/* * system.c */ /* Portions of this file are subject to the following copyright(s). See * the Net-SNMP's COPYING file for more details and other copyrights * that may apply: */ /*********************************************************** Copyright 1992 by Carnegie Mellon University All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ******************************************************************/ /* * Portions of this file are copyrighted by: * Copyright © 2003 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms specified in the COPYING file * distributed with the Net-SNMP package. */ /* * Portions of this file are copyrighted by: * Copyright (C) 2007 Apple, Inc. All rights reserved. * Use is subject to license terms specified in the COPYING file * distributed with the Net-SNMP package. * * Portions of this file are copyrighted by: * Copyright (c) 2016 VMware, Inc. All rights reserved. * Use is subject to license terms specified in the COPYING file * distributed with the Net-SNMP package. */ /* * System dependent routines go here */ #include #include #include #include #include #if HAVE_IO_H #include #endif #if HAVE_DIRECT_H #include #endif #if HAVE_UNISTD_H #include #endif #if HAVE_STDLIB_H #include #endif #if TIME_WITH_SYS_TIME # include # include #else # if HAVE_SYS_TIME_H # include # else # include # endif #endif #include #if HAVE_NETINET_IN_H #include #endif #if HAVE_SYS_SOCKET_H #include #endif #if HAVE_NET_IF_H #include #endif #if HAVE_NETDB_H #include #endif #if HAVE_SYS_SOCKIO_H #include #endif #if HAVE_SYS_IOCTL_H #include #endif #ifdef HAVE_NLIST_H #include #endif #if HAVE_SYS_FILE_H #include #endif #if HAVE_KSTAT_H #include #endif #if HAVE_SYS_PARAM_H #include #endif #if HAVE_SYS_SYSCTL_H #include #endif #if HAVE_STRING_H #include #else #include #endif #if HAVE_DMALLOC_H #include #endif #ifdef HAVE_SYS_STAT_H #include #endif #if HAVE_FCNTL_H #include #endif #if defined(hpux10) || defined(hpux11) #include #endif #if HAVE_SYS_UTSNAME_H #include #endif #if HAVE_SYS_SYSTEMCFG_H #include #endif #if HAVE_SYS_SYSTEMINFO_H #include #endif #if defined(darwin9) #include /* for _NSGetArgv() */ #endif #if HAVE_PWD_H #include #endif #if HAVE_GRP_H #include #endif #if HAVE_LIMITS_H #include #endif #if HAVE_ARPA_INET_H #include #endif #ifdef DNSSEC_LOCAL_VALIDATION #if 1 /*HAVE_ARPA_NAMESER_H*/ #include #endif #include /* NetSNMP and DNSSEC-Tools both define FREE. We'll not use either here. */ #undef FREE #endif #include #include #include #include /* for "internal" definitions */ #include #include /* for get_temp_file_pattern() */ #include "inet_ntop.h" /* NetSNMP and DNSSEC-Tools both define FREE. We'll not use either here. */ #undef FREE netsnmp_feature_child_of(system_all, libnetsnmp) netsnmp_feature_child_of(user_information, system_all) netsnmp_feature_child_of(calculate_sectime_diff, system_all) #ifndef IFF_LOOPBACK # define IFF_LOOPBACK 0 #endif #ifdef INADDR_LOOPBACK # define LOOPBACK INADDR_LOOPBACK #else # define LOOPBACK 0x7f000001 #endif #ifndef EAI_FAIL # define EAI_FAIL -4 /* Non-recoverable failure in name res. */ #endif #if defined(HAVE_FORK) static void _daemon_prep(int stderr_log) { int fd; /* Avoid keeping any directory in use. */ chdir("/"); if (stderr_log) return; fd = open("/dev/null", O_RDWR); /* * Close inherited file descriptors to avoid * keeping unnecessary references. */ close(STDIN_FILENO); close(STDOUT_FILENO); close(STDERR_FILENO); /* * Redirect std{in,out,err} to /dev/null, just in case. */ if (fd >= 0) { dup2(fd, STDIN_FILENO); dup2(fd, STDOUT_FILENO); dup2(fd, STDERR_FILENO); close(fd); } } #endif /** * fork current process into the background. * * This function forks a process into the background, in order to * become a daemon process. It does a few things along the way: * * - becoming a process/session