/* $NetBSD: cfparse.y,v 1.18.4.7 2008/07/21 20:45:32 tteras Exp $ */
|
|
/* Id: cfparse.y,v 1.66 2006/08/22 18:17:17 manubsd Exp */
|
|
%{
|
/*
|
* Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 and 2003 WIDE Project.
|
* All rights reserved.
|
*
|
* Redistribution and use in source and binary forms, with or without
|
* modification, are permitted provided that the following conditions
|
* are met:
|
* 1. Redistributions of source code must retain the above copyright
|
* notice, this list of conditions and the following disclaimer.
|
* 2. Redistributions in binary form must reproduce the above copyright
|
* notice, this list of conditions and the following disclaimer in the
|
* documentation and/or other materials provided with the distribution.
|
* 3. Neither the name of the project nor the names of its contributors
|
* may be used to endorse or promote products derived from this software
|
* without specific prior written permission.
|
*
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* SUCH DAMAGE.
|
*/
|
|
#include "config.h"
|
|
#include <sys/types.h>
|
#include <sys/param.h>
|
#include <sys/queue.h>
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
#include PATH_IPSEC_H
|
|
#ifdef ENABLE_HYBRID
|
#include <arpa/inet.h>
|
#endif
|
|
#include <stdlib.h>
|
#include <stdio.h>
|
#include <string.h>
|
#include <errno.h>
|
#include <netdb.h>
|
#include <pwd.h>
|
#include <grp.h>
|
|
#include "var.h"
|
#include "misc.h"
|
#include "vmbuf.h"
|
#include "plog.h"
|
#include "sockmisc.h"
|
#include "str2val.h"
|
#include "genlist.h"
|
#include "debug.h"
|
|
#include "admin.h"
|
#include "privsep.h"
|
#include "cfparse_proto.h"
|
#include "cftoken_proto.h"
|
#include "algorithm.h"
|
#include "localconf.h"
|
#include "policy.h"
|
#include "sainfo.h"
|
#include "oakley.h"
|
#include "pfkey.h"
|
#include "remoteconf.h"
|
#include "grabmyaddr.h"
|
#include "isakmp_var.h"
|
#include "handler.h"
|
#include "isakmp.h"
|
#include "nattraversal.h"
|
#include "isakmp_frag.h"
|
#ifdef ENABLE_HYBRID
|
#include "resolv.h"
|
#include "isakmp_unity.h"
|
#include "isakmp_xauth.h"
|
#include "isakmp_cfg.h"
|
#endif
|
#include "ipsec_doi.h"
|
#include "strnames.h"
|
#include "gcmalloc.h"
|
#ifdef HAVE_GSSAPI
|
#include "gssapi.h"
|
#endif
|
#include "vendorid.h"
|
#include "rsalist.h"
|
|
struct proposalspec {
|
time_t lifetime; /* for isakmp/ipsec */
|
int lifebyte; /* for isakmp/ipsec */
|
struct secprotospec *spspec; /* the head is always current spec. */
|
struct proposalspec *next; /* the tail is the most prefered. */
|
struct proposalspec *prev;
|
};
|
|
struct secprotospec {
|
int prop_no;
|
int trns_no;
|
int strength; /* for isakmp/ipsec */
|
int encklen; /* for isakmp/ipsec */
|
time_t lifetime; /* for isakmp */
|
int lifebyte; /* for isakmp */
|
int proto_id; /* for ipsec (isakmp?) */
|
int ipsec_level; /* for ipsec */
|
int encmode; /* for ipsec */
|
int vendorid; /* for isakmp */
|
char *gssid;
|
struct sockaddr *remote;
|
int algclass[MAXALGCLASS];
|
|
struct secprotospec *next; /* the tail is the most prefiered. */
|
struct secprotospec *prev;
|
struct proposalspec *back;
|
};
|
|
static int num2dhgroup[] = {
|
0,
|
OAKLEY_ATTR_GRP_DESC_MODP768,
|
OAKLEY_ATTR_GRP_DESC_MODP1024,
|
OAKLEY_ATTR_GRP_DESC_EC2N155,
|
OAKLEY_ATTR_GRP_DESC_EC2N185,
|
OAKLEY_ATTR_GRP_DESC_MODP1536,
|
0,
|
0,
|
0,
|
0,
|
0,
|
0,
|
0,
|
0,
|
OAKLEY_ATTR_GRP_DESC_MODP2048,
|
OAKLEY_ATTR_GRP_DESC_MODP3072,
|
OAKLEY_ATTR_GRP_DESC_MODP4096,
|
OAKLEY_ATTR_GRP_DESC_MODP6144,
|
OAKLEY_ATTR_GRP_DESC_MODP8192
|
};
|
|
static struct remoteconf *cur_rmconf;
|
static int tmpalgtype[MAXALGCLASS];
|
static struct sainfo *cur_sainfo;
|
static int cur_algclass;
|
static int oldloglevel = LLV_BASE;
|
|
static struct proposalspec *newprspec __P((void));
|
static void insprspec __P((struct proposalspec *, struct proposalspec **));
|
static struct secprotospec *newspspec __P((void));
|
static void insspspec __P((struct secprotospec *, struct proposalspec **));
|
static void adminsock_conf __P((vchar_t *, vchar_t *, vchar_t *, int));
|
|
static int set_isakmp_proposal
|
__P((struct remoteconf *, struct proposalspec *));
|
static void clean_tmpalgtype __P((void));
|
static int expand_isakmpspec __P((int, int, int *,
|
int, int, time_t, int, int, int, char *, struct remoteconf *));
|
static int listen_addr __P((struct sockaddr *addr, int udp_encap));
|
|
void freeetypes (struct etypes **etypes);
|
|
#if 0
|
static int fix_lifebyte __P((u_long));
|
#endif
|
%}
|
|
%union {
|
unsigned long num;
|
vchar_t *val;
|
struct remoteconf *rmconf;
|
struct sockaddr *saddr;
|
struct sainfoalg *alg;
|
}
|
|
/* privsep */
|
%token PRIVSEP USER GROUP CHROOT
|
/* path */
|
%token PATH PATHTYPE
|
/* include */
|
%token INCLUDE
|
/* self information */
|
%token IDENTIFIER VENDORID
|
/* logging */
|
%token LOGGING LOGLEV
|
/* padding */
|
%token PADDING PAD_RANDOMIZE PAD_RANDOMIZELEN PAD_MAXLEN PAD_STRICT PAD_EXCLTAIL
|
/* listen */
|
%token LISTEN X_ISAKMP X_ISAKMP_NATT X_ADMIN STRICT_ADDRESS ADMINSOCK DISABLED
|
/* ldap config */
|
%token LDAPCFG LDAP_HOST LDAP_PORT LDAP_PVER LDAP_BASE LDAP_BIND_DN LDAP_BIND_PW LDAP_SUBTREE
|
%token LDAP_ATTR_USER LDAP_ATTR_ADDR LDAP_ATTR_MASK LDAP_ATTR_GROUP LDAP_ATTR_MEMBER
|
/* modecfg */
|
%token MODECFG CFG_NET4 CFG_MASK4 CFG_DNS4 CFG_NBNS4 CFG_DEFAULT_DOMAIN
|
%token CFG_AUTH_SOURCE CFG_AUTH_GROUPS CFG_SYSTEM CFG_RADIUS CFG_PAM CFG_LDAP CFG_LOCAL CFG_NONE
|
%token CFG_GROUP_SOURCE CFG_ACCOUNTING CFG_CONF_SOURCE CFG_MOTD CFG_POOL_SIZE CFG_AUTH_THROTTLE
|
%token CFG_SPLIT_NETWORK CFG_SPLIT_LOCAL CFG_SPLIT_INCLUDE CFG_SPLIT_DNS
|
%token CFG_PFS_GROUP CFG_SAVE_PASSWD
|
|
/* timer */
|
%token RETRY RETRY_COUNTER RETRY_INTERVAL RETRY_PERSEND
|
%token RETRY_PHASE1 RETRY_PHASE2 NATT_KA
|
/* algorithm */
|
%token ALGORITHM_CLASS ALGORITHMTYPE STRENGTHTYPE
|
/* sainfo */
|
%token SAINFO FROM
|
/* remote */
|
%token REMOTE ANONYMOUS INHERIT
|
%token EXCHANGE_MODE EXCHANGETYPE DOI DOITYPE SITUATION SITUATIONTYPE
|
%token CERTIFICATE_TYPE CERTTYPE PEERS_CERTFILE CA_TYPE
|
%token VERIFY_CERT SEND_CERT SEND_CR
|
%token IDENTIFIERTYPE IDENTIFIERQUAL MY_IDENTIFIER
|
%token PEERS_IDENTIFIER VERIFY_IDENTIFIER
|
%token DNSSEC CERT_X509 CERT_PLAINRSA
|
%token NONCE_SIZE DH_GROUP KEEPALIVE PASSIVE INITIAL_CONTACT
|
%token NAT_TRAVERSAL REMOTE_FORCE_LEVEL
|
%token PROPOSAL_CHECK PROPOSAL_CHECK_LEVEL
|
%token GENERATE_POLICY GENERATE_LEVEL SUPPORT_PROXY
|
%token PROPOSAL
|
%token EXEC_PATH EXEC_COMMAND EXEC_SUCCESS EXEC_FAILURE
|
%token GSS_ID GSS_ID_ENC GSS_ID_ENCTYPE
|
%token COMPLEX_BUNDLE
|
%token DPD DPD_DELAY DPD_RETRY DPD_MAXFAIL
|
%token PH1ID
|
%token XAUTH_LOGIN WEAK_PHASE1_CHECK
|
|
%token PREFIX PORT PORTANY UL_PROTO ANY IKE_FRAG ESP_FRAG MODE_CFG
|
%token PFS_GROUP LIFETIME LIFETYPE_TIME LIFETYPE_BYTE STRENGTH REMOTEID
|
|
%token SCRIPT PHASE1_UP PHASE1_DOWN
|
|
%token NUMBER SWITCH BOOLEAN
|
%token HEXSTRING QUOTEDSTRING ADDRSTRING ADDRRANGE
|
%token UNITTYPE_BYTE UNITTYPE_KBYTES UNITTYPE_MBYTES UNITTYPE_TBYTES
|
%token UNITTYPE_SEC UNITTYPE_MIN UNITTYPE_HOUR
|
%token EOS BOC EOC COMMA
|
|
%type <num> NUMBER BOOLEAN SWITCH keylength
|
%type <num> PATHTYPE IDENTIFIERTYPE IDENTIFIERQUAL LOGLEV GSS_ID_ENCTYPE
|
%type <num> ALGORITHM_CLASS dh_group_num
|
%type <num> ALGORITHMTYPE STRENGTHTYPE
|
%type <num> PREFIX prefix PORT port ike_port
|
%type <num> ul_proto UL_PROTO
|
%type <num> EXCHANGETYPE DOITYPE SITUATIONTYPE
|
%type <num> CERTTYPE CERT_X509 CERT_PLAINRSA PROPOSAL_CHECK_LEVEL REMOTE_FORCE_LEVEL GENERATE_LEVEL
|
%type <num> unittype_time unittype_byte
|
%type <val> QUOTEDSTRING HEXSTRING ADDRSTRING ADDRRANGE sainfo_id
|
%type <val> identifierstring
|
%type <saddr> remote_index ike_addrinfo_port
|
%type <alg> algorithm
|
|
%%
|
|
statements
|
: /* nothing */
|
| statements statement
|
;
|
statement
|
: privsep_statement
|
| path_statement
|
| include_statement
|
| gssenc_statement
|
| identifier_statement
|
| logging_statement
|
| padding_statement
|
| listen_statement
|
| ldapcfg_statement
|
| modecfg_statement
|
| timer_statement
|
| sainfo_statement
|
| remote_statement
|
| special_statement
|
;
|
|
/* privsep */
|
privsep_statement
|
: PRIVSEP BOC privsep_stmts EOC
|
;
|
privsep_stmts
|
: /* nothing */
|
| privsep_stmts privsep_stmt
|
;
|
privsep_stmt
|
: USER QUOTEDSTRING
|
{
|
struct passwd *pw;
|
|
if ((pw = getpwnam($2->v)) == NULL) {
|
yyerror("unknown user \"%s\"", $2->v);
|
return -1;
|
}
|
lcconf->uid = pw->pw_uid;
|
}
|
EOS
|
| USER NUMBER { lcconf->uid = $2; } EOS
|
| GROUP QUOTEDSTRING
|
{
|
struct group *gr;
|
|
if ((gr = getgrnam($2->v)) == NULL) {
|
yyerror("unknown group \"%s\"", $2->v);
|
return -1;
|
}
|
lcconf->gid = gr->gr_gid;
|
}
|
EOS
|
| GROUP NUMBER { lcconf->gid = $2; } EOS
|
| CHROOT QUOTEDSTRING { lcconf->chroot = $2->v; } EOS
|
;
|
|
/* path */
|
path_statement
|
: PATH PATHTYPE QUOTEDSTRING
|
{
|
if ($2 >= LC_PATHTYPE_MAX) {
|
yyerror("invalid path type %d", $2);
|
return -1;
|
}
|
|
/* free old pathinfo */
|
if (lcconf->pathinfo[$2])
|
racoon_free(lcconf->pathinfo[$2]);
|
|
/* set new pathinfo */
|
lcconf->pathinfo[$2] = racoon_strdup($3->v);
|
STRDUP_FATAL(lcconf->pathinfo[$2]);
|
vfree($3);
|
}
|
EOS
|
;
|
|
/* special */
|
special_statement
|
: COMPLEX_BUNDLE SWITCH { lcconf->complex_bundle = $2; } EOS
|
;
|
|
/* include */
|
include_statement
|
: INCLUDE QUOTEDSTRING EOS
|
{
|
char path[MAXPATHLEN];
|
|
getpathname(path, sizeof(path),
|
LC_PATHTYPE_INCLUDE, $2->v);
|
vfree($2);
|
if (yycf_switch_buffer(path) != 0)
|
return -1;
|
}
|
;
|
|
/* gss_id_enc */
|
gssenc_statement
|
: GSS_ID_ENC GSS_ID_ENCTYPE EOS
|
{
|
if ($2 >= LC_GSSENC_MAX) {
|
yyerror("invalid GSS ID encoding %d", $2);
|
return -1;
|
}
|
lcconf->gss_id_enc = $2;
|
}
|
;
|
|
/* self information */
|
identifier_statement
|
: IDENTIFIER identifier_stmt
|
;
|
identifier_stmt
|
: VENDORID
|
{
|
/*XXX to be deleted */
|
}
|
QUOTEDSTRING EOS
|
| IDENTIFIERTYPE QUOTEDSTRING
|
{
|
/*XXX to be deleted */
|
$2->l--; /* nuke '\0' */
|
lcconf->ident[$1] = $2;
|
if (lcconf->ident[$1] == NULL) {
|
yyerror("failed to set my ident: %s",
|
strerror(errno));
|
return -1;
|
}
|
}
|
EOS
|
;
|
|
/* logging */
|
logging_statement
|
: LOGGING log_level EOS
|
;
|
log_level
|
: HEXSTRING
|
{
|
/*
|
* XXX ignore it because this specification
|
* will be obsoleted.
|
*/
|
yywarn("see racoon.conf(5), such a log specification will be obsoleted.");
|
vfree($1);
|
}
|
| LOGLEV
|
{
|
/*
|
* set the loglevel to the value specified
|
* in the configuration file plus the number
|
* of -d options specified on the command line
|
*/
|
loglevel += $1 - oldloglevel;
|
oldloglevel = $1;
|
}
|
;
|
|
/* padding */
|
padding_statement
|
: PADDING BOC padding_stmts EOC
|
;
|
padding_stmts
|
: /* nothing */
|
| padding_stmts padding_stmt
|
;
|
padding_stmt
|
: PAD_RANDOMIZE SWITCH { lcconf->pad_random = $2; } EOS
|
| PAD_RANDOMIZELEN SWITCH { lcconf->pad_randomlen = $2; } EOS
|
| PAD_MAXLEN NUMBER { lcconf->pad_maxsize = $2; } EOS
|
| PAD_STRICT SWITCH { lcconf->pad_strict = $2; } EOS
|
| PAD_EXCLTAIL SWITCH { lcconf->pad_excltail = $2; } EOS
|
;
|
|
/* listen */
|
listen_statement
|
: LISTEN BOC listen_stmts EOC
|
;
|
listen_stmts
|
: /* nothing */
|
| listen_stmts listen_stmt
|
;
|
listen_stmt
|
: X_ISAKMP ike_addrinfo_port
|
{
|
listen_addr ($2, 0);
|
}
|
EOS
|
| X_ISAKMP_NATT ike_addrinfo_port
|
{
|
#ifdef ENABLE_NATT
|
listen_addr ($2, 1);
|
#else
|
yyerror("NAT-T support not compiled in.");
|
#endif
|
}
|
EOS
|
| X_ADMIN
|
{
|
yyerror("admin directive is obsoleted.");
|
}
|
PORT EOS
|
| ADMINSOCK QUOTEDSTRING QUOTEDSTRING QUOTEDSTRING NUMBER
|
{
|
#ifdef ENABLE_ADMINPORT
|
adminsock_conf($2, $3, $4, $5);
|
#else
|
yywarn("admin port support not compiled in");
|
#endif
|
}
|
EOS
|
| ADMINSOCK QUOTEDSTRING
|
{
|
#ifdef ENABLE_ADMINPORT
|
adminsock_conf($2, NULL, NULL, -1);
|
#else
|
yywarn("admin port support not compiled in");
|
#endif
|
}
|
EOS
|
| ADMINSOCK DISABLED
|
{
|
#ifdef ENABLE_ADMINPORT
|
adminsock_path = NULL;
|
#else
|
yywarn("admin port support not compiled in");
|
#endif
|
}
|
EOS
|
| STRICT_ADDRESS { lcconf->strict_address = TRUE; } EOS
|
;
|
ike_addrinfo_port
|
: ADDRSTRING ike_port
|
{
|
char portbuf[10];
|
|
snprintf(portbuf, sizeof(portbuf), "%ld", $2);
|
$$ = str2saddr($1->v, portbuf);
|
vfree($1);
|
if (!$$)
|
return -1;
|
}
|
;
|
ike_port
|
: /* nothing */ { $$ = PORT_ISAKMP; }
|
| PORT { $$ = $1; }
|
;
|
|
/* ldap configuration */
|
ldapcfg_statement
|
: LDAPCFG {
|
#ifndef ENABLE_HYBRID
|
yyerror("racoon not configured with --enable-hybrid");
|
return -1;
|
#endif
|
#ifndef HAVE_LIBLDAP
|
yyerror("racoon not configured with --with-libldap");
|
return -1;
|
#endif
|
} BOC ldapcfg_stmts EOC
|
;
|
ldapcfg_stmts
|
: /* nothing */
|
| ldapcfg_stmts ldapcfg_stmt
|
;
|
ldapcfg_stmt
|
: LDAP_PVER NUMBER
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (($2<2)||($2>3))
|
yyerror("invalid ldap protocol version (2|3)");
|
xauth_ldap_config.pver = $2;
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_HOST QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.host != NULL)
|
vfree(xauth_ldap_config.host);
|
xauth_ldap_config.host = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_PORT NUMBER
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
xauth_ldap_config.port = $2;
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_BASE QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.base != NULL)
|
vfree(xauth_ldap_config.base);
|
xauth_ldap_config.base = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_SUBTREE SWITCH
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
xauth_ldap_config.subtree = $2;
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_BIND_DN QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.bind_dn != NULL)
|
vfree(xauth_ldap_config.bind_dn);
|
xauth_ldap_config.bind_dn = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_BIND_PW QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.bind_pw != NULL)
|
vfree(xauth_ldap_config.bind_pw);
|
