--- Begin Message ---
On Fri, 2005-10-07 at 16:21 +0100, Dave Shield wrote:
> On Fri, 2005-10-07 at 18:01 +0300, Andrei Pisau wrote:
> > After I do snmp_send I have the snmp_errno = -5 which means
> > SNMPERR_TOO_LONG. But the session field sndMsgMaxSize is 0, so the
> > conditions for snmp_send to throw SNMPERR_TOO_LONG are not fulfilled.
>
> What about the maximum length for the transport?
> Exceeding that can also trigger an SNMPERR_TOO_LONG error
> (see lines 4782ff of snmp_api.c)
>
I have checked that lines also. How can it be possible to exceed this
limit? I am sending some strings, well formed strings as I have my own
debug that tells me what is happening there.
> Try running the application with '-Dsess_async_send'
> (or equivalent). What does this report?
>
It's a little bit too hard to run it like that, because it's a plugin in
another aplication. I use my own debug.
> The other places where SNMPERR_TOO_LONG is mentioned
> are all related to SNMPv3 processing. Are you sending
> an SNMPv3 trap, or are you using SNMPv1/2c ?
>
I am tring to send SNMPv1 traps.
As I said, this plug-in used to work with a previous version of
net-snmp. Now, I have seen that the error and return codes are changed,
I have changed it to match.
I run snmptrap with -Dsess_async_send and no debug was printed. As I
constructed the plugin following the snmptrap.c file, with the
difference that I take my parameters from a file, I expect to work the
same, but it doesn't.
I will review again the code, maybe I miss something.
Thank you!
> Dave
>
>
> -------------------------------------------------------
> This SF.Net email is sponsored by:
> Power Architecture Resource Center: Free content, downloads, discussions,
> and more. http://solutions.newsforge.com/ibmarch.tmpl
> _______________________________________________
> Net-snmp-coders mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
>
>
--- End Message ---
--
This message was scanned for spam and viruses by BitDefender.
For more information please visit http://www.bitdefender.com/