| |
| /* Portions of this file are subject to the following copyright(s). See |
| * the Net-SNMP's COPYING file for more details and other copyrights |
| * that may apply: |
| */ |
| /****************************************************************** |
| Copyright 1989, 1991, 1992 by Carnegie Mellon University |
| |
| All Rights Reserved |
| |
| Permission to use, copy, modify, and distribute this software and its |
| documentation for any purpose and without fee is hereby granted, |
| provided that the above copyright notice appear in all copies and that |
| both that copyright notice and this permission notice appear in |
| supporting documentation, and that the name of CMU not be |
| used in advertising or publicity pertaining to distribution of the |
| software without specific, written prior permission. |
| |
| CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING |
| ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL |
| CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR |
| ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, |
| WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, |
| ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS |
| SOFTWARE. |
| ******************************************************************/ |
| /* |
| * Portions of this file are copyrighted by: |
| * Copyright Copyright 2003 Sun Microsystems, Inc. All rights reserved. |
| * Use is subject to license terms specified in the COPYING file |
| * distributed with the Net-SNMP package. |
| */ |
| |
| /** @defgroup library The Net-SNMP library |
| * @{ |
| */ |
| /* |
| * snmp_api.c - API for access to snmp. |
| */ |
| #include <net-snmp/net-snmp-config.h> |
| #include <net-snmp/net-snmp-features.h> |
| |
| #include <stdio.h> |
| #include <ctype.h> |
| #if HAVE_STDLIB_H |
| #include <stdlib.h> |
| #endif |
| #if HAVE_STRING_H |
| #include <string.h> |
| #else |
| #include <strings.h> |
| #endif |
| #if HAVE_UNISTD_H |
| #include <unistd.h> |
| #endif |
| #include <sys/types.h> |
| #if HAVE_SYS_PARAM_H |
| #include <sys/param.h> |
| #endif |
| #if TIME_WITH_SYS_TIME |
| # include <sys/time.h> |
| # include <time.h> |
| #else |
| # if HAVE_SYS_TIME_H |
| # include <sys/time.h> |
| # else |
| # include <time.h> |
| # endif |
| #endif |
| #if HAVE_NETINET_IN_H |
| #include <netinet/in.h> |
| #endif |
| #if HAVE_ARPA_INET_H |
| #include <arpa/inet.h> |
| #endif |
| #if HAVE_SYS_SELECT_H |
| #include <sys/select.h> |
| #endif |
| #if HAVE_IO_H |
| #include <io.h> |
| #endif |
| #if HAVE_SYS_SOCKET_H |
| #include <sys/socket.h> |
| #endif |
| #if HAVE_SYS_UN_H |
| #include <sys/un.h> |
| #endif |
| #if HAVE_NETDB_H |
| #include <netdb.h> |
| #endif |
| #if HAVE_NET_IF_DL_H |
| #ifndef dynix |
| #include <net/if_dl.h> |
| #else |
| #include <sys/net/if_dl.h> |
| #endif |
| #endif |
| #include <errno.h> |
| |
| #if HAVE_LOCALE_H |
| #include <locale.h> |
| #endif |
| |
| #if HAVE_DMALLOC_H |
| #include <dmalloc.h> |
| #endif |
| |
| #define SNMP_NEED_REQUEST_LIST |
| #include <net-snmp/types.h> |
| #include <net-snmp/output_api.h> |
| #include <net-snmp/config_api.h> |
| #include <net-snmp/utilities.h> |
| |
| #include <net-snmp/library/asn1.h> |
| #include <net-snmp/library/snmp.h> /* for xdump & {build,parse}_var_op */ |
| #include <net-snmp/library/snmp_api.h> |
| #include <net-snmp/library/snmp_client.h> |
| #include <net-snmp/library/parse.h> |
| #include <net-snmp/library/mib.h> |
| #include <net-snmp/library/int64.h> |
| #include <net-snmp/library/snmpv3.h> |
| #include <net-snmp/library/callback.h> |
| #include <net-snmp/library/container.h> |
| #include <net-snmp/library/snmp_secmod.h> |
| #include <net-snmp/library/large_fd_set.h> |
| #ifdef NETSNMP_SECMOD_USM |
| #include <net-snmp/library/snmpusm.h> |
| #endif |
| #ifdef NETSNMP_SECMOD_KSM |
| #include <net-snmp/library/snmpksm.h> |
| #endif |
| #include <net-snmp/library/keytools.h> |
| #include <net-snmp/library/lcd_time.h> |
| #include <net-snmp/library/snmp_alarm.h> |
| #include <net-snmp/library/snmp_transport.h> |
| #include <net-snmp/library/snmp_service.h> |
| #include <net-snmp/library/vacm.h> |
| |
| netsnmp_feature_child_of(statistics, libnetsnmp) |
| netsnmp_feature_child_of(snmp_api, libnetsnmp) |
| netsnmp_feature_child_of(oid_is_subtree, snmp_api) |
| netsnmp_feature_child_of(snmpv3_probe_contextEngineID_rfc5343, snmp_api) |
| |
| #if defined(NETSNMP_USE_OPENSSL) && defined(HAVE_LIBSSL) |
| extern void netsnmp_certs_init(void); |
| extern void netsnmp_certs_shutdown(void); |
| #endif |
| |
| static void _init_snmp(void); |
| |
| static int _snmp_store_needed = 0; |
| |
| #include "../agent/mibgroup/agentx/protocol.h" |
| #include <net-snmp/library/transform_oids.h> |
| #ifndef timercmp |
| #define timercmp(tvp, uvp, cmp) \ |
| /* CSTYLED */ \ |
| ((tvp)->tv_sec cmp (uvp)->tv_sec || \ |
| ((tvp)->tv_sec == (uvp)->tv_sec && \ |
| /* CSTYLED */ \ |
| (tvp)->tv_usec cmp (uvp)->tv_usec)) |
| #endif |
| #ifndef timerclear |
| #define timerclear(tvp) (tvp)->tv_sec = (tvp)->tv_usec = 0 |
| #endif |
| |
| /* |
| * Globals. |
| */ |
| #define MAX_PACKET_LENGTH (0x7fffffff) |
| #ifndef NETSNMP_STREAM_QUEUE_LEN |
| #define NETSNMP_STREAM_QUEUE_LEN 5 |
| #endif |
| |
| #ifndef BSD4_3 |
| #define BSD4_2 |
| #endif |
| |
| #ifndef FD_SET |
| |
| typedef long fd_mask; |
| #define NFDBITS (sizeof(fd_mask) * NBBY) /* bits per mask */ |
| |
| #define FD_SET(n, p) ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS))) |
| #define FD_CLR(n, p) ((p)->fds_bits[(n)/NFDBITS] &= ~(1 << ((n) % NFDBITS))) |
| #define FD_ISSET(n, p) ((p)->fds_bits[(n)/NFDBITS] & (1 << ((n) % NFDBITS))) |
| #define FD_ZERO(p) memset((p), 0, sizeof(*(p))) |
| #endif |
| |
| static oid default_enterprise[] = { 1, 3, 6, 1, 4, 1, 3, 1, 1 }; |
| /* |
| * enterprises.cmu.systems.cmuSNMP |
| */ |
| |
| #define DEFAULT_COMMUNITY "public" |
| #define DEFAULT_RETRIES 5 |
| #define DEFAULT_TIMEOUT ONE_SEC |
| #define DEFAULT_REMPORT SNMP_PORT |
| #define DEFAULT_ENTERPRISE default_enterprise |
| #define DEFAULT_TIME 0 |
| |
| /* |
| * don't set higher than 0x7fffffff, and I doubt it should be that high |
| * * = 4 gig snmp messages max |
| */ |
| #define MAXIMUM_PACKET_SIZE 0x7fffffff |
| |
| /* |
| * Internal information about the state of the snmp session. |
| */ |
| struct snmp_internal_session { |
| netsnmp_request_list *requests; /* Info about outstanding requests */ |
| netsnmp_request_list *requestsEnd; /* ptr to end of list */ |
| int (*hook_pre) (netsnmp_session *, netsnmp_transport *, |
| void *, int); |
| int (*hook_parse) (netsnmp_session *, netsnmp_pdu *, |
| u_char *, size_t); |
| int (*hook_post) (netsnmp_session *, netsnmp_pdu *, int); |
| int (*hook_build) (netsnmp_session *, netsnmp_pdu *, |
| u_char *, size_t *); |
| int (*hook_realloc_build) (netsnmp_session *, |
| netsnmp_pdu *, u_char **, |
| size_t *, size_t *); |
| int (*check_packet) (u_char *, size_t); |
| netsnmp_pdu *(*hook_create_pdu) (netsnmp_transport *, |
| void *, size_t); |
| |
| u_char *packet; |
| size_t packet_len, packet_size; |
| }; |
| |
| static const char *api_errors[-SNMPERR_MAX + 1] = { |
| "No error", /* SNMPERR_SUCCESS */ |
| "Generic error", /* SNMPERR_GENERR */ |
| "Invalid local port", /* SNMPERR_BAD_LOCPORT */ |
| "Unknown host", /* SNMPERR_BAD_ADDRESS */ |
| "Unknown session", /* SNMPERR_BAD_SESSION */ |
| "Too long", /* SNMPERR_TOO_LONG */ |
| "No socket", /* SNMPERR_NO_SOCKET */ |
| "Cannot send V2 PDU on V1 session", /* SNMPERR_V2_IN_V1 */ |
| "Cannot send V1 PDU on V2 session", /* SNMPERR_V1_IN_V2 */ |
| "Bad value for non-repeaters", /* SNMPERR_BAD_REPEATERS */ |
| "Bad value for max-repetitions", /* SNMPERR_BAD_REPETITIONS */ |
| "Error building ASN.1 representation", /* SNMPERR_BAD_ASN1_BUILD */ |
| "Failure in sendto", /* SNMPERR_BAD_SENDTO */ |
| "Bad parse of ASN.1 type", /* SNMPERR_BAD_PARSE */ |
| "Bad version specified", /* SNMPERR_BAD_VERSION */ |
| "Bad source party specified", /* SNMPERR_BAD_SRC_PARTY */ |
| "Bad destination party specified", /* SNMPERR_BAD_DST_PARTY */ |
| "Bad context specified", /* SNMPERR_BAD_CONTEXT */ |
| "Bad community specified", /* SNMPERR_BAD_COMMUNITY */ |
| "Cannot send noAuth/Priv", /* SNMPERR_NOAUTH_DESPRIV */ |
| "Bad ACL definition", /* SNMPERR_BAD_ACL */ |
| "Bad Party definition", /* SNMPERR_BAD_PARTY */ |
| "Session abort failure", /* SNMPERR_ABORT */ |
| "Unknown PDU type", /* SNMPERR_UNKNOWN_PDU */ |
| "Timeout", /* SNMPERR_TIMEOUT */ |
| "Failure in recvfrom", /* SNMPERR_BAD_RECVFROM */ |
| "Unable to determine contextEngineID", /* SNMPERR_BAD_ENG_ID */ |
| "No securityName specified", /* SNMPERR_BAD_SEC_NAME */ |
| "Unable to determine securityLevel", /* SNMPERR_BAD_SEC_LEVEL */ |
| "ASN.1 parse error in message", /* SNMPERR_ASN_PARSE_ERR */ |
| "Unknown security model in message", /* SNMPERR_UNKNOWN_SEC_MODEL */ |
| "Invalid message (e.g. msgFlags)", /* SNMPERR_INVALID_MSG */ |
| "Unknown engine ID", /* SNMPERR_UNKNOWN_ENG_ID */ |
| "Unknown user name", /* SNMPERR_UNKNOWN_USER_NAME */ |
| "Unsupported security level", /* SNMPERR_UNSUPPORTED_SEC_LEVEL */ |
| "Authentication failure (incorrect password, community or key)", /* SNMPERR_AUTHENTICATION_FAILURE */ |
| "Not in time window", /* SNMPERR_NOT_IN_TIME_WINDOW */ |
| "Decryption error", /* SNMPERR_DECRYPTION_ERR */ |
| "SCAPI general failure", /* SNMPERR_SC_GENERAL_FAILURE */ |
| "SCAPI sub-system not configured", /* SNMPERR_SC_NOT_CONFIGURED */ |
| "Key tools not available", /* SNMPERR_KT_NOT_AVAILABLE */ |
| "Unknown Report message", /* SNMPERR_UNKNOWN_REPORT */ |
| "USM generic error", /* SNMPERR_USM_GENERICERROR */ |
| "USM unknown security name (no such user exists)", /* SNMPERR_USM_UNKNOWNSECURITYNAME */ |
| "USM unsupported security level (this user has not been configured for that level of security)", /* SNMPERR_USM_UNSUPPORTEDSECURITYLEVEL */ |
| "USM encryption error", /* SNMPERR_USM_ENCRYPTIONERROR */ |
| "USM authentication failure (incorrect password or key)", /* SNMPERR_USM_AUTHENTICATIONFAILURE */ |
| "USM parse error", /* SNMPERR_USM_PARSEERROR */ |
| "USM unknown engineID", /* SNMPERR_USM_UNKNOWNENGINEID */ |
| "USM not in time window", /* SNMPERR_USM_NOTINTIMEWINDOW */ |
| "USM decryption error", /* SNMPERR_USM_DECRYPTIONERROR */ |
| "MIB not initialized", /* SNMPERR_NOMIB */ |
| "Value out of range", /* SNMPERR_RANGE */ |
| "Sub-id out of range", /* SNMPERR_MAX_SUBID */ |
| "Bad sub-id in object identifier", /* SNMPERR_BAD_SUBID */ |
| "Object identifier too long", /* SNMPERR_LONG_OID */ |
| "Bad value name", /* SNMPERR_BAD_NAME */ |
| "Bad value notation", /* SNMPERR_VALUE */ |
| "Unknown Object Identifier", /* SNMPERR_UNKNOWN_OBJID */ |
| "No PDU in snmp_send", /* SNMPERR_NULL_PDU */ |
| "Missing variables in PDU", /* SNMPERR_NO_VARS */ |
| "Bad variable type", /* SNMPERR_VAR_TYPE */ |
| "Out of memory (malloc failure)", /* SNMPERR_MALLOC */ |
| "Kerberos related error", /* SNMPERR_KRB5 */ |
| "Protocol error", /* SNMPERR_PROTOCOL */ |
| "OID not increasing", /* SNMPERR_OID_NONINCREASING */ |
| "Context probe", /* SNMPERR_JUST_A_CONTEXT_PROBE */ |
| "Configuration data found but the transport can't be configured", /* SNMPERR_TRANSPORT_NO_CONFIG */ |
| "Transport configuration failed", /* SNMPERR_TRANSPORT_CONFIG_ERROR */ |
| }; |
| |
| static const char *secLevelName[] = { |
| "BAD_SEC_LEVEL", |
| "noAuthNoPriv", |
| "authNoPriv", |
| "authPriv" |
| }; |
| |
| /* |
| * Multiple threads may changes these variables. |
| * Suggest using the Single API, which does not use Sessions. |
| * |
| * Reqid may need to be protected. Time will tell... |
| * |
| */ |
| /* |
| * MTCRITICAL_RESOURCE |
| */ |
| /* |
| * use token in comments to individually protect these resources |
| */ |
| struct session_list *Sessions = NULL; /* MT_LIB_SESSION */ |
| static long Reqid = 0; /* MT_LIB_REQUESTID */ |
| static long Msgid = 0; /* MT_LIB_MESSAGEID */ |
| static long Sessid = 0; /* MT_LIB_SESSIONID */ |
| static long Transid = 0; /* MT_LIB_TRANSID */ |
| int snmp_errno = 0; |
| /* |
| * END MTCRITICAL_RESOURCE |
| */ |
| |
| /* |
| * global error detail storage |
| */ |
| static char snmp_detail[192]; |
| static int snmp_detail_f = 0; |
| |
| /* |
| * Prototypes. |
| */ |
| int snmp_build(u_char ** pkt, size_t * pkt_len, |
| size_t * offset, netsnmp_session * pss, |
| netsnmp_pdu *pdu); |
| static int snmp_parse(void *, netsnmp_session *, netsnmp_pdu *, |
| u_char *, size_t); |
| |
| static void snmpv3_calc_msg_flags(int, int, u_char *); |
| static int snmpv3_verify_msg(netsnmp_request_list *, netsnmp_pdu *); |
| static int snmpv3_build(u_char ** pkt, size_t * pkt_len, |
| size_t * offset, netsnmp_session * session, |
| netsnmp_pdu *pdu); |
| static int snmp_parse_version(u_char *, size_t); |
| static int snmp_resend_request(struct session_list *slp, |
| netsnmp_request_list *rp, |
| int incr_retries); |
| static void register_default_handlers(void); |
| static struct session_list *snmp_sess_copy(netsnmp_session * pss); |
| int snmp_get_errno(void); |
| NETSNMP_IMPORT |
| void snmp_synch_reset(netsnmp_session * notused); |
| NETSNMP_IMPORT |
| void snmp_synch_setup(netsnmp_session * notused); |
| |
| #ifndef HAVE_STRERROR |
| const char * |
| strerror(int err) |
| { |
| extern const char *sys_errlist[]; |
| extern int sys_nerr; |
| |
| if (err < 0 || err >= sys_nerr) |
| return "Unknown error"; |
| return sys_errlist[err]; |
| } |
| #endif |
| |
| const char * |
| snmp_pdu_type(int type) |
| { |
| static char unknown[20]; |
| switch(type) { |
| case SNMP_MSG_GET: |
| return "GET"; |
| case SNMP_MSG_GETNEXT: |
| return "GETNEXT"; |
| case SNMP_MSG_GETBULK: |
| return "GETBULK"; |
| #ifndef NETSNMP_NO_WRITE_SUPPORT |
| case SNMP_MSG_SET: |
| return "SET"; |
| #endif /* !NETSNMP_NO_WRITE_SUPPORT */ |
| case SNMP_MSG_RESPONSE: |
| return "RESPONSE"; |
| case SNMP_MSG_INFORM: |
| return "INFORM"; |
| case SNMP_MSG_TRAP2: |
| return "TRAP2"; |
| case SNMP_MSG_REPORT: |
| return "REPORT"; |
| default: |
| snprintf(unknown, sizeof(unknown), "?0x%2X?", type); |
| return unknown; |
| } |
| } |
| |
| #define DEBUGPRINTPDUTYPE(token, type) \ |
| DEBUGDUMPSECTION(token, snmp_pdu_type(type)) |
| |
| long |
| snmp_get_next_reqid(void) |
| { |
| long retVal; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_REQUESTID); |
| retVal = 1 + Reqid; /*MTCRITICAL_RESOURCE */ |
| if (!retVal) |
| retVal = 2; |
| Reqid = retVal; |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_16BIT_IDS)) |
| retVal &= 0x7fff; /* mask to 15 bits */ |
| else |
| retVal &= 0x7fffffff; /* mask to 31 bits */ |
| |
| if (!retVal) { |
| Reqid = retVal = 2; |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_REQUESTID); |
| return retVal; |
| } |
| |
| long |
| snmp_get_next_msgid(void) |
| { |
| long retVal; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_MESSAGEID); |
| retVal = 1 + Msgid; /*MTCRITICAL_RESOURCE */ |
| if (!retVal) |
| retVal = 2; |
| Msgid = retVal; |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_16BIT_IDS)) |
| retVal &= 0x7fff; /* mask to 15 bits */ |
| else |
| retVal &= 0x7fffffff; /* mask to 31 bits */ |
| |
| if (!retVal) { |
| Msgid = retVal = 2; |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_MESSAGEID); |
| return retVal; |
| } |
| |
| long |
| snmp_get_next_sessid(void) |
| { |
| long retVal; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSIONID); |
| retVal = 1 + Sessid; /*MTCRITICAL_RESOURCE */ |
| if (!retVal) |
| retVal = 2; |
| Sessid = retVal; |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_16BIT_IDS)) |
| retVal &= 0x7fff; /* mask to 15 bits */ |
| else |
| retVal &= 0x7fffffff; /* mask to 31 bits */ |
| |
| if (!retVal) { |
| Sessid = retVal = 2; |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSIONID); |
| return retVal; |
| } |
| |
| long |
| snmp_get_next_transid(void) |
| { |
| long retVal; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_TRANSID); |
| retVal = 1 + Transid; /*MTCRITICAL_RESOURCE */ |
| if (!retVal) |
| retVal = 2; |
| Transid = retVal; |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_16BIT_IDS)) |
| retVal &= 0x7fff; /* mask to 15 bits */ |
| else |
| retVal &= 0x7fffffff; /* mask to 31 bits */ |
| |
| if (!retVal) { |
| Transid = retVal = 2; |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_TRANSID); |
| return retVal; |
| } |
| |
| void |
| snmp_perror(const char *prog_string) |
| { |
| const char *str; |
| int xerr; |
| xerr = snmp_errno; /*MTCRITICAL_RESOURCE */ |
| str = snmp_api_errstring(xerr); |
| snmp_log(LOG_ERR, "%s: %s\n", prog_string, str); |
| } |
| |
| void |
| snmp_set_detail(const char *detail_string) |
| { |
| if (detail_string != NULL) { |
| strlcpy((char *) snmp_detail, detail_string, sizeof(snmp_detail)); |
| snmp_detail_f = 1; |
| } |
| } |
| |
| /* |
| * returns pointer to static data |
| */ |
| /* |
| * results not guaranteed in multi-threaded use |
| */ |
| const char * |
| snmp_api_errstring(int snmp_errnumber) |
| { |
| const char *msg = ""; |
| static char msg_buf[SPRINT_MAX_LEN]; |
| |
| if (snmp_errnumber >= SNMPERR_MAX && snmp_errnumber <= SNMPERR_GENERR) { |
| msg = api_errors[-snmp_errnumber]; |
| } else if (snmp_errnumber != SNMPERR_SUCCESS) { |
| msg = NULL; |
| } |
| if (!msg) { |
| snprintf(msg_buf, sizeof(msg_buf), "Unknown error: %d", snmp_errnumber); |
| msg_buf[sizeof(msg_buf)-1] = '\0'; |
| } else if (snmp_detail_f) { |
| snprintf(msg_buf, sizeof(msg_buf), "%s (%s)", msg, snmp_detail); |
| msg_buf[sizeof(msg_buf)-1] = '\0'; |
| snmp_detail_f = 0; |
| } else { |
| strlcpy(msg_buf, msg, sizeof(msg_buf)); |
| } |
| |
| return (msg_buf); |
| } |
| |
| /* |
| * snmp_error - return error data |
| * Inputs : address of errno, address of snmp_errno, address of string |
| * Caller must free the string returned after use. |
| */ |
| void |
| snmp_error(netsnmp_session * psess, |
| int *p_errno, int *p_snmp_errno, char **p_str) |
| { |
| char buf[SPRINT_MAX_LEN]; |
| int snmp_errnumber; |
| |
| if (p_errno) |
| *p_errno = psess->s_errno; |
| if (p_snmp_errno) |
| *p_snmp_errno = psess->s_snmp_errno; |
| if (p_str == NULL) |
| return; |
| |
| strcpy(buf, ""); |
| snmp_errnumber = psess->s_snmp_errno; |
| if (snmp_errnumber >= SNMPERR_MAX && snmp_errnumber <= SNMPERR_GENERR) { |
| if (snmp_detail_f) { |
| snprintf(buf, sizeof(buf), "%s (%s)", api_errors[-snmp_errnumber], |
| snmp_detail); |
| buf[sizeof(buf)-1] = '\0'; |
| snmp_detail_f = 0; |
| } |
| else |
| strlcpy(buf, api_errors[-snmp_errnumber], sizeof(buf)); |
| } else { |
| if (snmp_errnumber) { |
| snprintf(buf, sizeof(buf), "Unknown Error %d", snmp_errnumber); |
| buf[sizeof(buf)-1] = '\0'; |
| } |
| } |
| |
| /* |
| * append a useful system errno interpretation. |
| */ |
| if (psess->s_errno) { |
| const char* error = strerror(psess->s_errno); |
| if(error == NULL) |
| error = "Unknown Error"; |
| snprintf (&buf[strlen(buf)], sizeof(buf)-strlen(buf), |
| " (%s)", error); |
| } |
| buf[sizeof(buf)-1] = '\0'; |
| *p_str = strdup(buf); |
| } |
| |
| /* |
| * snmp_sess_error - same as snmp_error for single session API use. |
| */ |
| void |
| snmp_sess_error(void *sessp, int *p_errno, int *p_snmp_errno, char **p_str) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| |
| if ((slp) && (slp->session)) |
| snmp_error(slp->session, p_errno, p_snmp_errno, p_str); |
| } |
| |
| /* |
| * netsnmp_sess_log_error(): print a error stored in a session pointer |
| */ |
| void |
| netsnmp_sess_log_error(int priority, |
| const char *prog_string, netsnmp_session * ss) |
| { |
| char *err; |
| snmp_error(ss, NULL, NULL, &err); |
| snmp_log(priority, "%s: %s\n", prog_string, err); |
| SNMP_FREE(err); |
| } |
| |
| /* |
| * snmp_sess_perror(): print a error stored in a session pointer |
| */ |
| void |
| snmp_sess_perror(const char *prog_string, netsnmp_session * ss) |
| { |
| netsnmp_sess_log_error(LOG_ERR, prog_string, ss); |
| } |
| |
| |
| |
| /* |
| * Primordial SNMP library initialization. |
| * Initializes mutex locks. |
| * Invokes minimum required initialization for displaying MIB objects. |
| * Gets initial request ID for all transactions, |
| * and finds which port SNMP over UDP uses. |
| * SNMP over AppleTalk is not currently supported. |
| * |
| * Warning: no debug messages here. |
| */ |
| static char _init_snmp_init_done = 0; |
| static void |
| _init_snmp(void) |
| { |
| |
| struct timeval tv; |
| long tmpReqid, tmpMsgid; |
| |
| if (_init_snmp_init_done) |
| return; |
| _init_snmp_init_done = 1; |
| Reqid = 1; |
| |
| snmp_res_init(); /* initialize the mt locking structures */ |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| netsnmp_init_mib_internals(); |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| netsnmp_tdomain_init(); |
| |
| gettimeofday(&tv, (struct timezone *) 0); |
| /* |
| * Now = tv; |
| */ |
| |
| /* |
| * get pseudo-random values for request ID and message ID |
| */ |
| #ifdef SVR4 |
| srand48(tv.tv_sec ^ tv.tv_usec); |
| tmpReqid = lrand48(); |
| tmpMsgid = lrand48(); |
| #else |
| srandom((unsigned)(tv.tv_sec ^ tv.tv_usec)); |
| tmpReqid = random(); |
| tmpMsgid = random(); |
| #endif |
| |
| /* |
| * don't allow zero value to repeat init |
| */ |
| if (tmpReqid == 0) |
| tmpReqid = 1; |
| if (tmpMsgid == 0) |
| tmpMsgid = 1; |
| Reqid = tmpReqid; |
| Msgid = tmpMsgid; |
| |
| netsnmp_register_default_domain("snmp", "udp udp6"); |
| netsnmp_register_default_domain("snmptrap", "udp udp6"); |
| |
| netsnmp_register_default_target("snmp", "udp", ":161"); |
| netsnmp_register_default_target("snmp", "tcp", ":161"); |
| netsnmp_register_default_target("snmp", "udp6", ":161"); |
| netsnmp_register_default_target("snmp", "tcp6", ":161"); |
| netsnmp_register_default_target("snmp", "dtlsudp", ":10161"); |
| netsnmp_register_default_target("snmp", "tlstcp", ":10161"); |
| netsnmp_register_default_target("snmp", "ipx", "/36879"); |
| |
| netsnmp_register_default_target("snmptrap", "udp", ":162"); |
| netsnmp_register_default_target("snmptrap", "tcp", ":162"); |
| netsnmp_register_default_target("snmptrap", "udp6", ":162"); |
| netsnmp_register_default_target("snmptrap", "tcp6", ":162"); |
| netsnmp_register_default_target("snmptrap", "dtlsudp", ":10162"); |
| netsnmp_register_default_target("snmptrap", "tlstcp", ":10162"); |
| netsnmp_register_default_target("snmptrap", "ipx", "/36880"); |
| |
| netsnmp_ds_set_int(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_HEX_OUTPUT_LENGTH, 16); |
| netsnmp_ds_set_int(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_RETRIES, |
| DEFAULT_RETRIES); |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| netsnmp_ds_set_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_REVERSE_ENCODE, |
| NETSNMP_DEFAULT_ASNENCODING_DIRECTION); |
| #endif |
| } |
| |
| /* |
| * Initializes the session structure. |
| * May perform one time minimal library initialization. |
| * No MIB file processing is done via this call. |
| */ |
| void |
| snmp_sess_init(netsnmp_session * session) |
| { |
| _init_snmp(); |
| |
| /* |
| * initialize session to default values |
| */ |
| |
| memset(session, 0, sizeof(netsnmp_session)); |
| session->remote_port = SNMP_DEFAULT_REMPORT; |
| session->timeout = SNMP_DEFAULT_TIMEOUT; |
| session->retries = SNMP_DEFAULT_RETRIES; |
| session->version = SNMP_DEFAULT_VERSION; |
| session->securityModel = SNMP_DEFAULT_SECMODEL; |
| session->rcvMsgMaxSize = SNMP_MAX_MSG_SIZE; |
| session->flags |= SNMP_FLAGS_DONT_PROBE; |
| } |
| |
| |
| static void |
| register_default_handlers(void) |
| { |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "dumpPacket", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DUMP_PACKET); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "reverseEncodeBER", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_REVERSE_ENCODE); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "defaultPort", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DEFAULT_PORT); |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| netsnmp_ds_register_config(ASN_OCTET_STR, "snmp", "defCommunity", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_COMMUNITY); |
| #endif |
| netsnmp_ds_register_premib(ASN_BOOLEAN, "snmp", "noTokenWarnings", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_NO_TOKEN_WARNINGS); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "noRangeCheck", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DONT_CHECK_RANGE); |
| netsnmp_ds_register_premib(ASN_OCTET_STR, "snmp", "persistentDir", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_PERSISTENT_DIR); |
| netsnmp_ds_register_config(ASN_OCTET_STR, "snmp", "tempFilePattern", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_TEMP_FILE_PATTERN); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "noDisplayHint", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_NO_DISPLAY_HINT); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "16bitIDs", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_16BIT_IDS); |
| netsnmp_ds_register_premib(ASN_OCTET_STR, "snmp", "clientaddr", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_CLIENT_ADDR); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "serverSendBuf", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_SERVERSENDBUF); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "serverRecvBuf", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_SERVERRECVBUF); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "clientSendBuf", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_CLIENTSENDBUF); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "clientRecvBuf", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_CLIENTRECVBUF); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "noPersistentLoad", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DISABLE_PERSISTENT_LOAD); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "noPersistentSave", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DISABLE_PERSISTENT_SAVE); |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", |
| "noContextEngineIDDiscovery", |
| NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_NO_DISCOVERY); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "timeout", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_TIMEOUT); |
| netsnmp_ds_register_config(ASN_INTEGER, "snmp", "retries", |
| NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_RETRIES); |
| |
| netsnmp_register_service_handlers(); |
| } |
| |
| static int init_snmp_init_done = 0; /* To prevent double init's. */ |
| /** |
| * Calls the functions to do config file loading and mib module parsing |
| * in the correct order. |
| * |
| * @param type label for the config file "type" |
| * |
| * @return void |
| * |
| * @see init_agent |
| */ |
| void |
| init_snmp(const char *type) |
| { |
| if (init_snmp_init_done) { |
| return; |
| } |
| |
| init_snmp_init_done = 1; |
| |
| /* |
| * make the type available everywhere else |
| */ |
| if (type && !netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_APPTYPE)) { |
| netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_APPTYPE, type); |
| } |
| |
| _init_snmp(); |
| |
| /* |
| * set our current locale properly to initialize isprint() type functions |
| */ |
| #ifdef HAVE_SETLOCALE |
| setlocale(LC_CTYPE, ""); |
| #endif |
| |
| snmp_debug_init(); /* should be done first, to turn on debugging ASAP */ |
| netsnmp_container_init_list(); |
| init_callbacks(); |
| init_snmp_logging(); |
| snmp_init_statistics(); |
| register_mib_handlers(); |
| register_default_handlers(); |
| init_snmp_transport(); |
| init_snmpv3(type); |
| init_snmp_alarm(); |
| init_snmp_enum(type); |
| init_vacm(); |
| #if defined(NETSNMP_USE_OPENSSL) && defined(HAVE_LIBSSL) |
| netsnmp_certs_init(); |
| #endif |
| #ifdef DNSSEC_LOCAL_VALIDATION |
| netsnmp_ds_register_config(ASN_BOOLEAN, "snmp", "dnssecWarnOnly", |
| NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_DNSSEC_WARN_ONLY); |
| #endif |
| |
| read_premib_configs(); |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| netsnmp_init_mib(); |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| |
| read_configs(); |
| |
| } /* end init_snmp() */ |
| |
| /** |
| * set a flag indicating that the persistent store needs to be saved. |
| */ |
| void |
| snmp_store_needed(const char *type) |
| { |
| DEBUGMSGTL(("snmp_store", "setting needed flag...\n")); |
| _snmp_store_needed = 1; |
| } |
| |
| void |
| snmp_store_if_needed(void) |
| { |
| if (0 == _snmp_store_needed) |
| return; |
| |
| DEBUGMSGTL(("snmp_store", "store needed...\n")); |
| snmp_store(netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_APPTYPE)); |
| _snmp_store_needed = 0; |
| } |
| |
| void |
| snmp_store(const char *type) |
| { |
| DEBUGMSGTL(("snmp_store", "storing stuff...\n")); |
| snmp_save_persistent(type); |
| snmp_call_callbacks(SNMP_CALLBACK_LIBRARY, SNMP_CALLBACK_STORE_DATA, NULL); |
| snmp_clean_persistent(type); |
| } |
| |
| |
| /** |
| * Shuts down the application, saving any needed persistent storage, |
| * and appropriate clean up. |
| * |
| * @param type Label for the config file "type" used |
| * |
| * @return void |
| */ |
| void |
| snmp_shutdown(const char *type) |
| { |
| snmp_store(type); |
| snmp_call_callbacks(SNMP_CALLBACK_LIBRARY, SNMP_CALLBACK_SHUTDOWN, NULL); |
| shutdown_snmp_logging(); |
| snmp_alarm_unregister_all(); |
| snmp_close_sessions(); |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| shutdown_mib(); |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| #if defined(NETSNMP_USE_OPENSSL) && defined(HAVE_LIBSSL) |
| netsnmp_certs_shutdown(); |
| #endif |
| unregister_all_config_handlers(); |
| netsnmp_container_free_list(); |
| clear_sec_mod(); |
| clear_snmp_enum(); |
| netsnmp_clear_tdomain_list(); |
| clear_callback(); |
| netsnmp_ds_shutdown(); |
| netsnmp_clear_default_target(); |
| netsnmp_clear_default_domain(); |
| shutdown_secmod(); |
| |
| init_snmp_init_done = 0; |
| _init_snmp_init_done = 0; |
| } |
| |
| |
| /* |
| * Sets up the session with the snmp_session information provided by the user. |
| * Then opens and binds the necessary low-level transport. A handle to the |
| * created session is returned (this is NOT the same as the pointer passed to |
| * snmp_open()). On any error, NULL is returned and snmp_errno is set to the |
| * appropriate error code. |
| */ |
| netsnmp_session * |
| snmp_open(netsnmp_session *session) |
| { |
| struct session_list *slp; |
| slp = (struct session_list *) snmp_sess_open(session); |
| if (!slp) { |
| return NULL; |
| } |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| slp->next = Sessions; |
| Sessions = slp; |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| return (slp->session); |
| } |
| |
| /* |
| * extended open |
| */ |
| netsnmp_feature_child_of(snmp_open_ex, netsnmp_unused) |
| #ifndef NETSNMP_FEATURE_REMOVE_SNMP_OPEN_EX |
| netsnmp_session * |
| snmp_open_ex(netsnmp_session *session, |
| int (*fpre_parse) (netsnmp_session *, netsnmp_transport *, |
| void *, int), |
| int (*fparse) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t), |
| int (*fpost_parse) (netsnmp_session *, netsnmp_pdu *, int), |
| |
| int (*fbuild) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t *), |
| int (*frbuild) (netsnmp_session *, netsnmp_pdu *, |
| u_char **, size_t *, size_t *), |
| int (*fcheck) (u_char *, size_t) |
| ) |
| { |
| struct session_list *slp; |
| slp = (struct session_list *) snmp_sess_open(session); |
| if (!slp) { |
| return NULL; |
| } |
| slp->internal->hook_pre = fpre_parse; |
| slp->internal->hook_parse = fparse; |
| slp->internal->hook_post = fpost_parse; |
| slp->internal->hook_build = fbuild; |
| slp->internal->hook_realloc_build = frbuild; |
| slp->internal->check_packet = fcheck; |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| slp->next = Sessions; |
| Sessions = slp; |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| return (slp->session); |
| } |
| #endif /* NETSNMP_FEATURE_REMOVE_SNMP_OPEN_EX */ |
| |
| static struct session_list * |
| _sess_copy(netsnmp_session * in_session) |
| { |
| struct session_list *slp; |
| struct snmp_internal_session *isp; |
| netsnmp_session *session; |
| struct snmp_secmod_def *sptr; |
| char *cp; |
| u_char *ucp; |
| |
| in_session->s_snmp_errno = 0; |
| in_session->s_errno = 0; |
| |
| /* |
| * Copy session structure and link into list |
| */ |
| slp = (struct session_list *) calloc(1, sizeof(struct session_list)); |
| if (slp == NULL) { |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| |
| slp->transport = NULL; |
| |
| isp = (struct snmp_internal_session *)calloc(1, sizeof(struct snmp_internal_session)); |
| |
| if (isp == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| |
| slp->internal = isp; |
| slp->session = (netsnmp_session *)malloc(sizeof(netsnmp_session)); |
| if (slp->session == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| memmove(slp->session, in_session, sizeof(netsnmp_session)); |
| session = slp->session; |
| |
| /* |
| * zero out pointers so if we have to free the session we wont free mem |
| * owned by in_session |
| */ |
| session->localname = NULL; |
| session->peername = NULL; |
| session->community = NULL; |
| session->contextEngineID = NULL; |
| session->contextName = NULL; |
| session->securityEngineID = NULL; |
| session->securityName = NULL; |
| session->securityAuthProto = NULL; |
| session->securityPrivProto = NULL; |
| /* |
| * session now points to the new structure that still contains pointers to |
| * data allocated elsewhere. Some of this data is copied to space malloc'd |
| * here, and the pointer replaced with the new one. |
| */ |
| |
| if (in_session->peername != NULL) { |
| session->peername = (char *)malloc(strlen(in_session->peername) + 1); |
| if (session->peername == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| strcpy(session->peername, in_session->peername); |
| } |
| |
| /* |
| * Fill in defaults if necessary |
| */ |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| if (in_session->community_len != SNMP_DEFAULT_COMMUNITY_LEN) { |
| ucp = (u_char *) malloc(in_session->community_len); |
| if (ucp != NULL) |
| memmove(ucp, in_session->community, in_session->community_len); |
| } else { |
| if ((cp = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_COMMUNITY)) != NULL) { |
| session->community_len = strlen(cp); |
| ucp = (u_char *) malloc(session->community_len); |
| if (ucp) |
| memmove(ucp, cp, session->community_len); |
| } else { |
| #ifdef NETSNMP_NO_ZEROLENGTH_COMMUNITY |
| session->community_len = strlen(DEFAULT_COMMUNITY); |
| ucp = (u_char *) malloc(session->community_len); |
| if (ucp) |
| memmove(ucp, DEFAULT_COMMUNITY, session->community_len); |
| #else |
| ucp = (u_char *) strdup(""); |
| #endif |
| } |
| } |
| |
| if (ucp == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| session->community = ucp; /* replace pointer with pointer to new data */ |
| #endif |
| |
| if (session->securityLevel <= 0) { |
| session->securityLevel = |
| netsnmp_ds_get_int(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_SECLEVEL); |
| } |
| |
| if (in_session->securityEngineIDLen > 0) { |
| ucp = (u_char *) malloc(in_session->securityEngineIDLen); |
| if (ucp == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| memmove(ucp, in_session->securityEngineID, |
| in_session->securityEngineIDLen); |
| session->securityEngineID = ucp; |
| |
| } |
| |
| if (in_session->contextEngineIDLen > 0) { |
| ucp = (u_char *) malloc(in_session->contextEngineIDLen); |
| if (ucp == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| memmove(ucp, in_session->contextEngineID, |
| in_session->contextEngineIDLen); |
| session->contextEngineID = ucp; |
| } else if (in_session->securityEngineIDLen > 0) { |
| /* |
| * default contextEngineID to securityEngineIDLen if defined |
| */ |
| ucp = (u_char *) malloc(in_session->securityEngineIDLen); |
| if (ucp == NULL) { |
| snmp_sess_close(slp); |
| in_session->s_snmp_errno = SNMPERR_MALLOC; |
| return (NULL); |
| } |
| memmove(ucp, in_session->securityEngineID, |
| in_session->securityEngineIDLen); |
| session->contextEngineID = ucp; |
| session->contextEngineIDLen = in_session->securityEngineIDLen; |
| } |
| |
| if (in_session->contextName) { |
| session->contextName = strdup(in_session->contextName); |
| if (session->contextName == NULL) { |
| snmp_sess_close(slp); |
| return (NULL); |
| } |
| session->contextNameLen = in_session->contextNameLen; |
| } else { |
| if ((cp = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_CONTEXT)) != NULL) |
| cp = strdup(cp); |
| else |
| cp = strdup(SNMP_DEFAULT_CONTEXT); |
| if (cp == NULL) { |
| snmp_sess_close(slp); |
| return (NULL); |
| } |
| session->contextName = cp; |
| session->contextNameLen = strlen(cp); |
| } |
| |
| if (in_session->securityName) { |
| session->securityName = strdup(in_session->securityName); |
| if (session->securityName == NULL) { |
| snmp_sess_close(slp); |
| return (NULL); |
| } |
| } else if ((cp = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_SECNAME)) != NULL) { |
| cp = strdup(cp); |
| if (cp == NULL) { |
| snmp_sess_close(slp); |
| return (NULL); |
| } |
| session->securityName = cp; |
| session->securityNameLen = strlen(cp); |
| } |
| |
| if (session->retries == SNMP_DEFAULT_RETRIES) { |
| int retry = netsnmp_ds_get_int(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_RETRIES); |
| if (retry < 0) |
| session->retries = DEFAULT_RETRIES; |
| else |
| session->retries = retry; |
| } |
| if (session->timeout == SNMP_DEFAULT_TIMEOUT) { |
| int timeout = netsnmp_ds_get_int(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_TIMEOUT); |
| if (timeout <= 0) |
| session->timeout = DEFAULT_TIMEOUT; |
| else |
| session->timeout = timeout * ONE_SEC; |
| } |
| session->sessid = snmp_get_next_sessid(); |
| |
| snmp_call_callbacks(SNMP_CALLBACK_LIBRARY, SNMP_CALLBACK_SESSION_INIT, |
| session); |
| |
| if ((sptr = find_sec_mod(session->securityModel)) != NULL) { |
| /* |
| * security module specific copying |
| */ |
| if (sptr->session_setup) { |
| int ret = (*sptr->session_setup) (in_session, session); |
| if (ret != SNMPERR_SUCCESS) { |
| snmp_sess_close(slp); |
| return NULL; |
| } |
| } |
| |
| /* |
| * security module specific opening |
| */ |
| if (sptr->session_open) { |
| int ret = (*sptr->session_open) (session); |
| if (ret != SNMPERR_SUCCESS) { |
| snmp_sess_close(slp); |
| return NULL; |
| } |
| } |
| } |
| |
| /* Anything below this point should only be done if the transport |
| had no say in the matter */ |
| if (session->securityLevel == 0) |
| session->securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
| |
| return (slp); |
| } |
| |
| static struct session_list * |
| snmp_sess_copy(netsnmp_session * pss) |
| { |
| struct session_list *psl; |
| psl = _sess_copy(pss); |
| if (!psl) { |
| if (!pss->s_snmp_errno) { |
| pss->s_snmp_errno = SNMPERR_GENERR; |
| } |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| } |
| return psl; |
| } |
| |
| #ifndef NETSNMP_FEATURE_REMOVE_SNMPV3_PROBE_CONTEXTENGINEID_RFC5343 |
| /** |
| * probe for engineID using RFC 5343 probing mechanisms |
| * |
| * Designed to be a callback for within a security model's probe_engineid hook. |
| * Since it's likely multiple security models won't have engineIDs to |
| * probe for then this function is a callback likely to be used by |
| * multiple future security models. E.G. both SSH and DTLS. |
| */ |
| int |
| snmpv3_probe_contextEngineID_rfc5343(void *slp, netsnmp_session *session) { |
| netsnmp_pdu *pdu = NULL, *response = NULL; |
| static oid snmpEngineIDoid[] = { 1,3,6,1,6,3,10,2,1,1,0}; |
| static size_t snmpEngineIDoid_len = 11; |
| |
| static char probeEngineID[] = { (char)0x80, 0, 0, 0, 6 }; |
| static size_t probeEngineID_len = sizeof(probeEngineID); |
| |
| int status; |
| |
| pdu = snmp_pdu_create(SNMP_MSG_GET); |
| if (!pdu) |
| return SNMP_ERR_GENERR; |
| pdu->version = SNMP_VERSION_3; |
| /* don't require a securityName */ |
| if (session->securityName) { |
| pdu->securityName = strdup(session->securityName); |
| pdu->securityNameLen = strlen(pdu->securityName); |
| } |
| pdu->securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
| pdu->securityModel = session->securityModel; |
| pdu->contextEngineID = netsnmp_memdup(probeEngineID, probeEngineID_len); |
| if (!pdu->contextEngineID) { |
| snmp_log(LOG_ERR, "failed to clone memory for rfc5343 probe\n"); |
| snmp_free_pdu(pdu); |
| return SNMP_ERR_GENERR; |
| } |
| pdu->contextEngineIDLen = probeEngineID_len; |
| |
| snmp_add_null_var(pdu, snmpEngineIDoid, snmpEngineIDoid_len); |
| |
| DEBUGMSGTL(("snmp_api", "probing for engineID using rfc5343 methods...\n")); |
| session->flags |= SNMP_FLAGS_DONT_PROBE; /* prevent recursion */ |
| status = snmp_sess_synch_response(slp, pdu, &response); |
| |
| if ((response == NULL) || (status != STAT_SUCCESS)) { |
| snmp_log(LOG_ERR, "failed rfc5343 contextEngineID probing\n"); |
| return SNMP_ERR_GENERR; |
| } |
| |
| /* check that the response makes sense */ |
| if (NULL != response->variables && |
| NULL != response->variables->name && |
| snmp_oid_compare(response->variables->name, |
| response->variables->name_length, |
| snmpEngineIDoid, snmpEngineIDoid_len) == 0 && |
| ASN_OCTET_STR == response->variables->type && |
| NULL != response->variables->val.string && |
| response->variables->val_len > 0) { |
| session->contextEngineID = |
| netsnmp_memdup(response->variables->val.string, |
| response->variables->val_len); |
| if (!session->contextEngineID) { |
| snmp_log(LOG_ERR, "failed rfc5343 contextEngineID probing: memory allocation failed\n"); |
| return SNMP_ERR_GENERR; |
| } |
| |
| /* technically there likely isn't a securityEngineID but just |
| in case anyone goes looking we might as well have one */ |
| session->securityEngineID = |
| netsnmp_memdup(response->variables->val.string, |
| response->variables->val_len); |
| if (!session->securityEngineID) { |
| snmp_log(LOG_ERR, "failed rfc5343 securityEngineID probing: memory allocation failed\n"); |
| return SNMP_ERR_GENERR; |
| } |
| |
| session->securityEngineIDLen = session->contextEngineIDLen = |
| response->variables->val_len; |
| |
| if (snmp_get_do_debugging()) { |
| size_t i; |
| DEBUGMSGTL(("snmp_sess_open", |
| " probe found engineID: ")); |
| for (i = 0; i < session->securityEngineIDLen; i++) |
| DEBUGMSG(("snmp_sess_open", "%02x", |
| session->securityEngineID[i])); |
| DEBUGMSG(("snmp_sess_open", "\n")); |
| } |
| } |
| return SNMPERR_SUCCESS; |
| } |
| #endif /* NETSNMP_FEATURE_REMOVE_SNMPV3_PROBE_CONTEXTENGINEID_RFC5343 */ |
| |
| |
| /** |
| * probe for peer engineID |
| * |
| * @param slp session list pointer. |
| * @param in_session session for errors |
| * |
| * @note |
| * - called by _sess_open(), snmp_sess_add_ex() |
| * - in_session is the user supplied session provided to those functions. |
| * - the first session in slp should the internal allocated copy of in_session |
| * |
| * @return 0 : error |
| * @return 1 : ok |
| * |
| */ |
| int |
| snmpv3_engineID_probe(struct session_list *slp, |
| netsnmp_session * in_session) |
| { |
| netsnmp_session *session; |
| int status; |
| struct snmp_secmod_def *sptr = NULL; |
| |
| if (slp == NULL || slp->session == NULL) { |
| return 0; |
| } |
| |
| session = slp->session; |
| netsnmp_assert_or_return(session != NULL, 0); |
| sptr = find_sec_mod(session->securityModel); |
| |
| /* |
| * If we are opening a V3 session and we don't know engineID we must probe |
| * it -- this must be done after the session is created and inserted in the |
| * list so that the response can handled correctly. |
| */ |
| |
| if (session->version == SNMP_VERSION_3 && |
| (0 == (session->flags & SNMP_FLAGS_DONT_PROBE))) { |
| if (NULL != sptr && NULL != sptr->probe_engineid) { |
| DEBUGMSGTL(("snmp_api", "probing for engineID using security model callback...\n")); |
| /* security model specific mechanism of determining engineID */ |
| status = (*sptr->probe_engineid) (slp, in_session); |
| if (status != SNMPERR_SUCCESS) |
| return 0; |
| } else { |
| /* XXX: default to the default RFC5343 contextEngineID Probe? */ |
| return 0; |
| } |
| } |
| |
| /* |
| * see if there is a hook to call now that we're done probing for an |
| * engineID |
| */ |
| if (sptr && sptr->post_probe_engineid) { |
| status = (*sptr->post_probe_engineid)(slp, in_session); |
| if (status != SNMPERR_SUCCESS) |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| /*******************************************************************-o-****** |
| * netsnmp_sess_config_transport |
| * |
| * Parameters: |
| * *in_session |
| * *in_transport |
| * |
| * Returns: |
| * SNMPERR_SUCCESS - Yay |
| * SNMPERR_GENERR - Generic Error |
| * SNMPERR_TRANSPORT_CONFIG_ERROR - Transport rejected config |
| * SNMPERR_TRANSPORT_NO_CONFIG - Transport can't config |
| */ |
| int |
| netsnmp_sess_config_transport(netsnmp_container *transport_configuration, |
| netsnmp_transport *transport) |
| { |
| /* Optional supplimental transport configuration information and |
| final call to actually open the transport */ |
| if (transport_configuration) { |
| DEBUGMSGTL(("snmp_sess", "configuring transport\n")); |
| if (transport->f_config) { |
| netsnmp_iterator *iter; |
| netsnmp_transport_config *config_data; |
| int ret; |
| |
| iter = CONTAINER_ITERATOR(transport_configuration); |
| if (NULL == iter) { |
| return SNMPERR_GENERR; |
| } |
| |
| for(config_data = (netsnmp_transport_config*)ITERATOR_FIRST(iter); config_data; |
| config_data = (netsnmp_transport_config*)ITERATOR_NEXT(iter)) { |
| ret = transport->f_config(transport, config_data->key, |
| config_data->value); |
| if (ret) { |
| return SNMPERR_TRANSPORT_CONFIG_ERROR; |
| } |
| } |
| } else { |
| return SNMPERR_TRANSPORT_NO_CONFIG; |
| } |
| } |
| return SNMPERR_SUCCESS; |
| } |
| |
| |
| /** |
| * Copies configuration from the session and calls f_open |
| * This function copies any configuration stored in the session |
| * pointer to the transport if it has a f_config pointer and then |
| * calls the transport's f_open function to actually open the |
| * connection. |
| * |
| * @param in_session A pointer to the session that config information is in. |
| * @param transport A pointer to the transport to config/open. |
| * |
| * @return SNMPERR_SUCCESS : on success |
| */ |
| |
| /*******************************************************************-o-****** |
| * netsnmp_sess_config_transport |
| * |
| * Parameters: |
| * *in_session |
| * *in_transport |
| * |
| * Returns: |
| * SNMPERR_SUCCESS - Yay |
| * SNMPERR_GENERR - Generic Error |
| * SNMPERR_TRANSPORT_CONFIG_ERROR - Transport rejected config |
| * SNMPERR_TRANSPORT_NO_CONFIG - Transport can't config |
| */ |
| int |
| netsnmp_sess_config_and_open_transport(netsnmp_session *in_session, |
| netsnmp_transport *transport) |
| { |
| int rc; |
| |
| DEBUGMSGTL(("snmp_sess", "opening transport: %x\n", transport->flags & NETSNMP_TRANSPORT_FLAG_OPENED)); |
| |
| /* don't double open */ |
| if (transport->flags & NETSNMP_TRANSPORT_FLAG_OPENED) |
| return SNMPERR_SUCCESS; |
| |
| if ((rc = netsnmp_sess_config_transport(in_session->transport_configuration, |
| transport)) != SNMPERR_SUCCESS) { |
| in_session->s_snmp_errno = rc; |
| in_session->s_errno = 0; |
| return rc; |
| } |
| |
| if (transport->f_open) |
| transport = transport->f_open(transport); |
| |
| if (transport == NULL) { |
| DEBUGMSGTL(("snmp_sess", "couldn't interpret peername\n")); |
| in_session->s_snmp_errno = SNMPERR_BAD_ADDRESS; |
| in_session->s_errno = errno; |
| snmp_set_detail(in_session->peername); |
| return SNMPERR_BAD_ADDRESS; |
| } |
| |
| transport->flags |= NETSNMP_TRANSPORT_FLAG_OPENED; |
| DEBUGMSGTL(("snmp_sess", "done opening transport: %x\n", transport->flags & NETSNMP_TRANSPORT_FLAG_OPENED)); |
| return SNMPERR_SUCCESS; |
| } |
| |
| /*******************************************************************-o-****** |
| * snmp_sess_open |
| * |
| * Parameters: |
| * *in_session |
| * |
| * Returns: |
| * Pointer to a session in the session list -OR- FIX -- right? |
| * NULL on failure. |
| * |
| * The "spin-free" version of snmp_open. |
| */ |
| static void * |
| _sess_open(netsnmp_session * in_session) |
| { |
| netsnmp_transport *transport = NULL; |
| int rc; |
| |
| in_session->s_snmp_errno = 0; |
| in_session->s_errno = 0; |
| |
| _init_snmp(); |
| |
| { |
| char *clientaddr_save = NULL; |
| |
| if (NULL != in_session->localname) { |
| clientaddr_save = |
| netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_CLIENT_ADDR); |
| netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_CLIENT_ADDR, |
| in_session->localname); |
| } |
| |
| if (in_session->flags & SNMP_FLAGS_STREAM_SOCKET) { |
| transport = |
| netsnmp_tdomain_transport_full("snmp", in_session->peername, |
| in_session->local_port, "tcp,tcp6", |
| NULL); |
| } else { |
| transport = |
| netsnmp_tdomain_transport_full("snmp", in_session->peername, |
| in_session->local_port, "udp,udp6", |
| NULL); |
| } |
| |
| if (NULL != clientaddr_save) |
| netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_CLIENT_ADDR, clientaddr_save); |
| } |
| |
| if (transport == NULL) { |
| DEBUGMSGTL(("_sess_open", "couldn't interpret peername\n")); |
| in_session->s_snmp_errno = SNMPERR_BAD_ADDRESS; |
| in_session->s_errno = errno; |
| snmp_set_detail(in_session->peername); |
| return NULL; |
| } |
| |
| /* Optional supplimental transport configuration information and |
| final call to actually open the transport */ |
| if ((rc = netsnmp_sess_config_and_open_transport(in_session, transport)) |
| != SNMPERR_SUCCESS) { |
| transport = NULL; |
| return NULL; |
| } |
| |
| #if defined(SO_BROADCAST) && defined(SOL_SOCKET) |
| if ( in_session->flags & SNMP_FLAGS_UDP_BROADCAST) { |
| int b = 1; |
| int rc; |
| |
| rc = setsockopt(transport->sock, SOL_SOCKET, SO_BROADCAST, |
| (char *)&b, sizeof(b)); |
| |
| if ( rc != 0 ) { |
| in_session->s_snmp_errno = SNMPERR_BAD_ADDRESS; /* good as any? */ |
| in_session->s_errno = errno; |
| |
| DEBUGMSGTL(("_sess_open", "couldn't enable UDP_BROADCAST\n")); |
| return NULL; |
| } |
| } |
| #endif |
| |
| return snmp_sess_add(in_session, transport, NULL, NULL); |
| } |
| |
| /* |
| * EXTENDED SESSION API ------------------------------------------ |
| * |
| * snmp_sess_add_ex, snmp_sess_add, snmp_add |
| * |
| * Analogous to snmp_open family of functions, but taking a netsnmp_transport |
| * pointer as an extra argument. Unlike snmp_open et al. it doesn't attempt |
| * to interpret the in_session->peername as a transport endpoint specifier, |
| * but instead uses the supplied transport. JBPN |
| * |
| */ |
| |
| netsnmp_session * |
| snmp_add(netsnmp_session * in_session, |
| netsnmp_transport *transport, |
| int (*fpre_parse) (netsnmp_session *, netsnmp_transport *, void *, |
| int), int (*fpost_parse) (netsnmp_session *, |
| netsnmp_pdu *, int)) |
| { |
| struct session_list *slp; |
| slp = (struct session_list *) snmp_sess_add_ex(in_session, transport, |
| fpre_parse, NULL, |
| fpost_parse, NULL, NULL, |
| NULL, NULL); |
| if (slp == NULL) { |
| return NULL; |
| } |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| slp->next = Sessions; |
| Sessions = slp; |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| return (slp->session); |
| } |
| |
| netsnmp_session * |
| snmp_add_full(netsnmp_session * in_session, |
| netsnmp_transport *transport, |
| int (*fpre_parse) (netsnmp_session *, netsnmp_transport *, |
| void *, int), |
| int (*fparse) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t), |
| int (*fpost_parse) (netsnmp_session *, netsnmp_pdu *, int), |
| int (*fbuild) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t *), int (*frbuild) (netsnmp_session *, |
| netsnmp_pdu *, |
