To summarize ECDH_compute_key, you provide a pointer to one party's EC
public Key, a pointer to another party's EC private key, and a pointer
to a hashing routine and the function will compute a shared secret

However, there is much more to key exchange than merely understanding
how to use this function. It is more important to know how to use it

I suggest that you read and understand the concepts of key exchange
relating to ECC and ECDH in NIST Special Pub 800-56A

Determine whether your application requires the use of ephemeral keys
and whether your key exchange needs to be one way or two way. Then
start looking into the mechanics of the actual API calls you will need
to use.

Also keep in mind that good security design necessitates that you use
symmetric, asymmetric and hashing algorithms of equivalent strength.


-----Original Message-----
[] On Behalf Of Sateesh Babu
Sent: January 11, 2008 7:03 AM
Subject: How to use ECDH_compute_key

There is not enough documentation on the usage of ECDH_compute_key.
Can anyone please help me in understanding its usage?

__________________________________________________ ____________________
OpenSSL Project
User Support Mailing List
Automated List Manager