/* $Id: prsa_par.y,v 1.3 2004/11/08 12:04:23 ludvigm Exp $ */ %{ /* * Copyright (C) 2004 SuSE Linux AG, Nuernberg, Germany. * Contributed by: Michal Ludvig , SUSE Labs * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* This file contains a parser for FreeS/WAN-style ipsec.secrets RSA keys. */ #include "config.h" #include #include #include #include #include #ifdef HAVE_STDARG_H #include #else #include #endif #include #include #include #include #include #include #include #include #include #include "misc.h" #include "vmbuf.h" #include "plog.h" #include "oakley.h" #include "isakmp_var.h" #include "handler.h" #include "crypto_openssl.h" #include "sockmisc.h" #include "rsalist.h" extern void prsaerror(const char *str, ...); extern int prsawrap (void); extern int prsalex (void); extern char *prsatext; extern int prsa_cur_lineno; extern char *prsa_cur_fname; extern FILE *prsain; int prsa_cur_lineno = 0; char *prsa_cur_fname = NULL; struct genlist *prsa_cur_list = NULL; enum rsa_key_type prsa_cur_type = RSA_TYPE_ANY; static RSA *rsa_cur; void prsaerror(const char *s, ...) { char fmt[512]; va_list ap; #ifdef HAVE_STDARG_H va_start(ap, s); #else va_start(ap); #endif snprintf(fmt, sizeof(fmt), "%s:%d: %s", prsa_cur_fname, prsa_cur_lineno, s); plogv(LLV_ERROR, LOCATION, NULL, fmt, ap); va_end(ap); } void prsawarning(const char *s, ...) { char fmt[512]; va_list ap; #ifdef HAVE_STDARG_H va_start(ap, s); #else va_start(ap); #endif snprintf(fmt, sizeof(fmt), "%s:%d: %s", prsa_cur_fname, prsa_cur_lineno, s); plogv(LLV_WARNING, LOCATION, NULL, fmt, ap); va_end(ap); } int prsawrap() { return 1; } %} %union { BIGNUM *bn; RSA *rsa; char *chr; long num; struct netaddr *naddr; } %token COLON HEX %token OBRACE EBRACE COLON HEX %token TAG_RSA TAG_PUB TAG_PSK %token MODULUS PUBLIC_EXPONENT PRIVATE_EXPONENT %token PRIME1 PRIME2 EXPONENT1 EXPONENT2 COEFFICIENT %token ADDR4 ADDR6 ADDRANY SLASH NUMBER BASE64 %type HEX %type NUMBER %type ADDR4 ADDR6 BASE64 %type rsa_statement %type prefix %type addr4 addr6 addr %% statements: statements statement | statement ; statement: addr addr COLON rsa_statement { rsa_key_insert(prsa_cur_list, $1, $2, $4); } | addr COLON rsa_statement { rsa_key_insert(prsa_cur_list, NULL, $1, $3); } | COLON rsa_statement { rsa_key_insert(prsa_cur_list, NULL, NULL, $2); } ; rsa_statement: TAG_RSA OBRACE params EBRACE { if (prsa_cur_type == RSA_TYPE_PUBLIC) { prsawarning("Using private key for public key purpose.\n"); if (!rsa_cur->n || !rsa_cur->e) { prsaerror("Incomplete key. Mandatory parameters are missing!\n"); YYABORT; } } else { if (!rsa_cur->n || !rsa_cur->e || !rsa_cur->d) { prsaerror("Incomplete key. Mandatory parameters are missing!\n"); YYABORT; } if (!rsa_cur->p || !rsa_cur->q || !rsa_cur->dmp1 || !rsa_cur->dmq1 || !rsa_cur->iqmp) { if (rsa_cur->p) BN_clear_free(rsa_cur->p); if (rsa_cur->q) BN_clear_free(rsa_cur->q); if (rsa_cur->dmp1) BN_clear_free(rsa_cur->dmp1); if (rsa_cur->dmq1) BN_clear_free(rsa_cur->dmq1); if (rsa_cur->iqmp) BN_clear_free(rsa_cur->iqmp); rsa_cur->p = NULL; rsa_cur->q = NULL; rsa_cur->dmp1 = NULL; rsa_cur->dmq1 = NULL; rsa_cur->iqmp = NULL; } } $$ = rsa_cur; rsa_cur = RSA_new(); } | TAG_PUB BASE64 { if (prsa_cur_type == RSA_TYPE_PRIVATE) { prsaerror("Public key in private-key file!\n"); YYABORT; } $$ = base64_pubkey2rsa($2); } | TAG_PUB HEX { if (prsa_cur_type == RSA_TYPE_PRIVATE) { prsaerror("Public key in private-key file!\n"); YYABORT; } $$ = bignum_pubkey2rsa($2); } ; addr: addr4 | addr6 | ADDRANY { $$ = NULL; } ; addr4: ADDR4 prefix { int err; struct sockaddr_in *sap; if ($2 == -1) $2 = 32; if ($2 < 0 || $2 > 32) { prsaerror ("Invalid IPv4 prefix\n"); YYABORT; } $$ = calloc (sizeof(struct netaddr), 1); $$->prefix = $2; sap = (struct sockaddr_in *)(&$$->sa); sap->sin_family = AF_INET; err = inet_pton(AF_INET, $1, (struct in_addr*)(&sap->sin_addr)); if (err <= 0) { prsaerror("inet_pton(%s): %s\n", $1, strerror(errno)); YYABORT; } } ; addr6: ADDR6 prefix { int err; struct sockaddr_in6 *sap; if ($2 == -1) $2 = 128; if ($2 < 0 || $2 > 128) { prsaerror ("Invalid IPv6 prefix\n"); YYABORT; } $$ = calloc (sizeof(struct netaddr), 1); $$->prefix = $2; sap = (struct sockaddr_in6 *)(&$$->sa); sap->sin6_family = AF_INET6; err = inet_pton(AF_INET6, $1, (struct in6_addr*)(&sap->sin6_addr)); if (err <= 0) { prsaerror("inet_pton(%s): %s\n", $1, strerror(errno)); YYABORT; } } ; prefix: /* nothing */ { $$ = -1; } | SLASH NUMBER { $$ = $2; } ; params: params param | param ; param: MODULUS COLON HEX { if (!rsa_cur->n) rsa_cur->n = $3; else { prsaerror ("Modulus already defined\n"); YYABORT; } } | PUBLIC_EXPONENT COLON HEX { if (!rsa_cur->e) rsa_cur->e = $3; else { prsaerror ("PublicExponent already defined\n"); YYABORT; } } | PRIVATE_EXPONENT COLON HEX { if (!rsa_cur->d) rsa_cur->d = $3; else { prsaerror ("PrivateExponent already defined\n"); YYABORT; } } | PRIME1 COLON HEX { if (!rsa_cur->p) rsa_cur->p = $3; else { prsaerror ("Prime1 already defined\n"); YYABORT; } } | PRIME2 COLON HEX { if (!rsa_cur->q) rsa_cur->q = $3; else { prsaerror ("Prime2 already defined\n"); YYABORT; } } | EXPONENT1 COLON HEX { if (!rsa_cur->dmp1) rsa_cur->dmp1 = $3; else { prsaerror ("Exponent1 already defined\n"); YYABORT; } } | EXPONENT2 COLON HEX { if (!rsa_cur->dmq1) rsa_cur->dmq1 = $3; else { prsaerror ("Exponent2 already defined\n"); YYABORT; } } | COEFFICIENT COLON HEX { if (!rsa_cur->iqmp) rsa_cur->iqmp = $3; else { prsaerror ("Coefficient already defined\n"); YYABORT; } } ; %% int prsaparse(void); int prsa_parse_file(struct genlist *list, char *fname, enum rsa_key_type type) { FILE *fp = NULL; int ret; if (!fname) return -1; if (type == RSA_TYPE_PRIVATE) { struct stat st; if (stat(fname, &st) < 0) return -1; if (st.st_mode & (S_IRWXG | S_IRWXO)) { plog(LLV_ERROR, LOCATION, NULL, "Too slack permissions on private key '%s'\n", fname); plog(LLV_ERROR, LOCATION, NULL, "Should be at most 0600, now is 0%o\n", st.st_mode & 0777); return -1; } } fp = fopen(fname, "r"); if (!fp) return -1; prsain = fp; prsa_cur_lineno = 1; prsa_cur_fname = fname; prsa_cur_list = list; prsa_cur_type = type; rsa_cur = RSA_new(); ret = prsaparse(); if (rsa_cur) { RSA_free(rsa_cur); rsa_cur = NULL; } fclose (fp); prsain = NULL; return ret; }