122a4e209SHajimu UMEMOTO /* $KAME: ipsec.c,v 1.33 2003/07/25 09:54:32 itojun Exp $ */ 232cd1d96SJun-ichiro itojun Hagino 365475bc8SDavid E. O'Brien /*- 4100b98dbSKelly Yancey * Copyright (c) 2005 NTT Multimedia Communications Laboratories, Inc. 5100b98dbSKelly Yancey * All rights reserved. 6100b98dbSKelly Yancey * 7100b98dbSKelly Yancey * Redistribution and use in source and binary forms, with or without 8100b98dbSKelly Yancey * modification, are permitted provided that the following conditions 9100b98dbSKelly Yancey * are met: 10100b98dbSKelly Yancey * 1. Redistributions of source code must retain the above copyright 11100b98dbSKelly Yancey * notice, this list of conditions and the following disclaimer. 12100b98dbSKelly Yancey * 2. Redistributions in binary form must reproduce the above copyright 13100b98dbSKelly Yancey * notice, this list of conditions and the following disclaimer in the 14100b98dbSKelly Yancey * documentation and/or other materials provided with the distribution. 15100b98dbSKelly Yancey * 16100b98dbSKelly Yancey * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 17100b98dbSKelly Yancey * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18100b98dbSKelly Yancey * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19100b98dbSKelly Yancey * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 20100b98dbSKelly Yancey * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21100b98dbSKelly Yancey * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22100b98dbSKelly Yancey * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23100b98dbSKelly Yancey * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24100b98dbSKelly Yancey * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25100b98dbSKelly Yancey * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26100b98dbSKelly Yancey * SUCH DAMAGE. 27100b98dbSKelly Yancey */ 2865475bc8SDavid E. O'Brien /*- 2932cd1d96SJun-ichiro itojun Hagino * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. 3032cd1d96SJun-ichiro itojun Hagino * All rights reserved. 3132cd1d96SJun-ichiro itojun Hagino * 3232cd1d96SJun-ichiro itojun Hagino * Redistribution and use in source and binary forms, with or without 3332cd1d96SJun-ichiro itojun Hagino * modification, are permitted provided that the following conditions 3432cd1d96SJun-ichiro itojun Hagino * are met: 3532cd1d96SJun-ichiro itojun Hagino * 1. Redistributions of source code must retain the above copyright 3632cd1d96SJun-ichiro itojun Hagino * notice, this list of conditions and the following disclaimer. 3732cd1d96SJun-ichiro itojun Hagino * 2. Redistributions in binary form must reproduce the above copyright 3832cd1d96SJun-ichiro itojun Hagino * notice, this list of conditions and the following disclaimer in the 3932cd1d96SJun-ichiro itojun Hagino * documentation and/or other materials provided with the distribution. 4032cd1d96SJun-ichiro itojun Hagino * 3. Neither the name of the project nor the names of its contributors 4132cd1d96SJun-ichiro itojun Hagino * may be used to endorse or promote products derived from this software 4232cd1d96SJun-ichiro itojun Hagino * without specific prior written permission. 