snmpUSMKeyChange.java.txt
上传用户:aonuowh
上传日期:2021-05-23
资源大小:35390k
文件大小:27k
- /* $Id: snmpUSMKeyChange.src,v 1.4 2002/09/09 05:54:49 parasuraman Exp $ */
- /*
- * @(#)snmpUSMKeyChange.java
- * Copyright (c) 1996-2003 AdventNet, Inc. All Rights Reserved.
- * Please read the associated COPYRIGHTS file for more details.
- */
- /**
- * This is an example program to explain how remotely configure users
- * on the agent. The procedure followed is a five step procedure.
- * Step 1. GET(usmUserSpinLock.0) Value
- * Strp 2. generate the keyChange value based on the secret
- * privKey of the clone-from user and the secret key
- * to be used for the new user. Let us call this keyChangeValue.
- * Strp 3. GET(usmUserSpinLock.0) value
- * SET(usmUserSpinLock.0=spinLockValue,
- * usmUserKeyChange=keyChangeValue
- * usmUserPublic=randomValue)
- * Strp 4. GET(usmUserPulic) and check it has randomValue
- * The application sends request with version v3.
- * The user could run this application by giving any of the following usage.
- *
- * java snmpUSMKeyChange [options] userName hostname
- *
- * iava snmpUSMKeyChange [-d] [-p port] [-r retries] [-t timeout] [-a auth_protocol] [-w auth_password] [-s priv_password] [-n contextName] [-i contextID] [-y new_auth_password] [-z new_priv_password] userName host
- *
- * e.g.
- * java snmpUSMKeyChange -a MD5 -w initial2Pass -y initial2NewPass initial2 10.3.2.120
- * Where, initial2 user already configured on the agent whose authProtocol is
- * MD5 and authPassword is initial2Pass. newInitial is the name of the new
- * user who will be configured with authProtocol=MD5 and
- * authPassword=initial2NewPass.
- * Here the clone-from user is initial2, the user on whose behalf all the
- * requests will be sent.
- *
- * Options:
- * [-d] - Debug output. By default off.
- * [-p] <port> - remote port no. By default 161.
- * [-t] <Timeout> - Timeout. By default 5000ms.
- * [-r] <Retries> - Retries. By default 0.
- * [-a] <autProtocol> - The authProtocol(MD5/SHA) of the template user. Mandatory if authPassword is specified
- * [-w] <authPassword> - The authentication password of the template user.
- * [-s] <privPassword> - The privacy protocol password of the template user. Must be accompanied with auth password and authProtocol fields.
- * [-n] <contextName> - The contextName to be used for the v3 pdu.
- * [-i] <contextID> - The contextID to be used for the v3 pdu.
- * [-w] <newAuthPassword> - The authentication password for the new user.
- * [-s] <newPrivPassword> - The privacy protocol password of the new user. Must be accompanied with auth password and authProtocol fields.
- * username Mandatory - The user who is already configured on the agent.
- * (template user)
- * newusername Mandatory - The user name of the new user who will be
- Remotely configured on the agent.
- * host Mandatory - The RemoteHost (agent).Format (string without double qoutes/IpAddress).
