mirror of
				https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
				synced 2025-10-31 07:02:06 +00:00 
			
		
		
		
	 d533f67185
			
		
	
	
		d533f67185
		
	
	
	
	
		
			
			The attached patch fixes the following spelling errors in Documentation/
        - double "the"
        - Several misspellings of function/functionality
        - infomation
        - memeory
        - Recieved
        - wether
and possibly others which I forgot ;-)
Trailing whitespaces on the same line as the typo are also deleted.
Signed-off-by: Tobias Klauser <tklauser@nuerscht.ch>
Signed-off-by: Domen Puncer <domen@coderock.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
		
	
			
		
			
				
	
	
		
			353 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			353 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| Below is the original README file from the descore.shar package.
 | |
| ------------------------------------------------------------------------------
 | |
| 
 | |
| des - fast & portable DES encryption & decryption.
 | |
| Copyright (C) 1992  Dana L. How
 | |
| 
 | |
| This program is free software; you can redistribute it and/or modify
 | |
| it under the terms of the GNU Library General Public License as published by
 | |
| the Free Software Foundation; either version 2 of the License, or
 | |
| (at your option) any later version.
 | |
| 
 | |
| This program is distributed in the hope that it will be useful,
 | |
| but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| GNU Library General Public License for more details.
 | |
| 
 | |
| You should have received a copy of the GNU Library General Public License
 | |
| along with this program; if not, write to the Free Software
 | |
| Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 | |
| 
 | |
| Author's address: how@isl.stanford.edu
 | |
| 
 | |
| $Id: README,v 1.15 1992/05/20 00:25:32 how E $
 | |
| 
 | |
| 
 | |
| ==>> To compile after untarring/unsharring, just `make' <<==
 | |
| 
 | |
| 
 | |
| This package was designed with the following goals:
 | |
| 1.	Highest possible encryption/decryption PERFORMANCE.
 | |
| 2.	PORTABILITY to any byte-addressable host with a 32bit unsigned C type
 | |
| 3.	Plug-compatible replacement for KERBEROS's low-level routines.
 | |
| 
 | |
| This second release includes a number of performance enhancements for
 | |
| register-starved machines.  My discussions with Richard Outerbridge,
 | |
| 71755.204@compuserve.com, sparked a number of these enhancements.
 | |
| 
 | |
| To more rapidly understand the code in this package, inspect desSmallFips.i
 | |
| (created by typing `make') BEFORE you tackle desCode.h.  The latter is set
 | |
| up in a parameterized fashion so it can easily be modified by speed-daemon
 | |
| hackers in pursuit of that last microsecond.  You will find it more
 | |
| illuminating to inspect one specific implementation,
 | |
| and then move on to the common abstract skeleton with this one in mind.
 | |
| 
 | |
| 
 | |
| performance comparison to other available des code which i could
 | |
| compile on a SPARCStation 1 (cc -O4, gcc -O2):
 | |
| 
 | |
| this code (byte-order independent):
 | |
|    30us per encryption (options: 64k tables, no IP/FP)
 | |
|    33us per encryption (options: 64k tables, FIPS standard bit ordering)
 | |
|    45us per encryption (options:  2k tables, no IP/FP)
 | |
|    48us per encryption (options:  2k tables, FIPS standard bit ordering)
 | |
|   275us to set a new key (uses 1k of key tables)
 | |
| 	this has the quickest encryption/decryption routines i've seen.
 | |
| 	since i was interested in fast des filters rather than crypt(3)
 | |
| 	and password cracking, i haven't really bothered yet to speed up
 | |
| 	the key setting routine. also, i have no interest in re-implementing
 | |
| 	all the other junk in the mit kerberos des library, so i've just
 | |
| 	provided my routines with little stub interfaces so they can be
 | |
| 	used as drop-in replacements with mit's code or any of the mit-
 | |
| 	compatible packages below. (note that the first two timings above
 | |
| 	are highly variable because of cache effects).
 | |
| 
 | |
| kerberos des replacement from australia (version 1.95):
 | |
|    53us per encryption (uses 2k of tables)
 | |
|    96us to set a new key (uses 2.25k of key tables)
 | |
| 	so despite the author's inclusion of some of the performance
 | |
| 	improvements i had suggested to him, this package's
 | |
| 	encryption/decryption is still slower on the sparc and 68000.
 | |
| 	more specifically, 19-40% slower on the 68020 and 11-35% slower
 | |
| 	on the sparc,  depending on the compiler;
 | |
| 	in full gory detail (ALT_ECB is a libdes variant):
 | |
| 	compiler   	machine		desCore	libdes	ALT_ECB	slower by
 | |
| 	gcc 2.1 -O2	Sun 3/110	304  uS	369.5uS	461.8uS	 22%
 | |
| 	cc      -O1	Sun 3/110	336  uS	436.6uS	399.3uS	 19%
 | |
| 	cc      -O2	Sun 3/110	360  uS	532.4uS	505.1uS	 40%
 | |
| 	cc      -O4	Sun 3/110	365  uS	532.3uS	505.3uS	 38%
 | |
| 	gcc 2.1 -O2	Sun 4/50	 48  uS	 53.4uS	 57.5uS	 11%
 | |
| 	cc      -O2	Sun 4/50	 48  uS	 64.6uS	 64.7uS	 35%
 | |
| 	cc      -O4	Sun 4/50	 48  uS	 64.7uS	 64.9uS	 35%
 | |
| 	(my time measurements are not as accurate as his).
 | |
|    the comments in my first release of desCore on version 1.92:
 | |
|    68us per encryption (uses 2k of tables)
 | |
|    96us to set a new key (uses 2.25k of key tables)
 | |
| 	this is a very nice package which implements the most important
 | |
| 	of the optimizations which i did in my encryption routines.
 | |
| 	it's a bit weak on common low-level optimizations which is why
 | |
| 	it's 39%-106% slower.  because he was interested in fast crypt(3) and
 | |
| 	password-cracking applications,  he also used the same ideas to
 | |
| 	speed up the key-setting routines with impressive results.
 | |
| 	(at some point i may do the same in my package).  he also implements
 | |
| 	the rest of the mit des library.
 | |
| 	(code from eay@psych.psy.uq.oz.au via comp.sources.misc)
 | |
| 
 | |
| fast crypt(3) package from denmark:
 | |
| 	the des routine here is buried inside a loop to do the
 | |
| 	crypt function and i didn't feel like ripping it out and measuring
 | |
| 	performance. his code takes 26 sparc instructions to compute one
 | |
| 	des iteration; above, Quick (64k) takes 21 and Small (2k) takes 37.
 | |
| 	he claims to use 280k of tables but the iteration calculation seems
 | |
| 	to use only 128k.  his tables and code are machine independent.
 | |
| 	(code from glad@daimi.aau.dk via alt.sources or comp.sources.misc)
 | |
| 
 | |
| swedish reimplementation of Kerberos des library
 | |
|   108us per encryption (uses 34k worth of tables)
 | |
|   134us to set a new key (uses 32k of key tables to get this speed!)
 | |
| 	the tables used seem to be machine-independent;
 | |
| 	he seems to have included a lot of special case code
 | |
| 	so that, e.g., `long' loads can be used instead of 4 `char' loads
 | |
| 	when the machine's architecture allows it.
 | |
| 	(code obtained from chalmers.se:pub/des)
 | |
| 
 | |
| crack 3.3c package from england:
 | |
| 	as in crypt above, the des routine is buried in a loop. it's
 | |
| 	also very modified for crypt.  his iteration code uses 16k
 | |
| 	of tables and appears to be slow.
 | |
| 	(code obtained from aem@aber.ac.uk via alt.sources or comp.sources.misc)
 | |
| 
 | |
| ``highly optimized'' and tweaked Kerberos/Athena code (byte-order dependent):
 | |
|   165us per encryption (uses 6k worth of tables)
 | |
|   478us to set a new key (uses <1k of key tables)
 | |
| 	so despite the comments in this code, it was possible to get
 | |
| 	faster code AND smaller tables, as well as making the tables
 | |
| 	machine-independent.
 | |
| 	(code obtained from prep.ai.mit.edu)
 | |
| 
 | |
| UC Berkeley code (depends on machine-endedness):
 | |
|   226us per encryption
 | |
| 10848us to set a new key
 | |
| 	table sizes are unclear, but they don't look very small
 | |
| 	(code obtained from wuarchive.wustl.edu)
 | |
| 
 | |
| 
 | |
| motivation and history
 | |
| 
 | |
| a while ago i wanted some des routines and the routines documented on sun's
 | |
| man pages either didn't exist or dumped core.  i had heard of kerberos,
 | |
| and knew that it used des,  so i figured i'd use its routines.  but once
 | |
| i got it and looked at the code,  it really set off a lot of pet peeves -
 | |
| it was too convoluted, the code had been written without taking
 | |
| advantage of the regular structure of operations such as IP, E, and FP
 | |
| (i.e. the author didn't sit down and think before coding),
 | |
| it was excessively slow,  the author had attempted to clarify the code
 | |
| by adding MORE statements to make the data movement more `consistent'
 | |
| instead of simplifying his implementation and cutting down on all data
 | |
| movement (in particular, his use of L1, R1, L2, R2), and it was full of
 | |
| idiotic `tweaks' for particular machines which failed to deliver significant
 | |
| speedups but which did obfuscate everything.  so i took the test data
 | |
| from his verification program and rewrote everything else.
 | |
| 
 | |
| a while later i ran across the great crypt(3) package mentioned above.
 | |
| the fact that this guy was computing 2 sboxes per table lookup rather
 | |
| than one (and using a MUCH larger table in the process) emboldened me to
 | |
| do the same - it was a trivial change from which i had been scared away
 | |
| by the larger table size.  in his case he didn't realize you don't need to keep
 | |
| the working data in TWO forms, one for easy use of half the sboxes in
 | |
| indexing, the other for easy use of the other half; instead you can keep
 | |
| it in the form for the first half and use a simple rotate to get the other
 | |
| half.  this means i have (almost) half the data manipulation and half
 | |
| the table size.  in fairness though he might be encoding something particular
 | |
| to crypt(3) in his tables - i didn't check.
 | |
| 
 | |
| i'm glad that i implemented it the way i did, because this C version is
 | |
| portable (the ifdef's are performance enhancements) and it is faster
 | |
| than versions hand-written in assembly for the sparc!
 | |
| 
 | |
| 
 | |
| porting notes
 | |
| 
 | |
| one thing i did not want to do was write an enormous mess
 | |
| which depended on endedness and other machine quirks,
 | |
| and which necessarily produced different code and different lookup tables
 | |
| for different machines.  see the kerberos code for an example
 | |
| of what i didn't want to do; all their endedness-specific `optimizations'
 | |
| obfuscate the code and in the end were slower than a simpler machine
 | |
| independent approach.  however, there are always some portability
 | |
| considerations of some kind, and i have included some options
 | |
| for varying numbers of register variables.
 | |
| perhaps some will still regard the result as a mess!
 | |
| 
 | |
| 1) i assume everything is byte addressable, although i don't actually
 | |
|    depend on the byte order, and that bytes are 8 bits.
 | |
|    i assume word pointers can be freely cast to and from char pointers.
 | |
|    note that 99% of C programs make these assumptions.
 | |
|    i always use unsigned char's if the high bit could be set.
 | |
| 2) the typedef `word' means a 32 bit unsigned integral type.
 | |
|    if `unsigned long' is not 32 bits, change the typedef in desCore.h.
 | |
|    i assume sizeof(word) == 4 EVERYWHERE.
 | |
| 
 | |
| the (worst-case) cost of my NOT doing endedness-specific optimizations
 | |
| in the data loading and storing code surrounding the key iterations
 | |
| is less than 12%.  also, there is the added benefit that
 | |
| the input and output work areas do not need to be word-aligned.
 | |
| 
 | |
| 
 | |
| OPTIONAL performance optimizations
 | |
| 
 | |
| 1) you should define one of `i386,' `vax,' `mc68000,' or `sparc,'
 | |
|    whichever one is closest to the capabilities of your machine.
 | |
|    see the start of desCode.h to see exactly what this selection implies.
 | |
|    note that if you select the wrong one, the des code will still work;
 | |
|    these are just performance tweaks.
