From patchwork Thu Jan 11 19:56:57 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Corentin LABBE X-Patchwork-Id: 10158449 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 0A0F060170 for ; Thu, 11 Jan 2018 20:01:42 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id F05B928842 for ; Thu, 11 Jan 2018 20:01:41 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id E399F28845; Thu, 11 Jan 2018 20:01:41 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_HI autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B5AAC28842 for ; Thu, 11 Jan 2018 20:01:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935779AbeAKUB1 (ORCPT ); Thu, 11 Jan 2018 15:01:27 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:44101 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934583AbeAKUBC (ORCPT ); Thu, 11 Jan 2018 15:01:02 -0500 Received: by mail-wm0-f68.google.com with SMTP id t8so7808686wmc.3 for ; Thu, 11 Jan 2018 12:01:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=baylibre-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=F9NSndm0yOf7/xy6dZx5m4Wl8gqql0PaUStPw82lc1Y=; b=RlUmUQIpsHLkDBgRPi7HhNkgn1+CYSrye0Ey9ZwPIOc0dbt2K7T9fJEmvbac7hydRm L2ZY42Db+wP1Mmn1NcL5pd6qBPj2HmYuuaX8ngRClP1EiFBlXkxzNLFVq33y4sluB8TT zb6T8AKuj8yZaO4+xJFIjSUKrTo3ctDgIlfRfGO6G0W/YYpmcci/mVVB1hxzOpiGh5kH +buPz10F2Q2OVCAlCyywISFdZhyIRaPGGYrBIUnKgulHTh6xfjSll63Rz/UGeDc1mso7 tk/LErBZ0F4XzKOI8VthZWKCvdjPymzGHDD98Uf/12PZ8bdI90WmO0pV4hzLPsF81Dw3 wd0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=F9NSndm0yOf7/xy6dZx5m4Wl8gqql0PaUStPw82lc1Y=; b=t4beLCB5o/p8ud/y5hd5g8+Rm4ojgB0tRMekaIiab4qU7zpjqXT8iJpA4yN7IuQwFf M0Q0oGaadMFMb6omSPr7LOUd7jBCMOJWBM0iuxhfZIu8luzX/4Ukcp3DScGgGzVYwE7s R7ABgOHUry1vUi69kHosueMcoWb7bD24O2nBr81dYUGIjruj1BDu5ZU1Ci8m4qK4i8zz 5GN94RTOPV4HcrJr7/6g0Fc8GszQ8rjCRZ9kaoJdDEC3LYoctE4yX7ZmLLeg9sDVwt5m SrZCqrjUshFmr2BF/Gdy0bxI3KkZYHOIOycdwvmyuMFRFzdrvo3Msm5W730lf+6nIC2Q 8M6w== X-Gm-Message-State: AKwxyteLmHd+CVRU83ebJvHvDx9oQeHKTCgq4NYX5EOSGqzq7rhGDMZh zh73LF2ku4yYV0bfmBi/nsiBZg== X-Google-Smtp-Source: ACJfBos99w/zZfvDZ/n/7IgdGT0gP7mk3guSpRdRTDMy2MiyAqUA+rSCh9VZYn17hp+oAoLYD9JMLw== X-Received: by 10.28.177.214 with SMTP id a205mr2037930wmf.30.1515700860886; Thu, 11 Jan 2018 12:01:00 -0800 (PST) Received: from localhost.localdomain ([51.15.160.169]) by smtp.googlemail.com with ESMTPSA id 36sm8840695wrt.96.2018.01.11.12.01.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 11 Jan 2018 12:01:00 -0800 (PST) From: Corentin Labbe To: davem@davemloft.net, herbert@gondor.apana.org.au, nhorman@tuxdriver.com, smueller@chronox.de Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Corentin Labbe Subject: [PATCH 2/2] crypto: tools: Add cryptostat userspace Date: Thu, 11 Jan 2018 19:56:57 +0000 Message-Id: <1515700617-3513-3-git-send-email-clabbe@baylibre.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1515700617-3513-1-git-send-email-clabbe@baylibre.com> References: <1515700617-3513-1-git-send-email-clabbe@baylibre.com> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Corentin Labbe --- tools/crypto/getstat.c | 283 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 283 insertions(+) create mode 100644 tools/crypto/getstat.c diff --git a/tools/crypto/getstat.c b/tools/crypto/getstat.c new file mode 100644 index 000000000000..e73f2a73e0f6 --- /dev/null +++ b/tools/crypto/getstat.c @@ -0,0 +1,283 @@ +/* Heavily copied from libkcapi 2015 - 2017, Stephan Mueller */ +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#define CR_RTA(x) ((struct rtattr *)(((char *)(x)) + NLMSG_ALIGN(sizeof(struct crypto_user_alg)))) + +static int get_stat(const char *drivername) +{ + struct { + struct nlmsghdr n; + struct crypto_user_alg cru; + } req; + struct sockaddr_nl nl; + int sd = 0, ret; + socklen_t addr_len; + struct iovec iov; + struct msghdr msg; + char buf[4096]; + struct nlmsghdr *res_n = (struct nlmsghdr *)buf; + struct