root/usr.sbin/ldapd/parse.y
/*      $OpenBSD: parse.y,v 1.43 2021/10/15 15:01:28 naddy Exp $ */

/*
 * Copyright (c) 2009, 2010 Martin Hedenfalk <martinh@openbsd.org>
 * Copyright (c) 2008 Gilles Chehade <gilles@openbsd.org>
 * Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org>
 * Copyright (c) 2001 Markus Friedl.  All rights reserved.
 * Copyright (c) 2001 Daniel Hartmeier.  All rights reserved.
 * Copyright (c) 2001 Theo de Raadt.  All rights reserved.
 *
 * Permission to use, copy, modify, and distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

%{
#include <sys/types.h>
#include <sys/queue.h>
#include <sys/tree.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/un.h>
#include <netinet/in.h>
#include <arpa/inet.h>

#include <ctype.h>
#include <err.h>
#include <errno.h>
#include <ifaddrs.h>
#include <limits.h>
#include <netdb.h>
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <unistd.h>

#include "ldapd.h"
#include "log.h"

TAILQ_HEAD(files, file)          files = TAILQ_HEAD_INITIALIZER(files);
static struct file {
        TAILQ_ENTRY(file)        entry;
        FILE                    *stream;
        char                    *name;
        size_t                   ungetpos;
        size_t                   ungetsize;
        u_char                  *ungetbuf;
        int                      eof_reached;
        int                      lineno;
        int                      errors;
} *file, *topfile;
struct file     *pushfile(const char *, int);
int              popfile(void);
int              check_file_secrecy(int, const char *);
int              yyparse(void);
int              yylex(void);
int              yyerror(const char *, ...)
    __attribute__((__format__ (printf, 1, 2)))
    __attribute__((__nonnull__ (1)));
int              kw_cmp(const void *, const void *);
int              lookup(char *);
int              igetc(void);
int              lgetc(int);
void             lungetc(int);
int              findeol(void);

struct listener *host_unix(const char *path);
struct listener *host_v4(const char *, in_port_t);
struct listener *host_v6(const char *, in_port_t);
int              host_dns(const char *, const char *,
                    struct listenerlist *, in_port_t, u_int8_t);
int              host(const char *, const char *,
                    struct listenerlist *, in_port_t, u_int8_t);
int              interface(const char *, const char *,
                    struct listenerlist *, in_port_t, u_int8_t);
int              load_certfile(struct ldapd_config *, const char *, u_int8_t, u_int8_t);

TAILQ_HEAD(symhead, sym)         symhead = TAILQ_HEAD_INITIALIZER(symhead);
struct sym {
        TAILQ_ENTRY(sym)         entry;
        int                      used;
        int                      persist;
        char                    *nam;
        char                    *val;
};
int              symset(const char *, const char *, int);
char            *symget(const char *);

struct ldapd_config     *conf;

SPLAY_GENERATE(ssltree, ssl, ssl_nodes, ssl_cmp);

static struct aci       *mk_aci(int type, int rights, enum scope scope,
                                char *target, char *subject, char *attr);

typedef struct {
        union {
                int64_t          number;
                char            *string;
                struct aci      *aci;
        } v;
        int lineno;
} YYSTYPE;

static struct namespace *current_ns = NULL;

%}

%token  ERROR LISTEN ON LEGACY TLS LDAPS PORT NAMESPACE ROOTDN ROOTPW INDEX
%token  SECURE RELAX STRICT SCHEMA USE COMPRESSION LEVEL
%token  INCLUDE CERTIFICATE FSYNC CACHE_SIZE INDEX_CACHE_SIZE
%token  DENY ALLOW READ WRITE BIND ACCESS TO ROOT REFERRAL
%token  ANY CHILDREN OF ATTRIBUTE IN SUBTREE BY SELF
%token  <v.string>      STRING
%token  <v.number>      NUMBER
%type   <v.number>      port ssl boolean comp_level legacy protocol
%type   <v.number>      aci_type aci_access aci_rights aci_right aci_scope
%type   <v.string>      aci_target aci_attr aci_subject certname
%type   <v.aci>         aci

%%

grammar         : /* empty */
                | grammar '\n'
                | grammar include '\n'
                | grammar varset '\n'
                | grammar conf_main '\n'
                | grammar error '\n'            { file->errors++; }
                | grammar namespace '\n'
                | grammar aci '\n'              {
                        SIMPLEQ_INSERT_TAIL(&conf->acl, $2, entry);
                }
                | grammar schema '\n'
                ;

legacy          : /* empty */                   { $$ = 0; }
                | LEGACY                        { $$ = F_LEGACY; }
                ;

protocol        : /* empty */                   { $$ = 0; }
                | TLS                           { $$ = F_STARTTLS; }
                | LDAPS                         { $$ = F_LDAPS; }
                | SECURE                        { $$ = F_SECURE; }
                ;

ssl             : legacy protocol               { $$ = $1 | $2; }
                ;

certname        : /* empty */                   { $$ = NULL; }
                | CERTIFICATE STRING            { $$ = $2; }
                ;

port            : PORT STRING                   {
                        struct servent  *servent;

                        servent = getservbyname($2, "tcp");
                        if (servent == NULL) {
                                yyerror("port %s is invalid", $2);
                                free($2);
                                YYERROR;
                        }
                        $$ = servent->s_port;
                        free($2);
                }
                | PORT NUMBER                   {
                        if ($2 <= 0 || $2 > (int)USHRT_MAX) {
                                yyerror("invalid port: %lld", $2);
                                YYERROR;
                        }
                        $$ = htons($2);
                }
                | /* empty */                   {
                        $$ = 0;
                }
                ;

conf_main       : LISTEN ON STRING port ssl certname    {
                        char                    *cert;

                        if ($4 == 0) {
                                if ($5 & F_LDAPS)
                                        $4 = htons(LDAPS_PORT);
                                else
                                        $4 = htons(LDAP_PORT);
                        }

                        cert = ($6 != NULL) ? $6 : $3;

                        if (($5 & F_SSL) &&
                            load_certfile(conf, cert, F_SCERT, $5) < 0) {
                                yyerror("cannot load certificate: %s", cert);
                                free($6);
                                free($3);
                                YYERROR;
                        }

                        if (! interface($3, cert, &conf->listeners,
                            $4, $5)) {
                                if (host($3, cert, &conf->listeners,
                                    $4, $5) != 1) {
                                        yyerror("invalid virtual ip or interface: %s", $3);
                                        free($6);
                                        free($3);
                                        YYERROR;
                                }
                        }
                        free($6);
                        free($3);
                }
                | REFERRAL STRING               {
                        struct referral *ref;
                        if ((ref = calloc(1, sizeof(*ref))) == NULL) {
                                yyerror("calloc");
                                free($2);
                                YYERROR;
                        }
                        ref->url = $2;
                        SLIST_INSERT_HEAD(&conf->referrals, ref, next);
                }
                | ROOTDN STRING                 {
                        conf->rootdn = $2;
                        normalize_dn(conf->rootdn);
                }
                | ROOTPW STRING                 { conf->rootpw = $2; }
                ;

namespace       : NAMESPACE STRING '{' '\n'             {
                        log_debug("parsing namespace %s", $2);
                        current_ns = namespace_new($2);
                        free($2);
                        TAILQ_INSERT_TAIL(&conf->namespaces, current_ns, next);
                } ns_opts '}'                   { current_ns = NULL; }
                ;

boolean         : STRING                        {
                        if (strcasecmp($1, "true") == 0 ||
                            strcasecmp($1, "yes") == 0)
                                $$ = 1;
                        else if (strcasecmp($1, "false") == 0 ||
                            strcasecmp($1, "off") == 0 ||
                            strcasecmp($1, "no") == 0)
                                $$ = 0;
                        else {
                                yyerror("invalid boolean value '%s'", $1);
                                free($1);
                                YYERROR;
                        }
                        free($1);
                }
                | ON                            { $$ = 1; }
                ;

ns_opts         : /* empty */
                | ns_opts '\n'
                | ns_opts ns_opt '\n'
                ;

ns_opt          : ROOTDN STRING                 {
                        current_ns->rootdn = $2;
                        normalize_dn(current_ns->rootdn);
                }
                | ROOTPW STRING                 { current_ns->rootpw = $2; }
                | INDEX STRING                  {
                        struct attr_index       *ai;
                        if ((ai = calloc(1, sizeof(*ai))) == NULL) {
                                yyerror("calloc");
                                free($2);
                                YYERROR;
                        }
                        ai->attr = $2;
                        ai->type = INDEX_EQUAL;
                        TAILQ_INSERT_TAIL(&current_ns->indices, ai, next);
                }
                | CACHE_SIZE NUMBER             { current_ns->cache_size = $2; }
                | INDEX_CACHE_SIZE NUMBER       { current_ns->index_cache_size = $2; }
                | FSYNC boolean                 { current_ns->sync = $2; }
                | aci                           {
                        SIMPLEQ_INSERT_TAIL(&current_ns->acl, $1, entry);
                }
                | RELAX SCHEMA                  { current_ns->relax = 1; }
                | STRICT SCHEMA                 { current_ns->relax = 0; }
                | USE COMPRESSION comp_level    { current_ns->compression_level = $3; }
                | REFERRAL STRING               {
                        struct referral *ref;
                        if ((ref = calloc(1, sizeof(*ref))) == NULL) {
                                yyerror("calloc");
                                free($2);
                                YYERROR;
                        }
                        ref->url = $2;
                        SLIST_INSERT_HEAD(&current_ns->referrals, ref, next);
                }
                ;

