-
Notifications
You must be signed in to change notification settings - Fork 14
/
ReedSolomon.c
359 lines (329 loc) · 15.1 KB
/
ReedSolomon.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
/**
* Code taken and adapted from www.eccpage.com/rs.c
* Credit goes to Mr Simon Rockliff.
*
* Tried before with the implementation from ITPP library but couldn't make it produce the same outputs
* expected from the P25 transmissions that I have tested. This implementation does work.
*/
/* This program is an encoder/decoder for Reed-Solomon codes. Encoding is in
systematic form, decoding via the Berlekamp iterative algorithm.
In the present form , the constants mm, nn, tt, and kk=nn-2tt must be
specified (the double letters are used simply to avoid clashes with
other n,k,t used in other programs into which this was incorporated!)
Also, the irreducible polynomial used to generate GF(2**mm) must also be
entered -- these can be found in Lin and Costello, and also Clark and Cain.
The representation of the elements of GF(2**m) is either in index form,
where the number is the power of the primitive element alpha, which is
convenient for multiplication (add the powers modulo 2**m-1) or in
polynomial form, where the bits represent the coefficients of the
polynomial representation of the number, which is the most convenient form
for addition. The two forms are swapped between via lookup tables.
This leads to fairly messy looking expressions, but unfortunately, there
is no easy alternative when working with Galois arithmetic.
The code is not written in the most elegant way, but to the best
of my knowledge, (no absolute guarantees!), it works.
However, when including it into a simulation program, you may want to do
some conversion of global variables (used here because I am lazy!) to
local variables where appropriate, and passing parameters (eg array
addresses) to the functions may be a sensible move to reduce the number
of global variables and thus decrease the chance of a bug being introduced.
This program does not handle erasures at present, but should not be hard
to adapt to do this, as it is just an adjustment to the Berlekamp-Massey
algorithm. It also does not attempt to decode past the BCH bound -- see
Blahut "Theory and practice of error control codes" for how to do this.
Simon Rockliff, University of Adelaide 21/9/89
26/6/91 Slight modifications to remove a compiler dependent bug which hadn't
previously surfaced. A few extra comments added for clarity.
Appears to all work fine, ready for posting to net!
Notice
--------
This program may be freely modified and/or given to whoever wants it.
A condition of such distribution is that the author's contribution be
acknowledged by his name being left in the comments heading the program,
however no responsibility is accepted for any financial or other loss which
may result from some unforseen errors or malfunctioning of the program
during use.
Simon Rockliff, 26th June 1991
*/
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <math.h>
#define EXT_(name, ord) rs## ord ## _##name
#define EXT(name, ord) EXT_(name, ord)
/*
* Division by 63: magic number is 0x82082083, shift amount is 37
* Division by 255: magic number is 0x80808081, shift amount is 39
*/
/*
* Generate GF(2**mm) from the irreducible polynomial p(X) in pp[0]..pp[mm] lookup tables:
* index->polynomial form alpha_to[] contains j=alpha**i;
* polynomial form -> index form index_of[j=alpha**i] = i
* alpha=2 is the primitive element of GF(2**mm)
* Also, obtain the generator polynomial of the tt-error correcting,
* length nn=(2**mm -1) Reed Solomon code from the product of (X+alpha**i), i=1..2*tt
*/
void EXT(init, MM)(ReedSolomon *rs, unsigned int generator_polinomial, unsigned char tt)
{
register int i, j, mask = 1;
rs->tt = tt;
rs->n = 2*rs->tt;
rs->alpha_to[MM] = 0;
for (i = 0; i < MM; i++) {
rs->alpha_to[i] = mask;
rs->index_of[rs->alpha_to[i]] = i;
if (((generator_polinomial >> i) & 1) != 0)
rs->alpha_to[MM] ^= mask;
mask <<= 1;
}
rs->index_of[rs->alpha_to[MM]] = MM;
mask >>= 1;
for (i = MM + 1; i < NN; i++) {
if (rs->alpha_to[i - 1] >= mask)
rs->alpha_to[i] = rs->alpha_to[MM] ^ ((rs->alpha_to[i - 1] ^ mask) << 1);
else
rs->alpha_to[i] = rs->alpha_to[i - 1] << 1;
rs->index_of[rs->alpha_to[i]] = i;
}
rs->index_of[0] = -1;
rs->gg[0] = 2; /* primitive element alpha = 2 for GF(2**mm) */
rs->gg[1] = 1; /* g(x) = (X+alpha) initially */
for (i = 2; i <= rs->n; i++) {
rs->gg[i] = 1;
for (j = i - 1; j > 0; j--)
if (rs->gg[j] != 0)
rs->gg[j] = rs->gg[j - 1] ^ rs->alpha_to[(unsigned int)(rs->index_of[rs->gg[j]] + i) % NN];
else
rs->gg[j] = rs->gg[j - 1];
rs->gg[0] = rs->alpha_to[(unsigned int)(rs->index_of[rs->gg[0]] + i) % NN]; /* gg[0] can never be zero */
}
/* convert gg[] to index form for quicker encoding */
for (i = 0; i <= rs->n; i++)
rs->gg[i] = rs->index_of[rs->gg[i]];
}
/* take the string of symbols in data[i], i=0..(k-1) and encode systematically
to produce 2*tt parity symbols in bb[0]..bb[2*tt-1]
data[] is input and bb[] is output in polynomial form.
Encoding is done by using a feedback shift register with appropriate
connections specified by the elements of gg[], which was generated above.
Codeword is c(X) = data(X)*X**(nn-kk)+ b(X) */
void EXT(encode, MM)(ReedSolomon *rs, const unsigned char *data, unsigned char *bb)
{
register int i, j, k = (NN - rs->n);
int feedback;
for (i = 0; i < rs->n; i++)
bb[i] = 0;
for (i = k - 1; i >= 0; i--) {
feedback = rs->index_of[data[i] ^ bb[rs->n - 1]];
if (feedback != -1) {
for (j = rs->n - 1; j > 0; j--)
bb[j] = bb[j - 1] ^ rs->alpha_to[(unsigned int)(rs->gg[j] + feedback) % NN];
bb[0] = rs->alpha_to[(unsigned int)(rs->gg[0] + feedback) % NN];
} else {
for (j = rs->n - 1; j > 0; j--)
bb[j] = bb[j - 1];
bb[0] = 0;
}
}
}
/* assume we have received bits grouped into mm-bit symbols in recd[i],
i=0..(nn-1), and recd[i] is polynomial form.
We first compute the 2*tt syndromes by substituting alpha**i into rec(X) and
evaluating, storing the syndromes in s[i], i=1..2tt (leave s[0] zero) .
Then we use the Berlekamp iteration to find the error location polynomial
elp[i]. If the degree of the elp is >tt, we cannot correct all the errors
and hence just put out the information symbols uncorrected. If the degree of
elp is <=tt, we substitute alpha**i , i=1..n into the elp to get the roots,
hence the inverse roots, the error location numbers. If the number of errors
located does not equal the degree of the elp, we have more than tt errors
and cannot correct them. Otherwise, we then solve for the error value at
the error location and correct the error. The procedure is that found in
Lin and Costello. For the cases where the number of errors is known to be too
large to correct, the information symbols as received are output (the
advantage of systematic encoding is that hopefully some of the information
symbols will be okay and that if we are in luck, the errors are in the
parity part of the transmitted codeword). Of course, these insoluble cases
can be returned as error flags to the calling routine if desired. */
int EXT(decode, MM)(ReedSolomon *rs, unsigned char *input, unsigned char *recd)
{
//register int i, j, u, q;
register int i, j, u;
register unsigned int q, syn_error = 0;
int elp[NN + 2][NN], d[NN + 2], l[NN + 2], u_lu[NN + 2], s[NN + 1];
int count = 0, root[MAX_TT], loc[MAX_TT], z[MAX_TT + 1], err[NN], reg[MAX_TT + 1];
int irrecoverable_error = 0;
for (i = 0; i < NN; i++)
recd[i] = rs->index_of[input[i]]; /* put recd[i] into index form (ie as powers of alpha) */
/* first form the syndromes */
for (i = 1; i <= rs->n; i++) {
s[i] = 0;
for (j = 0; j < NN; j++)
s[i] ^= rs->alpha_to[(unsigned int)(recd[j] + i * j) % NN]; /* recd[j] in index form */
/* convert syndrome from polynomial form to index form */
if (s[i] != 0)
syn_error++; /* set flag if non-zero syndrome => error */
s[i] = rs->index_of[s[i]];
}
if (syn_error) /* if errors, try and correct */
{
/* compute the error location polynomial via the Berlekamp iterative algorithm,
following the terminology of Lin and Costello : d[u] is the 'mu'th
discrepancy, where u='mu'+1 and 'mu' (the Greek letter!) is the step number
ranging from -1 to 2*tt (see L&C), l[u] is the
degree of the elp at that step, and u_l[u] is the difference between the
step number and the degree of the elp.
*/
/* initialise table entries */
d[0] = 0; /* index form */
d[1] = s[1]; /* index form */
elp[0][0] = 0; /* index form */
elp[1][0] = 1; /* polynomial form */
for (i = 1; i < rs->n; i++) {
elp[0][i] = -1; /* index form */
elp[1][i] = 0; /* polynomial form */
}
l[0] = 0;
l[1] = 0;
u_lu[0] = -1;
u_lu[1] = 0;
u = 0;
do {
u++;
if (d[u] == -1) {
l[u + 1] = l[u];
for (i = 0; i <= l[u]; i++) {
elp[u + 1][i] = elp[u][i];
elp[u][i] = rs->index_of[elp[u][i]];
}
} else
/* search for words with greatest u_lu[q] for which d[q]!=0 */
{
q = u - 1;
while ((d[q] == -1) && (q > 0))
q--;
/* have found first non-zero d[q] */
if (q > 0) {
j = q;
do {
j--;
if ((d[j] != -1) && (u_lu[q] < u_lu[j]))
q = j;
} while (j > 0);
};
/* have now found q such that d[u]!=0 and u_lu[q] is maximum */
/* store degree of new elp polynomial */
if (l[u] > l[q] + u - q)
l[u + 1] = l[u];
else
l[u + 1] = l[q] + u - q;
/* form new elp(x) */
for (i = 0; i < rs->n; i++)
elp[u + 1][i] = 0;
for (i = 0; i <= l[q]; i++)
if (elp[q][i] != -1)
elp[u + 1][i + u - q] = rs->alpha_to[(unsigned int)(d[u] + NN - d[q] + elp[q][i]) % NN];
for (i = 0; i <= l[u]; i++) {
elp[u + 1][i] ^= elp[u][i];
elp[u][i] = rs->index_of[elp[u][i]]; /*convert old elp value to index*/
}
}
u_lu[u + 1] = u - l[u + 1];
/* form (u+1)th discrepancy */
if (u < NN) /* no discrepancy computed on last iteration */
{
if (s[u + 1] != -1)
d[u + 1] = rs->alpha_to[s[u + 1]];
else
d[u + 1] = 0;
for (i = 1; i <= l[u + 1]; i++)
if ((s[u + 1 - i] != -1) && (elp[u + 1][i] != 0))
d[u + 1] ^= rs->alpha_to[(unsigned int)(s[u + 1 - i] + rs->index_of[elp[u + 1][i]]) % NN];
d[u + 1] = rs->index_of[d[u + 1]]; /* put d[u+1] into index form */
}
} while ((u < rs->n) && (l[u + 1] <= rs->tt));
u++;
if (l[u] <= rs->tt) /* can correct error */
{
/* put elp into index form */
for (i = 0; i <= l[u]; i++)
elp[u][i] = rs->index_of[elp[u][i]];
/* find roots of the error location polynomial */
for (i = 1; i <= l[u]; i++)
reg[i] = elp[u][i];
count = 0;
for (i = 1; i <= NN; i++) {
q = 1;
for (j = 1; j <= l[u]; j++)
if (reg[j] != -1) {
reg[j] = ((unsigned int)(reg[j] + j) % NN);
q ^= rs->alpha_to[reg[j]];
};
if (!q) /* store root and error location number indices */
{
root[count] = i;
loc[count] = NN - i;
count++;
};
};
if (count == l[u]) /* no. roots = degree of elp hence <= tt errors */
{
/* form polynomial z(x) */
for (i = 1; i <= l[u]; i++) /* Z[0] = 1 always - do not need */
{
if ((s[i] != -1) && (elp[u][i] != -1))
z[i] = rs->alpha_to[s[i]] ^ rs->alpha_to[elp[u][i]];
else if ((s[i] != -1) && (elp[u][i] == -1))
z[i] = rs->alpha_to[s[i]];
else if ((s[i] == -1) && (elp[u][i] != -1))
z[i] = rs->alpha_to[elp[u][i]];
else
z[i] = 0;
for (j = 1; j < i; j++)
if ((s[j] != -1) && (elp[u][i - j] != -1))
z[i] ^= rs->alpha_to[(unsigned int)(elp[u][i - j] + s[j]) % NN];
z[i] = rs->index_of[z[i]]; /* put into index form */
};
/* evaluate errors at locations given by error location numbers loc[i] */
for (i = 0; i < NN; i++) {
err[i] = 0;
/* convert recd[] to polynomial form */
recd[i] = rs->alpha_to[recd[i]];
}
for (i = 0; i < l[u]; i++) /* compute numerator of error term first */
{
err[loc[i]] = 1; /* accounts for z[0] */
for (j = 1; j <= l[u]; j++)
if (z[j] != -1)
err[loc[i]] ^= rs->alpha_to[(unsigned int)(z[j] + j * root[i]) % NN];
if (err[loc[i]] != 0) {
err[loc[i]] = rs->index_of[err[loc[i]]];
q = 0; /* form denominator of error term */
for (j = 0; j < l[u]; j++)
if (j != i)
q += rs->index_of[1 ^ rs->alpha_to[(unsigned int)(loc[j] + root[i]) % NN]];
q = q % NN;
err[loc[i]] = rs->alpha_to[(unsigned int)(err[loc[i]] - q + NN) % NN];
recd[loc[i]] ^= err[loc[i]]; /* recd[i] must be in polynomial form */
}
}
} else {
/* no. roots != degree of elp => >tt errors and cannot solve */
irrecoverable_error = 1;
}
} else {
/* elp has degree >tt hence cannot solve */
irrecoverable_error = 2;
}
} else {
/* no non-zero syndromes => no errors: output received codeword */
for (i = 0; i < NN; i++)
/* convert recd[] to polynomial form */
recd[i] = rs->alpha_to[recd[i]];
}
if (irrecoverable_error) {
for (i = 0; i < NN; i++) /* could return error flag if desired */
/* convert recd[] to polynomial form */
recd[i] = rs->alpha_to[recd[i]];
}
return irrecoverable_error;
}