2022-08-02 14:04:25 +00:00
|
|
|
/*
|
|
|
|
* BIRD -- Simple Network Management Protocol (SNMP)
|
|
|
|
*
|
|
|
|
* (c) 2022 Vojtech Vilimek <vojtech.vilimek@nic.cz>
|
|
|
|
* (c) 2022 CZ.NIC z.s.p.o
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
#include "lib/unaligned.h"
|
|
|
|
#include "subagent.h"
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* =============================================================
|
|
|
|
* Problems
|
|
|
|
* ------------------------------------------------------------
|
|
|
|
*
|
|
|
|
* change of remote ip -> no notification, no update
|
|
|
|
* same ip, different ports
|
|
|
|
* distinct VRF (two interfaces with overlapping private addrs)
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
static int parse_response(struct snmp_proto *p, byte *buf, uint size);
|
|
|
|
static void header_update_len(byte *buf, u32 len);
|
2022-09-06 16:04:29 +00:00
|
|
|
static inline uint oid_size(struct oid *o);
|
|
|
|
static inline uint vb_size(struct agentx_varbind *vb);
|
|
|
|
static int snmp_stop_ack(sock *sk, uint size);
|
|
|
|
static void do_response(struct snmp_proto *p, byte *buf, uint size);
|
|
|
|
static int parse_get_pdu(struct snmp_proto *p, byte *buf, uint size);
|
|
|
|
static void response_fail(struct snmp_proto *p, u16 err_no, u16 index);
|
|
|
|
static byte *prepare_response(struct snmp_proto *p, byte *buf, uint size, u16 err_no, u16 index);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
static const char * const snmp_errs[] = {
|
|
|
|
#define SNMP_ERR_SHIFT 256
|
|
|
|
[AGENTX_RES_OPEN_FAILED - SNMP_ERR_SHIFT] = "Open failed",
|
|
|
|
[AGENTX_RES_NOT_OPEN - SNMP_ERR_SHIFT] = "Not open",
|
|
|
|
[AGENTX_RES_INDEX_WRONG_TYPE - SNMP_ERR_SHIFT] = "Index wrong type",
|
|
|
|
[AGENTX_RES_INDEX_ALREADY_ALLOC - SNMP_ERR_SHIFT] = "Index already allocated",
|
|
|
|
[AGENTX_RES_INDEX_NONE_AVAIL - SNMP_ERR_SHIFT] = "Index none availlable",
|
|
|
|
[AGENTX_RES_NOT_ALLOCATED - SNMP_ERR_SHIFT] = "Not allocated",
|
|
|
|
[AGENTX_RES_UNSUPPORTED_CONTEXT - SNMP_ERR_SHIFT] = "Unsupported contex",
|
|
|
|
[AGENTX_RES_DUPLICATE_REGISTR - SNMP_ERR_SHIFT] = "Duplicate registration",
|
|
|
|
[AGENTX_RES_UNKNOWN_REGISTR - SNMP_ERR_SHIFT] = "Unknown registration",
|
|
|
|
[AGENTX_RES_UNKNOWN_AGENT_CAPS - SNMP_ERR_SHIFT] = "Unknown agent caps",
|
|
|
|
[AGENTX_RES_PARSE_ERROR - SNMP_ERR_SHIFT] = "Parse error",
|
|
|
|
[AGENTX_RES_REQUEST_DENIED - SNMP_ERR_SHIFT] = "Request denied",
|
|
|
|
[AGENTX_RES_PROCESSING_ERR - SNMP_ERR_SHIFT] = "Processing error",
|
|
|
|
};
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* payload length in bytes */
|
|
|
|
static inline size_t
|
|
|
|
pkt_len(byte *buf, byte *pkt)
|
|
|
|
{
|
|
|
|
return (pkt - buf) - AGENTX_HEADER_SIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline size_t
|
|
|
|
str_size(const char *str)
|
|
|
|
{
|
|
|
|
return 4 + BIRD_ALIGN(strlen(str), 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
static byte *
|
|
|
|
put_str(byte *buf, const char *str)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
uint len = strlen(str);
|
2022-09-06 16:04:29 +00:00
|
|
|
uint slen = BIRD_ALIGN(len, 4);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
if (len > MAX_STR)
|
2022-09-06 16:04:29 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
STORE_PTR(buf, len);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
memcpy(buf + 4, str, len);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
for (uint i = 0; i < slen - len; i++)
|
2022-08-10 15:31:32 +00:00
|
|
|
buf[len + i] = 0x00; // PADDING
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
return buf + str_size(str);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static byte *
|
|
|
|
put_blank(byte *buf)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
STORE_PTR(buf, 0);
|
|
|
|
return buf + 4;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static byte *
|
|
|
|
