clang -cc1 -cc1 -triple amd64-unknown-openbsd7.0 -analyze -disable-free -disable-llvm-verifier -discard-value-names -main-file-name snmpc.c -analyzer-store=region -analyzer-opt-analyze-nested-blocks -analyzer-checker=core -analyzer-checker=apiModeling -analyzer-checker=unix -analyzer-checker=deadcode -analyzer-checker=security.insecureAPI.UncheckedReturn -analyzer-checker=security.insecureAPI.getpw -analyzer-checker=security.insecureAPI.gets -analyzer-checker=security.insecureAPI.mktemp -analyzer-checker=security.insecureAPI.mkstemp -analyzer-checker=security.insecureAPI.vfork -analyzer-checker=nullability.NullPassedToNonnull -analyzer-checker=nullability.NullReturnedFromNonnull -analyzer-output plist -w -setup-static-analyzer -mrelocation-model pic -pic-level 1 -pic-is-pie -mframe-pointer=all -relaxed-aliasing -fno-rounding-math -mconstructor-aliases -munwind-tables -target-cpu x86-64 -target-feature +retpoline-indirect-calls -target-feature +retpoline-indirect-branches -tune-cpu generic -debugger-tuning=gdb -fcoverage-compilation-dir=/usr/src/usr.bin/snmp/obj -resource-dir /usr/local/lib/clang/13.0.0 -I /usr/src/usr.bin/snmp -internal-isystem /usr/local/lib/clang/13.0.0/include -internal-externc-isystem /usr/include -O2 -fdebug-compilation-dir=/usr/src/usr.bin/snmp/obj -ferror-limit 19 -fwrapv -D_RET_PROTECTOR -ret-protector -fgnuc-version=4.2.1 -vectorize-loops -vectorize-slp -fno-builtin-malloc -fno-builtin-calloc -fno-builtin-realloc -fno-builtin-valloc -fno-builtin-free -fno-builtin-strdup -fno-builtin-strndup -analyzer-output=html -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /home/ben/Projects/vmm/scan-build/2022-01-12-194120-40624-1 -x c /usr/src/usr.bin/snmp/snmpc.c
| 1 | |
| 2 | |
| 3 | |
| 4 | |
| 5 | |
| 6 | |
| 7 | |
| 8 | |
| 9 | |
| 10 | |
| 11 | |
| 12 | |
| 13 | |
| 14 | |
| 15 | |
| 16 | |
| 17 | |
| 18 | |
| 19 | |
| 20 | #include <sys/limits.h> |
| 21 | #include <sys/types.h> |
| 22 | #include <sys/socket.h> |
| 23 | #include <sys/un.h> |
| 24 | |
| 25 | #include <arpa/inet.h> |
| 26 | #include <openssl/evp.h> |
| 27 | |
| 28 | #include <ber.h> |
| 29 | #include <ctype.h> |
| 30 | #include <err.h> |
| 31 | #include <errno.h> |
| 32 | #include <locale.h> |
| 33 | #include <netdb.h> |
| 34 | #include <poll.h> |
| 35 | #include <stdio.h> |
| 36 | #include <stdlib.h> |
| 37 | #include <stdint.h> |
| 38 | #include <string.h> |
| 39 | #include <time.h> |
| 40 | #include <unistd.h> |
| 41 | #include <util.h> |
| 42 | #include <wchar.h> |
| 43 | |
| 44 | #include "smi.h" |
| 45 | #include "snmp.h" |
| 46 | #include "usm.h" |
| 47 | |
| 48 | #define GETOPT_COMMON "A:a:c:E:e:K:k:l:n:O:r:t:u:v:X:x:Z:" |
| 49 | |
| 50 | int snmpc_get(int, char *[]); |
| 51 | int snmpc_walk(int, char *[]); |
| 52 | int snmpc_set(int, char *[]); |
| 53 | int snmpc_trap(int, char *[]); |
| 54 | int snmpc_df(int, char *[]); |
| 55 | int snmpc_mibtree(int, char *[]); |
| 56 | struct snmp_agent *snmpc_connect(char *, char *); |
| 57 | int snmpc_parseagent(char *, char *); |
| 58 | int snmpc_print(struct ber_element *); |
| 59 | __dead void snmpc_printerror(enum snmp_error, struct ber_element *, int, |
| 60 | const char *); |
| 61 | char *snmpc_hex2bin(char *, size_t *); |
| 62 | ssize_t snmpc_mbswidth(char *); |
| 63 | struct ber_element *snmpc_varbindparse(int, char *[]); |
| 64 | void usage(void); |
| 65 | |
| 66 | struct snmp_app { |
| 67 | const char *name; |
| 68 | const int usecommonopt; |
| 69 | const char *optstring; |
| 70 | const char *usage; |
| 71 | int (*exec)(int, char *[]); |
| 72 | }; |
| 73 | |
| 74 | struct snmp_app snmp_apps[] = { |
| 75 | { "get", 1, NULL, "agent oid ...", snmpc_get }, |
| 76 | { "getnext", 1, NULL, "agent oid ...", snmpc_get }, |
| 77 | { "walk", 1, "C:", "[-C cIipt] [-C E endoid] [-C s skipoid] agent [oid]", snmpc_walk }, |
| 78 | { "bulkget", 1, "C:", "[-C n<nonrep>r<maxrep>] agent oid ...", snmpc_get }, |
| 79 | { "bulkwalk", 1, "C:", "[-C cipn<nonrep>r<maxrep>] [-C s skipoid] agent [oid]", snmpc_walk }, |
| 80 | { "set", 1, NULL, "agent oid type value [oid type value] ...", snmpc_set }, |
| 81 | { "trap", 1, NULL, "agent uptime oid [oid type value] ...", snmpc_trap }, |
| 82 | { "df", 1, "C:", "[-Ch] [-Cr<maxrep>] agent", snmpc_df }, |
| 83 | { "mibtree", 0, "O:", "[-O fnS] [oid ...]", snmpc_mibtree } |
| 84 | }; |
| 85 | struct snmp_app *snmp_app = NULL; |
| 86 | |
| 87 | char *community = NULL; |
| 88 | struct snmp_v3 *v3; |
| 89 | char *mib = "mib_2"; |
| 90 | int retries = 5; |
| 91 | int timeout = 1; |
| 92 | enum snmp_version version = SNMP_V3; |
| 93 | int print_equals = 1; |
| 94 | int print_varbind_only = 0; |
| 95 | int print_summary = 0; |
| 96 | int print_time = 0; |
| 97 | int print_human = 0; |
| 98 | int walk_check_increase = 1; |
| 99 | int walk_fallback_oid = 1; |
| 100 | int walk_include_oid = 0; |
| 101 | int smi_print_hint = 1; |
| 102 | int non_repeaters = 0; |
| 103 | int max_repetitions = 10; |
| 104 | struct ber_oid walk_end = {{0}, 0}; |
| 105 | struct ber_oid *walk_skip = NULL; |
| 106 | size_t walk_skip_len = 0; |
| 107 | enum smi_oid_lookup oid_lookup = smi_oidl_short; |
| 108 | enum smi_output_string output_string = smi_os_default; |
| 109 | int utf8 = 0; |
| 110 | |
| 111 | int |
| 112 | main(int argc, char *argv[]) |
| 113 | { |
| 114 | const EVP_MD *md = NULL; |
| 115 | const EVP_CIPHER *cipher = NULL; |
| 116 | struct snmp_sec *sec; |
| 117 | char *user = NULL; |
| 118 | enum usm_key_level authkeylevel = USM_KEY_UNSET; |
| 119 | char *authkey = NULL; |
| 120 | size_t authkeylen = 0; |
| 121 | enum usm_key_level privkeylevel = USM_KEY_UNSET; |
| 122 | char *privkey = NULL; |
| 123 | size_t privkeylen = 0; |
| 124 | int seclevel = SNMP_MSGFLAG_REPORT; |
| 125 | char *ctxname = NULL; |
| 126 | char *ctxengineid = NULL, *secengineid = NULL; |
| 127 | size_t ctxengineidlen, secengineidlen; |
| 128 | int zflag = 0; |
| 129 | long long boots = 0, time = 0; |
| 130 | char optstr[BUFSIZ]; |
| 131 | const char *errstr; |
| 132 | char *strtolp; |
| 133 | int ch; |
| 134 | size_t i; |
| 135 | |
| 136 | |
| 137 | |
| 138 | |
| 139 | setlocale(LC_CTYPE, ""); |
| 140 | utf8 = MB_CUR_MAX > 1; |
| 1 | Assuming the condition is false | |
|
| 141 | |
| 142 | |
| 143 | |
| 144 | |
| 145 | if (setlocale(LC_CTYPE, "en_US.UTF-8") == NULL) |
| 2 | | Assuming the condition is false | |
|
| |
| 146 | errx(1, "setlocale(LC_CTYPE, \"en_US.UTF-8\") failed"); |
| 147 | |
| 148 | if (pledge("stdio inet dns unix", NULL) == -1) |
| 4 | | Assuming the condition is false | |
|
| |
| 149 | err(1, "pledge"); |
| 150 | |
| 151 | if (argc <= 1) |
| |
| |
| 152 | usage(); |
| 153 | |
| 154 | optstr[0] = '\0'; |
| 155 | for (i = 0; i < sizeof(snmp_apps)/sizeof(*snmp_apps); i++) { |
| 8 | | Loop condition is true. Entering loop body | |
|
| 156 | if (strcmp(snmp_apps[i].name, argv[1]) == 0) { |
| 9 | | Assuming the condition is true | |
|
| |
| 157 | snmp_app = &snmp_apps[i]; |
| 158 | if (snmp_app->optstring != NULL) { |
| 11 | | Assuming field 'optstring' is equal to NULL | |
