Skip to content

Commit b161bff

Browse files
Merge bitcoin-core#1579: Clear sensitive memory without getting optimized out (revival of bitcoin-core#636)
765ef53 Clear _gej instances after point multiplication to avoid potential leaks (Sebastian Falbesoner) 349e6ab Introduce separate _clear functions for hash module (Tim Ruffing) 99cc9fd Don't rely on memset to set signed integers to 0 (Tim Ruffing) 97c57f4 Implement various _clear() functions with secp256k1_memclear() (Tim Ruffing) 9bb368d Use secp256k1_memclear() to clear stack memory instead of memset() (Tim Ruffing) e3497bb Separate between clearing memory and setting to zero in tests (Tim Ruffing) d79a6cc Separate secp256k1_fe_set_int( . , 0 ) from secp256k1_fe_clear() (Tim Ruffing) 1c08126 Add secp256k1_memclear() for clearing secret data (Tim Ruffing) e7d3844 Don't clear secrets in pippenger implementation (Tim Ruffing) Pull request description: This PR picks up bitcoin-core#636 (which in turn picked up bitcoin-core#448, so this is take number three) and is essentially a rebase on master. Some changes to the original PR: * the clearing function now has the `secp256k1_` prefix again, since the related helper `_memczero` got it as well (see PR bitcoin-core#835 / commit e89278f) * the original commit b17a7df ("Make _set_fe_int( . , 0 ) set magnitude to 0") is not needed anymore, since it was already applied in PR bitcoin-core#943 (commit d49011f) * clearing of stack memory with `secp256k1_memclear` is now also done on modules that have been newly introduced since then, i.e. schnorr and ellswift (of course, there is still no guarantee that all places where clearing is necessary are covered) So far I haven't looked at any disassembly and possible performance implications yet (there were some concerns expressed in bitcoin-core#636 (comment)), happy to go deeper there if this gets Concept ACKed. The proposed method of using a memory barrier to prevent optimizating away the memset is still used in BoringSSL (where it was originally picked up from) and in the Linux Kernel, see e.g. https://github.com/google/boringssl/blob/5af122c3dfc163b5d1859f1f450756e8e320a142/crypto/mem.c#L335 and https://github.com/torvalds/linux/blob/d4560686726f7a357922f300fc81f5964be8df04/include/linux/string.h#L348 / https://github.com/torvalds/linux/blob/d4560686726f7a357922f300fc81f5964be8df04/include/linux/compiler.h#L102 Fixes bitcoin-core#185. ACKs for top commit: sipa: reACK 765ef53 real-or-random: ACK 765ef53 Tree-SHA512: 5a034d5ad14178c06928022459f3d4f0877d06f576b24ab07b86b3608b0b3e9273217b8309a1db606f024f3032731f13013114b1e0828964b578814d1efb2959
2 parents a38d879 + 765ef53 commit b161bff

22 files changed

+108
-109
lines changed

src/bench_ecmult.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ static void bench_ecmult_teardown_helper(bench_data* data, size_t* seckey_offset
7171
secp256k1_scalar sum_scalars;
7272

7373
secp256k1_gej_set_infinity(&sum_output);
74-
secp256k1_scalar_clear(&sum_scalars);
74+
secp256k1_scalar_set_int(&sum_scalars, 0);
7575
for (i = 0; i < iters; ++i) {
7676
secp256k1_gej_add_var(&sum_output, &sum_output, &data->output[i], NULL);
7777
if (scalar_gen_offset != NULL) {

src/ecmult_gen_impl.h

+5-4
Original file line numberDiff line numberDiff line change
@@ -277,8 +277,8 @@ static void secp256k1_ecmult_gen(const secp256k1_ecmult_gen_context *ctx, secp25
277277
/* Cleanup. */
278278
secp256k1_fe_clear(&neg);
279279
secp256k1_ge_clear(&add);
280-
memset(&adds, 0, sizeof(adds));
281-
memset(&recoded, 0, sizeof(recoded));
280+
secp256k1_memclear(&adds, sizeof(adds));
281+
secp256k1_memclear(&recoded, sizeof(recoded));
282282
}
283283