put_oid(byte *buf, struct oid *oid)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "testing oid");
|
|
|
|
for (uint i = 0; i < oid->n_subid; i++)
|
|
|
|
log(L_INFO "oid id %d: %u", i, oid->ids[i]);
|
|
|
|
log(L_INFO "put_oid()");
|
2022-08-10 15:31:32 +00:00
|
|
|
put_u8(buf, oid->n_subid);
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "data %p: %02X", buf, *buf);
|
|
|
|
put_u8(++buf, oid->prefix);
|
|
|
|
log(L_INFO "data %p: %02X", buf, *buf);
|
|
|
|
put_u8(++buf, oid->include);
|
|
|
|
log(L_INFO "data %p: %02X", buf, *buf);
|
|
|
|
put_u8(++buf, 0); // PADDING
|
|
|
|
/* last increment */
|
|
|
|
++buf;
|
|
|
|
log(L_INFO "oid head end %p", buf);
|
|
|
|
|
|
|
|
/* copy OID data */
|
|
|
|
#ifdef SNMP_NATIVE
|
|
|
|
for (uint i = 0; i < oid->n_subid; i++)
|
|
|
|
*(((u32 *) buf) + i) = oid->ids[i];
|
|
|
|
#else
|
|
|
|
put_u32s(buf, oid->ids, oid->n_subid << 2);
|
|
|
|
#endif
|
|
|
|
/*
|
|
|
|
for (uint i = 0; i <= (oid->n_subid << 2) +4 ; i += 4)
|
|
|
|
log(L_INFO "OID % 3u: %02X %02X %02X %02X", i,
|
|
|
|
*(buf - 4 + i),
|
|
|
|
*(buf - 4 + i + 1),
|
|
|
|
*(buf - 4 + i + 2),
|
|
|
|
*(buf - 4 + i + 3)
|
|
|
|
);
|
|
|
|
*/
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
return buf + (oid->n_subid << 2);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
/* paste data at first byte in message
|
|
|
|
* with 3B of padding
|
|
|
|
*/
|
2022-09-06 16:04:29 +00:00
|
|
|
static byte *
|
|
|
|
paste_fbyte(byte *buf, u8 data)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "paste_fbyte()");
|
|
|
|
put_u8(buf, data);
|
|
|
|
put_u24(++buf, 0); // PADDING
|
|
|
|
return buf + 3;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static void
|
|
|
|
open_pdu(struct snmp_proto *p, struct oid *oid)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
sock *sk = p->sock;
|
|
|
|
byte *buf, *pkt;
|
|
|
|
buf = pkt = sk->tbuf;
|
|
|
|
uint size = sk->tbsize;
|
|
|
|
|
|
|
|
// should be configurable
|
|
|
|
const char *str = "bird";
|
|
|
|
|
|
|
|
//uint pkt_size = 0;
|
|
|
|
|
|
|
|
if (size > AGENTX_HEADER_SIZE + oid_size(oid) + str_size(str))
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "open_pdu()");
|
|
|
|
|
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(pkt, struct agentx_header, h)
|
|
|
|
SNMP_B_HEADER(h, AGENTX_OPEN_PDU)
|
|
|
|
|
|
|
|
STORE(h->session_id, 1);
|
|
|
|
STORE(h->transaction_id, 1);
|
|
|
|
STORE(h->packet_id, 1);
|
|
|
|
|
|
|
|
pkt = paste_fbyte(pkt, p->timeout);
|
|
|
|
pkt = put_oid(pkt, oid);
|
|
|
|
pkt = put_str(pkt, str);
|
|
|
|
|
|
|
|
SNMP_UPDATE(h, pkt_len(buf, pkt));
|
|
|
|
|
|
|
|
int ret = sk_send(sk, pkt - buf);
|
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
log(L_INFO "sleep");
|
|
|
|
else if (ret < 0)
|
|
|
|
log(L_INFO "err %d", ret);
|
|
|
|
else
|
|
|
|
log(L_INFO "ok !!! ");
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
else
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "open_pdu() insufficient size, %u <= %u ",
|
|
|
|
size, AGENTX_HEADER_SIZE + oid_size(oid) + str_size(str));
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* index allocate / deallocate pdu * /
|
2022-08-10 15:31:32 +00:00
|
|
|
static void
|
2022-09-06 16:04:29 +00:00
|
|
|
de_allocate_pdu(struct snmp_proto *p, struct oid *oid, u8 type)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
sock *sk = p->sock;
|
2022-09-06 16:04:29 +00:00
|
|
|
byte *buf, *pkt;
|
2022-08-10 15:31:32 +00:00
|
|
|
buf = pkt = sk->tbuf;
|
|
|
|
uint size = sk->tbsize;
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
if (size > AGENTX_HEADER_SIZE + )
|
|
|
|
{
|
|
|
|
log(L_INFO "de_allocate_pdu()");
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(pkt, struct agentx_header, h);
|
|
|
|
SNMP_B_HEADER(h, type);
|
|
|
|
SNMP_SESSION(h,p);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
struct agentx_varbind *vb = (struct agentx_varbind *) pkt;
|
|
|
|
STORE_16(vb->type, AGENTX_OBJECT_ID);
|
|
|
|
STORE(vb->oid,
|
|
|
|
}
|
|
|
|
|
|
|
|
