summaryrefslogtreecommitdiffstats
path: root/contrib/bsnmp/snmpd/trans_lsock.c
Commit message (Collapse)AuthorAgeFilesLines
* The first part of check_priv() function, that attempts to obtain credsglebius2012-09-081-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | from the control message, actually never worked. This means check_priv() didn't work for local dgram sockets. The SCM_CREDS control messages is received only in two cases: 1) If we did setsockopt(LOCAL_CREDS) on our socket, and in this case the message is struct sockcred. 2) If sender did supplied SCM_CREDS control message in his sendmsg() syscall. In this case the message is struct cmsgcred. We can't rely on 2), so we will use 1) for dgram sockets. For stream sockets it is more reliable to obtain accept-time credentials, since SCM_CREDS control message is attached only on first read. Thus: o Do setsockopt(LOCAL_CREDS) on local dgram sockets. o Split check_priv() into check_priv_stream() and check_priv_dgram(), and call them from recv_stream() and recv_dgram() respectively. o Don't provide space for SCM_CREDS control message in recv_stream(). o Provide space for SCM_CREDS control message in recv_dgram(), but there is no need to initialize anything in it. o In recv_dgram() do not blindly expect that first message is SCM_CREDS, instead use correct search cycle through control messages.
* In bsnmpd(1) add support for SNMPv3 message processing model, including ↵syrinx2010-12-081-0/+1
| | | | | | | | message authentication, packet encryption & view-based access control (RFC 3412, 3414, 3415). Sponsored by: The FreeBSD Foundation Reviewed by: philip@ (mostly) Approved by: philip@
* Virgin import of bsnmpd 1.8harti2005-02-281-1/+2
|
* Virgin import of bsnmpd 1.7harti2004-08-061-23/+19
|
* Import of bsnmpd 1.6harti2004-04-141-29/+15
|
* Virgin import of bsnmpd 1.5aharti2004-01-231-0/+611
OpenPOWER on IntegriCloud