File: | src/usr.sbin/smtpd/smtpd/obj/parse.c |
Warning: | line 2296, column 18 Use of zero-allocated memory |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | #include <stdlib.h> | ||||
2 | #include <string.h> | ||||
3 | #define YYBYACC1 1 | ||||
4 | #define YYMAJOR1 1 | ||||
5 | #define YYMINOR9 9 | ||||
6 | #define YYLEXyylex() yylex() | ||||
7 | #define YYEMPTY-1 -1 | ||||
8 | #define yyclearin(yychar=(-1)) (yychar=(YYEMPTY-1)) | ||||
9 | #define yyerrok(yyerrflag=0) (yyerrflag=0) | ||||
10 | #define YYRECOVERING()(yyerrflag!=0) (yyerrflag!=0) | ||||
11 | #define YYPREFIX"yy" "yy" | ||||
12 | #line 25 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
13 | #include <sys/stat.h> | ||||
14 | #include <sys/ioctl.h> | ||||
15 | |||||
16 | #include <net/if.h> | ||||
17 | #include <netinet/in.h> | ||||
18 | |||||
19 | #include <arpa/inet.h> | ||||
20 | #include <ctype.h> | ||||
21 | #include <errno(*__errno()).h> | ||||
22 | #include <ifaddrs.h> | ||||
23 | #include <inttypes.h> | ||||
24 | #include <resolv.h> | ||||
25 | #include <syslog.h> | ||||
26 | #include <unistd.h> | ||||
27 | #include <util.h> | ||||
28 | |||||
29 | #include "smtpd.h" | ||||
30 | #include "ssl.h" | ||||
31 | #include "log.h" | ||||
32 | |||||
33 | TAILQ_HEAD(files, file)struct files { struct file *tqh_first; struct file **tqh_last ; } files = TAILQ_HEAD_INITIALIZER(files){ ((void *)0), &(files).tqh_first }; | ||||
34 | static struct file { | ||||
35 | TAILQ_ENTRY(file)struct { struct file *tqe_next; struct file **tqe_prev; } entry; | ||||
36 | FILE *stream; | ||||
37 | char *name; | ||||
38 | size_t ungetpos; | ||||
39 | size_t ungetsize; | ||||
40 | u_char *ungetbuf; | ||||
41 | int eof_reached; | ||||
42 | int lineno; | ||||
43 | int errors; | ||||
44 | } *file, *topfile; | ||||
45 | struct file *pushfile(const char *, int); | ||||
46 | int popfile(void); | ||||
47 | int check_file_secrecy(int, const char *); | ||||
48 | int yyparse(void); | ||||
49 | int yylex(void); | ||||
50 | int kw_cmp(const void *, const void *); | ||||
51 | int lookup(char *); | ||||
52 | int igetc(void); | ||||
53 | int lgetc(int); | ||||
54 | void lungetc(int); | ||||
55 | int findeol(void); | ||||
56 | int yyerror(const char *, ...) | ||||
57 | __attribute__((__format__ (printf, 1, 2))) | ||||
58 | __attribute__((__nonnull__ (1))); | ||||
59 | |||||
60 | TAILQ_HEAD(symhead, sym)struct symhead { struct sym *tqh_first; struct sym **tqh_last ; } symhead = TAILQ_HEAD_INITIALIZER(symhead){ ((void *)0), &(symhead).tqh_first }; | ||||
61 | struct sym { | ||||
62 | TAILQ_ENTRY(sym)struct { struct sym *tqe_next; struct sym **tqe_prev; } entry; | ||||
63 | int used; | ||||
64 | int persist; | ||||
65 | char *nam; | ||||
66 | char *val; | ||||
67 | }; | ||||
68 | int symset(const char *, const char *, int); | ||||
69 | char *symget(const char *); | ||||
70 | |||||
71 | struct smtpd *conf = NULL((void *)0); | ||||
72 | static int errors = 0; | ||||
73 | |||||
74 | struct table *table = NULL((void *)0); | ||||
75 | struct mta_limits *limits; | ||||
76 | static struct pki *pki; | ||||
77 | static struct ca *sca; | ||||
78 | |||||
79 | struct dispatcher *dsp; | ||||
80 | struct rule *rule; | ||||
81 | struct filter_proc *processor; | ||||
82 | struct filter_config *filter_config; | ||||
83 | static uint32_t last_dynchain_id = 1; | ||||
84 | |||||
85 | enum listen_options { | ||||
86 | LO_FAMILY = 0x000001, | ||||
87 | LO_PORT = 0x000002, | ||||
88 | LO_SSL = 0x000004, | ||||
89 | LO_FILTER = 0x000008, | ||||
90 | LO_PKI = 0x000010, | ||||
91 | LO_AUTH = 0x000020, | ||||
92 | LO_TAG = 0x000040, | ||||
93 | LO_HOSTNAME = 0x000080, | ||||
94 | LO_HOSTNAMES = 0x000100, | ||||
95 | LO_MASKSOURCE = 0x000200, | ||||
96 | LO_NODSN = 0x000400, | ||||
97 | LO_SENDERS = 0x000800, | ||||
98 | LO_RECEIVEDAUTH = 0x001000, | ||||
99 | LO_MASQUERADE = 0x002000, | ||||
100 | LO_CA = 0x004000, | ||||
101 | LO_PROXY = 0x008000, | ||||
102 | }; | ||||
103 | |||||
104 | #define PKI_MAX32 32 | ||||
105 | static struct listen_opts { | ||||
106 | char *ifx; | ||||
107 | int family; | ||||
108 | in_port_t port; | ||||
109 | uint16_t ssl; | ||||
110 | char *filtername; | ||||
111 | char *pki[PKI_MAX32]; | ||||
112 | int pkicount; | ||||
113 | char *tls_ciphers; | ||||
114 | char *tls_protocols; | ||||
115 | char *ca; | ||||
116 | uint16_t auth; | ||||
117 | struct table *authtable; | ||||
118 | char *tag; | ||||
119 | char *hostname; | ||||
120 | struct table *hostnametable; | ||||
121 | struct table *sendertable; | ||||
122 | uint16_t flags; | ||||
123 | |||||
124 | uint32_t options; | ||||
125 | } listen_opts; | ||||
126 | |||||
127 | static void create_sock_listener(struct listen_opts *); | ||||
128 | static void create_if_listener(struct listen_opts *); | ||||
129 | static void config_listener(struct listener *, struct listen_opts *); | ||||
130 | static int host_v4(struct listen_opts *); | ||||
131 | static int host_v6(struct listen_opts *); | ||||
132 | static int host_dns(struct listen_opts *); | ||||
133 | static int interface(struct listen_opts *); | ||||
134 | |||||
135 | int delaytonum(char *); | ||||
136 | int is_if_in_group(const char *, const char *); | ||||
137 | |||||
138 | static int config_lo_mask_source(struct listen_opts *); | ||||
139 | |||||
140 | typedef struct { | ||||
141 | union { | ||||
142 | int64_t number; | ||||
143 | struct table *table; | ||||
144 | char *string; | ||||
145 | struct host *host; | ||||
146 | struct mailaddr *maddr; | ||||
147 | } v; | ||||
148 | int lineno; | ||||
149 | } YYSTYPE; | ||||
150 | |||||
151 | #line 152 "parse.c" | ||||
152 | #define ACTION257 257 | ||||
153 | #define ADMD258 258 | ||||
154 | #define ALIAS259 259 | ||||
155 | #define ANY260 260 | ||||
156 | #define ARROW261 261 | ||||
157 | #define AUTH262 262 | ||||
158 | #define AUTH_OPTIONAL263 263 | ||||
159 | #define BACKUP264 264 | ||||
160 | #define BOUNCE265 265 | ||||
161 | #define BYPASS266 266 | ||||
162 | #define CA267 267 | ||||
163 | #define CERT268 268 | ||||
164 | #define CHAIN269 269 | ||||
165 | #define CHROOT270 270 | ||||
166 | #define CIPHERS271 271 | ||||
167 | #define COMMIT272 272 | ||||
168 | #define COMPRESSION273 273 | ||||
169 | #define CONNECT274 274 | ||||
170 | #define DATA275 275 | ||||
171 | #define DATA_LINE276 276 | ||||
172 | #define DHE277 277 | ||||
173 | #define DISCONNECT278 278 | ||||
174 | #define DOMAIN279 279 | ||||
175 | #define EHLO280 280 | ||||
176 | #define ENABLE281 281 | ||||
177 | #define ENCRYPTION282 282 | ||||
178 | #define ERROR283 283 | ||||
179 | #define EXPAND_ONLY284 284 | ||||
180 | #define FCRDNS285 285 | ||||
181 | #define FILTER286 286 | ||||
182 | #define FOR287 287 | ||||
183 | #define FORWARD_ONLY288 288 | ||||
184 | #define FROM289 289 | ||||
185 | #define GROUP290 290 | ||||
186 | #define HELO291 291 | ||||
187 | #define HELO_SRC292 292 | ||||
188 | #define HOST293 293 | ||||
189 | #define HOSTNAME294 294 | ||||
190 | #define HOSTNAMES295 295 | ||||
191 | #define INCLUDE296 296 | ||||
192 | #define INET4297 297 | ||||
193 | #define INET6298 298 | ||||
194 | #define JUNK299 299 | ||||
195 | #define KEY300 300 | ||||
196 | #define LIMIT301 301 | ||||
197 | #define LISTEN302 302 | ||||
198 | #define LMTP303 303 | ||||
199 | #define LOCAL304 304 | ||||
200 | #define MAIL_FROM305 305 | ||||
201 | #define MAILDIR306 306 | ||||
202 | #define MASK_SRC307 307 | ||||
203 | #define MASQUERADE308 308 | ||||
204 | #define MATCH309 309 | ||||
205 | #define MAX_MESSAGE_SIZE310 310 | ||||
206 | #define MAX_DEFERRED311 311 | ||||
207 | #define MBOX312 312 | ||||
208 | #define MDA313 313 | ||||
209 | #define MTA314 314 | ||||
210 | #define MX315 315 | ||||
211 | #define NO_DSN316 316 | ||||
212 | #define NO_VERIFY317 317 | ||||
213 | #define NOOP318 318 | ||||
214 | #define ON319 319 | ||||
215 | #define PHASE320 320 | ||||
216 | #define PKI321 321 | ||||
217 | #define PORT322 322 | ||||
218 | #define PROC323 323 | ||||
219 | #define PROC_EXEC324 324 | ||||
220 | #define PROTOCOLS325 325 | ||||
221 | #define PROXY_V2326 326 | ||||
222 | #define QUEUE327 327 | ||||
223 | #define QUIT328 328 | ||||
224 | #define RCPT_TO329 329 | ||||
225 | #define RDNS330 330 | ||||
226 | #define RECIPIENT331 331 | ||||
227 | #define RECEIVEDAUTH332 332 | ||||
228 | #define REGEX333 333 | ||||
229 | #define RELAY334 334 | ||||
230 | #define REJECT335 335 | ||||
231 | #define REPORT336 336 | ||||
232 | #define REWRITE337 337 | ||||
233 | #define RSET338 338 | ||||
234 | #define SCHEDULER339 339 | ||||
235 | #define SENDER340 340 | ||||
236 | #define SENDERS341 341 | ||||
237 | #define SMTP342 342 | ||||
238 | #define SMTP_IN343 343 | ||||
239 | #define SMTP_OUT344 344 | ||||
240 | #define SMTPS345 345 | ||||
241 | #define SOCKET346 346 | ||||
242 | #define SRC347 347 | ||||
243 | #define SRS348 348 | ||||
244 | #define SUB_ADDR_DELIM349 349 | ||||
245 | #define TABLE350 350 | ||||
246 | #define TAG351 351 | ||||
247 | #define TAGGED352 352 | ||||
248 | #define TLS353 353 | ||||
249 | #define TLS_REQUIRE354 354 | ||||
250 | #define TTL355 355 | ||||
251 | #define USER356 356 | ||||
252 | #define USERBASE357 357 | ||||
253 | #define VERIFY358 358 | ||||
254 | #define VIRTUAL359 359 | ||||
255 | #define WARN_INTERVAL360 360 | ||||
256 | #define WRAPPER361 361 | ||||
257 | #define STRING362 362 | ||||
258 | #define NUMBER363 363 | ||||
259 | #define YYERRCODE256 256 | ||||
260 | const short yylhs[] = | ||||
261 | { -1, | ||||
262 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
263 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
264 | 0, 7, 8, 24, 24, 24, 26, 26, 25, 3, | ||||
265 | 3, 27, 27, 28, 29, 29, 30, 31, 31, 32, | ||||
266 | 32, 34, 9, 10, 36, 11, 37, 35, 12, 12, | ||||
267 | 13, 40, 13, 41, 13, 43, 14, 44, 44, 44, | ||||
268 | 42, 42, 46, 15, 47, 47, 47, 45, 45, 16, | ||||
269 | 16, 16, 16, 17, 18, 18, 18, 18, 19, 19, | ||||
270 | 19, 50, 50, 50, 50, 50, 51, 51, 53, 52, | ||||
271 | 54, 52, 55, 52, 56, 52, 57, 52, 58, 52, | ||||
272 | 59, 52, 60, 52, 61, 52, 62, 52, 63, 63, | ||||
273 | 63, 63, 63, 63, 63, 63, 63, 63, 63, 63, | ||||
274 | 63, 63, 63, 63, 64, 63, 63, 66, 66, 67, | ||||
275 | 68, 68, 69, 70, 70, 71, 21, 72, 72, 72, | ||||
276 | 72, 72, 72, 72, 72, 72, 72, 72, 72, 72, | ||||
277 | 72, 72, 72, 72, 72, 72, 72, 72, 72, 72, | ||||
278 | 72, 72, 72, 72, 72, 72, 72, 72, 73, 73, | ||||
279 | 74, 75, 75, 76, 22, 77, 77, 77, 78, 78, | ||||
280 | 78, 78, 79, 80, 81, 82, 83, 84, 85, 86, | ||||
281 | 87, 88, 89, 90, 91, 92, 93, 94, 94, 94, | ||||
282 | 94, 94, 94, 95, 96, 96, 96, 97, 97, 97, | ||||
283 | 97, 97, 97, 98, 98, 98, 98, 98, 98, 98, | ||||
284 | 98, 99, 99, 99, 99, 99, 99, 99, 99, 99, | ||||
285 | 99, 100, 100, 100, 100, 100, 100, 100, 100, 101, | ||||
286 | 101, 101, 101, 101, 101, 101, 101, 103, 102, 105, | ||||
287 | 104, 107, 106, 109, 108, 111, 110, 113, 112, 115, | ||||
288 | 114, 117, 116, 118, 118, 118, 118, 118, 118, 118, | ||||
289 | 118, 119, 65, 65, 23, 120, 23, 121, 23, 122, | ||||
290 | 23, 2, 2, 123, 33, 33, 124, 49, 49, 125, | ||||
291 | 38, 38, 126, 126, 126, 39, 39, 127, 48, 48, | ||||
292 | 128, 129, 128, 128, 128, 130, 130, 130, 130, 130, | ||||
293 | 130, 130, 131, 130, 130, 130, 130, 130, 130, 130, | ||||
294 | 130, 130, 130, 130, 130, 130, 130, 130, 130, 130, | ||||
295 | 130, 130, 130, 130, 130, 130, 132, 132, 133, 134, | ||||
296 | 135, 135, 136, 136, 137, 20, 1, 138, 1, 5, | ||||
297 | 139, 5, 6, 4, 4, | ||||
298 | }; | ||||
299 | const short yylen[] = | ||||
300 | { 2, | ||||
301 | 0, 2, 3, 3, 3, 3, 3, 3, 3, 3, | ||||
302 | 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, | ||||
303 | 3, 2, 3, 1, 1, 0, 2, 0, 2, 1, | ||||
304 | 0, 1, 1, 3, 1, 3, 1, 1, 3, 1, | ||||
305 | 1, 0, 4, 2, 0, 4, 2, 1, 3, 4, | ||||
306 | 3, 0, 7, 0, 4, 0, 4, 2, 2, 2, | ||||
307 | 2, 0, 0, 5, 2, 2, 2, 2, 0, 2, | ||||
308 | 2, 3, 3, 3, 3, 3, 3, 3, 3, 4, | ||||
309 | 3, 2, 2, 2, 2, 2, 2, 0, 0, 3, | ||||
310 | 0, 3, 0, 4, 0, 4, 0, 5, 0, 4, | ||||
311 | 0, 5, 0, 4, 0, 3, 0, 3, 2, 2, | ||||
312 | 2, 2, 2, 2, 2, 2, 3, 1, 2, 2, | ||||
313 | 1, 2, 2, 2, 0, 5, 1, 2, 0, 2, | ||||
314 | 1, 1, 2, 2, 0, 0, 5, 3, 4, 3, | ||||
315 | 4, 2, 2, 3, 4, 3, 4, 3, 4, 3, | ||||
316 | 3, 3, 4, 5, 3, 4, 5, 3, 4, 5, | ||||
317 | 4, 5, 3, 3, 4, 5, 4, 5, 2, 0, | ||||
318 | 1, 1, 2, 0, 4, 1, 1, 1, 2, 2, | ||||
319 | 2, 2, 2, 2, 3, 4, 3, 4, 3, 4, | ||||
320 | 2, 3, 4, 3, 4, 3, 4, 1, 1, 1, | ||||
321 | 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, | ||||
322 | 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, | ||||
323 | 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, | ||||
324 | 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, | ||||
325 | 1, 1, 1, 1, 1, 1, 1, 0, 5, 0, | ||||
326 | 5, 0, 5, 0, 5, 0, 5, 0, 5, 0, | ||||
327 | 5, 0, 5, 1, 1, 1, 1, 1, 1, 1, | ||||
328 | 1, 1, 1, 3, 4, 0, 6, 0, 5, 0, | ||||
329 | 7, 1, 1, 1, 3, 1, 2, 2, 0, 2, | ||||
330 | 2, 0, 1, 1, 2, 2, 0, 2, 2, 0, | ||||
331 | 2, 0, 5, 1, 2, 1, 1, 2, 2, 2, | ||||
332 | 2, 2, 0, 5, 1, 2, 1, 1, 2, 2, | ||||
333 | 2, 2, 2, 1, 1, 2, 2, 2, 2, 2, | ||||
334 | 1, 1, 1, 1, 2, 3, 1, 1, 2, 2, | ||||
335 | 2, 0, 2, 0, 0, 4, 3, 0, 6, 1, | ||||
336 | 0, 4, 3, 1, 1, | ||||
337 | }; | ||||
338 | const short yydefred[] = | ||||
339 | { 1, | ||||
340 | 0, 0, 0, 0, 0, 0, 0, 0, 345, 174, | ||||
341 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
342 | 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
343 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 21, | ||||
344 | 136, 44, 42, 45, 0, 22, 0, 0, 0, 0, | ||||
345 | 0, 0, 56, 0, 70, 0, 0, 0, 0, 0, | ||||
346 | 0, 0, 0, 0, 0, 0, 17, 3, 4, 5, | ||||
347 | 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, | ||||
348 | 16, 18, 19, 20, 0, 0, 0, 280, 278, 0, | ||||
349 | 0, 0, 30, 0, 0, 0, 0, 49, 0, 0, | ||||
350 | 0, 0, 51, 0, 63, 72, 73, 0, 74, 0, | ||||
351 | 76, 0, 75, 0, 283, 282, 77, 78, 0, 79, | ||||
352 | 81, 347, 0, 23, 107, 105, 0, 0, 89, 0, | ||||
353 | 0, 131, 132, 0, 284, 0, 286, 0, 46, 48, | ||||
354 | 0, 0, 275, 276, 0, 0, 346, 337, 338, 0, | ||||
355 | 0, 0, 0, 0, 0, 0, 142, 169, 0, 172, | ||||
356 | 175, 287, 291, 50, 0, 293, 294, 0, 55, 0, | ||||
357 | 0, 0, 0, 57, 0, 0, 298, 299, 290, 288, | ||||
358 | 80, 0, 0, 0, 0, 93, 0, 0, 0, 103, | ||||
359 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
360 | 0, 0, 0, 127, 0, 0, 130, 0, 0, 137, | ||||
361 | 0, 47, 0, 254, 262, 248, 260, 252, 250, 256, | ||||
362 | 258, 264, 265, 266, 267, 268, 269, 270, 271, 279, | ||||
363 | 0, 0, 304, 0, 0, 339, 0, 0, 0, 0, | ||||
364 | 0, 0, 0, 306, 307, 331, 333, 0, 0, 0, | ||||
365 | 334, 332, 0, 0, 0, 317, 0, 0, 340, 0, | ||||
366 | 350, 351, 0, 144, 354, 355, 164, 0, 163, 0, | ||||
367 | 152, 0, 151, 0, 0, 150, 0, 0, 140, 0, | ||||
368 | 146, 0, 148, 0, 138, 171, 173, 52, 295, 296, | ||||
369 | 58, 60, 59, 61, 0, 0, 0, 64, 0, 0, | ||||
370 | 0, 41, 0, 40, 0, 0, 0, 0, 0, 0, | ||||
371 | 0, 108, 106, 101, 0, 0, 97, 0, 92, 90, | ||||
372 | 0, 123, 0, 112, 113, 120, 124, 0, 109, 110, | ||||
373 | 119, 116, 111, 114, 115, 122, 128, 133, 134, 285, | ||||
374 | 272, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
375 | 0, 277, 301, 0, 305, 341, 326, 327, 323, 320, | ||||
376 | 312, 0, 329, 330, 322, 309, 310, 308, 311, 321, | ||||
377 | 0, 316, 328, 319, 343, 145, 0, 0, 0, 165, | ||||
378 | 0, 167, 0, 159, 0, 161, 0, 156, 0, 153, | ||||
379 | 141, 147, 149, 139, 0, 67, 66, 65, 68, 33, | ||||
380 | 32, 0, 0, 24, 0, 25, 0, 349, 83, 82, | ||||
381 | 85, 84, 86, 87, 0, 100, 94, 0, 96, 104, | ||||
382 | 117, 0, 281, 0, 0, 0, 0, 0, 0, 0, | ||||
383 | 0, 0, 0, 0, 336, 0, 353, 166, 168, 160, | ||||
384 | 162, 157, 154, 53, 34, 0, 29, 0, 36, 37, | ||||
385 | 39, 102, 98, 0, 274, 0, 198, 199, 201, 200, | ||||
386 | 203, 202, 208, 209, 210, 211, 212, 213, 0, 0, | ||||
387 | 240, 241, 242, 243, 244, 245, 246, 247, 0, 0, | ||||
388 | 204, 0, 232, 233, 234, 235, 236, 237, 238, 239, | ||||
389 | 0, 0, 205, 206, 207, 0, 0, 214, 215, 216, | ||||
390 | 217, 218, 219, 220, 221, 0, 0, 222, 223, 224, | ||||
391 | 225, 226, 227, 228, 229, 230, 231, 0, 0, 0, | ||||
392 | 352, 27, 126, 0, 183, 0, 0, 0, 178, 0, | ||||
393 | 177, 0, 0, 0, 255, 176, 0, 263, 249, 261, | ||||
394 | 253, 251, 257, 0, 259, 303, 314, 0, 192, 0, | ||||
395 | 189, 0, 185, 0, 187, 180, 179, 182, 181, 0, | ||||
396 | 194, 0, 196, 193, 190, 186, 188, 195, 197, | ||||
397 | }; | ||||
398 | const short yydgoto[] = | ||||
399 | { 1, | ||||
400 | 22, 117, 470, 264, 265, 266, 23, 24, 25, 26, | ||||
401 | 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, | ||||
402 | 37, 38, 39, 405, 406, 447, 402, 301, 302, 303, | ||||
403 | 304, 305, 136, 86, 139, 87, 140, 98, 169, 395, | ||||
404 | 102, 174, 104, 175, 298, 176, 299, 109, 113, 311, | ||||
405 | 312, 132, 189, 188, 316, 318, 418, 315, 415, 321, | ||||
406 | 184, 183, 206, 328, 342, 207, 133, 134, 209, 210, | ||||
407 | 85, 95, 96, 287, 161, 48, 535, 536, 457, 458, | ||||
408 | 459, 460, 461, 462, 493, 494, 465, 466, 467, 476, | ||||
409 | 477, 515, 516, 495, 482, 496, 469, 506, 518, 491, | ||||
410 | 479, 222, 346, 223, 349, 224, 348, 225, 344, 226, | ||||
411 | 350, 227, 351, 228, 347, 229, 345, 230, 343, 231, | ||||
412 | 142, 141, 137, 99, 114, 170, 110, 235, 354, 258, | ||||
413 | 362, 147, 148, 149, 236, 259, 47, 123, 377, | ||||
414 | }; | ||||
415 | const short yysindex[] = | ||||
416 | { 0, | ||||
417 | -5, 33, -306, -294, -286, -283, -244, -228, 0, 0, | ||||
418 | -249, -240, -223, -220, -219, -225, -206, -217, -215, 52, | ||||
419 | 0, 139, 144, 150, 152, 155, 157, 160, 165, 168, | ||||
420 | 170, 173, 175, 176, 179, 181, 186, 191, 195, 0, | ||||
421 | 0, 0, 0, 0, -172, 0, -121, 182, -150, -148, | ||||
422 | -78, -143, 0, -139, 0, -135, -131, -125, -119, -118, | ||||
423 | -190, -117, -242, -112, -106, -94, 0, 0, 0, 0, | ||||
424 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
425 | 0, 0, 0, 0, 347, -91, -7, 0, 0, -89, | ||||
426 | -87, -284, 0, 183, 182, -230, -84, 0, -150, -76, | ||||
427 | 16, -239, 0, -208, 0, 0, 0, -79, 0, -125, | ||||
428 | 0, -63, 0, -118, 0, 0, 0, 0, -60, 0, | ||||
429 | 0, 0, 192, 0, 0, 0, -57, -266, 0, -38, | ||||
430 | 562, 0, 0, -19, 0, 273, 0, -29, 0, 0, | ||||
431 | 215, -80, 0, 0, -252, 489, 0, 0, 0, -51, | ||||
432 | -231, -159, -48, -43, -41, -37, 0, 0, -23, 0, | ||||
433 | 0, 0, 0, 0, -20, 0, 0, 9, 0, -239, | ||||
434 | -18, 1, 6, 0, -208, -246, 0, 0, 0, 0, | ||||
435 | 0, 8, -224, -224, 30, 0, 91, -224, -224, 0, | ||||
436 | -42, 83, 34, 49, -42, 59, 62, -42, -42, 64, | ||||
437 | 66, 68, -42, 0, 88, 562, 0, 69, -19, 0, | ||||
438 | -91, 0, 70, 0, 0, 0, 0, 0, 0, 0, | ||||
439 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
440 | -246, 73, 0, 76, -252, 0, -42, -42, 85, 86, | ||||
441 | 93, 98, -42, 0, 0, 0, 0, 103, 230, 113, | ||||
442 | 0, 0, -42, 118, 115, 0, 120, 489, 0, -42, | ||||
443 | 0, 0, 129, 0, 0, 0, 0, -35, 0, -34, | ||||
444 | 0, -32, 0, -30, -21, 0, 7, -42, 0, -42, | ||||
445 | 0, -42, 0, -42, 0, 0, 0, 0, 0, 0, | ||||
446 | 0, 0, 0, 0, 135, 138, 140, 0, -246, -45, | ||||
447 | 43, 0, 43, 0, 359, -42, 142, -42, -42, 146, | ||||
448 | -224, 0, 0, 0, -224, -224, 0, -224, 0, 0, | ||||
449 | -224, 0, 153, 0, 0, 0, 0, 387, 0, 0, | ||||
450 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
451 | 0, 391, 43, 220, 224, 229, 231, 232, 238, 242, | ||||
452 | 244, 0, 0, 396, 0, 0, 0, 0, 0, 0, | ||||
453 | 0, 409, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
454 | 174, 0, 0, 0, 0, 0, 8, 492, -42, 0, | ||||
455 | -42, 0, -42, 0, -42, 0, -42, 0, -42, 0, | ||||
456 | 0, 0, 0, 0, -239, 0, 0, 0, 0, 0, | ||||
457 | 0, 194, 550, 0, 201, 0, 203, 0, 0, 0, | ||||
458 | 0, 0, 0, 0, -224, 0, 0, -224, 0, 0, | ||||
459 | 0, 70, 0, 70, 182, 182, 182, 182, 182, 182, | ||||
460 | 182, 182, 70, 70, 0, 441, 0, 0, 0, 0, | ||||
461 | 0, 0, 0, 0, 0, 550, 0, -45, 0, 0, | ||||
462 | 0, 0, 0, 444, 0, -221, 0, 0, 0, 0, | ||||
463 | 0, 0, 0, 0, 0, 0, 0, 0, 11, 237, | ||||
464 | 0, 0, 0, 0, 0, 0, 0, 0, 122, -236, | ||||
465 | 0, 11, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
466 | 11, -92, 0, 0, 0, 11, 11, 0, 0, 0, | ||||
467 | 0, 0, 0, 0, 0, 11, -88, 0, 0, 0, | ||||
468 | 0, 0, 0, 0, 0, 0, 0, 11, 445, 448, | ||||
469 | 0, 0, 0, 17, 0, 54, 56, 81, 0, 219, | ||||
470 | 0, 226, 236, 241, 0, 0, 84, 0, 0, 0, | ||||
471 | 0, 0, 0, 90, 0, 0, 0, -42, 0, -42, | ||||
472 | 0, -42, 0, -42, 0, 0, 0, 0, 0, -42, | ||||
473 | 0, -42, 0, 0, 0, 0, 0, 0, 0,}; | ||||
474 | const short yyrindex[] = | ||||
475 | { 0, | ||||
476 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
477 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
478 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
479 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
480 | 0, 0, 0, 0, 0, 0, 0, -81, 594, 0, | ||||
481 | -4, 0, 0, 0, 0, 155, 0, 596, 0, 597, | ||||
482 | 0, 0, 0, 0, 493, 0, 0, 0, 0, 0, | ||||
483 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
484 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
485 | 0, 0, 0, 0, -81, 0, 0, 0, 594, 0, | ||||
486 | 0, 602, 0, 611, 0, 0, 0, 0, 0, 596, | ||||
487 | 0, 0, 0, 597, 0, 0, 0, 0, 0, 0, | ||||
488 | 0, 0, 0, 0, 0, 0, 0, 5, 0, 0, | ||||
489 | -3, 0, 0, 612, 0, 615, 0, 0, 0, 0, | ||||
490 | 0, 0, 0, 0, 616, 617, 0, 0, 0, -22, | ||||
491 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
492 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 602, | ||||
493 | 0, 0, 0, 0, 611, 150, 0, 0, 0, 0, | ||||
494 | 0, 0, -2, -2, 21, 0, 47, -2, -2, 0, | ||||
495 | 0, 148, 0, 0, 0, 506, 0, 0, 0, 0, | ||||
496 | 0, 0, 0, 0, 158, -3, 0, 0, 612, 0, | ||||
497 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
498 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
499 | 150, 507, 0, 0, 616, 0, 223, 264, 0, 0, | ||||
500 | 510, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
501 | 0, 0, 0, 316, 0, 0, 357, 617, 0, 0, | ||||
502 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
503 | 0, 438, 0, 0, 474, 0, 0, 0, 0, 0, | ||||
504 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
505 | 0, 0, 0, 0, 0, 0, 0, 0, 150, 3, | ||||
506 | -115, 0, -105, 0, 0, 0, 0, 0, 0, 0, | ||||
507 | -2, 0, 0, 0, -2, -2, 0, -2, 0, 0, | ||||
508 | -2, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
509 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
510 | 0, 0, -104, 0, 0, 0, 0, 0, 0, 0, | ||||
511 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
512 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
513 | 423, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
514 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
515 | 0, 0, 0, 0, 602, 0, 0, 0, 0, 0, | ||||
516 | 0, 0, 282, 0, 0, 0, 0, 0, 0, 0, | ||||
517 | 0, 0, 0, 0, -2, 0, 0, -2, 0, 0, | ||||
518 | 0, 0, 0, 0, -101, 252, -128, 252, 261, 261, | ||||
519 | 252, 151, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
520 | 0, 0, 0, 0, 0, 282, 0, 0, 0, 0, | ||||
521 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
522 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
523 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
524 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
525 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
526 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
527 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
528 | 0, 0, 0, 57, 0, 0, 188, 0, 0, 0, | ||||
529 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
530 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
531 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
532 | 0, 0, 0, 0, 0, 0, 0, 0, 0,}; | ||||
533 | const short yygindex[] = | ||||
534 | { 0, | ||||
535 | 0, 0, -44, -153, 0, 0, 0, 0, 0, 0, | ||||
536 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
537 | 0, 0, 0, -237, 0, 199, 0, 0, 251, 0, | ||||
538 | 239, 270, 0, 0, 0, 0, 0, 559, -156, 0, | ||||
539 | 0, 487, 0, 0, -191, 0, 0, 539, 549, 0, | ||||
540 | -152, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
541 | 0, 0, 0, 0, -146, 459, 0, 0, 0, 465, | ||||
542 | 0, 0, 580, 0, 0, 0, 210, 197, 0, 0, | ||||
543 | 0, 0, 0, 0, 36, 169, -77, 208, 240, -210, | ||||
544 | 61, 0, 0, 367, 0, 247, 0, 0, 0, 0, | ||||
545 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
546 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
547 | 0, 0, 469, 0, 0, 0, 0, 0, 0, 0, | ||||
548 | 0, 0, 0, 0, 449, 429, 0, 0, 0, | ||||
549 | }; | ||||
550 | #define YYTABLESIZE915 915 | ||||
551 | const short yytable[] = | ||||
552 | { 279, | ||||
553 | 281, 283, 285, 94, 21, 54, 129, 88, 263, 35, | ||||
554 | 143, 263, 37, 290, 91, 401, 263, 263, 263, 38, | ||||
555 | 273, 119, 263, 295, 263, 263, 159, 263, 267, 263, | ||||
556 | 99, 313, 186, 232, 306, 319, 320, 322, 263, 352, | ||||
557 | 524, 326, 40, 296, 330, 331, 37, 268, 525, 335, | ||||
558 | 94, 49, 403, 55, 233, 41, 95, 166, 167, 171, | ||||
559 | 51, 145, 56, 525, 59, 407, 263, 42, 172, 526, | ||||
560 | 52, 262, 269, 43, 262, 58, 263, 146, 44, 262, | ||||
561 | 262, 262, 63, 357, 358, 262, 404, 262, 262, 364, | ||||
562 | 262, 173, 262, 527, 60, 187, 88, 270, 234, 371, | ||||
563 | 271, 262, 272, 61, 160, 424, 376, 399, 527, 297, | ||||
564 | 528, 50, 66, 263, 380, 263, 382, 45, 384, 120, | ||||
565 | 386, 388, 168, 390, 391, 528, 392, 37, 393, 262, | ||||
566 | 394, 307, 308, 46, 309, 57, 310, 64, 53, 262, | ||||
567 | 263, 54, 62, 263, 273, 274, 65, 89, 67, 263, | ||||
568 | 90, 91, 409, 68, 411, 412, 31, 118, 414, 69, | ||||
569 | 31, 70, 416, 417, 71, 419, 72, 121, 420, 73, | ||||
570 | 275, 115, 116, 524, 74, 170, 262, 75, 262, 76, | ||||
571 | 31, 214, 77, 31, 78, 79, 276, 277, 80, 31, | ||||
572 | 81, 215, 525, 216, 217, 82, 525, 92, 526, 218, | ||||
573 | 83, 31, 526, 262, 84, 31, 262, 31, 101, 31, | ||||
574 | 219, 97, 262, 100, 93, 400, 537, 488, 31, 103, | ||||
575 | 503, 513, 105, 31, 220, 438, 106, 439, 31, 440, | ||||
576 | 107, 441, 324, 442, 143, 443, 108, 527, 444, 143, | ||||
577 | 544, 527, 111, 112, 118, 31, 26, 31, 221, 121, | ||||
