Bitcoin Core 31.99.0
P2P Digital Currency
secp256k1.c
Go to the documentation of this file.
1/***********************************************************************
2 * Copyright (c) 2013-2015 Pieter Wuille *
3 * Distributed under the MIT software license, see the accompanying *
4 * file COPYING or https://www.opensource.org/licenses/mit-license.php.*
5 ***********************************************************************/
6
7/* This is a C project. It should not be compiled with a C++ compiler,
8 * and we error out if we detect one.
9 *
10 * We still want to be able to test the project with a C++ compiler
11 * because it is still good to know if this will lead to real trouble, so
12 * there is a possibility to override the check. But be warned that
13 * compiling with a C++ compiler is not supported. */
14#if defined(__cplusplus) && !defined(SECP256K1_CPLUSPLUS_TEST_OVERRIDE)
15#error Trying to compile a C project with a C++ compiler.
16#endif
17
18#define SECP256K1_BUILD
19
20#include "../include/secp256k1.h"
21#include "../include/secp256k1_preallocated.h"
22
23#include "assumptions.h"
24#include "checkmem.h"
25#include "util.h"
26
27#include "field_impl.h"
28#include "scalar_impl.h"
29#include "group_impl.h"
30#include "ecmult_impl.h"
31#include "ecmult_const_impl.h"
32#include "ecmult_gen_impl.h"
33#include "ecdsa_impl.h"
34#include "eckey_impl.h"
35#include "hash_impl.h"
36#include "int128_impl.h"
37#include "scratch_impl.h"
38#include "selftest.h"
39#include "hsort_impl.h"
40
41#ifdef SECP256K1_NO_BUILD
42# error "secp256k1.h processed without SECP256K1_BUILD defined while building secp256k1.c"
43#endif
44
45#define ARG_CHECK(cond) do { \
46 if (EXPECT(!(cond), 0)) { \
47 secp256k1_callback_call(&ctx->illegal_callback, #cond); \
48 return 0; \
49 } \
50} while(0)
51
52#define ARG_CHECK_VOID(cond) do { \
53 if (EXPECT(!(cond), 0)) { \
54 secp256k1_callback_call(&ctx->illegal_callback, #cond); \
55 return; \
56 } \
57} while(0)
58
59/* Note that whenever you change the context struct, you must also change the
60 * context_eq function. */
67};
68
70 { 0 },
74 0
75};
78
79/* Helper function that determines if a context is proper, i.e., is not the static context or a copy thereof.
80 *
81 * This is intended for "context" functions such as secp256k1_context_clone. Functions that need specific
82 * features of a context should still check for these features directly. For example, a function that needs
83 * ecmult_gen should directly check for the existence of the ecmult_gen context. */
86}
87
91 }
92}
93
95 size_t ret = sizeof(secp256k1_context);
96 /* A return value of 0 is reserved as an indicator for errors when we call this function internally. */
97 VERIFY_CHECK(ret != 0);
98
101 "Invalid flags");
102 return 0;
103 }
104
107 "Declassify flag requires running with memory checking");
108 return 0;
109 }
110
111 return ret;
112}
113
115 VERIFY_CHECK(ctx != NULL);
117 return sizeof(secp256k1_context);
118}
119
121 size_t prealloc_size;
123
125
127 if (prealloc_size == 0) {
128 return NULL;
129 }
130 VERIFY_CHECK(prealloc != NULL);
131 ret = (secp256k1_context*)prealloc;
132 ret->illegal_callback = default_illegal_callback;
133 ret->error_callback = default_error_callback;
134 secp256k1_hash_ctx_init(&ret->hash_ctx);
135
136 /* Flags have been checked by secp256k1_context_preallocated_size. */
138 secp256k1_ecmult_gen_context_build(&ret->ecmult_gen_ctx, &ret->hash_ctx);
140
141 return ret;
142}
143
145 size_t const prealloc_size = secp256k1_context_preallocated_size(flags);
147 if (EXPECT(secp256k1_context_preallocated_create(ctx, flags) == NULL, 0)) {
148 free(ctx);
149 return NULL;
150 }
151
152 return ctx;
153}
154
157 VERIFY_CHECK(ctx != NULL);
158 ARG_CHECK(prealloc != NULL);
160
161 ret = (secp256k1_context*)prealloc;
162 *ret = *ctx;
163 return ret;
164}
165
168 size_t prealloc_size;
169
170 VERIFY_CHECK(ctx != NULL);
172
174 ret = checked_malloc(&ctx->error_callback, prealloc_size);
176 return ret;
177}
178
180 ARG_CHECK_VOID(ctx == NULL || secp256k1_context_is_proper(ctx));
181
182 /* Defined as noop */
183 if (ctx == NULL) {
184 return;
185 }
186
188}
189
191 ARG_CHECK_VOID(ctx == NULL || secp256k1_context_is_proper(ctx));
192
193 /* Defined as noop */
194 if (ctx == NULL) {
195 return;
196 }
197
199 free(ctx);
200}
201
202void secp256k1_context_set_illegal_callback(secp256k1_context* ctx, void (*fun)(const char* message, void* data), const void* data) {
203 /* We compare pointers instead of checking secp256k1_context_is_proper() here
204 because setting callbacks is allowed on *copies* of the static context:
205 it's harmless and makes testing easier. */
207 if (fun == NULL) {
209 }
210 ctx->illegal_callback.fn = fun;
212}
213
214void secp256k1_context_set_error_callback(secp256k1_context* ctx, void (*fun)(const char* message, void* data), const void* data) {
215 /* We compare pointers instead of checking secp256k1_context_is_proper() here
216 because setting callbacks is allowed on *copies* of the static context:
217 it's harmless and makes testing easier. */
219 if (fun == NULL) {
221 }
222 ctx->error_callback.fn = fun;
223 ctx->error_callback.data = data;
224}
225
227 VERIFY_CHECK(ctx != NULL);
229 if (!fn_compression) { /* Reset hash context */
231 return;
232 }
233 /* Check and set */
235 ctx->hash_ctx.fn_sha256_compression = fn_compression;
236}
237
239 return &ctx->hash_ctx;
240}
241
243 VERIFY_CHECK(ctx != NULL);
244 return secp256k1_scratch_create(&ctx->error_callback, max_size);
245}
246
248 VERIFY_CHECK(ctx != NULL);
250}
251
252/* Mark memory as no-longer-secret for the purpose of analysing constant-time behaviour
253 * of the software.
254 */
255static SECP256K1_INLINE void secp256k1_declassify(const secp256k1_context* ctx, const void *p, size_t len) {
256 if (EXPECT(ctx->declassify, 0)) SECP256K1_CHECKMEM_DEFINE(p, len);
257}
258
259static int secp256k1_pubkey_load(const secp256k1_context* ctx, secp256k1_ge* ge, const secp256k1_pubkey* pubkey) {
260 secp256k1_ge_from_bytes(ge, pubkey->data);
262 return 1;
263}
264
266 secp256k1_ge_to_bytes(pubkey->data, ge);
267}
268
269int secp256k1_ec_pubkey_parse(const secp256k1_context* ctx, secp256k1_pubkey* pubkey, const unsigned char *input, size_t inputlen) {
270 secp256k1_ge Q;
271
272 VERIFY_CHECK(ctx != NULL);
273 ARG_CHECK(pubkey != NULL);
274 memset(pubkey, 0, sizeof(*pubkey));
275 ARG_CHECK(input != NULL);
276 if (!secp256k1_eckey_pubkey_parse(&Q, input, inputlen)) {
277 return 0;
278 }
280 return 0;
281 }
282 secp256k1_pubkey_save(pubkey, &Q);
284 return 1;
285}
286
287int secp256k1_ec_pubkey_serialize(const secp256k1_context* ctx, unsigned char *output, size_t *outputlen, const secp256k1_pubkey* pubkey, unsigned int flags) {
288 secp256k1_ge Q;
289 size_t len;
290
291 VERIFY_CHECK(ctx != NULL);
292 ARG_CHECK(outputlen != NULL);
293 ARG_CHECK(*outputlen >= ((flags & SECP256K1_FLAGS_BIT_COMPRESSION) ? 33u : 65u));
294 len = *outputlen;
295 *outputlen = 0;
296 ARG_CHECK(output != NULL);
297 memset(output, 0, len);
298 ARG_CHECK(pubkey != NULL);
300 if (secp256k1_pubkey_load(ctx, &Q, pubkey)) {
303 *outputlen = 33;
304 } else {
306 *outputlen = 65;
307 }
308 return 1;
309 }
310 return 0;
311}
312
313int secp256k1_ec_pubkey_cmp(const secp256k1_context* ctx, const secp256k1_pubkey* pubkey0, const secp256k1_pubkey* pubkey1) {
314 unsigned char out[2][33];
315 const secp256k1_pubkey* pk[2];
316 int i;
317
318 VERIFY_CHECK(ctx != NULL);
319 pk[0] = pubkey0; pk[1] = pubkey1;
320 for (i = 0; i < 2; i++) {
321 size_t out_size = sizeof(out[i]);
322 /* If the public key is NULL or invalid, ec_pubkey_serialize will call
323 * the illegal_callback and return 0. In that case we will serialize the
324 * key as all zeros which is less than any valid public key. This
325 * results in consistent comparisons even if NULL or invalid pubkeys are
326 * involved and prevents edge cases such as sorting algorithms that use
327 * this function and do not terminate as a result. */
328 if (!secp256k1_ec_pubkey_serialize(ctx, out[i], &out_size, pk[i], SECP256K1_EC_COMPRESSED)) {
329 /* Note that ec_pubkey_serialize should already set the output to
330 * zero in that case, but it's not guaranteed by the API, we can't
331 * test it and writing a VERIFY_CHECK is more complex than
332 * explicitly memsetting (again). */
333 memset(out[i], 0, sizeof(out[i]));
334 }
335 }
336 return secp256k1_memcmp_var(out[0], out[1], sizeof(out[0]));
337}
338
339static int secp256k1_ec_pubkey_sort_cmp(const void* pk1, const void* pk2, void *ctx) {
341 *(secp256k1_pubkey **)pk1,
342 *(secp256k1_pubkey **)pk2);
343}
344
345int secp256k1_ec_pubkey_sort(const secp256k1_context* ctx, const secp256k1_pubkey **pubkeys, size_t n_pubkeys) {
346 size_t i;
347
348 VERIFY_CHECK(ctx != NULL);
349 ARG_CHECK(pubkeys != NULL);
350 for (i = 0; i < n_pubkeys; i++) {
351 ARG_CHECK(pubkeys[i] != NULL);
352 }
353
354 /* Suppress wrong warning (fixed in MSVC 19.33) */
355 #if defined(_MSC_VER) && (_MSC_VER < 1933)
356 #pragma warning(push)
357 #pragma warning(disable: 4090)
358 #endif
359
360 /* Casting away const is fine because neither secp256k1_hsort nor
361 * secp256k1_ec_pubkey_sort_cmp modify the data pointed to by the cmp_data
362 * argument. */
363 secp256k1_hsort(pubkeys, n_pubkeys, sizeof(*pubkeys), secp256k1_ec_pubkey_sort_cmp, (void *)ctx);
364
365 #if defined(_MSC_VER) && (_MSC_VER < 1933)
366 #pragma warning(pop)
367 #endif
368
369 return 1;
370}
371
373 (void)ctx;
374 if (sizeof(secp256k1_scalar) == 32) {
375 /* When the secp256k1_scalar type is exactly 32 byte, use its
376 * representation inside secp256k1_ecdsa_signature, as conversion is very fast.
377 * Note that secp256k1_ecdsa_signature_save must use the same representation. */
378 memcpy(r, &sig->data[0], 32);
379 memcpy(s, &sig->data[32], 32);
380 } else {
381 secp256k1_scalar_set_b32(r, &sig->data[0], NULL);
382 secp256k1_scalar_set_b32(s, &sig->data[32], NULL);
383 }
384}
385
387 if (sizeof(secp256k1_scalar) == 32) {
388 memcpy(&sig->data[0], r, 32);
389 memcpy(&sig->data[32], s, 32);
390 } else {
391 secp256k1_scalar_get_b32(&sig->data[0], r);
392 secp256k1_scalar_get_b32(&sig->data[32], s);
393 }
394}
395
396int secp256k1_ecdsa_signature_parse_der(const secp256k1_context* ctx, secp256k1_ecdsa_signature* sig, const unsigned char *input, size_t inputlen) {
398
399 VERIFY_CHECK(ctx != NULL);
400 ARG_CHECK(sig != NULL);
401 ARG_CHECK(input != NULL);
402
403 if (secp256k1_ecdsa_sig_parse(&r, &s, input, inputlen)) {
405 return 1;
406 } else {
407 memset(sig, 0, sizeof(*sig));
408 return 0;
409 }
410}
411
414 int ret = 1;
415 int overflow = 0;
416
417 VERIFY_CHECK(ctx != NULL);
418 ARG_CHECK(sig != NULL);
419 ARG_CHECK(input64 != NULL);
420
421 secp256k1_scalar_set_b32(&r, &input64[0], &overflow);
422 ret &= !overflow;
423 secp256k1_scalar_set_b32(&s, &input64[32], &overflow);
424 ret &= !overflow;
425 if (ret) {
427 } else {
428 memset(sig, 0, sizeof(*sig));
429 }
430 return ret;
431}
432
433int secp256k1_ecdsa_signature_serialize_der(const secp256k1_context* ctx, unsigned char *output, size_t *outputlen, const secp256k1_ecdsa_signature* sig) {
435
436 VERIFY_CHECK(ctx != NULL);
437 ARG_CHECK(output != NULL);
438 ARG_CHECK(outputlen != NULL);
439 ARG_CHECK(sig != NULL);
440
441 secp256k1_ecdsa_signature_load(ctx, &r, &s, sig);
442 return secp256k1_ecdsa_sig_serialize(output, outputlen, &r, &s);
443}
444
447
448 VERIFY_CHECK(ctx != NULL);
449 ARG_CHECK(output64 != NULL);
450 ARG_CHECK(sig != NULL);
451
452 secp256k1_ecdsa_signature_load(ctx, &r, &s, sig);
453 secp256k1_scalar_get_b32(&output64[0], &r);
454 secp256k1_scalar_get_b32(&output64[32], &s);
455 return 1;
456}
457
460 int ret = 0;
461
462 VERIFY_CHECK(ctx != NULL);
463 ARG_CHECK(sigin != NULL);
464
465 secp256k1_ecdsa_signature_load(ctx, &r, &s, sigin);
467 if (sigout != NULL) {
468 if (ret) {
470 }
471 secp256k1_ecdsa_signature_save(sigout, &r, &s);
472 }
473
474 return ret;
475}
476
477int secp256k1_ecdsa_verify(const secp256k1_context* ctx, const secp256k1_ecdsa_signature *sig, const unsigned char *msghash32, const secp256k1_pubkey *pubkey) {
478 secp256k1_ge q;
481 VERIFY_CHECK(ctx != NULL);
482 ARG_CHECK(msghash32 != NULL);
483 ARG_CHECK(sig != NULL);
484 ARG_CHECK(pubkey != NULL);
485
486 secp256k1_scalar_set_b32(&m, msghash32, NULL);
487 secp256k1_ecdsa_signature_load(ctx, &r, &s, sig);
488 return (!secp256k1_scalar_is_high(&s) &&
489 secp256k1_pubkey_load(ctx, &q, pubkey) &&
490 secp256k1_ecdsa_sig_verify(&r, &s, &q, &m));
491}
492
493static SECP256K1_INLINE void buffer_append(unsigned char *buf, unsigned int *offset, const void *data, unsigned int len) {
494 memcpy(buf + *offset, data, len);
495 *offset += len;
496}
497
498static int nonce_function_rfc6979_impl(const secp256k1_hash_ctx *hash_ctx, unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int counter) {
499 unsigned char keydata[112];
500 unsigned int offset = 0;
502 unsigned int i;
504 unsigned char msgmod32[32];
505 secp256k1_scalar_set_b32(&msg, msg32, NULL);
506 secp256k1_scalar_get_b32(msgmod32, &msg);
507 /* We feed a byte array to the PRNG as input, consisting of:
508 * - the private key (32 bytes) and reduced message (32 bytes), see RFC 6979 3.2d.
509 * - optionally 32 extra bytes of data, see RFC 6979 3.6 Additional Data.
510 * - optionally 16 extra bytes with the algorithm name.
511 * Because the arguments have distinct fixed lengths it is not possible for
512 * different argument mixtures to emulate each other and result in the same
513 * nonces.
514 */
515 buffer_append(keydata, &offset, key32, 32);
516 buffer_append(keydata, &offset, msgmod32, 32);
517 if (data != NULL) {
518 buffer_append(keydata, &offset, data, 32);
519 }
520 if (algo16 != NULL) {
521 buffer_append(keydata, &offset, algo16, 16);
522 }
523 secp256k1_rfc6979_hmac_sha256_initialize(hash_ctx, &rng, keydata, offset);
524 for (i = 0; i <= counter; i++) {
525 secp256k1_rfc6979_hmac_sha256_generate(hash_ctx, &rng, nonce32, 32);
526 }
528
529 secp256k1_memclear_explicit(keydata, sizeof(keydata));
531 return 1;
532}
533
534static int nonce_function_rfc6979(unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int counter) {
535 return nonce_function_rfc6979_impl(secp256k1_get_hash_context(secp256k1_context_static), nonce32, msg32, key32, algo16, data, counter);
536}
537
540
541static int secp256k1_ecdsa_sign_inner(const secp256k1_context* ctx, secp256k1_scalar* r, secp256k1_scalar* s, int* recid, const unsigned char *msg32, const unsigned char *seckey, secp256k1_nonce_function noncefp, const void* noncedata) {
542 secp256k1_scalar sec, non, msg;
543 int ret = 0;
544 int is_sec_valid;
545 unsigned char nonce32[32];
546 unsigned int count = 0;
547 /* Default initialization here is important so we won't pass uninit values to the cmov in the end */
550 if (recid) {
551 *recid = 0;
552 }
553
554 /* Fail if the secret key is invalid. */
