Sortix nightly manual
This manual documents Sortix nightly, a development build that has not been officially released. You can instead view this document in the latest official manual.
SSL_GET_CLIENT_RANDOM(3) | Library Functions Manual | SSL_GET_CLIENT_RANDOM(3) |
NAME
SSL_get_client_random
,
SSL_get_server_random
,
SSL_SESSION_get_master_key
—
get internal TLS handshake random values and master
key
SYNOPSIS
#include
<openssl/ssl.h>
size_t
SSL_get_client_random
(const
SSL *ssl, unsigned char *out,
size_t outlen);
size_t
SSL_get_server_random
(const
SSL *ssl, unsigned char *out,
size_t outlen);
size_t
SSL_SESSION_get_master_key
(const
SSL_SESSION *session, unsigned char
*out, size_t outlen);
DESCRIPTION
SSL_get_client_random
() extracts the random
value that was sent from the client to the server during the initial TLS
handshake. It copies at most outlen bytes of
this value into the buffer out. If
outlen is zero, nothing is copied.
SSL_get_server_random
() behaves the same, but
extracts the random value that was sent from the server to the client during
the initial TLS handshake.
SSL_SESSION_get_master_key
() behaves the
same, but extracts the master secret used to guarantee the security of the TLS
session. The security of the TLS session depends on keeping the master key
secret: do not expose it, or any information about it, to anybody. To
calculate another secret value that depends on the master secret, use
SSL_export_keying_material(3)
instead.
All these functions expose internal values from the TLS handshake, for use in
low-level protocols. Avoid using them unless implementing a feature that
requires access to the internal protocol details.
Despite the names of SSL_get_client_random
()
and SSL_get_server_random
(), they are not
random number generators. Instead, they return the mostly-random values that
were already generated and used in the TLS protocol.
In current versions of the TLS protocols, the length of client_random and
server_random is always SSL3_RANDOM_SIZE
bytes. Support for other outlen arguments is
provided for the unlikely event that a future version or variant of TLS uses
some other length.
Finally, though the client_random and server_random values are called
“random”, many TLS implementations generate four bytes of those
values based on their view of the current time.
RETURN VALUES
If outlen is greater than 0, these functions return the number of bytes actually copied, which is less than or equal to outlen. If outlen is 0, these functions return the maximum number of bytes they would copy — that is, the length of the underlying field.SEE ALSO
ssl(3), SSL_export_keying_material(3), SSL_SESSION_get_id(3), SSL_SESSION_get_time(3), SSL_SESSION_new(3)HISTORY
These functions first appeared in OpenSSL 1.1.0 and have been available since OpenBSD 6.3.March 24, 2018 | Debian |