2 * Copyright (c) 2005-2006 The FreeBSD Project
5 * Author: Shteryana Shopova <syrinx@FreeBSD.org>
7 * Redistribution of this software and documentation and use in source and
8 * binary forms, with or without modification, are permitted provided that
9 * the following conditions are met:
11 * 1. Redistributions of source code or documentation must retain the above
12 * copyright notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * Bsnmpget and bsnmpwalk are simple tools for querying SNMP agents,
30 * bsnmpset can be used to set MIB objects in an agent.
35 #include <sys/queue.h>
36 #include <sys/types.h>
49 #include <bsnmp/asn1.h>
50 #include <bsnmp/snmp.h>
51 #include <bsnmp/snmpclient.h>
53 #include "bsnmptools.h"
55 static const char *program_name = NULL;
56 static enum program_e {
62 /* *****************************************************************************
63 * Common bsnmptools functions.
70 "%s %s [-A options] [-b buffersize] [-C options] [-I options]\n"
71 "\t[-i filelist] [-l filename]%s [-o output] [-P options]\n"
72 "\t%s[-r retries] [-s [trans::][community@][server][:port]]\n"
73 "\t[-t timeout] [-U options] [-v version]%s\n",
75 (program == BSNMPGET) ? "[-aDdehnK]" :
76 (program == BSNMPWALK) ? "[-dhnK]" :
77 (program == BSNMPSET) ? "[-adehnK]" :
79 (program == BSNMPGET || program == BSNMPWALK) ?
80 " [-M max-repetitions] [-N non-repeaters]" : "",
81 (program == BSNMPGET || program == BSNMPWALK) ? "[-p pdu] " : "",
82 (program == BSNMPGET) ? " OID [OID ...]" :
83 (program == BSNMPWALK || program == BSNMPSET) ? " [OID ...]" :
89 parse_max_repetitions(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
93 assert(opt_arg != NULL);
95 v = strtoul(opt_arg, (void *) NULL, 10);
97 if (v > SNMP_MAX_BINDINGS) {
98 warnx("Max repetitions value greater than %d maximum allowed.",
103 SET_MAXREP(snmptoolctx, v);
108 parse_non_repeaters(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
112 assert(opt_arg != NULL);
114 v = strtoul(opt_arg, (void *) NULL, 10);
116 if (v > SNMP_MAX_BINDINGS) {
117 warnx("Non repeaters value greater than %d maximum allowed.",
122 SET_NONREP(snmptoolctx, v);
127 parse_pdu_type(struct snmp_toolinfo *snmptoolctx, char *opt_arg)
129 assert(opt_arg != NULL);
131 if (strcasecmp(opt_arg, "getbulk") == 0)
132 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GETBULK);
133 else if (strcasecmp(opt_arg, "getnext") == 0)
134 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GETNEXT);
135 else if (strcasecmp(opt_arg, "get") == 0)
136 SET_PDUTYPE(snmptoolctx, SNMP_PDU_GET);
138 warnx("PDU type '%s' not supported.", opt_arg);
146 snmptool_parse_options(struct snmp_toolinfo *snmptoolctx, int argc, char **argv)
148 int32_t count, optnum = 0;
154 opts = "dhnKA:b:C:I:i:l:M:N:o:P:p:r:s:t:U:v:";
157 opts = "aDdehnKA:b:C:I:i:l:M:N:o:P:p:r:s:t:U:v:";
160 opts = "adehnKA:b:C:I:i:l:o:P:r:s:t:U:v:";
166 while ((ch = getopt(argc, argv, opts)) != EOF) {
169 count = parse_authentication(snmptoolctx, optarg);
172 count = parse_skip_access(snmptoolctx);
175 count = parse_buflen(optarg);
178 count = parse_discovery(snmptoolctx);
181 count = parse_debug();
184 count = parse_errors(snmptoolctx);
190 count = parse_context(snmptoolctx, optarg);
193 count = parse_include(snmptoolctx, optarg);
196 count = parse_file(snmptoolctx, optarg);
199 count = parse_local_key(snmptoolctx);
202 count = parse_local_path(optarg);
205 count = parse_max_repetitions(snmptoolctx, optarg);
208 count = parse_non_repeaters(snmptoolctx, optarg);
211 count = parse_num_oids(snmptoolctx);
214 count = parse_output(snmptoolctx, optarg);
217 count = parse_privacy(snmptoolctx, optarg);
220 count = parse_pdu_type(snmptoolctx, optarg);
223 count = parse_retry(optarg);
226 count = parse_server(optarg);
229 count = parse_timeout(optarg);
232 count = parse_user_security(snmptoolctx, optarg);
235 count = parse_version(optarg);
251 * Read user input OID - one of following formats:
252 * 1) 1.2.1.1.2.1.0 - that is if option numeric was given;
253 * 2) string - in such case append .0 to the asn_oid subs;
254 * 3) string.1 - no additional processing required in such case.