|
| |
| 159 | if (strlcpy(optstr, snmp_app->optstring, |
| 160 | sizeof(optstr)) > sizeof(optstr)) |
| 161 | errx(1, "strlcat"); |
| 162 | } |
| 163 | break; |
| 13 | | Execution continues on line 166 | |
|
| 164 | } |
| 165 | } |
| 166 | if (snmp_app == NULL) |
| |
| 167 | usage(); |
| 168 | |
| 169 | if (snmp_app->usecommonopt) { |
| 15 | | Assuming field 'usecommonopt' is 0 | |
|
| |
| 170 | if (strlcat(optstr, GETOPT_COMMON, sizeof(optstr)) > |
| 171 | sizeof(optstr)) |
| 172 | errx(1, "strlcpy"); |
| 173 | } |
| 174 | |
| 175 | argc--; |
| 176 | argv++; |
| 177 | |
| 178 | smi_init(); |
| 179 | |
| 180 | while ((ch = getopt(argc, argv, optstr)) != -1) { |
| 17 | | Assuming the condition is true | |
|
| 18 | | Loop condition is true. Entering loop body | |
|
| 33 | | Assuming the condition is true | |
|
| 34 | | Loop condition is true. Entering loop body | |
|
| 181 | switch (ch) { |
| 19 | | Control jumps to 'case 107:' at line 237 | |
|
| 35 | | Control jumps to 'case 65:' at line 182 | |
|
| 182 | case 'A': |
| 183 | authkey = optarg; |
| 184 | authkeylen = strlen(authkey); |
| 36 | | Potential leak of memory pointed to by 'authkey' |
|
| 185 | authkeylevel = USM_KEY_PASSWORD; |
| 186 | break; |
| 187 | case 'a': |
| 188 | if (strcasecmp(optarg, "MD5") == 0) |
| 189 | md = EVP_md5(); |
| 190 | else if (strcasecmp(optarg, "SHA") == 0) |
| 191 | md = EVP_sha1(); |
| 192 | else if (strcasecmp(optarg, "SHA-224") == 0) |
| 193 | md = EVP_sha224(); |
| 194 | else if (strcasecmp(optarg, "SHA-256") == 0) |
| 195 | md = EVP_sha256(); |
| 196 | else if (strcasecmp(optarg, "SHA-384") == 0) |
| 197 | md = EVP_sha384(); |
| 198 | else if (strcasecmp(optarg, "SHA-512") == 0) |
| 199 | md = EVP_sha512(); |
| 200 | else |
| 201 | errx(1, "Invalid authentication protocol " |
| 202 | "specified after -a flag: %s", optarg); |
| 203 | break; |
| 204 | case 'c': |
| 205 | community = optarg; |
| 206 | break; |
| 207 | case 'E': |
| 208 | ctxengineid = snmpc_hex2bin(optarg, |
| 209 | &ctxengineidlen); |
| 210 | if (ctxengineid == NULL) { |
| 211 | if (errno == EINVAL) |
| 212 | errx(1, "Bad engine ID value " |
| 213 | "after -3E flag."); |
| 214 | err(1, "-3E"); |
| 215 | } |
| 216 | break; |
| 217 | case 'e': |
| 218 | secengineid = snmpc_hex2bin(optarg, |
| 219 | &secengineidlen); |
| 220 | if (secengineid == NULL) { |
| 221 | if (errno == EINVAL) |
| 222 | errx(1, "Bad engine ID value " |
| 223 | "after -3e flag."); |
| 224 | err(1, "-3e"); |
| 225 | } |
| 226 | break; |
| 227 | case 'K': |
| 228 | privkey = snmpc_hex2bin(optarg, &privkeylen); |
| 229 | if (privkey == NULL) { |
| 230 | if (errno == EINVAL) |
| 231 | errx(1, "Bad key value after " |
| 232 | "-3K flag."); |
| 233 | errx(1, "-3K"); |
| 234 | } |
| 235 | privkeylevel = USM_KEY_LOCALIZED; |
| 236 | break; |
| 237 | case 'k': |
| 238 | authkey = snmpc_hex2bin(optarg, &authkeylen); |
| 20 | | Calling 'snmpc_hex2bin' | |
|
| 30 | | Returned allocated memory | |
|
| 239 | if (authkey == NULL) { |
| |
| 240 | if (errno == EINVAL) |
| 241 | errx(1, "Bad key value after -k flag."); |
| 242 | err(1, "-k"); |
| 243 | } |
| 244 | authkeylevel = USM_KEY_LOCALIZED; |
| 245 | break; |
| 32 | | Execution continues on line 180 | |
|
| 246 | case 'l': |
| 247 | if (strcasecmp(optarg, "noAuthNoPriv") == 0) |
| 248 | seclevel = SNMP_MSGFLAG_REPORT; |
| 249 | else if (strcasecmp(optarg, "authNoPriv") == 0) |
| 250 | seclevel = SNMP_MSGFLAG_AUTH | |
| 251 | SNMP_MSGFLAG_REPORT; |
| 252 | else if (strcasecmp(optarg, "authPriv") == 0) |
| 253 | seclevel = SNMP_MSGFLAG_AUTH | |
| 254 | SNMP_MSGFLAG_PRIV | SNMP_MSGFLAG_REPORT; |
| 255 | else |
| 256 | errx(1, "Invalid security level specified " |
| 257 | "after -l flag: %s", optarg); |
| 258 | break; |
| 259 | case 'n': |
| 260 | ctxname = optarg; |
| 261 | break; |
| 262 | case 'r': |
| 263 | if ((retries = strtonum(optarg, 0, INT_MAX, |
| 264 | &errstr)) == 0) { |
| 265 | if (errstr != NULL) |
| 266 | errx(1, "-r: %s argument", errstr); |
| 267 | } |
| 268 | break; |
| 269 | case 't': |
| 270 | if ((timeout = strtonum(optarg, 1, INT_MAX, |
| 271 | &errstr)) == 0) { |
| 272 | if (errstr != NULL) |
| 273 | errx(1, "-t: %s argument", errstr); |
| 274 | } |
| 275 | break; |
| 276 | case 'u': |
| 277 | user = optarg; |
| 278 | break; |
| 279 | case 'v': |
| 280 | if (strcmp(optarg, "1") == 0) |
| 281 | version = SNMP_V1; |
| 282 | else if (strcmp(optarg, "2c") == 0) |
| 283 | version = SNMP_V2C; |
| 284 | else if (strcmp(optarg, "3") == 0) |
| 285 | version = SNMP_V3; |
| 286 | else |
| 287 | errc(1, EINVAL, "-v"); |
| 288 | break; |
| 289 | case 'C': |
| 290 | for (i = 0; i < strlen(optarg); i++) { |
| 291 | switch (optarg[i]) { |
| 292 | case 'c': |
| 293 | if (strcmp(snmp_app->name, "walk") && |
| 294 | strcmp(snmp_app->name, "bulkwalk")) |
| 295 | usage(); |
| 296 | walk_check_increase = 0; |
| 297 | break; |
| 298 | case 'h': |
| 299 | if (strcmp(snmp_app->name, "df")) |
| 300 | usage(); |
| 301 | print_human = 1; |
| 302 | break; |
| 303 | case 'i': |
| 304 | if (strcmp(snmp_app->name, "walk") && |
| 305 | strcmp(snmp_app->name, "bulkwalk")) |
| 306 | usage(); |
| 307 | walk_include_oid = 1; |
| 308 | break; |
| 309 | case 'n': |
| 310 | if (strcmp(snmp_app->name, "bulkget") && |
| 311 | strcmp(snmp_app->name, "bulkwalk")) |
| 312 | usage(); |
| 313 | errno = 0; |
| 314 | non_repeaters = strtol(&optarg[i + 1], |
| 315 | &strtolp, 10); |
| 316 | if (non_repeaters < 0 || |
| 317 | errno == ERANGE) { |
| 318 | if (non_repeaters < 0) |
| 319 | errx(1, "%s%s", |
| 320 | "-Cn: too small ", |
| 321 | "argument"); |
| 322 | else |
| 323 | errx(1, "%s%s", |
| 324 | "-Cn: too large", |
| 325 | "argument"); |
| 326 | } else if (&optarg[i + 1] == strtolp) |
| 327 | errx(1, "-Cn invalid argument"); |
| 328 | i = strtolp - optarg - 1; |
| 329 | break; |
| 330 | case 'p': |
| 331 | if (strcmp(snmp_app->name, "walk") && |
| 332 | strcmp(snmp_app->name, "bulkwalk")) |
| 333 | usage(); |
| 334 | print_summary = 1; |
| 335 | break; |
| 336 | case 'r': |
| 337 | if (strcmp(snmp_app->name, "bulkget") && |
| 338 | strcmp(snmp_app->name, "bulkwalk") && |
| 339 | strcmp(snmp_app->name, "df")) |
| 340 | usage(); |
| 341 | errno = 0; |
| 342 | max_repetitions = strtol(&optarg[i + 1], |
| 343 | &strtolp, 10); |
| 344 | if (max_repetitions < 0 || |
| 345 | errno == ERANGE) { |
| 346 | if (max_repetitions < 0) |
| 347 | errx(1, "%s%s", |
| 348 | "-Cr: too small ", |
| 349 | "argument"); |
| 350 | else |
| 351 | errx(1, "%s%s", |
| 352 | "-Cr: too large", |
| 353 | "argument"); |
| 354 | } else if (&optarg[i + 1] == strtolp) |
| 355 | errx(1, "-Cr invalid argument"); |
| 356 | i = strtolp - optarg - 1; |
| 357 | break; |
| 358 | case 's': |
| 359 | if (strcmp(snmp_app->name, "walk") && |
| 360 | strcmp(snmp_app->name, "bulkwalk")) |
| 361 | usage(); |
| 362 | if ((walk_skip = recallocarray( |
| 363 | walk_skip, walk_skip_len, |
| 364 | walk_skip_len + 1, |
| 365 | sizeof(*walk_skip))) == NULL) |
| 366 | errx(1, "malloc"); |
| 367 | if (smi_string2oid(argv[optind], |
| 368 | &(walk_skip[walk_skip_len])) != 0) |
| 369 | errx(1, "%s: %s", |
| 370 | "Unknown Object Identifier", |
| 371 | argv[optind]); |
| 372 | walk_skip_len++; |
| 373 | optind++; |
| 374 | break; |
| 375 | case 't': |
| 376 | if (strcmp(snmp_app->name, "walk")) |
| 377 | usage(); |
| 378 | print_time = 1; |
| 379 | break; |
| 380 | case 'E': |
| 381 | if (strcmp(snmp_app->name, "walk")) |
| 382 | usage(); |
| 383 | if (smi_string2oid(argv[optind], |
| 384 | &walk_end) != 0) |
| 385 | errx(1, "%s: %s", |
| 386 | "Unknown Object Identifier", |
| 387 | argv[optind]); |
| 388 | optind++; |
| 389 | continue; |
| 390 | case 'I': |
| 391 | if (strcmp(snmp_app->name, "walk")) |
| 392 | usage(); |
| 393 | walk_fallback_oid = 0; |
| 394 | break; |
| 395 | default: |
| 396 | usage(); |
| 397 | } |
| 398 | if (optarg[i] == 'E') |
| 399 | break; |
| 400 | } |
| 401 | break; |
| 402 | case 'O': |
| 403 | for (i = 0; i < strlen(optarg); i++) { |
| 404 | if (strcmp(snmp_app->name, "mibtree") == 0 && |
| 405 | optarg[i] != 'f' && optarg[i] != 'n' && |
| 406 | optarg[i] != 'S') |
| 407 | usage(); |
| 408 | switch (optarg[i]) { |
| 409 | case 'a': |
| 410 | output_string = smi_os_ascii; |
| 411 | break; |
| 412 | case 'f': |
| 413 | oid_lookup = smi_oidl_full; |
| 414 | break; |
| 415 | case 'n': |
| 416 | oid_lookup = smi_oidl_numeric; |
| 417 | break; |
| 418 | case 'q': |
| 419 | print_equals = 0; |
| 420 | smi_print_hint = 0; |
| 421 | break; |
| 422 | case 'v': |
| 423 | print_varbind_only = 1; |
| 424 | break; |
| 425 | case 'x': |
| 426 | output_string = smi_os_hex; |
| 427 | break; |
| 428 | case 'S': |
| 429 | oid_lookup = smi_oidl_short; |
| 430 | break; |
| 431 | case 'Q': |
| 432 | smi_print_hint = 0; |
| 433 | break; |
| 434 | default: |
| 435 | usage(); |
| 436 | } |
| 437 | } |
| 438 | break; |
| 439 | case 'X': |
| 440 | privkey = optarg; |
| 441 | privkeylen = strlen(privkey); |
| 442 | privkeylevel = USM_KEY_PASSWORD; |
| 443 | break; |
| 444 | case 'x': |
| 445 | if (strcasecmp(optarg, "DES") == 0) |
| 446 | cipher = EVP_des_cbc(); |
| 447 | else if (strcasecmp(optarg, "AES") == 0) |
| 448 | cipher = EVP_aes_128_cfb128(); |
| 449 | else |
| 450 | errx(1, "Invalid privacy protocol " |
| 451 | "specified after -3x flag: %s", |
| 452 | optarg); |
| 453 | break; |
| 454 | case 'Z': |
| 455 | boots = strtoll(optarg, &strtolp, 10); |
| 456 | if (boots < 0 || strtolp == optarg || strtolp[0] != ',') |
| 457 | usage(); |
| 458 | strtolp++; |
| 459 | time = strtoll(strtolp, &strtolp, 10); |
| 460 | if (boots < 0 || strtolp == optarg) |
| 461 | usage(); |
| 462 | zflag = 1; |
| 463 | break; |
| 464 | default: |
| 465 | usage(); |
| 466 | } |
| 467 | } |
| 468 | argc -= optind; |
| 469 | argv += optind; |
| 470 | |
| 471 | if (version == SNMP_V1 || version == SNMP_V2C) { |
| 472 | if (community == NULL || community[0] == '\0') |
| 473 | errx(1, "No community name specified."); |
| 474 | } else if (version == SNMP_V3) { |
| 475 | |
| 476 | if (user == NULL || user[0] == '\0') |
| 477 | errx(1, "No securityName specified"); |
| 478 | if ((sec = usm_init(user, strlen(user))) == NULL) |
| 479 | err(1, "usm_init"); |
| 480 | if (seclevel & SNMP_MSGFLAG_AUTH) { |
| 481 | if (md == NULL) |
| 482 | md = EVP_sha1(); |
| 483 | if (authkey == NULL) |
| 484 | errx(1, "No authKey or authPassword specified"); |
| 485 | if (usm_setauth(sec, md, authkey, authkeylen, |
| 486 | authkeylevel) == -1) |
| 487 | err(1, "Can't set authkey"); |
| 488 | } |
| 489 | if (seclevel & SNMP_MSGFLAG_PRIV) { |
| 490 | if (cipher == NULL) |
| 491 | cipher = EVP_aes_128_cfb128(); |
| 492 | if (privkey == NULL) |
| 493 | errx(1, "No privKey or privPassword specified"); |
| 494 | if (usm_setpriv(sec, cipher, privkey, privkeylen, |
| 495 | privkeylevel) == -1) |
| 496 | err(1, "Can't set authkey"); |
| 497 | } |
| 498 | if (secengineid != NULL) { |
| 499 | if (usm_setengineid(sec, secengineid, |
| 500 | secengineidlen) == -1) |
| 501 | err(1, "Can't set secengineid"); |
| 502 | } |
| 503 | if (zflag) |
| 504 | if (usm_setbootstime(sec, boots, time) == -1) |
| 505 | err(1, "Can't set boots/time"); |
| 506 | v3 = snmp_v3_init(seclevel, ctxname, ctxname == NULL ? 0 : |
| 507 | strlen(ctxname), sec); |
| 508 | if (v3 == NULL) |
| 509 | err(1, "snmp_v3_init"); |
| 510 | if (ctxengineid != NULL) { |
| 511 | if (snmp_v3_setengineid(v3, ctxengineid, |
| 512 | ctxengineidlen) == -1) |
| 513 | err(1, "Can't set ctxengineid"); |
| 514 | } |
| 515 | } |
| 516 | |
| 517 | |
| 518 | return snmp_app->exec(argc, argv); |
| 519 | } |
| 520 | |
| 521 | int |
| 522 | snmpc_get(int argc, char *argv[]) |
| 523 | { |
| 524 | struct ber_oid *oid; |
| 525 | struct ber_element *pdu, *varbind; |
| 526 | struct snmp_agent *agent; |
| 527 | int errorstatus, errorindex; |
| 528 | int i; |
| 529 | int class; |
| 530 | unsigned type; |
| 531 | char *hint = NULL; |
| 532 | |
| 533 | if (argc < 2) |
| 534 | usage(); |
| 535 | |
| 536 | if ((agent = snmpc_connect(argv[0], "161")) == NULL) |
| 537 | err(1, "%s", snmp_app->name); |
| 538 | agent->timeout = timeout; |
| 539 | agent->retries = retries; |
| 540 | |
| 541 | if (pledge("stdio", NULL) == -1) |
| 542 | err(1, "pledge"); |
| 543 | argc--; |
| 544 | argv++; |
| 545 | |
| 546 | oid = reallocarray(NULL, argc, sizeof(*oid)); |
| 547 | if (oid == NULL) |
| 548 | err(1, "malloc"); |
| 549 | for (i = 0; i < argc; i++) { |
| 550 | if (smi_string2oid(argv[i], &oid[i]) == -1) |
| 551 | errx(1, "%s: Unknown object identifier", argv[i]); |
| 552 | } |
| 553 | if (strcmp(snmp_app->name, "getnext") == 0) { |
| 554 | if ((pdu = snmp_getnext(agent, oid, argc)) == NULL) |
| 555 | err(1, "getnext"); |
| 556 | } else if (strcmp(snmp_app->name, "bulkget") == 0) { |
| 557 | if (version < SNMP_V2C) |
| 558 | errx(1, "Cannot send V2 PDU on V1 session"); |
| 559 | if (non_repeaters > argc) |
| 560 | errx(1, "need more objects than -Cn<num>"); |
| 561 | if ((pdu = snmp_getbulk(agent, oid, argc, non_repeaters, |
| 562 | max_repetitions)) == NULL) |
| 563 | err(1, "bulkget"); |
| 564 | } else { |
| 565 | if ((pdu = snmp_get(agent, oid, argc)) == NULL) |
| 566 | err(1, "get"); |
| 567 | } |
| 568 | |
| 569 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, |
| 570 | &errorindex, &varbind); |
| 571 | if (errorstatus != 0) { |
| 572 | if (errorindex >= 1 && errorindex <= argc) |
| 573 | hint = argv[errorindex - 1]; |
| 574 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 575 | errorindex, hint); |
| 576 | } |
| 577 | |
| 578 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 579 | printf("Received report:\n"); |
| 580 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 581 | if (!snmpc_print(varbind)) |
| 582 | err(1, "Can't print response"); |
| 583 | } |
| 584 | ober_free_elements(pdu); |
| 585 | snmp_free_agent(agent); |
| 586 | return 0; |
| 587 | } |
| 588 | |
| 589 | int |
| 590 | snmpc_walk(int argc, char *argv[]) |
| 591 | { |
| 592 | struct ber_oid oid, loid, noid; |
| 593 | struct ber_element *pdu, *varbind, *value; |
