On Mon, 2019-11-04 at 17:34 -0500, Jason Qian via openssl-users wrote: > Hi > > We have an application that does the Diffie Hellman key exchange > (OpenSSL/1.1.0f). > It works fine, but under heavy loaded conditions, sometimes an > invalide secret been generated and other side couldn't decrypt the > data (the secret seems offset by one). > > The client side is c++ and the server side is java. > > DH_compute_key(secretKey, bnY, m_DH); > > Someone in the openssl group also talks about a similar issue, but > not sure if have a solution. Could it be a padding issue? I.E. use DH_compute_key_padded() instead. -- Tomáš Mráz No matter how far down the wrong road you've gone, turn back. Turkish proverb [You'll know whether the road is wrong if you carefully listen to your conscience.]