diff options
| author | beck <> | 2002-05-15 02:29:21 +0000 |
|---|---|---|
| committer | beck <> | 2002-05-15 02:29:21 +0000 |
| commit | b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9 (patch) | |
| tree | fa27cf82a1250b64ed3bf5f4a18c7354d470bbcc /src/lib/libcrypto/bn | |
| parent | e471e1ea98d673597b182ea85f29e30c97cd08b5 (diff) | |
| download | openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.tar.gz openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.tar.bz2 openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.zip | |
OpenSSL 0.9.7 stable 2002 05 08 merge
Diffstat (limited to 'src/lib/libcrypto/bn')
33 files changed, 4739 insertions, 1220 deletions
diff --git a/src/lib/libcrypto/bn/Makefile.ssl b/src/lib/libcrypto/bn/Makefile.ssl index 526d7adb5c..eb6f0eeebd 100644 --- a/src/lib/libcrypto/bn/Makefile.ssl +++ b/src/lib/libcrypto/bn/Makefile.ssl | |||
| @@ -6,13 +6,14 @@ DIR= bn | |||
| 6 | TOP= ../.. | 6 | TOP= ../.. |
| 7 | CC= cc | 7 | CC= cc |
| 8 | CPP= $(CC) -E | 8 | CPP= $(CC) -E |
| 9 | INCLUDES= -I.. -I../../include | 9 | INCLUDES= -I.. -I$(TOP) -I../../include |
| 10 | CFLAG=-g | 10 | CFLAG=-g |
| 11 | INSTALL_PREFIX= | 11 | INSTALL_PREFIX= |
| 12 | OPENSSLDIR= /usr/local/ssl | 12 | OPENSSLDIR= /usr/local/ssl |
| 13 | INSTALLTOP=/usr/local/ssl | 13 | INSTALLTOP=/usr/local/ssl |
| 14 | MAKE= make -f Makefile.ssl | 14 | MAKE= make -f Makefile.ssl |
| 15 | MAKEDEPEND= $(TOP)/util/domd $(TOP) | 15 | MAKEDEPPROG= makedepend |
| 16 | MAKEDEPEND= $(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG) | ||
| 16 | MAKEFILE= Makefile.ssl | 17 | MAKEFILE= Makefile.ssl |
| 17 | AR= ar r | 18 | AR= ar r |
| 18 | 19 | ||
| @@ -35,15 +36,15 @@ TEST=bntest.c exptest.c | |||
| 35 | APPS= | 36 | APPS= |
| 36 | 37 | ||
| 37 | LIB=$(TOP)/libcrypto.a | 38 | LIB=$(TOP)/libcrypto.a |
| 38 | LIBSRC= bn_add.c bn_div.c bn_exp.c bn_lib.c bn_ctx.c bn_mul.c \ | 39 | LIBSRC= bn_add.c bn_div.c bn_exp.c bn_lib.c bn_ctx.c bn_mul.c bn_mod.c \ |
| 39 | bn_print.c bn_rand.c bn_shift.c bn_word.c bn_blind.c \ | 40 | bn_print.c bn_rand.c bn_shift.c bn_word.c bn_blind.c \ |
| 40 | bn_gcd.c bn_prime.c bn_err.c bn_sqr.c bn_asm.c bn_recp.c bn_mont.c \ | 41 | bn_kron.c bn_sqrt.c bn_gcd.c bn_prime.c bn_err.c bn_sqr.c bn_asm.c \ |
| 41 | bn_mpi.c bn_exp2.c | 42 | bn_recp.c bn_mont.c bn_mpi.c bn_exp2.c |
| 42 | 43 | ||
| 43 | LIBOBJ= bn_add.o bn_div.o bn_exp.o bn_lib.o bn_ctx.o bn_mul.o \ | 44 | LIBOBJ= bn_add.o bn_div.o bn_exp.o bn_lib.o bn_ctx.o bn_mul.o bn_mod.o \ |
| 44 | bn_print.o bn_rand.o bn_shift.o bn_word.o bn_blind.o \ | 45 | bn_print.o bn_rand.o bn_shift.o bn_word.o bn_blind.o \ |
| 45 | bn_gcd.o bn_prime.o bn_err.o bn_sqr.o $(BN_ASM) bn_recp.o bn_mont.o \ | 46 | bn_kron.o bn_sqrt.o bn_gcd.o bn_prime.o bn_err.o bn_sqr.o $(BN_ASM) \ |
| 46 | bn_mpi.o bn_exp2.o | 47 | bn_recp.o bn_mont.o bn_mpi.o bn_exp2.o |
| 47 | 48 | ||
| 48 | SRC= $(LIBSRC) | 49 | SRC= $(LIBSRC) |
| 49 | 50 | ||
| @@ -68,8 +69,7 @@ bnbug: bnbug.c ../../libcrypto.a top | |||
| 68 | 69 | ||
| 69 | lib: $(LIBOBJ) | 70 | lib: $(LIBOBJ) |
| 70 | $(AR) $(LIB) $(LIBOBJ) | 71 | $(AR) $(LIB) $(LIBOBJ) |
| 71 | @echo You may get an error following this line. Please ignore. | 72 | $(RANLIB) $(LIB) || echo Never mind. |
| 72 | - $(RANLIB) $(LIB) | ||
| 73 | @touch lib | 73 | @touch lib |
| 74 | 74 | ||
| 75 | # elf | 75 | # elf |
| @@ -124,6 +124,18 @@ asm/sparcv8plus-gcc27.o: asm/sparcv8plus.S | |||
| 124 | $(CC) $(ASFLAGS) -E asm/sparcv8plus.S | \ | 124 | $(CC) $(ASFLAGS) -E asm/sparcv8plus.S | \ |
| 125 | /usr/ccs/bin/as -xarch=v8plus - -o asm/sparcv8plus-gcc27.o | 125 | /usr/ccs/bin/as -xarch=v8plus - -o asm/sparcv8plus-gcc27.o |
| 126 | 126 | ||
| 127 | |||
| 128 | asm/ia64.o: asm/ia64.S | ||
| 129 | |||
| 130 | # Some compiler drivers (most notably HP-UX and Intel C++) don't | ||
| 131 | # understand .S extension:-( I wish I could pipe output from cc -E, | ||
| 132 | # but it's too compiler driver/ABI dependent to cover with a single | ||
| 133 | # rule... <appro@fy.chalmers.se> | ||
| 134 | asm/ia64-cpp.o: asm/ia64.S | ||
| 135 | $(CC) $(ASFLAGS) -E asm/ia64.S > /tmp/ia64.$$$$.s && \ | ||
| 136 | $(CC) $(ASFLAGS) -c -o asm/ia64-cpp.o /tmp/ia64.$$$$.s; \ | ||
| 137 | rm -f /tmp/ia64.$$$$.s | ||
| 138 | |||
| 127 | files: | 139 | files: |
| 128 | $(PERL) $(TOP)/util/files.pl Makefile.ssl >> $(TOP)/MINFO | 140 | $(PERL) $(TOP)/util/files.pl Makefile.ssl >> $(TOP)/MINFO |
| 129 | 141 | ||
| @@ -168,146 +180,160 @@ clean: | |||
| 168 | 180 | ||
| 169 | # DO NOT DELETE THIS LINE -- make depend depends on it. | 181 | # DO NOT DELETE THIS LINE -- make depend depends on it. |
| 170 | 182 | ||
| 171 | bn_add.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 183 | bn_add.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 172 | bn_add.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 184 | bn_add.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 173 | bn_add.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 185 | bn_add.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 174 | bn_add.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 186 | bn_add.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 175 | bn_add.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 187 | bn_add.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 176 | bn_add.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 188 | bn_add.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 177 | bn_add.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 189 | bn_add.o: ../cryptlib.h bn_add.c bn_lcl.h |
| 178 | bn_asm.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 190 | bn_asm.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 179 | bn_asm.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 191 | bn_asm.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 180 | bn_asm.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 192 | bn_asm.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 181 | bn_asm.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 193 | bn_asm.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 182 | bn_asm.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 194 | bn_asm.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 183 | bn_asm.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 195 | bn_asm.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 184 | bn_asm.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 196 | bn_asm.o: ../cryptlib.h bn_asm.c bn_lcl.h |
| 185 | bn_blind.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 197 | bn_blind.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 186 | bn_blind.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 198 | bn_blind.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 187 | bn_blind.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 199 | bn_blind.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 188 | bn_blind.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 200 | bn_blind.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 189 | bn_blind.o: ../../include/openssl/opensslconf.h | ||
| 190 | bn_blind.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | 201 | bn_blind.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 191 | bn_blind.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 202 | bn_blind.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 192 | bn_blind.o: ../cryptlib.h bn_lcl.h | 203 | bn_blind.o: ../cryptlib.h bn_blind.c bn_lcl.h |
| 193 | bn_ctx.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 204 | bn_ctx.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 194 | bn_ctx.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 205 | bn_ctx.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 195 | bn_ctx.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 206 | bn_ctx.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 196 | bn_ctx.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 207 | bn_ctx.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 197 | bn_ctx.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 208 | bn_ctx.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 198 | bn_ctx.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 209 | bn_ctx.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 199 | bn_ctx.o: ../../include/openssl/symhacks.h ../cryptlib.h | 210 | bn_ctx.o: ../cryptlib.h bn_ctx.c bn_lcl.h |
| 200 | bn_div.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 211 | bn_div.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 201 | bn_div.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 212 | bn_div.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 202 | bn_div.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 213 | bn_div.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 203 | bn_div.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 214 | bn_div.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 204 | bn_div.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 215 | bn_div.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 205 | bn_div.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 216 | bn_div.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 206 | bn_div.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 217 | bn_div.o: ../cryptlib.h bn_div.c bn_lcl.h |
| 207 | bn_err.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 218 | bn_err.o: ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 208 | bn_err.o: ../../include/openssl/crypto.h ../../include/openssl/err.h | 219 | bn_err.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h |
| 209 | bn_err.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h | 220 | bn_err.o: ../../include/openssl/err.h ../../include/openssl/lhash.h |
| 210 | bn_err.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | 221 | bn_err.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h |
| 211 | bn_err.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 222 | bn_err.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h |
| 212 | bn_exp.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 223 | bn_err.o: ../../include/openssl/symhacks.h bn_err.c |
| 224 | bn_exp.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h | ||
| 213 | bn_exp.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 225 | bn_exp.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 214 | bn_exp.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 226 | bn_exp.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 215 | bn_exp.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 227 | bn_exp.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 216 | bn_exp.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 228 | bn_exp.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 217 | bn_exp.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 229 | bn_exp.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 218 | bn_exp.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 230 | bn_exp.o: ../cryptlib.h bn_exp.c bn_lcl.h |
| 219 | bn_exp2.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 231 | bn_exp2.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 220 | bn_exp2.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 232 | bn_exp2.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 221 | bn_exp2.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 233 | bn_exp2.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 222 | bn_exp2.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 234 | bn_exp2.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 223 | bn_exp2.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 235 | bn_exp2.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 224 | bn_exp2.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 236 | bn_exp2.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 225 | bn_exp2.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 237 | bn_exp2.o: ../cryptlib.h bn_exp2.c bn_lcl.h |
| 226 | bn_gcd.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 238 | bn_gcd.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 227 | bn_gcd.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 239 | bn_gcd.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 228 | bn_gcd.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 240 | bn_gcd.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 229 | bn_gcd.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 241 | bn_gcd.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 230 | bn_gcd.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 242 | bn_gcd.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 231 | bn_gcd.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 243 | bn_gcd.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 232 | bn_gcd.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 244 | bn_gcd.o: ../cryptlib.h bn_gcd.c bn_lcl.h |
| 233 | bn_lib.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 245 | bn_kron.o: ../../include/openssl/bn.h ../../include/openssl/e_os2.h |
| 246 | bn_kron.o: ../../include/openssl/opensslconf.h bn_kron.c bn_lcl.h | ||
| 247 | bn_lib.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h | ||
| 234 | bn_lib.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 248 | bn_lib.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 235 | bn_lib.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 249 | bn_lib.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 236 | bn_lib.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 250 | bn_lib.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 237 | bn_lib.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 251 | bn_lib.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 238 | bn_lib.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 252 | bn_lib.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 239 | bn_lib.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 253 | bn_lib.o: ../cryptlib.h bn_lcl.h bn_lib.c |
| 240 | bn_mont.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 254 | bn_mod.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 255 | bn_mod.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | ||
| 256 | bn_mod.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h | ||
| 257 | bn_mod.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h | ||
| 258 | bn_mod.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | ||
| 259 | bn_mod.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | ||
| 260 | bn_mod.o: ../cryptlib.h bn_lcl.h bn_mod.c | ||
| 261 | bn_mont.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h | ||
| 241 | bn_mont.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 262 | bn_mont.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 242 | bn_mont.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 263 | bn_mont.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 243 | bn_mont.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 264 | bn_mont.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 244 | bn_mont.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 265 | bn_mont.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 245 | bn_mont.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 266 | bn_mont.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 246 | bn_mont.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 267 | bn_mont.o: ../cryptlib.h bn_lcl.h bn_mont.c |
| 247 | bn_mpi.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 268 | bn_mpi.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 248 | bn_mpi.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 269 | bn_mpi.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 249 | bn_mpi.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 270 | bn_mpi.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 250 | bn_mpi.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 271 | bn_mpi.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 251 | bn_mpi.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 272 | bn_mpi.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 252 | bn_mpi.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 273 | bn_mpi.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 253 | bn_mpi.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 274 | bn_mpi.o: ../cryptlib.h bn_lcl.h bn_mpi.c |
| 254 | bn_mul.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 275 | bn_mul.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 255 | bn_mul.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 276 | bn_mul.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 256 | bn_mul.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 277 | bn_mul.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 257 | bn_mul.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 278 | bn_mul.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 258 | bn_mul.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 279 | bn_mul.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 259 | bn_mul.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 280 | bn_mul.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 260 | bn_mul.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 281 | bn_mul.o: ../cryptlib.h bn_lcl.h bn_mul.c |
| 261 | bn_prime.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 282 | bn_prime.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 262 | bn_prime.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 283 | bn_prime.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 263 | bn_prime.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 284 | bn_prime.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 264 | bn_prime.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 285 | bn_prime.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 265 | bn_prime.o: ../../include/openssl/opensslconf.h | 286 | bn_prime.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h |
| 266 | bn_prime.o: ../../include/openssl/opensslv.h ../../include/openssl/rand.h | 287 | bn_prime.o: ../../include/openssl/rand.h ../../include/openssl/safestack.h |
| 267 | bn_prime.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 288 | bn_prime.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 268 | bn_prime.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h bn_prime.h | 289 | bn_prime.o: ../cryptlib.h bn_lcl.h bn_prime.c bn_prime.h |
| 269 | bn_print.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 290 | bn_print.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 270 | bn_print.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 291 | bn_print.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 271 | bn_print.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 292 | bn_print.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 272 | bn_print.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 293 | bn_print.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 273 | bn_print.o: ../../include/openssl/opensslconf.h | ||
| 274 | bn_print.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | 294 | bn_print.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 275 | bn_print.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 295 | bn_print.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 276 | bn_print.o: ../cryptlib.h bn_lcl.h | 296 | bn_print.o: ../cryptlib.h bn_lcl.h bn_print.c |
| 277 | bn_rand.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 297 | bn_rand.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 278 | bn_rand.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 298 | bn_rand.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 279 | bn_rand.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 299 | bn_rand.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 280 | bn_rand.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 300 | bn_rand.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 281 | bn_rand.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 301 | bn_rand.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h |
| 282 | bn_rand.o: ../../include/openssl/rand.h ../../include/openssl/safestack.h | 302 | bn_rand.o: ../../include/openssl/rand.h ../../include/openssl/safestack.h |
| 283 | bn_rand.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 303 | bn_rand.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 284 | bn_rand.o: ../cryptlib.h bn_lcl.h | 304 | bn_rand.o: ../cryptlib.h bn_lcl.h bn_rand.c |
| 285 | bn_recp.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 305 | bn_recp.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 286 | bn_recp.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 306 | bn_recp.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 287 | bn_recp.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 307 | bn_recp.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 288 | bn_recp.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 308 | bn_recp.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 289 | bn_recp.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 309 | bn_recp.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 290 | bn_recp.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 310 | bn_recp.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 291 | bn_recp.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 311 | bn_recp.o: ../cryptlib.h bn_lcl.h bn_recp.c |
| 292 | bn_shift.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 312 | bn_shift.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 293 | bn_shift.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 313 | bn_shift.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 294 | bn_shift.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 314 | bn_shift.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 295 | bn_shift.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 315 | bn_shift.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 296 | bn_shift.o: ../../include/openssl/opensslconf.h | ||
| 297 | bn_shift.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | 316 | bn_shift.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 298 | bn_shift.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 317 | bn_shift.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 299 | bn_shift.o: ../cryptlib.h bn_lcl.h | 318 | bn_shift.o: ../cryptlib.h bn_lcl.h bn_shift.c |
| 300 | bn_sqr.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 319 | bn_sqr.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 301 | bn_sqr.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 320 | bn_sqr.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 302 | bn_sqr.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 321 | bn_sqr.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 303 | bn_sqr.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 322 | bn_sqr.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 304 | bn_sqr.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 323 | bn_sqr.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 305 | bn_sqr.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 324 | bn_sqr.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 306 | bn_sqr.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 325 | bn_sqr.o: ../cryptlib.h bn_lcl.h bn_sqr.c |
| 307 | bn_word.o: ../../include/openssl/bio.h ../../include/openssl/bn.h | 326 | bn_sqrt.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h |
| 327 | bn_sqrt.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | ||
| 328 | bn_sqrt.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h | ||
| 329 | bn_sqrt.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h | ||
| 330 | bn_sqrt.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h | ||
| 331 | bn_sqrt.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | ||
| 332 | bn_sqrt.o: ../cryptlib.h bn_lcl.h bn_sqrt.c | ||
| 333 | bn_word.o: ../../e_os.h ../../include/openssl/bio.h ../../include/openssl/bn.h | ||
| 308 | bn_word.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 334 | bn_word.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
| 309 | bn_word.o: ../../include/openssl/e_os.h ../../include/openssl/e_os2.h | 335 | bn_word.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
| 310 | bn_word.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | 336 | bn_word.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h |
| 311 | bn_word.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 337 | bn_word.o: ../../include/openssl/opensslv.h ../../include/openssl/safestack.h |
| 312 | bn_word.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 338 | bn_word.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
| 313 | bn_word.o: ../../include/openssl/symhacks.h ../cryptlib.h bn_lcl.h | 339 | bn_word.o: ../cryptlib.h bn_lcl.h bn_word.c |
diff --git a/src/lib/libcrypto/bn/asm/README b/src/lib/libcrypto/bn/asm/README index a0fe58a677..b0f3a68a06 100644 --- a/src/lib/libcrypto/bn/asm/README +++ b/src/lib/libcrypto/bn/asm/README | |||
| @@ -1,3 +1,5 @@ | |||
| 1 | <OBSOLETE> | ||
| 2 | |||
| 1 | All assember in this directory are just version of the file | 3 | All assember in this directory are just version of the file |
| 2 | crypto/bn/bn_asm.c. | 4 | crypto/bn/bn_asm.c. |
| 3 | 5 | ||
| @@ -21,3 +23,5 @@ pa-risc.s is the origional one which works fine and generated using gcc :-) | |||
| 21 | 23 | ||
| 22 | pa-risc2W.s and pa-risc2.s are 64 and 32-bit PA-RISC 2.0 implementations | 24 | pa-risc2W.s and pa-risc2.s are 64 and 32-bit PA-RISC 2.0 implementations |
| 23 | by Chris Ruemmler from HP (with some help from the HP C compiler). | 25 | by Chris Ruemmler from HP (with some help from the HP C compiler). |
| 26 | |||
| 27 | </OBSOLETE> | ||
diff --git a/src/lib/libcrypto/bn/asm/bn-586.pl b/src/lib/libcrypto/bn/asm/bn-586.pl index 5191bed273..33f6125920 100644 --- a/src/lib/libcrypto/bn/asm/bn-586.pl +++ b/src/lib/libcrypto/bn/asm/bn-586.pl | |||
| @@ -11,6 +11,7 @@ require "x86asm.pl"; | |||
| 11 | &bn_div_words("bn_div_words"); | 11 | &bn_div_words("bn_div_words"); |
| 12 | &bn_add_words("bn_add_words"); | 12 | &bn_add_words("bn_add_words"); |
| 13 | &bn_sub_words("bn_sub_words"); | 13 | &bn_sub_words("bn_sub_words"); |
| 14 | &bn_sub_part_words("bn_sub_part_words"); | ||
| 14 | 15 | ||
| 15 | &asm_finish(); | 16 | &asm_finish(); |
| 16 | 17 | ||
| @@ -300,7 +301,7 @@ sub bn_add_words | |||
| 300 | &add($tmp1,$tmp2); | 301 | &add($tmp1,$tmp2); |
| 301 | &adc($c,0); | 302 | &adc($c,0); |
| 302 | &dec($num) if ($i != 6); | 303 | &dec($num) if ($i != 6); |
| 303 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *a | 304 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r |
| 304 | &jz(&label("aw_end")) if ($i != 6); | 305 | &jz(&label("aw_end")) if ($i != 6); |
| 305 | } | 306 | } |
| 306 | &set_label("aw_end",0); | 307 | &set_label("aw_end",0); |
| @@ -372,7 +373,7 @@ sub bn_sub_words | |||
| 372 | &sub($tmp1,$tmp2); | 373 | &sub($tmp1,$tmp2); |
| 373 | &adc($c,0); | 374 | &adc($c,0); |
| 374 | &dec($num) if ($i != 6); | 375 | &dec($num) if ($i != 6); |
| 375 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *a | 376 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r |
| 376 | &jz(&label("aw_end")) if ($i != 6); | 377 | &jz(&label("aw_end")) if ($i != 6); |
| 377 | } | 378 | } |
| 378 | &set_label("aw_end",0); | 379 | &set_label("aw_end",0); |
| @@ -382,3 +383,211 @@ sub bn_sub_words | |||
| 382 | &function_end($name); | 383 | &function_end($name); |
| 383 | } | 384 | } |
| 384 | 385 | ||
| 386 | sub bn_sub_part_words | ||
| 387 | { | ||
| 388 | local($name)=@_; | ||
| 389 | |||
| 390 | &function_begin($name,""); | ||
| 391 | |||
| 392 | &comment(""); | ||
| 393 | $a="esi"; | ||
| 394 | $b="edi"; | ||
| 395 | $c="eax"; | ||
| 396 | $r="ebx"; | ||
| 397 | $tmp1="ecx"; | ||
| 398 | $tmp2="edx"; | ||
| 399 | $num="ebp"; | ||
| 400 | |||
| 401 | &mov($r,&wparam(0)); # get r | ||
| 402 | &mov($a,&wparam(1)); # get a | ||
| 403 | &mov($b,&wparam(2)); # get b | ||
| 404 | &mov($num,&wparam(3)); # get num | ||
| 405 | &xor($c,$c); # clear carry | ||
| 406 | &and($num,0xfffffff8); # num / 8 | ||
| 407 | |||
| 408 | &jz(&label("aw_finish")); | ||
| 409 | |||
| 410 | &set_label("aw_loop",0); | ||
| 411 | for ($i=0; $i<8; $i++) | ||
| 412 | { | ||
| 413 | &comment("Round $i"); | ||
| 414 | |||
| 415 | &mov($tmp1,&DWP($i*4,$a,"",0)); # *a | ||
| 416 | &mov($tmp2,&DWP($i*4,$b,"",0)); # *b | ||
| 417 | &sub($tmp1,$c); | ||
| 418 | &mov($c,0); | ||
| 419 | &adc($c,$c); | ||
| 420 | &sub($tmp1,$tmp2); | ||
| 421 | &adc($c,0); | ||
| 422 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 423 | } | ||
| 424 | |||
| 425 | &comment(""); | ||
| 426 | &add($a,32); | ||
| 427 | &add($b,32); | ||
| 428 | &add($r,32); | ||
| 429 | &sub($num,8); | ||
| 430 | &jnz(&label("aw_loop")); | ||
| 431 | |||
| 432 | &set_label("aw_finish",0); | ||
| 433 | &mov($num,&wparam(3)); # get num | ||
| 434 | &and($num,7); | ||
| 435 | &jz(&label("aw_end")); | ||
| 436 | |||
| 437 | for ($i=0; $i<7; $i++) | ||
| 438 | { | ||
| 439 | &comment("Tail Round $i"); | ||
| 440 | &mov($tmp1,&DWP(0,$a,"",0)); # *a | ||
| 441 | &mov($tmp2,&DWP(0,$b,"",0));# *b | ||
| 442 | &sub($tmp1,$c); | ||
| 443 | &mov($c,0); | ||
| 444 | &adc($c,$c); | ||
| 445 | &sub($tmp1,$tmp2); | ||
| 446 | &adc($c,0); | ||
| 447 | &mov(&DWP(0,$r,"",0),$tmp1); # *r | ||
| 448 | &add($a, 4); | ||
| 449 | &add($b, 4); | ||
| 450 | &add($r, 4); | ||
| 451 | &dec($num) if ($i != 6); | ||
| 452 | &jz(&label("aw_end")) if ($i != 6); | ||
| 453 | } | ||
| 454 | &set_label("aw_end",0); | ||
| 455 | |||
| 456 | &cmp(&wparam(4),0); | ||
| 457 | &je(&label("pw_end")); | ||
| 458 | |||
| 459 | &mov($num,&wparam(4)); # get dl | ||
| 460 | &cmp($num,0); | ||
| 461 | &je(&label("pw_end")); | ||
| 462 | &jge(&label("pw_pos")); | ||
| 463 | |||
| 464 | &comment("pw_neg"); | ||
| 465 | &mov($tmp2,0); | ||
| 466 | &sub($tmp2,$num); | ||
| 467 | &mov($num,$tmp2); | ||
| 468 | &and($num,0xfffffff8); # num / 8 | ||
| 469 | &jz(&label("pw_neg_finish")); | ||
| 470 | |||
| 471 | &set_label("pw_neg_loop",0); | ||
| 472 | for ($i=0; $i<8; $i++) | ||
| 473 | { | ||
| 474 | &comment("dl<0 Round $i"); | ||
| 475 | |||
| 476 | &mov($tmp1,0); | ||
| 477 | &mov($tmp2,&DWP($i*4,$b,"",0)); # *b | ||
| 478 | &sub($tmp1,$c); | ||
| 479 | &mov($c,0); | ||
| 480 | &adc($c,$c); | ||
| 481 | &sub($tmp1,$tmp2); | ||
| 482 | &adc($c,0); | ||
| 483 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 484 | } | ||
| 485 | |||
| 486 | &comment(""); | ||
| 487 | &add($b,32); | ||
| 488 | &add($r,32); | ||
| 489 | &sub($num,8); | ||
| 490 | &jnz(&label("pw_neg_loop")); | ||
| 491 | |||
| 492 | &set_label("pw_neg_finish",0); | ||
| 493 | &mov($tmp2,&wparam(4)); # get dl | ||
| 494 | &mov($num,0); | ||
| 495 | &sub($num,$tmp2); | ||
| 496 | &and($num,7); | ||
| 497 | &jz(&label("pw_end")); | ||
| 498 | |||
| 499 | for ($i=0; $i<7; $i++) | ||
| 500 | { | ||
| 501 | &comment("dl<0 Tail Round $i"); | ||
| 502 | &mov($tmp1,0); | ||
| 503 | &mov($tmp2,&DWP($i*4,$b,"",0));# *b | ||
| 504 | &sub($tmp1,$c); | ||
| 505 | &mov($c,0); | ||
| 506 | &adc($c,$c); | ||
| 507 | &sub($tmp1,$tmp2); | ||
| 508 | &adc($c,0); | ||
| 509 | &dec($num) if ($i != 6); | ||
| 510 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 511 | &jz(&label("pw_end")) if ($i != 6); | ||
| 512 | } | ||
| 513 | |||
| 514 | &jmp(&label("pw_end")); | ||
| 515 | |||
| 516 | &set_label("pw_pos",0); | ||
| 517 | |||
| 518 | &and($num,0xfffffff8); # num / 8 | ||
| 519 | &jz(&label("pw_pos_finish")); | ||
| 520 | |||
| 521 | &set_label("pw_pos_loop",0); | ||
| 522 | |||
| 523 | for ($i=0; $i<8; $i++) | ||
| 524 | { | ||
| 525 | &comment("dl>0 Round $i"); | ||
| 526 | |||
| 527 | &mov($tmp1,&DWP($i*4,$a,"",0)); # *a | ||
| 528 | &sub($tmp1,$c); | ||
| 529 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 530 | &jnc(&label("pw_nc".$i)); | ||
| 531 | } | ||
| 532 | |||
| 533 | &comment(""); | ||
| 534 | &add($a,32); | ||
| 535 | &add($r,32); | ||
| 536 | &sub($num,8); | ||
| 537 | &jnz(&label("pw_pos_loop")); | ||
| 538 | |||
| 539 | &set_label("pw_pos_finish",0); | ||
| 540 | &mov($num,&wparam(4)); # get dl | ||
| 541 | &and($num,7); | ||
| 542 | &jz(&label("pw_end")); | ||
| 543 | |||
| 544 | for ($i=0; $i<7; $i++) | ||
| 545 | { | ||
| 546 | &comment("dl>0 Tail Round $i"); | ||
| 547 | &mov($tmp1,&DWP($i*4,$a,"",0)); # *a | ||
| 548 | &sub($tmp1,$c); | ||
| 549 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 550 | &jnc(&label("pw_tail_nc".$i)); | ||
| 551 | &dec($num) if ($i != 6); | ||
| 552 | &jz(&label("pw_end")) if ($i != 6); | ||
| 553 | } | ||
| 554 | &mov($c,1); | ||
| 555 | &jmp(&label("pw_end")); | ||
| 556 | |||
| 557 | &set_label("pw_nc_loop",0); | ||
| 558 | for ($i=0; $i<8; $i++) | ||
| 559 | { | ||
| 560 | &mov($tmp1,&DWP($i*4,$a,"",0)); # *a | ||
| 561 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 562 | &set_label("pw_nc".$i,0); | ||
| 563 | } | ||
| 564 | |||
| 565 | &comment(""); | ||
| 566 | &add($a,32); | ||
| 567 | &add($r,32); | ||
| 568 | &sub($num,8); | ||
| 569 | &jnz(&label("pw_nc_loop")); | ||
| 570 | |||
| 571 | &mov($num,&wparam(4)); # get dl | ||
| 572 | &and($num,7); | ||
| 573 | &jz(&label("pw_nc_end")); | ||
| 574 | |||
| 575 | for ($i=0; $i<7; $i++) | ||
| 576 | { | ||
| 577 | &mov($tmp1,&DWP($i*4,$a,"",0)); # *a | ||
| 578 | &mov(&DWP($i*4,$r,"",0),$tmp1); # *r | ||
| 579 | &set_label("pw_tail_nc".$i,0); | ||
| 580 | &dec($num) if ($i != 6); | ||
| 581 | &jz(&label("pw_nc_end")) if ($i != 6); | ||
| 582 | } | ||
| 583 | |||
| 584 | &set_label("pw_nc_end",0); | ||
| 585 | &mov($c,0); | ||
| 586 | |||
| 587 | &set_label("pw_end",0); | ||
| 588 | |||
| 589 | # &mov("eax",$c); # $c is "eax" | ||
| 590 | |||
| 591 | &function_end($name); | ||
| 592 | } | ||
| 593 | |||
diff --git a/src/lib/libcrypto/bn/asm/ia64.S b/src/lib/libcrypto/bn/asm/ia64.S new file mode 100644 index 0000000000..ae56066310 --- /dev/null +++ b/src/lib/libcrypto/bn/asm/ia64.S | |||
| @@ -0,0 +1,1498 @@ | |||
| 1 | .explicit | ||
| 2 | .text | ||
| 3 | .ident "ia64.S, Version 1.1" | ||
| 4 | .ident "IA-64 ISA artwork by Andy Polyakov <appro@fy.chalmers.se>" | ||
| 5 | |||
| 6 | // | ||
| 7 | // ==================================================================== | ||
| 8 | // Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL | ||
| 9 | // project. | ||
| 10 | // | ||
| 11 | // Rights for redistribution and usage in source and binary forms are | ||
| 12 | // granted according to the OpenSSL license. Warranty of any kind is | ||
| 13 | // disclaimed. | ||
| 14 | // ==================================================================== | ||
| 15 | // | ||
| 16 | |||
| 17 | // Q. How much faster does it get? | ||
| 18 | // A. Here is the output from 'openssl speed rsa dsa' for vanilla | ||
| 19 | // 0.9.6a compiled with gcc version 2.96 20000731 (Red Hat | ||
| 20 | // Linux 7.1 2.96-81): | ||
| 21 | // | ||
| 22 | // sign verify sign/s verify/s | ||
| 23 | // rsa 512 bits 0.0036s 0.0003s 275.3 2999.2 | ||
| 24 | // rsa 1024 bits 0.0203s 0.0011s 49.3 894.1 | ||
| 25 | // rsa 2048 bits 0.1331s 0.0040s 7.5 250.9 | ||
| 26 | // rsa 4096 bits 0.9270s 0.0147s 1.1 68.1 | ||
| 27 | // sign verify sign/s verify/s | ||
| 28 | // dsa 512 bits 0.0035s 0.0043s 288.3 234.8 | ||
| 29 | // dsa 1024 bits 0.0111s 0.0135s 90.0 74.2 | ||
| 30 | // | ||
| 31 | // And here is similar output but for this assembler | ||
| 32 | // implementation:-) | ||
| 33 | // | ||
| 34 | // sign verify sign/s verify/s | ||
| 35 | // rsa 512 bits 0.0021s 0.0001s 549.4 9638.5 | ||
| 36 | // rsa 1024 bits 0.0055s 0.0002s 183.8 4481.1 | ||
| 37 | // rsa 2048 bits 0.0244s 0.0006s 41.4 1726.3 | ||
| 38 | // rsa 4096 bits 0.1295s 0.0018s 7.7 561.5 | ||
| 39 | // sign verify sign/s verify/s | ||
| 40 | // dsa 512 bits 0.0012s 0.0013s 891.9 756.6 | ||
| 41 | // dsa 1024 bits 0.0023s 0.0028s 440.4 376.2 | ||
| 42 | // | ||
| 43 | // Yes, you may argue that it's not fair comparison as it's | ||
| 44 | // possible to craft the C implementation with BN_UMULT_HIGH | ||
| 45 | // inline assembler macro. But of course! Here is the output | ||
| 46 | // with the macro: | ||
| 47 | // | ||
| 48 | // sign verify sign/s verify/s | ||
| 49 | // rsa 512 bits 0.0020s 0.0002s 495.0 6561.0 | ||
| 50 | // rsa 1024 bits 0.0086s 0.0004s 116.2 2235.7 | ||
| 51 | // rsa 2048 bits 0.0519s 0.0015s 19.3 667.3 | ||
| 52 | // rsa 4096 bits 0.3464s 0.0053s 2.9 187.7 | ||
| 53 | // sign verify sign/s verify/s | ||
| 54 | // dsa 512 bits 0.0016s 0.0020s 613.1 510.5 | ||
| 55 | // dsa 1024 bits 0.0045s 0.0054s 221.0 183.9 | ||
| 56 | // | ||
| 57 | // My code is still way faster, huh:-) And I believe that even | ||
| 58 | // higher performance can be achieved. Note that as keys get | ||
| 59 | // longer, performance gain is larger. Why? According to the | ||
| 60 | // profiler there is another player in the field, namely | ||
| 61 | // BN_from_montgomery consuming larger and larger portion of CPU | ||
| 62 | // time as keysize decreases. I therefore consider putting effort | ||
| 63 | // to assembler implementation of the following routine: | ||
| 64 | // | ||
| 65 | // void bn_mul_add_mont (BN_ULONG *rp,BN_ULONG *np,int nl,BN_ULONG n0) | ||
| 66 | // { | ||
| 67 | // int i,j; | ||
| 68 | // BN_ULONG v; | ||
| 69 | // | ||
| 70 | // for (i=0; i<nl; i++) | ||
| 71 | // { | ||
| 72 | // v=bn_mul_add_words(rp,np,nl,(rp[0]*n0)&BN_MASK2); | ||
| 73 | // nrp++; | ||
| 74 | // rp++; | ||
| 75 | // if (((nrp[-1]+=v)&BN_MASK2) < v) | ||
| 76 | // for (j=0; ((++nrp[j])&BN_MASK2) == 0; j++) ; | ||
| 77 | // } | ||
| 78 | // } | ||
| 79 | // | ||
| 80 | // It might as well be beneficial to implement even combaX | ||
| 81 | // variants, as it appears as it can literally unleash the | ||
| 82 | // performance (see comment section to bn_mul_comba8 below). | ||
| 83 | // | ||
| 84 | // And finally for your reference the output for 0.9.6a compiled | ||
| 85 | // with SGIcc version 0.01.0-12 (keep in mind that for the moment | ||
| 86 | // of this writing it's not possible to convince SGIcc to use | ||
| 87 | // BN_UMULT_HIGH inline assembler macro, yet the code is fast, | ||
| 88 | // i.e. for a compiler generated one:-): | ||
| 89 | // | ||
| 90 | // sign verify sign/s verify/s | ||
| 91 | // rsa 512 bits 0.0022s 0.0002s 452.7 5894.3 | ||
| 92 | // rsa 1024 bits 0.0097s 0.0005s 102.7 2002.9 | ||
| 93 | // rsa 2048 bits 0.0578s 0.0017s 17.3 600.2 | ||
| 94 | // rsa 4096 bits 0.3838s 0.0061s 2.6 164.5 | ||
| 95 | // sign verify sign/s verify/s | ||
| 96 | // dsa 512 bits 0.0018s 0.0022s 547.3 459.6 | ||
| 97 | // dsa 1024 bits 0.0051s 0.0062s 196.6 161.3 | ||
| 98 | // | ||
| 99 | // Oh! Benchmarks were performed on 733MHz Lion-class Itanium | ||
| 100 | // system running Redhat Linux 7.1 (very special thanks to Ray | ||
| 101 | // McCaffity of Williams Communications for providing an account). | ||
| 102 | // | ||
| 103 | // Q. What's the heck with 'rum 1<<5' at the end of every function? | ||
| 104 | // A. Well, by clearing the "upper FP registers written" bit of the | ||
| 105 | // User Mask I want to excuse the kernel from preserving upper | ||
| 106 | // (f32-f128) FP register bank over process context switch, thus | ||
| 107 | // minimizing bus bandwidth consumption during the switch (i.e. | ||
| 108 | // after PKI opration completes and the program is off doing | ||
| 109 | // something else like bulk symmetric encryption). Having said | ||
| 110 | // this, I also want to point out that it might be good idea | ||
| 111 | // to compile the whole toolkit (as well as majority of the | ||
| 112 | // programs for that matter) with -mfixed-range=f32-f127 command | ||
| 113 | // line option. No, it doesn't prevent the compiler from writing | ||
| 114 | // to upper bank, but at least discourages to do so. If you don't | ||
| 115 | // like the idea you have the option to compile the module with | ||
| 116 | // -Drum=nop.m in command line. | ||
| 117 | // | ||
| 118 | |||
| 119 | #if 1 | ||
| 120 | // | ||
| 121 | // bn_[add|sub]_words routines. | ||
| 122 | // | ||
| 123 | // Loops are spinning in 2*(n+5) ticks on Itanuim (provided that the | ||
| 124 | // data reside in L1 cache, i.e. 2 ticks away). It's possible to | ||
| 125 | // compress the epilogue and get down to 2*n+6, but at the cost of | ||
| 126 | // scalability (the neat feature of this implementation is that it | ||
| 127 | // shall automagically spin in n+5 on "wider" IA-64 implementations:-) | ||
| 128 | // I consider that the epilogue is short enough as it is to trade tiny | ||
| 129 | // performance loss on Itanium for scalability. | ||
| 130 | // | ||
| 131 | // BN_ULONG bn_add_words(BN_ULONG *rp, BN_ULONG *ap, BN_ULONG *bp,int num) | ||
| 132 | // | ||
| 133 | .global bn_add_words# | ||
| 134 | .proc bn_add_words# | ||
| 135 | .align 64 | ||
| 136 | .skip 32 // makes the loop body aligned at 64-byte boundary | ||
| 137 | bn_add_words: | ||
| 138 | .prologue | ||
| 139 | .fframe 0 | ||
| 140 | .save ar.pfs,r2 | ||
| 141 | { .mii; alloc r2=ar.pfs,4,12,0,16 | ||
| 142 | cmp4.le p6,p0=r35,r0 };; | ||
