I Am Alive Pc !LINK! Keygen 63
Download >> https://urluss.com/2sVPAU
This document shows actual values of all the cryptographic computations,their inputs and outputs, in order in the example SSL connections. Thisis to aid others in developing SSL implementations.The public and private certificates and keys used (revealed) in thisexample are used only for SSL session samples.The connections do not use client-auth. They use RC4 with a 128-bitkey, derived from 40 secret bits (an "export" key).This table shows the different messages in the first connection.Each link will take you directly to the relevant portion of the document. First Connection Messages Client Server Client Hello Server Hello Certificate Server Hello Done Client Key Exchange Change Cipher Spec Finished Change Cipher Spec Finished HTTP request HTTP response Close Notify Alert Close Notify Alert The second connection uses the "session resume" (or "session restart")feature of SSL, to avoid repeating all the computation of theclient_key_exchange message. Second ("Restarted") Connection Messages Client Server Client Hello (V3) Server Hello Change Cipher Spec Finished Change Cipher Spec Finished HTTP request HTTP response Close Notify Alert Close Notify Alert Notes on presentation (format) of following data:Data that is transmitted, received, or that is input to or output fromfunctions that hash, compress, encrypt or decrypt, are shown in bothhexadecimal and in ASCII, with unprintable charaacters shown as dots.Other lines contain comments or analysis of the data. Comments generallypreceed the data they describe.Lines beginning with a plus ("+") symbol denote data that is actuallytransmitted or received over the underlying transport (TCP) connection.All other lines of data are used only internally.The intermediate state of the MD5 and SHA-1 hashes is shown in two parts,the contents of the 4 (MD5) or 5 (SHA-1) 32-bit state variables are shownin hexadecimal, followed by the content of any buffered inputto the hash function (partial hash input block) that has not yet beenprocessed by the hash function.The first Connection.Client Hello HandshakeThe first connection begins with an SSL version 2 client_hello messagefrom the client. This differs from an ordinary SSL V2 client_hello messagein one aspect, the version number field indicates version 3, not version 2. An SSl server that supports both versions 2 and 3 will reply to such a message with a version 3 server_hello, as seen below.secure connect completed, starting handshakesending client-hellodump-msg: Client-Hello version (Major)=3 version (minor)=0 cipher-specs [Len: 6] 00 00 03 00 00 06 session-id [Len: 0] challenge [Len: 16] 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 sending 31 bytes in the clearclear data: [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ All handshake messages, from either client or server, beginning with theclient-hello, must be included in the ongoing "handshake hashes". Thereare two handshake hashes, one MD5, the other SHA1. The content of the handshakemessages, excluding any record-layer headers, is hashed into each of thetwo hashes.The client-hello shown above is the first input to the handshake hashes:start handshake hashesMD5 & SHA handshake hash input: [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ After hashing the client_hello handshake, the hashshake hashes are:MD5 state: 67452301 efcdab89 98badcfe 10325476MD5_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ SHA1 state: 67452301 efcdab89 98badcfe 10325476 c3d2e1f0SHA1_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ The sent SSL V2 client hello record looks like this:record length: [Len: 2]+ 80 1f ..clear record: [Len: 31]+ 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................+ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[Server Hello HandshakeThe Server's reply, a single handshake record containing several handshake messages, is received.raw gather data: [Len: 5]+ 16 03 00 05 81 .....plaintext: [Len: 1409]+ 02 00 00 46 03 00 34 02 87 24 8e ea bd f7 c2 8c ...F..4..$......+ fc fe 39 54 90 bb 06 fe 48 b4 a2 07 fc 9d 2a d2 ..9T....H.....*.+ d9 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff .,..X. ....X+...+ 12 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 .Y.2,..o .......+ be b2 40 cd 85 9f f3 00 03 00 0b 00 05 2f 00 05 ..@........../..+ 2c 00 02 7c 30 82 02 78 30 82 01 e1 a0 03 02 01 ,..|0..x0.......+ 02 02 01 70 30 0d 06 09 2a 86 48 86 f7 0d 01 01 ...p0...*.H.....+ 04 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 ...0w1.0...U....+ 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 74 US1,0*..U...#Net+ 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 74 scape Communicat+ 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e ions Corporation+ 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 63 1.0...U....Hardc+ 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 61 ore1'0%..U....Ha+ 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 61 rdcore Certifica+ 74 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 0d te Server II0...+ 39 37 30 38 31 39 30 34 33 32 32 38 5a 17 0d 39 970819043228Z..9+ 38 30 32 31 35 30 34 33 32 32 38 5a 30 81 98 31 80215043228Z0..1+ 0b 30 09 06 03 55 04 06 13 02 55 53 31 11 30 0f .0...U....US1.0.+ 06 03 55 04 0a 13 08 4e 65 74 73 63 61 70 65 31 ..U....Netscape1+ 1d 30 1b 06 03 55 04 0b 13 14 48 61 72 64 63 6f .0...U....Hardco+ 72 65 20 53 53 4c 20 74 65 73 74 69 6e 67 31 19 re SSL testing1.+ 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 01 13 09 0.....&...,d....+ 53 53 4c 54 65 73 74 65 72 31 17 30 15 06 03 55 SSLTester1.0...U+ 04 03 13 0e 62 69 6a 6f 75 2e 6d 63 6f 6d 2e 63 ....bijou.mcom.c+ 6f 6d 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 om1#0!..*.H.....+ 01 16 14 6e 65 6c 73 6f 6e 62 40 6e 65 74 73 63 ...nelsonb@netsc+ 61 70 65 2e 63 6f 6d 30 5c 30 0d 06 09 2a 86 48 ape.com0\0...*.H+ 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02 41 00 .........K.0H.A.+ e3 f3 ba 48 dd 2e bd a8 e9 87 8e 5f 8a 9e cb c9 ...H......._....+ 6d c1 8b 79 31 ad b0 26 39 ba dc 28 d1 f0 20 75 m..y1..&9..(.. u+ a4 24 d2 e8 16 e7 b3 b6 aa 39 e5 e2 4c bf 8e 5f .$.......9..L.._+ 96 4b cd 09 75 71 b1 69 1f 67 df b7 ac 58 29 a1 .K..uq.i.g...X).+ 02 03 01 00 01 a3 36 30 34 30 11 06 09 60 86 48 ......6040...`.H+ 01 86 f8 42 01 01 04 04 03 02 00 40 30 1f 06 03 ...B.......@0...+ 55 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 U.#..0.....m....+ 54 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 0d 06 T....2m......0..+ 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 .*.H............+ a0 e6 3f 22 15 fb 54 8f ee a3 d8 81 ee 20 ad 67 ..?"..T...... .g+ d6 a4 64 67 3a d1 74 4f 19 4a ba 9e 9d ce b9 4c ..dg:.tO.J.....L+ d7 40 c1 f0 fd 32 5e 7b 73 c5 27 55 e4 e0 f0 7d .@...2^{s.'U...}+ ee ec fe 10 16 0f 6f c5 a0 12 5e c6 74 c9 16 c4 ......o...^.t...+ d7 43 cc 78 16 2b 4c 98 7f be 27 cf d9 bd 76 53 .C.x.+L...'...vS+ e8 ed f9 1a 05 77 9e fd 80 a9 e6 05 14 bf d2 0d .....w..........+ 0f ff 17 38 5c 74 62 e9 f1 1b 41 3b 74 36 06 cc ...8\tb...A;t6..+ 67 da 03 ca 37 d2 1c 66 37 fc c0 be fd 20 32 e0 g...7..f7.... 2.+ 00 02 aa 30 82 02 a6 30 82 02 0f a0 03 02 01 02 ...0...0........+ 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 ...0...*.H......+ 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 55 ..0w1.0...U....U+ 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 74 73 S1,0*..U...#Nets+ 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 74 69 cape Communicati+ 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 ons Corporation1+ 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 63 6f .0...U....Hardco+ 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 61 72 re1'0%..U....Har+ 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 61 74 dcore Certificat+ 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 0d 39 e Server II0...9+ 37 30 35 32 37 31 38 30 39 34 37 5a 17 0d 39 38 70527180947Z..98+ 30 35 32 37 31 38 30 39 34 37 5a 30 77 31 0b 30 0527180947Z0w1.0+ 09 06 03 55 04 06 13 02 55 53 31 2c 30 2a 06 03 ...U....US1,0*..+ 55 04 0a 13 23 4e 65 74 73 63 61 70 65 20 43 6f U...#Netscape Co+ 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 6f 72 mmunications Cor+ 70 6f 72 61 74 69 6f 6e 31 11 30 0f 06 03 55 04 poration1.0...U.+ 0b 13 08 48 61 72 64 63 6f 72 65 31 27 30 25 06 ...Hardcore1'0%.+ 03 55 04 03 13 1e 48 61 72 64 63 6f 72 65 20 43 .U....Hardcore C+ 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 65 ertificate Serve+ 72 20 49 49 30 81 9f 30 0d 06 09 2a 86 48 86 f7 r II0..0...*.H..+ 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 ..........0.....+ 00 bc 14 a0 c0 53 fa e1 4d b9 cd 0e b7 42 e3 cd .....S..M....B..+ 98 46 e0 b3 1e 13 76 c7 c5 e5 3d e5 24 18 dd 72 .F....v...=.$..r+ 1a 37 7f c4 66 51 36 7f e1 ae e9 11 5e 29 6f ac .7..fQ6.....^)o.+ ff 28 ce cd 53 ae 39 09 75 a1 eb d2 ec 79 d4 e9 .(..S.9.u....y..+ 6b 4c 99 e4 b6 42 d0 f7 52 8b ae 4a 33 6b 58 5b kL...B..R..J3kX[+ 47 57 13 a3 61 32 86 02 e8 63 e6 7a 27 c2 99 7a GW..a2...c.z'..z+ 22 48 d9 c8 d1 5c 6d b1 37 84 66 4b 9e a2 ce 31 "H...