~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/Documentation/crypto/descore-readme.rst

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /Documentation/crypto/descore-readme.rst (Architecture i386) and /Documentation/crypto/descore-readme.rst (Architecture ppc)


  1 .. SPDX-License-Identifier: GPL-2.0                 1 .. SPDX-License-Identifier: GPL-2.0
  2 .. include:: <isonum.txt>                           2 .. include:: <isonum.txt>
  3                                                     3 
  4 ===========================================         4 ===========================================
  5 Fast & Portable DES encryption & decryption         5 Fast & Portable DES encryption & decryption
  6 ===========================================         6 ===========================================
  7                                                     7 
  8 .. note::                                           8 .. note::
  9                                                     9 
 10    Below is the original README file from the      10    Below is the original README file from the descore.shar package,
 11    converted to ReST format.                       11    converted to ReST format.
 12                                                    12 
 13 ----------------------------------------------     13 ------------------------------------------------------------------------------
 14                                                    14 
 15 des - fast & portable DES encryption & decrypt     15 des - fast & portable DES encryption & decryption.
 16                                                    16 
 17 Copyright |copy| 1992  Dana L. How                 17 Copyright |copy| 1992  Dana L. How
 18                                                    18 
 19 This program is free software; you can redistr     19 This program is free software; you can redistribute it and/or modify
 20 it under the terms of the GNU Library General      20 it under the terms of the GNU Library General Public License as published by
 21 the Free Software Foundation; either version 2     21 the Free Software Foundation; either version 2 of the License, or
 22 (at your option) any later version.                22 (at your option) any later version.
 23                                                    23 
 24 This program is distributed in the hope that i     24 This program is distributed in the hope that it will be useful,
 25 but WITHOUT ANY WARRANTY; without even the imp     25 but WITHOUT ANY WARRANTY; without even the implied warranty of
 26 MERCHANTABILITY or FITNESS FOR A PARTICULAR PU     26 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 27 GNU Library General Public License for more de     27 GNU Library General Public License for more details.
 28                                                    28 
 29 You should have received a copy of the GNU Lib     29 You should have received a copy of the GNU Library General Public License
 30 along with this program; if not, write to the      30 along with this program; if not, write to the Free Software
 31 Foundation, Inc., 675 Mass Ave, Cambridge, MA      31 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 32                                                    32 
 33 Author's address: how@isl.stanford.edu             33 Author's address: how@isl.stanford.edu
 34                                                    34 
 35 .. README,v 1.15 1992/05/20 00:25:32 how E         35 .. README,v 1.15 1992/05/20 00:25:32 how E
 36                                                    36 
 37 ==>> To compile after untarring/unsharring, ju     37 ==>> To compile after untarring/unsharring, just ``make`` <<==
 38                                                    38 
 39 This package was designed with the following g     39 This package was designed with the following goals:
 40                                                    40 
 41 1.      Highest possible encryption/decryption     41 1.      Highest possible encryption/decryption PERFORMANCE.
 42 2.      PORTABILITY to any byte-addressable ho     42 2.      PORTABILITY to any byte-addressable host with a 32bit unsigned C type
 43 3.      Plug-compatible replacement for KERBER     43 3.      Plug-compatible replacement for KERBEROS's low-level routines.
 44                                                    44 
 45 This second release includes a number of perfo     45 This second release includes a number of performance enhancements for
 46 register-starved machines.  My discussions wit     46 register-starved machines.  My discussions with Richard Outerbridge,
 47 71755.204@compuserve.com, sparked a number of      47 71755.204@compuserve.com, sparked a number of these enhancements.
 48                                                    48 
 49 To more rapidly understand the code in this pa     49 To more rapidly understand the code in this package, inspect desSmallFips.i
 50 (created by typing ``make``) BEFORE you tackle     50 (created by typing ``make``) BEFORE you tackle desCode.h.  The latter is set
 51 up in a parameterized fashion so it can easily     51 up in a parameterized fashion so it can easily be modified by speed-daemon
 52 hackers in pursuit of that last microsecond.       52 hackers in pursuit of that last microsecond.  You will find it more
 53 illuminating to inspect one specific implement     53 illuminating to inspect one specific implementation,
 54 and then move on to the common abstract skelet     54 and then move on to the common abstract skeleton with this one in mind.