- */
- import java.lang.*;
- import java.util.*;
- import java.net.*;
- import com.adventnet.snmp.snmp2.*;
- import com.adventnet.snmp.snmp2.usm.*;
- import com.adventnet.utils.*;
- public class snmpUSMKeyChange {
- private static final int USM_SECURITY_MODEL = 3;
- private static final String ENC = "8859_1";
- private static final int DEBUG = 0;
- private static final int PORT = 1;
- private static final int RETRIES = 2;
- private static final int TIMEOUT = 3;
- private static final int AUTH_PROTOCOL = 4;
- private static final int AUTH_PASSWORD = 5;
- private static final int PRIV_PASSWORD = 6;
- private static final int CONTEXT_NAME = 7;
- private static final int CONTEXT_ID = 8;
- private static final int NEW_AUTH_PASSWORD = 9;
- private static final int NEW_PRIV_PASSWORD = 10;
- private static final int OLD_USERNAME = 11;
- private static final int OLD_AUTH_PASSWORD = 12;
- private static final int OLD_PRIV_PASSWORD = 13;
- private static final String SPIN_LOCK_OID = ".1.3.6.1.6.3.15.1.2.1.0";
- private static final String USM_TABLE = ".1.3.6.1.6.3.15.1.2.2";
- private static final String USM_ENTRY = ".1.3.6.1.6.3.15.1.2.2.1";
- private static final String AUTH_OWN_KEY_CHANGE_COL = "7";
- private static final String AUTH_KEY_CHANGE_COL = "6";
- private static final String PRIV_OWN_KEY_CHANGE_COL = "10";
- private static final String PRIV_KEY_CHANGE_COL = "9";
- private static final String USM_PUBLIC_COL = "11";
- private static final String ROW_STATUS_COL = "13";
- private static final int AUTH_MD5_LEN = 16;
- private static final int AUTH_SHA_LEN = 20;
- boolean debug = false;
- public static void main(String args[]) {
-
- snmpUSMKeyChange surg = new snmpUSMKeyChange();
-
- // Take care of getting options
- String usage = "snmpUSMKeyChange [-d] [-p port] [-r retries] [-t timeout] [-a auth_protocol] [-w auth_password] [-s priv_password] [-n contextName] [-i contextID] [-y new_auth_password] [-z new_priv_password] [ -ou user_name] [ -ow old_auth_password] [ -oz old_priv_password] userName host ";
- String options[] = { "-d", "-p", "-r", "-t", "-a", "-w", "-s", "-n", "-i", "-y", "-z", "-ou", "-ow", "-oz"};
- String values[] = { "None", null, null, null, null, null, null, null, null, null, null, null, null,null };
- String userName = new String("");
- int authProtocol = USMUserEntry.NO_AUTH;
- String authPassword = null;
- String privPassword = null;
- String contextName = null;
- String contextID = null;
- //int newAuthProtocol = USMUserEntry.NO_AUTH;
- String newAuthPassword = null;
- String newPrivPassword = null;
-
- // Old sec Parameters for the user
- byte oldAuthProtocol = USMUserEntry.MD5_AUTH;
- String oldAuthPassword = null;
- String oldPrivPassword = null;
- String oldUserName = null;
- boolean ownKeyChange=false;
- ParseOptions opt = new ParseOptions(args,options,values, usage);
- if (opt.remArgs.length<2) opt.usage_error();
- // Start SNMP API
- SnmpAPI api;
- api = new SnmpAPI();
- if (values[DEBUG].equals("Set")){
- api.setDebug( true );
- surg.debug = true;
- }
-
- userName = opt.remArgs[0];
- // Open session
- SnmpSession session = new SnmpSession(api);
- // set remote Host
- session.setPeername( opt.remArgs[1] );
- // Set the values accepted from the command line
- //boolean usage_error = false;
-
- //set remote Port, timeout,retries if needed.
- try {
- if (values[PORT] != null)
- session.setRemotePort( Integer.parseInt(values[PORT]) );
- if (values[RETRIES] != null)
- session.setRetries( Integer.parseInt(values[RETRIES]) );
- if (values[TIMEOUT] != null)
- session.setTimeout( Integer.parseInt(values[TIMEOUT]) );
- }
- catch (NumberFormatException ex) {
- System.err.println("Invalid Integer Arg");
- }
- session.setVersion( SnmpAPI.SNMP_VERSION_3 );
-
-
- if ((values[AUTH_PROTOCOL] != null)) {
- if(values[AUTH_PROTOCOL].equals("SHA"))
- authProtocol = USMUserEntry.SHA_AUTH;
- else
- authProtocol = USMUserEntry.MD5_AUTH;
- }
- if(values[AUTH_PASSWORD]!=null){
- authPassword=values[AUTH_PASSWORD];
- }
- if(values[PRIV_PASSWORD]!=null){