284284
/* Setup blinding values for secp256k1_ecmult_gen. */
@@ -310,7 +310,7 @@ static void secp256k1_ecmult_gen_blind(secp256k1_ecmult_gen_context *ctx, const
310310
VERIFY_CHECK(seed32 != NULL);
311311
memcpy(keydata + 32, seed32, 32);
312312
secp256k1_rfc6979_hmac_sha256_initialize(&rng, keydata, 64);
313-
memset(keydata, 0, sizeof(keydata));
313+
secp256k1_memclear(keydata, sizeof(keydata));
314314

315315
/* Compute projective blinding factor (cannot be 0). */
316316
secp256k1_rfc6979_hmac_sha256_generate(&rng, nonce32, 32);
@@ -325,16 +325,17 @@ static void secp256k1_ecmult_gen_blind(secp256k1_ecmult_gen_context *ctx, const
325325
* which secp256k1_gej_add_ge cannot handle. */
326326
secp256k1_scalar_cmov(&b, &secp256k1_scalar_one, secp256k1_scalar_is_zero(&b));
327327
secp256k1_rfc6979_hmac_sha256_finalize(&rng);
328-
memset(nonce32, 0, 32);
329328
secp256k1_ecmult_gen(ctx, &gb, &b);
330329
secp256k1_scalar_negate(&b, &b);
331330
secp256k1_scalar_add(&ctx->scalar_offset, &b, &diff);
332331
secp256k1_ge_set_gej(&ctx->ge_offset, &gb);
333332

334333
/* Clean up. */
334+
secp256k1_memclear(nonce32, sizeof(nonce32));
335335
secp256k1_scalar_clear(&b);
336336
secp256k1_gej_clear(&gb);
337337
secp256k1_fe_clear(&f);
338+
secp256k1_rfc6979_hmac_sha256_clear(&rng);
338339
}
339340

340341
#endif /* SECP256K1_ECMULT_GEN_IMPL_H */

src/ecmult_impl.h

+4-14
Original file line numberDiff line numberDiff line change
@@ -171,14 +171,17 @@ static int secp256k1_ecmult_wnaf(int *wnaf, int len, const secp256k1_scalar *a,
171171
VERIFY_CHECK(a != NULL);
172172
VERIFY_CHECK(2 <= w && w <= 31);
173173

174-
memset(wnaf, 0, len * sizeof(wnaf[0]));
174+
for (bit = 0; bit < len; bit++) {
175+
wnaf[bit] = 0;
176+
}
175177

176178
s = *a;
177179
if (secp256k1_scalar_get_bits_limb32(&s, 255, 1)) {
178180
secp256k1_scalar_negate(&s, &s);
179181
sign = -1;
180182
}
181183

184+
bit = 0;
182185
while (bit < len) {
183186
int now;
184187
int word;
@@ -660,7 +663,6 @@ static int secp256k1_ecmult_pippenger_batch(const secp256k1_callback* error_call
660663
struct secp256k1_pippenger_state *state_space;
661664
size_t idx = 0;
662665
size_t point_idx = 0;
663-
int i, j;
664666
int bucket_window;
665667

666668
secp256k1_gej_set_infinity(r);
@@ -708,18 +710,6 @@ static int secp256k1_ecmult_pippenger_batch(const secp256k1_callback* error_call
708710
}
709711

710712
secp256k1_ecmult_pippenger_wnaf(buckets, bucket_window, state_space, r, scalars, points, idx);
711-
712-
/* Clear data */
713-
for(i = 0; (size_t)i < idx; i++) {
714-
secp256k1_scalar_clear(&scalars[i]);
715-
state_space->ps[i].skew_na = 0;
716-
for(j = 0; j < WNAF_SIZE(bucket_window+1); j++) {
717-
state_space->wnaf_na[i * WNAF_SIZE(bucket_window+1) + j] = 0;
718-
}
719-
}
720-
for(i = 0; i < 1<<bucket_window; i++) {
721-
secp256k1_gej_clear(&buckets[i]);
722-
}
723713
secp256k1_scratch_apply_checkpoint(error_callback, scratch, scratch_checkpoint);
724714
return 1;
725715
}

src/field.h

+1-6
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,6 @@ static const secp256k1_fe secp256k1_const_beta = SECP256K1_FE_CONST(
8181
# define secp256k1_fe_normalizes_to_zero secp256k1_fe_impl_normalizes_to_zero
8282
# define secp256k1_fe_normalizes_to_zero_var secp256k1_fe_impl_normalizes_to_zero_var
8383
# define secp256k1_fe_set_int secp256k1_fe_impl_set_int
84-
# define secp256k1_fe_clear secp256k1_fe_impl_clear
8584
# define secp256k1_fe_is_zero secp256k1_fe_impl_is_zero
8685
# define secp256k1_fe_is_odd secp256k1_fe_impl_is_odd
8786
# define secp256k1_fe_cmp_var secp256k1_fe_impl_cmp_var
@@ -144,11 +143,7 @@ static int secp256k1_fe_normalizes_to_zero_var(const secp256k1_fe *r);
144143
*/
145144
static void secp256k1_fe_set_int(secp256k1_fe *r, int a);
146145

