2 * Copyright (C) 2014 Tobias Brunner
3 * Copyright (C) 2006 Andreas Steffen
4 * Hochschule fuer Technik Rapperswil
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
22 #include <utils/debug.h>
42 /* various keyword lists */
44 static const char *LST_bool
[] = {
50 static const char *LST_sendcert
[] = {
59 static const char *LST_unique
[] = {
68 static const char *LST_strict
[] = {
74 static const char *LST_dpd_action
[] = {
82 static const char *LST_startup
[] = {
90 static const char *LST_keyexchange
[] = {
97 static const char *LST_authby
[] = {
111 static const char *LST_fragmentation
[] = {
124 static const token_info_t token_info
[] =
126 /* config setup keywords */
127 { ARG_STR
, offsetof(starter_config_t
, setup
.charondebug
), NULL
},
128 { ARG_ENUM
, offsetof(starter_config_t
, setup
.uniqueids
), LST_unique
},
129 { ARG_ENUM
, offsetof(starter_config_t
, setup
.cachecrls
), LST_bool
},
130 { ARG_ENUM
, offsetof(starter_config_t
, setup
.strictcrlpolicy
), LST_strict
},
131 { ARG_MISC
, 0, NULL
/* KW_PKCS11_DEPRECATED */ },
132 { ARG_MISC
, 0, NULL
/* KW_SETUP_DEPRECATED */ },
134 /* conn section keywords */
135 { ARG_STR
, offsetof(starter_conn_t
, name
), NULL
},
136 { ARG_ENUM
, offsetof(starter_conn_t
, startup
), LST_startup
},
137 { ARG_ENUM
, offsetof(starter_conn_t
, keyexchange
), LST_keyexchange
},
138 { ARG_MISC
, 0, NULL
/* KW_TYPE */ },
139 { ARG_MISC
, 0, NULL
/* KW_COMPRESS */ },
140 { ARG_ENUM
, offsetof(starter_conn_t
, install_policy
), LST_bool
},
141 { ARG_ENUM
, offsetof(starter_conn_t
, aggressive
), LST_bool
},
142 { ARG_STR
, offsetof(starter_conn_t
, authby
), LST_authby
},
143 { ARG_STR
, offsetof(starter_conn_t
, eap_identity
), NULL
},
144 { ARG_STR
, offsetof(starter_conn_t
, aaa_identity
), NULL
},
145 { ARG_MISC
, 0, NULL
/* KW_MOBIKE */ },
146 { ARG_MISC
, 0, NULL
/* KW_FORCEENCAPS */ },
147 { ARG_ENUM
, offsetof(starter_conn_t
, fragmentation
), LST_fragmentation
},
148 { ARG_UBIN
, offsetof(starter_conn_t
, ikedscp
), NULL
},
149 { ARG_TIME
, offsetof(starter_conn_t
, sa_ike_life_seconds
), NULL
},
150 { ARG_TIME
, offsetof(starter_conn_t
, sa_ipsec_life_seconds
), NULL
},
151 { ARG_TIME
, offsetof(starter_conn_t
, sa_rekey_margin
), NULL
},
152 { ARG_ULLI
, offsetof(starter_conn_t
, sa_ipsec_life_bytes
), NULL
},
153 { ARG_ULLI
, offsetof(starter_conn_t
, sa_ipsec_margin_bytes
), NULL
},
154 { ARG_ULLI
, offsetof(starter_conn_t
, sa_ipsec_life_packets
), NULL
},
155 { ARG_ULLI
, offsetof(starter_conn_t
, sa_ipsec_margin_packets
), NULL
},
156 { ARG_MISC
, 0, NULL
/* KW_KEYINGTRIES */ },
157 { ARG_PCNT
, offsetof(starter_conn_t
, sa_rekey_fuzz
), NULL
},
158 { ARG_MISC
, 0, NULL
/* KW_REKEY */ },
159 { ARG_MISC
, 0, NULL
/* KW_REAUTH */ },
160 { ARG_STR
, offsetof(starter_conn_t
, ike
), NULL
},
161 { ARG_STR
, offsetof(starter_conn_t
, esp
), NULL
},
162 { ARG_STR
, offsetof(starter_conn_t
, ah
), NULL
},
163 { ARG_TIME
, offsetof(starter_conn_t
, dpd_delay
), NULL
},
164 { ARG_TIME
, offsetof(starter_conn_t
, dpd_timeout
), NULL
},
165 { ARG_ENUM
, offsetof(starter_conn_t
, dpd_action
), LST_dpd_action