 55                                                    55 
 56                                                    56 
 57 performance comparison to other available des      57 performance comparison to other available des code which i could
 58 compile on a SPARCStation 1 (cc -O4, gcc -O2):     58 compile on a SPARCStation 1 (cc -O4, gcc -O2):
 59                                                    59 
 60 this code (byte-order independent):                60 this code (byte-order independent):
 61                                                    61 
 62   - 30us per encryption (options: 64k tables,      62   - 30us per encryption (options: 64k tables, no IP/FP)
 63   - 33us per encryption (options: 64k tables,      63   - 33us per encryption (options: 64k tables, FIPS standard bit ordering)
 64   - 45us per encryption (options:  2k tables,      64   - 45us per encryption (options:  2k tables, no IP/FP)
 65   - 48us per encryption (options:  2k tables,      65   - 48us per encryption (options:  2k tables, FIPS standard bit ordering)
 66   - 275us to set a new key (uses 1k of key tab     66   - 275us to set a new key (uses 1k of key tables)
 67                                                    67 
 68         this has the quickest encryption/decry     68         this has the quickest encryption/decryption routines i've seen.
 69         since i was interested in fast des fil     69         since i was interested in fast des filters rather than crypt(3)
 70         and password cracking, i haven't reall     70         and password cracking, i haven't really bothered yet to speed up
 71         the key setting routine. also, i have      71         the key setting routine. also, i have no interest in re-implementing
 72         all the other junk in the mit kerberos     72         all the other junk in the mit kerberos des library, so i've just
 73         provided my routines with little stub      73         provided my routines with little stub interfaces so they can be
 74         used as drop-in replacements with mit'     74         used as drop-in replacements with mit's code or any of the mit-
 75         compatible packages below. (note that      75         compatible packages below. (note that the first two timings above
 76         are highly variable because of cache e     76         are highly variable because of cache effects).
 77                                                    77 
 78 kerberos des replacement from australia (versi     78 kerberos des replacement from australia (version 1.95):
 79                                                    79 
 80   - 53us per encryption (uses 2k of tables)        80   - 53us per encryption (uses 2k of tables)
 81   - 96us to set a new key (uses 2.25k of key t     81   - 96us to set a new key (uses 2.25k of key tables)
 82                                                    82 
 83         so despite the author's inclusion of s     83         so despite the author's inclusion of some of the performance
 84         improvements i had suggested to him, t     84         improvements i had suggested to him, this package's
 85         encryption/decryption is still slower      85         encryption/decryption is still slower on the sparc and 68000.
 86         more specifically, 19-40% slower on th     86         more specifically, 19-40% slower on the 68020 and 11-35% slower
 87         on the sparc,  depending on the compil     87         on the sparc,  depending on the compiler;
 88         in full gory detail (ALT_ECB is a libd     88         in full gory detail (ALT_ECB is a libdes variant):
 89                                                    89 
 90         =============== ==============  ======     90         =============== ==============  =============== =================
 91         compiler        machine         desCor     91         compiler        machine         desCore libdes  ALT_ECB slower by
 92         =============== ==============  ======     92         =============== ==============  =============== =================
 93         gcc 2.1 -O2     Sun 3/110       304  u     93         gcc 2.1 -O2     Sun 3/110       304  uS 369.5uS 461.8uS  22%
 94         cc      -O1     Sun 3/110       336  u     94         cc      -O1     Sun 3/110       336  uS 436.6uS 399.3uS  19%
 95         cc      -O2     Sun 3/110       360  u     95         cc      -O2     Sun 3/110       360  uS 532.4uS 505.1uS  40%
 96         cc      -O4     Sun 3/110       365  u     96         cc      -O4     Sun 3/110       365  uS 532.3uS 505.3uS  38%
 97         gcc 2.1 -O2     Sun 4/50         48  u     97         gcc 2.1 -O2     Sun 4/50         48  uS  53.4uS  57.5uS  11%
 98         cc      -O2     Sun 4/50         48  u     98         cc      -O2     Sun 4/50         48  uS  64.6uS  64.7uS  35%
 99         cc      -O4     Sun 4/50         48  u     99         cc      -O4     Sun 4/50         48  uS  64.7uS  64.9uS  35%
100         =============== ==============  ======    100         =============== ==============  =============== =================
101                                                   101 
102         (my time measurements are not as accur    102         (my time measurements are not as accurate as his).
103                                                   103 
104    the comments in my first release of desCore    104    the comments in my first release of desCore on version 1.92:
105                                                   105 
106    - 68us per encryption (uses 2k of tables)      106    - 68us per encryption (uses 2k of tables)
107    - 96us to set a new key (uses 2.25k of key     107    - 96us to set a new key (uses 2.25k of key tables)
108                                                   108 
109         this is a very nice package which impl    109         this is a very nice package which implements the most important
110         of the optimizations which i did in my    110         of the optimizations which i did in my encryption routines.
111         it's a bit weak on common low-level op    111         it's a bit weak on common low-level optimizations which is why
112         it's 39%-106% slower.  because he was     112         it's 39%-106% slower.  because he was interested in fast crypt(3) and
113         password-cracking applications,  he al    113         password-cracking applications,  he also used the same ideas to
114         speed up the key-setting routines with    114         speed up the key-setting routines with impressive results.
115         (at some point i may do the same in my    115         (at some point i may do the same in my package).  he also implements
116         the rest of the mit des library.          116         the rest of the mit des library.
117                                                   117 
118         (code from eay@psych.psy.uq.oz.au via     118         (code from eay@psych.psy.uq.oz.au via comp.sources.misc)
119                                                   119 
120 fast crypt(3) package from denmark:               120 fast crypt(3) package from denmark:
121                                                   121 
122         the des routine here is buried inside     122         the des routine here is buried inside a loop to do the
123         crypt function and i didn't feel like     123         crypt function and i didn't feel like ripping it out and measuring
124         performance. his code takes 26 sparc i    124         performance. his code takes 26 sparc instructions to compute one
125         des iteration; above, Quick (64k) take    125         des iteration; above, Quick (64k) takes 21 and Small (2k) takes 37.
126         he claims to use 280k of tables but th    126         he claims to use 280k of tables but the iteration calculation seems
127         to use only 128k.  his tables and code    127         to use only 128k.  his tables and code are machine independent.
128                                                   128 
129         (code from glad@daimi.aau.dk via alt.s    129         (code from glad@daimi.aau.dk via alt.sources or comp.sources.misc)
130                                                   130 
131 swedish reimplementation of Kerberos des libra    131 swedish reimplementation of Kerberos des library
132                                                   132 
133   - 108us per encryption (uses 34k worth of ta    133   - 108us per encryption (uses 34k worth of tables)
134   - 134us to set a new key (uses 32k of key ta    134   - 134us to set a new key (uses 32k of key tables to get this speed!)
135                                                   135 
136         the tables used seem to be machine-ind    136         the tables used seem to be machine-independent;
137         he seems to have included a lot of spe    137         he seems to have included a lot of special case code
138         so that, e.g., ``long`` loads can be u    138         so that, e.g., ``long`` loads can be used instead of 4 ``char`` loads
139         when the machine's architecture allows    139         when the machine's architecture allows it.
140                                                   140 
141         (code obtained from chalmers.se:pub/de    141         (code obtained from chalmers.se:pub/des)
142                                                   142 
143 crack 3.3c package from england:                  143 crack 3.3c package from england:
144                                                   144 
145         as in crypt above, the des routine is     145         as in crypt above, the des routine is buried in a loop. it's
146         also very modified for crypt.  his ite    146         also very modified for crypt.  his iteration code uses 16k
147         of tables and appears to be slow.         147         of tables and appears to be slow.
148                                                   148 
149         (code obtained from aem@aber.ac.uk via    149         (code obtained from aem@aber.ac.uk via alt.sources or comp.sources.misc)
150                                                   150 
151 ``highly optimized`` and tweaked Kerberos/Athe    151 ``highly optimized`` and tweaked Kerberos/Athena code (byte-order dependent):
152                                                   152 
153   - 165us per encryption (uses 6k worth of tab    153   - 165us per encryption (uses 6k worth of tables)
154   - 478us to set a new key (uses <1k of key ta    154   - 478us to set a new key (uses <1k of key tables)
155                                                   155 
156         so despite the comments in this code,     156         so despite the comments in this code, it was possible to get
157         faster code AND smaller tables, as wel    157         faster code AND smaller tables, as well as making the tables
158         machine-independent.                      158         machine-independent.
159         (code obtained from prep.ai.mit.edu)      159         (code obtained from prep.ai.mit.edu)
160                                                   160 
161 UC Berkeley code (depends on machine-endedness    161 UC Berkeley code (depends on machine-endedness):
162   -  226us per encryption                         162   -  226us per encryption
163   - 10848us to set a new key                      163   - 10848us to set a new key
164                                                   164 
165         table sizes are unclear, but they don'    165         table sizes are unclear, but they don't look very small
166         (code obtained from wuarchive.wustl.ed    166         (code obtained from wuarchive.wustl.edu)
167                                                   167 
168                                                   168 
169 motivation and history                            169 motivation and history
170 ======================                            170 ======================
171                                                   171 
172 a while ago i wanted some des routines and the    172 a while ago i wanted some des routines and the routines documented on sun's
173 man pages either didn't exist or dumped core.     173 man pages either didn't exist or dumped core.  i had heard of kerberos,
174 and knew that it used des,  so i figured i'd u    174 and knew that it used des,  so i figured i'd use its routines.  but once
175 i got it and looked at the code,  it really se    175 i got it and looked at the code,  it really set off a lot of pet peeves -
176 it was too convoluted, the code had been writt    176 it was too convoluted, the code had been written without taking
177 advantage of the regular structure of operatio    177 advantage of the regular structure of operations such as IP, E, and FP
178 (i.e. the author didn't sit down and think bef    178 (i.e. the author didn't sit down and think before coding),
179 it was excessively slow,  the author had attem    179 it was excessively slow,  the author had attempted to clarify the code
180 by adding MORE statements to make the data mov    180 by adding MORE statements to make the data movement more ``consistent``
181 instead of simplifying his implementation and     181 instead of simplifying his implementation and cutting down on all data
182 movement (in particular, his use of L1, R1, L2    182 movement (in particular, his use of L1, R1, L2, R2), and it was full of
183 idiotic ``tweaks`` for particular machines whi    183 idiotic ``tweaks`` for particular machines which failed to deliver significant
184 speedups but which did obfuscate everything.      184 speedups but which did obfuscate everything.  so i took the test data
185 from his verification program and rewrote ever    185 from his verification program and rewrote everything else.
186                                                   186 
187 a while later i ran across the great crypt(3)     187 a while later i ran across the great crypt(3) package mentioned above.
188 the fact that this guy was computing 2 sboxes     188 the fact that this guy was computing 2 sboxes per table lookup rather
189 than one (and using a MUCH larger table in the    189 than one (and using a MUCH larger table in the process) emboldened me to
190 do the same - it was a trivial change from whi    190 do the same - it was a trivial change from which i had been scared away
191 by the larger table size.  in his case he didn    191 by the larger table size.  in his case he didn't realize you don't need to keep
192 the working data in TWO forms, one for easy us    192 the working data in TWO forms, one for easy use of half the sboxes in
193 indexing, the other for easy use of the other     193 indexing, the other for easy use of the other half; instead you can keep
194 it in the form for the first half and use a si    194 it in the form for the first half and use a simple rotate to get the other
195 half.  this means i have (almost) half the dat    195 half.  this means i have (almost) half the data manipulation and half
196 the table size.  in fairness though he might b    196 the table size.  in fairness though he might be encoding something particular
197 to crypt(3) in his tables - i didn't check.       197 to crypt(3) in his tables - i didn't check.
198                                                   198 
199 i'm glad that i implemented it the way i did,     199 i'm glad that i implemented it the way i did, because this C version is
200 portable (the ifdef's are performance enhancem    200 portable (the ifdef's are performance enhancements) and it is faster
201 than versions hand-written in assembly for the    201 than versions hand-written in assembly for the sparc!
202                                                   202 
203                                                   203 
204 porting notes                                     204 porting notes
205 =============                                     205 =============
206                                                   206 
207 one thing i did not want to do was write an en    207 one thing i did not want to do was write an enormous mess
208 which depended on endedness and other machine     208 which depended on endedness and other machine quirks,
209 and which necessarily produced different code     209 and which necessarily produced different code and different lookup tables
210 for different machines.  see the kerberos code    210 for different machines.  see the kerberos code for an example
211 of what i didn't want to do; all their endedne    211 of what i didn't want to do; all their endedness-specific ``optimizations``
212 obfuscate the code and in the end were slower     212 obfuscate the code and in the end were slower than a simpler machine
213 independent approach.  however, there are alwa    213 independent approach.  however, there are always some portability
214 considerations of some kind, and i have includ    214 considerations of some kind, and i have included some options
215 for varying numbers of register variables.        215 for varying numbers of register variables.
216 perhaps some will still regard the result as a    216 perhaps some will still regard the result as a mess!
217                                                   217 
218 1) i assume everything is byte addressable, al    218 1) i assume everything is byte addressable, although i don't actually
219    depend on the byte order, and that bytes ar    219    depend on the byte order, and that bytes are 8 bits.
220    i assume word pointers can be freely cast t    220    i assume word pointers can be freely cast to and from char pointers.
221    note that 99% of C programs make these assu    221    note that 99% of C programs make these assumptions.
222    i always use unsigned char's if the high bi    222    i always use unsigned char's if the high bit could be set.
223 2) the typedef ``word`` means a 32 bit unsigne    223 2) the typedef ``word`` means a 32 bit unsigned integral type.
224    if ``unsigned long`` is not 32 bits, change    224    if ``unsigned long`` is not 32 bits, change the typedef in desCore.h.
225    i assume sizeof(word) == 4 EVERYWHERE.         225    i assume sizeof(word) == 4 EVERYWHERE.
226                                                   226 
227 the (worst-case) cost of my NOT doing endednes    227 the (worst-case) cost of my NOT doing endedness-specific optimizations
228 in the data loading and storing code surroundi    228 in the data loading and storing code surrounding the key iterations
229 is less than 12%.  also, there is the added be    229 is less than 12%.  also, there is the added benefit that
230 the input and output work areas do not need to    230 the input and output work areas do not need to be word-aligned.
231                                                   231 
232                                                   232 
233 OPTIONAL performance optimizations                233 OPTIONAL performance optimizations
234 ==================================                234 ==================================
235                                                   235 
236 1) you should define one of ``i386,`` ``vax,``    236 1) you should define one of ``i386,`` ``vax,`` ``mc68000,`` or ``sparc,``
237    whichever one is closest to the capabilitie    237    whichever one is closest to the capabilities of your machine.
238    see the start of desCode.h to see exactly w    238    see the start of desCode.h to see exactly what this selection implies.
239    note that if you select the wrong one, the     239    note that if you select the wrong one, the des code will still work;
240    these are just performance tweaks.             240    these are just performance tweaks.
241 2) for those with functional ``asm`` keywords:    241 2) for those with functional ``asm`` keywords: you should change the
242    ROR and ROL macros to use machine rotate in    242    ROR and ROL macros to use machine rotate instructions if you have them.
243    this will save 2 instructions and a tempora    243    this will save 2 instructions and a temporary per use,
244    or about 32 to 40 instructions per en/decry    244    or about 32 to 40 instructions per en/decryption.
245                                                   245 
246    note that gcc is smart enough to translate     246    note that gcc is smart enough to translate the ROL/R macros into
247    machine rotates!                               247    machine rotates!
248                                                   248 
249 these optimizations are all rather persnickety    249 these optimizations are all rather persnickety, yet with them you should
250 be able to get performance equal to assembly-c    250 be able to get performance equal to assembly-coding, except that:
251                                                   251 
252 1) with the lack of a bit rotate operator in C    252 1) with the lack of a bit rotate operator in C, rotates have to be synthesized
253    from shifts.  so access to ``asm`` will spe    253    from shifts.  so access to ``asm`` will speed things up if your machine
254    has rotates, as explained above in (3) (not    254    has rotates, as explained above in (3) (not necessary if you use gcc).
255 2) if your machine has less than 12 32-bit reg    255 2) if your machine has less than 12 32-bit registers i doubt your compiler will
256    generate good code.                            256    generate good code.
257                                                   257 
258    ``i386`` tries to configure the code for a     258    ``i386`` tries to configure the code for a 386 by only declaring 3 registers
259    (it appears that gcc can use ebx, esi and e    259    (it appears that gcc can use ebx, esi and edi to hold register variables).
260    however, if you like assembly coding, the 3    260    however, if you like assembly coding, the 386 does have 7 32-bit registers,
261    and if you use ALL of them, use ``scaled by    261    and if you use ALL of them, use ``scaled by 8`` address modes with displacement
262    and other tricks, you can get reasonable ro    262    and other tricks, you can get reasonable routines for DesQuickCore... with
263    about 250 instructions apiece.  For DesSmal    263    about 250 instructions apiece.  For DesSmall... it will help to rearrange
264    des_keymap, i.e., now the sbox # is the hig    264    des_keymap, i.e., now the sbox # is the high part of the index and
265    the 6 bits of data is the low part; it help    265    the 6 bits of data is the low part; it helps to exchange these.
266                                                   266 
267    since i have no way to conveniently test it    267    since i have no way to conveniently test it i have not provided my
268    shoehorned 386 version.  note that with thi    268    shoehorned 386 version.  note that with this release of desCore, gcc is able
269    to put everything in registers(!), and gene    269    to put everything in registers(!), and generate about 370 instructions apiece
270    for the DesQuickCore... routines!              270    for the DesQuickCore... routines!
271                                                   271 
272 coding notes                                      272 coding notes
273 ============                                      273 ============
274                                                   274 
275 the en/decryption routines each use 6 necessar    275 the en/decryption routines each use 6 necessary register variables,
276 with 4 being actively used at once during the     276 with 4 being actively used at once during the inner iterations.
277 if you don't have 4 register variables get a n    277 if you don't have 4 register variables get a new machine.
278 up to 8 more registers are used to hold consta    278 up to 8 more registers are used to hold constants in some configurations.
279                                                   279 
280 i assume that the use of a constant is more ex    280 i assume that the use of a constant is more expensive than using a register:
281                                                   281 
282 a) additionally, i have tried to put the large    282 a) additionally, i have tried to put the larger constants in registers.
283    registering priority was by the following:     283    registering priority was by the following:
284                                                   284 
285         - anything more than 12 bits (bad for     285         - anything more than 12 bits (bad for RISC and CISC)
286         - greater than 127 in value (can't use    286         - greater than 127 in value (can't use movq or byte immediate on CISC)
287         - 9-127 (may not be able to use CISC s    287         - 9-127 (may not be able to use CISC shift immediate or add/sub quick),
288         - 1-8 were never registered, being the    288         - 1-8 were never registered, being the cheapest constants.
289                                                   289 
290 b) the compiler may be too stupid to realize t    290 b) the compiler may be too stupid to realize table and table+256 should
291    be assigned to different constant registers    291    be assigned to different constant registers and instead repetitively
292    do the arithmetic, so i assign these to exp    292    do the arithmetic, so i assign these to explicit ``m`` register variables
293    when possible and helpful.                     293    when possible and helpful.
294                                                   294 
295 i assume that indexing is cheaper or equivalen    295 i assume that indexing is cheaper or equivalent to auto increment/decrement,
296 where the index is 7 bits unsigned or smaller.    296 where the index is 7 bits unsigned or smaller.
297 this assumption is reversed for 68k and vax.      297 this assumption is reversed for 68k and vax.
298                                                   298 
299 i assume that addresses can be cheaply formed     299 i assume that addresses can be cheaply formed from two registers,
300 or from a register and a small constant.          300 or from a register and a small constant.
