You do not have permission to delete messages in this group
Copy link
Report message
Sign in to report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to dev-se...@lists.mozilla.org
As known, during the ClientKeyExchange phase of the Handshake of TLS, the
client generates a 48-byte random number called premaster secret using a
Pseudo Random Generator which is used to calculate the master key and the
key sessions.
I would like to know which Pseudo Random Generator functions are used to
compute and produce the pre-master Secret which are used in TLS1.2 in
firefox.
Thank you very much in advance.
Gervase Markham
unread,
Aug 19, 2015, 8:23:18 AM8/19/15
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Sign in to report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to konstantinos Alexiou
On 19/08/15 09:54, konstantinos Alexiou wrote:
> As known, during the ClientKeyExchange phase of the Handshake of TLS, the
> client generates a 48-byte random number called premaster secret using a
> Pseudo Random Generator which is used to calculate the master key and the
> key sessions.
This would be happening in the NSS code; mozilla.dev.tech.crypto might
be a better place to ask.
Gerv
Richard Barnes
unread,
Aug 19, 2015, 9:51:47 AM8/19/15
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Sign in to report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to konstantinos Alexiou, dev-se...@lists.mozilla.org
On Wed, Aug 19, 2015 at 4:54 AM, konstantinos Alexiou <
konstant...@gmail.com> wrote:
> As known, during the ClientKeyExchange phase of the Handshake of TLS, the
> client generates a 48-byte random number called premaster secret using a
> Pseudo Random Generator which is used to calculate the master key and the
> key sessions.
>
> I would like to know which Pseudo Random Generator functions are used to
> compute and produce the pre-master Secret which are used in TLS1.2 in
> firefox.
>
As you know, the PMS is generated differently in the RSA and DH cases. I
assume you're talking about the RSA case, since that's the only one where
the PRNG feeds directly into the PMS. The short answer is that it uses the
same PRNG as everything else in NSS. Here are some links if you want to
look in more detail: