File: [local] / src / usr.sbin / ldapd / parse.y (download)
Revision 1.43, Fri Oct 15 15:01:28 2021 UTC (2 years, 7 months ago) by naddy
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4, OPENBSD_7_3_BASE, OPENBSD_7_3, OPENBSD_7_2_BASE, OPENBSD_7_2, OPENBSD_7_1_BASE, OPENBSD_7_1, HEAD Changes since 1.42: +6 -6 lines
Don't declare variables as "unsigned char *" that are passed to
functions that take "char *" arguments. Where such chars are
assigned to int or passed to ctype functions, explicitly cast them
to unsigned char.
For OpenBSD's clang, -Wpointer-sign has been disabled by default,
but when the parse.y code was built elsewhere, the compiler would
complain.
With help from millert@
ok benno@ deraadt@
|
/* $OpenBSD: parse.y,v 1.43 2021/10/15 15:01:28 naddy Exp $ */
/*
* Copyright (c) 2009, 2010 Martin Hedenfalk <martinh@openbsd.org>
* Copyright (c) 2008 Gilles Chehade <gilles@openbsd.org>
* Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org>
* Copyright (c) 2001 Markus Friedl. All rights reserved.
* Copyright (c) 2001 Daniel Hartmeier. All rights reserved.
* Copyright (c) 2001 Theo de Raadt. All rights reserved.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
%{
#include <sys/types.h>
#include <sys/queue.h>
#include <sys/tree.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/un.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <err.h>
#include <errno.h>
#include <ifaddrs.h>
#include <limits.h>
#include <netdb.h>
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <unistd.h>
#include "ldapd.h"
#include "log.h"
TAILQ_HEAD(files, file) files = TAILQ_HEAD_INITIALIZER(files);
static struct file {
TAILQ_ENTRY(file) entry;
FILE *stream;
char *name;
size_t ungetpos;
size_t ungetsize;
u_char *ungetbuf;
int eof_reached;
int lineno;
int errors;
} *file, *topfile;
struct file *pushfile(const char *, int);
int popfile(void);
int check_file_secrecy(int, const char *);
int yyparse(void);
int yylex(void);
int yyerror(const char *, ...)
__attribute__((__format__ (printf, 1, 2)))
__attribute__((__nonnull__ (1)));
int kw_cmp(const void *, const void *);
int lookup(char *);
int igetc(void);
int lgetc(int);
void lungetc(int);
int findeol(void);
struct listener *host_unix(const char *path);
struct listener *host_v4(const char *, in_port_t);
struct listener *host_v6(const char *, in_port_t);
int host_dns(const char *, const char *,
struct listenerlist *, in_port_t, u_int8_t);
int host(const char *, const char *,
struct listenerlist *, in_port_t, u_int8_t);
int interface(const char *, const char *,
struct listenerlist *, in_port_t, u_int8_t);
int load_certfile(struct ldapd_config *, const char *, u_int8_t, u_int8_t);
TAILQ_HEAD(symhead, sym) symhead = TAILQ_HEAD_INITIALIZER(symhead);
struct sym {
TAILQ_ENTRY(sym) entry;
int used;
int persist;
char *nam;
char *val;
};
int symset(const char *, const char *, int);
char *symget(const char *);
struct ldapd_config *conf;