257 snmptools_parse_stroid(struct snmp_toolinfo *snmptoolctx,
258 struct snmp_object *obj, char *argv)
260 char string[MAXSTR], *str;
262 struct asn_oid in_oid;
269 while (isalpha(*str) || *str == '_' || (i != 0 && isdigit(*str))) {
274 if (i <= 0 || i >= MAXSTR)
277 memset(&in_oid, 0, sizeof(struct asn_oid));
278 if ((str = snmp_parse_suboid((argv + i), &in_oid)) == NULL) {
279 warnx("Invalid OID - %s", argv);
283 strlcpy(string, argv, i + 1);
284 if (snmp_lookup_oidall(snmptoolctx, obj, string) < 0) {
285 warnx("No entry for %s in mapping lists", string);
289 /* If OID given on command line append it. */
291 asn_append_oid(&(obj->val.var), &in_oid);
292 else if (*str == '[') {
293 if ((str = snmp_parse_index(snmptoolctx, str + 1, obj)) == NULL)
295 } else if (obj->val.syntax > 0 && GET_PDUTYPE(snmptoolctx) ==
297 if (snmp_suboid_append(&(obj->val.var), (asn_subid_t) 0) < 0)
305 snmptools_parse_oid(struct snmp_toolinfo *snmptoolctx,
306 struct snmp_object *obj, char *argv)
311 if (ISSET_NUMERIC(snmptoolctx)) {
312 if (snmp_parse_numoid(argv, &(obj->val.var)) < 0)
315 if (snmptools_parse_stroid(snmptoolctx, obj, argv) == NULL &&
316 snmp_parse_numoid(argv, &(obj->val.var)) < 0)
324 snmptool_add_vbind(struct snmp_pdu *pdu, struct snmp_object *obj)
329 asn_append_oid(&(pdu->bindings[pdu->nbindings].var), &(obj->val.var));
332 return (pdu->nbindings);
335 /* *****************************************************************************
336 * bsnmpget private functions.
339 snmpget_verify_vbind(struct snmp_toolinfo *snmptoolctx, struct snmp_pdu *pdu,
340 struct snmp_object *obj)
342 if (pdu->version == SNMP_V1 && obj->val.syntax ==
343 SNMP_SYNTAX_COUNTER64) {
344 warnx("64-bit counters are not supported in SNMPv1 PDU");
348 if (ISSET_NUMERIC(snmptoolctx) || pdu->type == SNMP_PDU_GETNEXT ||
349 pdu->type == SNMP_PDU_GETBULK)
352 if (pdu->type == SNMP_PDU_GET && obj->val.syntax == SNMP_SYNTAX_NULL) {
353 warnx("Only leaf object values can be added to GET PDU");
361 * In case of a getbulk PDU, the error_status and error_index fields are used by
362 * libbsnmp to hold the values of the non-repeaters and max-repetitions fields
363 * that are present only in the getbulk - so before sending the PDU make sure
364 * these have correct values as well.
