From: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
To: linux-kernel@vger.kernel.org
Cc: Fruhwirth Clemens <clemens@endorphin.org>,
Herbert Xu <herbert@gondor.apana.org.au>,
cryptoapi@lists.logix.cz, James Morris <jmorris@redhat.com>,
David Miller <davem@davemloft.net>, Andrew Morton <akpm@osdl.org>,
Evgeniy Polyakov <johnpol@2ka.mipt.ru>
Subject: [19/many] acrypto: crypto_user_ioctl.c
Date: Mon, 7 Mar 2005 23:37:35 +0300 [thread overview]
Message-ID: <1110227855445@2ka.mipt.ru> (raw)
In-Reply-To: <11102278553597@2ka.mipt.ru>
--- /tmp/empty/crypto_user_ioctl.c 1970-01-01 03:00:00.000000000 +0300
+++ ./acrypto/crypto_user_ioctl.c 2005-03-07 20:35:36.000000000 +0300
@@ -0,0 +1,281 @@
+/*
+ * crypto_user_ioctl.c
+ *
+ * Copyright (c) 2004 Evgeniy Polyakov <johnpol@2ka.mipt.ru>
+ *
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+#include <linux/kernel.h>
+#include <linux/module.h>
+#include <linux/moduleparam.h>
+#include <linux/types.h>
+#include <linux/list.h>
+#include <linux/slab.h>
+#include <linux/spinlock.h>
+#include <linux/string.h>
+#include <linux/fs.h>
+
+#include <asm/uaccess.h>
+
+#include "acrypto.h"
+#include "crypto_user.h"
+#include "crypto_user_ioctl.h"
+
+static int crypto_user_ioctl_ioctl(struct inode *inode, struct file *fp, unsigned int cmd, unsigned long arg);
+static int crypto_user_ioctl_open(struct inode *inode, struct file *fp);
+static int crypto_user_ioctl_release(struct inode *pinode, struct file *fp);
+int crypto_user_ioctl_init(void);
+void crypto_user_ioctl_fini(void);
+
+static int crypto_user_ioctl_major = 0;
+static char crypto_user_ioctl_name[] = "crypto_user_ioctl";
+
+static struct file_operations crypto_user_ioctl_ops = {
+ .open crypto_user_ioctl_open,
+ .release crypto_user_ioctl_release,
+ .ioctl crypto_user_ioctl_ioctl,
+ .owner THIS_MODULE
+};
+
+static void dump_data(u8 *ptr)
+{
+ int i;
+
+ dprintk("USER DATA: ");
+ for (i=0; i<32; ++i)
+ dprintka("%02x ", ptr[i]);
+ dprintka("\n");
+}
+
+static int crypto_user_ioctl_open(struct inode *inode, struct file *fp)
+{
+ struct crypto_user_ioctl_kern *iok;
+
+ iok = kmalloc(sizeof(*iok), GFP_KERNEL);
+ if (!iok) {
+ dprintk("Failed to allocate new crypto_user_ioctl_kern structure.\n");
+ return -ENOMEM;
+ }
+ memset(iok, 0, sizeof(*iok));
+
+ fp->private_data = iok;
+
+ return 0;
+}
+
+static int crypto_user_ioctl_release(struct inode *pinode, struct file *fp)
+{
+ struct crypto_user_ioctl_kern *iok = fp->private_data;
+ int i;
+
+ for (i=0; i<4; ++i)
+ if (iok->ptr[i])
+ kfree(iok->ptr[i]);
+ kfree(iok);
+
+ return 0;
+}
+
+static void crypto_user_ioctl_callback(struct crypto_session_initializer *ci, struct crypto_data *data)
+{
+ struct crypto_user_ioctl_kern *iok = data->priv;
+
+ dprintk("%s() for session %llu [%llu].\n",
+ __func__, iok->s->ci.id, iok->s->ci.dev_id);
+
+ crypto_user_free_crypto_data(&iok->data);
+
+ iok->scompleted = 1;
+ wake_up_interruptible(&iok->wait);
+}
+
+static int crypto_user_ioctl_session_alloc(struct crypto_user_ioctl *io, struct crypto_user_ioctl_kern *iok)
+{
+ int err;
+
+ err = crypto_user_alloc_crypto_data(&iok->data, io->src_size, io->dst_size, io->key_size, io->iv_size);
+ if (err)
+ return err;
+
+ iok->ci.operation = io->operation;
+ iok->ci.type = io->type;
+ iok->ci.mode = io->mode;
+ iok->ci.priority = io->priority;
