xref: /freebsd/tools/tools/crypto/ipsecstats.c (revision 069ac184)
1 /*-
2  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  */
26 
27 #include <sys/param.h>
28 #include <sys/sysctl.h>
29 
30 #include <netipsec/ipsec.h>
31 #include <netipsec/ah_var.h>
32 #include <netipsec/esp_var.h>
33 
34 #include <err.h>
35 #include <stdint.h>
36 #include <stdio.h>
37 
38 struct alg {
39 	int		a;
40 	const char	*name;
41 };
42 static const struct alg aalgs[] = {
43 	{ SADB_AALG_NONE,	"none", },
44 	{ SADB_AALG_MD5HMAC,	"hmac-md5", },
45 	{ SADB_AALG_SHA1HMAC,	"hmac-sha1", },
46 	{ SADB_X_AALG_MD5,	"md5", },
47 	{ SADB_X_AALG_SHA,	"sha", },
48 	{ SADB_X_AALG_NULL,	"null", },
49 	{ SADB_X_AALG_SHA2_256,	"hmac-sha2-256", },
50 	{ SADB_X_AALG_SHA2_384,	"hmac-sha2-384", },
51 	{ SADB_X_AALG_SHA2_512,	"hmac-sha2-512", },
52 };
53 static const struct alg espalgs[] = {
54 	{ SADB_EALG_NONE,	"none", },
55 	{ SADB_EALG_DESCBC,	"des-cbc", },
56 	{ SADB_EALG_3DESCBC,	"3des-cbc", },
57 	{ SADB_EALG_NULL,	"null", },
58 	{ SADB_X_EALG_CAST128CBC, "cast128-cbc", },
59 	{ SADB_X_EALG_BLOWFISHCBC, "blowfish-cbc", },
60 	{ SADB_X_EALG_RIJNDAELCBC, "rijndael-cbc", },
61 };
62 static const struct alg ipcompalgs[] = {
63 	{ SADB_X_CALG_NONE,	"none", },
64 	{ SADB_X_CALG_OUI,	"oui", },
65 	{ SADB_X_CALG_DEFLATE,	"deflate", },
66 	{ SADB_X_CALG_LZS,	"lzs", },
67 };
68 
69 static const char*
70 algname(int a, const struct alg algs[], int nalgs)
71 {
72 	static char buf[80];
73 	int i;
74 
75 	for (i = 0; i < nalgs; i++)
76 		if (algs[i].a == a)
77 			return algs[i].name;
78 	snprintf(buf, sizeof(buf), "alg#%u", a);
79 	return buf;
80 }
81 
82 /*
83  * Little program to dump the statistics block for fast ipsec.
84  */
85 int
86 main(int argc, char *argv[])
87 {
88 #define	STAT(x,fmt)	if (x) printf(fmt "\n", (uintmax_t)x)
89 	struct ipsecstat ips;
90 	struct ahstat ahs;
91 	struct espstat esps;
92 	size_t slen;
93 	int i;
94 
95 	slen = sizeof (ips);
96 	if (sysctlbyname("net.inet.ipsec.ipsecstats", &ips, &slen, NULL, 0) < 0)
97 		err(1, "net.inet.ipsec.ipsecstats");
98 	slen = sizeof (ahs);
99 	if (sysctlbyname("net.inet.ah.stats", &ahs, &slen, NULL, 0) < 0)
100 		err(1, "net.inet.ah.stats");
101 	slen = sizeof (esps);
102 	if (sysctlbyname("net.inet.esp.stats", &esps, &slen, NULL, 0) < 0)
103 		err(1, "net.inet.esp.stats");
104 
105 #define	AHSTAT(x,fmt)	if (x) printf("ah " fmt ": %ju\n", (uintmax_t)x)
106 	AHSTAT(ahs.ahs_input, "input packets processed");
107 	AHSTAT(ahs.ahs_output, "output packets processed");
108 	AHSTAT(ahs.ahs_hdrops, "headers too short");
109 	AHSTAT(ahs.ahs_nopf, "headers for unsupported address family");
110 	AHSTAT(ahs.ahs_notdb, "packets with no SA");
111 	AHSTAT(ahs.ahs_badkcr, "packets with bad kcr");
112 	AHSTAT(ahs.ahs_badauth, "packets with bad authentication");
113 	AHSTAT(ahs.ahs_noxform, "packets with no xform");
114 	AHSTAT(ahs.ahs_qfull, "packets dropped packet 'cuz queue full");
115 	AHSTAT(ahs.ahs_wrap, "packets dropped for replace counter wrap");
116 	AHSTAT(ahs.ahs_replay, "packets dropped for possible replay");
117 	AHSTAT(ahs.ahs_badauthl, "packets dropped for bad authenticator length");