367 snmpget_fix_getbulk(struct snmp_pdu *pdu, uint32_t max_rep, uint32_t non_rep)
371 if (pdu->nbindings < non_rep)
372 pdu->error_status = pdu->nbindings;
374 pdu->error_status = non_rep;
377 pdu->error_index = max_rep;
379 pdu->error_index = 1;
383 snmptool_get(struct snmp_toolinfo *snmptoolctx)
385 struct snmp_pdu req, resp;
387 snmp_pdu_create(&req, GET_PDUTYPE(snmptoolctx));
389 while ((snmp_pdu_add_bindings(snmptoolctx, snmpget_verify_vbind,
390 snmptool_add_vbind, &req, SNMP_MAX_BINDINGS)) > 0) {
392 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK)
393 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
394 GET_NONREP(snmptoolctx));
396 if (snmp_dialog(&req, &resp) == -1) {
401 if (snmp_parse_resp(&resp, &req) >= 0) {
402 snmp_output_resp(snmptoolctx, &resp, NULL);
403 snmp_pdu_free(&resp);
407 snmp_output_err_resp(snmptoolctx, &resp);
408 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK ||
409 !ISSET_RETRY(snmptoolctx)) {
410 snmp_pdu_free(&resp);
415 * Loop through the object list and set object->error to the
416 * varbinding that caused the error.
418 if (snmp_object_seterror(snmptoolctx,
419 &(resp.bindings[resp.error_index - 1]),
420 resp.error_status) <= 0) {
421 snmp_pdu_free(&resp);
425 fprintf(stderr, "Retrying...\n");
426 snmp_pdu_free(&resp);
427 snmp_pdu_create(&req, GET_PDUTYPE(snmptoolctx));
436 /* *****************************************************************************
437 * bsnmpwalk private functions.
439 /* The default tree to walk. */
440 static const struct asn_oid snmp_mibII_OID = {
441 6 , { 1, 3, 6, 1, 2, 1 }
445 snmpwalk_add_default(struct snmp_toolinfo *snmptoolctx __unused,
446 struct snmp_object *obj, char *string __unused)
448 asn_append_oid(&(obj->val.var), &snmp_mibII_OID);
453 * Prepare the next GetNext/Get PDU to send.
456 snmpwalk_nextpdu_create(uint32_t op, struct asn_oid *var, struct snmp_pdu *pdu)
458 snmp_pdu_create(pdu, op);
459 asn_append_oid(&(pdu->bindings[0].var), var);
464 snmptool_walk(struct snmp_toolinfo *snmptoolctx)
466 struct snmp_pdu req, resp;
467 struct asn_oid root; /* Keep the initial oid. */
471 if (GET_PDUTYPE(snmptoolctx) == SNMP_PDU_GETBULK)
472 op = SNMP_PDU_GETBULK;
474 op = SNMP_PDU_GETNEXT;
476 snmp_pdu_create(&req, op);
478 while ((rc = snmp_pdu_add_bindings(snmptoolctx, NULL,
479 snmptool_add_vbind, &req, 1)) > 0) {
481 /* Remember the root where the walk started from. */
482 memset(&root, 0, sizeof(struct asn_oid));
483 asn_append_oid(&root, &(req.bindings[0].var));
485 if (op == SNMP_PDU_GETBULK)
486 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
487 GET_NONREP(snmptoolctx));
490 while (snmp_dialog(&req, &resp) >= 0) {
491 if ((snmp_parse_resp(&resp, &req)) < 0) {
492 snmp_output_err_resp(snmptoolctx, &resp);
493 snmp_pdu_free(&resp);
498 rc = snmp_output_resp(snmptoolctx, &resp, &root);
500 snmp_pdu_free(&resp);
507 if ((u_int)rc < resp.nbindings) {
508 snmp_pdu_free(&resp);
512 snmpwalk_nextpdu_create(op,
513 &(resp.bindings[resp.nbindings - 1].var), &req);
514 if (op == SNMP_PDU_GETBULK)
515 snmpget_fix_getbulk(&req, GET_MAXREP(snmptoolctx),
516 GET_NONREP(snmptoolctx));
517 snmp_pdu_free(&resp);
520 /* Just in case our root was a leaf. */
522 snmpwalk_nextpdu_create(SNMP_PDU_GET, &root, &req);
523 if (snmp_dialog(&req, &resp) == SNMP_CODE_OK) {
524 if (snmp_parse_resp(&resp, &req) < 0)
525 snmp_output_err_resp(snmptoolctx, &resp);
527 snmp_output_resp(snmptoolctx, &resp,
529 snmp_pdu_free(&resp);
534 if (snmp_object_remove(snmptoolctx, &root) < 0) {
535 warnx("snmp_object_remove");
540 snmp_pdu_create(&req, op);
551 /* *****************************************************************************
552 * bsnmpset private functions.
