1/* crypto/bn/bn_nist.c */
2/*
3 * Written by Nils Larsch for the OpenSSL project
4 */
5/* ====================================================================
6 * Copyright (c) 1998-2005 The OpenSSL Project.  All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in
17 *    the documentation and/or other materials provided with the
18 *    distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 *    software must display the following acknowledgment:
22 *    "This product includes software developed by the OpenSSL Project
23 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 *    endorse or promote products derived from this software without
27 *    prior written permission. For written permission, please contact
28 *    openssl-core@openssl.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 *    nor may "OpenSSL" appear in their names without prior written
32 *    permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 *    acknowledgment:
36 *    "This product includes software developed by the OpenSSL Project
37 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com).  This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include "bn_lcl.h"
60#include "cryptlib.h"
61
62
63#define BN_NIST_192_TOP	(192+BN_BITS2-1)/BN_BITS2
64#define BN_NIST_224_TOP	(224+BN_BITS2-1)/BN_BITS2
65#define BN_NIST_256_TOP	(256+BN_BITS2-1)/BN_BITS2
66#define BN_NIST_384_TOP	(384+BN_BITS2-1)/BN_BITS2
67#define BN_NIST_521_TOP	(521+BN_BITS2-1)/BN_BITS2
68
69/* pre-computed tables are "carry-less" values of modulus*(i+1) */
70#if BN_BITS2 == 64
71static const BN_ULONG _nist_p_192[][BN_NIST_192_TOP] = {
72	{0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFEULL,0xFFFFFFFFFFFFFFFFULL},
73	{0xFFFFFFFFFFFFFFFEULL,0xFFFFFFFFFFFFFFFDULL,0xFFFFFFFFFFFFFFFFULL},
74	{0xFFFFFFFFFFFFFFFDULL,0xFFFFFFFFFFFFFFFCULL,0xFFFFFFFFFFFFFFFFULL}
75	};
76static const BN_ULONG _nist_p_192_sqr[] = {
77	0x0000000000000001ULL,0x0000000000000002ULL,0x0000000000000001ULL,
78	0xFFFFFFFFFFFFFFFEULL,0xFFFFFFFFFFFFFFFDULL,0xFFFFFFFFFFFFFFFFULL
79	};
80static const BN_ULONG _nist_p_224[][BN_NIST_224_TOP] = {
81	{0x0000000000000001ULL,0xFFFFFFFF00000000ULL,
82	 0xFFFFFFFFFFFFFFFFULL,0x00000000FFFFFFFFULL},
83	{0x0000000000000002ULL,0xFFFFFFFE00000000ULL,
84	 0xFFFFFFFFFFFFFFFFULL,0x00000001FFFFFFFFULL} /* this one is "carry-full" */
85	};
86static const BN_ULONG _nist_p_224_sqr[] = {
87	0x0000000000000001ULL,0xFFFFFFFE00000000ULL,
88	0xFFFFFFFFFFFFFFFFULL,0x0000000200000000ULL,
89	0x0000000000000000ULL,0xFFFFFFFFFFFFFFFEULL,
90	0xFFFFFFFFFFFFFFFFULL
91	};
92static const BN_ULONG _nist_p_256[][BN_NIST_256_TOP] = {
93	{0xFFFFFFFFFFFFFFFFULL,0x00000000FFFFFFFFULL,
94	 0x0000000000000000ULL,0xFFFFFFFF00000001ULL},
95	{0xFFFFFFFFFFFFFFFEULL,0x00000001FFFFFFFFULL,
96	 0x0000000000000000ULL,0xFFFFFFFE00000002ULL},
97	{0xFFFFFFFFFFFFFFFDULL,0x00000002FFFFFFFFULL,
98	 0x0000000000000000ULL,0xFFFFFFFD00000003ULL},
99	{0xFFFFFFFFFFFFFFFCULL,0x00000003FFFFFFFFULL,
100	 0x0000000000000000ULL,0xFFFFFFFC00000004ULL},
101	{0xFFFFFFFFFFFFFFFBULL,0x00000004FFFFFFFFULL,
102	 0x0000000000000000ULL,0xFFFFFFFB00000005ULL},
103	};
104static const BN_ULONG _nist_p_256_sqr[] = {
105	0x0000000000000001ULL,0xFFFFFFFE00000000ULL,
106	0xFFFFFFFFFFFFFFFFULL,0x00000001FFFFFFFEULL,
107	0x00000001FFFFFFFEULL,0x00000001FFFFFFFEULL,
108	0xFFFFFFFE00000001ULL,0xFFFFFFFE00000002ULL
109	};
110static const BN_ULONG _nist_p_384[][BN_NIST_384_TOP] = {
111	{0x00000000FFFFFFFFULL,0xFFFFFFFF00000000ULL,0xFFFFFFFFFFFFFFFEULL,
112	 0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL},
113	{0x00000001FFFFFFFEULL,0xFFFFFFFE00000000ULL,0xFFFFFFFFFFFFFFFDULL,
114	 0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL},
