188768458SSam Leffler /* $OpenBSD: ip_esp.h,v 1.37 2002/06/09 16:26:10 itojun Exp $ */ 2c398230bSWarner Losh /*- 388768458SSam Leffler * The authors of this code are John Ioannidis (ji@tla.org), 488768458SSam Leffler * Angelos D. Keromytis (kermit@csd.uch.gr) and 588768458SSam Leffler * Niels Provos (provos@physnet.uni-hamburg.de). 688768458SSam Leffler * 788768458SSam Leffler * The original version of this code was written by John Ioannidis 888768458SSam Leffler * for BSD/OS in Athens, Greece, in November 1995. 988768458SSam Leffler * 1088768458SSam Leffler * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996, 1188768458SSam Leffler * by Angelos D. Keromytis. 1288768458SSam Leffler * 1388768458SSam Leffler * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis 1488768458SSam Leffler * and Niels Provos. 1588768458SSam Leffler * 1688768458SSam Leffler * Additional features in 1999 by Angelos D. Keromytis. 1788768458SSam Leffler * 1888768458SSam Leffler * Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis, 1988768458SSam Leffler * Angelos D. Keromytis and Niels Provos. 2088768458SSam Leffler * Copyright (c) 2001 Angelos D. Keromytis. 2188768458SSam Leffler * 2288768458SSam Leffler * Permission to use, copy, and modify this software with or without fee 2388768458SSam Leffler * is hereby granted, provided that this entire notice is included in 2488768458SSam Leffler * all copies of any software which is or includes a copy or 2588768458SSam Leffler * modification of this software. 2688768458SSam Leffler * You may use this code under the GNU public license if you so wish. Please 2788768458SSam Leffler * contribute changes back to the authors under this freer than GPL license 2888768458SSam Leffler * so that we may further the use of strong encryption without limitations to 2988768458SSam Leffler * all. 3088768458SSam Leffler * 3188768458SSam Leffler * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR 3288768458SSam Leffler * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY 3388768458SSam Leffler * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE 3488768458SSam Leffler * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR 3588768458SSam Leffler * PURPOSE. 3688768458SSam Leffler */ 3788768458SSam Leffler 3888768458SSam Leffler #ifndef _NETIPSEC_ESP_VAR_H_ 3988768458SSam Leffler #define _NETIPSEC_ESP_VAR_H_ 4088768458SSam Leffler 4188768458SSam Leffler /* 4288768458SSam Leffler * These define the algorithm indices into the histogram. They're 4388768458SSam Leffler * presently based on the PF_KEY v2 protocol values which is bogus; 4488768458SSam Leffler * they should be decoupled from the protocol at which time we can 4588768458SSam Leffler * pack them and reduce the size of the array to a reasonable value. 4688768458SSam Leffler */ 4788768458SSam Leffler #define ESP_ALG_MAX 256 /* NB: could be < but skipjack is 249 */ 4888768458SSam Leffler 4988768458SSam Leffler struct espstat { 50c80211e3SAndrey V. Elsukov uint64_t esps_hdrops; /* Packet shorter than header shows */ 51c80211e3SAndrey V. Elsukov uint64_t esps_nopf; /* Protocol family not supported */ 52c80211e3SAndrey V. Elsukov uint64_t esps_notdb; 53c80211e3SAndrey V. Elsukov uint64_t esps_badkcr; 54c80211e3SAndrey V. Elsukov uint64_t esps_qfull; 55c80211e3SAndrey V. Elsukov uint64_t esps_noxform; 56c80211e3SAndrey V. Elsukov uint64_t esps_badilen; 57c80211e3SAndrey V. Elsukov uint64_t esps_wrap; /* Replay counter wrapped around */ 58c80211e3SAndrey V. Elsukov uint64_t esps_badenc; /* Bad encryption detected */ 59c80211e3SAndrey V. Elsukov uint64_t esps_badauth; /* Only valid for transforms with auth */ 60c80211e3SAndrey V. Elsukov uint64_t esps_replay; /* Possible packet replay detected */ 61c80211e3SAndrey V. Elsukov uint64_t esps_input; /* Input ESP packets */ 62c80211e3SAndrey V. Elsukov uint64_t esps_output; /* Output ESP packets */ 63c80211e3SAndrey V. Elsukov uint64_t esps_invalid; /* Trying to use an invalid TDB */ 64c80211e3SAndrey V. Elsukov uint64_t esps_ibytes; /* Input bytes */ 65c80211e3SAndrey V. Elsukov uint64_t esps_obytes; /* Output bytes */ 66c80211e3SAndrey V. Elsukov uint64_t esps_toobig; /* Packet got larger than IP_MAXPACKET */ 67c80211e3SAndrey V. Elsukov uint64_t esps_pdrops; /* Packet blocked due to policy */ 68c80211e3SAndrey V. Elsukov uint64_t esps_crypto; /* Crypto processing failure */ 69c80211e3SAndrey V. Elsukov uint64_t esps_tunnel; /* Tunnel sanity check failure */ 70c80211e3SAndrey V. Elsukov uint64_t esps_hist[ESP_ALG_MAX]; /* Per-algorithm op count */ 7188768458SSam Leffler }; 7288768458SSam Leffler 7388768458SSam Leffler #ifdef _KERNEL 74db8c0879SAndrey V. Elsukov #include <sys/counter.h> 75*b1c3a4d7SKristof Provost #include <netinet/in_kdtrace.h> 7682cea7e6SBjoern A. Zeeb 77db8c0879SAndrey V. Elsukov VNET_DECLARE(int, esp_enable); 7841106f5aSKonstantin Belousov VNET_DECLARE(int, esp_ctr_compatibility); 7941106f5aSKonstantin Belousov #define V_esp_ctr_compatibility VNET(esp_ctr_compatibility) 80db8c0879SAndrey V. Elsukov VNET_PCPUSTAT_DECLARE(struct espstat, espstat); 81db8c0879SAndrey V. Elsukov 82db8c0879SAndrey V. Elsukov #define ESPSTAT_ADD(name, val) \ 83*b1c3a4d7SKristof Provost do { \ 84*b1c3a4d7SKristof Provost MIB_SDT_PROBE1(esp, count, name, (val)); \ 85*b1c3a4d7SKristof Provost VNET_PCPUSTAT_ADD(struct espstat, espstat, name, (val)); \ 86*b1c3a4d7SKristof Provost } while (0) 87a04d64d8SAndrey V. Elsukov #define ESPSTAT_INC(name) ESPSTAT_ADD(name, 1) 88*b1c3a4d7SKristof Provost #define ESPSTAT_INC2(name, type) \ 89*b1c3a4d7SKristof Provost do { \ 90*b1c3a4d7SKristof Provost MIB_SDT_PROBE2(esp, count, name, 1, (type)); \ 91*b1c3a4d7SKristof Provost VNET_PCPUSTAT_ADD(struct espstat, espstat, name[type], 1); \ 92*b1c3a4d7SKristof Provost } while (0) 93*b1c3a4d7SKristof Provost 9482cea7e6SBjoern A. Zeeb #define V_esp_enable VNET(esp_enable) 9588768458SSam Leffler #endif /* _KERNEL */ 9688768458SSam Leffler #endif /*_NETIPSEC_ESP_VAR_H_*/ 97