2022-08-02 14:04:25 +00:00
|
|
|
/*
|
|
|
|
* BIRD -- Simple Network Management Protocol (SNMP)
|
|
|
|
*
|
|
|
|
* (c) 2022 Vojtech Vilimek <vojtech.vilimek@nic.cz>
|
|
|
|
* (c) 2022 CZ.NIC z.s.p.o
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
#include "lib/unaligned.h"
|
|
|
|
#include "subagent.h"
|
2022-11-15 15:29:03 +00:00
|
|
|
#include "snmp_utils.h"
|
2022-09-20 12:28:57 +00:00
|
|
|
#include "bgp_mib.h"
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* =============================================================
|
|
|
|
* Problems
|
|
|
|
* ------------------------------------------------------------
|
|
|
|
*
|
2022-09-30 07:36:09 +00:00
|
|
|
* change of remote ip -> no notification, no update
|
2022-09-06 16:04:29 +00:00
|
|
|
* same ip, different ports
|
|
|
|
* distinct VRF (two interfaces with overlapping private addrs)
|
2022-09-20 12:28:57 +00:00
|
|
|
* posible link-local addresses in LOCAL_IP
|
2022-09-06 16:04:29 +00:00
|
|
|
*
|
2023-07-26 12:30:34 +00:00
|
|
|
* context is allocated as copied, is it approach really needed? wouldn't it
|
|
|
|
* sufficient just use the context in rx-buffer?
|
|
|
|
*
|
2022-09-06 16:04:29 +00:00
|
|
|
*/
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/**
|
|
|
|
* Handling of malformed packet:
|
|
|
|
* When we find an error in PDU data, we create and send a response with error
|
|
|
|
* defined by the RFC. We await until the packet is send and then we close the
|
|
|
|
* communication socket. This also closes the established session. We chose
|
|
|
|
* this approach because we cannot easily mark the boundary between packets.
|
|
|
|
* When we are reseting the connection, we change the snmp_state to SNMP_RESET.
|
|
|
|
* In SNMP_RESET state we skip all received bytes and wait for snmp_tx()
|
|
|
|
* to be called. The socket's tx_hook is called when the TX-buffer is empty,
|
|
|
|
* meaning our response (agentx-Response-PDU) was send.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2023-09-11 11:06:20 +00:00
|
|
|
static void snmp_mib_fill2(struct snmp_proto *p, struct oid *oid, struct snmp_pdu *c);
|
2023-03-14 13:10:08 +00:00
|
|
|
static uint parse_response(struct snmp_proto *p, byte *buf, uint size);
|
|
|
|
static void do_response(struct snmp_proto *p, byte *buf, uint size);
|
2023-07-26 12:30:34 +00:00
|
|
|
static uint parse_gets2_pdu(struct snmp_proto *p, byte *buf, uint size, uint *skip);
|
2023-09-11 11:06:20 +00:00
|
|
|
static struct agentx_response *prepare_response(struct snmp_proto *p, struct snmp_pdu *c);
|
2023-11-08 09:55:42 +00:00
|
|
|
static void response_err_ind(struct agentx_response *res, enum agentx_response_errs err, u16 ind);
|
2023-10-18 11:30:14 +00:00
|
|
|
static uint update_packet_size(struct snmp_proto *p, const byte *start, byte *end);
|
2023-09-11 11:06:20 +00:00
|
|
|
static struct oid *search_mib(struct snmp_proto *p, const struct oid *o_start, const struct oid *o_end, struct oid *o_curr, struct snmp_pdu *c, enum snmp_search_res *result);
|
2023-10-25 10:56:23 +00:00
|
|
|
static void snmp_tx(sock *sk);
|
2022-11-29 15:30:20 +00:00
|
|
|
|
2023-09-04 11:51:29 +00:00
|
|
|
u32 snmp_internet[] = { SNMP_ISO, SNMP_ORG, SNMP_DOD, SNMP_INTERNET };
|
|
|
|
|
2023-10-19 14:20:37 +00:00
|
|
|
static const char * const snmp_errs[] UNUSED = {
|
2023-11-08 09:55:42 +00:00
|
|
|
[AGENTX_RES_NO_ERROR ] = "No error",
|
|
|
|
[AGENTX_RES_GEN_ERROR ] = "General error",
|
|
|
|
[AGENTX_RES_NO_ACCESS ] = "No access",
|
|
|
|
[AGENTX_RES_WRONG_TYPE ] = "Wrong type",
|
|
|
|
[AGENTX_RES_WRONG_LENGTH ] = "Wrong length",
|
|
|
|
[AGENTX_RES_WRONG_ENCODING ] = "Wrong encoding",
|
|
|
|
[AGENTX_RES_WRONG_VALUE ] = "Wrong value",
|
|
|
|
[AGENTX_RES_NO_CREATION ] = "No creation",
|
|
|
|
[AGENTX_RES_INCONSISTENT_VALUE ] = "Inconsistent value",
|
|
|
|
[AGENTX_RES_RESOURCE_UNAVAILABLE ] = "Resource unavailable",
|
|
|
|
[AGENTX_RES_COMMIT_FAILED ] = "Commit failed",
|
|
|
|
[AGENTX_RES_UNDO_FAILED ] = "Undo failed",
|
|
|
|
[AGENTX_RES_NOT_WRITABLE ] = "Not writable",
|
|
|
|
[AGENTX_RES_INCONSISTENT_NAME ] = "Inconsistent name",
|
|
|
|
[AGENTX_RES_OPEN_FAILED ] = "Open failed",
|
|
|
|
[AGENTX_RES_NOT_OPEN ] = "Not open",
|
|
|
|
[AGENTX_RES_INDEX_WRONG_TYPE ] = "Index wrong type",
|
|
|
|
[AGENTX_RES_INDEX_ALREADY_ALLOC ] = "Index already allocated",
|
|
|
|
[AGENTX_RES_INDEX_NONE_AVAIL ] = "Index none availlable",
|
|
|
|
[AGENTX_RES_NOT_ALLOCATED ] = "Not allocated",
|
|
|
|
[AGENTX_RES_UNSUPPORTED_CONTEXT ] = "Unsupported contex",
|
|
|
|
[AGENTX_RES_DUPLICATE_REGISTER ] = "Duplicate registration",
|
|
|
|
[AGENTX_RES_UNKNOWN_REGISTER ] = "Unknown registration",
|
|
|
|
[AGENTX_RES_UNKNOWN_AGENT_CAPS ] = "Unknown agent caps",
|
|
|
|
[AGENTX_RES_PARSE_ERROR ] = "Parse error",
|
|
|
|
[AGENTX_RES_REQUEST_DENIED ] = "Request denied",
|
|
|
|
[AGENTX_RES_PROCESSING_ERR ] = "Processing error",
|
2022-08-10 15:31:32 +00:00
|
|
|
};
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-10-19 14:20:37 +00:00
|
|
|
static const char * const snmp_pkt_type[] UNUSED = {
|
2022-12-10 17:08:00 +00:00
|
|
|
[AGENTX_OPEN_PDU] = "Open-PDU",
|
|
|
|
[AGENTX_CLOSE_PDU] = "Close-PDU",
|
|
|
|
[AGENTX_REGISTER_PDU] = "Register-PDU",
|
|
|
|
[AGENTX_UNREGISTER_PDU] = "Unregister-PDU",
|
|
|
|
[AGENTX_GET_PDU] = "Get-PDU",
|
|
|
|
[AGENTX_GET_NEXT_PDU] = "GetNext-PDU",
|
|
|
|
[AGENTX_GET_BULK_PDU] = "GetBulk-PDU",
|
|
|
|
[AGENTX_TEST_SET_PDU] = "TestSet-PDU",
|
|
|
|
[AGENTX_COMMIT_SET_PDU] = "CommitSet-PDU",
|
|
|
|
[AGENTX_UNDO_SET_PDU] = "UndoSet-PDU",
|
|
|
|
[AGENTX_CLEANUP_SET_PDU] = "CleanupSet-PDU",
|
|
|
|
[AGENTX_NOTIFY_PDU] = "Notify-PDU",
|
|
|
|
[AGENTX_PING_PDU] = "Ping-PDU",
|
|
|
|
[AGENTX_INDEX_ALLOCATE_PDU] = "IndexAllocate-PDU",
|
|
|
|
[AGENTX_INDEX_DEALLOCATE_PDU] = "IndexDeallocate-PDU",
|
|
|
|
[AGENTX_ADD_AGENT_CAPS_PDU] = "AddAgentCaps-PDU",
|
|
|
|
[AGENTX_REMOVE_AGENT_CAPS_PDU] = "RemoveAgentCaps-PDU",
|
|
|
|
[AGENTX_RESPONSE_PDU] = "Response-PDU",
|
|
|
|
};
|
|
|
|
|
2023-11-15 11:37:10 +00:00
|
|
|
static inline void
|
|
|
|
snmp_header(struct agentx_header *h, enum agentx_pdu_types type, u8 flags)
|
|
|
|
{
|
|
|
|
STORE_U8(h->version, AGENTX_VERSION);
|
|
|
|
STORE_U8(h->type, (u8) type);
|
|
|
|
STORE_U8(h->flags, flags | SNMP_ORDER);
|
|
|
|
STORE_U8(h->pad, 0);
|
|
|
|
STORE_U32(h->payload, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
snmp_blank_header(struct agentx_header *h, enum agentx_pdu_types type)
|
|
|
|
{
|
|
|
|
snmp_header(h, type, 0);
|
|
|
|
}
|
2023-10-25 14:57:46 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_register_ok - registration of OID was successful
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @res: header of agentx-Response-PDU
|
|
|
|
* @oid: OID that was successfully registered
|
|
|
|
* @class: MIB subtree of @oid
|
|
|
|
*
|
|
|
|
* Send a notification to MIB (selected by @class) about successful registration
|
|
|
|
* of @oid.
|
|
|
|
*/
|
2023-10-25 14:57:46 +00:00
|
|
|
static void
|
|
|
|
snmp_register_ok(struct snmp_proto *p, struct agentx_response *res, struct oid *oid, u8 UNUSED class)
|
|
|
|
{
|
|
|
|
// TODO switch based on oid type
|
|
|
|
snmp_bgp_reg_ok(p, res, oid);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_regsiter_failed - registration of OID failed
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @res: header of agentx-Response-PDU
|
|
|
|
* @oid: OID whose registration failed
|
|
|
|
* @class: MIB subtree of @oid
|
|
|
|
*
|
|
|
|
* Send a notification to MIB (selected by @class) about @oid registraion
|
|
|
|
* failure.
|
|
|
|
*/
|
2023-10-25 14:57:46 +00:00
|
|
|
static void
|
|
|
|
snmp_register_failed(struct snmp_proto *p, struct agentx_response *res, struct oid *oid, u8 UNUSED class)
|
|
|
|
{
|
|
|
|
// TODO switch based on oid type
|
|
|
|
snmp_bgp_reg_failed(p, res, oid);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_register_ack - handle response to agentx-Register-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @res: header of agentx-Response-PDU
|
|
|
|
* @class: MIB subtree associated with agentx-Register-PDU
|
|
|
|
*/
|
2023-10-25 14:44:08 +00:00
|
|
|
void
|
2023-10-25 14:57:46 +00:00
|
|
|
snmp_register_ack(struct snmp_proto *p, struct agentx_response *res, u8 class)
|
2023-10-25 14:44:08 +00:00
|
|
|
{
|
|
|
|
struct snmp_register *reg;
|
|
|
|
WALK_LIST(reg, p->register_queue)
|
|
|
|
{
|
|
|
|
// TODO add support for more mib trees (other than BGP)
|
2023-10-25 14:57:46 +00:00
|
|
|
if (snmp_register_same(reg, &res->h, class))
|
2023-10-25 14:44:08 +00:00
|
|
|
{
|
|
|
|
struct snmp_registered_oid *ro = \
|
|
|
|
mb_alloc(p->p.pool, sizeof(struct snmp_registered_oid));
|
|
|
|
|
|
|
|
ro->n.prev = ro->n.next = NULL;
|
|
|
|
|
|
|
|
ro->oid = reg->oid;
|
|
|
|
|
|
|
|
rem_node(®->n);
|
|
|
|
mb_free(reg);
|
|
|
|
p->register_to_ack--;
|
|
|
|
|
|
|
|
add_tail(&p->bgp_registered, &ro->n);
|
2023-10-25 14:57:46 +00:00
|
|
|
|
|
|
|
if (res->error == AGENTX_RES_NO_ERROR)
|
|
|
|
snmp_register_ok(p, res, ro->oid, class);
|
|
|
|
else
|
|
|
|
snmp_register_failed(p, res, ro->oid, class);
|
2023-10-25 14:44:08 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_rx_skip - skip all received data
|
|
|
|
* @sk: communication socket
|
|
|
|
* @size: size of received PDUs
|
|
|
|
*
|
|
|
|
* Socket rx_hook used when we are reseting the connection due to malformed PDU.
