bccaf86 Merge pull request #150 2a53a47 Merge pull request #151 5f5a31f Merge pull request #149 3907277 Merge pull request #142 a3e0611 Enable tests in x86 travis builds 45da235 x86 builder 8bb0e93 Merge pull request #155 971fe81 build: fix openssl detection for cross builds f22d73e Explicitly access %0..%2 as 64-bit so we use the right registers for x32 ABI e66d4d6 Avoid the stack in assembly and use explicit registers cf7b2b4 Fix ECDSA message hashes to 32 bytes 056ad31 Really compile with -O3 by default 74ad63a Merge pull request #146 9000458 Merge pull request #145 1f46b00 build: fix __builtin_expect detection for clang aaba2e0 Merge pull request #136 8a0775c Merge pull request #144 ee1eaa7 Merge pull request #141 c88e2b8 Compile with -O3 by default 6558a26 Make the benchmarks print out stats 000bdf6 Rename bench_verify to bench_recovery 7c6fed2 Add a few more additional tests. 992e03b travis: add clang to the test matrix b43b79a Merge pull request #143 e06a924 Include time.h header for time(). 8d11164 Add some additional tests. 3545627 Merge pull request #118 6a9901e Merge pull request #137 376b28b Merge pull request #128 1728806 Merge pull request #138 a5759c5 Check return value of malloc 39bd94d Variable time normalize ad86bdf Merge pull request #140 54b768c Another redundant secp256k1_fe_normalize 69dcaab Merge pull request #139 1c29f2e Remove redundant secp256k1_fe_normalize from secp256k1_gej_add_ge_var. 2b9388b Remove unused secp256k1_fe_inv_all f461b76 Allocate precomputation arrays on the heap b2c9681 Make {mul,sqr}_inner use the same argument order as {mul,sqr} 6793505 Convert YASM code into inline assembly f048615 Rewrite field assembly to match the C version 3ce74b1 Tweak precomputed table size for G git-subtree-dir: src/secp256k1 git-subtree-split: bccaf86caa9c44166e5a66600b742c516e03c3f0
249 lines
9.2 KiB
C
249 lines
9.2 KiB
C
/**********************************************************************
|
|
* Copyright (c) 2013, 2014 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
**********************************************************************/
|
|
|
|
#ifndef _SECP256K1_ECMULT_IMPL_H_
|
|
#define _SECP256K1_ECMULT_IMPL_H_
|
|
|
|
#include "group.h"
|
|
#include "scalar.h"
|
|
#include "ecmult.h"
|
|
|
|
/* optimal for 128-bit and 256-bit exponents. */
|
|
#define WINDOW_A 5
|
|
|
|
/** larger numbers may result in slightly better performance, at the cost of
|
|
exponentially larger precomputed tables. */
|
|
#ifdef USE_ENDOMORPHISM
|
|
/** Two tables for window size 15: 1.375 MiB. */
|
|
#define WINDOW_G 15
|
|
#else
|
|
/** One table for window size 16: 1.375 MiB. */
|
|
#define WINDOW_G 16
|
|
#endif
|
|
|
|
/** Fill a table 'pre' with precomputed odd multiples of a. W determines the size of the table.
|
|
* pre will contains the values [1*a,3*a,5*a,...,(2^(w-1)-1)*a], so it needs place for
|
|
* 2^(w-2) entries.
|
|
*
|
|
* There are two versions of this function:
|
|
* - secp256k1_ecmult_precomp_wnaf_gej, which operates on group elements in jacobian notation,
|
|
* fast to precompute, but slower to use in later additions.
|
|
* - secp256k1_ecmult_precomp_wnaf_ge, which operates on group elements in affine notations,
|
|
* (much) slower to precompute, but a bit faster to use in later additions.
|
|
* To compute a*P + b*G, we use the jacobian version for P, and the affine version for G, as
|
|
* G is constant, so it only needs to be done once in advance.
