diff options
Diffstat (limited to 'snmplib/snmpTCPIPv6Domain.c')
-rw-r--r-- | snmplib/snmpTCPIPv6Domain.c | 481 |
1 files changed, 481 insertions, 0 deletions
diff --git a/snmplib/snmpTCPIPv6Domain.c b/snmplib/snmpTCPIPv6Domain.c new file mode 100644 index 0000000..8a0ec52 --- /dev/null +++ b/snmplib/snmpTCPIPv6Domain.c @@ -0,0 +1,481 @@ +#include <net-snmp/net-snmp-config.h> + +#ifdef NETSNMP_TRANSPORT_TCPIPV6_DOMAIN + +#include <stdio.h> +#include <sys/types.h> +#include <errno.h> + +#if HAVE_STRING_H +#include <string.h> +#else +#include <strings.h> +#endif +#if HAVE_STDLIB_H +#include <stdlib.h> +#endif +#if HAVE_UNISTD_H +#include <unistd.h> +#endif +#if HAVE_SYS_SOCKET_H +#include <sys/socket.h> +#endif + +#if defined(HAVE_WINSOCK_H) + /* + * Windows IPv6 support is part of WinSock2 only + */ +#include <winsock2.h> +#include <ws2tcpip.h> + +extern const char *inet_ntop(int, const void*, char*, size_t); + +#endif + +#if HAVE_NETINET_IN_H +#include <netinet/in.h> +#endif +#if HAVE_ARPA_INET_H +#include <arpa/inet.h> +#endif +#if HAVE_NETDB_H +#include <netdb.h> +#endif +#if HAVE_FCNTL_H +#include <fcntl.h> +#endif + +#if HAVE_DMALLOC_H +#include <dmalloc.h> +#endif + +#include <net-snmp/types.h> +#include <net-snmp/output_api.h> +#include <net-snmp/config_api.h> + +#include <net-snmp/library/snmp_transport.h> +#include <net-snmp/library/snmpUDPDomain.h> +#include <net-snmp/library/snmpUDPIPv6Domain.h> +#include <net-snmp/library/snmpTCPIPv6Domain.h> + +oid netsnmp_TCPIPv6Domain[] = { TRANSPORT_DOMAIN_TCP_IPV6 }; +static netsnmp_tdomain tcp6Domain; + +/* + * Return a string representing the address in data, or else the "far end" + * address if data is NULL. + */ + +static char * +netsnmp_tcp6_fmtaddr(netsnmp_transport *t, void *data, int len) +{ + struct sockaddr_in6 *to = NULL; + + DEBUGMSGTL(("netsnmp_tcp6", "fmtaddr: t = %p, data = %p, len = %d\n", t, + data, len)); + if (data != NULL && len == sizeof(struct sockaddr_in6)) { + to = (struct sockaddr_in6 *) data; + } else if (t != NULL && t->data != NULL) { + to = (struct sockaddr_in6 *) t->data; + } + if (to == NULL) { + return strdup("TCP/IPv6: unknown"); + } else { + char addr[INET6_ADDRSTRLEN]; + char tmp[INET6_ADDRSTRLEN + 18]; + + sprintf(tmp, "TCP/IPv6: [%s]:%hu", + inet_ntop(AF_INET6, (void *) &(to->sin6_addr), addr, + INET6_ADDRSTRLEN), ntohs(to->sin6_port)); + return strdup(tmp); + } +} + +/* + * You can write something into opaque that will subsequently get passed back + * to your send function if you like. For instance, you might want to + * remember where a PDU came from, so that you can send a reply there... + */ + +static int +netsnmp_tcp6_recv(netsnmp_transport *t, void *buf, int size, + void **opaque, int *olength) +{ + int rc = -1; + + if (t != NULL && t->sock >= 0) { + while (rc < 0) { + rc = recvfrom(t->sock, buf, size, 0, NULL, 0); + if (rc < 0 && errno != EINTR) { + DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d err %d (\"%s\")\n", + t->sock, errno, strerror(errno))); + return -1; + } + } + DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d got %d bytes\n", t->sock, rc)); + } else { + return -1; + } + + if (opaque != NULL && olength != NULL) { + if (t->data_length > 0) { + if ((*opaque = malloc(t->data_length)) != NULL) { + memcpy(*opaque, t->data, t->data_length); + *olength = t->data_length; + } else { + *olength = 0; + } + } else { + *opaque = NULL; + *olength = 0; + } + } + + return rc; +} + +static int +netsnmp_tcp6_send(netsnmp_transport *t, void *buf, int size, + void **opaque, int *olength) +{ + int rc = -1; + + if (t != NULL && t->sock >= 0) { + while (rc < 0) { + rc = sendto(t->sock, buf, size, 0, NULL, 0); + if (rc < 0 && errno != EINTR) { + break; + } + } + } + return rc; +} + +static int +netsnmp_tcp6_close(netsnmp_transport *t) +{ + int rc = -1; + if (t != NULL && t->sock >= 0) { + DEBUGMSGTL(("netsnmp_tcp6", "close fd %d\n", t->sock)); +#ifndef HAVE_CLOSESOCKET + rc = close(t->sock); +#else + rc = closesocket(t->sock); +#endif + t->sock = -1; + } + return