confread.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789
  1. /*
  2. * Copyright (C) 2014 Tobias Brunner
  3. * HSR Hochschule fuer Technik Rapperswil
  4. *
  5. * Copyright (C) 2001-2002 Mathieu Lafon - Arkoon Network Security
  6. *
  7. * This program is free software; you can redistribute it and/or modify it
  8. * under the terms of the GNU General Public License as published by the
  9. * Free Software Foundation; either version 2 of the License, or (at your
  10. * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
  11. *
  12. * This program is distributed in the hope that it will be useful, but
  13. * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
  14. * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
  15. * for more details.
  16. */
  17. #include <sys/types.h>
  18. #include <sys/stat.h>
  19. #include <unistd.h>
  20. #include <stddef.h>
  21. #include <stdlib.h>
  22. #include <string.h>
  23. #include <assert.h>
  24. #include <netdb.h>
  25. #include <library.h>
  26. #include <utils/debug.h>
  27. #include "keywords.h"
  28. #include "confread.h"
  29. #include "args.h"
  30. #include "files.h"
  31. #include "parser/conf_parser.h"
  32. #define IKE_LIFETIME_DEFAULT 10800 /* 3 hours */
  33. #define IPSEC_LIFETIME_DEFAULT 3600 /* 1 hour */
  34. #define SA_REPLACEMENT_MARGIN_DEFAULT 540 /* 9 minutes */
  35. #define SA_REPLACEMENT_FUZZ_DEFAULT 100 /* 100% of margin */
  36. #define SA_REPLACEMENT_RETRIES_DEFAULT 3
  37. #define SA_REPLAY_WINDOW_DEFAULT -1 /* use charon.replay_window */
  38. static const char firewall_defaults[] = IPSEC_SCRIPT " _updown iptables";
  39. /**
  40. * Process deprecated keywords
  41. */
  42. static bool is_deprecated(kw_token_t token, char *name, char *conn)
  43. {
  44. switch (token)
  45. {
  46. case KW_SETUP_DEPRECATED:
  47. case KW_PKCS11_DEPRECATED:
  48. DBG1(DBG_APP, "# deprecated keyword '%s' in config setup", name);
  49. break;
  50. case KW_CONN_DEPRECATED:
  51. case KW_END_DEPRECATED:
  52. case KW_PFS_DEPRECATED:
  53. DBG1(DBG_APP, "# deprecated keyword '%s' in conn '%s'", name, conn);
  54. break;
  55. case KW_CA_DEPRECATED:
  56. DBG1(DBG_APP, "# deprecated keyword '%s' in ca '%s'", name, conn);
  57. break;
  58. default:
  59. return FALSE;
  60. }
  61. /* additional messages for some */
  62. switch (token)
  63. {
  64. case KW_PKCS11_DEPRECATED:
  65. DBG1(DBG_APP, " use the 'pkcs11' plugin instead");
  66. break;
  67. case KW_PFS_DEPRECATED:
  68. DBG1(DBG_APP, " PFS is enabled by specifying a DH group in the "
  69. "'esp' cipher suite");
  70. break;
  71. default:
  72. break;
  73. }
  74. return TRUE;
  75. }
  76. /*
  77. * parse config setup section
  78. */
  79. static void load_setup(starter_config_t *cfg, conf_parser_t *parser)
  80. {
  81. enumerator_t *enumerator;
  82. dictionary_t *dict;
  83. const kw_entry_t *entry;
  84. char *key, *value;
  85. DBG2(DBG_APP, "Loading config setup");
  86. dict = parser->get_section(parser, CONF_PARSER_CONFIG_SETUP, NULL);
  87. if (!dict)
  88. {
  89. return;
  90. }
  91. enumerator = dict->create_enumerator(dict);
  92. while (enumerator->enumerate(enumerator, &key, &value))
  93. {
  94. bool assigned = FALSE;
  95. entry = in_word_set(key, strlen(key));
  96. if (!entry)
  97. {
  98. DBG1(DBG_APP, "# unknown keyword '%s'", key);
  99. cfg->non_fatal_err++;
  100. continue;
  101. }
  102. if ((int)entry->token < KW_SETUP_FIRST || entry->token > KW_SETUP_LAST)
  103. {
  104. DBG1(DBG_APP, "# unsupported keyword '%s' in config setup", key);
  105. cfg->err++;
  106. continue;
  107. }
  108. if (is_deprecated(entry->token, key, ""))
  109. {
  110. cfg->non_fatal_err++;
  111. continue;
  112. }
  113. if (!assign_arg(entry->token, KW_SETUP_FIRST, key, value, cfg,
  114. &assigned))
  115. {
  116. DBG1(DBG_APP, " bad argument value in config setup");
  117. cfg->err++;
  118. }
  119. }
  120. enumerator->destroy(enumerator);
  121. dict->destroy(dict);
  122. }
  123. /*
  124. * parse a ca section
  125. */
  126. static void load_ca(starter_ca_t *ca, starter_config_t *cfg,
  127. conf_parser_t *parser)
  128. {
  129. enumerator_t *enumerator;
  130. dictionary_t *dict;
  131. const kw_entry_t *entry;
  132. kw_token_t token;
  133. char *key, *value;
  134. DBG2(DBG_APP, "Loading ca '%s'", ca->name);
  135. dict = parser->get_section(parser, CONF_PARSER_CA, ca->name);
  136. if (!dict)
  137. {
  138. return;
  139. }
  140. enumerator = dict->create_enumerator(dict);
  141. while (enumerator->enumerate(enumerator, &key, &value))
  142. {
  143. bool assigned = FALSE;
  144. entry = in_word_set(key, strlen(key));
  145. if (!entry)
  146. {
  147. DBG1(DBG_APP, "# unknown keyword '%s'", key);
  148. cfg->non_fatal_err++;
  149. continue;
  150. }
  151. token = entry->token;
  152. if (token == KW_AUTO)
  153. {
  154. token = KW_CA_SETUP;
  155. }
  156. if (token < KW_CA_FIRST || token > KW_CA_LAST)
  157. {
  158. DBG1(DBG_APP, "# unsupported keyword '%s' in ca '%s'",
  159. key, ca->name);
  160. cfg->err++;
  161. continue;
  162. }
  163. if (is_deprecated(token, key, ca->name))
  164. {
  165. cfg->non_fatal_err++;
  166. continue;
  167. }
  168. if (!assign_arg(token, KW_CA_FIRST, key, value, ca, &assigned))
  169. {
  170. DBG1(DBG_APP, " bad argument value in ca '%s'", ca->name);
  171. cfg->err++;
  172. }
  173. }
  174. enumerator->destroy(enumerator);
  175. dict->destroy(dict);
  176. /* treat 'route' and 'start' as 'add' */
  177. if (ca->startup != STARTUP_NO)
  178. {
  179. ca->startup = STARTUP_ADD;
  180. }
  181. }
  182. /*
  183. * set some default values
  184. */
  185. static void conn_defaults(starter_conn_t *conn)
  186. {
  187. conn->startup = STARTUP_NO;
  188. conn->state = STATE_IGNORE;
  189. conn->mode = MODE_TUNNEL;
  190. conn->options = SA_OPTION_MOBIKE;
  191. /* esp defaults are set after parsing the conn section */
  192. conn->sa_ike_life_seconds = IKE_LIFETIME_DEFAULT;
  193. conn->sa_ipsec_life_seconds = IPSEC_LIFETIME_DEFAULT;
  194. conn->sa_rekey_margin = SA_REPLACEMENT_MARGIN_DEFAULT;
  195. conn->sa_rekey_fuzz = SA_REPLACEMENT_FUZZ_DEFAULT;
  196. conn->sa_keying_tries = SA_REPLACEMENT_RETRIES_DEFAULT;
  197. conn->install_policy = TRUE;
  198. conn->dpd_delay = 30; /* seconds */
  199. conn->dpd_timeout = 150; /* seconds */
  200. conn->replay_window = SA_REPLAY_WINDOW_DEFAULT;
  201. conn->fragmentation = FRAGMENTATION_YES;
  202. conn->left.sendcert = CERT_SEND_IF_ASKED;
  203. conn->right.sendcert = CERT_SEND_IF_ASKED;
  204. conn->left.ikeport = 500;
  205. conn->right.ikeport = 500;
  206. conn->left.to_port = 0xffff;
  207. conn->right.to_port = 0xffff;
  208. }
  209. /*
  210. * parse left|right specific options
  211. */
  212. static void kw_end(starter_conn_t *conn, starter_end_t *end, kw_token_t token,
