Just run the program. All things are set. Also if you wish you can change the secret values a of Alice's or b of Bob's. We just check whether a secret private key is generated or not. If a*(b*P) == b*(a*P) then we are succeed and secure private key abP is generated and they can use it as for further coomunications.
- To make :
make - To make and run :
make run - To clean :
make clean
gcc ecdh.c functions.c -o output./output