mbx_nistp256/384/521_ecdh
mbx_nistp256/384/521_ecdh
Computes a shared secret.
Syntax
mbx_status mbx_nistp256_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp256_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp384_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp384_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp521_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp521_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
Include Files
crypto_mb/ec_nistp256.h
crypto_mb/ec_nistp384.h
crypto_mb/ec_nistp521.h
Parameters
- pa_shared_key
- Array of pointers to the vectors of computed shared secret values.
- pa_pubx
- Array of pointers to the vectors of party's public key x-coordinates.
- pa_puby
- Array of pointers to the vectors of party's public key y-coordinates.
- pa_pubz
- Array of pointers to the vectors of party's public key z-coordinates
- pa_skey
- Array of pointers to the vectors of own private keys.
- pBuffer
- Pointer to the work buffer.
Description
Each function targets at the elliptic curve (EC) specified in the
name (
nistp256, nistp384
or nistp521
). The function computes a shared secret value using own private keys specified by the pa_skey
parameter and the party's public key specified by pa_pubx
, pa_puby
and pa_pubz
parameters. If the pa_pubz
parameter is not NULL
, then it is assumed that party's public keys are represented in projective coordinates. If the pa_pubz
parameter is NULL
, then party's public keys are considered in affine coordinates. The work buffer specified by the
pBuffer
parameter
is not currently used and can be NULL
. All the functions above have own "twins" with "_ssl" in the name. The "twin" associated with the EC acts the same. The single difference in comparison with
mbx_nistp256/384/521_ecdh()
is representation of the parameters. mbx_nistp256/384/521_ecdh_ssl()
functions use BIGNUM datatype instead of vector.Return Values
The
mbx_nistp256/384/521_ecdh
functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS()
call.