 | |
| 2) for those with functional `asm' keywords: you should change the
 | |
|    ROR and ROL macros to use machine rotate instructions if you have them.
 | |
|    this will save 2 instructions and a temporary per use,
 | |
|    or about 32 to 40 instructions per en/decryption.
 | |
|    note that gcc is smart enough to translate the ROL/R macros into
 | |
|    machine rotates!
 | |
| 
 | |
| these optimizations are all rather persnickety, yet with them you should
 | |
| be able to get performance equal to assembly-coding, except that:
 | |
| 1) with the lack of a bit rotate operator in C, rotates have to be synthesized
 | |
|    from shifts.  so access to `asm' will speed things up if your machine
 | |
|    has rotates, as explained above in (3) (not necessary if you use gcc).
 | |
| 2) if your machine has less than 12 32-bit registers i doubt your compiler will
 | |
|    generate good code.
 | |
|    `i386' tries to configure the code for a 386 by only declaring 3 registers
 | |
|    (it appears that gcc can use ebx, esi and edi to hold register variables).
 | |
|    however, if you like assembly coding, the 386 does have 7 32-bit registers,
 | |
|    and if you use ALL of them, use `scaled by 8' address modes with displacement
 | |
|    and other tricks, you can get reasonable routines for DesQuickCore... with
 | |
|    about 250 instructions apiece.  For DesSmall... it will help to rearrange
 | |
|    des_keymap, i.e., now the sbox # is the high part of the index and
 | |
|    the 6 bits of data is the low part; it helps to exchange these.
 | |
|    since i have no way to conveniently test it i have not provided my
 | |
|    shoehorned 386 version.  note that with this release of desCore, gcc is able
 | |
|    to put everything in registers(!), and generate about 370 instructions apiece
 | |
|    for the DesQuickCore... routines!
 | |
| 
 | |
| coding notes
 | |
| 
 | |
| the en/decryption routines each use 6 necessary register variables,
 | |
| with 4 being actively used at once during the inner iterations.
 | |
| if you don't have 4 register variables get a new machine.
 | |
| up to 8 more registers are used to hold constants in some configurations.
 | |
| 
 | |
| i assume that the use of a constant is more expensive than using a register:
 | |
| a) additionally, i have tried to put the larger constants in registers.
 | |
|    registering priority was by the following:
 | |
| 	anything more than 12 bits (bad for RISC and CISC)
 | |
| 	greater than 127 in value (can't use movq or byte immediate on CISC)
 | |
| 	9-127 (may not be able to use CISC shift immediate or add/sub quick),
 | |
| 	1-8 were never registered, being the cheapest constants.
 | |
| b) the compiler may be too stupid to realize table and table+256 should
 | |
|    be assigned to different constant registers and instead repetitively
 | |
|    do the arithmetic, so i assign these to explicit `m' register variables
 | |
|    when possible and helpful.
 | |
| 
 | |
| i assume that indexing is cheaper or equivalent to auto increment/decrement,
 | |
| where the index is 7 bits unsigned or smaller.
 | |
| this assumption is reversed for 68k and vax.
 | |
| 
 | |
| i assume that addresses can be cheaply formed from two registers,
 | |
| or from a register and a small constant.
 | |
| for the 68000, the `two registers and small offset' form is used sparingly.
 | |
| all index scaling is done explicitly - no hidden shifts by log2(sizeof).
 | |
| 
 | |
| the code is written so that even a dumb compiler
 | |
| should never need more than one hidden temporary,
 | |
| increasing the chance that everything will fit in the registers.
 | |
| KEEP THIS MORE SUBTLE POINT IN MIND IF YOU REWRITE ANYTHING.
 | |
| (actually, there are some code fragments now which do require two temps,
 | |
| but fixing it would either break the structure of the macros or
 | |
| require declaring another temporary).
 | |
| 
 | |
| 
 | |
| special efficient data format
 | |
| 
 | |
| bits are manipulated in this arrangement most of the time (S7 S5 S3 S1):
 | |
