1 |
|
|
%{ |
2 |
|
|
/* $NetBSD: cfparse.y,v 1.4 1995/12/10 10:06:57 mycroft Exp $ */ |
3 |
|
|
|
4 |
|
|
/* |
5 |
|
|
* Configuration file parser for mrouted. |
6 |
|
|
* |
7 |
|
|
* Written by Bill Fenner, NRL, 1994 |
8 |
|
|
* Copyright (c) 1994 |
9 |
|
|
* Naval Research Laboratory (NRL/CCS) |
10 |
|
|
* and the |
11 |
|
|
* Defense Advanced Research Projects Agency (DARPA) |
12 |
|
|
* |
13 |
|
|
* All Rights Reserved. |
14 |
|
|
* |
15 |
|
|
* Permission to use, copy, modify and distribute this software and its |
16 |
|
|
* documentation is hereby granted, provided that both the copyright notice and |
17 |
|
|
* this permission notice appear in all copies of the software, derivative |
18 |
|
|
* works or modified versions, and any portions thereof, and that both notices |
19 |
|
|
* appear in supporting documentation. |
20 |
|
|
* |
21 |
|
|
* NRL AND DARPA ALLOW FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION AND |
22 |
|
|
* DISCLAIM ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM |
23 |
|
|
* THE USE OF THIS SOFTWARE. |
24 |
|
|
*/ |
25 |
|
|
#include <stdio.h> |
26 |
|
|
#include <string.h> |
27 |
|
|
#include <stdarg.h> |
28 |
|
|
#include "defs.h" |
29 |
|
|
#include <netdb.h> |
30 |
|
|
#include <ifaddrs.h> |
31 |
|
|
|
32 |
|
|
/* |
33 |
|
|
* Local function declarations |
34 |
|
|
*/ |
35 |
|
|
static void fatal(const char *fmt, ...) |
36 |
|
|
__attribute__((__format__ (printf, 1, 2))) |
37 |
|
|
__attribute__((__nonnull__ (1))); |
38 |
|
|
static void warn(const char *fmt, ...) |
39 |
|
|
__attribute__((__format__ (printf, 1, 2))) |
40 |
|
|
__attribute__((__nonnull__ (1))); |
41 |
|
|
static void yyerror(char *s); |
42 |
|
|
static char * next_word(void); |
43 |
|
|
static int yylex(void); |
44 |
|
|
static u_int32_t valid_if(char *s); |
45 |
|
|
static const char * ifconfaddr(u_int32_t a); |
46 |
|
|
int yyparse(void); |
47 |
|
|
|
48 |
|
|
static FILE *f; |
49 |
|
|
|
50 |
|
|
extern int udp_socket; |
51 |
|
|
char *configfilename = _PATH_MROUTED_CONF; |
52 |
|
|
|
53 |
|
|
extern int cache_lifetime; |
54 |
|
|
extern int max_prune_lifetime; |
55 |
|
|
|
56 |
|
|
static int lineno; |
57 |
|
|
|
58 |
|
|
static struct uvif *v; |
59 |
|
|
|
60 |
|
|
static int order; |
61 |
|
|
|
62 |
|
|
struct addrmask { |
63 |
|
|
u_int32_t addr; |
64 |
|
|
int mask; |
65 |
|
|
}; |
66 |
|
|
|
67 |
|
|
struct boundnam { |
68 |
|
|
char *name; |
69 |
|
|
struct addrmask bound; |
70 |
|
|
}; |
71 |
|
|
|
72 |
|
|
#define MAXBOUNDS 20 |
73 |
|
|
|
74 |
|
|
struct boundnam boundlist[MAXBOUNDS]; /* Max. of 20 named boundaries */ |
75 |
|
|
int numbounds = 0; /* Number of named boundaries */ |
76 |
|
|
|
77 |
|
|
%} |
78 |
|
|
|
79 |
|
|
%union |
80 |
|
|
{ |
81 |
|
|
int num; |
82 |
|
|
char *ptr; |
83 |
|
|
struct addrmask addrmask; |
84 |
|
|
u_int32_t addr; |
85 |
|
|
}; |
86 |
|
|
|
87 |
|
|
%token CACHE_LIFETIME PRUNING |
88 |
|
|
%token PHYINT TUNNEL NAME |
89 |
|
|
%token DISABLE IGMPV1 SRCRT |
90 |
|
|
%token METRIC THRESHOLD RATE_LIMIT BOUNDARY NETMASK ALTNET |
91 |
|
|
%token <num> BOOLEAN |
92 |
|
|
%token <num> NUMBER |
93 |
|
|
%token <ptr> STRING |
94 |
|
|
%token <addrmask> ADDRMASK |
95 |
|
|
%token <addr> ADDR |
96 |
|
|
|
97 |
|
|
%type <addr> interface addrname |
98 |
|
|
%type <addrmask> bound boundary addrmask |
99 |
|
|
|
100 |
|
|
%start conf |
101 |
|
|
|
102 |
|
|
%% |
103 |
|
|
|
104 |
|
|
conf : stmts |
105 |
|
|
; |
106 |
|
|
|
107 |
|
|
stmts : /* Empty */ |
108 |
|
|
| stmts stmt |
109 |
|
|
; |
110 |
|
|
|
111 |
|
|
stmt : error |
112 |
|
|
| PHYINT interface { |
113 |
|
|
|
114 |
|
|
vifi_t vifi; |
115 |
|
|
|
116 |
|
|
if (order) |
117 |
|
|
fatal("phyints must appear before tunnels"); |
118 |
|
|
|
119 |
|
|
for (vifi = 0, v = uvifs; |
120 |
|
|
vifi < numvifs; |
121 |
|
|
++vifi, ++v) |
122 |
|
|
if (!(v->uv_flags & VIFF_TUNNEL) && |
123 |
|
|
$2 == v->uv_lcl_addr) |
124 |
|
|
break; |
125 |
|
|
|
126 |
|
|
if (vifi == numvifs) |
127 |
|
|
fatal("%s is not a configured interface", |
128 |
|
|
inet_fmt($2,s1)); |
129 |
|
|
|
130 |
|
|
} |
131 |
|
|
ifmods |
132 |
|
|
| TUNNEL interface addrname { |
133 |
|
|
const char *ifname; |
134 |
|
|
struct ifreq ffr; |
135 |
|
|
vifi_t vifi; |
136 |
|
|
|
137 |
|
|
order++; |
138 |
|
|
|
139 |
|
|
ifname = ifconfaddr($2); |
140 |
|
|
if (ifname == 0) |
141 |
|
|
fatal("Tunnel local address %s is not mine", |
142 |
|
|
inet_fmt($2, s1)); |
143 |
|
|
|
144 |
|
|
strlcpy(ffr.ifr_name, ifname, sizeof(ffr.ifr_name)); |
145 |
|
|
if (ioctl(udp_socket, SIOCGIFFLAGS, (char *)&ffr)<0) |
146 |
|
|
fatal("ioctl SIOCGIFFLAGS on %s",ffr.ifr_name); |
147 |
|
|
if (ffr.ifr_flags & IFF_LOOPBACK) |
148 |
|
|
fatal("Tunnel local address %s is a loopback interface", |
149 |
|
|
inet_fmt($2, s1)); |
150 |
|
|
|
151 |
|
|
if (ifconfaddr($3) != 0) |
152 |
|
|
fatal("Tunnel remote address %s is one of mine", |
153 |
|
|
inet_fmt($3, s1)); |
154 |
|
|
|
155 |
|
|
for (vifi = 0, v = uvifs; |
156 |
|
|
vifi < numvifs; |
157 |
|
|
++vifi, ++v) |
