Comment # 5
on bug 9144
from Peter Wu
Created attachment 11569 [details]
premaster.txt (for non-TLS ciphers, dump is attachment id 11568)
This premaster was extracted from openssl s_client output using the following
hackery:
openssl s_client -connect "$host" -no_tls1 |
awk '/Master-Key:/{key=$2} {b=1;e=16;if(l==3)b=7;if(l==1)e=6;
for(i=b;i<=e;i++)s=s$i;if(l--==1)r[s]=1}
/ ClientHello|ServerHello$/{l=3;s=""}
END{for(rnd in r)print "CLIENT_RANDOM",rnd,key}'
I do not know if it is correct to use the same master key for the server and
client random, but it seems to work.
You are receiving this mail because:
- You are watching all bug changes.