bn_div.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632
  1. /* crypto/bn/bn_div.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include <openssl/bn.h>
  60. #include "cryptlib.h"
  61. #include "bn_lcl.h"
  62. /* The old slow way */
  63. #if 0
  64. int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d,
  65. BN_CTX *ctx)
  66. {
  67. int i,nm,nd;
  68. int ret = 0;
  69. BIGNUM *D;
  70. bn_check_top(m);
  71. bn_check_top(d);
  72. if (BN_is_zero(d))
  73. {
  74. BNerr(BN_F_BN_DIV,BN_R_DIV_BY_ZERO);
  75. return(0);
  76. }
  77. if (BN_ucmp(m,d) < 0)
  78. {
  79. if (rem != NULL)
  80. { if (BN_copy(rem,m) == NULL) return(0); }
  81. if (dv != NULL) BN_zero(dv);
  82. return(1);
  83. }
  84. BN_CTX_start(ctx);
  85. D = BN_CTX_get(ctx);
  86. if (dv == NULL) dv = BN_CTX_get(ctx);
  87. if (rem == NULL) rem = BN_CTX_get(ctx);
  88. if (D == NULL || dv == NULL || rem == NULL)
  89. goto end;
  90. nd=BN_num_bits(d);
  91. nm=BN_num_bits(m);
  92. if (BN_copy(D,d) == NULL) goto end;
  93. if (BN_copy(rem,m) == NULL) goto end;
  94. /* The next 2 are needed so we can do a dv->d[0]|=1 later
  95. * since BN_lshift1 will only work once there is a value :-) */
  96. BN_zero(dv);
  97. bn_wexpand(dv,1);
  98. dv->top=1;
  99. if (!BN_lshift(D,D,nm-nd)) goto end;
  100. for (i=nm-nd; i>=0; i--)
  101. {
  102. if (!BN_lshift1(dv,dv)) goto end;
  103. if (BN_ucmp(rem,D) >= 0)
  104. {
  105. dv->d[0]|=1;
  106. if (!BN_usub(rem,rem,D)) goto end;
  107. }
  108. /* CAN IMPROVE (and have now :=) */
  109. if (!BN_rshift1(D,D)) goto end;
  110. }
  111. rem->neg=BN_is_zero(rem)?0:m->neg;
  112. dv->neg=m->neg^d->neg;
  113. ret = 1;
  114. end:
  115. BN_CTX_end(ctx);
  116. return(ret);
  117. }
  118. #else
  119. #if !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM) \
  120. && !defined(PEDANTIC) && !defined(BN_DIV3W)
  121. # if defined(__GNUC__) && __GNUC__>=2
  122. # if defined(__i386) || defined (__i386__)
  123. /*
  124. * There were two reasons for implementing this template:
  125. * - GNU C generates a call to a function (__udivdi3 to be exact)
  126. * in reply to ((((BN_ULLONG)n0)<<BN_BITS2)|n1)/d0 (I fail to
  127. * understand why...);
  128. * - divl doesn't only calculate quotient, but also leaves
  129. * remainder in %edx which we can definitely use here:-)
  130. *
  131. * <appro@fy.chalmers.se>
  132. */
  133. # define bn_div_words(n0,n1,d0) \
  134. ({ asm volatile ( \
  135. "divl %4" \
  136. : "=a"(q), "=d"(rem) \
  137. : "a"(n1), "d"(n0), "g"(d0) \
  138. : "cc"); \
  139. q; \
  140. })
  141. # define REMAINDER_IS_ALREADY_CALCULATED
  142. # elif defined(__x86_64) && defined(SIXTY_FOUR_BIT_LONG)
  143. /*
  144. * Same story here, but it's 128-bit by 64-bit division. Wow!
  145. * <appro@fy.chalmers.se>
  146. */
  147. # define bn_div_words(n0,n1,d0) \
  148. ({ asm volatile ( \
  149. "divq %4" \
  150. : "=a"(q), "=d"(rem) \
  151. : "a"(n1), "d"(n0), "g"(d0) \
  152. : "cc"); \
  153. q; \
  154. })
  155. # define REMAINDER_IS_ALREADY_CALCULATED
  156. # endif /* __<cpu> */
  157. # endif /* __GNUC__ */
  158. #endif /* OPENSSL_NO_ASM */
  159. /* BN_div[_no_branch] computes dv := num / divisor, rounding towards
  160. * zero, and sets up rm such that dv*divisor + rm = num holds.
  161. * Thus:
  162. * dv->neg == num->neg ^ divisor->neg (unless the result is zero)
  163. * rm->neg == num->neg (unless the remainder is zero)
  164. * If 'dv' or 'rm' is NULL, the respective value is not returned.
