line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::Perl::BigInt; |
2
|
|
|
|
|
|
|
|
3
|
18
|
|
|
18
|
|
598299
|
use strict; |
|
18
|
|
|
|
|
63
|
|
|
18
|
|
|
|
|
482
|
|
4
|
18
|
|
|
18
|
|
84
|
use warnings; |
|
18
|
|
|
|
|
30
|
|
|
18
|
|
|
|
|
471
|
|
5
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
#Even though Crypt::Perl intends to be pure Perl, there’s no reason |
7
|
|
|
|
|
|
|
#not to use faster computation methods when they’re available. |
8
|
18
|
|
|
18
|
|
16510
|
use Math::BigInt try => 'GMP,Pari'; |
|
18
|
|
|
|
|
368751
|
|
|
18
|
|
|
|
|
79
|
|
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
#No FastCalc because of bugs shown in the following test runs: |
11
|
|
|
|
|
|
|
#http://www.cpantesters.org/cpan/report/a03dce70-c698-11e6-a1ce-1a99c671d6e6 |
12
|
|
|
|
|
|
|
#http://www.cpantesters.org/cpan/report/0a3e797e-c693-11e6-8c46-2488c671d6e6 |
13
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
#To test pure Perl speed, comment out the above and enable: |
15
|
|
|
|
|
|
|
#use Math::BigInt; |
16
|
|
|
|
|
|
|
|
17
|
18
|
|
|
18
|
|
357596
|
use parent -norequire => 'Math::BigInt'; |
|
18
|
|
|
|
|
36
|
|
|
18
|
|
|
|
|
135
|
|
18
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
#There has been some trouble getting GMP and Pari to do from_bytes() |
20
|
|
|
|
|
|
|
#and as_bytes(), so let’s check on those here. |
21
|
|
|
|
|
|
|
BEGIN { |
22
|
18
|
50
|
|
18
|
|
1799
|
if ( !eval { __PACKAGE__->fffrom_bytes('1234') } ) { |
|
18
|
|
|
|
|
371
|
|
23
|
18
|
|
|
|
|
107
|
*from_bytes = \&_pp_from_bytes; |
24
|
|
|
|
|
|
|
} |
25
|
|
|
|
|
|
|
|
26
|
18
|
50
|
|
|
|
45
|
if ( !eval { __PACKAGE__->new(1234)->aaas_bytes() } ) { |
|
18
|
|
|
|
|
108
|
|
27
|
18
|
|
|
|
|
1944
|
*as_bytes = \&_pp_as_bytes; |
28
|
|
|
|
|
|
|
} |
29
|
|
|
|
|
|
|
|
30
|
18
|
|
|
|
|
442
|
$@ = q<>; |
31
|
|
|
|
|
|
|
} |
32
|
|
|
|
|
|
|
|
33
|
18
|
|
|
18
|
|
5995
|
use Crypt::Perl::X (); |
|
18
|
|
|
|
|
51
|
|
|
18
|
|
|
|
|
3415
|
|
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
sub _pp_from_bytes { |
36
|
2805
|
|
|
2805
|
|
1041587
|
my $class = shift; |
37
|
|
|
|
|
|
|
|
38
|
2805
|
|
|
|
|
15968
|
return $class->from_hex( unpack 'H*', $_[0] ); |
39
|
|
|
|
|
|
|
} |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
sub _pp_as_bytes { |
42
|
6507
|
|
|
6507
|
|
30880
|
my ($self) = @_; |
43
|
|
|
|
|
|
|
|
44
|
6507
|
50
|
|
|
|
28490
|
die Crypt::Perl::X::create('Generic', "Negatives ($self) can’t convert to bytes!") if $self < 0; |
45
|
|
|
|
|
|
|
|
46
|
6507
|
|
|
|
|
1245298
|
my $hex = $self->as_hex(); |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
#Ensure that we have an even number of hex digits. |
49
|
6507
|
100
|
|
|
|
12840776
|
if (length($hex) % 2) { |
50
|
2328
|
|
|
|
|
7205
|
substr($hex, 1, 1) = q<>; #just remove the “x” of “0x” |
51
|
|
|
|
|
|
|
} |
52
|
|
|
|
|
|
|
else { |
53
|
4179
|
|
|
|
|
10845
|
substr($hex, 0, 2) = q<>; #remove “0x” |
54
|
|
|
|
|
|
|
} |
55
|
|
|
|
|
|
|
|
56
|
6507
|
|
|
|
|
46202
|
return pack 'H*', $hex; |
57
|
|
|
|
|
|
|
} |
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
sub bit_length { |
60
|
1435
|
|
|
1435
|
0
|
11609
|
my ($self) = @_; |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
#Probably faster than 1 + $self->copy()->blog(2) … |
63
|
1435
|
|
|
|
|
5865
|
return( length($self->as_bin()) - 2 ); |
64
|
|
|
|
|
|
|
} |
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
sub test_bit { |
67
|
410370
|
|
|
410370
|
0
|
828817
|
my ($self, $bit_from_least) = @_; |
68
|
|
|
|
|
|
|
|
69
|
410370
|
|
|
|
|
1014933
|
my $bstr = substr( $self->as_bin(), 2 ); |
70
|
|
|
|
|
|
|
|
71
|
410370
|
100
|
|
|
|
491380897
|
return 0 if $bit_from_least >= length($bstr); |
72
|
|
|
|
|
|
|
|
73
|
409859
|
|
|
|
|
1265854
|
return substr($bstr, -$bit_from_least - 1, 1); |
74
|
|
|
|
|
|
|
} |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
1; |