xauth_ldap_config.bind_pw = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_ATTR_USER QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.attr_user != NULL)
|
vfree(xauth_ldap_config.attr_user);
|
xauth_ldap_config.attr_user = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_ATTR_ADDR QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.attr_addr != NULL)
|
vfree(xauth_ldap_config.attr_addr);
|
xauth_ldap_config.attr_addr = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_ATTR_MASK QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.attr_mask != NULL)
|
vfree(xauth_ldap_config.attr_mask);
|
xauth_ldap_config.attr_mask = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_ATTR_GROUP QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.attr_group != NULL)
|
vfree(xauth_ldap_config.attr_group);
|
xauth_ldap_config.attr_group = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
| LDAP_ATTR_MEMBER QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
if (xauth_ldap_config.attr_member != NULL)
|
vfree(xauth_ldap_config.attr_member);
|
xauth_ldap_config.attr_member = vdup($2);
|
#endif
|
#endif
|
}
|
EOS
|
;
|
|
/* modecfg */
|
modecfg_statement
|
: MODECFG BOC modecfg_stmts EOC
|
;
|
modecfg_stmts
|
: /* nothing */
|
| modecfg_stmts modecfg_stmt
|
;
|
modecfg_stmt
|
: CFG_NET4 ADDRSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
if (inet_pton(AF_INET, $2->v,
|
&isakmp_cfg_config.network4) != 1)
|
yyerror("bad IPv4 network address.");
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_MASK4 ADDRSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
if (inet_pton(AF_INET, $2->v,
|
&isakmp_cfg_config.netmask4) != 1)
|
yyerror("bad IPv4 netmask address.");
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_DNS4 addrdnslist
|
EOS
|
| CFG_NBNS4 addrwinslist
|
EOS
|
| CFG_SPLIT_NETWORK CFG_SPLIT_LOCAL splitnetlist
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.splitnet_type = UNITY_LOCAL_LAN;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_SPLIT_NETWORK CFG_SPLIT_INCLUDE splitnetlist
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.splitnet_type = UNITY_SPLIT_INCLUDE;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_SPLIT_DNS splitdnslist
|
{
|
#ifndef ENABLE_HYBRID
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_DEFAULT_DOMAIN QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
strncpy(&isakmp_cfg_config.default_domain[0],
|
$2->v, MAXPATHLEN);
|
isakmp_cfg_config.default_domain[MAXPATHLEN] = '\0';
|
vfree($2);
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_AUTH_SOURCE CFG_SYSTEM
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.authsource = ISAKMP_CFG_AUTH_SYSTEM;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_AUTH_SOURCE CFG_RADIUS
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBRADIUS
|
isakmp_cfg_config.authsource = ISAKMP_CFG_AUTH_RADIUS;
|
#else /* HAVE_LIBRADIUS */
|
yyerror("racoon not configured with --with-libradius");
|
#endif /* HAVE_LIBRADIUS */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_AUTH_SOURCE CFG_PAM
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBPAM
|
isakmp_cfg_config.authsource = ISAKMP_CFG_AUTH_PAM;
|
#else /* HAVE_LIBPAM */
|
yyerror("racoon not configured with --with-libpam");
|
#endif /* HAVE_LIBPAM */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_AUTH_SOURCE CFG_LDAP
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
isakmp_cfg_config.authsource = ISAKMP_CFG_AUTH_LDAP;
|
#else /* HAVE_LIBLDAP */
|
yyerror("racoon not configured with --with-libldap");
|
#endif /* HAVE_LIBLDAP */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_AUTH_GROUPS authgrouplist
|
{
|
#ifndef ENABLE_HYBRID
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_GROUP_SOURCE CFG_SYSTEM
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.groupsource = ISAKMP_CFG_GROUP_SYSTEM;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_GROUP_SOURCE CFG_LDAP
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
isakmp_cfg_config.groupsource = ISAKMP_CFG_GROUP_LDAP;
|
#else /* HAVE_LIBLDAP */
|
yyerror("racoon not configured with --with-libldap");
|
#endif /* HAVE_LIBLDAP */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_ACCOUNTING CFG_NONE
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.accounting = ISAKMP_CFG_ACCT_NONE;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_ACCOUNTING CFG_SYSTEM
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.accounting = ISAKMP_CFG_ACCT_SYSTEM;
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| CFG_ACCOUNTING CFG_RADIUS
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBRADIUS
|
isakmp_cfg_config.accounting = ISAKMP_CFG_ACCT_RADIUS;
|
#else /* HAVE_LIBRADIUS */
|
yyerror("racoon not configured with --with-libradius");
|
#endif /* HAVE_LIBRADIUS */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_ACCOUNTING CFG_PAM
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBPAM
|
isakmp_cfg_config.accounting = ISAKMP_CFG_ACCT_PAM;
|
#else /* HAVE_LIBPAM */
|
yyerror("racoon not configured with --with-libpam");
|
#endif /* HAVE_LIBPAM */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_POOL_SIZE NUMBER
|
{
|
#ifdef ENABLE_HYBRID
|
if (isakmp_cfg_resize_pool($2) != 0)
|
yyerror("cannot allocate memory for pool");
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_PFS_GROUP NUMBER
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.pfs_group = $2;
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_SAVE_PASSWD SWITCH
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.save_passwd = $2;
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_AUTH_THROTTLE NUMBER
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.auth_throttle = $2;
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_CONF_SOURCE CFG_LOCAL
|
{
|
#ifdef ENABLE_HYBRID
|
isakmp_cfg_config.confsource = ISAKMP_CFG_CONF_LOCAL;
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_CONF_SOURCE CFG_RADIUS
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBRADIUS
|
isakmp_cfg_config.confsource = ISAKMP_CFG_CONF_RADIUS;
|
#else /* HAVE_LIBRADIUS */
|
yyerror("racoon not configured with --with-libradius");
|
#endif /* HAVE_LIBRADIUS */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_CONF_SOURCE CFG_LDAP
|
{
|
#ifdef ENABLE_HYBRID
|
#ifdef HAVE_LIBLDAP
|
isakmp_cfg_config.confsource = ISAKMP_CFG_CONF_LDAP;
|
#else /* HAVE_LIBLDAP */
|
yyerror("racoon not configured with --with-libldap");
|
#endif /* HAVE_LIBLDAP */
|
#else /* ENABLE_HYBRID */
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif /* ENABLE_HYBRID */
|
}
|
EOS
|
| CFG_MOTD QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
strncpy(&isakmp_cfg_config.motd[0], $2->v, MAXPATHLEN);
|
isakmp_cfg_config.motd[MAXPATHLEN] = '\0';
|
vfree($2);
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
;
|
|
addrdnslist
|
: addrdns
|
| addrdns COMMA addrdnslist
|
;
|
addrdns
|
: ADDRSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
struct isakmp_cfg_config *icc = &isakmp_cfg_config;
|
|
if (icc->dns4_index > MAXNS)
|
yyerror("No more than %d DNS", MAXNS);
|
if (inet_pton(AF_INET, $1->v,
