1e28a4053SRui Paulo /*
2e28a4053SRui Paulo * IEEE 802.1X-2004 Authenticator - State dump
3*5b9c547cSRui Paulo * Copyright (c) 2002-2013, Jouni Malinen <j@w1.fi>
4e28a4053SRui Paulo *
5f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo * See README for more details.
7e28a4053SRui Paulo */
8e28a4053SRui Paulo
9e28a4053SRui Paulo #include "includes.h"
10e28a4053SRui Paulo
11e28a4053SRui Paulo #include "common.h"
12e28a4053SRui Paulo #include "eap_server/eap.h"
13e28a4053SRui Paulo #include "eapol_auth_sm.h"
14e28a4053SRui Paulo #include "eapol_auth_sm_i.h"
15e28a4053SRui Paulo
port_type_txt(PortTypes pt)16e28a4053SRui Paulo static inline const char * port_type_txt(PortTypes pt)
17e28a4053SRui Paulo {
18e28a4053SRui Paulo switch (pt) {
19e28a4053SRui Paulo case ForceUnauthorized: return "ForceUnauthorized";
20e28a4053SRui Paulo case ForceAuthorized: return "ForceAuthorized";
21e28a4053SRui Paulo case Auto: return "Auto";
22e28a4053SRui Paulo default: return "Unknown";
23e28a4053SRui Paulo }
24e28a4053SRui Paulo }
25e28a4053SRui Paulo
26e28a4053SRui Paulo
port_state_txt(PortState ps)27e28a4053SRui Paulo static inline const char * port_state_txt(PortState ps)
28e28a4053SRui Paulo {
29e28a4053SRui Paulo switch (ps) {
30e28a4053SRui Paulo case Unauthorized: return "Unauthorized";
31e28a4053SRui Paulo case Authorized: return "Authorized";
32e28a4053SRui Paulo default: return "Unknown";
33e28a4053SRui Paulo }
34e28a4053SRui Paulo }
35e28a4053SRui Paulo
36e28a4053SRui Paulo
ctrl_dir_txt(ControlledDirection dir)37e28a4053SRui Paulo static inline const char * ctrl_dir_txt(ControlledDirection dir)
38e28a4053SRui Paulo {
39e28a4053SRui Paulo switch (dir) {
40e28a4053SRui Paulo case Both: return "Both";
41e28a4053SRui Paulo case In: return "In";
42e28a4053SRui Paulo default: return "Unknown";
43e28a4053SRui Paulo }
44e28a4053SRui Paulo }
45e28a4053SRui Paulo
46e28a4053SRui Paulo
auth_pae_state_txt(int s)47e28a4053SRui Paulo static inline const char * auth_pae_state_txt(int s)
48e28a4053SRui Paulo {
49e28a4053SRui Paulo switch (s) {
50e28a4053SRui Paulo case AUTH_PAE_INITIALIZE: return "INITIALIZE";
51e28a4053SRui Paulo case AUTH_PAE_DISCONNECTED: return "DISCONNECTED";
52e28a4053SRui Paulo case AUTH_PAE_CONNECTING: return "CONNECTING";
53e28a4053SRui Paulo case AUTH_PAE_AUTHENTICATING: return "AUTHENTICATING";
54e28a4053SRui Paulo case AUTH_PAE_AUTHENTICATED: return "AUTHENTICATED";
55e28a4053SRui Paulo case AUTH_PAE_ABORTING: return "ABORTING";
56e28a4053SRui Paulo case AUTH_PAE_HELD: return "HELD";
57e28a4053SRui Paulo case AUTH_PAE_FORCE_AUTH: return "FORCE_AUTH";
58e28a4053SRui Paulo case AUTH_PAE_FORCE_UNAUTH: return "FORCE_UNAUTH";
59e28a4053SRui Paulo case AUTH_PAE_RESTART: return "RESTART";
