1
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc.
2
.TH "gnutls_ia_extract_inner_secret" 3 "2.2.3" "gnutls" "gnutls"
4
gnutls_ia_extract_inner_secret \- API function
6
.B #include <gnutls/extra.h>
8
.BI "void gnutls_ia_extract_inner_secret(gnutls_session_t " session ", char * " buffer ");"
10
.IP "gnutls_session_t session" 12
11
is a \fBgnutls_session_t\fP structure.
12
.IP "char * buffer" 12
13
pre-allocated buffer to hold 48 bytes of inner secret.
15
Copy the 48 bytes large inner secret into the specified buffer
17
This function is typically used after the TLS/IA handshake has
18
concluded. The TLS/IA inner secret can be used as input to a PRF
19
to derive session keys. Do not use the inner secret directly as a
20
session key, because for a resumed session that does not include an
21
application phase, the inner secret will be identical to the inner
22
secret in the original session. It is important to include, for
23
example, the client and server randomness when deriving a sesssion
24
key from the inner secret.
26
Report bugs to <bug-gnutls@gnu.org>.
28
Copyright \(co 2006, 2007 Free Software Foundation.
30
Permission is granted to make and distribute verbatim copies of this
31
manual provided the copyright notice and this permission notice are
32
preserved on all copies.
34
The full documentation for
36
is maintained as a Texinfo manual. If the
40
programs are properly installed at your site, the command
44
should give you access to the complete manual.