
+ else
+ hdrsize = sizeof(struct ieee80211_frame);
+ if (ic->ic_flags & IEEE80211_F_DATAPAD)
+ hdrsize = roundup(hdrsize, sizeof(u_int32_t));
+ m = ieee80211_mbuf_adjust(ic, hdrsize, key, m);
+ if (m == NULL) {
+ /* NB: ieee80211_mbuf_adjust handles msgs+statistics */
goto bad;
}
- ni->ni_inact = 0;
+ /* NB: this could be optimized because of ieee80211_mbuf_adjust */
m_adj(m, sizeof(struct ether_header) - sizeof(struct llc));
llc = mtod(m, struct llc *);
llc->llc_dsap = llc->llc_ssap = LLC_SNAP_LSAP;
@@ -178,17 +480,16 @@ ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni)
llc->llc_snap.org_code[1] = 0;
llc->llc_snap.org_code[2] = 0;
llc->llc_snap.ether_type = eh.ether_type;
- M_PREPEND(m, sizeof(struct ieee80211_frame), M_DONTWAIT);
+ datalen = m->m_pkthdr.len; /* NB: w/o 802.11 header */
+
+ M_PREPEND(m, hdrsize, M_DONTWAIT);
if (m == NULL) {
- ic->ic_stats.is_tx_nombuf++;
+ ic->ic_stats.is_tx_nobuf++;
goto bad;
}
wh = mtod(m, struct ieee80211_frame *);
wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_DATA;
*(u_int16_t *)wh->i_dur = 0;
- *(u_int16_t *)wh->i_seq =
- htole16(ni->ni_txseq << IEEE80211_SEQ_SEQ_SHIFT);
- ni->ni_txseq++;
switch (ic->ic_opmode) {
case IEEE80211_M_STA:
wh->i_fc[1] = IEEE80211_FC1_DIR_TODS;
@@ -212,21 +513,62 @@ ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni)
case IEEE80211_M_MONITOR:
goto bad;
}
- *pni = ni;
+ if (eh.ether_type != htons(ETHERTYPE_PAE) ||
+ (key != NULL && (ic->ic_flags & IEEE80211_F_WPA))) {
+ /*
+ * IEEE 802.1X: send EAPOL frames always in the clear.
+ * WPA/WPA2: encrypt EAPOL keys when pairwise keys are set.
+ */
+ if (key != NULL) {
+ wh->i_fc[1] |= IEEE80211_FC1_WEP;
+ /* XXX do fragmentation */
+ if (!ieee80211_crypto_enmic(ic, key, m)) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_OUTPUT,
+ "[%s] enmic failed, discard frame\n",
+ ether_sprintf(eh.ether_dhost));
+ /* XXX statistic */
+ goto bad;
+ }
+ }
+ }
+
+ if (ni->ni_flags & IEEE80211_NODE_QOS) {
+ struct ieee80211_qosframe *qwh =
+ (struct ieee80211_qosframe *) wh;
+ int ac, tid;
+
+ ac = M_WME_GETAC(m);
+ /* map from access class/queue to 11e header priorty value */
+ tid = WME_AC_TO_TID(ac);
+ qwh->i_qos[0] = tid & IEEE80211_QOS_TID;
+ if (ic->ic_wme.wme_wmeChanParams.cap_wmeParams[ac].wmep_noackPolicy)
+ qwh->i_qos[0] |= 1 << IEEE80211_QOS_ACKPOLICY_S;
+ qwh->i_qos[1] = 0;
+ qwh->i_fc[0] |= IEEE80211_FC0_SUBTYPE_QOS;
+
+ *(u_int16_t *)wh->i_seq =
+ htole16(ni->ni_txseqs[tid] << IEEE80211_SEQ_SEQ_SHIFT);
+ ni->ni_txseqs[tid]++;
+ } else {
+ *(u_int16_t *)wh->i_seq =
+ htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT);
+ ni->ni_txseqs[0]++;
+ }
+
+ IEEE80211_NODE_STAT(ni, tx_data);
+ IEEE80211_NODE_STAT_ADD(ni, tx_bytes, datalen);
+
return m;
bad:
if (m != NULL)
m_freem(m);
- if (ni && ni != ic->ic_bss)
- ieee80211_free_node(ic, ni);
- *pni = NULL;
return NULL;
}
/*
* Add a supported rates element id to a frame.
*/
-u_int8_t *
+static u_int8_t *
ieee80211_add_rates(u_int8_t *frm, const struct ieee80211_rateset *rs)
{
int nrates;
@@ -243,7 +585,7 @@ ieee80211_add_rates(u_int8_t *frm, const struct ieee80211_rateset *rs)
/*
* Add an extended supported rates element id to a frame.
*/
-u_int8_t *
+static u_int8_t *
ieee80211_add_xrates(u_int8_t *frm, const struct ieee80211_rateset *rs)
{
/*
@@ -271,20 +613,278 @@ ieee80211_add_ssid(u_int8_t *frm, const u_int8_t *ssid, u_int len)
return frm + len;
}
-static struct mbuf *
-ieee80211_getmbuf(int flags, int type, u_int pktlen)
+/*
+ * Add an erp element to a frame.