118 	AHSTAT(ahs.ahs_invalid, "packets with an invalid SA");
119 	AHSTAT(ahs.ahs_toobig, "packets too big");
120 	AHSTAT(ahs.ahs_pdrops, "packets dropped due to policy");
121 	AHSTAT(ahs.ahs_crypto, "failed crypto requests");
122 	AHSTAT(ahs.ahs_tunnel, "tunnel sanity check failures");
123 	for (i = 0; i < AH_ALG_MAX; i++)
124 		if (ahs.ahs_hist[i])
125 			printf("ah packets with %s: %ju\n"
126 				, algname(i, aalgs, nitems(aalgs))
127 				, (uintmax_t)ahs.ahs_hist[i]
128 			);
129 	AHSTAT(ahs.ahs_ibytes, "bytes received");
130 	AHSTAT(ahs.ahs_obytes, "bytes transmitted");
131 #undef AHSTAT
132 
133 #define	ESPSTAT(x,fmt)	if (x) printf("esp " fmt ": %ju\n", (uintmax_t)x)
134 	ESPSTAT(esps.esps_input, "input packets processed");
135 	ESPSTAT(esps.esps_output, "output packets processed");
136 	ESPSTAT(esps.esps_hdrops, "headers too short");
137 	ESPSTAT(esps.esps_nopf, "headers for unsupported address family");
138 	ESPSTAT(esps.esps_notdb, "packets with no SA");
139 	ESPSTAT(esps.esps_badkcr, "packets with bad kcr");
140 	ESPSTAT(esps.esps_qfull, "packets dropped packet 'cuz queue full");
141 	ESPSTAT(esps.esps_noxform, "packets with no xform");
142 	ESPSTAT(esps.esps_badilen, "packets with bad ilen");
143 	ESPSTAT(esps.esps_badenc, "packets with bad encryption");
144 	ESPSTAT(esps.esps_badauth, "packets with bad authentication");
145 	ESPSTAT(esps.esps_wrap, "packets dropped for replay counter wrap");
146 	ESPSTAT(esps.esps_replay, "packets dropped for possible replay");
147 	ESPSTAT(esps.esps_invalid, "packets with an invalid SA");
148 	ESPSTAT(esps.esps_toobig, "packets too big");
149 	ESPSTAT(esps.esps_pdrops, "packets dropped due to policy");
150 	ESPSTAT(esps.esps_crypto, "failed crypto requests");
151 	ESPSTAT(esps.esps_tunnel, "tunnel sanity check failures");
152 	for (i = 0; i < ESP_ALG_MAX; i++)
153 		if (esps.esps_hist[i])
154 			printf("esp packets with %s: %ju\n"
155 				, algname(i, espalgs, nitems(espalgs))
156 				, (uintmax_t)esps.esps_hist[i]
157 			);
158 	ESPSTAT(esps.esps_ibytes, "bytes received");
159 	ESPSTAT(esps.esps_obytes, "bytes transmitted");
160 #undef ESPSTAT
161 
162 	printf("\n");
163 	if (ips.ips_in_polvio+ips.ips_out_polvio)
164 		printf("policy violations: input %ju output %ju\n",
165 		    (uintmax_t)ips.ips_in_polvio,
166 		    (uintmax_t)ips.ips_out_polvio);
167 	STAT(ips.ips_out_nosa, "no SA found %ju (output)");
168 	STAT(ips.ips_out_nomem, "no memory available %ju (output)");
169 	STAT(ips.ips_out_noroute, "no route available %ju (output)");
170 	STAT(ips.ips_out_inval, "generic error %ju (output)");
171 	STAT(ips.ips_out_bundlesa, "bundled SA processed %ju (output)");
172 	STAT(ips.ips_clcopied, "m_clone processing: %ju clusters copied\n");
173 	STAT(ips.ips_spdcache_hits, "spd cache hits %ju\n");
174 	STAT(ips.ips_spdcache_misses, "spd cache misses %ju\n");
175 	STAT(ips.ips_mbinserted, "m_makespace: %ju mbufs inserted\n");
176 	printf("header position [front/middle/end]: %ju/%ju/%ju\n",
177 	    (uintmax_t)ips.ips_input_front, (uintmax_t)ips.ips_input_middle,
178 	    (uintmax_t)ips.ips_input_end);
179 	return 0;
180 }
181