147-
/** Set a field element to 0.
148-
*
149-
* On input, a does not need to be initialized.
150-
* On output, a represents 0, is normalized and has magnitude 0.
151-
*/
146+
/** Clear a field element to prevent leaking sensitive information. */
152147
static void secp256k1_fe_clear(secp256k1_fe *a);
153148

154149
/** Determine whether a represents field element 0.

src/field_10x26_impl.h

-7
Original file line numberDiff line numberDiff line change
@@ -270,13 +270,6 @@ SECP256K1_INLINE static int secp256k1_fe_impl_is_odd(const secp256k1_fe *a) {
270270
return a->n[0] & 1;
271271
}
272272

273-
SECP256K1_INLINE static void secp256k1_fe_impl_clear(secp256k1_fe *a) {
274-
int i;
275-
for (i=0; i<10; i++) {
276-
a->n[i] = 0;
277-
}
278-
}
279-
280273
static int secp256k1_fe_impl_cmp_var(const secp256k1_fe *a, const secp256k1_fe *b) {
281274
int i;
282275
for (i = 9; i >= 0; i--) {

src/field_5x52_impl.h

-7
Original file line numberDiff line numberDiff line change
@@ -212,13 +212,6 @@ SECP256K1_INLINE static int secp256k1_fe_impl_is_odd(const secp256k1_fe *a) {
212212
return a->n[0] & 1;
213213
}
214214

215-
SECP256K1_INLINE static void secp256k1_fe_impl_clear(secp256k1_fe *a) {
216-
int i;
217-
for (i=0; i<5; i++) {
218-
a->n[i] = 0;
219-
}
220-
}
221-
222215
static int secp256k1_fe_impl_cmp_var(const secp256k1_fe *a, const secp256k1_fe *b) {
223216
int i;
224217
for (i = 4; i >= 0; i--) {

src/field_impl.h

+4-9
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@
1818
#error "Please select wide multiplication implementation"
1919
#endif
2020

21+
SECP256K1_INLINE static void secp256k1_fe_clear(secp256k1_fe *a) {
22+
secp256k1_memclear(a, sizeof(secp256k1_fe));
23+
}
24+
2125
SECP256K1_INLINE static int secp256k1_fe_equal(const secp256k1_fe *a, const secp256k1_fe *b) {
2226
secp256k1_fe na;
2327
SECP256K1_FE_VERIFY(a);
@@ -232,15 +236,6 @@ SECP256K1_INLINE static void secp256k1_fe_add_int(secp256k1_fe *r, int a) {
232236
SECP256K1_FE_VERIFY(r);
233237
}
234238

235-
static void secp256k1_fe_impl_clear(secp256k1_fe *a);
236-
SECP256K1_INLINE static void secp256k1_fe_clear(secp256k1_fe *a) {
237-
a->magnitude = 0;
238-
a->normalized = 1;
239-
secp256k1_fe_impl_clear(a);
240-
241-
SECP256K1_FE_VERIFY(a);
242-
}
243-
244239
static int secp256k1_fe_impl_is_zero(const secp256k1_fe *a);
245240
SECP256K1_INLINE static int secp256k1_fe_is_zero(const secp256k1_fe *a) {
246241
SECP256K1_FE_VERIFY(a);

src/group_impl.h

+7-16
Original file line numberDiff line numberDiff line change
@@ -283,36 +283,27 @@ static void secp256k1_ge_table_set_globalz(size_t len, secp256k1_ge *a, const se
283283

