summaryrefslogtreecommitdiff
path: root/snmplib/transports/snmpUnixDomain.c
diff options
context:
space:
mode:
Diffstat (limited to 'snmplib/transports/snmpUnixDomain.c')
-rw-r--r--snmplib/transports/snmpUnixDomain.c752
1 files changed, 752 insertions, 0 deletions
diff --git a/snmplib/transports/snmpUnixDomain.c b/snmplib/transports/snmpUnixDomain.c
new file mode 100644
index 0000000..674dc2b
--- /dev/null
+++ b/snmplib/transports/snmpUnixDomain.c
@@ -0,0 +1,752 @@
+#include <net-snmp/net-snmp-config.h>
+#include <net-snmp/net-snmp-features.h>
+
+#include <sys/types.h>
+#include <net-snmp/library/snmpUnixDomain.h>
+
+#include <stddef.h>
+#include <stdio.h>
+#include <ctype.h>
+#include <errno.h>
+
+#if HAVE_STRING_H
+#include <string.h>
+#else
+#include <strings.h>
+#endif
+#if HAVE_STDLIB_H
+#include <stdlib.h>
+#endif
+#if HAVE_UNISTD_H
+#include <unistd.h>
+#endif
+#if HAVE_SYS_SOCKET_H
+#include <sys/socket.h>
+#endif
+
+#if HAVE_DMALLOC_H
+#include <dmalloc.h>
+#endif
+
+#include <net-snmp/types.h>
+#include <net-snmp/output_api.h>
+#include <net-snmp/config_api.h>
+
+#include <net-snmp/library/snmp_transport.h>
+#include <net-snmp/library/snmpSocketBaseDomain.h>
+#include <net-snmp/library/system.h> /* mkdirhier */
+#include <net-snmp/library/tools.h>
+
+netsnmp_feature_child_of(transport_unix_socket_all, transport_all)
+netsnmp_feature_child_of(unix_socket_paths, transport_unix_socket_all)
+
+#ifndef NETSNMP_STREAM_QUEUE_LEN
+#define NETSNMP_STREAM_QUEUE_LEN 5
+#endif
+
+#ifndef SUN_LEN
+/*
+ * Evaluate to actual length of the `sockaddr_un' structure.
+ */
+#define SUN_LEN(ptr) ((size_t) (((struct sockaddr_un *) 0)->sun_path) \
+ + strlen ((ptr)->sun_path))
+#endif
+
+oid netsnmp_UnixDomain[] = { TRANSPORT_DOMAIN_LOCAL };
+static netsnmp_tdomain unixDomain;
+
+
+/*
+ * This is the structure we use to hold transport-specific data.
+ */
+
+typedef struct _sockaddr_un_pair {
+ int local;
+ struct sockaddr_un server;
+ struct sockaddr_un client;
+} sockaddr_un_pair;
+
+
+/*
+ * Return a string representing the address in data, or else the "far end"
+ * address if data is NULL.
+ */
+
+static char *
+netsnmp_unix_fmtaddr(netsnmp_transport *t, void *data, int len)
+{
+ struct sockaddr_un *to = NULL;
+
+ if (data != NULL) {
+ to = (struct sockaddr_un *) data;
+ } else if (t != NULL && t->data != NULL) {
+ to = &(((sockaddr_un_pair *) t->data)->server);
+ len = SUN_LEN(to);
+ }
+ if (to == NULL) {
+ /*
+ * "Local IPC" is the Posix.1g term for Unix domain protocols,
+ * according to W. R. Stevens, ``Unix Network Programming Volume I
+ * Second Edition'', p. 374.
+ */
+ return strdup("Local IPC: unknown");
+ } else if (to->sun_path[0] == 0) {
+ /*
+ * This is an abstract name. We could render it as hex or something
+ * but let's not worry about that for now.
+ */
+ return strdup("Local IPC: abstract");
+ } else {
+ char *tmp = (char *) malloc(16 + len);
+ if (tmp != NULL) {
+ sprintf(tmp, "Local IPC: %s", to->sun_path);
+ }
+ return tmp;
+ }
+}
+
+
+
+/*
+ * You can write something into opaque that will subsequently get passed back
+ * to your send function if you like. For instance, you might want to
+ * remember where a PDU came from, so that you can send a reply there...
