]>
git.saurik.com Git - apple/security.git/blob - AppleCSP/open_ssl/bn/bn_lcl.h
2 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
4 * The contents of this file constitute Original Code as defined in and are
5 * subject to the Apple Public Source License Version 1.2 (the 'License').
6 * You may not use this file except in compliance with the License. Please obtain
7 * a copy of the License at http://www.apple.com/publicsource and read it before
10 * This Original Code and all software distributed under the License are
11 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
12 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
13 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
14 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
15 * specific language governing rights and limitations under the License.
19 /* crypto/bn/bn_lcl.h */
20 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
21 * All rights reserved.
23 * This package is an SSL implementation written
24 * by Eric Young (eay@cryptsoft.com).
25 * The implementation was written so as to conform with Netscapes SSL.
27 * This library is free for commercial and non-commercial use as long as
28 * the following conditions are aheared to. The following conditions
29 * apply to all code found in this distribution, be it the RC4, RSA,
30 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
31 * included with this distribution is covered by the same copyright terms
32 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
34 * Copyright remains Eric Young's, and as such any Copyright notices in
35 * the code are not to be removed.
36 * If this package is used in a product, Eric Young should be given attribution
37 * as the author of the parts of the library used.
38 * This can be in the form of a textual message at program startup or
39 * in documentation (online or textual) provided with the package.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. All advertising materials mentioning features or use of this software
50 * must display the following acknowledgement:
51 * "This product includes cryptographic software written by
52 * Eric Young (eay@cryptsoft.com)"
53 * The word 'cryptographic' can be left out if the rouines from the library
54 * being used are not cryptographic related :-).
55 * 4. If you include any Windows specific code (or a derivative thereof) from
56 * the apps directory (application code) you must include an acknowledgement:
57 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
59 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
60 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
63 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71 * The licence and distribution terms for any publically available version or
72 * derivative of this code cannot be changed. i.e. this code cannot simply be
73 * copied and put under another distribution licence
74 * [including the GNU Public Licence.]
77 #ifndef HEADER_BN_LCL_H
78 #define HEADER_BN_LCL_H
80 #include <openssl/bn.h>
86 /* Pentium pro 16,16,16,32,64 */
87 /* Alpha 16,16,16,16.64 */
88 #define BN_MULL_SIZE_NORMAL (16) /* 32 */
89 #define BN_MUL_RECURSIVE_SIZE_NORMAL (16) /* 32 less than */
90 #define BN_SQR_RECURSIVE_SIZE_NORMAL (16) /* 32 */
91 #define BN_MUL_LOW_RECURSIVE_SIZE_NORMAL (32) /* 32 */
92 #define BN_MONT_CTX_SET_SIZE_WORD (64) /* 32 */
94 #if !defined(NO_ASM) && !defined(NO_INLINE_ASM) && !defined(PEDANTIC)
96 * BN_UMULT_HIGH section.
98 * No, I'm not trying to overwhelm you when stating that the
99 * product of N-bit numbers is 2*N bits wide:-) No, I don't expect
100 * you to be impressed when I say that if the compiler doesn't
101 * support 2*N integer type, then you have to replace every N*N
102 * multiplication with 4 (N/2)*(N/2) accompanied by some shifts
103 * and additions which unavoidably results in severe performance
104 * penalties. Of course provided that the hardware is capable of
105 * producing 2*N result... That's when you normally start
106 * considering assembler implementation. However! It should be
107 * pointed out that some CPUs (most notably Alpha, PowerPC and
108 * upcoming IA-64 family:-) provide *separate* instruction
109 * calculating the upper half of the product placing the result
110 * into a general purpose register. Now *if* the compiler supports