115	{0x00000002FFFFFFFDULL,0xFFFFFFFD00000000ULL,0xFFFFFFFFFFFFFFFCULL,
116	 0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL},
117	{0x00000003FFFFFFFCULL,0xFFFFFFFC00000000ULL,0xFFFFFFFFFFFFFFFBULL,
118	 0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL},
119	{0x00000004FFFFFFFBULL,0xFFFFFFFB00000000ULL,0xFFFFFFFFFFFFFFFAULL,
120	 0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL},
121	};
122static const BN_ULONG _nist_p_384_sqr[] = {
123	0xFFFFFFFE00000001ULL,0x0000000200000000ULL,0xFFFFFFFE00000000ULL,
124	0x0000000200000000ULL,0x0000000000000001ULL,0x0000000000000000ULL,
125	0x00000001FFFFFFFEULL,0xFFFFFFFE00000000ULL,0xFFFFFFFFFFFFFFFDULL,
126	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL
127	};
128static const BN_ULONG _nist_p_521[] =
129	{0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
130	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
131	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
132	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
133	0x00000000000001FFULL};
134static const BN_ULONG _nist_p_521_sqr[] = {
135	0x0000000000000001ULL,0x0000000000000000ULL,0x0000000000000000ULL,
136	0x0000000000000000ULL,0x0000000000000000ULL,0x0000000000000000ULL,
137	0x0000000000000000ULL,0x0000000000000000ULL,0xFFFFFFFFFFFFFC00ULL,
138	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
139	0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,0xFFFFFFFFFFFFFFFFULL,
140	0xFFFFFFFFFFFFFFFFULL,0x000000000003FFFFULL
141	};
142#elif BN_BITS2 == 32
143static const BN_ULONG _nist_p_192[][BN_NIST_192_TOP] = {
144	{0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFE,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
145	{0xFFFFFFFE,0xFFFFFFFF,0xFFFFFFFD,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
146	{0xFFFFFFFD,0xFFFFFFFF,0xFFFFFFFC,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF}
147	};
148static const BN_ULONG _nist_p_192_sqr[] = {
149	0x00000001,0x00000000,0x00000002,0x00000000,0x00000001,0x00000000,
150	0xFFFFFFFE,0xFFFFFFFF,0xFFFFFFFD,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF
151	};
152static const BN_ULONG _nist_p_224[][BN_NIST_224_TOP] = {
153	{0x00000001,0x00000000,0x00000000,0xFFFFFFFF,
154	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
155	{0x00000002,0x00000000,0x00000000,0xFFFFFFFE,
156	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF}
157	};
158static const BN_ULONG _nist_p_224_sqr[] = {
159	0x00000001,0x00000000,0x00000000,0xFFFFFFFE,
160	0xFFFFFFFF,0xFFFFFFFF,0x00000000,0x00000002,
161	0x00000000,0x00000000,0xFFFFFFFE,0xFFFFFFFF,
162	0xFFFFFFFF,0xFFFFFFFF
163	};
164static const BN_ULONG _nist_p_256[][BN_NIST_256_TOP] = {
165	{0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0x00000000,
166	 0x00000000,0x00000000,0x00000001,0xFFFFFFFF},
167	{0xFFFFFFFE,0xFFFFFFFF,0xFFFFFFFF,0x00000001,
168	 0x00000000,0x00000000,0x00000002,0xFFFFFFFE},
169	{0xFFFFFFFD,0xFFFFFFFF,0xFFFFFFFF,0x00000002,
170	 0x00000000,0x00000000,0x00000003,0xFFFFFFFD},
171	{0xFFFFFFFC,0xFFFFFFFF,0xFFFFFFFF,0x00000003,
172	 0x00000000,0x00000000,0x00000004,0xFFFFFFFC},
173	{0xFFFFFFFB,0xFFFFFFFF,0xFFFFFFFF,0x00000004,
174	 0x00000000,0x00000000,0x00000005,0xFFFFFFFB},
175	};
176static const BN_ULONG _nist_p_256_sqr[] = {
177	0x00000001,0x00000000,0x00000000,0xFFFFFFFE,
178	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFE,0x00000001,
179	0xFFFFFFFE,0x00000001,0xFFFFFFFE,0x00000001,
180	0x00000001,0xFFFFFFFE,0x00000002,0xFFFFFFFE
181	};
182static const BN_ULONG _nist_p_384[][BN_NIST_384_TOP] = {
183	{0xFFFFFFFF,0x00000000,0x00000000,0xFFFFFFFF,0xFFFFFFFE,0xFFFFFFFF,
184	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
