2 * Originally written by Bodo Moeller for the OpenSSL project.
4 /* ====================================================================
5 * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
19 * 3. All advertising materials mentioning features or use of this
20 * software must display the following acknowledgment:
21 * "This product includes software developed by the OpenSSL Project
22 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
24 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
25 * endorse or promote products derived from this software without
26 * prior written permission. For written permission, please contact
27 * openssl-core@openssl.org.
29 * 5. Products derived from this software may not be called "OpenSSL"
30 * nor may "OpenSSL" appear in their names without prior written
31 * permission of the OpenSSL Project.
33 * 6. Redistributions of any form whatsoever must retain the following
35 * "This product includes software developed by the OpenSSL Project
36 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
38 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
39 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
40 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
41 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
42 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
43 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
44 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
45 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
46 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
47 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
48 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49 * OF THE POSSIBILITY OF SUCH DAMAGE.
50 * ====================================================================
52 * This product includes cryptographic software written by Eric Young
53 * (eay@cryptsoft.com). This product includes software written by Tim
54 * Hudson (tjh@cryptsoft.com).
57 /* ====================================================================
58 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
59 * Binary polynomial ECC support in OpenSSL originally developed by
60 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
65 #include <openssl/err.h>
66 #include <openssl/opensslv.h>
70 /* functions for EC_GROUP objects */
72 EC_GROUP *EC_GROUP_new(const EC_METHOD *meth)
77 ECerr(EC_F_EC_GROUP_NEW, EC_R_SLOT_FULL);
80 if (meth->group_init == 0) {
81 ECerr(EC_F_EC_GROUP_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
85 ret = OPENSSL_zalloc(sizeof(*ret));
87 ECerr(EC_F_EC_GROUP_NEW, ERR_R_MALLOC_FAILURE);
92 ret->order = BN_new();
93 if (ret->order == NULL)
95 ret->cofactor = BN_new();
96 if (ret->cofactor == NULL)
98 ret->asn1_flag = OPENSSL_EC_NAMED_CURVE;
99 ret->asn1_form = POINT_CONVERSION_UNCOMPRESSED;
100 if (!meth->group_init(ret))
106 BN_free(ret->cofactor);
111 void EC_pre_comp_free(EC_GROUP *group)
113 switch (group->pre_comp_type) {
116 #ifdef ECP_NISTZ256_REFERENCE_IMPLEMENTATION
118 EC_nistz256_pre_comp_free(group->pre_comp.nistz256);
121 #ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
123 EC_nistp224_pre_comp_free(group->pre_comp.nistp224);
126 EC_nistp256_pre_comp_free(group->pre_comp.nistp256);
129 EC_nistp521_pre_comp_free(group->pre_comp.nistp521);
133 EC_ec_pre_comp_free(group->pre_comp.ec);
136 group->pre_comp.ec = NULL;
139 void EC_GROUP_free(EC_GROUP *group)
144 if (group->meth->group_finish != 0)
145 group->meth->group_finish(group);
147 EC_pre_comp_free(group);
148 BN_MONT_CTX_free(group->mont_data);