555 is_sec_valid = secp256k1_scalar_set_b32_seckey(&sec, seckey);
556 secp256k1_scalar_cmov(&sec, &secp256k1_scalar_one, !is_sec_valid);
557 secp256k1_scalar_set_b32(&msg, msg32, NULL);
558 while (1) {
559 int is_nonce_valid;
560
561 if (noncefp == NULL) {
562 /* Use ctx-aware function by default */
563 ret = nonce_function_rfc6979_impl(secp256k1_get_hash_context(ctx), nonce32, msg32, seckey, NULL, (void*)noncedata, count);
564 } else {
565 ret = !!noncefp(nonce32, msg32, seckey, NULL, (void*)noncedata, count);
566 }
567
568 if (!ret) {
569 break;
570 }
571 is_nonce_valid = secp256k1_scalar_set_b32_seckey(&non, nonce32);
572 /* The nonce is still secret here, but it being invalid is less likely than 1:2^255. */
573 secp256k1_declassify(ctx, &is_nonce_valid, sizeof(is_nonce_valid));
574 if (is_nonce_valid) {
575 ret = secp256k1_ecdsa_sig_sign(&ctx->ecmult_gen_ctx, r, s, &sec, &msg, &non, recid);
576 /* The final signature is no longer a secret, nor is the fact that we were successful or not. */
577 secp256k1_declassify(ctx, &ret, sizeof(ret));
578 if (ret) {
579 break;
580 }
581 }
582 count++;
583 }
584 /* We don't want to declassify is_sec_valid and therefore the range of
585 * seckey. As a result is_sec_valid is included in ret only after ret was
586 * used as a branching variable. */
587 ret &= is_sec_valid;
588 secp256k1_memclear_explicit(nonce32, sizeof(nonce32));
594 if (recid) {
595 const int zero = 0;
596 secp256k1_int_cmov(recid, &zero, !ret);
597 }
598 return ret;
599}
600
601int secp256k1_ecdsa_sign(const secp256k1_context* ctx, secp256k1_ecdsa_signature *signature, const unsigned char *msghash32, const unsigned char *seckey, secp256k1_nonce_function noncefp, const void* noncedata) {
603 int ret;
604 VERIFY_CHECK(ctx != NULL);
606 ARG_CHECK(msghash32 != NULL);
607 ARG_CHECK(signature != NULL);
608 ARG_CHECK(seckey != NULL);
609
610 ret = secp256k1_ecdsa_sign_inner(ctx, &r, &s, NULL, msghash32, seckey, noncefp, noncedata);
611 secp256k1_ecdsa_signature_save(signature, &r, &s);
612 return ret;
613}
614
615int secp256k1_ec_seckey_verify(const secp256k1_context* ctx, const unsigned char *seckey) {
617 int ret;
618 VERIFY_CHECK(ctx != NULL);
619 ARG_CHECK(seckey != NULL);
620
621 ret = secp256k1_scalar_set_b32_seckey(&sec, seckey);
623 return ret;
624}
625
626static int secp256k1_ec_pubkey_create_helper(const secp256k1_ecmult_gen_context *ecmult_gen_ctx, secp256k1_scalar *seckey_scalar, secp256k1_ge *p, const unsigned char *seckey) {
627 secp256k1_gej pj;
628 int ret;
629
630 ret = secp256k1_scalar_set_b32_seckey(seckey_scalar, seckey);
632
633 secp256k1_ecmult_gen(ecmult_gen_ctx, &pj, seckey_scalar);
634 secp256k1_ge_set_gej(p, &pj);
636 return ret;
637}
638
639int secp256k1_ec_pubkey_create(const secp256k1_context* ctx, secp256k1_pubkey *pubkey, const unsigned char *seckey) {
640 secp256k1_ge p;
641 secp256k1_scalar seckey_scalar;
642 int ret = 0;
643 VERIFY_CHECK(ctx != NULL);
644 ARG_CHECK(pubkey != NULL);
645 memset(pubkey, 0, sizeof(*pubkey));
647 ARG_CHECK(seckey != NULL);
648
649 ret = secp256k1_ec_pubkey_create_helper(&ctx->ecmult_gen_ctx, &seckey_scalar, &p, seckey);
650 secp256k1_pubkey_save(pubkey, &p);
651 secp256k1_memczero(pubkey, sizeof(*pubkey), !ret);
652
653 secp256k1_scalar_clear(&seckey_scalar);
654 return ret;
655}
656
657int secp256k1_ec_seckey_negate(const secp256k1_context* ctx, unsigned char *seckey) {
659 int ret = 0;
660 VERIFY_CHECK(ctx != NULL);
661 ARG_CHECK(seckey != NULL);
662
663 ret = secp256k1_scalar_set_b32_seckey(&sec, seckey);
665 secp256k1_scalar_negate(&sec, &sec);
666 secp256k1_scalar_get_b32(seckey, &sec);
667
669 return ret;
670}
671
673 int ret = 0;
674 secp256k1_ge p;
675 VERIFY_CHECK(ctx != NULL);
676 ARG_CHECK(pubkey != NULL);
677
678 ret = secp256k1_pubkey_load(ctx, &p, pubkey);
679 memset(pubkey, 0, sizeof(*pubkey));
680 if (ret) {
681 secp256k1_ge_neg(&p, &p);
682 secp256k1_pubkey_save(pubkey, &p);
683 }
684 return ret;
685}
686
687
688static int secp256k1_ec_seckey_tweak_add_helper(secp256k1_scalar *sec, const unsigned char *tweak32) {
689 secp256k1_scalar term;
690 int overflow = 0;
691 int ret = 0;
692
693 secp256k1_scalar_set_b32(&term, tweak32, &overflow);
694 ret = (!overflow) & secp256k1_eckey_privkey_tweak_add(sec, &term);
696 return ret;
697}
698
699int secp256k1_ec_seckey_tweak_add(const secp256k1_context* ctx, unsigned char *seckey, const unsigned char *tweak32) {
701 int ret = 0;
702 VERIFY_CHECK(ctx != NULL);
703 ARG_CHECK(seckey != NULL);
704 ARG_CHECK(tweak32 != NULL);
705
706 ret = secp256k1_scalar_set_b32_seckey(&sec, seckey);
709 secp256k1_scalar_get_b32(seckey, &sec);
710
712 return ret;
713}
714
715static int secp256k1_ec_pubkey_tweak_add_helper(secp256k1_ge *p, const unsigned char *tweak32) {
716 secp256k1_scalar term;
717 int overflow = 0;
718 secp256k1_scalar_set_b32(&term, tweak32, &overflow);
719 return !overflow && secp256k1_eckey_pubkey_tweak_add(p, &term);
720}
721
722int secp256k1_ec_pubkey_tweak_add(const secp256k1_context* ctx, secp256k1_pubkey *pubkey, const unsigned char *tweak32) {
723 secp256k1_ge p;
724 int ret = 0;
725 VERIFY_CHECK(ctx != NULL);
726 ARG_CHECK(pubkey != NULL);
727 ARG_CHECK(tweak32 != NULL);
728
729 ret = secp256k1_pubkey_load(ctx, &p, pubkey);
730 memset(pubkey, 0, sizeof(*pubkey));