else
|
|
|
|
log(L_INFO "de_allocate_pdu(): insufficient size");
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* register / unregister pdu */
|
|
|
|
static void
|
|
|
|
un_register_pdu(struct snmp_proto *p, struct oid *oid, uint index, uint len, u8 type)
|
|
|
|
{
|
|
|
|
sock *sk = p->sock;
|
|
|
|
byte *buf, *pkt;
|
|
|
|
buf = pkt = sk->tbuf;
|
|
|
|
uint size = sk->tbsize;
|
|
|
|
|
|
|
|
/* conditional +4 for upper-bound */
|
|
|
|
if (size > AGENTX_HEADER_SIZE + oid_size(oid) + ((len > 1) ? 4 : 0))
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "un_register_pdu()");
|
|
|
|
struct agentx_un_register_pdu *ur;
|
|
|
|
SNMP_CREATE(pkt, struct agentx_un_register_pdu, ur);
|
|
|
|
struct agentx_header *h = &ur->h;
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
// FIXME correctly set INSTANCE REGISTRATION bit
|
|
|
|
SNMP_HEADER(h, type, AGENTX_FLAG_INSTANCE_REGISTRATION);
|
|
|
|
SNMP_SESSION(h, p);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* do not override timeout */
|
|
|
|
STORE(ur->timeout, 0);
|
|
|
|
/* default priority */
|
|
|
|
STORE(ur->priority, AGENTX_PRIORITY);
|
|
|
|
STORE(ur->range_subid, (len > 1) ? index : 0);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
pkt = put_oid(pkt, oid);
|
|
|
|
log(L_INFO "pkt - buf : %lu sizeof %u", pkt -buf, AGENTX_HEADER_SIZE);
|
|
|
|
|
|
|
|
/* place upper-bound if needed */
|
|
|
|
if (len > 1)
|
|
|
|
{
|
|
|
|
STORE_PTR(pkt, len);
|
|
|
|
pkt += 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
log("size of pkt: %u", pkt_len(buf,pkt));
|
|
|
|
SNMP_UPDATE(h, pkt_len(buf, pkt));
|
|
|
|
|
|
|
|
for (uint i = 0; i < pkt - buf; i++)
|
|
|
|
log(L_INFO "%p: %02X", buf+i, *(buf + i));
|
|
|
|
|
|
|
|
log(L_INFO "sending (un)register %d", type);
|
|
|
|
int ret = sk_send(sk, pkt - buf);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
log(L_INFO "sleep");
|
|
|
|
else if (ret < 0)
|
|
|
|
log(L_INFO "err %d", ret);
|
|
|
|
else
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "ok !!");
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
else
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "un_register_pdu() insufficient size");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* register pdu */
|
|
|
|
static void
|
|
|
|
snmp_register(struct snmp_proto *p, struct oid *oid, uint index, uint len)
|
|
|
|
{
|
|
|
|
un_register_pdu(p, oid, index, len, AGENTX_REGISTER_PDU);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* unregister pdu */
|
|
|
|
static void
|
|
|
|
snmp_unregister(struct snmp_proto *p, struct oid *oid, uint index, uint len)
|
|
|
|
{
|
|
|
|
un_register_pdu(p, oid, index, len, AGENTX_UNREGISTER_PDU);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
close_pdu(struct snmp_proto *p, u8 reason)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-08-10 15:31:32 +00:00
|
|
|
sock *sk = p->sock;
|
|
|
|
byte *buf, *pkt;
|
|
|
|
buf = pkt = sk->tbuf;
|
|
|
|
uint size = sk->tbsize;
|
|
|
|
log(L_INFO "close_pdu() size: %u %c %u", size, (size > AGENTX_HEADER_SIZE + 4)
|
|
|
|
? '>':'<', AGENTX_HEADER_SIZE);
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
/* +4B for reason */
|
|
|
|
if (size > AGENTX_HEADER_SIZE + 4)
|
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
struct agentx_header *h;
|
|
|
|
SNMP_CREATE(pkt, struct agentx_header, h)
|
|
|
|
SNMP_B_HEADER(h, AGENTX_CLOSE_PDU)
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
SNMP_SESSION(h, p)
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
pkt = paste_fbyte(pkt, reason);
|
2022-08-02 14:12:09 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
SNMP_UPDATE(h, pkt_len(buf, pkt));
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "preparing to sk_send()");
|
|
|
|
int ret = sk_send(sk, pkt - buf);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
log(L_INFO "sleep");
|
|
|
|
else if (ret < 0)
|
|
|
|
log(L_INFO "err");
|
|
|
|
else
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO, "ok !!");
