summaryrefslogtreecommitdiff
path: root/snmplib/snmpTCPIPv6Domain.c
diff options
context:
space:
mode:
Diffstat (limited to 'snmplib/snmpTCPIPv6Domain.c')
-rw-r--r--snmplib/snmpTCPIPv6Domain.c481
1 files changed, 481 insertions, 0 deletions
diff --git a/snmplib/snmpTCPIPv6Domain.c b/snmplib/snmpTCPIPv6Domain.c
new file mode 100644
index 0000000..8a0ec52
--- /dev/null
+++ b/snmplib/snmpTCPIPv6Domain.c
@@ -0,0 +1,481 @@
+#include <net-snmp/net-snmp-config.h>
+
+#ifdef NETSNMP_TRANSPORT_TCPIPV6_DOMAIN
+
+#include <stdio.h>
+#include <sys/types.h>
+#include <errno.h>
+
+#if HAVE_STRING_H
+#include <string.h>
+#else
+#include <strings.h>
+#endif
+#if HAVE_STDLIB_H
+#include <stdlib.h>
+#endif
+#if HAVE_UNISTD_H
+#include <unistd.h>
+#endif
+#if HAVE_SYS_SOCKET_H
+#include <sys/socket.h>
+#endif
+
+#if defined(HAVE_WINSOCK_H)
+ /*
+ * Windows IPv6 support is part of WinSock2 only
+ */
+#include <winsock2.h>
+#include <ws2tcpip.h>
+
+extern const char *inet_ntop(int, const void*, char*, size_t);
+
+#endif
+
+#if HAVE_NETINET_IN_H
+#include <netinet/in.h>
+#endif
+#if HAVE_ARPA_INET_H
+#include <arpa/inet.h>
+#endif
+#if HAVE_NETDB_H
+#include <netdb.h>
+#endif
+#if HAVE_FCNTL_H
+#include <fcntl.h>
+#endif
+
+#if HAVE_DMALLOC_H
+#include <dmalloc.h>
+#endif
+
+#include <net-snmp/types.h>
+#include <net-snmp/output_api.h>
+#include <net-snmp/config_api.h>
+
+#include <net-snmp/library/snmp_transport.h>
+#include <net-snmp/library/snmpUDPDomain.h>
+#include <net-snmp/library/snmpUDPIPv6Domain.h>
+#include <net-snmp/library/snmpTCPIPv6Domain.h>
+
+oid netsnmp_TCPIPv6Domain[] = { TRANSPORT_DOMAIN_TCP_IPV6 };
+static netsnmp_tdomain tcp6Domain;
+
+/*
+ * Return a string representing the address in data, or else the "far end"
+ * address if data is NULL.
+ */
+
+static char *
+netsnmp_tcp6_fmtaddr(netsnmp_transport *t, void *data, int len)
+{
+ struct sockaddr_in6 *to = NULL;
+
+ DEBUGMSGTL(("netsnmp_tcp6", "fmtaddr: t = %p, data = %p, len = %d\n", t,
+ data, len));
+ if (data != NULL && len == sizeof(struct sockaddr_in6)) {
+ to = (struct sockaddr_in6 *) data;
+ } else if (t != NULL && t->data != NULL) {
+ to = (struct sockaddr_in6 *) t->data;
+ }
+ if (to == NULL) {
+ return strdup("TCP/IPv6: unknown");
+ } else {
+ char addr[INET6_ADDRSTRLEN];
+ char tmp[INET6_ADDRSTRLEN + 18];
+
+ sprintf(tmp, "TCP/IPv6: [%s]:%hu",
+ inet_ntop(AF_INET6, (void *) &(to->sin6_addr), addr,
+ INET6_ADDRSTRLEN), ntohs(to->sin6_port));
+ return strdup(tmp);
+ }
+}
+
+/*
+ * You can write something into opaque that will subsequently get passed back
+ * to your send function if you like. For instance, you might want to
+ * remember where a PDU came from, so that you can send a reply there...