},
166 { ARG_ENUM
, offsetof(starter_conn_t
, close_action
), LST_dpd_action
},
167 { ARG_TIME
, offsetof(starter_conn_t
, inactivity
), NULL
},
168 { ARG_MISC
, 0, NULL
/* KW_MODECONFIG */ },
169 { ARG_MISC
, 0, NULL
/* KW_XAUTH */ },
170 { ARG_STR
, offsetof(starter_conn_t
, xauth_identity
), NULL
},
171 { ARG_ENUM
, offsetof(starter_conn_t
, me_mediation
), LST_bool
},
172 { ARG_STR
, offsetof(starter_conn_t
, me_mediated_by
), NULL
},
173 { ARG_STR
, offsetof(starter_conn_t
, me_peerid
), NULL
},
174 { ARG_UINT
, offsetof(starter_conn_t
, reqid
), NULL
},
175 { ARG_UINT
, offsetof(starter_conn_t
, replay_window
), NULL
},
176 { ARG_MISC
, 0, NULL
/* KW_MARK */ },
177 { ARG_MISC
, 0, NULL
/* KW_MARK_IN */ },
178 { ARG_MISC
, 0, NULL
/* KW_MARK_OUT */ },
179 { ARG_MISC
, 0, NULL
/* KW_TFC */ },
180 { ARG_MISC
, 0, NULL
/* KW_PFS_DEPRECATED */ },
181 { ARG_MISC
, 0, NULL
/* KW_CONN_DEPRECATED */ },
183 /* ca section keywords */
184 { ARG_STR
, offsetof(starter_ca_t
, name
), NULL
},
185 { ARG_ENUM
, offsetof(starter_ca_t
, startup
), LST_startup
},
186 { ARG_STR
, offsetof(starter_ca_t
, cacert
), NULL
},
187 { ARG_STR
, offsetof(starter_ca_t
, crluri
), NULL
},
188 { ARG_STR
, offsetof(starter_ca_t
, crluri2
), NULL
},
189 { ARG_STR
, offsetof(starter_ca_t
, ocspuri
), NULL
},
190 { ARG_STR
, offsetof(starter_ca_t
, ocspuri2
), NULL
},
191 { ARG_STR
, offsetof(starter_ca_t
, certuribase
), NULL
},
192 { ARG_MISC
, 0, NULL
/* KW_CA_DEPRECATED */ },
195 { ARG_STR
, offsetof(starter_end_t
, host
), NULL
},
196 { ARG_UINT
, offsetof(starter_end_t
, ikeport
), NULL
},
197 { ARG_STR
, offsetof(starter_end_t
, subnet
), NULL
},
198 { ARG_MISC
, 0, NULL
/* KW_PROTOPORT */ },
199 { ARG_STR
, offsetof(starter_end_t
, sourceip
), NULL
},
200 { ARG_STR
, offsetof(starter_end_t
, dns
), NULL
},
201 { ARG_ENUM
, offsetof(starter_end_t
, firewall
), LST_bool
},
202 { ARG_ENUM
, offsetof(starter_end_t
, hostaccess
), LST_bool
},
203 { ARG_ENUM
, offsetof(starter_end_t
, allow_any
), LST_bool
},
204 { ARG_STR
, offsetof(starter_end_t
, updown
), NULL
},
205 { ARG_STR
, offsetof(starter_end_t
, auth
), NULL
},
206 { ARG_STR
, offsetof(starter_end_t
, auth2
), NULL
},
207 { ARG_STR
, offsetof(starter_end_t
, id
), NULL
},
208 { ARG_STR
, offsetof(starter_end_t
, id2
), NULL
},
209 { ARG_STR
, offsetof(starter_end_t
, rsakey
), NULL
},
210 { ARG_STR
, offsetof(starter_end_t
, cert
), NULL
},
211 { ARG_STR
, offsetof(starter_end_t
, cert2
), NULL
},
212 { ARG_STR
, offsetof(starter_end_t
, cert_policy
), NULL
},
213 { ARG_ENUM
, offsetof(starter_end_t
, sendcert
), LST_sendcert
},
214 { ARG_STR
, offsetof(starter_end_t
, ca
), NULL
},
215 { ARG_STR
, offsetof(starter_end_t
, ca2
), NULL
},
216 { ARG_STR
, offsetof(starter_end_t
, groups
), NULL
},
217 { ARG_STR
, offsetof(starter_end_t
, groups2
), NULL
},
218 { ARG_MISC
, 0, NULL
/* KW_END_DEPRECATED */ },
222 * assigns an argument value to a struct field
224 bool assign_arg(kw_token_t token
, kw_token_t first
, char *key
, char *value
,
225 void *base
, bool *assigned
)
227 char *p
= (char*)base
+ token_info
[token