\m.7.fK...1+ 6c 1c 06 7a 5f c5 7b b8 ff 58 89 f6 0b 40 6f 7c l..z_.{..X...@o|+ 0d 02 03 01 00 01 a3 42 30 40 30 1d 06 03 55 1d .......B0@0...U.+ 0e 04 16 04 14 97 b1 6d b2 b6 02 16 54 0c 97 d7 .......m....T...+ e3 32 6d cb 9c df ee de 80 30 1f 06 03 55 1d 23 .2m......0...U.#+ 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 54 0c 97 ..0.....m....T..+ d7 e3 32 6d cb 9c df ee de 80 30 0d 06 09 2a 86 ..2m......0...*.+ 48 86 f7 0d 01 01 05 05 00 03 81 81 00 9b 52 fe H.............R.+ 93 fa 40 4d a9 8d 72 f9 f6 f6 c9 32 40 dc 20 fe ..@M..r....2@. .+ be a5 a2 db e6 2c df d1 5f a0 66 45 d1 6e 5f 0a .....,.._.fE.n_.+ 91 e9 0b c1 7c 8a c0 64 a0 d4 24 56 85 b5 a0 aa ....|..d..$V....+ 1e c8 8c 15 40 ac fc 5a 2f 94 18 44 b9 73 23 c1 ....@..Z/..D.s#.+ 49 a0 24 ff b0 47 9c d8 28 1f b3 70 a7 62 b3 5b I.$..G..(..p.b.[+ 8e 4d 82 bd 4d 85 eb 0d 5a 87 c0 41 c9 a6 c2 69 .M..M...Z..A...i+ 9c ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 ...I*..Uo..!..p.+ 5d 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 ]4;.).....y.....+ 00 .The handshake record is parsed into the separate handshake messages.The server_hello message is as described in the SSL 3 spec, section 7.6.1.2 .handle handshake message: server_hello (2)Prior to hashing in the server's first handshake, the handshake hashes are:MD5 state: 67452301 efcdab89 98badcfe 10325476MD5_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ SHA1 state: 67452301 efcdab89 98badcfe 10325476 c3d2e1f0SHA1_TraceState: buffered input [Len: 31] 01 03 00 00 06 00 00 00 10 00 00 03 00 00 06 90 ................ 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 .Fi .d...?...[ The server_hello handshake is hashed.MD5 & SHA handshake hash input: [Len: 4] 02 00 00 46 ...FMD5 & SHA handshake hash input: [Len: 70] 03 00 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 ..4..$........9T 90 bb 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 ....H.....*..,.. 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 59 0d 32 X. ....X+....Y.2 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be b2 40 cd ,..o .........@. 85 9f f3 00 03 00 ......After hashing the server_hello handshake, the handshake hashes are now:MD5 state: fe5432fc 4546c043 247db6dd 4c44a2d9MD5_TraceState: buffered input [Len: 41] 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 ,..X. ....X+.... 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be Y.2,..o ........ b2 40 cd 85 9f f3 00 03 00 .@.......SHA1 state: b62879bd 38f9c328 f9d4d5e2 b633c37d b14fa56cSHA1_TraceState: buffered input [Len: 41] 2c 84 82 58 be 20 00 00 82 f4 58 2b 88 b7 ff 12 ,..X. ....X+.... 59 0d 32 2c d7 13 6f 20 c6 f7 9c 98 b6 de 85 be Y.2,..o ........ b2 40 cd 85 9f f3 00 03 8e .@.......handle server_hello handshake 03 00 ..server random: [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.session ID len: [Len: 1] 20 session ID: [Len: 32] 00 00 82 f4 58 2b 88 b7 ff 12 59 0d 32 2c d7 13 ....X+....Y.2,.. 6f 20 c6 f7 9c 98 b6 de 85 be b2 40 cd 85 9f f3 o .........@....cipher suite: [Len: 2] 00 03 ..compression: [Len: 1] 00 .Set Pending Cipher Suite to 0x0003 - SSL_RSA_EXPORT_WITH_RC4_40_MD5Server's Certificate HandhakeThe following certificate handshake message, as described in the SSL 3 spec, section 7.6.2 .It is taken from the same record as the previous handshake, and is included in the handshake hashes.handle handshake message: certificate (11)MD5 & SHA handshake hash input: [Len: 4] 0b 00 05 2f .../MD5 & SHA handshake hash input: [Len: 1327] 00 05 2c 00 02 7c 30 82 02 78 30 82 01 e1 a0 03 ..,..|0..x0..... 02 01 02 02 01 70 30 0d 06 09 2a 86 48 86 f7 0d .....p0...*.H... 01 01 04 05 00 30 77 31 0b 30 09 06 03 55 04 06 .....0w1.0...U.. 13 02 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e ..US1,0*..U...#N 65 74 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 etscape Communic 61 74 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 ations Corporati 6f 6e 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 on1.0...U....Har 64 63 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e dcore1'0%..U.... 48 61 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 Hardcore Certifi 63 61 74 65 20 53 65 72 76 65 72 20 49 49 30 1e cate Server II0. 17 0d 39 37 30 38 31 39 30 34 33 32 32 38 5a 17 ..970819043228Z. 0d 39 38 30 32 31 35 30 34 33 32 32 38 5a 30 81 .980215043228Z0. 98 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 11 .1.0...U....US1. 30 0f 06 03 55 04 0a 13 08 4e 65 74 73 63 61 70 0...U....Netscap 65 31 1d 30 1b 06 03 55 04 0b 13 14 48 61 72 64 e1.0...U....Hard 63 6f 72 65 20 53 53 4c 20 74 65 73 74 69 6e 67 core SSL testing 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 01 1.0.....&...,d.. 13 09 53 53 4c 54 65 73 74 65 72 31 17 30 15 06 ..SSLTester1.0.. 03 55 04 03 13 0e 62 69 6a 6f 75 2e 6d 63 6f 6d .U....bijou.mcom 2e 63 6f 6d 31 23 30 21 06 09 2a 86 48 86 f7 0d .com1#0!..*.H... 01 09 01 16 14 6e 65 6c 73 6f 6e 62 40 6e 65 74 .....nelsonb@net 73 63 61 70 65 2e 63 6f 6d 30 5c 30 0d 06 09 2a scape.com0\0...* 86 48 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02 .H.........K.0H. 41 00 e3 f3 ba 48 dd 2e bd a8 e9 87 8e 5f 8a 9e A....H......._.. cb c9 6d c1 8b 79 31 ad b0 26 39 ba dc 28 d1 f0 ..m..y1..&9..(.. 20 75 a4 24 d2 e8 16 e7 b3 b6 aa 39 e5 e2 4c bf u.$.......9..L. 8e 5f 96 4b cd 09 75 71 b1 69 1f 67 df b7 ac 58 ._.K..uq.i.g...X 29 a1 02 03 01 00 01 a3 36 30 34 30 11 06 09 60 ).......6040...` 86 48 01 86 f8 42 01 01 04 04 03 02 00 40 30 1f .H...B.......@0. 06 03 55 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 ..U.#..0.....m.. 02 16 54 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 ..T....2m......0 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 ...*.H.......... 81 00 a0 e6 3f 22 15 fb 54 8f ee a3 d8 81 ee 20 ....?"..T...... ad 67 d6 a4 64 67 3a d1 74 4f 19 4a ba 9e 9d ce .g..dg:.tO.J.... b9 4c d7 40 c1 f0 fd 32 5e 7b 73 c5 27 55 e4 e0 .L.@...2^{s.'U.. f0 7d ee ec fe 10 16 0f 6f c5 a0 12 5e c6 74 c9 .}......o...^.t. 16 c4 d7 43 cc 78 16 2b 4c 98 7f be 27 cf d9 bd ...C.x.+L...'... 76 53 e8 ed f9 1a 05 77 9e fd 80 a9 e6 05 14 bf vS.....w........ d2 0d 0f ff 17 38 5c 74 62 e9 f1 1b 41 3b 74 36 .....8\tb...A;t6 06 cc 67 da 03 ca 37 d2 1c 66 37 fc c0 be fd 20 ..g...7..f7.... 32 e0 00 02 aa 30 82 02 a6 30 82 02 0f a0 03 02 2....0...0...... 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 .....0...*.H.... 01 05 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 ....0w1.0...U... 02 55 53 31 2c 30 2a 06 03 55 04 0a 13 23 4e 65 .US1,0*..U...#Ne 74 73 63 61 70 65 20 43 6f 6d 6d 75 6e 69 63 61 tscape Communica 74 69 6f 6e 73 20 43 6f 72 70 6f 72 61 74 69 6f tions Corporatio 6e 31 11 30 0f 06 03 55 04 0b 13 08 48 61 72 64 n1.0...U....Hard 63 6f 72 65 31 27 30 25 06 03 55 04 03 13 1e 48 core1'0%..U....H 61 72 64 63 6f 72 65 20 43 65 72 74 69 66 69 63 ardcore Certific 61 74 65 20 53 65 72 76 65 72 20 49 49 30 1e 17 ate Server II0.. 0d 39 37 30 35 32 37 31 38 30 39 34 37 5a 17 0d .970527180947Z.. 39 38 30 35 32 37 31 38 30 39 34 37 5a 30 77 31 980527180947Z0w1 0b 30 09 06 03 55 04 06 13 02 55 53 31 2c 30 2a .0...U....US1,0* 06 03 55 04 0a 13 23 4e 65 74 73 63 61 70 65 20 ..U...#Netscape 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 Communications C 6f 72 70 6f 72 61 74 69 6f 6e 31 11 30 0f 06 03 orporation1.0... 55 04 0b 13 08 48 61 72 64 63 6f 72 65 31 27 30 U....Hardcore1'0 25 06 03 55 04 03 13 1e 48 61 72 64 63 6f 72 65 %..U....Hardcore 20 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 Certificate Ser 76 65 72 20 49 49 30 81 9f 30 0d 06 09 2a 86 48 ver II0..0...*.H 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 ............0... 81 81 00 bc 14 a0 c0 53 fa e1 4d b9 cd 0e b7 42 .......S..M....B e3 cd 98 46 e0 b3 1e 13 76 c7 c5 e5 3d e5 24 18 ...F....v...=.$. dd 72 1a 37 7f c4 66 51 36 7f e1 ae e9 11 5e 29 .r.7..fQ6.....^) 6f ac ff 28 ce cd 53 ae 39 09 75 a1 eb d2 ec 79 o..(..S.9.u....y d4 e9 6b 4c 99 e4 b6 42 d0 f7 52 8b ae 4a 33 6b ..kL...B..R..J3k 58 5b 47 57 13 a3 61 32 86 02 e8 63 e6 7a 27 c2 X[GW..a2...c.z'. 99 7a 22 48 d9 c8 d1 5c 6d b1 37 84 66 4b 9e a2 .z"H...\m.7.fK.. ce 31 6c 1c 06 7a 5f c5 7b b8 ff 58 89 f6 0b 40 .1l..z_.{..X...@ 6f 7c 0d 02 03 01 00 01 a3 42 30 40 30 1d 06 03 o|.......B0@0... 55 1d 0e 04 16 04 14 97 b1 6d b2 b6 02 16 54 0c U........m....T. 97 d7 e3 32 6d cb 9c df ee de 80 30 1f 06 03 55 ...2m......0...U 1d 23 04 18 30 16 80 14 97 b1 6d b2 b6 02 16 54 .#..0.....m....T 0c 97 d7 e3 32 6d cb 9c df ee de 80 30 0d 06 09 ....2m......0... 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 9b *.H............. 52 fe 93 fa 40 4d a9 8d 72 f9 f6 f6 c9 32 40 dc R...@M..r....2@. 20 fe be a5 a2 db e6 2c df d1 5f a0 66 45 d1 6e ......,.._.fE.n 5f 0a 91 e9 0b c1 7c 8a c0 64 a0 d4 24 56 85 b5 _.....|..d..$V.. a0 aa 1e c8 8c 15 40 ac fc 5a 2f 94 18 44 b9 73 ......@..Z/..D.s 23 c1 49 a0 24 ff b0 47 9c d8 28 1f b3 70 a7 62 #.I.$..G..(..p.b b3 5b 8e 4d 82 bd 4d 85 eb 0d 5a 87 c0 41 c9 a6 .