Dmitry V. Levin
38a34c9349
Before this change, all files that exist since 20th century had copyright headers, while most files that appeared later didn't. This change fixes the inconsistency by adding missing copyright headers. It doesn't mean that copyright headers became maintained. In my view, git history provides much better information on this subject and is much more accurate than copyright headers.
310 lines
7.3 KiB
C
310 lines
7.3 KiB
C
/*
|
|
* Copyright (c) 2014-2015 Dmitry V. Levin <ldv@altlinux.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "defs.h"
|
|
|
|
typedef int32_t key_serial_t;
|
|
|
|
#include "xlat/key_spec.h"
|
|
|
|
static void
|
|
print_keyring_serial_number(key_serial_t id)
|
|
{
|
|
const char *str = xlookup(key_spec, id);
|
|
|
|
if (str)
|
|
tprints(str);
|
|
else
|
|
tprintf("%d", id);
|
|
}
|
|
|
|
SYS_FUNC(add_key)
|
|
{
|
|
/* type */
|
|
printstr(tcp, tcp->u_arg[0], -1);
|
|
/* description */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
/* payload */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[2], tcp->u_arg[3]);
|
|
/* payload length */
|
|
tprintf(", %lu, ", tcp->u_arg[3]);
|
|
/* keyring serial number */
|
|
print_keyring_serial_number(tcp->u_arg[4]);
|
|
|
|
return RVAL_DECODED;
|
|
}
|
|
|
|
SYS_FUNC(request_key)
|
|
{
|
|
/* type */
|
|
printstr(tcp, tcp->u_arg[0], -1);
|
|
/* description */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
/* callout_info */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[2], -1);
|
|
/* keyring serial number */
|
|
tprints(", ");
|
|
print_keyring_serial_number(tcp->u_arg[3]);
|
|
|
|
return RVAL_DECODED;
|
|
}
|
|
|
|
static void
|
|
keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %d", create);
|
|
}
|
|
|
|
static void
|
|
keyctl_update_key(struct tcb *tcp, key_serial_t id, long addr, long len)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
printstr(tcp, addr, len);
|
|
tprintf(", %lu", len);
|
|
}
|
|
|
|
static void
|
|
keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_read_key(struct tcb *tcp, key_serial_t id, long addr, long len)
|
|
{
|
|
if (entering(tcp)) {
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
} else {
|
|
if (syserror(tcp))
|
|
printaddr(addr);
|
|
else {
|
|
long rval = tcp->u_rval > len ?
|
|
len : (tcp->u_rval ? -1 : 0);
|
|
printstr(tcp, addr, rval);
|
|
}
|
|
tprintf(", %lu", len);
|
|
}
|
|
}
|
|
|
|
static void
|
|
keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, long addr1,
|
|
long addr2, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
printstr(tcp, addr1, -1);
|
|
tprints(", ");
|
|
printstr(tcp, addr2, -1);
|
|
tprints(", ");
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_chown_key(struct tcb *tcp, key_serial_t id, int user, int group)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %d, %d", user, group);
|
|
}
|
|
|
|
static void
|
|
keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, long addr,
|
|
long len, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
printstr(tcp, addr, len);
|
|
tprintf(", %lu, ", len);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
|
|
long addr, long len, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
tprint_iov(tcp, len, addr, 1);
|
|
tprintf(", %lu, ", len);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
|
|
key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprintf(", %u, ", timeout);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
|
|
unsigned error, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprintf(", %u, %u, ", timeout, error);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %u", timeout);
|
|
}
|
|
|
|
static void
|
|
keyctl_get_persistent(struct tcb *tcp, int uid, key_serial_t id)
|
|
{
|
|
tprintf("%d, ", uid);
|
|
print_keyring_serial_number(id);
|
|
}
|
|
|
|
#include "xlat/key_perms.h"
|
|
|
|
static void
|
|
keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
printflags(key_perms, perm, "KEY_???");
|
|
}
|
|
|
|
#include "xlat/key_reqkeys.h"
|
|
#include "xlat/keyctl_commands.h"
|
|
|
|
SYS_FUNC(keyctl)
|
|
{
|
|
int cmd = tcp->u_arg[0];
|
|
|
|
if (entering(tcp)) {
|
|
printxval(keyctl_commands, cmd, "KEYCTL_???");
|
|
tprints(", ");
|
|
}
|
|
|
|
switch (cmd) {
|
|
case KEYCTL_GET_KEYRING_ID:
|
|
keyctl_get_keyring_id(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_JOIN_SESSION_KEYRING:
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
break;
|
|
|
|
case KEYCTL_UPDATE:
|
|
keyctl_update_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_REVOKE:
|
|
case KEYCTL_CLEAR:
|
|
case KEYCTL_INVALIDATE:
|
|
case KEYCTL_ASSUME_AUTHORITY:
|
|
print_keyring_serial_number(tcp->u_arg[1]);
|
|
break;
|
|
|
|
case KEYCTL_LINK:
|
|
case KEYCTL_UNLINK:
|
|
keyctl_handle_key_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_DESCRIBE:
|
|
case KEYCTL_READ:
|
|
case KEYCTL_GET_SECURITY:
|
|
keyctl_read_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
return 0;
|
|
|
|
case KEYCTL_SEARCH:
|
|
keyctl_keyring_search(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_CHOWN:
|
|
keyctl_chown_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_SETPERM:
|
|
keyctl_setperm_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_INSTANTIATE:
|
|
keyctl_instantiate_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_NEGATE:
|
|
keyctl_negate_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_SET_REQKEY_KEYRING:
|
|
printxval(key_reqkeys, tcp->u_arg[1], "KEY_REQKEY_DEFL_???");
|
|
break;
|
|
|
|
case KEYCTL_SET_TIMEOUT:
|
|
keyctl_set_timeout(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_SESSION_TO_PARENT:
|
|
break;
|
|
|
|
case KEYCTL_REJECT:
|
|
keyctl_reject_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_INSTANTIATE_IOV:
|
|
keyctl_instantiate_key_iov(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3],
|
|
tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_GET_PERSISTENT:
|
|
keyctl_get_persistent(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
default:
|
|
tprintf("%#lx, %#lx, %#lx, %#lx",
|
|
tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
}
|
|
|
|
return RVAL_DECODED;
|
|
}
|