[??/many] iok.c - simple example of the userspace acrypto usage [IOCTL]

From: Evgeniy Polyakov
Date: Mon Mar 07 2005 - 21:33:36 EST



#include <sys/types.h>
#include <sys/stat.h>
#include <sys/ioctl.h>

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <fcntl.h>
#include <errno.h>

#include <linux/types.h>

#include "crypto_user.h"
#include "crypto_user_ioctl.h"
#include "crypto_def.h"

#define ulog(f, a...) fprintf(stderr, f, ##a)

int session_add(int fd, void *ptr)
{
int err;

err = ioctl(fd, CRYPTO_SESSION_ADD, ptr);
if (err == -1)
{
ulog("Failed to do CRYPTO_SESSION_ADD: %s [%d].\n", strerror(errno), errno);
return -1;
}

ulog("CRYPTO_SESSION_ADD finished.\n");

return 0;
}
int session_alloc(int fd, struct crypto_user_ioctl *io)
{
int err;

err = ioctl(fd, CRYPTO_SESSION_ALLOC, io);
if (err == -1)
{
ulog("Failed to do CRYPTO_SESSION_ALLOC: %s [%d].\n", strerror(errno), errno);
return -1;
}

ulog("CRYPTO_SESSION_ALLOC finished.\n");

return 0;
}

int fill_data(int fd, unsigned short size, unsigned short type, void *ptr)
{
int err;
struct crypto_user_data *d;
void *data;

data = malloc(size + sizeof(*d));
if (!data)
{
ulog("Failed to allocate %d bytes for CRYPTO_FILL_DATA[%u.%x].\n",
size + sizeof(*d), size, type);
return -ENOMEM;
}

d = (struct crypto_user_data *)data;

d->data_size = size;
d->data_type = type;

memcpy(d+1, ptr, size);

err = ioctl(fd, CRYPTO_FILL_DATA, d);
if (err == -1)
{
ulog("Failed to do CRYPTO_FILL_DATA[%u.%x]: %s [%d].\n",
size, type, strerror(errno), errno);
free(data);
return -1;
}
free(data);

ulog("CRYPTO_FILL_DATA[%u.%x] finished.\n", size, type);

return 0;
}

static void dump_data(unsigned char *ptr, int size)
{
int i;

ulog("IOK DATA: ");
for (i=0; i<size; ++i)
ulog("%02x ", ptr[i]);
ulog("\n");
}

int main(int argc, char *argv[])
{
int fd, err, size;
void *ptr;
unsigned char key[16];
struct crypto_user_ioctl io;

if (argc != 2)
{
ulog("Usage: %s path\n", argv[0]);
return -1;
}

fd = open(argv[1], O_RDWR);
if (fd == -1)
{
ulog("Failed to open file %s: %s [%d].\n", argv[1], strerror(errno), errno);
return -1;
}

size = 2048;

io.operation = CRYPTO_OP_ENCRYPT;
io.type = CRYPTO_TYPE_AES_128;
io.mode = CRYPTO_MODE_ECB;
io.priority = 0;

io.src_size = size;
io.dst_size = size;
io.key_size = 16;
io.iv_size = 0;

err = session_alloc(fd, &io);
if (err)
goto err_out_close_fd;

ptr = malloc(size);
if (!ptr)
{
ulog("Failed to create data.\n");
goto err_out_close_fd;
}
memset(ptr, 0, size);

memset(key, 0, sizeof(key));

err = fill_data(fd, size, CRYPTO_USER_DATA_SRC, ptr);
if (err)
goto err_out_free_ptr;
err = fill_data(fd, size, CRYPTO_USER_DATA_DST, ptr);
if (err)
goto err_out_free_ptr;
err = fill_data(fd, 16, CRYPTO_USER_DATA_KEY, key);
if (err)
goto err_out_free_ptr;

dump_data(ptr, size);

err = session_add(fd, ptr);
if (err)
goto err_out_free_ptr;

dump_data(ptr, size);

err_out_free_ptr:
free(ptr);

err_out_close_fd:
close(fd);

return err;
}

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/