comp_level      : /* empty */                   { $$ = 6; }
                | LEVEL NUMBER                  { $$ = $2; }
                ;

aci             : aci_type aci_access TO aci_scope aci_target aci_attr aci_subject {
                        if (($$ = mk_aci($1, $2, $4, $5, $6, $7)) == NULL) {
                                free($5);
                                free($6);
                                YYERROR;
                        }
                }
                | aci_type aci_access {
                        if (($$ = mk_aci($1, $2, LDAP_SCOPE_SUBTREE, NULL,
                            NULL, NULL)) == NULL) {
                                YYERROR;
                        }
                }
                ;

aci_type        : DENY                          { $$ = ACI_DENY; }
                | ALLOW                         { $$ = ACI_ALLOW; }
                ;

aci_access      : /* empty */                   { $$ = ACI_ALL; }
                | ACCESS                        { $$ = ACI_ALL; }
                | aci_rights ACCESS             { $$ = $1; }
                ;

aci_rights      : aci_right                     { $$ = $1; }
                | aci_rights ',' aci_right      { $$ = $1 | $3; }
                ;

aci_right       : READ                          { $$ = ACI_READ; }
                | WRITE                         { $$ = ACI_WRITE; }
                | BIND                          { $$ = ACI_BIND; }
                ;


aci_scope       : /* empty */                   { $$ = LDAP_SCOPE_BASE; }
                | SUBTREE                       { $$ = LDAP_SCOPE_SUBTREE; }
                | CHILDREN OF                   { $$ = LDAP_SCOPE_ONELEVEL; }
                ;

aci_target      : ANY                           { $$ = NULL; }
                | ROOT                          { $$ = strdup(""); }
                | STRING                        { $$ = $1; normalize_dn($$); }
                ;

aci_attr        : /* empty */                   { $$ = NULL; }
                | ATTRIBUTE STRING              { $$ = $2; }
                ;

aci_subject     : /* empty */                   { $$ = NULL; }
                | BY ANY                        { $$ = NULL; }
                | BY STRING                     { $$ = $2; normalize_dn($$); }
                | BY SELF                       { $$ = strdup("@"); }
                ;

include         : INCLUDE STRING                {
                        struct file     *nfile;

                        if ((nfile = pushfile($2, 1)) == NULL) {
                                yyerror("failed to include file %s", $2);
                                free($2);
                                YYERROR;
                        }
                        free($2);

                        file = nfile;
                        lungetc('\n');
                }
                ;

varset          : STRING '=' STRING             {
                        char *s = $1;
                        while (*s++) {
                                if (isspace((unsigned char)*s)) {
                                        yyerror("macro name cannot contain "
                                            "whitespace");
                                        free($1);
                                        free($3);
                                        YYERROR;
                                }
                        }
                        if (symset($1, $3, 0) == -1)
                                fatal("cannot store variable");
                        free($1);
                        free($3);
                }
                ;

schema          : SCHEMA STRING                 {
                        int      ret;

                        ret = schema_parse(conf->schema, $2);
                        free($2);
                        if (ret != 0) {
                                YYERROR;
                        }
                }
                ;

%%

struct keywords {
        const char      *k_name;
        int              k_val;
};

int
yyerror(const char *fmt, ...)
{
        va_list          ap;
        char            *msg;

        file->errors++;
        va_start(ap, fmt);
        if (vasprintf(&msg, fmt, ap) == -1)
                fatalx("yyerror vasprintf");
        va_end(ap);
        logit(LOG_CRIT, "%s:%d: %s", file->name, yylval.lineno, msg);
        free(msg);
        return (0);
}

int
kw_cmp(const void *k, const void *e)
{
        return (strcmp(k, ((const struct keywords *)e)->k_name));
}

int
lookup(char *s)
{
        /* this has to be sorted always */
        static const struct keywords keywords[] = {
                { "access",             ACCESS },
                { "allow",              ALLOW },
                { "any",                ANY },
                { "attribute",          ATTRIBUTE },
                { "bind",               BIND },
                { "by",                 BY },
                { "cache-size",         CACHE_SIZE },
                { "certificate",        CERTIFICATE },
                { "children",           CHILDREN },
                { "compression",        COMPRESSION },
                { "deny",               DENY },
                { "fsync",              FSYNC },
                { "in",                 IN },
                { "include",            INCLUDE },
                { "index",              INDEX },
                { "index-cache-size",   INDEX_CACHE_SIZE },
                { "ldaps",              LDAPS },
                { "legacy",             LEGACY },
                { "level",              LEVEL },
                { "listen",             LISTEN },
                { "namespace",          NAMESPACE },
                { "of",                 OF },
                { "on",                 ON },
                { "port",               PORT },
                { "read",               READ },
                { "referral",           REFERRAL },
                { "relax",              RELAX },
                { "root",               ROOT },
                { "rootdn",             ROOTDN },
                { "rootpw",             ROOTPW },
                { "schema",             SCHEMA },
                { "secure",             SECURE },
                { "self",               SELF },
                { "strict",             STRICT },
                { "subtree",            SUBTREE },
                { "tls",                TLS },
                { "to",                 TO },
                { "use",                USE },
                { "write",              WRITE },

