2 * FILE: d0_bignum-gmp.c
3 * AUTHOR: Rudolf Polzer - divVerent@xonotic.org
5 * Copyright (c) 2010, Rudolf Polzer
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 /* NOTE: this file links against libgmp (http://gmplib.org), which is under the
37 * Lesser General Public License 2.1 or later. You may have to abide to its
38 * terms too if you use this file.
39 * To alternatively link to OpenSSL, provide the option --with-openssl to
48 #include "d0_bignum.h"
59 static gmp_randstate_t RANDSTATE;
60 static d0_bignum_t temp;
61 static unsigned char numbuf[65536];
62 static void *tempmutex = NULL; // hold this mutex when using RANDSTATE or temp or numbuf
67 static void *allocate_function (size_t alloc_size)
69 return d0_malloc(alloc_size);
71 static void *reallocate_function (void *ptr, size_t old_size, size_t new_size)
74 if(old_size == new_size)
76 data = d0_malloc(new_size);
77 memcpy(data, ptr, (old_size < new_size) ? old_size : new_size);
81 void deallocate_function (void *ptr, size_t size)
86 D0_WARN_UNUSED_RESULT D0_BOOL d0_bignum_INITIALIZE(void)
90 unsigned char buf[256];
92 tempmutex = d0_createmutex();
93 d0_lockmutex(tempmutex);
95 mp_set_memory_functions(allocate_function, reallocate_function, deallocate_function);
97 d0_bignum_init(&temp);
98 gmp_randinit_mt(RANDSTATE);
99 gmp_randseed_ui(RANDSTATE, time(NULL));
100 * (time_t *) (&buf[0]) = time(0); // if everything else fails, we use the current time + uninitialized data
103 HCRYPTPROV hCryptProv;
104 if(CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT))
106 if(!CryptGenRandom(hCryptProv, sizeof(buf), (PBYTE) &buf[0]))
108 fprintf(stderr, "WARNING: could not initialize random number generator (CryptGenRandom failed)\n");
111 CryptReleaseContext(hCryptProv, 0);
113 else if(CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_NEWKEYSET))
115 if(!CryptGenRandom(hCryptProv, sizeof(buf), (PBYTE) &buf[0]))
117 fprintf(stderr, "WARNING: could not initialize random number generator (CryptGenRandom failed)\n");
120 CryptReleaseContext(hCryptProv, 0);
124 fprintf(stderr, "WARNING: could not initialize random number generator (CryptAcquireContext failed)\n");
129 f = fopen("/dev/urandom", "rb");
131 f = fopen("/dev/random", "rb");
135 if(fread(buf, sizeof(buf), 1, f) != 1)
137 fprintf(stderr, "WARNING: could not initialize random number generator (read from random device failed)\n");
144 fprintf(stderr, "WARNING: could not initialize random number generator (no random device found)\n");
149 mpz_import(temp.z, sizeof(buf), 1, 1, 0, 0, buf);
150 gmp_randseed(RANDSTATE, temp.z);
152 d0_unlockmutex(tempmutex);
157 void d0_bignum_SHUTDOWN(void)
159 d0_lockmutex(tempmutex);
161 d0_bignum_clear(&temp);
162 gmp_randclear(RANDSTATE);
164 d0_unlockmutex(tempmutex);
165 d0_destroymutex(tempmutex);
169 D0_BOOL d0_iobuf_write_bignum(d0_iobuf_t *buf, const d0_bignum_t *bignum)
174 d0_lockmutex(tempmutex);
175 numbuf[0] = mpz_sgn(bignum->z) & 3;
176 if((numbuf[0] & 3) != 0) // nonzero
178 count = (mpz_sizeinbase(bignum->z, 2) + 7) / 8;
179 if(count > sizeof(numbuf) - 1)
181 d0_unlockmutex(tempmutex);
184 mpz_export(numbuf+1, &count, 1, 1, 0, 0, bignum->z);
186 ret = d0_iobuf_write_packet(buf, numbuf, count + 1);
187 d0_unlockmutex(tempmutex);
191 d0_bignum_t *d0_iobuf_read_bignum(d0_iobuf_t *buf, d0_bignum_t *bignum)
193 size_t count = sizeof(numbuf);
195 d0_lockmutex(tempmutex);
196 if(!d0_iobuf_read_packet(buf, numbuf, &count))
198 d0_unlockmutex(tempmutex);
203 d0_unlockmutex(tempmutex);
207 bignum = d0_bignum_new();
210 d0_unlockmutex(tempmutex);
213 if(numbuf[0] & 3) // nonzero
215 mpz_import(bignum->z, count-1, 1, 1, 0, 0, numbuf+1);
216 if(numbuf[0] & 2) // negative
217 mpz_neg(bignum->z, bignum->z);
221 mpz_set_ui(bignum->z, 0);
223 d0_unlockmutex(tempmutex);
227 ssize_t d0_bignum_export_unsigned(const d0_bignum_t *bignum, void *buf, size_t bufsize)
230 count = (mpz_sizeinbase(bignum->z, 2) + 7) / 8;
235 // pad from left (big endian numbers!)
236 memset(buf, 0, bufsize - count);
237 buf += bufsize - count;
240 mpz_export(buf, &bufsize, 1, 1, 0, 0, bignum->z);
244 // mpz_sizeinbase lied to us
246 // there is no sane way whatsoever to handle this
252 // mpz_sizeinbase lied to us
256 memset(buf, 0, count);
260 memmove(buf + count - bufsize, buf, bufsize);
261 memset(buf, 0, count - bufsize);
267 d0_bignum_t *d0_bignum_import_unsigned(d0_bignum_t *bignum, const void *buf, size_t bufsize)
270 if(!bignum) bignum = d0_bignum_new(); if(!bignum) return NULL;
271 mpz_import(bignum->z, bufsize, 1, 1, 0, 0, buf);
275 d0_bignum_t *d0_bignum_new(void)
277 d0_bignum_t *b = d0_malloc(sizeof(d0_bignum_t));
282 void d0_bignum_free(d0_bignum_t *a)
288 void d0_bignum_init(d0_bignum_t *b)
293 void d0_bignum_clear(d0_bignum_t *a)
298 size_t d0_bignum_size(const d0_bignum_t *r)
300 return mpz_sizeinbase(r->z, 2);
303 int d0_bignum_cmp(const d0_bignum_t *a, const d0_bignum_t *b)
305 return mpz_cmp(a->z, b->z);
308 d0_bignum_t *d0_bignum_rand_range(d0_bignum_t *r, const d0_bignum_t *min, const d0_bignum_t *max)
310 if(!r) r = d0_bignum_new(); if(!r) return NULL;
311 d0_lockmutex(tempmutex);
312 mpz_sub(temp.z, max->z, min->z);
313 mpz_urandomm(r->z, RANDSTATE, temp.z);
314 d0_unlockmutex(tempmutex);
315 mpz_add(r->z, r->z, min->z);
319 d0_bignum_t *d0_bignum_rand_bit_atmost(d0_bignum_t *r, size_t n)
321 if(!r) r = d0_bignum_new(); if(!r) return NULL;
322 d0_lockmutex(tempmutex);
323 mpz_urandomb(r->z, RANDSTATE, n);
324 d0_unlockmutex(tempmutex);
328 d0_bignum_t *d0_bignum_rand_bit_exact(d0_bignum_t *r, size_t n)
330 if(!r) r = d0_bignum_new(); if(!r) return NULL;
331 d0_lockmutex(tempmutex);
332 mpz_urandomb(r->z, RANDSTATE, n-1);
333 d0_unlockmutex(tempmutex);
334 mpz_setbit(r->z, n-1);