158 |
|
|
if (v->uv_flags & VIFF_TUNNEL) { |
159 |
|
|
if ($3 == v->uv_rmt_addr) |
160 |
|
|
fatal("Duplicate tunnel to %s", |
161 |
|
|
inet_fmt($3, s1)); |
162 |
|
|
} else if (!(v->uv_flags & VIFF_DISABLED)) { |
163 |
|
|
if (($3 & v->uv_subnetmask) == v->uv_subnet) |
164 |
|
|
fatal("Unnecessary tunnel to %s", |
165 |
|
|
inet_fmt($3,s1)); |
166 |
|
|
} |
167 |
|
|
|
168 |
|
|
if (numvifs == MAXVIFS) |
169 |
|
|
fatal("too many vifs"); |
170 |
|
|
|
171 |
|
|
v = &uvifs[numvifs]; |
172 |
|
|
v->uv_flags = VIFF_TUNNEL; |
173 |
|
|
v->uv_metric = DEFAULT_METRIC; |
174 |
|
|
v->uv_rate_limit= DEFAULT_TUN_RATE_LIMIT; |
175 |
|
|
v->uv_threshold = DEFAULT_THRESHOLD; |
176 |
|
|
v->uv_lcl_addr = $2; |
177 |
|
|
v->uv_rmt_addr = $3; |
178 |
|
|
v->uv_subnet = 0; |
179 |
|
|
v->uv_subnetmask= 0; |
180 |
|
|
v->uv_subnetbcast= 0; |
181 |
|
|
strncpy(v->uv_name, ffr.ifr_name, IFNAMSIZ); |
182 |
|
|
v->uv_groups = NULL; |
183 |
|
|
v->uv_neighbors = NULL; |
184 |
|
|
v->uv_acl = NULL; |
185 |
|
|
v->uv_addrs = NULL; |
186 |
|
|
|
187 |
|
|
if (!(ffr.ifr_flags & IFF_UP)) { |
188 |
|
|
v->uv_flags |= VIFF_DOWN; |
189 |
|
|
vifs_down = TRUE; |
190 |
|
|
} |
191 |
|
|
} |
192 |
|
|
tunnelmods |
193 |
|
|
{ |
194 |
|
|
logit(LOG_INFO, 0, |
195 |
|
|
"installing tunnel from %s to %s as vif #%u - rate=%d", |
196 |
|
|
inet_fmt($2, s1), inet_fmt($3, s2), |
197 |
|
|
numvifs, v->uv_rate_limit); |
198 |
|
|
|
199 |
|
|
++numvifs; |
200 |
|
|
} |
201 |
|
|
| PRUNING BOOLEAN { pruning = $2; } |
202 |
|
|
| CACHE_LIFETIME NUMBER { cache_lifetime = $2; |
203 |
|
|
max_prune_lifetime = cache_lifetime * 2; |
204 |
|
|
} |
205 |
|
|
| NAME STRING boundary { if (numbounds >= MAXBOUNDS) { |
206 |
|
|
fatal("Too many named boundaries (max %d)", MAXBOUNDS); |
207 |
|
|
} |
208 |
|
|
|
209 |
|
|
boundlist[numbounds].name = strdup($2); |
210 |
|
|
boundlist[numbounds++].bound = $3; |
211 |
|
|
} |
212 |
|
|
; |
213 |
|
|
|
214 |
|
|
tunnelmods : /* empty */ |
215 |
|
|
| tunnelmods tunnelmod |
216 |
|
|
; |
217 |
|
|
|
218 |
|
|
tunnelmod : mod |
219 |
|
|
| SRCRT { fatal("Source-route tunnels not supported"); } |
220 |
|
|
; |
221 |
|
|
|
222 |
|
|
ifmods : /* empty */ |
223 |
|
|
| ifmods ifmod |
224 |
|
|
; |
225 |
|
|
|
226 |
|
|
ifmod : mod |
227 |
|
|
| DISABLE { v->uv_flags |= VIFF_DISABLED; } |
228 |
|
|
| IGMPV1 { v->uv_flags |= VIFF_IGMPV1; } |
229 |
|
|
| NETMASK addrname { |
230 |
|
|
u_int32_t subnet, mask; |
231 |
|
|
|
232 |
|
|
mask = $2; |
233 |
|
|
