6.3. Key Calculation
The Record Protocol requires an algorithm to generate keys required
by the current connection state (see Appendix A.6) from the security
parameters provided by the handshake protocol.
The master secret is expanded into a sequence of secure bytes, which
is then split to a client write MAC key, a server write MAC key, a
client write encryption key, and a server write encryption key. Each
of these is generated from the byte sequence in that order. Unused
values are empty. Some AEAD ciphers may additionally require a
client write IV and a server write IV (see Section 6.2.3.3).
When keys and MAC keys are generated, the master secret is used as an
entropy source.
To generate the key material, compute
key_block = PRF(SecurityParameters.master_secret,
"key expansion",
SecurityParameters.server_random +
SecurityParameters.client_random);
Q: my question is here about "SecurityParameters.master_secret" , what is this master_secret?
is this same value (if i am not wrong )of master.secret generated by
CLIENT_RANDOM
<space> <64 bytes of hex encoded client_random
> <space> <96 bytes of hex encoded master secret>?
Thanks in advance...