| 594 | struct timespec start, finish; |
| 595 | struct snmp_agent *agent; |
| 596 | const char *oids; |
| 597 | int n = 0, prev_cmp, skip_cmp; |
| 598 | int errorstatus, errorindex; |
| 599 | int class; |
| 600 | size_t i; |
| 601 | unsigned type; |
| 602 | |
| 603 | if (strcmp(snmp_app->name, "bulkwalk") == 0 && version < SNMP_V2C) |
| 604 | errx(1, "Cannot send V2 PDU on V1 session"); |
| 605 | if (argc < 1 || argc > 2) |
| 606 | usage(); |
| 607 | oids = argc == 1 ? mib : argv[1]; |
| 608 | |
| 609 | if ((agent = snmpc_connect(argv[0], "161"))== NULL) |
| 610 | err(1, "%s", snmp_app->name); |
| 611 | agent->timeout = timeout; |
| 612 | agent->retries = retries; |
| 613 | if (pledge("stdio", NULL) == -1) |
| 614 | err(1, "pledge"); |
| 615 | |
| 616 | if (smi_string2oid(oids, &oid) == -1) |
| 617 | errx(1, "%s: Unknown object identifier", oids); |
| 618 | bcopy(&oid, &noid, sizeof(noid)); |
| 619 | if (print_time) |
| 620 | clock_gettime(CLOCK_MONOTONIC, &start); |
| 621 | |
| 622 | if (walk_include_oid) { |
| 623 | if ((pdu = snmp_get(agent, &oid, 1)) == NULL) |
| 624 | err(1, "%s", snmp_app->name); |
| 625 | |
| 626 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, |
| 627 | &errorstatus, &errorindex, &varbind); |
| 628 | if (errorstatus != 0) |
| 629 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 630 | errorindex, oids); |
| 631 | |
| 632 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 633 | printf("Received report:\n"); |
| 634 | if (!snmpc_print(varbind)) |
| 635 | err(1, "Can't print response"); |
| 636 | ober_free_element(pdu); |
| 637 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 638 | return 1; |
| 639 | n++; |
| 640 | } |
| 641 | while (1) { |
| 642 | for (i = 0; i < walk_skip_len; i++) { |
| 643 | skip_cmp = ober_oid_cmp(&noid, &(walk_skip[i])); |
| 644 | if (skip_cmp == 0 || skip_cmp == 2) { |
| 645 | bcopy(&(walk_skip[i]), &noid, sizeof(noid)); |
| 646 | noid.bo_id[noid.bo_n -1]++; |
| 647 | break; |
| 648 | } |
| 649 | } |
| 650 | bcopy(&noid, &loid, sizeof(loid)); |
| 651 | if (strcmp(snmp_app->name, "bulkwalk") == 0) { |
| 652 | if ((pdu = snmp_getbulk(agent, &noid, 1, |
| 653 | non_repeaters, max_repetitions)) == NULL) |
| 654 | err(1, "bulkwalk"); |
| 655 | } else { |
| 656 | if ((pdu = snmp_getnext(agent, &noid, 1)) == NULL) |
| 657 | err(1, "walk"); |
| 658 | } |
| 659 | |
| 660 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, |
| 661 | &errorstatus, &errorindex, &varbind); |
| 662 | if (errorstatus != 0) { |
| 663 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 664 | errorindex, NULL); |
| 665 | } |
| 666 | |
| 667 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 668 | printf("Received report:\n"); |
| 669 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 670 | (void) ober_scanf_elements(varbind, "{oe}", &noid, |
| 671 | &value); |
| 672 | if (value->be_class == BER_CLASS_CONTEXT && |
| 673 | value->be_type == BER_TYPE_EOC) |
| 674 | break; |
| 675 | for (i = 0; i < walk_skip_len; i++) { |
| 676 | skip_cmp = ober_oid_cmp(&noid, &(walk_skip[i])); |
| 677 | if (skip_cmp == 0 || skip_cmp == 2) |
| 678 | break; |
| 679 | } |
| 680 | if (i < walk_skip_len) |
| 681 | continue; |
| 682 | prev_cmp = ober_oid_cmp(&noid, &loid); |
| 683 | if (walk_check_increase && prev_cmp == -1) |
| 684 | errx(1, "OID not increasing"); |
| 685 | if (prev_cmp == 0 || ober_oid_cmp(&noid, &oid) != 2) |
| 686 | break; |
| 687 | if (walk_end.bo_n != 0 && |
| 688 | ober_oid_cmp(&noid, &walk_end) != -1) |
| 689 | break; |
| 690 | |
| 691 | if (!snmpc_print(varbind)) |
| 692 | err(1, "Can't print response"); |
| 693 | n++; |
| 694 | } |
| 695 | ober_free_elements(pdu); |
| 696 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 697 | return 1; |
| 698 | if (varbind != NULL) |
| 699 | break; |
| 700 | } |
| 701 | if (walk_fallback_oid && n == 0) { |
| 702 | if ((pdu = snmp_get(agent, &oid, 1)) == NULL) |
| 703 | err(1, "%s", snmp_app->name); |
| 704 | |
| 705 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, |
| 706 | &errorstatus, &errorindex, &varbind); |
| 707 | if (errorstatus != 0) |
| 708 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 709 | errorindex, oids); |
| 710 | |
| 711 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 712 | printf("Received report:\n"); |
| 713 | if (!snmpc_print(varbind)) |
| 714 | err(1, "Can't print response"); |
| 715 | ober_free_element(pdu); |
| 716 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 717 | return 1; |
| 718 | n++; |
| 719 | } |
| 720 | if (print_time) |
| 721 | clock_gettime(CLOCK_MONOTONIC, &finish); |
| 722 | if (print_summary) |
| 723 | printf("Variables found: %d\n", n); |
| 724 | if (print_time) { |
| 725 | if ((finish.tv_nsec -= start.tv_nsec) < 0) { |
| 726 | finish.tv_sec -= 1; |
| 727 | finish.tv_nsec += 1000000000; |
| 728 | } |
| 729 | finish.tv_sec -= start.tv_sec; |
| 730 | fprintf(stderr, "Total traversal time: %lld.%09ld seconds\n", |
| 731 | finish.tv_sec, finish.tv_nsec); |
| 732 | } |
| 733 | snmp_free_agent(agent); |
| 734 | return 0; |
| 735 | } |
| 736 | |
| 737 | int |
| 738 | snmpc_set(int argc, char *argv[]) |
| 739 | { |
| 740 | struct snmp_agent *agent; |
| 741 | struct ber_element *pdu, *varbind; |
| 742 | int errorstatus, errorindex; |
| 743 | int class; |
| 744 | unsigned type; |
| 745 | char *hint = NULL; |
| 746 | |
| 747 | if (argc < 4) |
| 748 | usage(); |
| 749 | if ((agent = snmpc_connect(argv[0], "161")) == NULL) |
| 750 | err(1, "%s", snmp_app->name); |
| 751 | argc--; |
| 752 | argv++; |
| 753 | |
| 754 | if (pledge("stdio", NULL) == -1) |
| 755 | err(1, "pledge"); |
| 756 | |
| 757 | if ((pdu = snmp_set(agent, snmpc_varbindparse(argc, argv))) == NULL) |
| 758 | err(1, "set"); |
| 759 | |
| 760 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, |
| 761 | &errorindex, &varbind); |
| 762 | if (errorstatus != 0) { |
| 763 | if (errorindex >= 1 && errorindex <= argc / 3) |
| 764 | hint = argv[(errorindex - 1) * 3]; |
| 765 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 766 | errorindex, hint); |
| 767 | } |
| 768 | |
| 769 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) |
| 770 | printf("Received report:\n"); |
| 771 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 772 | if (!snmpc_print(varbind)) |
| 773 | err(1, "Can't print response"); |
| 774 | } |
| 775 | ober_free_elements(pdu); |
| 776 | snmp_free_agent(agent); |
| 777 | return 0; |
| 778 | } |
| 779 | |
| 780 | int |
| 781 | snmpc_trap(int argc, char *argv[]) |
| 782 | { |
| 783 | struct snmp_agent *agent; |
| 784 | struct timespec ts; |
| 785 | struct ber_oid trapoid; |
| 786 | const char *errstr = NULL; |
| 787 | long long lval; |
| 788 | |
| 789 | if (version == SNMP_V1) |
| 790 | errx(1, "trap is not supported for snmp v1"); |
| 791 | |
| 792 | if (argc < 3) |
| 793 | usage(); |
| 794 | |
| 795 | if ((agent = snmpc_connect(argv[0], "162")) == NULL) |
| 796 | err(1, "%s", snmp_app->name); |
| 797 | |
| 798 | if (pledge("stdio", NULL) == -1) |
| 799 | err(1, "pledge"); |
| 800 | |