|
|
|
|
*/
|
2023-10-25 10:56:23 +00:00
|
|
|
static int
|
|
|
|
snmp_rx_skip(sock UNUSED *sk, uint UNUSED size)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_error - handle a malformed packet
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
*
|
|
|
|
* We wait until all packets are send. Then we close the socket which also
|
|
|
|
* closes the established session on given socket. Finally we try to start a new
|
|
|
|
* session.
|
|
|
|
*/
|
2023-10-25 10:56:23 +00:00
|
|
|
static inline void
|
|
|
|
snmp_error(struct snmp_proto *p)
|
|
|
|
{
|
|
|
|
snmp_log("changing state to RESET");
|
|
|
|
p->state = SNMP_RESET;
|
|
|
|
|
|
|
|
p->sock->rx_hook = snmp_rx_skip;
|
|
|
|
p->sock->tx_hook = snmp_tx;
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_simple_response - send an agentx-Response-PDU with no data payload
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @error: PDU error fields value
|
|
|
|
* @index: PDU error index field value
|
|
|
|
*/
|
2023-10-25 10:41:23 +00:00
|
|
|
static void
|
2023-11-08 09:55:42 +00:00
|
|
|
snmp_simple_response(struct snmp_proto *p, enum agentx_response_errs error, u16 index)
|
2023-10-25 10:41:23 +00:00
|
|
|
{
|
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2023-10-25 10:41:23 +00:00
|
|
|
|
|
|
|
if (c.size < sizeof(struct agentx_response))
|
|
|
|
snmp_manage_tbuf(p, &c);
|
|
|
|
|
|
|
|
struct agentx_response *res = prepare_response(p, &c);
|
|
|
|
response_err_ind(res, error, index);
|
|
|
|
sk_send(sk, sizeof(struct agentx_response));
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* open_pdu - send an agentx-Open-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: PDU OID description field value
|
|
|
|
*
|
|
|
|
* Other fields are filled based on @p configuratin (timeout, subagent string
|
|
|
|
* description)
|
|
|
|
*/
|
2022-09-06 16:04:29 +00:00
|
|
|
static void
|
|
|
|
open_pdu(struct snmp_proto *p, struct oid *oid)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2023-09-04 11:58:59 +00:00
|
|
|
const struct snmp_config *cf = SKIP_BACK(struct snmp_config, cf, p->p.cf);
|
2022-09-06 16:04:29 +00:00
|
|
|
sock *sk = p->sock;
|
2023-09-04 07:25:51 +00:00
|
|
|
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-18 16:06:24 +00:00
|
|
|
#define TIMEOUT_SIZE 4 /* 1B timeout, 3B zero padding */
|
|
|
|
if (c.size < AGENTX_HEADER_SIZE + TIMEOUT_SIZE + snmp_oid_size(oid) +
|
2023-09-04 11:58:59 +00:00
|
|
|
+ snmp_str_size(cf->description))
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_manage_tbuf(p, &c);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
struct agentx_header *h = (struct agentx_header *) c.buffer;
|
2023-08-08 17:00:54 +00:00
|
|
|
ADVANCE(c.buffer, c.size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_OPEN_PDU);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
STORE_U32(h->session_id, 1);
|
|
|
|
STORE_U32(h->transaction_id, 1);
|
|
|
|
STORE_U32(h->packet_id, 1);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-09-04 11:58:59 +00:00
|
|
|
c.size -= (4 + snmp_oid_size(oid) + snmp_str_size(cf->description));
|
2023-07-26 12:30:34 +00:00
|
|
|
c.buffer = snmp_put_fbyte(c.buffer, p->timeout);
|
|
|
|
c.buffer = snmp_put_oid(c.buffer, oid);
|
2023-09-04 11:58:59 +00:00
|
|
|
c.buffer = snmp_put_str(c.buffer, cf->description);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
uint s = update_packet_size(p, sk->tpos, c.buffer);
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2023-10-18 16:06:24 +00:00
|
|
|
#undef TIMEOUT_SIZE
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* send_notify_pdu - send an agentx-Notify-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: PDU notification Varbind name (OID)
|
|
|
|
* @data: PDU Varbind payload
|
|
|
|
* @size - PDU Varbind payload size
|
|
|
|
* @include_uptime: flag enabling inclusion of sysUpTime.0 OID
|
|
|
|
*/
|
2023-09-04 11:53:45 +00:00
|
|
|
void
|
2023-09-04 11:58:59 +00:00
|
|
|
snmp_notify_pdu(struct snmp_proto *p, struct oid *oid, void *data, uint size, int include_uptime)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
sock *sk = p->sock;
|
|
|
|
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
#define UPTIME_SIZE \
|
|
|
|
(6 * sizeof(u32)) /* sizeof( { u32 vb_type, u32 oid_hdr, u32 ids[4] } )*/
|
|
|
|
#define TRAP0_HEADER_SIZE \
|
|
|
|
(7 * sizeof(u32)) /* sizeof( { u32 vb_type, u32 oid_hdr, u32 ids[6] } ) */
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
uint sz = AGENTX_HEADER_SIZE + TRAP0_HEADER_SIZE + snmp_oid_size(oid) \
|
2023-09-04 11:46:02 +00:00
|
|
|
+ size;
|
2023-09-04 07:25:51 +00:00
|
|
|
|
|
|
|
if (include_uptime)
|
|
|
|
sz += UPTIME_SIZE;
|
2023-09-04 11:46:02 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (c.size < sz)
|
|
|
|
snmp_manage_tbuf(p, &c);
|
|
|
|
|
2023-09-04 11:46:02 +00:00
|
|
|
struct agentx_header *h = (struct agentx_header *) c.buffer;
|
|
|
|
ADVANCE(c.buffer, c.size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_NOTIFY_PDU);
|
2023-09-11 11:06:20 +00:00
|
|
|
p->packet_id++;
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_session(p, h);
|
2023-09-04 11:46:02 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (include_uptime)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
/* sysUpTime.0 oid */
|
|
|
|
struct oid uptime = {
|
|
|
|
.n_subid = 4,
|
2023-09-04 11:51:29 +00:00
|
|
|
.prefix = SNMP_MGMT,
|
2023-09-04 07:25:51 +00:00
|
|
|
.include = 0,
|
|
|
|
.pad = 0,
|
|
|
|
};
|
|
|
|
u32 uptime_ids[] = { 1, 1, 3, 0 };
|
|
|
|
|
|
|
|
struct agentx_varbind *vb = snmp_create_varbind(c.buffer, &uptime);
|
|
|
|
for (uint i = 0; i < uptime.n_subid; i++)
|
|
|
|
STORE_U32(vb->name.ids[i], uptime_ids[i]);
|
2023-09-04 11:58:59 +00:00
|
|
|
snmp_varbind_ticks(vb, c.size, (current_time() TO_S) / 100);
|
2023-11-15 11:37:10 +00:00
|
|
|
ADVANCE(c.buffer, c.size, snmp_varbind_size(vb));
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* snmpTrapOID.0 oid */
|
|
|
|
struct oid trap0 = {
|
|
|
|
.n_subid = 6,
|
|
|
|
.prefix = 6,
|
|
|
|
.include = 0,
|
|
|
|
.pad = 0,
|
|
|
|
};
|
|
|
|
u32 trap0_ids[] = { 3, 1, 1, 4, 1, 0 };
|
2023-09-04 11:58:59 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
struct agentx_varbind *trap_vb = snmp_create_varbind(c.buffer, &trap0);
|
|
|
|
for (uint i = 0; i < trap0.n_subid; i++)
|
|
|
|
STORE_U32(trap_vb->name.ids[i], trap0_ids[i]);
|
|
|
|
trap_vb->type = AGENTX_OBJECT_ID;
|
2023-11-15 10:29:19 +00:00
|
|
|
snmp_put_oid(snmp_varbind_data(trap_vb), oid);
|
2023-11-15 11:37:10 +00:00
|
|
|
ADVANCE(c.buffer, c.size, snmp_varbind_size(trap_vb));
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 11:58:59 +00:00
|
|
|
memcpy(c.buffer, data, size);
|
|
|
|
ADVANCE(c.buffer, c.size, size);
|
2023-09-04 07:25:51 +00:00
|
|
|
|
2023-11-08 12:10:13 +00:00
|
|
|
uint s = update_packet_size(p, sk->tpos, c.buffer);
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
#undef TRAP0_HEADER_SIZE
|
2023-09-04 11:58:59 +00:00
|
|
|
#undef UPTIME_SIZE
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
#if 0
|
|
|
|
/*
|
|
|
|
* de_allocate_pdu - common functionality for allocation PDUs
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: OID to allocate/deallocate
|
|
|
|
* @type: allocate/deacollcate PDU type
|
|
|
|
* @flags: type of allocation (NEW_INDEX, ANY_INDEX)
|
|
|
|
*
|
|
|
|
* This function is internal and shouldn't be used outside the SNMP module.
|
|
|
|
*/
|
2023-09-04 07:25:51 +00:00
|
|
|
static void
|
2023-11-08 09:55:42 +00:00
|
|
|
de_allocate_pdu(struct snmp_proto *p, struct oid *oid, enum agentx_pdu_types type, u8 flags)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
sock *sk = p->sock;
|
|
|
|
byte *buf, *pkt;
|
|
|
|
buf = pkt = sk->tbuf;
|
|
|
|
uint size = sk->tbsize;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, p->sock);
|
2023-09-04 07:25:51 +00:00
|
|
|
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
if (size > AGENTX_HEADER_SIZE + 0) // TODO additional size
|
2023-09-04 07:25:51 +00:00
|
|
|
{
|
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(pkt, struct agentx_header, h);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, type);
|
|
|
|
snmp_session(p, h);
|
2023-09-04 07:25:51 +00:00
|
|
|
|
|
|
|
struct agentx_varbind *vb = (struct agentx_varbind *) pkt;
|
2023-11-08 09:55:42 +00:00
|
|
|
|
|
|
|
// TODO
|
2023-09-04 07:25:51 +00:00
|
|
|
STORE_16(vb->type, AGENTX_OBJECT_ID);
|
2023-11-08 09:55:42 +00:00
|
|
|
STORE(vb->oid, 0);
|
2023-09-04 07:25:51 +00:00
|
|
|
}
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
void
|
|
|
|
snmp_allocate(struct snmp_proto *p, struct oid *oid, u8 flags)
|
|
|
|
{
|
|
|
|
/* TODO - call the de_allocate_pdu() */
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
snmp_deallocate(struct snmp_proto *p, struct oid *oid, u8 flags)
|
|
|
|
{
|
|
|
|
/* TODO - call the de_allocate_pdu() */
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* un_register_pdu - common functionality for registration PDUs
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: OID to register/unregister
|
|
|
|
* @bound: OIDs registration upper bound
|
|
|
|
* @index: OIDs registration n_subid index
|
|
|
|
* @type: register/unregister PDU type
|
|
|
|
* @is_instance: flag enabling instance registration (used only for register)
|
|
|
|
* @contid: context ID to register in (currently unsupported)
|
|
|
|
*
|
|
|
|
* Both register and unregister PDUs are capable of specifing a number of OIDs
|
|
|
|
* by using pair of index and upper bound. The index (r.range_subid) points into
|
|
|
|
* the OID's n_subid array to ID being threated as variable. The upper bound
|
|
|
|
* (r.upper_bound) determins maximal value for n_subid selected by index.
|
|
|
|
* The index and upper bound are passed as @index, and @bound respectively.
|
|
|
|
*
|
|
|
|
* Zero value for @is_instance means we want to register/unregister OID as a MIB
|
|
|
|
* subtree, for nonzero value we are registering MIB tree an instance (leaf).
|
|
|
|
*
|
|
|
|
* This function in internal and shoulnd't be used outside the SNMP module,
|
|
|
|
* see snmp_register() and snmp_unregister() functions.