|
&icc->dns4[icc->dns4_index++]) != 1)
|
yyerror("bad IPv4 DNS address.");
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
;
|
|
addrwinslist
|
: addrwins
|
| addrwins COMMA addrwinslist
|
;
|
addrwins
|
: ADDRSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
struct isakmp_cfg_config *icc = &isakmp_cfg_config;
|
|
if (icc->nbns4_index > MAXWINS)
|
yyerror("No more than %d WINS", MAXWINS);
|
if (inet_pton(AF_INET, $1->v,
|
&icc->nbns4[icc->nbns4_index++]) != 1)
|
yyerror("bad IPv4 WINS address.");
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
;
|
|
splitnetlist
|
: splitnet
|
| splitnetlist COMMA splitnet
|
;
|
splitnet
|
: ADDRSTRING PREFIX
|
{
|
#ifdef ENABLE_HYBRID
|
struct isakmp_cfg_config *icc = &isakmp_cfg_config;
|
struct unity_network network;
|
memset(&network,0,sizeof(network));
|
|
if (inet_pton(AF_INET, $1->v, &network.addr4) != 1)
|
yyerror("bad IPv4 SPLIT address.");
|
|
/* Turn $2 (the prefix) into a subnet mask */
|
network.mask4.s_addr = ($2) ? htonl(~((1 << (32 - $2)) - 1)) : 0;
|
|
/* add the network to our list */
|
if (splitnet_list_add(&icc->splitnet_list, &network,&icc->splitnet_count))
|
yyerror("Unable to allocate split network");
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
;
|
|
authgrouplist
|
: authgroup
|
| authgroup COMMA authgrouplist
|
;
|
authgroup
|
: QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
char * groupname = NULL;
|
char ** grouplist = NULL;
|
struct isakmp_cfg_config *icc = &isakmp_cfg_config;
|
|
grouplist = racoon_realloc(icc->grouplist,
|
sizeof(char**)*(icc->groupcount+1));
|
if (grouplist == NULL)
|
yyerror("unable to allocate auth group list");
|
|
groupname = racoon_malloc($1->l+1);
|
if (groupname == NULL)
|
yyerror("unable to allocate auth group name");
|
|
memcpy(groupname,$1->v,$1->l);
|
groupname[$1->l]=0;
|
grouplist[icc->groupcount]=groupname;
|
icc->grouplist = grouplist;
|
icc->groupcount++;
|
|
vfree($1);
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
;
|
|
splitdnslist
|
: splitdns
|
| splitdns COMMA splitdnslist
|
;
|
splitdns
|
: QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
struct isakmp_cfg_config *icc = &isakmp_cfg_config;
|
|
if (!icc->splitdns_len)
|
{
|
icc->splitdns_list = racoon_malloc($1->l);
|
if(icc->splitdns_list == NULL)
|
yyerror("error allocating splitdns list buffer");
|
memcpy(icc->splitdns_list,$1->v,$1->l);
|
icc->splitdns_len = $1->l;
|
}
|
else
|
{
|
int len = icc->splitdns_len + $1->l + 1;
|
icc->splitdns_list = racoon_realloc(icc->splitdns_list,len);
|
if(icc->splitdns_list == NULL)
|
yyerror("error allocating splitdns list buffer");
|
icc->splitdns_list[icc->splitdns_len] = ',';
|
memcpy(icc->splitdns_list + icc->splitdns_len + 1, $1->v, $1->l);
|
icc->splitdns_len = len;
|
}
|
vfree($1);
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
;
|
|
|
/* timer */
|
timer_statement
|
: RETRY BOC timer_stmts EOC
|
;
|
timer_stmts
|
: /* nothing */
|
| timer_stmts timer_stmt
|
;
|
timer_stmt
|
: RETRY_COUNTER NUMBER
|
{
|
lcconf->retry_counter = $2;
|
}
|
EOS
|
| RETRY_INTERVAL NUMBER unittype_time
|
{
|
lcconf->retry_interval = $2 * $3;
|
}
|
EOS
|
| RETRY_PERSEND NUMBER
|
{
|
lcconf->count_persend = $2;
|
}
|
EOS
|
| RETRY_PHASE1 NUMBER unittype_time
|
{
|
lcconf->retry_checkph1 = $2 * $3;
|
}
|
EOS
|
| RETRY_PHASE2 NUMBER unittype_time
|
{
|
lcconf->wait_ph2complete = $2 * $3;
|
}
|
EOS
|
| NATT_KA NUMBER unittype_time
|
{
|
#ifdef ENABLE_NATT
|
if (libipsec_opt & LIBIPSEC_OPT_NATT)
|
lcconf->natt_ka_interval = $2 * $3;
|
else
|
yyerror("libipsec lacks NAT-T support");
|
#else
|
yyerror("NAT-T support not compiled in.");
|
#endif
|
}
|
EOS
|
;
|
|
/* sainfo */
|
sainfo_statement
|
: SAINFO
|
{
|
cur_sainfo = newsainfo();
|
if (cur_sainfo == NULL) {
|
yyerror("failed to allocate sainfo");
|
return -1;
|
}
|
}
|
sainfo_name sainfo_param BOC sainfo_specs
|
{
|
struct sainfo *check;
|
|
/* default */
|
if (cur_sainfo->algs[algclass_ipsec_enc] == 0) {
|
yyerror("no encryption algorithm at %s",
|
sainfo2str(cur_sainfo));
|
return -1;
|
}
|
if (cur_sainfo->algs[algclass_ipsec_auth] == 0) {
|
yyerror("no authentication algorithm at %s",
|
sainfo2str(cur_sainfo));
|
return -1;
|
}
|
if (cur_sainfo->algs[algclass_ipsec_comp] == 0) {
|
yyerror("no compression algorithm at %s",
|
sainfo2str(cur_sainfo));
|
return -1;
|
}
|
|
/* duplicate check */
|
check = getsainfo(cur_sainfo->idsrc,
|
cur_sainfo->iddst,
|
cur_sainfo->id_i,
|
cur_sainfo->remoteid);
|
if (check && (!check->idsrc && !cur_sainfo->idsrc)) {
|
yyerror("duplicated sainfo: %s",
|
sainfo2str(cur_sainfo));
|
return -1;
|
}
|
inssainfo(cur_sainfo);
|
}
|
EOC
|
;
|
sainfo_name
|
: ANONYMOUS
|
{
|
cur_sainfo->idsrc = NULL;
|
cur_sainfo->iddst = NULL;
|
}
|
| ANONYMOUS sainfo_id
|
{
|
cur_sainfo->idsrc = NULL;
|
cur_sainfo->iddst = $2;
|
}
|
| sainfo_id ANONYMOUS
|
{
|
cur_sainfo->idsrc = $1;
|
cur_sainfo->iddst = NULL;
|
}
|
| sainfo_id sainfo_id
|
{
|
cur_sainfo->idsrc = $1;
|
cur_sainfo->iddst = $2;
|
}
|
;
|
sainfo_id
|
: IDENTIFIERTYPE ADDRSTRING prefix port ul_proto
|
{
|
char portbuf[10];
|
struct sockaddr *saddr;
|
|
if (($5 == IPPROTO_ICMP || $5 == IPPROTO_ICMPV6)
|
&& ($4 != IPSEC_PORT_ANY || $4 != IPSEC_PORT_ANY)) {
|
yyerror("port number must be \"any\".");
|
return -1;
|
}
|
|
snprintf(portbuf, sizeof(portbuf), "%lu", $4);
|
saddr = str2saddr($2->v, portbuf);
|
vfree($2);
|
if (saddr == NULL)
|
return -1;
|
|
switch (saddr->sa_family) {
|
case AF_INET:
|
if ($5 == IPPROTO_ICMPV6) {
|
yyerror("upper layer protocol mismatched.\n");
|
racoon_free(saddr);
|
return -1;
|
}
|
$$ = ipsecdoi_sockaddr2id(saddr,
|
$3 == ~0 ? (sizeof(struct in_addr) << 3): $3,
|
$5);
|
break;
|
#ifdef INET6
|
case AF_INET6:
|
if ($5 == IPPROTO_ICMP) {
|
yyerror("upper layer protocol mismatched.\n");
|
racoon_free(saddr);
|
return -1;
|
}
|
$$ = ipsecdoi_sockaddr2id(saddr,
|
$3 == ~0 ? (sizeof(struct in6_addr) << 3): $3,
|
$5);
|
break;
|
#endif
|
default:
|
yyerror("invalid family: %d", saddr->sa_family);
|
$$ = NULL;
|
break;
|
}
|
racoon_free(saddr);
|
if ($$ == NULL)
|
return -1;
|
}
|
| IDENTIFIERTYPE ADDRSTRING ADDRRANGE prefix port ul_proto
|
{
|
char portbuf[10];
|
struct sockaddr *laddr = NULL, *haddr = NULL;
|
char *cur = NULL;
|
|
if (($6 == IPPROTO_ICMP || $6 == IPPROTO_ICMPV6)
|
&& ($5 != IPSEC_PORT_ANY || $5 != IPSEC_PORT_ANY)) {
|
yyerror("port number must be \"any\".");
|
return -1;
|
}
|
|
snprintf(portbuf, sizeof(portbuf), "%lu", $5);
|
|
laddr = str2saddr($2->v, portbuf);
|
if (laddr == NULL) {
|
return -1;
|
}
|
vfree($2);
|
haddr = str2saddr($3->v, portbuf);
|
if (haddr == NULL) {
|
racoon_free(laddr);
|
return -1;
|
}
|
vfree($3);
|
|
switch (laddr->sa_family) {
|
case AF_INET:
|
if ($6 == IPPROTO_ICMPV6) {
|
yyerror("upper layer protocol mismatched.\n");
|
if (laddr)
|
racoon_free(laddr);
|
if (haddr)
|
racoon_free(haddr);
|
return -1;
|
}
|
$$ = ipsecdoi_sockrange2id(laddr, haddr,
|
$6);
|
break;
|
#ifdef INET6
|
case AF_INET6:
|
if ($6 == IPPROTO_ICMP) {
|
yyerror("upper layer protocol mismatched.\n");
|
if (laddr)
