RFC9367: GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3

Download in text format





Independent Submission                                S. Smyshlyaev, Ed.
Request for Comments: 9367                                   E. Alekseev
Category: Informational                                    E. Griboedova
ISSN: 2070-1721                                               A. Babueva
                                                           L. Nikiforova
                                                               CryptoPro
                                                           February 2023


     GOST Cipher Suites for Transport Layer Security (TLS) Protocol
                              Version 1.3

Abstract

   The purpose of this document is to make the Russian cryptographic
   standards available to the Internet community for their
   implementation in the Transport Layer Security (TLS) Protocol Version
   1.3.

   This document defines the cipher suites, signature schemes, and key
   exchange mechanisms for using Russian cryptographic standards, called
   GOST algorithms, with TLS Version 1.3.  Additionally, this document
   specifies a profile of TLS 1.3 with GOST algorithms to facilitate
   interoperable implementations.  The IETF has not endorsed the cipher
   suites, signature schemes, or key exchange mechanisms described in
   this document.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This is a contribution to the RFC Series, independently of any other
   RFC stream.  The RFC Editor has chosen to publish this document at
   its discretion and makes no statement about its value for
   implementation or deployment.  Documents approved for publication by
   the RFC Editor are not candidates for any level of Internet Standard;
   see Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9367.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

Table of Contents

   1.  Introduction
   2.  Conventions Used in This Document
   3.  Basic Terms and Definitions
   4.  Cipher Suite Definition
     4.1.  Record Protection Algorithm
       4.1.1.  AEAD Algorithm
       4.1.2.  TLSTREE
       4.1.3.  SNMAX Parameter
     4.2.  Hash Algorithm
   5.  Signature Scheme Definition
     5.1.  Signature Algorithm
     5.2.  Elliptic Curve
     5.3.  SIGN Function
   6.  Key Exchange and Authentication
     6.1.  Key Exchange
       6.1.1.  ECDHE Shared Secret Calculation
         6.1.1.1.  ECDHE Shared Secret Calculation on the Client Side
         6.1.1.2.  ECDHE Shared Secret Calculation on Server Side
         6.1.1.3.  Public Ephemeral Key Representation
       6.1.2.  Values for the TLS Supported Groups Registry
     6.2.  Authentication
     6.3.  Handshake Messages
       6.3.1.  Hello Messages
       6.3.2.  CertificateRequest
       6.3.3.  Certificate
       6.3.4.  CertificateVerify
   7.  IANA Considerations
   8.  Historical Considerations
   9.  Security Considerations
   10. References
     10.1.  Normative References
     10.2.  Informative References
   Appendix A.  Test Examples
     A.1.  Example 1
       A.1.1.  Test Case
       A.1.2.  Test Examples
     A.2.  Example 2
       A.2.1.  Test Case
       A.2.2.  Test Examples
   Contributors
   Authors' Addresses

1.  Introduction

   This document defines four new cipher suites (the TLS13_GOST cipher
   suites) and seven new signature schemes (the TLS13_GOST signature
   schemes) for the Transport Layer Security (TLS) Protocol Version 1.3
   that are based on Russian cryptographic standards GOST R 34.12-2015
   [RFC7801], GOST R 34.11-2012 [RFC6986], and GOST R 34.10-2012
   [RFC7091].

   The TLS13_GOST cipher suites (see Section 4) have the following
   values:

      TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L = {0xC1, 0x03}

      TLS_GOSTR341112_256_WITH_MAGMA_MGM_L = {0xC1, 0x04}

      TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S = {0xC1, 0x05}

      TLS_GOSTR341112_256_WITH_MAGMA_MGM_S = {0xC1, 0x06}

   Each TLS13_GOST cipher suite specifies a pair (record protection
   algorithm, hash algorithm) such that:

   *  The record protection algorithm is the Authenticated Encryption
      with Associated Data (AEAD) algorithm (see Section 4.1.1) based on
      the GOST R 34.12-2015 block cipher [RFC7801] in the Multilinear
      Galois Mode (MGM) [RFC9058] and the external re-keying approach
      (see [RFC8645]) intended for increasing the lifetime of symmetric
      keys used to protect records.

   *  The hash algorithm is the GOST R 34.11-2012 algorithm [RFC6986].

   Note: The TLS13_GOST cipher suites are divided into two types: the
   "_S" (strong) cipher suites and the "_L" (light) cipher suites
   (depending on the key lifetime limitations, see Sections 4.1.2 and
   4.1.3).

   The TLS13_GOST signature schemes have the following values:

      gostr34102012_256a = 0x0709

      gostr34102012_256b = 0x070A

      gostr34102012_256c = 0x070B

      gostr34102012_256d = 0x070C

      gostr34102012_512a = 0x070D

      gostr34102012_512b = 0x070E

      gostr34102012_512c = 0x070F

   Each TLS13_GOST signature scheme specifies a pair (signature
   algorithm, elliptic curve) such that:

   *  The signature algorithm is the GOST R 34.10-2012 algorithm
      [RFC7091].

   *  The elliptic curve is one of the curves defined in Section 5.2.

   This document also specifies the key exchange mechanism with GOST
   algorithms for the TLS 1.3 protocol (see Section 6.1).

   Additionally, this document specifies a TLS13_GOST profile of the TLS
   1.3 protocol with GOST algorithms so that implementers can produce
   interoperable implementations.  It uses TLS13_GOST cipher suites,
   TLS13_GOST signature schemes, and key exchange mechanisms that are
   defined in this document.

2.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

3.  Basic Terms and Definitions

   This document follows the terminology from [RFC8446BIS] for "main
   secret".

   This document uses the following terms and definitions for the sets
   and operations on the elements of these sets:

   B_t             The set of byte strings of length t, t >= 0; for t =
                   0, the B_t set consists of a single empty string of
                   zero length.  If A is an element in B_t, then A =
                   (a_1, a_2, ... , a_t), where a_1, a_2, ... , a_t are
                   in {0, ... , 255}.

   B*              The set of all byte strings of a finite length
                   (hereinafter referred to as strings) including the
                   empty string.

   A[i..j]         The string A[i..j] = (a_i, a_{i+1}, ... , a_j) in
                   B_{j-i+1}, where A = (a_1, a_2, ... , a_t) in B_t and
                   1<=i<=j<=t.

   A[i]            The integer a_i in {0, ... , 255}, where A = (a_1,
                   a_2, ... , a_t) in B_t and 1<=i<=t.

   |A|             The length of the byte string A in bytes.

   A | C           The concatenation of strings A and C both belonging
                   to B*; i.e., a string in B_{|A|+|C|}, where the left
                   substring in B_|A| is equal to A and the right
                   substring in B_|C| is equal to C.

   i & j           Bitwise AND of integers i and j.

   STR_t           The transformation that maps an integer i = 256^(t-1)
                   * i_1 + ... + 256 * i_{t-1} + i_t into the byte
                   string STR_t(i) = (i_1, ... , i_t) in B_t (the
                   interpretation of the integer as a byte string in
                   big-endian format).

   str_t           The transformation that maps an integer i = 256^(t-1)
                   * i_t + ... + 256 * i_2 + i_1 into the byte string
                   str_t(i) = (i_1, ... , i_t) in B_t (the
                   interpretation of the integer as a byte string in
                   little-endian format).

   k               The length of the block cipher key in bytes.

   n               The length of the block cipher block in bytes.

   IVlen           The length of the initialization vector in bytes.

   S               The length of the authentication tag in bytes.

   E_i             The elliptic curve indicated by the client in
                   "supported_groups" extension.

   O_i             The zero point of the elliptic curve E_i.

   m_i             The order of the group of points belonging to the
                   elliptic curve E_i.

   q_i             The order of the cyclic subgroup of the group of
                   points belonging to the elliptic curve E_i.

   h_i             The cofactor of the cyclic subgroup that is equal to
                   m_i / q_i.

   Q_sign          The public key stored in the endpoint's certificate.

   d_sign          The private key that corresponds to the Q_sign key.

   P_i             The point of the elliptic curve E_i of the order q_i.

   (d_C^i, Q_C^i)  The client's ephemeral key pair that consists of the
                   private key and the public key corresponding to the
                   elliptic curve E_i.

   (d_S^i, Q_S^i)  The server's ephemeral key pair that consists of the
                   private key and the public key corresponding to the
                   elliptic curve E_i.

4.  Cipher Suite Definition

   This section defines the following four TLS13_GOST cipher suites:

   *  CipherSuite TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L = {0xC1,
      0x03};

   *  CipherSuite TLS_GOSTR341112_256_WITH_MAGMA_MGM_L = {0xC1, 0x04};

   *  CipherSuite TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S = {0xC1,
      0x05};

   *  CipherSuite TLS_GOSTR341112_256_WITH_MAGMA_MGM_S = {0xC1, 0x06}.

   Each cipher suite specifies a pair consisting of a record protection
   algorithm (see Section 4.1) and a hash algorithm (Section 4.2).

4.1.  Record Protection Algorithm

   In accordance with Section 5.2 of [RFC8446], the record protection
   algorithm translates a TLSPlaintext structure into a TLSCiphertext
   structure.  If the TLS13_GOST cipher suite is negotiated, the
   encrypted_record field of the TLSCiphertext structure MUST be set to
   the AEADEncrypted value computed as follows:

      AEADEncrypted = AEAD-Encrypt(sender_record_write_key, nonce,
      additional_data, plaintext),

   where

   *  the AEAD-Encrypt function is defined in Section 4.1.1;

   *  the sender_record_write_key is a key derived from sender_write_key
      (see Section 7.3 of [RFC8446]) using the TLSTREE function defined
      in Section 4.1.2 and sequence number seqnum as follows:

         sender_record_write_key = TLSTREE(sender_write_key, seqnum);

   *  the nonce is a value derived from sequence number seqnum and
      sender_write_iv (see Section 7.3 of [RFC8446]) in accordance with
      Section 5.3 of [RFC8446];

   *  the additional_data value is a record header that is generated in
      accordance with Section 5.2 of [RFC8446];

   *  the plaintext value is the TLSInnerPlaintext structure encoded in
      accordance with Section 5.2 of [RFC8446].

   Note 1: The AEAD-Encrypt function is exactly the same as the AEAD-
   Encrypt function defined in [RFC8446], such that the key (the first
   argument) is calculated from sender_write_key and sequence number
   seqnum for each message separately to support the external re-keying
   approach according to [RFC8645].

   Note 2: Sequence number is a value in the range 0-SNMAX, where the
   SNMAX value is defined in Section 4.1.3.  The SNMAX parameter is
   specified by a particular TLS13_GOST cipher suite to limit an amount
   of data that can be encrypted under the same traffic key material
   (sender_write_key, sender_write_iv).

   The record deprotection algorithm reverses the process of the record
   protection.  In order to decrypt and verify a protected record with
   sequence number seqnum, the algorithm takes sender_record_write_key
   as an input, which is derived from sender_write_key, nonce,
   additional_data, and the AEADEncrypted value.  The algorithm outputs
   the res value that is either plaintext or an error indicating that
   the decryption failed.  If a TLS13_GOST cipher suite is negotiated,
   the res value MUST be computed as follows:

      res = AEAD-Decrypt(sender_record_write_key, nonce,
      additional_data, AEADEncrypted),

   where the AEAD-Decrypt function is as defined in Section 4.1.1.

   Note: The AEAD-Decrypt function is exactly the same as the AEAD-
   Decrypt function defined in [RFC8446], such that the key (the first
   argument) is calculated from sender_write_key and sequence number
   seqnum for each message separately to support the external re-keying
   approach according to [RFC8645].

4.1.1.  AEAD Algorithm

   The AEAD-Encrypt and AEAD-Decrypt functions are defined as follows:

   +-------------------------------------------------------------------+
   | AEAD-Encrypt(K, nonce, A, P)                                      |
   |-------------------------------------------------------------------|
   | Input:                                                            |
   | - encryption key K in B_k,                                        |
   | - unique vector nonce in B_IVlen,                                 |
   | - additional authenticated data A in B_r, r >= 0,                 |
   | - plaintext P in B_t, t >= 0.                                     |
   | Output:                                                           |
   | - ciphertext C in B_{|P|},                                        |
   | - authentication tag T in B_S.                                    |
   |-------------------------------------------------------------------|
   | 1. MGMnonce = STR_1(nonce[1] & 0x7f) | nonce[2..IVlen];           |
   | 2. (MGMnonce, A, C, T) = MGM-Encrypt(K, MGMnonce, A, P);          |
   | 3. Return C | T.                                                  |
   +-------------------------------------------------------------------+

   +-------------------------------------------------------------------+
   | AEAD-Decrypt(K, nonce, A, C | T)                                  |
   |-------------------------------------------------------------------|
   | Input:                                                            |
   | - encryption key K in B_k,                                        |
   | - unique vector nonce in B_IVlen,                                 |
   | - additional authenticated data A in B_r, r >= 0,                 |
   | - ciphertext C in B_t, t >= 0,                                    |
   | - authentication tag T in B_S.                                    |
   | Output:                                                           |
   | - plaintext P in B_{|C|} or FAIL.                                 |
   |-------------------------------------------------------------------|
   | 1. MGMnonce = STR_1(nonce[1] & 0x7f) | nonce[2..IVlen];           |
   | 2. res' = MGM-Decrypt(K, MGMnonce, A, C, T);                      |
   | 3. IF res' = FAIL then return FAIL;                               |
   | 4. IF res' = (A, P) then return P.                                |
   +-------------------------------------------------------------------+

   where

   *  the MGM-Encrypt and MGM-Decrypt functions are defined in
      [RFC9058];

   *  the length of authentication tag T is equal to n bytes (S = n);

   *  the length of the nonce parameter is equal to n bytes (IVlen = n).

   Cipher suites TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L and
   TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S MUST use Kuznyechik
   [RFC7801] as a base block cipher for the AEAD algorithm.  The block
   length n is 16 bytes (n = 16) and the key length k is 32 bytes (k =
   32).

   Cipher suites TLS_GOSTR341112_256_WITH_MAGMA_MGM_L and
   TLS_GOSTR341112_256_WITH_MAGMA_MGM_S MUST use Magma [RFC8891] as a
   base block cipher for the AEAD algorithm.  The block length n is 8
   bytes (n = 8) and the key length k is 32 bytes (k = 32).

4.1.2.  TLSTREE

   The TLS13_GOST cipher suites use the TLSTREE function to support the
   external re-keying approach (see [RFC8645]).  The TLSTREE function is
   defined as follows:

      TLSTREE(K_root, i) = KDF_3(KDF_2(KDF_1(K_root, STR_8(i & C_1)),
      STR_8(i & C_2)), STR_8(i & C_3)),

   where

   *  K_root in B_32;

   *  i in {0, 1, ... , 2^64 - 1};

   *  KDF_j(K, D), j = 1, 2, 3, is the key derivation function defined
      as follows:

      -  KDF_1(K, D) = KDF_GOSTR3411_2012_256(K, "level1", D),

      -  KDF_2(K, D) = KDF_GOSTR3411_2012_256(K, "level2", D),

      -  KDF_3(K, D) = KDF_GOSTR3411_2012_256(K, "level3", D),

      where the KDF_GOSTR3411_2012_256 function is defined in [RFC7836],
      K in B_32, D in B_8;

   *  C_1, C_2, C_3 are the constants defined by each cipher suite as
      follows:

   +===========================================+======================+
   | CipherSuites                              |C_1, C_2, C_3         |
   +===========================================+======================+
   | TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L |C_1=0xf800000000000000|
   |                                           |                      |
   |                                           |C_2=0xfffffff000000000|
   |                                           |                      |
   |                                           |C_3=0xffffffffffffe000|
   +-------------------------------------------+----------------------+
   | TLS_GOSTR341112_256_WITH_MAGMA_MGM_L      |C_1=0xffe0000000000000|
   |                                           |                      |
   |                                           |C_2=0xffffffffc0000000|
   |                                           |                      |
   |                                           |C_3=0xffffffffffffff80|
   +-------------------------------------------+----------------------+
   | TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S |C_1=0xffffffffe0000000|
   |                                           |                      |
   |                                           |C_2=0xffffffffffff0000|
   |                                           |                      |
   |                                           |C_3=0xfffffffffffffff8|
   +-------------------------------------------+----------------------+
   | TLS_GOSTR341112_256_WITH_MAGMA_MGM_S      |C_1=0xfffffffffc000000|
   |                                           |                      |
   |                                           |C_2=0xffffffffffffe000|
   |                                           |                      |
   |                                           |C_3=0xffffffffffffffff|
   +-------------------------------------------+----------------------+

                                 Table 1

4.1.3.  SNMAX Parameter

   The SNMAX parameter is the maximum number of records encrypted under
   the same traffic key material (sender_write_key and sender_write_iv)
   and is defined by each cipher suite as follows:

     +===========================================+==================+
     | CipherSuites                              | SNMAX            |
     +===========================================+==================+
     | TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L | SNMAX = 2^64 - 1 |
     +-------------------------------------------+------------------+
     | TLS_GOSTR341112_256_WITH_MAGMA_MGM_L      | SNMAX = 2^64 - 1 |
     +-------------------------------------------+------------------+
     | TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S | SNMAX = 2^42 - 1 |
     +-------------------------------------------+------------------+
     | TLS_GOSTR341112_256_WITH_MAGMA_MGM_S      | SNMAX = 2^39 - 1 |
     +-------------------------------------------+------------------+

                                 Table 2

4.2.  Hash Algorithm

   The Hash algorithm is used for the key derivation process (see
   Section 7.1 of [RFC8446]), Finished message calculation (see
   Section 4.4.4 of [RFC8446]), Transcript-Hash function computation
   (see Section 4.4.1 of [RFC8446]), Pre-Shared Key (PSK) binder value
   calculation (see Section 4.2.11.2 of [RFC8446]), external re-keying
   approach (see Section 4.1.2), and other purposes.

   If a TLS13_GOST cipher suite is negotiated, the Hash algorithm MUST
   be the GOST R 34.11-2012 hash algorithm [RFC6986] with a 32-byte
   (256-bit) hash value.

5.  Signature Scheme Definition

   This section defines the following seven TLS13_GOST signature
   schemes:

   enum {
       gostr34102012_256a(0x0709),
       gostr34102012_256b(0x070A),
       gostr34102012_256c(0x070B),
       gostr34102012_256d(0x070C),
       gostr34102012_512a(0x070D),
       gostr34102012_512b(0x070E),
       gostr34102012_512c(0x070F)
   } SignatureScheme;

   One of the TLS13_GOST signature schemes listed above SHOULD be used
   with the TLS13_GOST profile.

   Each signature scheme specifies a pair consisting of the signature
   algorithm (see Section 5.1) and the elliptic curve (see Section 5.2).
   The procedure to calculate the signature value using TLS13_GOST
   signature schemes is defined in Section 5.3.

5.1.  Signature Algorithm

   Signature algorithms corresponding to the TLS13_GOST signature
   schemes are defined as follows:

       +=======================+=====================+============+
       | SignatureScheme Value | Signature Algorithm | References |
       +=======================+=====================+============+
       | gostr34102012_256a    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 32-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_256b    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 32-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_256c    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 32-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_256d    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 32-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_512a    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 64-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_512b    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 64-byte key length  |            |
       +-----------------------+---------------------+------------+
       | gostr34102012_512c    | GOST R 34.10-2012,  | RFC 7091   |
       |                       | 64-byte key length  |            |
       +-----------------------+---------------------+------------+

                                 Table 3

5.2.  Elliptic Curve

   Elliptic curves corresponding to the TLS13_GOST signature schemes are
   defined as follows:

     +=======================+=========================+============+
     | SignatureScheme Value | Curve Identifier Value  | References |
     +=======================+=========================+============+
     | gostr34102012_256a    | id-tc26-gost-           | RFC 7836   |
     |                       | 3410-2012-256-paramSetA |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_256b    | id-GostR3410-2001-      | RFC 4357   |
     |                       | CryptoPro-A-ParamSet    |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_256c    | id-GostR3410-2001-      | RFC 4357   |
     |                       | CryptoPro-B-ParamSet    |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_256d    | id-GostR3410-2001-      | RFC 4357   |
     |                       | CryptoPro-C-ParamSet    |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_512a    | id-tc26-gost-           | RFC 7836   |
     |                       | 3410-12-512-paramSetA   |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_512b    | id-tc26-gost-           | RFC 7836   |
     |                       | 3410-12-512-paramSetB   |            |
     +-----------------------+-------------------------+------------+
     | gostr34102012_512c    | id-tc26-gost-           | RFC 7836   |
     |                       | 3410-2012-512-paramSetC |            |
     +-----------------------+-------------------------+------------+

                                 Table 4

5.3.  SIGN Function

   If the TLS13_GOST signature scheme is used, the signature value in
   the CertificateVerify message (see Section 6.3.4) MUST be calculated
   using the SIGN function defined as follows:

   +-----------------------------------------------------+
   |  SIGN(d_sign, M)                                    |
   |-----------------------------------------------------|
   |  Input:                                             |
   |  - the sign key d_sign: 0 < d_sign < q;             |
   |  - the byte string M in B*.                         |
   |  Output:                                            |
   |  - signature value sgn in B_{2*l}.                  |
   |-----------------------------------------------------|
   |  1. (r, s) = SIGNGOST(d_sign, M)                    |
   |  2. Return str_l(r) | str_l(s).                     |
   |-----------------------------------------------------+

   where

   *  q is the subgroup order of the group of points of the elliptic
      curve;

   *  l is defined as follows:

      -  l = 32 for the gostr34102012_256a, gostr34102012_256b,
         gostr34102012_256c, and gostr34102012_256d signature schemes;

      -  l = 64 for the gostr34102012_512a, gostr34102012_512b, and
         gostr34102012_512c signature schemes;

   *  SIGNGOST is an algorithm that takes a private key d_sign and a
      message M as an input and returns a pair of integers (r, s) that
      is calculated during the signature generation process in
      accordance with the GOST R 34.10-2012 signature algorithm (see
      Section 6.1 of [RFC7091]).

   Note: The signature value sgn is the concatenation of two strings
   that are byte representations of r and s values in the little-endian
   format.

6.  Key Exchange and Authentication

   The key exchange and authentication process for using the TLS13_GOST
   profile is defined in Sections 6.1, 6.2, and 6.3.

6.1.  Key Exchange

   The TLS13_GOST profile supports three basic key exchange modes that
   are defined in [RFC8446]: Ephemeral Elliptic Curve Diffie-Hellman
   (ECDHE), PSK-only, and PSK with ECDHE.

   Note: In accordance with [RFC8446], TLS 1.3 also supports key
   exchange modes based on the Diffie-Hellman protocol over finite
   fields.  However, the TLS13_GOST profile MUST use modes based on the
   Diffie-Hellman protocol over elliptic curves.

   In accordance with [RFC8446], PSKs can be divided into two types:

   *  internal PSKs that can be established during the previous
      connection;

   *  external PSKs that can be established out of band.

   If the TLS13_GOST profile is used, PSK-only key exchange mode SHOULD
   be established via the internal PSKs, and external PSKs SHOULD be
   used only in PSK with ECDHE mode (see more in Section 9).

   If the TLS13_GOST profile is used and ECDHE or PSK with ECDHE key
   exchange mode is used, the ECDHE shared secret SHOULD be calculated
   in accordance with Section 6.1.1 on the basis of one of the elliptic
   curves defined in Section 6.1.2.

6.1.1.  ECDHE Shared Secret Calculation

   If the TLS13_GOST profile is used, the ECDHE shared secret SHOULD be
   calculated in accordance with Sections 6.1.1.1 and 6.1.1.2.  The
   public ephemeral keys used to obtain the ECDHE shared secret SHOULD
   be represented in the format described in Section 6.1.1.3.

6.1.1.1.  ECDHE Shared Secret Calculation on the Client Side

   The client calculates the ECDHE shared secret in accordance with the
   following steps:

   Step 1.  The client chooses from all supported curves E_1, ..., E_R
            the set of curves E_{i_1}, ..., E_{i_r}, 1 <= i_1 <= i_r <=
            R, where

            *  r >= 1 in the case of the first ClientHello message;

            *  r = 1 in the case of responding to the HelloRetryRequest
               message; E_{i_1} corresponds to the curve indicated in
               the "key_share" extension in the HelloRetryRequest
               message.

   Step 2.  The client generates ephemeral key pairs (d_C^{i_1},
            Q_C^{i_1}), ..., (d_C^{i_r}, Q_C^{i_r}) corresponding to the
            curves E_{i_1}, ..., E_{i_r}, where for each i in {i_1, ...,
            i_r}:

            *  d_C^i is chosen from {1, ..., q_i - 1} at random;

            *  Q_C^i = d_C^i * P_i.

   Step 3.  The client sends the ClientHello message specified in
            accordance with Section 4.1.2 of [RFC8446] and Section 6.3.1
            that contains:

            *  "key_share" extension with public ephemeral keys
               Q_C^{i_1}, ..., Q_C^{i_r} built in accordance with
               Section 4.2.8 of [RFC8446];

            *  "supported_groups" extension with supported curves E_1,
               ..., E_R built in accordance with Section 4.2.7 of
               [RFC8446].

               Note: The client MAY send an empty "key_share" extension
               in the first ClientHello message to request a group
               selection from the server in the HelloRetryRequest
               message and to generate an ephemeral key for the selected
               group only.  The ECDHE shared secret may be calculated
               without sending HelloRetryRequest message if the
               "key_share" extension in the first ClientHello message
               contains the value corresponding to the curve that is
               selected by the server.

   Step 4.  If the HelloRetryRequest message is received, the client
            MUST return to Step 1 and choose correct parameters in
            accordance with Section 4.1.2 of [RFC8446].  If the
            ServerHello message is received, the client proceeds to the
            next step.  In other cases, the client MUST terminate the
            connection with the "unexpected_message" alert.

   Step 5.  The client extracts curve E_res and ephemeral key Q_S^res,
            res in {1, ..., R}, from the ServerHello message and checks
            whether Q_S^res belongs to E_res.  If this check fails, the
            client MUST terminate the connection with
            "handshake_failure" alert.

   Step 6.  The client generates Q^ECDHE:

               Q^ECDHE = (X^ECDHE, Y^ECDHE) = (h_res * d_C^res) *
               Q_S^res.

   Step 7.  The client MUST check whether the calculated shared secret
            Q^ECDHE is not equal to the zero point O_res.  If this check
            fails, the client MUST terminate the connection with
            "handshake_failure" alert.

   Step 8.  The ECDHE shared secret is the byte representation of the
            coordinate X^ECDHE of the point Q^ECDHE in the little-endian
            format:

               ECDHE = str_{coordinate_length}(X^ECDHE),

            where the coordinate_length value is defined by the
            particular elliptic curve (see Section 6.1.2).

6.1.1.2.  ECDHE Shared Secret Calculation on Server Side

   Upon receiving the ClientHello message, the server calculates the
   ECDHE shared secret in accordance with the following steps:

   Step 1.  The server chooses the curve E_res, res in {1, ..., R}, from
            the list of the curves E_1, ..., E_R indicated in the
            "supported_groups" extension in the ClientHello message and
            the corresponding public ephemeral key Q_C^res from the list
            Q_C^{i_1}, ..., Q_C^{i_r}, 1 <= i_1 <= i_r <= R, indicated
            in the "key_share" extension.  If the corresponding public
            ephemeral key is not found (res in {1, ..., R}\{i_1, ...,
            i_r}), the server MUST send the HelloRetryRequest message
            with the "key_share" extension indicating the selected
            elliptic curve E_res and wait for the new ClientHello
            message.

   Step 2.  The server checks whether Q_C^res belongs to E_res.  If this
            check fails, the server MUST terminate the connection with
            "handshake_failure" alert.

   Step 3.  The server generates ephemeral key pair (d_S^res, Q_S^res)
            corresponding to E_res:

            *  d_S^res is chosen from {1, ..., q_res - 1} at random;

            *  Q_S^res = d_S^res * P_res.

   Step 4.  The server sends the ServerHello message generated in
            accordance with Section 4.1.3 of [RFC8446] and Section 6.3.1
            with the "key_share" extension that contains public
            ephemeral key Q_S^res corresponding to E_res.

   Step 5.  The server generates Q^ECDHE:

               Q^ECDHE = (X^ECDHE, Y^ECDHE) = (h_res * d_S^res) *
               Q_C^res.

   Step 6.  The server MUST check whether the calculated shared secret
            Q^ECDHE is not equal to the zero point O_res.  If this check
            fails, the server MUST abort the handshake with
            "handshake_failure" alert.

   Step 7.  The ECDHE shared secret is the byte representation of the
            coordinate X^ECDHE of the point Q^ECDHE in the little-endian
            format:

               ECDHE = str_{coordinate_length}(X^ECDHE),

            where the coordinate_length value is defined by the
            particular elliptic curve (see Section 6.1.2).

6.1.1.3.  Public Ephemeral Key Representation

   This section defines the representation format of the public
   ephemeral keys generated during the ECDHE shared secret calculation
   (see Sections 6.1.1.1 and 6.1.1.2).

   If the TLS13_GOST profile is used and ECDHE or PSK with ECDHE key
   exchange mode is used, the public ephemeral key Q indicated in the
   KeyShareEntry.key_exchange field MUST contain the data defined by the
   following structure:

   struct {
       opaque X[coordinate_length];
       opaque Y[coordinate_length];
   } PlainPointRepresentation;

   where X and Y, respectively, contain the byte representations of x
   and y values of the point Q (Q = (x, y)) in the little-endian format
   and are specified as follows:

   *  X = str_{coordinate_length}(x);

   *  Y = str_{coordinate_length}(y).

   The coordinate_length value is defined by the particular elliptic
   curve (see Section 6.1.2).

6.1.2.  Values for the TLS Supported Groups Registry

   The "supported_groups" extension is used to indicate the set of the
   elliptic curves supported by an endpoint and is defined in
   Section 4.2.7 of [RFC8446].  This extension is always contained in
   the ClientHello message and optionally in the EncryptedExtensions
   message.

   This section defines the following seven elliptic curves:

   enum {
       GC256A(0x22), GC256B(0x23), GC256C(0x24), GC256D(0x25),
       GC512A(0x26), GC512B(0x27), GC512C(0x28)
   } NamedGroup;

   If the TLS13_GOST profile is used and ECDHE or PSK with ECDHE key
   exchange mode is used, one of the elliptic curves listed above SHOULD
   be used.

   Each curve corresponds to the particular identifier and specifies the
   value of coordinate_length parameter (see "cl" column) as follows:

    +===========+========================================+==+=========+
    |Description| Curve Identifier Value                 |cl|Reference|
    +===========+========================================+==+=========+
    |GC256A     | id-tc26-gost-3410-2012-256-paramSetA   |32|RFC 7836 |
    +-----------+----------------------------------------+--+---------+
    |GC256B     | id-GostR3410-2001-CryptoPro-A-ParamSet |32|RFC 4357 |
    +-----------+----------------------------------------+--+---------+
    |GC256C     | id-GostR3410-2001-CryptoPro-B-ParamSet |32|RFC 4357 |
    +-----------+----------------------------------------+--+---------+
    |GC256D     | id-GostR3410-2001-CryptoPro-C-ParamSet |32|RFC 4357 |
    +-----------+----------------------------------------+--+---------+
    |GC512A     | id-tc26-gost-3410-12-512-paramSetA     |64|RFC 7836 |
    +-----------+----------------------------------------+--+---------+
    |GC512B     | id-tc26-gost-3410-12-512-paramSetB     |64|RFC 7836 |
    +-----------+----------------------------------------+--+---------+
    |GC512C     | id-tc26-gost-3410-2012-512-paramSetC   |64|RFC 7836 |
    +-----------+----------------------------------------+--+---------+

                                  Table 5

   Note: The identifier values and the corresponding elliptic curves are
   the same as in [RFC9189].

6.2.  Authentication

   In accordance with [RFC8446], authentication can be performed via a
   signature with a certificate or via a symmetric PSK.  The server side
   is always authenticated; the client side is optionally authenticated.

   PSK-based authentication is performed as a side effect of key
   exchange.  If the TLS13_GOST profile is used, external PSKs SHOULD be
   combined only with mutual authentication (see Section 9).

   Certificate-based authentication is performed via Authentication
   messages and an optional CertificateRequest message (sent if client
   authentication is required).  If the TLS13_GOST profile is used, the
   signature schemes used for certificate-based authentication are
   defined in Section 5 and Authentication messages are specified in
   Sections 6.3.3 and 6.3.4.  The CertificateRequest message is
   specified in Section 6.3.2.

6.3.  Handshake Messages

   The TLS13_GOST profile specifies the ClientHello, ServerHello,
   CertificateRequest, Certificate and CertificateVerify handshake
   messages that are described in further detail below.

6.3.1.  Hello Messages

   The ClientHello message is sent when the client first connects to the
   server or responds to the HelloRetryRequest message and is specified
   in accordance with Section 4.1.2 of [RFC8446].

   If the TLS13_GOST profile is used, the ClientHello message MUST meet
   the following requirements:

   *  The ClientHello.cipher_suites field MUST contain the values
      defined in Section 4.

   *  If server authentication via a certificate is required, the
      extension_data field of the "signature_algorithms" extension MUST
      contain the values defined in Section 5 that correspond to the
      GOST R 34.10-2012 signature algorithm.

   *  If server authentication via a certificate is required and the
      client uses optional "signature_algorithms_cert" extension, the
      extension_data field of this extension SHOULD contain the values
      defined in Section 5 that correspond to the GOST R 34.10-2012
      signature algorithm.

   *  If the client wants to establish a TLS 1.3 connection using the
      ECDHE shared secret, the extension_data field of the
      "supported_groups" extension MUST contain the elliptic curve
      identifiers defined in Section 6.1.2.

   The ServerHello message is sent by the server in response to the
   ClientHello message to negotiate an acceptable set of handshake
   parameters based on the ClientHello message and is specified in
   accordance with Section 4.1.3 of [RFC8446].

   If the TLS13_GOST profile is used, the ServerHello message MUST meet
   the following requirements:

   *  The ServerHello.cipher_suite field MUST contain one of the values
      defined in Section 4.

   *  If the server decides to establish a TLS 1.3 connection using the
      ECDHE shared secret, the extension_data field of the "key_share"
      extension MUST contain the elliptic curve identifier and the
      public ephemeral key that satisfy the following conditions:

      -  The elliptic curve identifier corresponds to the value that was
         indicated in the "supported_groups" and the "key_share"
         extensions in the ClientHello message.

      -  The elliptic curve identifier is one of the values defined in
         Section 6.1.2.

      -  The public ephemeral key corresponds to the elliptic curve
         specified by the KeyShareEntry.group identifier.

6.3.2.  CertificateRequest

   This message is sent when the server requests client authentication
   via a certificate and is specified in accordance with Section 4.3.2
   of [RFC8446].

   If the TLS13_GOST profile is used, the CertificateRequest message
   MUST meet the following requirements:

   *  The extension_data field of the "signature_algorithms" extension
      MUST contain only the values defined in Section 5.

   *  If the server uses optional "signature_algorithms_cert" extension,
      the extension_data field of this extension SHOULD contain only the
      values defined in Section 5.

6.3.3.  Certificate

   This message is sent to convey the endpoint's certificate chain to
   the peer and is specified in accordance with Section 4.4.2 of
   [RFC8446].

   If the TLS13_GOST profile is used, the Certificate message MUST meet
   the following requirements.

   *  Each endpoint's certificate provided to the peer MUST be signed
      using the algorithm that corresponds to a signature scheme
      indicated by the peer in its "signature_algorithms_cert"
      extension, if present (or in the "signature_algorithms" extension,
      otherwise).

   *  The signature algorithm used for signing certificates SHOULD
      correspond to one of the signature schemes defined in Section 5.

6.3.4.  CertificateVerify

   This message is sent to provide explicit proof that the endpoint has
   the private key corresponding to the public key indicated in its
   certificate and is specified in accordance with Section 4.4.3 of
   [RFC8446].

   If the TLS13_GOST profile is used, the CertificateVerify message MUST
   meet the following requirements:

   *  The CertificateVerify.algorithm field MUST contain the signature
      scheme identifier that corresponds to the value indicated in the
      peer's "signature_algorithms" extension and is one of the values
      defined in Section 5.

   *  The CertificateVerify.signature field contains the sgn value that
      is computed as follows:

         sgn = SIGN(d_sign, M),

      where

      -  the SIGN function is defined in Section 5.3;

      -  d_sign is the sender's long-term private key that corresponds
         to the sender's long-term public key Q_sign from the sender's
         certificate;

      -  the message M is defined in accordance with Section 4.4.3 of
         [RFC8446].

7.  IANA Considerations

   IANA has added the following values to the "TLS Cipher Suites"
   registry with a reference to this RFC:

   +=====+=========================================+=======+===========+
   |Value|Description                              |DTLS-OK|Recommended|
   +=====+=========================================+=======+===========+
   |0xC1,|TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L|N      |N          |
   |0x03 |                                         |       |           |
   +-----+-----------------------------------------+-------+-----------+
   |0xC1,|TLS_GOSTR341112_256_WITH_MAGMA_MGM_L     |N      |N          |
   |0x04 |                                         |       |           |
   +-----+-----------------------------------------+-------+-----------+
   |0xC1,|TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S|N      |N          |
   |0x05 |                                         |       |           |
   +-----+-----------------------------------------+-------+-----------+
   |0xC1,|TLS_GOSTR341112_256_WITH_MAGMA_MGM_S     |N      |N          |
   |0x06 |                                         |       |           |
   +-----+-----------------------------------------+-------+-----------+

                                  Table 6

   IANA has added the following values to the "TLS SignatureScheme"
   registry with a reference to this RFC:

               +========+====================+=============+
               | Value  | Description        | Recommended |
               +========+====================+=============+
               | 0x0709 | gostr34102012_256a | N           |
               +--------+--------------------+-------------+
               | 0x070A | gostr34102012_256b | N           |
               +--------+--------------------+-------------+
               | 0x070B | gostr34102012_256c | N           |
               +--------+--------------------+-------------+
               | 0x070C | gostr34102012_256d | N           |
               +--------+--------------------+-------------+
               | 0x070D | gostr34102012_512a | N           |
               +--------+--------------------+-------------+
               | 0x070E | gostr34102012_512b | N           |
               +--------+--------------------+-------------+
               | 0x070F | gostr34102012_512c | N           |
               +--------+--------------------+-------------+

                                  Table 7

8.  Historical Considerations

   In addition to the curve identifier values listed in Table 5, there
   are some additional identifier values that correspond to the
   signature schemes for historical reasons.  They are as follows:

    +====================+============================================+
    | Description        | Curve Identifier Value                     |
    +====================+============================================+
    | gostr34102012_256b | id-GostR3410-2001-CryptoPro-XchA-ParamSet, |
    |                    | id-tc26-gost-3410-2012-256-paramSetB       |
    +--------------------+--------------------------------------------+
    | gostr34102012_256c | id-tc26-gost-3410-2012-256-paramSetC       |
    +--------------------+--------------------------------------------+
    | gostr34102012_256d | id-GostR3410-2001-CryptoPro-XchB-ParamSet, |
    |                    | id-tc26-gost-3410-2012-256-paramSetD       |
    +--------------------+--------------------------------------------+

                                  Table 8

   The client should be prepared to handle any of them correctly if the
   corresponding signature scheme is included in the
   "signature_algorithms" or "signature_algorithms_cert" extensions.

9.  Security Considerations

   In order to create an efficient and side-channel resistant
   implementation while using the TLSTREE algorithm, the functions
   KDF_j, j = 1, 2, 3, SHOULD be called only when necessary (when the
   record sequence number seqnum reaches such a value that seqnum & C_j
   != (seqnum - 1) & C_j).  Otherwise, the previous value should be
   used.

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC6986]  Dolmatov, V., Ed. and A. Degtyarev, "GOST R 34.11-2012:
              Hash Function", RFC 6986, DOI 10.17487/RFC6986, August
              2013, <https://www.rfc-editor.org/info/rfc6986>.

   [RFC7091]  Dolmatov, V., Ed. and A. Degtyarev, "GOST R 34.10-2012:
              Digital Signature Algorithm", RFC 7091,
              DOI 10.17487/RFC7091, December 2013,
              <https://www.rfc-editor.org/info/rfc7091>.

   [RFC7801]  Dolmatov, V., Ed., "GOST R 34.12-2015: Block Cipher
              "Kuznyechik"", RFC 7801, DOI 10.17487/RFC7801, March 2016,
              <https://www.rfc-editor.org/info/rfc7801>.

   [RFC7836]  Smyshlyaev, S., Ed., Alekseev, E., Oshkin, I., Popov, V.,
              Leontiev, S., Podobaev, V., and D. Belyavsky, "Guidelines
              on the Cryptographic Algorithms to Accompany the Usage of
              Standards GOST R 34.10-2012 and GOST R 34.11-2012",
              RFC 7836, DOI 10.17487/RFC7836, March 2016,
              <https://www.rfc-editor.org/info/rfc7836>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8446]  Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
              <https://www.rfc-editor.org/info/rfc8446>.

   [RFC8645]  Smyshlyaev, S., Ed., "Re-keying Mechanisms for Symmetric
              Keys", RFC 8645, DOI 10.17487/RFC8645, August 2019,
              <https://www.rfc-editor.org/info/rfc8645>.

   [RFC8891]  Dolmatov, V., Ed. and D. Baryshkov, "GOST R 34.12-2015:
              Block Cipher "Magma"", RFC 8891, DOI 10.17487/RFC8891,
              September 2020, <https://www.rfc-editor.org/info/rfc8891>.

   [RFC9058]  Smyshlyaev, S., Ed., Nozdrunov, V., Shishkin, V., and E.
              Griboedova, "Multilinear Galois Mode (MGM)", RFC 9058,
              DOI 10.17487/RFC9058, June 2021,
              <https://www.rfc-editor.org/info/rfc9058>.

   [RFC9189]  Smyshlyaev, S., Ed., Belyavsky, D., and E. Alekseev, "GOST
              Cipher Suites for Transport Layer Security (TLS) Protocol
              Version 1.2", RFC 9189, DOI 10.17487/RFC9189, March 2022,
              <https://www.rfc-editor.org/info/rfc9189>.

10.2.  Informative References

   [RFC8446BIS]
              Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", Work in Progress, Internet-Draft, draft-
              ietf-tls-rfc8446bis-05, 24 October 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-tls-
              rfc8446bis-05>.

Appendix A.  Test Examples

A.1.  Example 1

A.1.1.  Test Case

   Test examples are given for the following instance of the TLS13_GOST
   profile:

   1.  Full TLS Handshake is used.

   2.  ECDHE key exchange mode is used.  The elliptic curve GC512C is
       used for ECDHE shared secret calculation.

   3.  Authentication is only used on the server side.  The signature
       scheme gost34102012_256b is used.

   4.  TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S cipher suite is
       negotiated.

   5.  Application Data is sent by the server prior to receiving the
       Finished message from the client.

   6.  NewSessionTicket is sent after establishing a secure connection.

   7.  Nine Application Data records are sent during the operation of
       the Record protocol.  The sequence numbers are selected to
       demonstrate the operation of the TLSTREE function.

   8.  Alert protocol is used for closure of the connection.

A.1.2.  Test Examples

   ---------------------------Client---------------------------

   ClientHello message:
   msg_type:                01
   length:                  0000DE
   body:
     legacy_version:        0303
     random:                03030303030303030303030303030303
                            03030303030303030303030303030303
     legacy_session_id:
       length:              00
       vector:              --
     cipher_suites:
       length:              0002
       vector:
         CipherSuite:       C105
     compression_methods:
       length:              01
       vector:
         CompressionMethod: 00
     extensions:
       length:              00B3
       vector:
         Extension: /* supported_groups */
           extension_type:  000A
           extension_data:
             length:        0004
             vector:
               named_group_list:
                 length:    0002
                 vector:
                  /* GC512C */
                            0028
         Extension: /* signature_algorithms */
           extension_type:  000D
           extension_data:
             length:        0010
             vector:
               supported_signature_algorithms:
                 length:    000E
                 vector:
                  /* gost34102012256a */
                            0709
                  /* gost34102012256b */
                            070A
                  /* gost34102012256c */
                            070B
                  /* gost34102012256d */
                            070C
                  /* gost34102012512a */
                            070D
                  /* gost34102012512b */
                            070E
                  /* gost34102012512c */
                            070F
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0003
             vector:
               versions:
                 length:    02
                 vector:
                            0304
         Extension: /* psk_key_exchange_modes */
           extension_type:  002D
           extension_data:
             length:        0002
             vector:
               ke_modes:
                 length:    01
                 vector:
                  /* psk_ke */
                            00
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0086
             vector:
               length:      0084
               vector:
                 group:     0028
                 key_exchange:
                   length:  0080
                   vector:
                            05EEBDF3DDC1D2F5F3822433241284E7
                            7641487938EA88721F26203E9792B5CB
                            97EB70EF02E8F72B7491D4F2CFDC332A
                            DF7F1778E854A88DDC2113FEC527A151
                            71A04CB0C573793A7AEF9BBCA486B6B0
                            46B2149B46F4332903E5B7C438ADD05E
                            185EFBF45557475A8CCBF6ACED1A2EB4
                            16F916729D7CEF9CBD8334989304AFAE

   0000:   01 00 00 DE 03 03 03 03 03 03 03 03 03 03 03 03
   0010:   03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03
   0020:   03 03 03 03 03 03 00 00 02 C1 05 01 00 00 B3 00
   0030:   0A 00 04 00 02 00 28 00 0D 00 10 00 0E 07 09 07
   0040:   0A 07 0B 07 0C 07 0D 07 0E 07 0F 00 2B 00 03 02
   0050:   03 04 00 2D 00 02 01 00 00 33 00 86 00 84 00 28
   0060:   00 80 05 EE BD F3 DD C1 D2 F5 F3 82 24 33 24 12
   0070:   84 E7 76 41 48 79 38 EA 88 72 1F 26 20 3E 97 92
   0080:   B5 CB 97 EB 70 EF 02 E8 F7 2B 74 91 D4 F2 CF DC
   0090:   33 2A DF 7F 17 78 E8 54 A8 8D DC 21 13 FE C5 27
   00A0:   A1 51 71 A0 4C B0 C5 73 79 3A 7A EF 9B BC A4 86
   00B0:   B6 B0 46 B2 14 9B 46 F4 33 29 03 E5 B7 C4 38 AD
   00C0:   D0 5E 18 5E FB F4 55 57 47 5A 8C CB F6 AC ED 1A
   00D0:   2E B4 16 F9 16 72 9D 7C EF 9C BD 83 34 98 93 04
   00E0:   AF AE

   Record layer message:
   type:                    16
   legacy_record_version:   0301
   length:                  00E2
   fragment:                010000DE030303030303030303030303
                            03030303030303030303030303030303
                            030303030303000002C105010000B300
                            0A000400020028000D0010000E070907
                            0A070B070C070D070E070F002B000302
                            0304002D000201000033008600840028
                            008005EEBDF3DDC1D2F5F38224332412
                            84E77641487938EA88721F26203E9792
                            B5CB97EB70EF02E8F72B7491D4F2CFDC
                            332ADF7F1778E854A88DDC2113FEC527
                            A15171A04CB0C573793A7AEF9BBCA486
                            B6B046B2149B46F4332903E5B7C438AD
                            D05E185EFBF45557475A8CCBF6ACED1A
                            2EB416F916729D7CEF9CBD8334989304
                            AFAE

   00000:   16 03 01 00 E2 01 00 00 DE 03 03 03 03 03 03 03
   00010:   03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03
   00020:   03 03 03 03 03 03 03 03 03 03 03 00 00 02 C1 05
   00030:   01 00 00 B3 00 0A 00 04 00 02 00 28 00 0D 00 10
   00040:   00 0E 07 09 07 0A 07 0B 07 0C 07 0D 07 0E 07 0F
   00050:   00 2B 00 03 02 03 04 00 2D 00 02 01 00 00 33 00
   00060:   86 00 84 00 28 00 80 05 EE BD F3 DD C1 D2 F5 F3
   00070:   82 24 33 24 12 84 E7 76 41 48 79 38 EA 88 72 1F
   00080:   26 20 3E 97 92 B5 CB 97 EB 70 EF 02 E8 F7 2B 74
   00090:   91 D4 F2 CF DC 33 2A DF 7F 17 78 E8 54 A8 8D DC
   000A0:   21 13 FE C5 27 A1 51 71 A0 4C B0 C5 73 79 3A 7A
   000B0:   EF 9B BC A4 86 B6 B0 46 B2 14 9B 46 F4 33 29 03
   000D0:   E5 B7 C4 38 AD D0 5E 18 5E FB F4 55 57 47 5A 8C
   000E0:   CB F6 AC ED 1A 2E B4 16 F9 16 72 9D 7C EF 9C BD
   000F0:   83 34 98 93 04 AF AE

   ---------------------------Server---------------------------

   ServerHello message:
   msg_type:                02
   length:                  0000B6
   body:
     legacy_version:        0303
     random:                83838383838383838383838383838383
                            83838383838383838383838383838383

     legacy_session_id:
       length:              00
       vector:              --
     cipher_suite:
         CipherSuite:       C105
     compression_method:
         CompressionMethod: 00
     extensions:
       length:              008E
       vector:
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0002
             vector:
               selected_version:
                            0304
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0084
             vector:
               group:       0028
               key_exchange:
                 length:    0080
                 vector:
                            2F3C663FE74735A1C421160DF0F43266
                            185FD30B6E5D6E88FC4061FAEACAB338
                            B10A1BD20CB0B4EE757E74A0027D409F
                            E937F01633A1E3F9A5518DEFD0F89F9D
                            3D9F6CC651413DEC2C74366D83C47EE1
                            DE4E421F65CD1163E94EA0C2E19ED45D
                            35558B937D9BFDC5ECC2B2A21B4EC3D5
                            3B29579A8FD5E074811028FBCF17994F

   00000:   02 00 00 B6 03 03 83 83 83 83 83 83 83 83 83 83
   00010:   83 83 83 83 83 83 83 83 83 83 83 83 83 83 83 83
   00020:   83 83 83 83 83 83 00 C1 05 00 00 8E 00 2B 00 02
   00030:   03 04 00 33 00 84 00 28 00 80 2F 3C 66 3F E7 47
   00040:   35 A1 C4 21 16 0D F0 F4 32 66 18 5F D3 0B 6E 5D
   00050:   6E 88 FC 40 61 FA EA CA B3 38 B1 0A 1B D2 0C B0
   00060:   B4 EE 75 7E 74 A0 02 7D 40 9F E9 37 F0 16 33 A1
   00070:   E3 F9 A5 51 8D EF D0 F8 9F 9D 3D 9F 6C C6 51 41
   00080:   3D EC 2C 74 36 6D 83 C4 7E E1 DE 4E 42 1F 65 CD
   00090:   11 63 E9 4E A0 C2 E1 9E D4 5D 35 55 8B 93 7D 9B
   000A0:   FD C5 EC C2 B2 A2 1B 4E C3 D5 3B 29 57 9A 8F D5
   000B0:   E0 74 81 10 28 FB CF 17 99 4F

   Record layer message:
   type:                    16
   legacy_record_version:   0303
   length:                  00BA
   fragment:                020000B6030383838383838383838383
                            83838383838383838383838383838383
                            83838383838300C10500008E002B0002
                            030400330084002800802F3C663FE747
                            35A1C421160DF0F43266185FD30B6E5D
                            6E88FC4061FAEACAB338B10A1BD20CB0
                            B4EE757E74A0027D409FE937F01633A1
                            E3F9A5518DEFD0F89F9D3D9F6CC65141
                            3DEC2C74366D83C47EE1DE4E421F65CD
                            1163E94EA0C2E19ED45D35558B937D9B
                            FDC5ECC2B2A21B4EC3D53B29579A8FD5
                            E074811028FBCF17994F

   00000:   16 03 03 00 BA 02 00 00 B6 03 03 83 83 83 83 83
   00010:   83 83 83 83 83 83 83 83 83 83 83 83 83 83 83 83
   00020:   83 83 83 83 83 83 83 83 83 83 83 00 C1 05 00 00
   00030:   8E 00 2B 00 02 03 04 00 33 00 84 00 28 00 80 2F
   00040:   3C 66 3F E7 47 35 A1 C4 21 16 0D F0 F4 32 66 18
   00050:   5F D3 0B 6E 5D 6E 88 FC 40 61 FA EA CA B3 38 B1
   00060:   0A 1B D2 0C B0 B4 EE 75 7E 74 A0 02 7D 40 9F E9
   00070:   37 F0 16 33 A1 E3 F9 A5 51 8D EF D0 F8 9F 9D 3D
   00080:   9F 6C C6 51 41 3D EC 2C 74 36 6D 83 C4 7E E1 DE
   00090:   4E 42 1F 65 CD 11 63 E9 4E A0 C2 E1 9E D4 5D 35
   000A0:   55 8B 93 7D 9B FD C5 EC C2 B2 A2 1B 4E C3 D5 3B
   000B0:   29 57 9A 8F D5 E0 74 81 10 28 FB CF 17 99 4F

   ---------------------------Client---------------------------

   d_C^res:
   00000:   04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04
   00010:   04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04
   00020:   04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04
   00030:   04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04

   Q_S^res:
   00000:   2F 3C 66 3F E7 47 35 A1 C4 21 16 0D F0 F4 32 66
   00010:   18 5F D3 0B 6E 5D 6E 88 FC 40 61 FA EA CA B3 38
   00020:   B1 0A 1B D2 0C B0 B4 EE 75 7E 74 A0 02 7D 40 9F
   00030:   E9 37 F0 16 33 A1 E3 F9 A5 51 8D EF D0 F8 9F 9D
   00040:   3D 9F 6C C6 51 41 3D EC 2C 74 36 6D 83 C4 7E E1
   00050:   DE 4E 42 1F 65 CD 11 63 E9 4E A0 C2 E1 9E D4 5D
   00060:   35 55 8B 93 7D 9B FD C5 EC C2 B2 A2 1B 4E C3 D5
   00070:   3B 29 57 9A 8F D5 E0 74 81 10 28 FB CF 17 99 4F

   ECDHE:
   00000:   4D E6 0D 21 EA 8F B9 22 0D 14 64 23 B4 90 DA 40
   00010:   CC EB C4 3B C5 89 DB 79 B8 31 A4 7D 6B 06 30 07
   00020:   DD 03 40 5A 1B 79 76 B6 23 DC AA 69 B0 11 AE 10
   00030:   6E 7E 41 74 38 5F 86 26 E1 21 B5 99 43 63 C9 9F

   ---------------------------Server---------------------------

   d_S^res:
   00000:   AA 3C A4 F4 A5 0A C0 5B 37 42 B1 35 B5 30 A9 F2
   00010:   2A E4 F5 E1 85 30 1D EC 83 2E 77 BA 3B CD 6A F1
   00020:   84 84 84 84 84 84 84 84 84 84 84 84 84 84 84 84
   00030:   84 84 84 84 84 84 84 84 84 84 84 84 84 84 84 04

   Q_C^res:
   00000:   05 EE BD F3 DD C1 D2 F5 F3 82 24 33 24 12 84 E7
   00010:   76 41 48 79 38 EA 88 72 1F 26 20 3E 97 92 B5 CB
   00020:   97 EB 70 EF 02 E8 F7 2B 74 91 D4 F2 CF DC 33 2A
   00030:   DF 7F 17 78 E8 54 A8 8D DC 21 13 FE C5 27 A1 51
   00040:   71 A0 4C B0 C5 73 79 3A 7A EF 9B BC A4 86 B6 B0
   00050:   46 B2 14 9B 46 F4 33 29 03 E5 B7 C4 38 AD D0 5E
   00060:   18 5E FB F4 55 57 47 5A 8C CB F6 AC ED 1A 2E B4
   00070:   16 F9 16 72 9D 7C EF 9C BD 83 34 98 93 04 AF AE

   ECDHE:
   00000:   4D E6 0D 21 EA 8F B9 22 0D 14 64 23 B4 90 DA 40
   00010:   CC EB C4 3B C5 89 DB 79 B8 31 A4 7D 6B 06 30 07
   00020:   DD 03 40 5A 1B 79 76 B6 23 DC AA 69 B0 11 AE 10
   00030:   6E 7E 41 74 38 5F 86 26 E1 21 B5 99 43 63 C9 9F

   ---------------------------Server---------------------------

   EncryptedExtensions message:
   msg_type:                08
   length:                  000002
   body:
     extensions:
       length:              0000
       vector:              --

   00000:   08 00 00 02 00 00

   Record payload protection:

     EarlySecret = HKDF-Extract(Salt: 0^256, IKM: 0^256):
     00000:   FB DE FB E5 27 FE EA 66 5A AB 92 77 A2 16 3B 83
     00010:   43 08 4F D1 91 C4 60 66 26 0F AC 6F D1 43 6C 72

     Derived #0 = Derive-Secret(EarlySecret, "derived", "") =
     HKDF-Expand-Label(EarlySecret, "derived", "", 32):
     00000:   DB C3 C8 26 D8 77 A3 B7 D2 D2 45 3D BF DC 6C FB
     00010:   FB 11 51 B3 E8 4F 0C 8F 26 01 1D 8D 5B F3 ED F7

     HandshakeSecret = HKDF-Extract(Salt: Derived #0, IKM: ECDHE):
     00000:   44 24 5E 2C 43 32 D1 F7 8B 0F 8D 16 F4 03 EB 69
     00010:   ED 2A 40 53 84 7C DC 39 FA 8B 3D 29 74 F7 45 E7

     HM1 = (ClientHello, ServerHello)

     TH1 = Transcript-Hash(HM1):
     00000:   99 3B A7 22 12 4A F3 CB FD 47 71 E7 FA E3 2A C1
     00010:   D0 E9 27 8C F7 84 3F CB C6 20 E1 A0 08 5A 87 A1

     server_handshake_traffic_secret (SHTS):
       SHTS = Derive-Secret(HandshakeSecret, "s hs traffic", HM1) =
       HKDF-Expand-Label(HandshakeSecret, "s hs traffic", TH1, 32):
       00000:   70 A5 F2 46 3D F6 0D BA A2 36 8B 67 FD 45 AE FF
       00010:   7C 1A 0B A4 2D 8A BD 72 41 5E CD 1D 94 E9 EF 54

     server_write_key_hs = HKDF-Expand-Label(SHTS, "key", "", 32):
     00000:   E1 37 64 B5 4B 9E 1B 47 D4 33 98 D6 D2 16 DF 24
     00010:   C2 89 A3 96 AB 6C 5B 52 4B BB 9C 06 F3 9F EF 01

     server_write_iv_hs = HKDF-Expand-Label(SHTS, "iv", "", 16):
     00000:   69 69 FF AA A4 52 52 81 EE BB EB 4C BD 0B 64 0E

     server_record_write_key = TLSTREE(server_write_key_hs, 0):
     00000:   56 EE 18 13 72 72 49 C9 DC DF 35 13 78 7E DB 93
     00010:   DF 62 C6 1E E7 B1 26 C5 0F 26 C0 AA AF AE 00 E1

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

     nonce:
     00000:   69 69 FF AA A4 52 52 81 EE BB EB 4C BD 0B 64 0E

     additional_data:
     00000:   17 03 03 00 17

     TLSInnerPlaintext:
     00000:   08 00 00 02 00 00 16

     TLSCiphertext:
     00000:   17 03 03 00 17 94 0E 5D 2C 75 3A E5 FE BD 20 01
     00010:   2C C9 E3 EB 24 A3 79 84 1E 02 AB BE

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0017
   encrypted_record:        940E5D2C753AE5FEBD20012CC9E3EB24
                            A379841E02ABBE

