-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upstream PRs 1357, 1345, 1358, 1368, 1369, 1323, 1364, 1370, 1367, 1344, 1371, 1363, 1340, 1366, 1313, 1378, 1298, 1382, 1383, 1384, 1386 #259
Commits on May 8, 2023
-
Our RNG has been replaced with Xoshiro256++, a well-analyzed RNG. Our unit tests should not be resposible for verifying its statistical qualities.
Configuration menu - View commit details
-
Copy full SHA for 723e8ca - Browse repository at this point
Copy the full SHA 723e8caView commit details
Commits on May 9, 2023
-
Configuration menu - View commit details
-
Copy full SHA for fb5bfa4 - Browse repository at this point
Copy the full SHA fb5bfa4View commit details
Commits on May 10, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 6ec3731 - Browse repository at this point
Copy the full SHA 6ec3731View commit details
Commits on May 24, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 05873bb - Browse repository at this point
Copy the full SHA 05873bbView commit details
Commits on Jun 12, 2023
-
group: remove unneeded normalize_weak in
secp256k1_ge_is_valid_var
After calculating the right-hand side of the elliptic curve equation (x^3 + 7), the field element `x3` has a magnitude of 2 (1 as result of `secp256k1_fe_mul`, then increased by 1 due to `secp256k1_fe_add_int`). This is fine for `secp256k1_fe_equal_var`, as the second parameter only requires the magnitude to not exceed 31, and the normalize_weak call can hence be dropped.
Configuration menu - View commit details
-
Copy full SHA for efa76c4 - Browse repository at this point
Copy the full SHA efa76c4View commit details
Commits on Jun 13, 2023
-
Configuration menu - View commit details
-
Copy full SHA for be8ff3a - Browse repository at this point
Copy the full SHA be8ff3aView commit details
Commits on Jun 25, 2023
-
tests: refactor: take use of
secp256k1_ge_x_on_curve_var
The recently merged ellswift PR (#1129) introduced a helper `secp256k1_ge_x_on_curve_var` to check if a given X coordinate is valid (i.e. the expression x^3 + 7 is square, see commit 79e5b2a). This can be used for code deduplication in the `ecmult_const_mult_xonly` test.
Configuration menu - View commit details
-
Copy full SHA for 7d8d5c8 - Browse repository at this point
Copy the full SHA 7d8d5c8View commit details
Commits on Jun 27, 2023
-
Merge bitcoin-core/secp256k1#1357: tests: refactor: take use of `secp…
…256k1_ge_x_on_curve_var` 7d8d5c8 tests: refactor: take use of `secp256k1_ge_x_on_curve_var` (Sebastian Falbesoner) Pull request description: The recently merged ellswift PR (#1129) introduced a helper `secp256k1_ge_x_on_curve_var` to check if a given X coordinate is on the curve (i.e. the expression x^3 + 7 is square, see commit 79e5b2a). This can be used for code deduplication in the `ecmult_const_mult_xonly` test. (Found this instance via `$ git grep add_int.*SECP256K1_B`, I think it's the only one where the helper can be used.) ACKs for top commit: sipa: utACK 7d8d5c8 real-or-random: utACK 7d8d5c8 Tree-SHA512: aebff9b5ef2f6f6664ce89e4e1272cb55b6aac81cfb379652c4b7ab30dd1d7fd82a2c3b47c7b7429755ba28f011a3a9e2e6d3aa5c77d3b105d159104c24b89f3
Configuration menu - View commit details
-
Copy full SHA for 4494a36 - Browse repository at this point
Copy the full SHA 4494a36View commit details -
Merge bitcoin-core/secp256k1#1345: field: Static-assert that int args…
… affecting magnitude are constant be8ff3a field: Static-assert that int args affecting magnitude are constant (Tim Ruffing) Pull request description: See #1001. Try to revert the lines in `tests.c` to see the error message in action. ACKs for top commit: sipa: ACK be8ff3a. Verified by introducing some non-constant expressions and seeing compilation fail. theStack: ACK be8ff3a Tree-SHA512: 8befec6ee64959cdc7f3e29b4b622410794cfaf69e9df8df17600390a93bc787dba5cf86239de6eb2e99c038b9aca5461e4b3c82f0e0c4cf066ad7c689941b19
Configuration menu - View commit details
-
Copy full SHA for 3aef6ab - Browse repository at this point
Copy the full SHA 3aef6abView commit details -
tests: refactor: remove duplicate function
random_field_element_test
There is a function `random_fe_test` which does exactly the same, so use that instead. Note that it's also moved up before the `random_group_element_test` function, in order to avoid needing a forward declaration.