|
|
*/
|
|
static void secp256k1_ecmult_table_precomp_gej_var(secp256k1_gej_t *pre, const secp256k1_gej_t *a, int w) {
|
|
pre[0] = *a;
|
|
secp256k1_gej_t d; secp256k1_gej_double_var(&d, &pre[0]);
|
|
for (int i=1; i<(1 << (w-2)); i++)
|
|
secp256k1_gej_add_var(&pre[i], &d, &pre[i-1]);
|
|
}
|
|
|
|
static void secp256k1_ecmult_table_precomp_ge_var(secp256k1_ge_t *pre, const secp256k1_gej_t *a, int w) {
|
|
const int table_size = 1 << (w-2);
|
|
secp256k1_gej_t *prej = checked_malloc(sizeof(secp256k1_gej_t) * table_size);
|
|
prej[0] = *a;
|
|
secp256k1_gej_t d; secp256k1_gej_double_var(&d, a);
|
|
for (int i=1; i<table_size; i++) {
|
|
secp256k1_gej_add_var(&prej[i], &d, &prej[i-1]);
|
|
}
|
|
secp256k1_ge_set_all_gej_var(table_size, pre, prej);
|
|
free(prej);
|
|
}
|
|
|
|
/** The number of entries a table with precomputed multiples needs to have. */
|
|
#define ECMULT_TABLE_SIZE(w) (1 << ((w)-2))
|
|
|
|
/** The following two macro retrieves a particular odd multiple from a table
|
|
* of precomputed multiples. */
|
|
#define ECMULT_TABLE_GET(r,pre,n,w,neg) do { \
|
|
VERIFY_CHECK(((n) & 1) == 1); \
|
|
VERIFY_CHECK((n) >= -((1 << ((w)-1)) - 1)); \
|
|
VERIFY_CHECK((n) <= ((1 << ((w)-1)) - 1)); \
|
|
if ((n) > 0) \
|
|
*(r) = (pre)[((n)-1)/2]; \
|
|
else \
|
|
(neg)((r), &(pre)[(-(n)-1)/2]); \
|
|
} while(0)
|
|
|
|
#define ECMULT_TABLE_GET_GEJ(r,pre,n,w) ECMULT_TABLE_GET((r),(pre),(n),(w),secp256k1_gej_neg_var)
|
|
#define ECMULT_TABLE_GET_GE(r,pre,n,w) ECMULT_TABLE_GET((r),(pre),(n),(w),secp256k1_ge_neg_var)
|
|
|
|
typedef struct {
|
|
/* For accelerating the computation of a*P + b*G: */
|
|
secp256k1_ge_t pre_g[ECMULT_TABLE_SIZE(WINDOW_G)]; /* odd multiples of the generator */
|
|
#ifdef USE_ENDOMORPHISM
|
|
secp256k1_ge_t pre_g_128[ECMULT_TABLE_SIZE(WINDOW_G)]; /* odd multiples of 2^128*generator */
|
|
#endif
|
|
} secp256k1_ecmult_consts_t;
|
|
|
|
static const secp256k1_ecmult_consts_t *secp256k1_ecmult_consts = NULL;
|
|
|
|
static void secp256k1_ecmult_start(void) {
|
|
if (secp256k1_ecmult_consts != NULL)
|
|
return;
|
|
|
|
/* Allocate the precomputation table. */
|
|
secp256k1_ecmult_consts_t *ret = (secp256k1_ecmult_consts_t*)checked_malloc(sizeof(secp256k1_ecmult_consts_t));
|
|
|
|
/* get the generator */
|
|
const secp256k1_ge_t *g = &secp256k1_ge_consts->g;
|
|
secp256k1_gej_t gj; secp256k1_gej_set_ge(&gj, g);
|
|
|
|
#ifdef USE_ENDOMORPHISM
|
|
/* calculate 2^128*generator */
|
|
secp256k1_gej_t g_128j = gj;
|
|
for (int i=0; i<128; i++)
|
|
secp256k1_gej_double_var(&g_128j, &g_128j);
|
|
#endif
|
|
|
|
/* precompute the tables with odd multiples */
|
|
secp256k1_ecmult_table_precomp_ge_var(ret->pre_g, &gj, WINDOW_G);
|
|
#ifdef USE_ENDOMORPHISM
|
|
secp256k1_ecmult_table_precomp_ge_var(ret->pre_g_128, &g_128j, WINDOW_G);
|
|
#endif
|
|
|
|
/* Set the global pointer to the precomputation table. */
|
|
secp256k1_ecmult_consts = ret;
|
|
}
|
|
|
|
static void secp256k1_ecmult_stop(void) {
|
|
if (secp256k1_ecmult_consts == NULL)
|
|
return;
|
|
|
|
secp256k1_ecmult_consts_t *c = (secp256k1_ecmult_consts_t*)secp256k1_ecmult_consts;
|
|
secp256k1_ecmult_consts = NULL;
|
|
free(c);
|
|
}
|
|
|
|
/** Convert a number to WNAF notation. The number becomes represented by sum(2^i * wnaf[i], i=0..bits),
|
|
* with the following guarantees:
|
|
* - each wnaf[i] is either 0, or an odd integer between -(1<<(w-1) - 1) and (1<<(w-1) - 1)
|
|
* - two non-zero entries in wnaf are separated by at least w-1 zeroes.