| 143 | { .mfb; mov r8=r0 // return value | ||
| 144 | (p6) br.ret.spnt.many b0 };; | ||
| 145 | |||
| 146 | .save ar.lc,r3 | ||
| 147 | { .mib; sub r10=r35,r0,1 | ||
| 148 | mov r3=ar.lc | ||
| 149 | brp.loop.imp .L_bn_add_words_ctop,.L_bn_add_words_cend-16 | ||
| 150 | } | ||
| 151 | .body | ||
| 152 | { .mib; mov r14=r32 // rp | ||
| 153 | mov r9=pr };; | ||
| 154 | { .mii; mov r15=r33 // ap | ||
| 155 | mov ar.lc=r10 | ||
| 156 | mov ar.ec=6 } | ||
| 157 | { .mib; mov r16=r34 // bp | ||
| 158 | mov pr.rot=1<<16 };; | ||
| 159 | |||
| 160 | .L_bn_add_words_ctop: | ||
| 161 | { .mii; (p16) ld8 r32=[r16],8 // b=*(bp++) | ||
| 162 | (p18) add r39=r37,r34 | ||
| 163 | (p19) cmp.ltu.unc p56,p0=r40,r38 } | ||
| 164 | { .mfb; (p0) nop.m 0x0 | ||
| 165 | (p0) nop.f 0x0 | ||
| 166 | (p0) nop.b 0x0 } | ||
| 167 | { .mii; (p16) ld8 r35=[r15],8 // a=*(ap++) | ||
| 168 | (p58) cmp.eq.or p57,p0=-1,r41 // (p20) | ||
| 169 | (p58) add r41=1,r41 } // (p20) | ||
| 170 | { .mfb; (p21) st8 [r14]=r42,8 // *(rp++)=r | ||
| 171 | (p0) nop.f 0x0 | ||
| 172 | br.ctop.sptk .L_bn_add_words_ctop };; | ||
| 173 | .L_bn_add_words_cend: | ||
| 174 | |||
| 175 | { .mii; | ||
| 176 | (p59) add r8=1,r8 // return value | ||
| 177 | mov pr=r9,-1 | ||
| 178 | mov ar.lc=r3 } | ||
| 179 | { .mbb; nop.b 0x0 | ||
| 180 | br.ret.sptk.many b0 };; | ||
| 181 | .endp bn_add_words# | ||
| 182 | |||
| 183 | // | ||
| 184 | // BN_ULONG bn_sub_words(BN_ULONG *rp, BN_ULONG *ap, BN_ULONG *bp,int num) | ||
| 185 | // | ||
| 186 | .global bn_sub_words# | ||
| 187 | .proc bn_sub_words# | ||
| 188 | .align 64 | ||
| 189 | .skip 32 // makes the loop body aligned at 64-byte boundary | ||
| 190 | bn_sub_words: | ||
| 191 | .prologue | ||
| 192 | .fframe 0 | ||
| 193 | .save ar.pfs,r2 | ||
| 194 | { .mii; alloc r2=ar.pfs,4,12,0,16 | ||
| 195 | cmp4.le p6,p0=r35,r0 };; | ||
| 196 | { .mfb; mov r8=r0 // return value | ||
| 197 | (p6) br.ret.spnt.many b0 };; | ||
| 198 | |||
| 199 | .save ar.lc,r3 | ||
| 200 | { .mib; sub r10=r35,r0,1 | ||
| 201 | mov r3=ar.lc | ||
| 202 | brp.loop.imp .L_bn_sub_words_ctop,.L_bn_sub_words_cend-16 | ||
| 203 | } | ||
| 204 | .body | ||
| 205 | { .mib; mov r14=r32 // rp | ||
| 206 | mov r9=pr };; | ||
| 207 | { .mii; mov r15=r33 // ap | ||
| 208 | mov ar.lc=r10 | ||
| 209 | mov ar.ec=6 } | ||
| 210 | { .mib; mov r16=r34 // bp | ||
| 211 | mov pr.rot=1<<16 };; | ||
| 212 | |||
| 213 | .L_bn_sub_words_ctop: | ||
| 214 | { .mii; (p16) ld8 r32=[r16],8 // b=*(bp++) | ||
| 215 | (p18) sub r39=r37,r34 | ||
| 216 | (p19) cmp.gtu.unc p56,p0=r40,r38 } | ||
| 217 | { .mfb; (p0) nop.m 0x0 | ||
| 218 | (p0) nop.f 0x0 | ||
| 219 | (p0) nop.b 0x0 } | ||
| 220 | { .mii; (p16) ld8 r35=[r15],8 // a=*(ap++) | ||
| 221 | (p58) cmp.eq.or p57,p0=0,r41 // (p20) | ||
| 222 | (p58) add r41=-1,r41 } // (p20) | ||
| 223 | { .mbb; (p21) st8 [r14]=r42,8 // *(rp++)=r | ||
| 224 | (p0) nop.b 0x0 | ||
| 225 | br.ctop.sptk .L_bn_sub_words_ctop };; | ||
| 226 | .L_bn_sub_words_cend: | ||
| 227 | |||
| 228 | { .mii; | ||
| 229 | (p59) add r8=1,r8 // return value | ||
| 230 | mov pr=r9,-1 | ||
| 231 | mov ar.lc=r3 } | ||
| 232 | { .mbb; nop.b 0x0 | ||
| 233 | br.ret.sptk.many b0 };; | ||
| 234 | .endp bn_sub_words# | ||
| 235 | #endif | ||
| 236 | |||
| 237 | #if 0 | ||
| 238 | #define XMA_TEMPTATION | ||
| 239 | #endif | ||
| 240 | |||
| 241 | #if 1 | ||
| 242 | // | ||
| 243 | // BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | ||
| 244 | // | ||
| 245 | .global bn_mul_words# | ||
| 246 | .proc bn_mul_words# | ||
| 247 | .align 64 | ||
| 248 | .skip 32 // makes the loop body aligned at 64-byte boundary | ||
| 249 | bn_mul_words: | ||
| 250 | .prologue | ||
| 251 | .fframe 0 | ||
| 252 | .save ar.pfs,r2 | ||
| 253 | #ifdef XMA_TEMPTATION | ||
| 254 | { .mfi; alloc r2=ar.pfs,4,0,0,0 };; | ||
| 255 | #else | ||
| 256 | { .mfi; alloc r2=ar.pfs,4,4,0,8 };; | ||
| 257 | #endif | ||
| 258 | { .mib; mov r8=r0 // return value | ||
| 259 | cmp4.le p6,p0=r34,r0 | ||
| 260 | (p6) br.ret.spnt.many b0 };; | ||
| 261 | |||
| 262 | .save ar.lc,r3 | ||
| 263 | { .mii; sub r10=r34,r0,1 | ||
| 264 | mov r3=ar.lc | ||
| 265 | mov r9=pr };; | ||
| 266 | |||
| 267 | .body | ||
| 268 | { .mib; setf.sig f8=r35 // w | ||
| 269 | mov pr.rot=0x400001<<16 | ||
| 270 | // ------^----- serves as (p48) at first (p26) | ||
| 271 | brp.loop.imp .L_bn_mul_words_ctop,.L_bn_mul_words_cend-16 | ||
| 272 | } | ||
| 273 | |||
| 274 | #ifndef XMA_TEMPTATION | ||
| 275 | |||
| 276 | { .mii; mov r14=r32 // rp | ||
| 277 | mov r15=r33 // ap | ||
| 278 | mov ar.lc=r10 } | ||
| 279 | { .mii; mov r39=0 // serves as r33 at first (p26) | ||
| 280 | mov ar.ec=12 };; | ||
| 281 | |||
| 282 | // This loop spins in 2*(n+11) ticks. It's scheduled for data in L2 | ||
| 283 | // cache (i.e. 9 ticks away) as floating point load/store instructions | ||
| 284 | // bypass L1 cache and L2 latency is actually best-case scenario for | ||
| 285 | // ldf8. The loop is not scalable and shall run in 2*(n+11) even on | ||
| 286 | // "wider" IA-64 implementations. It's a trade-off here. n+22 loop | ||
| 287 | // would give us ~5% in *overall* performance improvement on "wider" | ||
| 288 | // IA-64, but would hurt Itanium for about same because of longer | ||
| 289 | // epilogue. As it's a matter of few percents in either case I've | ||
| 290 | // chosen to trade the scalability for development time (you can see | ||
| 291 | // this very instruction sequence in bn_mul_add_words loop which in | ||
| 292 | // turn is scalable). | ||
| 293 | .L_bn_mul_words_ctop: | ||
| 294 | { .mfi; (p25) getf.sig r36=f49 // low | ||
| 295 | (p21) xmpy.lu f45=f37,f8 | ||
| 296 | (p27) cmp.ltu p52,p48=r39,r38 } | ||
| 297 | { .mfi; (p16) ldf8 f32=[r15],8 | ||
| 298 | (p21) xmpy.hu f38=f37,f8 | ||
| 299 | (p0) nop.i 0x0 };; | ||
| 300 | { .mii; (p26) getf.sig r32=f43 // high | ||
| 301 | .pred.rel "mutex",p48,p52 | ||
| 302 | (p48) add r38=r37,r33 // (p26) | ||
| 303 | (p52) add r38=r37,r33,1 } // (p26) | ||
| 304 | { .mfb; (p27) st8 [r14]=r39,8 | ||
| 305 | (p0) nop.f 0x0 | ||
| 306 | br.ctop.sptk .L_bn_mul_words_ctop };; | ||
| 307 | .L_bn_mul_words_cend: | ||
| 308 | |||
| 309 | { .mii; nop.m 0x0 | ||
| 310 | .pred.rel "mutex",p49,p53 | ||
| 311 | (p49) add r8=r34,r0 | ||
| 312 | (p53) add r8=r34,r0,1 } | ||
| 313 | { .mfb; nop.m 0x0 | ||
| 314 | nop.f 0x0 | ||
| 315 | nop.b 0x0 } | ||
| 316 | |||
| 317 | #else // XMA_TEMPTATION | ||
| 318 | |||
| 319 | setf.sig f37=r0 // serves as carry at (p18) tick | ||
| 320 | mov ar.lc=r10 | ||
| 321 | mov ar.ec=5;; | ||
| 322 | |||
| 323 | // Most of you examining this code very likely wonder why in the name | ||
| 324 | // of Intel the following loop is commented out? Indeed, it looks so | ||
| 325 | // neat that you find it hard to believe that it's something wrong | ||
| 326 | // with it, right? The catch is that every iteration depends on the | ||
| 327 | // result from previous one and the latter isn't available instantly. | ||
| 328 | // The loop therefore spins at the latency of xma minus 1, or in other | ||
| 329 | // words at 6*(n+4) ticks:-( Compare to the "production" loop above | ||
| 330 | // that runs in 2*(n+11) where the low latency problem is worked around | ||
| 331 | // by moving the dependency to one-tick latent interger ALU. Note that | ||
| 332 | // "distance" between ldf8 and xma is not latency of ldf8, but the | ||
| 333 | // *difference* between xma and ldf8 latencies. | ||
| 334 | .L_bn_mul_words_ctop: | ||
| 335 | { .mfi; (p16) ldf8 f32=[r33],8 | ||
| 336 | (p18) xma.hu f38=f34,f8,f39 } | ||
| 337 | { .mfb; (p20) stf8 [r32]=f37,8 | ||
| 338 | (p18) xma.lu f35=f34,f8,f39 | ||
| 339 | br.ctop.sptk .L_bn_mul_words_ctop };; | ||
| 340 | .L_bn_mul_words_cend: | ||
| 341 | |||
| 342 | getf.sig r8=f41 // the return value | ||
| 343 | |||
| 344 | #endif // XMA_TEMPTATION | ||
| 345 | |||
| 346 | { .mii; nop.m 0x0 | ||
| 347 | mov pr=r9,-1 | ||
| 348 | mov ar.lc=r3 } | ||
| 349 | { .mfb; rum 1<<5 // clear um.mfh | ||
| 350 | nop.f 0x0 | ||
| 351 | br.ret.sptk.many b0 };; | ||
| 352 | .endp bn_mul_words# | ||
| 353 | #endif | ||
| 354 | |||
| 355 | #if 1 | ||
| 356 | // | ||
| 357 | // BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | ||
| 358 | // | ||
| 359 | .global bn_mul_add_words# | ||
| 360 | .proc bn_mul_add_words# | ||
| 361 | .align 64 | ||
| 362 | //.skip 0 // makes the loop split at 64-byte boundary | ||
| 363 | bn_mul_add_words: | ||
| 364 | .prologue | ||
| 365 | .fframe 0 | ||
| 366 | .save ar.pfs,r2 | ||
| 367 | { .mii; alloc r2=ar.pfs,4,12,0,16 | ||
| 368 | cmp4.le p6,p0=r34,r0 };; | ||
| 369 | { .mfb; mov r8=r0 // return value | ||
| 370 | (p6) br.ret.spnt.many b0 };; | ||
| 371 | |||
| 372 | .save ar.lc,r3 | ||
| 373 | { .mii; sub r10=r34,r0,1 | ||
| 374 | mov r3=ar.lc | ||
| 375 | mov r9=pr };; | ||
| 376 | |||
| 377 | .body | ||
| 378 | { .mib; setf.sig f8=r35 // w | ||
| 379 | mov pr.rot=0x400001<<16 | ||
| 380 | // ------^----- serves as (p48) at first (p26) | ||
| 381 | brp.loop.imp .L_bn_mul_add_words_ctop,.L_bn_mul_add_words_cend-16 | ||
| 382 | } | ||
| 383 | { .mii; mov r14=r32 // rp | ||
| 384 | mov r15=r33 // ap | ||
| 385 | mov ar.lc=r10 } | ||
| 386 | { .mii; mov r39=0 // serves as r33 at first (p26) | ||
| 387 | mov r18=r32 // rp copy | ||
| 388 | mov ar.ec=14 };; | ||
| 389 | |||
| 390 | // This loop spins in 3*(n+13) ticks on Itanium and should spin in | ||
| 391 | // 2*(n+13) on "wider" IA-64 implementations (to be verified with new | ||
| 392 | // µ-architecture manuals as they become available). As usual it's | ||
| 393 | // possible to compress the epilogue, down to 10 in this case, at the | ||
| 394 | // cost of scalability. Compressed (and therefore non-scalable) loop | ||
| 395 | // running at 3*(n+10) would buy you ~10% on Itanium but take ~35% | ||
| 396 | // from "wider" IA-64 so let it be scalable! Special attention was | ||
| 397 | // paid for having the loop body split at 64-byte boundary. ld8 is | ||
| 398 | // scheduled for L1 cache as the data is more than likely there. | ||
| 399 | // Indeed, bn_mul_words has put it there a moment ago:-) | ||
| 400 | .L_bn_mul_add_words_ctop: | ||
| 401 | { .mfi; (p25) getf.sig r36=f49 // low | ||
| 402 | (p21) xmpy.lu f45=f37,f8 | ||
| 403 | (p27) cmp.ltu p52,p48=r39,r38 } | ||
| 404 | { .mfi; (p16) ldf8 f32=[r15],8 | ||
| 405 | (p21) xmpy.hu f38=f37,f8 | ||
| 406 | (p27) add r43=r43,r39 };; | ||
| 407 | { .mii; (p26) getf.sig r32=f43 // high | ||
| 408 | .pred.rel "mutex",p48,p52 | ||
| 409 | (p48) add r38=r37,r33 // (p26) | ||
| 410 | (p52) add r38=r37,r33,1 } // (p26) | ||
| 411 | { .mfb; (p27) cmp.ltu.unc p56,p0=r43,r39 | ||
| 412 | (p0) nop.f 0x0 | ||
| 413 | (p0) nop.b 0x0 } | ||
| 414 | { .mii; (p26) ld8 r42=[r18],8 | ||
| 415 | (p58) cmp.eq.or p57,p0=-1,r44 | ||
| 416 | (p58) add r44=1,r44 } | ||
| 417 | { .mfb; (p29) st8 [r14]=r45,8 | ||
| 418 | (p0) nop.f 0x0 | ||
| 419 | br.ctop.sptk .L_bn_mul_add_words_ctop};; | ||
| 420 | .L_bn_mul_add_words_cend: | ||
| 421 | |||
| 422 | { .mii; nop.m 0x0 | ||
| 423 | .pred.rel "mutex",p51,p55 | ||
| 424 | (p51) add r8=r36,r0 | ||
| 425 | (p55) add r8=r36,r0,1 } | ||
| 426 | { .mfb; nop.m 0x0 | ||
| 427 | nop.f 0x0 | ||
| 428 | nop.b 0x0 };; | ||
| 429 | { .mii; | ||
| 430 | (p59) add r8=1,r8 | ||
| 431 | mov pr=r9,-1 | ||
| 432 | mov ar.lc=r3 } | ||
| 433 | { .mfb; rum 1<<5 // clear um.mfh | ||
| 434 | nop.f 0x0 | ||
| 435 | br.ret.sptk.many b0 };; | ||
| 436 | .endp bn_mul_add_words# | ||
| 437 | #endif | ||
| 438 | |||
| 439 | #if 1 | ||
| 440 | // | ||
| 441 | // void bn_sqr_words(BN_ULONG *rp, BN_ULONG *ap, int num) | ||
| 442 | // | ||
| 443 | .global bn_sqr_words# | ||
| 444 | .proc bn_sqr_words# | ||
| 445 | .align 64 | ||
| 446 | .skip 32 // makes the loop body aligned at 64-byte boundary | ||
| 447 | bn_sqr_words: | ||
| 448 | .prologue | ||
| 449 | .fframe 0 | ||
| 450 | .save ar.pfs,r2 | ||
| 451 | { .mii; alloc r2=ar.pfs,3,0,0,0 | ||
| 452 | sxt4 r34=r34 };; | ||
| 453 | { .mii; cmp.le p6,p0=r34,r0 | ||
| 454 | mov r8=r0 } // return value | ||
| 455 | { .mfb; nop.f 0x0 | ||
| 456 | (p6) br.ret.spnt.many b0 };; | ||
| 457 | |||
| 458 | .save ar.lc,r3 | ||
| 459 | { .mii; sub r10=r34,r0,1 | ||
| 460 | mov r3=ar.lc | ||
| 461 | mov r9=pr };; | ||
| 462 | |||
| 463 | .body | ||
| 464 | { .mib; | ||
| 465 | mov pr.rot=1<<16 | ||
| 466 | brp.loop.imp .L_bn_sqr_words_ctop,.L_bn_sqr_words_cend-16 | ||
| 467 | } | ||
| 468 | { .mii; add r34=8,r32 | ||
| 469 | mov ar.lc=r10 | ||
| 470 | mov ar.ec=18 };; | ||
| 471 | |||
| 472 | // 2*(n+17) on Itanium, (n+17) on "wider" IA-64 implementations. It's | ||
| 473 | // possible to compress the epilogue (I'm getting tired to write this | ||
| 474 | // comment over and over) and get down to 2*n+16 at the cost of | ||
| 475 | // scalability. The decision will very likely be reconsidered after the | ||
| 476 | // benchmark program is profiled. I.e. if perfomance gain on Itanium | ||
| 477 | // will appear larger than loss on "wider" IA-64, then the loop should | ||
| 478 | // be explicitely split and the epilogue compressed. | ||
| 479 | .L_bn_sqr_words_ctop: | ||
| 480 | { .mfi; (p16) ldf8 f32=[r33],8 | ||
| 481 | (p25) xmpy.lu f42=f41,f41 | ||
| 482 | (p0) nop.i 0x0 } | ||
| 483 | { .mib; (p33) stf8 [r32]=f50,16 | ||
| 484 | (p0) nop.i 0x0 | ||
| 485 | (p0) nop.b 0x0 } | ||
| 486 | { .mfi; (p0) nop.m 0x0 | ||
| 487 | (p25) xmpy.hu f52=f41,f41 | ||
| 488 | (p0) nop.i 0x0 } | ||
| 489 | { .mib; (p33) stf8 [r34]=f60,16 | ||
| 490 | (p0) nop.i 0x0 | ||
| 491 | br.ctop.sptk .L_bn_sqr_words_ctop };; | ||
| 492 | .L_bn_sqr_words_cend: | ||
| 493 | |||
| 494 | { .mii; nop.m 0x0 | ||
| 495 | mov pr=r9,-1 | ||
| 496 | mov ar.lc=r3 } | ||
| 497 | { .mfb; rum 1<<5 // clear um.mfh | ||
| 498 | nop.f 0x0 | ||
| 499 | br.ret.sptk.many b0 };; | ||
| 500 | .endp bn_sqr_words# | ||
| 501 | #endif | ||
| 502 | |||
| 503 | #if 1 | ||
| 504 | // Apparently we win nothing by implementing special bn_sqr_comba8. | ||
| 505 | // Yes, it is possible to reduce the number of multiplications by | ||
| 506 | // almost factor of two, but then the amount of additions would | ||
| 507 | // increase by factor of two (as we would have to perform those | ||
| 508 | // otherwise performed by xma ourselves). Normally we would trade | ||
| 509 | // anyway as multiplications are way more expensive, but not this | ||
| 510 | // time... Multiplication kernel is fully pipelined and as we drain | ||
| 511 | // one 128-bit multiplication result per clock cycle multiplications | ||
| 512 | // are effectively as inexpensive as additions. Special implementation | ||
| 513 | // might become of interest for "wider" IA-64 implementation as you'll | ||
| 514 | // be able to get through the multiplication phase faster (there won't | ||
| 515 | // be any stall issues as discussed in the commentary section below and | ||
| 516 | // you therefore will be able to employ all 4 FP units)... But these | ||
| 517 | // Itanium days it's simply too hard to justify the effort so I just | ||
| 518 | // drop down to bn_mul_comba8 code:-) | ||
| 519 | // | ||
| 520 | // void bn_sqr_comba8(BN_ULONG *r, BN_ULONG *a) | ||
| 521 | // | ||
| 522 | .global bn_sqr_comba8# | ||
| 523 | .proc bn_sqr_comba8# | ||
| 524 | .align 64 | ||
| 525 | bn_sqr_comba8: | ||
| 526 | .prologue | ||
| 527 | .fframe 0 | ||
| 528 | .save ar.pfs,r2 | ||
| 529 | { .mii; alloc r2=ar.pfs,2,1,0,0 | ||
| 530 | mov r34=r33 | ||
| 531 | add r14=8,r33 };; | ||
| 532 | .body | ||
| 533 | { .mii; add r17=8,r34 | ||
| 534 | add r15=16,r33 | ||
| 535 | add r18=16,r34 } | ||
| 536 | { .mfb; add r16=24,r33 | ||
| 537 | br .L_cheat_entry_point8 };; | ||
| 538 | .endp bn_sqr_comba8# | ||
| 539 | #endif | ||
| 540 | |||
| 541 | #if 1 | ||
| 542 | // I've estimated this routine to run in ~120 ticks, but in reality | ||
| 543 | // (i.e. according to ar.itc) it takes ~160 ticks. Are those extra | ||
| 544 | // cycles consumed for instructions fetch? Or did I misinterpret some | ||
| 545 | // clause in Itanium µ-architecture manual? Comments are welcomed and | ||
| 546 | // highly appreciated. | ||
| 547 | // | ||
| 548 | // However! It should be noted that even 160 ticks is darn good result | ||
| 549 | // as it's over 10 (yes, ten, spelled as t-e-n) times faster than the | ||
| 550 | // C version (compiled with gcc with inline assembler). I really | ||
| 551 | // kicked compiler's butt here, didn't I? Yeah! This brings us to the | ||
| 552 | // following statement. It's damn shame that this routine isn't called | ||
| 553 | // very often nowadays! According to the profiler most CPU time is | ||
| 554 | // consumed by bn_mul_add_words called from BN_from_montgomery. In | ||
| 555 | // order to estimate what we're missing, I've compared the performance | ||
| 556 | // of this routine against "traditional" implementation, i.e. against | ||
| 557 | // following routine: | ||
| 558 | // | ||
| 559 | // void bn_mul_comba8(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b) | ||
| 560 | // { r[ 8]=bn_mul_words( &(r[0]),a,8,b[0]); | ||
| 561 | // r[ 9]=bn_mul_add_words(&(r[1]),a,8,b[1]); | ||
| 562 | // r[10]=bn_mul_add_words(&(r[2]),a,8,b[2]); | ||
| 563 | // r[11]=bn_mul_add_words(&(r[3]),a,8,b[3]); | ||
| 564 | // r[12]=bn_mul_add_words(&(r[4]),a,8,b[4]); | ||
| 565 | // r[13]=bn_mul_add_words(&(r[5]),a,8,b[5]); | ||
| 566 | // r[14]=bn_mul_add_words(&(r[6]),a,8,b[6]); | ||
| 567 | // r[15]=bn_mul_add_words(&(r[7]),a,8,b[7]); | ||
| 568 | // } | ||
| 569 | // | ||
| 570 | // The one below is over 8 times faster than the one above:-( Even | ||
| 571 | // more reasons to "combafy" bn_mul_add_mont... | ||
| 572 | // | ||
| 573 | // And yes, this routine really made me wish there were an optimizing | ||
| 574 | // assembler! It also feels like it deserves a dedication. | ||
| 575 | // | ||
| 576 | // To my wife for being there and to my kids... | ||
| 577 | // | ||
| 578 | // void bn_mul_comba8(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b) | ||
| 579 | // | ||
| 580 | #define carry1 r14 | ||
| 581 | #define carry2 r15 | ||
| 582 | #define carry3 r34 | ||
| 583 | .global bn_mul_comba8# | ||
| 584 | .proc bn_mul_comba8# | ||
| 585 | .align 64 | ||
| 586 | bn_mul_comba8: | ||
| 587 | .prologue | ||
| 588 | .fframe 0 | ||
| 589 | .save ar.pfs,r2 | ||
| 590 | { .mii; alloc r2=ar.pfs,3,0,0,0 | ||
| 591 | add r14=8,r33 | ||
| 592 | add r17=8,r34 } | ||
| 593 | .body | ||
| 594 | { .mii; add r15=16,r33 | ||
| 595 | add r18=16,r34 | ||
| 596 | add r16=24,r33 } | ||
| 597 | .L_cheat_entry_point8: | ||
| 598 | { .mmi; add r19=24,r34 | ||
| 599 | |||
| 600 | ldf8 f32=[r33],32 };; | ||
| 601 | |||
| 602 | { .mmi; ldf8 f120=[r34],32 | ||
| 603 | ldf8 f121=[r17],32 } | ||
| 604 | { .mmi; ldf8 f122=[r18],32 | ||
| 605 | ldf8 f123=[r19],32 };; | ||
| 606 | { .mmi; ldf8 f124=[r34] | ||
| 607 | ldf8 f125=[r17] } | ||
| 608 | { .mmi; ldf8 f126=[r18] | ||
| 609 | ldf8 f127=[r19] } | ||
| 610 | |||
| 611 | { .mmi; ldf8 f33=[r14],32 | ||
| 612 | ldf8 f34=[r15],32 } | ||
| 613 | { .mmi; ldf8 f35=[r16],32;; | ||
| 614 | ldf8 f36=[r33] } | ||
| 615 | { .mmi; ldf8 f37=[r14] | ||
| 616 | ldf8 f38=[r15] } | ||
| 617 | { .mfi; ldf8 f39=[r16] | ||
| 618 | // -------\ Entering multiplier's heaven /------- | ||
| 619 | // ------------\ /------------ | ||
| 620 | // -----------------\ /----------------- | ||
| 621 | // ----------------------\/---------------------- | ||
| 622 | xma.hu f41=f32,f120,f0 } | ||
| 623 | { .mfi; xma.lu f40=f32,f120,f0 };; // (*) | ||
| 624 | { .mfi; xma.hu f51=f32,f121,f0 } | ||
| 625 | { .mfi; xma.lu f50=f32,f121,f0 };; | ||
| 626 | { .mfi; xma.hu f61=f32,f122,f0 } | ||
| 627 | { .mfi; xma.lu f60=f32,f122,f0 };; | ||
| 628 | { .mfi; xma.hu f71=f32,f123,f0 } | ||
| 629 | { .mfi; xma.lu f70=f32,f123,f0 };; | ||
| 630 | { .mfi; xma.hu f81=f32,f124,f0 } | ||
| 631 | { .mfi; xma.lu f80=f32,f124,f0 };; | ||
| 632 | { .mfi; xma.hu f91=f32,f125,f0 } | ||
| 633 | { .mfi; xma.lu f90=f32,f125,f0 };; | ||
| 634 | { .mfi; xma.hu f101=f32,f126,f0 } | ||
| 635 | { .mfi; xma.lu f100=f32,f126,f0 };; | ||
| 636 | { .mfi; xma.hu f111=f32,f127,f0 } | ||
| 637 | { .mfi; xma.lu f110=f32,f127,f0 };;// | ||
| 638 | // (*) You can argue that splitting at every second bundle would | ||
| 639 | // prevent "wider" IA-64 implementations from achieving the peak | ||
| 640 | // performance. Well, not really... The catch is that if you | ||
| 641 | // intend to keep 4 FP units busy by splitting at every fourth | ||
| 642 | // bundle and thus perform these 16 multiplications in 4 ticks, | ||
| 643 | // the first bundle *below* would stall because the result from | ||
| 644 | // the first xma bundle *above* won't be available for another 3 | ||
| 645 | // ticks (if not more, being an optimist, I assume that "wider" | ||
| 646 | // implementation will have same latency:-). This stall will hold | ||
| 647 | // you back and the performance would be as if every second bundle | ||
| 648 | // were split *anyway*... | ||
| 649 | { .mfi; getf.sig r16=f40 | ||
| 650 | xma.hu f42=f33,f120,f41 | ||
| 651 | add r33=8,r32 } | ||
| 652 | { .mfi; xma.lu f41=f33,f120,f41 };; | ||
| 653 | { .mfi; getf.sig r24=f50 | ||
| 654 | xma.hu f52=f33,f121,f51 } | ||
| 655 | { .mfi; xma.lu f51=f33,f121,f51 };; | ||
| 656 | { .mfi; st8 [r32]=r16,16 | ||
| 657 | xma.hu f62=f33,f122,f61 } | ||
| 658 | { .mfi; xma.lu f61=f33,f122,f61 };; | ||
| 659 | { .mfi; xma.hu f72=f33,f123,f71 } | ||
| 660 | { .mfi; xma.lu f71=f33,f123,f71 };; | ||
| 661 | { .mfi; xma.hu f82=f33,f124,f81 } | ||
| 662 | { .mfi; xma.lu f81=f33,f124,f81 };; | ||
| 663 | { .mfi; xma.hu f92=f33,f125,f91 } | ||
| 664 | { .mfi; xma.lu f91=f33,f125,f91 };; | ||
| 665 | { .mfi; xma.hu f102=f33,f126,f101 } | ||
| 666 | { .mfi; xma.lu f101=f33,f126,f101 };; | ||
| 667 | { .mfi; xma.hu f112=f33,f127,f111 } | ||
| 668 | { .mfi; xma.lu f111=f33,f127,f111 };;// | ||
| 669 | //-------------------------------------------------// | ||
| 670 | { .mfi; getf.sig r25=f41 | ||
| 671 | xma.hu f43=f34,f120,f42 } | ||
| 672 | { .mfi; xma.lu f42=f34,f120,f42 };; | ||
| 673 | { .mfi; getf.sig r16=f60 | ||
| 674 | xma.hu f53=f34,f121,f52 } | ||
| 675 | { .mfi; xma.lu f52=f34,f121,f52 };; | ||
| 676 | { .mfi; getf.sig r17=f51 | ||
| 677 | xma.hu f63=f34,f122,f62 | ||
| 678 | add r25=r25,r24 } | ||
| 679 | { .mfi; xma.lu f62=f34,f122,f62 | ||
| 680 | mov carry1=0 };; | ||
| 681 | { .mfi; cmp.ltu p6,p0=r25,r24 | ||
| 682 | xma.hu f73=f34,f123,f72 } | ||
| 683 | { .mfi; xma.lu f72=f34,f123,f72 };; | ||
| 684 | { .mfi; st8 [r33]=r25,16 | ||
| 685 | xma.hu f83=f34,f124,f82 | ||
| 686 | (p6) add carry1=1,carry1 } | ||
| 687 | { .mfi; xma.lu f82=f34,f124,f82 };; | ||
| 688 | { .mfi; xma.hu f93=f34,f125,f92 } | ||
| 689 | { .mfi; xma.lu f92=f34,f125,f92 };; | ||
| 690 | { .mfi; xma.hu f103=f34,f126,f102 } | ||
| 691 | { .mfi; xma.lu f102=f34,f126,f102 };; | ||
| 692 | { .mfi; xma.hu f113=f34,f127,f112 } | ||
| 693 | { .mfi; xma.lu f112=f34,f127,f112 };;// | ||
| 694 | //-------------------------------------------------// | ||
| 695 | { .mfi; getf.sig r18=f42 | ||
| 696 | xma.hu f44=f35,f120,f43 | ||
| 697 | add r17=r17,r16 } | ||
| 698 | { .mfi; xma.lu f43=f35,f120,f43 };; | ||
| 699 | { .mfi; getf.sig r24=f70 | ||
| 700 | xma.hu f54=f35,f121,f53 } | ||
| 701 | { .mfi; mov carry2=0 | ||
| 702 | xma.lu f53=f35,f121,f53 };; | ||
| 703 | { .mfi; getf.sig r25=f61 | ||
| 704 | xma.hu f64=f35,f122,f63 | ||
| 705 | cmp.ltu p7,p0=r17,r16 } | ||
| 706 | { .mfi; add r18=r18,r17 | ||
| 707 | xma.lu f63=f35,f122,f63 };; | ||
| 708 | { .mfi; getf.sig r26=f52 | ||
| 709 | xma.hu f74=f35,f123,f73 | ||
| 710 | (p7) add carry2=1,carry2 } | ||
| 711 | { .mfi; cmp.ltu p7,p0=r18,r17 | ||
| 712 | xma.lu f73=f35,f123,f73 | ||
| 713 | add r18=r18,carry1 };; | ||
| 714 | { .mfi; | ||
| 715 | xma.hu f84=f35,f124,f83 | ||
| 716 | (p7) add carry2=1,carry2 } | ||
| 717 | { .mfi; cmp.ltu p7,p0=r18,carry1 | ||
| 718 | xma.lu f83=f35,f124,f83 };; | ||
| 719 | { .mfi; st8 [r32]=r18,16 | ||
| 720 | xma.hu f94=f35,f125,f93 | ||
| 721 | (p7) add carry2=1,carry2 } | ||
| 722 | { .mfi; xma.lu f93=f35,f125,f93 };; | ||
| 723 | { .mfi; xma.hu f104=f35,f126,f103 } | ||
| 724 | { .mfi; xma.lu f103=f35,f126,f103 };; | ||
| 725 | { .mfi; xma.hu f114=f35,f127,f113 } | ||
| 726 | { .mfi; mov carry1=0 | ||
| 727 | xma.lu f113=f35,f127,f113 | ||
| 728 | add r25=r25,r24 };;// | ||
| 729 | //-------------------------------------------------// | ||
| 730 | { .mfi; getf.sig r27=f43 | ||
| 731 | xma.hu f45=f36,f120,f44 | ||
| 732 | cmp.ltu p6,p0=r25,r24 } | ||
| 733 | { .mfi; xma.lu f44=f36,f120,f44 | ||
| 734 | add r26=r26,r25 };; | ||
| 735 | { .mfi; getf.sig r16=f80 | ||
| 736 | xma.hu f55=f36,f121,f54 | ||
| 737 | (p6) add carry1=1,carry1 } | ||
| 738 | { .mfi; xma.lu f54=f36,f121,f54 };; | ||
| 739 | { .mfi; getf.sig r17=f71 | ||
| 740 | xma.hu f65=f36,f122,f64 | ||
| 741 | cmp.ltu p6,p0=r26,r25 } | ||
| 742 | { .mfi; xma.lu f64=f36,f122,f64 | ||
| 743 | add r27=r27,r26 };; | ||
| 744 | { .mfi; getf.sig r18=f62 | ||
| 745 | xma.hu f75=f36,f123,f74 | ||
| 746 | (p6) add carry1=1,carry1 } | ||
| 747 | { .mfi; cmp.ltu p6,p0=r27,r26 | ||
| 748 | xma.lu f74=f36,f123,f74 | ||
| 749 | add r27=r27,carry2 };; | ||
| 750 | { .mfi; getf.sig r19=f53 | ||
| 751 | xma.hu f85=f36,f124,f84 | ||
| 752 | (p6) add carry1=1,carry1 } | ||
| 753 | { .mfi; xma.lu f84=f36,f124,f84 | ||
| 754 | cmp.ltu p6,p0=r27,carry2 };; | ||
| 755 | { .mfi; st8 [r33]=r27,16 | ||
| 756 | xma.hu f95=f36,f125,f94 | ||
| 757 | (p6) add carry1=1,carry1 } | ||
| 758 | { .mfi; xma.lu f94=f36,f125,f94 };; | ||
| 759 | { .mfi; xma.hu f105=f36,f126,f104 } | ||
| 760 | { .mfi; mov carry2=0 | ||
| 761 | xma.lu f104=f36,f126,f104 | ||
| 762 | add r17=r17,r16 };; | ||
| 763 | { .mfi; xma.hu f115=f36,f127,f114 | ||
| 764 | cmp.ltu p7,p0=r17,r16 } | ||
| 765 | { .mfi; xma.lu f114=f36,f127,f114 | ||
| 766 | add r18=r18,r17 };;// | ||
| 767 | //-------------------------------------------------// | ||
| 768 | { .mfi; getf.sig r20=f44 | ||
| 769 | xma.hu f46=f37,f120,f45 | ||
| 770 | (p7) add carry2=1,carry2 } | ||
| 771 | { .mfi; cmp.ltu p7,p0=r18,r17 | ||
| 772 | xma.lu f45=f37,f120,f45 | ||
| 773 | add r19=r19,r18 };; | ||
| 774 | { .mfi; getf.sig r24=f90 | ||
| 775 | xma.hu f56=f37,f121,f55 } | ||
| 776 | { .mfi; xma.lu f55=f37,f121,f55 };; | ||
| 777 | { .mfi; getf.sig r25=f81 | ||
| 778 | xma.hu f66=f37,f122,f65 | ||
| 779 | (p7) add carry2=1,carry2 } | ||
| 780 | { .mfi; cmp.ltu p7,p0=r19,r18 | ||
| 781 | xma.lu f65=f37,f122,f65 | ||
| 782 | add r20=r20,r19 };; | ||
| 783 | { .mfi; getf.sig r26=f72 | ||
| 784 | xma.hu f76=f37,f123,f75 | ||
| 785 | (p7) add carry2=1,carry2 } | ||
| 786 | { .mfi; cmp.ltu p7,p0=r20,r19 | ||
| 787 | xma.lu f75=f37,f123,f75 | ||
| 788 | add r20=r20,carry1 };; | ||
| 789 | { .mfi; getf.sig r27=f63 | ||
| 790 | xma.hu f86=f37,f124,f85 | ||
| 791 | (p7) add carry2=1,carry2 } | ||
| 792 | { .mfi; xma.lu f85=f37,f124,f85 | ||
| 793 | cmp.ltu p7,p0=r20,carry1 };; | ||
| 794 | { .mfi; getf.sig r28=f54 | ||
| 795 | xma.hu f96=f37,f125,f95 | ||
| 796 | (p7) add carry2=1,carry2 } | ||
| 797 | { .mfi; st8 [r32]=r20,16 | ||
| 798 | xma.lu f95=f37,f125,f95 };; | ||
| 799 | { .mfi; xma.hu f106=f37,f126,f105 } | ||
| 800 | { .mfi; mov carry1=0 | ||
| 801 | xma.lu f105=f37,f126,f105 | ||
| 802 | add r25=r25,r24 };; | ||
| 803 | { .mfi; xma.hu f116=f37,f127,f115 | ||
| 804 | cmp.ltu p6,p0=r25,r24 } | ||
| 805 | { .mfi; xma.lu f115=f37,f127,f115 | ||
| 806 | add r26=r26,r25 };;// | ||
| 807 | //-------------------------------------------------// | ||
| 808 | { .mfi; getf.sig r29=f45 | ||
| 809 | xma.hu f47=f38,f120,f46 | ||
| 810 | (p6) add carry1=1,carry1 } | ||
| 811 | { .mfi; cmp.ltu p6,p0=r26,r25 | ||
| 812 | xma.lu f46=f38,f120,f46 | ||
| 813 | add r27=r27,r26 };; | ||
| 814 | { .mfi; getf.sig r16=f100 | ||
| 815 | xma.hu f57=f38,f121,f56 | ||
| 816 | (p6) add carry1=1,carry1 } | ||
| 817 | { .mfi; cmp.ltu p6,p0=r27,r26 | ||
| 818 | xma.lu f56=f38,f121,f56 | ||
| 819 | add r28=r28,r27 };; | ||
| 820 | { .mfi; getf.sig r17=f91 | ||
| 821 | xma.hu f67=f38,f122,f66 | ||
| 822 | (p6) add carry1=1,carry1 } | ||
| 823 | { .mfi; cmp.ltu p6,p0=r28,r27 | ||
| 824 | xma.lu f66=f38,f122,f66 | ||
| 825 | add r29=r29,r28 };; | ||
| 826 | { .mfi; getf.sig r18=f82 | ||
| 827 | xma.hu f77=f38,f123,f76 | ||
| 828 | (p6) add carry1=1,carry1 } | ||
| 829 | { .mfi; cmp.ltu p6,p0=r29,r28 | ||
| 830 | xma.lu f76=f38,f123,f76 | ||
| 831 | add r29=r29,carry2 };; | ||
| 832 | { .mfi; getf.sig r19=f73 | ||
| 833 | xma.hu f87=f38,f124,f86 | ||
| 834 | (p6) add carry1=1,carry1 } | ||
| 835 | { .mfi; xma.lu f86=f38,f124,f86 | ||
| 836 | cmp.ltu p6,p0=r29,carry2 };; | ||
| 837 | { .mfi; getf.sig r20=f64 | ||
| 838 | xma.hu f97=f38,f125,f96 | ||
| 839 | (p6) add carry1=1,carry1 } | ||
| 840 | { .mfi; st8 [r33]=r29,16 | ||
| 841 | xma.lu f96=f38,f125,f96 };; | ||
| 842 | { .mfi; getf.sig r21=f55 | ||
| 843 | xma.hu f107=f38,f126,f106 } | ||
| 844 | { .mfi; mov carry2=0 | ||
| 845 | xma.lu f106=f38,f126,f106 | ||
| 846 | add r17=r17,r16 };; | ||
| 847 | { .mfi; xma.hu f117=f38,f127,f116 | ||
| 848 | cmp.ltu p7,p0=r17,r16 } | ||
| 849 | { .mfi; xma.lu f116=f38,f127,f116 | ||
| 850 | add r18=r18,r17 };;// | ||
| 851 | //-------------------------------------------------// | ||
| 852 | { .mfi; getf.sig r22=f46 | ||
| 853 | xma.hu f48=f39,f120,f47 | ||
| 854 | (p7) add carry2=1,carry2 } | ||
| 855 | { .mfi; cmp.ltu p7,p0=r18,r17 | ||
| 856 | xma.lu f47=f39,f120,f47 | ||
| 857 | add r19=r19,r18 };; | ||
| 858 | { .mfi; getf.sig r24=f110 | ||
| 859 | xma.hu f58=f39,f121,f57 | ||
| 860 | (p7) add carry2=1,carry2 } | ||
| 861 | { .mfi; cmp.ltu p7,p0=r19,r18 | ||
| 862 | xma.lu f57=f39,f121,f57 | ||
| 863 | add r20=r20,r19 };; | ||
| 864 | { .mfi; getf.sig r25=f101 | ||
| 865 | xma.hu f68=f39,f122,f67 | ||
| 866 | (p7) add carry2=1,carry2 } | ||
| 867 | { .mfi; cmp.ltu p7,p0=r20,r19 | ||
| 868 | xma.lu f67=f39,f122,f67 | ||
| 869 | add r21=r21,r20 };; | ||
| 870 | { .mfi; getf.sig r26=f92 | ||
| 871 | xma.hu f78=f39,f123,f77 | ||
| 872 | (p7) add carry2=1,carry2 } | ||
| 873 | { .mfi; cmp.ltu p7,p0=r21,r20 | ||
| 874 | xma.lu f77=f39,f123,f77 | ||
| 875 | add r22=r22,r21 };; | ||
| 876 | { .mfi; getf.sig r27=f83 | ||
| 877 | xma.hu f88=f39,f124,f87 | ||
| 878 | (p7) add carry2=1,carry2 } | ||
| 879 | { .mfi; cmp.ltu p7,p0=r22,r21 | ||
| 880 | xma.lu f87=f39,f124,f87 | ||
| 881 | add r22=r22,carry1 };; | ||
| 882 | { .mfi; getf.sig r28=f74 | ||
| 883 | xma.hu f98=f39,f125,f97 | ||
| 884 | (p7) add carry2=1,carry2 } | ||
| 885 | { .mfi; xma.lu f97=f39,f125,f97 | ||
| 886 | cmp.ltu p7,p0=r22,carry1 };; | ||
| 887 | { .mfi; getf.sig r29=f65 | ||
| 888 | xma.hu f108=f39,f126,f107 | ||
| 889 | (p7) add carry2=1,carry2 } | ||
| 890 | { .mfi; st8 [r32]=r22,16 | ||
| 891 | xma.lu f107=f39,f126,f107 };; | ||
| 892 | { .mfi; getf.sig r30=f56 | ||
| 893 | xma.hu f118=f39,f127,f117 } | ||
| 894 | { .mfi; xma.lu f117=f39,f127,f117 };;// | ||
| 895 | //-------------------------------------------------// | ||
| 896 | // Leaving muliplier's heaven... Quite a ride, huh? | ||
| 897 | |||
| 898 | { .mii; getf.sig r31=f47 | ||
| 899 | add r25=r25,r24 | ||
| 900 | mov carry1=0 };; | ||
| 901 | { .mii; getf.sig r16=f111 | ||
| 902 | cmp.ltu p6,p0=r25,r24 | ||
| 903 | add r26=r26,r25 };; | ||
| 904 | { .mfb; getf.sig r17=f102 } | ||
| 905 | { .mii; | ||
| 906 | (p6) add carry1=1,carry1 | ||
| 907 | cmp.ltu p6,p0=r26,r25 | ||
| 908 | add r27=r27,r26 };; | ||
| 909 | { .mfb; nop.m 0x0 } | ||
| 910 | { .mii; | ||
| 911 | (p6) add carry1=1,carry1 | ||
| 912 | cmp.ltu p6,p0=r27,r26 | ||
| 913 | add r28=r28,r27 };; | ||
| 914 | { .mii; getf.sig r18=f93 | ||
| 915 | add r17=r17,r16 | ||
| 916 | mov carry3=0 } | ||
| 917 | { .mii; | ||
| 918 | (p6) add carry1=1,carry1 | ||
| 919 | cmp.ltu p6,p0=r28,r27 | ||
| 920 | add r29=r29,r28 };; | ||
| 921 | { .mii; getf.sig r19=f84 | ||
| 922 | cmp.ltu p7,p0=r17,r16 } | ||
| 923 | { .mii; | ||
| 924 | (p6) add carry1=1,carry1 | ||
| 925 | cmp.ltu p6,p0=r29,r28 | ||
| 926 | add r30=r30,r29 };; | ||
| 927 | { .mii; getf.sig r20=f75 | ||
| 928 | add r18=r18,r17 } | ||
| 929 | { .mii; | ||
| 930 | (p6) add carry1=1,carry1 | ||
| 931 | cmp.ltu p6,p0=r30,r29 | ||
| 932 | add r31=r31,r30 };; | ||
| 933 | { .mfb; getf.sig r21=f66 } | ||
| 934 | { .mii; (p7) add carry3=1,carry3 | ||
| 935 | cmp.ltu p7,p0=r18,r17 | ||
| 936 | add r19=r19,r18 } | ||
| 937 | { .mfb; nop.m 0x0 } | ||
| 938 | { .mii; | ||
| 939 | (p6) add carry1=1,carry1 | ||
| 940 | cmp.ltu p6,p0=r31,r30 | ||
| 941 | add r31=r31,carry2 };; | ||
| 942 | { .mfb; getf.sig r22=f57 } | ||
| 943 | { .mii; (p7) add carry3=1,carry3 | ||
| 944 | cmp.ltu p7,p0=r19,r18 | ||
| 945 | add r20=r20,r19 } | ||
| 946 | { .mfb; nop.m 0x0 } | ||
| 947 | { .mii; | ||
| 948 | (p6) add carry1=1,carry1 | ||
| 949 | cmp.ltu p6,p0=r31,carry2 };; | ||
| 950 | { .mfb; getf.sig r23=f48 } | ||
| 951 | { .mii; (p7) add carry3=1,carry3 | ||
| 952 | cmp.ltu p7,p0=r20,r19 | ||
| 953 | add r21=r21,r20 } | ||
| 954 | { .mii; | ||
| 955 | (p6) add carry1=1,carry1 } | ||
| 956 | { .mfb; st8 [r33]=r31,16 };; | ||
| 957 | |||
| 958 | { .mfb; getf.sig r24=f112 } | ||
| 959 | { .mii; (p7) add carry3=1,carry3 | ||
| 960 | cmp.ltu p7,p0=r21,r20 | ||
| 961 | add r22=r22,r21 };; | ||
| 962 | { .mfb; getf.sig r25=f103 } | ||
| 963 | { .mii; (p7) add carry3=1,carry3 | ||
| 964 | cmp.ltu p7,p0=r22,r21 | ||
| 965 | add r23=r23,r22 };; | ||
| 966 | { .mfb; getf.sig r26=f94 } | ||
| 967 | { .mii; (p7) add carry3=1,carry3 | ||
| 968 | cmp.ltu p7,p0=r23,r22 | ||
| 969 | add r23=r23,carry1 };; | ||
| 970 | { .mfb; getf.sig r27=f85 } | ||
| 971 | { .mii; (p7) add carry3=1,carry3 | ||
| 972 | cmp.ltu p7,p8=r23,carry1};; | ||
| 973 | { .mii; getf.sig r28=f76 | ||
| 974 | add r25=r25,r24 | ||
| 975 | mov carry1=0 } | ||
| 976 | { .mii; st8 [r32]=r23,16 | ||
| 977 | (p7) add carry2=1,carry3 | ||
| 978 | (p8) add carry2=0,carry3 };; | ||
| 979 | |||
| 980 | { .mfb; nop.m 0x0 } | ||
| 981 | { .mii; getf.sig r29=f67 | ||
| 982 | cmp.ltu p6,p0=r25,r24 | ||
| 983 | add r26=r26,r25 };; | ||
| 984 | { .mfb; getf.sig r30=f58 } | ||
| 985 | { .mii; | ||
| 986 | (p6) add carry1=1,carry1 | ||
| 987 | cmp.ltu p6,p0=r26,r25 | ||
| 988 | add r27=r27,r26 };; | ||
| 989 | { .mfb; getf.sig r16=f113 } | ||
| 990 | { .mii; | ||
| 991 | (p6) add carry1=1,carry1 | ||
| 992 | cmp.ltu p6,p0=r27,r26 | ||
| 993 | add r28=r28,r27 };; | ||
| 994 | { .mfb; getf.sig r17=f104 } | ||
| 995 | { .mii; | ||
| 996 | (p6) add carry1=1,carry1 | ||
| 997 | cmp.ltu p6,p0=r28,r27 | ||
| 998 | add r29=r29,r28 };; | ||
| 999 | { .mfb; getf.sig r18=f95 } | ||
| 1000 | { .mii; | ||
| 1001 | (p6) add carry1=1,carry1 | ||
| 1002 | cmp.ltu p6,p0=r29,r28 | ||
| 1003 | add r30=r30,r29 };; | ||
| 1004 | { .mii; getf.sig r19=f86 | ||
| 1005 | add r17=r17,r16 | ||
| 1006 | mov carry3=0 } | ||
| 1007 | { .mii; | ||
| 1008 | (p6) add carry1=1,carry1 | ||
| 1009 | cmp.ltu p6,p0=r30,r29 | ||
| 1010 | add r30=r30,carry2 };; | ||
| 1011 | { .mii; getf.sig r20=f77 | ||
| 1012 | cmp.ltu p7,p0=r17,r16 | ||
| 1013 | add r18=r18,r17 } | ||
| 1014 | { .mii; | ||
| 1015 | (p6) add carry1=1,carry1 | ||
| 1016 | cmp.ltu p6,p0=r30,carry2 };; | ||
| 1017 | { .mfb; getf.sig r21=f68 } | ||
| 1018 | { .mii; st8 [r33]=r30,16 | ||
| 1019 | (p6) add carry1=1,carry1 };; | ||
| 1020 | |||
| 1021 | { .mfb; getf.sig r24=f114 } | ||
| 1022 | { .mii; (p7) add carry3=1,carry3 | ||
| 1023 | cmp.ltu p7,p0=r18,r17 | ||
| 1024 | add r19=r19,r18 };; | ||
| 1025 | { .mfb; getf.sig r25=f105 } | ||
| 1026 | { .mii; (p7) add carry3=1,carry3 | ||
| 1027 | cmp.ltu p7,p0=r19,r18 | ||
| 1028 | add r20=r20,r19 };; | ||
| 1029 | { .mfb; getf.sig r26=f96 } | ||
| 1030 | { .mii; (p7) add carry3=1,carry3 | ||
| 1031 | cmp.ltu p7,p0=r20,r19 | ||
| 1032 | add r21=r21,r20 };; | ||
| 1033 | { .mfb; getf.sig r27=f87 } | ||
| 1034 | { .mii; (p7) add carry3=1,carry3 | ||
| 1035 | cmp.ltu p7,p0=r21,r20 | ||
| 1036 | add r21=r21,carry1 };; | ||
| 1037 | { .mib; getf.sig r28=f78 | ||
| 1038 | add r25=r25,r24 } | ||
| 1039 | { .mib; (p7) add carry3=1,carry3 | ||
| 1040 | cmp.ltu p7,p8=r21,carry1};; | ||
| 1041 | { .mii; st8 [r32]=r21,16 | ||
| 1042 | (p7) add carry2=1,carry3 | ||
| 1043 | (p8) add carry2=0,carry3 } | ||
| 1044 | |||
| 1045 | { .mii; mov carry1=0 | ||
| 1046 | cmp.ltu p6,p0=r25,r24 | ||
| 1047 | add r26=r26,r25 };; | ||
| 1048 | { .mfb; getf.sig r16=f115 } | ||
| 1049 | { .mii; | ||
| 1050 | (p6) add carry1=1,carry1 | ||
| 1051 | cmp.ltu p6,p0=r26,r25 | ||
| 1052 | add r27=r27,r26 };; | ||
| 1053 | { .mfb; getf.sig r17=f106 } | ||
| 1054 | { .mii; | ||
| 1055 | (p6) add carry1=1,carry1 | ||
| 1056 | cmp.ltu p6,p0=r27,r26 | ||
| 1057 | add r28=r28,r27 };; | ||
| 1058 | { .mfb; getf.sig r18=f97 } | ||
| 1059 | { .mii; | ||
| 1060 | (p6) add carry1=1,carry1 | ||
| 1061 | cmp.ltu p6,p0=r28,r27 | ||
| 1062 | add r28=r28,carry2 };; | ||
| 1063 | { .mib; getf.sig r19=f88 | ||
| 1064 | add r17=r17,r16 } | ||
| 1065 | { .mib; | ||
| 1066 | (p6) add carry1=1,carry1 | ||
| 1067 | cmp.ltu p6,p0=r28,carry2 };; | ||
| 1068 | { .mii; st8 [r33]=r28,16 | ||
| 1069 | (p6) add carry1=1,carry1 } | ||
| 1070 | |||
| 1071 | { .mii; mov carry2=0 | ||
| 1072 | cmp.ltu p7,p0=r17,r16 | ||
| 1073 | add r18=r18,r17 };; | ||
| 1074 | { .mfb; getf.sig r24=f116 } | ||
| 1075 | { .mii; (p7) add carry2=1,carry2 | ||
| 1076 | cmp.ltu p7,p0=r18,r17 | ||
| 1077 | add r19=r19,r18 };; | ||
| 1078 | { .mfb; getf.sig r25=f107 } | ||
| 1079 | { .mii; (p7) add carry2=1,carry2 | ||
| 1080 | cmp.ltu p7,p0=r19,r18 | ||
| 1081 | add r19=r19,carry1 };; | ||
| 1082 | { .mfb; getf.sig r26=f98 } | ||
| 1083 | { .mii; (p7) add carry2=1,carry2 | ||
| 1084 | cmp.ltu p7,p0=r19,carry1};; | ||
| 1085 | { .mii; st8 [r32]=r19,16 | ||
| 1086 | (p7) add carry2=1,carry2 } | ||
| 1087 | |||
| 1088 | { .mfb; add r25=r25,r24 };; | ||
| 1089 | |||
| 1090 | { .mfb; getf.sig r16=f117 } | ||
| 1091 | { .mii; mov carry1=0 | ||
| 1092 | cmp.ltu p6,p0=r25,r24 | ||
| 1093 | add r26=r26,r25 };; | ||
| 1094 | { .mfb; getf.sig r17=f108 } | ||
| 1095 | { .mii; | ||
| 1096 | (p6) add carry1=1,carry1 | ||
| 1097 | cmp.ltu p6,p0=r26,r25 | ||
| 1098 | add r26=r26,carry2 };; | ||
| 1099 | { .mfb; nop.m 0x0 } | ||
| 1100 | { .mii; | ||
| 1101 | (p6) add carry1=1,carry1 | ||
| 1102 | cmp.ltu p6,p0=r26,carry2 };; | ||
| 1103 | { .mii; st8 [r33]=r26,16 | ||
| 1104 | (p6) add carry1=1,carry1 } | ||
| 1105 | |||
| 1106 | { .mfb; add r17=r17,r16 };; | ||
| 1107 | { .mfb; getf.sig r24=f118 } | ||
| 1108 | { .mii; mov carry2=0 | ||
| 1109 | cmp.ltu p7,p0=r17,r16 | ||
| 1110 | add r17=r17,carry1 };; | ||
| 1111 | { .mii; (p7) add carry2=1,carry2 | ||
| 1112 | cmp.ltu p7,p0=r17,carry1};; | ||
| 1113 | { .mii; st8 [r32]=r17 | ||
| 1114 | (p7) add carry2=1,carry2 };; | ||
| 1115 | { .mfb; add r24=r24,carry2 };; | ||
| 1116 | { .mib; st8 [r33]=r24 } | ||
| 1117 | |||
| 1118 | { .mib; rum 1<<5 // clear um.mfh | ||
| 1119 | br.ret.sptk.many b0 };; | ||
| 1120 | .endp bn_mul_comba8# | ||
| 1121 | #undef carry3 | ||
| 1122 | #undef carry2 | ||
| 1123 | #undef carry1 | ||
| 1124 | #endif | ||
| 1125 | |||
| 1126 | #if 1 | ||
| 1127 | // It's possible to make it faster (see comment to bn_sqr_comba8), but | ||
| 1128 | // I reckon it doesn't worth the effort. Basically because the routine | ||
| 1129 | // (actually both of them) practically never called... So I just play | ||
| 1130 | // same trick as with bn_sqr_comba8. | ||
| 1131 | // | ||
| 1132 | // void bn_sqr_comba4(BN_ULONG *r, BN_ULONG *a) | ||
| 1133 | // | ||
| 1134 | .global bn_sqr_comba4# | ||
| 1135 | .proc bn_sqr_comba4# | ||
| 1136 | .align 64 | ||
| 1137 | bn_sqr_comba4: | ||
| 1138 | .prologue | ||
| 1139 | .fframe 0 | ||
| 1140 | .save ar.pfs,r2 | ||
| 1141 | { .mii; alloc r2=ar.pfs,2,1,0,0 | ||
| 1142 | mov r34=r33 | ||
| 1143 | add r14=8,r33 };; | ||
| 1144 | .body | ||
| 1145 | { .mii; add r17=8,r34 | ||
| 1146 | add r15=16,r33 | ||
| 1147 | add r18=16,r34 } | ||
| 1148 | { .mfb; add r16=24,r33 | ||
| 1149 | br .L_cheat_entry_point4 };; | ||
| 1150 | .endp bn_sqr_comba4# | ||
| 1151 | #endif | ||
| 1152 | |||
| 1153 | #if 1 | ||
| 1154 | // Runs in ~115 cycles and ~4.5 times faster than C. Well, whatever... | ||
| 1155 | // | ||
| 1156 | // void bn_mul_comba4(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b) | ||
| 1157 | // | ||
| 1158 | #define carry1 r14 | ||
| 1159 | #define carry2 r15 | ||
| 1160 | .global bn_mul_comba4# | ||
| 1161 | .proc bn_mul_comba4# | ||
| 1162 | .align 64 | ||
| 1163 | bn_mul_comba4: | ||
| 1164 | .prologue | ||
| 1165 | .fframe 0 | ||
| 1166 | .save ar.pfs,r2 | ||
| 1167 | { .mii; alloc r2=ar.pfs,3,0,0,0 | ||
| 1168 | add r14=8,r33 | ||
| 1169 | add r17=8,r34 } | ||
| 1170 | .body | ||
| 1171 | { .mii; add r15=16,r33 | ||
| 1172 | add r18=16,r34 | ||
| 1173 | add r16=24,r33 };; | ||
| 1174 | .L_cheat_entry_point4: | ||
| 1175 | { .mmi; add r19=24,r34 | ||
| 1176 | |||
| 1177 | ldf8 f32=[r33] } | ||
| 1178 | |||
| 1179 | { .mmi; ldf8 f120=[r34] | ||
| 1180 | ldf8 f121=[r17] };; | ||
| 1181 | { .mmi; ldf8 f122=[r18] | ||
| 1182 | ldf8 f123=[r19] } | ||
| 1183 | |||
| 1184 | { .mmi; ldf8 f33=[r14] | ||
| 1185 | ldf8 f34=[r15] } | ||