subnet = v->uv_lcl_addr & mask; |
234 |
|
|
if (!inet_valid_subnet(subnet, mask)) |
235 |
|
|
fatal("Invalid netmask"); |
236 |
|
|
v->uv_subnet = subnet; |
237 |
|
|
v->uv_subnetmask = mask; |
238 |
|
|
v->uv_subnetbcast = subnet | ~mask; |
239 |
|
|
} |
240 |
|
|
| NETMASK { |
241 |
|
|
|
242 |
|
|
warn("Expected address after netmask keyword, ignored"); |
243 |
|
|
|
244 |
|
|
} |
245 |
|
|
| ALTNET addrmask { |
246 |
|
|
|
247 |
|
|
struct phaddr *ph; |
248 |
|
|
|
249 |
|
|
ph = malloc(sizeof(struct phaddr)); |
250 |
|
|
if (ph == NULL) |
251 |
|
|
fatal("out of memory"); |
252 |
|
|
if ($2.mask) { |
253 |
|
|
VAL_TO_MASK(ph->pa_subnetmask, $2.mask); |
254 |
|
|
} else |
255 |
|
|
ph->pa_subnetmask = v->uv_subnetmask; |
256 |
|
|
ph->pa_subnet = $2.addr & ph->pa_subnetmask; |
257 |
|
|
ph->pa_subnetbcast = ph->pa_subnet | ~ph->pa_subnetmask; |
258 |
|
|
if ($2.addr & ~ph->pa_subnetmask) |
259 |
|
|
warn("Extra subnet %s/%d has host bits set", |
260 |
|
|
inet_fmt($2.addr,s1), $2.mask); |
261 |
|
|
ph->pa_next = v->uv_addrs; |
262 |
|
|
v->uv_addrs = ph; |
263 |
|
|
|
264 |
|
|
} |
265 |
|
|
| ALTNET { |
266 |
|
|
|
267 |
|
|
warn("Expected address after altnet keyword, ignored"); |
268 |
|
|
|
269 |
|
|
} |
270 |
|
|
; |
271 |
|
|
|
272 |
|
|
mod : THRESHOLD NUMBER { if ($2 < 1 || $2 > 255) |
273 |
|
|
fatal("Invalid threshold %d",$2); |
274 |
|
|
v->uv_threshold = $2; |
275 |
|
|
} |
276 |
|
|
| THRESHOLD { |
277 |
|
|
|
278 |
|
|
warn("Expected number after threshold keyword, ignored"); |
279 |
|
|
|
280 |
|
|
} |
281 |
|
|
| METRIC NUMBER { if ($2 < 1 || $2 > UNREACHABLE) |
282 |
|
|
fatal("Invalid metric %d",$2); |
283 |
|
|
v->uv_metric = $2; |
284 |
|
|
} |
285 |
|
|
| METRIC { |
286 |
|
|
|
287 |
|
|
warn("Expected number after metric keyword, ignored"); |
288 |
|
|
|
289 |
|
|
} |
290 |
|
|
| RATE_LIMIT NUMBER { if ($2 > MAX_RATE_LIMIT) |
291 |
|
|
fatal("Invalid rate_limit %d",$2); |
292 |
|
|
v->uv_rate_limit = $2; |
293 |
|
|
} |
294 |
|
|
| RATE_LIMIT { |
295 |
|
|
|
296 |
|
|
warn("Expected number after rate_limit keyword, ignored"); |
297 |
|
|
|
298 |
|
|
} |
299 |
|
|
| BOUNDARY bound { |
300 |
|
|
|
301 |
|
|
struct vif_acl *v_acl; |
302 |
|
|
|
303 |
|
|
v_acl = malloc(sizeof(struct vif_acl)); |
304 |
|
|
if (v_acl == NULL) |
305 |
|
|
fatal("out of memory"); |
306 |
|
|
VAL_TO_MASK(v_acl->acl_mask, $2.mask); |
307 |
|
|
v_acl->acl_addr = $2.addr & v_acl->acl_mask; |
308 |
|
|
if ($2.addr & ~v_acl->acl_mask) |
309 |
|
|
warn("Boundary spec %s/%d has host bits set", |
