1 /* $NetBSD: token.l,v 1.19 2014/09/10 21:01:33 christos Exp $ */ 2 3 /* $KAME: token.l,v 1.44 2003/10/21 07:20:58 itojun Exp $ */ 4 5 /* 6 * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 %{ 35 36 #ifdef HAVE_CONFIG_H 37 #include "config.h" 38 #endif 39 40 #include <sys/types.h> 41 #include <sys/param.h> 42 #include <sys/socket.h> 43 #include <net/pfkeyv2.h> 44 #include <netinet/in.h> 45 #include PATH_IPSEC_H 46 47 #include <stdlib.h> 48 #include <limits.h> 49 #include <string.h> 50 #include <unistd.h> 51 #include <errno.h> 52 #include <netdb.h> 53 54 #include "vchar.h" 55 #if defined(__NetBSD__) || defined(__FreeBSD__) || defined(__linux__) || \ 56 (defined(__APPLE__) && defined(__MACH__)) 57 #include "parse.h" 58 #else 59 #include "y.tab.h" 60 #endif 61 62 #include "extern.h" 63 64 /* make the code compile on *BSD-current */ 65 #ifndef SADB_X_AALG_SHA2_256 66 #define SADB_X_AALG_SHA2_256 (-1) 67 #endif 68 #ifndef SADB_X_AALG_SHA2_384 69 #define SADB_X_AALG_SHA2_384 (-1) 70 #endif 71 #ifndef SADB_X_AALG_SHA2_512 72 #define SADB_X_AALG_SHA2_512 (-1) 73 #endif 74 #ifndef SADB_X_AALG_RIPEMD160HMAC 75 #define SADB_X_AALG_RIPEMD160HMAC (-1) 76 #endif 77 #ifndef SADB_X_AALG_AES_XCBC_MAC 78 #define SADB_X_AALG_AES_XCBC_MAC (-1) 79 #endif 80 #ifndef SADB_X_EALG_TWOFISHCBC 81 #define SADB_X_EALG_TWOFISHCBC (-1) 82 #endif 83 #ifndef SADB_X_EALG_AESCTR 84 #define SADB_X_EALG_AESCTR (-1) 85 #endif 86 #if defined(SADB_X_EALG_AES) && ! defined(SADB_X_EALG_AESCBC) 87 #define SADB_X_EALG_AESCBC SADB_X_EALG_AES 88 #endif 89 %} 90 91 /* common section */ 92 nl \n 93 ws [ \t]+ 94 digit [0-9] 95 letter [0-9A-Za-z] 96 hexdigit [0-9A-Fa-f] 97 dot \. 98 hyphen \- 99 slash \/ 100 blcl \[ 101 elcl \] 102 semi \; 103 comment \#.* 104 quotedstring \"[^"]*\" 105 decstring {digit}+ 106 hexstring 0[xX]{hexdigit}+ 107 ipaddress [a-fA-F0-9:]([a-fA-F0-9:\.]*|[a-fA-F0-9:\.]*%[a-zA-Z0-9]*) 108 ipaddrmask {slash}{digit}{1,3} 109 name {letter}(({letter}|{digit}|{hyphen})*({letter}|{digit}))* 110 hostname {name}(({dot}{name})+{dot}?)? 111 112 %s S_PL S_AUTHALG S_ENCALG 113 114 %option noinput nounput 115 %% 116 117 118 add { return(ADD); } 119 delete { return(DELETE); } 120 deleteall { return(DELETEALL); } 121 get { return(GET); } 122 flush { return(FLUSH); } 123 dump { return(DUMP); } 124 exit { return(EXIT); } 125 quit { return(EXIT); } 126 bye { return(EXIT); } 127 128 /* for management SPD */ 129 spdadd { return(SPDADD); } 130 spdupdate { return(SPDUPDATE); } 131 spddelete { return(SPDDELETE); } 132 spddump { return(SPDDUMP); } 133 spdflush { return(SPDFLUSH); } 134 tagged { return(TAGGED); } 135 {hyphen}P { BEGIN S_PL; return(F_POLICY); } 136 <S_PL>[a-zA-Z0-9:\.\-_/ \n\t][a-zA-Z0-9:\.%\-+_/ \n\t\]\[]* { 137 yymore(); 138 139 /* count up for nl */ 140 { 141 char *p; 142 for (p = yytext; *p != '\0'; p++) 143 if (*p == '\n') 144 lineno++; 145 } 146 147 yylval.val.len = strlen(yytext); 148 yylval.val.buf = strdup(yytext); 149 if (!yylval.val.buf) 150 yyfatal("insufficient memory"); 151 152 return(PL_REQUESTS); 153 } 154 <S_PL>{semi} { BEGIN INITIAL; return(EOT); } 155 156 /* address resolution flags */ 157 {hyphen}[n46][n46]* { 158 yylval.val.len = strlen(yytext); 159 yylval.val.buf = strdup(yytext); 160 if (!yylval.val.buf) 161 yyfatal("insufficient memory"); 162 return(F_AIFLAGS); 163 } 164 165 /* security protocols */ 166 ah { yylval.num = 0; return(PR_AH); } 167 esp { yylval.num = 0; return(PR_ESP); } 168 ah-old { yylval.num = 1; return(PR_AH); } 169 esp-old { yylval.num = 1; return(PR_ESP); } 170 esp-udp { yylval.num = 0; return(PR_ESPUDP); } 171 ipcomp { yylval.num = 0; return(PR_IPCOMP); } 172 tcp { 173 yylval.num = 0; return(PR_TCP); 174 } 175 176 /* authentication alogorithm */ 177 {hyphen}A { BEGIN S_AUTHALG; return(F_AUTH); } 178 <S_AUTHALG>hmac-md5 { yylval.num = SADB_AALG_MD5HMAC; BEGIN INITIAL; return(ALG_AUTH); } 179 <S_AUTHALG>hmac-sha1 { yylval.num = SADB_AALG_SHA1HMAC; BEGIN INITIAL; return(ALG_AUTH); } 180 <S_AUTHALG>keyed-md5 { yylval.num = SADB_X_AALG_MD5; BEGIN INITIAL; return(ALG_AUTH); } 181 <S_AUTHALG>keyed-sha1 { yylval.num = SADB_X_AALG_SHA; BEGIN INITIAL; return(ALG_AUTH); } 182 <S_AUTHALG>hmac-sha2-256 { yylval.num = SADB_X_AALG_SHA2_256; BEGIN INITIAL; return(ALG_AUTH); } 183 <S_AUTHALG>hmac-sha256 { yylval.num = SADB_X_AALG_SHA2_256; BEGIN INITIAL; return(ALG_AUTH); } 184 <S_AUTHALG>hmac-sha2-384 { yylval.num = SADB_X_AALG_SHA2_384; BEGIN INITIAL; return(ALG_AUTH); } 185 <S_AUTHALG>hmac-sha384 { yylval.num = SADB_X_AALG_SHA2_384; BEGIN INITIAL; return(ALG_AUTH); } 186 <S_AUTHALG>hmac-sha2-512 { yylval.num = SADB_X_AALG_SHA2_512; BEGIN INITIAL; return(ALG_AUTH); } 187 <S_AUTHALG>hmac-sha512 { yylval.num = SADB_X_AALG_SHA2_512; BEGIN INITIAL; return(ALG_AUTH); } 188 <S_AUTHALG>hmac-ripemd160 { yylval.num = SADB_X_AALG_RIPEMD160HMAC; BEGIN INITIAL; return(ALG_AUTH); } 189 <S_AUTHALG>aes-xcbc-mac { yylval.num = SADB_X_AALG_AES_XCBC_MAC; BEGIN INITIAL; return(ALG_AUTH); } 190 <S_AUTHALG>tcp-md5 { 191 #ifdef SADB_X_AALG_TCP_MD5 192 yylval.num = SADB_X_AALG_TCP_MD5; 193 BEGIN INITIAL; 194 return(ALG_AUTH); 195 #endif 196 } 197 <S_AUTHALG>null { yylval.num = SADB_X_AALG_NULL; BEGIN INITIAL; return(ALG_AUTH_NOKEY); } 198 199 /* encryption alogorithm */ 200 {hyphen}E { BEGIN S_ENCALG; return(F_ENC); } 201 <S_ENCALG>des-cbc { yylval.num = SADB_EALG_DESCBC; BEGIN INITIAL; return(ALG_ENC); } 202 <S_ENCALG>3des-cbc { yylval.num = SADB_EALG_3DESCBC; BEGIN INITIAL; return(ALG_ENC); } 203 <S_ENCALG>null { yylval.num = SADB_EALG_NULL; BEGIN INITIAL; return(ALG_ENC_NOKEY); } 204 <S_ENCALG>simple { yylval.num = SADB_EALG_NULL; BEGIN INITIAL; return(ALG_ENC_OLD); } 205 <S_ENCALG>blowfish-cbc { yylval.num = SADB_X_EALG_BLOWFISHCBC; BEGIN INITIAL; return(ALG_ENC); } 206 <S_ENCALG>cast128-cbc { yylval.num = SADB_X_EALG_CAST128CBC; BEGIN INITIAL; return(ALG_ENC); } 207 <S_ENCALG>des-deriv { yylval.num = SADB_EALG_DESCBC; BEGIN INITIAL; return(ALG_ENC_DESDERIV); } 208 <S_ENCALG>des-32iv { yylval.num = SADB_EALG_DESCBC; BEGIN INITIAL; return(ALG_ENC_DES32IV); } 209 <S_ENCALG>twofish-cbc { yylval.num = SADB_X_EALG_TWOFISHCBC; BEGIN INITIAL; return(ALG_ENC); } 210 <S_ENCALG>aes-cbc { 211 #ifdef SADB_X_EALG_AESCBC 212 yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); 213 #endif 214 } 215 <S_ENCALG>rijndael-cbc { 216 #ifdef SADB_X_EALG_AESCBC 217 yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); 218 #endif 219 } 220 <S_ENCALG>aes-ctr { yylval.num = SADB_X_EALG_AESCTR; BEGIN INITIAL; return(ALG_ENC); } 221 <S_ENCALG>camellia-cbc { 222 #ifdef SADB_X_EALG_CAMELLIACBC 223 yylval.num = SADB_X_EALG_CAMELLIACBC; BEGIN INITIAL; return(ALG_ENC); 224 #endif 225 } 226 <S_ENCALG>aes-gcm-16 { 227 #ifdef SADB_X_EALG_AESGCM16 228 yylval.num = SADB_X_EALG_AESGCM16; BEGIN INITIAL; return(ALG_ENC); 229 #endif 230 } 231 <S_ENCALG>aes-gmac { 232 #ifdef SADB_X_EALG_AESGMAC 233 yylval.num = SADB_X_EALG_AESGMAC; BEGIN INITIAL; return(ALG_ENC); 234 #endif 235 } 236 237 /* compression algorithms */ 238 {hyphen}C { return(F_COMP); } 239 oui { yylval.num = SADB_X_CALG_OUI; return(ALG_COMP); } 240 deflate { yylval.num = SADB_X_CALG_DEFLATE; return(ALG_COMP); } 241 lzs { yylval.num = SADB_X_CALG_LZS; return(ALG_COMP); } 242 {hyphen}R { return(F_RAWCPI); } 243 244 /* extension */ 245 {hyphen}m { return(F_MODE); } 246 transport { yylval.num = IPSEC_MODE_TRANSPORT; return(MODE); } 247 tunnel { yylval.num = IPSEC_MODE_TUNNEL; return(MODE); } 248 {hyphen}u { return(F_REQID); } 249 {hyphen}f { return(F_EXT); } 250 random-pad { yylval.num = SADB_X_EXT_PRAND; return(EXTENSION); } 251 seq-pad { yylval.num = SADB_X_EXT_PSEQ; return(EXTENSION); } 252 zero-pad { yylval.num = SADB_X_EXT_PZERO; return(EXTENSION); } 253 nocyclic-seq { return(NOCYCLICSEQ); } 254 {hyphen}r { return(F_REPLAY); } 255 {hyphen}lh { return(F_LIFETIME_HARD); } 256 {hyphen}ls { return(F_LIFETIME_SOFT); } 257 {hyphen}bh { return(F_LIFEBYTE_HARD); } 258 {hyphen}bs { return(F_LIFEBYTE_SOFT); } 259 {hyphen}ctx { return(SECURITY_CTX); } 260 {hyphen}esp_frag { return(F_ESPFRAG); } 261 262 /* ... */ 263 any { return(ANY); } 264 {ws} { } 265 {nl} { lineno++; } 266 {comment} 267 {semi} { return(EOT); } 268 269 /* for address parameters: /prefix, [port] */ 270 {slash} { return SLASH; } 271 {blcl} { return BLCL; } 272 {elcl} { return ELCL; } 273 274 /* parameter */ 275 {decstring} { 276 char *bp; 277 278 yylval.ulnum = strtoul(yytext, &bp, 10); 279 return(DECSTRING); 280 } 281 282 {hexstring} { 283 yylval.val.buf = strdup(yytext + 2); 284 if (!yylval.val.buf) 285 yyfatal("insufficient memory"); 286 yylval.val.len = strlen(yylval.val.buf); 287 288 return(HEXSTRING); 289 } 290 291 {quotedstring} { 292 char *p = yytext; 293 while (*++p != '"') ; 294 *p = '\0'; 295 yytext++; 296 yylval.val.len = yyleng - 2; 297 yylval.val.buf = strdup(yytext); 298 if (!yylval.val.buf) 299 yyfatal("insufficient memory"); 300 301 return(QUOTEDSTRING); 302 } 303 304 [A-Za-z0-9:][A-Za-z0-9:%\.-]* { 305 yylval.val.len = yyleng; 306 yylval.val.buf = strdup(yytext); 307 if (!yylval.val.buf) 308 yyfatal("insufficient memory"); 309 return(STRING); 310 } 311 312 [0-9,]+ { 313 yylval.val.len = yyleng; 314 yylval.val.buf = strdup(yytext); 315 if (!yylval.val.buf) 316 yyfatal("insufficient memory"); 317 return(STRING); 318 } 319 320 . { 321 yyfatal("Syntax error"); 322 /*NOTREACHED*/ 323 } 324 325 %% 326 327 void 328 yyfatal(s) 329 const char *s; 330 { 331 yyerror(s); 332 exit(1); 333 } 334 335 void 336 yyerror(s) 337 const char *s; 338 { 339 printf("line %d: %s at [%s]\n", lineno, s, yytext); 340 } 341 342 int 343 parse(fp) 344 FILE **fp; 345 { 346 yyin = *fp; 347 348 lineno = 1; 349 parse_init(); 350 351 if (yyparse()) { 352 printf("parse failed, line %d.\n", lineno); 353 return(-1); 354 } 355 356 return(0); 357 } 358 359 int 360 parse_string (char *src) 361 { 362 int result; 363 YY_BUFFER_STATE buf_state; 364 365 buf_state = yy_scan_string(src); 366 result = yyparse(); 367 yy_delete_buffer(buf_state); 368 return result; 369 } 370 371