+ */
+
+static int
+netsnmp_tcp6_recv(netsnmp_transport *t, void *buf, int size,
+ void **opaque, int *olength)
+{
+ int rc = -1;
+
+ if (t != NULL && t->sock >= 0) {
+ while (rc < 0) {
+ rc = recvfrom(t->sock, buf, size, 0, NULL, 0);
+ if (rc < 0 && errno != EINTR) {
+ DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d err %d (\"%s\")\n",
+ t->sock, errno, strerror(errno)));
+ return -1;
+ }
+ }
+ DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d got %d bytes\n", t->sock, rc));
+ } else {
+ return -1;
+ }
+
+ if (opaque != NULL && olength != NULL) {
+ if (t->data_length > 0) {
+ if ((*opaque = malloc(t->data_length)) != NULL) {
+ memcpy(*opaque, t->data, t->data_length);
+ *olength = t->data_length;
+ } else {
+ *olength = 0;
+ }
+ } else {
+ *opaque = NULL;
+ *olength = 0;
+ }
+ }
+
+ return rc;
+}
+
+static int
+netsnmp_tcp6_send(netsnmp_transport *t, void *buf, int size,
+ void **opaque, int *olength)
+{
+ int rc = -1;
+
+ if (t != NULL && t->sock >= 0) {
+ while (rc < 0) {
+ rc = sendto(t->sock, buf, size, 0, NULL, 0);
+ if (rc < 0 && errno != EINTR) {
+ break;
+ }
+ }
+ }
+ return rc;
+}
+
+static int
+netsnmp_tcp6_close(netsnmp_transport *t)
+{
+ int rc = -1;
+ if (t != NULL && t->sock >= 0) {
+ DEBUGMSGTL(("netsnmp_tcp6", "close fd %d\n", t->sock));
+#ifndef HAVE_CLOSESOCKET
+ rc = close(t->sock);
+#else
+ rc = closesocket(t->sock);
+#endif
+ t->sock = -1;
+ }
+ return rc;
+}
+
+static int
+netsnmp_tcp6_accept(netsnmp_transport *t)
+{
+ struct sockaddr_in6 *farend = NULL;
+ int newsock = -1, sockflags = 0;
+ socklen_t farendlen = sizeof(struct sockaddr_in6);
+ char *str = NULL;
+
+ farend = (struct sockaddr_in6 *) malloc(sizeof(struct sockaddr_in6));
+
+ if (farend == NULL) {
+ /*
+ * Indicate that the acceptance of this socket failed.
+ */
+ DEBUGMSGTL(("netsnmp_tcp6", "accept: malloc failed\n"));
+ return -1;
+ }
+
+ if (t != NULL && t->sock >= 0) {
+ newsock = accept(t->sock, (struct sockaddr *) farend, &farendlen);
+
+ if (newsock < 0) {
+ DEBUGMSGTL(("netsnmp_tcp6","accept failed rc %d errno %d \"%s\"\n",
+ newsock, errno, strerror(errno)));
+ free(farend);
+ return newsock;
+ }
+
+ if (t->data != NULL) {
+ free(t->data);
+ }
+
+ t->data = farend;
+ t->data_length = farendlen;
+ str = netsnmp_tcp6_fmtaddr(NULL, farend, farendlen);
+ DEBUGMSGTL(("netsnmp_tcp6", "accept succeeded (from %s)\n", str));
+ free(str);
+
+ /*
+ * Try to make the new socket blocking.
+ */
+
+#ifdef WIN32
+ ioctlsocket(newsock, FIONBIO, &sockflags);
+#else
+ if ((sockflags = fcntl(newsock, F_GETFL, 0)) >= 0) {
+ fcntl(newsock, F_SETFL, (sockflags & ~O_NONBLOCK));
+ } else {
+ DEBUGMSGTL(("netsnmp_tcp6", "accept: couldn't f_getfl of fd %d\n",
+ newsock));
+ }
+#endif
+
+ /*
+ * Allow user to override the send and receive buffers. Default is
+ * to use os default. Don't worry too much about errors --
+ * just plough on regardless.
+ */
+ netsnmp_sock_buffer_set(newsock, SO_SNDBUF, 1, 0);
+ netsnmp_sock_buffer_set(newsock, SO_RCVBUF, 1, 0);
+
+ return newsock;
+ } else {
+ free(farend);
+ return -1;
+ }
+}
+
+
+
+/*
+ * Open a TCP/IPv6-based transport for SNMP. Local is TRUE if addr is the
+ * local address to bind to (i.e. this is a server-type session); otherwise
+ * addr is the remote address to send things to.