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static inline void
|
|
|
|
refresh_ids(struct snmp_proto *p, struct agentx_header *h)
|
|
|
|
{
|
|
|
|
int byte_ord = h->flags & AGENTX_NETWORK_BYTE_ORDER;
|
|
|
|
p->transaction_id = LOAD(h->transaction_id, byte_ord);
|
|
|
|
p->packet_id = LOAD(h->packet_id, byte_ord);
|
|
|
|
}
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
static int
|
|
|
|
parse_pkt(struct snmp_proto *p, byte *buf, uint size)
|
|
|
|
{
|
|
|
|
if (size < AGENTX_HEADER_SIZE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
struct agentx_header *h = (void *) buf;
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "parse_pkt got type %u", h->type);
|
2022-08-10 15:31:32 +00:00
|
|
|
switch (h->type)
|
|
|
|
{
|
|
|
|
case AGENTX_RESPONSE_PDU:
|
|
|
|
return parse_response(p, buf, size);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
case AGENTX_GET_PDU:
|
|
|
|
refresh_ids(p, h);
|
|
|
|
return parse_get_pdu(p, buf, size);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
|
|
|
/* should not happen */
|
|
|
|
default:
|
2022-09-06 16:04:29 +00:00
|
|
|
die("unknown packet type %u", h->type);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_response(struct snmp_proto *p, byte *buf, uint size)
|
|
|
|
{
|
|
|
|
if (size < sizeof(struct agentx_response))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
struct agentx_response *r = (void *) buf;
|
|
|
|
struct agentx_header *h = &r->h;
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "endianity: %s, session %u, transaction: %u", (h->flags & AGENTX_NETWORK_BYTE_ORDER) ? "big end":
|
|
|
|
"little end", h->session_id, h->transaction_id);
|
|
|
|
log(L_INFO "sid: %3u\ttid: %3u\tpid: %3u\t", p->session_id, p->transaction_id,
|
|
|
|
p->packet_id);
|
|
|
|
|
|
|
|
log(L_INFO "size %u", h->payload);
|
|
|
|
log(L_INFO "uptime: %u s", r->uptime);
|
|
|
|
|
|
|
|
if (r->err == AGENTX_RES_NO_ERROR)
|
|
|
|
do_response(p, buf, size);
|
|
|
|
else
|
|
|
|
log(L_INFO "an error occured '%s'", snmp_errs[get_u16(&r->err) -
|
|
|
|
SNMP_ERR_SHIFT]);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
do_response(struct snmp_proto *p, byte *buf, uint size)
|
|
|
|
{
|
|
|
|
struct agentx_response *r = (void *) buf;
|
|
|
|
struct agentx_header *h = &r->h;
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* TODO make it asynchronous for better speed */
|
|
|
|
switch (p->state)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
case SNMP_INIT:
|
|
|
|
if (h->flags & AGENTX_NETWORK_BYTE_ORDER)
|
|
|
|
{
|
|
|
|
p->session_id = get_u32(&h->session_id);
|
|
|
|
p->transaction_id = get_u32(&h->transaction_id);
|
|
|
|
p->packet_id = get_u32(&h->packet_id);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
memcpy(&p->session_id, &h->session_id, 12);
|
|
|
|
}
|
|
|
|
|
|
|
|
p->transaction_id++;
|
|
|
|
|
|
|
|
log(L_INFO "sending register-pdu");
|
|
|
|
u32 arr_with_prefix[] = {1, 15, 3, 1, 1};
|
|
|
|
struct oid *o2 = mb_allocz(p->p.pool, 10 * 4);
|
|
|
|
put_u8(&o2->n_subid, 9);
|
|
|
|
put_u8(&o2->prefix, 2);
|
|
|
|
|
|
|
|
memcpy(o2->ids, arr_with_prefix, 5 * 4);
|
|
|
|
u32 remote_addr[] = {10, 0, 0, 0};
|
|
|
|
memcpy(o2->ids + 5, remote_addr, 4 * 4);
|
|
|
|
|
|
|
|
// register first line in BGP4-MIB bgpPeerTable
|
|
|
|
// TODO register all bind bgp connections
|
|
|
|
snmp_register(p, o2, 9, 24);
|
|
|
|
|
|
|
|
// register whole BGP4 mib-tree section
|
|
|
|
u32 arr_bgp[] = {1, 15, 1};
|
|
|
|
struct oid *o3 = mb_allocz(p->p.pool, 4 * 4);
|
|
|
|
put_u8(&o3->n_subid, 3);
|
|
|
|
put_u8(&o3->prefix, 2);
|
|
|
|
|
|
|
|
memcpy(o3->ids, arr_bgp, 3 * 4);
|
|
|
|
|
|
|
|
snmp_register(p, o3, 0, 1);
|
|
|
|
|
|
|
|
p->state = SNMP_REGISTR;
|
|
|
|
//proto_notify_state(&p->p, PS_UP);
|
2022-08-10 15:31:32 +00:00
|
|
|
break;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
case SNMP_REGISTR:
|
2022-08-10 15:31:32 +00:00
|
|
|
break;
