/* $KAME: cfparse.y,v 1.112 2002/02/21 14:47:38 sakane Exp $ */ %{ #include #include #include #include #include #include #include #include #include #include #include #if !defined(HAVE_GETADDRINFO) || !defined(HAVE_GETNAMEINFO) #include "addrinfo.h" #endif #include "var.h" #include "misc.h" #include "vmbuf.h" #include "plog.h" #include "sockmisc.h" #include "str2val.h" #include "debug.h" #include "cfparse.h" #include "cftoken.h" #include "algorithm.h" #include "localconf.h" #include "policy.h" #include "sainfo.h" #include "oakley.h" #include "pfkey.h" #include "remoteconf.h" #include "grabmyaddr.h" #include "isakmp_var.h" #include "handler.h" #include "isakmp.h" #include "ipsec_doi.h" #include "strnames.h" #include "gcmalloc.h" #ifdef HAVE_GSSAPI #include "gssapi.h" #endif #include "vendorid.h" struct proposalspec { time_t lifetime; /* for isakmp/ipsec */ int lifebyte; /* for isakmp/ipsec */ struct secprotospec *spspec; /* the head is always current spec. */ struct proposalspec *next; /* the tail is the most prefered. */ struct proposalspec *prev; }; struct secprotospec { int prop_no; int trns_no; int strength; /* for isakmp/ipsec */ int encklen; /* for isakmp/ipsec */ time_t lifetime; /* for isakmp */ int lifebyte; /* for isakmp */ int proto_id; /* for ipsec (isakmp?) */ int ipsec_level; /* for ipsec */ int encmode; /* for ipsec */ int vendorid; /* for isakmp */ char *gssid; struct sockaddr *remote; int algclass[MAXALGCLASS]; struct secprotospec *next; /* the tail is the most prefiered. */ struct secprotospec *prev; struct proposalspec *back; }; static int num2dhgroup[] = { 0, OAKLEY_ATTR_GRP_DESC_MODP768, OAKLEY_ATTR_GRP_DESC_MODP1024, OAKLEY_ATTR_GRP_DESC_EC2N155, OAKLEY_ATTR_GRP_DESC_EC2N185, OAKLEY_ATTR_GRP_DESC_MODP1536, }; static struct remoteconf *cur_rmconf; static int tmpalgtype[MAXALGCLASS]; static struct sainfo *cur_sainfo; static int cur_algclass; static struct proposalspec *prhead; /* the head is always current. */ static struct proposalspec *newprspec __P((void)); static void cleanprhead __P((void)); static void insprspec __P((struct proposalspec *, struct proposalspec **)); static struct secprotospec *newspspec __P((void)); static void insspspec __P((struct secprotospec *, struct proposalspec **)); static int set_isakmp_proposal __P((struct remoteconf *, struct proposalspec *)); static void clean_tmpalgtype __P((void)); static int expand_isakmpspec __P((int, int, int *, int, int, time_t, int, int, int, char *, struct remoteconf *)); #if 0 static int fix_lifebyte __P((u_long)); #endif %} %union { unsigned long num; vchar_t *val; struct remoteconf *rmconf; struct sockaddr *saddr; struct sainfoalg *alg; } /* path */ %token PATH PATHTYPE /* include */ %token INCLUDE /* self information */ %token IDENTIFIER VENDORID /* logging */ %token LOGGING LOGLEV /* padding */ %token PADDING PAD_RANDOMIZE PAD_RANDOMIZELEN PAD_MAXLEN PAD_STRICT PAD_EXCLTAIL /* listen */ %token LISTEN X_ISAKMP X_ADMIN STRICT_ADDRESS /* timer */ %token RETRY RETRY_COUNTER RETRY_INTERVAL RETRY_PERSEND %token RETRY_PHASE1 RETRY_PHASE2 /* algorithm */ %token ALGORITHM_CLASS ALGORITHMTYPE STRENGTHTYPE /* sainfo */ %token SAINFO /* remote */ %token REMOTE ANONYMOUS %token EXCHANGE_MODE EXCHANGETYPE DOI DOITYPE SITUATION SITUATIONTYPE %token CERTIFICATE_TYPE