2 * Copyright (c) 2005-2006 The FreeBSD Project
5 * Author: Shteryana Shopova <syrinx@FreeBSD.org>
7 * Redistribution of this software and documentation and use in source and
8 * binary forms, with or without modification, are permitted provided that
9 * the following conditions are met:
11 * 1. Redistributions of source code or documentation must retain the above
12 * copyright notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * Bsnmpget and bsnmpwalk are simple tools for querying SNMP agents,
30 * bsnmpset can be used to set MIB objects in an agent.
35 #include <sys/queue.h>
36 #include <sys/types.h>
49 #include <bsnmp/asn1.h>
50 #include <bsnmp/snmp.h>
51 #include <bsnmp/snmpclient.h>
53 #include "bsnmptools.h"
55 static const char *program_name = NULL;
56 static enum program_e {
62 /* *****************************************************************************
63 * Common bsnmptools functions.
70 "%s %s [-A options] [-b buffersize] [-C options] [-I options]\n"
71 "\t[-i filelist] [-l filename]%s [-o output] [-P options]\n"
72 "\t%s[-r retries] [-s [trans::][community@][server][:port]]\n"
73 "\t[-t timeout] [-U options] [-v version]%s\n",
75 (program == BSNMPGET) ? "[-aDdehnK]" :
76 (program == BSNMPWALK) ? "[-dhnK]" :
77 (program == BSNMPSET) ? "[-adehnK]" :
79 (program == BSNMPGET || program == BSNMPWALK) ?
80 " [-M max-repetitions] [-N non-repeaters]" : "",
81 (program == BSNMPGET || program == BSNMPWALK) ? "[-p pdu] " : "",
82 (program == BSNMPGET) ? " OID [OID ...]" :
83 (program == BSNMPWALK || program == BSNMPSET) ? " [OID ...]" :
89 parse_max_repetitions(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
93 assert(opt_arg != NULL);
95 v = strtoul(opt_arg, (void *) NULL, 10);
97 if (v > SNMP_MAX_BINDINGS) {
98 warnx("Max repetitions value greater than %d maximum allowed.",
103 SET_MAXREP(snmptoolctx, v);
108 parse_non_repeaters(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
112 assert(opt_arg != NULL);
114 v = strtoul(opt_arg, (void *) NULL, 10);
116 if (v > SNMP_MAX_BINDINGS) {
117 warnx("Non repeaters value greater than %d maximum allowed.",
122 SET_NONREP(snmptoolctx, v);
127 parse_pdu_type(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
129 assert(opt_arg != NULL);
131 if (strcasecmp(opt_arg, "getbulk") == 0)
132 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GETBULK);
133 else if (strcasecmp(opt_arg, "getnext") == 0)
134 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GETNEXT);
135 else if (strcasecmp(opt_arg, "get") == 0)
136 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GET);
138 warnx("PDU type '%s' not supported.", opt_arg);
146 snmptool_parse_options(struct snmp_toolinfo *snmptoolctx, int argc, char **argv)
148 int32_t count, optnum = 0;
154 opts = "dhnKA:b:C:I:i:l:M:N:o:P:p:r:s:t:U:v:";
157 opts = "aDdehnKA:b:C:I:i:l:M:N:o:P:p:r:s:t:U:v:";
160 opts = "adehnKA:b:C:I:i:l:o:P:r:s:t:U:v:";
166 while ((ch = getopt(argc, argv, opts)) != EOF) {
169 count = parse_authentication(snmptoolctx, optarg);
172 count = parse_skip_access(snmptoolctx);
175 count = parse_buflen(optarg);
178 count = parse_discovery(snmptoolctx);
181 count = parse_debug();
184 count = parse_errors(snmptoolctx);
190 count = parse_context(snmptoolctx, optarg);
193 count = parse_include(snmptoolctx, optarg);
196 count = parse_file(snmptoolctx, optarg);
199 count = parse_local_key(snmptoolctx);
202 count = parse_local_path(optarg);
205 count = parse_max_repetitions(snmptoolctx, optarg);
208 count = parse_non_repeaters(snmptoolctx, optarg);
211 count = parse_num_oids(snmptoolctx);
214 count = parse_output(snmptoolctx, optarg);
217 count = parse_privacy(snmptoolctx, optarg);
220 count = parse_pdu_type(snmptoolctx, optarg);
223 count = parse_retry(optarg);
226 count = parse_server(optarg);
229 count = parse_timeout(optarg);
232 count = parse_user_security(snmptoolctx, optarg);
235 count = parse_version(optarg);
251 * Read user input OID - one of following formats:
252 * 1) 1.2.1.1.2.1.0 - that is if option numeric was given;
253 * 2) string - in such case append .0 to the asn_oid subs;
254 * 3) string.1 - no additional processing required in such case.