   00000:   17 03 03 00 17 94 0E 5D 2C 75 3A E5 FE BD 20 01
   00010:   2C C9 E3 EB 24 A3 79 84 1E 02 AB BE

   ---------------------------Server---------------------------

   Certificate message:
   msg_type:                0B
   length:                  000151
   body:
     certificate_request_context:
       length:              00
       vector:              --
     certificate_list:
       length:              00014D
       vector:
         ASN.1Cert:
           length:          000148
           vector:          308201443081F2A00302010202023039
                            300A06082A85030701010302301B3119
                            301706035504031310676F73742E6578
                            616D706C652E636F6D301E170D323030
                            3232383131303833375A170D33303032
                            32353131303833375A301B3119301706
                            035504031310676F73742E6578616D70
                            6C652E636F6D305E301706082A850307
                            01010101300B06092A85030701020101
                            020343000440F383CEE83048B4EB14C7
                            1A7F6DE44A37CE11A6AC1750F1CFB8DA
                            D8A38CCDD8FD06656F7CFC075F4083C3
                            716221478F1EE24C6B1B70CCE3C72AFD
                            2ACE65C775BCA321301F301D0603551D
                            0E04160414F330FA7166DF095AF3A073
                            BC3B8EA356D7DFAC71300A06082A8503
                            0701010302034100AB2EDA23F49B4862
                            3B0CFF5906B7DD3C23B473570B296A08
                            71DD15EF9A33201B97904A5CFA6C931C
                            5473DC0C5A5F2FBB2E50CF587AE27C4D
                            8E52EB80189DD08B
             extensions:
               length:      0000
               vector:      --

   00000:   0B 00 01 51 00 00 01 4D 00 01 48 30 82 01 44 30
   00010:   81 F2 A0 03 02 01 02 02 02 30 39 30 0A 06 08 2A
   00020:   85 03 07 01 01 03 02 30 1B 31 19 30 17 06 03 55
   00030:   04 03 13 10 67 6F 73 74 2E 65 78 61 6D 70 6C 65
   00040:   2E 63 6F 6D 30 1E 17 0D 32 30 30 32 32 38 31 31
   00050:   30 38 33 37 5A 17 0D 33 30 30 32 32 35 31 31 30
   00060:   38 33 37 5A 30 1B 31 19 30 17 06 03 55 04 03 13
   00070:   10 67 6F 73 74 2E 65 78 61 6D 70 6C 65 2E 63 6F
   00080:   6D 30 5E 30 17 06 08 2A 85 03 07 01 01 01 01 30
   00090:   0B 06 09 2A 85 03 07 01 02 01 01 02 03 43 00 04
   000A0:   40 F3 83 CE E8 30 48 B4 EB 14 C7 1A 7F 6D E4 4A
   000B0:   37 CE 11 A6 AC 17 50 F1 CF B8 DA D8 A3 8C CD D8
   000C0:   FD 06 65 6F 7C FC 07 5F 40 83 C3 71 62 21 47 8F
   000D0:   1E E2 4C 6B 1B 70 CC E3 C7 2A FD 2A CE 65 C7 75
   000E0:   BC A3 21 30 1F 30 1D 06 03 55 1D 0E 04 16 04 14
   000F0:   F3 30 FA 71 66 DF 09 5A F3 A0 73 BC 3B 8E A3 56
   00100:   D7 DF AC 71 30 0A 06 08 2A 85 03 07 01 01 03 02
   00110:   03 41 00 AB 2E DA 23 F4 9B 48 62 3B 0C FF 59 06
   00120:   B7 DD 3C 23 B4 73 57 0B 29 6A 08 71 DD 15 EF 9A
   00130:   33 20 1B 97 90 4A 5C FA 6C 93 1C 54 73 DC 0C 5A
   00140:   5F 2F BB 2E 50 CF 58 7A E2 7C 4D 8E 52 EB 80 18
   00150:   9D D0 8B 00 00

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_hs, 1):
     00000:   56 EE 18 13 72 72 49 C9 DC DF 35 13 78 7E DB 93
     00010:   DF 62 C6 1E E7 B1 26 C5 0F 26 C0 AA AF AE 00 E1

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01

     nonce:
     00000:   69 69 FF AA A4 52 52 81 EE BB EB 4C BD 0B 64 0F

     additional_data:
     00000:   17 03 03 01 66

     TLSInnerPlaintext:
     00000:   0B 00 01 51 00 00 01 4D 00 01 48 30 82 01 44 30
     00010:   81 F2 A0 03 02 01 02 02 02 30 39 30 0A 06 08 2A
     00020:   85 03 07 01 01 03 02 30 1B 31 19 30 17 06 03 55
     00030:   04 03 13 10 67 6F 73 74 2E 65 78 61 6D 70 6C 65
     00040:   2E 63 6F 6D 30 1E 17 0D 32 30 30 32 32 38 31 31
     00050:   30 38 33 37 5A 17 0D 33 30 30 32 32 35 31 31 30
     00060:   38 33 37 5A 30 1B 31 19 30 17 06 03 55 04 03 13
     00070:   10 67 6F 73 74 2E 65 78 61 6D 70 6C 65 2E 63 6F
     00080:   6D 30 5E 30 17 06 08 2A 85 03 07 01 01 01 01 30
     00090:   0B 06 09 2A 85 03 07 01 02 01 01 02 03 43 00 04
     000A0:   40 F3 83 CE E8 30 48 B4 EB 14 C7 1A 7F 6D E4 4A
     000B0:   37 CE 11 A6 AC 17 50 F1 CF B8 DA D8 A3 8C CD D8
     000C0:   FD 06 65 6F 7C FC 07 5F 40 83 C3 71 62 21 47 8F
     000D0:   1E E2 4C 6B 1B 70 CC E3 C7 2A FD 2A CE 65 C7 75
     000E0:   BC A3 21 30 1F 30 1D 06 03 55 1D 0E 04 16 04 14
     000F0:   F3 30 FA 71 66 DF 09 5A F3 A0 73 BC 3B 8E A3 56
     00100:   D7 DF AC 71 30 0A 06 08 2A 85 03 07 01 01 03 02
     00110:   03 41 00 AB 2E DA 23 F4 9B 48 62 3B 0C FF 59 06
     00120:   B7 DD 3C 23 B4 73 57 0B 29 6A 08 71 DD 15 EF 9A
     00130:   33 20 1B 97 90 4A 5C FA 6C 93 1C 54 73 DC 0C 5A
     00140:   5F 2F BB 2E 50 CF 58 7A E2 7C 4D 8E 52 EB 80 18
     00150:   9D D0 8B 00 00 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0166
   encrypted_record:        F57944FE9A599A76E7FE9C26E3FCE5BB
                            AC4DDCF68EF2E77624E33E80B6743E39
                            10502EE419A219B3BB6A1712D15458BB
                            897D3DAC7A48769945C89237DFB86620
                            CC31C456B4374B075905E42AB5333742
                            3463819982DC6D76A067C4FD83BD3E47
                            9CD9B7FD2926A5A63B1E88B1525DB976
                            C7F409190F955AE9F0AC5F976A471F23
                            675DEB9B24E162D24F494ECDC483A070
                            7129F3BD17D0FAC4944F2B3BF140D616
                            D654709297495B23898893B211505856
                            EEC1A96BC4DCF78A016798E5500D662C
                            54A74BDF6A7F300AC9B72299B4F15F6F
                            449F396CE1D0C9243CBC1C86BECD5CAB
                            BFDF50197B7AFF4BE903D7E3311B729B
                            C32D09D2D0DCE06622985AE037DC2F87
                            CB0C492F2D5106B259CC86E227CC8338
                            C1DF6C63576B17DB9655FD255F156E1F
                            4F767FAFB74471731E4225256818DE94
                            64218263D7CF7B87EB5222E76DE6C951
                            E462CCCCC53E06387BB4FEDEFD34B9C1
                            3AB4EE3D49057CD2672F852A5F692408
                            29B92341CDC9

   TLSCiphertext:
     00000:   17 03 03 01 66 F5 79 44 FE 9A 59 9A 76 E7 FE 9C
     00010:   26 E3 FC E5 BB AC 4D DC F6 8E F2 E7 76 24 E3 3E
     00020:   80 B6 74 3E 39 10 50 2E E4 19 A2 19 B3 BB 6A 17
     00030:   12 D1 54 58 BB 89 7D 3D AC 7A 48 76 99 45 C8 92
     00040:   37 DF B8 66 20 CC 31 C4 56 B4 37 4B 07 59 05 E4
     00050:   2A B5 33 37 42 34 63 81 99 82 DC 6D 76 A0 67 C4
     00060:   FD 83 BD 3E 47 9C D9 B7 FD 29 26 A5 A6 3B 1E 88
     00070:   B1 52 5D B9 76 C7 F4 09 19 0F 95 5A E9 F0 AC 5F
     00080:   97 6A 47 1F 23 67 5D EB 9B 24 E1 62 D2 4F 49 4E
     00090:   CD C4 83 A0 70 71 29 F3 BD 17 D0 FA C4 94 4F 2B
     000A0:   3B F1 40 D6 16 D6 54 70 92 97 49 5B 23 89 88 93
     000B0:   B2 11 50 58 56 EE C1 A9 6B C4 DC F7 8A 01 67 98
     000C0:   E5 50 0D 66 2C 54 A7 4B DF 6A 7F 30 0A C9 B7 22
     000D0:   99 B4 F1 5F 6F 44 9F 39 6C E1 D0 C9 24 3C BC 1C
     000E0:   86 BE CD 5C AB BF DF 50 19 7B 7A FF 4B E9 03 D7
     000F0:   E3 31 1B 72 9B C3 2D 09 D2 D0 DC E0 66 22 98 5A
     00100:   E0 37 DC 2F 87 CB 0C 49 2F 2D 51 06 B2 59 CC 86
     00110:   E2 27 CC 83 38 C1 DF 6C 63 57 6B 17 DB 96 55 FD
     00120:   25 5F 15 6E 1F 4F 76 7F AF B7 44 71 73 1E 42 25
     00130:   25 68 18 DE 94 64 21 82 63 D7 CF 7B 87 EB 52 22
     00140:   E7 6D E6 C9 51 E4 62 CC CC C5 3E 06 38 7B B4 FE
     00150:   DE FD 34 B9 C1 3A B4 EE 3D 49 05 7C D2 67 2F 85
     00160:   2A 5F 69 24 08 29 B9 23 41 CD C9

   ---------------------------Server---------------------------

   HMCertificateVerify = (ClientHello, ServerHello,
     EncryptedExtensions, Certificate)

   Transcript-Hash(HMCertificateVerify):
     00000:   E0 CC 4B C1 4B EC 5D 13 19 2C DC 66 22 B4 FD A9
     00010:   67 6A 1B 50 E4 56 83 0B B5 F0 7E 01 21 22 73 06

   k (random for signature algorithm):
     00000:   85 85 85 85 85 85 85 85 85 85 85 85 85 85 85 85
     00010:   85 85 85 85 85 85 85 85 85 85 85 85 85 85 85 85

   sgn:
     00000:   A0 AA 13 91 5C 5B 80 C6 02 E2 FD 85 80 4F 99 2C
     00010:   77 15 97 AD 37 85 7A D6 BC 2A 9D 7B C5 FE BE C3
     00020:   7C 72 94 BA A2 3C F6 9D 03 E4 71 0B D7 08 13 FD
     00030:   AC 59 6B C1 58 E7 56 BD 37 1C 44 2E 95 22 DE 87

   CertificateVerify message:
   msg_type:                0F
   length:                  000044
   body:
     algorithm:             070A
     signature:
       length:              0040
       vector:
                            A0AA13915C5B80C602E2FD85804F992C
                            771597AD37857AD6BC2A9D7BC5FEBEC3
                            7C7294BAA23CF69D03E4710BD70813FD
                            AC596BC158E756BD371C442E9522DE87

   00000:   0F 00 00 44 07 0A 00 40 A0 AA 13 91 5C 5B 80 C6
   00010:   02 E2 FD 85 80 4F 99 2C 77 15 97 AD 37 85 7A D6
   00020:   BC 2A 9D 7B C5 FE BE C3 7C 72 94 BA A2 3C F6 9D
   00030:   03 E4 71 0B D7 08 13 FD AC 59 6B C1 58 E7 56 BD
   00040:   37 1C 44 2E 95 22 DE 87

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_hs, 2):
     00000:   56 EE 18 13 72 72 49 C9 DC DF 35 13 78 7E DB 93
     00010:   DF 62 C6 1E E7 B1 26 C5 0F 26 C0 AA AF AE 00 E1

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02

     nonce:
     00000:   69 69 FF AA A4 52 52 81 EE BB EB 4C BD 0B 64 0C

     additional_data:
     00000:   17 03 03 00 59

     TLSInnerPlaintext:
     00000:   0F 00 00 44 07 0A 00 40 A0 AA 13 91 5C 5B 80 C6
     00010:   02 E2 FD 85 80 4F 99 2C 77 15 97 AD 37 85 7A D6
     00020:   BC 2A 9D 7B C5 FE BE C3 7C 72 94 BA A2 3C F6 9D
     00030:   03 E4 71 0B D7 08 13 FD AC 59 6B C1 58 E7 56 BD
     00040:   37 1C 44 2E 95 22 DE 87 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0059
   encrypted_record:        52631D5BFDF48254BDFB5F9E02A6A527
                            0163BCE1E0D818E8D74176535C6CDD25
                            2DE065AE77984A65ADBA036D59CF45B9
                            A0047BABCCD0B28044D34BCFD09E6E46
                            27044B26FE5CA734FCB08607146F41A8
                            71C3F95384B48ADABC

   TLSCiphertext:
     00000:   17 03 03 00 59 52 63 1D 5B FD F4 82 54 BD FB 5F
     00010:   9E 02 A6 A5 27 01 63 BC E1 E0 D8 18 E8 D7 41 76
     00020:   53 5C 6C DD 25 2D E0 65 AE 77 98 4A 65 AD BA 03
     00030:   6D 59 CF 45 B9 A0 04 7B AB CC D0 B2 80 44 D3 4B
     00040:   CF D0 9E 6E 46 27 04 4B 26 FE 5C A7 34 FC B0 86
     00050:   07 14 6F 41 A8 71 C3 F9 53 84 B4 8A DA BC

   ---------------------------Server---------------------------

   server_finished_key = HKDF-Expand-Label(SHTS, "finished", "", 32):
   00000:   53 F1 C0 38 8F 8A 70 C0 BC A0 DD 21 A0 30 F2 38
   00010:   1C 34 37 CD 0E 7E C9 3D 0A 96 5E 25 63 2D D7 9A

   HMFinished = (ClientHello, ServerHello, EncryptedExtensions
     Certificate, CertificateVerify)

   Transcript-Hash(HMFinished):
   00000:   03 EC 9B 1D 0B 37 41 42 45 72 BA C9 DF 3A A5 2C
   00010:   03 EF E9 E9 58 07 69 43 AF D8 58 19 BC 60 2F 46

   FinishedHash =
   HMAC(server_finished_key,Transcript-Hash(HMFinished)):
   00000:   E0 BA A3 36 14 E0 69 69 7E 4D FA B0 71 B9 72 57
   00010:   73 F8 FE 1A 32 6A 66 2D 0F 52 30 9B 45 B6 E0 31

   Finished message:
   msg_type:                14
   length:                  000020
   body:
     verify_data:           E0BAA33614E069697E4DFAB071B97257
                            73F8FE1A326A662D0F52309B45B6E031

   00000:   14 00 00 20 E0 BA A3 36 14 E0 69 69 7E 4D FA B0
   00010:   71 B9 72 57 73 F8 FE 1A 32 6A 66 2D 0F 52 30 9B
   00020:   45 B6 E0 31

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_hs, 3):
     00000:   56 EE 18 13 72 72 49 C9 DC DF 35 13 78 7E DB 93
     00010:   DF 62 C6 1E E7 B1 26 C5 0F 26 C0 AA AF AE 00 E1

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03

     nonce:
     00000:   69 69 FF AA A4 52 52 81 EE BB EB 4C BD 0B 64 0D

     additional_data:
     00000:   17 03 03 00 35

     TLSInnerPlaintext:
     00000:   14 00 00 20 E0 BA A3 36 14 E0 69 69 7E 4D FA B0
     00010:   71 B9 72 57 73 F8 FE 1A 32 6A 66 2D 0F 52 30 9B
     00020:   45 B6 E0 31 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0035
   encrypted_record:        57B1706C4918F67EACCA457F7D5B537C
                            CE5036B4004C778022B97EE802320398
                            119404506680ADD7D6A6CD7C8153B755
                            3C6E646AD6

   TLSCiphertext:
     00000:   17 03 03 00 35 57 B1 70 6C 49 18 F6 7E AC CA 45
     00010:   7F 7D 5B 53 7C CE 50 36 B4 00 4C 77 80 22 B9 7E
     00020:   E8 02 32 03 98 11 94 04 50 66 80 AD D7 D6 A6 CD
     00030:   7C 81 53 B7 55 3C 6E 64 6A D6

   ---------------------------Server---------------------------
   Application Data:
     HELO gost.example.com\r\n

   Record payload protection:

     Derived #1 = Derive-Secret(HandshakeSecret, "derived", "") =
       HKDF-Expand-Label(HandshakeSecret, "derived", "", 32):
       00000:   EA 3C 54 BB D1 4E F9 D7 50 77 6F AB E3 95 BE 2A
       00010:   BD DB BB B7 1C 13 C2 BD 60 9E 35 15 79 4A FA 02

     MainSecret = HKDF-Extract(Salt: Derived #1, IKM: 0^256):
     00000:   31 BB 1D 61 2C CD 53 32 68 8A 55 1A 48 CA 25 0F
     00010:   24 78 3D 4A B0 B4 A7 6D 3F E5 06 7A 26 16 A4 A3

     HM2 = (ClientHello, ServerHello, EncryptedExtensions, Certificate,
      CertificateVerify, Server Finished)

     TH2 = Transcript-Hash(HM2):
     00000:   9E BC 5F BE 32 D9 F4 0D 48 F8 EE CE BB 62 31 A5
     00010:   33 C2 C0 EF 24 32 77 B9 6D 6F 7A D3 BB FD 14 94

     server_application_traffic_secret (SATS):
     SATS = Derive-Secret(MainSecret, "s ap traffic", HM2) =
       HKDF-Expand-Label(MainSecret, "s ap traffic", TH2, 32):
       00000:   87 73 4F 4B 4C FD 17 B9 7B 83 4D 82 2D 9D 73 79
       00010:   F6 F5 E0 3B 80 B5 2A EB 2A FF 51 0E DD 83 DB D2

     server_write_key_ap = HKDF-Expand-Label(SATS, "key", "", 32):
     00000:   47 5E 4C 51 4C C6 31 8C 3A 5F 00 0F 12 65 BD 1A
     00010:   B5 F0 DE 1A F3 57 ED 00 79 EC 5F F0 AF BD 03 0C

     server_write_iv_ap = HKDF-Expand-Label(SATS, "iv", "", 16):
     00000:   AF E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B8

     server_record_write_key = TLSTREE(server_write_key_ap, 0):
     00000:   C8 FC 93 D7 C5 86 F2 B0 A3 10 1B AA 6A 97 9E 4E
     00010:   38 86 70 65 51 E8 11 87 E9 78 80 40 9C 7E 8E E9

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B8

     additional_data:
     00000:   17 03 03 00 28

     TLSInnerPlaintext:
     00000:   48 45 4C 4F 20 67 6F 73 74 2E 65 78 61 6D 70 6C
     00010:   65 2E 63 6F 6D 0D 0A 17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0028
   encrypted_record:        ABB8C372C79681DCE5C3C909DD039D59
                            8161FD3E6CE5D6F9CA5715BD6B5C1824
                            7FB26AC1AB396A4E

   TLSCiphertext:
     00000:   17 03 03 00 28 AB B8 C3 72 C7 96 81 DC E5 C3 C9
     00010:   09 DD 03 9D 59 81 61 FD 3E 6C E5 D6 F9 CA 57 15
     00020:   BD 6B 5C 18 24 7F B2 6A C1 AB 39 6A 4E

   ---------------------------Client---------------------------

   client_finished_key = HKDF-Expand-Label(CHTS, "finished", "", 32):
   00000:   2F 21 54 8C F5 27 78 69 AE 49 0D E7 BC 15 AC E6
   00010:   39 F6 57 E3 58 2A 5A 63 4B 0A 91 56 95 D5 4C 42

   HM2 = (ClientHello, ServerHello, EncryptedExtensions, Certificate,
     CertificateVerify, Server Finished)

   TH2 = Transcript-Hash(HM2):
   00000:   9E BC 5F BE 32 D9 F4 0D 48 F8 EE CE BB 62 31 A5
   00010:   33 C2 C0 EF 24 32 77 B9 6D 6F 7A D3 BB FD 14 94

   FinishedHash =
   HMAC(client_finished_key, TH2):
   00000:   08 5F C7 FD 79 B6 D1 11 CD 8D 3F F6 B2 3A 06 5A
   00010:   7A F7 A6 38 73 42 A5 F3 57 68 14 CD 00 47 19 D2

   Finished message:
   msg_type:                14
   length:                  000020
   body:
     verify_data:           085FC7FD79B6D111CD8D3FF6B23A065A
                            7AF7A6387342A5F3576814CD004719D2

   00000:   14 00 00 20 08 5F C7 FD 79 B6 D1 11 CD 8D 3F F6
   00010:   B2 3A 06 5A 7A F7 A6 38 73 42 A5 F3 57 68 14 CD
   00020:   00 47 19 D2

   Record payload protection:

     EarlySecret = HKDF-Extract(Salt: 0^256, IKM: 0^256):
     00000:   FB DE FB E5 27 FE EA 66 5A AB 92 77 A2 16 3B 83
     00010:   43 08 4F D1 91 C4 60 66 26 0F AC 6F D1 43 6C 72

     Derived #0 = Derive-Secret(EarlySecret, "derived", "") =
     HKDF-Expand-Label(EarlySecret, "derived", "", 32):
     00000:   DB C3 C8 26 D8 77 A3 B7 D2 D2 45 3D BF DC 6C FB
     00010:   FB 11 51 B3 E8 4F 0C 8F 26 01 1D 8D 5B F3 ED F7

     HandshakeSecret = HKDF-Extract(Salt: Derived #0, IKM: ECDHE):
     00000:   44 24 5E 2C 43 32 D1 F7 8B 0F 8D 16 F4 03 EB 69
     00010:   ED 2A 40 53 84 7C DC 39 FA 8B 3D 29 74 F7 45 E7

     HM1 = (ClientHello, ServerHello)

     TH1 = Transcript-Hash(HM1):
     00000:   99 3B A7 22 12 4A F3 CB FD 47 71 E7 FA E3 2A C1
     00010:   D0 E9 27 8C F7 84 3F CB C6 20 E1 A0 08 5A 87 A1

     client_handshake_traffic_secret (CHTS):
       CHTS = Derive-Secret(HandshakeSecret, "c hs traffic", HM1) =
       HKDF-Expand-Label(HandshakeSecret, "c hs traffic", TH1, 32):
       00000:   B3 F7 11 3D 35 26 55 4F E6 55 E5 6F AB 79 B1 A0
       00010:   3D E3 35 96 E3 30 88 C7 78 37 19 A9 A4 B0 DC CD

     client_write_key_hs = HKDF-Expand-Label(CHTS, "key", "", 32):
     00000:   58 16 88 D7 6E FE 12 2B B5 5F 62 B3 8E F0 1B CC
     00010:   8C 88 DB 83 E9 EA 4D 55 D3 89 8C 53 72 1F C3 84

     client_write_iv_hs = HKDF-Expand-Label(CHTS, "iv", "", 16):
     00000:   43 9A 07 45 3D 0B EA 0C 1D 1B EB 73 8E B5 B8 DD

     client_record_write_key = TLSTREE(client_write_key_hs, 0):
     00000:   E1 C5 9B 41 69 D8 96 10 7F 78 45 68 93 A3 75 1E
     00010:   15 73 54 3D AD 8C B7 40 69 E6 81 4A 51 3B BB 1C

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

     nonce:
     00000:   43 9A 07 45 3D 0B EA 0C 1D 1B EB 73 8E B5 B8 DD

     additional_data:
     00000:   17 03 03 00 35

     TLSInnerPlaintext:
     00000:   14 00 00 20 08 5F C7 FD 79 B6 D1 11 CD 8D 3F F6
     00010:   B2 3A 06 5A 7A F7 A6 38 73 42 A5 F3 57 68 14 CD
     00020:   00 47 19 D2 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0035
   encrypted_record:        C9C65EAAB4A80E04849A122EB0CC26A9
                            CA6B5DD4DB7AD6813949F629FC09E052
                            2FF7ACDBBA93926C20008B8CCE865422
                            7B31D439F8

   TLSCiphertext:
     00000:   17 03 03 00 35 C9 C6 5E AA B4 A8 0E 04 84 9A 12
     00010:   2E B0 CC 26 A9 CA 6B 5D D4 DB 7A D6 81 39 49 F6
     00020:   29 FC 09 E0 52 2F F7 AC DB BA 93 92 6C 20 00 8B
     00030:   8C CE 86 54 22 7B 31 D4 39 F8

   ---------------------------Server---------------------------

   NewSessionTicket message:
   msg_type:                04
   length:                  000035
   body:
     ticket_lifetime:       00093A80
     ticket_age_add:        86868686
     ticket_nonce:
       length:              08
       vector:              0000000000000000
     ticket:
       length:              0020
       vector:              88888888888888888888888888888888
                            88888888888888888888888888888888
     extensions:
       length:              0000
       vector:              --

   00000:   04 00 00 35 00 09 3A 80 86 86 86 86 08 00 00 00
   00010:   00 00 00 00 00 00 20 88 88 88 88 88 88 88 88 88
   00020:   88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88
   00030:   88 88 88 88 88 88 88 00 00

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 1):
     00000:   C8 FC 93 D7 C5 86 F2 B0 A3 10 1B AA 6A 97 9E 4E
     00010:   38 86 70 65 51 E8 11 87 E9 78 80 40 9C 7E 8E E9

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B9

     additional_data:
     00000:   17 03 03 00 4A

     TLSInnerPlaintext:
     00000:   04 00 00 35 00 09 3A 80 86 86 86 86 08 00 00 00
     00010:   00 00 00 00 00 00 20 88 88 88 88 88 88 88 88 88
     00020:   88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88
     00030:   88 88 88 88 88 88 88 00 00 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  004A
   encrypted_record:        CA6688A5DC22208DC8A8DE7E597292E3
                            CB5D454945B8F06C7C50F1823D7B6BB0
                            021178AE3ADB2DE3994539FD696945CF
                            AA6919F3F1294CD41ED2A8EA75302869
                            ACB994F3920B09D67186

   TLSCiphertext:
     00000:   17 03 03 00 4A CA 66 88 A5 DC 22 20 8D C8 A8 DE
     00010:   7E 59 72 92 E3 CB 5D 45 49 45 B8 F0 6C 7C 50 F1
     00020:   82 3D 7B 6B B0 02 11 78 AE 3A DB 2D E3 99 45 39
     00030:   FD 69 69 45 CF AA 69 19 F3 F1 29 4C D4 1E D2 A8
     00040:   EA 75 30 28 69 AC B9 94 F3 92 0B 09 D6 71 86

   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 2):
     00000:   C8 FC 93 D7 C5 86 F2 B0 A3 10 1B AA 6A 97 9E 4E
     00010:   38 86 70 65 51 E8 11 87 E9 78 80 40 9C 7E 8E E9

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 BA

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        9B3AD6939F05A403EEB1A636E13989D9
                            1CCA6A45BE5B7CB5C980020627A1B2AD
                            34AC4B5AAE5BD445C91C28325E4C7149
                            188D55EF27016D80AF440704820BCE22
                            CE501EA619A4FF7CD9F722A28391CE8B
                            B86BF87D5A85555BEF59A9C9A1572F38
                            114E64FD04A0DB2E1787A585EA51DCAB
                            B95DAFB73D0B3FE3F0702C5E1AA01571
                            17D884783E5E6113F6CA8352F6CF49F9
                            DB3B3DAB380BFD7BE04B0A  [...]
                            64E7027D926E0F95AB7F133B5921F996
                            A81EB67B78449DD32F4511E013206524
                            AD4AFACF0B1C1622282CB20A965E670C
                            C9A17E13F343AF3825AFD58B06915BDC
                            9E49477F02830694F5AC7CC99C887F62
                            CDAAEF0053766FB12BC9A082C157C347
                            21C5400C376088A660EE4329ED645D7C
                            07D4DA1ABDF6F9A1B9D51BF3E09CFCC1
                            A59CD96F07FC9ACF004EA1B20E6BBDAD
                            7BBF0C9E2A1B