60e28a4053SRui Paulo default: return "Unknown";
61e28a4053SRui Paulo }
62e28a4053SRui Paulo }
63e28a4053SRui Paulo
64e28a4053SRui Paulo
be_auth_state_txt(int s)65e28a4053SRui Paulo static inline const char * be_auth_state_txt(int s)
66e28a4053SRui Paulo {
67e28a4053SRui Paulo switch (s) {
68e28a4053SRui Paulo case BE_AUTH_REQUEST: return "REQUEST";
69e28a4053SRui Paulo case BE_AUTH_RESPONSE: return "RESPONSE";
70e28a4053SRui Paulo case BE_AUTH_SUCCESS: return "SUCCESS";
71e28a4053SRui Paulo case BE_AUTH_FAIL: return "FAIL";
72e28a4053SRui Paulo case BE_AUTH_TIMEOUT: return "TIMEOUT";
73e28a4053SRui Paulo case BE_AUTH_IDLE: return "IDLE";
74e28a4053SRui Paulo case BE_AUTH_INITIALIZE: return "INITIALIZE";
75e28a4053SRui Paulo case BE_AUTH_IGNORE: return "IGNORE";
76e28a4053SRui Paulo default: return "Unknown";
77e28a4053SRui Paulo }
78e28a4053SRui Paulo }
79e28a4053SRui Paulo
80e28a4053SRui Paulo
reauth_timer_state_txt(int s)81e28a4053SRui Paulo static inline const char * reauth_timer_state_txt(int s)
82e28a4053SRui Paulo {
83e28a4053SRui Paulo switch (s) {
84e28a4053SRui Paulo case REAUTH_TIMER_INITIALIZE: return "INITIALIZE";
85e28a4053SRui Paulo case REAUTH_TIMER_REAUTHENTICATE: return "REAUTHENTICATE";
86e28a4053SRui Paulo default: return "Unknown";
87e28a4053SRui Paulo }
88e28a4053SRui Paulo }
89e28a4053SRui Paulo
90e28a4053SRui Paulo
auth_key_tx_state_txt(int s)91e28a4053SRui Paulo static inline const char * auth_key_tx_state_txt(int s)
92e28a4053SRui Paulo {
93e28a4053SRui Paulo switch (s) {
94e28a4053SRui Paulo case AUTH_KEY_TX_NO_KEY_TRANSMIT: return "NO_KEY_TRANSMIT";
95e28a4053SRui Paulo case AUTH_KEY_TX_KEY_TRANSMIT: return "KEY_TRANSMIT";
96e28a4053SRui Paulo default: return "Unknown";
97e28a4053SRui Paulo }
98e28a4053SRui Paulo }
99e28a4053SRui Paulo
100e28a4053SRui Paulo
key_rx_state_txt(int s)101e28a4053SRui Paulo static inline const char * key_rx_state_txt(int s)
102e28a4053SRui Paulo {
103e28a4053SRui Paulo switch (s) {
104e28a4053SRui Paulo case KEY_RX_NO_KEY_RECEIVE: return "NO_KEY_RECEIVE";
105e28a4053SRui Paulo case KEY_RX_KEY_RECEIVE: return "KEY_RECEIVE";
106e28a4053SRui Paulo default: return "Unknown";
107e28a4053SRui Paulo }
108e28a4053SRui Paulo }
109e28a4053SRui Paulo
110e28a4053SRui Paulo
ctrl_dir_state_txt(int s)111e28a4053SRui Paulo static inline const char * ctrl_dir_state_txt(int s)
112e28a4053SRui Paulo {
113e28a4053SRui Paulo switch (s) {
114e28a4053SRui Paulo case CTRL_DIR_FORCE_BOTH: return "FORCE_BOTH";
115e28a4053SRui Paulo case CTRL_DIR_IN_OR_BOTH: return "IN_OR_BOTH";
116e28a4053SRui Paulo default: return "Unknown";
117e28a4053SRui Paulo }
118e28a4053SRui Paulo }
119e28a4053SRui Paulo
120e28a4053SRui Paulo
eapol_auth_dump_state(struct eapol_state_machine * sm,char * buf,size_t buflen)121*5b9c547cSRui Paulo int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf,
122*5b9c547cSRui Paulo size_t buflen)
123e28a4053SRui Paulo {
124*5b9c547cSRui Paulo char *pos, *end;
125*5b9c547cSRui Paulo int ret;
126*5b9c547cSRui Paulo
127*5b9c547cSRui Paulo pos = buf;
128*5b9c547cSRui Paulo end = pos + buflen;
129*5b9c547cSRui Paulo
130*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos, "aWhile=%d\nquietWhile=%d\n"
131*5b9c547cSRui Paulo "reAuthWhen=%d\n",
132e28a4053SRui Paulo sm->aWhile, sm->quietWhile, sm->reAuthWhen);
133*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
134*5b9c547cSRui Paulo return pos - buf;
135*5b9c547cSRui Paulo pos += ret;
136*5b9c547cSRui Paulo
137e28a4053SRui Paulo #define _SB(b) ((b) ? "TRUE" : "FALSE")
138*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
139*5b9c547cSRui Paulo "authAbort=%s\n"
140*5b9c547cSRui Paulo "authFail=%s\n"
141*5b9c547cSRui Paulo "authPortStatus=%s\n"
142*5b9c547cSRui Paulo "authStart=%s\n"
143*5b9c547cSRui Paulo "authTimeout=%s\n"
144*5b9c547cSRui Paulo "authSuccess=%s\n"
145*5b9c547cSRui Paulo "eapFail=%s\n"
146*5b9c547cSRui Paulo "eapolEap=%s\n"
147*5b9c547cSRui Paulo "eapSuccess=%s\n"
148*5b9c547cSRui Paulo "eapTimeout=%s\n"
149*5b9c547cSRui Paulo "initialize=%s\n"
150e28a4053SRui Paulo "keyAvailable=%s\n"
151*5b9c547cSRui Paulo "keyDone=%s\n"
152*5b9c547cSRui Paulo "keyRun=%s\n"
153*5b9c547cSRui Paulo "keyTxEnabled=%s\n"
154*5b9c547cSRui Paulo "portControl=%s\n"
155*5b9c547cSRui Paulo "portEnabled=%s\n"
156*5b9c547cSRui Paulo "portValid=%s\n"
157*5b9c547cSRui Paulo "reAuthenticate=%s\n",
158*5b9c547cSRui Paulo _SB(sm->authAbort),
159*5b9c547cSRui Paulo _SB(sm->authFail),
160*5b9c547cSRui Paulo port_state_txt(sm->authPortStatus),
161*5b9c547cSRui Paulo _SB(sm->authStart),
162*5b9c547cSRui Paulo _SB(sm->authTimeout),
163*5b9c547cSRui Paulo _SB(sm->authSuccess),
164*5b9c547cSRui Paulo _SB(sm->eap_if->eapFail),
165*5b9c547cSRui Paulo _SB(sm->eapolEap),
166*5b9c547cSRui Paulo _SB(sm->eap_if->eapSuccess),
167e28a4053SRui Paulo _SB(sm->eap_if->eapTimeout),
168*5b9c547cSRui Paulo _SB(sm->initialize),
169*5b9c547cSRui Paulo _SB(sm->eap_if->eapKeyAvailable),
170*5b9c547cSRui Paulo _SB(sm->keyDone), _SB(sm->keyRun),
171*5b9c547cSRui Paulo _SB(sm->keyTxEnabled),
172*5b9c547cSRui Paulo port_type_txt(sm->portControl),
173*5b9c547cSRui Paulo _SB(sm->eap_if->portEnabled),
174*5b9c547cSRui Paulo _SB(sm->portValid),
175e28a4053SRui Paulo _SB(sm->reAuthenticate));
176*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
177*5b9c547cSRui Paulo return pos - buf;
178*5b9c547cSRui Paulo pos += ret;
179e28a4053SRui Paulo