group leader, and forking a second time so * that process/session group leader can exit. * * - changing the working directory to / * * - closing stdin, stdout and stderr (unless stderr_log is set) and * redirecting them to /dev/null * * @param quit_immediately : indicates if the parent process should * exit after a successful fork. * @param stderr_log : indicates if stderr is being used for * logging and shouldn't be closed * @returns -1 : fork error * 0 : child process returning * >0 : parent process returning. returned value is the child PID. */ int netsnmp_daemonize(int quit_immediately, int stderr_log) { int i = 0; DEBUGMSGT(("daemonize","deamonizing...\n")); #if HAVE_FORK #if defined(darwin9) char path [PATH_MAX] = ""; uint32_t size = sizeof (path); /* * if we are already launched in a "daemonized state", just * close & redirect the file descriptors */ if(getppid() <= 2) { _daemon_prep(stderr_log); return 0; } if (_NSGetExecutablePath (path, &size)) return -1; #endif /* * Fork to return control to the invoking process and to * guarantee that we aren't a process group leader. */ #if HAVE_FORKALL i = forkall(); #else i = fork(); #endif if (i != 0) { /* Parent. */ DEBUGMSGT(("daemonize","first fork returned %d.\n", i)); if(i == -1) { snmp_log(LOG_ERR,"first fork failed (errno %d) in " "netsnmp_daemonize()\n", errno); return -1; } if (quit_immediately) { DEBUGMSGT(("daemonize","parent exiting\n")); exit(0); } } else { /* Child. */ #ifdef HAVE_SETSID /* Become a process/session group leader. */ setsid(); #endif /* * Fork to let the process/session group leader exit. */ #if HAVE_FORKALL i = forkall(); #else i = fork(); #endif if (i != 0) { DEBUGMSGT(("daemonize","second fork returned %d.\n", i)); if(i == -1) { snmp_log(LOG_ERR,"second fork failed (errno %d) in " "netsnmp_daemonize()\n", errno); } /* Parent. */ exit(0); } #ifndef WIN32 else { /* Child. */ DEBUGMSGT(("daemonize","child continuing\n")); #if ! defined(darwin9) _daemon_prep(stderr_log); #else /* * Some darwin calls (using mach ports) don't work after * a fork. So, now that we've forked, we re-exec ourself * to ensure that the child's mach ports are all set up correctly, * the getppid call above will prevent the exec child from * forking... */ char * const *argv = *_NSGetArgv (); DEBUGMSGT(("daemonize","re-execing forked child\n")); execv (path, argv); snmp_log(LOG_ERR,"Forked child unable to re-exec - %s.\n", strerror (errno)); exit (0); #endif } #endif /* !WIN32 */ } #endif /* HAVE_FORK */ return i; } /* * ********************************************* */ #ifdef WIN32 in_addr_t get_myaddr(void) { char local_host[130]; int result; LPHOSTENT lpstHostent; SOCKADDR_IN in_addr, remote_in_addr; SOCKET hSock; int nAddrSize = sizeof(SOCKADDR); in_addr.sin_addr.s_addr = INADDR_ANY; result = gethostname(local_host, sizeof(local_host)); if (result == 0) { lpstHostent = gethostbyname((LPSTR) local_host); if (lpstHostent) { in_addr.sin_addr.s_addr = *((u_long FAR *) (lpstHostent->h_addr)); return ((in_addr_t) in_addr.sin_addr.s_addr); } } /* * if we are here, than we don't have host addr */ hSock = socket(AF_INET, SOCK_DGRAM, 0); if (hSock != INVALID_SOCKET) { /* * connect to any port and address */ remote_in_addr.sin_family = AF_INET; remote_in_addr.sin_port = htons(IPPORT_ECHO); remote_in_addr.sin_addr.s_addr = inet_addr("0.0.0.0"); result = connect(hSock, (LPSOCKADDR) & remote_in_addr, sizeof(SOCKADDR)); if (result != SOCKET_ERROR) { /* * get local ip address */ getsockname(hSock, (LPSOCKADDR) & in_addr, (int FAR *) &nAddrSize); } closesocket(hSock); } return ((in_addr_t) in_addr.sin_addr.s_addr); } long get_uptime(void) { long return_value = 0; DWORD buffersize = (sizeof(PERF_DATA_BLOCK) + sizeof(PERF_OBJECT_TYPE)), type = REG_EXPAND_SZ; PPERF_DATA_BLOCK perfdata = NULL; /* * min requirement is one