| 801 | if (argv[1][0] == '\0') { |
| 802 | if (clock_gettime(CLOCK_UPTIME, &ts) == -1) |
| 803 | err(1, "clock_gettime"); |
| 804 | } else { |
| 805 | lval = strtonum(argv[1], 0, UINT32_MAX, &errstr); |
| 806 | if (errstr != NULL) |
| 807 | errx(1, "Bad value notation (%s)", argv[1]); |
| 808 | ts.tv_sec = lval / 100; |
| 809 | ts.tv_nsec = (lval % 100) * 10000000; |
| 810 | } |
| 811 | if (smi_string2oid(argv[2], &trapoid) == -1) |
| 812 | errx(1, "Invalid oid: %s\n", argv[2]); |
| 813 | |
| 814 | argc -= 3; |
| 815 | argv += 3; |
| 816 | |
| 817 | snmp_trap(agent, &ts, &trapoid, snmpc_varbindparse(argc, argv)); |
| 818 | |
| 819 | return 0; |
| 820 | } |
| 821 | |
| 822 | #define INCR_NEXTTAB(x) ((x + 8) & ~7) |
| 823 | #define NEXTTAB(x) (8 - (x & 7)) |
| 824 | int |
| 825 | snmpc_df(int argc, char *argv[]) |
| 826 | { |
| 827 | struct snmpc_df { |
| 828 | uint32_t index; |
| 829 | char *descr; |
| 830 | int descrwidth; |
| 831 | |
| 832 | char size[21]; |
| 833 | char used[21]; |
| 834 | char avail[21]; |
| 835 | char proc[5]; |
| 836 | } *df = NULL; |
| 837 | struct ber_oid descroid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 3 }, 11}; |
| 838 | struct ber_oid unitsoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 4 }, 11}; |
| 839 | struct ber_oid sizeoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 5 }, 11}; |
| 840 | struct ber_oid usedoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 6 }, 11}; |
| 841 | struct ber_oid oid, *reqoid; |
| 842 | char oids[SNMP_MAX_OID_STRLEN]; |
| 843 | struct ber_element *pdu, *varbind, *elm; |
| 844 | struct snmp_agent *agent; |
| 845 | int errorstatus, errorindex; |
| 846 | int class; |
| 847 | size_t i, j, rows = 0; |
| 848 | unsigned type; |
| 849 | char *string; |
| 850 | int descrlen = 0, sizelen = 0, usedlen = 0, availlen = 0, proclen = 0; |
| 851 | int len; |
| 852 | long long units, size, used; |
| 853 | int fmtret; |
| 854 | |
| 855 | if (argc != 1) |
| 856 | usage(); |
| 857 | |
| 858 | if ((agent = snmpc_connect(argv[0], "161")) == NULL) |
| 859 | err(1, "%s", snmp_app->name); |
| 860 | agent->timeout = timeout; |
| 861 | agent->retries = retries; |
| 862 | |
| 863 | if (pledge("stdio", NULL) == -1) |
| 864 | err(1, "pledge"); |
| 865 | |
| 866 | descrlen = sizeof("Description") - 1; |
| 867 | sizelen = sizeof("Size") - 1; |
| 868 | usedlen = sizeof("Used") - 1; |
| 869 | availlen = sizeof("Available") - 1; |
| 870 | proclen = sizeof("Used%") - 1; |
| 871 | |
| 872 | bcopy(&descroid, &oid, sizeof(descroid)); |
| 873 | |
| 874 | i = 0; |
| 875 | while(1) { |
| 876 | if (version < SNMP_V2C) { |
| 877 | if ((pdu = snmp_getnext(agent, &oid, 1)) == NULL) |
| 878 | err(1, "df"); |
| 879 | } else { |
| 880 | if ((pdu = snmp_getbulk(agent, &oid, 1, 0, |
| 881 | max_repetitions)) == NULL) |
| 882 | err(1, "df"); |
| 883 | } |
| 884 | |
| 885 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, |
| 886 | &errorstatus, &errorindex, &varbind); |
| 887 | if (errorstatus != 0) |
| 888 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 889 | errorindex, NULL); |
| 890 | |
| 891 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) { |
| 892 | printf("Received report:\n"); |
| 893 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 894 | if (!snmpc_print(varbind)) |
| 895 | err(1, "Can't print response"); |
| 896 | } |
| 897 | return 1; |
| 898 | } |
| 899 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 900 | if (ober_scanf_elements(varbind, "{os", &oid, |
| 901 | &string) == -1 || |
| 902 | ober_oid_cmp(&oid, &descroid) != 2) |
| 903 | break; |
| 904 | rows++; |
| 905 | } |
| 906 | if ((df = reallocarray(df, rows, sizeof(*df))) == NULL) |
| 907 | err(1, "malloc"); |
| 908 | (void) ober_scanf_elements(pdu, "{SSS{e", &varbind); |
| 909 | for (; i < rows; varbind = varbind->be_next, i++) { |
| 910 | if (ober_scanf_elements(varbind, "{oe", &oid, |
| 911 | &elm) == -1) { |
| 912 | i--; |
| 913 | rows--; |
| 914 | continue; |
| 915 | } |
| 916 | if (ober_oid_cmp(&oid, &descroid) != 2) |
| 917 | break; |
| 918 | df[i].index = oid.bo_id[oid.bo_n - 1]; |
| 919 | if ((df[i].descr = smi_print_element(&oid, elm, 0, |
| 920 | smi_os_ascii, 0, utf8)) == NULL) { |
| 921 | smi_oid2string(&oid, oids, sizeof(oids), |
| 922 | oid_lookup); |
| 923 | warn("df: can't print oid %s", oids); |
| 924 | i--; |
| 925 | rows--; |
| 926 | continue; |
| 927 | } |
| 928 | if ((df[i].descrwidth = |
| 929 | (int) snmpc_mbswidth(df[i].descr)) == -1) |
| 930 | err(1, "df: invalid hrStorageDescr"); |
| 931 | if (df[i].descrwidth > descrlen) |
| 932 | descrlen = df[i].descrwidth; |
| 933 | } |
| 934 | ober_free_elements(pdu); |
| 935 | if (varbind != NULL) |
| 936 | break; |
| 937 | } |
| 938 | |
| 939 | if (max_repetitions < 3) |
| 940 | max_repetitions = 3; |
| 941 | if ((reqoid = reallocarray(NULL, max_repetitions, sizeof(*reqoid))) == NULL) |
| 942 | err(1, "malloc"); |
| 943 | for (i = 0; i < rows;) { |
| 944 | for (j = 0; i + j < rows && j < (size_t)max_repetitions / 3; |
| 945 | j++) { |
| 946 | bcopy(&unitsoid, &(reqoid[(j * 3) + 0]), |
| 947 | sizeof(unitsoid)); |
| 948 | reqoid[(j * 3) + 0].bo_id[ |
| 949 | reqoid[(j * 3) + 0].bo_n++] = df[i + j].index; |
| 950 | bcopy(&sizeoid, &(reqoid[(j * 3) + 1]), |
| 951 | sizeof(sizeoid)); |
| 952 | reqoid[(j * 3) + 1].bo_id[ |
| 953 | reqoid[(j * 3) + 1].bo_n++] = df[i + j].index; |
| 954 | bcopy(&usedoid, &(reqoid[(j * 3) + 2]), |
| 955 | sizeof(usedoid)); |
| 956 | reqoid[(j * 3) + 2].bo_id[ |
| 957 | reqoid[(j * 3) + 2].bo_n++] = df[i + j].index; |
| 958 | } |
| 959 | if ((pdu = snmp_get(agent, reqoid, j * 3)) == NULL) |
| 960 | err(1, "df"); |
| 961 | (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, |
| 962 | &errorstatus, &errorindex, &varbind); |
| 963 | if (errorstatus != 0) |
| 964 | snmpc_printerror((enum snmp_error) errorstatus, varbind, |
| 965 | errorindex, NULL); |
| 966 | if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) { |
| 967 | printf("Received report:\n"); |
| 968 | for (; varbind != NULL; varbind = varbind->be_next) { |
| 969 | if (!snmpc_print(varbind)) |
| 970 | err(1, "Can't print response"); |
| 971 | } |
| 972 | } |
| 973 | for (j = 0; varbind != NULL; i++) { |
| 974 | if (ober_scanf_elements(varbind, "{oi}{oi}{oi}", |
| 975 | &(reqoid[0]), &units, &(reqoid[1]), &size, |
| 976 | &(reqoid[2]), &used, &varbind) == -1) { |
| 977 | break; |
| 978 | } |
| 979 | varbind = varbind->be_next->be_next->be_next; |
| 980 | |
| 981 | unitsoid.bo_id[unitsoid.bo_n++] = df[i].index; |
| 982 | if (ober_oid_cmp(&unitsoid, &(reqoid[0])) != 0) { |
| 983 | warnx("df: received invalid object"); |
| 984 | break; |
| 985 | } |
| 986 | unitsoid.bo_n--; |
| 987 | sizeoid.bo_id[sizeoid.bo_n++] = df[i].index; |
| 988 | if (ober_oid_cmp(&sizeoid, &(reqoid[1])) != 0) { |
| 989 | warnx("df: received invalid object"); |
| 990 | break; |
| 991 | } |
| 992 | sizeoid.bo_n--; |
| 993 | usedoid.bo_id[usedoid.bo_n++] = df[i].index; |
| 994 | if (ober_oid_cmp(&usedoid, &(reqoid[2])) != 0) { |