SPLAY_GENERATE(ssltree, ssl, ssl_nodes, ssl_cmp);
static struct aci *mk_aci(int type, int rights, enum scope scope,
char *target, char *subject, char *attr);
typedef struct {
union {
int64_t number;
char *string;
struct aci *aci;
} v;
int lineno;
} YYSTYPE;
static struct namespace *current_ns = NULL;
%}
%token ERROR LISTEN ON LEGACY TLS LDAPS PORT NAMESPACE ROOTDN ROOTPW INDEX
%token SECURE RELAX STRICT SCHEMA USE COMPRESSION LEVEL
%token INCLUDE CERTIFICATE FSYNC CACHE_SIZE INDEX_CACHE_SIZE
%token DENY ALLOW READ WRITE BIND ACCESS TO ROOT REFERRAL
%token ANY CHILDREN OF ATTRIBUTE IN SUBTREE BY SELF
%token <v.string> STRING
%token <v.number> NUMBER
%type <v.number> port ssl boolean comp_level legacy protocol
%type <v.number> aci_type aci_access aci_rights aci_right aci_scope
%type <v.string> aci_target aci_attr aci_subject certname
%type <v.aci> aci
%%
grammar : /* empty */
| grammar '\n'
| grammar include '\n'
| grammar varset '\n'
| grammar conf_main '\n'
| grammar error '\n' { file->errors++; }
| grammar namespace '\n'
| grammar aci '\n' {
SIMPLEQ_INSERT_TAIL(&conf->acl, $2, entry);
}
| grammar schema '\n'
;
legacy : /* empty */ { $$ = 0; }
| LEGACY { $$ = F_LEGACY; }
;
protocol : /* empty */ { $$ = 0; }
| TLS { $$ = F_STARTTLS; }
| LDAPS { $$ = F_LDAPS; }
| SECURE { $$ = F_SECURE; }
;
ssl : legacy protocol { $$ = $1 | $2; }
;
certname : /* empty */ { $$ = NULL; }
| CERTIFICATE STRING { $$ = $2; }
;
port : PORT STRING {
struct servent *servent;
servent = getservbyname($2, "tcp");
if (servent == NULL) {
yyerror("port %s is invalid", $2);
free($2);
YYERROR;
}
$$ = servent->s_port;
free($2);
}
| PORT NUMBER {
if ($2 <= 0 || $2 > (int)USHRT_MAX) {
yyerror("invalid port: %lld", $2);
YYERROR;
}
$$ = htons($2);
}
| /* empty */ {
$$ = 0;
}
;
conf_main : LISTEN ON STRING port ssl certname {
char *cert;
if ($4 == 0) {
if ($5 & F_LDAPS)
$4 = htons(LDAPS_PORT);
else
$4 = htons(LDAP_PORT);
}
cert = ($6 != NULL) ? $6 : $3;
if (($5 & F_SSL) &&
load_certfile(conf, cert, F_SCERT, $5) < 0) {
yyerror("cannot load certificate: %s", cert);
free($6);
free($3);
YYERROR;
}
if (! interface($3, cert, &conf->listeners,
$4, $5)) {
if (host($3, cert, &conf->listeners,
$4, $5) != 1) {
yyerror("invalid virtual ip or interface: %s", $3);
free($6);
free($3);
YYERROR;
}
}
free($6);
free($3);
}
| REFERRAL STRING {
struct referral *ref;
if ((ref = calloc(1, sizeof(*ref))) == NULL) {
yyerror("calloc");
free($2);
YYERROR;
}
ref->url = $2;
SLIST_INSERT_HEAD(&conf->referrals, ref, next);
}
| ROOTDN STRING {
conf->rootdn = $2;
normalize_dn(conf->rootdn);
}
| ROOTPW STRING { conf->rootpw = $2; }
;
namespace : NAMESPACE STRING '{' '\n' {
log_debug("parsing namespace %s", $2);
current_ns = namespace_new($2);
free($2);
TAILQ_INSERT_TAIL(&conf->namespaces, current_ns, next);
} ns_opts '}' { current_ns = NULL; }
;
boolean : STRING {
if (strcasecmp($1, "true") == 0 ||
strcasecmp($1, "yes") == 0)
$$ = 1;
else if (strcasecmp($1, "false") == 0 ||