[.M..M...Z..A.. c2 69 9c ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 .i...I*..Uo..!.. 70 e4 5d 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 p.]4;.).....y..After hashing the certificate handshake message, the handshake hashes are:MD5 state: 560c93e0 964c3ad9 e5247f9d b34341d1MD5_TraceState: buffered input [Len: 28] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 4;.).....y..SHA1 state: e72665bc 312f118f 0bd0913a 1978c453 290ee2e7SHA1_TraceState: buffered input [Len: 28] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 4;.).....y..Server Hello Done HandshakeThe following server_hello_done handshake message, as described in the the SSL 3 spec, section 7.6.5, is taken from the same record as the previous two handshakes,and is entirely included in the handshake hashes.handle handshake message: server_hello_done (14)MD5 & SHA handshake hash input: [Len: 4] 0e 00 00 00 ....MD5 & SHA handshake hash input: [Len: 0]After hashing the server_hello_done handshake message, the handshake hashesare:MD5 state: 560c93e0 964c3ad9 e5247f9d b34341d1MD5_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......SHA1 state: e72665bc 312f118f 0bd0913a 1978c453 290ee2e7SHA1_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......handle server_hello_done handshakeClient Key Exchange HandshakeNext, the client now composes its response to the above messages.In this example, the client sends the following three records: a record containing a client_key_exchange handshake a change_cipher_spec record an encrypted record, containing a "finished" handshake.Compose the client key exchange, according to the SSL 3 spec, section 7.6.7, The client key exchange messagecontains the 48-byte pre-master secret, encrypted in the server's public key.The steps of this encryption are shown below, begining with the formatting of the plaintext, by prepending data to it, per PKCS#1, section 8.1. Note the use of "block type 02" for this public key operation.compose client_key_exchange handshakeRSA_EncryptBlock: formatted plaintext [Len: 64] 00 02 31 b0 c1 82 cb a2 56 81 62 e0 be de 17 00 ..1.....V.b..... 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.RSA_EncryptBlock: modulus [Len: 65] 00 e3 f3 ba 48 dd 2e bd a8 e9 87 8e 5f 8a 9e cb ....H......._... c9 6d c1 8b 79 31 ad b0 26 39 ba dc 28 d1 f0 20 .m..y1..&9..(.. 75 a4 24 d2 e8 16 e7 b3 b6 aa 39 e5 e2 4c bf 8e u.$.......9..L.. 5f 96 4b cd 09 75 71 b1 69 1f 67 df b7 ac 58 29 _.K..uq.i.g...X) a1 .RSA_EncryptBlock: publicExponent [Len: 3] 01 00 01 ...RSA_EncryptBlock: ciphertext [Len: 64] 2e 64 fd 0c 39 0e 08 05 1d f9 a1 de 10 63 ab 7f .d..9........c.. e2 23 fc a2 9c 09 e6 3b 60 da d0 32 2b f9 8d ca .#.....;`..2+... f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 9a 5b 4d 42 ..j........U.[MB 71 79 bb 80 59 12 d8 be fc 9a a3 c1 74 3b 00 e8 qy..Y.......t;..Prior to sending the client_key_exchange, the client computes the master secret. The pre-master secret is hashed with the server-random and client-random numbers and the "mixers" to produce the master secret, as described insection 8.1 of the SSL 3.0 spec. Here are the steps involved. The intermediate SHA hash results are shownin these steps, as inputs to the successive MD5 hashes.master SHA hash: mixers [Len: 1] 41 Amaster SHA hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ master SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.master MD5 hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master MD5 hash: SHA hash output [Len: 20] 67 92 a1 df 05 94 c2 cc 8d 3b 9b 11 2c 58 dd 27 g........;..,X.' 41 7b 5c 5c A{\\Result of first MD5 Hash:master MD5 hash: MD5 hash output [Len: 16] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b..Begin second MD5 hash:master SHA hash: mixers [Len: 2] 42 42 BBmaster SHA hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ master SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.master MD5 hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master MD5 hash: SHA hash output [Len: 20] 6c 91 b4 c8 25 c3 ab 50 2f 4b 09 7b 96 31 bf 12 l...%..P/K.{.1.. eb 86 7d f7 ..}.Result of second MD5 hash:master MD5 hash: MD5 hash output [Len: 16] fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@.Begin third MD5 hashmaster SHA hash: mixers [Len: 3] 43 43 43 CCCmaster SHA hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ master SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.master MD5 hash: pre-master secret [Len: 48] 03 00 43 c0 06 15 e4 0a e7 fa b0 8f 6c 95 d7 6b ..C.........l..k a6 77 30 9a b8 0d 02 54 b9 84 21 33 0b 9d 46 21 .w0....T..!3..F! ec c7 9b d0 d7 6c e3 b5 3f f9 64 1b e0 fe 5b 83 .....l..?.d...[.master MD5 hash: SHA hash output [Len: 20] de 04 c0 ff 0e a1 ab 68 fe 54 b1 92 21 6a 2d 8a .......h.T..!j-. 