PageRenderTime 38ms CodeModel.GetById 15ms app.highlight 20ms RepoModel.GetById 1ms app.codeStats 0ms

/contrib/ntp/libntp/statestr.c

https://bitbucket.org/freebsd/freebsd-head/
C | 305 lines | 234 code | 28 blank | 43 comment | 21 complexity | e79c50d38b24510ee1d15b8dbe3e4649 MD5 | raw file
  1/*
  2 * pretty printing of status information
  3 */
  4#ifdef HAVE_CONFIG_H
  5#include <config.h>
  6#endif
  7#include <stdio.h>
  8#include "ntp_stdlib.h"
  9#include "ntp_fp.h"
 10#include "ntp.h"
 11#include "lib_strbuf.h"
 12#include "ntp_refclock.h"
 13#include "ntp_control.h"
 14#include "ntp_string.h"
 15
 16/*
 17 * Structure for turning various constants into a readable string.
 18 */
 19struct codestring {
 20	int code;
 21	const char *string;
 22};
 23
 24/*
 25 * Leap values
 26 */
 27static
 28struct codestring leap_codes[] = {
 29	{ LEAP_NOWARNING,	"leap_none" },
 30	{ LEAP_ADDSECOND,	"leap_add_sec" },
 31	{ LEAP_DELSECOND,	"leap_del_sec" },
 32	{ LEAP_NOTINSYNC,	"sync_alarm" },
 33	{ -1,	"leap" }
 34};
 35
 36/*
 37 * Clock source
 38 */
 39static
 40struct codestring sync_codes[] = {
 41	{ CTL_SST_TS_UNSPEC,	"sync_unspec" },
 42	{ CTL_SST_TS_ATOM,	"sync_atomic" },
 43	{ CTL_SST_TS_LF,	"sync_lf_clock" },
 44	{ CTL_SST_TS_HF,	"sync_hf_clock" },
 45	{ CTL_SST_TS_UHF,	"sync_uhf_clock" },
 46	{ CTL_SST_TS_LOCAL,	"sync_local_proto" },
 47	{ CTL_SST_TS_NTP,	"sync_ntp" },
 48	{ CTL_SST_TS_UDPTIME,	"sync_udp/time" },
 49	{ CTL_SST_TS_WRSTWTCH,	"sync_wristwatch" },
 50	{ CTL_SST_TS_TELEPHONE,	"sync_telephone" },
 51	{ -1,			"sync" }
 52};
 53
 54
 55/*
 56 * Peer selection
 57 */
 58static
 59struct codestring select_codes[] = {
 60	{ CTL_PST_SEL_REJECT,	"selreject" },
 61	{ CTL_PST_SEL_SANE,	"sel_falsetick" },
 62	{ CTL_PST_SEL_CORRECT,	"sel_excess" },
 63	{ CTL_PST_SEL_SELCAND,	"sel_outlyer" },
 64	{ CTL_PST_SEL_SYNCCAND,	"sel_candidat" },
 65	{ CTL_PST_SEL_DISTSYSPEER, "sel_selected" },
 66	{ CTL_PST_SEL_SYSPEER,	"sel_sys.peer" },
 67	{ CTL_PST_SEL_PPS,	"sel_pps.peer" },
 68	{ -1,			"sel" }
 69};
 70
 71
 72/*
 73 * Clock status
 74 */
 75static
 76struct codestring clock_codes[] = {
 77	{ CTL_CLK_OKAY,		"clk_okay" },
 78	{ CTL_CLK_NOREPLY,	"clk_noreply" },
 79	{ CTL_CLK_BADFORMAT,	"clk_badformat" },
 80	{ CTL_CLK_FAULT,	"clk_fault" },
 81	{ CTL_CLK_PROPAGATION,	"clk_badsignal" },
 82	{ CTL_CLK_BADDATE,	"clk_baddate" },
 83	{ CTL_CLK_BADTIME,	"clk_badtime" },
 84	{ -1,			"clk" }
 85};
 86
 87
 88/*
 89 * System Events
 90 */
 91static
 92struct codestring sys_codes[] = {
 93	{ EVNT_UNSPEC,		"event_unspec" },
 94	{ EVNT_SYSRESTART,	"event_restart" },
 95	{ EVNT_SYSFAULT,	"event_fault" },