|
racoon_free(laddr);
|
if (haddr)
|
racoon_free(haddr);
|
return -1;
|
}
|
$$ = ipsecdoi_sockrange2id(laddr, haddr,
|
$6);
|
break;
|
#endif
|
default:
|
yyerror("invalid family: %d", laddr->sa_family);
|
$$ = NULL;
|
break;
|
}
|
if (laddr)
|
racoon_free(laddr);
|
if (haddr)
|
racoon_free(haddr);
|
if ($$ == NULL)
|
return -1;
|
}
|
| IDENTIFIERTYPE QUOTEDSTRING
|
{
|
struct ipsecdoi_id_b *id_b;
|
|
if ($1 == IDTYPE_ASN1DN) {
|
yyerror("id type forbidden: %d", $1);
|
$$ = NULL;
|
return -1;
|
}
|
|
$2->l--;
|
|
$$ = vmalloc(sizeof(*id_b) + $2->l);
|
if ($$ == NULL) {
|
yyerror("failed to allocate identifier");
|
return -1;
|
}
|
|
id_b = (struct ipsecdoi_id_b *)$$->v;
|
id_b->type = idtype2doi($1);
|
|
id_b->proto_id = 0;
|
id_b->port = 0;
|
|
memcpy($$->v + sizeof(*id_b), $2->v, $2->l);
|
}
|
;
|
sainfo_param
|
: /* nothing */
|
{
|
cur_sainfo->id_i = NULL;
|
}
|
| FROM IDENTIFIERTYPE identifierstring
|
{
|
struct ipsecdoi_id_b *id_b;
|
vchar_t *idv;
|
|
if (set_identifier(&idv, $2, $3) != 0) {
|
yyerror("failed to set identifer.\n");
|
return -1;
|
}
|
cur_sainfo->id_i = vmalloc(sizeof(*id_b) + idv->l);
|
if (cur_sainfo->id_i == NULL) {
|
yyerror("failed to allocate identifier");
|
return -1;
|
}
|
|
id_b = (struct ipsecdoi_id_b *)cur_sainfo->id_i->v;
|
id_b->type = idtype2doi($2);
|
|
id_b->proto_id = 0;
|
id_b->port = 0;
|
|
memcpy(cur_sainfo->id_i->v + sizeof(*id_b),
|
idv->v, idv->l);
|
vfree(idv);
|
}
|
| GROUP QUOTEDSTRING
|
{
|
#ifdef ENABLE_HYBRID
|
if ((cur_sainfo->group = vdup($2)) == NULL) {
|
yyerror("failed to set sainfo xauth group.\n");
|
return -1;
|
}
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
return -1;
|
#endif
|
}
|
;
|
sainfo_specs
|
: /* nothing */
|
| sainfo_specs sainfo_spec
|
;
|
sainfo_spec
|
: PFS_GROUP dh_group_num
|
{
|
cur_sainfo->pfs_group = $2;
|
}
|
EOS
|
| REMOTEID NUMBER
|
{
|
cur_sainfo->remoteid = $2;
|
}
|
EOS
|
| LIFETIME LIFETYPE_TIME NUMBER unittype_time
|
{
|
cur_sainfo->lifetime = $3 * $4;
|
}
|
EOS
|
| LIFETIME LIFETYPE_BYTE NUMBER unittype_byte
|
{
|
#if 1
|
yyerror("byte lifetime support is deprecated");
|
return -1;
|
#else
|
cur_sainfo->lifebyte = fix_lifebyte($3 * $4);
|
if (cur_sainfo->lifebyte == 0)
|
return -1;
|
#endif
|
}
|
EOS
|
| ALGORITHM_CLASS {
|
cur_algclass = $1;
|
}
|
algorithms EOS
|
| IDENTIFIER IDENTIFIERTYPE
|
{
|
yyerror("it's deprecated to specify a identifier in phase 2");
|
}
|
EOS
|
| MY_IDENTIFIER IDENTIFIERTYPE QUOTEDSTRING
|
{
|
yyerror("it's deprecated to specify a identifier in phase 2");
|
}
|
EOS
|
;
|
|
algorithms
|
: algorithm
|
{
|
inssainfoalg(&cur_sainfo->algs[cur_algclass], $1);
|
}
|
| algorithm
|
{
|
inssainfoalg(&cur_sainfo->algs[cur_algclass], $1);
|
}
|
COMMA algorithms
|
;
|
algorithm
|
: ALGORITHMTYPE keylength
|
{
|
int defklen;
|
|
$$ = newsainfoalg();
|
if ($$ == NULL) {
|
yyerror("failed to get algorithm allocation");
|
return -1;
|
}
|
|
$$->alg = algtype2doi(cur_algclass, $1);
|
if ($$->alg == -1) {
|
yyerror("algorithm mismatched");
|
racoon_free($$);
|
$$ = NULL;
|
return -1;
|
}
|
|
defklen = default_keylen(cur_algclass, $1);
|
if (defklen == 0) {
|
if ($2) {
|
yyerror("keylen not allowed");
|
racoon_free($$);
|
$$ = NULL;
|
return -1;
|
}
|
} else {
|
if ($2 && check_keylen(cur_algclass, $1, $2) < 0) {
|
yyerror("invalid keylen %d", $2);
|
racoon_free($$);
|
$$ = NULL;
|
return -1;
|
}
|
}
|
|
if ($2)
|
$$->encklen = $2;
|
else
|
$$->encklen = defklen;
|
|
/* check if it's supported algorithm by kernel */
|
if (!(cur_algclass == algclass_ipsec_auth && $1 == algtype_non_auth)
|
&& pk_checkalg(cur_algclass, $1, $$->encklen)) {
|
int a = algclass2doi(cur_algclass);
|
int b = algtype2doi(cur_algclass, $1);
|
if (a == IPSECDOI_ATTR_AUTH)
|
a = IPSECDOI_PROTO_IPSEC_AH;
|
yyerror("algorithm %s not supported by the kernel (missing module?)",
|
s_ipsecdoi_trns(a, b));
|
racoon_free($$);
|
$$ = NULL;
|
return -1;
|
}
|
}
|
;
|
prefix
|
: /* nothing */ { $$ = ~0; }
|
| PREFIX { $$ = $1; }
|
;
|
port
|
: /* nothing */ { $$ = IPSEC_PORT_ANY; }
|
| PORT { $$ = $1; }
|
| PORTANY { $$ = IPSEC_PORT_ANY; }
|
;
|
ul_proto
|
: NUMBER { $$ = $1; }
|
| UL_PROTO { $$ = $1; }
|
| ANY { $$ = IPSEC_ULPROTO_ANY; }
|
;
|
keylength
|
: /* nothing */ { $$ = 0; }
|
| NUMBER { $$ = $1; }
|
;
|
|
/* remote */
|
remote_statement
|
: REMOTE remote_index INHERIT remote_index
|
{
|
struct remoteconf *new;
|
struct proposalspec *prspec;
|
|
new = copyrmconf($4);
|
if (new == NULL) {
|
yyerror("failed to get remoteconf for %s.", saddr2str ($4));
|
return -1;
|
}
|
|
new->remote = $2;
|
new->inherited_from = getrmconf_strict($4, 1);
|
new->proposal = NULL;
|
new->prhead = NULL;
|
cur_rmconf = new;
|
|
prspec = newprspec();
|
if (prspec == NULL || !cur_rmconf->inherited_from
|
|| !cur_rmconf->inherited_from->proposal)
|
return -1;
|
prspec->lifetime = cur_rmconf->inherited_from->proposal->lifetime;
|
prspec->lifebyte = cur_rmconf->inherited_from->proposal->lifebyte;
|
insprspec(prspec, &cur_rmconf->prhead);
|
}
|
remote_specs_block
|
| REMOTE remote_index
|
{
|
struct remoteconf *new;
|
struct proposalspec *prspec;
|
|
new = newrmconf();
|
if (new == NULL) {
|
yyerror("failed to get new remoteconf.");
|
return -1;
|
}
|
|
new->remote = $2;
|
cur_rmconf = new;
|
|
prspec = newprspec();
|
if (prspec == NULL)
|
return -1;
|
prspec->lifetime = oakley_get_defaultlifetime();
|
insprspec(prspec, &cur_rmconf->prhead);
|
}
|
remote_specs_block
|
;
|
|
remote_specs_block
|
: BOC remote_specs EOC
|
{
|
/* check a exchange mode */
|
if (cur_rmconf->etypes == NULL) {
|
yyerror("no exchange mode specified.\n");
|
return -1;
|
}
|
|
if (cur_rmconf->idvtype == IDTYPE_UNDEFINED)
|
cur_rmconf->idvtype = IDTYPE_ADDRESS;
|
|
|
if (cur_rmconf->idvtype == IDTYPE_ASN1DN) {
|
if (cur_rmconf->mycertfile) {
|
if (cur_rmconf->idv)
|
yywarn("Both CERT and ASN1 ID "
|
"are set. Hope this is OK.\n");
|
/* TODO: Preparse the DN here */
|
} else if (cur_rmconf->idv) {
|
/* OK, using asn1dn without X.509. */
|
} else {
|
yyerror("ASN1 ID not specified "
|
"and no CERT defined!\n");
|
return -1;
|
}
|
}
|
|
if (cur_rmconf->prhead->spspec == NULL
|
&& cur_rmconf->inherited_from
|
&& cur_rmconf->inherited_from->prhead) {
|
cur_rmconf->prhead->spspec = cur_rmconf->inherited_from->prhead->spspec;
|
}
|
if (set_isakmp_proposal(cur_rmconf, cur_rmconf->prhead) != 0)
|
return -1;
|
|
/* DH group settting if aggressive mode is there. */
|
if (check_etypeok(cur_rmconf, ISAKMP_ETYPE_AGG) != NULL) {
|
struct isakmpsa *p;
|
int b = 0;
|
|
/* DH group */
|
for (p = cur_rmconf->proposal; p; p = p->next) {
|
if (b == 0 || (b && b == p->dh_group)) {
|
b = p->dh_group;
|
continue;
|
}
|
yyerror("DH group must be equal "
|
"in all proposals "
|
"when aggressive mode is "
|
"used.\n");
|
return -1;
|
}
|
cur_rmconf->dh_group = b;
|
|
if (cur_rmconf->dh_group == 0) {
|
yyerror("DH group must be set in the proposal.\n");
|
return -1;
|
}
|
|
/* DH group settting if PFS is required. */
|
if (oakley_setdhgroup(cur_rmconf->dh_group,
|
&cur_rmconf->dhgrp) < 0) {
|
