]> CyberLeo.Net >> Repos - FreeBSD/releng/9.2.git/blob - contrib/bsnmp/snmp_usm/usm_snmp.c
- Copy stable/9 to releng/9.2 as part of the 9.2-RELEASE cycle.
[FreeBSD/releng/9.2.git] / contrib / bsnmp / snmp_usm / usm_snmp.c
1 /*-
2  * Copyright (c) 2010 The FreeBSD Foundation
3  * All rights reserved.
4  *
5  * This software was developed by Shteryana Sotirova Shopova under
6  * sponsorship from the FreeBSD Foundation.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * $FreeBSD$
30  */
31 #include <sys/queue.h>
32 #include <sys/types.h>
33
34 #include <errno.h>
35 #include <stdarg.h>
36 #include <stdlib.h>
37 #include <stdio.h>
38 #include <stdint.h>
39 #include <string.h>
40 #include <syslog.h>
41
42 #include "asn1.h"
43 #include "snmp.h"
44 #include "snmpmod.h"
45
46 #include "usm_tree.h"
47 #include "usm_oid.h"
48
49 static struct lmodule *usm_module;
50 /* For the registration. */
51 static const struct asn_oid oid_usm = OIDX_snmpUsmMIB;
52
53 static const struct asn_oid oid_usmNoAuthProtocol = OIDX_usmNoAuthProtocol;
54 static const struct asn_oid oid_usmHMACMD5AuthProtocol =                \
55     OIDX_usmHMACMD5AuthProtocol;
56 static const struct asn_oid oid_usmHMACSHAAuthProtocol =                \
57     OIDX_usmHMACSHAAuthProtocol;
58
59 static const struct asn_oid oid_usmNoPrivProtocol = OIDX_usmNoPrivProtocol;
60 static const struct asn_oid oid_usmDESPrivProtocol = OIDX_usmDESPrivProtocol;
61 static const struct asn_oid oid_usmAesCfb128Protocol = OIDX_usmAesCfb128Protocol;
62
63 static const struct asn_oid oid_usmUserSecurityName = OIDX_usmUserSecurityName;
64
65 /* The registration. */
66 static uint reg_usm;
67
68 static int32_t usm_lock;
69
70 static struct usm_user *        usm_get_user(const struct asn_oid *, uint);
71 static struct usm_user *        usm_get_next_user(const struct asn_oid *, uint);
72 static void     usm_append_userindex(struct asn_oid *, uint,
73     const struct usm_user *);
74 static int      usm_user_index_decode(const struct asn_oid *, uint, uint8_t *,
75     uint32_t *, char *);
76
77 int
78 op_usm_stats(struct snmp_context *ctx __unused, struct snmp_value *val,
79     uint32_t sub __unused, uint32_t iidx __unused, enum snmp_op op)
80 {
81         struct snmpd_usmstat *usmstats;
82
83         if (op == SNMP_OP_SET)
84                 return (SNMP_ERR_NOT_WRITEABLE);
85
86         if ((usmstats = bsnmpd_get_usm_stats()) == NULL)
87                 return (SNMP_ERR_GENERR);
88
89         if (op == SNMP_OP_GET) {
90                 switch (val->var.subs[sub - 1]) {
91                 case LEAF_usmStatsUnsupportedSecLevels:
92                         val->v.uint32 = usmstats->unsupported_seclevels;
93                         break;
94                 case LEAF_usmStatsNotInTimeWindows:
95                         val->v.uint32 = usmstats->not_in_time_windows;
96                         break;
97                 case LEAF_usmStatsUnknownUserNames:
98                         val->v.uint32 = usmstats->unknown_users;
99                         break;
100                 case LEAF_usmStatsUnknownEngineIDs:
101                         val->v.uint32 = usmstats->unknown_engine_ids;
102                         break;
103                 case LEAF_usmStatsWrongDigests:
104                         val->v.uint32 = usmstats->wrong_digests;
105                         break;
106                 case LEAF_usmStatsDecryptionErrors:
107                         val->v.uint32 = usmstats->decrypt_errors;
108                         break;
109                 default:
110                         return (SNMP_ERR_NOSUCHNAME);
111                 }
112                 return (SNMP_ERR_NOERROR);
113         }
114         abort();
115 }
116
117 int
118 op_usm_lock(struct snmp_context *ctx __unused, struct snmp_value *val,
119     uint32_t sub, uint32_t iidx __unused, enum snmp_op op)
120 {
121         if (val->var.subs[sub - 1] != LEAF_usmUserSpinLock)
122                 return (SNMP_ERR_NOSUCHNAME);
123
124         switch (op) {
125         case SNMP_OP_GET:
126                 if (++usm_lock == INT32_MAX)
127                         usm_lock = 0;
128                 val->v.integer = usm_lock;
129                 break;
130         case SNMP_OP_GETNEXT:
131                 abort();
132         case SNMP_OP_SET:
