tech-crypto archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Patch: cprng_fast performance - please review.



On Fri, Apr 18, 2014 at 10:27:45PM +0900, Izumi Tsutsui wrote:
> 
> Note the caller of this hc128_init() is:
> 
> > > +static void
> > > +cprng_fast_randrekey(cprng_fast_ctx_t *ctx)
> > > +{
> > > + uint8_t key[16], iv[16];
> > > + hc128_state_t tempstate;
> > > + int s;
> > > +
> > > + int have_initial = rnd_initial_entropy;
> > > +
> > > + cprng_strong(kern_cprng, key, sizeof(key), FASYNC);
> > > + cprng_strong(kern_cprng, iv, sizeof(iv), FASYNC);
> > > + /* Rekey the hc128 state - expensive, don't do this at splhigh.  */
> > > + hc128_init(&ctx->hc128, key, iv);
> 
> The "hc128_state_t" is declared as:
> 
> > > +typedef struct
> > > +{
> > > + uint32_t p[512];
> > > + uint32_t q[512];
> > > + uint16_t i;
> > > +} hc128_state_t;
> 
> so it already consumes >4KB stack.
> I'm afraid "9KB stack on rekeying" is fatal on most ports.

How do you count to 9K?  I see:

        2K for p
        2K for q
        1280 bytes for w

I don't see another copy of p and q on the stack here.  Did I miss one?
The hc_128_state_t embedded in the cprng_fast_ctx is not on the stack,
it was allocated with percpu_alloc.

Thor


Home | Main Index | Thread Index | Old Index