1 /* $KAME: policy_parse.y,v 1.14 2003/06/27 03:39:20 itojun Exp $ */
4 * SPDX-License-Identifier: BSD-3-Clause
6 * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * IN/OUT bound policy configuration take place such below:
39 * <policy> is one of following:
40 * "discard", "none", "ipsec <requests>", "entrust", "bypass",
42 * The following requests are accepted as <requests>:
44 * protocol/mode/src-dst/level
45 * protocol/mode/src-dst parsed as protocol/mode/src-dst/default
46 * protocol/mode/src-dst/ parsed as protocol/mode/src-dst/default
47 * protocol/transport parsed as protocol/mode/any-any/default
48 * protocol/transport//level parsed as protocol/mode/any-any/level
50 * You can concatenate these requests with either ' '(single space) or '\n'.
54 #include <sys/cdefs.h>
55 __FBSDID("$FreeBSD$");
57 #include <sys/types.h>
58 #include <sys/param.h>
59 #include <sys/socket.h>
61 #include <netinet/in.h>
62 #include <netipsec/ipsec.h>
69 #include "ipsec_strerror.h"
72 (isdigit(c) ? (c - '0') : (isupper(c) ? (c - 'A' + 10) : (c - 'a' + 10) ))
74 static caddr_t pbuf = NULL; /* sadb_x_policy buffer */
75 static int tlen = 0; /* total length of pbuf */
76 static int offset = 0; /* offset of pbuf */
77 static int p_dir, p_type, p_protocol, p_mode, p_level, p_reqid;
78 static struct sockaddr *p_src = NULL;
79 static struct sockaddr *p_dst = NULL;
82 extern void yyerror(char *msg);
83 static struct sockaddr *parse_sockaddr(struct _val *buf);
84 static int rule_check(void);
85 static int init_x_policy(void);
86 static int set_x_request(struct sockaddr *src, struct sockaddr *dst);
87 static int set_sockaddr(struct sockaddr *addr);
88 static void policy_parse_request_init(void);
89 static caddr_t policy_parse(char *msg, int msglen);
91 extern void __policy__strbuffer__init__(char *msg);
92 extern void __policy__strbuffer__free__(void);
93 extern int yylex(void);
95 extern char *__libipsecyytext; /*XXX*/
107 %token DIR ACTION PROTOCOL MODE LEVEL LEVEL_SPECIFY
111 %type <num> DIR ACTION PROTOCOL MODE LEVEL
112 %type <val> IPADDRESS LEVEL_SPECIFY
128 p_type = 0; /* ignored it by kernel */
138 if (rule_check() < 0)
141 if (set_x_request(p_src, p_dst) < 0)
144 policy_parse_request_init();
149 : protocol SLASH mode SLASH addresses SLASH level
150 | protocol SLASH mode SLASH addresses SLASH
151 | protocol SLASH mode SLASH addresses
152 | protocol SLASH mode SLASH
153 | protocol SLASH mode SLASH SLASH level
154 | protocol SLASH mode
156 __ipsec_errcode = EIPSEC_FEW_ARGUMENTS;
160 __ipsec_errcode = EIPSEC_FEW_ARGUMENTS;
166 : PROTOCOL { p_protocol = $1; }
170 : MODE { p_mode = $1; }
179 p_level = IPSEC_LEVEL_UNIQUE;
180 p_reqid = atol($1.buf); /* atol() is good. */
186 p_src = parse_sockaddr(&$1);
192 p_dst = parse_sockaddr(&$4);
197 if (p_dir != IPSEC_DIR_OUTBOUND) {
198 __ipsec_errcode = EIPSEC_INVAL_DIR;
203 if (p_dir != IPSEC_DIR_INBOUND) {
204 __ipsec_errcode = EIPSEC_INVAL_DIR;
219 fprintf(stderr, "libipsec: %s while parsing \"%s\"\n",
220 msg, __libipsecyytext);
225 static struct sockaddr *
229 struct addrinfo hints, *res;
232 struct sockaddr *newaddr = NULL;
234 memset(&hints, 0, sizeof(hints));
