xref: /freebsd/usr.bin/netstat/ipsec.c (revision 6cc6f12231c7267d34a409cfbd960c7f3d69f8eb)
132cd1d96SJun-ichiro itojun Hagino /*	$NetBSD: inet.c,v 1.35.2.1 1999/04/29 14:57:08 perry Exp $	*/
222a4e209SHajimu UMEMOTO /*	$KAME: ipsec.c,v 1.33 2003/07/25 09:54:32 itojun Exp $	*/
332cd1d96SJun-ichiro itojun Hagino 
432cd1d96SJun-ichiro itojun Hagino /*
532cd1d96SJun-ichiro itojun Hagino  * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
632cd1d96SJun-ichiro itojun Hagino  * All rights reserved.
732cd1d96SJun-ichiro itojun Hagino  *
832cd1d96SJun-ichiro itojun Hagino  * Redistribution and use in source and binary forms, with or without
932cd1d96SJun-ichiro itojun Hagino  * modification, are permitted provided that the following conditions
1032cd1d96SJun-ichiro itojun Hagino  * are met:
1132cd1d96SJun-ichiro itojun Hagino  * 1. Redistributions of source code must retain the above copyright
1232cd1d96SJun-ichiro itojun Hagino  *    notice, this list of conditions and the following disclaimer.
1332cd1d96SJun-ichiro itojun Hagino  * 2. Redistributions in binary form must reproduce the above copyright
1432cd1d96SJun-ichiro itojun Hagino  *    notice, this list of conditions and the following disclaimer in the
1532cd1d96SJun-ichiro itojun Hagino  *    documentation and/or other materials provided with the distribution.
1632cd1d96SJun-ichiro itojun Hagino  * 3. Neither the name of the project nor the names of its contributors
1732cd1d96SJun-ichiro itojun Hagino  *    may be used to endorse or promote products derived from this software
1832cd1d96SJun-ichiro itojun Hagino  *    without specific prior written permission.
1932cd1d96SJun-ichiro itojun Hagino  *
2032cd1d96SJun-ichiro itojun Hagino  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
2132cd1d96SJun-ichiro itojun Hagino  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
2232cd1d96SJun-ichiro itojun Hagino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2332cd1d96SJun-ichiro itojun Hagino  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2432cd1d96SJun-ichiro itojun Hagino  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2532cd1d96SJun-ichiro itojun Hagino  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2632cd1d96SJun-ichiro itojun Hagino  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2732cd1d96SJun-ichiro itojun Hagino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2832cd1d96SJun-ichiro itojun Hagino  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2932cd1d96SJun-ichiro itojun Hagino  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
3032cd1d96SJun-ichiro itojun Hagino  * SUCH DAMAGE.
3132cd1d96SJun-ichiro itojun Hagino  */
3232cd1d96SJun-ichiro itojun Hagino 
3332cd1d96SJun-ichiro itojun Hagino /*
3432cd1d96SJun-ichiro itojun Hagino  * Copyright (c) 1983, 1988, 1993
3532cd1d96SJun-ichiro itojun Hagino  *	The Regents of the University of California.  All rights reserved.
3632cd1d96SJun-ichiro itojun Hagino  *
3732cd1d96SJun-ichiro itojun Hagino  * Redistribution and use in source and binary forms, with or without
3832cd1d96SJun-ichiro itojun Hagino  * modification, are permitted provided that the following conditions
3932cd1d96SJun-ichiro itojun Hagino  * are met:
4032cd1d96SJun-ichiro itojun Hagino  * 1. Redistributions of source code must retain the above copyright
4132cd1d96SJun-ichiro itojun Hagino  *    notice, this list of conditions and the following disclaimer.
4232cd1d96SJun-ichiro itojun Hagino  * 2. Redistributions in binary form must reproduce the above copyright
4332cd1d96SJun-ichiro itojun Hagino  *    notice, this list of conditions and the following disclaimer in the
4432cd1d96SJun-ichiro itojun Hagino  *    documentation and/or other materials provided with the distribution.
4532cd1d96SJun-ichiro itojun Hagino  * 3. All advertising materials mentioning features or use of this software
4632cd1d96SJun-ichiro itojun Hagino  *    must display the following acknowledgement:
4732cd1d96SJun-ichiro itojun Hagino  *	This product includes software developed by the University of
4832cd1d96SJun-ichiro itojun Hagino  *	California, Berkeley and its contributors.
4932cd1d96SJun-ichiro itojun Hagino  * 4. Neither the name of the University nor the names of its contributors
5032cd1d96SJun-ichiro itojun Hagino  *    may be used to endorse or promote products derived from this software
5132cd1d96SJun-ichiro itojun Hagino  *    without specific prior written permission.
5232cd1d96SJun-ichiro itojun Hagino  *
5332cd1d96SJun-ichiro itojun Hagino  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
5432cd1d96SJun-ichiro itojun Hagino  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
5532cd1d96SJun-ichiro itojun Hagino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5632cd1d96SJun-ichiro itojun Hagino  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5732cd1d96SJun-ichiro itojun Hagino  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5832cd1d96SJun-ichiro itojun Hagino  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5932cd1d96SJun-ichiro itojun Hagino  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
6032cd1d96SJun-ichiro itojun Hagino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
6132cd1d96SJun-ichiro itojun Hagino  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
6232cd1d96SJun-ichiro itojun Hagino  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
6332cd1d96SJun-ichiro itojun Hagino  * SUCH DAMAGE.
6432cd1d96SJun-ichiro itojun Hagino  */
6532cd1d96SJun-ichiro itojun Hagino 
665d8a878aSHajimu UMEMOTO #if 0
676cc6f122SPhilippe Charnier #ifndef lint
686cc6f122SPhilippe Charnier static char sccsid[] = "@(#)inet.c	8.5 (Berkeley) 5/24/95";
6932cd1d96SJun-ichiro itojun Hagino #endif /* not lint */
706cc6f122SPhilippe Charnier #endif
716cc6f122SPhilippe Charnier 
726cc6f122SPhilippe Charnier #include <sys/cdefs.h>
736cc6f122SPhilippe Charnier __FBSDID("$FreeBSD$");
7432cd1d96SJun-ichiro itojun Hagino 
7532cd1d96SJun-ichiro itojun Hagino #include <sys/param.h>
7632cd1d96SJun-ichiro itojun Hagino #include <sys/queue.h>
7732cd1d96SJun-ichiro itojun Hagino #include <sys/socket.h>
7832cd1d96SJun-ichiro itojun Hagino 
7932cd1d96SJun-ichiro itojun Hagino #include <netinet/in.h>
8032cd1d96SJun-ichiro itojun Hagino 
8132cd1d96SJun-ichiro itojun Hagino #ifdef IPSEC
8232cd1d96SJun-ichiro itojun Hagino #include <netinet6/ipsec.h>
8332cd1d96SJun-ichiro itojun Hagino #include <netkey/keysock.h>
8432cd1d96SJun-ichiro itojun Hagino #endif
8532cd1d96SJun-ichiro itojun Hagino 
8632cd1d96SJun-ichiro itojun Hagino #include <stdio.h>
8732cd1d96SJun-ichiro itojun Hagino #include <string.h>
8832cd1d96SJun-ichiro itojun Hagino #include <unistd.h>
8932cd1d96SJun-ichiro itojun Hagino #include "netstat.h"