284284
static void secp256k1_gej_set_infinity(secp256k1_gej *r) {
285285
r->infinity = 1;
286-
secp256k1_fe_clear(&r->x);
287-
secp256k1_fe_clear(&r->y);
288-
secp256k1_fe_clear(&r->z);
286+
secp256k1_fe_set_int(&r->x, 0);
287+
secp256k1_fe_set_int(&r->y, 0);
288+
secp256k1_fe_set_int(&r->z, 0);
289289

290290
SECP256K1_GEJ_VERIFY(r);
291291
}
292292

293293
static void secp256k1_ge_set_infinity(secp256k1_ge *r) {
294294
r->infinity = 1;
295-
secp256k1_fe_clear(&r->x);
296-
secp256k1_fe_clear(&r->y);
295+
secp256k1_fe_set_int(&r->x, 0);
296+
secp256k1_fe_set_int(&r->y, 0);
297297

298298
SECP256K1_GE_VERIFY(r);
299299
}
300300

301301
static void secp256k1_gej_clear(secp256k1_gej *r) {
302-
r->infinity = 0;
303-
secp256k1_fe_clear(&r->x);
304-
secp256k1_fe_clear(&r->y);
305-
secp256k1_fe_clear(&r->z);
306-
307-
SECP256K1_GEJ_VERIFY(r);
302+
secp256k1_memclear(r, sizeof(secp256k1_gej));
308303
}
309304

310305
static void secp256k1_ge_clear(secp256k1_ge *r) {
311-
r->infinity = 0;
312-
secp256k1_fe_clear(&r->x);
313-
secp256k1_fe_clear(&r->y);
314-
315-
SECP256K1_GE_VERIFY(r);
306+
secp256k1_memclear(r, sizeof(secp256k1_ge));
316307
}
317308

318309
static int secp256k1_ge_set_xo_var(secp256k1_ge *r, const secp256k1_fe *x, int odd) {

src/hash.h

+3
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ typedef struct {
1919
static void secp256k1_sha256_initialize(secp256k1_sha256 *hash);
2020
static void secp256k1_sha256_write(secp256k1_sha256 *hash, const unsigned char *data, size_t size);
2121
static void secp256k1_sha256_finalize(secp256k1_sha256 *hash, unsigned char *out32);
22+
static void secp256k1_sha256_clear(secp256k1_sha256 *hash);
2223

2324
typedef struct {
2425
secp256k1_sha256 inner, outer;
@@ -27,6 +28,7 @@ typedef struct {
2728
static void secp256k1_hmac_sha256_initialize(secp256k1_hmac_sha256 *hash, const unsigned char *key, size_t size);
2829
static void secp256k1_hmac_sha256_write(secp256k1_hmac_sha256 *hash, const unsigned char *data, size_t size);
2930
static void secp256k1_hmac_sha256_finalize(secp256k1_hmac_sha256 *hash, unsigned char *out32);
31+
static void secp256k1_hmac_sha256_clear(secp256k1_hmac_sha256 *hash);
3032

3133
typedef struct {
3234
unsigned char v[32];
@@ -37,5 +39,6 @@ typedef struct {
3739
static void secp256k1_rfc6979_hmac_sha256_initialize(secp256k1_rfc6979_hmac_sha256 *rng, const unsigned char *key, size_t keylen);
3840
static void secp256k1_rfc6979_hmac_sha256_generate(secp256k1_rfc6979_hmac_sha256 *rng, unsigned char *out, size_t outlen);
3941
static void secp256k1_rfc6979_hmac_sha256_finalize(secp256k1_rfc6979_hmac_sha256 *rng);
42+
static void secp256k1_rfc6979_hmac_sha256_clear(secp256k1_rfc6979_hmac_sha256 *rng);
4043

4144
#endif /* SECP256K1_HASH_H */

src/hash_impl.h

+14-5
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,10 @@ static void secp256k1_sha256_initialize_tagged(secp256k1_sha256 *hash, const uns
171171
secp256k1_sha256_write(hash, buf, 32);
172172
}
173173

174+
static void secp256k1_sha256_clear(secp256k1_sha256 *hash) {
175+
secp256k1_memclear(hash, sizeof(*hash));
176+
}
177+
174178
static void secp256k1_hmac_sha256_initialize(secp256k1_hmac_sha256 *hash, const unsigned char *key, size_t keylen) {
175179
size_t n;
176180
unsigned char rkey[64];
@@ -196,7 +200,7 @@ static void secp256k1_hmac_sha256_initialize(secp256k1_hmac_sha256 *hash, const
196200
rkey[n] ^= 0x5c ^ 0x36;
197201
}
198202
secp256k1_sha256_write(&hash->inner, rkey, sizeof(rkey));
199-
memset(rkey, 0, sizeof(rkey));
203+
secp256k1_memclear(rkey, sizeof(rkey));
200204
}
201205

