/* $OpenBSD: conf.c,v 1.107 2017/10/27 08:29:32 mpi Exp $ */ /* $EOM: conf.c,v 1.48 2000/12/04 02:04:29 angelos Exp $ */ /* * Copyright (c) 1998, 1999, 2000, 2001 Niklas Hallqvist. All rights reserved. * Copyright (c) 2000, 2001, 2002 Håkan Olsson. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* * This code was written under funding by Ericsson Radio Systems. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "app.h" #include "conf.h" #include "log.h" #include "monitor.h" #include "util.h" static char *conf_get_trans_str(int, char *, char *); static void conf_load_defaults(int); #if 0 static int conf_find_trans_xf(int, char *); #endif struct conf_trans { TAILQ_ENTRY(conf_trans) link; int trans; enum conf_op { CONF_SET, CONF_REMOVE, CONF_REMOVE_SECTION } op; char *section; char *tag; char *value; int override; int is_default; }; #define CONF_SECT_MAX 256 TAILQ_HEAD(conf_trans_head, conf_trans) conf_trans_queue; struct conf_binding { LIST_ENTRY(conf_binding) link; char *section; char *tag; char *value; int is_default; }; char *conf_path = CONFIG_FILE; LIST_HEAD(conf_bindings, conf_binding) conf_bindings[256]; static char *conf_addr; static __inline__ u_int8_t conf_hash(char *s) { u_int8_t hash = 0; while (*s) { hash = ((hash << 1) | (hash >> 7)) ^ tolower((unsigned char)*s); s++; } return hash; } /* * Insert a tag-value combination from LINE (the equal sign is at POS) */ static int conf_remove_now(char *section, char *tag) { struct conf_binding *cb, *next; for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb; cb = next) { next = LIST_NEXT(cb, link); if (strcasecmp(cb->section, section) == 0 && strcasecmp(cb->tag, tag) == 0) { LIST_REMOVE(cb, link); LOG_DBG((LOG_MISC, 95, "[%s]:%s->%s removed", section, tag, cb->value)); free(cb->section); free(cb->tag); free(cb->value); free(cb); return 0; } } return 1; } static int conf_remove_section_now(char *section) { struct conf_binding *cb, *next; int unseen = 1; for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb; cb = next) { next = LIST_NEXT(cb, link); if (strcasecmp(cb->section, section) == 0) { unseen = 0; LIST_REMOVE(cb, link); LOG_DBG((LOG_MISC, 95, "[%s]:%s->%s removed", section, cb->tag, cb->value)); free(cb->section); free(cb->tag); free(cb->value); free(cb); } } return unseen; } /* * Insert a tag-value combination from LINE (the equal sign is at POS) * into SECTION of our configuration database. */ static int conf_set_now(char *section, char *tag, char *value, int override, int is_default) { struct conf_binding *node = 0; if (override) conf_remove_now(section, tag); else if (conf_get_str(section, tag)) { if (!is_default) log_print("conf_set_now: duplicate tag [%s]:%s, " "ignoring...