|
|
|
|
*/
|
2023-09-04 07:25:51 +00:00
|
|
|
static void
|
2023-11-08 09:55:42 +00:00
|
|
|
un_register_pdu(struct snmp_proto *p, struct oid *oid, uint bound, uint index, enum agentx_pdu_types type, u8 is_instance, uint UNUSED contid)
|
2022-09-06 16:04:29 +00:00
|
|
|
{
|
2023-11-15 10:29:19 +00:00
|
|
|
/* used for agentx-Register-PDU and agentx-Unregister-PDU */
|
2023-09-04 12:01:08 +00:00
|
|
|
const struct snmp_config *cf = SKIP_BACK(struct snmp_config, cf, p->p.cf);
|
2022-09-06 16:04:29 +00:00
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* conditional +4 for upper-bound (optinal field) */
|
2023-11-08 09:55:42 +00:00
|
|
|
uint sz = AGENTX_HEADER_SIZE + snmp_oid_size(oid) + ((bound > 1) ? 4 : 0);
|
2023-09-11 11:06:20 +00:00
|
|
|
|
|
|
|
if (c.size < sz)
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_manage_tbuf(p, &c);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-09-11 11:06:20 +00:00
|
|
|
struct agentx_header *h = (struct agentx_header *) c.buffer;
|
|
|
|
ADVANCE(c.buffer, c.size, AGENTX_HEADER_SIZE);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_header(h, type, is_instance ? AGENTX_FLAG_INSTANCE_REGISTRATION : 0);
|
2023-08-08 17:00:54 +00:00
|
|
|
p->packet_id++;
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_session(p, h);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-11 11:06:20 +00:00
|
|
|
struct agentx_un_register_hdr *ur = (struct agentx_un_register_hdr *) c.buffer;
|
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
/* do not override timeout */
|
2023-09-04 11:58:59 +00:00
|
|
|
STORE_U8(ur->timeout, p->timeout);
|
2023-09-04 07:25:51 +00:00
|
|
|
/* default priority */
|
2023-09-04 12:01:08 +00:00
|
|
|
STORE_U8(ur->priority, cf->priority);
|
2023-11-08 09:55:42 +00:00
|
|
|
STORE_U8(ur->range_subid, (bound > 1) ? index : 0);
|
2023-09-04 11:58:59 +00:00
|
|
|
STORE_U8(ur->pad, 0);
|
2023-09-11 11:06:20 +00:00
|
|
|
ADVANCE(c.buffer, c.size, sizeof(struct agentx_un_register_hdr));
|
2023-07-26 12:30:34 +00:00
|
|
|
|
|
|
|
snmp_put_oid(c.buffer, oid);
|
|
|
|
ADVANCE(c.buffer, c.size, snmp_oid_size(oid));
|
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* place upper-bound if needed */
|
2023-11-08 09:55:42 +00:00
|
|
|
if (bound > 1)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-11-08 09:55:42 +00:00
|
|
|
STORE_PTR(c.buffer, bound);
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(c.buffer, c.size, 4);
|
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
uint s = update_packet_size(p, sk->tpos, c.buffer);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_register - send an agentx-Register-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: OID to register
|
|
|
|
* @bound: OIDs registration upper bound
|
|
|
|
* @index: OIDs registration n_subid index
|
|
|
|
* @is_instance: flag enabling instance registration
|
|
|
|
* @contid: context ID to register in (currently unsupported)
|
|
|
|
*
|
|
|
|
* For more detailed description see un_register_pdu() function.
|
|
|
|
*/
|
2022-12-10 17:08:00 +00:00
|
|
|
void
|
2023-11-08 09:55:42 +00:00
|
|
|
snmp_register(struct snmp_proto *p, struct oid *oid, uint bound, uint index, u8 is_instance, uint contid)
|
2022-09-06 16:04:29 +00:00
|
|
|
{
|
2023-11-08 09:55:42 +00:00
|
|
|
un_register_pdu(p, oid, bound, index, AGENTX_REGISTER_PDU, is_instance, contid);
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_unregister - send an agentx-Unregister-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: OID to uregister
|
|
|
|
* @bound: OIDs unregistration upper bound
|
|
|
|
* @index: OIDs unregistration n_subid index
|
|
|
|
* @contid: context ID to unregister from (currently unsupported)
|
|
|
|
*
|
|
|
|
* For more detailed description see un_register_pdu() function.
|
|
|
|
*/
|
2022-12-10 17:08:00 +00:00
|
|
|
void UNUSED
|
2023-09-11 11:06:20 +00:00
|
|
|
snmp_unregister(struct snmp_proto *p, struct oid *oid, uint len, uint index, uint contid)
|
2022-09-06 16:04:29 +00:00
|
|
|
{
|
2023-09-11 11:06:20 +00:00
|
|
|
un_register_pdu(p, oid, len, index, AGENTX_UNREGISTER_PDU, 0, contid);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* close_pdu - send an agentx-Close-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @reason: reason for closure
|
|
|
|
*/
|
2022-08-10 15:31:32 +00:00
|
|
|
static void
|
2023-11-08 09:55:42 +00:00
|
|
|
close_pdu(struct snmp_proto *p, enum agentx_close_reasons reason)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-08-10 15:31:32 +00:00
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
#define REASON_SIZE 4
|
|
|
|
if (c.size < AGENTX_HEADER_SIZE + REASON_SIZE)
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_manage_tbuf(p, &c);
|
|
|
|
|
|
|
|
struct agentx_header *h = (struct agentx_header *) c.buffer;
|
|
|
|
ADVANCE(c.buffer, c.size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_CLOSE_PDU);
|
2023-08-08 17:00:54 +00:00
|
|
|
p->packet_id++;
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_session(p, h);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
snmp_put_fbyte(c.buffer, (u8) reason);
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(c.buffer, c.size, 4);
|
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
uint s = update_packet_size(p, sk->tpos, c.buffer);
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2023-10-25 10:41:23 +00:00
|
|
|
#undef REASON_SIZE
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_close_pdu - parse an agentx-Close-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt_start: pointer to first byte of PDU
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-10-25 10:56:23 +00:00
|
|
|
static uint
|
|
|
|
parse_close_pdu(struct snmp_proto *p, byte * const pkt_start, uint size)
|
2023-10-19 14:27:04 +00:00
|
|
|
{
|
2023-10-25 10:56:23 +00:00
|
|
|
byte *pkt = pkt_start;
|
|
|
|
struct agentx_header *h = (void *) pkt;
|
|
|
|
ADVANCE(pkt, size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
2023-10-25 10:56:23 +00:00
|
|
|
if (pkt_size != 0)
|
2023-10-19 14:27:04 +00:00
|
|
|
{
|
2023-10-25 10:56:23 +00:00
|
|
|
snmp_simple_response(p, AGENTX_RES_GEN_ERROR, 0);
|
|
|
|
// TODO: best solution for possibly malicious pkt_size
|
|
|
|
//return AGENTX_HEADER_SIZE + MIN(size, pkt_size);
|
|
|
|
return AGENTX_HEADER_SIZE;
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
|
2023-10-25 10:56:23 +00:00
|
|
|
snmp_simple_response(p, AGENTX_RES_NO_ERROR, 0);
|
|
|
|
snmp_sock_disconnect(p, 1); // TODO: should we try to reconnect (2nd arg) ??
|
|
|
|
return AGENTX_HEADER_SIZE;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* snmp_testset - check possibility of VarBind name and data setting
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @vb: checked VarBind
|
|
|
|
* @oid: pool-allocated prefixed copy of VarBind name
|
|
|
|
* @pkt_size: number of not parsed bytes in processed PDU
|
|
|
|
*
|
|
|
|
* Check done by specialized function for specific MIB subtree whether
|
|
|
|
* the VarBind is valid for set action (changing to current value to value
|
|
|
|
* in VarBind).
|
|
|
|
*
|
|
|
|
* Return 1 if the VarBind setting is possible, 0 otherwise.
|
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
/* MUCH better signature would be
|
|
|
|
static int snmp_testset(struct snmp_proto *p, const struct agentx_varbind *vb, uint pkt_size);
|
|
|
|
*/
|
2023-10-25 14:57:46 +00:00
|
|
|
static int UNUSED
|
2023-10-19 14:27:04 +00:00
|
|
|
snmp_testset(struct snmp_proto *p, const struct agentx_varbind *vb, struct oid *oid, uint pkt_size)
|
|
|
|
{
|
|
|
|
/* Hard-coded no support for writing */
|
|
|
|
(void)p;(void)vb;(void)oid;(void)pkt_size;
|
|
|
|
return 0;
|
|
|
|
#if 0
|
|
|
|
// TODO better logic
|
|
|
|
if (!oid)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
switch (oid->ids[1])
|
|
|
|
{
|
|
|
|
case SNMP_BGP4_MIB:
|
|
|
|
return snmp_bgp_testset(p, vb, oid, pkt_size);
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
#if 0
|
|
|
|
static void UNUSED
|
|
|
|
addagentcaps_pdu(struct snmp_proto *p, struct oid *cap, char *descr,
|
2023-10-25 14:23:39 +00:00
|
|
|
uint descr_len)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
ASSUME(descr != NULL && descr_len > 0);
|
|
|
|
sock *sk = p->sock;
|
|
|
|
//byte *buf = sk->tbuf;
|
|
|
|
//uint size = sk->tbsize;
|
2023-10-18 16:06:24 +00:00
|
|
|
// TO-DO rename to pkt and add pkt_start
|
2023-07-26 12:30:34 +00:00
|
|
|
byte *buf = sk->tpos;
|
|
|
|
uint size = sk->tbuf + sk->tbsize - sk->tpos;
|
|
|
|
|
2023-10-25 14:23:39 +00:00
|
|
|
if (size < AGENTX_HEADER_SIZE + snmp_oid_size(cap) + snmp_str_size_from_len(descr_len))
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-10-18 16:06:24 +00:00
|
|
|
/* TO-DO need more mem */
|
2023-07-26 12:30:34 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(buf, struct agentx_header, h);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_ADD_AGENT_CAPS_PDU);
|
|
|
|
snmp_session(p, h);
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(buf, size, AGENTX_HEADER_SIZE);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
uint in_pkt;
|
|
|
|
if (c && c->length)
|
|
|
|
{
|
|
|
|
SNMP_HAS_CONTEXT(h);
|
|
|
|
ADVANCE(buf, size, in_pkt);
|
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
// memcpy(buf, cap, snmp_oid_size(cap));
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(buf, size, snmp_oid_size(cap));
|
2022-08-02 14:12:09 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
in_pkt = snmp_put_nstr(buf, descr, descr_len) - buf;
|
|
|
|
ADVANCE(buf, size, in_pkt);
|
|
|
|
|
|
|
|
// make a note in the snmp_proto structure
|
|
|
|
|
|
|
|
//int ret = sk_send(sk, buf - sk->tbuf);
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, buf - sk->tpos);
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void UNUSED
|
2023-10-25 14:23:39 +00:00
|
|
|
removeagentcaps_pdu(struct snmp_proto *p, struct oid *cap)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
sock *sk = p->sock;
|
|
|
|
|
|
|
|
//byte *buf = sk->tbuf;
|
|
|
|
//uint size = sk->tbsize;
|
2023-10-18 16:06:24 +00:00
|
|
|
// TO-DO rename to pkt and add pkt_start
|
2023-07-26 12:30:34 +00:00
|
|
|
byte *buf = sk->tpos;
|
|
|
|
uint size = sk->tbuf + sk->tbsize - sk->tpos;
|
|
|
|
|
2023-10-25 14:23:39 +00:00
|
|
|
if (size < AGENTX_HEADER_SIZE + snmp_oid_size(cap))
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-10-18 16:06:24 +00:00
|
|
|
/* TO-DO need more mem */
|
2023-07-26 12:30:34 +00:00
|
|
|
return;
|
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(buf, struct agentx_header, h);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_session(p, h);
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(buf, size, AGENTX_HEADER_SIZE);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2023-07-26 12:34:01 +00:00
|
|
|
uint in_pkt;
|
|
|
|
if (c && c->length)
|
|
|
|
{
|
|
|
|
SNMP_HAS_CONTEXT(h);
|
|
|
|
ADVANCE(buf, size, in_pkt);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2023-07-26 12:34:01 +00:00
|
|
|
|
|
|
|
memcpy(buf, cap, snmp_oid_size(cap));
|
|
|
|
ADVANCE(buf, size, snmp_oid_size(cap));
|
|
|
|
|
|
|
|
// update state in snmp_proto structure
|
|
|
|
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, buf - sk->tpos);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2023-07-26 12:34:01 +00:00
|
|
|
#endif
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* refresh_ids - Copy current ids from packet to protocol
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @h: PDU header with new transaction_id and packet_id ids.
