Bitcoin ABC 0.33.3
P2P Digital Currency
ecmult_impl.h
Go to the documentation of this file.
1/******************************************************************************
2 * Copyright (c) 2013, 2014, 2017 Pieter Wuille, Andrew Poelstra, Jonas Nick *
3 * Distributed under the MIT software license, see the accompanying *
4 * file COPYING or https://www.opensource.org/licenses/mit-license.php. *
5 ******************************************************************************/
6
7#ifndef SECP256K1_ECMULT_IMPL_H
8#define SECP256K1_ECMULT_IMPL_H
9
10#include <string.h>
11#include <stdint.h>
12
13#include "util.h"
14#include "group.h"
15#include "scalar.h"
16#include "ecmult.h"
17#include "precomputed_ecmult.h"
18
19#if defined(EXHAUSTIVE_TEST_ORDER)
20/* We need to lower these values for exhaustive tests because
21 * the tables cannot have infinities in them (this breaks the
22 * affine-isomorphism stuff which tracks z-ratios) */
23# if EXHAUSTIVE_TEST_ORDER > 128
24# define WINDOW_A 5
25# elif EXHAUSTIVE_TEST_ORDER > 8
26# define WINDOW_A 4
27# else
28# define WINDOW_A 2
29# endif
30#else
31/* optimal for 128-bit and 256-bit exponents. */
32# define WINDOW_A 5
42#endif
43
44#define WNAF_BITS 128
45#define WNAF_SIZE_BITS(bits, w) (((bits) + (w) - 1) / (w))
46#define WNAF_SIZE(w) WNAF_SIZE_BITS(WNAF_BITS, w)
47
48/* The number of objects allocated on the scratch space for ecmult_multi algorithms */
49#define PIPPENGER_SCRATCH_OBJECTS 6
50#define STRAUSS_SCRATCH_OBJECTS 5
51
52#define PIPPENGER_MAX_BUCKET_WINDOW 12
53
54/* Minimum number of points for which pippenger_wnaf is faster than strauss wnaf */
55#define ECMULT_PIPPENGER_THRESHOLD 88
56
57#define ECMULT_MAX_POINTS_PER_BATCH 5000000
58
74 secp256k1_gej d, ai;
75 secp256k1_ge d_ge;
76 int i;
77
79
80 secp256k1_gej_double_var(&d, a, NULL);
81
82 /*
83 * Perform the additions using an isomorphic curve Y^2 = X^3 + 7*C^6 where C := d.z.
84 * The isomorphism, phi, maps a secp256k1 point (x, y) to the point (x*C^2, y*C^3) on the other curve.
85 * In Jacobian coordinates phi maps (x, y, z) to (x*C^2, y*C^3, z) or, equivalently to (x, y, z/C).
86 *
87 * phi(x, y, z) = (x*C^2, y*C^3, z) = (x, y, z/C)
88 * d_ge := phi(d) = (d.x, d.y, 1)
89 * ai := phi(a) = (a.x*C^2, a.y*C^3, a.z)
90 *
91 * The group addition functions work correctly on these isomorphic curves.
92 * In particular phi(d) is easy to represent in affine coordinates under this isomorphism.
93 * This lets us use the faster secp256k1_gej_add_ge_var group addition function that we wouldn't be able to use otherwise.
94 */
95 secp256k1_ge_set_xy(&d_ge, &d.x, &d.y);
96 secp256k1_ge_set_gej_zinv(&pre_a[0], a, &d.z);
97 secp256k1_gej_set_ge(&ai, &pre_a[0]);
98 ai.z = a->z;
99
100 /* pre_a[0] is the point (a.x*C^2, a.y*C^3, a.z*C) which is equivalent to a.
101 * Set zr[0] to C, which is the ratio between the omitted z(pre_a[0]) value and a.z.
102 */
103 zr[0] = d.z;
104
105 for (i = 1; i < n; i++) {
106 secp256k1_gej_add_ge_var(&ai, &ai, &d_ge, &zr[i]);
107 secp256k1_ge_set_xy(&pre_a[i], &ai.x, &ai.y);
108 }
109
110 /* Multiply the last z-coordinate by C to undo the isomorphism.
111 * Since the z-coordinates of the pre_a values are implied by the zr array of z-coordinate ratios,
112 * undoing the isomorphism here undoes the isomorphism for all pre_a values.
