1897b8e Merge pull request #229 efc571c Add simple testcases for signing with rfc6979 extra entropy. 1573a10 Add ability to pass extra entropy to rfc6979 3087bc4 Merge pull request #228 d9b9f11 Merge pull request #218 0065a8f Eliminate multiple-returns from secp256k1.c. 354ffa3 Make secp256k1_ec_pubkey_create reject oversized secrets. 27bc131 Silence some warnings from pedantic static analysis tools, improve compatibility with C++. 3b7ea63 Merge pull request #221 f789c5b Merge pull request #215 4bc273b Merge pull request #222 137a8ec Merge pull request #216 7c3771d Disable overlength-strings warnings. 8956111 use 128-bit hex seed 02efd06 Use RFC6979 for test PRNGs ae55e85 Use faster byteswapping and avoid alignment-increasing casts. 443cd4b Get rid of hex format and some binary conversions 0bada0e Merge #214: Improve signing API documentation & specification 8030d7c Improve signing API documentation & specification 7b2fc1c Merge #213: Removed gotos, which are hard to trace and maintain. 11690d3 Removed gotos, which are hard to trace and maintain. 122a1ec Merge pull request #205 035406d Merge pull request #206 2d4cd53 Merge pull request #161 34b898d Additional comments for the testing PRNG and a seeding fix. 6efd6e7 Some comments explaining some of the constants in the code. ffccfd2 x86_64 assembly optimization for scalar_4x64 67cbdf0 Merge pull request #207 039723d Benchmarks for all internal operations 6cc8425 Include a comment on secp256k1_ecdsa_sign explaining low-s. f88343f Merge pull request #203 d61e899 Add group operation counts 2473f17 Merge pull request #202 b5bbce6 Some readme updates, e.g. removal of the GMP field. f0d851e Merge pull request #201 a0ea884 Merge pull request #200 f735446 Convert the rest of the codebase to C89. bf2e1ac Convert tests to C89. (also fixes a use of bare "inline" in field) fc8285f Merge pull request #199 fff412e Merge pull request #197 4be8d6f Centralize the definition of uint128_t and use it uniformly. d9543c9 Switch scalar code to C89. fcc48c4 Remove the non-storage cmov 55422b6 Switch ecmult_gen to use storage types 41f8455 Use group element storage type in EC multiplications e68d720 Add group element storage type ff889f7 Field storage type 7137be8 Merge pull request #196 0768bd5 Get rid of variable-length hex string conversions e84e761 Merge pull request #195 792bcdb Covert several more files to C89. 45cdf44 Merge pull request #193 17db09e Merge pull request #194 402878a fix ifdef/ifndef 25b35c7 Convert field code to strict C89 (+ long long, +__int128) 3627437 C89 nits and dead code removal. a9f350d Merge pull request #191 4732d26 Convert the field/group/ecdsa constant initialization to static consts 19f3e76 Remove unused secp256k1_fe_inner_{start, stop} functions f1ebfe3 Convert the scalar constant initialization to static consts git-subtree-dir: src/secp256k1 git-subtree-split: 1897b8e90bbbdcd919427c9a8ae35b420e919d8f
238 lines
7.4 KiB
C
238 lines
7.4 KiB
C
/**********************************************************************
|
|
* Copyright (c) 2013, 2014 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
**********************************************************************/
|
|
|
|
#ifndef _SECP256K1_NUM_REPR_IMPL_H_
|
|
#define _SECP256K1_NUM_REPR_IMPL_H_
|
|
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <gmp.h>
|
|
|
|
#include "util.h"
|
|
#include "num.h"
|
|
|
|
#ifdef VERIFY
|
|