strcasecmp($1, "off") == 0 ||
strcasecmp($1, "no") == 0)
$$ = 0;
else {
yyerror("invalid boolean value '%s'", $1);
free($1);
YYERROR;
}
free($1);
}
| ON { $$ = 1; }
;
ns_opts : /* empty */
| ns_opts '\n'
| ns_opts ns_opt '\n'
;
ns_opt : ROOTDN STRING {
current_ns->rootdn = $2;
normalize_dn(current_ns->rootdn);
}
| ROOTPW STRING { current_ns->rootpw = $2; }
| INDEX STRING {
struct attr_index *ai;
if ((ai = calloc(1, sizeof(*ai))) == NULL) {
yyerror("calloc");
free($2);
YYERROR;
}
ai->attr = $2;
ai->type = INDEX_EQUAL;
TAILQ_INSERT_TAIL(¤t_ns->indices, ai, next);
}
| CACHE_SIZE NUMBER { current_ns->cache_size = $2; }
| INDEX_CACHE_SIZE NUMBER { current_ns->index_cache_size = $2; }
| FSYNC boolean { current_ns->sync = $2; }
| aci {
SIMPLEQ_INSERT_TAIL(¤t_ns->acl, $1, entry);
}
| RELAX SCHEMA { current_ns->relax = 1; }
| STRICT SCHEMA { current_ns->relax = 0; }
| USE COMPRESSION comp_level { current_ns->compression_level = $3; }
| REFERRAL STRING {
struct referral *ref;
if ((ref = calloc(1, sizeof(*ref))) == NULL) {
yyerror("calloc");
free($2);
YYERROR;
}
ref->url = $2;
SLIST_INSERT_HEAD(¤t_ns->referrals, ref, next);
}
;
comp_level : /* empty */ { $$ = 6; }
| LEVEL NUMBER { $$ = $2; }
;
aci : aci_type aci_access TO aci_scope aci_target aci_attr aci_subject {
if (($$ = mk_aci($1, $2, $4, $5, $6, $7)) == NULL) {
free($5);
free($6);
YYERROR;
}
}
| aci_type aci_access {
if (($$ = mk_aci($1, $2, LDAP_SCOPE_SUBTREE, NULL,
NULL, NULL)) == NULL) {
YYERROR;
}
}
;
aci_type : DENY { $$ = ACI_DENY; }
| ALLOW { $$ = ACI_ALLOW; }
;
aci_access : /* empty */ { $$ = ACI_ALL; }
| ACCESS { $$ = ACI_ALL; }
| aci_rights ACCESS { $$ = $1; }
;
aci_rights : aci_right { $$ = $1; }
| aci_rights ',' aci_right { $$ = $1 | $3; }
;
aci_right : READ { $$ = ACI_READ; }
| WRITE { $$ = ACI_WRITE; }
| BIND { $$ = ACI_BIND; }
;
aci_scope : /* empty */ { $$ = LDAP_SCOPE_BASE; }
| SUBTREE { $$ = LDAP_SCOPE_SUBTREE; }
| CHILDREN OF { $$ = LDAP_SCOPE_ONELEVEL; }
;
aci_target : ANY { $$ = NULL; }
| ROOT { $$ = strdup(""); }
| STRING { $$ = $1; normalize_dn($$); }
;
aci_attr : /* empty */ { $$ = NULL; }
| ATTRIBUTE STRING { $$ = $2; }
;
aci_subject : /* empty */ { $$ = NULL; }
| BY ANY { $$ = NULL; }
| BY STRING { $$ = $2; normalize_dn($$); }
| BY SELF { $$ = strdup("@"); }
;
include : INCLUDE STRING {
struct file *nfile;
if ((nfile = pushfile($2, 1)) == NULL) {
yyerror("failed to include file %s", $2);
free($2);
YYERROR;
}
free($2);
file = nfile;
lungetc('\n');
}
;
varset : STRING '=' STRING {
char *s = $1;
while (*s++) {
if (isspace((unsigned char)*s)) {
yyerror("macro name cannot contain "
"whitespace");
free($1);
free($3);
YYERROR;
}
}
if (symset($1, $3, 0) == -1)
fatal("cannot store variable");
free($1);
free($3);
}
;
schema : SCHEMA STRING {
int ret;
ret = schema_parse(conf->schema, $2);
free($2);
if (ret != 0) {
YYERROR;
}
}
;
%%
struct keywords {
const char *k_name;
int k_val;
};
int
yyerror(const char *fmt, ...)