| u_char **, |
| size_t *, |
| size_t *), |
| int (*fcheck) (u_char *, size_t), |
| netsnmp_pdu *(*fcreate_pdu) (netsnmp_transport *, void *, |
| size_t)) |
| { |
| struct session_list *slp; |
| slp = (struct session_list *) snmp_sess_add_ex(in_session, transport, |
| fpre_parse, fparse, |
| fpost_parse, fbuild, |
| frbuild, fcheck, |
| fcreate_pdu); |
| if (slp == NULL) { |
| return NULL; |
| } |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| slp->next = Sessions; |
| Sessions = slp; |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| return (slp->session); |
| } |
| |
| |
| |
| void * |
| snmp_sess_add_ex(netsnmp_session * in_session, |
| netsnmp_transport *transport, |
| int (*fpre_parse) (netsnmp_session *, netsnmp_transport *, |
| void *, int), |
| int (*fparse) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t), |
| int (*fpost_parse) (netsnmp_session *, netsnmp_pdu *, |
| int), |
| int (*fbuild) (netsnmp_session *, netsnmp_pdu *, u_char *, |
| size_t *), |
| int (*frbuild) (netsnmp_session *, netsnmp_pdu *, |
| u_char **, size_t *, size_t *), |
| int (*fcheck) (u_char *, size_t), |
| netsnmp_pdu *(*fcreate_pdu) (netsnmp_transport *, void *, |
| size_t)) |
| { |
| struct session_list *slp; |
| int rc; |
| |
| _init_snmp(); |
| |
| if (transport == NULL) |
| return NULL; |
| |
| if (in_session == NULL) { |
| transport->f_close(transport); |
| netsnmp_transport_free(transport); |
| return NULL; |
| } |
| |
| /* if the transport hasn't been fully opened yet, open it now */ |
| if ((rc = netsnmp_sess_config_and_open_transport(in_session, transport)) |
| != SNMPERR_SUCCESS) { |
| return NULL; |
| } |
| |
| if (transport->f_setup_session) { |
| if (SNMPERR_SUCCESS != |
| transport->f_setup_session(transport, in_session)) { |
| netsnmp_transport_free(transport); |
| return NULL; |
| } |
| } |
| |
| |
| DEBUGMSGTL(("snmp_sess_add", "fd %d\n", transport->sock)); |
| |
| |
| if ((slp = snmp_sess_copy(in_session)) == NULL) { |
| transport->f_close(transport); |
| netsnmp_transport_free(transport); |
| return (NULL); |
| } |
| |
| slp->transport = transport; |
| slp->internal->hook_pre = fpre_parse; |
| slp->internal->hook_parse = fparse; |
| slp->internal->hook_post = fpost_parse; |
| slp->internal->hook_build = fbuild; |
| slp->internal->hook_realloc_build = frbuild; |
| slp->internal->check_packet = fcheck; |
| slp->internal->hook_create_pdu = fcreate_pdu; |
| |
| slp->session->rcvMsgMaxSize = transport->msgMaxSize; |
| |
| if (slp->session->version == SNMP_VERSION_3) { |
| DEBUGMSGTL(("snmp_sess_add", |
| "adding v3 session -- maybe engineID probe now\n")); |
| if (!snmpv3_engineID_probe(slp, slp->session)) { |
| DEBUGMSGTL(("snmp_sess_add", "engine ID probe failed\n")); |
| snmp_sess_close(slp); |
| return NULL; |
| } |
| } |
| |
| slp->session->flags &= ~SNMP_FLAGS_DONT_PROBE; |
| |
| return (void *) slp; |
| } /* end snmp_sess_add_ex() */ |
| |
| |
| |
| void * |
| snmp_sess_add(netsnmp_session * in_session, |
| netsnmp_transport *transport, |
| int (*fpre_parse) (netsnmp_session *, netsnmp_transport *, |
| void *, int), |
| int (*fpost_parse) (netsnmp_session *, netsnmp_pdu *, int)) |
| { |
| return snmp_sess_add_ex(in_session, transport, fpre_parse, NULL, |
| fpost_parse, NULL, NULL, NULL, NULL); |
| } |
| |
| |
| |
| void * |
| snmp_sess_open(netsnmp_session * pss) |
| { |
| void *pvoid; |
| pvoid = _sess_open(pss); |
| if (!pvoid) { |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| } |
| return pvoid; |
| } |
| |
| int |
| create_user_from_session(netsnmp_session * session) { |
| #ifdef NETSNMP_SECMOD_USM |
| return usm_create_user_from_session(session); |
| #else |
| snmp_log(LOG_ERR, "create_user_from_session called when USM wasn't compiled in"); |
| netsnmp_assert(0 == 1); |
| return SNMP_ERR_GENERR; |
| #endif |
| } |
| |
| |
| /* |
| * Do a "deep free()" of a netsnmp_session. |
| * |
| * CAUTION: SHOULD ONLY BE USED FROM snmp_sess_close() OR SIMILAR. |
| * (hence it is static) |
| */ |
| |
| static void |
| snmp_free_session(netsnmp_session * s) |
| { |
| if (s) { |
| SNMP_FREE(s->localname); |
| SNMP_FREE(s->peername); |
| SNMP_FREE(s->community); |
| SNMP_FREE(s->contextEngineID); |
| SNMP_FREE(s->contextName); |
| SNMP_FREE(s->securityEngineID); |
| SNMP_FREE(s->securityName); |
| SNMP_FREE(s->securityAuthProto); |
| SNMP_FREE(s->securityPrivProto); |
| SNMP_FREE(s->paramName); |
| |
| /* |
| * clear session from any callbacks |
| */ |
| netsnmp_callback_clear_client_arg(s, 0, 0); |
| |
| free((char *) s); |
| } |
| } |
| |
| /* |
| * Close the input session. Frees all data allocated for the session, |
| * dequeues any pending requests, and closes any sockets allocated for |
| * the session. Returns 0 on error, 1 otherwise. |
| */ |
| int |
| snmp_sess_close(void *sessp) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| netsnmp_transport *transport; |
| struct snmp_internal_session *isp; |
| netsnmp_session *sesp = NULL; |
| struct snmp_secmod_def *sptr; |
| |
| if (slp == NULL) { |
| return 0; |
| } |
| |
| if (slp->session != NULL && |
| (sptr = find_sec_mod(slp->session->securityModel)) != NULL && |
| sptr->session_close != NULL) { |
| (*sptr->session_close) (slp->session); |
| } |
| |
| isp = slp->internal; |
| slp->internal = NULL; |
| |
| if (isp) { |
| netsnmp_request_list *rp, *orp; |
| |
| SNMP_FREE(isp->packet); |
| |
| /* |
| * Free each element in the input request list. |
| */ |
| rp = isp->requests; |
| while (rp) { |
| orp = rp; |
| rp = rp->next_request; |
| if (orp->callback) { |
| orp->callback(NETSNMP_CALLBACK_OP_TIMED_OUT, |
| slp->session, orp->pdu->reqid, |
| orp->pdu, orp->cb_data); |
| } |
| snmp_free_pdu(orp->pdu); |
| free((char *) orp); |
| } |
| |
| free((char *) isp); |
| } |
| |
| transport = slp->transport; |
| slp->transport = NULL; |
| |
| if (transport) { |
| transport->f_close(transport); |
| netsnmp_transport_free(transport); |
| } |
| |
| sesp = slp->session; |
| slp->session = NULL; |
| |
| /* |
| * The following is necessary to avoid memory leakage when closing AgentX |
| * sessions that may have multiple subsessions. These hang off the main |
| * session at ->subsession, and chain through ->next. |
| */ |
| |
| if (sesp != NULL && sesp->subsession != NULL) { |
| netsnmp_session *subsession = sesp->subsession, *tmpsub; |
| |
| while (subsession != NULL) { |
| DEBUGMSGTL(("snmp_sess_close", |
| "closing session %p, subsession %p\n", sesp, |
| subsession)); |
| tmpsub = subsession->next; |
| snmp_free_session(subsession); |
| subsession = tmpsub; |
| } |
| } |
| |
| snmp_free_session(sesp); |
| free((char *) slp); |
| return 1; |
| } |
| |
| int |
| snmp_close(netsnmp_session * session) |
| { |
| struct session_list *slp = NULL, *oslp = NULL; |
| |
| { /*MTCRITICAL_RESOURCE */ |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| if (Sessions && Sessions->session == session) { /* If first entry */ |
| slp = Sessions; |
| Sessions = slp->next; |
| } else { |
| for (slp = Sessions; slp; slp = slp->next) { |
| if (slp->session == session) { |
| if (oslp) /* if we found entry that points here */ |
| oslp->next = slp->next; /* link around this entry */ |
| break; |
| } |
| oslp = slp; |
| } |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| } /*END MTCRITICAL_RESOURCE */ |
| if (slp == NULL) { |
| return 0; |
| } |
| return snmp_sess_close((void *) slp); |
| } |
| |
| int |
| snmp_close_sessions(void) |
| { |
| struct session_list *slp; |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| while (Sessions) { |
| slp = Sessions; |
| Sessions = Sessions->next; |
| snmp_sess_close((void *) slp); |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| return 1; |
| } |
| |
| static void |
| snmpv3_calc_msg_flags(int sec_level, int msg_command, u_char * flags) |
| { |
| *flags = 0; |
| if (sec_level == SNMP_SEC_LEVEL_AUTHNOPRIV) |
| *flags = SNMP_MSG_FLAG_AUTH_BIT; |
| else if (sec_level == SNMP_SEC_LEVEL_AUTHPRIV) |
| *flags = SNMP_MSG_FLAG_AUTH_BIT | SNMP_MSG_FLAG_PRIV_BIT; |
| |
| if (SNMP_CMD_CONFIRMED(msg_command)) |
| *flags |= SNMP_MSG_FLAG_RPRT_BIT; |
| |
| return; |
| } |
| |
| static int |
| snmpv3_verify_msg(netsnmp_request_list *rp, netsnmp_pdu *pdu) |
| { |
| netsnmp_pdu *rpdu; |
| |
| if (!rp || !rp->pdu || !pdu) |
| return 0; |
| /* |
| * Reports don't have to match anything according to the spec |
| */ |
| if (pdu->command == SNMP_MSG_REPORT) |
| return 1; |
| rpdu = rp->pdu; |
| if (rp->request_id != pdu->reqid || rpdu->reqid != pdu->reqid) |
| return 0; |
| if (rpdu->version != pdu->version) |
| return 0; |
| if (rpdu->securityModel != pdu->securityModel) |
| return 0; |
| if (rpdu->securityLevel != pdu->securityLevel) |
| return 0; |
| |
| if (rpdu->contextEngineIDLen != pdu->contextEngineIDLen || |
| memcmp(rpdu->contextEngineID, pdu->contextEngineID, |
| pdu->contextEngineIDLen)) |
| return 0; |
| if (rpdu->contextNameLen != pdu->contextNameLen || |
| memcmp(rpdu->contextName, pdu->contextName, pdu->contextNameLen)) |
| return 0; |
| |
| /* tunneled transports don't have a securityEngineID... that's |
| USM specific (and maybe other future ones) */ |
| if (pdu->securityModel == SNMP_SEC_MODEL_USM && |
| (rpdu->securityEngineIDLen != pdu->securityEngineIDLen || |
| memcmp(rpdu->securityEngineID, pdu->securityEngineID, |
| pdu->securityEngineIDLen))) |
| return 0; |
| |
| /* the securityName must match though regardless of secmodel */ |
| if (rpdu->securityNameLen != pdu->securityNameLen || |
| memcmp(rpdu->securityName, pdu->securityName, |
| pdu->securityNameLen)) |
| return 0; |
| return 1; |
| } |
| |
| |
| /* |
| * SNMPv3 |
| * * Takes a session and a pdu and serializes the ASN PDU into the area |
| * * pointed to by packet. out_length is the size of the data area available. |
| * * Returns the length of the completed packet in out_length. If any errors |
| * * occur, -1 is returned. If all goes well, 0 is returned. |
| */ |
| static int |
| snmpv3_build(u_char ** pkt, size_t * pkt_len, size_t * offset, |
| netsnmp_session * session, netsnmp_pdu *pdu) |
| { |
| int ret; |
| |
| session->s_snmp_errno = 0; |
| session->s_errno = 0; |
| |
| /* |
| * do validation for PDU types |
| */ |
| switch (pdu->command) { |
| case SNMP_MSG_RESPONSE: |
| case SNMP_MSG_TRAP2: |
| case SNMP_MSG_REPORT: |
| netsnmp_assert(0 == (pdu->flags & UCD_MSG_FLAG_EXPECT_RESPONSE)); |
| /* |
| * Fallthrough |
| */ |
| #ifndef NETSNMP_NOTIFY_ONLY |
| case SNMP_MSG_GET: |
| case SNMP_MSG_GETNEXT: |
| #endif /* ! NETSNMP_NOTIFY_ONLY */ |
| #ifndef NETSNMP_NO_WRITE_SUPPORT |
| case SNMP_MSG_SET: |
| #endif /* !NETSNMP_NO_WRITE_SUPPORT */ |
| case SNMP_MSG_INFORM: |
| if (pdu->errstat == SNMP_DEFAULT_ERRSTAT) |
| pdu->errstat = 0; |
| if (pdu->errindex == SNMP_DEFAULT_ERRINDEX) |
| pdu->errindex = 0; |
| break; |
| |
| #ifndef NETSNMP_NOTIFY_ONLY |
| case SNMP_MSG_GETBULK: |
| if (pdu->max_repetitions < 0) { |
| session->s_snmp_errno = SNMPERR_BAD_REPETITIONS; |
| return -1; |
| } |
| if (pdu->non_repeaters < 0) { |
| session->s_snmp_errno = SNMPERR_BAD_REPEATERS; |
| return -1; |
| } |
| break; |
| #endif /* ! NETSNMP_NOTIFY_ONLY */ |
| |
| case SNMP_MSG_TRAP: |
| session->s_snmp_errno = SNMPERR_V1_IN_V2; |
| return -1; |
| |
| default: |
| session->s_snmp_errno = SNMPERR_UNKNOWN_PDU; |
| return -1; |
| } |
| |
| /* Do we need to set the session security engineid? */ |
| if (pdu->securityEngineIDLen == 0) { |
| if (session->securityEngineIDLen) { |
| snmpv3_clone_engineID(&pdu->securityEngineID, |
| &pdu->securityEngineIDLen, |
| session->securityEngineID, |
| session->securityEngineIDLen); |
| } |
| } |
| |
| /* Do we need to set the session context engineid? */ |
| if (pdu->contextEngineIDLen == 0) { |
| if (session->contextEngineIDLen) { |
| snmpv3_clone_engineID(&pdu->contextEngineID, |
| &pdu->contextEngineIDLen, |
| session->contextEngineID, |
| session->contextEngineIDLen); |
| } else if (pdu->securityEngineIDLen) { |
| snmpv3_clone_engineID(&pdu->contextEngineID, |
| &pdu->contextEngineIDLen, |
| pdu->securityEngineID, |
| pdu->securityEngineIDLen); |
| } |
| } |
| |
| if (pdu->contextName == NULL) { |
| if (!session->contextName) { |
| session->s_snmp_errno = SNMPERR_BAD_CONTEXT; |
| return -1; |
| } |
| pdu->contextName = strdup(session->contextName); |
| if (pdu->contextName == NULL) { |
| session->s_snmp_errno = SNMPERR_GENERR; |
| return -1; |
| } |
| pdu->contextNameLen = session->contextNameLen; |
| } |
| if (pdu->securityModel == SNMP_DEFAULT_SECMODEL) { |
| pdu->securityModel = session->securityModel; |
| if (pdu->securityModel == SNMP_DEFAULT_SECMODEL) { |
| pdu->securityModel = se_find_value_in_slist("snmp_secmods", netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_SECMODEL)); |
| |
| if (pdu->securityModel <= 0) { |
| pdu->securityModel = SNMP_SEC_MODEL_USM; |
| } |
| } |
| } |
| if (pdu->securityNameLen == 0 && pdu->securityName == NULL) { |
| if (session->securityModel != SNMP_SEC_MODEL_TSM && |
| session->securityNameLen == 0) { |
| session->s_snmp_errno = SNMPERR_BAD_SEC_NAME; |
| return -1; |
| } |
| if (session->securityName) { |
| pdu->securityName = strdup(session->securityName); |
| if (pdu->securityName == NULL) { |
| session->s_snmp_errno = SNMPERR_GENERR; |
| return -1; |
| } |
| pdu->securityNameLen = session->securityNameLen; |
| } else { |
| pdu->securityName = strdup(""); |
| session->securityName = strdup(""); |
| } |
| } |
| if (pdu->securityLevel == 0) { |
| if (session->securityLevel == 0) { |
| session->s_snmp_errno = SNMPERR_BAD_SEC_LEVEL; |
| return -1; |
| } |
| pdu->securityLevel = session->securityLevel; |
| } |
| DEBUGMSGTL(("snmp_build", |
| "Building SNMPv3 message (secName:\"%s\", secLevel:%s)...\n", |
| ((session->securityName) ? (char *) session->securityName : |
| ((pdu->securityName) ? (char *) pdu->securityName : |
| "ERROR: undefined")), secLevelName[pdu->securityLevel])); |
| |
| DEBUGDUMPSECTION("send", "SNMPv3 Message"); |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_REVERSE_ENCODE)) { |
| ret = snmpv3_packet_realloc_rbuild(pkt, pkt_len, offset, |
| session, pdu, NULL, 0); |
| } else { |
| #endif |
| ret = snmpv3_packet_build(session, pdu, *pkt, pkt_len, NULL, 0); |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| } |
| #endif |
| DEBUGINDENTLESS(); |
| if (-1 != ret) { |
| session->s_snmp_errno = ret; |
| } |
| |
| return ret; |
| |
| } /* end snmpv3_build() */ |
| |
| |
| |
| |
| static u_char * |
| snmpv3_header_build(netsnmp_session * session, netsnmp_pdu *pdu, |
| u_char * packet, size_t * out_length, |
| size_t length, u_char ** msg_hdr_e) |
| { |
| u_char *global_hdr, *global_hdr_e; |
| u_char *cp; |
| u_char msg_flags; |
| long max_size; |
| long sec_model; |
| u_char *pb, *pb0e; |
| |
| /* |
| * Save current location and build SEQUENCE tag and length placeholder |
| * * for SNMP message sequence (actual length inserted later) |
| */ |
| cp = asn_build_sequence(packet, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| length); |
| if (cp == NULL) |
| return NULL; |
| if (msg_hdr_e != NULL) |
| *msg_hdr_e = cp; |
| pb0e = cp; |
| |
| |
| /* |
| * store the version field - msgVersion |
| */ |
| DEBUGDUMPHEADER("send", "SNMP Version Number"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), (long *) &pdu->version, |
| sizeof(pdu->version)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| global_hdr = cp; |
| /* |
| * msgGlobalData HeaderData |
| */ |
| DEBUGDUMPSECTION("send", "msgGlobalData"); |
| cp = asn_build_sequence(cp, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), 0); |
| if (cp == NULL) |
| return NULL; |
| global_hdr_e = cp; |
| |
| |
| /* |
| * msgID |
| */ |
| DEBUGDUMPHEADER("send", "msgID"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &pdu->msgid, |
| sizeof(pdu->msgid)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * msgMaxSize |
| */ |
| max_size = session->rcvMsgMaxSize; |
| DEBUGDUMPHEADER("send", "msgMaxSize"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &max_size, |
| sizeof(max_size)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * msgFlags |
| */ |
| snmpv3_calc_msg_flags(pdu->securityLevel, pdu->command, &msg_flags); |
| DEBUGDUMPHEADER("send", "msgFlags"); |
| cp = asn_build_string(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_OCTET_STR), &msg_flags, |
| sizeof(msg_flags)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * msgSecurityModel |
| */ |
| sec_model = pdu->securityModel; |
| DEBUGDUMPHEADER("send", "msgSecurityModel"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &sec_model, |
| sizeof(sec_model)); |
| DEBUGINDENTADD(-4); /* return from global data indent */ |
| if (cp == NULL) |
| return NULL; |
| |
| |
| /* |
| * insert actual length of globalData |
| */ |
| pb = asn_build_sequence(global_hdr, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| cp - global_hdr_e); |
| if (pb == NULL) |
| return NULL; |
| |
| |
| /* |
| * insert the actual length of the entire packet |
| */ |
| pb = asn_build_sequence(packet, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| length + (cp - pb0e)); |
| if (pb == NULL) |
| return NULL; |
| |
| return cp; |
| |
| } /* end snmpv3_header_build() */ |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| |
| int |
| snmpv3_header_realloc_rbuild(u_char ** pkt, size_t * pkt_len, |
| size_t * offset, netsnmp_session * session, |
| netsnmp_pdu *pdu) |
| { |
| size_t start_offset = *offset; |
| u_char msg_flags; |
| long max_size, sec_model; |
| int rc = 0; |
| |
| /* |
| * msgSecurityModel. |
| */ |
| sec_model = pdu->securityModel; |
| DEBUGDUMPHEADER("send", "msgSecurityModel"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &sec_model, |
| sizeof(sec_model)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * msgFlags. |
| */ |
| snmpv3_calc_msg_flags(pdu->securityLevel, pdu->command, &msg_flags); |
| DEBUGDUMPHEADER("send", "msgFlags"); |
| rc = asn_realloc_rbuild_string(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_OCTET_STR), &msg_flags, |
| sizeof(msg_flags)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * msgMaxSize. |
| */ |
| max_size = session->rcvMsgMaxSize; |
| DEBUGDUMPHEADER("send", "msgMaxSize"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &max_size, |
| sizeof(max_size)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * msgID. |
| */ |
| DEBUGDUMPHEADER("send", "msgID"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &pdu->msgid, |
| sizeof(pdu->msgid)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Global data sequence. |
| */ |
| rc = asn_realloc_rbuild_sequence(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_SEQUENCE | |
| ASN_CONSTRUCTOR), |
| *offset - start_offset); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Store the version field - msgVersion. |
| */ |
| DEBUGDUMPHEADER("send", "SNMP Version Number"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), |
| (long *) &pdu->version, |
| sizeof(pdu->version)); |
| DEBUGINDENTLESS(); |
| return rc; |
| } /* end snmpv3_header_realloc_rbuild() */ |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| |
| static u_char * |
| snmpv3_scopedPDU_header_build(netsnmp_pdu *pdu, |
| u_char * packet, size_t * out_length, |
| u_char ** spdu_e) |
| { |
| u_char *scopedPdu, *pb; |
| |
| pb = scopedPdu = packet; |
| pb = asn_build_sequence(pb, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), 0); |
| if (pb == NULL) |
| return NULL; |
| if (spdu_e) |
| *spdu_e = pb; |
| |
| DEBUGDUMPHEADER("send", "contextEngineID"); |
| pb = asn_build_string(pb, out_length, |
| (ASN_UNIVERSAL | ASN_PRIMITIVE | ASN_OCTET_STR), |
| pdu->contextEngineID, pdu->contextEngineIDLen); |
| DEBUGINDENTLESS(); |
| if (pb == NULL) |
| return NULL; |
| |
| DEBUGDUMPHEADER("send", "contextName"); |
| pb = asn_build_string(pb, out_length, |
| (ASN_UNIVERSAL | ASN_PRIMITIVE | ASN_OCTET_STR), |
| (u_char *) pdu->contextName, |
| pdu->contextNameLen); |
| DEBUGINDENTLESS(); |
| if (pb == NULL) |
| return NULL; |
| |
| return pb; |
| |
| } /* end snmpv3_scopedPDU_header_build() */ |
| |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| int |
| snmpv3_scopedPDU_header_realloc_rbuild(u_char ** pkt, size_t * pkt_len, |
| size_t * offset, netsnmp_pdu *pdu, |
| size_t body_len) |
| { |
| size_t start_offset = *offset; |
| int rc = 0; |
| |
| /* |
| * contextName. |
| */ |
| DEBUGDUMPHEADER("send", "contextName"); |
| rc = asn_realloc_rbuild_string(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_OCTET_STR), |
| (u_char *) pdu->contextName, |
| pdu->contextNameLen); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * contextEngineID. |
| */ |
| DEBUGDUMPHEADER("send", "contextEngineID"); |
| rc = asn_realloc_rbuild_string(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_OCTET_STR), |
| pdu->contextEngineID, |
| pdu->contextEngineIDLen); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| rc = asn_realloc_rbuild_sequence(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_SEQUENCE | |
| ASN_CONSTRUCTOR), |
| *offset - start_offset + body_len); |
| |
| return rc; |
| } /* end snmpv3_scopedPDU_header_realloc_rbuild() */ |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| /* |
| * returns 0 if success, -1 if fail, not 0 if SM build failure |
| */ |
| int |
| snmpv3_packet_realloc_rbuild(u_char ** pkt, size_t * pkt_len, |
| size_t * offset, netsnmp_session * session, |
| netsnmp_pdu *pdu, u_char * pdu_data, |
| size_t pdu_data_len) |
| { |
| u_char *scoped_pdu, *hdrbuf = NULL, *hdr = NULL; |
| size_t hdrbuf_len = SNMP_MAX_MSG_V3_HDRS, hdr_offset = |
| 0, spdu_offset = 0; |
| size_t body_end_offset = *offset, body_len = 0; |
| struct snmp_secmod_def *sptr = NULL; |
| int rc = 0; |
| |
| /* |
| * Build a scopedPDU structure into the packet buffer. |
| */ |
| DEBUGPRINTPDUTYPE("send", pdu->command); |
| if (pdu_data) { |
| while ((*pkt_len - *offset) < pdu_data_len) { |
| if (!asn_realloc(pkt, pkt_len)) { |
| return -1; |
| } |
| } |
| |
| *offset += pdu_data_len; |
| memcpy(*pkt + *pkt_len - *offset, pdu_data, pdu_data_len); |
| } else { |
| rc = snmp_pdu_realloc_rbuild(pkt, pkt_len, offset, pdu); |
| if (rc == 0) { |
| return -1; |
| } |
| } |
| body_len = *offset - body_end_offset; |
| |
| DEBUGDUMPSECTION("send", "ScopedPdu"); |
| rc = snmpv3_scopedPDU_header_realloc_rbuild(pkt, pkt_len, offset, |
| pdu, body_len); |
| if (rc == 0) { |
| return -1; |
| } |
| spdu_offset = *offset; |
| DEBUGINDENTADD(-4); /* Return from Scoped PDU. */ |
| |
| if ((hdrbuf = (u_char *) malloc(hdrbuf_len)) == NULL) { |
| return -1; |
| } |
| |
| rc = snmpv3_header_realloc_rbuild(&hdrbuf, &hdrbuf_len, &hdr_offset, |
| session, pdu); |
| if (rc == 0) { |
| SNMP_FREE(hdrbuf); |
| return -1; |
| } |
| hdr = hdrbuf + hdrbuf_len - hdr_offset; |
| scoped_pdu = *pkt + *pkt_len - spdu_offset; |
| |
| /* |
| * Call the security module to possibly encrypt and authenticate the |
| * message---the entire message to transmitted on the wire is returned. |
| */ |
| |
| sptr = find_sec_mod(pdu->securityModel); |
| DEBUGDUMPSECTION("send", "SM msgSecurityParameters"); |
| if (sptr && sptr->encode_reverse) { |
| struct snmp_secmod_outgoing_params parms; |
| |
| parms.msgProcModel = pdu->msgParseModel; |
| parms.globalData = hdr; |
| parms.globalDataLen = hdr_offset; |
| parms.maxMsgSize = SNMP_MAX_MSG_SIZE; |
| parms.secModel = pdu->securityModel; |
| parms.secEngineID = pdu->securityEngineID; |
| parms.secEngineIDLen = pdu->securityEngineIDLen; |
| parms.secName = pdu->securityName; |
| parms.secNameLen = pdu->securityNameLen; |
| parms.secLevel = pdu->securityLevel; |
| parms.scopedPdu = scoped_pdu; |
| parms.scopedPduLen = spdu_offset; |
| parms.secStateRef = pdu->securityStateRef; |
| parms.wholeMsg = pkt; |
| parms.wholeMsgLen = pkt_len; |
| parms.wholeMsgOffset = offset; |
| parms.session = session; |
| parms.pdu = pdu; |
| |
| rc = (*sptr->encode_reverse) (&parms); |
| } else { |
| if (!sptr) { |
| snmp_log(LOG_ERR, |
| "no such security service available: %d\n", |
| pdu->securityModel); |
| } else if (!sptr->encode_reverse) { |
| snmp_log(LOG_ERR, |
| "security service %d doesn't support reverse encoding.\n", |
| pdu->securityModel); |
| } |
| rc = -1; |
| } |
| |
| DEBUGINDENTLESS(); |
| SNMP_FREE(hdrbuf); |
| return rc; |
| } /* end snmpv3_packet_realloc_rbuild() */ |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| |
| /* |
| * returns 0 if success, -1 if fail, not 0 if SM build failure |
| */ |
| int |
| snmpv3_packet_build(netsnmp_session * session, netsnmp_pdu *pdu, |
| u_char * packet, size_t * out_length, |
| u_char * pdu_data, size_t pdu_data_len) |
| { |
| u_char *global_data, *sec_params, *spdu_hdr_e; |
| size_t global_data_len, sec_params_len; |
| u_char spdu_buf[SNMP_MAX_MSG_SIZE]; |
| size_t spdu_buf_len, spdu_len; |
| u_char *cp; |
| int result; |
| struct snmp_secmod_def *sptr; |
| |
| global_data = packet; |
| |
| /* |
| * build the headers for the packet, returned addr = start of secParams |
| */ |
| sec_params = snmpv3_header_build(session, pdu, global_data, |
| out_length, 0, NULL); |
| if (sec_params == NULL) |
| return -1; |
| global_data_len = sec_params - global_data; |
| sec_params_len = *out_length; /* length left in packet buf for sec_params */ |
| |
| |
| /* |
| * build a scopedPDU structure into spdu_buf |
| */ |
| spdu_buf_len = SNMP_MAX_MSG_SIZE; |
| DEBUGDUMPSECTION("send", "ScopedPdu"); |
| cp = snmpv3_scopedPDU_header_build(pdu, spdu_buf, &spdu_buf_len, |
| &spdu_hdr_e); |
| if (cp == NULL) |
| return -1; |
| |
| /* |
| * build the PDU structure onto the end of spdu_buf |
| */ |
| DEBUGPRINTPDUTYPE("send", ((pdu_data) ? *pdu_data : 0x00)); |
| if (pdu_data) { |
| memcpy(cp, pdu_data, pdu_data_len); |
| cp += pdu_data_len; |
| } else { |
| cp = snmp_pdu_build(pdu, cp, &spdu_buf_len); |
| if (cp == NULL) |
| return -1; |
| } |
| DEBUGINDENTADD(-4); /* return from Scoped PDU */ |
| |
| /* |