301 for the 68000, the ``two registers and small o    301 for the 68000, the ``two registers and small offset`` form is used sparingly.
302 all index scaling is done explicitly - no hidd    302 all index scaling is done explicitly - no hidden shifts by log2(sizeof).
303                                                   303 
304 the code is written so that even a dumb compil    304 the code is written so that even a dumb compiler
305 should never need more than one hidden tempora    305 should never need more than one hidden temporary,
306 increasing the chance that everything will fit    306 increasing the chance that everything will fit in the registers.
307 KEEP THIS MORE SUBTLE POINT IN MIND IF YOU REW    307 KEEP THIS MORE SUBTLE POINT IN MIND IF YOU REWRITE ANYTHING.
308                                                   308 
309 (actually, there are some code fragments now w    309 (actually, there are some code fragments now which do require two temps,
310 but fixing it would either break the structure    310 but fixing it would either break the structure of the macros or
311 require declaring another temporary).             311 require declaring another temporary).
312                                                   312 
313                                                   313 
314 special efficient data format                     314 special efficient data format
315 ==============================                    315 ==============================
316                                                   316 
317 bits are manipulated in this arrangement most     317 bits are manipulated in this arrangement most of the time (S7 S5 S3 S1)::
318                                                   318 
319         003130292827xxxx242322212019xxxx161514    319         003130292827xxxx242322212019xxxx161514131211xxxx080706050403xxxx
320                                                   320 
321 (the x bits are still there, i'm just emphasiz    321 (the x bits are still there, i'm just emphasizing where the S boxes are).
322 bits are rotated left 4 when computing S6 S4 S    322 bits are rotated left 4 when computing S6 S4 S2 S0::
323                                                   323 
324         282726252423xxxx201918171615xxxx121110    324         282726252423xxxx201918171615xxxx121110090807xxxx040302010031xxxx
325                                                   325 
326 the rightmost two bits are usually cleared so     326 the rightmost two bits are usually cleared so the lower byte can be used
327 as an index into an sbox mapping table. the ne    327 as an index into an sbox mapping table. the next two x'd bits are set
328 to various values to access different parts of    328 to various values to access different parts of the tables.
329                                                   329 
330                                                   330 
331 how to use the routines                           331 how to use the routines
332                                                   332 
333 datatypes:                                        333 datatypes:
334         pointer to 8 byte area of type DesData    334         pointer to 8 byte area of type DesData
335         used to hold keys and input/output blo    335         used to hold keys and input/output blocks to des.
336                                                   336 
337         pointer to 128 byte area of type DesKe    337         pointer to 128 byte area of type DesKeys
338         used to hold full 768-bit key.            338         used to hold full 768-bit key.
339         must be long-aligned.                     339         must be long-aligned.
340                                                   340 
341 DesQuickInit()                                    341 DesQuickInit()
342         call this before using any other routi    342         call this before using any other routine with ``Quick`` in its name.
343         it generates the special 64k table the    343         it generates the special 64k table these routines need.
344 DesQuickDone()                                    344 DesQuickDone()
345         frees this table                          345         frees this table
346                                                   346 
347 DesMethod(m, k)                                   347 DesMethod(m, k)
348         m points to a 128byte block, k points     348         m points to a 128byte block, k points to an 8 byte des key
349         which must have odd parity (or -1 is r    349         which must have odd parity (or -1 is returned) and which must
350         not be a (semi-)weak key (or -2 is ret    350         not be a (semi-)weak key (or -2 is returned).
351         normally DesMethod() returns 0.           351         normally DesMethod() returns 0.
352                                                   352 
353         m is filled in from k so that when one    353         m is filled in from k so that when one of the routines below
354         is called with m, the routine will act    354         is called with m, the routine will act like standard des
355         en/decryption with the key k. if you u    355         en/decryption with the key k. if you use DesMethod,
356         you supply a standard 56bit key; howev    356         you supply a standard 56bit key; however, if you fill in
357         m yourself, you will get a 768bit key     357         m yourself, you will get a 768bit key - but then it won't
358         be standard.  it's 768bits not 1024 be    358         be standard.  it's 768bits not 1024 because the least significant
359         two bits of each byte are not used.  n    359         two bits of each byte are not used.  note that these two bits
360         will be set to magic constants which s    360         will be set to magic constants which speed up the encryption/decryption
361         on some machines.  and yes, each byte     361         on some machines.  and yes, each byte controls
362         a specific sbox during a specific iter    362         a specific sbox during a specific iteration.