185	{0xFFFFFFFE,0x00000001,0x00000000,0xFFFFFFFE,0xFFFFFFFD,0xFFFFFFFF,
186	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
187	{0xFFFFFFFD,0x00000002,0x00000000,0xFFFFFFFD,0xFFFFFFFC,0xFFFFFFFF,
188	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
189	{0xFFFFFFFC,0x00000003,0x00000000,0xFFFFFFFC,0xFFFFFFFB,0xFFFFFFFF,
190	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
191	{0xFFFFFFFB,0x00000004,0x00000000,0xFFFFFFFB,0xFFFFFFFA,0xFFFFFFFF,
192	 0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF},
193	};
194static const BN_ULONG _nist_p_384_sqr[] = {
195	0x00000001,0xFFFFFFFE,0x00000000,0x00000002,0x00000000,0xFFFFFFFE,
196	0x00000000,0x00000002,0x00000001,0x00000000,0x00000000,0x00000000,
197	0xFFFFFFFE,0x00000001,0x00000000,0xFFFFFFFE,0xFFFFFFFD,0xFFFFFFFF,
198	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF
199	};
200static const BN_ULONG _nist_p_521[] = {0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,
201	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,
202	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,
203	0xFFFFFFFF,0x000001FF};
204static const BN_ULONG _nist_p_521_sqr[] = {
205	0x00000001,0x00000000,0x00000000,0x00000000,0x00000000,0x00000000,
206	0x00000000,0x00000000,0x00000000,0x00000000,0x00000000,0x00000000,
207	0x00000000,0x00000000,0x00000000,0x00000000,0xFFFFFC00,0xFFFFFFFF,
208	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,
209	0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,0xFFFFFFFF,
210	0xFFFFFFFF,0xFFFFFFFF,0x0003FFFF
211	};
212#else
213#error "unsupported BN_BITS2"
214#endif
215
216
217static const BIGNUM _bignum_nist_p_192 =
218	{
219	(BN_ULONG *)_nist_p_192[0],
220	BN_NIST_192_TOP,
221	BN_NIST_192_TOP,
222	0,
223	BN_FLG_STATIC_DATA
224	};
225
226static const BIGNUM _bignum_nist_p_224 =
227	{
228	(BN_ULONG *)_nist_p_224[0],
229	BN_NIST_224_TOP,
230	BN_NIST_224_TOP,
231	0,
232	BN_FLG_STATIC_DATA
233	};
234
235static const BIGNUM _bignum_nist_p_256 =
236	{
237	(BN_ULONG *)_nist_p_256[0],
238	BN_NIST_256_TOP,
239	BN_NIST_256_TOP,
240	0,
241	BN_FLG_STATIC_DATA
242	};
243
244static const BIGNUM _bignum_nist_p_384 =
245	{
246	(BN_ULONG *)_nist_p_384[0],
247	BN_NIST_384_TOP,
248	BN_NIST_384_TOP,
249	0,
250	BN_FLG_STATIC_DATA
251	};
252
253static const BIGNUM _bignum_nist_p_521 =
254	{
255	(BN_ULONG *)_nist_p_521,
256	BN_NIST_521_TOP,
257	BN_NIST_521_TOP,
258	0,
259	BN_FLG_STATIC_DATA
260	};
261
262
263const BIGNUM *BN_get0_nist_prime_192(void)
264	{
265	return &_bignum_nist_p_192;
266	}
267
268const BIGNUM *BN_get0_nist_prime_224(void)
269	{
270	return &_bignum_nist_p_224;
271	}
272
273const BIGNUM *BN_get0_nist_prime_256(void)
274	{
275	return &_bignum_nist_p_256;
276	}
277
278const BIGNUM *BN_get0_nist_prime_384(void)
279	{
280	return &_bignum_nist_p_384;
281	}
282
283const BIGNUM *BN_get0_nist_prime_521(void)
284	{
285	return &_bignum_nist_p_521;
286	}
287
288
289static void nist_cp_bn_0(BN_ULONG *buf, BN_ULONG *a, int top, int max)
290	{
291	int i;
292	BN_ULONG *_tmp1 = (buf), *_tmp2 = (a);
293
294#ifdef BN_DEBUG
295	OPENSSL_assert(top <= max);
296#endif
297	for (i = (top); i != 0; i--)
298		*_tmp1++ = *_tmp2++;
299	for (i = (max) - (top); i != 0; i--)
300		*_tmp1++ = (BN_ULONG) 0;
301	}
302
303static void nist_cp_bn(BN_ULONG *buf, BN_ULONG *a, int top)
304	{
305	int i;
306	BN_ULONG *_tmp1 = (buf), *_tmp2 = (a);
307	for (i = (top); i != 0; i--)
308		*_tmp1++ = *_tmp2++;
309	}
310
311#if BN_BITS2 == 64
312#define bn_cp_64(to, n, from, m)	(to)[n] = (m>=0)?((from)[m]):0;
313#define bn_64_set_0(to, n)		(to)[n] = (BN_ULONG)0;
314/*
315 * two following macros are implemented under assumption that they
316 * are called in a sequence with *ascending* n, i.e. as they are...
317 */
318#define bn_cp_32_naked(to, n, from, m)	(((n)&1)?(to[(n)/2]|=((m)&1)?(from[(m)/2]&BN_MASK2h):(from[(m)/2]<<32))\
319						:(to[(n)/2] =((m)&1)?(from[(m)/2]>>32):(from[(m)/2]&BN_MASK2l)))
320#define bn_32_set_0(to, n)		(((n)&1)?(to[(n)/2]&=BN_MASK2l):(to[(n)/2]=0));
321#define bn_cp_32(to,n,from,m)		((m)>=0)?bn_cp_32_naked(to,n,from,m):bn_32_set_0(to,n)
322#else
323#define bn_cp_64(to, n, from, m) \
324	{ \
325	bn_cp_32(to, (n)*2, from, (m)*2); \
326	bn_cp_32(to, (n)*2+1, from, (m)*2+1); \
327	}
328#define bn_64_set_0(to, n) \
329	{ \
330	bn_32_set_0(to, (n)*2); \
331	bn_32_set_0(to, (n)*2+1); \
332	}
333#if BN_BITS2 == 32
334#define bn_cp_32(to, n, from, m)	(to)[n] = (m>=0)?((from)[m]):0;
335#define bn_32_set_0(to, n)		(to)[n] = (BN_ULONG)0;
336#endif
337#endif /* BN_BITS2 != 64 */
338
339
340#define nist_set_192(to, from, a1, a2, a3) \
341	{ \
342	bn_cp_64(to, 0, from, (a3) - 3) \
343	bn_cp_64(to, 1, from, (a2) - 3) \
344	bn_cp_64(to, 2, from, (a1) - 3) \
345	}
346
347int BN_nist_mod_192(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
348	BN_CTX *ctx)
349	{
350	int      top = a->top, i;
351	int      carry;
352	register BN_ULONG *r_d, *a_d = a->d;
353	BN_ULONG t_d[BN_NIST_192_TOP],
354	         buf[BN_NIST_192_TOP],
355		 c_d[BN_NIST_192_TOP],
356		*res;
357	PTR_SIZE_INT mask;
358	static const BIGNUM _bignum_nist_p_192_sqr = {
359		(BN_ULONG *)_nist_p_192_sqr,
360		sizeof(_nist_p_192_sqr)/sizeof(_nist_p_192_sqr[0]),
361		sizeof(_nist_p_192_sqr)/sizeof(_nist_p_192_sqr[0]),
362		0,BN_FLG_STATIC_DATA };
363
364	field = &_bignum_nist_p_192; /* just to make sure */
365
366 	if (BN_is_negative(a) || BN_ucmp(a,&_bignum_nist_p_192_sqr)>=0)
367		return BN_nnmod(r, a, field, ctx);
368
369	i = BN_ucmp(field, a);
370	if (i == 0)
371		{
372		BN_zero(r);
373		return 1;
374		}
375	else if (i > 0)
376		return (r == a) ? 1 : (BN_copy(r ,a) != NULL);
377
378	if (r != a)
379		{
380		if (!bn_wexpand(r, BN_NIST_192_TOP))
381			return 0;
382		r_d = r->d;
383		nist_cp_bn(r_d, a_d, BN_NIST_192_TOP);
384		}
385	else
386		r_d = a_d;
387
388	nist_cp_bn_0(buf, a_d + BN_NIST_192_TOP, top - BN_NIST_192_TOP, BN_NIST_192_TOP);
389
390	nist_set_192(t_d, buf, 0, 3, 3);
391	carry = (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
392	nist_set_192(t_d, buf, 4, 4, 0);
393	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
394	nist_set_192(t_d, buf, 5, 5, 5)
395	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
396
397	if (carry > 0)
398		carry = (int)bn_sub_words(r_d,r_d,_nist_p_192[carry-1],BN_NIST_192_TOP);
399	else
400		carry = 1;
401
402	/*
403	 * we need 'if (carry==0 || result>=modulus) result-=modulus;'
404	 * as comparison implies subtraction, we can write
405	 * 'tmp=result-modulus; if (!carry || !borrow) result=tmp;'
406	 * this is what happens below, but without explicit if:-) a.
407	 */
408	mask  = 0-(PTR_SIZE_INT)bn_sub_words(c_d,r_d,_nist_p_192[0],BN_NIST_192_TOP);
409	mask &= 0-(PTR_SIZE_INT)carry;
410	res   = (BN_ULONG *)
411	 (((PTR_SIZE_INT)c_d&~mask) | ((PTR_SIZE_INT)r_d&mask));
412	nist_cp_bn(r_d, res, BN_NIST_192_TOP);
413	r->top = BN_NIST_192_TOP;
414	bn_correct_top(r);
415
416	return 1;
417	}
418
419typedef BN_ULONG (*bn_addsub_f)(BN_ULONG *,const BN_ULONG *,const BN_ULONG *,int);
420
421#define nist_set_224(to, from, a1, a2, a3, a4, a5, a6, a7) \
422	{ \
423	bn_cp_32(to, 0, from, (a7) - 7) \
424	bn_cp_32(to, 1, from, (a6) - 7) \
425	bn_cp_32(to, 2, from, (a5) - 7) \
426	bn_cp_32(to, 3, from, (a4) - 7) \
427	bn_cp_32(to, 4, from, (a3) - 7) \
428	bn_cp_32(to, 5, from, (a2) - 7) \
429	bn_cp_32(to, 6, from, (a1) - 7) \
430	}
431
432int BN_nist_mod_224(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
433	BN_CTX *ctx)
434	{
435	int	top = a->top, i;
436	int	carry;
437	BN_ULONG *r_d, *a_d = a->d;
438	BN_ULONG t_d[BN_NIST_224_TOP],
439	         buf[BN_NIST_224_TOP],
440		 c_d[BN_NIST_224_TOP],
441		*res;
442	PTR_SIZE_INT mask;
443	union { bn_addsub_f f; PTR_SIZE_INT p; } u;
444	static const BIGNUM _bignum_nist_p_224_sqr = {
445		(BN_ULONG *)_nist_p_224_sqr,
446		sizeof(_nist_p_224_sqr)/sizeof(_nist_p_224_sqr[0]),
447		sizeof(_nist_p_224_sqr)/sizeof(_nist_p_224_sqr[0]),
448		0,BN_FLG_STATIC_DATA };
449
450
451	field = &_bignum_nist_p_224; /* just to make sure */
452
453 	if (BN_is_negative(a) || BN_ucmp(a,&_bignum_nist_p_224_sqr)>=0)
454		return BN_nnmod(r, a, field, ctx);
455
456	i = BN_ucmp(field, a);
457	if (i == 0)
458		{
459		BN_zero(r);
460		return 1;
461		}
462	else if (i > 0)
463		return (r == a)? 1 : (BN_copy(r ,a) != NULL);
464
465	if (r != a)
466		{
467		if (!bn_wexpand(r, BN_NIST_224_TOP))
468			return 0;
469		r_d = r->d;
470		nist_cp_bn(r_d, a_d, BN_NIST_224_TOP);
471		}
472	else
473		r_d = a_d;
474
475#if BN_BITS2==64
476	/* copy upper 256 bits of 448 bit number ... */
477	nist_cp_bn_0(t_d, a_d + (BN_NIST_224_TOP-1), top - (BN_NIST_224_TOP-1), BN_NIST_224_TOP);
478	/* ... and right shift by 32 to obtain upper 224 bits */
479	nist_set_224(buf, t_d, 14, 13, 12, 11, 10, 9, 8);
480	/* truncate lower part to 224 bits too */
481	r_d[BN_NIST_224_TOP-1] &= BN_MASK2l;
482#else
483	nist_cp_bn_0(buf, a_d + BN_NIST_224_TOP, top - BN_NIST_224_TOP, BN_NIST_224_TOP);
484#endif
485	nist_set_224(t_d, buf, 10, 9, 8, 7, 0, 0, 0);
486	carry = (int)bn_add_words(r_d, r_d, t_d, BN_NIST_224_TOP);
487	nist_set_224(t_d, buf, 0, 13, 12, 11, 0, 0, 0);
488	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_224_TOP);
489	nist_set_224(t_d, buf, 13, 12, 11, 10, 9, 8, 7);
490	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_224_TOP);
491	nist_set_224(t_d, buf, 0, 0, 0, 0, 13, 12, 11);
492	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_224_TOP);
493
494#if BN_BITS2==64
495	carry = (int)(r_d[BN_NIST_224_TOP-1]>>32);
496#endif
497	u.f = bn_sub_words;
498	if (carry > 0)
499		{
500		carry = (int)bn_sub_words(r_d,r_d,_nist_p_224[carry-1],BN_NIST_224_TOP);
501#if BN_BITS2==64
502		carry=(int)(~(r_d[BN_NIST_224_TOP-1]>>32))&1;
503#endif
504		}
505	else if (carry < 0)
506		{
507		/* it's a bit more comlicated logic in this case.
