version 1.19, 1997/07/01 20:32:14 |
version 1.20, 1997/07/14 21:31:33 |
|
|
p(ahs_replay, "\t%u possibly replayed packet%s received\n"); |
p(ahs_replay, "\t%u possibly replayed packet%s received\n"); |
p(ahs_badauthl, "\t%u packet%s with bad authenticator length received\n"); |
p(ahs_badauthl, "\t%u packet%s with bad authenticator length received\n"); |
p(ahs_invalid, "\t%u packet%s attempted to use an invalid tdb\n"); |
p(ahs_invalid, "\t%u packet%s attempted to use an invalid tdb\n"); |
|
p(ahs_ibytes, "\t%qu input byte%s\n"); |
|
p(ahs_obytes, "\t%qu output byte%s\n"); |
|
|
#undef p |
#undef p |
} |
} |
|
|
|
|
{ |
{ |
struct espstat espstat; |
struct espstat espstat; |
|
|
|
|
if (off == 0) |
if (off == 0) |
return; |
return; |
kread(off, (char *)&espstat, sizeof (espstat)); |
kread(off, (char *)&espstat, sizeof (espstat)); |
|
|
p(esps_replay, "\t%u possibly replayed packet%s received\n"); |
p(esps_replay, "\t%u possibly replayed packet%s received\n"); |
p(esps_badilen, "\t%u packet%s with payload not a multiple of 8 received\n"); |
p(esps_badilen, "\t%u packet%s with payload not a multiple of 8 received\n"); |
p(esps_invalid, "\t%u packet%s attempted to use an invalid tdb\n"); |
p(esps_invalid, "\t%u packet%s attempted to use an invalid tdb\n"); |
|
p(esps_ibytes, "\t%qu input byte%s\n"); |
|
p(esps_obytes, "\t%qu output byte%s\n"); |
|
|
#undef p |
#undef p |
} |
} |
|
|
p(ip4s_hdrops, "\t%u packet%s shorter than header shows\n"); |
p(ip4s_hdrops, "\t%u packet%s shorter than header shows\n"); |
p(ip4s_notip4, "\t%u packet%s with internal header not IPv4 received\n"); |
p(ip4s_notip4, "\t%u packet%s with internal header not IPv4 received\n"); |
p(ip4s_qfull, "\t%u packet%s were dropped due to full output queue\n"); |
p(ip4s_qfull, "\t%u packet%s were dropped due to full output queue\n"); |
|
p(ip4s_ibytes, "\t%qu input byte%s\n"); |
|
p(ip4s_obytes, "\t%qu output byte%s\n"); |
|
|
#undef p |
#undef p |
} |
} |