From: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
To: linux-kernel@vger.kernel.org
Cc: Fruhwirth Clemens <clemens@endorphin.org>,
Herbert Xu <herbert@gondor.apana.org.au>,
cryptoapi@lists.logix.cz, James Morris <jmorris@redhat.com>,
David Miller <davem@davemloft.net>, Andrew Morton <akpm@osdl.org>,
Evgeniy Polyakov <johnpol@2ka.mipt.ru>
Subject: [15/many] acrypto: crypto_user.c
Date: Mon, 7 Mar 2005 23:37:35 +0300 [thread overview]
Message-ID: <11102278551109@2ka.mipt.ru> (raw)
In-Reply-To: <1110227855676@2ka.mipt.ru>
--- /tmp/empty/crypto_user.c 1970-01-01 03:00:00.000000000 +0300
+++ ./acrypto/crypto_user.c 2005-03-07 20:35:36.000000000 +0300
@@ -0,0 +1,196 @@
+/*
+ * crypto_user.c
+ *
+ * Copyright (c) 2004 Evgeniy Polyakov <johnpol@2ka.mipt.ru>
+ *
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+#include <linux/kernel.h>
+#include <linux/module.h>
+#include <linux/moduleparam.h>
+#include <linux/types.h>
+#include <linux/list.h>
+#include <linux/slab.h>
+#include <linux/spinlock.h>
+#include <linux/vmalloc.h>
+#include <linux/sched.h>
+#include <linux/mm.h>
+#include <linux/pagemap.h>
+
+#include "acrypto.h"
+#include "crypto_user.h"
+
+static struct scatterlist *crypto_user_alloc_sg(int sg_num)
+{
+ struct scatterlist *sg;
+
+ sg = kmalloc(sg_num * sizeof(*sg), GFP_ATOMIC);
+ if (!sg) {
+ dprintk("Failed to allocate %d scatterlist structures.\n", sg_num);
+ return NULL;
+ }
+
+ memset(sg, 0, sizeof(*sg) * sg_num);
+
+ return sg;
+}
+
+static void crypto_user_free_sg(struct scatterlist *sg)
+{
+ kfree(sg);
+}
+
+int crypto_user_alloc_crypto_data(struct crypto_data *data, int src_size, int dst_size, int key_size, int iv_size)
+{
+ int sg_num;
+
+ if ( (src_size > MAX_DATA_SIZE * PAGE_SIZE) ||
+ (dst_size > MAX_DATA_SIZE * PAGE_SIZE) ||
+ (key_size > MAX_DATA_SIZE * PAGE_SIZE) ||
+ (iv_size > MAX_DATA_SIZE * PAGE_SIZE)) {
+ dprintk("Sizes are too big: src=%u, dst=%u, key=%u, iv=%u, max=%u.\n",
+ src_size, dst_size, key_size, iv_size, MAX_DATA_SIZE);
+ return -EINVAL;
+
+ }
+
+ sg_num = ALIGN_DATA_SIZE(src_size) / PAGE_SIZE;
+ data->sg_src = crypto_user_alloc_sg(sg_num);
+ if (!data->sg_src)
+ goto err_out_exit;
+ data->sg_src_num = sg_num;
+
+ sg_num = ALIGN_DATA_SIZE(dst_size) / PAGE_SIZE;
+ data->sg_dst = crypto_user_alloc_sg(sg_num);
+ if (!data->sg_dst)
+ goto err_out_free_src;
+ data->sg_dst_num = sg_num;
+
+ sg_num = ALIGN_DATA_SIZE(key_size) / PAGE_SIZE;
+ data->sg_key = crypto_user_alloc_sg(sg_num);
+ if (!data->sg_key)
+ goto err_out_free_dst;
+ data->sg_key_num = sg_num;
+
+ sg_num = ALIGN_DATA_SIZE(iv_size) / PAGE_SIZE;
+ data->sg_iv = crypto_user_alloc_sg(sg_num);
+ if (!data->sg_iv)
+ goto err_out_free_key;
+ data->sg_iv_num = sg_num;
+
+ return 0;
+
+err_out_free_key:
+ crypto_user_free_sg(data->sg_key);
