ec_lib.c 33.2 KB
Newer Older
1
/*
R
Richard Levitte 已提交
2
 * Copyright 2001-2019 The OpenSSL Project Authors. All Rights Reserved.
3
 * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
4
 *
R
Rich Salz 已提交
5 6 7 8
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
9
 */
R
Rich Salz 已提交
10

B
Bodo Möller 已提交
11 12
#include <string.h>

13
#include <openssl/err.h>
14
#include <openssl/opensslv.h>
15

16
#include "ec_local.h"
17 18 19 20

/* functions for EC_GROUP objects */

EC_GROUP *EC_GROUP_new(const EC_METHOD *meth)
21 22 23 24 25 26 27 28 29 30 31 32
{
    EC_GROUP *ret;

    if (meth == NULL) {
        ECerr(EC_F_EC_GROUP_NEW, EC_R_SLOT_FULL);
        return NULL;
    }
    if (meth->group_init == 0) {
        ECerr(EC_F_EC_GROUP_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return NULL;
    }

R
Rich Salz 已提交
33
    ret = OPENSSL_zalloc(sizeof(*ret));
34 35 36 37 38 39
    if (ret == NULL) {
        ECerr(EC_F_EC_GROUP_NEW, ERR_R_MALLOC_FAILURE);
        return NULL;
    }

    ret->meth = meth;
40 41 42 43 44 45 46 47
    if ((ret->meth->flags & EC_FLAGS_CUSTOM_CURVE) == 0) {
        ret->order = BN_new();
        if (ret->order == NULL)
            goto err;
        ret->cofactor = BN_new();
        if (ret->cofactor == NULL)
            goto err;
    }
48
    ret->asn1_flag = OPENSSL_EC_NAMED_CURVE;
49 50 51 52
    ret->asn1_form = POINT_CONVERSION_UNCOMPRESSED;
    if (!meth->group_init(ret))
        goto err;
    return ret;
R
Rich Salz 已提交
53

54
 err:
R
Rich Salz 已提交
55 56
    BN_free(ret->order);
    BN_free(ret->cofactor);
57 58 59
    OPENSSL_free(ret);
    return NULL;
}
60

61
void EC_pre_comp_free(EC_GROUP *group)
62 63
{
    switch (group->pre_comp_type) {
R
Rich Salz 已提交
64
    case PCT_none:
65
        break;
R
Rich Salz 已提交
66
    case PCT_nistz256:
R
Rich Salz 已提交
67
#ifdef ECP_NISTZ256_ASM
68
        EC_nistz256_pre_comp_free(group->pre_comp.nistz256);
69
#endif
R
Rich Salz 已提交
70
        break;
71
#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
R
Rich Salz 已提交
72
    case PCT_nistp224:
73 74
        EC_nistp224_pre_comp_free(group->pre_comp.nistp224);
        break;
R
Rich Salz 已提交
75
    case PCT_nistp256:
76 77
        EC_nistp256_pre_comp_free(group->pre_comp.nistp256);
        break;
R
Rich Salz 已提交
78
    case PCT_nistp521:
79 80
        EC_nistp521_pre_comp_free(group->pre_comp.nistp521);
        break;
R
Rich Salz 已提交
81 82 83 84 85
#else
    case PCT_nistp224:
    case PCT_nistp256:
    case PCT_nistp521:
        break;
86
#endif
R
Rich Salz 已提交
87
    case PCT_ec:
88 89 90 91 92 93
        EC_ec_pre_comp_free(group->pre_comp.ec);
        break;
    }
    group->pre_comp.ec = NULL;
}

94
void EC_GROUP_free(EC_GROUP *group)
95 96 97
{
    if (!group)
        return;
B
Bodo Möller 已提交
98

99 100
    if (group->meth->group_finish != 0)
        group->meth->group_finish(group);
B
Bodo Möller 已提交
101

102
    EC_pre_comp_free(group);
R
Rich Salz 已提交
103
    BN_MONT_CTX_free(group->mont_data);
R
Rich Salz 已提交
104
    EC_POINT_free(group->generator);
105 106
    BN_free(group->order);
    BN_free(group->cofactor);
R
Rich Salz 已提交
107
    OPENSSL_free(group->seed);
108 109
    OPENSSL_free(group);
}
110 111

void EC_GROUP_clear_free(EC_GROUP *group)
112 113 114
{
    if (!group)
        return;
B
Bodo Möller 已提交
115

116 117 118 119
    if (group->meth->group_clear_finish != 0)
        group->meth->group_clear_finish(group);
    else if (group->meth->group_finish != 0)
        group->meth->group_finish(group);
B
Bodo Möller 已提交
120

121
    EC_pre_comp_free(group);
R
Rich Salz 已提交
122
    BN_MONT_CTX_free(group->mont_data);
R
Rich Salz 已提交
123
    EC_POINT_clear_free(group->generator);
124 125
    BN_clear_free(group->order);
    BN_clear_free(group->cofactor);
R
Rich Salz 已提交
126
    OPENSSL_clear_free(group->seed, group->seed_len);
R
Rich Salz 已提交
127
    OPENSSL_clear_free(group, sizeof(*group));
128
}
129 130

int EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src)
131 132 133 134 135 136 137 138 139 140 141 142
{
    if (dest->meth->group_copy == 0) {
        ECerr(EC_F_EC_GROUP_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
    if (dest->meth != src->meth) {
        ECerr(EC_F_EC_GROUP_COPY, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    if (dest == src)
        return 1;