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
case SNMP_CONN:
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
die("unkonwn SNMP state");
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_get_pdu(struct snmp_proto *p, byte *buf, uint size)
|
|
|
|
{
|
|
|
|
log(L_INFO "parse_get_pdu()");
|
|
|
|
|
|
|
|
sock *sk = p->sock;
|
|
|
|
byte *res_pkt, *res = sk->tbuf;
|
|
|
|
uint rsize = sk->tbsize;
|
|
|
|
|
|
|
|
if (size < AGENTX_HEADER_SIZE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
log(L_INFO "Get-PDU enough room %p", buf);
|
|
|
|
struct agentx_header *h = (void *) buf;
|
|
|
|
int byte_ord = h->flags & AGENTX_NETWORK_BYTE_ORDER;
|
|
|
|
ADVANCE(buf, size, AGENTX_HEADER_SIZE);
|
|
|
|
log(L_INFO "advancing %p cause %u", buf, AGENTX_HEADER_SIZE);
|
|
|
|
byte *pkt = buf;
|
|
|
|
uint pkt_size = LOAD(h->payload, byte_ord);
|
|
|
|
log(L_INFO "packet size is %u", pkt_size);
|
|
|
|
|
|
|
|
uint clen;
|
|
|
|
char *context = NULL;
|
|
|
|
SNMP_LOAD_CONTEXT(p, h, pkt, context, clen)
|
|
|
|
log(L_INFO "after context load %p, pkt == buf %d", pkt, pkt == buf);
|
|
|
|
|
|
|
|
/* parsing one search range */
|
|
|
|
struct oid *o_start, *o_end;
|
|
|
|
o_start = (struct oid *) pkt;
|
|
|
|
pkt += oid_size(o_start);
|
|
|
|
o_end = (struct oid *) pkt; // for Get-PDU always null
|
|
|
|
pkt += oid_size(o_end);
|
|
|
|
|
|
|
|
log(L_INFO "sizes o_start %lu o_end %lu", oid_size(o_start),
|
|
|
|
oid_size(o_end));
|
|
|
|
|
|
|
|
log(L_INFO " creating response header rpkt %p %u", res_pkt, res_pkt - res);
|
|
|
|
log(L_INFO "o_subid: %u o_prefix %u o_include %u ---",
|
|
|
|
o_start->n_subid, o_start->prefix, o_start->include);
|
|
|
|
// TODO read a oid
|
|
|
|
// TODO allow multiple values
|
|
|
|
|
|
|
|
res_pkt = prepare_response(p, res, rsize, AGENTX_RES_NO_ERROR, 0);
|
|
|
|
log(L_INFO "response header created: %p (%u)", res_pkt, res_pkt - res);
|
|
|
|
|
|
|
|
res_pkt = request(res_pkt, o_start);
|
|
|
|
struct agentx_varbind *vb_start;
|
|
|
|
vb_start = (void *) res_pkt;
|
|
|
|
log(L_INFO " SNMP_CREATEish rpkt %p %u", res_pkt, res_pkt - res);
|
|
|
|
|
|
|
|
memcpy(&vb_start->name, o_start, oid_size(o_start));
|
|
|
|
STORE_16(vb_start->type, AGENTX_INTEGER);
|
|
|
|
STORE_16(vb_start->pad, 0); // padding zeroing
|
|
|
|
res_pkt += vb_size(vb_start);
|
|
|
|
|
|
|
|
log(L_INFO " vb_size() rpkt %p %u", res_pkt, res_pkt - res);
|
|
|
|
|
|
|
|
STORE_PTR(res_pkt, 0x1234ABCD);
|
|
|
|
|
|
|
|
log(L_INFO " STORE_PTR int-value rpkt %p %u", res_pkt, res_pkt - res);
|
|
|
|
res_pkt += 4;
|
|
|
|
log(L_INFO " shift rpkt %p %u", res_pkt, res_pkt - res);
|
|
|
|
|
|
|
|
log(L_INFO "after integer write");
|
|
|
|
|
|
|
|
struct agentx_header *rh = (void *) res;
|
|
|
|
SNMP_UPDATE(rh, pkt_len(res, res_pkt));
|
|
|
|
log(L_INFO "res->payload %u (loaded) %u, trying to send: %u",
|
|
|
|
rh->payload, LOAD(rh->payload, rh->flags & AGENTX_NETWORK_BYTE_ORDER),
|
|
|
|
res_pkt - res);
|
|
|
|
|
|
|
|
int ret = sk_send(sk, res_pkt - res);
|
|
|
|
log(L_INFO "message sent");
|
|
|
|
|
|
|
|
if (res == 0)
|
|
|
|
log(L_INFO "sleep");
|
|
|
|
else if (ret < 0)
|
|
|
|
log(L_INFO "err no: %d", ret);
|
|
|
|
else
|
|
|
|
log(L_INFO "OK !!");
|
2022-08-10 15:31:32 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
header_update_len(byte *buf, u32 len)
|
|
|
|
{
|
|
|
|
struct agentx_header *h = (void *) buf;
|
|
|
|
put_u32(&h->payload, len);
|
|
|
|
log(L_INFO "header_update_len() %d 0x%02X 0x%02X 0x%02X 0x%02X", len, *((unsigned char
|
|
|
|
*) &h->payload), *(((unsigned char *) &h->payload) + 1), *(((unsigned char *)
|
|
|
|
&h->payload) + 2), *(((unsigned char *) &h->payload) + 3));
|
2022-08-02 14:04:25 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-08-10 15:31:32 +00:00
|
|
|
snmp_start_subagent(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-08-10 15:31:32 +00:00
|
|
|
log(L_INFO "snmp_start_subagent() starting subagent");
|
|
|
|
|
|
|
|
/* blank oid means unsupported */
|
|
|
|