Configuration menu - View commit details
-
Copy full SHA for 304421d - Browse repository at this point
Copy the full SHA 304421dView commit details -
tests: introduce helper for non-zero
random_fe_test
resultsThere are several instances in the tests where random non-zero field elements are generated by calling `random_fe_test` in a do/while-loop. This commit deduplicates all these by introducing a `random_fe_non_zero_test` helper. Note that some instances checked the is-zero condition via `secp256k1_fe_normalizes_to_zero_var`, which is unnecessary, as the result of `random_fe_test` is already normalized (so strictly speaking, this is not a pure refactor).
Configuration menu - View commit details
-
Copy full SHA for 5a95a26 - Browse repository at this point
Copy the full SHA 5a95a26View commit details -
Merge bitcoin-core/secp256k1#1358: tests: introduce helper for non-ze…
…ro `random_fe_test()` results 5a95a26 tests: introduce helper for non-zero `random_fe_test` results (Sebastian Falbesoner) 304421d tests: refactor: remove duplicate function `random_field_element_test` (Sebastian Falbesoner) Pull request description: There are several instances in the tests where random non-zero field elements are generated by calling `random_fe_test` in a do/while-loop with is-zero condition. This PR deduplicates all these by introducing a `random_fe_non_zero_test` helper. Note that some instances checked the is-zero condition via `secp256k1_fe_normalizes_to_zero_var`, which is unnecessary, as the result of `random_field_element_test` is already normalized (so strictly speaking, this is not a pure refactor, and there could be tiny run-time improvements, though I doubt that's measurable). Additionally, the first commit removes the function `random_field_element_test` as it is logically a duplicate of `random_fe_test`. ACKs for top commit: real-or-random: ACK 5a95a26 Tree-SHA512: 920404f38ebe8b84bfd52f3354dc17ae6a0fd6355f99b78c9aeb53bf21f7eca5fd4518edc8a422d84f430ae95864661b497de42a3ab7fa9c49515a1df2f1d466
Configuration menu - View commit details
-
Copy full SHA for 0fa84f8 - Browse repository at this point
Copy the full SHA 0fa84f8View commit details
Commits on Jun 28, 2023
-
Configuration menu - View commit details
-
Copy full SHA for a6ca76c - Browse repository at this point
Copy the full SHA a6ca76cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 5b9f37f - Browse repository at this point
Copy the full SHA 5b9f37fView commit details
Commits on Jul 1, 2023
-
ci: Drop manual checkout of merge commit
This is no longer necessary as of cirruslabs/cirrus-ci-docs#791 (comment) .
Configuration menu - View commit details
-
Copy full SHA for 98579e2 - Browse repository at this point
Copy the full SHA 98579e2View commit details
Commits on Jul 2, 2023
-
Merge bitcoin-core/secp256k1#1368: ci: Drop manual checkout of merge …
Configuration menu - View commit details
-
Copy full SHA for 249c81e - Browse repository at this point
Copy the full SHA 249c81eView commit details
Commits on Jul 3, 2023
-
ci: Print commit in Windows container
This change adds the same functionality to Windows containers that is already available in Linux containers.
