Skip to content

Commit 126501f

Browse files
committed
modules: Port bitcoin-core/secp256k1#1815 to zkp-specific code
1 parent 3b2ceb3 commit 126501f

5 files changed

Lines changed: 15 additions & 15 deletions

File tree

src/modules/bppp/main_impl.h

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ secp256k1_bppp_generators *secp256k1_bppp_generators_create(const secp256k1_cont
2323

2424
VERIFY_CHECK(ctx != NULL);
2525

26-
ret = (secp256k1_bppp_generators *)checked_malloc(&ctx->error_callback, sizeof(*ret));
26+
ret = checked_malloc(&ctx->error_callback, sizeof(*ret));
2727
if (ret == NULL) {
2828
return NULL;
2929
}
30-
ret->gens = (secp256k1_ge*)checked_malloc(&ctx->error_callback, n * sizeof(*ret->gens));
30+
ret->gens = checked_malloc(&ctx->error_callback, n * sizeof(*ret->gens));
3131
if (ret->gens == NULL) {
3232
free(ret);
3333
return NULL;
@@ -60,12 +60,12 @@ secp256k1_bppp_generators* secp256k1_bppp_generators_parse(const secp256k1_conte
6060
return NULL;
6161
}
6262

63-
ret = (secp256k1_bppp_generators *)checked_malloc(&ctx->error_callback, sizeof(*ret));
63+
ret = checked_malloc(&ctx->error_callback, sizeof(*ret));
6464
if (ret == NULL) {
6565
return NULL;
6666
}
6767
ret->n = n;
68-
ret->gens = (secp256k1_ge*)checked_malloc(&ctx->error_callback, n * sizeof(*ret->gens));
68+
ret->gens = checked_malloc(&ctx->error_callback, n * sizeof(*ret->gens));
6969
if (ret->gens == NULL) {
7070
free(ret);
7171
return NULL;

src/modules/bppp/tests_impl.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -514,12 +514,12 @@ secp256k1_bppp_generators* bppp_generators_parse_regular(const unsigned char* da
514514
return NULL;
515515
}
516516

517-
ret = (secp256k1_bppp_generators *)checked_malloc(&CTX->error_callback, sizeof(*ret));
517+
ret = checked_malloc(&CTX->error_callback, sizeof(*ret));
518518
if (ret == NULL) {
519519
return NULL;
520520
}
521521
ret->n = n;
522-
ret->gens = (secp256k1_ge*)checked_malloc(&CTX->error_callback, n * sizeof(*ret->gens));
522+
ret->gens = checked_malloc(&CTX->error_callback, n * sizeof(*ret->gens));
523523
if (ret->gens == NULL) {
524524
free(ret);
525525
return NULL;

src/modules/rangeproof/tests_impl.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -544,8 +544,8 @@ static void test_multiple_generators(void) {
544544
secp256k1_scalar_get_b32(generator_seed, &s);
545545
/* Create all the needed generators */
546546
for (i = 0; i < n_generators; i++) {
547-
generator_blind[i] = (unsigned char*) malloc(32);
548-
pedersen_blind[i] = (unsigned char*) malloc(32);
547+
generator_blind[i] = malloc(32);
548+
pedersen_blind[i] = malloc(32);
549549

550550
testutil_random_scalar_order(&s);
551551
secp256k1_scalar_get_b32(generator_blind[i], &s);

src/modules/surjection/main_impl.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ int secp256k1_surjectionproof_allocate_initialized(const secp256k1_context* ctx,
182182
ARG_CHECK(proof_out_p != NULL);
183183
*proof_out_p = 0;
184184

185-
proof = (secp256k1_surjectionproof*)checked_malloc(&ctx->error_callback, sizeof(secp256k1_surjectionproof));
185+
proof = checked_malloc(&ctx->error_callback, sizeof(secp256k1_surjectionproof));
186186
if (proof != NULL) {
187187
ret = secp256k1_surjectionproof_initialize(ctx, proof, input_index, fixed_input_tags, n_input_tags, n_input_tags_to_use, fixed_output_tag, n_max_iterations, random_seed32);
188188
if (ret) {

src/modules/whitelist/tests_impl.h

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ static void test_whitelist_end_to_end_internal(const unsigned char *summed_secke
4343
}
4444

4545
static void test_whitelist_end_to_end(const size_t n_keys, int test_all_keys) {
46-
unsigned char **online_seckey = (unsigned char **) malloc(n_keys * sizeof(*online_seckey));
47-
unsigned char **summed_seckey = (unsigned char **) malloc(n_keys * sizeof(*summed_seckey));
48-
secp256k1_pubkey *online_pubkeys = (secp256k1_pubkey *) malloc(n_keys * sizeof(*online_pubkeys));
49-
secp256k1_pubkey *offline_pubkeys = (secp256k1_pubkey *) malloc(n_keys * sizeof(*offline_pubkeys));
46+
unsigned char **online_seckey = malloc(n_keys * sizeof(*online_seckey));
47+
unsigned char **summed_seckey = malloc(n_keys * sizeof(*summed_seckey));
48+
secp256k1_pubkey *online_pubkeys = malloc(n_keys * sizeof(*online_pubkeys));
49+
secp256k1_pubkey *offline_pubkeys = malloc(n_keys * sizeof(*offline_pubkeys));
5050

5151
secp256k1_scalar ssub;
5252
unsigned char csub[32];
@@ -63,8 +63,8 @@ static void test_whitelist_end_to_end(const size_t n_keys, int test_all_keys) {
6363
for (i = 0; i < n_keys; i++) {
6464
secp256k1_scalar son, soff;
6565

66-
online_seckey[i] = (unsigned char *) malloc(32);
67-
summed_seckey[i] = (unsigned char *) malloc(32);
66+
online_seckey[i] = malloc(32);
67+
summed_seckey[i] = malloc(32);
6868

6969
/* Create two keys */
7070
testutil_random_scalar_order_test(&son);

0 commit comments

Comments
 (0)