  213. char *key, char *value, starter_config_t *cfg)
  214. {
  215. bool assigned = FALSE;
  216. if (is_deprecated(token, key, conn->name))
  217. {
  218. cfg->non_fatal_err++;
  219. return;
  220. }
  221. if (!assign_arg(token, KW_END_FIRST, key, value, end, &assigned))
  222. {
  223. goto err;
  224. }
  225. /* post processing of some keywords that were assigned automatically */
  226. switch (token)
  227. {
  228. case KW_HOST:
  229. if (value && strlen(value) > 0 && value[0] == '%')
  230. {
  231. if (streq(value, "%defaultroute"))
  232. {
  233. value = "%any";
  234. }
  235. if (!streq(value, "%any") && !streq(value, "%any4") &&
  236. !streq(value, "%any6"))
  237. { /* allow_any prefix */
  238. end->allow_any = TRUE;
  239. value++;
  240. }
  241. }
  242. free(end->host);
  243. end->host = strdupnull(value);
  244. break;
  245. case KW_SOURCEIP:
  246. conn->mode = MODE_TUNNEL;
  247. conn->proxy_mode = FALSE;
  248. break;
  249. case KW_SENDCERT:
  250. if (end->sendcert == CERT_YES_SEND)
  251. {
  252. end->sendcert = CERT_ALWAYS_SEND;
  253. }
  254. else if (end->sendcert == CERT_NO_SEND)
  255. {
  256. end->sendcert = CERT_NEVER_SEND;
  257. }
  258. break;
  259. default:
  260. break;
  261. }
  262. if (assigned)
  263. {
  264. return;
  265. }
  266. /* individual processing of keywords that were not assigned automatically */
  267. switch (token)
  268. {
  269. case KW_PROTOPORT:
  270. {
  271. struct protoent *proto;
  272. struct servent *svc;
  273. char *sep, *port = "", *endptr;
  274. long int p;
  275. sep = strchr(value, '/');
  276. if (sep)
  277. { /* protocol/port */
  278. *sep = '\0';
  279. port = sep + 1;
  280. }
  281. if (streq(value, "%any"))
  282. {
  283. end->protocol = 0;
  284. }
  285. else
  286. {
  287. proto = getprotobyname(value);
  288. if (proto)
  289. {
  290. end->protocol = proto->p_proto;
  291. }
  292. else
  293. {
  294. p = strtol(value, &endptr, 0);
  295. if ((*value && *endptr) || p < 0 || p > 0xff)
  296. {
  297. DBG1(DBG_APP, "# bad protocol: %s=%s", key, value);
  298. goto err;
  299. }
  300. end->protocol = (uint8_t)p;
  301. }
  302. }
  303. if (streq(port, "%any"))
  304. {
  305. end->from_port = 0;
  306. end->to_port = 0xffff;
  307. }
  308. else if (streq(port, "%opaque"))
  309. {
  310. end->from_port = 0xffff;
  311. end->to_port = 0;
  312. }
  313. else if (*port)
  314. {
  315. svc = getservbyname(port, NULL);
  316. if (svc)
  317. {
  318. end->from_port = end->to_port = ntohs(svc->s_port);
  319. }
  320. else
  321. {
  322. p = strtol(port, &endptr, 0);
  323. if (p < 0 || p > 0xffff)
  324. {
  325. DBG1(DBG_APP, "# bad port: %s=%s", key, port);
  326. goto err;
  327. }
  328. end->from_port = p;
  329. if (*endptr == '-')
  330. {
  331. port = endptr + 1;
  332. p = strtol(port, &endptr, 0);
  333. if (p < 0 || p > 0xffff)
  334. {
  335. DBG1(DBG_APP, "# bad port: %s=%s", key, port);
  336. goto err;
  337. }
  338. }
  339. end->to_port = p;
  340. if (*endptr)
  341. {
  342. DBG1(DBG_APP, "# bad port: %s=%s", key, port);
  343. goto err;
  344. }
  345. }
  346. }
  347. if (sep)
  348. { /* restore the original text in case also= is used */
  349. *sep = '/';
  350. }
  351. break;
  352. }
  353. default:
  354. break;
  355. }
  356. return;
  357. err:
  358. DBG1(DBG_APP, " bad argument value in conn '%s'", conn->name);
  359. cfg->err++;
  360. }
  361. /*
  362. * macro to handle simple flags
  363. */
  364. #define KW_SA_OPTION_FLAG(sy, sn, fl) \
  365. if (streq(value, sy)) { conn->options |= fl; } \
  366. else if (streq(value, sn)) { conn->options &= ~fl; } \
  367. else { DBG1(DBG_APP, "# bad option value: %s=%s", key, value); cfg->err++; }
  368. /*
  369. * parse settings not handled by the simple argument parser
  370. */
  371. static void handle_keyword(kw_token_t token, starter_conn_t *conn, char *key,
  372. char *value, starter_config_t *cfg)
  373. {
  374. if ((token == KW_ESP && conn->ah) || (token == KW_AH && conn->esp))
  375. {
  376. DBG1(DBG_APP, "# can't have both 'ah' and 'esp' options");
  377. cfg->err++;
  378. return;
  379. }
  380. switch (token)
  381. {
  382. case KW_TYPE:
  383. {
  384. conn->mode = MODE_TRANSPORT;
  385. conn->proxy_mode = FALSE;
  386. if (streq(value, "tunnel"))
  387. {
  388. conn->mode = MODE_TUNNEL;
  389. }
  390. else if (streq(value, "beet"))
  391. {
  392. conn->mode = MODE_BEET;
  393. }
  394. else if (streq(value, "transport_proxy"))
  395. {
  396. conn->mode = MODE_TRANSPORT;
  397. conn->proxy_mode = TRUE;
  398. }
  399. else if (streq(value, "passthrough") || streq(value, "pass"))
  400. {
  401. conn->mode = MODE_PASS;
  402. }
  403. else if (streq(value, "drop") || streq(value, "reject"))
  404. {
  405. conn->mode = MODE_DROP;
  406. }
  407. else if (!streq(value, "transport"))
  408. {
  409. DBG1(DBG_APP, "# bad policy value: %s=%s", key, value);
  410. cfg->err++;
  411. }
  412. break;
  413. }
  414. case KW_COMPRESS:
  415. KW_SA_OPTION_FLAG("yes", "no", SA_OPTION_COMPRESS)
  416. break;
  417. case KW_MARK:
  418. if (!mark_from_string(value, MARK_OP_UNIQUE, &conn->mark_in))
  419. {
  420. cfg->err++;
  421. break;
  422. }
  423. conn->mark_out = conn->mark_in;
  424. break;
  425. case KW_MARK_IN:
  426. if (!mark_from_string(value, MARK_OP_UNIQUE, &conn->mark_in))
  427. {
  428. cfg->err++;
  429. }
  430. break;
  431. case KW_MARK_OUT:
  432. if (!mark_from_string(value, MARK_OP_UNIQUE, &conn->mark_out))
  433. {
  434. cfg->err++;
  435. }
  436. break;
  437. case KW_TFC:
  438. if (streq(value, "%mtu"))
  439. {
  440. conn->tfc = -1;
  441. }
  442. else
  443. {
  444. char *endptr;
  445. conn->tfc = strtoul(value, &endptr, 10);
  446. if (*endptr != '\0')
  447. {
  448. DBG1(DBG_APP, "# bad integer value: %s=%s", key, value);
  449. cfg->err++;
  450. }
  451. }
  452. break;
  453. case KW_KEYINGTRIES:
  454. if (streq(value, "%forever"))
  455. {
  456. conn->sa_keying_tries = 0;
  457. }
  458. else
  459. {
  460. char *endptr;
  461. conn->sa_keying_tries = strtoul(value, &endptr, 10);
  462. if (*endptr != '\0')
  463. {
  464. DBG1(DBG_APP, "# bad integer value: %s=%s", key, value);
  465. cfg->err++;
  466. }
  467. }
  468. break;
  469. case KW_REKEY:
  470. KW_SA_OPTION_FLAG("no", "yes", SA_OPTION_DONT_REKEY)
  471. break;
  472. case KW_REAUTH:
  473. KW_SA_OPTION_FLAG("no", "yes", SA_OPTION_DONT_REAUTH)
  474. break;
  475. case KW_MOBIKE:
  476. KW_SA_OPTION_FLAG("yes", "no", SA_OPTION_MOBIKE)
  477. break;
  478. case KW_FORCEENCAPS:
  479. KW_SA_OPTION_FLAG("yes", "no", SA_OPTION_FORCE_ENCAP)
  480. break;
  481. case KW_MODECONFIG:
  482. KW_SA_OPTION_FLAG("push", "pull", SA_OPTION_MODECFG_PUSH)
  483. break;
  484. case KW_XAUTH:
  485. KW_SA_OPTION_FLAG("server", "client", SA_OPTION_XAUTH_SERVER)
  486. break;
  487. default:
  488. break;
  489. }
  490. }
  491. /*
  492. * handles left|rightfirewall and left|rightupdown parameters
  493. */
  494. static void handle_firewall(const char *label, starter_end_t *end,
  495. starter_config_t *cfg)
  496. {
  497. if (end->firewall)
  498. {
  499. if (end->updown != NULL)
  500. {
  501. DBG1(DBG_APP, "# cannot have both %sfirewall and %supdown", label,
  502. label);
  503. cfg->err++;
  504. }
  505. else
  506. {
  507. end->updown = strdupnull(firewall_defaults);
  508. end->firewall = FALSE;
  509. }
  510. }
  511. }
  512. /*
  513. * parse a conn section
  514. */
  515. static void load_conn(starter_conn_t *conn, starter_config_t *cfg,
  516. conf_parser_t *parser)
  517. {
  518. enumerator_t *enumerator;
  519. dictionary_t *dict;
  520. const kw_entry_t *entry;
  521. kw_token_t token;
  522. char *key, *value;
  523. DBG2(DBG_APP, "Loading conn '%s'", conn->name);
  524. dict = parser->get_section(parser, CONF_PARSER_CONN, conn->name);
  525. if (!dict)
  526. {
  527. return;
  528. }
  529. enumerator = dict->create_enumerator(dict);
  530. while (enumerator->enumerate(enumerator, &key, &value))
  531. {
  532. bool assigned = FALSE;
  533. entry = in_word_set(key, strlen(key));
  534. if (!entry)
  535. {
  536. DBG1(DBG_APP, "# unknown keyword '%s'", key);
  537. cfg->non_fatal_err++;
  538. continue;
  539. }
  540. token = entry->token;
  541. if (token >= KW_LEFT_FIRST && token <= KW_LEFT_LAST)
  542. {
  543. kw_end(conn, &conn->left, token - KW_LEFT_FIRST + KW_END_FIRST,
  544. key, value, cfg);
  545. continue;
  546. }
  547. else if (token >= KW_RIGHT_FIRST && token <= KW_RIGHT_LAST)
  548. {
  549. kw_end(conn, &conn->right, token - KW_RIGHT_FIRST + KW_END_FIRST,
  550. key, value, cfg);
  551. continue;
  552. }
  553. if (token == KW_AUTO)
  554. {
  555. token = KW_CONN_SETUP;
  556. }
  557. if (token < KW_CONN_FIRST || token > KW_CONN_LAST)
  558. {
  559. DBG1(DBG_APP, "# unsupported keyword '%s' in conn '%s'",
  560. key, conn->name);
  561. cfg->err++;
  562. continue;
  563. }
  564. if (is_deprecated(token, key, conn->name))
  565. {
  566. cfg->non_fatal_err++;
  567. continue;
  568. }
  569. if (!assign_arg(token, KW_CONN_FIRST, key, value, conn,
  570. &assigned))
  571. {
  572. DBG1(DBG_APP, " bad argument value in conn '%s'", conn->name);
  573. cfg->err++;
  574. continue;
  575. }
  576. if (!assigned)
  577. {
  578. handle_keyword(token, conn, key, value, cfg);
  579. }
  580. }
  581. enumerator->destroy(enumerator);
  582. dict->destroy(dict);
  583. handle_firewall("left", &conn->left, cfg);
  584. handle_firewall("right", &conn->right, cfg);
  585. }
  586. /*
  587. * free the memory used by a starter_ca_t object
  588. */
  589. static void confread_free_ca(starter_ca_t *ca)
  590. {
  591. free_args(KW_CA_NAME, KW_CA_LAST, (char *)ca);
  592. free(ca);
  593. }
  594. /*
  595. * free the memory used by a starter_conn_t object
  596. */
  597. static void confread_free_conn(starter_conn_t *conn)
  598. {
  599. free_args(KW_END_FIRST, KW_END_LAST, (char *)&conn->left);
  600. free_args(KW_END_FIRST, KW_END_LAST, (char *)&conn->right);
  601. free_args(KW_CONN_NAME, KW_CONN_LAST, (char *)conn);
  602. free(conn);
  603. }
  604. /*
  605. * free the memory used by a starter_config_t object