crypto_user_alg *cru_res = NULL; + int res_len = 0; + struct rtattr *tb[CRYPTOCFGA_MAX + 1]; + struct rtattr *rta; + + memset(&req, 0, sizeof(req)); + memset(&buf, 0, sizeof(buf)); + memset(&msg, 0, sizeof(msg)); + + req.n.nlmsg_len = NLMSG_LENGTH(sizeof(req.cru)); + req.n.nlmsg_flags = NLM_F_REQUEST; + req.n.nlmsg_type = CRYPTO_MSG_GETALG; + req.n.nlmsg_seq = time(NULL); + + strncpy(req.cru.cru_driver_name, drivername, strlen(drivername)); + + sd = socket(AF_NETLINK, SOCK_RAW, NETLINK_CRYPTO); + if (sd < 0) { + fprintf(stderr, "Netlink error: cannot open netlink socket"); + return -errno; + } + memset(&nl, 0, sizeof(nl)); + nl.nl_family = AF_NETLINK; + if (bind(sd, (struct sockaddr *)&nl, sizeof(nl)) < 0) { + ret = -errno; + fprintf(stderr, "Netlink error: cannot bind netlink socket"); + goto out; + } + + /* sanity check that netlink socket was successfully opened */ + addr_len = sizeof(nl); + if (getsockname(sd, (struct sockaddr *)&nl, &addr_len) < 0) { + ret = -errno; + printf("Netlink error: cannot getsockname"); + goto out; + } + if (addr_len != sizeof(nl)) { + ret = -errno; + printf("Netlink error: wrong address length %d", addr_len); + goto out; + } + if (nl.nl_family != AF_NETLINK) { + ret = -errno; + printf("Netlink error: wrong address family %d", + nl.nl_family); + goto out; + } + + memset(&nl, 0, sizeof(nl)); + nl.nl_family = AF_NETLINK; + iov.iov_base = (void *)&req.n; + iov.iov_len = req.n.nlmsg_len; + msg.msg_name = &nl; + msg.msg_namelen = sizeof(nl); + msg.msg_iov = &iov; + msg.msg_iovlen = 1; + if (sendmsg(sd, &msg, 0) < 0) { + ret = -errno; + printf("Netlink error: sendmsg failed"); + goto out; + } + memset(buf, 0, sizeof(buf)); + iov.iov_base = buf; + while (1) { + iov.iov_len = sizeof(buf); + ret = recvmsg(sd, &msg, 0); + if (ret < 0) { + if (errno == EINTR || errno == EAGAIN) + continue; + ret = -errno; + printf("Netlink error: netlink receive error"); + goto out; + } + if (ret == 0) { + ret = -errno; + printf("Netlink error: no data"); + goto out; + } + if (ret > sizeof(buf)) { + ret = -errno; + printf("Netlink error: received too much data"); + goto out; + } + break; + } + + ret = -EFAULT; + res_len = res_n->nlmsg_len; + if (res_n->nlmsg_type == NLMSG_ERROR) { + /* + * return -EAGAIN -- this error will occur if we received a + * driver name, but used it for a generic name. Allow caller + * to invoke function again where driver name is looked up + */ + ret = -EAGAIN; + goto out; + } + + if (res_n->nlmsg_type == CRYPTO_MSG_GETALG) { + cru_res = NLMSG_DATA(res_n); + res_len -= NLMSG_SPACE(sizeof(*cru_res)); + } + if (res_len < 0) { + printf("Netlink error: nlmsg len %d\n", res_len); + goto out; + } + + if (!cru_res) { + ret = -EFAULT; + printf("Netlink error: no cru_res\n"); + goto out; + } + + rta = CR_RTA(cru_res); + memset(tb, 0, sizeof(struct rtattr *) * (CRYPTOCFGA_MAX + 1)); + while (RTA_OK(rta, res_len)) { + if ((rta->rta_type <= CRYPTOCFGA_MAX) && (!tb[rta->rta_type])) + tb[rta->rta_type] = rta; + rta = RTA_NEXT(rta, res_len); + } + if (res_len) { + printf("Netlink error: unprocessed data %d", + res_len); + goto out; + } + + if (tb[CRYPTOCFGA_REPORT_HASH]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_HASH]; + struct crypto_report_hash *rhash = + (struct crypto_report_hash *)RTA_DATA(rta); + printf("%s\tHash\n\tHash: %llu bytes: %llu\n", + drivername, + rhash->stat_hash, rhash->stat_hash_tlen); + } else if (tb[CRYPTOCFGA_REPORT_COMPRESS]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_COMPRESS]; + struct crypto_report_comp *rblk = + (struct crypto_report_comp *)RTA_DATA(rta); + printf("%s\tCompress\n\tCompress: %llu bytes: %llu\n\tDecompress: %llu bytes: %llu\n", + drivername, + rblk->stat_compress_cnt, rblk->stat_compress_tlen, + rblk->stat_decompress_cnt, rblk->stat_decompress_tlen); + } else if (tb[CRYPTOCFGA_REPORT_ACOMP]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_ACOMP]; + struct