9032cd1d96SJun-ichiro itojun Hagino 
9132cd1d96SJun-ichiro itojun Hagino #ifdef IPSEC
9233841545SHajimu UMEMOTO struct val2str {
9333841545SHajimu UMEMOTO 	int val;
9433841545SHajimu UMEMOTO 	const char *str;
9532cd1d96SJun-ichiro itojun Hagino };
9632cd1d96SJun-ichiro itojun Hagino 
9733841545SHajimu UMEMOTO static struct val2str ipsec_ahnames[] = {
9833841545SHajimu UMEMOTO 	{ SADB_AALG_NONE, "none", },
9933841545SHajimu UMEMOTO 	{ SADB_AALG_MD5HMAC, "hmac-md5", },
10033841545SHajimu UMEMOTO 	{ SADB_AALG_SHA1HMAC, "hmac-sha1", },
10133841545SHajimu UMEMOTO 	{ SADB_X_AALG_MD5, "md5", },
10233841545SHajimu UMEMOTO 	{ SADB_X_AALG_SHA, "sha", },
10333841545SHajimu UMEMOTO 	{ SADB_X_AALG_NULL, "null", },
10433841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_256
10533841545SHajimu UMEMOTO 	{ SADB_X_AALG_SHA2_256, "hmac-sha2-256", },
10633841545SHajimu UMEMOTO #endif
10733841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_384
10833841545SHajimu UMEMOTO 	{ SADB_X_AALG_SHA2_384, "hmac-sha2-384", },
10933841545SHajimu UMEMOTO #endif
11033841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_512
11133841545SHajimu UMEMOTO 	{ SADB_X_AALG_SHA2_512, "hmac-sha2-512", },
11233841545SHajimu UMEMOTO #endif
11322a4e209SHajimu UMEMOTO #ifdef SADB_X_AALG_RIPEMD160HMAC
11422a4e209SHajimu UMEMOTO 	{ SADB_X_AALG_RIPEMD160HMAC, "hmac-ripemd160", },
11522a4e209SHajimu UMEMOTO #endif
11622a4e209SHajimu UMEMOTO #ifdef SADB_X_AALG_AES_XCBC_MAC
11722a4e209SHajimu UMEMOTO 	{ SADB_X_AALG_AES_XCBC_MAC, "aes-xcbc-mac", },
11822a4e209SHajimu UMEMOTO #endif
11933841545SHajimu UMEMOTO 	{ -1, NULL },
12032cd1d96SJun-ichiro itojun Hagino };
12132cd1d96SJun-ichiro itojun Hagino 
12233841545SHajimu UMEMOTO static struct val2str ipsec_espnames[] = {
12333841545SHajimu UMEMOTO 	{ SADB_EALG_NONE, "none", },
12433841545SHajimu UMEMOTO 	{ SADB_EALG_DESCBC, "des-cbc", },
12533841545SHajimu UMEMOTO 	{ SADB_EALG_3DESCBC, "3des-cbc", },
12633841545SHajimu UMEMOTO 	{ SADB_EALG_NULL, "null", },
12733841545SHajimu UMEMOTO 	{ SADB_X_EALG_CAST128CBC, "cast128-cbc", },
12833841545SHajimu UMEMOTO 	{ SADB_X_EALG_BLOWFISHCBC, "blowfish-cbc", },
12933841545SHajimu UMEMOTO #ifdef SADB_X_EALG_RIJNDAELCBC
13033841545SHajimu UMEMOTO 	{ SADB_X_EALG_RIJNDAELCBC, "rijndael-cbc", },
13133841545SHajimu UMEMOTO #endif
13222a4e209SHajimu UMEMOTO #ifdef SADB_X_EALG_AESCTR
13322a4e209SHajimu UMEMOTO 	{ SADB_X_EALG_AESCTR, "aes-ctr", },
13422a4e209SHajimu UMEMOTO #endif
13533841545SHajimu UMEMOTO 	{ -1, NULL },
13633841545SHajimu UMEMOTO };
13733841545SHajimu UMEMOTO 
13833841545SHajimu UMEMOTO static struct val2str ipsec_compnames[] = {
13933841545SHajimu UMEMOTO 	{ SADB_X_CALG_NONE, "none", },
14033841545SHajimu UMEMOTO 	{ SADB_X_CALG_OUI, "oui", },
14133841545SHajimu UMEMOTO 	{ SADB_X_CALG_DEFLATE, "deflate", },
14233841545SHajimu UMEMOTO 	{ SADB_X_CALG_LZS, "lzs", },
14333841545SHajimu UMEMOTO 	{ -1, NULL },
14432cd1d96SJun-ichiro itojun Hagino };
