X-Git-Url: http://git.rot13.org/?a=blobdiff_plain;f=userapps%2Fopensource%2Fnet-snmp%2Fagent%2Fmibgroup%2Fsmux%2Fsnmp_bgp.c;fp=userapps%2Fopensource%2Fnet-snmp%2Fagent%2Fmibgroup%2Fsmux%2Fsnmp_bgp.c;h=9d37d43baedc3f3e48d6d8c7fdbfd098c32fba3d;hb=9dffd9f7659a1b28265e0dc9497343eb3d108d02;hp=0000000000000000000000000000000000000000;hpb=e48c2529a5a7e7dbf1797bb6d1bf964bc03e78a7;p=bcm963xx.git diff --git a/userapps/opensource/net-snmp/agent/mibgroup/smux/snmp_bgp.c b/userapps/opensource/net-snmp/agent/mibgroup/smux/snmp_bgp.c new file mode 100644 index 00000000..9d37d43b --- /dev/null +++ b/userapps/opensource/net-snmp/agent/mibgroup/smux/snmp_bgp.c @@ -0,0 +1,187 @@ +/* + * $Id: snmp_bgp.c,v 5.0 2002/04/20 07:30:06 hardaker Exp $ + */ + +/* + * Smux module authored by Rohit Dube. + */ + +#include + +#include +#if HAVE_STDLIB_H +#include +#endif +#if HAVE_STRING_H +#include +#else +#include +#endif +#if HAVE_UNISTD_H +#include +#endif +#if HAVE_ERR_H +#include +#endif +#if TIME_WITH_SYS_TIME +# include +# include +#else +# if HAVE_SYS_TIME_H +# include +# else +# include +# endif +#endif +#include +#include + +#include +#include +#if HAVE_SYS_FILIO_H +#include +#endif + +#if HAVE_NETINET_IN_H +#include +#endif + +#include +#include +#include "smux.h" +#include "snmp_bgp.h" + +struct variable13 bgp_variables[] = { + {BGPVERSION, ASN_OCTET_STR, RONLY, var_bgp, 1, {1}}, + {BGPLOCALAS, ASN_INTEGER, RONLY, var_bgp, 1, {2}}, + {BGPIDENTIFIER, ASN_IPADDRESS, RONLY, var_bgp, 1, {4}}, + {BGPPEERIDENTIFIER, ASN_IPADDRESS, RONLY, var_bgp, 3, {3, 1, 1}}, + {BGPPEERSTATE, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 2}}, + {BGPPEERADMINSTATUS, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 3}}, + {BGPPEERNEGOTIATEDVERSION, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 4}}, + {BGPPEERLOCALADDR, ASN_IPADDRESS, RONLY, var_bgp, 3, {3, 1, 5}}, + {BGPPEERLOCALPORT, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 6}}, + {BGPPEERREMOTEADDR, ASN_IPADDRESS, RONLY, var_bgp, 3, {3, 1, 7}}, + {BGPPEERREMOTEPORT, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 8}}, + {BGPPEERREMOTEAS, ASN_INTEGER, RONLY, var_bgp, 3, {3, 1, 9}}, + {BGPPEERINUPDATES, ASN_COUNTER, RONLY, var_bgp, 3, {3, 1, 10}}, + {BGPPEEROUTUPDATES, ASN_COUNTER, RONLY, var_bgp, 3, {3, 1, 11}}, + {BGPPEERINTOTALMESSAGES, ASN_COUNTER, RONLY, var_bgp, 3, {3, 1, 12}}, + {BGPPEEROUTTOTALMESSAGES, ASN_COUNTER, RONLY, var_bgp, 3, {3, 1, 13}}, + {BGPPEERLASTERROR, ASN_OCTET_STR, RONLY, var_bgp, 3, {3, 1, 14}}, + {BGPPATHATTRPEER, ASN_IPADDRESS, RONLY, var_bgp, 3, {5, 1, 1}}, + {BGPPATHATTRDESTNETWORK, ASN_IPADDRESS, RONLY, var_bgp, 3, {5, 1, 2}}, + {BGPPATHATTRORIGIN, ASN_INTEGER, RONLY, var_bgp, 3, {5, 1, 3}}, + {BGPPATHATTRASPATH, ASN_OCTET_STR, RONLY, var_bgp, 3, {5, 1, 4}}, + {BGPPATHATTRNEXTHOP, ASN_INTEGER, RONLY, var_bgp, 3, {5, 1, 5}}, + {BGPPATHATTRINTERASMETRIC, ASN_OCTET_STR, RONLY, var_bgp, 3, {5, 1, 6}} +}; + +oid bgp_variables_oid[] = { MIB, 15 }; + +void +init_snmp_bdp(void) +{ + REGISTER_MIB("smux/snmp_bgp", bgp_variables, variable13, + bgp_variables_oid); +} + + +#endif +static oid max_bgp_mib[] = + { 1, 3, 6, 1, 2, 1, 15, 5, 1, 6, 255, 255, 255, 255 }; +static oid min_bgp_mib[] = { 1, 3, 6, 1, 2, 1, 15, 1, 0 }; +extern u_char smux_type; + +u_char * +var_bgp(struct variable *vp, + oid * name, + int *length, int exact, int *var_len, WriteMethod ** write_method) +{ + u_char *var; + int result; + + DEBUGMSGTL(("smux/snmp_bgp", + "[var_bgp] var len %d, oid requested Len %d-", *var_len, + *length)); + DEBUGMSGOID(("smux/snmp_bgp", name, *length)); + DEBUGMSG(("smux/snmp_bgp", "\n")); + + /* + * Pass on the request to Gated. + * If the request sent out was a get next, check to see if + * it lies in the bgp range. If it doesn't, return NULL. + * In either case, make sure that errors are checked on the + * returned packets. + */ + + /* + * No writes for now + */ + *write_method = NULL; + + /* + * Donot allow access to the peer stuff as it crashes gated. + * However A GetNext on the last 23.3.1.9 variable will force gated into + * the peer stuff and cause it to crash. + * The only way to fix this is to either solve the Gated problem, or + * remove the peer variables from Gated itself and cause it to return + * NULL at the crossing. Currently doing the later. + */ + + /* + * Reject GET and GETNEXT for anything above bgpifconf range + */ + result = snmp_oid_compare(name, *length, max_bgp_mib, + sizeof(max_bgp_mib) / sizeof(u_int)); + + if (result >= 0) { + DEBUGMSGTL(("smux/snmp_bgp", "Over shot\n")); + return NULL; + } + + /* + * for GETs we need to be in the bgp range so reject anything below + */ + result = snmp_oid_compare(name, *length, min_bgp_mib, + sizeof(min_bgp_mib) / sizeof(u_int)); + if (exact && (result < 0)) { + DEBUGMSGTL(("smux/snmp_bgp", + "Exact but doesn't match length %d, size %d\n", + *length, sizeof(min_bgp_mib))); + return NULL; + } + + /* + * On return, 'var' points to the value returned which is of length + * '*var_len'. 'name' points to the new (same as the one passed in for + * GETs) oid which has 'length' suboids. + * 'smux_type' contains the type of the variable. + */ + var = smux_snmp_process(exact, name, length, var_len); + + DEBUGMSGTL(("smux/snmp_bgp", + "[var_bgp] var len %d, oid obtained Len %d-", *var_len, + *length)); + DEBUGMSGOID(("smux/snmp_bgp", name, *length)); + DEBUGMSG(("smux/snmp_bgp", "\n")); + + vp->type = smux_type; + + /* + * XXX Need a mechanism to return errors in gated's responses + */ + + if (var == NULL) + return NULL; + + /* + * Any resullt returned should be within the bgp tree. + * bgp_mib - static u_int bgp_mib[] = {1, 3, 6, 1, 2, 1, 15}; + */ + if (memcmp(bgp_mib, name, sizeof(bgp_mib)) != 0) { + return NULL; + } else { + return var; + } +}