180*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
181*5b9c547cSRui Paulo "auth_pae_state=%s\n"
182*5b9c547cSRui Paulo "eapolLogoff=%s\n"
183*5b9c547cSRui Paulo "eapolStart=%s\n"
184*5b9c547cSRui Paulo "eapRestart=%s\n"
185*5b9c547cSRui Paulo "portMode=%s\n"
186*5b9c547cSRui Paulo "reAuthCount=%d\n"
187*5b9c547cSRui Paulo "quietPeriod=%d\n"
188*5b9c547cSRui Paulo "reAuthMax=%d\n"
189*5b9c547cSRui Paulo "authEntersConnecting=%d\n"
190*5b9c547cSRui Paulo "authEapLogoffsWhileConnecting=%d\n"
191*5b9c547cSRui Paulo "authEntersAuthenticating=%d\n"
192*5b9c547cSRui Paulo "authAuthSuccessesWhileAuthenticating=%d\n"
193*5b9c547cSRui Paulo "authAuthTimeoutsWhileAuthenticating=%d\n"
194*5b9c547cSRui Paulo "authAuthFailWhileAuthenticating=%d\n"
195*5b9c547cSRui Paulo "authAuthEapStartsWhileAuthenticating=%d\n"
196*5b9c547cSRui Paulo "authAuthEapLogoffWhileAuthenticating=%d\n"
197*5b9c547cSRui Paulo "authAuthReauthsWhileAuthenticated=%d\n"
198*5b9c547cSRui Paulo "authAuthEapStartsWhileAuthenticated=%d\n"
199*5b9c547cSRui Paulo "authAuthEapLogoffWhileAuthenticated=%d\n",
200*5b9c547cSRui Paulo auth_pae_state_txt(sm->auth_pae_state),
201*5b9c547cSRui Paulo _SB(sm->eapolLogoff),
202*5b9c547cSRui Paulo _SB(sm->eapolStart),
203e28a4053SRui Paulo _SB(sm->eap_if->eapRestart),
204*5b9c547cSRui Paulo port_type_txt(sm->portMode),
205*5b9c547cSRui Paulo sm->reAuthCount,
206*5b9c547cSRui Paulo sm->quietPeriod, sm->reAuthMax,
207*5b9c547cSRui Paulo sm->authEntersConnecting,
208*5b9c547cSRui Paulo sm->authEapLogoffsWhileConnecting,
209*5b9c547cSRui Paulo sm->authEntersAuthenticating,
210*5b9c547cSRui Paulo sm->authAuthSuccessesWhileAuthenticating,
211*5b9c547cSRui Paulo sm->authAuthTimeoutsWhileAuthenticating,
212*5b9c547cSRui Paulo sm->authAuthFailWhileAuthenticating,
213*5b9c547cSRui Paulo sm->authAuthEapStartsWhileAuthenticating,
214*5b9c547cSRui Paulo sm->authAuthEapLogoffWhileAuthenticating,
215*5b9c547cSRui Paulo sm->authAuthReauthsWhileAuthenticated,
216*5b9c547cSRui Paulo sm->authAuthEapStartsWhileAuthenticated,
217*5b9c547cSRui Paulo sm->authAuthEapLogoffWhileAuthenticated);
218*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
219*5b9c547cSRui Paulo return pos - buf;
220*5b9c547cSRui Paulo pos += ret;
221e28a4053SRui Paulo
222*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
223*5b9c547cSRui Paulo "be_auth_state=%s\n"
224*5b9c547cSRui Paulo "eapNoReq=%s\n"
225*5b9c547cSRui Paulo "eapReq=%s\n"
226*5b9c547cSRui Paulo "eapResp=%s\n"
227*5b9c547cSRui Paulo "serverTimeout=%d\n"
228*5b9c547cSRui Paulo "backendResponses=%d\n"
229*5b9c547cSRui Paulo "backendAccessChallenges=%d\n"
230*5b9c547cSRui Paulo "backendOtherRequestsToSupplicant=%d\n"
231*5b9c547cSRui Paulo "backendAuthSuccesses=%d\n"
232*5b9c547cSRui Paulo "backendAuthFails=%d\n",
233e28a4053SRui Paulo be_auth_state_txt(sm->be_auth_state),
234*5b9c547cSRui Paulo _SB(sm->eap_if->eapNoReq),
235*5b9c547cSRui Paulo _SB(sm->eap_if->eapReq),
236e28a4053SRui Paulo _SB(sm->eap_if->eapResp),
237*5b9c547cSRui Paulo sm->serverTimeout,
238*5b9c547cSRui Paulo sm->backendResponses,
239*5b9c547cSRui Paulo sm->backendAccessChallenges,
240*5b9c547cSRui Paulo sm->backendOtherRequestsToSupplicant,
241*5b9c547cSRui Paulo sm->backendAuthSuccesses,
242*5b9c547cSRui Paulo sm->backendAuthFails);
243*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
244*5b9c547cSRui Paulo return pos - buf;
245*5b9c547cSRui Paulo pos += ret;
246e28a4053SRui Paulo
247*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
248*5b9c547cSRui Paulo "reauth_timer_state=%s\n"
249*5b9c547cSRui Paulo "reAuthPeriod=%d\n"
250*5b9c547cSRui Paulo "reAuthEnabled=%s\n",
251*5b9c547cSRui Paulo reauth_timer_state_txt(sm->reauth_timer_state),
252*5b9c547cSRui Paulo sm->reAuthPeriod,
253*5b9c547cSRui Paulo _SB(sm->reAuthEnabled));
254*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
255*5b9c547cSRui Paulo return pos - buf;
256*5b9c547cSRui Paulo pos += ret;
257e28a4053SRui Paulo
258*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
259*5b9c547cSRui Paulo "auth_key_tx_state=%s\n",
260e28a4053SRui Paulo auth_key_tx_state_txt(sm->auth_key_tx_state));
261*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
262*5b9c547cSRui Paulo return pos - buf;
263*5b9c547cSRui Paulo pos += ret;
264e28a4053SRui Paulo
265*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
266*5b9c547cSRui Paulo "key_rx_state=%s\n"
267*5b9c547cSRui Paulo "rxKey=%s\n",
268*5b9c547cSRui Paulo key_rx_state_txt(sm->key_rx_state),
269*5b9c547cSRui Paulo _SB(sm->rxKey));
270*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
271*5b9c547cSRui Paulo return pos - buf;
272*5b9c547cSRui Paulo pos += ret;
273e28a4053SRui Paulo
274*5b9c547cSRui Paulo ret = os_snprintf(pos, end - pos,
275*5b9c547cSRui Paulo "ctrl_dir_state=%s\n"
276*5b9c547cSRui Paulo "adminControlledDirections=%s\n"
277e28a4053SRui Paulo "operControlledDirections=%s\n"
278*5b9c547cSRui Paulo "operEdge=%s\n",
279e28a4053SRui Paulo ctrl_dir_state_txt(sm->ctrl_dir_state),
280*5b9c547cSRui Paulo ctrl_dir_txt(sm->adminControlledDirections),
281e28a4053SRui Paulo ctrl_dir_txt(sm->operControlledDirections),
282*5b9c547cSRui Paulo _SB(sm->operEdge));
283*5b9c547cSRui Paulo if (os_snprintf_error(end - pos, ret))
284*5b9c547cSRui Paulo return pos - buf;
285*5b9c547cSRui Paulo pos += ret;
286e28a4053SRui Paulo #undef _SB
287*5b9c547cSRui Paulo
288*5b9c547cSRui Paulo return pos - buf;
289e28a4053SRui Paulo }
290