113 */
114 secp256k1_fe_mul(z, &ai.z, &d.z);
115}
116
117#define SECP256K1_ECMULT_TABLE_VERIFY(n,w) \
118 VERIFY_CHECK(((n) & 1) == 1); \
119 VERIFY_CHECK((n) >= -((1 << ((w)-1)) - 1)); \
120 VERIFY_CHECK((n) <= ((1 << ((w)-1)) - 1));
121
124 if (n > 0) {
125 *r = pre[(n-1)/2];
126 } else {
127 *r = pre[(-n-1)/2];
128 secp256k1_fe_negate(&(r->y), &(r->y), 1);
129 }
130}
131
134 if (n > 0) {
135 secp256k1_ge_set_xy(r, &x[(n-1)/2], &pre[(n-1)/2].y);
136 } else {
137 secp256k1_ge_set_xy(r, &x[(-n-1)/2], &pre[(-n-1)/2].y);
138 secp256k1_fe_negate(&(r->y), &(r->y), 1);
139 }
140}
141
144 if (n > 0) {
145 secp256k1_ge_from_storage(r, &pre[(n-1)/2]);
146 } else {
147 secp256k1_ge_from_storage(r, &pre[(-n-1)/2]);
148 secp256k1_fe_negate(&(r->y), &(r->y), 1);
149 }
150}
151
159static int secp256k1_ecmult_wnaf(int *wnaf, int len, const secp256k1_scalar *a, int w) {
161 int last_set_bit = -1;
162 int bit = 0;
163 int sign = 1;
164 int carry = 0;
165
166 VERIFY_CHECK(wnaf != NULL);
167 VERIFY_CHECK(0 <= len && len <= 256);
168 VERIFY_CHECK(a != NULL);
169 VERIFY_CHECK(2 <= w && w <= 31);
170
171 memset(wnaf, 0, len * sizeof(wnaf[0]));
172
173 s = *a;
174 if (secp256k1_scalar_get_bits(&s, 255, 1)) {
176 sign = -1;
177 }
178
179 while (bit < len) {
180 int now;
181 int word;
182 if (secp256k1_scalar_get_bits(&s, bit, 1) == (unsigned int)carry) {
183 bit++;
184 continue;
185 }
186
187 now = w;
188 if (now > len - bit) {
189 now = len - bit;
190 }
191
192 word = secp256k1_scalar_get_bits_var(&s, bit, now) + carry;
193
194 carry = (word >> (w-1)) & 1;
195 word -= carry << w;
196
197 wnaf[bit] = sign * word;
198 last_set_bit = bit;
199
200 bit += now;
201 }
202#ifdef VERIFY
203 {
204 int verify_bit = bit;
205
206 VERIFY_CHECK(carry == 0);
207
208 while (verify_bit < 256) {
209 VERIFY_CHECK(secp256k1_scalar_get_bits(&s, verify_bit, 1) == 0);
210 verify_bit++;
211 }
212 }
213#endif
214 return last_set_bit + 1;
215}
216
218 int wnaf_na_1[129];
219 int wnaf_na_lam[129];
222};
223
225 /* aux is used to hold z-ratios, and then used to hold pre_a[i].x * BETA values. */
229};
230
231static void secp256k1_ecmult_strauss_wnaf(const struct secp256k1_strauss_state *state, secp256k1_gej *r, size_t num, const secp256k1_gej *a, const secp256k1_scalar *na, const secp256k1_scalar *ng) {
232 secp256k1_ge tmpa;
233 secp256k1_fe Z;
234 /* Split G factors. */
235 secp256k1_scalar ng_1, ng_128;
236 int wnaf_ng_1[129];
237 int bits_ng_1 = 0;
238 int wnaf_ng_128[129];
239 int bits_ng_128 = 0;
240 int i;
241 int bits = 0;
242 size_t np;
243 size_t no = 0;
244
246 for (np = 0; np < num; ++np) {
247 secp256k1_gej tmp;
248 secp256k1_scalar na_1, na_lam;
249 if (secp256k1_scalar_is_zero(&na[np]) || secp256k1_gej_is_infinity(&a[np])) {
250 continue;
251 }
252 /* split na into na_1 and na_lam (where na = na_1 + na_lam*lambda, and na_1 and na_lam are ~128 bit) */
253 secp256k1_scalar_split_lambda(&na_1, &na_lam, &na[np]);
254
255 /* build wnaf representation for na_1 and na_lam. */
256 state->ps[no].bits_na_1 = secp256k1_ecmult_wnaf(state->ps[no].wnaf_na_1, 129, &na_1, WINDOW_A);
257 state->ps[no].bits_na_lam = secp256k1_ecmult_wnaf(state->ps[no].wnaf_na_lam, 129, &na_lam, WINDOW_A);
258 VERIFY_CHECK(state->ps[no].bits_na_1 <= 129);
259 VERIFY_CHECK(state->ps[no].bits_na_lam <= 129);
260 if (state->ps[no].bits_na_1 > bits) {
261 bits = state->ps[no].bits_na_1;
262 }
263 if (state->ps[no].bits_na_lam > bits) {
264 bits = state->ps[no].bits_na_lam;
265 }
266
267 /* Calculate odd multiples of a.
268 * All multiples are brought to the same Z 'denominator', which is stored
269 * in Z. Due to secp256k1' isomorphism we can do all operations pretending
270 * that the Z coordinate was 1, use affine addition formulae, and correct
271 * the Z coordinate of the result once at the end.
272 * The exception is the precomputed G table points, which are actually
273 * affine. Compared to the base used for other points, they have a Z ratio
274 * of 1/Z, so we can use secp256k1_gej_add_zinv_var, which uses the same
275 * isomorphism to efficiently add with a known Z inverse.