  165. */
  166. static int BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num,
  167. const BIGNUM *divisor, BN_CTX *ctx);
  168. int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor,
  169. BN_CTX *ctx)
  170. {
  171. int norm_shift,i,loop;
  172. BIGNUM *tmp,wnum,*snum,*sdiv,*res;
  173. BN_ULONG *resp,*wnump;
  174. BN_ULONG d0,d1;
  175. int num_n,div_n;
  176. if ((BN_get_flags(num, BN_FLG_CONSTTIME) != 0) || (BN_get_flags(divisor, BN_FLG_CONSTTIME) != 0))
  177. {
  178. return BN_div_no_branch(dv, rm, num, divisor, ctx);
  179. }
  180. bn_check_top(dv);
  181. bn_check_top(rm);
  182. bn_check_top(num);
  183. bn_check_top(divisor);
  184. if (BN_is_zero(divisor))
  185. {
  186. BNerr(BN_F_BN_DIV,BN_R_DIV_BY_ZERO);
  187. return(0);
  188. }
  189. if (BN_ucmp(num,divisor) < 0)
  190. {
  191. if (rm != NULL)
  192. { if (BN_copy(rm,num) == NULL) return(0); }
  193. if (dv != NULL) BN_zero(dv);
  194. return(1);
  195. }
  196. BN_CTX_start(ctx);
  197. tmp=BN_CTX_get(ctx);
  198. snum=BN_CTX_get(ctx);
  199. sdiv=BN_CTX_get(ctx);
  200. if (dv == NULL)
  201. res=BN_CTX_get(ctx);
  202. else res=dv;
  203. if (sdiv == NULL || res == NULL) goto err;
  204. /* First we normalise the numbers */
  205. norm_shift=BN_BITS2-((BN_num_bits(divisor))%BN_BITS2);
  206. if (!(BN_lshift(sdiv,divisor,norm_shift))) goto err;
  207. sdiv->neg=0;
  208. norm_shift+=BN_BITS2;
  209. if (!(BN_lshift(snum,num,norm_shift))) goto err;
  210. snum->neg=0;
  211. div_n=sdiv->top;
  212. num_n=snum->top;
  213. loop=num_n-div_n;
  214. /* Lets setup a 'window' into snum
  215. * This is the part that corresponds to the current
  216. * 'area' being divided */
  217. wnum.neg = 0;
  218. wnum.d = &(snum->d[loop]);
  219. wnum.top = div_n;
  220. /* only needed when BN_ucmp messes up the values between top and max */
  221. wnum.dmax = snum->dmax - loop; /* so we don't step out of bounds */
  222. /* Get the top 2 words of sdiv */
  223. /* div_n=sdiv->top; */
  224. d0=sdiv->d[div_n-1];
  225. d1=(div_n == 1)?0:sdiv->d[div_n-2];
  226. /* pointer to the 'top' of snum */
  227. wnump= &(snum->d[num_n-1]);
  228. /* Setup to 'res' */
  229. res->neg= (num->neg^divisor->neg);
  230. if (!bn_wexpand(res,(loop+1))) goto err;
  231. res->top=loop;
  232. resp= &(res->d[loop-1]);
  233. /* space for temp */
  234. if (!bn_wexpand(tmp,(div_n+1))) goto err;
  235. if (BN_ucmp(&wnum,sdiv) >= 0)
  236. {
  237. /* If BN_DEBUG_RAND is defined BN_ucmp changes (via
  238. * bn_pollute) the const bignum arguments =>
  239. * clean the values between top and max again */
  240. bn_clear_top2max(&wnum);
  241. bn_sub_words(wnum.d, wnum.d, sdiv->d, div_n);
  242. *resp=1;
  243. }
  244. else
  245. res->top--;
  246. /* if res->top == 0 then clear the neg value otherwise decrease
  247. * the resp pointer */
  248. if (res->top == 0)
  249. res->neg = 0;
  250. else
  251. resp--;
  252. for (i=0; i<loop-1; i++, wnump--, resp--)
  253. {
  254. BN_ULONG q,l0;
  255. /* the first part of the loop uses the top two words of
  256. * snum and sdiv to calculate a BN_ULONG q such that
  257. * | wnum - sdiv * q | < sdiv */
  258. #if defined(BN_DIV3W) && !defined(OPENSSL_NO_ASM)
  259. BN_ULONG bn_div_3_words(BN_ULONG*,BN_ULONG,BN_ULONG);
  260. q=bn_div_3_words(wnump,d1,d0);
  261. #else
  262. BN_ULONG n0,n1,rem=0;
  263. n0=wnump[0];
  264. n1=wnump[-1];
  265. if (n0 == d0)
  266. q=BN_MASK2;
  267. else /* n0 < d0 */
  268. {
  269. #ifdef BN_LLONG
  270. BN_ULLONG t2;
  271. #if defined(BN_LLONG) && defined(BN_DIV2W) && !defined(bn_div_words)
  272. q=(BN_ULONG)(((((BN_ULLONG)n0)<<BN_BITS2)|n1)/d0);
  273. #else
  274. q=bn_div_words(n0,n1,d0);
  275. #ifdef BN_DEBUG_LEVITTE
  276. fprintf(stderr,"DEBUG: bn_div_words(0x%08X,0x%08X,0x%08\
  277. X) -> 0x%08X\n",
  278. n0, n1, d0, q);
  279. #endif
  280. #endif
  281. #ifndef REMAINDER_IS_ALREADY_CALCULATED
  282. /*
  283. * rem doesn't have to be BN_ULLONG. The least we
  284. * know it's less that d0, isn't it?
  285. */
  286. rem=(n1-q*d0)&BN_MASK2;
  287. #endif
  288. t2=(BN_ULLONG)d1*q;
  289. for (;;)
  290. {
  291. if (t2 <= ((((BN_ULLONG)rem)<<BN_BITS2)|wnump[-2]))
  292. break;
  293. q--;
  294. rem += d0;
  295. if (rem < d0) break; /* don't let rem overflow */
  296. t2 -= d1;
  297. }
  298. #else /* !BN_LLONG */
  299. BN_ULONG t2l,t2h,ql,qh;
  300. q=bn_div_words(n0,n1,d0);
  301. #ifdef BN_DEBUG_LEVITTE
  302. fprintf(stderr,"DEBUG: bn_div_words(0x%08X,0x%08X,0x%08\
  303. X) -> 0x%08X\n",
  304. n0, n1, d0, q);
  305. #endif
  306. #ifndef REMAINDER_IS_ALREADY_CALCULATED
  307. rem=(n1-q*d0)&BN_MASK2;
  308. #endif
  309. #if defined(BN_UMULT_LOHI)
  310. BN_UMULT_LOHI(t2l,t2h,d1,q);
  311. #elif defined(BN_UMULT_HIGH)
  312. t2l = d1 * q;
  313. t2h = BN_UMULT_HIGH(d1,q);
  314. #else
  315. t2l=LBITS(d1); t2h=HBITS(d1);
  316. ql =LBITS(q); qh =HBITS(q);
  317. mul64(t2l,t2h,ql,qh); /* t2=(BN_ULLONG)d1*q; */
  318. #endif
  319. for (;;)
  320. {
  321. if ((t2h < rem) ||
  322. ((t2h == rem) && (t2l <= wnump[-2])))
  323. break;
  324. q--;
  325. rem += d0;
  326. if (rem < d0) break; /* don't let rem overflow */
  327. if (t2l < d1) t2h--; t2l -= d1;
  328. }
  329. #endif /* !BN_LLONG */
  330. }
  331. #endif /* !BN_DIV3W */
  332. l0=bn_mul_words(tmp->d,sdiv->d,div_n,q);
  333. tmp->d[div_n]=l0;
  334. wnum.d--;
  335. /* ingore top values of the bignums just sub the two
  336. * BN_ULONG arrays with bn_sub_words */
  337. if (bn_sub_words(wnum.d, wnum.d, tmp->d, div_n+1))
  338. {
  339. /* Note: As we have considered only the leading
  340. * two BN_ULONGs in the calculation of q, sdiv * q
  341. * might be greater than wnum (but then (q-1) * sdiv
  342. * is less or equal than wnum)
  343. */
  344. q--;
  345. if (bn_add_words(wnum.d, wnum.d, sdiv->d, div_n))
  346. /* we can't have an overflow here (assuming
  347. * that q != 0, but if q == 0 then tmp is
  348. * zero anyway) */
  349. (*wnump)++;
  350. }
  351. /* store part of the result */
  352. *resp = q;
  353. }
  354. bn_correct_top(snum);
  355. if (rm != NULL)
  356. {
  357. /* Keep a copy of the neg flag in num because if rm==num
  358. * BN_rshift() will overwrite it.
  359. */
  360. int neg = num->neg;
  361. BN_rshift(rm,snum,norm_shift);
  362. if (!BN_is_zero(rm))
  363. rm->neg = neg;
  364. bn_check_top(rm);
  365. }
  366. BN_CTX_end(ctx);
  367. return(1);
  368. err:
  369. bn_check_top(rm);
  370. BN_CTX_end(ctx);
  371. return(0);
  372. }
  373. /* BN_div_no_branch is a special version of BN_div. It does not contain
  374. * branches that may leak sensitive information.
  375. */
  376. static int BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num,
  377. const BIGNUM *divisor, BN_CTX *ctx)
  378. {
  379. int norm_shift,i,loop;
  380. BIGNUM *tmp,wnum,*snum,*sdiv,*res;
  381. BN_ULONG *resp,*wnump;
  382. BN_ULONG d0,d1;
  383. int num_n,div_n;
  384. bn_check_top(dv);
  385. bn_check_top(rm);
  386. bn_check_top(num);
  387. bn_check_top(divisor);
  388. if (BN_is_zero(divisor))
  389. {
  390. BNerr(BN_F_BN_DIV_NO_BRANCH,BN_R_DIV_BY_ZERO);
  391. return(0);
  392. }
  393. BN_CTX_start(ctx);
  394. tmp=BN_CTX_get(ctx);
  395. snum=BN_CTX_get(ctx);
  396. sdiv=BN_CTX_get(ctx);
  397. if (dv == NULL)
  398. res=BN_CTX_get(ctx);
  399. else res=dv;
  400. if (sdiv == NULL || res == NULL) goto err;
  401. /* First we normalise the numbers */
  402. norm_shift=BN_BITS2-((BN_num_bits(divisor))%BN_BITS2);
  403. if (!(BN_lshift(sdiv,divisor,norm_shift))) goto err;
  404. sdiv->neg=0;
  405. norm_shift+=BN_BITS2;
  406. if (!(BN_lshift(snum,num,norm_shift))) goto err;
  407. snum->neg=0;
  408. /* Since we don't know whether snum is larger than sdiv,
  409. * we pad snum with enough zeroes without changing its
  410. * value.
  411. */
  412. if (snum->top <= sdiv->top+1)
  413. {
  414. if (bn_wexpand(snum, sdiv->top + 2) == NULL) goto err;
  415. for (i = snum->top; i < sdiv->top + 2; i++) snum->d[i] = 0;
  416. snum->top = sdiv->top + 2;
  417. }
  418. else
  419. {
  420. if (bn_wexpand(snum, snum->top + 1) == NULL) goto err;
  421. snum->d[snum->top] = 0;
  422. snum->top ++;
  423. }
  424. div_n=sdiv->top;
  425. num_n=snum->top;
  426. loop=num_n-div_n;
  427. /* Lets setup a 'window' into snum
  428. * This is the part that corresponds to the current
  429. * 'area' being divided */
  430. wnum.neg = 0;
  431. wnum.d = &(snum->d[loop]);
  432. wnum.top = div_n;
  433. /* only needed when BN_ucmp messes up the values between top and max */
  434. wnum.dmax = snum->dmax - loop; /* so we don't step out of bounds */
  435. /* Get the top 2 words of sdiv */
  436. /* div_n=sdiv->top; */
  437. d0=sdiv->d[div_n-1];
  438. d1=(div_n == 1)?0:sdiv->d[div_n-2];
  439. /* pointer to the 'top' of snum */
  440. wnump= &(snum->d[num_n-1]);
  441. /* Setup to 'res' */
  442. res->neg= (num->neg^divisor->neg);
  443. if (!bn_wexpand(res,(loop+1))) goto err;
  444. res->top=loop-1;
  445. resp= &(res->d[loop-1]);
  446. /* space for temp */
  447. if (!bn_wexpand(tmp,(div_n+1))) goto err;
  448. /* if res->top == 0 then clear the neg value otherwise decrease
  449. * the resp pointer */
  450. if (res->top == 0)
  451. res->neg = 0;
  452. else
  453. resp--;
  454. for (i=0; i<loop-1; i++, wnump--, resp--)
  455. {
  456. BN_ULONG q,l0;
  457. /* the first part of the loop uses the top two words of
  458. * snum and sdiv to calculate a BN_ULONG q such that
  459. * | wnum - sdiv * q | < sdiv */
  460. #if defined(BN_DIV3W) && !defined(OPENSSL_NO_ASM)
  461. BN_ULONG bn_div_3_words(BN_ULONG*,BN_ULONG,BN_ULONG);
  462. q=bn_div_3_words(wnump,d1,d0);
  463. #else
  464. BN_ULONG n0,n1,rem=0;
  465. n0=wnump[0];
  466. n1=wnump[-1];
  467. if (n0 == d0)
  468. q=BN_MASK2;
  469. else /* n0 < d0 */
  470. {
  471. #ifdef BN_LLONG
  472. BN_ULLONG t2;
  473. #if defined(BN_LLONG) && defined(BN_DIV2W) && !defined(bn_div_words)
  474. q=(BN_ULONG)(((((BN_ULLONG)n0)<<BN_BITS2)|n1)/d0);
  475. #else
  476. q=bn_div_words(n0,n1,d0);
  477. #ifdef BN_DEBUG_LEVITTE
  478. fprintf(stderr,"DEBUG: bn_div_words(0x%08X,0x%08X,0x%08\
  479. X) -> 0x%08X\n",
  480. n0, n1, d0, q);
  481. #endif
  482. #endif
  483. #ifndef REMAINDER_IS_ALREADY_CALCULATED
  484. /*
  485. * rem doesn't have to be BN_ULLONG. The least we
  486. * know it's less that d0, isn't it?
  487. */
  488. rem=(n1-q*d0)&BN_MASK2;
  489. #endif
  490. t2=(BN_ULLONG)d1*q;
  491. for (;;)
  492. {
  493. if (t2 <= ((((BN_ULLONG)rem)<<BN_BITS2)|wnump[-2]))
  494. break;
  495. q--;
  496. rem += d0;
  497. if (rem < d0) break; /* don't let rem overflow */
  498. t2 -= d1;
  499. }
  500. #else /* !BN_LLONG */
  501. BN_ULONG t2l,t2h,ql,qh;
  502. q=bn_div_words(n0,n1,d0);
  503. #ifdef BN_DEBUG_LEVITTE
  504. fprintf(stderr,"DEBUG: bn_div_words(0x%08X,0x%08X,0x%08\
  505. X) -> 0x%08X\n",
  506. n0, n1, d0, q);
  507. #endif
  508. #ifndef REMAINDER_IS_ALREADY_CALCULATED
  509. rem=(n1-q*d0)&BN_MASK2;
  510. #endif
  511. #if defined(BN_UMULT_LOHI)
  512. BN_UMULT_LOHI(t2l,t2h,d1,q);
  513. #elif defined(BN_UMULT_HIGH)
  514. t2l = d1 * q;
  515. t2h = BN_UMULT_HIGH(d1,q);
  516. #else
  517. t2l=LBITS(d1); t2h=HBITS(d1);
  518. ql =LBITS(q); qh =HBITS(q);
  519. mul64(t2l,t2h,ql,qh); /* t2=(BN_ULLONG)d1*q; */
  520. #endif
  521. for (;;)
  522. {
  523. if ((t2h < rem) ||
  524. ((t2h == rem) && (t2l <= wnump[-2])))
  525. break;
  526. q--;
  527. rem += d0;
  528. if (rem < d0) break; /* don't let rem overflow */
  529. if (t2l < d1) t2h--; t2l -= d1;
  530. }
  531. #endif /* !BN_LLONG */
  532. }
  533. #endif /* !BN_DIV3W */
  534. l0=bn_mul_words(tmp->d,sdiv->d,div_n,q);
  535. tmp->d[div_n]=l0;
  536. wnum.d--;
  537. /* ingore top values of the bignums just sub the two
  538. * BN_ULONG arrays with bn_sub_words */
  539. if (bn_sub_words(wnum.d, wnum.d, tmp->d, div_n+1))
  540. {
  541. /* Note: As we have considered only the leading
  542. * two BN_ULONGs in the calculation of q, sdiv * q
  543. * might be greater than wnum (but then (q-1) * sdiv
  544. * is less or equal than wnum)
  545. */
  546. q--;
  547. if (bn_add_words(wnum.d, wnum.d, sdiv->d, div_n))
  548. /* we can't have an overflow here (assuming
  549. * that q != 0, but if q == 0 then tmp is
  550. * zero anyway) */
  551. (*wnump)++;
  552. }
  553. /* store part of the result */
  554. *resp = q;
  555. }
  556. bn_correct_top(snum);
  557. if (rm != NULL)
  558. {
  559. /* Keep a copy of the neg flag in num because if rm==num
  560. * BN_rshift() will overwrite it.
  561. */
  562. int neg = num->neg;
  563. BN_rshift(rm,snum,norm_shift);
  564. if (!BN_is_zero(rm))
  565. rm->neg = neg;
  566. bn_check_top(rm);
  567. }
  568. bn_correct_top(res);
  569. BN_CTX_end(ctx);
  570. return(1);
  571. err:
  572. bn_check_top(rm);
  573. BN_CTX_end(ctx);
  574. return(0);
  575. }
  576. #endif