top of page

Fiona Devereaux Group

Public·3 members

I Am Alive Pc Keygen 63 ##BEST##


  • This document shows actual values of all the cryptographic computations,their inputs and outputs, in order in the example SSL connections. Thisis to aid others in developing SSL implementations.The public and private certificates and keys used (revealed) in thisexample are used only for SSL session samples.The connections do not use client-auth. They use RC4 with a 128-bitkey, derived from 40 secret bits (an "export" key).This table shows the different messages in the first connection.Each link will take you directly to the relevant portion of the document. First Connection Messages Client Server Client Hello Server Hello Certificate Server Hello Done Client Key Exchange Change Cipher Spec Finished Change Cipher Spec Finished HTTP request HTTP response Close Notify Alert Close Notify Alert The second connection uses the "session resume" (or "session restart")feature of SSL, to avoid repeating all the computation of theclient_key_exchange message. Second ("Restarted") Connection Messages Client Server Client Hello (V3) Server Hello Change Cipher Spec Finished Change Cipher Spec Finished HTTP request HTTP response Close Notify Alert Close Notify Alert Notes on presentation (format) of following data:Data that is transmitted, received, or that is input to or output fromfunctions that hash, compress, encrypt or decrypt, are shown in bothhexadecimal and in ASCII, with unprintable charaacters shown as dots.Other lines contain comments or analysis of the data. Comments generallypreceed the data they describe.Lines beginning with a plus ("+") symbol denote data that is actuallytransmitted or received over the underlying transport (TCP) connection.All other lines of data are used only internally.The intermediate state of the MD5 and SHA-1 hashes is shown in two parts,the contents of the 4 (MD5) or 5 (SHA-1) 32-bit state variables are shownin hexadecimal, followed by the content of any buffered inputto the hash function (partial hash input block) that has not yet beenprocessed by the hash function.The first Connection.Client Hello HandshakeThe first connection begins with an SSL version 2 client_hello messagefrom the client. This differs from an ordinary SSL V2 client_hello messagein one aspect, the version number field indicates version 3, not version 2. An SSl server that supports both versions 2 and 3 will reply to such a message with a version 3 server_hello, as seen below.secure connect completed, starting handshakesending client-hellodump-msg: Client-Hello version (Major)=3 version (minor)=0 cipher-specs [Len: 6] 00 00 03 00 00 06 session-id [Len: 0] challenge [Len: 16] 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 sending 31 bytes in the clearclear data: [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ All handshake messages, from either client or server, beginning with theclient-hello, must be included in the ongoing "handshake hashes". Thereare two handshake hashes, one MD5, the other SHA1. The content of the handshakemessages, excluding any record-layer headers, is hashed into each of thetwo hashes.The client-hello shown above is the first input to the handshake hashes:start handshake hashesMD5 & SHA handshake hash input: [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ After hashing the client_hello handshake, the hashshake hashes are:MD5 state: 67452301 efcdab89 98badcfe 10325476MD5_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ SHA1 state: 67452301 efcdab89 98badcfe 10325476 c3d2e1f0SHA1_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ The sent SSL V2 client hello record looks like this:record length: [Len: 2]+ 80 1f ..clear record: [Len: 31]+ 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................+ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[Server Hello HandshakeThe Server's reply, a single handshake record containing several handshake messages, is received.raw gather data: [Len: 5]+ 16 03 00 05 81 .....plaintext: [Len: 1409]+ 02 00 00 46 03 00 34 02 87 24 8e ea bd f7 c2 8c ...F..4..$......+ fc fe 39 54 90 bb 06 fe 48 b4 a2 07 fc 9d 2a d2 ..9T....H.....*.+ d9 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff .,..X. ....X+...+ 12 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 .Y.2,..o .......+ be b2 40 cd 85 9f f3 00 03 00 0b 00 05 2f 00 05 ..@........../..+ 2c 00 02 7c 30 82 02 78 30 82 01 e1 a0 03 02 01 ,..0..x0.......+ 02 02 01 70 30 0d 06 09 2a 86 48 86 f7 0d 01 01 ...p0...*.H.....+ 04 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 ...0w1.0...U....+ 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 74 US1,0*..U...#Net+ 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 74 scape Communicat+ 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e ions Corporation+ 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 63 1.0...U....Hardc+ 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 61 ore1'0%..U....Ha+ 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 61 rdcore Certifica+ 74 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 0d te Server II0...+ 39 37 30 38 31 39 30 34 33 32 32 38 5a 17 0d 39 970819043228Z..9+ 38 30 32 31 35 30 34 33 32 32 38 5a 30 81 98 31 80215043228Z0..1+ 0b 30 09 06 03 55 04 06 13 02 55 53 31 11 30 0f .0...U....US1.0.+ 06 03 55 04 0a 13 08 4e 65 74 73 63 61 70 65 31 ..U....Netscape1+ 1d 30 1b 06 03 55 04 0b 13 14 48 61 72 64 63 6f .0...U....Hardco+ 72 65 20 53 53 4c 20 74 65 73 74 69 6e 67 31 19 re SSL testing1.+ 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 01 13 09 0.....&...,d....+ 53 53 4c 54 65 73 74 65 72 31 17 30 15 06 03 55 SSLTester1.0...U+ 04 03 13 0e 62 69 6a 6f 75 2e 6d 63 6f 6d 2e 63 ....bijou.mcom.c+ 6f 6d 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 om1#0!..*.H.....+ 01 16 14 6e 65 6c 73 6f 6e 62 40 6e 65 74 73 63 ...nelsonb@netsc+ 61 70 65 2e 63 6f 6d 30 5c 30 0d 06 09 2a 86 48 ape.com0\0...*.H+ 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02 41 00 .........K.0H.A.+ e3 f3 ba 48 dd 2e bd a8 e9 87 8e 5f 8a 9e cb c9 ...H......._....+ 6d c1 8b 79 31 ad b0 26 39 ba dc 28 d1 f0 20 75 m..y1..&9..(.. u+ a4 24 d2 e8 16 e7 b3 b6 aa 39 e5 e2 4c bf 8e 5f .$.......9..L.._+ 96 4b cd 09 75 71 b1 69 1f 67 df b7 ac 58 29 a1 .K..uq.i.g...X).+ 02 03 01 00 01 a3 36 30 34 30 11 06 09 60 86 48 ......6040...`.H+ 01 86 f8 42 01 01 04 04 03 02 00 40 30 1f 06 03 ...B.......@0...+ 55 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 U.#..0.....m....+ 54 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 0d 06 T....2m......0..+ 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 .