{
va_list ap;
char *msg;
file->errors++;
va_start(ap, fmt);
if (vasprintf(&msg, fmt, ap) == -1)
fatalx("yyerror vasprintf");
va_end(ap);
logit(LOG_CRIT, "%s:%d: %s", file->name, yylval.lineno, msg);
free(msg);
return (0);
}
int
kw_cmp(const void *k, const void *e)
{
return (strcmp(k, ((const struct keywords *)e)->k_name));
}
int
lookup(char *s)
{
/* this has to be sorted always */
static const struct keywords keywords[] = {
{ "access", ACCESS },
{ "allow", ALLOW },
{ "any", ANY },
{ "attribute", ATTRIBUTE },
{ "bind", BIND },
{ "by", BY },
{ "cache-size", CACHE_SIZE },
{ "certificate", CERTIFICATE },
{ "children", CHILDREN },
{ "compression", COMPRESSION },
{ "deny", DENY },
{ "fsync", FSYNC },
{ "in", IN },
{ "include", INCLUDE },
{ "index", INDEX },
{ "index-cache-size", INDEX_CACHE_SIZE },
{ "ldaps", LDAPS },
{ "legacy", LEGACY },
{ "level", LEVEL },
{ "listen", LISTEN },
{ "namespace", NAMESPACE },
{ "of", OF },
{ "on", ON },
{ "port", PORT },
{ "read", READ },
{ "referral", REFERRAL },
{ "relax", RELAX },
{ "root", ROOT },
{ "rootdn", ROOTDN },
{ "rootpw", ROOTPW },
{ "schema", SCHEMA },
{ "secure", SECURE },
{ "self", SELF },
{ "strict", STRICT },
{ "subtree", SUBTREE },
{ "tls", TLS },
{ "to", TO },
{ "use", USE },
{ "write", WRITE },
};
const struct keywords *p;
p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]),
sizeof(keywords[0]), kw_cmp);
if (p)
return (p->k_val);
else
return (STRING);
}
#define START_EXPAND 1
#define DONE_EXPAND 2
static int expanding;
int
igetc(void)
{
int c;
while (1) {
if (file->ungetpos > 0)
c = file->ungetbuf[--file->ungetpos];
else
c = getc(file->stream);
if (c == START_EXPAND)
expanding = 1;
else if (c == DONE_EXPAND)
expanding = 0;
else
break;
}
return (c);
}
int
lgetc(int quotec)
{
int c, next;
if (quotec) {
if ((c = igetc()) == EOF) {
yyerror("reached end of file while parsing "
"quoted string");
if (file == topfile || popfile() == EOF)
return (EOF);
return (quotec);
}
return (c);
}
while ((c = igetc()) == '\\') {
next = igetc();
if (next != '\n') {
c = next;
break;
}
yylval.lineno = file->lineno;
file->lineno++;
}
if (c == EOF) {
/*
* Fake EOL when hit EOF for the first time. This gets line
* count right if last line in included file is syntactically
* invalid and has no newline.
*/
if (file->eof_reached == 0) {
file->eof_reached = 1;
return ('\n');
}
while (c == EOF) {
if (file == topfile || popfile() == EOF)
return (EOF);
c = igetc();
}
}
return (c);
}
void
lungetc(int c)
{
if (c == EOF)
return;
if (file->ungetpos >= file->ungetsize) {
void *p = reallocarray(file->ungetbuf, file->ungetsize, 2);
if (p == NULL)
err(1, "%s", __func__);
file->ungetbuf = p;
file->ungetsize *= 2;
}
file->ungetbuf[file->ungetpos++] = c;
}
int
findeol(void)
{
int c;
/* skip to either EOF or the first real EOL */
while (1) {
c = lgetc(0);
if (c == '\n') {
file->lineno++;
break;
}
if (c == EOF)
break;
}
return (ERROR);
}
int
yylex(void)
{
char buf[4096];
char *p, *val;
int quotec, next, c;
int token;
top:
p = buf;
while ((c = lgetc(0)) == ' ' || c == '\t')
; /* nothing */
yylval.lineno = file->lineno;
if (c == '#')
while ((c = lgetc(0)) != '\n' && c != EOF)
; /* nothing */
if (c == '$' && !expanding) {
while (1) {
if ((c = lgetc(0)) == EOF)
return (0);
if (p + 1 >= buf + sizeof(buf) - 1) {
yyerror("string too long");
return (findeol());
}
if (isalnum(c) || c == '_') {
*p++ = c;
continue;
}
*p = '\0';
lungetc(c);
break;
}
val = symget(buf);
if (val == NULL) {
yyerror("macro '%s' not defined", buf);