+ iok->ci.callback = crypto_user_ioctl_callback;
+
+ iok->data.priv = iok;
+ iok->data.priv_size = 0;
+
+ iok->scompleted = 0;
+
+ init_waitqueue_head(&iok->wait);
+
+ iok->s = crypto_session_create(&iok->ci, &iok->data);
+ if (!iok->s) {
+ crypto_user_free_crypto_data(&iok->data);
+ return -ENODEV;
+ }
+
+ return 0;
+}
+
+static int crypto_user_ioctl_session_add(struct crypto_user_ioctl_kern *iok)
+{
+ crypto_session_add(iok->s);
+
+ return 0;
+}
+
+static int crypto_user_ioctl_ioctl(struct inode *inode, struct file *fp, unsigned int cmd, unsigned long arg)
+{
+ struct crypto_user_ioctl io;
+ struct crypto_user_data data;
+ unsigned long not_read;
+ int err;
+ struct crypto_user_ioctl_kern *iok;
+
+ iok = fp->private_data;
+
+ err = 0;
+ switch (cmd) {
+ case CRYPTO_SESSION_ALLOC:
+ not_read = copy_from_user(&io, (void __user *)arg, sizeof(io));
+ if (not_read) {
+ dprintk("Failed to read crypto_user_ioctl structure from userspace.\n");
+ err = -EINVAL;
+ break;
+ }
+
+ err = crypto_user_ioctl_session_alloc(&io, iok);
+ break;
+ case CRYPTO_FILL_DATA:
+ not_read = copy_from_user(&data, (void __user *)arg, sizeof(data));
+ if (not_read) {
+ dprintk("Failed to read crypto_user_ioctl_data structure from userspace.\n");
+ err = -EINVAL;
+ break;
+ }
+
+ if (data.data_size > MAX_DATA_SIZE * PAGE_SIZE) {
+ dprintk("Data size is too bit: size=%u, type=%x.\n",
+ data.data_size, data.data_type);
+ err = -EINVAL;
+ break;
+ }
+
+ if (!crypto_user_get_sg(&data, &iok->data)) {
+ dprintk("Invalid crypto_user_data structure [size=%u, type=%x].\n",
+ data.data_size, data.data_type);
+ err = -EINVAL;
+ break;
+ }
+
+ if (iok->ptr[data.data_type])
+ kfree(iok->ptr[data.data_type]);
+
+ iok->ptr[data.data_type] = kmalloc(data.data_size, GFP_KERNEL);
+ if (!iok->ptr[data.data_type]) {
+ dprintk("Failed to allocate %d bytes for data type %d.\n",
+ data.data_size, data.data_type);
+ err = -ENOMEM;
+ break;
+ }
+
+ not_read = copy_from_user(iok->ptr[data.data_type], (void __user *)arg + sizeof(data), data.data_size);
+ if (not_read) {
+ dprintk("Failed to read %d bytes of crypto data [type=%d] from userspace.\n",
+ data.data_size, data.data_type);
+ kfree(iok->ptr[data.data_type]);
+ err = -EINVAL;
+ break;
+ }
+
+ memcpy(&iok->usr[data.data_type], &data, sizeof(struct crypto_user_data));
+
+ err = crypto_user_fill_sg_data(&data, &iok->data, iok->ptr[data.data_type]);
+ if (err) {
+ kfree(iok->ptr[data.data_type]);
+ break;
+ }
+ break;
+ case CRYPTO_SESSION_ADD:
+ if (!iok->s) {
+ dprintk("CRYPTO_SESSION_ADD must be called after session initialisation.\n");
+ err = -EINVAL;
+ break;
+ }
+
+ err = crypto_user_ioctl_session_add(iok);
+ if (err)
+ break;
+
+ wait_event_interruptible(iok->wait, iok->scompleted);
+
+ dump_data(iok->ptr[CRYPTO_USER_DATA_DST]);
+
+ not_read = copy_to_user((void __user *)arg, iok->ptr[CRYPTO_USER_DATA_DST], iok->usr[CRYPTO_USER_DATA_DST].data_size);
+ if (not_read) {
+ dprintk("Failed to copy to user %d bytes of result.\n", iok->usr[CRYPTO_USER_DATA_DST].data_size);
+ err = -EINVAL;
+ break;
+ }
+ break;
+
+ default:
+ dprintk("Invalid ioctl(0x%x).\n", cmd);
+ err = -ENODEV;
+ break;
+ }
+
+ return err;
+}
+
+static ssize_t crypto_user_ioctl_dev_show(struct class_device *dev, char *buf)
+{
+ return sprintf(buf, "%u:%u\n", crypto_user_ioctl_major, 0);
+}
+
