1897b8e Merge pull request #229 efc571c Add simple testcases for signing with rfc6979 extra entropy. 1573a10 Add ability to pass extra entropy to rfc6979 3087bc4 Merge pull request #228 d9b9f11 Merge pull request #218 0065a8f Eliminate multiple-returns from secp256k1.c. 354ffa3 Make secp256k1_ec_pubkey_create reject oversized secrets. 27bc131 Silence some warnings from pedantic static analysis tools, improve compatibility with C++. 3b7ea63 Merge pull request #221 f789c5b Merge pull request #215 4bc273b Merge pull request #222 137a8ec Merge pull request #216 7c3771d Disable overlength-strings warnings. 8956111 use 128-bit hex seed 02efd06 Use RFC6979 for test PRNGs ae55e85 Use faster byteswapping and avoid alignment-increasing casts. 443cd4b Get rid of hex format and some binary conversions 0bada0e Merge #214: Improve signing API documentation & specification 8030d7c Improve signing API documentation & specification 7b2fc1c Merge #213: Removed gotos, which are hard to trace and maintain. 11690d3 Removed gotos, which are hard to trace and maintain. 122a1ec Merge pull request #205 035406d Merge pull request #206 2d4cd53 Merge pull request #161 34b898d Additional comments for the testing PRNG and a seeding fix. 6efd6e7 Some comments explaining some of the constants in the code. ffccfd2 x86_64 assembly optimization for scalar_4x64 67cbdf0 Merge pull request #207 039723d Benchmarks for all internal operations 6cc8425 Include a comment on secp256k1_ecdsa_sign explaining low-s. f88343f Merge pull request #203 d61e899 Add group operation counts 2473f17 Merge pull request #202 b5bbce6 Some readme updates, e.g. removal of the GMP field. f0d851e Merge pull request #201 a0ea884 Merge pull request #200 f735446 Convert the rest of the codebase to C89. bf2e1ac Convert tests to C89. (also fixes a use of bare "inline" in field) fc8285f Merge pull request #199 fff412e Merge pull request #197 4be8d6f Centralize the definition of uint128_t and use it uniformly. d9543c9 Switch scalar code to C89. fcc48c4 Remove the non-storage cmov 55422b6 Switch ecmult_gen to use storage types 41f8455 Use group element storage type in EC multiplications e68d720 Add group element storage type ff889f7 Field storage type 7137be8 Merge pull request #196 0768bd5 Get rid of variable-length hex string conversions e84e761 Merge pull request #195 792bcdb Covert several more files to C89. 45cdf44 Merge pull request #193 17db09e Merge pull request #194 402878a fix ifdef/ifndef 25b35c7 Convert field code to strict C89 (+ long long, +__int128) 3627437 C89 nits and dead code removal. a9f350d Merge pull request #191 4732d26 Convert the field/group/ecdsa constant initialization to static consts 19f3e76 Remove unused secp256k1_fe_inner_{start, stop} functions f1ebfe3 Convert the scalar constant initialization to static consts git-subtree-dir: src/secp256k1 git-subtree-split: 1897b8e90bbbdcd919427c9a8ae35b420e919d8f
94 lines
4.1 KiB
C
94 lines
4.1 KiB
C
/**********************************************************************
|
|
* Copyright (c) 2014 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
**********************************************************************/
|
|
|
|
#ifndef _SECP256K1_SCALAR_
|
|
#define _SECP256K1_SCALAR_
|
|
|
|
#include "num.h"
|
|
|
|
#if defined HAVE_CONFIG_H
|
|
#include "libsecp256k1-config.h"
|
|
#endif
|
|
|
|
#if defined(USE_SCALAR_4X64)
|
|
#include "scalar_4x64.h"
|
|
#elif defined(USE_SCALAR_8X32)
|
|
#include "scalar_8x32.h"
|
|
#else
|
|
#error "Please select scalar implementation"
|
|
#endif
|
|
|
|
/** Clear a scalar to prevent the leak of sensitive data. */
|
|
static void secp256k1_scalar_clear(secp256k1_scalar_t *r);
|
|
|
|
/** Access bits from a scalar. All requested bits must belong to the same 32-bit limb. */
|
|
static unsigned int secp256k1_scalar_get_bits(const secp256k1_scalar_t *a, unsigned int offset, unsigned int count);
|
|
|
|
/** Access bits from a scalar. Not constant time. */
|
|
static unsigned int secp256k1_scalar_get_bits_var(const secp256k1_scalar_t *a, unsigned int offset, unsigned int count);
|
|
|
|
/** Set a scalar from a big endian byte array. */
|
|
static void secp256k1_scalar_set_b32(secp256k1_scalar_t *r, const unsigned char *bin, int *overflow);
|
|
|
|
/** Set a scalar to an unsigned integer. */
|
|
static void secp256k1_scalar_set_int(secp256k1_scalar_t *r, unsigned int v);
|
|
|
|
/** Convert a scalar to a byte array. */
|
|
static void secp256k1_scalar_get_b32(unsigned char *bin, const secp256k1_scalar_t* a);
|
|
|
|
/** Add two scalars together (modulo the group order). Returns whether it overflowed. */
|
|
static int secp256k1_scalar_add(secp256k1_scalar_t *r, const secp256k1_scalar_t *a, const secp256k1_scalar_t *b);
|
|
|
|
/** Add a power of two to a scalar. The result is not allowed to overflow. */
|
|
static void secp256k1_scalar_add_bit(secp256k1_scalar_t *r, unsigned int bit);
|
|
|
|
/** Multiply two scalars (modulo the group order). */
|
|
static void secp256k1_scalar_mul(secp256k1_scalar_t *r, const secp256k1_scalar_t *a, const secp256k1_scalar_t *b);
|
|
|
|
/** Compute the square of a scalar (modulo the group order). */
|
|
static void secp256k1_scalar_sqr(secp256k1_scalar_t *r, const secp256k1_scalar_t *a);
|
|
|
|
/** Compute the inverse of a scalar (modulo the group order). */
|
|
static void secp256k1_scalar_inverse(secp256k1_scalar_t *r, const secp256k1_scalar_t *a);
|
|
|
|
/** Compute the inverse of a scalar (modulo the group order), without constant-time guarantee. */
|
|
static void secp256k1_scalar_inverse_var(secp256k1_scalar_t *r, const secp256k1_scalar_t *a);
|
|
|
|
/** Compute the complement of a scalar (modulo the group order). */
|
|
static void secp256k1_scalar_negate(secp256k1_scalar_t *r, const secp256k1_scalar_t *a);
|
|
|
|
/** Check whether a scalar equals zero. */
|
|
static int secp256k1_scalar_is_zero(const secp256k1_scalar_t *a);
|
|
|
|
/** Check whether a scalar equals one. */
|
|
static int secp256k1_scalar_is_one(const secp256k1_scalar_t *a);
|
|
|
|
/** Check whether a scalar is higher than the group order divided by 2. */
|
|
static int secp256k1_scalar_is_high(const secp256k1_scalar_t *a);
|
|
|
|
#ifndef USE_NUM_NONE
|
|
/** Convert a scalar to a number. */
|
|
static void secp256k1_scalar_get_num(secp256k1_num_t *r, const secp256k1_scalar_t *a);
|
|
|
|
/** Get the order of the group as a number. */
|
|
static void secp256k1_scalar_order_get_num(secp256k1_num_t *r);
|
|
#endif
|
|
|
|
/** Compare two scalars. */
|
|
static int secp256k1_scalar_eq(const secp256k1_scalar_t *a, const secp256k1_scalar_t *b);
|
|
|
|
#ifdef USE_ENDOMORPHISM
|
|
/** Find r1 and r2 such that r1+r2*2^128 = a. */
|
|
static void secp256k1_scalar_split_128(secp256k1_scalar_t *r1, secp256k1_scalar_t *r2, const secp256k1_scalar_t *a);
|
|
/** Find r1 and r2 such that r1+r2*lambda = a, and r1 and r2 are maximum 128 bits long (see secp256k1_gej_mul_lambda). */
|
|
static void secp256k1_scalar_split_lambda_var(secp256k1_scalar_t *r1, secp256k1_scalar_t *r2, const secp256k1_scalar_t *a);
|
|
#endif
|
|
|
|
/** Multiply a and b (without taking the modulus!), divide by 2**shift, and round to the nearest integer. Shift must be at least 256. */
|
|
static void secp256k1_scalar_mul_shift_var(secp256k1_scalar_t *r, const secp256k1_scalar_t *a, const secp256k1_scalar_t *b, unsigned int shift);
|
|
|
|
#endif
|