Configuration menu - View commit details
-
Copy full SHA for a7bec34 - Browse repository at this point
Copy the full SHA a7bec34View commit details -
Merge bitcoin-core/secp256k1#1369: ci: Print commit in Windows container
a7bec34 ci: Print commit in Windows container (Hennadii Stepanov) Pull request description: This PR is a follow-up to bitcoin-core/secp256k1#1368 and adds the same functionality to Windows containers that is already available in Linux containers. See: bitcoin-core/secp256k1#1368 (comment). ACKs for top commit: real-or-random: ACK a7bec34 seems to work: https://cirrus-ci.com/task/4919320090771456?logs=git_show#L2 Tree-SHA512: 0998e0f7231e3057a7e358a27b34071c73ca556973da20494db84fc67f2a72ad2fe582e59647a425ee41e7d9103a0a22fb3cdf0ace6fe0aed1d21f2f75c8ec53
Configuration menu - View commit details
-
Copy full SHA for 7966aee - Browse repository at this point
Copy the full SHA 7966aeeView commit details -
build: Introduce
SECP256K1_STATIC
macro for Windows usersIt is a non-Libtool-specific way to explicitly specify the user's intention to consume a static `libseck256k1`. This change allows to get rid of MSVC linker warnings LNK4217 and LNK4286. Also, it makes possible to merge the `SECP256K1_API` and `SECP256K1_API_VAR` into one.
Configuration menu - View commit details
-
Copy full SHA for ae9db95 - Browse repository at this point
Copy the full SHA ae9db95View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9f1b190 - Browse repository at this point
Copy the full SHA 9f1b190View commit details -
build: Introduce
SECP256k1_DLL_EXPORT
macroThis change provides a way to build a shared library that is not tired to the Libtool-specific `DLL_EXPORT` macro.
Configuration menu - View commit details
-
Copy full SHA for 0196e8a - Browse repository at this point
Copy the full SHA 0196e8aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 020bf69 - Browse repository at this point
Copy the full SHA 020bf69View commit details -
Configuration menu - View commit details
-
Copy full SHA for c6cd2b1 - Browse repository at this point
Copy the full SHA c6cd2b1View commit details -
Merge bitcoin-core/secp256k1#1323: tweak_add: fix API doc for tweak=0
Configuration menu - View commit details
-
Copy full SHA for fb758fe - Browse repository at this point
Copy the full SHA fb758feView commit details -
Merge bitcoin-core/secp256k1#1364: Avoid
-Wmaybe-uninitialized
when…… compiling with `gcc -O1` 5b9f37f ci: Add `CFLAGS: -O1` to task matrix (Hennadii Stepanov) a6ca76c Avoid `-Wmaybe-uninitialized` when compiling with `gcc -O1` (Hennadii Stepanov) Pull request description: Fixes bitcoin-core/secp256k1#1361. CI tasks have been adjusted to catch similar issues in the future. ACKs for top commit: real-or-random: utACK 5b9f37f jonasnick: tACK 5b9f37f Tree-SHA512: 8aa5ec22ed88579ecd37681df68d64f8bab93cd14bdbf432a3af41cadc7ab3eba86c33c179db15bf3a3c798c33064bd845ebdedb02ee617ef634e98c596838c2
Configuration menu - View commit details
-
Copy full SHA for 3fc1de5 - Browse repository at this point
Copy the full SHA 3fc1de5View commit details -
group: remove unneeded normalize_weak in
secp256k1_gej_eq_x_var
By requiring that the input group element's X coordinate (`a->x`) has a magnitude of <= 31, the normalize_weak call and also the field element variable `r2` are not needed anymore and hence can be dropped.
