2 #include "netinet/ipl.h"
6 static u_char sysuptime[] = { 6, 8, 0x2b, 6, 1, 2, 1, 1, 3, 0 };
8 * Enterprise number OID:
11 static u_char ipf_trap0_1[] = { 6, 10, 0x2b, 6, 1, 4, 1, 0xcd, 0x4c, 1, 1, 1 };
12 static u_char ipf_trap0_2[] = { 6, 10, 0x2b, 6, 1, 4, 1, 0xcd, 0x4c, 1, 1, 2 };
14 static int writeint __P((u_char *, int));
15 static int writelength __P((u_char *, u_int));
16 static int maketrap_v2 __P((char *, u_char *, int, u_char *, int));
17 static void snmpv2_destroy __P((void *));
18 static void *snmpv2_dup __P((void *));
19 static int snmpv2_match __P((void *, void *));
20 static void *snmpv2_parse __P((char **));
21 static void snmpv2_print __P((void *));
22 static int snmpv2_send __P((void *, ipmon_msg_t *));
25 int sendtrap_v2_0 __P((int, char *, char *, int));
27 static char def_community[] = "public"; /* ublic */
29 typedef struct snmpv2_opts_s {
36 struct sockaddr_in6 sin6;
38 struct sockaddr_in sin;
41 ipmon_saver_t snmpv2saver = {
45 snmpv2_match, /* match */
53 snmpv2_match(ctx1, ctx2)
56 snmpv2_opts_t *s1 = ctx1, *s2 = ctx2;
61 if (strcmp(s1->community, s2->community))
66 if (memcmp(&s1->sin6, &s2->sin6, sizeof(s1->sin6)))
71 if (memcmp(&s1->sin, &s2->sin, sizeof(s1->sin)))
83 snmpv2_opts_t *s = ctx;
94 snmpv2_opts_t *snmpv2 = ctx;
96 printf("%s ", snmpv2->community);
98 if (snmpv2->v6 == 1) {
101 printf("%s", inet_ntop(AF_INET6, &snmpv2->sin6.sin6_addr, buf,
102 sizeof(snmpv2->sin6.sin6_addr)));
106 printf("%s", inet_ntoa(snmpv2->sin.sin_addr));
112 snmpv2_parse(char **strings)
119 if (strings[0] == NULL || strings[0][0] == '\0')
121 if (strchr(*strings, ' ') == NULL)
124 str = strdup(*strings);
126 ctx = calloc(1, sizeof(*ctx));
134 s = strchr(str, ' ');
136 ctx->community = str;
147 if (strchr(s, ':') == NULL) {
148 result = inet_pton(AF_INET, s, &ctx->sin.sin_addr);
150 ctx->fd = socket(AF_INET, SOCK_DGRAM, 0);
152 ctx->sin.sin_family = AF_INET;
153 ctx->sin.sin_port = htons(162);
155 (struct sockaddr *)&ctx->sin,
156 sizeof(ctx->sin)) != 0) {
163 result = inet_pton(AF_INET6, s, &ctx->sin6.sin6_addr);
166 ctx->fd = socket(AF_INET6, SOCK_DGRAM, 0);
168 ctx->sin6.sin6_family = AF_INET6;
169 ctx->sin6.sin6_port = htons(162);
171 (struct sockaddr *)&ctx->sin6,
172 sizeof(ctx->sin6)) != 0) {
180 result = inet_aton(s, &ctx->sin.sin_addr);
182 ctx->fd = socket(AF_INET, SOCK_DGRAM, 0);
184 ctx->sin.sin_family = AF_INET;
185 ctx->sin.sin_port = htons(162);
186 if (connect(ctx->fd, (struct sockaddr *)&ctx->sin,
187 sizeof(ctx->sin)) != 0) {
211 snmpv2_opts_t *v2 = ctx;
226 snmpv2_send(ctx, msg)
230 snmpv2_opts_t *v2 = ctx;
232 return sendtrap_v2_0(v2->fd, v2->community,
233 msg->imm_msg, msg->imm_msglen);
236 writelength(buffer, value)
240 u_int n = htonl(value);
247 if (value > 0xffffff)
249 else if (value > 0xffff)
251 else if (value > 0xff)
256 *buffer = 0x80 | len;
258 bcopy((u_char *)&n + 4 - len, buffer + 1, len);
265 writeint(buffer, value)
278 *s++ = 0x80 | (n / 4194304);
279 n -= 4194304 * (n / 4194304);
282 *s++ = 0x80 | (n / 32768);
283 n -= 32768 * (n / 327678);
286 *s++ = 0x80 | (n / 128);
287 n -= (n / 128) * 128;
297 * First style of traps is:
298 * 1.3.6.1.4.1.9932.1.1
301 maketrap_v2(community, buffer, bufsize, msg, msglen)
308 u_char *s = buffer, *t, *pdulen;
318 if (community == NULL || *community == '\0')
319 community = def_community;
320 basesize += strlen(community) + msglen;
322 if (basesize + 8 > bufsize)
325 memset(buffer, 0xff, bufsize);
326 *s++ = 0x30; /* Sequence */
328 if (basesize - 1 >= 128) {
335 *s++ = 0x02; /* Integer32 */
336 *s++ = 0x01; /* length 1 */
337 *s++ = 0x01; /* version 2 */
338 *s++ = 0x04; /* octet string */
339 *s++ = strlen(community); /* length of "public" */
340 bcopy(community, s, s[-1]);
342 *s++ = 0xA7; /* PDU(7) */
344 if (basesize - (s - buffer) >= 128) {
352 *s++ = 0x2; /* integer */
353 *s++ = 0x4; /* len 4 */
354 *s++ = 0x0; /* noError */
355 *s++ = 0x0; /* noError */
356 *s++ = 0x0; /* noError */
357 *s++ = 0x0; /* noError */
360 *s++ = 0x2; /* integer */
361 *s++ = 0x1; /* len 1 */
362 *s++ = 0x0; /* noError */
365 *s++ = 0x2; /* integer */
366 *s++ = 0x1; /* len 1 */
367 *s++ = 0x0; /* noError */
369 *s++ = 0x30; /* sequence */
371 if (basesize - (s - buffer) >= 128) {
379 *s++ = 0x30; /* sequence */
380 *s++ = sizeof(sysuptime) + 6;
382 bcopy(sysuptime, s, sizeof(sysuptime));
383 s += sizeof(sysuptime);
385 *s++ = 0x43; /* Timestamp */
386 *s++ = 0x04; /* TimeTicks */
394 bcopy(ipf_trap0_1, t, sizeof(ipf_trap0_1));
395 t += sizeof(ipf_trap0_1);
397 *t++ = 0x2; /* Integer */
398 n = writeint(t + 1, IPFILTER_VERSION);
408 if (msglen + 1 + 1 + sizeof(ipf_trap0_2) >= 128)
413 if (msglen + 2 + 1 + sizeof(ipf_trap0_2) >= 128)
419 bcopy(ipf_trap0_2, t, sizeof(ipf_trap0_2));
420 t += sizeof(ipf_trap0_2);
422 *t++ = 0x4; /* Octet string */
423 n = writelength(t, msglen);
425 bcopy(msg, t, msglen);
428 len = t - s - trapmsglen;
431 len = t - varlen - varlensz;
432 writelength(varlen, len); /* pdu length */
434 len = t - pdulen - pdulensz;
435 writelength(pdulen, len); /* pdu length */
437 len = t - buffer - baselensz - 1;
438 writelength(buffer + 1, len); /* length of trap */
445 sendtrap_v2_0(fd, community, msg, msglen)
447 char *community, *msg;
454 n = maketrap_v2(community, buffer, sizeof(buffer),
455 (u_char *)msg, msglen);
457 return send(fd, buffer, n, 0);