rc; +} + +static int +netsnmp_tcp6_accept(netsnmp_transport *t) +{ + struct sockaddr_in6 *farend = NULL; + int newsock = -1, sockflags = 0; + socklen_t farendlen = sizeof(struct sockaddr_in6); + char *str = NULL; + + farend = (struct sockaddr_in6 *) malloc(sizeof(struct sockaddr_in6)); + + if (farend == NULL) { + /* + * Indicate that the acceptance of this socket failed. + */ + DEBUGMSGTL(("netsnmp_tcp6", "accept: malloc failed\n")); + return -1; + } + + if (t != NULL && t->sock >= 0) { + newsock = accept(t->sock, (struct sockaddr *) farend, &farendlen); + + if (newsock < 0) { + DEBUGMSGTL(("netsnmp_tcp6","accept failed rc %d errno %d \"%s\"\n", + newsock, errno, strerror(errno))); + free(farend); + return newsock; + } + + if (t->data != NULL) { + free(t->data); + } + + t->data = farend; + t->data_length = farendlen; + str = netsnmp_tcp6_fmtaddr(NULL, farend, farendlen); + DEBUGMSGTL(("netsnmp_tcp6", "accept succeeded (from %s)\n", str)); + free(str); + + /* + * Try to make the new socket blocking. + */ + +#ifdef WIN32 + ioctlsocket(newsock, FIONBIO, &sockflags); +#else + if ((sockflags = fcntl(newsock, F_GETFL, 0)) >= 0) { + fcntl(newsock, F_SETFL, (sockflags & ~O_NONBLOCK)); + } else { + DEBUGMSGTL(("netsnmp_tcp6", "accept: couldn't f_getfl of fd %d\n", + newsock)); + } +#endif + + /* + * Allow user to override the send and receive buffers. Default is + * to use os default. Don't worry too much about errors -- + * just plough on regardless. + */ + netsnmp_sock_buffer_set(newsock, SO_SNDBUF, 1, 0); + netsnmp_sock_buffer_set(newsock, SO_RCVBUF, 1, 0); + + return newsock; + } else { + free(farend); + return -1; + } +} + + + +/* + * Open a TCP/IPv6-based transport for SNMP. Local is TRUE if addr is the + * local address to bind to (i.e. this is a server-type session); otherwise + * addr is the remote address to send things to. + */ + +netsnmp_transport * +netsnmp_tcp6_transport(struct sockaddr_in6 *addr, int local) +{ + netsnmp_transport *t = NULL; + int rc = 0; + char *str = NULL; + + if (addr == NULL || addr->sin6_family != AF_INET6) { + return NULL; + } + + t = (netsnmp_transport *) malloc(sizeof(netsnmp_transport)); + if (t == NULL) { + return NULL; + } + memset(t, 0, sizeof(netsnmp_transport)); + + str = netsnmp_tcp6_fmtaddr(NULL, (void *)addr, + sizeof(struct sockaddr_in6)); + DEBUGMSGTL(("netsnmp_tcp6", "open %s %s\n", local ? "local" : "remote", + str)); + free(str); + + memset(t, 0, sizeof(netsnmp_transport)); + + t->data = malloc(sizeof(struct sockaddr_in6)); + if (t->data == NULL) { + netsnmp_transport_free(t); + return NULL; + } + t->data_length = sizeof(struct sockaddr_in6); + memcpy(t->data, addr, sizeof(struct sockaddr_in6)); + + t->domain = netsnmp_TCPIPv6Domain; + t->domain_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid); + + t->sock = socket(PF_INET6, SOCK_STREAM, 0); + if (t->sock < 0) { + netsnmp_transport_free(t); + return NULL; + } + + t->flags = NETSNMP_TRANSPORT_FLAG_STREAM; + + if (local) { + int sockflags = 0, opt = 1; + + /* + * This session is inteneded as a server, so we must bind on to the + * given IP address, which may include an interface address, or could + * be INADDR_ANY, but certainly includes a port number. + */ + +#ifdef IPV6_V6ONLY + /* Try to restrict PF_INET6 socket to IPv6 communications only. */ + { + int one=1; + if (setsockopt(t->sock, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&one, sizeof(one)) != 0) { + DEBUGMSGTL(("netsnmp_udp6", "couldn't set IPV6_V6ONLY to %d bytes: %s\n", one, strerror(errno))); + } + } +#endif + + t->flags |= NETSNMP_TRANSPORT_FLAG_LISTEN; + t->local = (unsigned char*)malloc(18); + if (t->local == NULL) { + netsnmp_tcp6_close(t); + netsnmp_transport_free(t); + return NULL; + } + memcpy(t->local, addr->sin6_addr.s6_addr, 16); + t->local[16] = (addr->sin6_port & 0xff00) >> 8; + t->local[17] = (addr->sin6_port & 0x00ff) >> 0; + t->local_length = 18; + + /* + * We should set SO_REUSEADDR too. + */ + + setsockopt(t->sock, SOL_SOCKET, SO_REUSEADDR, (void *)&opt, sizeof(opt)); + + rc = bind(t->sock, (struct sockaddr *) addr, + sizeof(struct sockaddr_in6)); + if (rc != 0) { + netsnmp_tcp6_close(t); + netsnmp_transport_free(t); + return NULL; + } + + /* + * Since we are going to be letting select() tell us when connections + * are ready to be accept()ed, we need to make the socket n0n-blocking + * to avoid the race condition described in W. R. Stevens, ``Unix + * Network Programming Volume I Second Edition'', pp. 422--4, which + * could otherwise wedge the agent. + */ + +#ifdef WIN32 + opt = 1; + ioctlsocket(t->sock, FIONBIO, &opt); +#else + sockflags = fcntl(t->sock, F_GETFL, 0); + fcntl(t->sock, F_SETFL, sockflags | O_NONBLOCK); +#endif + + /* + * Now sit here and wait for connections to arrive. + */ + + rc = listen(t->sock, NETSNMP_STREAM_QUEUE_LEN); + if (rc != 0) { + netsnmp_tcp6_close(t); + netsnmp_transport_free(t); + return NULL; + } + + /* + * no buffer size on listen socket - doesn't make sense + */ + + } else { + t->remote = (unsigned char*)malloc(18); + if (t->remote == NULL) { + netsnmp_tcp6_close(t); + netsnmp_transport_free(t); + return NULL; + } + memcpy(t->remote, addr->sin6_addr.s6_addr, 16); + t->remote[16] = (addr->sin6_port & 0xff00) >> 8; + t->remote[17] = (addr->sin6_port & 0x00ff) >> 0; + t->remote_length = 18; + + /* + * This is a client-type session, so attempt to connect to the far + * end. We don't go non-blocking here because it's not obvious what + * you'd then do if you tried to do snmp_sends before the connection + * had completed. So this can block. + */ + + rc = connect(t->sock, (struct sockaddr *) addr, + sizeof(struct sockaddr_in6)); + + DEBUGMSGTL(("netsnmp_tcp6", "connect returns %d\n", rc)); + + if (rc < 0) { + netsnmp_tcp6_close(t); + netsnmp_transport_free(t); + return NULL; + } + + /* + * Allow user to override the send and receive buffers. Default is + * to use os default. Don't worry too much about errors -- + * just plough on regardless. + */ + netsnmp_sock_buffer_set(t->sock, SO_SNDBUF, local, 0); + netsnmp_sock_buffer_set(t->sock, SO_RCVBUF, local, 0); + } + + /* + * Message size is not limited by this transport (hence msgMaxSize + * is equal to the maximum legal size of an SNMP message). + */ + + t->msgMaxSize = 0x7fffffff; + t->f_recv = netsnmp_tcp6_recv; + t->f_send = netsnmp_tcp6_send; + t->f_close = netsnmp_tcp6_close; + t->f_accept = netsnmp_tcp6_accept; + t->f_fmtaddr = netsnmp_tcp6_fmtaddr; + + return t; +} + +/* + * Not extern but still defined in snmpUDPIPv6Domain.c + */ +extern int +netsnmp_sockaddr_in6_2(struct sockaddr_in6*, const char*, const char*); + +netsnmp_transport * +netsnmp_tcp6_create_tstring(const char *str, int local, + const char *default_target) +{ + struct sockaddr_in6 addr; + + if (netsnmp_sockaddr_in6_2(&addr, str, default_target)) { + return netsnmp_tcp6_transport(&addr, local); + } else { + return NULL; + } +} + + +/* + * See: + * + * http://www.ietf.org/internet-drafts/draft-ietf-ops-taddress-mib-01.txt + * + * (or newer equivalent) for details of the TC which we are using for + * the mapping here. + */ + +netsnmp_transport * +netsnmp_tcp6_create_ostring(const u_char * o, size_t o_len, int local) +{ + struct sockaddr_in6 addr; + + if (o_len == 18) { + memset((u_char *) & addr, 0, sizeof(struct sockaddr_in6)); + addr.sin6_family = AF_INET6; + memcpy((u_char *) & (addr.sin6_addr.s6_addr), o, 16); + addr.sin6_port = (o[16] << 8) + o[17]; + return netsnmp_tcp6_transport(&addr, local); + } + return NULL; +} + + +void +netsnmp_tcp6_ctor(void) +{ + tcp6Domain.name = netsnmp_TCPIPv6Domain; + tcp6Domain.name_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid); + tcp6Domain.f_create_from_tstring_new = netsnmp_tcp6_create_tstring; + tcp6Domain.f_create_from_ostring = netsnmp_tcp6_create_ostring; + tcp6Domain.prefix = (const char**)calloc(4, sizeof(char *)); + tcp6Domain.prefix[0] = "tcp6"; + tcp6Domain.prefix[1] = "tcpv6"; + tcp6Domain.prefix[2] = "tcpipv6"; + + netsnmp_tdomain_register(&tcp6Domain); +} + +#endif /* NETSNMP_TRANSPORT_TCPIPV6_DOMAIN */ + |