| 1186 | { .mfi; ldf8 f35=[r16] | ||
| 1187 | |||
| 1188 | xma.hu f41=f32,f120,f0 } | ||
| 1189 | { .mfi; xma.lu f40=f32,f120,f0 };; | ||
| 1190 | { .mfi; xma.hu f51=f32,f121,f0 } | ||
| 1191 | { .mfi; xma.lu f50=f32,f121,f0 };; | ||
| 1192 | { .mfi; xma.hu f61=f32,f122,f0 } | ||
| 1193 | { .mfi; xma.lu f60=f32,f122,f0 };; | ||
| 1194 | { .mfi; xma.hu f71=f32,f123,f0 } | ||
| 1195 | { .mfi; xma.lu f70=f32,f123,f0 };;// | ||
| 1196 | // Major stall takes place here, and 3 more places below. Result from | ||
| 1197 | // first xma is not available for another 3 ticks. | ||
| 1198 | { .mfi; getf.sig r16=f40 | ||
| 1199 | xma.hu f42=f33,f120,f41 | ||
| 1200 | add r33=8,r32 } | ||
| 1201 | { .mfi; xma.lu f41=f33,f120,f41 };; | ||
| 1202 | { .mfi; getf.sig r24=f50 | ||
| 1203 | xma.hu f52=f33,f121,f51 } | ||
| 1204 | { .mfi; xma.lu f51=f33,f121,f51 };; | ||
| 1205 | { .mfi; st8 [r32]=r16,16 | ||
| 1206 | xma.hu f62=f33,f122,f61 } | ||
| 1207 | { .mfi; xma.lu f61=f33,f122,f61 };; | ||
| 1208 | { .mfi; xma.hu f72=f33,f123,f71 } | ||
| 1209 | { .mfi; xma.lu f71=f33,f123,f71 };;// | ||
| 1210 | //-------------------------------------------------// | ||
| 1211 | { .mfi; getf.sig r25=f41 | ||
| 1212 | xma.hu f43=f34,f120,f42 } | ||
| 1213 | { .mfi; xma.lu f42=f34,f120,f42 };; | ||
| 1214 | { .mfi; getf.sig r16=f60 | ||
| 1215 | xma.hu f53=f34,f121,f52 } | ||
| 1216 | { .mfi; xma.lu f52=f34,f121,f52 };; | ||
| 1217 | { .mfi; getf.sig r17=f51 | ||
| 1218 | xma.hu f63=f34,f122,f62 | ||
| 1219 | add r25=r25,r24 } | ||
| 1220 | { .mfi; mov carry1=0 | ||
| 1221 | xma.lu f62=f34,f122,f62 };; | ||
| 1222 | { .mfi; st8 [r33]=r25,16 | ||
| 1223 | xma.hu f73=f34,f123,f72 | ||
| 1224 | cmp.ltu p6,p0=r25,r24 } | ||
| 1225 | { .mfi; xma.lu f72=f34,f123,f72 };;// | ||
| 1226 | //-------------------------------------------------// | ||
| 1227 | { .mfi; getf.sig r18=f42 | ||
| 1228 | xma.hu f44=f35,f120,f43 | ||
| 1229 | (p6) add carry1=1,carry1 } | ||
| 1230 | { .mfi; add r17=r17,r16 | ||
| 1231 | xma.lu f43=f35,f120,f43 | ||
| 1232 | mov carry2=0 };; | ||
| 1233 | { .mfi; getf.sig r24=f70 | ||
| 1234 | xma.hu f54=f35,f121,f53 | ||
| 1235 | cmp.ltu p7,p0=r17,r16 } | ||
| 1236 | { .mfi; xma.lu f53=f35,f121,f53 };; | ||
| 1237 | { .mfi; getf.sig r25=f61 | ||
| 1238 | xma.hu f64=f35,f122,f63 | ||
| 1239 | add r18=r18,r17 } | ||
| 1240 | { .mfi; xma.lu f63=f35,f122,f63 | ||
| 1241 | (p7) add carry2=1,carry2 };; | ||
| 1242 | { .mfi; getf.sig r26=f52 | ||
| 1243 | xma.hu f74=f35,f123,f73 | ||
| 1244 | cmp.ltu p7,p0=r18,r17 } | ||
| 1245 | { .mfi; xma.lu f73=f35,f123,f73 | ||
| 1246 | add r18=r18,carry1 };; | ||
| 1247 | //-------------------------------------------------// | ||
| 1248 | { .mii; st8 [r32]=r18,16 | ||
| 1249 | (p7) add carry2=1,carry2 | ||
| 1250 | cmp.ltu p7,p0=r18,carry1 };; | ||
| 1251 | |||
| 1252 | { .mfi; getf.sig r27=f43 // last major stall | ||
| 1253 | (p7) add carry2=1,carry2 };; | ||
| 1254 | { .mii; getf.sig r16=f71 | ||
| 1255 | add r25=r25,r24 | ||
| 1256 | mov carry1=0 };; | ||
| 1257 | { .mii; getf.sig r17=f62 | ||
| 1258 | cmp.ltu p6,p0=r25,r24 | ||
| 1259 | add r26=r26,r25 };; | ||
| 1260 | { .mii; | ||
| 1261 | (p6) add carry1=1,carry1 | ||
| 1262 | cmp.ltu p6,p0=r26,r25 | ||
| 1263 | add r27=r27,r26 };; | ||
| 1264 | { .mii; | ||
| 1265 | (p6) add carry1=1,carry1 | ||
| 1266 | cmp.ltu p6,p0=r27,r26 | ||
| 1267 | add r27=r27,carry2 };; | ||
| 1268 | { .mii; getf.sig r18=f53 | ||
| 1269 | (p6) add carry1=1,carry1 | ||
| 1270 | cmp.ltu p6,p0=r27,carry2 };; | ||
| 1271 | { .mfi; st8 [r33]=r27,16 | ||
| 1272 | (p6) add carry1=1,carry1 } | ||
| 1273 | |||
| 1274 | { .mii; getf.sig r19=f44 | ||
| 1275 | add r17=r17,r16 | ||
| 1276 | mov carry2=0 };; | ||
| 1277 | { .mii; getf.sig r24=f72 | ||
| 1278 | cmp.ltu p7,p0=r17,r16 | ||
| 1279 | add r18=r18,r17 };; | ||
| 1280 | { .mii; (p7) add carry2=1,carry2 | ||
| 1281 | cmp.ltu p7,p0=r18,r17 | ||
| 1282 | add r19=r19,r18 };; | ||
| 1283 | { .mii; (p7) add carry2=1,carry2 | ||
| 1284 | cmp.ltu p7,p0=r19,r18 | ||
| 1285 | add r19=r19,carry1 };; | ||
| 1286 | { .mii; getf.sig r25=f63 | ||
| 1287 | (p7) add carry2=1,carry2 | ||
| 1288 | cmp.ltu p7,p0=r19,carry1};; | ||
| 1289 | { .mii; st8 [r32]=r19,16 | ||
| 1290 | (p7) add carry2=1,carry2 } | ||
| 1291 | |||
| 1292 | { .mii; getf.sig r26=f54 | ||
| 1293 | add r25=r25,r24 | ||
| 1294 | mov carry1=0 };; | ||
| 1295 | { .mii; getf.sig r16=f73 | ||
| 1296 | cmp.ltu p6,p0=r25,r24 | ||
| 1297 | add r26=r26,r25 };; | ||
| 1298 | { .mii; | ||
| 1299 | (p6) add carry1=1,carry1 | ||
| 1300 | cmp.ltu p6,p0=r26,r25 | ||
| 1301 | add r26=r26,carry2 };; | ||
| 1302 | { .mii; getf.sig r17=f64 | ||
| 1303 | (p6) add carry1=1,carry1 | ||
| 1304 | cmp.ltu p6,p0=r26,carry2 };; | ||
| 1305 | { .mii; st8 [r33]=r26,16 | ||
| 1306 | (p6) add carry1=1,carry1 } | ||
| 1307 | |||
| 1308 | { .mii; getf.sig r24=f74 | ||
| 1309 | add r17=r17,r16 | ||
| 1310 | mov carry2=0 };; | ||
| 1311 | { .mii; cmp.ltu p7,p0=r17,r16 | ||
| 1312 | add r17=r17,carry1 };; | ||
| 1313 | |||
| 1314 | { .mii; (p7) add carry2=1,carry2 | ||
| 1315 | cmp.ltu p7,p0=r17,carry1};; | ||
| 1316 | { .mii; st8 [r32]=r17,16 | ||
| 1317 | (p7) add carry2=1,carry2 };; | ||
| 1318 | |||
| 1319 | { .mii; add r24=r24,carry2 };; | ||
| 1320 | { .mii; st8 [r33]=r24 } | ||
| 1321 | |||
| 1322 | { .mib; rum 1<<5 // clear um.mfh | ||
| 1323 | br.ret.sptk.many b0 };; | ||
| 1324 | .endp bn_mul_comba4# | ||
| 1325 | #undef carry2 | ||
| 1326 | #undef carry1 | ||
| 1327 | #endif | ||
| 1328 | |||
| 1329 | #if 1 | ||
| 1330 | // | ||
| 1331 | // BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d) | ||
| 1332 | // | ||
| 1333 | // In the nutshell it's a port of my MIPS III/IV implementation. | ||
| 1334 | // | ||
| 1335 | #define AT r14 | ||
| 1336 | #define H r16 | ||
| 1337 | #define HH r20 | ||
| 1338 | #define L r17 | ||
| 1339 | #define D r18 | ||
| 1340 | #define DH r22 | ||
| 1341 | #define I r21 | ||
| 1342 | |||
| 1343 | #if 0 | ||
| 1344 | // Some preprocessors (most notably HP-UX) apper to be allergic to | ||
| 1345 | // macros enclosed to parenthesis as these three will be. | ||
| 1346 | #define cont p16 | ||
| 1347 | #define break p0 // p20 | ||
| 1348 | #define equ p24 | ||
| 1349 | #else | ||
| 1350 | cont=p16 | ||
| 1351 | break=p0 | ||
| 1352 | equ=p24 | ||
| 1353 | #endif | ||
| 1354 | |||
| 1355 | .global abort# | ||
| 1356 | .global bn_div_words# | ||
| 1357 | .proc bn_div_words# | ||
| 1358 | .align 64 | ||
| 1359 | bn_div_words: | ||
| 1360 | .prologue | ||
| 1361 | .fframe 0 | ||
| 1362 | .save ar.pfs,r2 | ||
| 1363 | .save b0,r3 | ||
| 1364 | { .mii; alloc r2=ar.pfs,3,5,0,8 | ||
| 1365 | mov r3=b0 | ||
| 1366 | mov r10=pr };; | ||
| 1367 | { .mmb; cmp.eq p6,p0=r34,r0 | ||
| 1368 | mov r8=-1 | ||
| 1369 | (p6) br.ret.spnt.many b0 };; | ||
| 1370 | |||
| 1371 | .body | ||
| 1372 | { .mii; mov H=r32 // save h | ||
| 1373 | mov ar.ec=0 // don't rotate at exit | ||
| 1374 | mov pr.rot=0 } | ||
| 1375 | { .mii; mov L=r33 // save l | ||
| 1376 | mov r36=r0 };; | ||
| 1377 | |||
| 1378 | .L_divw_shift: // -vv- note signed comparison | ||
| 1379 | { .mfi; (p0) cmp.lt p16,p0=r0,r34 // d | ||
| 1380 | (p0) shladd r33=r34,1,r0 } | ||
| 1381 | { .mfb; (p0) add r35=1,r36 | ||
| 1382 | (p0) nop.f 0x0 | ||
| 1383 | (p16) br.wtop.dpnt .L_divw_shift };; | ||
| 1384 | |||
| 1385 | { .mii; mov D=r34 | ||
| 1386 | shr.u DH=r34,32 | ||
| 1387 | sub r35=64,r36 };; | ||
| 1388 | { .mii; setf.sig f7=DH | ||
| 1389 | shr.u AT=H,r35 | ||
| 1390 | mov I=r36 };; | ||
| 1391 | { .mib; cmp.ne p6,p0=r0,AT | ||
| 1392 | shl H=H,r36 | ||
| 1393 | (p6) br.call.spnt.clr b0=abort };; // overflow, die... | ||
| 1394 | |||
| 1395 | { .mfi; fcvt.xuf.s1 f7=f7 | ||
| 1396 | shr.u AT=L,r35 };; | ||
| 1397 | { .mii; shl L=L,r36 | ||
| 1398 | or H=H,AT };; | ||
| 1399 | |||
| 1400 | { .mii; nop.m 0x0 | ||
| 1401 | cmp.leu p6,p0=D,H;; | ||
| 1402 | (p6) sub H=H,D } | ||
| 1403 | |||
| 1404 | { .mlx; setf.sig f14=D | ||
| 1405 | movl AT=0xffffffff };; | ||
| 1406 | /////////////////////////////////////////////////////////// | ||
| 1407 | { .mii; setf.sig f6=H | ||
| 1408 | shr.u HH=H,32;; | ||
| 1409 | cmp.eq p6,p7=HH,DH };; | ||
| 1410 | { .mfb; | ||
| 1411 | (p6) setf.sig f8=AT | ||
| 1412 | (p7) fcvt.xuf.s1 f6=f6 | ||
| 1413 | (p7) br.call.sptk b6=.L_udiv64_32_b6 };; | ||
| 1414 | |||
| 1415 | { .mfi; getf.sig r33=f8 // q | ||
| 1416 | xmpy.lu f9=f8,f14 } | ||
| 1417 | { .mfi; xmpy.hu f10=f8,f14 | ||
| 1418 | shrp H=H,L,32 };; | ||
| 1419 | |||
| 1420 | { .mmi; getf.sig r35=f9 // tl | ||
| 1421 | getf.sig r31=f10 };; // th | ||
| 1422 | |||
| 1423 | .L_divw_1st_iter: | ||
| 1424 | { .mii; (p0) add r32=-1,r33 | ||
| 1425 | (p0) cmp.eq equ,cont=HH,r31 };; | ||
| 1426 | { .mii; (p0) cmp.ltu p8,p0=r35,D | ||
| 1427 | (p0) sub r34=r35,D | ||
| 1428 | (equ) cmp.leu break,cont=r35,H };; | ||
| 1429 | { .mib; (cont) cmp.leu cont,break=HH,r31 | ||
| 1430 | (p8) add r31=-1,r31 | ||
| 1431 | (cont) br.wtop.spnt .L_divw_1st_iter };; | ||
| 1432 | /////////////////////////////////////////////////////////// | ||
| 1433 | { .mii; sub H=H,r35 | ||
| 1434 | shl r8=r33,32 | ||
| 1435 | shl L=L,32 };; | ||
| 1436 | /////////////////////////////////////////////////////////// | ||
| 1437 | { .mii; setf.sig f6=H | ||
| 1438 | shr.u HH=H,32;; | ||
| 1439 | cmp.eq p6,p7=HH,DH };; | ||
| 1440 | { .mfb; | ||
| 1441 | (p6) setf.sig f8=AT | ||
| 1442 | (p7) fcvt.xuf.s1 f6=f6 | ||
| 1443 | (p7) br.call.sptk b6=.L_udiv64_32_b6 };; | ||
| 1444 | |||
| 1445 | { .mfi; getf.sig r33=f8 // q | ||
| 1446 | xmpy.lu f9=f8,f14 } | ||
| 1447 | { .mfi; xmpy.hu f10=f8,f14 | ||
| 1448 | shrp H=H,L,32 };; | ||
| 1449 | |||
| 1450 | { .mmi; getf.sig r35=f9 // tl | ||
| 1451 | getf.sig r31=f10 };; // th | ||
| 1452 | |||
| 1453 | .L_divw_2nd_iter: | ||
| 1454 | { .mii; (p0) add r32=-1,r33 | ||
| 1455 | (p0) cmp.eq equ,cont=HH,r31 };; | ||
| 1456 | { .mii; (p0) cmp.ltu p8,p0=r35,D | ||
| 1457 | (p0) sub r34=r35,D | ||
| 1458 | (equ) cmp.leu break,cont=r35,H };; | ||
| 1459 | { .mib; (cont) cmp.leu cont,break=HH,r31 | ||
| 1460 | (p8) add r31=-1,r31 | ||
| 1461 | (cont) br.wtop.spnt .L_divw_2nd_iter };; | ||
| 1462 | /////////////////////////////////////////////////////////// | ||
| 1463 | { .mii; sub H=H,r35 | ||
| 1464 | or r8=r8,r33 | ||
| 1465 | mov ar.pfs=r2 };; | ||
| 1466 | { .mii; shr.u r9=H,I // remainder if anybody wants it | ||
| 1467 | mov pr=r10,-1 } | ||
| 1468 | { .mfb; br.ret.sptk.many b0 };; | ||
| 1469 | |||
| 1470 | // Unsigned 64 by 32 (well, by 64 for the moment) bit integer division | ||
| 1471 | // procedure. | ||
| 1472 | // | ||
| 1473 | // inputs: f6 = (double)a, f7 = (double)b | ||
| 1474 | // output: f8 = (int)(a/b) | ||
| 1475 | // clobbered: f8,f9,f10,f11,pred | ||
| 1476 | pred=p15 | ||
| 1477 | // This procedure is essentially Intel code and therefore is | ||
| 1478 | // copyrighted to Intel Corporation (I suppose...). It's sligtly | ||
| 1479 | // modified for specific needs. | ||
| 1480 | .align 32 | ||
| 1481 | .skip 16 | ||
| 1482 | .L_udiv64_32_b6: | ||
| 1483 | frcpa.s1 f8,pred=f6,f7;; // [0] y0 = 1 / b | ||
| 1484 | |||
| 1485 | (pred) fnma.s1 f9=f7,f8,f1 // [5] e0 = 1 - b * y0 | ||
| 1486 | (pred) fmpy.s1 f10=f6,f8;; // [5] q0 = a * y0 | ||
| 1487 | (pred) fmpy.s1 f11=f9,f9 // [10] e1 = e0 * e0 | ||
| 1488 | (pred) fma.s1 f10=f9,f10,f10;; // [10] q1 = q0 + e0 * q0 | ||
| 1489 | (pred) fma.s1 f8=f9,f8,f8 //;; // [15] y1 = y0 + e0 * y0 | ||
| 1490 | (pred) fma.s1 f9=f11,f10,f10;; // [15] q2 = q1 + e1 * q1 | ||
| 1491 | (pred) fma.s1 f8=f11,f8,f8 //;; // [20] y2 = y1 + e1 * y1 | ||
| 1492 | (pred) fnma.s1 f10=f7,f9,f6;; // [20] r2 = a - b * q2 | ||
| 1493 | (pred) fma.s1 f8=f10,f8,f9;; // [25] q3 = q2 + r2 * y2 | ||
| 1494 | |||
| 1495 | fcvt.fxu.trunc.s1 f8=f8 // [30] q = trunc(q3) | ||
| 1496 | br.ret.sptk.many b6;; | ||
| 1497 | .endp bn_div_words# | ||
| 1498 | #endif | ||
diff --git a/src/lib/libcrypto/bn/asm/vms.mar b/src/lib/libcrypto/bn/asm/vms.mar index ac9d57d7b0..465f2774b6 100644 --- a/src/lib/libcrypto/bn/asm/vms.mar +++ b/src/lib/libcrypto/bn/asm/vms.mar | |||
| @@ -162,442 +162,237 @@ n=12 ;(AP) n by value (input) | |||
| 162 | movl #1,r0 ; return SS$_NORMAL | 162 | movl #1,r0 ; return SS$_NORMAL |
| 163 | ret | 163 | ret |
| 164 | 164 | ||
| 165 | .title (generated) | 165 | .title vax_bn_div_words unsigned divide |
| 166 | 166 | ; | |
| 167 | .psect code,nowrt | 167 | ; Richard Levitte 20-Nov-2000 |
| 168 | 168 | ; | |
| 169 | .entry BN_DIV_WORDS,^m<r2,r3,r4,r5,r6,r7,r8,r9,r10> | 169 | ; ULONG bn_div_words(ULONG h, ULONG l, ULONG d) |
| 170 | subl2 #4,sp | 170 | ; { |
| 171 | 171 | ; return ((ULONG)((((ULLONG)h)<<32)|l) / (ULLONG)d); | |
| 172 | clrl r9 | 172 | ; } |
| 173 | movl #2,r8 | 173 | ; |
| 174 | 174 | ; Using EDIV would be very easy, if it didn't do signed calculations. | |
| 175 | tstl 12(ap) | 175 | ; Therefore, som extra things have to happen around it. The way to |
| 176 | bneq noname.2 | 176 | ; handle that is to shift all operands right one step (basically dividing |
| 177 | mnegl #1,r10 | 177 | ; them by 2) and handle the different cases depending on what the lowest |
| 178 | brw noname.3 | 178 | ; bit of each operand was. |
| 179 | tstl r0 | 179 | ; |
| 180 | nop | 180 | ; To start with, let's define the following: |
| 181 | noname.2: | 181 | ; |
| 182 | 182 | ; a' = l & 1 | |
| 183 | pushl 12(ap) | 183 | ; a2 = <h,l> >> 1 # UNSIGNED shift! |
| 184 | calls #1,BN_NUM_BITS_WORD | 184 | ; b' = d & 1 |
| 185 | movl r0,r7 | 185 | ; b2 = d >> 1 # UNSIGNED shift! |
| 186 | 186 | ; | |
| 187 | cmpl r7,#32 | 187 | ; Now, use EDIV to calculate a quotient and a remainder: |
| 188 | beql noname.4 | 188 | ; |
| 189 | ashl r7,#1,r2 | 189 | ; q'' = a2/b2 |
| 190 | cmpl 4(ap),r2 | 190 | ; r'' = a2 - q''*b2 |
| 191 | blequ noname.4 | 191 | ; |
| 192 | 192 | ; If b' is 0, the quotient is already correct, we just need to adjust the | |
| 193 | pushl r7 | 193 | ; remainder: |
| 194 | calls #1,BN_DIV_WORDS_ABORT | 194 | ; |
| 195 | noname.4: | 195 | ; if (b' == 0) |
| 196 | 196 | ; { | |
| 197 | subl3 r7,#32,r7 | 197 | ; r = 2*r'' + a' |
| 198 | 198 | ; q = q'' | |
| 199 | movl 12(ap),r2 | 199 | ; } |
| 200 | cmpl 4(ap),r2 | 200 | ; |
| 201 | blssu noname.5 | 201 | ; If b' is 1, we need to do other adjustements. The first thought is the |
| 202 | subl2 r2,4(ap) | 202 | ; following (note that r' will not always have the right value, but an |
| 203 | noname.5: | 203 | ; adjustement follows further down): |
| 204 | 204 | ; | |
| 205 | tstl r7 | 205 | ; if (b' == 1) |
| 206 | beql noname.6 | 206 | ; { |
| 207 | 207 | ; q' = q'' | |
| 208 | ashl r7,r2,12(ap) | 208 | ; r' = a - q'*b |
| 209 | 209 | ; | |
| 210 | ashl r7,4(ap),r4 | 210 | ; However, one can note the folowing relationship: |
| 211 | subl3 r7,#32,r3 | 211 | ; |
| 212 | subl3 r3,#32,r2 | 212 | ; r'' = a2 - q''*b2 |
| 213 | extzv r3,r2,8(ap),r2 | 213 | ; => 2*r'' = 2*a2 - 2*q''*b2 |
| 214 | bisl3 r4,r2,4(ap) | 214 | ; = { a = 2*a2 + a', b = 2*b2 + b' = 2*b2 + 1, |
| 215 | 215 | ; q' = q'' } | |
| 216 | ashl r7,8(ap),8(ap) | 216 | ; = a - a' - q'*(b - 1) |
| 217 | noname.6: | 217 | ; = a - q'*b - a' + q' |
| 218 | 218 | ; = r' - a' + q' | |
| 219 | bicl3 #65535,12(ap),r2 | 219 | ; => r' = 2*r'' - q' + a' |
| 220 | extzv #16,#16,r2,r5 | 220 | ; |
| 221 | 221 | ; This enables us to use r'' instead of discarding and calculating another | |
| 222 | bicl3 #-65536,12(ap),r6 | 222 | ; modulo: |
| 223 | 223 | ; | |
| 224 | noname.7: | 224 | ; if (b' == 1) |
| 225 | 225 | ; { | |
| 226 | moval 4(ap),r2 | 226 | ; q' = q'' |
| 227 | movzwl 2(r2),r0 | 227 | ; r' = (r'' << 1) - q' + a' |
| 228 | cmpl r0,r5 | 228 | ; |
| 229 | bneq noname.8 | 229 | ; Now, all we have to do is adjust r', because it might be < 0: |
| 230 | 230 | ; | |
| 231 | movzwl #65535,r4 | 231 | ; while (r' < 0) |
| 232 | brb noname.9 | 232 | ; { |
| 233 | noname.8: | 233 | ; r' = r' + b |
| 234 | 234 | ; q' = q' - 1 | |
| 235 | clrl r1 | 235 | ; } |
| 236 | movl (r2),r0 | 236 | ; } |
| 237 | movl r5,r2 | 237 | ; |
| 238 | bgeq vcg.1 | 238 | ; return q' |
| 239 | cmpl r2,r0 | ||
| 240 | bgtru vcg.2 | ||
| 241 | incl r1 | ||
| 242 | brb vcg.2 | ||
| 243 | nop | ||
| 244 | vcg.1: | ||
| 245 | ediv r2,r0,r1,r0 | ||
| 246 | vcg.2: | ||
| 247 | movl r1,r4 | ||
| 248 | noname.9: | ||
| 249 | |||
| 250 | noname.10: | ||
| 251 | |||
| 252 | mull3 r5,r4,r0 | ||
| 253 | subl3 r0,4(ap),r3 | ||
| 254 | |||
| 255 | bicl3 #65535,r3,r0 | ||
| 256 | bneq noname.13 | ||
| 257 | mull3 r6,r4,r2 | ||
| 258 | ashl #16,r3,r1 | ||
| 259 | bicl3 #65535,8(ap),r0 | ||
| 260 | extzv #16,#16,r0,r0 | ||
| 261 | addl2 r0,r1 | ||
| 262 | cmpl r2,r1 | ||
| 263 | bgtru noname.12 | ||
| 264 | noname.11: | ||
| 265 | |||
| 266 | brb noname.13 | ||
| 267 | nop | ||
| 268 | noname.12: | ||
| 269 | |||
| 270 | decl r4 | ||
| 271 | brb noname.10 | ||
| 272 | noname.13: | ||
| 273 | |||
| 274 | mull3 r5,r4,r1 | ||
| 275 | |||
| 276 | mull3 r6,r4,r0 | ||
| 277 | |||
| 278 | extzv #16,#16,r0,r3 | ||
| 279 | |||
| 280 | ashl #16,r0,r2 | ||
| 281 | bicl3 #65535,r2,r0 | ||
| 282 | |||
| 283 | addl2 r3,r1 | ||
| 284 | |||
| 285 | moval 8(ap),r3 | ||
| 286 | cmpl (r3),r0 | ||
| 287 | bgequ noname.15 | ||
| 288 | incl r1 | ||
| 289 | noname.15: | ||
| 290 | |||
| 291 | subl2 r0,(r3) | ||
| 292 | |||
| 293 | cmpl 4(ap),r1 | ||
| 294 | bgequ noname.16 | ||
| 295 | |||
| 296 | addl2 12(ap),4(ap) | ||
| 297 | |||
| 298 | decl r4 | ||
| 299 | noname.16: | ||
| 300 | |||
| 301 | subl2 r1,4(ap) | ||
| 302 | |||
| 303 | decl r8 | ||
| 304 | beql noname.18 | ||
| 305 | noname.17: | ||
| 306 | |||
| 307 | ashl #16,r4,r9 | ||
| 308 | 239 | ||
| 309 | ashl #16,4(ap),r2 | 240 | h=4 ;(AP) h by value (input) |
| 310 | movzwl 2(r3),r0 | 241 | l=8 ;(AP) l by value (input) |
| 311 | bisl2 r0,r2 | 242 | d=12 ;(AP) d by value (input) |
| 312 | bicl3 #0,r2,4(ap) | ||
| 313 | 243 | ||
| 314 | bicl3 #-65536,(r3),r0 | 244 | ;aprim=r5 |
| 315 | ashl #16,r0,(r3) | 245 | ;a2=r6 |
| 316 | brw noname.7 | 246 | ;a20=r6 |
| 317 | nop | 247 | ;a21=r7 |
| 318 | noname.18: | 248 | ;bprim=r8 |
| 249 | ;b2=r9 | ||
| 250 | ;qprim=r10 ; initially used as q'' | ||
| 251 | ;rprim=r11 ; initially used as r'' | ||
| 319 | 252 | ||
| 320 | bisl2 r4,r9 | ||
| 321 | 253 | ||
| 322 | movl r9,r10 | 254 | .psect code,nowrt |
| 323 | 255 | ||
| 324 | noname.3: | 256 | .entry bn_div_words,^m<r2,r3,r4,r5,r6,r7,r8,r9,r10,r11> |
| 257 | movl l(ap),r2 | ||
| 258 | movl h(ap),r3 | ||
| 259 | movl d(ap),r4 | ||
| 260 | |||
| 261 | movl #0,r5 | ||
| 262 | movl #0,r8 | ||
| 263 | movl #0,r0 | ||
| 264 | ; movl #0,r1 | ||
| 265 | |||
| 266 | rotl #-1,r2,r6 ; a20 = l >> 1 (almost) | ||
| 267 | rotl #-1,r3,r7 ; a21 = h >> 1 (almost) | ||
| 268 | rotl #-1,r4,r9 ; b2 = d >> 1 (almost) | ||
| 269 | |||
| 270 | tstl r6 | ||
| 271 | bgeq 1$ | ||
| 272 | xorl2 #^X80000000,r6 ; fixup a20 so highest bit is 0 | ||
| 273 | incl r5 ; a' = 1 | ||
| 274 | 1$: | ||
| 275 | tstl r7 | ||
| 276 | bgeq 2$ | ||
| 277 | xorl2 #^X80000000,r6 ; fixup a20 so highest bit is 1, | ||
| 278 | ; since that's what was lowest in a21 | ||
| 279 | xorl2 #^X80000000,r7 ; fixup a21 so highest bit is 1 | ||
| 280 | 2$: | ||
| 281 | tstl r9 | ||
| 282 | beql 666$ ; Uh-oh, the divisor is 0... | ||
| 283 | bgtr 3$ | ||
| 284 | xorl2 #^X80000000,r9 ; fixup b2 so highest bit is 0 | ||
| 285 | incl r8 ; b' = 1 | ||
| 286 | 3$: | ||
| 287 | tstl r9 | ||
| 288 | bneq 4$ ; if b2 is 0, we know that b' is 1 | ||
| 289 | tstl r3 | ||
| 290 | bneq 666$ ; if higher half isn't 0, we overflow | ||
| 291 | movl r2,r10 ; otherwise, we have our result | ||
| 292 | brb 42$ ; This is a success, really. | ||
| 293 | 4$: | ||
| 294 | ediv r9,r6,r10,r11 | ||
| 295 | |||
| 296 | tstl r8 | ||
| 297 | bneq 5$ ; If b' != 0, go to the other part | ||
| 298 | ; addl3 r11,r11,r1 | ||
| 299 | ; addl2 r5,r1 | ||
| 300 | brb 42$ | ||
| 301 | 5$: | ||
| 302 | ashl #1,r11,r11 | ||
| 303 | subl2 r10,r11 | ||
| 304 | addl2 r5,r11 | ||
| 305 | bgeq 7$ | ||
| 306 | 6$: | ||
| 307 | decl r10 | ||
| 308 | addl2 r4,r11 | ||
| 309 | blss 6$ | ||
| 310 | 7$: | ||
| 311 | ; movl r11,r1 | ||
| 312 | 42$: | ||
| 325 | movl r10,r0 | 313 | movl r10,r0 |
| 326 | ret | 314 | 666$: |
| 327 | tstl r0 | 315 | ret |
| 328 | |||
| 329 | 316 | ||
| 330 | .psect code,nowrt | 317 | .title vax_bn_add_words unsigned add of two arrays |
| 331 | 318 | ; | |
| 332 | .entry BN_ADD_WORDS,^m<r2,r3,r4,r5,r6,r7> | 319 | ; Richard Levitte 20-Nov-2000 |
| 333 | 320 | ; | |
| 334 | tstl 16(ap) | 321 | ; ULONG bn_add_words(ULONG r[], ULONG a[], ULONG b[], int n) { |
| 335 | bgtr noname.21 | 322 | ; ULONG c = 0; |
| 336 | clrl r7 | 323 | ; int i; |
| 337 | brw noname.22 | 324 | ; for (i = 0; i < n; i++) <c,r[i]> = a[i] + b[i] + c; |
| 338 | noname.21: | 325 | ; return(c); |
| 339 | 326 | ; } | |
| 340 | clrl r4 | ||
| 341 | |||
| 342 | tstl r0 | ||
| 343 | noname.23: | ||
| 344 | |||
| 345 | movl 8(ap),r6 | ||
| 346 | addl3 r4,(r6),r2 | ||
| 347 | |||
| 348 | bicl2 #0,r2 | ||
| 349 | |||
| 350 | clrl r0 | ||
| 351 | cmpl r2,r4 | ||
| 352 | bgequ vcg.3 | ||
| 353 | incl r0 | ||
| 354 | vcg.3: | ||
| 355 | movl r0,r4 | ||
| 356 | |||
| 357 | movl 12(ap),r5 | ||
| 358 | addl3 (r5),r2,r1 | ||
| 359 | bicl2 #0,r1 | ||
| 360 | |||
| 361 | clrl r0 | ||
| 362 | cmpl r1,r2 | ||
| 363 | bgequ vcg.4 | ||
| 364 | incl r0 | ||
| 365 | vcg.4: | ||
| 366 | addl2 r0,r4 | ||
| 367 | |||
| 368 | movl 4(ap),r3 | ||
| 369 | movl r1,(r3) | ||
| 370 | |||
| 371 | decl 16(ap) | ||
| 372 | bgtr gen.1 | ||
| 373 | brw noname.25 | ||
| 374 | gen.1: | ||
| 375 | noname.24: | ||
| 376 | |||
| 377 | addl3 r4,4(r6),r2 | ||
| 378 | |||
| 379 | bicl2 #0,r2 | ||
| 380 | |||
| 381 | clrl r0 | ||
| 382 | cmpl r2,r4 | ||
| 383 | bgequ vcg.5 | ||
| 384 | incl r0 | ||
| 385 | vcg.5: | ||
| 386 | movl r0,r4 | ||
| 387 | |||
| 388 | addl3 4(r5),r2,r1 | ||
| 389 | bicl2 #0,r1 | ||
| 390 | |||
| 391 | clrl r0 | ||
| 392 | cmpl r1,r2 | ||
| 393 | bgequ vcg.6 | ||
| 394 | incl r0 | ||
| 395 | vcg.6: | ||
| 396 | addl2 r0,r4 | ||
| 397 | |||
| 398 | movl r1,4(r3) | ||
| 399 | |||
| 400 | decl 16(ap) | ||
| 401 | bleq noname.25 | ||
| 402 | noname.26: | ||
| 403 | |||
| 404 | addl3 r4,8(r6),r2 | ||
| 405 | |||
| 406 | bicl2 #0,r2 | ||
| 407 | |||
| 408 | clrl r0 | ||
| 409 | cmpl r2,r4 | ||
| 410 | bgequ vcg.7 | ||
| 411 | incl r0 | ||
| 412 | vcg.7: | ||
| 413 | movl r0,r4 | ||
| 414 | |||
| 415 | addl3 8(r5),r2,r1 | ||
| 416 | bicl2 #0,r1 | ||
| 417 | |||
| 418 | clrl r0 | ||
| 419 | cmpl r1,r2 | ||
| 420 | bgequ vcg.8 | ||
| 421 | incl r0 | ||
| 422 | vcg.8: | ||
| 423 | addl2 r0,r4 | ||
| 424 | |||
| 425 | movl r1,8(r3) | ||
| 426 | |||
| 427 | decl 16(ap) | ||
| 428 | bleq noname.25 | ||
| 429 | noname.27: | ||
| 430 | |||
| 431 | addl3 r4,12(r6),r2 | ||
| 432 | |||
| 433 | bicl2 #0,r2 | ||
| 434 | |||
| 435 | clrl r0 | ||
| 436 | cmpl r2,r4 | ||
| 437 | bgequ vcg.9 | ||
| 438 | incl r0 | ||
| 439 | vcg.9: | ||
| 440 | movl r0,r4 | ||
| 441 | |||
| 442 | addl3 12(r5),r2,r1 | ||
| 443 | bicl2 #0,r1 | ||
| 444 | |||
| 445 | clrl r0 | ||
| 446 | cmpl r1,r2 | ||
| 447 | bgequ vcg.10 | ||
| 448 | incl r0 | ||
| 449 | vcg.10: | ||
| 450 | addl2 r0,r4 | ||
| 451 | 327 | ||
| 452 | movl r1,12(r3) | 328 | r=4 ;(AP) r by reference (output) |
| 329 | a=8 ;(AP) a by reference (input) | ||
| 330 | b=12 ;(AP) b by reference (input) | ||
| 331 | n=16 ;(AP) n by value (input) | ||
| 453 | 332 | ||
| 454 | decl 16(ap) | ||
| 455 | bleq noname.25 | ||
| 456 | noname.28: | ||
| 457 | 333 | ||
| 458 | addl3 #16,r6,8(ap) | 334 | .psect code,nowrt |
| 459 | 335 | ||
| 460 | addl3 #16,r5,12(ap) | 336 | .entry bn_add_words,^m<r2,r3,r4,r5,r6> |
| 461 | 337 | ||
| 462 | addl3 #16,r3,4(ap) | 338 | moval @r(ap),r2 |
| 463 | brw noname.23 | 339 | moval @a(ap),r3 |
| 464 | tstl r0 | 340 | moval @b(ap),r4 |
| 465 | noname.25: | 341 | movl n(ap),r5 ; assumed >0 by C code |
| 342 | clrl r0 ; c | ||
| 466 | 343 | ||
| 467 | movl r4,r7 | 344 | tstl r5 ; carry = 0 |
| 345 | bleq 666$ | ||
| 468 | 346 | ||
| 469 | noname.22: | 347 | 0$: |
| 470 | movl r7,r0 | 348 | movl (r3)+,r6 ; carry untouched |
| 471 | ret | 349 | adwc (r4)+,r6 ; carry used and touched |
| 472 | nop | 350 | movl r6,(r2)+ ; carry untouched |
| 351 | sobgtr r5,0$ ; carry untouched | ||
| 473 | 352 | ||
| 353 | adwc #0,r0 | ||
| 354 | 666$: | ||
| 355 | ret | ||
| 474 | 356 | ||
| 357 | .title vax_bn_sub_words unsigned add of two arrays | ||
| 358 | ; | ||
| 359 | ; Richard Levitte 20-Nov-2000 | ||
| 360 | ; | ||
| 361 | ; ULONG bn_sub_words(ULONG r[], ULONG a[], ULONG b[], int n) { | ||
| 362 | ; ULONG c = 0; | ||
| 363 | ; int i; | ||
| 364 | ; for (i = 0; i < n; i++) <c,r[i]> = a[i] - b[i] - c; | ||
| 365 | ; return(c); | ||
| 366 | ; } | ||
| 475 | 367 | ||
| 476 | ;r=4 ;(AP) | 368 | r=4 ;(AP) r by reference (output) |
| 477 | ;a=8 ;(AP) | 369 | a=8 ;(AP) a by reference (input) |
| 478 | ;b=12 ;(AP) | 370 | b=12 ;(AP) b by reference (input) |
| 479 | ;n=16 ;(AP) n by value (input) | 371 | n=16 ;(AP) n by value (input) |
| 480 | 372 | ||
| 481 | .psect code,nowrt | ||
| 482 | 373 | ||
| 483 | .entry BN_SUB_WORDS,^m<r2,r3,r4,r5,r6,r7> | 374 | .psect code,nowrt |
| 484 | 375 | ||
| 485 | clrl r6 | 376 | .entry bn_sub_words,^m<r2,r3,r4,r5,r6> |
| 486 | 377 | ||
| 487 | tstl 16(ap) | 378 | moval @r(ap),r2 |
| 488 | bgtr noname.31 | 379 | moval @a(ap),r3 |
| 489 | clrl r7 | 380 | moval @b(ap),r4 |
| 490 | brw noname.32 | 381 | movl n(ap),r5 ; assumed >0 by C code |
| 491 | tstl r0 | 382 | clrl r0 ; c |
| 492 | noname.31: | ||
| 493 | 383 | ||
| 494 | noname.33: | 384 | tstl r5 ; carry = 0 |
| 385 | bleq 666$ | ||
| 495 | 386 | ||
| 496 | movl 8(ap),r5 | 387 | 0$: |
| 497 | movl (r5),r1 | 388 | movl (r3)+,r6 ; carry untouched |
| 498 | movl 12(ap),r4 | 389 | sbwc (r4)+,r6 ; carry used and touched |
| 499 | movl (r4),r2 | 390 | movl r6,(r2)+ ; carry untouched |
| 500 | 391 | sobgtr r5,0$ ; carry untouched | |
| 501 | movl 4(ap),r3 | ||
| 502 | subl3 r2,r1,r0 | ||
| 503 | subl2 r6,r0 | ||
| 504 | bicl3 #0,r0,(r3) | ||
| 505 | |||
| 506 | cmpl r1,r2 | ||
| 507 | beql noname.34 | ||
| 508 | clrl r0 | ||
| 509 | cmpl r1,r2 | ||
| 510 | bgequ vcg.11 | ||
| 511 | incl r0 | ||
| 512 | vcg.11: | ||
| 513 | movl r0,r6 | ||
| 514 | noname.34: | ||
| 515 | |||
| 516 | decl 16(ap) | ||
| 517 | bgtr gen.2 | ||
| 518 | brw noname.36 | ||
| 519 | gen.2: | ||
| 520 | noname.35: | ||
| 521 | |||
| 522 | movl 4(r5),r2 | ||
| 523 | movl 4(r4),r1 | ||
| 524 | |||
| 525 | subl3 r1,r2,r0 | ||
| 526 | subl2 r6,r0 | ||
| 527 | bicl3 #0,r0,4(r3) | ||
| 528 | |||
| 529 | cmpl r2,r1 | ||
| 530 | beql noname.37 | ||
| 531 | clrl r0 | ||
| 532 | cmpl r2,r1 | ||
| 533 | bgequ vcg.12 | ||
| 534 | incl r0 | ||
| 535 | vcg.12: | ||
| 536 | movl r0,r6 | ||
| 537 | noname.37: | ||
| 538 | |||
| 539 | decl 16(ap) | ||
| 540 | bleq noname.36 | ||
| 541 | noname.38: | ||
| 542 | |||
| 543 | movl 8(r5),r1 | ||
| 544 | movl 8(r4),r2 | ||
| 545 | |||
| 546 | subl3 r2,r1,r0 | ||
| 547 | subl2 r6,r0 | ||
| 548 | bicl3 #0,r0,8(r3) | ||
| 549 | |||
| 550 | cmpl r1,r2 | ||
| 551 | beql noname.39 | ||
| 552 | clrl r0 | ||
| 553 | cmpl r1,r2 | ||
| 554 | bgequ vcg.13 | ||
| 555 | incl r0 | ||
| 556 | vcg.13: | ||
| 557 | movl r0,r6 | ||
| 558 | noname.39: | ||
| 559 | |||
| 560 | decl 16(ap) | ||
| 561 | bleq noname.36 | ||
| 562 | noname.40: | ||
| 563 | |||
| 564 | movl 12(r5),r1 | ||
| 565 | movl 12(r4),r2 | ||
| 566 | |||
| 567 | subl3 r2,r1,r0 | ||
| 568 | subl2 r6,r0 | ||
| 569 | bicl3 #0,r0,12(r3) | ||
| 570 | |||
| 571 | cmpl r1,r2 | ||
| 572 | beql noname.41 | ||
| 573 | clrl r0 | ||
| 574 | cmpl r1,r2 | ||
| 575 | bgequ vcg.14 | ||
| 576 | incl r0 | ||
| 577 | vcg.14: | ||
| 578 | movl r0,r6 | ||
| 579 | noname.41: | ||
| 580 | |||
| 581 | decl 16(ap) | ||
| 582 | bleq noname.36 | ||
| 583 | noname.42: | ||
| 584 | |||
| 585 | addl3 #16,r5,8(ap) | ||
| 586 | |||
| 587 | addl3 #16,r4,12(ap) | ||
| 588 | |||
| 589 | addl3 #16,r3,4(ap) | ||
| 590 | brw noname.33 | ||
| 591 | tstl r0 | ||
| 592 | noname.36: | ||
| 593 | |||
| 594 | movl r6,r7 | ||
| 595 | |||
| 596 | noname.32: | ||
| 597 | movl r7,r0 | ||
| 598 | ret | ||
| 599 | nop | ||
| 600 | 392 | ||
| 393 | adwc #0,r0 | ||
| 394 | 666$: | ||
| 395 | ret | ||
| 601 | 396 | ||
| 602 | 397 | ||
| 603 | ;r=4 ;(AP) | 398 | ;r=4 ;(AP) |
| @@ -6615,81 +6410,3 @@ noname.610: | |||
| 6615 | 6410 | ||
| 6616 | ; For now, the code below doesn't work, so I end this prematurely. | 6411 | ; For now, the code below doesn't work, so I end this prematurely. |
| 6617 | .end | 6412 | .end |
| 6618 | |||
| 6619 | .title vax_bn_div64 division 64/32=>32 | ||
| 6620 | ; | ||
| 6621 | ; r.l. 16-jan-1998 | ||
| 6622 | ; | ||
| 6623 | ; unsigned int bn_div64(unsigned long h, unsigned long l, unsigned long d) | ||
| 6624 | ; return <h,l>/d; | ||
| 6625 | ; | ||
| 6626 | |||
| 6627 | .psect code,nowrt | ||
| 6628 | |||
| 6629 | h=4 ;(AP) by value (input) | ||
| 6630 | l=8 ;(AP) by value (input) | ||
| 6631 | d=12 ;(AP) by value (input) | ||
| 6632 | |||
| 6633 | .entry bn_div64,^m<r2,r3,r4,r5,r6,r7,r8,r9> | ||
| 6634 | |||
| 6635 | movl l(ap),r2 ; l | ||
| 6636 | movl h(ap),r3 ; h | ||
| 6637 | movl d(ap),r4 ; d | ||
| 6638 | clrl r5 ; q | ||
| 6639 | clrl r6 ; r | ||
| 6640 | |||
| 6641 | ; Treat "negative" specially | ||
| 6642 | tstl r3 | ||
| 6643 | blss 30$ | ||
| 6644 | |||
| 6645 | tstl r4 | ||
| 6646 | beql 90$ | ||
| 6647 | |||
| 6648 | ediv r4,r2,r5,r6 | ||
| 6649 | bvs 666$ | ||
| 6650 | |||
| 6651 | movl r5,r0 | ||
| 6652 | ret | ||
| 6653 | |||
| 6654 | 30$: | ||
| 6655 | ; The theory here is to do some harmless shifting and a little | ||
| 6656 | ; bit of rounding (brackets are to designate when decimals are | ||
| 6657 | ; cut off): | ||
| 6658 | ; | ||
| 6659 | ; result = 2 * [ ([<h,0>/2] + [d/2]) / d ] + [ l / d ] | ||
| 6660 | |||
| 6661 | movl #0,r7 | ||
| 6662 | movl r3,r8 ; copy h | ||
| 6663 | ashq #-1,r7,r7 ; [<h,0>/2] => <r8,r7> | ||
| 6664 | bicl2 #^X80000000,r8 ; Remove "sign" | ||
| 6665 | |||
| 6666 | movl r4,r9 ; copy d | ||
| 6667 | ashl #-1,r9,r9 ; [d/2] => r9 | ||
| 6668 | bicl2 #^X80000000,r9 ; Remove "sign" | ||
| 6669 | |||
| 6670 | addl2 r9,r7 | ||
| 6671 | adwc #0,r8 ; [<h,0>/2] + [d/2] => <r8,r7> | ||
| 6672 | |||
| 6673 | ediv r4,r7,r5,r6 ; [ ([<h,0>/2] + [d/2]) / d ] => <r5,r6> | ||
| 6674 | bvs 666$ | ||
| 6675 | |||
| 6676 | movl #0,r6 | ||
| 6677 | ashq #1,r5,r5 ; 2 * [ ([<h,0>/2] + [d/2]) / d ] => r5 | ||
| 6678 | |||
| 6679 | movl #0,r3 | ||
| 6680 | ediv r4,r2,r8,r9 ; [ l / d ] => <r8,r9> | ||
| 6681 | |||
| 6682 | addl2 r8,r5 ; | ||
| 6683 | bcs 666$ | ||
| 6684 | |||
| 6685 | movl r5,r0 | ||
| 6686 | ret | ||
| 6687 | |||
| 6688 | 90$: | ||
| 6689 | movl #-1,r0 | ||
| 6690 | ret | ||
| 6691 | |||
| 6692 | 666$: | ||
| 6693 | |||
| 6694 | |||
| 6695 | .end | ||
diff --git a/src/lib/libcrypto/bn/bn.h b/src/lib/libcrypto/bn/bn.h index b232c2ceae..d25b49c9d8 100644 --- a/src/lib/libcrypto/bn/bn.h +++ b/src/lib/libcrypto/bn/bn.h | |||
| @@ -59,24 +59,22 @@ | |||
| 59 | #ifndef HEADER_BN_H | 59 | #ifndef HEADER_BN_H |
| 60 | #define HEADER_BN_H | 60 | #define HEADER_BN_H |
| 61 | 61 | ||
| 62 | #ifndef NO_FP_API | 62 | #include <openssl/e_os2.h> |
| 63 | #ifndef OPENSSL_NO_FP_API | ||
| 63 | #include <stdio.h> /* FILE */ | 64 | #include <stdio.h> /* FILE */ |
| 64 | #endif | 65 | #endif |
| 65 | #include <openssl/opensslconf.h> | ||
| 66 | 66 | ||
| 67 | #ifdef __cplusplus | 67 | #ifdef __cplusplus |
| 68 | extern "C" { | 68 | extern "C" { |
| 69 | #endif | 69 | #endif |
| 70 | 70 | ||
| 71 | #ifdef VMS | 71 | #ifdef OPENSSL_SYS_VMS |
| 72 | #undef BN_LLONG /* experimental, so far... */ | 72 | #undef BN_LLONG /* experimental, so far... */ |
| 73 | #endif | 73 | #endif |
| 74 | 74 | ||
| 75 | #define BN_MUL_COMBA | 75 | #define BN_MUL_COMBA |
| 76 | #define BN_SQR_COMBA | 76 | #define BN_SQR_COMBA |
| 77 | #define BN_RECURSION | 77 | #define BN_RECURSION |
| 78 | #define RECP_MUL_MOD | ||
| 79 | #define MONT_MUL_MOD | ||
| 80 | 78 | ||
| 81 | /* This next option uses the C libraries (2 word)/(1 word) function. | 79 | /* This next option uses the C libraries (2 word)/(1 word) function. |
| 82 | * If it is not defined, I use my C version (which is slower). | 80 | * If it is not defined, I use my C version (which is slower). |
| @@ -89,8 +87,11 @@ extern "C" { | |||
| 89 | * For machines with only one compiler (or shared libraries), this should | 87 | * For machines with only one compiler (or shared libraries), this should |
| 90 | * be on. Again this in only really a problem on machines | 88 | * be on. Again this in only really a problem on machines |
| 91 | * using "long long's", are 32bit, and are not using my assembler code. */ | 89 | * using "long long's", are 32bit, and are not using my assembler code. */ |
| 92 | #if defined(MSDOS) || defined(WINDOWS) || defined(WIN32) || defined(linux) | 90 | #if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS) || \ |
| 93 | #define BN_DIV2W | 91 | defined(OPENSSL_SYS_WIN32) || defined(linux) |
| 92 | # ifndef BN_DIV2W | ||
| 93 | # define BN_DIV2W | ||
| 94 | # endif | ||
| 94 | #endif | 95 | #endif |
| 95 | 96 | ||
| 96 | /* assuming long is 64bit - this is the DEC Alpha | 97 | /* assuming long is 64bit - this is the DEC Alpha |
| @@ -142,7 +143,7 @@ extern "C" { | |||
| 142 | #endif | 143 | #endif |
| 143 | 144 | ||
| 144 | #ifdef THIRTY_TWO_BIT | 145 | #ifdef THIRTY_TWO_BIT |
| 145 | #if defined(WIN32) && !defined(__GNUC__) | 146 | #if defined(OPENSSL_SYS_WIN32) && !defined(__GNUC__) |
| 146 | #define BN_ULLONG unsigned _int64 | 147 | #define BN_ULLONG unsigned _int64 |
| 147 | #else | 148 | #else |
| 148 | #define BN_ULLONG unsigned long long | 149 | #define BN_ULLONG unsigned long long |
| @@ -153,7 +154,7 @@ extern "C" { | |||
| 153 | #define BN_BYTES 4 | 154 | #define BN_BYTES 4 |
| 154 | #define BN_BITS2 32 | 155 | #define BN_BITS2 32 |
| 155 | #define BN_BITS4 16 | 156 | #define BN_BITS4 16 |
| 156 | #ifdef WIN32 | 157 | #ifdef OPENSSL_SYS_WIN32 |
| 157 | /* VC++ doesn't like the LL suffix */ | 158 | /* VC++ doesn't like the LL suffix */ |
| 158 | #define BN_MASK (0xffffffffffffffffL) | 159 | #define BN_MASK (0xffffffffffffffffL) |
| 159 | #else | 160 | #else |
| @@ -238,18 +239,8 @@ typedef struct bignum_st | |||
| 238 | int flags; | 239 | int flags; |
| 239 | } BIGNUM; | 240 | } BIGNUM; |
| 240 | 241 | ||
| 241 | /* Used for temp variables */ | 242 | /* Used for temp variables (declaration hidden in bn_lcl.h) */ |
| 242 | #define BN_CTX_NUM 16 | 243 | typedef struct bignum_ctx BN_CTX; |
| 243 | #define BN_CTX_NUM_POS 12 | ||
| 244 | typedef struct bignum_ctx | ||
| 245 | { | ||
| 246 | int tos; | ||
| 247 | BIGNUM bn[BN_CTX_NUM]; | ||
| 248 | int flags; | ||
| 249 | int depth; | ||
| 250 | int pos[BN_CTX_NUM_POS]; | ||
| 251 | int too_many; | ||
| 252 | } BN_CTX; | ||
| 253 | 244 | ||
| 254 | typedef struct bn_blinding_st | 245 | typedef struct bn_blinding_st |
| 255 | { | 246 | { |
| @@ -283,9 +274,6 @@ typedef struct bn_recp_ctx_st | |||
| 283 | int flags; | 274 | int flags; |
| 284 | } BN_RECP_CTX; | 275 | } BN_RECP_CTX; |
| 285 | 276 | ||
| 286 | #define BN_to_montgomery(r,a,mont,ctx) BN_mod_mul_montgomery(\ | ||
| 287 | r,a,&((mont)->RR),(mont),ctx) | ||
| 288 | |||
| 289 | #define BN_prime_checks 0 /* default: select number of iterations | 277 | #define BN_prime_checks 0 /* default: select number of iterations |
| 290 | based on the size of the number */ | 278 | based on the size of the number */ |
| 291 | 279 | ||
| @@ -308,17 +296,22 @@ typedef struct bn_recp_ctx_st | |||
| 308 | /* b >= 100 */ 27) | 296 | /* b >= 100 */ 27) |
| 309 | 297 | ||
| 310 | #define BN_num_bytes(a) ((BN_num_bits(a)+7)/8) | 298 | #define BN_num_bytes(a) ((BN_num_bits(a)+7)/8) |
| 311 | #define BN_is_word(a,w) (((a)->top == 1) && ((a)->d[0] == (BN_ULONG)(w))) | 299 | |
| 312 | #define BN_is_zero(a) (((a)->top == 0) || BN_is_word(a,0)) | 300 | /* Note that BN_abs_is_word does not work reliably for w == 0 */ |
| 313 | #define BN_is_one(a) (BN_is_word((a),1)) | 301 | #define BN_abs_is_word(a,w) (((a)->top == 1) && ((a)->d[0] == (BN_ULONG)(w))) |
| 314 | #define BN_is_odd(a) (((a)->top > 0) && ((a)->d[0] & 1)) | 302 | #define BN_is_zero(a) (((a)->top == 0) || BN_abs_is_word(a,0)) |
| 303 | #define BN_is_one(a) (BN_abs_is_word((a),1) && !(a)->neg) | ||
| 304 | #define BN_is_word(a,w) ((w) ? BN_abs_is_word((a),(w)) && !(a)->neg : \ | ||
| 305 | BN_is_zero((a))) | ||
| 306 | #define BN_is_odd(a) (((a)->top > 0) && ((a)->d[0] & 1)) | ||
| 307 | |||
| 315 | #define BN_one(a) (BN_set_word((a),1)) | 308 | #define BN_one(a) (BN_set_word((a),1)) |
| 316 | #define BN_zero(a) (BN_set_word((a),0)) | 309 | #define BN_zero(a) (BN_set_word((a),0)) |
| 317 | 310 | ||
| 318 | /*#define BN_ascii2bn(a) BN_hex2bn(a) */ | 311 | /*#define BN_ascii2bn(a) BN_hex2bn(a) */ |
| 319 | /*#define BN_bn2ascii(a) BN_bn2hex(a) */ | 312 | /*#define BN_bn2ascii(a) BN_bn2hex(a) */ |
| 320 | 313 | ||
| 321 | BIGNUM *BN_value_one(void); | 314 | const BIGNUM *BN_value_one(void); |
| 322 | char * BN_options(void); | 315 | char * BN_options(void); |
| 323 | BN_CTX *BN_CTX_new(void); | 316 | BN_CTX *BN_CTX_new(void); |
| 324 | void BN_CTX_init(BN_CTX *c); | 317 | void BN_CTX_init(BN_CTX *c); |
| @@ -329,51 +322,70 @@ void BN_CTX_end(BN_CTX *ctx); | |||
| 329 | int BN_rand(BIGNUM *rnd, int bits, int top,int bottom); | 322 | int BN_rand(BIGNUM *rnd, int bits, int top,int bottom); |
| 330 | int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,int bottom); | 323 | int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,int bottom); |
| 331 | int BN_rand_range(BIGNUM *rnd, BIGNUM *range); | 324 | int BN_rand_range(BIGNUM *rnd, BIGNUM *range); |
| 325 | int BN_pseudo_rand_range(BIGNUM *rnd, BIGNUM *range); | ||
| 332 | int BN_num_bits(const BIGNUM *a); | 326 | int BN_num_bits(const BIGNUM *a); |
| 333 | int BN_num_bits_word(BN_ULONG); | 327 | int BN_num_bits_word(BN_ULONG); |
| 334 | BIGNUM *BN_new(void); | 328 | BIGNUM *BN_new(void); |
| 335 | void BN_init(BIGNUM *); | 329 | void BN_init(BIGNUM *); |
| 336 | void BN_clear_free(BIGNUM *a); | 330 | void BN_clear_free(BIGNUM *a); |
| 337 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | 331 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); |
| 332 | void BN_swap(BIGNUM *a, BIGNUM *b); | ||
| 338 | BIGNUM *BN_bin2bn(const unsigned char *s,int len,BIGNUM *ret); | 333 | BIGNUM *BN_bin2bn(const unsigned char *s,int len,BIGNUM *ret); |
| 339 | int BN_bn2bin(const BIGNUM *a, unsigned char *to); | 334 | int BN_bn2bin(const BIGNUM *a, unsigned char *to); |
| 340 | BIGNUM *BN_mpi2bn(unsigned char *s,int len,BIGNUM *ret); | 335 | BIGNUM *BN_mpi2bn(const unsigned char *s,int len,BIGNUM *ret); |
| 341 | int BN_bn2mpi(const BIGNUM *a, unsigned char *to); | 336 | int BN_bn2mpi(const BIGNUM *a, unsigned char *to); |
| 342 | int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | 337 | int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); |
| 343 | int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | 338 | int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); |
| 344 | int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | 339 | int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); |
| 345 | int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | 340 | int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); |
| 346 | int BN_mod(BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx); | 341 | int BN_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); |
| 342 | int BN_sqr(BIGNUM *r, const BIGNUM *a,BN_CTX *ctx); | ||
| 343 | |||
| 347 | int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, | 344 | int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, |
| 348 | BN_CTX *ctx); | 345 | BN_CTX *ctx); |
| 349 | int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); | 346 | #define BN_mod(rem,m,d,ctx) BN_div(NULL,(rem),(m),(d),(ctx)) |
| 350 | int BN_sqr(BIGNUM *r, BIGNUM *a,BN_CTX *ctx); | 347 | int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx); |
| 348 | int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); | ||
| 349 | int BN_mod_add_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m); | ||
| 350 | int BN_mod_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); | ||
| 351 | int BN_mod_sub_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m); | ||
| 352 | int BN_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, | ||
| 353 | const BIGNUM *m, BN_CTX *ctx); | ||
| 354 | int BN_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); | ||
| 355 | int BN_mod_lshift1(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); | ||
| 356 | int BN_mod_lshift1_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *m); | ||
| 357 | int BN_mod_lshift(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m, BN_CTX *ctx); | ||
| 358 | int BN_mod_lshift_quick(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m); | ||
| 359 | |||
| 351 | BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w); | 360 | BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w); |
| 352 | BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w); | 361 | BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w); |