4332cd1d96SJun-ichiro itojun Hagino * 4432cd1d96SJun-ichiro itojun Hagino * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 4532cd1d96SJun-ichiro itojun Hagino * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4632cd1d96SJun-ichiro itojun Hagino * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4732cd1d96SJun-ichiro itojun Hagino * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 4832cd1d96SJun-ichiro itojun Hagino * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 4932cd1d96SJun-ichiro itojun Hagino * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 5032cd1d96SJun-ichiro itojun Hagino * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 5132cd1d96SJun-ichiro itojun Hagino * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 5232cd1d96SJun-ichiro itojun Hagino * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5332cd1d96SJun-ichiro itojun Hagino * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5432cd1d96SJun-ichiro itojun Hagino * SUCH DAMAGE. 5532cd1d96SJun-ichiro itojun Hagino */ 5665475bc8SDavid E. O'Brien /*- 5732cd1d96SJun-ichiro itojun Hagino * Copyright (c) 1983, 1988, 1993 5832cd1d96SJun-ichiro itojun Hagino * The Regents of the University of California. All rights reserved. 5932cd1d96SJun-ichiro itojun Hagino * 6032cd1d96SJun-ichiro itojun Hagino * Redistribution and use in source and binary forms, with or without 6132cd1d96SJun-ichiro itojun Hagino * modification, are permitted provided that the following conditions 6232cd1d96SJun-ichiro itojun Hagino * are met: 6332cd1d96SJun-ichiro itojun Hagino * 1. Redistributions of source code must retain the above copyright 6432cd1d96SJun-ichiro itojun Hagino * notice, this list of conditions and the following disclaimer. 6532cd1d96SJun-ichiro itojun Hagino * 2. Redistributions in binary form must reproduce the above copyright 6632cd1d96SJun-ichiro itojun Hagino * notice, this list of conditions and the following disclaimer in the 6732cd1d96SJun-ichiro itojun Hagino * documentation and/or other materials provided with the distribution. 6832cd1d96SJun-ichiro itojun Hagino * 4. Neither the name of the University nor the names of its contributors 6932cd1d96SJun-ichiro itojun Hagino * may be used to endorse or promote products derived from this software 7032cd1d96SJun-ichiro itojun Hagino * without specific prior written permission. 7132cd1d96SJun-ichiro itojun Hagino * 7232cd1d96SJun-ichiro itojun Hagino * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 7332cd1d96SJun-ichiro itojun Hagino * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 7432cd1d96SJun-ichiro itojun Hagino * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 7532cd1d96SJun-ichiro itojun Hagino * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 7632cd1d96SJun-ichiro itojun Hagino * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 7732cd1d96SJun-ichiro itojun Hagino * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 7832cd1d96SJun-ichiro itojun Hagino * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 7932cd1d96SJun-ichiro itojun Hagino * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 8032cd1d96SJun-ichiro itojun Hagino * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 8132cd1d96SJun-ichiro itojun Hagino * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 8232cd1d96SJun-ichiro itojun Hagino * SUCH DAMAGE. 8332cd1d96SJun-ichiro itojun Hagino */ 8432cd1d96SJun-ichiro itojun Hagino 855d8a878aSHajimu UMEMOTO #if 0 866cc6f122SPhilippe Charnier #ifndef lint 876cc6f122SPhilippe Charnier static char sccsid[] = "@(#)inet.c 8.5 (Berkeley) 5/24/95"; 8832cd1d96SJun-ichiro itojun Hagino #endif /* not lint */ 896cc6f122SPhilippe Charnier #endif 906cc6f122SPhilippe Charnier 916cc6f122SPhilippe Charnier #include <sys/cdefs.h> 926cc6f122SPhilippe Charnier __FBSDID("$FreeBSD$"); 9332cd1d96SJun-ichiro itojun Hagino 9432cd1d96SJun-ichiro itojun Hagino #include <sys/param.h> 9532cd1d96SJun-ichiro itojun Hagino #include <sys/queue.h> 9632cd1d96SJun-ichiro itojun Hagino #include <sys/socket.h> 97feda1a43SJohn Baldwin #include <sys/socketvar.h> 9832cd1d96SJun-ichiro itojun Hagino 9932cd1d96SJun-ichiro itojun Hagino #include <netinet/in.h> 10032cd1d96SJun-ichiro itojun Hagino 1018409aedfSGeorge V. Neville-Neil #ifdef IPSEC 102100b98dbSKelly Yancey #include <netipsec/ipsec.h> 103100b98dbSKelly Yancey #include <netipsec/ah_var.h> 104100b98dbSKelly Yancey #include <netipsec/esp_var.h> 105100b98dbSKelly Yancey #include <netipsec/ipcomp_var.h> 10632cd1d96SJun-ichiro itojun Hagino #endif 10732cd1d96SJun-ichiro itojun Hagino 1087b95a1ebSYaroslav Tykhiy #include <stdint.h> 10932cd1d96SJun-ichiro itojun Hagino #include <stdio.h> 110821df508SXin LI #include <string.h> 111821df508SXin LI #include <unistd.h> 11232cd1d96SJun-ichiro itojun Hagino #include "netstat.h" 11332cd1d96SJun-ichiro itojun Hagino 11432cd1d96SJun-ichiro itojun Hagino #ifdef IPSEC 11533841545SHajimu UMEMOTO struct val2str { 11633841545SHajimu UMEMOTO int val; 11733841545SHajimu UMEMOTO const char *str; 11832cd1d96SJun-ichiro itojun Hagino }; 11932cd1d96SJun-ichiro itojun Hagino 12033841545SHajimu UMEMOTO static struct val2str ipsec_ahnames[] = { 12133841545SHajimu UMEMOTO { SADB_AALG_NONE, "none", }, 12233841545SHajimu UMEMOTO { SADB_AALG_MD5HMAC, "hmac-md5", }, 12333841545SHajimu UMEMOTO { SADB_AALG_SHA1HMAC, "hmac-sha1", }, 12433841545SHajimu UMEMOTO { SADB_X_AALG_MD5, "md5", }, 12533841545SHajimu UMEMOTO { SADB_X_AALG_SHA, "sha", }, 12633841545SHajimu UMEMOTO { SADB_X_AALG_NULL, "null", }, 12733841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_256 12833841545SHajimu UMEMOTO { SADB_X_AALG_SHA2_256, "hmac-sha2-256", }, 12933841545SHajimu UMEMOTO #endif 13033841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_384 13133841545SHajimu UMEMOTO { SADB_X_AALG_SHA2_384, "hmac-sha2-384", }, 13233841545SHajimu UMEMOTO #endif 13333841545SHajimu UMEMOTO #ifdef SADB_X_AALG_SHA2_512 13433841545SHajimu UMEMOTO { SADB_X_AALG_SHA2_512, "hmac-sha2-512", }, 13533841545SHajimu UMEMOTO #endif 13622a4e209SHajimu UMEMOTO #ifdef SADB_X_AALG_RIPEMD160HMAC 13722a4e209SHajimu UMEMOTO { SADB_X_AALG_RIPEMD160HMAC, "hmac-ripemd160", }, 13822a4e209SHajimu UMEMOTO #endif 13922a4e209SHajimu UMEMOTO #ifdef SADB_X_AALG_AES_XCBC_MAC 14022a4e209SHajimu UMEMOTO { SADB_X_AALG_AES_XCBC_MAC, "aes-xcbc-mac", }, 14122a4e209SHajimu UMEMOTO #endif 14233841545SHajimu UMEMOTO { -1, NULL }, 14332cd1d96SJun-ichiro itojun Hagino }; 14432cd1d96SJun-ichiro itojun Hagino 14533841545SHajimu UMEMOTO static struct val2str ipsec_espnames[] = { 14633841545SHajimu UMEMOTO { SADB_EALG_NONE, "none", }, 14733841545SHajimu UMEMOTO { SADB_EALG_DESCBC, "des-cbc", }, 14833841545SHajimu UMEMOTO { SADB_EALG_3DESCBC, "3des-cbc", }, 14933841545SHajimu UMEMOTO { SADB_EALG_NULL, "null", }, 15033841545SHajimu UMEMOTO { SADB_X_EALG_CAST128CBC, "cast128-cbc", }, 15133841545SHajimu UMEMOTO { SADB_X_EALG_BLOWFISHCBC, "blowfish-cbc", }, 15233841545SHajimu UMEMOTO #ifdef SADB_X_EALG_RIJNDAELCBC 15333841545SHajimu UMEMOTO { SADB_X_EALG_RIJNDAELCBC, "rijndael-cbc", }, 15433841545SHajimu UMEMOTO #endif 15522a4e209SHajimu UMEMOTO #ifdef SADB_X_EALG_AESCTR 15622a4e209SHajimu UMEMOTO { SADB_X_EALG_AESCTR, "aes-ctr", }, 15722a4e209SHajimu UMEMOTO #endif 15833841545SHajimu UMEMOTO { -1, NULL }, 15933841545SHajimu UMEMOTO }; 16033841545SHajimu UMEMOTO 16133841545SHajimu UMEMOTO static struct val2str ipsec_compnames[] = { 16233841545SHajimu UMEMOTO { SADB_X_CALG_NONE, "none", }, 16333841545SHajimu UMEMOTO { SADB_X_CALG_OUI, "oui", }, 16433841545SHajimu UMEMOTO { SADB_X_CALG_DEFLATE, "deflate", }, 16533841545SHajimu UMEMOTO { SADB_X_CALG_LZS, "lzs", }, 16633841545SHajimu UMEMOTO { -1, NULL }, 16732cd1d96SJun-ichiro itojun Hagino }; 16832cd1d96SJun-ichiro itojun Hagino 169100b98dbSKelly Yancey static void ipsec_hist(const u_quad_t *hist, size_t histmax, 170100b98dbSKelly Yancey const struct val2str *name, const char *title); 171100b98dbSKelly Yancey static void print_ipsecstats(const struct ipsecstat *ipsecstat); 17232cd1d96SJun-ichiro itojun Hagino 17332cd1d96SJun-ichiro itojun Hagino 17432cd1d96SJun-ichiro itojun Hagino /* 17532cd1d96SJun-ichiro itojun Hagino * Dump IPSEC statistics structure. 17632cd1d96SJun-ichiro itojun Hagino */ 17732cd1d96SJun-ichiro itojun Hagino static void 1785d8a878aSHajimu UMEMOTO ipsec_hist(const u_quad_t *hist, size_t histmax, const struct val2str *name, 1795e051718SAssar Westerlund const char *title) 18032cd1d96SJun-ichiro itojun Hagino { 18132cd1d96SJun-ichiro itojun Hagino int first; 18232cd1d96SJun-ichiro itojun Hagino size_t proto; 18333841545SHajimu UMEMOTO const struct val2str *p; 18432cd1d96SJun-ichiro itojun Hagino 18533841545SHajimu UMEMOTO first = 1; 18633841545SHajimu UMEMOTO for (proto = 0; proto < histmax; proto++) { 18732cd1d96SJun-ichiro itojun Hagino if (hist[proto] <= 0) 18832cd1d96SJun-ichiro itojun Hagino continue; 18932cd1d96SJun-ichiro itojun Hagino if (first) { 19032cd1d96SJun-ichiro itojun Hagino printf("\t%s histogram:\n", title); 19132cd1d96SJun-ichiro itojun Hagino first = 0; 19232cd1d96SJun-ichiro itojun Hagino } 19333841545SHajimu UMEMOTO for (p = name; p && p->str; p++) { 194f964d60dSAssar Westerlund if (p->val == (int)proto) 19533841545SHajimu UMEMOTO break; 19633841545SHajimu UMEMOTO } 19733841545SHajimu UMEMOTO if (p && p->str) { 1987b95a1ebSYaroslav Tykhiy printf("\t\t%s: %ju\n", p->str, (uintmax_t)hist[proto]); 19932cd1d96SJun-ichiro itojun Hagino } else { 2007b95a1ebSYaroslav Tykhiy printf("\t\t#%ld: %ju\n", (long)proto, 2017b95a1ebSYaroslav Tykhiy (uintmax_t)hist[proto]); 20232cd1d96SJun-ichiro itojun Hagino } 20332cd1d96SJun-ichiro itojun Hagino } 20432cd1d96SJun-ichiro itojun Hagino } 20532cd1d96SJun-ichiro itojun Hagino 20632cd1d96SJun-ichiro itojun Hagino static void 207100b98dbSKelly Yancey print_ipsecstats(const struct ipsecstat *ipsecstat) 20832cd1d96SJun-ichiro itojun Hagino { 209100b98dbSKelly Yancey #define p(f, m) if (ipsecstat->f || sflag <= 1) \ 2107b95a1ebSYaroslav Tykhiy printf(m, (uintmax_t)ipsecstat->f, plural(ipsecstat->f)) 211100b98dbSKelly Yancey #define pes(f, m) if (ipsecstat->f || sflag <= 1) \ 2127b95a1ebSYaroslav Tykhiy printf(m, (uintmax_t)ipsecstat->f, plurales(ipsecstat->f)) 21332cd1d96SJun-ichiro itojun Hagino #define hist(f, n, t) \ 214f964d60dSAssar Westerlund ipsec_hist((f), sizeof(f)/sizeof(f[0]), (n), (t)); 21532cd1d96SJun-ichiro itojun Hagino 2167b95a1ebSYaroslav Tykhiy p(in_success, "\t%ju inbound packet%s processed successfully\n"); 2177b95a1ebSYaroslav Tykhiy p(in_polvio, "\t%ju inbound packet%s violated process security " 21832cd1d96SJun-ichiro itojun Hagino "policy\n"); 2197b95a1ebSYaroslav Tykhiy p(in_nosa, "\t%ju inbound packet%s with no SA available\n"); 2207b95a1ebSYaroslav Tykhiy p(in_inval, "\t%ju invalid inbound packet%s\n"); 2217b95a1ebSYaroslav Tykhiy p(in_nomem, "\t%ju inbound packet%s failed due to insufficient memory\n"); 2227b95a1ebSYaroslav Tykhiy p(in_badspi, "\t%ju inbound packet%s failed getting SPI\n"); 2237b95a1ebSYaroslav Tykhiy p(in_ahreplay, "\t%ju inbound packet%s failed on AH replay check\n"); 2247b95a1ebSYaroslav Tykhiy p(in_espreplay, "\t%ju inbound packet%s failed on ESP replay check\n"); 2257b95a1ebSYaroslav Tykhiy p(in_ahauthsucc, "\t%ju inbound packet%s considered authentic\n"); 2267b95a1ebSYaroslav Tykhiy p(in_ahauthfail, "\t%ju inbound packet%s failed on authentication\n"); 227100b98dbSKelly Yancey hist(ipsecstat->in_ahhist, ipsec_ahnames, "AH input"); 228100b98dbSKelly Yancey hist(ipsecstat->in_esphist, ipsec_espnames, "ESP input"); 229100b98dbSKelly Yancey hist(ipsecstat->in_comphist, ipsec_compnames, "IPComp input"); 23032cd1d96SJun-ichiro itojun Hagino 2317b95a1ebSYaroslav Tykhiy p(out_success, "\t%ju outbound packet%s processed successfully\n"); 2327b95a1ebSYaroslav Tykhiy p(out_polvio, "\t%ju outbound packet%s violated process security " 23332cd1d96SJun-ichiro itojun Hagino "policy\n"); 2347b95a1ebSYaroslav Tykhiy p(out_nosa, "\t%ju outbound packet%s with no SA available\n"); 2357b95a1ebSYaroslav Tykhiy p(out_inval, "\t%ju invalid outbound packet%s\n"); 2367b95a1ebSYaroslav Tykhiy p(out_nomem, "\t%ju outbound packet%s failed due to insufficient memory\n"); 2377b95a1ebSYaroslav Tykhiy p(out_noroute, "\t%ju outbound packet%s with no route\n"); 238100b98dbSKelly Yancey hist(ipsecstat->out_ahhist, ipsec_ahnames, "AH output"); 239100b98dbSKelly Yancey hist(ipsecstat->out_esphist, ipsec_espnames, "ESP output"); 240100b98dbSKelly Yancey hist(ipsecstat->out_comphist, ipsec_compnames, "IPComp output"); 2417b95a1ebSYaroslav Tykhiy p(spdcachelookup, "\t%ju SPD cache lookup%s\n"); 2427b95a1ebSYaroslav Tykhiy pes(spdcachemiss, "\t%ju SPD cache miss%s\n"); 2433fde69b9SHajimu UMEMOTO #undef pes 24432cd1d96SJun-ichiro itojun Hagino #undef hist 2458409aedfSGeorge V. Neville-Neil p(ips_in_polvio, "\t%ju inbound packet%s violated process " 2468409aedfSGeorge V. Neville-Neil "security policy\n"); 2478409aedfSGeorge V. Neville-Neil p(ips_out_polvio, "\t%ju outbound packet%s violated process " 2488409aedfSGeorge V. Neville-Neil "security policy\n"); 2498409aedfSGeorge V. Neville-Neil p(ips_out_nosa, "\t%ju outbound packet%s with no SA available\n"); 2508409aedfSGeorge V. Neville-Neil p(ips_out_nomem, "\t%ju outbound packet%s failed due to " 2518409aedfSGeorge V. Neville-Neil "insufficient memory\n"); 2528409aedfSGeorge V. Neville-Neil p(ips_out_noroute, "\t%ju outbound packet%s with no route " 2538409aedfSGeorge V. Neville-Neil "available\n"); 2548409aedfSGeorge V. Neville-Neil p(ips_out_inval, "\t%ju invalid outbound packet%s\n"); 2558409aedfSGeorge V. Neville-Neil p(ips_out_bundlesa, "\t%ju outbound packet%s with bundled SAs\n"); 2568409aedfSGeorge V. Neville-Neil p(ips_mbcoalesced, "\t%ju mbuf%s coalesced during clone\n"); 2578409aedfSGeorge V. Neville-Neil p(ips_clcoalesced, "\t%ju cluster%s coalesced during clone\n"); 2588409aedfSGeorge V. Neville-Neil p(ips_clcopied, "\t%ju cluster%s copied during clone\n"); 2598409aedfSGeorge V. Neville-Neil p(ips_mbinserted, "\t%ju mbuf%s inserted during makespace\n"); 2608409aedfSGeorge V. Neville-Neil #undef p 26132cd1d96SJun-ichiro itojun Hagino } 26232cd1d96SJun-ichiro itojun Hagino 26332cd1d96SJun-ichiro itojun Hagino void 264feda1a43SJohn Baldwin ipsec_stats(u_long off, const char *name, int af1 __unused, int proto __unused) 26532cd1d96SJun-ichiro itojun Hagino { 266100b98dbSKelly Yancey struct ipsecstat ipsecstat; 267100b98dbSKelly Yancey 26832cd1d96SJun-ichiro itojun Hagino if (off == 0) 26932cd1d96SJun-ichiro itojun Hagino return; 27032cd1d96SJun-ichiro itojun Hagino printf ("%s:\n", name); 27132cd1d96SJun-ichiro itojun Hagino