Hello all, Sorry for the bandwidth. but cudn't see a better place to post this query. I'm using the freeradius server for EAP-TLS based authentication. The setup is working fine. However I have a query wrt one of the handshake messages. In EAP-TLS rfc ,when the server sends the Handshake finished message , in the ethereal dump the Finished handshake message is shown as "Encrypted Handshake Message" with Length as 32 bytes. But according to the TLS rfc the finished message should be 12 bytes in length. How is the freeradius sending 32 bytes then. The following is my undertstanding wrt the TLS rfc 2246 1) generate master key(48 bytes) from pre-master key masterkey = PRF(premasterkey+"master secret"+client.random+server.random) 2) generate finished handshke msg (12 bytes) finished = PRF(master key + "server finished"+MD5(handshake msgs)+SHA1(handshake msgs)) Can someone tell me how is this handshake message being calculated? Thanks in advance. Regards, Avinash
- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

