Home | History | Annotate | Line # | Download | only in npfctl
npf_parse.y revision 1.50
      1   1.1     rmind /*-
      2  1.49     rmind  * Copyright (c) 2011-2019 The NetBSD Foundation, Inc.
      3   1.1     rmind  * All rights reserved.
      4   1.1     rmind  *
      5   1.1     rmind  * This code is derived from software contributed to The NetBSD Foundation
      6  1.26     rmind  * by Martin Husemann, Christos Zoulas and Mindaugas Rasiukevicius.
      7   1.1     rmind  *
      8   1.1     rmind  * Redistribution and use in source and binary forms, with or without
      9   1.1     rmind  * modification, are permitted provided that the following conditions
     10   1.1     rmind  * are met:
     11   1.1     rmind  * 1. Redistributions of source code must retain the above copyright
     12   1.1     rmind  *    notice, this list of conditions and the following disclaimer.
     13   1.1     rmind  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.1     rmind  *    notice, this list of conditions and the following disclaimer in the
     15   1.1     rmind  *    documentation and/or other materials provided with the distribution.
     16   1.1     rmind  *
     17   1.1     rmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     18   1.1     rmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     19   1.1     rmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     20   1.1     rmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     21   1.1     rmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     22   1.1     rmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     23   1.1     rmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     24   1.1     rmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     25   1.1     rmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     26   1.1     rmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     27   1.1     rmind  * POSSIBILITY OF SUCH DAMAGE.
     28   1.1     rmind  */
     29   1.1     rmind 
     30   1.1     rmind %{
     31   1.1     rmind 
     32  1.37     joerg #include <err.h>
     33  1.37     joerg #include <netdb.h>
     34   1.1     rmind #include <stdio.h>
     35  1.37     joerg #include <stdlib.h>
     36  1.37     joerg #include <string.h>
     37  1.42     rmind #ifdef __NetBSD__
     38   1.1     rmind #include <vis.h>
     39  1.42     rmind #endif
     40   1.1     rmind 
     41   1.1     rmind #include "npfctl.h"
     42   1.1     rmind 
     43  1.12     rmind #define	YYSTACKSIZE	4096
     44  1.12     rmind 
     45  1.50     rmind int			yystarttoken;
     46   1.1     rmind const char *		yyfilename;
     47   1.1     rmind 
     48   1.1     rmind extern int		yylineno, yycolumn;
     49  1.50     rmind extern int		yylex(int);
     50   1.1     rmind 
     51   1.1     rmind void
     52   1.1     rmind yyerror(const char *fmt, ...)
     53   1.1     rmind {
     54   1.1     rmind 	extern int yyleng;
     55   1.1     rmind 	extern char *yytext;
     56   1.1     rmind 
     57  1.15     rmind 	char *msg, *context = estrndup(yytext, yyleng);
     58  1.14     rmind 	bool eol = (*context == '\n');
     59   1.1     rmind 	va_list ap;
     60   1.1     rmind 
     61   1.1     rmind 	va_start(ap, fmt);
     62   1.1     rmind 	vasprintf(&msg, fmt, ap);
     63   1.1     rmind 	va_end(ap);
     64   1.1     rmind 
     65  1.14     rmind 	fprintf(stderr, "%s:%d:%d: %s", yyfilename,
     66  1.14     rmind 	    yylineno - (int)eol, yycolumn, msg);
     67  1.14     rmind 	if (!eol) {
     68  1.42     rmind #ifdef __NetBSD__
     69  1.14     rmind 		size_t len = strlen(context);
     70  1.16     rmind 		char *dst = ecalloc(1, len * 4 + 1);
     71  1.14     rmind 
     72  1.14     rmind 		strvisx(dst, context, len, VIS_WHITE|VIS_CSTYLE);
     73  1.43       kre 		context = dst;
     74  1.42     rmind #endif
     75  1.42     rmind 		fprintf(stderr, " near '%s'", context);
     76  1.14     rmind 	}
     77  1.14     rmind 	fprintf(stderr, "\n");
     78   1.1     rmind 	exit(EXIT_FAILURE);
     79   1.1     rmind }
     80   1.1     rmind 
     81   1.1     rmind %}
     82   1.1     rmind 
     83  1.48     rmind /*
     84  1.48     rmind  * No conflicts allowed.  Keep it this way.
     85  1.48     rmind  */
     86  1.48     rmind %expect 0
     87  1.48     rmind %expect-rr 0
     88  1.48     rmind 
     89  1.50     rmind /*
     90  1.50     rmind  * Depending on the mode of operation, set a different start symbol.
     91  1.50     rmind  * Workaround yacc limitation by passing the start token.
     92  1.50     rmind  */
     93  1.50     rmind %start input
     94  1.50     rmind %token RULE_ENTRY_TOKEN MAP_ENTRY_TOKEN
     95  1.50     rmind %lex-param { int yystarttoken }
     96  1.50     rmind 
     97  1.50     rmind /*
     98  1.50     rmind  * General tokens.