static void secp256k1_num_sanity(const secp256k1_num_t *a) {
|
|
VERIFY_CHECK(a->limbs == 1 || (a->limbs > 1 && a->data[a->limbs-1] != 0));
|
|
}
|
|
#else
|
|
#define secp256k1_num_sanity(a) do { } while(0)
|
|
#endif
|
|
|
|
static void secp256k1_num_copy(secp256k1_num_t *r, const secp256k1_num_t *a) {
|
|
*r = *a;
|
|
}
|
|
|
|
static void secp256k1_num_get_bin(unsigned char *r, unsigned int rlen, const secp256k1_num_t *a) {
|
|
unsigned char tmp[65];
|
|
int len = 0;
|
|
int shift = 0;
|
|
if (a->limbs>1 || a->data[0] != 0) {
|
|
len = mpn_get_str(tmp, 256, (mp_limb_t*)a->data, a->limbs);
|
|
}
|
|
while (shift < len && tmp[shift] == 0) shift++;
|
|
VERIFY_CHECK(len-shift <= (int)rlen);
|
|
memset(r, 0, rlen - len + shift);
|
|
if (len > shift) {
|
|
memcpy(r + rlen - len + shift, tmp + shift, len - shift);
|
|
}
|
|
memset(tmp, 0, sizeof(tmp));
|
|
}
|
|
|
|
static void secp256k1_num_set_bin(secp256k1_num_t *r, const unsigned char *a, unsigned int alen) {
|
|
int len;
|
|
VERIFY_CHECK(alen > 0);
|
|
VERIFY_CHECK(alen <= 64);
|
|
len = mpn_set_str(r->data, a, alen, 256);
|
|
if (len == 0) {
|
|
r->data[0] = 0;
|
|
len = 1;
|
|
}
|
|
VERIFY_CHECK(len <= NUM_LIMBS*2);
|
|
r->limbs = len;
|
|
r->neg = 0;
|
|
while (r->limbs > 1 && r->data[r->limbs-1]==0) r->limbs--;
|
|
}
|
|
|
|
static void secp256k1_num_add_abs(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
mp_limb_t c = mpn_add(r->data, a->data, a->limbs, b->data, b->limbs);
|
|
r->limbs = a->limbs;
|
|
if (c != 0) {
|
|
VERIFY_CHECK(r->limbs < 2*NUM_LIMBS);
|
|
r->data[r->limbs++] = c;
|
|
}
|
|
}
|
|
|
|
static void secp256k1_num_sub_abs(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
mp_limb_t c = mpn_sub(r->data, a->data, a->limbs, b->data, b->limbs);
|
|
VERIFY_CHECK(c == 0);
|
|
r->limbs = a->limbs;
|
|
while (r->limbs > 1 && r->data[r->limbs-1]==0) r->limbs--;
|
|
}
|
|
|
|
static void secp256k1_num_mod(secp256k1_num_t *r, const secp256k1_num_t *m) {
|
|
secp256k1_num_sanity(r);
|
|
secp256k1_num_sanity(m);
|
|
|
|
if (r->limbs >= m->limbs) {
|
|
mp_limb_t t[2*NUM_LIMBS];
|
|
mpn_tdiv_qr(t, r->data, 0, r->data, r->limbs, m->data, m->limbs);
|
|
memset(t, 0, sizeof(t));
|
|
r->limbs = m->limbs;
|
|
while (r->limbs > 1 && r->data[r->limbs-1]==0) r->limbs--;
|
|
}
|
|
|
|
if (r->neg && (r->limbs > 1 || r->data[0] != 0)) {
|
|
secp256k1_num_sub_abs(r, m, r);
|
|
r->neg = 0;
|
|
}
|
|
}
|
|
|
|
static void secp256k1_num_mod_inverse(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *m) {
|
|
int i;
|
|
mp_limb_t g[NUM_LIMBS+1];
|
|
mp_limb_t u[NUM_LIMBS+1];
|
|
mp_limb_t v[NUM_LIMBS+1];
|
|
mp_size_t sn;
|
|
mp_size_t gn;
|
|
secp256k1_num_sanity(a);
|
|
secp256k1_num_sanity(m);
|
|
|
|
/** mpn_gcdext computes: (G,S) = gcdext(U,V), where
|
|
* * G = gcd(U,V)
|
|
* * G = U*S + V*T
|
|
* * U has equal or more limbs than V, and V has no padding
|
|
* If we set U to be (a padded version of) a, and V = m:
|
|
* G = a*S + m*T
|
|
* G = a*S mod m
|
|
* Assuming G=1:
|
|
* S = 1/a mod m
|
|
*/
|
|
VERIFY_CHECK(m->limbs <= NUM_LIMBS);
|
|
VERIFY_CHECK(m->data[m->limbs-1] != 0);
|
|
for (i = 0; i < m->limbs; i++) {
|
|
u[i] = (i < a->limbs) ? a->data[i] : 0;
|
|
v[i] = m->data[i];
|
|
}
|
|
sn = NUM_LIMBS+1;
|
|
gn = mpn_gcdext(g, r->data, &sn, u, m->limbs, v, m->limbs);
|
|
VERIFY_CHECK(gn == 1);
|
|
VERIFY_CHECK(g[0] == 1);
|
|
r->neg = a->neg ^ m->neg;
|
|
if (sn < 0) {
|
|
mpn_sub(r->data, m->data, m->limbs, r->data, -sn);
