]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/ec/ec_lib.c
RT3095: allow NULL key for single-shot HMAC
[thirdparty/openssl.git] / crypto / ec / ec_lib.c
CommitLineData
35b73a1f
BM
1/*
2 * Originally written by Bodo Moeller for the OpenSSL project.
3 */
65e81670 4/* ====================================================================
37c660ff 5 * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
65e81670
BM
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 *
11 * 1. Redistributions of source code must retain the above copyright
0f113f3e 12 * notice, this list of conditions and the following disclaimer.
65e81670
BM
13 *
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
17 * distribution.
18 *
19 * 3. All advertising materials mentioning features or use of this
20 * software must display the following acknowledgment:
21 * "This product includes software developed by the OpenSSL Project
22 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
23 *
24 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
25 * endorse or promote products derived from this software without
26 * prior written permission. For written permission, please contact
27 * openssl-core@openssl.org.
28 *
29 * 5. Products derived from this software may not be called "OpenSSL"
30 * nor may "OpenSSL" appear in their names without prior written
31 * permission of the OpenSSL Project.
32 *
33 * 6. Redistributions of any form whatsoever must retain the following
34 * acknowledgment:
35 * "This product includes software developed by the OpenSSL Project
36 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
37 *
38 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
39 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
40 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
41 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
42 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
43 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
44 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
45 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
46 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
47 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
48 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49 * OF THE POSSIBILITY OF SUCH DAMAGE.
50 * ====================================================================
51 *
52 * This product includes cryptographic software written by Eric Young
53 * (eay@cryptsoft.com). This product includes software written by Tim
54 * Hudson (tjh@cryptsoft.com).
55 *
56 */
7793f30e
BM
57/* ====================================================================
58 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
0f113f3e 59 * Binary polynomial ECC support in OpenSSL originally developed by
7793f30e
BM
60 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
61 */
65e81670 62
c4b36ff4
BM
63#include <string.h>
64
0657bf9c 65#include <openssl/err.h>
bb62a8b0 66#include <openssl/opensslv.h>
0657bf9c 67
65e81670 68#include "ec_lcl.h"
0657bf9c 69
0657bf9c
BM
70/* functions for EC_GROUP objects */
71
72EC_GROUP *EC_GROUP_new(const EC_METHOD *meth)
0f113f3e
MC
73{
74 EC_GROUP *ret;
75
76 if (meth == NULL) {
77 ECerr(EC_F_EC_GROUP_NEW, EC_R_SLOT_FULL);
78 return NULL;
79 }
80 if (meth->group_init == 0) {
81 ECerr(EC_F_EC_GROUP_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
82 return NULL;
83 }
84
64b25758 85 ret = OPENSSL_zalloc(sizeof(*ret));
0f113f3e
MC
86 if (ret == NULL) {