556 parse_oid_numeric(struct snmp_value *value, char *val)
565 suboid = strtoul(val, &endptr, 10);
567 warn("Value %s not supported", val);
572 if ((asn_subid_t) suboid > ASN_MAXID) {
573 warnx("Suboid %u > ASN_MAXID", suboid);
576 if (snmp_suboid_append(&(value->v.oid), suboid) < 0)
579 } while (*endptr == '.');
582 warnx("OID value %s not supported", val);
584 value->syntax = SNMP_SYNTAX_OID;
589 * Allow OID leaf in both forms:
590 * 1) 1.3.6.1.2... -> in such case call directly the function reading raw OIDs;
591 * 2) begemotSnmpdAgentFreeBSD -> lookup the ASN OID corresponding to that.
594 parse_oid_string(struct snmp_toolinfo *snmptoolctx,
595 struct snmp_value *value, char *string)
597 struct snmp_object obj;
599 if (isdigit(string[0]))
600 return (parse_oid_numeric(value, string));
602 memset(&obj, 0, sizeof(struct snmp_object));
603 if (snmp_lookup_enumoid(snmptoolctx, &obj, string) < 0) {
604 warnx("Unknown OID enum string - %s", string);
608 asn_append_oid(&(value->v.oid), &(obj.val.var));
613 parse_ip(struct snmp_value * value, char * val)
620 for (i = 0; i < 4; i++) {
621 v = strtoul(str, &endptr, 10);
624 if (*endptr != '.' && *endptr != '\0' && i != 3)
627 value->v.ipaddress[i] = (uint8_t) v;
629 value->syntax = SNMP_SYNTAX_IPADDRESS;
635 parse_int(struct snmp_value *value, char *val)
638 int32_t v, saved_errno;
643 v = strtol(val, &endptr, 10);
646 warn("Value %s not supported", val);
651 value->syntax = SNMP_SYNTAX_INTEGER;
652 value->v.integer = v;
659 parse_int_string(struct snmp_object *object, char *val)
664 return ((parse_int(&(object->val), val)));
666 if (object->info == NULL) {
667 warnx("Unknown enumerated integer type - %s", val);
670 if ((v = enum_number_lookup(object->info->snmp_enum, val)) < 0)
671 warnx("Unknown enumerated integer type - %s", val);
673 object->val.v.integer = v;
678 * Here syntax may be one of SNMP_SYNTAX_COUNTER, SNMP_SYNTAX_GAUGE,
679 * SNMP_SYNTAX_TIMETICKS.