     99  1.50     rmind  */
    100  1.22  christos %token			ALG
    101  1.32     rmind %token			ALGO
    102   1.1     rmind %token			ALL
    103   1.1     rmind %token			ANY
    104   1.1     rmind %token			APPLY
    105   1.8     rmind %token			ARROWBOTH
    106   1.8     rmind %token			ARROWLEFT
    107   1.8     rmind %token			ARROWRIGHT
    108   1.1     rmind %token			BLOCK
    109  1.30     rmind %token			CDB
    110  1.48     rmind %token			CONST
    111   1.1     rmind %token			CURLY_CLOSE
    112   1.1     rmind %token			CURLY_OPEN
    113   1.1     rmind %token			CODE
    114   1.1     rmind %token			COLON
    115   1.1     rmind %token			COMMA
    116   1.1     rmind %token			DEFAULT
    117   1.1     rmind %token			TDYNAMIC
    118   1.8     rmind %token			TSTATIC
    119   1.1     rmind %token			EQ
    120  1.39     rmind %token			EXCL_MARK
    121   1.1     rmind %token			TFILE
    122   1.1     rmind %token			FLAGS
    123   1.1     rmind %token			FROM
    124   1.1     rmind %token			GROUP
    125   1.1     rmind %token			HASH
    126   1.1     rmind %token			ICMPTYPE
    127   1.1     rmind %token			ID
    128  1.48     rmind %token			IFADDRS
    129   1.1     rmind %token			IN
    130  1.29     rmind %token			INET4
    131   1.1     rmind %token			INET6
    132   1.1     rmind %token			INTERFACE
    133  1.48     rmind %token			IPHASH
    134  1.48     rmind %token			IPSET
    135  1.48     rmind %token			LPM
    136   1.8     rmind %token			MAP
    137  1.46     rmind %token			NO_PORTS
    138   1.1     rmind %token			MINUS
    139   1.1     rmind %token			NAME
    140  1.48     rmind %token			NETMAP
    141  1.32     rmind %token			NPT66
    142   1.1     rmind %token			ON
    143  1.36  christos %token			OFF
    144   1.1     rmind %token			OUT
    145   1.1     rmind %token			PAR_CLOSE
    146   1.1     rmind %token			PAR_OPEN
    147   1.1     rmind %token			PASS
    148  1.26     rmind %token			PCAP_FILTER
    149   1.1     rmind %token			PORT
    150   1.1     rmind %token			PROCEDURE
    151   1.1     rmind %token			PROTO
    152   1.1     rmind %token			FAMILY
    153   1.7     rmind %token			FINAL
    154  1.18     rmind %token			FORW
    155   1.1     rmind %token			RETURN
    156   1.1     rmind %token			RETURNICMP
    157   1.1     rmind %token			RETURNRST
    158  1.48     rmind %token			ROUNDROBIN
    159  1.21     rmind %token			RULESET
    160   1.1     rmind %token			SEPLINE
    161  1.36  christos %token			SET
    162   1.1     rmind %token			SLASH
    163   1.7     rmind %token			STATEFUL
    164  1.49     rmind %token			STATEFUL_ALL
    165   1.1     rmind %token			TABLE
    166   1.1     rmind %token			TCP
    167   1.1     rmind %token			TO
    168   1.1     rmind %token			TREE
    169   1.1     rmind %token			TYPE
    170  1.11       spz %token	<num>		ICMP
    171  1.11       spz %token	<num>		ICMP6
    172   1.1     rmind 
    173   1.1     rmind %token	<num>		HEX
    174   1.1     rmind %token	<str>		IDENTIFIER
    175   1.1     rmind %token	<str>		IPV4ADDR
    176   1.1     rmind %token	<str>		IPV6ADDR
    177   1.1     rmind %token	<num>		NUM
    178  1.13     rmind %token	<fpnum>		FPNUM
    179   1.1     rmind %token	<str>		STRING
    180  1.49     rmind %token	<str>		PARAM
    181   1.1     rmind %token	<str>		TABLE_ID
    182   1.1     rmind %token	<str>		VAR_ID
    183   1.1     rmind 
    184  1.48     rmind %type	<str>		addr some_name table_store dynamic_ifaddrs
    185  1.48     rmind %type	<str>		proc_param_val opt_apply ifname on_ifname ifref
    186  1.48     rmind %type	<num>		port opt_final number afamily opt_family
    187  1.48     rmind %type	<num>		block_or_pass rule_dir group_dir block_opts
    188  1.48     rmind %type	<num>		maybe_not opt_stateful icmp_type table_type
    189  1.48     rmind %type	<num>		map_sd map_algo map_flags map_type
    190  1.49     rmind %type	<num>		param_val
    191  1.48     rmind %type	<var>		static_ifaddrs addr_or_ifaddr
    192  1.48     rmind %type	<var>		port_range icmp_type_and_code
    193  1.48     rmind %type	<var>		filt_addr addr_and_mask tcp_flags tcp_flags_and_mask
    194  1.48     rmind %type	<var>		procs proc_call proc_param_list proc_param
    195  1.48     rmind %type	<var>		element list_elems list value
    196   1.8     rmind %type	<addrport>	mapseg
    197  1.48     rmind %type	<filtopts>	filt_opts all_or_filt_opts
    198  1.44     rmind %type	<optproto>	proto opt_proto
    199  1.26     rmind %type	<rulegroup>	group_opts
    200   1.1     rmind 
    201   1.1     rmind %union {
    202   1.1     rmind 	char *		str;
    203   1.1     rmind 	unsigned long	num;
    204  1.13     rmind 	double		fpnum;
    205  1.17     rmind 	npfvar_t *	var;
    206   1.8     rmind 	addr_port_t	addrport;
    207   1.1     rmind 	filt_opts_t	filtopts;
    208   1.1     rmind 	opt_proto_t	optproto;
    209   1.1     rmind 	rule_group_t	rulegroup;
    210   1.1     rmind }
    211   1.1     rmind 
    212   1.1     rmind %%
    213   1.1     rmind 
    214   1.1     rmind input
    215  1.50     rmind 	: lines
    216  1.50     rmind 	| RULE_ENTRY_TOKEN	rule
    217  1.50     rmind 	| MAP_ENTRY_TOKEN	map
    218   1.1     rmind 	;
    219   1.1     rmind 
    220   1.1     rmind lines
    221  1.35  riastrad 	: lines SEPLINE line
    222   1.1     rmind 	| line
    223   1.1     rmind 	;
    224   1.1     rmind 
    225   1.1     rmind line
    226  1.28     rmind 	: vardef
    227   1.1     rmind 	| table
    228   1.8     rmind 	| map
    229   1.1     rmind 	| group
    230   1.1     rmind 	| rproc
    231  1.22  christos 	| alg
    232  1.36  christos 	| set
    233   1.1     rmind 	|
    234   1.1     rmind 	;
    235   1.1     rmind 
    236  1.28     rmind alg
    237  1.28     rmind 	: ALG STRING
    238  1.28     rmind 	{
    239  1.28     rmind 		npfctl_build_alg($2);
    240  1.28     rmind 	}
    241  1.28     rmind 	;
    242  1.28     rmind 
    243  1.49     rmind param_val
    244  1.49     rmind 	: number	{ $$ = $1; }
    245  1.49     rmind 	| ON		{ $$ = true; }
    246  1.49     rmind 	| OFF		{ $$ = false; }
    247  1.36  christos 	;
    248  1.36  christos 
    249  1.36  christos set
    250  1.49     rmind 	: SET PARAM param_val {
    251  1.49     rmind 		npfctl_setparam($2, $3);
    252  1.36  christos 	}
    253  1.36  christos 	;
    254  1.36  christos 
    255  1.28     rmind /*
    256  1.28     rmind  * A value - an element or a list of elements.