| 353 | int BN_mul_word(BIGNUM *a, BN_ULONG w); | 362 | int BN_mul_word(BIGNUM *a, BN_ULONG w); |
| 354 | int BN_add_word(BIGNUM *a, BN_ULONG w); | 363 | int BN_add_word(BIGNUM *a, BN_ULONG w); |
| 355 | int BN_sub_word(BIGNUM *a, BN_ULONG w); | 364 | int BN_sub_word(BIGNUM *a, BN_ULONG w); |
| 356 | int BN_set_word(BIGNUM *a, BN_ULONG w); | 365 | int BN_set_word(BIGNUM *a, BN_ULONG w); |
| 357 | BN_ULONG BN_get_word(BIGNUM *a); | 366 | BN_ULONG BN_get_word(const BIGNUM *a); |
| 367 | |||
| 358 | int BN_cmp(const BIGNUM *a, const BIGNUM *b); | 368 | int BN_cmp(const BIGNUM *a, const BIGNUM *b); |
| 359 | void BN_free(BIGNUM *a); | 369 | void BN_free(BIGNUM *a); |
| 360 | int BN_is_bit_set(const BIGNUM *a, int n); | 370 | int BN_is_bit_set(const BIGNUM *a, int n); |
| 361 | int BN_lshift(BIGNUM *r, const BIGNUM *a, int n); | 371 | int BN_lshift(BIGNUM *r, const BIGNUM *a, int n); |
| 362 | int BN_lshift1(BIGNUM *r, BIGNUM *a); | 372 | int BN_lshift1(BIGNUM *r, const BIGNUM *a); |
| 363 | int BN_exp(BIGNUM *r, BIGNUM *a, BIGNUM *p,BN_CTX *ctx); | 373 | int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,BN_CTX *ctx); |
| 364 | int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, | 374 | |
| 365 | const BIGNUM *m,BN_CTX *ctx); | 375 | int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
| 366 | int BN_mod_exp_mont(BIGNUM *r, BIGNUM *a, const BIGNUM *p, | 376 | const BIGNUM *m,BN_CTX *ctx); |
| 367 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | 377 | int BN_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
| 378 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | ||
| 368 | int BN_mod_exp_mont_word(BIGNUM *r, BN_ULONG a, const BIGNUM *p, | 379 | int BN_mod_exp_mont_word(BIGNUM *r, BN_ULONG a, const BIGNUM *p, |
| 369 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | 380 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); |
| 370 | int BN_mod_exp2_mont(BIGNUM *r, BIGNUM *a1, BIGNUM *p1,BIGNUM *a2, | 381 | int BN_mod_exp2_mont(BIGNUM *r, const BIGNUM *a1, const BIGNUM *p1, |
| 371 | BIGNUM *p2,BIGNUM *m,BN_CTX *ctx,BN_MONT_CTX *m_ctx); | 382 | const BIGNUM *a2, const BIGNUM *p2,const BIGNUM *m, |
| 372 | int BN_mod_exp_simple(BIGNUM *r, BIGNUM *a, BIGNUM *p, | 383 | BN_CTX *ctx,BN_MONT_CTX *m_ctx); |
| 373 | BIGNUM *m,BN_CTX *ctx); | 384 | int BN_mod_exp_simple(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
| 385 | const BIGNUM *m,BN_CTX *ctx); | ||
| 386 | |||
| 374 | int BN_mask_bits(BIGNUM *a,int n); | 387 | int BN_mask_bits(BIGNUM *a,int n); |
| 375 | int BN_mod_mul(BIGNUM *ret, BIGNUM *a, BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); | 388 | #ifndef OPENSSL_NO_FP_API |
| 376 | #ifndef NO_FP_API | ||
| 377 | int BN_print_fp(FILE *fp, const BIGNUM *a); | 389 | int BN_print_fp(FILE *fp, const BIGNUM *a); |
| 378 | #endif | 390 | #endif |
| 379 | #ifdef HEADER_BIO_H | 391 | #ifdef HEADER_BIO_H |
| @@ -381,9 +393,9 @@ int BN_print(BIO *fp, const BIGNUM *a); | |||
| 381 | #else | 393 | #else |
| 382 | int BN_print(void *fp, const BIGNUM *a); | 394 | int BN_print(void *fp, const BIGNUM *a); |
| 383 | #endif | 395 | #endif |
| 384 | int BN_reciprocal(BIGNUM *r, BIGNUM *m, int len, BN_CTX *ctx); | 396 | int BN_reciprocal(BIGNUM *r, const BIGNUM *m, int len, BN_CTX *ctx); |
| 385 | int BN_rshift(BIGNUM *r, BIGNUM *a, int n); | 397 | int BN_rshift(BIGNUM *r, const BIGNUM *a, int n); |
| 386 | int BN_rshift1(BIGNUM *r, BIGNUM *a); | 398 | int BN_rshift1(BIGNUM *r, const BIGNUM *a); |
| 387 | void BN_clear(BIGNUM *a); | 399 | void BN_clear(BIGNUM *a); |
| 388 | BIGNUM *BN_dup(const BIGNUM *a); | 400 | BIGNUM *BN_dup(const BIGNUM *a); |
| 389 | int BN_ucmp(const BIGNUM *a, const BIGNUM *b); | 401 | int BN_ucmp(const BIGNUM *a, const BIGNUM *b); |
| @@ -393,23 +405,30 @@ char * BN_bn2hex(const BIGNUM *a); | |||
| 393 | char * BN_bn2dec(const BIGNUM *a); | 405 | char * BN_bn2dec(const BIGNUM *a); |
| 394 | int BN_hex2bn(BIGNUM **a, const char *str); | 406 | int BN_hex2bn(BIGNUM **a, const char *str); |
| 395 | int BN_dec2bn(BIGNUM **a, const char *str); | 407 | int BN_dec2bn(BIGNUM **a, const char *str); |
| 396 | int BN_gcd(BIGNUM *r,BIGNUM *in_a,BIGNUM *in_b,BN_CTX *ctx); | 408 | int BN_gcd(BIGNUM *r,const BIGNUM *a,const BIGNUM *b,BN_CTX *ctx); |
| 397 | BIGNUM *BN_mod_inverse(BIGNUM *ret,BIGNUM *a, const BIGNUM *n,BN_CTX *ctx); | 409 | int BN_kronecker(const BIGNUM *a,const BIGNUM *b,BN_CTX *ctx); /* returns -2 for error */ |
| 398 | BIGNUM *BN_generate_prime(BIGNUM *ret,int bits,int safe,BIGNUM *add, | 410 | BIGNUM *BN_mod_inverse(BIGNUM *ret, |
| 399 | BIGNUM *rem,void (*callback)(int,int,void *),void *cb_arg); | 411 | const BIGNUM *a, const BIGNUM *n,BN_CTX *ctx); |
| 412 | BIGNUM *BN_mod_sqrt(BIGNUM *ret, | ||
| 413 | const BIGNUM *a, const BIGNUM *n,BN_CTX *ctx); | ||
| 414 | BIGNUM *BN_generate_prime(BIGNUM *ret,int bits,int safe, | ||
| 415 | const BIGNUM *add, const BIGNUM *rem, | ||
| 416 | void (*callback)(int,int,void *),void *cb_arg); | ||
| 400 | int BN_is_prime(const BIGNUM *p,int nchecks, | 417 | int BN_is_prime(const BIGNUM *p,int nchecks, |
| 401 | void (*callback)(int,int,void *), | 418 | void (*callback)(int,int,void *), |
| 402 | BN_CTX *ctx,void *cb_arg); | 419 | BN_CTX *ctx,void *cb_arg); |
| 403 | int BN_is_prime_fasttest(const BIGNUM *p,int nchecks, | 420 | int BN_is_prime_fasttest(const BIGNUM *p,int nchecks, |
| 404 | void (*callback)(int,int,void *),BN_CTX *ctx,void *cb_arg, | 421 | void (*callback)(int,int,void *),BN_CTX *ctx,void *cb_arg, |
| 405 | int do_trial_division); | 422 | int do_trial_division); |
| 406 | void ERR_load_BN_strings(void ); | ||
| 407 | 423 | ||
| 408 | BN_MONT_CTX *BN_MONT_CTX_new(void ); | 424 | BN_MONT_CTX *BN_MONT_CTX_new(void ); |
| 409 | void BN_MONT_CTX_init(BN_MONT_CTX *ctx); | 425 | void BN_MONT_CTX_init(BN_MONT_CTX *ctx); |
| 410 | int BN_mod_mul_montgomery(BIGNUM *r,BIGNUM *a,BIGNUM *b,BN_MONT_CTX *mont, | 426 | int BN_mod_mul_montgomery(BIGNUM *r,const BIGNUM *a,const BIGNUM *b, |
| 411 | BN_CTX *ctx); | 427 | BN_MONT_CTX *mont, BN_CTX *ctx); |
| 412 | int BN_from_montgomery(BIGNUM *r,BIGNUM *a,BN_MONT_CTX *mont,BN_CTX *ctx); | 428 | #define BN_to_montgomery(r,a,mont,ctx) BN_mod_mul_montgomery(\ |
| 429 | (r),(a),&((mont)->RR),(mont),(ctx)) | ||
| 430 | int BN_from_montgomery(BIGNUM *r,const BIGNUM *a, | ||
| 431 | BN_MONT_CTX *mont, BN_CTX *ctx); | ||
| 413 | void BN_MONT_CTX_free(BN_MONT_CTX *mont); | 432 | void BN_MONT_CTX_free(BN_MONT_CTX *mont); |
| 414 | int BN_MONT_CTX_set(BN_MONT_CTX *mont,const BIGNUM *modulus,BN_CTX *ctx); | 433 | int BN_MONT_CTX_set(BN_MONT_CTX *mont,const BIGNUM *modulus,BN_CTX *ctx); |
| 415 | BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to,BN_MONT_CTX *from); | 434 | BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to,BN_MONT_CTX *from); |
| @@ -427,12 +446,12 @@ void BN_RECP_CTX_init(BN_RECP_CTX *recp); | |||
| 427 | BN_RECP_CTX *BN_RECP_CTX_new(void); | 446 | BN_RECP_CTX *BN_RECP_CTX_new(void); |
| 428 | void BN_RECP_CTX_free(BN_RECP_CTX *recp); | 447 | void BN_RECP_CTX_free(BN_RECP_CTX *recp); |
| 429 | int BN_RECP_CTX_set(BN_RECP_CTX *recp,const BIGNUM *rdiv,BN_CTX *ctx); | 448 | int BN_RECP_CTX_set(BN_RECP_CTX *recp,const BIGNUM *rdiv,BN_CTX *ctx); |
| 430 | int BN_mod_mul_reciprocal(BIGNUM *r, BIGNUM *x, BIGNUM *y, | 449 | int BN_mod_mul_reciprocal(BIGNUM *r, const BIGNUM *x, const BIGNUM *y, |
| 431 | BN_RECP_CTX *recp,BN_CTX *ctx); | 450 | BN_RECP_CTX *recp,BN_CTX *ctx); |
| 432 | int BN_mod_exp_recp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | 451 | int BN_mod_exp_recp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
| 433 | const BIGNUM *m, BN_CTX *ctx); | 452 | const BIGNUM *m, BN_CTX *ctx); |
| 434 | int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *m, | 453 | int BN_div_recp(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, |
| 435 | BN_RECP_CTX *recp, BN_CTX *ctx); | 454 | BN_RECP_CTX *recp, BN_CTX *ctx); |
| 436 | 455 | ||
| 437 | /* library internal functions */ | 456 | /* library internal functions */ |
| 438 | 457 | ||
| @@ -440,6 +459,7 @@ int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *m, | |||
| 440 | (a):bn_expand2((a),(bits)/BN_BITS2+1)) | 459 | (a):bn_expand2((a),(bits)/BN_BITS2+1)) |
| 441 | #define bn_wexpand(a,words) (((words) <= (a)->dmax)?(a):bn_expand2((a),(words))) | 460 | #define bn_wexpand(a,words) (((words) <= (a)->dmax)?(a):bn_expand2((a),(words))) |
| 442 | BIGNUM *bn_expand2(BIGNUM *a, int words); | 461 | BIGNUM *bn_expand2(BIGNUM *a, int words); |
| 462 | BIGNUM *bn_dup_expand(const BIGNUM *a, int words); | ||
| 443 | 463 | ||
| 444 | #define bn_fix_top(a) \ | 464 | #define bn_fix_top(a) \ |
| 445 | { \ | 465 | { \ |
| @@ -451,15 +471,15 @@ BIGNUM *bn_expand2(BIGNUM *a, int words); | |||
| 451 | } \ | 471 | } \ |
| 452 | } | 472 | } |
| 453 | 473 | ||
| 454 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w); | 474 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w); |
| 455 | BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w); | 475 | BN_ULONG bn_mul_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w); |
| 456 | void bn_sqr_words(BN_ULONG *rp, BN_ULONG *ap, int num); | 476 | void bn_sqr_words(BN_ULONG *rp, const BN_ULONG *ap, int num); |
| 457 | BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d); | 477 | BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d); |
| 458 | BN_ULONG bn_add_words(BN_ULONG *rp, BN_ULONG *ap, BN_ULONG *bp,int num); | 478 | BN_ULONG bn_add_words(BN_ULONG *rp, const BN_ULONG *ap, const BN_ULONG *bp,int num); |
| 459 | BN_ULONG bn_sub_words(BN_ULONG *rp, BN_ULONG *ap, BN_ULONG *bp,int num); | 479 | BN_ULONG bn_sub_words(BN_ULONG *rp, const BN_ULONG *ap, const BN_ULONG *bp,int num); |
| 460 | 480 | ||
| 461 | #ifdef BN_DEBUG | 481 | #ifdef BN_DEBUG |
| 462 | void bn_dump1(FILE *o, const char *a, BN_ULONG *b,int n); | 482 | void bn_dump1(FILE *o, const char *a, const BN_ULONG *b,int n); |
| 463 | # define bn_print(a) {fprintf(stderr, #a "="); BN_print_fp(stderr,a); \ | 483 | # define bn_print(a) {fprintf(stderr, #a "="); BN_print_fp(stderr,a); \ |
| 464 | fprintf(stderr,"\n");} | 484 | fprintf(stderr,"\n");} |
| 465 | # define bn_dump(a,n) bn_dump1(stderr,#a,a,n); | 485 | # define bn_dump(a,n) bn_dump1(stderr,#a,a,n); |
| @@ -474,6 +494,7 @@ int BN_bntest_rand(BIGNUM *rnd, int bits, int top,int bottom); | |||
| 474 | /* The following lines are auto generated by the script mkerr.pl. Any changes | 494 | /* The following lines are auto generated by the script mkerr.pl. Any changes |
| 475 | * made after this point may be overwritten when the script is next run. | 495 | * made after this point may be overwritten when the script is next run. |
| 476 | */ | 496 | */ |
| 497 | void ERR_load_BN_strings(void); | ||
| 477 | 498 | ||
| 478 | /* Error codes for the BN functions. */ | 499 | /* Error codes for the BN functions. */ |
| 479 | 500 | ||
| @@ -488,11 +509,14 @@ int BN_bntest_rand(BIGNUM *rnd, int bits, int top,int bottom); | |||
| 488 | #define BN_F_BN_CTX_NEW 106 | 509 | #define BN_F_BN_CTX_NEW 106 |
| 489 | #define BN_F_BN_DIV 107 | 510 | #define BN_F_BN_DIV 107 |
| 490 | #define BN_F_BN_EXPAND2 108 | 511 | #define BN_F_BN_EXPAND2 108 |
| 512 | #define BN_F_BN_EXPAND_INTERNAL 120 | ||
| 491 | #define BN_F_BN_MOD_EXP2_MONT 118 | 513 | #define BN_F_BN_MOD_EXP2_MONT 118 |
| 492 | #define BN_F_BN_MOD_EXP_MONT 109 | 514 | #define BN_F_BN_MOD_EXP_MONT 109 |
| 493 | #define BN_F_BN_MOD_EXP_MONT_WORD 117 | 515 | #define BN_F_BN_MOD_EXP_MONT_WORD 117 |
| 494 | #define BN_F_BN_MOD_INVERSE 110 | 516 | #define BN_F_BN_MOD_INVERSE 110 |
| 517 | #define BN_F_BN_MOD_LSHIFT_QUICK 119 | ||
| 495 | #define BN_F_BN_MOD_MUL_RECIPROCAL 111 | 518 | #define BN_F_BN_MOD_MUL_RECIPROCAL 111 |
| 519 | #define BN_F_BN_MOD_SQRT 121 | ||
| 496 | #define BN_F_BN_MPI2BN 112 | 520 | #define BN_F_BN_MPI2BN 112 |
| 497 | #define BN_F_BN_NEW 113 | 521 | #define BN_F_BN_NEW 113 |
| 498 | #define BN_F_BN_RAND 114 | 522 | #define BN_F_BN_RAND 114 |
| @@ -507,14 +531,17 @@ int BN_bntest_rand(BIGNUM *rnd, int bits, int top,int bottom); | |||
| 507 | #define BN_R_DIV_BY_ZERO 103 | 531 | #define BN_R_DIV_BY_ZERO 103 |
| 508 | #define BN_R_ENCODING_ERROR 104 | 532 | #define BN_R_ENCODING_ERROR 104 |
| 509 | #define BN_R_EXPAND_ON_STATIC_BIGNUM_DATA 105 | 533 | #define BN_R_EXPAND_ON_STATIC_BIGNUM_DATA 105 |
| 534 | #define BN_R_INPUT_NOT_REDUCED 110 | ||
| 510 | #define BN_R_INVALID_LENGTH 106 | 535 | #define BN_R_INVALID_LENGTH 106 |
| 511 | #define BN_R_INVALID_RANGE 115 | 536 | #define BN_R_INVALID_RANGE 115 |
| 537 | #define BN_R_NOT_A_SQUARE 111 | ||
| 512 | #define BN_R_NOT_INITIALIZED 107 | 538 | #define BN_R_NOT_INITIALIZED 107 |
| 513 | #define BN_R_NO_INVERSE 108 | 539 | #define BN_R_NO_INVERSE 108 |
| 540 | #define BN_R_P_IS_NOT_PRIME 112 | ||
| 541 | #define BN_R_TOO_MANY_ITERATIONS 113 | ||
| 514 | #define BN_R_TOO_MANY_TEMPORARY_VARIABLES 109 | 542 | #define BN_R_TOO_MANY_TEMPORARY_VARIABLES 109 |
| 515 | 543 | ||
| 516 | #ifdef __cplusplus | 544 | #ifdef __cplusplus |
| 517 | } | 545 | } |
| 518 | #endif | 546 | #endif |
| 519 | #endif | 547 | #endif |
| 520 | |||
diff --git a/src/lib/libcrypto/bn/bn_add.c b/src/lib/libcrypto/bn/bn_add.c index 5d24691233..6cba07e9f6 100644 --- a/src/lib/libcrypto/bn/bn_add.c +++ b/src/lib/libcrypto/bn/bn_add.c | |||
| @@ -64,6 +64,7 @@ | |||
| 64 | int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) | 64 | int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) |
| 65 | { | 65 | { |
| 66 | const BIGNUM *tmp; | 66 | const BIGNUM *tmp; |
| 67 | int a_neg = a->neg; | ||
| 67 | 68 | ||
| 68 | bn_check_top(a); | 69 | bn_check_top(a); |
| 69 | bn_check_top(b); | 70 | bn_check_top(b); |
| @@ -73,10 +74,10 @@ int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) | |||
| 73 | * -a + b b-a | 74 | * -a + b b-a |
| 74 | * -a + -b -(a+b) | 75 | * -a + -b -(a+b) |
| 75 | */ | 76 | */ |
| 76 | if (a->neg ^ b->neg) | 77 | if (a_neg ^ b->neg) |
| 77 | { | 78 | { |
| 78 | /* only one is negative */ | 79 | /* only one is negative */ |
| 79 | if (a->neg) | 80 | if (a_neg) |
| 80 | { tmp=a; a=b; b=tmp; } | 81 | { tmp=a; a=b; b=tmp; } |
| 81 | 82 | ||
| 82 | /* we are now a - b */ | 83 | /* we are now a - b */ |
| @@ -94,12 +95,11 @@ int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) | |||
| 94 | return(1); | 95 | return(1); |
| 95 | } | 96 | } |
| 96 | 97 | ||
| 97 | if (a->neg) /* both are neg */ | 98 | if (!BN_uadd(r,a,b)) return(0); |
| 99 | if (a_neg) /* both are neg */ | ||
| 98 | r->neg=1; | 100 | r->neg=1; |
| 99 | else | 101 | else |
| 100 | r->neg=0; | 102 | r->neg=0; |
| 101 | |||
| 102 | if (!BN_uadd(r,a,b)) return(0); | ||
| 103 | return(1); | 103 | return(1); |
| 104 | } | 104 | } |
| 105 | 105 | ||
| @@ -160,6 +160,7 @@ int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) | |||
| 160 | *(rp++)= *(ap++); | 160 | *(rp++)= *(ap++); |
| 161 | } | 161 | } |
| 162 | /* memcpy(rp,ap,sizeof(*ap)*(max-i));*/ | 162 | /* memcpy(rp,ap,sizeof(*ap)*(max-i));*/ |
| 163 | r->neg = 0; | ||
| 163 | return(1); | 164 | return(1); |
| 164 | } | 165 | } |
| 165 | 166 | ||
| @@ -251,6 +252,7 @@ int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) | |||
| 251 | #endif | 252 | #endif |
| 252 | 253 | ||
| 253 | r->top=max; | 254 | r->top=max; |
| 255 | r->neg=0; | ||
| 254 | bn_fix_top(r); | 256 | bn_fix_top(r); |
| 255 | return(1); | 257 | return(1); |
| 256 | } | 258 | } |
diff --git a/src/lib/libcrypto/bn/bn_asm.c b/src/lib/libcrypto/bn/bn_asm.c index 44e52a40db..be8aa3ffc5 100644 --- a/src/lib/libcrypto/bn/bn_asm.c +++ b/src/lib/libcrypto/bn/bn_asm.c | |||
| @@ -68,7 +68,7 @@ | |||
| 68 | 68 | ||
| 69 | #if defined(BN_LLONG) || defined(BN_UMULT_HIGH) | 69 | #if defined(BN_LLONG) || defined(BN_UMULT_HIGH) |
| 70 | 70 | ||
| 71 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | 71 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w) |
| 72 | { | 72 | { |
| 73 | BN_ULONG c1=0; | 73 | BN_ULONG c1=0; |
| 74 | 74 | ||
| @@ -93,7 +93,7 @@ BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | |||
| 93 | return(c1); | 93 | return(c1); |
| 94 | } | 94 | } |
| 95 | 95 | ||
| 96 | BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | 96 | BN_ULONG bn_mul_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w) |
| 97 | { | 97 | { |
| 98 | BN_ULONG c1=0; | 98 | BN_ULONG c1=0; |
| 99 | 99 | ||
| @@ -117,7 +117,7 @@ BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | |||
| 117 | return(c1); | 117 | return(c1); |
| 118 | } | 118 | } |
| 119 | 119 | ||
| 120 | void bn_sqr_words(BN_ULONG *r, BN_ULONG *a, int n) | 120 | void bn_sqr_words(BN_ULONG *r, const BN_ULONG *a, int n) |
| 121 | { | 121 | { |
| 122 | assert(n >= 0); | 122 | assert(n >= 0); |
| 123 | if (n <= 0) return; | 123 | if (n <= 0) return; |
| @@ -139,7 +139,7 @@ void bn_sqr_words(BN_ULONG *r, BN_ULONG *a, int n) | |||
| 139 | 139 | ||
| 140 | #else /* !(defined(BN_LLONG) || defined(BN_UMULT_HIGH)) */ | 140 | #else /* !(defined(BN_LLONG) || defined(BN_UMULT_HIGH)) */ |
| 141 | 141 | ||
| 142 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | 142 | BN_ULONG bn_mul_add_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w) |
| 143 | { | 143 | { |
| 144 | BN_ULONG c=0; | 144 | BN_ULONG c=0; |
| 145 | BN_ULONG bl,bh; | 145 | BN_ULONG bl,bh; |
| @@ -166,7 +166,7 @@ BN_ULONG bn_mul_add_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | |||
| 166 | return(c); | 166 | return(c); |
| 167 | } | 167 | } |
| 168 | 168 | ||
| 169 | BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | 169 | BN_ULONG bn_mul_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w) |
| 170 | { | 170 | { |
| 171 | BN_ULONG carry=0; | 171 | BN_ULONG carry=0; |
| 172 | BN_ULONG bl,bh; | 172 | BN_ULONG bl,bh; |
| @@ -193,7 +193,7 @@ BN_ULONG bn_mul_words(BN_ULONG *rp, BN_ULONG *ap, int num, BN_ULONG w) | |||
| 193 | return(carry); | 193 | return(carry); |
| 194 | } | 194 | } |
| 195 | 195 | ||
| 196 | void bn_sqr_words(BN_ULONG *r, BN_ULONG *a, int n) | 196 | void bn_sqr_words(BN_ULONG *r, const BN_ULONG *a, int n) |
| 197 | { | 197 | { |
| 198 | assert(n >= 0); | 198 | assert(n >= 0); |
| 199 | if (n <= 0) return; | 199 | if (n <= 0) return; |
| @@ -296,7 +296,7 @@ BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d) | |||
| 296 | #endif /* !defined(BN_LLONG) && defined(BN_DIV2W) */ | 296 | #endif /* !defined(BN_LLONG) && defined(BN_DIV2W) */ |
| 297 | 297 | ||
| 298 | #ifdef BN_LLONG | 298 | #ifdef BN_LLONG |
| 299 | BN_ULONG bn_add_words(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | 299 | BN_ULONG bn_add_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, int n) |
| 300 | { | 300 | { |
| 301 | BN_ULLONG ll=0; | 301 | BN_ULLONG ll=0; |
| 302 | 302 | ||
| @@ -332,7 +332,7 @@ BN_ULONG bn_add_words(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | |||
| 332 | return((BN_ULONG)ll); | 332 | return((BN_ULONG)ll); |
| 333 | } | 333 | } |
| 334 | #else /* !BN_LLONG */ | 334 | #else /* !BN_LLONG */ |
| 335 | BN_ULONG bn_add_words(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | 335 | BN_ULONG bn_add_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, int n) |
| 336 | { | 336 | { |
| 337 | BN_ULONG c,l,t; | 337 | BN_ULONG c,l,t; |
| 338 | 338 | ||
| @@ -382,7 +382,7 @@ BN_ULONG bn_add_words(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | |||
| 382 | } | 382 | } |
| 383 | #endif /* !BN_LLONG */ | 383 | #endif /* !BN_LLONG */ |
| 384 | 384 | ||
| 385 | BN_ULONG bn_sub_words(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | 385 | BN_ULONG bn_sub_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, int n) |
| 386 | { | 386 | { |
| 387 | BN_ULONG t1,t2; | 387 | BN_ULONG t1,t2; |
| 388 | int c=0; | 388 | int c=0; |
| @@ -673,7 +673,7 @@ void bn_mul_comba4(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b) | |||
| 673 | r[7]=c2; | 673 | r[7]=c2; |
| 674 | } | 674 | } |
| 675 | 675 | ||
| 676 | void bn_sqr_comba8(BN_ULONG *r, BN_ULONG *a) | 676 | void bn_sqr_comba8(BN_ULONG *r, const BN_ULONG *a) |
| 677 | { | 677 | { |
| 678 | #ifdef BN_LLONG | 678 | #ifdef BN_LLONG |
| 679 | BN_ULLONG t,tt; | 679 | BN_ULLONG t,tt; |
| @@ -754,7 +754,7 @@ void bn_sqr_comba8(BN_ULONG *r, BN_ULONG *a) | |||
| 754 | r[15]=c1; | 754 | r[15]=c1; |
| 755 | } | 755 | } |
| 756 | 756 | ||
| 757 | void bn_sqr_comba4(BN_ULONG *r, BN_ULONG *a) | 757 | void bn_sqr_comba4(BN_ULONG *r, const BN_ULONG *a) |
| 758 | { | 758 | { |
| 759 | #ifdef BN_LLONG | 759 | #ifdef BN_LLONG |
| 760 | BN_ULLONG t,tt; | 760 | BN_ULLONG t,tt; |
diff --git a/src/lib/libcrypto/bn/bn_ctx.c b/src/lib/libcrypto/bn/bn_ctx.c index b1a8d7571e..7daf19eb84 100644 --- a/src/lib/libcrypto/bn/bn_ctx.c +++ b/src/lib/libcrypto/bn/bn_ctx.c | |||
| @@ -61,8 +61,9 @@ | |||
| 61 | 61 | ||
| 62 | #include <stdio.h> | 62 | #include <stdio.h> |
| 63 | #include <assert.h> | 63 | #include <assert.h> |
| 64 | |||
| 64 | #include "cryptlib.h" | 65 | #include "cryptlib.h" |
| 65 | #include <openssl/bn.h> | 66 | #include "bn_lcl.h" |
| 66 | 67 | ||
| 67 | 68 | ||
| 68 | BN_CTX *BN_CTX_new(void) | 69 | BN_CTX *BN_CTX_new(void) |
| @@ -83,6 +84,7 @@ BN_CTX *BN_CTX_new(void) | |||
| 83 | 84 | ||
| 84 | void BN_CTX_init(BN_CTX *ctx) | 85 | void BN_CTX_init(BN_CTX *ctx) |
| 85 | { | 86 | { |
| 87 | #if 0 /* explicit version */ | ||
| 86 | int i; | 88 | int i; |
| 87 | ctx->tos = 0; | 89 | ctx->tos = 0; |
| 88 | ctx->flags = 0; | 90 | ctx->flags = 0; |
| @@ -90,6 +92,9 @@ void BN_CTX_init(BN_CTX *ctx) | |||
| 90 | ctx->too_many = 0; | 92 | ctx->too_many = 0; |
| 91 | for (i = 0; i < BN_CTX_NUM; i++) | 93 | for (i = 0; i < BN_CTX_NUM; i++) |
| 92 | BN_init(&(ctx->bn[i])); | 94 | BN_init(&(ctx->bn[i])); |
| 95 | #else | ||
| 96 | memset(ctx, 0, sizeof *ctx); | ||
| 97 | #endif | ||
| 93 | } | 98 | } |
| 94 | 99 | ||
| 95 | void BN_CTX_free(BN_CTX *ctx) | 100 | void BN_CTX_free(BN_CTX *ctx) |
| @@ -112,8 +117,14 @@ void BN_CTX_start(BN_CTX *ctx) | |||
| 112 | ctx->depth++; | 117 | ctx->depth++; |
| 113 | } | 118 | } |
| 114 | 119 | ||
| 120 | |||
| 115 | BIGNUM *BN_CTX_get(BN_CTX *ctx) | 121 | BIGNUM *BN_CTX_get(BN_CTX *ctx) |
| 116 | { | 122 | { |
| 123 | /* Note: If BN_CTX_get is ever changed to allocate BIGNUMs dynamically, | ||
| 124 | * make sure that if BN_CTX_get fails once it will return NULL again | ||
| 125 | * until BN_CTX_end is called. (This is so that callers have to check | ||
| 126 | * only the last return value.) | ||
| 127 | */ | ||
| 117 | if (ctx->depth > BN_CTX_NUM_POS || ctx->tos >= BN_CTX_NUM) | 128 | if (ctx->depth > BN_CTX_NUM_POS || ctx->tos >= BN_CTX_NUM) |
| 118 | { | 129 | { |
| 119 | if (!ctx->too_many) | 130 | if (!ctx->too_many) |
diff --git a/src/lib/libcrypto/bn/bn_div.c b/src/lib/libcrypto/bn/bn_div.c index c328b5b411..ac1a09615a 100644 --- a/src/lib/libcrypto/bn/bn_div.c +++ b/src/lib/libcrypto/bn/bn_div.c | |||
| @@ -61,6 +61,7 @@ | |||
| 61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
| 62 | #include "bn_lcl.h" | 62 | #include "bn_lcl.h" |
| 63 | 63 | ||
| 64 | |||
| 64 | /* The old slow way */ | 65 | /* The old slow way */ |
| 65 | #if 0 | 66 | #if 0 |
| 66 | int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, | 67 | int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, |
| @@ -126,9 +127,10 @@ int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, | |||
| 126 | 127 | ||
| 127 | #else | 128 | #else |
| 128 | 129 | ||
| 129 | #if !defined(NO_ASM) && !defined(NO_INLINE_ASM) && !defined(PEDANTIC) && !defined(BN_DIV3W) | 130 | #if !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM) \ |
| 131 | && !defined(PEDANTIC) && !defined(BN_DIV3W) | ||
| 130 | # if defined(__GNUC__) && __GNUC__>=2 | 132 | # if defined(__GNUC__) && __GNUC__>=2 |
| 131 | # if defined(__i386) | 133 | # if defined(__i386) || defined (__i386__) |
| 132 | /* | 134 | /* |
| 133 | * There were two reasons for implementing this template: | 135 | * There were two reasons for implementing this template: |
| 134 | * - GNU C generates a call to a function (__udivdi3 to be exact) | 136 | * - GNU C generates a call to a function (__udivdi3 to be exact) |
| @@ -150,8 +152,16 @@ int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, | |||
| 150 | # define REMAINDER_IS_ALREADY_CALCULATED | 152 | # define REMAINDER_IS_ALREADY_CALCULATED |
| 151 | # endif /* __<cpu> */ | 153 | # endif /* __<cpu> */ |
| 152 | # endif /* __GNUC__ */ | 154 | # endif /* __GNUC__ */ |
| 153 | #endif /* NO_ASM */ | 155 | #endif /* OPENSSL_NO_ASM */ |
| 156 | |||
| 154 | 157 | ||
| 158 | /* BN_div computes dv := num / divisor, rounding towards zero, and sets up | ||
| 159 | * rm such that dv*divisor + rm = num holds. | ||
| 160 | * Thus: | ||
| 161 | * dv->neg == num->neg ^ divisor->neg (unless the result is zero) | ||
| 162 | * rm->neg == num->neg (unless the remainder is zero) | ||
| 163 | * If 'dv' or 'rm' is NULL, the respective value is not returned. | ||
| 164 | */ | ||
| 155 | int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, | 165 | int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, |
| 156 | BN_CTX *ctx) | 166 | BN_CTX *ctx) |
| 157 | { | 167 | { |
| @@ -185,7 +195,7 @@ int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, | |||
| 185 | if (dv == NULL) | 195 | if (dv == NULL) |
| 186 | res=BN_CTX_get(ctx); | 196 | res=BN_CTX_get(ctx); |
| 187 | else res=dv; | 197 | else res=dv; |
| 188 | if (sdiv==NULL || res == NULL) goto err; | 198 | if (sdiv == NULL || res == NULL) goto err; |
| 189 | tmp->neg=0; | 199 | tmp->neg=0; |
| 190 | 200 | ||
| 191 | /* First we normalise the numbers */ | 201 | /* First we normalise the numbers */ |
| @@ -232,12 +242,14 @@ int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, | |||
| 232 | } | 242 | } |
| 233 | else | 243 | else |
| 234 | res->top--; | 244 | res->top--; |
| 245 | if (res->top == 0) | ||
| 246 | res->neg = 0; | ||
| 235 | resp--; | 247 | resp--; |
| 236 | 248 | ||
| 237 | for (i=0; i<loop-1; i++) | 249 | for (i=0; i<loop-1; i++) |
| 238 | { | 250 | { |
| 239 | BN_ULONG q,l0; | 251 | BN_ULONG q,l0; |
| 240 | #if defined(BN_DIV3W) && !defined(NO_ASM) | 252 | #if defined(BN_DIV3W) && !defined(OPENSSL_NO_ASM) |
| 241 | BN_ULONG bn_div_3_words(BN_ULONG*,BN_ULONG,BN_ULONG); | 253 | BN_ULONG bn_div_3_words(BN_ULONG*,BN_ULONG,BN_ULONG); |
| 242 | q=bn_div_3_words(wnump,d1,d0); | 254 | q=bn_div_3_words(wnump,d1,d0); |
| 243 | #else | 255 | #else |
| @@ -331,8 +343,13 @@ int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, | |||
| 331 | } | 343 | } |
| 332 | if (rm != NULL) | 344 | if (rm != NULL) |
| 333 | { | 345 | { |
| 346 | /* Keep a copy of the neg flag in num because if rm==num | ||
| 347 | * BN_rshift() will overwrite it. | ||
| 348 | */ | ||
| 349 | int neg = num->neg; | ||
| 334 | BN_rshift(rm,snum,norm_shift); | 350 | BN_rshift(rm,snum,norm_shift); |
| 335 | rm->neg=num->neg; | 351 | if (!BN_is_zero(rm)) |
| 352 | rm->neg = neg; | ||
| 336 | } | 353 | } |
| 337 | BN_CTX_end(ctx); | 354 | BN_CTX_end(ctx); |
| 338 | return(1); | 355 | return(1); |
| @@ -342,40 +359,3 @@ err: | |||
| 342 | } | 359 | } |
| 343 | 360 | ||
| 344 | #endif | 361 | #endif |
| 345 | |||
| 346 | /* rem != m */ | ||
| 347 | int BN_mod(BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) | ||
| 348 | { | ||
| 349 | #if 0 /* The old slow way */ | ||
| 350 | int i,nm,nd; | ||
| 351 | BIGNUM *dv; | ||
| 352 | |||
| 353 | if (BN_ucmp(m,d) < 0) | ||
| 354 | return((BN_copy(rem,m) == NULL)?0:1); | ||
| 355 | |||
| 356 | BN_CTX_start(ctx); | ||
| 357 | dv=BN_CTX_get(ctx); | ||
| 358 | |||
| 359 | if (!BN_copy(rem,m)) goto err; | ||
| 360 | |||
| 361 | nm=BN_num_bits(rem); | ||
| 362 | nd=BN_num_bits(d); | ||
| 363 | if (!BN_lshift(dv,d,nm-nd)) goto err; | ||
| 364 | for (i=nm-nd; i>=0; i--) | ||
| 365 | { | ||
| 366 | if (BN_cmp(rem,dv) >= 0) | ||
| 367 | { | ||
| 368 | if (!BN_sub(rem,rem,dv)) goto err; | ||
| 369 | } | ||
| 370 | if (!BN_rshift1(dv,dv)) goto err; | ||
| 371 | } | ||
| 372 | BN_CTX_end(ctx); | ||
| 373 | return(1); | ||
| 374 | err: | ||
| 375 | BN_CTX_end(ctx); | ||
| 376 | return(0); | ||
| 377 | #else | ||
| 378 | return(BN_div(NULL,rem,m,d,ctx)); | ||
| 379 | #endif | ||
| 380 | } | ||
| 381 | |||
diff --git a/src/lib/libcrypto/bn/bn_err.c b/src/lib/libcrypto/bn/bn_err.c index adc6a214fc..fb84ee96d8 100644 --- a/src/lib/libcrypto/bn/bn_err.c +++ b/src/lib/libcrypto/bn/bn_err.c | |||
| @@ -63,7 +63,7 @@ | |||
| 63 | #include <openssl/bn.h> | 63 | #include <openssl/bn.h> |
| 64 | 64 | ||
| 65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
| 66 | #ifndef NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
| 67 | static ERR_STRING_DATA BN_str_functs[]= | 67 | static ERR_STRING_DATA BN_str_functs[]= |
| 68 | { | 68 | { |
| 69 | {ERR_PACK(0,BN_F_BN_BLINDING_CONVERT,0), "BN_BLINDING_convert"}, | 69 | {ERR_PACK(0,BN_F_BN_BLINDING_CONVERT,0), "BN_BLINDING_convert"}, |
| @@ -76,11 +76,14 @@ static ERR_STRING_DATA BN_str_functs[]= | |||
| 76 | {ERR_PACK(0,BN_F_BN_CTX_NEW,0), "BN_CTX_new"}, | 76 | {ERR_PACK(0,BN_F_BN_CTX_NEW,0), "BN_CTX_new"}, |
| 77 | {ERR_PACK(0,BN_F_BN_DIV,0), "BN_div"}, | 77 | {ERR_PACK(0,BN_F_BN_DIV,0), "BN_div"}, |
| 78 | {ERR_PACK(0,BN_F_BN_EXPAND2,0), "bn_expand2"}, | 78 | {ERR_PACK(0,BN_F_BN_EXPAND2,0), "bn_expand2"}, |
| 79 | {ERR_PACK(0,BN_F_BN_EXPAND_INTERNAL,0), "BN_EXPAND_INTERNAL"}, | ||
| 79 | {ERR_PACK(0,BN_F_BN_MOD_EXP2_MONT,0), "BN_mod_exp2_mont"}, | 80 | {ERR_PACK(0,BN_F_BN_MOD_EXP2_MONT,0), "BN_mod_exp2_mont"}, |
| 80 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT,0), "BN_mod_exp_mont"}, | 81 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT,0), "BN_mod_exp_mont"}, |
| 81 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT_WORD,0), "BN_mod_exp_mont_word"}, | 82 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT_WORD,0), "BN_mod_exp_mont_word"}, |
| 82 | {ERR_PACK(0,BN_F_BN_MOD_INVERSE,0), "BN_mod_inverse"}, | 83 | {ERR_PACK(0,BN_F_BN_MOD_INVERSE,0), "BN_mod_inverse"}, |
| 84 | {ERR_PACK(0,BN_F_BN_MOD_LSHIFT_QUICK,0), "BN_mod_lshift_quick"}, | ||
| 83 | {ERR_PACK(0,BN_F_BN_MOD_MUL_RECIPROCAL,0), "BN_mod_mul_reciprocal"}, | 85 | {ERR_PACK(0,BN_F_BN_MOD_MUL_RECIPROCAL,0), "BN_mod_mul_reciprocal"}, |
| 86 | {ERR_PACK(0,BN_F_BN_MOD_SQRT,0), "BN_mod_sqrt"}, | ||
| 84 | {ERR_PACK(0,BN_F_BN_MPI2BN,0), "BN_mpi2bn"}, | 87 | {ERR_PACK(0,BN_F_BN_MPI2BN,0), "BN_mpi2bn"}, |
| 85 | {ERR_PACK(0,BN_F_BN_NEW,0), "BN_new"}, | 88 | {ERR_PACK(0,BN_F_BN_NEW,0), "BN_new"}, |
| 86 | {ERR_PACK(0,BN_F_BN_RAND,0), "BN_rand"}, | 89 | {ERR_PACK(0,BN_F_BN_RAND,0), "BN_rand"}, |
| @@ -98,10 +101,14 @@ static ERR_STRING_DATA BN_str_reasons[]= | |||
| 98 | {BN_R_DIV_BY_ZERO ,"div by zero"}, | 101 | {BN_R_DIV_BY_ZERO ,"div by zero"}, |
| 99 | {BN_R_ENCODING_ERROR ,"encoding error"}, | 102 | {BN_R_ENCODING_ERROR ,"encoding error"}, |
| 100 | {BN_R_EXPAND_ON_STATIC_BIGNUM_DATA ,"expand on static bignum data"}, | 103 | {BN_R_EXPAND_ON_STATIC_BIGNUM_DATA ,"expand on static bignum data"}, |
| 104 | {BN_R_INPUT_NOT_REDUCED ,"input not reduced"}, | ||
| 101 | {BN_R_INVALID_LENGTH ,"invalid length"}, | 105 | {BN_R_INVALID_LENGTH ,"invalid length"}, |
| 102 | {BN_R_INVALID_RANGE ,"invalid range"}, | 106 | {BN_R_INVALID_RANGE ,"invalid range"}, |
| 107 | {BN_R_NOT_A_SQUARE ,"not a square"}, | ||
| 103 | {BN_R_NOT_INITIALIZED ,"not initialized"}, | 108 | {BN_R_NOT_INITIALIZED ,"not initialized"}, |
| 104 | {BN_R_NO_INVERSE ,"no inverse"}, | 109 | {BN_R_NO_INVERSE ,"no inverse"}, |
| 110 | {BN_R_P_IS_NOT_PRIME ,"p is not prime"}, | ||
| 111 | {BN_R_TOO_MANY_ITERATIONS ,"too many iterations"}, | ||
| 105 | {BN_R_TOO_MANY_TEMPORARY_VARIABLES ,"too many temporary variables"}, | 112 | {BN_R_TOO_MANY_TEMPORARY_VARIABLES ,"too many temporary variables"}, |
| 106 | {0,NULL} | 113 | {0,NULL} |
| 107 | }; | 114 | }; |
| @@ -115,7 +122,7 @@ void ERR_load_BN_strings(void) | |||
| 115 | if (init) | 122 | if (init) |
| 116 | { | 123 | { |
| 117 | init=0; | 124 | init=0; |
| 118 | #ifndef NO_ERR | 125 | #ifndef OPENSSL_NO_ERR |
| 119 | ERR_load_strings(ERR_LIB_BN,BN_str_functs); | 126 | ERR_load_strings(ERR_LIB_BN,BN_str_functs); |
| 120 | ERR_load_strings(ERR_LIB_BN,BN_str_reasons); | 127 | ERR_load_strings(ERR_LIB_BN,BN_str_reasons); |
| 121 | #endif | 128 | #endif |
diff --git a/src/lib/libcrypto/bn/bn_exp.c b/src/lib/libcrypto/bn/bn_exp.c index d2c91628ac..afdfd580fb 100644 --- a/src/lib/libcrypto/bn/bn_exp.c +++ b/src/lib/libcrypto/bn/bn_exp.c | |||
| @@ -110,38 +110,13 @@ | |||
| 110 | */ | 110 | */ |
| 111 | 111 | ||
| 112 | 112 | ||
| 113 | #include <stdio.h> | ||
| 114 | #include "cryptlib.h" | 113 | #include "cryptlib.h" |
| 115 | #include "bn_lcl.h" | 114 | #include "bn_lcl.h" |
| 116 | 115 | ||
| 117 | #define TABLE_SIZE 32 | 116 | #define TABLE_SIZE 32 |
| 118 | 117 | ||
| 119 | /* slow but works */ | ||
| 120 | int BN_mod_mul(BIGNUM *ret, BIGNUM *a, BIGNUM *b, const BIGNUM *m, BN_CTX *ctx) | ||
| 121 | { | ||
| 122 | BIGNUM *t; | ||
| 123 | int r=0; | ||
| 124 | |||
| 125 | bn_check_top(a); | ||
| 126 | bn_check_top(b); | ||
| 127 | bn_check_top(m); | ||
| 128 | |||
| 129 | BN_CTX_start(ctx); | ||
| 130 | if ((t = BN_CTX_get(ctx)) == NULL) goto err; | ||
| 131 | if (a == b) | ||
| 132 | { if (!BN_sqr(t,a,ctx)) goto err; } | ||
| 133 | else | ||
| 134 | { if (!BN_mul(t,a,b,ctx)) goto err; } | ||
| 135 | if (!BN_mod(ret,t,m,ctx)) goto err; | ||
| 136 | r=1; | ||
| 137 | err: | ||
| 138 | BN_CTX_end(ctx); | ||
| 139 | return(r); | ||
| 140 | } | ||
| 141 | |||
| 142 | |||
| 143 | /* this one works - simple but works */ | 118 | /* this one works - simple but works */ |
| 144 | int BN_exp(BIGNUM *r, BIGNUM *a, BIGNUM *p, BN_CTX *ctx) | 119 | int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) |
| 145 | { | 120 | { |
| 146 | int i,bits,ret=0; | 121 | int i,bits,ret=0; |
| 147 | BIGNUM *v,*rr; | 122 | BIGNUM *v,*rr; |
| @@ -176,7 +151,7 @@ err: | |||
| 176 | } | 151 | } |
| 177 | 152 | ||
| 178 | 153 | ||
| 179 | int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, const BIGNUM *m, | 154 | int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, |
| 180 | BN_CTX *ctx) | 155 | BN_CTX *ctx) |
| 181 | { | 156 | { |
| 182 | int ret; | 157 | int ret; |
| @@ -185,6 +160,40 @@ int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, const BIGNUM *m, | |||
| 185 | bn_check_top(p); | 160 | bn_check_top(p); |
| 186 | bn_check_top(m); | 161 | bn_check_top(m); |
| 187 | 162 | ||
| 163 | /* For even modulus m = 2^k*m_odd, it might make sense to compute | ||
| 164 | * a^p mod m_odd and a^p mod 2^k separately (with Montgomery | ||
| 165 | * exponentiation for the odd part), using appropriate exponent | ||
| 166 | * reductions, and combine the results using the CRT. | ||
| 167 | * | ||
| 168 | * For now, we use Montgomery only if the modulus is odd; otherwise, | ||
| 169 | * exponentiation using the reciprocal-based quick remaindering | ||
| 170 | * algorithm is used. | ||
| 171 | * | ||
| 172 | * (Timing obtained with expspeed.c [computations a^p mod m | ||
| 173 | * where a, p, m are of the same length: 256, 512, 1024, 2048, | ||
| 174 | * 4096, 8192 bits], compared to the running time of the | ||
| 175 | * standard algorithm: | ||
| 176 | * | ||
| 177 | * BN_mod_exp_mont 33 .. 40 % [AMD K6-2, Linux, debug configuration] | ||
| 178 | * 55 .. 77 % [UltraSparc processor, but | ||
| 179 | * debug-solaris-sparcv8-gcc conf.] | ||
| 180 | * | ||
| 181 | * BN_mod_exp_recp 50 .. 70 % [AMD K6-2, Linux, debug configuration] | ||
| 182 | * 62 .. 118 % [UltraSparc, debug-solaris-sparcv8-gcc] | ||
| 183 | * | ||
| 184 | * On the Sparc, BN_mod_exp_recp was faster than BN_mod_exp_mont | ||
| 185 | * at 2048 and more bits, but at 512 and 1024 bits, it was | ||
| 186 | * slower even than the standard algorithm! | ||
| 187 | * | ||
| 188 | * "Real" timings [linux-elf, solaris-sparcv9-gcc configurations] | ||
| 189 | * should be obtained when the new Montgomery reduction code | ||
| 190 | * has been integrated into OpenSSL.) | ||
| 191 | */ | ||
| 192 | |||
| 193 | #define MONT_MUL_MOD | ||
| 194 | #define MONT_EXP_WORD | ||
| 195 | #define RECP_MUL_MOD | ||
| 196 | |||
| 188 | #ifdef MONT_MUL_MOD | 197 | #ifdef MONT_MUL_MOD |
| 189 | /* I have finally been able to take out this pre-condition of | 198 | /* I have finally been able to take out this pre-condition of |
| 190 | * the top bit being set. It was caused by an error in BN_div | 199 | * the top bit being set. It was caused by an error in BN_div |
| @@ -194,12 +203,14 @@ int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, const BIGNUM *m, | |||
| 194 | 203 | ||
| 195 | if (BN_is_odd(m)) | 204 | if (BN_is_odd(m)) |
| 196 | { | 205 | { |
| 197 | if (a->top == 1) | 206 | # ifdef MONT_EXP_WORD |
| 207 | if (a->top == 1 && !a->neg) | ||
| 198 | { | 208 | { |
| 199 | BN_ULONG A = a->d[0]; | 209 | BN_ULONG A = a->d[0]; |
| 200 | ret=BN_mod_exp_mont_word(r,A,p,m,ctx,NULL); | 210 | ret=BN_mod_exp_mont_word(r,A,p,m,ctx,NULL); |
| 201 | } | 211 | } |
| 202 | else | 212 | else |
| 213 | # endif | ||
| 203 | ret=BN_mod_exp_mont(r,a,p,m,ctx,NULL); | 214 | ret=BN_mod_exp_mont(r,a,p,m,ctx,NULL); |
| 204 | } | 215 | } |
| 205 | else | 216 | else |
| @@ -227,20 +238,35 @@ int BN_mod_exp_recp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | |||
| 227 | 238 | ||
| 228 | if (bits == 0) | 239 | if (bits == 0) |
| 229 | { | 240 | { |
| 230 | BN_one(r); | 241 | ret = BN_one(r); |
| 231 | return(1); | 242 | return ret; |
| 232 | } | 243 | } |
| 233 | 244 | ||
| 234 | BN_CTX_start(ctx); | 245 | BN_CTX_start(ctx); |
| 235 | if ((aa = BN_CTX_get(ctx)) == NULL) goto err; | 246 | if ((aa = BN_CTX_get(ctx)) == NULL) goto err; |
| 236 | 247 | ||
| 237 | BN_RECP_CTX_init(&recp); | 248 | BN_RECP_CTX_init(&recp); |
| 238 | if (BN_RECP_CTX_set(&recp,m,ctx) <= 0) goto err; | 249 | if (m->neg) |
| 250 | { | ||
| 251 | /* ignore sign of 'm' */ | ||
| 252 | if (!BN_copy(aa, m)) goto err; | ||
| 253 | aa->neg = 0; | ||
| 254 | if (BN_RECP_CTX_set(&recp,aa,ctx) <= 0) goto err; | ||
| 255 | } | ||
| 256 | else | ||
| 257 | { | ||
| 258 | if (BN_RECP_CTX_set(&recp,m,ctx) <= 0) goto err; | ||
| 259 | } | ||
| 239 | 260 | ||
| 240 | BN_init(&(val[0])); | 261 | BN_init(&(val[0])); |
| 241 | ts=1; | 262 | ts=1; |
| 242 | 263 | ||
| 243 | if (!BN_mod(&(val[0]),a,m,ctx)) goto err; /* 1 */ | 264 | if (!BN_nnmod(&(val[0]),a,m,ctx)) goto err; /* 1 */ |
| 265 | if (BN_is_zero(&(val[0]))) | ||
| 266 | { | ||
| 267 | ret = BN_zero(r); | ||
| 268 | goto err; | ||
| 269 | } | ||
| 244 | 270 | ||
| 245 | window = BN_window_bits_for_exponent_size(bits); | 271 | window = BN_window_bits_for_exponent_size(bits); |
| 246 | if (window > 1) | 272 | if (window > 1) |
| @@ -325,13 +351,13 @@ err: | |||
| 325 | } | 351 | } |
| 326 | 352 | ||
| 327 | 353 | ||
| 328 | int BN_mod_exp_mont(BIGNUM *rr, BIGNUM *a, const BIGNUM *p, | 354 | int BN_mod_exp_mont(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, |
| 329 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) | 355 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) |
| 330 | { | 356 | { |
| 331 | int i,j,bits,ret=0,wstart,wend,window,wvalue; | 357 | int i,j,bits,ret=0,wstart,wend,window,wvalue; |
| 332 | int start=1,ts=0; | 358 | int start=1,ts=0; |
| 333 | BIGNUM *d,*r; | 359 | BIGNUM *d,*r; |
| 334 | BIGNUM *aa; | 360 | const BIGNUM *aa; |
| 335 | BIGNUM val[TABLE_SIZE]; | 361 | BIGNUM val[TABLE_SIZE]; |
| 336 | BN_MONT_CTX *mont=NULL; | 362 | BN_MONT_CTX *mont=NULL; |
| 337 | 363 | ||
| @@ -347,9 +373,10 @@ int BN_mod_exp_mont(BIGNUM *rr, BIGNUM *a, const BIGNUM *p, | |||
| 347 | bits=BN_num_bits(p); | 373 | bits=BN_num_bits(p); |
| 348 | if (bits == 0) | 374 | if (bits == 0) |
| 349 | { | 375 | { |
| 350 | BN_one(rr); | 376 | ret = BN_one(rr); |
| 351 | return(1); | 377 | return ret; |
| 352 | } | 378 | } |
| 379 | |||
| 353 | BN_CTX_start(ctx); | 380 | BN_CTX_start(ctx); |
| 354 | d = BN_CTX_get(ctx); | 381 | d = BN_CTX_get(ctx); |
| 355 | r = BN_CTX_get(ctx); | 382 | r = BN_CTX_get(ctx); |
| @@ -368,14 +395,19 @@ int BN_mod_exp_mont(BIGNUM *rr, BIGNUM *a, const BIGNUM *p, | |||
| 368 | 395 | ||
| 369 | BN_init(&val[0]); | 396 | BN_init(&val[0]); |
| 370 | ts=1; | 397 | ts=1; |
| 371 | if (BN_ucmp(a,m) >= 0) | 398 | if (a->neg || BN_ucmp(a,m) >= 0) |
| 372 | { | 399 | { |
| 373 | if (!BN_mod(&(val[0]),a,m,ctx)) | 400 | if (!BN_nnmod(&(val[0]),a,m,ctx)) |
| 374 | goto err; | 401 | goto err; |
| 375 | aa= &(val[0]); | 402 | aa= &(val[0]); |
| 376 | } | 403 | } |
| 377 | else | 404 | else |
| 378 | aa=a; | 405 | aa=a; |
| 406 | if (BN_is_zero(aa)) | ||
| 407 | { | ||
| 408 | ret = BN_zero(rr); | ||
| 409 | goto err; | ||
| 410 | } | ||
| 379 | if (!BN_to_montgomery(&(val[0]),aa,mont,ctx)) goto err; /* 1 */ | 411 | if (!BN_to_montgomery(&(val[0]),aa,mont,ctx)) goto err; /* 1 */ |
| 380 | 412 | ||
| 381 | window = BN_window_bits_for_exponent_size(bits); | 413 | window = BN_window_bits_for_exponent_size(bits); |
| @@ -475,26 +507,39 @@ int BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, | |||
| 475 | (/* BN_ucmp(r, (m)) < 0 ? 1 :*/ \ | 507 | (/* BN_ucmp(r, (m)) < 0 ? 1 :*/ \ |
| 476 | (BN_mod(t, r, m, ctx) && (swap_tmp = r, r = t, t = swap_tmp, 1)))) | 508 | (BN_mod(t, r, m, ctx) && (swap_tmp = r, r = t, t = swap_tmp, 1)))) |