\n", section, tag); return 1; } node = calloc(1, sizeof *node); if (!node) { log_error("conf_set_now: calloc (1, %lu) failed", (unsigned long)sizeof *node); return 1; } node->section = node->tag = node->value = NULL; if ((node->section = strdup(section)) == NULL) goto fail; if ((node->tag = strdup(tag)) == NULL) goto fail; if ((node->value = strdup(value)) == NULL) goto fail; node->is_default = is_default; LIST_INSERT_HEAD(&conf_bindings[conf_hash(section)], node, link); LOG_DBG((LOG_MISC, 95, "conf_set_now: [%s]:%s->%s", node->section, node->tag, node->value)); return 0; fail: free(node->value); free(node->tag); free(node->section); free(node); return 1; } /* * Parse the line LINE of SZ bytes. Skip Comments, recognize section * headers and feed tag-value pairs into our configuration database. */ static void conf_parse_line(int trans, char *line, int ln, size_t sz) { char *val; size_t i; int j; static char *section = 0; /* Lines starting with '#' or ';' are comments. */ if (*line == '#' || *line == ';') return; /* '[section]' parsing... */ if (*line == '[') { for (i = 1; i < sz; i++) if (line[i] == ']') break; free(section); if (i == sz) { log_print("conf_parse_line: %d:" "unmatched ']', ignoring until next section", ln); section = 0; return; } section = malloc(i); if (!section) { log_print("conf_parse_line: %d: malloc (%lu) failed", ln, (unsigned long)i); return; } strlcpy(section, line + 1, i); return; } /* Deal with assignments. */ for (i = 0; i < sz; i++) if (line[i] == '=') { /* If no section, we are ignoring the lines. */ if (!section) { log_print("conf_parse_line: %d: ignoring line " "due to no section", ln); return; } line[strcspn(line, " \t=")] = '\0'; val = line + i + 1 + strspn(line + i + 1, " \t"); /* Skip trailing whitespace, if any */ for (j = sz - (val - line) - 1; j > 0 && isspace((unsigned char)val[j]); j--) val[j] = '\0'; /* XXX Perhaps should we not ignore errors? */ conf_set(trans, section, line, val, 0, 0); return; } /* Other non-empty lines are weird. */ i = strspn(line, " \t"); if (line[i]) log_print("conf_parse_line: %d: syntax error", ln); } /* Parse the mapped configuration file. */ static void conf_parse(int trans, char *buf, size_t sz) { char *cp = buf; char *bufend = buf + sz; char *line; int ln = 1; line = cp; while (cp < bufend) { if (*cp == '\n') { /* Check for escaped newlines. */ if (cp > buf && *(cp - 1) == '\\') *(cp - 1) = *cp = ' '; else { *cp = '\0'; conf_parse_line(trans, line, ln, cp - line); line = cp + 1; } ln++; } cp++; } if (cp != line) log_print("conf_parse: last line unterminated, ignored."); } /* * Auto-generate default configuration values for the transforms and * suites the user wants. * * Resulting section names can be: * For main mode: * {BLF,3DES,CAST,AES,AES-{128,192,256}-{MD5,SHA,SHA2-{256,384,512}} \ * [-GRP{1,2,5,14-21,25-30}][-{DSS,RSA_SIG}] * For quick mode: * QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE * where * {proto} = ESP, AH * {cipher} = 3DES, CAST, BLF, AES, AES-{128,192,256}, AESCTR * {hash} = MD5, SHA, RIPEMD, SHA2-{256,384,512} * {group} = GRP{1,2,5,14-21,25-30} * * DH group defaults to MODP_1024. * * XXX We may want to support USE_TRIPLEDES, etc... * XXX No EC2N DH support here yet. */ /* Find the value for a section+tag in the transaction list. */ static char * conf_get_trans_str(int trans, char *section, char *tag) { struct conf_trans *node, *nf = 0; for (node = TAILQ_FIRST(&conf_trans_queue); node; node = TAILQ_NEXT(node, link)) if (node->trans == trans && strcasecmp(section, node->section) == 0 && strcasecmp(tag, node->tag) == 0) { if (!nf) nf = node; else if (node->override) nf = node; } return nf ? nf->value : 0; } #if 0 /* XXX Currently unused. */ static int conf_find_trans_xf(int phase, char *xf) { struct conf_trans *node; char *p; /* Find the relevant transforms and suites, if any. */ for (node = TAILQ_FIRST(&conf_trans_queue); node; node = TAILQ_NEXT(node, link)) if ((phase == 1 && strcmp("Transforms", node->tag) == 0) || (phase == 2 && strcmp("Suites", node->tag) == 0)) { p = node->value; while ((p = strstr(p, xf)) != NULL) if (*(p + strlen(p)) && *(p + strlen(p)) != ',') p += strlen(p); else return 1; } return 0; } #endif static void conf_load_defaults_mm(int tr, char *mme, char *mmh, char *mma, char *dhg, char *mme_p, char *mma_p, char *dhg_p, char *mmh_p) { char sect[CONF_SECT_MAX]; snprintf(sect, sizeof sect, "%s%s%s%s", mme_p, mmh_p, dhg_p, mma_p); LOG_DBG((LOG_MISC, 95, "conf_load_defaults_mm: main mode %s", sect)); conf_set(tr, sect, "ENCRYPTION_ALGORITHM", mme, 0, 1); if (strcmp(mme, "BLOWFISH_CBC") == 0) conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_BLF_KEYLEN, 0, 1); else if (strcmp(mme_p, "AES-128") == 0) conf_set(tr, sect, "KEY_LENGTH", "128,128:128", 0, 1); else if (strcmp(mme_p, "AES-192") == 0) conf_set(tr, sect, "KEY_LENGTH", "192,192:192", 0, 1); else if (strcmp(mme_p, "AES-256") == 0) conf_set(tr, sect, "KEY_LENGTH", "256,256:256", 0, 1); else if (strcmp(mme, "AES_CBC") == 0) conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_AES_KEYLEN, 0, 1); conf_set(tr, sect, "HASH_ALGORITHM", mmh, 0, 1); conf_set(tr, sect, "AUTHENTICATION_METHOD", mma, 0, 1); conf_set(tr, sect, "GROUP_DESCRIPTION", dhg, 0, 1); conf_set(tr, sect, "Life", CONF_DFLT_TAG_LIFE_MAIN_MODE, 0, 1); } static void conf_load_defaults_qm(int tr, char *qme, char *qmh, char *dhg, char *qme_p, char *qmh_p, char *qm_ah_id, char *dhg_p, int proto, int mode, int pfs) { char sect[CONF_SECT_MAX], tmp[CONF_SECT_MAX]; /* Helper #defines, incl abbreviations. */ #define PROTO(x) ((x) ? "AH" : "ESP") #define PFS(x) ((x) ? "-PFS" : "") #define MODE(x) ((x) ? "TRANSPORT" : "TUNNEL") #define MODE_p(x) ((x) ? "-TRP" : "") /* For AH a hash must be present and no encryption is allowed */ if (proto == 1 && (strcmp(qmh, "NONE") == 0 || strcmp(qme, "NONE") != 0)) return; /* For ESP encryption must be provided, an empty hash is ok. */ if (proto == 0 && strcmp(qme, "NONE") == 0) return; /* When PFS is disabled no DH group must be specified. */ if (pfs == 0 && strcmp(dhg_p, "")) return; /* For GCM no additional authentication must be specified */ if (proto == 0 && strcmp(qmh, "NONE") != 0 && (strcmp(qme, "AES_GCM_16") == 0 || strcmp(qme, "AES_GMAC") == 0)) return; snprintf(tmp, sizeof tmp, "QM-%s%s%s%s%s%s", PROTO(proto), MODE_p(mode), qme_p, qmh_p, PFS(pfs), dhg_p); strlcpy(sect, tmp, CONF_SECT_MAX); strlcat(sect, "-SUITE", CONF_SECT_MAX); LOG_DBG((LOG_MISC, 95, "conf_load_defaults_qm: quick mode %s", sect)); conf_set(tr, sect, "Protocols", tmp, 0, 1); snprintf(sect, sizeof sect, "IPSEC_%s", PROTO(proto)); conf_set(tr, tmp, "PROTOCOL_ID", sect, 0, 1); strlcpy(sect, tmp, CONF_SECT_MAX); strlcat(sect, "-XF", CONF_SECT_MAX); conf_set(tr, tmp, "Transforms", sect, 0, 1); /* * XXX For now, defaults * contain one xf per protocol. */ if (proto == 0) conf_set(tr, sect, "TRANSFORM_ID", qme, 0, 1); else conf_set(tr, sect, "TRANSFORM_ID", qm_ah_id, 0, 1); if (strcmp(qme ,"BLOWFISH") == 0) conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_BLF_KEYLEN, 0, 1); else if (strcmp(qme_p, "-AES-128") == 0 || strcmp(qme_p, "-AESCTR-128") == 0 || strcmp(qme_p, "-AESGCM-128") == 0 || strcmp(qme_p, "-AESGMAC-128") == 0) conf_set(tr, sect, "KEY_LENGTH", "128,128:128", 0, 1); else if (strcmp(qme_p, "-AES-192") == 0 || strcmp(qme_p, "-AESCTR-192") == 0 || strcmp(qme_p, "-AESGCM-192") == 0 || strcmp(qme_p, "-AESGMAC-192") == 0) conf_set(tr, sect, "KEY_LENGTH", "192,192:192", 0, 1); else if (strcmp(qme_p, "-AES-256") == 0 || strcmp(qme_p, "-AESCTR-256") == 0 || strcmp(qme_p, "-AESGCM-256") == 0 || strcmp(qme_p, "-AESGMAC-256") == 0) conf_set(tr, sect, "KEY_LENGTH", "256,256:256", 0, 1); else if (strcmp(qme, "AES") == 0) conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_AES_KEYLEN, 0, 1); conf_set(tr, sect, "ENCAPSULATION_MODE", MODE(mode), 0, 1); if (strcmp(qmh, "NONE")) { conf_set(tr, sect, "AUTHENTICATION_ALGORITHM", qmh, 0, 1); /* XXX Another shortcut to keep length down */ if (pfs) conf_set(tr, sect, "GROUP_DESCRIPTION", dhg, 0, 1); } /* XXX Lifetimes depending on enc/auth strength? */ conf_set(tr, sect, "Life", CONF_DFLT_TAG_LIFE_QUICK_MODE, 0, 1); } static void conf_load_defaults(int tr) { int enc, auth, hash, group, proto, mode, pfs; char *dflt; char *mm_auth[] = {"PRE_SHARED", "DSS", "RSA_SIG", 0}; char *mm_auth_p[] = {"", "-DSS", "-RSA_SIG", 0}; char *mm_hash[] = {"MD5", "SHA", "SHA2_256", "SHA2_384", "SHA2_512", 0}; char *mm_hash_p[] = {"-MD5", "-SHA", "-SHA2-256", "-SHA2-384", "-SHA2-512", "", 0 }; char *mm_enc[] = {"BLOWFISH_CBC", "3DES_CBC", "CAST_CBC", "AES_CBC", "AES_CBC", "AES_CBC", "AES_CBC", 0}; char *mm_enc_p[] = {"BLF", "3DES", "CAST", "AES", "AES-128", "AES-192", "AES-256", 0}; char *dhgroup[] = {"MODP_1024", "MODP_768", "MODP_1024", "MODP_1536", "MODP_2048", "MODP_3072", "MODP_4096", "MODP_6144", "MODP_8192", "ECP_256", "ECP_384", "ECP_521", "ECP_192", "ECP_224", "BP_224", "BP_256", "BP_384", "BP_512", 0}; char *dhgroup_p[] = {"", "-GRP1", "-GRP2", "-GRP5", "-GRP14", "-GRP15", "-GRP16", "-GRP17", "-GRP18", "-GRP19", "-GRP20", "-GRP21", "-GRP25", "-GRP26", "-GRP27", "-GRP28", "-GRP29", "-GRP30", 0}; char *qm_enc[] = {"3DES", "CAST", "BLOWFISH", "AES", "AES", "AES", "AES", "AES_CTR", "AES_CTR", "AES_CTR", "AES_CTR", "AES_GCM_16", "AES_GCM_16", "AES_GCM_16", "AES_GMAC", "AES_GMAC", "AES_GMAC", "NULL", "NONE", 0}; char *qm_enc_p[] = {"-3DES", "-CAST", "-BLF", "-AES", "-AES-128", "-AES-192", "-AES-256", "-AESCTR", "-AESCTR-128", "-AESCTR-192", "-AESCTR-256", "-AESGCM-128", "-AESGCM-192", "-AESGCM-256", "-AESGMAC-128", "-AESGMAC-192", "-AESGMAC-256", "-NULL", "", 0}; char *qm_hash[] = {"HMAC_MD5", "HMAC_SHA", "HMAC_RIPEMD", "HMAC_SHA2_256", "HMAC_SHA2_384", "HMAC_SHA2_512", "NONE", 0}; char *qm_hash_p[] = {"-MD5", "-SHA", "-RIPEMD", "-SHA2-256", "-SHA2-384", "-SHA2-512", "", 0}; char *qm_ah_id[] = {"MD5", "SHA", "RIPEMD", "SHA2_256", "SHA2_384", "SHA2_512", "", 0}; /* General and X509 defaults */ conf_set(tr, "General", "Retransmits", CONF_DFLT_RETRANSMITS, 0, 1); conf_set(tr, "General", "Exchange-max-time", CONF_DFLT_EXCH_MAX_TIME, 0, 1); conf_set(tr, "General", "Use-Keynote", CONF_DFLT_USE_KEYNOTE, 0, 1); conf_set(tr, "General", "Policy-file", CONF_DFLT_POLICY_FILE, 0, 1); conf_set(tr, "General", "Pubkey-directory", CONF_DFLT_PUBKEY_DIR, 0, 1); conf_set(tr, "X509-certificates", "CA-directory", CONF_DFLT_X509_CA_DIR, 0, 1); conf_set(tr, "X509-certificates", "Cert-directory", CONF_DFLT_X509_CERT_DIR, 0, 1); conf_set(tr, "X509-certificates", "Private-key", CONF_DFLT_X509_PRIVATE_KEY, 0, 1); conf_set(tr, "X509-certificates", "Private-key-directory", CONF_DFLT_X509_PRIVATE_KEY_DIR, 0, 1); conf_set(tr, "X509-certificates", "CRL-directory", CONF_DFLT_X509_CRL_DIR, 0, 1); conf_set(tr, "KeyNote", "Credential-directory", CONF_DFLT_KEYNOTE_CRED_DIR, 0, 1); conf_set(tr, "General", "Delete-SAs", CONF_DFLT_DELETE_SAS, 0, 1); /* Lifetimes. XXX p1/p2 vs main/quick mode may be unclear. */ dflt = conf_get_trans_str(tr, "General", "Default-phase-1-lifetime"); conf_set(tr, CONF_DFLT_TAG_LIFE_MAIN_MODE, "LIFE_TYPE", CONF_DFLT_TYPE_LIFE_MAIN_MODE, 0, 1); conf_set(tr, CONF_DFLT_TAG_LIFE_MAIN_MODE, "LIFE_DURATION", (dflt ? dflt : CONF_DFLT_VAL_LIFE_MAIN_MODE), 0, 1); dflt = conf_get_trans_str(tr, "General", "Default-phase-2-lifetime"); conf_set(tr, CONF_DFLT_TAG_LIFE_QUICK_MODE, "LIFE_TYPE", CONF_DFLT_TYPE_LIFE_QUICK_MODE, 0, 1); conf_set(tr, CONF_DFLT_TAG_LIFE_QUICK_MODE, "LIFE_DURATION", (dflt ? dflt : CONF_DFLT_VAL_LIFE_QUICK_MODE), 0, 1); /* Default Phase-1 Configuration section */ conf_set(tr, CONF_DFLT_TAG_PHASE1_CONFIG, "EXCHANGE_TYPE", CONF_DFLT_PHASE1_EXCH_TYPE, 0, 1); conf_set(tr, CONF_DFLT_TAG_PHASE1_CONFIG, "Transforms", CONF_DFLT_PHASE1_TRANSFORMS, 0, 1); /* Main modes */ for (enc = 0; mm_enc[enc]; enc++) for (hash = 0; mm_hash[hash]; hash++) for (auth = 0; mm_auth[auth]; auth++) for (group = 0; dhgroup_p[group]; group++) conf_load_defaults_mm (tr, mm_enc[enc], mm_hash[hash], mm_auth[auth], dhgroup[group], mm_enc_p[enc], mm_auth_p[auth], dhgroup_p[group], mm_hash_p[hash]); /* Setup a default Phase 1 entry */ conf_set(tr, "Phase 1", "Default", "Default-phase-1", 0, 1); conf_set(tr, "Default-phase-1", "Phase", "1", 0, 1); conf_set(tr, "Default-phase-1", "Configuration", "Default-phase-1-configuration", 0, 1); dflt = conf_get_trans_str(tr, "General", "Default-phase-1-ID"); if (dflt) conf_set(tr, "Default-phase-1", "ID", dflt, 0, 1); /* Quick modes */ for (enc = 0; qm_enc[enc]; enc++) for (proto = 0; proto < 2; proto++) for (mode = 0; mode < 2; mode++) for (pfs = 0; pfs < 2; pfs++) for (hash = 0; qm_hash[hash]; hash++) for (group = 0; dhgroup_p[group]; group++) conf_load_defaults_qm( tr, qm_enc[enc], qm_hash[hash], dhgroup[group], qm_enc_p[enc], qm_hash_p[hash], qm_ah_id[hash], dhgroup_p[group], proto, mode, pfs); } void