|
|
|
|
*/
|
2022-09-06 16:04:29 +00:00
|
|
|
static inline void
|
|
|
|
refresh_ids(struct snmp_proto *p, struct agentx_header *h)
|
|
|
|
{
|
2023-11-15 11:37:10 +00:00
|
|
|
p->transaction_id = LOAD_U32(h->transaction_id);
|
|
|
|
p->packet_id = LOAD_U32(h->packet_id);
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_test_set_pdu - parse an agentx-TestSet-PDU in buffer
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt_start: first byte of test set PDU
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
static uint
|
2023-10-25 10:41:23 +00:00
|
|
|
parse_test_set_pdu(struct snmp_proto *p, byte * const pkt_start, uint size)
|
2023-10-19 14:27:04 +00:00
|
|
|
{
|
2023-11-15 10:29:19 +00:00
|
|
|
TRACE(D_PACKETS, "SNMP received agentx-TestSet-PDU");
|
2023-10-25 10:41:23 +00:00
|
|
|
byte *pkt = pkt_start; /* pointer to agentx-TestSet-PDU in RX-buffer */
|
2023-10-19 14:27:04 +00:00
|
|
|
uint s; /* final packat size */
|
|
|
|
struct agentx_response *res; /* pointer to reponse in TX-buffer */
|
|
|
|
|
|
|
|
struct agentx_header *h = (void *) pkt;
|
|
|
|
ADVANCE(pkt, size, AGENTX_HEADER_SIZE);
|
2023-11-15 10:29:19 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
2023-10-25 14:57:46 +00:00
|
|
|
if (pkt_size < size)
|
|
|
|
return 0;
|
|
|
|
|
2023-10-19 14:27:04 +00:00
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
|
|
|
if (c.size < AGENTX_HEADER_SIZE)
|
|
|
|
snmp_manage_tbuf(p, &c);
|
|
|
|
|
|
|
|
res = prepare_response(p, &c);
|
|
|
|
|
|
|
|
/* 0 if there is piece, that we cannot set */
|
|
|
|
int all_possible = 0;
|
|
|
|
/* the all_possible is currently hard-coded with no support for writing to mib
|
|
|
|
* variables, when implementing the mentioned support, change the initializer
|
|
|
|
* to 1
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
// TODO think about future value setting data structure
|
|
|
|
//struct agentx_transaction *tr = mb_alloc(...);
|
|
|
|
void *tr = mb_alloc(p->pool, 16);
|
|
|
|
|
|
|
|
struct agentx_varbind *vb;
|
|
|
|
uint sz;
|
|
|
|
while (size > 0 && all_possible)
|
|
|
|
{
|
|
|
|
vb = (void *) pkt;
|
|
|
|
sz = snmp_varbind_size(vb, 0);
|
|
|
|
|
|
|
|
if (sz > size)
|
|
|
|
/* wait for more data to arive */
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (sz > pkt_size)
|
|
|
|
{
|
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
2023-11-08 09:55:42 +00:00
|
|
|
all_possible = 0;
|
|
|
|
break;
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Unknown VarBind type check */
|
|
|
|
if (!snmp_test_varbind(vb))
|
|
|
|
{
|
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
2023-11-08 09:55:42 +00:00
|
|
|
all_possible = 0;
|
|
|
|
break;
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
ADVANCE(pkt, size, snmp_varbind_size(vb, 0));
|
|
|
|
|
|
|
|
// TODO remove the mb_alloc() in prefixize()
|
2023-11-15 11:37:10 +00:00
|
|
|
struct oid *work = snmp_prefixize(p, &vb->name);
|
2023-10-19 14:27:04 +00:00
|
|
|
(void)work;
|
|
|
|
all_possible = snmp_testset(p, vb, tr, work, pkt_size);
|
|
|
|
mb_free(work);
|
|
|
|
}
|
|
|
|
mb_free(tr);
|
|
|
|
#endif
|
2023-10-25 10:41:23 +00:00
|
|
|
s = update_packet_size(p, sk->tpos, c.buffer);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
|
|
|
if (c.error != AGENTX_RES_NO_ERROR)
|
2023-10-25 10:56:23 +00:00
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
response_err_ind(res, c.error, c.index + 1);
|
2023-10-25 10:56:23 +00:00
|
|
|
snmp_error(p);
|
|
|
|
}
|
2023-10-19 14:27:04 +00:00
|
|
|
else if (all_possible)
|
|
|
|
response_err_ind(res, AGENTX_RES_NO_ERROR, 0);
|
|
|
|
else
|
2023-10-25 10:41:23 +00:00
|
|
|
/* This is an recoverable error, we do not need to reset the connection */
|
|
|
|
//response_err_ind(res, AGENTX_RES_RESOURCE_UNAVAILABLE, c.index + 1);
|
|
|
|
response_err_ind(res, AGENTX_RES_NOT_WRITABLE, c.index + 1);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
|
|
|
sk_send(sk, s);
|
|
|
|
return pkt - pkt_start;
|
|
|
|
}
|
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
/*
|
2023-11-08 09:55:42 +00:00
|
|
|
* parse_set_pdu - common functionality for commit set and undo set PDUs
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt_start: pointer to first byte of on of set related PDU
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
* @error: error status to use
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
2023-10-25 10:41:23 +00:00
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
static uint
|
2023-11-08 09:55:42 +00:00
|
|
|
parse_set_pdu(struct snmp_proto *p, byte * const pkt_start, uint size, enum agentx_response_errs err)
|
2023-10-19 14:27:04 +00:00
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
byte *pkt = pkt_start;
|
2023-10-19 14:27:04 +00:00
|
|
|
struct agentx_header *h = (void *) pkt;
|
|
|
|
ADVANCE(pkt, size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
if (pkt_size != 0)
|
|
|
|
{
|
|
|
|
snmp_simple_response(p, AGENTX_RES_PARSE_ERROR, 0);
|
|
|
|
// TODO: best solution for possibly malicious pkt_size
|
|
|
|
return MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
// use varbind_list_size()??
|
|
|
|
}
|
|
|
|
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, p->sock);
|
2023-10-19 14:27:04 +00:00
|
|
|
if (c.size < sizeof(struct agentx_response))
|
|
|
|
snmp_manage_tbuf(p, &c);
|
|
|
|
|
|
|
|
struct agentx_response *r = prepare_response(p, &c);
|
|
|
|
|
|
|
|
if (size < pkt_size)
|
|
|
|
{
|
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
2023-11-08 09:55:42 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// TODO: free resource allocated by parse_test_set_pdu()
|
|
|
|
// TODO: do something meaningful
|
|
|
|
//mb_free(tr);
|
|
|
|
c.error = err;
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
response_err_ind(r, c.error, 0);
|
|
|
|
sk_send(p->sock, AGENTX_HEADER_SIZE);
|
2023-10-25 10:56:23 +00:00
|
|
|
|
|
|
|
/* Reset the connection on unrecoverable error */
|
|
|
|
if (c.error != AGENTX_RES_NO_ERROR && c.error != err)
|
|
|
|
snmp_error(p);
|
|
|
|
|
2023-10-19 14:27:04 +00:00
|
|
|
return pkt - pkt_start;
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_commit_set_pdu - parse an agentx-CommitSet-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt: pointer to first byte of PDU inside RX-buffer
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
static uint
|
|
|
|
parse_commit_set_pdu(struct snmp_proto *p, byte *pkt, uint size)
|
|
|
|
{
|
|
|
|
// don't forget to free resoures allocated by parse_test_set_pdu()
|
|
|
|
//mb_free(tr);
|
|
|
|
return parse_set_pdu(p, pkt, size, AGENTX_RES_COMMIT_FAILED);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_undo_set_pdu - parse an agentx-UndoSet-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt: pointer to first byte of PDU inside RX-buffer
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from buffer.
|
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
static uint
|
|
|
|
parse_undo_set_pdu(struct snmp_proto *p, byte *pkt, uint size)
|
|
|
|
{
|
|
|
|
// don't forget to free resources allocated by parse_test_set_pdu()
|
|
|
|
//mb_free(tr);
|
|
|
|
return parse_set_pdu(p, pkt, size, AGENTX_RES_UNDO_FAILED);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_cleanup_set_pdu - parse an agentx-CleanupSet-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt_start: pointer to first byte of PDU inside RX-buffer
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-10-19 14:27:04 +00:00
|
|
|
static uint
|
2023-10-25 10:41:23 +00:00
|
|
|
parse_cleanup_set_pdu(struct snmp_proto *p, byte * const pkt_start, uint size)
|
2023-10-19 14:27:04 +00:00
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
(void)p;
|
|
|
|
//TODO:
|
2023-10-19 14:27:04 +00:00
|
|
|
// don't forget to free resources allocated by parse_test_set_pdu()
|
2023-10-25 10:41:23 +00:00
|
|
|
//mb_free(p->tr);
|
2023-10-19 14:27:04 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
byte *pkt = pkt_start;
|
2023-10-19 14:27:04 +00:00
|
|
|
struct agentx_header *h = (void *) pkt;
|
2023-11-15 11:37:10 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-10-25 10:41:23 +00:00
|
|
|
|
|
|
|
/* errors are dropped silently, we must not send any agentx-Response-PDU */
|
|
|
|
if (pkt_size != 0)
|
|
|
|
{
|
|
|
|
// TODO should we free even for malformed packets ??
|
|
|
|
return MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
}
|
2023-10-19 14:27:04 +00:00
|
|
|
|
|
|
|
/* No agentx-Response-PDU is sent in response to agentx-CleanupSet-PDU */
|
2023-10-25 10:41:23 +00:00
|
|
|
return pkt_size;
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
|
2023-03-14 13:10:08 +00:00
|
|
|
/**
|
2023-11-08 09:55:42 +00:00
|
|
|
* parse_pkt - parse received AgentX packet
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt: first byte of PDU inside RX-buffer
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
* @skip: length of header that stays still in partial processing
|
2023-03-14 13:10:08 +00:00
|
|
|
*
|
2023-11-08 09:55:42 +00:00
|
|
|
* Return number of bytes parsed from RX-buffer.
|
2023-03-14 13:10:08 +00:00
|
|
|
*/
|
|
|
|
static uint
|
2023-07-26 12:30:34 +00:00
|
|
|
parse_pkt(struct snmp_proto *p, byte *pkt, uint size, uint *skip)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
if (size < AGENTX_HEADER_SIZE)
|
2022-08-10 15:31:32 +00:00
|
|
|
return 0;
|
|
|
|
|
2023-03-14 13:10:08 +00:00
|
|
|
struct agentx_header *h = (void *) pkt;
|
2023-11-15 11:37:10 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2022-12-10 17:08:00 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
/* We need to see the responses for PDU such as
|
|
|
|
* agentx-Open-PDU, agentx-Register-PDU, ...
|
|
|
|
* even when we are outside the SNMP_CONNECTED state
|
|
|
|
*/
|
|
|
|
if (h->type == AGENTX_RESPONSE_PDU)
|
|
|
|
return parse_response(p, pkt, size);
|
|
|
|
|
|
|
|
if (p->state != SNMP_CONN ||
|
2023-11-15 11:37:10 +00:00
|
|
|
p->session_id != LOAD_U32(h->session_id))
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
struct agentx_header copy = {
|
|
|
|
.session_id = p->session_id,
|
|
|
|
.transaction_id = p->transaction_id,
|
|
|
|
.packet_id = p->packet_id,
|
|
|
|
};
|
|
|
|
|
|
|
|
snmp_simple_response(p, AGENTX_RES_NOT_OPEN, 0);
|
|
|
|
|
|
|
|
p->session_id = copy.session_id;
|
|
|
|
p->transaction_id = copy.transaction_id;
|
|
|
|
p->packet_id = copy.packet_id;
|
|
|
|
|
|
|
|
// TODO: fix the parsed size for possibly malitious packets
|
|
|
|
// this could be broken when sender sends the packet in two parts
|
|
|
|
// -> size < pkt_size;
|
|
|
|
// maliciously large pkt_size -> breaks the size >= pkt_size
|
|
|
|
// maybe move this test down to parse_*() functions
|
|
|
|
return MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (h->flags & AGENTX_NON_DEFAULT_CONTEXT)
|
|
|
|
{
|
|
|
|
// TODO: shouldn't we return a parseError or genError for
|
|
|
|
// packets that mustn't have a non-default context ??