508		 * if bn_add_words yields no carry, then result
509		 * has to be adjusted by unconditionally *adding*
510		 * the modulus. but if it does, then result has
511		 * to be compared to the modulus and conditionally
512		 * adjusted by *subtracting* the latter. */
513		carry = (int)bn_add_words(r_d,r_d,_nist_p_224[-carry-1],BN_NIST_224_TOP);
514		mask = 0-(PTR_SIZE_INT)carry;
515		u.p = ((PTR_SIZE_INT)bn_sub_words&mask) |
516		 ((PTR_SIZE_INT)bn_add_words&~mask);
517		}
518	else
519		carry = 1;
520
521	/* otherwise it's effectively same as in BN_nist_mod_192... */
522	mask  = 0-(PTR_SIZE_INT)(*u.f)(c_d,r_d,_nist_p_224[0],BN_NIST_224_TOP);
523	mask &= 0-(PTR_SIZE_INT)carry;
524	res   = (BN_ULONG *)(((PTR_SIZE_INT)c_d&~mask) |
525	 ((PTR_SIZE_INT)r_d&mask));
526	nist_cp_bn(r_d, res, BN_NIST_224_TOP);
527	r->top = BN_NIST_224_TOP;
528	bn_correct_top(r);
529
530	return 1;
531	}
532
533#define nist_set_256(to, from, a1, a2, a3, a4, a5, a6, a7, a8) \
534	{ \
535	bn_cp_32(to, 0, from, (a8) - 8) \
536	bn_cp_32(to, 1, from, (a7) - 8) \
537	bn_cp_32(to, 2, from, (a6) - 8) \
538	bn_cp_32(to, 3, from, (a5) - 8) \
539	bn_cp_32(to, 4, from, (a4) - 8) \
540	bn_cp_32(to, 5, from, (a3) - 8) \
541	bn_cp_32(to, 6, from, (a2) - 8) \
542	bn_cp_32(to, 7, from, (a1) - 8) \
543	}
544
545int BN_nist_mod_256(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
546	BN_CTX *ctx)
547	{
548	int	i, top = a->top;
549	int	carry = 0;
550	register BN_ULONG *a_d = a->d, *r_d;
551	BN_ULONG t_d[BN_NIST_256_TOP],
552	         buf[BN_NIST_256_TOP],
553		 c_d[BN_NIST_256_TOP],
554		*res;
555	PTR_SIZE_INT mask;
556	union { bn_addsub_f f; PTR_SIZE_INT p; } u;
557	static const BIGNUM _bignum_nist_p_256_sqr = {
558		(BN_ULONG *)_nist_p_256_sqr,
559		sizeof(_nist_p_256_sqr)/sizeof(_nist_p_256_sqr[0]),
560		sizeof(_nist_p_256_sqr)/sizeof(_nist_p_256_sqr[0]),
561		0,BN_FLG_STATIC_DATA };
562
563	field = &_bignum_nist_p_256; /* just to make sure */
564
565 	if (BN_is_negative(a) || BN_ucmp(a,&_bignum_nist_p_256_sqr)>=0)
566		return BN_nnmod(r, a, field, ctx);
567
568	i = BN_ucmp(field, a);
569	if (i == 0)
570		{
571		BN_zero(r);
572		return 1;
573		}
574	else if (i > 0)
575		return (r == a)? 1 : (BN_copy(r ,a) != NULL);
576
577	if (r != a)
578		{
579		if (!bn_wexpand(r, BN_NIST_256_TOP))
580			return 0;
581		r_d = r->d;
582		nist_cp_bn(r_d, a_d, BN_NIST_256_TOP);
583		}
584	else
585		r_d = a_d;
586
587	nist_cp_bn_0(buf, a_d + BN_NIST_256_TOP, top - BN_NIST_256_TOP, BN_NIST_256_TOP);
588
589	/*S1*/
590	nist_set_256(t_d, buf, 15, 14, 13, 12, 11, 0, 0, 0);
591	/*S2*/
592	nist_set_256(c_d, buf, 0, 15, 14, 13, 12, 0, 0, 0);
593	carry = (int)bn_add_words(t_d, t_d, c_d, BN_NIST_256_TOP);
594	/* left shift */
595		{
596		register BN_ULONG *ap,t,c;
597		ap = t_d;
598		c=0;
599		for (i = BN_NIST_256_TOP; i != 0; --i)
600			{
601			t= *ap;
602			*(ap++)=((t<<1)|c)&BN_MASK2;
603			c=(t & BN_TBIT)?1:0;
604			}
605		carry <<= 1;
606		carry  |= c;
607		}
608	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
609	/*S3*/
610	nist_set_256(t_d, buf, 15, 14, 0, 0, 0, 10, 9, 8);
611	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
612	/*S4*/
613	nist_set_256(t_d, buf, 8, 13, 15, 14, 13, 11, 10, 9);
614	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
615	/*D1*/
616	nist_set_256(t_d, buf, 10, 8, 0, 0, 0, 13, 12, 11);
617	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
618	/*D2*/
619	nist_set_256(t_d, buf, 11, 9, 0, 0, 15, 14, 13, 12);