276 */
277 tmp = a[np];
278 if (no) {
279 secp256k1_gej_rescale(&tmp, &Z);
280 }
282 if (no) secp256k1_fe_mul(state->aux + no * ECMULT_TABLE_SIZE(WINDOW_A), state->aux + no * ECMULT_TABLE_SIZE(WINDOW_A), &(a[np].z));
283
284 ++no;
285 }
286
287 /* Bring them to the same Z denominator. */
289
290 for (np = 0; np < no; ++np) {
291 for (i = 0; i < ECMULT_TABLE_SIZE(WINDOW_A); i++) {
293 }
294 }
295
296 if (ng) {
297 /* split ng into ng_1 and ng_128 (where gn = gn_1 + gn_128*2^128, and gn_1 and gn_128 are ~128 bit) */
298 secp256k1_scalar_split_128(&ng_1, &ng_128, ng);
299
300 /* Build wnaf representation for ng_1 and ng_128 */
301 bits_ng_1 = secp256k1_ecmult_wnaf(wnaf_ng_1, 129, &ng_1, WINDOW_G);
302 bits_ng_128 = secp256k1_ecmult_wnaf(wnaf_ng_128, 129, &ng_128, WINDOW_G);
303 if (bits_ng_1 > bits) {
304 bits = bits_ng_1;
305 }
306 if (bits_ng_128 > bits) {
307 bits = bits_ng_128;
308 }
309 }
310
312
313 for (i = bits - 1; i >= 0; i--) {
314 int n;
315 secp256k1_gej_double_var(r, r, NULL);
316 for (np = 0; np < no; ++np) {
317 if (i < state->ps[np].bits_na_1 && (n = state->ps[np].wnaf_na_1[i])) {
319 secp256k1_gej_add_ge_var(r, r, &tmpa, NULL);
320 }
321 if (i < state->ps[np].bits_na_lam && (n = state->ps[np].wnaf_na_lam[i])) {
323 secp256k1_gej_add_ge_var(r, r, &tmpa, NULL);
324 }
325 }
326 if (i < bits_ng_1 && (n = wnaf_ng_1[i])) {
328 secp256k1_gej_add_zinv_var(r, r, &tmpa, &Z);
329 }
330 if (i < bits_ng_128 && (n = wnaf_ng_128[i])) {
332 secp256k1_gej_add_zinv_var(r, r, &tmpa, &Z);
333 }
334 }
335
336 if (!r->infinity) {
337 secp256k1_fe_mul(&r->z, &r->z, &Z);
338 }
339}
340
341static void secp256k1_ecmult(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_scalar *na, const secp256k1_scalar *ng) {
345 struct secp256k1_strauss_state state;
346
347 state.aux = aux;
348 state.pre_a = pre_a;
349 state.ps = ps;
350 secp256k1_ecmult_strauss_wnaf(&state, r, 1, a, na, ng);
351}
352
353static size_t secp256k1_strauss_scratch_size(size_t n_points) {
354 static const size_t point_size = (sizeof(secp256k1_ge) + sizeof(secp256k1_fe)) * ECMULT_TABLE_SIZE(WINDOW_A) + sizeof(struct secp256k1_strauss_point_state) + sizeof(secp256k1_gej) + sizeof(secp256k1_scalar);
355 return n_points*point_size;
356}
357
358static int secp256k1_ecmult_strauss_batch(const secp256k1_callback* error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points, size_t cb_offset) {
359 secp256k1_gej* points;
360 secp256k1_scalar* scalars;
361 struct secp256k1_strauss_state state;
362 size_t i;
363 const size_t scratch_checkpoint = secp256k1_scratch_checkpoint(error_callback, scratch);
364
366 if (inp_g_sc == NULL && n_points == 0) {
367 return 1;
368 }
369
370 /* We allocate STRAUSS_SCRATCH_OBJECTS objects on the scratch space. If these
371 * allocations change, make sure to update the STRAUSS_SCRATCH_OBJECTS
372 * constant and strauss_scratch_size accordingly. */
373 points = (secp256k1_gej*)secp256k1_scratch_alloc(error_callback, scratch, n_points * sizeof(secp256k1_gej));
374 scalars = (secp256k1_scalar*)secp256k1_scratch_alloc(error_callback, scratch, n_points * sizeof(secp256k1_scalar));
375 state.aux = (secp256k1_fe*)secp256k1_scratch_alloc(error_callback, scratch, n_points * ECMULT_TABLE_SIZE(WINDOW_A) * sizeof(secp256k1_fe));
376 state.pre_a = (secp256k1_ge*)secp256k1_scratch_alloc(error_callback, scratch, n_points * ECMULT_TABLE_SIZE(WINDOW_A) * sizeof(secp256k1_ge));
377 state.ps = (struct secp256k1_strauss_point_state*)secp256k1_scratch_alloc(error_callback, scratch, n_points * sizeof(struct secp256k1_strauss_point_state));
378
379 if (points == NULL || scalars == NULL || state.aux == NULL || state.pre_a == NULL || state.ps == NULL) {
380 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
381 return 0;
382 }
383
384 for (i = 0; i < n_points; i++) {
385 secp256k1_ge point;
386 if (!cb(&scalars[i], &point, i+cb_offset, cbdata)) {
387 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
388 return 0;
389 }
390 secp256k1_gej_set_ge(&points[i], &point);
391 }
392 secp256k1_ecmult_strauss_wnaf(&state, r, n_points, points, scalars, inp_g_sc);
393 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
394 return 1;
395}
396
397/* Wrapper for secp256k1_ecmult_multi_func interface */
398static int secp256k1_ecmult_strauss_batch_single(const secp256k1_callback* error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n) {
399 return secp256k1_ecmult_strauss_batch(error_callback, scratch, r, inp_g_sc, cb, cbdata, n, 0);
400}
401
402static size_t secp256k1_strauss_max_points(const secp256k1_callback* error_callback, secp256k1_scratch *scratch) {
404}
405
413static int secp256k1_wnaf_fixed(int *wnaf, const secp256k1_scalar *s, int w) {
414 int skew = 0;
415 int pos;
416 int max_pos;
417 int last_w;
418 const secp256k1_scalar *work = s;
419
421 for (pos = 0; pos < WNAF_SIZE(w); pos++) {
422 wnaf[pos] = 0;
423 }
424 return 0;
425 }
426
428 skew = 1;
429 }
430
431 wnaf[0] = secp256k1_scalar_get_bits_var(work, 0, w) + skew;
432 /* Compute last window size. Relevant when window size doesn't divide the
433 * number of bits in the scalar */
434 last_w = WNAF_BITS - (WNAF_SIZE(w) - 1) * w;
435
436 /* Store the position of the first nonzero word in max_pos to allow
437 * skipping leading zeros when calculating the wnaf. */
438 for (pos = WNAF_SIZE(w) - 1; pos > 0; pos--) {
439 int val = secp256k1_scalar_get_bits_var(work, pos * w, pos == WNAF_SIZE(w)-1 ? last_w : w);
440 if(val != 0) {
441 break;
442 }
443 wnaf[pos] = 0;
444 }
445 max_pos = pos;
446 pos = 1;
447
448 while (pos <= max_pos) {
449 int val = secp256k1_scalar_get_bits_var(work, pos * w, pos == WNAF_SIZE(w)-1 ? last_w : w);
450 if ((val & 1) == 0) {
451 wnaf[pos - 1] -= (1 << w);
452 wnaf[pos] = (val + 1);
453 } else {
454 wnaf[pos] = val;
455 }
456 /* Set a coefficient to zero if it is 1 or -1 and the proceeding digit
457 * is strictly negative or strictly positive respectively. Only change
458 * coefficients at previous positions because above code assumes that
459 * wnaf[pos - 1] is odd.
460 */
461 if (pos >= 2 && ((wnaf[pos - 1] == 1 && wnaf[pos - 2] < 0) || (wnaf[pos - 1] == -1 && wnaf[pos - 2] > 0))) {
462 if (wnaf[pos - 1] == 1) {
463 wnaf[pos - 2] += 1 << w;
464 } else {
465 wnaf[pos - 2] -= 1 << w;
466 }
467 wnaf[pos - 1] = 0;
468 }
469 ++pos;
470 }
471
472 return skew;
473}
474
477 size_t input_pos;
478};
479
483};
484
485/*
486 * pippenger_wnaf computes the result of a multi-point multiplication as
487 * follows: The scalars are brought into wnaf with n_wnaf elements each. Then
488 * for every i < n_wnaf, first each point is added to a "bucket" corresponding
489 * to the point's wnaf[i]. Second, the buckets are added together such that
490 * r += 1*bucket[0] + 3*bucket[1] + 5*bucket[2] + ...
491 */
492static int secp256k1_ecmult_pippenger_wnaf(secp256k1_gej *buckets, int bucket_window, struct secp256k1_pippenger_state *state, secp256k1_gej *r, const secp256k1_scalar *sc, const secp256k1_ge *pt, size_t num) {
493 size_t n_wnaf = WNAF_SIZE(bucket_window+1);
494 size_t np;
495 size_t no = 0;
496 int i;
497 int j;
498
499 for (np = 0; np < num; ++np) {
500 if (secp256k1_scalar_is_zero(&sc[np]) || secp256k1_ge_is_infinity(&pt[np])) {
501 continue;
502 }
503 state->ps[no].input_pos = np;
504 state->ps[no].skew_na = secp256k1_wnaf_fixed(&state->wnaf_na[no*n_wnaf], &sc[np], bucket_window+1);
505 no++;
506 }
508
509 if (no == 0) {
510 return 1;
511 }
512
513 for (i = n_wnaf - 1; i >= 0; i--) {
514 secp256k1_gej running_sum;
515
516 for(j = 0; j < ECMULT_TABLE_SIZE(bucket_window+2); j++) {
517 secp256k1_gej_set_infinity(&buckets[j]);
518 }
519
520 for (np = 0; np < no; ++np) {
521 int n = state->wnaf_na[np*n_wnaf + i];
522 struct secp256k1_pippenger_point_state point_state = state->ps[np];
523 secp256k1_ge tmp;
524 int idx;
525
526 if (i == 0) {
527 /* correct for wnaf skew */
528 int skew = point_state.skew_na;
529 if (skew) {
530 secp256k1_ge_neg(&tmp, &pt[point_state.input_pos]);
531 secp256k1_gej_add_ge_var(&buckets[0], &buckets[0], &tmp, NULL);
532 }
533 }
534 if (n > 0) {
535 idx = (n - 1)/2;
536 secp256k1_gej_add_ge_var(&buckets[idx], &buckets[idx], &pt[point_state.input_pos], NULL);
537 } else if (n < 0) {
538 idx = -(n + 1)/2;
539 secp256k1_ge_neg(&tmp, &pt[point_state.input_pos]);
540 secp256k1_gej_add_ge_var(&buckets[idx], &buckets[idx], &tmp, NULL);
541 }
542 }
543
544 for(j = 0; j < bucket_window; j++) {
545 secp256k1_gej_double_var(r, r, NULL);
546 }
547
548 secp256k1_gej_set_infinity(&running_sum);
549 /* Accumulate the sum: bucket[0] + 3*bucket[1] + 5*bucket[2] + 7*bucket[3] + ...
550 * = bucket[0] + bucket[1] + bucket[2] + bucket[3] + ...
551 * + 2 * (bucket[1] + 2*bucket[2] + 3*bucket[3] + ...)
552 * using an intermediate running sum:
553 * running_sum = bucket[0] + bucket[1] + bucket[2] + ...
554 *
555 * The doubling is done implicitly by deferring the final window doubling (of 'r').