+ */
+static u_int8_t *
+ieee80211_add_erp(u_int8_t *frm, struct ieee80211com *ic)
{
- struct mbuf *m;
+ u_int8_t erp;
+
+ *frm++ = IEEE80211_ELEMID_ERP;
+ *frm++ = 1;
+ erp = 0;
+ if (ic->ic_nonerpsta != 0)
+ erp |= IEEE80211_ERP_NON_ERP_PRESENT;
+ if (ic->ic_flags & IEEE80211_F_USEPROT)
+ erp |= IEEE80211_ERP_USE_PROTECTION;
+ if (ic->ic_flags & IEEE80211_F_USEBARKER)
+ erp |= IEEE80211_ERP_LONG_PREAMBLE;
+ *frm++ = erp;
+ return frm;
+}
+
+static u_int8_t *
+ieee80211_setup_wpa_ie(struct ieee80211com *ic, u_int8_t *ie)
+{
+#define WPA_OUI_BYTES 0x00, 0x50, 0xf2
+#define ADDSHORT(frm, v) do { \
+ frm[0] = (v) & 0xff; \
+ frm[1] = (v) >> 8; \
+ frm += 2; \
+} while (0)
+#define ADDSELECTOR(frm, sel) do { \
+ memcpy(frm, sel, 4); \
+ frm += 4; \
+} while (0)
+ static const u_int8_t oui[4] = { WPA_OUI_BYTES, WPA_OUI_TYPE };
+ static const u_int8_t cipher_suite[][4] = {
+ { WPA_OUI_BYTES, WPA_CSE_WEP40 }, /* NB: 40-bit */
+ { WPA_OUI_BYTES, WPA_CSE_TKIP },
+ { 0x00, 0x00, 0x00, 0x00 }, /* XXX WRAP */
+ { WPA_OUI_BYTES, WPA_CSE_CCMP },
+ { 0x00, 0x00, 0x00, 0x00 }, /* XXX CKIP */
+ { WPA_OUI_BYTES, WPA_CSE_NULL },
+ };
+ static const u_int8_t wep104_suite[4] =
+ { WPA_OUI_BYTES, WPA_CSE_WEP104 };
+ static const u_int8_t key_mgt_unspec[4] =
+ { WPA_OUI_BYTES, WPA_ASE_8021X_UNSPEC };
+ static const u_int8_t key_mgt_psk[4] =
+ { WPA_OUI_BYTES, WPA_ASE_8021X_PSK };
+ const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn;
+ u_int8_t *frm = ie;
+ u_int8_t *selcnt;
+
+ *frm++ = IEEE80211_ELEMID_VENDOR;
+ *frm++ = 0; /* length filled in below */
+ memcpy(frm, oui, sizeof(oui)); /* WPA OUI */
+ frm += sizeof(oui);
+ ADDSHORT(frm, WPA_VERSION);
- KASSERT(pktlen <= MCLBYTES, ("802.11 packet too large: %u", pktlen));
- if (pktlen <= MHLEN)
- MGETHDR(m, flags, type);
+ /* XXX filter out CKIP */
+
+ /* multicast cipher */
+ if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP &&
+ rsn->rsn_mcastkeylen >= 13)
+ ADDSELECTOR(frm, wep104_suite);
else
- m = m_getcl(flags, type, M_PKTHDR);
- return m;
+ ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]);
+
+ /* unicast cipher list */
+ selcnt = frm;
+ ADDSHORT(frm, 0); /* selector count */
+ if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_AES_CCM)) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_AES_CCM]);
+ }
+ if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_TKIP)) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_TKIP]);
+ }
+
+ /* authenticator selector list */
+ selcnt = frm;
+ ADDSHORT(frm, 0); /* selector count */
+ if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, key_mgt_unspec);
+ }
+ if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, key_mgt_psk);
+ }
+
+ /* optional capabilities */
+ if (rsn->rsn_caps != 0)
+ ADDSHORT(frm, rsn->rsn_caps);
+
+ /* calculate element length */
+ ie[1] = frm - ie - 2;
+ KASSERT(ie[1]+2 <= sizeof(struct ieee80211_ie_wpa),
+ ("WPA IE too big, %u > %u",
+ ie[1]+2, sizeof(struct ieee80211_ie_wpa)));
+ return frm;
+#undef ADDSHORT
+#undef ADDSELECTOR
+#undef WPA_OUI_BYTES
+}
+
+static u_int8_t *
+ieee80211_setup_rsn_ie(struct ieee80211com *ic, u_int8_t *ie)
+{
+#define RSN_OUI_BYTES 0x00, 0x0f, 0xac
+#define ADDSHORT(frm, v) do { \
+ frm[0] = (v) & 0xff; \
+ frm[1] = (v) >> 8; \
+ frm += 2; \
+} while (0)
+#define ADDSELECTOR(frm, sel) do { \
+ memcpy(frm, sel, 4); \
+ frm += 4; \
+} while (0)
+ static const u_int8_t cipher_suite[][4] = {
+ { RSN_OUI_BYTES, RSN_CSE_WEP40 }, /* NB: 40-bit */
+ { RSN_OUI_BYTES, RSN_CSE_TKIP },
+ { RSN_OUI_BYTES, RSN_CSE_WRAP },
+ { RSN_OUI_BYTES, RSN_CSE_CCMP },
+ { 0x00, 0x00, 0x00, 0x00 }, /* XXX CKIP */
+ { RSN_OUI_BYTES, RSN_CSE_NULL },
+ };
+ static const u_int8_t wep104_suite[4] =
+ { RSN_OUI_BYTES, RSN_CSE_WEP104 };
+ static const u_int8_t key_mgt_unspec[4] =
+ { RSN_OUI_BYTES, RSN_ASE_8021X_UNSPEC };
+ static const u_int8_t key_mgt_psk[4] =
+ { RSN_OUI_BYTES, RSN_ASE_8021X_PSK };
+ const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn;
+ u_int8_t *frm = ie;
+ u_int8_t *selcnt;
+
+ *frm++ = IEEE80211_ELEMID_RSN;
+ *frm++ = 0; /* length filled in below */
+ ADDSHORT(frm, RSN_VERSION);
+
+ /* XXX filter out CKIP */
+
+ /* multicast cipher */
+ if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP &&
+ rsn->rsn_mcastkeylen >= 13)
+ ADDSELECTOR(frm, wep104_suite);
+ else
+ ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]);
+
+ /* unicast cipher list */
+ selcnt = frm;
+ ADDSHORT(frm, 0); /* selector count */
+ if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_AES_CCM)) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_AES_CCM]);
+ }
+ if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_TKIP)) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_TKIP]);
+ }
+
+ /* authenticator selector list */
+ selcnt = frm;
+ ADDSHORT(frm, 0); /* selector count */
+ if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, key_mgt_unspec);
+ }
+ if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) {
+ selcnt[0]++;
+ ADDSELECTOR(frm, key_mgt_psk);
+ }
+
+ /* optional capabilities */
+ if (rsn->rsn_caps != 0)
+ ADDSHORT(frm, rsn->rsn_caps);
+ /* XXX PMKID */
+
+ /* calculate element length */
+ ie[1] = frm - ie - 2;
+ KASSERT(ie[1]+2 <= sizeof(struct ieee80211_ie_wpa),
+ ("RSN IE too big, %u > %u",
+ ie[1]+2, sizeof(struct ieee80211_ie_wpa)));
+ return frm;
+#undef ADDSELECTOR
+#undef ADDSHORT
+#undef RSN_OUI_BYTES
+}
+
+/*
+ * Add a WPA/RSN element to a frame.
+ */
+static u_int8_t *
+ieee80211_add_wpa(u_int8_t *frm, struct ieee80211com *ic)
+{
+
+ KASSERT(ic->ic_flags & IEEE80211_F_WPA, ("no WPA/RSN!"));
+ if (ic->ic_flags & IEEE80211_F_WPA2)
+ frm = ieee80211_setup_rsn_ie(ic, frm);
+ if (ic->ic_flags & IEEE80211_F_WPA1)
+ frm = ieee80211_setup_wpa_ie(ic, frm);
+ return frm;
+}
+
+#define WME_OUI_BYTES 0x00, 0x50, 0xf2
+/*
+ * Add a WME information element to a frame.
+ */
+static u_int8_t *
+ieee80211_add_wme_info(u_int8_t *frm, struct ieee80211_wme_state *wme)
+{
+ static const struct ieee80211_wme_info info = {
+ .wme_id = IEEE80211_ELEMID_VENDOR,
+ .wme_len = sizeof(struct ieee80211_wme_info) - 2,
+ .wme_oui = { WME_OUI_BYTES },
+ .wme_type = WME_OUI_TYPE,
+ .wme_subtype = WME_INFO_OUI_SUBTYPE,
+ .wme_version = WME_VERSION,
+ .wme_info = 0,
+ };
+ memcpy(frm, &info, sizeof(info));
+ return frm + sizeof(info);
}
/*
+ * Add a WME parameters element to a frame.
+ */
+static u_int8_t *
+ieee80211_add_wme_param(u_int8_t *frm, struct ieee80211_wme_state *wme)
+{
+#define SM(_v, _f) (((_v) << _f##_S) & _f)
+#define ADDSHORT(frm, v) do { \
+ frm[0] = (v) & 0xff; \
+ frm[1] = (v) >> 8; \
+ frm += 2; \
+} while (0)
+ /* NB: this works 'cuz a param has an info at the front */
+ static const struct ieee80211_wme_info param = {
+ .wme_id = IEEE80211_ELEMID_VENDOR,
+ .wme_len = sizeof(struct ieee80211_wme_param) - 2,
+ .wme_oui = { WME_OUI_BYTES },
+ .wme_type = WME_OUI_TYPE,
+ .wme_subtype = WME_PARAM_OUI_SUBTYPE,
+ .wme_version = WME_VERSION,
+ };
+ int i;
+
+ memcpy(frm, &param, sizeof(param));
+ frm += __offsetof(struct ieee80211_wme_info, wme_info);
+ *frm++ = wme->wme_bssChanParams.cap_info; /* AC info */
+ *frm++ = 0; /* reserved field */
+ for (i = 0; i < WME_NUM_AC; i++) {
+ const struct wmeParams *ac =
+ &wme->wme_bssChanParams.cap_wmeParams[i];
+ *frm++ = SM(i, WME_PARAM_ACI)
+ | SM(ac->wmep_acm, WME_PARAM_ACM)
+ | SM(ac->wmep_aifsn, WME_PARAM_AIFSN)
+ ;
+ *frm++ = SM(ac->wmep_logcwmax, WME_PARAM_LOGCWMAX)
+ | SM(ac->wmep_logcwmin, WME_PARAM_LOGCWMIN)
+ ;
+ ADDSHORT(frm, ac->wmep_txopLimit);
+ }
+ return frm;
+#undef SM
+#undef ADDSHORT
+}
+#undef WME_OUI_BYTES
+
+/*
* Send a management frame. The node is for the destination (or ic_bss
* when in station mode). Nodes other than ic_bss have their reference
* count bumped to reflect our use for an indeterminant time.
@@ -294,12 +894,11 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
int type, int arg)
{
#define senderr(_x, _v) do { ic->ic_stats._v++; ret = _x; goto bad; } while (0)
- struct ifnet *ifp = &ic->ic_if;
struct mbuf *m;
u_int8_t *frm;
enum ieee80211_phymode mode;
u_int16_t capinfo;
- int ret, timer;
+ int has_challenge, is_shared_key, ret, timer, status;
KASSERT(ni != NULL, ("null node"));
@@ -308,8 +907,13 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
* the xmit is complete all the way in the driver. On error we
* will remove our reference.
*/
- if (ni != ic->ic_bss)
- ieee80211_ref_node(ni);
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_NODE,
+ "ieee80211_ref_node (%s:%u) %s refcnt %d\n",
+ __func__, __LINE__,
+ ether_sprintf(ni->ni_macaddr),
+ ieee80211_node_refcnt(ni)+1);
+ ieee80211_ref_node(ni);
+
timer = 0;
switch (type) {
case IEEE80211_FC0_SUBTYPE_PROBE_REQ:
@@ -318,22 +922,34 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
* [tlv] ssid
* [tlv] supported rates
* [tlv] extended supported rates
+ * [tlv] WME (optional)
+ * [tlv] user-specified ie's
*/
- m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA,
- 2 + ic->ic_des_esslen
+ m = ieee80211_getmgtframe(&frm,
+ 2 + IEEE80211_NWID_LEN
+ 2 + IEEE80211_RATE_SIZE
- + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE));
+ + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)
+ + sizeof(struct ieee80211_wme_param)
+ + (ic->ic_opt_ie != NULL ? ic->ic_opt_ie_len : 0)
+ );
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- m->m_data += sizeof(struct ieee80211_frame);
- frm = mtod(m, u_int8_t *);
+ senderr(ENOMEM, is_tx_nobuf);
+
frm = ieee80211_add_ssid(frm, ic->ic_des_essid, ic->ic_des_esslen);
mode = ieee80211_chan2mode(ic, ni->ni_chan);
frm = ieee80211_add_rates(frm, &ic->ic_sup_rates[mode]);
frm = ieee80211_add_xrates(frm, &ic->ic_sup_rates[mode]);
+ if (ic->ic_flags & IEEE80211_F_WME)
+ frm = ieee80211_add_wme_param(frm, &ic->ic_wme);
+ if (ic->ic_opt_ie != NULL) {
+ memcpy(frm, ic->ic_opt_ie, ic->ic_opt_ie_len);
+ frm += ic->ic_opt_ie_len;
+ }
m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *);
- timer = IEEE80211_TRANS_WAIT;
+ IEEE80211_NODE_STAT(ni, tx_probereq);
+ if (ic->ic_opmode == IEEE80211_M_STA)
+ timer = IEEE80211_TRANS_WAIT;
break;
case IEEE80211_FC0_SUBTYPE_PROBE_RESP:
@@ -346,19 +962,26 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
* [tlv] supported rates
* [tlv] parameter set (FH/DS)
* [tlv] parameter set (IBSS)
+ * [tlv] extended rate phy (ERP)
* [tlv] extended supported rates
+ * [tlv] WPA
*/
- m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA,
- 8 + 2 + 2 + 2
- + 2 + ni->ni_esslen
+ m = ieee80211_getmgtframe(&frm,
+ 8
+ + sizeof(u_int16_t)
+ + sizeof(u_int16_t)
+ + 2 + IEEE80211_NWID_LEN
+ 2 + IEEE80211_RATE_SIZE
- + (ic->ic_phytype == IEEE80211_T_FH ? 7 : 3)
+ + 7 /* max(7,3) */
+ 6
- + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE));
+ + 3
+ + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)
+ /* XXX !WPA1+WPA2 fits w/o a cluster */
+ + (ic->ic_flags & IEEE80211_F_WPA ?
+ 2*sizeof(struct ieee80211_ie_wpa) : 0)
+ );
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- m->m_data += sizeof(struct ieee80211_frame);
- frm = mtod(m, u_int8_t *);
+ senderr(ENOMEM, is_tx_nobuf);
memset(frm, 0, 8); /* timestamp should be filled later */
frm += 8;
@@ -368,17 +991,19 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
capinfo = IEEE80211_CAPINFO_IBSS;
else
capinfo = IEEE80211_CAPINFO_ESS;
- if (ic->ic_flags & IEEE80211_F_WEPON)
+ if (ic->ic_flags & IEEE80211_F_PRIVACY)
capinfo |= IEEE80211_CAPINFO_PRIVACY;
if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) &&
IEEE80211_IS_CHAN_2GHZ(ni->ni_chan))
capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE;
+ if (ic->ic_flags & IEEE80211_F_SHSLOT)
+ capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME;
*(u_int16_t *)frm = htole16(capinfo);
frm += 2;
frm = ieee80211_add_ssid(frm, ic->ic_bss->ni_essid,
ic->ic_bss->ni_esslen);
- frm = ieee80211_add_rates(frm, &ic->ic_bss->ni_rates);
+ frm = ieee80211_add_rates(frm, &ni->ni_rates);
if (ic->ic_phytype == IEEE80211_T_FH) {
*frm++ = IEEE80211_ELEMID_FHPARMS;
@@ -400,44 +1025,97 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
*frm++ = IEEE80211_ELEMID_IBSSPARMS;
*frm++ = 2;
*frm++ = 0; *frm++ = 0; /* TODO: ATIM window */
- } else { /* IEEE80211_M_HOSTAP */
- /* TODO: TIM */
- *frm++ = IEEE80211_ELEMID_TIM;
- *frm++ = 4; /* length */
- *frm++ = 0; /* DTIM count */
- *frm++ = 1; /* DTIM period */
- *frm++ = 0; /* bitmap control */
- *frm++ = 0; /* Partial Virtual Bitmap (variable length) */
}
- frm = ieee80211_add_xrates(frm, &ic->ic_bss->ni_rates);
+ if (ic->ic_flags & IEEE80211_F_WPA)
+ frm = ieee80211_add_wpa(frm, ic);
+ if (ic->ic_curmode == IEEE80211_MODE_11G)
+ frm = ieee80211_add_erp(frm, ic);
+ frm = ieee80211_add_xrates(frm, &ni->ni_rates);
m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *);
break;
case IEEE80211_FC0_SUBTYPE_AUTH:
- MGETHDR(m, M_DONTWAIT, MT_DATA);
+ status = arg >> 16;
+ arg &= 0xffff;
+ has_challenge = ((arg == IEEE80211_AUTH_SHARED_CHALLENGE ||
+ arg == IEEE80211_AUTH_SHARED_RESPONSE) &&
+ ni->ni_challenge != NULL);
+
+ /*
+ * Deduce whether we're doing open authentication or
+ * shared key authentication. We do the latter if
+ * we're in the middle of a shared key authentication
+ * handshake or if we're initiating an authentication
+ * request and configured to use shared key.
+ */
+ is_shared_key = has_challenge ||
+ arg >= IEEE80211_AUTH_SHARED_RESPONSE ||
+ (arg == IEEE80211_AUTH_SHARED_REQUEST &&
+ ic->ic_bss->ni_authmode == IEEE80211_AUTH_SHARED);
+
+ m = ieee80211_getmgtframe(&frm,
+ 3 * sizeof(u_int16_t)
+ + (has_challenge && status == IEEE80211_STATUS_SUCCESS ?
+ sizeof(u_int16_t)+IEEE80211_CHALLENGE_LEN : 0)
+ );
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- MH_ALIGN(m, 2 * 3);
- m->m_pkthdr.len = m->m_len = 6;
- frm = mtod(m, u_int8_t *);
- /* TODO: shared key auth */
- ((u_int16_t *)frm)[0] = htole16(IEEE80211_AUTH_ALG_OPEN);
+ senderr(ENOMEM, is_tx_nobuf);
+
+ ((u_int16_t *)frm)[0] =
+ (is_shared_key) ? htole16(IEEE80211_AUTH_ALG_SHARED)
+ : htole16(IEEE80211_AUTH_ALG_OPEN);
((u_int16_t *)frm)[1] = htole16(arg); /* sequence number */
- ((u_int16_t *)frm)[2] = 0; /* status */
+ ((u_int16_t *)frm)[2] = htole16(status);/* status */
+
+ if (has_challenge && status == IEEE80211_STATUS_SUCCESS) {
+ ((u_int16_t *)frm)[3] =
+ htole16((IEEE80211_CHALLENGE_LEN << 8) |
+ IEEE80211_ELEMID_CHALLENGE);
+ memcpy(&((u_int16_t *)frm)[4], ni->ni_challenge,
+ IEEE80211_CHALLENGE_LEN);
+ m->m_pkthdr.len = m->m_len =
+ 4 * sizeof(u_int16_t) + IEEE80211_CHALLENGE_LEN;
+ if (arg == IEEE80211_AUTH_SHARED_RESPONSE) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH,
+ "[%s] request encrypt frame (%s)\n",
+ ether_sprintf(ni->ni_macaddr), __func__);
+ m->m_flags |= M_LINK0; /* WEP-encrypt, please */
+ }
+ } else
+ m->m_pkthdr.len = m->m_len = 3 * sizeof(u_int16_t);
+
+ /* XXX not right for shared key */
+ if (status == IEEE80211_STATUS_SUCCESS)
+ IEEE80211_NODE_STAT(ni, tx_auth);
+ else
+ IEEE80211_NODE_STAT(ni, tx_auth_fail);
+
+ /*
+ * When 802.1x is not in use mark the port
+ * authorized at this point so traffic can flow.
+ */
+ if (ic->ic_opmode == IEEE80211_M_HOSTAP &&
+ status == IEEE80211_STATUS_SUCCESS &&
+ ni->ni_authmode != IEEE80211_AUTH_8021X)
+ ieee80211_node_authorize(ic, ni);
if (ic->ic_opmode == IEEE80211_M_STA)
timer = IEEE80211_TRANS_WAIT;
break;
case IEEE80211_FC0_SUBTYPE_DEAUTH:
- if (ifp->if_flags & IFF_DEBUG)
- if_printf(ifp, "station %s deauthenticate (reason %d)\n",
- ether_sprintf(ni->ni_macaddr), arg);
- MGETHDR(m, M_DONTWAIT, MT_DATA);
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH,
+ "[%s] send station deauthenticate (reason %d)\n",
+ ether_sprintf(ni->ni_macaddr), arg);
+ m = ieee80211_getmgtframe(&frm, sizeof(u_int16_t));
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- MH_ALIGN(m, 2);
- m->m_pkthdr.len = m->m_len = 2;
- *mtod(m, u_int16_t *) = htole16(arg); /* reason */
+ senderr(ENOMEM, is_tx_nobuf);
+ *(u_int16_t *)frm = htole16(arg); /* reason */
+ m->m_pkthdr.len = m->m_len = sizeof(u_int16_t);
+
+ IEEE80211_NODE_STAT(ni, tx_deauth);
+ IEEE80211_NODE_STAT_SET(ni, tx_deauth_code, arg);
+
+ ieee80211_node_unauthorize(ic, ni); /* port closed */
break;
case IEEE80211_FC0_SUBTYPE_ASSOC_REQ:
@@ -450,25 +1128,28 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
* [tlv] ssid
* [tlv] supported rates
* [tlv] extended supported rates
+ * [tlv] WME
+ * [tlv] user-specified ie's
*/
- m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA,
- sizeof(capinfo)
+ m = ieee80211_getmgtframe(&frm,
+ sizeof(u_int16_t)
+ sizeof(u_int16_t)
+ IEEE80211_ADDR_LEN
- + 2 + ni->ni_esslen
+ + 2 + IEEE80211_NWID_LEN
+ 2 + IEEE80211_RATE_SIZE
- + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE));
+ + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)
+ + sizeof(struct ieee80211_wme_info)
+ + (ic->ic_opt_ie != NULL ? ic->ic_opt_ie_len : 0)
+ );
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- m->m_data += sizeof(struct ieee80211_frame);
- frm = mtod(m, u_int8_t *);
+ senderr(ENOMEM, is_tx_nobuf);
capinfo = 0;
if (ic->ic_opmode == IEEE80211_M_IBSS)
capinfo |= IEEE80211_CAPINFO_IBSS;
else /* IEEE80211_M_STA */
capinfo |= IEEE80211_CAPINFO_ESS;
- if (ic->ic_flags & IEEE80211_F_WEPON)
+ if (ic->ic_flags & IEEE80211_F_PRIVACY)
capinfo |= IEEE80211_CAPINFO_PRIVACY;
/*
* NB: Some 11a AP's reject the request when
@@ -477,7 +1158,8 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) &&
IEEE80211_IS_CHAN_2GHZ(ni->ni_chan))
capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE;
- if (ic->ic_flags & IEEE80211_F_SHSLOT)
+ if ((ni->ni_capinfo & IEEE80211_CAPINFO_SHORT_SLOTTIME) &&
+ (ic->ic_caps & IEEE80211_C_SHSLOT))
capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME;
*(u_int16_t *)frm = htole16(capinfo);
frm += 2;
@@ -493,6 +1175,12 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
frm = ieee80211_add_ssid(frm, ni->ni_essid, ni->ni_esslen);
frm = ieee80211_add_rates(frm, &ni->ni_rates);
frm = ieee80211_add_xrates(frm, &ni->ni_rates);
+ if ((ic->ic_flags & IEEE80211_F_WME) && ni->ni_wme_ie != NULL)
+ frm = ieee80211_add_wme_info(frm, &ic->ic_wme);
+ if (ic->ic_opt_ie != NULL) {
+ memcpy(frm, ic->ic_opt_ie, ic->ic_opt_ie_len);
+ frm += ic->ic_opt_ie_len;
+ }
m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *);
timer = IEEE80211_TRANS_WAIT;
@@ -507,67 +1195,395 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni,
* [2] association ID
* [tlv] supported rates
* [tlv] extended supported rates
+ * [tlv] WME (if enabled and STA enabled)
*/
- m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA,
- sizeof(capinfo)
+ m = ieee80211_getmgtframe(&frm,
+ sizeof(u_int16_t)
+ sizeof(u_int16_t)
+ sizeof(u_int16_t)
+ 2 + IEEE80211_RATE_SIZE
- + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE));
+ + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)
+ + sizeof(struct ieee80211_wme_param)
+ );
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- m->m_data += sizeof(struct ieee80211_frame);
- frm = mtod(m, u_int8_t *);
+ senderr(ENOMEM, is_tx_nobuf);
capinfo = IEEE80211_CAPINFO_ESS;
- if (ic->ic_flags & IEEE80211_F_WEPON)
+ if (ic->ic_flags & IEEE80211_F_PRIVACY)
capinfo |= IEEE80211_CAPINFO_PRIVACY;
if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) &&
IEEE80211_IS_CHAN_2GHZ(ni->ni_chan))
capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE;
+ if (ic->ic_flags & IEEE80211_F_SHSLOT)
+ capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME;
*(u_int16_t *)frm = htole16(capinfo);
frm += 2;
*(u_int16_t *)frm = htole16(arg); /* status */
frm += 2;
- if (arg == IEEE80211_STATUS_SUCCESS)
+ if (arg == IEEE80211_STATUS_SUCCESS) {
*(u_int16_t *)frm = htole16(ni->ni_associd);
+ IEEE80211_NODE_STAT(ni, tx_assoc);
+ } else
+ IEEE80211_NODE_STAT(ni, tx_assoc_fail);
frm += 2;
frm = ieee80211_add_rates(frm, &ni->ni_rates);
frm = ieee80211_add_xrates(frm, &ni->ni_rates);
+ if ((ic->ic_flags & IEEE80211_F_WME) && ni->ni_wme_ie != NULL)
+ frm = ieee80211_add_wme_param(frm, &ic->ic_wme);
m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *);
break;
case IEEE80211_FC0_SUBTYPE_DISASSOC:
- if (ifp->if_flags & IFF_DEBUG)
- if_printf(ifp, "station %s disassociate (reason %d)\n",
- ether_sprintf(ni->ni_macaddr), arg);
- MGETHDR(m, M_DONTWAIT, MT_DATA);
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_ASSOC,
+ "[%s] send station disassociate (reason %d)\n",
+ ether_sprintf(ni->ni_macaddr), arg);
+ m = ieee80211_getmgtframe(&frm, sizeof(u_int16_t));
if (m == NULL)
- senderr(ENOMEM, is_tx_nombuf);
- MH_ALIGN(m, 2);
- m->m_pkthdr.len = m->m_len = 2;
- *mtod(m, u_int16_t *) = htole16(arg); /* reason */
+ senderr(ENOMEM, is_tx_nobuf);
+ *(u_int16_t *)frm = htole16(arg); /* reason */
+ m->m_pkthdr.len = m->m_len = sizeof(u_int16_t);
+
+ IEEE80211_NODE_STAT(ni, tx_disassoc);
+ IEEE80211_NODE_STAT_SET(ni, tx_disassoc_code, arg);
break;
default:
- IEEE80211_DPRINTF(("%s: invalid mgmt frame type %u\n",
- __func__, type));
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY,
+ "[%s] invalid mgmt frame type %u\n",
+ ether_sprintf(ni->ni_macaddr), type);
senderr(EINVAL, is_tx_unknownmgt);
/* NOTREACHED */
}
- ret = ieee80211_mgmt_output(ifp, ni, m, type);
+ ret = ieee80211_mgmt_output(ic, ni, m, type);
if (ret == 0) {
if (timer)
ic->ic_mgt_timer = timer;
} else {
bad:
- if (ni != ic->ic_bss) /* remove ref we added */
- ieee80211_free_node(ic, ni);
+ ieee80211_free_node(ni);
}
return ret;
#undef senderr
}
+
+/*
+ * Allocate a beacon frame and fillin the appropriate bits.
+ */
+struct mbuf *
+ieee80211_beacon_alloc(struct ieee80211com *ic, struct ieee80211_node *ni,
+ struct ieee80211_beacon_offsets *bo)
+{
+ struct ifnet *ifp = ic->ic_ifp;
+ struct ieee80211_frame *wh;
+ struct mbuf *m;
+ int pktlen;
+ u_int8_t *frm, *efrm;
+ u_int16_t capinfo;
+ struct ieee80211_rateset *rs;
+
+ /*
+ * beacon frame format
+ * [8] time stamp
+ * [2] beacon interval
+ * [2] cabability information
+ * [tlv] ssid
+ * [tlv] supported rates
+ * [3] parameter set (DS)
+ * [tlv] parameter set (IBSS/TIM)
+ * [tlv] extended rate phy (ERP)
+ * [tlv] extended supported rates
+ * [tlv] WME parameters
+ * [tlv] WPA/RSN parameters
+ * XXX Vendor-specific OIDs (e.g. Atheros)
+ * NB: we allocate the max space required for the TIM bitmap.