|
|
|
|
snmp_simple_response(p, AGENTX_RES_UNSUPPORTED_CONTEXT, 0);
|
|
|
|
// TODO: fix the parsed size (as above)
|
|
|
|
return MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
refresh_ids(p, h);
|
|
|
|
switch (h->type)
|
|
|
|
{
|
2022-09-20 12:28:57 +00:00
|
|
|
case AGENTX_GET_PDU:
|
|
|
|
case AGENTX_GET_NEXT_PDU:
|
2022-09-30 07:36:09 +00:00
|
|
|
case AGENTX_GET_BULK_PDU:
|
2023-10-19 14:27:04 +00:00
|
|
|
return parse_gets2_pdu(p, pkt, size, skip);
|
2023-03-14 13:10:08 +00:00
|
|
|
|
|
|
|
case AGENTX_CLOSE_PDU:
|
2023-10-19 14:27:04 +00:00
|
|
|
return parse_close_pdu(p, pkt, size);
|
|
|
|
|
|
|
|
case AGENTX_TEST_SET_PDU:
|
|
|
|
return parse_test_set_pdu(p, pkt, size);
|
|
|
|
|
|
|
|
case AGENTX_COMMIT_SET_PDU:
|
|
|
|
return parse_commit_set_pdu(p, pkt, size);
|
|
|
|
|
|
|
|
case AGENTX_UNDO_SET_PDU:
|
|
|
|
return parse_undo_set_pdu(p, pkt, size);
|
|
|
|
|
|
|
|
case AGENTX_CLEANUP_SET_PDU:
|
|
|
|
return parse_cleanup_set_pdu(p, pkt, size);
|
2023-03-14 13:10:08 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
default:
|
2023-10-18 16:06:24 +00:00
|
|
|
/* drop the packet with unknown type silently */
|
2023-10-25 10:41:23 +00:00
|
|
|
return AGENTX_HEADER_SIZE;
|
2023-09-04 07:25:51 +00:00
|
|
|
}
|
2023-10-19 14:27:04 +00:00
|
|
|
}
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_response - parse an agentx-Response-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @res: pointer of agentx-Response-PDU header in RX-buffer
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-03-14 13:10:08 +00:00
|
|
|
static uint
|
|
|
|
parse_response(struct snmp_proto *p, byte *res, uint size)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
if (size < sizeof(struct agentx_response))
|
|
|
|
return 0;
|
|
|
|
|
2023-03-14 13:10:08 +00:00
|
|
|
struct agentx_response *r = (void *) res;
|
2022-08-10 15:31:32 +00:00
|
|
|
struct agentx_header *h = &r->h;
|
|
|
|
|
2023-11-15 11:37:10 +00:00
|
|
|
// todo reject not compiled byte order
|
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-09-11 11:06:20 +00:00
|
|
|
if (size < pkt_size + AGENTX_HEADER_SIZE)
|
2023-03-14 13:10:08 +00:00
|
|
|
return 0;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-19 14:27:04 +00:00
|
|
|
switch (r->error)
|
|
|
|
{
|
|
|
|
case AGENTX_RES_NO_ERROR:
|
|
|
|
do_response(p, res, size);
|
|
|
|
break;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-19 14:27:04 +00:00
|
|
|
case AGENTX_RES_NOT_OPEN:
|
|
|
|
if (p->state == SNMP_LOCKED || p->state == SNMP_INIT)
|
|
|
|
snmp_startup(p);
|
|
|
|
else
|
|
|
|
snmp_connected(p->sock);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AGENTX_RES_OPEN_FAILED:
|
|
|
|
if (p->state == SNMP_LOCKED || p->state == SNMP_INIT)
|
|
|
|
{
|
|
|
|
ASSUME(p->startup_timer);
|
|
|
|
p->startup_timer->hook = snmp_startup_timeout;
|
|
|
|
// TODO: better timeout
|
|
|
|
tm_set(p->startup_timer, current_time() + p->timeout S);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ASSUME(p->startup_timer);
|
|
|
|
p->startup_timer->hook = snmp_reconnect;
|
|
|
|
// TODO: better timeout
|
|
|
|
tm_set(p->startup_timer, current_time() + p->timeout S);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Registration errors */
|
|
|
|
case AGENTX_RES_DUPLICATE_REGISTER:
|
|
|
|
case AGENTX_RES_REQUEST_DENIED:
|
2023-10-25 14:57:46 +00:00
|
|
|
// TODO: more direct path to mib-specifiec code
|
|
|
|
snmp_register_ack(p, r, size);
|
2023-10-19 14:27:04 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
/* We are trying to unregister a MIB, the unknownRegistration has same
|
|
|
|
* effect as success */
|
|
|
|
case AGENTX_RES_UNKNOWN_REGISTER:
|
|
|
|
case AGENTX_RES_UNKNOWN_AGENT_CAPS:
|
2023-10-25 14:57:46 +00:00
|
|
|
case AGENTX_RES_UNSUPPORTED_CONTEXT:
|
2023-10-19 14:27:04 +00:00
|
|
|
case AGENTX_RES_PARSE_ERROR:
|
|
|
|
case AGENTX_RES_PROCESSING_ERR:
|
|
|
|
default:
|
|
|
|
/* erronous packet should be dropped quietly */
|
|
|
|
// TODO correct error?
|
2023-11-08 09:55:42 +00:00
|
|
|
snmp_log("received response with error '%s'", snmp_errs[get_u16(&r->error)]);
|
2023-10-19 14:27:04 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
return pkt_size + AGENTX_HEADER_SIZE;
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_register_mibs - register all MIB subtrees
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
*/
|
2022-12-10 17:08:00 +00:00
|
|
|
static void
|
2023-07-26 12:34:01 +00:00
|
|
|
snmp_register_mibs(struct snmp_proto *p)
|
|
|
|
{
|
2022-12-10 17:08:00 +00:00
|
|
|
snmp_bgp_register(p);
|
2023-10-18 16:06:24 +00:00
|
|
|
/* snmp_ospf_regsiter(p); ... */
|
2022-12-10 17:08:00 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* do_response - act on agentx-Response-PDU and protocol state
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @buf: RX-buffer with PDU bytes
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer.
|
|
|
|
*/
|
2023-03-14 13:10:08 +00:00
|
|
|
static void
|
2023-09-11 11:06:20 +00:00
|
|
|
do_response(struct snmp_proto *p, byte *buf, uint size)
|
2022-09-06 16:04:29 +00:00
|
|
|
{
|
|
|
|
struct agentx_response *r = (void *) buf;
|
|
|
|
struct agentx_header *h = &r->h;
|
2022-12-17 17:16:19 +00:00
|
|
|
|
2023-08-08 19:51:38 +00:00
|
|
|
/* TODO make it asynchronous for better speed */
|
2022-09-06 16:04:29 +00:00
|
|
|
switch (p->state)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
case SNMP_INIT:
|
2023-09-04 07:25:51 +00:00
|
|
|
case SNMP_LOCKED:
|
2023-11-08 09:55:42 +00:00
|
|
|
/* silent drop of received packet */
|
2023-09-04 07:25:51 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SNMP_OPEN:
|
2023-11-08 09:55:42 +00:00
|
|
|
/* copy session info from received packet */
|
2023-11-15 11:37:10 +00:00
|
|
|
p->session_id = LOAD_U32(h->session_id);
|
2023-07-26 12:30:34 +00:00
|
|
|
refresh_ids(p, h);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* the state needs to be changed before sending registering PDUs to
|
2022-12-17 17:16:19 +00:00
|
|
|
* use correct do_response action on them
|
|
|
|
*/
|
2022-12-10 17:08:00 +00:00
|
|
|
snmp_log("changing state to REGISTER");
|
2022-12-17 17:16:19 +00:00
|
|
|
p->state = SNMP_REGISTER;
|
|
|
|
snmp_register_mibs(p);
|
2022-08-10 15:31:32 +00:00
|
|
|
break;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-10-18 16:06:24 +00:00
|
|
|
case SNMP_REGISTER:;
|
2023-09-11 11:06:20 +00:00
|
|
|
byte *pkt = buf;
|
|
|
|
ADVANCE(pkt, size, AGENTX_HEADER_SIZE);
|
|
|
|
|
|
|
|
const struct oid *oid = (void *) pkt;
|
|
|
|
|
2023-10-25 14:57:46 +00:00
|
|
|
snmp_register_ack(p, r, snmp_get_mib_class(oid));
|
2023-09-11 11:06:20 +00:00
|
|
|
|
|
|
|
if (p->register_to_ack == 0)
|
|
|
|
{
|
2023-10-18 16:06:24 +00:00
|
|
|
snmp_log("changing state to CONNECTED");
|
2022-12-10 17:08:00 +00:00
|
|
|
p->state = SNMP_CONN;
|
2023-09-04 07:25:51 +00:00
|
|
|
proto_notify_state(&p->p, PS_UP);
|
2022-12-10 17:08:00 +00:00
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
break;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
case SNMP_CONN:
|
|
|
|
break;
|
|
|
|
|
2022-12-17 17:16:19 +00:00
|
|
|
case SNMP_STOP:
|
|
|
|
break;
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
default:
|
|
|
|
die("unkonwn SNMP state");
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_get_mib_class - classify MIB tree belongings of OID
|
|
|
|
* @oid: OID to be classified based on prefix
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
u8
|
|
|
|
snmp_get_mib_class(const struct oid *oid)
|
2022-11-05 15:29:00 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
// TODO check code paths for oid->n_subid < 3
|
2023-09-04 11:51:29 +00:00
|
|
|
if (oid->prefix != SNMP_MGMT && oid->ids[0] != SNMP_MIB_2)
|
2022-11-05 15:29:00 +00:00
|
|
|
return SNMP_CLASS_INVALID;
|
|
|
|
|
|
|
|
switch (oid->ids[1])
|
|
|
|
{
|
|
|
|
case SNMP_BGP4_MIB:
|
|
|
|
return SNMP_CLASS_BGP;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return SNMP_CLASS_END;
|
2022-12-10 17:08:00 +00:00
|
|
|
}
|
2022-11-05 15:29:00 +00:00
|
|
|
}
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_get_next - process single agentx-GetNext-PDU search range
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @o_start: SearchRange start OID
|
|
|
|
* @o_end: SearchRange end OID
|
|
|
|
* @c: transmit PDU context to use
|
|
|
|
*
|
|
|
|
* Return 0 if the created VarBind type is endOfMibView, 1 otherwise.
|
|
|
|
*/
|
2023-10-18 11:30:14 +00:00
|
|
|
static int
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_get_next2(struct snmp_proto *p, struct oid *o_start, struct oid *o_end,
|
2023-09-11 11:06:20 +00:00
|
|
|
struct snmp_pdu *c)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
enum snmp_search_res r;
|
|
|
|
struct oid *o_copy = search_mib(p, o_start, o_end, NULL, c, &r);
|
|
|
|
|
2023-08-08 18:47:30 +00:00
|
|
|
struct agentx_varbind *vb = NULL;
|
|
|
|
switch (r)
|
|
|
|
{
|
|
|
|
case SNMP_SEARCH_NO_OBJECT:
|
|
|
|
case SNMP_SEARCH_NO_INSTANCE:
|
|
|
|
case SNMP_SEARCH_END_OF_VIEW:;
|
|
|
|
uint sz = snmp_varbind_hdr_size_from_oid(o_start);
|
|
|
|
|
|
|
|
if (c->size < sz)
|
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
/* TODO create NULL varbind */
|
|
|
|
c->error = AGENTX_RES_GEN_ERROR;
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-08-08 18:47:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
vb = snmp_create_varbind(c->buffer, o_start);
|
|
|
|
vb->type = AGENTX_END_OF_MIB_VIEW;
|
|
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-08-08 18:47:30 +00:00
|
|
|
|
|
|
|
case SNMP_SEARCH_OK:
|
2023-09-04 07:25:51 +00:00
|
|
|
default:
|
2023-08-08 18:47:30 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
if (o_copy)
|
2023-08-08 18:47:30 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
/* basicaly snmp_create_varbind(c->buffer, o_copy), but without any copying */
|
2023-08-08 18:47:30 +00:00
|
|
|
vb = (void *) c->buffer;
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_mib_fill2(p, o_copy, c);
|
2023-08-08 18:47:30 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* override the error for GetNext-PDU object not find */
|
2023-08-08 18:47:30 +00:00
|
|
|
switch (vb->type)
|
|
|
|
{
|
|
|
|
case AGENTX_NO_SUCH_OBJECT:
|
|
|
|
case AGENTX_NO_SUCH_INSTANCE:
|
|
|
|
case AGENTX_END_OF_MIB_VIEW:
|
|
|
|
vb->type = AGENTX_END_OF_MIB_VIEW;
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-08-08 18:47:30 +00:00
|
|
|
|
2023-10-18 11:30:14 +00:00
|
|
|
default:
|
|
|
|
return 1;
|
2023-08-08 18:47:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (c->size < snmp_varbind_hdr_size_from_oid(o_start))
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-08-08 18:47:30 +00:00
|
|
|
// TODO FIXME this is a bit tricky as we need to renew all TX buffer pointers
|
|
|
|
snmp_manage_tbuf(p, c);
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
2023-08-08 18:47:30 +00:00
|
|
|
|
|
|
|
vb = snmp_create_varbind(c->buffer, o_start);
|
|
|
|
vb->type = AGENTX_END_OF_MIB_VIEW;
|
|
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_get_bulk - process one iteration of get bulk PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @o_start: SearchRange start OID
|
|
|
|
* @o_end: SearchRange end OID
|
|
|
|
* @state: state of get bulk PDU processing
|
|
|
|
* @c: transmit PDU context to use
|
|
|
|
*
|
|
|
|
* Return 0 if the created VarBind has type endOfMibView, 1 otherwise.