    257  1.28     rmind  * Can be assigned to a variable or used inline.
    258  1.28     rmind  */
    259  1.28     rmind 
    260  1.28     rmind vardef
    261  1.29     rmind 	: VAR_ID EQ value
    262   1.1     rmind 	{
    263  1.29     rmind 		npfvar_add($3, $1);
    264   1.1     rmind 	}
    265   1.1     rmind 	;
    266   1.1     rmind 
    267  1.28     rmind value
    268  1.28     rmind 	: element
    269  1.28     rmind 	| list
    270   1.1     rmind 	;
    271   1.1     rmind 
    272  1.28     rmind list
    273   1.1     rmind 	: CURLY_OPEN list_elems CURLY_CLOSE
    274  1.29     rmind 	{
    275  1.29     rmind 		$$ = $2;
    276  1.29     rmind 	}
    277   1.1     rmind 	;
    278   1.1     rmind 
    279   1.1     rmind list_elems
    280  1.35  riastrad 	: list_elems COMMA element
    281  1.29     rmind 	{
    282  1.29     rmind 		npfvar_add_elements($1, $3);
    283  1.29     rmind 	}
    284  1.28     rmind 	| element
    285   1.1     rmind 	;
    286   1.1     rmind 
    287  1.28     rmind element
    288   1.1     rmind 	: IDENTIFIER
    289   1.1     rmind 	{
    290  1.29     rmind 		$$ = npfvar_create_from_string(NPFVAR_IDENTIFIER, $1);
    291   1.1     rmind 	}
    292   1.1     rmind 	| STRING
    293   1.1     rmind 	{
    294  1.29     rmind 		$$ = npfvar_create_from_string(NPFVAR_STRING, $1);
    295   1.1     rmind 	}
    296  1.23  christos 	| number MINUS number
    297   1.5  christos 	{
    298  1.29     rmind 		$$ = npfctl_parse_port_range($1, $3);
    299   1.5  christos 	}
    300  1.23  christos 	| number
    301   1.1     rmind 	{
    302  1.29     rmind 		$$ = npfvar_create_element(NPFVAR_NUM, &$1, sizeof($1));
    303   1.1     rmind 	}
    304   1.1     rmind 	| VAR_ID
    305   1.1     rmind 	{
    306  1.29     rmind 		$$ = npfvar_create_from_string(NPFVAR_VAR_ID, $1);
    307   1.1     rmind 	}
    308  1.29     rmind 	| TABLE_ID		{ $$ = npfctl_parse_table_id($1); }
    309  1.40     rmind 	| dynamic_ifaddrs	{ $$ = npfctl_ifnet_table($1); }
    310  1.40     rmind 	| static_ifaddrs	{ $$ = $1; }
    311  1.29     rmind 	| addr_and_mask		{ $$ = $1; }
    312   1.1     rmind 	;
    313   1.1     rmind 
    314  1.28     rmind /*
    315  1.28     rmind  * Table definition.
    316  1.28     rmind  */
    317  1.28     rmind 
    318   1.1     rmind table
    319   1.1     rmind 	: TABLE TABLE_ID TYPE table_type table_store
    320   1.1     rmind 	{
    321   1.1     rmind 		npfctl_build_table($2, $4, $5);
    322   1.1     rmind 	}
    323   1.1     rmind 	;
    324   1.1     rmind 
    325   1.1     rmind table_type
    326  1.48     rmind 	: IPSET		{ $$ = NPF_TABLE_IPSET; }
    327  1.48     rmind 	| HASH
    328  1.48     rmind 	{
    329  1.48     rmind 		warnx("warning - table type \"hash\" is deprecated and may be "
    330  1.48     rmind 		    "deleted in\nthe future; please use the \"ipset\" type "
    331  1.48     rmind 		    "instead.");
    332  1.48     rmind 		$$ = NPF_TABLE_IPSET;
    333  1.48     rmind 	}
    334  1.48     rmind 	| LPM		{ $$ = NPF_TABLE_LPM; }
    335  1.48     rmind 	| TREE
    336  1.48     rmind 	{
    337  1.48     rmind 		warnx("warning - table type \"tree\" is deprecated and may be "
    338  1.48     rmind 		    "deleted in\nthe future; please use the \"lpm\" type "
    339  1.48     rmind 		    "instead.");
    340  1.48     rmind 		$$ = NPF_TABLE_LPM;
    341  1.48     rmind 	}
    342  1.48     rmind 	| CONST		{ $$ = NPF_TABLE_CONST; }
    343  1.48     rmind 	| CDB
    344  1.48     rmind 	{
    345  1.48     rmind 		warnx("warning -- table type \"cdb\" is deprecated and may be "
    346  1.48     rmind 		    "deleted in\nthe future; please use the \"const\" type "
    347  1.48     rmind 		    "instead.");
    348  1.48     rmind 		$$ = NPF_TABLE_CONST;
    349  1.48     rmind 	}
    350   1.1     rmind 	;
    351   1.1     rmind 
    352   1.1     rmind table_store
    353  1.48     rmind 	: TFILE STRING	{ $$ = $2; }
    354  1.48     rmind 	| TDYNAMIC
    355  1.48     rmind 	{
    356  1.48     rmind 		warnx("warning - the \"dynamic\" keyword for tables is obsolete");
    357  1.48     rmind 		$$ = NULL;
    358  1.48     rmind 	}
    359  1.48     rmind 	|		{ $$ = NULL; }
    360   1.1     rmind 	;
    361   1.1     rmind 
    362  1.28     rmind /*
    363  1.28     rmind  * Map definition.
    364  1.28     rmind  */
    365  1.28     rmind 
    366   1.8     rmind map_sd
    367   1.8     rmind 	: TSTATIC	{ $$ = NPFCTL_NAT_STATIC; }
    368   1.8     rmind 	| TDYNAMIC	{ $$ = NPFCTL_NAT_DYNAMIC; }
    369   1.8     rmind 	|		{ $$ = NPFCTL_NAT_DYNAMIC; }
    370   1.1     rmind 	;
    371   1.1     rmind 
    372  1.32     rmind map_algo
    373  1.48     rmind 	: ALGO NETMAP		{ $$ = NPF_ALGO_NETMAP; }
    374  1.48     rmind 	| ALGO IPHASH		{ $$ = NPF_ALGO_IPHASH; }
    375  1.48     rmind 	| ALGO ROUNDROBIN	{ $$ = NPF_ALGO_RR; }
    376  1.48     rmind 	| ALGO NPT66		{ $$ = NPF_ALGO_NPT66; }
    377  1.48     rmind 	|			{ $$ = 0; }
    378  1.32     rmind 	;
    379  1.32     rmind 
    380  1.46     rmind map_flags
    381  1.46     rmind 	: NO_PORTS	{ $$ = NPF_NAT_PORTS; }
    382  1.46     rmind 	|		{ $$ = 0; }
    383  1.46     rmind 	;
    384  1.46     rmind 
    385   1.8     rmind map_type
    386   1.8     rmind 	: ARROWBOTH	{ $$ = NPF_NATIN | NPF_NATOUT; }
    387   1.8     rmind 	| ARROWLEFT	{ $$ = NPF_NATIN; }
    388   1.8     rmind 	| ARROWRIGHT	{ $$ = NPF_NATOUT; }
    389   1.8     rmind 	;
    390   1.8     rmind 
    391   1.8     rmind mapseg
    392  1.48     rmind 	: filt_addr port_range
    393   1.1     rmind 	{
    394   1.8     rmind 		$$.ap_netaddr = $1;
    395   1.8     rmind 		$$.ap_portrange = $2;
    396   1.1     rmind 	}
    397   1.1     rmind 	;
    398   1.1     rmind 
    399   1.8     rmind map
    400  1.46     rmind 	: MAP ifref map_sd map_algo map_flags mapseg map_type mapseg
    401  1.48     rmind 	  PASS opt_family opt_proto all_or_filt_opts
    402   1.1     rmind 	{
    403  1.48     rmind 		npfctl_build_natseg($3, $7, $5, $2, &$6, &$8, &$11, &$12, $4);
    404   1.1     rmind 	}
    405  1.46     rmind 	| MAP ifref map_sd map_algo map_flags mapseg map_type mapseg
    406  1.44     rmind 	{
    407  1.46     rmind 		npfctl_build_natseg($3, $7, $5, $2, &$6, &$8, NULL, NULL, $4);
    408  1.44     rmind 	}
    409  1.46     rmind 	| MAP ifref map_sd map_algo map_flags proto mapseg map_type mapseg
    410   1.1     rmind 	{
    411  1.46     rmind 		npfctl_build_natseg($3, $8, $5, $2, &$7, &$9, &$6, NULL, $4);
    412   1.1     rmind 	}
    413  1.26     rmind 	| MAP RULESET group_opts
    414  1.21     rmind 	{
    415  1.27     rmind 		npfctl_build_maprset($3.rg_name, $3.rg_attr, $3.rg_ifname);
    416  1.21     rmind 	}
    417   1.1     rmind 	;
    418   1.1     rmind 
    419  1.28     rmind /*
    420  1.28     rmind  * Rule procedure definition and its parameters.
    421  1.28     rmind  */
    422  1.28     rmind 
    423   1.1     rmind rproc
    424   1.1     rmind 	: PROCEDURE STRING CURLY_OPEN procs CURLY_CLOSE
    425   1.1     rmind 	{
    426   1.1     rmind 		npfctl_build_rproc($2, $4);
    427   1.1     rmind 	}
    428   1.1     rmind 	;
    429   1.1     rmind 
    430   1.1     rmind procs
    431  1.35  riastrad 	: procs SEPLINE proc_call
    432  1.13     rmind 	{
    433  1.13     rmind 		$$ = npfvar_add_elements($1, $3);
    434  1.13     rmind 	}
    435  1.13     rmind 	| proc_call	{ $$ = $1; }
    436   1.1     rmind 	;
    437   1.1     rmind 
    438  1.13     rmind proc_call
    439  1.13     rmind 	: IDENTIFIER COLON proc_param_list
    440   1.1     rmind 	{
    441  1.13     rmind 		proc_call_t pc;
    442   1.1     rmind 
    443  1.15     rmind 		pc.pc_name = estrdup($1);
    444  1.13     rmind 		pc.pc_opts = $3;
    445  1.29     rmind 
    446  1.29     rmind 		$$ = npfvar_create_element(NPFVAR_PROC, &pc, sizeof(pc));
    447   1.1     rmind 	}
    448  1.29     rmind 	|		{ $$ = NULL; }
    449   1.1     rmind 	;
    450   1.1     rmind 
    451  1.13     rmind proc_param_list
    452  1.35  riastrad 	: proc_param_list COMMA proc_param
    453   1.1     rmind 	{
    454   1.1     rmind 		$$ = npfvar_add_elements($1, $3);
    455   1.1     rmind 	}
    456  1.13     rmind 	| proc_param	{ $$ = $1; }
    457   1.1     rmind 	|		{ $$ = NULL; }
    458   1.1     rmind 	;
    459   1.1     rmind 
    460  1.13     rmind proc_param
    461  1.13     rmind 	: some_name proc_param_val
    462   1.1     rmind 	{
    463  1.13     rmind 		proc_param_t pp;
    464   1.1     rmind 
    465  1.15     rmind 		pp.pp_param = estrdup($1);
    466  1.15     rmind 		pp.pp_value = $2 ? estrdup($2) : NULL;
    467  1.29     rmind 
    468  1.29     rmind 		$$ = npfvar_create_element(NPFVAR_PROC_PARAM, &pp, sizeof(pp));
    469   1.1     rmind 	}
    470   1.1     rmind 	;
    471   1.1     rmind 
    472  1.13     rmind proc_param_val
    473  1.13     rmind 	: some_name	{ $$ = $1; }
    474  1.23  christos 	| number	{ (void)asprintf(&$$, "%ld", $1); }
    475  1.13     rmind 	| FPNUM		{ (void)asprintf(&$$, "%lf", $1); }
    476  1.13     rmind 	|		{ $$ = NULL; }
    477   1.1     rmind 	;
    478   1.1     rmind 
    479  1.28     rmind /*
    480  1.28     rmind  * Group and dynamic ruleset definition.