PERF_DATA_BLOCK plus one PERF_OBJECT_TYPE */ perfdata = (PPERF_DATA_BLOCK) malloc(buffersize); if (!perfdata) return 0; memset(perfdata, 0, buffersize); RegQueryValueEx(HKEY_PERFORMANCE_DATA, "Global", NULL, &type, (LPBYTE) perfdata, &buffersize); /* * we can not rely on the return value since there is always more so * we check the signature */ if (wcsncmp(perfdata->Signature, L"PERF", 4) == 0) { /* * signature ok, and all we need is in the in the PERF_DATA_BLOCK */ return_value = (long) ((perfdata->PerfTime100nSec.QuadPart / (LONGLONG) 100000)); } else return_value = GetTickCount() / 10; RegCloseKey(HKEY_PERFORMANCE_DATA); free(perfdata); return return_value; } char * winsock_startup(void) { WORD VersionRequested; WSADATA stWSAData; int i; static char errmsg[100]; /* winsock 1: use MAKEWORD(1,1) */ /* winsock 2: use MAKEWORD(2,2) */ VersionRequested = MAKEWORD(2,2); i = WSAStartup(VersionRequested, &stWSAData); if (i != 0) { if (i == WSAVERNOTSUPPORTED) sprintf(errmsg, "Unable to init. socket lib, does not support 1.1"); else { sprintf(errmsg, "Socket Startup error %d", i); } return (errmsg); } return (NULL); } void winsock_cleanup(void) { WSACleanup(); } #else /* ! WIN32 */ /*******************************************************************/ /* * XXX What if we have multiple addresses? Or no addresses for that matter? * XXX Could it be computed once then cached? Probably not worth it (not * used very often). */ in_addr_t get_myaddr(void) { int sd, i, lastlen = 0; struct ifconf ifc; struct ifreq *ifrp = NULL; in_addr_t addr; char *buf = NULL; if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { return 0; } /* * Cope with lots of interfaces and brokenness of ioctl SIOCGIFCONF on * some platforms; see W. R. Stevens, ``Unix Network Programming Volume * I'', p.435. */ for (i = 8;; i += 8) { buf = (char *) calloc(i, sizeof(struct ifreq)); if (buf == NULL) { close(sd); return 0; } ifc.ifc_len = i * sizeof(struct ifreq); ifc.ifc_buf = (caddr_t) buf; if (ioctl(sd, SIOCGIFCONF, (char *) &ifc) < 0) { if (errno != EINVAL || lastlen != 0) { /* * Something has gone genuinely wrong. */ free(buf); close(sd); return 0; } /* * Otherwise, it could just be that the buffer is too small. */ } else { if (ifc.ifc_len == lastlen) { /* * The length is the same as the last time; we're done. */ break; } lastlen = ifc.ifc_len; } free(buf); } for (ifrp = ifc.ifc_req; (char *)ifrp < (char *)ifc.ifc_req + ifc.ifc_len; #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN ifrp = (struct ifreq *)(((char *) ifrp) + sizeof(ifrp->ifr_name) + ifrp->ifr_addr.sa_len) #else ifrp++ #endif ) { if (ifrp->ifr_addr.sa_family != AF_INET) { continue; } addr = ((struct sockaddr_in *) &(ifrp->ifr_addr))->sin_addr.s_addr; if (ioctl(sd, SIOCGIFFLAGS, (char *) ifrp) < 0) { continue; } if ((ifrp->ifr_flags & IFF_UP) #ifdef IFF_RUNNING && (ifrp->ifr_flags & IFF_RUNNING) #endif /* IFF_RUNNING */ && !(ifrp->ifr_flags & IFF_LOOPBACK) && addr != LOOPBACK) { /* * I *really* don't understand why this is necessary. Perhaps for * some broken platform? Leave it for now. JBPN */ #ifdef SYS_IOCTL_H_HAS_SIOCGIFADDR if (ioctl(sd, SIOCGIFADDR, (char *) ifrp) < 0) { continue; } addr = ((struct sockaddr_in *) &(ifrp->ifr_addr))->sin_addr. s_addr; #endif free(buf); close(sd); return addr; } } free(buf); close(sd); return 0; } #if !defined(solaris2) && !defined(linux) && !defined(cygwin) /* * Returns boottime in centiseconds(!). * Caches this for future use. */ long get_boottime(void) { static long boottime_csecs = 0; #if defined(hpux10) || defined(hpux11) struct pst_static pst_buf; #else struct timeval boottime; #ifdef NETSNMP_CAN_USE_SYSCTL int mib[2]; size_t len; #elif defined(NETSNMP_CAN_USE_NLIST) int kmem; #if !defined(hpux) static char boottime_name[] = "_boottime"; #else static char boottime_name[] = "boottime"; #endif