257 snmptools_parse_stroid(struct snmp_toolinfo *snmptoolctx,
258 struct snmp_object *obj, char *argv)
260 char string[MAXSTR], *str;
262 struct asn_oid in_oid;
269 while (isalpha(*str) || *str == '_' || (i != 0 && isdigit(*str))) {
274 if (i <= 0 || i >= MAXSTR)
277 memset(&in_oid, 0, sizeof(struct asn_oid));
278 if ((str = snmp_parse_suboid((argv + i), &in_oid)) == NULL) {
279 warnx("Invalid OID - %s", argv);
283 strlcpy(string, argv, i + 1);
284 if (snmp_lookup_oidall(snmptoolctx, obj, string) < 0) {
285 warnx("No entry for %s in mapping lists", string);
289 /* If OID given on command line append it. */
291 asn_append_oid(&(obj->val.var), &in_oid);
292 else if (*str == '[') {
293 if ((str = snmp_parse_index(snmptoolctx, str + 1, obj)) == NULL)
295 } else if (obj->val.syntax > 0 && GET_PDUTYPE(snmptoolctx) ==
297 if (snmp_suboid_append(&(obj->val.var), (asn_subid_t) 0) < 0)
305 snmptools_parse_oid(struct snmp_toolinfo *snmptoolctx,
306 struct snmp_object *obj, char *argv)
311 if (ISSET_NUMERIC(snmptoolctx)) {
312 if (snmp_parse_numoid(argv, &(obj->val.var)) < 0)
315 if (snmptools_parse_stroid(snmptoolctx, obj, argv) == NULL &&
316 snmp_parse_numoid(argv, &(obj->val.var)) < 0)
324 snmptool_add_vbind(struct snmp_pdu *pdu, struct snmp_object *obj)
329 asn_append_oid(&(pdu->bindings[pdu->nbindings].var), &(obj->val.var));
332 return (pdu->nbindings);
335 /* *****************************************************************************
336 * bsnmpget private functions.
339 snmpget_verify_vbind(struct snmp_toolinfo *snmptoolctx, struct snmp_pdu *pdu,
340 struct snmp_object *obj)
342 if (pdu->version == SNMP_V1 && obj->val.syntax ==
343 SNMP_SYNTAX_COUNTER64) {
344 warnx("64-bit counters are not supported in SNMPv1 PDU");
348 if (ISSET_NUMERIC(snmptoolctx) || pdu->type == SNMP_PDU_GETNEXT ||
349 pdu->type == SNMP_PDU_GETBULK)
352 if (pdu->type == SNMP_PDU_GET && obj->val.syntax == SNMP_SYNTAX_NULL) {
353 warnx("Only leaf object values can be added to GET PDU");
361 * In case of a getbulk PDU, the error_status and error_index fields are used by
362 * libbsnmp to hold the values of the non-repeaters and max-repetitions fields
363 * that are present only in the getbulk - so before sending the PDU make sure
364 * these have correct values as well.
367 snmpget_fix_getbulk(struct snmp_pdu *pdu, uint32_t max_rep, uint32_t non_rep)
371 if (pdu->nbindings < non_rep)
372 pdu->error_status = pdu->nbindings;
374 pdu->error_status = non_rep;
377 pdu->error_index = max_rep;
379 pdu->error_index = 1;
383 snmptool_get(struct snmp_toolinfo *snmptoolctx)
385 struct snmp_pdu req, resp;
387 snmp_pdu_create(&req, GET_PDUTYPE(snmptoolctx));
389 while ((snmp_pdu_add_bindings(snmptoolctx, snmpget_verify_vbind,
390 snmptool_add_vbind, &req, SNMP_MAX_BINDINGS)) > 0) {
392 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK)
393 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
394 GET_NONREP(snmptoolctx));
396 if (snmp_dialog(&req, &resp) == -1) {
401 if (snmp_parse_resp(&resp, &req) >= 0) {
402 snmp_output_resp(snmptoolctx, &resp, NULL);
406 snmp_output_err_resp(snmptoolctx, &resp);
407 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK ||
408 !ISSET_RETRY(snmptoolctx))
412 * Loop through the object list and set object->error to the
413 * varbinding that caused the error.
415 if (snmp_object_seterror(snmptoolctx,
416 &(resp.bindings[resp.error_index - 1]),
417 resp.error_status) <= 0)
420 fprintf(stderr, "Retrying...\n");
421 snmp_pdu_free(&resp);
422 snmp_pdu_create(&req, GET_PDUTYPE(snmptoolctx));
425 snmp_pdu_free(&resp);
431 /* *****************************************************************************
432 * bsnmpwalk private functions.
434 /* The default tree to walk. */
435 static const struct asn_oid snmp_mibII_OID = {
436 6 , { 1, 3, 6, 1, 2, 1 }
440 snmpwalk_add_default(struct snmp_toolinfo *snmptoolctx __unused,
441 struct snmp_object *obj, char *string __unused)
443 asn_append_oid(&(obj->val.var), &snmp_mibII_OID);
448 * Prepare the next GetNext/Get PDU to send.
451 snmpwalk_nextpdu_create(uint32_t op, struct asn_oid *var, struct snmp_pdu *pdu)
453 snmp_pdu_create(pdu, op);
454 asn_append_oid(&(pdu->bindings[0].var), var);
459 snmptool_walk(struct snmp_toolinfo *snmptoolctx)
461 struct snmp_pdu req, resp;
462 struct asn_oid root; /* Keep the initial oid. */
466 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK)
467 op = SNMP_PDU_GETBULK;
469 op = SNMP_PDU_GETNEXT;
471 snmp_pdu_create(&req, op);
473 while ((rc = snmp_pdu_add_bindings(snmptoolctx, NULL,
474 snmptool_add_vbind, &req, 1)) > 0) {
476 /* Remember the root where the walk started from. */
477 memset(&root, 0, sizeof(struct asn_oid));
478 asn_append_oid(&root, &(req.bindings[0].var));
480 if (op == SNMP_PDU_GETBULK)
481 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
482 GET_NONREP(snmptoolctx));
485 while (snmp_dialog(&req, &resp) >= 0) {
486 if ((snmp_parse_resp(&resp, &req)) < 0) {
487 snmp_output_err_resp(snmptoolctx, &resp);
488 snmp_pdu_free(&resp);
493 rc = snmp_output_resp(snmptoolctx, &resp, &root);
495 snmp_pdu_free(&resp);
501 snmp_pdu_free(&resp);
503 if ((u_int)rc < resp.nbindings)
506 snmpwalk_nextpdu_create(op,
507 &(resp.bindings[resp.nbindings - 1].var), &req);
508 if (op == SNMP_PDU_GETBULK)
509 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
510 GET_NONREP(snmptoolctx));
513 /* Just in case our root was a leaf. */
515 snmpwalk_nextpdu_create(SNMP_PDU_GET, &root, &req);
516 if (snmp_dialog(&req, &resp) == SNMP_CODE_OK) {
517 if (snmp_parse_resp(&resp,&req) < 0)
518 snmp_output_err_resp(snmptoolctx, &resp);
520 snmp_output_resp(snmptoolctx, &(resp), NULL);
522 snmp_pdu_free(&resp);
527 if (snmp_object_remove(snmptoolctx, &root) < 0) {
528 warnx("snmp_object_remove");
532 snmp_pdu_create(&req, op);
541 /* *****************************************************************************
542 * bsnmpset private functions.