        };
        const struct keywords   *p;

        p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]),
            sizeof(keywords[0]), kw_cmp);

        if (p)
                return (p->k_val);
        else
                return (STRING);
}

#define START_EXPAND    1
#define DONE_EXPAND     2

static int      expanding;

int
igetc(void)
{
        int     c;

        while (1) {
                if (file->ungetpos > 0)
                        c = file->ungetbuf[--file->ungetpos];
                else
                        c = getc(file->stream);

                if (c == START_EXPAND)
                        expanding = 1;
                else if (c == DONE_EXPAND)
                        expanding = 0;
                else
                        break;
        }
        return (c);
}

int
lgetc(int quotec)
{
        int             c, next;

        if (quotec) {
                if ((c = igetc()) == EOF) {
                        yyerror("reached end of file while parsing "
                            "quoted string");
                        if (file == topfile || popfile() == EOF)
                                return (EOF);
                        return (quotec);
                }
                return (c);
        }

        while ((c = igetc()) == '\\') {
                next = igetc();
                if (next != '\n') {
                        c = next;
                        break;
                }
                yylval.lineno = file->lineno;
                file->lineno++;
        }

        if (c == EOF) {
                /*
                 * Fake EOL when hit EOF for the first time. This gets line
                 * count right if last line in included file is syntactically
                 * invalid and has no newline.
                 */
                if (file->eof_reached == 0) {
                        file->eof_reached = 1;
                        return ('\n');
                }
                while (c == EOF) {
                        if (file == topfile || popfile() == EOF)
                                return (EOF);
                        c = igetc();
                }
        }
        return (c);
}

void
lungetc(int c)
{
        if (c == EOF)
                return;

        if (file->ungetpos >= file->ungetsize) {
                void *p = reallocarray(file->ungetbuf, file->ungetsize, 2);
                if (p == NULL)
                        err(1, "%s", __func__);
                file->ungetbuf = p;
                file->ungetsize *= 2;
        }
        file->ungetbuf[file->ungetpos++] = c;
}

int
findeol(void)
{
        int     c;

        /* skip to either EOF or the first real EOL */
        while (1) {
                c = lgetc(0);
                if (c == '\n') {
                        file->lineno++;
                        break;
                }
                if (c == EOF)
                        break;
        }
        return (ERROR);
}

int
yylex(void)
{
        char     buf[4096];
        char    *p, *val;
        int      quotec, next, c;
        int      token;

top:
        p = buf;
        while ((c = lgetc(0)) == ' ' || c == '\t')
                ; /* nothing */

        yylval.lineno = file->lineno;
        if (c == '#')
                while ((c = lgetc(0)) != '\n' && c != EOF)
                        ; /* nothing */
        if (c == '$' && !expanding) {
                while (1) {
                        if ((c = lgetc(0)) == EOF)
                                return (0);

                        if (p + 1 >= buf + sizeof(buf) - 1) {
                                yyerror("string too long");
                                return (findeol());
                        }
                        if (isalnum(c) || c == '_') {
                                *p++ = c;
                                continue;
                        }
                        *p = '\0';
                        lungetc(c);
                        break;
                }
                val = symget(buf);
                if (val == NULL) {
                        yyerror("macro '%s' not defined", buf);
                        return (findeol());
                }
                p = val + strlen(val) - 1;
                lungetc(DONE_EXPAND);
                while (p >= val) {
                        lungetc((unsigned char)*p);
                        p--;
                }
                lungetc(START_EXPAND);
                goto top;
        }

        switch (c) {
        case '\'':
        case '"':
                quotec = c;
                while (1) {
                        if ((c = lgetc(quotec)) == EOF)
                                return (0);
                        if (c == '\n') {
                                file->lineno++;
                                continue;
                        } else if (c == '\\') {
                                if ((next = lgetc(quotec)) == EOF)
                                        return (0);
                                if (next == quotec || next == ' ' ||
                                    next == '\t')
                                        c = next;
                                else if (next == '\n') {
                                        file->lineno++;
                                        continue;
                                } else
                                        lungetc(next);
                        } else if (c == quotec) {
                                *p = '\0';
                                break;
                        } else if (c == '\0') {
                                yyerror("syntax error");
                                return (findeol());
                        }
                        if (p + 1 >= buf + sizeof(buf) - 1) {
                                log_warnx("string too long");
                                return (findeol());
                        }
                        *p++ = c;
                }
                yylval.v.string = strdup(buf);
                if (yylval.v.string == NULL)
                        fatal("yylex: strdup");
                return (STRING);
        }