+ */
+ rs = &ni->ni_rates;
+ pktlen = 8 /* time stamp */
+ + sizeof(u_int16_t) /* beacon interval */
+ + sizeof(u_int16_t) /* capabilities */
+ + 2 + ni->ni_esslen /* ssid */
+ + 2 + IEEE80211_RATE_SIZE /* supported rates */
+ + 2 + 1 /* DS parameters */
+ + 2 + 4 + ic->ic_tim_len /* DTIM/IBSSPARMS */
+ + 2 + 1 /* ERP */
+ + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)
+ + (ic->ic_caps & IEEE80211_C_WME ? /* WME */
+ sizeof(struct ieee80211_wme_param) : 0)
+ + (ic->ic_caps & IEEE80211_C_WPA ? /* WPA 1+2 */
+ 2*sizeof(struct ieee80211_ie_wpa) : 0)
+ ;
+ m = ieee80211_getmgtframe(&frm, pktlen);
+ if (m == NULL) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY,
+ "%s: cannot get buf; size %u\n", __func__, pktlen);
+ ic->ic_stats.is_tx_nobuf++;
+ return NULL;
+ }
+
+ memset(frm, 0, 8); /* XXX timestamp is set by hardware/driver */
+ frm += 8;
+ *(u_int16_t *)frm = htole16(ni->ni_intval);
+ frm += 2;
+ if (ic->ic_opmode == IEEE80211_M_IBSS)
+ capinfo = IEEE80211_CAPINFO_IBSS;
+ else
+ capinfo = IEEE80211_CAPINFO_ESS;
+ if (ic->ic_flags & IEEE80211_F_PRIVACY)
+ capinfo |= IEEE80211_CAPINFO_PRIVACY;
+ if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) &&
+ IEEE80211_IS_CHAN_2GHZ(ni->ni_chan))
+ capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE;
+ if (ic->ic_flags & IEEE80211_F_SHSLOT)
+ capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME;
+ bo->bo_caps = (u_int16_t *)frm;
+ *(u_int16_t *)frm = htole16(capinfo);
+ frm += 2;
+ *frm++ = IEEE80211_ELEMID_SSID;
+ if ((ic->ic_flags & IEEE80211_F_HIDESSID) == 0) {
+ *frm++ = ni->ni_esslen;
+ memcpy(frm, ni->ni_essid, ni->ni_esslen);
+ frm += ni->ni_esslen;
+ } else
+ *frm++ = 0;
+ frm = ieee80211_add_rates(frm, rs);
+ if (ic->ic_curmode != IEEE80211_MODE_FH) {
+ *frm++ = IEEE80211_ELEMID_DSPARMS;
+ *frm++ = 1;
+ *frm++ = ieee80211_chan2ieee(ic, ni->ni_chan);
+ }
+ bo->bo_tim = frm;
+ if (ic->ic_opmode == IEEE80211_M_IBSS) {
+ *frm++ = IEEE80211_ELEMID_IBSSPARMS;
+ *frm++ = 2;
+ *frm++ = 0; *frm++ = 0; /* TODO: ATIM window */
+ bo->bo_tim_len = 0;
+ } else {
+ struct ieee80211_tim_ie *tie = (struct ieee80211_tim_ie *) frm;
+
+ tie->tim_ie = IEEE80211_ELEMID_TIM;
+ tie->tim_len = 4; /* length */
+ tie->tim_count = 0; /* DTIM count */
+ tie->tim_period = ic->ic_dtim_period; /* DTIM period */
+ tie->tim_bitctl = 0; /* bitmap control */
+ tie->tim_bitmap[0] = 0; /* Partial Virtual Bitmap */
+ frm += sizeof(struct ieee80211_tim_ie);
+ bo->bo_tim_len = 1;
+ }
+ bo->bo_trailer = frm;
+ if (ic->ic_flags & IEEE80211_F_WME) {
+ bo->bo_wme = frm;
+ frm = ieee80211_add_wme_param(frm, &ic->ic_wme);
+ }
+ if (ic->ic_flags & IEEE80211_F_WPA)
+ frm = ieee80211_add_wpa(frm, ic);
+ if (ic->ic_curmode == IEEE80211_MODE_11G)
+ frm = ieee80211_add_erp(frm, ic);
+ efrm = ieee80211_add_xrates(frm, rs);
+ bo->bo_trailer_len = efrm - bo->bo_trailer;
+ m->m_pkthdr.len = m->m_len = efrm - mtod(m, u_int8_t *);
+
+ M_PREPEND(m, sizeof(struct ieee80211_frame), M_DONTWAIT);
+ KASSERT(m != NULL, ("no space for 802.11 header?"));
+ wh = mtod(m, struct ieee80211_frame *);
+ wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_MGT |
+ IEEE80211_FC0_SUBTYPE_BEACON;
+ wh->i_fc[1] = IEEE80211_FC1_DIR_NODS;
+ *(u_int16_t *)wh->i_dur = 0;
+ IEEE80211_ADDR_COPY(wh->i_addr1, ifp->if_broadcastaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr);
+ IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid);
+ *(u_int16_t *)wh->i_seq = 0;
+
+ return m;
+}
+
+/*
+ * Update the dynamic parts of a beacon frame based on the current state.
+ */
+int
+ieee80211_beacon_update(struct ieee80211com *ic, struct ieee80211_node *ni,
+ struct ieee80211_beacon_offsets *bo, struct mbuf *m, int mcast)
+{
+ int len_changed = 0;
+ u_int16_t capinfo;
+
+ IEEE80211_BEACON_LOCK(ic);
+ /* XXX faster to recalculate entirely or just changes? */
+ if (ic->ic_opmode == IEEE80211_M_IBSS)
+ capinfo = IEEE80211_CAPINFO_IBSS;
+ else
+ capinfo = IEEE80211_CAPINFO_ESS;
+ if (ic->ic_flags & IEEE80211_F_PRIVACY)
+ capinfo |= IEEE80211_CAPINFO_PRIVACY;
+ if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) &&
+ IEEE80211_IS_CHAN_2GHZ(ni->ni_chan))
+ capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE;
+ if (ic->ic_flags & IEEE80211_F_SHSLOT)
+ capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME;
+ *bo->bo_caps = htole16(capinfo);
+
+ if (ic->ic_flags & IEEE80211_F_WME) {
+ struct ieee80211_wme_state *wme = &ic->ic_wme;
+
+ /*
+ * Check for agressive mode change. When there is
+ * significant high priority traffic in the BSS
+ * throttle back BE traffic by using conservative
+ * parameters. Otherwise BE uses agressive params
+ * to optimize performance of legacy/non-QoS traffic.
