Cryptography for Intel(R) Integrated Performance Primitives Developer Reference

ID 768738
Date 12/16/2022
Public
Document Table of Contents

mbx_nistp256/384/521_ecdsa_sign_complete

Completes computation of the ECDSA signature.

Syntax

mbx_status mbx_nistp256_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp256_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp384_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdsa_sign_complete_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const int64u* const pa_sgn_rp[8], const int64u* const pa_inv_eph_skey[8], const int64u* const pa_reg_skey[8], int8u* pBuffer);

mbx_status mbx_nistp521_ecdsa_sign_complete_ssl_mb8(int8u* pa_sign_r[8], int8u* pa_sign_s[8], const int8u* const pa_msg[8], const BIGNUM* const pa_sgn_rp[8], const BIGNUM* const pa_inv_eph_skey[8], const BIGNUM* const pa_reg_skey[8], int8u* pBuffer);

Include Files

crypto_mb/ec_nistp256.h

crypto_mb/ec_nistp384.h

crypto_mb/ec_nistp521.h

Parameters

pa_sign_r

Array of pointers to the resulting r-components of signature vectors.

pa_sign_s

Array of pointers to the resulting s-components of the signature.

pa_msg

Array of pointers to the message representatives are being signed.

pa_inv_eph_skey

Array of pointers to the inversion of the ephemeral private key.

pa_reg_skey

Array of pointers to the signer's regular private key.

pBuffer

Pointer to the work buffer.
Description

Each function targets at the elliptic curve (EC) specified in the name (nistp256, nistp384 or nistp521). The function completes computation of the signature (step 3 of ECDSA operation) using regular private keys specified by the pa_reg_skey parameter, converts r- and s- components of the signature into big endian byte strings and stores them in locations specified by pa_sign_r and pa_sign_s parameters.

The work buffer specified by the pBuffer parameter is not currently used and can be NULL.

NOTE:

All the functions above have own "twins" with "_ssl" in the name. The "twin" associated with the EC acts the same. The single difference in comparison with mbx_nistp256/384/521_ecdsa_sign_complete() is representation of the parameters. mbx_nistp256/384/521_ecdsa_sign_complete_ssl() functions use BIGNUM datatype instead of vector.

Return Values

The mbx_nistp256/384/521_ecdsa_sign_complete functions return the status that indicates whether the operation completed successfully or not. The status value of 0 indicates that all operations completed successfully. The error condition can be analyzed by the MBX_GET_STS() call.

Did you find the information on this page useful?

Characters remaining:

Feedback Message