/* $OpenBSD: parse.y,v 1.42 2007/01/14 13:20:17 michele Exp $ */ /* * Copyright (c) 2004, 2005 Esben Norby * Copyright (c) 2004 Ryan McBride * Copyright (c) 2002, 2003, 2004 Henning Brauer * Copyright (c) 2001 Markus Friedl. All rights reserved. * Copyright (c) 2001 Daniel Hartmeier. All rights reserved. * Copyright (c) 2001 Theo de Raadt. All rights reserved. * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ %{ #include #include #include #include #include #include #include #include #include #include #include #include #include "ospf.h" #include "ospfd.h" #include "ospfe.h" #include "log.h" static struct ospfd_conf *conf; static FILE *fin = NULL; static int lineno = 1; static int errors = 0; char *infile; char *start_state; struct area *area = NULL; struct iface *iface = NULL; int yyerror(const char *, ...); int yyparse(void); int kw_cmp(const void *, const void *); int lookup(char *); int lgetc(FILE *); int lungetc(int); int findeol(void); int yylex(void); void clear_config(struct ospfd_conf *xconf); int check_file_secrecy(int fd, const char *fname); u_int32_t get_rtr_id(void); int host(const char *, struct in_addr *, struct in_addr *); struct config_defaults { char auth_key[MAX_SIMPLE_AUTH_LEN]; struct auth_md_head md_list; u_int32_t dead_interval; u_int16_t transmit_delay; u_int16_t hello_interval; u_int16_t rxmt_interval; u_int16_t metric; enum auth_type auth_type; u_int8_t auth_keyid; u_int8_t priority; }; struct config_defaults globaldefs; struct config_defaults areadefs; struct config_defaults ifacedefs; struct config_defaults *defs; TAILQ_HEAD(symhead, sym) symhead = TAILQ_HEAD_INITIALIZER(symhead); struct sym { TAILQ_ENTRY(sym) entries; int used; int persist; char *nam; char *val; }; int symset(const char *, const char *, int); char *symget(const char *); struct area *conf_get_area(struct in_addr); struct iface *conf_get_if(struct kif *, struct kif_addr *); typedef struct { union { u_int32_t number; char *string; } v; int lineno; } YYSTYPE; %} %token AREA INTERFACE ROUTERID FIBUPDATE REDISTRIBUTE RTLABEL %token RFC1583COMPAT SPFDELAY SPFHOLDTIME %token AUTHKEY AUTHTYPE AUTHMD AUTHMDKEYID %token METRIC PASSIVE %token HELLOINTERVAL TRANSMITDELAY %token RETRANSMITINTERVAL ROUTERDEADTIME ROUTERPRIORITY %token SET TYPE %token YES NO %token ERROR %token STRING %type number yesno no optlist, optlist_l option %type string %% grammar : /* empty */ | grammar '\n' | grammar conf_main '\n' | grammar varset '\n' | grammar area '\n' | grammar error '\n' { errors++; } ; number : STRING { u_int32_t uval; const char *errstr; uval = strtonum($1, 0, UINT_MAX, &errstr); if (errstr) { yyerror("number %s is %s", $1, errstr); free($1); YYERROR; } else $$ = uval; free($1); } ; string : string STRING { if (asprintf(&$$, "%s %s", $1, $2) == -1) { free($1); free($2); yyerror("string: asprintf"); YYERROR; } free($1); free($2); } | STRING ; yesno : YES { $$ = 1; } | NO { $$ = 0; } ; no : /* empty */ { $$ = 0; } | NO { $$ = 1; } varset : STRING '=' string { if (conf->opts & OSPFD_OPT_VERBOSE) printf("%s = \"%s\"\n", $1, $3); if (symset($1, $3, 0) == -1) fatal("cannot store variable"); free($1); free($3); } ; conf_main : ROUTERID STRING { if (!inet_aton($2, &conf->rtr_id)) { yyerror("error parsing router-id"); free($2); YYERROR; } free($2); } | FIBUPDATE yesno { if ($2 == 0) conf->flags |= OSPFD_FLAG_NO_FIB_UPDATE; else conf->flags &= ~OSPFD_FLAG_NO_FIB_UPDATE; } | no REDISTRIBUTE STRING optlist { struct redistribute *r; if (!strcmp($3, "default")) { if (!$1) conf->redistribute |= REDISTRIBUTE_DEFAULT; else conf->redistribute &= ~REDISTRIBUTE_DEFAULT; conf->defaultmetric = $4; } else { if ((r = calloc(1, sizeof(*r))) == NULL) fatal(NULL); if (!strcmp($3, "static")) r->type = REDIST_STATIC; else if (!strcmp($3, "connected")) r->type = REDIST_CONNECTED; else if (host($3, &r->addr, &r->mask)) r->type = REDIST_ADDR; else { yyerror("unknown redistribute type"); free($3); free(r); YYERROR; } if ($1) r->type |= REDIST_NO; r->metric = $4; SIMPLEQ_INSERT_TAIL(&conf->redist_list, r, entry); } conf->redistribute |= REDISTRIBUTE_ON; free($3); } | no REDISTRIBUTE RTLABEL STRING optlist { struct redistribute *r; if ((r = calloc(1, sizeof(*r))) == NULL) fatal(NULL); r->type = REDIST_LABEL; r->label = rtlabel_name2id($4); if ($1) r->type |= REDIST_NO; r->metric = $5; free($4); SIMPLEQ_INSERT_TAIL(&conf->redist_list, r, entry); conf->redistribute |= REDISTRIBUTE_ON; } | RFC1583COMPAT yesno { conf->rfc1583compat = $2; } | SPFDELAY number { if ($2 < MIN_SPF_DELAY || $2 > MAX_SPF_DELAY) { yyerror("spf-delay out of range " "(%d-%d)", MIN_SPF_DELAY, MAX_SPF_DELAY); YYERROR; } conf->spf_delay = $2; } | SPFHOLDTIME number { if ($2 < MIN_SPF_HOLDTIME || $2 > MAX_SPF_HOLDTIME) { yyerror("spf-holdtime out of range " "(%d-%d)", MIN_SPF_HOLDTIME, MAX_SPF_HOLDTIME); YYERROR; } conf->spf_hold_time = $2; } | defaults ; optlist : /* empty */ { $$ = DEFAULT_REDIST_METRIC; } | SET option { $$ = $2; } | SET optnl '{' optnl optlist_l optnl '}' { $$ = $5; } ; optlist_l : optlist_l comma option { if ($1 & LSA_ASEXT_E_FLAG && $3 & LSA_ASEXT_E_FLAG) { yyerror("redistribute type already defined"); YYERROR; } if ($1 & LSA_METRIC_MASK && $3 & LSA_METRIC_MASK) { yyerror("redistribute metric already defined"); YYERROR; } $$ = $1 | $3; } | option { $$ = $1; } ; option : METRIC number { if ($2 == 0 || $2 > MAX_METRIC) { yyerror("invalid redistribute metric"); YYERROR; } $$ = $2; } | TYPE number { switch ($2) { case 1: $$ = 0; break; case 2: $$ = LSA_ASEXT_E_FLAG; break; default: yyerror("illegal external type %u", $2); YYERROR; } } ; authmd : AUTHMD number STRING { if ($2 < MIN_MD_ID || $2 > MAX_MD_ID) { yyerror("auth-md key-id out of range " "(%d-%d)", MIN_MD_ID, MAX_MD_ID); free($3); YYERROR; } if (strlen($3) > MD5_DIGEST_LENGTH) { yyerror("auth-md key length out of range " "(max length %d)", MD5_DIGEST_LENGTH); free($3); YYERROR; } md_list_add(&defs->md_list, $2, $3); free($3); } authmdkeyid : AUTHMDKEYID number { if ($2 < MIN_MD_ID || $2 > MAX_MD_ID) { yyerror("auth-md-keyid out of range " "(%d-%d)", MIN_MD_ID, MAX_MD_ID); YYERROR; } defs->auth_keyid = $2; } authtype : AUTHTYPE