+ */
+ if (wme->wme_flags & WME_F_AGGRMODE) {
+ if (wme->wme_hipri_traffic >
+ wme->wme_hipri_switch_thresh) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_WME,
+ "%s: traffic %u, disable aggressive mode\n",
+ __func__, wme->wme_hipri_traffic);
+ wme->wme_flags &= ~WME_F_AGGRMODE;
+ ieee80211_wme_updateparams_locked(ic);
+ wme->wme_hipri_traffic =
+ wme->wme_hipri_switch_hysteresis;
+ } else
+ wme->wme_hipri_traffic = 0;
+ } else {
+ if (wme->wme_hipri_traffic <=
+ wme->wme_hipri_switch_thresh) {
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_WME,
+ "%s: traffic %u, enable aggressive mode\n",
+ __func__, wme->wme_hipri_traffic);
+ wme->wme_flags |= WME_F_AGGRMODE;
+ ieee80211_wme_updateparams_locked(ic);
+ wme->wme_hipri_traffic = 0;
+ } else
+ wme->wme_hipri_traffic =
+ wme->wme_hipri_switch_hysteresis;
+ }
+ if (ic->ic_flags & IEEE80211_F_WMEUPDATE) {
+ (void) ieee80211_add_wme_param(bo->bo_wme, wme);
+ ic->ic_flags &= ~IEEE80211_F_WMEUPDATE;
+ }
+ }
+
+ if (ic->ic_opmode == IEEE80211_M_HOSTAP) { /* NB: no IBSS support*/
+ struct ieee80211_tim_ie *tie =
+ (struct ieee80211_tim_ie *) bo->bo_tim;
+ if (ic->ic_flags & IEEE80211_F_TIMUPDATE) {
+ u_int timlen, timoff, i;
+ /*
+ * ATIM/DTIM needs updating. If it fits in the
+ * current space allocated then just copy in the
+ * new bits. Otherwise we need to move any trailing
+ * data to make room. Note that we know there is
+ * contiguous space because ieee80211_beacon_allocate
+ * insures there is space in the mbuf to write a
+ * maximal-size virtual bitmap (based on ic_max_aid).
+ */
+ /*
+ * Calculate the bitmap size and offset, copy any
+ * trailer out of the way, and then copy in the
+ * new bitmap and update the information element.
+ * Note that the tim bitmap must contain at least
+ * one byte and any offset must be even.
+ */
+ if (ic->ic_ps_pending != 0) {
+ timoff = 128; /* impossibly large */
+ for (i = 0; i < ic->ic_tim_len; i++)
+ if (ic->ic_tim_bitmap[i]) {
+ timoff = i &~ 1;
+ break;
+ }
+ KASSERT(timoff != 128, ("tim bitmap empty!"));
+ for (i = ic->ic_tim_len-1; i >= timoff; i--)
+ if (ic->ic_tim_bitmap[i])
+ break;
+ timlen = 1 + (i - timoff);
+ } else {
+ timoff = 0;
+ timlen = 1;
+ }
+ if (timlen != bo->bo_tim_len) {
+ /* copy up/down trailer */
+ ovbcopy(bo->bo_trailer, tie->tim_bitmap+timlen,
+ bo->bo_trailer_len);
+ bo->bo_trailer = tie->tim_bitmap+timlen;
+ bo->bo_wme = bo->bo_trailer;
+ bo->bo_tim_len = timlen;
+
+ /* update information element */
+ tie->tim_len = 3 + timlen;
+ tie->tim_bitctl = timoff;
+ len_changed = 1;
+ }
+ memcpy(tie->tim_bitmap, ic->ic_tim_bitmap + timoff,
+ bo->bo_tim_len);
+
+ ic->ic_flags &= ~IEEE80211_F_TIMUPDATE;
+
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_POWER,
+ "%s: TIM updated, pending %u, off %u, len %u\n",
+ __func__, ic->ic_ps_pending, timoff, timlen);
+ }
+ /* count down DTIM period */
+ if (tie->tim_count == 0)
+ tie->tim_count = tie->tim_period - 1;
+ else
+ tie->tim_count--;
+ /* update state for buffered multicast frames on DTIM */
+ if (mcast && (tie->tim_count == 1 || tie->tim_period == 1))
+ tie->tim_bitctl |= 1;
+ else
+ tie->tim_bitctl &= ~1;
+ }
+ IEEE80211_BEACON_UNLOCK(ic);
+
+ return len_changed;
+}
+
+/*
+ * Save an outbound packet for a node in power-save sleep state.
+ * The new packet is placed on the node's saved queue, and the TIM
+ * is changed, if necessary.
+ */
+void
+ieee80211_pwrsave(struct ieee80211com *ic, struct ieee80211_node *ni,
+ struct mbuf *m)
+{
+ int qlen, age;
+
+ IEEE80211_NODE_SAVEQ_LOCK(ni);
+ if (_IF_QFULL(&ni->ni_savedq)) {
+ _IF_DROP(&ni->ni_savedq);
+ IEEE80211_NODE_SAVEQ_UNLOCK(ni);
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY,
+ "[%s] pwr save q overflow, drops %d (size %d)\n",
+ ether_sprintf(ni->ni_macaddr),
+ ni->ni_savedq.ifq_drops, IEEE80211_PS_MAX_QUEUE);
+#ifdef IEEE80211_DEBUG
+ if (ieee80211_msg_dumppkts(ic))
+ ieee80211_dump_pkt(mtod(m, caddr_t), m->m_len, -1, -1);
+#endif
+ m_freem(m);
+ return;
+ }
+ /*
+ * Tag the frame with it's expiry time and insert
+ * it in the queue. The aging interval is 4 times
+ * the listen interval specified by the station.
+ * Frames that sit around too long are reclaimed
+ * using this information.
+ */
+ /* XXX handle overflow? */
+ age = ((ni->ni_intval * ic->ic_lintval) << 2) / 1024; /* TU -> secs */
+ _IEEE80211_NODE_SAVEQ_ENQUEUE(ni, m, qlen, age);
+ IEEE80211_NODE_SAVEQ_UNLOCK(ni);
+
+ IEEE80211_DPRINTF(ic, IEEE80211_MSG_POWER,
+ "[%s] save frame, %u now queued\n",
+ ether_sprintf(ni->ni_macaddr), qlen);
+
+ if (qlen == 1)
+ ic->ic_set_tim(ic, ni, 1);
+}
OpenPOWER on IntegriCloud