+ */
+
+static int
+netsnmp_unix_recv(netsnmp_transport *t, void *buf, int size,
+ void **opaque, int *olength)
+{
+ int rc = -1;
+ socklen_t tolen = sizeof(struct sockaddr_un);
+ struct sockaddr *to;
+
+
+ if (t != NULL && t->sock >= 0) {
+ to = (struct sockaddr *) malloc(sizeof(struct sockaddr_un));
+ if (to == NULL) {
+ *opaque = NULL;
+ *olength = 0;
+ return -1;
+ } else {
+ memset(to, 0, tolen);
+ }
+ if(getsockname(t->sock, to, &tolen) != 0){
+ free(to);
+ *opaque = NULL;
+ *olength = 0;
+ return -1;
+ };
+ while (rc < 0) {
+#ifdef MSG_DONTWAIT
+ rc = recvfrom(t->sock, buf, size, MSG_DONTWAIT, NULL, NULL);
+#else
+ rc = recvfrom(t->sock, buf, size, 0, NULL, NULL);
+#endif
+ if (rc < 0 && errno != EINTR) {
+ DEBUGMSGTL(("netsnmp_unix", "recv fd %d err %d (\"%s\")\n",
+ t->sock, errno, strerror(errno)));
+ return rc;
+ }
+ *opaque = (void*)to;
+ *olength = sizeof(struct sockaddr_un);
+ }
+ DEBUGMSGTL(("netsnmp_unix", "recv fd %d got %d bytes\n", t->sock, rc));
+ }
+ return rc;
+}
+
+
+
+static int
+netsnmp_unix_send(netsnmp_transport *t, void *buf, int size,
+ void **opaque, int *olength)
+{
+ int rc = -1;
+
+ if (t != NULL && t->sock >= 0) {
+ DEBUGMSGTL(("netsnmp_unix", "send %d bytes to %p on fd %d\n",
+ size, buf, t->sock));
+ while (rc < 0) {
+ rc = sendto(t->sock, buf, size, 0, NULL, 0);
+ if (rc < 0 && errno != EINTR) {
+ break;
+ }
+ }
+ }
+ return rc;
+}
+
+
+
+static int
+netsnmp_unix_close(netsnmp_transport *t)
+{
+ int rc = 0;
+ sockaddr_un_pair *sup = (sockaddr_un_pair *) t->data;
+
+ if (t->sock >= 0) {
+#ifndef HAVE_CLOSESOCKET
+ rc = close(t->sock);
+#else
+ rc = closesocket(t->sock);
+#endif
+ t->sock = -1;
+ if (sup != NULL) {
+ if (sup->local) {
+ if (sup->server.sun_path[0] != 0) {
+ DEBUGMSGTL(("netsnmp_unix", "close: server unlink(\"%s\")\n",
+ sup->server.sun_path));
+ unlink(sup->server.sun_path);
+ }
+ } else {
+ if (sup->client.sun_path[0] != 0) {
+ DEBUGMSGTL(("netsnmp_unix", "close: client unlink(\"%s\")\n",
+ sup->client.sun_path));
+ unlink(sup->client.sun_path);
+ }
+ }
+ }
+ return rc;
+ } else {
+ return -1;
+ }
+}
+
+
+
+static int
+netsnmp_unix_accept(netsnmp_transport *t)
+{
+ struct sockaddr *farend = NULL;
+ int newsock = -1;
+ socklen_t farendlen = sizeof(struct sockaddr_un);
+
+ farend = (struct sockaddr *) malloc(farendlen);
+
+ if (farend == NULL) {
+ /*
+ * Indicate that the acceptance of this socket failed.
+ */
+ DEBUGMSGTL(("netsnmp_unix", "accept: malloc failed\n"));
+ return -1;
+ }
+ memset(farend, 0, farendlen);
+
+ if (t != NULL && t->sock >= 0) {
+ newsock = accept(t->sock, farend, &farendlen);
+
+ if (newsock < 0) {
+ DEBUGMSGTL(("netsnmp_unix","accept failed rc %d errno %d \"%s\"\n",
+ newsock, errno, strerror(errno)));
+ free(farend);
+ return newsock;
+ }
+
+ if (t->data != NULL) {
+ free(t->data);
+ }
+
+ DEBUGMSGTL(("netsnmp_unix", "accept succeeded (farend %p len %d)\n",
+ farend, farendlen));
+ t->data = farend;
+ t->data_length = sizeof(struct sockaddr_un);
+ netsnmp_sock_buffer_set(newsock, SO_SNDBUF, 1, 0);
+ netsnmp_sock_buffer_set(newsock, SO_RCVBUF, 1, 0);
+ return newsock;
+ } else {
+ free(farend);
+ return -1;
+ }
+}
+
+static int create_path = 0;
+static mode_t create_mode;
+
+#ifndef NETSNMP_FEATURE_REMOVE_UNIX_SOCKET_PATHS
+/** If trying to create unix sockets in nonexisting directories then
+ * try to create the directory with mask mode.