149 EC_POINT_free(group->generator);
150 BN_free(group->order);
151 BN_free(group->cofactor);
152 OPENSSL_free(group->seed);
156 void EC_GROUP_clear_free(EC_GROUP *group)
161 if (group->meth->group_clear_finish != 0)
162 group->meth->group_clear_finish(group);
163 else if (group->meth->group_finish != 0)
164 group->meth->group_finish(group);
166 EC_pre_comp_free(group);
167 BN_MONT_CTX_free(group->mont_data);
168 EC_POINT_clear_free(group->generator);
169 BN_clear_free(group->order);
170 BN_clear_free(group->cofactor);
171 OPENSSL_clear_free(group->seed, group->seed_len);
172 OPENSSL_clear_free(group, sizeof(*group));
175 int EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src)
177 if (dest->meth->group_copy == 0) {
178 ECerr(EC_F_EC_GROUP_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
181 if (dest->meth != src->meth) {
182 ECerr(EC_F_EC_GROUP_COPY, EC_R_INCOMPATIBLE_OBJECTS);
188 /* Copy precomputed */
189 dest->pre_comp_type = src->pre_comp_type;
190 switch (src->pre_comp_type) {
192 dest->pre_comp.ec = NULL;
194 #ifdef ECP_NISTZ256_REFERENCE_IMPLEMENTATION
196 dest->pre_comp.nistz256 = EC_nistz256_pre_comp_dup(src->pre_comp.nistz256);
199 #ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
201 dest->pre_comp.nistp224 = EC_nistp224_pre_comp_dup(src->pre_comp.nistp224);
204 dest->pre_comp.nistp256 = EC_nistp256_pre_comp_dup(src->pre_comp.nistp256);
207 dest->pre_comp.nistp521 = EC_nistp521_pre_comp_dup(src->pre_comp.nistp521);
211 dest->pre_comp.ec = EC_ec_pre_comp_dup(src->pre_comp.ec);
215 if (src->mont_data != NULL) {
216 if (dest->mont_data == NULL) {
217 dest->mont_data = BN_MONT_CTX_new();
218 if (dest->mont_data == NULL)
221 if (!BN_MONT_CTX_copy(dest->mont_data, src->mont_data))
224 /* src->generator == NULL */
225 BN_MONT_CTX_free(dest->mont_data);
226 dest->mont_data = NULL;
229 if (src->generator != NULL) {
230 if (dest->generator == NULL) {
231 dest->generator = EC_POINT_new(dest);
232 if (dest->generator == NULL)
235 if (!EC_POINT_copy(dest->generator, src->generator))
238 /* src->generator == NULL */
239 EC_POINT_clear_free(dest->generator);
240 dest->generator = NULL;
243 if (!BN_copy(dest->order, src->order))
245 if (!BN_copy(dest->cofactor, src->cofactor))
248 dest->curve_name = src->curve_name;
249 dest->asn1_flag = src->asn1_flag;
250 dest->asn1_form = src->asn1_form;
253 OPENSSL_free(dest->seed);
254 dest->seed = OPENSSL_malloc(src->seed_len);
255 if (dest->seed == NULL)
257 if (!memcpy(dest->seed, src->seed, src->seed_len))
259 dest->seed_len = src->seed_len;
261 OPENSSL_free(dest->seed);
266 return dest->meth->group_copy(dest, src);
269 EC_GROUP *EC_GROUP_dup(const EC_GROUP *a)
277 if ((t = EC_GROUP_new(a->meth)) == NULL)
279 if (!EC_GROUP_copy(t, a))
292 const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group)
297 int EC_METHOD_get_field_type(const EC_METHOD *meth)
299 return meth->field_type;
302 int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
303 const BIGNUM *order, const BIGNUM *cofactor)
305 if (generator == NULL) {
306 ECerr(EC_F_EC_GROUP_SET_GENERATOR, ERR_R_PASSED_NULL_PARAMETER);
310 if (group->generator == NULL) {
311 group->generator = EC_POINT_new(group);
312 if (group->generator == NULL)
315 if (!EC_POINT_copy(group->generator, generator))
319 if (!BN_copy(group->order, order))
322 BN_zero(group->order);
324 if (cofactor != NULL) {
325 if (!BN_copy(group->cofactor, cofactor))
328 BN_zero(group->cofactor);
332 * Some groups have an order with
333 * factors of two, which makes the Montgomery setup fail.
334 * |group->mont_data| will be NULL in this case.