76 75 46 05 vuF.Result of third MD5 hash.master MD5 hash: MD5 hash output [Len: 16] 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......The three MD5 hash results are concatenated to form the master secret.master secret: [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......The client immediately begins to compute the "key block", from which themac secrets, write-keys and write-IVs will be derived. This is as described insection 8.2.2 of the SSL 3.0 spec.Begin first keyblock SHA/MD5 hash:keygen SHA hash: mixers [Len: 1] 41 Akeygen SHA hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.keygen SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ keygen MD5 hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen MD5 hash: SHA hash output [Len: 20] 02 07 51 33 46 9d 59 b5 4b 1b eb 04 32 a8 10 c3 ..Q3F.Y.K...2... 0c ca 88 c0 ....First MD5 result:keygen MD5 hash: MD5 hash output [Len: 16] 18 2a 75 51 f8 9f 5c f9 5c 90 0d 0d 76 2f 1e 9e .*uQ..\.\...v/..Begin second keyblock SHA/MD5 hash:keygen SHA hash: mixers [Len: 2] 42 42 BBkeygen SHA hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.keygen SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ keygen MD5 hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen MD5 hash: SHA hash output [Len: 20] ed cd 80 27 e3 ba bc 28 68 51 af ba 95 8b 83 66 ...'...(hQ.....f 29 50 11 43 )P.CSecond MD5 result:keygen MD5 hash: MD5 hash output [Len: 16] 33 70 58 28 f9 05 03 85 5b 9d ac 39 63 c9 e6 9c 3pX(....[..9c...Begin third keyblock SHA/MD5 hash:keygen SHA hash: mixers [Len: 3] 43 43 43 CCCkeygen SHA hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.keygen SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ keygen MD5 hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen MD5 hash: SHA hash output [Len: 20] ea 0a f5 36 42 4a e6 dd 75 e4 cf fa 2c a1 d5 aa ...6BJ..u...,... 10 cf 88 1b ....Third MD5 result:keygen MD5 hash: MD5 hash output [Len: 16] d6 4f 8a e7 c9 66 ea 2d 48 c0 80 a5 4d 4a f2 df .O...f.-H...MJ..Begin fourth keyblock SHA/MD5 hash:keygen SHA hash: mixers [Len: 4] 44 44 44 44 DDDDkeygen SHA hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.keygen SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ keygen MD5 hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen MD5 hash: SHA hash output [Len: 20] 19 68 b4 29 e7 06 dc 2b a4 f4 67 5a 3b 50 97 cc .h.)...+..gZ;P.. e9 df 96 3f ...?Fourth MD5 result:keygen MD5 hash: MD5 hash output [Len: 16] 94 d5 5a b3 a6 bc d3 7a 00 22 2f 63 8e ca 51 c6 ..Z....z."/c..Q.Begin fifth keyblock SHA/MD5 hash:keygen SHA hash: mixers [Len: 5] 45 45 45 45 45 EEEEEkeygen SHA hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen SHA hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.keygen SHA hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ keygen MD5 hash: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......keygen MD5 hash: SHA hash output [Len: 20] 8b d5 98 79 cb 11 c7 74 cc 3b e6 aa e9 40 76 71 ...y...t.;...@vq 33 11 3c 82 3.Seventh MD5 result:keygen MD5 hash: MD5 hash output [Len: 16] 79 35 a5 64 eb 42 fa 12 d1 81 15 e0 10 cf a0 93 y5.d.B..........Concatenate the above seven MD5 hash results to produce the "key block":key block: [Len: 112] 18 2a 75 51 f8 9f 5c f9 5c 90 0d 0d 76 2f 1e 9e .*uQ..\.\...v/.. 33 70 58 28 f9 05 03 85 5b 9d ac 39 63 c9 e6 9c 3pX(....[..9c... d6 4f 8a e7 c9 66 ea 2d 48 c0 80 a5 4d 4a f2 df .O...f.-H...MJ.. 94 d5 5a b3 a6 bc d3 7a 00 22 2f 63 8e ca 51 c6 ..Z....z."/c..Q. 64 9b 85 9b 32 16 00 5c f2 91 b2 40 20 fc 61 3b d...2..\...@ .a; 59 0e 93 93 14 6a c2 79 ff 41 eb 07 c0 48 97 2c Y....j.y.A...H., 79 35 a5 64 eb 42 fa 12 d1 81 15 e0 10 cf a0 93 y5.d.B..........Now, divide up the key block, producing the mac secrets, write keys, and(for block-mode ciphers) the write IVs.client write mac secret: [Len: 16] 18 2a 75 51 f8 9f 5c f9 5c 90 0d 0d 76 2f 1e 9e .*uQ..\.\...v/..server write mac secret: [Len: 16] 33 70 58 28 f9 05 03 85 5b 9d ac 39 63 c9 e6 9c 3pX(....[..9c...Since this is an "export" cipher, the final client write key is derived,via MD5, from the next 40 bits of the key block, and the client and serverrandom values, as follows:CWKey MD5 hash: key block [Len: 5] d6 4f 8a e7 c9 .O...CWKey MD5 hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ CWKey MD5 hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.final client write key: [Len: 16] 32 10 cd e1 d6 dc 07 83 f3 75 4c 32 2e 59 96 61 2........uL2.Y.aLikewise, the final server write key is derived, via MD5, from the next40 bits of the key block, and the client and server random values, as follows:SWKey MD5 hash: key block [Len: 5] 66 ea 2d 48 c0 f.-H.SWKey MD5 hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.SWKey MD5 hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ server write key: [Len: 16] ed 0e 56 c8 95 12 37 b6 21 17 1c 72 79 91 12 1e ..V...7.!..ry...The client and server write IVs are computed by hashing the client andserver ramdom values, in different orders. In this case, since the RC4cipher is a stream cipher, and needs no IVs, the result of the hash isignored.CWiv MD5 hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ CWiv MD5 hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.client write iv: [Len: 0]SWiv MD5 hash: server random [Len: 32] 34 02 87 24 8e ea bd f7 c2 8c fc fe 39 54 90 bb 4..$........9T.. 06 fe 48 b4 a2 07 fc 9d 2a d2 d9 2c 84 82 58 be ..H.....*..,..X.SWiv MD5 hash: client random [Len: 32] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 06 46 69 20 81 64 08 ba b4 3f 9f 81 fa 5b 20 ..Fi .d...?...[ server write iv: [Len: 0]Returning now to the sending of the client_key_exchange message,The message is included in the handhshake hashes. First, review the current values of the handshake hashes, MD5 state: 560c93e0 964c3ad9 e5247f9d b34341d1MD5_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......SHA1 state: e72665bc 312f118f 0bd0913a 1978c453 290ee2e7SHA1_TraceState: buffered input [Len: 32] ee 81 49 2a fb 01 55 6f b1 df 21 a7 b0 70 e4 5d ..I*..Uo..!..p.] 34 3b 90 29 f9 14 c3 2e 07 79 13 c7 0e 00 00 00 4;.).....y......append handshake header: type client_key_exchange (16)MD5 & SHA handshake hash input: [Len: 1] 10 .MD5 & SHA handshake hash input: [Len: 3] 00 00 40 ..@MD5 & SHA handshake hash input: [Len: 64] 2e 64 fd 0c 39 0e 08 05 1d f9 a1 de 10 63 ab 7f .d..9........c.. e2 23 fc a2 9c 09 e6 3b 60 da d0 32 2b f9 8d ca .#.....;`..2+... f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 9a 5b 4d 42 ..j........U.[MB 71 79 bb 80 59 12 d8 be fc 9a a3 c1 74 3b 00 e8 qy..Y.......t;..After hashing the client_key_exchange, the hashes now contain:MD5 state: 047946f4 a933b86e 7002fd6e 017c4731MD5_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..SHA1 state: 0711b86f 804602cc f4a01dbb 3fd58d56 c648dbe3SHA1_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..The client_key_exchange record header is prepended to the message, and it is sent to the server.SendPlainText record type: handshake (22) bytes=68send (unencrypted) record data: [Len: 73]+ 16 03 00 00 44 10 00 00 40 2e 64 fd 0c 39 0e 08 ....D...@.d..9..+ 05 1d f9 a1 de 10 63 ab 7f e2 23 fc a2 9c 09 e6 ......c...#.....+ 3b 60 da d0 32 2b f9 8d ca f3 18 6a 1a bd 9c 1f ;`..2+.....j....+ 99 f9 b5 bd 55 9a 5b 4d 42 71 79 bb 80 59 12 d8 ....U.[MBqy..Y..+ be fc 9a a3 c1 74 3b 00 e8 .....t;..Client's Change_Cipher_Spec RecordThe client sends the change_cipher_spec record, as described in the SSL 3 spec, section 7.3. This record is not a handshake record,and is not included in the handshake hashes.send change_cipher_spec recordSendPlainText record type: change_cipher_spec (20) bytes=1Send PlainText record [Len: 1] 01 .send (unencrypted) record data: [Len: 6]+ 14 03 00 00 01 01 ......Set Current Write Cipher Suite to Pending Client's Finished HandshakeThe next record will contain a message fully MAC'ed and encrypted according to the SSL_RSA_EXPORT_WITH_RC4_40_MD5 cipher specwe just began using. It is the client's "finished" handshake. Before composing the message, the client computes the "md5_hash" and "sha_hash" as defined for the "finished" message in section 7.6.9 of the SSL 3.0 spec.In this example, we first compute the"inner" portion of each hash, then compute the "outer" portions.Compute inner MD5 hash. First, review the current handshake hash state.MD5 state: 047946f4 a933b86e 7002fd6e 017c4731MD5_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..Now, hash inputs to MD5 inner hash:MD5 inner: sender [Len: 4] 43 4c 4e 54 CLNTMD5 inner: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......MD5 inner: MAC Pad 1 [Len: 48] 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666Result of inner MD5 hash:MD5 inner: result [Len: 16] 8f fd 61 1e 05 26 22 ef 51 c0 9c 66 5b fe 37 73 ..a..&".Q..f[.7sCompute inner SHA hash. First, review the current handshake hash state.SHA1 state: 0711b86f 804602cc f4a01dbb 3fd58d56 c648dbe3SHA1_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..Now, hash inputs to inner SHA hash:SHA inner: sender [Len: 4] 43 4c 4e 54 CLNTSHA inner: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......SHA inner: MAC Pad 1 [Len: 40] 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 66666666Result of inner SHA hash:SHA inner: result [Len: 20] 8b f3 4f 1e 12 f6 8b 9f 65 a0 47 ac 7c 6a ac 50 ..O.....e.G.