return (findeol());
}
p = val + strlen(val) - 1;
lungetc(DONE_EXPAND);
while (p >= val) {
lungetc((unsigned char)*p);
p--;
}
lungetc(START_EXPAND);
goto top;
}
switch (c) {
case '\'':
case '"':
quotec = c;
while (1) {
if ((c = lgetc(quotec)) == EOF)
return (0);
if (c == '\n') {
file->lineno++;
continue;
} else if (c == '\\') {
if ((next = lgetc(quotec)) == EOF)
return (0);
if (next == quotec || next == ' ' ||
next == '\t')
c = next;
else if (next == '\n') {
file->lineno++;
continue;
} else
lungetc(next);
} else if (c == quotec) {
*p = '\0';
break;
} else if (c == '\0') {
yyerror("syntax error");
return (findeol());
}
if (p + 1 >= buf + sizeof(buf) - 1) {
log_warnx("string too long");
return (findeol());
}
*p++ = c;
}
yylval.v.string = strdup(buf);
if (yylval.v.string == NULL)
fatal("yylex: strdup");
return (STRING);
}
#define allowed_to_end_number(x) \
(isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=')
if (c == '-' || isdigit(c)) {
do {
*p++ = c;
if ((size_t)(p-buf) >= sizeof(buf)) {
yyerror("string too long");
return (findeol());
}
} while ((c = lgetc(0)) != EOF && isdigit(c));
lungetc(c);
if (p == buf + 1 && buf[0] == '-')
goto nodigits;
if (c == EOF || allowed_to_end_number(c)) {
const char *errstr = NULL;
*p = '\0';
yylval.v.number = strtonum(buf, LLONG_MIN,
LLONG_MAX, &errstr);
if (errstr) {
yyerror("\"%s\" invalid number: %s",
buf, errstr);
return (findeol());
}
return (NUMBER);
} else {
nodigits:
while (p > buf + 1)
lungetc((unsigned char)*--p);
c = (unsigned char)*--p;
if (c == '-')
return (c);
}
}
#define allowed_in_string(x) \
(isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \
x != '{' && x != '}' && x != '<' && x != '>' && \
x != '!' && x != '=' && x != '/' && x != '#' && \
x != ','))
if (isalnum(c) || c == ':' || c == '_' || c == '*') {
do {
*p++ = c;
if ((size_t)(p-buf) >= sizeof(buf)) {
yyerror("string too long");
return (findeol());
}
} while ((c = lgetc(0)) != EOF && (allowed_in_string(c)));
lungetc(c);
*p = '\0';
if ((token = lookup(buf)) == STRING)
if ((yylval.v.string = strdup(buf)) == NULL)
fatal("yylex: strdup");
return (token);
}
if (c == '\n') {
yylval.lineno = file->lineno;
file->lineno++;
}
if (c == EOF)
return (0);
return (c);
}
int
check_file_secrecy(int fd, const char *fname)
{
struct stat st;
if (fstat(fd, &st)) {
log_warn("cannot stat %s", fname);
return (-1);
}
if (st.st_uid != 0 && st.st_uid != getuid()) {
log_warnx("%s: owner not root or current user", fname);
return (-1);
}
if (st.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)) {
log_warnx("%s: group writable or world read/writable", fname);
return (-1);
}
return (0);
}
struct file *
pushfile(const char *name, int secret)
{
struct file *nfile;
log_debug("parsing config %s", name);
if ((nfile = calloc(1, sizeof(struct file))) == NULL) {
log_warn("%s", __func__);
return (NULL);
}
if ((nfile->name = strdup(name)) == NULL) {
log_warn("%s", __func__);
free(nfile);
return (NULL);
}
if ((nfile->stream = fopen(nfile->name, "r")) == NULL) {
log_warn("%s: %s", __func__, nfile->name);
free(nfile->name);
free(nfile);
return (NULL);
}
if (secret &&
check_file_secrecy(fileno(nfile->stream), nfile->name)) {
fclose(nfile->stream);
free(nfile->name);
free(nfile);
return (NULL);
}
nfile->lineno = TAILQ_EMPTY(&files) ? 1 : 0;
nfile->ungetsize = 16;
nfile->ungetbuf = malloc(nfile->ungetsize);
if (nfile->ungetbuf == NULL) {
log_warn("%s", __func__);
fclose(nfile->stream);
free(nfile->name);
free(nfile);
return (NULL);
}
