the application data starting from 00 21 9B ... but you
mentioned otherwise.
Sandeep
On Tue, Jul 7, 2009 at 8:23 AM, Harsha gowda harsha.k.go...@gmail.comwrote:
Hi all,
*key_block = PRF(SecurityParameters.master_secret, key expansion,
SecurityParameters.server_random
Hi all,
*key_block = PRF(SecurityParameters.master_secret, key expansion,
SecurityParameters.server_random + SecurityParameters.client_random);*
Key_block for my capture file is as below.
client_write_MAC_secret : 24 37 4F EB 79 47 5F 28 48 5D CB CA BF B2 EF FC 09
64 64 F9
Hi,
I am sniffing packets over wireless of 802.11i packets,
Which uses EAP-TLS,
So i have two way data and private key of CA.
Client-Hello--
Server-Hello
ClientKeyexchange
So now i can derive key-block,
But openssl utlity for SSL3/TLS methods are built
/Diffie-Hellman.
for public key and private key exchange algos You need private key file to
decrypt the sessions.
Regards,
krish.
On Mon, Jun 29, 2009 at 5:54 PM, Harsha gowda harsha.k.go...@gmail.comwrote:
Hi,
Its
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
Regards
Thanks a lot
Your reply was much more usefull
On Tue, Jun 9, 2009 at 7:01 AM, Dave Thompson
dave.thomp...@princetonpayments.com wrote:
From: owner-openssl-...@openssl.org On Behalf Of Harsha gowda
Sent: Sunday, 07 June, 2009 07:54
Can any one tell me why 130 bytes
Hi,
Can any one tell me why 130 bytes of data is present in Client key exchange,
It has to be 128 bytes,
Decrypting those 130 bytes is giving error.
can any 1 help in this regard.
I want to extract Pre-master secret
A sample log file and private key is here check it out.