kread(off, (char *)&ipsecstat, sizeof(ipsecstat)); 27232cd1d96SJun-ichiro itojun Hagino 273100b98dbSKelly Yancey print_ipsecstats(&ipsecstat); 27432cd1d96SJun-ichiro itojun Hagino } 27532cd1d96SJun-ichiro itojun Hagino 27632cd1d96SJun-ichiro itojun Hagino 277*c80211e3SAndrey V. Elsukov static void ipsec_hist_new(const uint64_t *hist, size_t histmax, 278100b98dbSKelly Yancey const struct val2str *name, const char *title); 279100b98dbSKelly Yancey static void print_ahstats(const struct ahstat *ahstat); 280100b98dbSKelly Yancey static void print_espstats(const struct espstat *espstat); 281100b98dbSKelly Yancey static void print_ipcompstats(const struct ipcompstat *ipcompstat); 282100b98dbSKelly Yancey 283100b98dbSKelly Yancey /* 284100b98dbSKelly Yancey * Dump IPSEC statistics structure. 285100b98dbSKelly Yancey */ 286100b98dbSKelly Yancey static void 287*c80211e3SAndrey V. Elsukov ipsec_hist_new(const uint64_t *hist, size_t histmax, 288100b98dbSKelly Yancey const struct val2str *name, const char *title) 289100b98dbSKelly Yancey { 290100b98dbSKelly Yancey int first; 291100b98dbSKelly Yancey size_t proto; 292100b98dbSKelly Yancey const struct val2str *p; 293100b98dbSKelly Yancey 294100b98dbSKelly Yancey first = 1; 295100b98dbSKelly Yancey for (proto = 0; proto < histmax; proto++) { 296100b98dbSKelly Yancey if (hist[proto] <= 0) 297100b98dbSKelly Yancey continue; 298100b98dbSKelly Yancey if (first) { 299100b98dbSKelly Yancey printf("\t%s histogram:\n", title); 300100b98dbSKelly Yancey first = 0; 301100b98dbSKelly Yancey } 302100b98dbSKelly Yancey for (p = name; p && p->str; p++) { 303100b98dbSKelly Yancey if (p->val == (int)proto) 304100b98dbSKelly Yancey break; 305100b98dbSKelly Yancey } 306100b98dbSKelly Yancey if (p && p->str) { 307*c80211e3SAndrey V. Elsukov printf("\t\t%s: %ju\n", p->str, 308*c80211e3SAndrey V. Elsukov (uintmax_t)hist[proto]); 309100b98dbSKelly Yancey } else { 310*c80211e3SAndrey V. Elsukov printf("\t\t#%lu: %ju\n", (unsigned long)proto, 311*c80211e3SAndrey V. Elsukov (uintmax_t)hist[proto]); 312100b98dbSKelly Yancey } 313100b98dbSKelly Yancey } 314100b98dbSKelly Yancey } 315100b98dbSKelly Yancey 316100b98dbSKelly Yancey static void 317100b98dbSKelly Yancey print_ahstats(const struct ahstat *ahstat) 318100b98dbSKelly Yancey { 319*c80211e3SAndrey V. Elsukov #define p(f, m) if (ahstat->f || sflag <= 1) \ 3207b95a1ebSYaroslav Tykhiy printf("\t%ju" m, (uintmax_t)ahstat->f, plural(ahstat->f)) 321100b98dbSKelly Yancey #define hist(f, n, t) \ 322100b98dbSKelly Yancey ipsec_hist_new((f), sizeof(f)/sizeof(f[0]), (n), (t)); 32332cd1d96SJun-ichiro itojun Hagino 324*c80211e3SAndrey V. Elsukov p(ahs_hdrops, " packet%s shorter than header shows\n"); 325*c80211e3SAndrey V. Elsukov p(ahs_nopf, " packet%s dropped; protocol family not supported\n"); 326*c80211e3SAndrey V. Elsukov p(ahs_notdb, " packet%s dropped; no TDB\n"); 327*c80211e3SAndrey V. Elsukov p(ahs_badkcr, " packet%s dropped; bad KCR\n"); 328*c80211e3SAndrey V. Elsukov p(ahs_qfull, " packet%s dropped; queue full\n"); 329*c80211e3SAndrey V. Elsukov p(ahs_noxform, " packet%s dropped; no transform\n"); 330*c80211e3SAndrey V. Elsukov p(ahs_wrap, " replay counter wrap%s\n"); 331*c80211e3SAndrey V. Elsukov p(ahs_badauth, " packet%s dropped; bad authentication detected\n"); 332*c80211e3SAndrey V. Elsukov p(ahs_badauthl, " packet%s dropped; bad authentication length\n"); 333*c80211e3SAndrey V. Elsukov p(ahs_replay, " possible replay packet%s detected\n"); 334*c80211e3SAndrey V. Elsukov p(ahs_input, " packet%s in\n"); 335*c80211e3SAndrey V. Elsukov p(ahs_output, " packet%s out\n"); 336*c80211e3SAndrey V. Elsukov p(ahs_invalid, " packet%s dropped; invalid TDB\n"); 337*c80211e3SAndrey V. Elsukov p(ahs_ibytes, " byte%s in\n"); 338*c80211e3SAndrey V. Elsukov p(ahs_obytes, " byte%s out\n"); 339*c80211e3SAndrey V. Elsukov p(ahs_toobig, " packet%s dropped; larger than IP_MAXPACKET\n"); 340*c80211e3SAndrey V. Elsukov p(ahs_pdrops, " packet%s blocked due to policy\n"); 341*c80211e3SAndrey V. Elsukov p(ahs_crypto, " crypto processing failure%s\n"); 342*c80211e3SAndrey V. Elsukov p(ahs_tunnel, " tunnel sanity check failure%s\n"); 343100b98dbSKelly Yancey hist(ahstat->ahs_hist, ipsec_ahnames, "AH output"); 344100b98dbSKelly Yancey 345*c80211e3SAndrey V. Elsukov #undef p 346100b98dbSKelly Yancey #undef hist 34732cd1d96SJun-ichiro itojun Hagino } 348100b98dbSKelly Yancey 349100b98dbSKelly Yancey void 350feda1a43SJohn Baldwin ah_stats(u_long off, const char *name, int family __unused, int proto __unused) 351100b98dbSKelly Yancey { 352100b98dbSKelly Yancey struct ahstat ahstat; 353100b98dbSKelly Yancey 354100b98dbSKelly Yancey if (off == 0) 355100b98dbSKelly Yancey return; 356100b98dbSKelly Yancey printf ("%s:\n", name); 357100b98dbSKelly Yancey kread(off, (char *)&ahstat, sizeof(ahstat)); 358100b98dbSKelly Yancey 359100b98dbSKelly Yancey print_ahstats(&ahstat); 36032cd1d96SJun-ichiro itojun Hagino } 361100b98dbSKelly Yancey 362100b98dbSKelly Yancey static void 363100b98dbSKelly Yancey print_espstats(const struct espstat *espstat) 364100b98dbSKelly Yancey { 365*c80211e3SAndrey V. Elsukov #define p(f, m) if (espstat->f || sflag <= 1) \ 3667b95a1ebSYaroslav Tykhiy printf("\t%ju" m, (uintmax_t)espstat->f, plural(espstat->f)) 367100b98dbSKelly Yancey #define hist(f, n, t) \ 368100b98dbSKelly Yancey ipsec_hist_new((f), sizeof(f)/sizeof(f[0]), (n), (t)); 369100b98dbSKelly Yancey 370*c80211e3SAndrey V. Elsukov p(esps_hdrops, " packet%s shorter than header shows\n"); 371*c80211e3SAndrey V. Elsukov p(esps_nopf, " packet%s dropped; protocol family not supported\n"); 372*c80211e3SAndrey V. Elsukov p(esps_notdb, " packet%s dropped; no TDB\n"); 373*c80211e3SAndrey V. Elsukov p(esps_badkcr, " packet%s dropped; bad KCR\n"); 374*c80211e3SAndrey V. Elsukov p(esps_qfull, " packet%s dropped; queue full\n"); 375*c80211e3SAndrey V. Elsukov p(esps_noxform, " packet%s dropped; no transform\n"); 376*c80211e3SAndrey V. Elsukov p(esps_badilen, " packet%s dropped; bad ilen\n"); 377*c80211e3SAndrey V. Elsukov p(esps_wrap, " replay counter wrap%s\n"); 378*c80211e3SAndrey V. Elsukov p(esps_badenc, " packet%s dropped; bad encryption detected\n"); 379*c80211e3SAndrey V. Elsukov p(esps_badauth, " packet%s dropped; bad authentication detected\n"); 380*c80211e3SAndrey V. Elsukov p(esps_replay, " possible replay packet%s detected\n"); 381*c80211e3SAndrey V. Elsukov p(esps_input, " packet%s in\n"); 382*c80211e3SAndrey V. Elsukov p(esps_output, " packet%s out\n"); 383*c80211e3SAndrey V. Elsukov p(esps_invalid, " packet%s dropped; invalid TDB\n"); 384*c80211e3SAndrey V. Elsukov p(esps_ibytes, " byte%s in\n"); 385*c80211e3SAndrey V. Elsukov p(esps_obytes, " byte%s out\n"); 386*c80211e3SAndrey V. Elsukov p(esps_toobig, " packet%s dropped; larger than IP_MAXPACKET\n"); 387*c80211e3SAndrey V. Elsukov p(esps_pdrops, " packet%s blocked due to policy\n"); 388*c80211e3SAndrey V. Elsukov p(esps_crypto, " crypto processing failure%s\n"); 389*c80211e3SAndrey V. Elsukov p(esps_tunnel, " tunnel sanity check failure%s\n"); 390100b98dbSKelly Yancey hist(espstat->esps_hist, ipsec_espnames, "ESP output"); 