freebsd-nq/libntp/statestr.c
Ollivier Robert 2b45e011ca Virgin import of ntpd 4.2.6p5.
When the series of commits is complete, things like
https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks
should be fixed.

PR:		bin/148836 (except that we import a newer version)
Asked by:	Too many
MFC after:	2 weeks
2013-12-04 21:33:17 +00:00

332 lines
7.5 KiB
C

/*
* pretty printing of status information
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include "ntp_stdlib.h"
#include "ntp_fp.h"
#include "ntp.h"
#include "lib_strbuf.h"
#include "ntp_refclock.h"
#include "ntp_control.h"
#include "ntp_string.h"
/*
* Structure for turning various constants into a readable string.
*/
struct codestring {
int code;
const char *string;
};
/*
* Leap status (leap)
*/
static
struct codestring leap_codes[] = {
{ LEAP_NOWARNING, "leap_none" },
{ LEAP_ADDSECOND, "leap_add_sec" },
{ LEAP_DELSECOND, "leap_del_sec" },
{ LEAP_NOTINSYNC, "leap_alarm" },
{ -1, "leap" }
};
/*
* Clock source status (sync)
*/
static
struct codestring sync_codes[] = {
{ CTL_SST_TS_UNSPEC, "sync_unspec" },
{ CTL_SST_TS_ATOM, "sync_pps" },
{ CTL_SST_TS_LF, "sync_lf_radio" },
{ CTL_SST_TS_HF, "sync_hf_radio" },
{ CTL_SST_TS_UHF, "sync_uhf_radio" },
{ CTL_SST_TS_LOCAL, "sync_local" },
{ CTL_SST_TS_NTP, "sync_ntp" },
{ CTL_SST_TS_UDPTIME, "sync_other" },
{ CTL_SST_TS_WRSTWTCH, "sync_wristwatch" },
{ CTL_SST_TS_TELEPHONE, "sync_telephone" },
{ -1, "sync" }
};
/*
* Peer selection status (sel)
*/
static
struct codestring select_codes[] = {
{ CTL_PST_SEL_REJECT, "sel_reject" },
{ CTL_PST_SEL_SANE, "sel_falsetick" },
{ CTL_PST_SEL_CORRECT, "sel_excess" },
{ CTL_PST_SEL_SELCAND, "sel_outlyer" },
{ CTL_PST_SEL_SYNCCAND, "sel_candidate" },
{ CTL_PST_SEL_EXCESS, "sel_backup" },
{ CTL_PST_SEL_SYSPEER, "sel_sys.peer" },
{ CTL_PST_SEL_PPS, "sel_pps.peer" },
{ -1, "sel" }
};
/*
* Clock status (clk)
*/
static
struct codestring clock_codes[] = {
{ CTL_CLK_OKAY, "clk_unspec" },
{ CTL_CLK_NOREPLY, "clk_no_reply" },
{ CTL_CLK_BADFORMAT, "clk_bad_format" },
{ CTL_CLK_FAULT, "clk_fault" },
{ CTL_CLK_PROPAGATION, "clk_bad_signal" },
{ CTL_CLK_BADDATE, "clk_bad_date" },
{ CTL_CLK_BADTIME, "clk_bad_time" },
{ -1, "clk" }
};
#ifdef FLASH_CODES_UNUSED
/*
* Flash bits -- see ntpq.c tstflags & tstflagnames
*/
static
struct codestring flash_codes[] = {
{ TEST1, "pkt_dup" },
{ TEST2, "pkt_bogus" },
{ TEST3, "pkt_unsync" },
{ TEST4, "pkt_denied" },
{ TEST5, "pkt_auth" },
{ TEST6, "pkt_stratum" },
{ TEST7, "pkt_header" },
{ TEST8, "pkt_autokey" },
{ TEST9, "pkt_crypto" },