Configuration menu - View commit details
-
Copy full SHA for 07c0e8b - Browse repository at this point
Copy the full SHA 07c0e8bView commit details -
restoring wycheproof files restoring wycheproof files2
Configuration menu - View commit details
-
Copy full SHA for b6b9834 - Browse repository at this point
Copy the full SHA b6b9834View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0aacf64 - Browse repository at this point
Copy the full SHA 0aacf64View commit details -
Merge bitcoin-core/secp256k1#1367: build: Improvements to symbol visi…
…bility logic on Windows (attempt 3) c6cd2b1 ci: Add task for static library on Windows + CMake (Hennadii Stepanov) 020bf69 build: Add extensive docs on visibility issues (Tim Ruffing) 0196e8a build: Introduce `SECP256k1_DLL_EXPORT` macro (Hennadii Stepanov) 9f1b190 refactor: Replace `SECP256K1_API_VAR` with `SECP256K1_API` (Hennadii Stepanov) ae9db95 build: Introduce `SECP256K1_STATIC` macro for Windows users (Hennadii Stepanov) Pull request description: Previous attempts: - bitcoin-core/secp256k1#1346 - bitcoin-core/secp256k1#1362 The result is as follows: 1. Simple, concise and extensively documented code. 2. Explicitly documented use cases with no ambiguities. 3. No workarounds for linker warnings. 4. Solves one item in bitcoin-core/secp256k1#1235. ACKs for top commit: real-or-random: utACK c6cd2b1 Tree-SHA512: d58694452d630aefbd047916033249891bc726b7475433aaaa7c3ea2a07ded8f185a598385b67c2ee3440ec5904ff9d9452c97b0961d84dcb2eb2cf46caa171e
Configuration menu - View commit details
-
Copy full SHA for 9e6d1b0 - Browse repository at this point
Copy the full SHA 9e6d1b0View commit details
Commits on Jul 4, 2023
-
Merge bitcoin-core/secp256k1#1344: group: save normalize_weak calls i…
…n `secp256k1_ge_is_valid_var`/`secp256k1_gej_eq_x_var` 07c0e8b group: remove unneeded normalize_weak in `secp256k1_gej_eq_x_var` (Sebastian Falbesoner) efa76c4 group: remove unneeded normalize_weak in `secp256k1_ge_is_valid_var` (Sebastian Falbesoner) Pull request description: This PR removes unneeded normalize_weak calls in two group element functions: * `secp256k1_ge_is_valid_var`: After calculating the right-hand side of the elliptic curve equation (x^3 + 7), the field element `x3` has a magnitude of 2 (1 as result of `secp256k1_fe_mul`, then increased by 1 due to `secp256k1_fe_add_int`). This is fine for `secp256k1_fe_equal_var`, as the second parameter only requires the magnitude to not exceed 31, and the normalize_weak call is hence not needed and can be dropped. Note that the interface description for `secp256k1_fe_equal` (which also applies to `secp256k1_fe_equal_var`) once stated that _both_ parameters need to have magnitude 1, but that was corrected in commit 7d7d43c. * `secp256k1_gej_eq_x_var`: By requiring that the input group element's X coordinate (`a->x`) has a magnitude of <= 31, the normalize_weak call and also the field element variable `r2` are not needed anymore and hence can be dropped. ACKs for top commit: sipa: utACK 07c0e8b jonasnick: ACK 07c0e8b Tree-SHA512: 9037e4af881ce7bf3347414d6da06b99e3d318733ba4f70e8b24d2320c2f26d022144e17bd6b95c1a4ef1be3825a4464e56ce2d2b3ae7bbced04257048832b7f
Configuration menu - View commit details
-
Copy full SHA for 332af31 - Browse repository at this point
Copy the full SHA 332af31View commit details
Commits on Jul 5, 2023
-
Configuration menu - View commit details
-
Copy full SHA for c7d900f - Browse repository at this point
Copy the full SHA c7d900fView commit details -
Add exhaustive test for ellswift (create+decode roundtrip)
Co-authored-by: Pieter Wuille <[email protected]> Co-authored-by: Tim Ruffing <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2792119 - Browse repository at this point
Copy the full SHA 2792119View commit details -
Merge bitcoin-core/secp256k1#1371: Add exhaustive tests for ellswift …
…(with create+decode roundtrip) 2792119 Add exhaustive test for ellswift (create+decode roundtrip) (Sebastian Falbesoner) Pull request description: This PR adds the basic structure for ellswift exhaustive tests. Right now only a `secp256k1_ellswift_create` + `secp256k1_ellswift_decode` indirect roundtrip (exhaustive loop scalar -> ellswift pubkey -> decoded pubkey -> decoded group element, compared with exhaustive precomputed group element) is included. The exhaustive tests passes locally with all currently supported orders (n=13 [default] and n=199). Note that for n=7, the test is skipped, as the used curve in this case is even-ordered and ellswift only supports odd-ordered curves. ACKs for top commit: sipa: utACK 2792119 real-or-random: utACK 2792119 Tree-SHA512: c51d3d99e9839793b3c15d75b9a29f01080db160ab8819973abd877288f9f0af972ea4264290220ab1cd035fdebcfac7767436aa39154d924ef0bf6a5733a55d
Configuration menu - View commit details
-
Copy full SHA for afd7eb4 - Browse repository at this point
Copy the full SHA afd7eb4View commit details
Commits on Jul 6, 2023
-
Merge bitcoin-core/secp256k1#1363: doc: minor ellswift.md updates
Configuration menu - View commit details
-
Copy full SHA for c9ebca9 - Browse repository at this point
Copy the full SHA c9ebca9View commit details -
field: Use
restrict
consistently in fe_sqrtThat is, use it also in the definition and not only the declaration. I believe this was the intention of commit be82bd8, but it was omitted there.