   TLSCiphertext:
     00000000:   17 03 03 40 11 9B 3A D6 93 9F 05 A4 03 EE B1 A6
     00000010:   36 E1 39 89 D9 1C CA 6A 45 BE 5B 7C B5 C9 80 02
     00000020:   06 27 A1 B2 AD 34 AC 4B 5A AE 5B D4 45 C9 1C 28
     00000030:   32 5E 4C 71 49 18 8D 55 EF 27 01 6D 80 AF 44 07
     00000040:   04 82 0B CE 22 CE 50 1E A6 19 A4 FF 7C D9 F7 22
     00000050:   A2 83 91 CE 8B B8 6B F8 7D 5A 85 55 5B EF 59 A9
     00000060:   C9 A1 57 2F 38 11 4E 64 FD 04 A0 DB 2E 17 87 A5
     00000070:   85 EA 51 DC AB B9 5D AF B7 3D 0B 3F E3 F0 70 2C
     00000080:   5E 1A A0 15 71 17 D8 84 78 3E 5E 61 13 F6 CA 83
     00000090:   52 F6 CF 49 F9 DB 3B 3D AB 38 0B FD 7B E0 4B 0A
     [...]
     00003F80:   64 E7 02 7D 92 6E 0F 95 AB 7F 13 3B 59 21 F9 96
     00003F90:   A8 1E B6 7B 78 44 9D D3 2F 45 11 E0 13 20 65 24
     00003FA0:   AD 4A FA CF 0B 1C 16 22 28 2C B2 0A 96 5E 67 0C
     00003FB0:   C9 A1 7E 13 F3 43 AF 38 25 AF D5 8B 06 91 5B DC
     00003FC0:   9E 49 47 7F 02 83 06 94 F5 AC 7C C9 9C 88 7F 62
     00003FD0:   CD AA EF 00 53 76 6F B1 2B C9 A0 82 C1 57 C3 47
     00003FE0:   21 C5 40 0C 37 60 88 A6 60 EE 43 29 ED 64 5D 7C
     00003FF0:   07 D4 DA 1A BD F6 F9 A1 B9 D5 1B F3 E0 9C FC C1
     00004000:   A5 9C D9 6F 07 FC 9A CF 00 4E A1 B2 0E 6B BD AD
     00004010:   7B BF 0C 9E 2A 1B

   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 3):
     00000:   C8 FC 93 D7 C5 86 F2 B0 A3 10 1B AA 6A 97 9E 4E
     00010:   38 86 70 65 51 E8 11 87 E9 78 80 40 9C 7E 8E E9

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 BB

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        F06C5032F8A7AD58CED14D5383ED969E
                            628DE4F35CF9B6FCF5047D9B02261F56
                            F724DE961F8FF9C27AE76FBAC0A18E96
                            AA30CA7D8EBAD5B5135A0962515CC4F2
                            A16EBAB9A08886ED4EFD9DFAEC158F94
                            EFB0F90725C9114D9D8D904A18ABF184
                            E74B07150B2F2F27CB8032064943C957
                            11E480E4F4FCE8E9F020D5C90489E734
                            AEA10D91C7097AEC8CD6D5E3EEC764B0
                            CD447FC07735F0F8D9D490  [...]
                            3A79E7B3BCFD2B2478092911073A7CC9
                            6AC626C30DD0A5612DBBFF26E35AF0BB
                            5CEC24EED391100533FB999D4873ED5D
                            5E4693C5EEDC3ECC3C6EFF041B0A7F42
                            25A1092F4AADD9A508C7A56CB13A3F33
                            E844E28C8ADCD45250F4EE29834C5CAA
                            C50B5EBF94501785664E78AE9B5FDBFA
                            DF730DED97985D659135F5DABAD883FF
                            AC6046A0F629881F76147646D8E2A867
                            3B14295621F7


   TLSCiphertext:
     00000000:   17 03 03 40 11 F0 6C 50 32 F8 A7 AD 58 CE D1 4D
     00000010:   53 83 ED 96 9E 62 8D E4 F3 5C F9 B6 FC F5 04 7D
     00000020:   9B 02 26 1F 56 F7 24 DE 96 1F 8F F9 C2 7A E7 6F
     00000030:   BA C0 A1 8E 96 AA 30 CA 7D 8E BA D5 B5 13 5A 09
     00000040:   62 51 5C C4 F2 A1 6E BA B9 A0 88 86 ED 4E FD 9D
     00000050:   FA EC 15 8F 94 EF B0 F9 07 25 C9 11 4D 9D 8D 90
     00000060:   4A 18 AB F1 84 E7 4B 07 15 0B 2F 2F 27 CB 80 32
     00000070:   06 49 43 C9 57 11 E4 80 E4 F4 FC E8 E9 F0 20 D5
     00000080:   C9 04 89 E7 34 AE A1 0D 91 C7 09 7A EC 8C D6 D5
     00000090:   E3 EE C7 64 B0 CD 44 7F C0 77 35 F0 F8 D9 D4 90
     [...]
     00003F80:   3A 79 E7 B3 BC FD 2B 24 78 09 29 11 07 3A 7C C9
     00003F90:   6A C6 26 C3 0D D0 A5 61 2D BB FF 26 E3 5A F0 BB
     00003FA0:   5C EC 24 EE D3 91 10 05 33 FB 99 9D 48 73 ED 5D
     00003FB0:   5E 46 93 C5 EE DC 3E CC 3C 6E FF 04 1B 0A 7F 42
     00003FC0:   25 A1 09 2F 4A AD D9 A5 08 C7 A5 6C B1 3A 3F 33
     00003FD0:   E8 44 E2 8C 8A DC D4 52 50 F4 EE 29 83 4C 5C AA
     00003FE0:   C5 0B 5E BF 94 50 17 85 66 4E 78 AE 9B 5F DB FA
     00003FF0:   DF 73 0D ED 97 98 5D 65 91 35 F5 DA BA D8 83 FF
     00004000:   AC 60 46 A0 F6 29 88 1F 76 14 76 46 D8 E2 A8 67
     00004010:   3B 14 29 56 21 F7

   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 8):
     00000:   D3 CD 87 D5 68 74 07 82 39 78 34 4C 06 B9 28 A8
     00010:   58 98 B7 39 A3 1D 3D E5 FF 2B 78 8E F3 91 96 ED

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B0

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        E3DF00F169A76FA19FE55FA304E0A552
                            5A28FDBD3DD4CA654B89140EFD69E263
                            28A65A77F5D8B2E2F73568F7A677E5DF
                            8D225FAA8ED5FED98F09963FF1E82161
                            81595E9FA6989CCABC2150CA668D70EA
                            8CB6F62BCC528D26B52FB27AB70F194A
                            30E5C9085D9323D38745093070D15650
                            52468045F3398DC5BF93D6A983956E1D
                            3077337B773DAF4B9A6BA5BC569A251D
                            34FE23DF7B9343A0550094  [...]
                            2B516EE4A4971FD26EFB9293981435E9
                            FCC560B618B8ED0A52589E7342C25325
                            11C3D7C145559B8119BC02CB22CBF1EB
                            915578E8468806B2D0728C591B617354
                            CC47D51FF2363197A559018AD3498846
                            AD167DD086BD12EF52179D45ABF06C28
                            97B0C1D8AAD49413E0CCC086586D537A
                            296F9CEEB7E7E1DD2537540232C6BD71
                            619FC93BAE3FD8B0C95EA9915B6127B9
                            9F87884541F7

   TLSCiphertext:
     00000000:   17 03 03 40 11 E3 DF 00 F1 69 A7 6F A1 9F E5 5F
     00000010:   A3 04 E0 A5 52 5A 28 FD BD 3D D4 CA 65 4B 89 14
     00000020:   0E FD 69 E2 63 28 A6 5A 77 F5 D8 B2 E2 F7 35 68
     00000030:   F7 A6 77 E5 DF 8D 22 5F AA 8E D5 FE D9 8F 09 96
     00000040:   3F F1 E8 21 61 81 59 5E 9F A6 98 9C CA BC 21 50
     00000050:   CA 66 8D 70 EA 8C B6 F6 2B CC 52 8D 26 B5 2F B2
     00000060:   7A B7 0F 19 4A 30 E5 C9 08 5D 93 23 D3 87 45 09
     00000070:   30 70 D1 56 50 52 46 80 45 F3 39 8D C5 BF 93 D6
     00000080:   A9 83 95 6E 1D 30 77 33 7B 77 3D AF 4B 9A 6B A5
     00000090:   BC 56 9A 25 1D 34 FE 23 DF 7B 93 43 A0 55 00 94
     [...]
     00003F80:   2B 51 6E E4 A4 97 1F D2 6E FB 92 93 98 14 35 E9
     00003F90:   FC C5 60 B6 18 B8 ED 0A 52 58 9E 73 42 C2 53 25
     00003FA0:   11 C3 D7 C1 45 55 9B 81 19 BC 02 CB 22 CB F1 EB
     00003FB0:   91 55 78 E8 46 88 06 B2 D0 72 8C 59 1B 61 73 54
     00003FC0:   CC 47 D5 1F F2 36 31 97 A5 59 01 8A D3 49 88 46
     00003FD0:   AD 16 7D D0 86 BD 12 EF 52 17 9D 45 AB F0 6C 28
     00003FE0:   97 B0 C1 D8 AA D4 94 13 E0 CC C0 86 58 6D 53 7A
     00003FF0:   29 6F 9C EE B7 E7 E1 DD 25 37 54 02 32 C6 BD 71
     00004000:   61 9F C9 3B AE 3F D8 B0 C9 5E A9 91 5B 61 27 B9
     00004010:   9F 87 88 45 41 F7

   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 9):
     00000:   D3 CD 87 D5 68 74 07 82 39 78 34 4C 06 B9 28 A8
     00010:   58 98 B7 39 A3 1D 3D E5 FF 2B 78 8E F3 91 96 ED

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B1

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        4AFCD1257E2C8D4626BC0BFBB30F2F9C
                            A57A9D0DEC090B4248CAADDFE7AA4AEB
                            770F285384FEA308CADE2EEF318148C2
                            BED4870ABEE1955CCA41CE8344C3EDA4
                            7C2512CDD19FD54C7E0260BBC7BD8DD1
                            EE9D4EBADD3D7915D0A029D7847CA05D
                            078068CC8A792FED69A4E655A6E6D22D
                            A134ECA2BDECA1E59D3AE7313E45E785
                            AF89A8F1890BFCC59F03F39C4FB2337C
                            326D94FA04F5548619D6DC  [...]
                            79B6F56B6EBF8B8860436EFF9D8F03CC
                            73BDF446D30F918AF8FF8BA2D078D243
                            1AC04657D7871203F15969F160820D7D
                            FCA78F65FF954CE5549F2C78AA3A0885
                            04527FC561B6AE06020A8772B75CE933
                            6CAC35B536A50DB26930BFA21E9EB56E
                            A20E39CC2BBBA66D41C2E8720AA0143D
                            298D8036D7B0090A0214F58C5B1890A7
                            5B4783820395E39421F4357A49597EB0
                            64123818EACE

   TLSCiphertext:
     00000000:   17 03 03 40 11 4A FC D1 25 7E 2C 8D 46 26 BC 0B
     00000010:   FB B3 0F 2F 9C A5 7A 9D 0D EC 09 0B 42 48 CA AD
     00000020:   DF E7 AA 4A EB 77 0F 28 53 84 FE A3 08 CA DE 2E
     00000030:   EF 31 81 48 C2 BE D4 87 0A BE E1 95 5C CA 41 CE
     00000040:   83 44 C3 ED A4 7C 25 12 CD D1 9F D5 4C 7E 02 60
     00000050:   BB C7 BD 8D D1 EE 9D 4E BA DD 3D 79 15 D0 A0 29
     00000060:   D7 84 7C A0 5D 07 80 68 CC 8A 79 2F ED 69 A4 E6
     00000070:   55 A6 E6 D2 2D A1 34 EC A2 BD EC A1 E5 9D 3A E7
     00000080:   31 3E 45 E7 85 AF 89 A8 F1 89 0B FC C5 9F 03 F3
     00000090:   9C 4F B2 33 7C 32 6D 94 FA 04 F5 54 86 19 D6 DC
     [...]
     00003F80:   79 B6 F5 6B 6E BF 8B 88 60 43 6E FF 9D 8F 03 CC
     00003F90:   73 BD F4 46 D3 0F 91 8A F8 FF 8B A2 D0 78 D2 43
     00003FA0:   1A C0 46 57 D7 87 12 03 F1 59 69 F1 60 82 0D 7D
     00003FB0:   FC A7 8F 65 FF 95 4C E5 54 9F 2C 78 AA 3A 08 85
     00003FC0:   04 52 7F C5 61 B6 AE 06 02 0A 87 72 B7 5C E9 33
     00003FD0:   6C AC 35 B5 36 A5 0D B2 69 30 BF A2 1E 9E B5 6E
     00003FE0:   A2 0E 39 CC 2B BB A6 6D 41 C2 E8 72 0A A0 14 3D
     00003FF0:   29 8D 80 36 D7 B0 09 0A 02 14 F5 8C 5B 18 90 A7
     00004000:   5B 47 83 82 03 95 E3 94 21 F4 35 7A 49 59 7E B0
     00004010:   64 12 38 18 EA CE

   ---------------------------Client-----------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     Derived #1 = Derive-Secret(HandshakeSecret, "derived", "") =
       HKDF-Expand-Label(HandshakeSecret, "derived", "", 32):
       00000:   EA 3C 54 BB D1 4E F9 D7 50 77 6F AB E3 95 BE 2A
       00010:   BD DB BB B7 1C 13 C2 BD 60 9E 35 15 79 4A FA 02

     MainSecret = HKDF-Extract(Salt: Derived #1, IKM: 0^256):
     00000:   31 BB 1D 61 2C CD 53 32 68 8A 55 1A 48 CA 25 0F
     00010:   24 78 3D 4A B0 B4 A7 6D 3F E5 06 7A 26 16 A4 A3

     HM2 = (ClientHello, ServerHello, EncryptedExtensions, Certificate,
      CertificateVerify, Server Finished)

     TH2 = Transcript-Hash(HM2):
     00000:   9E BC 5F BE 32 D9 F4 0D 48 F8 EE CE BB 62 31 A5
     00010:   33 C2 C0 EF 24 32 77 B9 6D 6F 7A D3 BB FD 14 94

     client_application_traffic_secret (CATS):
     CATS = Derive-Secret(MainSecret, "c ap traffic", HM2) =
       HKDF-Expand-Label(MainSecret, "c ap traffic", TH2, 32):
       00000:   8A CF 74 6B EC 31 17 6C BD 14 2C 75 80 6C 27 0A
       00010:   0A EF 6F C3 8E 0D 8F DC B5 A8 85 25 36 3A DE 81

     client_write_key_ap = HKDF-Expand-Label(CATS, "key", "", 32):
     00000:   7B E6 4E 2C 12 78 7B 5B 8C 87 56 C4 3D 92 FA EF
     00010:   64 F1 5A 3A 3C 10 81 AD 34 BC A5 06 F0 32 24 15

     client_write_iv_ap = HKDF-Expand-Label(CATS, "iv", "", 16):
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 54

     client_record_write_key = TLSTREE(client_write_key_ap, 0):
     00000:   D4 9A 57 15 49 E7 48 94 9F A2 4B 88 34 23 2C A8
     00010:   75 D3 7A 26 C4 BB 5C 62 A2 61 DA B3 72 65 05 26

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

     nonce:
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 54

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        EA6CB652C7CBE6B50560D0364DC94D90
                            2560DFE55D8B83C8AA919F5A1E5492E7
                            4CA5156F18BEC8EAB6971CAA2D2C1FF1
                            46EA5FEF5D62682601868FFCD2688F34
                            83899C31F6BA87538682E7F895F653C0
                            9BFE95ABF3EEDF7EBB261CCC593DFCB0
                            04F05119567148BB35F3C7B4F09713A6
                            247A047EF29B05F7720E375A6E3264F4
                            7922EAEBE3AA6D1E80832806D5F20E7C
                            56662A7128B191829597DB  [...]
                            6A5184907D9FF8D3FC0994A3C850DDBC
                            2D0420EB66EA177FCDD78F16246E2076
                            039C525604F79A007F472AC7A20A4574
                            1B9D96E38E565899D40A724B8A37FF68
                            702BF9A645D04962BBC9C66A35FFD219
                            A08A385FE4CDD0A1F3F080BECDF01E45
                            68C338FAD2C850DFEAA98A7F1B95ECA1
                            72BA7F7526E3BFF2EFF2395CE4561867
                            DC9DE8FD10F38BCA1E44B0207AF4CCE8
                            8155836330BC