14532cd1d96SJun-ichiro itojun Hagino 
14632cd1d96SJun-ichiro itojun Hagino static const char *pfkey_msgtypenames[] = {
14732cd1d96SJun-ichiro itojun Hagino 	"reserved", "getspi", "update", "add", "delete",
14832cd1d96SJun-ichiro itojun Hagino 	"get", "acquire", "register", "expire", "flush",
14932cd1d96SJun-ichiro itojun Hagino 	"dump", "x_promisc", "x_pchange", "x_spdupdate", "x_spdadd",
15032cd1d96SJun-ichiro itojun Hagino 	"x_spddelete", "x_spdget", "x_spdacquire", "x_spddump", "x_spdflush",
15132cd1d96SJun-ichiro itojun Hagino 	"x_spdsetidx", "x_spdexpire", "x_spddelete2"
15232cd1d96SJun-ichiro itojun Hagino };
15332cd1d96SJun-ichiro itojun Hagino 
15432cd1d96SJun-ichiro itojun Hagino static struct ipsecstat ipsecstat;
15532cd1d96SJun-ichiro itojun Hagino 
1565e051718SAssar Westerlund static void print_ipsecstats (void);
1575e051718SAssar Westerlund static const char *pfkey_msgtype_names (int);
1585e051718SAssar Westerlund static void ipsec_hist (const u_quad_t *, size_t, const struct val2str *,
159f964d60dSAssar Westerlund 	const char *);
16032cd1d96SJun-ichiro itojun Hagino 
16132cd1d96SJun-ichiro itojun Hagino /*
16232cd1d96SJun-ichiro itojun Hagino  * Dump IPSEC statistics structure.
16332cd1d96SJun-ichiro itojun Hagino  */
16432cd1d96SJun-ichiro itojun Hagino static void
1655d8a878aSHajimu UMEMOTO ipsec_hist(const u_quad_t *hist, size_t histmax, const struct val2str *name,
1665e051718SAssar Westerlund 	   const char *title)
16732cd1d96SJun-ichiro itojun Hagino {
16832cd1d96SJun-ichiro itojun Hagino 	int first;
16932cd1d96SJun-ichiro itojun Hagino 	size_t proto;
17033841545SHajimu UMEMOTO 	const struct val2str *p;
17132cd1d96SJun-ichiro itojun Hagino 
17233841545SHajimu UMEMOTO 	first = 1;
17333841545SHajimu UMEMOTO 	for (proto = 0; proto < histmax; proto++) {
17432cd1d96SJun-ichiro itojun Hagino 		if (hist[proto] <= 0)
17532cd1d96SJun-ichiro itojun Hagino 			continue;
17632cd1d96SJun-ichiro itojun Hagino 		if (first) {
17732cd1d96SJun-ichiro itojun Hagino 			printf("\t%s histogram:\n", title);
17832cd1d96SJun-ichiro itojun Hagino 			first = 0;
17932cd1d96SJun-ichiro itojun Hagino 		}
18033841545SHajimu UMEMOTO 		for (p = name; p && p->str; p++) {
181f964d60dSAssar Westerlund 			if (p->val == (int)proto)
18233841545SHajimu UMEMOTO 				break;
18333841545SHajimu UMEMOTO 		}
18433841545SHajimu UMEMOTO 		if (p && p->str) {
1855d8a878aSHajimu UMEMOTO 			printf("\t\t%s: %llu\n", p->str, (unsigned long long)hist[proto]);
18632cd1d96SJun-ichiro itojun Hagino 		} else {
1875d8a878aSHajimu UMEMOTO 			printf("\t\t#%ld: %llu\n", (long)proto,
1885d8a878aSHajimu UMEMOTO 			    (unsigned long long)hist[proto]);
18932cd1d96SJun-ichiro itojun Hagino 		}
19032cd1d96SJun-ichiro itojun Hagino 	}
19132cd1d96SJun-ichiro itojun Hagino }
19232cd1d96SJun-ichiro itojun Hagino 
19332cd1d96SJun-ichiro itojun Hagino static void
1945e051718SAssar Westerlund print_ipsecstats(void)
19532cd1d96SJun-ichiro itojun Hagino {
