bn_word.c 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. /* crypto/bn/bn_word.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #include "bn_lcl.h"
  61. BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w)
  62. {
  63. #ifndef BN_LLONG
  64. BN_ULONG ret=0;
  65. #else
  66. BN_ULLONG ret=0;
  67. #endif
  68. int i;
  69. if (w == 0)
  70. return (BN_ULONG)-1;
  71. bn_check_top(a);
  72. w&=BN_MASK2;
  73. for (i=a->top-1; i>=0; i--)
  74. {
  75. #ifndef BN_LLONG
  76. ret=((ret<<BN_BITS4)|((a->d[i]>>BN_BITS4)&BN_MASK2l))%w;
  77. ret=((ret<<BN_BITS4)|(a->d[i]&BN_MASK2l))%w;
  78. #else
  79. ret=(BN_ULLONG)(((ret<<(BN_ULLONG)BN_BITS2)|a->d[i])%
  80. (BN_ULLONG)w);
  81. #endif
  82. }
  83. return((BN_ULONG)ret);
  84. }
  85. BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w)
  86. {
  87. BN_ULONG ret = 0;
  88. int i, j;
  89. bn_check_top(a);
  90. w &= BN_MASK2;
  91. if (!w)
  92. /* actually this an error (division by zero) */
  93. return (BN_ULONG)-1;
  94. if (a->top == 0)
  95. return 0;
  96. /* normalize input (so bn_div_words doesn't complain) */
  97. j = BN_BITS2 - BN_num_bits_word(w);
  98. w <<= j;
  99. if (!BN_lshift(a, a, j))
  100. return (BN_ULONG)-1;
  101. for (i=a->top-1; i>=0; i--)
  102. {
  103. BN_ULONG l,d;
  104. l=a->d[i];
  105. d=bn_div_words(ret,l,w);
  106. ret=(l-((d*w)&BN_MASK2))&BN_MASK2;
  107. a->d[i]=d;
  108. }
  109. if ((a->top > 0) && (a->d[a->top-1] == 0))
  110. a->top--;
  111. ret >>= j;
  112. bn_check_top(a);
  113. return(ret);
  114. }
  115. int BN_add_word(BIGNUM *a, BN_ULONG w)
  116. {
  117. BN_ULONG l;
  118. int i;
  119. bn_check_top(a);
  120. w &= BN_MASK2;
  121. /* degenerate case: w is zero */
  122. if (!w) return 1;
  123. /* degenerate case: a is zero */
  124. if(BN_is_zero(a)) return BN_set_word(a, w);
  125. /* handle 'a' when negative */
  126. if (a->neg)
  127. {
  128. a->neg=0;
  129. i=BN_sub_word(a,w);
  130. if (!BN_is_zero(a))
  131. a->neg=!(a->neg);
  132. return(i);
  133. }
  134. /* Only expand (and risk failing) if it's possibly necessary */
  135. if (((BN_ULONG)(a->d[a->top - 1] + 1) == 0) &&
  136. (bn_wexpand(a,a->top+1) == NULL))
  137. return(0);
  138. i=0;
  139. for (;;)
  140. {
  141. if (i >= a->top)
  142. l=w;
  143. else
  144. l=(a->d[i]+w)&BN_MASK2;
  145. a->d[i]=l;
  146. if (w > l)
  147. w=1;
  148. else
  149. break;
  150. i++;
  151. }
  152. if (i >= a->top)
  153. a->top++;
  154. bn_check_top(a);
  155. return(1);
  156. }
  157. int BN_sub_word(BIGNUM *a, BN_ULONG w)
  158. {
  159. int i;
  160. bn_check_top(a);
  161. w &= BN_MASK2;
  162. /* degenerate case: w is zero */
  163. if (!w) return 1;
  164. /* degenerate case: a is zero */
  165. if(BN_is_zero(a))
  166. {
  167. i = BN_set_word(a,w);
  168. if (i != 0)
  169. BN_set_negative(a, 1);
  170. return i;
  171. }
  172. /* handle 'a' when negative */
  173. if (a->neg)
  174. {
  175. a->neg=0;
  176. i=BN_add_word(a,w);
  177. a->neg=1;
  178. return(i);
  179. }
  180. if ((a->top == 1) && (a->d[0] < w))
  181. {
  182. a->d[0]=w-a->d[0];
  183. a->neg=1;
  184. return(1);
  185. }
  186. i=0;
  187. for (;;)
  188. {
  189. if (a->d[i] >= w)
  190. {
  191. a->d[i]-=w;
  192. break;
  193. }
  194. else
  195. {
  196. a->d[i]=(a->d[i]-w)&BN_MASK2;
  197. i++;
  198. w=1;
  199. }
  200. }
  201. if ((a->d[i] == 0) && (i == (a->top-1)))
  202. a->top--;
  203. bn_check_top(a);
  204. return(1);
  205. }
  206. int BN_mul_word(BIGNUM *a, BN_ULONG w)
  207. {
  208. BN_ULONG ll;
  209. bn_check_top(a);
  210. w&=BN_MASK2;
  211. if (a->top)
  212. {
  213. if (w == 0)
  214. BN_zero(a);
  215. else
  216. {
  217. ll=bn_mul_words(a->d,a->d,a->top,w);
  218. if (ll)
  219. {
  220. if (bn_wexpand(a,a->top+1) == NULL) return(0);
  221. a->d[a->top++]=ll;
  222. }
  223. }
  224. }
  225. bn_check_top(a);
  226. return(1);
  227. }