682 parse_uint(struct snmp_value *value, char *val)
691 v = strtoul(val, &endptr, 10);
694 warn("Value %s not supported", val);
706 parse_ticks(struct snmp_value *value, char *val)
708 if (parse_uint(value, val) < 0)
711 value->syntax = SNMP_SYNTAX_TIMETICKS;
716 parse_gauge(struct snmp_value *value, char *val)
718 if (parse_uint(value, val) < 0)
721 value->syntax = SNMP_SYNTAX_GAUGE;
726 parse_counter(struct snmp_value *value, char *val)
728 if (parse_uint(value, val) < 0)
731 value->syntax = SNMP_SYNTAX_COUNTER;
736 parse_uint64(struct snmp_value *value, char *val)
745 v = strtoull(val, &endptr, 10);
748 warnx("Value %s not supported", val);
753 value->syntax = SNMP_SYNTAX_COUNTER64;
754 value->v.counter64 = v;
761 parse_syntax_val(struct snmp_value *value, enum snmp_syntax syntax, char *val)
764 case SNMP_SYNTAX_INTEGER:
765 return (parse_int(value, val));
766 case SNMP_SYNTAX_IPADDRESS:
767 return (parse_ip(value, val));
768 case SNMP_SYNTAX_COUNTER:
769 return (parse_counter(value, val));
770 case SNMP_SYNTAX_GAUGE:
771 return (parse_gauge(value, val));
772 case SNMP_SYNTAX_TIMETICKS:
773 return (parse_ticks(value, val));
774 case SNMP_SYNTAX_COUNTER64:
775 return (parse_uint64(value, val));
776 case SNMP_SYNTAX_OCTETSTRING:
777 return (snmp_tc2oct(SNMP_STRING, value, val));
778 case SNMP_SYNTAX_OID:
779 return (parse_oid_numeric(value, val));
789 * Parse a command line argument of type OID=syntax:value and fill in whatever
790 * fields can be derived from the input into snmp_value structure. Reads numeric
794 parse_pair_numoid_val(char *str, struct snmp_value *snmp_val)
798 enum snmp_syntax syntax;
799 char oid_str[ASN_OIDSTRLEN];
802 for (cnt = 0; cnt < ASN_OIDSTRLEN; cnt++)
806 if (cnt >= ASN_OIDSTRLEN) {
807 warnx("OID too long - %s", str);
810 strlcpy(oid_str, ptr, (size_t) (cnt + 1));
813 for (cnt = 0; cnt < MAX_CMD_SYNTAX_LEN; cnt++)
817 if (cnt >= MAX_CMD_SYNTAX_LEN) {
818 warnx("Unknown syntax in OID - %s", str);
822 if ((syntax = parse_syntax(ptr)) <= SNMP_SYNTAX_NULL) {
823 warnx("Unknown syntax in OID - %s", ptr);
828 for (cnt = 0; cnt < MAX_OCTSTRING_LEN; cnt++)
829 if (ptr[cnt] == '\0')
832 if (ptr[cnt] != '\0') {
833 warnx("Value string too long - %s", ptr);
838 * Here try parsing the OIDs and syntaxes and then check values - have
839 * to know syntax to check value boundaries.
841 if (snmp_parse_numoid(oid_str, &(snmp_val->var)) < 0) {
842 warnx("Error parsing OID %s", oid_str);
846 if (parse_syntax_val(snmp_val, syntax, ptr) < 0)
853 parse_syntax_strval(struct snmp_toolinfo *snmptoolctx,
854 struct snmp_object *object, char *str)
857 enum snmp_syntax syn;
860 * Syntax string here not required - still may be present.
863 if (GET_OUTPUT(snmptoolctx) == OUTPUT_VERBOSE) {
864 for (len = 0 ; *(str + len) != ':'; len++) {
865 if (*(str + len) == '\0') {
866 warnx("Syntax missing in value - %s", str);
870 if ((syn = parse_syntax(str)) <= SNMP_SYNTAX_NULL) {
871 warnx("Unknown syntax in - %s", str);
874 if (syn != object->val.syntax) {
875 if (!ISSET_ERRIGNORE(snmptoolctx)) {
876 warnx("Bad syntax in - %s", str);
879 object->val.syntax = syn;
885 switch (object->val.syntax) {
886 case SNMP_SYNTAX_INTEGER:
887 return (parse_int_string(object, str + len));
888 case SNMP_SYNTAX_IPADDRESS:
889 return (parse_ip(&(object->val), str + len));
890 case SNMP_SYNTAX_COUNTER:
891 return (parse_counter(&(object->val), str + len));
892 case SNMP_SYNTAX_GAUGE:
893 return (parse_gauge(&(object->val), str + len));
894 case SNMP_SYNTAX_TIMETICKS:
895 return (parse_ticks(&(object->val), str + len));
896 case SNMP_SYNTAX_COUNTER64:
897 return (parse_uint64(&(object->val), str + len));
898 case SNMP_SYNTAX_OCTETSTRING:
899 return (snmp_tc2oct(object->info->tc, &(object->val),
901 case SNMP_SYNTAX_OID:
902 return (parse_oid_string(snmptoolctx, &(object->val),
913 parse_pair_stroid_val(struct snmp_toolinfo *snmptoolctx,
914 struct snmp_object *obj, char *argv)
918 if ((ptr = snmptools_parse_stroid(snmptoolctx, obj, argv)) == NULL)
922 warnx("Value to set expected after OID");
926 if (parse_syntax_strval(snmptoolctx, obj, ptr + 1) < 0)
934 snmpset_parse_oid(struct snmp_toolinfo *snmptoolctx,
935 struct snmp_object *obj, char *argv)
940 if (ISSET_NUMERIC(snmptoolctx)) {
941 if (parse_pair_numoid_val(argv, &(obj->val)) < 0)
944 if (parse_pair_stroid_val(snmptoolctx, obj, argv) < 0)
952 add_ip_syntax(struct snmp_value *dst, struct snmp_value *src)
956 dst->syntax = SNMP_SYNTAX_IPADDRESS;
957 for (i = 0; i < 4; i++)
958 dst->v.ipaddress[i] = src->v.ipaddress[i];
964 add_octstring_syntax(struct snmp_value *dst, struct snmp_value *src)
966 if (src->v.octetstring.len > ASN_MAXOCTETSTRING) {
967 warnx("OctetString len too big - %u", src->v.octetstring.len);
971 if ((dst->v.octetstring.octets = malloc(src->v.octetstring.len)) ==
973 syslog(LOG_ERR, "malloc() failed - %s", strerror(errno));
977 memcpy(dst->v.octetstring.octets, src->v.octetstring.octets,
978 src->v.octetstring.len);
979 dst->syntax = SNMP_SYNTAX_OCTETSTRING;
980 dst->v.octetstring.len = src->v.octetstring.len;
986 add_oid_syntax(struct snmp_value *dst, struct snmp_value *src)
988 asn_append_oid(&(dst->v.oid), &(src->v.oid));
989 dst->syntax = SNMP_SYNTAX_OID;
994 * Check syntax - if one of SNMP_SYNTAX_NULL, SNMP_SYNTAX_NOSUCHOBJECT,
995 * SNMP_SYNTAX_NOSUCHINSTANCE, SNMP_SYNTAX_ENDOFMIBVIEW or anything not known -
999 snmpset_add_value(struct snmp_value *dst, struct snmp_value *src)
1001 if (dst == NULL || src == NULL)
1004 switch (src->syntax) {
1005 case SNMP_SYNTAX_INTEGER:
1006 dst->v.integer = src->v.integer;
1007 dst->syntax = SNMP_SYNTAX_INTEGER;