546 parse_oid_numeric(struct snmp_value *value, char *val)
555 suboid = strtoul(val, &endptr, 10);
557 warn("Value %s not supported", val);
562 if ((asn_subid_t) suboid > ASN_MAXID) {
563 warnx("Suboid %u > ASN_MAXID", suboid);
566 if (snmp_suboid_append(&(value->v.oid), suboid) < 0)
569 } while (*endptr == '.');
572 warnx("OID value %s not supported", val);
574 value->syntax = SNMP_SYNTAX_OID;
579 * Allow OID leaf in both forms:
580 * 1) 1.3.6.1.2... -> in such case call directly the function reading raw OIDs;
581 * 2) begemotSnmpdAgentFreeBSD -> lookup the ASN OID corresponding to that.
584 parse_oid_string(struct snmp_toolinfo *snmptoolctx,
585 struct snmp_value *value, char *string)
587 struct snmp_object obj;
589 if (isdigit(string[0]))
590 return (parse_oid_numeric(value, string));
592 memset(&obj, 0, sizeof(struct snmp_object));
593 if (snmp_lookup_enumoid(snmptoolctx, &obj, string) < 0) {
594 warnx("Unknown OID enum string - %s", string);
598 asn_append_oid(&(value->v.oid), &(obj.val.var));
603 parse_ip(struct snmp_value * value, char * val)
610 for (i = 0; i < 4; i++) {
611 v = strtoul(str, &endptr, 10);
614 if (*endptr != '.' && *endptr != '\0' && i != 3)
617 value->v.ipaddress[i] = (uint8_t) v;
619 value->syntax = SNMP_SYNTAX_IPADDRESS;
625 parse_int(struct snmp_value *value, char *val)
628 int32_t v, saved_errno;
633 v = strtol(val, &endptr, 10);
636 warn("Value %s not supported", val);
641 value->syntax = SNMP_SYNTAX_INTEGER;
642 value->v.integer = v;
649 parse_int_string(struct snmp_object *object, char *val)
654 return ((parse_int(&(object->val), val)));
656 if (object->info == NULL) {
657 warnx("Unknown enumerated integer type - %s", val);
660 if ((v = enum_number_lookup(object->info->snmp_enum, val)) < 0)
661 warnx("Unknown enumerated integer type - %s", val);
663 object->val.v.integer = v;
668 * Here syntax may be one of SNMP_SYNTAX_COUNTER, SNMP_SYNTAX_GAUGE,
669 * SNMP_SYNTAX_TIMETICKS.
672 parse_uint(struct snmp_value *value, char *val)
681 v = strtoul(val, &endptr, 10);
684 warn("Value %s not supported", val);
696 parse_ticks(struct snmp_value *value, char *val)
698 if (parse_uint(value, val) < 0)
701 value->syntax = SNMP_SYNTAX_TIMETICKS;
706 parse_gauge(struct snmp_value *value, char *val)
708 if (parse_uint(value, val) < 0)
711 value->syntax = SNMP_SYNTAX_GAUGE;
716 parse_counter(struct snmp_value *value, char *val)
718 if (parse_uint(value, val) < 0)
721 value->syntax = SNMP_SYNTAX_COUNTER;
726 parse_uint64(struct snmp_value *value, char *val)
735 v = strtoull(val, &endptr, 10);
738 warnx("Value %s not supported", val);
743 value->syntax = SNMP_SYNTAX_COUNTER64;
744 value->v.counter64 = v;
751 parse_syntax_val(struct snmp_value *value, enum snmp_syntax syntax, char *val)
754 case SNMP_SYNTAX_INTEGER:
755 return (parse_int(value, val));
756 case SNMP_SYNTAX_IPADDRESS:
757 return (parse_ip(value, val));
758 case SNMP_SYNTAX_COUNTER:
759 return (parse_counter(value, val));
760 case SNMP_SYNTAX_GAUGE:
761 return (parse_gauge(value, val));
762 case SNMP_SYNTAX_TIMETICKS:
763 return (parse_ticks(value, val));
764 case SNMP_SYNTAX_COUNTER64:
765 return (parse_uint64(value, val));
766 case SNMP_SYNTAX_OCTETSTRING:
767 return (snmp_tc2oct(SNMP_STRING, value, val));
768 case SNMP_SYNTAX_OID:
769 return (parse_oid_numeric(value, val));
779 * Parse a command line argument of type OID=syntax:value and fill in whatever
780 * fields can be derived from the input into snmp_value structure. Reads numeric
784 parse_pair_numoid_val(char *str, struct snmp_value *snmp_val)
788 enum snmp_syntax syntax;
789 char oid_str[ASN_OIDSTRLEN];
792 for (cnt = 0; cnt < ASN_OIDSTRLEN; cnt++)
796 if (cnt >= ASN_OIDSTRLEN) {
797 warnx("OID too long - %s", str);
800 strlcpy(oid_str, ptr, (size_t) (cnt + 1));
803 for (cnt = 0; cnt < MAX_CMD_SYNTAX_LEN; cnt++)
807 if (cnt >= MAX_CMD_SYNTAX_LEN) {
808 warnx("Unknown syntax in OID - %s", str);
812 if ((syntax = parse_syntax(ptr)) <= SNMP_SYNTAX_NULL) {
813 warnx("Unknown syntax in OID - %s", ptr);
818 for (cnt = 0; cnt < MAX_OCTSTRING_LEN; cnt++)
819 if (ptr[cnt] == '\0')
822 if (ptr[cnt] != '\0') {
823 warnx("Value string too long - %s", ptr);
828 * Here try parsing the OIDs and syntaxes and then check values - have
829 * to know syntax to check value boundaries.
831 if (snmp_parse_numoid(oid_str, &(snmp_val->var)) < 0) {
832 warnx("Error parsing OID %s", oid_str);
836 if (parse_syntax_val(snmp_val, syntax, ptr) < 0)
843 parse_syntax_strval(struct snmp_toolinfo *snmptoolctx,
844 struct snmp_object *object, char *str)
847 enum snmp_syntax syn;
850 * Syntax string here not required - still may be present.
853 if (GET_OUTPUT(snmptoolctx) == OUTPUT_VERBOSE) {
854 for (len = 0 ; *(str + len) != ':'; len++) {
855 if (*(str + len) == '\0') {
856 warnx("Syntax missing in value - %s", str);
860 if ((syn = parse_syntax(str)) <= SNMP_SYNTAX_NULL) {
861 warnx("Unknown syntax in - %s", str);
864 if (syn != object->val.syntax) {
865 if (!ISSET_ERRIGNORE(snmptoolctx)) {
866 warnx("Bad syntax in - %s", str);
869 object->val.syntax = syn;
875 switch (object->val.syntax) {
876 case SNMP_SYNTAX_INTEGER:
877 return (parse_int_string(object, str + len));
878 case SNMP_SYNTAX_IPADDRESS:
879 return (parse_ip(&(object->val), str + len));
880 case SNMP_SYNTAX_COUNTER:
881 return (parse_counter(&(object->val), str + len));
882 case SNMP_SYNTAX_GAUGE:
883 return (parse_gauge(&(object->val), str + len));
884 case SNMP_SYNTAX_TIMETICKS:
885 return (parse_ticks(&(object->val), str + len));
886 case SNMP_SYNTAX_COUNTER64:
887 return (parse_uint64(&(object->val), str + len));
888 case SNMP_SYNTAX_OCTETSTRING:
889 return (snmp_tc2oct(object->info->tc, &(object->val),
891 case SNMP_SYNTAX_OID:
892 return (parse_oid_string(snmptoolctx, &(object->val),
903 parse_pair_stroid_val(struct snmp_toolinfo *snmptoolctx,
904 struct snmp_object *obj, char *argv)
908 if ((ptr = snmptools_parse_stroid(snmptoolctx, obj, argv)) == NULL)
912 warnx("Value to set expected after OID");
916 if (parse_syntax_strval(snmptoolctx, obj, ptr + 1) < 0)
924 snmpset_parse_oid(struct snmp_toolinfo *snmptoolctx,
925 struct snmp_object *obj, char *argv)
930 if (ISSET_NUMERIC(snmptoolctx)) {
931 if (parse_pair_numoid_val(argv, &(obj->val)) < 0)
934 if (parse_pair_stroid_val(snmptoolctx, obj, argv) < 0)
942 add_ip_syntax(struct snmp_value *dst, struct snmp_value *src)
946 dst->syntax = SNMP_SYNTAX_IPADDRESS;
947 for (i = 0; i < 4; i++)
948 dst->v.ipaddress[i] = src->v.ipaddress[i];
954 add_octstring_syntax(struct snmp_value *dst, struct snmp_value *src)
956 if (src->v.octetstring.len > ASN_MAXOCTETSTRING) {
957 warnx("OctetString len too big - %u", src->v.octetstring.len);
961 if ((dst->v.octetstring.octets = malloc(src->v.octetstring.len)) ==
963 syslog(LOG_ERR, "malloc() failed - %s", strerror(errno));
967 memcpy(dst->v.octetstring.octets, src->v.octetstring.octets,
968 src->v.octetstring.len);
969 dst->syntax = SNMP_SYNTAX_OCTETSTRING;
970 dst->v.octetstring.len = src->v.octetstring.len;
976 add_oid_syntax(struct snmp_value *dst, struct snmp_value *src)
978 asn_append_oid(&(dst->v.oid), &(src->v.oid));
979 dst->syntax = SNMP_SYNTAX_OID;
984 * Check syntax - if one of SNMP_SYNTAX_NULL, SNMP_SYNTAX_NOSUCHOBJECT,
985 * SNMP_SYNTAX_NOSUCHINSTANCE, SNMP_SYNTAX_ENDOFMIBVIEW or anything not known -
989 snmpset_add_value(struct snmp_value *dst, struct snmp_value *src)
991 if (dst == NULL || src == NULL)
994 switch (src->syntax) {
995 case SNMP_SYNTAX_INTEGER:
996 dst->v.integer = src->v.integer;