| * re-encode the actual ASN.1 length of the scopedPdu |
| */ |
| spdu_len = cp - spdu_hdr_e; /* length of scopedPdu minus ASN.1 headers */ |
| spdu_buf_len = SNMP_MAX_MSG_SIZE; |
| if (asn_build_sequence(spdu_buf, &spdu_buf_len, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| spdu_len) == NULL) |
| return -1; |
| spdu_len = cp - spdu_buf; /* the length of the entire scopedPdu */ |
| |
| |
| /* |
| * call the security module to possibly encrypt and authenticate the |
| * message - the entire message to transmitted on the wire is returned |
| */ |
| cp = NULL; |
| *out_length = SNMP_MAX_MSG_SIZE; |
| DEBUGDUMPSECTION("send", "SM msgSecurityParameters"); |
| sptr = find_sec_mod(pdu->securityModel); |
| if (sptr && sptr->encode_forward) { |
| struct snmp_secmod_outgoing_params parms; |
| parms.msgProcModel = pdu->msgParseModel; |
| parms.globalData = global_data; |
| parms.globalDataLen = global_data_len; |
| parms.maxMsgSize = SNMP_MAX_MSG_SIZE; |
| parms.secModel = pdu->securityModel; |
| parms.secEngineID = pdu->securityEngineID; |
| parms.secEngineIDLen = pdu->securityEngineIDLen; |
| parms.secName = pdu->securityName; |
| parms.secNameLen = pdu->securityNameLen; |
| parms.secLevel = pdu->securityLevel; |
| parms.scopedPdu = spdu_buf; |
| parms.scopedPduLen = spdu_len; |
| parms.secStateRef = pdu->securityStateRef; |
| parms.secParams = sec_params; |
| parms.secParamsLen = &sec_params_len; |
| parms.wholeMsg = &cp; |
| parms.wholeMsgLen = out_length; |
| parms.session = session; |
| parms.pdu = pdu; |
| result = (*sptr->encode_forward) (&parms); |
| } else { |
| if (!sptr) { |
| snmp_log(LOG_ERR, "no such security service available: %d\n", |
| pdu->securityModel); |
| } else if (!sptr->encode_forward) { |
| snmp_log(LOG_ERR, |
| "security service %d doesn't support forward out encoding.\n", |
| pdu->securityModel); |
| } |
| result = -1; |
| } |
| DEBUGINDENTLESS(); |
| return result; |
| |
| } /* end snmpv3_packet_build() */ |
| |
| |
| /* |
| * Takes a session and a pdu and serializes the ASN PDU into the area |
| * pointed to by *pkt. *pkt_len is the size of the data area available. |
| * Returns the length of the completed packet in *offset. If any errors |
| * occur, -1 is returned. If all goes well, 0 is returned. |
| */ |
| |
| static int |
| _snmp_build(u_char ** pkt, size_t * pkt_len, size_t * offset, |
| netsnmp_session * session, netsnmp_pdu *pdu) |
| { |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| u_char *h0e = NULL; |
| size_t start_offset = *offset; |
| long version; |
| int rc = 0; |
| #endif /* support for community based SNMP */ |
| |
| u_char *cp; |
| size_t length; |
| |
| session->s_snmp_errno = 0; |
| session->s_errno = 0; |
| |
| if (pdu->version == SNMP_VERSION_3) { |
| return snmpv3_build(pkt, pkt_len, offset, session, pdu); |
| } |
| |
| switch (pdu->command) { |
| case SNMP_MSG_RESPONSE: |
| netsnmp_assert(0 == (pdu->flags & UCD_MSG_FLAG_EXPECT_RESPONSE)); |
| /* |
| * Fallthrough |
| */ |
| #ifndef NETSNMP_NOTIFY_ONLY |
| case SNMP_MSG_GET: |
| case SNMP_MSG_GETNEXT: |
| #endif /* ! NETSNMP_NOTIFY_ONLY */ |
| #ifndef NETSNMP_NO_WRITE_SUPPORT |
| case SNMP_MSG_SET: |
| #endif /* !NETSNMP_NO_WRITE_SUPPORT */ |
| /* |
| * all versions support these PDU types |
| */ |
| /* |
| * initialize defaulted PDU fields |
| */ |
| |
| if (pdu->errstat == SNMP_DEFAULT_ERRSTAT) |
| pdu->errstat = 0; |
| if (pdu->errindex == SNMP_DEFAULT_ERRINDEX) |
| pdu->errindex = 0; |
| break; |
| |
| case SNMP_MSG_TRAP2: |
| netsnmp_assert(0 == (pdu->flags & UCD_MSG_FLAG_EXPECT_RESPONSE)); |
| /* |
| * Fallthrough |
| */ |
| case SNMP_MSG_INFORM: |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| /* |
| * not supported in SNMPv1 and SNMPsec |
| */ |
| if (pdu->version == SNMP_VERSION_1) { |
| session->s_snmp_errno = SNMPERR_V2_IN_V1; |
| return -1; |
| } |
| #endif |
| if (pdu->errstat == SNMP_DEFAULT_ERRSTAT) |
| pdu->errstat = 0; |
| if (pdu->errindex == SNMP_DEFAULT_ERRINDEX) |
| pdu->errindex = 0; |
| break; |
| |
| #ifndef NETSNMP_NOTIFY_ONLY |
| case SNMP_MSG_GETBULK: |
| /* |
| * not supported in SNMPv1 and SNMPsec |
| */ |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| if (pdu->version == SNMP_VERSION_1) { |
| session->s_snmp_errno = SNMPERR_V2_IN_V1; |
| return -1; |
| } |
| #endif |
| if (pdu->max_repetitions < 0) { |
| session->s_snmp_errno = SNMPERR_BAD_REPETITIONS; |
| return -1; |
| } |
| if (pdu->non_repeaters < 0) { |
| session->s_snmp_errno = SNMPERR_BAD_REPEATERS; |
| return -1; |
| } |
| break; |
| #endif /* ! NETSNMP_NOTIFY_ONLY */ |
| |
| case SNMP_MSG_TRAP: |
| /* |
| * *only* supported in SNMPv1 and SNMPsec |
| */ |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| if (pdu->version != SNMP_VERSION_1) { |
| session->s_snmp_errno = SNMPERR_V1_IN_V2; |
| return -1; |
| } |
| #endif |
| /* |
| * initialize defaulted Trap PDU fields |
| */ |
| pdu->reqid = 1; /* give a bogus non-error reqid for traps */ |
| if (pdu->enterprise_length == SNMP_DEFAULT_ENTERPRISE_LENGTH) { |
| pdu->enterprise = (oid *) malloc(sizeof(DEFAULT_ENTERPRISE)); |
| if (pdu->enterprise == NULL) { |
| session->s_snmp_errno = SNMPERR_MALLOC; |
| return -1; |
| } |
| memmove(pdu->enterprise, DEFAULT_ENTERPRISE, |
| sizeof(DEFAULT_ENTERPRISE)); |
| pdu->enterprise_length = |
| sizeof(DEFAULT_ENTERPRISE) / sizeof(oid); |
| } |
| if (pdu->time == SNMP_DEFAULT_TIME) |
| pdu->time = DEFAULT_TIME; |
| /* |
| * don't expect a response |
| */ |
| pdu->flags &= (~UCD_MSG_FLAG_EXPECT_RESPONSE); |
| break; |
| |
| case SNMP_MSG_REPORT: /* SNMPv3 only */ |
| default: |
| session->s_snmp_errno = SNMPERR_UNKNOWN_PDU; |
| return -1; |
| } |
| |
| /* |
| * save length |
| */ |
| length = *pkt_len; |
| |
| /* |
| * setup administrative fields based on version |
| */ |
| /* |
| * build the message wrapper and all the administrative fields |
| * upto the PDU sequence |
| * (note that actual length of message will be inserted later) |
| */ |
| switch (pdu->version) { |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| case SNMP_VERSION_1: |
| #endif |
| #ifndef NETSNMP_DISABLE_SNMPV2C |
| case SNMP_VERSION_2c: |
| #endif |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| #ifdef NETSNMP_NO_ZEROLENGTH_COMMUNITY |
| if (pdu->community_len == 0) { |
| if (session->community_len == 0) { |
| session->s_snmp_errno = SNMPERR_BAD_COMMUNITY; |
| return -1; |
| } |
| pdu->community = (u_char *) malloc(session->community_len); |
| if (pdu->community == NULL) { |
| session->s_snmp_errno = SNMPERR_MALLOC; |
| return -1; |
| } |
| memmove(pdu->community, |
| session->community, session->community_len); |
| pdu->community_len = session->community_len; |
| } |
| #else /* !NETSNMP_NO_ZEROLENGTH_COMMUNITY */ |
| if (pdu->community_len == 0 && pdu->command != SNMP_MSG_RESPONSE) { |
| /* |
| * copy session community exactly to pdu community |
| */ |
| if (0 == session->community_len) { |
| SNMP_FREE(pdu->community); |
| } else if (pdu->community_len == session->community_len) { |
| memmove(pdu->community, |
| session->community, session->community_len); |
| } else { |
| SNMP_FREE(pdu->community); |
| pdu->community = (u_char *) malloc(session->community_len); |
| if (pdu->community == NULL) { |
| session->s_snmp_errno = SNMPERR_MALLOC; |
| return -1; |
| } |
| memmove(pdu->community, |
| session->community, session->community_len); |
| } |
| pdu->community_len = session->community_len; |
| } |
| #endif /* !NETSNMP_NO_ZEROLENGTH_COMMUNITY */ |
| |
| DEBUGMSGTL(("snmp_send", "Building SNMPv%ld message...\n", |
| (1 + pdu->version))); |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_REVERSE_ENCODE)) { |
| DEBUGPRINTPDUTYPE("send", pdu->command); |
| rc = snmp_pdu_realloc_rbuild(pkt, pkt_len, offset, pdu); |
| if (rc == 0) { |
| return -1; |
| } |
| |
| DEBUGDUMPHEADER("send", "Community String"); |
| rc = asn_realloc_rbuild_string(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | |
| ASN_PRIMITIVE | |
| ASN_OCTET_STR), |
| pdu->community, |
| pdu->community_len); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return -1; |
| } |
| |
| |
| /* |
| * Store the version field. |
| */ |
| DEBUGDUMPHEADER("send", "SNMP Version Number"); |
| |
| version = pdu->version; |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | |
| ASN_PRIMITIVE | |
| ASN_INTEGER), |
| (long *) &version, |
| sizeof(version)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return -1; |
| } |
| |
| /* |
| * Build the final sequence. |
| */ |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| if (pdu->version == SNMP_VERSION_1) { |
| DEBUGDUMPSECTION("send", "SNMPv1 Message"); |
| } else { |
| #endif |
| DEBUGDUMPSECTION("send", "SNMPv2c Message"); |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| } |
| #endif |
| rc = asn_realloc_rbuild_sequence(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_SEQUENCE | |
| ASN_CONSTRUCTOR), |
| *offset - start_offset); |
| DEBUGINDENTLESS(); |
| |
| if (rc == 0) { |
| return -1; |
| } |
| return 0; |
| } else { |
| |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| /* |
| * Save current location and build SEQUENCE tag and length |
| * placeholder for SNMP message sequence |
| * (actual length will be inserted later) |
| */ |
| cp = asn_build_sequence(*pkt, pkt_len, |
| (u_char) (ASN_SEQUENCE | |
| ASN_CONSTRUCTOR), 0); |
| if (cp == NULL) { |
| return -1; |
| } |
| h0e = cp; |
| |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| if (pdu->version == SNMP_VERSION_1) { |
| DEBUGDUMPSECTION("send", "SNMPv1 Message"); |
| } else { |
| #endif |
| DEBUGDUMPSECTION("send", "SNMPv2c Message"); |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| } |
| #endif |
| |
| /* |
| * store the version field |
| */ |
| DEBUGDUMPHEADER("send", "SNMP Version Number"); |
| |
| version = pdu->version; |
| cp = asn_build_int(cp, pkt_len, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), (long *) &version, |
| sizeof(version)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return -1; |
| |
| /* |
| * store the community string |
| */ |
| DEBUGDUMPHEADER("send", "Community String"); |
| cp = asn_build_string(cp, pkt_len, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_OCTET_STR), pdu->community, |
| pdu->community_len); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return -1; |
| break; |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| } |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| break; |
| #endif /* support for community based SNMP */ |
| case SNMP_VERSION_2p: |
| case SNMP_VERSION_sec: |
| case SNMP_VERSION_2u: |
| case SNMP_VERSION_2star: |
| default: |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| return -1; |
| } |
| |
| DEBUGPRINTPDUTYPE("send", pdu->command); |
| cp = snmp_pdu_build(pdu, cp, pkt_len); |
| DEBUGINDENTADD(-4); /* return from entire v1/v2c message */ |
| if (cp == NULL) |
| return -1; |
| |
| /* |
| * insert the actual length of the message sequence |
| */ |
| switch (pdu->version) { |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| case SNMP_VERSION_1: |
| #endif |
| #ifndef NETSNMP_DISABLE_SNMPV2C |
| case SNMP_VERSION_2c: |
| #endif |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| asn_build_sequence(*pkt, &length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| cp - h0e); |
| break; |
| #endif /* support for community based SNMP */ |
| |
| case SNMP_VERSION_2p: |
| case SNMP_VERSION_sec: |
| case SNMP_VERSION_2u: |
| case SNMP_VERSION_2star: |
| default: |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| return -1; |
| } |
| *pkt_len = cp - *pkt; |
| return 0; |
| } |
| |
| int |
| snmp_build(u_char ** pkt, size_t * pkt_len, size_t * offset, |
| netsnmp_session * pss, netsnmp_pdu *pdu) |
| { |
| int rc; |
| rc = _snmp_build(pkt, pkt_len, offset, pss, pdu); |
| if (rc) { |
| if (!pss->s_snmp_errno) { |
| snmp_log(LOG_ERR, "snmp_build: unknown failure\n"); |
| pss->s_snmp_errno = SNMPERR_BAD_ASN1_BUILD; |
| } |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| rc = -1; |
| } |
| return rc; |
| } |
| |
| /* |
| * on error, returns NULL (likely an encoding problem). |
| */ |
| u_char * |
| snmp_pdu_build(netsnmp_pdu *pdu, u_char * cp, size_t * out_length) |
| { |
| u_char *h1, *h1e, *h2, *h2e; |
| netsnmp_variable_list *vp; |
| size_t length; |
| |
| length = *out_length; |
| /* |
| * Save current location and build PDU tag and length placeholder |
| * (actual length will be inserted later) |
| */ |
| h1 = cp; |
| cp = asn_build_sequence(cp, out_length, (u_char) pdu->command, 0); |
| if (cp == NULL) |
| return NULL; |
| h1e = cp; |
| |
| /* |
| * store fields in the PDU preceeding the variable-bindings sequence |
| */ |
| if (pdu->command != SNMP_MSG_TRAP) { |
| /* |
| * PDU is not an SNMPv1 trap |
| */ |
| |
| DEBUGDUMPHEADER("send", "request_id"); |
| /* |
| * request id |
| */ |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &pdu->reqid, |
| sizeof(pdu->reqid)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * error status (getbulk non-repeaters) |
| */ |
| DEBUGDUMPHEADER("send", "error status"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &pdu->errstat, |
| sizeof(pdu->errstat)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * error index (getbulk max-repetitions) |
| */ |
| DEBUGDUMPHEADER("send", "error index"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), &pdu->errindex, |
| sizeof(pdu->errindex)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| } else { |
| /* |
| * an SNMPv1 trap PDU |
| */ |
| |
| /* |
| * enterprise |
| */ |
| DEBUGDUMPHEADER("send", "enterprise OBJID"); |
| cp = asn_build_objid(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_OBJECT_ID), |
| (oid *) pdu->enterprise, |
| pdu->enterprise_length); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * agent-addr |
| */ |
| DEBUGDUMPHEADER("send", "agent Address"); |
| cp = asn_build_string(cp, out_length, |
| (u_char) (ASN_IPADDRESS | ASN_PRIMITIVE), |
| (u_char *) pdu->agent_addr, 4); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * generic trap |
| */ |
| DEBUGDUMPHEADER("send", "generic trap number"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), |
| (long *) &pdu->trap_type, |
| sizeof(pdu->trap_type)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * specific trap |
| */ |
| DEBUGDUMPHEADER("send", "specific trap number"); |
| cp = asn_build_int(cp, out_length, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE | |
| ASN_INTEGER), |
| (long *) &pdu->specific_type, |
| sizeof(pdu->specific_type)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| |
| /* |
| * timestamp |
| */ |
| DEBUGDUMPHEADER("send", "timestamp"); |
| cp = asn_build_unsigned_int(cp, out_length, |
| (u_char) (ASN_TIMETICKS | |
| ASN_PRIMITIVE), &pdu->time, |
| sizeof(pdu->time)); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| } |
| |
| /* |
| * Save current location and build SEQUENCE tag and length placeholder |
| * for variable-bindings sequence |
| * (actual length will be inserted later) |
| */ |
| h2 = cp; |
| cp = asn_build_sequence(cp, out_length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), 0); |
| if (cp == NULL) |
| return NULL; |
| h2e = cp; |
| |
| /* |
| * Store variable-bindings |
| */ |
| DEBUGDUMPSECTION("send", "VarBindList"); |
| for (vp = pdu->variables; vp; vp = vp->next_variable) { |
| DEBUGDUMPSECTION("send", "VarBind"); |
| cp = snmp_build_var_op(cp, vp->name, &vp->name_length, vp->type, |
| vp->val_len, (u_char *) vp->val.string, |
| out_length); |
| DEBUGINDENTLESS(); |
| if (cp == NULL) |
| return NULL; |
| } |
| DEBUGINDENTLESS(); |
| |
| /* |
| * insert actual length of variable-bindings sequence |
| */ |
| asn_build_sequence(h2, &length, |
| (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| cp - h2e); |
| |
| /* |
| * insert actual length of PDU sequence |
| */ |
| asn_build_sequence(h1, &length, (u_char) pdu->command, cp - h1e); |
| |
| return cp; |
| } |
| |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| /* |
| * On error, returns 0 (likely an encoding problem). |
| */ |
| int |
| snmp_pdu_realloc_rbuild(u_char ** pkt, size_t * pkt_len, size_t * offset, |
| netsnmp_pdu *pdu) |
| { |
| #ifndef VPCACHE_SIZE |
| #define VPCACHE_SIZE 50 |
| #endif |
| netsnmp_variable_list *vpcache[VPCACHE_SIZE]; |
| netsnmp_variable_list *vp, *tmpvp; |
| size_t start_offset = *offset; |
| int i, wrapped = 0, notdone, final, rc = 0; |
| |
| DEBUGMSGTL(("snmp_pdu_realloc_rbuild", "starting\n")); |
| for (vp = pdu->variables, i = VPCACHE_SIZE - 1; vp; |
| vp = vp->next_variable, i--) { |
| if (i < 0) { |
| wrapped = notdone = 1; |
| i = VPCACHE_SIZE - 1; |
| DEBUGMSGTL(("snmp_pdu_realloc_rbuild", "wrapped\n")); |
| } |
| vpcache[i] = vp; |
| } |
| final = i + 1; |
| |
| do { |
| for (i = final; i < VPCACHE_SIZE; i++) { |
| vp = vpcache[i]; |
| DEBUGDUMPSECTION("send", "VarBind"); |
| rc = snmp_realloc_rbuild_var_op(pkt, pkt_len, offset, 1, |
| vp->name, &vp->name_length, |
| vp->type, |
| (u_char *) vp->val.string, |
| vp->val_len); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| } |
| |
| DEBUGINDENTLESS(); |
| if (wrapped) { |
| notdone = 1; |
| for (i = 0; i < final; i++) { |
| vp = vpcache[i]; |
| DEBUGDUMPSECTION("send", "VarBind"); |
| rc = snmp_realloc_rbuild_var_op(pkt, pkt_len, offset, 1, |
| vp->name, &vp->name_length, |
| vp->type, |
| (u_char *) vp->val.string, |
| vp->val_len); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| } |
| |
| if (final == 0) { |
| tmpvp = vpcache[VPCACHE_SIZE - 1]; |
| } else { |
| tmpvp = vpcache[final - 1]; |
| } |
| wrapped = 0; |
| |
| for (vp = pdu->variables, i = VPCACHE_SIZE - 1; |
| vp && vp != tmpvp; vp = vp->next_variable, i--) { |
| if (i < 0) { |
| wrapped = 1; |
| i = VPCACHE_SIZE - 1; |
| DEBUGMSGTL(("snmp_pdu_realloc_rbuild", "wrapped\n")); |
| } |
| vpcache[i] = vp; |
| } |
| final = i + 1; |
| } else { |
| notdone = 0; |
| } |
| } while (notdone); |
| |
| /* |
| * Save current location and build SEQUENCE tag and length placeholder for |
| * variable-bindings sequence (actual length will be inserted later). |
| */ |
| |
| rc = asn_realloc_rbuild_sequence(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_SEQUENCE | |
| ASN_CONSTRUCTOR), |
| *offset - start_offset); |
| |
| /* |
| * Store fields in the PDU preceeding the variable-bindings sequence. |
| */ |
| if (pdu->command != SNMP_MSG_TRAP) { |
| /* |
| * Error index (getbulk max-repetitions). |
| */ |
| DEBUGDUMPHEADER("send", "error index"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_INTEGER), |
| &pdu->errindex, sizeof(pdu->errindex)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Error status (getbulk non-repeaters). |
| */ |
| DEBUGDUMPHEADER("send", "error status"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_INTEGER), |
| &pdu->errstat, sizeof(pdu->errstat)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Request ID. |
| */ |
| DEBUGDUMPHEADER("send", "request_id"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_INTEGER), &pdu->reqid, |
| sizeof(pdu->reqid)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| } else { |
| /* |
| * An SNMPv1 trap PDU. |
| */ |
| |
| /* |
| * Timestamp. |
| */ |
| DEBUGDUMPHEADER("send", "timestamp"); |
| rc = asn_realloc_rbuild_unsigned_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_TIMETICKS | |
| ASN_PRIMITIVE), |
| &pdu->time, |
| sizeof(pdu->time)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Specific trap. |
| */ |
| DEBUGDUMPHEADER("send", "specific trap number"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_INTEGER), |
| (long *) &pdu->specific_type, |
| sizeof(pdu->specific_type)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Generic trap. |
| */ |
| DEBUGDUMPHEADER("send", "generic trap number"); |
| rc = asn_realloc_rbuild_int(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | ASN_PRIMITIVE |
| | ASN_INTEGER), |
| (long *) &pdu->trap_type, |
| sizeof(pdu->trap_type)); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Agent-addr. |
| */ |
| DEBUGDUMPHEADER("send", "agent Address"); |
| rc = asn_realloc_rbuild_string(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_IPADDRESS | |
| ASN_PRIMITIVE), |
| (u_char *) pdu->agent_addr, 4); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| |
| /* |
| * Enterprise. |
| */ |
| DEBUGDUMPHEADER("send", "enterprise OBJID"); |
| rc = asn_realloc_rbuild_objid(pkt, pkt_len, offset, 1, |
| (u_char) (ASN_UNIVERSAL | |
| ASN_PRIMITIVE | |
| ASN_OBJECT_ID), |
| (oid *) pdu->enterprise, |
| pdu->enterprise_length); |
| DEBUGINDENTLESS(); |
| if (rc == 0) { |
| return 0; |
| } |
| } |
| |
| /* |
| * Build the PDU sequence. |
| */ |
| rc = asn_realloc_rbuild_sequence(pkt, pkt_len, offset, 1, |
| (u_char) pdu->command, |
| *offset - start_offset); |
| return rc; |
| } |
| #endif /* NETSNMP_USE_REVERSE_ASNENCODING */ |
| |
| /* |
| * Parses the packet received to determine version, either directly |
| * from packets version field or inferred from ASN.1 construct. |
| */ |
| static int |
| snmp_parse_version(u_char * data, size_t length) |
| { |
| u_char type; |
| long version = SNMPERR_BAD_VERSION; |
| |
| data = asn_parse_sequence(data, &length, &type, |
| (ASN_SEQUENCE | ASN_CONSTRUCTOR), "version"); |
| if (data) { |
| DEBUGDUMPHEADER("recv", "SNMP Version"); |
| data = |
| asn_parse_int(data, &length, &type, &version, sizeof(version)); |
| DEBUGINDENTLESS(); |
| if (!data || type != ASN_INTEGER) { |
| return SNMPERR_BAD_VERSION; |
| } |
| } |
| return version; |
| } |
| |
| |
| int |
| snmpv3_parse(netsnmp_pdu *pdu, |
| u_char * data, |
| size_t * length, |
| u_char ** after_header, netsnmp_session * sess) |
| { |
| u_char type, msg_flags; |
| long ver, msg_max_size, msg_sec_model; |
| size_t max_size_response; |
| u_char tmp_buf[SNMP_MAX_MSG_SIZE]; |
| size_t tmp_buf_len; |
| u_char pdu_buf[SNMP_MAX_MSG_SIZE]; |
| u_char *mallocbuf = NULL; |
| size_t pdu_buf_len = SNMP_MAX_MSG_SIZE; |
| u_char *sec_params; |
| u_char *msg_data; |
| u_char *cp; |
| size_t asn_len, msg_len; |
| int ret, ret_val; |
| struct snmp_secmod_def *sptr; |
| |
| |
| msg_data = data; |
| msg_len = *length; |
| |
| |
| /* |
| * message is an ASN.1 SEQUENCE |
| */ |
| DEBUGDUMPSECTION("recv", "SNMPv3 Message"); |
| data = asn_parse_sequence(data, length, &type, |
| (ASN_SEQUENCE | ASN_CONSTRUCTOR), "message"); |
| if (data == NULL) { |
| /* |
| * error msg detail is set |
| */ |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTLESS(); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| /* |
| * parse msgVersion |
| */ |
| DEBUGDUMPHEADER("recv", "SNMP Version Number"); |
| data = asn_parse_int(data, length, &type, &ver, sizeof(ver)); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| ERROR_MSG("bad parse of version"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTLESS(); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| pdu->version = ver; |
| |
| /* |
| * parse msgGlobalData sequence |
| */ |
| cp = data; |
| asn_len = *length; |
| DEBUGDUMPSECTION("recv", "msgGlobalData"); |
| data = asn_parse_sequence(data, &asn_len, &type, |
| (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| "msgGlobalData"); |
| if (data == NULL) { |
| /* |
| * error msg detail is set |
| */ |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| *length -= data - cp; /* subtract off the length of the header */ |
| |
| /* |
| * msgID |
| */ |
| DEBUGDUMPHEADER("recv", "msgID"); |
| data = |
| asn_parse_int(data, length, &type, &pdu->msgid, |
| sizeof(pdu->msgid)); |
| DEBUGINDENTLESS(); |
| if (data == NULL || type != ASN_INTEGER) { |
| ERROR_MSG("error parsing msgID"); |
| DEBUGINDENTADD(-4); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| /* |
| * Check the msgID we received is a legal value. If not, then increment |
| * snmpInASNParseErrs and return the appropriate error (see RFC 2572, |
| * para. 7.2, section 2 -- note that a bad msgID means that the received |
| * message is NOT a serialiization of an SNMPv3Message, since the msgID |
| * field is out of bounds). |
| */ |
| |
| if (pdu->msgid < 0 || pdu->msgid > 0x7fffffff) { |
| snmp_log(LOG_ERR, "Received bad msgID (%ld %s %s).\n", pdu->msgid, |
| (pdu->msgid < 0) ? "<" : ">", |
| (pdu->msgid < 0) ? "0" : "2^31 - 1"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| /* |
| * msgMaxSize |
| */ |
| DEBUGDUMPHEADER("recv", "msgMaxSize"); |
| data = asn_parse_int(data, length, &type, &msg_max_size, |
| sizeof(msg_max_size)); |
| DEBUGINDENTLESS(); |
| if (data == NULL || type != ASN_INTEGER) { |
| ERROR_MSG("error parsing msgMaxSize"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| /* |
| * Check the msgMaxSize we received is a legal value. If not, then |
| * increment snmpInASNParseErrs and return the appropriate error (see RFC |
| * 2572, para. 7.2, section 2 -- note that a bad msgMaxSize means that the |
| * received message is NOT a serialiization of an SNMPv3Message, since the |
| * msgMaxSize field is out of bounds). |
| * |
| * Note we store the msgMaxSize on a per-session basis which also seems |
| * reasonable; it could vary from PDU to PDU but that would be strange |
| * (also since we deal with a PDU at a time, it wouldn't make any |
| * difference to our responses, if any). |
| */ |
| |
| if (msg_max_size < 484) { |
| snmp_log(LOG_ERR, "Received bad msgMaxSize (%lu < 484).\n", |
| msg_max_size); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } else if (msg_max_size > 0x7fffffff) { |
| snmp_log(LOG_ERR, "Received bad msgMaxSize (%lu > 2^31 - 1).\n", |
| msg_max_size); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } else { |
| DEBUGMSGTL(("snmpv3_parse", "msgMaxSize %lu received\n", |
| msg_max_size)); |
| sess->sndMsgMaxSize = msg_max_size; |
| } |
| |
| /* |
| * msgFlags |
| */ |
| tmp_buf_len = SNMP_MAX_MSG_SIZE; |
| DEBUGDUMPHEADER("recv", "msgFlags"); |
| data = asn_parse_string(data, length, &type, tmp_buf, &tmp_buf_len); |
| DEBUGINDENTLESS(); |
| if (data == NULL || type != ASN_OCTET_STR || tmp_buf_len != 1) { |
| ERROR_MSG("error parsing msgFlags"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| msg_flags = *tmp_buf; |
| if (msg_flags & SNMP_MSG_FLAG_RPRT_BIT) |
| pdu->flags |= SNMP_MSG_FLAG_RPRT_BIT; |
| else |
| pdu->flags &= (~SNMP_MSG_FLAG_RPRT_BIT); |
| |
| /* |
| * msgSecurityModel |
| */ |
| DEBUGDUMPHEADER("recv", "msgSecurityModel"); |
| data = asn_parse_int(data, length, &type, &msg_sec_model, |
| sizeof(msg_sec_model)); |
| DEBUGINDENTADD(-4); /* return from global data indent */ |
| if (data == NULL || type != ASN_INTEGER || |
| msg_sec_model < 1 || msg_sec_model > 0x7fffffff) { |
| ERROR_MSG("error parsing msgSecurityModel"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTLESS(); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| sptr = find_sec_mod(msg_sec_model); |
| if (!sptr) { |
| snmp_log(LOG_WARNING, "unknown security model: %ld\n", |
| msg_sec_model); |
| snmp_increment_statistic(STAT_SNMPUNKNOWNSECURITYMODELS); |
| DEBUGINDENTLESS(); |
| return SNMPERR_UNKNOWN_SEC_MODEL; |
| } |
| pdu->securityModel = msg_sec_model; |
| |
| if (msg_flags & SNMP_MSG_FLAG_PRIV_BIT && |
| !(msg_flags & SNMP_MSG_FLAG_AUTH_BIT)) { |
| ERROR_MSG("invalid message, illegal msgFlags"); |
| snmp_increment_statistic(STAT_SNMPINVALIDMSGS); |
| DEBUGINDENTLESS(); |
| return SNMPERR_INVALID_MSG; |
| } |
| pdu->securityLevel = ((msg_flags & SNMP_MSG_FLAG_AUTH_BIT) |
| ? ((msg_flags & SNMP_MSG_FLAG_PRIV_BIT) |
| ? SNMP_SEC_LEVEL_AUTHPRIV |
| : SNMP_SEC_LEVEL_AUTHNOPRIV) |
| : SNMP_SEC_LEVEL_NOAUTH); |
| /* |
| * end of msgGlobalData |
| */ |
| |
| /* |
| * securtityParameters OCTET STRING begins after msgGlobalData |
| */ |
| sec_params = data; |
| pdu->contextEngineID = (u_char *) calloc(1, SNMP_MAX_ENG_SIZE); |
| pdu->contextEngineIDLen = SNMP_MAX_ENG_SIZE; |
| |
| /* |
| * Note: there is no length limit on the msgAuthoritativeEngineID field, |
| * although we would EXPECT it to be limited to 32 (the SnmpEngineID TC |
| * limit). We'll use double that here to be on the safe side. |
| */ |
| |
| pdu->securityEngineID = (u_char *) calloc(1, SNMP_MAX_ENG_SIZE * 2); |
| pdu->securityEngineIDLen = SNMP_MAX_ENG_SIZE * 2; |
| pdu->securityName = (char *) calloc(1, SNMP_MAX_SEC_NAME_SIZE); |
| pdu->securityNameLen = SNMP_MAX_SEC_NAME_SIZE; |
| |
| if ((pdu->securityName == NULL) || |
| (pdu->securityEngineID == NULL) || |
| (pdu->contextEngineID == NULL)) { |
| return SNMPERR_MALLOC; |
| } |
| |
| if (pdu_buf_len < msg_len |
| && pdu->securityLevel == SNMP_SEC_LEVEL_AUTHPRIV) { |
| /* |
| * space needed is larger than we have in the default buffer |
| */ |
| mallocbuf = (u_char *) calloc(1, msg_len); |
| pdu_buf_len = msg_len; |
| cp = mallocbuf; |
| } else { |
| memset(pdu_buf, 0, pdu_buf_len); |
| cp = pdu_buf; |
| } |
| |
| DEBUGDUMPSECTION("recv", "SM msgSecurityParameters"); |
| if (sptr->decode) { |
| struct snmp_secmod_incoming_params parms; |
| parms.msgProcModel = pdu->msgParseModel; |
| parms.maxMsgSize = msg_max_size; |
| parms.secParams = sec_params; |
| parms.secModel = msg_sec_model; |
| parms.secLevel = pdu->securityLevel; |
| parms.wholeMsg = msg_data; |
| parms.wholeMsgLen = msg_len; |
| parms.secEngineID = pdu->securityEngineID; |
| parms.secEngineIDLen = &pdu->securityEngineIDLen; |
| parms.secName = pdu->securityName; |
| parms.secNameLen = &pdu->securityNameLen; |
| parms.scopedPdu = &cp; |
| parms.scopedPduLen = &pdu_buf_len; |
| parms.maxSizeResponse = &max_size_response; |
| parms.secStateRef = &pdu->securityStateRef; |
| parms.sess = sess; |
| parms.pdu = pdu; |
| parms.msg_flags = msg_flags; |
| ret_val = (*sptr->decode) (&parms); |
| } else { |
| SNMP_FREE(mallocbuf); |
| DEBUGINDENTLESS(); |
| snmp_log(LOG_WARNING, "security service %ld can't decode packets\n", |
| msg_sec_model); |
| return (-1); |
| } |
| |
| if (ret_val != SNMPERR_SUCCESS) { |
| DEBUGDUMPSECTION("recv", "ScopedPDU"); |
| /* |
| * Parse as much as possible -- though I don't see the point? [jbpn]. |
| */ |
| if (cp) { |
| cp = snmpv3_scopedPDU_parse(pdu, cp, &pdu_buf_len); |
| } |
| if (cp) { |
| DEBUGPRINTPDUTYPE("recv", *cp); |
| snmp_pdu_parse(pdu, cp, &pdu_buf_len); |
| DEBUGINDENTADD(-8); |
| } else { |
| DEBUGINDENTADD(-4); |
| } |
| |
| SNMP_FREE(mallocbuf); |
| return ret_val; |
| } |
| |
| /* |
| * parse plaintext ScopedPDU sequence |
| */ |
| *length = pdu_buf_len; |
| DEBUGDUMPSECTION("recv", "ScopedPDU"); |
| data = snmpv3_scopedPDU_parse(pdu, cp, length); |
| if (data == NULL) { |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| DEBUGINDENTADD(-4); |
| SNMP_FREE(mallocbuf); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| /* |
| * parse the PDU. |
| */ |
| if (after_header != NULL) { |
| *after_header = data; |
| tmp_buf_len = *length; |
| } |
| |
| DEBUGPRINTPDUTYPE("recv", *data); |
| ret = snmp_pdu_parse(pdu, data, length); |
| DEBUGINDENTADD(-8); |
| |
| if (after_header != NULL) { |
| *length = tmp_buf_len; |
| } |
| |
| if (ret != SNMPERR_SUCCESS) { |
| ERROR_MSG("error parsing PDU"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| SNMP_FREE(mallocbuf); |
| return SNMPERR_ASN_PARSE_ERR; |
| } |
| |
| SNMP_FREE(mallocbuf); |
| return SNMPERR_SUCCESS; |
| } /* end snmpv3_parse() */ |
| |
| #define ERROR_STAT_LENGTH 11 |
| |
| int |
| snmpv3_make_report(netsnmp_pdu *pdu, int error) |
| { |
| |
| long ltmp; |
| static oid unknownSecurityLevel[] = |
| { 1, 3, 6, 1, 6, 3, 15, 1, 1, 1, 0 }; |
| static oid notInTimeWindow[] = |
| { 1, 3, 6, 1, 6, 3, 15, 1, 1, 2, 0 }; |
| static oid unknownUserName[] = |
| { 1, 3, 6, 1, 6, 3, 15, 1, 1, 3, 0 }; |
| static oid unknownEngineID[] = |
| { 1, 3, 6, 1, 6, 3, 15, 1, 1, 4, 0 }; |
| static oid wrongDigest[] = { 1, 3, 6, 1, 6, 3, 15, 1, 1, 5, 0 }; |
| static oid decryptionError[] = |
| { 1, 3, 6, 1, 6, 3, 15, 1, 1, 6, 0 }; |
| oid *err_var; |
| int err_var_len; |
| int stat_ind; |
| struct snmp_secmod_def *sptr; |
| |
| switch (error) { |
| case SNMPERR_USM_UNKNOWNENGINEID: |
| stat_ind = STAT_USMSTATSUNKNOWNENGINEIDS; |
| err_var = unknownEngineID; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| case SNMPERR_USM_UNKNOWNSECURITYNAME: |
| stat_ind = STAT_USMSTATSUNKNOWNUSERNAMES; |
| err_var = unknownUserName; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| case SNMPERR_USM_UNSUPPORTEDSECURITYLEVEL: |
| stat_ind = STAT_USMSTATSUNSUPPORTEDSECLEVELS; |
| err_var = unknownSecurityLevel; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| case SNMPERR_USM_AUTHENTICATIONFAILURE: |
| stat_ind = STAT_USMSTATSWRONGDIGESTS; |
| err_var = wrongDigest; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| case SNMPERR_USM_NOTINTIMEWINDOW: |
| stat_ind = STAT_USMSTATSNOTINTIMEWINDOWS; |
| err_var = notInTimeWindow; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| case SNMPERR_USM_DECRYPTIONERROR: |
| stat_ind = STAT_USMSTATSDECRYPTIONERRORS; |
| err_var = decryptionError; |
| err_var_len = ERROR_STAT_LENGTH; |
| break; |
| default: |
| return SNMPERR_GENERR; |
| } |
| |
| snmp_free_varbind(pdu->variables); /* free the current varbind */ |
| |
| pdu->variables = NULL; |
| SNMP_FREE(pdu->securityEngineID); |
| pdu->securityEngineID = |
| snmpv3_generate_engineID(&pdu->securityEngineIDLen); |
| SNMP_FREE(pdu->contextEngineID); |
| pdu->contextEngineID = |
| snmpv3_generate_engineID(&pdu->contextEngineIDLen); |
| pdu->command = SNMP_MSG_REPORT; |
| pdu->errstat = 0; |
| pdu->errindex = 0; |
| SNMP_FREE(pdu->contextName); |
| pdu->contextName = strdup(""); |
| pdu->contextNameLen = strlen(pdu->contextName); |
| |
| /* |
| * reports shouldn't cache previous data. |
| */ |
| /* |
| * FIX - yes they should but USM needs to follow new EoP to determine |
| * which cached values to use |
| */ |
| if (pdu->securityStateRef) { |
| sptr = find_sec_mod(pdu->securityModel); |
| if (sptr) { |
| if (sptr->pdu_free_state_ref) { |
| (*sptr->pdu_free_state_ref) (pdu->securityStateRef); |
| } else { |
| snmp_log(LOG_ERR, |
| "Security Model %d can't free state references\n", |
| pdu->securityModel); |
| } |
| } else { |
| snmp_log(LOG_ERR, |
| "Can't find security model to free ptr: %d\n", |
| pdu->securityModel); |
| } |
| pdu->securityStateRef = NULL; |
| } |
| |
| if (error == SNMPERR_USM_NOTINTIMEWINDOW) { |
| pdu->securityLevel = SNMP_SEC_LEVEL_AUTHNOPRIV; |
| } else { |
| pdu->securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
| } |
| |
| /* |
| * find the appropriate error counter |
| */ |
| #ifndef NETSNMP_FEATURE_REMOVE_STATISTICS |
| ltmp = snmp_get_statistic(stat_ind); |
| #else /* !NETSNMP_FEATURE_REMOVE_STATISTICS */ |
| ltmp = 1; |
| #endif /* !NETSNMP_FEATURE_REMOVE_STATISTICS */ |
| |
| /* |
| * return the appropriate error counter |
| */ |
| snmp_pdu_add_variable(pdu, err_var, err_var_len, |
| ASN_COUNTER, & ltmp, sizeof(ltmp)); |
| |
| return SNMPERR_SUCCESS; |
| } /* end snmpv3_make_report() */ |
| |
| |
| int |
| snmpv3_get_report_type(netsnmp_pdu *pdu) |
| { |
| static oid snmpMPDStats[] = { 1, 3, 6, 1, 6, 3, 11, 2, 1 }; |
| static oid targetStats[] = { 1, 3, 6, 1, 6, 3, 12, 1 }; |
| static oid usmStats[] = { 1, 3, 6, 1, 6, 3, 15, 1, 1 }; |
| netsnmp_variable_list *vp; |
| int rpt_type = SNMPERR_UNKNOWN_REPORT; |
| |
| if (pdu == NULL || pdu->variables == NULL) |
| return rpt_type; |
| vp = pdu->variables; |
| /* MPD or USM based report statistics objects have the same length prefix |
| * so the actual statistics OID will have this length, |
| * plus one subidentifier for the scalar MIB object itself, |
| * and one for the instance subidentifier |
| */ |
| if (vp->name_length == REPORT_STATS_LEN + 2) { |
| if (memcmp(snmpMPDStats, vp->name, REPORT_STATS_LEN * sizeof(oid)) == 0) { |
| switch (vp->name[REPORT_STATS_LEN]) { |
| case REPORT_snmpUnknownSecurityModels_NUM: |
| rpt_type = SNMPERR_UNKNOWN_SEC_MODEL; |
| break; |
| case REPORT_snmpInvalidMsgs_NUM: |
| rpt_type = SNMPERR_INVALID_MSG; |
| break; |
| case REPORT_snmpUnknownPDUHandlers_NUM: |
| rpt_type = SNMPERR_BAD_VERSION; |
| break; |
| } |
| } else if (memcmp(usmStats, vp->name, REPORT_STATS_LEN * sizeof(oid)) == 0) { |
| switch (vp->name[REPORT_STATS_LEN]) { |
| case REPORT_usmStatsUnsupportedSecLevels_NUM: |
| rpt_type = SNMPERR_UNSUPPORTED_SEC_LEVEL; |
| break; |
| case REPORT_usmStatsNotInTimeWindows_NUM: |
| rpt_type = SNMPERR_NOT_IN_TIME_WINDOW; |
| break; |
| case REPORT_usmStatsUnknownUserNames_NUM: |
| rpt_type = SNMPERR_UNKNOWN_USER_NAME; |
| break; |
| case REPORT_usmStatsUnknownEngineIDs_NUM: |
| rpt_type = SNMPERR_UNKNOWN_ENG_ID; |
| break; |
| case REPORT_usmStatsWrongDigests_NUM: |
| rpt_type = SNMPERR_AUTHENTICATION_FAILURE; |
| break; |
| case REPORT_usmStatsDecryptionErrors_NUM: |
| rpt_type = SNMPERR_DECRYPTION_ERR; |
| break; |
| } |
| } |
| } |
| /* Context-based report statistics from the Target MIB are similar |
| * but the OID prefix has a different length |
| */ |
| if (vp->name_length == REPORT_STATS_LEN2 + 2) { |
| if (memcmp(targetStats, vp->name, REPORT_STATS_LEN2 * sizeof(oid)) == 0) { |
| switch (vp->name[REPORT_STATS_LEN2]) { |
| case REPORT_snmpUnavailableContexts_NUM: |
| rpt_type = SNMPERR_BAD_CONTEXT; |
| break; |
| case REPORT_snmpUnknownContexts_NUM: |
| rpt_type = SNMPERR_BAD_CONTEXT; |
| break; |
| } |
| } |
| } |
| DEBUGMSGTL(("report", "Report type: %d\n", rpt_type)); |
| return rpt_type; |
| } |
| |
| /* |
| * Parses the packet received on the input session, and places the data into |
| * the input pdu. length is the length of the input packet. |
| * If any errors are encountered, -1 or USM error is returned. |
| * Otherwise, a 0 is returned. |
| */ |
| static int |
| _snmp_parse(void *sessp, |
| netsnmp_session * session, |
| netsnmp_pdu *pdu, u_char * data, size_t length) |
| { |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| u_char community[COMMUNITY_MAX_LEN]; |
| size_t community_length = COMMUNITY_MAX_LEN; |
| #endif |
| int result = -1; |
| |
| static oid snmpEngineIDoid[] = { 1,3,6,1,6,3,10,2,1,1,0}; |
| static size_t snmpEngineIDoid_len = 11; |
| |
| static char ourEngineID[SNMP_SEC_PARAM_BUF_SIZE]; |
| static size_t ourEngineID_len = sizeof(ourEngineID); |
| |
| netsnmp_pdu *pdu2 = NULL; |
| |
| session->s_snmp_errno = 0; |
| session->s_errno = 0; |
| |
| /* |
| * Ensure all incoming PDUs have a unique means of identification |
| * (This is not restricted to AgentX handling, |
| * though that is where the need becomes visible) |
| */ |
| pdu->transid = snmp_get_next_transid(); |
| |
| if (session->version != SNMP_DEFAULT_VERSION) { |
| pdu->version = session->version; |
| } else { |
| pdu->version = snmp_parse_version(data, length); |
| } |
| |
| switch (pdu->version) { |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| case SNMP_VERSION_1: |
| #endif |
| #ifndef NETSNMP_DISABLE_SNMPV2C |
| case SNMP_VERSION_2c: |
| #endif |
| #if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C) |
| DEBUGMSGTL(("snmp_api", "Parsing SNMPv%ld message...\n", |
| (1 + pdu->version))); |
| |
| /* |
| * authenticates message and returns length if valid |
| */ |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| if (pdu->version == SNMP_VERSION_1) { |
| DEBUGDUMPSECTION("recv", "SNMPv1 message\n"); |
| } else { |
| #endif |
| DEBUGDUMPSECTION("recv", "SNMPv2c message\n"); |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| } |
| #endif |
| data = snmp_comstr_parse(data, &length, |
| community, &community_length, |
| &pdu->version); |
| if (data == NULL) |
| return -1; |
| |
| if (pdu->version != session->version && |
| session->version != SNMP_DEFAULT_VERSION) { |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| return -1; |
| } |
| |
| /* |
| * maybe get the community string. |
| */ |
| pdu->securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
| pdu->securityModel = |
| #ifndef NETSNMP_DISABLE_SNMPV1 |
| (pdu->version == SNMP_VERSION_1) ? SNMP_SEC_MODEL_SNMPv1 : |
| #endif |
| SNMP_SEC_MODEL_SNMPv2c; |
| SNMP_FREE(pdu->community); |
| pdu->community_len = 0; |
| pdu->community = (u_char *) 0; |
| if (community_length) { |
| pdu->community_len = community_length; |
| pdu->community = (u_char *) malloc(community_length); |
| if (pdu->community == NULL) { |
| session->s_snmp_errno = SNMPERR_MALLOC; |
| return -1; |
| } |
| memmove(pdu->community, community, community_length); |
| } |
| if (session->authenticator) { |
| data = session->authenticator(data, &length, |
| community, community_length); |
| if (data == NULL) { |
| session->s_snmp_errno = SNMPERR_AUTHENTICATION_FAILURE; |
| return -1; |
| } |
| } |
| |
| DEBUGDUMPSECTION("recv", "PDU"); |
| result = snmp_pdu_parse(pdu, data, &length); |
| if (result < 0) { |
| /* |
| * This indicates a parse error. |
| */ |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| } |
| DEBUGINDENTADD(-6); |
| break; |
| #endif /* support for community based SNMP */ |
| |
| case SNMP_VERSION_3: |
| result = snmpv3_parse(pdu, data, &length, NULL, session); |
| DEBUGMSGTL(("snmp_parse", |
| "Parsed SNMPv3 message (secName:%s, secLevel:%s): %s\n", |
| pdu->securityName, secLevelName[pdu->securityLevel], |
| snmp_api_errstring(result))); |
| |
| if (result) { |
| struct snmp_secmod_def *secmod = |
| find_sec_mod(pdu->securityModel); |
| if (!sessp) { |
| session->s_snmp_errno = result; |
| } else { |
| /* |
| * Call the security model to special handle any errors |
| */ |
| |
| if (secmod && secmod->handle_report) { |
| struct session_list *slp = (struct session_list *) sessp; |
| (*secmod->handle_report)(sessp, slp->transport, session, |
| result, pdu); |
| } |
| } |
| if (pdu->securityStateRef != NULL) { |
| if (secmod && secmod->pdu_free_state_ref) { |
| secmod->pdu_free_state_ref(pdu->securityStateRef); |
| pdu->securityStateRef = NULL; |
| } |
| } |
| } |
| |
| /* Implement RFC5343 here for two reasons: |
| 1) From a security perspective it handles this otherwise |
| always approved request earlier. It bypasses the need |
| for authorization to the snmpEngineID scalar, which is |
| what is what RFC3415 appendix A species as ok. Note |
| that we haven't bypassed authentication since if there |
| was an authentication eror it would have been handled |
| above in the if(result) part at the lastet. |
| 2) From an application point of view if we let this request |
| get all the way to the application, it'd require that |
| all application types supporting discovery also fire up |
| a minimal agent in order to handle just this request |
| which seems like overkill. Though there is no other |
| application types that currently need discovery (NRs |
| accept notifications from contextEngineIDs that derive |
| from the NO not the NR). Also a lame excuse for doing |
| it here. |
| 3) Less important technically, but the net-snmp agent |
| doesn't currently handle registrations of different |
| engineIDs either and it would have been a lot more work |
| to implement there since we'd need to support that |
| first. :-/ Supporting multiple context engineIDs should |
| be done anyway, so it's not a valid excuse here. |
| 4) There is a lot less to do if we trump the agent at this |
| point; IE, the agent does a lot more unnecessary |
| processing when the only thing that should ever be in |
| this context by definition is the single scalar. |
| */ |
| |
| /* special RFC5343 engineID discovery engineID check */ |
| if (!netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_NO_DISCOVERY) && |
| SNMP_MSG_RESPONSE != pdu->command && |
| NULL != pdu->contextEngineID && |
| pdu->contextEngineIDLen == 5 && |
| pdu->contextEngineID[0] == 0x80 && |
| pdu->contextEngineID[1] == 0x00 && |
| pdu->contextEngineID[2] == 0x00 && |
| pdu->contextEngineID[3] == 0x00 && |
| pdu->contextEngineID[4] == 0x06) { |
| |
| /* define a result so it doesn't get past us at this point |
| and gets dropped by future parts of the stack */ |
| result = SNMPERR_JUST_A_CONTEXT_PROBE; |
| |
| DEBUGMSGTL(("snmpv3_contextid", "starting context ID discovery\n")); |
| /* ensure exactly one variable */ |
| if (NULL != pdu->variables && |
| NULL == pdu->variables->next_variable && |
| |
| /* if it's a GET, match it exactly */ |
| ((SNMP_MSG_GET == pdu->command && |
| snmp_oid_compare(snmpEngineIDoid, |
| snmpEngineIDoid_len, |
| pdu->variables->name, |
| pdu->variables->name_length) == 0) |
| /* if it's a GETNEXT ensure it's less than the engineID oid */ |
| || |
| (SNMP_MSG_GETNEXT == pdu->command && |
| snmp_oid_compare(snmpEngineIDoid, |
| snmpEngineIDoid_len, |
| pdu->variables->name, |
| pdu->variables->name_length) > 0) |
| )) { |
| |
| DEBUGMSGTL(("snmpv3_contextid", |
| " One correct variable found\n")); |
| |
| /* Note: we're explictly not handling a GETBULK. Deal. */ |
| |
| /* set up the response */ |
| pdu2 = snmp_clone_pdu(pdu); |
| |
| /* free the current varbind */ |
| snmp_free_varbind(pdu2->variables); |
| |
| /* set the variables */ |
| pdu2->variables = NULL; |
| pdu2->command = SNMP_MSG_RESPONSE; |
| pdu2->errstat = 0; |
| pdu2->errindex = 0; |
| |
| ourEngineID_len = |
| snmpv3_get_engineID((u_char*)ourEngineID, ourEngineID_len); |
| if (0 != ourEngineID_len) { |
| |
| DEBUGMSGTL(("snmpv3_contextid", |
| " responding with our engineID\n")); |
| |
| snmp_pdu_add_variable(pdu2, |
| snmpEngineIDoid, snmpEngineIDoid_len, |
| ASN_OCTET_STR, |
| ourEngineID, ourEngineID_len); |
| |
| /* send the response */ |
| if (0 == snmp_sess_send(sessp, pdu2)) { |
| |
| DEBUGMSGTL(("snmpv3_contextid", |
| " sent it off!\n")); |
| |
| snmp_free_pdu(pdu2); |
| |
| snmp_log(LOG_ERR, "sending a response to the context engineID probe failed\n"); |
| } |
| } else { |
| snmp_log(LOG_ERR, "failed to get our own engineID!\n"); |
| } |
| } else { |
| snmp_log(LOG_WARNING, |
| "received an odd context engineID probe\n"); |
| } |
| } |
| |
| break; |
| case SNMPERR_BAD_VERSION: |
| ERROR_MSG("error parsing snmp message version"); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| break; |
| case SNMP_VERSION_sec: |
| case SNMP_VERSION_2u: |
| case SNMP_VERSION_2star: |
| case SNMP_VERSION_2p: |
| default: |
| ERROR_MSG("unsupported snmp message version"); |
| snmp_increment_statistic(STAT_SNMPINBADVERSIONS); |
| |
| /* |
| * need better way to determine OS independent |
| * INT32_MAX value, for now hardcode |
| */ |
| if (pdu->version < 0 || pdu->version > 2147483647) { |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| } |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| break; |
| } |
| |
| return result; |
| } |
| |
| static int |
| snmp_parse(void *sessp, |
| netsnmp_session * pss, |
| netsnmp_pdu *pdu, u_char * data, size_t length) |
| { |
| int rc; |
| |
| rc = _snmp_parse(sessp, pss, pdu, data, length); |
| if (rc) { |
| if (!pss->s_snmp_errno) { |
| pss->s_snmp_errno = SNMPERR_BAD_PARSE; |
| } |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| } |
| |
| return rc; |
| } |
| |
| int |
| snmp_pdu_parse(netsnmp_pdu *pdu, u_char * data, size_t * length) |
| { |
| u_char type; |
| u_char msg_type; |
| u_char *var_val; |
| int badtype = 0; |
| size_t len; |
| size_t four; |
| netsnmp_variable_list *vp = NULL; |
| oid objid[MAX_OID_LEN]; |
| u_char *p; |
| |
| /* |
| * Get the PDU type |
| */ |
| data = asn_parse_header(data, length, &msg_type); |
| if (data == NULL) |
| return -1; |
| DEBUGMSGTL(("dumpv_recv"," Command %s\n", snmp_pdu_type(msg_type))); |
| pdu->command = msg_type; |
| pdu->flags &= (~UCD_MSG_FLAG_RESPONSE_PDU); |
| |
| /* |
| * get the fields in the PDU preceeding the variable-bindings sequence |
| */ |
| switch (pdu->command) { |
| case SNMP_MSG_TRAP: |
| /* |
| * enterprise |
| */ |
| pdu->enterprise_length = MAX_OID_LEN; |
| data = asn_parse_objid(data, length, &type, objid, |
| &pdu->enterprise_length); |
| if (data == NULL) |
| return -1; |
| pdu->enterprise = |
| (oid *) malloc(pdu->enterprise_length * sizeof(oid)); |
| if (pdu->enterprise == NULL) { |
| return -1; |
| } |
| memmove(pdu->enterprise, objid, |
| pdu->enterprise_length * sizeof(oid)); |
| |
| /* |
| * agent-addr |
| */ |
| four = 4; |
| data = asn_parse_string(data, length, &type, |
| (u_char *) pdu->agent_addr, &four); |
| if (data == NULL) |
| return -1; |
| |
| /* |
| * generic trap |
| */ |
| data = asn_parse_int(data, length, &type, (long *) &pdu->trap_type, |
| sizeof(pdu->trap_type)); |
| if (data == NULL) |
| return -1; |
| /* |
| * specific trap |
| */ |
| data = |
| asn_parse_int(data, length, &type, |
| (long *) &pdu->specific_type, |
| sizeof(pdu->specific_type)); |
| if (data == NULL) |
| return -1; |
| |
| /* |
| * timestamp |
| */ |
| data = asn_parse_unsigned_int(data, length, &type, &pdu->time, |
| sizeof(pdu->time)); |
| if (data == NULL) |
| return -1; |
| |
| break; |
| |
| case SNMP_MSG_RESPONSE: |
| case SNMP_MSG_REPORT: |
| pdu->flags |= UCD_MSG_FLAG_RESPONSE_PDU; |
| /* |
| * fallthrough |
| */ |
| |
| #ifndef NETSNMP_NOTIFY_ONLY |
| case SNMP_MSG_GET: |
| case SNMP_MSG_GETNEXT: |
| case SNMP_MSG_GETBULK: |
| #endif /* ! NETSNMP_NOTIFY_ONLY */ |
| #ifndef NETSNMP_NO_WRITE_SUPPORT |
| case SNMP_MSG_SET: |
| #endif /* !NETSNMP_NO_WRITE_SUPPORT */ |
| case SNMP_MSG_TRAP2: |
| case SNMP_MSG_INFORM: |
| /* |
| * PDU is not an SNMPv1 TRAP |
| */ |
| |
| /* |
| * request id |
| */ |
| DEBUGDUMPHEADER("recv", "request_id"); |
| data = asn_parse_int(data, length, &type, &pdu->reqid, |
| sizeof(pdu->reqid)); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| return -1; |
| } |
| |
| /* |
| * error status (getbulk non-repeaters) |
| */ |
| DEBUGDUMPHEADER("recv", "error status"); |
| data = asn_parse_int(data, length, &type, &pdu->errstat, |
| sizeof(pdu->errstat)); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| return -1; |
| } |
| |
| /* |
| * error index (getbulk max-repetitions) |
| */ |
| DEBUGDUMPHEADER("recv", "error index"); |
| data = asn_parse_int(data, length, &type, &pdu->errindex, |
| sizeof(pdu->errindex)); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| return -1; |
| } |
| break; |
| |
| default: |
| snmp_log(LOG_ERR, "Bad PDU type received: 0x%.2x\n", pdu->command); |
| snmp_increment_statistic(STAT_SNMPINASNPARSEERRS); |
| return -1; |
| } |
| |
| /* |
| * get header for variable-bindings sequence |
| */ |
| DEBUGDUMPSECTION("recv", "VarBindList"); |
| data = asn_parse_sequence(data, length, &type, |
| (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| "varbinds"); |
| if (data == NULL) |
| return -1; |
| |
| /* |
| * get each varBind sequence |
| */ |
| while ((int) *length > 0) { |
| netsnmp_variable_list *vptemp; |
| vptemp = (netsnmp_variable_list *) malloc(sizeof(*vptemp)); |
| if (NULL == vptemp) { |
| return -1; |
| } |
| if (NULL == vp) { |
| pdu->variables = vptemp; |
| } else { |
| vp->next_variable = vptemp; |
| } |
| vp = vptemp; |
| |
| vp->next_variable = NULL; |
| vp->val.string = NULL; |
| vp->name_length = MAX_OID_LEN; |
| vp->name = NULL; |
| vp->index = 0; |
| vp->data = NULL; |
| vp->dataFreeHook = NULL; |
| DEBUGDUMPSECTION("recv", "VarBind"); |
| data = snmp_parse_var_op(data, objid, &vp->name_length, &vp->type, |
| &vp->val_len, &var_val, length); |
| if (data == NULL) |
| return -1; |
| if (snmp_set_var_objid(vp, objid, vp->name_length)) |
| return -1; |
| |
| len = MAX_PACKET_LENGTH; |
| DEBUGDUMPHEADER("recv", "Value"); |
| switch ((short) vp->type) { |
| case ASN_INTEGER: |
| vp->val.integer = (long *) vp->buf; |
| vp->val_len = sizeof(long); |
| p = asn_parse_int(var_val, &len, &vp->type, |
| (long *) vp->val.integer, |
| sizeof(*vp->val.integer)); |
| if (!p) |
| return -1; |
| break; |
| case ASN_COUNTER: |
| case ASN_GAUGE: |
| case ASN_TIMETICKS: |
| case ASN_UINTEGER: |
| vp->val.integer = (long *) vp->buf; |
| vp->val_len = sizeof(u_long); |
| p = asn_parse_unsigned_int(var_val, &len, &vp->type, |
| (u_long *) vp->val.integer, |
| vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| #ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES |
| case ASN_OPAQUE_COUNTER64: |
| case ASN_OPAQUE_U64: |
| #endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */ |
| case ASN_COUNTER64: |
| vp->val.counter64 = (struct counter64 *) vp->buf; |
| vp->val_len = sizeof(struct counter64); |
| p = asn_parse_unsigned_int64(var_val, &len, &vp->type, |
| (struct counter64 *) vp->val. |
| counter64, vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| #ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES |
| case ASN_OPAQUE_FLOAT: |
| vp->val.floatVal = (float *) vp->buf; |
| vp->val_len = sizeof(float); |
| p = asn_parse_float(var_val, &len, &vp->type, |
| vp->val.floatVal, vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| case ASN_OPAQUE_DOUBLE: |
| vp->val.doubleVal = (double *) vp->buf; |
| vp->val_len = sizeof(double); |
| p = asn_parse_double(var_val, &len, &vp->type, |
| vp->val.doubleVal, vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| case ASN_OPAQUE_I64: |
| vp->val.counter64 = (struct counter64 *) vp->buf; |
| vp->val_len = sizeof(struct counter64); |
| p = asn_parse_signed_int64(var_val, &len, &vp->type, |
| (struct counter64 *) vp->val.counter64, |
| sizeof(*vp->val.counter64)); |
| |
| if (!p) |
| return -1; |
| break; |
| #endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */ |
| case ASN_IPADDRESS: |
| if (vp->val_len != 4) |
| return -1; |
| /* fallthrough */ |
| case ASN_OCTET_STR: |
| case ASN_OPAQUE: |
| case ASN_NSAP: |
| if (vp->val_len < sizeof(vp->buf)) { |
| vp->val.string = (u_char *) vp->buf; |
| } else { |
| vp->val.string = (u_char *) malloc(vp->val_len); |
| } |
| if (vp->val.string == NULL) { |
| return -1; |
| } |
| p = asn_parse_string(var_val, &len, &vp->type, vp->val.string, |
| &vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| case ASN_OBJECT_ID: |
| vp->val_len = MAX_OID_LEN; |
| p = asn_parse_objid(var_val, &len, &vp->type, objid, &vp->val_len); |
| if (!p) |
| return -1; |
| vp->val_len *= sizeof(oid); |
| vp->val.objid = (oid *) malloc(vp->val_len); |
| if (vp->val.objid == NULL) { |
| return -1; |
| } |
| memmove(vp->val.objid, objid, vp->val_len); |
| break; |
| case SNMP_NOSUCHOBJECT: |
| case SNMP_NOSUCHINSTANCE: |
| case SNMP_ENDOFMIBVIEW: |
| case ASN_NULL: |
| break; |
| case ASN_BIT_STR: |
| vp->val.bitstring = (u_char *) malloc(vp->val_len); |
| if (vp->val.bitstring == NULL) { |
| return -1; |
| } |
| p = asn_parse_bitstring(var_val, &len, &vp->type, |
| vp->val.bitstring, &vp->val_len); |
| if (!p) |
| return -1; |
| break; |
| default: |
| snmp_log(LOG_ERR, "bad type returned (%x)\n", vp->type); |
| badtype = -1; |
| break; |
| } |
| DEBUGINDENTADD(-4); |
| } |
| return badtype; |
| } |
| |
| /* |
| * snmp v3 utility function to parse into the scopedPdu. stores contextName |
| * and contextEngineID in pdu struct. Also stores pdu->command (handy for |
| * Report generation). |
| * |
| * returns pointer to begining of PDU or NULL on error. |
| */ |
| u_char * |
| snmpv3_scopedPDU_parse(netsnmp_pdu *pdu, u_char * cp, size_t * length) |
| { |
| u_char tmp_buf[SNMP_MAX_MSG_SIZE]; |
| size_t tmp_buf_len; |
| u_char type; |
| size_t asn_len; |
| u_char *data; |
| |
| pdu->command = 0; /* initialize so we know if it got parsed */ |
| asn_len = *length; |
| data = asn_parse_sequence(cp, &asn_len, &type, |
| (ASN_SEQUENCE | ASN_CONSTRUCTOR), |
| "plaintext scopedPDU"); |
| if (data == NULL) { |
| return NULL; |
| } |
| *length -= data - cp; |
| |
| /* |
| * contextEngineID from scopedPdu |
| */ |
| DEBUGDUMPHEADER("recv", "contextEngineID"); |
| data = asn_parse_string(data, length, &type, pdu->contextEngineID, |
| &pdu->contextEngineIDLen); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| ERROR_MSG("error parsing contextEngineID from scopedPdu"); |
| return NULL; |
| } |
| |
| /* |
| * parse contextName from scopedPdu |
| */ |
| tmp_buf_len = SNMP_MAX_CONTEXT_SIZE; |
| DEBUGDUMPHEADER("recv", "contextName"); |
| data = asn_parse_string(data, length, &type, tmp_buf, &tmp_buf_len); |
| DEBUGINDENTLESS(); |
| if (data == NULL) { |
| ERROR_MSG("error parsing contextName from scopedPdu"); |
| return NULL; |
| } |
| |
| if (tmp_buf_len) { |
| pdu->contextName = (char *) malloc(tmp_buf_len); |
| memmove(pdu->contextName, tmp_buf, tmp_buf_len); |
| pdu->contextNameLen = tmp_buf_len; |
| } else { |
| pdu->contextName = strdup(""); |
| pdu->contextNameLen = 0; |
| } |
| if (pdu->contextName == NULL) { |
| ERROR_MSG("error copying contextName from scopedPdu"); |
| return NULL; |
| } |
| |
| /* |
| * Get the PDU type |
| */ |
| asn_len = *length; |
| cp = asn_parse_header(data, &asn_len, &type); |
| if (cp == NULL) |
| return NULL; |
| |
| pdu->command = type; |
| |
| return data; |
| } |
| |
| /* |
| * These functions send PDUs using an active session: |
| * snmp_send - traditional API, no callback |
| * snmp_async_send - traditional API, with callback |
| * snmp_sess_send - single session API, no callback |
| * snmp_sess_async_send - single session API, with callback |
| * |
| * Call snmp_build to create a serialized packet (the pdu). |
| * If necessary, set some of the pdu data from the |
| * session defaults. |
| * If there is an expected response for this PDU, |
| * queue a corresponding request on the list |
| * of outstanding requests for this session, |
| * and store the callback vectors in the request. |
| * |
| * Send the pdu to the target identified by this session. |
| * Return on success: |
| * The request id of the pdu is returned, and the pdu is freed. |
| * Return on failure: |
| * Zero (0) is returned. |
| * The caller must call snmp_free_pdu if 0 is returned. |
| */ |
| int |
| snmp_send(netsnmp_session * session, netsnmp_pdu *pdu) |
| { |
| return snmp_async_send(session, pdu, NULL, NULL); |
| } |
| |
| int |
| snmp_sess_send(void *sessp, netsnmp_pdu *pdu) |
| { |
| return snmp_sess_async_send(sessp, pdu, NULL, NULL); |
| } |
| |
| int |
| snmp_async_send(netsnmp_session * session, |
| netsnmp_pdu *pdu, snmp_callback callback, void *cb_data) |
| { |
| void *sessp = snmp_sess_pointer(session); |
| return snmp_sess_async_send(sessp, pdu, callback, cb_data); |
| } |
| |
| static int |
| _sess_async_send(void *sessp, |
| netsnmp_pdu *pdu, snmp_callback callback, void *cb_data) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| netsnmp_session *session; |
| struct snmp_internal_session *isp; |
| netsnmp_transport *transport = NULL; |
| u_char *pktbuf = NULL, *packet = NULL; |
| size_t pktbuf_len = 0, offset = 0, length = 0; |
| int result; |
| long reqid; |
| |
| if (slp == NULL) { |
| return 0; |
| } else { |
| session = slp->session; |
| isp = slp->internal; |
| transport = slp->transport; |
| if (!session || !isp || !transport) { |
| DEBUGMSGTL(("sess_async_send", "send fail: closing...\n")); |
| return 0; |
| } |
| } |
| |
| if (pdu == NULL) { |
| session->s_snmp_errno = SNMPERR_NULL_PDU; |
| return 0; |
| } |
| |
| session->s_snmp_errno = 0; |
| session->s_errno = 0; |
| |
| /* |
| * Check/setup the version. |
| */ |
| if (pdu->version == SNMP_DEFAULT_VERSION) { |
| if (session->version == SNMP_DEFAULT_VERSION) { |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| return 0; |
| } |
| pdu->version = session->version; |
| } else if (session->version == SNMP_DEFAULT_VERSION) { |
| /* |
| * It's OK |
| */ |
| } else if (pdu->version != session->version) { |
| /* |
| * ENHANCE: we should support multi-lingual sessions |
| */ |
| session->s_snmp_errno = SNMPERR_BAD_VERSION; |
| return 0; |
| } |
| |
| /* |
| * do we expect a response? |
| */ |
| switch (pdu->command) { |
| |
| case SNMP_MSG_RESPONSE: |
| case SNMP_MSG_TRAP: |
| case SNMP_MSG_TRAP2: |
| case SNMP_MSG_REPORT: |
| case AGENTX_MSG_CLEANUPSET: |
| case AGENTX_MSG_RESPONSE: |
| pdu->flags &= ~UCD_MSG_FLAG_EXPECT_RESPONSE; |
| break; |
| |
| default: |
| pdu->flags |= UCD_MSG_FLAG_EXPECT_RESPONSE; |
| break; |
| } |
| |
| /* |
| * check to see if we need a v3 engineID probe |
| */ |
| if ((pdu->version == SNMP_VERSION_3) && |
| (pdu->flags & UCD_MSG_FLAG_EXPECT_RESPONSE) && |
| (session->securityEngineIDLen == 0) && |
| (0 == (session->flags & SNMP_FLAGS_DONT_PROBE))) { |
| int rc; |
| DEBUGMSGTL(("snmpv3_build", "delayed probe for engineID\n")); |
| rc = snmpv3_engineID_probe(slp, session); |
| if (rc == 0) |
| return 0; /* s_snmp_errno already set */ |
| } |
| |
| if ((pktbuf = (u_char *)malloc(2048)) == NULL) { |
| DEBUGMSGTL(("sess_async_send", |
| "couldn't malloc initial packet buffer\n")); |
| session->s_snmp_errno = SNMPERR_MALLOC; |
| return 0; |
| } else { |
| pktbuf_len = 2048; |
| } |
| |
| #if TEMPORARILY_DISABLED |
| /* |
| * NULL variable are allowed in certain PDU types. |
| * In particular, SNMPv3 engineID probes are of this form. |
| * There is an internal PDU flag to indicate that this |
| * is acceptable, but until the construction of engineID |
| * probes can be amended to set this flag, we'll simply |
| * skip this test altogether. |
| */ |
| if (pdu->variables == NULL) { |
| switch (pdu->command) { |
| #ifndef NETSNMP_NO_WRITE_SUPPORT |
| case SNMP_MSG_SET: |
| #endif /* !NETSNMP_NO_WRITE_SUPPORT */ |
| case SNMP_MSG_GET: |
| case SNMP_MSG_GETNEXT: |
| case SNMP_MSG_GETBULK: |
| case SNMP_MSG_RESPONSE: |
| case SNMP_MSG_TRAP2: |
| case SNMP_MSG_REPORT: |
| case SNMP_MSG_INFORM: |
| session->s_snmp_errno = snmp_errno = SNMPERR_NO_VARS; |
| return 0; |
| case SNMP_MSG_TRAP: |
| break; |
| } |
| } |
| #endif |
| |
| |
| /* |
| * Build the message to send. |
| */ |
| if (isp->hook_realloc_build) { |
| result = isp->hook_realloc_build(session, pdu, |
| &pktbuf, &pktbuf_len, &offset); |
| packet = pktbuf; |
| length = offset; |
| } else if (isp->hook_build) { |
| packet = pktbuf; |
| length = pktbuf_len; |
| result = isp->hook_build(session, pdu, pktbuf, &length); |
| } else { |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_REVERSE_ENCODE)) { |
| result = |
| snmp_build(&pktbuf, &pktbuf_len, &offset, session, pdu); |
| packet = pktbuf + pktbuf_len - offset; |
| length = offset; |
| } else { |
| #endif |
| packet = pktbuf; |
| length = pktbuf_len; |
| result = snmp_build(&pktbuf, &length, &offset, session, pdu); |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| } |
| #endif |
| } |
| |
| if (result < 0) { |
| DEBUGMSGTL(("sess_async_send", "encoding failure\n")); |
| SNMP_FREE(pktbuf); |
| return 0; |
| } |
| |
| /* |
| * Make sure we don't send something that is bigger than the msgMaxSize |
| * specified in the received PDU. |
| */ |
| |
| if (session->sndMsgMaxSize != 0 && length > session->sndMsgMaxSize) { |
| DEBUGMSGTL(("sess_async_send", |
| "length of packet (%lu) exceeds session maximum (%lu)\n", |
| (unsigned long)length, (unsigned long)session->sndMsgMaxSize)); |
| session->s_snmp_errno = SNMPERR_TOO_LONG; |
| SNMP_FREE(pktbuf); |
| return 0; |
| } |
| |
| /* |
| * Check that the underlying transport is capable of sending a packet as |
| * large as length. |
| */ |
| |
| if (transport->msgMaxSize != 0 && length > transport->msgMaxSize) { |
| DEBUGMSGTL(("sess_async_send", |
| "length of packet (%lu) exceeds transport maximum (%lu)\n", |
| (unsigned long)length, (unsigned long)transport->msgMaxSize)); |
| session->s_snmp_errno = SNMPERR_TOO_LONG; |
| SNMP_FREE(pktbuf); |
| return 0; |
| } |
| |
| /* |
| * Send the message. |
| */ |
| |
| DEBUGMSGTL(("sess_process_packet", "sending message id#%ld reqid#%ld len %" |
| NETSNMP_PRIz "u\n", pdu->msgid, pdu->reqid, length)); |
| result = netsnmp_transport_send(transport, packet, length, |
| &(pdu->transport_data), |
| &(pdu->transport_data_length)); |
| |
| SNMP_FREE(pktbuf); |
| |
| if (result < 0) { |
| session->s_snmp_errno = SNMPERR_BAD_SENDTO; |
| session->s_errno = errno; |
| return 0; |
| } |
| |
| reqid = pdu->reqid; |
| |
| /* |
| * Add to pending requests list if we expect a response. |
| */ |
| if (pdu->flags & UCD_MSG_FLAG_EXPECT_RESPONSE) { |
| netsnmp_request_list *rp; |
| struct timeval tv; |
| |
| rp = (netsnmp_request_list *) calloc(1, |
| sizeof(netsnmp_request_list)); |
| if (rp == NULL) { |
| session->s_snmp_errno = SNMPERR_GENERR; |
| return 0; |
| } |
| |
| netsnmp_get_monotonic_clock(&tv); |
| rp->pdu = pdu; |
| rp->request_id = pdu->reqid; |
| rp->message_id = pdu->msgid; |
| rp->callback = callback; |
| rp->cb_data = cb_data; |
| rp->retries = 0; |
| if (pdu->flags & UCD_MSG_FLAG_PDU_TIMEOUT) { |
| rp->timeout = pdu->time * 1000000L; |
| } else { |
| rp->timeout = session->timeout; |
| } |
| rp->timeM = tv; |
| tv.tv_usec += rp->timeout; |
| tv.tv_sec += tv.tv_usec / 1000000L; |
| tv.tv_usec %= 1000000L; |
| rp->expireM = tv; |
| |
| /* |
| * XX lock should be per session ! |
| */ |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| if (isp->requestsEnd) { |
| rp->next_request = isp->requestsEnd->next_request; |
| isp->requestsEnd->next_request = rp; |
| isp->requestsEnd = rp; |
| } else { |
| rp->next_request = isp->requests; |
| isp->requests = rp; |
| isp->requestsEnd = rp; |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| } else { |
| /* |
| * No response expected... |
| */ |
| if (reqid) { |
| /* |
| * Free v1 or v2 TRAP PDU iff no error |
| */ |
| snmp_free_pdu(pdu); |
| } |
| } |
| |
| return reqid; |
| } |
| |
| int |
| snmp_sess_async_send(void *sessp, |
| netsnmp_pdu *pdu, |
| snmp_callback callback, void *cb_data) |
| { |
| int rc; |
| |
| if (sessp == NULL) { |
| snmp_errno = SNMPERR_BAD_SESSION; /*MTCRITICAL_RESOURCE */ |
| return (0); |
| } |
| /* |
| * send pdu |
| */ |
| rc = _sess_async_send(sessp, pdu, callback, cb_data); |
| if (rc == 0) { |
| struct session_list *psl; |
| netsnmp_session *pss; |
| psl = (struct session_list *) sessp; |
| pss = psl->session; |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| } |
| return rc; |
| } |
| |
| |
| /* |
| * Frees the variable and any malloc'd data associated with it. |
| */ |
| void |
| snmp_free_var_internals(netsnmp_variable_list * var) |
| { |
| if (!var) |
| return; |
| |
| if (var->name != var->name_loc) |
| SNMP_FREE(var->name); |
| if (var->val.string != var->buf) |
| SNMP_FREE(var->val.string); |
| if (var->data) { |
| if (var->dataFreeHook) { |
| var->dataFreeHook(var->data); |
| var->data = NULL; |
| } else { |
| SNMP_FREE(var->data); |
| } |
| } |
| } |
| |
| void |
| snmp_free_var(netsnmp_variable_list * var) |
| { |
| snmp_free_var_internals(var); |
| free((char *) var); |
| } |
| |
| void |
| snmp_free_varbind(netsnmp_variable_list * var) |
| { |
| netsnmp_variable_list *ptr; |
| while (var) { |
| ptr = var->next_variable; |
| snmp_free_var(var); |
| var = ptr; |
| } |
| } |
| |
| /* |
| * Frees the pdu and any malloc'd data associated with it. |
| */ |
| void |
| snmp_free_pdu(netsnmp_pdu *pdu) |
| { |
| struct snmp_secmod_def *sptr; |
| |
| if (!pdu) |
| return; |
| |
| /* |
| * If the command field is empty, that probably indicates |
| * that this PDU structure has already been freed. |
| * Log a warning and return (rather than freeing things again) |
| * |
| * Note that this does not pick up dual-frees where the |
| * memory is set to random junk, which is probably more serious. |
| * |
| * rks: while this is a good idea, there are two problems. |
| * 1) agentx sets command to 0 in some cases |
| * 2) according to Wes, a bad decode of a v3 message could |
| * result in a 0 at this offset. |
| * so I'm commenting it out until a better solution is found. |
| * note that I'm leaving the memset, below.... |
| * |
| if (pdu->command == 0) { |
| snmp_log(LOG_WARNING, "snmp_free_pdu probably called twice\n"); |
| return; |
| } |
| */ |
| if ((sptr = find_sec_mod(pdu->securityModel)) != NULL && |
| sptr->pdu_free != NULL) { |
| (*sptr->pdu_free) (pdu); |
| } |
| snmp_free_varbind(pdu->variables); |
| SNMP_FREE(pdu->enterprise); |
| SNMP_FREE(pdu->community); |
| SNMP_FREE(pdu->contextEngineID); |
| SNMP_FREE(pdu->securityEngineID); |
| SNMP_FREE(pdu->contextName); |
| SNMP_FREE(pdu->securityName); |
| SNMP_FREE(pdu->transport_data); |
| memset(pdu, 0, sizeof(netsnmp_pdu)); |
| free((char *) pdu); |
| } |
| |
| netsnmp_pdu * |
| snmp_create_sess_pdu(netsnmp_transport *transport, void *opaque, |
| size_t olength) |
| { |
| netsnmp_pdu *pdu = (netsnmp_pdu *)calloc(1, sizeof(netsnmp_pdu)); |
| if (pdu == NULL) { |
| DEBUGMSGTL(("sess_process_packet", "can't malloc space for PDU\n")); |
| return NULL; |
| } |
| |
| /* |
| * Save the transport-level data specific to this reception (e.g. UDP |
| * source address). |
| */ |
| |
| pdu->transport_data = opaque; |
| pdu->transport_data_length = olength; |
| pdu->tDomain = transport->domain; |
| pdu->tDomainLen = transport->domain_length; |
| return pdu; |
| } |
| |
| |
| /* |
| * This function processes a complete (according to asn_check_packet or the |
| * AgentX equivalent) packet, parsing it into a PDU and calling the relevant |
| * callbacks. On entry, packetptr points at the packet in the session's |
| * buffer and length is the length of the packet. |
| */ |
| |
| static int |
| _sess_process_packet(void *sessp, netsnmp_session * sp, |
| struct snmp_internal_session *isp, |
| netsnmp_transport *transport, |
| void *opaque, int olength, |
| u_char * packetptr, int length) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| netsnmp_pdu *pdu; |
| netsnmp_request_list *rp, *orp = NULL; |
| struct snmp_secmod_def *sptr; |
| int ret = 0, handled = 0; |
| |
| DEBUGMSGTL(("sess_process_packet", |
| "session %p fd %d pkt %p length %d\n", sessp, |
| transport->sock, packetptr, length)); |
| |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_DUMP_PACKET)) { |
| char *addrtxt = netsnmp_transport_peer_string(transport, opaque, olength); |
| snmp_log(LOG_DEBUG, "\nReceived %d byte packet from %s\n", |
| length, addrtxt); |
| SNMP_FREE(addrtxt); |
| xdump(packetptr, length, ""); |
| } |
| |
| /* |
| * Do transport-level filtering (e.g. IP-address based allow/deny). |
| */ |
| |
| if (isp->hook_pre) { |
| if (isp->hook_pre(sp, transport, opaque, olength) == 0) { |
| DEBUGMSGTL(("sess_process_packet", "pre-parse fail\n")); |
| SNMP_FREE(opaque); |
| return -1; |
| } |
| } |
| |
| if (isp->hook_create_pdu) { |
| pdu = isp->hook_create_pdu(transport, opaque, olength); |
| } else { |
| pdu = snmp_create_sess_pdu(transport, opaque, olength); |
| } |
| |
| if (pdu == NULL) { |
| snmp_log(LOG_ERR, "pdu failed to be created\n"); |
| SNMP_FREE(opaque); |
| return -1; |
| } |
| |
| /* if the transport was a magic tunnel, mark the PDU as having come |
| through one. */ |
| if (transport->flags & NETSNMP_TRANSPORT_FLAG_TUNNELED) { |
| pdu->flags |= UCD_MSG_FLAG_TUNNELED; |
| } |
| |
| if (isp->hook_parse) { |
| ret = isp->hook_parse(sp, pdu, packetptr, length); |
| } else { |
| ret = snmp_parse(sessp, sp, pdu, packetptr, length); |
| } |
| |
| DEBUGMSGTL(("sess_process_packet", "received message id#%ld reqid#%ld len " |
| "%u\n", pdu->msgid, pdu->reqid, length)); |
| |
| if (ret != SNMP_ERR_NOERROR) { |
| DEBUGMSGTL(("sess_process_packet", "parse fail\n")); |
| } |
| |
| if (isp->hook_post) { |
| if (isp->hook_post(sp, pdu, ret) == 0) { |
| DEBUGMSGTL(("sess_process_packet", "post-parse fail\n")); |
| ret = SNMPERR_ASN_PARSE_ERR; |
| } |
| } |
| |
| if (ret != SNMP_ERR_NOERROR) { |
| /* |
| * Call the security model to free any securityStateRef supplied w/ msg. |
| */ |
| if (pdu->securityStateRef != NULL) { |
| sptr = find_sec_mod(pdu->securityModel); |
| if (sptr != NULL) { |
| if (sptr->pdu_free_state_ref != NULL) { |
| (*sptr->pdu_free_state_ref) (pdu->securityStateRef); |
| } else { |
| snmp_log(LOG_ERR, |
| "Security Model %d can't free state references\n", |
| pdu->securityModel); |
| } |
| } else { |
| snmp_log(LOG_ERR, |
| "Can't find security model to free ptr: %d\n", |
| pdu->securityModel); |
| } |
| pdu->securityStateRef = NULL; |
| } |
| snmp_free_pdu(pdu); |
| return -1; |
| } |
| |
| if (pdu->flags & UCD_MSG_FLAG_RESPONSE_PDU) { |
| /* |
| * Call USM to free any securityStateRef supplied with the message. |
| */ |
| if (pdu->securityStateRef) { |
| sptr = find_sec_mod(pdu->securityModel); |
| if (sptr) { |
| if (sptr->pdu_free_state_ref) { |
| (*sptr->pdu_free_state_ref) (pdu->securityStateRef); |
| } else { |
| snmp_log(LOG_ERR, |
| "Security Model %d can't free state references\n", |
| pdu->securityModel); |
| } |
| } else { |
| snmp_log(LOG_ERR, |
| "Can't find security model to free ptr: %d\n", |
| pdu->securityModel); |
| } |
| pdu->securityStateRef = NULL; |
| } |
| |
| for (rp = isp->requests; rp; orp = rp, rp = rp->next_request) { |
| snmp_callback callback; |
| void *magic; |
| |
| if (pdu->version == SNMP_VERSION_3) { |
| /* |
| * msgId must match for v3 messages. |
| */ |
| if (rp->message_id != pdu->msgid) { |
| DEBUGMSGTL(("sess_process_packet", "unmatched msg id: %ld != %ld\n", |
| rp->message_id, pdu->msgid)); |
| continue; |
| } |
| |
| /* |
| * Check that message fields match original, if not, no further |
| * processing. |
| */ |
| if (!snmpv3_verify_msg(rp, pdu)) { |
| break; |
| } |
| } else { |
| if (rp->request_id != pdu->reqid) { |
| continue; |
| } |
| } |
| |
| if (rp->callback) { |
| callback = rp->callback; |
| magic = rp->cb_data; |
| } else { |
| callback = sp->callback; |
| magic = sp->callback_magic; |
| } |
| handled = 1; |
| |
| /* |
| * MTR snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); ?* XX lock |
| * should be per session ! |
| */ |
| |
| if (callback == NULL |
| || callback(NETSNMP_CALLBACK_OP_RECEIVED_MESSAGE, sp, |
| pdu->reqid, pdu, magic) == 1) { |
| if (pdu->command == SNMP_MSG_REPORT) { |
| if (sp->s_snmp_errno == SNMPERR_NOT_IN_TIME_WINDOW || |
| snmpv3_get_report_type(pdu) == |
| SNMPERR_NOT_IN_TIME_WINDOW) { |
| /* |
| * trigger immediate retry on recoverable Reports |
| * * (notInTimeWindow), incr_retries == TRUE to prevent |
| * * inifinite resend |
| */ |
| if (rp->retries <= sp->retries) { |
| snmp_resend_request(slp, rp, TRUE); |
| break; |
| } else { |
| /* We're done with retries, so no longer waiting for a response */ |
| ((struct synch_state*)magic)->waiting = 0; |
| } |
| } else { |
| if (SNMPV3_IGNORE_UNAUTH_REPORTS) { |
| break; |
| } else { /* Set the state to no longer be waiting, since we're done with retries */ |
| ((struct synch_state*)magic)->waiting = 0; |
| } |
| } |
| |
| /* |
| * Handle engineID discovery. |
| */ |
| if (!sp->securityEngineIDLen && pdu->securityEngineIDLen) { |
| sp->securityEngineID = |
| (u_char *) malloc(pdu->securityEngineIDLen); |
| if (sp->securityEngineID == NULL) { |
| /* |
| * TODO FIX: recover after message callback *? |
| */ |
| return -1; |
| } |
| memcpy(sp->securityEngineID, pdu->securityEngineID, |
| pdu->securityEngineIDLen); |
| sp->securityEngineIDLen = pdu->securityEngineIDLen; |
| if (!sp->contextEngineIDLen) { |
| sp->contextEngineID = |
| (u_char *) malloc(pdu-> |
| securityEngineIDLen); |
| if (sp->contextEngineID == NULL) { |
| /* |
| * TODO FIX: recover after message callback *? |
| */ |
| return -1; |
| } |
| memcpy(sp->contextEngineID, |
| pdu->securityEngineID, |
| pdu->securityEngineIDLen); |
| sp->contextEngineIDLen = |
| pdu->securityEngineIDLen; |
| } |
| } |
| } |
| |
| /* |
| * Successful, so delete request. |
| */ |
| if (orp) |
| orp->next_request = rp->next_request; |
| else |
| isp->requests = rp->next_request; |
| if (isp->requestsEnd == rp) |
| isp->requestsEnd = orp; |
| snmp_free_pdu(rp->pdu); |
| free(rp); |
| /* |
| * There shouldn't be any more requests with the same reqid. |
| */ |
| break; |
| } |
| /* |
| * MTR snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); ?* XX lock should be per session ! |
| */ |
| } |
| } else { |
| if (sp->callback) { |
| /* |
| * MTR snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| */ |
| handled = 1; |
| sp->callback(NETSNMP_CALLBACK_OP_RECEIVED_MESSAGE, |
| sp, pdu->reqid, pdu, sp->callback_magic); |
| /* |
| * MTR snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| */ |
| } |
| } |
| |
| /* |
| * Call USM to free any securityStateRef supplied with the message. |
| */ |
| if (pdu != NULL && pdu->securityStateRef && |
| pdu->command == SNMP_MSG_TRAP2) { |
| sptr = find_sec_mod(pdu->securityModel); |
| if (sptr) { |
| if (sptr->pdu_free_state_ref) { |
| (*sptr->pdu_free_state_ref) (pdu->securityStateRef); |
| } else { |
| snmp_log(LOG_ERR, |
| "Security Model %d can't free state references\n", |
| pdu->securityModel); |
| } |
| } else { |
| snmp_log(LOG_ERR, |
| "Can't find security model to free ptr: %d\n", |
| pdu->securityModel); |
| } |
| pdu->securityStateRef = NULL; |
| } |
| |
| if (!handled) { |
| snmp_increment_statistic(STAT_SNMPUNKNOWNPDUHANDLERS); |
| DEBUGMSGTL(("sess_process_packet", "unhandled PDU\n")); |
| } |
| |
| snmp_free_pdu(pdu); |
| return 0; |
| } |
| |
| /* |
| * Checks to see if any of the fd's set in the fdset belong to |
| * snmp. Each socket with it's fd set has a packet read from it |
| * and snmp_parse is called on the packet received. The resulting pdu |
| * is passed to the callback routine for that session. If the callback |
| * routine returns successfully, the pdu and it's request are deleted. |
| */ |
| void |
| snmp_read(fd_set * fdset) |
| { |
| netsnmp_large_fd_set lfdset; |
| |
| netsnmp_large_fd_set_init(&lfdset, FD_SETSIZE); |
| netsnmp_copy_fd_set_to_large_fd_set(&lfdset, fdset); |
| snmp_read2(&lfdset); |
| netsnmp_large_fd_set_cleanup(&lfdset); |
| } |
| |
| void |
| snmp_read2(netsnmp_large_fd_set * fdset) |
| { |
| struct session_list *slp; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| for (slp = Sessions; slp; slp = slp->next) { |
| snmp_sess_read2((void *) slp, fdset); |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| } |
| |
| /* |
| * Same as snmp_read, but works just one session. |
| * returns 0 if success, -1 if fail |
| * MTR: can't lock here and at snmp_read |
| * Beware recursive send maybe inside snmp_read callback function. |
| */ |
| int |
| _sess_read(void *sessp, netsnmp_large_fd_set * fdset) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| netsnmp_session *sp = slp ? slp->session : NULL; |
| struct snmp_internal_session *isp = slp ? slp->internal : NULL; |
| netsnmp_transport *transport = slp ? slp->transport : NULL; |
| size_t pdulen = 0, rxbuf_len = 65536; |
| u_char *rxbuf = NULL; |
| int length = 0, olength = 0, rc = 0; |
| void *opaque = NULL; |
| |
| if (!sp || !isp || !transport) { |
| DEBUGMSGTL(("sess_read", "read fail: closing...\n")); |
| return 0; |
| } |
| |
| /* to avoid subagent crash */ |
| if (transport->sock < 0) { |
| snmp_log (LOG_INFO, "transport->sock got negative fd value %d\n", transport->sock); |
| return 0; |
| } |
| |
| if (!fdset || !(NETSNMP_LARGE_FD_ISSET(transport->sock, fdset))) { |
| DEBUGMSGTL(("sess_read", "not reading %d (fdset %p set %d)\n", |
| transport->sock, fdset, |
| fdset ? NETSNMP_LARGE_FD_ISSET(transport->sock, fdset) |
| : -9)); |
| return 0; |
| } |
| |
| sp->s_snmp_errno = 0; |
| sp->s_errno = 0; |
| |
| if (transport->flags & NETSNMP_TRANSPORT_FLAG_LISTEN) { |
| int data_sock = transport->f_accept(transport); |
| |
| if (data_sock >= 0) { |
| /* |
| * We've successfully accepted a new stream-based connection. |
| * It's not too clear what should happen here if we are using the |
| * single-session API at this point. Basically a "session |
| * accepted" callback is probably needed to hand the new session |
| * over to the application. |
| * |
| * However, for now, as in the original snmp_api, we will ASSUME |
| * that we're using the traditional API, and simply add the new |
| * session to the list. Note we don't have to get the Session |
| * list lock here, because under that assumption we already hold |
| * it (this is also why we don't just use snmp_add). |
| * |
| * The moral of the story is: don't use listening stream-based |
| * transports in a multi-threaded environment because something |
| * will go HORRIBLY wrong (and also that SNMP/TCP is not trivial). |
| * |
| * Another open issue: what should happen to sockets that have |
| * been accept()ed from a listening socket when that original |
| * socket is closed? If they are left open, then attempting to |
| * re-open the listening socket will fail, which is semantically |
| * confusing. Perhaps there should be some kind of chaining in |
| * the transport structure so that they can all be closed. |
| * Discuss. ;-) |
| */ |
| |
| netsnmp_transport *new_transport=netsnmp_transport_copy(transport); |
| if (new_transport != NULL) { |
| struct session_list *nslp = NULL; |
| |
| new_transport->sock = data_sock; |
| new_transport->flags &= ~NETSNMP_TRANSPORT_FLAG_LISTEN; |
| |
| nslp = (struct session_list *)snmp_sess_add_ex(sp, |
| new_transport, isp->hook_pre, isp->hook_parse, |
| isp->hook_post, isp->hook_build, |
| isp->hook_realloc_build, isp->check_packet, |
| isp->hook_create_pdu); |
| |
| if (nslp != NULL) { |
| nslp->next = Sessions; |
| Sessions = nslp; |
| /* |
| * Tell the new session about its existance if possible. |
| */ |
| DEBUGMSGTL(("sess_read", |
| "perform callback with op=CONNECT\n")); |
| (void)nslp->session->callback(NETSNMP_CALLBACK_OP_CONNECT, |
| nslp->session, 0, NULL, |
| sp->callback_magic); |
| } |
| return 0; |
| } else { |
| sp->s_snmp_errno = SNMPERR_MALLOC; |
| sp->s_errno = errno; |
| snmp_set_detail(strerror(errno)); |
| return -1; |
| } |
| } else { |
| sp->s_snmp_errno = SNMPERR_BAD_RECVFROM; |
| sp->s_errno = errno; |
| snmp_set_detail(strerror(errno)); |
| return -1; |
| } |
| } |
| |
| /* |
| * Work out where to receive the data to. |
| */ |
| |
| if (transport->flags & NETSNMP_TRANSPORT_FLAG_STREAM) { |
| if (isp->packet == NULL) { |
| /* |
| * We have no saved packet. Allocate one. |
| */ |
| if ((isp->packet = (u_char *) malloc(rxbuf_len)) == NULL) { |
| DEBUGMSGTL(("sess_read", "can't malloc %" NETSNMP_PRIz |
| "u bytes for rxbuf\n", rxbuf_len)); |
| return 0; |
| } else { |
| rxbuf = isp->packet; |
| isp->packet_size = rxbuf_len; |
| isp->packet_len = 0; |
| } |
| } else { |
| /* |
| * We have saved a partial packet from last time. Extend that, if |
| * necessary, and receive new data after the old data. |
| */ |
| u_char *newbuf; |
| |
| if (isp->packet_size < isp->packet_len + rxbuf_len) { |
| newbuf = |
| (u_char *) realloc(isp->packet, |
| isp->packet_len + rxbuf_len); |
| if (newbuf == NULL) { |
| DEBUGMSGTL(("sess_read", |
| "can't malloc %" NETSNMP_PRIz |
| "u more for rxbuf (%" NETSNMP_PRIz "u tot)\n", |
| rxbuf_len, isp->packet_len + rxbuf_len)); |
| return 0; |
| } else { |
| isp->packet = newbuf; |
| isp->packet_size = isp->packet_len + rxbuf_len; |
| rxbuf = isp->packet + isp->packet_len; |
| } |
| } else { |
| rxbuf = isp->packet + isp->packet_len; |
| rxbuf_len = isp->packet_size - isp->packet_len; |
| } |
| } |
| } else { |
| if ((rxbuf = (u_char *) malloc(rxbuf_len)) == NULL) { |
| DEBUGMSGTL(("sess_read", "can't malloc %" NETSNMP_PRIz |
| "u bytes for rxbuf\n", rxbuf_len)); |
| return 0; |
| } |
| } |
| |
| length = netsnmp_transport_recv(transport, rxbuf, rxbuf_len, &opaque, |
| &olength); |
| |
| if (length == -1 && !(transport->flags & NETSNMP_TRANSPORT_FLAG_STREAM)) { |
| sp->s_snmp_errno = SNMPERR_BAD_RECVFROM; |
| sp->s_errno = errno; |
| snmp_set_detail(strerror(errno)); |
| SNMP_FREE(rxbuf); |
| SNMP_FREE(opaque); |
| return -1; |
| } |
| |
| if (0 == length && transport->flags & NETSNMP_TRANSPORT_FLAG_EMPTY_PKT) { |
| /* this allows for a transport that needs to return from |
| * packet processing that doesn't necessarily have any |
| * consumable data in it. */ |
| |
| /* reset the flag since it's a per-message flag */ |
| transport->flags &= (~NETSNMP_TRANSPORT_FLAG_EMPTY_PKT); |
| |
| return 0; |
| } |
| |
| /* |
| * Remote end closed connection. |
| */ |
| |
| if (length <= 0 && transport->flags & NETSNMP_TRANSPORT_FLAG_STREAM) { |
| /* |
| * Alert the application if possible. |
| */ |
| if (sp->callback != NULL) { |
| DEBUGMSGTL(("sess_read", "perform callback with op=DISCONNECT\n")); |
| (void) sp->callback(NETSNMP_CALLBACK_OP_DISCONNECT, sp, 0, |
| NULL, sp->callback_magic); |
| } |
| /* |
| * Close socket and mark session for deletion. |
| */ |
| DEBUGMSGTL(("sess_read", "fd %d closed\n", transport->sock)); |
| transport->f_close(transport); |
| SNMP_FREE(isp->packet); |
| SNMP_FREE(opaque); |
| return -1; |
| } |
| |
| if (transport->flags & NETSNMP_TRANSPORT_FLAG_STREAM) { |
| u_char *pptr = isp->packet; |
| void *ocopy = NULL; |
| |
| isp->packet_len += length; |
| |
| while (isp->packet_len > 0) { |
| |
| /* |
| * Get the total data length we're expecting (and need to wait |
| * for). |
| */ |
| if (isp->check_packet) { |
| pdulen = isp->check_packet(pptr, isp->packet_len); |
| } else { |
| pdulen = asn_check_packet(pptr, isp->packet_len); |
| } |
| |
| DEBUGMSGTL(("sess_read", |
| " loop packet_len %" NETSNMP_PRIz "u, PDU length %" |
| NETSNMP_PRIz "u\n", isp->packet_len, pdulen)); |
| |
| if (pdulen > MAX_PACKET_LENGTH) { |
| /* |
| * Illegal length, drop the connection. |
| */ |
| snmp_log(LOG_ERR, |
| "Received broken packet. Closing session.\n"); |
| if (sp->callback != NULL) { |
| DEBUGMSGTL(("sess_read", |
| "perform callback with op=DISCONNECT\n")); |
| (void)sp->callback(NETSNMP_CALLBACK_OP_DISCONNECT, |
| sp, 0, NULL, sp->callback_magic); |
| } |
| DEBUGMSGTL(("sess_read", "fd %d closed\n", transport->sock)); |
| transport->f_close(transport); |
| SNMP_FREE(opaque); |
| /** XXX-rks: why no SNMP_FREE(isp->packet); ?? */ |
| return -1; |
| } |
| |
| if (pdulen > isp->packet_len || pdulen == 0) { |
| /* |
| * We don't have a complete packet yet. If we've already |
| * processed a packet, break out so we'll shift this packet |
| * to the start of the buffer. If we're already at the |
| * start, simply return and wait for more data to arrive. |
| */ |
| DEBUGMSGTL(("sess_read", |
| "pkt not complete (need %" NETSNMP_PRIz "u got %" |
| NETSNMP_PRIz "u so far)\n", pdulen, |
| isp->packet_len)); |
| |
| if (pptr != isp->packet) |
| break; /* opaque freed for us outside of loop. */ |
| |
| SNMP_FREE(opaque); |
| return 0; |
| } |
| |
| /* We have *at least* one complete packet in the buffer now. If |
| we have possibly more than one packet, we must copy the opaque |
| pointer because we may need to reuse it for a later packet. */ |
| |
| if (pdulen < isp->packet_len) { |
| if (olength > 0 && opaque != NULL) { |
| ocopy = malloc(olength); |
| if (ocopy != NULL) { |
| memcpy(ocopy, opaque, olength); |
| } |
| } |
| } else if (pdulen == isp->packet_len) { |
| /* Common case -- exactly one packet. No need to copy the |
| opaque pointer. */ |
| ocopy = opaque; |
| opaque = NULL; |
| } |
| |
| if ((rc = _sess_process_packet(sessp, sp, isp, transport, |
| ocopy, ocopy?olength:0, pptr, |
| pdulen))) { |
| /* |
| * Something went wrong while processing this packet -- set the |
| * errno. |
| */ |
| if (sp->s_snmp_errno != 0) { |
| SET_SNMP_ERROR(sp->s_snmp_errno); |
| } |
| } |
| |
| /* ocopy has been free()d by _sess_process_packet by this point, |
| so set it to NULL. */ |
| |
| ocopy = NULL; |
| |
| /* Step past the packet we've just dealt with. */ |
| |
| pptr += pdulen; |
| isp->packet_len -= pdulen; |
| } |
| |
| /* If we had more than one packet, then we were working with copies |
| of the opaque pointer, so we still need to free() the opaque |
| pointer itself. */ |
| |
| SNMP_FREE(opaque); |
| |
| if (isp->packet_len >= MAXIMUM_PACKET_SIZE) { |
| /* |
| * Obviously this should never happen! |
| */ |
| snmp_log(LOG_ERR, |
| "too large packet_len = %" NETSNMP_PRIz |
| "u, dropping connection %d\n", |
| isp->packet_len, transport->sock); |
| transport->f_close(transport); |
| /** XXX-rks: why no SNMP_FREE(isp->packet); ?? */ |
| return -1; |
| } else if (isp->packet_len == 0) { |
| /* |
| * This is good: it means the packet buffer contained an integral |
| * number of PDUs, so we don't have to save any data for next |
| * time. We can free() the buffer now to keep the memory |
| * footprint down. |
| */ |
| SNMP_FREE(isp->packet); |
| isp->packet_size = 0; |
| isp->packet_len = 0; |
| return rc; |
| } |
| |
| /* |
| * If we get here, then there is a partial packet of length |
| * isp->packet_len bytes starting at pptr left over. Move that to the |
| * start of the buffer, and then realloc() the buffer down to size to |
| * reduce the memory footprint. |
| */ |
| |
| memmove(isp->packet, pptr, isp->packet_len); |
| DEBUGMSGTL(("sess_read", |
| "end: memmove(%p, %p, %" NETSNMP_PRIz "u); realloc(%p, %" |
| NETSNMP_PRIz "u)\n", |
| isp->packet, pptr, isp->packet_len, |
| isp->packet, isp->packet_len)); |
| |
| if ((rxbuf = (u_char *)realloc(isp->packet, isp->packet_len)) == NULL) { |
| /* |
| * I don't see why this should ever fail, but it's not a big deal. |
| */ |
| DEBUGMSGTL(("sess_read", "realloc() failed\n")); |
| } else { |
| DEBUGMSGTL(("sess_read", "realloc() okay, old buffer %p, new %p\n", |
| isp->packet, rxbuf)); |
| isp->packet = rxbuf; |
| isp->packet_size = isp->packet_len; |
| } |
| return rc; |
| } else { |
| rc = _sess_process_packet(sessp, sp, isp, transport, opaque, |
| olength, rxbuf, length); |
| SNMP_FREE(rxbuf); |
| return rc; |
| } |
| } |
| |
| |
| |
| /* |
| * returns 0 if success, -1 if fail |
| */ |
| int |
| snmp_sess_read(void *sessp, fd_set * fdset) |
| { |
| int rc; |
| netsnmp_large_fd_set lfdset; |
| |
| netsnmp_large_fd_set_init(&lfdset, FD_SETSIZE); |
| netsnmp_copy_fd_set_to_large_fd_set(&lfdset, fdset); |
| rc = snmp_sess_read2(sessp, &lfdset); |
| netsnmp_large_fd_set_cleanup(&lfdset); |
| return rc; |
| } |
| |
| int |
| snmp_sess_read2(void *sessp, netsnmp_large_fd_set * fdset) |
| { |
| struct session_list *psl; |
| netsnmp_session *pss; |
| int rc; |
| |
| rc = _sess_read(sessp, fdset); |
| psl = (struct session_list *) sessp; |
| pss = psl->session; |
| if (rc && pss->s_snmp_errno) { |
| SET_SNMP_ERROR(pss->s_snmp_errno); |
| } |
| return rc; |
| } |
| |
| |
| /** |
| * Returns info about what snmp requires from a select statement. |
| * numfds is the number of fds in the list that are significant. |
| * All file descriptors opened for SNMP are OR'd into the fdset. |
| * If activity occurs on any of these file descriptors, snmp_read |
| * should be called with that file descriptor set |
| * |
| * The timeout is the latest time that SNMP can wait for a timeout. The |
| * select should be done with the minimum time between timeout and any other |
| * timeouts necessary. This should be checked upon each invocation of select. |
| * If a timeout is received, snmp_timeout should be called to check if the |
| * timeout was for SNMP. (snmp_timeout is idempotent) |
| * |
| * The value of block indicates how the timeout value is interpreted. |
| * If block is true on input, the timeout value will be treated as undefined, |
| * but it must be available for setting in snmp_select_info. On return, |
| * block is set to true if the value returned for timeout is undefined; |
| * when block is set to false, timeout may be used as a parmeter to 'select'. |
| * |
| * snmp_select_info returns the number of open sockets. (i.e. The number of |
| * sessions open) |
| * |
| * @see See also snmp_sess_select_info2_flags(). |
| */ |
| int |
| snmp_select_info(int *numfds, fd_set *fdset, struct timeval *timeout, |
| int *block) |
| { |
| return snmp_sess_select_info(NULL, numfds, fdset, timeout, block); |
| } |
| |
| /** |
| * @see See also snmp_sess_select_info2_flags(). |
| */ |
| int |
| snmp_select_info2(int *numfds, netsnmp_large_fd_set *fdset, |
| struct timeval *timeout, int *block) |
| { |
| return snmp_sess_select_info2(NULL, numfds, fdset, timeout, block); |
| } |
| |
| /** |
| * @see See also snmp_sess_select_info2_flags(). |
| */ |
| int |
| snmp_sess_select_info(void *sessp, int *numfds, fd_set *fdset, |
| struct timeval *timeout, int *block) |
| { |
| return snmp_sess_select_info_flags(sessp, numfds, fdset, timeout, block, |
| NETSNMP_SELECT_NOFLAGS); |
| } |
| |
| /** |
| * @see See also snmp_sess_select_info2_flags(). |
| */ |
| int |
| snmp_sess_select_info_flags(void *sessp, int *numfds, fd_set *fdset, |
| struct timeval *timeout, int *block, int flags) |
| { |
| int rc; |
| netsnmp_large_fd_set lfdset; |
| |
| netsnmp_large_fd_set_init(&lfdset, FD_SETSIZE); |
| netsnmp_copy_fd_set_to_large_fd_set(&lfdset, fdset); |
| rc = snmp_sess_select_info2_flags(sessp, numfds, &lfdset, timeout, |
| block, flags); |
| if (netsnmp_copy_large_fd_set_to_fd_set(fdset, &lfdset) < 0) { |
| snmp_log(LOG_ERR, |
| "Use snmp_sess_select_info2() for processing" |
| " large file descriptors\n"); |
| } |
| netsnmp_large_fd_set_cleanup(&lfdset); |
| return rc; |
| } |
| |
| /** |
| * @see See also snmp_sess_select_info2_flags(). |
| */ |
| int |
| snmp_sess_select_info2(void *sessp, int *numfds, netsnmp_large_fd_set *fdset, |
| struct timeval *timeout, int *block) |
| { |
| return snmp_sess_select_info2_flags(sessp, numfds, fdset, timeout, block, |
| NETSNMP_SELECT_NOFLAGS); |
| } |
| |
| /** |
| * Compute/update the arguments to be passed to select(). |
| * |
| * @param[in] sessp Which sessions to process: either a pointer to a |
| * specific session or NULL which means to process all sessions. |
| * @param[in,out] numfds On POSIX systems one more than the the largest file |
| * descriptor that is present in *fdset. On systems that use Winsock (MinGW |
| * and MSVC), do not use the value written into *numfds. |
| * @param[in,out] fdset A large file descriptor set to which all file |
| * descriptors will be added that are associated with one of the examined |
| * sessions. |
| * @param[in,out] timeout On input, if *block = 1, the maximum time the caller |
| * will block while waiting for Net-SNMP activity. On output, if this function |
| * has set *block to 0, the maximum time the caller is allowed to wait before |
| * invoking the Net-SNMP processing functions (snmp_read(), snmp_timeout() |
| * and run_alarms()). If this function has set *block to 1, *timeout won't |
| * have been modified and no alarms are active. |
| * @param[in,out] block On input, whether the caller prefers to block forever |
| * when no alarms are active. On output, 0 means that no alarms are active |
| * nor that there is a timeout pending for any of the processed sessions. |
| * @param[in] flags Either 0 or NETSNMP_SELECT_NOALARMS. |
| * |
| * @return Number of sessions processed by this function. |
| * |
| * @see See also agent_check_and_process() for an example of how to use this |
| * function. |
| */ |
| int |
| snmp_sess_select_info2_flags(void *sessp, int *numfds, |
| netsnmp_large_fd_set * fdset, |
| struct timeval *timeout, int *block, int flags) |
| { |
| struct session_list *slp, *next = NULL; |
| netsnmp_request_list *rp; |
| struct timeval now, earliest, alarm_tm; |
| int active = 0, requests = 0; |
| int next_alarm = 0; |
| |
| timerclear(&earliest); |
| |
| /* |
| * For each session examined, add its socket to the fdset, |
| * and if it is the earliest timeout to expire, mark it as lowest. |
| * If a single session is specified, do just for that session. |
| */ |
| |
| DEBUGMSGTL(("sess_select", "for %s session%s: ", |
| sessp ? "single" : "all", sessp ? "" : "s")); |
| |
| for (slp = sessp ? sessp : Sessions; slp; slp = next) { |
| next = slp->next; |
| |
| if (slp->transport == NULL) { |
| /* |
| * Close in progress -- skip this one. |
| */ |
| DEBUGMSG(("sess_select", "skip ")); |
| continue; |
| } |
| |
| if (slp->transport->sock == -1) { |
| /* |
| * This session was marked for deletion. |
| */ |
| DEBUGMSG(("sess_select", "delete\n")); |
| if (sessp == NULL) { |
| snmp_close(slp->session); |
| } else { |
| snmp_sess_close(slp); |
| } |
| DEBUGMSGTL(("sess_select", "for %s session%s: ", |
| sessp ? "single" : "all", sessp ? "" : "s")); |
| continue; |
| } |
| |
| DEBUGMSG(("sess_select", "%d ", slp->transport->sock)); |
| if ((slp->transport->sock + 1) > *numfds) { |
| *numfds = (slp->transport->sock + 1); |
| } |
| |
| NETSNMP_LARGE_FD_SET(slp->transport->sock, fdset); |
| if (slp->internal != NULL && slp->internal->requests) { |
| /* |
| * Found another session with outstanding requests. |
| */ |
| requests++; |
| for (rp = slp->internal->requests; rp; rp = rp->next_request) { |
| if (!timerisset(&earliest) |
| || (timerisset(&rp->expireM) |
| && timercmp(&rp->expireM, &earliest, <))) { |
| earliest = rp->expireM; |
| DEBUGMSG(("verbose:sess_select","(to in %d.%06d sec) ", |
| (int)earliest.tv_sec, (int)earliest.tv_usec)); |
| } |
| } |
| } |
| |
| active++; |
| if (sessp) { |
| /* |
| * Single session processing. |
| */ |
| break; |
| } |
| } |
| DEBUGMSG(("sess_select", "\n")); |
| |
| netsnmp_get_monotonic_clock(&now); |
| |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_ALARM_DONT_USE_SIG) && |
| !(flags & NETSNMP_SELECT_NOALARMS)) { |
| next_alarm = netsnmp_get_next_alarm_time(&alarm_tm, &now); |
| if (next_alarm) |
| DEBUGMSGT(("sess_select","next alarm at %ld.%06ld sec\n", |
| (long)alarm_tm.tv_sec, (long)alarm_tm.tv_usec)); |
| } |
| if (next_alarm == 0 && requests == 0) { |
| /* |
| * If none are active, skip arithmetic. |
| */ |
| DEBUGMSGT(("sess_select","blocking:no session requests or alarms.\n")); |
| *block = 1; /* can block - timeout value is undefined if no requests */ |
| return active; |
| } |
| |
| if (next_alarm && |
| (!timerisset(&earliest) || timercmp(&alarm_tm, &earliest, <))) |
| earliest = alarm_tm; |
| |
| NETSNMP_TIMERSUB(&earliest, &now, &earliest); |
| if (earliest.tv_sec < 0) { |
| time_t overdue_ms = -(earliest.tv_sec * 1000 + earliest.tv_usec / 1000); |
| if (overdue_ms >= 10) |
| DEBUGMSGT(("verbose:sess_select","timer overdue by %ld ms\n", |
| (long) overdue_ms)); |
| timerclear(&earliest); |
| } else { |
| DEBUGMSGT(("verbose:sess_select","timer due in %d.%06d sec\n", |
| (int)earliest.tv_sec, (int)earliest.tv_usec)); |
| } |
| |
| /* |
| * if it was blocking before or our delta time is less, reset timeout |
| */ |
| if ((*block || (timercmp(&earliest, timeout, <)))) { |
| DEBUGMSGT(("verbose:sess_select", |
| "setting timer to %d.%06d sec, clear block (was %d)\n", |
| (int)earliest.tv_sec, (int)earliest.tv_usec, *block)); |
| *timeout = earliest; |
| *block = 0; |
| } |
| return active; |
| } |
| |
| /* |
| * snmp_timeout should be called whenever the timeout from snmp_select_info |
| * expires, but it is idempotent, so snmp_timeout can be polled (probably a |
| * cpu expensive proposition). snmp_timeout checks to see if any of the |
| * sessions have an outstanding request that has timed out. If it finds one |
| * (or more), and that pdu has more retries available, a new packet is formed |
| * from the pdu and is resent. If there are no more retries available, the |
| * callback for the session is used to alert the user of the timeout. |
| */ |
| void |
| snmp_timeout(void) |
| { |
| struct session_list *slp; |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| for (slp = Sessions; slp; slp = slp->next) { |
| snmp_sess_timeout((void *) slp); |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| } |
| |
| static int |
| snmp_resend_request(struct session_list *slp, netsnmp_request_list *rp, |
| int incr_retries) |
| { |
| struct snmp_internal_session *isp; |
| netsnmp_session *sp; |
| netsnmp_transport *transport; |
| u_char *pktbuf = NULL, *packet = NULL; |
| size_t pktbuf_len = 0, offset = 0, length = 0; |
| struct timeval tv, now; |
| int result = 0; |
| |
| sp = slp->session; |
| isp = slp->internal; |
| transport = slp->transport; |
| if (!sp || !isp || !transport) { |
| DEBUGMSGTL(("sess_read", "resend fail: closing...\n")); |
| return 0; |
| } |
| |
| if ((pktbuf = (u_char *)malloc(2048)) == NULL) { |
| DEBUGMSGTL(("sess_resend", |
| "couldn't malloc initial packet buffer\n")); |
| return 0; |
| } else { |
| pktbuf_len = 2048; |
| } |
| |
| if (incr_retries) { |
| rp->retries++; |
| } |
| |
| /* |
| * Always increment msgId for resent messages. |
| */ |
| rp->pdu->msgid = rp->message_id = snmp_get_next_msgid(); |
| |
| if (isp->hook_realloc_build) { |
| result = isp->hook_realloc_build(sp, rp->pdu, |
| &pktbuf, &pktbuf_len, &offset); |
| |
| packet = pktbuf; |
| length = offset; |
| } else if (isp->hook_build) { |
| packet = pktbuf; |
| length = pktbuf_len; |
| result = isp->hook_build(sp, rp->pdu, pktbuf, &length); |
| } else { |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| if (netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_REVERSE_ENCODE)) { |
| result = |
| snmp_build(&pktbuf, &pktbuf_len, &offset, sp, rp->pdu); |
| packet = pktbuf + pktbuf_len - offset; |
| length = offset; |
| } else { |
| #endif |
| packet = pktbuf; |
| length = pktbuf_len; |
| result = snmp_build(&pktbuf, &length, &offset, sp, rp->pdu); |
| #ifdef NETSNMP_USE_REVERSE_ASNENCODING |
| } |
| #endif |
| } |
| |
| if (result < 0) { |
| /* |
| * This should never happen. |
| */ |
| DEBUGMSGTL(("sess_resend", "encoding failure\n")); |
| SNMP_FREE(pktbuf); |
| return -1; |
| } |
| |
| DEBUGMSGTL(("sess_process_packet", "resending message id#%ld reqid#%ld " |
| "rp_reqid#%ld rp_msgid#%ld len %" NETSNMP_PRIz "u\n", |
| rp->pdu->msgid, rp->pdu->reqid, rp->request_id, rp->message_id, length)); |
| result = netsnmp_transport_send(transport, packet, length, |
| &(rp->pdu->transport_data), |
| &(rp->pdu->transport_data_length)); |
| |
| /* |
| * We are finished with the local packet buffer, if we allocated one (due |
| * to there being no saved packet). |
| */ |
| |
| if (pktbuf != NULL) { |
| SNMP_FREE(pktbuf); |
| packet = NULL; |
| } |
| |
| if (result < 0) { |
| sp->s_snmp_errno = SNMPERR_BAD_SENDTO; |
| sp->s_errno = errno; |
| snmp_set_detail(strerror(errno)); |
| return -1; |
| } else { |
| netsnmp_get_monotonic_clock(&now); |
| tv = now; |
| rp->timeM = tv; |
| tv.tv_usec += rp->timeout; |
| tv.tv_sec += tv.tv_usec / 1000000L; |
| tv.tv_usec %= 1000000L; |
| rp->expireM = tv; |
| } |
| return 0; |
| } |
| |
| |
| |
| void |
| snmp_sess_timeout(void *sessp) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| netsnmp_session *sp; |
| struct snmp_internal_session *isp; |
| netsnmp_request_list *rp, *orp = NULL, *freeme = NULL; |
| struct timeval now; |
| snmp_callback callback; |
| void *magic; |
| struct snmp_secmod_def *sptr; |
| |
| sp = slp->session; |
| isp = slp->internal; |
| if (!sp || !isp) { |
| DEBUGMSGTL(("sess_read", "timeout fail: closing...\n")); |
| return; |
| } |
| |
| netsnmp_get_monotonic_clock(&now); |
| |
| /* |
| * For each request outstanding, check to see if it has expired. |
| */ |
| for (rp = isp->requests; rp; rp = rp->next_request) { |
| if (freeme != NULL) { |
| /* |
| * frees rp's after the for loop goes on to the next_request |
| */ |
| free((char *) freeme); |
| freeme = NULL; |
| } |
| |
| if ((timercmp(&rp->expireM, &now, <))) { |
| if ((sptr = find_sec_mod(rp->pdu->securityModel)) != NULL && |
| sptr->pdu_timeout != NULL) { |
| /* |
| * call security model if it needs to know about this |
| */ |
| (*sptr->pdu_timeout) (rp->pdu); |
| } |
| |
| /* |
| * this timer has expired |
| */ |
| if (rp->retries >= sp->retries) { |
| if (rp->callback) { |
| callback = rp->callback; |
| magic = rp->cb_data; |
| } else { |
| callback = sp->callback; |
| magic = sp->callback_magic; |
| } |
| |
| /* |
| * No more chances, delete this entry |
| */ |
| if (callback) { |
| callback(NETSNMP_CALLBACK_OP_TIMED_OUT, sp, |
| rp->pdu->reqid, rp->pdu, magic); |
| } |
| if (orp) |
| orp->next_request = rp->next_request; |
| else |
| isp->requests = rp->next_request; |
| if (isp->requestsEnd == rp) |
| isp->requestsEnd = orp; |
| snmp_free_pdu(rp->pdu); |
| freeme = rp; |
| continue; /* don't update orp below */ |
| } else { |
| if (snmp_resend_request(slp, rp, TRUE)) { |
| break; |
| } |
| } |
| } |
| orp = rp; |
| } |
| |
| if (freeme != NULL) { |
| free((char *) freeme); |
| freeme = NULL; |
| } |
| } |
| |
| /* |
| * lexicographical compare two object identifiers. |
