rust-secp256k1-unsafe-fast/secp256k1-sys/depend/secp256k1/src/scalar_low_impl.h

140 lines
5.2 KiB
C
Raw Normal View History

/***********************************************************************
* Copyright (c) 2015 Andrew Poelstra *
* Distributed under the MIT software license, see the accompanying *
* file COPYING or https://www.opensource.org/licenses/mit-license.php.*
***********************************************************************/
#ifndef SECP256K1_SCALAR_REPR_IMPL_H
#define SECP256K1_SCALAR_REPR_IMPL_H
#include "scalar.h"
#include <string.h>
SECP256K1_INLINE static int rustsecp256k1_v0_5_0_scalar_is_even(const rustsecp256k1_v0_5_0_scalar *a) {
return !(*a & 1);
}
SECP256K1_INLINE static void rustsecp256k1_v0_5_0_scalar_clear(rustsecp256k1_v0_5_0_scalar *r) { *r = 0; }
SECP256K1_INLINE static void rustsecp256k1_v0_5_0_scalar_set_int(rustsecp256k1_v0_5_0_scalar *r, unsigned int v) { *r = v; }
SECP256K1_INLINE static unsigned int rustsecp256k1_v0_5_0_scalar_get_bits(const rustsecp256k1_v0_5_0_scalar *a, unsigned int offset, unsigned int count) {
if (offset < 32)
return ((*a >> offset) & ((((uint32_t)1) << count) - 1));
else
return 0;
}
SECP256K1_INLINE static unsigned int rustsecp256k1_v0_5_0_scalar_get_bits_var(const rustsecp256k1_v0_5_0_scalar *a, unsigned int offset, unsigned int count) {
return rustsecp256k1_v0_5_0_scalar_get_bits(a, offset, count);
}
SECP256K1_INLINE static int rustsecp256k1_v0_5_0_scalar_check_overflow(const rustsecp256k1_v0_5_0_scalar *a) { return *a >= EXHAUSTIVE_TEST_ORDER; }
static int rustsecp256k1_v0_5_0_scalar_add(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *a, const rustsecp256k1_v0_5_0_scalar *b) {
*r = (*a + *b) % EXHAUSTIVE_TEST_ORDER;
return *r < *b;
}
static void rustsecp256k1_v0_5_0_scalar_cadd_bit(rustsecp256k1_v0_5_0_scalar *r, unsigned int bit, int flag) {
if (flag && bit < 32)
*r += ((uint32_t)1 << bit);
#ifdef VERIFY
VERIFY_CHECK(bit < 32);
/* Verify that adding (1 << bit) will not overflow any in-range scalar *r by overflowing the underlying uint32_t. */
VERIFY_CHECK(((uint32_t)1 << bit) - 1 <= UINT32_MAX - EXHAUSTIVE_TEST_ORDER);
VERIFY_CHECK(rustsecp256k1_v0_5_0_scalar_check_overflow(r) == 0);
#endif
}
static void rustsecp256k1_v0_5_0_scalar_set_b32(rustsecp256k1_v0_5_0_scalar *r, const unsigned char *b32, int *overflow) {
int i;
2020-09-15 01:39:26 +00:00
int over = 0;
*r = 0;
for (i = 0; i < 32; i++) {
2020-09-15 01:39:26 +00:00
*r = (*r * 0x100) + b32[i];
if (*r >= EXHAUSTIVE_TEST_ORDER) {
over = 1;
*r %= EXHAUSTIVE_TEST_ORDER;
}
}
2020-09-15 01:39:26 +00:00
if (overflow) *overflow = over;
}
static void rustsecp256k1_v0_5_0_scalar_get_b32(unsigned char *bin, const rustsecp256k1_v0_5_0_scalar* a) {
memset(bin, 0, 32);
bin[28] = *a >> 24; bin[29] = *a >> 16; bin[30] = *a >> 8; bin[31] = *a;
}
SECP256K1_INLINE static int rustsecp256k1_v0_5_0_scalar_is_zero(const rustsecp256k1_v0_5_0_scalar *a) {
return *a == 0;
}
static void rustsecp256k1_v0_5_0_scalar_negate(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *a) {
if (*a == 0) {
*r = 0;
} else {
*r = EXHAUSTIVE_TEST_ORDER - *a;
}
}
SECP256K1_INLINE static int rustsecp256k1_v0_5_0_scalar_is_one(const rustsecp256k1_v0_5_0_scalar *a) {
return *a == 1;
}
static int rustsecp256k1_v0_5_0_scalar_is_high(const rustsecp256k1_v0_5_0_scalar *a) {
return *a > EXHAUSTIVE_TEST_ORDER / 2;
}
static int rustsecp256k1_v0_5_0_scalar_cond_negate(rustsecp256k1_v0_5_0_scalar *r, int flag) {
if (flag) rustsecp256k1_v0_5_0_scalar_negate(r, r);
return flag ? -1 : 1;
}
static void rustsecp256k1_v0_5_0_scalar_mul(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *a, const rustsecp256k1_v0_5_0_scalar *b) {
*r = (*a * *b) % EXHAUSTIVE_TEST_ORDER;
}
static int rustsecp256k1_v0_5_0_scalar_shr_int(rustsecp256k1_v0_5_0_scalar *r, int n) {
int ret;
VERIFY_CHECK(n > 0);
VERIFY_CHECK(n < 16);
ret = *r & ((1 << n) - 1);
*r >>= n;
return ret;
}
static void rustsecp256k1_v0_5_0_scalar_split_128(rustsecp256k1_v0_5_0_scalar *r1, rustsecp256k1_v0_5_0_scalar *r2, const rustsecp256k1_v0_5_0_scalar *a) {
*r1 = *a;
*r2 = 0;
}
SECP256K1_INLINE static int rustsecp256k1_v0_5_0_scalar_eq(const rustsecp256k1_v0_5_0_scalar *a, const rustsecp256k1_v0_5_0_scalar *b) {
return *a == *b;
}
static SECP256K1_INLINE void rustsecp256k1_v0_5_0_scalar_cmov(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *a, int flag) {
uint32_t mask0, mask1;
VG_CHECK_VERIFY(r, sizeof(*r));
mask0 = flag + ~((uint32_t)0);
mask1 = ~mask0;
*r = (*r & mask0) | (*a & mask1);
}
static void rustsecp256k1_v0_5_0_scalar_inverse(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *x) {
int i;
*r = 0;
for (i = 0; i < EXHAUSTIVE_TEST_ORDER; i++)
if ((i * *x) % EXHAUSTIVE_TEST_ORDER == 1)
*r = i;
/* If this VERIFY_CHECK triggers we were given a noninvertible scalar (and thus
* have a composite group order; fix it in exhaustive_tests.c). */
VERIFY_CHECK(*r != 0);
}
static void rustsecp256k1_v0_5_0_scalar_inverse_var(rustsecp256k1_v0_5_0_scalar *r, const rustsecp256k1_v0_5_0_scalar *x) {
rustsecp256k1_v0_5_0_scalar_inverse(r, x);
}
#endif /* SECP256K1_SCALAR_REPR_IMPL_H */