/*
 * Copyright (c) 2017 JingPiao Chen <chenjingpiao@gmail.com>
 * Copyright (c) 2017-2021 The strace developers.
 * All rights reserved.
 *
 * SPDX-License-Identifier: LGPL-2.1-or-later
 */

#include "defs.h"

#include "netlink.h"
#include "nlattr.h"

#include <linux/cryptouser.h>

#include "xlat/crypto_nl_attrs.h"


static bool
decode_crypto_report_generic(struct tcb *const tcp,
			     const kernel_ulong_t addr,
			     const unsigned int len,
			     const void *const opaque_data)
{
	tprint_struct_begin();
	tprints_field_name("type");
	printstr_ex(tcp, addr, len, QUOTE_0_TERMINATED);
	tprint_struct_end();

	return true;
}

static bool
decode_crypto_report_hash(struct tcb *const tcp,
			  const kernel_ulong_t addr,
			  const unsigned int len,
			  const void *const opaque_data)
{
	struct crypto_report_hash rhash;

	if (len < sizeof(rhash))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &rhash)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(rhash, type);
		tprint_struct_next();
		PRINT_FIELD_U(rhash, blocksize);
		tprint_struct_next();
		PRINT_FIELD_U(rhash, digestsize);
		tprint_struct_end();
	}

	return true;
}

static bool
decode_crypto_report_blkcipher(struct tcb *const tcp,
			       const kernel_ulong_t addr,
			       const unsigned int len,
			       const void *const opaque_data)
{
	struct crypto_report_blkcipher rblkcipher;

	if (len < sizeof(rblkcipher))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &rblkcipher)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(rblkcipher, type);
		tprint_struct_next();
		PRINT_FIELD_CSTRING(rblkcipher, geniv);
		tprint_struct_next();
		PRINT_FIELD_U(rblkcipher, blocksize);
		tprint_struct_next();
		PRINT_FIELD_U(rblkcipher, min_keysize);
		tprint_struct_next();
		PRINT_FIELD_U(rblkcipher, max_keysize);
		tprint_struct_next();
		PRINT_FIELD_U(rblkcipher, ivsize);
		tprint_struct_end();
	}

	return true;
}

static bool
decode_crypto_report_aead(struct tcb *const tcp,
			  const kernel_ulong_t addr,
			  const unsigned int len,
			  const void *const opaque_data)
{
	struct crypto_report_aead raead;

	if (len < sizeof(raead))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &raead)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(raead, type);
		tprint_struct_next();
		PRINT_FIELD_CSTRING(raead, geniv);
		tprint_struct_next();
		PRINT_FIELD_U(raead, blocksize);
		tprint_struct_next();
		PRINT_FIELD_U(raead, maxauthsize);
		tprint_struct_next();
		PRINT_FIELD_U(raead, ivsize);
		tprint_struct_end();
	}

	return true;
}

static bool
decode_crypto_report_rng(struct tcb *const tcp,
			 const kernel_ulong_t addr,
			 const unsigned int len,
			 const void *const opaque_data)
{
	struct crypto_report_rng rrng;

	if (len < sizeof(rrng))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &rrng)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(rrng, type);
		tprint_struct_next();
		PRINT_FIELD_U(rrng, seedsize);
		tprint_struct_end();
	}

	return true;
}

static bool
decode_crypto_report_cipher(struct tcb *const tcp,
			    const kernel_ulong_t addr,
			    const unsigned int len,
			    const void *const opaque_data)
{
	struct crypto_report_cipher rcipher;

	if (len < sizeof(rcipher))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &rcipher)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(rcipher, type);
		tprint_struct_next();
		PRINT_FIELD_U(rcipher, blocksize);
		tprint_struct_next();
		PRINT_FIELD_U(rcipher, min_keysize);
		tprint_struct_next();
		PRINT_FIELD_U(rcipher, max_keysize);
		tprint_struct_end();
	}

	return true;
}

static const nla_decoder_t crypto_user_alg_nla_decoders[] = {
	[CRYPTOCFGA_PRIORITY_VAL]	= decode_nla_u32,
	[CRYPTOCFGA_REPORT_LARVAL]	= decode_crypto_report_generic,
	[CRYPTOCFGA_REPORT_HASH]	= decode_crypto_report_hash,
	[CRYPTOCFGA_REPORT_BLKCIPHER]	= decode_crypto_report_blkcipher,
	[CRYPTOCFGA_REPORT_AEAD]	= decode_crypto_report_aead,
	[CRYPTOCFGA_REPORT_COMPRESS]	= decode_crypto_report_generic,
	[CRYPTOCFGA_REPORT_RNG]		= decode_crypto_report_rng,
	[CRYPTOCFGA_REPORT_CIPHER]	= decode_crypto_report_cipher,
	[CRYPTOCFGA_REPORT_AKCIPHER]	= decode_crypto_report_generic,
	[CRYPTOCFGA_REPORT_KPP]		= decode_crypto_report_generic,
	[CRYPTOCFGA_REPORT_ACOMP]	= decode_crypto_report_generic
};

static void
decode_crypto_user_alg(struct tcb *const tcp,
		       const kernel_ulong_t addr,
		       const unsigned int len)
{
	struct crypto_user_alg alg;

	if (len < sizeof(alg))
		printstrn(tcp, addr, len);
	else if (!umove_or_printaddr(tcp, addr, &alg)) {
		tprint_struct_begin();
		PRINT_FIELD_CSTRING(alg, cru_name);
		tprint_struct_next();
		PRINT_FIELD_CSTRING(alg, cru_driver_name);
		tprint_struct_next();
		PRINT_FIELD_CSTRING(alg, cru_module_name);
		tprint_struct_next();
		PRINT_FIELD_X(alg, cru_type);
		tprint_struct_next();
		PRINT_FIELD_X(alg, cru_mask);
		tprint_struct_next();
		PRINT_FIELD_U(alg, cru_refcnt);
		tprint_struct_next();
		PRINT_FIELD_X(alg, cru_flags);
		tprint_struct_end();

		const size_t offset = NLMSG_ALIGN(sizeof(alg));
		if (len > offset) {
			tprint_array_next();
			decode_nlattr(tcp, addr + offset, len - offset,
				      crypto_nl_attrs, "CRYPTOCFGA_???",
				      crypto_user_alg_nla_decoders,
				      ARRAY_SIZE(crypto_user_alg_nla_decoders),
				      NULL);
		}
	}
}

bool
decode_netlink_crypto(struct tcb *const tcp,
		      const struct nlmsghdr *const nlmsghdr,
		      const kernel_ulong_t addr,
		      const unsigned int len)
{
	switch (nlmsghdr->nlmsg_type) {
	case CRYPTO_MSG_NEWALG:
	case CRYPTO_MSG_DELALG:
	case CRYPTO_MSG_UPDATEALG:
	case CRYPTO_MSG_GETALG:
		decode_crypto_user_alg(tcp, addr, len);
		break;
	default:
		return false;
	}

	return true;
}