338 d0_bignum_t *d0_bignum_zero(d0_bignum_t *r)
340 return d0_bignum_int(r, 0);
343 d0_bignum_t *d0_bignum_one(d0_bignum_t *r)
345 return d0_bignum_int(r, 1);
348 d0_bignum_t *d0_bignum_int(d0_bignum_t *r, int n)
350 if(!r) r = d0_bignum_new(); if(!r) return NULL;
355 d0_bignum_t *d0_bignum_mov(d0_bignum_t *r, const d0_bignum_t *a)
359 if(!r) r = d0_bignum_new(); if(!r) return NULL;
364 d0_bignum_t *d0_bignum_neg(d0_bignum_t *r, const d0_bignum_t *a)
366 if(!r) r = d0_bignum_new(); if(!r) return NULL;
371 d0_bignum_t *d0_bignum_shl(d0_bignum_t *r, const d0_bignum_t *a, ssize_t n)
373 if(!r) r = d0_bignum_new(); if(!r) return NULL;
375 mpz_mul_2exp(r->z, a->z, n);
377 mpz_fdiv_q_2exp(r->z, a->z, -n);
383 d0_bignum_t *d0_bignum_add(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
385 if(!r) r = d0_bignum_new(); if(!r) return NULL;
386 mpz_add(r->z, a->z, b->z);
390 d0_bignum_t *d0_bignum_sub(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
392 if(!r) r = d0_bignum_new(); if(!r) return NULL;
393 mpz_sub(r->z, a->z, b->z);
397 d0_bignum_t *d0_bignum_mul(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b)
399 if(!r) r = d0_bignum_new(); if(!r) return NULL;
400 mpz_mul(r->z, a->z, b->z);
404 d0_bignum_t *d0_bignum_divmod(d0_bignum_t *q, d0_bignum_t *m, const d0_bignum_t *a, const d0_bignum_t *b)
410 mpz_fdiv_qr(q->z, m->z, a->z, b->z);
412 mpz_fdiv_q(q->z, a->z, b->z);
414 mpz_fdiv_r(m->z, a->z, b->z);
421 d0_bignum_t *d0_bignum_mod_add(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
423 r = d0_bignum_add(r, a, b);
424 mpz_fdiv_r(r->z, r->z, m->z);
428 d0_bignum_t *d0_bignum_mod_sub(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
430 r = d0_bignum_sub(r, a, b);
431 mpz_fdiv_r(r->z, r->z, m->z);
435 d0_bignum_t *d0_bignum_mod_mul(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
437 r = d0_bignum_mul(r, a, b);
438 mpz_fdiv_r(r->z, r->z, m->z);
442 d0_bignum_t *d0_bignum_mod_pow(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *b, const d0_bignum_t *m)
444 if(!r) r = d0_bignum_new(); if(!r) return NULL;
445 mpz_powm(r->z, a->z, b->z, m->z);
449 D0_BOOL d0_bignum_mod_inv(d0_bignum_t *r, const d0_bignum_t *a, const d0_bignum_t *m)
451 // here, r MUST be set, as otherwise we cannot return error state!
452 return mpz_invert(r->z, a->z, m->z);
455 int d0_bignum_isprime(const d0_bignum_t *r, int param)
457 return mpz_probab_prime_p(r->z, param);
460 d0_bignum_t *d0_bignum_gcd(d0_bignum_t *r, d0_bignum_t *s, d0_bignum_t *t, const d0_bignum_t *a, const d0_bignum_t *b)
462 if(!r) r = d0_bignum_new(); if(!r) return NULL;
464 mpz_gcdext(r->z, s->z, t ? t->z : NULL, a->z, b->z);
466 mpz_gcdext(r->z, t->z, NULL, b->z, a->z);
468 mpz_gcd(r->z, a->z, b->z);
472 char *d0_bignum_tostring(const d0_bignum_t *x, unsigned int base)
474 return mpz_get_str(NULL, base, x->z); // this allocates!