].offset
;
228 const char **list
= token_info
[token
].list
;
229 int index
= -1; /* used for enumeration arguments */
233 DBG3(DBG_APP
, " %s=%s", key
, value
);
235 /* is there a keyword list? */
240 while (*list
!= NULL
&& !match
)
243 match
= streq(value
, *list
++);
247 DBG1(DBG_APP
, "# bad value: %s=%s", key
, value
);
252 switch (token_info
[token
].type
)
255 DBG1(DBG_APP
, "# option '%s' not supported yet", key
);
261 DBG1(DBG_APP
, "# bad enumeration value: %s=%s (%d)",
266 if (token_info
[token
].list
== LST_bool
)
272 { /* FIXME: this is not entirely correct as the args are enums */
281 u_int
*u
= (u_int
*)p
;
283 *u
= strtoul(value
, &endptr
, 10);
287 DBG1(DBG_APP
, "# bad integer value: %s=%s", key
, value
);
296 unsigned long *l
= (unsigned long *)p
;
298 *l
= strtoul(value
, &endptr
, 10);
300 if (token_info
[token
].type
== ARG_ULNG
)
304 DBG1(DBG_APP
, "# bad integer value: %s=%s", key
, value
);
310 if ((*endptr
!= '%') || (endptr
[1] != '\0') || endptr
== value
)
312 DBG1(DBG_APP
, "# bad percent value: %s=%s", key
, value
);
321 unsigned long long *ll
= (unsigned long long *)p
;
323 *ll
= strtoull(value
, &endptr
, 10);
327 DBG1(DBG_APP
, "# bad integer value: %s=%s", key
, value
);
335 u_int
*u
= (u_int
*)p
;
337 *u
= strtoul(value
, &endptr
, 2);
341 DBG1(DBG_APP
, "# bad binary value: %s=%s", key
, value
);
349 time_t *t
= (time_t *)p
;
351 *t
= strtoul(value
, &endptr
, 10);
353 /* time in seconds? */
354 if (*endptr
== '\0' || (*endptr
== 's' && endptr
[1] == '\0'))
358 if (endptr
[1] == '\0')
360 if (*endptr
== 'm') /* time in minutes? */
365 if (*endptr
== 'h') /* time in hours? */
370 if (*endptr
== 'd') /* time in days? */
376 DBG1(DBG_APP
, "# bad duration value: %s=%s", key
, value
);
381 char **cp
= (char **)p
;
383 /* free any existing string */
385 /* assign the new string */
386 *cp
= strdupnull(value
);
398 * frees all dynamically allocated arguments in a struct
400 void free_args(kw_token_t first
, kw_token_t last
, void *base
)
404 for (token
= first
; token
<= last
; token
++)
406 char *p
= (char*)base
+ token_info
[token
].offset
;
408 switch (token_info
[token
].type
)
412 char **cp
= (char **)p
;
425 * compare all arguments in a struct
427 bool cmp_args(kw_token_t first
, kw_token_t last
, void *base1
, void *base2
)
431 for (token
= first
; token
<= last
; token
++)
433 char *p1
= (char*)base1
+ token_info
[token
].offset
;
434 char *p2
= (char*)base2
+ token_info
[token
].offset
;
436 switch (token_info
[token
].type
)
440 if (token_info
[token
].list
== LST_bool
)
442 bool *b1
= (bool *)p1
;
443 bool *b2
= (bool *)p2
;
464 u_int
*u1
= (u_int
*)p1
;
465 u_int
*u2
= (u_int
*)p2
;
476 unsigned long *l1
= (unsigned long *)p1
;
477 unsigned long *l2
= (unsigned long *)p2
;
487 unsigned long long *ll1
= (unsigned long long *)p1
;
488 unsigned long long *ll2
= (unsigned long long *)p2
;
498 time_t *t1
= (time_t *)p1
;
499 time_t *t2
= (time_t *)p2
;
509 char **cp1
= (char **)p1
;
510 char **cp2
= (char **)p2
;
512 if (*cp1
== NULL
&& *cp2
== NULL
)
516 if (*cp1
== NULL
|| *cp2
== NULL
|| strcmp(*cp1
, *cp2
) != 0)