| 477 | /* BN_MOD_MUL_WORD is only used with 'w' large, | 509 | /* BN_MOD_MUL_WORD is only used with 'w' large, |
| 478 | * so the BN_ucmp test is probably more overhead | 510 | * so the BN_ucmp test is probably more overhead |
| 479 | * than always using BN_mod (which uses BN_copy if | 511 | * than always using BN_mod (which uses BN_copy if |
| 480 | * a similar test returns true). */ | 512 | * a similar test returns true). */ |
| 513 | /* We can use BN_mod and do not need BN_nnmod because our | ||
| 514 | * accumulator is never negative (the result of BN_mod does | ||
| 515 | * not depend on the sign of the modulus). | ||
| 516 | */ | ||
| 481 | #define BN_TO_MONTGOMERY_WORD(r, w, mont) \ | 517 | #define BN_TO_MONTGOMERY_WORD(r, w, mont) \ |
| 482 | (BN_set_word(r, (w)) && BN_to_montgomery(r, r, (mont), ctx)) | 518 | (BN_set_word(r, (w)) && BN_to_montgomery(r, r, (mont), ctx)) |
| 483 | 519 | ||
| 484 | bn_check_top(p); | 520 | bn_check_top(p); |
| 485 | bn_check_top(m); | 521 | bn_check_top(m); |
| 486 | 522 | ||
| 487 | if (!(m->d[0] & 1)) | 523 | if (m->top == 0 || !(m->d[0] & 1)) |
| 488 | { | 524 | { |
| 489 | BNerr(BN_F_BN_MOD_EXP_MONT_WORD,BN_R_CALLED_WITH_EVEN_MODULUS); | 525 | BNerr(BN_F_BN_MOD_EXP_MONT_WORD,BN_R_CALLED_WITH_EVEN_MODULUS); |
| 490 | return(0); | 526 | return(0); |
| 491 | } | 527 | } |
| 528 | if (m->top == 1) | ||
| 529 | a %= m->d[0]; /* make sure that 'a' is reduced */ | ||
| 530 | |||
| 492 | bits = BN_num_bits(p); | 531 | bits = BN_num_bits(p); |
| 493 | if (bits == 0) | 532 | if (bits == 0) |
| 494 | { | 533 | { |
| 495 | BN_one(rr); | 534 | ret = BN_one(rr); |
| 496 | return(1); | 535 | return ret; |
| 536 | } | ||
| 537 | if (a == 0) | ||
| 538 | { | ||
| 539 | ret = BN_zero(rr); | ||
| 540 | return ret; | ||
| 497 | } | 541 | } |
| 542 | |||
| 498 | BN_CTX_start(ctx); | 543 | BN_CTX_start(ctx); |
| 499 | d = BN_CTX_get(ctx); | 544 | d = BN_CTX_get(ctx); |
| 500 | r = BN_CTX_get(ctx); | 545 | r = BN_CTX_get(ctx); |
| @@ -590,8 +635,9 @@ err: | |||
| 590 | 635 | ||
| 591 | 636 | ||
| 592 | /* The old fallback, simple version :-) */ | 637 | /* The old fallback, simple version :-) */ |
| 593 | int BN_mod_exp_simple(BIGNUM *r, BIGNUM *a, BIGNUM *p, BIGNUM *m, | 638 | int BN_mod_exp_simple(BIGNUM *r, |
| 594 | BN_CTX *ctx) | 639 | const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, |
| 640 | BN_CTX *ctx) | ||
| 595 | { | 641 | { |
| 596 | int i,j,bits,ret=0,wstart,wend,window,wvalue,ts=0; | 642 | int i,j,bits,ret=0,wstart,wend,window,wvalue,ts=0; |
| 597 | int start=1; | 643 | int start=1; |
| @@ -602,8 +648,8 @@ int BN_mod_exp_simple(BIGNUM *r, BIGNUM *a, BIGNUM *p, BIGNUM *m, | |||
| 602 | 648 | ||
| 603 | if (bits == 0) | 649 | if (bits == 0) |
| 604 | { | 650 | { |
| 605 | BN_one(r); | 651 | ret = BN_one(r); |
| 606 | return(1); | 652 | return ret; |
| 607 | } | 653 | } |
| 608 | 654 | ||
| 609 | BN_CTX_start(ctx); | 655 | BN_CTX_start(ctx); |
| @@ -611,7 +657,12 @@ int BN_mod_exp_simple(BIGNUM *r, BIGNUM *a, BIGNUM *p, BIGNUM *m, | |||
| 611 | 657 | ||
| 612 | BN_init(&(val[0])); | 658 | BN_init(&(val[0])); |
| 613 | ts=1; | 659 | ts=1; |
| 614 | if (!BN_mod(&(val[0]),a,m,ctx)) goto err; /* 1 */ | 660 | if (!BN_nnmod(&(val[0]),a,m,ctx)) goto err; /* 1 */ |
| 661 | if (BN_is_zero(&(val[0]))) | ||
| 662 | { | ||
| 663 | ret = BN_zero(r); | ||
| 664 | goto err; | ||
| 665 | } | ||
| 615 | 666 | ||
| 616 | window = BN_window_bits_for_exponent_size(bits); | 667 | window = BN_window_bits_for_exponent_size(bits); |
| 617 | if (window > 1) | 668 | if (window > 1) |
diff --git a/src/lib/libcrypto/bn/bn_exp2.c b/src/lib/libcrypto/bn/bn_exp2.c index 29029f4c72..73ccd58a83 100644 --- a/src/lib/libcrypto/bn/bn_exp2.c +++ b/src/lib/libcrypto/bn/bn_exp2.c | |||
| @@ -115,13 +115,14 @@ | |||
| 115 | 115 | ||
| 116 | #define TABLE_SIZE 32 | 116 | #define TABLE_SIZE 32 |
| 117 | 117 | ||
| 118 | int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | 118 | int BN_mod_exp2_mont(BIGNUM *rr, const BIGNUM *a1, const BIGNUM *p1, |
| 119 | BIGNUM *p2, BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) | 119 | const BIGNUM *a2, const BIGNUM *p2, const BIGNUM *m, |
| 120 | BN_CTX *ctx, BN_MONT_CTX *in_mont) | ||
| 120 | { | 121 | { |
| 121 | int i,j,bits,b,bits1,bits2,ret=0,wpos1,wpos2,window1,window2,wvalue1,wvalue2; | 122 | int i,j,bits,b,bits1,bits2,ret=0,wpos1,wpos2,window1,window2,wvalue1,wvalue2; |
| 122 | int r_is_one=1,ts1=0,ts2=0; | 123 | int r_is_one=1,ts1=0,ts2=0; |
| 123 | BIGNUM *d,*r; | 124 | BIGNUM *d,*r; |
| 124 | BIGNUM *a_mod_m; | 125 | const BIGNUM *a_mod_m; |
| 125 | BIGNUM val1[TABLE_SIZE], val2[TABLE_SIZE]; | 126 | BIGNUM val1[TABLE_SIZE], val2[TABLE_SIZE]; |
| 126 | BN_MONT_CTX *mont=NULL; | 127 | BN_MONT_CTX *mont=NULL; |
| 127 | 128 | ||
| @@ -140,9 +141,10 @@ int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | |||
| 140 | bits2=BN_num_bits(p2); | 141 | bits2=BN_num_bits(p2); |
| 141 | if ((bits1 == 0) && (bits2 == 0)) | 142 | if ((bits1 == 0) && (bits2 == 0)) |
| 142 | { | 143 | { |
| 143 | BN_one(rr); | 144 | ret = BN_one(rr); |
| 144 | return(1); | 145 | return ret; |
| 145 | } | 146 | } |
| 147 | |||
| 146 | bits=(bits1 > bits2)?bits1:bits2; | 148 | bits=(bits1 > bits2)?bits1:bits2; |
| 147 | 149 | ||
| 148 | BN_CTX_start(ctx); | 150 | BN_CTX_start(ctx); |
| @@ -166,7 +168,7 @@ int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | |||
| 166 | */ | 168 | */ |
| 167 | BN_init(&val1[0]); | 169 | BN_init(&val1[0]); |
| 168 | ts1=1; | 170 | ts1=1; |
| 169 | if (BN_ucmp(a1,m) >= 0) | 171 | if (a1->neg || BN_ucmp(a1,m) >= 0) |
| 170 | { | 172 | { |
| 171 | if (!BN_mod(&(val1[0]),a1,m,ctx)) | 173 | if (!BN_mod(&(val1[0]),a1,m,ctx)) |
| 172 | goto err; | 174 | goto err; |
| @@ -174,6 +176,12 @@ int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | |||
| 174 | } | 176 | } |
| 175 | else | 177 | else |
| 176 | a_mod_m = a1; | 178 | a_mod_m = a1; |
| 179 | if (BN_is_zero(a_mod_m)) | ||
| 180 | { | ||
| 181 | ret = BN_zero(rr); | ||
| 182 | goto err; | ||
| 183 | } | ||
| 184 | |||
| 177 | if (!BN_to_montgomery(&(val1[0]),a_mod_m,mont,ctx)) goto err; | 185 | if (!BN_to_montgomery(&(val1[0]),a_mod_m,mont,ctx)) goto err; |
| 178 | if (window1 > 1) | 186 | if (window1 > 1) |
| 179 | { | 187 | { |
| @@ -195,7 +203,7 @@ int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | |||
| 195 | */ | 203 | */ |
| 196 | BN_init(&val2[0]); | 204 | BN_init(&val2[0]); |
| 197 | ts2=1; | 205 | ts2=1; |
| 198 | if (BN_ucmp(a2,m) >= 0) | 206 | if (a2->neg || BN_ucmp(a2,m) >= 0) |
| 199 | { | 207 | { |
| 200 | if (!BN_mod(&(val2[0]),a2,m,ctx)) | 208 | if (!BN_mod(&(val2[0]),a2,m,ctx)) |
| 201 | goto err; | 209 | goto err; |
| @@ -203,6 +211,11 @@ int BN_mod_exp2_mont(BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, BIGNUM *a2, | |||
| 203 | } | 211 | } |
| 204 | else | 212 | else |
| 205 | a_mod_m = a2; | 213 | a_mod_m = a2; |
| 214 | if (BN_is_zero(a_mod_m)) | ||
| 215 | { | ||
| 216 | ret = BN_zero(rr); | ||
| 217 | goto err; | ||
| 218 | } | ||
| 206 | if (!BN_to_montgomery(&(val2[0]),a_mod_m,mont,ctx)) goto err; | 219 | if (!BN_to_montgomery(&(val2[0]),a_mod_m,mont,ctx)) goto err; |
| 207 | if (window2 > 1) | 220 | if (window2 > 1) |
| 208 | { | 221 | { |
diff --git a/src/lib/libcrypto/bn/bn_gcd.c b/src/lib/libcrypto/bn/bn_gcd.c index 398207196b..7649f63fd2 100644 --- a/src/lib/libcrypto/bn/bn_gcd.c +++ b/src/lib/libcrypto/bn/bn_gcd.c | |||
| @@ -55,14 +55,66 @@ | |||
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | /* ==================================================================== | ||
| 59 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
| 60 | * | ||
| 61 | * Redistribution and use in source and binary forms, with or without | ||
| 62 | * modification, are permitted provided that the following conditions | ||
| 63 | * are met: | ||
| 64 | * | ||
| 65 | * 1. Redistributions of source code must retain the above copyright | ||
| 66 | * notice, this list of conditions and the following disclaimer. | ||
| 67 | * | ||
| 68 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 69 | * notice, this list of conditions and the following disclaimer in | ||
| 70 | * the documentation and/or other materials provided with the | ||
| 71 | * distribution. | ||
| 72 | * | ||
| 73 | * 3. All advertising materials mentioning features or use of this | ||
| 74 | * software must display the following acknowledgment: | ||
| 75 | * "This product includes software developed by the OpenSSL Project | ||
| 76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
| 77 | * | ||
| 78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 79 | * endorse or promote products derived from this software without | ||
| 80 | * prior written permission. For written permission, please contact | ||
| 81 | * openssl-core@openssl.org. | ||
| 82 | * | ||
| 83 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 84 | * nor may "OpenSSL" appear in their names without prior written | ||
| 85 | * permission of the OpenSSL Project. | ||
| 86 | * | ||
| 87 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 88 | * acknowledgment: | ||
| 89 | * "This product includes software developed by the OpenSSL Project | ||
| 90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
| 91 | * | ||
| 92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 104 | * ==================================================================== | ||
| 105 | * | ||
| 106 | * This product includes cryptographic software written by Eric Young | ||
| 107 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 108 | * Hudson (tjh@cryptsoft.com). | ||
| 109 | * | ||
| 110 | */ | ||
| 58 | 111 | ||
| 59 | #include <stdio.h> | ||
| 60 | #include "cryptlib.h" | 112 | #include "cryptlib.h" |
| 61 | #include "bn_lcl.h" | 113 | #include "bn_lcl.h" |
| 62 | 114 | ||
| 63 | static BIGNUM *euclid(BIGNUM *a, BIGNUM *b); | 115 | static BIGNUM *euclid(BIGNUM *a, BIGNUM *b); |
| 64 | 116 | ||
| 65 | int BN_gcd(BIGNUM *r, BIGNUM *in_a, BIGNUM *in_b, BN_CTX *ctx) | 117 | int BN_gcd(BIGNUM *r, const BIGNUM *in_a, const BIGNUM *in_b, BN_CTX *ctx) |
| 66 | { | 118 | { |
| 67 | BIGNUM *a,*b,*t; | 119 | BIGNUM *a,*b,*t; |
| 68 | int ret=0; | 120 | int ret=0; |
| @@ -77,6 +129,8 @@ int BN_gcd(BIGNUM *r, BIGNUM *in_a, BIGNUM *in_b, BN_CTX *ctx) | |||
| 77 | 129 | ||
| 78 | if (BN_copy(a,in_a) == NULL) goto err; | 130 | if (BN_copy(a,in_a) == NULL) goto err; |
| 79 | if (BN_copy(b,in_b) == NULL) goto err; | 131 | if (BN_copy(b,in_b) == NULL) goto err; |
| 132 | a->neg = 0; | ||
| 133 | b->neg = 0; | ||
| 80 | 134 | ||
| 81 | if (BN_cmp(a,b) < 0) { t=a; a=b; b=t; } | 135 | if (BN_cmp(a,b) < 0) { t=a; a=b; b=t; } |
| 82 | t=euclid(a,b); | 136 | t=euclid(a,b); |
| @@ -97,10 +151,10 @@ static BIGNUM *euclid(BIGNUM *a, BIGNUM *b) | |||
| 97 | bn_check_top(a); | 151 | bn_check_top(a); |
| 98 | bn_check_top(b); | 152 | bn_check_top(b); |
| 99 | 153 | ||
| 100 | for (;;) | 154 | /* 0 <= b <= a */ |
| 155 | while (!BN_is_zero(b)) | ||
| 101 | { | 156 | { |
| 102 | if (BN_is_zero(b)) | 157 | /* 0 < b <= a */ |
| 103 | break; | ||
| 104 | 158 | ||
| 105 | if (BN_is_odd(a)) | 159 | if (BN_is_odd(a)) |
| 106 | { | 160 | { |
| @@ -133,7 +187,9 @@ static BIGNUM *euclid(BIGNUM *a, BIGNUM *b) | |||
| 133 | shifts++; | 187 | shifts++; |
| 134 | } | 188 | } |
| 135 | } | 189 | } |
| 190 | /* 0 <= b <= a */ | ||
| 136 | } | 191 | } |
| 192 | |||
| 137 | if (shifts) | 193 | if (shifts) |
| 138 | { | 194 | { |
| 139 | if (!BN_lshift(a,a,shifts)) goto err; | 195 | if (!BN_lshift(a,a,shifts)) goto err; |
| @@ -143,11 +199,13 @@ err: | |||
| 143 | return(NULL); | 199 | return(NULL); |
| 144 | } | 200 | } |
| 145 | 201 | ||
| 202 | |||
| 146 | /* solves ax == 1 (mod n) */ | 203 | /* solves ax == 1 (mod n) */ |
| 147 | BIGNUM *BN_mod_inverse(BIGNUM *in, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx) | 204 | BIGNUM *BN_mod_inverse(BIGNUM *in, |
| 205 | const BIGNUM *a, const BIGNUM *n, BN_CTX *ctx) | ||
| 148 | { | 206 | { |
| 149 | BIGNUM *A,*B,*X,*Y,*M,*D,*R=NULL; | 207 | BIGNUM *A,*B,*X,*Y,*M,*D,*T,*R=NULL; |
| 150 | BIGNUM *T,*ret=NULL; | 208 | BIGNUM *ret=NULL; |
| 151 | int sign; | 209 | int sign; |
| 152 | 210 | ||
| 153 | bn_check_top(a); | 211 | bn_check_top(a); |
| @@ -160,7 +218,8 @@ BIGNUM *BN_mod_inverse(BIGNUM *in, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx) | |||
| 160 | D = BN_CTX_get(ctx); | 218 | D = BN_CTX_get(ctx); |
| 161 | M = BN_CTX_get(ctx); | 219 | M = BN_CTX_get(ctx); |
| 162 | Y = BN_CTX_get(ctx); | 220 | Y = BN_CTX_get(ctx); |
| 163 | if (Y == NULL) goto err; | 221 | T = BN_CTX_get(ctx); |
| 222 | if (T == NULL) goto err; | ||
| 164 | 223 | ||
| 165 | if (in == NULL) | 224 | if (in == NULL) |
| 166 | R=BN_new(); | 225 | R=BN_new(); |
| @@ -168,34 +227,256 @@ BIGNUM *BN_mod_inverse(BIGNUM *in, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx) | |||
| 168 | R=in; | 227 | R=in; |
| 169 | if (R == NULL) goto err; | 228 | if (R == NULL) goto err; |
| 170 | 229 | ||
| 171 | BN_zero(X); | 230 | BN_one(X); |
| 172 | BN_one(Y); | 231 | BN_zero(Y); |
| 173 | if (BN_copy(A,a) == NULL) goto err; | 232 | if (BN_copy(B,a) == NULL) goto err; |
| 174 | if (BN_copy(B,n) == NULL) goto err; | 233 | if (BN_copy(A,n) == NULL) goto err; |
| 175 | sign=1; | 234 | A->neg = 0; |
| 235 | if (B->neg || (BN_ucmp(B, A) >= 0)) | ||
| 236 | { | ||
| 237 | if (!BN_nnmod(B, B, A, ctx)) goto err; | ||
| 238 | } | ||
| 239 | sign = -1; | ||
| 240 | /* From B = a mod |n|, A = |n| it follows that | ||
| 241 | * | ||
| 242 | * 0 <= B < A, | ||
| 243 | * -sign*X*a == B (mod |n|), | ||
| 244 | * sign*Y*a == A (mod |n|). | ||
| 245 | */ | ||
| 176 | 246 | ||
| 177 | while (!BN_is_zero(B)) | 247 | if (BN_is_odd(n) && (BN_num_bits(n) <= (BN_BITS <= 32 ? 450 : 2048))) |
| 178 | { | 248 | { |
| 179 | if (!BN_div(D,M,A,B,ctx)) goto err; | 249 | /* Binary inversion algorithm; requires odd modulus. |
| 180 | T=A; | 250 | * This is faster than the general algorithm if the modulus |
| 181 | A=B; | 251 | * is sufficiently small (about 400 .. 500 bits on 32-bit |
| 182 | B=M; | 252 | * sytems, but much more on 64-bit systems) */ |
| 183 | /* T has a struct, M does not */ | 253 | int shift; |
| 184 | 254 | ||
| 185 | if (!BN_mul(T,D,X,ctx)) goto err; | 255 | while (!BN_is_zero(B)) |
| 186 | if (!BN_add(T,T,Y)) goto err; | 256 | { |
| 187 | M=Y; | 257 | /* |
| 188 | Y=X; | 258 | * 0 < B < |n|, |
| 189 | X=T; | 259 | * 0 < A <= |n|, |
| 190 | sign= -sign; | 260 | * (1) -sign*X*a == B (mod |n|), |
| 261 | * (2) sign*Y*a == A (mod |n|) | ||
| 262 | */ | ||
| 263 | |||
| 264 | /* Now divide B by the maximum possible power of two in the integers, | ||
| 265 | * and divide X by the same value mod |n|. | ||
| 266 | * When we're done, (1) still holds. */ | ||
| 267 | shift = 0; | ||
| 268 | while (!BN_is_bit_set(B, shift)) /* note that 0 < B */ | ||
| 269 | { | ||
| 270 | shift++; | ||
| 271 | |||
| 272 | if (BN_is_odd(X)) | ||
| 273 | { | ||
| 274 | if (!BN_uadd(X, X, n)) goto err; | ||
| 275 | } | ||
| 276 | /* now X is even, so we can easily divide it by two */ | ||
| 277 | if (!BN_rshift1(X, X)) goto err; | ||
| 278 | } | ||
| 279 | if (shift > 0) | ||
| 280 | { | ||
| 281 | if (!BN_rshift(B, B, shift)) goto err; | ||
| 282 | } | ||
| 283 | |||
| 284 | |||
| 285 | /* Same for A and Y. Afterwards, (2) still holds. */ | ||
| 286 | shift = 0; | ||
| 287 | while (!BN_is_bit_set(A, shift)) /* note that 0 < A */ | ||
| 288 | { | ||
| 289 | shift++; | ||
| 290 | |||
| 291 | if (BN_is_odd(Y)) | ||
| 292 | { | ||
| 293 | if (!BN_uadd(Y, Y, n)) goto err; | ||
| 294 | } | ||
| 295 | /* now Y is even */ | ||
| 296 | if (!BN_rshift1(Y, Y)) goto err; | ||
| 297 | } | ||
| 298 | if (shift > 0) | ||
| 299 | { | ||
| 300 | if (!BN_rshift(A, A, shift)) goto err; | ||
| 301 | } | ||
| 302 | |||
| 303 | |||
| 304 | /* We still have (1) and (2). | ||
| 305 | * Both A and B are odd. | ||
| 306 | * The following computations ensure that | ||
| 307 | * | ||
| 308 | * 0 <= B < |n|, | ||
| 309 | * 0 < A < |n|, | ||
| 310 | * (1) -sign*X*a == B (mod |n|), | ||
| 311 | * (2) sign*Y*a == A (mod |n|), | ||
| 312 | * | ||
| 313 | * and that either A or B is even in the next iteration. | ||
| 314 | */ | ||
| 315 | if (BN_ucmp(B, A) >= 0) | ||
| 316 | { | ||
| 317 | /* -sign*(X + Y)*a == B - A (mod |n|) */ | ||
| 318 | if (!BN_uadd(X, X, Y)) goto err; | ||
| 319 | /* NB: we could use BN_mod_add_quick(X, X, Y, n), but that | ||
| 320 | * actually makes the algorithm slower */ | ||
| 321 | if (!BN_usub(B, B, A)) goto err; | ||
| 322 | } | ||
| 323 | else | ||
| 324 | { | ||
| 325 | /* sign*(X + Y)*a == A - B (mod |n|) */ | ||
| 326 | if (!BN_uadd(Y, Y, X)) goto err; | ||
| 327 | /* as above, BN_mod_add_quick(Y, Y, X, n) would slow things down */ | ||
| 328 | if (!BN_usub(A, A, B)) goto err; | ||
| 329 | } | ||
| 330 | } | ||
| 331 | } | ||
| 332 | else | ||
| 333 | { | ||
| 334 | /* general inversion algorithm */ | ||
| 335 | |||
| 336 | while (!BN_is_zero(B)) | ||
| 337 | { | ||
| 338 | BIGNUM *tmp; | ||
| 339 | |||
| 340 | /* | ||
| 341 | * 0 < B < A, | ||
| 342 | * (*) -sign*X*a == B (mod |n|), | ||
| 343 | * sign*Y*a == A (mod |n|) | ||
| 344 | */ | ||
| 345 | |||
| 346 | /* (D, M) := (A/B, A%B) ... */ | ||
| 347 | if (BN_num_bits(A) == BN_num_bits(B)) | ||
| 348 | { | ||
| 349 | if (!BN_one(D)) goto err; | ||
| 350 | if (!BN_sub(M,A,B)) goto err; | ||
| 351 | } | ||
| 352 | else if (BN_num_bits(A) == BN_num_bits(B) + 1) | ||
| 353 | { | ||
| 354 | /* A/B is 1, 2, or 3 */ | ||
| 355 | if (!BN_lshift1(T,B)) goto err; | ||
| 356 | if (BN_ucmp(A,T) < 0) | ||
| 357 | { | ||
| 358 | /* A < 2*B, so D=1 */ | ||
| 359 | if (!BN_one(D)) goto err; | ||
| 360 | if (!BN_sub(M,A,B)) goto err; | ||
| 361 | } | ||
| 362 | else | ||
| 363 | { | ||
| 364 | /* A >= 2*B, so D=2 or D=3 */ | ||
| 365 | if (!BN_sub(M,A,T)) goto err; | ||
| 366 | if (!BN_add(D,T,B)) goto err; /* use D (:= 3*B) as temp */ | ||
| 367 | if (BN_ucmp(A,D) < 0) | ||
| 368 | { | ||
| 369 | /* A < 3*B, so D=2 */ | ||
| 370 | if (!BN_set_word(D,2)) goto err; | ||
| 371 | /* M (= A - 2*B) already has the correct value */ | ||
| 372 | } | ||
| 373 | else | ||
| 374 | { | ||
| 375 | /* only D=3 remains */ | ||
| 376 | if (!BN_set_word(D,3)) goto err; | ||
| 377 | /* currently M = A - 2*B, but we need M = A - 3*B */ | ||
| 378 | if (!BN_sub(M,M,B)) goto err; | ||
| 379 | } | ||
| 380 | } | ||
| 381 | } | ||
| 382 | else | ||
| 383 | { | ||
| 384 | if (!BN_div(D,M,A,B,ctx)) goto err; | ||
| 385 | } | ||
| 386 | |||
| 387 | /* Now | ||
| 388 | * A = D*B + M; | ||
| 389 | * thus we have | ||
| 390 | * (**) sign*Y*a == D*B + M (mod |n|). | ||
| 391 | */ | ||
| 392 | |||
| 393 | tmp=A; /* keep the BIGNUM object, the value does not matter */ | ||
| 394 | |||
| 395 | /* (A, B) := (B, A mod B) ... */ | ||
| 396 | A=B; | ||
| 397 | B=M; | ||
| 398 | /* ... so we have 0 <= B < A again */ | ||
| 399 | |||
| 400 | /* Since the former M is now B and the former B is now A, | ||
| 401 | * (**) translates into | ||
| 402 | * sign*Y*a == D*A + B (mod |n|), | ||
| 403 | * i.e. | ||
| 404 | * sign*Y*a - D*A == B (mod |n|). | ||
| 405 | * Similarly, (*) translates into | ||
| 406 | * -sign*X*a == A (mod |n|). | ||
| 407 | * | ||
| 408 | * Thus, | ||
| 409 | * sign*Y*a + D*sign*X*a == B (mod |n|), | ||
| 410 | * i.e. | ||
| 411 | * sign*(Y + D*X)*a == B (mod |n|). | ||
| 412 | * | ||
| 413 | * So if we set (X, Y, sign) := (Y + D*X, X, -sign), we arrive back at | ||
| 414 | * -sign*X*a == B (mod |n|), | ||
| 415 | * sign*Y*a == A (mod |n|). | ||
| 416 | * Note that X and Y stay non-negative all the time. | ||
| 417 | */ | ||
| 418 | |||
| 419 | /* most of the time D is very small, so we can optimize tmp := D*X+Y */ | ||
| 420 | if (BN_is_one(D)) | ||
| 421 | { | ||
| 422 | if (!BN_add(tmp,X,Y)) goto err; | ||
| 423 | } | ||
| 424 | else | ||
| 425 | { | ||
| 426 | if (BN_is_word(D,2)) | ||
| 427 | { | ||
| 428 | if (!BN_lshift1(tmp,X)) goto err; | ||
| 429 | } | ||
| 430 | else if (BN_is_word(D,4)) | ||
| 431 | { | ||
| 432 | if (!BN_lshift(tmp,X,2)) goto err; | ||
| 433 | } | ||
| 434 | else if (D->top == 1) | ||
| 435 | { | ||
| 436 | if (!BN_copy(tmp,X)) goto err; | ||
| 437 | if (!BN_mul_word(tmp,D->d[0])) goto err; | ||
| 438 | } | ||
| 439 | else | ||
| 440 | { | ||
| 441 | if (!BN_mul(tmp,D,X,ctx)) goto err; | ||
| 442 | } | ||
| 443 | if (!BN_add(tmp,tmp,Y)) goto err; | ||
| 444 | } | ||
| 445 | |||
| 446 | M=Y; /* keep the BIGNUM object, the value does not matter */ | ||
| 447 | Y=X; | ||
| 448 | X=tmp; | ||
| 449 | sign = -sign; | ||
| 450 | } | ||
| 191 | } | 451 | } |
| 452 | |||
| 453 | /* | ||
| 454 | * The while loop (Euclid's algorithm) ends when | ||
| 455 | * A == gcd(a,n); | ||
| 456 | * we have | ||
| 457 | * sign*Y*a == A (mod |n|), | ||
| 458 | * where Y is non-negative. | ||
| 459 | */ | ||
| 460 | |||
| 192 | if (sign < 0) | 461 | if (sign < 0) |
| 193 | { | 462 | { |
| 194 | if (!BN_sub(Y,n,Y)) goto err; | 463 | if (!BN_sub(Y,n,Y)) goto err; |
| 195 | } | 464 | } |
| 465 | /* Now Y*a == A (mod |n|). */ | ||
| 466 | |||
| 196 | 467 | ||
| 197 | if (BN_is_one(A)) | 468 | if (BN_is_one(A)) |
| 198 | { if (!BN_mod(R,Y,n,ctx)) goto err; } | 469 | { |
| 470 | /* Y*a == 1 (mod |n|) */ | ||
| 471 | if (!Y->neg && BN_ucmp(Y,n) < 0) | ||
| 472 | { | ||
| 473 | if (!BN_copy(R,Y)) goto err; | ||
| 474 | } | ||
| 475 | else | ||
| 476 | { | ||
| 477 | if (!BN_nnmod(R,Y,n,ctx)) goto err; | ||
| 478 | } | ||
| 479 | } | ||
| 199 | else | 480 | else |
| 200 | { | 481 | { |
| 201 | BNerr(BN_F_BN_MOD_INVERSE,BN_R_NO_INVERSE); | 482 | BNerr(BN_F_BN_MOD_INVERSE,BN_R_NO_INVERSE); |
| @@ -207,4 +488,3 @@ err: | |||
| 207 | BN_CTX_end(ctx); | 488 | BN_CTX_end(ctx); |
| 208 | return(ret); | 489 | return(ret); |
| 209 | } | 490 | } |
| 210 | |||
diff --git a/src/lib/libcrypto/bn/bn_kron.c b/src/lib/libcrypto/bn/bn_kron.c new file mode 100644 index 0000000000..49f75594ae --- /dev/null +++ b/src/lib/libcrypto/bn/bn_kron.c | |||
| @@ -0,0 +1,182 @@ | |||
| 1 | /* crypto/bn/bn_kron.c */ | ||
| 2 | /* ==================================================================== | ||
| 3 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | ||
| 4 | * | ||
| 5 | * Redistribution and use in source and binary forms, with or without | ||
| 6 | * modification, are permitted provided that the following conditions | ||
| 7 | * are met: | ||
| 8 | * | ||
| 9 | * 1. Redistributions of source code must retain the above copyright | ||
| 10 | * notice, this list of conditions and the following disclaimer. | ||
| 11 | * | ||
| 12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer in | ||
| 14 | * the documentation and/or other materials provided with the | ||
| 15 | * distribution. | ||
| 16 | * | ||
| 17 | * 3. All advertising materials mentioning features or use of this | ||
| 18 | * software must display the following acknowledgment: | ||
| 19 | * "This product includes software developed by the OpenSSL Project | ||
| 20 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
| 21 | * | ||
| 22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 23 | * endorse or promote products derived from this software without | ||
| 24 | * prior written permission. For written permission, please contact | ||
| 25 | * openssl-core@openssl.org. | ||
| 26 | * | ||
| 27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 28 | * nor may "OpenSSL" appear in their names without prior written | ||
| 29 | * permission of the OpenSSL Project. | ||
| 30 | * | ||
| 31 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 32 | * acknowledgment: | ||
| 33 | * "This product includes software developed by the OpenSSL Project | ||
| 34 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
| 35 | * | ||
| 36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 48 | * ==================================================================== | ||
| 49 | * | ||
| 50 | * This product includes cryptographic software written by Eric Young | ||
| 51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 52 | * Hudson (tjh@cryptsoft.com). | ||
| 53 | * | ||
| 54 | */ | ||
| 55 | |||
| 56 | #include "bn_lcl.h" | ||
| 57 | |||
| 58 | |||
| 59 | /* least significant word */ | ||
| 60 | #define BN_lsw(n) (((n)->top == 0) ? (BN_ULONG) 0 : (n)->d[0]) | ||
| 61 | |||
| 62 | /* Returns -2 for errors because both -1 and 0 are valid results. */ | ||
| 63 | int BN_kronecker(const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
| 64 | { | ||
| 65 | int i; | ||
| 66 | int ret = -2; /* avoid 'uninitialized' warning */ | ||
| 67 | int err = 0; | ||
| 68 | BIGNUM *A, *B, *tmp; | ||
| 69 | /* In 'tab', only odd-indexed entries are relevant: | ||
| 70 | * For any odd BIGNUM n, | ||
| 71 | * tab[BN_lsw(n) & 7] | ||
| 72 | * is $(-1)^{(n^2-1)/8}$ (using TeX notation). | ||
| 73 | * Note that the sign of n does not matter. | ||
| 74 | */ | ||
| 75 | static const int tab[8] = {0, 1, 0, -1, 0, -1, 0, 1}; | ||
| 76 | |||
| 77 | BN_CTX_start(ctx); | ||
| 78 | A = BN_CTX_get(ctx); | ||
| 79 | B = BN_CTX_get(ctx); | ||
| 80 | if (B == NULL) goto end; | ||
| 81 | |||
| 82 | err = !BN_copy(A, a); | ||
| 83 | if (err) goto end; | ||
| 84 | err = !BN_copy(B, b); | ||
| 85 | if (err) goto end; | ||
| 86 | |||
| 87 | /* | ||
| 88 | * Kronecker symbol, imlemented according to Henri Cohen, | ||
| 89 | * "A Course in Computational Algebraic Number Theory" | ||
| 90 | * (algorithm 1.4.10). | ||
| 91 | */ | ||
| 92 | |||
| 93 | /* Cohen's step 1: */ | ||
| 94 | |||
| 95 | if (BN_is_zero(B)) | ||
| 96 | { | ||
| 97 | ret = BN_abs_is_word(A, 1); | ||
| 98 | goto end; | ||
| 99 | } | ||
| 100 | |||
| 101 | /* Cohen's step 2: */ | ||
| 102 | |||
| 103 | if (!BN_is_odd(A) && !BN_is_odd(B)) | ||
| 104 | { | ||
| 105 | ret = 0; | ||
| 106 | goto end; | ||
| 107 | } | ||
| 108 | |||
| 109 | /* now B is non-zero */ | ||
| 110 | i = 0; | ||
| 111 | while (!BN_is_bit_set(B, i)) | ||
| 112 | i++; | ||
| 113 | err = !BN_rshift(B, B, i); | ||
| 114 | if (err) goto end; | ||
| 115 | if (i & 1) | ||
| 116 | { | ||
| 117 | /* i is odd */ | ||
| 118 | /* (thus B was even, thus A must be odd!) */ | ||
| 119 | |||
| 120 | /* set 'ret' to $(-1)^{(A^2-1)/8}$ */ | ||
| 121 | ret = tab[BN_lsw(A) & 7]; | ||
| 122 | } | ||
| 123 | else | ||
| 124 | { | ||
| 125 | /* i is even */ | ||
| 126 | ret = 1; | ||
| 127 | } | ||
| 128 | |||
| 129 | if (B->neg) | ||
| 130 | { | ||
| 131 | B->neg = 0; | ||
| 132 | if (A->neg) | ||
| 133 | ret = -ret; | ||
| 134 | } | ||
| 135 | |||
| 136 | /* now B is positive and odd, so what remains to be done is | ||
| 137 | * to compute the Jacobi symbol (A/B) and multiply it by 'ret' */ | ||
| 138 | |||
| 139 | while (1) | ||
| 140 | { | ||
| 141 | /* Cohen's step 3: */ | ||
| 142 | |||
| 143 | /* B is positive and odd */ | ||
| 144 | |||
| 145 | if (BN_is_zero(A)) | ||
| 146 | { | ||
| 147 | ret = BN_is_one(B) ? ret : 0; | ||
| 148 | goto end; | ||
| 149 | } | ||
| 150 | |||
| 151 | /* now A is non-zero */ | ||
| 152 | i = 0; | ||
| 153 | while (!BN_is_bit_set(A, i)) | ||
| 154 | i++; | ||
| 155 | err = !BN_rshift(A, A, i); | ||
| 156 | if (err) goto end; | ||
| 157 | if (i & 1) | ||
| 158 | { | ||
| 159 | /* i is odd */ | ||
| 160 | /* multiply 'ret' by $(-1)^{(B^2-1)/8}$ */ | ||
| 161 | ret = ret * tab[BN_lsw(B) & 7]; | ||
| 162 | } | ||
| 163 | |||
| 164 | /* Cohen's step 4: */ | ||
| 165 | /* multiply 'ret' by $(-1)^{(A-1)(B-1)/4}$ */ | ||
| 166 | if ((A->neg ? ~BN_lsw(A) : BN_lsw(A)) & BN_lsw(B) & 2) | ||
| 167 | ret = -ret; | ||
| 168 | |||
| 169 | /* (A, B) := (B mod |A|, |A|) */ | ||
| 170 | err = !BN_nnmod(B, B, A, ctx); | ||
| 171 | if (err) goto end; | ||
| 172 | tmp = A; A = B; B = tmp; | ||
| 173 | tmp->neg = 0; | ||
| 174 | } | ||
| 175 | |||
| 176 | end: | ||
| 177 | BN_CTX_end(ctx); | ||
| 178 | if (err) | ||
| 179 | return -2; | ||
| 180 | else | ||
| 181 | return ret; | ||
| 182 | } | ||
diff --git a/src/lib/libcrypto/bn/bn_lcl.h b/src/lib/libcrypto/bn/bn_lcl.h index 9c959921b4..8a4dba375a 100644 --- a/src/lib/libcrypto/bn/bn_lcl.h +++ b/src/lib/libcrypto/bn/bn_lcl.h | |||
| @@ -119,6 +119,20 @@ extern "C" { | |||
| 119 | #endif | 119 | #endif |
| 120 | 120 | ||
| 121 | 121 | ||
| 122 | /* Used for temp variables */ | ||
| 123 | #define BN_CTX_NUM 32 | ||
| 124 | #define BN_CTX_NUM_POS 12 | ||
| 125 | struct bignum_ctx | ||
| 126 | { | ||
| 127 | int tos; | ||
| 128 | BIGNUM bn[BN_CTX_NUM]; | ||
| 129 | int flags; | ||
| 130 | int depth; | ||
| 131 | int pos[BN_CTX_NUM_POS]; | ||
| 132 | int too_many; | ||
| 133 | } /* BN_CTX */; | ||
| 134 | |||
| 135 | |||
| 122 | /* | 136 | /* |
| 123 | * BN_window_bits_for_exponent_size -- macro for sliding window mod_exp functions | 137 | * BN_window_bits_for_exponent_size -- macro for sliding window mod_exp functions |
| 124 | * | 138 | * |
| @@ -171,7 +185,7 @@ extern "C" { | |||
| 171 | #define BN_MUL_LOW_RECURSIVE_SIZE_NORMAL (32) /* 32 */ | 185 | #define BN_MUL_LOW_RECURSIVE_SIZE_NORMAL (32) /* 32 */ |
| 172 | #define BN_MONT_CTX_SET_SIZE_WORD (64) /* 32 */ | 186 | #define BN_MONT_CTX_SET_SIZE_WORD (64) /* 32 */ |
| 173 | 187 | ||
| 174 | #if !defined(NO_ASM) && !defined(NO_INLINE_ASM) && !defined(PEDANTIC) | 188 | #if !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM) && !defined(PEDANTIC) |
| 175 | /* | 189 | /* |
| 176 | * BN_UMULT_HIGH section. | 190 | * BN_UMULT_HIGH section. |
| 177 | * | 191 | * |
| @@ -217,7 +231,7 @@ extern "C" { | |||
| 217 | ret; }) | 231 | ret; }) |
| 218 | # endif /* compiler */ | 232 | # endif /* compiler */ |
| 219 | # endif /* cpu */ | 233 | # endif /* cpu */ |
| 220 | #endif /* NO_ASM */ | 234 | #endif /* OPENSSL_NO_ASM */ |
| 221 | 235 | ||
| 222 | /************************************************************* | 236 | /************************************************************* |
| 223 | * Using the long long type | 237 | * Using the long long type |
| @@ -398,19 +412,26 @@ extern "C" { | |||
| 398 | void bn_mul_normal(BN_ULONG *r,BN_ULONG *a,int na,BN_ULONG *b,int nb); | 412 | void bn_mul_normal(BN_ULONG *r,BN_ULONG *a,int na,BN_ULONG *b,int nb); |
| 399 | void bn_mul_comba8(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b); | 413 | void bn_mul_comba8(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b); |
| 400 | void bn_mul_comba4(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b); | 414 | void bn_mul_comba4(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b); |
| 401 | void bn_sqr_normal(BN_ULONG *r, BN_ULONG *a, int n, BN_ULONG *tmp); | 415 | void bn_sqr_normal(BN_ULONG *r, const BN_ULONG *a, int n, BN_ULONG *tmp); |
| 402 | void bn_sqr_comba8(BN_ULONG *r,BN_ULONG *a); | 416 | void bn_sqr_comba8(BN_ULONG *r,const BN_ULONG *a); |
| 403 | void bn_sqr_comba4(BN_ULONG *r,BN_ULONG *a); | 417 | void bn_sqr_comba4(BN_ULONG *r,const BN_ULONG *a); |
| 404 | int bn_cmp_words(BN_ULONG *a,BN_ULONG *b,int n); | 418 | int bn_cmp_words(const BN_ULONG *a,const BN_ULONG *b,int n); |
| 405 | void bn_mul_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,int n2,BN_ULONG *t); | 419 | int bn_cmp_part_words(const BN_ULONG *a, const BN_ULONG *b, |
| 420 | int cl, int dl); | ||
| 421 | void bn_mul_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,int n2, | ||
| 422 | int dna,int dnb,BN_ULONG *t); | ||
| 406 | void bn_mul_part_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b, | 423 | void bn_mul_part_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b, |
| 407 | int tn, int n,BN_ULONG *t); | 424 | int n,int tna,int tnb,BN_ULONG *t); |
| 408 | void bn_sqr_recursive(BN_ULONG *r,BN_ULONG *a, int n2, BN_ULONG *t); | 425 | void bn_sqr_recursive(BN_ULONG *r,const BN_ULONG *a, int n2, BN_ULONG *t); |
| 409 | void bn_mul_low_normal(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b, int n); | 426 | void bn_mul_low_normal(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b, int n); |
| 410 | void bn_mul_low_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,int n2, | 427 | void bn_mul_low_recursive(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,int n2, |
| 411 | BN_ULONG *t); | 428 | BN_ULONG *t); |
| 412 | void bn_mul_high(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,BN_ULONG *l,int n2, | 429 | void bn_mul_high(BN_ULONG *r,BN_ULONG *a,BN_ULONG *b,BN_ULONG *l,int n2, |
| 413 | BN_ULONG *t); | 430 | BN_ULONG *t); |
| 431 | BN_ULONG bn_add_part_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
| 432 | int cl, int dl); | ||
| 433 | BN_ULONG bn_sub_part_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
| 434 | int cl, int dl); | ||
| 414 | 435 | ||
| 415 | #ifdef __cplusplus | 436 | #ifdef __cplusplus |
| 416 | } | 437 | } |
diff --git a/src/lib/libcrypto/bn/bn_lib.c b/src/lib/libcrypto/bn/bn_lib.c index 7767d65170..a016cb7f53 100644 --- a/src/lib/libcrypto/bn/bn_lib.c +++ b/src/lib/libcrypto/bn/bn_lib.c | |||
| @@ -128,7 +128,7 @@ int BN_get_params(int which) | |||
| 128 | else return(0); | 128 | else return(0); |
| 129 | } | 129 | } |
| 130 | 130 | ||
| 131 | BIGNUM *BN_value_one(void) | 131 | const BIGNUM *BN_value_one(void) |
| 132 | { | 132 | { |
| 133 | static BN_ULONG data_one=1L; | 133 | static BN_ULONG data_one=1L; |
| 134 | static BIGNUM const_one={&data_one,1,1,0}; | 134 | static BIGNUM const_one={&data_one,1,1,0}; |
| @@ -305,172 +305,168 @@ BIGNUM *BN_new(void) | |||
| 305 | return(ret); | 305 | return(ret); |
| 306 | } | 306 | } |
| 307 | 307 | ||
| 308 | /* This is an internal function that should not be used in applications. | 308 | /* This is used both by bn_expand2() and bn_dup_expand() */ |
| 309 | * It ensures that 'b' has enough room for a 'words' word number number. | 309 | /* The caller MUST check that words > b->dmax before calling this */ |
| 310 | * It is mostly used by the various BIGNUM routines. If there is an error, | 310 | static BN_ULONG *bn_expand_internal(const BIGNUM *b, int words) |
| 311 | * NULL is returned. If not, 'b' is returned. */ | ||
| 312 | |||
| 313 | BIGNUM *bn_expand2(BIGNUM *b, int words) | ||
| 314 | { | 311 | { |
| 315 | BN_ULONG *A,*a; | 312 | BN_ULONG *A,*a = NULL; |
| 316 | const BN_ULONG *B; | 313 | const BN_ULONG *B; |
| 317 | int i; | 314 | int i; |
| 318 | 315 | ||
| 319 | bn_check_top(b); | 316 | if (words > (INT_MAX/(4*BN_BITS2))) |
| 317 | { | ||
| 318 | BNerr(BN_F_BN_EXPAND_INTERNAL,BN_R_BIGNUM_TOO_LONG); | ||
| 319 | return NULL; | ||
| 320 | } | ||
| 320 | 321 | ||
| 321 | if (words > b->dmax) | 322 | bn_check_top(b); |
| 323 | if (BN_get_flags(b,BN_FLG_STATIC_DATA)) | ||
| 322 | { | 324 | { |
| 323 | if (words > (INT_MAX/(4*BN_BITS2))) | 325 | BNerr(BN_F_BN_EXPAND_INTERNAL,BN_R_EXPAND_ON_STATIC_BIGNUM_DATA); |
| 324 | { | 326 | return(NULL); |
| 325 | BNerr(BN_F_BN_EXPAND2,BN_R_BIGNUM_TOO_LONG); | 327 | } |
| 326 | return NULL; | 328 | a=A=(BN_ULONG *)OPENSSL_malloc(sizeof(BN_ULONG)*(words+1)); |
| 327 | } | 329 | if (A == NULL) |
| 328 | 330 | { | |
| 329 | bn_check_top(b); | 331 | BNerr(BN_F_BN_EXPAND_INTERNAL,ERR_R_MALLOC_FAILURE); |
| 330 | if (BN_get_flags(b,BN_FLG_STATIC_DATA)) | 332 | return(NULL); |
| 333 | } | ||
| 334 | #if 1 | ||
| 335 | B=b->d; | ||
| 336 | /* Check if the previous number needs to be copied */ | ||
| 337 | if (B != NULL) | ||
| 338 | { | ||
| 339 | for (i=b->top>>2; i>0; i--,A+=4,B+=4) | ||
| 331 | { | 340 | { |
| 332 | BNerr(BN_F_BN_EXPAND2,BN_R_EXPAND_ON_STATIC_BIGNUM_DATA); | 341 | /* |
| 333 | return(NULL); | 342 | * The fact that the loop is unrolled |
| 343 | * 4-wise is a tribute to Intel. It's | ||
| 344 | * the one that doesn't have enough | ||
| 345 | * registers to accomodate more data. | ||
| 346 | * I'd unroll it 8-wise otherwise:-) | ||
| 347 | * | ||
| 348 | * <appro@fy.chalmers.se> | ||
| 349 | */ | ||
| 350 | BN_ULONG a0,a1,a2,a3; | ||
| 351 | a0=B[0]; a1=B[1]; a2=B[2]; a3=B[3]; | ||
| 352 | A[0]=a0; A[1]=a1; A[2]=a2; A[3]=a3; | ||
| 334 | } | 353 | } |
| 335 | a=A=(BN_ULONG *)OPENSSL_malloc(sizeof(BN_ULONG)*(words+1)); | 354 | switch (b->top&3) |
| 336 | if (A == NULL) | ||
| 337 | { | 355 | { |
| 338 | BNerr(BN_F_BN_EXPAND2,ERR_R_MALLOC_FAILURE); | 356 | case 3: A[2]=B[2]; |
| 339 | return(NULL); | 357 | case 2: A[1]=B[1]; |
| 358 | case 1: A[0]=B[0]; | ||
| 359 | case 0: /* workaround for ultrix cc: without 'case 0', the optimizer does | ||
| 360 | * the switch table by doing a=top&3; a--; goto jump_table[a]; | ||
| 361 | * which fails for top== 0 */ | ||
| 362 | ; | ||
| 340 | } | 363 | } |
| 341 | #if 1 | 364 | } |
| 342 | B=b->d; | 365 | |
| 343 | /* Check if the previous number needs to be copied */ | 366 | /* Now need to zero any data between b->top and b->max */ |
| 344 | if (B != NULL) | 367 | /* XXX Why? */ |
| 345 | { | 368 | |
| 346 | #if 0 | 369 | A= &(a[b->top]); |
| 347 | /* This lot is an unrolled loop to copy b->top | 370 | for (i=(words - b->top)>>3; i>0; i--,A+=8) |
| 348 | * BN_ULONGs from B to A | 371 | { |
| 349 | */ | 372 | A[0]=0; A[1]=0; A[2]=0; A[3]=0; |
| 350 | /* | 373 | A[4]=0; A[5]=0; A[6]=0; A[7]=0; |
| 351 | * I have nothing against unrolling but it's usually done for | 374 | } |
| 352 | * several reasons, namely: | 375 | for (i=(words - b->top)&7; i>0; i--,A++) |
| 353 | * - minimize percentage of decision making code, i.e. branches; | 376 | A[0]=0; |
| 354 | * - avoid cache trashing; | ||
| 355 | * - make it possible to schedule loads earlier; | ||
| 356 | * Now let's examine the code below. The cornerstone of C is | ||
| 357 | * "programmer is always right" and that's what we love it for:-) | ||
| 358 | * For this very reason C compilers have to be paranoid when it | ||
| 359 | * comes to data aliasing and assume the worst. Yeah, but what | ||
| 360 | * does it mean in real life? This means that loop body below will | ||
| 361 | * be compiled to sequence of loads immediately followed by stores | ||
| 362 | * as compiler assumes the worst, something in A==B+1 style. As a | ||
| 363 | * result CPU pipeline is going to starve for incoming data. Secondly | ||
| 364 | * if A and B happen to share same cache line such code is going to | ||
| 365 | * cause severe cache trashing. Both factors have severe impact on | ||
| 366 | * performance of modern CPUs and this is the reason why this | ||
| 367 | * particular piece of code is #ifdefed away and replaced by more | ||
| 368 | * "friendly" version found in #else section below. This comment | ||
| 369 | * also applies to BN_copy function. | ||
| 370 | * | ||
| 371 | * <appro@fy.chalmers.se> | ||
| 372 | */ | ||
| 373 | for (i=b->top&(~7); i>0; i-=8) | ||
| 374 | { | ||
| 375 | A[0]=B[0]; A[1]=B[1]; A[2]=B[2]; A[3]=B[3]; | ||
| 376 | A[4]=B[4]; A[5]=B[5]; A[6]=B[6]; A[7]=B[7]; | ||
| 377 | A+=8; | ||
| 378 | B+=8; | ||
| 379 | } | ||
| 380 | switch (b->top&7) | ||
| 381 | { | ||
| 382 | case 7: | ||
| 383 | A[6]=B[6]; | ||
| 384 | case 6: | ||
| 385 | A[5]=B[5]; | ||
| 386 | case 5: | ||
| 387 | A[4]=B[4]; | ||
| 388 | case 4: | ||
| 389 | A[3]=B[3]; | ||
| 390 | case 3: | ||
| 391 | A[2]=B[2]; | ||
| 392 | case 2: | ||
| 393 | A[1]=B[1]; | ||
| 394 | case 1: | ||
| 395 | A[0]=B[0]; | ||
| 396 | case 0: | ||
| 397 | /* I need the 'case 0' entry for utrix cc. | ||
| 398 | * If the optimizer is turned on, it does the | ||
| 399 | * switch table by doing | ||
| 400 | * a=top&7 | ||
| 401 | * a--; | ||
| 402 | * goto jump_table[a]; | ||
| 403 | * If top is 0, this makes us jump to 0xffffffc | ||
| 404 | * which is rather bad :-(. | ||
| 405 | * eric 23-Apr-1998 | ||
| 406 | */ | ||
| 407 | ; | ||
| 408 | } | ||
| 409 | #else | 377 | #else |
| 410 | for (i=b->top>>2; i>0; i--,A+=4,B+=4) | 378 | memset(A,0,sizeof(BN_ULONG)*(words+1)); |
| 379 | memcpy(A,b->d,sizeof(b->d[0])*b->top); | ||
| 380 | #endif | ||
| 381 | |||
| 382 | return(a); | ||
| 383 | } | ||
| 384 | |||
| 385 | /* This is an internal function that can be used instead of bn_expand2() | ||
| 386 | * when there is a need to copy BIGNUMs instead of only expanding the | ||
| 387 | * data part, while still expanding them. | ||
| 388 | * Especially useful when needing to expand BIGNUMs that are declared | ||
| 389 | * 'const' and should therefore not be changed. | ||
| 390 | * The reason to use this instead of a BN_dup() followed by a bn_expand2() | ||
| 391 | * is memory allocation overhead. A BN_dup() followed by a bn_expand2() | ||
| 392 | * will allocate new memory for the BIGNUM data twice, and free it once, | ||
| 393 | * while bn_dup_expand() makes sure allocation is made only once. | ||
| 394 | */ | ||
| 395 | |||
| 396 | BIGNUM *bn_dup_expand(const BIGNUM *b, int words) | ||
| 397 | { | ||
| 398 | BIGNUM *r = NULL; | ||
| 399 | |||
| 400 | if (words > b->dmax) | ||
| 401 | { | ||
| 402 | BN_ULONG *a = bn_expand_internal(b, words); | ||
| 403 | |||
| 404 | if (a) | ||
| 405 | { | ||
| 406 | r = BN_new(); | ||
| 407 | if (r) | ||
| 411 | { | 408 | { |
| 412 | /* | 409 | r->top = b->top; |
| 413 | * The fact that the loop is unrolled | 410 | r->dmax = words; |
| 414 | * 4-wise is a tribute to Intel. It's | 411 | r->neg = b->neg; |
| 415 | * the one that doesn't have enough | 412 | r->d = a; |
| 416 | * registers to accomodate more data. | ||
| 417 | * I'd unroll it 8-wise otherwise:-) | ||
| 418 | * | ||