111 * inline assembler, then it's not impossible to implement the
112 * "bignum" routines (and have the compiler optimize 'em)
113 * exhibiting "native" performance in C. That's what BN_UMULT_HIGH
116 * <appro@fy.chalmers.se>
118 # if defined(__alpha) && (defined(SIXTY_FOUR_BIT_LONG) || defined(SIXTY_FOUR_BIT))
121 # define BN_UMULT_HIGH(a,b) (BN_ULONG)asm("umulh %a0,%a1,%v0",(a),(b))
122 # elif defined(__GNUC__)
123 # define BN_UMULT_HIGH(a,b) ({ \
124 register BN_ULONG ret; \
125 asm ("umulh %1,%2,%0" \
129 # endif /* compiler */
130 # elif defined(_ARCH_PPC) && defined(__64BIT__) && defined(SIXTY_FOUR_BIT_LONG)
131 # if defined(__GNUC__)
132 # define BN_UMULT_HIGH(a,b) ({ \
133 register BN_ULONG ret; \
134 asm ("mulhdu %0,%1,%2" \
138 # endif /* compiler */
142 /*************************************************************
143 * Using the long long type
145 #define Lw(t) (((BN_ULONG)(t))&BN_MASK2)
146 #define Hw(t) (((BN_ULONG)((t)>>BN_BITS2))&BN_MASK2)
148 /* This is used for internal error checking and is not normally used */
151 # define bn_check_top(a) assert ((a)->top >= 0 && (a)->top <= (a)->max);
153 # define bn_check_top(a)
156 /* This macro is to add extra stuff for development checking */
158 #define bn_set_max(r) ((r)->max=(r)->top,BN_set_flags((r),BN_FLG_STATIC_DATA))
160 #define bn_set_max(r)
163 /* These macros are used to 'take' a section of a bignum for read only use */
164 #define bn_set_low(r,a,n) \
166 (r)->top=((a)->top > (n))?(n):(a)->top; \
169 (r)->flags|=BN_FLG_STATIC_DATA; \
173 #define bn_set_high(r,a,n) \
175 if ((a)->top > (n)) \
177 (r)->top=(a)->top-n; \
178 (r)->d= &((a)->d[n]); \
183 (r)->flags|=BN_FLG_STATIC_DATA; \
188 #define mul_add(r,a,w,c) { \
190 t=(BN_ULLONG)w * (a) + (r) + (c); \
195 #define mul(r,a,w,c) { \
197 t=(BN_ULLONG)w * (a) + (c); \
202 #define sqr(r0,r1,a) { \
204 t=(BN_ULLONG)(a)*(a); \
209 #elif defined(BN_UMULT_HIGH)
210 #define mul_add(r,a,w,c) { \
211 BN_ULONG high,low,ret,tmp=(a); \
213 high= BN_UMULT_HIGH(w,tmp); \
216 (c) = (ret<(c))?1:0; \
219 (c) += (ret<low)?1:0; \
223 #define mul(r,a,w,c) { \
224 BN_ULONG high,low,ret,ta=(a); \
226 high= BN_UMULT_HIGH(w,ta); \
229 (c) += (ret<low)?1:0; \
233 #define sqr(r0,r1,a) { \
236 (r1) = BN_UMULT_HIGH(tmp,tmp); \
240 /*************************************************************
244 #define LBITS(a) ((a)&BN_MASK2l)
245 #define HBITS(a) (((a)>>BN_BITS4)&BN_MASK2l)
246 #define L2HBITS(a) ((BN_ULONG)((a)&BN_MASK2l)<<BN_BITS4)
248 #define LLBITS(a) ((a)&BN_MASKl)
249 #define LHBITS(a) (((a)>>BN_BITS2)&BN_MASKl)
250 #define LL2HBITS(a) ((BN_ULLONG)((a)&BN_MASKl)<<BN_BITS2)
252 #define mul64(l,h,bl,bh) \
254 BN_ULONG m,m1,lt,ht; \
262 m=(m+m1)&BN_MASK2; if (m < m1) ht+=L2HBITS(1L); \
265 lt=(lt+m1)&BN_MASK2; if (lt < m1) ht++; \
270 #define sqr64(lo,ho,in) \
280 h+=(m&BN_MASK2h1)>>(BN_BITS4-1); \
281 m =(m&BN_MASK2l)<<(BN_BITS4+1); \
282 l=(l+m)&BN_MASK2; if (l < m) h++; \
287 #define mul_add(r,a,bl,bh,c) { \
293 mul64(l,h,(bl),(bh)); \
295 /* non-multiply part */ \
296 l=(l+(c))&BN_MASK2; if (l < (c)) h++; \
298 l=(l+(c))&BN_MASK2; if (l < (c)) h++; \
303 #define mul(r,a,bl,bh,c) { \
309 mul64(l,h,(bl),(bh)); \
311 /* non-multiply part */ \
312 l+=(c); if ((l&BN_MASK2) < (c)) h++; \
316 #endif /* !BN_LLONG */
318 void bn_mul_normal(BN_ULONG
*r
,BN_ULONG
*a
,int na
,BN_ULONG
*b
,int nb
);
319 void bn_mul_comba8(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
);
320 void bn_mul_comba4(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
);
321 void bn_sqr_normal(BN_ULONG
*r
, BN_ULONG
*a
, int n
, BN_ULONG
*tmp
);
322 void bn_sqr_comba8(BN_ULONG
*r
,BN_ULONG
*a
);
323 void bn_sqr_comba4(BN_ULONG
*r
,BN_ULONG
*a
);
324 int bn_cmp_words(BN_ULONG
*a
,BN_ULONG
*b
,int n
);
325 void bn_mul_recursive(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
,int n2
,BN_ULONG
*t
);
326 void bn_mul_part_recursive(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
,
327 int tn
, int n
,BN_ULONG
*t
);
328 void bn_sqr_recursive(BN_ULONG
*r
,BN_ULONG
*a
, int n2
, BN_ULONG
*t
);
329 void bn_mul_low_normal(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
, int n
);
330 void bn_mul_low_recursive(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
,int n2
,
332 void bn_mul_high(BN_ULONG
*r
,BN_ULONG
*a
,BN_ULONG
*b
,BN_ULONG
*l
,int n2
,