133                 if (val->v.integer != usm_lock)
134                         return (SNMP_ERR_INCONS_VALUE);
135                 break;
136         case SNMP_OP_ROLLBACK:
137                 /* FALLTHROUGH */
138         case SNMP_OP_COMMIT:
139                 break;
140         }
141
142         return (SNMP_ERR_NOERROR);
143 }
144
145 int
146 op_usm_users(struct snmp_context *ctx, struct snmp_value *val,
147     uint32_t sub, uint32_t iidx __unused, enum snmp_op op)
148 {
149         uint32_t elen;
150         struct usm_user *uuser, *clone;
151         char uname[SNMP_ADM_STR32_SIZ];
152         uint8_t eid[SNMP_ENGINE_ID_SIZ];
153
154         switch (op) {
155         case SNMP_OP_GET:
156                 if ((uuser = usm_get_user(&val->var, sub)) == NULL)
157                         return (SNMP_ERR_NOSUCHNAME);
158                 break;
159
160         case SNMP_OP_GETNEXT:
161                 if ((uuser = usm_get_next_user(&val->var, sub)) == NULL)
162                         return (SNMP_ERR_NOSUCHNAME);
163                 usm_append_userindex(&val->var, sub, uuser);
164                 break;
165
166         case SNMP_OP_SET:
167                 if ((uuser = usm_get_user(&val->var, sub)) == NULL &&
168                     val->var.subs[sub - 1] != LEAF_usmUserStatus &&
169                     val->var.subs[sub - 1] != LEAF_usmUserCloneFrom)
170                                 return (SNMP_ERR_NOSUCHNAME);
171
172                 if (community != COMM_INITIALIZE &&
173                     uuser->type == StorageType_readOnly)
174                         return (SNMP_ERR_NOT_WRITEABLE);
175
176                 switch (val->var.subs[sub - 1]) {
177                 case LEAF_usmUserSecurityName:
178                         return (SNMP_ERR_NOT_WRITEABLE);
179
180                 case LEAF_usmUserCloneFrom:
181                         if (uuser != NULL || usm_user_index_decode(&val->var,
182                             sub, eid, &elen, uname) < 0 || 
183                             !(asn_is_suboid(&oid_usmUserSecurityName, &val->v.oid)))
184                                 return (SNMP_ERR_WRONG_VALUE);
185                         if ((clone = usm_get_user(&val->v.oid, sub)) == NULL)
186                                 return (SNMP_ERR_INCONS_VALUE);
187                         if ((uuser = usm_new_user(eid, elen, uname)) == NULL)
188                                 return (SNMP_ERR_GENERR);
189                         uuser->status = RowStatus_notReady;
190                         if (community != COMM_INITIALIZE)
191                                 uuser->type = StorageType_volatile;
192                         else
193                                 uuser->type = StorageType_readOnly;
194
195                         uuser->suser.auth_proto = clone->suser.auth_proto;
196                         uuser->suser.priv_proto = clone->suser.priv_proto;
197                         memcpy(uuser->suser.auth_key, clone->suser.auth_key,
198                             sizeof(uuser->suser.auth_key));
199                         memcpy(uuser->suser.priv_key, clone->suser.priv_key,
200                             sizeof(uuser->suser.priv_key));
201                         ctx->scratch->int1 = RowStatus_createAndWait;
202                         break;
203
204                 case LEAF_usmUserAuthProtocol:
205                         ctx->scratch->int1 = uuser->suser.auth_proto;
206                         if (asn_compare_oid(&oid_usmNoAuthProtocol,
207                             &val->v.oid) == 0)
208                                 uuser->suser.auth_proto = SNMP_AUTH_NOAUTH;
209                         else if (asn_compare_oid(&oid_usmHMACMD5AuthProtocol,
210                             &val->v.oid) == 0)
211                                 uuser->suser.auth_proto = SNMP_AUTH_HMAC_MD5;
212                         else if (asn_compare_oid(&oid_usmHMACSHAAuthProtocol,
213                             &val->v.oid) == 0)
214                                 uuser->suser.auth_proto = SNMP_AUTH_HMAC_SHA;
215                         else
216                                 return (SNMP_ERR_WRONG_VALUE);
217                         break;
218
219                 case LEAF_usmUserAuthKeyChange:
220                 case LEAF_usmUserOwnAuthKeyChange:
221                         if (val->var.subs[sub - 1] ==
222                             LEAF_usmUserOwnAuthKeyChange &&
223                             (usm_user == NULL || strcmp(uuser->suser.sec_name,
224                             usm_user->suser.sec_name) != 0))
225                                 return (SNMP_ERR_NO_ACCESS);
226                         if (val->v.octetstring.len > SNMP_AUTH_KEY_SIZ)
227                                 return (SNMP_ERR_INCONS_VALUE);
228                         ctx->scratch->ptr1 = malloc(SNMP_AUTH_KEY_SIZ);
229                         if (ctx->scratch->ptr1 == NULL)
230                                 return (SNMP_ERR_GENERR);
231                         memcpy(ctx->scratch->ptr1, uuser->suser.auth_key,
232                             SNMP_AUTH_KEY_SIZ);
233                         memcpy(uuser->suser.auth_key, val->v.octetstring.octets,
234                             val->v.octetstring.len);
235                         break;
236
237                 case LEAF_usmUserPrivProtocol:
238                         ctx->scratch->int1 = uuser->suser.priv_proto;
239                         if (asn_compare_oid(&oid_usmNoPrivProtocol,
240                             &val->v.oid) == 0)
241                                 uuser->suser.priv_proto = SNMP_PRIV_NOPRIV;
242                         else if (asn_compare_oid(&oid_usmDESPrivProtocol,
243                             &val->v.oid) == 0)
244                                 uuser->suser.priv_proto = SNMP_PRIV_DES;
245                         else if (asn_compare_oid(&oid_usmAesCfb128Protocol,
246                             &val->v.oid) == 0)
247                                 uuser->suser.priv_proto = SNMP_PRIV_AES;
248                         else
249                                 return (SNMP_ERR_WRONG_VALUE);
250                         break;
251
252                 case LEAF_usmUserPrivKeyChange:
253                 case LEAF_usmUserOwnPrivKeyChange:
254                         if (val->var.subs[sub - 1] ==
255                             LEAF_usmUserOwnPrivKeyChange &&
256                             (usm_user == NULL || strcmp(uuser->suser.sec_name,
257                             usm_user->suser.sec_name) != 0))
258                                 return (SNMP_ERR_NO_ACCESS);
259                         if (val->v.octetstring.len > SNMP_PRIV_KEY_SIZ)
260                                 return (SNMP_ERR_INCONS_VALUE);
261                         ctx->scratch->ptr1 = malloc(SNMP_PRIV_KEY_SIZ);
262                         if (ctx->scratch->ptr1 == NULL)
263                                 return (SNMP_ERR_GENERR);
264                         memcpy(ctx->scratch->ptr1, uuser->suser.priv_key,
265                             SNMP_PRIV_KEY_SIZ);
266                         memcpy(uuser->suser.priv_key, val->v.octetstring.octets,
267                             val->v.octetstring.len);
268                         break;
269
270                 case LEAF_usmUserPublic:
271                         if (val->v.octetstring.len > SNMP_ADM_STR32_SIZ)
272                                 return (SNMP_ERR_INCONS_VALUE);
273                         if (uuser->user_public_len > 0) {
274                                 ctx->scratch->ptr2 =
275                                     malloc(uuser->user_public_len);
276                                 if (ctx->scratch->ptr2 == NULL)
277                                         return (SNMP_ERR_GENERR);
278                                 memcpy(ctx->scratch->ptr2, uuser->user_public,
279                                    uuser->user_public_len);
280                                 ctx->scratch->int2 = uuser->user_public_len;
281                         }
282                         if (val->v.octetstring.len > 0) {
283                                 memcpy(uuser->user_public,
284                                     val->v.octetstring.octets,
285                                     val->v.octetstring.len);
286                                 uuser->user_public_len = val->v.octetstring.len;
287                         } else {
288                                 memset(uuser->user_public, 0,
289                                     SNMP_ADM_STR32_SIZ);
290                                 uuser->user_public_len = 0;
291                         }
