On Wed, Jan 30, 2013 at 05:29:51PM +1300, T J wrote:
> How does one obtain the session key from a SSL structure after a
> successful TLS handshake?
You don't, but, you shold instead obtain the "tls-unique" channel
binding data ( https://tools.ietf.org/html/rfc5929#section-3 ) and
run the result t
How does one obtain the session key from a SSL structure after a
successful TLS handshake?
I'm planning to implement a TLS connection to do nothing more than
authenticated key agreement. Once I've established the connection I plan
to somehow extract a AES256 key (from the session key?), whic
On Tue, Jan 29, 2013 at 6:37 AM, Joseandro Luiz
wrote:
> Hello everyone,
> I am using the OpenSSL user guide from
> http://www.openssl.org/docs/fips/UserGuide-2.0.pdf in order to create a FIPS
> 140-2 compliant iOS app.
> So far I've successfully built the Incore utility and the FIPS Object Module
On Tue, Jan 29, 2013, Joseandro Luiz wrote:
> Hello everyone,
> I am using the OpenSSL user guide from
> http://www.openssl.org/docs/fips/UserGuide-2.0.pdf in order to create a
> FIPS 140-2 compliant iOS app.
> So far I've successfully built the Incore utility and the FIPS Object
> Module but I am
On Tue, Jan 29, 2013, Joseandro Luiz wrote:
> Hello everyone,
> I am using the OpenSSL user guide from
> http://www.openssl.org/docs/fips/UserGuide-2.0.pdf in order to create a
> FIPS 140-2 compliant iOS app.
> So far I've successfully built the Incore utility and the FIPS Object
> Module but I am