*.H............+ a0 e6 3f 22 15 fb 54 8f ee a3 d8 81 ee 20 ad 67 ..?"..T...... .g+ d6 a4 64 67 3a d1 74 4f 19 4a ba 9e 9d ce b9 4c ..dg:.tO.J.....L+ d7 40 c1 f0 fd 32 5e 7b 73 c5 27 55 e4 e0 f0 7d .@...2^s.'U...+ ee ec fe 10 16 0f 6f c5 a0 12 5e c6 74 c9 16 c4 ......o...^.t...+ d7 43 cc 78 16 2b 4c 98 7f be 27 cf d9 bd 76 53 .C.x.+L...'...vS+ e8 ed f9 1a 05 77 9e fd 80 a9 e6 05 14 bf d2 0d .....w..........+ 0f ff 17 38 5c 74 62 e9 f1 1b 41 3b 74 36 06 cc ...8\tb...A;t6..+ 67 da 03 ca 37 d2 1c 66 37 fc c0 be fd 20 32 e0 g...7..f7.... 2.+ 00 02 aa 30 82 02 a6 30 82 02 0f a0 03 02 01 02 ...0...0........+ 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 ...0...*.H......+ 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 55 ..0w1.0...U....U+ 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 74 73 S1,0*..U...#Nets+ 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 74 69 cape Communicati+ 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 ons Corporation1+ 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 63 6f .0...U....Hardco+ 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 61 72 re1'0%..U....Har+ 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 61 74 dcore Certificat+ 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 0d 39 e Server II0...9+ 37 30 35 32 37 31 38 30 39 34 37 5a 17 0d 39 38 70527180947Z..98+ 30 35 32 37 31 38 30 39 34 37 5a 30 77 31 0b 30 0527180947Z0w1.0+ 09 06 03 55 04 06 13 02 55 53 31 2c 30 2a 06 03 ...U....US1,0*..+ 55 04 0a 13 23 4e 65 74 73 63 61 70 65 20 43 6f U...#Netscape Co+ 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 6f 72 mmunications Cor+ 70 6f 72 61 74 69 6f 6e 31 11 30 0f 06 03 55 04 poration1.0...U.+ 0b 13 08 48 61 72 64 63 6f 72 65 31 27 30 25 06 ...Hardcore1'0%.+ 03 55 04 03 13 1e 48 61 72 64 63 6f 72 65 20 43 .U....Hardcore C+ 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 65 ertificate Serve+ 72 20 49 49 30 81 9f 30 0d 06 09 2a 86 48 86 f7 r II0..0...*.H..+ 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 ..........0.....+ 00 bc 14 a0 c0 53 fa e1 4d b9 cd 0e b7 42 e3 cd .....S..M....B..+ 98 46 e0 b3 1e 13 76 c7 c5 e5 3d e5 24 18 dd 72 .F....v...=.$..r+ 1a 37 7f c4 66 51 36 7f e1 ae e9 11 5e 29 6f ac .7..fQ6.....^)o.+ ff 28 ce cd 53 ae 39 09 75 a1 eb d2 ec 79 d4 e9 .(..S.9.u....y..+ 6b 4c 99 e4 b6 42 d0 f7 52 8b ae 4a 33 6b 58 5b kL...B..R..J3kX[+ 47 57 13 a3 61 32 86 02 e8 63 e6 7a 27 c2 99 7a GW..a2...c.z'..z+ 22 48 d9 c8 d1 5c 6d b1 37 84 66 4b 9e a2 ce 31 "H...\m.7.fK...1+ 6c 1c 06 7a 5f c5 7b b8 ff 58 89 f6 0b 40 6f 7c l..z_.{..X...@o+ 0d 02 03 01 00 01 a3 42 30 40 30 1d 06 03 55 1d .......B0@0...U.+ 0e 04 16 04 14 97 b1 6d b2 b6 02 16 54 0c 97 d7 .......m....T...+ e3 32 6d cb 9c df ee de 80 30 1f 06 03 55 1d 23 .2m......0...U.#+ 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 54 0c 97 ..0.....m....T..+ d7 e3 32 6d cb 9c df ee de 80 30 0d 06 09 2a 86 ..2m......0...*.+ 48 86 f7 0d 01 01 05 05 00 03 81 81 00 9b 52 fe H.............R.+ 93 fa 40 4d a9 8d 72 f9 f6 f6 c9 32 40 dc 20 fe ..@M..r....2@. .+ be a5 a2 db e6 2c df d1 5f a0 66 45 d1 6e 5f 0a .....,.._.fE.n_.+ 91 e9 0b c1 7c 8a c0 64 a0 d4 24 56 85 b5 a0 aa ......d..$V....+ 1e c8 8c 15 40 ac fc 5a 2f 94 18 44 b9 73 23 c1 ....@..Z/..D.s#.+ 49 a0 24 ff b0 47 9c d8 28 1f b3 70 a7 62 b3 5b I.$..G..(..p.b.[+ 8e 4d 82 bd 4d 85 eb 0d 5a 87 c0 41 c9 a6 c2 69 .M..M...Z..A...i+ 9c ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 ...I*..Uo..!..p.+ 5d 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 ]4;.).....y.....+ 00 .The handshake record is parsed into the separate handshake messages.The server_hello message is as described in the SSL 3 spec, section 7.6.1.2 .handle handshake message: server_hello (2)Prior to hashing in the server's first handshake, the handshake hashes are:MD5 state: 67452301 efcdab89 98badcfe 10325476MD5_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ SHA1 state: 67452301 efcdab89 98badcfe 10325476 c3d2e1f0SHA1_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ The server_hello handshake is hashed.MD5 & SHA handshake hash input: [Len: 4] 02 00 00 46 ...FMD5 & SHA handshake hash input: [Len: 70] 03 00 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 ..4..$........9T 90 bb 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 ....H.....*..,.. 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 59 0d 32 X. ....X+....Y.2 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be b2 40 cd ,..o .........@. 85 9f f3 00 03 00 ......After hashing the server_hello handshake, the handshake hashes are now:MD5 state: fe5432fc 4546c043 247db6dd 4c44a2d9MD5_TraceState: buffered input [Len: 41] 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 ,..X. ....X+.... 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be Y.2,..o ........ b2 40 cd 85 9f f3 00 03 00 .@.......SHA1 state: b62879bd 38f9c328 f9d4d5e2 b633c37d b14fa56cSHA1_TraceState: buffered input [Len: 41] 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 ,..X. ....X+.... 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be Y.2,..o ........ b2 40 cd 85 9f f3 00 03 8e .@.......handle server_hello handshake 03 00 ..server random: [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.session ID len: [Len: 1] 20 session ID: [Len: 32] 00 00 82 f4 58 2b 88 b7 ff 12 59 0d 32 2c d7 13 ....X+....Y.2,.. 6f 20 c6 f7 9c 98 b6 de 85 be b2 40 cd 85 9f f3 o .........@....cipher suite: [Len: 2] 00 03 ..compression: [Len: 1] 00 .Set Pending Cipher Suite to 0x0003 - SSL_RSA_EXPORT_WITH_RC4_40_MD5Server's Certificate HandhakeThe following certificate handshake message, as described in the SSL 3 spec, section 7.6.2 .It is taken from the same record as the previous handshake, and is included in the handshake hashes.handle handshake message: certificate (11)MD5 & SHA handshake hash input: [Len: 4] 0b 00 05 2f .../MD5 & SHA handshake hash input: [Len: 1327] 00 05 2c 00 02 7c 30 82 02 78 30 82 01 e1 a0 03 ..,..0..x0..... 02 01 02 02 01 70 30 0d 06 09 2a 86 48 86 f7 0d .....p0...*.H... 01 01 04 05 00 30 77 31 0b 30 09 06 03 55 04 06 .....0w1.0...U.. 13 02 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e ..US1,0*..U...#N 65 74 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 etscape Communic 61 74 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 ations Corporati 6f 6e 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 on1.0...U....Har 64 63 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e dcore1'0%..U.... 48 61 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 Hardcore Certifi 63 61 74 65 20 53 65 72 76 65 72 20 49 49 30 1e cate Server II0. 17 0d 39 37 30 38 31 39 30 34 33 32 32 38 5a 17 ..970819043228Z. 0d 39 38 30 32 31 35 30 34 33 32 32 38 5a 30 81 .980215043228Z0. 98 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 11 .1.0...U....US1. 30 0f 06 03 55 04 0a 13 08 4e 65 74 73 63 61 70 0...U....Netscap 65 31 1d 30 1b 06 03 55 04 0b 13 14 48 61 72 64 e1.0...U....Hard 63 6f 72 65 20 53 53 4c 20 74 65 73 74 69 6e 67 core SSL testing 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 01 1.0.....&...,d.. 13 09 53 53 4c 54 65 73 74 65 72 31 17 30 15 06 ..SSLTester1.0.. 03 55 04 03 13 0e 62 69 6a 6f 75 2e 6d 63 6f 6d .U....bijou.mcom 2e 63 6f 6d 31 23 30 21 06 09 2a 86 48 86 f7 0d .com1#0!..*.H... 01 09 01 16 14 6e 65 6c 73 6f 6e 62 40 6e 65 74 .....nelsonb@net 73 63 61 70 65 2e 63 6f 6d 30 5c 30 0d 06 09 2a scape.com0\0...* 86 48 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02 .H.........K.0H. 41 00 e3 f3 ba 48 dd 2e bd a8 e9 87 8e 5f 8a 9e A....H......._.. cb c9 6d c1 8b 79 31 ad b0 26 39 ba dc 28 d1 f0 ..m..y1..&9..(.. 20 75 a4 24 d2 e8 16 e7 b3 b6 aa 39 e5 e2 4c bf u.$.......9..L. 8e 5f 96 4b cd 09 75 71 b1 69 1f 67 df b7 ac 58 ._.K..uq.i.g...X 29 a1 02 03 01 00 01 a3 36 30 34 30 11 06 09 60 ).......6040...` 86 48 01 86 f8 42 01 01 04 04 03 02 00 40 30 1f .H...B.......@0. 06 03 55 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 ..U.#..0.....m.. 02 16 54 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 ..T....2m......0 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 ...*.H.......... 81 00 a0 e6 3f 22 15 fb 54 8f ee a3 d8 81 ee 20 ....?"..T...... ad 67 d6 a4 64 67 3a d1 74 4f 19 4a ba 9e 9d ce .g..dg:.tO.J.... b9 4c d7 40 c1 f0 fd 32 5e 7b 73 c5 27 55 e4 e0 .L.@...2^s.'U.. f0 7d ee ec fe 10 16 0f 6f c5 a0 12 5e c6 74 c9 .......o...^.t. 16 c4 d7 43 cc 78 16 2b 4c 98 7f be 27 cf d9 bd ...C.x.+L...'... 76 53 e8 ed f9 1a 05 77 9e fd 80 a9 e6 05 14 bf vS.....w........ d2 0d 0f ff 17 38 5c 74 62 e9 f1 1b 41 3b 74 36 .....8\tb...A;t6 06 cc 67 da 03 ca 37 d2 1c 66 37 fc c0 be fd 20 ..g...7..f7.... 32 e0 00 02 aa 30 82 02 a6 30 82 02 0f a0 03 02 2....0...0...... 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 .....0...*.H.... 01 05 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 ....0w1.0...U... 02 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 .US1,0*..U...#Ne 74 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 tscape Communica 74 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f tions Corporatio 6e 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 n1.0...U....Hard 63 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 core1'0%..U....H 61 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 ardcore Certific 61 74 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 ate Server II0.. 0d 39 37 30 35 32 37 31 38 30 39 34 37 5a 17 0d .970527180947Z.. 39 38 30 35 32 37 31 38 30 39 34 37 5a 30 77 31 980527180947Z0w1 0b 30 09 06 03 55 04 06 13 02 55 53 31 2c 30 2a .0...U....US1,0* 06 03 55 04 0a 13 23 4e 65 74 73 63 61 70 65 20 ..U...#Netscape 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 Communications C 6f 72 70 6f 72 61 74 69 6f 6e 31 11 30 0f 06 03 orporation1.0... 55 04 0b 13 08 48 61 72 64 63 6f 72 65 31 27 30 U....Hardcore1'0 25 06 03 55 04 03 13 1e 48 61 72 64 63 6f 72 65 %..U....Hardcore 20 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 Certificate Ser 76 65 72 20 49 49 30 81 9f 30 0d 06 09 2a 86 48 ver II0..0...