1e71b7053SJung-uk Kim=pod 2e71b7053SJung-uk Kim 3e71b7053SJung-uk Kim=head1 NAME 4e71b7053SJung-uk Kim 5e71b7053SJung-uk KimEC_POINT_add, EC_POINT_dbl, EC_POINT_invert, EC_POINT_is_at_infinity, EC_POINT_is_on_curve, EC_POINT_cmp, EC_POINT_make_affine, EC_POINTs_make_affine, EC_POINTs_mul, EC_POINT_mul, EC_GROUP_precompute_mult, EC_GROUP_have_precompute_mult - Functions for performing mathematical operations and tests on EC_POINT objects 6e71b7053SJung-uk Kim 7e71b7053SJung-uk Kim=head1 SYNOPSIS 8e71b7053SJung-uk Kim 9e71b7053SJung-uk Kim #include <openssl/ec.h> 10e71b7053SJung-uk Kim 11e71b7053SJung-uk Kim int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, 12e71b7053SJung-uk Kim const EC_POINT *b, BN_CTX *ctx); 13e71b7053SJung-uk Kim int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx); 14e71b7053SJung-uk Kim int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx); 15e71b7053SJung-uk Kim int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *p); 16e71b7053SJung-uk Kim int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx); 17e71b7053SJung-uk Kim int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx); 18*b077aed3SPierre Pronchery int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n, 19*b077aed3SPierre Pronchery const EC_POINT *q, const BIGNUM *m, BN_CTX *ctx); 20*b077aed3SPierre Pronchery 21*b077aed3SPierre ProncheryThe following functions have been deprecated since OpenSSL 3.0, and can be 22*b077aed3SPierre Proncheryhidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 23*b077aed3SPierre Proncherysee L<openssl_user_macros(7)>: 24*b077aed3SPierre Pronchery 25e71b7053SJung-uk Kim int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx); 26e71b7053SJung-uk Kim int EC_POINTs_make_affine(const EC_GROUP *group, size_t num, 27e71b7053SJung-uk Kim EC_POINT *points[], BN_CTX *ctx); 28e71b7053SJung-uk Kim int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n, size_t num, 29e71b7053SJung-uk Kim const EC_POINT *p[], const BIGNUM *m[], BN_CTX *ctx); 30e71b7053SJung-uk Kim int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx); 31e71b7053SJung-uk Kim int EC_GROUP_have_precompute_mult(const EC_GROUP *group); 32e71b7053SJung-uk Kim 33e71b7053SJung-uk Kim=head1 DESCRIPTION 34e71b7053SJung-uk Kim 35e71b7053SJung-uk KimEC_POINT_add adds the two points B<a> and B<b> and places the result in B<r>. Similarly EC_POINT_dbl doubles the point B<a> and places the 36e71b7053SJung-uk Kimresult in B<r>. In both cases it is valid for B<r> to be one of B<a> or B<b>. 37e71b7053SJung-uk Kim 38e71b7053SJung-uk KimEC_POINT_invert calculates the inverse of the supplied point B<a>. The result is placed back in B<a>. 39e71b7053SJung-uk Kim 40e71b7053SJung-uk KimThe function EC_POINT_is_at_infinity tests whether the supplied point is at infinity or not. 41e71b7053SJung-uk Kim 42e71b7053SJung-uk KimEC_POINT_is_on_curve tests whether the supplied point is on the curve or not. 43e71b7053SJung-uk Kim 44e71b7053SJung-uk KimEC_POINT_cmp compares the two supplied points and tests whether or not they are equal. 45e71b7053SJung-uk Kim 46e71b7053SJung-uk KimThe functions EC_POINT_make_affine and EC_POINTs_make_affine force the internal representation of the EC_POINT(s) into the affine 47*b077aed3SPierre Proncherycoordinate system. In the case of EC_POINTs_make_affine the value B<num> provides the number of points in the array B<points> to be 48*b077aed3SPierre Proncheryforced. These functions were deprecated in OpenSSL 3.0 and should no longer be used. 49*b077aed3SPierre ProncheryModern versions automatically perform this conversion when needed. 50e71b7053SJung-uk Kim 51*b077aed3SPierre ProncheryEC_POINT_mul calculates the value generator * B<n> + B<q> * B<m> and stores the result in B<r>. 52e71b7053SJung-uk KimThe value B<n> may be NULL in which case the result is just B<q> * B<m> (variable point multiplication). Alternatively, both B<q> and B<m> may be NULL, and B<n> non-NULL, in which case the result is just generator * B<n> (fixed point multiplication). 53e71b7053SJung-uk KimWhen performing a single fixed or variable point multiplication, the underlying implementation uses a constant time algorithm, when the input scalar (either B<n> or B<m>) is in the range [0, ec_group_order). 54e71b7053SJung-uk Kim 55*b077aed3SPierre ProncheryAlthough deprecated in OpenSSL 3.0 and should no longer be used, 56e71b7053SJung-uk KimEC_POINTs_mul calculates the value generator * B<n> + B<q[0]> * B<m[0]> + ... + B<q[num-1]> * B<m[num-1]>. As for EC_POINT_mul the value B<n> may be NULL or B<num> may be zero. 57e71b7053SJung-uk KimWhen performing a fixed point multiplication (B<n> is non-NULL and B<num> is 0) or a variable point multiplication (B<n> is NULL and B<num> is 1), the underlying implementation uses a constant time algorithm, when the input scalar (either B<n> or B<m[0]>) is in the range [0, ec_group_order). 58*b077aed3SPierre ProncheryModern versions should instead use EC_POINT_mul(), combined (if needed) with EC_POINT_add() in such rare circumstances. 59e71b7053SJung-uk Kim 60e71b7053SJung-uk KimThe function EC_GROUP_precompute_mult stores multiples of the generator for faster point multiplication, whilst 61e71b7053SJung-uk KimEC_GROUP_have_precompute_mult tests whether precomputation has already been done. See L<EC_GROUP_copy(3)> for information 62*b077aed3SPierre Proncheryabout the generator. Precomputation functionality was deprecated in OpenSSL 3.0. 63*b077aed3SPierre ProncheryUsers of EC_GROUP_precompute_mult() and EC_GROUP_have_precompute_mult() should 64*b077aed3SPierre Proncheryswitch to named curves which OpenSSL has hardcoded lookup tables for. 65e71b7053SJung-uk Kim 66e71b7053SJung-uk Kim=head1 RETURN VALUES 67e71b7053SJung-uk Kim 68e71b7053SJung-uk KimThe following functions return 1 on success or 0 on error: EC_POINT_add, EC_POINT_dbl, EC_POINT_invert, EC_POINT_make_affine, 69e71b7053SJung-uk KimEC_POINTs_make_affine, EC_POINTs_make_affine, EC_POINT_mul, EC_POINTs_mul and EC_GROUP_precompute_mult. 70e71b7053SJung-uk Kim 71e71b7053SJung-uk KimEC_POINT_is_at_infinity returns 1 if the point is at infinity, or 0 otherwise. 72e71b7053SJung-uk Kim 73e71b7053SJung-uk KimEC_POINT_is_on_curve returns 1 if the point is on the curve, 0 if not, or -1 on error. 74e71b7053SJung-uk Kim 75e71b7053SJung-uk KimEC_POINT_cmp returns 1 if the points are not equal, 0 if they are, or -1 on error. 76e71b7053SJung-uk Kim 77e71b7053SJung-uk KimEC_GROUP_have_precompute_mult return 1 if a precomputation has been done, or 0 if not. 78e71b7053SJung-uk Kim 79e71b7053SJung-uk Kim=head1 SEE ALSO 80e71b7053SJung-uk Kim 81e71b7053SJung-uk KimL<crypto(7)>, L<EC_GROUP_new(3)>, L<EC_GROUP_copy(3)>, 82e71b7053SJung-uk KimL<EC_POINT_new(3)>, L<EC_KEY_new(3)>, 83e71b7053SJung-uk KimL<EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)> 84e71b7053SJung-uk Kim 85*b077aed3SPierre Pronchery=head1 HISTORY 86*b077aed3SPierre Pronchery 87*b077aed3SPierre ProncheryEC_POINT_make_affine(), EC_POINTs_make_affine(), EC_POINTs_mul(), 88*b077aed3SPierre ProncheryEC_GROUP_precompute_mult(), and EC_GROUP_have_precompute_mult() 89*b077aed3SPierre Proncherywere deprecated in OpenSSL 3.0. 90*b077aed3SPierre Pronchery 91e71b7053SJung-uk Kim=head1 COPYRIGHT 92e71b7053SJung-uk Kim 93*b077aed3SPierre ProncheryCopyright 2013-2023 The OpenSSL Project Authors. All Rights Reserved. 94e71b7053SJung-uk Kim 95*b077aed3SPierre ProncheryLicensed under the Apache License 2.0 (the "License"). You may not use 96e71b7053SJung-uk Kimthis file except in compliance with the License. You can obtain a copy 97e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at 98e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>. 99e71b7053SJung-uk Kim 100e71b7053SJung-uk Kim=cut 101