732 if (ret) {
733 secp256k1_pubkey_save(pubkey, &p);
734 }
735
736 return ret;
737}
738
739int secp256k1_ec_seckey_tweak_mul(const secp256k1_context* ctx, unsigned char *seckey, const unsigned char *tweak32) {
740 secp256k1_scalar factor;
742 int ret = 0;
743 int overflow = 0;
744 VERIFY_CHECK(ctx != NULL);
745 ARG_CHECK(seckey != NULL);
746 ARG_CHECK(tweak32 != NULL);
747
748 secp256k1_scalar_set_b32(&factor, tweak32, &overflow);
749 ret = secp256k1_scalar_set_b32_seckey(&sec, seckey);
750 ret &= (!overflow) & secp256k1_eckey_privkey_tweak_mul(&sec, &factor);
752 secp256k1_scalar_get_b32(seckey, &sec);
753
755 secp256k1_scalar_clear(&factor);
756 return ret;
757}
758
759int secp256k1_ec_pubkey_tweak_mul(const secp256k1_context* ctx, secp256k1_pubkey *pubkey, const unsigned char *tweak32) {
760 secp256k1_ge p;
761 secp256k1_scalar factor;
762 int ret = 0;
763 int overflow = 0;
764 VERIFY_CHECK(ctx != NULL);
765 ARG_CHECK(pubkey != NULL);
766 ARG_CHECK(tweak32 != NULL);
767
768 secp256k1_scalar_set_b32(&factor, tweak32, &overflow);
769 ret = !overflow && secp256k1_pubkey_load(ctx, &p, pubkey);
770 memset(pubkey, 0, sizeof(*pubkey));
771 if (ret) {
772 if (secp256k1_eckey_pubkey_tweak_mul(&p, &factor)) {
773 secp256k1_pubkey_save(pubkey, &p);
774 } else {
775 ret = 0;
776 }
777 }
778
779 return ret;
780}
781
782int secp256k1_context_randomize(secp256k1_context* ctx, const unsigned char *seed32) {
783 VERIFY_CHECK(ctx != NULL);
785
788 }
789 return 1;
790}
791
792int secp256k1_ec_pubkey_combine(const secp256k1_context* ctx, secp256k1_pubkey *pubnonce, const secp256k1_pubkey * const *pubnonces, size_t n) {
793 size_t i;
794 secp256k1_gej Qj;
795 secp256k1_ge Q;
796
797 VERIFY_CHECK(ctx != NULL);
798 ARG_CHECK(pubnonce != NULL);
799 memset(pubnonce, 0, sizeof(*pubnonce));
800 ARG_CHECK(n >= 1);
801 ARG_CHECK(pubnonces != NULL);
802
804
805 for (i = 0; i < n; i++) {
806 ARG_CHECK(pubnonces[i] != NULL);
807 secp256k1_pubkey_load(ctx, &Q, pubnonces[i]);
808 secp256k1_gej_add_ge(&Qj, &Qj, &Q);
809 }
810 if (secp256k1_gej_is_infinity(&Qj)) {
811 return 0;
812 }
813 secp256k1_ge_set_gej(&Q, &Qj);
814 secp256k1_pubkey_save(pubnonce, &Q);
815 return 1;
816}
817
818int secp256k1_tagged_sha256(const secp256k1_context* ctx, unsigned char *hash32, const unsigned char *tag, size_t taglen, const unsigned char *msg, size_t msglen) {
820 VERIFY_CHECK(ctx != NULL);
821 ARG_CHECK(hash32 != NULL);
822 ARG_CHECK(tag != NULL);
823 ARG_CHECK(msg != NULL);
824
829 return 1;
830}
831
832#ifdef ENABLE_MODULE_ECDH
833# include "modules/ecdh/main_impl.h"
834#endif
835
836#ifdef ENABLE_MODULE_RECOVERY
838#endif
839
840#ifdef ENABLE_MODULE_EXTRAKEYS
842#endif
843
844#ifdef ENABLE_MODULE_SCHNORRSIG
846#endif
847
848#ifdef ENABLE_MODULE_MUSIG
850#endif
851
852#ifdef ENABLE_MODULE_ELLSWIFT
854#endif
int ret
int flags
Definition: bitcoin-tx.cpp:530
#define SECP256K1_CHECKMEM_DEFINE(p, len)
Definition: checkmem.h:106
#define SECP256K1_CHECKMEM_RUNNING()
Definition: checkmem.h:108
static int secp256k1_ecdsa_sig_serialize(unsigned char *sig, size_t *size, const secp256k1_scalar *r, const secp256k1_scalar *s)
static int secp256k1_ecdsa_sig_sign(const secp256k1_ecmult_gen_context *ctx, secp256k1_scalar *r, secp256k1_scalar *s, const secp256k1_scalar *seckey, const secp256k1_scalar *message, const secp256k1_scalar *nonce, int *recid)
static int secp256k1_ecdsa_sig_parse(secp256k1_scalar *r, secp256k1_scalar *s, const unsigned char *sig, size_t size)
static int secp256k1_ecdsa_sig_verify(const secp256k1_scalar *r, const secp256k1_scalar *s, const secp256k1_ge *pubkey, const secp256k1_scalar *message)
static void secp256k1_eckey_pubkey_serialize65(secp256k1_ge *elem, unsigned char *pub65)
Serialize a group element (that is not allowed to be infinity) to an uncompressed public key (65 byte...
static int secp256k1_eckey_privkey_tweak_add(secp256k1_scalar *key, const secp256k1_scalar *tweak)
static int secp256k1_eckey_pubkey_tweak_mul(secp256k1_ge *key, const secp256k1_scalar *tweak)
static int secp256k1_eckey_pubkey_tweak_add(secp256k1_ge *key, const secp256k1_scalar *tweak)
static int secp256k1_eckey_privkey_tweak_mul(secp256k1_scalar *key, const secp256k1_scalar *tweak)
static void secp256k1_eckey_pubkey_serialize33(secp256k1_ge *elem, unsigned char *pub33)
Serialize a group element (that is not allowed to be infinity) to a compressed public key (33 bytes).
static int secp256k1_eckey_pubkey_parse(secp256k1_ge *elem, const unsigned char *pub, size_t size)
static void secp256k1_ecmult_gen_context_clear(secp256k1_ecmult_gen_context *ctx)
static void secp256k1_ecmult_gen_blind(secp256k1_ecmult_gen_context *ctx, const secp256k1_hash_ctx *hash_ctx, const unsigned char *seed32)
static void secp256k1_ecmult_gen(const secp256k1_ecmult_gen_context *ctx, secp256k1_gej *r, const secp256k1_scalar *a)
Multiply with the generator: R = a*G.
static void secp256k1_ecmult_gen_context_build(secp256k1_ecmult_gen_context *ctx, const secp256k1_hash_ctx *hash_ctx)
static int secp256k1_ecmult_gen_context_is_built(const secp256k1_ecmult_gen_context *ctx)
#define secp256k1_fe_is_zero
Definition: field.h:84
static void secp256k1_gej_clear(secp256k1_gej *r)
Clear a secp256k1_gej to prevent leaking sensitive information.