310 |
|
|
inet_fmt($2.addr,s1),$2.mask); |
311 |
|
|
v_acl->acl_next = v->uv_acl; |
312 |
|
|
v->uv_acl = v_acl; |
313 |
|
|
|
314 |
|
|
} |
315 |
|
|
| BOUNDARY { |
316 |
|
|
|
317 |
|
|
warn("Expected boundary spec after boundary keyword, ignored"); |
318 |
|
|
|
319 |
|
|
} |
320 |
|
|
; |
321 |
|
|
|
322 |
|
|
interface : ADDR { $$ = $1; } |
323 |
|
|
| STRING { |
324 |
|
|
$$ = valid_if($1); |
325 |
|
|
if ($$ == 0) |
326 |
|
|
fatal("Invalid interface name %s",$1); |
327 |
|
|
} |
328 |
|
|
; |
329 |
|
|
|
330 |
|
|
addrname : ADDR { $$ = $1; } |
331 |
|
|
| STRING { struct hostent *hp; |
332 |
|
|
|
333 |
|
|
if ((hp = gethostbyname($1)) == NULL) |
334 |
|
|
fatal("No such host %s", $1); |
335 |
|
|
|
336 |
|
|
if (hp->h_addr_list[1]) |
337 |
|
|
fatal("Hostname %s does not %s", |
338 |
|
|
$1, "map to a unique address"); |
339 |
|
|
|
340 |
|
|
bcopy(hp->h_addr_list[0], &$$, |
341 |
|
|
hp->h_length); |
342 |
|
|
} |
343 |
|
|
|
344 |
|
|
bound : boundary { $$ = $1; } |
345 |
|
|
| STRING { int i; |
346 |
|
|
|
347 |
|
|
for (i=0; i < numbounds; i++) { |
348 |
|
|
if (!strcmp(boundlist[i].name, $1)) { |
349 |
|
|
$$ = boundlist[i].bound; |
350 |
|
|
break; |
351 |
|
|
} |
352 |
|
|
} |
353 |
|
|
if (i == numbounds) { |
354 |
|
|
fatal("Invalid boundary name %s",$1); |
355 |
|
|
} |
356 |
|
|
} |
357 |
|
|
; |
358 |
|
|
|
359 |
|
|
boundary : ADDRMASK { |
360 |
|
|
|
361 |
|
|
if ((ntohl($1.addr) & 0xff000000) != 0xef000000) { |
362 |
|
|
fatal("Boundaries must be 239.x.x.x, not %s/%d", |
363 |
|
|
inet_fmt($1.addr, s1), $1.mask); |
364 |
|
|
} |
365 |
|
|
$$ = $1; |
366 |
|
|
|
367 |
|
|
} |
368 |
|
|
; |
369 |
|
|
|
370 |
|
|
addrmask : ADDRMASK { $$ = $1; } |
371 |
|
|
| ADDR { $$.addr = $1; $$.mask = 0; } |
372 |
|
|
; |
373 |
|
|
%% |
374 |
|
|
static void |
375 |
|
|
fatal(const char *fmt, ...) |
376 |
|
|
{ |
377 |
|
|
va_list ap; |
378 |
|
|
char buf[200]; |
379 |
|
|
|
380 |
|
|
va_start(ap, fmt); |
381 |
|
|
vsnprintf(buf, sizeof buf, fmt, ap); |
382 |
|
|
va_end(ap); |
383 |
|
|
|
384 |
|
|
logit(LOG_ERR,0,"%s: %s near line %d", configfilename, buf, lineno); |
385 |
|
|
} |
386 |
|
|
|
387 |
|
|
static void |
388 |
|
|
warn(const char *fmt, ...) |
389 |
|
|
{ |
390 |
|
|
va_list ap; |
391 |
|
|
char buf[200]; |
392 |
|
|
|
393 |
|
|
va_start(ap, fmt); |
394 |
|
|
vsnprintf(buf, sizeof buf, fmt, ap); |
395 |
|
|
va_end(ap); |
396 |
|
|
|
397 |
|
|
logit(LOG_WARNING,0,"%s: %s near line %d", configfilename, buf, lineno); |