 96	{ EVNT_SYNCCHG,		"event_sync_chg" },
 97	{ EVNT_PEERSTCHG,	"event_peer/strat_chg" },
 98	{ EVNT_CLOCKRESET,	"event_clock_reset" },
 99	{ EVNT_BADDATETIM,	"event_bad_date" },
100	{ EVNT_CLOCKEXCPT,	"event_clock_excptn" },
101	{ -1,			"event" }
102};
103
104/*
105 * Peer events
106 */
107static
108struct codestring peer_codes[] = {
109	{ EVNT_UNSPEC,			"event_unspec" },
110	{ EVNT_PEERIPERR & ~PEER_EVENT,	"event_ip_err" },
111	{ EVNT_PEERAUTH & ~PEER_EVENT,	"event_authen" },
112	{ EVNT_UNREACH & ~PEER_EVENT,	"event_unreach" },
113	{ EVNT_REACH & ~PEER_EVENT,	"event_reach" },
114	{ EVNT_PEERCLOCK & ~PEER_EVENT,	"event_peer_clock" },
115#if 0
116	{ EVNT_PEERSTRAT & ~PEER_EVENT,	"event_stratum_chg" },
117#endif
118	{ -1,				"event" }
119};
120
121#ifdef OPENSSL
122/*
123 * Crypto events
124 */
125static
126struct codestring crypto_codes[] = {
127	{ XEVNT_OK & ~CRPT_EVENT,	"success" },
128	{ XEVNT_LEN & ~CRPT_EVENT,	"bad_field_format_or_length" },
129	{ XEVNT_TSP & ~CRPT_EVENT,	"bad_timestamp" },
130	{ XEVNT_FSP & ~CRPT_EVENT,	"bad_filestamp" },
131	{ XEVNT_PUB & ~CRPT_EVENT,	"bad_or_missing_public_key" },
132	{ XEVNT_MD & ~CRPT_EVENT,	"unsupported_digest_type" },
133	{ XEVNT_KEY & ~CRPT_EVENT,	"unsupported_identity_type" },
134	{ XEVNT_SGL & ~CRPT_EVENT,	"bad_signature_length" },
135	{ XEVNT_SIG & ~CRPT_EVENT,	"signature_not_verified" },
136	{ XEVNT_VFY & ~CRPT_EVENT,	"certificate_not_verified" },
137	{ XEVNT_PER & ~CRPT_EVENT,	"host certificate_expired" },
138	{ XEVNT_CKY & ~CRPT_EVENT,	"bad_or_missing_cookie" },
139	{ XEVNT_DAT & ~CRPT_EVENT,	"bad_or_missing_leapsecond_table" },
140	{ XEVNT_CRT & ~CRPT_EVENT,	"bad_or_missing_certificate" },	
141	{ XEVNT_ID & ~CRPT_EVENT,	"bad_or_missing_group_key" },
142	{ XEVNT_ERR & ~CRPT_EVENT,	"protocol_error" },
143	{ XEVNT_SRV & ~CRPT_EVENT,	"server certificate expired" },
144	{ -1,				"crypto" }
145};
146#endif /* OPENSSL */
147
148/* Forwards */
149static const char *getcode P((int, struct codestring *));
150static const char *getevents P((int));
151
152/*
153 * getcode - return string corresponding to code
154 */
155static const char *
156getcode(
157	int code,
158	struct codestring *codetab
159	)
160{
161	static char buf[30];
162
163	while (codetab->code != -1) {
164		if (codetab->code == code)
165		    return codetab->string;
166		codetab++;
167	}
168	(void) sprintf(buf, "%s_%d", codetab->string, code);
169	return buf;
170}
171
172/*
173 * getevents - return a descriptive string for the event count
174 */
175static const char *
176getevents(
177	int cnt
178	)
179{
180	static char buf[20];
181
182	if (cnt == 0)
183	    return "no events";