#define allowed_to_end_number(x) \
        (isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=')

        if (c == '-' || isdigit(c)) {
                do {
                        *p++ = c;
                        if ((size_t)(p-buf) >= sizeof(buf)) {
                                yyerror("string too long");
                                return (findeol());
                        }
                } while ((c = lgetc(0)) != EOF && isdigit(c));
                lungetc(c);
                if (p == buf + 1 && buf[0] == '-')
                        goto nodigits;
                if (c == EOF || allowed_to_end_number(c)) {
                        const char *errstr = NULL;

                        *p = '\0';
                        yylval.v.number = strtonum(buf, LLONG_MIN,
                            LLONG_MAX, &errstr);
                        if (errstr) {
                                yyerror("\"%s\" invalid number: %s",
                                    buf, errstr);
                                return (findeol());
                        }
                        return (NUMBER);
                } else {
nodigits:
                        while (p > buf + 1)
                                lungetc((unsigned char)*--p);
                        c = (unsigned char)*--p;
                        if (c == '-')
                                return (c);
                }
        }

#define allowed_in_string(x) \
        (isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \
        x != '{' && x != '}' && x != '<' && x != '>' && \
        x != '!' && x != '=' && x != '/' && x != '#' && \
        x != ','))

        if (isalnum(c) || c == ':' || c == '_' || c == '*') {
                do {
                        *p++ = c;
                        if ((size_t)(p-buf) >= sizeof(buf)) {
                                yyerror("string too long");
                                return (findeol());
                        }
                } while ((c = lgetc(0)) != EOF && (allowed_in_string(c)));
                lungetc(c);
                *p = '\0';
                if ((token = lookup(buf)) == STRING)
                        if ((yylval.v.string = strdup(buf)) == NULL)
                                fatal("yylex: strdup");
                return (token);
        }
        if (c == '\n') {
                yylval.lineno = file->lineno;
                file->lineno++;
        }
        if (c == EOF)
                return (0);
        return (c);
}

int
check_file_secrecy(int fd, const char *fname)
{
        struct stat     st;

        if (fstat(fd, &st)) {
                log_warn("cannot stat %s", fname);
                return (-1);
        }
        if (st.st_uid != 0 && st.st_uid != getuid()) {
                log_warnx("%s: owner not root or current user", fname);
                return (-1);
        }
        if (st.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)) {
                log_warnx("%s: group writable or world read/writable", fname);
                return (-1);
        }
        return (0);
}

struct file *
pushfile(const char *name, int secret)
{
        struct file     *nfile;

        log_debug("parsing config %s", name);

        if ((nfile = calloc(1, sizeof(struct file))) == NULL) {
                log_warn("%s", __func__);
                return (NULL);
        }
        if ((nfile->name = strdup(name)) == NULL) {
                log_warn("%s", __func__);
                free(nfile);
                return (NULL);
        }
        if ((nfile->stream = fopen(nfile->name, "r")) == NULL) {
                log_warn("%s: %s", __func__, nfile->name);
                free(nfile->name);
                free(nfile);
                return (NULL);
        }
        if (secret &&
            check_file_secrecy(fileno(nfile->stream), nfile->name)) {
                fclose(nfile->stream);
                free(nfile->name);
                free(nfile);
                return (NULL);
        }
        nfile->lineno = TAILQ_EMPTY(&files) ? 1 : 0;
        nfile->ungetsize = 16;
        nfile->ungetbuf = malloc(nfile->ungetsize);
        if (nfile->ungetbuf == NULL) {
                log_warn("%s", __func__);
                fclose(nfile->stream);
                free(nfile->name);
                free(nfile);
                return (NULL);
        }
        TAILQ_INSERT_TAIL(&files, nfile, entry);
        return (nfile);
}

int
popfile(void)
{
        struct file     *prev;

        if ((prev = TAILQ_PREV(file, files, entry)) != NULL)
                prev->errors += file->errors;

        TAILQ_REMOVE(&files, file, entry);
        fclose(file->stream);
        free(file->name);
        free(file->ungetbuf);
        free(file);
        file = prev;
        return (file ? 0 : EOF);
}

int
parse_config(char *filename)
{
        struct sym              *sym, *next;
        int                      errors = 0;

        if ((conf = calloc(1, sizeof(struct ldapd_config))) == NULL)
                fatal(NULL);

        conf->schema = schema_new();
        if (conf->schema == NULL)
                fatal("schema_new");