struct oid *o = mb_allocz(p->p.pool, sizeof(struct oid));
|
|
|
|
open_pdu(p, o);
|
|
|
|
mb_free(o);
|
2022-09-06 16:04:29 +00:00
|
|
|
|
2022-08-02 14:04:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2022-08-10 15:31:32 +00:00
|
|
|
snmp_stop_subagent(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
log(L_INFO "snmp_stop_subagent()");
|
2022-08-10 15:31:32 +00:00
|
|
|
sock *sk = p->sock;
|
|
|
|
|
|
|
|
close_pdu(p, AGENTX_CLOSE_SHUTDOWN);
|
|
|
|
|
|
|
|
sk->rx_hook = snmp_stop_ack;
|
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static inline uint
|
2022-08-10 15:31:32 +00:00
|
|
|
oid_size(struct oid *o)
|
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
/* faster multipication by 4 */
|
|
|
|
return 4 + (o->n_subid << 2);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint
|
|
|
|
vb_size(struct agentx_varbind *vb)
|
|
|
|
{
|
|
|
|
/* +4B for type and pad */
|
|
|
|
return oid_size(&vb->name) + 4;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
int
|
|
|
|
snmp_rx(sock *sk, uint size)
|
|
|
|
{
|
|
|
|
log(L_INFO "snmp_rx()");
|
|
|
|
struct snmp_proto *p = sk->data;
|
|
|
|
byte *pkt = sk->rbuf;
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
// 1 means all done; 0 means to be continued
|
|
|
|
return parse_pkt(p, pkt, size);
|
2022-08-10 15:31:32 +00:00
|
|
|
/*
|
2022-09-06 16:04:29 +00:00
|
|
|
while (end >= pkt + AGENTX_HEADER_SIZE)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
parse_header(p);
|
|
|
|
parse_pkt(p, );
|
|
|
|
}
|
|
|
|
*/
|
2022-08-02 14:04:25 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* ping pdu */
|
|
|
|
void
|
|
|
|
snmp_ping(struct snmp_proto *p)
|
2022-08-02 14:04:25 +00:00
|
|
|
{
|
2022-08-10 15:31:32 +00:00
|
|
|
/* this does not support non-default context */
|
|
|
|
sock *sk = p->sock;
|
2022-09-06 16:04:29 +00:00
|
|
|
byte *pkt = sk->tbuf;
|
2022-08-10 15:31:32 +00:00
|
|
|
uint size = sk->tbsize;
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
if (size > AGENTX_HEADER_SIZE)
|
|
|
|
{
|
|
|
|
log(L_INFO "ping_pdu()");
|
|
|
|
struct agentx_header *h;
|
|
|
|
log("before dead %p", pkt );
|
|
|
|
SNMP_CREATE(pkt, struct agentx_header, h);
|
|
|
|
SNMP_B_HEADER(h, AGENTX_PING_PDU);
|
|
|
|
SNMP_SESSION(h, p);
|
|
|
|
|
|
|
|
/* sending only header => pkt - buf */
|
|
|
|
int ret = sk_send(sk, AGENTX_HEADER_SIZE);
|
|
|
|
if (ret == 0)
|
|
|
|
log(L_INFO "sleep");
|
|
|
|
else if (ret < 0)
|
|
|
|
log(L_INFO "err %d", ret);
|
|
|
|
else
|
|
|
|
log("ok ! !");
|
|
|
|
}
|
2022-08-02 14:04:25 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
else
|
|
|
|
log(L_INFO "ping_pdu() insufficient size");
|
2022-08-02 14:04:25 +00:00
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
snmp_stop_ack(sock *sk, uint size)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
struct snmp_proto *p = sk->data;
|
2022-09-06 16:04:29 +00:00
|
|
|
byte *buf = sk->rbuf;
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
if (size < AGENTX_HEADER_SIZE)
|
|
|
|
return 0;
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
if (parse_response(p, buf, size))
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
p->p.disabled = 1;
|
|
|
|
proto_notify_state(&p->p, PS_DOWN);
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
sk->tx_hook = NULL;
|
|
|
|
sk->rx_hook = NULL;
|
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* all done */
|
|
|
|
return 0;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2022-09-06 16:04:29 +00:00
|
|
|
void
|
|
|
|
snmp_agent_reconfigure(void)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
static byte *
|
|
|
|
find_bgp_one(struct bgp_proto *bp, struct oid *o, byte *buf, uint size, uint contid)
|
|
|
|
{
|
|
|
|
struct bgp_conn *b_conn = bp->conn;
|
|
|
|
struct bgp_conn *b_in = bp->incomming_conn;
|
|
|
|
struct bgp_conn *b_out = bp->outgoing_conn;
|
|
|
|
|
|
|
|
uint b_state;
|
|
|
|
|
|
|
|
if (b_conn)
|
|
|
|
b_state = b_conn->state;
|
|
|
|
