* configure.ac (AC_CHECK_TYPES): Add struct crypto_report_*.
* netlink_crypto.c (decode_crypto_report_generic,
decode_crypto_report_hash, decode_crypto_report_blkcipher,
decode_crypto_report_aead, decode_crypto_report_rng,
decode_crypto_report_cipher): New functions.
(crypto_user_alg_nla_decoders): New array.
(decode_crypto_user_alg): Use it.
* xlat/crypto_nl_attrs.in: New file.
* NEWS: Mention this.
---
 NEWS                    |   2 +
 configure.ac            |   8 +++
 netlink_crypto.c        | 164 ++++++++++++++++++++++++++++++++++++++++++++++++
 xlat/crypto_nl_attrs.in |  12 ++++
 4 files changed, 186 insertions(+)
 create mode 100644 xlat/crypto_nl_attrs.in

diff --git a/NEWS b/NEWS
index 9592753..ad237e2 100644
--- a/NEWS
+++ b/NEWS
@@ -19,6 +19,8 @@ Noteworthy changes in release ?.?? (????-??-??)
   * Implemented decoding of netlink message ack flags.
   * Implemented decoding of nlmsgerr netlink attributes.
   * Implemented basic protocol specific decoding of NETLINK_CRYPTO.
+  * Implemented decoding of crypto_user_alg netlink attributes
+    of NETLINK_CRYPTO.
   * Updated lists of BPF_*, KEY_*, RWF_*, SCM_*, SO_*, and *_MAGIC constants.
   * Added decoding of arch_prctl syscall on x86.
 
diff --git a/configure.ac b/configure.ac
index 4f5bc02..0d407af 100644
--- a/configure.ac
+++ b/configure.ac
@@ -320,6 +320,14 @@ AC_CHECK_TYPES(m4_normalize([
 [#include <sys/types.h>
 #include <linux/fcntl.h>])
 
+AC_CHECK_TYPES(m4_normalize([
+       struct crypto_report_aead,
+       struct crypto_report_blkcipher,
+       struct crypto_report_cipher,
+       struct crypto_report_hash,
+       struct crypto_report_rng
+]),,, [#include <linux/cryptouser.h>])
+
 AC_CHECK_MEMBERS([struct timex.tai],,, [#include <sys/timex.h>])
 
 AC_CHECK_MEMBERS([struct utsname.domainname],,, [#include <sys/utsname.h>])
diff --git a/netlink_crypto.c b/netlink_crypto.c
index cc573ff..6debc1b 100644
--- a/netlink_crypto.c
+++ b/netlink_crypto.c
@@ -36,6 +36,160 @@
 
 # include <linux/cryptouser.h>
 
+# include "xlat/crypto_nl_attrs.h"
+
+static bool
+decode_crypto_report_generic(struct tcb *const tcp,
+                            const kernel_ulong_t addr,
+                            const unsigned int len,
+                            const void *const opaque_data)
+{
+       tprints("{type=");
+       printstr_ex(tcp, addr, len, QUOTE_0_TERMINATED);
+       tprints("}");
+
+       return true;
+}
+
+static bool
+decode_crypto_report_hash(struct tcb *const tcp,
+                         const kernel_ulong_t addr,
+                         const unsigned int len,
+                         const void *const opaque_data)
+{
+# ifdef HAVE_STRUCT_CRYPTO_REPORT_HASH
+       struct crypto_report_hash rhash;
+
+       if (len < sizeof(rhash))
+               printstrn(tcp, addr, len);
+       else if (!umove_or_printaddr(tcp, addr, &rhash)) {
+               PRINT_FIELD_CSTRING("{", rhash, type);
+               PRINT_FIELD_U(", ", rhash, blocksize);
+               PRINT_FIELD_U(", ", rhash, digestsize);
+               tprints("}");
+       }
+# else
+       printstrn(tcp, addr, len);
+# endif
+
+       return true;
+}
+
+static bool
+decode_crypto_report_blkcipher(struct tcb *const tcp,
+                              const kernel_ulong_t addr,
+                              const unsigned int len,
+                              const void *const opaque_data)
+{
+# ifdef HAVE_STRUCT_CRYPTO_REPORT_BLKCIPHER
+       struct crypto_report_blkcipher rblkcipher;
+
+       if (len < sizeof(rblkcipher))
+               printstrn(tcp, addr, len);
+       else if (!umove_or_printaddr(tcp, addr, &rblkcipher)) {
+               PRINT_FIELD_CSTRING("{", rblkcipher, type);
+               PRINT_FIELD_CSTRING(", ", rblkcipher, geniv);
+               PRINT_FIELD_U(", ", rblkcipher, blocksize);
+               PRINT_FIELD_U(", ", rblkcipher, min_keysize);
+               PRINT_FIELD_U(", ", rblkcipher, max_keysize);
+               PRINT_FIELD_U(", ", rblkcipher, ivsize);
+               tprints("}");
+       }
+# else
+       printstrn(tcp, addr, len);
+# endif
+
+       return true;
+}
+
+static bool
+decode_crypto_report_aead(struct tcb *const tcp,
+                         const kernel_ulong_t addr,
+                         const unsigned int len,
+                         const void *const opaque_data)
+{
+# ifdef HAVE_STRUCT_CRYPTO_REPORT_AEAD
+       struct crypto_report_aead raead;
+
+       if (len < sizeof(raead))
+               printstrn(tcp, addr, len);
+       else if (!umove_or_printaddr(tcp, addr, &raead)) {
+               PRINT_FIELD_CSTRING("{", raead, type);
+               PRINT_FIELD_CSTRING(", ", raead, geniv);
+               PRINT_FIELD_U(", ", raead, blocksize);
+               PRINT_FIELD_U(", ", raead, maxauthsize);
+               PRINT_FIELD_U(", ", raead, ivsize);
+               tprints("}");
+       }
+# else
+       printstrn(tcp, addr, len);
+# endif
+
+       return true;
+}
+
+static bool
+decode_crypto_report_rng(struct tcb *const tcp,
+                        const kernel_ulong_t addr,
+                        const unsigned int len,
+                        const void *const opaque_data)
+{
+# ifdef HAVE_STRUCT_CRYPTO_REPORT_RNG
+       struct crypto_report_rng rrng;
+
+       if (len < sizeof(rrng))
+               printstrn(tcp, addr, len);
+       else if (!umove_or_printaddr(tcp, addr, &rrng)) {
+               PRINT_FIELD_CSTRING("{", rrng, type);
+               PRINT_FIELD_U(", ", rrng, seedsize);
+               tprints("}");
+       }
+# else
+       printstrn(tcp, addr, len);
+# endif
+
+       return true;
+}
+
+static bool
+decode_crypto_report_cipher(struct tcb *const tcp,
+                           const kernel_ulong_t addr,
+                           const unsigned int len,
+                           const void *const opaque_data)
+{
+# ifdef HAVE_STRUCT_CRYPTO_REPORT_CIPHER
+       struct crypto_report_cipher rcipher;
+
+       if (len < sizeof(rcipher))
+               printstrn(tcp, addr, len);
+       else if (!umove_or_printaddr(tcp, addr, &rcipher)) {
+               PRINT_FIELD_CSTRING("{", rcipher, type);
+               PRINT_FIELD_U(", ", rcipher, blocksize);
+               PRINT_FIELD_U(", ", rcipher, min_keysize);
+               PRINT_FIELD_U(", ", rcipher, max_keysize);
+               tprints("}");
+       }
+# else
+       printstrn(tcp, addr, len);
+# endif
+
+       return true;
+}
+
+static const nla_decoder_t crypto_user_alg_nla_decoders[] = {
+       [CRYPTOCFGA_PRIORITY_VAL]       = decode_nla_u32,
+       [CRYPTOCFGA_REPORT_LARVAL]      = decode_crypto_report_generic,
+       [CRYPTOCFGA_REPORT_HASH]        = decode_crypto_report_hash,
+       [CRYPTOCFGA_REPORT_BLKCIPHER]   = decode_crypto_report_blkcipher,
+       [CRYPTOCFGA_REPORT_AEAD]        = decode_crypto_report_aead,
+       [CRYPTOCFGA_REPORT_COMPRESS]    = decode_crypto_report_generic,
+       [CRYPTOCFGA_REPORT_RNG]         = decode_crypto_report_rng,
+       [CRYPTOCFGA_REPORT_CIPHER]      = decode_crypto_report_cipher,
+       [CRYPTOCFGA_REPORT_AKCIPHER]    = decode_crypto_report_generic,
+       [CRYPTOCFGA_REPORT_KPP]         = decode_crypto_report_generic,
+       [CRYPTOCFGA_REPORT_ACOMP]       = decode_crypto_report_generic
+};
+
 static void
 decode_crypto_user_alg(struct tcb *const tcp,
                       const kernel_ulong_t addr,
@@ -54,6 +208,16 @@ decode_crypto_user_alg(struct tcb *const tcp,
                PRINT_FIELD_U(", ", alg, cru_refcnt);
                PRINT_FIELD_X(", ", alg, cru_flags);
                tprints("}");
+
+               const size_t offset = NLMSG_ALIGN(sizeof(alg));
+               if (len > offset) {
+                       tprints(", ");
+                       decode_nlattr(tcp, addr + offset, len - offset,
+                                     crypto_nl_attrs, "CRYPTOCFGA_???",
+                                     crypto_user_alg_nla_decoders,
+                                     ARRAY_SIZE(crypto_user_alg_nla_decoders),
+                                     NULL);
+               }
        }
 }
 
diff --git a/xlat/crypto_nl_attrs.in b/xlat/crypto_nl_attrs.in
new file mode 100644
index 0000000..02b3662
--- /dev/null
+++ b/xlat/crypto_nl_attrs.in
@@ -0,0 +1,12 @@
+CRYPTOCFGA_UNSPEC              0
+CRYPTOCFGA_PRIORITY_VAL                1
+CRYPTOCFGA_REPORT_LARVAL       2
+CRYPTOCFGA_REPORT_HASH         3
+CRYPTOCFGA_REPORT_BLKCIPHER    4
+CRYPTOCFGA_REPORT_AEAD         5
+CRYPTOCFGA_REPORT_COMPRESS     6
+CRYPTOCFGA_REPORT_RNG          7
+CRYPTOCFGA_REPORT_CIPHER       8
+CRYPTOCFGA_REPORT_AKCIPHER     9
+CRYPTOCFGA_REPORT_KPP          10
+CRYPTOCFGA_REPORT_ACOMP                11
-- 
2.7.4


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Strace-devel mailing list
Strace-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/strace-devel

Reply via email to