conf_init(void) { unsigned int i; for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++) LIST_INIT(&conf_bindings[i]); TAILQ_INIT(&conf_trans_queue); conf_reinit(); } /* Open the config file and map it into our address space, then parse it. */ void conf_reinit(void) { struct conf_binding *cb = 0; int fd, trans; unsigned int i; size_t sz; char *new_conf_addr = 0; fd = monitor_open(conf_path, O_RDONLY, 0); if (fd == -1 || check_file_secrecy_fd(fd, conf_path, &sz) == -1) { if (fd == -1 && errno != ENOENT) log_error("conf_reinit: open(\"%s\", O_RDONLY, 0) " "failed", conf_path); if (fd != -1) close(fd); trans = conf_begin(); } else { new_conf_addr = malloc(sz); if (!new_conf_addr) { log_error("conf_reinit: malloc (%lu) failed", (unsigned long)sz); goto fail; } /* XXX I assume short reads won't happen here. */ if (read(fd, new_conf_addr, sz) != (int)sz) { log_error("conf_reinit: read (%d, %p, %lu) failed", fd, new_conf_addr, (unsigned long)sz); goto fail; } close(fd); trans = conf_begin(); /* XXX Should we not care about errors and rollback? */ conf_parse(trans, new_conf_addr, sz); } /* Load default configuration values. */ conf_load_defaults(trans); /* Free potential existing configuration. */ if (conf_addr) { for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++) for (cb = LIST_FIRST(&conf_bindings[i]); cb; cb = LIST_FIRST(&conf_bindings[i])) conf_remove_now(cb->section, cb->tag); free(conf_addr); } conf_end(trans, 1); conf_addr = new_conf_addr; return; fail: free(new_conf_addr); close(fd); } /* * Return the numeric value denoted by TAG in section SECTION or DEF * if that tag does not exist. */ int conf_get_num(char *section, char *tag, int def) { char *value = conf_get_str(section, tag); if (value) return atoi(value); return def; } /* * Return the socket endpoint address denoted by TAG in SECTION as a * struct sockaddr. It is the callers responsibility to deallocate * this structure when it is finished with it. */ struct sockaddr * conf_get_address(char *section, char *tag) { char *value = conf_get_str(section, tag); struct sockaddr *sa; if (!value) return 0; if (text2sockaddr(value, 0, &sa, 0, 0) == -1) return 0; return sa; } /* Validate X according to the range denoted by TAG in section SECTION. */ int conf_match_num(char *section, char *tag, int x) { char *value = conf_get_str(section, tag); int val, min, max, n; if (!value) return 0; n = sscanf(value, "%d,%d:%d", &val, &min, &max); switch (n) { case 1: LOG_DBG((LOG_MISC, 95, "conf_match_num: %s:%s %d==%d?", section, tag, val, x)); return x == val; case 3: LOG_DBG((LOG_MISC, 95, "conf_match_num: %s:%s %d<=%d<=%d?", section, tag, min, x, max)); return min <= x && max >= x; default: log_error("conf_match_num: section %s tag %s: invalid number " "spec %s", section, tag, value); } return 0; } /* Return the string value denoted by TAG in section SECTION. */ char * conf_get_str(char *section, char *tag) { struct conf_binding *cb; for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb; cb = LIST_NEXT(cb, link)) if (strcasecmp(section, cb->section) == 0 && strcasecmp(tag, cb->tag) == 0) { LOG_DBG((LOG_MISC, 95, "conf_get_str: [%s]:%s->%s", section, tag, cb->value)); return cb->value; } LOG_DBG((LOG_MISC, 95, "conf_get_str: configuration value not found [%s]:%s", section, tag)); return 0; } /* * Build a list of string values out of the comma separated value denoted by * TAG in SECTION. */ struct conf_list * conf_get_list(char *section, char *tag) { char *liststr = 0, *p, *field, *t; struct conf_list *list = 0; struct conf_list_node *node = 0; list = malloc(sizeof *list); if (!list) goto cleanup; TAILQ_INIT(&list->fields); list->cnt = 0; liststr = conf_get_str(section, tag); if (!liststr) goto cleanup; liststr = strdup(liststr); if (!liststr) goto cleanup; p = liststr; while ((field = strsep(&p, ",")) != NULL) { /* Skip leading whitespace */ while (isspace((unsigned char)*field)) field++; /* Skip trailing whitespace */ if (p) for (t = p - 1; t > field && isspace((unsigned char)*t); t--) *t = '\0'; if (*field == '\0') { log_print("conf_get_list: empty field, ignoring..."); continue; } list->cnt++; node = calloc(1, sizeof *node); if (!node) goto cleanup; node->field = strdup(field); if (!node->field) goto cleanup; TAILQ_INSERT_TAIL(&list->fields, node, link); } free(liststr); return list; cleanup: free(node); if (list) conf_free_list(list); free(liststr); return 0; } struct conf_list * conf_get_tag_list(char *section) { struct conf_list *list = 0; struct conf_list_node *node = 0; struct conf_binding *cb; list = malloc(sizeof *list); if (!list) goto cleanup; TAILQ_INIT(&list->fields); list->cnt = 0; for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb; cb = LIST_NEXT(cb, link)) if (strcasecmp(section, cb->section) == 0) { list->cnt++; node = calloc(1, sizeof *node); if (!node) goto cleanup; node->field = strdup(cb->tag); if (!node->field) goto cleanup; TAILQ_INSERT_TAIL(&list->fields, node, link); } return list; cleanup: free(node); if (list) conf_free_list(list); return 0; } void conf_free_list(struct conf_list *list) { struct conf_list_node *node = TAILQ_FIRST(&list->fields); while (node) { TAILQ_REMOVE(&list->fields, node, link); free(node->field); free(node); node = TAILQ_FIRST(&list->fields); } free(list); } int conf_begin(void) { static int seq = 0; return ++seq; } static int conf_trans_node(int transaction, enum conf_op op, char *section, char *tag, char *value, int override, int is_default) { struct conf_trans *node; node = calloc(1, sizeof *node); if (!node) { log_error("conf_trans_node: calloc (1, %lu) failed", (unsigned long)sizeof *node); return 1; } node->trans = transaction; node->op = op; node->override = override; node->is_default = is_default; if (section && (node->section = strdup(section)) == NULL) goto fail; if (tag && (node->tag = strdup(tag)) == NULL) goto fail; if (value && (node->value = strdup(value)) == NULL) goto fail; TAILQ_INSERT_TAIL(&conf_trans_queue, node, link); return 0; fail: free(node->section); free(node->tag); free(node->value); free(node); return 1; } /* Queue a set