87 ECerr(EC_F_EC_GROUP_NEW, ERR_R_MALLOC_FAILURE);
88 return NULL;
89 }
90
91 ret->meth = meth;
0f113f3e 92 ret->order = BN_new();
90945fa3 93 if (ret->order == NULL)
0f113f3e
MC
94 goto err;
95 ret->cofactor = BN_new();
90945fa3 96 if (ret->cofactor == NULL)
0f113f3e 97 goto err;
86f300d3 98 ret->asn1_flag = OPENSSL_EC_NAMED_CURVE;
0f113f3e 99 ret->asn1_form = POINT_CONVERSION_UNCOMPRESSED;
0f113f3e
MC
100 if (!meth->group_init(ret))
101 goto err;
0f113f3e 102 return ret;
64b25758 103
0f113f3e 104 err:
23a1d5e9
RS
105 BN_free(ret->order);
106 BN_free(ret->cofactor);
0f113f3e
MC
107 OPENSSL_free(ret);
108 return NULL;
109}
0657bf9c 110
2c52ac9b 111void EC_pre_comp_free(EC_GROUP *group)
3aef36ff
RS
112{
113 switch (group->pre_comp_type) {
114 default:
115 break;
e69aa800 116#ifdef ECP_NISTZ256_REFERENCE_IMPLEMENTATION
3aef36ff
RS
117 case pct_nistz256:
118 EC_nistz256_pre_comp_free(group->pre_comp.nistz256);
119 break;
e69aa800 120#endif
3aef36ff
RS
121#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
122 case pct_nistp224:
123 EC_nistp224_pre_comp_free(group->pre_comp.nistp224);
124 break;
125 case pct_nistp256:
126 EC_nistp256_pre_comp_free(group->pre_comp.nistp256);
127 break;
128 case pct_nistp521:
129 EC_nistp521_pre_comp_free(group->pre_comp.nistp521);
130 break;
131#endif
132 case pct_ec:
133 EC_ec_pre_comp_free(group->pre_comp.ec);
134 break;
135 }
136 group->pre_comp.ec = NULL;
137}
138
0657bf9c 139void EC_GROUP_free(EC_GROUP *group)
0f113f3e
MC
140{
141 if (!group)
142 return;
7711de24 143
0f113f3e
MC
144 if (group->meth->group_finish != 0)
145 group->meth->group_finish(group);
df9cc153 146
2c52ac9b 147 EC_pre_comp_free(group);
23a1d5e9 148 BN_MONT_CTX_free(group->mont_data);
8fdc3734 149 EC_POINT_free(group->generator);
0f113f3e
MC
150 BN_free(group->order);
151 BN_free(group->cofactor);
25aaa98a 152 OPENSSL_free(group->seed);
0f113f3e
MC
153 OPENSSL_free(group);
154}
0657bf9c
BM
155
156void EC_GROUP_clear_free(EC_GROUP *group)
0f113f3e
MC
157{
158 if (!group)
159 return;
df9cc153 160
0f113f3e
MC
161 if (group->meth->group_clear_finish != 0)
162 group->meth->group_clear_finish(group);
163 else if (group->meth->group_finish != 0)
164 group->meth->group_finish(group);
df9cc153 165
2c52ac9b 166 EC_pre_comp_free(group);
23a1d5e9 167 BN_MONT_CTX_free(group->mont_data);
8fdc3734 168 EC_POINT_clear_free(group->generator);
0f113f3e
MC
169 BN_clear_free(group->order);
170 BN_clear_free(group->cofactor);
4b45c6e5 171 OPENSSL_clear_free(group->seed, group->seed_len);
b4faea50 172 OPENSSL_clear_free(group, sizeof(*group));
0f113f3e 173}
0657bf9c
BM
174
175int EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src)
0f113f3e 176{
0f113f3e
MC
177 if (dest->meth->group_copy == 0) {
178 ECerr(EC_F_EC_GROUP_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
179 return 0;
180 }
181 if (dest->meth != src->meth) {
182 ECerr(EC_F_EC_GROUP_COPY, EC_R_INCOMPATIBLE_OBJECTS);
183 return 0;
184 }
185 if (dest == src)
186 return 1;
187
3aef36ff
RS
188 /* Copy precomputed */
189 dest->pre_comp_type = src->pre_comp_type;
190 switch (src->pre_comp_type) {
191 default:
192 dest->pre_comp.ec = NULL;
193 break;
e69aa800 194#ifdef ECP_NISTZ256_REFERENCE_IMPLEMENTATION
3aef36ff
RS
195 case pct_nistz256:
196 dest->pre_comp.nistz256 = EC_nistz256_pre_comp_dup(src->pre_comp.nistz256);
197 break;
e69aa800 198#endif
3aef36ff
RS
199#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
200 case pct_nistp224:
201 dest->pre_comp.nistp224 = EC_nistp224_pre_comp_dup(src->pre_comp.nistp224);