+extern struct crypto_device main_crypto_device;
+static CLASS_DEVICE_ATTR(dev, 0644, crypto_user_ioctl_dev_show, NULL);
+
+int crypto_user_ioctl_init(void)
+{
+ struct crypto_device *dev = &main_crypto_device;
+ int err;
+
+ crypto_user_ioctl_major = register_chrdev(0, crypto_user_ioctl_name, &crypto_user_ioctl_ops);
+ if (crypto_user_ioctl_major < 0) {
+ dprintk("Failed to register %s char device: err=%d.\n", crypto_user_ioctl_name, crypto_user_ioctl_major);
+ return -ENODEV;
+ };
+
+ err = class_device_create_file(&dev->class_device, &class_device_attr_dev);
+ if (err)
+ dprintk("Failed to create \"dev\" attribute: err=%d.\n", err);
+
+ printk("Asynchronous crypto userspace helper(ioctl based) has been started, major=%d.\n", crypto_user_ioctl_major);
+
+ return 0;
+}
+
+void crypto_user_ioctl_fini(void)
+{
+ struct crypto_device *dev = &main_crypto_device;
+
+ class_device_remove_file(&dev->class_device, &class_device_attr_dev);
+ unregister_chrdev(crypto_user_ioctl_major, crypto_user_ioctl_name);
+}
next prev parent reply other threads:[~2005-03-08 2:43 UTC|newest]
Thread overview: 84+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-03-07 20:37 [0/many] Acrypto - asynchronous crypto layer for linux kernel 2.6 Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] list of files to be sent in a next couple of e-mails with small description Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] acrypto benchmarks vs cryptoloop vs dm_crypt Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] iok.c - simple example of the userspace acrypto usage [IOCTL] Evgeniy Polyakov
2005-03-07 20:37 ` [??/many] ucon_crypto.c - simple example of the userspace acrypto usage [DIRECT ACCESS] Evgeniy Polyakov
2005-03-07 20:37 ` [1/many] acrypto: Kconfig Evgeniy Polyakov
2005-03-07 20:37 ` [2/many] acrypto: Makefile Evgeniy Polyakov
2005-03-07 20:37 ` [3/many] acrypto: acrypto.h Evgeniy Polyakov
2005-03-07 20:37 ` [4/many] acrypto: async_provider.c Evgeniy Polyakov
2005-03-07 20:37 ` [5/many] acrypto: crypto_conn.c Evgeniy Polyakov
2005-03-07 20:37 ` [6/many] acrypto: crypto_conn.h Evgeniy Polyakov
2005-03-07 20:37 ` [7/many] acrypto: crypto_def.h Evgeniy Polyakov
2005-03-07 20:37 ` [8/many] acrypto: crypto_dev.c Evgeniy Polyakov
2005-03-07 20:37 ` [9/many] acrypto: crypto_lb.c Evgeniy Polyakov
2005-03-07 20:37 ` [10/many] acrypto: crypto_lb.h Evgeniy Polyakov
2005-03-07 20:37 ` [11/many] acrypto: crypto_main.c Evgeniy Polyakov
2005-03-07 20:37 ` [12/many] acrypto: crypto_route.h Evgeniy Polyakov
2005-03-07 20:37 ` [13/many] acrypto: crypto_stat.c Evgeniy Polyakov
2005-03-07 20:37 ` [14/many] acrypto: crypto_stat.h Evgeniy Polyakov
2005-03-07 20:37 ` [15/many] acrypto: crypto_user.c Evgeniy Polyakov
2005-03-07 20:37 ` [16/many] acrypto: crypto_user.h Evgeniy Polyakov
2005-03-07 20:37 ` [17/many] acrypto: crypto_user_direct.c Evgeniy Polyakov
2005-03-07 20:37 ` [18/many] acrypto: crypto_user_direct.h Evgeniy Polyakov
2005-03-07 20:37 ` Evgeniy Polyakov [this message]
2005-03-07 20:37 ` [20/many] acrypto: crypto_user_ioctl.h Evgeniy Polyakov
2005-03-07 20:37 ` [21/many] acrypto: simple_lb.c Evgeniy Polyakov
2005-03-07 20:37 ` [22/many] arch: alpha config Evgeniy Polyakov
2005-03-07 20:37 ` [23/many] arch: arm config Evgeniy Polyakov
2005-03-07 20:37 ` [24/many] arch: arm26 config Evgeniy Polyakov
2005-03-07 20:37 ` [25/many] arch: cris config Evgeniy Polyakov
2005-03-07 20:37 ` [26/many] arch: frv config Evgeniy Polyakov
2005-03-07 20:37 ` [27/many] arch: h8300 config Evgeniy Polyakov
2005-03-07 20:37 ` [28/many] arch: i386 config Evgeniy Polyakov
2005-03-07 20:37 ` [29/many] arch: ia64 config Evgeniy Polyakov
2005-03-07 20:37 ` [30/many] arch: m32r config Evgeniy Polyakov
2005-03-07 20:37 ` [31/many] arch: m68k config Evgeniy Polyakov
2005-03-07 20:37 ` [32/many] arch: m68knommu config Evgeniy Polyakov
2005-03-07 20:37 ` [33/many] arch: mips config Evgeniy Polyakov
2005-03-07 20:37 ` [34/many] arch: parisc config Evgeniy Polyakov
2005-03-07 20:37 ` [35/many] arch: ppc config Evgeniy Polyakov
2005-03-07 20:37 ` [36/many] arch: ppc64 config Evgeniy Polyakov
2005-03-07 20:37 ` [37/many] arch: s390 config Evgeniy Polyakov
2005-03-07 20:37 ` [38/many] arch: sh config Evgeniy Polyakov
2005-03-07 20:37 ` [39/many] arch: sh64 config Evgeniy Polyakov
2005-03-07 20:37 ` [40/many] arch: sparc config Evgeniy Polyakov
2005-03-07 20:37 ` [41/many] arch: sparc64 config Evgeniy Polyakov
2005-03-07 20:37 ` [42/many] arch: um config Evgeniy Polyakov
2005-03-07 20:37 ` [43/many] arch: v850 config Evgeniy Polyakov
2005-03-07 20:37 ` [44/many] arch: x86_64 config Evgeniy Polyakov
2005-03-07 20:37 ` [1/5] bd: Asynchronous block device Evgeniy Polyakov
2005-03-07 20:37 ` [2/5] bd: userspace utility to control asynchronous " Evgeniy Polyakov
2005-03-07 20:37 ` [4/5] bd: script for binding file and acrypto filters Evgeniy Polyakov
2005-03-07 20:37 ` [5/5] bd: script for unbinding any filters Evgeniy Polyakov
2005-03-08 15:16 ` [1/5] bd: Asynchronous block device Evgeniy Polyakov
2005-03-15 17:27 ` [16/many] acrypto: crypto_user.h Randy.Dunlap
2005-03-15 16:24 ` [11/many] acrypto: crypto_main.c Randy.Dunlap
2005-03-16 4:58 ` Evgeniy Polyakov
2005-03-08 18:02 ` [UPDATE PATCH 9/many] acrypto: crypto_lb.c Nishanth Aravamudan
2005-03-08 18:33 ` Evgeniy Polyakov
2005-03-10 19:18 ` [9/many] " Randy.Dunlap
2005-03-07 22:40 ` [8/many] acrypto: crypto_dev.c Nish Aravamudan
2005-03-07 23:14 ` Evgeniy Polyakov
2005-03-07 22:51 ` Nish Aravamudan
2005-03-07 23:27 ` Evgeniy Polyakov
2005-03-08 1:46 ` [UPDATE PATCH 8/many] " Nishanth Aravamudan
2005-03-08 9:40 ` Evgeniy Polyakov
2005-03-07 23:37 ` [8/many] " Randy.Dunlap
2005-03-08 0:05 ` Evgeniy Polyakov
2005-03-07 23:50 ` [3/many] acrypto: acrypto.h Randy.Dunlap
2005-03-08 0:34 ` Evgeniy Polyakov
2005-03-07 23:33 ` [1/many] acrypto: Kconfig Randy.Dunlap
2005-03-08 0:03 ` Evgeniy Polyakov
2005-03-07 21:13 ` [0/many] Acrypto - asynchronous crypto layer for linux kernel 2.6 Fruhwirth Clemens
2005-03-07 21:49 ` Evgeniy Polyakov
2005-03-08 13:24 ` Joshua Jackson
2005-03-10 10:27 ` Evgeniy Polyakov
2005-03-08 5:08 ` Kyle Moffett
2005-03-08 9:37 ` Evgeniy Polyakov
2005-03-08 12:22 ` Kyle Moffett
2005-03-08 13:07 ` Evgeniy Polyakov
2005-03-08 14:46 ` Kyle Moffett
2005-03-08 15:24 ` Evgeniy Polyakov
2005-03-10 12:42 ` Christophe Saout
2005-03-08 10:30 ` Herbert Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1110227855445@2ka.mipt.ru \
--to=johnpol@2ka.mipt.ru \
--cc=akpm@osdl.org \
--cc=clemens@endorphin.org \
--cc=cryptoapi@lists.logix.cz \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=jmorris@redhat.com \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox