dash-docs/en/doxygen/html/secp256k1_8h.html

1496 lines
114 KiB
HTML

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.14"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Dash Core: src/secp256k1/include/secp256k1.h File Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="navtree.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="resize.js"></script>
<script type="text/javascript" src="navtreedata.js"></script>
<script type="text/javascript" src="navtree.js"></script>
<script type="text/javascript">
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */
$(document).ready(initResizable);
/* @license-end */</script>
<link href="search/search.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="search/searchdata.js"></script>
<script type="text/javascript" src="search/search.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 56px;">
<td id="projectlogo"><img alt="Logo" src="bitcoin_logo_doxygen.png"/></td>
<td id="projectalign" style="padding-left: 0.5em;">
<div id="projectname">Dash Core
&#160;<span id="projectnumber">0.12.2.1</span>
</div>
<div id="projectbrief">P2P Digital Currency</div>
</td>
</tr>
</tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.14 -->
<script type="text/javascript">
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */
var searchBox = new SearchBox("searchBox", "search",false,'Search');
/* @license-end */
</script>
<script type="text/javascript" src="menudata.js"></script>
<script type="text/javascript" src="menu.js"></script>
<script type="text/javascript">
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */
$(function() {
initMenu('',true,false,'search.php','Search');
$(document).ready(function() { init_search(); });
});
/* @license-end */</script>
<div id="main-nav"></div>
</div><!-- top -->
<div id="side-nav" class="ui-resizable side-nav-resizable">
<div id="nav-tree">
<div id="nav-tree-contents">
<div id="nav-sync" class="sync"></div>
</div>
</div>
<div id="splitbar" style="-moz-user-select:none;"
class="ui-resizable-handle">
</div>
</div>
<script type="text/javascript">
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */
$(document).ready(function(){initNavTree('secp256k1_8h.html','');});
/* @license-end */
</script>
<div id="doc-content">
<!-- window showing the filter options -->
<div id="MSearchSelectWindow"
onmouseover="return searchBox.OnSearchSelectShow()"
onmouseout="return searchBox.OnSearchSelectHide()"
onkeydown="return searchBox.OnSearchSelectKey(event)">
</div>
<!-- iframe showing the search results (closed by default) -->
<div id="MSearchResultsWindow">
<iframe src="javascript:void(0)" frameborder="0"
name="MSearchResults" id="MSearchResults">
</iframe>
</div>
<div class="header">
<div class="summary">
<a href="#nested-classes">Classes</a> &#124;
<a href="#define-members">Macros</a> &#124;
<a href="#typedef-members">Typedefs</a> &#124;
<a href="#func-members">Functions</a> &#124;
<a href="#var-members">Variables</a> </div>
<div class="headertitle">
<div class="title">secp256k1.h File Reference</div> </div>
</div><!--header-->
<div class="contents">
<div class="textblock"><code>#include &lt;stddef.h&gt;</code><br />
</div>
<p><a href="secp256k1_8h_source.html">Go to the source code of this file.</a></p>
<table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a>
Classes</h2></td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a>
Macros</h2></td></tr>
<tr class="memitem:a12c8b5d59a2f2a3f232cf48a13c10a6c"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a12c8b5d59a2f2a3f232cf48a13c10a6c">SECP256K1_GNUC_PREREQ</a>(_maj, _min)&#160;&#160;&#160;0</td></tr>
<tr class="separator:a12c8b5d59a2f2a3f232cf48a13c10a6c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a7ddc487fd46aee88f21cabedb7268b1e"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a7ddc487fd46aee88f21cabedb7268b1e">SECP256K1_INLINE</a></td></tr>
<tr class="separator:a7ddc487fd46aee88f21cabedb7268b1e"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3f1967acd0fe26283877c61b3f2694a5"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a></td></tr>
<tr class="separator:a3f1967acd0fe26283877c61b3f2694a5"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:aebd5ca8fbfcbb0ba0754a46115143c2c"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a></td></tr>
<tr class="separator:aebd5ca8fbfcbb0ba0754a46115143c2c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a03c194d8fa91b9b66758b36c91e0b5cb"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(_x)</td></tr>
<tr class="separator:a03c194d8fa91b9b66758b36c91e0b5cb"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ab2572c9f38f9a644f2933f7b74a5072f"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ab2572c9f38f9a644f2933f7b74a5072f">SECP256K1_FLAGS_TYPE_MASK</a>&#160;&#160;&#160;((1 &lt;&lt; 8) - 1)</td></tr>
<tr class="separator:ab2572c9f38f9a644f2933f7b74a5072f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ad96f13de52c4c94f5d11d53fd04c529f"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a>&#160;&#160;&#160;(1 &lt;&lt; 0)</td></tr>
<tr class="separator:ad96f13de52c4c94f5d11d53fd04c529f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:af8d4e9ca93634062735b7f998ef9f68a"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#af8d4e9ca93634062735b7f998ef9f68a">SECP256K1_FLAGS_TYPE_COMPRESSION</a>&#160;&#160;&#160;(1 &lt;&lt; 1)</td></tr>
<tr class="separator:af8d4e9ca93634062735b7f998ef9f68a"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:aabde1ec66215bb0474821343583e1fb2"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#aabde1ec66215bb0474821343583e1fb2">SECP256K1_FLAGS_BIT_CONTEXT_VERIFY</a>&#160;&#160;&#160;(1 &lt;&lt; 8)</td></tr>
<tr class="separator:aabde1ec66215bb0474821343583e1fb2"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ab516743de74b08ccbeea17fb5f783bc9"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ab516743de74b08ccbeea17fb5f783bc9">SECP256K1_FLAGS_BIT_CONTEXT_SIGN</a>&#160;&#160;&#160;(1 &lt;&lt; 9)</td></tr>
<tr class="separator:ab516743de74b08ccbeea17fb5f783bc9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ac26f7c3f665e6422a651d2eb910f1a03"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ac26f7c3f665e6422a651d2eb910f1a03">SECP256K1_FLAGS_BIT_COMPRESSION</a>&#160;&#160;&#160;(1 &lt;&lt; 8)</td></tr>
<tr class="separator:ac26f7c3f665e6422a651d2eb910f1a03"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:add20a6c320e247ca7bd524cbc4259d64"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#add20a6c320e247ca7bd524cbc4259d64">SECP256K1_CONTEXT_VERIFY</a>&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a> | <a class="el" href="secp256k1_8h.html#aabde1ec66215bb0474821343583e1fb2">SECP256K1_FLAGS_BIT_CONTEXT_VERIFY</a>)</td></tr>
<tr class="separator:add20a6c320e247ca7bd524cbc4259d64"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0d34fe6baa73d3145f2e376e43de0b15"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a0d34fe6baa73d3145f2e376e43de0b15">SECP256K1_CONTEXT_SIGN</a>&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a> | <a class="el" href="secp256k1_8h.html#ab516743de74b08ccbeea17fb5f783bc9">SECP256K1_FLAGS_BIT_CONTEXT_SIGN</a>)</td></tr>
<tr class="separator:a0d34fe6baa73d3145f2e376e43de0b15"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a4f7b286aa714c2e0fb279c180f67e9b3"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a4f7b286aa714c2e0fb279c180f67e9b3">SECP256K1_CONTEXT_NONE</a>&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a>)</td></tr>
<tr class="separator:a4f7b286aa714c2e0fb279c180f67e9b3"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a7b8f642c65e8b5c81fa4421b7c42ab57"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a7b8f642c65e8b5c81fa4421b7c42ab57">SECP256K1_EC_COMPRESSED</a>&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#af8d4e9ca93634062735b7f998ef9f68a">SECP256K1_FLAGS_TYPE_COMPRESSION</a> | <a class="el" href="secp256k1_8h.html#ac26f7c3f665e6422a651d2eb910f1a03">SECP256K1_FLAGS_BIT_COMPRESSION</a>)</td></tr>
<tr class="separator:a7b8f642c65e8b5c81fa4421b7c42ab57"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ab8e25dc58843e83926f95795f9e8a6e2"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ab8e25dc58843e83926f95795f9e8a6e2">SECP256K1_EC_UNCOMPRESSED</a>&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#af8d4e9ca93634062735b7f998ef9f68a">SECP256K1_FLAGS_TYPE_COMPRESSION</a>)</td></tr>
<tr class="separator:ab8e25dc58843e83926f95795f9e8a6e2"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="typedef-members"></a>
Typedefs</h2></td></tr>