{ TEST10, "peer_stratum" },
{ TEST11, "peer_dist" },
{ TEST12, "peer_loop" },
{ TEST13, "peer_unreach" },
{ -1, "flash" }
};
#endif
/*
* System events (sys)
*/
static
struct codestring sys_codes[] = {
{ EVNT_UNSPEC, "unspecified" },
{ EVNT_NSET, "freq_not_set" },
{ EVNT_FSET, "freq_set" },
{ EVNT_SPIK, "spike_detect" },
{ EVNT_FREQ, "freq_mode" },
{ EVNT_SYNC, "clock_sync" },
{ EVNT_SYSRESTART, "restart" },
{ EVNT_SYSFAULT, "panic_stop" },
{ EVNT_NOPEER, "no_sys_peer" },
{ EVNT_ARMED, "leap_armed" },
{ EVNT_DISARMED, "leap_disarmed" },
{ EVNT_LEAP, "leap_event" },
{ EVNT_CLOCKRESET, "clock_step" },
{ EVNT_KERN, "kern" },
{ EVNT_TAI, "TAI" },
{ EVNT_LEAPVAL, "stale_leapsecond_values" },
{ EVNT_CLKHOP, "clockhop" },
{ -1, "" }
};
/*
* Peer events (peer)
*/
static
struct codestring peer_codes[] = {
{ PEVNT_MOBIL & ~PEER_EVENT, "mobilize" },
{ PEVNT_DEMOBIL & ~PEER_EVENT, "demobilize" },
{ PEVNT_UNREACH & ~PEER_EVENT, "unreachable" },
{ PEVNT_REACH & ~PEER_EVENT, "reachable" },
{ PEVNT_RESTART & ~PEER_EVENT, "restart" },
{ PEVNT_REPLY & ~PEER_EVENT, "no_reply" },
{ PEVNT_RATE & ~PEER_EVENT, "rate_exceeded" },
{ PEVNT_DENY & ~PEER_EVENT, "access_denied" },
{ PEVNT_ARMED & ~PEER_EVENT, "leap_armed" },
{ PEVNT_NEWPEER & ~PEER_EVENT, "sys_peer" },
{ PEVNT_CLOCK & ~PEER_EVENT, "clock_event" },
{ PEVNT_AUTH & ~PEER_EVENT, "bad_auth" },
{ PEVNT_POPCORN & ~PEER_EVENT, "popcorn" },
{ PEVNT_XLEAVE & ~PEER_EVENT, "interleave_mode" },
{ PEVNT_XERR & ~PEER_EVENT, "interleave_error" },
{ PEVNT_TAI & ~PEER_EVENT, "TAI" },
{ -1, "" }
};
#ifdef OPENSSL
/*
* Crypto events (cryp)
*/
static
struct codestring crypto_codes[] = {
{ XEVNT_OK & ~CRPT_EVENT, "success" },
{ XEVNT_LEN & ~CRPT_EVENT, "bad_field_format_or_length" },
{ XEVNT_TSP & ~CRPT_EVENT, "bad_timestamp" },
{ XEVNT_FSP & ~CRPT_EVENT, "bad_filestamp" },
{ XEVNT_PUB & ~CRPT_EVENT, "bad_or_missing_public_key" },
{ XEVNT_MD & ~CRPT_EVENT, "unsupported_digest_type" },
{ XEVNT_KEY & ~CRPT_EVENT, "unsupported_identity_type" },
{ XEVNT_SGL & ~CRPT_EVENT, "bad_signature_length" },
{ XEVNT_SIG & ~CRPT_EVENT, "signature_not_verified" },
{ XEVNT_VFY & ~CRPT_EVENT, "certificate_not_verified" },
{ XEVNT_PER & ~CRPT_EVENT, "host_certificate_expired" },
{ XEVNT_CKY & ~CRPT_EVENT, "bad_or_missing_cookie" },
{ XEVNT_DAT & ~CRPT_EVENT, "bad_or_missing_leapseconds" },
{ XEVNT_CRT & ~CRPT_EVENT, "bad_or_missing_certificate" },
{ XEVNT_ID & ~CRPT_EVENT, "bad_or_missing_group key" },
{ XEVNT_ERR & ~CRPT_EVENT, "protocol_error" },
{ -1, "" }
};
#endif /* OPENSSL */