*.H 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 ............0... 81 81 00 bc 14 a0 c0 53 fa e1 4d b9 cd 0e b7 42 .......S..M....B e3 cd 98 46 e0 b3 1e 13 76 c7 c5 e5 3d e5 24 18 ...F....v...=.$. dd 72 1a 37 7f c4 66 51 36 7f e1 ae e9 11 5e 29 .r.7..fQ6.....^) 6f ac ff 28 ce cd 53 ae 39 09 75 a1 eb d2 ec 79 o..(..S.9.u....y d4 e9 6b 4c 99 e4 b6 42 d0 f7 52 8b ae 4a 33 6b ..kL...B..R..J3k 58 5b 47 57 13 a3 61 32 86 02 e8 63 e6 7a 27 c2 X[GW..a2...c.z'. 99 7a 22 48 d9 c8 d1 5c 6d b1 37 84 66 4b 9e a2 .z"H...\m.7.fK.. ce 31 6c 1c 06 7a 5f c5 7b b8 ff 58 89 f6 0b 40 .1l..z_.{..X...@ 6f 7c 0d 02 03 01 00 01 a3 42 30 40 30 1d 06 03 o.......B0@0... 55 1d 0e 04 16 04 14 97 b1 6d b2 b6 02 16 54 0c U........m....T. 97 d7 e3 32 6d cb 9c df ee de 80 30 1f 06 03 55 ...2m......0...U 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 54 .#..0.....m....T 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 0d 06 09 ....2m......0... 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 9b *.H............. 52 fe 93 fa 40 4d a9 8d 72 f9 f6 f6 c9 32 40 dc R...@M..r....2@. 20 fe be a5 a2 db e6 2c df d1 5f a0 66 45 d1 6e ......,.._.fE.n 5f 0a 91 e9 0b c1 7c 8a c0 64 a0 d4 24 56 85 b5 _.......d..$V.. a0 aa 1e c8 8c 15 40 ac fc 5a 2f 94 18 44 b9 73 ......@..Z/..D.s 23 c1 49 a0 24 ff b0 47 9c d8 28 1f b3 70 a7 62 #.I.$..G..(..p.b b3 5b 8e 4d 82 bd 4d 85 eb 0d 5a 87 c0 41 c9 a6 .[.M..M...Z..A.. c2 69 9c ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 .i...I*..Uo..!.. 70 e4 5d 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 p.]4;.).....y..After hashing the certificate handshake message, the handshake hashes are:MD5 state: 560c93e0 964c3ad9 e5247f9d b34341d1MD5_TraceState: buffered input [Len: 28] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 4;.).....y..SHA1 state: e72665bc 312f118f 0bd0913a 1978c453 290ee2e7SHA1_TraceState: buffered input [Len: 28] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 4;.).....y..Server Hello Done HandshakeThe following server_hello_done handshake message, as described in the the SSL 3 spec, section 7.6.5, is taken from the same record as the previous two handshakes,and is entirely included in the handshake hashes.handle handshake message: server_hello_done (14)MD5 & SHA handshake hash input: [Len: 4] 0e 00 00 00 ....MD5 & SHA handshake hash input: [Len: 0]After hashing the server_hello_done handshake message, the handshake hashesare:MD5 state: 560c93e0 964c3ad9 e5247f9d b34341d1MD5_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......SHA1 state: e72665bc 312f118f 0bd0913a 1978c453 290ee2e7SHA1_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......handle server_hello_done handshakeClient Key Exchange HandshakeNext, the client now composes its response to the above messages.In this example, the client sends the following three records: a record containing a client_key_exchange handshake

  • a change_cipher_spec record

  • an encrypted record, containing a "finished" handshake.

Compose the client key exchange, according to the SSL 3 spec, section 7.6.7, The client key exchange messagecontains the 48-byte


About

Welcome to the group! You can connect with other members, ge...

bottom of page