997 dst->syntax = SNMP_SYNTAX_INTEGER;
999 case SNMP_SYNTAX_TIMETICKS:
1000 dst->v.uint32 = src->v.uint32;
1001 dst->syntax = SNMP_SYNTAX_TIMETICKS;
1003 case SNMP_SYNTAX_GAUGE:
1004 dst->v.uint32 = src->v.uint32;
1005 dst->syntax = SNMP_SYNTAX_GAUGE;
1007 case SNMP_SYNTAX_COUNTER:
1008 dst->v.uint32 = src->v.uint32;
1009 dst->syntax = SNMP_SYNTAX_COUNTER;
1011 case SNMP_SYNTAX_COUNTER64:
1012 dst->v.counter64 = src->v.counter64;
1013 dst->syntax = SNMP_SYNTAX_COUNTER64;
1015 case SNMP_SYNTAX_IPADDRESS:
1016 add_ip_syntax(dst, src);
1018 case SNMP_SYNTAX_OCTETSTRING:
1019 add_octstring_syntax(dst, src);
1021 case SNMP_SYNTAX_OID:
1022 add_oid_syntax(dst, src);
1025 warnx("Unknown syntax %d", src->syntax);
1033 snmpset_verify_vbind(struct snmp_toolinfo *snmptoolctx, struct snmp_pdu *pdu,
1034 struct snmp_object *obj)
1036 if (pdu->version == SNMP_V1 && obj->val.syntax ==
1037 SNMP_SYNTAX_COUNTER64) {
1038 warnx("64-bit counters are not supported in SNMPv1 PDU");
1042 if (ISSET_NUMERIC(snmptoolctx) || ISSET_ERRIGNORE(snmptoolctx))
1045 if (obj->info->access < SNMP_ACCESS_SET) {
1046 warnx("Object %s not accessible for set - try 'bsnmpset -a'",
1055 snmpset_add_vbind(struct snmp_pdu *pdu, struct snmp_object *obj)
1057 if (pdu->nbindings > SNMP_MAX_BINDINGS) {
1058 warnx("Too many OIDs for one PDU");
1065 if (snmpset_add_value(&(pdu->bindings[pdu->nbindings]), &(obj->val))
1069 asn_append_oid(&(pdu->bindings[pdu->nbindings].var), &(obj->val.var));
1072 return (pdu->nbindings);
1076 snmptool_set(struct snmp_toolinfo *snmptoolctx)
1078 struct snmp_pdu req, resp;
1080 snmp_pdu_create(&req, SNMP_PDU_SET);
1082 while ((snmp_pdu_add_bindings(snmptoolctx, snmpset_verify_vbind,
1083 snmpset_add_vbind, &req, SNMP_MAX_BINDINGS)) > 0) {
1084 if (snmp_dialog(&req, &resp)) {
1085 warn("Snmp dialog");
1089 if (snmp_pdu_check(&req, &resp) > 0) {
1090 if (GET_OUTPUT(snmptoolctx) != OUTPUT_QUIET)
1091 snmp_output_resp(snmptoolctx, &resp, NULL);
1095 snmp_output_err_resp(snmptoolctx, &resp);
1096 if (!ISSET_RETRY(snmptoolctx))
1099 if (snmp_object_seterror(snmptoolctx,
1100 &(resp.bindings[resp.error_index - 1]),
1101 resp.error_status) <= 0)
1104 fprintf(stderr, "Retrying...\n");
1105 snmp_pdu_free(&req);
1106 snmp_pdu_free(&resp);
1107 snmp_pdu_create(&req, SNMP_PDU_SET);
1110 snmp_pdu_free(&resp);
1115 /* *****************************************************************************
1119 * According to command line options prepare SNMP Get | GetNext | GetBulk PDU.
1120 * Wait for a response and print it.
1123 * Do a 'snmp walk' - according to command line options request for values
1124 * lexicographically subsequent and subrooted at a common node. Send a GetNext
1125 * PDU requesting the value for each next variable and print the response. Stop
1126 * when a Response PDU is received that contains the value of a variable not
1127 * subrooted at the variable the walk started.
