|
Hi - I am a developer implementing the SSL protocol
on the IBM VSE mainframe operating system.
I have it working fine except for a when attempting
to reconnect, also known as resuming a previous session.
The client hello contains a correct session id, but
I am unable to find any accurate technical documentation about exactly how it
should complete.
Specifically, I have the following
questions:
1) The client hello contains a new random value,
and assume the key material must be regenerated from the premaster secret and
include the new client and new server random values. Is that
correct?
2) The server finished message contains a crypt
hash of all the handshake messages. For a session reconnect would this
be just the client hello and server hello used during the reconnect, or
would it need to include hash also include the initial session handshake
messages?
Thanks.
|