+ */
+void netsnmp_unix_create_path_with_mode(int mode)
+{
+ create_path = 1;
+ create_mode = mode;
+}
+
+/** If trying to create unix sockets in nonexisting directories then
+ * fail.
+ */
+void netsnmp_unix_dont_create_path(void)
+{
+ create_path = 0;
+}
+#endif /* NETSNMP_FEATURE_REMOVE_UNIX_SOCKET_PATHS */
+
+/*
+ * Open a Unix-domain transport for SNMP. Local is TRUE if addr is the local
+ * address to bind to (i.e. this is a server-type session); otherwise addr is
+ * the remote address to send things to (and we make up a temporary name for
+ * the local end of the connection).
+ */
+
+netsnmp_transport *
+netsnmp_unix_transport(struct sockaddr_un *addr, int local)
+{
+ netsnmp_transport *t = NULL;
+ sockaddr_un_pair *sup = NULL;
+ int rc = 0;
+
+#ifdef NETSNMP_NO_LISTEN_SUPPORT
+ /* SPECIAL CIRCUMSTANCE: We still want AgentX to be able to operate,
+ so we allow for unix domain socktes to still listen when everything
+ else isn't allowed to. Thus, we ignore this define in this file.
+ */
+#endif /* NETSNMP_NO_LISTEN_SUPPORT */
+
+ if (addr == NULL || addr->sun_family != AF_UNIX) {
+ return NULL;
+ }
+
+ t = SNMP_MALLOC_TYPEDEF(netsnmp_transport);
+ if (t == NULL) {
+ return NULL;
+ }
+
+ DEBUGIF("netsnmp_unix") {
+ char *str = netsnmp_unix_fmtaddr(NULL, (void *)addr,
+ sizeof(struct sockaddr_un));
+ DEBUGMSGTL(("netsnmp_unix", "open %s %s\n", local ? "local" : "remote",
+ str));
+ free(str);
+ }
+
+ t->domain = netsnmp_UnixDomain;
+ t->domain_length =
+ sizeof(netsnmp_UnixDomain) / sizeof(netsnmp_UnixDomain[0]);
+
+ t->data = malloc(sizeof(sockaddr_un_pair));
+ if (t->data == NULL) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ memset(t->data, 0, sizeof(sockaddr_un_pair));
+ t->data_length = sizeof(sockaddr_un_pair);
+ sup = (sockaddr_un_pair *) t->data;
+
+ t->sock = socket(PF_UNIX, SOCK_STREAM, 0);
+ if (t->sock < 0) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ t->flags = NETSNMP_TRANSPORT_FLAG_STREAM;
+
+ if (local) {
+ t->local = (u_char *)malloc(strlen(addr->sun_path));
+ if (t->local == NULL) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ memcpy(t->local, addr->sun_path, strlen(addr->sun_path));
+ t->local_length = strlen(addr->sun_path);
+
+ /*
+ * This session is inteneded as a server, so we must bind to the given
+ * path (unlinking it first, to avoid errors).
+ */
+
+ t->flags |= NETSNMP_TRANSPORT_FLAG_LISTEN;
+
+ unlink(addr->sun_path);
+ rc = bind(t->sock, (struct sockaddr *) addr, SUN_LEN(addr));
+
+ if (rc != 0 && errno == ENOENT && create_path) {
+ rc = mkdirhier(addr->sun_path, create_mode, 1);
+ if (rc != 0) {
+ netsnmp_unix_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ rc = bind(t->sock, (struct sockaddr *) addr, SUN_LEN(addr));
+ }
+ if (rc != 0) {
+ DEBUGMSGTL(("netsnmp_unix_transport",
+ "couldn't bind \"%s\", errno %d (%s)\n",
+ addr->sun_path, errno, strerror(errno)));
+ netsnmp_unix_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ /*
+ * Save the address in the transport-specific data pointer for later
+ * use by netsnmp_unix_close.
+ */
+
+ sup->server.sun_family = AF_UNIX;
+ strcpy(sup->server.sun_path, addr->sun_path);
+ sup->local = 1;
+
+ /*
+ * Now sit here and listen for connections to arrive.
+ */
+
+ rc = listen(t->sock, NETSNMP_STREAM_QUEUE_LEN);
+ if (rc != 0) {
+ DEBUGMSGTL(("netsnmp_unix_transport",
+ "couldn't listen to \"%s\", errno %d (%s)\n",
+ addr->sun_path, errno, strerror(errno)));
+ netsnmp_unix_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ } else {
+ t->remote = (u_char *)malloc(strlen(addr->sun_path));
+ if (t->remote == NULL) {
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+ memcpy(t->remote, addr->sun_path, strlen(addr->sun_path));
+ t->remote_length = strlen(addr->sun_path);
+
+ rc = connect(t->sock, (struct sockaddr *) addr,
+ sizeof(struct sockaddr_un));
+ if (rc != 0) {
+ DEBUGMSGTL(("netsnmp_unix_transport",
+ "couldn't connect to \"%s\", errno %d (%s)\n",
+ addr->sun_path, errno, strerror(errno)));
+ netsnmp_unix_close(t);
+ netsnmp_transport_free(t);
+ return NULL;
+ }
+
+ /*
+ * Save the remote address in the transport-specific data pointer for
+ * later use by netsnmp_unix_send.
+ */
+
+ sup->server.sun_family = AF_UNIX;
+ strcpy(sup->server.sun_path, addr->sun_path);
+ sup->local = 0;
+ netsnmp_sock_buffer_set(t->sock, SO_SNDBUF, local, 0);
+ netsnmp_sock_buffer_set(t->sock, SO_RCVBUF, local, 0);
+ }
+
+ /*
+ * Message size is not limited by this transport (hence msgMaxSize
+ * is equal to the maximum legal size of an SNMP message).
+ */
+
+ t->msgMaxSize = 0x7fffffff;
+ t->f_recv = netsnmp_unix_recv;
+ t->f_send = netsnmp_unix_send;
+ t->f_close = netsnmp_unix_close;
+ t->f_accept = netsnmp_unix_accept;
+ t->f_fmtaddr = netsnmp_unix_fmtaddr;
+
+ return t;
+}
+
+netsnmp_transport *
+netsnmp_unix_create_tstring(const char *string, int local,
+ const char *default_target)
+{
+ struct sockaddr_un addr;
+
+ if (string && *string != '\0') {
+ } else if (default_target && *default_target != '\0') {
+ string = default_target;
+ }
+
+ if ((string != NULL && *string != '\0') &&
+ (strlen(string) < sizeof(addr.sun_path))) {
+ addr.sun_family = AF_UNIX;
+ memset(addr.sun_path, 0, sizeof(addr.sun_path));
+ strlcpy(addr.sun_path, string, sizeof(addr.sun_path));
+ return netsnmp_unix_transport(&addr, local);
+ } else {
+ if (string != NULL && *string != '\0') {
+ snmp_log(LOG_ERR, "Path too long for Unix domain transport\n");
+ }
+ return NULL;
+ }
+}
+
+
+
+netsnmp_transport *
+netsnmp_unix_create_ostring(const u_char * o, size_t o_len, int local)
+{
+ struct sockaddr_un addr;
+
+ if (o_len > 0 && o_len < (sizeof(addr.sun_path) - 1)) {
+ addr.sun_family = AF_UNIX;
+ memset(addr.sun_path, 0, sizeof(addr.sun_path));
+ strlcpy(addr.sun_path, (const char *)o, sizeof(addr.sun_path));
+ return netsnmp_unix_transport(&addr, local);
+ } else {
+ if (o_len > 0) {
+ snmp_log(LOG_ERR, "Path too long for Unix domain transport\n");
+ }
+ }
+ return NULL;
+}
+
+
+
+void
+netsnmp_unix_ctor(void)
+{
+ unixDomain.name = netsnmp_UnixDomain;
+ unixDomain.name_length = sizeof(netsnmp_UnixDomain) / sizeof(oid);
+ unixDomain.prefix = (const char**)calloc(2, sizeof(char *));
+ unixDomain.prefix[0] = "unix";
+
+ unixDomain.f_create_from_tstring = NULL;