yyerror("failed to set DH value.\n");
|
return -1;
|
}
|
}
|
|
insrmconf(cur_rmconf);
|
}
|
;
|
remote_index
|
: ANONYMOUS ike_port
|
{
|
$$ = newsaddr(sizeof(struct sockaddr));
|
$$->sa_family = AF_UNSPEC;
|
((struct sockaddr_in *)$$)->sin_port = htons($2);
|
}
|
| ike_addrinfo_port
|
{
|
$$ = $1;
|
if ($$ == NULL) {
|
yyerror("failed to allocate sockaddr");
|
return -1;
|
}
|
}
|
;
|
remote_specs
|
: /* nothing */
|
| remote_specs remote_spec
|
;
|
remote_spec
|
: EXCHANGE_MODE
|
{
|
cur_rmconf->etypes = NULL;
|
}
|
exchange_types EOS
|
| DOI DOITYPE { cur_rmconf->doitype = $2; } EOS
|
| SITUATION SITUATIONTYPE { cur_rmconf->sittype = $2; } EOS
|
| CERTIFICATE_TYPE cert_spec
|
| PEERS_CERTFILE QUOTEDSTRING
|
{
|
yywarn("This directive without certtype will be removed!\n");
|
yywarn("Please use 'peers_certfile x509 \"%s\";' instead\n", $2->v);
|
cur_rmconf->getcert_method = ISAKMP_GETCERT_LOCALFILE;
|
|
if (cur_rmconf->peerscertfile != NULL)
|
racoon_free(cur_rmconf->peerscertfile);
|
cur_rmconf->peerscertfile = racoon_strdup($2->v);
|
STRDUP_FATAL(cur_rmconf->peerscertfile);
|
vfree($2);
|
}
|
EOS
|
| CA_TYPE CERT_X509 QUOTEDSTRING
|
{
|
cur_rmconf->cacerttype = $2;
|
cur_rmconf->getcacert_method = ISAKMP_GETCERT_LOCALFILE;
|
if (cur_rmconf->cacertfile != NULL)
|
racoon_free(cur_rmconf->cacertfile);
|
cur_rmconf->cacertfile = racoon_strdup($3->v);
|
STRDUP_FATAL(cur_rmconf->cacertfile);
|
vfree($3);
|
}
|
EOS
|
| PEERS_CERTFILE CERT_X509 QUOTEDSTRING
|
{
|
cur_rmconf->getcert_method = ISAKMP_GETCERT_LOCALFILE;
|
if (cur_rmconf->peerscertfile != NULL)
|
racoon_free(cur_rmconf->peerscertfile);
|
cur_rmconf->peerscertfile = racoon_strdup($3->v);
|
STRDUP_FATAL(cur_rmconf->peerscertfile);
|
vfree($3);
|
}
|
EOS
|
| PEERS_CERTFILE CERT_PLAINRSA QUOTEDSTRING
|
{
|
char path[MAXPATHLEN];
|
int ret = 0;
|
|
getpathname(path, sizeof(path),
|
LC_PATHTYPE_CERT, $3->v);
|
vfree($3);
|
|
if (cur_rmconf->getcert_method == ISAKMP_GETCERT_DNS) {
|
yyerror("Different peers_certfile method "
|
"already defined: %d!\n",
|
cur_rmconf->getcert_method);
|
return -1;
|
}
|
cur_rmconf->getcert_method = ISAKMP_GETCERT_LOCALFILE;
|
if (rsa_parse_file(cur_rmconf->rsa_public, path, RSA_TYPE_PUBLIC)) {
|
yyerror("Couldn't parse keyfile.\n", path);
|
return -1;
|
}
|
plog(LLV_DEBUG, LOCATION, NULL, "Public PlainRSA keyfile parsed: %s\n", path);
|
}
|
EOS
|
| PEERS_CERTFILE DNSSEC
|
{
|
if (cur_rmconf->getcert_method) {
|
yyerror("Different peers_certfile method already defined!\n");
|
return -1;
|
}
|
cur_rmconf->getcert_method = ISAKMP_GETCERT_DNS;
|
cur_rmconf->peerscertfile = NULL;
|
}
|
EOS
|
| VERIFY_CERT SWITCH { cur_rmconf->verify_cert = $2; } EOS
|
| SEND_CERT SWITCH { cur_rmconf->send_cert = $2; } EOS
|
| SEND_CR SWITCH { cur_rmconf->send_cr = $2; } EOS
|
| MY_IDENTIFIER IDENTIFIERTYPE identifierstring
|
{
|
if (set_identifier(&cur_rmconf->idv, $2, $3) != 0) {
|
yyerror("failed to set identifer.\n");
|
return -1;
|
}
|
cur_rmconf->idvtype = $2;
|
}
|
EOS
|
| MY_IDENTIFIER IDENTIFIERTYPE IDENTIFIERQUAL identifierstring
|
{
|
if (set_identifier_qual(&cur_rmconf->idv, $2, $4, $3) != 0) {
|
yyerror("failed to set identifer.\n");
|
return -1;
|
}
|
cur_rmconf->idvtype = $2;
|
}
|
EOS
|
| XAUTH_LOGIN identifierstring
|
{
|
#ifdef ENABLE_HYBRID
|
/* formerly identifier type login */
|
if (xauth_rmconf_used(&cur_rmconf->xauth) == -1) {
|
yyerror("failed to allocate xauth state\n");
|
return -1;
|
}
|
if ((cur_rmconf->xauth->login = vdup($2)) == NULL) {
|
yyerror("failed to set identifer.\n");
|
return -1;
|
}
|
#else
|
yyerror("racoon not configured with --enable-hybrid");
|
#endif
|
}
|
EOS
|
| PEERS_IDENTIFIER IDENTIFIERTYPE identifierstring
|
{
|
struct idspec *id;
|
id = newidspec();
|
if (id == NULL) {
|
yyerror("failed to allocate idspec");
|
return -1;
|
}
|
if (set_identifier(&id->id, $2, $3) != 0) {
|
yyerror("failed to set identifer.\n");
|
racoon_free(id);
|
return -1;
|
}
|
id->idtype = $2;
|
genlist_append (cur_rmconf->idvl_p, id);
|
}
|
EOS
|
| PEERS_IDENTIFIER IDENTIFIERTYPE IDENTIFIERQUAL identifierstring
|
{
|
struct idspec *id;
|
id = newidspec();
|
if (id == NULL) {
|
yyerror("failed to allocate idspec");
|
return -1;
|
}
|
if (set_identifier_qual(&id->id, $2, $4, $3) != 0) {
|
yyerror("failed to set identifer.\n");
|
racoon_free(id);
|
return -1;
|
}
|
id->idtype = $2;
|
genlist_append (cur_rmconf->idvl_p, id);
|
}
|
EOS
|
| VERIFY_IDENTIFIER SWITCH { cur_rmconf->verify_identifier = $2; } EOS
|
| NONCE_SIZE NUMBER { cur_rmconf->nonce_size = $2; } EOS
|
| DH_GROUP
|
{
|
yyerror("dh_group cannot be defined here.");
|
return -1;
|
}
|
dh_group_num EOS
|
| PASSIVE SWITCH { cur_rmconf->passive = $2; } EOS
|
| IKE_FRAG SWITCH { cur_rmconf->ike_frag = $2; } EOS
|
| IKE_FRAG REMOTE_FORCE_LEVEL { cur_rmconf->ike_frag = ISAKMP_FRAG_FORCE; } EOS
|
| ESP_FRAG NUMBER {
|
#ifdef SADB_X_EXT_NAT_T_FRAG
|
if (libipsec_opt & LIBIPSEC_OPT_FRAG)
|
cur_rmconf->esp_frag = $2;
|
else
|
yywarn("libipsec lacks IKE frag support");
|
#else
|
yywarn("Your kernel does not support esp_frag");
|
#endif
|
} EOS
|
| SCRIPT QUOTEDSTRING PHASE1_UP {
|
if (cur_rmconf->script[SCRIPT_PHASE1_UP] != NULL)
|
vfree(cur_rmconf->script[SCRIPT_PHASE1_UP]);
|
|
cur_rmconf->script[SCRIPT_PHASE1_UP] =
|
script_path_add(vdup($2));
|
} EOS
|
| SCRIPT QUOTEDSTRING PHASE1_DOWN {
|
if (cur_rmconf->script[SCRIPT_PHASE1_DOWN] != NULL)
|
vfree(cur_rmconf->script[SCRIPT_PHASE1_DOWN]);
|
|
cur_rmconf->script[SCRIPT_PHASE1_DOWN] =
|
script_path_add(vdup($2));
|
} EOS
|
| MODE_CFG SWITCH { cur_rmconf->mode_cfg = $2; } EOS
|
| WEAK_PHASE1_CHECK SWITCH {
|
cur_rmconf->weak_phase1_check = $2;
|
} EOS
|
| GENERATE_POLICY SWITCH { cur_rmconf->gen_policy = $2; } EOS
|
| GENERATE_POLICY GENERATE_LEVEL { cur_rmconf->gen_policy = $2; } EOS
|
| SUPPORT_PROXY SWITCH { cur_rmconf->support_proxy = $2; } EOS
|
| INITIAL_CONTACT SWITCH { cur_rmconf->ini_contact = $2; } EOS
|
| NAT_TRAVERSAL SWITCH
|
{
|
#ifdef ENABLE_NATT
|
if (libipsec_opt & LIBIPSEC_OPT_NATT)
|
cur_rmconf->nat_traversal = $2;
|
else
|
yyerror("libipsec lacks NAT-T support");
|
#else
|
yyerror("NAT-T support not compiled in.");
|
#endif
|
} EOS
|
| NAT_TRAVERSAL REMOTE_FORCE_LEVEL
|
{
|
#ifdef ENABLE_NATT
|
if (libipsec_opt & LIBIPSEC_OPT_NATT)
|
cur_rmconf->nat_traversal = NATT_FORCE;
|
else
|
yyerror("libipsec lacks NAT-T support");
|
#else
|
yyerror("NAT-T support not compiled in.");
|
#endif
|
} EOS
|
| DPD SWITCH
|
{
|
#ifdef ENABLE_DPD
|
cur_rmconf->dpd = $2;
|
#else
|
yyerror("DPD support not compiled in.");
|
#endif
|
} EOS
|
| DPD_DELAY NUMBER
|
{
|
#ifdef ENABLE_DPD
|
cur_rmconf->dpd_interval = $2;
|
#else
|
yyerror("DPD support not compiled in.");
|
#endif
|
}
|
EOS
|
| DPD_RETRY NUMBER
|
{
|
#ifdef ENABLE_DPD
|
cur_rmconf->dpd_retry = $2;
|
#else
|
yyerror("DPD support not compiled in.");
|
#endif
|
}
|
EOS
|
| DPD_MAXFAIL NUMBER
|
{
|
#ifdef ENABLE_DPD
|
cur_rmconf->dpd_maxfails = $2;
|
#else
|
yyerror("DPD support not compiled in.");
|
#endif
|
}
|
EOS
|
| PH1ID NUMBER
|
{
|
cur_rmconf->ph1id = $2;
|
}
|
EOS
|