|
|
|
|
*/
|
2023-10-18 11:30:14 +00:00
|
|
|
static int
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_get_bulk2(struct snmp_proto *p, struct oid *o_start, struct oid *o_end,
|
2023-09-11 11:06:20 +00:00
|
|
|
struct agentx_bulk_state *state, struct snmp_pdu *c)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
struct oid *o_curr = NULL;
|
|
|
|
struct oid *o_predecessor = NULL;
|
|
|
|
enum snmp_search_res r;
|
|
|
|
|
|
|
|
uint i = 0;
|
|
|
|
do
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
o_predecessor = o_curr;
|
|
|
|
o_curr = search_mib(p, o_start, o_end, o_curr, c, &r);
|
|
|
|
i++;
|
2023-10-18 11:30:14 +00:00
|
|
|
} while (o_curr && i < state->repetition);
|
|
|
|
|
|
|
|
// TODO check if the approach below works
|
2023-11-08 09:55:42 +00:00
|
|
|
// it need to generate varbinds that will be only of type endOfMibView
|
2023-09-04 07:25:51 +00:00
|
|
|
/* Object Identifier fall-backs */
|
|
|
|
if (!o_curr)
|
|
|
|
o_curr = o_predecessor;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (!o_curr)
|
|
|
|
o_curr = o_start;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
uint sz = snmp_varbind_hdr_size_from_oid(o_curr);
|
2022-11-19 22:00:02 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (c->size < sz)
|
|
|
|
{
|
|
|
|
c->error = AGENTX_RES_GEN_ERROR;
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-09-04 07:25:51 +00:00
|
|
|
}
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* we need the varbind handle to be able to override it's type */
|
|
|
|
struct agentx_varbind *vb = (void *) c->buffer;
|
|
|
|
vb->type = AGENTX_END_OF_MIB_VIEW;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (r == SNMP_SEARCH_OK)
|
|
|
|
/* the varbind will be recreated inside the snmp_mib_fill2() */
|
|
|
|
snmp_mib_fill2(p, o_curr, c);
|
|
|
|
else
|
|
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* override the error for GetBulk-PDU object not found */
|
|
|
|
switch (vb->type)
|
|
|
|
{
|
|
|
|
case AGENTX_NO_SUCH_OBJECT:
|
|
|
|
case AGENTX_NO_SUCH_INSTANCE:
|
|
|
|
case AGENTX_END_OF_MIB_VIEW:
|
|
|
|
vb->type = AGENTX_END_OF_MIB_VIEW;
|
2023-10-18 11:30:14 +00:00
|
|
|
return 0;
|
2023-03-14 13:10:08 +00:00
|
|
|
|
2023-10-18 11:30:14 +00:00
|
|
|
default:
|
|
|
|
return 1;
|
2023-03-14 13:10:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* update_packet_size - set PDU size
|
|
|
|
* @p - SNMP protocol instance
|
|
|
|
* @start - pointer to PDU data start (excluding header size)
|
|
|
|
* @end - pointer after the last PDU byte
|
|
|
|
*
|
|
|
|
* Return number of bytes in TX-buffer (including header size).
|
|
|
|
*/
|
2023-08-08 17:00:54 +00:00
|
|
|
static inline uint
|
2023-10-18 11:30:14 +00:00
|
|
|
update_packet_size(struct snmp_proto *p, const byte *start, byte *end)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-08-08 17:00:54 +00:00
|
|
|
struct agentx_header *h = (void *) p->sock->tpos;
|
|
|
|
size_t s = snmp_pkt_len(start, end);
|
|
|
|
STORE_U32(h->payload, s);
|
|
|
|
return AGENTX_HEADER_SIZE + s;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* response_err_ind - update response error and index
|
|
|
|
* @res: response PDU header
|
|
|
|
* @err: error status
|
|
|
|
* @ind: index of error, ignored for noAgentXError
|
|
|
|
*
|
|
|
|
* Update agentx-Response-PDU header fields res.error and it's res.index.
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
static inline void
|
2023-11-08 09:55:42 +00:00
|
|
|
response_err_ind(struct agentx_response *res, enum agentx_response_errs err, u16 ind)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-11-08 09:55:42 +00:00
|
|
|
STORE_U32(res->error, (u16) err);
|
2023-07-26 12:30:34 +00:00
|
|
|
if (err != AGENTX_RES_NO_ERROR && err != AGENTX_RES_PARSE_ERROR)
|
|
|
|
STORE_U32(res->index, ind);
|
|
|
|
else
|
|
|
|
STORE_U32(res->index, 0);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* parse_gets_pdu - parse received gets PDUs
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @pkt_start: pointer to first byte of received PDU
|
|
|
|
* @size: number of bytes received from a socket
|
|
|
|
* @skip: length of header that stays still in partial processing
|
|
|
|
*
|
|
|
|
* Gets PDUs are agentx-Get-PDU, agentx-GetNext-PDU, agentx-GetBulk-PDU.
|
|
|
|
*
|
|
|
|
* Return number of bytes parsed from RX-buffer
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
static uint
|
|
|
|
parse_gets2_pdu(struct snmp_proto *p, byte * const pkt_start, uint size, uint *skip)
|
|
|
|
{
|
2023-09-11 11:06:20 +00:00
|
|
|
// TODO checks for c.size underflow
|
2023-10-25 10:41:23 +00:00
|
|
|
uint ret = 0;
|
2023-07-26 12:30:34 +00:00
|
|
|
struct oid *o_start = NULL, *o_end = NULL;
|
|
|
|
byte *pkt = pkt_start;
|
|
|
|
|
|
|
|
struct agentx_header *h = (void *) pkt;
|
|
|
|
ADVANCE(pkt, size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
uint pkt_size = LOAD_U32(h->payload);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2023-09-04 11:46:02 +00:00
|
|
|
// TODO better handling of endianness
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-10-18 11:30:14 +00:00
|
|
|
/*
|
|
|
|
* Get-Bulk processing stops if all the varbind have type END_OF_MIB_VIEW
|
|
|
|
* has_any is true if some varbind has type other than END_OF_MIB_VIEW
|
|
|
|
*/
|
|
|
|
int has_any = 0;
|
2023-09-04 07:25:51 +00:00
|
|
|
struct agentx_bulk_state bulk_state = { };
|
|
|
|
if (h->type == AGENTX_GET_BULK_PDU)
|
|
|
|
{
|
|
|
|
if (size < sizeof(struct agentx_getbulk))
|
|
|
|
goto wait;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
if (pkt_size < sizeof(struct agentx_getbulk))
|
|
|
|
{
|
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
2023-10-25 10:41:23 +00:00
|
|
|
c.index = 0;
|
|
|
|
ret = MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
goto error;
|
2023-09-04 07:25:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct agentx_getbulk *bulk_info = (void *) pkt;
|
|
|
|
ADVANCE(pkt, pkt_size, sizeof(struct agentx_getbulk));
|
|
|
|
|
|
|
|
bulk_state = (struct agentx_bulk_state) {
|
|
|
|
.getbulk = {
|
2023-11-15 11:37:10 +00:00
|
|
|
.non_repeaters = LOAD_U32(bulk_info->non_repeaters),
|
|
|
|
.max_repetitions = LOAD_U32(bulk_info->max_repetitions),
|
2023-09-04 07:25:51 +00:00
|
|
|
},
|
2023-10-18 11:30:14 +00:00
|
|
|
/* In contrast to the RFC, we use 0-based indices. */
|
|
|
|
.index = 0,
|
|
|
|
.repetition = 0,
|
2023-09-04 07:25:51 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2023-10-19 14:08:13 +00:00
|
|
|
if (c.size < sizeof(struct agentx_response))
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
snmp_manage_tbuf(p, &c);
|
2023-10-25 14:23:39 +00:00
|
|
|
// TODO renew pkt, pkt_start pointers
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct agentx_response *response_header = prepare_response(p, &c);
|
|
|
|
|
|
|
|
while (c.error == AGENTX_RES_NO_ERROR && size > 0 && pkt_size > 0)
|
|
|
|
{
|
|
|
|
if (size < snmp_oid_sizeof(0))
|
|
|
|
goto partial;
|
|
|
|
|
|
|
|
/* We load search range start OID */
|
|
|
|
const struct oid *o_start_b = (void *) pkt;
|
|
|
|
uint sz;
|
|
|
|
if ((sz = snmp_oid_size(o_start_b)) > pkt_size)
|
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
|
|
|
ret = MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
goto error;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2023-09-04 07:25:51 +00:00
|
|
|
* If we already have written same relevant data to the TX buffer, then
|
2023-07-26 12:30:34 +00:00
|
|
|
* we send processed part, otherwise we don't have anything to send and
|
2023-11-08 09:55:42 +00:00
|
|
|
* need to wait for more data to be received.