+ unixDomain.f_create_from_tstring_new = netsnmp_unix_create_tstring;
+ unixDomain.f_create_from_ostring = netsnmp_unix_create_ostring;
+
+ netsnmp_tdomain_register(&unixDomain);
+}
+
+#if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C)
+/* support for SNMPv1 and SNMPv2c on unix domain*/
+
+#define EXAMPLE_COMMUNITY "COMMUNITY"
+typedef struct com2SecUnixEntry_s {
+ const char* sockpath;
+ const char* secName;
+ const char* contextName;
+ struct com2SecUnixEntry_s *next;
+ unsigned short pathlen;
+ const char community[1];
+} com2SecUnixEntry;
+
+static com2SecUnixEntry *com2SecUnixList = NULL, *com2SecUnixListLast = NULL;
+
+
+int
+netsnmp_unix_getSecName(void *opaque, int olength,
+ const char *community,
+ size_t community_len,
+ const char **secName, const char **contextName)
+{
+ const com2SecUnixEntry *c;
+ struct sockaddr_un *to = (struct sockaddr_un *) opaque;
+ char *ztcommunity = NULL;
+
+ if (secName != NULL) {
+ *secName = NULL; /* Haven't found anything yet */
+ }
+
+ /*
+ * Special case if there are NO entries (as opposed to no MATCHING
+ * entries).
+ */
+
+ if (com2SecUnixList == NULL) {
+ DEBUGMSGTL(("netsnmp_unix_getSecName", "no com2sec entries\n"));
+ return 0;
+ }
+
+ /*
+ * If there is no unix socket path, then there can be no valid security
+ * name.
+ */
+
+ if (opaque == NULL || olength != sizeof(struct sockaddr_un) ||
+ to->sun_family != AF_UNIX) {
+ DEBUGMSGTL(("netsnmp_unix_getSecName",
+ "no unix destine address in PDU?\n"));
+ return 1;
+ }
+
+ DEBUGIF("netsnmp_unix_getSecName") {
+ ztcommunity = (char *)malloc(community_len + 1);
+ if (ztcommunity != NULL) {
+ memcpy(ztcommunity, community, community_len);
+ ztcommunity[community_len] = '\0';
+ }
+
+ DEBUGMSGTL(("netsnmp_unix_getSecName", "resolve <\"%s\">\n",
+ ztcommunity ? ztcommunity : "<malloc error>"));
+ }
+
+ for (c = com2SecUnixList; c != NULL; c = c->next) {
+ DEBUGMSGTL(("netsnmp_unix_getSecName","compare <\"%s\",to socket %s>",
+ c->community, c->sockpath ));
+ if ((community_len == strlen(c->community)) &&
+ (memcmp(community, c->community, community_len) == 0) &&
+ /* compare sockpath, if pathlen == 0, always match */
+ (strlen(to->sun_path) == c->pathlen || c->pathlen == 0) &&
+ (memcmp(to->sun_path, c->sockpath, c->pathlen) == 0)
+ ) {
+ DEBUGMSG(("netsnmp_unix_getSecName", "... SUCCESS\n"));
+ if (secName != NULL) {
+ *secName = c->secName;
+ *contextName = c->contextName;
+ }
+ break;
+ }
+ DEBUGMSG(("netsnmp_unix_getSecName", "... nope\n"));
+ }
+ if (ztcommunity != NULL) {
+ free(ztcommunity);
+ }
+ return 1;
+}
+
+void
+netsnmp_unix_parse_security(const char *token, char *param)
+{
+ char secName[VACMSTRINGLEN + 1];
+ size_t secNameLen;
+ char contextName[VACMSTRINGLEN + 1];
+ size_t contextNameLen;
+ char community[COMMUNITY_MAX_LEN + 1];
+ size_t communityLen;
+ char sockpath[sizeof(((struct sockaddr_un*)0)->sun_path) + 1];
+ size_t sockpathLen;
+
+ param = copy_nword( param, secName, sizeof(secName));
+ if (strcmp(secName, "-Cn") == 0) {
+ if (!param) {
+ config_perror("missing CONTEXT_NAME parameter");
+ return;
+ }
+ param = copy_nword( param, contextName, sizeof(contextName));
+ contextNameLen = strlen(contextName) + 1;
+ if (contextNameLen > VACMSTRINGLEN) {
