MirBSD manpage: DH_compute_key(3), DH_generate_key(3)

DH_GENERATE_KEY(3)           OpenSSL           DH_GENERATE_KEY(3)


     DH_generate_key, DH_compute_key - perform Diffie-Hellman key


      #include <openssl/dh.h>

      int DH_generate_key(DH *dh);

      int DH_compute_key(unsigned char *key, BIGNUM *pub_key, DH *dh);


     DH_generate_key() performs the first step of a Diffie-
     Hellman key exchange by generating private and public DH
     values. By calling DH_compute_key(), these are combined with
     the other party's public value to compute the shared key.

     DH_generate_key() expects dh to contain the shared parame-
     ters dh->p and dh->g. It generates a random private DH value
     unless dh->priv_key is already set, and computes the
     corresponding public value dh->pub_key, which can then be

     DH_compute_key() computes the shared secret from the private
     DH value in dh and the other party's public value in pub_key
     and stores it in key. key must point to DH_size(dh) bytes of


     DH_generate_key() returns 1 on success, 0 otherwise.

     DH_compute_key() returns the size of the shared secret on
     success, -1 on error.

     The error codes can be obtained by ERR_get_error(3).


     dh(3), ERR_get_error(3), rand(3), DH_size(3)


     DH_generate_key() and DH_compute_key() are available in all
     versions of SSLeay and OpenSSL.

MirBSD #10-current         2005-02-05                           1

Generated on 2022-12-24 01:00:14 by $MirOS: src/scripts/roff2htm,v 1.113 2022/12/21 23:14:31 tg Exp $ — This product includes material provided by mirabilos.

These manual pages and other documentation are copyrighted by their respective writers; their sources are available at the project’s CVSweb, AnonCVS and other mirrors. The rest is Copyright © 2002–2022 MirBSD.

This manual page’s HTML representation is supposed to be valid XHTML/1.1; if not, please send a bug report — diffs preferred.

Kontakt / Impressum & Datenschutzerklärung