- privPassword=values[PRIV_PASSWORD];
- }
- /// for old user
- if(values[OLD_USERNAME]==null){
- ownKeyChange=true;
- }
- else{
- oldUserName=values[OLD_USERNAME];
- }
- if(!ownKeyChange){
- if(!(values[OLD_AUTH_PASSWORD]!=null && values[AUTH_PASSWORD]!=null
- && values[NEW_AUTH_PASSWORD]!=null)){
- System.out.println("GOT Here 187");
- opt.usage_error();
- }
- else{
- oldAuthPassword = values[OLD_AUTH_PASSWORD];
- newAuthPassword = values[NEW_AUTH_PASSWORD];
- authPassword = values[AUTH_PASSWORD];
- }
-
- if(values[OLD_PRIV_PASSWORD]!=null){
- if(values[PRIV_PASSWORD]==null){
- System.out.println("GOT Here 187");
- opt.usage_error();
- }
- else{
- if(values[NEW_PRIV_PASSWORD]==null){
- opt.usage_error();
- }
- else{
- oldPrivPassword = values[OLD_AUTH_PASSWORD];
- newPrivPassword = values[NEW_AUTH_PASSWORD];
- privPassword = values[AUTH_PASSWORD];
- }
- }
- }
- else{
- privPassword=null;
- }
- }
- else{
- if(values[AUTH_PASSWORD]==null){
- opt.usage_error();
- }
- else{
- authPassword=values[AUTH_PASSWORD];
- if(values[NEW_AUTH_PASSWORD]!=null){
- newAuthPassword=values[NEW_AUTH_PASSWORD];
- }
- else{
- opt.usage_error();
- }
- }
- if(values[PRIV_PASSWORD]!=null){
- privPassword=values[PRIV_PASSWORD];
- if(values[NEW_PRIV_PASSWORD]!=null){
- newPrivPassword=values[NEW_PRIV_PASSWORD];
- }
- }
- }
-
- if (values[CONTEXT_NAME] != null)
- contextName = values[CONTEXT_NAME];
- if (values[CONTEXT_ID] != null)
- contextID = values[CONTEXT_ID];
- // Build Get request PDU
- SnmpPDU pdu = new SnmpPDU();
- try {
- //Open session
- session.open();
- } catch (SnmpException e) {
- System.err.println("Error opening session:"+e.getMessage());
- System.exit(1);
- }
- // inititialize the manager by adding the user. All requests will
- // sent with this username
- pdu.setUserName(userName.getBytes());
- USMUtils.init_v3_params(userName, authProtocol, authPassword,
- privPassword, session.getPeername(),
- session.getRemotePort(),session);
- if(contextName!=null){
- pdu.setContextName(contextName.getBytes());
- }
- if(contextID!=null){
- pdu.setContextID(contextID.getBytes());
- }
- // A valid user is now configured.on the manager.
- System.out.println("A new user " + userName + " is now " +
- "configured on the manager");
- // Get the SpinLock to use in the next SET request.
- int spinLock = surg.sendSpinLockRequest(pdu,session);
- if(spinLock < 0){
- System.out.println("Error in retriving SnmpLock");
- System.exit(1);
- }
- // Since we are reusing the PDU, we will remove the varbinds
- // and set the reqid to 0.
- surg.removeAllVarBinds(pdu);
- //pdu.setReqid(0);
- byte[] engineID = ((Snmp3Message)pdu.getMsg()).
- getSecurity().getEngineID();
- String engID;
- try{
- engID = new String(engineID, ENC);
- }
- catch(Exception e){
- engID = new String(engineID);
- }
- int[] firstindex = surg.stringToIntegerArray(engID);
- String engIDOID = surg.intArrayToString(firstindex);
- int[] userIndex=null;
- if(ownKeyChange){
- userIndex = surg.stringToIntegerArray(userName);
- }
- else{
- userIndex = surg.stringToIntegerArray(oldUserName);
- }
-
- String userNameOID = surg.intArrayToString(userIndex);
-
- // Initialize the random value based on the protocol used.
- byte[] random;
- if(authProtocol == USMUserEntry.MD5_AUTH)
- random = new byte[AUTH_MD5_LEN];
- else
- random = new byte[AUTH_SHA_LEN];
- byte[] engID2 = null;
- try {
- engID2 = engID.getBytes(ENC);
- }catch(Exception ex) {
- engID2 = engID.getBytes();
- }
- USMUserTable userTable = (USMUserTable)api.getSecurityProvider().
- getTable(USM_SECURITY_MODEL);
- USMUserEntry entry = userTable.getEntry(userName.getBytes(),
- engID2);
-
- byte[] oldKey=null;
- if(ownKeyChange){
- oldKey = entry.getAuthKey();
- }
- else{
- oldKey =
- USMUtils.password_to_key(oldAuthProtocol,oldAuthPassword.getBytes(),
- oldAuthPassword.getBytes().length,engineID);
- }
- // Generate the keyChange value based on the secret
- // authKey of the user and the new secret key
- // to be used for the user. Let us call this akcValue.
