2019-07-04 21:38:03 +00:00
|
|
|
use core::marker::PhantomData;
|
2021-06-19 10:54:43 +00:00
|
|
|
use core::mem::ManuallyDrop;
|
2020-08-28 12:20:19 +00:00
|
|
|
use ffi::{self, CPtr, types::AlignedType};
|
2019-10-21 12:15:19 +00:00
|
|
|
use ffi::types::{c_uint, c_void};
|
2019-07-04 23:03:13 +00:00
|
|
|
use Error;
|
|
|
|
use Secp256k1;
|
2019-07-04 21:38:03 +00:00
|
|
|
|
2021-05-17 12:37:36 +00:00
|
|
|
#[cfg(any(feature = "std", feature = "alloc"))]
|
2022-01-04 15:55:01 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
2021-05-17 12:37:36 +00:00
|
|
|
pub use self::alloc_only::*;
|
2019-07-04 21:38:03 +00:00
|
|
|
|
2022-02-01 04:43:46 +00:00
|
|
|
#[cfg(all(feature = "global-context", feature = "std"))]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(all(feature = "global-context", feature = "std"))))]
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Module implementing a singleton pattern for a global `Secp256k1` context.
|
2020-07-04 19:19:03 +00:00
|
|
|
pub mod global {
|
2022-02-01 04:43:46 +00:00
|
|
|
#[cfg(feature = "rand-std")]
|
2020-11-10 23:36:07 +00:00
|
|
|
use rand;
|
2021-02-12 23:36:46 +00:00
|
|
|
|
2020-07-04 19:19:03 +00:00
|
|
|
use std::ops::Deref;
|
|
|
|
use std::sync::Once;
|
2020-08-27 19:51:36 +00:00
|
|
|
use {Secp256k1, All};
|
2020-07-04 19:19:03 +00:00
|
|
|
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Proxy struct for global `SECP256K1` context.
|
2022-01-12 07:55:06 +00:00
|
|
|
#[derive(Debug, Copy, Clone)]
|
2020-07-04 19:19:03 +00:00
|
|
|
pub struct GlobalContext {
|
|
|
|
__private: (),
|
|
|
|
}
|
|
|
|
|
2022-02-01 04:43:46 +00:00
|
|
|
/// A global static context to avoid repeatedly creating contexts.
|
2021-02-12 23:36:46 +00:00
|
|
|
///
|
2022-02-01 04:43:46 +00:00
|
|
|
/// If `rand-std` feature is enabled, context will have been randomized using `thread_rng`.
|
|
|
|
///
|
|
|
|
/// ```
|
|
|
|
/// # #[cfg(all(feature = "global-context", feature = "rand-std"))] {
|
|
|
|
/// use secp256k1::{PublicKey, SECP256K1};
|
|
|
|
/// use secp256k1::rand::thread_rng;
|
|
|
|
/// let _ = SECP256K1.generate_keypair(&mut thread_rng());
|
|
|
|
/// # }
|
|
|
|
/// ```
|
2020-07-04 19:19:03 +00:00
|
|
|
pub static SECP256K1: &GlobalContext = &GlobalContext { __private: () };
|
|
|
|
|
|
|
|
impl Deref for GlobalContext {
|
|
|
|
type Target = Secp256k1<All>;
|
|
|
|
|
2022-02-01 04:43:46 +00:00
|
|
|
#[allow(unused_mut)] // Unused when `rand-std` is not enabled.
|
2020-07-04 19:19:03 +00:00
|
|
|
fn deref(&self) -> &Self::Target {
|
|
|
|
static ONCE: Once = Once::new();
|
|
|
|
static mut CONTEXT: Option<Secp256k1<All>> = None;
|
|
|
|
ONCE.call_once(|| unsafe {
|
2020-08-03 10:07:26 +00:00
|
|
|
let mut ctx = Secp256k1::new();
|
2022-02-01 04:43:46 +00:00
|
|
|
#[cfg(feature = "rand-std")]
|
2021-02-12 23:36:46 +00:00
|
|
|
{
|
|
|
|
ctx.randomize(&mut rand::thread_rng());
|
|
|
|
}
|
2020-08-03 10:07:26 +00:00
|
|
|
CONTEXT = Some(ctx);
|
2020-07-04 19:19:03 +00:00
|
|
|
});
|
|
|
|
unsafe { CONTEXT.as_ref().unwrap() }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-11-17 23:46:59 +00:00
|
|
|
/// A trait for all kinds of contexts that lets you define the exact flags and a function to
|
|
|
|
/// deallocate memory. It shouldn't be possible to implement this for types outside this crate.
|
2019-11-27 15:36:06 +00:00
|
|
|
pub unsafe trait Context : private::Sealed {
|
2019-07-04 21:38:03 +00:00
|
|
|
/// Flags for the ffi.
|
|
|
|
const FLAGS: c_uint;
|
|
|
|
/// A constant description of the context.
|
|
|
|
const DESCRIPTION: &'static str;
|
|
|
|
/// A function to deallocate the memory when the context is dropped.
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(ptr: *mut u8, size: usize);
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Marker trait for indicating that an instance of `Secp256k1` can be used for signing.
|
|
|
|
pub trait Signing: Context {}
|
|
|
|
|
|
|
|
/// Marker trait for indicating that an instance of `Secp256k1` can be used for verification.
|
|
|
|
pub trait Verification: Context {}
|
|
|
|
|
2019-07-04 21:39:37 +00:00
|
|
|
/// Represents the set of capabilities needed for signing with a user preallocated memory.
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:39:37 +00:00
|
|
|
pub struct SignOnlyPreallocated<'buf> {
|
|
|
|
phantom: PhantomData<&'buf ()>,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Represents the set of capabilities needed for verification with a user preallocated memory.
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:39:37 +00:00
|
|
|
pub struct VerifyOnlyPreallocated<'buf> {
|
|
|
|
phantom: PhantomData<&'buf ()>,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Represents the set of all capabilities with a user preallocated memory.
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:39:37 +00:00
|
|
|
pub struct AllPreallocated<'buf> {
|
|
|
|
phantom: PhantomData<&'buf ()>,
|
|
|
|
}
|
2019-07-04 21:38:03 +00:00
|
|
|
|
2019-11-27 15:36:06 +00:00
|
|
|
mod private {
|
|
|
|
use super::*;
|
|
|
|
// A trick to prevent users from implementing a trait.
|
2021-11-17 23:52:28 +00:00
|
|
|
// On one hand this trait is public, on the other it's in a private module
|
|
|
|
// so it's not visible to anyone besides it's parent (the context module).
|
2019-11-27 15:36:06 +00:00
|
|
|
pub trait Sealed {}
|
|
|
|
|
|
|
|
impl<'buf> Sealed for AllPreallocated<'buf> {}
|
|
|
|
impl<'buf> Sealed for VerifyOnlyPreallocated<'buf> {}
|
|
|
|
impl<'buf> Sealed for SignOnlyPreallocated<'buf> {}
|
|
|
|
}
|
|
|
|
|
2021-05-17 12:37:36 +00:00
|
|
|
#[cfg(any(feature = "std", feature = "alloc"))]
|
2022-01-04 15:55:01 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
2021-05-17 12:37:36 +00:00
|
|
|
mod alloc_only {
|
|
|
|
#[cfg(feature = "std")]
|
|
|
|
use std::alloc;
|
|
|
|
#[cfg(not(feature = "std"))]
|
|
|
|
use alloc::alloc;
|
|
|
|
|
2022-02-01 04:51:08 +00:00
|
|
|
#[cfg(feature = "rand-std")]
|
|
|
|
use rand;
|
|
|
|
|
2019-11-27 15:36:06 +00:00
|
|
|
impl private::Sealed for SignOnly {}
|
|
|
|
impl private::Sealed for All {}
|
|
|
|
impl private::Sealed for VerifyOnly {}
|
|
|
|
|
2019-07-04 21:38:03 +00:00
|
|
|
use super::*;
|
2021-06-19 10:54:43 +00:00
|
|
|
const ALIGN_TO: usize = ::core::mem::align_of::<AlignedType>();
|
2019-07-04 21:38:03 +00:00
|
|
|
|
|
|
|
/// Represents the set of capabilities needed for signing.
|
2022-01-04 15:55:01 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:38:03 +00:00
|
|
|
pub enum SignOnly {}
|
|
|
|
|
|
|
|
/// Represents the set of capabilities needed for verification.
|
2022-01-04 15:55:01 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:38:03 +00:00
|
|
|
pub enum VerifyOnly {}
|
|
|
|
|
|
|
|
/// Represents the set of all capabilities.
