dump_state.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. /*
  2. * hostapd / State dump
  3. * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "hostapd.h"
  17. #include "config.h"
  18. #include "sta_flags.h"
  19. #include "sta_info.h"
  20. #include "radius/radius_client.h"
  21. #include "radius/radius_server.h"
  22. #include "eapol_auth/eapol_auth_sm.h"
  23. #include "eap_server/eap.h"
  24. static void fprint_char(FILE *f, char c)
  25. {
  26. if (c >= 32 && c < 127)
  27. fprintf(f, "%c", c);
  28. else
  29. fprintf(f, "<%02x>", c);
  30. }
  31. static void ieee802_1x_dump_state(FILE *f, const char *prefix,
  32. struct sta_info *sta)
  33. {
  34. struct eapol_state_machine *sm = sta->eapol_sm;
  35. if (sm == NULL)
  36. return;
  37. fprintf(f, "%sIEEE 802.1X:\n", prefix);
  38. if (sm->identity) {
  39. size_t i;
  40. fprintf(f, "%sidentity=", prefix);
  41. for (i = 0; i < sm->identity_len; i++)
  42. fprint_char(f, sm->identity[i]);
  43. fprintf(f, "\n");
  44. }
  45. fprintf(f, "%slast EAP type: Authentication Server: %d (%s) "
  46. "Supplicant: %d (%s)\n", prefix,
  47. sm->eap_type_authsrv,
  48. eap_server_get_name(0, sm->eap_type_authsrv),
  49. sm->eap_type_supp, eap_server_get_name(0, sm->eap_type_supp));
  50. fprintf(f, "%scached_packets=%s\n", prefix,
  51. sm->last_recv_radius ? "[RX RADIUS]" : "");
  52. eapol_auth_dump_state(f, prefix, sm);
  53. }
  54. /**
  55. * hostapd_dump_state - SIGUSR1 handler to dump hostapd state to a text file
  56. */
  57. static void hostapd_dump_state(struct hostapd_data *hapd)
  58. {
  59. FILE *f;
  60. time_t now;
  61. struct sta_info *sta;
  62. int i;
  63. char *buf;
  64. if (!hapd->conf->dump_log_name) {
  65. wpa_printf(MSG_DEBUG, "Dump file not defined - ignoring dump "
  66. "request");
  67. return;
  68. }
  69. wpa_printf(MSG_DEBUG, "Dumping hostapd state to '%s'",
  70. hapd->conf->dump_log_name);
  71. f = fopen(hapd->conf->dump_log_name, "w");
  72. if (f == NULL) {
  73. wpa_printf(MSG_WARNING, "Could not open dump file '%s' for "
  74. "writing.", hapd->conf->dump_log_name);
  75. return;
  76. }
  77. time(&now);
  78. fprintf(f, "hostapd state dump - %s", ctime(&now));
  79. fprintf(f, "num_sta=%d num_sta_non_erp=%d "
  80. "num_sta_no_short_slot_time=%d\n"
  81. "num_sta_no_short_preamble=%d\n",
  82. hapd->num_sta, hapd->iface->num_sta_non_erp,
  83. hapd->iface->num_sta_no_short_slot_time,
  84. hapd->iface->num_sta_no_short_preamble);
  85. for (sta = hapd->sta_list; sta != NULL; sta = sta->next) {
  86. fprintf(f, "\nSTA=" MACSTR "\n", MAC2STR(sta->addr));
  87. fprintf(f,
  88. " AID=%d flags=0x%x %s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
  89. " capability=0x%x listen_interval=%d\n",
  90. sta->aid,
  91. sta->flags,
  92. (sta->flags & WLAN_STA_AUTH ? "[AUTH]" : ""),
  93. (sta->flags & WLAN_STA_ASSOC ? "[ASSOC]" : ""),
  94. (sta->flags & WLAN_STA_PS ? "[PS]" : ""),
  95. (sta->flags & WLAN_STA_TIM ? "[TIM]" : ""),
  96. (sta->flags & WLAN_STA_PERM ? "[PERM]" : ""),
  97. (sta->flags & WLAN_STA_AUTHORIZED ? "[AUTHORIZED]" :
  98. ""),
  99. (sta->flags & WLAN_STA_PENDING_POLL ? "[PENDING_POLL" :
  100. ""),
  101. (sta->flags & WLAN_STA_SHORT_PREAMBLE ?
  102. "[SHORT_PREAMBLE]" : ""),
  103. (sta->flags & WLAN_STA_PREAUTH ? "[PREAUTH]" : ""),
  104. (sta->flags & WLAN_STA_WMM ? "[WMM]" : ""),
  105. (sta->flags & WLAN_STA_MFP ? "[MFP]" : ""),
  106. (sta->flags & WLAN_STA_WPS ? "[WPS]" : ""),
  107. (sta->flags & WLAN_STA_MAYBE_WPS ? "[MAYBE_WPS]" : ""),
  108. (sta->flags & WLAN_STA_NONERP ? "[NonERP]" : ""),
  109. sta->capability,
  110. sta->listen_interval);
  111. fprintf(f, " supported_rates=");
  112. for (i = 0; i < sta->supported_rates_len; i++)
  113. fprintf(f, "%02x ", sta->supported_rates[i]);
  114. fprintf(f, "\n");
  115. fprintf(f,
  116. " timeout_next=%s\n",
  117. (sta->timeout_next == STA_NULLFUNC ? "NULLFUNC POLL" :
  118. (sta->timeout_next == STA_DISASSOC ? "DISASSOC" :
  119. "DEAUTH")));
  120. ieee802_1x_dump_state(f, " ", sta);
  121. }
  122. buf = os_malloc(4096);
  123. if (buf) {
  124. int count = radius_client_get_mib(hapd->radius, buf, 4096);
  125. if (count < 0)
  126. count = 0;
  127. else if (count > 4095)
  128. count = 4095;
  129. buf[count] = '\0';
  130. fprintf(f, "%s", buf);
  131. count = radius_server_get_mib(hapd->radius_srv, buf, 4096);
  132. if (count < 0)
  133. count = 0;
  134. else if (count > 4095)
  135. count = 4095;
  136. buf[count] = '\0';
  137. fprintf(f, "%s", buf);
  138. os_free(buf);
  139. }
  140. fclose(f);
  141. }
  142. int handle_dump_state_iface(struct hostapd_iface *iface, void *ctx)
  143. {
  144. size_t i;
  145. for (i = 0; i < iface->num_bss; i++)
  146. hostapd_dump_state(iface->bss[i]);
  147. return 0;
  148. }