+ config_perror("context name too long");
+ return;
+ }
+ if (!param) {
+ config_perror("missing NAME parameter");
+ return;
+ }
+ param = copy_nword( param, secName, sizeof(secName));
+ } else {
+ contextNameLen = 0;
+ }
+
+ secNameLen = strlen(secName) + 1;
+ if (secNameLen == 1) {
+ config_perror("empty NAME parameter");
+ return;
+ } else if (secNameLen > VACMSTRINGLEN) {
+ config_perror("security name too long");
+ return;
+ }
+
+ if (!param) {
+ config_perror("missing SOCKPATH parameter");
+ return;
+ }
+ param = copy_nword( param, sockpath, sizeof(sockpath));
+ if (sockpath[0] == '\0') {
+ config_perror("empty SOCKPATH parameter");
+ return;
+ }
+ sockpathLen = strlen(sockpath) + 1;
+ if (sockpathLen > sizeof(((struct sockaddr_un*)0)->sun_path)) {
+ config_perror("sockpath too long");
+ return;
+ }
+
+ if (!param) {
+ config_perror("missing COMMUNITY parameter");
+ return;
+ }
+ param = copy_nword( param, community, sizeof(community));
+ if (community[0] == '\0') {
+ config_perror("empty COMMUNITY parameter");
+ return;
+ }
+ communityLen = strlen(community) + 1;
+ if (communityLen >= COMMUNITY_MAX_LEN) {
+ config_perror("community name too long");
+ return;
+ }
+ if (communityLen == sizeof(EXAMPLE_COMMUNITY) &&
+ memcmp(community, EXAMPLE_COMMUNITY, sizeof(EXAMPLE_COMMUNITY)) == 0) {
+ config_perror("example config COMMUNITY not properly configured");
+ return;
+ }
+
+ /* Deal with the "default" case */
+ if(strcmp(sockpath, "default") == 0) {
+ sockpathLen = 0;
+ }
+
+ {
+ void* v = malloc(offsetof(com2SecUnixEntry, community) + communityLen +
+ sockpathLen + secNameLen + contextNameLen);
+ com2SecUnixEntry* e = (com2SecUnixEntry*)v;
+ char* last = ((char*)v) + offsetof(com2SecUnixEntry, community);
+ if (e == NULL) {
+ config_perror("memory error");
+ return;
+ }
+
+ DEBUGMSGTL(("netsnmp_unix_parse_security",
+ "<\"%s\", \"%.*s\"> => \"%s\"\n",
+ community, (int)sockpathLen, sockpath, secName));
+
+ memcpy(last, community, communityLen);
+ last += communityLen;
+
+ if (sockpathLen) {
+ e->sockpath = last;
+ memcpy(last, sockpath, sockpathLen);
+ last += sockpathLen;
+ e->pathlen = sockpathLen - 1;
+ } else {
+ e->sockpath = last - 1;
+ e->pathlen = 0;
+ }
+
+ e->secName = last;
+ memcpy(last, secName, secNameLen);
+ last += secNameLen;
+
+ if (contextNameLen) {
+ e->contextName = last;
+ memcpy(last, contextName, contextNameLen);
+ last += contextNameLen;
+ } else
+ e->contextName = last - 1;
+
+ e->next = NULL;
+
+ if (com2SecUnixListLast != NULL) {
+ com2SecUnixListLast->next = e;
+ com2SecUnixListLast = e;
+ } else {
+ com2SecUnixListLast = com2SecUnixList = e;
+ }
+ }
+}
+
+void
+netsnmp_unix_com2SecList_free(void)
+{
+ com2SecUnixEntry *e = com2SecUnixList;
+ while (e != NULL) {
+ com2SecUnixEntry *tmp = e;
+ e = e->next;
+ free(tmp);
+ }
+ com2SecUnixList = com2SecUnixListLast = NULL;
+}
+#endif /* support for community based SNMP */
+
+void
+netsnmp_unix_agent_config_tokens_register(void)
+{
+#if !defined(NETSNMP_DISABLE_SNMPV1) || !defined(NETSNMP_DISABLE_SNMPV2C)
+ register_app_config_handler("com2secunix", netsnmp_unix_parse_security,
+ netsnmp_unix_com2SecList_free,
+ "[-Cn CONTEXT] secName sockpath community");
+#endif /* support for community based SNMP */
+}