| 419 | * <appro@fy.chalmers.se> | ||
| 420 | */ | ||
| 421 | BN_ULONG a0,a1,a2,a3; | ||
| 422 | a0=B[0]; a1=B[1]; a2=B[2]; a3=B[3]; | ||
| 423 | A[0]=a0; A[1]=a1; A[2]=a2; A[3]=a3; | ||
| 424 | } | 413 | } |
| 425 | switch (b->top&3) | 414 | else |
| 426 | { | 415 | { |
| 427 | case 3: A[2]=B[2]; | 416 | /* r == NULL, BN_new failure */ |
| 428 | case 2: A[1]=B[1]; | 417 | OPENSSL_free(a); |
| 429 | case 1: A[0]=B[0]; | ||
| 430 | case 0: ; /* ultrix cc workaround, see above */ | ||
| 431 | } | 418 | } |
| 432 | #endif | ||
| 433 | OPENSSL_free(b->d); | ||
| 434 | } | 419 | } |
| 420 | /* If a == NULL, there was an error in allocation in | ||
| 421 | bn_expand_internal(), and NULL should be returned */ | ||
| 422 | } | ||
| 423 | else | ||
| 424 | { | ||
| 425 | r = BN_dup(b); | ||
| 426 | } | ||
| 435 | 427 | ||
| 436 | b->d=a; | 428 | return r; |
| 437 | b->dmax=words; | 429 | } |
| 430 | |||
| 431 | /* This is an internal function that should not be used in applications. | ||
| 432 | * It ensures that 'b' has enough room for a 'words' word number number. | ||
| 433 | * It is mostly used by the various BIGNUM routines. If there is an error, | ||
| 434 | * NULL is returned. If not, 'b' is returned. */ | ||
| 438 | 435 | ||
| 439 | /* Now need to zero any data between b->top and b->max */ | 436 | BIGNUM *bn_expand2(BIGNUM *b, int words) |
| 437 | { | ||
| 438 | if (words > b->dmax) | ||
| 439 | { | ||
| 440 | BN_ULONG *a = bn_expand_internal(b, words); | ||
| 440 | 441 | ||
| 441 | A= &(b->d[b->top]); | 442 | if (a) |
| 442 | for (i=(b->dmax - b->top)>>3; i>0; i--,A+=8) | ||
| 443 | { | 443 | { |
| 444 | A[0]=0; A[1]=0; A[2]=0; A[3]=0; | 444 | if (b->d) |
| 445 | A[4]=0; A[5]=0; A[6]=0; A[7]=0; | 445 | OPENSSL_free(b->d); |
| 446 | } | ||
| 447 | for (i=(b->dmax - b->top)&7; i>0; i--,A++) | ||
| 448 | A[0]=0; | ||
| 449 | #else | ||
| 450 | memset(A,0,sizeof(BN_ULONG)*(words+1)); | ||
| 451 | memcpy(A,b->d,sizeof(b->d[0])*b->top); | ||
| 452 | b->d=a; | 446 | b->d=a; |
| 453 | b->max=words; | 447 | b->dmax=words; |
| 454 | #endif | 448 | } |
| 455 | 449 | else | |
| 456 | /* memset(&(p[b->max]),0,((words+1)-b->max)*sizeof(BN_ULONG)); */ | 450 | b = NULL; |
| 457 | /* { int i; for (i=b->max; i<words+1; i++) p[i]=i;} */ | ||
| 458 | |||
| 459 | } | 451 | } |
| 460 | return(b); | 452 | return b; |
| 461 | } | 453 | } |
| 462 | 454 | ||
| 463 | BIGNUM *BN_dup(const BIGNUM *a) | 455 | BIGNUM *BN_dup(const BIGNUM *a) |
| 464 | { | 456 | { |
| 465 | BIGNUM *r; | 457 | BIGNUM *r, *t; |
| 466 | 458 | ||
| 467 | if (a == NULL) return NULL; | 459 | if (a == NULL) return NULL; |
| 468 | 460 | ||
| 469 | bn_check_top(a); | 461 | bn_check_top(a); |
| 470 | 462 | ||
| 471 | r=BN_new(); | 463 | t = BN_new(); |
| 472 | if (r == NULL) return(NULL); | 464 | if (t == NULL) return(NULL); |
| 473 | return((BIGNUM *)BN_copy(r,a)); | 465 | r = BN_copy(t, a); |
| 466 | /* now r == t || r == NULL */ | ||
| 467 | if (r == NULL) | ||
| 468 | BN_free(t); | ||
| 469 | return r; | ||
| 474 | } | 470 | } |
| 475 | 471 | ||
| 476 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b) | 472 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b) |
| @@ -498,7 +494,7 @@ BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b) | |||
| 498 | case 3: A[2]=B[2]; | 494 | case 3: A[2]=B[2]; |
| 499 | case 2: A[1]=B[1]; | 495 | case 2: A[1]=B[1]; |
| 500 | case 1: A[0]=B[0]; | 496 | case 1: A[0]=B[0]; |
| 501 | case 0: ; /* ultrix cc workaround, see comments in bn_expand2 */ | 497 | case 0: ; /* ultrix cc workaround, see comments in bn_expand_internal */ |
| 502 | } | 498 | } |
| 503 | #else | 499 | #else |
| 504 | memcpy(a->d,b->d,sizeof(b->d[0])*b->top); | 500 | memcpy(a->d,b->d,sizeof(b->d[0])*b->top); |
| @@ -512,6 +508,35 @@ BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b) | |||
| 512 | return(a); | 508 | return(a); |
| 513 | } | 509 | } |
| 514 | 510 | ||
| 511 | void BN_swap(BIGNUM *a, BIGNUM *b) | ||
| 512 | { | ||
| 513 | int flags_old_a, flags_old_b; | ||
| 514 | BN_ULONG *tmp_d; | ||
| 515 | int tmp_top, tmp_dmax, tmp_neg; | ||
| 516 | |||
| 517 | flags_old_a = a->flags; | ||
| 518 | flags_old_b = b->flags; | ||
| 519 | |||
| 520 | tmp_d = a->d; | ||
| 521 | tmp_top = a->top; | ||
| 522 | tmp_dmax = a->dmax; | ||
| 523 | tmp_neg = a->neg; | ||
| 524 | |||
| 525 | a->d = b->d; | ||
| 526 | a->top = b->top; | ||
| 527 | a->dmax = b->dmax; | ||
| 528 | a->neg = b->neg; | ||
| 529 | |||
| 530 | b->d = tmp_d; | ||
| 531 | b->top = tmp_top; | ||
| 532 | b->dmax = tmp_dmax; | ||
| 533 | b->neg = tmp_neg; | ||
| 534 | |||
| 535 | a->flags = (flags_old_a & BN_FLG_MALLOCED) | (flags_old_b & BN_FLG_STATIC_DATA); | ||
| 536 | b->flags = (flags_old_b & BN_FLG_MALLOCED) | (flags_old_a & BN_FLG_STATIC_DATA); | ||
| 537 | } | ||
| 538 | |||
| 539 | |||
| 515 | void BN_clear(BIGNUM *a) | 540 | void BN_clear(BIGNUM *a) |
| 516 | { | 541 | { |
| 517 | if (a->d != NULL) | 542 | if (a->d != NULL) |
| @@ -520,7 +545,7 @@ void BN_clear(BIGNUM *a) | |||
| 520 | a->neg=0; | 545 | a->neg=0; |
| 521 | } | 546 | } |
| 522 | 547 | ||
| 523 | BN_ULONG BN_get_word(BIGNUM *a) | 548 | BN_ULONG BN_get_word(const BIGNUM *a) |
| 524 | { | 549 | { |
| 525 | int i,n; | 550 | int i,n; |
| 526 | BN_ULONG ret=0; | 551 | BN_ULONG ret=0; |
| @@ -568,7 +593,6 @@ int BN_set_word(BIGNUM *a, BN_ULONG w) | |||
| 568 | return(1); | 593 | return(1); |
| 569 | } | 594 | } |
| 570 | 595 | ||
| 571 | /* ignore negative */ | ||
| 572 | BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret) | 596 | BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret) |
| 573 | { | 597 | { |
| 574 | unsigned int i,m; | 598 | unsigned int i,m; |
| @@ -589,6 +613,7 @@ BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret) | |||
| 589 | i=((n-1)/BN_BYTES)+1; | 613 | i=((n-1)/BN_BYTES)+1; |
| 590 | m=((n-1)%(BN_BYTES)); | 614 | m=((n-1)%(BN_BYTES)); |
| 591 | ret->top=i; | 615 | ret->top=i; |
| 616 | ret->neg=0; | ||
| 592 | while (n-- > 0) | 617 | while (n-- > 0) |
| 593 | { | 618 | { |
| 594 | l=(l<<8L)| *(s++); | 619 | l=(l<<8L)| *(s++); |
| @@ -743,7 +768,7 @@ int BN_mask_bits(BIGNUM *a, int n) | |||
| 743 | return(1); | 768 | return(1); |
| 744 | } | 769 | } |
| 745 | 770 | ||
| 746 | int bn_cmp_words(BN_ULONG *a, BN_ULONG *b, int n) | 771 | int bn_cmp_words(const BN_ULONG *a, const BN_ULONG *b, int n) |
| 747 | { | 772 | { |
| 748 | int i; | 773 | int i; |
| 749 | BN_ULONG aa,bb; | 774 | BN_ULONG aa,bb; |
| @@ -760,3 +785,34 @@ int bn_cmp_words(BN_ULONG *a, BN_ULONG *b, int n) | |||
| 760 | return(0); | 785 | return(0); |
| 761 | } | 786 | } |
| 762 | 787 | ||
| 788 | /* Here follows a specialised variants of bn_cmp_words(). It has the | ||
| 789 | property of performing the operation on arrays of different sizes. | ||
| 790 | The sizes of those arrays is expressed through cl, which is the | ||
| 791 | common length ( basicall, min(len(a),len(b)) ), and dl, which is the | ||
| 792 | delta between the two lengths, calculated as len(a)-len(b). | ||
| 793 | All lengths are the number of BN_ULONGs... */ | ||
| 794 | |||
| 795 | int bn_cmp_part_words(const BN_ULONG *a, const BN_ULONG *b, | ||
| 796 | int cl, int dl) | ||
| 797 | { | ||
| 798 | int n,i; | ||
| 799 | n = cl-1; | ||
| 800 | |||
| 801 | if (dl < 0) | ||
| 802 | { | ||
| 803 | for (i=dl; i<0; i++) | ||
| 804 | { | ||
| 805 | if (b[n-i] != 0) | ||
| 806 | return -1; /* a < b */ | ||
| 807 | } | ||
| 808 | } | ||
| 809 | if (dl > 0) | ||
| 810 | { | ||
| 811 | for (i=dl; i>0; i--) | ||
| 812 | { | ||
| 813 | if (a[n+i] != 0) | ||
| 814 | return 1; /* a > b */ | ||
| 815 | } | ||
| 816 | } | ||
| 817 | return bn_cmp_words(a,b,cl); | ||
| 818 | } | ||
diff --git a/src/lib/libcrypto/bn/bn_mod.c b/src/lib/libcrypto/bn/bn_mod.c new file mode 100644 index 0000000000..5cf82480d7 --- /dev/null +++ b/src/lib/libcrypto/bn/bn_mod.c | |||
| @@ -0,0 +1,296 @@ | |||
| 1 | /* crypto/bn/bn_mod.c */ | ||
| 2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> | ||
| 3 | * for the OpenSSL project. */ | ||
| 4 | /* ==================================================================== | ||
| 5 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | ||
| 6 | * | ||
| 7 | * Redistribution and use in source and binary forms, with or without | ||
| 8 | * modification, are permitted provided that the following conditions | ||
| 9 | * are met: | ||
| 10 | * | ||
| 11 | * 1. Redistributions of source code must retain the above copyright | ||
| 12 | * notice, this list of conditions and the following disclaimer. | ||
| 13 | * | ||
| 14 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 15 | * notice, this list of conditions and the following disclaimer in | ||
| 16 | * the documentation and/or other materials provided with the | ||
| 17 | * distribution. | ||
| 18 | * | ||
| 19 | * 3. All advertising materials mentioning features or use of this | ||
| 20 | * software must display the following acknowledgment: | ||
| 21 | * "This product includes software developed by the OpenSSL Project | ||
| 22 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
| 23 | * | ||
| 24 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 25 | * endorse or promote products derived from this software without | ||
| 26 | * prior written permission. For written permission, please contact | ||
| 27 | * openssl-core@openssl.org. | ||
| 28 | * | ||
| 29 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 30 | * nor may "OpenSSL" appear in their names without prior written | ||
| 31 | * permission of the OpenSSL Project. | ||
| 32 | * | ||
| 33 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 34 | * acknowledgment: | ||
| 35 | * "This product includes software developed by the OpenSSL Project | ||
| 36 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
| 37 | * | ||
| 38 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 39 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 40 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 41 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 42 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 43 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 44 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 45 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 46 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 47 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 48 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 49 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 50 | * ==================================================================== | ||
| 51 | * | ||
| 52 | * This product includes cryptographic software written by Eric Young | ||
| 53 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 54 | * Hudson (tjh@cryptsoft.com). | ||
| 55 | * | ||
| 56 | */ | ||
| 57 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 58 | * All rights reserved. | ||
| 59 | * | ||
| 60 | * This package is an SSL implementation written | ||
| 61 | * by Eric Young (eay@cryptsoft.com). | ||
| 62 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 63 | * | ||
| 64 | * This library is free for commercial and non-commercial use as long as | ||
| 65 | * the following conditions are aheared to. The following conditions | ||
| 66 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 67 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 68 | * included with this distribution is covered by the same copyright terms | ||
| 69 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 70 | * | ||
| 71 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 72 | * the code are not to be removed. | ||
| 73 | * If this package is used in a product, Eric Young should be given attribution | ||
| 74 | * as the author of the parts of the library used. | ||
| 75 | * This can be in the form of a textual message at program startup or | ||
| 76 | * in documentation (online or textual) provided with the package. | ||
| 77 | * | ||
| 78 | * Redistribution and use in source and binary forms, with or without | ||
| 79 | * modification, are permitted provided that the following conditions | ||
| 80 | * are met: | ||
| 81 | * 1. Redistributions of source code must retain the copyright | ||
| 82 | * notice, this list of conditions and the following disclaimer. | ||
| 83 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 84 | * notice, this list of conditions and the following disclaimer in the | ||
| 85 | * documentation and/or other materials provided with the distribution. | ||
| 86 | * 3. All advertising materials mentioning features or use of this software | ||
| 87 | * must display the following acknowledgement: | ||
| 88 | * "This product includes cryptographic software written by | ||
| 89 | * Eric Young (eay@cryptsoft.com)" | ||
| 90 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 91 | * being used are not cryptographic related :-). | ||
| 92 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 93 | * the apps directory (application code) you must include an acknowledgement: | ||
| 94 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 95 | * | ||
| 96 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 97 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 98 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 99 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 100 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 101 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 102 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 103 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 104 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 105 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 106 | * SUCH DAMAGE. | ||
| 107 | * | ||
| 108 | * The licence and distribution terms for any publically available version or | ||
| 109 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 110 | * copied and put under another distribution licence | ||
| 111 | * [including the GNU Public Licence.] | ||
| 112 | */ | ||
| 113 | |||
| 114 | #include "cryptlib.h" | ||
| 115 | #include "bn_lcl.h" | ||
| 116 | |||
| 117 | |||
| 118 | #if 0 /* now just a #define */ | ||
| 119 | int BN_mod(BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) | ||
| 120 | { | ||
| 121 | return(BN_div(NULL,rem,m,d,ctx)); | ||
| 122 | /* note that rem->neg == m->neg (unless the remainder is zero) */ | ||
| 123 | } | ||
| 124 | #endif | ||
| 125 | |||
| 126 | |||
| 127 | int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) | ||
| 128 | { | ||
| 129 | /* like BN_mod, but returns non-negative remainder | ||
| 130 | * (i.e., 0 <= r < |d| always holds) */ | ||
| 131 | |||
| 132 | if (!(BN_mod(r,m,d,ctx))) | ||
| 133 | return 0; | ||
| 134 | if (!r->neg) | ||
| 135 | return 1; | ||
| 136 | /* now -|d| < r < 0, so we have to set r := r + |d| */ | ||
| 137 | return (d->neg ? BN_sub : BN_add)(r, r, d); | ||
| 138 | } | ||
| 139 | |||
| 140 | |||
| 141 | int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx) | ||
| 142 | { | ||
| 143 | if (!BN_add(r, a, b)) return 0; | ||
| 144 | return BN_nnmod(r, r, m, ctx); | ||
| 145 | } | ||
| 146 | |||
| 147 | |||
| 148 | /* BN_mod_add variant that may be used if both a and b are non-negative | ||
| 149 | * and less than m */ | ||
| 150 | int BN_mod_add_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m) | ||
| 151 | { | ||
| 152 | if (!BN_add(r, a, b)) return 0; | ||
| 153 | if (BN_ucmp(r, m) >= 0) | ||
| 154 | return BN_usub(r, r, m); | ||
| 155 | return 1; | ||
| 156 | } | ||
| 157 | |||
| 158 | |||
| 159 | int BN_mod_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx) | ||
| 160 | { | ||
| 161 | if (!BN_sub(r, a, b)) return 0; | ||
| 162 | return BN_nnmod(r, r, m, ctx); | ||
| 163 | } | ||
| 164 | |||
| 165 | |||
| 166 | /* BN_mod_sub variant that may be used if both a and b are non-negative | ||
| 167 | * and less than m */ | ||
| 168 | int BN_mod_sub_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m) | ||
| 169 | { | ||
| 170 | if (!BN_sub(r, a, b)) return 0; | ||
| 171 | if (r->neg) | ||
| 172 | return BN_add(r, r, m); | ||
| 173 | return 1; | ||
| 174 | } | ||
| 175 | |||
| 176 | |||
| 177 | /* slow but works */ | ||
| 178 | int BN_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, | ||
| 179 | BN_CTX *ctx) | ||
| 180 | { | ||
| 181 | BIGNUM *t; | ||
| 182 | int ret=0; | ||
| 183 | |||
| 184 | bn_check_top(a); | ||
| 185 | bn_check_top(b); | ||
| 186 | bn_check_top(m); | ||
| 187 | |||
| 188 | BN_CTX_start(ctx); | ||
| 189 | if ((t = BN_CTX_get(ctx)) == NULL) goto err; | ||
| 190 | if (a == b) | ||
| 191 | { if (!BN_sqr(t,a,ctx)) goto err; } | ||
| 192 | else | ||
| 193 | { if (!BN_mul(t,a,b,ctx)) goto err; } | ||
| 194 | if (!BN_nnmod(r,t,m,ctx)) goto err; | ||
| 195 | ret=1; | ||
| 196 | err: | ||
| 197 | BN_CTX_end(ctx); | ||
| 198 | return(ret); | ||
| 199 | } | ||
| 200 | |||
| 201 | |||
| 202 | int BN_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx) | ||
| 203 | { | ||
| 204 | if (!BN_sqr(r, a, ctx)) return 0; | ||
| 205 | /* r->neg == 0, thus we don't need BN_nnmod */ | ||
| 206 | return BN_mod(r, r, m, ctx); | ||
| 207 | } | ||
| 208 | |||
| 209 | |||
| 210 | int BN_mod_lshift1(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx) | ||
| 211 | { | ||
| 212 | if (!BN_lshift1(r, a)) return 0; | ||
| 213 | return BN_nnmod(r, r, m, ctx); | ||
| 214 | } | ||
| 215 | |||
| 216 | |||
| 217 | /* BN_mod_lshift1 variant that may be used if a is non-negative | ||
| 218 | * and less than m */ | ||
| 219 | int BN_mod_lshift1_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *m) | ||
| 220 | { | ||
| 221 | if (!BN_lshift1(r, a)) return 0; | ||
| 222 | if (BN_cmp(r, m) >= 0) | ||
| 223 | return BN_sub(r, r, m); | ||
| 224 | return 1; | ||
| 225 | } | ||
| 226 | |||
| 227 | |||
| 228 | int BN_mod_lshift(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m, BN_CTX *ctx) | ||
| 229 | { | ||
| 230 | BIGNUM *abs_m = NULL; | ||
| 231 | int ret; | ||
| 232 | |||
| 233 | if (!BN_nnmod(r, a, m, ctx)) return 0; | ||
| 234 | |||
| 235 | if (m->neg) | ||
| 236 | { | ||
| 237 | abs_m = BN_dup(m); | ||
| 238 | if (abs_m == NULL) return 0; | ||
| 239 | abs_m->neg = 0; | ||
| 240 | } | ||
| 241 | |||
| 242 | ret = BN_mod_lshift_quick(r, r, n, (abs_m ? abs_m : m)); | ||
| 243 | |||
| 244 | if (abs_m) | ||
| 245 | BN_free(abs_m); | ||
| 246 | return ret; | ||
| 247 | } | ||
| 248 | |||
| 249 | |||
| 250 | /* BN_mod_lshift variant that may be used if a is non-negative | ||
| 251 | * and less than m */ | ||
| 252 | int BN_mod_lshift_quick(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m) | ||
| 253 | { | ||
| 254 | if (r != a) | ||
| 255 | { | ||
| 256 | if (BN_copy(r, a) == NULL) return 0; | ||
| 257 | } | ||
| 258 | |||
| 259 | while (n > 0) | ||
| 260 | { | ||
| 261 | int max_shift; | ||
| 262 | |||
| 263 | /* 0 < r < m */ | ||
| 264 | max_shift = BN_num_bits(m) - BN_num_bits(r); | ||
| 265 | /* max_shift >= 0 */ | ||
| 266 | |||
| 267 | if (max_shift < 0) | ||
| 268 | { | ||
| 269 | BNerr(BN_F_BN_MOD_LSHIFT_QUICK, BN_R_INPUT_NOT_REDUCED); | ||
| 270 | return 0; | ||
| 271 | } | ||
| 272 | |||
| 273 | if (max_shift > n) | ||
| 274 | max_shift = n; | ||
| 275 | |||
| 276 | if (max_shift) | ||
| 277 | { | ||
| 278 | if (!BN_lshift(r, r, max_shift)) return 0; | ||
| 279 | n -= max_shift; | ||
| 280 | } | ||
| 281 | else | ||
| 282 | { | ||
| 283 | if (!BN_lshift1(r, r)) return 0; | ||
| 284 | --n; | ||
| 285 | } | ||
| 286 | |||
| 287 | /* BN_num_bits(r) <= BN_num_bits(m) */ | ||
| 288 | |||
| 289 | if (BN_cmp(r, m) >= 0) | ||
| 290 | { | ||
| 291 | if (!BN_sub(r, r, m)) return 0; | ||
| 292 | } | ||
| 293 | } | ||
| 294 | |||
| 295 | return 1; | ||
| 296 | } | ||
diff --git a/src/lib/libcrypto/bn/bn_mont.c b/src/lib/libcrypto/bn/bn_mont.c index 8cf1febacc..82942a4759 100644 --- a/src/lib/libcrypto/bn/bn_mont.c +++ b/src/lib/libcrypto/bn/bn_mont.c | |||
| @@ -69,20 +69,17 @@ | |||
| 69 | 69 | ||
| 70 | #define MONT_WORD /* use the faster word-based algorithm */ | 70 | #define MONT_WORD /* use the faster word-based algorithm */ |
| 71 | 71 | ||
| 72 | int BN_mod_mul_montgomery(BIGNUM *r, BIGNUM *a, BIGNUM *b, | 72 | int BN_mod_mul_montgomery(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, |
| 73 | BN_MONT_CTX *mont, BN_CTX *ctx) | 73 | BN_MONT_CTX *mont, BN_CTX *ctx) |
| 74 | { | 74 | { |
| 75 | BIGNUM *tmp,*tmp2; | 75 | BIGNUM *tmp; |
| 76 | int ret=0; | 76 | int ret=0; |
| 77 | 77 | ||
| 78 | BN_CTX_start(ctx); | 78 | BN_CTX_start(ctx); |
| 79 | tmp = BN_CTX_get(ctx); | 79 | tmp = BN_CTX_get(ctx); |
| 80 | tmp2 = BN_CTX_get(ctx); | 80 | if (tmp == NULL) goto err; |
| 81 | if (tmp == NULL || tmp2 == NULL) goto err; | ||
| 82 | 81 | ||
| 83 | bn_check_top(tmp); | 82 | bn_check_top(tmp); |
| 84 | bn_check_top(tmp2); | ||
| 85 | |||
| 86 | if (a == b) | 83 | if (a == b) |
| 87 | { | 84 | { |
| 88 | if (!BN_sqr(tmp,a,ctx)) goto err; | 85 | if (!BN_sqr(tmp,a,ctx)) goto err; |
| @@ -99,7 +96,7 @@ err: | |||
| 99 | return(ret); | 96 | return(ret); |
| 100 | } | 97 | } |
| 101 | 98 | ||
| 102 | int BN_from_montgomery(BIGNUM *ret, BIGNUM *a, BN_MONT_CTX *mont, | 99 | int BN_from_montgomery(BIGNUM *ret, const BIGNUM *a, BN_MONT_CTX *mont, |
| 103 | BN_CTX *ctx) | 100 | BN_CTX *ctx) |
| 104 | { | 101 | { |
| 105 | int retn=0; | 102 | int retn=0; |
| @@ -144,7 +141,7 @@ int BN_from_montgomery(BIGNUM *ret, BIGNUM *a, BN_MONT_CTX *mont, | |||
| 144 | n0=mont->n0; | 141 | n0=mont->n0; |
| 145 | 142 | ||
| 146 | #ifdef BN_COUNT | 143 | #ifdef BN_COUNT |
| 147 | printf("word BN_from_montgomery %d * %d\n",nl,nl); | 144 | fprintf(stderr,"word BN_from_montgomery %d * %d\n",nl,nl); |
| 148 | #endif | 145 | #endif |
| 149 | for (i=0; i<nl; i++) | 146 | for (i=0; i<nl; i++) |
| 150 | { | 147 | { |
| @@ -229,7 +226,7 @@ int BN_from_montgomery(BIGNUM *ret, BIGNUM *a, BN_MONT_CTX *mont, | |||
| 229 | 226 | ||
| 230 | if (BN_ucmp(ret, &(mont->N)) >= 0) | 227 | if (BN_ucmp(ret, &(mont->N)) >= 0) |
| 231 | { | 228 | { |
| 232 | BN_usub(ret,ret,&(mont->N)); | 229 | if (!BN_usub(ret,ret,&(mont->N))) goto err; |
| 233 | } | 230 | } |
| 234 | retn=1; | 231 | retn=1; |
| 235 | err: | 232 | err: |
| @@ -277,6 +274,7 @@ int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) | |||
| 277 | BN_init(&Ri); | 274 | BN_init(&Ri); |
| 278 | R= &(mont->RR); /* grab RR as a temp */ | 275 | R= &(mont->RR); /* grab RR as a temp */ |
| 279 | BN_copy(&(mont->N),mod); /* Set N */ | 276 | BN_copy(&(mont->N),mod); /* Set N */ |
| 277 | mont->N.neg = 0; | ||
| 280 | 278 | ||
| 281 | #ifdef MONT_WORD | 279 | #ifdef MONT_WORD |
| 282 | { | 280 | { |
| @@ -292,40 +290,45 @@ int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) | |||
| 292 | tmod.d=buf; | 290 | tmod.d=buf; |
| 293 | tmod.top=1; | 291 | tmod.top=1; |
| 294 | tmod.dmax=2; | 292 | tmod.dmax=2; |
| 295 | tmod.neg=mod->neg; | 293 | tmod.neg=0; |
| 296 | /* Ri = R^-1 mod N*/ | 294 | /* Ri = R^-1 mod N*/ |
| 297 | if ((BN_mod_inverse(&Ri,R,&tmod,ctx)) == NULL) | 295 | if ((BN_mod_inverse(&Ri,R,&tmod,ctx)) == NULL) |
| 298 | goto err; | 296 | goto err; |
| 299 | BN_lshift(&Ri,&Ri,BN_BITS2); /* R*Ri */ | 297 | if (!BN_lshift(&Ri,&Ri,BN_BITS2)) goto err; /* R*Ri */ |
| 300 | if (!BN_is_zero(&Ri)) | 298 | if (!BN_is_zero(&Ri)) |
| 301 | BN_sub_word(&Ri,1); | 299 | { |
| 300 | if (!BN_sub_word(&Ri,1)) goto err; | ||
| 301 | } | ||
| 302 | else /* if N mod word size == 1 */ | 302 | else /* if N mod word size == 1 */ |
| 303 | BN_set_word(&Ri,BN_MASK2); /* Ri-- (mod word size) */ | 303 | { |
| 304 | BN_div(&Ri,NULL,&Ri,&tmod,ctx); /* Ni = (R*Ri-1)/N, | 304 | if (!BN_set_word(&Ri,BN_MASK2)) goto err; /* Ri-- (mod word size) */ |
| 305 | * keep only least significant word: */ | 305 | } |
| 306 | mont->n0=Ri.d[0]; | 306 | if (!BN_div(&Ri,NULL,&Ri,&tmod,ctx)) goto err; |
| 307 | /* Ni = (R*Ri-1)/N, | ||
| 308 | * keep only least significant word: */ | ||
| 309 | mont->n0 = (Ri.top > 0) ? Ri.d[0] : 0; | ||
| 307 | BN_free(&Ri); | 310 | BN_free(&Ri); |
| 308 | } | 311 | } |
| 309 | #else /* !MONT_WORD */ | 312 | #else /* !MONT_WORD */ |
| 310 | { /* bignum version */ | 313 | { /* bignum version */ |
| 311 | mont->ri=BN_num_bits(mod); | 314 | mont->ri=BN_num_bits(&mont->N); |
| 312 | BN_zero(R); | 315 | if (!BN_zero(R)) goto err; |
| 313 | BN_set_bit(R,mont->ri); /* R = 2^ri */ | 316 | if (!BN_set_bit(R,mont->ri)) goto err; /* R = 2^ri */ |
| 314 | /* Ri = R^-1 mod N*/ | 317 | /* Ri = R^-1 mod N*/ |
| 315 | if ((BN_mod_inverse(&Ri,R,mod,ctx)) == NULL) | 318 | if ((BN_mod_inverse(&Ri,R,&mont->N,ctx)) == NULL) |
| 316 | goto err; | 319 | goto err; |
| 317 | BN_lshift(&Ri,&Ri,mont->ri); /* R*Ri */ | 320 | if (!BN_lshift(&Ri,&Ri,mont->ri)) goto err; /* R*Ri */ |
| 318 | BN_sub_word(&Ri,1); | 321 | if (!BN_sub_word(&Ri,1)) goto err; |
| 319 | /* Ni = (R*Ri-1) / N */ | 322 | /* Ni = (R*Ri-1) / N */ |
| 320 | BN_div(&(mont->Ni),NULL,&Ri,mod,ctx); | 323 | if (!BN_div(&(mont->Ni),NULL,&Ri,&mont->N,ctx)) goto err; |
| 321 | BN_free(&Ri); | 324 | BN_free(&Ri); |
| 322 | } | 325 | } |
| 323 | #endif | 326 | #endif |
| 324 | 327 | ||
| 325 | /* setup RR for conversions */ | 328 | /* setup RR for conversions */ |
| 326 | BN_zero(&(mont->RR)); | 329 | if (!BN_zero(&(mont->RR))) goto err; |
| 327 | BN_set_bit(&(mont->RR),mont->ri*2); | 330 | if (!BN_set_bit(&(mont->RR),mont->ri*2)) goto err; |
| 328 | BN_mod(&(mont->RR),&(mont->RR),&(mont->N),ctx); | 331 | if (!BN_mod(&(mont->RR),&(mont->RR),&(mont->N),ctx)) goto err; |
| 329 | 332 | ||
| 330 | return(1); | 333 | return(1); |
| 331 | err: | 334 | err: |
| @@ -336,9 +339,9 @@ BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, BN_MONT_CTX *from) | |||
| 336 | { | 339 | { |
| 337 | if (to == from) return(to); | 340 | if (to == from) return(to); |
| 338 | 341 | ||
| 339 | BN_copy(&(to->RR),&(from->RR)); | 342 | if (!BN_copy(&(to->RR),&(from->RR))) return NULL; |
| 340 | BN_copy(&(to->N),&(from->N)); | 343 | if (!BN_copy(&(to->N),&(from->N))) return NULL; |
| 341 | BN_copy(&(to->Ni),&(from->Ni)); | 344 | if (!BN_copy(&(to->Ni),&(from->Ni))) return NULL; |
| 342 | to->ri=from->ri; | 345 | to->ri=from->ri; |
| 343 | to->n0=from->n0; | 346 | to->n0=from->n0; |
| 344 | return(to); | 347 | return(to); |
diff --git a/src/lib/libcrypto/bn/bn_mpi.c b/src/lib/libcrypto/bn/bn_mpi.c index 80e1dca6b7..05fa9d1e9a 100644 --- a/src/lib/libcrypto/bn/bn_mpi.c +++ b/src/lib/libcrypto/bn/bn_mpi.c | |||
| @@ -88,7 +88,7 @@ int BN_bn2mpi(const BIGNUM *a, unsigned char *d) | |||
| 88 | return(num+4+ext); | 88 | return(num+4+ext); |
| 89 | } | 89 | } |
| 90 | 90 | ||
| 91 | BIGNUM *BN_mpi2bn(unsigned char *d, int n, BIGNUM *a) | 91 | BIGNUM *BN_mpi2bn(const unsigned char *d, int n, BIGNUM *a) |
| 92 | { | 92 | { |
| 93 | long len; | 93 | long len; |
| 94 | int neg=0; | 94 | int neg=0; |
diff --git a/src/lib/libcrypto/bn/bn_mul.c b/src/lib/libcrypto/bn/bn_mul.c index 3e8d8b9567..41ea925b8d 100644 --- a/src/lib/libcrypto/bn/bn_mul.c +++ b/src/lib/libcrypto/bn/bn_mul.c | |||
| @@ -56,10 +56,325 @@ | |||
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | 58 | ||
| 59 | #ifndef BN_DEBUG | ||
| 60 | # undef NDEBUG /* avoid conflicting definitions */ | ||
| 61 | # define NDEBUG | ||
| 62 | #endif | ||
| 63 | |||
| 59 | #include <stdio.h> | 64 | #include <stdio.h> |
| 65 | #include <assert.h> | ||
| 60 | #include "cryptlib.h" | 66 | #include "cryptlib.h" |
| 61 | #include "bn_lcl.h" | 67 | #include "bn_lcl.h" |
| 62 | 68 | ||
| 69 | #if defined(OPENSSL_NO_ASM) || !(defined(__i386) || defined(__i386__))/* Assembler implementation exists only for x86 */ | ||
| 70 | /* Here follows specialised variants of bn_add_words() and | ||
| 71 | bn_sub_words(). They have the property performing operations on | ||
| 72 | arrays of different sizes. The sizes of those arrays is expressed through | ||
| 73 | cl, which is the common length ( basicall, min(len(a),len(b)) ), and dl, | ||
| 74 | which is the delta between the two lengths, calculated as len(a)-len(b). | ||
| 75 | All lengths are the number of BN_ULONGs... For the operations that require | ||
| 76 | a result array as parameter, it must have the length cl+abs(dl). | ||
| 77 | These functions should probably end up in bn_asm.c as soon as there are | ||
| 78 | assembler counterparts for the systems that use assembler files. */ | ||
| 79 | |||
| 80 | BN_ULONG bn_sub_part_words(BN_ULONG *r, | ||
| 81 | const BN_ULONG *a, const BN_ULONG *b, | ||
| 82 | int cl, int dl) | ||
| 83 | { | ||
| 84 | BN_ULONG c, t; | ||
| 85 | |||
| 86 | assert(cl >= 0); | ||
| 87 | c = bn_sub_words(r, a, b, cl); | ||
| 88 | |||
| 89 | if (dl == 0) | ||
| 90 | return c; | ||
| 91 | |||
| 92 | r += cl; | ||
| 93 | a += cl; | ||
| 94 | b += cl; | ||
| 95 | |||
| 96 | if (dl < 0) | ||
| 97 | { | ||
| 98 | #ifdef BN_COUNT | ||
| 99 | fprintf(stderr, " bn_sub_part_words %d + %d (dl < 0, c = %d)\n", cl, dl, c); | ||
| 100 | #endif | ||
| 101 | for (;;) | ||
| 102 | { | ||
| 103 | t = b[0]; | ||
| 104 | r[0] = (0-t-c)&BN_MASK2; | ||
| 105 | if (t != 0) c=1; | ||
| 106 | if (++dl >= 0) break; | ||
| 107 | |||
| 108 | t = b[1]; | ||
| 109 | r[1] = (0-t-c)&BN_MASK2; | ||
| 110 | if (t != 0) c=1; | ||
| 111 | if (++dl >= 0) break; | ||
| 112 | |||
| 113 | t = b[2]; | ||
| 114 | r[2] = (0-t-c)&BN_MASK2; | ||
| 115 | if (t != 0) c=1; | ||
| 116 | if (++dl >= 0) break; | ||
| 117 | |||
| 118 | t = b[3]; | ||
| 119 | r[3] = (0-t-c)&BN_MASK2; | ||
| 120 | if (t != 0) c=1; | ||
| 121 | if (++dl >= 0) break; | ||
| 122 | |||
| 123 | b += 4; | ||
| 124 | r += 4; | ||
| 125 | } | ||
| 126 | } | ||
| 127 | else | ||
| 128 | { | ||
| 129 | int save_dl = dl; | ||
| 130 | #ifdef BN_COUNT | ||
| 131 | fprintf(stderr, " bn_sub_part_words %d + %d (dl > 0, c = %d)\n", cl, dl, c); | ||
| 132 | #endif | ||
| 133 | while(c) | ||
| 134 | { | ||
| 135 | t = a[0]; | ||
| 136 | r[0] = (t-c)&BN_MASK2; | ||
| 137 | if (t != 0) c=0; | ||
| 138 | if (--dl <= 0) break; | ||
| 139 | |||
| 140 | t = a[1]; | ||
| 141 | r[1] = (t-c)&BN_MASK2; | ||
| 142 | if (t != 0) c=0; | ||
| 143 | if (--dl <= 0) break; | ||
| 144 | |||
| 145 | t = a[2]; | ||
| 146 | r[2] = (t-c)&BN_MASK2; | ||
| 147 | if (t != 0) c=0; | ||
| 148 | if (--dl <= 0) break; | ||
| 149 | |||
| 150 | t = a[3]; | ||
| 151 | r[3] = (t-c)&BN_MASK2; | ||
| 152 | if (t != 0) c=0; | ||
| 153 | if (--dl <= 0) break; | ||
| 154 | |||
| 155 | save_dl = dl; | ||
| 156 | a += 4; | ||
| 157 | r += 4; | ||
| 158 | } | ||
| 159 | if (dl > 0) | ||
| 160 | { | ||
| 161 | #ifdef BN_COUNT | ||
| 162 | fprintf(stderr, " bn_sub_part_words %d + %d (dl > 0, c == 0)\n", cl, dl); | ||
| 163 | #endif | ||
| 164 | if (save_dl > dl) | ||
| 165 | { | ||
| 166 | switch (save_dl - dl) | ||
| 167 | { | ||
| 168 | case 1: | ||
| 169 | r[1] = a[1]; | ||
| 170 | if (--dl <= 0) break; | ||
| 171 | case 2: | ||
| 172 | r[2] = a[2]; | ||
| 173 | if (--dl <= 0) break; | ||
| 174 | case 3: | ||
| 175 | r[3] = a[3]; | ||
| 176 | if (--dl <= 0) break; | ||
| 177 | } | ||
| 178 | a += 4; | ||
| 179 | r += 4; | ||
| 180 | } | ||
| 181 | } | ||
| 182 | if (dl > 0) | ||
| 183 | { | ||
| 184 | #ifdef BN_COUNT | ||
| 185 | fprintf(stderr, " bn_sub_part_words %d + %d (dl > 0, copy)\n", cl, dl); | ||
| 186 | #endif | ||
| 187 | for(;;) | ||
| 188 | { | ||
| 189 | r[0] = a[0]; | ||
| 190 | if (--dl <= 0) break; | ||
| 191 | r[1] = a[1]; | ||
| 192 | if (--dl <= 0) break; | ||
| 193 | r[2] = a[2]; | ||
| 194 | if (--dl <= 0) break; | ||
| 195 | r[3] = a[3]; | ||
| 196 | if (--dl <= 0) break; | ||
| 197 | |||
| 198 | a += 4; | ||
| 199 | r += 4; | ||
| 200 | } | ||
| 201 | } | ||
| 202 | } | ||
| 203 | return c; | ||
| 204 | } | ||
| 205 | #endif | ||
| 206 | |||
| 207 | BN_ULONG bn_add_part_words(BN_ULONG *r, | ||
| 208 | const BN_ULONG *a, const BN_ULONG *b, | ||
| 209 | int cl, int dl) | ||
| 210 | { | ||
| 211 | BN_ULONG c, l, t; | ||
| 212 | |||
| 213 | assert(cl >= 0); | ||
| 214 | c = bn_add_words(r, a, b, cl); | ||
| 215 | |||
| 216 | if (dl == 0) | ||
| 217 | return c; | ||
| 218 | |||
| 219 | r += cl; | ||
| 220 | a += cl; | ||
| 221 | b += cl; | ||
| 222 | |||
| 223 | if (dl < 0) | ||
| 224 | { | ||
| 225 | int save_dl = dl; | ||
| 226 | #ifdef BN_COUNT | ||
| 227 | fprintf(stderr, " bn_add_part_words %d + %d (dl < 0, c = %d)\n", cl, dl, c); | ||
| 228 | #endif | ||
| 229 | while (c) | ||
| 230 | { | ||
| 231 | l=(c+b[0])&BN_MASK2; | ||
| 232 | c=(l < c); | ||
| 233 | r[0]=l; | ||
| 234 | if (++dl >= 0) break; | ||
| 235 | |||
| 236 | l=(c+b[1])&BN_MASK2; | ||
| 237 | c=(l < c); | ||
| 238 | r[1]=l; | ||
| 239 | if (++dl >= 0) break; | ||
| 240 | |||
| 241 | l=(c+b[2])&BN_MASK2; | ||
| 242 | c=(l < c); | ||
| 243 | r[2]=l; | ||
| 244 | if (++dl >= 0) break; | ||
| 245 | |||
| 246 | l=(c+b[3])&BN_MASK2; | ||
| 247 | c=(l < c); | ||
| 248 | r[3]=l; | ||
| 249 | if (++dl >= 0) break; | ||
| 250 | |||
| 251 | save_dl = dl; | ||
| 252 | b+=4; | ||
| 253 | r+=4; | ||
| 254 | } | ||
| 255 | if (dl < 0) | ||
| 256 | { | ||
| 257 | #ifdef BN_COUNT | ||
| 258 | fprintf(stderr, " bn_add_part_words %d + %d (dl < 0, c == 0)\n", cl, dl); | ||
| 259 | #endif | ||
| 260 | if (save_dl < dl) | ||
| 261 | { | ||
| 262 | switch (dl - save_dl) | ||
| 263 | { | ||
| 264 | case 1: | ||
| 265 | r[1] = b[1]; | ||
| 266 | if (++dl >= 0) break; | ||
| 267 | case 2: | ||
| 268 | r[2] = b[2]; | ||
| 269 | if (++dl >= 0) break; | ||
| 270 | case 3: | ||
| 271 | r[3] = b[3]; | ||
| 272 | if (++dl >= 0) break; | ||
| 273 | } | ||
| 274 | b += 4; | ||
| 275 | r += 4; | ||
| 276 | } | ||
| 277 | } | ||
| 278 | if (dl < 0) | ||
| 279 | { | ||
| 280 | #ifdef BN_COUNT | ||
| 281 | fprintf(stderr, " bn_add_part_words %d + %d (dl < 0, copy)\n", cl, dl); | ||
| 282 | #endif | ||
| 283 | for(;;) | ||
| 284 | { | ||
| 285 | r[0] = b[0]; | ||
| 286 | if (++dl >= 0) break; | ||
| 287 | r[1] = b[1]; | ||
| 288 | if (++dl >= 0) break; | ||
| 289 | r[2] = b[2]; | ||
| 290 | if (++dl >= 0) break; | ||
| 291 | r[3] = b[3]; | ||
| 292 | if (++dl >= 0) break; | ||
| 293 | |||
| 294 | b += 4; | ||
| 295 | r += 4; | ||
| 296 | } | ||
| 297 | } | ||
| 298 | } | ||
| 299 | else | ||
| 300 | { | ||
| 301 | int save_dl = dl; | ||
| 302 | #ifdef BN_COUNT | ||
| 303 | fprintf(stderr, " bn_add_part_words %d + %d (dl > 0)\n", cl, dl); | ||
| 304 | #endif | ||
| 305 | while (c) | ||
| 306 | { | ||
| 307 | t=(a[0]+c)&BN_MASK2; | ||
| 308 | c=(t < c); | ||
| 309 | r[0]=t; | ||
| 310 | if (--dl <= 0) break; | ||
| 311 | |||
| 312 | t=(a[1]+c)&BN_MASK2; | ||
| 313 | c=(t < c); | ||
| 314 | r[1]=t; | ||
| 315 | if (--dl <= 0) break; | ||
| 316 | |||
| 317 | t=(a[2]+c)&BN_MASK2; | ||
| 318 | c=(t < c); | ||
| 319 | r[2]=t; | ||
| 320 | if (--dl <= 0) break; | ||
| 321 | |||
| 322 | t=(a[3]+c)&BN_MASK2; | ||
| 323 | c=(t < c); | ||
| 324 | r[3]=t; | ||
| 325 | if (--dl <= 0) break; | ||
| 326 | |||
| 327 | save_dl = dl; | ||
| 328 | a+=4; | ||
| 329 | r+=4; | ||
| 330 | } | ||
| 331 | #ifdef BN_COUNT | ||
| 332 | fprintf(stderr, " bn_add_part_words %d + %d (dl > 0, c == 0)\n", cl, dl); | ||
| 333 | #endif | ||
| 334 | if (dl > 0) | ||
| 335 | { | ||
| 336 | if (save_dl > dl) | ||
| 337 | { | ||
| 338 | switch (save_dl - dl) | ||
| 339 | { | ||
| 340 | case 1: | ||
| 341 | r[1] = a[1]; | ||
| 342 | if (--dl <= 0) break; | ||
| 343 | case 2: | ||
| 344 | r[2] = a[2]; | ||
| 345 | if (--dl <= 0) break; | ||
| 346 | case 3: | ||
| 347 | r[3] = a[3]; | ||
| 348 | if (--dl <= 0) break; | ||
| 349 | } | ||
| 350 | a += 4; | ||
| 351 | r += 4; | ||
| 352 | } | ||
| 353 | } | ||
| 354 | if (dl > 0) | ||
| 355 | { | ||
| 356 | #ifdef BN_COUNT | ||
| 357 | fprintf(stderr, " bn_add_part_words %d + %d (dl > 0, copy)\n", cl, dl); | ||
| 358 | #endif | ||
| 359 | for(;;) | ||
| 360 | { | ||
| 361 | r[0] = a[0]; | ||
| 362 | if (--dl <= 0) break; | ||
| 363 | r[1] = a[1]; | ||
| 364 | if (--dl <= 0) break; | ||
| 365 | r[2] = a[2]; | ||
| 366 | if (--dl <= 0) break; | ||
| 367 | r[3] = a[3]; | ||
| 368 | if (--dl <= 0) break; | ||
| 369 | |||
| 370 | a += 4; | ||
| 371 | r += 4; | ||
| 372 | } | ||
| 373 | } | ||
| 374 | } | ||
| 375 | return c; | ||
| 376 | } | ||
| 377 | |||
| 63 | #ifdef BN_RECURSION | 378 | #ifdef BN_RECURSION |
| 64 | /* Karatsuba recursive multiplication algorithm | 379 | /* Karatsuba recursive multiplication algorithm |
| 65 | * (cf. Knuth, The Art of Computer Programming, Vol. 2) */ | 380 | * (cf. Knuth, The Art of Computer Programming, Vol. 2) */ |
| @@ -75,14 +390,15 @@ | |||
| 75 | * a[1]*b[1] | 390 | * a[1]*b[1] |
| 76 | */ | 391 | */ |
| 77 | void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | 392 | void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, |
| 78 | BN_ULONG *t) | 393 | int dna, int dnb, BN_ULONG *t) |
| 79 | { | 394 | { |
| 80 | int n=n2/2,c1,c2; | 395 | int n=n2/2,c1,c2; |
| 396 | int tna=n+dna, tnb=n+dnb; | ||
| 81 | unsigned int neg,zero; | 397 | unsigned int neg,zero; |
| 82 | BN_ULONG ln,lo,*p; | 398 | BN_ULONG ln,lo,*p; |
| 83 | 399 | ||
| 84 | # ifdef BN_COUNT | 400 | # ifdef BN_COUNT |
| 85 | printf(" bn_mul_recursive %d * %d\n",n2,n2); | 401 | fprintf(stderr," bn_mul_recursive %d * %d\n",n2,n2); |
| 86 | # endif | 402 | # endif |
| 87 | # ifdef BN_MUL_COMBA | 403 | # ifdef BN_MUL_COMBA |
| 88 | # if 0 | 404 | # if 0 |
| @@ -105,21 +421,21 @@ void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 105 | return; | 421 | return; |
| 106 | } | 422 | } |
| 107 | /* r=(a[0]-a[1])*(b[1]-b[0]) */ | 423 | /* r=(a[0]-a[1])*(b[1]-b[0]) */ |
| 108 | c1=bn_cmp_words(a,&(a[n]),n); | 424 | c1=bn_cmp_part_words(a,&(a[n]),tna,n-tna); |
| 109 | c2=bn_cmp_words(&(b[n]),b,n); | 425 | c2=bn_cmp_part_words(&(b[n]),b,tnb,tnb-n); |
| 110 | zero=neg=0; | 426 | zero=neg=0; |
| 111 | switch (c1*3+c2) | 427 | switch (c1*3+c2) |
| 112 | { | 428 | { |
| 113 | case -4: | 429 | case -4: |
| 114 | bn_sub_words(t, &(a[n]),a, n); /* - */ | 430 | bn_sub_part_words(t, &(a[n]),a, tna,tna-n); /* - */ |
| 115 | bn_sub_words(&(t[n]),b, &(b[n]),n); /* - */ | 431 | bn_sub_part_words(&(t[n]),b, &(b[n]),tnb,n-tnb); /* - */ |
| 116 | break; | 432 | break; |
| 117 | case -3: | 433 | case -3: |
| 118 | zero=1; | 434 | zero=1; |
| 119 | break; | 435 | break; |
| 120 | case -2: | 436 | case -2: |
| 121 | bn_sub_words(t, &(a[n]),a, n); /* - */ | 437 | bn_sub_part_words(t, &(a[n]),a, tna,tna-n); /* - */ |
| 122 | bn_sub_words(&(t[n]),&(b[n]),b, n); /* + */ | 438 | bn_sub_part_words(&(t[n]),&(b[n]),b, tnb,tnb-n); /* + */ |
| 123 | neg=1; | 439 | neg=1; |
| 124 | break; | 440 | break; |
| 125 | case -1: | 441 | case -1: |
| @@ -128,21 +444,22 @@ void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 128 | zero=1; | 444 | zero=1; |
| 129 | break; | 445 | break; |
| 130 | case 2: | 446 | case 2: |
| 131 | bn_sub_words(t, a, &(a[n]),n); /* + */ | 447 | bn_sub_part_words(t, a, &(a[n]),tna,n-tna); /* + */ |
| 132 | bn_sub_words(&(t[n]),b, &(b[n]),n); /* - */ | 448 | bn_sub_part_words(&(t[n]),b, &(b[n]),tnb,n-tnb); /* - */ |
| 133 | neg=1; | 449 | neg=1; |
| 134 | break; | 450 | break; |
| 135 | case 3: | 451 | case 3: |
| 136 | zero=1; | 452 | zero=1; |
| 137 | break; | 453 | break; |
| 138 | case 4: | 454 | case 4: |
| 139 | bn_sub_words(t, a, &(a[n]),n); | 455 | bn_sub_part_words(t, a, &(a[n]),tna,n-tna); |
| 140 | bn_sub_words(&(t[n]),&(b[n]),b, n); | 456 | bn_sub_part_words(&(t[n]),&(b[n]),b, tnb,tnb-n); |
| 141 | break; | 457 | break; |
| 142 | } | 458 | } |
| 143 | 459 | ||
| 144 | # ifdef BN_MUL_COMBA | 460 | # ifdef BN_MUL_COMBA |
| 145 | if (n == 4) | 461 | if (n == 4 && dna == 0 && dnb == 0) /* XXX: bn_mul_comba4 could take |
| 462 | extra args to do this well */ | ||
| 146 | { | 463 | { |
| 147 | if (!zero) | 464 | if (!zero) |
| 148 | bn_mul_comba4(&(t[n2]),t,&(t[n])); | 465 | bn_mul_comba4(&(t[n2]),t,&(t[n])); |
| @@ -152,7 +469,9 @@ void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 152 | bn_mul_comba4(r,a,b); | 469 | bn_mul_comba4(r,a,b); |
| 153 | bn_mul_comba4(&(r[n2]),&(a[n]),&(b[n])); | 470 | bn_mul_comba4(&(r[n2]),&(a[n]),&(b[n])); |
| 154 | } | 471 | } |
| 155 | else if (n == 8) | 472 | else if (n == 8 && dna == 0 && dnb == 0) /* XXX: bn_mul_comba8 could |
| 473 | take extra args to do this | ||
| 474 | well */ | ||
| 156 | { | 475 | { |
| 157 | if (!zero) | 476 | if (!zero) |
| 158 | bn_mul_comba8(&(t[n2]),t,&(t[n])); | 477 | bn_mul_comba8(&(t[n2]),t,&(t[n])); |
| @@ -167,11 +486,11 @@ void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 167 | { | 486 | { |
| 168 | p= &(t[n2*2]); | 487 | p= &(t[n2*2]); |
| 169 | if (!zero) | 488 | if (!zero) |
| 170 | bn_mul_recursive(&(t[n2]),t,&(t[n]),n,p); | 489 | bn_mul_recursive(&(t[n2]),t,&(t[n]),n,0,0,p); |
| 171 | else | 490 | else |
| 172 | memset(&(t[n2]),0,n2*sizeof(BN_ULONG)); | 491 | memset(&(t[n2]),0,n2*sizeof(BN_ULONG)); |
| 173 | bn_mul_recursive(r,a,b,n,p); | 492 | bn_mul_recursive(r,a,b,n,0,0,p); |
| 174 | bn_mul_recursive(&(r[n2]),&(a[n]),&(b[n]),n,p); | 493 | bn_mul_recursive(&(r[n2]),&(a[n]),&(b[n]),n,dna,dnb,p); |
| 175 | } | 494 | } |
| 176 | 495 | ||
| 177 | /* t[32] holds (a[0]-a[1])*(b[1]-b[0]), c1 is the sign | 496 | /* t[32] holds (a[0]-a[1])*(b[1]-b[0]), c1 is the sign |
| @@ -220,39 +539,39 @@ void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 220 | 539 | ||
| 221 | /* n+tn is the word length | 540 | /* n+tn is the word length |