|
2022-01-04 15:55:01 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
2022-01-06 23:01:11 +00:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
2019-07-04 21:38:03 +00:00
|
|
|
pub enum All {}
|
|
|
|
|
|
|
|
impl Signing for SignOnly {}
|
|
|
|
impl Signing for All {}
|
|
|
|
|
|
|
|
impl Verification for VerifyOnly {}
|
|
|
|
impl Verification for All {}
|
|
|
|
|
|
|
|
unsafe impl Context for SignOnly {
|
|
|
|
const FLAGS: c_uint = ffi::SECP256K1_START_SIGN;
|
|
|
|
const DESCRIPTION: &'static str = "signing only";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(ptr: *mut u8, size: usize) {
|
|
|
|
let layout = alloc::Layout::from_size_align(size, ALIGN_TO).unwrap();
|
|
|
|
alloc::dealloc(ptr, layout);
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsafe impl Context for VerifyOnly {
|
|
|
|
const FLAGS: c_uint = ffi::SECP256K1_START_VERIFY;
|
|
|
|
const DESCRIPTION: &'static str = "verification only";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(ptr: *mut u8, size: usize) {
|
|
|
|
let layout = alloc::Layout::from_size_align(size, ALIGN_TO).unwrap();
|
|
|
|
alloc::dealloc(ptr, layout);
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsafe impl Context for All {
|
|
|
|
const FLAGS: c_uint = VerifyOnly::FLAGS | SignOnly::FLAGS;
|
|
|
|
const DESCRIPTION: &'static str = "all capabilities";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(ptr: *mut u8, size: usize) {
|
|
|
|
let layout = alloc::Layout::from_size_align(size, ALIGN_TO).unwrap();
|
|
|
|
alloc::dealloc(ptr, layout);
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<C: Context> Secp256k1<C> {
|
2022-02-01 04:51:08 +00:00
|
|
|
/// Lets you create a context in a generic manner (sign/verify/all).
|
|
|
|
///
|
|
|
|
/// If `rand-std` feature is enabled, context will have been randomized using `thread_rng`.
|
2022-02-01 22:06:36 +00:00
|
|
|
/// If `rand-std` feature is not enabled please consider randomizing the context as follows:
|
|
|
|
/// ```
|
|
|
|
/// # #[cfg(all(feature = "rand-std", any(feature = "alloc", feature = "std")))] {
|
|
|
|
/// # use secp256k1::Secp256k1;
|
|
|
|
/// # use secp256k1::rand::{thread_rng, RngCore};
|
|
|
|
/// let mut ctx = Secp256k1::new();
|
|
|
|
/// # let mut rng = thread_rng();
|
|
|
|
/// # let mut seed = [0u8; 32];
|
|
|
|
/// # rng.fill_bytes(&mut seed);
|
|
|
|
/// // let seed = <32 bytes of random data>
|
|
|
|
/// ctx.seeded_randomize(&seed);
|
|
|
|
/// # }
|
|
|
|
/// ```
|
2022-02-01 04:51:08 +00:00
|
|
|
#[allow(unused_mut)] // Unused when `rand-std` is not enabled.
|
2019-07-05 01:18:36 +00:00
|
|
|
pub fn gen_new() -> Secp256k1<C> {
|
2020-04-29 19:15:40 +00:00
|
|
|
#[cfg(target_arch = "wasm32")]
|
|
|
|
ffi::types::sanity_checks_for_wasm();
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
let size = unsafe { ffi::secp256k1_context_preallocated_size(C::FLAGS) };
|
|
|
|
let layout = alloc::Layout::from_size_align(size, ALIGN_TO).unwrap();
|
|
|
|
let ptr = unsafe {alloc::alloc(layout)};
|
2022-02-01 04:51:08 +00:00
|
|
|
let mut ctx = Secp256k1 {
|
2019-07-04 21:38:03 +00:00
|
|
|
ctx: unsafe { ffi::secp256k1_context_preallocated_create(ptr as *mut c_void, C::FLAGS) },
|
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size,
|
2022-02-01 04:51:08 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#[cfg(feature = "rand-std")]
|
|
|
|
{
|
|
|
|
ctx.randomize(&mut rand::thread_rng());
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
2022-02-01 04:51:08 +00:00
|
|
|
|
|
|
|
ctx
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Secp256k1<All> {
|
2022-02-01 04:51:08 +00:00
|
|
|
/// Creates a new Secp256k1 context with all capabilities.
|
|
|
|
///
|
|
|
|
/// If `rand-std` feature is enabled, context will have been randomized using `thread_rng`.
|
2022-02-01 22:06:36 +00:00
|
|
|
/// If `rand-std` feature is not enabled please consider randomizing the context (see docs
|
|
|
|
/// for `Secp256k1::gen_new()`).