        TAILQ_INIT(&conf->namespaces);
        TAILQ_INIT(&conf->listeners);
        if ((conf->sc_ssl = calloc(1, sizeof(*conf->sc_ssl))) == NULL)
                fatal(NULL);
        SPLAY_INIT(conf->sc_ssl);
        SIMPLEQ_INIT(&conf->acl);
        SLIST_INIT(&conf->referrals);

        if ((file = pushfile(filename, 1)) == NULL) {
                free(conf);
                return (-1);
        }
        topfile = file;

        yyparse();
        errors = file->errors;
        popfile();

        /* Free macros and check which have not been used. */
        TAILQ_FOREACH_SAFE(sym, &symhead, entry, next) {
                log_debug("warning: macro \"%s\" not used", sym->nam);
                if (!sym->persist) {
                        free(sym->nam);
                        free(sym->val);
                        TAILQ_REMOVE(&symhead, sym, entry);
                        free(sym);
                }
        }

        return (errors ? -1 : 0);
}

int
symset(const char *nam, const char *val, int persist)
{
        struct sym      *sym;

        TAILQ_FOREACH(sym, &symhead, entry) {
                if (strcmp(nam, sym->nam) == 0)
                        break;
        }

        if (sym != NULL) {
                if (sym->persist == 1)
                        return (0);
                else {
                        free(sym->nam);
                        free(sym->val);
                        TAILQ_REMOVE(&symhead, sym, entry);
                        free(sym);
                }
        }
        if ((sym = calloc(1, sizeof(*sym))) == NULL)
                return (-1);

        sym->nam = strdup(nam);
        if (sym->nam == NULL) {
                free(sym);
                return (-1);
        }
        sym->val = strdup(val);
        if (sym->val == NULL) {
                free(sym->nam);
                free(sym);
                return (-1);
        }
        sym->used = 0;
        sym->persist = persist;
        TAILQ_INSERT_TAIL(&symhead, sym, entry);
        return (0);
}

int
cmdline_symset(char *s)
{
        char    *sym, *val;
        int     ret;

        if ((val = strrchr(s, '=')) == NULL)
                return (-1);
        sym = strndup(s, val - s);
        if (sym == NULL)
                fatal("%s: strndup", __func__);
        ret = symset(sym, val + 1, 1);
        free(sym);

        return (ret);
}

char *
symget(const char *nam)
{
        struct sym      *sym;

        TAILQ_FOREACH(sym, &symhead, entry) {
                if (strcmp(nam, sym->nam) == 0) {
                        sym->used = 1;
                        return (sym->val);
                }
        }
        return (NULL);
}

struct listener *
host_unix(const char *path)
{
        struct sockaddr_un      *saun;
        struct listener         *h;

        if (*path != '/')
                return (NULL);

        if ((h = calloc(1, sizeof(*h))) == NULL)
                fatal(NULL);
        saun = (struct sockaddr_un *)&h->ss;
        saun->sun_len = sizeof(struct sockaddr_un);
        saun->sun_family = AF_UNIX;
        if (strlcpy(saun->sun_path, path, sizeof(saun->sun_path)) >=
            sizeof(saun->sun_path))
                fatal("socket path too long");
        h->flags = F_SECURE;

        return (h);
}

struct listener *
host_v4(const char *s, in_port_t port)
{
        struct in_addr           ina;
        struct sockaddr_in      *sain;
        struct listener         *h;

        memset(&ina, 0, sizeof(ina));
        if (inet_pton(AF_INET, s, &ina) != 1)
                return (NULL);

        if ((h = calloc(1, sizeof(*h))) == NULL)
                fatal(NULL);
        sain = (struct sockaddr_in *)&h->ss;
        sain->sin_len = sizeof(struct sockaddr_in);
        sain->sin_family = AF_INET;
        sain->sin_addr.s_addr = ina.s_addr;
        sain->sin_port = port;

        return (h);
}

struct listener *
host_v6(const char *s, in_port_t port)
{
        struct in6_addr          ina6;
        struct sockaddr_in6     *sin6;
        struct listener         *h;

        memset(&ina6, 0, sizeof(ina6));
        if (inet_pton(AF_INET6, s, &ina6) != 1)
                return (NULL);

        if ((h = calloc(1, sizeof(*h))) == NULL)
                fatal(NULL);
        sin6 = (struct sockaddr_in6 *)&h->ss;
        sin6->sin6_len = sizeof(struct sockaddr_in6);
        sin6->sin6_family = AF_INET6;
        sin6->sin6_port = port;
        memcpy(&sin6->sin6_addr, &ina6, sizeof(ina6));

        return (h);
}

int
host_dns(const char *s, const char *cert,
    struct listenerlist *al, in_port_t port, u_int8_t flags)
{
        struct addrinfo          hints, *res0, *res;
        int                      error;
        struct sockaddr_in      *sain;
        struct sockaddr_in6     *sin6;
        struct listener         *h;

