diff --git a/waksman/src/ecdsa.rs b/waksman/src/ecdsa.rs index 199a8c56..362fbc6d 100644 --- a/waksman/src/ecdsa.rs +++ b/waksman/src/ecdsa.rs @@ -25,9 +25,13 @@ impl, const D: usize> CircuitBuilder { self.split_le(hashed, num_bits) } - pub fn hash_to_scalar(&mut self, x: Target, num_bits: usize) -> NonNativeTarget { + pub fn hash_to_scalar( + &mut self, + x: Target, + num_bits: usize, + ) -> NonNativeTarget { let h_bits = self.hash_to_bits(x, num_bits); - + let two = self.two(); let mut rev_bits = h_bits.iter().rev(); let mut sum = rev_bits.next().unwrap().target; @@ -35,9 +39,7 @@ impl, const D: usize> CircuitBuilder { sum = self.mul_add(two, sum, bit.target); } let limbs = vec![U32Target(sum)]; - let value = BigUintTarget { - limbs, - }; + let value = BigUintTarget { limbs }; NonNativeTarget { value, @@ -45,7 +47,12 @@ impl, const D: usize> CircuitBuilder { } } - pub fn verify_message(&mut self, msg: Target, sig: ECDSASignatureTarget, pk: ECDSAPublicKeyTarget) { + pub fn verify_message( + &mut self, + msg: Target, + sig: ECDSASignatureTarget, + pk: ECDSAPublicKeyTarget, + ) { let ECDSASignatureTarget { r, s } = sig; let h = self.hash_to_scalar::(msg, 32); @@ -72,7 +79,7 @@ mod tests { use anyhow::Result; use crate::curve::curve_types::{Curve, CurveScalar}; - use crate::curve::ecdsa::{ECDSAPublicKey, ECDSASecretKey, ECDSASignature, sign_message}; + use crate::curve::ecdsa::{sign_message, ECDSAPublicKey, ECDSASecretKey, ECDSASignature}; use crate::curve::secp256k1::Secp256K1; use crate::field::field_types::Field; use crate::field::goldilocks_field::GoldilocksField; @@ -96,7 +103,7 @@ mod tests { let msg = F::rand(); let msg_target = builder.constant(msg); - + let sk = ECDSASecretKey::(Secp256K1Scalar::rand()); let pk = ECDSAPublicKey((CurveScalar(sk.0) * C::GENERATOR_PROJECTIVE).to_affine());