|
2023-07-26 12:30:34 +00:00
|
|
|
*/
|
2023-10-25 10:41:23 +00:00
|
|
|
if (sz > size && c.index > 0)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
goto partial; /* send already processed part */
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
else if (sz > size)
|
|
|
|
{
|
|
|
|
goto wait;
|
|
|
|
}
|
|
|
|
|
2023-09-04 11:58:59 +00:00
|
|
|
/* Update buffer pointer and remaining size counters. */
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(pkt, pkt_size, sz);
|
|
|
|
size -= sz;
|
|
|
|
|
2023-08-08 19:51:38 +00:00
|
|
|
/*
|
2023-09-04 07:25:51 +00:00
|
|
|
* We load search range end OID
|
2023-07-26 12:30:34 +00:00
|
|
|
* The exactly same process of sanity checking is preformed while loading
|
2023-09-04 07:25:51 +00:00
|
|
|
* the SearchRange's end OID
|
2023-07-26 12:30:34 +00:00
|
|
|
*/
|
|
|
|
const struct oid *o_end_b = (void *) pkt;
|
|
|
|
if ((sz = snmp_oid_size(o_end_b)) > pkt_size)
|
|
|
|
{
|
2023-10-25 10:41:23 +00:00
|
|
|
c.error = AGENTX_RES_PARSE_ERROR;
|
|
|
|
ret = MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
goto error;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
if (sz > size && c.index > 0)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
|
|
|
size += snmp_oid_size(o_start_b);
|
|
|
|
goto partial;
|
|
|
|
}
|
|
|
|
else if (sz > size)
|
|
|
|
{
|
|
|
|
goto wait;
|
|
|
|
}
|
|
|
|
|
|
|
|
ADVANCE(pkt, pkt_size, sz);
|
|
|
|
size -= sz;
|
|
|
|
|
2023-09-04 11:58:59 +00:00
|
|
|
// TODO check for oversized OIDs before any allocation (in prefixize())
|
2023-08-08 18:47:30 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
/* We create copy of OIDs outside of rx-buffer and also prefixize them */
|
2023-11-15 11:37:10 +00:00
|
|
|
o_start = snmp_prefixize(p, o_start_b);
|
|
|
|
o_end = snmp_prefixize(p, o_end_b);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
|
|
|
if (!snmp_is_oid_empty(o_end) && snmp_oid_compare(o_start, o_end) > 0)
|
|
|
|
{
|
|
|
|
c.error = AGENTX_RES_GEN_ERROR;
|
2023-10-25 10:41:23 +00:00
|
|
|
ret = MIN(size, pkt_size + AGENTX_HEADER_SIZE);
|
|
|
|
goto error;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* TODO find mib_class, check if type is GET of GET_NEXT, act acordingly */
|
2023-07-26 12:30:34 +00:00
|
|
|
switch (h->type)
|
|
|
|
{
|
|
|
|
case AGENTX_GET_PDU:
|
|
|
|
snmp_mib_fill2(p, o_start, &c);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AGENTX_GET_NEXT_PDU:
|
|
|
|
snmp_get_next2(p, o_start, o_end, &c);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AGENTX_GET_BULK_PDU:
|
2023-10-25 10:41:23 +00:00
|
|
|
if (c.index >= bulk_state.getbulk.non_repeaters)
|
2023-10-18 11:30:14 +00:00
|
|
|
bulk_state.repeaters++;
|
|
|
|
|
|
|
|
// store the o_start, o_end
|
|
|
|
|
|
|
|
/* The behavior of GetBulk pdu in the first iteration is
|
|
|
|
* identical to GetNext pdu. */
|
2023-10-25 10:41:23 +00:00
|
|
|
has_any = snmp_get_next2(p, o_start, o_end, &c) | has_any;
|
2023-07-26 12:30:34 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
die("incorrect usage");
|
|
|
|
}
|
|
|
|
|
|
|
|
mb_free(o_start);
|
|
|
|
o_start = NULL;
|
|
|
|
mb_free(o_end);
|
|
|
|
o_end = NULL;
|
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
c.index++;
|
2023-07-26 12:30:34 +00:00
|
|
|
} /* while (c.error == AGENTX_RES_NO_ERROR && size > 0) */
|
|
|
|
|
2023-10-18 11:30:14 +00:00
|
|
|
if (h->type == AGENTX_GET_BULK_PDU)
|
|
|
|
{
|
|
|
|
for (bulk_state.repetition++;
|
|
|
|
has_any && bulk_state.repetition < bulk_state.getbulk.max_repetitions;
|
|
|
|
bulk_state.repetition++)
|
|
|
|
{
|
|
|
|
// TODO find propper start and end
|
|
|
|
struct oid *start = NULL;
|
|
|
|
struct oid *end = NULL;
|
|
|
|
has_any = 0;
|
|
|
|
for (bulk_state.index = 0; bulk_state.index < bulk_state.repeaters;
|
|
|
|
bulk_state.repeaters++)
|
2023-11-08 12:10:13 +00:00
|
|
|
has_any = snmp_get_bulk2(p, start, end, &bulk_state, &c) || has_any;
|
2023-10-18 11:30:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
/* send the constructed packet */
|
2023-11-08 12:10:13 +00:00
|
|
|
struct agentx_response *res;
|
|
|
|
if (p->last_header)
|
|
|
|
{
|
|
|
|
res = p->last_header;
|
|
|
|
p->last_header = NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
res = response_header;
|
|
|
|
|
2023-09-04 12:01:08 +00:00
|
|
|
/* We update the error, index pair on the beginning of the packet. */
|
2023-10-25 10:41:23 +00:00
|
|
|
response_err_ind(res, c.error, c.index + 1);
|
2023-11-08 12:10:13 +00:00
|
|
|
uint s = update_packet_size(p, (byte *) res, c.buffer);
|
2023-09-04 07:25:51 +00:00
|
|
|
|
2023-09-04 12:01:08 +00:00
|
|
|
/* We send the message in TX-buffer. */
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2023-09-04 07:25:51 +00:00
|
|
|
// TODO think through the error state
|
|
|
|
|
2023-09-04 12:01:08 +00:00
|
|
|
/* number of bytes parsed from RX-buffer */
|
2023-10-25 10:41:23 +00:00
|
|
|
ret = pkt - pkt_start;
|
|
|
|
goto free;
|
2023-09-04 12:01:08 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
partial:
|
2023-09-04 07:25:51 +00:00
|
|
|
/* need to tweak RX buffer packet size */
|
2023-11-08 12:10:13 +00:00
|
|
|
STORE_U32(h->payload, pkt_size);
|
2023-10-25 14:23:39 +00:00
|
|
|
*skip = AGENTX_HEADER_SIZE;
|
2023-11-08 12:10:13 +00:00
|
|
|
p->last_header = h;
|
2023-09-04 11:58:59 +00:00
|
|
|
|
|
|
|
/* number of bytes parsed from RX-buffer */
|
2023-10-25 10:41:23 +00:00
|
|
|
ret = pkt - pkt_start;
|
|
|
|
goto free;
|
2023-09-04 12:01:08 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
wait:
|
2023-09-11 11:06:20 +00:00
|
|
|
p->packet_id--; /* we did not use the packetID */
|
2023-10-25 10:41:23 +00:00
|
|
|
ret = 0;
|
|
|
|
goto free;
|
2023-09-04 12:01:08 +00:00
|
|
|
|
2023-10-25 10:41:23 +00:00
|
|
|
error:
|
|
|
|
if (c.index > UINT16_MAX)
|
|
|
|
snmp_simple_response(p, AGENTX_RES_GEN_ERROR, UINT16_MAX);
|
|
|
|
else
|
|
|
|
snmp_simple_response(p, c.error, c.index);
|
|
|
|
|
|
|
|
free:
|
|
|
|
mb_free(o_start);
|
|
|
|
mb_free(o_end);
|
|
|
|
return ret;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_start_subagent - send session open request
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
*
|
|
|
|
* Send agentx-Open-PDU with configured OID and string description.
|
|
|
|
*/
|
2022-08-02 14:04:25 +00:00
|
|
|
void
|
2022-08-10 15:31:32 +00:00
|
|
|
snmp_start_subagent(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
/* blank oid means unsupported */
|
2022-12-10 17:08:00 +00:00
|
|
|
struct oid *blank = snmp_oid_blank(p);
|
|
|
|
open_pdu(p, blank);
|
2023-09-04 07:25:51 +00:00
|
|
|
|
|
|
|
p->state = SNMP_OPEN;
|
|
|
|
|
2022-12-10 17:08:00 +00:00
|
|
|
mb_free(blank);
|
2022-08-02 14:04:25 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_stop_subagent - close established session
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
*
|
|
|
|
* Send agentx-Close-PDU on established session.
|
|
|
|
*/
|
2022-08-02 14:04:25 +00:00
|
|
|
void
|
2022-08-10 15:31:32 +00:00
|
|
|
snmp_stop_subagent(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2023-11-08 09:55:42 +00:00
|
|
|
if (p->state == SNMP_OPEN ||
|
|
|
|
p->state == SNMP_REGISTER ||
|
|
|
|
p->state == SNMP_CONN)
|
2022-09-20 12:28:57 +00:00
|
|
|
close_pdu(p, AGENTX_CLOSE_SHUTDOWN);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_rx - handle received PDUs in RX-buffer in normal operation
|
|
|
|
* @sk: communication socket
|
|
|
|
* @size: number of bytes received
|
|
|
|
*/
|
2023-03-14 13:10:08 +00:00
|
|
|
int
|
|
|
|
snmp_rx(sock *sk, uint size)
|
|
|
|
{
|
|
|
|
struct snmp_proto *p = sk->data;
|
|
|
|
byte *pkt_start = sk->rbuf;
|
2023-07-26 12:30:34 +00:00
|
|
|
byte *end = pkt_start + size;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In some cases we want to save the header for future parsing, skip is number
|
|
|
|
* of bytes that should not be overriden by memmove()
|
|
|
|
*/
|
|
|
|
uint skip = 0;
|
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
while (end >= pkt_start + AGENTX_HEADER_SIZE && skip == 0)
|
2023-03-14 13:10:08 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
uint parsed_len = parse_pkt(p, pkt_start, size, &skip);
|
|
|
|
|
2023-03-14 13:10:08 +00:00
|
|
|
if (parsed_len == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
pkt_start += parsed_len;
|
|
|
|
size -= parsed_len;
|
|
|
|
}
|
|
|
|
|
2023-08-08 18:47:30 +00:00
|
|
|
/* Incomplete packets */
|
|
|
|
if (skip != 0 || pkt_start != end)
|
2023-03-14 13:10:08 +00:00
|
|
|
{
|
2023-08-08 18:47:30 +00:00
|
|
|
memmove(sk->rbuf + skip, pkt_start, size);
|
|
|
|
sk->rpos = sk->rbuf + size + skip;
|
2023-03-14 13:10:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_tx - handle empty TX-buffer during session reset
|
|
|
|
* @sk: communication socket
|
|
|
|
*
|
|
|
|
* The socket tx_hook is called when the TX-buffer is empty, i.e. all data was
|
|
|
|
* send. This function is used only when we found malformed PDU and we are
|
|
|
|
* resetting the established session. If called we direcly reset the session.
|
2023-10-25 10:56:23 +00:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
snmp_tx(sock *sk)
|
|
|
|
{
|
|
|
|
struct snmp_proto *p = sk->data;
|
|
|
|
snmp_sock_disconnect(p, 1);
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_ping - send an agentx-Ping-PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
*/
|
2022-09-06 16:04:29 +00:00
|
|
|
void
|
|
|
|
snmp_ping(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-08-10 15:31:32 +00:00
|
|
|
sock *sk = p->sock;
|
2023-11-15 10:29:19 +00:00
|
|
|
struct snmp_pdu c;
|
|
|
|
snmp_pdu_context(&c, sk);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
if (c.size < AGENTX_HEADER_SIZE)
|
|
|
|
snmp_manage_tbuf(p, &c);
|
2022-09-30 07:36:09 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
struct agentx_header *h = (struct agentx_header *) c.buffer;
|
|
|
|
ADVANCE(c.buffer, c.size, AGENTX_HEADER_SIZE);
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_PING_PDU);
|
2023-08-08 17:00:54 +00:00
|
|
|
p->packet_id++;
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_session(p, h);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* sending only header -> pkt - buf */
|
2023-09-04 11:58:59 +00:00
|
|
|
uint s = update_packet_size(p, sk->tpos, c.buffer);
|
2023-09-11 11:06:20 +00:00
|
|
|
|
2023-10-19 14:20:37 +00:00
|
|
|
sk_send(sk, s);
|
2022-08-02 14:04:25 +00:00
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-12-17 17:16:19 +00:00
|
|
|
/**
|
2023-07-26 12:30:34 +00:00
|
|
|
* snmp_search_check_end_oid - check if oid is before SearchRange end
|
2022-12-17 17:16:19 +00:00
|
|
|
*
|
|
|
|
* @found: best oid found in MIB tree
|
|
|
|
* @bound: upper bound specified in SearchRange
|
|
|
|
*
|
|
|
|
* check if found oid meet the SearchRange upper bound condition in
|
|
|
|
* lexicographical order, returns boolean value
|
|
|
|
*/
|
2023-11-08 09:55:42 +00:00
|
|
|
int
|
|
|
|
snmp_search_check_end_oid(const struct oid *found, const struct oid *bound)
|
2022-09-20 12:28:57 +00:00
|
|
|
{
|
2022-12-17 17:16:19 +00:00
|
|
|
if (snmp_is_oid_empty(bound))
|
|
|
|
return 1;
|
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
return (snmp_oid_compare(found, bound) < 0);
|
2022-12-17 17:16:19 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* search_mib - search for successor of given OID
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @o_start: search starting OID
|
|
|
|
* @o_end: search ending OID
|
|
|
|
* @o_curr: current OID inside @o_start, @o_end interval
|
|
|
|
* @c: transmit PDU context to use
|
|
|
|
* @result: search result state
|
|
|
|
*
|
|
|
|
* Perform a search in MIB tree in SearchRange from @o_start to @o_end.
|
|
|
|
* If the @o_start has set include the search is inclusive, the @o_end has
|
|
|
|
* always the include flag cleared. For agentx-GetNext-PDU, the o_curr is always
|
|
|
|
* NULL, for agentx-GetBulk-PDU it could have non-NULL value. In such case the
|
|
|
|
* @o_curr effectively replaces the role of @o_start. It is mandatory to pass
|
|
|
|
* @o_start and @o_end only allocated from @p protocol's memory pool.
|
|
|
|
*
|
|
|
|
* Return found OID or NULL.
