2 * Copyright (c) 2014-2015 Dmitry V. Levin <ldv@altlinux.org>
3 * Copyright (c) 2014-2017 The strace developers.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 #include "keyctl_kdf_params.h"
32 #include "print_fields.h"
34 typedef int32_t key_serial_t;
36 #include "xlat/key_spec.h"
38 struct keyctl_dh_params {
45 print_keyring_serial_number(key_serial_t id)
47 const char *str = xlookup(key_spec, (unsigned int) id);
58 printstr(tcp, tcp->u_arg[0]);
61 printstr(tcp, tcp->u_arg[1]);
64 printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]);
66 tprintf(", %" PRI_klu ", ", tcp->u_arg[3]);
67 /* keyring serial number */
68 print_keyring_serial_number(tcp->u_arg[4]);
76 printstr(tcp, tcp->u_arg[0]);
79 printstr(tcp, tcp->u_arg[1]);
82 printstr(tcp, tcp->u_arg[2]);
83 /* keyring serial number */
85 print_keyring_serial_number(tcp->u_arg[3]);
91 keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
93 print_keyring_serial_number(id);
94 tprintf(", %d", create);
98 keyctl_update_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
101 print_keyring_serial_number(id);
103 printstrn(tcp, addr, len);
104 tprintf(", %llu", zero_extend_signed_to_ull(len));
108 keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
110 print_keyring_serial_number(id1);
112 print_keyring_serial_number(id2);
116 keyctl_read_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
117 kernel_ulong_t len, bool has_nul)
120 print_keyring_serial_number(id);
126 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
127 ((kernel_ulong_t) tcp->u_rval > len) ? len :
128 (kernel_ulong_t) tcp->u_rval;
129 printstr_ex(tcp, addr, rval, has_nul ?
130 QUOTE_OMIT_TRAILING_0 : 0);
132 tprintf(", %llu", zero_extend_signed_to_ull(len));
137 keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr1,
138 kernel_ulong_t addr2, key_serial_t id2)
140 print_keyring_serial_number(id1);
142 printstr(tcp, addr1);
144 printstr(tcp, addr2);
146 print_keyring_serial_number(id2);
150 keyctl_chown_key(struct tcb *tcp, key_serial_t id, unsigned user,
153 print_keyring_serial_number(id);
154 printuid(", ", user);
155 printuid(", ", group);
159 keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr,
160 kernel_ulong_t len, key_serial_t id2)
162 print_keyring_serial_number(id1);
164 printstrn(tcp, addr, len);
165 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
166 print_keyring_serial_number(id2);
170 keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
171 kernel_ulong_t addr, kernel_ulong_t len,
174 print_keyring_serial_number(id1);
176 tprint_iov(tcp, len, addr, IOV_DECODE_STR);
177 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
178 print_keyring_serial_number(id2);
182 keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
185 print_keyring_serial_number(id1);
186 tprintf(", %u, ", timeout);
187 print_keyring_serial_number(id2);
191 keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
192 unsigned error, key_serial_t id2)
194 const char *err_str = err_name(error);
196 print_keyring_serial_number(id1);
197 tprintf(", %u, ", timeout);
200 tprintf("%s, ", err_str);
202 tprintf("%u, ", error);
204 print_keyring_serial_number(id2);
208 keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
210 print_keyring_serial_number(id);
211 tprintf(", %u", timeout);
215 keyctl_get_persistent(struct tcb *tcp, unsigned uid, key_serial_t id)
219 print_keyring_serial_number(id);
222 #include "xlat/key_perms.h"
225 keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
227 print_keyring_serial_number(id);
229 printflags(key_perms, perm, "KEY_???");
233 print_dh_params(struct tcb *tcp, kernel_ulong_t addr)
235 struct keyctl_dh_params params;
237 if (umove_or_printaddr(tcp, addr, ¶ms))
240 tprints("{private=");
241 print_keyring_serial_number(params.private);
243 print_keyring_serial_number(params.prime);
245 print_keyring_serial_number(params.base);
250 keyctl_dh_compute(struct tcb *tcp, kernel_ulong_t params, kernel_ulong_t buf,
251 kernel_ulong_t len, kernel_ulong_t kdf_addr)
254 print_dh_params(tcp, params);
257 struct strace_keyctl_kdf_params kdf;
262 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
263 ((kernel_ulong_t) tcp->u_rval > len) ? len :
264 (kernel_ulong_t) tcp->u_rval;
265 printstrn(tcp, buf, rval);
267 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
269 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) {
274 PRINT_FIELD_STR("{", kdf, hashname, tcp);
277 * Kernel doesn't touch otherinfo
278 * if otherinfolen is zero.
280 if (kdf.otherinfolen)
281 PRINT_FIELD_STRN(", ", kdf, otherinfo,
282 kdf.otherinfolen, tcp);
284 PRINT_FIELD_PTR(", ", kdf, otherinfo);
286 PRINT_FIELD_U(", ", kdf, otherinfolen);
288 /* Some future-proofing */
289 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
294 if (i < ARRAY_SIZE(kdf.__spare)) {
295 tprints(", __spare=[");
297 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
301 tprintf("%#x", kdf.__spare[i]);
313 keyctl_restrict_keyring(struct tcb *const tcp,
314 const key_serial_t id,
315 const kernel_ulong_t addr1,
316 const kernel_ulong_t addr2)
318 print_keyring_serial_number(id);
320 printstr(tcp, addr1);
322 printstr(tcp, addr2);
325 #include "xlat/key_reqkeys.h"
326 #include "xlat/keyctl_commands.h"
330 int cmd = tcp->u_arg[0];
331 kernel_ulong_t arg2 = tcp->u_arg[1];
332 kernel_ulong_t arg3 = tcp->u_arg[2];
333 kernel_ulong_t arg4 = tcp->u_arg[3];
334 kernel_ulong_t arg5 = tcp->u_arg[4];
337 printxval(keyctl_commands, cmd, "KEYCTL_???");
340 * For now, KEYCTL_SESSION_TO_PARENT is the only cmd without
343 if (cmd != KEYCTL_SESSION_TO_PARENT)
348 case KEYCTL_GET_KEYRING_ID:
349 keyctl_get_keyring_id(tcp, arg2, arg3);
352 case KEYCTL_JOIN_SESSION_KEYRING:
357 keyctl_update_key(tcp, arg2, arg3, arg4);
362 case KEYCTL_INVALIDATE:
363 case KEYCTL_ASSUME_AUTHORITY:
364 print_keyring_serial_number(arg2);
369 keyctl_handle_key_key(tcp, arg2, arg3);
372 case KEYCTL_DESCRIBE:
374 case KEYCTL_GET_SECURITY:
375 keyctl_read_key(tcp, arg2, arg3, arg4, cmd != KEYCTL_READ);
379 keyctl_keyring_search(tcp, arg2, arg3, arg4, arg5);
383 keyctl_chown_key(tcp, arg2, arg3, arg4);
387 keyctl_setperm_key(tcp, arg2, arg3);
390 case KEYCTL_INSTANTIATE:
391 keyctl_instantiate_key(tcp, arg2, arg3, arg4, arg5);
395 keyctl_negate_key(tcp, arg2, arg3, arg4);
398 case KEYCTL_SET_REQKEY_KEYRING:
399 printxval(key_reqkeys, arg2, "KEY_REQKEY_DEFL_???");
402 case KEYCTL_SET_TIMEOUT:
403 keyctl_set_timeout(tcp, arg2, arg3);
406 case KEYCTL_SESSION_TO_PARENT:
410 keyctl_reject_key(tcp, arg2, arg3, arg4, arg5);
413 case KEYCTL_INSTANTIATE_IOV:
414 keyctl_instantiate_key_iov(tcp, arg2, arg3, arg4, arg5);
417 case KEYCTL_GET_PERSISTENT:
418 keyctl_get_persistent(tcp, arg2, arg3);
421 case KEYCTL_DH_COMPUTE:
422 keyctl_dh_compute(tcp, arg2, arg3, arg4, arg5);
425 case KEYCTL_RESTRICT_KEYRING:
426 keyctl_restrict_keyring(tcp, arg2, arg3, arg4);
430 tprintf("%#" PRI_klx ", %#" PRI_klx
431 ", %#" PRI_klx ", %#" PRI_klx,
432 arg2, arg3, arg4, arg5);