static void secp256k1_gej_set_infinity(secp256k1_gej *r)
Set a group element (jacobian) equal to the point at infinity.
static int secp256k1_gej_is_infinity(const secp256k1_gej *a)
Check whether a group element is the point at infinity.
static void secp256k1_ge_clear(secp256k1_ge *r)
Clear a secp256k1_ge to prevent leaking sensitive information.
static void secp256k1_gej_add_ge(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_ge *b)
Set r equal to the sum of a and b (with b given in affine coordinates, and not infinity).
static void secp256k1_ge_set_gej(secp256k1_ge *r, secp256k1_gej *a)
Set a group element equal to another which is given in jacobian coordinates.
static int secp256k1_ge_is_in_correct_subgroup(const secp256k1_ge *ge)
Determine if a point (which is assumed to be on the curve) is in the correct (sub)group of the curve.
static void secp256k1_ge_neg(secp256k1_ge *r, const secp256k1_ge *a)
Set r equal to the inverse of a (i.e., mirrored around the X axis)
static void secp256k1_ge_to_bytes(unsigned char *buf, const secp256k1_ge *a)
Convert a group element that is not infinity to a 64-byte array.
static void secp256k1_ge_from_bytes(secp256k1_ge *r, const unsigned char *buf)
Convert a 64-byte array into group element.
static void secp256k1_sha256_transform(uint32_t *state, const unsigned char *blocks64, size_t n_blocks)
Definition: hash_impl.h:133
static void secp256k1_sha256_initialize_tagged(const secp256k1_hash_ctx *hash_ctx, secp256k1_sha256 *hash, const unsigned char *tag, size_t taglen)
Definition: hash_impl.h:196
static void secp256k1_hsort(void *ptr, size_t count, size_t size, int(*cmp)(const void *, const void *, void *), void *cmp_data)
#define EXPECT(x, c)
Definition: util.h:26
static void secp256k1_scalar_cmov(secp256k1_scalar *r, const secp256k1_scalar *a, int flag)
If flag is 1, set *r equal to *a; if flag is 0, leave it.
static void secp256k1_scalar_set_b32(secp256k1_scalar *r, const unsigned char *bin, int *overflow)
Set a scalar from a big endian byte array.
static int secp256k1_scalar_set_b32_seckey(secp256k1_scalar *r, const unsigned char *bin)
Set a scalar from a big endian byte array and returns 1 if it is a valid seckey and 0 otherwise.
static void secp256k1_scalar_get_b32(unsigned char *bin, const secp256k1_scalar *a)
Convert a scalar to a byte array.
static void secp256k1_scalar_negate(secp256k1_scalar *r, const secp256k1_scalar *a)
Compute the complement of a scalar (modulo the group order).
static int secp256k1_scalar_is_high(const secp256k1_scalar *a)
Check whether a scalar is higher than the group order divided by 2.
static void secp256k1_scalar_clear(secp256k1_scalar *r)
Clear a scalar to prevent the leak of sensitive data.
static const secp256k1_scalar secp256k1_scalar_zero
Definition: scalar_impl.h:28
static const secp256k1_scalar secp256k1_scalar_one
Definition: scalar_impl.h:27
static void secp256k1_scratch_destroy(const secp256k1_callback *error_callback, secp256k1_scratch *scratch)
static secp256k1_scratch * secp256k1_scratch_create(const secp256k1_callback *error_callback, size_t max_size)
static void secp256k1_sha256_finalize(const secp256k1_hash_ctx *hash_ctx, secp256k1_sha256 *hash, unsigned char *out32)
static void secp256k1_hash_ctx_init(secp256k1_hash_ctx *hash_ctx)
static void secp256k1_rfc6979_hmac_sha256_clear(secp256k1_rfc6979_hmac_sha256 *rng)
static void secp256k1_rfc6979_hmac_sha256_generate(const secp256k1_hash_ctx *hash_ctx, secp256k1_rfc6979_hmac_sha256 *rng, unsigned char *out, size_t outlen)
static void secp256k1_rfc6979_hmac_sha256_initialize(const secp256k1_hash_ctx *hash_ctx, secp256k1_rfc6979_hmac_sha256 *rng, const unsigned char *key, size_t keylen)
static void secp256k1_rfc6979_hmac_sha256_finalize(secp256k1_rfc6979_hmac_sha256 *rng)
static void secp256k1_sha256_write(const secp256k1_hash_ctx *hash_ctx, secp256k1_sha256 *hash, const unsigned char *data, size_t size)
static void secp256k1_sha256_clear(secp256k1_sha256 *hash)
static SECP256K1_INLINE void secp256k1_memclear_explicit(void *ptr, size_t len)
Definition: util.h:258
static SECP256K1_INLINE int secp256k1_memcmp_var(const void *s1, const void *s2, size_t n)
Semantics like memcmp.
Definition: util.h:271
static SECP256K1_INLINE void secp256k1_int_cmov(int *r, const int *a, int flag)
If flag is 1, set *r equal to *a; if flag is 0, leave it.
Definition: util.h:302
static void secp256k1_default_error_callback_fn(const char *str, void *data)
Definition: util.h:102
static const secp256k1_callback default_error_callback
Definition: util.h:117
#define SECP256K1_INLINE
Definition: util.h:54
static void secp256k1_default_illegal_callback_fn(const char *str, void *data)
Definition: util.h:97
#define VERIFY_CHECK(cond)
Definition: util.h:159
static SECP256K1_INLINE void * checked_malloc(const secp256k1_callback *cb, size_t size)
Definition: util.h:162
static SECP256K1_INLINE void secp256k1_memczero(void *s, size_t len, int flag)
Definition: util.h:210
static SECP256K1_INLINE void secp256k1_callback_call(const secp256k1_callback *const cb, const char *const text)
Definition: util.h:92
static const secp256k1_callback default_illegal_callback
Definition: util.h:112
void secp256k1_context_set_sha256_compression(secp256k1_context *ctx, secp256k1_sha256_compression_function fn_compression)
Set a callback function to override the internal SHA256 compression function.
Definition: secp256k1.c:226
const secp256k1_nonce_function secp256k1_nonce_function_default
Definition: secp256k1.c:539
secp256k1_context * secp256k1_context_preallocated_clone(const secp256k1_context *ctx, void *prealloc)
Copy a secp256k1 context object into caller-provided memory.