|
|
r->limbs = m->limbs;
|
|
while (r->limbs > 1 && r->data[r->limbs-1]==0) r->limbs--;
|
|
} else {
|
|
r->limbs = sn;
|
|
}
|
|
memset(g, 0, sizeof(g));
|
|
memset(u, 0, sizeof(u));
|
|
memset(v, 0, sizeof(v));
|
|
}
|
|
|
|
static int secp256k1_num_is_zero(const secp256k1_num_t *a) {
|
|
return (a->limbs == 1 && a->data[0] == 0);
|
|
}
|
|
|
|
static int secp256k1_num_is_neg(const secp256k1_num_t *a) {
|
|
return (a->limbs > 1 || a->data[0] != 0) && a->neg;
|
|
}
|
|
|
|
static int secp256k1_num_cmp(const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
if (a->limbs > b->limbs) return 1;
|
|
if (a->limbs < b->limbs) return -1;
|
|
return mpn_cmp(a->data, b->data, a->limbs);
|
|
}
|
|
|
|
static int secp256k1_num_eq(const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
if (a->limbs > b->limbs) return 0;
|
|
if (a->limbs < b->limbs) return 0;
|
|
if ((a->neg && !secp256k1_num_is_zero(a)) != (b->neg && !secp256k1_num_is_zero(b))) return 0;
|
|
return mpn_cmp(a->data, b->data, a->limbs) == 0;
|
|
}
|
|
|
|
static void secp256k1_num_subadd(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b, int bneg) {
|
|
if (!(b->neg ^ bneg ^ a->neg)) { /* a and b have the same sign */
|
|
r->neg = a->neg;
|
|
if (a->limbs >= b->limbs) {
|
|
secp256k1_num_add_abs(r, a, b);
|
|
} else {
|
|
secp256k1_num_add_abs(r, b, a);
|
|
}
|
|
} else {
|
|
if (secp256k1_num_cmp(a, b) > 0) {
|
|
r->neg = a->neg;
|
|
secp256k1_num_sub_abs(r, a, b);
|
|
} else {
|
|
r->neg = b->neg ^ bneg;
|
|
secp256k1_num_sub_abs(r, b, a);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void secp256k1_num_add(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
secp256k1_num_sanity(a);
|
|
secp256k1_num_sanity(b);
|
|
secp256k1_num_subadd(r, a, b, 0);
|
|
}
|
|
|
|
static void secp256k1_num_sub(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
secp256k1_num_sanity(a);
|
|
secp256k1_num_sanity(b);
|
|
secp256k1_num_subadd(r, a, b, 1);
|
|
}
|
|
|
|
static void secp256k1_num_mul(secp256k1_num_t *r, const secp256k1_num_t *a, const secp256k1_num_t *b) {
|
|
mp_limb_t tmp[2*NUM_LIMBS+1];
|
|
secp256k1_num_sanity(a);
|
|
secp256k1_num_sanity(b);
|
|
|
|
VERIFY_CHECK(a->limbs + b->limbs <= 2*NUM_LIMBS+1);
|
|
if ((a->limbs==1 && a->data[0]==0) || (b->limbs==1 && b->data[0]==0)) {
|
|
r->limbs = 1;
|
|
r->neg = 0;
|
|
r->data[0] = 0;
|
|
return;
|
|
}
|
|
if (a->limbs >= b->limbs)
|
|
mpn_mul(tmp, a->data, a->limbs, b->data, b->limbs);
|
|
else
|
|
mpn_mul(tmp, b->data, b->limbs, a->data, a->limbs);
|
|
r->limbs = a->limbs + b->limbs;
|
|
if (r->limbs > 1 && tmp[r->limbs - 1]==0) r->limbs--;
|
|
VERIFY_CHECK(r->limbs <= 2*NUM_LIMBS);
|
|
mpn_copyi(r->data, tmp, r->limbs);
|
|
r->neg = a->neg ^ b->neg;
|
|
memset(tmp, 0, sizeof(tmp));
|
|
}
|
|
|
|
static void secp256k1_num_shift(secp256k1_num_t *r, int bits) {
|
|
int i;
|
|
if (bits % GMP_NUMB_BITS) {
|
|
/* Shift within limbs. */
|
|
mpn_rshift(r->data, r->data, r->limbs, bits % GMP_NUMB_BITS);
|
|
}
|
|
if (bits >= GMP_NUMB_BITS) {
|
|
/* Shift full limbs. */
|
|
for (i = 0; i < r->limbs; i++) {
|
|
int index = i + (bits / GMP_NUMB_BITS);
|
|
if (index < r->limbs && index < 2*NUM_LIMBS) {
|
|
r->data[i] = r->data[index];
|
|
} else {
|
|
r->data[i] = 0;
|
|
}
|
|
}
|
|
}
|
|
while (r->limbs>1 && r->data[r->limbs-1]==0) r->limbs--;
|
|
}
|
|
|
|
static void secp256k1_num_negate(secp256k1_num_t *r) {
|
|
r->neg ^= 1;
|
|
}
|
|
|
|
#endif
|