  606. */
  607. void confread_free(starter_config_t *cfg)
  608. {
  609. starter_conn_t *conn = cfg->conn_first;
  610. starter_ca_t *ca = cfg->ca_first;
  611. free_args(KW_SETUP_FIRST, KW_SETUP_LAST, (char *)cfg);
  612. while (conn != NULL)
  613. {
  614. starter_conn_t *conn_aux = conn;
  615. conn = conn->next;
  616. confread_free_conn(conn_aux);
  617. }
  618. while (ca != NULL)
  619. {
  620. starter_ca_t *ca_aux = ca;
  621. ca = ca->next;
  622. confread_free_ca(ca_aux);
  623. }
  624. free(cfg);
  625. }
  626. /*
  627. * load and parse an IPsec configuration file
  628. */
  629. starter_config_t* confread_load(const char *file)
  630. {
  631. conf_parser_t *parser;
  632. starter_config_t *cfg = NULL;
  633. enumerator_t *enumerator;
  634. u_int total_err;
  635. char *name;
  636. parser = conf_parser_create(file);
  637. if (!parser->parse(parser))
  638. {
  639. parser->destroy(parser);
  640. return NULL;
  641. }
  642. INIT(cfg,
  643. .setup = {
  644. .uniqueids = TRUE,
  645. }
  646. );
  647. /* load config setup section */
  648. load_setup(cfg, parser);
  649. /* load ca sections */
  650. enumerator = parser->get_sections(parser, CONF_PARSER_CA);
  651. while (enumerator->enumerate(enumerator, &name))
  652. {
  653. u_int previous_err = cfg->err;
  654. starter_ca_t *ca;
  655. INIT(ca,
  656. .name = strdup(name),
  657. );
  658. load_ca(ca, cfg, parser);
  659. if (cfg->err > previous_err)
  660. {
  661. total_err = cfg->err - previous_err;
  662. DBG1(DBG_APP, "# ignored ca '%s' due to %d parsing error%s", name,
  663. total_err, (total_err > 1) ? "s" : "");
  664. confread_free_ca(ca);
  665. cfg->non_fatal_err += cfg->err - previous_err;
  666. cfg->err = previous_err;
  667. }
  668. else
  669. {
  670. if (cfg->ca_last)
  671. {
  672. cfg->ca_last->next = ca;
  673. }
  674. cfg->ca_last = ca;
  675. if (!cfg->ca_first)
  676. {
  677. cfg->ca_first = ca;
  678. }
  679. if (ca->startup != STARTUP_NO)
  680. {
  681. ca->state = STATE_TO_ADD;
  682. }
  683. }
  684. }
  685. enumerator->destroy(enumerator);
  686. /* load conn sections */
  687. enumerator = parser->get_sections(parser, CONF_PARSER_CONN);
  688. while (enumerator->enumerate(enumerator, &name))
  689. {
  690. u_int previous_err = cfg->err;
  691. starter_conn_t *conn;
  692. INIT(conn,
  693. .name = strdup(name),
  694. );
  695. conn_defaults(conn);
  696. load_conn(conn, cfg, parser);
  697. if (cfg->err > previous_err)
  698. {
  699. total_err = cfg->err - previous_err;
  700. DBG1(DBG_APP, "# ignored conn '%s' due to %d parsing error%s", name,
  701. total_err, (total_err > 1) ? "s" : "");
  702. confread_free_conn(conn);
  703. cfg->non_fatal_err += cfg->err - previous_err;
  704. cfg->err = previous_err;
  705. }
  706. else
  707. {
  708. if (cfg->conn_last)
  709. {
  710. cfg->conn_last->next = conn;
  711. }
  712. cfg->conn_last = conn;
  713. if (!cfg->conn_first)
  714. {
  715. cfg->conn_first = conn;
  716. }
  717. if (conn->startup != STARTUP_NO)
  718. {
  719. conn->state = STATE_TO_ADD;
  720. }
  721. }
  722. }
  723. enumerator->destroy(enumerator);
  724. parser->destroy(parser);
  725. total_err = cfg->err + cfg->non_fatal_err;
  726. if (total_err > 0)
  727. {
  728. DBG1(DBG_APP, "### %d parsing error%s (%d fatal) ###",
  729. total_err, (total_err > 1)?"s":"", cfg->err);
  730. }
  731. return cfg;
  732. }