Configuration menu - View commit details
-
Copy full SHA for b79ba8a - Browse repository at this point
Copy the full SHA b79ba8aView commit details -
ci: Install development snapshots of gcc and clang
TODO: Make sure the Docker image is actually rebuild
Configuration menu - View commit details
-
Copy full SHA for 1deecaa - Browse repository at this point
Copy the full SHA 1deecaaView commit details -
Configuration menu - View commit details
-
Copy full SHA for 609093b - Browse repository at this point
Copy the full SHA 609093bView commit details -
Configuration menu - View commit details
-
Copy full SHA for e9e9648 - Browse repository at this point
Copy the full SHA e9e9648View commit details -
Configuration menu - View commit details
-
Copy full SHA for 981e5be - Browse repository at this point
Copy the full SHA 981e5beView commit details
Commits on Jul 10, 2023
-
clean up in-comment Sage code (refer to secp256k1_params.sage, update…
… to Python3) Some of the C source files contain contain in-comment Sage code calculating secp256k1 parameters that are already defined in the file secp256k1_params.sage. Replace that by a corresponding load instruction and access the necessary variables. In ecdsa_impl.h, update the comment to use a one-line shell command calling sage to get the values. The remaining code (test `test_add_neg_y_diff_x` in tests.c) is updated to work with a current version based on Python3 (Sage 9.0+, see https://wiki.sagemath.org/Python3-Switch). The latter can be seen as a small follow-up to PR #849 (commit 13c88ef).
Configuration menu - View commit details
-
Copy full SHA for 600c5ad - Browse repository at this point
Copy the full SHA 600c5adView commit details -
Merge bitcoin-core/secp256k1#1340: clean up in-comment Sage code (ref…
…er to secp256k1_params.sage, update to Python3) 600c5ad clean up in-comment Sage code (refer to secp256k1_params.sage, update to Python3) (Sebastian Falbesoner) Pull request description: Some of the C source files contain contain in-comment Sage code calculating secp256k1 parameters that are already defined in the file secp256k1_params.sage. Replace that by a corresponding load instruction and access the necessary variables. In ecdsa_impl.h, update the comment to use a one-line shell command calling sage to get the values. The remaining code (test `test_add_neg_y_diff_x` in tests.c) is updated to work with a current version based on Python3 (Sage 9.0+, see https://wiki.sagemath.org/Python3-Switch). The latter can be seen as a small follow-up to PR #849 (commit 13c88ef). ACKs for top commit: sipa: ACK 600c5ad real-or-random: ACK 600c5ad Tree-SHA512: a9e52f6afbce65edd9ab14203612c3d423639f450fe8f0d269a3dda04bebefa95b607f7aa0faec864cb78b46d49f281632bb1277118749b7d8613e9f5dcc8f3d
Configuration menu - View commit details
-
Copy full SHA for cc55757 - Browse repository at this point
Copy the full SHA cc55757View commit details
Commits on Jul 11, 2023
-
Merge bitcoin-core/secp256k1#1366: field: Use
restrict
consistently…… in fe_sqrt b79ba8a field: Use `restrict` consistently in fe_sqrt (Tim Ruffing) Pull request description: That is, use it also in the definition and not only the declaration. I believe this was the intention of commit bitcoin-core/secp256k1@be82bd8, but it was omitted there. edit: Changed the description. I'm not entirely sure but after looking at the standard, I tend to think this is more than a cosmetic change, and only this change actually makes the parameters `restrict`. Anyway, I believe making them `restrict` was simply forgotten in be82bd8. ACKs for top commit: sipa: utACK b79ba8a Tree-SHA512: eecec7674d8cef7833d50f4041b87241ca8de4839aa8027df1c422b89f5a1bcef3916ac785057a596c459ce1aa9d41e5a21ecb6fed9c5d15a1d9f588c7ee208e
Configuration menu - View commit details
-
Copy full SHA for 0f7657d - Browse repository at this point
Copy the full SHA 0f7657dView commit details
Commits on Jul 13, 2023
-
Merge bitcoin-core/secp256k1#1313: ci: Test on development snapshots …
…of GCC and Clang 981e5be ci: Fix typo in comment (Tim Ruffing) e9e9648 ci: Reduce number of macOS tasks from 28 to 8 (Tim Ruffing) 609093b ci: Add x86_64 Linux tasks for gcc and clang snapshots (Tim Ruffing) 1deecaa ci: Install development snapshots of gcc and clang (Tim Ruffing) Pull request description: ACKs for top commit: hebasto: re-ACK 981e5be jonasnick: ACK 981e5be Tree-SHA512: a36ef6f3c30a7f6e09e186e67b8eeb6e16e05de3bd97f21342866e75e33275103d463b6a12603ce235da7e26e4acdef4d811f62f369f18db9ac4e7ff06749136
Configuration menu - View commit details
-
Copy full SHA for 907a672 - Browse repository at this point
Copy the full SHA 907a672View commit details
Commits on Jul 17, 2023
-
ellswift: fix probabilistic test failure when swapping sides
When configured with `--disable-module-ecdh --enable-module-recovery`, then `./tests 64 81af32fd7ab8c9cbc2e62a689f642106` fails with ``` src/modules/ellswift/tests_impl.h:396: test condition failed: secp256k1_memcmp_var(share32_bad, share32a, 32) != 0 ``` This tests verifies that changing the `party` bit of the `secp256k1_ellswift_xdh` function results in a different share. However, that's not the case when the secret keys of both parties are the same and this is actually what happens in the observed test failure. The keys can be equal in this test case because they are created by the `random_scalar_order_test` function whose output is not uniformly random (it's biased towards 0). This commit restores the assummption that the secret keys differ.
Configuration menu - View commit details
-
Copy full SHA for c424e2f - Browse repository at this point
Copy the full SHA c424e2fView commit details -
Merge bitcoin-core/secp256k1#1378: ellswift: fix probabilistic test f…
…ailure when swapping sides c424e2f ellswift: fix probabilistic test failure when swapping sides (Jonas Nick) Pull request description: Reported by jonatack in bitcoin/bitcoin#28079. When configured with `--disable-module-ecdh --enable-module-recovery`, then `./tests 64 81af32fd7ab8c9cbc2e62a689f642106` fails with ``` src/modules/ellswift/tests_impl.h:396: test condition failed: secp256k1_memcmp_var(share32_bad, share32a, 32) != 0 ``` This tests verifies that changing the `party` bit of the `secp256k1_ellswift_xdh` function results in a different share. However, that's not the case when the secret keys of both parties are the same and this is actually what happens in the observed test failure. The keys can be equal in this test case because they are created by the `random_scalar_order_test` function whose output is not uniformly random (it's biased towards 0). This commit restores the assumption that the secret keys differ. ACKs for top commit: sipa: utACK c424e2f real-or-random: utACK c424e2f Tree-SHA512: d1ab61473a77478f9aeffb21ad73e0bba478c90d8573c72ec89d2e0140434cc65c9d5f4d56e5f259931dc68fc1800695c6cd5d63d9cfce4c1c4d6744eeaa2028
Configuration menu - View commit details
-
Copy full SHA for b40e2d3 - Browse repository at this point
Copy the full SHA b40e2d3View commit details
Commits on Jul 18, 2023
-
Merge bitcoin-core/secp256k1#1298: Remove randomness tests
6ec3731 Simplify test PRNG implementation (Pieter Wuille) fb5bfa4 Add static test vector for Xoshiro256++ (Tim Ruffing) 723e8ca Remove randomness tests (Pieter Wuille) Pull request description: ACKs for top commit: real-or-random: utACK 6ec3731 jonasnick: ACK 6ec3731 Tree-SHA512: 4cbbb9c42e31f067b17dd9169ae5d5e68bce77d1253452db9df523d3be2b5d61002d5a4203e5a153f257ec63c5ff2113555743eeb402d4b6c573069ea494d407