+ */
+
+netsnmp_transport *
+netsnmp_tcp6_transport(struct sockaddr_in6 *addr, int local)
+{
+ netsnmp_transport *t = NULL;
+ int rc = 0;
+ char *str = NULL;
+
+ if (addr == NULL || addr->sin6_family != AF_INET6) {
+ return NULL;
+ }
+
+ t = (netsnmp_transport *) malloc(sizeof(netsnmp_transport));
+ if (t == NULL) {
+ return NULL;
+ }
+ memset(t, 0, sizeof(netsnmp_transport));
+
+ str = netsnmp_tcp6_fmtaddr(NULL, (void *)addr,
+ sizeof(struct sockaddr_in6));
+ DEBUGMSGTL(("netsnmp_tcp6", "open %s %s\n", local ? "local" : "remote",
+ str));
+ free(str);
+
+ memset(t, 0, sizeof(netsnmp_transport));
+
+ t->data = malloc(sizeof(struct sockaddr_in6));
+ if (t->data == NULL) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ t->data_length = sizeof(struct sockaddr_in6);
+ memcpy(t->data, addr, sizeof(struct sockaddr_in6));
+
+ t->domain = netsnmp_TCPIPv6Domain;
+ t->domain_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid);
+
+ t->sock = socket(PF_INET6, SOCK_STREAM, 0);
+ if (t->sock < 0) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ t->flags = NETSNMP_TRANSPORT_FLAG_STREAM;
+
+ if (local) {
+ int sockflags = 0, opt = 1;
+
+ /*
+ * This session is inteneded as a server, so we must bind on to the
+ * given IP address, which may include an interface address, or could
+ * be INADDR_ANY, but certainly includes a port number.
+ */
+
+#ifdef IPV6_V6ONLY
+ /* Try to restrict PF_INET6 socket to IPv6 communications only. */
+ {
+ int one=1;
+ if (setsockopt(t->sock, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&one, sizeof(one)) != 0) {
+ DEBUGMSGTL(("netsnmp_udp6", "couldn't set IPV6_V6ONLY to %d bytes: %s\n", one, strerror(errno)));
+ }
+ }
+#endif
+
+ t->flags |= NETSNMP_TRANSPORT_FLAG_LISTEN;
+ t->local = (unsigned char*)malloc(18);
+ if (t->local == NULL) {
+ netsnmp_tcp6_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ memcpy(t->local, addr->sin6_addr.s6_addr, 16);
+ t->local[16] = (addr->sin6_port & 0xff00) >> 8;
+ t->local[17] = (addr->sin6_port & 0x00ff) >> 0;
+ t->local_length = 18;
+
+ /*
+ * We should set SO_REUSEADDR too.
+ */
+
+ setsockopt(t->sock, SOL_SOCKET, SO_REUSEADDR, (void *)&opt, sizeof(opt));
+
+ rc = bind(t->sock, (struct sockaddr *) addr,
+ sizeof(struct sockaddr_in6));
+ if (rc != 0) {
+ netsnmp_tcp6_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ /*
+ * Since we are going to be letting select() tell us when connections
+ * are ready to be accept()ed, we need to make the socket n0n-blocking
+ * to avoid the race condition described in W. R. Stevens, ``Unix
+ * Network Programming Volume I Second Edition'', pp. 422--4, which
+ * could otherwise wedge the agent.
+ */
+
+#ifdef WIN32
+ opt = 1;
+ ioctlsocket(t->sock, FIONBIO, &opt);
+#else
+ sockflags = fcntl(t->sock, F_GETFL, 0);
+ fcntl(t->sock, F_SETFL, sockflags | O_NONBLOCK);
+#endif
+
+ /*
+ * Now sit here and wait for connections to arrive.
