/* openssl , dh , sessionkey*/
#include <openssl/dh.h>
#include <memory.h>
int main() {
DH *d1,*d2;
BIO *b;
int ret,size,i,len1,len2;
char sharekey1[128],sharekey2[128];
/* DH */
d1=DH_new();
d2=DH_new();
/* d1 */
ret=DH_generate_parameters_ex(d1,64,DH_GENERATOR_2,NULL);
if(ret!=1) { //prime_len,g 1, 2 5
printf("DH_generate_parameters_ex err!
");
return -1;
}
/* */
ret=DH_check(d1,&i);//i 0, ,
if(ret!=1) {
printf("DH_check err!
");
if(i&DH_CHECK_P_NOT_PRIME)
printf("p value is not prime
");
if(i&DH_CHECK_P_NOT_SAFE_PRIME)
printf("p value is not a safe prime
");
if (i&DH_UNABLE_TO_CHECK_GENERATOR)
printf("unable to check the generator value
");
if (i&DH_NOT_SUITABLE_GENERATOR)
printf("the g value is not a generator
");
}
printf("DH parameters appear to be ok.
");
/* */
size=DH_size(d1);
printf("DH key1 size : %d
",size);
/* */
ret=DH_generate_key(d1);
if(ret!=1) {
printf("DH_generate_key err!
");
return -1;
}
/* p g , */
d2->p=BN_dup(d1->p);
d2->g=BN_dup(d1->g);
/* , */
ret=DH_generate_key(d2);
if(ret!=1) {
printf("DH_generate_key err!
");
return -1;
}
/* */
ret=DH_check_pub_key(d1,d1->pub_key,&i);
if(ret!=1) {
if (i&DH_CHECK_PUBKEY_TOO_SMALL)
printf("pub key too small
");
if (i&DH_CHECK_PUBKEY_TOO_LARGE)
printf("pub key too large
");
}
/* */
len1=DH_compute_key(sharekey1,d2->pub_key,d1);
len2=DH_compute_key(sharekey2,d1->pub_key,d2);
if(len1!=len2) {
printf(" 1
");
return -1;
}
if(memcmp(sharekey1,sharekey2,len1)!=0) {
printf(" 2
");
return -1;
}
printf("
");
return 0;
}