+err_out_free_dst:
+ crypto_user_free_sg(data->sg_dst);
+err_out_free_src:
+ crypto_user_free_sg(data->sg_src);
+err_out_exit:
+
+ return -ENOMEM;
+}
+
+void crypto_user_free_crypto_data(struct crypto_data *data)
+{
+ crypto_user_free_sg(data->sg_src);
+ crypto_user_free_sg(data->sg_dst);
+ crypto_user_free_sg(data->sg_key);
+ crypto_user_free_sg(data->sg_iv);
+}
+
+void crypto_user_fill_sg(void *ptr, u16 size, struct scatterlist *sg)
+{
+ int i, sg_num;
+
+ sg_num = ALIGN_DATA_SIZE(size) / PAGE_SIZE;
+
+ dprintk("Filling %d sgs, total size %u: ", sg_num, size);
+
+ for (i=0; i<sg_num; ++i) {
+ sg[i].page = virt_to_page(ptr);
+ if (i == 0) {
+ sg[i].offset = offset_in_page(ptr);
+ sg[i].length = ALIGN_DATA_SIZE((unsigned long)ptr) - (unsigned long)ptr;
+ if (sg[i].length == 0)
+ sg[i].length = PAGE_SIZE;
+ if (sg[i].length > size)
+ sg[i].length = size;
+ } else {
+ sg[i].offset = 0;
+ sg[i].length = (i != sg_num-1)?PAGE_SIZE:size;
+ }
+ dprintka("%x.%x.%p.%lx ", sg[i].offset, sg[i].length, ptr, ALIGN_DATA_SIZE((unsigned long)ptr));
+
+ size -= sg[i].length;
+ ptr += sg[i].length;
+ }
+ dprintka("\n");
+}
+
+struct scatterlist *crypto_user_get_sg(struct crypto_user_data *ud, struct crypto_data *data)
+{
+ struct scatterlist *sg = NULL;
+ int inval = 0;
+
+ switch (ud->data_type) {
+ case CRYPTO_USER_DATA_SRC:
+ sg = data->sg_src;
+ inval = (data->sg_src_num * PAGE_SIZE < ud->data_size);
+ dprintk("Found SRC data type, inval=%d, size=%u.\n", inval, ud->data_size);
+ break;
+ case CRYPTO_USER_DATA_DST:
+ sg = data->sg_dst;
+ inval = (data->sg_dst_num * PAGE_SIZE < ud->data_size);
+ dprintk("Found DST data type, inval=%d, size=%u.\n", inval, ud->data_size);
+ break;
+ case CRYPTO_USER_DATA_KEY:
+ sg = data->sg_key;
+ inval = (data->sg_key_num * PAGE_SIZE < ud->data_size);
+ dprintk("Found KEY data type, inval=%d, size=%u.\n", inval, ud->data_size);
+ break;
+ case CRYPTO_USER_DATA_IV:
+ sg = data->sg_iv;
+ inval = (data->sg_iv_num * PAGE_SIZE < ud->data_size);
+ dprintk("Found IV data type, inval=%d, size=%u.\n", inval, ud->data_size);
+ break;
+ default:
+ dprintk("Unknown data type 0x%x, size=%u.\n", ud->data_type, ud->data_size);
+ break;
+ }
+
+ return (inval)?NULL:sg;
+}
+
+int crypto_user_fill_sg_data(struct crypto_user_data *ud, struct crypto_data *data, void *ptr)
+{
+ struct scatterlist *sg;
+
+ sg = crypto_user_get_sg(ud, data);
+ if (!sg)
+ return -EINVAL;
+
+ crypto_user_fill_sg(ptr, ud->data_size, sg);
+
+ return 0;
+}
+
+EXPORT_SYMBOL_GPL(crypto_user_alloc_crypto_data);
+EXPORT_SYMBOL_GPL(crypto_user_free_crypto_data);
+EXPORT_SYMBOL_GPL(crypto_user_fill_sg);
+EXPORT_SYMBOL_GPL(crypto_user_fill_sg_data);
+EXPORT_SYMBOL_GPL(crypto_user_get_sg);
next prev parent reply other threads:[~2005-03-07 20:38 UTC|newest]