Definition: secp256k1.c:155
const secp256k1_nonce_function secp256k1_nonce_function_rfc6979
Definition: secp256k1.c:538
int secp256k1_tagged_sha256(const secp256k1_context *ctx, unsigned char *hash32, const unsigned char *tag, size_t taglen, const unsigned char *msg, size_t msglen)
Compute a tagged hash as defined in BIP-340.
Definition: secp256k1.c:818
int secp256k1_ec_pubkey_tweak_add(const secp256k1_context *ctx, secp256k1_pubkey *pubkey, const unsigned char *tweak32)
Tweak a public key by adding tweak times the generator to it.
Definition: secp256k1.c:722
int secp256k1_ec_pubkey_serialize(const secp256k1_context *ctx, unsigned char *output, size_t *outputlen, const secp256k1_pubkey *pubkey, unsigned int flags)
Serialize a pubkey object into a serialized byte sequence.
Definition: secp256k1.c:287
int secp256k1_ecdsa_signature_serialize_der(const secp256k1_context *ctx, unsigned char *output, size_t *outputlen, const secp256k1_ecdsa_signature *sig)
Serialize an ECDSA signature in DER format.
Definition: secp256k1.c:433
const secp256k1_context *const secp256k1_context_no_precomp
Definition: secp256k1.c:77
static int secp256k1_ec_seckey_tweak_add_helper(secp256k1_scalar *sec, const unsigned char *tweak32)
Definition: secp256k1.c:688
int secp256k1_ec_seckey_tweak_mul(const secp256k1_context *ctx, unsigned char *seckey, const unsigned char *tweak32)
Tweak a secret key by multiplying it by a tweak.
Definition: secp256k1.c:739
int secp256k1_ec_pubkey_parse(const secp256k1_context *ctx, secp256k1_pubkey *pubkey, const unsigned char *input, size_t inputlen)
Parse a variable-length public key into the pubkey object.
Definition: secp256k1.c:269
static void secp256k1_scratch_space_destroy(const secp256k1_context *ctx, secp256k1_scratch_space *scratch)
Definition: secp256k1.c:247
size_t secp256k1_context_preallocated_clone_size(const secp256k1_context *ctx)
Determine the memory size of a secp256k1 context object to be copied into caller-provided memory.
Definition: secp256k1.c:114
int secp256k1_ec_seckey_verify(const secp256k1_context *ctx, const unsigned char *seckey)
Verify an elliptic curve secret key.
Definition: secp256k1.c:615
static int secp256k1_context_is_proper(const secp256k1_context *ctx)
Definition: secp256k1.c:84
int secp256k1_ec_pubkey_sort(const secp256k1_context *ctx, const secp256k1_pubkey **pubkeys, size_t n_pubkeys)
Sort public keys using lexicographic (of compressed serialization) order.
Definition: secp256k1.c:345
int secp256k1_ec_seckey_tweak_add(const secp256k1_context *ctx, unsigned char *seckey, const unsigned char *tweak32)
Tweak a secret key by adding tweak to it.
Definition: secp256k1.c:699
void secp256k1_context_preallocated_destroy(secp256k1_context *ctx)
Destroy a secp256k1 context object that has been created in caller-provided memory.
Definition: secp256k1.c:179
static int nonce_function_rfc6979_impl(const secp256k1_hash_ctx *hash_ctx, unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int counter)
Definition: secp256k1.c:498
#define ARG_CHECK(cond)
Definition: secp256k1.c:45
static int secp256k1_ec_pubkey_create_helper(const secp256k1_ecmult_gen_context *ecmult_gen_ctx, secp256k1_scalar *seckey_scalar, secp256k1_ge *p, const unsigned char *seckey)
Definition: secp256k1.c:626
int secp256k1_ecdsa_signature_normalize(const secp256k1_context *ctx, secp256k1_ecdsa_signature *sigout, const secp256k1_ecdsa_signature *sigin)
Convert a signature to a normalized lower-S form.
Definition: secp256k1.c:458
void secp256k1_context_set_error_callback(secp256k1_context *ctx, void(*fun)(const char *message, void *data), const void *data)
Set a callback function to be called when an internal consistency check fails.
Definition: secp256k1.c:214
int secp256k1_ecdsa_signature_parse_der(const secp256k1_context *ctx, secp256k1_ecdsa_signature *sig, const unsigned char *input, size_t inputlen)
Parse a DER ECDSA signature.
Definition: secp256k1.c:396
static SECP256K1_INLINE void secp256k1_declassify(const secp256k1_context *ctx, const void *p, size_t len)
Definition: secp256k1.c:255
secp256k1_context * secp256k1_context_create(unsigned int flags)
Create a secp256k1 context object (in dynamically allocated memory).
Definition: secp256k1.c:144
int secp256k1_ec_seckey_negate(const secp256k1_context *ctx, unsigned char *seckey)
Negates a secret key in place.
Definition: secp256k1.c:657
int secp256k1_ec_pubkey_cmp(const secp256k1_context *ctx, const secp256k1_pubkey *pubkey0, const secp256k1_pubkey *pubkey1)
Compare two public keys using lexicographic (of compressed serialization) order.
Definition: secp256k1.c:313
int secp256k1_ec_pubkey_combine(const secp256k1_context *ctx, secp256k1_pubkey *pubnonce, const secp256k1_pubkey *const *pubnonces, size_t n)
Add a number of public keys together.
Definition: secp256k1.c:792
int secp256k1_ecdsa_signature_parse_compact(const secp256k1_context *ctx, secp256k1_ecdsa_signature *sig, const unsigned char *input64)
Parse an ECDSA signature in compact (64 bytes) format.
Definition: secp256k1.c:412
void secp256k1_context_set_illegal_callback(secp256k1_context *ctx, void(*fun)(const char *message, void *data), const void *data)
Set a callback function to be called when an illegal argument is passed to an API call.
Definition: secp256k1.c:202
static void secp256k1_ecdsa_signature_save(secp256k1_ecdsa_signature *sig, const secp256k1_scalar *r, const secp256k1_scalar *s)
Definition: secp256k1.c:386
static secp256k1_scratch_space * secp256k1_scratch_space_create(const secp256k1_context *ctx, size_t max_size)
Definition: secp256k1.c:242
static int secp256k1_pubkey_load(const secp256k1_context *ctx, secp256k1_ge *ge, const secp256k1_pubkey *pubkey)
Definition: secp256k1.c:259
size_t secp256k1_context_preallocated_size(unsigned int flags)
Determine the memory size of a secp256k1 context object to be created in caller-provided memory.
