blob: 5e1e33e7a8745dcf65c5be84ef0097e38852feac [file] [log] [blame]
/*
**************************************************************************
* Copyright (c) 2018, 2020, The Linux Foundation. All rights reserved.
* Permission to use, copy, modify, and/or distribute this software for
* any purpose with or without fee is hereby granted, provided that the
* above copyright notice and this permission notice appear in all copies.
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
* OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
**************************************************************************
*/
/*
* nss_dtls_log.c
* NSS DTLS logger file.
*/
#include "nss_core.h"
/*
* nss_dtls_log_message_types_str
* DTLS message strings
*/
static int8_t *nss_dtls_log_message_types_str[NSS_DTLS_MSG_MAX] __maybe_unused = {
"DTLS Session Configure",
"DTLS Session Destroy",
"DTLS Session Stats",
"DTLS Encap Cipher Update",
"DTLS Encap Cipher Switch",
"DTLS Decap Cipher Update",
"DTLS Decap Cipher Switch"
};
/*
* nss_dtls_log_error_response_types_str
* Strings for error types for DTLS messages
*/
static int8_t *nss_dtls_log_error_response_types_str[NSS_DTLS_ERR_MAX] __maybe_unused = {
"DTLS Unknown Message",
"DTLS Invalid APP Interface",
"DTLS Invalid Parameter",
"DTLS Invalid Version",
"DTLS No Memory"
};
/*
* nss_dtls_session_config_msg()
* Log DTLS session configure message.
*/
static void nss_dtls_session_config_msg(struct nss_dtls_msg *ndm)
{
struct nss_dtls_session_configure *ndscm __maybe_unused = &ndm->msg.cfg;
nss_trace("%px: NSS DTLS Session Configure Message:\n"
"DTLS Version: %d\n"
"DTLS Flags: %x\n"
"DTLS crypto index encap: %d\n"
"DTLS crypto index decap: %d\n"
"DTLS IV length for encapsulation: %d\n"
"DTLS IV length for decapsulation: %d\n"
"DTLS authentication hash length for encapsulation: %d\n"
"DTLS authentication hash length for decapsulation: %d\n"
"DTLS cipher algorithm for encapsulation: %x\n"
"DTLS authentication algorithm for encapsulation: %x\n"
"DTLS cipher algorithm for decapsulation: %x\n"
"DTLS authentication algorithm for decapsulation: %x\n"
"DTLS NSS interface: %x\n"
"DTLS source port: %d\n"
"DTLS destination port: %d\n"
"DTLS source ip: %px\n"
"DTLS destination ip: %px\n"
"DTLS window size: %d\n"
"DTLS epoch: %d\n"
"DTLS outer IP TTL: %d\n"
"DTLS reserved1 padding: %x\n"
"DTLS reserved2 padding: %x\n",
ndscm, ndscm->ver,
ndscm->flags, ndscm->crypto_idx_encap,
ndscm->crypto_idx_decap, ndscm->iv_len_encap,
ndscm->iv_len_decap, ndscm->hash_len_encap,
ndscm->hash_len_decap, ndscm->cipher_algo_encap,
ndscm->auth_algo_encap, ndscm->cipher_algo_decap,
ndscm->auth_algo_decap, ndscm->nss_app_if,
ndscm->sport, ndscm->dport,
&ndscm->sip, &ndscm->dip,
ndscm->window_size, ndscm->epoch,
ndscm->oip_ttl, ndscm->reserved1,
ndscm->reserved2);
}
/*
* nss_dtls_session_cipher_upddate_msg()
* Log DTLS Session Cipher Update message.
*/
static void nss_dtls_session_cipher_update_msg(struct nss_dtls_msg *ndm)
{
struct nss_dtls_session_cipher_update *ndscum __maybe_unused = &ndm->msg.cipher_update;
nss_trace("%px: NSS DTLS Session Cipher Update message\n"
"DTLS crypto index: %d\n"
"DTLS hash length: %d\n"
"DTLS crypto IV length for encapsulation: %d\n"
"DTLS encapsulation cipher: %x\n"
"DTLS encapsulation authentication algorigthm: %x\n"
"DTLS epoch: %d\n"
"DTLS reserved: %x\n",
ndscum, ndscum->crypto_idx,
ndscum->hash_len, ndscum->iv_len,
ndscum->cipher_algo, ndscum->auth_algo,
ndscum->epoch, ndscum->reserved);
}
/*
* nss_dtls_log_verbose()
* Log message contents.
*/
static void nss_dtls_log_verbose(struct nss_dtls_msg *ndm)
{
switch (ndm->cm.type) {
case NSS_DTLS_MSG_REKEY_DECAP_CIPHER_UPDATE:
case NSS_DTLS_MSG_REKEY_ENCAP_CIPHER_UPDATE:
nss_dtls_session_cipher_update_msg(ndm);
break;
case NSS_DTLS_MSG_SESSION_CONFIGURE:
nss_dtls_session_config_msg(ndm);
break;
default:
nss_warning("%px: Invalid message type\n", ndm);
break;
}
}
/*
* nss_dtls_log_tx_msg()
* Log messages transmitted to FW.
*/
void nss_dtls_log_tx_msg(struct nss_dtls_msg *ndm)
{
if (ndm->cm.type >= NSS_DTLS_MSG_MAX) {
nss_warning("%px: Invalid message type\n", ndm);
return;
}
nss_info("%px: type[%d]:%s\n", ndm, ndm->cm.type, nss_dtls_log_message_types_str[ndm->cm.type]);
nss_dtls_log_verbose(ndm);
}
/*
* nss_dtls_log_rx_msg()
* Log messages received from FW.
*/
void nss_dtls_log_rx_msg(struct nss_dtls_msg *ndm)
{
if (ndm->cm.response >= NSS_CMN_RESPONSE_LAST) {
nss_warning("%px: Invalid response\n", ndm);
return;
}
if (ndm->cm.response == NSS_CMN_RESPONSE_NOTIFY || (ndm->cm.response == NSS_CMN_RESPONSE_ACK)) {
nss_info("%px: type[%d]:%s, response[%d]:%s\n", ndm, ndm->cm.type,
nss_dtls_log_message_types_str[ndm->cm.type],
ndm->cm.response, nss_cmn_response_str[ndm->cm.response]);
goto verbose;
}
if (ndm->cm.error >= NSS_DTLS_ERR_MAX) {
nss_warning("%px: msg failure - type[%d]:%s, response[%d]:%s, error[%d]:Invalid error\n",
ndm, ndm->cm.type, nss_dtls_log_message_types_str[ndm->cm.type],
ndm->cm.response, nss_cmn_response_str[ndm->cm.response],
ndm->cm.error);
goto verbose;
}
nss_info("%px: msg nack - type[%d]:%s, response[%d]:%s, error[%d]:%s\n",
ndm, ndm->cm.type, nss_dtls_log_message_types_str[ndm->cm.type],
ndm->cm.response, nss_cmn_response_str[ndm->cm.response],
ndm->cm.error, nss_dtls_log_error_response_types_str[ndm->cm.error]);
verbose:
nss_dtls_log_verbose(ndm);
}