2 * FILE: d0_bignum-tommath.c
3 * AUTHOR: Rudolf Polzer - divVerent@xonotic.org
5 * Copyright (c) 2010, Rudolf Polzer
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41 #include "d0_bignum.h"
53 static d0_bignum_t temp;
54 static unsigned char numbuf[65536];
55 static void *tempmutex = NULL; // hold this mutex when using temp or numbuf
60 HCRYPTPROV hCryptProv;
65 void rand_bytes(unsigned char *buf, size_t n)
68 CryptGenRandom(hCryptProv, n, (PBYTE) buf);
72 fread(buf, 1, n, randf);
76 D0_WARN_UNUSED_RESULT D0_BOOL d0_bignum_INITIALIZE(void)
79 unsigned char buf[256];
81 tempmutex = d0_createmutex();
82 d0_lockmutex(tempmutex);
84 d0_bignum_init(&temp);
87 if(CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT))
90 else if(CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_NEWKEYSET))
95 fprintf(stderr, "WARNING: could not initialize random number generator (CryptAcquireContext failed)\n");
101 randf = fopen("/dev/urandom", "rb");
103 randf = fopen("/dev/random", "rb");
110 fprintf(stderr, "WARNING: could not initialize random number generator (no random device found)\n");
115 d0_unlockmutex(tempmutex);
120 void d0_bignum_SHUTDOWN(void)
122 d0_lockmutex(tempmutex);
124 d0_bignum_clear(&temp);
128 CryptReleaseContext(hCryptProv, 0);
133 d0_unlockmutex(tempmutex);
134 d0_destroymutex(tempmutex);
138 D0_BOOL d0_iobuf_write_bignum(d0_iobuf_t *buf, const d0_bignum_t *bignum)
143 d0_lockmutex(tempmutex);
144 numbuf[0] = (mp_iszero(&bignum->z) ? 0 : (bignum->z.sign == MP_ZPOS) ? 1 : 3);
145 if((numbuf[0] & 3) != 0) // nonzero
147 count = mp_unsigned_bin_size((mp_int *) &bignum->z);
148 if(count > sizeof(numbuf) - 1)
150 d0_unlockmutex(tempmutex);
153 mp_to_unsigned_bin((mp_int *) &bignum->z, numbuf+1);
155 ret = d0_iobuf_write_packet(buf, numbuf, count + 1);
156 d0_unlockmutex(tempmutex);
160 d0_bignum_t *d0_iobuf_read_bignum(d0_iobuf_t *buf, d0_bignum_t *bignum)
162 size_t count = sizeof(numbuf);
163 d0_lockmutex(tempmutex);
164 if(!d0_iobuf_read_packet(buf, numbuf, &count))
166 d0_unlockmutex(tempmutex);
171 d0_unlockmutex(tempmutex);
175 bignum = d0_bignum_new();
178 d0_unlockmutex(tempmutex);
181 if(numbuf[0] & 3) // nonzero
183 mp_read_unsigned_bin(&bignum->z, numbuf+1, count-1);
184 if(numbuf[0] & 2) // negative
185 bignum->z.sign = MP_NEG;
191 d0_unlockmutex(tempmutex);
195 ssize_t d0_bignum_export_unsigned(const d0_bignum_t *bignum, void *buf, size_t bufsize)
197 unsigned long bufsize_;
199 count = mp_unsigned_bin_size((mp_int *) &bignum->z);
204 // pad from left (big endian numbers!)
205 memset(buf, 0, bufsize - count);
206 buf += bufsize - count;
209 mp_to_unsigned_bin_n((mp_int *) &bignum->z, buf, &bufsize_);
214 // mpz_sizeinbase lied to us
216 // there is no sane way whatsoever to handle this
222 // mpz_sizeinbase lied to us
226 memset(buf, 0, count);
230 memmove(buf + count - bufsize, buf, bufsize);
231 memset(buf, 0, count - bufsize);
237 d0_bignum_t *d0_bignum_import_unsigned(d0_bignum_t *bignum, const void *buf, size_t bufsize)
240 if(!bignum) bignum = d0_bignum_new(); if(!bignum) return NULL;
241 mp_read_unsigned_bin(&bignum->z, buf, bufsize);
245 d0_bignum_t *d0_bignum_new(void)
247 d0_bignum_t *b = d0_malloc(sizeof(d0_bignum_t));
252 void d0_bignum_free(d0_bignum_t *a)
258 void d0_bignum_init(d0_bignum_t *b)
263 void d0_bignum_clear(d0_bignum_t *a)
268 size_t d0_bignum_size(const d0_bignum_t *r)
270 return mp_count_bits((mp_int *) &r->z);
273 int d0_bignum_cmp(const d0_bignum_t *a, const d0_bignum_t *b)
275 return mp_cmp((mp_int *) &a->z, (mp_int *) &b->z);
278 static d0_bignum_t *d0_bignum_rand_0_to_limit(d0_bignum_t *r, const d0_bignum_t *limit)
280 size_t n = d0_bignum_size(limit);
281 size_t b = (n + 7) / 8;
282 unsigned char mask = "\xFF\x7F\x3F\x1F\x0F\x07\x03\x01"[8*b - n];
283 assert(b <= sizeof(numbuf));
284 d0_lockmutex(tempmutex);
287 rand_bytes(numbuf, b);
289 r = d0_bignum_import_unsigned(r, numbuf, b);
290 if(d0_bignum_cmp(r, limit) < 0)
292 d0_unlockmutex(tempmutex);
298 d0_bignum_t *d0_bignum_rand_range(d0_bignum_t *r, const d0_bignum_t *min, const d0_bignum_t *max)
300 d0_lockmutex(tempmutex);
301 mp_sub((mp_int *) &max->z, (mp_int *) &min->z, &temp.z);
302 r = d0_bignum_rand_0_to_limit(r, &temp);
303 d0_unlockmutex(tempmutex);
304 mp_add((mp_int *) &r->z, (mp_int *) &min->z, &r->z);
308 d0_bignum_t *d0_bignum_rand_bit_atmost(d0_bignum_t *r, size_t n)
310 d0_lockmutex(tempmutex);
311 if(!d0_bignum_one(&temp))
313 d0_unlockmutex(tempmutex);
316 if(!d0_bignum_shl(&temp, &temp, n))
318 d0_unlockmutex(tempmutex);
321 r = d0_bignum_rand_0_to_limit(r, &temp);
322 d0_unlockmutex(tempmutex);
326 d0_bignum_t *d0_bignum_rand_bit_exact(d0_bignum_t *r, size_t n)
328 d0_lockmutex(tempmutex);
329 if(!d0_bignum_one(&temp))
331 d0_unlockmutex(tempmutex);
334 if(!d0_bignum_shl(&temp, &temp, n-1))
336 d0_unlockmutex(tempmutex);
339 r = d0_bignum_rand_0_to_limit(r, &temp);
340 if(!d0_bignum_add(r, r, &temp))
342 d0_unlockmutex(tempmutex);
345 d0_unlockmutex(tempmutex);
349 d0_bignum_t *d0_bignum_zero(d0_bignum_t *r)
351 if(!r) r = d0_bignum_new(); if(!r) return NULL;
356 d0_bignum_t *d0_bignum_one(d0_bignum_t *r)
358 return d0_bignum_int(r, 1);
361 d0_bignum_t *d0_bignum_int(d0_bignum_t *r, int n)
363 if(!r) r = d0_bignum_new(); if(!r) return NULL;
364 mp_set_int(&r->z, n);
368 d0_bignum_t *d0_bignum_mov(d0_bignum_t *r, const d0_bignum_t *a)
372 if(!r) r = d0_bignum_new(); if(!r) return NULL;
373 mp_copy((mp_int *) &a->z, &r->z);
