]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - sbin/setkey/token.l
strerror.3: Fix whitespace issue introduced in r368714
[FreeBSD/FreeBSD.git] / sbin / setkey / token.l
1 /*      $FreeBSD$       */
2 /*      $KAME: token.l,v 1.43 2003/07/25 09:35:28 itojun Exp $  */
3
4 /*-
5  * SPDX-License-Identifier: BSD-3-Clause
6  *
7  * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. Neither the name of the project nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34
35 %{
36 #include <sys/types.h>
37 #include <sys/param.h>
38 #include <sys/socket.h>
39 #include <net/route.h>
40 #include <net/pfkeyv2.h>
41 #include <netipsec/keydb.h>
42 #include <netipsec/key_debug.h>
43 #include <netinet/in.h>
44 #include <netipsec/ipsec.h>
45
46 #include <stdlib.h>
47 #include <limits.h>
48 #include <string.h>
49 #include <unistd.h>
50 #include <errno.h>
51 #include <netdb.h>
52
53 #include "vchar.h"
54 #include "y.tab.h"
55
56 int lineno = 1;
57
58 extern u_char m_buf[BUFSIZ];
59 extern u_int m_len;
60 extern int f_debug;
61
62 int yylex(void);
63 void yyfatal(const char *s);
64 void yyerror(const char *s);
65 extern void parse_init(void);
66 int parse(FILE **);
67 int yyparse(void);
68 %}
69
70 %option noyywrap
71
72 /* common section */
73 nl              \n
74 ws              [ \t]+
75 digit           [0-9]
76 letter          [0-9A-Za-z]
77 hexdigit        [0-9A-Fa-f]
78 dot             \.
79 hyphen          \-
80 slash           \/
81 blcl            \[
82 elcl            \]
83 semi            \;
84 comment         \#.*
85 quotedstring    \"[^"]*\"
86 decstring       {digit}+
87 hexstring       0[xX]{hexdigit}+
88 ipaddress       [a-fA-F0-9:]([a-fA-F0-9:\.]*|[a-fA-F0-9:\.]*%[a-zA-Z0-9]*)
89 ipaddrmask      {slash}{digit}{1,3}
90 name            {letter}(({letter}|{digit}|{hyphen})*({letter}|{digit}))*
91 hostname        {name}(({dot}{name})+{dot}?)?
92
93 %s S_PL S_AUTHALG S_ENCALG
94
95 %%
96
97 add             { return(ADD); }
98 delete          { return(DELETE); }
99 deleteall       { return(DELETEALL); }
100 get             { return(GET); }
101 flush           { return(FLUSH); }
102 dump            { return(DUMP); }
103
104         /* for management SPD */
105 spdadd          { return(SPDADD); }
106 spddelete       { return(SPDDELETE); }
107 spddump         { return(SPDDUMP); }
108 spdflush        { return(SPDFLUSH); }
109 tagged          { return(TAGGED); }
110 {hyphen}P       { BEGIN S_PL; return(F_POLICY); }
111 <S_PL>[a-zA-Z0-9:\.\-_/ \n\t][a-zA-Z0-9:\.%\-_/ \n\t]* {
112                         yymore();
113
114                         /* count up for nl */
115                             {
116                                 char *p;
117                                 for (p = yytext; *p != '\0'; p++)
118                                         if (*p == '\n')
119                                                 lineno++;
120                             }
121
122                         yylval.val.len = strlen(yytext);
123                         yylval.val.buf = strdup(yytext);
124                         if (!yylval.val.buf)
125                                 yyfatal("insufficient memory");
126
127                         return(PL_REQUESTS);
128                 }
129 <S_PL>{semi}    { BEGIN INITIAL; return(EOT); }
130
131         /* address resolution flags */
132 {hyphen}[n46][n46]*     {
133                         yylval.val.len = strlen(yytext);
134                         yylval.val.buf = strdup(yytext);
135                         if (!yylval.val.buf)
136                                 yyfatal("insufficient memory");
137                         return(F_AIFLAGS);
138                 }
139
140         /* security protocols */
141 ah              { yylval.num = 0; return(PR_AH); }
142 esp             { yylval.num = 0; return(PR_ESP); }
143 ah-old          { yylval.num = 1; return(PR_AH); }
144 esp-old         { yylval.num = 1; return(PR_ESP); }
145 ipcomp          { yylval.num = 0; return(PR_IPCOMP); }
146 tcp             { yylval.num = 0; return(PR_TCP); }
147
148         /* authentication alogorithm */
149 {hyphen}A       { BEGIN S_AUTHALG; return(F_AUTH); }
150 <S_AUTHALG>hmac-sha1    { yylval.num = SADB_AALG_SHA1HMAC; BEGIN INITIAL; return(ALG_AUTH); }
151 <S_AUTHALG>hmac-sha2-256 { yylval.num = SADB_X_AALG_SHA2_256; BEGIN INITIAL; return(ALG_AUTH); }
152 <S_AUTHALG>hmac-sha2-384 { yylval.num = SADB_X_AALG_SHA2_384; BEGIN INITIAL; return(ALG_AUTH); }
153 <S_AUTHALG>hmac-sha2-512 { yylval.num = SADB_X_AALG_SHA2_512; BEGIN INITIAL; return(ALG_AUTH); }
154 <S_AUTHALG>aes-xcbc-mac { yylval.num = SADB_X_AALG_AES_XCBC_MAC; BEGIN INITIAL; return(ALG_AUTH); }