-
- String akcValue=surg.getKeyChangeValue(engID,authProtocol,
- newAuthPassword,oldKey,random,false);
-
- if(authProtocol == USMUserEntry.MD5_AUTH){
- try{
- random = akcValue.substring(0,AUTH_MD5_LEN).getBytes(ENC);
- }catch(Exception e){
- random = akcValue.substring(0,AUTH_MD5_LEN).getBytes();
- }
- }
- else{
- try{
- random = akcValue.substring(0,AUTH_SHA_LEN).getBytes(ENC);
- }catch(Exception e){
- random = akcValue.substring(0,AUTH_SHA_LEN).getBytes();
- }
- }
- String keyChangeOID=null;
- if(ownKeyChange){
- keyChangeOID = USM_ENTRY + "." + AUTH_OWN_KEY_CHANGE_COL + "."
- + firstindex.length + engIDOID + "."
- + userIndex.length + userNameOID;
- }
- else{
- keyChangeOID = USM_ENTRY + "." + AUTH_KEY_CHANGE_COL + "."
- + firstindex.length + engIDOID + "."
- + userIndex.length + userNameOID;
- }
- String randomOID = USM_ENTRY + "." + USM_PUBLIC_COL + "." +
- + firstindex.length + engIDOID + "." +
- userIndex.length + userNameOID;
-
- SnmpOID setOID1 = new SnmpOID(SPIN_LOCK_OID);
- surg.addvarbind(pdu, setOID1,"INTEGER",
- new Integer(spinLock).toString());
-
- SnmpOID setOID2 = new SnmpOID(keyChangeOID); //check this up
- surg.addvarbind(pdu, setOID2,"STRING",akcValue);
- SnmpOID setOID3 = new SnmpOID(randomOID);
- String randomString;
- try{
- randomString = new String(random,ENC);
- }catch(Exception e){
- randomString = new String(random);
- }
- surg.addvarbind(pdu, setOID3,"STRING", randomString);
- System.out.println("Sending a request to set the authKeyChangen");
- pdu.setCommand( SnmpAPI.SET_REQ_MSG );
- try {
- // Send PDU and receive response PDU
- System.out.println("Sending Request for KeyChange");
- pdu = session.syncSend(pdu);
- } catch (SnmpException e) {
- System.err.println("Sending PDU"+e.getMessage());
- System.exit(1);
- }
- if (pdu == null) {
- // timeout
- System.out.println("Request timed out to: " + opt.remArgs[0] );
- System.exit(1);
- }
- System.out.println("Response PDU for keyChange received from " +
- (pdu.getAddress()).getHostAddress());
- if (pdu.getErrstat() != 0){
- System.out.println("KeyChange SET request returned error "
- + "User NOT Successfully cloned");
- System.err.println(pdu.getError());
- System.exit(1);
- }
- else
- // print the response pdu varbinds
- System.out.println(pdu.printVarBinds());
- // Since we are reusing the PDU, we will remove the varbinds
- // and set the reqid to 0.
- surg.removeAllVarBinds(pdu);
- //pdu.setReqid(0);
- // This is to set the new AuthKey on our side for receiving
- //the usmUserPublic
- // value after it has been set.
- if(ownKeyChange){
- entry.setAuthPassword(newAuthPassword.getBytes());
- byte[] engID1 = null;
- try {
- engID1 = engID.getBytes(ENC);
- }catch(Exception ex) {
- engID1 = engID.getBytes();
- }
- byte[] newKey = USMUtils.password_to_key(authProtocol,
- newAuthPassword.getBytes(),
- newAuthPassword.getBytes().length,
- engID1);
- entry.setAuthKey(newKey);
- }
- // Get the usmUserPublic value
- pdu.setCommand( SnmpAPI.GET_REQ_MSG );
-
- SnmpOID oid = new SnmpOID(randomOID);
- if (oid.toValue() == null)
- System.err.println("Invalid OID argument: " + randomOID);
- else pdu.addNull(oid);
-
- try {
- // Send PDU and receive response PDU
- pdu = session.syncSend(pdu);
- } catch (SnmpException e) {
- System.err.println("Sending PDU "+e.getMessage());
- System.exit(1);
- }
- if (pdu == null) {
- // timeout
- System.out.println("Request timed out to: " + opt.remArgs[0] );
- System.exit(1);
- }
- // print and exit
- System.out.println("Response PDU for usmUserPublic received from " +
- (pdu.getAddress()).getHostAddress());
-
- // Check for error in response
- if (pdu.getErrstat() != 0){
- System.out.println("usmUserPublic GET request returned error "
- + "User NOT Successfully cloned");
- System.err.println(pdu.getError());
- System.exit(1);
- }
- else
- // print the response pdu varbinds
- System.out.println(pdu.printVarBinds());
- String userPublic = (pdu.getVariable(0)).toString();
- String tempRandom;
- try{
- tempRandom = new String(random,ENC);
- }catch(Exception e){
- tempRandom = new String(random);
- }
- if(userPublic.equals(tempRandom))
- System.out.println("usmUserPulic value is set appropriatelyn");
- else{
- System.out.println("usmUserPulic value is NOT set appropriately");
- System.out.println("User NOT Successfully cloned");
- System.exit(1);
- }
- // Since we are reusing the PDU, we will remove the varbinds
- // and set the reqid to 0.