    481  1.28     rmind  */
    482  1.28     rmind 
    483   1.1     rmind group
    484  1.26     rmind 	: GROUP group_opts
    485   1.1     rmind 	{
    486  1.29     rmind 		/* Build a group.  Increase the nesting level. */
    487  1.26     rmind 		npfctl_build_group($2.rg_name, $2.rg_attr,
    488  1.27     rmind 		    $2.rg_ifname, $2.rg_default);
    489  1.18     rmind 	}
    490  1.18     rmind 	  ruleset_block
    491  1.18     rmind 	{
    492  1.18     rmind 		/* Decrease the nesting level. */
    493  1.18     rmind 		npfctl_build_group_end();
    494   1.1     rmind 	}
    495   1.1     rmind 	;
    496   1.1     rmind 
    497  1.21     rmind ruleset
    498  1.26     rmind 	: RULESET group_opts
    499  1.21     rmind 	{
    500  1.21     rmind 		/* Ruleset is a dynamic group. */
    501  1.26     rmind 		npfctl_build_group($2.rg_name, $2.rg_attr | NPF_RULE_DYNAMIC,
    502  1.27     rmind 		    $2.rg_ifname, $2.rg_default);
    503  1.21     rmind 		npfctl_build_group_end();
    504  1.21     rmind 	}
    505  1.26     rmind 	;
    506  1.21     rmind 
    507  1.26     rmind group_dir
    508  1.26     rmind 	: FORW		{ $$ = NPF_RULE_FORW; }
    509  1.26     rmind 	| rule_dir
    510   1.1     rmind 	;
    511   1.1     rmind 
    512  1.26     rmind group_opts
    513   1.1     rmind 	: DEFAULT
    514   1.1     rmind 	{
    515  1.18     rmind 		memset(&$$, 0, sizeof(rule_group_t));
    516  1.18     rmind 		$$.rg_default = true;
    517   1.1     rmind 	}
    518  1.27     rmind 	| STRING group_dir on_ifname
    519   1.1     rmind 	{
    520  1.18     rmind 		memset(&$$, 0, sizeof(rule_group_t));
    521  1.26     rmind 		$$.rg_name = $1;
    522  1.26     rmind 		$$.rg_attr = $2;
    523  1.27     rmind 		$$.rg_ifname = $3;
    524   1.1     rmind 	}
    525   1.1     rmind 	;
    526   1.1     rmind 
    527  1.18     rmind ruleset_block
    528  1.21     rmind 	: CURLY_OPEN ruleset_def CURLY_CLOSE
    529  1.18     rmind 	;
    530  1.18     rmind 
    531  1.21     rmind ruleset_def
    532  1.35  riastrad 	: ruleset_def SEPLINE rule_group
    533  1.18     rmind 	| rule_group
    534   1.1     rmind 	;
    535   1.1     rmind 
    536  1.18     rmind rule_group
    537  1.18     rmind 	: rule
    538  1.18     rmind 	| group
    539  1.21     rmind 	| ruleset
    540  1.18     rmind 	|
    541  1.24     rmind 	;
    542   1.1     rmind 
    543  1.28     rmind /*
    544  1.28     rmind  * Rule and misc.
    545  1.28     rmind  */
    546  1.28     rmind 
    547   1.1     rmind rule
    548  1.27     rmind 	: block_or_pass opt_stateful rule_dir opt_final on_ifname
    549  1.17     rmind 	  opt_family opt_proto all_or_filt_opts opt_apply
    550   1.1     rmind 	{
    551   1.7     rmind 		npfctl_build_rule($1 | $2 | $3 | $4, $5,
    552  1.26     rmind 		    $6, &$7, &$8, NULL, $9);
    553  1.26     rmind 	}
    554  1.27     rmind 	| block_or_pass opt_stateful rule_dir opt_final on_ifname
    555  1.26     rmind 	  PCAP_FILTER STRING opt_apply
    556  1.26     rmind 	{
    557  1.26     rmind 		npfctl_build_rule($1 | $2 | $3 | $4, $5,
    558  1.26     rmind 		    AF_UNSPEC, NULL, NULL, $7, $8);
    559   1.1     rmind 	}
    560   1.1     rmind 	;
    561   1.1     rmind 
    562   1.1     rmind block_or_pass
    563   1.1     rmind 	: BLOCK block_opts	{ $$ = $2; }
    564   1.1     rmind 	| PASS			{ $$ = NPF_RULE_PASS; }
    565   1.1     rmind 	;
    566   1.1     rmind 
    567   1.1     rmind rule_dir
    568   1.1     rmind 	: IN			{ $$ = NPF_RULE_IN; }
    569   1.1     rmind 	| OUT			{ $$ = NPF_RULE_OUT; }
    570   1.1     rmind 	|			{ $$ = NPF_RULE_IN | NPF_RULE_OUT; }
    571   1.1     rmind 	;
    572   1.1     rmind 
    573   1.7     rmind opt_final
    574   1.7     rmind 	: FINAL			{ $$ = NPF_RULE_FINAL; }
    575   1.1     rmind 	|			{ $$ = 0; }
    576   1.1     rmind 	;
    577   1.1     rmind 
    578  1.27     rmind on_ifname
    579  1.29     rmind 	: ON ifref		{ $$ = $2; }
    580  1.27     rmind 	|			{ $$ = NULL; }
    581   1.1     rmind 	;
    582   1.1     rmind 
    583  1.17     rmind afamily
    584  1.29     rmind 	: INET4			{ $$ = AF_INET; }
    585  1.17     rmind 	| INET6			{ $$ = AF_INET6; }
    586  1.17     rmind 	;
    587  1.17     rmind 
    588  1.39     rmind maybe_not
    589  1.39     rmind 	: EXCL_MARK		{ $$ = true; }
    590  1.39     rmind 	|			{ $$ = false; }
    591  1.39     rmind 	;
    592  1.39     rmind 
    593   1.9     rmind opt_family
    594  1.17     rmind 	: FAMILY afamily	{ $$ = $2; }
    595   1.9     rmind 	|			{ $$ = AF_UNSPEC; }
    596   1.1     rmind 	;
    597   1.1     rmind 
    598  1.44     rmind proto
    599   1.1     rmind 	: PROTO TCP tcp_flags_and_mask
    600   1.1     rmind 	{
    601   1.1     rmind 		$$.op_proto = IPPROTO_TCP;
    602   1.1     rmind 		$$.op_opts = $3;
    603   1.1     rmind 	}
    604   1.1     rmind 	| PROTO ICMP icmp_type_and_code
    605   1.1     rmind 	{
    606   1.1     rmind 		$$.op_proto = IPPROTO_ICMP;
    607   1.1     rmind 		$$.op_opts = $3;
    608   1.1     rmind 	}
    609  1.11       spz 	| PROTO ICMP6 icmp_type_and_code
    610  1.11       spz 	{
    611  1.11       spz 		$$.op_proto = IPPROTO_ICMPV6;
    612  1.11       spz 		$$.op_opts = $3;
    613  1.11       spz 	}
    614   1.9     rmind 	| PROTO some_name
    615   1.9     rmind 	{
    616   1.9     rmind 		$$.op_proto = npfctl_protono($2);
    617   1.9     rmind 		$$.op_opts = NULL;
    618   1.9     rmind 	}
    619  1.23  christos 	| PROTO number
    620   1.1     rmind 	{
    621   1.9     rmind 		$$.op_proto = $2;
    622   1.1     rmind 		$$.op_opts = NULL;
    623   1.1     rmind 	}
    624  1.44     rmind 	;
    625  1.44     rmind 
    626  1.44     rmind opt_proto
    627  1.44     rmind 	: proto			{ $$ = $1; }
    628   1.1     rmind 	|
    629   1.1     rmind 	{
    630   1.1     rmind 		$$.op_proto = -1;
    631   1.1     rmind 		$$.op_opts = NULL;
    632   1.1     rmind 	}
    633   1.1     rmind 	;
    634   1.1     rmind 
    635   1.1     rmind all_or_filt_opts
    636   1.1     rmind 	: ALL
    637   1.1     rmind 	{
    638  1.39     rmind 		$$.fo_finvert = false;
    639   1.8     rmind 		$$.fo_from.ap_netaddr = NULL;
    640   1.8     rmind 		$$.fo_from.ap_portrange = NULL;
    641  1.39     rmind 		$$.fo_tinvert = false;
    642   1.8     rmind 		$$.fo_to.ap_netaddr = NULL;
    643   1.8     rmind 		$$.fo_to.ap_portrange = NULL;
    644   1.1     rmind 	}
    645   1.1     rmind 	| filt_opts	{ $$ = $1; }
    646   1.1     rmind 	;
    647   1.1     rmind 
    648   1.7     rmind opt_stateful
    649   1.9     rmind 	: STATEFUL	{ $$ = NPF_RULE_STATEFUL; }
    650  1.49     rmind 	| STATEFUL_ALL	{ $$ = NPF_RULE_STATEFUL | NPF_RULE_GSTATEFUL; }
    651   1.1     rmind 	|		{ $$ = 0; }
    652   1.1     rmind 	;
    653   1.1     rmind 
    654   1.1     rmind opt_apply
    655   1.1     rmind 	: APPLY STRING	{ $$ = $2; }
    656   1.1     rmind 	|		{ $$ = NULL; }
    657   1.1     rmind 	;
    658   1.1     rmind 
    659   1.1     rmind block_opts
    660   1.1     rmind 	: RETURNRST	{ $$ = NPF_RULE_RETRST; }
    661   1.1     rmind 	| RETURNICMP	{ $$ = NPF_RULE_RETICMP; }
    662   1.1     rmind 	| RETURN	{ $$ = NPF_RULE_RETRST | NPF_RULE_RETICMP; }
    663   1.1     rmind 	|		{ $$ = 0; }
    664   1.1     rmind 	;
    665   1.1     rmind 
    666   1.1     rmind filt_opts
    667  1.39     rmind 	: FROM maybe_not filt_addr port_range TO maybe_not filt_addr port_range
    668   1.1     rmind 	{
    669  1.39     rmind 		$$.fo_finvert = $2;
    670  1.39     rmind 		$$.fo_from.ap_netaddr = $3;
    671  1.39     rmind 		$$.fo_from.ap_portrange = $4;
    672  1.39     rmind 		$$.fo_tinvert = $6;
    673  1.39     rmind 		$$.fo_to.ap_netaddr = $7;
    674  1.39     rmind 		$$.fo_to.ap_portrange = $8;
    675  1.39     rmind 	}
    676  1.39     rmind 	| FROM maybe_not filt_addr port_range
    677  1.39     rmind 	{
    678  1.39     rmind 		$$.fo_finvert = $2;
    679  1.39     rmind 		$$.fo_from.ap_netaddr = $3;
    680  1.39     rmind 		$$.fo_from.ap_portrange = $4;
    681  1.39     rmind 		$$.fo_tinvert = false;
    682   1.8     rmind 		$$.fo_to.ap_netaddr = NULL;
    683   1.8     rmind 		$$.fo_to.ap_portrange = NULL;
    684   1.1     rmind 	}
    685  1.39     rmind 	| TO maybe_not filt_addr port_range
    686   1.1     rmind 	{
    687  1.39     rmind 		$$.fo_finvert = false;
    688   1.8     rmind 		$$.fo_from.ap_netaddr = NULL;
    689   1.8     rmind 		$$.fo_from.ap_portrange = NULL;
    690  1.39     rmind 		$$.fo_tinvert = $2;
    691  1.39     rmind 		$$.fo_to.ap_netaddr = $3;
    692  1.39     rmind 		$$.fo_to.ap_portrange = $4;
    693   1.1     rmind 	}
    694   1.1     rmind 	;
    695   1.1     rmind 
    696   1.1     rmind filt_addr
    697  1.38  christos 	: list			{ $$ = $1; }
    698  1.38  christos 	| addr_or_ifaddr	{ $$ = $1; }
    699   1.4     rmind 	| ANY			{ $$ = NULL; }
    700   1.1     rmind 	;
    701   1.1     rmind 
    702   1.1     rmind addr_and_mask
    703  1.23  christos 	: addr SLASH number
    704   1.1     rmind 	{
    705   1.1     rmind 		$$ = npfctl_parse_fam_addr_mask($1, NULL, &$3);
    706   1.1     rmind 	}
    707   1.1     rmind 	| addr SLASH addr
    708   1.1     rmind 	{
    709   1.1     rmind 		$$ = npfctl_parse_fam_addr_mask($1, $3, NULL);
    710   1.1     rmind 	}
    711   1.1     rmind 	| addr
    712   1.1     rmind 	{
    713   1.1     rmind 		$$ = npfctl_parse_fam_addr_mask($1, NULL, NULL);
    714   1.1     rmind 	}
    715   1.1     rmind 	;
    716   1.1     rmind 
    717  1.29     rmind addr_or_ifaddr