292                         break;
293
294                 case LEAF_usmUserStorageType:
295                         return (SNMP_ERR_INCONS_VALUE);
296
297                 case LEAF_usmUserStatus:
298                         if (uuser == NULL) {
299                                 if (val->v.integer != RowStatus_createAndWait ||
300                                     usm_user_index_decode(&val->var, sub, eid,
301                                     &elen, uname) < 0)
302                                         return (SNMP_ERR_INCONS_VALUE);
303                                 uuser = usm_new_user(eid, elen, uname);
304                                 if (uuser == NULL)
305                                         return (SNMP_ERR_GENERR);
306                                 uuser->status = RowStatus_notReady;
307                                 if (community != COMM_INITIALIZE)
308                                         uuser->type = StorageType_volatile;
309                                 else
310                                         uuser->type = StorageType_readOnly;
311                         } else if (val->v.integer != RowStatus_active &&
312                             val->v.integer != RowStatus_destroy)
313                                 return (SNMP_ERR_INCONS_VALUE);
314                         
315                         uuser->status = val->v.integer;
316                         break;
317                 }
318                 return (SNMP_ERR_NOERROR);
319
320         case SNMP_OP_COMMIT:
321                 switch (val->var.subs[sub - 1]) {
322                 case LEAF_usmUserAuthKeyChange:
323                 case LEAF_usmUserOwnAuthKeyChange:
324                 case LEAF_usmUserPrivKeyChange:
325                 case LEAF_usmUserOwnPrivKeyChange:
326                         free(ctx->scratch->ptr1);
327                         break;
328                 case LEAF_usmUserPublic:
329                         if (ctx->scratch->ptr2 != NULL)
330                                 free(ctx->scratch->ptr2);
331                         break;
332                 case LEAF_usmUserStatus:
333                         if (val->v.integer != RowStatus_destroy)
334                                 break;
335                         if ((uuser = usm_get_user(&val->var, sub)) == NULL)
336                                 return (SNMP_ERR_GENERR);
337                         usm_delete_user(uuser);
338                         break;
339                 default:
340                         break;
341                 }
342                 return (SNMP_ERR_NOERROR);
343
344         case SNMP_OP_ROLLBACK:
345                 if ((uuser = usm_get_user(&val->var, sub)) == NULL)
346                         return (SNMP_ERR_GENERR);
347                 switch (val->var.subs[sub - 1]) {
348                 case LEAF_usmUserAuthProtocol:
349                         uuser->suser.auth_proto = ctx->scratch->int1;
350                         break;
351                 case LEAF_usmUserAuthKeyChange:
352                 case LEAF_usmUserOwnAuthKeyChange:
353                         memcpy(uuser->suser.auth_key, ctx->scratch->ptr1,
354                             SNMP_AUTH_KEY_SIZ);
355                         free(ctx->scratch->ptr1);
356                         break;
357                 case LEAF_usmUserPrivProtocol:
358                         uuser->suser.priv_proto = ctx->scratch->int1;
359                         break;
360                 case LEAF_usmUserPrivKeyChange:
361                 case LEAF_usmUserOwnPrivKeyChange:
362                         memcpy(uuser->suser.priv_key, ctx->scratch->ptr1,
363                             SNMP_AUTH_KEY_SIZ);
364                         free(ctx->scratch->ptr1);
365                         break;
366                 case LEAF_usmUserPublic:
367                         if (ctx->scratch->ptr2 != NULL) {
368                                 memcpy(uuser->user_public, ctx->scratch->ptr2,
369                                    ctx->scratch->int2);
370                                 uuser->user_public_len = ctx->scratch->int2;
371                                 free(ctx->scratch->ptr2);
372                         } else {
373                                 memset(uuser->user_public, 0,
