version 1.50, 2001/06/23 06:09:09 |
version 1.51, 2001/07/05 08:47:43 |
|
|
p(ipips_unspec, "\t%u attempts to use tunnel with unspecified endpoint(s)\n"); |
p(ipips_unspec, "\t%u attempts to use tunnel with unspecified endpoint(s)\n"); |
#undef p |
#undef p |
} |
} |
|
|
|
/* |
|
* Dump IPCOMP statistics structure. |
|
*/ |
|
void |
|
ipcomp_stats(off, name) |
|
u_long off; |
|
char *name; |
|
{ |
|
struct ipcompstat ipcompstat; |
|
|
|
|
|
if (off == 0) |
|
return; |
|
kread(off, (char *)&ipcompstat, sizeof (ipcompstat)); |
|
printf("%s:\n", name); |
|
|
|
#define p(f, m) if (ipcompstat.f || sflag <= 1) \ |
|
printf(m, ipcompstat.f, plural(ipcompstat.f)) |
|
|
|
p(ipcomps_input, "\t%u input IPCOMP packet%s\n"); |
|
p(ipcomps_output, "\t%u output IPCOMP packet%s\n"); |
|
p(ipcomps_nopf, "\t%u packet%s from unsupported protocol families\n"); |
|
p(ipcomps_hdrops, "\t%u packet%s shorter than header shows\n"); |
|
p(ipcomps_pdrops, "\t%u packet%s dropped due to policy\n"); |
|
p(ipcomps_notdb, "\t%u packet%s for which no TDB was found\n"); |
|
p(ipcomps_badkcr, "\t%u input packet%s that failed to be processed\n"); |
|
p(ipcomps_badenc, "\t%u packet%s with bad compression received\n"); |
|
p(ipcomps_badauth, "\t%u packet%s that failed verification received\n"); |
|
p(ipcomps_noxform, "\t%u packet%s for which no XFORM was set in TDB received\n"); |
|
p(ipcomps_qfull, "\t%u packet%s were dropped due to full output queue\n"); |
|
p(ipcomps_wrap, "\t%u packet%s where counter wrapping was detected\n"); |
|
p(ipcomps_replay, "\t%u possibly replayed packet%s received\n"); |
|
p(ipcomps_badilen, "\t%u packet%s with bad payload size or padding received\n"); |
|
p(ipcomps_invalid, "\t%u packet%s attempted to use an invalid tdb\n"); |
|
p(ipcomps_toobig, "\t%u packet%s got larger than max IP packet size\n"); |
|
p(ipcomps_crypto, "\t%u packet%s that failed (de)compression processing\n"); |
|
p(ipcomps_ibytes, "\t%qu input byte%s\n"); |
|
p(ipcomps_obytes, "\t%qu output byte%s\n"); |
|
|
|
#undef p |
|
} |