Hello all,
Sorry for the bandwidth. but cudn't see a better place to post this query.
 
I'm using the freeradius server for EAP-TLS based authentication. The setup
is working fine.
However I have a query wrt one of the handshake messages.
 
In EAP-TLS rfc ,when the server sends the Handshake finished message , in
the ethereal dump
the Finished handshake message is shown as "Encrypted Handshake Message"
with Length as 32 bytes.
 
But according to the TLS rfc the finished message should be 12 bytes in
length.
How is the freeradius sending 32 bytes then.
 
The following is my undertstanding wrt the TLS rfc 2246
 
1) generate master key(48 bytes)  from pre-master key
masterkey = PRF(premasterkey+"master secret"+client.random+server.random)
 
2) generate finished handshke msg (12 bytes)
finished = PRF(master key + "server finished"+MD5(handshake
msgs)+SHA1(handshake msgs))
 
Can someone tell me how is this handshake message being calculated?
 
Thanks in advance.
Regards,
Avinash
 

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to