mbx_nistp256/384/521_ecdh

Computes a shared secret.

Syntax

mbx_status mbx_nistp256_ecdh_mb8(int8u* pa_shared_key[8], const int64u* const pa_skey[8], const int64u* const pa_pubx[8], const int64u* const pa_puby[8], const int64u* const pa_pubz[8], int8u* pBuffer);

mbx_status mbx_nistp256_ecdh_ssl_mb8(int8u* pa_shared_key[8], const BIGNUM* const pa_skey[8], const BIGNUM* const pa_pubx[8], const BIGNUM* const pa_puby[8], const BIGNUM* const pa_pubz[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdh_mb8(int8u* pa_shared_key[8], const int64u* const pa_skey[8], const int64u* const pa_pubx[8], const int64u* const pa_puby[8], const int64u* const pa_pubz[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdh_ssl_mb8(int8u* pa_shared_key[8], const BIGNUM* const pa_skey[8], const BIGNUM* const pa_pubx[8], const BIGNUM* const pa_puby[8], const BIGNUM* const pa_pubz[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdh_mb8(int8u* pa_shared_key[8], const int64u* const pa_skey[8], const int64u* const pa_pubx[8], const int64u* const pa_puby[8], const int64u* const pa_pubz[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdh_ssl_mb8(int8u* pa_shared_key[8], const BIGNUM* const pa_skey[8], const BIGNUM* const pa_pubx[8], const BIGNUM* const pa_puby[8], const BIGNUM* const pa_pubz[8], int8u* pBuffer);

Include Files

crypto_mb/ec_nistp256.h

crypto_mb/ec_nistp384.h

crypto_mb/ec_nistp521.h

Parameters

pa_shared_key

Array of pointers to the vectors of computed shared secret values.

pa_pubx

Array of pointers to the vectors of party’s public key x-coordinates.

pa_puby

Array of pointers to the vectors of party’s public key y-coordinates.

pa_pubz

Array of pointers to the vectors of party’s public key z-coordinates

pa_skey

Array of pointers to the vectors of own private keys.

pBuffer

Pointer to the work buffer.

Description

Each function targets at the elliptic curve (EC) specified in thename (nistp256, nistp384 or nistp521). The function computes a shared secret value using own private keys specified by the pa_skey parameter and the party’s public key specified by pa_pubx, pa_puby and pa_pubz parameters. If the pa_pubz parameter is not NULL, then it is assumed that party’s public keys are represented in projective coordinates. If the pa_pubz parameter is NULL, then party’s public keys are considered in affine coordinates.

The work buffer specified by the pBuffer parameteris not currently used and can be NULL.

Note

All the functions above have own “twins” with “_ssl” in the name. The “twin” associated with the EC acts the same. The single difference in comparison with mbx_nistp256/384/521_ecdh() is representation of the parameters. mbx_nistp256/384/521_ecdh_ssl() functions use BIGNUM datatype instead of vector.

Return Values

The mbx_nistp256/384/521_ecdh functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS() call.