- surg.removeAllVarBinds(pdu);
- //pdu.setReqid(0);
- // Start the privKeyChange
- if(privPassword!=null && privPassword.length()>0 && newPrivPassword!=null && newPrivPassword.length()>0)
- {
- newPrivPassword = values[NEW_PRIV_PASSWORD];
- SnmpPDU pdu1 = new SnmpPDU();
- pdu1.setUserName(userName.getBytes());
- if(contextName!=null){
- pdu1.setContextName(contextName.getBytes());
- }
- if(contextID!=null){
- pdu1.setContextID(contextID.getBytes());
- }
- // Step 1. Retrive the USMUserSpinLock
- spinLock = surg.sendSpinLockRequest(pdu1,session);
- if(spinLock < 0){
- System.out.println("Error in retriving SnmpLock");
- System.exit(1);
- }
- System.out.println("Spin lock value retrived successfullyn");
- // Since we are reusing the PDU, we will remove the varbinds
- // and set the reqid to 0.
- surg.removeAllVarBinds(pdu1);
- // Initialize the random value based on the protocol used.
- byte[] priv_random = new byte[16]; // always 16 for Priv
-
-
- byte[] oldPrivKey=null;
- if(ownKeyChange){
- oldPrivKey = entry.getPrivKey();
- }
- else{
- System.out.println("Got here 518");
- oldPrivKey=USMUtils.password_to_key(oldAuthProtocol,oldPrivPassword.getBytes(),oldPrivPassword.getBytes().length,engineID);
- }
- String pkcValue=null;
- // Generate the keyChange value based on the secret
- // privKey of the user and the new secret key
- // to be used for the user. Let us call this pkcValue.
- pkcValue = surg.getKeyChangeValue(engID,USMUserEntry.MD5_AUTH,newPrivPassword,oldPrivKey,random,true);
- try{
- priv_random = pkcValue.substring(0,16).getBytes(ENC);
- }catch(Exception e){
- priv_random = pkcValue.substring(0,16).getBytes();
- }
- if(ownKeyChange){
- keyChangeOID = USM_ENTRY + "." + PRIV_OWN_KEY_CHANGE_COL + "."
- + firstindex.length + engIDOID + "."
- + userIndex.length + userNameOID;
- }
- else{
- System.out.println("GOT Here 540 ");
- keyChangeOID = USM_ENTRY + "." + PRIV_KEY_CHANGE_COL + "."
- + firstindex.length + engIDOID + "."
- + userIndex.length + userNameOID;
-
- }
- randomOID = USM_ENTRY + "." + USM_PUBLIC_COL + "." +
- + firstindex.length + engIDOID + "." +
- userIndex.length + userNameOID;
-
- setOID1 = new SnmpOID(SPIN_LOCK_OID);
- surg.addvarbind(pdu1, setOID1,"INTEGER",
- new Integer(spinLock).toString());
-
- setOID2 = new SnmpOID(keyChangeOID); //check this up
- surg.addvarbind(pdu1, setOID2,"STRING",pkcValue);
- setOID3 = new SnmpOID(randomOID);
- try{
- randomString = new String(priv_random,ENC);
- }catch(Exception e){
- randomString = new String(priv_random);
- }
- surg.addvarbind(pdu1, setOID3,"STRING", randomString);
- System.out.println("Sending a request to set the privKeyChangen");
- pdu1.setCommand( SnmpAPI.SET_REQ_MSG );
- try {
- // Send PDU and receive response PDU
- pdu1 = session.syncSend(pdu1);
- } catch (SnmpException e) {
- System.err.println("Sending PDU"+e.getMessage());
- System.exit(1);
- }
- if (pdu1 == null) {
- // timeout
- System.out.println("Request timed out to: " + opt.remArgs[0] );
- System.exit(1);
- }
- System.out.println("Response PDU for keyChange received from " +
- (pdu1.getAddress()).getHostAddress());
- if (pdu1.getErrstat() != 0){
- System.out.println("KeyChange SET request returned error "
- + "User NOT Successfully cloned");
- System.err.println(pdu1.getError());
- System.exit(1);
- }
- else
- // print the response pdu varbinds
- System.out.println(pdu1.printVarBinds());
- // Since we are reusing the PDU, we will remove the varbinds
- // and set the reqid to 0.