374                                     SNMP_ADM_STR32_SIZ);
375                                 uuser->user_public_len = 0;
376                         }
377                         break;
378                 case LEAF_usmUserCloneFrom:
379                 case LEAF_usmUserStatus:
380                         if (ctx->scratch->int1 == RowStatus_createAndWait)
381                                 usm_delete_user(uuser);
382                         break;
383                 default:
384                         break;  
385                 }
386                 return (SNMP_ERR_NOERROR);
387
388         default:
389                 abort();
390         }
391
392         switch (val->var.subs[sub - 1]) {
393         case LEAF_usmUserSecurityName:
394                 return (string_get(val, uuser->suser.sec_name, -1));
395         case LEAF_usmUserCloneFrom:
396                 memcpy(&val->v.oid, &oid_zeroDotZero, sizeof(oid_zeroDotZero));
397                 break;
398         case LEAF_usmUserAuthProtocol:
399                 switch (uuser->suser.auth_proto) {
400                 case SNMP_AUTH_HMAC_MD5:
401                         memcpy(&val->v.oid, &oid_usmHMACMD5AuthProtocol,
402                             sizeof(oid_usmHMACMD5AuthProtocol));
403                         break;
404                 case SNMP_AUTH_HMAC_SHA:
405                         memcpy(&val->v.oid, &oid_usmHMACSHAAuthProtocol,
406                             sizeof(oid_usmHMACSHAAuthProtocol));
407                         break;
408                 default:
409                         memcpy(&val->v.oid, &oid_usmNoAuthProtocol,
410                             sizeof(oid_usmNoAuthProtocol));
411                         break;
412                 }
413                 break;
414         case LEAF_usmUserAuthKeyChange:
415         case LEAF_usmUserOwnAuthKeyChange:
416                 return (string_get(val, (char *)uuser->suser.auth_key, 0));
417         case LEAF_usmUserPrivProtocol:
418                 switch (uuser->suser.priv_proto) {
419                 case SNMP_PRIV_DES:
420                         memcpy(&val->v.oid, &oid_usmDESPrivProtocol,
421                             sizeof(oid_usmDESPrivProtocol));
422                         break;
423                 case SNMP_PRIV_AES:
424                         memcpy(&val->v.oid, &oid_usmAesCfb128Protocol,
425                             sizeof(oid_usmAesCfb128Protocol));
426                         break;
427                 default:
428                         memcpy(&val->v.oid, &oid_usmNoPrivProtocol,
429                             sizeof(oid_usmNoPrivProtocol));
430                         break;
431                 }
432                 break;
433         case LEAF_usmUserPrivKeyChange:
434         case LEAF_usmUserOwnPrivKeyChange:
435                 return (string_get(val, (char *)uuser->suser.priv_key, 0));
436         case LEAF_usmUserPublic:
437                 return (string_get(val, uuser->user_public,
438                     uuser->user_public_len));
439         case LEAF_usmUserStorageType:
440                 val->v.integer = uuser->type;
441                 break;
442         case LEAF_usmUserStatus:
443                 val->v.integer = uuser->status;
444                 break;
445         }
446
447         return (SNMP_ERR_NOERROR);
448 }
449
450 static int
451 usm_user_index_decode(const struct asn_oid *oid, uint sub, uint8_t *engine,
452     uint32_t *elen, char *uname)
453 {
454         uint32_t i, nlen;
455         int uname_off;
456
457         if (oid->subs[sub] > SNMP_ENGINE_ID_SIZ)
458                 return (-1);
459
460         for (i = 0; i < oid->subs[sub]; i++)
461                 engine[i] = oid->subs[sub + i + 1];
462         *elen = i;
463
464         uname_off = sub + oid->subs[sub] + 1;
465         if ((nlen = oid->subs[uname_off]) >= SNMP_ADM_STR32_SIZ)
466                 return (-1);
467
468         for (i = 0; i < nlen; i++)
469                 uname[i] = oid->subs[uname_off + i + 1];
470         uname[nlen] = '\0';
471
472         return (0);
473 }
474
475 static void
476 usm_append_userindex(struct asn_oid *oid, uint sub,
477     const struct usm_user *uuser)
478 {
479         uint32_t i;
480
481         oid->len = sub + uuser->user_engine_len + strlen(uuser->suser.sec_name);
482         oid->len += 2;
483         oid->subs[sub] = uuser->user_engine_len;
484         for (i = 1; i < uuser->user_engine_len + 1; i++)
485                 oid->subs[sub + i] = uuser->user_engine_id[i - 1];
486
487         sub += uuser->user_engine_len + 1;
488         oid->subs[sub] = strlen(uuser->suser.sec_name);
489         for (i = 1; i <= oid->subs[sub]; i++)
490                 oid->subs[sub + i] = uuser->suser.sec_name[i - 1];
491 }
492
493 static struct usm_user *
494 usm_get_user(const struct asn_oid *oid, uint sub)
495 {
496         uint32_t enginelen;
497         char username[SNMP_ADM_STR32_SIZ];
498         uint8_t engineid[SNMP_ENGINE_ID_SIZ];
499
500         if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0)
501                 return (NULL);
502
503         return (usm_find_user(engineid, enginelen, username));
504 }
505
506 static struct usm_user *
507 usm_get_next_user(const struct asn_oid *oid, uint sub)
508 {
509         uint32_t enginelen;
510         char username[SNMP_ADM_STR32_SIZ];
511         uint8_t engineid[SNMP_ENGINE_ID_SIZ];
512         struct usm_user *uuser;
513
514         if (oid->len - sub == 0)
515                 return (usm_first_user());
516
517         if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0)
518                 return (NULL);
519
520         if ((uuser = usm_find_user(engineid, enginelen, username)) != NULL)
521                 return (usm_next_user(uuser));
522
523         return (NULL);
524 }
525
526 /*
527  * USM snmp module initialization hook.
528  * Returns 0 on success, < 0 on error.
529  */
530 static int
531 usm_init(struct lmodule * mod, int argc __unused, char *argv[] __unused)
532 {
533         usm_module = mod;
534         usm_lock = random();
535         bsnmpd_reset_usm_stats();
536         return (0);
537 }
538
539 /*
540  * USM snmp module finalization hook.
541  */
542 static int
543 usm_fini(void)
544 {
545         usm_flush_users();
546         or_unregister(reg_usm);
547
548         return (0);
549 }
550
551 /*
552  * USM snmp module start operation.
553  */
554 static void
555 usm_start(void)
556 {
557         reg_usm = or_register(&oid_usm,
558             "The MIB module for managing SNMP User-Based Security Model.",
559             usm_module);
560 }
561
562 static void
563 usm_dump(void)
564 {
565         struct usm_user *uuser;
566         struct snmpd_usmstat *usmstats;
567         const char *const authstr[] = {
568                 "noauth",
569                 "md5",
570                 "sha",
571                 NULL
572         };
573         const char *const privstr[] = {
574                 "nopriv",
575                 "des",
576                 "aes",
577                 NULL
578         };
579
580         if ((usmstats = bsnmpd_get_usm_stats()) != NULL) {
581                 syslog(LOG_ERR, "UnsupportedSecLevels\t\t%u",
582                     usmstats->unsupported_seclevels);
583                 syslog(LOG_ERR, "NotInTimeWindows\t\t%u",
584                     usmstats->not_in_time_windows);
585                 syslog(LOG_ERR, "UnknownUserNames\t\t%u",
586                     usmstats->unknown_users);
587                 syslog(LOG_ERR, "UnknownEngineIDs\t\t%u",
588                     usmstats->unknown_engine_ids);
589                 syslog(LOG_ERR, "WrongDigests\t\t%u",
590                     usmstats->wrong_digests);
591                 syslog(LOG_ERR, "DecryptionErrors\t\t%u",
592                     usmstats->decrypt_errors);
593         }
594
595         syslog(LOG_ERR, "USM users");
596         for (uuser = usm_first_user(); uuser != NULL;
597             (uuser = usm_next_user(uuser)))
598                 syslog(LOG_ERR, "user %s\t\t%s, %s", uuser->suser.sec_name,
599                     authstr[uuser->suser.auth_proto],
600                     privstr[uuser->suser.priv_proto]);
601 }
602
603 const char usm_comment[] = \
604 "This module implements SNMP User-based Security Model defined in RFC 3414.";
605
606 const struct snmp_module config = {
607         .comment =      usm_comment,
608         .init =         usm_init,
609         .fini =         usm_fini,
610         .start =        usm_start,
611         .tree =         usm_ctree,
612         .dump =         usm_dump,
613         .tree_size =    usm_CTREE_SIZE,
614 };