| 995 | warnx("df: received invalid object"); |
| 996 | break; |
| 997 | } |
| 998 | usedoid.bo_n--; |
| 999 | if (print_human) |
| 1000 | fmtret = fmt_scaled((units * size), df[i].size); |
| 1001 | if (!print_human || fmtret == -1) |
| 1002 | snprintf(df[i].size, sizeof(df[i].size), "%lld", |
| 1003 | (units * size) / 1024); |
| 1004 | len = (int) strlen(df[i].size); |
| 1005 | if (len > sizelen) |
| 1006 | sizelen = len; |
| 1007 | if (print_human) |
| 1008 | fmtret = fmt_scaled(units * used, df[i].used); |
| 1009 | if (!print_human || fmtret == -1) |
| 1010 | snprintf(df[i].used, sizeof(df[i].used), "%lld", |
| 1011 | (units * used) / 1024); |
| 1012 | len = (int) strlen(df[i].used); |
| 1013 | if (len > usedlen) |
| 1014 | usedlen = len; |
| 1015 | if (print_human) |
| 1016 | fmtret = fmt_scaled(units * (size - used), |
| 1017 | df[i].avail); |
| 1018 | if (!print_human || fmtret == -1) |
| 1019 | snprintf(df[i].avail, sizeof(df[i].avail), |
| 1020 | "%lld", (units * (size - used)) / 1024); |
| 1021 | len = (int) strlen(df[i].avail); |
| 1022 | if (len > availlen) |
| 1023 | availlen = len; |
| 1024 | if (size == 0) |
| 1025 | strlcpy(df[i].proc, "0%", sizeof(df[i].proc)); |
| 1026 | else { |
| 1027 | snprintf(df[i].proc, sizeof(df[i].proc), |
| 1028 | "%lld%%", (used * 100) / size); |
| 1029 | } |
| 1030 | len = (int) strlen(df[i].proc); |
| 1031 | if (len > proclen) |
| 1032 | proclen = len; |
| 1033 | j++; |
| 1034 | } |
| 1035 | if (j == 0) { |
| 1036 | warnx("Failed to retrieve information for %s", |
| 1037 | df[i].descr); |
| 1038 | memmove(df + i, df + i + 1, |
| 1039 | (rows - i - 1) * sizeof(*df)); |
| 1040 | rows--; |
| 1041 | i--; |
| 1042 | } |
| 1043 | } |
| 1044 | |
| 1045 | printf("%-*s%*s%*s%*s%*s\n", |
| 1046 | descrlen, "Description", |
| 1047 | NEXTTAB(descrlen) + sizelen, "Size", |
| 1048 | NEXTTAB(sizelen) + usedlen, "Used", |
| 1049 | NEXTTAB(usedlen) + availlen, "Available", |
| 1050 | NEXTTAB(availlen) + proclen, "Used%"); |
| 1051 | for (i = 0; i < rows; i++) { |
| 1052 | printf("%s%*s%*s%*s%*s%*s\n", |
| 1053 | df[i].descr, descrlen - df[i].descrwidth, "", |
| 1054 | NEXTTAB(descrlen) + sizelen, df[i].size, |
| 1055 | NEXTTAB(sizelen) + usedlen, df[i].used, |
| 1056 | NEXTTAB(usedlen) + availlen, df[i].avail, |
| 1057 | NEXTTAB(availlen) + proclen, df[i].proc); |
| 1058 | } |
| 1059 | |
| 1060 | return 0; |
| 1061 | } |
| 1062 | |
| 1063 | int |
| 1064 | snmpc_mibtree(int argc, char *argv[]) |
| 1065 | { |
| 1066 | struct oid *oid; |
| 1067 | struct ber_oid soid; |
| 1068 | char buf[BUFSIZ]; |
| 1069 | int i; |
| 1070 | |
| 1071 | if (argc == 0) { |
| 1072 | for (oid = NULL; (oid = smi_foreach(oid)) != NULL;) { |
| 1073 | smi_oid2string(&oid->o_id, buf, sizeof(buf), |
| 1074 | oid_lookup); |
| 1075 | printf("%s\n", buf); |
| 1076 | } |
| 1077 | } else { |
| 1078 | for (i = 0; i < argc; i++) { |
| 1079 | if (smi_string2oid(argv[i], &soid) == -1) { |
| 1080 | warnx("%s: Unknown object identifier", argv[i]); |
| 1081 | continue; |
| 1082 | } |
| 1083 | smi_oid2string(&soid, buf, sizeof(buf), oid_lookup); |
| 1084 | printf("%s\n", buf); |
| 1085 | } |
| 1086 | } |
| 1087 | return 0; |
| 1088 | } |
| 1089 | |
| 1090 | struct snmp_agent * |
| 1091 | snmpc_connect(char *host, char *port) |
| 1092 | { |
| 1093 | switch (version) { |
| 1094 | case SNMP_V1: |
| 1095 | case SNMP_V2C: |
| 1096 | return snmp_connect_v12(snmpc_parseagent(host, port), version, |
| 1097 | community); |
| 1098 | case SNMP_V3: |
| 1099 | return snmp_connect_v3(snmpc_parseagent(host, port), v3); |
| 1100 | } |
| 1101 | return NULL; |
| 1102 | } |
| 1103 | |
| 1104 | int |
| 1105 | snmpc_print(struct ber_element *elm) |
| 1106 | { |
| 1107 | struct ber_oid oid; |
| 1108 | char oids[SNMP_MAX_OID_STRLEN]; |
| 1109 | char *value; |
| 1110 | |
| 1111 | elm = elm->be_sub; |
| 1112 | if (ober_get_oid(elm, &oid) != 0) { |
| 1113 | errno = EINVAL; |
| 1114 | return 0; |
| 1115 | } |
| 1116 | |
| 1117 | elm = elm->be_next; |
| 1118 | value = smi_print_element(&oid, elm, smi_print_hint, output_string, |
| 1119 | oid_lookup, utf8); |
| 1120 | if (value == NULL) |
| 1121 | return 0; |
| 1122 | |
| 1123 | if (print_varbind_only) |
| 1124 | printf("%s\n", value); |
| 1125 | else if (print_equals) { |
| 1126 | smi_oid2string(&oid, oids, sizeof(oids), oid_lookup); |
| 1127 | printf("%s = %s\n", oids, value); |
| 1128 | } else { |
| 1129 | smi_oid2string(&oid, oids, sizeof(oids), oid_lookup); |
| 1130 | printf("%s %s\n", oids, value); |
| 1131 | } |
| 1132 | free(value); |
| 1133 | |
| 1134 | return 1; |
| 1135 | } |
| 1136 | |
| 1137 | __dead void |
| 1138 | snmpc_printerror(enum snmp_error error, struct ber_element *varbind, |
| 1139 | int index, const char *hint) |
| 1140 | { |
| 1141 | struct ber_oid hoid, vboid; |
| 1142 | char oids[SNMP_MAX_OID_STRLEN]; |
| 1143 | const char *oid = NULL; |
| 1144 | int i; |
| 1145 | |
| 1146 | if (index >= 1) { |
| 1147 | |
| 1148 | for (i = 1; varbind != NULL && i < index; |
| 1149 | varbind = varbind->be_next) |
| 1150 | i++; |
| 1151 | if (varbind != NULL && |
| 1152 | ober_get_oid(varbind->be_sub, &vboid) == 0) { |
| 1153 | |
| 1154 | if (hint != NULL && |
| 1155 | smi_string2oid(hint, &hoid) == 0 && |
| 1156 | ober_oid_cmp(&hoid, &vboid) == 0) |
| 1157 | oid = hint; |
| 1158 | else |
| 1159 | oid = smi_oid2string(&vboid, oids, |
| 1160 | sizeof(oids), oid_lookup); |
| 1161 | } |
| 1162 | } |
| 1163 | if (oid == NULL) |
| 1164 | oid = "?"; |
| 1165 | |
| 1166 | switch (error) { |
| 1167 | case SNMP_ERROR_NONE: |
| 1168 | errx(1, "No error, how did I get here?"); |
| 1169 | case SNMP_ERROR_TOOBIG: |
| 1170 | errx(1, "Can't parse oid %s: Response too big", oid); |
| 1171 | case SNMP_ERROR_NOSUCHNAME: |
| 1172 | errx(1, "Can't parse oid %s: No such object", oid); |
| 1173 | case SNMP_ERROR_BADVALUE: |
| 1174 | errx(1, "Can't parse oid %s: Bad value", oid); |
| 1175 | case SNMP_ERROR_READONLY: |
| 1176 | errx(1, "Can't parse oid %s: Read only", oid); |
| 1177 | case SNMP_ERROR_GENERR: |
| 1178 | errx(1, "Can't parse oid %s: Generic error", oid); |
| 1179 | case SNMP_ERROR_NOACCESS: |
| 1180 | errx(1, "Can't parse oid %s: Access denied", oid); |
| 1181 | case SNMP_ERROR_WRONGTYPE: |
| 1182 | errx(1, "Can't parse oid %s: Wrong type", oid); |
| 1183 | case SNMP_ERROR_WRONGLENGTH: |
| 1184 | errx(1, "Can't parse oid %s: Wrong length", oid); |
| 1185 | case SNMP_ERROR_WRONGENC: |
| 1186 | errx(1, "Can't parse oid %s: Wrong encoding", oid); |
| 1187 | case SNMP_ERROR_WRONGVALUE: |
| 1188 | errx(1, "Can't parse oid %s: Wrong value", oid); |
| 1189 | case SNMP_ERROR_NOCREATION: |
| 1190 | errx(1, "Can't parse oid %s: Can't be created", oid); |
| 1191 | case SNMP_ERROR_INCONVALUE: |
| 1192 | errx(1, "Can't parse oid %s: Inconsistent value", oid); |
| 1193 | case SNMP_ERROR_RESUNAVAIL: |
| 1194 | errx(1, "Can't parse oid %s: Resource unavailable", oid); |
| 1195 | case SNMP_ERROR_COMMITFAILED: |
| 1196 | errx(1, "Can't parse oid %s: Commit failed", oid); |
| 1197 | case SNMP_ERROR_UNDOFAILED: |
| 1198 | errx(1, "Can't parse oid %s: Undo faild", oid); |
| 1199 | case SNMP_ERROR_AUTHERROR: |
| 1200 | errx(1, "Can't parse oid %s: Authorization error", oid); |
| 1201 | case SNMP_ERROR_NOTWRITABLE: |
| 1202 | errx(1, "Can't parse oid %s: Not writable", oid); |
| 1203 | case SNMP_ERROR_INCONNAME: |
| 1204 | errx(1, "Can't parse oid %s: Inconsistent name", oid); |
| 1205 | } |
| 1206 | errx(1, "Can't parse oid %s: Unknown error (%d)", oid, error); |
| 1207 | } |
| 1208 | |
| 1209 | int |
| 1210 | snmpc_parseagent(char *agent, char *defaultport) |
| 1211 | { |
| 1212 | struct addrinfo hints, *ai, *ai0 = NULL; |
| 1213 | struct sockaddr_un saddr; |
| 1214 | char *agentdup, *specifier, *hostname, *port = NULL; |
| 1215 | int error; |
| 1216 | int s; |
| 1217 | |
| 1218 | if ((agentdup = specifier = strdup(agent)) == NULL) |
| 1219 | err(1, NULL); |
| 1220 | |
| 1221 | bzero(&hints, sizeof(hints)); |
| 1222 | if ((hostname = strchr(specifier, ':')) != NULL) { |
| 1223 | *hostname++ = '\0'; |
| 1224 | if (strcasecmp(specifier, "udp") == 0) { |
| 1225 | hints.ai_family = AF_INET; |
| 1226 | hints.ai_socktype = SOCK_DGRAM; |
| 1227 | } else if (strcasecmp(specifier, "tcp") == 0) { |
| 1228 | hints.ai_family = AF_INET; |
| 1229 | hints.ai_socktype = SOCK_STREAM; |
| 1230 | } else if (strcasecmp(specifier, "udp6") == 0 || |
| 1231 | strcasecmp(specifier, "udpv6") == 0 || |
| 1232 | strcasecmp(specifier, "udpipv6") == 0) { |
| 1233 | hints.ai_family = AF_INET6; |
| 1234 | hints.ai_socktype = SOCK_DGRAM; |
| 1235 | } else if (strcasecmp(specifier, "tcp6") == 0 || |
| 1236 | strcasecmp(specifier, "tcpv6") == 0 || |
| 1237 | strcasecmp(specifier, "tcpipv6") == 0) { |
| 1238 | hints.ai_family = AF_INET6; |
| 1239 | hints.ai_socktype = SOCK_STREAM; |
| 1240 | } else if (strcasecmp(specifier, "unix") == 0) { |
| 1241 | hints.ai_family = AF_UNIX; |
| 1242 | hints.ai_addr = (struct sockaddr *)&saddr; |
| 1243 | hints.ai_addrlen = sizeof(saddr); |
| 1244 | saddr.sun_len = sizeof(saddr); |
| 1245 | saddr.sun_family = AF_UNIX; |
| 1246 | if (strlcpy(saddr.sun_path, hostname, |
| 1247 | sizeof(saddr.sun_path)) > sizeof(saddr.sun_path)) |
| 1248 | errx(1, "Hostname path too long"); |
| 1249 | ai = &hints; |
| 1250 | } else { |
| 1251 | *--hostname = ':'; |
| 1252 | hostname = specifier; |
| 1253 | } |
| 1254 | } else { |
| 1255 | hostname = specifier; |
| 1256 | } |
| 1257 | |
| 1258 | if (hints.ai_family == AF_INET) { |
| 1259 | if ((port = strchr(hostname, ':')) != NULL) |
| 1260 | *port++ = '\0'; |
| 1261 | } else if (hints.ai_family == AF_INET6 || hints.ai_family == 0) { |
| 1262 | if (hostname[0] == '[') { |
| 1263 | hints.ai_family = AF_INET6; |
| 1264 | hostname++; |
| 1265 | if ((port = strchr(hostname, ']')) == NULL) |
| 1266 | errx(1, "invalid agent"); |
| 1267 | *port++ = '\0'; |
| 1268 | if (port[0] == ':') |
| 1269 | *port++ = '\0'; |
| 1270 | else if (port[0] == '\0') |
| 1271 | port = NULL; |
| 1272 | else |
| 1273 | errx(1, "invalid agent"); |
| 1274 | } else { |
| 1275 | if ((port = strrchr(hostname, ':')) != NULL) |
| 1276 | *port++ = '\0'; |
| 1277 | } |
| 1278 | } |
| 1279 | |
| 1280 | if (hints.ai_family != AF_UNIX) { |
| 1281 | if (hints.ai_socktype == 0) |
| 1282 | hints.ai_socktype = SOCK_DGRAM; |
| 1283 | if (port == NULL) |
| 1284 | port = defaultport; |
| 1285 | error = getaddrinfo(hostname, port, &hints, &ai0); |
| 1286 | if (error) { |
| 1287 | if (error != EAI_NODATA || port == defaultport) |
| 1288 | errx(1, "%s", gai_strerror(error)); |
| 1289 | *--port = ':'; |
| 1290 | error = getaddrinfo(hostname, defaultport, &hints, |
| 1291 | &ai0); |
| 1292 | if (error) |
| 1293 | errx(1, "%s", gai_strerror(error)); |
| 1294 | } |
| 1295 | s = -1; |
| 1296 | for (ai = ai0; ai != NULL; ai = ai->ai_next) { |
| 1297 | if ((s = socket(ai->ai_family, ai->ai_socktype, |
| 1298 | ai->ai_protocol)) != -1 && |
| 1299 | connect(s, (struct sockaddr *)ai->ai_addr, |
| 1300 | ai->ai_addrlen) != -1) |
| 1301 | break; |
| 1302 | close(s); |
| 1303 | s = -1; |
| 1304 | } |
| 1305 | } else { |
| 1306 | s = socket(AF_UNIX, SOCK_STREAM, 0); |
| 1307 | if (connect(s, (struct sockaddr *)ai->ai_addr, |
| 1308 | ai->ai_addrlen) == -1) |
| 1309 | err(1, "Can't connect to %s", agent); |
| 1310 | } |
| 1311 | if (s == -1) |
| 1312 | err(1, "Can't connect to agent %s", agent); |
| 1313 | |
| 1314 | |
| 1315 | if (ai0 != NULL) |
| 1316 | freeaddrinfo(ai0); |
| 1317 | free(agentdup); |
| 1318 | return s; |
| 1319 | } |
| 1320 | |
| 1321 | char * |
| 1322 | snmpc_hex2bin(char *hexstr, size_t *binlen) |
| 1323 | { |
| 1324 | char *decstr; |
| 1325 | |
| 1326 | if (hexstr[0] == '0' && hexstr[1] == 'x') |
| 21 | | Assuming the condition is false | |
|
| 1327 | hexstr += 2; |
| 1328 | while (hexstr[0] == ' ' || hexstr[0] == '\t') |
| 22 | | Assuming the condition is false | |
|
| 23 | | Assuming the condition is false | |
|
| 24 | | Loop condition is false. Execution continues on line 1331 | |
|
| 1329 | hexstr++; |
| 1330 | |
| 1331 | if ((decstr = malloc((strlen(hexstr) / 2) + 1)) == NULL) |
| |
| 26 | | Assuming the condition is false | |
|
| |
| 1332 | return NULL; |
| 1333 | |
| 1334 | for (*binlen = 0; hexstr[0] != '\0'; (*binlen)++) { |
| 28 | | Assuming the condition is false | |
|
| 29 | | Loop condition is false. Execution continues on line 1355 | |
|
| 1335 | hexstr[0] = toupper(hexstr[0]); |
| 1336 | hexstr[1] = toupper(hexstr[1]); |
| 1337 | if (hexstr[0] >= '0' && hexstr[0] <= '9') |
| 1338 | decstr[*binlen] = (hexstr[0] - '0') << 4; |
| 1339 | else if (hexstr[0] >= 'A' && hexstr[0] <= 'F') |
| 1340 | decstr[*binlen] = ((hexstr[0] - 'A') + 10) << 4; |
| 1341 | else |
| 1342 | goto fail; |
| 1343 | if (hexstr[1] >= '0' && hexstr[1] <= '9') |
| 1344 | decstr[*binlen] |= (hexstr[1] - '0'); |
| 1345 | else if (hexstr[1] >= 'A' && hexstr[1] <= 'F') |
| 1346 | decstr[*binlen] |= (hexstr[1] - 'A') + 10; |
| 1347 | else |
| 1348 | goto fail; |
| 1349 | |
| 1350 | hexstr += 2; |
| 1351 | while (hexstr[0] == ' ' || hexstr[0] == '\t') |
| 1352 | hexstr++; |
| 1353 | } |
| 1354 | |
| 1355 | return decstr; |
| 1356 | fail: |
| 1357 | errno = EINVAL; |
| 1358 | free(decstr); |
| 1359 | return NULL; |
| 1360 | } |
| 1361 | |
| 1362 | ssize_t |
| 1363 | snmpc_mbswidth(char *str) |
| 1364 | { |
| 1365 | wchar_t wc; |
| 1366 | size_t width = 0; |
| 1367 | size_t i; |
| 1368 | int len; |
| 1369 | |
| 1370 | for (i = 0; (len = mbtowc(&wc, &(str[i]), MB_CUR_MAX)) != 0; i += len) { |
| 1371 | if (len == -1) { |
| 1372 | mbtowc(NULL, NULL, MB_CUR_MAX); |
| 1373 | return -1; |
| 1374 | } |
| 1375 | width += wcwidth(wc); |
| 1376 | } |
| 1377 | return width; |
| 1378 | } |
| 1379 | |
| 1380 | struct ber_element * |
| 1381 | snmpc_varbindparse(int argc, char *argv[]) |
| 1382 | { |
| 1383 | struct ber_oid oid, oidval; |
| 1384 | struct in_addr addr4; |
| 1385 | char *addr = (char *)&addr4; |
| 1386 | char *str = NULL, *tmpstr, *endstr; |
| 1387 | const char *errstr = NULL; |
| 1388 | struct ber_element *varbind = NULL, *vblist = NULL; |
| 1389 | int i, ret; |
| 1390 | size_t strl, byte; |
| 1391 | long long lval; |
| 1392 | |
| 1393 | if (argc % 3 != 0) |
| 1394 | usage(); |
| 1395 | for (i = 0; i < argc; i += 3) { |
| 1396 | if (smi_string2oid(argv[i], &oid) == -1) |
| 1397 | errx(1, "Invalid oid: %s\n", argv[i]); |
| 1398 | switch (argv[i + 1][0]) { |
| 1399 | case 'a': |
| 1400 | ret = inet_pton(AF_INET, argv[i + 2], &addr4); |
| 1401 | if (ret == -1) |
| 1402 | err(1, "inet_pton"); |
| 1403 | if (ret == 0) |
| 1404 | errx(1, "%s: Bad value notation (%s)", argv[i], |
| 1405 | argv[i + 2]); |
| 1406 | if ((varbind = ober_printf_elements(varbind, "{Oxt}", |
| 1407 | &oid, addr, sizeof(addr4), BER_CLASS_APPLICATION, |
| 1408 | SNMP_T_IPADDR)) == NULL) |
| 1409 | err(1, "ober_printf_elements"); |
| 1410 | break; |
| 1411 | case 'b': |
| 1412 | tmpstr = argv[i + 2]; |
| 1413 | strl = 0; |
| 1414 | do { |
| 1415 | lval = strtoll(tmpstr, &endstr, 10); |
| 1416 | if (endstr[0] != ' ' && endstr[0] != '\t' && |
| 1417 | endstr[0] != ',' && endstr[0] != '\0') |
| 1418 | errx(1, "%s: Bad value notation (%s)", |
| 1419 | argv[i], argv[i + 2]); |
| 1420 | if (tmpstr == endstr) { |
| 1421 | tmpstr++; |
| 1422 | continue; |
| 1423 | } |
| 1424 | if (lval < 0) |
| 1425 | errx(1, "%s: Bad value notation (%s)", |
| 1426 | argv[i], argv[i + 2]); |
| 1427 | byte = lval / 8; |
| 1428 | if (byte >= strl) { |
| 1429 | if ((str = recallocarray(str, strl, |
| 1430 | byte + 1, 1)) == NULL) |
| 1431 | err(1, "malloc"); |
| 1432 | strl = byte + 1; |
| 1433 | } |
| 1434 | str[byte] |= 0x80 >> (lval % 8); |
| 1435 | tmpstr = endstr + 1; |
| 1436 | } while (endstr[0] != '\0'); |
| 1437 | |
| 1438 | |
| 1439 | |
| 1440 | |
| 1441 | goto pastestring; |
| 1442 | case 'c': |
| 1443 | lval = strtonum(argv[i + 2], 0, UINT32_MAX, |
| 1444 | &errstr); |
| 1445 | if (errstr != NULL) |
| 1446 | errx(1, "%s: Bad value notation (%s)", argv[i], |
| 1447 | argv[i + 2]); |
| 1448 | if ((varbind = ober_printf_elements(varbind, "{Oit}", |
| 1449 | &oid, lval, BER_CLASS_APPLICATION, |
| 1450 | SNMP_T_COUNTER32)) == NULL) |
| 1451 | err(1, "ober_printf_elements"); |
| 1452 | break; |
| 1453 | case 'd': |
| 1454 | |
| 1455 | if ((str = malloc(strlen(argv[i + 2]))) == NULL) |
| 1456 | err(1, "malloc"); |
| 1457 | tmpstr = argv[i + 2]; |
| 1458 | strl = 0; |
| 1459 | do { |
| 1460 | lval = strtoll(tmpstr, &endstr, 10); |
| 1461 | if (endstr[0] != ' ' && endstr[0] != '\t' && |
| 1462 | endstr[0] != '\0') |
| 1463 | errx(1, "%s: Bad value notation (%s)", |
| 1464 | argv[i], argv[i + 2]); |
| 1465 | if (tmpstr == endstr) { |
| 1466 | tmpstr++; |
| 1467 | continue; |
| 1468 | } |
| 1469 | if (lval < 0 || lval > 0xff) |
| 1470 | errx(1, "%s: Bad value notation (%s)", |
| 1471 | argv[i], argv[i + 2]); |
| 1472 | str[strl++] = (unsigned char) lval; |
| 1473 | tmpstr = endstr + 1; |
| 1474 | } while (endstr[0] != '\0'); |
| 1475 | goto pastestring; |
| 1476 | case 'i': |
| 1477 | lval = strtonum(argv[i + 2], INT32_MIN, INT32_MAX, |
| 1478 | &errstr); |
| 1479 | if (errstr != NULL) |
| 1480 | errx(1, "%s: Bad value notation (%s)", argv[i], |
| 1481 | argv[i + 2]); |
| 1482 | if ((varbind = ober_printf_elements(varbind, "{Oi}", |
| 1483 | &oid, lval)) == NULL) |
| 1484 | err(1, "ober_printf_elements"); |
| 1485 | break; |
| 1486 | case 'n': |
| 1487 | if ((varbind = ober_printf_elements(varbind, "{O0}", |
| 1488 | &oid)) == NULL) |
| 1489 | err(1, "ober_printf_elements"); |
| 1490 | break; |
| 1491 | case 'o': |
| 1492 | if (smi_string2oid(argv[i + 2], &oidval) == -1) |
| 1493 | errx(1, "%s: Unknown Object Identifier (Sub-id " |
| 1494 | "not found: (top) -> %s)", argv[i], |
| 1495 | argv[i + 2]); |
| 1496 | if ((varbind = ober_printf_elements(varbind, "{OO}", |
| 1497 | &oid, &oidval)) == NULL) |
| 1498 | err(1, "ober_printf_elements"); |
| 1499 | break; |
| 1500 | case 's': |
| 1501 | if ((str = strdup(argv[i + 2])) == NULL) |
| 1502 | err(1, NULL); |
| 1503 | strl = strlen(argv[i + 2]); |
| 1504 | pastestring: |
| 1505 | if ((varbind = ober_printf_elements(varbind, "{Ox}", |
| 1506 | &oid, str, strl)) == NULL) |
| 1507 | err(1, "ober_printf_elements"); |
| 1508 | free(str); |
| 1509 | break; |
| 1510 | case 't': |
| 1511 | lval = strtonum(argv[i + 2], 0, UINT32_MAX, |
| 1512 | &errstr); |
| 1513 | if (errstr != NULL) |
| 1514 | errx(1, "%s: Bad value notation (%s)", argv[i], |
| 1515 | argv[i + 2]); |
| 1516 | if ((varbind = ober_printf_elements(varbind, "{Oit}", |
| 1517 | &oid, lval, BER_CLASS_APPLICATION, |
| 1518 | SNMP_T_TIMETICKS)) == NULL) |
| 1519 | err(1, "ober_printf_elements"); |
| 1520 | break; |
| 1521 | case 'u': |
| 1522 | lval = strtonum(argv[i + 2], 0, UINT32_MAX, |
| 1523 | &errstr); |
| 1524 | if (errstr != NULL) |
| 1525 | errx(1, "%s: Bad value notation (%s)", argv[i], |
| 1526 | argv[i + 2]); |
| 1527 | if ((varbind = ober_printf_elements(varbind, "{Oit}", |
| 1528 | &oid, lval, BER_CLASS_APPLICATION, |
| 1529 | SNMP_T_GAUGE32)) == NULL) |
| 1530 | err(1, "ober_printf_elements"); |
| 1531 | break; |
| 1532 | case 'x': |
| 1533 | |
| 1534 | if ((str = malloc(strlen(argv[i + 2]))) == NULL) |
| 1535 | err(1, "malloc"); |
| 1536 | tmpstr = argv[i + 2]; |
| 1537 | strl = 0; |
| 1538 | do { |
| 1539 | lval = strtoll(tmpstr, &endstr, 16); |
| 1540 | if (endstr[0] != ' ' && endstr[0] != '\t' && |
| 1541 | endstr[0] != '\0') |
| 1542 | errx(1, "%s: Bad value notation (%s)", |
| 1543 | argv[i], argv[i + 2]); |
| 1544 | if (tmpstr == endstr) { |
| 1545 | tmpstr++; |
| 1546 | continue; |
| 1547 | } |
| 1548 | if (lval < 0 || lval > 0xff) |
| 1549 | errx(1, "%s: Bad value notation (%s)", |
| 1550 | argv[i], argv[i + 2]); |
| 1551 | str[strl++] = (unsigned char) lval; |
| 1552 | tmpstr = endstr + 1; |
| 1553 | } while (endstr[0] != '\0'); |
| 1554 | goto pastestring; |
| 1555 | default: |
| 1556 | usage(); |
| 1557 | } |
| 1558 | if (vblist == NULL) |
| 1559 | vblist = varbind; |
| 1560 | } |
| 1561 | |
| 1562 | return vblist; |
| 1563 | } |
| 1564 | |
| 1565 | __dead void |
| 1566 | usage(void) |
| 1567 | { |
| 1568 | size_t i; |
| 1569 | |
| 1570 | if (snmp_app != NULL) { |
| 1571 | fprintf(stderr, "usage: snmp %s%s%s\n", |
| 1572 | snmp_app->name, |
| 1573 | snmp_app->usecommonopt ? |
| 1574 | " [-A authpass] [-a digest] [-c community] [-e secengineid]\n" |
| 1575 | " [-E ctxengineid] [-K localpriv] [-k localauth] [-l seclevel]\n" |
| 1576 | " [-n ctxname] [-O afnqvxSQ] [-r retries] [-t timeout] [-u user]\n" |
| 1577 | " [-v version] [-X privpass] [-x cipher] [-Z boots,time]\n" |
| 1578 | " " : "", |
| 1579 | snmp_app->usage == NULL ? " " : snmp_app->usage); |
| 1580 | exit(1); |
| 1581 | } |
| 1582 | for (i = 0; i < (sizeof(snmp_apps)/sizeof(*snmp_apps)); i++) { |
| 1583 | if (i == 0) |
| 1584 | fprintf(stderr, "usage: "); |
| 1585 | else |
| 1586 | fprintf(stderr, " "); |
| 1587 | fprintf(stderr, "snmp %s%s %s\n", |
| 1588 | snmp_apps[i].name, |
| 1589 | snmp_apps[i].usecommonopt ? |
| 1590 | " [options]" : "", |
| 1591 | snmp_apps[i].usage ? snmp_apps[i].usage : ""); |
| 1592 | } |
| 1593 | exit(1); |
| 1594 | } |