<tr class="memitem:a282ec9e6dfec8c35955c3eb2f7476e5e"><td class="memItemLeft" align="right" valign="top">typedef struct <a class="el" href="structsecp256k1__context__struct.html">secp256k1_context_struct</a>&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a></td></tr>
<tr class="separator:a282ec9e6dfec8c35955c3eb2f7476e5e"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a539882fd91bff672712fa19a4cfaeb98"><td class="memItemLeft" align="right" valign="top">typedef int(*&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a>) (unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int attempt)</td></tr>
<tr class="separator:a539882fd91bff672712fa19a4cfaeb98"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
Functions</h2></td></tr>
<tr class="memitem:a769d478f352afbb55200e33970533a3c"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a769d478f352afbb55200e33970533a3c">secp256k1_context_create</a> (unsigned int <a class="el" href="dash-tx_8cpp.html#ac8bf36fe0577cba66bccda3a6f7e80a4">flags</a>) <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a></td></tr>
<tr class="separator:a769d478f352afbb55200e33970533a3c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a74bdea41233e26f6348ebab5c660db90"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a74bdea41233e26f6348ebab5c660db90">secp256k1_context_clone</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a></td></tr>
<tr class="separator:a74bdea41233e26f6348ebab5c660db90"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:af8569fb9aa73c0acf46afce4df662950"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#af8569fb9aa73c0acf46afce4df662950">secp256k1_context_destroy</a> (<a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>)</td></tr>
<tr class="separator:af8569fb9aa73c0acf46afce4df662950"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3ec29bece9974f9535337eb7d91b351c"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a3ec29bece9974f9535337eb7d91b351c">secp256k1_context_set_illegal_callback</a> (<a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, void(*fun)(const char *message, void *data), const void *data) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1)</td></tr>
<tr class="separator:a3ec29bece9974f9535337eb7d91b351c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a35106efb325f03468bcf5faa524c1cc4"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a35106efb325f03468bcf5faa524c1cc4">secp256k1_context_set_error_callback</a> (<a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, void(*fun)(const char *message, void *data), const void *data) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1)</td></tr>
<tr class="separator:a35106efb325f03468bcf5faa524c1cc4"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a4e5dc8952c9a7e791376505ef2023ca1"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a4e5dc8952c9a7e791376505ef2023ca1">secp256k1_ec_pubkey_parse</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey, const unsigned char *input, size_t inputlen) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a4e5dc8952c9a7e791376505ef2023ca1"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a34977bf00322e510e881160c421836d7"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a34977bf00322e510e881160c421836d7">secp256k1_ec_pubkey_serialize</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, unsigned char *output, size_t *outputlen, const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey, unsigned int <a class="el" href="dash-tx_8cpp.html#ac8bf36fe0577cba66bccda3a6f7e80a4">flags</a>) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(4)</td></tr>
<tr class="separator:a34977bf00322e510e881160c421836d7"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a2aff2802eca3d15ec54298e879579897"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a2aff2802eca3d15ec54298e879579897">secp256k1_ecdsa_signature_parse_compact</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig, const unsigned char *input64) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a2aff2802eca3d15ec54298e879579897"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a57d390dd5baa54855b0cb20628034b90"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a57d390dd5baa54855b0cb20628034b90">secp256k1_ecdsa_signature_parse_der</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig, const unsigned char *input, size_t inputlen) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a57d390dd5baa54855b0cb20628034b90"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ac07809ca872ec967ab4d3b1a95eafe0b"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ac07809ca872ec967ab4d3b1a95eafe0b">secp256k1_ecdsa_signature_serialize_der</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, unsigned char *output, size_t *outputlen, const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(4)</td></tr>
<tr class="separator:ac07809ca872ec967ab4d3b1a95eafe0b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:af8571ca8dcfb7f892519b337504dc700"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#af8571ca8dcfb7f892519b337504dc700">secp256k1_ecdsa_signature_serialize_compact</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, unsigned char *output64, const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:af8571ca8dcfb7f892519b337504dc700"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a41065390f9039c4140ec04999724987d"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a41065390f9039c4140ec04999724987d">secp256k1_ecdsa_verify</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig, const unsigned char *msg32, const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(4)</td></tr>
<tr class="separator:a41065390f9039c4140ec04999724987d"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a93ec36a19229f08acc5ff1ca613ab3a1"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a93ec36a19229f08acc5ff1ca613ab3a1">secp256k1_ecdsa_signature_normalize</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sigout, const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sigin) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a93ec36a19229f08acc5ff1ca613ab3a1"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a691c048f3a3b4e7f51417c57ec058be7"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a691c048f3a3b4e7f51417c57ec058be7">secp256k1_ecdsa_sign</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *sig, const unsigned char *msg32, const unsigned char *seckey, <a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a> noncefp, const void *ndata) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(4)</td></tr>
<tr class="separator:a691c048f3a3b4e7f51417c57ec058be7"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a366f922fc0c787351e82ff8e3a95f652"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a366f922fc0c787351e82ff8e3a95f652">secp256k1_ec_seckey_verify</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, const unsigned char *seckey) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2)</td></tr>
<tr class="separator:a366f922fc0c787351e82ff8e3a95f652"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a7438071aa8a6dc4697abe4f4659f2161"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a7438071aa8a6dc4697abe4f4659f2161">secp256k1_ec_pubkey_create</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey, const unsigned char *seckey) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a7438071aa8a6dc4697abe4f4659f2161"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0f9125cd8c970342ec5118f7bfacc0c5"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a0f9125cd8c970342ec5118f7bfacc0c5">secp256k1_ec_privkey_tweak_add</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, unsigned char *seckey, const unsigned char *tweak) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a0f9125cd8c970342ec5118f7bfacc0c5"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a2381cde2a0ee44d90dcfa77e28b5eb79"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a2381cde2a0ee44d90dcfa77e28b5eb79">secp256k1_ec_pubkey_tweak_add</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey, const unsigned char *tweak) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a2381cde2a0ee44d90dcfa77e28b5eb79"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:abe078cbb6b642d792f123ea67494f7e3"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#abe078cbb6b642d792f123ea67494f7e3">secp256k1_ec_privkey_tweak_mul</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, unsigned char *seckey, const unsigned char *tweak) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:abe078cbb6b642d792f123ea67494f7e3"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0351b25239f1146573d62477c3b2119a"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a0351b25239f1146573d62477c3b2119a">secp256k1_ec_pubkey_tweak_mul</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *pubkey, const unsigned char *tweak) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a0351b25239f1146573d62477c3b2119a"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1b81d70feb6ed24dc902cbbd5ba569e7"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a1b81d70feb6ed24dc902cbbd5ba569e7">secp256k1_context_randomize</a> (<a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, const unsigned char *seed32) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(1)</td></tr>