TAILQ_INSERT_TAIL(&files, nfile, entry);
return (nfile);
}
int
popfile(void)
{
struct file *prev;
if ((prev = TAILQ_PREV(file, files, entry)) != NULL)
prev->errors += file->errors;
TAILQ_REMOVE(&files, file, entry);
fclose(file->stream);
free(file->name);
free(file->ungetbuf);
free(file);
file = prev;
return (file ? 0 : EOF);
}
int
parse_config(char *filename)
{
struct sym *sym, *next;
int errors = 0;
if ((conf = calloc(1, sizeof(struct ldapd_config))) == NULL)
fatal(NULL);
conf->schema = schema_new();
if (conf->schema == NULL)
fatal("schema_new");
TAILQ_INIT(&conf->namespaces);
TAILQ_INIT(&conf->listeners);
if ((conf->sc_ssl = calloc(1, sizeof(*conf->sc_ssl))) == NULL)
fatal(NULL);
SPLAY_INIT(conf->sc_ssl);
SIMPLEQ_INIT(&conf->acl);
SLIST_INIT(&conf->referrals);
if ((file = pushfile(filename, 1)) == NULL) {
free(conf);
return (-1);
}
topfile = file;
yyparse();
errors = file->errors;
popfile();
/* Free macros and check which have not been used. */
TAILQ_FOREACH_SAFE(sym, &symhead, entry, next) {
log_debug("warning: macro \"%s\" not used", sym->nam);
if (!sym->persist) {
free(sym->nam);
free(sym->val);
TAILQ_REMOVE(&symhead, sym, entry);
free(sym);
}
}
return (errors ? -1 : 0);
}
int
symset(const char *nam, const char *val, int persist)
{
struct sym *sym;
TAILQ_FOREACH(sym, &symhead, entry) {
if (strcmp(nam, sym->nam) == 0)
break;
}
if (sym != NULL) {
if (sym->persist == 1)
return (0);
else {
free(sym->nam);
free(sym->val);
TAILQ_REMOVE(&symhead, sym, entry);
free(sym);
}
}
if ((sym = calloc(1, sizeof(*sym))) == NULL)
return (-1);
sym->nam = strdup(nam);
if (sym->nam == NULL) {
free(sym);
return (-1);
}
sym->val = strdup(val);
if (sym->val == NULL) {
free(sym->nam);
free(sym);
return (-1);
}
sym->used = 0;
sym->persist = persist;
TAILQ_INSERT_TAIL(&symhead, sym, entry);
return (0);
}
int
cmdline_symset(char *s)
{
char *sym, *val;
int ret;
if ((val = strrchr(s, '=')) == NULL)
return (-1);
sym = strndup(s, val - s);
if (sym == NULL)
fatal("%s: strndup", __func__);
ret = symset(sym, val + 1, 1);
free(sym);
return (ret);
}
char *
symget(const char *nam)
{
struct sym *sym;
TAILQ_FOREACH(sym, &symhead, entry) {
if (strcmp(nam, sym->nam) == 0) {
sym->used = 1;
return (sym->val);
}
}
return (NULL);
}
struct listener *
host_unix(const char *path)
{
struct sockaddr_un *saun;
struct listener *h;
if (*path != '/')
return (NULL);
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
saun = (struct sockaddr_un *)&h->ss;
saun->sun_len = sizeof(struct sockaddr_un);
saun->sun_family = AF_UNIX;
if (strlcpy(saun->sun_path, path, sizeof(saun->sun_path)) >=
sizeof(saun->sun_path))
fatal("socket path too long");
h->flags = F_SECURE;
return (h);
}
struct listener *
host_v4(const char *s, in_port_t port)
{
struct in_addr ina;
struct sockaddr_in *sain;
struct listener *h;
memset(&ina, 0, sizeof(ina));
if (inet_pton(AF_INET, s, &ina) != 1)
return (NULL);
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
sain = (struct sockaddr_in *)&h->ss;
sain->sin_len = sizeof(struct sockaddr_in);
sain->sin_family = AF_INET;
sain->sin_addr.s_addr = ina.s_addr;
sain->sin_port = port;
return (h);
}
struct listener *
host_v6(const char *s, in_port_t port)
{
struct in6_addr ina6;
struct sockaddr_in6 *sin6;
struct listener *h;
memset(&ina6, 0, sizeof(ina6));
if (inet_pton(AF_INET6, s, &ina6) != 1)
return (NULL);
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
sin6 = (struct sockaddr_in6 *)&h->ss;
sin6->sin6_len = sizeof(struct sockaddr_in6);
sin6->sin6_family = AF_INET6;