578 | 2, 3, 4, 170, 528, 122, 26, 26, 528, 5, | ||||
579 | 138, 6, 452, 91, 143, 453, 143, 124, 143, 31, | ||||
580 | 135, 31, 143, 325, 144, 454, 529, 455, 162, 99, | ||||
581 | 7, 260, 143, 177, 278, 164, 519, 520, 530, 280, | ||||
582 | 8, 282, 54, 54, 165, 284, 9, 379, 381, 179, | ||||
583 | 383, 181, 385, 10, 185, 95, 143, 11, 12, 531, | ||||
584 | 261, 387, 143, 261, 182, 13, 211, 14, 261, 261, | ||||
585 | 261, 15, 191, 190, 261, 315, 261, 261, 143, 261, | ||||
586 | 143, 261, 212, 16, 191, 208, 17, 213, 286, 389, | ||||
587 | 261, 288, 18, 291, 19, 532, 533, 534, 473, 548, | ||||
588 | 485, 129, 88, 500, 510, 191, 20, 54, 314, 91, | ||||
589 | 91, 91, 292, 91, 37, 91, 318, 293, 261, 300, | ||||
590 | 549, 289, 551, 553, 555, 99, 99, 99, 261, 99, | ||||
591 | 456, 99, 480, 561, 492, 492, 550, 507, 552, 317, | ||||
592 | 563, 191, 191, 191, 564, 324, 565, 323, 566, 530, | ||||
593 | 567, 95, 95, 95, 336, 95, 568, 95, 569, 118, | ||||
594 | 325, 118, 31, 554, 118, 261, 560, 261, 118, 121, | ||||
595 | 327, 121, 562, 329, 121, 332, 118, 333, 121, 334, | ||||
596 | 338, 341, 335, 118, 353, 31, 121, 355, 118, 118, | ||||
597 | 118, 31, 261, 121, 150, 261, 359, 360, 121, 121, | ||||
598 | 121, 261, 118, 184, 361, 31, 532, 533, 534, 363, | ||||
599 | 463, 471, 121, 483, 365, 184, 498, 508, 118, 151, | ||||
600 | 158, 152, 118, 153, 370, 372, 373, 374, 121, 31, | ||||
601 | 31, 435, 121, 408, 324, 324, 184, 154, 489, 324, | ||||
602 | 378, 504, 514, 324, 118, 118, 396, 31, 524, 397, | ||||
603 | 118, 398, 118, 410, 121, 121, 155, 413, 324, 422, | ||||
604 | 121, 155, 121, 31, 421, 423, 324, 324, 433, 324, | ||||
605 | 324, 525, 184, 184, 184, 325, 325, 526, 425, 324, | ||||
606 | 325, 434, 426, 156, 325, 157, 31, 427, 324, 428, | ||||
607 | 429, 537, 31, 324, 324, 31, 430, 324, 324, 325, | ||||
608 | 431, 31, 432, 437, 324, 445, 31, 325, 325, 446, | ||||
609 | 325, 325, 448, 324, 450, 521, 527, 324, 523, 546, | ||||
610 | 325, 366, 547, 324, 367, 324, 324, 315, 315, 325, | ||||
611 | 556, 31, 315, 528, 325, 325, 315, 557, 325, 325, | ||||
612 | 31, 368, 369, 464, 472, 325, 484, 558, 31, 499, | ||||
613 | 509, 315, 559, 292, 325, 300, 289, 31, 325, 315, | ||||
614 | 315, 297, 315, 315, 325, 348, 325, 325, 318, 318, | ||||
615 | 62, 135, 315, 318, 43, 342, 344, 318, 125, 302, | ||||
616 | 125, 315, 313, 474, 126, 486, 315, 315, 501, 511, | ||||
617 | 315, 315, 318, 28, 522, 451, 436, 315, 178, 127, | ||||
618 | 318, 318, 128, 318, 318, 449, 315, 163, 129, 130, | ||||
619 | 315, 294, 180, 318, 337, 475, 315, 487, 315, 315, | ||||
620 | 502, 512, 318, 339, 158, 538, 497, 318, 318, 340, | ||||
621 | 131, 318, 318, 356, 335, 335, 375, 0, 318, 335, | ||||
622 | 0, 539, 0, 335, 158, 0, 0, 318, 0, 158, | ||||
623 | 540, 318, 0, 0, 0, 541, 542, 318, 335, 318, | ||||
624 | 318, 0, 0, 0, 0, 543, 335, 335, 0, 335, | ||||
625 | 335, 0, 0, 0, 158, 0, 158, 545, 158, 335, | ||||
626 | 155, 0, 0, 0, 0, 155, 0, 0, 335, 0, | ||||
627 | 0, 0, 158, 335, 335, 0, 0, 335, 335, 0, | ||||
628 | 237, 238, 0, 0, 335, 239, 0, 0, 0, 240, | ||||
629 | 155, 0, 155, 335, 155, 0, 158, 335, 0, 0, | ||||
630 | 0, 0, 158, 335, 241, 335, 335, 0, 155, 0, | ||||
631 | 0, 0, 242, 243, 0, 244, 245, 0, 158, 0, | ||||
632 | 158, 468, 478, 481, 490, 246, 0, 505, 517, 0, | ||||
633 | 0, 0, 155, 0, 247, 0, 0, 0, 155, 248, | ||||
634 | 249, 0, 0, 250, 251, 0, 0, 0, 0, 0, | ||||
635 | 252, 0, 0, 191, 155, 192, 155, 0, 193, 253, | ||||
636 | 0, 0, 194, 254, 0, 0, 0, 0, 0, 255, | ||||
637 | 195, 256, 257, 0, 0, 0, 0, 196, 0, 0, | ||||
638 | 0, 0, 197, 198, 199, 0, 0, 0, 0, 0, | ||||
639 | 0, 0, 0, 0, 0, 0, 200, 0, 0, 0, | ||||
640 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
641 | 0, 0, 201, 0, 0, 0, 202, 0, 0, 0, | ||||
642 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, | ||||
643 | 0, 0, 0, 0, 0, 0, 0, 0, 203, 204, | ||||
644 | 0, 0, 0, 0, 205, | ||||
645 | }; | ||||
646 | const short yycheck[] = | ||||
647 | { 153, | ||||
648 | 154, 155, 156, 48, 10, 10, 10, 10, 60, 125, | ||||
649 | 33, 60, 10, 170, 10, 61, 60, 60, 60, 125, | ||||
650 | 125, 264, 60, 270, 60, 60, 257, 60, 260, 60, | ||||
651 | 10, 184, 299, 286, 259, 188, 189, 191, 60, 231, | ||||
652 | 262, 195, 10, 290, 198, 199, 44, 279, 285, 203, | ||||
653 | 95, 301, 10, 273, 307, 362, 10, 297, 298, 268, | ||||
654 | 301, 346, 282, 285, 271, 303, 60, 362, 277, 291, | ||||
655 | 311, 123, 304, 360, 123, 301, 60, 362, 362, 123, | ||||
656 | 123, 123, 300, 237, 238, 123, 44, 123, 123, 243, | ||||
657 | 123, 300, 123, 330, 301, 362, 269, 329, 351, 253, | ||||
658 | 260, 123, 262, 310, 335, 343, 260, 299, 330, 356, | ||||
659 | 347, 361, 61, 60, 268, 60, 270, 362, 272, 362, | ||||
660 | 274, 275, 362, 277, 278, 347, 280, 125, 282, 123, | ||||
661 | 284, 356, 357, 362, 359, 355, 361, 355, 362, 123, | ||||
662 | 60, 362, 349, 60, 304, 305, 362, 320, 10, 60, | ||||
663 | 323, 324, 306, 10, 308, 309, 285, 10, 311, 10, | ||||
664 | 262, 10, 315, 316, 10, 318, 10, 10, 321, 10, | ||||
665 | 330, 362, 363, 262, 10, 257, 123, 10, 123, 10, | ||||
666 | 262, 262, 10, 285, 10, 10, 346, 347, 10, 291, | ||||
667 | 10, 272, 285, 274, 275, 10, 285, 319, 291, 280, | ||||
668 | 10, 330, 291, 123, 10, 287, 123, 289, 287, 291, | ||||
669 | 291, 362, 123, 362, 33, 261, 305, 428, 347, 363, | ||||
670 | 431, 432, 362, 305, 305, 379, 362, 381, 330, 383, | ||||
671 | 362, 385, 10, 387, 257, 389, 362, 330, 395, 262, | ||||
672 | 329, 330, 362, 362, 362, 347, 362, 329, 329, 362, | ||||
673 | 256, 257, 258, 335, 347, 362, 362, 362, 347, 265, | ||||
674 | 268, 267, 415, 259, 287, 418, 289, 362, 291, 351, | ||||
675 | 362, 353, 362, 10, 362, 422, 266, 424, 363, 259, | ||||
676 | 286, 333, 305, 363, 333, 362, 433, 434, 278, 333, | ||||
677 | 296, 333, 297, 298, 279, 333, 302, 333, 333, 363, | ||||
678 | 333, 362, 333, 309, 362, 259, 329, 313, 314, 299, | ||||
679 | 362, 333, 335, 362, 123, 321, 44, 323, 362, 362, | ||||
680 | 362, 327, 266, 362, 362, 10, 362, 362, 351, 362, | ||||
681 | 353, 362, 362, 339, 278, 355, 342, 123, 362, 333, | ||||
682 | 362, 362, 348, 362, 350, 335, 336, 337, 426, 333, | ||||
683 | 428, 355, 355, 431, 432, 299, 362, 362, 329, 355, | ||||
684 | 356, 357, 362, 359, 362, 361, 10, 362, 362, 362, | ||||
685 | 524, 363, 526, 527, 528, 355, 356, 357, 362, 359, | ||||
686 | 425, 361, 427, 537, 429, 430, 333, 432, 333, 299, | ||||
687 | 544, 335, 336, 337, 548, 362, 550, 315, 552, 278, | ||||
688 | 554, 355, 356, 357, 317, 359, 560, 361, 562, 262, | ||||
689 | 362, 264, 262, 333, 267, 362, 333, 362, 271, 262, | ||||
690 | 362, 264, 333, 362, 267, 362, 279, 362, 271, 362, | ||||
691 | 362, 362, 10, 286, 362, 285, 279, 362, 291, 292, | ||||
692 | 293, 291, 362, 286, 262, 362, 362, 362, 291, 292, | ||||
693 | 293, 362, 305, 266, 362, 305, 335, 336, 337, 362, | ||||
694 | 425, 426, 305, 428, 362, 278, 431, 432, 321, 287, | ||||
695 | 33, 289, 325, 291, 362, 358, 362, 358, 321, 329, | ||||
696 | 330, 308, 325, 125, 262, 263, 299, 305, 428, 267, | ||||
697 | 362, 431, 432, 271, 347, 348, 362, 347, 262, 362, | ||||
698 | 353, 362, 355, 362, 347, 348, 33, 362, 286, 123, | ||||
699 | 353, 329, 355, 262, 362, 125, 294, 295, 123, 297, | ||||
700 | 298, 285, 335, 336, 337, 262, 263, 291, 309, 307, | ||||
701 | 267, 123, 309, 351, 271, 353, 285, 309, 316, 309, | ||||
702 | 309, 305, 291, 321, 322, 285, 309, 325, 326, 286, | ||||
703 | 309, 291, 309, 62, 332, 362, 305, 294, 295, 10, | ||||
704 | 297, 298, 362, 341, 362, 125, 330, 345, 125, 125, | ||||
705 | 307, 342, 125, 351, 345, 353, 354, 262, 263, 316, | ||||
706 | 362, 330, 267, 347, 321, 322, 271, 362, 325, 326, | ||||
707 | 330, 362, 363, 425, 426, 332, 428, 362, 347, 431, | ||||
708 | 432, 286, 362, 10, 341, 10, 10, 347, 345, 294, | ||||
709 | 295, 10, 297, 298, 351, 123, 353, 354, 262, 263, | ||||
710 | 10, 10, 307, 267, 10, 10, 10, 271, 123, 123, | ||||
711 | 284, 316, 123, 426, 288, 428, 321, 322, 431, 432, | ||||
712 | 325, 326, 286, 362, 446, 407, 377, 332, 110, 303, | ||||
713 | 294, 295, 306, 297, 298, 405, 341, 99, 312, 313, | ||||
714 | 345, 175, 114, 307, 206, 426, 351, 428, 353, 354, | ||||
715 | 431, 432, 316, 209, 95, 479, 430, 321, 322, 211, | ||||
716 | 334, 325, 326, 235, 262, 263, 258, -1, 332, 267, | ||||
717 | -1, 482, -1, 271, 257, -1, -1, 341, -1, 262, | ||||
718 | 491, 345, -1, -1, -1, 496, 497, 351, 286, 353, | ||||
719 | 354, -1, -1, -1, -1, 506, 294, 295, -1, 297, | ||||
720 | 298, -1, -1, -1, 287, -1, 289, 518, 291, 307, | ||||
721 | 257, -1, -1, -1, -1, 262, -1, -1, 316, -1, | ||||
722 | -1, -1, 305, 321, 322, -1, -1, 325, 326, -1, | ||||
723 | 262, 263, -1, -1, 332, 267, -1, -1, -1, 271, | ||||
724 | 287, -1, 289, 341, 291, -1, 329, 345, -1, -1, | ||||
725 | -1, -1, 335, 351, 286, 353, 354, -1, 305, -1, | ||||
726 | -1, -1, 294, 295, -1, 297, 298, -1, 351, -1, | ||||
727 | 353, 425, 426, 427, 428, 307, -1, 431, 432, -1, | ||||
728 | -1, -1, 329, -1, 316, -1, -1, -1, 335, 321, | ||||
729 | 322, -1, -1, 325, 326, -1, -1, -1, -1, -1, | ||||
730 | 332, -1, -1, 262, 351, 264, 353, -1, 267, 341, | ||||
731 | -1, -1, 271, 345, -1, -1, -1, -1, -1, 351, | ||||
732 | 279, 353, 354, -1, -1, -1, -1, 286, -1, -1, | ||||
733 | -1, -1, 291, 292, 293, -1, -1, -1, -1, -1, | ||||
734 | -1, -1, -1, -1, -1, -1, 305, -1, -1, -1, | ||||
735 | -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, | ||||
736 | -1, -1, 321, -1, -1, -1, 325, -1, -1, -1, | ||||
737 | -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, | ||||
738 | -1, -1, -1, -1, -1, -1, -1, -1, 347, 348, | ||||
739 | -1, -1, -1, -1, 353, | ||||
740 | }; | ||||
741 | #define YYFINAL1 1 | ||||
742 | #ifndef YYDEBUG0 | ||||
743 | #define YYDEBUG0 0 | ||||
744 | #endif | ||||
745 | #define YYMAXTOKEN363 363 | ||||
746 | #if YYDEBUG0 | ||||
747 | const char * const yyname[] = | ||||
748 | { | ||||
749 | "end-of-file",0,0,0,0,0,0,0,0,0,"'\\n'",0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, | ||||
750 | 0,0,"'!'",0,0,0,0,0,0,0,0,0,0,"','",0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,"'<'","'='", | ||||
751 | "'>'",0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, | ||||
752 | 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,"'{'",0,"'}'",0,0,0,0,0,0,0,0,0,0, | ||||
753 | 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, | ||||
754 | 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, | ||||
755 | 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, | ||||
756 | 0,"ACTION","ADMD","ALIAS","ANY","ARROW","AUTH","AUTH_OPTIONAL","BACKUP", | ||||
757 | "BOUNCE","BYPASS","CA","CERT","CHAIN","CHROOT","CIPHERS","COMMIT","COMPRESSION", | ||||
758 | "CONNECT","DATA","DATA_LINE","DHE","DISCONNECT","DOMAIN","EHLO","ENABLE", | ||||
759 | "ENCRYPTION","ERROR","EXPAND_ONLY","FCRDNS","FILTER","FOR","FORWARD_ONLY", | ||||
760 | "FROM","GROUP","HELO","HELO_SRC","HOST","HOSTNAME","HOSTNAMES","INCLUDE", | ||||
761 | "INET4","INET6","JUNK","KEY","LIMIT","LISTEN","LMTP","LOCAL","MAIL_FROM", | ||||
762 | "MAILDIR","MASK_SRC","MASQUERADE","MATCH","MAX_MESSAGE_SIZE","MAX_DEFERRED", | ||||
763 | "MBOX","MDA","MTA","MX","NO_DSN","NO_VERIFY","NOOP","ON","PHASE","PKI","PORT", | ||||
764 | "PROC","PROC_EXEC","PROTOCOLS","PROXY_V2","QUEUE","QUIT","RCPT_TO","RDNS", | ||||
765 | "RECIPIENT","RECEIVEDAUTH","REGEX","RELAY","REJECT","REPORT","REWRITE","RSET", | ||||
766 | "SCHEDULER","SENDER","SENDERS","SMTP","SMTP_IN","SMTP_OUT","SMTPS","SOCKET", | ||||
767 | "SRC","SRS","SUB_ADDR_DELIM","TABLE","TAG","TAGGED","TLS","TLS_REQUIRE","TTL", | ||||
768 | "USER","USERBASE","VERIFY","VIRTUAL","WARN_INTERVAL","WRAPPER","STRING", | ||||
769 | "NUMBER", | ||||
770 | }; | ||||
771 | const char * const yyrule[] = | ||||
772 | {"$accept : grammar", | ||||
773 | "grammar :", | ||||
774 | "grammar : grammar '\\n'", | ||||
775 | "grammar : grammar include '\\n'", | ||||
776 | "grammar : grammar varset '\\n'", | ||||
777 | "grammar : grammar bounce '\\n'", | ||||
778 | "grammar : grammar admd '\\n'", | ||||
779 | "grammar : grammar ca '\\n'", | ||||
780 | "grammar : grammar mda '\\n'", | ||||
781 | "grammar : grammar mta '\\n'", | ||||
782 | "grammar : grammar pki '\\n'", | ||||
783 | "grammar : grammar proc '\\n'", | ||||
784 | "grammar : grammar queue '\\n'", | ||||
785 | "grammar : grammar scheduler '\\n'", | ||||
786 | "grammar : grammar smtp '\\n'", | ||||
787 | "grammar : grammar srs '\\n'", | ||||
788 | "grammar : grammar listen '\\n'", | ||||
789 | "grammar : grammar table '\\n'", | ||||
790 | "grammar : grammar dispatcher '\\n'", | ||||
791 | "grammar : grammar match '\\n'", | ||||
792 | "grammar : grammar filter '\\n'", | ||||
793 | "grammar : grammar error '\\n'", | ||||
794 | "include : INCLUDE STRING", | ||||
795 | "varset : STRING '=' STRING", | ||||
796 | "comma : ','", | ||||
797 | "comma : nl", | ||||
798 | "comma :", | ||||
799 | "optnl : '\\n' optnl", | ||||
800 | "optnl :", | ||||
801 | "nl : '\\n' optnl", | ||||
802 | "negation : '!'", | ||||
803 | "negation :", | ||||
804 | "assign : '='", | ||||
805 | "assign : ARROW", | ||||
806 | "keyval : STRING assign STRING", | ||||
807 | "keyval_list : keyval", | ||||
808 | "keyval_list : keyval comma keyval_list", | ||||
809 | "stringel : STRING", | ||||
810 | "string_list : stringel", | ||||
811 | "string_list : stringel comma string_list", | ||||
812 | "tableval_list : string_list", | ||||
813 | "tableval_list : keyval_list", | ||||
814 | "$$1 :", | ||||
815 | "bounce : BOUNCE WARN_INTERVAL $$1 bouncedelays", | ||||
816 | "admd : ADMD STRING", | ||||
817 | "$$2 :", | ||||
818 | "ca : CA STRING $$2 ca_params", | ||||
819 | "ca_params_opt : CERT STRING", | ||||
820 | "ca_params : ca_params_opt", | ||||
821 | "mda : MDA LIMIT limits_mda", | ||||
822 | "mda : MDA WRAPPER STRING STRING", | ||||
823 | "mta : MTA MAX_DEFERRED NUMBER", | ||||
824 | "$$3 :", | ||||
825 | "mta : MTA LIMIT FOR DOMAIN STRING $$3 limits_mta", | ||||
826 | "$$4 :", | ||||
827 | "mta : MTA LIMIT $$4 limits_mta", | ||||
828 | "$$5 :", | ||||
829 | "pki : PKI STRING $$5 pki_params", | ||||
830 | "pki_params_opt : CERT STRING", | ||||
831 | "pki_params_opt : KEY STRING", | ||||
832 | "pki_params_opt : DHE STRING", | ||||
833 | "pki_params : pki_params_opt pki_params", | ||||
834 | "pki_params :", | ||||
835 | "$$6 :", | ||||
836 | "proc : PROC STRING STRING $$6 proc_params", | ||||
837 | "proc_params_opt : USER STRING", | ||||
838 | "proc_params_opt : GROUP STRING", | ||||
839 | "proc_params_opt : CHROOT STRING", | ||||
840 | "proc_params : proc_params_opt proc_params", | ||||
841 | "proc_params :", | ||||
842 | "queue : QUEUE COMPRESSION", | ||||
843 | "queue : QUEUE ENCRYPTION", | ||||
844 | "queue : QUEUE ENCRYPTION STRING", | ||||
845 | "queue : QUEUE TTL STRING", | ||||
846 | "scheduler : SCHEDULER LIMIT limits_scheduler", | ||||
847 | "smtp : SMTP LIMIT limits_smtp", | ||||
848 | "smtp : SMTP CIPHERS STRING", | ||||
849 | "smtp : SMTP MAX_MESSAGE_SIZE size", | ||||
850 | "smtp : SMTP SUB_ADDR_DELIM STRING", | ||||
851 | "srs : SRS KEY STRING", | ||||
852 | "srs : SRS KEY BACKUP STRING", | ||||
853 | "srs : SRS TTL STRING", | ||||
854 | "dispatcher_local_option : USER STRING", | ||||
855 | "dispatcher_local_option : ALIAS tables", | ||||
856 | "dispatcher_local_option : VIRTUAL tables", | ||||
857 | "dispatcher_local_option : USERBASE tables", | ||||
858 | "dispatcher_local_option : WRAPPER STRING", | ||||
859 | "dispatcher_local_options : dispatcher_local_option dispatcher_local_options", | ||||
860 | "dispatcher_local_options :", | ||||
861 | "$$7 :", | ||||
862 | "dispatcher_local : MBOX $$7 dispatcher_local_options", | ||||
863 | "$$8 :", | ||||
864 | "dispatcher_local : MAILDIR $$8 dispatcher_local_options", | ||||
865 | "$$9 :", | ||||
866 | "dispatcher_local : MAILDIR JUNK $$9 dispatcher_local_options", | ||||
867 | "$$10 :", | ||||
868 | "dispatcher_local : MAILDIR STRING $$10 dispatcher_local_options", | ||||
869 | "$$11 :", | ||||
870 | "dispatcher_local : MAILDIR STRING JUNK $$11 dispatcher_local_options", | ||||
871 | "$$12 :", | ||||
872 | "dispatcher_local : LMTP STRING $$12 dispatcher_local_options", | ||||
873 | "$$13 :", | ||||
874 | "dispatcher_local : LMTP STRING RCPT_TO $$13 dispatcher_local_options", | ||||
875 | "$$14 :", | ||||
876 | "dispatcher_local : MDA STRING $$14 dispatcher_local_options", | ||||
877 | "$$15 :", | ||||
878 | "dispatcher_local : FORWARD_ONLY $$15 dispatcher_local_options", | ||||
879 | "$$16 :", | ||||
880 | "dispatcher_local : EXPAND_ONLY $$16 dispatcher_local_options", | ||||
881 | "dispatcher_remote_option : HELO STRING", | ||||
882 | "dispatcher_remote_option : HELO_SRC tables", | ||||
883 | "dispatcher_remote_option : PKI STRING", | ||||
884 | "dispatcher_remote_option : CA STRING", | ||||
885 | "dispatcher_remote_option : CIPHERS STRING", | ||||
886 | "dispatcher_remote_option : PROTOCOLS STRING", | ||||
887 | "dispatcher_remote_option : SRC tables", | ||||
888 | "dispatcher_remote_option : MAIL_FROM STRING", | ||||
889 | "dispatcher_remote_option : BACKUP MX STRING", | ||||
890 | "dispatcher_remote_option : BACKUP", | ||||
891 | "dispatcher_remote_option : HOST tables", | ||||
892 | "dispatcher_remote_option : DOMAIN tables", | ||||
893 | "dispatcher_remote_option : TLS", | ||||
894 | "dispatcher_remote_option : TLS NO_VERIFY", | ||||
895 | "dispatcher_remote_option : AUTH tables", | ||||
896 | "dispatcher_remote_option : FILTER STRING", | ||||
897 | "$$17 :", | ||||
898 | "dispatcher_remote_option : FILTER $$17 '{' filter_list '}'", | ||||
899 | "dispatcher_remote_option : SRS", | ||||
900 | "dispatcher_remote_options : dispatcher_remote_option dispatcher_remote_options", | ||||
901 | "dispatcher_remote_options :", | ||||
902 | "dispatcher_remote : RELAY dispatcher_remote_options", | ||||
903 | "dispatcher_type : dispatcher_local", | ||||
904 | "dispatcher_type : dispatcher_remote", | ||||
905 | "dispatcher_option : TTL STRING", | ||||
906 | "dispatcher_options : dispatcher_option dispatcher_options", | ||||
907 | "dispatcher_options :", | ||||
908 | "$$18 :", | ||||
909 | "dispatcher : ACTION STRING $$18 dispatcher_type dispatcher_options", | ||||
910 | "match_option : negation TAG tables", | ||||
911 | "match_option : negation TAG REGEX tables", | ||||
912 | "match_option : negation HELO tables", | ||||
913 | "match_option : negation HELO REGEX tables", | ||||
914 | "match_option : negation TLS", | ||||
915 | "match_option : negation AUTH", | ||||
916 | "match_option : negation AUTH tables", | ||||
917 | "match_option : negation AUTH REGEX tables", | ||||
918 | "match_option : negation MAIL_FROM tables", | ||||
919 | "match_option : negation MAIL_FROM REGEX tables", | ||||
920 | "match_option : negation RCPT_TO tables", | ||||
921 | "match_option : negation RCPT_TO REGEX tables", | ||||
922 | "match_option : negation FROM SOCKET", | ||||
923 | "match_option : negation FROM LOCAL", | ||||
924 | "match_option : negation FROM ANY", | ||||
925 | "match_option : negation FROM SRC tables", | ||||
926 | "match_option : negation FROM SRC REGEX tables", | ||||
927 | "match_option : negation FROM RDNS", | ||||
928 | "match_option : negation FROM RDNS tables", | ||||
929 | "match_option : negation FROM RDNS REGEX tables", | ||||
930 | "match_option : negation FROM AUTH", | ||||
931 | "match_option : negation FROM AUTH tables", | ||||
932 | "match_option : negation FROM AUTH REGEX tables", | ||||
933 | "match_option : negation FROM MAIL_FROM tables", | ||||
934 | "match_option : negation FROM MAIL_FROM REGEX tables", | ||||
935 | "match_option : negation FOR LOCAL", | ||||
936 | "match_option : negation FOR ANY", | ||||
937 | "match_option : negation FOR DOMAIN tables", | ||||
938 | "match_option : negation FOR DOMAIN REGEX tables", | ||||
939 | "match_option : negation FOR RCPT_TO tables", | ||||
940 | "match_option : negation FOR RCPT_TO REGEX tables", | ||||
941 | "match_options : match_option match_options", | ||||
942 | "match_options :", | ||||
943 | "match_dispatcher : STRING", | ||||
944 | "action : REJECT", | ||||
945 | "action : ACTION match_dispatcher", | ||||
946 | "$$19 :", | ||||
947 | "match : MATCH $$19 match_options action", | ||||
948 | "filter_action_builtin : filter_action_builtin_nojunk", | ||||
949 | "filter_action_builtin : JUNK", | ||||
950 | "filter_action_builtin : BYPASS", | ||||
951 | "filter_action_builtin_nojunk : REJECT STRING", | ||||
952 | "filter_action_builtin_nojunk : DISCONNECT STRING", | ||||
953 | "filter_action_builtin_nojunk : REWRITE STRING", | ||||
954 | "filter_action_builtin_nojunk : REPORT STRING", | ||||
955 | "filter_phase_check_fcrdns : negation FCRDNS", | ||||
956 | "filter_phase_check_rdns : negation RDNS", | ||||
957 | "filter_phase_check_rdns_table : negation RDNS tables", | ||||
958 | "filter_phase_check_rdns_regex : negation RDNS REGEX tables", | ||||
959 | "filter_phase_check_src_table : negation SRC tables", | ||||
960 | "filter_phase_check_src_regex : negation SRC REGEX tables", | ||||
961 | "filter_phase_check_helo_table : negation HELO tables", | ||||
962 | "filter_phase_check_helo_regex : negation HELO REGEX tables", | ||||
963 | "filter_phase_check_auth : negation AUTH", | ||||
964 | "filter_phase_check_auth_table : negation AUTH tables", | ||||
965 | "filter_phase_check_auth_regex : negation AUTH REGEX tables", | ||||
966 | "filter_phase_check_mail_from_table : negation MAIL_FROM tables", | ||||
967 | "filter_phase_check_mail_from_regex : negation MAIL_FROM REGEX tables", | ||||
968 | "filter_phase_check_rcpt_to_table : negation RCPT_TO tables", | ||||
969 | "filter_phase_check_rcpt_to_regex : negation RCPT_TO REGEX tables", | ||||
970 | "filter_phase_global_options : filter_phase_check_fcrdns", | ||||
971 | "filter_phase_global_options : filter_phase_check_rdns", | ||||
972 | "filter_phase_global_options : filter_phase_check_rdns_regex", | ||||
973 | "filter_phase_global_options : filter_phase_check_rdns_table", | ||||
974 | "filter_phase_global_options : filter_phase_check_src_regex", | ||||
975 | "filter_phase_global_options : filter_phase_check_src_table", | ||||
976 | "filter_phase_connect_options : filter_phase_global_options", | ||||
977 | "filter_phase_helo_options : filter_phase_check_helo_table", | ||||
978 | "filter_phase_helo_options : filter_phase_check_helo_regex", | ||||
979 | "filter_phase_helo_options : filter_phase_global_options", | ||||
980 | "filter_phase_auth_options : filter_phase_check_helo_table", | ||||
981 | "filter_phase_auth_options : filter_phase_check_helo_regex", | ||||
982 | "filter_phase_auth_options : filter_phase_check_auth", | ||||
983 | "filter_phase_auth_options : filter_phase_check_auth_table", | ||||
984 | "filter_phase_auth_options : filter_phase_check_auth_regex", | ||||
985 | "filter_phase_auth_options : filter_phase_global_options", | ||||
986 | "filter_phase_mail_from_options : filter_phase_check_helo_table", | ||||
987 | "filter_phase_mail_from_options : filter_phase_check_helo_regex", | ||||
988 | "filter_phase_mail_from_options : filter_phase_check_auth", | ||||
989 | "filter_phase_mail_from_options : filter_phase_check_auth_table", | ||||
990 | "filter_phase_mail_from_options : filter_phase_check_auth_regex", | ||||
991 | "filter_phase_mail_from_options : filter_phase_check_mail_from_table", | ||||
992 | "filter_phase_mail_from_options : filter_phase_check_mail_from_regex", | ||||
993 | "filter_phase_mail_from_options : filter_phase_global_options", | ||||
994 | "filter_phase_rcpt_to_options : filter_phase_check_helo_table", | ||||
995 | "filter_phase_rcpt_to_options : filter_phase_check_helo_regex", | ||||
996 | "filter_phase_rcpt_to_options : filter_phase_check_auth", | ||||
997 | "filter_phase_rcpt_to_options : filter_phase_check_auth_table", | ||||
998 | "filter_phase_rcpt_to_options : filter_phase_check_auth_regex", | ||||
999 | "filter_phase_rcpt_to_options : filter_phase_check_mail_from_table", | ||||
1000 | "filter_phase_rcpt_to_options : filter_phase_check_mail_from_regex", | ||||
1001 | "filter_phase_rcpt_to_options : filter_phase_check_rcpt_to_table", | ||||
1002 | "filter_phase_rcpt_to_options : filter_phase_check_rcpt_to_regex", | ||||
1003 | "filter_phase_rcpt_to_options : filter_phase_global_options", | ||||
1004 | "filter_phase_data_options : filter_phase_check_helo_table", | ||||
1005 | "filter_phase_data_options : filter_phase_check_helo_regex", | ||||
1006 | "filter_phase_data_options : filter_phase_check_auth", | ||||
1007 | "filter_phase_data_options : filter_phase_check_auth_table", | ||||
1008 | "filter_phase_data_options : filter_phase_check_auth_regex", | ||||
1009 | "filter_phase_data_options : filter_phase_check_mail_from_table", | ||||
1010 | "filter_phase_data_options : filter_phase_check_mail_from_regex", | ||||
1011 | "filter_phase_data_options : filter_phase_global_options", | ||||
1012 | "filter_phase_commit_options : filter_phase_check_helo_table", | ||||
1013 | "filter_phase_commit_options : filter_phase_check_helo_regex", | ||||
1014 | "filter_phase_commit_options : filter_phase_check_auth", | ||||
1015 | "filter_phase_commit_options : filter_phase_check_auth_table", | ||||
1016 | "filter_phase_commit_options : filter_phase_check_auth_regex", | ||||
1017 | "filter_phase_commit_options : filter_phase_check_mail_from_table", | ||||
1018 | "filter_phase_commit_options : filter_phase_check_mail_from_regex", | ||||
1019 | "filter_phase_commit_options : filter_phase_global_options", | ||||
1020 | "$$20 :", | ||||
1021 | "filter_phase_connect : CONNECT $$20 MATCH filter_phase_connect_options filter_action_builtin", | ||||
1022 | "$$21 :", | ||||
1023 | "filter_phase_helo : HELO $$21 MATCH filter_phase_helo_options filter_action_builtin", | ||||
1024 | "$$22 :", | ||||
1025 | "filter_phase_ehlo : EHLO $$22 MATCH filter_phase_helo_options filter_action_builtin", | ||||
1026 | "$$23 :", | ||||
1027 | "filter_phase_auth : AUTH $$23 MATCH filter_phase_auth_options filter_action_builtin", | ||||