1009 case SNMP_SYNTAX_TIMETICKS:
1010 dst->v.uint32 = src->v.uint32;
1011 dst->syntax = SNMP_SYNTAX_TIMETICKS;
1013 case SNMP_SYNTAX_GAUGE:
1014 dst->v.uint32 = src->v.uint32;
1015 dst->syntax = SNMP_SYNTAX_GAUGE;
1017 case SNMP_SYNTAX_COUNTER:
1018 dst->v.uint32 = src->v.uint32;
1019 dst->syntax = SNMP_SYNTAX_COUNTER;
1021 case SNMP_SYNTAX_COUNTER64:
1022 dst->v.counter64 = src->v.counter64;
1023 dst->syntax = SNMP_SYNTAX_COUNTER64;
1025 case SNMP_SYNTAX_IPADDRESS:
1026 add_ip_syntax(dst, src);
1028 case SNMP_SYNTAX_OCTETSTRING:
1029 add_octstring_syntax(dst, src);
1031 case SNMP_SYNTAX_OID:
1032 add_oid_syntax(dst, src);
1035 warnx("Unknown syntax %d", src->syntax);
1043 snmpset_verify_vbind(struct snmp_toolinfo *snmptoolctx, struct snmp_pdu *pdu,
1044 struct snmp_object *obj)
1046 if (pdu->version == SNMP_V1 && obj->val.syntax ==
1047 SNMP_SYNTAX_COUNTER64) {
1048 warnx("64-bit counters are not supported in SNMPv1 PDU");
1052 if (ISSET_NUMERIC(snmptoolctx) || ISSET_ERRIGNORE(snmptoolctx))
1055 if (obj->info->access < SNMP_ACCESS_SET) {
1056 warnx("Object %s not accessible for set - try 'bsnmpset -a'",
1065 snmpset_add_vbind(struct snmp_pdu *pdu, struct snmp_object *obj)
1067 if (pdu->nbindings > SNMP_MAX_BINDINGS) {
1068 warnx("Too many OIDs for one PDU");
1075 if (snmpset_add_value(&(pdu->bindings[pdu->nbindings]), &(obj->val))
1079 asn_append_oid(&(pdu->bindings[pdu->nbindings].var), &(obj->val.var));
1082 return (pdu->nbindings);
1086 snmptool_set(struct snmp_toolinfo *snmptoolctx)
1088 struct snmp_pdu req, resp;
1090 snmp_pdu_create(&req, SNMP_PDU_SET);
1092 while ((snmp_pdu_add_bindings(snmptoolctx, snmpset_verify_vbind,
1093 snmpset_add_vbind, &req, SNMP_MAX_BINDINGS)) > 0) {
1094 if (snmp_dialog(&req, &resp)) {
1095 warn("Snmp dialog");
1099 if (snmp_pdu_check(&req, &resp) > 0) {
1100 if (GET_OUTPUT(snmptoolctx) != OUTPUT_QUIET)
1101 snmp_output_resp(snmptoolctx, &resp, NULL);
1102 snmp_pdu_free(&resp);
1106 snmp_output_err_resp(snmptoolctx, &resp);
1107 if (!ISSET_RETRY(snmptoolctx)) {
1108 snmp_pdu_free(&resp);
1112 if (snmp_object_seterror(snmptoolctx,
1113 &(resp.bindings[resp.error_index - 1]),
1114 resp.error_status) <= 0) {
1115 snmp_pdu_free(&resp);
1119 fprintf(stderr, "Retrying...\n");
1120 snmp_pdu_free(&req);
1121 snmp_pdu_create(&req, SNMP_PDU_SET);
1124 snmp_pdu_free(&req);
1129 /* *****************************************************************************
1133 * According to command line options prepare SNMP Get | GetNext | GetBulk PDU.
1134 * Wait for a response and print it.
1137 * Do a 'snmp walk' - according to command line options request for values
1138 * lexicographically subsequent and subrooted at a common node. Send a GetNext
1139 * PDU requesting the value for each next variable and print the response. Stop
1140 * when a Response PDU is received that contains the value of a variable not
1141 * subrooted at the variable the walk started.