/* Forwards */
static const char *getcode (int, struct codestring *);
static const char *getevents (int);
/*
* getcode - return string corresponding to code
*/
static const char *
getcode(
int code,
struct codestring *codetab
)
{
static char buf[30];
while (codetab->code != -1) {
if (codetab->code == code)
return codetab->string;
codetab++;
}
snprintf(buf, sizeof(buf), "%s_%d", codetab->string, code);
return buf;
}
/*
* getevents - return a descriptive string for the event count
*/
static const char *
getevents(
int cnt
)
{
static char buf[20];
if (cnt == 0)
return "no events";
snprintf(buf, sizeof(buf), "%d event%s", cnt, (cnt==1) ? "" :
"s");
return buf;
}
/*
* statustoa - return a descriptive string for a peer status
*/
char *
statustoa(
int type,
int st
)
{
char *cb;
u_char pst;
LIB_GETBUF(cb);
switch (type) {
case TYPE_SYS:
strcpy(cb, getcode(CTL_SYS_LI(st), leap_codes));
strcat(cb, ", ");
strcat(cb, getcode(CTL_SYS_SOURCE(st), sync_codes));
strcat(cb, ", ");
strcat(cb, getevents(CTL_SYS_NEVNT(st)));
strcat(cb, ", ");
strcat(cb, getcode(CTL_SYS_EVENT(st), sys_codes));
break;
case TYPE_PEER:
/*
* Handcraft the bits
*/
pst = (u_char) CTL_PEER_STATVAL(st);
if (pst & CTL_PST_CONFIG)
strcpy(cb, "conf");
if (pst & CTL_PST_AUTHENABLE) {
if (pst & CTL_PST_CONFIG)
strcat(cb, ", authenb");
else
strcat(cb, "authenb");
}
if (pst & CTL_PST_AUTHENTIC) {
if (pst & (CTL_PST_CONFIG | CTL_PST_AUTHENABLE))
strcat(cb, ", auth");
else
strcat(cb, "auth");
}
if (pst & CTL_PST_REACH) {
if (pst & (CTL_PST_CONFIG | CTL_PST_AUTHENABLE |
CTL_PST_AUTHENTIC))
strcat(cb, ", reach");
else
strcat(cb, "reach");
}
if (pst & CTL_PST_BCAST) {
if (pst & (CTL_PST_CONFIG | CTL_PST_AUTHENABLE |
CTL_PST_AUTHENTIC | CTL_PST_REACH))
strcat(cb, ", bcst");
else
strcat(cb, "bcst");
}
/*
* Now the codes
*/
strcat(cb, ", ");
strcat(cb, getcode(pst & 0x7, select_codes));
strcat(cb, ", ");
strcat(cb, getevents(CTL_PEER_NEVNT(st)));
if (CTL_PEER_EVENT(st) != EVNT_UNSPEC) {
strcat(cb, ", ");
strcat(cb, getcode(CTL_PEER_EVENT(st),
peer_codes));
}
break;
case TYPE_CLOCK:
strcat(cb, ", ");
strcat(cb, getevents(CTL_SYS_NEVNT(st)));
strcat(cb, ", ");
strcat(cb, getcode((st) & 0xf, clock_codes));
break;
}
return cb;
}
const char *
eventstr(
int num
)
{
if (num & PEER_EVENT)
return (getcode(num & ~PEER_EVENT, peer_codes));
#ifdef OPENSSL
else if (num & CRPT_EVENT)
return (getcode(num & ~CRPT_EVENT, crypto_codes));
#endif /* OPENSSL */
else
return (getcode(num, sys_codes));
}
const char *
ceventstr(
int num
)
{
return getcode(num, clock_codes);
}