else if (MAX(b_in->state, b_out->state) == BS_CLOSE &&
|
|
|
|
MIN(b_in->state, b_out->state) != BS_CLOSE)
|
|
|
|
b_state = MIN(b_in->state, b_out->state);
|
|
|
|
/* BS_CLOSE is unsupported by BGP4-MIB */
|
|
|
|
else if (MIN(b_in->state, b_out->state) == BS_CLOSE)
|
|
|
|
b_state = BS_IDLE;
|
|
|
|
else
|
|
|
|
b_state = MAX(b_in->state, b_out->state);
|
|
|
|
|
|
|
|
struct agentx_varbind *vb = (void *) buf;
|
|
|
|
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
switch (o->ids[4])
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
case SNMP_BGP_IDENTIFIER:
|
|
|
|
if (b_state == BS_ESTABLISHED)
|
|
|
|
STORE_PTR(pkt, ip_to_u32(b_conn->remote_ip));
|
|
|
|
BGP_DATA(vb, AGENTX_IP_ADDRESS, pkt);
|
|
|
|
else if (b_state == BS_OPENCONFIRM)
|
|
|
|
STORE_PTR(pkt, ip4_to_u32( (b_state == b_in->state) ? b_in->state : b_out->state));
|
|
|
|
BGP_DATA(vb, AGENTX_IP_ADDRESS, pkt);
|
|
|
|
else
|
|
|
|
STORE_PTR(pkt, ip4_to_u32(IPA_NONE));
|
|
|
|
BGP_DATA(vb, AGENTX_IP_ADDRESS, pkt);
|
|
|
|
|
|
|
|
case SNMP_BGP_STATE:
|
|
|
|
STORE_PTR(pkt, b_state);
|
|
|
|
BGP_DATA(vb, AGENTX_INTEGER, pkt);
|
|
|
|
|
|
|
|
case SNMP_BGP_ADMIN_STATUS:
|
|
|
|
STORE_PTR(pkt, (bp->disabled) ? AGENTX_ADMIN_STOP : AGENTX_ADMIN_START);
|
|
|
|
BGP_DATA(vb, AGENTX_INTEGER, pkt);
|
|
|
|
|
|
|
|
case SNMP_BGP_VERSION:
|
|
|
|
STORE(pkt, BGP4_VERSIONS);
|
|
|
|
STORE
|
|
|
|
case SNMP_BGP_LOCAL_ADDR:
|
|
|
|
case SNMP_BGP_LOCAL_PORT:
|
|
|
|
case SNMP_BGP_REMOTE_ADDR:
|
|
|
|
case SNMP_BGP_REMOTE_PORT:
|
|
|
|
case SNMP_BGP_REMOTE_AS:
|
|
|
|
case SNMP_BGP_RX_UPDATES:
|
|
|
|
case SNMP_BGP_TX_UPDATES:
|
|
|
|
case SNMP_BGP_RX_MESSAGES:
|
|
|
|
case SNMP_BGP_TX_MESSAGES:
|
|
|
|
|
|
|
|
case SNMP_BGP_FSM_TRANSITIONS:
|
|
|
|
|
|
|
|
case SNMP_BGP_RETRY_INTERVAL:
|
|
|
|
case SNMP_BGP_HOLD_TIME:
|
|
|
|
case SNMP_BGP_KEEPALIVE:
|
|
|
|
case SNMP_BGP_HOLD_TIME_CONFIGURED:
|
|
|
|
case SNMP_BGP_KEEPALIVE_CONFIGURED:
|
|
|
|
|
|
|
|
/* UNSUPPORTED */
|
|
|
|
case SNMP_BGP_LAST_ERROR:
|
|
|
|
|
|
|
|
case SNMP_BGP_FSM_ESTABLISHED_TIME:
|
|
|
|
|
|
|
|
case SNMP_BGP_ORIGINATION_INTERVAL:
|
|
|
|
case SNMP_BGP_MIN_ROUTE_ADVERTISEMENT:
|
|
|
|
case SNMP_BGP_MIN_UPDATE_ELAPSED_TIME:
|
|
|
|
defualt:
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
/* pkt += 0; no data */
|
|
|
|
break;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* contid - context identification number */
|
|
|
|
static byte *
|
|
|
|
find_bgp_record(struct snmp_proto *p, struct oid *o, byte *buf, uint size, uint contid)
|
|
|
|
{
|
|
|
|
struct agentx_varbind *vb = (void *) buf;
|
|
|
|
|
|
|
|
if (o->n_subid < 3)
|
|
|
|
{
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
return buff + vb_size(vb);
|
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
byte *pkt = buf + vb_size(vb);
|
|
|
|
switch (o->ids[2])
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
case BGP4_MIB_VERSION:
|
|
|
|
vb->type = AGENTX_OCTET_STRING;
|
|
|
|
STORE(pkt, BGP4_VERSIONS);
|
|
|
|
pkt += 4;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BGP4_MIB_LOCAL_AS:
|
|
|
|
vb->type = AGENTX_INTEGER;
|
|
|
|
// XXX local as to use
|
|
|
|
STORE(pkt, p->local_as);
|
|
|
|
pkt += 4;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BGP4_PEER_TABLE:
|
|
|
|
/* end part of .1.3.6.1.2.1.15.3.1.x.a.b.c.d */
|
|
|
|
if (o->n_subid < 9 || o->ids[3] != 1
|
|
|
|
|| o->ids[4] == 0 || o->ids[4] > 24)
|
|
|
|
{
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
return buff + vb_size(vb);
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO enumerate range requests
|
|
|
|
ip_addr addr = ipa_build4(o->ids[5], o->ids[6], o->ids[7], o->ids[8]);
|
|
|
|
struct snmp_bgp_peer_entry *pe =
|
|
|
|
HASH_FIND(p->bgp_entries, SNMP_HASH, addr);
|
|
|
|
|
|
|
|
struct bgp_proto *bp = NULL;
|
|
|
|
if (pe && pe->bond->proto->proto &&
|
|
|
|
ipa_equal(pe->bond->proto->proto->remote_ip, addr))
|
|
|
|
{
|
|
|
|
bp = pe->bond->proto->proto;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