1144 main(int argc, char ** argv)
1146 struct snmp_toolinfo snmptoolctx;
1147 int32_t oid_cnt, last_oid, opt_num;
1150 /* Make sure program_name is set and valid. */
1152 program_name = "snmptool";
1154 program_name = strrchr(*argv, '/');
1155 if (program_name != NULL)
1158 program_name = *argv;
1161 if (program_name == NULL) {
1162 fprintf(stderr, "Error: No program name?\n");
1164 } else if (strcmp(program_name, "bsnmpget") == 0)
1166 else if (strcmp(program_name, "bsnmpwalk") == 0)
1167 program = BSNMPWALK;
1168 else if (strcmp(program_name, "bsnmpset") == 0)
1171 fprintf(stderr, "Unknown snmp tool name '%s'.\n", program_name);
1176 if (snmptool_init(&snmptoolctx) < 0)
1179 if ((opt_num = snmptool_parse_options(&snmptoolctx, argc, argv)) < 0) {
1180 snmp_tool_freeall(&snmptoolctx);
1181 /* On -h (help) exit without error. */
1188 oid_cnt = argc - opt_num - 1;
1192 if (!ISSET_EDISCOVER(&snmptoolctx) &&
1193 !ISSET_LOCALKEY(&snmptoolctx)) {
1194 fprintf(stderr, "No OID given.\n");
1196 snmp_tool_freeall(&snmptoolctx);
1202 if (snmp_object_add(&snmptoolctx, snmpwalk_add_default,
1205 "Error setting default subtree.\n");
1206 snmp_tool_freeall(&snmptoolctx);
1212 fprintf(stderr, "No OID given.\n");
1214 snmp_tool_freeall(&snmptoolctx);
1219 if (snmp_import_all(&snmptoolctx) < 0) {
1220 snmp_tool_freeall(&snmptoolctx);
1224 /* A simple sanity check - can not send GETBULK when using SNMPv1. */
1225 if (program == BSNMPGET && snmp_client.version == SNMP_V1 &&
1226 GET_PDUTYPE(&snmptoolctx) == SNMP_PDU_GETBULK) {
1227 fprintf(stderr, "Cannot send GETBULK PDU with SNMPv1.\n");
1228 snmp_tool_freeall(&snmptoolctx);
1232 for (last_oid = argc - 1; oid_cnt > 0; last_oid--, oid_cnt--) {
1233 if ((snmp_object_add(&snmptoolctx, (program == BSNMPSET) ?
1234 snmpset_parse_oid : snmptools_parse_oid,
1235 argv[last_oid])) < 0) {
1236 fprintf(stderr, "Error parsing OID string '%s'.\n",
1238 snmp_tool_freeall(&snmptoolctx);
1243 if (snmp_open(NULL, NULL, NULL, NULL)) {
1244 warn("Failed to open snmp session");
1245 snmp_tool_freeall(&snmptoolctx);
1249 if (snmp_client.version == SNMP_V3 && snmp_client.engine.engine_len == 0)
1250 SET_EDISCOVER(&snmptoolctx);
1252 if (ISSET_EDISCOVER(&snmptoolctx) &&
1253 snmp_discover_engine(snmptoolctx.passwd) < 0) {
1254 warn("Unknown SNMP Engine ID");
1259 if (GET_OUTPUT(&snmptoolctx) == OUTPUT_VERBOSE ||
1260 ISSET_EDISCOVER(&snmptoolctx))
1261 snmp_output_engine();
1263 if (snmp_client.version == SNMP_V3 && ISSET_LOCALKEY(&snmptoolctx) &&
1264 !ISSET_EDISCOVER(&snmptoolctx)) {
1265 if (snmp_passwd_to_keys(&snmp_client.user,
1266 snmptoolctx.passwd) != SNMP_CODE_OK ||
1267 snmp_get_local_keys(&snmp_client.user,
1268 snmp_client.engine.engine_id,
1269 snmp_client.engine.engine_len) != SNMP_CODE_OK) {
1270 warn("Failed to get keys");
1276 if (GET_OUTPUT(&snmptoolctx) == OUTPUT_VERBOSE ||
1277 ISSET_EDISCOVER(&snmptoolctx))
1280 if (ISSET_EDISCOVER(&snmptoolctx) && snmptoolctx.objects == 0)
1285 rc = snmptool_get(&snmptoolctx);
1288 rc = snmptool_walk(&snmptoolctx);
1291 rc = snmptool_set(&snmptoolctx);
1297 snmp_tool_freeall(&snmptoolctx);