xref: /freebsd/crypto/openssl/doc/man3/EC_POINT_add.pod (revision b077aed33b7b6aefca7b17ddb250cf521f938613)
1e71b7053SJung-uk Kim=pod
2e71b7053SJung-uk Kim
3e71b7053SJung-uk Kim=head1 NAME
4e71b7053SJung-uk Kim
5e71b7053SJung-uk KimEC_POINT_add, EC_POINT_dbl, EC_POINT_invert, EC_POINT_is_at_infinity, EC_POINT_is_on_curve, EC_POINT_cmp, EC_POINT_make_affine, EC_POINTs_make_affine, EC_POINTs_mul, EC_POINT_mul, EC_GROUP_precompute_mult, EC_GROUP_have_precompute_mult - Functions for performing mathematical operations and tests on EC_POINT objects
6e71b7053SJung-uk Kim
7e71b7053SJung-uk Kim=head1 SYNOPSIS
8e71b7053SJung-uk Kim
9e71b7053SJung-uk Kim #include <openssl/ec.h>
10e71b7053SJung-uk Kim
11e71b7053SJung-uk Kim int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
12e71b7053SJung-uk Kim                  const EC_POINT *b, BN_CTX *ctx);
13e71b7053SJung-uk Kim int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx);
14e71b7053SJung-uk Kim int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx);
15e71b7053SJung-uk Kim int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *p);
16e71b7053SJung-uk Kim int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx);
17e71b7053SJung-uk Kim int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx);
18*b077aed3SPierre Pronchery int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n,
19*b077aed3SPierre Pronchery                  const EC_POINT *q, const BIGNUM *m, BN_CTX *ctx);
20*b077aed3SPierre Pronchery
21*b077aed3SPierre ProncheryThe following functions have been deprecated since OpenSSL 3.0, and can be
22*b077aed3SPierre Proncheryhidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
23*b077aed3SPierre Proncherysee L<openssl_user_macros(7)>:
24*b077aed3SPierre Pronchery
25e71b7053SJung-uk Kim int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx);
26e71b7053SJung-uk Kim int EC_POINTs_make_affine(const EC_GROUP *group, size_t num,
27e71b7053SJung-uk Kim                           EC_POINT *points[], BN_CTX *ctx);
28e71b7053SJung-uk Kim int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n, size_t num,
29e71b7053SJung-uk Kim                   const EC_POINT *p[], const BIGNUM *m[], BN_CTX *ctx);
30e71b7053SJung-uk Kim int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx);
31e71b7053SJung-uk Kim int EC_GROUP_have_precompute_mult(const EC_GROUP *group);
32e71b7053SJung-uk Kim
33e71b7053SJung-uk Kim=head1 DESCRIPTION
34e71b7053SJung-uk Kim
35e71b7053SJung-uk KimEC_POINT_add adds the two points B<a> and B<b> and places the result in B<r>. Similarly EC_POINT_dbl doubles the point B<a> and places the
36e71b7053SJung-uk Kimresult in B<r>. In both cases it is valid for B<r> to be one of B<a> or B<b>.
37e71b7053SJung-uk Kim
38e71b7053SJung-uk KimEC_POINT_invert calculates the inverse of the supplied point B<a>. The result is placed back in B<a>.
39e71b7053SJung-uk Kim
40e71b7053SJung-uk KimThe function EC_POINT_is_at_infinity tests whether the supplied point is at infinity or not.
41e71b7053SJung-uk Kim
42e71b7053SJung-uk KimEC_POINT_is_on_curve tests whether the supplied point is on the curve or not.
43e71b7053SJung-uk Kim
44e71b7053SJung-uk KimEC_POINT_cmp compares the two supplied points and tests whether or not they are equal.
45e71b7053SJung-uk Kim
46e71b7053SJung-uk KimThe functions EC_POINT_make_affine and EC_POINTs_make_affine force the internal representation of the EC_POINT(s) into the affine
47*b077aed3SPierre Proncherycoordinate system. In the case of EC_POINTs_make_affine the value B<num> provides the number of points in the array B<points> to be
48*b077aed3SPierre Proncheryforced. These functions were deprecated in OpenSSL 3.0 and should no longer be used.
49*b077aed3SPierre ProncheryModern versions automatically perform this conversion when needed.
50e71b7053SJung-uk Kim
51*b077aed3SPierre ProncheryEC_POINT_mul calculates the value generator * B<n> + B<q> * B<m> and stores the result in B<r>.
52e71b7053SJung-uk KimThe value B<n> may be NULL in which case the result is just B<q> * B<m> (variable point multiplication). Alternatively, both B<q> and B<m> may be NULL, and B<n> non-NULL, in which case the result is just generator * B<n> (fixed point multiplication).
53e71b7053SJung-uk KimWhen performing a single fixed or variable point multiplication, the underlying implementation uses a constant time algorithm, when the input scalar (either B<n> or B<m>) is in the range [0, ec_group_order).
54e71b7053SJung-uk Kim
55*b077aed3SPierre ProncheryAlthough deprecated in OpenSSL 3.0 and should no longer be used,
56e71b7053SJung-uk KimEC_POINTs_mul calculates the value generator * B<n> + B<q[0]> * B<m[0]> + ... + B<q[num-1]> * B<m[num-1]>. As for EC_POINT_mul the value B<n> may be NULL or B<num> may be zero.
57e71b7053SJung-uk KimWhen performing a fixed point multiplication (B<n> is non-NULL and B<num> is 0) or a variable point multiplication (B<n> is NULL and B<num> is 1), the underlying implementation uses a constant time algorithm, when the input scalar (either B<n> or B<m[0]>) is in the range [0, ec_group_order).
58*b077aed3SPierre ProncheryModern versions should instead use EC_POINT_mul(), combined (if needed) with EC_POINT_add() in such rare circumstances.
59e71b7053SJung-uk Kim
60e71b7053SJung-uk KimThe function EC_GROUP_precompute_mult stores multiples of the generator for faster point multiplication, whilst
61e71b7053SJung-uk KimEC_GROUP_have_precompute_mult tests whether precomputation has already been done. See L<EC_GROUP_copy(3)> for information
62*b077aed3SPierre Proncheryabout the generator. Precomputation functionality was deprecated in OpenSSL 3.0.
63*b077aed3SPierre ProncheryUsers of EC_GROUP_precompute_mult() and EC_GROUP_have_precompute_mult() should
64*b077aed3SPierre Proncheryswitch to named curves which OpenSSL has hardcoded lookup tables for.
65e71b7053SJung-uk Kim
66e71b7053SJung-uk Kim=head1 RETURN VALUES
67e71b7053SJung-uk Kim
68e71b7053SJung-uk KimThe following functions return 1 on success or 0 on error: EC_POINT_add, EC_POINT_dbl, EC_POINT_invert, EC_POINT_make_affine,
69e71b7053SJung-uk KimEC_POINTs_make_affine, EC_POINTs_make_affine, EC_POINT_mul, EC_POINTs_mul and EC_GROUP_precompute_mult.
70e71b7053SJung-uk Kim
71e71b7053SJung-uk KimEC_POINT_is_at_infinity returns 1 if the point is at infinity, or 0 otherwise.
72e71b7053SJung-uk Kim
73e71b7053SJung-uk KimEC_POINT_is_on_curve returns 1 if the point is on the curve, 0 if not, or -1 on error.
74e71b7053SJung-uk Kim
75e71b7053SJung-uk KimEC_POINT_cmp returns 1 if the points are not equal, 0 if they are, or -1 on error.
76e71b7053SJung-uk Kim
77e71b7053SJung-uk KimEC_GROUP_have_precompute_mult return 1 if a precomputation has been done, or 0 if not.
78e71b7053SJung-uk Kim
79e71b7053SJung-uk Kim=head1 SEE ALSO
80e71b7053SJung-uk Kim
81e71b7053SJung-uk KimL<crypto(7)>, L<EC_GROUP_new(3)>, L<EC_GROUP_copy(3)>,
82e71b7053SJung-uk KimL<EC_POINT_new(3)>, L<EC_KEY_new(3)>,
83e71b7053SJung-uk KimL<EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)>
84e71b7053SJung-uk Kim
85*b077aed3SPierre Pronchery=head1 HISTORY
86*b077aed3SPierre Pronchery
87*b077aed3SPierre ProncheryEC_POINT_make_affine(), EC_POINTs_make_affine(), EC_POINTs_mul(),
88*b077aed3SPierre ProncheryEC_GROUP_precompute_mult(), and EC_GROUP_have_precompute_mult()
89*b077aed3SPierre Proncherywere deprecated in OpenSSL 3.0.
90*b077aed3SPierre Pronchery
91e71b7053SJung-uk Kim=head1 COPYRIGHT
92e71b7053SJung-uk Kim
93*b077aed3SPierre ProncheryCopyright 2013-2023 The OpenSSL Project Authors. All Rights Reserved.
94e71b7053SJung-uk Kim
95*b077aed3SPierre ProncheryLicensed under the Apache License 2.0 (the "License").  You may not use
96e71b7053SJung-uk Kimthis file except in compliance with the License.  You can obtain a copy
97e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at
98e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>.
99e71b7053SJung-uk Kim
100e71b7053SJung-uk Kim=cut
101