398 |
|
|
} |
399 |
|
|
|
400 |
|
|
static void |
401 |
|
|
yyerror(s) |
402 |
|
|
char *s; |
403 |
|
|
{ |
404 |
|
|
logit(LOG_ERR, 0, "%s: %s near line %d", configfilename, s, lineno); |
405 |
|
|
} |
406 |
|
|
|
407 |
|
|
static char * |
408 |
|
|
next_word() |
409 |
|
|
{ |
410 |
|
|
static char buf[1024]; |
411 |
|
|
static char *p=NULL; |
412 |
|
|
extern FILE *f; |
413 |
|
|
char *q; |
414 |
|
|
|
415 |
|
|
while (1) { |
416 |
|
|
if (!p || !*p) { |
417 |
|
|
lineno++; |
418 |
|
|
if (fgets(buf, sizeof(buf), f) == NULL) |
419 |
|
|
return NULL; |
420 |
|
|
p = buf; |
421 |
|
|
} |
422 |
|
|
while (*p && (*p == ' ' || *p == '\t')) /* skip whitespace */ |
423 |
|
|
p++; |
424 |
|
|
if (*p == '#') { |
425 |
|
|
p = NULL; /* skip comments */ |
426 |
|
|
continue; |
427 |
|
|
} |
428 |
|
|
q = p; |
429 |
|
|
while (*p && *p != ' ' && *p != '\t' && *p != '\n') |
430 |
|
|
p++; /* find next whitespace */ |
431 |
|
|
*p++ = '\0'; /* null-terminate string */ |
432 |
|
|
|
433 |
|
|
if (!*q) { |
434 |
|
|
p = NULL; |
435 |
|
|
continue; /* if 0-length string, read another line */ |
436 |
|
|
} |
437 |
|
|
|
438 |
|
|
return q; |
439 |
|
|
} |
440 |
|
|
} |
441 |
|
|
|
442 |
|
|
static int |
443 |
|
|
yylex() |
444 |
|
|
{ |
445 |
|
|
int n; |
446 |
|
|
u_int32_t addr; |
447 |
|
|
char *q; |
448 |
|
|
|
449 |
|
|
if ((q = next_word()) == NULL) { |
450 |
|
|
return 0; |
451 |
|
|
} |
452 |
|
|
|
453 |
|
|
if (!strcmp(q,"cache_lifetime")) |
454 |
|
|
return CACHE_LIFETIME; |
455 |
|
|
if (!strcmp(q,"pruning")) |
456 |
|
|
return PRUNING; |
457 |
|
|
if (!strcmp(q,"phyint")) |
458 |
|
|
return PHYINT; |
459 |
|
|
if (!strcmp(q,"tunnel")) |
460 |
|
|
return TUNNEL; |
461 |
|
|
if (!strcmp(q,"disable")) |
462 |
|
|
return DISABLE; |
463 |
|
|
if (!strcmp(q,"metric")) |
464 |
|
|
return METRIC; |
465 |
|
|
if (!strcmp(q,"threshold")) |
466 |
|
|
return THRESHOLD; |
467 |
|
|
if (!strcmp(q,"rate_limit")) |
468 |
|
|
return RATE_LIMIT; |
469 |
|
|
if (!strcmp(q,"srcrt") || !strcmp(q,"sourceroute")) |
470 |
|
|
return SRCRT; |
471 |
|
|
if (!strcmp(q,"boundary")) |
472 |
|
|
return BOUNDARY; |
473 |
|
|
if (!strcmp(q,"netmask")) |
474 |
|
|
return NETMASK; |
475 |
|
|
if (!strcmp(q,"igmpv1")) |
476 |
|
|
return IGMPV1; |
477 |
|
|
if (!strcmp(q,"altnet")) |
478 |
|
|
return ALTNET; |
479 |
|
|
if (!strcmp(q,"name")) |
480 |
|
|
return NAME; |
481 |
|
|
if (!strcmp(q,"on") || !strcmp(q,"yes")) { |
482 |
|
|
yylval.num = 1; |
483 |
|
|
return BOOLEAN; |
484 |
|
|