| * * Returns -1 if name1 < name2, |
| * * 0 if name1 = name2, |
| * * 1 if name1 > name2 |
| * * |
| * * Caution: this method is called often by |
| * * command responder applications (ie, agent). |
| */ |
| int |
| snmp_oid_ncompare(const oid * in_name1, |
| size_t len1, |
| const oid * in_name2, size_t len2, size_t max_len) |
| { |
| register int len; |
| register const oid *name1 = in_name1; |
| register const oid *name2 = in_name2; |
| size_t min_len; |
| |
| /* |
| * len = minimum of len1 and len2 |
| */ |
| if (len1 < len2) |
| min_len = len1; |
| else |
| min_len = len2; |
| |
| if (min_len > max_len) |
| min_len = max_len; |
| |
| len = min_len; |
| |
| /* |
| * find first non-matching OID |
| */ |
| while (len-- > 0) { |
| /* |
| * these must be done in seperate comparisons, since |
| * subtracting them and using that result has problems with |
| * subids > 2^31. |
| */ |
| if (*(name1) != *(name2)) { |
| if (*(name1) < *(name2)) |
| return -1; |
| return 1; |
| } |
| name1++; |
| name2++; |
| } |
| |
| if (min_len != max_len) { |
| /* |
| * both OIDs equal up to length of shorter OID |
| */ |
| if (len1 < len2) |
| return -1; |
| if (len2 < len1) |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| /** lexicographical compare two object identifiers. |
| * |
| * Caution: this method is called often by |
| * command responder applications (ie, agent). |
| * |
| * @return -1 if name1 < name2, 0 if name1 = name2, 1 if name1 > name2 |
| */ |
| int |
| snmp_oid_compare(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2) |
| { |
| register int len; |
| register const oid *name1 = in_name1; |
| register const oid *name2 = in_name2; |
| |
| /* |
| * len = minimum of len1 and len2 |
| */ |
| if (len1 < len2) |
| len = len1; |
| else |
| len = len2; |
| /* |
| * find first non-matching OID |
| */ |
| while (len-- > 0) { |
| /* |
| * these must be done in seperate comparisons, since |
| * subtracting them and using that result has problems with |
| * subids > 2^31. |
| */ |
| if (*(name1) != *(name2)) { |
| if (*(name1) < *(name2)) |
| return -1; |
| return 1; |
| } |
| name1++; |
| name2++; |
| } |
| /* |
| * both OIDs equal up to length of shorter OID |
| */ |
| if (len1 < len2) |
| return -1; |
| if (len2 < len1) |
| return 1; |
| return 0; |
| } |
| |
| /** lexicographical compare two object identifiers and return the point where they differ |
| * |
| * Caution: this method is called often by |
| * command responder applications (ie, agent). |
| * |
| * @return -1 if name1 < name2, 0 if name1 = name2, 1 if name1 > name2 and offpt = len where name1 != name2 |
| */ |
| int |
| netsnmp_oid_compare_ll(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2, |
| size_t *offpt) |
| { |
| register int len; |
| register const oid *name1 = in_name1; |
| register const oid *name2 = in_name2; |
| int initlen; |
| |
| /* |
| * len = minimum of len1 and len2 |
| */ |
| if (len1 < len2) |
| initlen = len = len1; |
| else |
| initlen = len = len2; |
| /* |
| * find first non-matching OID |
| */ |
| while (len-- > 0) { |
| /* |
| * these must be done in seperate comparisons, since |
| * subtracting them and using that result has problems with |
| * subids > 2^31. |
| */ |
| if (*(name1) != *(name2)) { |
| *offpt = initlen - len; |
| if (*(name1) < *(name2)) |
| return -1; |
| return 1; |
| } |
| name1++; |
| name2++; |
| } |
| /* |
| * both OIDs equal up to length of shorter OID |
| */ |
| *offpt = initlen - len; |
| if (len1 < len2) |
| return -1; |
| if (len2 < len1) |
| return 1; |
| return 0; |
| } |
| |
| /** Compares 2 OIDs to determine if they are equal up until the shortest length. |
| * @param in_name1 A pointer to the first oid. |
| * @param len1 length of the first OID (in segments, not bytes) |
| * @param in_name2 A pointer to the second oid. |
| * @param len2 length of the second OID (in segments, not bytes) |
| * @return 0 if they are equal, 1 if in_name1 is > in_name2, or -1 if <. |
| */ |
| int |
| snmp_oidtree_compare(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2) |
| { |
| int len = ((len1 < len2) ? len1 : len2); |
| |
| return (snmp_oid_compare(in_name1, len, in_name2, len)); |
| } |
| |
| int |
| snmp_oidsubtree_compare(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2) |
| { |
| int len = ((len1 < len2) ? len1 : len2); |
| |
| return (snmp_oid_compare(in_name1, len1, in_name2, len)); |
| } |
| |
| /** Compares 2 OIDs to determine if they are exactly equal. |
| * This should be faster than doing a snmp_oid_compare for different |
| * length OIDs, since the length is checked first and if != returns |
| * immediately. Might be very slighly faster if lengths are ==. |
| * @param in_name1 A pointer to the first oid. |
| * @param len1 length of the first OID (in segments, not bytes) |
| * @param in_name2 A pointer to the second oid. |
| * @param len2 length of the second OID (in segments, not bytes) |
| * @return 0 if they are equal, 1 if they are not. |
| */ |
| int |
| netsnmp_oid_equals(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2) |
| { |
| register const oid *name1 = in_name1; |
| register const oid *name2 = in_name2; |
| register int len = len1; |
| |
| /* |
| * len = minimum of len1 and len2 |
| */ |
| if (len1 != len2) |
| return 1; |
| /* |
| * Handle 'null' OIDs |
| */ |
| if (len1 == 0) |
| return 0; /* Two null OIDs are (trivially) the same */ |
| if (!name1 || !name2) |
| return 1; /* Otherwise something's wrong, so report a non-match */ |
| /* |
| * find first non-matching OID |
| */ |
| while (len-- > 0) { |
| /* |
| * these must be done in seperate comparisons, since |
| * subtracting them and using that result has problems with |
| * subids > 2^31. |
| */ |
| if (*(name1++) != *(name2++)) |
| return 1; |
| } |
| return 0; |
| } |
| |
| #ifndef NETSNMP_FEATURE_REMOVE_OID_IS_SUBTREE |
| /** Identical to netsnmp_oid_equals, except only the length up to len1 is compared. |
| * Functionally, this determines if in_name2 is equal or a subtree of in_name1 |
| * @param in_name1 A pointer to the first oid. |
| * @param len1 length of the first OID (in segments, not bytes) |
| * @param in_name2 A pointer to the second oid. |
| * @param len2 length of the second OID (in segments, not bytes) |
| * @return 0 if one is a common prefix of the other. |
| */ |
| int |
| netsnmp_oid_is_subtree(const oid * in_name1, |
| size_t len1, const oid * in_name2, size_t len2) |
| { |
| if (len1 > len2) |
| return 1; |
| |
| if (memcmp(in_name1, in_name2, len1 * sizeof(oid))) |
| return 1; |
| |
| return 0; |
| } |
| #endif /* NETSNMP_FEATURE_REMOVE_OID_IS_SUBTREE */ |
| |
| /** Given two OIDs, determine the common prefix to them both. |
| * @param in_name1 A pointer to the first oid. |
| * @param len1 Length of the first oid. |
| * @param in_name2 A pointer to the second oid. |
| * @param len2 Length of the second oid. |
| * @return length of common prefix |
| * 0 if no common prefix, -1 on error. |
| */ |
| int |
| netsnmp_oid_find_prefix(const oid * in_name1, size_t len1, |
| const oid * in_name2, size_t len2) |
| { |
| int i; |
| size_t min_size; |
| |
| if (!in_name1 || !in_name2 || !len1 || !len2) |
| return -1; |
| |
| if (in_name1[0] != in_name2[0]) |
| return 0; /* No match */ |
| min_size = SNMP_MIN(len1, len2); |
| for(i = 0; i < (int)min_size; i++) { |
| if (in_name1[i] != in_name2[i]) |
| return i; /* 'Ã' is the first differing subidentifier |
| So the common prefix is 0..(i-1), of length i */ |
| } |
| return min_size; /* The shorter OID is a prefix of the longer, and |
| hence is precisely the common prefix of the two. |
| Return its length. */ |
| } |
| |
| static int _check_range(struct tree *tp, long ltmp, int *resptr, |
| const char *errmsg) |
| { |
| char *cp = NULL; |
| char *temp = NULL; |
| int temp_len = 0; |
| int check = !netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_DONT_CHECK_RANGE); |
| |
| if (check && tp && tp->ranges) { |
| struct range_list *rp = tp->ranges; |
| while (rp) { |
| if (rp->low <= ltmp && ltmp <= rp->high) break; |
| /* Allow four digits per range value */ |
| temp_len += ((rp->low != rp->high) ? 14 : 8 ); |
| rp = rp->next; |
| } |
| if (!rp) { |
| *resptr = SNMPERR_RANGE; |
| temp = (char *)malloc( temp_len+strlen(errmsg)+7); |
| if ( temp ) { |
| /* Append the Display Hint range information to the error message */ |
| sprintf( temp, "%s :: {", errmsg ); |
| cp = temp+(strlen(temp)); |
| for ( rp = tp->ranges; rp; rp=rp->next ) { |
| if ( rp->low != rp->high ) |
| sprintf( cp, "(%d..%d), ", rp->low, rp->high ); |
| else |
| sprintf( cp, "(%d), ", rp->low ); |
| cp += strlen(cp); |
| } |
| *(cp-2) = '}'; /* Replace the final comma with a '}' */ |
| *(cp-1) = 0; |
| snmp_set_detail(temp); |
| free(temp); |
| } |
| return 0; |
| } |
| } |
| free(temp); |
| return 1; |
| } |
| |
| |
| /* |
| * Add a variable with the requested name to the end of the list of |
| * variables for this pdu. |
| */ |
| netsnmp_variable_list * |
| snmp_pdu_add_variable(netsnmp_pdu *pdu, |
| const oid * name, |
| size_t name_length, |
| u_char type, const void * value, size_t len) |
| { |
| return snmp_varlist_add_variable(&pdu->variables, name, name_length, |
| type, value, len); |
| } |
| |
| /* |
| * Add a variable with the requested name to the end of the list of |
| * variables for this pdu. |
| */ |
| netsnmp_variable_list * |
| snmp_varlist_add_variable(netsnmp_variable_list ** varlist, |
| const oid * name, |
| size_t name_length, |
| u_char type, const void * value, size_t len) |
| { |
| netsnmp_variable_list *vars, *vtmp; |
| int rc; |
| |
| if (varlist == NULL) |
| return NULL; |
| |
| vars = SNMP_MALLOC_TYPEDEF(netsnmp_variable_list); |
| if (vars == NULL) |
| return NULL; |
| |
| vars->type = type; |
| |
| rc = snmp_set_var_value( vars, value, len ); |
| if (( 0 != rc ) || |
| (name != NULL && snmp_set_var_objid(vars, name, name_length))) { |
| snmp_free_var(vars); |
| return NULL; |
| } |
| |
| /* |
| * put only qualified variable onto varlist |
| */ |
| if (*varlist == NULL) { |
| *varlist = vars; |
| } else { |
| for (vtmp = *varlist; vtmp->next_variable; |
| vtmp = vtmp->next_variable); |
| |
| vtmp->next_variable = vars; |
| } |
| |
| return vars; |
| } |
| |
| |
| |
| /* |
| * Add a variable with the requested name to the end of the list of |
| * variables for this pdu. |
| * Returns: |
| * may set these error types : |
| * SNMPERR_RANGE - type, value, or length not found or out of range |
| * SNMPERR_VALUE - value is not correct |
| * SNMPERR_VAR_TYPE - type is not correct |
| * SNMPERR_BAD_NAME - name is not found |
| * |
| * returns 0 if success, error if failure. |
| */ |
| int |
| snmp_add_var(netsnmp_pdu *pdu, |
| const oid * name, size_t name_length, char type, const char *value) |
| { |
| char *st; |
| const char *cp; |
| char *ecp, *vp; |
| int result = SNMPERR_SUCCESS; |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| int check = !netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_DONT_CHECK_RANGE); |
| int do_hint = !netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, |
| NETSNMP_DS_LIB_NO_DISPLAY_HINT); |
| u_char *hintptr; |
| struct tree *tp; |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| u_char *buf = NULL; |
| const u_char *buf_ptr = NULL; |
| size_t buf_len = 0, value_len = 0, tint; |
| in_addr_t atmp; |
| long ltmp; |
| int itmp; |
| struct enum_list *ep; |
| #ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES |
| double dtmp; |
| float ftmp; |
| #endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */ |
| struct counter64 c64tmp; |
| |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| tp = get_tree(name, name_length, get_tree_head()); |
| if (!tp || !tp->type || tp->type > TYPE_SIMPLE_LAST) { |
| check = 0; |
| } |
| if (!(tp && tp->hint)) |
| do_hint = 0; |
| |
| if (tp && type == '=') { |
| /* |
| * generic assignment - let the tree node decide value format |
| */ |
| switch (tp->type) { |
| case TYPE_INTEGER: |
| case TYPE_INTEGER32: |
| type = 'i'; |
| break; |
| case TYPE_GAUGE: |
| case TYPE_UNSIGNED32: |
| type = 'u'; |
| break; |
| case TYPE_UINTEGER: |
| type = '3'; |
| break; |
| case TYPE_COUNTER: |
| type = 'c'; |
| break; |
| case TYPE_COUNTER64: |
| type = 'C'; |
| break; |
| case TYPE_TIMETICKS: |
| type = 't'; |
| break; |
| case TYPE_OCTETSTR: |
| type = 's'; |
| break; |
| case TYPE_BITSTRING: |
| type = 'b'; |
| break; |
| case TYPE_IPADDR: |
| type = 'a'; |
| break; |
| case TYPE_OBJID: |
| type = 'o'; |
| break; |
| } |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| |
| switch (type) { |
| case 'i': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_INTEGER |
| && tp->type != TYPE_INTEGER32) { |
| value = "INTEGER"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| if (!*value) |
| goto fail; |
| ltmp = strtol(value, &ecp, 10); |
| if (*ecp) { |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| ep = tp ? tp->enums : NULL; |
| while (ep) { |
| if (strcmp(value, ep->label) == 0) { |
| ltmp = ep->value; |
| break; |
| } |
| ep = ep->next; |
| } |
| if (!ep) { |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| result = SNMPERR_RANGE; /* ?? or SNMPERR_VALUE; */ |
| snmp_set_detail(value); |
| break; |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| } |
| |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (!_check_range(tp, ltmp, &result, value)) |
| break; |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_INTEGER, |
| <mp, sizeof(ltmp)); |
| break; |
| |
| case 'u': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_GAUGE && tp->type != TYPE_UNSIGNED32) { |
| value = "Unsigned32"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| ltmp = strtoul(value, &ecp, 10); |
| if (*value && !*ecp) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_UNSIGNED, |
| <mp, sizeof(ltmp)); |
| else |
| goto fail; |
| break; |
| |
| case '3': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_UINTEGER) { |
| value = "UInteger32"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| ltmp = strtoul(value, &ecp, 10); |
| if (*value && !*ecp) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_UINTEGER, |
| <mp, sizeof(ltmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'c': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_COUNTER) { |
| value = "Counter32"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| ltmp = strtoul(value, &ecp, 10); |
| if (*value && !*ecp) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_COUNTER, |
| <mp, sizeof(ltmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'C': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_COUNTER64) { |
| value = "Counter64"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| if (read64(&c64tmp, value)) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_COUNTER64, |
| &c64tmp, sizeof(c64tmp)); |
| else |
| goto fail; |
| break; |
| |
| case 't': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_TIMETICKS) { |
| value = "Timeticks"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| ltmp = strtoul(value, &ecp, 10); |
| if (*value && !*ecp) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_TIMETICKS, |
| <mp, sizeof(long)); |
| else |
| goto fail; |
| break; |
| |
| case 'a': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_IPADDR) { |
| value = "IpAddress"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| atmp = inet_addr(value); |
| if (atmp != (in_addr_t) -1 || !strcmp(value, "255.255.255.255")) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_IPADDRESS, |
| &atmp, sizeof(atmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'o': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_OBJID) { |
| value = "OBJECT IDENTIFIER"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| if ((buf = (u_char *)malloc(sizeof(oid) * MAX_OID_LEN)) == NULL) { |
| result = SNMPERR_MALLOC; |
| } else { |
| tint = MAX_OID_LEN; |
| if (snmp_parse_oid(value, (oid *) buf, &tint)) { |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OBJECT_ID, |
| buf, sizeof(oid) * tint); |
| } else { |
| result = snmp_errno; /*MTCRITICAL_RESOURCE */ |
| } |
| } |
| break; |
| |
| case 's': |
| case 'x': |
| case 'd': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && tp->type != TYPE_OCTETSTR && tp->type != TYPE_BITSTRING) { |
| value = "OCTET STRING"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| if ('s' == type && do_hint && !parse_octet_hint(tp->hint, value, &hintptr, &itmp)) { |
| if (_check_range(tp, itmp, &result, "Value does not match DISPLAY-HINT")) { |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OCTET_STR, |
| hintptr, itmp); |
| } |
| SNMP_FREE(hintptr); |
| hintptr = buf; |
| break; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| if (type == 'd') { |
| if (!snmp_decimal_to_binary |
| (&buf, &buf_len, &value_len, 1, value)) { |
| result = SNMPERR_VALUE; |
| snmp_set_detail(value); |
| break; |
| } |
| buf_ptr = buf; |
| } else if (type == 'x') { |
| if (!snmp_hex_to_binary(&buf, &buf_len, &value_len, 1, value)) { |
| result = SNMPERR_VALUE; |
| snmp_set_detail(value); |
| break; |
| } |
| /* initialize itmp value so that range check below works */ |
| itmp = value_len; |
| buf_ptr = buf; |
| } else if (type == 's') { |
| buf_ptr = (const u_char *)value; |
| value_len = strlen(value); |
| } |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (!_check_range(tp, value_len, &result, "Bad string length")) |
| break; |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OCTET_STR, |
| buf_ptr, value_len); |
| break; |
| |
| case 'n': |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_NULL, NULL, 0); |
| break; |
| |
| case 'b': |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| if (check && (tp->type != TYPE_BITSTRING || !tp->enums)) { |
| value = "BITS"; |
| result = SNMPERR_VALUE; |
| goto type_error; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| tint = 0; |
| if ((buf = (u_char *) malloc(256)) == NULL) { |
| result = SNMPERR_MALLOC; |
| break; |
| } else { |
| buf_len = 256; |
| memset(buf, 0, buf_len); |
| } |
| |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| for (ep = tp ? tp->enums : NULL; ep; ep = ep->next) { |
| if (ep->value / 8 >= (int) tint) { |
| tint = ep->value / 8 + 1; |
| } |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| |
| vp = strdup(value); |
| for (cp = strtok_r(vp, " ,\t", &st); cp; cp = strtok_r(NULL, " ,\t", &st)) { |
| int ix, bit; |
| |
| ltmp = strtoul(cp, &ecp, 0); |
| if (*ecp != 0) { |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| for (ep = tp ? tp->enums : NULL; ep != NULL; ep = ep->next) { |
| if (strncmp(ep->label, cp, strlen(ep->label)) == 0) { |
| break; |
| } |
| } |
| if (ep != NULL) { |
| ltmp = ep->value; |
| } else { |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| result = SNMPERR_RANGE; /* ?? or SNMPERR_VALUE; */ |
| snmp_set_detail(cp); |
| SNMP_FREE(buf); |
| SNMP_FREE(vp); |
| goto out; |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| } |
| |
| ix = ltmp / 8; |
| if (ix >= (int) tint) { |
| tint = ix + 1; |
| } |
| if (ix >= (int)buf_len && !snmp_realloc(&buf, &buf_len)) { |
| result = SNMPERR_MALLOC; |
| break; |
| } |
| bit = 0x80 >> ltmp % 8; |
| buf[ix] |= bit; |
| |
| } |
| SNMP_FREE(vp); |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OCTET_STR, |
| buf, tint); |
| break; |
| |
| #ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES |
| case 'U': |
| if (read64(&c64tmp, value)) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OPAQUE_U64, |
| &c64tmp, sizeof(c64tmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'I': |
| if (read64(&c64tmp, value)) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OPAQUE_I64, |
| &c64tmp, sizeof(c64tmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'F': |
| if (sscanf(value, "%f", &ftmp) == 1) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OPAQUE_FLOAT, |
| &ftmp, sizeof(ftmp)); |
| else |
| goto fail; |
| break; |
| |
| case 'D': |
| if (sscanf(value, "%lf", &dtmp) == 1) |
| snmp_pdu_add_variable(pdu, name, name_length, ASN_OPAQUE_DOUBLE, |
| &dtmp, sizeof(dtmp)); |
| else |
| goto fail; |
| break; |
| #endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */ |
| |
| default: |
| result = SNMPERR_VAR_TYPE; |
| buf = (u_char *)calloc(1, 4); |
| if (buf != NULL) { |
| sprintf((char *)buf, "\"%c\"", type); |
| snmp_set_detail((char *)buf); |
| } |
| break; |
| } |
| |
| SNMP_FREE(buf); |
| SET_SNMP_ERROR(result); |
| return result; |
| |
| #ifndef NETSNMP_DISABLE_MIB_LOADING |
| type_error: |
| { |
| char error_msg[256]; |
| char undef_msg[32]; |
| const char *var_type; |
| switch (tp->type) { |
| case TYPE_OBJID: |
| var_type = "OBJECT IDENTIFIER"; |
| break; |
| case TYPE_OCTETSTR: |
| var_type = "OCTET STRING"; |
| break; |
| case TYPE_INTEGER: |
| var_type = "INTEGER"; |
| break; |
| case TYPE_NETADDR: |
| var_type = "NetworkAddress"; |
| break; |
| case TYPE_IPADDR: |
| var_type = "IpAddress"; |
| break; |
| case TYPE_COUNTER: |
| var_type = "Counter32"; |
| break; |
| case TYPE_GAUGE: |
| var_type = "Gauge32"; |
| break; |
| case TYPE_TIMETICKS: |
| var_type = "Timeticks"; |
| break; |
| case TYPE_OPAQUE: |
| var_type = "Opaque"; |
| break; |
| case TYPE_NULL: |
| var_type = "Null"; |
| break; |
| case TYPE_COUNTER64: |
| var_type = "Counter64"; |
| break; |
| case TYPE_BITSTRING: |
| var_type = "BITS"; |
| break; |
| case TYPE_NSAPADDRESS: |
| var_type = "NsapAddress"; |
| break; |
| case TYPE_UINTEGER: |
| var_type = "UInteger"; |
| break; |
| case TYPE_UNSIGNED32: |
| var_type = "Unsigned32"; |
| break; |
| case TYPE_INTEGER32: |
| var_type = "Integer32"; |
| break; |
| default: |
| sprintf(undef_msg, "TYPE_%d", tp->type); |
| var_type = undef_msg; |
| } |
| snprintf(error_msg, sizeof(error_msg), |
| "Type of attribute is %s, not %s", var_type, value); |
| error_msg[ sizeof(error_msg)-1 ] = 0; |
| result = SNMPERR_VAR_TYPE; |
| snmp_set_detail(error_msg); |
| goto out; |
| } |
| #endif /* NETSNMP_DISABLE_MIB_LOADING */ |
| fail: |
| result = SNMPERR_VALUE; |
| snmp_set_detail(value); |
| out: |
| SET_SNMP_ERROR(result); |
| return result; |
| } |
| |
| /* |
| * returns NULL or internal pointer to session |
| * use this pointer for the other snmp_sess* routines, |
| * which guarantee action will occur ONLY for this given session. |
| */ |
| void * |
| snmp_sess_pointer(netsnmp_session * session) |
| { |
| struct session_list *slp; |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| for (slp = Sessions; slp; slp = slp->next) { |
| if (slp->session == session) { |
| break; |
| } |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| if (slp == NULL) { |
| snmp_errno = SNMPERR_BAD_SESSION; /*MTCRITICAL_RESOURCE */ |
| return (NULL); |
| } |
| return ((void *) slp); |
| } |
| |
| /* |
| * Input : an opaque pointer, returned by snmp_sess_open. |
| * returns NULL or pointer to session. |
| */ |
| netsnmp_session * |
| snmp_sess_session(void *sessp) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| if (slp == NULL) |
| return (NULL); |
| return (slp->session); |
| } |
| |
| /** |
| * Look up a session that already may have been closed. |
| * |
| * @param sessp Opaque pointer, returned by snmp_sess_open. |
| * |
| * @return Pointer to session upon success or NULL upon failure. |
| * |
| * @see snmp_sess_session() |
| */ |
| netsnmp_session * |
| snmp_sess_session_lookup(void *sessp) |
| { |
| struct session_list *slp; |
| |
| snmp_res_lock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| for (slp = Sessions; slp; slp = slp->next) { |
| if (slp == sessp) { |
| break; |
| } |
| } |
| snmp_res_unlock(MT_LIBRARY_ID, MT_LIB_SESSION); |
| |
| return (netsnmp_session *)slp; |
| } |
| |
| |
| /* |
| * snmp_sess_transport: takes an opaque pointer (as returned by |
| * snmp_sess_open or snmp_sess_pointer) and returns the corresponding |
| * netsnmp_transport pointer (or NULL if the opaque pointer does not correspond |
| * to an active internal session). |
| */ |
| |
| netsnmp_transport * |
| snmp_sess_transport(void *sessp) |
| { |
| struct session_list *slp = (struct session_list *) sessp; |
| if (slp == NULL) { |
| return NULL; |
| } else { |
| return slp->transport; |
| } |
| } |
| |
| |
| |
| /* |
| * snmp_sess_transport_set: set the transport pointer for the opaque |
| * session pointer sp. |
| */ |
| |
| void |
| snmp_sess_transport_set(void *sp, netsnmp_transport *t) |
| { |
| struct session_list *slp = (struct session_list *) sp; |
| if (slp != NULL) { |
| slp->transport = t; |
| } |
| } |
| |
| |
| /* |
| * snmp_duplicate_objid: duplicates (mallocs) an objid based on the |
| * input objid |
| */ |
| oid * |
| snmp_duplicate_objid(const oid * objToCopy, size_t objToCopyLen) |
| { |
| oid *returnOid; |
| if (objToCopy != NULL && objToCopyLen != 0) { |
| returnOid = (oid *) malloc(objToCopyLen * sizeof(oid)); |
| if (returnOid) { |
| memcpy(returnOid, objToCopy, objToCopyLen * sizeof(oid)); |
| } |
| } else |
| returnOid = NULL; |
| return returnOid; |
| } |
| |
| #ifndef NETSNMP_FEATURE_REMOVE_STATISTICS |
| /* |
| * generic statistics counter functions |
| */ |
| static u_int statistics[NETSNMP_STAT_MAX_STATS]; |
| |
| u_int |
| snmp_increment_statistic(int which) |
| { |
| if (which >= 0 && which < NETSNMP_STAT_MAX_STATS) { |
| statistics[which]++; |
| return statistics[which]; |
| } |
| return 0; |
| } |
| |
| u_int |
| snmp_increment_statistic_by(int which, int count) |
| { |
| if (which >= 0 && which < NETSNMP_STAT_MAX_STATS) { |
| statistics[which] += count; |
| return statistics[which]; |
| } |
| return 0; |
| } |
| |
| u_int |
| snmp_get_statistic(int which) |
| { |
| if (which >= 0 && which < NETSNMP_STAT_MAX_STATS) |
| return statistics[which]; |
| return 0; |
| } |
| |
| void |
| snmp_init_statistics(void) |
| { |
| memset(statistics, 0, sizeof(statistics)); |
| } |
| #endif /* NETSNMP_FEATURE_REMOVE_STATISTICS */ |
| /** @} */ |