        memset(&hints, 0, sizeof(hints));
        hints.ai_family = PF_UNSPEC;
        hints.ai_socktype = SOCK_DGRAM; /* DUMMY */
        error = getaddrinfo(s, NULL, &hints, &res0);
        if (error == EAI_AGAIN || error == EAI_NODATA || error == EAI_NONAME)
                return (0);
        if (error) {
                log_warnx("host_dns: could not parse \"%s\": %s", s,
                    gai_strerror(error));
                return (-1);
        }

        for (res = res0; res; res = res->ai_next) {
                if (res->ai_family != AF_INET &&
                    res->ai_family != AF_INET6)
                        continue;
                if ((h = calloc(1, sizeof(*h))) == NULL)
                        fatal(NULL);

                h->port = port;
                h->flags = flags;
                h->ss.ss_family = res->ai_family;
                h->ssl = NULL;
                h->ssl_cert_name[0] = '\0';
                if (cert != NULL)
                        (void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));

                if (res->ai_family == AF_INET) {
                        sain = (struct sockaddr_in *)&h->ss;
                        sain->sin_len = sizeof(struct sockaddr_in);
                        sain->sin_addr.s_addr = ((struct sockaddr_in *)
                            res->ai_addr)->sin_addr.s_addr;
                        sain->sin_port = port;
                } else {
                        sin6 = (struct sockaddr_in6 *)&h->ss;
                        sin6->sin6_len = sizeof(struct sockaddr_in6);
                        memcpy(&sin6->sin6_addr, &((struct sockaddr_in6 *)
                            res->ai_addr)->sin6_addr, sizeof(struct in6_addr));
                        sin6->sin6_port = port;
                }

                TAILQ_INSERT_HEAD(al, h, entry);
        }
        freeaddrinfo(res0);
        return 1;
}

int
host(const char *s, const char *cert, struct listenerlist *al,
    in_port_t port, u_int8_t flags)
{
        struct listener *h;

        /* Unix socket path? */
        h = host_unix(s);

        /* IPv4 address? */
        if (h == NULL)
                h = host_v4(s, port);

        /* IPv6 address? */
        if (h == NULL)
                h = host_v6(s, port);

        if (h != NULL) {
                h->port = port;
                h->flags |= flags;
                h->ssl = NULL;
                h->ssl_cert_name[0] = '\0';
                if (cert != NULL)
                        strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));

                TAILQ_INSERT_HEAD(al, h, entry);
                return (1);
        }

        return (host_dns(s, cert, al, port, flags));
}

int
interface(const char *s, const char *cert,
    struct listenerlist *al, in_port_t port, u_int8_t flags)
{
        int                      ret = 0;
        struct ifaddrs          *ifap, *p;
        struct sockaddr_in      *sain;
        struct sockaddr_in6     *sin6;
        struct listener         *h;

        if (getifaddrs(&ifap) == -1)
                fatal("getifaddrs");

        for (p = ifap; p != NULL; p = p->ifa_next) {
                if (strcmp(s, p->ifa_name) != 0)
                        continue;
                if (p->ifa_addr == NULL)
                        continue;

                switch (p->ifa_addr->sa_family) {
                case AF_INET:
                        if ((h = calloc(1, sizeof(*h))) == NULL)
                                fatal(NULL);
                        sain = (struct sockaddr_in *)&h->ss;
                        *sain = *(struct sockaddr_in *)p->ifa_addr;
                        sain->sin_len = sizeof(struct sockaddr_in);
                        sain->sin_port = port;

                        h->fd = -1;
                        h->port = port;
                        h->flags = flags;
                        h->ssl = NULL;
                        h->ssl_cert_name[0] = '\0';
                        if (cert != NULL)
                                (void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));

                        ret = 1;
                        TAILQ_INSERT_HEAD(al, h, entry);

                        break;

                case AF_INET6:
                        if ((h = calloc(1, sizeof(*h))) == NULL)
                                fatal(NULL);
                        sin6 = (struct sockaddr_in6 *)&h->ss;
                        *sin6 = *(struct sockaddr_in6 *)p->ifa_addr;
                        sin6->sin6_len = sizeof(struct sockaddr_in6);
                        sin6->sin6_port = port;

                        h->fd = -1;
                        h->port = port;
                        h->flags = flags;
                        h->ssl = NULL;
                        h->ssl_cert_name[0] = '\0';
                        if (cert != NULL)
                                (void)strlcpy(h->ssl_cert_name, cert, sizeof(h->ssl_cert_name));

                        ret = 1;
                        TAILQ_INSERT_HEAD(al, h, entry);