    718  1.48     rmind 	: addr_and_mask		{ assert($1 != NULL); $$ = $1; }
    719  1.40     rmind 	| static_ifaddrs
    720   1.4     rmind 	{
    721  1.41  christos 		if (npfvar_get_count($1) != 1)
    722  1.41  christos 			yyerror("multiple interfaces are not supported");
    723  1.17     rmind 		ifnet_addr_t *ifna = npfvar_get_data($1, NPFVAR_INTERFACE, 0);
    724  1.17     rmind 		$$ = ifna->ifna_addrs;
    725   1.4     rmind 	}
    726  1.48     rmind 	| dynamic_ifaddrs	{ $$ = npfctl_ifnet_table($1); }
    727  1.48     rmind 	| TABLE_ID		{ $$ = npfctl_parse_table_id($1); }
    728   1.4     rmind 	| VAR_ID
    729   1.4     rmind 	{
    730   1.4     rmind 		npfvar_t *vp = npfvar_lookup($1);
    731  1.19  christos 		int type = npfvar_get_type(vp, 0);
    732  1.17     rmind 		ifnet_addr_t *ifna;
    733  1.19  christos again:
    734   1.4     rmind 		switch (type) {
    735  1.19  christos 		case NPFVAR_IDENTIFIER:
    736  1.19  christos 		case NPFVAR_STRING:
    737  1.19  christos 			vp = npfctl_parse_ifnet(npfvar_expand_string(vp),
    738  1.19  christos 			    AF_UNSPEC);
    739  1.19  christos 			type = npfvar_get_type(vp, 0);
    740  1.19  christos 			goto again;
    741   1.4     rmind 		case NPFVAR_FAM:
    742  1.40     rmind 		case NPFVAR_TABLE:
    743   1.4     rmind 			$$ = vp;
    744   1.4     rmind 			break;
    745  1.17     rmind 		case NPFVAR_INTERFACE:
    746  1.33     rmind 			$$ = NULL;
    747  1.33     rmind 			for (u_int i = 0; i < npfvar_get_count(vp); i++) {
    748  1.33     rmind 				ifna = npfvar_get_data(vp, type, i);
    749  1.33     rmind 				$$ = npfvar_add_elements($$, ifna->ifna_addrs);
    750  1.33     rmind 			}
    751  1.17     rmind 			break;
    752   1.4     rmind 		case -1:
    753  1.17     rmind 			yyerror("undefined variable '%s'", $1);
    754   1.4     rmind 			break;
    755   1.4     rmind 		default:
    756  1.17     rmind 			yyerror("wrong variable '%s' type '%s' for address "
    757  1.17     rmind 			    "or interface", $1, npfvar_type(type));
    758   1.4     rmind 			break;
    759   1.4     rmind 		}
    760   1.4     rmind 	}
    761   1.1     rmind 	;
    762   1.1     rmind 
    763   1.1     rmind addr
    764   1.1     rmind 	: IPV4ADDR	{ $$ = $1; }
    765   1.1     rmind 	| IPV6ADDR	{ $$ = $1; }
    766   1.1     rmind 	;
    767   1.1     rmind 
    768   1.1     rmind port_range
    769   1.1     rmind 	: PORT port		/* just port */
    770   1.1     rmind 	{
    771   1.1     rmind 		$$ = npfctl_parse_port_range($2, $2);
    772   1.1     rmind 	}
    773   1.8     rmind 	| PORT port MINUS port	/* port from-to */
    774   1.1     rmind 	{
    775   1.1     rmind 		$$ = npfctl_parse_port_range($2, $4);
    776   1.1     rmind 	}
    777   1.8     rmind 	| PORT VAR_ID
    778   1.8     rmind 	{
    779  1.42     rmind 		npfvar_t *vp = npfvar_lookup($2);
    780  1.42     rmind 		$$ = npfctl_parse_port_range_variable($2, vp);
    781   1.5  christos 	}
    782  1.42     rmind 	| PORT list
    783   1.1     rmind 	{
    784  1.42     rmind 		$$ = npfctl_parse_port_range_variable(NULL, $2);
    785   1.1     rmind 	}
    786  1.42     rmind 	|			{ $$ = NULL; }
    787   1.1     rmind 	;
    788   1.1     rmind 
    789   1.1     rmind port
    790  1.23  christos 	: number	{ $$ = $1; }
    791   1.1     rmind 	| IDENTIFIER	{ $$ = npfctl_portno($1); }
    792  1.20  christos 	| STRING	{ $$ = npfctl_portno($1); }
    793   1.1     rmind 	;
    794   1.1     rmind 
    795   1.1     rmind icmp_type_and_code
    796   1.1     rmind 	: ICMPTYPE icmp_type
    797   1.1     rmind 	{
    798  1.11       spz 		$$ = npfctl_parse_icmp($<num>0, $2, -1);
    799   1.1     rmind 	}
    800  1.23  christos 	| ICMPTYPE icmp_type CODE number
    801   1.1     rmind 	{
    802  1.11       spz 		$$ = npfctl_parse_icmp($<num>0, $2, $4);
    803   1.1     rmind 	}
    804   1.1     rmind 	| ICMPTYPE icmp_type CODE IDENTIFIER
    805   1.1     rmind 	{
    806  1.17     rmind 		$$ = npfctl_parse_icmp($<num>0, $2,
    807  1.17     rmind 		    npfctl_icmpcode($<num>0, $2, $4));
    808   1.1     rmind 	}
    809   1.1     rmind 	| ICMPTYPE icmp_type CODE VAR_ID
    810   1.1     rmind 	{
    811   1.1     rmind 		char *s = npfvar_expand_string(npfvar_lookup($4));
    812  1.17     rmind 		$$ = npfctl_parse_icmp($<num>0, $2,
    813  1.17     rmind 		    npfctl_icmpcode($<num>0, $2, s));
    814   1.1     rmind 	}
    815  1.25     rmind 	|		{ $$ = NULL; }
    816   1.1     rmind 	;
    817   1.1     rmind 
    818   1.1     rmind tcp_flags_and_mask
    819   1.1     rmind 	: FLAGS tcp_flags SLASH tcp_flags
    820   1.1     rmind 	{
    821   1.1     rmind 		npfvar_add_elements($2, $4);
    822   1.1     rmind 		$$ = $2;
    823   1.1     rmind 	}
    824   1.1     rmind 	| FLAGS tcp_flags
    825   1.1     rmind 	{
