1 /*
2  * Copyright (C) 2017 The Android Open Source Project
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *  * Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  *  * Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in
12  *    the documentation and/or other materials provided with the
13  *    distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <keyutils.h>
30 
31 #include <stdarg.h>
32 #include <sys/syscall.h>
33 #include <unistd.h>
34 
35 // keyctl(2) is deliberately not exposed. Callers should use the typed APIs instead.
36 
add_key(const char * type,const char * description,const void * payload,size_t payload_length,key_serial_t ring_id)37 key_serial_t add_key(const char* type, const char* description, const void* payload,
38                      size_t payload_length, key_serial_t ring_id) {
39   return syscall(__NR_add_key, type, description, payload, payload_length, ring_id);
40 }
41 
keyctl_get_keyring_ID(key_serial_t id,int create)42 key_serial_t keyctl_get_keyring_ID(key_serial_t id, int create) {
43   return syscall(__NR_keyctl, KEYCTL_GET_KEYRING_ID, id, create);
44 }
45 
keyctl_revoke(key_serial_t id)46 long keyctl_revoke(key_serial_t id) {
47   return syscall(__NR_keyctl, KEYCTL_REVOKE, id);
48 }
49 
keyctl_search(key_serial_t ring_id,const char * type,const char * description,key_serial_t dest_ring_id)50 long keyctl_search(key_serial_t ring_id, const char* type, const char* description,
51                    key_serial_t dest_ring_id) {
52   return syscall(__NR_keyctl, KEYCTL_SEARCH, ring_id, type, description, dest_ring_id);
53 }
54 
keyctl_setperm(key_serial_t id,int permissions)55 long keyctl_setperm(key_serial_t id, int permissions) {
56   return syscall(__NR_keyctl, KEYCTL_SETPERM, id, permissions);
57 }
58 
keyctl_unlink(key_serial_t key,key_serial_t keyring)59 long keyctl_unlink(key_serial_t key, key_serial_t keyring) {
60   return syscall(__NR_keyctl, KEYCTL_UNLINK, key, keyring);
61 }
62 
keyctl_restrict_keyring(key_serial_t keyring,const char * type,const char * restriction)63 long keyctl_restrict_keyring(key_serial_t keyring, const char* type, const char* restriction) {
64   return syscall(__NR_keyctl, KEYCTL_RESTRICT_KEYRING, keyring, type, restriction);
65 }
66 
keyctl_get_security(key_serial_t id,char * buffer,size_t buflen)67 long keyctl_get_security(key_serial_t id, char* buffer, size_t buflen) {
68   return syscall(__NR_keyctl, KEYCTL_GET_SECURITY, id, buffer, buflen);
69 }
70