| LIFETIME LIFETYPE_TIME NUMBER unittype_time
|
{
|
cur_rmconf->prhead->lifetime = $3 * $4;
|
}
|
EOS
|
| PROPOSAL_CHECK PROPOSAL_CHECK_LEVEL { cur_rmconf->pcheck_level = $2; } EOS
|
| LIFETIME LIFETYPE_BYTE NUMBER unittype_byte
|
{
|
#if 1
|
yyerror("byte lifetime support is deprecated in Phase1");
|
return -1;
|
#else
|
yywarn("the lifetime of bytes in phase 1 "
|
"will be ignored at the moment.");
|
cur_rmconf->prhead->lifebyte = fix_lifebyte($3 * $4);
|
if (cur_rmconf->prhead->lifebyte == 0)
|
return -1;
|
#endif
|
}
|
EOS
|
| PROPOSAL
|
{
|
struct secprotospec *spspec;
|
|
spspec = newspspec();
|
if (spspec == NULL)
|
return -1;
|
insspspec(spspec, &cur_rmconf->prhead);
|
}
|
BOC isakmpproposal_specs EOC
|
;
|
exchange_types
|
: /* nothing */
|
| exchange_types EXCHANGETYPE
|
{
|
struct etypes *new;
|
new = racoon_malloc(sizeof(struct etypes));
|
if (new == NULL) {
|
yyerror("failed to allocate etypes");
|
return -1;
|
}
|
new->type = $2;
|
new->next = NULL;
|
if (cur_rmconf->etypes == NULL)
|
cur_rmconf->etypes = new;
|
else {
|
struct etypes *p;
|
for (p = cur_rmconf->etypes;
|
p->next != NULL;
|
p = p->next)
|
;
|
p->next = new;
|
}
|
}
|
;
|
cert_spec
|
: CERT_X509 QUOTEDSTRING QUOTEDSTRING
|
{
|
cur_rmconf->certtype = $1;
|
if (cur_rmconf->mycertfile != NULL)
|
racoon_free(cur_rmconf->mycertfile);
|
cur_rmconf->mycertfile = racoon_strdup($2->v);
|
STRDUP_FATAL(cur_rmconf->mycertfile);
|
vfree($2);
|
if (cur_rmconf->myprivfile != NULL)
|
racoon_free(cur_rmconf->myprivfile);
|
cur_rmconf->myprivfile = racoon_strdup($3->v);
|
STRDUP_FATAL(cur_rmconf->myprivfile);
|
vfree($3);
|
}
|
EOS
|
| CERT_PLAINRSA QUOTEDSTRING
|
{
|
char path[MAXPATHLEN];
|
int ret = 0;
|
|
getpathname(path, sizeof(path),
|
LC_PATHTYPE_CERT, $2->v);
|
vfree($2);
|
|
cur_rmconf->certtype = $1;
|
cur_rmconf->send_cr = FALSE;
|
cur_rmconf->send_cert = FALSE;
|
cur_rmconf->verify_cert = FALSE;
|
if (rsa_parse_file(cur_rmconf->rsa_private, path, RSA_TYPE_PRIVATE)) {
|
yyerror("Couldn't parse keyfile.\n", path);
|
return -1;
|
}
|
plog(LLV_DEBUG, LOCATION, NULL, "Private PlainRSA keyfile parsed: %s\n", path);
|
}
|
EOS
|
;
|
dh_group_num
|
: ALGORITHMTYPE
|
{
|
$$ = algtype2doi(algclass_isakmp_dh, $1);
|
if ($$ == -1) {
|
yyerror("must be DH group");
|
return -1;
|
}
|
}
|
| NUMBER
|
{
|
if (ARRAYLEN(num2dhgroup) > $1 && num2dhgroup[$1] != 0) {
|
$$ = num2dhgroup[$1];
|
} else {
|
yyerror("must be DH group");
|
$$ = 0;
|
return -1;
|
}
|
}
|
;
|
identifierstring
|
: /* nothing */ { $$ = NULL; }
|
| ADDRSTRING { $$ = $1; }
|
| QUOTEDSTRING { $$ = $1; }
|
;
|
isakmpproposal_specs
|
: /* nothing */
|
| isakmpproposal_specs isakmpproposal_spec
|
;
|
isakmpproposal_spec
|
: STRENGTH
|
{
|
yyerror("strength directive is obsoleted.");
|
} STRENGTHTYPE EOS
|
| LIFETIME LIFETYPE_TIME NUMBER unittype_time
|
{
|
cur_rmconf->prhead->spspec->lifetime = $3 * $4;
|
}
|
EOS
|
| LIFETIME LIFETYPE_BYTE NUMBER unittype_byte
|
{
|
#if 1
|
yyerror("byte lifetime support is deprecated");
|
return -1;
|
#else
|
cur_rmconf->prhead->spspec->lifebyte = fix_lifebyte($3 * $4);
|
if (cur_rmconf->prhead->spspec->lifebyte == 0)
|
return -1;
|
#endif
|
}
|
EOS
|
| DH_GROUP dh_group_num
|
{
|
cur_rmconf->prhead->spspec->algclass[algclass_isakmp_dh] = $2;
|
}
|
EOS
|
| GSS_ID QUOTEDSTRING
|
{
|
if (cur_rmconf->prhead->spspec->vendorid != VENDORID_GSSAPI) {
|
yyerror("wrong Vendor ID for gssapi_id");
|
return -1;
|
}
|
if (cur_rmconf->prhead->spspec->gssid != NULL)
|
racoon_free(cur_rmconf->prhead->spspec->gssid);
|
cur_rmconf->prhead->spspec->gssid =
|
racoon_strdup($2->v);
|
STRDUP_FATAL(cur_rmconf->prhead->spspec->gssid);
|
}
|
EOS
|
| ALGORITHM_CLASS ALGORITHMTYPE keylength
|
{
|
int doi;
|
int defklen;
|
|
doi = algtype2doi($1, $2);
|
if (doi == -1) {
|
yyerror("algorithm mismatched 1");
|
return -1;
|
}
|
|
switch ($1) {
|
case algclass_isakmp_enc:
|
/* reject suppressed algorithms */
|
#ifndef HAVE_OPENSSL_RC5_H
|
if ($2 == algtype_rc5) {
|
yyerror("algorithm %s not supported",
|
s_attr_isakmp_enc(doi));
|
return -1;
|
}
|
#endif
|
#ifndef HAVE_OPENSSL_IDEA_H
|
if ($2 == algtype_idea) {
|
yyerror("algorithm %s not supported",
|
s_attr_isakmp_enc(doi));
|
return -1;
|
}
|
#endif
|
|
cur_rmconf->prhead->spspec->algclass[algclass_isakmp_enc] = doi;
|
defklen = default_keylen($1, $2);
|
if (defklen == 0) {
|
if ($3) {
|
yyerror("keylen not allowed");
|
return -1;
|
}
|
} else {
|
if ($3 && check_keylen($1, $2, $3) < 0) {
|
yyerror("invalid keylen %d", $3);
|
return -1;
|
}
|
}
|
if ($3)
|
cur_rmconf->prhead->spspec->encklen = $3;
|
else
|
cur_rmconf->prhead->spspec->encklen = defklen;
|
break;
|
case algclass_isakmp_hash:
|
cur_rmconf->prhead->spspec->algclass[algclass_isakmp_hash] = doi;
|
break;
|
case algclass_isakmp_ameth:
|
cur_rmconf->prhead->spspec->algclass[algclass_isakmp_ameth] = doi;
|
/*
|
* We may have to set the Vendor ID for the
|
* authentication method we're using.
|
*/
|
switch ($2) {
|
case algtype_gssapikrb:
|
if (cur_rmconf->prhead->spspec->vendorid !=
|
VENDORID_UNKNOWN) {
|
yyerror("Vendor ID mismatch "
|
"for auth method");
|
return -1;
|
}
|
/*
|
* For interoperability with Win2k,
|
* we set the Vendor ID to "GSSAPI".
|
*/
|
cur_rmconf->prhead->spspec->vendorid =
|
VENDORID_GSSAPI;
|
break;
|
case algtype_rsasig:
|
if (cur_rmconf->certtype == ISAKMP_CERT_PLAINRSA) {
|
if (rsa_list_count(cur_rmconf->rsa_private) == 0) {
|
yyerror ("Private PlainRSA key not set. "
|
"Use directive 'certificate_type plainrsa ...'\n");
|
return -1;
|
}
|
if (rsa_list_count(cur_rmconf->rsa_public) == 0) {
|
yyerror ("Public PlainRSA keys not set. "
|
"Use directive 'peers_certfile plainrsa ...'\n");
|
return -1;
|
}
|
}
|
break;
|
default:
|
break;
|
}
|
break;
|
default:
|
yyerror("algorithm mismatched 2");
|
return -1;
|
}
|
}
|
EOS
|
;
|
|
unittype_time
|
: UNITTYPE_SEC { $$ = 1; }
|
| UNITTYPE_MIN { $$ = 60; }
|
| UNITTYPE_HOUR { $$ = (60 * 60); }
|
;
|
unittype_byte
|
: UNITTYPE_BYTE { $$ = 1; }
|
| UNITTYPE_KBYTES { $$ = 1024; }
|
| UNITTYPE_MBYTES { $$ = (1024 * 1024); }
|
| UNITTYPE_TBYTES { $$ = (1024 * 1024 * 1024); }
|
;
|
%%
|
|
static struct proposalspec *
|
newprspec()
|
{
|
struct proposalspec *new;
|
|
new = racoon_calloc(1, sizeof(*new));
|
if (new == NULL)
|
yyerror("failed to allocate proposal");
|
|
return new;
|
}
|
|
/*
|
* insert into head of list.
|
*/
|
static void
|
insprspec(prspec, head)
|
struct proposalspec *prspec;
|
struct proposalspec **head;
|
{
|
if (*head != NULL)
|
(*head)->prev = prspec;
|
prspec->next = *head;
|
*head = prspec;
|
}
|
|
static struct secprotospec *
|
newspspec()
|
{
|
struct secprotospec *new;
|
|
new = racoon_calloc(1, sizeof(*new));
|
if (new == NULL) {
|
yyerror("failed to allocate spproto");
|
return NULL;
|
}
|
|
new->encklen = 0; /*XXX*/
|
|
/*
|
* Default to "uknown" vendor -- we will override this
|
* as necessary. When we send a Vendor ID payload, an
|
* "unknown" will be translated to a KAME/racoon ID.
|
*/
|
new->vendorid = VENDORID_UNKNOWN;
|
|
return new;
|
}
|
|
/*
|
* insert into head of list.
|
*/
|
static void
|
insspspec(spspec, head)
|
struct secprotospec *spspec;
|
struct proposalspec **head;
|
{
|
spspec->back = *head;
|
|
if ((*head)->spspec != NULL)
|
(*head)->spspec->prev = spspec;
|
spspec->next = (*head)->spspec;
|
(*head)->spspec = spspec;
|
}
|
|
/* set final acceptable proposal */
|
static int
|
set_isakmp_proposal(rmconf, prspec)
|
struct remoteconf *rmconf;
|
struct proposalspec *prspec;
|
{
|
struct proposalspec *p;
|
struct secprotospec *s;
|
int prop_no = 1;
|
int trns_no = 1;
|
int32_t types[MAXALGCLASS];
|
|
p = prspec;
|
if (p->next != 0) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"multiple proposal definition.\n");
|
return -1;
|
}
|
|
/* mandatory check */
|
if (p->spspec == NULL) {
|
yyerror("no remote specification found: %s.\n",
|
saddr2str(rmconf->remote));
|
return -1;
|
}
|
for (s = p->spspec; s != NULL; s = s->next) {
|
/* XXX need more to check */
|
if (s->algclass[algclass_isakmp_enc] == 0) {
|
yyerror("encryption algorithm required.");
|
return -1;
|
}
|
if (s->algclass[algclass_isakmp_hash] == 0) {
|
yyerror("hash algorithm required.");
|
return -1;
|
}
|
if (s->algclass[algclass_isakmp_dh] == 0) {
|
yyerror("DH group required.");
|
return -1;
|
}
|
if (s->algclass[algclass_isakmp_ameth] == 0) {
|
yyerror("authentication method required.");
|
return -1;
|
}
|
}
|
|
/* skip to last part */
|
for (s = p->spspec; s->next != NULL; s = s->next)
|
;
|
|
while (s != NULL) {
|
plog(LLV_DEBUG2, LOCATION, NULL,
|
"lifetime = %ld\n", (long)
|
(s->lifetime ? s->lifetime : p->lifetime));
|
plog(LLV_DEBUG2, LOCATION, NULL,
|
"lifebyte = %d\n",
|
s->lifebyte ? s->lifebyte : p->lifebyte);
|
plog(LLV_DEBUG2, LOCATION, NULL,
|
"encklen=%d\n", s->encklen);
|
|
memset(types, 0, ARRAYLEN(types));
|
types[algclass_isakmp_enc] = s->algclass[algclass_isakmp_enc];
|
types[algclass_isakmp_hash] = s->algclass[algclass_isakmp_hash];
|
types[algclass_isakmp_dh] = s->algclass[algclass_isakmp_dh];
|
types[algclass_isakmp_ameth] =
|
s->algclass[algclass_isakmp_ameth];
|
|
/* expanding spspec */
|
clean_tmpalgtype();
|
trns_no = expand_isakmpspec(prop_no, trns_no, types,
|
algclass_isakmp_enc, algclass_isakmp_ameth + 1,
|
s->lifetime ? s->lifetime : p->lifetime,
|
s->lifebyte ? s->lifebyte : p->lifebyte,
|
s->encklen, s->vendorid, s->gssid,
|
rmconf);
|
if (trns_no == -1) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"failed to expand isakmp proposal.\n");
|
return -1;
|
}
|
|
s = s->prev;
|
}
|
|
if (rmconf->proposal == NULL) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"no proposal found.\n");
|
return -1;
|
}
|
|
return 0;
|
}
|
|
static void
|
clean_tmpalgtype()
|
{
|
int i;
|
for (i = 0; i < MAXALGCLASS; i++)
|
tmpalgtype[i] = 0; /* means algorithm undefined. */
|
}
|
|
static int
|
expand_isakmpspec(prop_no, trns_no, types,
|
class, last, lifetime, lifebyte, encklen, vendorid, gssid,
|
rmconf)
|
int prop_no, trns_no;
|
int *types, class, last;
|
time_t lifetime;
|
int lifebyte;
|
int encklen;
|
int vendorid;
|
char *gssid;
|
struct remoteconf *rmconf;
|
{
|
struct isakmpsa *new;
|
|
/* debugging */
|
{
|
int j;
|
char tb[10];
|
plog(LLV_DEBUG2, LOCATION, NULL,
|
"p:%d t:%d\n", prop_no, trns_no);
|
for (j = class; j < MAXALGCLASS; j++) {
|
snprintf(tb, sizeof(tb), "%d", types[j]);
|
plog(LLV_DEBUG2, LOCATION, NULL,
|
"%s%s%s%s\n",
|
s_algtype(j, types[j]),
|
types[j] ? "(" : "",
|
tb[0] == '0' ? "" : tb,
|
types[j] ? ")" : "");
|
}
|
plog(LLV_DEBUG2, LOCATION, NULL, "\n");
|
}
|
|
#define TMPALGTYPE2STR(n) \
|
s_algtype(algclass_isakmp_##n, types[algclass_isakmp_##n])
|
/* check mandatory values */
|
if (types[algclass_isakmp_enc] == 0
|
|| types[algclass_isakmp_ameth] == 0
|
|| types[algclass_isakmp_hash] == 0
|
|| types[algclass_isakmp_dh] == 0) {
|
yyerror("few definition of algorithm "
|
"enc=%s ameth=%s hash=%s dhgroup=%s.\n",
|
TMPALGTYPE2STR(enc),
|
TMPALGTYPE2STR(ameth),
|
TMPALGTYPE2STR(hash),
|
TMPALGTYPE2STR(dh));
|
return -1;
|
}
|
#undef TMPALGTYPE2STR
|
|
/* set new sa */
|
new = newisakmpsa();
|
if (new == NULL) {
|
yyerror("failed to allocate isakmp sa");
|
return -1;
|
}
|
new->prop_no = prop_no;
|
new->trns_no = trns_no++;
|
new->lifetime = lifetime;
|
new->lifebyte = lifebyte;
|
new->enctype = types[algclass_isakmp_enc];
|
new->encklen = encklen;
|
new->authmethod = types[algclass_isakmp_ameth];
|
new->hashtype = types[algclass_isakmp_hash];
|
new->dh_group = types[algclass_isakmp_dh];
|
new->vendorid = vendorid;
|
#ifdef HAVE_GSSAPI
|
if (new->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) {
|
if (gssid != NULL) {
|
if ((new->gssid = vmalloc(strlen(gssid))) == NULL) {
|
racoon_free(new);
|
yyerror("failed to allocate gssid");
|
return -1;
|
}
|
memcpy(new->gssid->v, gssid, new->gssid->l);
|
racoon_free(gssid);
|
#ifdef ENABLE_HYBRID
|
} else if (rmconf->xauth == NULL) {
|
#else
|
} else {
|
#endif
|
/*
|
* Allocate the default ID so that it gets put
|
* into a GSS ID attribute during the Phase 1
|
* exchange.
|
*/
|
new->gssid = gssapi_get_default_gss_id();
|
}
|
}
|
#endif
|
insisakmpsa(new, rmconf);
|
|
return trns_no;
|
}
|
|
static int
|
listen_addr (struct sockaddr *addr, int udp_encap)
|
{
|
struct myaddrs *p;
|
|
p = newmyaddr();
|
if (p == NULL) {
|
yyerror("failed to allocate myaddrs");
|
return -1;
|
}
|
p->addr = addr;
|
if (p->addr == NULL) {
|
yyerror("failed to copy sockaddr ");
|
delmyaddr(p);
|
return -1;
|
}
|
p->udp_encap = udp_encap;
|
|
insmyaddr(p, &lcconf->myaddrs);
|
|
lcconf->autograbaddr = 0;
|
return 0;
|
}
|
|
#if 0
|
/*
|
* fix lifebyte.
|
* Must be more than 1024B because its unit is kilobytes.
|
* That is defined RFC2407.
|
*/
|
static int
|
fix_lifebyte(t)
|
unsigned long t;
|
{
|
if (t < 1024) {
|
yyerror("byte size should be more than 1024B.");
|
return 0;
|
}
|
|
return(t / 1024);
|
}
|
#endif
|
|
int
|
cfparse()
|
{
|
int error;
|
|
yycf_init_buffer();
|
|
if (yycf_switch_buffer(lcconf->racoon_conf) != 0) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"could not read configuration file \"%s\"\n",
|
lcconf->racoon_conf);
|
return -1;
|
}
|
|
error = yyparse();
|
if (error != 0) {
|
if (yyerrorcount) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"fatal parse failure (%d errors)\n",
|
yyerrorcount);
|
} else {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"fatal parse failure.\n");
|
}
|
return -1;
|
}
|
|
if (error == 0 && yyerrorcount) {
|
plog(LLV_ERROR, LOCATION, NULL,
|
"parse error is nothing, but yyerrorcount is %d.\n",
|
yyerrorcount);
|
exit(1);
|
}
|
|
yycf_clean_buffer();
|
|
plog(LLV_DEBUG2, LOCATION, NULL, "parse successed.\n");
|
|
return 0;
|
}
|
|
int
|
cfreparse()
|
{
|
flushph2();
|
flushph1();
|
flushrmconf();
|
flushsainfo();
|
clean_tmpalgtype();
|
return(cfparse());
|
}
|
|
#ifdef ENABLE_ADMINPORT
|
static void
|
adminsock_conf(path, owner, group, mode_dec)
|
vchar_t *path;
|
vchar_t *owner;
|
vchar_t *group;
|
int mode_dec;
|
{
|
struct passwd *pw = NULL;
|
struct group *gr = NULL;
|
mode_t mode = 0;
|
uid_t uid;
|
gid_t gid;
|
int isnum;
|
|
adminsock_path = path->v;
|
|
if (owner == NULL)
|
return;
|
|
errno = 0;
|
uid = atoi(owner->v);
|
isnum = !errno;
|
if (((pw = getpwnam(owner->v)) == NULL) && !isnum)
|
yyerror("User \"%s\" does not exist", owner->v);
|
|
if (pw)
|
adminsock_owner = pw->pw_uid;
|
else
|
adminsock_owner = uid;
|
|
if (group == NULL)
|
return;
|
|
errno = 0;
|
gid = atoi(group->v);
|
isnum = !errno;
|
if (((gr = getgrnam(group->v)) == NULL) && !isnum)
|
yyerror("Group \"%s\" does not exist", group->v);
|
|
if (gr)
|
adminsock_group = gr->gr_gid;
|
else
|
adminsock_group = gid;
|
|
if (mode_dec == -1)
|
return;
|
|
if (mode_dec > 777)
|
yyerror("Mode 0%03o is invalid", mode_dec);
|
if (mode_dec >= 400) { mode += 0400; mode_dec -= 400; }
|
if (mode_dec >= 200) { mode += 0200; mode_dec -= 200; }
|
if (mode_dec >= 100) { mode += 0200; mode_dec -= 100; }
|
|
if (mode_dec > 77)
|
yyerror("Mode 0%03o is invalid", mode_dec);
|
if (mode_dec >= 40) { mode += 040; mode_dec -= 40; }
|
if (mode_dec >= 20) { mode += 020; mode_dec -= 20; }
|
if (mode_dec >= 10) { mode += 020; mode_dec -= 10; }
|
|
if (mode_dec > 7)
|
yyerror("Mode 0%03o is invalid", mode_dec);
|
if (mode_dec >= 4) { mode += 04; mode_dec -= 4; }
|
if (mode_dec >= 2) { mode += 02; mode_dec -= 2; }
|
if (mode_dec >= 1) { mode += 02; mode_dec -= 1; }
|
|
adminsock_mode = mode;
|
|
return;
|
}
|
#endif
|