19632cd1d96SJun-ichiro itojun Hagino #define	p(f, m) if (ipsecstat.f || sflag <= 1) \
1975d8a878aSHajimu UMEMOTO     printf(m, (unsigned long long)ipsecstat.f, plural(ipsecstat.f))
1983fde69b9SHajimu UMEMOTO #define	pes(f, m) if (ipsecstat.f || sflag <= 1) \
1993fde69b9SHajimu UMEMOTO     printf(m, (unsigned long long)ipsecstat.f, plurales(ipsecstat.f))
20032cd1d96SJun-ichiro itojun Hagino #define hist(f, n, t) \
201f964d60dSAssar Westerlund     ipsec_hist((f), sizeof(f)/sizeof(f[0]), (n), (t));
20232cd1d96SJun-ichiro itojun Hagino 
2035d8a878aSHajimu UMEMOTO 	p(in_success, "\t%llu inbound packet%s processed successfully\n");
2045d8a878aSHajimu UMEMOTO 	p(in_polvio, "\t%llu inbound packet%s violated process security "
20532cd1d96SJun-ichiro itojun Hagino 	    "policy\n");
2065d8a878aSHajimu UMEMOTO 	p(in_nosa, "\t%llu inbound packet%s with no SA available\n");
2075d8a878aSHajimu UMEMOTO 	p(in_inval, "\t%llu invalid inbound packet%s\n");
2085d8a878aSHajimu UMEMOTO 	p(in_nomem, "\t%llu inbound packet%s failed due to insufficient memory\n");
2095d8a878aSHajimu UMEMOTO 	p(in_badspi, "\t%llu inbound packet%s failed getting SPI\n");
2105d8a878aSHajimu UMEMOTO 	p(in_ahreplay, "\t%llu inbound packet%s failed on AH replay check\n");
2115d8a878aSHajimu UMEMOTO 	p(in_espreplay, "\t%llu inbound packet%s failed on ESP replay check\n");
2125d8a878aSHajimu UMEMOTO 	p(in_ahauthsucc, "\t%llu inbound packet%s considered authentic\n");
2135d8a878aSHajimu UMEMOTO 	p(in_ahauthfail, "\t%llu inbound packet%s failed on authentication\n");
21432cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.in_ahhist, ipsec_ahnames, "AH input");
21532cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.in_esphist, ipsec_espnames, "ESP input");
21632cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.in_comphist, ipsec_compnames, "IPComp input");
21732cd1d96SJun-ichiro itojun Hagino 
2185d8a878aSHajimu UMEMOTO 	p(out_success, "\t%llu outbound packet%s processed successfully\n");
2195d8a878aSHajimu UMEMOTO 	p(out_polvio, "\t%llu outbound packet%s violated process security "
22032cd1d96SJun-ichiro itojun Hagino 	    "policy\n");
2215d8a878aSHajimu UMEMOTO 	p(out_nosa, "\t%llu outbound packet%s with no SA available\n");
2225d8a878aSHajimu UMEMOTO 	p(out_inval, "\t%llu invalid outbound packet%s\n");
2235d8a878aSHajimu UMEMOTO 	p(out_nomem, "\t%llu outbound packet%s failed due to insufficient memory\n");
2245d8a878aSHajimu UMEMOTO 	p(out_noroute, "\t%llu outbound packet%s with no route\n");
22532cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.out_ahhist, ipsec_ahnames, "AH output");
22632cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.out_esphist, ipsec_espnames, "ESP output");
22732cd1d96SJun-ichiro itojun Hagino 	hist(ipsecstat.out_comphist, ipsec_compnames, "IPComp output");
2283fde69b9SHajimu UMEMOTO 	p(spdcachelookup, "\t%llu SPD cache lookup%s\n");
2293fde69b9SHajimu UMEMOTO 	pes(spdcachemiss, "\t%llu SPD cache miss%s\n");
