Hi, Can any one tell me why 130 bytes of data is present in Client key exchange, It has to be 128 bytes,
Decrypting those 130 bytes is giving error. can any 1 help in this regard. I want to extract Pre-master secret A sample log file and private key is here check it out. *http://www.sendspace.com/file/ztuulp* (wireshark capture file) the Client Key exchange data is as below *10=Message type 00 00 82 =Length=130 Bytes* *10 00 00 82* 00 80 9f 4c 0f 96 87 bd c6 92 2f b8 90 66 58 4c eb 26 dc c9 61 fa 16 d3 88 a1 23 9b 5d 9f c8 b7 bf 2f 45 fb e6 9c 9d 66 67 6f 35 0a b9 38 7d b8 26 26 bd 78 ac 39 bf 2f 68 f6 a3 22 29 ef cd b1 ad 46 e1 e4 8a e5 a1 28 55 76 b2 0f f9 ca f3 65 77 47 35 0c 64 38 66 2f 8e c9 5d 81 00 4a f9 75 c2 6d 4d 07 4b bc bd 5c a2 3a d4 be 85 c9 65 59 1f 5b ac 3a 95 0e a3 db 80 43 98 f4 a1 4c 91 f6 d3 d6 if i decrypt the above "client key exchange" 130 bytes with below private key i get error *http://www.sendspace.com/file/w8bd9t (Private Key) password for this private key is sniffer *How can i extract *pre-master secret* from 130 byte "*client key exchange* ". The command i used to decrypt cypher text is c:\openssl\bin>openssl rsautl -decrypt -infile privatekey -in clientkeyexchange -out clientkeyexchange.dec I was able to decrypt correctly with our error for this file * http://wiki.wireshark.org/SampleCaptures?action=AttachFile&do=get&target=snakeoil2_070531.tgz *The length of the client key exchange is 128 bytes. what is the difference in decoding SSL 3.0 and TLS pre-master secret can any one help * Regards Harsha*
