2 * Copyright (c) 2014-2015 Dmitry V. Levin <ldv@altlinux.org>
3 * Copyright (c) 2014-2018 The strace developers.
6 * SPDX-License-Identifier: LGPL-2.1-or-later
11 #include "keyctl_kdf_params.h"
12 #include "print_fields.h"
14 typedef int32_t key_serial_t;
16 #include "xlat/key_spec.h"
18 struct keyctl_dh_params {
25 print_keyring_serial_number(key_serial_t id)
27 printxval_d(key_spec, id, NULL);
33 printstr(tcp, tcp->u_arg[0]);
36 printstr(tcp, tcp->u_arg[1]);
39 printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]);
41 tprintf(", %" PRI_klu ", ", tcp->u_arg[3]);
42 /* keyring serial number */
43 print_keyring_serial_number(tcp->u_arg[4]);
51 printstr(tcp, tcp->u_arg[0]);
54 printstr(tcp, tcp->u_arg[1]);
57 printstr(tcp, tcp->u_arg[2]);
58 /* keyring serial number */
60 print_keyring_serial_number(tcp->u_arg[3]);
66 keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
68 print_keyring_serial_number(id);
69 tprintf(", %d", create);
73 keyctl_update_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
76 print_keyring_serial_number(id);
78 printstrn(tcp, addr, len);
79 tprintf(", %llu", zero_extend_signed_to_ull(len));
83 keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
85 print_keyring_serial_number(id1);
87 print_keyring_serial_number(id2);
91 keyctl_read_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
92 kernel_ulong_t len, bool has_nul)
95 print_keyring_serial_number(id);
101 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
102 ((kernel_ulong_t) tcp->u_rval > len) ? len :
103 (kernel_ulong_t) tcp->u_rval;
104 printstr_ex(tcp, addr, rval, has_nul ?
105 QUOTE_OMIT_TRAILING_0 : 0);
107 tprintf(", %llu", zero_extend_signed_to_ull(len));
112 keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr1,
113 kernel_ulong_t addr2, key_serial_t id2)
115 print_keyring_serial_number(id1);
117 printstr(tcp, addr1);
119 printstr(tcp, addr2);
121 print_keyring_serial_number(id2);
125 keyctl_chown_key(struct tcb *tcp, key_serial_t id, unsigned user,
128 print_keyring_serial_number(id);
129 printuid(", ", user);
130 printuid(", ", group);
134 keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr,
135 kernel_ulong_t len, key_serial_t id2)
137 print_keyring_serial_number(id1);
139 printstrn(tcp, addr, len);
140 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
141 print_keyring_serial_number(id2);
145 keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
146 kernel_ulong_t addr, kernel_ulong_t len,
149 print_keyring_serial_number(id1);
151 tprint_iov(tcp, len, addr, IOV_DECODE_STR);
152 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
153 print_keyring_serial_number(id2);
157 keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
160 print_keyring_serial_number(id1);
161 tprintf(", %u, ", timeout);
162 print_keyring_serial_number(id2);
166 keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
167 unsigned error, key_serial_t id2)
169 print_keyring_serial_number(id1);
170 tprintf(", %u, ", timeout);
171 print_err(error, false);
173 print_keyring_serial_number(id2);
177 keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
179 print_keyring_serial_number(id);
180 tprintf(", %u", timeout);
184 keyctl_get_persistent(struct tcb *tcp, unsigned uid, key_serial_t id)
188 print_keyring_serial_number(id);
191 #include "xlat/key_perms.h"
194 keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
196 print_keyring_serial_number(id);
198 printflags(key_perms, perm, "KEY_???");
202 print_dh_params(struct tcb *tcp, kernel_ulong_t addr)
204 struct keyctl_dh_params params;
206 if (umove_or_printaddr(tcp, addr, ¶ms))
209 tprints("{private=");
210 print_keyring_serial_number(params.private);
212 print_keyring_serial_number(params.prime);
214 print_keyring_serial_number(params.base);
219 keyctl_dh_compute(struct tcb *tcp, kernel_ulong_t params, kernel_ulong_t buf,
220 kernel_ulong_t len, kernel_ulong_t kdf_addr)
223 print_dh_params(tcp, params);
226 struct strace_keyctl_kdf_params kdf;
231 kernel_ulong_t rval = (tcp->u_rval >= 0) &&
232 ((kernel_ulong_t) tcp->u_rval > len) ? len :
233 (kernel_ulong_t) tcp->u_rval;
234 printstrn(tcp, buf, rval);
236 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
238 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) {
243 PRINT_FIELD_STR("{", kdf, hashname, tcp);
246 * Kernel doesn't touch otherinfo
247 * if otherinfolen is zero.
249 if (kdf.otherinfolen)
250 PRINT_FIELD_STRN(", ", kdf, otherinfo,
251 kdf.otherinfolen, tcp);
253 PRINT_FIELD_PTR(", ", kdf, otherinfo);
255 PRINT_FIELD_U(", ", kdf, otherinfolen);
257 /* Some future-proofing */
258 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
263 if (i < ARRAY_SIZE(kdf.__spare)) {
264 tprints(", __spare=[");
266 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
270 tprintf("%#x", kdf.__spare[i]);
282 keyctl_restrict_keyring(struct tcb *const tcp,
283 const key_serial_t id,
284 const kernel_ulong_t addr1,
285 const kernel_ulong_t addr2)
287 print_keyring_serial_number(id);
289 printstr(tcp, addr1);
291 printstr(tcp, addr2);
294 #include "xlat/key_reqkeys.h"
295 #include "xlat/keyctl_commands.h"
299 int cmd = tcp->u_arg[0];
300 kernel_ulong_t arg2 = tcp->u_arg[1];
301 kernel_ulong_t arg3 = tcp->u_arg[2];
302 kernel_ulong_t arg4 = tcp->u_arg[3];
303 kernel_ulong_t arg5 = tcp->u_arg[4];
306 printxval(keyctl_commands, cmd, "KEYCTL_???");
309 * For now, KEYCTL_SESSION_TO_PARENT is the only cmd without
312 if (cmd != KEYCTL_SESSION_TO_PARENT)
317 case KEYCTL_GET_KEYRING_ID:
318 keyctl_get_keyring_id(tcp, arg2, arg3);
321 case KEYCTL_JOIN_SESSION_KEYRING:
326 keyctl_update_key(tcp, arg2, arg3, arg4);
331 case KEYCTL_INVALIDATE:
332 case KEYCTL_ASSUME_AUTHORITY:
333 print_keyring_serial_number(arg2);
338 keyctl_handle_key_key(tcp, arg2, arg3);
341 case KEYCTL_DESCRIBE:
343 case KEYCTL_GET_SECURITY:
344 keyctl_read_key(tcp, arg2, arg3, arg4, cmd != KEYCTL_READ);
348 keyctl_keyring_search(tcp, arg2, arg3, arg4, arg5);
352 keyctl_chown_key(tcp, arg2, arg3, arg4);
356 keyctl_setperm_key(tcp, arg2, arg3);
359 case KEYCTL_INSTANTIATE:
360 keyctl_instantiate_key(tcp, arg2, arg3, arg4, arg5);
364 keyctl_negate_key(tcp, arg2, arg3, arg4);
367 case KEYCTL_SET_REQKEY_KEYRING:
368 printxvals_ex((int) arg2, "KEY_REQKEY_DEFL_???",
369 XLAT_STYLE_FMT_D, key_reqkeys, NULL);
372 case KEYCTL_SET_TIMEOUT:
373 keyctl_set_timeout(tcp, arg2, arg3);
376 case KEYCTL_SESSION_TO_PARENT:
380 keyctl_reject_key(tcp, arg2, arg3, arg4, arg5);
383 case KEYCTL_INSTANTIATE_IOV:
384 keyctl_instantiate_key_iov(tcp, arg2, arg3, arg4, arg5);
387 case KEYCTL_GET_PERSISTENT:
388 keyctl_get_persistent(tcp, arg2, arg3);
391 case KEYCTL_DH_COMPUTE:
392 keyctl_dh_compute(tcp, arg2, arg3, arg4, arg5);
395 case KEYCTL_RESTRICT_KEYRING:
396 keyctl_restrict_keyring(tcp, arg2, arg3, arg4);
400 tprintf("%#" PRI_klx ", %#" PRI_klx
401 ", %#" PRI_klx ", %#" PRI_klx,
402 arg2, arg3, arg4, arg5);