Thread overview: 84+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-03-07 20:37 [0/many] Acrypto - asynchronous crypto layer for linux kernel 2.6 Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] list of files to be sent in a next couple of e-mails with small description Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] acrypto benchmarks vs cryptoloop vs dm_crypt Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] iok.c - simple example of the userspace acrypto usage [IOCTL] Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] ucon_crypto.c - simple example of the userspace acrypto usage [DIRECT ACCESS] Evgeniy Polyakov
2005-03-07 20:37 ` [1/many] acrypto: Kconfig Evgeniy Polyakov
2005-03-07 20:37 ` [2/many] acrypto: Makefile Evgeniy Polyakov
2005-03-07 20:37 ` [3/many] acrypto: acrypto.h Evgeniy Polyakov
2005-03-07 20:37 ` [4/many] acrypto: async_provider.c Evgeniy Polyakov
2005-03-07 20:37 ` [5/many] acrypto: crypto_conn.c Evgeniy Polyakov
2005-03-07 20:37 ` [6/many] acrypto: crypto_conn.h Evgeniy Polyakov
2005-03-07 20:37 ` [7/many] acrypto: crypto_def.h Evgeniy Polyakov
2005-03-07 20:37 ` [8/many] acrypto: crypto_dev.c Evgeniy Polyakov
2005-03-07 20:37 ` [9/many] acrypto: crypto_lb.c Evgeniy Polyakov
2005-03-07 20:37 ` [10/many] acrypto: crypto_lb.h Evgeniy Polyakov
2005-03-07 20:37 ` [11/many] acrypto: crypto_main.c Evgeniy Polyakov
2005-03-07 20:37 ` [12/many] acrypto: crypto_route.h Evgeniy Polyakov
2005-03-07 20:37 ` [13/many] acrypto: crypto_stat.c Evgeniy Polyakov
2005-03-07 20:37 ` [14/many] acrypto: crypto_stat.h Evgeniy Polyakov
2005-03-07 20:37 ` Evgeniy Polyakov [this message]
2005-03-07 20:37 ` [16/many] acrypto: crypto_user.h Evgeniy Polyakov
2005-03-07 20:37 ` [17/many] acrypto: crypto_user_direct.c Evgeniy Polyakov
2005-03-07 20:37 ` [18/many] acrypto: crypto_user_direct.h Evgeniy Polyakov
2005-03-07 20:37 ` [19/many] acrypto: crypto_user_ioctl.c Evgeniy Polyakov
2005-03-07 20:37 ` [20/many] acrypto: crypto_user_ioctl.h Evgeniy Polyakov
2005-03-07 20:37 ` [21/many] acrypto: simple_lb.c Evgeniy Polyakov
2005-03-07 20:37 ` [22/many] arch: alpha config Evgeniy Polyakov
2005-03-07 20:37 ` [23/many] arch: arm config Evgeniy Polyakov
2005-03-07 20:37 ` [24/many] arch: arm26 config Evgeniy Polyakov
2005-03-07 20:37 ` [25/many] arch: cris config Evgeniy Polyakov
2005-03-07 20:37 ` [26/many] arch: frv config Evgeniy Polyakov
2005-03-07 20:37 ` [27/many] arch: h8300 config Evgeniy Polyakov
2005-03-07 20:37 ` [28/many] arch: i386 config Evgeniy Polyakov
2005-03-07 20:37 ` [29/many] arch: ia64 config Evgeniy Polyakov
2005-03-07 20:37 ` [30/many] arch: m32r config Evgeniy Polyakov
2005-03-07 20:37 ` [31/many] arch: m68k config Evgeniy Polyakov
2005-03-07 20:37 ` [32/many] arch: m68knommu config Evgeniy Polyakov
2005-03-07 20:37 ` [33/many] arch: mips config Evgeniy Polyakov
2005-03-07 20:37 ` [34/many] arch: parisc config Evgeniy Polyakov
2005-03-07 20:37 ` [35/many] arch: ppc config Evgeniy Polyakov
2005-03-07 20:37 ` [36/many] arch: ppc64 config Evgeniy Polyakov
2005-03-07 20:37 ` [37/many] arch: s390 config Evgeniy Polyakov
2005-03-07 20:37 ` [38/many] arch: sh config Evgeniy Polyakov
2005-03-07 20:37 ` [39/many] arch: sh64 config Evgeniy Polyakov
2005-03-07 20:37 ` [40/many] arch: sparc config Evgeniy Polyakov
2005-03-07 20:37 ` [41/many] arch: sparc64 config Evgeniy Polyakov
2005-03-07 20:37 ` [42/many] arch: um config Evgeniy Polyakov
2005-03-07 20:37 ` [43/many] arch: v850 config Evgeniy Polyakov
2005-03-07 20:37 ` [44/many] arch: x86_64 config Evgeniy Polyakov
2005-03-07 20:37 ` [1/5] bd: Asynchronous block device Evgeniy Polyakov
2005-03-07 20:37 ` [2/5] bd: userspace utility to control asynchronous " Evgeniy Polyakov
2005-03-07 20:37 ` [4/5] bd: script for binding file and acrypto filters Evgeniy Polyakov
2005-03-07 20:37 ` [5/5] bd: script for unbinding any filters Evgeniy Polyakov
2005-03-08 15:16 ` [1/5] bd: Asynchronous block device Evgeniy Polyakov
2005-03-15 17:27 ` [16/many] acrypto: crypto_user.h Randy.Dunlap
2005-03-15 16:24 ` [11/many] acrypto: crypto_main.c Randy.Dunlap
2005-03-16 4:58 ` Evgeniy Polyakov
2005-03-08 18:02 ` [UPDATE PATCH 9/many] acrypto: crypto_lb.c Nishanth Aravamudan
2005-03-08 18:33 ` Evgeniy Polyakov
2005-03-10 19:18 ` [9/many] " Randy.Dunlap
2005-03-07 22:40 ` [8/many] acrypto: crypto_dev.c Nish Aravamudan
2005-03-07 23:14 ` Evgeniy Polyakov
2005-03-07 22:51 ` Nish Aravamudan
2005-03-07 23:27 ` Evgeniy Polyakov
2005-03-08 1:46 ` [UPDATE PATCH 8/many] " Nishanth Aravamudan
2005-03-08 9:40 ` Evgeniy Polyakov
2005-03-07 23:37 ` [8/many] " Randy.Dunlap
2005-03-08 0:05 ` Evgeniy Polyakov
2005-03-07 23:50 ` [3/many] acrypto: acrypto.h Randy.Dunlap
2005-03-08 0:34 ` Evgeniy Polyakov
2005-03-07 23:33 ` [1/many] acrypto: Kconfig Randy.Dunlap
2005-03-08 0:03 ` Evgeniy Polyakov
2005-03-07 21:13 ` [0/many] Acrypto - asynchronous crypto layer for linux kernel 2.6 Fruhwirth Clemens
2005-03-07 21:49 ` Evgeniy Polyakov
2005-03-08 13:24 ` Joshua Jackson
2005-03-10 10:27 ` Evgeniy Polyakov
2005-03-08 5:08 ` Kyle Moffett
2005-03-08 9:37 ` Evgeniy Polyakov
2005-03-08 12:22 ` Kyle Moffett
2005-03-08 13:07 ` Evgeniy Polyakov
2005-03-08 14:46 ` Kyle Moffett
2005-03-08 15:24 ` Evgeniy Polyakov
2005-03-10 12:42 ` Christophe Saout
2005-03-08 10:30 ` Herbert Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=11102278551109@2ka.mipt.ru \
--to=johnpol@2ka.mipt.ru \
--cc=akpm@osdl.org \
--cc=clemens@endorphin.org \
--cc=cryptoapi@lists.logix.cz \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=jmorris@redhat.com \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox