mbx_nistp256/384/521_ecdsa_sign_complete

mbx_nistp256/384/521_ecdsa_sign_complete#

Completes computation of the ECDSA signature.

Syntax#

mbx_status mbx_nistp256_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp256_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

Include Files#

crypto_mb/ec_nistp256.h

crypto_mb/ec_nistp384.h

crypto_mb/ec_nistp521.h

Parameters#

pa_sign_r

Array of pointers to the resulting r-components of signature vectors.

pa_sign_s

Array of pointers to the resulting s-components of the signature.

pa_msg

Array of pointers to the message representatives are being signed.

pa_inv_eph_skey

Array of pointers to the inversion of the ephemeral private key.

pa_reg_skey

Array of pointers to the signer’s regular private key.

pBuffer

Pointer to the work buffer.

Description#

Each function targets at the elliptic curve (EC) specified in thename (nistp256, nistp384 or nistp521). The function completescomputation of the signature (step 3 of ECDSA operation) usingregular private keys specified by the pa_reg_skey parameter, convertsr- and s- components of the signature into big endian byte stringsand stores them in locations specified by pa_sign_r and pa_sign_sparameters.

The work buffer specified by the pBuffer parameteris not currently used and can be NULL.

Note

All the functions above have own “twins” with “_ssl” in the name. The “twin” associated with the EC acts the same. The single difference in comparison with mbx_nistp256/384/521_ecdsa_sign_complete() is representation of the parameters. mbx_nistp256/384/521_ecdsa_sign_complete_ssl() functions use BIGNUM datatype instead of vector.

Return Values#

The mbx_nistp256/384/521_ecdsa_sign_complete functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS() call.