CERTTYPE PEERS_CERTFILE VERIFY_CERT SEND_CERT SEND_CR %token IDENTIFIERTYPE MY_IDENTIFIER PEERS_IDENTIFIER VERIFY_IDENTIFIER %token DNSSEC CERT_X509 %token NONCE_SIZE DH_GROUP KEEPALIVE PASSIVE INITIAL_CONTACT %token PROPOSAL_CHECK PROPOSAL_CHECK_LEVEL %token GENERATE_POLICY SUPPORT_MIP6 %token PROPOSAL %token EXEC_PATH EXEC_COMMAND EXEC_SUCCESS EXEC_FAILURE %token GSSAPI_ID %token COMPLEX_BUNDLE %token PREFIX PORT PORTANY UL_PROTO ANY %token PFS_GROUP LIFETIME LIFETYPE_TIME LIFETYPE_BYTE STRENGTH %token NUMBER SWITCH BOOLEAN %token HEXSTRING QUOTEDSTRING ADDRSTRING %token UNITTYPE_BYTE UNITTYPE_KBYTES UNITTYPE_MBYTES UNITTYPE_TBYTES %token UNITTYPE_SEC UNITTYPE_MIN UNITTYPE_HOUR %token EOS BOC EOC COMMA %type NUMBER BOOLEAN SWITCH keylength %type PATHTYPE IDENTIFIERTYPE LOGLEV %type ALGORITHM_CLASS dh_group_num %type ALGORITHMTYPE STRENGTHTYPE %type PREFIX prefix PORT port ike_port %type ul_proto UL_PROTO %type EXCHANGETYPE DOITYPE SITUATIONTYPE %type CERTTYPE CERT_X509 PROPOSAL_CHECK_LEVEL %type unittype_time unittype_byte %type QUOTEDSTRING HEXSTRING ADDRSTRING sainfo_id %type identifierstring %type remote_index ike_addrinfo_port %type algorithm %% statements : /* nothing */ | statements statement ; statement : path_statement | include_statement | identifier_statement | logging_statement | padding_statement | listen_statement | timer_statement | sainfo_statement | remote_statement | special_statement ; /* path */ path_statement : PATH PATHTYPE QUOTEDSTRING { if ($2 > LC_PATHTYPE_MAX) { yyerror("invalid path type %d", $2); return -1; } /* free old pathinfo */ if (lcconf->pathinfo[$2]) racoon_free(lcconf->pathinfo[$2]); /* set new pathinfo */ lcconf->pathinfo[$2] = strdup($3->v); vfree($3); } EOS ; /* special */ special_statement : COMPLEX_BUNDLE SWITCH { lcconf->complex_bundle = $2; } EOS ; /* include */ include_statement : INCLUDE QUOTEDSTRING { char path[MAXPATHLEN]; getpathname(path, sizeof(path), LC_PATHTYPE_INCLUDE, $2->v); vfree($2); if (yycf_switch_buffer(path) != 0) return -1; } EOS ; /* self infomation */ identifier_statement : IDENTIFIER identifier_stmt ; identifier_stmt : VENDORID { /*XXX to be deleted */ } QUOTEDSTRING EOS | IDENTIFIERTYPE QUOTEDSTRING { /*XXX to be deleted */ $2->l--; /* nuke '\0' */ lcconf->ident[$1] = $2; if (lcconf->ident[$1] == NULL) { yyerror("failed to set my ident: %s", strerror(errno)); return -1; } } EOS ; /* logging */ logging_statement : LOGGING log_level EOS ; log_level : HEXSTRING { /* * XXX ignore it because this specification * will be obsoleted. */ yywarn("see racoon.conf(5), such a log specification will be obsoleted."); vfree($1); } | LOGLEV { /* * set the loglevel by configuration file only when * the command line did not specify any loglevel. */ if (loglevel <= LLV_BASE) loglevel += $1; } ; /* padding */ padding_statement : PADDING BOC padding_stmts EOC ; padding_stmts : /* nothing */ | padding_stmts padding_stmt ; padding_stmt : PAD_RANDOMIZE SWITCH { lcconf->pad_random = $2; } EOS | PAD_RANDOMIZELEN SWITCH { lcconf->pad_randomlen = $2; } EOS | PAD_MAXLEN NUMBER { lcconf->pad_maxsize = $2; } EOS | PAD_STRICT SWITCH { lcconf->pad_strict = $2; } EOS | PAD_EXCLTAIL SWITCH { lcconf->pad_excltail = $2; } EOS ; /* listen */ listen_statement : LISTEN BOC listen_stmts EOC ; listen_stmts : /* nothing */ | listen_stmts listen_stmt ; listen_stmt : X_ISAKMP ike_addrinfo_port { struct myaddrs *p; p = newmyaddr(); if (p == NULL) { yyerror("failed to allocate myaddrs"); return -1; } p->addr = $2; if (p->addr == NULL) { yyerror("failed to copy sockaddr "); delmyaddr(p); return -1; } insmyaddr(p, &lcconf->myaddrs); lcconf->autograbaddr = 0; } EOS | X_ADMIN { yyerror("admin directive is obsoleted."); } PORT EOS | STRICT_ADDRESS { lcconf->strict_address = TRUE; } EOS ; ike_addrinfo_port : ADDRSTRING ike_port { char portbuf[10]; snprintf(portbuf, sizeof(portbuf), "%ld", $2); $$ = str2saddr($1->v, portbuf); vfree($1); if (!$$) return -1; } ; ike_port : /* nothing */ { $$ = PORT_ISAKMP; } | PORT { $$ = $1; } ; /* timer */ timer_statement : RETRY BOC timer_stmts EOC ; timer_stmts : /* nothing */ | timer_stmts timer_stmt ; timer_stmt : RETRY_COUNTER NUMBER { lcconf->retry_counter = $2; } EOS | RETRY_INTERVAL NUMBER unittype_time { lcconf->retry_interval = $2 * $3; } EOS | RETRY_PERSEND NUMBER { lcconf->count_persend = $2; } EOS | RETRY_PHASE1 NUMBER unittype_time { lcconf->retry_checkph1 = $2 * $3; } EOS | RETRY_PHASE2 NUMBER unittype_time { lcconf->wait_ph2complete = $2 * $3; } EOS ; /* sainfo */ sainfo_statement : SAINFO { cur_sainfo = newsainfo(); if (cur_sainfo == NULL) { yyerror("failed to allocate sainfo"); return -1; } } sainfo_name BOC sainfo_specs { struct sainfo *check; /* default */ if (cur_sainfo->algs[algclass_ipsec_enc] == 0) { yyerror("no encryption algorithm at %s", sainfo2str(cur_sainfo)); return -1; } if (cur_sainfo->algs[algclass_ipsec_auth] == 0) { yyerror("no authentication algorithm at %s", sainfo2str(cur_sainfo)); return -1; } if (cur_sainfo->algs[algclass_ipsec_comp] == 0) { yyerror("no compression algorithm at %s", sainfo2str(cur_sainfo)); return -1; } /* duplicate check */ check = getsainfo(cur_sainfo->idsrc, cur_sainfo->iddst); if (check && (!check->idsrc && !cur_sainfo->idsrc)) { yyerror("duplicated sainfo: %s", sainfo2str(cur_sainfo)); return -1; } inssainfo(cur_sainfo); } EOC ; sainfo_name : ANONYMOUS { cur_sainfo->idsrc = NULL; cur_sainfo->iddst = NULL; } | sainfo_id sainfo_id { cur_sainfo->idsrc = $1; cur_sainfo->iddst = $2; } ; sainfo_id : IDENTIFIERTYPE ADDRSTRING prefix port ul_proto { char portbuf[10]; struct sockaddr *saddr; if (($5 == IPPROTO_ICMP || $5 == IPPROTO_ICMPV6) && ($4 != IPSEC_PORT_ANY || $4 != IPSEC_PORT_ANY)) { yyerror("port number must be \"any\"."); return -1; } snprintf(portbuf, sizeof(portbuf), "%lu", $4); saddr = str2saddr($2->v, portbuf); vfree($2); if (saddr == NULL) return -1; switch (saddr->sa_family) { case AF_INET: if ($5 == IPPROTO_ICMPV6) { yyerror("upper layer protocol mismatched.\n"); racoon_free(saddr); return -1; } $$ = ipsecdoi_sockaddr2id(saddr, $3 == ~0 ? (sizeof(struct in_addr) << 3): $3, $5); break; #ifdef INET6 case AF_INET6: if ($5 == IPPROTO_ICMP) { yyerror("upper layer protocol mismatched.