+ */
+
+ rc = listen(t->sock, NETSNMP_STREAM_QUEUE_LEN);
+ if (rc != 0) {
+ netsnmp_tcp6_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ /*
+ * no buffer size on listen socket - doesn't make sense
+ */
+
+ } else {
+ t->remote = (unsigned char*)malloc(18);
+ if (t->remote == NULL) {
+ netsnmp_tcp6_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ memcpy(t->remote, addr->sin6_addr.s6_addr, 16);
+ t->remote[16] = (addr->sin6_port & 0xff00) >> 8;
+ t->remote[17] = (addr->sin6_port & 0x00ff) >> 0;
+ t->remote_length = 18;
+
+ /*
+ * This is a client-type session, so attempt to connect to the far
+ * end. We don't go non-blocking here because it's not obvious what
+ * you'd then do if you tried to do snmp_sends before the connection
+ * had completed. So this can block.
+ */
+
+ rc = connect(t->sock, (struct sockaddr *) addr,
+ sizeof(struct sockaddr_in6));
+
+ DEBUGMSGTL(("netsnmp_tcp6", "connect returns %d\n", rc));
+
+ if (rc < 0) {
+ netsnmp_tcp6_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ /*
+ * Allow user to override the send and receive buffers. Default is
+ * to use os default. Don't worry too much about errors --
+ * just plough on regardless.
+ */
+ netsnmp_sock_buffer_set(t->sock, SO_SNDBUF, local, 0);
+ netsnmp_sock_buffer_set(t->sock, SO_RCVBUF, local, 0);
+ }
+
+ /*
+ * Message size is not limited by this transport (hence msgMaxSize
+ * is equal to the maximum legal size of an SNMP message).
+ */
+
+ t->msgMaxSize = 0x7fffffff;
+ t->f_recv = netsnmp_tcp6_recv;
+ t->f_send = netsnmp_tcp6_send;
+ t->f_close = netsnmp_tcp6_close;
+ t->f_accept = netsnmp_tcp6_accept;
+ t->f_fmtaddr = netsnmp_tcp6_fmtaddr;
+
+ return t;
+}
+
+/*
+ * Not extern but still defined in snmpUDPIPv6Domain.c
+ */
+extern int
+netsnmp_sockaddr_in6_2(struct sockaddr_in6*, const char*, const char*);
+
+netsnmp_transport *
+netsnmp_tcp6_create_tstring(const char *str, int local,
+ const char *default_target)
+{
+ struct sockaddr_in6 addr;
+
+ if (netsnmp_sockaddr_in6_2(&addr, str, default_target)) {
+ return netsnmp_tcp6_transport(&addr, local);
+ } else {
+ return NULL;
+ }
+}
+
+
+/*
+ * See:
+ *
+ * http://www.ietf.org/internet-drafts/draft-ietf-ops-taddress-mib-01.txt
+ *
+ * (or newer equivalent) for details of the TC which we are using for
+ * the mapping here.
+ */
+
+netsnmp_transport *
+netsnmp_tcp6_create_ostring(const u_char * o, size_t o_len, int local)
+{
+ struct sockaddr_in6 addr;
+
+ if (o_len == 18) {
+ memset((u_char *) & addr, 0, sizeof(struct sockaddr_in6));
+ addr.sin6_family = AF_INET6;
+ memcpy((u_char *) & (addr.sin6_addr.s6_addr), o, 16);
+ addr.sin6_port = (o[16] << 8) + o[17];
+ return netsnmp_tcp6_transport(&addr, local);
+ }
+ return NULL;
+}
+
+
+void
+netsnmp_tcp6_ctor(void)
+{
+ tcp6Domain.name = netsnmp_TCPIPv6Domain;
+ tcp6Domain.name_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid);
+ tcp6Domain.f_create_from_tstring_new = netsnmp_tcp6_create_tstring;
+ tcp6Domain.f_create_from_ostring = netsnmp_tcp6_create_ostring;
+ tcp6Domain.prefix = (const char**)calloc(4, sizeof(char *));
+ tcp6Domain.prefix[0] = "tcp6";
+ tcp6Domain.prefix[1] = "tcpv6";
+ tcp6Domain.prefix[2] = "tcpipv6";
+
+ netsnmp_tdomain_register(&tcp6Domain);
+}
+
+#endif /* NETSNMP_TRANSPORT_TCPIPV6_DOMAIN */
+