[PATCH 1/3] MSCS: Extend MSCS response handling
Andrei Otcheretianski
andrei.otcheretianski at intel.com
Tue Dec 26 01:45:23 PST 2023
From: Daniel Gabay <daniel.gabay at intel.com>
Align MSCS response hanlding as described in section 11.25.3
of Draft P802.11REVme_D4.0:
1. AP may send unsolicited MSCS response using dialog_token == 0.
Instead of dropping the frame due to dialog_token mismatch, accept
it and set the status accordingly.
2. If an MSCS descriptor element is present in a MSCS response
frame that does not indicate a status of "SUCCESS", the request
type field is set to "change" - the element indicates a suggested
set of parameters that could be accepted by the AP in response to a
subsequent request by the non-AP STA.
Handle both action frame and (Re)Association response with change
request by extending WPA_EVENT_MSCS_RESULT with the change values.
Note: since we extend MSCS_RESULT event, move the original event from
both action frame / assoc response handlers to a common function that
handles now both 'change' and other response.
Signed-off-by: Daniel Gabay <daniel.gabay at intel.com>
---
wpa_supplicant/robust_av.c | 87 +++++++++++++++++++++++++++++++++-----
1 file changed, 77 insertions(+), 10 deletions(-)
diff --git a/wpa_supplicant/robust_av.c b/wpa_supplicant/robust_av.c
index 3a095603eb..b421143aee 100644
--- a/wpa_supplicant/robust_av.c
+++ b/wpa_supplicant/robust_av.c
@@ -664,27 +664,95 @@ void free_up_scs_desc(struct scs_robust_av_data *data)
}
+static void wpas_parse_mscs_resp(struct wpa_supplicant *wpa_s,
+ u16 status, const u8 *bssid,
+ const u8 *mscs_desc_ie)
+{
+ struct robust_av_data robust_av;
+ const u8 *pos;
+
+ /* it is optional in robust av action frame */
+ if (!mscs_desc_ie)
+ goto event_mscs_result;
+
+ /* ext_id(1) + request type(1) + upc(2) + stream timeout(4) */
+ if (mscs_desc_ie[1] < 8) {
+ wpa_printf(MSG_INFO,
+ "MSCS: Drop received frame: invalid descriptor IE len: %d",
+ mscs_desc_ie[1]);
+ return;
+ }
+
+ os_memset(&robust_av, 0, sizeof(struct robust_av_data));
+
+ pos = &mscs_desc_ie[3];
+ robust_av.request_type = *pos++;
+
+ switch (robust_av.request_type) {
+ case SCS_REQ_CHANGE:
+ /*
+ * inform the suggested set of parameters that could be accepted
+ * by the AP in response to a subsequent request by the station
+ */
+ robust_av.up_bitmap = *pos++;
+ robust_av.up_limit = *pos++;
+ robust_av.stream_timeout = WPA_GET_LE32(pos);
+ wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_MSCS_RESULT "bssid=" MACSTR
+ " status_code=%u change up_bitmap=%u up_limit=%u stream_timeout=%u",
+ MAC2STR(bssid), status, robust_av.up_bitmap,
+ robust_av.up_limit, robust_av.stream_timeout);
+ wpa_s->mscs_setup_done = false;
+ return;
+ case SCS_REQ_ADD:
+ /*
+ * this type is used in assoc response MSCS descriptor element
+ * if no change required.
+ */
+ break;
+ default:
+ wpa_printf(MSG_INFO,
+ "MSCS: Drop received frame with invalid type: %u",
+ robust_av.request_type);
+ return;
+ }
+
+event_mscs_result:
+ wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_MSCS_RESULT "bssid=" MACSTR
+ " status_code=%u", MAC2STR(bssid), status);
+ wpa_s->mscs_setup_done = status == WLAN_STATUS_SUCCESS;
+}
+
void wpas_handle_robust_av_recv_action(struct wpa_supplicant *wpa_s,
const u8 *src, const u8 *buf, size_t len)
{
u8 dialog_token;
u16 status_code;
+ const u8 *pos = buf;
+ const u8 *mscs_desc_ie;
if (len < 3)
return;
- dialog_token = *buf++;
- if (dialog_token != wpa_s->robust_av.dialog_token) {
+ dialog_token = *pos++;
+ /* AP sets dialog token to 0 for unsolicited response */
+ if (!dialog_token && !wpa_s->mscs_setup_done) {
wpa_printf(MSG_INFO,
- "MSCS: Drop received frame due to dialog token mismatch: received:%u expected:%u",
+ "MSCS: Drop unsolicited received frame: inactive");
+ return;
+ } else if (dialog_token &&
+ dialog_token != wpa_s->robust_av.dialog_token) {
+ wpa_printf(MSG_INFO,
+ "MSCS: Drop frame: dialog token mismatch (got:%u expected:%u",
dialog_token, wpa_s->robust_av.dialog_token);
return;
}
- status_code = WPA_GET_LE16(buf);
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_MSCS_RESULT "bssid=" MACSTR
- " status_code=%u", MAC2STR(src), status_code);
- wpa_s->mscs_setup_done = status_code == WLAN_STATUS_SUCCESS;
+ status_code = WPA_GET_LE16(pos);
+
+ /* skip 3 bytes of dialog token(1) + status code(2) */
+ mscs_desc_ie = get_ie_ext(buf + 3, len - 3,
+ WLAN_EID_EXT_MSCS_DESCRIPTOR);
+ wpas_parse_mscs_resp(wpa_s, status_code, src, mscs_desc_ie);
}
@@ -712,9 +780,8 @@ void wpas_handle_assoc_resp_mscs(struct wpa_supplicant *wpa_s, const u8 *bssid,
return;
status = WPA_GET_LE16(mscs_status + 2);
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_MSCS_RESULT "bssid=" MACSTR
- " status_code=%u", MAC2STR(bssid), status);
- wpa_s->mscs_setup_done = status == WLAN_STATUS_SUCCESS;
+
+ wpas_parse_mscs_resp(wpa_s, status, bssid, mscs_desc_ie);
}
--
2.43.0
More information about the Hostap
mailing list