From 6d822e04a1a05bf2013a7a2c15138bf715345c1b Mon Sep 17 00:00:00 2001 From: philsmd <921533+philsmd@users.noreply.github.com> Date: Thu, 5 Dec 2019 12:23:54 +0100 Subject: [PATCH] fix minor typos in inc_ecc_secp256k1.cl --- OpenCL/inc_ecc_secp256k1.cl | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/OpenCL/inc_ecc_secp256k1.cl b/OpenCL/inc_ecc_secp256k1.cl index 92551d5e5..55a4469e5 100644 --- a/OpenCL/inc_ecc_secp256k1.cl +++ b/OpenCL/inc_ecc_secp256k1.cl @@ -74,7 +74,7 @@ * // Example with window size w = 2 (i.e. mod 4 => & 3): * // 173 => 1 0 -1 0 -1 0 -1 0 1 = 2^8 - 2^6 - 2^4 - 2^2 + 1 * int e = 0b10101101; // 173 - * int z[8 + 1] = { 0 }; // our zi/di, we need one extra slot to make the substract work + * int z[8 + 1] = { 0 }; // our zi/di, we need one extra slot to make the subtraction work * * int i = 0; * @@ -1356,7 +1356,7 @@ DECLSPEC void point_get_coords (secp256k1_t *r, const u32 x[8], const u32 y[8]) t1[7] = y[7]; // we use jacobian forms and the convertion with z = 1 is basically a NO-OP: - // X = X1 * z^2 = X1, Y = Y1 * z^3 = Y + // X = X1 * z^2 = X1, Y = Y1 * z^3 = Y1 // https://eprint.iacr.org/2011/338.pdf @@ -1501,7 +1501,7 @@ DECLSPEC void point_get_coords (secp256k1_t *r, const u32 x[8], const u32 y[8]) mul_mod (t2, t1, t1); // t2 = t1^2 mul_mod (t3, t1, t2); // t3 = t1^3 - // output to y1 + // output to y2 mul_mod (t3, t3, x1); @@ -1514,7 +1514,7 @@ DECLSPEC void point_get_coords (secp256k1_t *r, const u32 x[8], const u32 y[8]) r->xy[41] = t3[1]; r->xy[40] = t3[0]; - // output to x1 + // output to x2 mul_mod (t3, t2, t4);