155 <S_AUTHALG>tcp-md5      { yylval.num = SADB_X_AALG_TCP_MD5; BEGIN INITIAL; return(ALG_AUTH); }
156 <S_AUTHALG>null { yylval.num = SADB_X_AALG_NULL; BEGIN INITIAL; return(ALG_AUTH_NOKEY); }
157
158         /* encryption alogorithm */
159 {hyphen}E       { BEGIN S_ENCALG; return(F_ENC); }
160 <S_ENCALG>null          { yylval.num = SADB_EALG_NULL; BEGIN INITIAL; return(ALG_ENC); }
161 <S_ENCALG>simple        { yylval.num = SADB_EALG_NULL; BEGIN INITIAL; return(ALG_ENC_OLD); }
162 <S_ENCALG>rijndael-cbc  { yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); }
163 <S_ENCALG>aes-cbc       { yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); }
164 <S_ENCALG>aes-ctr       { yylval.num = SADB_X_EALG_AESCTR; BEGIN INITIAL; return(ALG_ENC_SALT); }
165 <S_ENCALG>aes-gcm-16    { yylval.num = SADB_X_EALG_AESGCM16; BEGIN INITIAL; return(ALG_ENC_SALT); }
166
167         /* compression algorithms */
168 {hyphen}C       { return(F_COMP); }
169 oui             { yylval.num = SADB_X_CALG_OUI; return(ALG_COMP); }
170 deflate         { yylval.num = SADB_X_CALG_DEFLATE; return(ALG_COMP); }
171 lzs             { yylval.num = SADB_X_CALG_LZS; return(ALG_COMP); }
172 {hyphen}R       { return(F_RAWCPI); }
173
174         /* extension */
175 {hyphen}m       { return(F_MODE); }
176 transport       { yylval.num = IPSEC_MODE_TRANSPORT; return(MODE); }
177 tunnel          { yylval.num = IPSEC_MODE_TUNNEL; return(MODE); }
178 {hyphen}u       { return(F_REQID); }
179 {hyphen}f       { return(F_EXT); }
180 random-pad      { yylval.num = SADB_X_EXT_PRAND; return(EXTENSION); }
181 seq-pad         { yylval.num = SADB_X_EXT_PSEQ; return(EXTENSION); }
182 zero-pad        { yylval.num = SADB_X_EXT_PZERO; return(EXTENSION); }
183 nocyclic-seq    { return(NOCYCLICSEQ); }
184 {hyphen}r       { return(F_REPLAY); }
185 {hyphen}lh      { return(F_LIFETIME_HARD); }
186 {hyphen}ls      { return(F_LIFETIME_SOFT); }
187
188         /* ... */
189 any             { return(ANY); }
190 {ws}            { }
191 {nl}            { lineno++; }
192 {comment}
193 {semi}          { return(EOT); }
194
195         /* for address parameters: /prefix, [port] */
196 {slash}         { return SLASH; }
197 {blcl}          { return BLCL; }
198 {elcl}          { return ELCL; }
199
200         /* parameter */
201 {decstring}     {
202                         char *bp;
203
204                         yylval.ulnum = strtoul(yytext, &bp, 10);
205                         return(DECSTRING);
206                 }
207
208 {hexstring}     {
209                         yylval.val.buf = strdup(yytext + 2);
210                         if (!yylval.val.buf)
211                                 yyfatal("insufficient memory");
212                         yylval.val.len = strlen(yylval.val.buf);
213
214                         return(HEXSTRING);
215                 }
216
217 {quotedstring}  {
218                         char *p = yytext;
219                         while (*++p != '"') ;
220                         *p = '\0';
221                         yytext++;
222                         yylval.val.len = yyleng - 2;
223                         yylval.val.buf = strdup(yytext);
224                         if (!yylval.val.buf)
225                                 yyfatal("insufficient memory");
226
227                         return(QUOTEDSTRING);
228                 }
229
230 [A-Za-z0-9:][A-Za-z0-9:%\.-]* {
231                         yylval.val.len = yyleng;
232                         yylval.val.buf = strdup(yytext);
233                         if (!yylval.val.buf)
234                                 yyfatal("insufficient memory");
235                         return(STRING);
236                 }
237
238 [0-9,]+ {
239                         yylval.val.len = yyleng;
240                         yylval.val.buf = strdup(yytext);
241                         if (!yylval.val.buf)
242                                 yyfatal("insufficient memory");
243                         return(STRING);
244                 }
245
246 .               {
247                         yyfatal("Syntax error");
248                         /*NOTREACHED*/
249                 }
250
251 %%
252
253 void
254 yyfatal(s)
255         const char *s;
256 {
257         yyerror(s);
258         exit(1);
259 }
260
261 void
262 yyerror(s)
263         const char *s;
264 {
265         printf("line %d: %s at [%s]\n", lineno, s, yytext);
266 }
267
268 int
269 parse(fp)
270         FILE **fp;
271 {
272         yyin = *fp;
273
274         parse_init();
275
276         if (yyparse()) {
277                 printf("parse failed, line %d.\n", lineno);
278                 return(-1);
279         }
280
281         return(0);
282 }