It's actually a mix of a couple of hashes.  Specifically md5, and sha1
according to the spec.

The best place to look for this would be the standard RFC document since
OpenSSL complies to that.  The TLSv1 RFC (linked here:
http://www.ietf.org/rfc/rfc2246.txt) contains how the key material is
generated for a given session.  See section 6.3 on page 20.  There is a
similar section in the SSLv3 RFC document too.  Hope this sheds some light!

-Sam

On Fri, Sep 10, 2010 at 1:57 PM, Stephan Müller
<muell...@math.hu-berlin.de>wrote:

> Hello,
>
> i am wondering how key derivation in openssl works, I got
>
> > > openssl enc -des -P -k 'admin' -nosalt
> key=21232F297A57A5A7
> iv =43894A0E4A801FC3
>
> as far i understand the documentation, in this setting the key and iv are
> just taken from
>
> md5(admin)=456b7016a916a4b178dd72b947c152b7
>
> but obviously there has to be some magic. Could someone give me a hint for
> good documentation ( != source )?
>
>  stephan
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>



-- 
Sam Jantz
Software Engineer

Reply via email to