| 222 | * t needs to be n*4 is size, as does r */ | 541 | * t needs to be n*4 is size, as does r */ |
| 223 | void bn_mul_part_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int tn, | 542 | void bn_mul_part_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n, |
| 224 | int n, BN_ULONG *t) | 543 | int tna, int tnb, BN_ULONG *t) |
| 225 | { | 544 | { |
| 226 | int i,j,n2=n*2; | 545 | int i,j,n2=n*2; |
| 227 | unsigned int c1,c2,neg,zero; | 546 | unsigned int c1,c2,neg,zero; |
| 228 | BN_ULONG ln,lo,*p; | 547 | BN_ULONG ln,lo,*p; |
| 229 | 548 | ||
| 230 | # ifdef BN_COUNT | 549 | # ifdef BN_COUNT |
| 231 | printf(" bn_mul_part_recursive %d * %d\n",tn+n,tn+n); | 550 | fprintf(stderr," bn_mul_part_recursive (%d+%d) * (%d+%d)\n", |
| 551 | tna, n, tnb, n); | ||
| 232 | # endif | 552 | # endif |
| 233 | if (n < 8) | 553 | if (n < 8) |
| 234 | { | 554 | { |
| 235 | i=tn+n; | 555 | bn_mul_normal(r,a,n+tna,b,n+tnb); |
| 236 | bn_mul_normal(r,a,i,b,i); | ||
| 237 | return; | 556 | return; |
| 238 | } | 557 | } |
| 239 | 558 | ||
| 240 | /* r=(a[0]-a[1])*(b[1]-b[0]) */ | 559 | /* r=(a[0]-a[1])*(b[1]-b[0]) */ |
| 241 | c1=bn_cmp_words(a,&(a[n]),n); | 560 | c1=bn_cmp_part_words(a,&(a[n]),tna,n-tna); |
| 242 | c2=bn_cmp_words(&(b[n]),b,n); | 561 | c2=bn_cmp_part_words(&(b[n]),b,tnb,tnb-n); |
| 243 | zero=neg=0; | 562 | zero=neg=0; |
| 244 | switch (c1*3+c2) | 563 | switch (c1*3+c2) |
| 245 | { | 564 | { |
| 246 | case -4: | 565 | case -4: |
| 247 | bn_sub_words(t, &(a[n]),a, n); /* - */ | 566 | bn_sub_part_words(t, &(a[n]),a, tna,tna-n); /* - */ |
| 248 | bn_sub_words(&(t[n]),b, &(b[n]),n); /* - */ | 567 | bn_sub_part_words(&(t[n]),b, &(b[n]),tnb,n-tnb); /* - */ |
| 249 | break; | 568 | break; |
| 250 | case -3: | 569 | case -3: |
| 251 | zero=1; | 570 | zero=1; |
| 252 | /* break; */ | 571 | /* break; */ |
| 253 | case -2: | 572 | case -2: |
| 254 | bn_sub_words(t, &(a[n]),a, n); /* - */ | 573 | bn_sub_part_words(t, &(a[n]),a, tna,tna-n); /* - */ |
| 255 | bn_sub_words(&(t[n]),&(b[n]),b, n); /* + */ | 574 | bn_sub_part_words(&(t[n]),&(b[n]),b, tnb,tnb-n); /* + */ |
| 256 | neg=1; | 575 | neg=1; |
| 257 | break; | 576 | break; |
| 258 | case -1: | 577 | case -1: |
| @@ -261,16 +580,16 @@ void bn_mul_part_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int tn, | |||
| 261 | zero=1; | 580 | zero=1; |
| 262 | /* break; */ | 581 | /* break; */ |
| 263 | case 2: | 582 | case 2: |
| 264 | bn_sub_words(t, a, &(a[n]),n); /* + */ | 583 | bn_sub_part_words(t, a, &(a[n]),tna,n-tna); /* + */ |
| 265 | bn_sub_words(&(t[n]),b, &(b[n]),n); /* - */ | 584 | bn_sub_part_words(&(t[n]),b, &(b[n]),tnb,n-tnb); /* - */ |
| 266 | neg=1; | 585 | neg=1; |
| 267 | break; | 586 | break; |
| 268 | case 3: | 587 | case 3: |
| 269 | zero=1; | 588 | zero=1; |
| 270 | /* break; */ | 589 | /* break; */ |
| 271 | case 4: | 590 | case 4: |
| 272 | bn_sub_words(t, a, &(a[n]),n); | 591 | bn_sub_part_words(t, a, &(a[n]),tna,n-tna); |
| 273 | bn_sub_words(&(t[n]),&(b[n]),b, n); | 592 | bn_sub_part_words(&(t[n]),&(b[n]),b, tnb,tnb-n); |
| 274 | break; | 593 | break; |
| 275 | } | 594 | } |
| 276 | /* The zero case isn't yet implemented here. The speedup | 595 | /* The zero case isn't yet implemented here. The speedup |
| @@ -289,54 +608,59 @@ void bn_mul_part_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int tn, | |||
| 289 | { | 608 | { |
| 290 | bn_mul_comba8(&(t[n2]),t,&(t[n])); | 609 | bn_mul_comba8(&(t[n2]),t,&(t[n])); |
| 291 | bn_mul_comba8(r,a,b); | 610 | bn_mul_comba8(r,a,b); |
| 292 | bn_mul_normal(&(r[n2]),&(a[n]),tn,&(b[n]),tn); | 611 | bn_mul_normal(&(r[n2]),&(a[n]),tna,&(b[n]),tnb); |
| 293 | memset(&(r[n2+tn*2]),0,sizeof(BN_ULONG)*(n2-tn*2)); | 612 | memset(&(r[n2+tna+tnb]),0,sizeof(BN_ULONG)*(n2-tna-tnb)); |
| 294 | } | 613 | } |
| 295 | else | 614 | else |
| 296 | { | 615 | { |
| 297 | p= &(t[n2*2]); | 616 | p= &(t[n2*2]); |
| 298 | bn_mul_recursive(&(t[n2]),t,&(t[n]),n,p); | 617 | bn_mul_recursive(&(t[n2]),t,&(t[n]),n,0,0,p); |
| 299 | bn_mul_recursive(r,a,b,n,p); | 618 | bn_mul_recursive(r,a,b,n,0,0,p); |
| 300 | i=n/2; | 619 | i=n/2; |
| 301 | /* If there is only a bottom half to the number, | 620 | /* If there is only a bottom half to the number, |
| 302 | * just do it */ | 621 | * just do it */ |
| 303 | j=tn-i; | 622 | if (tna > tnb) |
| 623 | j = tna - i; | ||
| 624 | else | ||
| 625 | j = tnb - i; | ||
| 304 | if (j == 0) | 626 | if (j == 0) |
| 305 | { | 627 | { |
| 306 | bn_mul_recursive(&(r[n2]),&(a[n]),&(b[n]),i,p); | 628 | bn_mul_recursive(&(r[n2]),&(a[n]),&(b[n]), |
| 629 | i,tna-i,tnb-i,p); | ||
| 307 | memset(&(r[n2+i*2]),0,sizeof(BN_ULONG)*(n2-i*2)); | 630 | memset(&(r[n2+i*2]),0,sizeof(BN_ULONG)*(n2-i*2)); |
| 308 | } | 631 | } |
| 309 | else if (j > 0) /* eg, n == 16, i == 8 and tn == 11 */ | 632 | else if (j > 0) /* eg, n == 16, i == 8 and tn == 11 */ |
| 310 | { | 633 | { |
| 311 | bn_mul_part_recursive(&(r[n2]),&(a[n]),&(b[n]), | 634 | bn_mul_part_recursive(&(r[n2]),&(a[n]),&(b[n]), |
| 312 | j,i,p); | 635 | i,tna-i,tnb-i,p); |
| 313 | memset(&(r[n2+tn*2]),0, | 636 | memset(&(r[n2+tna+tnb]),0, |
| 314 | sizeof(BN_ULONG)*(n2-tn*2)); | 637 | sizeof(BN_ULONG)*(n2-tna-tnb)); |
| 315 | } | 638 | } |
| 316 | else /* (j < 0) eg, n == 16, i == 8 and tn == 5 */ | 639 | else /* (j < 0) eg, n == 16, i == 8 and tn == 5 */ |
| 317 | { | 640 | { |
| 318 | memset(&(r[n2]),0,sizeof(BN_ULONG)*n2); | 641 | memset(&(r[n2]),0,sizeof(BN_ULONG)*n2); |
| 319 | if (tn < BN_MUL_RECURSIVE_SIZE_NORMAL) | 642 | if (tna < BN_MUL_RECURSIVE_SIZE_NORMAL |
| 643 | && tnb < BN_MUL_RECURSIVE_SIZE_NORMAL) | ||
| 320 | { | 644 | { |
| 321 | bn_mul_normal(&(r[n2]),&(a[n]),tn,&(b[n]),tn); | 645 | bn_mul_normal(&(r[n2]),&(a[n]),tna,&(b[n]),tnb); |
| 322 | } | 646 | } |
| 323 | else | 647 | else |
| 324 | { | 648 | { |
| 325 | for (;;) | 649 | for (;;) |
| 326 | { | 650 | { |
| 327 | i/=2; | 651 | i/=2; |
| 328 | if (i < tn) | 652 | if (i < tna && i < tnb) |
| 329 | { | 653 | { |
| 330 | bn_mul_part_recursive(&(r[n2]), | 654 | bn_mul_part_recursive(&(r[n2]), |
| 331 | &(a[n]),&(b[n]), | 655 | &(a[n]),&(b[n]), |
| 332 | tn-i,i,p); | 656 | i,tna-i,tnb-i,p); |
| 333 | break; | 657 | break; |
| 334 | } | 658 | } |
| 335 | else if (i == tn) | 659 | else if (i <= tna && i <= tnb) |
| 336 | { | 660 | { |
| 337 | bn_mul_recursive(&(r[n2]), | 661 | bn_mul_recursive(&(r[n2]), |
| 338 | &(a[n]),&(b[n]), | 662 | &(a[n]),&(b[n]), |
| 339 | i,p); | 663 | i,tna-i,tnb-i,p); |
| 340 | break; | 664 | break; |
| 341 | } | 665 | } |
| 342 | } | 666 | } |
| @@ -397,10 +721,10 @@ void bn_mul_low_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, | |||
| 397 | int n=n2/2; | 721 | int n=n2/2; |
| 398 | 722 | ||
| 399 | # ifdef BN_COUNT | 723 | # ifdef BN_COUNT |
| 400 | printf(" bn_mul_low_recursive %d * %d\n",n2,n2); | 724 | fprintf(stderr," bn_mul_low_recursive %d * %d\n",n2,n2); |
| 401 | # endif | 725 | # endif |
| 402 | 726 | ||
| 403 | bn_mul_recursive(r,a,b,n,&(t[0])); | 727 | bn_mul_recursive(r,a,b,n,0,0,&(t[0])); |
| 404 | if (n >= BN_MUL_LOW_RECURSIVE_SIZE_NORMAL) | 728 | if (n >= BN_MUL_LOW_RECURSIVE_SIZE_NORMAL) |
| 405 | { | 729 | { |
| 406 | bn_mul_low_recursive(&(t[0]),&(a[0]),&(b[n]),n,&(t[n2])); | 730 | bn_mul_low_recursive(&(t[0]),&(a[0]),&(b[n]),n,&(t[n2])); |
| @@ -431,7 +755,7 @@ void bn_mul_high(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, BN_ULONG *l, int n2, | |||
| 431 | BN_ULONG ll,lc,*lp,*mp; | 755 | BN_ULONG ll,lc,*lp,*mp; |
| 432 | 756 | ||
| 433 | # ifdef BN_COUNT | 757 | # ifdef BN_COUNT |
| 434 | printf(" bn_mul_high %d * %d\n",n2,n2); | 758 | fprintf(stderr," bn_mul_high %d * %d\n",n2,n2); |
| 435 | # endif | 759 | # endif |
| 436 | n=n2/2; | 760 | n=n2/2; |
| 437 | 761 | ||
| @@ -484,8 +808,8 @@ void bn_mul_high(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, BN_ULONG *l, int n2, | |||
| 484 | else | 808 | else |
| 485 | # endif | 809 | # endif |
| 486 | { | 810 | { |
| 487 | bn_mul_recursive(&(t[0]),&(r[0]),&(r[n]),n,&(t[n2])); | 811 | bn_mul_recursive(&(t[0]),&(r[0]),&(r[n]),n,0,0,&(t[n2])); |
| 488 | bn_mul_recursive(r,&(a[n]),&(b[n]),n,&(t[n2])); | 812 | bn_mul_recursive(r,&(a[n]),&(b[n]),n,0,0,&(t[n2])); |
| 489 | } | 813 | } |
| 490 | 814 | ||
| 491 | /* s0 == low(al*bl) | 815 | /* s0 == low(al*bl) |
| @@ -608,21 +932,21 @@ void bn_mul_high(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, BN_ULONG *l, int n2, | |||
| 608 | } | 932 | } |
| 609 | #endif /* BN_RECURSION */ | 933 | #endif /* BN_RECURSION */ |
| 610 | 934 | ||
| 611 | int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | 935 | int BN_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
| 612 | { | 936 | { |
| 937 | int ret=0; | ||
| 613 | int top,al,bl; | 938 | int top,al,bl; |
| 614 | BIGNUM *rr; | 939 | BIGNUM *rr; |
| 615 | int ret = 0; | ||
| 616 | #if defined(BN_MUL_COMBA) || defined(BN_RECURSION) | 940 | #if defined(BN_MUL_COMBA) || defined(BN_RECURSION) |
| 617 | int i; | 941 | int i; |
| 618 | #endif | 942 | #endif |
| 619 | #ifdef BN_RECURSION | 943 | #ifdef BN_RECURSION |
| 620 | BIGNUM *t; | 944 | BIGNUM *t=NULL; |
| 621 | int j,k; | 945 | int j=0,k; |
| 622 | #endif | 946 | #endif |
| 623 | 947 | ||
| 624 | #ifdef BN_COUNT | 948 | #ifdef BN_COUNT |
| 625 | printf("BN_mul %d * %d\n",a->top,b->top); | 949 | fprintf(stderr,"BN_mul %d * %d\n",a->top,b->top); |
| 626 | #endif | 950 | #endif |
| 627 | 951 | ||
| 628 | bn_check_top(a); | 952 | bn_check_top(a); |
| @@ -675,17 +999,55 @@ int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | |||
| 675 | #ifdef BN_RECURSION | 999 | #ifdef BN_RECURSION |
| 676 | if ((al >= BN_MULL_SIZE_NORMAL) && (bl >= BN_MULL_SIZE_NORMAL)) | 1000 | if ((al >= BN_MULL_SIZE_NORMAL) && (bl >= BN_MULL_SIZE_NORMAL)) |
| 677 | { | 1001 | { |
| 1002 | if (i >= -1 && i <= 1) | ||
| 1003 | { | ||
| 1004 | int sav_j =0; | ||
| 1005 | /* Find out the power of two lower or equal | ||
| 1006 | to the longest of the two numbers */ | ||
| 1007 | if (i >= 0) | ||
| 1008 | { | ||
| 1009 | j = BN_num_bits_word((BN_ULONG)al); | ||
| 1010 | } | ||
| 1011 | if (i == -1) | ||
| 1012 | { | ||
| 1013 | j = BN_num_bits_word((BN_ULONG)bl); | ||
| 1014 | } | ||
| 1015 | sav_j = j; | ||
| 1016 | j = 1<<(j-1); | ||
| 1017 | assert(j <= al || j <= bl); | ||
| 1018 | k = j+j; | ||
| 1019 | t = BN_CTX_get(ctx); | ||
| 1020 | if (al > j || bl > j) | ||
| 1021 | { | ||
| 1022 | bn_wexpand(t,k*4); | ||
| 1023 | bn_wexpand(rr,k*4); | ||
| 1024 | bn_mul_part_recursive(rr->d,a->d,b->d, | ||
| 1025 | j,al-j,bl-j,t->d); | ||
| 1026 | } | ||
| 1027 | else /* al <= j || bl <= j */ | ||
| 1028 | { | ||
| 1029 | bn_wexpand(t,k*2); | ||
| 1030 | bn_wexpand(rr,k*2); | ||
| 1031 | bn_mul_recursive(rr->d,a->d,b->d, | ||
| 1032 | j,al-j,bl-j,t->d); | ||
| 1033 | } | ||
| 1034 | rr->top=top; | ||
| 1035 | goto end; | ||
| 1036 | } | ||
| 1037 | #if 0 | ||
| 678 | if (i == 1 && !BN_get_flags(b,BN_FLG_STATIC_DATA)) | 1038 | if (i == 1 && !BN_get_flags(b,BN_FLG_STATIC_DATA)) |
| 679 | { | 1039 | { |
| 680 | bn_wexpand(b,al); | 1040 | BIGNUM *tmp_bn = (BIGNUM *)b; |
| 681 | b->d[bl]=0; | 1041 | bn_wexpand(tmp_bn,al); |
| 1042 | tmp_bn->d[bl]=0; | ||
| 682 | bl++; | 1043 | bl++; |
| 683 | i--; | 1044 | i--; |
| 684 | } | 1045 | } |
| 685 | else if (i == -1 && !BN_get_flags(a,BN_FLG_STATIC_DATA)) | 1046 | else if (i == -1 && !BN_get_flags(a,BN_FLG_STATIC_DATA)) |
| 686 | { | 1047 | { |
| 687 | bn_wexpand(a,bl); | 1048 | BIGNUM *tmp_bn = (BIGNUM *)a; |
| 688 | a->d[al]=0; | 1049 | bn_wexpand(tmp_bn,bl); |
| 1050 | tmp_bn->d[al]=0; | ||
| 689 | al++; | 1051 | al++; |
| 690 | i++; | 1052 | i++; |
| 691 | } | 1053 | } |
| @@ -705,19 +1067,14 @@ int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | |||
| 705 | } | 1067 | } |
| 706 | else | 1068 | else |
| 707 | { | 1069 | { |
| 708 | bn_wexpand(a,k); | ||
| 709 | bn_wexpand(b,k); | ||
| 710 | bn_wexpand(t,k*4); | 1070 | bn_wexpand(t,k*4); |
| 711 | bn_wexpand(rr,k*4); | 1071 | bn_wexpand(rr,k*4); |
| 712 | for (i=a->top; i<k; i++) | ||
| 713 | a->d[i]=0; | ||
| 714 | for (i=b->top; i<k; i++) | ||
| 715 | b->d[i]=0; | ||
| 716 | bn_mul_part_recursive(rr->d,a->d,b->d,al-j,j,t->d); | 1072 | bn_mul_part_recursive(rr->d,a->d,b->d,al-j,j,t->d); |
| 717 | } | 1073 | } |
| 718 | rr->top=top; | 1074 | rr->top=top; |
| 719 | goto end; | 1075 | goto end; |
| 720 | } | 1076 | } |
| 1077 | #endif | ||
| 721 | } | 1078 | } |
| 722 | #endif /* BN_RECURSION */ | 1079 | #endif /* BN_RECURSION */ |
| 723 | if (bn_wexpand(rr,top) == NULL) goto err; | 1080 | if (bn_wexpand(rr,top) == NULL) goto err; |
| @@ -740,7 +1097,7 @@ void bn_mul_normal(BN_ULONG *r, BN_ULONG *a, int na, BN_ULONG *b, int nb) | |||
| 740 | BN_ULONG *rr; | 1097 | BN_ULONG *rr; |
| 741 | 1098 | ||
| 742 | #ifdef BN_COUNT | 1099 | #ifdef BN_COUNT |
| 743 | printf(" bn_mul_normal %d * %d\n",na,nb); | 1100 | fprintf(stderr," bn_mul_normal %d * %d\n",na,nb); |
| 744 | #endif | 1101 | #endif |
| 745 | 1102 | ||
| 746 | if (na < nb) | 1103 | if (na < nb) |
| @@ -753,7 +1110,13 @@ void bn_mul_normal(BN_ULONG *r, BN_ULONG *a, int na, BN_ULONG *b, int nb) | |||
| 753 | 1110 | ||
| 754 | } | 1111 | } |
| 755 | rr= &(r[na]); | 1112 | rr= &(r[na]); |
| 756 | rr[0]=bn_mul_words(r,a,na,b[0]); | 1113 | if (nb <= 0) |
| 1114 | { | ||
| 1115 | (void)bn_mul_words(r,a,na,0); | ||
| 1116 | return; | ||
| 1117 | } | ||
| 1118 | else | ||
| 1119 | rr[0]=bn_mul_words(r,a,na,b[0]); | ||
| 757 | 1120 | ||
| 758 | for (;;) | 1121 | for (;;) |
| 759 | { | 1122 | { |
| @@ -774,7 +1137,7 @@ void bn_mul_normal(BN_ULONG *r, BN_ULONG *a, int na, BN_ULONG *b, int nb) | |||
| 774 | void bn_mul_low_normal(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) | 1137 | void bn_mul_low_normal(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n) |
| 775 | { | 1138 | { |
| 776 | #ifdef BN_COUNT | 1139 | #ifdef BN_COUNT |
| 777 | printf(" bn_mul_low_normal %d * %d\n",n,n); | 1140 | fprintf(stderr," bn_mul_low_normal %d * %d\n",n,n); |
| 778 | #endif | 1141 | #endif |
| 779 | bn_mul_words(r,a,n,b[0]); | 1142 | bn_mul_words(r,a,n,b[0]); |
| 780 | 1143 | ||
diff --git a/src/lib/libcrypto/bn/bn_prime.c b/src/lib/libcrypto/bn/bn_prime.c index a5f01b92eb..918b9237c6 100644 --- a/src/lib/libcrypto/bn/bn_prime.c +++ b/src/lib/libcrypto/bn/bn_prime.c | |||
| @@ -56,7 +56,7 @@ | |||
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | /* ==================================================================== | 58 | /* ==================================================================== |
| 59 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | 59 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. |
| 60 | * | 60 | * |
| 61 | * Redistribution and use in source and binary forms, with or without | 61 | * Redistribution and use in source and binary forms, with or without |
| 62 | * modification, are permitted provided that the following conditions | 62 | * modification, are permitted provided that the following conditions |
| @@ -125,12 +125,13 @@ static int witness(BIGNUM *w, const BIGNUM *a, const BIGNUM *a1, | |||
| 125 | const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont); | 125 | const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont); |
| 126 | static int probable_prime(BIGNUM *rnd, int bits); | 126 | static int probable_prime(BIGNUM *rnd, int bits); |
| 127 | static int probable_prime_dh(BIGNUM *rnd, int bits, | 127 | static int probable_prime_dh(BIGNUM *rnd, int bits, |
| 128 | BIGNUM *add, BIGNUM *rem, BN_CTX *ctx); | 128 | const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx); |
| 129 | static int probable_prime_dh_safe(BIGNUM *rnd, int bits, | 129 | static int probable_prime_dh_safe(BIGNUM *rnd, int bits, |
| 130 | BIGNUM *add, BIGNUM *rem, BN_CTX *ctx); | 130 | const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx); |
| 131 | 131 | ||
| 132 | BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, BIGNUM *add, | 132 | BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, |
| 133 | BIGNUM *rem, void (*callback)(int,int,void *), void *cb_arg) | 133 | const BIGNUM *add, const BIGNUM *rem, |
| 134 | void (*callback)(int,int,void *), void *cb_arg) | ||
| 134 | { | 135 | { |
| 135 | BIGNUM *rnd=NULL; | 136 | BIGNUM *rnd=NULL; |
| 136 | BIGNUM t; | 137 | BIGNUM t; |
| @@ -225,12 +226,15 @@ int BN_is_prime_fasttest(const BIGNUM *a, int checks, | |||
| 225 | BN_MONT_CTX *mont = NULL; | 226 | BN_MONT_CTX *mont = NULL; |
| 226 | const BIGNUM *A = NULL; | 227 | const BIGNUM *A = NULL; |
| 227 | 228 | ||
| 229 | if (BN_cmp(a, BN_value_one()) <= 0) | ||
| 230 | return 0; | ||
| 231 | |||
| 228 | if (checks == BN_prime_checks) | 232 | if (checks == BN_prime_checks) |
| 229 | checks = BN_prime_checks_for_size(BN_num_bits(a)); | 233 | checks = BN_prime_checks_for_size(BN_num_bits(a)); |
| 230 | 234 | ||
| 231 | /* first look for small factors */ | 235 | /* first look for small factors */ |
| 232 | if (!BN_is_odd(a)) | 236 | if (!BN_is_odd(a)) |
| 233 | return(0); | 237 | return 0; |
| 234 | if (do_trial_division) | 238 | if (do_trial_division) |
| 235 | { | 239 | { |
| 236 | for (i = 1; i < NUMPRIMES; i++) | 240 | for (i = 1; i < NUMPRIMES; i++) |
| @@ -289,11 +293,8 @@ int BN_is_prime_fasttest(const BIGNUM *a, int checks, | |||
| 289 | 293 | ||
| 290 | for (i = 0; i < checks; i++) | 294 | for (i = 0; i < checks; i++) |
| 291 | { | 295 | { |
| 292 | if (!BN_pseudo_rand(check, BN_num_bits(A1), 0, 0)) | 296 | if (!BN_pseudo_rand_range(check, A1)) |
| 293 | goto err; | 297 | goto err; |
| 294 | if (BN_cmp(check, A1) >= 0) | ||
| 295 | if (!BN_sub(check, check, A1)) | ||
| 296 | goto err; | ||
| 297 | if (!BN_add_word(check, 1)) | 298 | if (!BN_add_word(check, 1)) |
| 298 | goto err; | 299 | goto err; |
| 299 | /* now 1 <= check < A */ | 300 | /* now 1 <= check < A */ |
| @@ -376,8 +377,8 @@ again: | |||
| 376 | return(1); | 377 | return(1); |
| 377 | } | 378 | } |
| 378 | 379 | ||
| 379 | static int probable_prime_dh(BIGNUM *rnd, int bits, BIGNUM *add, BIGNUM *rem, | 380 | static int probable_prime_dh(BIGNUM *rnd, int bits, |
| 380 | BN_CTX *ctx) | 381 | const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx) |
| 381 | { | 382 | { |
| 382 | int i,ret=0; | 383 | int i,ret=0; |
| 383 | BIGNUM *t1; | 384 | BIGNUM *t1; |
| @@ -413,8 +414,8 @@ err: | |||
| 413 | return(ret); | 414 | return(ret); |
| 414 | } | 415 | } |
| 415 | 416 | ||
| 416 | static int probable_prime_dh_safe(BIGNUM *p, int bits, BIGNUM *padd, | 417 | static int probable_prime_dh_safe(BIGNUM *p, int bits, const BIGNUM *padd, |
| 417 | BIGNUM *rem, BN_CTX *ctx) | 418 | const BIGNUM *rem, BN_CTX *ctx) |
| 418 | { | 419 | { |
| 419 | int i,ret=0; | 420 | int i,ret=0; |
| 420 | BIGNUM *t1,*qadd,*q; | 421 | BIGNUM *t1,*qadd,*q; |
diff --git a/src/lib/libcrypto/bn/bn_print.c b/src/lib/libcrypto/bn/bn_print.c index 532e66bcc3..5f46b1826c 100644 --- a/src/lib/libcrypto/bn/bn_print.c +++ b/src/lib/libcrypto/bn/bn_print.c | |||
| @@ -277,8 +277,8 @@ err: | |||
| 277 | return(0); | 277 | return(0); |
| 278 | } | 278 | } |
| 279 | 279 | ||
| 280 | #ifndef NO_BIO | 280 | #ifndef OPENSSL_NO_BIO |
| 281 | #ifndef NO_FP_API | 281 | #ifndef OPENSSL_NO_FP_API |
| 282 | int BN_print_fp(FILE *fp, const BIGNUM *a) | 282 | int BN_print_fp(FILE *fp, const BIGNUM *a) |
| 283 | { | 283 | { |
| 284 | BIO *b; | 284 | BIO *b; |
| @@ -321,7 +321,7 @@ end: | |||
| 321 | #endif | 321 | #endif |
| 322 | 322 | ||
| 323 | #ifdef BN_DEBUG | 323 | #ifdef BN_DEBUG |
| 324 | void bn_dump1(FILE *o, const char *a, BN_ULONG *b,int n) | 324 | void bn_dump1(FILE *o, const char *a, const BN_ULONG *b,int n) |
| 325 | { | 325 | { |
| 326 | int i; | 326 | int i; |
| 327 | fprintf(o, "%s=", a); | 327 | fprintf(o, "%s=", a); |
diff --git a/src/lib/libcrypto/bn/bn_rand.c b/src/lib/libcrypto/bn/bn_rand.c index acd0619921..9e08ccd22e 100644 --- a/src/lib/libcrypto/bn/bn_rand.c +++ b/src/lib/libcrypto/bn/bn_rand.c | |||
| @@ -55,6 +55,59 @@ | |||
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | /* ==================================================================== | ||
| 59 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
| 60 | * | ||
| 61 | * Redistribution and use in source and binary forms, with or without | ||
| 62 | * modification, are permitted provided that the following conditions | ||
| 63 | * are met: | ||
| 64 | * | ||
| 65 | * 1. Redistributions of source code must retain the above copyright | ||
| 66 | * notice, this list of conditions and the following disclaimer. | ||
| 67 | * | ||
| 68 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 69 | * notice, this list of conditions and the following disclaimer in | ||
| 70 | * the documentation and/or other materials provided with the | ||
| 71 | * distribution. | ||
| 72 | * | ||
| 73 | * 3. All advertising materials mentioning features or use of this | ||
| 74 | * software must display the following acknowledgment: | ||
| 75 | * "This product includes software developed by the OpenSSL Project | ||
| 76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
| 77 | * | ||
| 78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 79 | * endorse or promote products derived from this software without | ||
| 80 | * prior written permission. For written permission, please contact | ||
| 81 | * openssl-core@openssl.org. | ||
| 82 | * | ||
| 83 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 84 | * nor may "OpenSSL" appear in their names without prior written | ||
| 85 | * permission of the OpenSSL Project. | ||
| 86 | * | ||
| 87 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 88 | * acknowledgment: | ||
| 89 | * "This product includes software developed by the OpenSSL Project | ||
| 90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
| 91 | * | ||
| 92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 104 | * ==================================================================== | ||
| 105 | * | ||
| 106 | * This product includes cryptographic software written by Eric Young | ||
| 107 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 108 | * Hudson (tjh@cryptsoft.com). | ||
| 109 | * | ||
| 110 | */ | ||
| 58 | 111 | ||
| 59 | #include <stdio.h> | 112 | #include <stdio.h> |
| 60 | #include <time.h> | 113 | #include <time.h> |
| @@ -171,9 +224,11 @@ int BN_bntest_rand(BIGNUM *rnd, int bits, int top, int bottom) | |||
| 171 | } | 224 | } |
| 172 | #endif | 225 | #endif |
| 173 | 226 | ||
| 227 | |||
| 174 | /* random number r: 0 <= r < range */ | 228 | /* random number r: 0 <= r < range */ |
| 175 | int BN_rand_range(BIGNUM *r, BIGNUM *range) | 229 | static int bn_rand_range(int pseudo, BIGNUM *r, BIGNUM *range) |
| 176 | { | 230 | { |
| 231 | int (*bn_rand)(BIGNUM *, int, int, int) = pseudo ? BN_pseudo_rand : BN_rand; | ||
| 177 | int n; | 232 | int n; |
| 178 | 233 | ||
| 179 | if (range->neg || BN_is_zero(range)) | 234 | if (range->neg || BN_is_zero(range)) |
| @@ -184,26 +239,19 @@ int BN_rand_range(BIGNUM *r, BIGNUM *range) | |||
| 184 | 239 | ||
| 185 | n = BN_num_bits(range); /* n > 0 */ | 240 | n = BN_num_bits(range); /* n > 0 */ |
| 186 | 241 | ||
| 242 | /* BN_is_bit_set(range, n - 1) always holds */ | ||
| 243 | |||
| 187 | if (n == 1) | 244 | if (n == 1) |
| 188 | { | 245 | { |
| 189 | if (!BN_zero(r)) return 0; | 246 | if (!BN_zero(r)) return 0; |
| 190 | } | 247 | } |
| 191 | else if (BN_is_bit_set(range, n - 2)) | 248 | else if (!BN_is_bit_set(range, n - 2) && !BN_is_bit_set(range, n - 3)) |
| 192 | { | ||
| 193 | do | ||
| 194 | { | ||
| 195 | /* range = 11..._2, so each iteration succeeds with probability >= .75 */ | ||
| 196 | if (!BN_rand(r, n, -1, 0)) return 0; | ||
| 197 | } | ||
| 198 | while (BN_cmp(r, range) >= 0); | ||
| 199 | } | ||
| 200 | else | ||
| 201 | { | 249 | { |
| 202 | /* range = 10..._2, | 250 | /* range = 100..._2, |
| 203 | * so 3*range (= 11..._2) is exactly one bit longer than range */ | 251 | * so 3*range (= 11..._2) is exactly one bit longer than range */ |
| 204 | do | 252 | do |
| 205 | { | 253 | { |
| 206 | if (!BN_rand(r, n + 1, -1, 0)) return 0; | 254 | if (!bn_rand(r, n + 1, -1, 0)) return 0; |
| 207 | /* If r < 3*range, use r := r MOD range | 255 | /* If r < 3*range, use r := r MOD range |
| 208 | * (which is either r, r - range, or r - 2*range). | 256 | * (which is either r, r - range, or r - 2*range). |
| 209 | * Otherwise, iterate once more. | 257 | * Otherwise, iterate once more. |
| @@ -218,6 +266,26 @@ int BN_rand_range(BIGNUM *r, BIGNUM *range) | |||
| 218 | } | 266 | } |
| 219 | while (BN_cmp(r, range) >= 0); | 267 | while (BN_cmp(r, range) >= 0); |
| 220 | } | 268 | } |
| 269 | else | ||
| 270 | { | ||
| 271 | do | ||
| 272 | { | ||
| 273 | /* range = 11..._2 or range = 101..._2 */ | ||
| 274 | if (!bn_rand(r, n, -1, 0)) return 0; | ||
| 275 | } | ||
| 276 | while (BN_cmp(r, range) >= 0); | ||
| 277 | } | ||
| 221 | 278 | ||
| 222 | return 1; | 279 | return 1; |
| 223 | } | 280 | } |
| 281 | |||
| 282 | |||
| 283 | int BN_rand_range(BIGNUM *r, BIGNUM *range) | ||
| 284 | { | ||
| 285 | return bn_rand_range(0, r, range); | ||
| 286 | } | ||
| 287 | |||
| 288 | int BN_pseudo_rand_range(BIGNUM *r, BIGNUM *range) | ||
| 289 | { | ||
| 290 | return bn_rand_range(1, r, range); | ||
| 291 | } | ||
diff --git a/src/lib/libcrypto/bn/bn_recp.c b/src/lib/libcrypto/bn/bn_recp.c index d019941d6b..ef5fdd4708 100644 --- a/src/lib/libcrypto/bn/bn_recp.c +++ b/src/lib/libcrypto/bn/bn_recp.c | |||
| @@ -93,18 +93,19 @@ void BN_RECP_CTX_free(BN_RECP_CTX *recp) | |||
| 93 | 93 | ||
| 94 | int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *d, BN_CTX *ctx) | 94 | int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *d, BN_CTX *ctx) |
| 95 | { | 95 | { |
| 96 | BN_copy(&(recp->N),d); | 96 | if (!BN_copy(&(recp->N),d)) return 0; |
| 97 | BN_zero(&(recp->Nr)); | 97 | if (!BN_zero(&(recp->Nr))) return 0; |
| 98 | recp->num_bits=BN_num_bits(d); | 98 | recp->num_bits=BN_num_bits(d); |
| 99 | recp->shift=0; | 99 | recp->shift=0; |
| 100 | return(1); | 100 | return(1); |
| 101 | } | 101 | } |
| 102 | 102 | ||
| 103 | int BN_mod_mul_reciprocal(BIGNUM *r, BIGNUM *x, BIGNUM *y, BN_RECP_CTX *recp, | 103 | int BN_mod_mul_reciprocal(BIGNUM *r, const BIGNUM *x, const BIGNUM *y, |
| 104 | BN_CTX *ctx) | 104 | BN_RECP_CTX *recp, BN_CTX *ctx) |
| 105 | { | 105 | { |
| 106 | int ret=0; | 106 | int ret=0; |
| 107 | BIGNUM *a; | 107 | BIGNUM *a; |
| 108 | const BIGNUM *ca; | ||
| 108 | 109 | ||
| 109 | BN_CTX_start(ctx); | 110 | BN_CTX_start(ctx); |
| 110 | if ((a = BN_CTX_get(ctx)) == NULL) goto err; | 111 | if ((a = BN_CTX_get(ctx)) == NULL) goto err; |
| @@ -114,19 +115,19 @@ int BN_mod_mul_reciprocal(BIGNUM *r, BIGNUM *x, BIGNUM *y, BN_RECP_CTX *recp, | |||
| 114 | { if (!BN_sqr(a,x,ctx)) goto err; } | 115 | { if (!BN_sqr(a,x,ctx)) goto err; } |
| 115 | else | 116 | else |
| 116 | { if (!BN_mul(a,x,y,ctx)) goto err; } | 117 | { if (!BN_mul(a,x,y,ctx)) goto err; } |
| 118 | ca = a; | ||
| 117 | } | 119 | } |
| 118 | else | 120 | else |
| 119 | a=x; /* Just do the mod */ | 121 | ca=x; /* Just do the mod */ |
| 120 | 122 | ||
| 121 | BN_div_recp(NULL,r,a,recp,ctx); | 123 | ret = BN_div_recp(NULL,r,ca,recp,ctx); |
| 122 | ret=1; | ||
| 123 | err: | 124 | err: |
| 124 | BN_CTX_end(ctx); | 125 | BN_CTX_end(ctx); |
| 125 | return(ret); | 126 | return(ret); |
| 126 | } | 127 | } |
| 127 | 128 | ||
| 128 | int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *m, BN_RECP_CTX *recp, | 129 | int BN_div_recp(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, |
| 129 | BN_CTX *ctx) | 130 | BN_RECP_CTX *recp, BN_CTX *ctx) |
| 130 | { | 131 | { |
| 131 | int i,j,ret=0; | 132 | int i,j,ret=0; |
| 132 | BIGNUM *a,*b,*d,*r; | 133 | BIGNUM *a,*b,*d,*r; |
| @@ -146,8 +147,8 @@ int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *m, BN_RECP_CTX *recp, | |||
| 146 | 147 | ||
| 147 | if (BN_ucmp(m,&(recp->N)) < 0) | 148 | if (BN_ucmp(m,&(recp->N)) < 0) |
| 148 | { | 149 | { |
| 149 | BN_zero(d); | 150 | if (!BN_zero(d)) return 0; |
| 150 | BN_copy(r,m); | 151 | if (!BN_copy(r,m)) return 0; |
| 151 | BN_CTX_end(ctx); | 152 | BN_CTX_end(ctx); |
| 152 | return(1); | 153 | return(1); |
| 153 | } | 154 | } |
| @@ -157,20 +158,28 @@ int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *m, BN_RECP_CTX *recp, | |||
| 157 | * we need multiply ABCDEF by 3 digests of the reciprocal of ab | 158 | * we need multiply ABCDEF by 3 digests of the reciprocal of ab |
| 158 | * | 159 | * |
| 159 | */ | 160 | */ |
| 160 | i=BN_num_bits(m); | ||
| 161 | 161 | ||
| 162 | /* i := max(BN_num_bits(m), 2*BN_num_bits(N)) */ | ||
| 163 | i=BN_num_bits(m); | ||
| 162 | j=recp->num_bits<<1; | 164 | j=recp->num_bits<<1; |
| 163 | if (j>i) i=j; | 165 | if (j>i) i=j; |
| 164 | j>>=1; | ||
| 165 | 166 | ||
| 167 | /* Nr := round(2^i / N) */ | ||
| 166 | if (i != recp->shift) | 168 | if (i != recp->shift) |
| 167 | recp->shift=BN_reciprocal(&(recp->Nr),&(recp->N), | 169 | recp->shift=BN_reciprocal(&(recp->Nr),&(recp->N), |
| 168 | i,ctx); | 170 | i,ctx); /* BN_reciprocal returns i, or -1 for an error */ |
| 171 | if (recp->shift == -1) goto err; | ||
| 169 | 172 | ||
| 170 | if (!BN_rshift(a,m,j)) goto err; | 173 | /* d := |round(round(m / 2^BN_num_bits(N)) * recp->Nr / 2^(i - BN_num_bits(N)))| |
| 174 | * = |round(round(m / 2^BN_num_bits(N)) * round(2^i / N) / 2^(i - BN_num_bits(N)))| | ||
| 175 | * <= |(m / 2^BN_num_bits(N)) * (2^i / N) * (2^BN_num_bits(N) / 2^i)| | ||
| 176 | * = |m/N| | ||
| 177 | */ | ||
| 178 | if (!BN_rshift(a,m,recp->num_bits)) goto err; | ||
| 171 | if (!BN_mul(b,a,&(recp->Nr),ctx)) goto err; | 179 | if (!BN_mul(b,a,&(recp->Nr),ctx)) goto err; |
| 172 | if (!BN_rshift(d,b,i-j)) goto err; | 180 | if (!BN_rshift(d,b,i-recp->num_bits)) goto err; |
| 173 | d->neg=0; | 181 | d->neg=0; |
| 182 | |||
| 174 | if (!BN_mul(b,&(recp->N),d,ctx)) goto err; | 183 | if (!BN_mul(b,&(recp->N),d,ctx)) goto err; |
| 175 | if (!BN_usub(r,m,b)) goto err; | 184 | if (!BN_usub(r,m,b)) goto err; |
| 176 | r->neg=0; | 185 | r->neg=0; |
| @@ -201,20 +210,21 @@ err: | |||
| 201 | * We actually calculate with an extra word of precision, so | 210 | * We actually calculate with an extra word of precision, so |
| 202 | * we can do faster division if the remainder is not required. | 211 | * we can do faster division if the remainder is not required. |
| 203 | */ | 212 | */ |
| 204 | int BN_reciprocal(BIGNUM *r, BIGNUM *m, int len, BN_CTX *ctx) | 213 | /* r := 2^len / m */ |
| 214 | int BN_reciprocal(BIGNUM *r, const BIGNUM *m, int len, BN_CTX *ctx) | ||
| 205 | { | 215 | { |
| 206 | int ret= -1; | 216 | int ret= -1; |
| 207 | BIGNUM t; | 217 | BIGNUM t; |
| 208 | 218 | ||
| 209 | BN_init(&t); | 219 | BN_init(&t); |
| 210 | 220 | ||
| 211 | BN_zero(&t); | 221 | if (!BN_zero(&t)) goto err; |
| 212 | if (!BN_set_bit(&t,len)) goto err; | 222 | if (!BN_set_bit(&t,len)) goto err; |
| 213 | 223 | ||
| 214 | if (!BN_div(r,NULL,&t,m,ctx)) goto err; | 224 | if (!BN_div(r,NULL,&t,m,ctx)) goto err; |
| 225 | |||
| 215 | ret=len; | 226 | ret=len; |
| 216 | err: | 227 | err: |
| 217 | BN_free(&t); | 228 | BN_free(&t); |
| 218 | return(ret); | 229 | return(ret); |
| 219 | } | 230 | } |
| 220 | |||
diff --git a/src/lib/libcrypto/bn/bn_shift.c b/src/lib/libcrypto/bn/bn_shift.c index c2608f9f4a..70f785ea18 100644 --- a/src/lib/libcrypto/bn/bn_shift.c +++ b/src/lib/libcrypto/bn/bn_shift.c | |||
| @@ -60,7 +60,7 @@ | |||
| 60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
| 61 | #include "bn_lcl.h" | 61 | #include "bn_lcl.h" |
| 62 | 62 | ||
| 63 | int BN_lshift1(BIGNUM *r, BIGNUM *a) | 63 | int BN_lshift1(BIGNUM *r, const BIGNUM *a) |
| 64 | { | 64 | { |
| 65 | register BN_ULONG *ap,*rp,t,c; | 65 | register BN_ULONG *ap,*rp,t,c; |
| 66 | int i; | 66 | int i; |
| @@ -92,7 +92,7 @@ int BN_lshift1(BIGNUM *r, BIGNUM *a) | |||
| 92 | return(1); | 92 | return(1); |
| 93 | } | 93 | } |
| 94 | 94 | ||
| 95 | int BN_rshift1(BIGNUM *r, BIGNUM *a) | 95 | int BN_rshift1(BIGNUM *r, const BIGNUM *a) |
| 96 | { | 96 | { |
| 97 | BN_ULONG *ap,*rp,t,c; | 97 | BN_ULONG *ap,*rp,t,c; |
| 98 | int i; | 98 | int i; |
| @@ -128,8 +128,8 @@ int BN_lshift(BIGNUM *r, const BIGNUM *a, int n) | |||
| 128 | BN_ULONG l; | 128 | BN_ULONG l; |
| 129 | 129 | ||
| 130 | r->neg=a->neg; | 130 | r->neg=a->neg; |
| 131 | if (bn_wexpand(r,a->top+(n/BN_BITS2)+1) == NULL) return(0); | ||
| 132 | nw=n/BN_BITS2; | 131 | nw=n/BN_BITS2; |
| 132 | if (bn_wexpand(r,a->top+nw+1) == NULL) return(0); | ||
| 133 | lb=n%BN_BITS2; | 133 | lb=n%BN_BITS2; |
| 134 | rb=BN_BITS2-lb; | 134 | rb=BN_BITS2-lb; |
| 135 | f=a->d; | 135 | f=a->d; |
| @@ -153,7 +153,7 @@ int BN_lshift(BIGNUM *r, const BIGNUM *a, int n) | |||
| 153 | return(1); | 153 | return(1); |
| 154 | } | 154 | } |
| 155 | 155 | ||
| 156 | int BN_rshift(BIGNUM *r, BIGNUM *a, int n) | 156 | int BN_rshift(BIGNUM *r, const BIGNUM *a, int n) |
| 157 | { | 157 | { |
| 158 | int i,j,nw,lb,rb; | 158 | int i,j,nw,lb,rb; |
| 159 | BN_ULONG *t,*f; | 159 | BN_ULONG *t,*f; |
diff --git a/src/lib/libcrypto/bn/bn_sqr.c b/src/lib/libcrypto/bn/bn_sqr.c index 75f4f38392..c1d0cca438 100644 --- a/src/lib/libcrypto/bn/bn_sqr.c +++ b/src/lib/libcrypto/bn/bn_sqr.c | |||
| @@ -62,14 +62,14 @@ | |||
| 62 | 62 | ||
| 63 | /* r must not be a */ | 63 | /* r must not be a */ |
| 64 | /* I've just gone over this and it is now %20 faster on x86 - eay - 27 Jun 96 */ | 64 | /* I've just gone over this and it is now %20 faster on x86 - eay - 27 Jun 96 */ |
| 65 | int BN_sqr(BIGNUM *r, BIGNUM *a, BN_CTX *ctx) | 65 | int BN_sqr(BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) |
| 66 | { | 66 | { |
| 67 | int max,al; | 67 | int max,al; |
| 68 | int ret = 0; | 68 | int ret = 0; |
| 69 | BIGNUM *tmp,*rr; | 69 | BIGNUM *tmp,*rr; |
| 70 | 70 | ||
| 71 | #ifdef BN_COUNT | 71 | #ifdef BN_COUNT |
| 72 | printf("BN_sqr %d * %d\n",a->top,a->top); | 72 | fprintf(stderr,"BN_sqr %d * %d\n",a->top,a->top); |
| 73 | #endif | 73 | #endif |
| 74 | bn_check_top(a); | 74 | bn_check_top(a); |
| 75 | 75 | ||
| @@ -88,7 +88,6 @@ printf("BN_sqr %d * %d\n",a->top,a->top); | |||
| 88 | max=(al+al); | 88 | max=(al+al); |
| 89 | if (bn_wexpand(rr,max+1) == NULL) goto err; | 89 | if (bn_wexpand(rr,max+1) == NULL) goto err; |
| 90 | 90 | ||
| 91 | r->neg=0; | ||
| 92 | if (al == 4) | 91 | if (al == 4) |
| 93 | { | 92 | { |
| 94 | #ifndef BN_SQR_COMBA | 93 | #ifndef BN_SQR_COMBA |
| @@ -124,7 +123,6 @@ printf("BN_sqr %d * %d\n",a->top,a->top); | |||
| 124 | k=j+j; | 123 | k=j+j; |
| 125 | if (al == j) | 124 | if (al == j) |
| 126 | { | 125 | { |
| 127 | if (bn_wexpand(a,k*2) == NULL) goto err; | ||
| 128 | if (bn_wexpand(tmp,k*2) == NULL) goto err; | 126 | if (bn_wexpand(tmp,k*2) == NULL) goto err; |
| 129 | bn_sqr_recursive(rr->d,a->d,al,tmp->d); | 127 | bn_sqr_recursive(rr->d,a->d,al,tmp->d); |
| 130 | } | 128 | } |
| @@ -141,6 +139,7 @@ printf("BN_sqr %d * %d\n",a->top,a->top); | |||
| 141 | } | 139 | } |
| 142 | 140 | ||
| 143 | rr->top=max; | 141 | rr->top=max; |
| 142 | rr->neg=0; | ||
| 144 | if ((max > 0) && (rr->d[max-1] == 0)) rr->top--; | 143 | if ((max > 0) && (rr->d[max-1] == 0)) rr->top--; |
| 145 | if (rr != r) BN_copy(r,rr); | 144 | if (rr != r) BN_copy(r,rr); |
| 146 | ret = 1; | 145 | ret = 1; |
| @@ -150,10 +149,11 @@ printf("BN_sqr %d * %d\n",a->top,a->top); | |||
| 150 | } | 149 | } |
| 151 | 150 | ||
| 152 | /* tmp must have 2*n words */ | 151 | /* tmp must have 2*n words */ |
| 153 | void bn_sqr_normal(BN_ULONG *r, BN_ULONG *a, int n, BN_ULONG *tmp) | 152 | void bn_sqr_normal(BN_ULONG *r, const BN_ULONG *a, int n, BN_ULONG *tmp) |
| 154 | { | 153 | { |
| 155 | int i,j,max; | 154 | int i,j,max; |
| 156 | BN_ULONG *ap,*rp; | 155 | const BN_ULONG *ap; |
| 156 | BN_ULONG *rp; | ||
| 157 | 157 | ||
| 158 | max=n*2; | 158 | max=n*2; |
| 159 | ap=a; | 159 | ap=a; |
| @@ -197,14 +197,14 @@ void bn_sqr_normal(BN_ULONG *r, BN_ULONG *a, int n, BN_ULONG *tmp) | |||
| 197 | * a[0]*b[0]+a[1]*b[1]+(a[0]-a[1])*(b[1]-b[0]) | 197 | * a[0]*b[0]+a[1]*b[1]+(a[0]-a[1])*(b[1]-b[0]) |
| 198 | * a[1]*b[1] | 198 | * a[1]*b[1] |
| 199 | */ | 199 | */ |
| 200 | void bn_sqr_recursive(BN_ULONG *r, BN_ULONG *a, int n2, BN_ULONG *t) | 200 | void bn_sqr_recursive(BN_ULONG *r, const BN_ULONG *a, int n2, BN_ULONG *t) |
| 201 | { | 201 | { |
| 202 | int n=n2/2; | 202 | int n=n2/2; |
| 203 | int zero,c1; | 203 | int zero,c1; |
| 204 | BN_ULONG ln,lo,*p; | 204 | BN_ULONG ln,lo,*p; |
| 205 | 205 | ||
| 206 | #ifdef BN_COUNT | 206 | #ifdef BN_COUNT |
| 207 | printf(" bn_sqr_recursive %d * %d\n",n2,n2); | 207 | fprintf(stderr," bn_sqr_recursive %d * %d\n",n2,n2); |
| 208 | #endif | 208 | #endif |
| 209 | if (n2 == 4) | 209 | if (n2 == 4) |
| 210 | { | 210 | { |
| @@ -245,7 +245,7 @@ printf(" bn_sqr_recursive %d * %d\n",n2,n2); | |||
| 245 | if (!zero) | 245 | if (!zero) |
| 246 | bn_sqr_recursive(&(t[n2]),t,n,p); | 246 | bn_sqr_recursive(&(t[n2]),t,n,p); |
| 247 | else | 247 | else |
| 248 | memset(&(t[n2]),0,n*sizeof(BN_ULONG)); | 248 | memset(&(t[n2]),0,n2*sizeof(BN_ULONG)); |
| 249 | bn_sqr_recursive(r,a,n,p); | 249 | bn_sqr_recursive(r,a,n,p); |
| 250 | bn_sqr_recursive(&(r[n2]),&(a[n]),n,p); | 250 | bn_sqr_recursive(&(r[n2]),&(a[n]),n,p); |
| 251 | 251 | ||
diff --git a/src/lib/libcrypto/bn/bn_sqrt.c b/src/lib/libcrypto/bn/bn_sqrt.c new file mode 100644 index 0000000000..e2a1105dc8 --- /dev/null +++ b/src/lib/libcrypto/bn/bn_sqrt.c | |||
| @@ -0,0 +1,387 @@ | |||
| 1 | /* crypto/bn/bn_mod.c */ | ||
| 2 | /* Written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> | ||
| 3 | * and Bodo Moeller for the OpenSSL project. */ | ||
| 4 | /* ==================================================================== | ||
| 5 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | ||
| 6 | * | ||
| 7 | * Redistribution and use in source and binary forms, with or without | ||
| 8 | * modification, are permitted provided that the following conditions | ||
| 9 | * are met: | ||
| 10 | * | ||
| 11 | * 1. Redistributions of source code must retain the above copyright | ||
| 12 | * notice, this list of conditions and the following disclaimer. | ||
| 13 | * | ||
| 14 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 15 | * notice, this list of conditions and the following disclaimer in | ||
| 16 | * the documentation and/or other materials provided with the | ||
| 17 | * distribution. | ||
| 18 | * | ||
| 19 | * 3. All advertising materials mentioning features or use of this | ||
| 20 | * software must display the following acknowledgment: | ||
| 21 | * "This product includes software developed by the OpenSSL Project | ||
| 22 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
| 23 | * | ||
| 24 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 25 | * endorse or promote products derived from this software without | ||
| 26 | * prior written permission. For written permission, please contact | ||
| 27 | * openssl-core@openssl.org. | ||
| 28 | * | ||
| 29 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 30 | * nor may "OpenSSL" appear in their names without prior written | ||
| 31 | * permission of the OpenSSL Project. | ||
| 32 | * | ||
| 33 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 34 | * acknowledgment: | ||
| 35 | * "This product includes software developed by the OpenSSL Project | ||
| 36 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
| 37 | * | ||
| 38 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 39 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 40 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 41 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 42 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 43 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 44 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 45 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 46 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 47 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 48 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 49 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 50 | * ==================================================================== | ||
| 51 | * | ||
| 52 | * This product includes cryptographic software written by Eric Young | ||
| 53 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 54 | * Hudson (tjh@cryptsoft.com). | ||
| 55 | * | ||
| 56 | */ | ||
| 57 | |||
| 58 | #include "cryptlib.h" | ||
| 59 | #include "bn_lcl.h" | ||
| 60 | |||
| 61 | |||
| 62 | BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) | ||
| 63 | /* Returns 'ret' such that | ||
| 64 | * ret^2 == a (mod p), | ||
| 65 | * using the Tonelli/Shanks algorithm (cf. Henri Cohen, "A Course | ||
| 66 | * in Algebraic Computational Number Theory", algorithm 1.5.1). | ||
| 67 | * 'p' must be prime! | ||
| 68 | * If 'a' is not a square, this is not necessarily detected by | ||
| 69 | * the algorithms; a bogus result must be expected in this case. | ||
| 70 | */ | ||
| 71 | { | ||
| 72 | BIGNUM *ret = in; | ||
| 73 | int err = 1; | ||
| 74 | int r; | ||
| 75 | BIGNUM *b, *q, *t, *x, *y; | ||
| 76 | int e, i, j; | ||
| 77 | |||
| 78 | if (!BN_is_odd(p) || BN_abs_is_word(p, 1)) | ||
| 79 | { | ||
| 80 | if (BN_abs_is_word(p, 2)) | ||
| 81 | { | ||
| 82 | if (ret == NULL) | ||
| 83 | ret = BN_new(); | ||
| 84 | if (ret == NULL) | ||
| 85 | goto end; | ||
| 86 | if (!BN_set_word(ret, BN_is_bit_set(a, 0))) | ||
| 87 | { | ||
| 88 | BN_free(ret); | ||
| 89 | return NULL; | ||
| 90 | } | ||
| 91 | return ret; | ||
| 92 | } | ||
| 93 | |||
| 94 | BNerr(BN_F_BN_MOD_SQRT, BN_R_P_IS_NOT_PRIME); | ||
| 95 | return(NULL); | ||
| 96 | } | ||
| 97 | |||
| 98 | if (BN_is_zero(a) || BN_is_one(a)) | ||
| 99 | { | ||
| 100 | if (ret == NULL) | ||
| 101 | ret = BN_new(); | ||
| 102 | if (ret == NULL) | ||
| 103 | goto end; | ||
| 104 | if (!BN_set_word(ret, BN_is_one(a))) | ||
| 105 | { | ||
| 106 | BN_free(ret); | ||
| 107 | return NULL; | ||
| 108 | } | ||
| 109 | return ret; | ||
| 110 | } | ||
| 111 | |||
| 112 | #if 0 /* if BN_mod_sqrt is used with correct input, this just wastes time */ | ||
| 113 | r = BN_kronecker(a, p, ctx); | ||
| 114 | if (r < -1) return NULL; | ||
| 115 | if (r == -1) | ||
| 116 | { | ||
| 117 | BNerr(BN_F_BN_MOD_SQRT, BN_R_NOT_A_SQUARE); | ||
| 118 | return(NULL); | ||
| 119 | } | ||
| 120 | #endif | ||
| 121 | |||
| 122 | BN_CTX_start(ctx); | ||
| 123 | b = BN_CTX_get(ctx); | ||
| 124 | q = BN_CTX_get(ctx); | ||
| 125 | t = BN_CTX_get(ctx); | ||
| 126 | x = BN_CTX_get(ctx); | ||
| 127 | y = BN_CTX_get(ctx); | ||
| 128 | if (y == NULL) goto end; | ||
| 129 | |||
| 130 | if (ret == NULL) | ||
| 131 | ret = BN_new(); | ||
| 132 | if (ret == NULL) goto end; | ||
| 133 | |||
| 134 | /* now write |p| - 1 as 2^e*q where q is odd */ | ||
| 135 | e = 1; | ||
| 136 | while (!BN_is_bit_set(p, e)) | ||
| 137 | e++; | ||
| 138 | /* we'll set q later (if needed) */ | ||
| 139 | |||
| 140 | if (e == 1) | ||
| 141 | { | ||
| 142 | /* The easy case: (|p|-1)/2 is odd, so 2 has an inverse | ||
| 143 | * modulo (|p|-1)/2, and square roots can be computed | ||
| 144 | * directly by modular exponentiation. | ||
| 145 | * We have | ||
| 146 | * 2 * (|p|+1)/4 == 1 (mod (|p|-1)/2), | ||
| 147 | * so we can use exponent (|p|+1)/4, i.e. (|p|-3)/4 + 1. | ||
| 148 | */ | ||
| 149 | if (!BN_rshift(q, p, 2)) goto end; | ||
| 150 | q->neg = 0; | ||
| 151 | if (!BN_add_word(q, 1)) goto end; | ||
| 152 | if (!BN_mod_exp(ret, a, q, p, ctx)) goto end; | ||
| 153 | err = 0; | ||
| 154 | goto end; | ||
| 155 | } | ||
| 156 | |||
| 157 | if (e == 2) | ||
| 158 | { | ||
| 159 | /* |p| == 5 (mod 8) | ||
| 160 | * | ||
| 161 | * In this case 2 is always a non-square since | ||
| 162 | * Legendre(2,p) = (-1)^((p^2-1)/8) for any odd prime. | ||
| 163 | * So if a really is a square, then 2*a is a non-square. | ||
| 164 | * Thus for | ||
| 165 | * b := (2*a)^((|p|-5)/8), | ||
| 166 | * i := (2*a)*b^2 | ||
| 167 | * we have | ||
| 168 | * i^2 = (2*a)^((1 + (|p|-5)/4)*2) | ||
| 169 | * = (2*a)^((p-1)/2) | ||
| 170 | * = -1; | ||
| 171 | * so if we set | ||
| 172 | * x := a*b*(i-1), | ||
| 173 | * then | ||
| 174 | * x^2 = a^2 * b^2 * (i^2 - 2*i + 1) | ||
| 175 | * = a^2 * b^2 * (-2*i) | ||
| 176 | * = a*(-i)*(2*a*b^2) | ||
| 177 | * = a*(-i)*i | ||
| 178 | * = a. | ||
| 179 | * | ||
| 180 | * (This is due to A.O.L. Atkin, | ||
| 181 | * <URL: http://listserv.nodak.edu/scripts/wa.exe?A2=ind9211&L=nmbrthry&O=T&P=562>, | ||
| 182 | * November 1992.) | ||
| 183 | */ | ||
| 184 | |||
| 185 | /* make sure that a is reduced modulo p */ | ||
| 186 | if (a->neg || BN_ucmp(a, p) >= 0) | ||
| 187 | { | ||
| 188 | if (!BN_nnmod(x, a, p, ctx)) goto end; | ||
| 189 | a = x; /* use x as temporary variable */ | ||
| 190 | } | ||
| 191 | |||
| 192 | /* t := 2*a */ | ||
| 193 | if (!BN_mod_lshift1_quick(t, a, p)) goto end; | ||
| 194 | |||
| 195 | /* b := (2*a)^((|p|-5)/8) */ | ||
| 196 | if (!BN_rshift(q, p, 3)) goto end; | ||
| 197 | q->neg = 0; | ||
| 198 | if (!BN_mod_exp(b, t, q, p, ctx)) goto end; | ||
| 199 | |||
| 200 | /* y := b^2 */ | ||
| 201 | if (!BN_mod_sqr(y, b, p, ctx)) goto end; | ||
| 202 | |||
| 203 | /* t := (2*a)*b^2 - 1*/ | ||
| 204 | if (!BN_mod_mul(t, t, y, p, ctx)) goto end; | ||
| 205 | if (!BN_sub_word(t, 1)) goto end; | ||
| 206 | |||
| 207 | /* x = a*b*t */ | ||
| 208 | if (!BN_mod_mul(x, a, b, p, ctx)) goto end; | ||
| 209 | if (!BN_mod_mul(x, x, t, p, ctx)) goto end; | ||
| 210 | |||
| 211 | if (!BN_copy(ret, x)) goto end; | ||
| 212 | err = 0; | ||
| 213 | goto end; | ||
| 214 | } | ||
| 215 | |||
| 216 | /* e > 2, so we really have to use the Tonelli/Shanks algorithm. | ||
| 217 | * First, find some y that is not a square. */ | ||
| 218 | if (!BN_copy(q, p)) goto end; /* use 'q' as temp */ | ||
| 219 | q->neg = 0; | ||
| 220 | i = 2; | ||
| 221 | do | ||
| 222 | { | ||
| 223 | /* For efficiency, try small numbers first; | ||
| 224 | * if this fails, try random numbers. | ||
| 225 | */ | ||
| 226 | if (i < 22) | ||
| 227 | { | ||
| 228 | if (!BN_set_word(y, i)) goto end; | ||
| 229 | } | ||
| 230 | else | ||
| 231 | { | ||
| 232 | if (!BN_pseudo_rand(y, BN_num_bits(p), 0, 0)) goto end; | ||
| 233 | if (BN_ucmp(y, p) >= 0) | ||
| 234 | { | ||
| 235 | if (!(p->neg ? BN_add : BN_sub)(y, y, p)) goto end; | ||
| 236 | } | ||
| 237 | /* now 0 <= y < |p| */ | ||
| 238 | if (BN_is_zero(y)) | ||
| 239 | if (!BN_set_word(y, i)) goto end; | ||
| 240 | } | ||
| 241 | |||
| 242 | r = BN_kronecker(y, q, ctx); /* here 'q' is |p| */ | ||
| 243 | if (r < -1) goto end; | ||
| 244 | if (r == 0) | ||
| 245 | { | ||
| 246 | /* m divides p */ | ||
| 247 | BNerr(BN_F_BN_MOD_SQRT, BN_R_P_IS_NOT_PRIME); | ||
| 248 | goto end; | ||
| 249 | } | ||
| 250 | } | ||
| 251 | while (r == 1 && ++i < 82); | ||
| 252 | |||
| 253 | if (r != -1) | ||
| 254 | { | ||
| 255 | /* Many rounds and still no non-square -- this is more likely | ||
| 256 | * a bug than just bad luck. | ||
| 257 | * Even if p is not prime, we should have found some y | ||
| 258 | * such that r == -1. | ||
| 259 | */ | ||
| 260 | BNerr(BN_F_BN_MOD_SQRT, BN_R_TOO_MANY_ITERATIONS); | ||
| 261 | goto end; | ||
| 262 | } | ||
| 263 | |||
| 264 | /* Here's our actual 'q': */ | ||
| 265 | if (!BN_rshift(q, q, e)) goto end; | ||
| 266 | |||
| 267 | /* Now that we have some non-square, we can find an element | ||
| 268 | * of order 2^e by computing its q'th power. */ | ||
| 269 | if (!BN_mod_exp(y, y, q, p, ctx)) goto end; | ||
| 270 | if (BN_is_one(y)) | ||
| 271 | { | ||
| 272 | BNerr(BN_F_BN_MOD_SQRT, BN_R_P_IS_NOT_PRIME); | ||
| 273 | goto end; | ||
| 274 | } | ||
| 275 | |||
| 276 | /* Now we know that (if p is indeed prime) there is an integer | ||
| 277 | * k, 0 <= k < 2^e, such that | ||
| 278 | * | ||
| 279 | * a^q * y^k == 1 (mod p). | ||
| 280 | * | ||
| 281 | * As a^q is a square and y is not, k must be even. | ||
| 282 | * q+1 is even, too, so there is an element | ||
| 283 | * | ||
| 284 | * X := a^((q+1)/2) * y^(k/2), | ||
| 285 | * | ||
| 286 | * and it satisfies | ||
| 287 | * | ||
| 288 | * X^2 = a^q * a * y^k | ||
| 289 | * = a, | ||
| 290 | * | ||
| 291 | * so it is the square root that we are looking for. | ||
| 292 | */ | ||
| 293 | |||
| 294 | /* t := (q-1)/2 (note that q is odd) */ | ||
| 295 | if (!BN_rshift1(t, q)) goto end; | ||
| 296 | |||
| 297 | /* x := a^((q-1)/2) */ | ||
| 298 | if (BN_is_zero(t)) /* special case: p = 2^e + 1 */ | ||
| 299 | { | ||
| 300 | if (!BN_nnmod(t, a, p, ctx)) goto end; | ||
| 301 | if (BN_is_zero(t)) | ||
| 302 | { | ||
| 303 | /* special case: a == 0 (mod p) */ | ||
| 304 | if (!BN_zero(ret)) goto end; | ||
| 305 | err = 0; | ||
| 306 | goto end; | ||
| 307 | } | ||
| 308 | else | ||
| 309 | if (!BN_one(x)) goto end; | ||
| 310 | } | ||
| 311 | else | ||
| 312 | { | ||
| 313 | if (!BN_mod_exp(x, a, t, p, ctx)) goto end; | ||
| 314 | if (BN_is_zero(x)) | ||
| 315 | { | ||
| 316 | /* special case: a == 0 (mod p) */ | ||
| 317 | if (!BN_zero(ret)) goto end; | ||
| 318 | err = 0; | ||
| 319 | goto end; | ||
| 320 | } | ||
| 321 | } | ||
| 322 | |||
| 323 | /* b := a*x^2 (= a^q) */ | ||
| 324 | if (!BN_mod_sqr(b, x, p, ctx)) goto end; | ||
| 325 | if (!BN_mod_mul(b, b, a, p, ctx)) goto end; | ||
| 326 | |||
| 327 | /* x := a*x (= a^((q+1)/2)) */ | ||
| 328 | if (!BN_mod_mul(x, x, a, p, ctx)) goto end; | ||
| 329 | |||
| 330 | while (1) | ||
| 331 | { | ||
| 332 | /* Now b is a^q * y^k for some even k (0 <= k < 2^E | ||
| 333 | * where E refers to the original value of e, which we | ||
| 334 | * don't keep in a variable), and x is a^((q+1)/2) * y^(k/2). | ||
| 335 | * | ||
| 336 | * We have a*b = x^2, | ||
| 337 | * y^2^(e-1) = -1, | ||
| 338 | * b^2^(e-1) = 1. | ||
| 339 | */ | ||
| 340 | |||
| 341 | if (BN_is_one(b)) | ||
| 342 | { | ||
| 343 | if (!BN_copy(ret, x)) goto end; | ||
| 344 | err = 0; | ||
| 345 | goto end; | ||
| 346 | } | ||
| 347 | |||
| 348 | |||
| 349 | /* find smallest i such that b^(2^i) = 1 */ | ||
| 350 | i = 1; | ||
| 351 | if (!BN_mod_sqr(t, b, p, ctx)) goto end; | ||
| 352 | while (!BN_is_one(t)) | ||
| 353 | { | ||
| 354 | i++; | ||
| 355 | if (i == e) | ||
| 356 | { | ||
| 357 | BNerr(BN_F_BN_MOD_SQRT, BN_R_NOT_A_SQUARE); | ||
| 358 | goto end; | ||
| 359 | } | ||
| 360 | if (!BN_mod_mul(t, t, t, p, ctx)) goto end; | ||
| 361 | } | ||
| 362 | |||
| 363 | |||
| 364 | /* t := y^2^(e - i - 1) */ | ||
| 365 | if (!BN_copy(t, y)) goto end; | ||
| 366 | for (j = e - i - 1; j > 0; j--) | ||
| 367 | { | ||
| 368 | if (!BN_mod_sqr(t, t, p, ctx)) goto end; | ||
| 369 | } | ||
| 370 | if (!BN_mod_mul(y, t, t, p, ctx)) goto end; | ||
| 371 | if (!BN_mod_mul(x, x, t, p, ctx)) goto end; | ||
| 372 | if (!BN_mod_mul(b, b, y, p, ctx)) goto end; | ||
| 373 | e = i; | ||
| 374 | } | ||
| 375 | |||
| 376 | end: | ||
| 377 | if (err) | ||
| 378 | { | ||
| 379 | if (ret != NULL && ret != in) | ||
| 380 | { | ||
| 381 | BN_clear_free(ret); | ||
| 382 | } | ||
| 383 | ret = NULL; | ||
| 384 | } | ||
| 385 | BN_CTX_end(ctx); | ||
| 386 | return ret; | ||
| 387 | } | ||
diff --git a/src/lib/libcrypto/bn/bnspeed.c b/src/lib/libcrypto/bn/bnspeed.c index 20fc7e08ff..b554ac8cf8 100644 --- a/src/lib/libcrypto/bn/bnspeed.c +++ b/src/lib/libcrypto/bn/bnspeed.c | |||
| @@ -71,7 +71,7 @@ | |||
| 71 | #include <openssl/crypto.h> | 71 | #include <openssl/crypto.h> |
| 72 | #include <openssl/err.h> | 72 | #include <openssl/err.h> |
| 73 | 73 | ||
| 74 | #if !defined(MSDOS) && (!defined(VMS) || defined(__DECC)) | 74 | #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX) |
| 75 | #define TIMES | 75 | #define TIMES |
| 76 | #endif | 76 | #endif |
| 77 | 77 | ||
| @@ -87,7 +87,7 @@ | |||
| 87 | The __TMS macro will show if it was. If it wasn't defined, we should | 87 | The __TMS macro will show if it was. If it wasn't defined, we should |
| 88 | undefine TIMES, since that tells the rest of the program how things | 88 | undefine TIMES, since that tells the rest of the program how things |
| 89 | should be handled. -- Richard Levitte */ | 89 | should be handled. -- Richard Levitte */ |
| 90 | #if defined(VMS) && defined(__DECC) && !defined(__TMS) | 90 | #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS) |
| 91 | #undef TIMES | 91 | #undef TIMES |
| 92 | #endif | 92 | #endif |
| 93 | 93 | ||
diff --git a/src/lib/libcrypto/bn/bntest.c b/src/lib/libcrypto/bn/bntest.c index af0c2629e8..443cf420e5 100644 --- a/src/lib/libcrypto/bn/bntest.c +++ b/src/lib/libcrypto/bn/bntest.c | |||
| @@ -60,7 +60,7 @@ | |||
| 60 | #include <stdlib.h> | 60 | #include <stdlib.h> |
| 61 | #include <string.h> | 61 | #include <string.h> |
| 62 | 62 | ||
| 63 | #include "openssl/e_os.h" | 63 | #include "e_os.h" |
| 64 | 64 | ||
| 65 | #include <openssl/bio.h> | 65 | #include <openssl/bio.h> |
| 66 | #include <openssl/bn.h> | 66 | #include <openssl/bn.h> |
| @@ -68,7 +68,7 @@ | |||
| 68 | #include <openssl/x509.h> | 68 | #include <openssl/x509.h> |
| 69 | #include <openssl/err.h> | 69 | #include <openssl/err.h> |
| 70 | 70 | ||
| 71 | #ifdef WINDOWS | 71 | #ifdef OPENSSL_SYS_WINDOWS |
| 72 | #include "../bio/bss_file.c" | 72 | #include "../bio/bss_file.c" |
| 73 | #endif | 73 | #endif |
| 74 | 74 | ||
| @@ -91,10 +91,12 @@ int test_mod(BIO *bp,BN_CTX *ctx); | |||
| 91 | int test_mod_mul(BIO *bp,BN_CTX *ctx); | 91 | int test_mod_mul(BIO *bp,BN_CTX *ctx); |
| 92 | int test_mod_exp(BIO *bp,BN_CTX *ctx); | 92 | int test_mod_exp(BIO *bp,BN_CTX *ctx); |
| 93 | int test_exp(BIO *bp,BN_CTX *ctx); | 93 | int test_exp(BIO *bp,BN_CTX *ctx); |
| 94 | int test_kron(BIO *bp,BN_CTX *ctx); | ||
| 95 | int test_sqrt(BIO *bp,BN_CTX *ctx); | ||
| 94 | int rand_neg(void); | 96 | int rand_neg(void); |
| 95 | static int results=0; | 97 | static int results=0; |
| 96 | 98 | ||
| 97 | #ifdef NO_STDIO | 99 | #ifdef OPENSSL_NO_STDIO |
| 98 | #define APPS_WIN16 | 100 | #define APPS_WIN16 |
| 99 | #include "bss_file.c" | 101 | #include "bss_file.c" |
| 100 | #endif | 102 | #endif |
| @@ -224,6 +226,14 @@ int main(int argc, char *argv[]) | |||
| 224 | if (!test_exp(out,ctx)) goto err; | 226 | if (!test_exp(out,ctx)) goto err; |
| 225 | BIO_flush(out); | 227 | BIO_flush(out); |
| 226 | 228 | ||
| 229 | message(out,"BN_kronecker"); | ||
| 230 | if (!test_kron(out,ctx)) goto err; | ||
| 231 | BIO_flush(out); | ||
| 232 | |||
| 233 | message(out,"BN_mod_sqrt"); | ||
| 234 | if (!test_sqrt(out,ctx)) goto err; | ||
| 235 | BIO_flush(out); | ||
| 236 | |||
| 227 | BN_CTX_free(ctx); | 237 | BN_CTX_free(ctx); |
| 228 | BIO_free(out); | 238 | BIO_free(out); |
| 229 | 239 | ||
| @@ -243,7 +253,6 @@ int test_add(BIO *bp) | |||
| 243 | { | 253 | { |
| 244 | BIGNUM a,b,c; | 254 | BIGNUM a,b,c; |
| 245 | int i; | 255 | int i; |
| 246 | int j; | ||
| 247 | 256 | ||
| 248 | BN_init(&a); | 257 | BN_init(&a); |
| 249 | BN_init(&b); | 258 | BN_init(&b); |
| @@ -255,9 +264,6 @@ int test_add(BIO *bp) | |||
| 255 | BN_bntest_rand(&b,450+i,0,0); | 264 | BN_bntest_rand(&b,450+i,0,0); |
| 256 | a.neg=rand_neg(); | 265 | a.neg=rand_neg(); |
| 257 | b.neg=rand_neg(); | 266 | b.neg=rand_neg(); |
| 258 | if (bp == NULL) | ||
| 259 | for (j=0; j<10000; j++) | ||
| 260 | BN_add(&c,&a,&b); | ||
| 261 | BN_add(&c,&a,&b); | 267 | BN_add(&c,&a,&b); |
| 262 | if (bp != NULL) | 268 | if (bp != NULL) |
| 263 | { | 269 | { |
| @@ -291,7 +297,6 @@ int test_sub(BIO *bp) | |||
| 291 | { | 297 | { |
| 292 | BIGNUM a,b,c; | 298 | BIGNUM a,b,c; |
| 293 | int i; | 299 | int i; |
| 294 | int j; | ||
| 295 | 300 | ||
| 296 | BN_init(&a); | 301 | BN_init(&a); |
| 297 | BN_init(&b); | 302 | BN_init(&b); |
| @@ -312,9 +317,6 @@ int test_sub(BIO *bp) | |||
| 312 | a.neg=rand_neg(); | 317 | a.neg=rand_neg(); |
| 313 | b.neg=rand_neg(); | 318 | b.neg=rand_neg(); |
| 314 | } | 319 | } |
| 315 | if (bp == NULL) | ||
| 316 | for (j=0; j<10000; j++) | ||
| 317 | BN_sub(&c,&a,&b); | ||
| 318 | BN_sub(&c,&a,&b); | 320 | BN_sub(&c,&a,&b); |
| 319 | if (bp != NULL) | 321 | if (bp != NULL) |
| 320 | { | 322 | { |
| @@ -346,7 +348,6 @@ int test_div(BIO *bp, BN_CTX *ctx) | |||
| 346 | { | 348 | { |
| 347 | BIGNUM a,b,c,d,e; | 349 | BIGNUM a,b,c,d,e; |
| 348 | int i; | 350 | int i; |
| 349 | int j; | ||
| 350 | 351 | ||
| 351 | BN_init(&a); | 352 | BN_init(&a); |
| 352 | BN_init(&b); | 353 | BN_init(&b); |
| @@ -367,9 +368,6 @@ int test_div(BIO *bp, BN_CTX *ctx) | |||
| 367 | BN_bntest_rand(&b,50+3*(i-num1),0,0); | 368 | BN_bntest_rand(&b,50+3*(i-num1),0,0); |
| 368 | a.neg=rand_neg(); | 369 | a.neg=rand_neg(); |
| 369 | b.neg=rand_neg(); | 370 | b.neg=rand_neg(); |
| 370 | if (bp == NULL) | ||
| 371 | for (j=0; j<100; j++) | ||
| 372 | BN_div(&d,&c,&a,&b,ctx); | ||
| 373 | BN_div(&d,&c,&a,&b,ctx); | 371 | BN_div(&d,&c,&a,&b,ctx); |
| 374 | if (bp != NULL) | 372 | if (bp != NULL) |
| 375 | { | 373 | { |
| @@ -415,7 +413,6 @@ int test_div_recp(BIO *bp, BN_CTX *ctx) | |||
| 415 | BIGNUM a,b,c,d,e; | 413 | BIGNUM a,b,c,d,e; |
| 416 | BN_RECP_CTX recp; | 414 | BN_RECP_CTX recp; |
| 417 | int i; | 415 | int i; |
| 418 | int j; | ||
| 419 | 416 | ||
| 420 | BN_RECP_CTX_init(&recp); | 417 | BN_RECP_CTX_init(&recp); |
| 421 | BN_init(&a); | 418 | BN_init(&a); |
| @@ -438,9 +435,6 @@ int test_div_recp(BIO *bp, BN_CTX *ctx) | |||
| 438 | a.neg=rand_neg(); | 435 | a.neg=rand_neg(); |
| 439 | b.neg=rand_neg(); | 436 | b.neg=rand_neg(); |
| 440 | BN_RECP_CTX_set(&recp,&b,ctx); | 437 | BN_RECP_CTX_set(&recp,&b,ctx); |
| 441 | if (bp == NULL) | ||
| 442 | for (j=0; j<100; j++) | ||
| 443 | BN_div_recp(&d,&c,&a,&recp,ctx); | ||
| 444 | BN_div_recp(&d,&c,&a,&recp,ctx); | 438 | BN_div_recp(&d,&c,&a,&recp,ctx); |
| 445 | if (bp != NULL) | 439 | if (bp != NULL) |
| 446 | { | 440 | { |
| @@ -491,10 +485,11 @@ int test_mul(BIO *bp) | |||
| 491 | { | 485 | { |
| 492 | BIGNUM a,b,c,d,e; | 486 | BIGNUM a,b,c,d,e; |
| 493 | int i; | 487 | int i; |
| 494 | int j; | 488 | BN_CTX *ctx; |
| 495 | BN_CTX ctx; | ||
| 496 | 489 | ||
| 497 | BN_CTX_init(&ctx); | 490 | ctx = BN_CTX_new(); |
| 491 | if (ctx == NULL) exit(1); | ||
| 492 | |||
| 498 | BN_init(&a); | 493 | BN_init(&a); |
| 499 | BN_init(&b); | 494 | BN_init(&b); |
| 500 | BN_init(&c); | 495 | BN_init(&c); |
| @@ -512,10 +507,7 @@ int test_mul(BIO *bp) | |||
| 512 | BN_bntest_rand(&b,i-num1,0,0); | 507 | BN_bntest_rand(&b,i-num1,0,0); |
| 513 | a.neg=rand_neg(); | 508 | a.neg=rand_neg(); |
| 514 | b.neg=rand_neg(); | 509 | b.neg=rand_neg(); |
| 515 | if (bp == NULL) | 510 | BN_mul(&c,&a,&b,ctx); |
| 516 | for (j=0; j<100; j++) | ||
| 517 | BN_mul(&c,&a,&b,&ctx); | ||
| 518 | BN_mul(&c,&a,&b,&ctx); | ||
| 519 | if (bp != NULL) | 511 | if (bp != NULL) |
| 520 | { | 512 | { |
| 521 | if (!results) | 513 | if (!results) |
| @@ -528,7 +520,7 @@ int test_mul(BIO *bp) | |||
| 528 | BN_print(bp,&c); | 520 | BN_print(bp,&c); |
| 529 | BIO_puts(bp,"\n"); | 521 | BIO_puts(bp,"\n"); |
| 530 | } | 522 | } |
| 531 | BN_div(&d,&e,&c,&a,&ctx); | 523 | BN_div(&d,&e,&c,&a,ctx); |
| 532 | BN_sub(&d,&d,&b); | 524 | BN_sub(&d,&d,&b); |
| 533 | if(!BN_is_zero(&d) || !BN_is_zero(&e)) | 525 | if(!BN_is_zero(&d) || !BN_is_zero(&e)) |
| 534 | { | 526 | { |
| @@ -541,7 +533,7 @@ int test_mul(BIO *bp) | |||
| 541 | BN_free(&c); | 533 | BN_free(&c); |
| 542 | BN_free(&d); | 534 | BN_free(&d); |
| 543 | BN_free(&e); | 535 | BN_free(&e); |
| 544 | BN_CTX_free(&ctx); | 536 | BN_CTX_free(ctx); |
| 545 | return(1); | 537 | return(1); |
| 546 | } | 538 | } |
| 547 | 539 | ||
| @@ -549,7 +541,6 @@ int test_sqr(BIO *bp, BN_CTX *ctx) | |||
| 549 | { | 541 | { |
| 550 | BIGNUM a,c,d,e; | 542 | BIGNUM a,c,d,e; |
| 551 | int i; | 543 | int i; |
| 552 | int j; | ||
| 553 | 544 | ||
| 554 | BN_init(&a); | 545 | BN_init(&a); |
| 555 | BN_init(&c); | 546 | BN_init(&c); |
| @@ -560,9 +551,6 @@ int test_sqr(BIO *bp, BN_CTX *ctx) | |||
| 560 | { | 551 | { |
| 561 | BN_bntest_rand(&a,40+i*10,0,0); | 552 | BN_bntest_rand(&a,40+i*10,0,0); |
| 562 | a.neg=rand_neg(); | 553 | a.neg=rand_neg(); |
| 563 | if (bp == NULL) | ||
| 564 | for (j=0; j<100; j++) | ||
| 565 | BN_sqr(&c,&a,ctx); | ||
| 566 | BN_sqr(&c,&a,ctx); | 554 | BN_sqr(&c,&a,ctx); |
| 567 | if (bp != NULL) | 555 | if (bp != NULL) |
| 568 | { | 556 | { |
| @@ -596,7 +584,6 @@ int test_mont(BIO *bp, BN_CTX *ctx) | |||
| 596 | BIGNUM a,b,c,d,A,B; | 584 | BIGNUM a,b,c,d,A,B; |
| 597 | BIGNUM n; | 585 | BIGNUM n; |
| 598 | int i; | 586 | int i; |
| 599 | int j; | ||
| 600 | BN_MONT_CTX *mont; | 587 | BN_MONT_CTX *mont; |
| 601 | 588 | ||
| 602 | BN_init(&a); | 589 | BN_init(&a); |
| @@ -620,12 +607,12 @@ int test_mont(BIO *bp, BN_CTX *ctx) | |||
| 620 | BN_bntest_rand(&n,bits,0,1); | 607 | BN_bntest_rand(&n,bits,0,1); |
| 621 | BN_MONT_CTX_set(mont,&n,ctx); | 608 | BN_MONT_CTX_set(mont,&n,ctx); |
| 622 | 609 | ||
| 610 | BN_nnmod(&a,&a,&n,ctx); | ||
| 611 | BN_nnmod(&b,&b,&n,ctx); | ||
| 612 | |||
| 623 | BN_to_montgomery(&A,&a,mont,ctx); | 613 | BN_to_montgomery(&A,&a,mont,ctx); |
| 624 | BN_to_montgomery(&B,&b,mont,ctx); | 614 | BN_to_montgomery(&B,&b,mont,ctx); |
| 625 | 615 | ||
| 626 | if (bp == NULL) | ||
| 627 | for (j=0; j<100; j++) | ||
| 628 | BN_mod_mul_montgomery(&c,&A,&B,mont,ctx);/**/ | ||
| 629 | BN_mod_mul_montgomery(&c,&A,&B,mont,ctx);/**/ | 616 | BN_mod_mul_montgomery(&c,&A,&B,mont,ctx);/**/ |
| 630 | BN_from_montgomery(&A,&c,mont,ctx);/**/ | 617 | BN_from_montgomery(&A,&c,mont,ctx);/**/ |
| 631 | if (bp != NULL) | 618 | if (bp != NULL) |
| @@ -671,7 +658,6 @@ int test_mod(BIO *bp, BN_CTX *ctx) | |||
| 671 | { | 658 | { |
| 672 | BIGNUM *a,*b,*c,*d,*e; | 659 | BIGNUM *a,*b,*c,*d,*e; |
| 673 | int i; | 660 | int i; |
| 674 | int j; | ||
| 675 | 661 | ||
| 676 | a=BN_new(); | 662 | a=BN_new(); |
| 677 | b=BN_new(); | 663 | b=BN_new(); |
| @@ -685,9 +671,6 @@ int test_mod(BIO *bp, BN_CTX *ctx) | |||
| 685 | BN_bntest_rand(b,450+i*10,0,0); /**/ | 671 | BN_bntest_rand(b,450+i*10,0,0); /**/ |
| 686 | a->neg=rand_neg(); | 672 | a->neg=rand_neg(); |
| 687 | b->neg=rand_neg(); | 673 | b->neg=rand_neg(); |
| 688 | if (bp == NULL) | ||
| 689 | for (j=0; j<100; j++) | ||
| 690 | BN_mod(c,a,b,ctx);/**/ | ||
| 691 | BN_mod(c,a,b,ctx);/**/ | 674 | BN_mod(c,a,b,ctx);/**/ |
| 692 | if (bp != NULL) | 675 | if (bp != NULL) |
| 693 | { | 676 | { |
| @@ -720,7 +703,7 @@ int test_mod(BIO *bp, BN_CTX *ctx) | |||
| 720 | int test_mod_mul(BIO *bp, BN_CTX *ctx) | 703 | int test_mod_mul(BIO *bp, BN_CTX *ctx) |
| 721 | { | 704 | { |
| 722 | BIGNUM *a,*b,*c,*d,*e; | 705 | BIGNUM *a,*b,*c,*d,*e; |
| 723 | int i; | 706 | int i,j; |
| 724 | 707 | ||
| 725 | a=BN_new(); | 708 | a=BN_new(); |
| 726 | b=BN_new(); | 709 | b=BN_new(); |
| @@ -728,6 +711,7 @@ int test_mod_mul(BIO *bp, BN_CTX *ctx) | |||
| 728 | d=BN_new(); | 711 | d=BN_new(); |
| 729 | e=BN_new(); | 712 | e=BN_new(); |
| 730 | 713 | ||
| 714 | for (j=0; j<3; j++) { | ||
| 731 | BN_bntest_rand(c,1024,0,0); /**/ | 715 | BN_bntest_rand(c,1024,0,0); /**/ |
| 732 | for (i=0; i<num0; i++) | 716 | for (i=0; i<num0; i++) |
| 733 | { | 717 | { |
| @@ -735,10 +719,6 @@ int test_mod_mul(BIO *bp, BN_CTX *ctx) | |||
| 735 | BN_bntest_rand(b,425+i*11,0,0); /**/ | 719 | BN_bntest_rand(b,425+i*11,0,0); /**/ |
| 736 | a->neg=rand_neg(); | 720 | a->neg=rand_neg(); |
| 737 | b->neg=rand_neg(); | 721 | b->neg=rand_neg(); |
| 738 | /* if (bp == NULL) | ||
| 739 | for (j=0; j<100; j++) | ||
| 740 | BN_mod_mul(d,a,b,c,ctx);*/ /**/ | ||
| 741 | |||
| 742 | if (!BN_mod_mul(e,a,b,c,ctx)) | 722 | if (!BN_mod_mul(e,a,b,c,ctx)) |
| 743 | { | 723 | { |
| 744 | unsigned long l; | 724 | unsigned long l; |
| @@ -757,6 +737,16 @@ int test_mod_mul(BIO *bp, BN_CTX *ctx) | |||
| 757 | BN_print(bp,b); | 737 | BN_print(bp,b); |
| 758 | BIO_puts(bp," % "); | 738 | BIO_puts(bp," % "); |
| 759 | BN_print(bp,c); | 739 | BN_print(bp,c); |
| 740 | if ((a->neg ^ b->neg) && !BN_is_zero(e)) | ||
| 741 | { | ||
| 742 | /* If (a*b) % c is negative, c must be added | ||
| 743 | * in order to obtain the normalized remainder | ||
| 744 | * (new with OpenSSL 0.9.7, previous versions of | ||
| 745 | * BN_mod_mul could generate negative results) | ||
| 746 | */ | ||
| 747 | BIO_puts(bp," + "); | ||
| 748 | BN_print(bp,c); | ||
| 749 | } | ||
| 760 | BIO_puts(bp," - "); | 750 | BIO_puts(bp," - "); |
| 761 | } | 751 | } |
| 762 | BN_print(bp,e); | 752 | BN_print(bp,e); |
| @@ -768,9 +758,11 @@ int test_mod_mul(BIO *bp, BN_CTX *ctx) | |||
| 768 | if(!BN_is_zero(b)) | 758 | if(!BN_is_zero(b)) |
| 769 | { | 759 | { |
| 770 | fprintf(stderr,"Modulo multiply test failed!\n"); | 760 | fprintf(stderr,"Modulo multiply test failed!\n"); |
| 761 | ERR_print_errors_fp(stderr); | ||
| 771 | return 0; | 762 | return 0; |
| 772 | } | 763 | } |
| 773 | } | 764 | } |
| 765 | } | ||
| 774 | BN_free(a); | 766 | BN_free(a); |
| 775 | BN_free(b); | 767 | BN_free(b); |
| 776 | BN_free(c); | 768 | BN_free(c); |
| @@ -880,6 +872,183 @@ int test_exp(BIO *bp, BN_CTX *ctx) | |||
| 880 | return(1); | 872 | return(1); |
| 881 | } | 873 | } |
| 882 | 874 | ||
| 875 | static void genprime_cb(int p, int n, void *arg) | ||
| 876 | { | ||
| 877 | char c='*'; | ||
| 878 | |||
| 879 | if (p == 0) c='.'; | ||
| 880 | if (p == 1) c='+'; | ||
| 881 | if (p == 2) c='*'; | ||
| 882 | if (p == 3) c='\n'; | ||
| 883 | putc(c, stderr); | ||
| 884 | fflush(stderr); | ||
| 885 | (void)n; | ||
| 886 | (void)arg; | ||
| 887 | } | ||
| 888 | |||
| 889 | int test_kron(BIO *bp, BN_CTX *ctx) | ||
| 890 | { | ||
| 891 | BIGNUM *a,*b,*r,*t; | ||
| 892 | int i; | ||
| 893 | int legendre, kronecker; | ||
| 894 | int ret = 0; | ||
| 895 | |||
| 896 | a = BN_new(); | ||
| 897 | b = BN_new(); | ||
| 898 | r = BN_new(); | ||
| 899 | t = BN_new(); | ||
| 900 | if (a == NULL || b == NULL || r == NULL || t == NULL) goto err; | ||
| 901 | |||
| 902 | /* We test BN_kronecker(a, b, ctx) just for b odd (Jacobi symbol). | ||
| 903 | * In this case we know that if b is prime, then BN_kronecker(a, b, ctx) | ||
| 904 | * is congruent to $a^{(b-1)/2}$, modulo $b$ (Legendre symbol). | ||
| 905 | * So we generate a random prime b and compare these values | ||
| 906 | * for a number of random a's. (That is, we run the Solovay-Strassen | ||
| 907 | * primality test to confirm that b is prime, except that we | ||
| 908 | * don't want to test whether b is prime but whether BN_kronecker | ||
| 909 | * works.) */ | ||
| 910 | |||
| 911 | if (!BN_generate_prime(b, 512, 0, NULL, NULL, genprime_cb, NULL)) goto err; | ||
| 912 | b->neg = rand_neg(); | ||
| 913 | putc('\n', stderr); | ||
| 914 | |||
| 915 | for (i = 0; i < num0; i++) | ||
| 916 | { | ||
| 917 | if (!BN_bntest_rand(a, 512, 0, 0)) goto err; | ||
| 918 | a->neg = rand_neg(); | ||
| 919 | |||
| 920 | /* t := (|b|-1)/2 (note that b is odd) */ | ||
| 921 | if (!BN_copy(t, b)) goto err; | ||
| 922 | t->neg = 0; | ||
| 923 | if (!BN_sub_word(t, 1)) goto err; | ||
| 924 | if (!BN_rshift1(t, t)) goto err; | ||
| 925 | /* r := a^t mod b */ | ||
| 926 | b->neg=0; | ||
| 927 | |||
| 928 | if (!BN_mod_exp_recp(r, a, t, b, ctx)) goto err; /* XXX should be BN_mod_exp_recp, but ..._recp triggers a bug that must be fixed */ | ||
| 929 | b->neg=1; | ||
| 930 | |||
| 931 | if (BN_is_word(r, 1)) | ||
| 932 | legendre = 1; | ||
| 933 | else if (BN_is_zero(r)) | ||
| 934 | legendre = 0; | ||
| 935 | else | ||
| 936 | { | ||
| 937 | if (!BN_add_word(r, 1)) goto err; | ||
| 938 | if (0 != BN_ucmp(r, b)) | ||
| 939 | { | ||
| 940 | fprintf(stderr, "Legendre symbol computation failed\n"); | ||
| 941 | goto err; | ||
| 942 | } | ||
| 943 | legendre = -1; | ||
| 944 | } | ||
| 945 | |||
| 946 | kronecker = BN_kronecker(a, b, ctx); | ||
| 947 | if (kronecker < -1) goto err; | ||
| 948 | /* we actually need BN_kronecker(a, |b|) */ | ||
| 949 | if (a->neg && b->neg) | ||
| 950 | kronecker = -kronecker; | ||
| 951 | |||
| 952 | if (legendre != kronecker) | ||
| 953 | { | ||
| 954 | fprintf(stderr, "legendre != kronecker; a = "); | ||
| 955 | BN_print_fp(stderr, a); | ||
| 956 | fprintf(stderr, ", b = "); | ||
| 957 | BN_print_fp(stderr, b); | ||
| 958 | fprintf(stderr, "\n"); | ||
| 959 | goto err; | ||
| 960 | } | ||
| 961 | |||
| 962 | putc('.', stderr); | ||
| 963 | fflush(stderr); | ||
| 964 | } | ||
| 965 | |||
| 966 | putc('\n', stderr); | ||
| 967 | fflush(stderr); | ||
| 968 | ret = 1; | ||
| 969 | err: | ||
| 970 | if (a != NULL) BN_free(a); | ||
| 971 | if (b != NULL) BN_free(b); | ||
| 972 | if (r != NULL) BN_free(r); | ||
| 973 | if (t != NULL) BN_free(t); | ||
| 974 | return ret; | ||
| 975 | } | ||
| 976 | |||
| 977 | int test_sqrt(BIO *bp, BN_CTX *ctx) | ||
| 978 | { | ||
| 979 | BIGNUM *a,*p,*r; | ||
| 980 | int i, j; | ||
| 981 | int ret = 0; | ||
| 982 | |||
| 983 | a = BN_new(); | ||
| 984 | p = BN_new(); | ||
| 985 | r = BN_new(); | ||
| 986 | if (a == NULL || p == NULL || r == NULL) goto err; | ||
| 987 | |||
| 988 | for (i = 0; i < 16; i++) | ||
| 989 | { | ||
| 990 | if (i < 8) | ||
| 991 | { | ||
| 992 | unsigned primes[8] = { 2, 3, 5, 7, 11, 13, 17, 19 }; | ||
| 993 | |||
| 994 | if (!BN_set_word(p, primes[i])) goto err; | ||
| 995 | } | ||
| 996 | else | ||
| 997 | { | ||
| 998 | if (!BN_set_word(a, 32)) goto err; | ||
| 999 | if (!BN_set_word(r, 2*i + 1)) goto err; | ||
| 1000 | |||
| 1001 | if (!BN_generate_prime(p, 256, 0, a, r, genprime_cb, NULL)) goto err; | ||
| 1002 | putc('\n', stderr); | ||
| 1003 | } | ||
| 1004 | p->neg = rand_neg(); | ||
| 1005 | |||
| 1006 | for (j = 0; j < num2; j++) | ||
| 1007 | { | ||
| 1008 | /* construct 'a' such that it is a square modulo p, | ||
| 1009 | * but in general not a proper square and not reduced modulo p */ | ||
| 1010 | if (!BN_bntest_rand(r, 256, 0, 3)) goto err; | ||
| 1011 | if (!BN_nnmod(r, r, p, ctx)) goto err; | ||
| 1012 | if (!BN_mod_sqr(r, r, p, ctx)) goto err; | ||
| 1013 | if (!BN_bntest_rand(a, 256, 0, 3)) goto err; | ||
| 1014 | if (!BN_nnmod(a, a, p, ctx)) goto err; | ||
| 1015 | if (!BN_mod_sqr(a, a, p, ctx)) goto err; | ||
| 1016 | if (!BN_mul(a, a, r, ctx)) goto err; | ||
| 1017 | if (rand_neg()) | ||
| 1018 | if (!BN_sub(a, a, p)) goto err; | ||
| 1019 | |||
| 1020 | if (!BN_mod_sqrt(r, a, p, ctx)) goto err; | ||
| 1021 | if (!BN_mod_sqr(r, r, p, ctx)) goto err; | ||
| 1022 | |||
| 1023 | if (!BN_nnmod(a, a, p, ctx)) goto err; | ||
| 1024 | |||
| 1025 | if (BN_cmp(a, r) != 0) | ||
| 1026 | { | ||
| 1027 | fprintf(stderr, "BN_mod_sqrt failed: a = "); | ||
| 1028 | BN_print_fp(stderr, a); | ||
| 1029 | fprintf(stderr, ", r = "); | ||
| 1030 | BN_print_fp(stderr, r); | ||
| 1031 | fprintf(stderr, ", p = "); | ||
| 1032 | BN_print_fp(stderr, p); | ||
| 1033 | fprintf(stderr, "\n"); | ||
| 1034 | goto err; | ||
| 1035 | } | ||
| 1036 | |||
| 1037 | putc('.', stderr); | ||
| 1038 | fflush(stderr); | ||
| 1039 | } | ||
| 1040 | |||
| 1041 | putc('\n', stderr); | ||
| 1042 | fflush(stderr); | ||
| 1043 | } | ||
| 1044 | ret = 1; | ||
| 1045 | err: | ||
| 1046 | if (a != NULL) BN_free(a); | ||
| 1047 | if (p != NULL) BN_free(p); | ||
| 1048 | if (r != NULL) BN_free(r); | ||
| 1049 | return ret; | ||
| 1050 | } | ||
| 1051 | |||
| 883 | int test_lshift(BIO *bp,BN_CTX *ctx,BIGNUM *a_) | 1052 | int test_lshift(BIO *bp,BN_CTX *ctx,BIGNUM *a_) |
| 884 | { | 1053 | { |
| 885 | BIGNUM *a,*b,*c,*d; | 1054 | BIGNUM *a,*b,*c,*d; |
| @@ -1052,7 +1221,7 @@ int test_rshift1(BIO *bp) | |||
| 1052 | } | 1221 | } |
| 1053 | BN_sub(c,a,b); | 1222 | BN_sub(c,a,b); |
| 1054 | BN_sub(c,c,b); | 1223 | BN_sub(c,c,b); |
| 1055 | if(!BN_is_zero(c) && !BN_is_one(c)) | 1224 | if(!BN_is_zero(c) && !BN_abs_is_word(c, 1)) |
| 1056 | { | 1225 | { |
| 1057 | fprintf(stderr,"Right shift one test failed!\n"); | 1226 | fprintf(stderr,"Right shift one test failed!\n"); |
| 1058 | return 0; | 1227 | return 0; |
diff --git a/src/lib/libcrypto/bn/expspeed.c b/src/lib/libcrypto/bn/expspeed.c index 2044ab9bff..07a1bcf51c 100644 --- a/src/lib/libcrypto/bn/expspeed.c +++ b/src/lib/libcrypto/bn/expspeed.c | |||
| @@ -61,6 +61,31 @@ | |||
| 61 | /* most of this code has been pilfered from my libdes speed.c program */ | 61 | /* most of this code has been pilfered from my libdes speed.c program */ |
| 62 | 62 | ||
| 63 | #define BASENUM 5000 | 63 | #define BASENUM 5000 |
| 64 | #define NUM_START 0 | ||
| 65 | |||
| 66 | |||
| 67 | /* determine timings for modexp, modmul, modsqr, gcd, Kronecker symbol, | ||
| 68 | * modular inverse, or modular square roots */ | ||
| 69 | #define TEST_EXP | ||
| 70 | #undef TEST_MUL | ||
| 71 | #undef TEST_SQR | ||
| 72 | #undef TEST_GCD | ||
| 73 | #undef TEST_KRON | ||
| 74 | #undef TEST_INV | ||
| 75 | #undef TEST_SQRT | ||
| 76 | #define P_MOD_64 9 /* least significant 6 bits for prime to be used for BN_sqrt timings */ | ||
| 77 | |||
| 78 | #if defined(TEST_EXP) + defined(TEST_MUL) + defined(TEST_SQR) + defined(TEST_GCD) + defined(TEST_KRON) + defined(TEST_INV) +defined(TEST_SQRT) != 1 | ||
| 79 | # error "choose one test" | ||
| 80 | #endif | ||
| 81 | |||
| 82 | #if defined(TEST_INV) || defined(TEST_SQRT) | ||
| 83 | # define C_PRIME | ||
| 84 | static void genprime_cb(int p, int n, void *arg); | ||
| 85 | #endif | ||
| 86 | |||
| 87 | |||
| 88 | |||
| 64 | #undef PROG | 89 | #undef PROG |
| 65 | #define PROG bnspeed_main | 90 | #define PROG bnspeed_main |
| 66 | 91 | ||
| @@ -70,8 +95,9 @@ | |||
| 70 | #include <string.h> | 95 | #include <string.h> |
| 71 | #include <openssl/crypto.h> | 96 | #include <openssl/crypto.h> |
| 72 | #include <openssl/err.h> | 97 | #include <openssl/err.h> |
| 98 | #include <openssl/rand.h> | ||
| 73 | 99 | ||
| 74 | #if !defined(MSDOS) && (!defined(VMS) || defined(__DECC)) | 100 | #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX) |
| 75 | #define TIMES | 101 | #define TIMES |
| 76 | #endif | 102 | #endif |
| 77 | 103 | ||
| @@ -87,7 +113,7 @@ | |||
| 87 | The __TMS macro will show if it was. If it wasn't defined, we should | 113 | The __TMS macro will show if it was. If it wasn't defined, we should |
| 88 | undefine TIMES, since that tells the rest of the program how things | 114 | undefine TIMES, since that tells the rest of the program how things |
| 89 | should be handled. -- Richard Levitte */ | 115 | should be handled. -- Richard Levitte */ |
| 90 | #if defined(VMS) && defined(__DECC) && !defined(__TMS) | 116 | #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS) |
| 91 | #undef TIMES | 117 | #undef TIMES |
| 92 | #endif | 118 | #endif |
| 93 | 119 | ||
| @@ -161,11 +187,16 @@ static double Time_F(int s) | |||
| 161 | #endif | 187 | #endif |
| 162 | } | 188 | } |
| 163 | 189 | ||
| 164 | #define NUM_SIZES 6 | 190 | #define NUM_SIZES 7 |
| 165 | static int sizes[NUM_SIZES]={256,512,1024,2048,4096,8192}; | 191 | #if NUM_START > NUM_SIZES |
| 166 | static int mul_c[NUM_SIZES]={8*8*8*8*8,8*8*8*8,8*8*8,8*8,8,1}; | 192 | # error "NUM_START > NUM_SIZES" |
| 193 | #endif | ||
| 194 | static int sizes[NUM_SIZES]={128,256,512,1024,2048,4096,8192}; | ||
| 195 | static int mul_c[NUM_SIZES]={8*8*8*8*8*8,8*8*8*8*8,8*8*8*8,8*8*8,8*8,8,1}; | ||
| 167 | /*static int sizes[NUM_SIZES]={59,179,299,419,539}; */ | 196 | /*static int sizes[NUM_SIZES]={59,179,299,419,539}; */ |
| 168 | 197 | ||
| 198 | #define RAND_SEED(string) { const char str[] = string; RAND_seed(string, sizeof str); } | ||
| 199 | |||
| 169 | void do_mul_exp(BIGNUM *r,BIGNUM *a,BIGNUM *b,BIGNUM *c,BN_CTX *ctx); | 200 | void do_mul_exp(BIGNUM *r,BIGNUM *a,BIGNUM *b,BIGNUM *c,BN_CTX *ctx); |
| 170 | 201 | ||
| 171 | int main(int argc, char **argv) | 202 | int main(int argc, char **argv) |
| @@ -173,13 +204,23 @@ int main(int argc, char **argv) | |||
| 173 | BN_CTX *ctx; | 204 | BN_CTX *ctx; |
| 174 | BIGNUM *a,*b,*c,*r; | 205 | BIGNUM *a,*b,*c,*r; |
| 175 | 206 | ||
| 207 | #if 1 | ||
| 208 | if (!CRYPTO_set_mem_debug_functions(0,0,0,0,0)) | ||
| 209 | abort(); | ||
| 210 | #endif | ||
| 211 | |||
| 176 | ctx=BN_CTX_new(); | 212 | ctx=BN_CTX_new(); |
| 177 | a=BN_new(); | 213 | a=BN_new(); |
| 178 | b=BN_new(); | 214 | b=BN_new(); |
| 179 | c=BN_new(); | 215 | c=BN_new(); |
| 180 | r=BN_new(); | 216 | r=BN_new(); |
| 181 | 217 | ||
| 218 | while (!RAND_status()) | ||
| 219 | /* not enough bits */ | ||
| 220 | RAND_SEED("I demand a manual recount!"); | ||
| 221 | |||
| 182 | do_mul_exp(r,a,b,c,ctx); | 222 | do_mul_exp(r,a,b,c,ctx); |
| 223 | return 0; | ||
| 183 | } | 224 | } |
| 184 | 225 | ||
| 185 | void do_mul_exp(BIGNUM *r, BIGNUM *a, BIGNUM *b, BIGNUM *c, BN_CTX *ctx) | 226 | void do_mul_exp(BIGNUM *r, BIGNUM *a, BIGNUM *b, BIGNUM *c, BN_CTX *ctx) |
| @@ -187,29 +228,126 @@ void do_mul_exp(BIGNUM *r, BIGNUM *a, BIGNUM *b, BIGNUM *c, BN_CTX *ctx) | |||
| 187 | int i,k; | 228 | int i,k; |
| 188 | double tm; | 229 | double tm; |
| 189 | long num; | 230 | long num; |
| 190 | BN_MONT_CTX m; | ||
| 191 | |||
| 192 | memset(&m,0,sizeof(m)); | ||
| 193 | 231 | ||
| 194 | num=BASENUM; | 232 | num=BASENUM; |
| 195 | for (i=0; i<NUM_SIZES; i++) | 233 | for (i=NUM_START; i<NUM_SIZES; i++) |
| 196 | { | 234 | { |
| 197 | BN_rand(a,sizes[i],1,0); | 235 | #ifdef C_PRIME |
| 198 | BN_rand(b,sizes[i],1,0); | 236 | # ifdef TEST_SQRT |
| 199 | BN_rand(c,sizes[i],1,1); | 237 | if (!BN_set_word(a, 64)) goto err; |
| 200 | BN_mod(a,a,c,ctx); | 238 | if (!BN_set_word(b, P_MOD_64)) goto err; |
| 201 | BN_mod(b,b,c,ctx); | 239 | # define ADD a |
| 202 | 240 | # define REM b | |
| 203 | BN_MONT_CTX_set(&m,c,ctx); | 241 | # else |
| 242 | # define ADD NULL | ||
| 243 | # define REM NULL | ||
| 244 | # endif | ||
| 245 | if (!BN_generate_prime(c,sizes[i],0,ADD,REM,genprime_cb,NULL)) goto err; | ||
| 246 | putc('\n', stderr); | ||
| 247 | fflush(stderr); | ||
| 248 | #endif | ||
| 204 | 249 | ||
| 205 | Time_F(START); | ||
| 206 | for (k=0; k<num; k++) | 250 | for (k=0; k<num; k++) |
| 207 | BN_mod_exp_mont(r,a,b,c,ctx,&m); | 251 | { |
| 252 | if (k%50 == 0) /* Average over num/50 different choices of random numbers. */ | ||
| 253 | { | ||
| 254 | if (!BN_pseudo_rand(a,sizes[i],1,0)) goto err; | ||
| 255 | |||
| 256 | if (!BN_pseudo_rand(b,sizes[i],1,0)) goto err; | ||
| 257 | |||
| 258 | #ifndef C_PRIME | ||
| 259 | if (!BN_pseudo_rand(c,sizes[i],1,1)) goto err; | ||
| 260 | #endif | ||
| 261 | |||
| 262 | #ifdef TEST_SQRT | ||
| 263 | if (!BN_mod_sqr(a,a,c,ctx)) goto err; | ||
| 264 | if (!BN_mod_sqr(b,b,c,ctx)) goto err; | ||
| 265 | #else | ||
| 266 | if (!BN_nnmod(a,a,c,ctx)) goto err; | ||
| 267 | if (!BN_nnmod(b,b,c,ctx)) goto err; | ||
| 268 | #endif | ||
| 269 | |||
| 270 | if (k == 0) | ||
| 271 | Time_F(START); | ||
| 272 | } | ||
| 273 | |||
| 274 | #if defined(TEST_EXP) | ||
| 275 | if (!BN_mod_exp(r,a,b,c,ctx)) goto err; | ||
| 276 | #elif defined(TEST_MUL) | ||
| 277 | { | ||
| 278 | int i = 0; | ||
| 279 | for (i = 0; i < 50; i++) | ||
| 280 | if (!BN_mod_mul(r,a,b,c,ctx)) goto err; | ||
| 281 | } | ||
| 282 | #elif defined(TEST_SQR) | ||
| 283 | { | ||
| 284 | int i = 0; | ||
| 285 | for (i = 0; i < 50; i++) | ||
| 286 | { | ||
| 287 | if (!BN_mod_sqr(r,a,c,ctx)) goto err; | ||
| 288 | if (!BN_mod_sqr(r,b,c,ctx)) goto err; | ||
| 289 | } | ||
| 290 | } | ||
| 291 | #elif defined(TEST_GCD) | ||
| 292 | if (!BN_gcd(r,a,b,ctx)) goto err; | ||
| 293 | if (!BN_gcd(r,b,c,ctx)) goto err; | ||
| 294 | if (!BN_gcd(r,c,a,ctx)) goto err; | ||
| 295 | #elif defined(TEST_KRON) | ||
| 296 | if (-2 == BN_kronecker(a,b,ctx)) goto err; | ||
| 297 | if (-2 == BN_kronecker(b,c,ctx)) goto err; | ||
| 298 | if (-2 == BN_kronecker(c,a,ctx)) goto err; | ||
| 299 | #elif defined(TEST_INV) | ||
| 300 | if (!BN_mod_inverse(r,a,c,ctx)) goto err; | ||
| 301 | if (!BN_mod_inverse(r,b,c,ctx)) goto err; | ||
| 302 | #else /* TEST_SQRT */ | ||
| 303 | if (!BN_mod_sqrt(r,a,c,ctx)) goto err; | ||
| 304 | if (!BN_mod_sqrt(r,b,c,ctx)) goto err; | ||
| 305 | #endif | ||
| 306 | } | ||
| 208 | tm=Time_F(STOP); | 307 | tm=Time_F(STOP); |
| 209 | printf("mul %4d ^ %4d %% %d -> %8.3fms %5.1f\n",sizes[i],sizes[i],sizes[i],tm*1000.0/num,tm*mul_c[i]/num); | 308 | printf( |
| 309 | #if defined(TEST_EXP) | ||
| 310 | "modexp %4d ^ %4d %% %4d" | ||
| 311 | #elif defined(TEST_MUL) | ||
| 312 | "50*modmul %4d %4d %4d" | ||
| 313 | #elif defined(TEST_SQR) | ||
| 314 | "100*modsqr %4d %4d %4d" | ||
| 315 | #elif defined(TEST_GCD) | ||
| 316 | "3*gcd %4d %4d %4d" | ||
| 317 | #elif defined(TEST_KRON) | ||
| 318 | "3*kronecker %4d %4d %4d" | ||
| 319 | #elif defined(TEST_INV) | ||
| 320 | "2*inv %4d %4d mod %4d" | ||
| 321 | #else /* TEST_SQRT */ | ||
| 322 | "2*sqrt [prime == %d (mod 64)] %4d %4d mod %4d" | ||
| 323 | #endif | ||
| 324 | " -> %8.3fms %5.1f (%ld)\n", | ||
| 325 | #ifdef TEST_SQRT | ||
| 326 | P_MOD_64, | ||
| 327 | #endif | ||
| 328 | sizes[i],sizes[i],sizes[i],tm*1000.0/num,tm*mul_c[i]/num, num); | ||
| 210 | num/=7; | 329 | num/=7; |
| 211 | if (num <= 0) num=1; | 330 | if (num <= 0) num=1; |
| 212 | } | 331 | } |
| 332 | return; | ||
| 213 | 333 | ||
| 334 | err: | ||
| 335 | ERR_print_errors_fp(stderr); | ||
| 214 | } | 336 | } |
| 215 | 337 | ||
| 338 | |||
| 339 | #ifdef C_PRIME | ||
| 340 | static void genprime_cb(int p, int n, void *arg) | ||
| 341 | { | ||
| 342 | char c='*'; | ||
| 343 | |||
| 344 | if (p == 0) c='.'; | ||
| 345 | if (p == 1) c='+'; | ||
| 346 | if (p == 2) c='*'; | ||
| 347 | if (p == 3) c='\n'; | ||
| 348 | putc(c, stderr); | ||
| 349 | fflush(stderr); | ||
| 350 | (void)n; | ||
| 351 | (void)arg; | ||
| 352 | } | ||
| 353 | #endif | ||
diff --git a/src/lib/libcrypto/bn/exptest.c b/src/lib/libcrypto/bn/exptest.c index 3e86f2ea0e..5ca570d1a8 100644 --- a/src/lib/libcrypto/bn/exptest.c +++ b/src/lib/libcrypto/bn/exptest.c | |||
| @@ -63,7 +63,7 @@ | |||
| 63 | #include <openssl/bn.h> | 63 | #include <openssl/bn.h> |
| 64 | #include <openssl/rand.h> | 64 | #include <openssl/rand.h> |
| 65 | #include <openssl/err.h> | 65 | #include <openssl/err.h> |
| 66 | #ifdef WINDOWS | 66 | #ifdef OPENSSL_SYS_WINDOWS |
| 67 | #include "../bio/bss_file.c" | 67 | #include "../bio/bss_file.c" |
| 68 | #endif | 68 | #endif |
| 69 | 69 | ||
diff --git a/src/lib/libcrypto/bn/vms-helper.c b/src/lib/libcrypto/bn/vms-helper.c index 0fa79c4edb..4b63149bf3 100644 --- a/src/lib/libcrypto/bn/vms-helper.c +++ b/src/lib/libcrypto/bn/vms-helper.c | |||
| @@ -60,7 +60,7 @@ | |||
| 60 | bn_div_words_abort(int i) | 60 | bn_div_words_abort(int i) |
| 61 | { | 61 | { |
| 62 | #ifdef BN_DEBUG | 62 | #ifdef BN_DEBUG |
| 63 | #if !defined(NO_STDIO) && !defined(WIN16) | 63 | #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) |
| 64 | fprintf(stderr,"Division would overflow (%d)\n",i); | 64 | fprintf(stderr,"Division would overflow (%d)\n",i); |
| 65 | #endif | 65 | #endif |
| 66 | abort(); | 66 | abort(); |
