From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4C03EC761A6 for ; Fri, 31 Mar 2023 16:29:04 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D363C6B00C3; Fri, 31 Mar 2023 12:29:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CE65E6B00C4; Fri, 31 Mar 2023 12:29:03 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id BAE126B00C5; Fri, 31 Mar 2023 12:29:03 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id AA7F46B00C3 for ; Fri, 31 Mar 2023 12:29:03 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 7EA2C1C6484 for ; Fri, 31 Mar 2023 16:29:03 +0000 (UTC) X-FDA: 80629727766.18.20CFC46 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf12.hostedemail.com (Postfix) with ESMTP id 86D914001A for ; Fri, 31 Mar 2023 16:29:01 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=RJEm5ZSU; spf=pass (imf12.hostedemail.com: domain of dhowells@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=dhowells@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1680280141; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=+ZSAJKtt/ag5B+38eGABocjAtCkqVzXfR0mPd/YeFX8=; b=7JvOSS1zNXMra3BKMOGqONLi4+81Tn2+SkS8uGmsnubxhCq4oj0XlB+FaOtls2TPqQbSFC KH7IbZjxSWMWIDPswnR71Fcj3IweIAa+47yeBquWcXbx0UP2w2IbnJqUUoZpcOWULfEc4K PUOR7HFN3OeDsWVJiY8Oxyxj0rNrLyA= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=RJEm5ZSU; spf=pass (imf12.hostedemail.com: domain of dhowells@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=dhowells@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1680280141; a=rsa-sha256; cv=none; b=hKMtx8PqIxY2KdkhorwTUFDDPjt2rVx/e0tG8EYmxvzkPXT6/Gsvt8fx3ECshduz2JyfHq /Rc40iyfGPybXuYlDt/wxPEnpgjcQyAEhn7RnGS3PH3sNE2NPnpnSFGQPL7FnehWdvxEeh CMEl0goi82eDmbC1+IZmUaT8eEPt2B4= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1680280140; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+ZSAJKtt/ag5B+38eGABocjAtCkqVzXfR0mPd/YeFX8=; b=RJEm5ZSUt7TdKpG5eU9tbnyKagNUgn/kOnWlPrhVnJ/SQ7XQ9f0u2rgCPAczYXdcovNCed zXYpyAMovAzQbJAOyXBR3xVtDuyTqB3872DlIdAAUuPlsQR7jd0Dhml/yqnO+VkoeI84/I dOpsGHsSGttQL6Fl5779CA2XIm9qOS8= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-410-FhZ9Z2msPdG2BL3PnIP12g-1; Fri, 31 Mar 2023 12:28:59 -0400 X-MC-Unique: FhZ9Z2msPdG2BL3PnIP12g-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7E639885624; Fri, 31 Mar 2023 16:28:58 +0000 (UTC) Received: from warthog.procyon.org.uk (unknown [10.33.36.18]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8342C40BC797; Fri, 31 Mar 2023 16:28:56 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 From: David Howells In-Reply-To: <20230331160914.1608208-30-dhowells@redhat.com> References: <20230331160914.1608208-30-dhowells@redhat.com> <20230331160914.1608208-1-dhowells@redhat.com> To: Chuck Lever III Cc: dhowells@redhat.com, Matthew Wilcox , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Al Viro , Christoph Hellwig , Jens Axboe , Jeff Layton , Christian Brauner , Linus Torvalds , netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Boris Pismenny , John Fastabend Subject: Trivial TLS client MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <1610448.1680280135.1@warthog.procyon.org.uk> Content-Transfer-Encoding: quoted-printable Date: Fri, 31 Mar 2023 17:28:55 +0100 Message-ID: <1610449.1680280135@warthog.procyon.org.uk> X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2 X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 86D914001A X-Stat-Signature: axy9yjprxr4a1zthkh4o6j76537c7oz8 X-Rspam-User: X-HE-Tag: 1680280141-33759 X-HE-Meta: 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 tPntyQKf 52bLs0N0oY7kRlJ9nLusNSWHt1mEpjZ8pL/E0Dm3vJGJnbR8Y+dODt1nGtyrmoue5fVpRu1XbSyocb+23xx7NyQcufyV764Xjj823rTswH/3FIZTBubGS5UKK0Kdxa7qy58tHgrIVAJ2iDjr/sUCqWGvv0eHRKcrmUCFnCOBraiVCb8nLfdSmDtMxwI3tiSayuMJJoE4pcfoE/57s/wC5oGazfswnggEWyhGG+CyjGjGFM29U+IqmStU+9XZ7QMs84Lw8AHxmrAH7MH07D+FnLLAjcq7KThWSOyx75FiEsJ4wDtU= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Here's a trivial TLS client program for testing this. David --- /* * TLS-over-TCP send client */ #include #include #include #include #include #include #include #include #include #include #include #define OSERROR(X, Y) do { if ((long)(X) =3D=3D -1) { perror(Y); exit(1); = } } while(0) static unsigned char buffer[4096] __attribute__((aligned(4096))); static void set_tls(int sock) { struct tls12_crypto_info_aes_gcm_128 crypto_info; crypto_info.info.version =3D TLS_1_2_VERSION; crypto_info.info.cipher_type =3D TLS_CIPHER_AES_GCM_128; memset(crypto_info.iv, 0, TLS_CIPHER_AES_GCM_128_IV_SIZE); memset(crypto_info.rec_seq, 0, TLS_CIPHER_AES_GCM_128_REC_SEQ_SIZE); memset(crypto_info.key, 0, TLS_CIPHER_AES_GCM_128_KEY_SIZE); memset(crypto_info.salt, 0, TLS_CIPHER_AES_GCM_128_SALT_SIZE); OSERROR(setsockopt(sock, SOL_TCP, TCP_ULP, "tls", sizeof("tls")), "TCP_ULP"); OSERROR(setsockopt(sock, SOL_TLS, TLS_TX, &crypto_info, sizeof(crypto_inf= o)), "TLS_TX"); OSERROR(setsockopt(sock, SOL_TLS, TLS_RX, &crypto_info, sizeof(crypto_inf= o)), "TLS_RX"); } int main(int argc, char *argv[]) { struct sockaddr_in sin =3D { .sin_family =3D AF_INET, .sin_port =3D htons= (5556) }; struct hostent *h; struct stat st; ssize_t r, o; int sf =3D 0; int cfd, fd; if (argc > 1 && strcmp(argv[1], "-s") =3D=3D 0) { sf =3D 1; argc--; argv++; } = if (argc !=3D 3) { fprintf(stderr, "tcp-send [-s] \n"); exit(2); } h =3D gethostbyname(argv[1]); if (!h) { fprintf(stderr, "%s: %s\n", argv[1], hstrerror(h_errno)); exit(3); } if (!h->h_addr_list[0]) { fprintf(stderr, "%s: No addresses\n", argv[1]); exit(3); } memcpy(&sin.sin_addr, h->h_addr_list[0], h->h_length); = cfd =3D socket(AF_INET, SOCK_STREAM, 0); OSERROR(cfd, "socket"); OSERROR(connect(cfd, (struct sockaddr *)&sin, sizeof(sin)), "connect"); set_tls(cfd); fd =3D open(argv[2], O_RDONLY); OSERROR(fd, argv[2]); OSERROR(fstat(fd, &st), argv[2]); if (!sf) { for (;;) { r =3D read(fd, buffer, sizeof(buffer)); OSERROR(r, argv[2]); if (r =3D=3D 0) break; o =3D 0; do { ssize_t w =3D write(cfd, buffer + o, r - o); OSERROR(w, "write"); o +=3D w; } while (o < r); } } else { off_t off =3D 0; r =3D sendfile(cfd, fd, &off, st.st_size); OSERROR(r, "sendfile"); if (r !=3D st.st_size) { fprintf(stderr, "Short sendfile\n"); exit(1); } } OSERROR(close(cfd), "close/c"); OSERROR(close(fd), "close/f"); return 0; }