sin6->sin6_port = port;
memcpy(&sin6->sin6_addr, &ina6, sizeof(ina6));
return (h);
}
int
host_dns(const char *s, const char *cert,
struct listenerlist *al, in_port_t port, u_int8_t flags)
{
struct addrinfo hints, *res0, *res;
int error;
struct sockaddr_in *sain;
struct sockaddr_in6 *sin6;
struct listener *h;
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_UNSPEC;
hints.ai_socktype = SOCK_DGRAM; /* DUMMY */
error = getaddrinfo(s, NULL, &hints, &res0);
if (error == EAI_AGAIN || error == EAI_NODATA || error == EAI_NONAME)
return (0);
if (error) {
log_warnx("host_dns: could not parse \"%s\": %s", s,
gai_strerror(error));
return (-1);
}
for (res = res0; res; res = res->ai_next) {
if (res->ai_family != AF_INET &&
res->ai_family != AF_INET6)
continue;
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
h->port = port;
h->flags = flags;
h->ss.ss_family = res->ai_family;
h->ssl = NULL;
h->ssl_cert_name[0] = '\0';
if (cert != NULL)
(void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));
if (res->ai_family == AF_INET) {
sain = (struct sockaddr_in *)&h->ss;
sain->sin_len = sizeof(struct sockaddr_in);
sain->sin_addr.s_addr = ((struct sockaddr_in *)
res->ai_addr)->sin_addr.s_addr;
sain->sin_port = port;
} else {
sin6 = (struct sockaddr_in6 *)&h->ss;
sin6->sin6_len = sizeof(struct sockaddr_in6);
memcpy(&sin6->sin6_addr, &((struct sockaddr_in6 *)
res->ai_addr)->sin6_addr, sizeof(struct in6_addr));
sin6->sin6_port = port;
}
TAILQ_INSERT_HEAD(al, h, entry);
}
freeaddrinfo(res0);
return 1;
}
int
host(const char *s, const char *cert, struct listenerlist *al,
in_port_t port, u_int8_t flags)
{
struct listener *h;
/* Unix socket path? */
h = host_unix(s);
/* IPv4 address? */
if (h == NULL)
h = host_v4(s, port);
/* IPv6 address? */
if (h == NULL)
h = host_v6(s, port);
if (h != NULL) {
h->port = port;
h->flags |= flags;
h->ssl = NULL;
h->ssl_cert_name[0] = '\0';
if (cert != NULL)
strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));
TAILQ_INSERT_HEAD(al, h, entry);
return (1);
}
return (host_dns(s, cert, al, port, flags));
}
int
interface(const char *s, const char *cert,
struct listenerlist *al, in_port_t port, u_int8_t flags)
{
int ret = 0;
struct ifaddrs *ifap, *p;
struct sockaddr_in *sain;
struct sockaddr_in6 *sin6;
struct listener *h;
if (getifaddrs(&ifap) == -1)
fatal("getifaddrs");
for (p = ifap; p != NULL; p = p->ifa_next) {
if (strcmp(s, p->ifa_name) != 0)
continue;
if (p->ifa_addr == NULL)
continue;
switch (p->ifa_addr->sa_family) {
case AF_INET:
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
sain = (struct sockaddr_in *)&h->ss;
*sain = *(struct sockaddr_in *)p->ifa_addr;
sain->sin_len = sizeof(struct sockaddr_in);
sain->sin_port = port;
h->fd = -1;
h->port = port;
h->flags = flags;
h->ssl = NULL;
h->ssl_cert_name[0] = '\0';
if (cert != NULL)
(void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));
ret = 1;
TAILQ_INSERT_HEAD(al, h, entry);
break;
case AF_INET6:
if ((h = calloc(1, sizeof(*h))) == NULL)
fatal(NULL);
sin6 = (struct sockaddr_in6 *)&h->ss;
*sin6 = *(struct sockaddr_in6 *)p->ifa_addr;
sin6->sin6_len = sizeof(struct sockaddr_in6);
sin6->sin6_port = port;
h->fd = -1;
h->port = port;
h->flags = flags;
h->ssl = NULL;
h->ssl_cert_name[0] = '\0';
if (cert != NULL)
(void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));
ret = 1;
TAILQ_INSERT_HEAD(al, h, entry);
break;
}
}
freeifaddrs(ifap);
return ret;
}
static struct aci *
mk_aci(int type, int rights, enum scope scope, char *target, char *attr,