620	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
621	/*D3*/
622	nist_set_256(t_d, buf, 12, 0, 10, 9, 8, 15, 14, 13);
623	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
624	/*D4*/
625	nist_set_256(t_d, buf, 13, 0, 11, 10, 9, 0, 15, 14);
626	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
627
628	/* see BN_nist_mod_224 for explanation */
629	u.f = bn_sub_words;
630	if (carry > 0)
631		carry = (int)bn_sub_words(r_d,r_d,_nist_p_256[carry-1],BN_NIST_256_TOP);
632	else if (carry < 0)
633		{
634		carry = (int)bn_add_words(r_d,r_d,_nist_p_256[-carry-1],BN_NIST_256_TOP);
635		mask = 0-(PTR_SIZE_INT)carry;
636		u.p = ((PTR_SIZE_INT)bn_sub_words&mask) |
637		 ((PTR_SIZE_INT)bn_add_words&~mask);
638		}
639	else
640		carry = 1;
641
642	mask  = 0-(PTR_SIZE_INT)(*u.f)(c_d,r_d,_nist_p_256[0],BN_NIST_256_TOP);
643	mask &= 0-(PTR_SIZE_INT)carry;
644	res   = (BN_ULONG *)(((PTR_SIZE_INT)c_d&~mask) |
645	 ((PTR_SIZE_INT)r_d&mask));
646	nist_cp_bn(r_d, res, BN_NIST_256_TOP);
647	r->top = BN_NIST_256_TOP;
648	bn_correct_top(r);
649
650	return 1;
651	}
652
653#define nist_set_384(to,from,a1,a2,a3,a4,a5,a6,a7,a8,a9,a10,a11,a12) \
654	{ \
655	bn_cp_32(to, 0, from,  (a12) - 12) \
656	bn_cp_32(to, 1, from,  (a11) - 12) \
657	bn_cp_32(to, 2, from,  (a10) - 12) \
658	bn_cp_32(to, 3, from,  (a9) - 12)  \
659	bn_cp_32(to, 4, from,  (a8) - 12)  \
660	bn_cp_32(to, 5, from,  (a7) - 12)  \
661	bn_cp_32(to, 6, from,  (a6) - 12)  \
662	bn_cp_32(to, 7, from,  (a5) - 12)  \
663	bn_cp_32(to, 8, from,  (a4) - 12)  \
664	bn_cp_32(to, 9, from,  (a3) - 12)  \
665	bn_cp_32(to, 10, from, (a2) - 12)  \
666	bn_cp_32(to, 11, from, (a1) - 12)  \
667	}
668
669int BN_nist_mod_384(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
670	BN_CTX *ctx)
671	{
672	int	i, top = a->top;
673	int	carry = 0;
674	register BN_ULONG *r_d, *a_d = a->d;
675	BN_ULONG t_d[BN_NIST_384_TOP],
676	         buf[BN_NIST_384_TOP],
677		 c_d[BN_NIST_384_TOP],
678		*res;
679	PTR_SIZE_INT mask;
680	union { bn_addsub_f f; PTR_SIZE_INT p; } u;
681	static const BIGNUM _bignum_nist_p_384_sqr = {
682		(BN_ULONG *)_nist_p_384_sqr,
683		sizeof(_nist_p_384_sqr)/sizeof(_nist_p_384_sqr[0]),
684		sizeof(_nist_p_384_sqr)/sizeof(_nist_p_384_sqr[0]),
685		0,BN_FLG_STATIC_DATA };
686
687
688	field = &_bignum_nist_p_384; /* just to make sure */
689
690 	if (BN_is_negative(a) || BN_ucmp(a,&_bignum_nist_p_384_sqr)>=0)
691		return BN_nnmod(r, a, field, ctx);
692
693	i = BN_ucmp(field, a);
694	if (i == 0)
695		{
696		BN_zero(r);
697		return 1;
698		}
699	else if (i > 0)
700		return (r == a)? 1 : (BN_copy(r ,a) != NULL);
701
702	if (r != a)
703		{
704		if (!bn_wexpand(r, BN_NIST_384_TOP))
705			return 0;
706		r_d = r->d;
707		nist_cp_bn(r_d, a_d, BN_NIST_384_TOP);
708		}
709	else
710		r_d = a_d;
711
712	nist_cp_bn_0(buf, a_d + BN_NIST_384_TOP, top - BN_NIST_384_TOP, BN_NIST_384_TOP);
713
714	/*S1*/
715	nist_set_256(t_d, buf, 0, 0, 0, 0, 0, 23-4, 22-4, 21-4);
716		/* left shift */
717		{
718		register BN_ULONG *ap,t,c;
719		ap = t_d;
720		c=0;
721		for (i = 3; i != 0; --i)
722			{
723			t= *ap;
724			*(ap++)=((t<<1)|c)&BN_MASK2;
725			c=(t & BN_TBIT)?1:0;
726			}
727		*ap=c;
728		}
729	carry = (int)bn_add_words(r_d+(128/BN_BITS2), r_d+(128/BN_BITS2),
730		t_d, BN_NIST_256_TOP);
731	/*S2 */
732	carry += (int)bn_add_words(r_d, r_d, buf, BN_NIST_384_TOP);
733	/*S3*/
734	nist_set_384(t_d,buf,20,19,18,17,16,15,14,13,12,23,22,21);
735	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
736	/*S4*/
737	nist_set_384(t_d,buf,19,18,17,16,15,14,13,12,20,0,23,0);
738	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
739	/*S5*/
740	nist_set_384(t_d, buf,0,0,0,0,23,22,21,20,0,0,0,0);
741	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
742	/*S6*/
743	nist_set_384(t_d,buf,0,0,0,0,0,0,23,22,21,0,0,20);
744	carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
745	/*D1*/
746	nist_set_384(t_d,buf,22,21,20,19,18,17,16,15,14,13,12,23);
747	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
748	/*D2*/
749	nist_set_384(t_d,buf,0,0,0,0,0,0,0,23,22,21,20,0);
750	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
751	/*D3*/
752	nist_set_384(t_d,buf,0,0,0,0,0,0,0,23,23,0,0,0);
753	carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
754
755	/* see BN_nist_mod_224 for explanation */
756	u.f = bn_sub_words;
757	if (carry > 0)
758		carry = (int)bn_sub_words(r_d,r_d,_nist_p_384[carry-1],BN_NIST_384_TOP);
759	else if (carry < 0)
760		{
761		carry = (int)bn_add_words(r_d,r_d,_nist_p_384[-carry-1],BN_NIST_384_TOP);
762		mask = 0-(PTR_SIZE_INT)carry;
763		u.p = ((PTR_SIZE_INT)bn_sub_words&mask) |
764		 ((PTR_SIZE_INT)bn_add_words&~mask);
765		}
766	else
767		carry = 1;
768
769	mask  = 0-(PTR_SIZE_INT)(*u.f)(c_d,r_d,_nist_p_384[0],BN_NIST_384_TOP);
770	mask &= 0-(PTR_SIZE_INT)carry;
771	res   = (BN_ULONG *)(((PTR_SIZE_INT)c_d&~mask) |
772	 ((PTR_SIZE_INT)r_d&mask));
773	nist_cp_bn(r_d, res, BN_NIST_384_TOP);
774	r->top = BN_NIST_384_TOP;
775	bn_correct_top(r);
776
777	return 1;
778	}
779
780#define BN_NIST_521_RSHIFT	(521%BN_BITS2)
781#define BN_NIST_521_LSHIFT	(BN_BITS2-BN_NIST_521_RSHIFT)
782#define BN_NIST_521_TOP_MASK	((BN_ULONG)BN_MASK2>>BN_NIST_521_LSHIFT)
783
784int BN_nist_mod_521(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
785	BN_CTX *ctx)
786	{
787	int	top = a->top, i;
788	BN_ULONG *r_d, *a_d = a->d,
789		 t_d[BN_NIST_521_TOP],
790		 val,tmp,*res;
791	PTR_SIZE_INT mask;
792	static const BIGNUM _bignum_nist_p_521_sqr = {
793		(BN_ULONG *)_nist_p_521_sqr,
794		sizeof(_nist_p_521_sqr)/sizeof(_nist_p_521_sqr[0]),
795		sizeof(_nist_p_521_sqr)/sizeof(_nist_p_521_sqr[0]),
796		0,BN_FLG_STATIC_DATA };
797
798	field = &_bignum_nist_p_521; /* just to make sure */
799
800 	if (BN_is_negative(a) || BN_ucmp(a,&_bignum_nist_p_521_sqr)>=0)
801		return BN_nnmod(r, a, field, ctx);
802
803	i = BN_ucmp(field, a);
804	if (i == 0)
805		{
806		BN_zero(r);
807		return 1;
808		}
809	else if (i > 0)
810		return (r == a)? 1 : (BN_copy(r ,a) != NULL);
811
812	if (r != a)
813		{
814		if (!bn_wexpand(r,BN_NIST_521_TOP))
815			return 0;
816		r_d = r->d;
817		nist_cp_bn(r_d,a_d, BN_NIST_521_TOP);
818		}
819	else
820		r_d = a_d;
821
822	/* upper 521 bits, copy ... */
823	nist_cp_bn_0(t_d,a_d + (BN_NIST_521_TOP-1), top - (BN_NIST_521_TOP-1),BN_NIST_521_TOP);
824	/* ... and right shift */
825	for (val=t_d[0],i=0; i<BN_NIST_521_TOP-1; i++)
826		{
827		t_d[i] = ( val>>BN_NIST_521_RSHIFT |
828			  (tmp=t_d[i+1])<<BN_NIST_521_LSHIFT ) & BN_MASK2;
829		val=tmp;
830		}
831	t_d[i] = val>>BN_NIST_521_RSHIFT;
832	/* lower 521 bits */
833	r_d[i] &= BN_NIST_521_TOP_MASK;
834
835	bn_add_words(r_d,r_d,t_d,BN_NIST_521_TOP);
836	mask = 0-(PTR_SIZE_INT)bn_sub_words(t_d,r_d,_nist_p_521,BN_NIST_521_TOP);
837	res  = (BN_ULONG *)(((PTR_SIZE_INT)t_d&~mask) |
838	 ((PTR_SIZE_INT)r_d&mask));
839	nist_cp_bn(r_d,res,BN_NIST_521_TOP);
840	r->top = BN_NIST_521_TOP;
841	bn_correct_top(r);
842
843	return 1;
844	}
845