- surg.removeAllVarBinds(pdu1);
- //pdu.setReqid(0);
-
- if(ownKeyChange){
- entry.setPrivPassword(newPrivPassword.getBytes());
- byte[] engID1 = null;
- try {
- engID1 = engID.getBytes(ENC);
- }catch(Exception ex) {
- engID1 = engID.getBytes();
- }
- // This is to set the new PrivKey on our side for receiving
- //the usmUserPublic
- // value after it has been set on the Agent.
- byte[] tempKey = USMUtils.password_to_key(authProtocol,
- newPrivPassword.getBytes(),
- newPrivPassword.getBytes().length,
- engID1);
- byte[] newPrivKey = new byte[16];
- System.arraycopy(tempKey,0,newPrivKey,0,16);
- entry.setPrivKey(newPrivKey);
- }
- // Get the usmUserPublic value
- pdu1.setCommand( SnmpAPI.GET_REQ_MSG );
-
- oid = new SnmpOID(randomOID);
- if (oid.toValue() == null)
- System.err.println("Invalid OID argument: " + randomOID);
- else pdu1.addNull(oid);
-
- try {
- // Send PDU and receive response PDU
- pdu1 = session.syncSend(pdu1);
- } catch (SnmpException e) {
- System.err.println("Sending PDU "+e.getMessage());
- System.exit(1);
- }
- if (pdu1 == null) {
- // timeout
- System.out.println("Request timed out to: " + opt.remArgs[0] );
- System.exit(1);
- }
- // print and exit
- System.out.println("Response PDU for usmUserPublic received from " +
- (pdu1.getAddress()).getHostAddress());
-
- // Check for error in response
- if (pdu1.getErrstat() != 0){
- System.out.println("usmUserPublic GET request returned error "
- + "User NOT Successfully cloned");
- System.err.println(pdu1.getError());
- System.exit(1);
- }
- else
- // print the response pdu varbinds
- System.out.println(pdu1.printVarBinds());
- userPublic = (pdu1.getVariable(0)).toString();
- try{
- tempRandom = new String(priv_random,ENC);
- }catch(Exception e){
- tempRandom = new String(priv_random);
- }
- if(userPublic.equals(tempRandom))
- System.out.println("usmUserPulic value is set appropriatelyn");
- else{
- System.out.println("usmUserPulic value is NOT set appropriately");
- System.out.println("User NOT Successfully cloned");
- System.exit(1);
- }
- }
- System.out.println("Key Change SUCCESSFULL!!!");
- // close session
- session.close();
- // stop api thread
- api.close();
-
- System.exit(0);
- }
- int sendSpinLockRequest(SnmpPDU pdu,SnmpSession session)
- {
- // Get the usmUserSpinLock value.
