strace/netlink_crypto.c
JingPiao Chen e4b90f7bbf netlink: decode NETLINK_CRYPTO crypto_user_alg netlink attributes
* configure.ac (AC_CHECK_TYPES): Check for crypto_report_aead,
crypto_report_blkcipher, crypto_report_cipher, crypto_report_hash,
and crypto_report_rng structures in <linux/cryptouser.h>.
* netlink_crypto.c (decode_crypto_report_generic,
decode_crypto_report_hash, decode_crypto_report_blkcipher,
decode_crypto_report_aead, decode_crypto_report_rng,
decode_crypto_report_cipher): New functions.
(crypto_user_alg_nla_decoders): New array.
(decode_crypto_user_alg): Use it.
* xlat/crypto_nl_attrs.in: New file.
* NEWS: Mention this.
2017-07-24 11:18:43 +00:00

245 lines
6.9 KiB
C

/*
* Copyright (c) 2017 JingPiao Chen <chenjingpiao@gmail.com>
* Copyright (c) 2017 The strace developers.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "defs.h"
#ifdef HAVE_LINUX_CRYPTOUSER_H
# include "netlink.h"
# include "nlattr.h"
# include "print_fields.h"
# include <linux/cryptouser.h>
# include "xlat/crypto_nl_attrs.h"
static bool
decode_crypto_report_generic(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
tprints("{type=");
printstr_ex(tcp, addr, len, QUOTE_0_TERMINATED);
tprints("}");
return true;
}
static bool
decode_crypto_report_hash(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
# ifdef HAVE_STRUCT_CRYPTO_REPORT_HASH
struct crypto_report_hash rhash;
if (len < sizeof(rhash))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &rhash)) {
PRINT_FIELD_CSTRING("{", rhash, type);
PRINT_FIELD_U(", ", rhash, blocksize);
PRINT_FIELD_U(", ", rhash, digestsize);
tprints("}");
}
# else
printstrn(tcp, addr, len);
# endif
return true;
}
static bool
decode_crypto_report_blkcipher(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
# ifdef HAVE_STRUCT_CRYPTO_REPORT_BLKCIPHER
struct crypto_report_blkcipher rblkcipher;
if (len < sizeof(rblkcipher))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &rblkcipher)) {
PRINT_FIELD_CSTRING("{", rblkcipher, type);
PRINT_FIELD_CSTRING(", ", rblkcipher, geniv);
PRINT_FIELD_U(", ", rblkcipher, blocksize);
PRINT_FIELD_U(", ", rblkcipher, min_keysize);
PRINT_FIELD_U(", ", rblkcipher, max_keysize);
PRINT_FIELD_U(", ", rblkcipher, ivsize);
tprints("}");
}
# else
printstrn(tcp, addr, len);
# endif
return true;
}
static bool
decode_crypto_report_aead(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
# ifdef HAVE_STRUCT_CRYPTO_REPORT_AEAD
struct crypto_report_aead raead;
if (len < sizeof(raead))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &raead)) {
PRINT_FIELD_CSTRING("{", raead, type);
PRINT_FIELD_CSTRING(", ", raead, geniv);
PRINT_FIELD_U(", ", raead, blocksize);
PRINT_FIELD_U(", ", raead, maxauthsize);
PRINT_FIELD_U(", ", raead, ivsize);
tprints("}");
}
# else
printstrn(tcp, addr, len);
# endif
return true;
}
static bool
decode_crypto_report_rng(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
# ifdef HAVE_STRUCT_CRYPTO_REPORT_RNG
struct crypto_report_rng rrng;
if (len < sizeof(rrng))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &rrng)) {
PRINT_FIELD_CSTRING("{", rrng, type);
PRINT_FIELD_U(", ", rrng, seedsize);
tprints("}");
}
# else
printstrn(tcp, addr, len);
# endif
return true;
}
static bool
decode_crypto_report_cipher(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len,
const void *const opaque_data)
{
# ifdef HAVE_STRUCT_CRYPTO_REPORT_CIPHER
struct crypto_report_cipher rcipher;
if (len < sizeof(rcipher))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &rcipher)) {
PRINT_FIELD_CSTRING("{", rcipher, type);
PRINT_FIELD_U(", ", rcipher, blocksize);
PRINT_FIELD_U(", ", rcipher, min_keysize);
PRINT_FIELD_U(", ", rcipher, max_keysize);
tprints("}");
}
# else
printstrn(tcp, addr, len);
# endif
return true;
}
static const nla_decoder_t crypto_user_alg_nla_decoders[] = {
[CRYPTOCFGA_PRIORITY_VAL] = decode_nla_u32,
[CRYPTOCFGA_REPORT_LARVAL] = decode_crypto_report_generic,
[CRYPTOCFGA_REPORT_HASH] = decode_crypto_report_hash,
[CRYPTOCFGA_REPORT_BLKCIPHER] = decode_crypto_report_blkcipher,
[CRYPTOCFGA_REPORT_AEAD] = decode_crypto_report_aead,
[CRYPTOCFGA_REPORT_COMPRESS] = decode_crypto_report_generic,
[CRYPTOCFGA_REPORT_RNG] = decode_crypto_report_rng,
[CRYPTOCFGA_REPORT_CIPHER] = decode_crypto_report_cipher,
[CRYPTOCFGA_REPORT_AKCIPHER] = decode_crypto_report_generic,
[CRYPTOCFGA_REPORT_KPP] = decode_crypto_report_generic,
[CRYPTOCFGA_REPORT_ACOMP] = decode_crypto_report_generic
};
static void
decode_crypto_user_alg(struct tcb *const tcp,
const kernel_ulong_t addr,
const unsigned int len)
{
struct crypto_user_alg alg;
if (len < sizeof(alg))
printstrn(tcp, addr, len);
else if (!umove_or_printaddr(tcp, addr, &alg)) {
PRINT_FIELD_CSTRING("{", alg, cru_name);
PRINT_FIELD_CSTRING(", ", alg, cru_driver_name);
PRINT_FIELD_CSTRING(", ", alg, cru_module_name);
PRINT_FIELD_X(", ", alg, cru_type);
PRINT_FIELD_X(", ", alg, cru_mask);
PRINT_FIELD_U(", ", alg, cru_refcnt);
PRINT_FIELD_X(", ", alg, cru_flags);
tprints("}");
const size_t offset = NLMSG_ALIGN(sizeof(alg));
if (len > offset) {
tprints(", ");
decode_nlattr(tcp, addr + offset, len - offset,
crypto_nl_attrs, "CRYPTOCFGA_???",
crypto_user_alg_nla_decoders,
ARRAY_SIZE(crypto_user_alg_nla_decoders),
NULL);
}
}
}
bool
decode_netlink_crypto(struct tcb *const tcp,
const struct nlmsghdr *const nlmsghdr,
const kernel_ulong_t addr,
const unsigned int len)
{
switch (nlmsghdr->nlmsg_type) {
case CRYPTO_MSG_NEWALG:
case CRYPTO_MSG_DELALG:
case CRYPTO_MSG_UPDATEALG:
case CRYPTO_MSG_GETALG:
decode_crypto_user_alg(tcp, addr, len);
break;
default:
return false;
}
return true;
}
#endif /* HAVE_LINUX_CRYPTOUSER_H */