235 hints.ai_family = PF_UNSPEC;
236 hints.ai_flags = AI_NUMERICHOST;
237 error = getaddrinfo(buf->buf, serv, &hints, &res);
239 yyerror("invalid IP address");
240 __ipsec_set_strerror(gai_strerror(error));
244 if (res->ai_addr == NULL) {
245 yyerror("invalid IP address");
246 __ipsec_set_strerror(gai_strerror(error));
250 newaddr = malloc(res->ai_addr->sa_len);
251 if (newaddr == NULL) {
252 __ipsec_errcode = EIPSEC_NO_BUFS;
256 memcpy(newaddr, res->ai_addr, res->ai_addr->sa_len);
260 __ipsec_errcode = EIPSEC_NO_ERROR;
267 if (p_type == IPSEC_POLICY_IPSEC) {
268 if (p_protocol == IPPROTO_IP) {
269 __ipsec_errcode = EIPSEC_NO_PROTO;
273 if (p_mode != IPSEC_MODE_TRANSPORT
274 && p_mode != IPSEC_MODE_TUNNEL) {
275 __ipsec_errcode = EIPSEC_INVAL_MODE;
279 if (p_src == NULL && p_dst == NULL) {
280 if (p_mode != IPSEC_MODE_TRANSPORT) {
281 __ipsec_errcode = EIPSEC_INVAL_ADDRESS;
285 else if (p_src->sa_family != p_dst->sa_family) {
286 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
291 __ipsec_errcode = EIPSEC_NO_ERROR;
298 struct sadb_x_policy *p;
300 tlen = sizeof(struct sadb_x_policy);
304 __ipsec_errcode = EIPSEC_NO_BUFS;
307 memset(pbuf, 0, tlen);
308 p = (struct sadb_x_policy *)pbuf;
309 p->sadb_x_policy_len = 0; /* must update later */
310 p->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
311 p->sadb_x_policy_type = p_type;
312 p->sadb_x_policy_dir = p_dir;
313 p->sadb_x_policy_id = 0;
317 __ipsec_errcode = EIPSEC_NO_ERROR;
322 set_x_request(src, dst)
323 struct sockaddr *src, *dst;
325 struct sadb_x_ipsecrequest *p;
329 + (src ? src->sa_len : 0)
330 + (dst ? dst->sa_len : 0);
331 tlen += reqlen; /* increment to total length */
333 pbuf = realloc(pbuf, tlen);
335 __ipsec_errcode = EIPSEC_NO_BUFS;
338 p = (struct sadb_x_ipsecrequest *)&pbuf[offset];
339 p->sadb_x_ipsecrequest_len = reqlen;
340 p->sadb_x_ipsecrequest_proto = p_protocol;
341 p->sadb_x_ipsecrequest_mode = p_mode;
342 p->sadb_x_ipsecrequest_level = p_level;
343 p->sadb_x_ipsecrequest_reqid = p_reqid;
344 offset += sizeof(*p);
346 if (set_sockaddr(src) || set_sockaddr(dst))
349 __ipsec_errcode = EIPSEC_NO_ERROR;
355 struct sockaddr *addr;
358 __ipsec_errcode = EIPSEC_NO_ERROR;
362 /* tlen has already incremented */
364 memcpy(&pbuf[offset], addr, addr->sa_len);
366 offset += addr->sa_len;
368 __ipsec_errcode = EIPSEC_NO_ERROR;
373 policy_parse_request_init()
375 p_protocol = IPPROTO_IP;
376 p_mode = IPSEC_MODE_ANY;
377 p_level = IPSEC_LEVEL_DEFAULT;
392 policy_parse(msg, msglen)
401 p_dir = IPSEC_DIR_INVALID;
402 p_type = IPSEC_POLICY_DISCARD;
403 policy_parse_request_init();
404 __policy__strbuffer__init__(msg);
406 error = yyparse(); /* it must be set errcode. */
407 __policy__strbuffer__free__();
415 /* update total length */
416 ((struct sadb_x_policy *)pbuf)->sadb_x_policy_len = PFKEY_UNIT64(tlen);
418 __ipsec_errcode = EIPSEC_NO_ERROR;
424 ipsec_set_policy(msg, msglen)
430 policy = policy_parse(msg, msglen);
431 if (policy == NULL) {
432 if (__ipsec_errcode == EIPSEC_NO_ERROR)
433 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
437 __ipsec_errcode = EIPSEC_NO_ERROR;