| 	003130292827xxxx242322212019xxxx161514131211xxxx080706050403xxxx
 | |
| (the x bits are still there, i'm just emphasizing where the S boxes are).
 | |
| bits are rotated left 4 when computing S6 S4 S2 S0:
 | |
| 	282726252423xxxx201918171615xxxx121110090807xxxx040302010031xxxx
 | |
| the rightmost two bits are usually cleared so the lower byte can be used
 | |
| as an index into an sbox mapping table. the next two x'd bits are set
 | |
| to various values to access different parts of the tables.
 | |
| 
 | |
| 
 | |
| how to use the routines
 | |
| 
 | |
| datatypes:
 | |
| 	pointer to 8 byte area of type DesData
 | |
| 	used to hold keys and input/output blocks to des.
 | |
| 
 | |
| 	pointer to 128 byte area of type DesKeys
 | |
| 	used to hold full 768-bit key.
 | |
| 	must be long-aligned.
 | |
| 
 | |
| DesQuickInit()
 | |
| 	call this before using any other routine with `Quick' in its name.
 | |
| 	it generates the special 64k table these routines need.
 | |
| DesQuickDone()
 | |
| 	frees this table
 | |
| 
 | |
| DesMethod(m, k)
 | |
| 	m points to a 128byte block, k points to an 8 byte des key
 | |
| 	which must have odd parity (or -1 is returned) and which must
 | |
| 	not be a (semi-)weak key (or -2 is returned).
 | |
| 	normally DesMethod() returns 0.
 | |
| 	m is filled in from k so that when one of the routines below
 | |
| 	is called with m, the routine will act like standard des
 | |
| 	en/decryption with the key k. if you use DesMethod,
 | |
| 	you supply a standard 56bit key; however, if you fill in
 | |
| 	m yourself, you will get a 768bit key - but then it won't
 | |
| 	be standard.  it's 768bits not 1024 because the least significant
 | |
| 	two bits of each byte are not used.  note that these two bits
 | |
| 	will be set to magic constants which speed up the encryption/decryption
 | |
| 	on some machines.  and yes, each byte controls
 | |
| 	a specific sbox during a specific iteration.
 | |
| 	you really shouldn't use the 768bit format directly;  i should
 | |
| 	provide a routine that converts 128 6-bit bytes (specified in
 | |
| 	S-box mapping order or something) into the right format for you.
 | |
| 	this would entail some byte concatenation and rotation.
 | |
| 
 | |
| Des{Small|Quick}{Fips|Core}{Encrypt|Decrypt}(d, m, s)
 | |
| 	performs des on the 8 bytes at s into the 8 bytes at d. (d,s: char *).
 | |
| 	uses m as a 768bit key as explained above.
 | |
| 	the Encrypt|Decrypt choice is obvious.
 | |
| 	Fips|Core determines whether a completely standard FIPS initial
 | |
| 	and final permutation is done; if not, then the data is loaded
 | |
| 	and stored in a nonstandard bit order (FIPS w/o IP/FP).
 | |
| 	Fips slows down Quick by 10%, Small by 9%.
 | |
| 	Small|Quick determines whether you use the normal routine
 | |
| 	or the crazy quick one which gobbles up 64k more of memory.
 | |
| 	Small is 50% slower then Quick, but Quick needs 32 times as much
 | |
| 	memory.  Quick is included for programs that do nothing but DES,
 | |
| 	e.g., encryption filters, etc.
 | |
| 
 | |
| 
 | |
| Getting it to compile on your machine
 | |
| 
 | |
| there are no machine-dependencies in the code (see porting),
 | |
| except perhaps the `now()' macro in desTest.c.
 | |
| ALL generated tables are machine independent.
 | |
| you should edit the Makefile with the appropriate optimization flags
 | |
| for your compiler (MAX optimization).
 | |
| 
 | |
| 
 | |
| Speeding up kerberos (and/or its des library)
 | |
| 
 | |
| note that i have included a kerberos-compatible interface in desUtil.c
 | |
| through the functions des_key_sched() and des_ecb_encrypt().
 | |
| to use these with kerberos or kerberos-compatible code put desCore.a
 | |
| ahead of the kerberos-compatible library on your linker's command line.
 | |
| you should not need to #include desCore.h;  just include the header
 | |
| file provided with the kerberos library.
 | |
| 
 | |
| Other uses
 | |
| 
 | |
| the macros in desCode.h would be very useful for putting inline des
 | |
| functions in more complicated encryption routines.
 |