556 */
557 for(j = ECMULT_TABLE_SIZE(bucket_window+2) - 1; j > 0; j--) {
558 secp256k1_gej_add_var(&running_sum, &running_sum, &buckets[j], NULL);
559 secp256k1_gej_add_var(r, r, &running_sum, NULL);
560 }
561
562 secp256k1_gej_add_var(&running_sum, &running_sum, &buckets[0], NULL);
563 secp256k1_gej_double_var(r, r, NULL);
564 secp256k1_gej_add_var(r, r, &running_sum, NULL);
565 }
566 return 1;
567}
568
574 if (n <= 1) {
575 return 1;
576 } else if (n <= 4) {
577 return 2;
578 } else if (n <= 20) {
579 return 3;
580 } else if (n <= 57) {
581 return 4;
582 } else if (n <= 136) {
583 return 5;
584 } else if (n <= 235) {
585 return 6;
586 } else if (n <= 1260) {
587 return 7;
588 } else if (n <= 4420) {
589 return 9;
590 } else if (n <= 7880) {
591 return 10;
592 } else if (n <= 16050) {
593 return 11;
594 } else {
596 }
597}
598
602static size_t secp256k1_pippenger_bucket_window_inv(int bucket_window) {
603 switch(bucket_window) {
604 case 1: return 1;
605 case 2: return 4;
606 case 3: return 20;
607 case 4: return 57;
608 case 5: return 136;
609 case 6: return 235;
610 case 7: return 1260;
611 case 8: return 1260;
612 case 9: return 4420;
613 case 10: return 7880;
614 case 11: return 16050;
615 case PIPPENGER_MAX_BUCKET_WINDOW: return SIZE_MAX;
616 }
617 return 0;
618}
619
620
622 secp256k1_scalar tmp = *s1;
623 secp256k1_scalar_split_lambda(s1, s2, &tmp);
625
626 if (secp256k1_scalar_is_high(s1)) {
628 secp256k1_ge_neg(p1, p1);
629 }
630 if (secp256k1_scalar_is_high(s2)) {
632 secp256k1_ge_neg(p2, p2);
633 }
634}
635
640static size_t secp256k1_pippenger_scratch_size(size_t n_points, int bucket_window) {
641 size_t entries = 2*n_points + 2;
642 size_t entry_size = sizeof(secp256k1_ge) + sizeof(secp256k1_scalar) + sizeof(struct secp256k1_pippenger_point_state) + (WNAF_SIZE(bucket_window+1)+1)*sizeof(int);
643 return (sizeof(secp256k1_gej) << bucket_window) + sizeof(struct secp256k1_pippenger_state) + entries * entry_size;
644}
645
646static int secp256k1_ecmult_pippenger_batch(const secp256k1_callback* error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points, size_t cb_offset) {
647 const size_t scratch_checkpoint = secp256k1_scratch_checkpoint(error_callback, scratch);
648 /* Use 2(n+1) with the endomorphism, when calculating batch
649 * sizes. The reason for +1 is that we add the G scalar to the list of
650 * other scalars. */
651 size_t entries = 2*n_points + 2;
652 secp256k1_ge *points;
653 secp256k1_scalar *scalars;
654 secp256k1_gej *buckets;
655 struct secp256k1_pippenger_state *state_space;
656 size_t idx = 0;
657 size_t point_idx = 0;
658 int i, j;
659 int bucket_window;
660
662 if (inp_g_sc == NULL && n_points == 0) {
663 return 1;
664 }
665 bucket_window = secp256k1_pippenger_bucket_window(n_points);
666
667 /* We allocate PIPPENGER_SCRATCH_OBJECTS objects on the scratch space. If
668 * these allocations change, make sure to update the
669 * PIPPENGER_SCRATCH_OBJECTS constant and pippenger_scratch_size
670 * accordingly. */
671 points = (secp256k1_ge *) secp256k1_scratch_alloc(error_callback, scratch, entries * sizeof(*points));
672 scalars = (secp256k1_scalar *) secp256k1_scratch_alloc(error_callback, scratch, entries * sizeof(*scalars));
673 state_space = (struct secp256k1_pippenger_state *) secp256k1_scratch_alloc(error_callback, scratch, sizeof(*state_space));
674 if (points == NULL || scalars == NULL || state_space == NULL) {
675 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
676 return 0;
677 }
678 state_space->ps = (struct secp256k1_pippenger_point_state *) secp256k1_scratch_alloc(error_callback, scratch, entries * sizeof(*state_space->ps));
679 state_space->wnaf_na = (int *) secp256k1_scratch_alloc(error_callback, scratch, entries*(WNAF_SIZE(bucket_window+1)) * sizeof(int));
680 buckets = (secp256k1_gej *) secp256k1_scratch_alloc(error_callback, scratch, (1<<bucket_window) * sizeof(*buckets));
681 if (state_space->ps == NULL || state_space->wnaf_na == NULL || buckets == NULL) {
682 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
683 return 0;
684 }
685
686 if (inp_g_sc != NULL) {
687 scalars[0] = *inp_g_sc;
688 points[0] = secp256k1_ge_const_g;
689 idx++;
690 secp256k1_ecmult_endo_split(&scalars[0], &scalars[1], &points[0], &points[1]);
691 idx++;
692 }
693
694 while (point_idx < n_points) {
695 if (!cb(&scalars[idx], &points[idx], point_idx + cb_offset, cbdata)) {
696 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
697 return 0;
698 }
699 idx++;
700 secp256k1_ecmult_endo_split(&scalars[idx - 1], &scalars[idx], &points[idx - 1], &points[idx]);
701 idx++;
702 point_idx++;
703 }
704
705 secp256k1_ecmult_pippenger_wnaf(buckets, bucket_window, state_space, r, scalars, points, idx);
706
707 /* Clear data */
708 for(i = 0; (size_t)i < idx; i++) {
709 secp256k1_scalar_clear(&scalars[i]);
710 state_space->ps[i].skew_na = 0;
711 for(j = 0; j < WNAF_SIZE(bucket_window+1); j++) {
712 state_space->wnaf_na[i * WNAF_SIZE(bucket_window+1) + j] = 0;
713 }
714 }
715 for(i = 0; i < 1<<bucket_window; i++) {
716 secp256k1_gej_clear(&buckets[i]);
717 }
718 secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
719 return 1;
720}
721
722/* Wrapper for secp256k1_ecmult_multi_func interface */
723static int secp256k1_ecmult_pippenger_batch_single(const secp256k1_callback* error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n) {
724 return secp256k1_ecmult_pippenger_batch(error_callback, scratch, r, inp_g_sc, cb, cbdata, n, 0);
725}
726
732static size_t secp256k1_pippenger_max_points(const secp256k1_callback* error_callback, secp256k1_scratch *scratch) {
733 size_t max_alloc = secp256k1_scratch_max_allocation(error_callback, scratch, PIPPENGER_SCRATCH_OBJECTS);
734 int bucket_window;
735 size_t res = 0;
736
737 for (bucket_window = 1; bucket_window <= PIPPENGER_MAX_BUCKET_WINDOW; bucket_window++) {
738 size_t n_points;
739 size_t max_points = secp256k1_pippenger_bucket_window_inv(bucket_window);
740 size_t space_for_points;
741 size_t space_overhead;
742 size_t entry_size = sizeof(secp256k1_ge) + sizeof(secp256k1_scalar) + sizeof(struct secp256k1_pippenger_point_state) + (WNAF_SIZE(bucket_window+1)+1)*sizeof(int);
743
744 entry_size = 2*entry_size;
745 space_overhead = (sizeof(secp256k1_gej) << bucket_window) + entry_size + sizeof(struct secp256k1_pippenger_state);
746 if (space_overhead > max_alloc) {
747 break;
748 }
749 space_for_points = max_alloc - space_overhead;
750
751 n_points = space_for_points/entry_size;
752 n_points = n_points > max_points ? max_points : n_points;
753 if (n_points > res) {
754 res = n_points;
755 }
756 if (n_points < max_points) {
757 /* A larger bucket_window may support even more points. But if we
758 * would choose that then the caller couldn't safely use any number
759 * smaller than what this function returns */
760 break;
761 }
762 }
763 return res;
764}
765
766/* Computes ecmult_multi by simply multiplying and adding each point. Does not
767 * require a scratch space */
768static int secp256k1_ecmult_multi_simple_var(secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points) {
769 size_t point_idx;
770 secp256k1_gej tmpj;
771
774 /* r = inp_g_sc*G */
775 secp256k1_ecmult(r, &tmpj, &secp256k1_scalar_zero, inp_g_sc);
776 for (point_idx = 0; point_idx < n_points; point_idx++) {
777 secp256k1_ge point;
778 secp256k1_gej pointj;
779 secp256k1_scalar scalar;
780 if (!cb(&scalar, &point, point_idx, cbdata)) {
781 return 0;
782 }
783 /* r += scalar*point */
784 secp256k1_gej_set_ge(&pointj, &point);
785 secp256k1_ecmult(&tmpj, &pointj, &scalar, NULL);
786 secp256k1_gej_add_var(r, r, &tmpj, NULL);
787 }
788 return 1;
789}
790
791/* Compute the number of batches and the batch size given the maximum batch size and the
792 * total number of points */
793static int secp256k1_ecmult_multi_batch_size_helper(size_t *n_batches, size_t *n_batch_points, size_t max_n_batch_points, size_t n) {
794 if (max_n_batch_points == 0) {
795 return 0;
796 }
797 if (max_n_batch_points > ECMULT_MAX_POINTS_PER_BATCH) {
798 max_n_batch_points = ECMULT_MAX_POINTS_PER_BATCH;
799 }
800 if (n == 0) {
801 *n_batches = 0;
802 *n_batch_points = 0;
803 return 1;
804 }
805 /* Compute ceil(n/max_n_batch_points) and ceil(n/n_batches) */
806 *n_batches = 1 + (n - 1) / max_n_batch_points;
807 *n_batch_points = 1 + (n - 1) / *n_batches;
808 return 1;
809}
810
812static int secp256k1_ecmult_multi_var(const secp256k1_callback* error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n) {
813 size_t i;
814
815 int (*f)(const secp256k1_callback* error_callback, secp256k1_scratch*, secp256k1_gej*, const secp256k1_scalar*, secp256k1_ecmult_multi_callback cb, void*, size_t, size_t);
816 size_t n_batches;
817 size_t n_batch_points;
818
820 if (inp_g_sc == NULL && n == 0) {
821 return 1;
822 } else if (n == 0) {
823 secp256k1_ecmult(r, r, &secp256k1_scalar_zero, inp_g_sc);
824 return 1;
825 }
826 if (scratch == NULL) {
827 return secp256k1_ecmult_multi_simple_var(r, inp_g_sc, cb, cbdata, n);
828 }
829
830 /* Compute the batch sizes for Pippenger's algorithm given a scratch space. If it's greater than
831 * a threshold use Pippenger's algorithm. Otherwise use Strauss' algorithm.
832 * As a first step check if there's enough space for Pippenger's algo (which requires less space
833 * than Strauss' algo) and if not, use the simple algorithm. */
834 if (!secp256k1_ecmult_multi_batch_size_helper(&n_batches, &n_batch_points, secp256k1_pippenger_max_points(error_callback, scratch), n)) {
835 return secp256k1_ecmult_multi_simple_var(r, inp_g_sc, cb, cbdata, n);
836 }
837 if (n_batch_points >= ECMULT_PIPPENGER_THRESHOLD) {
839 } else {
840 if (!secp256k1_ecmult_multi_batch_size_helper(&n_batches, &n_batch_points, secp256k1_strauss_max_points(error_callback, scratch), n)) {
841 return secp256k1_ecmult_multi_simple_var(r, inp_g_sc, cb, cbdata, n);
842 }
844 }
845 for(i = 0; i < n_batches; i++) {
846 size_t nbp = n < n_batch_points ? n : n_batch_points;
847 size_t offset = n_batch_points*i;
848 secp256k1_gej tmp;
849 if (!f(error_callback, scratch, &tmp, i == 0 ? inp_g_sc : NULL, cb, cbdata, nbp, offset)) {
850 return 0;
851 }
852 secp256k1_gej_add_var(r, r, &tmp, NULL);
853 n -= nbp;
854 }
855 return 1;
856}
857
858#endif /* SECP256K1_ECMULT_IMPL_H */
#define ECMULT_TABLE_SIZE(w)
The number of entries a table with precomputed multiples needs to have.
Definition: ecmult.h:41
int() secp256k1_ecmult_multi_callback(secp256k1_scalar *sc, secp256k1_ge *pt, size_t idx, void *data)
Definition: ecmult.h:46
#define STRAUSS_SCRATCH_OBJECTS
Definition: ecmult_impl.h:50
static size_t secp256k1_pippenger_bucket_window_inv(int bucket_window)
Returns the maximum optimal number of points for a bucket_window.
Definition: ecmult_impl.h:602
static size_t secp256k1_pippenger_max_points(const secp256k1_callback *error_callback, secp256k1_scratch *scratch)
Returns the maximum number of points in addition to G that can be used with a given scratch space.
Definition: ecmult_impl.h:732
static int secp256k1_ecmult_pippenger_batch(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points, size_t cb_offset)
Definition: ecmult_impl.h:646
#define WNAF_SIZE(w)
Definition: ecmult_impl.h:46
static int secp256k1_ecmult_strauss_batch_single(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n)
Definition: ecmult_impl.h:398
static size_t secp256k1_strauss_max_points(const secp256k1_callback *error_callback, secp256k1_scratch *scratch)
Definition: ecmult_impl.h:402
static int secp256k1_wnaf_fixed(int *wnaf, const secp256k1_scalar *s, int w)
Convert a number to WNAF notation.
Definition: ecmult_impl.h:413
static SECP256K1_INLINE void secp256k1_ecmult_endo_split(secp256k1_scalar *s1, secp256k1_scalar *s2, secp256k1_ge *p1, secp256k1_ge *p2)
Definition: ecmult_impl.h:621
static int secp256k1_ecmult_wnaf(int *wnaf, int len, const secp256k1_scalar *a, int w)
Convert a number to WNAF notation.
Definition: ecmult_impl.h:159
static SECP256K1_INLINE void secp256k1_ecmult_table_get_ge_storage(secp256k1_ge *r, const secp256k1_ge_storage *pre, int n, int w)
Definition: ecmult_impl.h:142
static int secp256k1_ecmult_multi_var(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n)
Definition: ecmult_impl.h:812
static SECP256K1_INLINE void secp256k1_ecmult_table_get_ge_lambda(secp256k1_ge *r, const secp256k1_ge *pre, const secp256k1_fe *x, int n, int w)
Definition: ecmult_impl.h:132
#define SECP256K1_ECMULT_TABLE_VERIFY(n, w)
Definition: ecmult_impl.h:117
#define WINDOW_A
Definition: ecmult_impl.h:32
static size_t secp256k1_strauss_scratch_size(size_t n_points)
Definition: ecmult_impl.h:353
#define ECMULT_PIPPENGER_THRESHOLD
Definition: ecmult_impl.h:55
static int secp256k1_ecmult_multi_simple_var(secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points)
Definition: ecmult_impl.h:768
static int secp256k1_pippenger_bucket_window(size_t n)
Returns optimal bucket_window (number of bits of a scalar represented by a set of buckets) for a give...
Definition: ecmult_impl.h:573
static int secp256k1_ecmult_pippenger_batch_single(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n)
Definition: ecmult_impl.h:723
#define WNAF_BITS
Larger values for ECMULT_WINDOW_SIZE result in possibly better performance at the cost of an exponent...
Definition: ecmult_impl.h:44
#define ECMULT_MAX_POINTS_PER_BATCH
Definition: ecmult_impl.h:57
#define PIPPENGER_MAX_BUCKET_WINDOW
Definition: ecmult_impl.h:52
#define PIPPENGER_SCRATCH_OBJECTS
Definition: ecmult_impl.h:49
static int secp256k1_ecmult_strauss_batch(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, secp256k1_gej *r, const secp256k1_scalar *inp_g_sc, secp256k1_ecmult_multi_callback cb, void *cbdata, size_t n_points, size_t cb_offset)
Definition: ecmult_impl.h:358
static void secp256k1_ecmult(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_scalar *na, const secp256k1_scalar *ng)
Definition: ecmult_impl.h:341
static int secp256k1_ecmult_multi_batch_size_helper(size_t *n_batches, size_t *n_batch_points, size_t max_n_batch_points, size_t n)
Definition: ecmult_impl.h:793
static int secp256k1_ecmult_pippenger_wnaf(secp256k1_gej *buckets, int bucket_window, struct secp256k1_pippenger_state *state, secp256k1_gej *r, const secp256k1_scalar *sc, const secp256k1_ge *pt, size_t num)
Definition: ecmult_impl.h:492
static size_t secp256k1_pippenger_scratch_size(size_t n_points, int bucket_window)
Returns the scratch size required for a given number of points (excluding base point G) without consi...
Definition: ecmult_impl.h:640
static SECP256K1_INLINE void secp256k1_ecmult_table_get_ge(secp256k1_ge *r, const secp256k1_ge *pre, int n, int w)
Definition: ecmult_impl.h:122
static void secp256k1_ecmult_odd_multiples_table(int n, secp256k1_ge *pre_a, secp256k1_fe *zr, secp256k1_fe *z, const secp256k1_gej *a)
Fill a table 'pre_a' with precomputed odd multiples of a.
Definition: ecmult_impl.h:73
static void secp256k1_ecmult_strauss_wnaf(const struct secp256k1_strauss_state *state, secp256k1_gej *r, size_t num, const secp256k1_gej *a, const secp256k1_scalar *na, const secp256k1_scalar *ng)
Definition: ecmult_impl.h:231
int(* secp256k1_ecmult_multi_func)(const secp256k1_callback *error_callback, secp256k1_scratch *, secp256k1_gej *, const secp256k1_scalar *, secp256k1_ecmult_multi_callback cb, void *, size_t)
Definition: ecmult_impl.h:811
#define secp256k1_fe_negate
Definition: field.h:91
static const secp256k1_fe secp256k1_const_beta
Definition: field.h:69
#define secp256k1_fe_mul
Definition: field.h:94
#define secp256k1_fe_set_int
Definition: field.h:83
static void secp256k1_gej_double_var(secp256k1_gej *r, const secp256k1_gej *a, secp256k1_fe *rzr)
Set r equal to the double of a.
static void secp256k1_gej_add_zinv_var(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_ge *b, const secp256k1_fe *bzinv)
Set r equal to the sum of a and b (with the inverse of b's Z coordinate passed as bzinv).
static void secp256k1_gej_clear(secp256k1_gej *r)
Clear a secp256k1_gej to prevent leaking sensitive information.