|j.P b1 d4 76 08 ..v.Compute outer MD5 hash:MD5 outer: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......MD5 outer: MAC Pad 2 [Len: 48] 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\MD5 outer: MD5 inner [Len: 16] 8f fd 61 1e 05 26 22 ef 51 c0 9c 66 5b fe 37 73 ..a..&".Q..f[.7sResult of outer MD5 hash:MD5 outer: result [Len: 16] f2 40 10 3f 74 63 ea e8 7a 27 23 56 5f 59 07 d2 .@.?tc..z'#V_Y..Compute outer SHA hash:SHA outer: master secret [Len: 48] f6 63 98 c5 c4 84 e0 c4 c1 e7 4b 2d ef 62 9c f9 .c........K-.b.. fd 49 30 07 ce 6c b7 00 ad 00 23 a5 0d 2e 40 b2 .I0..l....#...@. 88 07 4f 19 ac 52 b6 43 61 77 d7 87 bb 17 9c c4 ..O..R.Caw......SHA outer: MAC Pad 2 [Len: 40] 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\SHA outer: SHA inner [Len: 20] 8b f3 4f 1e 12 f6 8b 9f 65 a0 47 ac 7c 6a ac 50 ..O.....e.G.|j.P b1 d4 76 08 ..v.Result of outer SHA hash:SHA outer: result [Len: 20] a3 79 5d b7 8b 94 db cf fa f5 18 22 15 7b f2 4a .y]........".{.J 96 52 9a 0e .R..Now that we've completed the hash computations for the "finished" message,compose the message, and include the body of the handshake message in the "handshake hashes". First,we review the previous values of the "handshake hashes".MD5 state: 047946f4 a933b86e 7002fd6e 017c4731MD5_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..SHA1 state: 0711b86f 804602cc f4a01dbb 3fd58d56 c648dbe3SHA1_TraceState: buffered input [Len: 36] 2b f9 8d ca f3 18 6a 1a bd 9c 1f 99 f9 b5 bd 55 +.....j........U 9a 5b 4d 42 71 79 bb 80 59 12 d8 be fc 9a a3 c1 .[MBqy..Y....... 74 3b 00 e8 t;..Now include the "finished" handshake in the hashes.append handshake header: type finished (20)MD5 & SHA handshake hash input: [Len: 1] 14 .MD5 & SHA handshake hash input: [Len: 3] 00 00 24 ..$MD5 & SHA handshake hash input: [Len: 36] f2 40 10 3f 74 63 ea e8 7a 27 23 56 5f 59 07 d2 .@.?tc..z'#V_Y.. a3 79 5d b7 8b 94 db cf fa f5 18 22 15 7b f2 4a .y]........".{.J 96 52 9a 0e .R..After hashing in the server's finished handshake, the handshake hashes are:MD5 state: dce6cec5 25cb0e3a 11217975 1acf19d6MD5_TraceState: buffered input [Len: 12] fa f5 18 22 15 7b f2 4a 96 52 9a 0e ...".{.J.R..SHA1 state: 5aa27325 80f3ee0f 06f15e24 f3cf4555 f30dedb5SHA1_TraceState: buffered input [Len: 12] fa f5 18 22 15 7b f2 4a 96 52 9a 0e ...".{.J.R..The completed message to be encrypted and sent is:SendPlainText record type: handshake (22) bytes=40Send PlainText record [Len: 40] 14 00 00 24 f2 40 10 3f 74 63 ea e8 7a 27 23 56 ...$.@.?tc..z'#V 5f 59 07 d2 a3 79 5d b7 8b 94 db cf fa f5 18 22 _Y...y]........" 15 7b f2 4a 96 52 9a 0e .{.J.R..Since the SSL_RSA_EXPORT_WITH_RC4_40_MD5 cipher suite is now in effect,the message must be MAC'ed. The MAC on the client's plaintext "finished" handshake message is computed according to section 7.2.3.1 of the SSL 3.0 spec.frag hash1: MAC secret [Len: 16] 18 2a 75 51 f8 9f 5c f9 5c 90 0d 0d 76 2f 1e 9e .*uQ..\.\...v/..frag hash1: Pad 1 [Len: 48] 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 6666666666666666frag hash1: temp [Len: 11] 00 00 00 00 00 00 00 00 16 00 28 ..........(frag hash1: input [Len: 40] 14 00 00 24 f2 40 10 3f 74 63 ea e8 7a 27 23 56 ...$.@.?tc..z'#V 5f 59 07 d2 a3 79 5d b7 8b 94 db cf fa f5 18 22 _Y...y]........" 15 7b f2 4a 96 52 9a 0e .{.J.R..frag hash2: MAC secret [Len: 16] 18 2a 75 51 f8 9f 5c f9 5c 90 0d 0d 76 2f 1e 9e .*uQ..\.\...v/..frag hash2: Pad 2 [Len: 48] 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\ 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c \\\\\\\\\\\\\\\\frag hash2: hash1 [Len: 16] 08 02 21 40 3e 2a da 4a 8b 55 11 91 ea 00 70 f3 ..!@>*.J.U....p.frag hash2: result [Len: 16] d3 09 de 28 84 a7 07 5c 7c 0c 08 85 6b 4f 63 04 ...(...\|...kOc.Append the result above to the plaintext handshake message (above), compress(null), and encrypt, and add the record header, producing the followingrecord:send (encrypted) record data: [Len: 61]+ 16 03 00 00 38 ed 37 7f 16 d3 11 e8 a3 e1 2a 20 ....8.7.......* + b7 88 f6 11 f3 a6 7d 37 f7 17 ac 67 20 b8 0e 88 ......}7...g ...+ d1 a0 c6 83 e4 80 e8 c7 e3 0b 91 29 30 29 e4 28 ...........)0).(+ 47 b7 40 a4 d1 3c da 82 b7 b3 9f 67 10 G.@..+ 72 ac d5 62 c7 29 8a b0 0b a9 ec 5e 0d a9 6e cd r..b.).....^..n.+ 92 28 32 2e 05 be 30 8e 7d 56 67 01 11 ec 2e 2f .(2...0.}Vg..../+ ab ea bd e1 61 e2 ff d1 aa c3 d6 80 bb c1 8e 82 ....a...........+ 04 82 eb 62 be 21 17 99 c9 6a fa 9d 60 3c ca f4 ...b.!...j..` 2b1af7f3a8