| /* key-ui.h: key userspace interface stuff |
| * |
| * Copyright (C) 2004 Red Hat, Inc. All Rights Reserved. |
| * Written by David Howells (dhowells@redhat.com) |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * as published by the Free Software Foundation; either version |
| * 2 of the License, or (at your option) any later version. |
| */ |
| |
| #ifndef _LINUX_KEY_UI_H |
| #define _LINUX_KEY_UI_H |
| |
| #include <linux/key.h> |
| |
| /* the key tree */ |
| extern struct rb_root key_serial_tree; |
| extern spinlock_t key_serial_lock; |
| |
| /* required permissions */ |
| #define KEY_VIEW 0x01 /* require permission to view attributes */ |
| #define KEY_READ 0x02 /* require permission to read content */ |
| #define KEY_WRITE 0x04 /* require permission to update / modify */ |
| #define KEY_SEARCH 0x08 /* require permission to search (keyring) or find (key) */ |
| #define KEY_LINK 0x10 /* require permission to link */ |
| #define KEY_ALL 0x1f /* all the above permissions */ |
| |
| /* |
| * the keyring payload contains a list of the keys to which the keyring is |
| * subscribed |
| */ |
| struct keyring_list { |
| struct rcu_head rcu; /* RCU deletion hook */ |
| unsigned short maxkeys; /* max keys this list can hold */ |
| unsigned short nkeys; /* number of keys currently held */ |
| unsigned short delkey; /* key to be unlinked by RCU */ |
| struct key *keys[0]; |
| }; |
| |
| |
| /* |
| * check to see whether permission is granted to use a key in the desired way |
| */ |
| static inline int key_permission(const key_ref_t key_ref, key_perm_t perm) |
| { |
| struct key *key = key_ref_to_ptr(key_ref); |
| key_perm_t kperm; |
| |
| if (is_key_possessed(key_ref)) |
| kperm = key->perm >> 24; |
| else if (key->uid == current->fsuid) |
| kperm = key->perm >> 16; |
| else if (key->gid != -1 && |
| key->perm & KEY_GRP_ALL && |
| in_group_p(key->gid) |
| ) |
| kperm = key->perm >> 8; |
| else |
| kperm = key->perm; |
| |
| kperm = kperm & perm & KEY_ALL; |
| |
| return kperm == perm; |
| } |
| |
| /* |
| * check to see whether permission is granted to use a key in at least one of |
| * the desired ways |
| */ |
| static inline int key_any_permission(const key_ref_t key_ref, key_perm_t perm) |
| { |
| struct key *key = key_ref_to_ptr(key_ref); |
| key_perm_t kperm; |
| |
| if (is_key_possessed(key_ref)) |
| kperm = key->perm >> 24; |
| else if (key->uid == current->fsuid) |
| kperm = key->perm >> 16; |
| else if (key->gid != -1 && |
| key->perm & KEY_GRP_ALL && |
| in_group_p(key->gid) |
| ) |
| kperm = key->perm >> 8; |
| else |
| kperm = key->perm; |
| |
| kperm = kperm & perm & KEY_ALL; |
| |
| return kperm != 0; |
| } |
| |
| static inline int key_task_groups_search(struct task_struct *tsk, gid_t gid) |
| { |
| int ret; |
| |
| task_lock(tsk); |
| ret = groups_search(tsk->group_info, gid); |
| task_unlock(tsk); |
| return ret; |
| } |
| |
| static inline int key_task_permission(const key_ref_t key_ref, |
| struct task_struct *context, |
| key_perm_t perm) |
| { |
| struct key *key = key_ref_to_ptr(key_ref); |
| key_perm_t kperm; |
| |
| if (is_key_possessed(key_ref)) { |
| kperm = key->perm >> 24; |
| } |
| else if (key->uid == context->fsuid) { |
| kperm = key->perm >> 16; |
| } |
| else if (key->gid != -1 && |
| key->perm & KEY_GRP_ALL && ( |
| key->gid == context->fsgid || |
| key_task_groups_search(context, key->gid) |
| ) |
| ) { |
| kperm = key->perm >> 8; |
| } |
| else { |
| kperm = key->perm; |
| } |
| |
| kperm = kperm & perm & KEY_ALL; |
| |
| return kperm == perm; |
| |
| } |
| |
| extern key_ref_t lookup_user_key(struct task_struct *context, |
| key_serial_t id, int create, int partial, |
| key_perm_t perm); |
| |
| extern long join_session_keyring(const char *name); |
| |
| extern struct key_type *key_type_lookup(const char *type); |
| extern void key_type_put(struct key_type *ktype); |
| |
| #define key_negative_timeout 60 /* default timeout on a negative key's existence */ |
| |
| |
| #endif /* _LINUX_KEY_UI_H */ |