336 if (BN_is_odd(group->order)) {
337 return ec_precompute_mont_data(group);
340 BN_MONT_CTX_free(group->mont_data);
341 group->mont_data = NULL;
345 const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group)
347 return group->generator;
350 BN_MONT_CTX *EC_GROUP_get_mont_data(const EC_GROUP *group)
352 return group->mont_data;
355 int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx)
357 if (group->order == NULL)
359 if (!BN_copy(order, group->order))
362 return !BN_is_zero(order);
365 const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group)
370 int EC_GROUP_order_bits(const EC_GROUP *group)
373 return BN_num_bits(group->order);
377 int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor,
381 if (group->cofactor == NULL)
383 if (!BN_copy(cofactor, group->cofactor))
386 return !BN_is_zero(group->cofactor);
389 const BIGNUM *EC_GROUP_get0_cofactor(const EC_GROUP *group)
391 return group->cofactor;
394 void EC_GROUP_set_curve_name(EC_GROUP *group, int nid)
396 group->curve_name = nid;
399 int EC_GROUP_get_curve_name(const EC_GROUP *group)
401 return group->curve_name;
404 void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag)
406 group->asn1_flag = flag;
409 int EC_GROUP_get_asn1_flag(const EC_GROUP *group)
411 return group->asn1_flag;
414 void EC_GROUP_set_point_conversion_form(EC_GROUP *group,
415 point_conversion_form_t form)
417 group->asn1_form = form;
420 point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP
423 return group->asn1_form;
426 size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len)
428 OPENSSL_free(group->seed);
435 if ((group->seed = OPENSSL_malloc(len)) == NULL)
437 memcpy(group->seed, p, len);
438 group->seed_len = len;
443 unsigned char *EC_GROUP_get0_seed(const EC_GROUP *group)
448 size_t EC_GROUP_get_seed_len(const EC_GROUP *group)
450 return group->seed_len;
453 int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
454 const BIGNUM *b, BN_CTX *ctx)
456 if (group->meth->group_set_curve == 0) {
457 ECerr(EC_F_EC_GROUP_SET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
460 return group->meth->group_set_curve(group, p, a, b, ctx);
463 int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
464 BIGNUM *b, BN_CTX *ctx)
466 if (group->meth->group_get_curve == 0) {
467 ECerr(EC_F_EC_GROUP_GET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
470 return group->meth->group_get_curve(group, p, a, b, ctx);
473 #ifndef OPENSSL_NO_EC2M
474 int EC_GROUP_set_curve_GF2m(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
475 const BIGNUM *b, BN_CTX *ctx)
477 if (group->meth->group_set_curve == 0) {
478 ECerr(EC_F_EC_GROUP_SET_CURVE_GF2M,
479 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
482 return group->meth->group_set_curve(group, p, a, b, ctx);
485 int EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
486 BIGNUM *b, BN_CTX *ctx)
488 if (group->meth->group_get_curve == 0) {
489 ECerr(EC_F_EC_GROUP_GET_CURVE_GF2M,
490 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
493 return group->meth->group_get_curve(group, p, a, b, ctx);
497 int EC_GROUP_get_degree(const EC_GROUP *group)
499 if (group->meth->group_get_degree == 0) {
500 ECerr(EC_F_EC_GROUP_GET_DEGREE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
503 return group->meth->group_get_degree(group);
506 int EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx)
508 if (group->meth->group_check_discriminant == 0) {
509 ECerr(EC_F_EC_GROUP_CHECK_DISCRIMINANT,
510 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
513 return group->meth->group_check_discriminant(group, ctx);
516 int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx)
519 BIGNUM *a1, *a2, *a3, *b1, *b2, *b3;
520 BN_CTX *ctx_new = NULL;
522 /* compare the field types */
523 if (EC_METHOD_get_field_type(EC_GROUP_method_of(a)) !=
524 EC_METHOD_get_field_type(EC_GROUP_method_of(b)))
526 /* compare the curve name (if present in both) */
527 if (EC_GROUP_get_curve_name(a) && EC_GROUP_get_curve_name(b) &&
528 EC_GROUP_get_curve_name(a) != EC_GROUP_get_curve_name(b))
532 ctx_new = ctx = BN_CTX_new();
537 a1 = BN_CTX_get(ctx);
538 a2 = BN_CTX_get(ctx);
539 a3 = BN_CTX_get(ctx);
540 b1 = BN_CTX_get(ctx);
541 b2 = BN_CTX_get(ctx);
542 b3 = BN_CTX_get(ctx);
545 BN_CTX_free(ctx_new);
550 * XXX This approach assumes that the external representation of curves
551 * over the same field type is the same.