static char empty_name[] = ""; struct nlist nl[2]; memset(nl, 0, sizeof(nl)); nl[0].n_name = boottime_name; nl[1].n_name = empty_name; #endif /* NETSNMP_CAN_USE_SYSCTL */ #endif /* hpux10 || hpux 11 */ if (boottime_csecs != 0) return (boottime_csecs); #if defined(hpux10) || defined(hpux11) pstat_getstatic(&pst_buf, sizeof(struct pst_static), 1, 0); boottime_csecs = pst_buf.boot_time * 100; #elif NETSNMP_CAN_USE_SYSCTL mib[0] = CTL_KERN; mib[1] = KERN_BOOTTIME; len = sizeof(boottime); sysctl(mib, 2, &boottime, &len, NULL, 0); boottime_csecs = (boottime.tv_sec * 100) + (boottime.tv_usec / 10000); #elif defined(NETSNMP_CAN_USE_NLIST) if ((kmem = open("/dev/kmem", 0)) < 0) return 0; nlist(KERNEL_LOC, nl); if (nl[0].n_type == 0) { close(kmem); return 0; } lseek(kmem, (long) nl[0].n_value, L_SET); read(kmem, &boottime, sizeof(boottime)); close(kmem); boottime_csecs = (boottime.tv_sec * 100) + (boottime.tv_usec / 10000); #else return 0; #endif /* hpux10 || hpux 11 */ return (boottime_csecs); } #endif /** * Returns the system uptime in centiseconds. * * @note The value returned by this function is not identical to sysUpTime * defined in RFC 1213. get_uptime() returns the system uptime while * sysUpTime represents the time that has elapsed since the most recent * restart of the network manager (snmpd). * * @see See also netsnmp_get_agent_uptime(). */ long get_uptime(void) { #if defined(aix4) || defined(aix5) || defined(aix6) || defined(aix7) static char lbolt_name[] = "lbolt"; struct nlist nl; int kmem; time_t lbolt; nl.n_name = lbolt_name; if(knlist(&nl, 1, sizeof(struct nlist)) != 0) return(0); if(nl.n_type == 0 || nl.n_value == 0) return(0); if((kmem = open("/dev/mem", 0)) < 0) return 0; lseek(kmem, (long) nl.n_value, L_SET); read(kmem, &lbolt, sizeof(lbolt)); close(kmem); return(lbolt); #elif defined(solaris2) kstat_ctl_t *ksc = kstat_open(); kstat_t *ks; kid_t kid; kstat_named_t *named; u_long lbolt = 0; if (ksc) { ks = kstat_lookup(ksc, "unix", -1, "system_misc"); if (ks) { kid = kstat_read(ksc, ks, NULL); if (kid != -1) { named = kstat_data_lookup(ks, "lbolt"); if (named) { #ifdef KSTAT_DATA_UINT32 lbolt = named->value.ui32; #else lbolt = named->value.ul; #endif } } } kstat_close(ksc); } return lbolt; #elif defined(linux) || defined(cygwin) FILE *in = fopen("/proc/uptime", "r"); long uptim = 0, a, b; if (in) { if (2 == fscanf(in, "%ld.%ld", &a, &b)) uptim = a * 100 + b; fclose(in); } return uptim; #else struct timeval now; long boottime_csecs, nowtime_csecs; boottime_csecs = get_boottime(); if (boottime_csecs == 0) return 0; gettimeofday(&now, (struct timezone *) 0); nowtime_csecs = (now.tv_sec * 100) + (now.tv_usec / 10000); return (nowtime_csecs - boottime_csecs); #endif } #endif /* ! WIN32 */ /*******************************************************************/ #ifdef DNSSEC_LOCAL_VALIDATION static val_context_t *_val_context = NULL; static val_context_t * netsnmp_validator_context(void) { if (NULL == _val_context) { int rc; char *apptype = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_APPTYPE); DEBUGMSGTL(("dns:sec:context", "creating dnssec context for %s\n", apptype)); rc = val_create_context(apptype, &_val_context); } return _val_context; } #endif /* DNSSEC_LOCAL_VALIDATION */ int netsnmp_gethostbyname_v4(const char* name, in_addr_t *addr_out) { static int use_dns_workaround = -1; if (use_dns_workaround < 0) use_dns_workaround = getenv("NETSNMP_DNS_WORKAROUND") != 0; if (use_dns_workaround) { /* * A hack that avoids that T070com2sec_simple fails due to the DNS * client filtering out 127.0.0.x addresses and/or redirecting DNS * resolution failures to a web page. */ if (strcmp(name, "onea.net-snmp.org") == 0) { *addr_out = htonl(INADDR_LOOPBACK); return 0; } else if (strcmp(name, "twoa.net-snmp.org") == 0) { *addr_out = htonl(INADDR_LOOPBACK + 1); return 0; } else if (strcmp(name, "no.such.address.") == 0) { return -1; } } { #if HAVE_GETADDRINFO struct addrinfo *addrs = NULL; struct addrinfo hint; int err; memset(&hint, 0, sizeof hint); hint.ai_flags = 0; hint.ai_family = PF_INET; hint.ai_socktype = SOCK_DGRAM; hint.ai_protocol = 0; err = netsnmp_getaddrinfo(name, NULL, &hint, &addrs); if (err != 0) { return -1; } if (addrs != NULL) { memcpy(addr_out, &((struct sockaddr_in *) addrs->ai_addr)->sin_addr, sizeof(in_addr_t)); freeaddrinfo(addrs); } else { DEBUGMSGTL(("get_thisaddr", "Failed to resolve IPv4 hostname\n")); } return 0; #elif HAVE_GETHOSTBYNAME struct hostent *hp = NULL; hp = netsnmp_gethostbyname(name); if (hp == NULL) { DEBUGMSGTL(("get_thisaddr", "hostname (couldn't resolve)\n")); return -1; } else if (hp->h_addrtype != AF_INET) { DEBUGMSGTL(("get_thisaddr", "hostname (not AF_INET!)\n")); return -1; } else { DEBUGMSGTL(("get_thisaddr", "hostname (resolved okay)\n")); memcpy(addr_out, hp->h_addr, sizeof(in_addr_t)); } return 0; #elif HAVE_GETIPNODEBYNAME struct hostent *hp = NULL; int err; hp = getipnodebyname(peername, AF_INET, 0, &err); if (hp == NULL) { DEBUGMSGTL(("get_thisaddr", "hostname (couldn't resolve = %d)\n", err)); return -1; } DEBUGMSGTL(("get_thisaddr", "hostname (resolved okay)\n")); memcpy(addr_out, hp->h_addr, sizeof(in_addr_t)); return 0; #else /* HAVE_GETIPNODEBYNAME */ return -1; #endif } } int netsnmp_getaddrinfo(const char *name, const char *service, const struct addrinfo *hints, struct addrinfo **res) { #if HAVE_GETADDRINFO struct addrinfo *addrs = NULL; struct addrinfo hint; int err; #ifdef DNSSEC_LOCAL_VALIDATION val_status_t val_status; #endif DEBUGMSGTL(("dns:getaddrinfo", "looking up ")); if (name) DEBUGMSG(("dns:getaddrinfo", "\"%s\"", name)); else DEBUGMSG(("dns:getaddrinfo", "")); if (service) DEBUGMSG(("dns:getaddrinfo", ":\"%s\"", service)); if (hints) DEBUGMSG(("dns:getaddrinfo", " with hint ({ ... })")); else DEBUGMSG(("dns:getaddrinfo", " with no hint")); DEBUGMSG(("dns:getaddrinfo", "\n")); if (NULL == hints) { memset(&hint, 0, sizeof hint); hint.ai_flags = 0; hint.ai_family = PF_INET; hint.ai_socktype = SOCK_DGRAM; hint.ai_protocol = 0; hints = &hint; } else { memcpy(&hint, hints, sizeof hint); } #ifndef DNSSEC_LOCAL_VALIDATION err = getaddrinfo(name, NULL, &hint, &addrs); #else /* DNSSEC_LOCAL_VALIDATION */ err = val_getaddrinfo(netsnmp_validator_context(), name, NULL, &hint, &addrs, &val_status); DEBUGMSGTL(("dns:sec:val", "err %d, val_status %d / %s; trusted: %d\n", err, val_status, p_val_status(val_status), val_istrusted(val_status))); if (! val_istrusted(val_status)) { int rc; if ((err != 0) && VAL_GETADDRINFO_HAS_STATUS(err)) { snmp_log(LOG_WARNING, "WARNING: UNTRUSTED error in DNS resolution for %s!\n", name); rc = EAI_FAIL; } else { snmp_log(LOG_WARNING, "The authenticity of DNS response is not trusted (%s)\n", p_val_status(val_status)); rc = EAI_NONAME; } /** continue anyways if DNSSEC_WARN_ONLY is set */ if (!netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DNSSEC_WARN_ONLY)) return rc; } #endif /* DNSSEC_LOCAL_VALIDATION */ *res = addrs; if ((0 == err) && addrs && addrs->ai_addr) { DEBUGMSGTL(("dns:getaddrinfo", "answer { AF_INET, %s:%hu }\n", inet_ntoa(((struct sockaddr_in*)addrs->ai_addr)->sin_addr), ntohs(((struct sockaddr_in*)addrs->ai_addr)->sin_port))); } return err; #else NETSNMP_LOGONCE((LOG_ERR, "getaddrinfo not available")); return EAI_FAIL; #endif /* getaddrinfo */ } struct hostent * netsnmp_gethostbyname(const char *name) { #if HAVE_GETHOSTBYNAME #ifdef DNSSEC_LOCAL_VALIDATION val_status_t val_status; #endif struct hostent *hp = NULL; if (NULL == name) return NULL; DEBUGMSGTL(("dns:gethostbyname", "looking up %s\n", name)); #ifdef DNSSEC_LOCAL_VALIDATION hp = val_gethostbyname(netsnmp_validator_context(), name, &val_status); DEBUGMSGTL(("dns:sec:val", "val_status %d / %s; trusted: %d\n", val_status, p_val_status(val_status), val_istrusted(val_status))); if (!val_istrusted(val_status)) { snmp_log(LOG_WARNING, "The authenticity of DNS response is not trusted (%s)\n", p_val_status(val_status)); /** continue anyways if DNSSEC_WARN_ONLY is set */ if (!netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DNSSEC_WARN_ONLY)) hp = NULL; } else if (val_does_not_exist(val_status) && hp) hp = NULL; #else hp = gethostbyname(name); #endif if (hp == NULL) { DEBUGMSGTL(("dns:gethostbyname", "couldn't resolve %s\n", name)); } else if (hp->h_addrtype != AF_INET #ifdef AF_INET6 && hp->h_addrtype != AF_INET6 #endif ) { #ifdef AF_INET6 DEBUGMSGTL(("dns:gethostbyname", "warning: response for %s not AF_INET/AF_INET6!\n", name)); #else DEBUGMSGTL(("dns:gethostbyname", "warning: response for %s not AF_INET!\n", name)); #endif } else { DEBUGMSGTL(("dns:gethostbyname", "%s resolved okay\n", name)); } return hp; #else NETSNMP_LOGONCE((LOG_ERR, "gethostbyname not available")); return NULL; #endif /* HAVE_GETHOSTBYNAME */ } /** * Look up the host name via DNS. * * @param[in] addr Pointer to the address to resolve. This argument points e.g. * to a struct in_addr for AF_INET or to a struct in6_addr for AF_INET6. * @param[in] len Length in bytes of *addr. * @param[in] type Address family, e.g. AF_INET or AF_INET6. * * @return Pointer to a hostent structure if address lookup succeeded or NULL * if the lookup failed. * * @see See also the gethostbyaddr() man page. */ struct hostent * netsnmp_gethostbyaddr(const void *addr, socklen_t len, int type) { #if HAVE_GETHOSTBYADDR struct hostent *hp = NULL; char buf[64]; DEBUGMSGTL(("dns:gethostbyaddr", "resolving %s\n", inet_ntop(type, addr, buf, sizeof(buf)))); #ifdef DNSSEC_LOCAL_VALIDATION val_status_t val_status; hp = val_gethostbyaddr(netsnmp_validator_context(), addr, len, type, &val_status); DEBUGMSGTL(("dns:sec:val", "val_status %d / %s; trusted: %d\n", val_status, p_val_status(val_status), val_istrusted(val_status))); if (!val_istrusted(val_status)) { snmp_log(LOG_WARNING, "The authenticity of DNS response is not trusted (%s)\n", p_val_status(val_status)); /** continue anyways if DNSSEC_WARN_ONLY is set */ if (!netsnmp_ds_get_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_DNSSEC_WARN_ONLY)) hp = NULL; } else if (val_does_not_exist(val_status) && hp) hp = NULL; #else hp = gethostbyaddr(addr, len, type); #endif if (hp == NULL) { DEBUGMSGTL(("dns:gethostbyaddr", "couldn't resolve addr\n")); } else if (hp->h_addrtype != AF_INET) { DEBUGMSGTL(("dns:gethostbyaddr", "warning: response for addr not AF_INET!\n")); } else { DEBUGMSGTL(("dns:gethostbyaddr", "addr resolved okay\n")); } return hp; #else NETSNMP_LOGONCE((LOG_ERR, "gethostbyaddr not available")); return NULL; #endif } /*******************************************************************/ #ifndef HAVE_STRNCASECMP /* * test for NULL pointers before and NULL characters after * * comparing possibly non-NULL strings. * * WARNING: This function does NOT check for array overflow. */ int strncasecmp(const char *s1, const char *s2, size_t nch) { size_t ii; int res = -1; if (!s1) { if (!s2) return 0; return (-1); } if (!s2) return (1); for (ii = 0; (ii < nch) && *s1 && *s2; ii++, s1++, s2++) { res = (int) (tolower(*s1) - tolower(*s2)); if (res != 0) break; } if (ii == nch) { s1--; s2--; } if (!*s1) { if (!*s2) return 0; return (-1); } if (!*s2) return (1); return (res); } int strcasecmp(const char *s1, const char *s2) { return strncasecmp(s1, s2, 1000000); } #endif /* HAVE_STRNCASECMP */ #ifndef HAVE_STRDUP char * strdup(const char *src) { int len; char *dst; len = strlen(src) + 1; if ((dst = (char *) malloc(len)) == NULL) return (NULL); strcpy(dst, src); return (dst); } #endif /* HAVE_STRDUP */ #ifndef HAVE_SETENV int setenv(const char *name, const char *value, int overwrite) { char *cp; int ret; if (overwrite == 0) { if (getenv(name)) return 0; } cp = (char *) malloc(strlen(name) + strlen(value) + 2); if (cp == NULL) return -1; sprintf(cp, "%s=%s", name, value); ret = putenv(cp); #ifdef WIN32 free(cp); #endif return ret; } #endif /* HAVE_SETENV */ netsnmp_feature_child_of(calculate_time_diff, netsnmp_unused) #ifndef NETSNMP_FEATURE_REMOVE_CALCULATE_TIME_DIFF /** * Compute (*now - *then) in centiseconds. */ int calculate_time_diff(const struct timeval *now, const struct timeval *then) { struct timeval diff; NETSNMP_TIMERSUB(now, then, &diff); return (int)(diff.tv_sec * 100 + diff.tv_usec / 10000); } #endif /* NETSNMP_FEATURE_REMOVE_CALCULATE_TIME_DIFF */ #ifndef NETSNMP_FEATURE_REMOVE_CALCULATE_SECTIME_DIFF /** Compute rounded (*now - *then) in seconds. */ u_int calculate_sectime_diff(const struct timeval *now, const struct timeval *then) { struct timeval diff; NETSNMP_TIMERSUB(now, then, &diff); return (u_int)(diff.tv_sec + (diff.tv_usec >= 500000L)); } #endif /* NETSNMP_FEATURE_REMOVE_CALCULATE_SECTIME_DIFF */ #ifndef HAVE_STRCASESTR /* * only glibc2 has this. */ char * strcasestr(const char *haystack, const char *needle) { const char *cp1 = haystack, *cp2 = needle; const char *cx; int tstch1, tstch2; /* * printf("looking for '%s' in '%s'\n", needle, haystack); */ if (cp1 && cp2 && *cp1 && *cp2) for (cp1 = haystack, cp2 = needle; *cp1;) { cx = cp1; cp2 = needle; do { /* * printf("T'%c' ", *cp1); */ if (!*cp2) { /* found the needle */ /* * printf("\nfound '%s' in '%s'\n", needle, cx); */ return NETSNMP_REMOVE_CONST(char *, cx); } if (!*cp1) break; tstch1 = toupper(*cp1); tstch2 = toupper(*cp2); if (tstch1 != tstch2) break; /* * printf("M'%c' ", *cp1); */ cp1++; cp2++; } while (1); if (*cp1) cp1++; } /* * printf("\n"); */ if (cp1 && *cp1) return NETSNMP_REMOVE_CONST(char *, cp1); return NULL; } #endif int mkdirhier(const char *pathname, mode_t mode, int skiplast) { struct stat sbuf; char *ourcopy = strdup(pathname); char *entry; char *buf = NULL; char *st = NULL; int res; res = SNMPERR_GENERR; if (!ourcopy) goto out; buf = malloc(strlen(pathname) + 2); if (!buf) goto out; #if defined (WIN32) || defined (cygwin) /* convert backslash to forward slash */ for (entry = ourcopy; *entry; entry++) if (*entry == '\\') *entry = '/'; #endif entry = strtok_r(ourcopy, "/", &st); buf[0] = '\0'; #if defined (WIN32) || defined (cygwin) /* * Check if first entry contains a drive-letter * e.g "c:/path" */ if ((entry) && (':' == entry[1]) && (('\0' == entry[2]) || ('/' == entry[2]))) { strcat(buf, entry); entry = strtok_r(NULL, "/", &st); } #endif /* * check to see if filename is a directory */ while (entry) { strcat(buf, "/"); strcat(buf, entry); entry = strtok_r(NULL, "/", &st); if (entry == NULL && skiplast) break; if (stat(buf, &sbuf) < 0) { /* * DNE, make it */ #ifdef WIN32 if (CreateDirectory(buf, NULL) == 0) #else if (mkdir(buf, mode) == -1) #endif goto out; else snmp_log(LOG_INFO, "Created directory: %s\n", buf); } else { /* * exists, is it a file? */ if ((sbuf.st_mode & S_IFDIR) == 0) { /* * ack! can't make a directory on top of a file */ goto out; } } } res = SNMPERR_SUCCESS; out: free(buf); free(ourcopy); return res; } /** * netsnmp_mktemp creates a temporary file based on the * configured tempFilePattern * * @return file descriptor */ const char * netsnmp_mktemp(void) { #ifdef PATH_MAX static char name[PATH_MAX]; #else static char name[256]; #endif int fd = -1; strlcpy(name, get_temp_file_pattern(), sizeof(name)); #ifdef HAVE_MKSTEMP { mode_t oldmask = umask(~(S_IRUSR | S_IWUSR)); netsnmp_assert(oldmask != (mode_t)(-1)); fd = mkstemp(name); umask(oldmask); } #else if (mktemp(name)) { # ifndef WIN32 fd = open(name, O_CREAT | O_EXCL | O_WRONLY, S_IRUSR | S_IWUSR); # else /* * Win32 needs _S_IREAD | _S_IWRITE to set permissions on file * after closing */ fd = _open(name, _O_CREAT | _O_EXCL | _O_WRONLY, _S_IREAD | _S_IWRITE); # endif } #endif if (fd >= 0) { close(fd); DEBUGMSGTL(("netsnmp_mktemp", "temp file created: %s\n", name)); return name; } snmp_log(LOG_ERR, "netsnmp_mktemp: error creating file %s\n", name); return NULL; } /* * This function was created to differentiate actions * that are appropriate for Linux 2.4 kernels, but not later kernels. * * This function can be used to test kernels on any platform that supports uname(). * * If not running a platform that supports uname(), return -1. * * If ospname matches, and the release matches up through the prefix, * return 0. * If the release is ordered higher, return 1. * Be aware that "ordered higher" is not a guarantee of correctness. */ int netsnmp_os_prematch(const char *ospmname, const char *ospmrelprefix) { #if HAVE_SYS_UTSNAME_H static int printOSonce = 1; struct utsname utsbuf; if ( 0 > uname(&utsbuf)) return -1; if (printOSonce) { printOSonce = 0; /* show the four elements that the kernel can be sure of */ DEBUGMSGT(("daemonize","sysname '%s',\nrelease '%s',\nversion '%s',\nmachine '%s'\n", utsbuf.sysname, utsbuf.release, utsbuf.version, utsbuf.machine)); } if (0 != strcasecmp(utsbuf.sysname, ospmname)) return -1; /* Required to match only the leading characters */ return strncasecmp(utsbuf.release, ospmrelprefix, strlen(ospmrelprefix)); #else return -1; #endif /* HAVE_SYS_UTSNAME_H */ } /** * netsnmp_os_kernel_width determines kernel width at runtime * Currently implemented for IRIX, AIX and Tru64 Unix * * @return kernel width (usually 32 or 64) on success, -1 on error */ int netsnmp_os_kernel_width(void) { #ifdef irix6 char buf[8]; sysinfo(_MIPS_SI_OS_NAME, buf, 7); if (strncmp("IRIX64", buf, 6) == 0) { return 64; } else if (strncmp("IRIX", buf, 4) == 0) { return 32; } else { return -1; } #elif defined(aix4) || defined(aix5) || defined(aix6) || defined(aix7) return (__KERNEL_32() ? 32 : (__KERNEL_64() ? 64 : -1)); #elif defined(osf4) || defined(osf5) || defined(__alpha) return 64; /* Alpha is always 64bit */ #else /* kernel width detection not implemented */ return -1; #endif } netsnmp_feature_child_of(str_to_uid, user_information) #ifndef NETSNMP_FEATURE_REMOVE_STR_TO_UID /** * Convert a user name or number into numeric form. * * @param[in] useroruid Either a Unix user name or the ASCII representation * of a user number. * * @return Either a user number > 0 or 0 if useroruid is not a valid user * name, not a valid user number or the name of the root user. */ int netsnmp_str_to_uid(const char *useroruid) { int uid; #if HAVE_GETPWNAM && HAVE_PWD_H struct passwd *pwd; #endif uid = atoi(useroruid); if (uid == 0) { #if HAVE_GETPWNAM && HAVE_PWD_H pwd = getpwnam(useroruid); uid = pwd ? pwd->pw_uid : 0; endpwent(); #endif if (uid == 0) snmp_log(LOG_WARNING, "Can't identify user (%s).\n", useroruid); } return uid; } #endif /* NETSNMP_FEATURE_REMOVE_STR_TO_UID */ netsnmp_feature_child_of(str_to_gid, user_information) #ifndef NETSNMP_FEATURE_REMOVE_STR_TO_GID /** * Convert a group name or number into numeric form. * * @param[in] grouporgid Either a Unix group name or the ASCII representation * of a group number. * * @return Either a group number > 0 or 0 if grouporgid is not a valid group * name, not a valid group number or the root group. */ int netsnmp_str_to_gid(const char *grouporgid) { int gid; gid = atoi(grouporgid); if (gid == 0) { #if HAVE_GETGRNAM && HAVE_GRP_H struct group *grp; grp = getgrnam(grouporgid); gid = grp ? grp->gr_gid : 0; endgrent(); #endif if (gid == 0) snmp_log(LOG_WARNING, "Can't identify group (%s).\n", grouporgid); } return gid; } #endif /* NETSNMP_FEATURE_REMOVE_STR_TO_GID */