202206
static void secp256k1_hmac_sha256_write(secp256k1_hmac_sha256 *hash, const unsigned char *data, size_t size) {
@@ -207,10 +211,13 @@ static void secp256k1_hmac_sha256_finalize(secp256k1_hmac_sha256 *hash, unsigned
207211
unsigned char temp[32];
208212
secp256k1_sha256_finalize(&hash->inner, temp);
209213
secp256k1_sha256_write(&hash->outer, temp, 32);
210-
memset(temp, 0, 32);
214+
secp256k1_memclear(temp, sizeof(temp));
211215
secp256k1_sha256_finalize(&hash->outer, out32);
212216
}
213217

218+
static void secp256k1_hmac_sha256_clear(secp256k1_hmac_sha256 *hash) {
219+
secp256k1_memclear(hash, sizeof(*hash));
220+
}
214221

215222
static void secp256k1_rfc6979_hmac_sha256_initialize(secp256k1_rfc6979_hmac_sha256 *rng, const unsigned char *key, size_t keylen) {
216223
secp256k1_hmac_sha256 hmac;
@@ -274,9 +281,11 @@ static void secp256k1_rfc6979_hmac_sha256_generate(secp256k1_rfc6979_hmac_sha256
274281
}
275282

276283
static void secp256k1_rfc6979_hmac_sha256_finalize(secp256k1_rfc6979_hmac_sha256 *rng) {
277-
memset(rng->k, 0, 32);
278-
memset(rng->v, 0, 32);
279-
rng->retry = 0;
284+
(void) rng;
285+
}
286+
287+
static void secp256k1_rfc6979_hmac_sha256_clear(secp256k1_rfc6979_hmac_sha256 *rng) {
288+
secp256k1_memclear(rng, sizeof(*rng));
280289
}
281290

282291
#undef Round

src/modules/ecdh/main_impl.h

+5-2
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ static int ecdh_hash_function_sha256(unsigned char *output, const unsigned char
1919
secp256k1_sha256_write(&sha, &version, 1);
2020
secp256k1_sha256_write(&sha, x32, 32);
2121
secp256k1_sha256_finalize(&sha, output);
22+
secp256k1_sha256_clear(&sha);
2223

2324
return 1;
2425
}
@@ -61,9 +62,11 @@ int secp256k1_ecdh(const secp256k1_context* ctx, unsigned char *output, const se
6162

6263
ret = hashfp(output, x, y, data);
6364

64-
memset(x, 0, 32);
65-
memset(y, 0, 32);
65+
secp256k1_memclear(x, sizeof(x));
66+
secp256k1_memclear(y, sizeof(y));
6667
secp256k1_scalar_clear(&s);
68+
secp256k1_ge_clear(&pt);
69+
secp256k1_gej_clear(&res);
6770

6871
return !!ret & !overflow;
6972
}

src/modules/ellswift/main_impl.h

+3-1
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,7 @@ static int ellswift_xdh_hash_function_prefix(unsigned char *output, const unsign
510510
secp256k1_sha256_write(&sha, ell_b64, 64);
511511
secp256k1_sha256_write(&sha, x32, 32);
512512
secp256k1_sha256_finalize(&sha, output);
513+
secp256k1_sha256_clear(&sha);
513514

514515
return 1;
515516
}
@@ -539,6 +540,7 @@ static int ellswift_xdh_hash_function_bip324(unsigned char* output, const unsign
539540
secp256k1_sha256_write(&sha, ell_b64, 64);
540541
secp256k1_sha256_write(&sha, x32, 32);
541542
secp256k1_sha256_finalize(&sha, output);
543+
secp256k1_sha256_clear(&sha);
542544

543545
return 1;
544546
}
@@ -580,7 +582,7 @@ int secp256k1_ellswift_xdh(const secp256k1_context *ctx, unsigned char *output,
580582
/* Invoke hasher */
581583
ret = hashfp(output, sx, ell_a64, ell_b64, data);
582584