553 if (!a->meth->group_get_curve(a, a1, a2, a3, ctx) ||
554 !b->meth->group_get_curve(b, b1, b2, b3, ctx))
557 if (r || BN_cmp(a1, b1) || BN_cmp(a2, b2) || BN_cmp(a3, b3))
560 /* XXX EC_POINT_cmp() assumes that the methods are equal */
561 if (r || EC_POINT_cmp(a, EC_GROUP_get0_generator(a),
562 EC_GROUP_get0_generator(b), ctx))
566 const BIGNUM *ao, *bo, *ac, *bc;
567 /* compare the order and cofactor */
568 ao = EC_GROUP_get0_order(a);
569 bo = EC_GROUP_get0_order(b);
570 ac = EC_GROUP_get0_cofactor(a);
571 bc = EC_GROUP_get0_cofactor(b);
572 if (ao == NULL || bo == NULL) {
574 BN_CTX_free(ctx_new);
577 if (BN_cmp(ao, bo) || BN_cmp(ac, bc))
582 BN_CTX_free(ctx_new);
587 /* functions for EC_POINT objects */
589 EC_POINT *EC_POINT_new(const EC_GROUP *group)
594 ECerr(EC_F_EC_POINT_NEW, ERR_R_PASSED_NULL_PARAMETER);
597 if (group->meth->point_init == 0) {
598 ECerr(EC_F_EC_POINT_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
602 ret = OPENSSL_zalloc(sizeof(*ret));
604 ECerr(EC_F_EC_POINT_NEW, ERR_R_MALLOC_FAILURE);
608 ret->meth = group->meth;
610 if (!ret->meth->point_init(ret)) {
618 void EC_POINT_free(EC_POINT *point)
623 if (point->meth->point_finish != 0)
624 point->meth->point_finish(point);
628 void EC_POINT_clear_free(EC_POINT *point)
633 if (point->meth->point_clear_finish != 0)
634 point->meth->point_clear_finish(point);
635 else if (point->meth->point_finish != 0)
636 point->meth->point_finish(point);
637 OPENSSL_clear_free(point, sizeof(*point));
640 int EC_POINT_copy(EC_POINT *dest, const EC_POINT *src)
642 if (dest->meth->point_copy == 0) {
643 ECerr(EC_F_EC_POINT_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
646 if (dest->meth != src->meth) {
647 ECerr(EC_F_EC_POINT_COPY, EC_R_INCOMPATIBLE_OBJECTS);
652 return dest->meth->point_copy(dest, src);
655 EC_POINT *EC_POINT_dup(const EC_POINT *a, const EC_GROUP *group)
663 t = EC_POINT_new(group);
666 r = EC_POINT_copy(t, a);
674 const EC_METHOD *EC_POINT_method_of(const EC_POINT *point)
679 int EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point)
681 if (group->meth->point_set_to_infinity == 0) {
682 ECerr(EC_F_EC_POINT_SET_TO_INFINITY,
683 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
686 if (group->meth != point->meth) {
687 ECerr(EC_F_EC_POINT_SET_TO_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
690 return group->meth->point_set_to_infinity(group, point);
693 int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group,
694 EC_POINT *point, const BIGNUM *x,
695 const BIGNUM *y, const BIGNUM *z,
698 if (group->meth->point_set_Jprojective_coordinates_GFp == 0) {
699 ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
700 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
703 if (group->meth != point->meth) {
704 ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
705 EC_R_INCOMPATIBLE_OBJECTS);
708 return group->meth->point_set_Jprojective_coordinates_GFp(group, point, x,
712 int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group,
713 const EC_POINT *point, BIGNUM *x,
714 BIGNUM *y, BIGNUM *z,
717 if (group->meth->point_get_Jprojective_coordinates_GFp == 0) {
718 ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
719 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
722 if (group->meth != point->meth) {
723 ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
724 EC_R_INCOMPATIBLE_OBJECTS);
727 return group->meth->point_get_Jprojective_coordinates_GFp(group, point, x,
731 int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group,
732 EC_POINT *point, const BIGNUM *x,
733 const BIGNUM *y, BN_CTX *ctx)
735 if (group->meth->point_set_affine_coordinates == 0) {
736 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP,
737 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
740 if (group->meth != point->meth) {
741 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP,
742 EC_R_INCOMPATIBLE_OBJECTS);
745 return group->meth->point_set_affine_coordinates(group, point, x, y, ctx);
748 #ifndef OPENSSL_NO_EC2M
749 int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *group,
750 EC_POINT *point, const BIGNUM *x,
751 const BIGNUM *y, BN_CTX *ctx)
753 if (group->meth->point_set_affine_coordinates == 0) {
754 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M,
755 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
758 if (group->meth != point->meth) {
759 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M,
760 EC_R_INCOMPATIBLE_OBJECTS);
763 return group->meth->point_set_affine_coordinates(group, point, x, y, ctx);
767 int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group,
768 const EC_POINT *point, BIGNUM *x,
769 BIGNUM *y, BN_CTX *ctx)
771 if (group->meth->point_get_affine_coordinates == 0) {
772 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP,
773 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
776 if (group->meth != point->meth) {
777 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP,
778 EC_R_INCOMPATIBLE_OBJECTS);
781 return group->meth->point_get_affine_coordinates(group, point, x, y, ctx);
784 #ifndef OPENSSL_NO_EC2M
785 int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *group,
786 const EC_POINT *point, BIGNUM *x,
787 BIGNUM *y, BN_CTX *ctx)
789 if (group->meth->point_get_affine_coordinates == 0) {
790 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M,
791 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
794 if (group->meth != point->meth) {
795 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M,
796 EC_R_INCOMPATIBLE_OBJECTS);
799 return group->meth->point_get_affine_coordinates(group, point, x, y, ctx);
803 int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
804 const EC_POINT *b, BN_CTX *ctx)
806 if (group->meth->add == 0) {
807 ECerr(EC_F_EC_POINT_ADD, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
810 if ((group->meth != r->meth) || (r->meth != a->meth)
811 || (a->meth != b->meth)) {
812 ECerr(EC_F_EC_POINT_ADD, EC_R_INCOMPATIBLE_OBJECTS);
815 return group->meth->add(group, r, a, b, ctx);
818 int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
821 if (group->meth->dbl == 0) {
822 ECerr(EC_F_EC_POINT_DBL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
825 if ((group->meth != r->meth) || (r->meth != a->meth)) {
826 ECerr(EC_F_EC_POINT_DBL, EC_R_INCOMPATIBLE_OBJECTS);
829 return group->meth->dbl(group, r, a, ctx);
832 int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx)
834 if (group->meth->invert == 0) {
835 ECerr(EC_F_EC_POINT_INVERT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
838 if (group->meth != a->meth) {
839 ECerr(EC_F_EC_POINT_INVERT, EC_R_INCOMPATIBLE_OBJECTS);
842 return group->meth->invert(group, a, ctx);
845 int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *point)
847 if (group->meth->is_at_infinity == 0) {
848 ECerr(EC_F_EC_POINT_IS_AT_INFINITY,
849 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
852 if (group->meth != point->meth) {
853 ECerr(EC_F_EC_POINT_IS_AT_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
856 return group->meth->is_at_infinity(group, point);
860 * Check whether an EC_POINT is on the curve or not. Note that the return
861 * value for this function should NOT be treated as a boolean. Return values:
862 * 1: The point is on the curve
863 * 0: The point is not on the curve
864 * -1: An error occurred
866 int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point,
869 if (group->meth->is_on_curve == 0) {
870 ECerr(EC_F_EC_POINT_IS_ON_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
873 if (group->meth != point->meth) {
874 ECerr(EC_F_EC_POINT_IS_ON_CURVE, EC_R_INCOMPATIBLE_OBJECTS);
877 return group->meth->is_on_curve(group, point, ctx);
880 int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b,
883 if (group->meth->point_cmp == 0) {
884 ECerr(EC_F_EC_POINT_CMP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
887 if ((group->meth != a->meth) || (a->meth != b->meth)) {
888 ECerr(EC_F_EC_POINT_CMP, EC_R_INCOMPATIBLE_OBJECTS);
891 return group->meth->point_cmp(group, a, b, ctx);
894 int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx)
896 if (group->meth->make_affine == 0) {
897 ECerr(EC_F_EC_POINT_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
900 if (group->meth != point->meth) {
901 ECerr(EC_F_EC_POINT_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
904 return group->meth->make_affine(group, point, ctx);
907 int EC_POINTs_make_affine(const EC_GROUP *group, size_t num,
908 EC_POINT *points[], BN_CTX *ctx)
912 if (group->meth->points_make_affine == 0) {
913 ECerr(EC_F_EC_POINTS_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
916 for (i = 0; i < num; i++) {
917 if (group->meth != points[i]->meth) {
918 ECerr(EC_F_EC_POINTS_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
922 return group->meth->points_make_affine(group, num, points, ctx);
926 * Functions for point multiplication. If group->meth->mul is 0, we use the
927 * wNAF-based implementations in ec_mult.c; otherwise we dispatch through
931 int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
932 size_t num, const EC_POINT *points[],
933 const BIGNUM *scalars[], BN_CTX *ctx)
935 if (group->meth->mul == 0)
937 return ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx);
939 return group->meth->mul(group, r, scalar, num, points, scalars, ctx);
942 int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar,
943 const EC_POINT *point, const BIGNUM *p_scalar, BN_CTX *ctx)
945 /* just a convenient interface to EC_POINTs_mul() */
947 const EC_POINT *points[1];
948 const BIGNUM *scalars[1];
951 scalars[0] = p_scalar;
953 return EC_POINTs_mul(group, r, g_scalar,
955 && p_scalar != NULL), points, scalars, ctx);
958 int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx)
960 if (group->meth->mul == 0)
962 return ec_wNAF_precompute_mult(group, ctx);
964 if (group->meth->precompute_mult != 0)
965 return group->meth->precompute_mult(group, ctx);
967 return 1; /* nothing to do, so report success */
970 int EC_GROUP_have_precompute_mult(const EC_GROUP *group)
972 if (group->meth->mul == 0)
974 return ec_wNAF_have_precompute_mult(group);
976 if (group->meth->have_precompute_mult != 0)
977 return group->meth->have_precompute_mult(group);
979 return 0; /* cannot tell whether precomputation has
984 * ec_precompute_mont_data sets |group->mont_data| from |group->order| and
985 * returns one on success. On error it returns zero.
987 int ec_precompute_mont_data(EC_GROUP *group)
989 BN_CTX *ctx = BN_CTX_new();
992 BN_MONT_CTX_free(group->mont_data);
993 group->mont_data = NULL;
998 group->mont_data = BN_MONT_CTX_new();
999 if (group->mont_data == NULL)
1002 if (!BN_MONT_CTX_set(group->mont_data, group->order, ctx)) {
1003 BN_MONT_CTX_free(group->mont_data);
1004 group->mont_data = NULL;
1016 int EC_KEY_set_ex_data(EC_KEY *key, int idx, void *arg)
1018 return CRYPTO_set_ex_data(&key->ex_data, idx, arg);
1021 void *EC_KEY_get_ex_data(const EC_KEY *key, int idx)
1023 return CRYPTO_get_ex_data(&key->ex_data, idx);