mbx_sm2_ecdh¶
Computes a shared secret.
Syntax¶
mbx_status mbx_sm2_ecdh_mb8(int8u* pa_shared_key[8], const int64u* const pa_skey[8], const int64u* const pa_pubx[8], const int64u* const pa_puby[8], const int64u* const pa_pubz[8], int8u* pBuffer);
mbx_status mbx_sm2_ecdh_ssl_mb8(int8u* pa_shared_key[8], const BIGNUM* const pa_skey[8], const BIGNUM* const pa_pubx[8], const BIGNUM* const pa_puby[8], const BIGNUM* const pa_pubz[8], int8u* pBuffer);
Include Files¶
crypto_mb/ec_sm2.h
Parameters¶
pa_shared_key |
Array of pointers to the vectors of computed shared secret values. |
pa_pubx |
Array of pointers to the vectors of party’s public key x-coordinates. |
pa_puby |
Array of pointers to the vectors of party’s public key y-coordinates. |
pa_pubz |
Array of pointers to the vectors of party’s public key z-coordinates |
pa_skey |
Array of pointers to the vectors of own private keys. |
pBuffer |
Pointer to the work buffer. |
Description¶
The function computes a shared secret value using own private keys
specified by the pa_skey parameter and the party’s public key specified
by pa_pubx, pa_puby, and pa_pubz parameters. If the pa_pubz parameter is
not NULL
, then it is assumed that party’s public keys are
represented in projective coordinates. If the pa_pubz parameter is
NULL
, then party’s public keys are considered in affine coordinates.
The work buffer specified by the pBuffer parameteris not currently used
and can be NULL
.
Note
The function above has own “twin” with “_ssl” in the name. The only difference in comparison with mbx_sm2_ecdh() is representation of the parameters. mbx_sm2_ecdh_ssl() functions use BIGNUM datatype instead of vector.
Return Values¶
The mbx_sm2_ecdh function returns the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS() call.