583-
memset(sx, 0, 32);
585+
secp256k1_memclear(sx, sizeof(sx));
584586
secp256k1_fe_clear(&px);
585587
secp256k1_scalar_clear(&s);
586588

src/modules/musig/session_impl.h

+6-5
Original file line numberDiff line numberDiff line change
@@ -385,11 +385,11 @@ static void secp256k1_nonce_function_musig(secp256k1_scalar *k, const unsigned c
385385
secp256k1_scalar_set_b32(&k[i], buf, NULL);
386386

387387
/* Attempt to erase secret data */
388-
memset(buf, 0, sizeof(buf));
389-
memset(&sha_tmp, 0, sizeof(sha_tmp));
388+
secp256k1_memclear(buf, sizeof(buf));
389+
secp256k1_sha256_clear(&sha_tmp);
390390
}
391-
memset(rand, 0, sizeof(rand));
392-
memset(&sha, 0, sizeof(sha));
391+
secp256k1_memclear(rand, sizeof(rand));
392+
secp256k1_sha256_clear(&sha);
393393
}
394394

395395
int secp256k1_musig_nonce_gen_internal(const secp256k1_context* ctx, secp256k1_musig_secnonce *secnonce, secp256k1_musig_pubnonce *pubnonce, const unsigned char *input_nonce, const unsigned char *seckey, const secp256k1_pubkey *pubkey, const unsigned char *msg32, const secp256k1_musig_keyagg_cache *keyagg_cache, const unsigned char *extra_input32) {
@@ -450,6 +450,7 @@ int secp256k1_musig_nonce_gen_internal(const secp256k1_context* ctx, secp256k1_m
450450
secp256k1_ge_set_gej(&nonce_pts[i], &nonce_ptj);
451451
secp256k1_declassify(ctx, &nonce_pts[i], sizeof(nonce_pts[i]));
452452
secp256k1_scalar_clear(&k[i]);
453+
secp256k1_gej_clear(&nonce_ptj);
453454
}
454455
/* None of the nonce_pts will be infinity because k != 0 with overwhelming
455456
* probability */
@@ -509,7 +510,7 @@ int secp256k1_musig_nonce_gen_counter(const secp256k1_context* ctx, secp256k1_mu
509510
if (!secp256k1_musig_nonce_gen_internal(ctx, secnonce, pubnonce, buf, seckey, &pubkey, msg32, keyagg_cache, extra_input32)) {
510511
return 0;
511512
}
512-
memset(seckey, 0, sizeof(seckey));
513+
secp256k1_memclear(seckey, sizeof(seckey));
513514
return 1;
514515
}
515516

src/modules/schnorrsig/main_impl.h

+3-1
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ static int nonce_function_bip340(unsigned char *nonce32, const unsigned char *ms
9393
secp256k1_sha256_write(&sha, xonly_pk32, 32);
9494
secp256k1_sha256_write(&sha, msg, msglen);
9595
secp256k1_sha256_finalize(&sha, nonce32);
96+
secp256k1_sha256_clear(&sha);
9697
return 1;
9798
}
9899

@@ -187,7 +188,8 @@ static int secp256k1_schnorrsig_sign_internal(const secp256k1_context* ctx, unsi
187188
secp256k1_memczero(sig64, 64, !ret);
188189
secp256k1_scalar_clear(&k);
189190
secp256k1_scalar_clear(&sk);
190-
memset(seckey, 0, sizeof(seckey));
191+
secp256k1_memclear(seckey, sizeof(seckey));
192+
secp256k1_gej_clear(&rj);
191193

192194
return ret;
193195
}

src/scalar_4x64_impl.h

-7
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,6 @@
2929
#define SECP256K1_N_H_2 ((uint64_t)0xFFFFFFFFFFFFFFFFULL)
3030
#define SECP256K1_N_H_3 ((uint64_t)0x7FFFFFFFFFFFFFFFULL)
3131

32-
SECP256K1_INLINE static void secp256k1_scalar_clear(secp256k1_scalar *r) {
33-
r->d[0] = 0;
34-
r->d[1] = 0;
35-
r->d[2] = 0;
36-
r->d[3] = 0;
37-
}
38-
3932
SECP256K1_INLINE static void secp256k1_scalar_set_int(secp256k1_scalar *r, unsigned int v) {
4033
r->d[0] = v;
4134
r->d[1] = 0;

0 commit comments

Comments
 (0)