1/*-
2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 * $FreeBSD$
27 */
28#include <sys/types.h>
29#include <netipsec/ipsec.h>
30#include <netipsec/ah_var.h>
31#include <netipsec/esp_var.h>
32#include <stdint.h>
33#include <stdio.h>
34
35struct alg {
36	int		a;
37	const char	*name;
38};
39static const struct alg aalgs[] = {
40	{ SADB_AALG_NONE,	"none", },
41	{ SADB_AALG_MD5HMAC,	"hmac-md5", },
42	{ SADB_AALG_SHA1HMAC,	"hmac-sha1", },
43	{ SADB_X_AALG_MD5,	"md5", },
44	{ SADB_X_AALG_SHA,	"sha", },
45	{ SADB_X_AALG_NULL,	"null", },
46	{ SADB_X_AALG_SHA2_256,	"hmac-sha2-256", },
47	{ SADB_X_AALG_SHA2_384,	"hmac-sha2-384", },
48	{ SADB_X_AALG_SHA2_512,	"hmac-sha2-512", },
49};
50static const struct alg espalgs[] = {
51	{ SADB_EALG_NONE,	"none", },
52	{ SADB_EALG_DESCBC,	"des-cbc", },
53	{ SADB_EALG_3DESCBC,	"3des-cbc", },
54	{ SADB_EALG_NULL,	"null", },
55	{ SADB_X_EALG_CAST128CBC, "cast128-cbc", },
56	{ SADB_X_EALG_BLOWFISHCBC, "blowfish-cbc", },
57	{ SADB_X_EALG_RIJNDAELCBC, "rijndael-cbc", },
58};
59static const struct alg ipcompalgs[] = {
60	{ SADB_X_CALG_NONE,	"none", },
61	{ SADB_X_CALG_OUI,	"oui", },
62	{ SADB_X_CALG_DEFLATE,	"deflate", },
63	{ SADB_X_CALG_LZS,	"lzs", },
64};
65#define	N(a)	(sizeof(a)/sizeof(a[0]))
66
67static const char*
68algname(int a, const struct alg algs[], int nalgs)
69{
70	static char buf[80];
71	int i;
72
73	for (i = 0; i < nalgs; i++)
74		if (algs[i].a == a)
75			return algs[i].name;
76	snprintf(buf, sizeof(buf), "alg#%u", a);
77	return buf;
78}
79
80/*
81 * Little program to dump the statistics block for fast ipsec.
82 */
83int
84main(int argc, char *argv[])
85{
86#define	STAT(x,fmt)	if (x) printf(fmt "\n", (uintmax_t)x)
87	struct ipsecstat ips;
88	struct ahstat ahs;
89	struct espstat esps;
90	size_t slen;
91	int i;
92
93	slen = sizeof (ips);
94	if (sysctlbyname("net.inet.ipsec.ipsecstats", &ips, &slen, NULL, NULL) < 0)
95		err(1, "net.inet.ipsec.ipsecstats");
96	slen = sizeof (ahs);
97	if (sysctlbyname("net.inet.ah.stats", &ahs, &slen, NULL, NULL) < 0)
98		err(1, "net.inet.ah.stats");
99	slen = sizeof (esps);
100	if (sysctlbyname("net.inet.esp.stats", &esps, &slen, NULL, NULL) < 0)
101		err(1, "net.inet.esp.stats");
102
103#define	AHSTAT(x,fmt)	if (x) printf("ah " fmt ": %ju\n", (uintmax_t)x)
104	AHSTAT(ahs.ahs_input, "input packets processed");
105	AHSTAT(ahs.ahs_output, "output packets processed");
106	AHSTAT(ahs.ahs_hdrops, "headers too short");
107	AHSTAT(ahs.ahs_nopf, "headers for unsupported address family");
108	AHSTAT(ahs.ahs_notdb, "packets with no SA");
109	AHSTAT(ahs.ahs_badkcr, "packets with bad kcr");
110	AHSTAT(ahs.ahs_badauth, "packets with bad authentication");
111	AHSTAT(ahs.ahs_noxform, "packets with no xform");
112	AHSTAT(ahs.ahs_qfull, "packets dropped packet 'cuz queue full");
113	AHSTAT(ahs.ahs_wrap, "packets dropped for replace counter wrap");
114	AHSTAT(ahs.ahs_replay, "packets dropped for possible replay");
115	AHSTAT(ahs.ahs_badauthl, "packets dropped for bad authenticator length");
116	AHSTAT(ahs.ahs_invalid, "packets with an invalid SA");
117	AHSTAT(ahs.ahs_toobig, "packets too big");
118	AHSTAT(ahs.ahs_pdrops, "packets dropped due to policy");
119	AHSTAT(ahs.ahs_crypto, "failed crypto requests");
120	AHSTAT(ahs.ahs_tunnel, "tunnel sanity check failures");
121	for (i = 0; i < AH_ALG_MAX; i++)
122		if (ahs.ahs_hist[i])
123			printf("ah packets with %s: %ju\n"
124				, algname(i, aalgs, N(aalgs))
125				, (uintmax_t)ahs.ahs_hist[i]
126			);
127	AHSTAT(ahs.ahs_ibytes, "bytes received");
128	AHSTAT(ahs.ahs_obytes, "bytes transmitted");
129#undef AHSTAT
130
131#define	ESPSTAT(x,fmt)	if (x) printf("esp " fmt ": %ju\n", (uintmax_t)x)
132	ESPSTAT(esps.esps_input, "input packets processed");
133	ESPSTAT(esps.esps_output, "output packets processed");
134	ESPSTAT(esps.esps_hdrops, "headers too short");
135	ESPSTAT(esps.esps_nopf, "headers for unsupported address family");
136	ESPSTAT(esps.esps_notdb, "packets with no SA");
137	ESPSTAT(esps.esps_badkcr, "packets with bad kcr");
138	ESPSTAT(esps.esps_qfull, "packets dropped packet 'cuz queue full");
139	ESPSTAT(esps.esps_noxform, "packets with no xform");
140	ESPSTAT(esps.esps_badilen, "packets with bad ilen");
141	ESPSTAT(esps.esps_badenc, "packets with bad encryption");
142	ESPSTAT(esps.esps_badauth, "packets with bad authentication");
143	ESPSTAT(esps.esps_wrap, "packets dropped for replay counter wrap");
144	ESPSTAT(esps.esps_replay, "packets dropped for possible replay");
145	ESPSTAT(esps.esps_invalid, "packets with an invalid SA");
146	ESPSTAT(esps.esps_toobig, "packets too big");
147	ESPSTAT(esps.esps_pdrops, "packets dropped due to policy");
148	ESPSTAT(esps.esps_crypto, "failed crypto requests");
149	ESPSTAT(esps.esps_tunnel, "tunnel sanity check failures");
150	for (i = 0; i < ESP_ALG_MAX; i++)
151		if (esps.esps_hist[i])
152			printf("esp packets with %s: %ju\n"
153				, algname(i, espalgs, N(espalgs))
154				, (uintmax_t)esps.esps_hist[i]
155			);
156	ESPSTAT(esps.esps_ibytes, "bytes received");
157	ESPSTAT(esps.esps_obytes, "bytes transmitted");
158#undef ESPSTAT
159
160	printf("\n");
161	if (ips.ips_in_polvio+ips.ips_out_polvio)
162		printf("policy violations: input %ju output %ju\n",
163		    (uintmax_t)ips.ips_in_polvio,
164		    (uintmax_t)ips.ips_out_polvio);
165	STAT(ips.ips_out_nosa, "no SA found %ju (output)");
166	STAT(ips.ips_out_nomem, "no memory available %ju (output)");
167	STAT(ips.ips_out_noroute, "no route available %ju (output)");
168	STAT(ips.ips_out_inval, "generic error %ju (output)");
169	STAT(ips.ips_out_bundlesa, "bundled SA processed %ju (output)");
170	printf("m_clone processing: %ju mbufs + %ju clusters coalesced\n",
171	    (uintmax_t)ips.ips_mbcoalesced, (uintmax_t)ips.ips_clcoalesced);
172	STAT(ips.ips_clcopied, "m_clone processing: %ju clusters copied\n");
173	STAT(ips.ips_mbinserted, "m_makespace: %ju mbufs inserted\n");
174	printf("header position [front/middle/end]: %ju/%ju/%ju\n",
175	    (uintmax_t)ips.ips_input_front, (uintmax_t)ips.ips_input_middle,
176	    (uintmax_t)ips.ips_input_end);
177	return 0;
178}
179