diff options
Diffstat (limited to 'sys/net80211/ieee80211_output.c')
-rw-r--r-- | sys/net80211/ieee80211_output.c | 1326 |
1 files changed, 1171 insertions, 155 deletions
diff --git a/sys/net80211/ieee80211_output.c b/sys/net80211/ieee80211_output.c index b08fff0..219bc25 100644 --- a/sys/net80211/ieee80211_output.c +++ b/sys/net80211/ieee80211_output.c @@ -1,6 +1,6 @@ /*- * Copyright (c) 2001 Atsushi Onoe - * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting + * Copyright (c) 2002-2004 Sam Leffler, Errno Consulting * All rights reserved. * * Redistribution and use in source and binary forms, with or without @@ -38,32 +38,43 @@ __FBSDID("$FreeBSD$"); #include <sys/param.h> #include <sys/systm.h> #include <sys/mbuf.h> -#include <sys/malloc.h> #include <sys/kernel.h> -#include <sys/socket.h> -#include <sys/sockio.h> #include <sys/endian.h> -#include <sys/errno.h> -#include <sys/bus.h> -#include <sys/proc.h> -#include <sys/sysctl.h> -#include <machine/atomic.h> +#include <sys/socket.h> -#include <net/if.h> -#include <net/if_dl.h> -#include <net/if_media.h> -#include <net/if_arp.h> +#include <net/bpf.h> #include <net/ethernet.h> +#include <net/if.h> #include <net/if_llc.h> +#include <net/if_media.h> +#include <net/if_vlan_var.h> #include <net80211/ieee80211_var.h> -#include <net/bpf.h> - #ifdef INET #include <netinet/in.h> #include <netinet/if_ether.h> +#include <netinet/in_systm.h> +#include <netinet/ip.h> +#endif + +#ifdef IEEE80211_DEBUG +/* + * Decide if an outbound management frame should be + * printed when debugging is enabled. This filters some + * of the less interesting frames that come frequently + * (e.g. beacons). + */ +static __inline int +doprint(struct ieee80211com *ic, int subtype) +{ + switch (subtype) { + case IEEE80211_FC0_SUBTYPE_PROBE_RESP: + return (ic->ic_opmode == IEEE80211_M_IBSS); + } + return 1; +} #endif /* @@ -74,14 +85,13 @@ __FBSDID("$FreeBSD$"); * reference (and potentially free'ing up any associated storage). */ static int -ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni, +ieee80211_mgmt_output(struct ieee80211com *ic, struct ieee80211_node *ni, struct mbuf *m, int type) { - struct ieee80211com *ic = (void *)ifp; + struct ifnet *ifp = ic->ic_ifp; struct ieee80211_frame *wh; KASSERT(ni != NULL, ("null node")); - ni->ni_inact = 0; /* * Yech, hack alert! We want to pass the node down to the @@ -106,28 +116,46 @@ ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni, wh->i_fc[1] = IEEE80211_FC1_DIR_NODS; *(u_int16_t *)wh->i_dur = 0; *(u_int16_t *)wh->i_seq = - htole16(ni->ni_txseq << IEEE80211_SEQ_SEQ_SHIFT); - ni->ni_txseq++; - IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr); - IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr); - IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid); + htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT); + ni->ni_txseqs[0]++; + /* + * Hack. When sending PROBE_REQ frames while scanning we + * explicitly force a broadcast rather than (as before) clobber + * ni_macaddr and ni_bssid. This is stopgap, we need a way + * to communicate this directly rather than do something + * implicit based on surrounding state. + */ + if (type == IEEE80211_FC0_SUBTYPE_PROBE_REQ && + (ic->ic_flags & IEEE80211_F_SCAN)) { + IEEE80211_ADDR_COPY(wh->i_addr1, ifp->if_broadcastaddr); + IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr); + IEEE80211_ADDR_COPY(wh->i_addr3, ifp->if_broadcastaddr); + } else { + IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr); + IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr); + IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid); + } - if (ifp->if_flags & IFF_DEBUG) { - /* avoid to print too many frames */ - if (ic->ic_opmode == IEEE80211_M_IBSS || + if ((m->m_flags & M_LINK0) != 0 && ni->ni_challenge != NULL) { + m->m_flags &= ~M_LINK0; + IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH, + "[%s] encrypting frame (%s)\n", + ether_sprintf(wh->i_addr1), __func__); + wh->i_fc[1] |= IEEE80211_FC1_WEP; + } #ifdef IEEE80211_DEBUG - ieee80211_debug > 1 || -#endif - (type & IEEE80211_FC0_SUBTYPE_MASK) != - IEEE80211_FC0_SUBTYPE_PROBE_RESP) - if_printf(ifp, "sending %s to %s on channel %u\n", - ieee80211_mgt_subtype_name[ - (type & IEEE80211_FC0_SUBTYPE_MASK) - >> IEEE80211_FC0_SUBTYPE_SHIFT], - ether_sprintf(ni->ni_macaddr), - ieee80211_chan2ieee(ic, ni->ni_chan)); + /* avoid printing too many frames */ + if ((ieee80211_msg_debug(ic) && doprint(ic, type)) || + ieee80211_msg_dumppkts(ic)) { + printf("[%s] send %s on channel %u\n", + ether_sprintf(wh->i_addr1), + ieee80211_mgt_subtype_name[ + (type & IEEE80211_FC0_SUBTYPE_MASK) >> + IEEE80211_FC0_SUBTYPE_SHIFT], + ieee80211_chan2ieee(ic, ni->ni_chan)); } - +#endif + IEEE80211_NODE_STAT(ni, tx_mgmt); IF_ENQUEUE(&ic->ic_mgtq, m); ifp->if_timer = 1; if_start(ifp); @@ -135,41 +163,315 @@ ieee80211_mgmt_output(struct ifnet *ifp, struct ieee80211_node *ni, } /* - * Encapsulate an outbound data frame. The mbuf chain is updated and - * a reference to the destination node is returned. If an error is - * encountered NULL is returned and the node reference will also be NULL. - * - * NB: The caller is responsible for free'ing a returned node reference. - * The convention is ic_bss is not reference counted; the caller must - * maintain that. + * Send a null data frame to the specified node. + */ +int +ieee80211_send_nulldata(struct ieee80211com *ic, struct ieee80211_node *ni) +{ + struct ifnet *ifp = ic->ic_ifp; + struct mbuf *m; + struct ieee80211_frame *wh; + + MGETHDR(m, M_NOWAIT, MT_HEADER); + if (m == NULL) { + /* XXX debug msg */ + ic->ic_stats.is_tx_nobuf++; + return ENOMEM; + } + m->m_pkthdr.rcvif = (void *) ieee80211_ref_node(ni); + + wh = mtod(m, struct ieee80211_frame *); + wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_DATA | + IEEE80211_FC0_SUBTYPE_NODATA; + *(u_int16_t *)wh->i_dur = 0; + *(u_int16_t *)wh->i_seq = + htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT); + ni->ni_txseqs[0]++; + + /* XXX WDS */ + wh->i_fc[1] = IEEE80211_FC1_DIR_FROMDS; + IEEE80211_ADDR_COPY(wh->i_addr1, ni->ni_macaddr); + IEEE80211_ADDR_COPY(wh->i_addr2, ni->ni_bssid); + IEEE80211_ADDR_COPY(wh->i_addr3, ic->ic_myaddr); + m->m_len = m->m_pkthdr.len = sizeof(struct ieee80211_frame); + + IEEE80211_NODE_STAT(ni, tx_data); + + IF_ENQUEUE(&ic->ic_mgtq, m); /* cheat */ + if_start(ifp); + + return 0; +} + +/* + * Insure there is sufficient contiguous space to encapsulate the + * 802.11 data frame. If room isn't already there, arrange for it. + * Drivers and cipher modules assume we have done the necessary work + * and fail rudely if they don't find the space they need. + */ +static struct mbuf * +ieee80211_mbuf_adjust(struct ieee80211com *ic, int hdrsize, + struct ieee80211_key *key, struct mbuf *m) +{ +#define TO_BE_RECLAIMED (sizeof(struct ether_header) - sizeof(struct llc)) + int needed_space = hdrsize; + + if (key != NULL) { + /* XXX belongs in crypto code? */ + needed_space += key->wk_cipher->ic_header; + /* XXX frags */ + } + /* + * We know we are called just before stripping an Ethernet + * header and prepending an LLC header. This means we know + * there will be + * sizeof(struct ether_header) - sizeof(struct llc) + * bytes recovered to which we need additional space for the + * 802.11 header and any crypto header. + */ + if (M_LEADINGSPACE(m) < needed_space - TO_BE_RECLAIMED) { + struct mbuf *n = m_gethdr(M_NOWAIT, m->m_type); + if (n == NULL) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_OUTPUT, + "%s: cannot expand storage\n", __func__); + ic->ic_stats.is_tx_nobuf++; + m_freem(m); + return NULL; + } + KASSERT(needed_space <= MHLEN, + ("not enough room, need %u got %u\n", needed_space, MHLEN)); + /* + * Setup new mbuf to have leading space to prepend the + * 802.11 header and any crypto header bits that are + * required (the latter are added when the driver calls + * back to ieee80211_crypto_encap to do crypto encapsulation). + */ + /* NB: must be first 'cuz it clobbers m_data */ + m_move_pkthdr(n, m); + n->m_len = 0; /* NB: m_gethdr does not set */ + n->m_data += needed_space; + /* + * Pull up Ethernet header to create the expected layout. + * We could use m_pullup but that's overkill (i.e. we don't + * need the actual data) and it cannot fail so do it inline + * for speed. + */ + /* NB: struct ether_header is known to be contiguous */ + n->m_len += sizeof(struct ether_header); + m->m_len -= sizeof(struct ether_header); + m->m_data += sizeof(struct ether_header); + /* + * Replace the head of the chain. + */ + n->m_next = m; + m = n; + } + return m; +#undef TO_BE_RECLAIMED +} + +/* + * Assign priority to a frame based on any vlan tag assigned + * to the station and/or any Diffserv setting in an IP header. + * Finally, if an ACM policy is setup (in station mode) it's + * applied. + */ +int +ieee80211_classify(struct ieee80211com *ic, struct mbuf *m, struct ieee80211_node *ni) +{ + int v_wme_ac, d_wme_ac, ac; +#ifdef INET + struct ether_header *eh; +#endif + + if ((ni->ni_flags & IEEE80211_NODE_QOS) == 0) { + ac = WME_AC_BE; + goto done; + } + + /* + * If node has a vlan tag then all traffic + * to it must have a matching tag. + */ + v_wme_ac = 0; + if (ni->ni_vlan != 0) { + struct m_tag *mtag = VLAN_OUTPUT_TAG(ic->ic_ifp, m); + if (mtag != NULL) { + IEEE80211_NODE_STAT(ni, tx_novlantag); + return 1; + } + if (EVL_VLANOFTAG(VLAN_TAG_VALUE(mtag)) != + EVL_VLANOFTAG(ni->ni_vlan)) { + IEEE80211_NODE_STAT(ni, tx_vlanmismatch); + return 1; + } + /* map vlan priority to AC */ + switch (EVL_PRIOFTAG(ni->ni_vlan)) { + case 1: + case 2: + v_wme_ac = WME_AC_BK; + break; + case 0: + case 3: + v_wme_ac = WME_AC_BE; + break; + case 4: + case 5: + v_wme_ac = WME_AC_VI; + break; + case 6: + case 7: + v_wme_ac = WME_AC_VO; + break; + } + } + +#ifdef INET + eh = mtod(m, struct ether_header *); + if (eh->ether_type == htons(ETHERTYPE_IP)) { + const struct ip *ip = (struct ip *) + (mtod(m, u_int8_t *) + sizeof (*eh)); + /* + * IP frame, map the TOS field. + */ + switch (ip->ip_tos) { + case 0x08: + case 0x20: + d_wme_ac = WME_AC_BK; /* background */ + break; + case 0x28: + case 0xa0: + d_wme_ac = WME_AC_VI; /* video */ + break; + case 0x30: /* voice */ + case 0xe0: + case 0x88: /* XXX UPSD */ + case 0xb8: + d_wme_ac = WME_AC_VO; + break; + default: + d_wme_ac = WME_AC_BE; + break; + } + } else { +#endif /* INET */ + d_wme_ac = WME_AC_BE; +#ifdef INET + } +#endif + /* + * Use highest priority AC. + */ + if (v_wme_ac > d_wme_ac) + ac = v_wme_ac; + else + ac = d_wme_ac; + + /* + * Apply ACM policy. + */ + if (ic->ic_opmode == IEEE80211_M_STA) { + static const int acmap[4] = { + WME_AC_BK, /* WME_AC_BE */ + WME_AC_BK, /* WME_AC_BK */ + WME_AC_BE, /* WME_AC_VI */ + WME_AC_VI, /* WME_AC_VO */ + }; + while (ac != WME_AC_BK && + ic->ic_wme.wme_wmeBssChanParams.cap_wmeParams[ac].wmep_acm) + ac = acmap[ac]; + } +done: + M_WME_SETAC(m, ac); + return 0; +} + +/* + * Return the transmit key to use in sending a frame to the specified + * destination. Multicast traffic always uses the group key which is + * installed the default tx key. Otherwise if a unicast key is set + * we use that. When no unicast key is set we fall back to the default + * transmit key unless WPA is enabled in which case there should be + * a unicast frame so we don't want to use a default key (which in + * this case is the group/multicast key). + */ +static __inline struct ieee80211_key * +ieee80211_crypto_getkey(struct ieee80211com *ic, + const u_int8_t mac[IEEE80211_ADDR_LEN], struct ieee80211_node *ni) +{ +#define KEY_UNDEFINED(k) ((k).wk_cipher == &ieee80211_cipher_none) + if (IEEE80211_IS_MULTICAST(mac)) { + if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE || + KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey])) + return NULL; + return &ic->ic_nw_keys[ic->ic_def_txkey]; + } else if (KEY_UNDEFINED(ni->ni_ucastkey)) { + if ((ic->ic_flags & IEEE80211_F_WPA) || + ic->ic_def_txkey == IEEE80211_KEYIX_NONE || + KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey])) + return NULL; + return &ic->ic_nw_keys[ic->ic_def_txkey]; + } else { + return &ni->ni_ucastkey; + } +#undef KEY_UNDEFINED +} + +/* + * Encapsulate an outbound data frame. The mbuf chain is updated. + * If an error is encountered NULL is returned. The caller is required + * to provide a node reference and pullup the ethernet header in the + * first mbuf. */ struct mbuf * -ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni) +ieee80211_encap(struct ieee80211com *ic, struct mbuf *m, + struct ieee80211_node *ni) { - struct ieee80211com *ic = (void *)ifp; struct ether_header eh; struct ieee80211_frame *wh; - struct ieee80211_node *ni = NULL; + struct ieee80211_key *key; struct llc *llc; + int hdrsize, datalen; - if (m->m_len < sizeof(struct ether_header)) { - m = m_pullup(m, sizeof(struct ether_header)); - if (m == NULL) { - ic->ic_stats.is_tx_nombuf++; - goto bad; - } - } + KASSERT(m->m_len >= sizeof(eh), ("no ethernet header!")); memcpy(&eh, mtod(m, caddr_t), sizeof(struct ether_header)); - ni = ieee80211_find_txnode(ic, eh.ether_dhost); - if (ni == NULL) { - IEEE80211_DPRINTF(("%s: no node for dst %s, discard frame\n", - __func__, ether_sprintf(eh.ether_dhost))); - ic->ic_stats.is_tx_nonode++; + /* + * Insure space for additional headers. First identify + * transmit key to use in calculating any buffer adjustments + * required. This is also used below to do privacy + * encapsulation work. Then calculate the 802.11 header + * size and any padding required by the driver. + * + * Note key may be NULL if we fall back to the default + * transmit key and that is not set. In that case the + * buffer may not be expanded as needed by the cipher + * routines, but they will/should discard it. + */ + if (ic->ic_flags & IEEE80211_F_PRIVACY) { + key = ieee80211_crypto_getkey(ic, eh.ether_dhost, ni); + if (key == NULL && eh.ether_type != htons(ETHERTYPE_PAE)) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO, + "[%s] no default transmit key\n", + ether_sprintf(ni->ni_macaddr)); + /* XXX statistic */ + } + } else + key = NULL; + /* XXX 4-address format */ + if (ni->ni_flags & IEEE80211_NODE_QOS) + hdrsize = sizeof(struct ieee80211_qosframe); + else + hdrsize = sizeof(struct ieee80211_frame); + if (ic->ic_flags & IEEE80211_F_DATAPAD) + hdrsize = roundup(hdrsize, sizeof(u_int32_t)); + m = ieee80211_mbuf_adjust(ic, hdrsize, key, m); + if (m == NULL) { + /* NB: ieee80211_mbuf_adjust handles msgs+statistics */ goto bad; } - ni->ni_inact = 0; + /* NB: this could be optimized because of ieee80211_mbuf_adjust */ m_adj(m, sizeof(struct ether_header) - sizeof(struct llc)); llc = mtod(m, struct llc *); llc->llc_dsap = llc->llc_ssap = LLC_SNAP_LSAP; @@ -178,17 +480,16 @@ ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni) llc->llc_snap.org_code[1] = 0; llc->llc_snap.org_code[2] = 0; llc->llc_snap.ether_type = eh.ether_type; - M_PREPEND(m, sizeof(struct ieee80211_frame), M_DONTWAIT); + datalen = m->m_pkthdr.len; /* NB: w/o 802.11 header */ + + M_PREPEND(m, hdrsize, M_DONTWAIT); if (m == NULL) { - ic->ic_stats.is_tx_nombuf++; + ic->ic_stats.is_tx_nobuf++; goto bad; } wh = mtod(m, struct ieee80211_frame *); wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_DATA; *(u_int16_t *)wh->i_dur = 0; - *(u_int16_t *)wh->i_seq = - htole16(ni->ni_txseq << IEEE80211_SEQ_SEQ_SHIFT); - ni->ni_txseq++; switch (ic->ic_opmode) { case IEEE80211_M_STA: wh->i_fc[1] = IEEE80211_FC1_DIR_TODS; @@ -212,21 +513,62 @@ ieee80211_encap(struct ifnet *ifp, struct mbuf *m, struct ieee80211_node **pni) case IEEE80211_M_MONITOR: goto bad; } - *pni = ni; + if (eh.ether_type != htons(ETHERTYPE_PAE) || + (key != NULL && (ic->ic_flags & IEEE80211_F_WPA))) { + /* + * IEEE 802.1X: send EAPOL frames always in the clear. + * WPA/WPA2: encrypt EAPOL keys when pairwise keys are set. + */ + if (key != NULL) { + wh->i_fc[1] |= IEEE80211_FC1_WEP; + /* XXX do fragmentation */ + if (!ieee80211_crypto_enmic(ic, key, m)) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_OUTPUT, + "[%s] enmic failed, discard frame\n", + ether_sprintf(eh.ether_dhost)); + /* XXX statistic */ + goto bad; + } + } + } + + if (ni->ni_flags & IEEE80211_NODE_QOS) { + struct ieee80211_qosframe *qwh = + (struct ieee80211_qosframe *) wh; + int ac, tid; + + ac = M_WME_GETAC(m); + /* map from access class/queue to 11e header priorty value */ + tid = WME_AC_TO_TID(ac); + qwh->i_qos[0] = tid & IEEE80211_QOS_TID; + if (ic->ic_wme.wme_wmeChanParams.cap_wmeParams[ac].wmep_noackPolicy) + qwh->i_qos[0] |= 1 << IEEE80211_QOS_ACKPOLICY_S; + qwh->i_qos[1] = 0; + qwh->i_fc[0] |= IEEE80211_FC0_SUBTYPE_QOS; + + *(u_int16_t *)wh->i_seq = + htole16(ni->ni_txseqs[tid] << IEEE80211_SEQ_SEQ_SHIFT); + ni->ni_txseqs[tid]++; + } else { + *(u_int16_t *)wh->i_seq = + htole16(ni->ni_txseqs[0] << IEEE80211_SEQ_SEQ_SHIFT); + ni->ni_txseqs[0]++; + } + + IEEE80211_NODE_STAT(ni, tx_data); + IEEE80211_NODE_STAT_ADD(ni, tx_bytes, datalen); + return m; bad: if (m != NULL) m_freem(m); - if (ni && ni != ic->ic_bss) - ieee80211_free_node(ic, ni); - *pni = NULL; return NULL; } /* * Add a supported rates element id to a frame. */ -u_int8_t * +static u_int8_t * ieee80211_add_rates(u_int8_t *frm, const struct ieee80211_rateset *rs) { int nrates; @@ -243,7 +585,7 @@ ieee80211_add_rates(u_int8_t *frm, const struct ieee80211_rateset *rs) /* * Add an extended supported rates element id to a frame. */ -u_int8_t * +static u_int8_t * ieee80211_add_xrates(u_int8_t *frm, const struct ieee80211_rateset *rs) { /* @@ -271,20 +613,278 @@ ieee80211_add_ssid(u_int8_t *frm, const u_int8_t *ssid, u_int len) return frm + len; } -static struct mbuf * -ieee80211_getmbuf(int flags, int type, u_int pktlen) +/* + * Add an erp element to a frame. + */ +static u_int8_t * +ieee80211_add_erp(u_int8_t *frm, struct ieee80211com *ic) { - struct mbuf *m; + u_int8_t erp; + + *frm++ = IEEE80211_ELEMID_ERP; + *frm++ = 1; + erp = 0; + if (ic->ic_nonerpsta != 0) + erp |= IEEE80211_ERP_NON_ERP_PRESENT; + if (ic->ic_flags & IEEE80211_F_USEPROT) + erp |= IEEE80211_ERP_USE_PROTECTION; + if (ic->ic_flags & IEEE80211_F_USEBARKER) + erp |= IEEE80211_ERP_LONG_PREAMBLE; + *frm++ = erp; + return frm; +} + +static u_int8_t * +ieee80211_setup_wpa_ie(struct ieee80211com *ic, u_int8_t *ie) +{ +#define WPA_OUI_BYTES 0x00, 0x50, 0xf2 +#define ADDSHORT(frm, v) do { \ + frm[0] = (v) & 0xff; \ + frm[1] = (v) >> 8; \ + frm += 2; \ +} while (0) +#define ADDSELECTOR(frm, sel) do { \ + memcpy(frm, sel, 4); \ + frm += 4; \ +} while (0) + static const u_int8_t oui[4] = { WPA_OUI_BYTES, WPA_OUI_TYPE }; + static const u_int8_t cipher_suite[][4] = { + { WPA_OUI_BYTES, WPA_CSE_WEP40 }, /* NB: 40-bit */ + { WPA_OUI_BYTES, WPA_CSE_TKIP }, + { 0x00, 0x00, 0x00, 0x00 }, /* XXX WRAP */ + { WPA_OUI_BYTES, WPA_CSE_CCMP }, + { 0x00, 0x00, 0x00, 0x00 }, /* XXX CKIP */ + { WPA_OUI_BYTES, WPA_CSE_NULL }, + }; + static const u_int8_t wep104_suite[4] = + { WPA_OUI_BYTES, WPA_CSE_WEP104 }; + static const u_int8_t key_mgt_unspec[4] = + { WPA_OUI_BYTES, WPA_ASE_8021X_UNSPEC }; + static const u_int8_t key_mgt_psk[4] = + { WPA_OUI_BYTES, WPA_ASE_8021X_PSK }; + const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; + u_int8_t *frm = ie; + u_int8_t *selcnt; + + *frm++ = IEEE80211_ELEMID_VENDOR; + *frm++ = 0; /* length filled in below */ + memcpy(frm, oui, sizeof(oui)); /* WPA OUI */ + frm += sizeof(oui); + ADDSHORT(frm, WPA_VERSION); - KASSERT(pktlen <= MCLBYTES, ("802.11 packet too large: %u", pktlen)); - if (pktlen <= MHLEN) - MGETHDR(m, flags, type); + /* XXX filter out CKIP */ + + /* multicast cipher */ + if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP && + rsn->rsn_mcastkeylen >= 13) + ADDSELECTOR(frm, wep104_suite); else - m = m_getcl(flags, type, M_PKTHDR); - return m; + ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]); + + /* unicast cipher list */ + selcnt = frm; + ADDSHORT(frm, 0); /* selector count */ + if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_AES_CCM)) { + selcnt[0]++; + ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_AES_CCM]); + } + if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_TKIP)) { + selcnt[0]++; + ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_TKIP]); + } + + /* authenticator selector list */ + selcnt = frm; + ADDSHORT(frm, 0); /* selector count */ + if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) { + selcnt[0]++; + ADDSELECTOR(frm, key_mgt_unspec); + } + if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) { + selcnt[0]++; + ADDSELECTOR(frm, key_mgt_psk); + } + + /* optional capabilities */ + if (rsn->rsn_caps != 0) + ADDSHORT(frm, rsn->rsn_caps); + + /* calculate element length */ + ie[1] = frm - ie - 2; + KASSERT(ie[1]+2 <= sizeof(struct ieee80211_ie_wpa), + ("WPA IE too big, %u > %u", + ie[1]+2, sizeof(struct ieee80211_ie_wpa))); + return frm; +#undef ADDSHORT +#undef ADDSELECTOR +#undef WPA_OUI_BYTES +} + +static u_int8_t * +ieee80211_setup_rsn_ie(struct ieee80211com *ic, u_int8_t *ie) +{ +#define RSN_OUI_BYTES 0x00, 0x0f, 0xac +#define ADDSHORT(frm, v) do { \ + frm[0] = (v) & 0xff; \ + frm[1] = (v) >> 8; \ + frm += 2; \ +} while (0) +#define ADDSELECTOR(frm, sel) do { \ + memcpy(frm, sel, 4); \ + frm += 4; \ +} while (0) + static const u_int8_t cipher_suite[][4] = { + { RSN_OUI_BYTES, RSN_CSE_WEP40 }, /* NB: 40-bit */ + { RSN_OUI_BYTES, RSN_CSE_TKIP }, + { RSN_OUI_BYTES, RSN_CSE_WRAP }, + { RSN_OUI_BYTES, RSN_CSE_CCMP }, + { 0x00, 0x00, 0x00, 0x00 }, /* XXX CKIP */ + { RSN_OUI_BYTES, RSN_CSE_NULL }, + }; + static const u_int8_t wep104_suite[4] = + { RSN_OUI_BYTES, RSN_CSE_WEP104 }; + static const u_int8_t key_mgt_unspec[4] = + { RSN_OUI_BYTES, RSN_ASE_8021X_UNSPEC }; + static const u_int8_t key_mgt_psk[4] = + { RSN_OUI_BYTES, RSN_ASE_8021X_PSK }; + const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; + u_int8_t *frm = ie; + u_int8_t *selcnt; + + *frm++ = IEEE80211_ELEMID_RSN; + *frm++ = 0; /* length filled in below */ + ADDSHORT(frm, RSN_VERSION); + + /* XXX filter out CKIP */ + + /* multicast cipher */ + if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP && + rsn->rsn_mcastkeylen >= 13) + ADDSELECTOR(frm, wep104_suite); + else + ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]); + + /* unicast cipher list */ + selcnt = frm; + ADDSHORT(frm, 0); /* selector count */ + if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_AES_CCM)) { + selcnt[0]++; + ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_AES_CCM]); + } + if (rsn->rsn_ucastcipherset & (1<<IEEE80211_CIPHER_TKIP)) { + selcnt[0]++; + ADDSELECTOR(frm, cipher_suite[IEEE80211_CIPHER_TKIP]); + } + + /* authenticator selector list */ + selcnt = frm; + ADDSHORT(frm, 0); /* selector count */ + if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) { + selcnt[0]++; + ADDSELECTOR(frm, key_mgt_unspec); + } + if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) { + selcnt[0]++; + ADDSELECTOR(frm, key_mgt_psk); + } + + /* optional capabilities */ + if (rsn->rsn_caps != 0) + ADDSHORT(frm, rsn->rsn_caps); + /* XXX PMKID */ + + /* calculate element length */ + ie[1] = frm - ie - 2; + KASSERT(ie[1]+2 <= sizeof(struct ieee80211_ie_wpa), + ("RSN IE too big, %u > %u", + ie[1]+2, sizeof(struct ieee80211_ie_wpa))); + return frm; +#undef ADDSELECTOR +#undef ADDSHORT +#undef RSN_OUI_BYTES +} + +/* + * Add a WPA/RSN element to a frame. + */ +static u_int8_t * +ieee80211_add_wpa(u_int8_t *frm, struct ieee80211com *ic) +{ + + KASSERT(ic->ic_flags & IEEE80211_F_WPA, ("no WPA/RSN!")); + if (ic->ic_flags & IEEE80211_F_WPA2) + frm = ieee80211_setup_rsn_ie(ic, frm); + if (ic->ic_flags & IEEE80211_F_WPA1) + frm = ieee80211_setup_wpa_ie(ic, frm); + return frm; +} + +#define WME_OUI_BYTES 0x00, 0x50, 0xf2 +/* + * Add a WME information element to a frame. + */ +static u_int8_t * +ieee80211_add_wme_info(u_int8_t *frm, struct ieee80211_wme_state *wme) +{ + static const struct ieee80211_wme_info info = { + .wme_id = IEEE80211_ELEMID_VENDOR, + .wme_len = sizeof(struct ieee80211_wme_info) - 2, + .wme_oui = { WME_OUI_BYTES }, + .wme_type = WME_OUI_TYPE, + .wme_subtype = WME_INFO_OUI_SUBTYPE, + .wme_version = WME_VERSION, + .wme_info = 0, + }; + memcpy(frm, &info, sizeof(info)); + return frm + sizeof(info); } /* + * Add a WME parameters element to a frame. + */ +static u_int8_t * +ieee80211_add_wme_param(u_int8_t *frm, struct ieee80211_wme_state *wme) +{ +#define SM(_v, _f) (((_v) << _f##_S) & _f) +#define ADDSHORT(frm, v) do { \ + frm[0] = (v) & 0xff; \ + frm[1] = (v) >> 8; \ + frm += 2; \ +} while (0) + /* NB: this works 'cuz a param has an info at the front */ + static const struct ieee80211_wme_info param = { + .wme_id = IEEE80211_ELEMID_VENDOR, + .wme_len = sizeof(struct ieee80211_wme_param) - 2, + .wme_oui = { WME_OUI_BYTES }, + .wme_type = WME_OUI_TYPE, + .wme_subtype = WME_PARAM_OUI_SUBTYPE, + .wme_version = WME_VERSION, + }; + int i; + + memcpy(frm, ¶m, sizeof(param)); + frm += __offsetof(struct ieee80211_wme_info, wme_info); + *frm++ = wme->wme_bssChanParams.cap_info; /* AC info */ + *frm++ = 0; /* reserved field */ + for (i = 0; i < WME_NUM_AC; i++) { + const struct wmeParams *ac = + &wme->wme_bssChanParams.cap_wmeParams[i]; + *frm++ = SM(i, WME_PARAM_ACI) + | SM(ac->wmep_acm, WME_PARAM_ACM) + | SM(ac->wmep_aifsn, WME_PARAM_AIFSN) + ; + *frm++ = SM(ac->wmep_logcwmax, WME_PARAM_LOGCWMAX) + | SM(ac->wmep_logcwmin, WME_PARAM_LOGCWMIN) + ; + ADDSHORT(frm, ac->wmep_txopLimit); + } + return frm; +#undef SM +#undef ADDSHORT +} +#undef WME_OUI_BYTES + +/* * Send a management frame. The node is for the destination (or ic_bss * when in station mode). Nodes other than ic_bss have their reference * count bumped to reflect our use for an indeterminant time. @@ -294,12 +894,11 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, int type, int arg) { #define senderr(_x, _v) do { ic->ic_stats._v++; ret = _x; goto bad; } while (0) - struct ifnet *ifp = &ic->ic_if; struct mbuf *m; u_int8_t *frm; enum ieee80211_phymode mode; u_int16_t capinfo; - int ret, timer; + int has_challenge, is_shared_key, ret, timer, status; KASSERT(ni != NULL, ("null node")); @@ -308,8 +907,13 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, * the xmit is complete all the way in the driver. On error we * will remove our reference. */ - if (ni != ic->ic_bss) - ieee80211_ref_node(ni); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_NODE, + "ieee80211_ref_node (%s:%u) %s refcnt %d\n", + __func__, __LINE__, + ether_sprintf(ni->ni_macaddr), + ieee80211_node_refcnt(ni)+1); + ieee80211_ref_node(ni); + timer = 0; switch (type) { case IEEE80211_FC0_SUBTYPE_PROBE_REQ: @@ -318,22 +922,34 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, * [tlv] ssid * [tlv] supported rates * [tlv] extended supported rates + * [tlv] WME (optional) + * [tlv] user-specified ie's */ - m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA, - 2 + ic->ic_des_esslen + m = ieee80211_getmgtframe(&frm, + 2 + IEEE80211_NWID_LEN + 2 + IEEE80211_RATE_SIZE - + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)); + + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE) + + sizeof(struct ieee80211_wme_param) + + (ic->ic_opt_ie != NULL ? ic->ic_opt_ie_len : 0) + ); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - m->m_data += sizeof(struct ieee80211_frame); - frm = mtod(m, u_int8_t *); + senderr(ENOMEM, is_tx_nobuf); + frm = ieee80211_add_ssid(frm, ic->ic_des_essid, ic->ic_des_esslen); mode = ieee80211_chan2mode(ic, ni->ni_chan); frm = ieee80211_add_rates(frm, &ic->ic_sup_rates[mode]); frm = ieee80211_add_xrates(frm, &ic->ic_sup_rates[mode]); + if (ic->ic_flags & IEEE80211_F_WME) + frm = ieee80211_add_wme_param(frm, &ic->ic_wme); + if (ic->ic_opt_ie != NULL) { + memcpy(frm, ic->ic_opt_ie, ic->ic_opt_ie_len); + frm += ic->ic_opt_ie_len; + } m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *); - timer = IEEE80211_TRANS_WAIT; + IEEE80211_NODE_STAT(ni, tx_probereq); + if (ic->ic_opmode == IEEE80211_M_STA) + timer = IEEE80211_TRANS_WAIT; break; case IEEE80211_FC0_SUBTYPE_PROBE_RESP: @@ -346,19 +962,26 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, * [tlv] supported rates * [tlv] parameter set (FH/DS) * [tlv] parameter set (IBSS) + * [tlv] extended rate phy (ERP) * [tlv] extended supported rates + * [tlv] WPA */ - m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA, - 8 + 2 + 2 + 2 - + 2 + ni->ni_esslen + m = ieee80211_getmgtframe(&frm, + 8 + + sizeof(u_int16_t) + + sizeof(u_int16_t) + + 2 + IEEE80211_NWID_LEN + 2 + IEEE80211_RATE_SIZE - + (ic->ic_phytype == IEEE80211_T_FH ? 7 : 3) + + 7 /* max(7,3) */ + 6 - + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)); + + 3 + + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE) + /* XXX !WPA1+WPA2 fits w/o a cluster */ + + (ic->ic_flags & IEEE80211_F_WPA ? + 2*sizeof(struct ieee80211_ie_wpa) : 0) + ); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - m->m_data += sizeof(struct ieee80211_frame); - frm = mtod(m, u_int8_t *); + senderr(ENOMEM, is_tx_nobuf); memset(frm, 0, 8); /* timestamp should be filled later */ frm += 8; @@ -368,17 +991,19 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, capinfo = IEEE80211_CAPINFO_IBSS; else capinfo = IEEE80211_CAPINFO_ESS; - if (ic->ic_flags & IEEE80211_F_WEPON) + if (ic->ic_flags & IEEE80211_F_PRIVACY) capinfo |= IEEE80211_CAPINFO_PRIVACY; if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) && IEEE80211_IS_CHAN_2GHZ(ni->ni_chan)) capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE; + if (ic->ic_flags & IEEE80211_F_SHSLOT) + capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME; *(u_int16_t *)frm = htole16(capinfo); frm += 2; frm = ieee80211_add_ssid(frm, ic->ic_bss->ni_essid, ic->ic_bss->ni_esslen); - frm = ieee80211_add_rates(frm, &ic->ic_bss->ni_rates); + frm = ieee80211_add_rates(frm, &ni->ni_rates); if (ic->ic_phytype == IEEE80211_T_FH) { *frm++ = IEEE80211_ELEMID_FHPARMS; @@ -400,44 +1025,97 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, *frm++ = IEEE80211_ELEMID_IBSSPARMS; *frm++ = 2; *frm++ = 0; *frm++ = 0; /* TODO: ATIM window */ - } else { /* IEEE80211_M_HOSTAP */ - /* TODO: TIM */ - *frm++ = IEEE80211_ELEMID_TIM; - *frm++ = 4; /* length */ - *frm++ = 0; /* DTIM count */ - *frm++ = 1; /* DTIM period */ - *frm++ = 0; /* bitmap control */ - *frm++ = 0; /* Partial Virtual Bitmap (variable length) */ } - frm = ieee80211_add_xrates(frm, &ic->ic_bss->ni_rates); + if (ic->ic_flags & IEEE80211_F_WPA) + frm = ieee80211_add_wpa(frm, ic); + if (ic->ic_curmode == IEEE80211_MODE_11G) + frm = ieee80211_add_erp(frm, ic); + frm = ieee80211_add_xrates(frm, &ni->ni_rates); m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *); break; case IEEE80211_FC0_SUBTYPE_AUTH: - MGETHDR(m, M_DONTWAIT, MT_DATA); + status = arg >> 16; + arg &= 0xffff; + has_challenge = ((arg == IEEE80211_AUTH_SHARED_CHALLENGE || + arg == IEEE80211_AUTH_SHARED_RESPONSE) && + ni->ni_challenge != NULL); + + /* + * Deduce whether we're doing open authentication or + * shared key authentication. We do the latter if + * we're in the middle of a shared key authentication + * handshake or if we're initiating an authentication + * request and configured to use shared key. + */ + is_shared_key = has_challenge || + arg >= IEEE80211_AUTH_SHARED_RESPONSE || + (arg == IEEE80211_AUTH_SHARED_REQUEST && + ic->ic_bss->ni_authmode == IEEE80211_AUTH_SHARED); + + m = ieee80211_getmgtframe(&frm, + 3 * sizeof(u_int16_t) + + (has_challenge && status == IEEE80211_STATUS_SUCCESS ? + sizeof(u_int16_t)+IEEE80211_CHALLENGE_LEN : 0) + ); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - MH_ALIGN(m, 2 * 3); - m->m_pkthdr.len = m->m_len = 6; - frm = mtod(m, u_int8_t *); - /* TODO: shared key auth */ - ((u_int16_t *)frm)[0] = htole16(IEEE80211_AUTH_ALG_OPEN); + senderr(ENOMEM, is_tx_nobuf); + + ((u_int16_t *)frm)[0] = + (is_shared_key) ? htole16(IEEE80211_AUTH_ALG_SHARED) + : htole16(IEEE80211_AUTH_ALG_OPEN); ((u_int16_t *)frm)[1] = htole16(arg); /* sequence number */ - ((u_int16_t *)frm)[2] = 0; /* status */ + ((u_int16_t *)frm)[2] = htole16(status);/* status */ + + if (has_challenge && status == IEEE80211_STATUS_SUCCESS) { + ((u_int16_t *)frm)[3] = + htole16((IEEE80211_CHALLENGE_LEN << 8) | + IEEE80211_ELEMID_CHALLENGE); + memcpy(&((u_int16_t *)frm)[4], ni->ni_challenge, + IEEE80211_CHALLENGE_LEN); + m->m_pkthdr.len = m->m_len = + 4 * sizeof(u_int16_t) + IEEE80211_CHALLENGE_LEN; + if (arg == IEEE80211_AUTH_SHARED_RESPONSE) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH, + "[%s] request encrypt frame (%s)\n", + ether_sprintf(ni->ni_macaddr), __func__); + m->m_flags |= M_LINK0; /* WEP-encrypt, please */ + } + } else + m->m_pkthdr.len = m->m_len = 3 * sizeof(u_int16_t); + + /* XXX not right for shared key */ + if (status == IEEE80211_STATUS_SUCCESS) + IEEE80211_NODE_STAT(ni, tx_auth); + else + IEEE80211_NODE_STAT(ni, tx_auth_fail); + + /* + * When 802.1x is not in use mark the port + * authorized at this point so traffic can flow. + */ + if (ic->ic_opmode == IEEE80211_M_HOSTAP && + status == IEEE80211_STATUS_SUCCESS && + ni->ni_authmode != IEEE80211_AUTH_8021X) + ieee80211_node_authorize(ic, ni); if (ic->ic_opmode == IEEE80211_M_STA) timer = IEEE80211_TRANS_WAIT; break; case IEEE80211_FC0_SUBTYPE_DEAUTH: - if (ifp->if_flags & IFF_DEBUG) - if_printf(ifp, "station %s deauthenticate (reason %d)\n", - ether_sprintf(ni->ni_macaddr), arg); - MGETHDR(m, M_DONTWAIT, MT_DATA); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_AUTH, + "[%s] send station deauthenticate (reason %d)\n", + ether_sprintf(ni->ni_macaddr), arg); + m = ieee80211_getmgtframe(&frm, sizeof(u_int16_t)); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - MH_ALIGN(m, 2); - m->m_pkthdr.len = m->m_len = 2; - *mtod(m, u_int16_t *) = htole16(arg); /* reason */ + senderr(ENOMEM, is_tx_nobuf); + *(u_int16_t *)frm = htole16(arg); /* reason */ + m->m_pkthdr.len = m->m_len = sizeof(u_int16_t); + + IEEE80211_NODE_STAT(ni, tx_deauth); + IEEE80211_NODE_STAT_SET(ni, tx_deauth_code, arg); + + ieee80211_node_unauthorize(ic, ni); /* port closed */ break; case IEEE80211_FC0_SUBTYPE_ASSOC_REQ: @@ -450,25 +1128,28 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, * [tlv] ssid * [tlv] supported rates * [tlv] extended supported rates + * [tlv] WME + * [tlv] user-specified ie's */ - m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA, - sizeof(capinfo) + m = ieee80211_getmgtframe(&frm, + sizeof(u_int16_t) + sizeof(u_int16_t) + IEEE80211_ADDR_LEN - + 2 + ni->ni_esslen + + 2 + IEEE80211_NWID_LEN + 2 + IEEE80211_RATE_SIZE - + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)); + + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE) + + sizeof(struct ieee80211_wme_info) + + (ic->ic_opt_ie != NULL ? ic->ic_opt_ie_len : 0) + ); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - m->m_data += sizeof(struct ieee80211_frame); - frm = mtod(m, u_int8_t *); + senderr(ENOMEM, is_tx_nobuf); capinfo = 0; if (ic->ic_opmode == IEEE80211_M_IBSS) capinfo |= IEEE80211_CAPINFO_IBSS; else /* IEEE80211_M_STA */ capinfo |= IEEE80211_CAPINFO_ESS; - if (ic->ic_flags & IEEE80211_F_WEPON) + if (ic->ic_flags & IEEE80211_F_PRIVACY) capinfo |= IEEE80211_CAPINFO_PRIVACY; /* * NB: Some 11a AP's reject the request when @@ -477,7 +1158,8 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) && IEEE80211_IS_CHAN_2GHZ(ni->ni_chan)) capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE; - if (ic->ic_flags & IEEE80211_F_SHSLOT) + if ((ni->ni_capinfo & IEEE80211_CAPINFO_SHORT_SLOTTIME) && + (ic->ic_caps & IEEE80211_C_SHSLOT)) capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME; *(u_int16_t *)frm = htole16(capinfo); frm += 2; @@ -493,6 +1175,12 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, frm = ieee80211_add_ssid(frm, ni->ni_essid, ni->ni_esslen); frm = ieee80211_add_rates(frm, &ni->ni_rates); frm = ieee80211_add_xrates(frm, &ni->ni_rates); + if ((ic->ic_flags & IEEE80211_F_WME) && ni->ni_wme_ie != NULL) + frm = ieee80211_add_wme_info(frm, &ic->ic_wme); + if (ic->ic_opt_ie != NULL) { + memcpy(frm, ic->ic_opt_ie, ic->ic_opt_ie_len); + frm += ic->ic_opt_ie_len; + } m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *); timer = IEEE80211_TRANS_WAIT; @@ -507,67 +1195,395 @@ ieee80211_send_mgmt(struct ieee80211com *ic, struct ieee80211_node *ni, * [2] association ID * [tlv] supported rates * [tlv] extended supported rates + * [tlv] WME (if enabled and STA enabled) */ - m = ieee80211_getmbuf(M_DONTWAIT, MT_DATA, - sizeof(capinfo) + m = ieee80211_getmgtframe(&frm, + sizeof(u_int16_t) + sizeof(u_int16_t) + sizeof(u_int16_t) + 2 + IEEE80211_RATE_SIZE - + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE)); + + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE) + + sizeof(struct ieee80211_wme_param) + ); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - m->m_data += sizeof(struct ieee80211_frame); - frm = mtod(m, u_int8_t *); + senderr(ENOMEM, is_tx_nobuf); capinfo = IEEE80211_CAPINFO_ESS; - if (ic->ic_flags & IEEE80211_F_WEPON) + if (ic->ic_flags & IEEE80211_F_PRIVACY) capinfo |= IEEE80211_CAPINFO_PRIVACY; if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) && IEEE80211_IS_CHAN_2GHZ(ni->ni_chan)) capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE; + if (ic->ic_flags & IEEE80211_F_SHSLOT) + capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME; *(u_int16_t *)frm = htole16(capinfo); frm += 2; *(u_int16_t *)frm = htole16(arg); /* status */ frm += 2; - if (arg == IEEE80211_STATUS_SUCCESS) + if (arg == IEEE80211_STATUS_SUCCESS) { *(u_int16_t *)frm = htole16(ni->ni_associd); + IEEE80211_NODE_STAT(ni, tx_assoc); + } else + IEEE80211_NODE_STAT(ni, tx_assoc_fail); frm += 2; frm = ieee80211_add_rates(frm, &ni->ni_rates); frm = ieee80211_add_xrates(frm, &ni->ni_rates); + if ((ic->ic_flags & IEEE80211_F_WME) && ni->ni_wme_ie != NULL) + frm = ieee80211_add_wme_param(frm, &ic->ic_wme); m->m_pkthdr.len = m->m_len = frm - mtod(m, u_int8_t *); break; case IEEE80211_FC0_SUBTYPE_DISASSOC: - if (ifp->if_flags & IFF_DEBUG) - if_printf(ifp, "station %s disassociate (reason %d)\n", - ether_sprintf(ni->ni_macaddr), arg); - MGETHDR(m, M_DONTWAIT, MT_DATA); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_ASSOC, + "[%s] send station disassociate (reason %d)\n", + ether_sprintf(ni->ni_macaddr), arg); + m = ieee80211_getmgtframe(&frm, sizeof(u_int16_t)); if (m == NULL) - senderr(ENOMEM, is_tx_nombuf); - MH_ALIGN(m, 2); - m->m_pkthdr.len = m->m_len = 2; - *mtod(m, u_int16_t *) = htole16(arg); /* reason */ + senderr(ENOMEM, is_tx_nobuf); + *(u_int16_t *)frm = htole16(arg); /* reason */ + m->m_pkthdr.len = m->m_len = sizeof(u_int16_t); + + IEEE80211_NODE_STAT(ni, tx_disassoc); + IEEE80211_NODE_STAT_SET(ni, tx_disassoc_code, arg); break; default: - IEEE80211_DPRINTF(("%s: invalid mgmt frame type %u\n", - __func__, type)); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY, + "[%s] invalid mgmt frame type %u\n", + ether_sprintf(ni->ni_macaddr), type); senderr(EINVAL, is_tx_unknownmgt); /* NOTREACHED */ } - ret = ieee80211_mgmt_output(ifp, ni, m, type); + ret = ieee80211_mgmt_output(ic, ni, m, type); if (ret == 0) { if (timer) ic->ic_mgt_timer = timer; } else { bad: - if (ni != ic->ic_bss) /* remove ref we added */ - ieee80211_free_node(ic, ni); + ieee80211_free_node(ni); } return ret; #undef senderr } + +/* + * Allocate a beacon frame and fillin the appropriate bits. + */ +struct mbuf * +ieee80211_beacon_alloc(struct ieee80211com *ic, struct ieee80211_node *ni, + struct ieee80211_beacon_offsets *bo) +{ + struct ifnet *ifp = ic->ic_ifp; + struct ieee80211_frame *wh; + struct mbuf *m; + int pktlen; + u_int8_t *frm, *efrm; + u_int16_t capinfo; + struct ieee80211_rateset *rs; + + /* + * beacon frame format + * [8] time stamp + * [2] beacon interval + * [2] cabability information + * [tlv] ssid + * [tlv] supported rates + * [3] parameter set (DS) + * [tlv] parameter set (IBSS/TIM) + * [tlv] extended rate phy (ERP) + * [tlv] extended supported rates + * [tlv] WME parameters + * [tlv] WPA/RSN parameters + * XXX Vendor-specific OIDs (e.g. Atheros) + * NB: we allocate the max space required for the TIM bitmap. + */ + rs = &ni->ni_rates; + pktlen = 8 /* time stamp */ + + sizeof(u_int16_t) /* beacon interval */ + + sizeof(u_int16_t) /* capabilities */ + + 2 + ni->ni_esslen /* ssid */ + + 2 + IEEE80211_RATE_SIZE /* supported rates */ + + 2 + 1 /* DS parameters */ + + 2 + 4 + ic->ic_tim_len /* DTIM/IBSSPARMS */ + + 2 + 1 /* ERP */ + + 2 + (IEEE80211_RATE_MAXSIZE - IEEE80211_RATE_SIZE) + + (ic->ic_caps & IEEE80211_C_WME ? /* WME */ + sizeof(struct ieee80211_wme_param) : 0) + + (ic->ic_caps & IEEE80211_C_WPA ? /* WPA 1+2 */ + 2*sizeof(struct ieee80211_ie_wpa) : 0) + ; + m = ieee80211_getmgtframe(&frm, pktlen); + if (m == NULL) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY, + "%s: cannot get buf; size %u\n", __func__, pktlen); + ic->ic_stats.is_tx_nobuf++; + return NULL; + } + + memset(frm, 0, 8); /* XXX timestamp is set by hardware/driver */ + frm += 8; + *(u_int16_t *)frm = htole16(ni->ni_intval); + frm += 2; + if (ic->ic_opmode == IEEE80211_M_IBSS) + capinfo = IEEE80211_CAPINFO_IBSS; + else + capinfo = IEEE80211_CAPINFO_ESS; + if (ic->ic_flags & IEEE80211_F_PRIVACY) + capinfo |= IEEE80211_CAPINFO_PRIVACY; + if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) && + IEEE80211_IS_CHAN_2GHZ(ni->ni_chan)) + capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE; + if (ic->ic_flags & IEEE80211_F_SHSLOT) + capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME; + bo->bo_caps = (u_int16_t *)frm; + *(u_int16_t *)frm = htole16(capinfo); + frm += 2; + *frm++ = IEEE80211_ELEMID_SSID; + if ((ic->ic_flags & IEEE80211_F_HIDESSID) == 0) { + *frm++ = ni->ni_esslen; + memcpy(frm, ni->ni_essid, ni->ni_esslen); + frm += ni->ni_esslen; + } else + *frm++ = 0; + frm = ieee80211_add_rates(frm, rs); + if (ic->ic_curmode != IEEE80211_MODE_FH) { + *frm++ = IEEE80211_ELEMID_DSPARMS; + *frm++ = 1; + *frm++ = ieee80211_chan2ieee(ic, ni->ni_chan); + } + bo->bo_tim = frm; + if (ic->ic_opmode == IEEE80211_M_IBSS) { + *frm++ = IEEE80211_ELEMID_IBSSPARMS; + *frm++ = 2; + *frm++ = 0; *frm++ = 0; /* TODO: ATIM window */ + bo->bo_tim_len = 0; + } else { + struct ieee80211_tim_ie *tie = (struct ieee80211_tim_ie *) frm; + + tie->tim_ie = IEEE80211_ELEMID_TIM; + tie->tim_len = 4; /* length */ + tie->tim_count = 0; /* DTIM count */ + tie->tim_period = ic->ic_dtim_period; /* DTIM period */ + tie->tim_bitctl = 0; /* bitmap control */ + tie->tim_bitmap[0] = 0; /* Partial Virtual Bitmap */ + frm += sizeof(struct ieee80211_tim_ie); + bo->bo_tim_len = 1; + } + bo->bo_trailer = frm; + if (ic->ic_flags & IEEE80211_F_WME) { + bo->bo_wme = frm; + frm = ieee80211_add_wme_param(frm, &ic->ic_wme); + } + if (ic->ic_flags & IEEE80211_F_WPA) + frm = ieee80211_add_wpa(frm, ic); + if (ic->ic_curmode == IEEE80211_MODE_11G) + frm = ieee80211_add_erp(frm, ic); + efrm = ieee80211_add_xrates(frm, rs); + bo->bo_trailer_len = efrm - bo->bo_trailer; + m->m_pkthdr.len = m->m_len = efrm - mtod(m, u_int8_t *); + + M_PREPEND(m, sizeof(struct ieee80211_frame), M_DONTWAIT); + KASSERT(m != NULL, ("no space for 802.11 header?")); + wh = mtod(m, struct ieee80211_frame *); + wh->i_fc[0] = IEEE80211_FC0_VERSION_0 | IEEE80211_FC0_TYPE_MGT | + IEEE80211_FC0_SUBTYPE_BEACON; + wh->i_fc[1] = IEEE80211_FC1_DIR_NODS; + *(u_int16_t *)wh->i_dur = 0; + IEEE80211_ADDR_COPY(wh->i_addr1, ifp->if_broadcastaddr); + IEEE80211_ADDR_COPY(wh->i_addr2, ic->ic_myaddr); + IEEE80211_ADDR_COPY(wh->i_addr3, ni->ni_bssid); + *(u_int16_t *)wh->i_seq = 0; + + return m; +} + +/* + * Update the dynamic parts of a beacon frame based on the current state. + */ +int +ieee80211_beacon_update(struct ieee80211com *ic, struct ieee80211_node *ni, + struct ieee80211_beacon_offsets *bo, struct mbuf *m, int mcast) +{ + int len_changed = 0; + u_int16_t capinfo; + + IEEE80211_BEACON_LOCK(ic); + /* XXX faster to recalculate entirely or just changes? */ + if (ic->ic_opmode == IEEE80211_M_IBSS) + capinfo = IEEE80211_CAPINFO_IBSS; + else + capinfo = IEEE80211_CAPINFO_ESS; + if (ic->ic_flags & IEEE80211_F_PRIVACY) + capinfo |= IEEE80211_CAPINFO_PRIVACY; + if ((ic->ic_flags & IEEE80211_F_SHPREAMBLE) && + IEEE80211_IS_CHAN_2GHZ(ni->ni_chan)) + capinfo |= IEEE80211_CAPINFO_SHORT_PREAMBLE; + if (ic->ic_flags & IEEE80211_F_SHSLOT) + capinfo |= IEEE80211_CAPINFO_SHORT_SLOTTIME; + *bo->bo_caps = htole16(capinfo); + + if (ic->ic_flags & IEEE80211_F_WME) { + struct ieee80211_wme_state *wme = &ic->ic_wme; + + /* + * Check for agressive mode change. When there is + * significant high priority traffic in the BSS + * throttle back BE traffic by using conservative + * parameters. Otherwise BE uses agressive params + * to optimize performance of legacy/non-QoS traffic. + */ + if (wme->wme_flags & WME_F_AGGRMODE) { + if (wme->wme_hipri_traffic > + wme->wme_hipri_switch_thresh) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_WME, + "%s: traffic %u, disable aggressive mode\n", + __func__, wme->wme_hipri_traffic); + wme->wme_flags &= ~WME_F_AGGRMODE; + ieee80211_wme_updateparams_locked(ic); + wme->wme_hipri_traffic = + wme->wme_hipri_switch_hysteresis; + } else + wme->wme_hipri_traffic = 0; + } else { + if (wme->wme_hipri_traffic <= + wme->wme_hipri_switch_thresh) { + IEEE80211_DPRINTF(ic, IEEE80211_MSG_WME, + "%s: traffic %u, enable aggressive mode\n", + __func__, wme->wme_hipri_traffic); + wme->wme_flags |= WME_F_AGGRMODE; + ieee80211_wme_updateparams_locked(ic); + wme->wme_hipri_traffic = 0; + } else + wme->wme_hipri_traffic = + wme->wme_hipri_switch_hysteresis; + } + if (ic->ic_flags & IEEE80211_F_WMEUPDATE) { + (void) ieee80211_add_wme_param(bo->bo_wme, wme); + ic->ic_flags &= ~IEEE80211_F_WMEUPDATE; + } + } + + if (ic->ic_opmode == IEEE80211_M_HOSTAP) { /* NB: no IBSS support*/ + struct ieee80211_tim_ie *tie = + (struct ieee80211_tim_ie *) bo->bo_tim; + if (ic->ic_flags & IEEE80211_F_TIMUPDATE) { + u_int timlen, timoff, i; + /* + * ATIM/DTIM needs updating. If it fits in the + * current space allocated then just copy in the + * new bits. Otherwise we need to move any trailing + * data to make room. Note that we know there is + * contiguous space because ieee80211_beacon_allocate + * insures there is space in the mbuf to write a + * maximal-size virtual bitmap (based on ic_max_aid). + */ + /* + * Calculate the bitmap size and offset, copy any + * trailer out of the way, and then copy in the + * new bitmap and update the information element. + * Note that the tim bitmap must contain at least + * one byte and any offset must be even. + */ + if (ic->ic_ps_pending != 0) { + timoff = 128; /* impossibly large */ + for (i = 0; i < ic->ic_tim_len; i++) + if (ic->ic_tim_bitmap[i]) { + timoff = i &~ 1; + break; + } + KASSERT(timoff != 128, ("tim bitmap empty!")); + for (i = ic->ic_tim_len-1; i >= timoff; i--) + if (ic->ic_tim_bitmap[i]) + break; + timlen = 1 + (i - timoff); + } else { + timoff = 0; + timlen = 1; + } + if (timlen != bo->bo_tim_len) { + /* copy up/down trailer */ + ovbcopy(bo->bo_trailer, tie->tim_bitmap+timlen, + bo->bo_trailer_len); + bo->bo_trailer = tie->tim_bitmap+timlen; + bo->bo_wme = bo->bo_trailer; + bo->bo_tim_len = timlen; + + /* update information element */ + tie->tim_len = 3 + timlen; + tie->tim_bitctl = timoff; + len_changed = 1; + } + memcpy(tie->tim_bitmap, ic->ic_tim_bitmap + timoff, + bo->bo_tim_len); + + ic->ic_flags &= ~IEEE80211_F_TIMUPDATE; + + IEEE80211_DPRINTF(ic, IEEE80211_MSG_POWER, + "%s: TIM updated, pending %u, off %u, len %u\n", + __func__, ic->ic_ps_pending, timoff, timlen); + } + /* count down DTIM period */ + if (tie->tim_count == 0) + tie->tim_count = tie->tim_period - 1; + else + tie->tim_count--; + /* update state for buffered multicast frames on DTIM */ + if (mcast && (tie->tim_count == 1 || tie->tim_period == 1)) + tie->tim_bitctl |= 1; + else + tie->tim_bitctl &= ~1; + } + IEEE80211_BEACON_UNLOCK(ic); + + return len_changed; +} + +/* + * Save an outbound packet for a node in power-save sleep state. + * The new packet is placed on the node's saved queue, and the TIM + * is changed, if necessary. + */ +void +ieee80211_pwrsave(struct ieee80211com *ic, struct ieee80211_node *ni, + struct mbuf *m) +{ + int qlen, age; + + IEEE80211_NODE_SAVEQ_LOCK(ni); + if (_IF_QFULL(&ni->ni_savedq)) { + _IF_DROP(&ni->ni_savedq); + IEEE80211_NODE_SAVEQ_UNLOCK(ni); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_ANY, + "[%s] pwr save q overflow, drops %d (size %d)\n", + ether_sprintf(ni->ni_macaddr), + ni->ni_savedq.ifq_drops, IEEE80211_PS_MAX_QUEUE); +#ifdef IEEE80211_DEBUG + if (ieee80211_msg_dumppkts(ic)) + ieee80211_dump_pkt(mtod(m, caddr_t), m->m_len, -1, -1); +#endif + m_freem(m); + return; + } + /* + * Tag the frame with it's expiry time and insert + * it in the queue. The aging interval is 4 times + * the listen interval specified by the station. + * Frames that sit around too long are reclaimed + * using this information. + */ + /* XXX handle overflow? */ + age = ((ni->ni_intval * ic->ic_lintval) << 2) / 1024; /* TU -> secs */ + _IEEE80211_NODE_SAVEQ_ENQUEUE(ni, m, qlen, age); + IEEE80211_NODE_SAVEQ_UNLOCK(ni); + + IEEE80211_DPRINTF(ic, IEEE80211_MSG_POWER, + "[%s] save frame, %u now queued\n", + ether_sprintf(ni->ni_macaddr), qlen); + + if (qlen == 1) + ic->ic_set_tim(ic, ni, 1); +} |