📄 api-intro.txt
字号:
Scatterlist Cryptographic API INTRODUCTIONThe Scatterlist Crypto API takes page vectors (scatterlists) asarguments, and works directly on pages. In some cases (e.g. ECBmode ciphers), this will allow for pages to be encrypted in-placewith no copying.One of the initial goals of this design was to readily support IPsec,so that processing can be applied to paged skb's without the needfor linearization.DETAILSAt the lowest level are algorithms, which register dynamically with theAPI.'Transforms' are user-instantiated objects, which maintain state, handle allof the implementation logic (e.g. manipulating page vectors), provide an abstraction to the underlying algorithms, and handle common logical operations (e.g. cipher modes, HMAC for digests). However, at the user level they are very simple.Conceptually, the API layering looks like this: [transform api] (user interface) [transform ops] (per-type logic glue e.g. cipher.c, digest.c) [algorithm api] (for registering algorithms) The idea is to make the user interface and algorithm registration APIvery simple, while hiding the core logic from both. Many good ideasfrom existing APIs such as Cryptoapi and Nettle have been adapted for this.The API currently supports three types of transforms: Ciphers, Digests andCompressors. The compression algorithms especially seem to be performingvery well so far.Support for hardware crypto devices via an asynchronous interface isunder development.Here's an example of how to use the API: #include <linux/crypto.h> struct scatterlist sg[2]; char result[128]; struct crypto_tfm *tfm; tfm = crypto_alloc_tfm("md5", 0); if (tfm == NULL) fail(); /* ... set up the scatterlists ... */ crypto_digest_init(tfm); crypto_digest_update(tfm, &sg, 2); crypto_digest_final(tfm, result); crypto_free_tfm(tfm); Many real examples are available in the regression test module (tcrypt.c).CONFIGURATION NOTESAs Triple DES is part of the DES module, for those using modular builds,add the following line to /etc/modprobe.conf: alias des3_ede desThe Null algorithms reside in the crypto_null module, so these linesshould also be added: alias cipher_null crypto_null alias digest_null crypto_null alias compress_null crypto_nullThe SHA384 algorithm shares code within the SHA512 module, so you'llalso need: alias sha384 sha512DEVELOPER NOTESTransforms may only be allocated in user context, and cryptographicmethods may only be called from softirq and user contexts.When using the API for ciphers, performance will be optimal if eachscatterlist contains data which is a multiple of the cipher's blocksize (typically 8 bytes). This prevents having to do any copyingacross non-aligned page fragment boundaries.ADDING NEW ALGORITHMSWhen submitting a new algorithm for inclusion, a mandatory requirementis that at least a few test vectors from known sources (preferablystandards) be included.Converting existing well known code is preferred, as it is more likelyto have been reviewed and widely tested. If submitting code from LGPLsources, please consider changing the license to GPL (see section 3 ofthe LGPL).Algorithms submitted must also be generally patent-free (e.g. IDEAwill not be included in the mainline until around 2011), and be basedon a recognized standard and/or have been subjected to appropriatepeer review.Also check for any RFCs which may relate to the use of specific algorithms,as well as general application notes such as RFC2451 ("The ESP CBC-ModeCipher Algorithms").It's a good idea to avoid using lots of macros and use inlined functionsinstead, as gcc does a good job with inlining, while excessive use ofmacros can cause compilation problems on some platforms.Also check the TODO list at the web site listed below to see what peoplemight already be working on.BUGSSend bug reports to:James Morris <jmorris@redhat.com>Cc: David S. Miller <davem@redhat.com>FURTHER INFORMATIONFor further patches and various updates, including the current TODOlist, see:http://samba.org/~jamesm/crypto/AUTHORSJames MorrisDavid S. MillerCREDITSThe following people provided invaluable feedback during the developmentof the API: Alexey Kuznetzov Rusty Russell Herbert Valerio Riedel Jeff Garzik Michael Richardson Andrew Morton Ingo Oeser Christoph HellwigPortions of this API were derived from the following projects: Kerneli Cryptoapi (http://www.kerneli.org/) Alexander Kjeldaas Herbert Valerio Riedel Kyle McMartin Jean-Luc Cooke David Bryson Clemens Fruhwirth Tobias Ringstrom Harald Welteand; Nettle (http://www.lysator.liu.se/~nisse/nettle/) Niels M鰈lerOriginal developers of the crypto algorithms: Dana L. How (DES) Andrew Tridgell and Steve French (MD4) Colin Plumb (MD5) Steve Reid (SHA1) Jean-Luc Cooke (SHA256, SHA384, SHA512) Kazunori Miyazawa / USAGI (HMAC) Matthew Skala (Twofish) Dag Arne Osvik (Serpent) Brian Gladman (AES) Kartikey Mahendra Bhatt (CAST6) Jon Oberheide (ARC4) Jouni Malinen (Michael MIC)SHA1 algorithm contributors: Jean-Francois Dive DES algorithm contributors: Raimar Falke Gisle S鎙ensminde Niels M鰈lerBlowfish algorithm contributors: Herbert Valerio Riedel Kyle McMartinTwofish algorithm contributors: Werner Koch Marc MutzSHA256/384/512 algorithm contributors: Andrew McDonald Kyle McMartin Herbert Valerio Riedel AES algorithm contributors: Alexander Kjeldaas Herbert Valerio Riedel Kyle McMartin Adam J. Richter Fruhwirth Clemens (i586) Linus Torvalds (i586)CAST5 algorithm contributors: Kartikey Mahendra Bhatt (original developers unknown, FSF copyright).TEA/XTEA algorithm contributors: Aaron GrotheKhazad algorithm contributors: Aaron GrotheWhirlpool algorithm contributors: Aaron Grothe Jean-Luc CookeGeneric scatterwalk code by Adam J. Richter <adam@yggdrasil.com>Please send any credits updates or corrections to:James Morris <jmorris@redhat.com>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -