2 * Copyright (c) 2014-2015 Dmitry V. Levin <ldv@altlinux.org>
3 * Copyright (c) 2014-2017 The strace developers.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 typedef int32_t key_serial_t;
33 #include "xlat/key_spec.h"
35 struct keyctl_dh_params {
42 print_keyring_serial_number(key_serial_t id)
44 const char *str = xlookup(key_spec, (unsigned int) id);
55 printstr(tcp, tcp->u_arg[0]);
58 printstr(tcp, tcp->u_arg[1]);
61 printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]);
63 tprintf(", %" PRI_klu ", ", tcp->u_arg[3]);
64 /* keyring serial number */
65 print_keyring_serial_number(tcp->u_arg[4]);
73 printstr(tcp, tcp->u_arg[0]);
76 printstr(tcp, tcp->u_arg[1]);
79 printstr(tcp, tcp->u_arg[2]);
80 /* keyring serial number */
82 print_keyring_serial_number(tcp->u_arg[3]);
88 keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
90 print_keyring_serial_number(id);
91 tprintf(", %d", create);
95 keyctl_update_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
98 print_keyring_serial_number(id);
100 printstrn(tcp, addr, len);
101 tprintf(", %llu", zero_extend_signed_to_ull(len));
105 keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
107 print_keyring_serial_number(id1);
109 print_keyring_serial_number(id2);
113 keyctl_read_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
114 kernel_ulong_t len, bool has_nul)
117 print_keyring_serial_number(id);
123 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
124 ((kernel_ulong_t) tcp->u_rval > len) ? len :
125 (kernel_ulong_t) tcp->u_rval;
126 printstr_ex(tcp, addr, rval, has_nul ?
127 QUOTE_OMIT_TRAILING_0 : 0);
129 tprintf(", %llu", zero_extend_signed_to_ull(len));
134 keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr1,
135 kernel_ulong_t addr2, key_serial_t id2)
137 print_keyring_serial_number(id1);
139 printstr(tcp, addr1);
141 printstr(tcp, addr2);
143 print_keyring_serial_number(id2);
147 keyctl_chown_key(struct tcb *tcp, key_serial_t id, unsigned user,
150 print_keyring_serial_number(id);
151 printuid(", ", user);
152 printuid(", ", group);
156 keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr,
157 kernel_ulong_t len, key_serial_t id2)
159 print_keyring_serial_number(id1);
161 printstrn(tcp, addr, len);
162 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
163 print_keyring_serial_number(id2);
167 keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
168 kernel_ulong_t addr, kernel_ulong_t len,
171 print_keyring_serial_number(id1);
173 tprint_iov(tcp, len, addr, IOV_DECODE_STR);
174 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
175 print_keyring_serial_number(id2);
179 keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
182 print_keyring_serial_number(id1);
183 tprintf(", %u, ", timeout);
184 print_keyring_serial_number(id2);
188 keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
189 unsigned error, key_serial_t id2)
191 const char *err_str = err_name(error);
193 print_keyring_serial_number(id1);
194 tprintf(", %u, ", timeout);
197 tprintf("%s, ", err_str);
199 tprintf("%u, ", error);
201 print_keyring_serial_number(id2);
205 keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
207 print_keyring_serial_number(id);
208 tprintf(", %u", timeout);
212 keyctl_get_persistent(struct tcb *tcp, unsigned uid, key_serial_t id)
216 print_keyring_serial_number(id);
219 #include "xlat/key_perms.h"
222 keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
224 print_keyring_serial_number(id);
226 printflags(key_perms, perm, "KEY_???");
230 print_dh_params(struct tcb *tcp, kernel_ulong_t addr)
232 struct keyctl_dh_params params;
234 if (umove_or_printaddr(tcp, addr, ¶ms))
237 tprints("{private=");
238 print_keyring_serial_number(params.private);
240 print_keyring_serial_number(params.prime);
242 print_keyring_serial_number(params.base);
247 keyctl_dh_compute(struct tcb *tcp, kernel_ulong_t params, kernel_ulong_t buf,
251 print_dh_params(tcp, params);
257 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
258 ((kernel_ulong_t) tcp->u_rval > len) ? len :
259 (kernel_ulong_t) tcp->u_rval;
260 printstrn(tcp, buf, rval);
262 tprintf(", %llu", zero_extend_signed_to_ull(len));
266 #include "xlat/key_reqkeys.h"
267 #include "xlat/keyctl_commands.h"
271 int cmd = tcp->u_arg[0];
272 kernel_ulong_t arg2 = tcp->u_arg[1];
273 kernel_ulong_t arg3 = tcp->u_arg[2];
274 kernel_ulong_t arg4 = tcp->u_arg[3];
275 kernel_ulong_t arg5 = tcp->u_arg[4];
278 printxval(keyctl_commands, cmd, "KEYCTL_???");
281 * For now, KEYCTL_SESSION_TO_PARENT is the only cmd without
284 if (cmd != KEYCTL_SESSION_TO_PARENT)
289 case KEYCTL_GET_KEYRING_ID:
290 keyctl_get_keyring_id(tcp, arg2, arg3);
293 case KEYCTL_JOIN_SESSION_KEYRING:
298 keyctl_update_key(tcp, arg2, arg3, arg4);
303 case KEYCTL_INVALIDATE:
304 case KEYCTL_ASSUME_AUTHORITY:
305 print_keyring_serial_number(arg2);
310 keyctl_handle_key_key(tcp, arg2, arg3);
313 case KEYCTL_DESCRIBE:
315 case KEYCTL_GET_SECURITY:
316 keyctl_read_key(tcp, arg2, arg3, arg4, cmd != KEYCTL_READ);
320 keyctl_keyring_search(tcp, arg2, arg3, arg4, arg5);
324 keyctl_chown_key(tcp, arg2, arg3, arg4);
328 keyctl_setperm_key(tcp, arg2, arg3);
331 case KEYCTL_INSTANTIATE:
332 keyctl_instantiate_key(tcp, arg2, arg3, arg4, arg5);
336 keyctl_negate_key(tcp, arg2, arg3, arg4);
339 case KEYCTL_SET_REQKEY_KEYRING:
340 printxval(key_reqkeys, arg2, "KEY_REQKEY_DEFL_???");
343 case KEYCTL_SET_TIMEOUT:
344 keyctl_set_timeout(tcp, arg2, arg3);
347 case KEYCTL_SESSION_TO_PARENT:
351 keyctl_reject_key(tcp, arg2, arg3, arg4, arg5);
354 case KEYCTL_INSTANTIATE_IOV:
355 keyctl_instantiate_key_iov(tcp, arg2, arg3, arg4, arg5);
358 case KEYCTL_GET_PERSISTENT:
359 keyctl_get_persistent(tcp, arg2, arg3);
362 case KEYCTL_DH_COMPUTE:
363 keyctl_dh_compute(tcp, arg2, arg3, arg4);
367 tprintf("%#" PRI_klx ", %#" PRI_klx
368 ", %#" PRI_klx ", %#" PRI_klx,
369 arg2, arg3, arg4, arg5);