Added WirelessManager, a port of wpa_supplicant.
[AROS.git] / workbench / network / WirelessManager / src / eapol_auth / eapol_auth_dump.c
bloba0f0e8d6166918fda6a09db4e6d34a7c1c9525ad
1 /*
2 * IEEE 802.1X-2004 Authenticator - State dump
3 * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
12 * See README and COPYING for more details.
15 #include "includes.h"
17 #include "common.h"
18 #include "eap_server/eap.h"
19 #include "eapol_auth_sm.h"
20 #include "eapol_auth_sm_i.h"
22 static inline const char * port_type_txt(PortTypes pt)
24 switch (pt) {
25 case ForceUnauthorized: return "ForceUnauthorized";
26 case ForceAuthorized: return "ForceAuthorized";
27 case Auto: return "Auto";
28 default: return "Unknown";
33 static inline const char * port_state_txt(PortState ps)
35 switch (ps) {
36 case Unauthorized: return "Unauthorized";
37 case Authorized: return "Authorized";
38 default: return "Unknown";
43 static inline const char * ctrl_dir_txt(ControlledDirection dir)
45 switch (dir) {
46 case Both: return "Both";
47 case In: return "In";
48 default: return "Unknown";
53 static inline const char * auth_pae_state_txt(int s)
55 switch (s) {
56 case AUTH_PAE_INITIALIZE: return "INITIALIZE";
57 case AUTH_PAE_DISCONNECTED: return "DISCONNECTED";
58 case AUTH_PAE_CONNECTING: return "CONNECTING";
59 case AUTH_PAE_AUTHENTICATING: return "AUTHENTICATING";
60 case AUTH_PAE_AUTHENTICATED: return "AUTHENTICATED";
61 case AUTH_PAE_ABORTING: return "ABORTING";
62 case AUTH_PAE_HELD: return "HELD";
63 case AUTH_PAE_FORCE_AUTH: return "FORCE_AUTH";
64 case AUTH_PAE_FORCE_UNAUTH: return "FORCE_UNAUTH";
65 case AUTH_PAE_RESTART: return "RESTART";
66 default: return "Unknown";
71 static inline const char * be_auth_state_txt(int s)
73 switch (s) {
74 case BE_AUTH_REQUEST: return "REQUEST";
75 case BE_AUTH_RESPONSE: return "RESPONSE";
76 case BE_AUTH_SUCCESS: return "SUCCESS";
77 case BE_AUTH_FAIL: return "FAIL";
78 case BE_AUTH_TIMEOUT: return "TIMEOUT";
79 case BE_AUTH_IDLE: return "IDLE";
80 case BE_AUTH_INITIALIZE: return "INITIALIZE";
81 case BE_AUTH_IGNORE: return "IGNORE";
82 default: return "Unknown";
87 static inline const char * reauth_timer_state_txt(int s)
89 switch (s) {
90 case REAUTH_TIMER_INITIALIZE: return "INITIALIZE";
91 case REAUTH_TIMER_REAUTHENTICATE: return "REAUTHENTICATE";
92 default: return "Unknown";
97 static inline const char * auth_key_tx_state_txt(int s)
99 switch (s) {
100 case AUTH_KEY_TX_NO_KEY_TRANSMIT: return "NO_KEY_TRANSMIT";
101 case AUTH_KEY_TX_KEY_TRANSMIT: return "KEY_TRANSMIT";
102 default: return "Unknown";
107 static inline const char * key_rx_state_txt(int s)
109 switch (s) {
110 case KEY_RX_NO_KEY_RECEIVE: return "NO_KEY_RECEIVE";
111 case KEY_RX_KEY_RECEIVE: return "KEY_RECEIVE";
112 default: return "Unknown";
117 static inline const char * ctrl_dir_state_txt(int s)
119 switch (s) {
120 case CTRL_DIR_FORCE_BOTH: return "FORCE_BOTH";
121 case CTRL_DIR_IN_OR_BOTH: return "IN_OR_BOTH";
122 default: return "Unknown";
127 void eapol_auth_dump_state(FILE *f, const char *prefix,
128 struct eapol_state_machine *sm)
130 fprintf(f, "%sEAPOL state machine:\n", prefix);
131 fprintf(f, "%s aWhile=%d quietWhile=%d reAuthWhen=%d\n", prefix,
132 sm->aWhile, sm->quietWhile, sm->reAuthWhen);
133 #define _SB(b) ((b) ? "TRUE" : "FALSE")
134 fprintf(f,
135 "%s authAbort=%s authFail=%s authPortStatus=%s authStart=%s\n"
136 "%s authTimeout=%s authSuccess=%s eapFail=%s eapolEap=%s\n"
137 "%s eapSuccess=%s eapTimeout=%s initialize=%s "
138 "keyAvailable=%s\n"
139 "%s keyDone=%s keyRun=%s keyTxEnabled=%s portControl=%s\n"
140 "%s portEnabled=%s portValid=%s reAuthenticate=%s\n",
141 prefix, _SB(sm->authAbort), _SB(sm->authFail),
142 port_state_txt(sm->authPortStatus), _SB(sm->authStart),
143 prefix, _SB(sm->authTimeout), _SB(sm->authSuccess),
144 _SB(sm->eap_if->eapFail), _SB(sm->eapolEap),
145 prefix, _SB(sm->eap_if->eapSuccess),
146 _SB(sm->eap_if->eapTimeout),
147 _SB(sm->initialize), _SB(sm->eap_if->eapKeyAvailable),
148 prefix, _SB(sm->keyDone), _SB(sm->keyRun),
149 _SB(sm->keyTxEnabled), port_type_txt(sm->portControl),
150 prefix, _SB(sm->eap_if->portEnabled), _SB(sm->portValid),
151 _SB(sm->reAuthenticate));
153 fprintf(f, "%s Authenticator PAE:\n"
154 "%s state=%s\n"
155 "%s eapolLogoff=%s eapolStart=%s eapRestart=%s\n"
156 "%s portMode=%s reAuthCount=%d\n"
157 "%s quietPeriod=%d reAuthMax=%d\n"
158 "%s authEntersConnecting=%d\n"
159 "%s authEapLogoffsWhileConnecting=%d\n"
160 "%s authEntersAuthenticating=%d\n"
161 "%s authAuthSuccessesWhileAuthenticating=%d\n"
162 "%s authAuthTimeoutsWhileAuthenticating=%d\n"
163 "%s authAuthFailWhileAuthenticating=%d\n"
164 "%s authAuthEapStartsWhileAuthenticating=%d\n"
165 "%s authAuthEapLogoffWhileAuthenticating=%d\n"
166 "%s authAuthReauthsWhileAuthenticated=%d\n"
167 "%s authAuthEapStartsWhileAuthenticated=%d\n"
168 "%s authAuthEapLogoffWhileAuthenticated=%d\n",
169 prefix, prefix, auth_pae_state_txt(sm->auth_pae_state), prefix,
170 _SB(sm->eapolLogoff), _SB(sm->eapolStart),
171 _SB(sm->eap_if->eapRestart),
172 prefix, port_type_txt(sm->portMode), sm->reAuthCount,
173 prefix, sm->quietPeriod, sm->reAuthMax,
174 prefix, sm->authEntersConnecting,
175 prefix, sm->authEapLogoffsWhileConnecting,
176 prefix, sm->authEntersAuthenticating,
177 prefix, sm->authAuthSuccessesWhileAuthenticating,
178 prefix, sm->authAuthTimeoutsWhileAuthenticating,
179 prefix, sm->authAuthFailWhileAuthenticating,
180 prefix, sm->authAuthEapStartsWhileAuthenticating,
181 prefix, sm->authAuthEapLogoffWhileAuthenticating,
182 prefix, sm->authAuthReauthsWhileAuthenticated,
183 prefix, sm->authAuthEapStartsWhileAuthenticated,
184 prefix, sm->authAuthEapLogoffWhileAuthenticated);
186 fprintf(f, "%s Backend Authentication:\n"
187 "%s state=%s\n"
188 "%s eapNoReq=%s eapReq=%s eapResp=%s\n"
189 "%s serverTimeout=%d\n"
190 "%s backendResponses=%d\n"
191 "%s backendAccessChallenges=%d\n"
192 "%s backendOtherRequestsToSupplicant=%d\n"
193 "%s backendAuthSuccesses=%d\n"
194 "%s backendAuthFails=%d\n",
195 prefix, prefix,
196 be_auth_state_txt(sm->be_auth_state),
197 prefix, _SB(sm->eap_if->eapNoReq), _SB(sm->eap_if->eapReq),
198 _SB(sm->eap_if->eapResp),
199 prefix, sm->serverTimeout,
200 prefix, sm->backendResponses,
201 prefix, sm->backendAccessChallenges,
202 prefix, sm->backendOtherRequestsToSupplicant,
203 prefix, sm->backendAuthSuccesses,
204 prefix, sm->backendAuthFails);
206 fprintf(f, "%s Reauthentication Timer:\n"
207 "%s state=%s\n"
208 "%s reAuthPeriod=%d reAuthEnabled=%s\n", prefix, prefix,
209 reauth_timer_state_txt(sm->reauth_timer_state), prefix,
210 sm->reAuthPeriod, _SB(sm->reAuthEnabled));
212 fprintf(f, "%s Authenticator Key Transmit:\n"
213 "%s state=%s\n", prefix, prefix,
214 auth_key_tx_state_txt(sm->auth_key_tx_state));
216 fprintf(f, "%s Key Receive:\n"
217 "%s state=%s\n"
218 "%s rxKey=%s\n", prefix, prefix,
219 key_rx_state_txt(sm->key_rx_state), prefix, _SB(sm->rxKey));
221 fprintf(f, "%s Controlled Directions:\n"
222 "%s state=%s\n"
223 "%s adminControlledDirections=%s "
224 "operControlledDirections=%s\n"
225 "%s operEdge=%s\n", prefix, prefix,
226 ctrl_dir_state_txt(sm->ctrl_dir_state),
227 prefix, ctrl_dir_txt(sm->adminControlledDirections),
228 ctrl_dir_txt(sm->operControlledDirections),
229 prefix, _SB(sm->operEdge));
230 #undef _SB