1130 main(int argc, char ** argv)
1132 struct snmp_toolinfo snmptoolctx;
1133 int32_t oid_cnt, last_oid, opt_num;
1136 /* Make sure program_name is set and valid. */
1138 program_name = "snmptool";
1140 program_name = strrchr(*argv, '/');
1141 if (program_name != NULL)
1144 program_name = *argv;
1147 if (program_name == NULL) {
1148 fprintf(stderr, "Error: No program name?\n");
1150 } else if (strcmp(program_name, "bsnmpget") == 0)
1152 else if (strcmp(program_name, "bsnmpwalk") == 0)
1153 program = BSNMPWALK;
1154 else if (strcmp(program_name, "bsnmpset") == 0)
1157 fprintf(stderr, "Unknown snmp tool name '%s'.\n", program_name);
1162 if (snmptool_init(&snmptoolctx) < 0)
1165 if ((opt_num = snmptool_parse_options(&snmptoolctx, argc, argv)) < 0) {
1166 snmp_tool_freeall(&snmptoolctx);
1167 /* On -h (help) exit without error. */
1174 oid_cnt = argc - opt_num - 1;
1178 if (!ISSET_EDISCOVER(&snmptoolctx) &&
1179 !ISSET_LOCALKEY(&snmptoolctx)) {
1180 fprintf(stderr, "No OID given.\n");
1182 snmp_tool_freeall(&snmptoolctx);
1188 if (snmp_object_add(&snmptoolctx, snmpwalk_add_default,
1191 "Error setting default subtree.\n");
1192 snmp_tool_freeall(&snmptoolctx);
1198 fprintf(stderr, "No OID given.\n");
1200 snmp_tool_freeall(&snmptoolctx);
1205 if (snmp_import_all(&snmptoolctx) < 0) {
1206 snmp_tool_freeall(&snmptoolctx);
1210 /* A simple sanity check - can not send GETBULK when using SNMPv1. */
1211 if (program == BSNMPGET && snmp_client.version == SNMP_V1 &&
1212 GET_PDUTYPE(&snmptoolctx) == SNMP_PDU_GETBULK) {
1213 fprintf(stderr, "Cannot send GETBULK PDU with SNMPv1.\n");
1214 snmp_tool_freeall(&snmptoolctx);
1218 for (last_oid = argc - 1; oid_cnt > 0; last_oid--, oid_cnt--) {
1219 if ((snmp_object_add(&snmptoolctx, (program == BSNMPSET) ?
1220 snmpset_parse_oid : snmptools_parse_oid,
1221 argv[last_oid])) < 0) {
1222 fprintf(stderr, "Error parsing OID string '%s'.\n",
1224 snmp_tool_freeall(&snmptoolctx);
1229 if (snmp_open(NULL, NULL, NULL, NULL)) {
1230 warn("Failed to open snmp session");
1231 snmp_tool_freeall(&snmptoolctx);
1235 if (snmp_client.version == SNMP_V3 && snmp_client.engine.engine_len == 0)
1236 SET_EDISCOVER(&snmptoolctx);
1238 if (ISSET_EDISCOVER(&snmptoolctx) &&
1239 snmp_discover_engine(snmptoolctx.passwd) < 0) {
1240 warn("Unknown SNMP Engine ID");
1245 if (GET_OUTPUT(&snmptoolctx) == OUTPUT_VERBOSE ||
1246 ISSET_EDISCOVER(&snmptoolctx))
1247 snmp_output_engine();
1249 if (snmp_client.version == SNMP_V3 && ISSET_LOCALKEY(&snmptoolctx) &&
1250 !ISSET_EDISCOVER(&snmptoolctx)) {
1251 if (snmp_passwd_to_keys(&snmp_client.user,
1252 snmptoolctx.passwd) != SNMP_CODE_OK ||
1253 snmp_get_local_keys(&snmp_client.user,
1254 snmp_client.engine.engine_id,
1255 snmp_client.engine.engine_len) != SNMP_CODE_OK) {
1256 warn("Failed to get keys");
1262 if (GET_OUTPUT(&snmptoolctx) == OUTPUT_VERBOSE ||
1263 ISSET_EDISCOVER(&snmptoolctx))
1266 if (ISSET_EDISCOVER(&snmptoolctx) && snmptoolctx.objects == 0)
1271 rc = snmptool_get(&snmptoolctx);
1274 rc = snmptool_walk(&snmptoolctx);
1277 rc = snmptool_set(&snmptoolctx);
1283 snmp_tool_freeall(&snmptoolctx);