377 d0_bignum_t *d0_bignum_neg(d0_bignum_t *r, const d0_bignum_t *a)
379 if(!r) r = d0_bignum_new(); if(!r) return NULL;
380 mp_neg((mp_int *) &a->z, &r->z);
384 d0_bignum_t *d0_bignum_shl(d0_bignum_t *r, const d0_bignum_t *a, ssize_t n)
386 if(!r) r = d0_bignum_new(); if(!r) return NULL;
388 mp_mul_2d((mp_int *) &a->z, n, &r->z);
390 mp_div_2d((mp_int *) &a->z, -n, &r->z, NULL);
392 mp_copy((mp_int *) &a->z, &r->z);
396 d0_bignum_t *d0_bignum_add(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
398 if(!r) r = d0_bignum_new(); if(!r) return NULL;
399 mp_add((mp_int *) &a->z, (mp_int *) &b->z, &r->z);
403 d0_bignum_t *d0_bignum_sub(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
405 if(!r) r = d0_bignum_new(); if(!r) return NULL;
406 mp_sub((mp_int *) &a->z, (mp_int *) &b->z, &r->z);
410 d0_bignum_t *d0_bignum_mul(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
412 if(!r) r = d0_bignum_new(); if(!r) return NULL;
413 mp_mul((mp_int *) &a->z, (mp_int *) &b->z, &r->z);
417 d0_bignum_t *d0_bignum_divmod(d0_bignum_t *q, d0_bignum_t *m, const d0_bignum_t *a, const d0_bignum_t *b)
422 mp_div((mp_int *) &a->z, (mp_int *) &b->z, &q->z, m ? &m->z : NULL);
424 mp_mod((mp_int *) &a->z, (mp_int *) &b->z, &m->z);
431 d0_bignum_t *d0_bignum_mod_add(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
433 if(!r) r = d0_bignum_new(); if(!r) return NULL;
434 mp_addmod((mp_int *) &a->z, (mp_int *) &b->z, (mp_int *) &m->z, &r->z);
438 d0_bignum_t *d0_bignum_mod_sub(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
440 if(!r) r = d0_bignum_new(); if(!r) return NULL;
441 mp_submod((mp_int *) &a->z, (mp_int *) &b->z, (mp_int *) &m->z, &r->z);
445 d0_bignum_t *d0_bignum_mod_mul(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
447 if(!r) r = d0_bignum_new(); if(!r) return NULL;
448 mp_mulmod((mp_int *) &a->z, (mp_int *) &b->z, (mp_int *) &m->z, &r->z);
452 d0_bignum_t *d0_bignum_mod_pow(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
454 if(!r) r = d0_bignum_new(); if(!r) return NULL;
455 mp_exptmod((mp_int *) &a->z, (mp_int *) &b->z, (mp_int *) &m->z, &r->z);
459 D0_BOOL d0_bignum_mod_inv(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *m)
461 // here, r MUST be set, as otherwise we cannot return error state!
462 return mp_invmod((mp_int *) &a->z, (mp_int *) &m->z, &r->z) == MP_OKAY;
465 int d0_bignum_isprime(const d0_bignum_t *r, int param)
470 mp_prime_is_prime((mp_int *) &r->z, param, &ret);
474 d0_bignum_t *d0_bignum_gcd(d0_bignum_t *r, d0_bignum_t *s, d0_bignum_t *t, const d0_bignum_t *a, const d0_bignum_t *b)
476 if(!r) r = d0_bignum_new(); if(!r) return NULL;
478 mp_exteuclid((mp_int *) &a->z, (mp_int *) &b->z, s ? &s->z : NULL, t ? &t->z : NULL, &r->z);
480 mp_gcd((mp_int *) &a->z, (mp_int *) &b->z, &r->z);
484 char *d0_bignum_tostring(const d0_bignum_t *x, unsigned int base)
488 mp_radix_size((mp_int *) &x->z, base, &sz);
489 str = d0_malloc(sz + 1);
490 mp_toradix_n((mp_int *) &x->z, str, base, sz + 1);