4091e61924cirrus: increase timeout for macOS tasks (Jonas Nick)79d4c3ac68whitelist: add SECP_INCLUDES to bench_whitelist CPPFLAGS (Jonas Nick)649bf201d8musig: fix tests for 32-bit (Jonas Nick)9361f360bbci: Select number of parallel make jobs depending on CI environment (Tim Ruffing)28eccdf806ci: Split output of logs into multiple sections (Tim Ruffing)c7f754fe4dci: Run PRs on merge result instead of on the source branch (Tim Ruffing)b994a8be3cci: Print information about binaries using "file" (Tim Ruffing)f24e122d13ci: Switch all Linux builds to Debian (Tim Ruffing)f329bba244build: Add workaround for automake 1.13 and older (Tim Ruffing)7d3497cdc4ctime_test: move context randomization test to the end (Jonas Nick)e491d06b98Use bit ops instead of int mult for constant-time logic in gej_add_ge (Tim Ruffing)cc2a5451dcci: Refactor Nix shell files (Jonas Nick)2480e55c8fci: Remove support for Travis CI (Tim Ruffing)2b359f1c1dci: Enable simple cache for brewing valgrind on macOS (Tim Ruffing)8c02e465c5ci: Add support for Cirrus CI (Tim Ruffing)b6f649889aAdd parens around ROUND_TO_ALIGN's parameter. This makes the macro robust against a hypothetical ROUND_TO_ALIGN(foo ? sizeA : size B) invocation. (Russell O'Connor)482e4a9cfcAdd missing secp256k1_ge_set_gej_var decl. (Russell O'Connor)fb390c5299Remove underscores from header defs. This makes them consistent with other files and avoids reserved identifiers. (Russell O'Connor)75d2ae149eRemove unused secp256k1_fe_inv_all_var (Pieter Wuille)2730618604Avoid casting (void**) values. Replaced with an expression that only casts (void*) values. (Russell O'Connor)3c15130709Improve CC_FOR_BUILD detection (Tim Ruffing)47802a4762Restructure and tidy configure.ac (Tim Ruffing)252c19dfc6Ask brew for valgrind include path (Tim Ruffing)33cb3c2b1fAdd secret key extraction from keypair to constant time tests (Elichai Turkel)36d9dc1e8eAdd seckey extraction from keypair to the extrakeys tests (Elichai Turkel)fc96aa73f5Add a function to extract the secretkey from a keypair (Elichai Turkel)b7bc3a4aaafixed typo (Ferdinando M. Ametrano)07aa4c70ffFix insecure links (Dimitris Apostolou)18aadf9d28docs: fix simple typo, dependecy -> dependency (Tim Gates)329a2e0a3fsage: Add script for generating scalar_split_lambda constants (Tim Ruffing)f554dfc708sage: Reorganize files (Tim Ruffing)6e85d675aaRename tweak to tweak32 in public API (Jonas Nick)f587f04e35Rename msg32 to msghash32 in ecdsa_sign/verify and add explanation (Jonas Nick) Pull request description: ACKs for top commit: real-or-random: ACK4091e61924merge commit picks the right parents, merge resolution and additional commit look good Tree-SHA512: 4f91842ec08c0d6f62c85f6426fe6af6556b4e7b0e6f2a3317953f61557f9a02855e05a28eaa22d7c245bc915778cea6a43e8c881540de43ce08deb916caf07f
2d9e7175 b61f9da5 98dac878 8c727b90 328aaef2 f2d9aeae b732701f db726782 5671e5f3 a4abaab7 659d0d47 f8c0b57e 24d1656c 3a8b47bc ebdba03c 4c3ba88c ' into temp-merge-901
2d9e7175 b61f9da5 98dac878 8c727b90 328aaef2 f2d9aeae b732701f db726782 5671e5f3 a4abaab7 659d0d47 f8c0b57e 24d1656c 3a8b47bc ebdba03c 4c3ba88c ' into temp-merge-901
2d9e7175 b61f9da5 98dac878 8c727b90 328aaef2 f2d9aeae b732701f db726782 5671e5f3 a4abaab7 659d0d47 f8c0b57e 24d1656c 3a8b47bc ebdba03c 4c3ba88c ' into temp-merge-901
2d9e7175 b61f9da5 98dac878 8c727b90 328aaef2 f2d9aeae b732701f db726782 5671e5f3 a4abaab7 659d0d47 f8c0b57e 24d1656c 3a8b47bc ebdba03c 4c3ba88c ' into temp-merge-901
libsecp256k1
Optimized C library for ECDSA signatures and secret/public key operations on curve secp256k1.
This library is intended to be the highest quality publicly available library for cryptography on the secp256k1 curve. However, the primary focus of its development has been for usage in the Bitcoin system and usage unlike Bitcoin's may be less well tested, verified, or suffer from a less well thought out interface. Correct usage requires some care and consideration that the library is fit for your application's purpose.
Features:
- secp256k1 ECDSA signing/verification and key generation.
- Additive and multiplicative tweaking of secret/public keys.
- Serialization/parsing of secret keys, public keys, signatures.
- Constant time, constant memory access signing and public key generation.
- Derandomized ECDSA (via RFC6979 or with a caller provided function.)
- Very efficient implementation.
- Suitable for embedded systems.
- Optional module for public key recovery.
- Optional module for ECDH key exchange.
Experimental features have not received enough scrutiny to satisfy the standard of quality of this library but are made available for testing and review by the community. The APIs of these features should not be considered stable.
Implementation details
- General
- No runtime heap allocation.
- Extensive testing infrastructure.
- Structured to facilitate review and analysis.
- Intended to be portable to any system with a C89 compiler and uint64_t support.
- No use of floating types.
- Expose only higher level interfaces to minimize the API surface and improve application security. ("Be difficult to use insecurely.")
- Field operations
- Optimized implementation of arithmetic modulo the curve's field size (2^256 - 0x1000003D1).
- Using 5 52-bit limbs (including hand-optimized assembly for x86_64, by Diederik Huys).
- Using 10 26-bit limbs (including hand-optimized assembly for 32-bit ARM, by Wladimir J. van der Laan).
- Field inverses and square roots using a sliding window over blocks of 1s (by Peter Dettman).
- Optimized implementation of arithmetic modulo the curve's field size (2^256 - 0x1000003D1).
- Scalar operations
- Optimized implementation without data-dependent branches of arithmetic modulo the curve's order.
- Using 4 64-bit limbs (relying on __int128 support in the compiler).
- Using 8 32-bit limbs.
- Optimized implementation without data-dependent branches of arithmetic modulo the curve's order.
- Group operations
- Point addition formula specifically simplified for the curve equation (y^2 = x^3 + 7).
- Use addition between points in Jacobian and affine coordinates where possible.
- Use a unified addition/doubling formula where necessary to avoid data-dependent branches.
- Point/x comparison without a field inversion by comparison in the Jacobian coordinate space.
- Point multiplication for verification (aP + bG).
- Use wNAF notation for point multiplicands.
- Use a much larger window for multiples of G, using precomputed multiples.
- Use Shamir's trick to do the multiplication with the public key and the generator simultaneously.
- Use secp256k1's efficiently-computable endomorphism to split the P multiplicand into 2 half-sized ones.
- Point multiplication for signing
- Use a precomputed table of multiples of powers of 16 multiplied with the generator, so general multiplication becomes a series of additions.
- Intended to be completely free of timing sidechannels for secret-key operations (on reasonable hardware/toolchains)
- Access the table with branch-free conditional moves so memory access is uniform.
- No data-dependent branches
- Optional runtime blinding which attempts to frustrate differential power analysis.
- The precomputed tables add and eventually subtract points for which no known scalar (secret key) is known, preventing even an attacker with control over the secret key used to control the data internally.
Build steps
libsecp256k1 is built using autotools:
$ ./autogen.sh
$ ./configure
$ make
$ make check
$ sudo make install # optional
Exhaustive tests
$ ./exhaustive_tests
With valgrind, you might need to increase the max stack size:
$ valgrind --max-stackframe=2500000 ./exhaustive_tests
Test coverage
This library aims to have full coverage of the reachable lines and branches.
To create a test coverage report, configure with --enable-coverage (use of GCC is necessary):
$ ./configure --enable-coverage
Run the tests:
$ make check
To create a report, gcovr is recommended, as it includes branch coverage reporting:
$ gcovr --exclude 'src/bench*' --print-summary
To create a HTML report with coloured and annotated source code:
$ gcovr --exclude 'src/bench*' --html --html-details -o coverage.html
Reporting a vulnerability
See SECURITY.md