} |
485 |
|
|
if (!strcmp(q,"off") || !strcmp(q,"no")) { |
486 |
|
|
yylval.num = 0; |
487 |
|
|
return BOOLEAN; |
488 |
|
|
} |
489 |
|
|
if (sscanf(q,"%[.0-9]/%d%c",s1,&n,s2) == 2) { |
490 |
|
|
if ((addr = inet_parse(s1)) != 0xffffffff) { |
491 |
|
|
yylval.addrmask.mask = n; |
492 |
|
|
yylval.addrmask.addr = addr; |
493 |
|
|
return ADDRMASK; |
494 |
|
|
} |
495 |
|
|
/* fall through to returning STRING */ |
496 |
|
|
} |
497 |
|
|
if (sscanf(q,"%[.0-9]%c",s1,s2) == 1) { |
498 |
|
|
if ((addr = inet_parse(s1)) != 0xffffffff && |
499 |
|
|
inet_valid_host(addr)) { |
500 |
|
|
yylval.addr = addr; |
501 |
|
|
return ADDR; |
502 |
|
|
} |
503 |
|
|
} |
504 |
|
|
if (sscanf(q,"0x%8x%c",&n,s1) == 1) { |
505 |
|
|
yylval.addr = n; |
506 |
|
|
return ADDR; |
507 |
|
|
} |
508 |
|
|
if (sscanf(q,"%d%c",&n,s1) == 1) { |
509 |
|
|
yylval.num = n; |
510 |
|
|
return NUMBER; |
511 |
|
|
} |
512 |
|
|
yylval.ptr = q; |
513 |
|
|
return STRING; |
514 |
|
|
} |
515 |
|
|
|
516 |
|
|
void |
517 |
|
|
config_vifs_from_file() |
518 |
|
|
{ |
519 |
|
|
extern FILE *f; |
520 |
|
|
|
521 |
|
|
order = 0; |
522 |
|
|
numbounds = 0; |
523 |
|
|
lineno = 0; |
524 |
|
|
|
525 |
|
|
if ((f = fopen(configfilename, "r")) == NULL) { |
526 |
|
|
if (errno != ENOENT) |
527 |
|
|
logit(LOG_ERR, errno, "can't open %s", configfilename); |
528 |
|
|
return; |
529 |
|
|
} |
530 |
|
|
|
531 |
|
|
yyparse(); |
532 |
|
|
|
533 |
|
|
fclose(f); |
534 |
|
|
} |
535 |
|
|
|
536 |
|
|
static u_int32_t |
537 |
|
|
valid_if(s) |
538 |
|
|
char *s; |
539 |
|
|
{ |
540 |
|
|
register vifi_t vifi; |
541 |
|
|
register struct uvif *v; |
542 |
|
|
|
543 |
|
|
for (vifi=0, v=uvifs; vifi<numvifs; vifi++, v++) |
544 |
|
|
if (!strcmp(v->uv_name, s)) |
545 |
|
|
return v->uv_lcl_addr; |
546 |
|
|
|
547 |
|
|
return 0; |
548 |
|
|
} |
549 |
|
|
|
550 |
|
|
static const char * |
551 |
|
|
ifconfaddr(a) |
552 |
|
|
u_int32_t a; |
553 |
|
|
{ |
554 |
|
|
static char ifname[IFNAMSIZ]; |
555 |
|
|
struct ifaddrs *ifap, *ifa; |
556 |
|
|
|
557 |
|
|
if (getifaddrs(&ifap) != 0) |
558 |
|
|
return (NULL); |
559 |
|
|
|
560 |
|
|
for (ifa = ifap; ifa; ifa = ifa->ifa_next) { |
561 |
|
|
if (ifa->ifa_addr->sa_family == AF_INET && |
562 |
|
|
((struct sockaddr_in *)ifa->ifa_addr)->sin_addr.s_addr == a) { |
563 |
|
|
strlcpy(ifname, ifa->ifa_name, sizeof(ifname)); |
564 |
|
|
freeifaddrs(ifap); |
565 |
|
|
return (ifname); |
566 |
|
|
} |
567 |
|
|
} |
568 |
|
|
freeifaddrs(ifap); |
569 |
|
|
return (0); |
570 |
|
|
} |