202 break;
203 case pct_nistp256:
204 dest->pre_comp.nistp256 = EC_nistp256_pre_comp_dup(src->pre_comp.nistp256);
205 break;
206 case pct_nistp521:
207 dest->pre_comp.nistp521 = EC_nistp521_pre_comp_dup(src->pre_comp.nistp521);
208 break;
209#endif
210 case pct_ec:
211 dest->pre_comp.ec = EC_ec_pre_comp_dup(src->pre_comp.ec);
212 break;
0f113f3e
MC
213 }
214
215 if (src->mont_data != NULL) {
216 if (dest->mont_data == NULL) {
217 dest->mont_data = BN_MONT_CTX_new();
218 if (dest->mont_data == NULL)
219 return 0;
220 }
221 if (!BN_MONT_CTX_copy(dest->mont_data, src->mont_data))
222 return 0;
223 } else {
224 /* src->generator == NULL */
23a1d5e9
RS
225 BN_MONT_CTX_free(dest->mont_data);
226 dest->mont_data = NULL;
0f113f3e 227 }
0657bf9c 228
0f113f3e
MC
229 if (src->generator != NULL) {
230 if (dest->generator == NULL) {
231 dest->generator = EC_POINT_new(dest);
232 if (dest->generator == NULL)
233 return 0;
234 }
235 if (!EC_POINT_copy(dest->generator, src->generator))
236 return 0;
237 } else {
238 /* src->generator == NULL */
8fdc3734
RS
239 EC_POINT_clear_free(dest->generator);
240 dest->generator = NULL;
0f113f3e
MC
241 }
242
243 if (!BN_copy(dest->order, src->order))
244 return 0;
245 if (!BN_copy(dest->cofactor, src->cofactor))
246 return 0;
247
248 dest->curve_name = src->curve_name;
249 dest->asn1_flag = src->asn1_flag;
250 dest->asn1_form = src->asn1_form;
251
252 if (src->seed) {
b548a1f1 253 OPENSSL_free(dest->seed);
0f113f3e
MC
254 dest->seed = OPENSSL_malloc(src->seed_len);
255 if (dest->seed == NULL)
256 return 0;
257 if (!memcpy(dest->seed, src->seed, src->seed_len))
258 return 0;
259 dest->seed_len = src->seed_len;
260 } else {
b548a1f1 261 OPENSSL_free(dest->seed);
0f113f3e
MC
262 dest->seed = NULL;
263 dest->seed_len = 0;
264 }
265
266 return dest->meth->group_copy(dest, src);
267}
0657bf9c 268
7793f30e 269EC_GROUP *EC_GROUP_dup(const EC_GROUP *a)
0f113f3e
MC
270{
271 EC_GROUP *t = NULL;
272 int ok = 0;
7793f30e 273
0f113f3e
MC
274 if (a == NULL)
275 return NULL;
7793f30e 276
0f113f3e
MC
277 if ((t = EC_GROUP_new(a->meth)) == NULL)
278 return (NULL);
279 if (!EC_GROUP_copy(t, a))
280 goto err;
7793f30e 281
0f113f3e 282 ok = 1;
7793f30e 283
0f113f3e
MC
284 err:
285 if (!ok) {
8fdc3734 286 EC_GROUP_free(t);
0f113f3e 287 return NULL;
8fdc3734 288 }
0f113f3e
MC
289 return t;
290}
7793f30e 291
48fe4d62 292const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group)
0f113f3e
MC
293{
294 return group->meth;
295}
48fe4d62 296
458c2917 297int EC_METHOD_get_field_type(const EC_METHOD *meth)
0f113f3e
MC
298{
299 return meth->field_type;
300}
301
302int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
303 const BIGNUM *order, const BIGNUM *cofactor)
304{
305 if (generator == NULL) {
306 ECerr(EC_F_EC_GROUP_SET_GENERATOR, ERR_R_PASSED_NULL_PARAMETER);
307 return 0;
308 }
309
310 if (group->generator == NULL) {
311 group->generator = EC_POINT_new(group);
312 if (group->generator == NULL)
313 return 0;
314 }
315 if (!EC_POINT_copy(group->generator, generator))
316 return 0;
317
318 if (order != NULL) {
319 if (!BN_copy(group->order, order))
320 return 0;
321 } else
322 BN_zero(group->order);
323
324 if (cofactor != NULL) {
325 if (!BN_copy(group->cofactor, cofactor))
326 return 0;
327 } else
328 BN_zero(group->cofactor);
329
330 /*
331 * We ignore the return value because some groups have an order with
332 * factors of two, which makes the Montgomery setup fail.
333 * |group->mont_data| will be NULL in this case.
334 */
335 ec_precompute_mont_data(group);
336
337 return 1;
338}
bb62a8b0 339
9dd84053 340const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group)
0f113f3e
MC
341{
342 return group->generator;
343}
bb62a8b0 344
f54be179 345BN_MONT_CTX *EC_GROUP_get_mont_data(const EC_GROUP *group)
0f113f3e
MC
346{
347 return group->mont_data;
348}
bb62a8b0 349
b6db386f 350int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx)
0f113f3e 351{
be2e334f
DSH
352 if (group->order == NULL)
353 return 0;
0f113f3e
MC
354 if (!BN_copy(order, group->order))
355 return 0;
0657bf9c 356
0f113f3e
MC
357 return !BN_is_zero(order);
358}
0657bf9c 359
be2e334f
DSH
360const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group)
361{
362 return group->order;
363}
364
365int EC_GROUP_order_bits(const EC_GROUP *group)
366{
367 if (group->order)
368 return BN_num_bits(group->order);
369 return 0;
370}
371
0f113f3e
MC
372int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor,
373 BN_CTX *ctx)
374{
be2e334f
DSH
375
376 if (group->cofactor == NULL)
377 return 0;
0f113f3e
MC
378 if (!BN_copy(cofactor, group->cofactor))
379 return 0;
48fe4d62 380
0f113f3e
MC
381 return !BN_is_zero(group->cofactor);
382}
48fe4d62 383
be2e334f
DSH
384const BIGNUM *EC_GROUP_get0_cofactor(const EC_GROUP *group)
385{
386 return group->cofactor;
387}
388
7dc17a6c 389void EC_GROUP_set_curve_name(EC_GROUP *group, int nid)
0f113f3e
MC
390{
391 group->curve_name = nid;
392}
b6db386f 393
7dc17a6c 394int EC_GROUP_get_curve_name(const EC_GROUP *group)
0f113f3e
MC
395{
396 return group->curve_name;
397}
b6db386f 398
458c2917 399void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag)
0f113f3e
MC
400{
401 group->asn1_flag = flag;
402}
458c2917
BM
403
404int EC_GROUP_get_asn1_flag(const EC_GROUP *group)
0f113f3e
MC
405{
406 return group->asn1_flag;
407}
458c2917 408
0f113f3e 409void EC_GROUP_set_point_conversion_form(EC_GROUP *group,
254ef80d 410 point_conversion_form_t form)
0f113f3e
MC
411{
412 group->asn1_form = form;
413}
254ef80d 414
0f113f3e
MC
415point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP
416 *group)
417{
418 return group->asn1_form;
419}
254ef80d 420
5f3d6f70 421size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len)
0f113f3e 422{
b548a1f1
RS
423 OPENSSL_free(group->seed);
424 group->seed = NULL;
425 group->seed_len = 0;
5f3d6f70 426
0f113f3e
MC
427 if (!len || !p)
428 return 1;
5f3d6f70 429
0f113f3e
MC
430 if ((group->seed = OPENSSL_malloc(len)) == NULL)
431 return 0;
432 memcpy(group->seed, p, len);
433 group->seed_len = len;
5f3d6f70 434
0f113f3e
MC
435 return len;
436}
5f3d6f70
BM
437
438unsigned char *EC_GROUP_get0_seed(const EC_GROUP *group)
0f113f3e
MC
439{
440 return group->seed;
441}
5f3d6f70
BM
442
443size_t EC_GROUP_get_seed_len(const EC_GROUP *group)
0f113f3e
MC
444{
445 return group->seed_len;
446}
447
448int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
449 const BIGNUM *b, BN_CTX *ctx)
450{
451 if (group->meth->group_set_curve == 0) {
452 ECerr(EC_F_EC_GROUP_SET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
453 return 0;
454 }
455 return group->meth->group_set_curve(group, p, a, b, ctx);
456}
457
458int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
459 BIGNUM *b, BN_CTX *ctx)
460{
461 if (group->meth->group_get_curve == 0) {
462 ECerr(EC_F_EC_GROUP_GET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
463 return 0;
464 }
465 return group->meth->group_get_curve(group, p, a, b, ctx);
466}
7793f30e 467
b3310161 468#ifndef OPENSSL_NO_EC2M
0f113f3e
MC
469int EC_GROUP_set_curve_GF2m(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
470 const BIGNUM *b, BN_CTX *ctx)
471{
472 if (group->meth->group_set_curve == 0) {
473 ECerr(EC_F_EC_GROUP_SET_CURVE_GF2M,
474 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
475 return 0;
476 }
477 return group->meth->group_set_curve(group, p, a, b, ctx);
478}
479
480int EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
481 BIGNUM *b, BN_CTX *ctx)
482{
483 if (group->meth->group_get_curve == 0) {
484 ECerr(EC_F_EC_GROUP_GET_CURVE_GF2M,
485 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
486 return 0;
487 }
488 return group->meth->group_get_curve(group, p, a, b, ctx);
489}
b3310161 490#endif
7793f30e
BM
491
492int EC_GROUP_get_degree(const EC_GROUP *group)
0f113f3e
MC
493{
494 if (group->meth->group_get_degree == 0) {
495 ECerr(EC_F_EC_GROUP_GET_DEGREE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
496 return 0;
497 }
498 return group->meth->group_get_degree(group);
499}
48fe4d62 500
17d6bb81 501int EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx)
0f113f3e
MC
502{
503 if (group->meth->group_check_discriminant == 0) {
504 ECerr(EC_F_EC_GROUP_CHECK_DISCRIMINANT,
505 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
506 return 0;
507 }
508 return group->meth->group_check_discriminant(group, ctx);
509}
af28dd6c 510
ada0e717 511int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx)
0f113f3e
MC
512{
513 int r = 0;
514 BIGNUM *a1, *a2, *a3, *b1, *b2, *b3;
515 BN_CTX *ctx_new = NULL;
516
517 /* compare the field types */
518 if (EC_METHOD_get_field_type(EC_GROUP_method_of(a)) !=
519 EC_METHOD_get_field_type(EC_GROUP_method_of(b)))
520 return 1;
521 /* compare the curve name (if present in both) */
522 if (EC_GROUP_get_curve_name(a) && EC_GROUP_get_curve_name(b) &&
523 EC_GROUP_get_curve_name(a) != EC_GROUP_get_curve_name(b))
524 return 1;
525
90945fa3 526 if (ctx == NULL)
0f113f3e 527 ctx_new = ctx = BN_CTX_new();
90945fa3 528 if (ctx == NULL)
0f113f3e
MC
529 return -1;
530
531 BN_CTX_start(ctx);
532 a1 = BN_CTX_get(ctx);
533 a2 = BN_CTX_get(ctx);
534 a3 = BN_CTX_get(ctx);
535 b1 = BN_CTX_get(ctx);
536 b2 = BN_CTX_get(ctx);
537 b3 = BN_CTX_get(ctx);
90945fa3 538 if (b3 == NULL) {
0f113f3e 539 BN_CTX_end(ctx);
23a1d5e9 540 BN_CTX_free(ctx_new);
0f113f3e
MC
541 return -1;
542 }
543
544 /*
545 * XXX This approach assumes that the external representation of curves
546 * over the same field type is the same.
547 */
548 if (!a->meth->group_get_curve(a, a1, a2, a3, ctx) ||
549 !b->meth->group_get_curve(b, b1, b2, b3, ctx))
550 r = 1;
551
552 if (r || BN_cmp(a1, b1) || BN_cmp(a2, b2) || BN_cmp(a3, b3))
553 r = 1;
554
555 /* XXX EC_POINT_cmp() assumes that the methods are equal */
556 if (r || EC_POINT_cmp(a, EC_GROUP_get0_generator(a),
557 EC_GROUP_get0_generator(b), ctx))
558 r = 1;
559
560 if (!r) {
be2e334f 561 const BIGNUM *ao, *bo, *ac, *bc;
0f113f3e 562 /* compare the order and cofactor */
be2e334f
DSH
563 ao = EC_GROUP_get0_order(a);
564 bo = EC_GROUP_get0_order(b);
565 ac = EC_GROUP_get0_cofactor(a);
566 bc = EC_GROUP_get0_cofactor(b);
567 if (ao == NULL || bo == NULL) {
0f113f3e 568 BN_CTX_end(ctx);
23a1d5e9 569 BN_CTX_free(ctx_new);
0f113f3e
MC
570 return -1;
571 }
be2e334f 572 if (BN_cmp(ao, bo) || BN_cmp(ac, bc))
0f113f3e
MC
573 r = 1;
574 }
575
576 BN_CTX_end(ctx);
23a1d5e9 577 BN_CTX_free(ctx_new);
ada0e717 578
0f113f3e
MC
579 return r;
580}
ada0e717 581
0657bf9c
BM
582/* functions for EC_POINT objects */
583
584EC_POINT *EC_POINT_new(const EC_GROUP *group)
0f113f3e
MC
585{
586 EC_POINT *ret;
587
588 if (group == NULL) {
589 ECerr(EC_F_EC_POINT_NEW, ERR_R_PASSED_NULL_PARAMETER);
590 return NULL;
591 }
592 if (group->meth->point_init == 0) {
593 ECerr(EC_F_EC_POINT_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
594 return NULL;
595 }
596
1b4cf96f 597 ret = OPENSSL_zalloc(sizeof(*ret));
0f113f3e
MC
598 if (ret == NULL) {
599 ECerr(EC_F_EC_POINT_NEW, ERR_R_MALLOC_FAILURE);
600 return NULL;
601 }
602
603 ret->meth = group->meth;
604
605 if (!ret->meth->point_init(ret)) {
606 OPENSSL_free(ret);
607 return NULL;
608 }
609
610 return ret;
611}
0657bf9c
BM
612
613void EC_POINT_free(EC_POINT *point)
0f113f3e
MC
614{
615 if (!point)
616 return;
7711de24 617
0f113f3e
MC
618 if (point->meth->point_finish != 0)
619 point->meth->point_finish(point);
620 OPENSSL_free(point);
621}
0657bf9c
BM
622
623void EC_POINT_clear_free(EC_POINT *point)
0f113f3e
MC
624{
625 if (!point)
626 return;
627
628 if (point->meth->point_clear_finish != 0)
629 point->meth->point_clear_finish(point);
630 else if (point->meth->point_finish != 0)
631 point->meth->point_finish(point);
b4faea50 632 OPENSSL_clear_free(point, sizeof(*point));
0f113f3e 633}
0657bf9c
BM
634
635int EC_POINT_copy(EC_POINT *dest, const EC_POINT *src)
0f113f3e
MC
636{
637 if (dest->meth->point_copy == 0) {
638 ECerr(EC_F_EC_POINT_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
639 return 0;
640 }
641 if (dest->meth != src->meth) {
642 ECerr(EC_F_EC_POINT_COPY, EC_R_INCOMPATIBLE_OBJECTS);
643 return 0;
644 }
645 if (dest == src)
646 return 1;
647 return dest->meth->point_copy(dest, src);
648}
0657bf9c 649
7793f30e 650EC_POINT *EC_POINT_dup(const EC_POINT *a, const EC_GROUP *group)
0f113f3e
MC
651{
652 EC_POINT *t;
653 int r;
654
655 if (a == NULL)
656 return NULL;
657
658 t = EC_POINT_new(group);
659 if (t == NULL)
660 return (NULL);
661 r = EC_POINT_copy(t, a);
662 if (!r) {
663 EC_POINT_free(t);
664 return NULL;
8fdc3734
RS
665 }
666 return t;
0f113f3e 667}
7793f30e 668
48fe4d62 669const EC_METHOD *EC_POINT_method_of(const EC_POINT *point)
0f113f3e
MC
670{
671 return point->meth;
672}
48fe4d62 673
226cc7de 674int EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point)
0f113f3e
MC
675{
676 if (group->meth->point_set_to_infinity == 0) {
677 ECerr(EC_F_EC_POINT_SET_TO_INFINITY,
678 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
679 return 0;
680 }
681 if (group->meth != point->meth) {
682 ECerr(EC_F_EC_POINT_SET_TO_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
683 return 0;
684 }
685 return group->meth->point_set_to_infinity(group, point);
686}
687
688int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group,
689 EC_POINT *point, const BIGNUM *x,
690 const BIGNUM *y, const BIGNUM *z,
691 BN_CTX *ctx)
692{
693 if (group->meth->point_set_Jprojective_coordinates_GFp == 0) {
694 ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
695 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
696 return 0;
697 }
698 if (group->meth != point->meth) {
699 ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
700 EC_R_INCOMPATIBLE_OBJECTS);
701 return 0;
702 }
703 return group->meth->point_set_Jprojective_coordinates_GFp(group, point, x,
704 y, z, ctx);
705}
706
707int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group,
708 const EC_POINT *point, BIGNUM *x,
709 BIGNUM *y, BIGNUM *z,
710 BN_CTX *ctx)
711{
712 if (group->meth->point_get_Jprojective_coordinates_GFp == 0) {
713 ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
714 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
715 return 0;
716 }
717 if (group->meth != point->meth) {
718 ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
719 EC_R_INCOMPATIBLE_OBJECTS);
720 return 0;
721 }
722 return group->meth->point_get_Jprojective_coordinates_GFp(group, point, x,
723 y, z, ctx);
724}
725
726int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group,
727 EC_POINT *point, const BIGNUM *x,
728 const BIGNUM *y, BN_CTX *ctx)
729{
730 if (group->meth->point_set_affine_coordinates == 0) {
731 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP,
732 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
733 return 0;
734 }
735 if (group->meth != point->meth) {
736 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP,
737 EC_R_INCOMPATIBLE_OBJECTS);
738 return 0;
739 }
740 return group->meth->point_set_affine_coordinates(group, point, x, y, ctx);
741}
226cc7de 742
b3310161 743#ifndef OPENSSL_NO_EC2M
0f113f3e
MC
744int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *group,
745 EC_POINT *point, const BIGNUM *x,
746 const BIGNUM *y, BN_CTX *ctx)
747{
748 if (group->meth->point_set_affine_coordinates == 0) {
749 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M,
750 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
751 return 0;
752 }
753 if (group->meth != point->meth) {
754 ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M,
755 EC_R_INCOMPATIBLE_OBJECTS);
756 return 0;
757 }
758 return group->meth->point_set_affine_coordinates(group, point, x, y, ctx);
759}
b3310161 760#endif
7793f30e 761
0f113f3e
MC
762int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group,
763 const EC_POINT *point, BIGNUM *x,
764 BIGNUM *y, BN_CTX *ctx)
765{
766 if (group->meth->point_get_affine_coordinates == 0) {
767 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP,
768 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
769 return 0;
770 }
771 if (group->meth != point->meth) {
772 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP,
773 EC_R_INCOMPATIBLE_OBJECTS);
774 return 0;
775 }
776 return group->meth->point_get_affine_coordinates(group, point, x, y, ctx);
777}
7793f30e 778
b3310161 779#ifndef OPENSSL_NO_EC2M
0f113f3e
MC
780int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *group,
781 const EC_POINT *point, BIGNUM *x,
782 BIGNUM *y, BN_CTX *ctx)
783{
784 if (group->meth->point_get_affine_coordinates == 0) {
785 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M,
786 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
787 return 0;
788 }
789 if (group->meth != point->meth) {
790 ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M,
791 EC_R_INCOMPATIBLE_OBJECTS);
792 return 0;
793 }
794 return group->meth->point_get_affine_coordinates(group, point, x, y, ctx);
795}
b3310161 796#endif
7793f30e 797
0f113f3e
MC
798int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
799 const EC_POINT *b, BN_CTX *ctx)
800{
801 if (group->meth->add == 0) {
802 ECerr(EC_F_EC_POINT_ADD, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
803 return 0;
804 }
805 if ((group->meth != r->meth) || (r->meth != a->meth)
806 || (a->meth != b->meth)) {
807 ECerr(EC_F_EC_POINT_ADD, EC_R_INCOMPATIBLE_OBJECTS);
808 return 0;
809 }
810 return group->meth->add(group, r, a, b, ctx);
811}
812
813int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
814 BN_CTX *ctx)
815{
816 if (group->meth->dbl == 0) {
817 ECerr(EC_F_EC_POINT_DBL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
818 return 0;
819 }
820 if ((group->meth != r->meth) || (r->meth != a->meth)) {
821 ECerr(EC_F_EC_POINT_DBL, EC_R_INCOMPATIBLE_OBJECTS);
822 return 0;
823 }
824 return group->meth->dbl(group, r, a, ctx);
825}
0657bf9c 826
1d5bd6cf 827int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx)
0f113f3e
MC
828{
829 if (group->meth->invert == 0) {
830 ECerr(EC_F_EC_POINT_INVERT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
831 return 0;
832 }
833 if (group->meth != a->meth) {
834 ECerr(EC_F_EC_POINT_INVERT, EC_R_INCOMPATIBLE_OBJECTS);
835 return 0;
836 }
837 return group->meth->invert(group, a, ctx);
838}
1d5bd6cf 839
0657bf9c 840int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *point)
0f113f3e
MC
841{
842 if (group->meth->is_at_infinity == 0) {
843 ECerr(EC_F_EC_POINT_IS_AT_INFINITY,
844 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
845 return 0;
846 }
847 if (group->meth != point->meth) {
848 ECerr(EC_F_EC_POINT_IS_AT_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
849 return 0;
850 }
851 return group->meth->is_at_infinity(group, point);
852}
853
68886be7
MC
854/*
855 * Check whether an EC_POINT is on the curve or not. Note that the return
856 * value for this function should NOT be treated as a boolean. Return values:
857 * 1: The point is on the curve
858 * 0: The point is not on the curve
859 * -1: An error occurred
860 */
0f113f3e
MC
861int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point,
862 BN_CTX *ctx)
863{
864 if (group->meth->is_on_curve == 0) {
865 ECerr(EC_F_EC_POINT_IS_ON_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
866 return 0;
867 }
868 if (group->meth != point->meth) {
869 ECerr(EC_F_EC_POINT_IS_ON_CURVE, EC_R_INCOMPATIBLE_OBJECTS);
870 return 0;
871 }
872 return group->meth->is_on_curve(group, point, ctx);
873}
874
875int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b,
876 BN_CTX *ctx)
877{
878 if (group->meth->point_cmp == 0) {
879 ECerr(EC_F_EC_POINT_CMP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
880 return -1;
881 }
882 if ((group->meth != a->meth) || (a->meth != b->meth)) {
883 ECerr(EC_F_EC_POINT_CMP, EC_R_INCOMPATIBLE_OBJECTS);
884 return -1;
885 }
886 return group->meth->point_cmp(group, a, b, ctx);
887}
1d5bd6cf 888
e869d4bd 889int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx)
0f113f3e
MC
890{
891 if (group->meth->make_affine == 0) {
892 ECerr(EC_F_EC_POINT_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
893 return 0;
894 }
895 if (group->meth != point->meth) {
896 ECerr(EC_F_EC_POINT_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
897 return 0;
898 }
899 return group->meth->make_affine(group, point, ctx);
900}
901
902int EC_POINTs_make_affine(const EC_GROUP *group, size_t num,
903 EC_POINT *points[], BN_CTX *ctx)
904{
905 size_t i;
906
907 if (group->meth->points_make_affine == 0) {
908 ECerr(EC_F_EC_POINTS_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
909 return 0;
910 }
911 for (i = 0; i < num; i++) {
912 if (group->meth != points[i]->meth) {
913 ECerr(EC_F_EC_POINTS_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
914 return 0;
915 }
916 }
917 return group->meth->points_make_affine(group, num, points, ctx);
918}
919
920/*
921 * Functions for point multiplication. If group->meth->mul is 0, we use the
922 * wNAF-based implementations in ec_mult.c; otherwise we dispatch through
923 * methods.
37c660ff
BM
924 */
925
926int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
0f113f3e
MC
927 size_t num, const EC_POINT *points[],
928 const BIGNUM *scalars[], BN_CTX *ctx)
929{
930 if (group->meth->mul == 0)
931 /* use default */
932 return ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx);
37c660ff 933
0f113f3e
MC
934 return group->meth->mul(group, r, scalar, num, points, scalars, ctx);
935}
37c660ff
BM
936
937int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar,
0f113f3e
MC
938 const EC_POINT *point, const BIGNUM *p_scalar, BN_CTX *ctx)
939{
940 /* just a convenient interface to EC_POINTs_mul() */
37c660ff 941
0f113f3e
MC
942 const EC_POINT *points[1];
943 const BIGNUM *scalars[1];
37c660ff 944
0f113f3e
MC
945 points[0] = point;
946 scalars[0] = p_scalar;
37c660ff 947
0f113f3e
MC
948 return EC_POINTs_mul(group, r, g_scalar,
949 (point != NULL
950 && p_scalar != NULL), points, scalars, ctx);
951}
37c660ff
BM
952
953int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx)
0f113f3e
MC
954{
955 if (group->meth->mul == 0)
956 /* use default */
957 return ec_wNAF_precompute_mult(group, ctx);
37c660ff 958
0f113f3e
MC
959 if (group->meth->precompute_mult != 0)
960 return group->meth->precompute_mult(group, ctx);
961 else
962 return 1; /* nothing to do, so report success */
963}
37c660ff
BM
964
965int EC_GROUP_have_precompute_mult(const EC_GROUP *group)
0f113f3e
MC
966{
967 if (group->meth->mul == 0)
968 /* use default */
969 return ec_wNAF_have_precompute_mult(group);
970
971 if (group->meth->have_precompute_mult != 0)
972 return group->meth->have_precompute_mult(group);
973 else
974 return 0; /* cannot tell whether precomputation has
975 * been performed */
976}
977
978/*
979 * ec_precompute_mont_data sets |group->mont_data| from |group->order| and
980 * returns one on success. On error it returns zero.
981 */
f54be179 982int ec_precompute_mont_data(EC_GROUP *group)
0f113f3e
MC
983{
984 BN_CTX *ctx = BN_CTX_new();
985 int ret = 0;
986
23a1d5e9
RS
987 BN_MONT_CTX_free(group->mont_data);
988 group->mont_data = NULL;
0f113f3e
MC
989
990 if (ctx == NULL)
991 goto err;
992
993 group->mont_data = BN_MONT_CTX_new();
90945fa3 994 if (group->mont_data == NULL)
0f113f3e
MC
995 goto err;
996
997 if (!BN_MONT_CTX_set(group->mont_data, group->order, ctx)) {
998 BN_MONT_CTX_free(group->mont_data);
999 group->mont_data = NULL;
1000 goto err;
1001 }
1002
1003 ret = 1;
1004
1005 err:
1006
23a1d5e9 1007 BN_CTX_free(ctx);
0f113f3e
MC
1008 return ret;
1009}
3aef36ff
RS
1010
1011int EC_KEY_set_ex_data(EC_KEY *key, int idx, void *arg)
1012{
1013 return CRYPTO_set_ex_data(&key->ex_data, idx, arg);
1014}
1015
1016void *EC_KEY_get_ex_data(const EC_KEY *key, int idx)
1017{
1018 return CRYPTO_get_ex_data(&key->ex_data, idx);
1019}