- System.out.println("nSending a request for retriving the " +
- " usmUserSpinLock valuen");
- pdu.setCommand( SnmpAPI.GET_REQ_MSG );
- SnmpOID oid = new SnmpOID(SPIN_LOCK_OID);
- if (oid.toValue() == null)
- System.err.println("Invalid OID argument: " + SPIN_LOCK_OID);
- else
- pdu.addNull(oid);
-
- try {
- // Send PDU and receive response PDU
- pdu = session.syncSend(pdu);
- } catch (SnmpException e) {
- System.err.println("Sending PDU "+e.getMessage());
- // System.exit(1);
- return -1;
- }
- if (pdu == null) {
- // timeout
- System.out.println("Request timed out to: remote host ");
- // System.exit(1);
- return -1;
- }
- // print and exit
- System.out.println("Response PDU for usmUserSpinLock received from " +
- (pdu.getAddress()).getHostAddress());
-
- // Check for error in response
- if (pdu.getErrstat() != 0){
- System.err.println(pdu.getError());
- //System.exit(1);
- return -1;
- }
- else
- // print the response pdu varbinds
- System.out.println(pdu.printVarBinds());
- SnmpVarBind vb = pdu.getVariableBinding(0);
- SnmpVar var = vb.getVariable();
- int spinLock = Integer.parseInt(var.toString());
- return spinLock;
- }
- String getKeyChangeValue(String engID,
- int protocol,String password,
- byte[] keyOld,byte[] random,boolean isPriv)
- {
- byte[] engID1 = null;
- try {
- engID1 = engID.getBytes(ENC);
- }catch(Exception exp) {
- engID1 = engID.getBytes();
- }
- byte[] localizedKey = USMUtils.password_to_key(protocol,
- password.getBytes(),
- password.getBytes().length,
- engID1);
- int keyLength = AUTH_MD5_LEN;
- int hashLength = AUTH_MD5_LEN;
- if(protocol == USMUserEntry.SHA_AUTH && !isPriv)
- {
- keyLength = AUTH_SHA_LEN;
- hashLength = AUTH_SHA_LEN;
- }
-
- if(debug){
- System.out.println("The old localized key is " +
- USMUtils.printOctets(keyOld, keyOld.length) + "n");
- System.out.println("The new localized key is " +
- USMUtils.printOctets(localizedKey, localizedKey.length)
- + "n");
- }
- byte[] keyChange = USMUtils.getKeyChange(protocol,true,keyLength,
- hashLength,localizedKey,keyOld,random);
- if(debug){
- System.out.println("The keyChange is " +
- USMUtils.printOctets(keyChange, keyChange.length) + "n");
- System.out.println("The random is " +
- USMUtils.printOctets(random, random.length) + "n");
- }
- String kChange;
- try{
- kChange = new String(keyChange,ENC);
- }
- catch(Exception e){
- kChange = new String(keyChange);
- }
- return kChange;
- }
- void removeAllVarBinds(SnmpPDU pdu)
- {
- int size = pdu.getVariableBindings().size();
- for(int i = 0; i < size; i++)
- {
- pdu.removeVariableBinding(0);
- }
- }
- static public int[] stringToIntegerArray(String str){
- int[] instanceOID = new int[str.length()];
- byte[] temp = null;
- try {
- temp = str.getBytes(ENC);
- }catch(Exception ex) {
- temp = str.getBytes();
- }
- for (int i=0;i<temp.length;i++)
- instanceOID[i] = (int)(temp[i]) & 0xff;
- return instanceOID;
- }
- static String intArrayToString(int[] intArray) {
- StringBuffer s = new StringBuffer();
- for (int i=0;i<intArray.length;i++)
- s.append("."+Integer.toString(intArray[i]));
- return s.toString();
- }
- /** <img SRC="images/v3only.jpg" ALT="v3 only"> adds the varbind with specified oid, type and value to the pdu */
- static void addvarbind(SnmpPDU pdu, SnmpOID oid, String type, String value)
- {
- byte dataType ;
- if (type.equals("INTEGER")) {
- dataType = SnmpAPI.INTEGER;
- } else if (type.equals("STRING")) {
- dataType = SnmpAPI.STRING;
- } else if (type.equals("GAUGE")) {
- dataType = SnmpAPI.GAUGE;
- } else if (type.equals("TIMETICKS")) {
- dataType = SnmpAPI.TIMETICKS;
- } else if (type.equals("OPAQUE")) {
- dataType = SnmpAPI.OPAQUE;
- } else if (type.equals("IPADDRESS")) {
- dataType = SnmpAPI.IPADDRESS;
- } else if (type.equals("COUNTER")) {
- dataType = SnmpAPI.COUNTER;
- } else if (type.equals("OID")) {
- dataType = SnmpAPI.OBJID;
- } else if (type.equals("BITS")) {
- dataType = SnmpAPI.BITSTRING;
- } else {
- System.err.println("Invalid variable type: " + type);
- return;
- }
- SnmpVar var = null;
- try {
- // create SnmpVar instance for the value and the type
- var = SnmpVar.createVariable( value, dataType );
- }
- catch(SnmpException e){
- System.err.println("Cannot create variable: " +
- oid + " with value: " + value);
- return;
- }
- //create varbind
- SnmpVarBind varbind = new SnmpVarBind(oid, var);
- // add variable binding
- pdu.addVariableBinding(varbind);
- }
- }