STRING { enum auth_type type; if (!strcmp($2, "none")) type = AUTH_NONE; else if (!strcmp($2, "simple")) type = AUTH_SIMPLE; else if (!strcmp($2, "crypt")) type = AUTH_CRYPT; else { yyerror("unknown auth-type"); free($2); YYERROR; } free($2); defs->auth_type = type; } ; authkey : AUTHKEY STRING { if (strlen($2) > MAX_SIMPLE_AUTH_LEN) { yyerror("auth-key too long (max length %d)", MAX_SIMPLE_AUTH_LEN); free($2); YYERROR; } strncpy(defs->auth_key, $2, sizeof(defs->auth_key)); free($2); } ; defaults : METRIC number { if ($2 < MIN_METRIC || $2 > MAX_METRIC) { yyerror("metric out of range (%d-%d)", MIN_METRIC, MAX_METRIC); YYERROR; } defs->metric = $2; } | ROUTERPRIORITY number { if ($2 < MIN_PRIORITY || $2 > MAX_PRIORITY) { yyerror("router-priority out of range (%d-%d)", MIN_PRIORITY, MAX_PRIORITY); YYERROR; } defs->priority = $2; } | ROUTERDEADTIME number { if ($2 < MIN_RTR_DEAD_TIME || $2 > MAX_RTR_DEAD_TIME) { yyerror("router-dead-time out of range (%d-%d)", MIN_RTR_DEAD_TIME, MAX_RTR_DEAD_TIME); YYERROR; } defs->dead_interval = $2; } | TRANSMITDELAY number { if ($2 < MIN_TRANSMIT_DELAY || $2 > MAX_TRANSMIT_DELAY) { yyerror("transmit-delay out of range (%d-%d)", MIN_TRANSMIT_DELAY, MAX_TRANSMIT_DELAY); YYERROR; } defs->transmit_delay = $2; } | HELLOINTERVAL number { if ($2 < MIN_HELLO_INTERVAL || $2 > MAX_HELLO_INTERVAL) { yyerror("hello-interval out of range (%d-%d)", MIN_HELLO_INTERVAL, MAX_HELLO_INTERVAL); YYERROR; } defs->hello_interval = $2; } | RETRANSMITINTERVAL number { if ($2 < MIN_RXMT_INTERVAL || $2 > MAX_RXMT_INTERVAL) { yyerror("retransmit-interval out of range " "(%d-%d)", MIN_RXMT_INTERVAL, MAX_RXMT_INTERVAL); YYERROR; } defs->rxmt_interval = $2; } | authtype | authkey | authmdkeyid | authmd ; optnl : '\n' optnl | ; nl : '\n' optnl /* one newline or more */ ; comma : ',' | /*empty*/ ; area : AREA STRING { struct in_addr id; if (inet_aton($2, &id) == 0) { yyerror("error parsing area"); free($2); YYERROR; } free($2); area = conf_get_area(id); memcpy(&areadefs, defs, sizeof(areadefs)); md_list_copy(&areadefs.md_list, &defs->md_list); defs = &areadefs; } '{' optnl areaopts_l '}' { area = NULL; md_list_clr(&defs->md_list); defs = &globaldefs; } ; areaopts_l : areaopts_l areaoptsl nl | areaoptsl optnl ; areaoptsl : interface | defaults ; interface : INTERFACE STRING { struct kif *kif; struct kif_addr *ka = NULL; char *s; struct in_addr addr; s = strchr($2, ':'); if (s) { *s++ = '\0'; if (inet_aton(s, &addr) == 0) { yyerror( "error parsing interface address"); free($2); YYERROR; } } else addr.s_addr = 0; if ((kif = kif_findname($2, addr, &ka)) == NULL) { yyerror("unknown interface %s", $2); free($2); YYERROR; } if (ka == NULL) { if (s) yyerror("address %s not configured on " "interface %s", s, $2); else yyerror("unnumbered interface %s", $2); free($2); YYERROR; } free($2); iface = conf_get_if(kif, ka); if (iface == NULL) YYERROR; iface->area = area; LIST_INSERT_HEAD(&area->iface_list, iface, entry); memcpy(&ifacedefs, defs, sizeof(ifacedefs)); md_list_copy(&ifacedefs.md_list, &defs->md_list); defs = &ifacedefs; } interface_block { iface->dead_interval = defs->dead_interval; iface->transmit_delay = defs->transmit_delay; iface->hello_interval = defs->hello_interval; iface->rxmt_interval = defs->rxmt_interval; iface->metric = defs->metric; iface->priority = defs->priority; iface->auth_type = defs->auth_type; iface->auth_keyid = defs->auth_keyid; memcpy(iface->auth_key, defs->auth_key, sizeof(iface->auth_key)); md_list_copy(&iface->auth_md_list, &defs->md_list); md_list_clr(&defs->md_list); iface = NULL; /* interface is always part of an area */ defs = &areadefs; } ; interface_block : '{' optnl interfaceopts_l '}' | '{' optnl '}' | ; interfaceopts_l : interfaceopts_l interfaceoptsl nl | interfaceoptsl optnl ; interfaceoptsl : PASSIVE { iface->passive = 1; } | defaults ; %% struct keywords { const char *k_name; int k_val; }; int yyerror(const char *fmt, ...) { va_list ap; errors = 1; va_start(ap, fmt); fprintf(stderr, "%s:%d: ", infile, yylval.lineno); vfprintf(stderr, fmt, ap); fprintf(stderr, "\n"); va_end(ap); return (0); } int kw_cmp(const void *k, const void *e) { return (strcmp(k, ((const struct keywords *)e)->k_name)); } int lookup(char *s) { /* this has to be sorted always */ static const struct keywords keywords[] = { {"area", AREA}, {"auth-key", AUTHKEY}, {"auth-md", AUTHMD}, {"auth-md-keyid", AUTHMDKEYID}, {"auth-type", AUTHTYPE}, {"fib-update", FIBUPDATE}, {"hello-interval", HELLOINTERVAL}, {"interface", INTERFACE}, {"metric", METRIC}, {"no", NO}, {"passive", PASSIVE}, {"redistribute", REDISTRIBUTE}, {"retransmit-interval", RETRANSMITINTERVAL}, {"rfc1583compat", RFC1583COMPAT}, {"router-dead-time", ROUTERDEADTIME}, {"router-id", ROUTERID}, {"router-priority", ROUTERPRIORITY}, {"rtlabel", RTLABEL}, {"set", SET}, {"spf-delay", SPFDELAY}, {"spf-holdtime", SPFHOLDTIME}, {"transmit-delay", TRANSMITDELAY}, {"type", TYPE}, {"yes", YES} }; const struct keywords *p; p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]), sizeof(keywords[0]), kw_cmp); if (p) return (p->k_val); else return (STRING); } #define MAXPUSHBACK 128 char *parsebuf; int parseindex; char pushback_buffer[MAXPUSHBACK]; int pushback_index = 0; int lgetc(FILE *f) { int c, next; if (parsebuf) { /* Read character from the parsebuffer instead of input. */ if (parseindex >= 0) { c = parsebuf[parseindex++]; if (c != '\0') return (c); parsebuf = NULL; } else parseindex++; } if (pushback_index) return (pushback_buffer[--pushback_index]); while ((c = getc(f)) == '\\') { next = getc(f); if (next != '\n') { c = next; break; } yylval.lineno = lineno; lineno++; } if (c == '\t' || c == ' ') { /* Compress blanks to a single space. */ do { c = getc(f); } while (c == '\t' || c == ' '); ungetc(c, f); c = ' '; } return (c); } int lungetc(int c) { if (c == EOF) return (EOF); if (parsebuf) { parseindex--; if (parseindex >= 0) return (c); } if (pushback_index < MAXPUSHBACK-1) return (pushback_buffer[pushback_index++] = c); else return (EOF); } int findeol(void) { int c; parsebuf = NULL; pushback_index = 0; /* skip to either EOF or the first real EOL */ while (1) { c = lgetc(fin); if (c == '\n') { lineno++; break; } if (c == EOF) break; } return (ERROR); } int yylex(void) { char buf[8096]; char *p, *val; int endc, c; int token; top: p = buf; while ((c = lgetc(fin)) == ' ') ; /* nothing */ yylval.lineno = lineno; if (c == '#') while ((c = lgetc(fin)) != '\n' && c != EOF) ; /* nothing */ if (c == '$' && parsebuf == NULL) { while (1) { if ((c = lgetc(fin)) == EOF) return (0); if (p + 1 >= buf + sizeof(buf) - 1) { yyerror("string too long"); return (findeol()); } if (isalnum(c) || c == '_') { *p++ = (char)c; continue; } *p = '\0'; lungetc(c); break; } val = symget(buf); if (val == NULL) { yyerror("macro '%s' not defined", buf); return (findeol()); } parsebuf = val; parseindex = 0; goto top; } switch (c) { case '\'': case '"': endc = c; while (1) { if ((c = lgetc(fin)) == EOF) return (0); if (c == endc) { *p = '\0'; break; } if (c == '\n') { lineno++; continue; } if (p + 1 >= buf + sizeof(buf) - 1) { yyerror("string too long"); return (findeol()); } *p++ = (char)c; } yylval.v.string = strdup(buf); if (yylval.v.string == NULL) errx(1, "yylex: strdup"); return (STRING); } #define allowed_in_string(x) \ (isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \ x != '{' && x != '}' && \ x != '!' && x != '=' && x != '#' && \ x != ',')) if (isalnum(c) || c == ':' || c == '_') { do { *p++ = c; if ((unsigned)(p-buf) >= sizeof(buf)) { yyerror("string too long"); return (findeol()); } } while ((c = lgetc(fin)) != EOF && (allowed_in_string(c))); lungetc(c); *p = '\0'; if ((token = lookup(buf)) == STRING) if ((yylval.v.string = strdup(buf)) == NULL) err(1, "yylex: strdup"); return (token); } if (c == '\n') { yylval.lineno = lineno; lineno++; } if (c == EOF) return (0); return (c); } struct ospfd_conf * parse_config(char *filename, int opts) { struct sym *sym, *next; if ((conf = calloc(1, sizeof(struct ospfd_conf))) == NULL) fatal("parse_config"); bzero(&globaldefs, sizeof(globaldefs)); defs = &globaldefs; TAILQ_INIT(&defs->md_list); defs->dead_interval = DEFAULT_RTR_DEAD_TIME; defs->transmit_delay = DEFAULT_TRANSMIT_DELAY; defs->hello_interval = DEFAULT_HELLO_INTERVAL; defs->rxmt_interval = DEFAULT_RXMT_INTERVAL; defs->metric = DEFAULT_METRIC; defs->priority = DEFAULT_PRIORITY; conf->options = OSPF_OPTION_E; conf->spf_delay = DEFAULT_SPF_DELAY; conf->spf_hold_time = DEFAULT_SPF_HOLDTIME; conf->spf_state = SPF_IDLE; if ((fin = fopen(filename, "r")) == NULL) { warn("%s", filename); free(conf); return (NULL); } infile = filename; conf->opts = opts; LIST_INIT(&conf->area_list); LIST_INIT(&conf->cand_list); SIMPLEQ_INIT(&conf->redist_list); if (!(conf->opts & OSPFD_OPT_NOACTION)) if (check_file_secrecy(fileno(fin), filename)) { fclose(fin); free(conf); return (NULL); } yyparse(); fclose(fin); /* Free macros and check which have not been used. */ for (sym = TAILQ_FIRST(&symhead); sym != NULL; sym = next) { next = TAILQ_NEXT(sym, entries); if ((conf->opts & OSPFD_OPT_VERBOSE2) && !sym->used) fprintf(stderr, "warning: macro '%s' not " "used\n", sym->nam); if (!sym->persist) { free(sym->nam); free(sym->val); TAILQ_REMOVE(&symhead, sym, entries); free(sym); } } /* free global config defaults */ md_list_clr(&globaldefs.md_list); if (errors) { clear_config(conf); return (NULL); } if (conf->rtr_id.s_addr == 0) conf->rtr_id.s_addr = get_rtr_id(); return (conf); } int symset(const char *nam, const char *val, int persist) { struct sym *sym; for (sym = TAILQ_FIRST(&symhead); sym && strcmp(nam, sym->nam); sym = TAILQ_NEXT(sym, entries)) ; /* nothing */ if (sym != NULL) { if (sym->persist == 1) return (0); else { free(sym->nam); free(sym->val); TAILQ_REMOVE(&symhead, sym, entries); free(sym); } } if ((sym = calloc(1, sizeof(*sym))) == NULL) return (-1); sym->nam = strdup(nam); if (sym->nam == NULL) { free(sym); return (-1); } sym->val = strdup(val); if (sym->val == NULL) { free(sym->nam); free(sym); return (-1); } sym->used = 0; sym->persist = persist; TAILQ_INSERT_TAIL(&symhead, sym, entries); return (0); } int cmdline_symset(char *s) { char *sym, *val; int ret; size_t len; if ((val = strrchr(s, '=')) == NULL) return (-1); len = strlen(s) - strlen(val) + 1; if ((sym = malloc(len)) == NULL) errx(1, "cmdline_symset: malloc"); strlcpy(sym, s, len); ret = symset(sym, val + 1, 1); free(sym); return (ret); } char * symget(const char *nam) { struct sym *sym; TAILQ_FOREACH(sym, &symhead, entries) if (strcmp(nam, sym->nam) == 0) { sym->used = 1; return (sym->val); } return (NULL); } struct area * conf_get_area(struct in_addr id) { struct area *a; a = area_find(conf, id); if (a) return (a); a = area_new(); LIST_INSERT_HEAD(&conf->area_list, a, entry); a->id.s_addr = id.s_addr; return (a); } struct iface * conf_get_if(struct kif *kif, struct kif_addr *ka) { struct area *a; struct iface *i; LIST_FOREACH(a, &conf->area_list, entry) LIST_FOREACH(i, &a->iface_list, entry) if (i->ifindex == kif->ifindex && i->addr.s_addr == ka->addr.s_addr) { yyerror("interface %s already configured", kif->ifname); return (NULL); } i = if_new(kif, ka); i->auth_keyid = 1; return (i); } void clear_config(struct ospfd_conf *xconf) { struct area *a; while ((a = LIST_FIRST(&xconf->area_list)) != NULL) { LIST_REMOVE(a, entry); area_del(a); } free(xconf); } u_int32_t get_rtr_id(void) { struct ifaddrs *ifap, *ifa; u_int32_t ip = 0, cur, localnet; localnet = htonl(INADDR_LOOPBACK & IN_CLASSA_NET); if (getifaddrs(&ifap) == -1) fatal("getifaddrs"); for (ifa = ifap; ifa; ifa = ifa->ifa_next) { if (ifa->ifa_addr->sa_family != AF_INET) continue; cur = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr.s_addr; if ((cur & localnet) == localnet) /* skip 127/8 */ continue; if (cur > ip || ip == 0) ip = cur; } freeifaddrs(ifap); if (ip == 0) fatal("router-id is 0.0.0.0"); return (ip); } int host(const char *s, struct in_addr *addr, struct in_addr *mask) { struct in_addr ina; int bits = 32; bzero(&ina, sizeof(struct in_addr)); if (strrchr(s, '/') != NULL) { if ((bits = inet_net_pton(AF_INET, s, &ina, sizeof(ina))) == -1) return (0); } else { if (inet_pton(AF_INET, s, &ina) != 1) return (0); } addr->s_addr = ina.s_addr; mask->s_addr = prefixlen2mask(bits); return (1); }