|
|
* - the number of set values in wnaf is returned. This number is at most 256, and at most one more
|
|
* - than the number of bits in the (absolute value) of the input.
|
|
*/
|
|
static int secp256k1_ecmult_wnaf(int *wnaf, const secp256k1_scalar_t *a, int w) {
|
|
secp256k1_scalar_t s = *a;
|
|
|
|
int sign = 1;
|
|
if (secp256k1_scalar_get_bits(&s, 255, 1)) {
|
|
secp256k1_scalar_negate(&s, &s);
|
|
sign = -1;
|
|
}
|
|
|
|
int set_bits = 0;
|
|
int bit = 0;
|
|
while (bit < 256) {
|
|
if (secp256k1_scalar_get_bits(&s, bit, 1) == 0) {
|
|
bit++;
|
|
continue;
|
|
}
|
|
while (set_bits < bit) {
|
|
wnaf[set_bits++] = 0;
|
|
}
|
|
int now = w;
|
|
if (bit + now > 256) {
|
|
now = 256 - bit;
|
|
}
|
|
int word = secp256k1_scalar_get_bits_var(&s, bit, now);
|
|
if (word & (1 << (w-1))) {
|
|
secp256k1_scalar_add_bit(&s, bit + w);
|
|
wnaf[set_bits++] = sign * (word - (1 << w));
|
|
} else {
|
|
wnaf[set_bits++] = sign * word;
|
|
}
|
|
bit += now;
|
|
}
|
|
return set_bits;
|
|
}
|
|
|
|
static void secp256k1_ecmult(secp256k1_gej_t *r, const secp256k1_gej_t *a, const secp256k1_scalar_t *na, const secp256k1_scalar_t *ng) {
|
|
const secp256k1_ecmult_consts_t *c = secp256k1_ecmult_consts;
|
|
|
|
#ifdef USE_ENDOMORPHISM
|
|
secp256k1_scalar_t na_1, na_lam;
|
|
/* split na into na_1 and na_lam (where na = na_1 + na_lam*lambda, and na_1 and na_lam are ~128 bit) */
|
|
secp256k1_scalar_split_lambda_var(&na_1, &na_lam, na);
|
|
|
|
/* build wnaf representation for na_1 and na_lam. */
|
|
int wnaf_na_1[130]; int bits_na_1 = secp256k1_ecmult_wnaf(wnaf_na_1, &na_1, WINDOW_A);
|
|
int wnaf_na_lam[130]; int bits_na_lam = secp256k1_ecmult_wnaf(wnaf_na_lam, &na_lam, WINDOW_A);
|
|
VERIFY_CHECK(bits_na_1 <= 130);
|
|
VERIFY_CHECK(bits_na_lam <= 130);
|
|
int bits = bits_na_1;
|
|
if (bits_na_lam > bits) bits = bits_na_lam;
|
|
#else
|
|
/* build wnaf representation for na. */
|
|
int wnaf_na[256]; int bits_na = secp256k1_ecmult_wnaf(wnaf_na, na, WINDOW_A);
|
|
int bits = bits_na;
|
|
#endif
|
|
|
|
/* calculate odd multiples of a */
|
|
secp256k1_gej_t pre_a[ECMULT_TABLE_SIZE(WINDOW_A)];
|
|