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
/* tree is tree with "internet" prefix .1.3.6.1
|
|
|
|
working only with o_start, o_end allocated in heap (not from buffer)*/
|
|
|
|
static struct oid *
|
|
|
|
search_mib(struct snmp_proto *p, const struct oid *o_start, const struct oid *o_end,
|
2023-10-25 14:23:39 +00:00
|
|
|
struct oid *o_curr, struct snmp_pdu UNUSED *c,
|
2023-07-26 12:30:34 +00:00
|
|
|
enum snmp_search_res *result)
|
2022-12-17 17:16:19 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
ASSUME(o_start != NULL);
|
2022-09-30 07:36:09 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
if (o_curr && (o_curr->n_subid < 2 || o_curr->ids[0] != 1))
|
|
|
|
return NULL;
|
|
|
|
if (!o_curr && (o_start->n_subid < 2 || o_start->ids[0] != 1))
|
2022-11-05 15:29:00 +00:00
|
|
|
return NULL;
|
2022-09-30 07:36:09 +00:00
|
|
|
|
2022-11-05 15:29:00 +00:00
|
|
|
if (!o_curr)
|
|
|
|
{
|
2023-10-18 14:51:21 +00:00
|
|
|
o_curr = snmp_oid_duplicate(p->pool, o_start);
|
2022-11-05 15:29:00 +00:00
|
|
|
// XXX is it right time to free o_start right now (here) ?
|
2023-07-26 12:30:34 +00:00
|
|
|
// not for use in snmp_get_next2() the o_start comes and ends in _gets2_()
|
2022-11-05 15:29:00 +00:00
|
|
|
}
|
2022-09-30 07:36:09 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
const struct oid *blank = NULL;
|
|
|
|
if (!snmp_is_oid_empty(o_end) &&
|
|
|
|
snmp_get_mib_class(o_curr) < snmp_get_mib_class(o_end))
|
2022-09-30 07:36:09 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
o_end = blank = snmp_oid_blank(p);
|
|
|
|
}
|
2022-11-19 22:00:02 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
enum snmp_search_res r;
|
|
|
|
switch (o_curr->ids[1])
|
|
|
|
{
|
|
|
|
case SNMP_BGP4_MIB:
|
2023-10-25 14:23:39 +00:00
|
|
|
r = snmp_bgp_search2(p, &o_curr, o_end, 0);
|
2022-12-17 17:16:19 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
if (r == SNMP_SEARCH_OK)
|
|
|
|
{
|
|
|
|
*result = r;
|
|
|
|
break;
|
|
|
|
return o_curr;
|
|
|
|
}
|
2022-11-19 22:00:02 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
// TODO add early break for o_end less then thinkable maximum in each tree
|
2022-11-19 22:00:02 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
/* fall through */
|
2022-12-17 17:16:19 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
default:
|
2023-08-08 17:00:54 +00:00
|
|
|
if (o_curr) mb_free(o_curr);
|
2023-10-18 14:51:21 +00:00
|
|
|
o_curr = snmp_oid_duplicate(p->pool, o_start);
|
2023-07-26 12:30:34 +00:00
|
|
|
*result = SNMP_SEARCH_END_OF_VIEW;
|
|
|
|
break;
|
2022-09-30 07:36:09 +00:00
|
|
|
}
|
2022-11-05 15:29:00 +00:00
|
|
|
|
2023-08-08 19:51:38 +00:00
|
|
|
if (o_end == blank)
|
2023-11-08 09:55:42 +00:00
|
|
|
/* cast drops const qualifier */
|
|
|
|
mb_free((struct oid *)blank);
|
2022-12-17 17:16:19 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
return o_curr;
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-12-17 17:24:05 +00:00
|
|
|
/**
|
2023-11-08 09:55:42 +00:00
|
|
|
* snmp_prefixize - return prefixed OID copy if possible
|
2022-11-05 15:29:00 +00:00
|
|
|
* @proto: allocation pool holder
|
|
|
|
* @oid: from packet loaded object identifier
|
|
|
|
*
|
2023-11-08 09:55:42 +00:00
|
|
|
* Return prefixed (meaning with nonzero prefix field) oid copy of @oid if
|
2022-12-10 17:08:00 +00:00
|
|
|
* possible, NULL otherwise. Returned pointer is always allocated from @proto's
|
2023-11-08 09:55:42 +00:00
|
|
|
* pool not a pointer to RX-buffer (from which is most likely @oid).
|
2022-11-05 15:29:00 +00:00
|
|
|
*/
|
2022-11-15 15:29:03 +00:00
|
|
|
struct oid *
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_prefixize(struct snmp_proto *proto, const struct oid *oid)
|
2022-09-20 12:28:57 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
ASSERT(oid != NULL);
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2022-11-15 15:29:03 +00:00
|
|
|
if (snmp_is_oid_empty(oid))
|
|
|
|
{
|
2023-09-04 07:25:51 +00:00
|
|
|
/* allocate new zeroed oid */
|
2022-12-10 17:08:00 +00:00
|
|
|
return snmp_oid_blank(proto);
|
2022-11-15 15:29:03 +00:00
|
|
|
}
|
2023-03-24 14:02:23 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* already in prefixed form */
|
2023-03-24 14:02:23 +00:00
|
|
|
else if (oid->prefix != 0) {
|
2023-10-18 14:51:21 +00:00
|
|
|
struct oid *new = snmp_oid_duplicate(proto->pool, oid);
|
2022-11-15 15:29:03 +00:00
|
|
|
return new;
|
|
|
|
}
|
|
|
|
|
2022-11-05 15:29:00 +00:00
|
|
|
if (oid->n_subid < 5)
|
2023-10-18 16:06:24 +00:00
|
|
|
return NULL;
|
2022-09-20 12:28:57 +00:00
|
|
|
|
|
|
|
for (int i = 0; i < 4; i++)
|
2023-11-15 11:37:10 +00:00
|
|
|
if (LOAD_U32(oid->ids[i]) != snmp_internet[i])
|
2023-10-18 16:06:24 +00:00
|
|
|
return NULL;
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* validity check here */
|
2022-11-05 15:29:00 +00:00
|
|
|
if (oid->ids[4] >= 256)
|
2023-10-18 16:06:24 +00:00
|
|
|
return NULL;
|
2022-11-05 15:29:00 +00:00
|
|
|
|
2023-10-18 14:51:21 +00:00
|
|
|
struct oid *new = mb_alloc(proto->pool,
|
2022-11-05 15:29:00 +00:00
|
|
|
sizeof(struct oid) + MAX((oid->n_subid - 5) * sizeof(u32), 0));
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2022-11-05 15:29:00 +00:00
|
|
|
memcpy(new, oid, sizeof(struct oid));
|
|
|
|
new->n_subid = oid->n_subid - 5;
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
/* validity check before allocation => ids[4] < 256
|
|
|
|
and can be copied to one byte new->prefix */
|
2022-11-05 15:29:00 +00:00
|
|
|
new->prefix = oid->ids[4];
|
2022-09-20 12:28:57 +00:00
|
|
|
|
2022-11-05 15:29:00 +00:00
|
|
|
memcpy(&new->ids, &oid->ids[5], new->n_subid * sizeof(u32));
|
2022-09-20 12:28:57 +00:00
|
|
|
return new;
|
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_mib_fill - append a AgentX VarBind to PDU
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @oid: OID to use as VarBind v.name
|
|
|
|
* @c: transmit PDU context to use
|
|
|
|
*
|
|
|
|
* Append new AgentX VarBind at the end of created PDU. The content (v.data)
|
|
|
|
* is handled in function specialized for given MIB subtree. The binding is
|
|
|
|
* created only if the v.name matches some variable name precisely.
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
static void
|
2023-11-08 09:55:42 +00:00
|
|
|
snmp_mib_fill2(struct snmp_proto *p, struct oid *oid, struct snmp_pdu *c)
|
2022-11-19 22:00:02 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
ASSUME(oid != NULL);
|
2022-11-05 15:29:00 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
if (c->size < snmp_varbind_hdr_size_from_oid(oid))
|
2023-08-08 19:51:38 +00:00
|
|
|
snmp_manage_tbuf(p, c);
|
2023-09-04 11:51:29 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
struct agentx_varbind *vb = snmp_create_varbind(c->buffer, oid);
|
2022-11-05 15:29:00 +00:00
|
|
|
|
2023-09-04 11:51:29 +00:00
|
|
|
if (oid->n_subid < 2 || (oid->prefix != SNMP_MGMT && oid->ids[0] != SNMP_MIB_2))
|
2022-11-19 22:00:02 +00:00
|
|
|
{
|
2022-12-17 17:24:05 +00:00
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
2023-07-26 12:30:34 +00:00
|
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
|
|
|
return;
|
2022-11-19 22:00:02 +00:00
|
|
|
}
|
2022-11-05 15:29:00 +00:00
|
|
|
|
2023-07-26 12:30:34 +00:00
|
|
|
u8 mib_class = snmp_get_mib_class(oid);
|
2022-11-05 15:29:00 +00:00
|
|
|
switch (mib_class)
|
|
|
|
{
|
|
|
|
case SNMP_CLASS_BGP:
|
2023-07-26 12:30:34 +00:00
|
|
|
snmp_bgp_fill(p, vb, c);
|
2022-11-15 15:29:03 +00:00
|
|
|
break;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
|
|
|
case SNMP_CLASS_INVALID:
|
|
|
|
case SNMP_CLASS_END:
|
|
|
|
default:
|
2023-10-18 16:06:24 +00:00
|
|
|
break;
|
2023-07-26 12:30:34 +00:00
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
ADVANCE(c->buffer, c->size, snmp_varbind_header_size(vb));
|
2022-11-05 15:29:00 +00:00
|
|
|
}
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* snmp_manage_tbuf - handle situation with too short transmit buffer
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @c: transmit packet context to use
|
2023-07-26 12:30:34 +00:00
|
|
|
*
|
|
|
|
* Important note: After managing insufficient buffer size all in buffer pointers
|
|
|
|
* are invalidated!
|
|
|
|
*/
|
|
|
|
void
|
2023-09-11 11:06:20 +00:00
|
|
|
snmp_manage_tbuf(struct snmp_proto UNUSED *p, struct snmp_pdu *c)
|
2022-09-06 16:04:29 +00:00
|
|
|
{
|
2023-07-26 12:30:34 +00:00
|
|
|
sock *sk = p->sock;
|
2023-09-04 12:01:08 +00:00
|
|
|
|
2023-09-04 07:25:51 +00:00
|
|
|
sk_set_tbsize(sk, sk->tbsize + 2048);
|
2023-08-08 17:00:54 +00:00
|
|
|
c->size += 2048;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 09:55:42 +00:00
|
|
|
/*
|
|
|
|
* prepare_response - fill buffer with AgentX PDU header
|
|
|
|
* @p: SNMP protocol instance
|
|
|
|
* @c: transmit PDU context to use
|
|
|
|
*
|
|
|
|
* Prepare known parts of AgentX packet header into the TX-buffer held by @c.
|
|
|
|
*/
|
2023-07-26 12:30:34 +00:00
|
|
|
static struct agentx_response *
|
2023-09-11 11:06:20 +00:00
|
|
|
prepare_response(struct snmp_proto *p, struct snmp_pdu *c)
|
2023-07-26 12:30:34 +00:00
|
|
|
{
|
2023-11-08 12:10:13 +00:00
|
|
|
if (p->last_header)
|
|
|
|
return p->last_header;
|
|
|
|
|
2023-10-19 14:08:13 +00:00
|
|
|
struct agentx_response *r = (void *) c->buffer;
|
|
|
|
struct agentx_header *h = &r->h;
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-11-15 11:37:10 +00:00
|
|
|
snmp_blank_header(h, AGENTX_RESPONSE_PDU);
|
|
|
|
snmp_session(p, h);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-10-19 14:08:13 +00:00
|
|
|
/* protocol doesn't care about subagent upTime */
|
|
|
|
STORE_U32(r->uptime, 0);
|
|
|
|
STORE_U16(r->error, AGENTX_RES_NO_ERROR);
|
|
|
|
STORE_U16(r->index, 0);
|
2023-07-26 12:30:34 +00:00
|
|
|
|
2023-10-19 14:08:13 +00:00
|
|
|
ADVANCE(c->buffer, c->size, sizeof(struct agentx_response));
|
|
|
|
return r;
|
2023-07-26 12:30:34 +00:00
|
|
|
}
|