Configuration menu - View commit details
-
Copy full SHA for c545fdc - Browse repository at this point
Copy the full SHA c545fdcView commit details
Commits on Jul 24, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 4f8c5bd - Browse repository at this point
Copy the full SHA 4f8c5bdView commit details -
Merge bitcoin-core/secp256k1#1382: refactor: Drop unused cast
Configuration menu - View commit details
-
Copy full SHA for 2bd5f3e - Browse repository at this point
Copy the full SHA 2bd5f3eView commit details
Commits on Jul 25, 2023
-
Configuration menu - View commit details
-
Copy full SHA for b097a46 - Browse repository at this point
Copy the full SHA b097a46View commit details
Commits on Jul 26, 2023
-
Merge bitcoin-core/secp256k1#1383: util: remove unused checked_realloc
b097a46 util: remove unused checked_realloc (Cory Fields) Pull request description: Usage was removed in 6fe5043 . This should be a NOOP. Noticed when analyzing for zenbleed exposure: stdlib calls that aren't optimized away. In this case realloc isn't making it into the final binary, but as far as I can tell this is completely dead code and should be dropped. ACKs for top commit: jonasnick: ACK b097a46 real-or-random: ACK b097a46 Tree-SHA512: d4249215eddd4035be2b50a8bb48b8a681abdab4ab41ca53f6c2a2507edfbc9ffa39ba22eb48e7da52f978e224198294495ce64f9d571d98c19283b20b82a63a
Configuration menu - View commit details
-
Copy full SHA for 0e00fc7 - Browse repository at this point
Copy the full SHA 0e00fc7View commit details -
build: enable ellswift module via SECP_CONFIG_DEFINES
...like the other modules.
Configuration menu - View commit details
-
Copy full SHA for 78ca880 - Browse repository at this point
Copy the full SHA 78ca880View commit details
Commits on Jul 27, 2023
-
Merge bitcoin-core/secp256k1#1384: build: enable ellswift module via …
…SECP_CONFIG_DEFINES 78ca880 build: enable ellswift module via SECP_CONFIG_DEFINES (Jonas Nick) Pull request description: ...like the other modules. ACKs for top commit: sipa: utACK 78ca880 real-or-random: utACK 78ca880 Tree-SHA512: c157a1ed912b9aa1a318aa0a70859a3ac67cb22303993f08ff00ed601e6ac197380dd503d3b361cbc4e698fc6489b5283b782f570f2703809d23668f3ebe5ba6
Configuration menu - View commit details
-
Copy full SHA for c734c64 - Browse repository at this point
Copy the full SHA c734c64View commit details -
Configuration menu - View commit details
-
Copy full SHA for 4692478 - Browse repository at this point
Copy the full SHA 4692478View commit details -
Merge bitcoin-core/secp256k1#1386: ci: print $ELLSWIFT in cirrus.sh
Configuration menu - View commit details
-
Copy full SHA for 26392da - Browse repository at this point
Copy the full SHA 26392daView commit details -
Merge commits '4494a369 3aef6ab 0fa84f8 249c81e 7966aee fb758fe 3fc1de5
Configuration menu - View commit details
-
Copy full SHA for 8018708 - Browse repository at this point
Copy the full SHA 8018708View commit details
Commits on Jul 28, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 9e96a2e - Browse repository at this point
Copy the full SHA 9e96a2eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 54b37db - Browse repository at this point
Copy the full SHA 54b37dbView commit details -
bppp: Fix test for invalid sign byte
The test is supposed to create an invalid sign byte. Before this PR, the generated sign byte could in fact be valid due to an overflow. Co-authored-by: Jonas Nick <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 82777bb - Browse repository at this point
Copy the full SHA 82777bbView commit details