secp256k1_ecmult_table_precomp_gej_var(pre_a, a, WINDOW_A);
|
|
|
|
#ifdef USE_ENDOMORPHISM
|
|
secp256k1_gej_t pre_a_lam[ECMULT_TABLE_SIZE(WINDOW_A)];
|
|
for (int i=0; i<ECMULT_TABLE_SIZE(WINDOW_A); i++)
|
|
secp256k1_gej_mul_lambda(&pre_a_lam[i], &pre_a[i]);
|
|
|
|
/* Splitted G factors. */
|
|
secp256k1_scalar_t ng_1, ng_128;
|
|
|
|
/* split ng into ng_1 and ng_128 (where gn = gn_1 + gn_128*2^128, and gn_1 and gn_128 are ~128 bit) */
|
|
secp256k1_scalar_split_128(&ng_1, &ng_128, ng);
|
|
|
|
/* Build wnaf representation for ng_1 and ng_128 */
|
|
int wnaf_ng_1[129]; int bits_ng_1 = secp256k1_ecmult_wnaf(wnaf_ng_1, &ng_1, WINDOW_G);
|
|
int wnaf_ng_128[129]; int bits_ng_128 = secp256k1_ecmult_wnaf(wnaf_ng_128, &ng_128, WINDOW_G);
|
|
if (bits_ng_1 > bits) bits = bits_ng_1;
|
|
if (bits_ng_128 > bits) bits = bits_ng_128;
|
|
#else
|
|
int wnaf_ng[257]; int bits_ng = secp256k1_ecmult_wnaf(wnaf_ng, ng, WINDOW_G);
|
|
if (bits_ng > bits) bits = bits_ng;
|
|
#endif
|
|
|
|
secp256k1_gej_set_infinity(r);
|
|
secp256k1_gej_t tmpj;
|
|
secp256k1_ge_t tmpa;
|
|
|
|
for (int i=bits-1; i>=0; i--) {
|
|
secp256k1_gej_double_var(r, r);
|
|
int n;
|
|
#ifdef USE_ENDOMORPHISM
|
|
if (i < bits_na_1 && (n = wnaf_na_1[i])) {
|
|
ECMULT_TABLE_GET_GEJ(&tmpj, pre_a, n, WINDOW_A);
|
|
secp256k1_gej_add_var(r, r, &tmpj);
|
|
}
|
|
if (i < bits_na_lam && (n = wnaf_na_lam[i])) {
|
|
ECMULT_TABLE_GET_GEJ(&tmpj, pre_a_lam, n, WINDOW_A);
|
|
secp256k1_gej_add_var(r, r, &tmpj);
|
|
}
|
|
if (i < bits_ng_1 && (n = wnaf_ng_1[i])) {
|
|
ECMULT_TABLE_GET_GE(&tmpa, c->pre_g, n, WINDOW_G);
|
|
secp256k1_gej_add_ge_var(r, r, &tmpa);
|
|
}
|
|
if (i < bits_ng_128 && (n = wnaf_ng_128[i])) {
|
|
ECMULT_TABLE_GET_GE(&tmpa, c->pre_g_128, n, WINDOW_G);
|
|
secp256k1_gej_add_ge_var(r, r, &tmpa);
|
|
}
|
|
#else
|
|
if (i < bits_na && (n = wnaf_na[i])) {
|
|
ECMULT_TABLE_GET_GEJ(&tmpj, pre_a, n, WINDOW_A);
|
|
secp256k1_gej_add_var(r, r, &tmpj);
|
|
}
|
|
if (i < bits_ng && (n = wnaf_ng[i])) {
|
|
ECMULT_TABLE_GET_GE(&tmpa, c->pre_g, n, WINDOW_G);
|
|
secp256k1_gej_add_ge_var(r, r, &tmpa);
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
#endif
|