char *subject)
{
struct aci *aci;
if ((aci = calloc(1, sizeof(*aci))) == NULL) {
yyerror("calloc");
return NULL;
}
aci->type = type;
aci->rights = rights;
aci->scope = scope;
aci->target = target;
aci->attribute = attr;
aci->subject = subject;
log_debug("%s %02X access to %s%s%s scope %d by %s",
aci->type == ACI_DENY ? "deny" : "allow",
aci->rights,
aci->target ? aci->target : "any",
aci->attribute ? " attribute " : "",
aci->attribute ? aci->attribute : "",
aci->scope,
aci->subject ? aci->subject : "any");
return aci;
}
struct namespace *
namespace_new(const char *suffix)
{
struct namespace *ns;
if ((ns = calloc(1, sizeof(*ns))) == NULL)
return NULL;
ns->sync = 1;
ns->cache_size = 1024;
ns->index_cache_size = 512;
ns->suffix = strdup(suffix);
if (ns->suffix == NULL) {
free(ns->suffix);
free(ns);
return NULL;
}
normalize_dn(ns->suffix);
TAILQ_INIT(&ns->indices);
TAILQ_INIT(&ns->request_queue);
SIMPLEQ_INIT(&ns->acl);
SLIST_INIT(&ns->referrals);
return ns;
}
int
ssl_cmp(struct ssl *s1, struct ssl *s2)
{
return (strcmp(s1->ssl_name, s2->ssl_name));
}
int
load_certfile(struct ldapd_config *env, const char *name, u_int8_t flags,
u_int8_t protocol)
{
struct ssl *s;
struct ssl key;
char certfile[PATH_MAX];
uint32_t tls_protocols = TLS_PROTOCOLS_DEFAULT;
const char *tls_ciphers = "default";
if (strlcpy(key.ssl_name, name, sizeof(key.ssl_name))
>= sizeof(key.ssl_name)) {
log_warn("load_certfile: certificate name truncated");
return -1;
}
s = SPLAY_FIND(ssltree, env->sc_ssl, &key);
if (s != NULL) {
s->flags |= flags;
return 0;
}
if ((s = calloc(1, sizeof(*s))) == NULL)
fatal(NULL);
s->flags = flags;
(void)strlcpy(s->ssl_name, key.ssl_name, sizeof(s->ssl_name));
s->config = tls_config_new();
if (s->config == NULL)
goto err;
if (protocol & F_LEGACY) {
tls_protocols = TLS_PROTOCOLS_ALL;
tls_ciphers = "all";
}
if (tls_config_set_protocols(s->config, tls_protocols) != 0) {
log_warn("load_certfile: failed to set tls protocols: %s",
tls_config_error(s->config));
goto err;
}
if (tls_config_set_ciphers(s->config, tls_ciphers)) {
log_warn("load_certfile: failed to set tls ciphers: %s",
tls_config_error(s->config));
goto err;
}
if (name[0] == '/') {
if (!bsnprintf(certfile, sizeof(certfile), "%s.crt", name)) {
log_warn("load_certfile: path truncated");
goto err;
}
} else {
if (!bsnprintf(certfile, sizeof(certfile),
"/etc/ldap/certs/%s.crt", name)) {
log_warn("load_certfile: path truncated");
goto err;
}
}
log_debug("loading certificate file %s", certfile);
s->ssl_cert = tls_load_file(certfile, &s->ssl_cert_len, NULL);
if (s->ssl_cert == NULL)
goto err;
if (tls_config_set_cert_mem(s->config, s->ssl_cert, s->ssl_cert_len)) {
log_warn("load_certfile: failed to set tls certificate: %s",
tls_config_error(s->config));
goto err;
}
if (name[0] == '/') {
if (!bsnprintf(certfile, sizeof(certfile), "%s.key", name)) {
log_warn("load_certfile: path truncated");
goto err;
}
} else {
if (!bsnprintf(certfile, sizeof(certfile),
"/etc/ldap/certs/%s.key", name)) {
log_warn("load_certfile: path truncated");
goto err;
}
}
log_debug("loading key file %s", certfile);
s->ssl_key = tls_load_file(certfile, &s->ssl_key_len, NULL);
if (s->ssl_key == NULL)
goto err;
if (tls_config_set_key_mem(s->config, s->ssl_key, s->ssl_key_len)) {
log_warn("load_certfile: failed to set tls key: %s",
tls_config_error(s->config));
goto err;
}
SPLAY_INSERT(ssltree, env->sc_ssl, s);
return (0);
err:
free(s->ssl_cert);
free(s->ssl_key);
tls_config_free(s->config);
free(s);
return (-1);
}