<tr class="separator:a1b81d70feb6ed24dc902cbbd5ba569e7"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a4d9b18720afc67f3685a9f171bac6737"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a4d9b18720afc67f3685a9f171bac6737">secp256k1_ec_pubkey_combine</a> (const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *<a class="el" href="tests_8c.html#a06a3e29ada83211a695a49e8f7405842">ctx</a>, <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *out, const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *const *ins, size_t n) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(2) <a class="el" href="secp256k1_8h.html#a03c194d8fa91b9b66758b36c91e0b5cb">SECP256K1_ARG_NONNULL</a>(3)</td></tr>
<tr class="separator:a4d9b18720afc67f3685a9f171bac6737"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="var-members"></a>
Variables</h2></td></tr>
<tr class="memitem:ac03ab067f194eb561175a6b522def2d8"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> const <a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a>&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#ac03ab067f194eb561175a6b522def2d8">secp256k1_nonce_function_rfc6979</a></td></tr>
<tr class="separator:ac03ab067f194eb561175a6b522def2d8"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a22f44df7786a1be5ad93aadfed75b932"><td class="memItemLeft" align="right" valign="top"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> const <a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a>&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="secp256k1_8h.html#a22f44df7786a1be5ad93aadfed75b932">secp256k1_nonce_function_default</a></td></tr>
<tr class="separator:a22f44df7786a1be5ad93aadfed75b932"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table>
<h2 class="groupheader">Macro Definition Documentation</h2>
<a id="a3f1967acd0fe26283877c61b3f2694a5"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a3f1967acd0fe26283877c61b3f2694a5">&#9670;&nbsp;</a></span>SECP256K1_API</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_API</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00132">132</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<a id="a03c194d8fa91b9b66758b36c91e0b5cb"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a03c194d8fa91b9b66758b36c91e0b5cb">&#9670;&nbsp;</a></span>SECP256K1_ARG_NONNULL</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_ARG_NONNULL</td>
<td>(</td>
<td class="paramtype">&#160;</td>
<td class="paramname">_x</td><td>)</td>
<td></td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00147">147</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<a id="a4f7b286aa714c2e0fb279c180f67e9b3"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a4f7b286aa714c2e0fb279c180f67e9b3">&#9670;&nbsp;</a></span>SECP256K1_CONTEXT_NONE</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_CONTEXT_NONE&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a>)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00162">162</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="a0d34fe6baa73d3145f2e376e43de0b15"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a0d34fe6baa73d3145f2e376e43de0b15">&#9670;&nbsp;</a></span>SECP256K1_CONTEXT_SIGN</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_CONTEXT_SIGN&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a> | <a class="el" href="secp256k1_8h.html#ab516743de74b08ccbeea17fb5f783bc9">SECP256K1_FLAGS_BIT_CONTEXT_SIGN</a>)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00161">161</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__internal_8c_source.html#l00294">bench_context_sign()</a>, <a class="el" href="key_8cpp_source.html#l00304">ECC_Start()</a>, <a class="el" href="bench__schnorr__verify_8c_source.html#l00063">main()</a>, and <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="add20a6c320e247ca7bd524cbc4259d64"></a>
<h2 class="memtitle"><span class="permalink"><a href="#add20a6c320e247ca7bd524cbc4259d64">&#9670;&nbsp;</a></span>SECP256K1_CONTEXT_VERIFY</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_CONTEXT_VERIFY&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#ad96f13de52c4c94f5d11d53fd04c529f">SECP256K1_FLAGS_TYPE_CONTEXT</a> | <a class="el" href="secp256k1_8h.html#aabde1ec66215bb0474821343583e1fb2">SECP256K1_FLAGS_BIT_CONTEXT_VERIFY</a>)</td>
</tr>
</table>
</div><div class="memdoc">
<p>Flags to pass to secp256k1_context_create. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00160">160</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__internal_8c_source.html#l00286">bench_context_verify()</a>, <a class="el" href="pubkey_8cpp_source.html#l00285">ECCVerifyHandle::ECCVerifyHandle()</a>, <a class="el" href="bench__recover_8c_source.html#l00051">main()</a>, and <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="a7b8f642c65e8b5c81fa4421b7c42ab57"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a7b8f642c65e8b5c81fa4421b7c42ab57">&#9670;&nbsp;</a></span>SECP256K1_EC_COMPRESSED</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_EC_COMPRESSED&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#af8d4e9ca93634062735b7f998ef9f68a">SECP256K1_FLAGS_TYPE_COMPRESSION</a> | <a class="el" href="secp256k1_8h.html#ac26f7c3f665e6422a651d2eb910f1a03">SECP256K1_FLAGS_BIT_COMPRESSION</a>)</td>
</tr>
</table>
</div><div class="memdoc">
<p>Flag to pass to secp256k1_ec_pubkey_serialize and secp256k1_ec_privkey_export. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00165">165</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__recover_8c_source.html#l00018">bench_recover()</a>, <a class="el" href="bench__schnorr__verify_8c_source.html#l00029">benchmark_schnorr_init()</a>, <a class="el" href="pubkey_8cpp_source.html#l00228">CPubKey::Derive()</a>, <a class="el" href="key_8cpp_source.html#l00063">ec_privkey_export_der()</a>, <a class="el" href="tests_8c_source.html#l02561">ec_pubkey_parse_pointtest()</a>, <a class="el" href="key_8cpp_source.html#l00143">CKey::GetPrivKey()</a>, <a class="el" href="key_8cpp_source.html#l00156">CKey::GetPubKey()</a>, <a class="el" href="bench__verify_8c_source.html#l00043">main()</a>, <a class="el" href="pubkey_8cpp_source.html#l00187">CPubKey::RecoverCompact()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, <a class="el" href="ecdh_2tests__impl_8h_source.html#l00010">test_ecdh_generator_basepoint()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="ab8e25dc58843e83926f95795f9e8a6e2"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ab8e25dc58843e83926f95795f9e8a6e2">&#9670;&nbsp;</a></span>SECP256K1_EC_UNCOMPRESSED</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_EC_UNCOMPRESSED&#160;&#160;&#160;(<a class="el" href="secp256k1_8h.html#af8d4e9ca93634062735b7f998ef9f68a">SECP256K1_FLAGS_TYPE_COMPRESSION</a>)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00166">166</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="pubkey_8cpp_source.html#l00214">CPubKey::Decompress()</a>, <a class="el" href="key_8cpp_source.html#l00063">ec_privkey_export_der()</a>, <a class="el" href="tests_8c_source.html#l02561">ec_pubkey_parse_pointtest()</a>, <a class="el" href="key_8cpp_source.html#l00143">CKey::GetPrivKey()</a>, <a class="el" href="key_8cpp_source.html#l00156">CKey::GetPubKey()</a>, <a class="el" href="pubkey_8cpp_source.html#l00187">CPubKey::RecoverCompact()</a>, <a class="el" href="tests_8c_source.html#l02636">run_ec_pubkey_parse_test()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="ac26f7c3f665e6422a651d2eb910f1a03"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ac26f7c3f665e6422a651d2eb910f1a03">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_BIT_COMPRESSION</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_BIT_COMPRESSION&#160;&#160;&#160;(1 &lt;&lt; 8)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00157">157</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00168">secp256k1_ec_pubkey_serialize()</a>.</p>
</div>
</div>
<a id="ab516743de74b08ccbeea17fb5f783bc9"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ab516743de74b08ccbeea17fb5f783bc9">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_BIT_CONTEXT_SIGN</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_BIT_CONTEXT_SIGN&#160;&#160;&#160;(1 &lt;&lt; 9)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00156">156</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00060">secp256k1_context_create()</a>.</p>
</div>
</div>
<a id="aabde1ec66215bb0474821343583e1fb2"></a>
<h2 class="memtitle"><span class="permalink"><a href="#aabde1ec66215bb0474821343583e1fb2">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_BIT_CONTEXT_VERIFY</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_BIT_CONTEXT_VERIFY&#160;&#160;&#160;(1 &lt;&lt; 8)</td>
</tr>
</table>
</div><div class="memdoc">
<p>The higher bits contain the actual data. Do not use directly. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00155">155</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00060">secp256k1_context_create()</a>.</p>
</div>
</div>
<a id="af8d4e9ca93634062735b7f998ef9f68a"></a>
<h2 class="memtitle"><span class="permalink"><a href="#af8d4e9ca93634062735b7f998ef9f68a">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_TYPE_COMPRESSION</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_TYPE_COMPRESSION&#160;&#160;&#160;(1 &lt;&lt; 1)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00153">153</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00168">secp256k1_ec_pubkey_serialize()</a>.</p>
</div>
</div>
<a id="ad96f13de52c4c94f5d11d53fd04c529f"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ad96f13de52c4c94f5d11d53fd04c529f">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_TYPE_CONTEXT</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_TYPE_CONTEXT&#160;&#160;&#160;(1 &lt;&lt; 0)</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00152">152</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00060">secp256k1_context_create()</a>.</p>
</div>
</div>
<a id="ab2572c9f38f9a644f2933f7b74a5072f"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ab2572c9f38f9a644f2933f7b74a5072f">&#9670;&nbsp;</a></span>SECP256K1_FLAGS_TYPE_MASK</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_FLAGS_TYPE_MASK&#160;&#160;&#160;((1 &lt;&lt; 8) - 1)</td>
</tr>
</table>
</div><div class="memdoc">
<p>All flags' lower 8 bits indicate what they're for. Do not use directly. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00151">151</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00060">secp256k1_context_create()</a>, and <a class="el" href="secp256k1_8c_source.html#l00168">secp256k1_ec_pubkey_serialize()</a>.</p>
</div>
</div>
<a id="a12c8b5d59a2f2a3f232cf48a13c10a6c"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a12c8b5d59a2f2a3f232cf48a13c10a6c">&#9670;&nbsp;</a></span>SECP256K1_GNUC_PREREQ</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_GNUC_PREREQ</td>
<td>(</td>
<td class="paramtype">&#160;</td>
<td class="paramname">_maj, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">&#160;</td>
<td class="paramname">_min&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td>&#160;&#160;&#160;0</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00106">106</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<a id="a7ddc487fd46aee88f21cabedb7268b1e"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a7ddc487fd46aee88f21cabedb7268b1e">&#9670;&nbsp;</a></span>SECP256K1_INLINE</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_INLINE</td>
</tr>
</table>
</div><div class="memdoc">
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00116">116</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<a id="aebd5ca8fbfcbb0ba0754a46115143c2c"></a>
<h2 class="memtitle"><span class="permalink"><a href="#aebd5ca8fbfcbb0ba0754a46115143c2c">&#9670;&nbsp;</a></span>SECP256K1_WARN_UNUSED_RESULT</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">#define SECP256K1_WARN_UNUSED_RESULT</td>
</tr>
</table>
</div><div class="memdoc">
<p>Warning attributes NONNULL is not used if SECP256K1_BUILD is set to avoid the compiler optimizing out some paranoid null checks. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00142">142</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<h2 class="groupheader">Typedef Documentation</h2>
<a id="a282ec9e6dfec8c35955c3eb2f7476e5e"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a282ec9e6dfec8c35955c3eb2f7476e5e">&#9670;&nbsp;</a></span>secp256k1_context</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">typedef struct <a class="el" href="structsecp256k1__context__struct.html">secp256k1_context_struct</a> <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a></td>
</tr>
</table>
</div><div class="memdoc">
<p>Opaque data structure that holds context information (precomputed tables etc.).</p>
<p>The purpose of context structures is to cache large precomputed data tables that are expensive to construct, and also to maintain the randomization data for blinding.</p>
<p>Do not create a new context object for each operation, as construction is far slower than all other API calls (~100 times slower than an ECDSA verification).</p>
<p>A constructed context can safely be used from multiple threads simultaneously, but API call that take a non-const pointer to a context need exclusive access to it. In particular this is the case for secp256k1_context_destroy and secp256k1_context_randomize.</p>
<p>Regarding randomization, either do it once at creation time (in which case you do not need any locking for the other calls), or use a read-write lock. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00043">43</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<a id="a539882fd91bff672712fa19a4cfaeb98"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a539882fd91bff672712fa19a4cfaeb98">&#9670;&nbsp;</a></span>secp256k1_nonce_function</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname">typedef int(* secp256k1_nonce_function) (unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *algo16, void *data, unsigned int attempt)</td>
</tr>
</table>
</div><div class="memdoc">
<p>A pointer to a function to deterministically generate a nonce.</p>
<p>Returns: 1 if a nonce was successfully generated. 0 will cause signing to fail. Out: nonce32: pointer to a 32-byte array to be filled by the function. In: msg32: the 32-byte message hash being verified (will not be NULL) key32: pointer to a 32-byte secret key (will not be NULL) algo16: pointer to a 16-byte array describing the signature algorithm (will be NULL for ECDSA for compatibility). data: Arbitrary data pointer that is passed through. attempt: how many iterations we have tried to find a nonce. This will almost always be 0, but different attempt values are required to result in a different nonce.</p>
<p>Except for test cases, this function should compute some cryptographic hash of the message, the algorithm, the key and the attempt. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8h_source.html#l00092">92</a> of file <a class="el" href="secp256k1_8h_source.html">secp256k1.h</a>.</p>
</div>
</div>
<h2 class="groupheader">Function Documentation</h2>
<a id="a74bdea41233e26f6348ebab5c660db90"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a74bdea41233e26f6348ebab5c660db90">&#9670;&nbsp;</a></span>secp256k1_context_clone()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a>* secp256k1_context_clone </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em></td><td>)</td>
<td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Copies a secp256k1 context object.</p>
<p>Returns: a newly created context object. Args: ctx: an existing context to copy (cannot be NULL) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00085">85</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="a769d478f352afbb55200e33970533a3c"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a769d478f352afbb55200e33970533a3c">&#9670;&nbsp;</a></span>secp256k1_context_create()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a>* secp256k1_context_create </td>
<td>(</td>
<td class="paramtype">unsigned int&#160;</td>
<td class="paramname"><em>flags</em></td><td>)</td>
<td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Create a secp256k1 context object.</p>