\n"); racoon_free(saddr); return -1; } $$ = ipsecdoi_sockaddr2id(saddr, $3 == ~0 ? (sizeof(struct in6_addr) << 3) : $3, $5); break; #endif default: yyerror("invalid family: %d", saddr->sa_family); break; } racoon_free(saddr); if ($$ == NULL) return -1; } | IDENTIFIERTYPE QUOTEDSTRING { struct ipsecdoi_id_b *id_b; if ($1 == IDTYPE_ASN1DN) { yyerror("id type forbidden: %d", $1); return -1; } $2->l--; $$ = vmalloc(sizeof(*id_b) + $2->l); if ($$ == NULL) { yyerror("failed to allocate identifier"); return -1; } id_b = (struct ipsecdoi_id_b *)$$->v; id_b->type = idtype2doi($1); id_b->proto_id = 0; id_b->port = 0; memcpy($$->v + sizeof(*id_b), $2->v, $2->l); } ; sainfo_specs : /* nothing */ | sainfo_specs sainfo_spec ; sainfo_spec : PFS_GROUP dh_group_num { cur_sainfo->pfs_group = $2; } EOS | LIFETIME LIFETYPE_TIME NUMBER unittype_time { cur_sainfo->lifetime = $3 * $4; } EOS | LIFETIME LIFETYPE_BYTE NUMBER unittype_byte { #if 1 yyerror("byte lifetime support is deprecated"); return -1; #else cur_sainfo->lifebyte = fix_lifebyte($3 * $4); if (cur_sainfo->lifebyte == 0) return -1; #endif } EOS | ALGORITHM_CLASS { cur_algclass = $1; } algorithms EOS | IDENTIFIER IDENTIFIERTYPE { yyerror("it's deprecated to specify a identifier in phase 2"); } EOS | MY_IDENTIFIER IDENTIFIERTYPE QUOTEDSTRING { yyerror("it's deprecated to specify a identifier in phase 2"); } EOS ; algorithms : algorithm { inssainfoalg(&cur_sainfo->algs[cur_algclass], $1); } | algorithm { inssainfoalg(&cur_sainfo->algs[cur_algclass], $1); } COMMA algorithms ; algorithm : ALGORITHMTYPE keylength { int defklen; $$ = newsainfoalg(); if ($$ == NULL) { yyerror("failed to get algorithm alocation"); return -1; } $$->alg = algtype2doi(cur_algclass, $1); if ($$->alg == -1) { yyerror("algorithm mismatched"); racoon_free($$); return -1; } defklen = default_keylen(cur_algclass, $1); if (defklen == 0) { if ($2) { yyerror("keylen not allowed"); racoon_free($$); return -1; } } else { if ($2 && check_keylen(cur_algclass, $1, $2) < 0) { yyerror("invalid keylen %d", $2); racoon_free($$); return -1; } } if ($2) $$->encklen = $2; else $$->encklen = defklen; /* check if it's supported algorithm by kernel */ if (!(cur_algclass == algclass_ipsec_auth && $1 == algtype_non_auth) && pk_checkalg(cur_algclass, $1, $$->encklen)) { int a = algclass2doi(cur_algclass); int b = algtype2doi(cur_algclass, $1); if (a == IPSECDOI_ATTR_AUTH) a = IPSECDOI_PROTO_IPSEC_AH; yyerror("algorithm %s not supported", s_ipsecdoi_trns(a, b)); racoon_free($$); return -1; } } ; prefix : /* nothing */ { $$ = ~0; } | PREFIX { $$ = $1; } ; port : /* nothing */ { $$ = IPSEC_PORT_ANY; } | PORT { $$ = $1; } | PORTANY { $$ = IPSEC_PORT_ANY; } ; ul_proto : NUMBER { $$ = $1; } | UL_PROTO { $$ = $1; } | ANY { $$ = IPSEC_ULPROTO_ANY; } ; keylength : /* nothing */ { $$ = 0; } | NUMBER { $$ = $1; } ; /* remote */ remote_statement : REMOTE remote_index { struct remoteconf *new; struct proposalspec *prspec; new = newrmconf(); if (new == NULL) { yyerror("failed to get new remoteconf."); return -1; } new->remote = $2; cur_rmconf = new; prspec = newprspec(); if (prspec == NULL) return -1; prspec->lifetime = oakley_get_defaultlifetime(); insprspec(prspec, &prhead); } BOC remote_specs { /* check a exchange mode */ if (cur_rmconf->etypes == NULL) { yyerror("no exchange mode specified.\n"); return -1; } if (cur_rmconf->idvtype == IDTYPE_ASN1DN && cur_rmconf->mycertfile == NULL) { yyerror("id type mismatched due to " "no CERT defined.\n"); return -1; } if (set_isakmp_proposal(cur_rmconf, prhead) != 0) return -1; /* DH group settting if aggressive mode is there. */ if (check_etypeok(cur_rmconf, ISAKMP_ETYPE_AGG) != NULL) { struct isakmpsa *p; int b = 0; /* DH group */ for (p = cur_rmconf->proposal; p; p = p->next) { if (b == 0 || (b && b == p->dh_group)) { b = p->dh_group; continue; } yyerror("DH group must be equal " "to each proposals's " "when aggressive mode is " "used.\n"); return -1; } cur_rmconf->dh_group = b; if (cur_rmconf->dh_group == 0) { yyerror("DH group must be required.\n"); return -1; } /* DH group settting if PFS is required. */ if (oakley_setdhgroup(cur_rmconf->dh_group, &cur_rmconf->dhgrp) < 0) { yyerror("failed to set DH value.\n"); return -1; } } insrmconf(cur_rmconf); cleanprhead(); } EOC ; remote_index : ANONYMOUS ike_port { $$ = newsaddr(sizeof(struct sockaddr *)); $$->sa_family = AF_UNSPEC; ((struct sockaddr_in *)$$)->sin_port = htons($2); } | ike_addrinfo_port { $$ = $1; if ($$ == NULL) { yyerror("failed to allocate sockaddr"); return -1; } } ; remote_specs : /* nothing */ | remote_specs remote_spec ; remote_spec : EXCHANGE_MODE exchange_types EOS | DOI DOITYPE { cur_rmconf->doitype = $2; } EOS | SITUATION SITUATIONTYPE { cur_rmconf->sittype = $2; } EOS | CERTIFICATE_TYPE cert_spec | PEERS_CERTFILE QUOTEDSTRING { #ifdef HAVE_SIGNING_C cur_rmconf->getcert_method = ISAKMP_GETCERT_LOCALFILE; cur_rmconf->peerscertfile = strdup($2->v); vfree($2); #else yyerror("directive not supported"); return -1; #endif } EOS | PEERS_CERTFILE DNSSEC { #ifdef HAVE_SIGNING_C cur_rmconf->getcert_method = ISAKMP_GETCERT_DNS; cur_rmconf->peerscertfile = NULL; #else yyerror("directive not supported"); return -1; #endif } EOS | VERIFY_CERT SWITCH { cur_rmconf->verify_cert = $2; } EOS | SEND_CERT SWITCH { cur_rmconf->send_cert = $2; } EOS | SEND_CR SWITCH { cur_rmconf->send_cr = $2; } EOS | IDENTIFIER IDENTIFIERTYPE { /*XXX to be deleted */ cur_rmconf->idvtype = $2; } EOS | MY_IDENTIFIER IDENTIFIERTYPE identifierstring { if (set_identifier(&cur_rmconf->idv, $2, $3) != 0) { yyerror("failed to set identifer.\n"); return -1; } cur_rmconf->idvtype = $2; } EOS | PEERS_IDENTIFIER IDENTIFIERTYPE identifierstring { if (set_identifier(&cur_rmconf->idv_p, $2, $3) != 0) { yyerror("failed to set identifer.\n"); return -1; } cur_rmconf->idvtype_p = $2; } EOS | VERIFY_IDENTIFIER SWITCH { cur_rmconf->verify_identifier = $2; } EOS | NONCE_SIZE NUMBER { cur_rmconf->nonce_size = $2; } EOS | DH_GROUP { yyerror("dh_group cannot be defined here."); return -1; } dh_group_num EOS | KEEPALIVE { cur_rmconf->keepalive = TRUE; } EOS | PASSIVE SWITCH { cur_rmconf->passive = $2; } EOS | GENERATE_POLICY SWITCH { cur_rmconf->gen_policy = $2; } EOS | SUPPORT_MIP6 SWITCH { cur_rmconf->support_mip6 = $2; } EOS | INITIAL_CONTACT SWITCH { cur_rmconf->ini_contact = $2; } EOS | PROPOSAL_CHECK PROPOSAL_CHECK_LEVEL { cur_rmconf->pcheck_level = $2; } EOS | LIFETIME LIFETYPE_TIME NUMBER unittype_time { prhead->lifetime = $3 * $4; } EOS | LIFETIME LIFETYPE_BYTE NUMBER unittype_byte { #if 1 yyerror("byte lifetime support is deprecated"); return -1; #else yywarn("the lifetime of bytes in phase 1 " "will be ignored at the moment."); prhead->lifebyte = fix_lifebyte($3 * $4); if (prhead->lifebyte == 0) return -1; #endif } EOS | PROPOSAL { struct secprotospec *spspec; spspec = newspspec(); if (spspec == NULL) return -1; insspspec(spspec, &prhead); } BOC isakmpproposal_specs EOC ; exchange_types : /* nothing */ | exchange_types EXCHANGETYPE { struct etypes *new; new = racoon_malloc(sizeof(struct etypes)); if (new == NULL) { yyerror("filed to allocate etypes"); return -1; } new->type = $2; new->next = NULL; if (cur_rmconf->etypes == NULL) cur_rmconf->etypes = new; else { struct etypes *p; for (p = cur_rmconf->etypes; p->next != NULL; p = p->next) ; p->next = new; } } ; cert_spec : CERT_X509 QUOTEDSTRING QUOTEDSTRING { #ifdef HAVE_SIGNING_C cur_rmconf->certtype = $1; cur_rmconf->mycertfile = strdup($2->v); vfree($2); cur_rmconf->myprivfile = strdup($3->v); vfree($3); #else yyerror("directive not supported"); return -1; #endif } EOS ; dh_group_num : ALGORITHMTYPE { $$ = algtype2doi(algclass_isakmp_dh, $1); if ($$ == -1) { yyerror("must be DH group"); return -1; } } | NUMBER { if (ARRAYLEN(num2dhgroup) > $1 && num2dhgroup[$1] != 0) { $$ = num2dhgroup[$1]; } else { yyerror("must be DH group"); return -1; } } ; identifierstring : /* nothing */ { $$ = NULL; } | ADDRSTRING { $$ = $1; } | QUOTEDSTRING { $$ = $1; } ; isakmpproposal_specs : /* nothing */ | isakmpproposal_specs isakmpproposal_spec ; isakmpproposal_spec : STRENGTH { yyerror("strength directive is obsoleted."); } STRENGTHTYPE EOS | LIFETIME LIFETYPE_TIME NUMBER unittype_time { prhead->spspec->lifetime = $3 * $4; } EOS | LIFETIME LIFETYPE_BYTE NUMBER unittype_byte { #if 1 yyerror("byte lifetime support is deprecated"); return -1; #else prhead->spspec->lifebyte = fix_lifebyte($3 * $4); if (prhead->spspec->lifebyte == 0) return -1; #endif } EOS | DH_GROUP dh_group_num { prhead->spspec->algclass[algclass_isakmp_dh] = $2; } EOS | GSSAPI_ID QUOTEDSTRING { if (prhead->spspec->vendorid != VENDORID_GSSAPI) { yyerror("wrong Vendor ID for gssapi_id"); return -1; } prhead->spspec->gssid = strdup($2->v); } EOS | ALGORITHM_CLASS ALGORITHMTYPE keylength { int doi; int defklen; doi = algtype2doi($1, $2); if (doi == -1) { yyerror("algorithm mismatched 1"); return -1; } switch ($1) { case algclass_isakmp_enc: /* reject suppressed algorithms */ #ifndef HAVE_OPENSSL_RC5_H if ($2 == algtype_rc5) { yyerror("algorithm %s not supported", s_attr_isakmp_enc(doi)); return -1; } #endif #ifndef HAVE_OPENSSL_IDEA_H if ($2 == algtype_idea) { yyerror("algorithm %s not supported", s_attr_isakmp_enc(doi)); return -1; } #endif prhead->spspec->algclass[algclass_isakmp_enc] = doi; defklen = default_keylen($1, $2); if (defklen == 0) { if ($3) { yyerror("keylen not allowed"); return -1; } } else { if ($3 && check_keylen($1, $2, $3) < 0) { yyerror("invalid keylen %d", $3); return -1; } } if ($3) prhead->spspec->encklen = $3; else prhead->spspec->encklen = defklen; break; case algclass_isakmp_hash: prhead->spspec->algclass[algclass_isakmp_hash] = doi; break; case algclass_isakmp_ameth: prhead->spspec->algclass[algclass_isakmp_ameth] = doi; /* * We may have to set the Vendor ID for the * authentication method we're using. */ switch ($2) { case algtype_gssapikrb: if (prhead->spspec->vendorid != VENDORID_UNKNOWN) { yyerror("Vendor ID mismatch " "for auth method"); return -1; } /* * For interoperability with Win2k, * we set the Vendor ID to "GSSAPI". */ prhead->spspec->vendorid = VENDORID_GSSAPI; break; default: break; } break; default: yyerror("algorithm mismatched 2"); return -1; } } EOS ; unittype_time : UNITTYPE_SEC { $$ = 1; } | UNITTYPE_MIN { $$ = 60; } | UNITTYPE_HOUR { $$ = (60 * 60); } ; unittype_byte : UNITTYPE_BYTE { $$ = 1; } | UNITTYPE_KBYTES { $$ = 1024; } | UNITTYPE_MBYTES { $$ = (1024 * 1024); } | UNITTYPE_TBYTES { $$ = (1024 * 1024 * 1024); } ; %% static struct proposalspec * newprspec() { struct proposalspec *new; new = racoon_calloc(1, sizeof(*new)); if (new == NULL) yyerror("failed to allocate proposal"); return new; } static void cleanprhead() { struct proposalspec *p, *next; if (prhead == NULL) return; for (p = prhead; p != NULL; p = next) { next = p->next; racoon_free(p); } prhead = NULL; } /* * insert into head of list. */ static void insprspec(prspec, head) struct proposalspec *prspec; struct proposalspec **head; { if (*head != NULL) (*head)->prev = prspec; prspec->next = *head; *head = prspec; } static struct secprotospec * newspspec() { struct secprotospec *new; new = racoon_calloc(1, sizeof(*new)); if (new == NULL) { yyerror("failed to allocate spproto"); return NULL; } new->encklen = 0; /*XXX*/ /* * Default to "uknown" vendor -- we will override this * as necessary. When we send a Vendor ID payload, an * "unknown" will be translated to a KAME/racoon ID. */ new->vendorid = VENDORID_UNKNOWN; return new; } /* * insert into head of list. */ static void insspspec(spspec, head) struct secprotospec *spspec; struct proposalspec **head; { spspec->back = *head; if ((*head)->spspec != NULL) (*head)->spspec->prev = spspec; spspec->next = (*head)->spspec; (*head)->spspec = spspec; } /* set final acceptable proposal */ static int set_isakmp_proposal(rmconf, prspec) struct remoteconf *rmconf; struct proposalspec *prspec; { struct proposalspec *p; struct secprotospec *s; int prop_no = 1; int trns_no = 1; u_int32_t types[MAXALGCLASS]; p = prspec; if (p->next != 0) { plog(LLV_ERROR, LOCATION, NULL, "multiple proposal definition.\n"); return -1; } /* mandatory check */ if (p->spspec == NULL) { yyerror("no remote specification found: %s.\n", rm2str(rmconf)); return -1; } for (s = p->spspec; s != NULL; s = s->next) { /* XXX need more to check */ if (s->algclass[algclass_isakmp_enc] == 0) { yyerror("encryption algorithm required."); return -1; } if (s->algclass[algclass_isakmp_hash] == 0) { yyerror("hash algorithm required."); return -1; } if (s->algclass[algclass_isakmp_dh] == 0) { yyerror("DH group required."); return -1; } if (s->algclass[algclass_isakmp_ameth] == 0) { yyerror("authentication method required."); return -1; } } /* skip to last part */ for (s = p->spspec; s->next != NULL; s = s->next) ; while (s != NULL) { plog(LLV_DEBUG2, LOCATION, NULL, "lifetime = %ld\n", (long) (s->lifetime ? s->lifetime : p->lifetime)); plog(LLV_DEBUG2, LOCATION, NULL, "lifebyte = %d\n", s->lifebyte ? s->lifebyte : p->lifebyte); plog(LLV_DEBUG2, LOCATION, NULL, "encklen=%d\n", s->encklen); memset(types, 0, ARRAYLEN(types)); types[algclass_isakmp_enc] = s->algclass[algclass_isakmp_enc]; types[algclass_isakmp_hash] = s->algclass[algclass_isakmp_hash]; types[algclass_isakmp_dh] = s->algclass[algclass_isakmp_dh]; types[algclass_isakmp_ameth] = s->algclass[algclass_isakmp_ameth]; /* expanding spspec */ clean_tmpalgtype(); trns_no = expand_isakmpspec(prop_no, trns_no, types, algclass_isakmp_enc, algclass_isakmp_ameth + 1, s->lifetime ? s->lifetime : p->lifetime, s->lifebyte ? s->lifebyte : p->lifebyte, s->encklen, s->vendorid, s->gssid, rmconf); if (trns_no == -1) { plog(LLV_ERROR, LOCATION, NULL, "failed to expand isakmp proposal.