|
2019-07-04 21:38:03 +00:00
|
|
|
pub fn new() -> Secp256k1<All> {
|
|
|
|
Secp256k1::gen_new()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Secp256k1<SignOnly> {
|
2022-02-01 04:51:08 +00:00
|
|
|
/// Creates a new Secp256k1 context that can only be used for signing.
|
|
|
|
///
|
|
|
|
/// If `rand-std` feature is enabled, context will have been randomized using `thread_rng`.
|
2022-02-01 22:06:36 +00:00
|
|
|
/// If `rand-std` feature is not enabled please consider randomizing the context (see docs
|
|
|
|
/// for `Secp256k1::gen_new()`).
|
2019-07-04 21:38:03 +00:00
|
|
|
pub fn signing_only() -> Secp256k1<SignOnly> {
|
|
|
|
Secp256k1::gen_new()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Secp256k1<VerifyOnly> {
|
2022-02-01 04:51:08 +00:00
|
|
|
/// Creates a new Secp256k1 context that can only be used for verification.
|
|
|
|
///
|
|
|
|
/// If `rand-std` feature is enabled, context will have been randomized using `thread_rng`.
|
2022-02-01 22:06:36 +00:00
|
|
|
/// If `rand-std` feature is not enabled please consider randomizing the context (see docs
|
|
|
|
/// for `Secp256k1::gen_new()`).
|
2019-07-04 21:38:03 +00:00
|
|
|
pub fn verification_only() -> Secp256k1<VerifyOnly> {
|
|
|
|
Secp256k1::gen_new()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for Secp256k1<All> {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self::new()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<C: Context> Clone for Secp256k1<C> {
|
|
|
|
fn clone(&self) -> Secp256k1<C> {
|
2020-08-28 12:20:19 +00:00
|
|
|
let size = unsafe {ffi::secp256k1_context_preallocated_clone_size(self.ctx as _)};
|
|
|
|
let layout = alloc::Layout::from_size_align(size, ALIGN_TO).unwrap();
|
|
|
|
let ptr = unsafe {alloc::alloc(layout)};
|
2019-07-04 21:38:03 +00:00
|
|
|
Secp256k1 {
|
2020-08-28 12:20:19 +00:00
|
|
|
ctx: unsafe { ffi::secp256k1_context_preallocated_clone(self.ctx, ptr as *mut c_void) },
|
2019-07-04 21:38:03 +00:00
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size,
|
2019-07-04 21:38:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-07-04 21:39:37 +00:00
|
|
|
|
|
|
|
impl<'buf> Signing for SignOnlyPreallocated<'buf> {}
|
|
|
|
impl<'buf> Signing for AllPreallocated<'buf> {}
|
|
|
|
|
|
|
|
impl<'buf> Verification for VerifyOnlyPreallocated<'buf> {}
|
|
|
|
impl<'buf> Verification for AllPreallocated<'buf> {}
|
|
|
|
|
|
|
|
unsafe impl<'buf> Context for SignOnlyPreallocated<'buf> {
|
|
|
|
const FLAGS: c_uint = ffi::SECP256K1_START_SIGN;
|
|
|
|
const DESCRIPTION: &'static str = "signing only";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(_ptr: *mut u8, _size: usize) {
|
2019-07-05 01:18:36 +00:00
|
|
|
// Allocated by the user
|
2019-07-04 21:39:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsafe impl<'buf> Context for VerifyOnlyPreallocated<'buf> {
|
|
|
|
const FLAGS: c_uint = ffi::SECP256K1_START_VERIFY;
|
|
|
|
const DESCRIPTION: &'static str = "verification only";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(_ptr: *mut u8, _size: usize) {
|
2021-11-17 23:52:28 +00:00
|
|
|
// Allocated by the user.
|
2019-07-04 21:39:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsafe impl<'buf> Context for AllPreallocated<'buf> {
|
|
|
|
const FLAGS: c_uint = SignOnlyPreallocated::FLAGS | VerifyOnlyPreallocated::FLAGS;
|
|
|
|
const DESCRIPTION: &'static str = "all capabilities";
|
|
|
|
|
2020-08-28 12:20:19 +00:00
|
|
|
unsafe fn deallocate(_ptr: *mut u8, _size: usize) {
|
2021-11-17 23:52:28 +00:00
|
|
|
// Allocated by the user.