struct snmp_bond *b;
|
|
|
|
WALK_LIST(b, p->bgp_entries)
|
|
|
|
if (b->proto->proto &&
|
|
|
|
ipa_equal(b->proto->proto->remote_ip, addr))
|
|
|
|
bp = b->proto->proto;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!bp)
|
|
|
|
{
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
/* pkt += 0; no data */
|
|
|
|
return pkt;
|
|
|
|
}
|
|
|
|
|
|
|
|
return find_bgp_one(bp, o, buf, size, contid);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
/* pkt += 0; no data */
|
|
|
|
break;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
return pkt;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static byte *
|
|
|
|
find_ospf_record(struct snmp_proto *p, struct oid *o, byte *buf, uint size)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
// TODO XXX
|
|
|
|
return NULL;
|
|
|
|
}
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
static inline byte *
|
|
|
|
find_prefixed(struct snmp_proto *p, struct oid *o, byte *buf, uint size)
|
|
|
|
{
|
|
|
|
struct agetnx_varbind *vb = (void *) buf;
|
|
|
|
|
|
|
|
memcpy(&vb->name, o, oid_size(o));
|
|
|
|
|
|
|
|
/* SNMPv2 mgmt mib-2 */
|
|
|
|
if (o->n_subid < 2 || (o->prefix != 2 && o->ides[0] != 1))
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
return buf + vb_size(vb);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
switch (o->ids[1])
|
|
|
|
{
|
|
|
|
case SNMP_BGP4_MIB:
|
|
|
|
return find_bgp_record(p, o, buf, size);
|
|
|
|
|
|
|
|
case SNMP_OSPFv3_MIB:
|
|
|
|
return find_ospf_record(p, o, buf, size);
|
|
|
|
|
|
|
|
/* the old OSPF */
|
|
|
|
case SNMP_OSPF_MIB:
|
|
|
|
log("too old OSPF oid request");
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
log(L_INFO "unsupported oid");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
vb->type = AGENTX_NO_SUCH_OBJECT;
|
|
|
|
return buf + vb_size(vb);
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
2022-09-06 16:04:29 +00:00
|
|
|
|
|
|
|
/* tests if there is present canonical "internet" prefix .1.3.6.1
|
|
|
|
and if so it shortens the oid to the ``prefix'' form */
|
|
|
|
static int
|
|
|
|
prefixize(struct oid *o, int byte_ord)
|
2022-08-10 15:31:32 +00:00
|
|
|
{
|
2022-09-06 16:04:29 +00:00
|
|
|
const u32 prefix[] = {1, 3, 6, 1};
|
2022-08-10 15:31:32 +00:00
|
|
|
|
2022-09-06 16:04:29 +00:00
|
|
|
/* NETWORK_BYTE_ORDER */
|
|
|
|
if (byte_ord)
|
|
|
|
/* prefix len == 4 */
|
|
|
|
for (uint i = 0; i < 4; i++)
|
|
|
|
if (get_u32(&o->ids[i]) != prefix[i]) return 0;
|
|
|
|
|
|
|
|
else
|
|
|
|
/* prefix len == 4 */
|
|
|
|
for (uint i = 0; i < 4; i++)
|
|
|
|
if (o->ids[i] != prefix[i]) return 0;
|
|
|
|
|
|
|
|
o->n_subid -= 5;
|
|
|
|
o->prefix = o->ids[4];
|
|
|
|
/* n_subid contains number of elements, not bytes */
|
|
|
|
memmove(&o->ids, &o->ids[5], o->n_subid << 2);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline byte *
|
|
|
|
find_n_fill(struct snmp_proto *p, struct oid *o, byte *buf, uint size, int byte_ord)
|
|
|
|
{
|
|
|
|
if (!o->prefix && prefixize(o, byte_ord))
|
|
|
|
find_prefixed(p, o, buf, size);
|
|
|
|
else if (o->prefix)
|
|
|
|
find_prefixed(p, o, buf, size);
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static byte *
|
|
|
|
prepare_response(struct snmp_proto *p, byte *buf, uint size, u16 err_no, u16 index)
|
|
|
|
{
|
|
|
|
log(L_INFO "prepare_response()");
|
|
|
|
|
|
|
|
if (size < sizeof(struct agentx_response))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
struct agentx_response *r = (void *) buf;
|
|
|
|
struct agentx_header *h = &r->h;
|
|
|
|
|
|
|
|
SNMP_B_HEADER(h, AGENTX_RESPONSE_PDU)
|
|
|
|
SNMP_SESSION(h, p)
|
|
|
|
|
|
|
|
/* protocol doesn't care about subagent upTime */
|
|
|
|
STORE(r->uptime, 0);
|
|
|
|
STORE_16(r->err, err_no);
|
|
|
|
STORE_16(r->index, index);
|
|
|
|
|
|
|
|
buf += sizeof(struct agentx_response);
|
|
|
|
return buf;
|
2022-08-10 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#undef SNMP_ERR_SHIFT
|