184	(void) sprintf(buf, "%d event%s", cnt, (cnt==1) ? "" : "s");
185	return buf;
186}
187
188/*
189 * statustoa - return a descriptive string for a peer status
190 */
191char *
192statustoa(
193	int type,
194	int st
195	)
196{
197	char *cb;
198	u_char pst;
199
200	LIB_GETBUF(cb);
201
202	switch (type) {
203	    case TYPE_SYS:
204		(void)strcpy(cb, getcode(CTL_SYS_LI(st), leap_codes));
205		(void)strcat(cb, ", ");
206		(void)strcat(cb, getcode(CTL_SYS_SOURCE(st) & ~CTL_SST_TS_PPS, sync_codes));
207		if (CTL_SYS_SOURCE(st) & CTL_SST_TS_PPS)
208		    (void)strcat(cb, "/PPS");
209		(void)strcat(cb, ", ");
210		(void)strcat(cb, getevents(CTL_SYS_NEVNT(st)));
211		(void)strcat(cb, ", ");
212		(void)strcat(cb, getcode(CTL_SYS_EVENT(st), sys_codes));
213		break;
214	
215	    case TYPE_PEER:
216		/*
217		 * Handcraft the bits
218		 */
219		pst = (u_char) CTL_PEER_STATVAL(st);
220		if (!(pst & CTL_PST_REACH)) {
221			(void)strcpy(cb, "unreach");
222		} else {
223			(void)strcpy(cb, "reach");
224
225		}
226		if (pst & CTL_PST_CONFIG)
227		    (void)strcat(cb, ", conf");
228		if (pst & CTL_PST_AUTHENABLE) {
229			if (!(pst & CTL_PST_REACH) || (pst & CTL_PST_AUTHENTIC))
230			    (void)strcat(cb, ", auth");
231			else
232			    (void)strcat(cb, ", unauth");
233		}
234
235		/*
236		 * Now the codes
237		 */
238		if ((pst & 0x7) != CTL_PST_SEL_REJECT) {
239			(void)strcat(cb, ", ");
240			(void)strcat(cb, getcode(pst & 0x7, select_codes));
241		}
242		(void)strcat(cb, ", ");
243		(void)strcat(cb, getevents(CTL_PEER_NEVNT(st)));
244		if (CTL_PEER_EVENT(st) != EVNT_UNSPEC) {
245			(void)strcat(cb, ", ");
246			(void)strcat(cb, getcode(CTL_PEER_EVENT(st),
247						 peer_codes));
248		}
249		break;
250	
251	    case TYPE_CLOCK:
252		(void)strcpy(cb, getcode(((st)>>8) & 0xff, clock_codes));
253		(void)strcat(cb, ", last_");
254		(void)strcat(cb, getcode((st) & 0xff, clock_codes));
255		break;
256	}
257	return cb;
258}
259
260const char *
261eventstr(
262	int num
263	)
264{
265	if (num & PEER_EVENT)
266		return (getcode(num & ~PEER_EVENT, peer_codes));
267#ifdef OPENSSL
268	else if (num & CRPT_EVENT)
269		return (getcode(num & ~CRPT_EVENT, crypto_codes));
270#endif /* OPENSSL */
271	else
272		return (getcode(num, sys_codes));
273}
274
275const char *
276ceventstr(
277	int num
278	)
279{
280	return getcode(num, clock_codes);
281}
282
283const char *
284sysstatstr(
285	int status
286	)
287{
288	return statustoa(TYPE_SYS, status);
289}
290
291const char *
292peerstatstr(
293	int status
294	)
295{
296	return statustoa(TYPE_PEER, status);
297}
298
299const char *
300clockstatstr(
301	int status
302	)
303{
304	return statustoa(TYPE_CLOCK, status);
305}