|
2019-07-04 21:39:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'buf, C: Context + 'buf> Secp256k1<C> {
|
2019-07-05 01:18:36 +00:00
|
|
|
/// Lets you create a context with preallocated buffer in a generic manner(sign/verify/all)
|
2020-08-28 12:20:50 +00:00
|
|
|
pub fn preallocated_gen_new(buf: &'buf mut [AlignedType]) -> Result<Secp256k1<C>, Error> {
|
2020-04-29 19:15:40 +00:00
|
|
|
#[cfg(target_arch = "wasm32")]
|
|
|
|
ffi::types::sanity_checks_for_wasm();
|
|
|
|
|
2019-07-04 22:09:55 +00:00
|
|
|
if buf.len() < Self::preallocate_size_gen() {
|
2019-07-04 21:39:37 +00:00
|
|
|
return Err(Error::NotEnoughMemory);
|
|
|
|
}
|
|
|
|
Ok(Secp256k1 {
|
|
|
|
ctx: unsafe {
|
|
|
|
ffi::secp256k1_context_preallocated_create(
|
2019-08-16 18:49:24 +00:00
|
|
|
buf.as_mut_c_ptr() as *mut c_void,
|
2019-07-04 22:09:55 +00:00
|
|
|
C::FLAGS)
|
2019-07-04 21:39:37 +00:00
|
|
|
},
|
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size: 0, // We don't care about the size because it's the caller responsibility to deallocate.
|
2019-07-04 21:39:37 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'buf> Secp256k1<AllPreallocated<'buf>> {
|
|
|
|
/// Creates a new Secp256k1 context with all capabilities
|
2020-08-28 12:20:50 +00:00
|
|
|
pub fn preallocated_new(buf: &'buf mut [AlignedType]) -> Result<Secp256k1<AllPreallocated<'buf>>, Error> {
|
2019-07-04 21:39:37 +00:00
|
|
|
Secp256k1::preallocated_gen_new(buf)
|
|
|
|
}
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Uses the ffi `secp256k1_context_preallocated_size` to check the memory size needed for a context.
|
2019-07-04 22:09:55 +00:00
|
|
|
pub fn preallocate_size() -> usize {
|
|
|
|
Self::preallocate_size_gen()
|
|
|
|
}
|
2019-11-06 14:15:22 +00:00
|
|
|
|
|
|
|
/// Create a context from a raw context.
|
|
|
|
///
|
|
|
|
/// # Safety
|
|
|
|
/// This is highly unsafe, due to the number of conditions that aren't checked.
|
|
|
|
/// * `raw_ctx` needs to be a valid Secp256k1 context pointer.
|
|
|
|
/// that was generated by *exactly* the same code/version of the libsecp256k1 used here.
|
|
|
|
/// * The capabilities (All/SignOnly/VerifyOnly) of the context *must* match the flags passed to libsecp256k1
|
|
|
|
/// when generating the context.
|
|
|
|
/// * The user must handle the freeing of the context(using the correct functions) by himself.
|
|
|
|
/// * Violating these may lead to Undefined Behavior.
|
|
|
|
///
|
2019-12-05 15:51:59 +00:00
|
|
|
pub unsafe fn from_raw_all(raw_ctx: *mut ffi::Context) -> ManuallyDrop<Secp256k1<AllPreallocated<'buf>>> {
|
|
|
|
ManuallyDrop::new(Secp256k1 {
|
2019-11-06 14:15:22 +00:00
|
|
|
ctx: raw_ctx,
|
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size: 0, // We don't care about the size because it's the caller responsibility to deallocate.
|
2019-12-05 15:51:59 +00:00
|
|
|
})
|
2019-11-06 14:15:22 +00:00
|
|
|
}
|
2019-07-04 21:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<'buf> Secp256k1<SignOnlyPreallocated<'buf>> {
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Creates a new Secp256k1 context that can only be used for signing.
|
2020-08-28 12:20:50 +00:00
|
|
|
pub fn preallocated_signing_only(buf: &'buf mut [AlignedType]) -> Result<Secp256k1<SignOnlyPreallocated<'buf>>, Error> {
|
2019-07-04 21:39:37 +00:00
|
|
|
Secp256k1::preallocated_gen_new(buf)
|
|
|
|
}
|
2019-07-04 22:09:55 +00:00
|
|
|
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Uses the ffi `secp256k1_context_preallocated_size` to check the memory size needed for the context.
|
2019-07-04 22:09:55 +00:00
|
|
|
#[inline]
|
|
|
|
pub fn preallocate_signing_size() -> usize {
|
|
|
|
Self::preallocate_size_gen()
|
|
|
|
}
|
2019-11-06 14:15:22 +00:00
|
|
|
|
|
|
|
/// Create a context from a raw context.
|
|
|
|
///
|
|
|
|
/// # Safety
|
|
|
|
/// This is highly unsafe, due to the number of conditions that aren't checked.
|
|
|
|
/// * `raw_ctx` needs to be a valid Secp256k1 context pointer.
|
|
|
|
/// that was generated by *exactly* the same code/version of the libsecp256k1 used here.
|
|
|
|
/// * The capabilities (All/SignOnly/VerifyOnly) of the context *must* match the flags passed to libsecp256k1
|
|
|
|
/// when generating the context.
|
|
|
|
/// * The user must handle the freeing of the context(using the correct functions) by himself.
|
2021-11-17 23:52:28 +00:00
|
|
|
/// * This list *is not* exhaustive, and any violation may lead to Undefined Behavior.
|
2019-11-06 14:15:22 +00:00
|
|
|
///
|
2019-12-05 15:51:59 +00:00
|
|
|
pub unsafe fn from_raw_signining_only(raw_ctx: *mut ffi::Context) -> ManuallyDrop<Secp256k1<SignOnlyPreallocated<'buf>>> {
|
|
|
|
ManuallyDrop::new(Secp256k1 {
|
2019-11-06 14:15:22 +00:00
|
|
|
ctx: raw_ctx,
|
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size: 0, // We don't care about the size because it's the caller responsibility to deallocate.
|
2019-12-05 15:51:59 +00:00
|
|
|
})
|
2019-11-06 14:15:22 +00:00
|
|
|
}
|
2019-07-04 21:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<'buf> Secp256k1<VerifyOnlyPreallocated<'buf>> {
|
|
|
|
/// Creates a new Secp256k1 context that can only be used for verification
|
2020-08-28 12:20:50 +00:00
|
|
|
pub fn preallocated_verification_only(buf: &'buf mut [AlignedType]) -> Result<Secp256k1<VerifyOnlyPreallocated<'buf>>, Error> {
|
2019-07-04 21:39:37 +00:00
|
|
|
Secp256k1::preallocated_gen_new(buf)
|
|
|
|
}
|
2019-07-04 22:09:55 +00:00
|
|
|
|
2021-11-17 23:52:28 +00:00
|
|
|
/// Uses the ffi `secp256k1_context_preallocated_size` to check the memory size needed for the context.
|
2019-07-04 22:09:55 +00:00
|
|
|
#[inline]
|
|
|
|
pub fn preallocate_verification_size() -> usize {
|
|
|
|
Self::preallocate_size_gen()
|
|
|
|
}
|
2019-11-06 14:15:22 +00:00
|
|
|
|
|
|
|
/// Create a context from a raw context.
|
|
|
|
///
|
|
|
|
/// # Safety
|
|
|
|
/// This is highly unsafe, due to the number of conditions that aren't checked.
|
|
|
|
/// * `raw_ctx` needs to be a valid Secp256k1 context pointer.
|
|
|
|
/// that was generated by *exactly* the same code/version of the libsecp256k1 used here.
|
|
|
|
/// * The capabilities (All/SignOnly/VerifyOnly) of the context *must* match the flags passed to libsecp256k1
|
|
|
|
/// when generating the context.
|
|
|
|
/// * The user must handle the freeing of the context(using the correct functions) by himself.
|
2021-11-17 23:52:28 +00:00
|
|
|
/// * This list *is not* exhaustive, and any violation may lead to Undefined Behavior.
|
2019-11-06 14:15:22 +00:00
|
|
|
///
|
2019-12-05 15:51:59 +00:00
|
|
|
pub unsafe fn from_raw_verification_only(raw_ctx: *mut ffi::Context) -> ManuallyDrop<Secp256k1<VerifyOnlyPreallocated<'buf>>> {
|
|
|
|
ManuallyDrop::new(Secp256k1 {
|
2019-11-06 14:15:22 +00:00
|
|
|
ctx: raw_ctx,
|
|
|
|
phantom: PhantomData,
|
2020-08-28 12:20:19 +00:00
|
|
|
size: 0, // We don't care about the size because it's the caller responsibility to deallocate.
|
2019-12-05 15:51:59 +00:00
|
|
|
})
|
2019-11-06 14:15:22 +00:00
|
|
|
}
|
2020-11-10 23:36:07 +00:00
|
|
|
}
|