static void secp256k1_ge_mul_lambda(secp256k1_ge *r, const secp256k1_ge *a)
Set r to be equal to lambda times a, where lambda is chosen in a way such that this is very fast.
static void secp256k1_gej_set_infinity(secp256k1_gej *r)
Set a group element (jacobian) equal to the point at infinity.
static int secp256k1_gej_is_infinity(const secp256k1_gej *a)
Check whether a group element is the point at infinity.
static void secp256k1_ge_set_xy(secp256k1_ge *r, const secp256k1_fe *x, const secp256k1_fe *y)
Set a group element equal to the point with given X and Y coordinates.
static void secp256k1_gej_add_ge_var(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_ge *b, secp256k1_fe *rzr)
Set r equal to the sum of a and b (with b given in affine coordinates).
static void secp256k1_ge_from_storage(secp256k1_ge *r, const secp256k1_ge_storage *a)
Convert a group element back from the storage type.
static void secp256k1_gej_add_var(secp256k1_gej *r, const secp256k1_gej *a, const secp256k1_gej *b, secp256k1_fe *rzr)
Set r equal to the sum of a and b.
static void secp256k1_gej_rescale(secp256k1_gej *r, const secp256k1_fe *b)
Rescale a jacobian point by b which must be non-zero.
static void secp256k1_ge_table_set_globalz(size_t len, secp256k1_ge *a, const secp256k1_fe *zr)
Bring a batch of inputs to the same global z "denominator", based on ratios between (omitted) z coord...
static void secp256k1_ge_neg(secp256k1_ge *r, const secp256k1_ge *a)
Set r equal to the inverse of a (i.e., mirrored around the X axis)
static int secp256k1_ge_is_infinity(const secp256k1_ge *a)
Check whether a group element is the point at infinity.
static void secp256k1_gej_set_ge(secp256k1_gej *r, const secp256k1_ge *a)
Set a group element (jacobian) equal to another which is given in affine coordinates.
static void secp256k1_ge_set_gej_zinv(secp256k1_ge *r, const secp256k1_gej *a, const secp256k1_fe *zi)
Definition: group_impl.h:96
static const secp256k1_ge secp256k1_ge_const_g
Definition: group_impl.h:70
const secp256k1_ge_storage secp256k1_pre_g_128[ECMULT_TABLE_SIZE(WINDOW_G)]
const secp256k1_ge_storage secp256k1_pre_g[ECMULT_TABLE_SIZE(WINDOW_G)]
#define WINDOW_G
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *k)
Find r1 and r2 such that r1+r2*2^128 = k.
static int secp256k1_scalar_is_even(const secp256k1_scalar *a)
Check whether a scalar, considered as an nonnegative integer, is even.
static int secp256k1_scalar_is_zero(const secp256k1_scalar *a)
Check whether a scalar equals zero.
static unsigned int secp256k1_scalar_get_bits(const secp256k1_scalar *a, unsigned int offset, unsigned int count)
Access bits from a scalar.
static void secp256k1_scalar_negate(secp256k1_scalar *r, const secp256k1_scalar *a)
Compute the complement of a scalar (modulo the group order).
static int secp256k1_scalar_is_high(const secp256k1_scalar *a)
Check whether a scalar is higher than the group order divided by 2.
static void secp256k1_scalar_split_lambda(secp256k1_scalar *SECP256K1_RESTRICT r1, secp256k1_scalar *SECP256K1_RESTRICT r2, const secp256k1_scalar *SECP256K1_RESTRICT k)
Find r1 and r2 such that r1+r2*lambda = k, where r1 and r2 or their negations are maximum 128 bits lo...
static unsigned int secp256k1_scalar_get_bits_var(const secp256k1_scalar *a, unsigned int offset, unsigned int count)
Access bits from a scalar.
static void secp256k1_scalar_clear(secp256k1_scalar *r)
Clear a scalar to prevent the leak of sensitive data.
static const secp256k1_scalar secp256k1_scalar_zero
Definition: scalar_impl.h:28
static void secp256k1_scratch_apply_checkpoint(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, size_t checkpoint)
Applies a check point received from secp256k1_scratch_checkpoint, undoing all allocations since that ...
static size_t secp256k1_scratch_max_allocation(const secp256k1_callback *error_callback, const secp256k1_scratch *scratch, size_t n_objects)
Returns the maximum allocation the scratch space will allow.
static void * secp256k1_scratch_alloc(const secp256k1_callback *error_callback, secp256k1_scratch *scratch, size_t n)
Returns a pointer into the most recently allocated frame, or NULL if there is insufficient available ...
static size_t secp256k1_scratch_checkpoint(const secp256k1_callback *error_callback, const secp256k1_scratch *scratch)
Returns an opaque object used to "checkpoint" a scratch space.
#define SECP256K1_INLINE
Definition: util.h:48
#define VERIFY_CHECK(cond)
Definition: util.h:130
This field implementation represents the value as 10 uint32_t limbs in base 2^26.
Definition: field_10x26.h:14
A group element in affine coordinates on the secp256k1 curve, or occasionally on an isomorphic curve ...
Definition: group.h:16
secp256k1_fe y
Definition: group.h:18
A group element of the secp256k1 curve, in jacobian coordinates.
Definition: group.h:28
secp256k1_fe y
Definition: group.h:30
secp256k1_fe x
Definition: group.h:29
int infinity
Definition: group.h:32
secp256k1_fe z
Definition: group.h:31
struct secp256k1_pippenger_point_state * ps
Definition: ecmult_impl.h:482
A scalar modulo the group order of the secp256k1 curve.
Definition: scalar_4x64.h:13
secp256k1_fe * aux
Definition: ecmult_impl.h:226
struct secp256k1_strauss_point_state * ps
Definition: ecmult_impl.h:228
secp256k1_ge * pre_a
Definition: ecmult_impl.h:227