363                                                   363 
364         you really shouldn't use the 768bit fo    364         you really shouldn't use the 768bit format directly;  i should
365         provide a routine that converts 128 6-    365         provide a routine that converts 128 6-bit bytes (specified in
366         S-box mapping order or something) into    366         S-box mapping order or something) into the right format for you.
367         this would entail some byte concatenat    367         this would entail some byte concatenation and rotation.
368                                                   368 
369 Des{Small|Quick}{Fips|Core}{Encrypt|Decrypt}(d    369 Des{Small|Quick}{Fips|Core}{Encrypt|Decrypt}(d, m, s)
370         performs des on the 8 bytes at s into     370         performs des on the 8 bytes at s into the 8 bytes at
371         ``d. (d,s: char *)``.                     371         ``d. (d,s: char *)``.
372                                                   372 
373         uses m as a 768bit key as explained ab    373         uses m as a 768bit key as explained above.
374                                                   374 
375         the Encrypt|Decrypt choice is obvious.    375         the Encrypt|Decrypt choice is obvious.
376                                                   376 
377         Fips|Core determines whether a complet    377         Fips|Core determines whether a completely standard FIPS initial
378         and final permutation is done; if not,    378         and final permutation is done; if not, then the data is loaded
379         and stored in a nonstandard bit order     379         and stored in a nonstandard bit order (FIPS w/o IP/FP).
380                                                   380 
381         Fips slows down Quick by 10%, Small by    381         Fips slows down Quick by 10%, Small by 9%.
382                                                   382 
383         Small|Quick determines whether you use    383         Small|Quick determines whether you use the normal routine
384         or the crazy quick one which gobbles u    384         or the crazy quick one which gobbles up 64k more of memory.
385         Small is 50% slower then Quick, but Qu    385         Small is 50% slower then Quick, but Quick needs 32 times as much
386         memory.  Quick is included for program    386         memory.  Quick is included for programs that do nothing but DES,
387         e.g., encryption filters, etc.            387         e.g., encryption filters, etc.
388                                                   388 
389                                                   389 
390 Getting it to compile on your machine             390 Getting it to compile on your machine
391 =====================================             391 =====================================
392                                                   392 
393 there are no machine-dependencies in the code     393 there are no machine-dependencies in the code (see porting),
394 except perhaps the ``now()`` macro in desTest.    394 except perhaps the ``now()`` macro in desTest.c.
395 ALL generated tables are machine independent.     395 ALL generated tables are machine independent.
396 you should edit the Makefile with the appropri    396 you should edit the Makefile with the appropriate optimization flags
397 for your compiler (MAX optimization).             397 for your compiler (MAX optimization).
398                                                   398 
399                                                   399 
400 Speeding up kerberos (and/or its des library)     400 Speeding up kerberos (and/or its des library)
401 =============================================     401 =============================================
402                                                   402 
403 note that i have included a kerberos-compatibl    403 note that i have included a kerberos-compatible interface in desUtil.c
404 through the functions des_key_sched() and des_    404 through the functions des_key_sched() and des_ecb_encrypt().
405 to use these with kerberos or kerberos-compati    405 to use these with kerberos or kerberos-compatible code put desCore.a
406 ahead of the kerberos-compatible library on yo    406 ahead of the kerberos-compatible library on your linker's command line.
407 you should not need to #include desCore.h;  ju    407 you should not need to #include desCore.h;  just include the header
408 file provided with the kerberos library.          408 file provided with the kerberos library.
409                                                   409 
410 Other uses                                        410 Other uses
411 ==========                                        411 ==========
412                                                   412 
413 the macros in desCode.h would be very useful f    413 the macros in desCode.h would be very useful for putting inline des
414 functions in more complicated encryption routi    414 functions in more complicated encryption routines.
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php