#include <stdio.h>
#include <openssl/dh.h>
#include <memory.h>
int main(){
DH *d1,*d2;
BIO *b;
int ret,size,i,len1,len2;
char sharekey1[128],sharekey2[128];
d1 = DH_new();
d2 = DH_new();
if(DH_generate_parameters_ex(d1,64,DH_GENERATOR_2,NULL)!=1)
{
printf("HD_generate_parameters_ex error \n");
return -1;
}
if(DH_check(d1,&i)!=1)
{
printf("DH_check error\n");
if(i&DH_CHECK_P_NOT_PRIME)
printf("p value is not prime\n");
if(i&DH_CHECK_P_NOT_SAFE_PRIME)
printf("p value is not a safe prime\n");
if (i&DH_UNABLE_TO_CHECK_GENERATOR)
printf("unable to check the generator value\n");
if (i&DH_NOT_SUITABLE_GENERATOR)
printf("the g value is not a generator\n");
}
printf("DH parameters appear to be ok\n");
size = DH_size(d1);
printf("DH key1 size:%d\n",size);
ret = DH_generate_key(d1);
if(ret!=1){
printf("DH_generate_key error\n");
return -1;
}
d2->p = BN_dup(d1->p);
d2->g = BN_dup(d1->g);
if(DH_generate_key(d2)!=1)
{
printf("DH_generate_key error\n");
return -1;
}
if(DH_check_pub_key(d1,d1->pub_key,&i)!=1)
{
if (i&DH_CHECK_PUBKEY_TOO_SMALL)
printf("pub key too small \n");
if (i&DH_CHECK_PUBKEY_TOO_LARGE)
printf("pub key too large \n");
}
len1 = DH_compute_key(sharekey1,d2->pub_key,d1);
len2 = DH_compute_key(sharekey2,d1->pub_key,d2);
if(len1!=len2)
{
printf("生成共享秘钥失败!\n");
return -1;
}
if(memcmp(sharekey1,sharekey2,len1)!=0)
{
printf("生成共享秘钥失败!\n");
return -1;
}
printf("生成共享秘钥成功\n");
b = BIO_new(BIO_s_file());
BIO_set_fp(b,stdout,BIO_NOCLOSE);
DHparams_print(b,d1);
printf("====================\n");
DHparams_print(b,d2);
BIO_free(b);
DH_free(d1);
DH_free(d2);
return 0;
}
ssl dh加密
最新推荐文章于 2024-07-13 08:00:00 发布