<p>Returns: a newly created context object. In: flags: which parts of the context to initialize. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00060">60</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__internal_8c_source.html#l00294">bench_context_sign()</a>, <a class="el" href="bench__internal_8c_source.html#l00286">bench_context_verify()</a>, <a class="el" href="bench__ecdh_8c_source.html#l00020">bench_ecdh_setup()</a>, <a class="el" href="key_8cpp_source.html#l00304">ECC_Start()</a>, <a class="el" href="pubkey_8cpp_source.html#l00285">ECCVerifyHandle::ECCVerifyHandle()</a>, <a class="el" href="bench__recover_8c_source.html#l00051">main()</a>, and <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="af8569fb9aa73c0acf46afce4df662950"></a>
<h2 class="memtitle"><span class="permalink"><a href="#af8569fb9aa73c0acf46afce4df662950">&#9670;&nbsp;</a></span>secp256k1_context_destroy()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void secp256k1_context_destroy </td>
<td>(</td>
<td class="paramtype"><a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em></td><td>)</td>
<td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Destroy a secp256k1 context object.</p>
<p>The context pointer may not be used afterwards. Args: ctx: an existing context to destroy (cannot be NULL) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00094">94</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__internal_8c_source.html#l00294">bench_context_sign()</a>, <a class="el" href="bench__internal_8c_source.html#l00286">bench_context_verify()</a>, <a class="el" href="key_8cpp_source.html#l00323">ECC_Stop()</a>, <a class="el" href="bench__recover_8c_source.html#l00051">main()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, and <a class="el" href="pubkey_8cpp_source.html#l00295">ECCVerifyHandle::~ECCVerifyHandle()</a>.</p>
</div>
</div>
<a id="a1b81d70feb6ed24dc902cbbd5ba569e7"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a1b81d70feb6ed24dc902cbbd5ba569e7">&#9670;&nbsp;</a></span>secp256k1_context_randomize()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_context_randomize </td>
<td>(</td>
<td class="paramtype"><a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>seed32</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Updates the context randomization. Returns: 1: randomization successfully updated 0: error Args: ctx: pointer to a context object (cannot be NULL) In: seed32: pointer to a 32-byte random seed (NULL resets to initial state) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00527">527</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="key_8cpp_source.html#l00304">ECC_Start()</a>, <a class="el" href="tests_8c_source.html#l04252">main()</a>, and <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="a35106efb325f03468bcf5faa524c1cc4"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a35106efb325f03468bcf5faa524c1cc4">&#9670;&nbsp;</a></span>secp256k1_context_set_error_callback()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void secp256k1_context_set_error_callback </td>
<td>(</td>
<td class="paramtype"><a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">void(*)(const char *message, void *data)&#160;</td>
<td class="paramname"><em>fun</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const void *&#160;</td>
<td class="paramname"><em>data</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Set a callback function to be called when an internal consistency check fails. The default is crashing.</p>
<p>This can only trigger in case of a hardware failure, miscompilation, memory corruption, serious bug in the library, or other error would can otherwise result in undefined behaviour. It will not trigger due to mere incorrect usage of the API (see secp256k1_context_set_illegal_callback for that). After this callback returns, anything may happen, including crashing.</p>
<p>Args: ctx: an existing context object (cannot be NULL) In: fun: a pointer to a function to call when an internal error occurs, taking a message and an opaque pointer (NULL restores a default handler that calls abort). data: the opaque pointer to pass to fun above. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00111">111</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>.</p>
</div>
</div>
<a id="a3ec29bece9974f9535337eb7d91b351c"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a3ec29bece9974f9535337eb7d91b351c">&#9670;&nbsp;</a></span>secp256k1_context_set_illegal_callback()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> void secp256k1_context_set_illegal_callback </td>
<td>(</td>
<td class="paramtype"><a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">void(*)(const char *message, void *data)&#160;</td>
<td class="paramname"><em>fun</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const void *&#160;</td>
<td class="paramname"><em>data</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Set a callback function to be called when an illegal argument is passed to an API call. It will only trigger for violations that are mentioned explicitly in the header.</p>
<p>The philosophy is that these shouldn't be dealt with through a specific return value, as calling code should not have branches to deal with the case that this code itself is broken.</p>
<p>On the other hand, during debug stage, one would want to be informed about such mistakes, and the default (crashing) may be inadvisable. When this callback is triggered, the API function called is guaranteed not to cause a crash, though its return value and output arguments are undefined.</p>
<p>Args: ctx: an existing context object (cannot be NULL) In: fun: a pointer to a function to call when an illegal argument is passed to the API, taking a message and an opaque pointer (NULL restores a default handler that calls abort). data: the opaque pointer to pass to fun above. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00103">103</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l02561">ec_pubkey_parse_pointtest()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="tests_8c_source.html#l02636">run_ec_pubkey_parse_test()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, and <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>.</p>
</div>
</div>
<a id="a0f9125cd8c970342ec5118f7bfacc0c5"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a0f9125cd8c970342ec5118f7bfacc0c5">&#9670;&nbsp;</a></span>secp256k1_ec_privkey_tweak_add()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_privkey_tweak_add </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned char *&#160;</td>
<td class="paramname"><em>seckey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>tweak</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Tweak a private key by adding tweak to it. Returns: 0 if the tweak was out of range (chance of around 1 in 2^128 for uniformly random 32-byte arrays, or if the resulting private key would be invalid (only when the tweak is the complement of the private key). 1 otherwise. Args: ctx: pointer to a context object (cannot be NULL). In/Out: seckey: pointer to a 32-byte private key. In: tweak: pointer to a 32-byte tweak. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00432">432</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="key_8cpp_source.html#l00225">CKey::Derive()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="abe078cbb6b642d792f123ea67494f7e3"></a>
<h2 class="memtitle"><span class="permalink"><a href="#abe078cbb6b642d792f123ea67494f7e3">&#9670;&nbsp;</a></span>secp256k1_ec_privkey_tweak_mul()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_privkey_tweak_mul </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned char *&#160;</td>
<td class="paramname"><em>seckey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>tweak</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Tweak a private key by multiplying it by a tweak. Returns: 0 if the tweak was out of range (chance of around 1 in 2^128 for uniformly random 32-byte arrays, or equal to zero. 1 otherwise. Args: ctx: pointer to a context object (cannot be NULL). In/Out: seckey: pointer to a 32-byte private key. In: tweak: pointer to a 32-byte tweak. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00480">480</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="a4d9b18720afc67f3685a9f171bac6737"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a4d9b18720afc67f3685a9f171bac6737">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_combine()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_pubkey_combine </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>out</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *const *&#160;</td>
<td class="paramname"><em>ins</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">size_t&#160;</td>
<td class="paramname"><em>n</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Add a number of public keys together. Returns: 1: the sum of the public keys is valid. 0: the sum of the public keys is not valid. Args: ctx: pointer to a context object Out: out: pointer to a public key object for placing the resulting public key (cannot be NULL) In: ins: pointer to array of pointers to public keys (cannot be NULL) n: the number of public keys to add together (must be at least 1) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00534">534</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, <a class="el" href="tests_8c_source.html#l02019">test_ec_combine()</a>, and <a class="el" href="schnorr_2tests__impl_8h_source.html#l00085">test_schnorr_threshold()</a>.</p>
</div>
</div>
<a id="a7438071aa8a6dc4697abe4f4659f2161"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a7438071aa8a6dc4697abe4f4659f2161">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_create()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_pubkey_create </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>seckey</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Compute the public key for a secret key.</p>
<p>Returns: 1: secret was valid, public key stores 0: secret was invalid, try again Args: ctx: pointer to a context object, initialized for signing (cannot be NULL) Out: pubkey: pointer to the created public key (cannot be NULL) In: seckey: pointer to a 32-byte private key (cannot be NULL) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00409">409</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__schnorr__verify_8c_source.html#l00029">benchmark_schnorr_init()</a>, <a class="el" href="key_8cpp_source.html#l00063">ec_privkey_export_der()</a>, <a class="el" href="key_8cpp_source.html#l00156">CKey::GetPubKey()</a>, <a class="el" href="bench__verify_8c_source.html#l00043">main()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, <a class="el" href="ecdh_2tests__impl_8h_source.html#l00044">test_bad_scalar()</a>, <a class="el" href="ecdh_2tests__impl_8h_source.html#l00010">test_ecdh_generator_basepoint()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, <a class="el" href="recovery_2tests__impl_8h_source.html#l00010">test_ecdsa_recovery_end_to_end()</a>, <a class="el" href="schnorr_2tests__impl_8h_source.html#l00012">test_schnorr_end_to_end()</a>, and <a class="el" href="schnorr_2tests__impl_8h_source.html#l00085">test_schnorr_threshold()</a>.</p>
</div>
</div>
<a id="a4e5dc8952c9a7e791376505ef2023ca1"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a4e5dc8952c9a7e791376505ef2023ca1">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_parse()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_pubkey_parse </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>input</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">size_t&#160;</td>
<td class="paramname"><em>inputlen</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Parse a variable-length public key into the pubkey object.</p>
<p>Returns: 1 if the public key was fully valid. 0 if the public key could not be parsed or is invalid. Args: ctx: a secp256k1 context object. Out: pubkey: pointer to a pubkey object. If 1 is returned, it is set to a parsed version of input. If not, its value is undefined. In: input: pointer to a serialized public key inputlen: length of the array pointed to by input</p>
<p>This function supports parsing compressed (33 bytes, header byte 0x02 or 0x03), uncompressed (65 bytes, header byte 0x04), or hybrid (65 bytes, header byte 0x06 or 0x07) format public keys. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00152">152</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__ecdh_8c_source.html#l00020">bench_ecdh_setup()</a>, <a class="el" href="bench__schnorr__verify_8c_source.html#l00048">benchmark_schnorr_verify()</a>, <a class="el" href="bench__verify_8c_source.html#l00024">benchmark_verify()</a>, <a class="el" href="pubkey_8cpp_source.html#l00214">CPubKey::Decompress()</a>, <a class="el" href="pubkey_8cpp_source.html#l00228">CPubKey::Derive()</a>, <a class="el" href="tests_8c_source.html#l02561">ec_pubkey_parse_pointtest()</a>, <a class="el" href="pubkey_8cpp_source.html#l00207">CPubKey::IsFullyValid()</a>, <a class="el" href="tests_8c_source.html#l02636">run_ec_pubkey_parse_test()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, and <a class="el" href="pubkey_8cpp_source.html#l00167">CPubKey::Verify()</a>.</p>
</div>
</div>
<a id="a34977bf00322e510e881160c421836d7"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a34977bf00322e510e881160c421836d7">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_serialize()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ec_pubkey_serialize </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned char *&#160;</td>
<td class="paramname"><em>output</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">size_t *&#160;</td>
<td class="paramname"><em>outputlen</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned int&#160;</td>
<td class="paramname"><em>flags</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Serialize a pubkey object into a serialized byte sequence.</p>
<p>Returns: 1 always. Args: ctx: a secp256k1 context object. Out: output: a pointer to a 65-byte (if compressed==0) or 33-byte (if compressed==1) byte array to place the serialized key in. In/Out: outputlen: a pointer to an integer which is initially set to the size of output, and is overwritten with the written size. In: pubkey: a pointer to a <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> containing an initialized public key. flags: SECP256K1_EC_COMPRESSED if serialization should be in compressed format, otherwise SECP256K1_EC_UNCOMPRESSED. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00168">168</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__recover_8c_source.html#l00018">bench_recover()</a>, <a class="el" href="bench__schnorr__verify_8c_source.html#l00029">benchmark_schnorr_init()</a>, <a class="el" href="pubkey_8cpp_source.html#l00214">CPubKey::Decompress()</a>, <a class="el" href="pubkey_8cpp_source.html#l00228">CPubKey::Derive()</a>, <a class="el" href="key_8cpp_source.html#l00063">ec_privkey_export_der()</a>, <a class="el" href="tests_8c_source.html#l02561">ec_pubkey_parse_pointtest()</a>, <a class="el" href="key_8cpp_source.html#l00156">CKey::GetPubKey()</a>, <a class="el" href="bench__verify_8c_source.html#l00043">main()</a>, <a class="el" href="pubkey_8cpp_source.html#l00187">CPubKey::RecoverCompact()</a>, <a class="el" href="tests_8c_source.html#l02636">run_ec_pubkey_parse_test()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, <a class="el" href="ecdh_2tests__impl_8h_source.html#l00010">test_ecdh_generator_basepoint()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="a2381cde2a0ee44d90dcfa77e28b5eb79"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a2381cde2a0ee44d90dcfa77e28b5eb79">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_tweak_add()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_pubkey_tweak_add </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>tweak</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Tweak a public key by adding tweak times the generator to it. Returns: 0 if the tweak was out of range (chance of around 1 in 2^128 for uniformly random 32-byte arrays, or if the resulting public key would be invalid (only when the tweak is the complement of the corresponding private key). 1 otherwise. Args: ctx: pointer to a context object initialized for validation (cannot be NULL). In/Out: pubkey: pointer to a public key object. In: tweak: pointer to a 32-byte tweak. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00456">456</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="pubkey_8cpp_source.html#l00228">CPubKey::Derive()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="a0351b25239f1146573d62477c3b2119a"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a0351b25239f1146573d62477c3b2119a">&#9670;&nbsp;</a></span>secp256k1_ec_pubkey_tweak_mul()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_pubkey_tweak_mul </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>tweak</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Tweak a public key by multiplying it by a tweak value. Returns: 0 if the tweak was out of range (chance of around 1 in 2^128 for uniformly random 32-byte arrays, or equal to zero. 1 otherwise. Args: ctx: pointer to a context object initialized for validation (cannot be NULL). In/Out: pubkey: pointer to a public key obkect. In: tweak: pointer to a 32-byte tweak. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00503">503</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="a366f922fc0c787351e82ff8e3a95f652"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a366f922fc0c787351e82ff8e3a95f652">&#9670;&nbsp;</a></span>secp256k1_ec_seckey_verify()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ec_seckey_verify </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>seckey</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Verify an ECDSA secret key.</p>
<p>Returns: 1: secret key is valid 0: secret key is invalid Args: ctx: pointer to a context object (cannot be NULL) In: seckey: pointer to a 32-byte secret key (cannot be NULL) </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00395">395</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="key_8cpp_source.html#l00122">CKey::Check()</a>, <a class="el" href="key_8cpp_source.html#l00019">ec_privkey_import_der()</a>, <a class="el" href="tests_8c_source.html#l02963">run_eckey_edge_case_test()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, <a class="el" href="recovery_2tests__impl_8h_source.html#l00010">test_ecdsa_recovery_end_to_end()</a>, <a class="el" href="schnorr_2tests__impl_8h_source.html#l00012">test_schnorr_end_to_end()</a>, and <a class="el" href="schnorr_2tests__impl_8h_source.html#l00085">test_schnorr_threshold()</a>.</p>
</div>
</div>
<a id="a691c048f3a3b4e7f51417c57ec058be7"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a691c048f3a3b4e7f51417c57ec058be7">&#9670;&nbsp;</a></span>secp256k1_ecdsa_sign()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_sign </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>msg32</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>seckey</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a>&#160;</td>
<td class="paramname"><em>noncefp</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const void *&#160;</td>
<td class="paramname"><em>ndata</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Create an ECDSA signature.</p>
<p>Returns: 1: signature created 0: the nonce generation function failed, or the private key was invalid. Args: ctx: pointer to a context object, initialized for signing (cannot be NULL) Out: sig: pointer to an array where the signature will be placed (cannot be NULL) In: msg32: the 32-byte message hash being signed (cannot be NULL) seckey: pointer to a 32-byte secret key (cannot be NULL) noncefp:pointer to a nonce generation function. If NULL, secp256k1_nonce_function_default is used ndata: pointer to arbitrary data used by the nonce generation function (can be NULL)</p>
<p>The created signature is always in lower-S form. See secp256k1_ecdsa_signature_normalize for more details. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00349">349</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__sign_8c_source.html#l00029">bench_sign()</a>, <a class="el" href="bench__verify_8c_source.html#l00043">main()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="key_8cpp_source.html#l00169">CKey::Sign()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, and <a class="el" href="recovery_2tests__impl_8h_source.html#l00010">test_ecdsa_recovery_end_to_end()</a>.</p>
</div>
</div>
<a id="a93ec36a19229f08acc5ff1ca613ab3a1"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a93ec36a19229f08acc5ff1ca613ab3a1">&#9670;&nbsp;</a></span>secp256k1_ecdsa_signature_normalize()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_signature_normalize </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sigout</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sigin</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Convert a signature to a normalized lower-S form.</p>
<p>Returns: 1 if sigin was not normalized, 0 if it already was. Args: ctx: a secp256k1 context object Out: sigout: a pointer to a signature to fill with the normalized form, or copy if the input was already normalized. (can be NULL if you're only interested in whether the input was already normalized). In: sigin: a pointer to a signature to check/normalize (cannot be NULL, can be identical to sigout)</p>
<p>With ECDSA a third-party can forge a second distinct signature of the same message, given a single initial signature, but without knowing the key. This is done by negating the S value modulo the order of the curve, 'flipping' the sign of the random point R which is not included in the signature.</p>
<p>Forgery of the same message isn't universally problematic, but in systems where message malleability or uniqueness of signatures is important this can cause issues. This forgery can be blocked by all verifiers forcing signers to use a normalized form.</p>
<p>The lower-S form reduces the size of signatures slightly on average when variable length encodings (such as DER) are used and is cheap to verify, making it a good choice. Security of always using lower-S is assured because anyone can trivially modify a signature after the fact to enforce this property anyway.</p>
<p>The lower S value is always between 0x1 and 0x7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B20A0, inclusive.</p>
<p>No other forms of ECDSA malleability are known and none seem likely, but there is no formal proof that ECDSA, even with this additional restriction, is free of other malleability. Commonly used serialization schemes will also accept various non-unique encodings, so care should be taken when this property is required for an application.</p>
<p>The secp256k1_ecdsa_sign function will by default create signatures in the lower-S form, and secp256k1_ecdsa_verify will not accept others. In case signatures come from a system that cannot enforce this property, secp256k1_ecdsa_signature_normalize must be called before verification. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00278">278</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="pubkey_8cpp_source.html#l00275">CPubKey::CheckLowS()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, and <a class="el" href="pubkey_8cpp_source.html#l00167">CPubKey::Verify()</a>.</p>
</div>
</div>
<a id="a2aff2802eca3d15ec54298e879579897"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a2aff2802eca3d15ec54298e879579897">&#9670;&nbsp;</a></span>secp256k1_ecdsa_signature_parse_compact()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_signature_parse_compact </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>input64</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Parse an ECDSA signature in compact (64 bytes) format.</p>
<p>Returns: 1 when the signature could be parsed, 0 otherwise. Args: ctx: a secp256k1 context object Out: sig: a pointer to a signature object In: input64: a pointer to the 64-byte array to parse</p>
<p>The signature must consist of a 32-byte big endian R value, followed by a 32-byte big endian S value. If R or S fall outside of [0..order-1], the encoding is invalid. R and S with value 0 are allowed in the encoding.</p>
<p>After the call, sig will always be initialized. If parsing failed or R or S are zero, the resulting sig value is guaranteed to fail validation for any message and public key. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00232">232</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="pubkey_8cpp_source.html#l00026">ecdsa_signature_parse_der_lax()</a>, and <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>.</p>
</div>
</div>
<a id="a57d390dd5baa54855b0cb20628034b90"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a57d390dd5baa54855b0cb20628034b90">&#9670;&nbsp;</a></span>secp256k1_ecdsa_signature_parse_der()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_signature_parse_der </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype"><a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>input</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">size_t&#160;</td>
<td class="paramname"><em>inputlen</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Parse a DER ECDSA signature.</p>
<p>Returns: 1 when the signature could be parsed, 0 otherwise. Args: ctx: a secp256k1 context object Out: sig: a pointer to a signature object In: input: a pointer to the signature to be parsed inputlen: the length of the array pointed to be input</p>
<p>This function will accept any valid DER encoded signature, even if the encoded numbers are out of range.</p>
<p>After the call, sig will always be initialized. If parsing failed or the encoded numbers are out of range, signature validation with it is guaranteed to fail for every message and public key. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00216">216</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__verify_8c_source.html#l00024">benchmark_verify()</a>, <a class="el" href="tests_8c_source.html#l03485">test_ecdsa_der_parse()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, and <a class="el" href="recovery_2tests__impl_8h_source.html#l00069">test_ecdsa_recovery_edge_cases()</a>.</p>
</div>
</div>
<a id="af8571ca8dcfb7f892519b337504dc700"></a>
<h2 class="memtitle"><span class="permalink"><a href="#af8571ca8dcfb7f892519b337504dc700">&#9670;&nbsp;</a></span>secp256k1_ecdsa_signature_serialize_compact()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_signature_serialize_compact </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned char *&#160;</td>
<td class="paramname"><em>output64</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Serialize an ECDSA signature in compact (64 byte) format.</p>
<p>Returns: 1 Args: ctx: a secp256k1 context object Out: output64: a pointer to a 64-byte array to store the compact serialization In: sig: a pointer to an initialized signature object</p>
<p>See secp256k1_ecdsa_signature_parse_compact for details about the encoding. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00265">265</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="tests_8c_source.html#l03485">test_ecdsa_der_parse()</a>, and <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>.</p>
</div>
</div>
<a id="ac07809ca872ec967ab4d3b1a95eafe0b"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ac07809ca872ec967ab4d3b1a95eafe0b">&#9670;&nbsp;</a></span>secp256k1_ecdsa_signature_serialize_der()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> int secp256k1_ecdsa_signature_serialize_der </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">unsigned char *&#160;</td>
<td class="paramname"><em>output</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">size_t *&#160;</td>
<td class="paramname"><em>outputlen</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Serialize an ECDSA signature in DER format.</p>
<p>Returns: 1 if enough space was available to serialize, 0 otherwise Args: ctx: a secp256k1 context object Out: output: a pointer to an array to store the DER serialization In/Out: outputlen: a pointer to a length integer. Initially, this integer should be set to the length of output. After the call it will be set to the length of the serialization (even if 0 was returned). In: sig: a pointer to an initialized signature object </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00253">253</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__sign_8c_source.html#l00029">bench_sign()</a>, <a class="el" href="bench__verify_8c_source.html#l00043">main()</a>, <a class="el" href="key_8cpp_source.html#l00169">CKey::Sign()</a>, <a class="el" href="tests_8c_source.html#l03485">test_ecdsa_der_parse()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, and <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>.</p>
</div>
</div>
<a id="a41065390f9039c4140ec04999724987d"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a41065390f9039c4140ec04999724987d">&#9670;&nbsp;</a></span>secp256k1_ecdsa_verify()</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> <a class="el" href="secp256k1_8h.html#aebd5ca8fbfcbb0ba0754a46115143c2c">SECP256K1_WARN_UNUSED_RESULT</a> int secp256k1_ecdsa_verify </td>
<td>(</td>
<td class="paramtype">const <a class="el" href="secp256k1_8h.html#a282ec9e6dfec8c35955c3eb2f7476e5e">secp256k1_context</a> *&#160;</td>
<td class="paramname"><em>ctx</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__ecdsa__signature.html">secp256k1_ecdsa_signature</a> *&#160;</td>
<td class="paramname"><em>sig</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const unsigned char *&#160;</td>
<td class="paramname"><em>msg32</em>, </td>
</tr>
<tr>
<td class="paramkey"></td>
<td></td>
<td class="paramtype">const <a class="el" href="structsecp256k1__pubkey.html">secp256k1_pubkey</a> *&#160;</td>
<td class="paramname"><em>pubkey</em>&#160;</td>
</tr>
<tr>
<td></td>
<td>)</td>
<td></td><td></td>
</tr>
</table>
</div><div class="memdoc">
<p>Verify an ECDSA signature.</p>
<p>Returns: 1: correct signature 0: incorrect or unparseable signature Args: ctx: a secp256k1 context object, initialized for verification. In: sig: the signature being verified (cannot be NULL) msg32: the 32-byte message hash being verified (cannot be NULL) pubkey: pointer to an initialized public key to verify with (cannot be NULL)</p>
<p>To avoid accepting malleable signatures, only ECDSA signatures in lower-S form are accepted.</p>
<p>If you need to accept ECDSA signatures from sources that do not obey this rule, apply secp256k1_ecdsa_signature_normalize to the signature prior to validation, but be aware that doing so results in malleable signatures.</p>
<p>For details, see the comments for that function. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00297">297</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="bench__verify_8c_source.html#l00024">benchmark_verify()</a>, <a class="el" href="org__bitcoin__NativeSecp256k1_8c_source.html#l00005">Java_org_bitcoin_NativeSecp256k1_secp256k1_1ecdsa_1verify()</a>, <a class="el" href="tests_8c_source.html#l00136">run_context_tests()</a>, <a class="el" href="tests_8c_source.html#l03811">test_ecdsa_edge_cases()</a>, <a class="el" href="tests_8c_source.html#l03288">test_ecdsa_end_to_end()</a>, <a class="el" href="recovery_2tests__impl_8h_source.html#l00069">test_ecdsa_recovery_edge_cases()</a>, <a class="el" href="recovery_2tests__impl_8h_source.html#l00010">test_ecdsa_recovery_end_to_end()</a>, and <a class="el" href="pubkey_8cpp_source.html#l00167">CPubKey::Verify()</a>.</p>
</div>
</div>
<h2 class="groupheader">Variable Documentation</h2>
<a id="a22f44df7786a1be5ad93aadfed75b932"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a22f44df7786a1be5ad93aadfed75b932">&#9670;&nbsp;</a></span>secp256k1_nonce_function_default</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> const <a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a> secp256k1_nonce_function_default</td>
</tr>
</table>
</div><div class="memdoc">
<p>A default safe nonce generation function (currently equal to secp256k1_nonce_function_rfc6979). </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00347">347</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="secp256k1_8c_source.html#l00349">secp256k1_ecdsa_sign()</a>, <a class="el" href="recovery_2main__impl_8h_source.html#l00123">secp256k1_ecdsa_sign_recoverable()</a>, <a class="el" href="schnorr_2main__impl_8h_source.html#l00091">secp256k1_schnorr_generate_nonce_pair()</a>, and <a class="el" href="schnorr_2main__impl_8h_source.html#l00023">secp256k1_schnorr_sign()</a>.</p>
</div>
</div>
<a id="ac03ab067f194eb561175a6b522def2d8"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ac03ab067f194eb561175a6b522def2d8">&#9670;&nbsp;</a></span>secp256k1_nonce_function_rfc6979</h2>
<div class="memitem">
<div class="memproto">
<table class="memname">
<tr>
<td class="memname"><a class="el" href="secp256k1_8h.html#a3f1967acd0fe26283877c61b3f2694a5">SECP256K1_API</a> const <a class="el" href="secp256k1_8h.html#a539882fd91bff672712fa19a4cfaeb98">secp256k1_nonce_function</a> secp256k1_nonce_function_rfc6979</td>
</tr>
</table>
</div><div class="memdoc">
<p>An implementation of RFC6979 (using HMAC-SHA256) as nonce generation function. If a data pointer is passed, it is assumed to be a pointer to 32 bytes of extra entropy. </p>
<p class="definition">Definition at line <a class="el" href="secp256k1_8c_source.html#l00346">346</a> of file <a class="el" href="secp256k1_8c_source.html">secp256k1.c</a>.</p>
<p class="reference">Referenced by <a class="el" href="key_8cpp_source.html#l00169">CKey::Sign()</a>, and <a class="el" href="key_8cpp_source.html#l00198">CKey::SignCompact()</a>.</p>
</div>
</div>
</div><!-- contents -->
</div><!-- doc-content -->
<!-- start footer part -->
<div id="nav-path" class="navpath"><!-- id is needed for treeview function! -->
<ul>
<li class="navelem"><a class="el" href="dir_68267d1309a1af8e8297ef4c3efbcdba.html">src</a></li><li class="navelem"><a class="el" href="dir_44f34d1e62fda08bdb4ca69ab2d205ae.html">secp256k1</a></li><li class="navelem"><a class="el" href="dir_1b4df0b9bba47cf333db333897c5a5a4.html">include</a></li><li class="navelem"><a class="el" href="secp256k1_8h.html">secp256k1.h</a></li>
<li class="footer">Generated on Thu Dec 14 2017 13:15:11 for Dash Core by
<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.8.14 </li>
</ul>
</div>
</body>
</html>