    826  1.41  christos 		if (npfvar_get_count($2) != 1)
    827  1.41  christos 			yyerror("multiple tcpflags are not supported");
    828   1.1     rmind 		char *s = npfvar_get_data($2, NPFVAR_TCPFLAG, 0);
    829   1.1     rmind 		npfvar_add_elements($2, npfctl_parse_tcpflag(s));
    830   1.1     rmind 		$$ = $2;
    831   1.1     rmind 	}
    832   1.1     rmind 	|		{ $$ = NULL; }
    833   1.1     rmind 	;
    834   1.1     rmind 
    835   1.1     rmind tcp_flags
    836   1.1     rmind 	: IDENTIFIER	{ $$ = npfctl_parse_tcpflag($1); }
    837   1.1     rmind 	;
    838   1.1     rmind 
    839   1.1     rmind icmp_type
    840  1.23  christos 	: number	{ $$ = $1; }
    841  1.11       spz 	| IDENTIFIER	{ $$ = npfctl_icmptype($<num>-1, $1); }
    842   1.1     rmind 	| VAR_ID
    843   1.1     rmind 	{
    844   1.1     rmind 		char *s = npfvar_expand_string(npfvar_lookup($1));
    845  1.11       spz 		$$ = npfctl_icmptype($<num>-1, s);
    846   1.1     rmind 	}
    847   1.1     rmind 	;
    848   1.1     rmind 
    849  1.29     rmind ifname
    850  1.29     rmind 	: some_name
    851  1.19  christos 	{
    852  1.29     rmind 		npfctl_note_interface($1);
    853  1.19  christos 		$$ = $1;
    854  1.19  christos 	}
    855  1.19  christos 	| VAR_ID
    856  1.19  christos 	{
    857  1.19  christos 		npfvar_t *vp = npfvar_lookup($1);
    858  1.19  christos 		const int type = npfvar_get_type(vp, 0);
    859  1.29     rmind 		ifnet_addr_t *ifna;
    860  1.48     rmind 		const char *name;
    861  1.48     rmind 		unsigned *tid;
    862  1.48     rmind 		bool ifaddr;
    863  1.19  christos 
    864  1.19  christos 		switch (type) {
    865  1.19  christos 		case NPFVAR_STRING:
    866  1.19  christos 		case NPFVAR_IDENTIFIER:
    867  1.19  christos 			$$ = npfvar_expand_string(vp);
    868  1.19  christos 			break;
    869  1.29     rmind 		case NPFVAR_INTERFACE:
    870  1.41  christos 			if (npfvar_get_count(vp) != 1)
    871  1.41  christos 				yyerror(
    872  1.41  christos 				    "multiple interfaces are not supported");
    873  1.29     rmind 			ifna = npfvar_get_data(vp, type, 0);
    874  1.29     rmind 			$$ = ifna->ifna_name;
    875  1.29     rmind 			break;
    876  1.48     rmind 		case NPFVAR_TABLE:
    877  1.48     rmind 			tid = npfvar_get_data(vp, type, 0);
    878  1.48     rmind 			name = npfctl_table_getname(npfctl_config_ref(),
    879  1.48     rmind 			    *tid, &ifaddr);
    880  1.48     rmind 			if (!ifaddr) {
    881  1.48     rmind 				yyerror("variable '%s' references a table "
    882  1.48     rmind 				    "%s instead of an interface", $1, name);
    883  1.48     rmind 			}
    884  1.48     rmind 			$$ = estrdup(name);
    885  1.48     rmind 			break;
    886  1.19  christos 		case -1:
    887  1.19  christos 			yyerror("undefined variable '%s' for interface", $1);
    888  1.19  christos 			break;
    889  1.19  christos 		default:
    890  1.29     rmind 			yyerror("wrong variable '%s' type '%s' for interface",
    891  1.19  christos 			    $1, npfvar_type(type));
    892  1.19  christos 			break;
    893  1.19  christos 		}
    894  1.29     rmind 		npfctl_note_interface($$);
    895  1.19  christos 	}
    896  1.19  christos 	;
    897  1.19  christos 
    898  1.40     rmind static_ifaddrs
    899  1.29     rmind 	: afamily PAR_OPEN ifname PAR_CLOSE
    900  1.17     rmind 	{
    901  1.17     rmind 		$$ = npfctl_parse_ifnet($3, $1);
    902  1.17     rmind 	}
    903  1.19  christos 	;
    904  1.17     rmind 
    905  1.40     rmind dynamic_ifaddrs
    906  1.40     rmind 	: IFADDRS PAR_OPEN ifname PAR_CLOSE
    907  1.40     rmind 	{
    908  1.40     rmind 		$$ = $3;
    909  1.40     rmind 	}
    910  1.40     rmind 	;
    911  1.40     rmind 
    912  1.29     rmind ifref
    913  1.29     rmind 	: ifname
    914  1.40     rmind 	| dynamic_ifaddrs
    915  1.40     rmind 	| static_ifaddrs
    916  1.17     rmind 	{
    917  1.49     rmind 		ifnet_addr_t *ifna;
    918  1.49     rmind 
    919  1.49     rmind 		if (npfvar_get_count($1) != 1) {
    920  1.41  christos 			yyerror("multiple interfaces are not supported");
    921  1.49     rmind 		}
    922  1.49     rmind 		ifna = npfvar_get_data($1, NPFVAR_INTERFACE, 0);
    923  1.27     rmind 		npfctl_note_interface(ifna->ifna_name);
    924  1.27     rmind 		$$ = ifna->ifna_name;
    925  1.17     rmind 	}
    926   1.1     rmind 	;
    927   1.1     rmind 
    928  1.23  christos number
    929  1.23  christos 	: HEX		{ $$ = $1; }
    930  1.23  christos 	| NUM		{ $$ = $1; }
    931  1.23  christos 	;
    932  1.23  christos 
    933   1.9     rmind some_name
    934   1.1     rmind 	: IDENTIFIER	{ $$ = $1; }
    935   1.1     rmind 	| STRING	{ $$ = $1; }
    936   1.1     rmind 	;
    937   1.1     rmind 
    938   1.1     rmind %%
    939