1028 | "$$24 :", | ||||
1029 | "filter_phase_mail_from : MAIL_FROM $$24 MATCH filter_phase_mail_from_options filter_action_builtin", | ||||
1030 | "$$25 :", | ||||
1031 | "filter_phase_rcpt_to : RCPT_TO $$25 MATCH filter_phase_rcpt_to_options filter_action_builtin", | ||||
1032 | "$$26 :", | ||||
1033 | "filter_phase_data : DATA $$26 MATCH filter_phase_data_options filter_action_builtin", | ||||
1034 | "$$27 :", | ||||
1035 | "filter_phase_commit : COMMIT $$27 MATCH filter_phase_commit_options filter_action_builtin_nojunk", | ||||
1036 | "filter_phase : filter_phase_connect", | ||||
1037 | "filter_phase : filter_phase_helo", | ||||
1038 | "filter_phase : filter_phase_ehlo", | ||||
1039 | "filter_phase : filter_phase_auth", | ||||
1040 | "filter_phase : filter_phase_mail_from", | ||||
1041 | "filter_phase : filter_phase_rcpt_to", | ||||
1042 | "filter_phase : filter_phase_data", | ||||
1043 | "filter_phase : filter_phase_commit", | ||||
1044 | "filterel : STRING", | ||||
1045 | "filter_list : filterel", | ||||
1046 | "filter_list : filterel comma filter_list", | ||||
1047 | "filter : FILTER STRING PROC STRING", | ||||
1048 | "$$28 :", | ||||
1049 | "filter : FILTER STRING PROC_EXEC STRING $$28 proc_params", | ||||
1050 | "$$29 :", | ||||
1051 | "filter : FILTER STRING PHASE $$29 filter_phase", | ||||
1052 | "$$30 :", | ||||
1053 | "filter : FILTER STRING CHAIN $$30 '{' filter_list '}'", | ||||
1054 | "size : NUMBER", | ||||
1055 | "size : STRING", | ||||
1056 | "bouncedelay : STRING", | ||||
1057 | "bouncedelays : bouncedelays ',' bouncedelay", | ||||
1058 | "bouncedelays : bouncedelay", | ||||
1059 | "opt_limit_mda : STRING NUMBER", | ||||
1060 | "limits_smtp : opt_limit_smtp limits_smtp", | ||||
1061 | "limits_smtp :", | ||||
1062 | "opt_limit_smtp : STRING NUMBER", | ||||
1063 | "limits_mda : opt_limit_mda limits_mda", | ||||
1064 | "limits_mda :", | ||||
1065 | "opt_limit_mta : INET4", | ||||
1066 | "opt_limit_mta : INET6", | ||||
1067 | "opt_limit_mta : STRING NUMBER", | ||||
1068 | "limits_mta : opt_limit_mta limits_mta", | ||||
1069 | "limits_mta :", | ||||
1070 | "opt_limit_scheduler : STRING NUMBER", | ||||
1071 | "limits_scheduler : opt_limit_scheduler limits_scheduler", | ||||
1072 | "limits_scheduler :", | ||||
1073 | "opt_sock_listen : FILTER STRING", | ||||
1074 | "$$31 :", | ||||
1075 | "opt_sock_listen : FILTER $$31 '{' filter_list '}'", | ||||
1076 | "opt_sock_listen : MASK_SRC", | ||||
1077 | "opt_sock_listen : TAG STRING", | ||||
1078 | "opt_if_listen : INET4", | ||||
1079 | "opt_if_listen : INET6", | ||||
1080 | "opt_if_listen : PORT STRING", | ||||
1081 | "opt_if_listen : PORT SMTP", | ||||
1082 | "opt_if_listen : PORT SMTPS", | ||||
1083 | "opt_if_listen : PORT NUMBER", | ||||
1084 | "opt_if_listen : FILTER STRING", | ||||
1085 | "$$32 :", | ||||
1086 | "opt_if_listen : FILTER $$32 '{' filter_list '}'", | ||||
1087 | "opt_if_listen : SMTPS", | ||||
1088 | "opt_if_listen : SMTPS VERIFY", | ||||
1089 | "opt_if_listen : TLS", | ||||
1090 | "opt_if_listen : TLS_REQUIRE", | ||||
1091 | "opt_if_listen : TLS_REQUIRE VERIFY", | ||||
1092 | "opt_if_listen : CIPHERS STRING", | ||||
1093 | "opt_if_listen : PROTOCOLS STRING", | ||||
1094 | "opt_if_listen : PKI STRING", | ||||
1095 | "opt_if_listen : CA STRING", | ||||
1096 | "opt_if_listen : AUTH", | ||||
1097 | "opt_if_listen : AUTH_OPTIONAL", | ||||
1098 | "opt_if_listen : AUTH tables", | ||||
1099 | "opt_if_listen : AUTH_OPTIONAL tables", | ||||
1100 | "opt_if_listen : TAG STRING", | ||||
1101 | "opt_if_listen : HOSTNAME STRING", | ||||
1102 | "opt_if_listen : HOSTNAMES tables", | ||||
1103 | "opt_if_listen : MASK_SRC", | ||||
1104 | "opt_if_listen : RECEIVEDAUTH", | ||||
1105 | "opt_if_listen : NO_DSN", | ||||
1106 | "opt_if_listen : PROXY_V2", | ||||
1107 | "opt_if_listen : SENDERS tables", | ||||
1108 | "opt_if_listen : SENDERS tables MASQUERADE", | ||||
1109 | "listener_type : socket_listener", | ||||
1110 | "listener_type : if_listener", | ||||
1111 | "socket_listener : SOCKET sock_listen", | ||||
1112 | "if_listener : STRING if_listen", | ||||
1113 | "sock_listen : opt_sock_listen sock_listen", | ||||
1114 | "sock_listen :", | ||||
1115 | "if_listen : opt_if_listen if_listen", | ||||
1116 | "if_listen :", | ||||
1117 | "$$33 :", | ||||
1118 | "listen : LISTEN $$33 ON listener_type", | ||||
1119 | "table : TABLE STRING STRING", | ||||
1120 | "$$34 :", | ||||
1121 | "table : TABLE STRING $$34 '{' tableval_list '}'", | ||||
1122 | "tablenew : STRING", | ||||
1123 | "$$35 :", | ||||
1124 | "tablenew : '{' $$35 tableval_list '}'", | ||||
1125 | "tableref : '<' STRING '>'", | ||||
1126 | "tables : tablenew", | ||||
1127 | "tables : tableref", | ||||
1128 | }; | ||||
1129 | #endif | ||||
1130 | #ifdef YYSTACKSIZE10000 | ||||
1131 | #undef YYMAXDEPTH10000 | ||||
1132 | #define YYMAXDEPTH10000 YYSTACKSIZE10000 | ||||
1133 | #else | ||||
1134 | #ifdef YYMAXDEPTH10000 | ||||
1135 | #define YYSTACKSIZE10000 YYMAXDEPTH10000 | ||||
1136 | #else | ||||
1137 | #define YYSTACKSIZE10000 10000 | ||||
1138 | #define YYMAXDEPTH10000 10000 | ||||
1139 | #endif | ||||
1140 | #endif | ||||
1141 | #define YYINITSTACKSIZE200 200 | ||||
1142 | /* LINTUSED */ | ||||
1143 | int yydebug; | ||||
1144 | int yynerrs; | ||||
1145 | int yyerrflag; | ||||
1146 | int yychar; | ||||
1147 | short *yyssp; | ||||
1148 | YYSTYPE *yyvsp; | ||||
1149 | YYSTYPE yyval; | ||||
1150 | YYSTYPE yylval; | ||||
1151 | short *yyss; | ||||
1152 | short *yysslim; | ||||
1153 | YYSTYPE *yyvs; | ||||
1154 | unsigned int yystacksize; | ||||
1155 | int yyparse(void); | ||||
1156 | #line 2608 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
1157 | |||||
1158 | struct keywords { | ||||
1159 | const char *k_name; | ||||
1160 | int k_val; | ||||
1161 | }; | ||||
1162 | |||||
1163 | int | ||||
1164 | yyerror(const char *fmt, ...) | ||||
1165 | { | ||||
1166 | va_list ap; | ||||
1167 | char *msg; | ||||
1168 | |||||
1169 | file->errors++; | ||||
1170 | va_start(ap, fmt)__builtin_va_start(ap, fmt); | ||||
1171 | if (vasprintf(&msg, fmt, ap) == -1) | ||||
1172 | fatalx("yyerror vasprintf"); | ||||
1173 | va_end(ap)__builtin_va_end(ap); | ||||
1174 | logit(LOG_CRIT2, "%s:%d: %s", file->name, yylval.lineno, msg); | ||||
1175 | free(msg); | ||||
1176 | return (0); | ||||
1177 | } | ||||
1178 | |||||
1179 | int | ||||
1180 | kw_cmp(const void *k, const void *e) | ||||
1181 | { | ||||
1182 | return (strcmp(k, ((const struct keywords *)e)->k_name)); | ||||
1183 | } | ||||
1184 | |||||
1185 | int | ||||
1186 | lookup(char *s) | ||||
1187 | { | ||||
1188 | /* this has to be sorted always */ | ||||
1189 | static const struct keywords keywords[] = { | ||||
1190 | { "action", ACTION257 }, | ||||
1191 | { "admd", ADMD258 }, | ||||
1192 | { "alias", ALIAS259 }, | ||||
1193 | { "any", ANY260 }, | ||||
1194 | { "auth", AUTH262 }, | ||||
1195 | { "auth-optional", AUTH_OPTIONAL263 }, | ||||
1196 | { "backup", BACKUP264 }, | ||||
1197 | { "bounce", BOUNCE265 }, | ||||
1198 | { "bypass", BYPASS266 }, | ||||
1199 | { "ca", CA267 }, | ||||
1200 | { "cert", CERT268 }, | ||||
1201 | { "chain", CHAIN269 }, | ||||
1202 | { "chroot", CHROOT270 }, | ||||
1203 | { "ciphers", CIPHERS271 }, | ||||
1204 | { "commit", COMMIT272 }, | ||||
1205 | { "compression", COMPRESSION273 }, | ||||
1206 | { "connect", CONNECT274 }, | ||||
1207 | { "data", DATA275 }, | ||||
1208 | { "data-line", DATA_LINE276 }, | ||||
1209 | { "dhe", DHE277 }, | ||||
1210 | { "disconnect", DISCONNECT278 }, | ||||
1211 | { "domain", DOMAIN279 }, | ||||
1212 | { "ehlo", EHLO280 }, | ||||
1213 | { "encryption", ENCRYPTION282 }, | ||||
1214 | { "expand-only", EXPAND_ONLY284 }, | ||||
1215 | { "fcrdns", FCRDNS285 }, | ||||
1216 | { "filter", FILTER286 }, | ||||
1217 | { "for", FOR287 }, | ||||
1218 | { "forward-only", FORWARD_ONLY288 }, | ||||
1219 | { "from", FROM289 }, | ||||
1220 | { "group", GROUP290 }, | ||||
1221 | { "helo", HELO291 }, | ||||
1222 | { "helo-src", HELO_SRC292 }, | ||||
1223 | { "host", HOST293 }, | ||||
1224 | { "hostname", HOSTNAME294 }, | ||||
1225 | { "hostnames", HOSTNAMES295 }, | ||||
1226 | { "include", INCLUDE296 }, | ||||
1227 | { "inet4", INET4297 }, | ||||
1228 | { "inet6", INET6298 }, | ||||
1229 | { "junk", JUNK299 }, | ||||
1230 | { "key", KEY300 }, | ||||
1231 | { "limit", LIMIT301 }, | ||||
1232 | { "listen", LISTEN302 }, | ||||
1233 | { "lmtp", LMTP303 }, | ||||
1234 | { "local", LOCAL304 }, | ||||
1235 | { "mail-from", MAIL_FROM305 }, | ||||
1236 | { "maildir", MAILDIR306 }, | ||||
1237 | { "mask-src", MASK_SRC307 }, | ||||
1238 | { "masquerade", MASQUERADE308 }, | ||||
1239 | { "match", MATCH309 }, | ||||
1240 | { "max-deferred", MAX_DEFERRED311 }, | ||||
1241 | { "max-message-size", MAX_MESSAGE_SIZE310 }, | ||||
1242 | { "mbox", MBOX312 }, | ||||
1243 | { "mda", MDA313 }, | ||||
1244 | { "mta", MTA314 }, | ||||
1245 | { "mx", MX315 }, | ||||
1246 | { "no-dsn", NO_DSN316 }, | ||||
1247 | { "no-verify", NO_VERIFY317 }, | ||||
1248 | { "noop", NOOP318 }, | ||||
1249 | { "on", ON319 }, | ||||
1250 | { "phase", PHASE320 }, | ||||
1251 | { "pki", PKI321 }, | ||||
1252 | { "port", PORT322 }, | ||||
1253 | { "proc", PROC323 }, | ||||
1254 | { "proc-exec", PROC_EXEC324 }, | ||||
1255 | { "protocols", PROTOCOLS325 }, | ||||
1256 | { "proxy-v2", PROXY_V2326 }, | ||||
1257 | { "queue", QUEUE327 }, | ||||
1258 | { "quit", QUIT328 }, | ||||
1259 | { "rcpt-to", RCPT_TO329 }, | ||||
1260 | { "rdns", RDNS330 }, | ||||
1261 | { "received-auth", RECEIVEDAUTH332 }, | ||||
1262 | { "recipient", RECIPIENT331 }, | ||||
1263 | { "regex", REGEX333 }, | ||||
1264 | { "reject", REJECT335 }, | ||||
1265 | { "relay", RELAY334 }, | ||||
1266 | { "report", REPORT336 }, | ||||
1267 | { "rewrite", REWRITE337 }, | ||||
1268 | { "rset", RSET338 }, | ||||
1269 | { "scheduler", SCHEDULER339 }, | ||||
1270 | { "senders", SENDERS341 }, | ||||
1271 | { "smtp", SMTP342 }, | ||||
1272 | { "smtp-in", SMTP_IN343 }, | ||||
1273 | { "smtp-out", SMTP_OUT344 }, | ||||
1274 | { "smtps", SMTPS345 }, | ||||
1275 | { "socket", SOCKET346 }, | ||||
1276 | { "src", SRC347 }, | ||||
1277 | { "srs", SRS348 }, | ||||
1278 | { "sub-addr-delim", SUB_ADDR_DELIM349 }, | ||||
1279 | { "table", TABLE350 }, | ||||
1280 | { "tag", TAG351 }, | ||||
1281 | { "tagged", TAGGED352 }, | ||||
1282 | { "tls", TLS353 }, | ||||
1283 | { "tls-require", TLS_REQUIRE354 }, | ||||
1284 | { "ttl", TTL355 }, | ||||
1285 | { "user", USER356 }, | ||||
1286 | { "userbase", USERBASE357 }, | ||||
1287 | { "verify", VERIFY358 }, | ||||
1288 | { "virtual", VIRTUAL359 }, | ||||
1289 | { "warn-interval", WARN_INTERVAL360 }, | ||||
1290 | { "wrapper", WRAPPER361 }, | ||||
1291 | }; | ||||
1292 | const struct keywords *p; | ||||
1293 | |||||
1294 | p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]), | ||||
1295 | sizeof(keywords[0]), kw_cmp); | ||||
1296 | |||||
1297 | if (p) | ||||
1298 | return (p->k_val); | ||||
1299 | else | ||||
1300 | return (STRING362); | ||||
1301 | } | ||||
1302 | |||||
1303 | #define START_EXPAND1 1 | ||||
1304 | #define DONE_EXPAND2 2 | ||||
1305 | |||||
1306 | static int expanding; | ||||
1307 | |||||
1308 | int | ||||
1309 | igetc(void) | ||||
1310 | { | ||||
1311 | int c; | ||||
1312 | |||||
1313 | while (1) { | ||||
1314 | if (file->ungetpos > 0) | ||||
1315 | c = file->ungetbuf[--file->ungetpos]; | ||||
1316 | else | ||||
1317 | c = getc(file->stream)(!__isthreaded ? (--(file->stream)->_r < 0 ? __srget (file->stream) : (int)(*(file->stream)->_p++)) : (getc )(file->stream)); | ||||
1318 | |||||
1319 | if (c == START_EXPAND1) | ||||
1320 | expanding = 1; | ||||
1321 | else if (c == DONE_EXPAND2) | ||||
1322 | expanding = 0; | ||||
1323 | else | ||||
1324 | break; | ||||
1325 | } | ||||
1326 | return (c); | ||||
1327 | } | ||||
1328 | |||||
1329 | int | ||||
1330 | lgetc(int quotec) | ||||
1331 | { | ||||
1332 | int c, next; | ||||
1333 | |||||
1334 | if (quotec) { | ||||
1335 | if ((c = igetc()) == EOF(-1)) { | ||||
1336 | yyerror("reached end of file while parsing " | ||||
1337 | "quoted string"); | ||||
1338 | if (file == topfile || popfile() == EOF(-1)) | ||||
1339 | return (EOF(-1)); | ||||
1340 | return (quotec); | ||||
1341 | } | ||||
1342 | return (c); | ||||
1343 | } | ||||
1344 | |||||
1345 | while ((c = igetc()) == '\\') { | ||||
1346 | next = igetc(); | ||||
1347 | if (next != '\n') { | ||||
1348 | c = next; | ||||
1349 | break; | ||||
1350 | } | ||||
1351 | yylval.lineno = file->lineno; | ||||
1352 | file->lineno++; | ||||
1353 | } | ||||
1354 | |||||
1355 | if (c == EOF(-1)) { | ||||
1356 | /* | ||||
1357 | * Fake EOL when hit EOF for the first time. This gets line | ||||
1358 | * count right if last line in included file is syntactically | ||||
1359 | * invalid and has no newline. | ||||
1360 | */ | ||||
1361 | if (file->eof_reached == 0) { | ||||
1362 | file->eof_reached = 1; | ||||
1363 | return ('\n'); | ||||
1364 | } | ||||
1365 | while (c == EOF(-1)) { | ||||
1366 | if (file == topfile || popfile() == EOF(-1)) | ||||
1367 | return (EOF(-1)); | ||||
1368 | c = igetc(); | ||||
1369 | } | ||||
1370 | } | ||||
1371 | return (c); | ||||
1372 | } | ||||
1373 | |||||
1374 | void | ||||
1375 | lungetc(int c) | ||||
1376 | { | ||||
1377 | if (c == EOF(-1)) | ||||
1378 | return; | ||||
1379 | |||||
1380 | if (file->ungetpos >= file->ungetsize) { | ||||
1381 | void *p = reallocarray(file->ungetbuf, file->ungetsize, 2); | ||||
1382 | if (p == NULL((void *)0)) | ||||
1383 | fatal("%s", __func__); | ||||
1384 | file->ungetbuf = p; | ||||
1385 | file->ungetsize *= 2; | ||||
1386 | } | ||||
1387 | file->ungetbuf[file->ungetpos++] = c; | ||||
1388 | } | ||||
1389 | |||||
1390 | int | ||||
1391 | findeol(void) | ||||
1392 | { | ||||
1393 | int c; | ||||
1394 | |||||
1395 | /* skip to either EOF or the first real EOL */ | ||||
1396 | while (1) { | ||||
1397 | c = lgetc(0); | ||||
1398 | if (c == '\n') { | ||||
1399 | file->lineno++; | ||||
1400 | break; | ||||
1401 | } | ||||
1402 | if (c == EOF(-1)) | ||||
1403 | break; | ||||
1404 | } | ||||
1405 | return (ERROR283); | ||||
1406 | } | ||||
1407 | |||||
1408 | int | ||||
1409 | yylex(void) | ||||
1410 | { | ||||
1411 | char buf[8096]; | ||||
1412 | char *p, *val; | ||||
1413 | int quotec, next, c; | ||||
1414 | int token; | ||||
1415 | |||||
1416 | top: | ||||
1417 | p = buf; | ||||
1418 | while ((c = lgetc(0)) == ' ' || c == '\t') | ||||
1419 | ; /* nothing */ | ||||
1420 | |||||
1421 | yylval.lineno = file->lineno; | ||||
1422 | if (c == '#') | ||||
1423 | while ((c = lgetc(0)) != '\n' && c != EOF(-1)) | ||||
1424 | ; /* nothing */ | ||||
1425 | if (c == '$' && !expanding) { | ||||
1426 | while (1) { | ||||
1427 | if ((c = lgetc(0)) == EOF(-1)) | ||||
1428 | return (0); | ||||
1429 | |||||
1430 | if (p + 1 >= buf + sizeof(buf) - 1) { | ||||
1431 | yyerror("string too long"); | ||||
1432 | return (findeol()); | ||||
1433 | } | ||||
1434 | if (isalnum(c) || c == '_') { | ||||
1435 | *p++ = c; | ||||
1436 | continue; | ||||
1437 | } | ||||
1438 | *p = '\0'; | ||||
1439 | lungetc(c); | ||||
1440 | break; | ||||
1441 | } | ||||
1442 | val = symget(buf); | ||||
1443 | if (val == NULL((void *)0)) { | ||||
1444 | yyerror("macro '%s' not defined", buf); | ||||
1445 | return (findeol()); | ||||
1446 | } | ||||
1447 | p = val + strlen(val) - 1; | ||||
1448 | lungetc(DONE_EXPAND2); | ||||
1449 | while (p >= val) { | ||||
1450 | lungetc((unsigned char)*p); | ||||
1451 | p--; | ||||
1452 | } | ||||
1453 | lungetc(START_EXPAND1); | ||||
1454 | goto top; | ||||
1455 | } | ||||
1456 | |||||
1457 | switch (c) { | ||||
1458 | case '\'': | ||||
1459 | case '"': | ||||
1460 | quotec = c; | ||||
1461 | while (1) { | ||||
1462 | if ((c = lgetc(quotec)) == EOF(-1)) | ||||
1463 | return (0); | ||||
1464 | if (c == '\n') { | ||||
1465 | file->lineno++; | ||||
1466 | continue; | ||||
1467 | } else if (c == '\\') { | ||||
1468 | if ((next = lgetc(quotec)) == EOF(-1)) | ||||
1469 | return (0); | ||||
1470 | if (next == quotec || next == ' ' || | ||||
1471 | next == '\t') | ||||
1472 | c = next; | ||||
1473 | else if (next == '\n') { | ||||
1474 | file->lineno++; | ||||
1475 | continue; | ||||
1476 | } else | ||||
1477 | lungetc(next); | ||||
1478 | } else if (c == quotec) { | ||||
1479 | *p = '\0'; | ||||
1480 | break; | ||||
1481 | } else if (c == '\0') { | ||||
1482 | yyerror("syntax error"); | ||||
1483 | return (findeol()); | ||||
1484 | } | ||||
1485 | if (p + 1 >= buf + sizeof(buf) - 1) { | ||||
1486 | yyerror("string too long"); | ||||
1487 | return (findeol()); | ||||
1488 | } | ||||
1489 | *p++ = c; | ||||
1490 | } | ||||
1491 | yylval.v.string = strdup(buf); | ||||
1492 | if (yylval.v.string == NULL((void *)0)) | ||||
1493 | fatal("%s", __func__); | ||||
1494 | return (STRING362); | ||||
1495 | } | ||||
1496 | |||||
1497 | #define allowed_to_end_number(x)(isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=') \ | ||||
1498 | (isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=') | ||||
1499 | |||||
1500 | if (c == '-' || isdigit(c)) { | ||||
1501 | do { | ||||
1502 | *p++ = c; | ||||
1503 | if ((size_t)(p-buf) >= sizeof(buf)) { | ||||
1504 | yyerror("string too long"); | ||||
1505 | return (findeol()); | ||||
1506 | } | ||||
1507 | } while ((c = lgetc(0)) != EOF(-1) && isdigit(c)); | ||||
1508 | lungetc(c); | ||||
1509 | if (p == buf + 1 && buf[0] == '-') | ||||
1510 | goto nodigits; | ||||
1511 | if (c == EOF(-1) || allowed_to_end_number(c)(isspace(c) || c == ')' || c ==',' || c == '/' || c == '}' || c == '=')) { | ||||
1512 | const char *errstr = NULL((void *)0); | ||||
1513 | |||||
1514 | *p = '\0'; | ||||
1515 | yylval.v.number = strtonum(buf, LLONG_MIN(-9223372036854775807LL -1LL), | ||||
1516 | LLONG_MAX9223372036854775807LL, &errstr); | ||||
1517 | if (errstr) { | ||||
1518 | yyerror("\"%s\" invalid number: %s", | ||||
1519 | buf, errstr); | ||||
1520 | return (findeol()); | ||||
1521 | } | ||||
1522 | return (NUMBER363); | ||||
1523 | } else { | ||||
1524 | nodigits: | ||||
1525 | while (p > buf + 1) | ||||
1526 | lungetc((unsigned char)*--p); | ||||
1527 | c = (unsigned char)*--p; | ||||
1528 | if (c == '-') | ||||
1529 | return (c); | ||||
1530 | } | ||||
1531 | } | ||||
1532 | |||||
1533 | if (c == '=') { | ||||
1534 | if ((c = lgetc(0)) != EOF(-1) && c == '>') | ||||
1535 | return (ARROW261); | ||||
1536 | lungetc(c); | ||||
1537 | c = '='; | ||||
1538 | } | ||||
1539 | |||||
1540 | #define allowed_in_string(x)(isalnum(x) || (ispunct(x) && x != '(' && x != ')' && x != '{' && x != '}' && x != '<' && x != '>' && x != '!' && x != '=' && x != '#' && x != ',')) \ | ||||
1541 | (isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \ | ||||
1542 | x != '{' && x != '}' && x != '<' && x != '>' && \ | ||||
1543 | x != '!' && x != '=' && x != '#' && \ | ||||
1544 | x != ',')) | ||||
1545 | |||||
1546 | if (isalnum(c) || c == ':' || c == '_') { | ||||
1547 | do { | ||||
1548 | *p++ = c; | ||||
1549 | if ((size_t)(p-buf) >= sizeof(buf)) { | ||||
1550 | yyerror("string too long"); | ||||
1551 | return (findeol()); | ||||
1552 | } | ||||
1553 | } while ((c = lgetc(0)) != EOF(-1) && (allowed_in_string(c)(isalnum(c) || (ispunct(c) && c != '(' && c != ')' && c != '{' && c != '}' && c != '<' && c != '>' && c != '!' && c != '=' && c != '#' && c != ',')))); | ||||
1554 | lungetc(c); | ||||
1555 | *p = '\0'; | ||||
1556 | if ((token = lookup(buf)) == STRING362) | ||||
1557 | if ((yylval.v.string = strdup(buf)) == NULL((void *)0)) | ||||
1558 | fatal("%s", __func__); | ||||
1559 | return (token); | ||||
1560 | } | ||||
1561 | if (c == '\n') { | ||||
1562 | yylval.lineno = file->lineno; | ||||
1563 | file->lineno++; | ||||
1564 | } | ||||
1565 | if (c == EOF(-1)) | ||||
1566 | return (0); | ||||
1567 | return (c); | ||||
1568 | } | ||||
1569 | |||||
1570 | int | ||||
1571 | check_file_secrecy(int fd, const char *fname) | ||||
1572 | { | ||||
1573 | struct stat st; | ||||
1574 | |||||
1575 | if (fstat(fd, &st)) { | ||||
1576 | log_warn("warn: cannot stat %s", fname); | ||||
1577 | return (-1); | ||||
1578 | } | ||||
1579 | if (st.st_uid != 0 && st.st_uid != getuid()) { | ||||
1580 | log_warnx("warn: %s: owner not root or current user", fname); | ||||
1581 | return (-1); | ||||
1582 | } | ||||
1583 | if (st.st_mode & (S_IWGRP0000020 | S_IXGRP0000010 | S_IRWXO0000007)) { | ||||
1584 | log_warnx("warn: %s: group/world readable/writeable", fname); | ||||
1585 | return (-1); | ||||
1586 | } | ||||
1587 | return (0); | ||||
1588 | } | ||||
1589 | |||||
1590 | struct file * | ||||
1591 | pushfile(const char *name, int secret) | ||||
1592 | { | ||||
1593 | struct file *nfile; | ||||
1594 | |||||
1595 | if ((nfile = calloc(1, sizeof(struct file))) == NULL((void *)0)) { | ||||
1596 | log_warn("%s", __func__); | ||||
1597 | return (NULL((void *)0)); | ||||
1598 | } | ||||
1599 | if ((nfile->name = strdup(name)) == NULL((void *)0)) { | ||||
1600 | log_warn("%s", __func__); | ||||
1601 | free(nfile); | ||||
1602 | return (NULL((void *)0)); | ||||
1603 | } | ||||
1604 | if ((nfile->stream = fopen(nfile->name, "r")) == NULL((void *)0)) { | ||||
1605 | log_warn("%s: %s", __func__, nfile->name); | ||||
1606 | free(nfile->name); | ||||
1607 | free(nfile); | ||||
1608 | return (NULL((void *)0)); | ||||
1609 | } else if (secret && | ||||
1610 | check_file_secrecy(fileno(nfile->stream)(!__isthreaded ? ((nfile->stream)->_file) : (fileno)(nfile ->stream)), nfile->name)) { | ||||
1611 | fclose(nfile->stream); | ||||
1612 | free(nfile->name); | ||||
1613 | free(nfile); | ||||
1614 | return (NULL((void *)0)); | ||||
1615 | } | ||||
1616 | nfile->lineno = TAILQ_EMPTY(&files)(((&files)->tqh_first) == ((void *)0)) ? 1 : 0; | ||||
1617 | nfile->ungetsize = 16; | ||||
1618 | nfile->ungetbuf = malloc(nfile->ungetsize); | ||||
1619 | if (nfile->ungetbuf == NULL((void *)0)) { | ||||
1620 | log_warn("%s", __func__); | ||||
1621 | fclose(nfile->stream); | ||||
1622 | free(nfile->name); | ||||
1623 | free(nfile); | ||||
1624 | return (NULL((void *)0)); | ||||
1625 | } | ||||
1626 | TAILQ_INSERT_TAIL(&files, nfile, entry)do { (nfile)->entry.tqe_next = ((void *)0); (nfile)->entry .tqe_prev = (&files)->tqh_last; *(&files)->tqh_last = (nfile); (&files)->tqh_last = &(nfile)->entry .tqe_next; } while (0); | ||||
1627 | return (nfile); | ||||
1628 | } | ||||
1629 | |||||
1630 | int | ||||
1631 | popfile(void) | ||||
1632 | { | ||||
1633 | struct file *prev; | ||||
1634 | |||||
1635 | if ((prev = TAILQ_PREV(file, files, entry)(*(((struct files *)((file)->entry.tqe_prev))->tqh_last ))) != NULL((void *)0)) | ||||
1636 | prev->errors += file->errors; | ||||
1637 | |||||
1638 | TAILQ_REMOVE(&files, file, entry)do { if (((file)->entry.tqe_next) != ((void *)0)) (file)-> entry.tqe_next->entry.tqe_prev = (file)->entry.tqe_prev ; else (&files)->tqh_last = (file)->entry.tqe_prev; *(file)->entry.tqe_prev = (file)->entry.tqe_next; ; ; } while (0); | ||||
1639 | fclose(file->stream); | ||||
1640 | free(file->name); | ||||
1641 | free(file->ungetbuf); | ||||
1642 | free(file); | ||||
1643 | file = prev; | ||||
1644 | return (file ? 0 : EOF(-1)); | ||||
1645 | } | ||||
1646 | |||||
1647 | int | ||||
1648 | parse_config(struct smtpd *x_conf, const char *filename, int opts) | ||||
1649 | { | ||||
1650 | struct sym *sym, *next; | ||||
1651 | |||||
1652 | conf = x_conf; | ||||
1653 | errors = 0; | ||||
1654 | |||||
1655 | if ((file = pushfile(filename, 0)) == NULL((void *)0)) { | ||||
1656 | purge_config(PURGE_EVERYTHING0xff); | ||||
1657 | return (-1); | ||||
1658 | } | ||||
1659 | topfile = file; | ||||
1660 | |||||
1661 | /* | ||||
1662 | * parse configuration | ||||
1663 | */ | ||||
1664 | setservent(1); | ||||
1665 | yyparse(); | ||||
1666 | errors = file->errors; | ||||
1667 | popfile(); | ||||
1668 | endservent(); | ||||
1669 | |||||
1670 | /* If the socket listener was not configured, create a default one. */ | ||||
1671 | if (!conf->sc_sock_listener) { | ||||
1672 | memset(&listen_opts, 0, sizeof listen_opts); | ||||
1673 | create_sock_listener(&listen_opts); | ||||
1674 | } | ||||
1675 | |||||
1676 | /* Free macros and check which have not been used. */ | ||||
1677 | TAILQ_FOREACH_SAFE(sym, &symhead, entry, next)for ((sym) = ((&symhead)->tqh_first); (sym) != ((void * )0) && ((next) = ((sym)->entry.tqe_next), 1); (sym ) = (next)) { | ||||
1678 | if ((conf->sc_opts & SMTPD_OPT_VERBOSE0x00000001) && !sym->used) | ||||
1679 | fprintf(stderr(&__sF[2]), "warning: macro '%s' not " | ||||
1680 | "used\n", sym->nam); | ||||
1681 | if (!sym->persist) { | ||||
1682 | free(sym->nam); | ||||
1683 | free(sym->val); | ||||
1684 | TAILQ_REMOVE(&symhead, sym, entry)do { if (((sym)->entry.tqe_next) != ((void *)0)) (sym)-> entry.tqe_next->entry.tqe_prev = (sym)->entry.tqe_prev; else (&symhead)->tqh_last = (sym)->entry.tqe_prev; *(sym)->entry.tqe_prev = (sym)->entry.tqe_next; ; ; } while (0); | ||||
1685 | free(sym); | ||||
1686 | } | ||||
1687 | } | ||||
1688 | |||||
1689 | if (TAILQ_EMPTY(conf->sc_rules)(((conf->sc_rules)->tqh_first) == ((void *)0))) { | ||||
1690 | log_warnx("warn: no rules, nothing to do"); | ||||
1691 | errors++; | ||||
1692 | } | ||||
1693 | |||||
1694 | if (errors) { | ||||
1695 | purge_config(PURGE_EVERYTHING0xff); | ||||
1696 | return (-1); | ||||
1697 | } | ||||
1698 | |||||
1699 | return (0); | ||||
1700 | } | ||||
1701 | |||||
1702 | int | ||||
1703 | symset(const char *nam, const char *val, int persist) | ||||
1704 | { | ||||
1705 | struct sym *sym; | ||||
1706 | |||||
1707 | TAILQ_FOREACH(sym, &symhead, entry)for((sym) = ((&symhead)->tqh_first); (sym) != ((void * )0); (sym) = ((sym)->entry.tqe_next)) { | ||||
1708 | if (strcmp(nam, sym->nam) == 0) | ||||
1709 | break; | ||||
1710 | } | ||||
1711 | |||||
1712 | if (sym != NULL((void *)0)) { | ||||
1713 | if (sym->persist == 1) | ||||
1714 | return (0); | ||||
1715 | else { | ||||
1716 | free(sym->nam); | ||||
1717 | free(sym->val); | ||||
1718 | TAILQ_REMOVE(&symhead, sym, entry)do { if (((sym)->entry.tqe_next) != ((void *)0)) (sym)-> entry.tqe_next->entry.tqe_prev = (sym)->entry.tqe_prev; else (&symhead)->tqh_last = (sym)->entry.tqe_prev; *(sym)->entry.tqe_prev = (sym)->entry.tqe_next; ; ; } while (0); | ||||
1719 | free(sym); | ||||
1720 | } | ||||
1721 | } | ||||
1722 | if ((sym = calloc(1, sizeof(*sym))) == NULL((void *)0)) | ||||
1723 | return (-1); | ||||
1724 | |||||
1725 | sym->nam = strdup(nam); | ||||
1726 | if (sym->nam == NULL((void *)0)) { | ||||
1727 | free(sym); | ||||
1728 | return (-1); | ||||
1729 | } | ||||
1730 | sym->val = strdup(val); | ||||
1731 | if (sym->val == NULL((void *)0)) { | ||||
1732 | free(sym->nam); | ||||
1733 | free(sym); | ||||
1734 | return (-1); | ||||
1735 | } | ||||
1736 | sym->used = 0; | ||||
1737 | sym->persist = persist; | ||||
1738 | TAILQ_INSERT_TAIL(&symhead, sym, entry)do { (sym)->entry.tqe_next = ((void *)0); (sym)->entry. tqe_prev = (&symhead)->tqh_last; *(&symhead)->tqh_last = (sym); (&symhead)->tqh_last = &(sym)->entry. tqe_next; } while (0); | ||||
1739 | return (0); | ||||
1740 | } | ||||
1741 | |||||
1742 | int | ||||
1743 | cmdline_symset(char *s) | ||||
1744 | { | ||||
1745 | char *sym, *val; | ||||
1746 | int ret; | ||||
1747 | |||||
1748 | if ((val = strrchr(s, '=')) == NULL((void *)0)) | ||||
1749 | return (-1); | ||||
1750 | sym = strndup(s, val - s); | ||||
1751 | if (sym == NULL((void *)0)) | ||||
1752 | fatalx("%s: strndup", __func__); | ||||
1753 | ret = symset(sym, val + 1, 1); | ||||
1754 | free(sym); | ||||
1755 | |||||
1756 | return (ret); | ||||
1757 | } | ||||
1758 | |||||
1759 | char * | ||||
1760 | symget(const char *nam) | ||||
1761 | { | ||||
1762 | struct sym *sym; | ||||
1763 | |||||
1764 | TAILQ_FOREACH(sym, &symhead, entry)for((sym) = ((&symhead)->tqh_first); (sym) != ((void * )0); (sym) = ((sym)->entry.tqe_next)) { | ||||
1765 | if (strcmp(nam, sym->nam) == 0) { | ||||
1766 | sym->used = 1; | ||||
1767 | return (sym->val); | ||||
1768 | } | ||||
1769 | } | ||||
1770 | return (NULL((void *)0)); | ||||
1771 | } | ||||
1772 | |||||
1773 | static void | ||||
1774 | create_sock_listener(struct listen_opts *lo) | ||||
1775 | { | ||||
1776 | struct listener *l = xcalloc(1, sizeof(*l)); | ||||
1777 | lo->hostname = conf->sc_hostname; | ||||
1778 | l->ss.ss_family = AF_LOCAL1; | ||||
1779 | l->ss.ss_len = sizeof(struct sockaddr *); | ||||
1780 | l->local = 1; | ||||
1781 | conf->sc_sock_listener = l; | ||||
1782 | config_listener(l, lo); | ||||
1783 | } | ||||
1784 | |||||
1785 | static void | ||||
1786 | create_if_listener(struct listen_opts *lo) | ||||
1787 | { | ||||
1788 | uint16_t flags; | ||||
1789 | |||||
1790 | if (lo->port != 0 && lo->ssl == F_SSL(0x01 | 0x02)) | ||||
1791 | fatalx("invalid listen option: tls/smtps on same port"); | ||||
1792 | |||||
1793 | if (lo->auth != 0 && !lo->ssl) | ||||
1794 | fatalx("invalid listen option: auth requires tls/smtps"); | ||||
1795 | |||||
1796 | if (lo->pkicount && !lo->ssl) | ||||
1797 | fatalx("invalid listen option: pki requires tls/smtps"); | ||||
1798 | if (lo->pkicount == 0 && lo->ssl) | ||||
1799 | fatalx("invalid listen option: pki required for tls/smtps"); | ||||
1800 | |||||
1801 | flags = lo->flags; | ||||
1802 | |||||
1803 | if (lo->port) { | ||||
1804 | lo->flags = lo->ssl|lo->auth|flags; | ||||
1805 | lo->port = htons(lo->port)(__uint16_t)(__builtin_constant_p(lo->port) ? (__uint16_t) (((__uint16_t)(lo->port) & 0xffU) << 8 | ((__uint16_t )(lo->port) & 0xff00U) >> 8) : __swap16md(lo-> port)); | ||||
1806 | } | ||||
1807 | else { | ||||
1808 | if (lo->ssl & F_SMTPS0x02) { | ||||
1809 | lo->port = htons(465)(__uint16_t)(__builtin_constant_p(465) ? (__uint16_t)(((__uint16_t )(465) & 0xffU) << 8 | ((__uint16_t)(465) & 0xff00U ) >> 8) : __swap16md(465)); | ||||
1810 | lo->flags = F_SMTPS0x02|lo->auth|flags; | ||||
1811 | } | ||||
1812 | |||||
1813 | if (!lo->ssl || (lo->ssl & F_STARTTLS0x01)) { | ||||
1814 | lo->port = htons(25)(__uint16_t)(__builtin_constant_p(25) ? (__uint16_t)(((__uint16_t )(25) & 0xffU) << 8 | ((__uint16_t)(25) & 0xff00U ) >> 8) : __swap16md(25)); | ||||
1815 | lo->flags = lo->auth|flags; | ||||
1816 | if (lo->ssl & F_STARTTLS0x01) | ||||
1817 | lo->flags |= F_STARTTLS0x01; | ||||
1818 | } | ||||
1819 | } | ||||
1820 | |||||
1821 | if (interface(lo)) | ||||
1822 | return; | ||||
1823 | if (host_v4(lo)) | ||||
1824 | return; | ||||
1825 | if (host_v6(lo)) | ||||
1826 | return; | ||||
1827 | if (host_dns(lo)) | ||||
1828 | return; | ||||
1829 | |||||
1830 | fatalx("invalid virtual ip or interface: %s", lo->ifx); | ||||
1831 | } | ||||
1832 | |||||
1833 | static void | ||||
1834 | config_listener(struct listener *h, struct listen_opts *lo) | ||||
1835 | { | ||||
1836 | int i; | ||||
1837 | |||||
1838 | h->fd = -1; | ||||
1839 | h->port = lo->port; | ||||
1840 | h->flags = lo->flags; | ||||
1841 | |||||
1842 | if (lo->hostname == NULL((void *)0)) | ||||
1843 | lo->hostname = conf->sc_hostname; | ||||
1844 | |||||
1845 | if (lo->options & LO_FILTER) { | ||||
1846 | h->flags |= F_FILTERED0x2000; | ||||
1847 | (void)strlcpy(h->filter_name, | ||||
1848 | lo->filtername, | ||||
1849 | sizeof(h->filter_name)); | ||||
1850 | } | ||||
1851 | |||||
1852 | if (lo->authtable != NULL((void *)0)) | ||||
1853 | (void)strlcpy(h->authtable, lo->authtable->t_name, sizeof(h->authtable)); | ||||
1854 | |||||
1855 | h->pkicount = lo->pkicount; | ||||
1856 | if (h->pkicount) { | ||||
1857 | h->pki = calloc(h->pkicount, sizeof(*h->pki)); | ||||
1858 | if (h->pki == NULL((void *)0)) | ||||
1859 | fatal("calloc"); | ||||
1860 | } | ||||
1861 | for (i = 0; i < lo->pkicount; i++) { | ||||
1862 | h->pki[i] = dict_get(conf->sc_pki_dict, lo->pki[i]); | ||||
1863 | if (h->pki[i] == NULL((void *)0)) { | ||||
1864 | log_warnx("pki name not found: %s", lo->pki[i]); | ||||
1865 | fatalx(NULL((void *)0)); | ||||
1866 | } | ||||
1867 | } | ||||
1868 | |||||
1869 | if (lo->tls_ciphers != NULL((void *)0) && | ||||
1870 | (h->tls_ciphers = strdup(lo->tls_ciphers)) == NULL((void *)0)) { | ||||
1871 | fatal("strdup"); | ||||
1872 | } | ||||
1873 | |||||
1874 | if (lo->tls_protocols != NULL((void *)0) && | ||||
1875 | (h->tls_protocols = strdup(lo->tls_protocols)) == NULL((void *)0)) { | ||||
1876 | fatal("strdup"); | ||||
1877 | } | ||||
1878 | |||||
1879 | if (lo->ca != NULL((void *)0)) { | ||||
1880 | if (!lowercase(h->ca_name, lo->ca, sizeof(h->ca_name))) { | ||||
1881 | log_warnx("ca name too long: %s", lo->ca); | ||||
1882 | fatalx(NULL((void *)0)); | ||||
1883 | } | ||||
1884 | if (dict_get(conf->sc_ca_dict, h->ca_name) == NULL((void *)0)) { | ||||
1885 | log_warnx("ca name not found: %s", lo->ca); | ||||
1886 | fatalx(NULL((void *)0)); | ||||
1887 | } | ||||
1888 | } | ||||
1889 | if (lo->tag != NULL((void *)0)) | ||||
1890 | (void)strlcpy(h->tag, lo->tag, sizeof(h->tag)); | ||||
1891 | |||||
1892 | (void)strlcpy(h->hostname, lo->hostname, sizeof(h->hostname)); | ||||
1893 | if (lo->hostnametable) | ||||
1894 | (void)strlcpy(h->hostnametable, lo->hostnametable->t_name, sizeof(h->hostnametable)); | ||||
1895 | if (lo->sendertable) { | ||||
1896 | (void)strlcpy(h->sendertable, lo->sendertable->t_name, sizeof(h->sendertable)); | ||||
1897 | if (lo->options & LO_MASQUERADE) | ||||
1898 | h->flags |= F_MASQUERADE0x1000; | ||||
1899 | } | ||||
1900 | |||||
1901 | if (lo->ssl & F_TLS_VERIFY0x200) | ||||
1902 | h->flags |= F_TLS_VERIFY0x200; | ||||
1903 | |||||
1904 | if (lo->ssl & F_STARTTLS_REQUIRE0x20) | ||||
1905 | h->flags |= F_STARTTLS_REQUIRE0x20; | ||||
1906 | |||||
1907 | if (h != conf->sc_sock_listener) | ||||
1908 | TAILQ_INSERT_TAIL(conf->sc_listeners, h, entry)do { (h)->entry.tqe_next = ((void *)0); (h)->entry.tqe_prev = (conf->sc_listeners)->tqh_last; *(conf->sc_listeners )->tqh_last = (h); (conf->sc_listeners)->tqh_last = & (h)->entry.tqe_next; } while (0); | ||||
1909 | } | ||||
1910 | |||||
1911 | static int | ||||
1912 | host_v4(struct listen_opts *lo) | ||||
1913 | { | ||||
1914 | struct in_addr ina; | ||||
1915 | struct sockaddr_in *sain; | ||||
1916 | struct listener *h; | ||||
1917 | |||||
1918 | if (lo->family != AF_UNSPEC0 && lo->family != AF_INET2) | ||||
1919 | return (0); | ||||
1920 | |||||
1921 | memset(&ina, 0, sizeof(ina)); | ||||
1922 | if (inet_pton(AF_INET2, lo->ifx, &ina) != 1) | ||||
1923 | return (0); | ||||
1924 | |||||
1925 | h = xcalloc(1, sizeof(*h)); | ||||
1926 | sain = (struct sockaddr_in *)&h->ss; | ||||
1927 | sain->sin_len = sizeof(struct sockaddr_in); | ||||
1928 | sain->sin_family = AF_INET2; | ||||
1929 | sain->sin_addr.s_addr = ina.s_addr; | ||||
1930 | sain->sin_port = lo->port; | ||||
1931 | |||||
1932 | if (sain->sin_addr.s_addr == htonl(INADDR_LOOPBACK)(__uint32_t)(__builtin_constant_p(((u_int32_t)(0x7f000001))) ? (__uint32_t)(((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff ) << 24 | ((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff00) << 8 | ((__uint32_t)(((u_int32_t)(0x7f000001)) ) & 0xff0000) >> 8 | ((__uint32_t)(((u_int32_t)(0x7f000001 ))) & 0xff000000) >> 24) : __swap32md(((u_int32_t)( 0x7f000001))))) | ||||
1933 | h->local = 1; | ||||
1934 | config_listener(h, lo); | ||||
1935 | |||||
1936 | return (1); | ||||
1937 | } | ||||
1938 | |||||
1939 | static int | ||||
1940 | host_v6(struct listen_opts *lo) | ||||
1941 | { | ||||
1942 | struct in6_addr ina6; | ||||
1943 | struct sockaddr_in6 *sin6; | ||||
1944 | struct listener *h; | ||||
1945 | |||||
1946 | if (lo->family != AF_UNSPEC0 && lo->family != AF_INET624) | ||||
1947 | return (0); | ||||
1948 | |||||
1949 | memset(&ina6, 0, sizeof(ina6)); | ||||
1950 | if (inet_pton(AF_INET624, lo->ifx, &ina6) != 1) | ||||
1951 | return (0); | ||||
1952 | |||||
1953 | h = xcalloc(1, sizeof(*h)); | ||||
1954 | sin6 = (struct sockaddr_in6 *)&h->ss; | ||||
1955 | sin6->sin6_len = sizeof(struct sockaddr_in6); | ||||
1956 | sin6->sin6_family = AF_INET624; | ||||
1957 | sin6->sin6_port = lo->port; | ||||
1958 | memcpy(&sin6->sin6_addr, &ina6, sizeof(ina6)); | ||||
1959 | |||||
1960 | if (IN6_IS_ADDR_LOOPBACK(&sin6->sin6_addr)((*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr )->__u6_addr.__u6_addr8[0]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr .__u6_addr8[4]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr.__u6_addr8[8 ]) == 0) && (*(const u_int32_t *)(const void *)(& (&sin6->sin6_addr)->__u6_addr.__u6_addr8[12]) == (__uint32_t )(__builtin_constant_p(1) ? (__uint32_t)(((__uint32_t)(1) & 0xff) << 24 | ((__uint32_t)(1) & 0xff00) << 8 | ((__uint32_t)(1) & 0xff0000) >> 8 | ((__uint32_t )(1) & 0xff000000) >> 24) : __swap32md(1))))) | ||||
1961 | h->local = 1; | ||||
1962 | config_listener(h, lo); | ||||
1963 | |||||
1964 | return (1); | ||||
1965 | } | ||||
1966 | |||||
1967 | static int | ||||
1968 | host_dns(struct listen_opts *lo) | ||||
1969 | { | ||||
1970 | struct addrinfo hints, *res0, *res; | ||||
1971 | int error, cnt = 0; | ||||
1972 | struct sockaddr_in *sain; | ||||
1973 | struct sockaddr_in6 *sin6; | ||||
1974 | struct listener *h; | ||||
1975 | |||||
1976 | memset(&hints, 0, sizeof(hints)); | ||||
1977 | hints.ai_family = lo->family; | ||||
1978 | hints.ai_socktype = SOCK_STREAM1; | ||||
1979 | hints.ai_flags = AI_ADDRCONFIG64; | ||||
1980 | error = getaddrinfo(lo->ifx, NULL((void *)0), &hints, &res0); | ||||
1981 | if (error == EAI_AGAIN-3 || error == EAI_NODATA-5 || error == EAI_NONAME-2) | ||||
1982 | return (0); | ||||
1983 | if (error) { | ||||
1984 | log_warnx("warn: host_dns: could not parse \"%s\": %s", lo->ifx, | ||||
1985 | gai_strerror(error)); | ||||
1986 | return (-1); | ||||
1987 | } | ||||
1988 | |||||
1989 | for (res = res0; res; res = res->ai_next) { | ||||
1990 | if (res->ai_family != AF_INET2 && | ||||
1991 | res->ai_family != AF_INET624) | ||||
1992 | continue; | ||||
1993 | h = xcalloc(1, sizeof(*h)); | ||||
1994 | |||||
1995 | h->ss.ss_family = res->ai_family; | ||||
1996 | if (res->ai_family == AF_INET2) { | ||||
1997 | sain = (struct sockaddr_in *)&h->ss; | ||||
1998 | sain->sin_len = sizeof(struct sockaddr_in); | ||||
1999 | sain->sin_addr.s_addr = ((struct sockaddr_in *) | ||||
2000 | res->ai_addr)->sin_addr.s_addr; | ||||
2001 | sain->sin_port = lo->port; | ||||
2002 | if (sain->sin_addr.s_addr == htonl(INADDR_LOOPBACK)(__uint32_t)(__builtin_constant_p(((u_int32_t)(0x7f000001))) ? (__uint32_t)(((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff ) << 24 | ((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff00) << 8 | ((__uint32_t)(((u_int32_t)(0x7f000001)) ) & 0xff0000) >> 8 | ((__uint32_t)(((u_int32_t)(0x7f000001 ))) & 0xff000000) >> 24) : __swap32md(((u_int32_t)( 0x7f000001))))) | ||||
2003 | h->local = 1; | ||||
2004 | } else { | ||||
2005 | sin6 = (struct sockaddr_in6 *)&h->ss; | ||||
2006 | sin6->sin6_len = sizeof(struct sockaddr_in6); | ||||
2007 | memcpy(&sin6->sin6_addr, &((struct sockaddr_in6 *) | ||||
2008 | res->ai_addr)->sin6_addr, sizeof(struct in6_addr)); | ||||
2009 | sin6->sin6_port = lo->port; | ||||
2010 | if (IN6_IS_ADDR_LOOPBACK(&sin6->sin6_addr)((*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr )->__u6_addr.__u6_addr8[0]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr .__u6_addr8[4]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr.__u6_addr8[8 ]) == 0) && (*(const u_int32_t *)(const void *)(& (&sin6->sin6_addr)->__u6_addr.__u6_addr8[12]) == (__uint32_t )(__builtin_constant_p(1) ? (__uint32_t)(((__uint32_t)(1) & 0xff) << 24 | ((__uint32_t)(1) & 0xff00) << 8 | ((__uint32_t)(1) & 0xff0000) >> 8 | ((__uint32_t )(1) & 0xff000000) >> 24) : __swap32md(1))))) | ||||
2011 | h->local = 1; | ||||
2012 | } | ||||
2013 | |||||
2014 | config_listener(h, lo); | ||||
2015 | |||||
2016 | cnt++; | ||||
2017 | } | ||||
2018 | |||||
2019 | freeaddrinfo(res0); | ||||
2020 | return (cnt); | ||||
2021 | } | ||||
2022 | |||||
2023 | static int | ||||
2024 | interface(struct listen_opts *lo) | ||||
2025 | { | ||||
2026 | struct ifaddrs *ifap, *p; | ||||
2027 | struct sockaddr_in *sain; | ||||
2028 | struct sockaddr_in6 *sin6; | ||||
2029 | struct listener *h; | ||||
2030 | int ret = 0; | ||||
2031 | |||||
2032 | if (getifaddrs(&ifap) == -1) | ||||
2033 | fatal("getifaddrs"); | ||||
2034 | |||||
2035 | for (p = ifap; p != NULL((void *)0); p = p->ifa_next) { | ||||
2036 | if (p->ifa_addr == NULL((void *)0)) | ||||
2037 | continue; | ||||
2038 | if (strcmp(p->ifa_name, lo->ifx) != 0 && | ||||
2039 | !is_if_in_group(p->ifa_name, lo->ifx)) | ||||
2040 | continue; | ||||
2041 | if (lo->family != AF_UNSPEC0 && lo->family != p->ifa_addr->sa_family) | ||||
2042 | continue; | ||||
2043 | |||||
2044 | h = xcalloc(1, sizeof(*h)); | ||||
2045 | |||||
2046 | switch (p->ifa_addr->sa_family) { | ||||
2047 | case AF_INET2: | ||||
2048 | sain = (struct sockaddr_in *)&h->ss; | ||||
2049 | *sain = *(struct sockaddr_in *)p->ifa_addr; | ||||
2050 | sain->sin_len = sizeof(struct sockaddr_in); | ||||
2051 | sain->sin_port = lo->port; | ||||
2052 | if (sain->sin_addr.s_addr == htonl(INADDR_LOOPBACK)(__uint32_t)(__builtin_constant_p(((u_int32_t)(0x7f000001))) ? (__uint32_t)(((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff ) << 24 | ((__uint32_t)(((u_int32_t)(0x7f000001))) & 0xff00) << 8 | ((__uint32_t)(((u_int32_t)(0x7f000001)) ) & 0xff0000) >> 8 | ((__uint32_t)(((u_int32_t)(0x7f000001 ))) & 0xff000000) >> 24) : __swap32md(((u_int32_t)( 0x7f000001))))) | ||||
2053 | h->local = 1; | ||||
2054 | break; | ||||
2055 | |||||
2056 | case AF_INET624: | ||||
2057 | sin6 = (struct sockaddr_in6 *)&h->ss; | ||||
2058 | *sin6 = *(struct sockaddr_in6 *)p->ifa_addr; | ||||
2059 | sin6->sin6_len = sizeof(struct sockaddr_in6); | ||||
2060 | sin6->sin6_port = lo->port; | ||||
2061 | #ifdef __KAME__ | ||||
2062 | if ((IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)(((&sin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xfe ) && (((&sin6->sin6_addr)->__u6_addr.__u6_addr8 [1] & 0xc0) == 0x80)) || | ||||
2063 | IN6_IS_ADDR_MC_LINKLOCAL(&sin6->sin6_addr)(((&sin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff ) && (((&sin6->sin6_addr)->__u6_addr.__u6_addr8 [1] & 0x0f) == 0x02)) || | ||||
2064 | IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr)(((&sin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff ) && (((&sin6->sin6_addr)->__u6_addr.__u6_addr8 [1] & 0x0f) == 0x01))) && | ||||
2065 | sin6->sin6_scope_id == 0) { | ||||
2066 | sin6->sin6_scope_id = ntohs((__uint16_t)(__builtin_constant_p(*(u_int16_t *)&sin6-> sin6_addr.__u6_addr.__u6_addr8[2]) ? (__uint16_t)(((__uint16_t )(*(u_int16_t *)&sin6->sin6_addr.__u6_addr.__u6_addr8[ 2]) & 0xffU) << 8 | ((__uint16_t)(*(u_int16_t *)& sin6->sin6_addr.__u6_addr.__u6_addr8[2]) & 0xff00U) >> 8) : __swap16md(*(u_int16_t *)&sin6->sin6_addr.__u6_addr .__u6_addr8[2])) | ||||
2067 | *(u_int16_t *)&sin6->sin6_addr.s6_addr[2])(__uint16_t)(__builtin_constant_p(*(u_int16_t *)&sin6-> sin6_addr.__u6_addr.__u6_addr8[2]) ? (__uint16_t)(((__uint16_t )(*(u_int16_t *)&sin6->sin6_addr.__u6_addr.__u6_addr8[ 2]) & 0xffU) << 8 | ((__uint16_t)(*(u_int16_t *)& sin6->sin6_addr.__u6_addr.__u6_addr8[2]) & 0xff00U) >> 8) : __swap16md(*(u_int16_t *)&sin6->sin6_addr.__u6_addr .__u6_addr8[2])); | ||||
2068 | sin6->sin6_addr.s6_addr__u6_addr.__u6_addr8[2] = 0; | ||||
2069 | sin6->sin6_addr.s6_addr__u6_addr.__u6_addr8[3] = 0; | ||||
2070 | } | ||||
2071 | #endif | ||||
2072 | if (IN6_IS_ADDR_LOOPBACK(&sin6->sin6_addr)((*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr )->__u6_addr.__u6_addr8[0]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr .__u6_addr8[4]) == 0) && (*(const u_int32_t *)(const void *)(&(&sin6->sin6_addr)->__u6_addr.__u6_addr8[8 ]) == 0) && (*(const u_int32_t *)(const void *)(& (&sin6->sin6_addr)->__u6_addr.__u6_addr8[12]) == (__uint32_t )(__builtin_constant_p(1) ? (__uint32_t)(((__uint32_t)(1) & 0xff) << 24 | ((__uint32_t)(1) & 0xff00) << 8 | ((__uint32_t)(1) & 0xff0000) >> 8 | ((__uint32_t )(1) & 0xff000000) >> 24) : __swap32md(1))))) | ||||
2073 | h->local = 1; | ||||
2074 | break; | ||||
2075 | |||||
2076 | default: | ||||
2077 | free(h); | ||||
2078 | continue; | ||||
2079 | } | ||||
2080 | |||||
2081 | config_listener(h, lo); | ||||
2082 | ret = 1; | ||||
2083 | } | ||||
2084 | |||||
2085 | freeifaddrs(ifap); | ||||
2086 | |||||
2087 | return ret; | ||||
2088 | } | ||||
2089 | |||||
2090 | int | ||||
2091 | delaytonum(char *str) | ||||
2092 | { | ||||
2093 | unsigned int factor; | ||||
2094 | size_t len; | ||||
2095 | const char *errstr = NULL((void *)0); | ||||
2096 | int delay; | ||||
2097 | |||||
2098 | /* we need at least 1 digit and 1 unit */ | ||||
2099 | len = strlen(str); | ||||
2100 | if (len < 2) | ||||
2101 | goto bad; | ||||
2102 | |||||
2103 | switch(str[len - 1]) { | ||||
2104 | |||||
2105 | case 's': | ||||
2106 | factor = 1; | ||||
2107 | break; | ||||
2108 | |||||
2109 | case 'm': | ||||
2110 | factor = 60; | ||||
2111 | break; | ||||
2112 | |||||
2113 | case 'h': | ||||
2114 | factor = 60 * 60; | ||||
2115 | break; | ||||
2116 | |||||
2117 | case 'd': | ||||
2118 | factor = 24 * 60 * 60; | ||||
2119 | break; | ||||
2120 | |||||
2121 | default: | ||||
2122 | goto bad; | ||||
2123 | } | ||||
2124 | |||||
2125 | str[len - 1] = '\0'; | ||||
2126 | delay = strtonum(str, 1, INT_MAX2147483647 / factor, &errstr); | ||||
2127 | if (errstr) | ||||
2128 | goto bad; | ||||
2129 | |||||
2130 | return (delay * factor); | ||||
2131 | |||||
2132 | bad: | ||||
2133 | return (-1); | ||||
2134 | } | ||||
2135 | |||||
2136 | int | ||||
2137 | is_if_in_group(const char *ifname, const char *groupname) | ||||
2138 | { | ||||
2139 | unsigned int len; | ||||
2140 | struct ifgroupreq ifgr; | ||||
2141 | struct ifg_req *ifg; | ||||
2142 | int s; | ||||
2143 | int ret = 0; | ||||
2144 | |||||
2145 | if ((s = socket(AF_INET2, SOCK_DGRAM2, 0)) == -1) | ||||
2146 | fatal("socket"); | ||||
2147 | |||||
2148 | memset(&ifgr, 0, sizeof(ifgr)); | ||||
2149 | if (strlcpy(ifgr.ifgr_name, ifname, IFNAMSIZ16) >= IFNAMSIZ16) | ||||
2150 | fatalx("interface name too large"); | ||||
2151 | |||||
2152 | if (ioctl(s, SIOCGIFGROUP(((unsigned long)0x80000000|(unsigned long)0x40000000) | ((sizeof (struct ifgroupreq) & 0x1fff) << 16) | ((('i')) << 8) | ((136))), (caddr_t)&ifgr) == -1) { | ||||
2153 | if (errno(*__errno()) == EINVAL22 || errno(*__errno()) == ENOTTY25) | ||||
2154 | goto end; | ||||
2155 | fatal("SIOCGIFGROUP"); | ||||
2156 | } | ||||
2157 | |||||
2158 | len = ifgr.ifgr_len; | ||||
2159 | ifgr.ifgr_groupsifgr_ifgru.ifgru_groups = xcalloc(len/sizeof(struct ifg_req), | ||||
2160 | sizeof(struct ifg_req)); | ||||
2161 | if (ioctl(s, SIOCGIFGROUP(((unsigned long)0x80000000|(unsigned long)0x40000000) | ((sizeof (struct ifgroupreq) & 0x1fff) << 16) | ((('i')) << 8) | ((136))), (caddr_t)&ifgr) == -1) | ||||
2162 | fatal("SIOCGIFGROUP"); | ||||
2163 | |||||
2164 | ifg = ifgr.ifgr_groupsifgr_ifgru.ifgru_groups; | ||||
2165 | for (; ifg && len >= sizeof(struct ifg_req); ifg++) { | ||||
2166 | len -= sizeof(struct ifg_req); | ||||
2167 | if (strcmp(ifg->ifgrq_groupifgrq_ifgrqu.ifgrqu_group, groupname) == 0) { | ||||
2168 | ret = 1; | ||||
2169 | break; | ||||
2170 | } | ||||
2171 | } | ||||
2172 | free(ifgr.ifgr_groupsifgr_ifgru.ifgru_groups); | ||||
2173 | |||||
2174 | end: | ||||
2175 | close(s); | ||||
2176 | return ret; | ||||
2177 | } | ||||
2178 | |||||
2179 | static int | ||||
2180 | config_lo_mask_source(struct listen_opts *lo) { | ||||
2181 | if (lo->options & LO_MASKSOURCE) { | ||||
2182 | yyerror("mask-source already specified"); | ||||
2183 | return -1; | ||||
2184 | } | ||||
2185 | lo->options |= LO_MASKSOURCE; | ||||
2186 | lo->flags |= F_MASK_SOURCE0x100; | ||||
2187 | |||||
2188 | return 0; | ||||
2189 | } | ||||
2190 | |||||
2191 | #line 2184 "parse.c" | ||||
2192 | /* allocate initial stack or double stack size, up to YYMAXDEPTH */ | ||||
2193 | static int yygrowstack(void) | ||||
2194 | { | ||||
2195 | unsigned int newsize; | ||||
2196 | long sslen; | ||||
2197 | short *newss; | ||||
2198 | YYSTYPE *newvs; | ||||
2199 | |||||
2200 | if ((newsize = yystacksize) == 0) | ||||
2201 | newsize = YYINITSTACKSIZE200; | ||||
2202 | else if (newsize >= YYMAXDEPTH10000) | ||||
2203 | return -1; | ||||
2204 | else if ((newsize *= 2) > YYMAXDEPTH10000) | ||||
2205 | newsize = YYMAXDEPTH10000; | ||||
2206 | sslen = yyssp - yyss; | ||||
2207 | #ifdef SIZE_MAX0xffffffffffffffffUL | ||||
2208 | #define YY_SIZE_MAX0xffffffffffffffffUL SIZE_MAX0xffffffffffffffffUL | ||||
2209 | #else | ||||
2210 | #define YY_SIZE_MAX0xffffffffffffffffUL 0xffffffffU | ||||
2211 | #endif | ||||
2212 | if (newsize && YY_SIZE_MAX0xffffffffffffffffUL / newsize < sizeof *newss) | ||||
2213 | goto bail; | ||||
2214 | newss = (short *)realloc(yyss, newsize * sizeof *newss); | ||||
2215 | if (newss == NULL((void *)0)) | ||||
2216 | goto bail; | ||||
2217 | yyss = newss; | ||||
2218 | yyssp = newss + sslen; | ||||
2219 | if (newsize
| ||||
2220 | goto bail; | ||||
2221 | newvs = (YYSTYPE *)realloc(yyvs, newsize * sizeof *newvs); | ||||
2222 | if (newvs == NULL((void *)0)) | ||||
2223 | goto bail; | ||||
2224 | yyvs = newvs; | ||||
2225 | yyvsp = newvs + sslen; | ||||
2226 | yystacksize = newsize; | ||||
2227 | yysslim = yyss + newsize - 1; | ||||
2228 | return 0; | ||||
2229 | bail: | ||||
2230 | if (yyss) | ||||
2231 | free(yyss); | ||||
2232 | if (yyvs) | ||||
2233 | free(yyvs); | ||||
2234 | yyss = yyssp = NULL((void *)0); | ||||
2235 | yyvs = yyvsp = NULL((void *)0); | ||||
2236 | yystacksize = 0; | ||||
2237 | return -1; | ||||
2238 | } | ||||
2239 | |||||
2240 | #define YYABORTgoto yyabort goto yyabort | ||||
2241 | #define YYREJECTgoto yyabort goto yyabort | ||||
2242 | #define YYACCEPTgoto yyaccept goto yyaccept | ||||
2243 | #define YYERRORgoto yyerrlab goto yyerrlab | ||||
2244 | int | ||||
2245 | yyparse(void) | ||||
2246 | { | ||||
2247 | int yym, yyn, yystate; | ||||
2248 | #if YYDEBUG0 | ||||
2249 | const char *yys; | ||||
2250 | |||||
2251 | if ((yys = getenv("YYDEBUG"))) | ||||
2252 | { | ||||
2253 | yyn = *yys; | ||||
2254 | if (yyn >= '0' && yyn <= '9') | ||||
2255 | yydebug = yyn - '0'; | ||||
2256 | } | ||||
2257 | #endif /* YYDEBUG */ | ||||
2258 | |||||
2259 | yynerrs = 0; | ||||
2260 | yyerrflag = 0; | ||||
2261 | yychar = (-1); | ||||
2262 | |||||
2263 | if (yyss == NULL((void *)0) && yygrowstack()) goto yyoverflow; | ||||
| |||||
2264 | yyssp = yyss; | ||||
2265 | yyvsp = yyvs; | ||||
2266 | *yyssp = yystate = 0; | ||||
2267 | |||||
2268 | yyloop: | ||||
2269 | if ((yyn = yydefred[yystate]) != 0) goto yyreduce; | ||||
2270 | if (yychar
| ||||
2271 | { | ||||
2272 | if ((yychar = yylex()) < 0) yychar = 0; | ||||
2273 | #if YYDEBUG0 | ||||
2274 | if (yydebug) | ||||
2275 | { | ||||
2276 | yys = 0; | ||||
2277 | if (yychar <= YYMAXTOKEN363) yys = yyname[yychar]; | ||||
2278 | if (!yys) yys = "illegal-symbol"; | ||||
2279 | printf("%sdebug: state %d, reading %d (%s)\n", | ||||
2280 | YYPREFIX"yy", yystate, yychar, yys); | ||||
2281 | } | ||||
2282 | #endif | ||||
2283 | } | ||||
2284 | if ((yyn = yysindex[yystate]) && (yyn += yychar) >= 0 && | ||||
2285 | yyn <= YYTABLESIZE915 && yycheck[yyn] == yychar) | ||||
2286 | { | ||||
2287 | #if YYDEBUG0 | ||||
2288 | if (yydebug) | ||||
2289 | printf("%sdebug: state %d, shifting to state %d\n", | ||||
2290 | YYPREFIX"yy", yystate, yytable[yyn]); | ||||
2291 | #endif | ||||
2292 | if (yyssp >= yysslim && yygrowstack()) | ||||
2293 | { | ||||
2294 | goto yyoverflow; | ||||
2295 | } | ||||
2296 | *++yyssp = yystate = yytable[yyn]; | ||||
| |||||
2297 | *++yyvsp = yylval; | ||||
2298 | yychar = (-1); | ||||
2299 | if (yyerrflag > 0) --yyerrflag; | ||||
2300 | goto yyloop; | ||||
2301 | } | ||||
2302 | if ((yyn = yyrindex[yystate]) && (yyn += yychar) >= 0 && | ||||
2303 | yyn <= YYTABLESIZE915 && yycheck[yyn] == yychar) | ||||
2304 | { | ||||
2305 | yyn = yytable[yyn]; | ||||
2306 | goto yyreduce; | ||||
2307 | } | ||||
2308 | if (yyerrflag) goto yyinrecovery; | ||||
2309 | #if defined(__GNUC__4) | ||||
2310 | goto yynewerror; | ||||
2311 | #endif | ||||
2312 | yynewerror: | ||||
2313 | yyerror("syntax error"); | ||||
2314 | #if defined(__GNUC__4) | ||||
2315 | goto yyerrlab; | ||||
2316 | #endif | ||||
2317 | yyerrlab: | ||||
2318 | ++yynerrs; | ||||
2319 | yyinrecovery: | ||||
2320 | if (yyerrflag < 3) | ||||
2321 | { | ||||
2322 | yyerrflag = 3; | ||||
2323 | for (;;) | ||||
2324 | { | ||||
2325 | if ((yyn = yysindex[*yyssp]) && (yyn += YYERRCODE256) >= 0 && | ||||
2326 | yyn <= YYTABLESIZE915 && yycheck[yyn] == YYERRCODE256) | ||||
2327 | { | ||||
2328 | #if YYDEBUG0 | ||||
2329 | if (yydebug) | ||||
2330 | printf("%sdebug: state %d, error recovery shifting\ | ||||
2331 | to state %d\n", YYPREFIX"yy", *yyssp, yytable[yyn]); | ||||
2332 | #endif | ||||
2333 | if (yyssp >= yysslim && yygrowstack()) | ||||
2334 | { | ||||
2335 | goto yyoverflow; | ||||
2336 | } | ||||
2337 | *++yyssp = yystate = yytable[yyn]; | ||||
2338 | *++yyvsp = yylval; | ||||
2339 | goto yyloop; | ||||
2340 | } | ||||
2341 | else | ||||
2342 | { | ||||
2343 | #if YYDEBUG0 | ||||
2344 | if (yydebug) | ||||
2345 | printf("%sdebug: error recovery discarding state %d\n", | ||||
2346 | YYPREFIX"yy", *yyssp); | ||||
2347 | #endif | ||||
2348 | if (yyssp <= yyss) goto yyabort; | ||||
2349 | --yyssp; | ||||
2350 | --yyvsp; | ||||
2351 | } | ||||
2352 | } | ||||
2353 | } | ||||
2354 | else | ||||
2355 | { | ||||
2356 | if (yychar == 0) goto yyabort; | ||||
2357 | #if YYDEBUG0 | ||||
2358 | if (yydebug) | ||||
2359 | { | ||||
2360 | yys = 0; | ||||
2361 | if (yychar <= YYMAXTOKEN363) yys = yyname[yychar]; | ||||
2362 | if (!yys) yys = "illegal-symbol"; | ||||
2363 | printf("%sdebug: state %d, error recovery discards token %d (%s)\n", | ||||
2364 | YYPREFIX"yy", yystate, yychar, yys); | ||||
2365 | } | ||||
2366 | #endif | ||||
2367 | yychar = (-1); | ||||
2368 | goto yyloop; | ||||
2369 | } | ||||
2370 | yyreduce: | ||||
2371 | #if YYDEBUG0 | ||||
2372 | if (yydebug) | ||||
2373 | printf("%sdebug: state %d, reducing by rule %d (%s)\n", | ||||
2374 | YYPREFIX"yy", yystate, yyn, yyrule[yyn]); | ||||
2375 | #endif | ||||
2376 | yym = yylen[yyn]; | ||||
2377 | if (yym
| ||||
2378 | yyval = yyvsp[1-yym]; | ||||
2379 | else | ||||
2380 | memset(&yyval, 0, sizeof yyval); | ||||
2381 | switch (yyn) | ||||
2382 | { | ||||
2383 | case 21: | ||||
2384 | #line 216 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2385 | { file->errors++; } | ||||
2386 | break; | ||||
2387 | case 22: | ||||
2388 | #line 219 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2389 | { | ||||
2390 | struct file *nfile; | ||||
2391 | |||||
2392 | if ((nfile = pushfile(yyvsp[0].v.string, 0)) == NULL((void *)0)) { | ||||
2393 | yyerror("failed to include file %s", yyvsp[0].v.string); | ||||
2394 | free(yyvsp[0].v.string); | ||||
2395 | YYERRORgoto yyerrlab; | ||||
2396 | } | ||||
2397 | free(yyvsp[0].v.string); | ||||
2398 | |||||
2399 | file = nfile; | ||||
2400 | lungetc('\n'); | ||||
2401 | } | ||||
2402 | break; | ||||
2403 | case 23: | ||||
2404 | #line 234 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2405 | { | ||||
2406 | char *s = yyvsp[-2].v.string; | ||||
2407 | while (*s++) { | ||||
2408 | if (isspace((unsigned char)*s)) { | ||||
2409 | yyerror("macro name cannot contain " | ||||
2410 | "whitespace"); | ||||
2411 | free(yyvsp[-2].v.string); | ||||
2412 | free(yyvsp[0].v.string); | ||||
2413 | YYERRORgoto yyerrlab; | ||||
2414 | } | ||||
2415 | } | ||||
2416 | if (symset(yyvsp[-2].v.string, yyvsp[0].v.string, 0) == -1) | ||||
2417 | fatal("cannot store variable"); | ||||
2418 | free(yyvsp[-2].v.string); | ||||
2419 | free(yyvsp[0].v.string); | ||||
2420 | } | ||||
2421 | break; | ||||
2422 | case 30: | ||||
2423 | #line 264 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2424 | { yyval.v.number = 1; } | ||||
2425 | break; | ||||
2426 | case 31: | ||||
2427 | #line 265 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2428 | { yyval.v.number = 0; } | ||||
2429 | break; | ||||
2430 | case 34: | ||||
2431 | #line 271 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2432 | { | ||||
2433 | table_add(table, yyvsp[-2].v.string, yyvsp[0].v.string); | ||||
2434 | free(yyvsp[-2].v.string); | ||||
2435 | free(yyvsp[0].v.string); | ||||
2436 | } | ||||
2437 | break; | ||||
2438 | case 37: | ||||
2439 | #line 282 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2440 | { | ||||
2441 | table_add(table, yyvsp[0].v.string, NULL((void *)0)); | ||||
2442 | free(yyvsp[0].v.string); | ||||
2443 | } | ||||
2444 | break; | ||||
2445 | case 40: | ||||
2446 | #line 292 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2447 | { } | ||||
2448 | break; | ||||
2449 | case 41: | ||||
2450 | #line 293 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2451 | { } | ||||
2452 | break; | ||||
2453 | case 42: | ||||
2454 | #line 297 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2455 | { | ||||
2456 | memset(conf->sc_bounce_warn, 0, sizeof conf->sc_bounce_warn); | ||||
2457 | } | ||||
2458 | break; | ||||
2459 | case 44: | ||||
2460 | #line 304 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2461 | { | ||||
2462 | size_t i; | ||||
2463 | |||||
2464 | for (i = 0; yyvsp[0].v.string[i] != '\0'; i++) { | ||||
2465 | if (!isprint(yyvsp[0].v.string[i])) { | ||||
2466 | yyerror("not a valid admd"); | ||||
2467 | free(yyvsp[0].v.string); | ||||
2468 | YYERRORgoto yyerrlab; | ||||
2469 | } | ||||
2470 | } | ||||
2471 | conf->sc_admd = yyvsp[0].v.string; | ||||
2472 | } | ||||
2473 | break; | ||||
2474 | case 45: | ||||
2475 | #line 319 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2476 | { | ||||
2477 | char buf[HOST_NAME_MAX255+1]; | ||||
2478 | |||||
2479 | /* if not catchall, check that it is a valid domain */ | ||||
2480 | if (strcmp(yyvsp[0].v.string, "*") != 0) { | ||||
2481 | if (!res_hnok__res_hnok(yyvsp[0].v.string)) { | ||||
2482 | yyerror("not a valid domain name: %s", yyvsp[0].v.string); | ||||
2483 | free(yyvsp[0].v.string); | ||||
2484 | YYERRORgoto yyerrlab; | ||||
2485 | } | ||||
2486 | } | ||||
2487 | xlowercase(buf, yyvsp[0].v.string, sizeof(buf)); | ||||
2488 | free(yyvsp[0].v.string); | ||||
2489 | sca = dict_get(conf->sc_ca_dict, buf); | ||||
2490 | if (sca == NULL((void *)0)) { | ||||
2491 | sca = xcalloc(1, sizeof *sca); | ||||
2492 | (void)strlcpy(sca->ca_name, buf, sizeof(sca->ca_name)); | ||||
2493 | dict_set(conf->sc_ca_dict, sca->ca_name, sca); | ||||
2494 | } | ||||
2495 | } | ||||
2496 | break; | ||||
2497 | case 47: | ||||
2498 | #line 343 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2499 | { | ||||
2500 | sca->ca_cert_file = yyvsp[0].v.string; | ||||
2501 | } | ||||
2502 | break; | ||||
2503 | case 50: | ||||
2504 | #line 355 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2505 | { | ||||
2506 | if (dict_get(conf->sc_mda_wrappers, yyvsp[-1].v.string)) { | ||||
2507 | yyerror("mda wrapper already declared with that name: %s", yyvsp[-1].v.string); | ||||
2508 | YYERRORgoto yyerrlab; | ||||
2509 | } | ||||
2510 | dict_set(conf->sc_mda_wrappers, yyvsp[-1].v.string, yyvsp[0].v.string); | ||||
2511 | } | ||||
2512 | break; | ||||
2513 | case 51: | ||||
2514 | #line 366 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2515 | { | ||||
2516 | conf->sc_mta_max_deferred = yyvsp[0].v.number; | ||||
2517 | } | ||||
2518 | break; | ||||
2519 | case 52: | ||||
2520 | #line 369 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2521 | { | ||||
2522 | struct mta_limits *d; | ||||
2523 | |||||
2524 | limits = dict_get(conf->sc_limits_dict, yyvsp[0].v.string); | ||||
2525 | if (limits == NULL((void *)0)) { | ||||
2526 | limits = xcalloc(1, sizeof(*limits)); | ||||
2527 | dict_xset(conf->sc_limits_dict, yyvsp[0].v.string, limits); | ||||
2528 | d = dict_xget(conf->sc_limits_dict, "default"); | ||||
2529 | memmove(limits, d, sizeof(*limits)); | ||||
2530 | } | ||||
2531 | free(yyvsp[0].v.string); | ||||
2532 | } | ||||
2533 | break; | ||||
2534 | case 54: | ||||
2535 | #line 381 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2536 | { | ||||
2537 | limits = dict_get(conf->sc_limits_dict, "default"); | ||||
2538 | } | ||||
2539 | break; | ||||
2540 | case 56: | ||||
2541 | #line 388 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2542 | { | ||||
2543 | char buf[HOST_NAME_MAX255+1]; | ||||
2544 | |||||
2545 | /* if not catchall, check that it is a valid domain */ | ||||
2546 | if (strcmp(yyvsp[0].v.string, "*") != 0) { | ||||
2547 | if (!res_hnok__res_hnok(yyvsp[0].v.string)) { | ||||
2548 | yyerror("not a valid domain name: %s", yyvsp[0].v.string); | ||||
2549 | free(yyvsp[0].v.string); | ||||
2550 | YYERRORgoto yyerrlab; | ||||
2551 | } | ||||
2552 | } | ||||
2553 | xlowercase(buf, yyvsp[0].v.string, sizeof(buf)); | ||||
2554 | free(yyvsp[0].v.string); | ||||
2555 | pki = dict_get(conf->sc_pki_dict, buf); | ||||
2556 | if (pki == NULL((void *)0)) { | ||||
2557 | pki = xcalloc(1, sizeof *pki); | ||||
2558 | (void)strlcpy(pki->pki_name, buf, sizeof(pki->pki_name)); | ||||
2559 | dict_set(conf->sc_pki_dict, pki->pki_name, pki); | ||||
2560 | } | ||||
2561 | } | ||||
2562 | break; | ||||
2563 | case 58: | ||||
2564 | #line 411 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2565 | { | ||||
2566 | pki->pki_cert_file = yyvsp[0].v.string; | ||||
2567 | } | ||||
2568 | break; | ||||
2569 | case 59: | ||||
2570 | #line 414 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2571 | { | ||||
2572 | pki->pki_key_file = yyvsp[0].v.string; | ||||
2573 | } | ||||
2574 | break; | ||||
2575 | case 60: | ||||
2576 | #line 417 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2577 | { | ||||
2578 | if (strcasecmp(yyvsp[0].v.string, "none") == 0) | ||||
2579 | pki->pki_dhe = 0; | ||||
2580 | else if (strcasecmp(yyvsp[0].v.string, "auto") == 0) | ||||
2581 | pki->pki_dhe = 1; | ||||
2582 | else if (strcasecmp(yyvsp[0].v.string, "legacy") == 0) | ||||
2583 | pki->pki_dhe = 2; | ||||
2584 | else { | ||||
2585 | yyerror("invalid DHE keyword: %s", yyvsp[0].v.string); | ||||
2586 | free(yyvsp[0].v.string); | ||||
2587 | YYERRORgoto yyerrlab; | ||||
2588 | } | ||||
2589 | free(yyvsp[0].v.string); | ||||
2590 | } | ||||
2591 | break; | ||||
2592 | case 63: | ||||
2593 | #line 441 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2594 | { | ||||
2595 | if (dict_get(conf->sc_filter_processes_dict, yyvsp[-1].v.string)) { | ||||
2596 | yyerror("processor already exists with that name: %s", yyvsp[-1].v.string); | ||||
2597 | free(yyvsp[-1].v.string); | ||||
2598 | free(yyvsp[0].v.string); | ||||
2599 | YYERRORgoto yyerrlab; | ||||
2600 | } | ||||
2601 | processor = xcalloc(1, sizeof *processor); | ||||
2602 | processor->command = yyvsp[0].v.string; | ||||
2603 | } | ||||
2604 | break; | ||||
2605 | case 64: | ||||
2606 | #line 450 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2607 | { | ||||
2608 | dict_set(conf->sc_filter_processes_dict, yyvsp[-3].v.string, processor); | ||||
2609 | processor = NULL((void *)0); | ||||
2610 | } | ||||
2611 | break; | ||||
2612 | case 65: | ||||
2613 | #line 458 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2614 | { | ||||
2615 | if (processor->user) { | ||||
2616 | yyerror("user already specified for this processor"); | ||||
2617 | free(yyvsp[0].v.string); | ||||
2618 | YYERRORgoto yyerrlab; | ||||
2619 | } | ||||
2620 | processor->user = yyvsp[0].v.string; | ||||
2621 | } | ||||
2622 | break; | ||||
2623 | case 66: | ||||
2624 | #line 466 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2625 | { | ||||
2626 | if (processor->group) { | ||||
2627 | yyerror("group already specified for this processor"); | ||||
2628 | free(yyvsp[0].v.string); | ||||
2629 | YYERRORgoto yyerrlab; | ||||
2630 | } | ||||
2631 | processor->group = yyvsp[0].v.string; | ||||
2632 | } | ||||
2633 | break; | ||||
2634 | case 67: | ||||
2635 | #line 474 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2636 | { | ||||
2637 | if (processor->chroot) { | ||||
2638 | yyerror("chroot already specified for this processor"); | ||||
2639 | free(yyvsp[0].v.string); | ||||
2640 | YYERRORgoto yyerrlab; | ||||
2641 | } | ||||
2642 | processor->chroot = yyvsp[0].v.string; | ||||
2643 | } | ||||
2644 | break; | ||||
2645 | case 70: | ||||
2646 | #line 491 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2647 | { | ||||
2648 | conf->sc_queue_flags |= QUEUE_COMPRESSION0x00000001; | ||||
2649 | } | ||||
2650 | break; | ||||
2651 | case 71: | ||||
2652 | #line 494 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2653 | { | ||||
2654 | conf->sc_queue_flags |= QUEUE_ENCRYPTION0x00000002; | ||||
2655 | } | ||||
2656 | break; | ||||
2657 | case 72: | ||||
2658 | #line 497 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2659 | { | ||||
2660 | if (strcasecmp(yyvsp[0].v.string, "stdin") == 0 || strcasecmp(yyvsp[0].v.string, "-") == 0) { | ||||
2661 | conf->sc_queue_key = "stdin"; | ||||
2662 | free(yyvsp[0].v.string); | ||||
2663 | } | ||||
2664 | else | ||||
2665 | conf->sc_queue_key = yyvsp[0].v.string; | ||||
2666 | conf->sc_queue_flags |= QUEUE_ENCRYPTION0x00000002; | ||||
2667 | } | ||||
2668 | break; | ||||
2669 | case 73: | ||||
2670 | #line 506 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2671 | { | ||||
2672 | conf->sc_ttl = delaytonum(yyvsp[0].v.string); | ||||
2673 | if (conf->sc_ttl == -1) { | ||||
2674 | yyerror("invalid ttl delay: %s", yyvsp[0].v.string); | ||||
2675 | free(yyvsp[0].v.string); | ||||
2676 | YYERRORgoto yyerrlab; | ||||
2677 | } | ||||
2678 | free(yyvsp[0].v.string); | ||||
2679 | } | ||||
2680 | break; | ||||
2681 | case 76: | ||||
2682 | #line 525 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2683 | { | ||||
2684 | conf->sc_tls_ciphers = yyvsp[0].v.string; | ||||
2685 | } | ||||
2686 | break; | ||||
2687 | case 77: | ||||
2688 | #line 528 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2689 | { | ||||
2690 | conf->sc_maxsize = yyvsp[0].v.number; | ||||
2691 | } | ||||
2692 | break; | ||||
2693 | case 78: | ||||
2694 | #line 531 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2695 | { | ||||
2696 | if (strlen(yyvsp[0].v.string) != 1) { | ||||
2697 | yyerror("subaddressing-delimiter must be one character"); | ||||
2698 | free(yyvsp[0].v.string); | ||||
2699 | YYERRORgoto yyerrlab; | ||||
2700 | } | ||||
2701 | if (isspace((unsigned char)*yyvsp[0].v.string) || !isprint((unsigned char)*yyvsp[0].v.string) || *yyvsp[0].v.string == '@') { | ||||
2702 | yyerror("sub-addr-delim uses invalid character"); | ||||
2703 | free(yyvsp[0].v.string); | ||||
2704 | YYERRORgoto yyerrlab; | ||||
2705 | } | ||||
2706 | conf->sc_subaddressing_delim = yyvsp[0].v.string; | ||||
2707 | } | ||||
2708 | break; | ||||
2709 | case 79: | ||||
2710 | #line 547 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2711 | { | ||||
2712 | conf->sc_srs_key = yyvsp[0].v.string; | ||||
2713 | } | ||||
2714 | break; | ||||
2715 | case 80: | ||||
2716 | #line 550 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2717 | { | ||||
2718 | conf->sc_srs_key_backup = yyvsp[0].v.string; | ||||
2719 | } | ||||
2720 | break; | ||||
2721 | case 81: | ||||
2722 | #line 553 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2723 | { | ||||
2724 | conf->sc_srs_ttl = delaytonum(yyvsp[0].v.string); | ||||
2725 | if (conf->sc_srs_ttl == -1) { | ||||
2726 | yyerror("ttl delay \"%s\" is invalid", yyvsp[0].v.string); | ||||
2727 | free(yyvsp[0].v.string); | ||||
2728 | YYERRORgoto yyerrlab; | ||||
2729 | } | ||||
2730 | |||||
2731 | conf->sc_srs_ttl /= 86400; | ||||
2732 | if (conf->sc_srs_ttl == 0) { | ||||
2733 | yyerror("ttl delay \"%s\" is too short", yyvsp[0].v.string); | ||||
2734 | free(yyvsp[0].v.string); | ||||
2735 | YYERRORgoto yyerrlab; | ||||
2736 | } | ||||
2737 | free(yyvsp[0].v.string); | ||||
2738 | } | ||||
2739 | break; | ||||
2740 | case 82: | ||||
2741 | #line 573 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2742 | { | ||||
2743 | if (dsp->u.local.is_mbox) { | ||||
2744 | yyerror("user may not be specified for this dispatcher"); | ||||
2745 | YYERRORgoto yyerrlab; | ||||
2746 | } | ||||
2747 | |||||
2748 | if (dsp->u.local.forward_only) { | ||||
2749 | yyerror("user may not be specified for forward-only"); | ||||
2750 | YYERRORgoto yyerrlab; | ||||
2751 | } | ||||
2752 | |||||
2753 | if (dsp->u.local.expand_only) { | ||||
2754 | yyerror("user may not be specified for expand-only"); | ||||
2755 | YYERRORgoto yyerrlab; | ||||
2756 | } | ||||
2757 | |||||
2758 | if (dsp->u.local.user) { | ||||
2759 | yyerror("user already specified for this dispatcher"); | ||||
2760 | YYERRORgoto yyerrlab; | ||||
2761 | } | ||||
2762 | |||||
2763 | dsp->u.local.user = yyvsp[0].v.string; | ||||
2764 | } | ||||
2765 | break; | ||||
2766 | case 83: | ||||
2767 | #line 596 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2768 | { | ||||
2769 | struct table *t = yyvsp[0].v.table; | ||||
2770 | |||||
2771 | if (dsp->u.local.table_alias) { | ||||
2772 | yyerror("alias mapping already specified for this dispatcher"); | ||||
2773 | YYERRORgoto yyerrlab; | ||||
2774 | } | ||||
2775 | |||||
2776 | if (dsp->u.local.table_virtual) { | ||||
2777 | yyerror("virtual mapping already specified for this dispatcher"); | ||||
2778 | YYERRORgoto yyerrlab; | ||||
2779 | } | ||||
2780 | |||||
2781 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_ALIAS)) { | ||||
2782 | yyerror("table \"%s\" may not be used for alias lookups", | ||||
2783 | t->t_name); | ||||
2784 | YYERRORgoto yyerrlab; | ||||
2785 | } | ||||
2786 | |||||
2787 | dsp->u.local.table_alias = strdup(t->t_name); | ||||
2788 | } | ||||
2789 | break; | ||||
2790 | case 84: | ||||
2791 | #line 617 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2792 | { | ||||
2793 | struct table *t = yyvsp[0].v.table; | ||||
2794 | |||||
2795 | if (dsp->u.local.table_virtual) { | ||||
2796 | yyerror("virtual mapping already specified for this dispatcher"); | ||||
2797 | YYERRORgoto yyerrlab; | ||||
2798 | } | ||||
2799 | |||||
2800 | if (dsp->u.local.table_alias) { | ||||
2801 | yyerror("alias mapping already specified for this dispatcher"); | ||||
2802 | YYERRORgoto yyerrlab; | ||||
2803 | } | ||||
2804 | |||||
2805 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_ALIAS)) { | ||||
2806 | yyerror("table \"%s\" may not be used for virtual lookups", | ||||
2807 | t->t_name); | ||||
2808 | YYERRORgoto yyerrlab; | ||||
2809 | } | ||||
2810 | |||||
2811 | dsp->u.local.table_virtual = strdup(t->t_name); | ||||
2812 | } | ||||
2813 | break; | ||||
2814 | case 85: | ||||
2815 | #line 638 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2816 | { | ||||
2817 | struct table *t = yyvsp[0].v.table; | ||||
2818 | |||||
2819 | if (dsp->u.local.table_userbase) { | ||||
2820 | yyerror("userbase mapping already specified for this dispatcher"); | ||||
2821 | YYERRORgoto yyerrlab; | ||||
2822 | } | ||||
2823 | |||||
2824 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_USERINFO)) { | ||||
2825 | yyerror("table \"%s\" may not be used for userbase lookups", | ||||
2826 | t->t_name); | ||||
2827 | YYERRORgoto yyerrlab; | ||||
2828 | } | ||||
2829 | |||||
2830 | dsp->u.local.table_userbase = strdup(t->t_name); | ||||
2831 | } | ||||
2832 | break; | ||||
2833 | case 86: | ||||
2834 | #line 654 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2835 | { | ||||
2836 | if (! dict_get(conf->sc_mda_wrappers, yyvsp[0].v.string)) { | ||||
2837 | yyerror("no mda wrapper with that name: %s", yyvsp[0].v.string); | ||||
2838 | YYERRORgoto yyerrlab; | ||||
2839 | } | ||||
2840 | dsp->u.local.mda_wrapper = yyvsp[0].v.string; | ||||
2841 | } | ||||
2842 | break; | ||||
2843 | case 89: | ||||
2844 | #line 669 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2845 | { | ||||
2846 | dsp->u.local.is_mbox = 1; | ||||
2847 | asprintf(&dsp->u.local.command, "/usr/libexec/mail.local -f %%{mbox.from} -- %%{user.username}"); | ||||
2848 | } | ||||
2849 | break; | ||||
2850 | case 91: | ||||
2851 | #line 673 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2852 | { | ||||
2853 | asprintf(&dsp->u.local.command, "/usr/libexec/mail.maildir"); | ||||
2854 | } | ||||
2855 | break; | ||||
2856 | case 93: | ||||
2857 | #line 676 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2858 | { | ||||
2859 | asprintf(&dsp->u.local.command, "/usr/libexec/mail.maildir -j"); | ||||
2860 | } | ||||
2861 | break; | ||||
2862 | case 95: | ||||
2863 | #line 679 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2864 | { | ||||
2865 | if (strncmp(yyvsp[0].v.string, "~/", 2) == 0) | ||||
2866 | asprintf(&dsp->u.local.command, | ||||
2867 | "/usr/libexec/mail.maildir \"%%{user.directory}/%s\"", yyvsp[0].v.string+2); | ||||
2868 | else | ||||
2869 | asprintf(&dsp->u.local.command, | ||||
2870 | "/usr/libexec/mail.maildir \"%s\"", yyvsp[0].v.string); | ||||
2871 | } | ||||
2872 | break; | ||||
2873 | case 97: | ||||
2874 | #line 687 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2875 | { | ||||
2876 | if (strncmp(yyvsp[-1].v.string, "~/", 2) == 0) | ||||
2877 | asprintf(&dsp->u.local.command, | ||||
2878 | "/usr/libexec/mail.maildir -j \"%%{user.directory}/%s\"", yyvsp[-1].v.string+2); | ||||
2879 | else | ||||
2880 | asprintf(&dsp->u.local.command, | ||||
2881 | "/usr/libexec/mail.maildir -j \"%s\"", yyvsp[-1].v.string); | ||||
2882 | } | ||||
2883 | break; | ||||
2884 | case 99: | ||||
2885 | #line 695 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2886 | { | ||||
2887 | asprintf(&dsp->u.local.command, | ||||
2888 | "/usr/libexec/mail.lmtp -d %s -u", yyvsp[0].v.string); | ||||
2889 | dsp->u.local.user = SMTPD_USER"_smtpd"; | ||||
2890 | } | ||||
2891 | break; | ||||
2892 | case 101: | ||||
2893 | #line 700 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2894 | { | ||||
2895 | asprintf(&dsp->u.local.command, | ||||
2896 | "/usr/libexec/mail.lmtp -d %s -r", yyvsp[-1].v.string); | ||||
2897 | dsp->u.local.user = SMTPD_USER"_smtpd"; | ||||
2898 | } | ||||
2899 | break; | ||||
2900 | case 103: | ||||
2901 | #line 705 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2902 | { | ||||
2903 | asprintf(&dsp->u.local.command, | ||||
2904 | "/usr/libexec/mail.mda \"%s\"", yyvsp[0].v.string); | ||||
2905 | } | ||||
2906 | break; | ||||
2907 | case 105: | ||||
2908 | #line 709 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2909 | { | ||||
2910 | dsp->u.local.forward_only = 1; | ||||
2911 | } | ||||
2912 | break; | ||||
2913 | case 107: | ||||
2914 | #line 712 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2915 | { | ||||
2916 | dsp->u.local.expand_only = 1; | ||||
2917 | } | ||||
2918 | break; | ||||
2919 | case 109: | ||||
2920 | #line 719 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2921 | { | ||||
2922 | if (dsp->u.remote.helo) { | ||||
2923 | yyerror("helo already specified for this dispatcher"); | ||||
2924 | YYERRORgoto yyerrlab; | ||||
2925 | } | ||||
2926 | |||||
2927 | dsp->u.remote.helo = yyvsp[0].v.string; | ||||
2928 | } | ||||
2929 | break; | ||||
2930 | case 110: | ||||
2931 | #line 727 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2932 | { | ||||
2933 | struct table *t = yyvsp[0].v.table; | ||||
2934 | |||||
2935 | if (dsp->u.remote.helo_source) { | ||||
2936 | yyerror("helo-source mapping already specified for this dispatcher"); | ||||
2937 | YYERRORgoto yyerrlab; | ||||
2938 | } | ||||
2939 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_ADDRNAME)) { | ||||
2940 | yyerror("table \"%s\" may not be used for helo-source lookups", | ||||
2941 | t->t_name); | ||||
2942 | YYERRORgoto yyerrlab; | ||||
2943 | } | ||||
2944 | |||||
2945 | dsp->u.remote.helo_source = strdup(t->t_name); | ||||
2946 | } | ||||
2947 | break; | ||||
2948 | case 111: | ||||
2949 | #line 742 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2950 | { | ||||
2951 | if (dsp->u.remote.pki) { | ||||
2952 | yyerror("pki already specified for this dispatcher"); | ||||
2953 | YYERRORgoto yyerrlab; | ||||
2954 | } | ||||
2955 | |||||
2956 | dsp->u.remote.pki = yyvsp[0].v.string; | ||||
2957 | } | ||||
2958 | break; | ||||
2959 | case 112: | ||||
2960 | #line 750 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2961 | { | ||||
2962 | if (dsp->u.remote.ca) { | ||||
2963 | yyerror("ca already specified for this dispatcher"); | ||||
2964 | YYERRORgoto yyerrlab; | ||||
2965 | } | ||||
2966 | |||||
2967 | dsp->u.remote.ca = yyvsp[0].v.string; | ||||
2968 | } | ||||
2969 | break; | ||||
2970 | case 113: | ||||
2971 | #line 758 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2972 | { | ||||
2973 | if (dsp->u.remote.tls_ciphers) { | ||||
2974 | yyerror("ciphers already specified for this dispatcher"); | ||||
2975 | YYERRORgoto yyerrlab; | ||||
2976 | } | ||||
2977 | |||||
2978 | dsp->u.remote.tls_ciphers = yyvsp[0].v.string; | ||||
2979 | } | ||||
2980 | break; | ||||
2981 | case 114: | ||||
2982 | #line 766 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2983 | { | ||||
2984 | if (dsp->u.remote.tls_protocols) { | ||||
2985 | yyerror("protocols already specified for this dispatcher"); | ||||
2986 | YYERRORgoto yyerrlab; | ||||
2987 | } | ||||
2988 | |||||
2989 | dsp->u.remote.tls_protocols = yyvsp[0].v.string; | ||||
2990 | } | ||||
2991 | break; | ||||
2992 | case 115: | ||||
2993 | #line 774 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
2994 | { | ||||
2995 | struct table *t = yyvsp[0].v.table; | ||||
2996 | |||||
2997 | if (dsp->u.remote.source) { | ||||
2998 | yyerror("source mapping already specified for this dispatcher"); | ||||
2999 | YYERRORgoto yyerrlab; | ||||
3000 | } | ||||
3001 | |||||
3002 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_SOURCE)) { | ||||
3003 | yyerror("table \"%s\" may not be used for source lookups", | ||||
3004 | t->t_name); | ||||
3005 | YYERRORgoto yyerrlab; | ||||
3006 | } | ||||
3007 | |||||
3008 | dsp->u.remote.source = strdup(t->t_name); | ||||
3009 | } | ||||
3010 | break; | ||||
3011 | case 116: | ||||
3012 | #line 790 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3013 | { | ||||
3014 | if (dsp->u.remote.mail_from) { | ||||
3015 | yyerror("mail-from already specified for this dispatcher"); | ||||
3016 | YYERRORgoto yyerrlab; | ||||
3017 | } | ||||
3018 | |||||
3019 | dsp->u.remote.mail_from = yyvsp[0].v.string; | ||||
3020 | } | ||||
3021 | break; | ||||
3022 | case 117: | ||||
3023 | #line 798 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3024 | { | ||||
3025 | if (dsp->u.remote.backup) { | ||||
3026 | yyerror("backup already specified for this dispatcher"); | ||||
3027 | YYERRORgoto yyerrlab; | ||||
3028 | } | ||||
3029 | if (dsp->u.remote.smarthost) { | ||||
3030 | yyerror("backup and host are mutually exclusive"); | ||||
3031 | YYERRORgoto yyerrlab; | ||||
3032 | } | ||||
3033 | |||||
3034 | dsp->u.remote.backup = 1; | ||||
3035 | dsp->u.remote.backupmx = yyvsp[0].v.string; | ||||
3036 | } | ||||
3037 | break; | ||||
3038 | case 118: | ||||
3039 | #line 811 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3040 | { | ||||
3041 | if (dsp->u.remote.backup) { | ||||
3042 | yyerror("backup already specified for this dispatcher"); | ||||
3043 | YYERRORgoto yyerrlab; | ||||
3044 | } | ||||
3045 | if (dsp->u.remote.smarthost) { | ||||
3046 | yyerror("backup and host are mutually exclusive"); | ||||
3047 | YYERRORgoto yyerrlab; | ||||
3048 | } | ||||
3049 | |||||
3050 | dsp->u.remote.backup = 1; | ||||
3051 | } | ||||
3052 | break; | ||||
3053 | case 119: | ||||
3054 | #line 823 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3055 | { | ||||
3056 | struct table *t = yyvsp[0].v.table; | ||||
3057 | |||||
3058 | if (dsp->u.remote.smarthost) { | ||||
3059 | yyerror("host mapping already specified for this dispatcher"); | ||||
3060 | YYERRORgoto yyerrlab; | ||||
3061 | } | ||||
3062 | if (dsp->u.remote.backup) { | ||||
3063 | yyerror("backup and host are mutually exclusive"); | ||||
3064 | YYERRORgoto yyerrlab; | ||||
3065 | } | ||||
3066 | |||||
3067 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_RELAYHOST)) { | ||||
3068 | yyerror("table \"%s\" may not be used for host lookups", | ||||
3069 | t->t_name); | ||||
3070 | YYERRORgoto yyerrlab; | ||||
3071 | } | ||||
3072 | |||||
3073 | dsp->u.remote.smarthost = strdup(t->t_name); | ||||
3074 | } | ||||
3075 | break; | ||||
3076 | case 120: | ||||
3077 | #line 843 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3078 | { | ||||
3079 | struct table *t = yyvsp[0].v.table; | ||||
3080 | |||||
3081 | if (dsp->u.remote.smarthost) { | ||||
3082 | yyerror("host mapping already specified for this dispatcher"); | ||||
3083 | YYERRORgoto yyerrlab; | ||||
3084 | } | ||||
3085 | if (dsp->u.remote.backup) { | ||||
3086 | yyerror("backup and domain are mutually exclusive"); | ||||
3087 | YYERRORgoto yyerrlab; | ||||
3088 | } | ||||
3089 | |||||
3090 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_RELAYHOST)) { | ||||
3091 | yyerror("table \"%s\" may not be used for host lookups", | ||||
3092 | t->t_name); | ||||
3093 | YYERRORgoto yyerrlab; | ||||
3094 | } | ||||
3095 | |||||
3096 | dsp->u.remote.smarthost = strdup(t->t_name); | ||||
3097 | dsp->u.remote.smarthost_domain = 1; | ||||
3098 | } | ||||
3099 | break; | ||||
3100 | case 121: | ||||
3101 | #line 864 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3102 | { | ||||
3103 | if (dsp->u.remote.tls_required == 1) { | ||||
3104 | yyerror("tls already specified for this dispatcher"); | ||||
3105 | YYERRORgoto yyerrlab; | ||||
3106 | } | ||||
3107 | |||||
3108 | dsp->u.remote.tls_required = 1; | ||||
3109 | } | ||||
3110 | break; | ||||
3111 | case 122: | ||||
3112 | #line 872 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3113 | { | ||||
3114 | if (dsp->u.remote.tls_required == 1) { | ||||
3115 | yyerror("tls already specified for this dispatcher"); | ||||
3116 | YYERRORgoto yyerrlab; | ||||
3117 | } | ||||
3118 | |||||
3119 | dsp->u.remote.tls_required = 1; | ||||
3120 | dsp->u.remote.tls_noverify = 1; | ||||
3121 | } | ||||
3122 | break; | ||||
3123 | case 123: | ||||
3124 | #line 881 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3125 | { | ||||
3126 | struct table *t = yyvsp[0].v.table; | ||||
3127 | |||||
3128 | if (dsp->u.remote.smarthost == NULL((void *)0)) { | ||||
3129 | yyerror("auth may not be specified without host on a dispatcher"); | ||||
3130 | YYERRORgoto yyerrlab; | ||||
3131 | } | ||||
3132 | |||||
3133 | if (dsp->u.remote.auth) { | ||||
3134 | yyerror("auth mapping already specified for this dispatcher"); | ||||
3135 | YYERRORgoto yyerrlab; | ||||
3136 | } | ||||
3137 | |||||
3138 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_CREDENTIALS)) { | ||||
3139 | yyerror("table \"%s\" may not be used for auth lookups", | ||||
3140 | t->t_name); | ||||
3141 | YYERRORgoto yyerrlab; | ||||
3142 | } | ||||
3143 | |||||
3144 | dsp->u.remote.auth = strdup(t->t_name); | ||||
3145 | } | ||||
3146 | break; | ||||
3147 | case 124: | ||||
3148 | #line 902 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3149 | { | ||||
3150 | struct filter_config *fc; | ||||
3151 | |||||
3152 | if (dsp->u.remote.filtername) { | ||||
3153 | yyerror("filter already specified for this dispatcher"); | ||||
3154 | YYERRORgoto yyerrlab; | ||||
3155 | } | ||||
3156 | |||||
3157 | if ((fc = dict_get(conf->sc_filters_dict, yyvsp[0].v.string)) == NULL((void *)0)) { | ||||
3158 | yyerror("no filter exist with that name: %s", yyvsp[0].v.string); | ||||
3159 | free(yyvsp[0].v.string); | ||||
3160 | YYERRORgoto yyerrlab; | ||||
3161 | } | ||||
3162 | fc->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_OUT; | ||||
3163 | dsp->u.remote.filtername = yyvsp[0].v.string; | ||||
3164 | } | ||||
3165 | break; | ||||
3166 | case 125: | ||||
3167 | #line 918 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3168 | { | ||||
3169 | char buffer[128]; | ||||
3170 | char *filtername; | ||||
3171 | |||||
3172 | if (dsp->u.remote.filtername) { | ||||
3173 | yyerror("filter already specified for this dispatcher"); | ||||
3174 | YYERRORgoto yyerrlab; | ||||
3175 | } | ||||
3176 | |||||
3177 | do { | ||||
3178 | (void)snprintf(buffer, sizeof buffer, "<dynchain:%08x>", last_dynchain_id++); | ||||
3179 | } while (dict_check(conf->sc_filters_dict, buffer)); | ||||
3180 | |||||
3181 | filtername = xstrdup(buffer); | ||||
3182 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
3183 | filter_config->filter_type = FILTER_TYPE_CHAIN; | ||||
3184 | filter_config->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_OUT; | ||||
3185 | dict_init(&filter_config->chain_procs)do { do { (&((&filter_config->chain_procs)->dict ))->sph_root = ((void *)0); } while (0); (&filter_config ->chain_procs)->count = 0; } while(0); | ||||
3186 | dsp->u.remote.filtername = filtername; | ||||
3187 | } | ||||
3188 | break; | ||||
3189 | case 126: | ||||
3190 | #line 937 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3191 | { | ||||
3192 | dict_set(conf->sc_filters_dict, dsp->u.remote.filtername, filter_config); | ||||
3193 | filter_config = NULL((void *)0); | ||||
3194 | } | ||||
3195 | break; | ||||
3196 | case 127: | ||||
3197 | #line 941 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3198 | { | ||||
3199 | if (conf->sc_srs_key == NULL((void *)0)) { | ||||
3200 | yyerror("an srs key is required for srs to be specified in an action"); | ||||
3201 | YYERRORgoto yyerrlab; | ||||
3202 | } | ||||
3203 | if (dsp->u.remote.srs == 1) { | ||||
3204 | yyerror("srs already specified for this dispatcher"); | ||||
3205 | YYERRORgoto yyerrlab; | ||||
3206 | } | ||||
3207 | |||||
3208 | dsp->u.remote.srs = 1; | ||||
3209 | } | ||||
3210 | break; | ||||
3211 | case 131: | ||||
3212 | #line 965 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3213 | { | ||||
3214 | dsp->type = DISPATCHER_LOCAL; | ||||
3215 | } | ||||
3216 | break; | ||||
3217 | case 132: | ||||
3218 | #line 968 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3219 | { | ||||
3220 | dsp->type = DISPATCHER_REMOTE; | ||||
3221 | } | ||||
3222 | break; | ||||
3223 | case 133: | ||||
3224 | #line 974 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3225 | { | ||||
3226 | if (dsp->ttl) { | ||||
3227 | yyerror("ttl already specified for this dispatcher"); | ||||
3228 | YYERRORgoto yyerrlab; | ||||
3229 | } | ||||
3230 | |||||
3231 | dsp->ttl = delaytonum(yyvsp[0].v.string); | ||||
3232 | if (dsp->ttl == -1) { | ||||
3233 | yyerror("ttl delay \"%s\" is invalid", yyvsp[0].v.string); | ||||
3234 | free(yyvsp[0].v.string); | ||||
3235 | YYERRORgoto yyerrlab; | ||||
3236 | } | ||||
3237 | free(yyvsp[0].v.string); | ||||
3238 | } | ||||
3239 | break; | ||||
3240 | case 136: | ||||
3241 | #line 996 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3242 | { | ||||
3243 | if (dict_get(conf->sc_dispatchers, yyvsp[0].v.string)) { | ||||
3244 | yyerror("dispatcher already declared with that name: %s", yyvsp[0].v.string); | ||||
3245 | YYERRORgoto yyerrlab; | ||||
3246 | } | ||||
3247 | dsp = xcalloc(1, sizeof *dsp); | ||||
3248 | } | ||||
3249 | break; | ||||
3250 | case 137: | ||||
3251 | #line 1002 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3252 | { | ||||
3253 | if (dsp->type == DISPATCHER_LOCAL) | ||||
3254 | if (dsp->u.local.table_userbase == NULL((void *)0)) | ||||
3255 | dsp->u.local.table_userbase = "<getpwnam>"; | ||||
3256 | dict_set(conf->sc_dispatchers, yyvsp[-3].v.string, dsp); | ||||
3257 | dsp = NULL((void *)0); | ||||
3258 | } | ||||
3259 | break; | ||||
3260 | case 138: | ||||
3261 | #line 1012 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3262 | { | ||||
3263 | struct table *t = yyvsp[0].v.table; | ||||
3264 | |||||
3265 | if (rule->flag_tag) { | ||||
3266 | yyerror("tag already specified for this rule"); | ||||
3267 | YYERRORgoto yyerrlab; | ||||
3268 | } | ||||
3269 | |||||
3270 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_STRING)) { | ||||
3271 | yyerror("table \"%s\" may not be used for tag lookups", | ||||
3272 | t->t_name); | ||||
3273 | YYERRORgoto yyerrlab; | ||||
3274 | } | ||||
3275 | |||||
3276 | rule->flag_tag = yyvsp[-2].v.number ? -1 : 1; | ||||
3277 | rule->table_tag = strdup(t->t_name); | ||||
3278 | } | ||||
3279 | break; | ||||
3280 | case 139: | ||||
3281 | #line 1030 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3282 | { | ||||
3283 | struct table *t = yyvsp[0].v.table; | ||||
3284 | |||||
3285 | if (rule->flag_tag) { | ||||
3286 | yyerror("tag already specified for this rule"); | ||||
3287 | YYERRORgoto yyerrlab; | ||||
3288 | } | ||||
3289 | |||||
3290 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3291 | yyerror("table \"%s\" may not be used for tag lookups", | ||||
3292 | t->t_name); | ||||
3293 | YYERRORgoto yyerrlab; | ||||
3294 | } | ||||
3295 | |||||
3296 | rule->flag_tag = yyvsp[-3].v.number ? -1 : 1; | ||||
3297 | rule->flag_tag_regex = 1; | ||||
3298 | rule->table_tag = strdup(t->t_name); | ||||
3299 | } | ||||
3300 | break; | ||||
3301 | case 140: | ||||
3302 | #line 1049 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3303 | { | ||||
3304 | struct table *t = yyvsp[0].v.table; | ||||
3305 | |||||
3306 | if (rule->flag_smtp_helo) { | ||||
3307 | yyerror("helo already specified for this rule"); | ||||
3308 | YYERRORgoto yyerrlab; | ||||
3309 | } | ||||
3310 | |||||
3311 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_DOMAIN)) { | ||||
3312 | yyerror("table \"%s\" may not be used for helo lookups", | ||||
3313 | t->t_name); | ||||
3314 | YYERRORgoto yyerrlab; | ||||
3315 | } | ||||
3316 | |||||
3317 | rule->flag_smtp_helo = yyvsp[-2].v.number ? -1 : 1; | ||||
3318 | rule->table_smtp_helo = strdup(t->t_name); | ||||
3319 | } | ||||
3320 | break; | ||||
3321 | case 141: | ||||
3322 | #line 1066 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3323 | { | ||||
3324 | struct table *t = yyvsp[0].v.table; | ||||
3325 | |||||
3326 | if (rule->flag_smtp_helo) { | ||||
3327 | yyerror("helo already specified for this rule"); | ||||
3328 | YYERRORgoto yyerrlab; | ||||
3329 | } | ||||
3330 | |||||
3331 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3332 | yyerror("table \"%s\" may not be used for helo lookups", | ||||
3333 | t->t_name); | ||||
3334 | YYERRORgoto yyerrlab; | ||||
3335 | } | ||||
3336 | |||||
3337 | rule->flag_smtp_helo = yyvsp[-3].v.number ? -1 : 1; | ||||
3338 | rule->flag_smtp_helo_regex = 1; | ||||
3339 | rule->table_smtp_helo = strdup(t->t_name); | ||||
3340 | } | ||||
3341 | break; | ||||
3342 | case 142: | ||||
3343 | #line 1084 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3344 | { | ||||
3345 | if (rule->flag_smtp_starttls) { | ||||
3346 | yyerror("tls already specified for this rule"); | ||||
3347 | YYERRORgoto yyerrlab; | ||||
3348 | } | ||||
3349 | rule->flag_smtp_starttls = yyvsp[-1].v.number ? -1 : 1; | ||||
3350 | } | ||||
3351 | break; | ||||
3352 | case 143: | ||||
3353 | #line 1091 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3354 | { | ||||
3355 | if (rule->flag_smtp_auth) { | ||||
3356 | yyerror("auth already specified for this rule"); | ||||
3357 | YYERRORgoto yyerrlab; | ||||
3358 | } | ||||
3359 | rule->flag_smtp_auth = yyvsp[-1].v.number ? -1 : 1; | ||||
3360 | } | ||||
3361 | break; | ||||
3362 | case 144: | ||||
3363 | #line 1098 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3364 | { | ||||
3365 | struct table *t = yyvsp[0].v.table; | ||||
3366 | |||||
3367 | if (rule->flag_smtp_auth) { | ||||
3368 | yyerror("auth already specified for this rule"); | ||||
3369 | YYERRORgoto yyerrlab; | ||||
3370 | } | ||||
3371 | |||||
3372 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_STRING|K_CREDENTIALS)) { | ||||
3373 | yyerror("table \"%s\" may not be used for auth lookups", | ||||
3374 | t->t_name); | ||||
3375 | YYERRORgoto yyerrlab; | ||||
3376 | } | ||||
3377 | |||||
3378 | rule->flag_smtp_auth = yyvsp[-2].v.number ? -1 : 1; | ||||
3379 | rule->table_smtp_auth = strdup(t->t_name); | ||||
3380 | } | ||||
3381 | break; | ||||
3382 | case 145: | ||||
3383 | #line 1115 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3384 | { | ||||
3385 | struct table *t = yyvsp[0].v.table; | ||||
3386 | |||||
3387 | if (rule->flag_smtp_auth) { | ||||
3388 | yyerror("auth already specified for this rule"); | ||||
3389 | YYERRORgoto yyerrlab; | ||||
3390 | } | ||||
3391 | |||||
3392 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3393 | yyerror("table \"%s\" may not be used for auth lookups", | ||||
3394 | t->t_name); | ||||
3395 | YYERRORgoto yyerrlab; | ||||
3396 | } | ||||
3397 | |||||
3398 | rule->flag_smtp_auth = yyvsp[-3].v.number ? -1 : 1; | ||||
3399 | rule->flag_smtp_auth_regex = 1; | ||||
3400 | rule->table_smtp_auth = strdup(t->t_name); | ||||
3401 | } | ||||
3402 | break; | ||||
3403 | case 146: | ||||
3404 | #line 1133 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3405 | { | ||||
3406 | struct table *t = yyvsp[0].v.table; | ||||
3407 | |||||
3408 | if (rule->flag_smtp_mail_from) { | ||||
3409 | yyerror("mail-from already specified for this rule"); | ||||
3410 | YYERRORgoto yyerrlab; | ||||
3411 | } | ||||
3412 | |||||
3413 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_MAILADDR)) { | ||||
3414 | yyerror("table \"%s\" may not be used for mail-from lookups", | ||||
3415 | t->t_name); | ||||
3416 | YYERRORgoto yyerrlab; | ||||
3417 | } | ||||
3418 | |||||
3419 | rule->flag_smtp_mail_from = yyvsp[-2].v.number ? -1 : 1; | ||||
3420 | rule->table_smtp_mail_from = strdup(t->t_name); | ||||
3421 | } | ||||
3422 | break; | ||||
3423 | case 147: | ||||
3424 | #line 1150 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3425 | { | ||||
3426 | struct table *t = yyvsp[0].v.table; | ||||
3427 | |||||
3428 | if (rule->flag_smtp_mail_from) { | ||||
3429 | yyerror("mail-from already specified for this rule"); | ||||
3430 | YYERRORgoto yyerrlab; | ||||
3431 | } | ||||
3432 | |||||
3433 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3434 | yyerror("table \"%s\" may not be used for mail-from lookups", | ||||
3435 | t->t_name); | ||||
3436 | YYERRORgoto yyerrlab; | ||||
3437 | } | ||||
3438 | |||||
3439 | rule->flag_smtp_mail_from = yyvsp[-3].v.number ? -1 : 1; | ||||
3440 | rule->flag_smtp_mail_from_regex = 1; | ||||
3441 | rule->table_smtp_mail_from = strdup(t->t_name); | ||||
3442 | } | ||||
3443 | break; | ||||
3444 | case 148: | ||||
3445 | #line 1168 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3446 | { | ||||
3447 | struct table *t = yyvsp[0].v.table; | ||||
3448 | |||||
3449 | if (rule->flag_smtp_rcpt_to) { | ||||
3450 | yyerror("rcpt-to already specified for this rule"); | ||||
3451 | YYERRORgoto yyerrlab; | ||||
3452 | } | ||||
3453 | |||||
3454 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_MAILADDR)) { | ||||
3455 | yyerror("table \"%s\" may not be used for rcpt-to lookups", | ||||
3456 | t->t_name); | ||||
3457 | YYERRORgoto yyerrlab; | ||||
3458 | } | ||||
3459 | |||||
3460 | rule->flag_smtp_rcpt_to = yyvsp[-2].v.number ? -1 : 1; | ||||
3461 | rule->table_smtp_rcpt_to = strdup(t->t_name); | ||||
3462 | } | ||||
3463 | break; | ||||
3464 | case 149: | ||||
3465 | #line 1185 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3466 | { | ||||
3467 | struct table *t = yyvsp[0].v.table; | ||||
3468 | |||||
3469 | if (rule->flag_smtp_rcpt_to) { | ||||
3470 | yyerror("rcpt-to already specified for this rule"); | ||||
3471 | YYERRORgoto yyerrlab; | ||||
3472 | } | ||||
3473 | |||||
3474 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3475 | yyerror("table \"%s\" may not be used for rcpt-to lookups", | ||||
3476 | t->t_name); | ||||
3477 | YYERRORgoto yyerrlab; | ||||
3478 | } | ||||
3479 | |||||
3480 | rule->flag_smtp_rcpt_to = yyvsp[-3].v.number ? -1 : 1; | ||||
3481 | rule->flag_smtp_rcpt_to_regex = 1; | ||||
3482 | rule->table_smtp_rcpt_to = strdup(t->t_name); | ||||
3483 | } | ||||
3484 | break; | ||||
3485 | case 150: | ||||
3486 | #line 1204 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3487 | { | ||||
3488 | if (rule->flag_from) { | ||||
3489 | yyerror("from already specified for this rule"); | ||||
3490 | YYERRORgoto yyerrlab; | ||||
3491 | } | ||||
3492 | rule->flag_from = yyvsp[-2].v.number ? -1 : 1; | ||||
3493 | rule->flag_from_socket = 1; | ||||
3494 | } | ||||
3495 | break; | ||||
3496 | case 151: | ||||
3497 | #line 1212 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3498 | { | ||||
3499 | struct table *t = table_find(conf, "<localhost>"); | ||||
3500 | |||||
3501 | if (rule->flag_from) { | ||||
3502 | yyerror("from already specified for this rule"); | ||||
3503 | YYERRORgoto yyerrlab; | ||||
3504 | } | ||||
3505 | rule->flag_from = yyvsp[-2].v.number ? -1 : 1; | ||||
3506 | rule->table_from = strdup(t->t_name); | ||||
3507 | } | ||||
3508 | break; | ||||
3509 | case 152: | ||||
3510 | #line 1222 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3511 | { | ||||
3512 | struct table *t = table_find(conf, "<anyhost>"); | ||||
3513 | |||||
3514 | if (rule->flag_from) { | ||||
3515 | yyerror("from already specified for this rule"); | ||||
3516 | YYERRORgoto yyerrlab; | ||||
3517 | } | ||||
3518 | rule->flag_from = yyvsp[-2].v.number ? -1 : 1; | ||||
3519 | rule->table_from = strdup(t->t_name); | ||||
3520 | } | ||||
3521 | break; | ||||
3522 | case 153: | ||||
3523 | #line 1232 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3524 | { | ||||
3525 | struct table *t = yyvsp[0].v.table; | ||||
3526 | |||||
3527 | if (rule->flag_from) { | ||||
3528 | yyerror("from already specified for this rule"); | ||||
3529 | YYERRORgoto yyerrlab; | ||||
3530 | } | ||||
3531 | |||||
3532 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_NETADDR)) { | ||||
3533 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3534 | t->t_name); | ||||
3535 | YYERRORgoto yyerrlab; | ||||
3536 | } | ||||
3537 | |||||
3538 | rule->flag_from = yyvsp[-3].v.number ? -1 : 1; | ||||
3539 | rule->table_from = strdup(t->t_name); | ||||
3540 | } | ||||
3541 | break; | ||||
3542 | case 154: | ||||
3543 | #line 1249 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3544 | { | ||||
3545 | struct table *t = yyvsp[0].v.table; | ||||
3546 | |||||
3547 | if (rule->flag_from) { | ||||
3548 | yyerror("from already specified for this rule"); | ||||
3549 | YYERRORgoto yyerrlab; | ||||
3550 | } | ||||
3551 | |||||
3552 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3553 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3554 | t->t_name); | ||||
3555 | YYERRORgoto yyerrlab; | ||||
3556 | } | ||||
3557 | |||||
3558 | rule->flag_from = yyvsp[-4].v.number ? -1 : 1; | ||||
3559 | rule->flag_from_regex = 1; | ||||
3560 | rule->table_from = strdup(t->t_name); | ||||
3561 | } | ||||
3562 | break; | ||||
3563 | case 155: | ||||
3564 | #line 1267 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3565 | { | ||||
3566 | if (rule->flag_from) { | ||||
3567 | yyerror("from already specified for this rule"); | ||||
3568 | YYERRORgoto yyerrlab; | ||||
3569 | } | ||||
3570 | rule->flag_from = yyvsp[-2].v.number ? -1 : 1; | ||||
3571 | rule->flag_from_rdns = 1; | ||||
3572 | } | ||||
3573 | break; | ||||
3574 | case 156: | ||||
3575 | #line 1275 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3576 | { | ||||
3577 | struct table *t = yyvsp[0].v.table; | ||||
3578 | |||||
3579 | if (rule->flag_from) { | ||||
3580 | yyerror("from already specified for this rule"); | ||||
3581 | YYERRORgoto yyerrlab; | ||||
3582 | } | ||||
3583 | |||||
3584 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_DOMAIN)) { | ||||
3585 | yyerror("table \"%s\" may not be used for rdns lookups", | ||||
3586 | t->t_name); | ||||
3587 | YYERRORgoto yyerrlab; | ||||
3588 | } | ||||
3589 | |||||
3590 | rule->flag_from = yyvsp[-3].v.number ? -1 : 1; | ||||
3591 | rule->flag_from_rdns = 1; | ||||
3592 | rule->table_from = strdup(t->t_name); | ||||
3593 | } | ||||
3594 | break; | ||||
3595 | case 157: | ||||
3596 | #line 1293 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3597 | { | ||||
3598 | struct table *t = yyvsp[0].v.table; | ||||
3599 | |||||
3600 | if (rule->flag_from) { | ||||
3601 | yyerror("from already specified for this rule"); | ||||
3602 | YYERRORgoto yyerrlab; | ||||
3603 | } | ||||
3604 | |||||
3605 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_DOMAIN)) { | ||||
3606 | yyerror("table \"%s\" may not be used for rdns lookups", | ||||
3607 | t->t_name); | ||||
3608 | YYERRORgoto yyerrlab; | ||||
3609 | } | ||||
3610 | |||||
3611 | rule->flag_from = yyvsp[-4].v.number ? -1 : 1; | ||||
3612 | rule->flag_from_regex = 1; | ||||
3613 | rule->flag_from_rdns = 1; | ||||
3614 | rule->table_from = strdup(t->t_name); | ||||
3615 | } | ||||
3616 | break; | ||||
3617 | case 158: | ||||
3618 | #line 1313 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3619 | { | ||||
3620 | struct table *anyhost = table_find(conf, "<anyhost>"); | ||||
3621 | |||||
3622 | if (rule->flag_from) { | ||||
3623 | yyerror("from already specified for this rule"); | ||||
3624 | YYERRORgoto yyerrlab; | ||||
3625 | } | ||||
3626 | |||||
3627 | rule->flag_from = 1; | ||||
3628 | rule->table_from = strdup(anyhost->t_name); | ||||
3629 | rule->flag_smtp_auth = yyvsp[-2].v.number ? -1 : 1; | ||||
3630 | } | ||||
3631 | break; | ||||
3632 | case 159: | ||||
3633 | #line 1325 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3634 | { | ||||
3635 | struct table *anyhost = table_find(conf, "<anyhost>"); | ||||
3636 | struct table *t = yyvsp[0].v.table; | ||||
3637 | |||||
3638 | if (rule->flag_from) { | ||||
3639 | yyerror("from already specified for this rule"); | ||||
3640 | YYERRORgoto yyerrlab; | ||||
3641 | } | ||||
3642 | |||||
3643 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_STRING|K_CREDENTIALS)) { | ||||
3644 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3645 | t->t_name); | ||||
3646 | YYERRORgoto yyerrlab; | ||||
3647 | } | ||||
3648 | |||||
3649 | rule->flag_from = 1; | ||||
3650 | rule->table_from = strdup(anyhost->t_name); | ||||
3651 | rule->flag_smtp_auth = yyvsp[-3].v.number ? -1 : 1; | ||||
3652 | rule->table_smtp_auth = strdup(t->t_name); | ||||
3653 | } | ||||
3654 | break; | ||||
3655 | case 160: | ||||
3656 | #line 1345 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3657 | { | ||||
3658 | struct table *anyhost = table_find(conf, "<anyhost>"); | ||||
3659 | struct table *t = yyvsp[0].v.table; | ||||
3660 | |||||
3661 | if (rule->flag_from) { | ||||
3662 | yyerror("from already specified for this rule"); | ||||
3663 | YYERRORgoto yyerrlab; | ||||
3664 | } | ||||
3665 | |||||
3666 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3667 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3668 | t->t_name); | ||||
3669 | YYERRORgoto yyerrlab; | ||||
3670 | } | ||||
3671 | |||||
3672 | rule->flag_from = 1; | ||||
3673 | rule->table_from = strdup(anyhost->t_name); | ||||
3674 | rule->flag_smtp_auth = yyvsp[-4].v.number ? -1 : 1; | ||||
3675 | rule->flag_smtp_auth_regex = 1; | ||||
3676 | rule->table_smtp_auth = strdup(t->t_name); | ||||
3677 | } | ||||
3678 | break; | ||||
3679 | case 161: | ||||
3680 | #line 1367 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3681 | { | ||||
3682 | struct table *anyhost = table_find(conf, "<anyhost>"); | ||||
3683 | struct table *t = yyvsp[0].v.table; | ||||
3684 | |||||
3685 | if (rule->flag_from) { | ||||
3686 | yyerror("from already specified for this rule"); | ||||
3687 | YYERRORgoto yyerrlab; | ||||
3688 | } | ||||
3689 | |||||
3690 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_MAILADDR)) { | ||||
3691 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3692 | t->t_name); | ||||
3693 | YYERRORgoto yyerrlab; | ||||
3694 | } | ||||
3695 | |||||
3696 | rule->flag_from = 1; | ||||
3697 | rule->table_from = strdup(anyhost->t_name); | ||||
3698 | rule->flag_smtp_mail_from = yyvsp[-3].v.number ? -1 : 1; | ||||
3699 | rule->table_smtp_mail_from = strdup(t->t_name); | ||||
3700 | } | ||||
3701 | break; | ||||
3702 | case 162: | ||||
3703 | #line 1387 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3704 | { | ||||
3705 | struct table *anyhost = table_find(conf, "<anyhost>"); | ||||
3706 | struct table *t = yyvsp[0].v.table; | ||||
3707 | |||||
3708 | if (rule->flag_from) { | ||||
3709 | yyerror("from already specified for this rule"); | ||||
3710 | YYERRORgoto yyerrlab; | ||||
3711 | } | ||||
3712 | |||||
3713 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3714 | yyerror("table \"%s\" may not be used for from lookups", | ||||
3715 | t->t_name); | ||||
3716 | YYERRORgoto yyerrlab; | ||||
3717 | } | ||||
3718 | |||||
3719 | rule->flag_from = 1; | ||||
3720 | rule->table_from = strdup(anyhost->t_name); | ||||
3721 | rule->flag_smtp_mail_from = yyvsp[-4].v.number ? -1 : 1; | ||||
3722 | rule->flag_smtp_mail_from_regex = 1; | ||||
3723 | rule->table_smtp_mail_from = strdup(t->t_name); | ||||
3724 | } | ||||
3725 | break; | ||||
3726 | case 163: | ||||
3727 | #line 1409 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3728 | { | ||||
3729 | struct table *t = table_find(conf, "<localnames>"); | ||||
3730 | |||||
3731 | if (rule->flag_for) { | ||||
3732 | yyerror("for already specified for this rule"); | ||||
3733 | YYERRORgoto yyerrlab; | ||||
3734 | } | ||||
3735 | rule->flag_for = yyvsp[-2].v.number ? -1 : 1; | ||||
3736 | rule->table_for = strdup(t->t_name); | ||||
3737 | } | ||||
3738 | break; | ||||
3739 | case 164: | ||||
3740 | #line 1419 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3741 | { | ||||
3742 | struct table *t = table_find(conf, "<anydestination>"); | ||||
3743 | |||||
3744 | if (rule->flag_for) { | ||||
3745 | yyerror("for already specified for this rule"); | ||||
3746 | YYERRORgoto yyerrlab; | ||||
3747 | } | ||||
3748 | rule->flag_for = yyvsp[-2].v.number ? -1 : 1; | ||||
3749 | rule->table_for = strdup(t->t_name); | ||||
3750 | } | ||||
3751 | break; | ||||
3752 | case 165: | ||||
3753 | #line 1429 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3754 | { | ||||
3755 | struct table *t = yyvsp[0].v.table; | ||||
3756 | |||||
3757 | if (rule->flag_for) { | ||||
3758 | yyerror("for already specified for this rule"); | ||||
3759 | YYERRORgoto yyerrlab; | ||||
3760 | } | ||||
3761 | |||||
3762 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_DOMAIN)) { | ||||
3763 | yyerror("table \"%s\" may not be used for 'for' lookups", | ||||
3764 | t->t_name); | ||||
3765 | YYERRORgoto yyerrlab; | ||||
3766 | } | ||||
3767 | |||||
3768 | rule->flag_for = yyvsp[-3].v.number ? -1 : 1; | ||||
3769 | rule->table_for = strdup(t->t_name); | ||||
3770 | } | ||||
3771 | break; | ||||
3772 | case 166: | ||||
3773 | #line 1446 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3774 | { | ||||
3775 | struct table *t = yyvsp[0].v.table; | ||||
3776 | |||||
3777 | if (rule->flag_for) { | ||||
3778 | yyerror("for already specified for this rule"); | ||||
3779 | YYERRORgoto yyerrlab; | ||||
3780 | } | ||||
3781 | |||||
3782 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3783 | yyerror("table \"%s\" may not be used for 'for' lookups", | ||||
3784 | t->t_name); | ||||
3785 | YYERRORgoto yyerrlab; | ||||
3786 | } | ||||
3787 | |||||
3788 | rule->flag_for = yyvsp[-4].v.number ? -1 : 1; | ||||
3789 | rule->flag_for_regex = 1; | ||||
3790 | rule->table_for = strdup(t->t_name); | ||||
3791 | } | ||||
3792 | break; | ||||
3793 | case 167: | ||||
3794 | #line 1464 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3795 | { | ||||
3796 | struct table *anyhost = table_find(conf, "<anydestination>"); | ||||
3797 | struct table *t = yyvsp[0].v.table; | ||||
3798 | |||||
3799 | if (rule->flag_for) { | ||||
3800 | yyerror("for already specified for this rule"); | ||||
3801 | YYERRORgoto yyerrlab; | ||||
3802 | } | ||||
3803 | |||||
3804 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_MAILADDR)) { | ||||
3805 | yyerror("table \"%s\" may not be used for for lookups", | ||||
3806 | t->t_name); | ||||
3807 | YYERRORgoto yyerrlab; | ||||
3808 | } | ||||
3809 | |||||
3810 | rule->flag_for = 1; | ||||
3811 | rule->table_for = strdup(anyhost->t_name); | ||||
3812 | rule->flag_smtp_rcpt_to = yyvsp[-3].v.number ? -1 : 1; | ||||
3813 | rule->table_smtp_rcpt_to = strdup(t->t_name); | ||||
3814 | } | ||||
3815 | break; | ||||
3816 | case 168: | ||||
3817 | #line 1484 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3818 | { | ||||
3819 | struct table *anyhost = table_find(conf, "<anydestination>"); | ||||
3820 | struct table *t = yyvsp[0].v.table; | ||||
3821 | |||||
3822 | if (rule->flag_for) { | ||||
3823 | yyerror("for already specified for this rule"); | ||||
3824 | YYERRORgoto yyerrlab; | ||||
3825 | } | ||||
3826 | |||||
3827 | if (!table_check_use(t, T_DYNAMIC|T_LIST, K_REGEX)) { | ||||
3828 | yyerror("table \"%s\" may not be used for for lookups", | ||||
3829 | t->t_name); | ||||
3830 | YYERRORgoto yyerrlab; | ||||
3831 | } | ||||
3832 | |||||
3833 | rule->flag_for = 1; | ||||
3834 | rule->table_for = strdup(anyhost->t_name); | ||||
3835 | rule->flag_smtp_rcpt_to = yyvsp[-4].v.number ? -1 : 1; | ||||
3836 | rule->flag_smtp_rcpt_to_regex = 1; | ||||
3837 | rule->table_smtp_rcpt_to = strdup(t->t_name); | ||||
3838 | } | ||||
3839 | break; | ||||
3840 | case 171: | ||||
3841 | #line 1513 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3842 | { | ||||
3843 | if (dict_get(conf->sc_dispatchers, yyvsp[0].v.string) == NULL((void *)0)) { | ||||
3844 | yyerror("no such dispatcher: %s", yyvsp[0].v.string); | ||||
3845 | YYERRORgoto yyerrlab; | ||||
3846 | } | ||||
3847 | rule->dispatcher = yyvsp[0].v.string; | ||||
3848 | } | ||||
3849 | break; | ||||
3850 | case 172: | ||||
3851 | #line 1523 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3852 | { | ||||
3853 | rule->reject = 1; | ||||
3854 | } | ||||
3855 | break; | ||||
3856 | case 174: | ||||
3857 | #line 1530 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3858 | { | ||||
3859 | rule = xcalloc(1, sizeof *rule); | ||||
3860 | } | ||||
3861 | break; | ||||
3862 | case 175: | ||||
3863 | #line 1532 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3864 | { | ||||
3865 | if (!rule->flag_from) { | ||||
3866 | rule->table_from = strdup("<localhost>"); | ||||
3867 | rule->flag_from = 1; | ||||
3868 | } | ||||
3869 | if (!rule->flag_for) { | ||||
3870 | rule->table_for = strdup("<localnames>"); | ||||
3871 | rule->flag_for = 1; | ||||
3872 | } | ||||
3873 | TAILQ_INSERT_TAIL(conf->sc_rules, rule, r_entry)do { (rule)->r_entry.tqe_next = ((void *)0); (rule)->r_entry .tqe_prev = (conf->sc_rules)->tqh_last; *(conf->sc_rules )->tqh_last = (rule); (conf->sc_rules)->tqh_last = & (rule)->r_entry.tqe_next; } while (0); | ||||
3874 | rule = NULL((void *)0); | ||||
3875 | } | ||||
3876 | break; | ||||
3877 | case 177: | ||||
3878 | #line 1548 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3879 | { | ||||
3880 | filter_config->junk = 1; | ||||
3881 | } | ||||
3882 | break; | ||||
3883 | case 178: | ||||
3884 | #line 1551 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3885 | { | ||||
3886 | filter_config->bypass = 1; | ||||
3887 | } | ||||
3888 | break; | ||||
3889 | case 179: | ||||
3890 | #line 1557 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3891 | { | ||||
3892 | filter_config->reject = yyvsp[0].v.string; | ||||
3893 | } | ||||
3894 | break; | ||||
3895 | case 180: | ||||
3896 | #line 1560 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3897 | { | ||||
3898 | filter_config->disconnect = yyvsp[0].v.string; | ||||
3899 | } | ||||
3900 | break; | ||||
3901 | case 181: | ||||
3902 | #line 1563 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3903 | { | ||||
3904 | filter_config->rewrite = yyvsp[0].v.string; | ||||
3905 | } | ||||
3906 | break; | ||||
3907 | case 182: | ||||
3908 | #line 1566 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3909 | { | ||||
3910 | filter_config->report = yyvsp[0].v.string; | ||||
3911 | } | ||||
3912 | break; | ||||
3913 | case 183: | ||||
3914 | #line 1572 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3915 | { | ||||
3916 | filter_config->not_fcrdns = yyvsp[-1].v.number ? -1 : 1; | ||||
3917 | filter_config->fcrdns = 1; | ||||
3918 | } | ||||
3919 | break; | ||||
3920 | case 184: | ||||
3921 | #line 1579 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3922 | { | ||||
3923 | filter_config->not_rdns = yyvsp[-1].v.number ? -1 : 1; | ||||
3924 | filter_config->rdns = 1; | ||||
3925 | } | ||||
3926 | break; | ||||
3927 | case 185: | ||||
3928 | #line 1586 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3929 | { | ||||
3930 | filter_config->not_rdns_table = yyvsp[-2].v.number ? -1 : 1; | ||||
3931 | filter_config->rdns_table = yyvsp[0].v.table; | ||||
3932 | } | ||||
3933 | break; | ||||
3934 | case 186: | ||||
3935 | #line 1592 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3936 | { | ||||
3937 | filter_config->not_rdns_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
3938 | filter_config->rdns_regex = yyvsp[0].v.table; | ||||
3939 | } | ||||
3940 | break; | ||||
3941 | case 187: | ||||
3942 | #line 1599 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3943 | { | ||||
3944 | filter_config->not_src_table = yyvsp[-2].v.number ? -1 : 1; | ||||
3945 | filter_config->src_table = yyvsp[0].v.table; | ||||
3946 | } | ||||
3947 | break; | ||||
3948 | case 188: | ||||
3949 | #line 1605 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3950 | { | ||||
3951 | filter_config->not_src_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
3952 | filter_config->src_regex = yyvsp[0].v.table; | ||||
3953 | } | ||||
3954 | break; | ||||
3955 | case 189: | ||||
3956 | #line 1612 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3957 | { | ||||
3958 | filter_config->not_helo_table = yyvsp[-2].v.number ? -1 : 1; | ||||
3959 | filter_config->helo_table = yyvsp[0].v.table; | ||||
3960 | } | ||||
3961 | break; | ||||
3962 | case 190: | ||||
3963 | #line 1618 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3964 | { | ||||
3965 | filter_config->not_helo_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
3966 | filter_config->helo_regex = yyvsp[0].v.table; | ||||
3967 | } | ||||
3968 | break; | ||||
3969 | case 191: | ||||
3970 | #line 1625 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3971 | { | ||||
3972 | filter_config->not_auth = yyvsp[-1].v.number ? -1 : 1; | ||||
3973 | filter_config->auth = 1; | ||||
3974 | } | ||||
3975 | break; | ||||
3976 | case 192: | ||||
3977 | #line 1631 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3978 | { | ||||
3979 | filter_config->not_auth_table = yyvsp[-2].v.number ? -1 : 1; | ||||
3980 | filter_config->auth_table = yyvsp[0].v.table; | ||||
3981 | } | ||||
3982 | break; | ||||
3983 | case 193: | ||||
3984 | #line 1637 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3985 | { | ||||
3986 | filter_config->not_auth_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
3987 | filter_config->auth_regex = yyvsp[0].v.table; | ||||
3988 | } | ||||
3989 | break; | ||||
3990 | case 194: | ||||
3991 | #line 1644 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3992 | { | ||||
3993 | filter_config->not_mail_from_table = yyvsp[-2].v.number ? -1 : 1; | ||||
3994 | filter_config->mail_from_table = yyvsp[0].v.table; | ||||
3995 | } | ||||
3996 | break; | ||||
3997 | case 195: | ||||
3998 | #line 1650 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
3999 | { | ||||
4000 | filter_config->not_mail_from_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
4001 | filter_config->mail_from_regex = yyvsp[0].v.table; | ||||
4002 | } | ||||
4003 | break; | ||||
4004 | case 196: | ||||
4005 | #line 1657 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4006 | { | ||||
4007 | filter_config->not_rcpt_to_table = yyvsp[-2].v.number ? -1 : 1; | ||||
4008 | filter_config->rcpt_to_table = yyvsp[0].v.table; | ||||
4009 | } | ||||
4010 | break; | ||||
4011 | case 197: | ||||
4012 | #line 1663 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4013 | { | ||||
4014 | filter_config->not_rcpt_to_regex = yyvsp[-3].v.number ? -1 : 1; | ||||
4015 | filter_config->rcpt_to_regex = yyvsp[0].v.table; | ||||
4016 | } | ||||
4017 | break; | ||||
4018 | case 248: | ||||
4019 | #line 1754 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4020 | { | ||||
4021 | filter_config->phase = FILTER_CONNECT; | ||||
4022 | } | ||||
4023 | break; | ||||
4024 | case 250: | ||||
4025 | #line 1761 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4026 | { | ||||
4027 | filter_config->phase = FILTER_HELO; | ||||
4028 | } | ||||
4029 | break; | ||||
4030 | case 252: | ||||
4031 | #line 1767 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4032 | { | ||||
4033 | filter_config->phase = FILTER_EHLO; | ||||
4034 | } | ||||
4035 | break; | ||||
4036 | case 254: | ||||
4037 | #line 1773 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4038 | { | ||||
4039 | } | ||||
4040 | break; | ||||
4041 | case 256: | ||||
4042 | #line 1778 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4043 | { | ||||
4044 | filter_config->phase = FILTER_MAIL_FROM; | ||||
4045 | } | ||||
4046 | break; | ||||
4047 | case 258: | ||||
4048 | #line 1784 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4049 | { | ||||
4050 | filter_config->phase = FILTER_RCPT_TO; | ||||
4051 | } | ||||
4052 | break; | ||||
4053 | case 260: | ||||
4054 | #line 1790 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4055 | { | ||||
4056 | filter_config->phase = FILTER_DATA; | ||||
4057 | } | ||||
4058 | break; | ||||
4059 | case 262: | ||||
4060 | #line 1822 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4061 | { | ||||
4062 | filter_config->phase = FILTER_COMMIT; | ||||
4063 | } | ||||
4064 | break; | ||||
4065 | case 272: | ||||
4066 | #line 1846 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4067 | { | ||||
4068 | struct filter_config *fr; | ||||
4069 | size_t i; | ||||
4070 | |||||
4071 | if ((fr = dict_get(conf->sc_filters_dict, yyvsp[0].v.string)) == NULL((void *)0)) { | ||||
4072 | yyerror("no filter exist with that name: %s", yyvsp[0].v.string); | ||||
4073 | free(yyvsp[0].v.string); | ||||
4074 | YYERRORgoto yyerrlab; | ||||
4075 | } | ||||
4076 | if (fr->filter_type == FILTER_TYPE_CHAIN) { | ||||
4077 | yyerror("no filter chain allowed within a filter chain: %s", yyvsp[0].v.string); | ||||
4078 | free(yyvsp[0].v.string); | ||||
4079 | YYERRORgoto yyerrlab; | ||||
4080 | } | ||||
4081 | |||||
4082 | for (i = 0; i < filter_config->chain_size; i++) { | ||||
4083 | if (strcmp(filter_config->chain[i], yyvsp[0].v.string) == 0) { | ||||
4084 | yyerror("no filter allowed twice within a filter chain: %s", yyvsp[0].v.string); | ||||
4085 | free(yyvsp[0].v.string); | ||||
4086 | YYERRORgoto yyerrlab; | ||||
4087 | } | ||||
4088 | } | ||||
4089 | |||||
4090 | if (fr->proc) { | ||||
4091 | if (dict_get(&filter_config->chain_procs, fr->proc)) { | ||||
4092 | yyerror("no proc allowed twice within a filter chain: %s", fr->proc); | ||||
4093 | free(yyvsp[0].v.string); | ||||
4094 | YYERRORgoto yyerrlab; | ||||
4095 | } | ||||
4096 | dict_set(&filter_config->chain_procs, fr->proc, NULL((void *)0)); | ||||
4097 | } | ||||
4098 | |||||
4099 | fr->filter_subsystem |= filter_config->filter_subsystem; | ||||
4100 | filter_config->chain_size += 1; | ||||
4101 | filter_config->chain = reallocarray(filter_config->chain, filter_config->chain_size, sizeof(char *)); | ||||
4102 | if (filter_config->chain == NULL((void *)0)) | ||||
4103 | fatal("reallocarray"); | ||||
4104 | filter_config->chain[filter_config->chain_size - 1] = yyvsp[0].v.string; | ||||
4105 | } | ||||
4106 | break; | ||||
4107 | case 275: | ||||
4108 | #line 1893 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4109 | { | ||||
4110 | |||||
4111 | if (dict_get(conf->sc_filters_dict, yyvsp[-2].v.string)) { | ||||
4112 | yyerror("filter already exists with that name: %s", yyvsp[-2].v.string); | ||||
4113 | free(yyvsp[-2].v.string); | ||||
4114 | free(yyvsp[0].v.string); | ||||
4115 | YYERRORgoto yyerrlab; | ||||
4116 | } | ||||
4117 | if (dict_get(conf->sc_filter_processes_dict, yyvsp[0].v.string) == NULL((void *)0)) { | ||||
4118 | yyerror("no processor exist with that name: %s", yyvsp[0].v.string); | ||||
4119 | free(yyvsp[0].v.string); | ||||
4120 | YYERRORgoto yyerrlab; | ||||
4121 | } | ||||
4122 | |||||
4123 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4124 | filter_config->filter_type = FILTER_TYPE_PROC; | ||||
4125 | filter_config->name = yyvsp[-2].v.string; | ||||
4126 | filter_config->proc = yyvsp[0].v.string; | ||||
4127 | dict_set(conf->sc_filters_dict, yyvsp[-2].v.string, filter_config); | ||||
4128 | filter_config = NULL((void *)0); | ||||
4129 | } | ||||
4130 | break; | ||||
4131 | case 276: | ||||
4132 | #line 1915 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4133 | { | ||||
4134 | if (dict_get(conf->sc_filters_dict, yyvsp[-2].v.string)) { | ||||
4135 | yyerror("filter already exists with that name: %s", yyvsp[-2].v.string); | ||||
4136 | free(yyvsp[-2].v.string); | ||||
4137 | free(yyvsp[0].v.string); | ||||
4138 | YYERRORgoto yyerrlab; | ||||
4139 | } | ||||
4140 | |||||
4141 | processor = xcalloc(1, sizeof *processor); | ||||
4142 | processor->command = yyvsp[0].v.string; | ||||
4143 | |||||
4144 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4145 | filter_config->filter_type = FILTER_TYPE_PROC; | ||||
4146 | filter_config->name = yyvsp[-2].v.string; | ||||
4147 | filter_config->proc = xstrdup(yyvsp[-2].v.string); | ||||
4148 | dict_set(conf->sc_filters_dict, yyvsp[-2].v.string, filter_config); | ||||
4149 | } | ||||
4150 | break; | ||||
4151 | case 277: | ||||
4152 | #line 1931 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4153 | { | ||||
4154 | dict_set(conf->sc_filter_processes_dict, filter_config->proc, processor); | ||||
4155 | processor = NULL((void *)0); | ||||
4156 | filter_config = NULL((void *)0); | ||||
4157 | } | ||||
4158 | break; | ||||
4159 | case 278: | ||||
4160 | #line 1937 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4161 | { | ||||
4162 | if (dict_get(conf->sc_filters_dict, yyvsp[-1].v.string)) { | ||||
4163 | yyerror("filter already exists with that name: %s", yyvsp[-1].v.string); | ||||
4164 | free(yyvsp[-1].v.string); | ||||
4165 | YYERRORgoto yyerrlab; | ||||
4166 | } | ||||
4167 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4168 | filter_config->name = yyvsp[-1].v.string; | ||||
4169 | filter_config->filter_type = FILTER_TYPE_BUILTIN; | ||||
4170 | dict_set(conf->sc_filters_dict, yyvsp[-1].v.string, filter_config); | ||||
4171 | } | ||||
4172 | break; | ||||
4173 | case 279: | ||||
4174 | #line 1947 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4175 | { | ||||
4176 | filter_config = NULL((void *)0); | ||||
4177 | } | ||||
4178 | break; | ||||
4179 | case 280: | ||||
4180 | #line 1951 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4181 | { | ||||
4182 | if (dict_get(conf->sc_filters_dict, yyvsp[-1].v.string)) { | ||||
4183 | yyerror("filter already exists with that name: %s", yyvsp[-1].v.string); | ||||
4184 | free(yyvsp[-1].v.string); | ||||
4185 | YYERRORgoto yyerrlab; | ||||
4186 | } | ||||
4187 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4188 | filter_config->filter_type = FILTER_TYPE_CHAIN; | ||||
4189 | dict_init(&filter_config->chain_procs)do { do { (&((&filter_config->chain_procs)->dict ))->sph_root = ((void *)0); } while (0); (&filter_config ->chain_procs)->count = 0; } while(0); | ||||
4190 | } | ||||
4191 | break; | ||||
4192 | case 281: | ||||
4193 | #line 1960 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4194 | { | ||||
4195 | dict_set(conf->sc_filters_dict, yyvsp[-5].v.string, filter_config); | ||||
4196 | filter_config = NULL((void *)0); | ||||
4197 | } | ||||
4198 | break; | ||||
4199 | case 282: | ||||
4200 | #line 1966 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4201 | { | ||||
4202 | if (yyvsp[0].v.number < 0) { | ||||
4203 | yyerror("invalid size: %" PRId64"lld", yyvsp[0].v.number); | ||||
4204 | YYERRORgoto yyerrlab; | ||||
4205 | } | ||||
4206 | yyval.v.number = yyvsp[0].v.number; | ||||
4207 | } | ||||
4208 | break; | ||||
4209 | case 283: | ||||
4210 | #line 1973 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4211 | { | ||||
4212 | long long result; | ||||
4213 | |||||
4214 | if (scan_scaled(yyvsp[0].v.string, &result) == -1 || result < 0) { | ||||
4215 | yyerror("invalid size: %s", yyvsp[0].v.string); | ||||
4216 | free(yyvsp[0].v.string); | ||||
4217 | YYERRORgoto yyerrlab; | ||||
4218 | } | ||||
4219 | free(yyvsp[0].v.string); | ||||
4220 | yyval.v.number = result; | ||||
4221 | } | ||||
4222 | break; | ||||
4223 | case 284: | ||||
4224 | #line 1986 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4225 | { | ||||
4226 | time_t d; | ||||
4227 | int i; | ||||
4228 | |||||
4229 | d = delaytonum(yyvsp[0].v.string); | ||||
4230 | if (d < 0) { | ||||
4231 | yyerror("invalid bounce delay: %s", yyvsp[0].v.string); | ||||
4232 | free(yyvsp[0].v.string); | ||||
4233 | YYERRORgoto yyerrlab; | ||||
4234 | } | ||||
4235 | free(yyvsp[0].v.string); | ||||
4236 | for (i = 0; i < MAX_BOUNCE_WARN4; i++) { | ||||
4237 | if (conf->sc_bounce_warn[i] != 0) | ||||
4238 | continue; | ||||
4239 | conf->sc_bounce_warn[i] = d; | ||||
4240 | break; | ||||
4241 | } | ||||
4242 | } | ||||
4243 | break; | ||||
4244 | case 287: | ||||
4245 | #line 2010 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4246 | { | ||||
4247 | if (!strcmp(yyvsp[-1].v.string, "max-session")) { | ||||
4248 | conf->sc_mda_max_session = yyvsp[0].v.number; | ||||
4249 | } | ||||
4250 | else if (!strcmp(yyvsp[-1].v.string, "max-session-per-user")) { | ||||
4251 | conf->sc_mda_max_user_session = yyvsp[0].v.number; | ||||
4252 | } | ||||
4253 | else if (!strcmp(yyvsp[-1].v.string, "task-lowat")) { | ||||
4254 | conf->sc_mda_task_lowat = yyvsp[0].v.number; | ||||
4255 | } | ||||
4256 | else if (!strcmp(yyvsp[-1].v.string, "task-hiwat")) { | ||||
4257 | conf->sc_mda_task_hiwat = yyvsp[0].v.number; | ||||
4258 | } | ||||
4259 | else if (!strcmp(yyvsp[-1].v.string, "task-release")) { | ||||
4260 | conf->sc_mda_task_release = yyvsp[0].v.number; | ||||
4261 | } | ||||
4262 | else { | ||||
4263 | yyerror("invalid scheduler limit keyword: %s", yyvsp[-1].v.string); | ||||
4264 | free(yyvsp[-1].v.string); | ||||
4265 | YYERRORgoto yyerrlab; | ||||
4266 | } | ||||
4267 | free(yyvsp[-1].v.string); | ||||
4268 | } | ||||
4269 | break; | ||||
4270 | case 290: | ||||
4271 | #line 2039 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4272 | { | ||||
4273 | if (!strcmp(yyvsp[-1].v.string, "max-rcpt")) { | ||||
4274 | conf->sc_session_max_rcpt = yyvsp[0].v.number; | ||||
4275 | } | ||||
4276 | else if (!strcmp(yyvsp[-1].v.string, "max-mails")) { | ||||
4277 | conf->sc_session_max_mails = yyvsp[0].v.number; | ||||
4278 | } | ||||
4279 | else { | ||||
4280 | yyerror("invalid session limit keyword: %s", yyvsp[-1].v.string); | ||||
4281 | free(yyvsp[-1].v.string); | ||||
4282 | YYERRORgoto yyerrlab; | ||||
4283 | } | ||||
4284 | free(yyvsp[-1].v.string); | ||||
4285 | } | ||||
4286 | break; | ||||
4287 | case 293: | ||||
4288 | #line 2059 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4289 | { | ||||
4290 | limits->family = AF_INET2; | ||||
4291 | } | ||||
4292 | break; | ||||
4293 | case 294: | ||||
4294 | #line 2062 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4295 | { | ||||
4296 | limits->family = AF_INET624; | ||||
4297 | } | ||||
4298 | break; | ||||
4299 | case 295: | ||||
4300 | #line 2065 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4301 | { | ||||
4302 | if (!limit_mta_set(limits, yyvsp[-1].v.string, yyvsp[0].v.number)) { | ||||
4303 | yyerror("invalid mta limit keyword: %s", yyvsp[-1].v.string); | ||||
4304 | free(yyvsp[-1].v.string); | ||||
4305 | YYERRORgoto yyerrlab; | ||||
4306 | } | ||||
4307 | free(yyvsp[-1].v.string); | ||||
4308 | } | ||||
4309 | break; | ||||
4310 | case 298: | ||||
4311 | #line 2079 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4312 | { | ||||
4313 | if (!strcmp(yyvsp[-1].v.string, "max-inflight")) { | ||||
4314 | conf->sc_scheduler_max_inflight = yyvsp[0].v.number; | ||||
4315 | } | ||||
4316 | else if (!strcmp(yyvsp[-1].v.string, "max-evp-batch-size")) { | ||||
4317 | conf->sc_scheduler_max_evp_batch_size = yyvsp[0].v.number; | ||||
4318 | } | ||||
4319 | else if (!strcmp(yyvsp[-1].v.string, "max-msg-batch-size")) { | ||||
4320 | conf->sc_scheduler_max_msg_batch_size = yyvsp[0].v.number; | ||||
4321 | } | ||||
4322 | else if (!strcmp(yyvsp[-1].v.string, "max-schedule")) { | ||||
4323 | conf->sc_scheduler_max_schedule = yyvsp[0].v.number; | ||||
4324 | } | ||||
4325 | else { | ||||
4326 | yyerror("invalid scheduler limit keyword: %s", yyvsp[-1].v.string); | ||||
4327 | free(yyvsp[-1].v.string); | ||||
4328 | YYERRORgoto yyerrlab; | ||||
4329 | } | ||||
4330 | free(yyvsp[-1].v.string); | ||||
4331 | } | ||||
4332 | break; | ||||
4333 | case 301: | ||||
4334 | #line 2106 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4335 | { | ||||
4336 | struct filter_config *fc; | ||||
4337 | |||||
4338 | if (listen_opts.options & LO_FILTER) { | ||||
4339 | yyerror("filter already specified"); | ||||
4340 | free(yyvsp[0].v.string); | ||||
4341 | YYERRORgoto yyerrlab; | ||||
4342 | } | ||||
4343 | if ((fc = dict_get(conf->sc_filters_dict, yyvsp[0].v.string)) == NULL((void *)0)) { | ||||
4344 | yyerror("no filter exist with that name: %s", yyvsp[0].v.string); | ||||
4345 | free(yyvsp[0].v.string); | ||||
4346 | YYERRORgoto yyerrlab; | ||||
4347 | } | ||||
4348 | fc->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_IN; | ||||
4349 | listen_opts.options |= LO_FILTER; | ||||
4350 | listen_opts.filtername = yyvsp[0].v.string; | ||||
4351 | } | ||||
4352 | break; | ||||
4353 | case 302: | ||||
4354 | #line 2123 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4355 | { | ||||
4356 | char buffer[128]; | ||||
4357 | |||||
4358 | if (listen_opts.options & LO_FILTER) { | ||||
4359 | yyerror("filter already specified"); | ||||
4360 | YYERRORgoto yyerrlab; | ||||
4361 | } | ||||
4362 | |||||
4363 | do { | ||||
4364 | (void)snprintf(buffer, sizeof buffer, "<dynchain:%08x>", last_dynchain_id++); | ||||
4365 | } while (dict_check(conf->sc_filters_dict, buffer)); | ||||
4366 | |||||
4367 | listen_opts.options |= LO_FILTER; | ||||
4368 | listen_opts.filtername = xstrdup(buffer); | ||||
4369 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4370 | filter_config->filter_type = FILTER_TYPE_CHAIN; | ||||
4371 | filter_config->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_IN; | ||||
4372 | dict_init(&filter_config->chain_procs)do { do { (&((&filter_config->chain_procs)->dict ))->sph_root = ((void *)0); } while (0); (&filter_config ->chain_procs)->count = 0; } while(0); | ||||
4373 | } | ||||
4374 | break; | ||||
4375 | case 303: | ||||
4376 | #line 2141 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4377 | { | ||||
4378 | dict_set(conf->sc_filters_dict, listen_opts.filtername, filter_config); | ||||
4379 | filter_config = NULL((void *)0); | ||||
4380 | } | ||||
4381 | break; | ||||
4382 | case 304: | ||||
4383 | #line 2145 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4384 | { | ||||
4385 | if (config_lo_mask_source(&listen_opts)) { | ||||
4386 | YYERRORgoto yyerrlab; | ||||
4387 | } | ||||
4388 | } | ||||
4389 | break; | ||||
4390 | case 305: | ||||
4391 | #line 2150 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4392 | { | ||||
4393 | if (listen_opts.options & LO_TAG) { | ||||
4394 | yyerror("tag already specified"); | ||||
4395 | YYERRORgoto yyerrlab; | ||||
4396 | } | ||||
4397 | listen_opts.options |= LO_TAG; | ||||
4398 | |||||
4399 | if (strlen(yyvsp[0].v.string) >= SMTPD_TAG_SIZE(32 + 1)) { | ||||
4400 | yyerror("tag name too long"); | ||||
4401 | free(yyvsp[0].v.string); | ||||
4402 | YYERRORgoto yyerrlab; | ||||
4403 | } | ||||
4404 | listen_opts.tag = yyvsp[0].v.string; | ||||
4405 | } | ||||
4406 | break; | ||||
4407 | case 306: | ||||
4408 | #line 2166 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4409 | { | ||||
4410 | if (listen_opts.options & LO_FAMILY) { | ||||
4411 | yyerror("address family already specified"); | ||||
4412 | YYERRORgoto yyerrlab; | ||||
4413 | } | ||||
4414 | listen_opts.options |= LO_FAMILY; | ||||
4415 | listen_opts.family = AF_INET2; | ||||
4416 | } | ||||
4417 | break; | ||||
4418 | case 307: | ||||
4419 | #line 2174 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4420 | { | ||||
4421 | if (listen_opts.options & LO_FAMILY) { | ||||
4422 | yyerror("address family already specified"); | ||||
4423 | YYERRORgoto yyerrlab; | ||||
4424 | } | ||||
4425 | listen_opts.options |= LO_FAMILY; | ||||
4426 | listen_opts.family = AF_INET624; | ||||
4427 | } | ||||
4428 | break; | ||||
4429 | case 308: | ||||
4430 | #line 2182 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4431 | { | ||||
4432 | struct servent *servent; | ||||
4433 | |||||
4434 | if (listen_opts.options & LO_PORT) { | ||||
4435 | yyerror("port already specified"); | ||||
4436 | YYERRORgoto yyerrlab; | ||||
4437 | } | ||||
4438 | listen_opts.options |= LO_PORT; | ||||
4439 | |||||
4440 | servent = getservbyname(yyvsp[0].v.string, "tcp"); | ||||
4441 | if (servent == NULL((void *)0)) { | ||||
4442 | yyerror("invalid port: %s", yyvsp[0].v.string); | ||||
4443 | free(yyvsp[0].v.string); | ||||
4444 | YYERRORgoto yyerrlab; | ||||
4445 | } | ||||
4446 | free(yyvsp[0].v.string); | ||||
4447 | listen_opts.port = ntohs(servent->s_port)(__uint16_t)(__builtin_constant_p(servent->s_port) ? (__uint16_t )(((__uint16_t)(servent->s_port) & 0xffU) << 8 | ((__uint16_t)(servent->s_port) & 0xff00U) >> 8) : __swap16md(servent->s_port)); | ||||
4448 | } | ||||
4449 | break; | ||||
4450 | case 309: | ||||
4451 | #line 2200 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4452 | { | ||||
4453 | struct servent *servent; | ||||
4454 | |||||
4455 | if (listen_opts.options & LO_PORT) { | ||||
4456 | yyerror("port already specified"); | ||||
4457 | YYERRORgoto yyerrlab; | ||||
4458 | } | ||||
4459 | listen_opts.options |= LO_PORT; | ||||
4460 | |||||
4461 | servent = getservbyname("smtp", "tcp"); | ||||
4462 | if (servent == NULL((void *)0)) { | ||||
4463 | yyerror("invalid port: smtp"); | ||||
4464 | YYERRORgoto yyerrlab; | ||||
4465 | } | ||||
4466 | listen_opts.port = ntohs(servent->s_port)(__uint16_t)(__builtin_constant_p(servent->s_port) ? (__uint16_t )(((__uint16_t)(servent->s_port) & 0xffU) << 8 | ((__uint16_t)(servent->s_port) & 0xff00U) >> 8) : __swap16md(servent->s_port)); | ||||
4467 | } | ||||
4468 | break; | ||||
4469 | case 310: | ||||
4470 | #line 2216 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4471 | { | ||||
4472 | struct servent *servent; | ||||
4473 | |||||
4474 | if (listen_opts.options & LO_PORT) { | ||||
4475 | yyerror("port already specified"); | ||||
4476 | YYERRORgoto yyerrlab; | ||||
4477 | } | ||||
4478 | listen_opts.options |= LO_PORT; | ||||
4479 | |||||
4480 | servent = getservbyname("smtps", "tcp"); | ||||
4481 | if (servent == NULL((void *)0)) { | ||||
4482 | yyerror("invalid port: smtps"); | ||||
4483 | YYERRORgoto yyerrlab; | ||||
4484 | } | ||||
4485 | listen_opts.port = ntohs(servent->s_port)(__uint16_t)(__builtin_constant_p(servent->s_port) ? (__uint16_t )(((__uint16_t)(servent->s_port) & 0xffU) << 8 | ((__uint16_t)(servent->s_port) & 0xff00U) >> 8) : __swap16md(servent->s_port)); | ||||
4486 | } | ||||
4487 | break; | ||||
4488 | case 311: | ||||
4489 | #line 2232 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4490 | { | ||||
4491 | if (listen_opts.options & LO_PORT) { | ||||
4492 | yyerror("port already specified"); | ||||
4493 | YYERRORgoto yyerrlab; | ||||
4494 | } | ||||
4495 | listen_opts.options |= LO_PORT; | ||||
4496 | |||||
4497 | if (yyvsp[0].v.number <= 0 || yyvsp[0].v.number > (int)USHRT_MAX(32767 *2 +1)) { | ||||
4498 | yyerror("invalid port: %" PRId64"lld", yyvsp[0].v.number); | ||||
4499 | YYERRORgoto yyerrlab; | ||||
4500 | } | ||||
4501 | listen_opts.port = yyvsp[0].v.number; | ||||
4502 | } | ||||
4503 | break; | ||||
4504 | case 312: | ||||
4505 | #line 2245 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4506 | { | ||||
4507 | struct filter_config *fc; | ||||
4508 | |||||
4509 | if (listen_opts.options & LO_FILTER) { | ||||
4510 | yyerror("filter already specified"); | ||||
4511 | YYERRORgoto yyerrlab; | ||||
4512 | } | ||||
4513 | if ((fc = dict_get(conf->sc_filters_dict, yyvsp[0].v.string)) == NULL((void *)0)) { | ||||
4514 | yyerror("no filter exist with that name: %s", yyvsp[0].v.string); | ||||
4515 | free(yyvsp[0].v.string); | ||||
4516 | YYERRORgoto yyerrlab; | ||||
4517 | } | ||||
4518 | fc->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_IN; | ||||
4519 | listen_opts.options |= LO_FILTER; | ||||
4520 | listen_opts.filtername = yyvsp[0].v.string; | ||||
4521 | } | ||||
4522 | break; | ||||
4523 | case 313: | ||||
4524 | #line 2261 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4525 | { | ||||
4526 | char buffer[128]; | ||||
4527 | |||||
4528 | if (listen_opts.options & LO_FILTER) { | ||||
4529 | yyerror("filter already specified"); | ||||
4530 | YYERRORgoto yyerrlab; | ||||
4531 | } | ||||
4532 | |||||
4533 | do { | ||||
4534 | (void)snprintf(buffer, sizeof buffer, "<dynchain:%08x>", last_dynchain_id++); | ||||
4535 | } while (dict_check(conf->sc_filters_dict, buffer)); | ||||
4536 | |||||
4537 | listen_opts.options |= LO_FILTER; | ||||
4538 | listen_opts.filtername = xstrdup(buffer); | ||||
4539 | filter_config = xcalloc(1, sizeof *filter_config); | ||||
4540 | filter_config->filter_type = FILTER_TYPE_CHAIN; | ||||
4541 | filter_config->filter_subsystem |= FILTER_SUBSYSTEM_SMTP_IN; | ||||
4542 | dict_init(&filter_config->chain_procs)do { do { (&((&filter_config->chain_procs)->dict ))->sph_root = ((void *)0); } while (0); (&filter_config ->chain_procs)->count = 0; } while(0); | ||||
4543 | } | ||||
4544 | break; | ||||
4545 | case 314: | ||||
4546 | #line 2279 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4547 | { | ||||
4548 | dict_set(conf->sc_filters_dict, listen_opts.filtername, filter_config); | ||||
4549 | filter_config = NULL((void *)0); | ||||
4550 | } | ||||
4551 | break; | ||||
4552 | case 315: | ||||
4553 | #line 2283 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4554 | { | ||||
4555 | if (listen_opts.options & LO_SSL) { | ||||
4556 | yyerror("TLS mode already specified"); | ||||
4557 | YYERRORgoto yyerrlab; | ||||
4558 | } | ||||
4559 | listen_opts.options |= LO_SSL; | ||||
4560 | listen_opts.ssl = F_SMTPS0x02; | ||||
4561 | } | ||||
4562 | break; | ||||
4563 | case 316: | ||||
4564 | #line 2291 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4565 | { | ||||
4566 | if (listen_opts.options & LO_SSL) { | ||||
4567 | yyerror("TLS mode already specified"); | ||||
4568 | YYERRORgoto yyerrlab; | ||||
4569 | } | ||||
4570 | listen_opts.options |= LO_SSL; | ||||
4571 | listen_opts.ssl = F_SMTPS0x02|F_TLS_VERIFY0x200; | ||||
4572 | } | ||||
4573 | break; | ||||
4574 | case 317: | ||||
4575 | #line 2299 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4576 | { | ||||
4577 | if (listen_opts.options & LO_SSL) { | ||||
4578 | yyerror("TLS mode already specified"); | ||||
4579 | YYERRORgoto yyerrlab; | ||||
4580 | } | ||||
4581 | listen_opts.options |= LO_SSL; | ||||
4582 | listen_opts.ssl = F_STARTTLS0x01; | ||||
4583 | } | ||||
4584 | break; | ||||
4585 | case 318: | ||||
4586 | #line 2307 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4587 | { | ||||
4588 | if (listen_opts.options & LO_SSL) { | ||||
4589 | yyerror("TLS mode already specified"); | ||||
4590 | YYERRORgoto yyerrlab; | ||||
4591 | } | ||||
4592 | listen_opts.options |= LO_SSL; | ||||
4593 | listen_opts.ssl = F_STARTTLS0x01|F_STARTTLS_REQUIRE0x20; | ||||
4594 | } | ||||
4595 | break; | ||||
4596 | case 319: | ||||
4597 | #line 2315 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4598 | { | ||||
4599 | if (listen_opts.options & LO_SSL) { | ||||
4600 | yyerror("TLS mode already specified"); | ||||
4601 | YYERRORgoto yyerrlab; | ||||
4602 | } | ||||
4603 | listen_opts.options |= LO_SSL; | ||||
4604 | listen_opts.ssl = F_STARTTLS0x01|F_STARTTLS_REQUIRE0x20|F_TLS_VERIFY0x200; | ||||
4605 | } | ||||
4606 | break; | ||||
4607 | case 320: | ||||
4608 | #line 2323 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4609 | { | ||||
4610 | if (listen_opts.tls_ciphers) { | ||||
4611 | yyerror("ciphers already specified"); | ||||
4612 | YYERRORgoto yyerrlab; | ||||
4613 | } | ||||
4614 | listen_opts.tls_ciphers = yyvsp[0].v.string; | ||||
4615 | } | ||||
4616 | break; | ||||
4617 | case 321: | ||||
4618 | #line 2330 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4619 | { | ||||
4620 | if (listen_opts.tls_protocols) { | ||||
4621 | yyerror("protocols already specified"); | ||||
4622 | YYERRORgoto yyerrlab; | ||||
4623 | } | ||||
4624 | listen_opts.tls_protocols = yyvsp[0].v.string; | ||||
4625 | } | ||||
4626 | break; | ||||
4627 | case 322: | ||||
4628 | #line 2337 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4629 | { | ||||
4630 | if (listen_opts.pkicount == PKI_MAX32) { | ||||
4631 | yyerror("too many pki specified"); | ||||
4632 | YYERRORgoto yyerrlab; | ||||
4633 | } | ||||
4634 | listen_opts.pki[listen_opts.pkicount++] = yyvsp[0].v.string; | ||||
4635 | } | ||||
4636 | break; | ||||
4637 | case 323: | ||||
4638 | #line 2344 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4639 | { | ||||
4640 | if (listen_opts.options & LO_CA) { | ||||
4641 | yyerror("ca already specified"); | ||||
4642 | YYERRORgoto yyerrlab; | ||||
4643 | } | ||||
4644 | listen_opts.options |= LO_CA; | ||||
4645 | listen_opts.ca = yyvsp[0].v.string; | ||||
4646 | } | ||||
4647 | break; | ||||
4648 | case 324: | ||||
4649 | #line 2352 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4650 | { | ||||
4651 | if (listen_opts.options & LO_AUTH) { | ||||
4652 | yyerror("auth already specified"); | ||||
4653 | YYERRORgoto yyerrlab; | ||||
4654 | } | ||||
4655 | listen_opts.options |= LO_AUTH; | ||||
4656 | listen_opts.auth = F_AUTH0x08|F_AUTH_REQUIRE0x40; | ||||
4657 | } | ||||
4658 | break; | ||||
4659 | case 325: | ||||
4660 | #line 2360 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4661 | { | ||||
4662 | if (listen_opts.options & LO_AUTH) { | ||||
4663 | yyerror("auth already specified"); | ||||
4664 | YYERRORgoto yyerrlab; | ||||
4665 | } | ||||
4666 | listen_opts.options |= LO_AUTH; | ||||
4667 | listen_opts.auth = F_AUTH0x08; | ||||
4668 | } | ||||
4669 | break; | ||||
4670 | case 326: | ||||
4671 | #line 2368 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4672 | { | ||||
4673 | if (listen_opts.options & LO_AUTH) { | ||||
4674 | yyerror("auth already specified"); | ||||
4675 | YYERRORgoto yyerrlab; | ||||
4676 | } | ||||
4677 | listen_opts.options |= LO_AUTH; | ||||
4678 | listen_opts.authtable = yyvsp[0].v.table; | ||||
4679 | listen_opts.auth = F_AUTH0x08|F_AUTH_REQUIRE0x40; | ||||
4680 | } | ||||
4681 | break; | ||||
4682 | case 327: | ||||
4683 | #line 2377 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4684 | { | ||||
4685 | if (listen_opts.options & LO_AUTH) { | ||||
4686 | yyerror("auth already specified"); | ||||
4687 | YYERRORgoto yyerrlab; | ||||
4688 | } | ||||
4689 | listen_opts.options |= LO_AUTH; | ||||
4690 | listen_opts.authtable = yyvsp[0].v.table; | ||||
4691 | listen_opts.auth = F_AUTH0x08; | ||||
4692 | } | ||||
4693 | break; | ||||
4694 | case 328: | ||||
4695 | #line 2386 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4696 | { | ||||
4697 | if (listen_opts.options & LO_TAG) { | ||||
4698 | yyerror("tag already specified"); | ||||
4699 | YYERRORgoto yyerrlab; | ||||
4700 | } | ||||
4701 | listen_opts.options |= LO_TAG; | ||||
4702 | |||||
4703 | if (strlen(yyvsp[0].v.string) >= SMTPD_TAG_SIZE(32 + 1)) { | ||||
4704 | yyerror("tag name too long"); | ||||
4705 | free(yyvsp[0].v.string); | ||||
4706 | YYERRORgoto yyerrlab; | ||||
4707 | } | ||||
4708 | listen_opts.tag = yyvsp[0].v.string; | ||||
4709 | } | ||||
4710 | break; | ||||
4711 | case 329: | ||||
4712 | #line 2400 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4713 | { | ||||
4714 | if (listen_opts.options & LO_HOSTNAME) { | ||||
4715 | yyerror("hostname already specified"); | ||||
4716 | YYERRORgoto yyerrlab; | ||||
4717 | } | ||||
4718 | listen_opts.options |= LO_HOSTNAME; | ||||
4719 | |||||
4720 | listen_opts.hostname = yyvsp[0].v.string; | ||||
4721 | } | ||||
4722 | break; | ||||
4723 | case 330: | ||||
4724 | #line 2409 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4725 | { | ||||
4726 | struct table *t = yyvsp[0].v.table; | ||||
4727 | |||||
4728 | if (listen_opts.options & LO_HOSTNAMES) { | ||||
4729 | yyerror("hostnames already specified"); | ||||
4730 | YYERRORgoto yyerrlab; | ||||
4731 | } | ||||
4732 | listen_opts.options |= LO_HOSTNAMES; | ||||
4733 | |||||
4734 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_ADDRNAME)) { | ||||
4735 | yyerror("invalid use of table \"%s\" as " | ||||
4736 | "HOSTNAMES parameter", t->t_name); | ||||
4737 | YYERRORgoto yyerrlab; | ||||
4738 | } | ||||
4739 | listen_opts.hostnametable = t; | ||||
4740 | } | ||||
4741 | break; | ||||
4742 | case 331: | ||||
4743 | #line 2425 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4744 | { | ||||
4745 | if (config_lo_mask_source(&listen_opts)) { | ||||
4746 | YYERRORgoto yyerrlab; | ||||
4747 | } | ||||
4748 | } | ||||
4749 | break; | ||||
4750 | case 332: | ||||
4751 | #line 2430 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4752 | { | ||||
4753 | if (listen_opts.options & LO_RECEIVEDAUTH) { | ||||
4754 | yyerror("received-auth already specified"); | ||||
4755 | YYERRORgoto yyerrlab; | ||||
4756 | } | ||||
4757 | listen_opts.options |= LO_RECEIVEDAUTH; | ||||
4758 | listen_opts.flags |= F_RECEIVEDAUTH0x800; | ||||
4759 | } | ||||
4760 | break; | ||||
4761 | case 333: | ||||
4762 | #line 2438 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4763 | { | ||||
4764 | if (listen_opts.options & LO_NODSN) { | ||||
4765 | yyerror("no-dsn already specified"); | ||||
4766 | YYERRORgoto yyerrlab; | ||||
4767 | } | ||||
4768 | listen_opts.options |= LO_NODSN; | ||||
4769 | listen_opts.flags &= ~F_EXT_DSN0x400; | ||||
4770 | } | ||||
4771 | break; | ||||
4772 | case 334: | ||||
4773 | #line 2446 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4774 | { | ||||
4775 | if (listen_opts.options & LO_PROXY) { | ||||
4776 | yyerror("proxy-v2 already specified"); | ||||
4777 | YYERRORgoto yyerrlab; | ||||
4778 | } | ||||
4779 | listen_opts.options |= LO_PROXY; | ||||
4780 | listen_opts.flags |= F_PROXY0x4000; | ||||
4781 | } | ||||
4782 | break; | ||||
4783 | case 335: | ||||
4784 | #line 2454 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4785 | { | ||||
4786 | struct table *t = yyvsp[0].v.table; | ||||
4787 | |||||
4788 | if (listen_opts.options & LO_SENDERS) { | ||||
4789 | yyerror("senders already specified"); | ||||
4790 | YYERRORgoto yyerrlab; | ||||
4791 | } | ||||
4792 | listen_opts.options |= LO_SENDERS; | ||||
4793 | |||||
4794 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_MAILADDRMAP)) { | ||||
4795 | yyerror("invalid use of table \"%s\" as " | ||||
4796 | "SENDERS parameter", t->t_name); | ||||
4797 | YYERRORgoto yyerrlab; | ||||
4798 | } | ||||
4799 | listen_opts.sendertable = t; | ||||
4800 | } | ||||
4801 | break; | ||||
4802 | case 336: | ||||
4803 | #line 2470 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4804 | { | ||||
4805 | struct table *t = yyvsp[-1].v.table; | ||||
4806 | |||||
4807 | if (listen_opts.options & LO_SENDERS) { | ||||
4808 | yyerror("senders already specified"); | ||||
4809 | YYERRORgoto yyerrlab; | ||||
4810 | } | ||||
4811 | listen_opts.options |= LO_SENDERS|LO_MASQUERADE; | ||||
4812 | |||||
4813 | if (!table_check_use(t, T_DYNAMIC|T_HASH, K_MAILADDRMAP)) { | ||||
4814 | yyerror("invalid use of table \"%s\" as " | ||||
4815 | "SENDERS parameter", t->t_name); | ||||
4816 | YYERRORgoto yyerrlab; | ||||
4817 | } | ||||
4818 | listen_opts.sendertable = t; | ||||
4819 | } | ||||
4820 | break; | ||||
4821 | case 339: | ||||
4822 | #line 2492 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4823 | { | ||||
4824 | if (conf->sc_sock_listener) { | ||||
4825 | yyerror("socket listener already configured"); | ||||
4826 | YYERRORgoto yyerrlab; | ||||
4827 | } | ||||
4828 | create_sock_listener(&listen_opts); | ||||
4829 | } | ||||
4830 | break; | ||||
4831 | case 340: | ||||
4832 | #line 2501 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4833 | { | ||||
4834 | listen_opts.ifx = yyvsp[-1].v.string; | ||||
4835 | create_if_listener(&listen_opts); | ||||
4836 | } | ||||
4837 | break; | ||||
4838 | case 345: | ||||
4839 | #line 2516 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4840 | { | ||||
4841 | memset(&listen_opts, 0, sizeof listen_opts); | ||||
4842 | listen_opts.family = AF_UNSPEC0; | ||||
4843 | listen_opts.flags |= F_EXT_DSN0x400; | ||||
4844 | } | ||||
4845 | break; | ||||
4846 | case 346: | ||||
4847 | #line 2520 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4848 | { | ||||
4849 | free(listen_opts.tls_protocols); | ||||
4850 | free(listen_opts.tls_ciphers); | ||||
4851 | memset(&listen_opts, 0, sizeof listen_opts); | ||||
4852 | } | ||||
4853 | break; | ||||
4854 | case 347: | ||||
4855 | #line 2527 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4856 | { | ||||
4857 | char *p, *backend, *config; | ||||
4858 | |||||
4859 | p = yyvsp[0].v.string; | ||||
4860 | if (*p == '/') { | ||||
4861 | backend = "static"; | ||||
4862 | config = yyvsp[0].v.string; | ||||
4863 | } | ||||
4864 | else { | ||||
4865 | backend = yyvsp[0].v.string; | ||||
4866 | config = NULL((void *)0); | ||||
4867 | for (p = yyvsp[0].v.string; *p && *p != ':'; p++) | ||||
4868 | ; | ||||
4869 | if (*p == ':') { | ||||
4870 | *p = '\0'; | ||||
4871 | backend = yyvsp[0].v.string; | ||||
4872 | config = p+1; | ||||
4873 | } | ||||
4874 | } | ||||
4875 | if (config != NULL((void *)0) && *config != '/') { | ||||
4876 | yyerror("invalid backend parameter for table: %s", | ||||
4877 | yyvsp[-1].v.string); | ||||
4878 | free(yyvsp[-1].v.string); | ||||
4879 | free(yyvsp[0].v.string); | ||||
4880 | YYERRORgoto yyerrlab; | ||||
4881 | } | ||||
4882 | table = table_create(conf, backend, yyvsp[-1].v.string, config); | ||||
4883 | if (!table_config(table)) { | ||||
4884 | yyerror("invalid configuration file %s for table %s", | ||||
4885 | config, table->t_name); | ||||
4886 | free(yyvsp[-1].v.string); | ||||
4887 | free(yyvsp[0].v.string); | ||||
4888 | YYERRORgoto yyerrlab; | ||||
4889 | } | ||||
4890 | table = NULL((void *)0); | ||||
4891 | free(yyvsp[-1].v.string); | ||||
4892 | free(yyvsp[0].v.string); | ||||
4893 | } | ||||
4894 | break; | ||||
4895 | case 348: | ||||
4896 | #line 2565 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4897 | { | ||||
4898 | table = table_create(conf, "static", yyvsp[0].v.string, NULL((void *)0)); | ||||
4899 | free(yyvsp[0].v.string); | ||||
4900 | } | ||||
4901 | break; | ||||
4902 | case 349: | ||||
4903 | #line 2568 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4904 | { | ||||
4905 | table = NULL((void *)0); | ||||
4906 | } | ||||
4907 | break; | ||||
4908 | case 350: | ||||
4909 | #line 2573 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4910 | { | ||||
4911 | struct table *t; | ||||
4912 | |||||
4913 | t = table_create(conf, "static", NULL((void *)0), NULL((void *)0)); | ||||
4914 | table_add(t, yyvsp[0].v.string, NULL((void *)0)); | ||||
4915 | free(yyvsp[0].v.string); | ||||
4916 | yyval.v.table = t; | ||||
4917 | } | ||||
4918 | break; | ||||
4919 | case 351: | ||||
4920 | #line 2581 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4921 | { | ||||
4922 | table = table_create(conf, "static", NULL((void *)0), NULL((void *)0)); | ||||
4923 | } | ||||
4924 | break; | ||||
4925 | case 352: | ||||
4926 | #line 2583 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4927 | { | ||||
4928 | yyval.v.table = table; | ||||
4929 | table = NULL((void *)0); | ||||
4930 | } | ||||
4931 | break; | ||||
4932 | case 353: | ||||
4933 | #line 2589 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4934 | { | ||||
4935 | struct table *t; | ||||
4936 | |||||
4937 | if ((t = table_find(conf, yyvsp[-1].v.string)) == NULL((void *)0)) { | ||||
4938 | yyerror("no such table: %s", yyvsp[-1].v.string); | ||||
4939 | free(yyvsp[-1].v.string); | ||||
4940 | YYERRORgoto yyerrlab; | ||||
4941 | } | ||||
4942 | free(yyvsp[-1].v.string); | ||||
4943 | yyval.v.table = t; | ||||
4944 | } | ||||
4945 | break; | ||||
4946 | case 354: | ||||
4947 | #line 2602 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4948 | { yyval.v.table = yyvsp[0].v.table; } | ||||
4949 | break; | ||||
4950 | case 355: | ||||
4951 | #line 2603 "/usr/src/usr.sbin/smtpd/smtpd/../parse.y" | ||||
4952 | { yyval.v.table = yyvsp[0].v.table; } | ||||
4953 | break; | ||||
4954 | #line 4947 "parse.c" | ||||
4955 | } | ||||
4956 | yyssp -= yym; | ||||
4957 | yystate = *yyssp; | ||||
4958 | yyvsp -= yym; | ||||
4959 | yym = yylhs[yyn]; | ||||
4960 | if (yystate
| ||||
4961 | { | ||||
4962 | #if YYDEBUG0 | ||||
4963 | if (yydebug) | ||||
4964 | printf("%sdebug: after reduction, shifting from state 0 to\ | ||||
4965 | state %d\n", YYPREFIX"yy", YYFINAL1); | ||||
4966 | #endif | ||||
4967 | yystate = YYFINAL1; | ||||
4968 | *++yyssp = YYFINAL1; | ||||
4969 | *++yyvsp = yyval; | ||||
4970 | if (yychar
| ||||
4971 | { | ||||
4972 | if ((yychar = yylex()) < 0) yychar = 0; | ||||
4973 | #if YYDEBUG0 | ||||
4974 | if (yydebug) | ||||
4975 | { | ||||
4976 | yys = 0; | ||||
4977 | if (yychar <= YYMAXTOKEN363) yys = yyname[yychar]; | ||||
4978 | if (!yys) yys = "illegal-symbol"; | ||||
4979 | printf("%sdebug: state %d, reading %d (%s)\n", | ||||
4980 | YYPREFIX"yy", YYFINAL1, yychar, yys); | ||||
4981 | } | ||||
4982 | #endif | ||||
4983 | } | ||||
4984 | if (yychar == 0) goto yyaccept; | ||||
4985 | goto yyloop; | ||||
4986 | } | ||||
4987 | if ((yyn = yygindex[yym]) && (yyn += yystate) >= 0 && | ||||
4988 | yyn <= YYTABLESIZE915 && yycheck[yyn] == yystate) | ||||
4989 | yystate = yytable[yyn]; | ||||
4990 | else | ||||
4991 | yystate = yydgoto[yym]; | ||||
4992 | #if YYDEBUG0 | ||||
4993 | if (yydebug) | ||||
4994 | printf("%sdebug: after reduction, shifting from state %d \ | ||||
4995 | to state %d\n", YYPREFIX"yy", *yyssp, yystate); | ||||
4996 | #endif | ||||
4997 | if (yyssp >= yysslim && yygrowstack()) | ||||
4998 | { | ||||
4999 | goto yyoverflow; | ||||
5000 | } | ||||
5001 | *++yyssp = yystate; | ||||
5002 | *++yyvsp = yyval; | ||||
5003 | goto yyloop; | ||||
5004 | yyoverflow: | ||||
5005 | yyerror("yacc stack overflow"); | ||||
5006 | yyabort: | ||||
5007 | if (yyss) | ||||
5008 | free(yyss); | ||||
5009 | if (yyvs) | ||||
5010 | free(yyvs); | ||||
5011 | yyss = yyssp = NULL((void *)0); | ||||
5012 | yyvs = yyvsp = NULL((void *)0); | ||||
5013 | yystacksize = 0; | ||||
5014 | return (1); | ||||
5015 | yyaccept: | ||||
5016 | if (yyss) | ||||
5017 | free(yyss); | ||||
5018 | if (yyvs) | ||||
5019 | free(yyvs); | ||||
5020 | yyss = yyssp = NULL((void *)0); | ||||
5021 | yyvs = yyvsp = NULL((void *)0); | ||||
5022 | yystacksize = 0; | ||||
5023 | return (0); | ||||
5024 | } |