4 # secnet - pubkeys.fl.pl
6 # This file is part of secnet.
7 # See README for full list of copyright holders.
9 # secnet is free software; you can redistribute it and/or modify it
10 # under the terms of the GNU General Public License as published by
11 # the Free Software Foundation; either version 3 of the License, or
12 # (at your option) any later version.
14 # secnet is distributed in the hope that it will be useful, but
15 # WITHOUT ANY WARRANTY; without even the implied warranty of
16 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 # General Public License for more details.
19 # You should have received a copy of the GNU General Public License
20 # version 3 along with secnet; if not, see
21 # https://www.gnu.org/licenses/gpl.html.
23 # We process __DATA__ of this file first through the perl code,
24 # and then through flex. We do it like this because directives
25 # with positional arguments are otherwise rather tedious to specify
26 # in flex. Of course we could have used bison too but this seems
39 our %subst = (GRPIDSZ => 4, SERIALSZ => 4);
43 my ($always, $delta) = @_;
46 if ($always || $. != $last_lno+1) {
47 $o .= sprintf "#line %d \"%s\"\n", $delta+$data_off+$., $0;
55 if (m/^!SUBSTCHECKS\s*$/) {
56 foreach (keys %subst) {
59 # error $_ value disagrees between pubkeys.fl.pl and C headers
75 s#\{!2(\w+)\}# '{'.(2 * ($subst{$1}//die "$1 ?")).'}' #ge;
76 if (m/^!KEYWORD ([-0-9a-z]+)(\s*\{.*\})?$/) {
81 $kwid = $kw; $kwid =~ y/-/_/;
83 $co .= "{L}$kwt { BEGIN($in_s); $xact }\n";
86 if (m/^!ARG (\w+) (\S.*\S) \{\s*$/) {
89 $co .= inst("$in_s")."{S} { BEGIN(D_${kwid}_$1); }\n";
90 $co .= inst("D_${kwid}_$1")."$2 {\n";
91 $in_s = "HA_${kwid}_$1";
92 $co .= "\tBEGIN($in_s);\n";
101 $kw = shift @next_kw;
104 if (m/^!FINAL \{\s*$/) {
107 $co .= inst("FIN_$kwid")."\\n { BEGIN(0); c->lno++; }\n";
108 $co .= inst("$in_s")."{L}/\\n {\n";
109 $co .= "\tBEGIN(FIN_$kwid);\n";
123 print $do, "%%\n", $co or die $!;
125 BEGIN { $data_off = __LINE__ + 1; }
130 BASE91S []-~!#-&(-[]+
138 %option never-interactive
140 %option prefix="pkyy"
149 #include "unaligned.h"
150 #include "base91s/base91.h"
154 struct pubkeyset_context {
155 /* filled in during setup: */
157 struct buffer_if *data_buf;
158 struct peer_keyset *building;
162 bool_t fallback_skip;
163 const struct sigscheme_info *scheme;
164 uint8_t grpid[GRPIDSZ];
168 static struct pubkeyset_context c[1];
171 #define HEX2BIN(v,l) ({ \
173 bool_t ok=hex_decode((v), ((l)), &outlen, yytext, False); \
175 assert(outlen==((l))); \
177 #define HEX2BIN_ARRAY(v) HEX2BIN((v),sizeof((v)))
182 #define DOSKIP(m) ({ \
183 slilog(LI,M_INFO,"l.%d: " m, c->lno); \
186 #define FAIL(m) do{ \
187 slilog(LI,M_ERR,"l.%d: " m, c->lno); \
195 !KEYWORD pkg { c->fallback_skip=0; }
196 !ARG id [0-9a-f]{!2GRPIDSZ} {
197 HEX2BIN_ARRAY(c->grpid);
202 !ARG algo [-0-9a-z]+ {
203 if (c->fallback_skip) DOSKIP("fallback not needed");
204 c->scheme = sigscheme_lookup(yytext);
205 if (!c->scheme) DOSKIP("unknown pk algorithm");
207 !ARG data {BASE91S} {
208 /* baseE91 and thus base91s can sometimes store 14 bits per
209 * character pair, so the max decode ratio is 14/16. */
210 size_t maxl = base91s_decode_maxlen(yyleng);
211 buffer_init(c->data_buf,0);
212 if (buf_remaining_space(c->data_buf) < maxl) DOSKIP("pk data too long");
215 size_t l = base91s_decode(&b91, yytext, yyleng, c->data_buf->start);
216 l += base91s_decode_end(&b91, c->data_buf->start + l);
218 buf_append(c->data_buf,l);
221 if (c->building->nkeys >= MAX_SIG_KEYS) DOSKIP("too many public keys");
222 struct sigpubkey_if *pubkey;
223 bool_t ok=c->scheme->loadpub(c->scheme,c->data_buf,
226 memcpy(c->building->keys[c->building->nkeys].id.b,
229 assert(ALGIDSZ==1); /* otherwise need htons or htonl or something */
230 c->building->keys[c->building->nkeys].id.b[GRPIDSZ]=
232 c->building->keys[c->building->nkeys++].pubkey=pubkey;
236 !ARG id [0-9a-f]{!2SERIALSZ} {
237 if (c->had_serial) FAIL("`serial' repeated");
239 uint8_t sb[SERIALSZ];
241 c->serial=get_uint32(sb);
247 DOSKIP("unknown directive");
262 <INITIAL><<EOF>> { return 0; }
264 <*>. { FAIL("syntax error"); }
265 <*>\n { FAIL("syntax error - unexpected newline"); }
266 <<EOF>> { FAIL("syntax error - unexpected eof"); }
270 extern struct peer_keyset *
271 keyset_load(const char *path, struct buffer_if *data_buf,
272 struct log_if *log, int logcl_enoent) {
273 assert(!c->building);
275 pkyyin = fopen(path, "r");
278 errno==ENOENT ? logcl_enoent : M_ERR,
279 "could not open keyset file %s: %s",
280 path,strerror(errno));
286 c->data_buf=data_buf;
288 c->building->nkeys=0;
289 c->building->refcount=1;
298 if (!c->had_serial) {
299 slilog(LI,M_ERR,"missing serial number in %s",path);
302 if (!c->building->nkeys) {
303 slilog(LI,M_ERR,"no useable keys in %s",path);
307 struct peer_keyset *built=c->building;
314 if (c->building) { free(c->building); c->building=0; }
315 if (pkyyin) { fclose(pkyyin); pkyyin=0; }