crypto_report_acomp *rcomp = + (struct crypto_report_acomp *)RTA_DATA(rta); + printf("%s\tACompress\n\tCompress: %llu bytes: %llu\n\tDecompress: %llu bytes: %llu\n", + drivername, + rcomp->stat_compress_cnt, rcomp->stat_compress_tlen, + rcomp->stat_decompress_cnt, rcomp->stat_decompress_tlen); + } else if (tb[CRYPTOCFGA_REPORT_AEAD]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_AEAD]; + struct crypto_report_aead *raead = + (struct crypto_report_aead *) RTA_DATA(rta); + printf("%s\tAEAD\n\tEncrypt: %llu bytes: %llu\n\tDecrypt: %llu bytes: %llu\n", + drivername, + raead->stat_encrypt_cnt, raead->stat_encrypt_tlen, + raead->stat_decrypt_cnt, raead->stat_decrypt_tlen); + } else if (tb[CRYPTOCFGA_REPORT_BLKCIPHER]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_BLKCIPHER]; + struct crypto_report_blkcipher *rblk = + (struct crypto_report_blkcipher *)RTA_DATA(rta); + printf("%s\tCipher\n\tEncrypt: %llu bytes: %llu\n\tDecrypt: %llu bytes: %llu\n", + drivername, + rblk->stat_encrypt_cnt, rblk->stat_encrypt_tlen, + rblk->stat_decrypt_cnt, rblk->stat_decrypt_tlen); + } else if (tb[CRYPTOCFGA_REPORT_AKCIPHER]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_AKCIPHER]; + struct crypto_report_akcipher *rblk = + (struct crypto_report_akcipher *)RTA_DATA(rta); + printf("%s\tAkcipher\n\tEncrypt: %llu bytes: %llu\n\tDecrypt: %llu bytes: %llu\n\tSign: %llu\n\tVerify: %llu\n", + drivername, + rblk->stat_encrypt_cnt, rblk->stat_encrypt_tlen, + rblk->stat_decrypt_cnt, rblk->stat_decrypt_tlen, + rblk->stat_sign_cnt, rblk->stat_verify_cnt); + } else if (tb[CRYPTOCFGA_REPORT_CIPHER]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_CIPHER]; + struct crypto_report_cipher *rblk = + (struct crypto_report_cipher *) RTA_DATA(rta); + printf("%s\tcipher\n\tEncrypt: %llu bytes: %llu\n\tDecrypt: %llu bytes: %llu\n", + drivername, + rblk->stat_encrypt_cnt, rblk->stat_encrypt_tlen, + rblk->stat_decrypt_cnt, rblk->stat_decrypt_tlen); + } else if (tb[CRYPTOCFGA_REPORT_RNG]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_RNG]; + struct crypto_report_rng *rrng = + (struct crypto_report_rng *) RTA_DATA(rta); + printf("%s\tRNG\n\tSeed: %llu\n\tGenerate: %llu bytes: %llu\n", + drivername, + rrng->stat_seed_cnt, + rrng->stat_generate_cnt, rrng->stat_generate_tlen); + } else if (tb[CRYPTOCFGA_REPORT_KPP]) { + struct rtattr *rta = tb[CRYPTOCFGA_REPORT_KPP]; + struct crypto_report_kpp *rkpp = + (struct crypto_report_kpp *)RTA_DATA(rta); + printf("%s\tKPP\n\tSetsecret: %llu\n\tGenerate public key: %llu\n\tCompute_shared_secret: %llu\n", + drivername, + rkpp->stat_setsecret_cnt, + rkpp->stat_generate_public_key_cnt, + rkpp->stat_compute_shared_secret_cnt); + } else { + fprintf(stderr, "%s is of an unknown algorithm\n", drivername); + } + ret = 0; +out: + close(sd); + return ret; +} + +int main(int argc, const char *argv[]) +{ + char buf[4096]; + FILE *procfd; + int i, lastspace; + int ret; + + procfd = fopen("/proc/crypto", "r"); + if (!procfd) { + ret = errno; + fprintf(stderr, "Cannot open /proc/crypto %s\n", strerror(errno)); + return ret; + } + if (argc > 1) { + if (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help")) { + printf("Usage: %s [-h|--help] display this help\n", argv[0]); + printf("Usage: %s display all crypto statistics\n", argv[0]); + printf("Usage: %s drivername1 drivername2 ... = display crypto statistics about drivername1 ...\n", argv[0]); + return 0; + } + for (i = 1; i < argc; i++) { + ret = get_stat(argv[i]); + if (ret) + return ret; + } + return 0; + } + + while (fgets(buf, sizeof(buf), procfd)) { + if (!strncmp(buf, "driver", 6)) { + lastspace = 0; + i = 0; + while (i < strlen(buf)) { + i++; + if (buf[i] == ' ') + lastspace = i; + } + buf[strlen(buf) - 1] = '\0'; + ret = get_stat(buf + lastspace + 1); + if (ret) + goto out; + } + } +out: + fclose(procfd); + return ret; +}