How does one obtain the session key from a SSL structure after a successful TLS handshake?

I'm planning to implement a TLS connection to do nothing more than authenticated key agreement. Once I've established the connection I plan to somehow extract a AES256 key (from the session key?), which I'll then use in a completely different secure channel, and then drop the connection.

I've looked through the docs and forums and asked almighty google, but have so far failed to find out how to extract the master key (session key) from the SSL struct. If I can extract the session key, I still need to extract/derive a AES256 symmetric key from that - any ideas how?

Any pointers appreciated...

T J


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to