                        break;
                }
        }

        freeifaddrs(ifap);

        return ret;
}

static struct aci *
mk_aci(int type, int rights, enum scope scope, char *target, char *attr,
    char *subject)
{
        struct aci      *aci;

        if ((aci = calloc(1, sizeof(*aci))) == NULL) {
                yyerror("calloc");
                return NULL;
        }
        aci->type = type;
        aci->rights = rights;
        aci->scope = scope;
        aci->target = target;
        aci->attribute = attr;
        aci->subject = subject;

        log_debug("%s %02X access to %s%s%s scope %d by %s",
            aci->type == ACI_DENY ? "deny" : "allow",
            aci->rights,
            aci->target ? aci->target : "any",
            aci->attribute ? " attribute " : "",
            aci->attribute ? aci->attribute : "",
            aci->scope,
            aci->subject ? aci->subject : "any");

        return aci;
}

struct namespace *
namespace_new(const char *suffix)
{
        struct namespace                *ns;

        if ((ns = calloc(1, sizeof(*ns))) == NULL)
                return NULL;
        ns->sync = 1;
        ns->cache_size = 1024;
        ns->index_cache_size = 512;
        ns->suffix = strdup(suffix);
        if (ns->suffix == NULL) {
                free(ns->suffix);
                free(ns);
                return NULL;
        }
        normalize_dn(ns->suffix);
        TAILQ_INIT(&ns->indices);
        TAILQ_INIT(&ns->request_queue);
        SIMPLEQ_INIT(&ns->acl);
        SLIST_INIT(&ns->referrals);

        return ns;
}

int
ssl_cmp(struct ssl *s1, struct ssl *s2)
{
        return (strcmp(s1->ssl_name, s2->ssl_name));
}

int
load_certfile(struct ldapd_config *env, const char *name, u_int8_t flags,
    u_int8_t protocol)
{
        struct ssl      *s;
        struct ssl       key;
        char             certfile[PATH_MAX];
        uint32_t         tls_protocols = TLS_PROTOCOLS_DEFAULT;
        const char      *tls_ciphers = "default";

        if (strlcpy(key.ssl_name, name, sizeof(key.ssl_name))
            >= sizeof(key.ssl_name)) {
                log_warn("load_certfile: certificate name truncated");
                return -1;
        }

        s = SPLAY_FIND(ssltree, env->sc_ssl, &key);
        if (s != NULL) {
                s->flags |= flags;
                return 0;
        }

        if ((s = calloc(1, sizeof(*s))) == NULL)
                fatal(NULL);

        s->flags = flags;
        (void)strlcpy(s->ssl_name, key.ssl_name, sizeof(s->ssl_name));

        s->config = tls_config_new();
        if (s->config == NULL)
                goto err;

        if (protocol & F_LEGACY) {
                tls_protocols = TLS_PROTOCOLS_ALL;
                tls_ciphers = "all";
        }
        if (tls_config_set_protocols(s->config, tls_protocols) != 0) {
                log_warn("load_certfile: failed to set tls protocols: %s",
                    tls_config_error(s->config));
                goto err;
        }
        if (tls_config_set_ciphers(s->config, tls_ciphers)) {
                log_warn("load_certfile: failed to set tls ciphers: %s",
                    tls_config_error(s->config));
                goto err;
        }

        if (name[0] == '/') {
                if (!bsnprintf(certfile, sizeof(certfile), "%s.crt", name)) {
                        log_warn("load_certfile: path truncated");
                        goto err;
                }
        } else {
                if (!bsnprintf(certfile, sizeof(certfile),
                    "/etc/ldap/certs/%s.crt", name)) {
                        log_warn("load_certfile: path truncated");
                        goto err;
                }
        }

        log_debug("loading certificate file %s", certfile);
        s->ssl_cert = tls_load_file(certfile, &s->ssl_cert_len, NULL);
        if (s->ssl_cert == NULL)
                goto err;

        if (tls_config_set_cert_mem(s->config, s->ssl_cert, s->ssl_cert_len)) {
                log_warn("load_certfile: failed to set tls certificate: %s",
                    tls_config_error(s->config));
                goto err;
        }

        if (name[0] == '/') {
                if (!bsnprintf(certfile, sizeof(certfile), "%s.key", name)) {
                        log_warn("load_certfile: path truncated");
                        goto err;
                }
        } else {
                if (!bsnprintf(certfile, sizeof(certfile),
                    "/etc/ldap/certs/%s.key", name)) {
                        log_warn("load_certfile: path truncated");
                        goto err;
                }
        }

        log_debug("loading key file %s", certfile);
        s->ssl_key = tls_load_file(certfile, &s->ssl_key_len, NULL);
        if (s->ssl_key == NULL)
                goto err;

        if (tls_config_set_key_mem(s->config, s->ssl_key, s->ssl_key_len)) {
                log_warn("load_certfile: failed to set tls key: %s",
                    tls_config_error(s->config));
                goto err;
        }

        SPLAY_INSERT(ssltree, env->sc_ssl, s);

        return (0);
err:
        free(s->ssl_cert);
        free(s->ssl_key);
        tls_config_free(s->config);
        free(s);
        return (-1);
}