To all folks interested, detailed description, of .sign() is in original BloodyRookie's post:
https://bitcointalk.org/index.php?topic=397183.msg4645132#msg4645132
To understand it, you need some crypto knowledge regarding finite fields and calculation on elliptic curves.
I was one of 4 people sitting on JS implementation of the curve, so it was bit easier for me to understand change that BloodyRookie did.
There is one additional information needed to fully understand what's going on:
First one is following post from sci.crypt, by xmath (author of ORIGINAL C implementation, from which Java version was derived):
Note that there isn't actually such a thing as positive or negative in
a finite field, but you should just pick some definition. My favorite
is to define elements with the least significant bit set (when fully
reduced) to be negative, and non-zero elements with the least
significant bit clear (when fully reduced) to be positive. This makes
sure that if x is positive then -x (= p-x) is negative and vice versa.
- xmath
so basically the check that BloodyRookie is doing here:
if ((v[31] & 0x80) != 0)
{
mula_small(v, v , 0, ORDER, 32, 1);
}
check if result of
v=(x-h) is negative, and if so
multiplies adds it by group order (mentioned by doctorevil),
to get POSITIVE value of
(x-h).
That's all the magic to it. I'm going to run NRS with patched Curve from now on.
"Generated an Incorrect Block" must die