Remove unused secp256k1_scalar_shr_int
This commit is contained in:
parent
115fdc7232
commit
21f49d9bec
@ -54,10 +54,6 @@ static void secp256k1_scalar_cadd_bit(secp256k1_scalar *r, unsigned int bit, int
|
|||||||
/** Multiply two scalars (modulo the group order). */
|
/** Multiply two scalars (modulo the group order). */
|
||||||
static void secp256k1_scalar_mul(secp256k1_scalar *r, const secp256k1_scalar *a, const secp256k1_scalar *b);
|
static void secp256k1_scalar_mul(secp256k1_scalar *r, const secp256k1_scalar *a, const secp256k1_scalar *b);
|
||||||
|
|
||||||
/** Shift a scalar right by some amount strictly between 0 and 16, returning
|
|
||||||
* the low bits that were shifted off */
|
|
||||||
static int secp256k1_scalar_shr_int(secp256k1_scalar *r, int n);
|
|
||||||
|
|
||||||
/** Compute the inverse of a scalar (modulo the group order). */
|
/** Compute the inverse of a scalar (modulo the group order). */
|
||||||
static void secp256k1_scalar_inverse(secp256k1_scalar *r, const secp256k1_scalar *a);
|
static void secp256k1_scalar_inverse(secp256k1_scalar *r, const secp256k1_scalar *a);
|
||||||
|
|
||||||
|
@ -850,22 +850,6 @@ static void secp256k1_scalar_mul(secp256k1_scalar *r, const secp256k1_scalar *a,
|
|||||||
secp256k1_scalar_verify(r);
|
secp256k1_scalar_verify(r);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int secp256k1_scalar_shr_int(secp256k1_scalar *r, int n) {
|
|
||||||
int ret;
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
VERIFY_CHECK(n > 0);
|
|
||||||
VERIFY_CHECK(n < 16);
|
|
||||||
|
|
||||||
ret = r->d[0] & ((1 << n) - 1);
|
|
||||||
r->d[0] = (r->d[0] >> n) + (r->d[1] << (64 - n));
|
|
||||||
r->d[1] = (r->d[1] >> n) + (r->d[2] << (64 - n));
|
|
||||||
r->d[2] = (r->d[2] >> n) + (r->d[3] << (64 - n));
|
|
||||||
r->d[3] = (r->d[3] >> n);
|
|
||||||
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *k) {
|
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *k) {
|
||||||
secp256k1_scalar_verify(k);
|
secp256k1_scalar_verify(k);
|
||||||
|
|
||||||
|
@ -662,26 +662,6 @@ static void secp256k1_scalar_mul(secp256k1_scalar *r, const secp256k1_scalar *a,
|
|||||||
secp256k1_scalar_verify(r);
|
secp256k1_scalar_verify(r);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int secp256k1_scalar_shr_int(secp256k1_scalar *r, int n) {
|
|
||||||
int ret;
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
VERIFY_CHECK(n > 0);
|
|
||||||
VERIFY_CHECK(n < 16);
|
|
||||||
|
|
||||||
ret = r->d[0] & ((1 << n) - 1);
|
|
||||||
r->d[0] = (r->d[0] >> n) + (r->d[1] << (32 - n));
|
|
||||||
r->d[1] = (r->d[1] >> n) + (r->d[2] << (32 - n));
|
|
||||||
r->d[2] = (r->d[2] >> n) + (r->d[3] << (32 - n));
|
|
||||||
r->d[3] = (r->d[3] >> n) + (r->d[4] << (32 - n));
|
|
||||||
r->d[4] = (r->d[4] >> n) + (r->d[5] << (32 - n));
|
|
||||||
r->d[5] = (r->d[5] >> n) + (r->d[6] << (32 - n));
|
|
||||||
r->d[6] = (r->d[6] >> n) + (r->d[7] << (32 - n));
|
|
||||||
r->d[7] = (r->d[7] >> n);
|
|
||||||
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *k) {
|
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *k) {
|
||||||
secp256k1_scalar_verify(k);
|
secp256k1_scalar_verify(k);
|
||||||
|
|
||||||
|
@ -139,19 +139,6 @@ static void secp256k1_scalar_mul(secp256k1_scalar *r, const secp256k1_scalar *a,
|
|||||||
secp256k1_scalar_verify(r);
|
secp256k1_scalar_verify(r);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int secp256k1_scalar_shr_int(secp256k1_scalar *r, int n) {
|
|
||||||
int ret;
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
VERIFY_CHECK(n > 0);
|
|
||||||
VERIFY_CHECK(n < 16);
|
|
||||||
|
|
||||||
ret = *r & ((1 << n) - 1);
|
|
||||||
*r >>= n;
|
|
||||||
|
|
||||||
secp256k1_scalar_verify(r);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *a) {
|
static void secp256k1_scalar_split_128(secp256k1_scalar *r1, secp256k1_scalar *r2, const secp256k1_scalar *a) {
|
||||||
secp256k1_scalar_verify(a);
|
secp256k1_scalar_verify(a);
|
||||||
|
|
||||||
|
21
src/tests.c
21
src/tests.c
@ -2180,20 +2180,6 @@ static void scalar_test(void) {
|
|||||||
CHECK(secp256k1_scalar_eq(&n, &s));
|
CHECK(secp256k1_scalar_eq(&n, &s));
|
||||||
}
|
}
|
||||||
|
|
||||||
{
|
|
||||||
/* test secp256k1_scalar_shr_int */
|
|
||||||
secp256k1_scalar r;
|
|
||||||
int i;
|
|
||||||
random_scalar_order_test(&r);
|
|
||||||
for (i = 0; i < 100; ++i) {
|
|
||||||
int low;
|
|
||||||
int shift = 1 + secp256k1_testrand_int(15);
|
|
||||||
int expected = r.d[0] % (1ULL << shift);
|
|
||||||
low = secp256k1_scalar_shr_int(&r, shift);
|
|
||||||
CHECK(expected == low);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
{
|
{
|
||||||
/* Test commutativity of add. */
|
/* Test commutativity of add. */
|
||||||
secp256k1_scalar r1, r2;
|
secp256k1_scalar r1, r2;
|
||||||
@ -5280,13 +5266,12 @@ static void test_fixed_wnaf(const secp256k1_scalar *number, int w) {
|
|||||||
int wnaf[256] = {0};
|
int wnaf[256] = {0};
|
||||||
int i;
|
int i;
|
||||||
int skew;
|
int skew;
|
||||||
secp256k1_scalar num = *number;
|
secp256k1_scalar num, unused;
|
||||||
|
|
||||||
secp256k1_scalar_set_int(&x, 0);
|
secp256k1_scalar_set_int(&x, 0);
|
||||||
secp256k1_scalar_set_int(&shift, 1 << w);
|
secp256k1_scalar_set_int(&shift, 1 << w);
|
||||||
for (i = 0; i < 16; ++i) {
|
/* Make num a 128-bit scalar. */
|
||||||
secp256k1_scalar_shr_int(&num, 8);
|
secp256k1_scalar_split_128(&num, &unused, number);
|
||||||
}
|
|
||||||
skew = secp256k1_wnaf_fixed(wnaf, &num, w);
|
skew = secp256k1_wnaf_fixed(wnaf, &num, w);
|
||||||
|
|
||||||
for (i = WNAF_SIZE(w)-1; i >= 0; --i) {
|
for (i = WNAF_SIZE(w)-1; i >= 0; --i) {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user