How does one obtain the session key from a SSL structure after a successful TLS handshake?
I'm planning to implement a TLS connection to do nothing more than authenticated key agreement. Once I've established the connection I plan to somehow extract a AES256 key (from the session key?), which I'll then use in a completely different secure channel, and then drop the connection.
I've looked through the docs and forums and asked almighty google, but have so far failed to find out how to extract the master key (session key) from the SSL struct. If I can extract the session key, I still need to extract/derive a AES256 symmetric key from that - any ideas how?
Any pointers appreciated... T J ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org