4 # secnet - pubkeys.fl.pl
6 # This file is part of secnet.
7 # See README for full list of copyright holders.
9 # secnet is free software; you can redistribute it and/or modify it
10 # under the terms of the GNU General Public License as published by
11 # the Free Software Foundation; either version 3 of the License, or
12 # (at your option) any later version.
14 # secnet is distributed in the hope that it will be useful, but
15 # WITHOUT ANY WARRANTY; without even the implied warranty of
16 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 # General Public License for more details.
19 # You should have received a copy of the GNU General Public License
20 # version 3 along with secnet; if not, see
21 # https://www.gnu.org/licenses/gpl.html.
23 # We process __DATA__ of this file first through the perl code,
24 # and then through flex. We do it like this because directives
25 # with positional arguments are otherwise rather tedious to specify
26 # in flex. Of course we could have used bison too but this seems
39 our %subst = (GRPIDSZ => 4, SERIALSZ => 4);
43 my ($always, $delta) = @_;
46 if ($always || $. != $last_lno+1) {
47 $o .= sprintf "#line %d \"%s\"\n", $delta+$data_off+$., $0;
55 if (m/^!SUBSTCHECKS\s*$/) {
56 foreach (keys %subst) {
59 # error $_ value disagrees between pubkeys.fl.pl and C headers
75 s#\{!2(\w+)\}# '{'.(2 * ($subst{$1}//die "$1 ?")).'}' #ge;
76 if (m/^!KEYWORD ([-0-9a-z]+)$/) {
79 $kwid = $kw; $kwid =~ y/-/_/;
81 $co .= "{L}$kw { BEGIN($in_s); }\n";
84 if (m/^!ARG (\w+) (\S.*\S) \{\s*$/) {
87 $co .= inst("$in_s")."{S} { BEGIN(D_${kwid}_$1); }\n";
88 $co .= inst("D_${kwid}_$1")."$2 {\n";
89 $in_s = "HA_${kwid}_$1";
90 $co .= "\tBEGIN($in_s);\n";
102 if (m/^!FINAL \{\s*$/) {
105 $co .= inst("FIN_$kwid")."\\n { BEGIN(0); c->lno++; }\n";
106 $co .= inst("$in_s")."{L}/\\n {\n";
107 $co .= "\tBEGIN(FIN_$kwid);\n";
121 print $do, "%%\n", $co or die $!;
123 BEGIN { $data_off = __LINE__ + 1; }
128 BASE91S []-~!#-&(-[]+
136 %option never-interactive
138 %option prefix="pkyy"
147 #include "unaligned.h"
148 #include "base91s/base91.h"
152 struct pubkeyset_context {
153 /* filled in during setup: */
155 struct buffer_if *data_buf;
156 struct peer_keyset *building;
160 const struct sigscheme_info *scheme;
161 uint8_t grpid[GRPIDSZ];
165 static struct pubkeyset_context c[1];
168 #define HEX2BIN(v,l) ({ \
170 bool_t ok=hex_decode((v), ((l)), &outlen, yytext, False); \
172 assert(outlen==((l))); \
174 #define HEX2BIN_ARRAY(v) HEX2BIN((v),sizeof((v)))
179 #define DOSKIP(m) ({ \
180 slilog(LI,M_INFO,"l.%d: " m, c->lno); \
183 #define FAIL(m) do{ \
184 slilog(LI,M_ERR,"l.%d: " m, c->lno); \
193 !ARG id [0-9a-f]{!2GRPIDSZ} {
194 HEX2BIN_ARRAY(c->grpid);
199 !ARG algo [-0-9a-z]+ {
200 c->scheme = sigscheme_lookup(yytext);
201 if (!c->scheme) DOSKIP("unknown pk algorithm");
203 !ARG data {BASE91S} {
204 /* baseE91 and thus base91s can sometimes store 14 bits per
205 * character pair, so the max decode ratio is 14/16. */
206 size_t maxl = base91s_decode_maxlen(yyleng);
207 buffer_init(c->data_buf,0);
208 if (buf_remaining_space(c->data_buf) < maxl) DOSKIP("pk data too long");
211 size_t l = base91s_decode(&b91, yytext, yyleng, c->data_buf->start);
212 l += base91s_decode_end(&b91, c->data_buf->start + l);
214 buf_append(c->data_buf,l);
217 if (c->building->nkeys >= MAX_SIG_KEYS) DOSKIP("too many public keys");
218 struct sigpubkey_if *pubkey;
219 bool_t ok=c->scheme->loadpub(c->scheme,c->data_buf,
222 memcpy(c->building->keys[c->building->nkeys].id.b,
225 assert(ALGIDSZ==1); /* otherwise need htons or htonl or something */
226 c->building->keys[c->building->nkeys].id.b[GRPIDSZ]=
228 c->building->keys[c->building->nkeys++].pubkey=pubkey;
232 !ARG id [0-9a-f]{!2SERIALSZ} {
233 if (c->had_serial) FAIL("`serial' repeated");
235 uint8_t sb[SERIALSZ];
237 c->serial=get_uint32(sb);
243 DOSKIP("unknown directive");
258 <INITIAL><<EOF>> { return 0; }
260 <*>. { FAIL("syntax error"); }
261 <*>\n { FAIL("syntax error - unexpected newline"); }
262 <<EOF>> { FAIL("syntax error - unexpected eof"); }
266 extern struct peer_keyset *
267 keyset_load(const char *path, struct buffer_if *data_buf,
268 struct log_if *log, int logcl_enoent) {
269 assert(!c->building);
271 pkyyin = fopen(path, "r");
274 errno==ENOENT ? logcl_enoent : M_ERR,
275 "could not open keyset file %s: %s",
276 path,strerror(errno));
282 c->data_buf=data_buf;
284 c->building->nkeys=0;
285 c->building->refcount=1;
293 if (!c->had_serial) {
294 slilog(LI,M_ERR,"missing serial number in %s",path);
297 if (!c->building->nkeys) {
298 slilog(LI,M_ERR,"no useable keys in %s",path);
302 struct peer_keyset *built=c->building;
309 if (c->building) { free(c->building); c->building=0; }
310 if (pkyyin) { fclose(pkyyin); pkyyin=0; }