aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/secp256k1/libsecp256k1/src/ecmult_gen.h
diff options
context:
space:
mode:
authorWei-Ning Huang <w@dexon.org>2019-04-18 14:15:11 +0800
committerWei-Ning Huang <w@byzantine-lab.io>2019-06-15 22:09:56 +0800
commit7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd (patch)
treea6061686cb458ede8f1a72eb9ac8e785bd0d420e /crypto/secp256k1/libsecp256k1/src/ecmult_gen.h
parenta1be735b1cd6d02bc69b9bb011c56e62cec290f5 (diff)
downloadgo-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar.gz
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar.bz2
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar.lz
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar.xz
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.tar.zst
go-tangerine-7f9d5b1f1cb1a07e2600533a85e585c2a6dfe7bd.zip
crypto: use go-ethereum secp256k1 package to avoid symbol conflict (#374)
Diffstat (limited to 'crypto/secp256k1/libsecp256k1/src/ecmult_gen.h')
-rw-r--r--crypto/secp256k1/libsecp256k1/src/ecmult_gen.h43
1 files changed, 0 insertions, 43 deletions
diff --git a/crypto/secp256k1/libsecp256k1/src/ecmult_gen.h b/crypto/secp256k1/libsecp256k1/src/ecmult_gen.h
deleted file mode 100644
index eb2cc9ead..000000000
--- a/crypto/secp256k1/libsecp256k1/src/ecmult_gen.h
+++ /dev/null
@@ -1,43 +0,0 @@
-/**********************************************************************
- * Copyright (c) 2013, 2014 Pieter Wuille *
- * Distributed under the MIT software license, see the accompanying *
- * file COPYING or http://www.opensource.org/licenses/mit-license.php.*
- **********************************************************************/
-
-#ifndef _SECP256K1_ECMULT_GEN_
-#define _SECP256K1_ECMULT_GEN_
-
-#include "scalar.h"
-#include "group.h"
-
-typedef struct {
- /* For accelerating the computation of a*G:
- * To harden against timing attacks, use the following mechanism:
- * * Break up the multiplicand into groups of 4 bits, called n_0, n_1, n_2, ..., n_63.
- * * Compute sum(n_i * 16^i * G + U_i, i=0..63), where:
- * * U_i = U * 2^i (for i=0..62)
- * * U_i = U * (1-2^63) (for i=63)
- * where U is a point with no known corresponding scalar. Note that sum(U_i, i=0..63) = 0.
- * For each i, and each of the 16 possible values of n_i, (n_i * 16^i * G + U_i) is
- * precomputed (call it prec(i, n_i)). The formula now becomes sum(prec(i, n_i), i=0..63).
- * None of the resulting prec group elements have a known scalar, and neither do any of
- * the intermediate sums while computing a*G.
- */
- secp256k1_ge_storage (*prec)[64][16]; /* prec[j][i] = 16^j * i * G + U_i */
- secp256k1_scalar blind;
- secp256k1_gej initial;
-} secp256k1_ecmult_gen_context;
-
-static void secp256k1_ecmult_gen_context_init(secp256k1_ecmult_gen_context* ctx);
-static void secp256k1_ecmult_gen_context_build(secp256k1_ecmult_gen_context* ctx, const secp256k1_callback* cb);
-static void secp256k1_ecmult_gen_context_clone(secp256k1_ecmult_gen_context *dst,
- const secp256k1_ecmult_gen_context* src, const secp256k1_callback* cb);
-static void secp256k1_ecmult_gen_context_clear(secp256k1_ecmult_gen_context* ctx);
-static int secp256k1_ecmult_gen_context_is_built(const secp256k1_ecmult_gen_context* ctx);
-
-/** Multiply with the generator: R = a*G */
-static void secp256k1_ecmult_gen(const secp256k1_ecmult_gen_context* ctx, secp256k1_gej *r, const secp256k1_scalar *a);
-
-static void secp256k1_ecmult_gen_blind(secp256k1_ecmult_gen_context *ctx, const unsigned char *seed32);
-
-#endif