\n"); return -1; } s = s->prev; } if (rmconf->proposal == NULL) { plog(LLV_ERROR, LOCATION, NULL, "no proposal found.\n"); return -1; } return 0; } static void clean_tmpalgtype() { int i; for (i = 0; i < MAXALGCLASS; i++) tmpalgtype[i] = 0; /* means algorithm undefined. */ } static int expand_isakmpspec(prop_no, trns_no, types, class, last, lifetime, lifebyte, encklen, vendorid, gssid, rmconf) int prop_no, trns_no; int *types, class, last; time_t lifetime; int lifebyte; int encklen; int vendorid; char *gssid; struct remoteconf *rmconf; { struct isakmpsa *new; /* debugging */ { int j; char tb[10]; plog(LLV_DEBUG2, LOCATION, NULL, "p:%d t:%d\n", prop_no, trns_no); for (j = class; j < MAXALGCLASS; j++) { snprintf(tb, sizeof(tb), "%d", types[j]); plog(LLV_DEBUG2, LOCATION, NULL, "%s%s%s%s\n", s_algtype(j, types[j]), types[j] ? "(" : "", tb[0] == '0' ? "" : tb, types[j] ? ")" : ""); } plog(LLV_DEBUG2, LOCATION, NULL, "\n"); } #define TMPALGTYPE2STR(n) \ s_algtype(algclass_isakmp_##n, types[algclass_isakmp_##n]) /* check mandatory values */ if (types[algclass_isakmp_enc] == 0 || types[algclass_isakmp_ameth] == 0 || types[algclass_isakmp_hash] == 0 || types[algclass_isakmp_dh] == 0) { yyerror("few definition of algorithm " "enc=%s ameth=%s hash=%s dhgroup=%s.\n", TMPALGTYPE2STR(enc), TMPALGTYPE2STR(ameth), TMPALGTYPE2STR(hash), TMPALGTYPE2STR(dh)); return -1; } #undef TMPALGTYPE2STR /* set new sa */ new = newisakmpsa(); if (new == NULL) { yyerror("failed to allocate isakmp sa"); return -1; } new->prop_no = prop_no; new->trns_no = trns_no++; new->lifetime = lifetime; new->lifebyte = lifebyte; new->enctype = types[algclass_isakmp_enc]; new->encklen = encklen; new->authmethod = types[algclass_isakmp_ameth]; new->hashtype = types[algclass_isakmp_hash]; new->dh_group = types[algclass_isakmp_dh]; new->vendorid = vendorid; #ifdef HAVE_GSSAPI if (gssid != NULL) { new->gssid = vmalloc(strlen(gssid) + 1); memcpy(new->gssid->v, gssid, new->gssid->l); racoon_free(gssid); } else new->gssid = NULL; #endif insisakmpsa(new, rmconf); return trns_no; } #if 0 /* * fix lifebyte. * Must be more than 1024B because its unit is kilobytes. * That is defined RFC2407. */ static int fix_lifebyte(t) unsigned long t; { if (t < 1024) { yyerror("byte size should be more than 1024B."); return 0; } return(t / 1024); } #endif int cfparse() { int error; yycf_init_buffer(); if (yycf_set_buffer(lcconf->racoon_conf) != 0) return -1; prhead = NULL; error = yyparse(); if (error != 0) { if (yyerrorcount) { plog(LLV_ERROR, LOCATION, NULL, "fatal parse failure (%d errors)\n", yyerrorcount); } else { plog(LLV_ERROR, LOCATION, NULL, "fatal parse failure.\n"); } return -1; } if (error == 0 && yyerrorcount) { plog(LLV_ERROR, LOCATION, NULL, "parse error is nothing, but yyerrorcount is %d.\n", yyerrorcount); exit(1); } yycf_clean_buffer(); plog(LLV_DEBUG2, LOCATION, NULL, "parse successed.\n"); return 0; } int cfreparse() { flushph2(); flushph1(); flushrmconf(); cleanprhead(); clean_tmpalgtype(); yycf_init_buffer(); if (yycf_set_buffer(lcconf->racoon_conf) != 0) return -1; return(cfparse()); }