operation. */ int conf_set(int transaction, char *section, char *tag, char *value, int override, int is_default) { return conf_trans_node(transaction, CONF_SET, section, tag, value, override, is_default); } /* Queue a remove operation. */ int conf_remove(int transaction, char *section, char *tag) { return conf_trans_node(transaction, CONF_REMOVE, section, tag, NULL, 0, 0); } /* Queue a remove section operation. */ int conf_remove_section(int transaction, char *section) { return conf_trans_node(transaction, CONF_REMOVE_SECTION, section, NULL, NULL, 0, 0); } /* Execute all queued operations for this transaction. Cleanup. */ int conf_end(int transaction, int commit) { struct conf_trans *node, *next; for (node = TAILQ_FIRST(&conf_trans_queue); node; node = next) { next = TAILQ_NEXT(node, link); if (node->trans == transaction) { if (commit) switch (node->op) { case CONF_SET: conf_set_now(node->section, node->tag, node->value, node->override, node->is_default); break; case CONF_REMOVE: conf_remove_now(node->section, node->tag); break; case CONF_REMOVE_SECTION: conf_remove_section_now(node->section); break; default: log_print("conf_end: unknown " "operation: %d", node->op); } TAILQ_REMOVE(&conf_trans_queue, node, link); free(node->section); free(node->tag); free(node->value); free(node); } } return 0; } /* * Dump running configuration upon SIGUSR1. * Configuration is "stored in reverse order", so reverse it again. */ struct dumper { char *s, *v; struct dumper *next; }; static void conf_report_dump(struct dumper *node) { /* Recursive, cleanup when we're done. */ if (node->next) conf_report_dump(node->next); if (node->v) LOG_DBG((LOG_REPORT, 0, "%s=\t%s", node->s, node->v)); else if (node->s) { LOG_DBG((LOG_REPORT, 0, "%s", node->s)); if (strlen(node->s) > 0) free(node->s); } free(node); } void conf_report(void) { struct conf_binding *cb, *last = 0; unsigned int i; char *current_section = NULL; struct dumper *dumper, *dnode; dumper = dnode = calloc(1, sizeof *dumper); if (!dumper) goto mem_fail; LOG_DBG((LOG_REPORT, 0, "conf_report: dumping running configuration")); for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++) for (cb = LIST_FIRST(&conf_bindings[i]); cb; cb = LIST_NEXT(cb, link)) { if (!cb->is_default) { /* Dump this entry. */ if (!current_section || strcmp(cb->section, current_section)) { if (current_section) { if (asprintf(&dnode->s, "[%s]", current_section) == -1) goto mem_fail; dnode->next = calloc(1, sizeof(struct dumper)); dnode = dnode->next; if (!dnode) goto mem_fail; dnode->s = ""; dnode->next = calloc(1, sizeof(struct dumper)); dnode = dnode->next; if (!dnode) goto mem_fail; } current_section = cb->section; } dnode->s = cb->tag; dnode->v = cb->value; dnode->next = calloc(1, sizeof(struct dumper)); dnode = dnode->next; if (!dnode) goto mem_fail; last = cb; } } if (last) if (asprintf(&dnode->s, "[%s]", last->section) == -1) goto mem_fail; conf_report_dump(dumper); return; mem_fail: log_error("conf_report: malloc/calloc failed"); while ((dnode = dumper) != 0) { dumper = dumper->next; free(dnode->s); free(dnode); } }