[mailto:owner-openssl-us...@openssl.org]
On Behalf Of Gayathri Sundar
Sent: Wednesday, August 24, 2011 2:59 PM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption
I think the problem this person seem to have is not finding a way to extract
the master secret on
-openssl-us...@openssl.org [mailto:
> owner-openssl-us...@openssl.org] *On Behalf Of *krishnamurthy santhanam
> *Sent:* Wednesday, August 24, 2011 12:51 AM
> *To:* openssl-users@openssl.org
> *Subject:* Re: creating Master-Key for encryption/decryption
>
> ** **
>
> Thanks. As per m
penssl.org [mailto:owner-openssl-us...@openssl.org]
On Behalf Of krishnamurthy santhanam
Sent: Wednesday, August 24, 2011 12:51 AM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption
Thanks. As per my understanding,Before sending master key to client , server
has t
penssl.org [mailto:owner-openssl-us...@openssl.org]
On Behalf Of krishnamurthy santhanam
Sent: Wednesday, August 24, 2011 12:51 AM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption
Thanks. As per my understanding,Before sending master key to client , serv
Thanks. As per my understanding,Before sending master key to client , server
has to maintain the master key. How i can get this in server side? is there
any code sample or snippet to get this key?
Krishna
On Tue, Aug 23, 2011 at 11:54 PM, Gayathri Sundar wrote:
> Master key is unique per session,
Master key is unique per session, and its same for both client and server,
thats the concept behind the SSL handshake. The RFC would state the
information accurately. Perhaps you can send the master secret as part of
ur application data, to the client, which can decrypt and use.
Thanks
--Gayathri
Thanks. I gone through the RFC 2246 and understood the Master key generation
part. The Master key is generated and able to print the client side(test C
program) using ssl strucure.
printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
for (i=0; i<(
Please read the RFC, it would clearly explain how the master secret is
dervied, and from that how the read and write keys are derived. With that
you can get to know how to extract the read n write keys. Meanwhile the read
and wirte keys are available as part of the ssl object.
Check that structure
I have more than 100 clients that will connect to my server and communicate
the data. I am implementing SSL on server side to authenticate the client
certificate(X.509) and also client will authenticate the servers
certificate. Once the mutual authentication has completed I have to generate
master