23032cd1d96SJun-ichiro itojun Hagino #undef p
2313fde69b9SHajimu UMEMOTO #undef pes
23232cd1d96SJun-ichiro itojun Hagino #undef hist
23332cd1d96SJun-ichiro itojun Hagino }
23432cd1d96SJun-ichiro itojun Hagino 
23532cd1d96SJun-ichiro itojun Hagino void
236a01e3379SDavid Malone ipsec_stats(u_long off __unused, const char *name, int af1 __unused)
23732cd1d96SJun-ichiro itojun Hagino {
23832cd1d96SJun-ichiro itojun Hagino 	if (off == 0)
23932cd1d96SJun-ichiro itojun Hagino 		return;
24032cd1d96SJun-ichiro itojun Hagino 	printf ("%s:\n", name);
24132cd1d96SJun-ichiro itojun Hagino 	kread(off, (char *)&ipsecstat, sizeof (ipsecstat));
24232cd1d96SJun-ichiro itojun Hagino 
24332cd1d96SJun-ichiro itojun Hagino 	print_ipsecstats();
24432cd1d96SJun-ichiro itojun Hagino }
24532cd1d96SJun-ichiro itojun Hagino 
24632cd1d96SJun-ichiro itojun Hagino static const char *
2475e051718SAssar Westerlund pfkey_msgtype_names(int x)
24832cd1d96SJun-ichiro itojun Hagino {
24932cd1d96SJun-ichiro itojun Hagino 	const int max =
25032cd1d96SJun-ichiro itojun Hagino 	    sizeof(pfkey_msgtypenames)/sizeof(pfkey_msgtypenames[0]);
2515d8a878aSHajimu UMEMOTO 	static char buf[20];
25232cd1d96SJun-ichiro itojun Hagino 
25332cd1d96SJun-ichiro itojun Hagino 	if (x < max && pfkey_msgtypenames[x])
25432cd1d96SJun-ichiro itojun Hagino 		return pfkey_msgtypenames[x];
25532cd1d96SJun-ichiro itojun Hagino 	snprintf(buf, sizeof(buf), "#%d", x);
25632cd1d96SJun-ichiro itojun Hagino 	return buf;
25732cd1d96SJun-ichiro itojun Hagino }
25832cd1d96SJun-ichiro itojun Hagino 
25932cd1d96SJun-ichiro itojun Hagino void
260a01e3379SDavid Malone pfkey_stats(u_long off __unused, const char *name, int af1 __unused)
26132cd1d96SJun-ichiro itojun Hagino {
26232cd1d96SJun-ichiro itojun Hagino 	struct pfkeystat pfkeystat;
263f964d60dSAssar Westerlund 	unsigned first, type;
26432cd1d96SJun-ichiro itojun Hagino 
26532cd1d96SJun-ichiro itojun Hagino 	if (off == 0)
26632cd1d96SJun-ichiro itojun Hagino 		return;
26732cd1d96SJun-ichiro itojun Hagino 	printf ("%s:\n", name);
26832cd1d96SJun-ichiro itojun Hagino 	kread(off, (char *)&pfkeystat, sizeof(pfkeystat));
26932cd1d96SJun-ichiro itojun Hagino 
27032cd1d96SJun-ichiro itojun Hagino #define	p(f, m) if (pfkeystat.f || sflag <= 1) \
2715d8a878aSHajimu UMEMOTO     printf(m, (unsigned long long)pfkeystat.f, plural(pfkeystat.f))
27232cd1d96SJun-ichiro itojun Hagino 
2735d8a878aSHajimu UMEMOTO 	/* userland -> kernel */
2745d8a878aSHajimu UMEMOTO 	p(out_total, "\t%llu request%s sent from userland\n");
2755d8a878aSHajimu UMEMOTO 	p(out_bytes, "\t%llu byte%s sent from userland\n");
27632cd1d96SJun-ichiro itojun Hagino 	for (first = 1, type = 0;
27732cd1d96SJun-ichiro itojun Hagino 	     type < sizeof(pfkeystat.out_msgtype)/sizeof(pfkeystat.out_msgtype[0]);
27832cd1d96SJun-ichiro itojun Hagino 	     type++) {
27932cd1d96SJun-ichiro itojun Hagino 		if (pfkeystat.out_msgtype[type] <= 0)
28032cd1d96SJun-ichiro itojun Hagino 			continue;
28132cd1d96SJun-ichiro itojun Hagino 		if (first) {
28232cd1d96SJun-ichiro itojun Hagino 			printf("\thistogram by message type:\n");
28332cd1d96SJun-ichiro itojun Hagino 			first = 0;
28432cd1d96SJun-ichiro itojun Hagino 		}
2855d8a878aSHajimu UMEMOTO 		printf("\t\t%s: %llu\n", pfkey_msgtype_names(type),
2865d8a878aSHajimu UMEMOTO 		    (unsigned long long)pfkeystat.out_msgtype[type]);
28732cd1d96SJun-ichiro itojun Hagino 	}
2885d8a878aSHajimu UMEMOTO 	p(out_invlen, "\t%llu message%s with invalid length field\n");
2895d8a878aSHajimu UMEMOTO 	p(out_invver, "\t%llu message%s with invalid version field\n");
2905d8a878aSHajimu UMEMOTO 	p(out_invmsgtype, "\t%llu message%s with invalid message type field\n");
2915d8a878aSHajimu UMEMOTO 	p(out_tooshort, "\t%llu message%s too short\n");
2925d8a878aSHajimu UMEMOTO 	p(out_nomem, "\t%llu message%s with memory allocation failure\n");
2935d8a878aSHajimu UMEMOTO 	p(out_dupext, "\t%llu message%s with duplicate extension\n");
2945d8a878aSHajimu UMEMOTO 	p(out_invexttype, "\t%llu message%s with invalid extension type\n");
2955d8a878aSHajimu UMEMOTO 	p(out_invsatype, "\t%llu message%s with invalid sa type\n");
2965d8a878aSHajimu UMEMOTO 	p(out_invaddr, "\t%llu message%s with invalid address extension\n");
29732cd1d96SJun-ichiro itojun Hagino 
2985d8a878aSHajimu UMEMOTO 	/* kernel -> userland */
2995d8a878aSHajimu UMEMOTO 	p(in_total, "\t%llu request%s sent to userland\n");
3005d8a878aSHajimu UMEMOTO 	p(in_bytes, "\t%llu byte%s sent to userland\n");
30132cd1d96SJun-ichiro itojun Hagino 	for (first = 1, type = 0;
30232cd1d96SJun-ichiro itojun Hagino 	     type < sizeof(pfkeystat.in_msgtype)/sizeof(pfkeystat.in_msgtype[0]);
30332cd1d96SJun-ichiro itojun Hagino 	     type++) {
30432cd1d96SJun-ichiro itojun Hagino 		if (pfkeystat.in_msgtype[type] <= 0)
30532cd1d96SJun-ichiro itojun Hagino 			continue;
30632cd1d96SJun-ichiro itojun Hagino 		if (first) {
30732cd1d96SJun-ichiro itojun Hagino 			printf("\thistogram by message type:\n");
30832cd1d96SJun-ichiro itojun Hagino 			first = 0;
30932cd1d96SJun-ichiro itojun Hagino 		}
3105d8a878aSHajimu UMEMOTO 		printf("\t\t%s: %llu\n", pfkey_msgtype_names(type),
3115d8a878aSHajimu UMEMOTO 		    (unsigned long long)pfkeystat.in_msgtype[type]);
31232cd1d96SJun-ichiro itojun Hagino 	}
31332cd1d96SJun-ichiro itojun Hagino 	p(in_msgtarget[KEY_SENDUP_ONE],
3145d8a878aSHajimu UMEMOTO 	    "\t%llu message%s toward single socket\n");
31532cd1d96SJun-ichiro itojun Hagino 	p(in_msgtarget[KEY_SENDUP_ALL],
3165d8a878aSHajimu UMEMOTO 	    "\t%llu message%s toward all sockets\n");
31732cd1d96SJun-ichiro itojun Hagino 	p(in_msgtarget[KEY_SENDUP_REGISTERED],
3185d8a878aSHajimu UMEMOTO 	    "\t%llu message%s toward registered sockets\n");
3195d8a878aSHajimu UMEMOTO 	p(in_nomem, "\t%llu message%s with memory allocation failure\n");
32032cd1d96SJun-ichiro itojun Hagino #undef p
32132cd1d96SJun-ichiro itojun Hagino }
32232cd1d96SJun-ichiro itojun Hagino #endif /*IPSEC*/
323