Developer Reference

Contents

mbx_nistp256/384/521_ecdh

Computes a shared secret.

Syntax

mbx_status mbx_nistp256_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp256_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp384_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp384_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp521_ecdh_mb8(int8u*
pa_shared_key
[8], const int64u* const
pa_skey
[8], const int64u* const
pa_pubx
[8], const int64u* const
pa_puby
[8], const int64u* const
pa_pubz
[8]
, int8u*
pBuffer
);
mbx_status mbx_nistp521_ecdh_ssl_mb8(int8u*
pa_shared_key
[8], const BIGNUM* const
pa_skey
[8], const BIGNUM* const
pa_pubx
[8], const BIGNUM* const
pa_puby
[8], const BIGNUM* const
pa_pubz
[8]
, int8u*
pBuffer
);
Include Files
crypto_mb/ec_nistp256.h
crypto_mb/ec_nistp384.h
crypto_mb/ec_nistp521.h
Parameters
pa_shared_key
Array of pointers to the vectors of computed shared secret values.
pa_pubx
Array of pointers to the vectors of party's public key x-coordinates.
pa_puby
Array of pointers to the vectors of party's public key y-coordinates.
pa_pubz
Array of pointers to the vectors of party's public key z-coordinates
pa_skey
Array of pointers to the vectors of own private keys.
pBuffer
Pointer to the work buffer.
Description
Each function targets at the elliptic curve (EC) specified in the name (
nistp256, nistp384
or
nistp521
). The function computes a shared secret value using own private keys specified by the
pa_skey
parameter and the party's public key specified by
pa_pubx
,
pa_puby
and
pa_pubz
parameters. If the
pa_pubz
parameter is not
NULL
, then it is assumed that party's public keys are represented in projective coordinates. If the
pa_pubz
parameter is
NULL
, then party's public keys are considered in affine coordinates.
The work buffer specified by the
pBuffer
parameter is not currently used and can be
NULL
.
All the functions above have own "twins" with "_ssl" in the name. The "twin" associated with the EC acts the same. The single difference in comparison with
mbx_nistp256/384/521_ecdh()
is representation of the parameters.
mbx_nistp256/384/521_ecdh_ssl()
functions use BIGNUM datatype instead of vector.
Return Values
The
mbx_nistp256/384/521_ecdh
functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the
MBX_GET_STS()
call.

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.