Definition: secp256k1.c:94
static void secp256k1_pubkey_save(secp256k1_pubkey *pubkey, secp256k1_ge *ge)
Definition: secp256k1.c:265
static SECP256K1_INLINE const secp256k1_hash_ctx * secp256k1_get_hash_context(const secp256k1_context *ctx)
Definition: secp256k1.c:238
static int secp256k1_ec_pubkey_sort_cmp(const void *pk1, const void *pk2, void *ctx)
Definition: secp256k1.c:339
static SECP256K1_INLINE void buffer_append(unsigned char *buf, unsigned int *offset, const void *data, unsigned int len)
Definition: secp256k1.c:493
static int secp256k1_ec_pubkey_tweak_add_helper(secp256k1_ge *p, const unsigned char *tweak32)
Definition: secp256k1.c:715
static int nonce_function_rfc6979(unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int counter)
Definition: secp256k1.c:534
int secp256k1_context_randomize(secp256k1_context *ctx, const unsigned char *seed32)
Randomizes the context to provide enhanced protection against side-channel leakage.
Definition: secp256k1.c:782
int secp256k1_ecdsa_verify(const secp256k1_context *ctx, const secp256k1_ecdsa_signature *sig, const unsigned char *msghash32, const secp256k1_pubkey *pubkey)
Verify an ECDSA signature.
Definition: secp256k1.c:477
int secp256k1_ecdsa_signature_serialize_compact(const secp256k1_context *ctx, unsigned char *output64, const secp256k1_ecdsa_signature *sig)
Serialize an ECDSA signature in compact (64 byte) format.
Definition: secp256k1.c:445
int secp256k1_ec_pubkey_create(const secp256k1_context *ctx, secp256k1_pubkey *pubkey, const unsigned char *seckey)
Compute the public key for a secret key.
Definition: secp256k1.c:639
void secp256k1_context_destroy(secp256k1_context *ctx)
Destroy a secp256k1 context object (created in dynamically allocated memory).
Definition: secp256k1.c:190
void secp256k1_selftest(void)
Perform basic self tests (to be used in conjunction with secp256k1_context_static)
Definition: secp256k1.c:88
secp256k1_context * secp256k1_context_clone(const secp256k1_context *ctx)
Copy a secp256k1 context object (into dynamically allocated memory).
Definition: secp256k1.c:166
static const secp256k1_context secp256k1_context_static_
Definition: secp256k1.c:69
const secp256k1_context *const secp256k1_context_static
Definition: secp256k1.c:76
int secp256k1_ec_pubkey_tweak_mul(const secp256k1_context *ctx, secp256k1_pubkey *pubkey, const unsigned char *tweak32)
Tweak a public key by multiplying it by a tweak value.
Definition: secp256k1.c:759
static void secp256k1_ecdsa_signature_load(const secp256k1_context *ctx, secp256k1_scalar *r, secp256k1_scalar *s, const secp256k1_ecdsa_signature *sig)
Definition: secp256k1.c:372
secp256k1_context * secp256k1_context_preallocated_create(void *prealloc, unsigned int flags)
Create a secp256k1 context object in caller-provided memory.
Definition: secp256k1.c:120
int secp256k1_ecdsa_sign(const secp256k1_context *ctx, secp256k1_ecdsa_signature *signature, const unsigned char *msghash32, const unsigned char *seckey, secp256k1_nonce_function noncefp, const void *noncedata)
Create an ECDSA signature.
Definition: secp256k1.c:601
int secp256k1_ec_pubkey_negate(const secp256k1_context *ctx, secp256k1_pubkey *pubkey)
Negates a public key in place.
Definition: secp256k1.c:672
#define ARG_CHECK_VOID(cond)
Definition: secp256k1.c:52
static int secp256k1_ecdsa_sign_inner(const secp256k1_context *ctx, secp256k1_scalar *r, secp256k1_scalar *s, int *recid, const unsigned char *msg32, const unsigned char *seckey, secp256k1_nonce_function noncefp, const void *noncedata)
Definition: secp256k1.c:541
struct secp256k1_context_struct secp256k1_context
Unless explicitly stated all pointer arguments must not be NULL.
Definition: secp256k1.h:51
#define SECP256K1_FLAGS_BIT_CONTEXT_DECLASSIFY
Definition: secp256k1.h:210
int(* secp256k1_nonce_function)(unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int attempt)
A pointer to a function to deterministically generate a nonce.
Definition: secp256k1.h:95
#define SECP256K1_EC_COMPRESSED
Flag to pass to secp256k1_ec_pubkey_serialize.
Definition: secp256k1.h:225
void(* secp256k1_sha256_compression_function)(uint32_t *state, const unsigned char *blocks64, size_t n_blocks)
A pointer to a function implementing SHA256's internal compression function.
Definition: secp256k1.h:420
#define SECP256K1_FLAGS_TYPE_MASK
Definition: secp256k1.h:204
#define SECP256K1_FLAGS_BIT_COMPRESSION
Definition: secp256k1.h:211
#define SECP256K1_FLAGS_TYPE_CONTEXT
Definition: secp256k1.h:205
#define SECP256K1_FLAGS_TYPE_COMPRESSION
Definition: secp256k1.h:206
static int secp256k1_selftest_sha256(secp256k1_sha256_compression_function fn_compression)
Definition: selftest.h:14
static int secp256k1_selftest_passes(void)
Definition: selftest.h:30
void(* fn)(const char *text, void *data)
Definition: util.h:88
const void * data
Definition: util.h:89
secp256k1_callback illegal_callback
Definition: secp256k1.c:64
secp256k1_callback error_callback
Definition: secp256k1.c:65
secp256k1_ecmult_gen_context ecmult_gen_ctx
Definition: secp256k1.c:62
secp256k1_hash_ctx hash_ctx
Definition: secp256k1.c:63
Opaque data structure that holds a parsed ECDSA signature.
Definition: secp256k1.h:75
unsigned char data[64]
Definition: secp256k1.h:76
A group element in affine coordinates on the secp256k1 curve, or occasionally on an isomorphic curve ...
Definition: group.h:16
secp256k1_fe x
Definition: group.h:17
A group element of the secp256k1 curve, in jacobian coordinates.
Definition: group.h:28
secp256k1_sha256_compression_function fn_sha256_compression
Definition: hash.h:14
Opaque data structure that holds a parsed and valid public key.
Definition: secp256k1.h:62
unsigned char data[64]
Definition: secp256k1.h:63
A scalar modulo the group order of the secp256k1 curve.
Definition: scalar_4x64.h:13
static int count