391100b98dbSKelly Yancey 392*c80211e3SAndrey V. Elsukov #undef p 393100b98dbSKelly Yancey #undef hist 39432cd1d96SJun-ichiro itojun Hagino } 395100b98dbSKelly Yancey 396100b98dbSKelly Yancey void 397feda1a43SJohn Baldwin esp_stats(u_long off, const char *name, int family __unused, int proto __unused) 398100b98dbSKelly Yancey { 399100b98dbSKelly Yancey struct espstat espstat; 400100b98dbSKelly Yancey 401100b98dbSKelly Yancey if (off == 0) 402100b98dbSKelly Yancey return; 403100b98dbSKelly Yancey printf ("%s:\n", name); 404100b98dbSKelly Yancey kread(off, (char *)&espstat, sizeof(espstat)); 405100b98dbSKelly Yancey 406100b98dbSKelly Yancey print_espstats(&espstat); 407100b98dbSKelly Yancey } 408100b98dbSKelly Yancey 409100b98dbSKelly Yancey static void 410100b98dbSKelly Yancey print_ipcompstats(const struct ipcompstat *ipcompstat) 411100b98dbSKelly Yancey { 412*c80211e3SAndrey V. Elsukov #define p(f, m) if (ipcompstat->f || sflag <= 1) \ 4137b95a1ebSYaroslav Tykhiy printf("\t%ju" m, (uintmax_t)ipcompstat->f, plural(ipcompstat->f)) 414100b98dbSKelly Yancey #define hist(f, n, t) \ 415100b98dbSKelly Yancey ipsec_hist_new((f), sizeof(f)/sizeof(f[0]), (n), (t)); 416100b98dbSKelly Yancey 417*c80211e3SAndrey V. Elsukov p(ipcomps_hdrops, " packet%s shorter than header shows\n"); 418*c80211e3SAndrey V. Elsukov p(ipcomps_nopf, " packet%s dropped; protocol family not supported\n"); 419*c80211e3SAndrey V. Elsukov p(ipcomps_notdb, " packet%s dropped; no TDB\n"); 420*c80211e3SAndrey V. Elsukov p(ipcomps_badkcr, " packet%s dropped; bad KCR\n"); 421*c80211e3SAndrey V. Elsukov p(ipcomps_qfull, " packet%s dropped; queue full\n"); 422*c80211e3SAndrey V. Elsukov p(ipcomps_noxform, " packet%s dropped; no transform\n"); 423*c80211e3SAndrey V. Elsukov p(ipcomps_wrap, " replay counter wrap%s\n"); 424*c80211e3SAndrey V. Elsukov p(ipcomps_input, " packet%s in\n"); 425*c80211e3SAndrey V. Elsukov p(ipcomps_output, " packet%s out\n"); 426*c80211e3SAndrey V. Elsukov p(ipcomps_invalid, " packet%s dropped; invalid TDB\n"); 427*c80211e3SAndrey V. Elsukov p(ipcomps_ibytes, " byte%s in\n"); 428*c80211e3SAndrey V. Elsukov p(ipcomps_obytes, " byte%s out\n"); 429*c80211e3SAndrey V. Elsukov p(ipcomps_toobig, " packet%s dropped; larger than IP_MAXPACKET\n"); 430*c80211e3SAndrey V. Elsukov p(ipcomps_pdrops, " packet%s blocked due to policy\n"); 431*c80211e3SAndrey V. Elsukov p(ipcomps_crypto, " crypto processing failure%s\n"); 432100b98dbSKelly Yancey hist(ipcompstat->ipcomps_hist, ipsec_compnames, "COMP output"); 433*c80211e3SAndrey V. Elsukov p(ipcomps_threshold, " packet%s sent uncompressed; size < compr. algo. threshold\n"); 434*c80211e3SAndrey V. Elsukov p(ipcomps_uncompr, " packet%s sent uncompressed; compression was useless\n"); 435100b98dbSKelly Yancey 436*c80211e3SAndrey V. Elsukov #undef p 437100b98dbSKelly Yancey #undef hist 438100b98dbSKelly Yancey } 439100b98dbSKelly Yancey 440100b98dbSKelly Yancey void 441feda1a43SJohn Baldwin ipcomp_stats(u_long off, const char *name, int family __unused, 442feda1a43SJohn Baldwin int proto __unused) 443100b98dbSKelly Yancey { 444100b98dbSKelly Yancey struct ipcompstat ipcompstat; 445100b98dbSKelly Yancey 446100b98dbSKelly Yancey if (off == 0) 447100b98dbSKelly Yancey return; 448100b98dbSKelly Yancey printf ("%s:\n", name); 449100b98dbSKelly Yancey kread(off, (char *)&ipcompstat, sizeof(ipcompstat)); 450100b98dbSKelly Yancey 451100b98dbSKelly Yancey print_ipcompstats(&ipcompstat); 452100b98dbSKelly Yancey } 453100b98dbSKelly Yancey 45432cd1d96SJun-ichiro itojun Hagino #endif /*IPSEC*/ 455