.. _mbx_nistp256-384-521_ecdsa_sign_complete: mbx_nistp256/384/521_ecdsa_sign_complete ======================================== Completes computation of the ECDSA signature. Syntax ------ mbx_status mbx_nistp256_ecdsa_sign_complete_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const int64u\* const pa_sgn_rp[8], const int64u\* const pa_inv_eph_skey[8], const int64u\* const pa_reg_skey[8], int8u\* pBuffer); mbx_status mbx_nistp256_ecdsa_sign_complete_ssl_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const BIGNUM\* const pa_sgn_rp[8], const BIGNUM\* const pa_inv_eph_skey[8], const BIGNUM\* const pa_reg_skey[8], int8u\* pBuffer); mbx_status mbx_nistp384_ecdsa_sign_complete_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const int64u\* const pa_sgn_rp[8], const int64u\* const pa_inv_eph_skey[8], const int64u\* const pa_reg_skey[8], int8u\* pBuffer); mbx_status mbx_nistp384_ecdsa_sign_complete_ssl_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const BIGNUM\* const pa_sgn_rp[8], const BIGNUM\* const pa_inv_eph_skey[8], const BIGNUM\* const pa_reg_skey[8], int8u\* pBuffer); mbx_status mbx_nistp521_ecdsa_sign_complete_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const int64u\* const pa_sgn_rp[8], const int64u\* const pa_inv_eph_skey[8], const int64u\* const pa_reg_skey[8], int8u\* pBuffer); mbx_status mbx_nistp521_ecdsa_sign_complete_ssl_mb8(int8u\* pa_sign_r[8], int8u\* pa_sign_s[8], const int8u\* const pa_msg[8], const BIGNUM\* const pa_sgn_rp[8], const BIGNUM\* const pa_inv_eph_skey[8], const BIGNUM\* const pa_reg_skey[8], int8u\* pBuffer); Include Files ------------- ``crypto_mb/ec_nistp256.h`` ``crypto_mb/ec_nistp384.h`` ``crypto_mb/ec_nistp521.h`` Parameters ---------- .. list-table:: :header-rows: 0 * - pa_sign_r - Array of pointers to the resulting r-components of signature vectors. * - pa_sign_s - Array of pointers to the resulting s-components of the signature. * - pa_msg - Array of pointers to the message representatives are being signed. * - pa_inv_eph_skey - Array of pointers to the inversion of the ephemeral private key. * - pa_reg_skey - Array of pointers to the signer's regular private key. * - pBuffer - Pointer to the work buffer. Description ----------- Each function targets at the elliptic curve (EC) specified in thename (nistp256, nistp384 or nistp521). The function completescomputation of the signature (step 3 of ECDSA operation) usingregular private keys specified by the pa_reg_skey parameter, converts\ ``r``- and ``s``- components of the signature into big endian byte stringsand stores them in locations specified by pa_sign_r and pa_sign_sparameters. The work buffer specified by the pBuffer parameteris not currently used and can be ``NULL``. .. note:: All the functions above have own "twins" with "_ssl" in the name. The "twin" associated with the EC acts the same. The single difference in comparison with mbx_nistp256/384/521_ecdsa_sign_complete() is representation of the parameters. mbx_nistp256/384/521_ecdsa_sign_complete_ssl() functions use BIGNUM datatype instead of vector. Return Values ------------- The mbx_nistp256/384/521_ecdsa_sign_complete functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS() call.