143 144
    dest->curve_name = src->curve_name;

145 146 147
    /* Copy precomputed */
    dest->pre_comp_type = src->pre_comp_type;
    switch (src->pre_comp_type) {
R
Rich Salz 已提交
148
    case PCT_none:
149 150
        dest->pre_comp.ec = NULL;
        break;
R
Rich Salz 已提交
151
    case PCT_nistz256:
R
Rich Salz 已提交
152
#ifdef ECP_NISTZ256_ASM
153
        dest->pre_comp.nistz256 = EC_nistz256_pre_comp_dup(src->pre_comp.nistz256);
154
#endif
R
Rich Salz 已提交
155
        break;
156
#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
R
Rich Salz 已提交
157
    case PCT_nistp224:
158 159
        dest->pre_comp.nistp224 = EC_nistp224_pre_comp_dup(src->pre_comp.nistp224);
        break;
R
Rich Salz 已提交
160
    case PCT_nistp256:
161 162
        dest->pre_comp.nistp256 = EC_nistp256_pre_comp_dup(src->pre_comp.nistp256);
        break;
R
Rich Salz 已提交
163
    case PCT_nistp521:
164 165
        dest->pre_comp.nistp521 = EC_nistp521_pre_comp_dup(src->pre_comp.nistp521);
        break;
R
Rich Salz 已提交
166 167 168 169 170
#else
    case PCT_nistp224:
    case PCT_nistp256:
    case PCT_nistp521:
        break;
171
#endif
R
Rich Salz 已提交
172
    case PCT_ec:
173 174
        dest->pre_comp.ec = EC_ec_pre_comp_dup(src->pre_comp.ec);
        break;
175 176 177 178 179 180 181 182 183 184 185 186
    }

    if (src->mont_data != NULL) {
        if (dest->mont_data == NULL) {
            dest->mont_data = BN_MONT_CTX_new();
            if (dest->mont_data == NULL)
                return 0;
        }
        if (!BN_MONT_CTX_copy(dest->mont_data, src->mont_data))
            return 0;
    } else {
        /* src->generator == NULL */
R
Rich Salz 已提交
187 188
        BN_MONT_CTX_free(dest->mont_data);
        dest->mont_data = NULL;
189
    }
190

191 192 193 194 195 196 197 198 199 200
    if (src->generator != NULL) {
        if (dest->generator == NULL) {
            dest->generator = EC_POINT_new(dest);
            if (dest->generator == NULL)
                return 0;
        }
        if (!EC_POINT_copy(dest->generator, src->generator))
            return 0;
    } else {
        /* src->generator == NULL */
R
Rich Salz 已提交
201 202
        EC_POINT_clear_free(dest->generator);
        dest->generator = NULL;
203 204
    }

205 206 207 208 209 210
    if ((src->meth->flags & EC_FLAGS_CUSTOM_CURVE) == 0) {
        if (!BN_copy(dest->order, src->order))
            return 0;
        if (!BN_copy(dest->cofactor, src->cofactor))
            return 0;
    }
211 212 213 214 215

    dest->asn1_flag = src->asn1_flag;
    dest->asn1_form = src->asn1_form;

    if (src->seed) {
R
Rich Salz 已提交
216
        OPENSSL_free(dest->seed);
R
Rich Salz 已提交
217 218
        if ((dest->seed = OPENSSL_malloc(src->seed_len)) == NULL) {
            ECerr(EC_F_EC_GROUP_COPY, ERR_R_MALLOC_FAILURE);
219
            return 0;
R
Rich Salz 已提交
220
        }
221 222 223 224
        if (!memcpy(dest->seed, src->seed, src->seed_len))
            return 0;
        dest->seed_len = src->seed_len;
    } else {
R
Rich Salz 已提交
225
        OPENSSL_free(dest->seed);
226 227 228 229 230 231
        dest->seed = NULL;
        dest->seed_len = 0;
    }

    return dest->meth->group_copy(dest, src);
}
232

233
EC_GROUP *EC_GROUP_dup(const EC_GROUP *a)
234 235 236
{
    EC_GROUP *t = NULL;
    int ok = 0;
237

238 239
    if (a == NULL)
        return NULL;
240

241
    if ((t = EC_GROUP_new(a->meth)) == NULL)
K
KaoruToda 已提交
242
        return NULL;
243 244
    if (!EC_GROUP_copy(t, a))
        goto err;
245

246
    ok = 1;
247

248 249
 err:
    if (!ok) {
R
Rich Salz 已提交
250
        EC_GROUP_free(t);
251
        return NULL;
R
Rich Salz 已提交
252
    }
253 254
        return t;
}
255

256
const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group)
257 258 259
{
    return group->meth;
}
260

261
int EC_METHOD_get_field_type(const EC_METHOD *meth)
262 263 264 265
{
    return meth->field_type;
}

266 267
static int ec_precompute_mont_data(EC_GROUP *);

268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328
/*-
 * Try computing cofactor from the generator order (n) and field cardinality (q).
 * This works for all curves of cryptographic interest.
 *
 * Hasse thm: q + 1 - 2*sqrt(q) <= n*h <= q + 1 + 2*sqrt(q)
 * h_min = (q + 1 - 2*sqrt(q))/n
 * h_max = (q + 1 + 2*sqrt(q))/n
 * h_max - h_min = 4*sqrt(q)/n
 * So if n > 4*sqrt(q) holds, there is only one possible value for h:
 * h = \lfloor (h_min + h_max)/2 \rceil = \lfloor (q + 1)/n \rceil
 *
 * Otherwise, zero cofactor and return success.
 */
static int ec_guess_cofactor(EC_GROUP *group) {
    int ret = 0;
    BN_CTX *ctx = NULL;
    BIGNUM *q = NULL;

    /*-
     * If the cofactor is too large, we cannot guess it.
     * The RHS of below is a strict overestimate of lg(4 * sqrt(q))
     */
    if (BN_num_bits(group->order) <= (BN_num_bits(group->field) + 1) / 2 + 3) {
        /* default to 0 */
        BN_zero(group->cofactor);
        /* return success */
        return 1;
    }

    if ((ctx = BN_CTX_new()) == NULL)
        return 0;

    BN_CTX_start(ctx);
    if ((q = BN_CTX_get(ctx)) == NULL)
        goto err;

    /* set q = 2**m for binary fields; q = p otherwise */
    if (group->meth->field_type == NID_X9_62_characteristic_two_field) {
        BN_zero(q);
        if (!BN_set_bit(q, BN_num_bits(group->field) - 1))
            goto err;
    } else {
        if (!BN_copy(q, group->field))
            goto err;
    }

    /* compute h = \lfloor (q + 1)/n \rceil = \lfloor (q + 1 + n/2)/n \rfloor */
    if (!BN_rshift1(group->cofactor, group->order) /* n/2 */
        || !BN_add(group->cofactor, group->cofactor, q) /* q + n/2 */
        /* q + 1 + n/2 */
        || !BN_add(group->cofactor, group->cofactor, BN_value_one())
        /* (q + 1 + n/2)/n */
        || !BN_div(group->cofactor, NULL, group->cofactor, group->order, ctx))
        goto err;
    ret = 1;
 err:
    BN_CTX_end(ctx);
    BN_CTX_free(ctx);
    return ret;
}

329 330 331 332 333 334 335 336
int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
                           const BIGNUM *order, const BIGNUM *cofactor)
{
    if (generator == NULL) {
        ECerr(EC_F_EC_GROUP_SET_GENERATOR, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }

337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364
    /* require group->field >= 1 */
    if (group->field == NULL || BN_is_zero(group->field)
        || BN_is_negative(group->field)) {
        ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_FIELD);
        return 0;
    }

    /*-
     * - require order >= 1
     * - enforce upper bound due to Hasse thm: order can be no more than one bit
     *   longer than field cardinality
     */
    if (order == NULL || BN_is_zero(order) || BN_is_negative(order)
        || BN_num_bits(order) > BN_num_bits(group->field) + 1) {
        ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_GROUP_ORDER);
        return 0;
    }

    /*-
     * Unfortunately the cofactor is an optional field in many standards.
     * Internally, the lib uses 0 cofactor as a marker for "unknown cofactor".
     * So accept cofactor == NULL or cofactor >= 0.
     */
    if (cofactor != NULL && BN_is_negative(cofactor)) {
        ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_UNKNOWN_COFACTOR);
        return 0;
    }

365 366 367 368 369 370 371 372
    if (group->generator == NULL) {
        group->generator = EC_POINT_new(group);
        if (group->generator == NULL)
            return 0;
    }
    if (!EC_POINT_copy(group->generator, generator))
        return 0;

373 374
    if (!BN_copy(group->order, order))
        return 0;
375

376 377
    /* Either take the provided positive cofactor, or try to compute it */
    if (cofactor != NULL && !BN_is_zero(cofactor)) {
378 379
        if (!BN_copy(group->cofactor, cofactor))
            return 0;
380
    } else if (!ec_guess_cofactor(group)) {
381
        BN_zero(group->cofactor);
382 383
        return 0;
    }
384 385

    /*
386
     * Some groups have an order with
387 388 389
     * factors of two, which makes the Montgomery setup fail.
     * |group->mont_data| will be NULL in this case.
     */
390 391 392
    if (BN_is_odd(group->order)) {
        return ec_precompute_mont_data(group);
    }
393

394 395
    BN_MONT_CTX_free(group->mont_data);
    group->mont_data = NULL;
396 397
    return 1;
}
398

N
Nils Larsch 已提交
399
const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group)
400 401 402
{
    return group->generator;
}
403

404
BN_MONT_CTX *EC_GROUP_get_mont_data(const EC_GROUP *group)
405 406 407
{
    return group->mont_data;
}
408

409
int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx)
410
{
411 412
    if (group->order == NULL)
        return 0;
413 414
    if (!BN_copy(order, group->order))
        return 0;
415

416 417
    return !BN_is_zero(order);
}
418

419 420 421 422 423 424 425
const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group)
{
    return group->order;
}

int EC_GROUP_order_bits(const EC_GROUP *group)
{
D
Dr. Stephen Henson 已提交
426
    return group->meth->group_order_bits(group);
427 428
}

429 430 431
int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor,
                          BN_CTX *ctx)
{
432 433 434

    if (group->cofactor == NULL)
        return 0;
435 436
    if (!BN_copy(cofactor, group->cofactor))
        return 0;
437

438 439
    return !BN_is_zero(group->cofactor);
}
440

441 442 443 444 445
const BIGNUM *EC_GROUP_get0_cofactor(const EC_GROUP *group)
{
    return group->cofactor;
}

446
void EC_GROUP_set_curve_name(EC_GROUP *group, int nid)
447 448 449
{
    group->curve_name = nid;
}
450

451
int EC_GROUP_get_curve_name(const EC_GROUP *group)
452 453 454
{
    return group->curve_name;
}
455

456
void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag)
457 458 459
{
    group->asn1_flag = flag;
}
460 461

int EC_GROUP_get_asn1_flag(const EC_GROUP *group)
462 463 464
{
    return group->asn1_flag;
}
465

466
void EC_GROUP_set_point_conversion_form(EC_GROUP *group,
B
Bodo Möller 已提交
467
                                        point_conversion_form_t form)
468 469 470
{
    group->asn1_form = form;
}
B
Bodo Möller 已提交
471

472 473 474 475 476
point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP
                                                           *group)
{
    return group->asn1_form;
}
B
Bodo Möller 已提交
477

478
size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len)
479
{
R
Rich Salz 已提交
480 481 482
    OPENSSL_free(group->seed);
    group->seed = NULL;
    group->seed_len = 0;
483

484 485
    if (!len || !p)
        return 1;
486

487 488
    if ((group->seed = OPENSSL_malloc(len)) == NULL) {
        ECerr(EC_F_EC_GROUP_SET_SEED, ERR_R_MALLOC_FAILURE);
489
        return 0;
490
    }
491 492
    memcpy(group->seed, p, len);
    group->seed_len = len;
493

494 495
    return len;
}
496 497

unsigned char *EC_GROUP_get0_seed(const EC_GROUP *group)
498 499 500
{
    return group->seed;
}
501 502

size_t EC_GROUP_get_seed_len(const EC_GROUP *group)
503 504 505 506
{
    return group->seed_len;
}

507 508
int EC_GROUP_set_curve(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
                       const BIGNUM *b, BN_CTX *ctx)
509 510
{
    if (group->meth->group_set_curve == 0) {
511
        ECerr(EC_F_EC_GROUP_SET_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
512 513 514 515 516
        return 0;
    }
    return group->meth->group_set_curve(group, p, a, b, ctx);
}

517 518
int EC_GROUP_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b,
                       BN_CTX *ctx)
519
{
520 521
    if (group->meth->group_get_curve == NULL) {
        ECerr(EC_F_EC_GROUP_GET_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
522 523 524 525
        return 0;
    }
    return group->meth->group_get_curve(group, p, a, b, ctx);
}
526

527
#if OPENSSL_API_COMPAT < 0x10200000L
528 529 530 531 532 533 534 535 536 537 538 539
int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
                           const BIGNUM *b, BN_CTX *ctx)
{
    return EC_GROUP_set_curve(group, p, a, b, ctx);
}

int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
                           BIGNUM *b, BN_CTX *ctx)
{
    return EC_GROUP_get_curve(group, p, a, b, ctx);
}

540
# ifndef OPENSSL_NO_EC2M
541 542 543
int EC_GROUP_set_curve_GF2m(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
                            const BIGNUM *b, BN_CTX *ctx)
{
544
    return EC_GROUP_set_curve(group, p, a, b, ctx);
545 546 547 548 549
}

int EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a,
                            BIGNUM *b, BN_CTX *ctx)
{
550
    return EC_GROUP_get_curve(group, p, a, b, ctx);
551
}
552
# endif
553
#endif
554 555

int EC_GROUP_get_degree(const EC_GROUP *group)
556 557 558 559 560 561 562
{
    if (group->meth->group_get_degree == 0) {
        ECerr(EC_F_EC_GROUP_GET_DEGREE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
    return group->meth->group_get_degree(group);
}
563

564
int EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx)
565 566 567 568 569 570 571 572
{
    if (group->meth->group_check_discriminant == 0) {
        ECerr(EC_F_EC_GROUP_CHECK_DISCRIMINANT,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
    return group->meth->group_check_discriminant(group, ctx);
}
B
Bodo Möller 已提交
573

574
int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx)
575 576 577 578 579 580 581 582 583 584 585 586 587
{
    int r = 0;
    BIGNUM *a1, *a2, *a3, *b1, *b2, *b3;
    BN_CTX *ctx_new = NULL;

    /* compare the field types */
    if (EC_METHOD_get_field_type(EC_GROUP_method_of(a)) !=
        EC_METHOD_get_field_type(EC_GROUP_method_of(b)))
        return 1;
    /* compare the curve name (if present in both) */
    if (EC_GROUP_get_curve_name(a) && EC_GROUP_get_curve_name(b) &&
        EC_GROUP_get_curve_name(a) != EC_GROUP_get_curve_name(b))
        return 1;
588 589
    if (a->meth->flags & EC_FLAGS_CUSTOM_CURVE)
        return 0;
590

591
    if (ctx == NULL)
592
        ctx_new = ctx = BN_CTX_new();
593
    if (ctx == NULL)
594 595 596 597 598 599 600 601 602
        return -1;

    BN_CTX_start(ctx);
    a1 = BN_CTX_get(ctx);
    a2 = BN_CTX_get(ctx);
    a3 = BN_CTX_get(ctx);
    b1 = BN_CTX_get(ctx);
    b2 = BN_CTX_get(ctx);
    b3 = BN_CTX_get(ctx);
603
    if (b3 == NULL) {
604
        BN_CTX_end(ctx);
R
Rich Salz 已提交
605
        BN_CTX_free(ctx_new);
606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625
        return -1;
    }

    /*
     * XXX This approach assumes that the external representation of curves
     * over the same field type is the same.
     */
    if (!a->meth->group_get_curve(a, a1, a2, a3, ctx) ||
        !b->meth->group_get_curve(b, b1, b2, b3, ctx))
        r = 1;

    if (r || BN_cmp(a1, b1) || BN_cmp(a2, b2) || BN_cmp(a3, b3))
        r = 1;

    /* XXX EC_POINT_cmp() assumes that the methods are equal */
    if (r || EC_POINT_cmp(a, EC_GROUP_get0_generator(a),
                          EC_GROUP_get0_generator(b), ctx))
        r = 1;

    if (!r) {
626
        const BIGNUM *ao, *bo, *ac, *bc;
627
        /* compare the order and cofactor */
628 629 630 631 632
        ao = EC_GROUP_get0_order(a);
        bo = EC_GROUP_get0_order(b);
        ac = EC_GROUP_get0_cofactor(a);
        bc = EC_GROUP_get0_cofactor(b);
        if (ao == NULL || bo == NULL) {
633
            BN_CTX_end(ctx);
R
Rich Salz 已提交
634
            BN_CTX_free(ctx_new);
635 636
            return -1;
        }
637
        if (BN_cmp(ao, bo) || BN_cmp(ac, bc))
638 639 640 641
            r = 1;
    }

    BN_CTX_end(ctx);
R
Rich Salz 已提交
642
    BN_CTX_free(ctx_new);
643

644 645
    return r;
}
646

647 648 649
/* functions for EC_POINT objects */

EC_POINT *EC_POINT_new(const EC_GROUP *group)
650 651 652 653 654 655 656
{
    EC_POINT *ret;

    if (group == NULL) {
        ECerr(EC_F_EC_POINT_NEW, ERR_R_PASSED_NULL_PARAMETER);
        return NULL;
    }
657
    if (group->meth->point_init == NULL) {
658 659 660 661
        ECerr(EC_F_EC_POINT_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return NULL;
    }

D
Dr. Stephen Henson 已提交
662
    ret = OPENSSL_zalloc(sizeof(*ret));
663 664 665 666 667 668
    if (ret == NULL) {
        ECerr(EC_F_EC_POINT_NEW, ERR_R_MALLOC_FAILURE);
        return NULL;
    }

    ret->meth = group->meth;
669
    ret->curve_name = group->curve_name;
670 671 672 673 674 675 676 677

    if (!ret->meth->point_init(ret)) {
        OPENSSL_free(ret);
        return NULL;
    }

    return ret;
}
678 679

void EC_POINT_free(EC_POINT *point)
680 681 682
{
    if (!point)
        return;
B
Bodo Möller 已提交
683

684 685 686 687
    if (point->meth->point_finish != 0)
        point->meth->point_finish(point);
    OPENSSL_free(point);
}
688 689

void EC_POINT_clear_free(EC_POINT *point)
690 691 692 693 694 695 696 697
{
    if (!point)
        return;

    if (point->meth->point_clear_finish != 0)
        point->meth->point_clear_finish(point);
    else if (point->meth->point_finish != 0)
        point->meth->point_finish(point);
R
Rich Salz 已提交
698
    OPENSSL_clear_free(point, sizeof(*point));
699
}
700 701

int EC_POINT_copy(EC_POINT *dest, const EC_POINT *src)
702 703 704 705 706
{
    if (dest->meth->point_copy == 0) {
        ECerr(EC_F_EC_POINT_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
707 708 709 710
    if (dest->meth != src->meth
            || (dest->curve_name != src->curve_name
                && dest->curve_name != 0
                && src->curve_name != 0)) {
711 712 713 714 715 716 717
        ECerr(EC_F_EC_POINT_COPY, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    if (dest == src)
        return 1;
    return dest->meth->point_copy(dest, src);
}
718

719
EC_POINT *EC_POINT_dup(const EC_POINT *a, const EC_GROUP *group)
720 721 722 723 724 725 726 727 728
{
    EC_POINT *t;
    int r;

    if (a == NULL)
        return NULL;

    t = EC_POINT_new(group);
    if (t == NULL)
K
KaoruToda 已提交
729
        return NULL;
730 731 732 733
    r = EC_POINT_copy(t, a);
    if (!r) {
        EC_POINT_free(t);
        return NULL;
R
Rich Salz 已提交
734 735
    }
    return t;
736
}
737

738
const EC_METHOD *EC_POINT_method_of(const EC_POINT *point)
739 740 741
{
    return point->meth;
}
742

743
int EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point)
744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766
{
    if (group->meth->point_set_to_infinity == 0) {
        ECerr(EC_F_EC_POINT_SET_TO_INFINITY,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
    if (group->meth != point->meth) {
        ECerr(EC_F_EC_POINT_SET_TO_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->point_set_to_infinity(group, point);
}

int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group,
                                             EC_POINT *point, const BIGNUM *x,
                                             const BIGNUM *y, const BIGNUM *z,
                                             BN_CTX *ctx)
{
    if (group->meth->point_set_Jprojective_coordinates_GFp == 0) {
        ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
767
    if (!ec_point_is_compat(point, group)) {
768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785
        ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,
              EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->point_set_Jprojective_coordinates_GFp(group, point, x,
                                                              y, z, ctx);
}

int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group,
                                             const EC_POINT *point, BIGNUM *x,
                                             BIGNUM *y, BIGNUM *z,
                                             BN_CTX *ctx)
{
    if (group->meth->point_get_Jprojective_coordinates_GFp == 0) {
        ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
786
    if (!ec_point_is_compat(point, group)) {
787 788 789 790 791 792 793 794
        ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,
              EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->point_get_Jprojective_coordinates_GFp(group, point, x,
                                                              y, z, ctx);
}

795 796 797
int EC_POINT_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point,
                                    const BIGNUM *x, const BIGNUM *y,
                                    BN_CTX *ctx)
798
{
799 800
    if (group->meth->point_set_affine_coordinates == NULL) {
        ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES,
801 802 803
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
804
    if (!ec_point_is_compat(point, group)) {
805
        ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES, EC_R_INCOMPATIBLE_OBJECTS);
806 807
        return 0;
    }
808 809 810 811
    if (!group->meth->point_set_affine_coordinates(group, point, x, y, ctx))
        return 0;

    if (EC_POINT_is_on_curve(group, point, ctx) <= 0) {
812
        ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES, EC_R_POINT_IS_NOT_ON_CURVE);
813 814 815
        return 0;
    }
    return 1;
816
}
817

818
#if OPENSSL_API_COMPAT < 0x10200000L
819 820 821 822 823 824 825
int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group,
                                        EC_POINT *point, const BIGNUM *x,
                                        const BIGNUM *y, BN_CTX *ctx)
{
    return EC_POINT_set_affine_coordinates(group, point, x, y, ctx);
}

826
# ifndef OPENSSL_NO_EC2M
827 828 829 830
int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *group,
                                         EC_POINT *point, const BIGNUM *x,
                                         const BIGNUM *y, BN_CTX *ctx)
{
831 832
    return EC_POINT_set_affine_coordinates(group, point, x, y, ctx);
}
833
# endif
834 835 836 837 838 839 840 841
#endif

int EC_POINT_get_affine_coordinates(const EC_GROUP *group,
                                    const EC_POINT *point, BIGNUM *x, BIGNUM *y,
                                    BN_CTX *ctx)
{
    if (group->meth->point_get_affine_coordinates == NULL) {
        ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES,
842 843 844
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
845
    if (!ec_point_is_compat(point, group)) {
846
        ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES, EC_R_INCOMPATIBLE_OBJECTS);
847 848
        return 0;
    }
849 850 851 852
    if (EC_POINT_is_at_infinity(group, point)) {
        ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES, EC_R_POINT_AT_INFINITY);
        return 0;
    }
853
    return group->meth->point_get_affine_coordinates(group, point, x, y, ctx);
854
}
855

856
#if OPENSSL_API_COMPAT < 0x10200000L
857 858 859 860
int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group,
                                        const EC_POINT *point, BIGNUM *x,
                                        BIGNUM *y, BN_CTX *ctx)
{
861
    return EC_POINT_get_affine_coordinates(group, point, x, y, ctx);
862
}
863

864
# ifndef OPENSSL_NO_EC2M
865 866 867 868
int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *group,
                                         const EC_POINT *point, BIGNUM *x,
                                         BIGNUM *y, BN_CTX *ctx)
{
869
    return EC_POINT_get_affine_coordinates(group, point, x, y, ctx);
870
}
871
# endif
872
#endif
873

874 875 876 877 878 879 880
int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
                 const EC_POINT *b, BN_CTX *ctx)
{
    if (group->meth->add == 0) {
        ECerr(EC_F_EC_POINT_ADD, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
881 882
    if (!ec_point_is_compat(r, group) || !ec_point_is_compat(a, group)
        || !ec_point_is_compat(b, group)) {
883 884 885 886 887 888 889 890 891 892 893 894 895
        ECerr(EC_F_EC_POINT_ADD, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->add(group, r, a, b, ctx);
}

int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
                 BN_CTX *ctx)
{
    if (group->meth->dbl == 0) {
        ECerr(EC_F_EC_POINT_DBL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
896
    if (!ec_point_is_compat(r, group) || !ec_point_is_compat(a, group)) {
897 898 899 900 901
        ECerr(EC_F_EC_POINT_DBL, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->dbl(group, r, a, ctx);
}
902

B
Bodo Möller 已提交
903
int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx)
904 905 906 907 908
{
    if (group->meth->invert == 0) {
        ECerr(EC_F_EC_POINT_INVERT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
909
    if (!ec_point_is_compat(a, group)) {
910 911 912 913 914
        ECerr(EC_F_EC_POINT_INVERT, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->invert(group, a, ctx);
}
B
Bodo Möller 已提交
915

916
int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *point)
917 918 919 920 921 922
{
    if (group->meth->is_at_infinity == 0) {
        ECerr(EC_F_EC_POINT_IS_AT_INFINITY,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
923
    if (!ec_point_is_compat(point, group)) {
924 925 926 927 928 929
        ECerr(EC_F_EC_POINT_IS_AT_INFINITY, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->is_at_infinity(group, point);
}

930 931 932 933 934 935 936
/*
 * Check whether an EC_POINT is on the curve or not. Note that the return
 * value for this function should NOT be treated as a boolean. Return values:
 *  1: The point is on the curve
 *  0: The point is not on the curve
 * -1: An error occurred
 */
937 938 939 940 941 942 943
int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point,
                         BN_CTX *ctx)
{
    if (group->meth->is_on_curve == 0) {
        ECerr(EC_F_EC_POINT_IS_ON_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
944
    if (!ec_point_is_compat(point, group)) {
945 946 947 948 949 950 951 952 953 954 955 956 957
        ECerr(EC_F_EC_POINT_IS_ON_CURVE, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->is_on_curve(group, point, ctx);
}

int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b,
                 BN_CTX *ctx)
{
    if (group->meth->point_cmp == 0) {
        ECerr(EC_F_EC_POINT_CMP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return -1;
    }
958
    if (!ec_point_is_compat(a, group) || !ec_point_is_compat(b, group)) {
959 960 961 962 963
        ECerr(EC_F_EC_POINT_CMP, EC_R_INCOMPATIBLE_OBJECTS);
        return -1;
    }
    return group->meth->point_cmp(group, a, b, ctx);
}
B
Bodo Möller 已提交
964

B
Bodo Möller 已提交
965
int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx)
966 967 968 969 970
{
    if (group->meth->make_affine == 0) {
        ECerr(EC_F_EC_POINT_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
971
    if (!ec_point_is_compat(point, group)) {
972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987
        ECerr(EC_F_EC_POINT_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    return group->meth->make_affine(group, point, ctx);
}

int EC_POINTs_make_affine(const EC_GROUP *group, size_t num,
                          EC_POINT *points[], BN_CTX *ctx)
{
    size_t i;

    if (group->meth->points_make_affine == 0) {
        ECerr(EC_F_EC_POINTS_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }
    for (i = 0; i < num; i++) {
988
        if (!ec_point_is_compat(points[i], group)) {
989 990 991 992 993 994 995 996 997 998 999
            ECerr(EC_F_EC_POINTS_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS);
            return 0;
        }
    }
    return group->meth->points_make_affine(group, num, points, ctx);
}

/*
 * Functions for point multiplication. If group->meth->mul is 0, we use the
 * wNAF-based implementations in ec_mult.c; otherwise we dispatch through
 * methods.
1000 1001 1002
 */

int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
1003 1004 1005
                  size_t num, const EC_POINT *points[],
                  const BIGNUM *scalars[], BN_CTX *ctx)
{
1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032
    int ret = 0;
    size_t i = 0;
    BN_CTX *new_ctx = NULL;

    if ((scalar == NULL) && (num == 0)) {
        return EC_POINT_set_to_infinity(group, r);
    }

    if (!ec_point_is_compat(r, group)) {
        ECerr(EC_F_EC_POINTS_MUL, EC_R_INCOMPATIBLE_OBJECTS);
        return 0;
    }
    for (i = 0; i < num; i++) {
        if (!ec_point_is_compat(points[i], group)) {
            ECerr(EC_F_EC_POINTS_MUL, EC_R_INCOMPATIBLE_OBJECTS);
            return 0;
        }
    }

    if (ctx == NULL && (ctx = new_ctx = BN_CTX_secure_new()) == NULL) {
        ECerr(EC_F_EC_POINTS_MUL, ERR_R_INTERNAL_ERROR);
        return 0;
    }

    if (group->meth->mul != NULL)
        ret = group->meth->mul(group, r, scalar, num, points, scalars, ctx);
    else
1033
        /* use default */
1034
        ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx);
1035

1036 1037
    BN_CTX_free(new_ctx);
    return ret;
1038
}
1039 1040

int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar,
1041 1042 1043
                 const EC_POINT *point, const BIGNUM *p_scalar, BN_CTX *ctx)
{
    /* just a convenient interface to EC_POINTs_mul() */
1044

1045 1046
    const EC_POINT *points[1];
    const BIGNUM *scalars[1];
1047

1048 1049
    points[0] = point;
    scalars[0] = p_scalar;
1050

1051 1052 1053 1054
    return EC_POINTs_mul(group, r, g_scalar,
                         (point != NULL
                          && p_scalar != NULL), points, scalars, ctx);
}
1055 1056

int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx)
1057 1058 1059 1060
{
    if (group->meth->mul == 0)
        /* use default */
        return ec_wNAF_precompute_mult(group, ctx);
1061

1062 1063 1064 1065 1066
    if (group->meth->precompute_mult != 0)
        return group->meth->precompute_mult(group, ctx);
    else
        return 1;               /* nothing to do, so report success */
}
1067 1068

int EC_GROUP_have_precompute_mult(const EC_GROUP *group)
1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084
{
    if (group->meth->mul == 0)
        /* use default */
        return ec_wNAF_have_precompute_mult(group);

    if (group->meth->have_precompute_mult != 0)
        return group->meth->have_precompute_mult(group);
    else
        return 0;               /* cannot tell whether precomputation has
                                 * been performed */
}

/*
 * ec_precompute_mont_data sets |group->mont_data| from |group->order| and
 * returns one on success. On error it returns zero.
 */
1085
static int ec_precompute_mont_data(EC_GROUP *group)
1086 1087 1088 1089
{
    BN_CTX *ctx = BN_CTX_new();
    int ret = 0;

R
Rich Salz 已提交
1090 1091
    BN_MONT_CTX_free(group->mont_data);
    group->mont_data = NULL;
1092 1093 1094 1095 1096

    if (ctx == NULL)
        goto err;

    group->mont_data = BN_MONT_CTX_new();
1097
    if (group->mont_data == NULL)
1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109
        goto err;

    if (!BN_MONT_CTX_set(group->mont_data, group->order, ctx)) {
        BN_MONT_CTX_free(group->mont_data);
        group->mont_data = NULL;
        goto err;
    }

    ret = 1;

 err:

R
Rich Salz 已提交
1110
    BN_CTX_free(ctx);
1111 1112
    return ret;
}
1113 1114 1115 1116 1117 1118 1119 1120 1121 1122

int EC_KEY_set_ex_data(EC_KEY *key, int idx, void *arg)
{
    return CRYPTO_set_ex_data(&key->ex_data, idx, arg);
}

void *EC_KEY_get_ex_data(const EC_KEY *key, int idx)
{
    return CRYPTO_get_ex_data(&key->ex_data, idx);
}
D
Dr. Stephen Henson 已提交
1123 1124 1125 1126 1127 1128 1129

int ec_group_simple_order_bits(const EC_GROUP *group)
{
    if (group->order == NULL)
        return 0;
    return BN_num_bits(group->order);
}
1130

1131
static int ec_field_inverse_mod_ord(const EC_GROUP *group, BIGNUM *r,
1132
                                    const BIGNUM *x, BN_CTX *ctx)
1133
{
1134
    BIGNUM *e = NULL;
1135 1136 1137
    BN_CTX *new_ctx = NULL;
    int ret = 0;

1138 1139 1140
    if (group->mont_data == NULL)
        return 0;

1141 1142 1143 1144
    if (ctx == NULL && (ctx = new_ctx = BN_CTX_secure_new()) == NULL)
        return 0;

    BN_CTX_start(ctx);
1145
    if ((e = BN_CTX_get(ctx)) == NULL)
1146 1147
        goto err;

1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161
    /*-
     * We want inverse in constant time, therefore we utilize the fact
     * order must be prime and use Fermats Little Theorem instead.
     */
    if (!BN_set_word(e, 2))
        goto err;
    if (!BN_sub(e, group->order, e))
        goto err;
    /*-
     * Exponent e is public.
     * No need for scatter-gather or BN_FLG_CONSTTIME.
     */
    if (!BN_mod_exp_mont(r, x, e, group->order, ctx, group->mont_data))
        goto err;
1162

1163
    ret = 1;
1164 1165

 err:
1166
    BN_CTX_end(ctx);
1167 1168 1169 1170
    BN_CTX_free(new_ctx);
    return ret;
}

1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185
/*-
 * Default behavior, if group->meth->field_inverse_mod_ord is NULL:
 * - When group->order is even, this function returns an error.
 * - When group->order is otherwise composite, the correctness
 *   of the output is not guaranteed.
 * - When x is outside the range [1, group->order), the correctness
 *   of the output is not guaranteed.
 * - Otherwise, this function returns the multiplicative inverse in the
 *   range [1, group->order).
 *
 * EC_METHODs must implement their own field_inverse_mod_ord for
 * other functionality.
 */
int ec_group_do_inverse_ord(const EC_GROUP *group, BIGNUM *res,
                            const BIGNUM *x, BN_CTX *ctx)
1186 1187 1188 1189
{
    if (group->meth->field_inverse_mod_ord != NULL)
        return group->meth->field_inverse_mod_ord(group, res, x, ctx);
    else
1190
        return ec_field_inverse_mod_ord(group, res, x, ctx);
1191
}
1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209

/*-
 * Coordinate blinding for EC_POINT.
 *
 * The underlying EC_METHOD can optionally implement this function:
 * underlying implementations should return 0 on errors, or 1 on
 * success.
 *
 * This wrapper returns 1 in case the underlying EC_METHOD does not
 * support coordinate blinding.
 */
int ec_point_blind_coordinates(const EC_GROUP *group, EC_POINT *p, BN_CTX *ctx)
{
    if (group->meth->blind_coordinates == NULL)
        return 1; /* ignore if not implemented */

    return group->meth->blind_coordinates(group, p, ctx);
}