   TLSCiphertext:
     00000000:   17 03 03 40 11 EA 6C B6 52 C7 CB E6 B5 05 60 D0
     00000010:   36 4D C9 4D 90 25 60 DF E5 5D 8B 83 C8 AA 91 9F
     00000020:   5A 1E 54 92 E7 4C A5 15 6F 18 BE C8 EA B6 97 1C
     00000030:   AA 2D 2C 1F F1 46 EA 5F EF 5D 62 68 26 01 86 8F
     00000040:   FC D2 68 8F 34 83 89 9C 31 F6 BA 87 53 86 82 E7
     00000050:   F8 95 F6 53 C0 9B FE 95 AB F3 EE DF 7E BB 26 1C
     00000060:   CC 59 3D FC B0 04 F0 51 19 56 71 48 BB 35 F3 C7
     00000070:   B4 F0 97 13 A6 24 7A 04 7E F2 9B 05 F7 72 0E 37
     00000080:   5A 6E 32 64 F4 79 22 EA EB E3 AA 6D 1E 80 83 28
     00000090:   06 D5 F2 0E 7C 56 66 2A 71 28 B1 91 82 95 97 DB
     [...]
     00003F80:   6A 51 84 90 7D 9F F8 D3 FC 09 94 A3 C8 50 DD BC
     00003F90:   2D 04 20 EB 66 EA 17 7F CD D7 8F 16 24 6E 20 76
     00003FA0:   03 9C 52 56 04 F7 9A 00 7F 47 2A C7 A2 0A 45 74
     00003FB0:   1B 9D 96 E3 8E 56 58 99 D4 0A 72 4B 8A 37 FF 68
     00003FC0:   70 2B F9 A6 45 D0 49 62 BB C9 C6 6A 35 FF D2 19
     00003FD0:   A0 8A 38 5F E4 CD D0 A1 F3 F0 80 BE CD F0 1E 45
     00003FE0:   68 C3 38 FA D2 C8 50 DF EA A9 8A 7F 1B 95 EC A1
     00003FF0:   72 BA 7F 75 26 E3 BF F2 EF F2 39 5C E4 56 18 67
     00004000:   DC 9D E8 FD 10 F3 8B CA 1E 44 B0 20 7A F4 CC E8
     00004010:   81 55 83 63 30 BC

   ---------------------------Client-----------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 1):
     00000:   D4 9A 57 15 49 E7 48 94 9F A2 4B 88 34 23 2C A8
     00010:   75 D3 7A 26 C4 BB 5C 62 A2 61 DA B3 72 65 05 26

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01

     nonce:
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 55

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        0D486A03D03A020296EA0AD1D684A9F4
                            AE35824129141D3434CEE064FD5E966F
                            88D6E8903913417658E46C49B18BB0CC
                            B29B663D3F380A2CF9E5234BCD27F3A4
                            E12EBF3A3C69DB7661B08FC1685FADDE
                            50F68028A6E85EE12729D6F9CAD762FF
                            A6BAB5FC94AC65BAA36885DAF85C9B27
                            C68F9E97AB85ECFA760CDD22F9A8C0BA
                            6097D7960587CA708834516D9588592D
                            D1B8E05210BAA640FE6540  [...]
                            55A9C5A6557D35B8F1A9804BFA0F2789
                            3EDC6AA0350E9630AFF6C9B06C3CE01D
                            5BE51E87EBFFAC58230D074BE121F077
                            9D08F8177AFFFBB36DCEFDD0D0696873
                            A772B9A1DA73C681B0F8359EC1C74B6E
                            0452095C622C4C797F450CAA4F26975A
                            311F41F31C6A617747298CC052A6376F
                            A46191658FEE5BD8D7A998E7F12E8838
                            7365BAAD4BA490114733FC15A58148E6
                            186484821A94

   TLSCiphertext:
     00000000:   17 03 03 40 11 0D 48 6A 03 D0 3A 02 02 96 EA 0A
     00000010:   D1 D6 84 A9 F4 AE 35 82 41 29 14 1D 34 34 CE E0
     00000020:   64 FD 5E 96 6F 88 D6 E8 90 39 13 41 76 58 E4 6C
     00000030:   49 B1 8B B0 CC B2 9B 66 3D 3F 38 0A 2C F9 E5 23
     00000040:   4B CD 27 F3 A4 E1 2E BF 3A 3C 69 DB 76 61 B0 8F
     00000050:   C1 68 5F AD DE 50 F6 80 28 A6 E8 5E E1 27 29 D6
     00000060:   F9 CA D7 62 FF A6 BA B5 FC 94 AC 65 BA A3 68 85
     00000070:   DA F8 5C 9B 27 C6 8F 9E 97 AB 85 EC FA 76 0C DD
     00000080:   22 F9 A8 C0 BA 60 97 D7 96 05 87 CA 70 88 34 51
     00000090:   6D 95 88 59 2D D1 B8 E0 52 10 BA A6 40 FE 65 40
     [...]
     00003F80:   55 A9 C5 A6 55 7D 35 B8 F1 A9 80 4B FA 0F 27 89
     00003F90:   3E DC 6A A0 35 0E 96 30 AF F6 C9 B0 6C 3C E0 1D
     00003FA0:   5B E5 1E 87 EB FF AC 58 23 0D 07 4B E1 21 F0 77
     00003FB0:   9D 08 F8 17 7A FF FB B3 6D CE FD D0 D0 69 68 73
     00003FC0:   A7 72 B9 A1 DA 73 C6 81 B0 F8 35 9E C1 C7 4B 6E
     00003FD0:   04 52 09 5C 62 2C 4C 79 7F 45 0C AA 4F 26 97 5A
     00003FE0:   31 1F 41 F3 1C 6A 61 77 47 29 8C C0 52 A6 37 6F
     00003FF0:   A4 61 91 65 8F EE 5B D8 D7 A9 98 E7 F1 2E 88 38
     00004000:   73 65 BA AD 4B A4 90 11 47 33 FC 15 A5 81 48 E6
     00004010:   18 64 84 82 1A 94

   ---------------------------Client-----------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     client_record_write_key = TLSTREE(client_write_key_ap, 8):
     00000:   B8 2D 78 25 D1 5F AE 18 A7 01 32 28 B3 1C B0 C5
     00010:   97 52 C6 40 9C 5F 78 99 EC C6 95 0F 74 63 C0 90

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08

     nonce:
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 5C

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        F8B5732A300C8EF05FB712A2972F4DB8
                            4BE783A959090398E989516B6A54F333
                            331049283186BD1C42EFD98003A476A2
                            408EACE0D7047FB536979386C26B5523
                            F933A4F5BD7048B094EC5F5627EDFA98
                            99DE1AF8D9A493E481BA5DA0857BE15A
                            3F21CA01E22092159BAA770569CFBE54
                            F653BEFB4A8B32295DEFE992258F4581
                            257E936AF549E82D54EA6C09EF0D987B
                            F3A3E8453C1548CEF1C349  [...]
                            0EF4E88899AA3481AEDAE0E257449F80
                            A20CBDF070EC02211B6B9CBA9248B192
                            CF75C88A085DBFF77ABCFB1D82DAA421
                            1B487A48230350CBA4F338DD0BFD36D8
                            AAC5EE709456B7E317C78E7198FB7264
                            5B45EEFD3F93BF1C021F9E74A2ED2BCC
                            1CF5D367B553C7E7E9D80DD2447C7D13
                            D0345FEF2976696DFE579E5F71740C71
                            3124CFBAD66C7BB5BC21AAAE2F1E0860
                            5C248ADAF8BA

   TLSCiphertext:
     00000000:   17 03 03 40 11 F8 B5 73 2A 30 0C 8E F0 5F B7 12
     00000010:   A2 97 2F 4D B8 4B E7 83 A9 59 09 03 98 E9 89 51
     00000020:   6B 6A 54 F3 33 33 10 49 28 31 86 BD 1C 42 EF D9
     00000030:   80 03 A4 76 A2 40 8E AC E0 D7 04 7F B5 36 97 93
     00000040:   86 C2 6B 55 23 F9 33 A4 F5 BD 70 48 B0 94 EC 5F
     00000050:   56 27 ED FA 98 99 DE 1A F8 D9 A4 93 E4 81 BA 5D
     00000060:   A0 85 7B E1 5A 3F 21 CA 01 E2 20 92 15 9B AA 77
     00000070:   05 69 CF BE 54 F6 53 BE FB 4A 8B 32 29 5D EF E9
     00000080:   92 25 8F 45 81 25 7E 93 6A F5 49 E8 2D 54 EA 6C
     00000090:   09 EF 0D 98 7B F3 A3 E8 45 3C 15 48 CE F1 C3 49
     [...]
     00003F80:   0E F4 E8 88 99 AA 34 81 AE DA E0 E2 57 44 9F 80
     00003F90:   A2 0C BD F0 70 EC 02 21 1B 6B 9C BA 92 48 B1 92
     00003FA0:   CF 75 C8 8A 08 5D BF F7 7A BC FB 1D 82 DA A4 21
     00003FB0:   1B 48 7A 48 23 03 50 CB A4 F3 38 DD 0B FD 36 D8
     00003FC0:   AA C5 EE 70 94 56 B7 E3 17 C7 8E 71 98 FB 72 64
     00003FD0:   5B 45 EE FD 3F 93 BF 1C 02 1F 9E 74 A2 ED 2B CC
     00003FE0:   1C F5 D3 67 B5 53 C7 E7 E9 D8 0D D2 44 7C 7D 13
     00003FF0:   D0 34 5F EF 29 76 69 6D FE 57 9E 5F 71 74 0C 71
     00004000:   31 24 CF BA D6 6C 7B B5 BC 21 AA AE 2F 1E 08 60
     00004010:   5C 24 8A DA F8 BA

   ---------------------------Client-----------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   Pad: 15360 bytes

   Record payload protection:

     client_record_write_key = TLSTREE(client_write_key_ap, 9):
     00000:   B8 2D 78 25 D1 5F AE 18 A7 01 32 28 B3 1C B0 C5
     00010:   97 52 C6 40 9C 5F 78 99 EC C6 95 0F 74 63 C0 90

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09

     nonce:
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 5D

     additional_data:
     00000:   17 03 03 40 11

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000410:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     00004000:  00

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  4011
   encrypted_record:        C1719B62D4F5E295AB8A4A2CBD6BBEF3
                            0F07297D96004EBABE315090247510A6
                            BEE6395676956B4249B16B52CE9FE171
                            B1F4693F48B3446D48A99B6224537FBB
                            9BC8BF54AEA688D21E39F17840DB9F33
                            632EA196922B7E15D6AE080F9F3B33F2
                            FABE63BB66E21C590785EFAEBE75BB1E
                            17C9E5F58A1B1D1101DE95F9BF346C62
                            1C63CABEB6D7245DB75F18DA495F129A
                            652CE6B7E0FE47FB210D6A  [...]
                            2AF9D515B26C3D8F37F9BF5F3A766D8B
                            03189A78605069179FB9CF9B1A449DC0
                            4F0FE37E67FDF9A0341B1F0D64AA2871
                            D4DFEF10EC7DFE7475CFE364BB4D9453
                            A9F176829887148F3E8C0EEE858F9C17
                            C0B753C145D13BD2A96B23822F73DC6C
                            FD623DE3CB70F8D507E436C20E393940
                            F3A36C913C0BCDFE672C903C5522AA41
                            0B318DD1268D035C59D3E11FF273B1D7
                            715E2FBF3ACA

   TLSCiphertext:
     00000000:   17 03 03 40 11 C1 71 9B 62 D4 F5 E2 95 AB 8A 4A
     00000010:   2C BD 6B BE F3 0F 07 29 7D 96 00 4E BA BE 31 50
     00000020:   90 24 75 10 A6 BE E6 39 56 76 95 6B 42 49 B1 6B
     00000030:   52 CE 9F E1 71 B1 F4 69 3F 48 B3 44 6D 48 A9 9B
     00000040:   62 24 53 7F BB 9B C8 BF 54 AE A6 88 D2 1E 39 F1
     00000050:   78 40 DB 9F 33 63 2E A1 96 92 2B 7E 15 D6 AE 08
     00000060:   0F 9F 3B 33 F2 FA BE 63 BB 66 E2 1C 59 07 85 EF
     00000070:   AE BE 75 BB 1E 17 C9 E5 F5 8A 1B 1D 11 01 DE 95
     00000080:   F9 BF 34 6C 62 1C 63 CA BE B6 D7 24 5D B7 5F 18
     00000090:   DA 49 5F 12 9A 65 2C E6 B7 E0 FE 47 FB 21 0D 6A
     [...]
     00003F80:   2A F9 D5 15 B2 6C 3D 8F 37 F9 BF 5F 3A 76 6D 8B
     00003F90:   03 18 9A 78 60 50 69 17 9F B9 CF 9B 1A 44 9D C0
     00003FA0:   4F 0F E3 7E 67 FD F9 A0 34 1B 1F 0D 64 AA 28 71
     00003FB0:   D4 DF EF 10 EC 7D FE 74 75 CF E3 64 BB 4D 94 53
     00003FC0:   A9 F1 76 82 98 87 14 8F 3E 8C 0E EE 85 8F 9C 17
     00003FD0:   C0 B7 53 C1 45 D1 3B D2 A9 6B 23 82 2F 73 DC 6C
     00003FE0:   FD 62 3D E3 CB 70 F8 D5 07 E4 36 C2 0E 39 39 40
     00003FF0:   F3 A3 6C 91 3C 0B CD FE 67 2C 90 3C 55 22 AA 41
     00004000:   0B 31 8D D1 26 8D 03 5C 59 D3 E1 1F F2 73 B1 D7
     00004010:   71 5E 2F BF 3A CA

   ---------------------------Server---------------------------
   Alert message:
   level:                   01
   description:             00

   00000:   01 00

   Record payload protection:

    client_record_write_key = TLSTREE(client_write_key_ap, 10):
     00000:   D3 CD 87 D5 68 74 07 82 39 78 34 4C 06 B9 28 A8
     00010:   58 98 B7 39 A3 1D 3D E5 FF 2B 78 8E F3 91 96 ED

     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0A

     nonce:
     00000:   2F E9 1F 71 18 35 40 26 31 7E 1A B4 D8 22 17 B2

     additional_data:
     00000:   17 03 03 00 13

     TLSInnerPlaintext:
     00000:   01 00 15

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0013
   encrypted_record:        7CBC00AD5D29E301739394D31942C6A1
                            6658E9

   TLSCiphertext:
     00000:   17 03 03 00 13 7C BC 00 AD 5D 29 E3 01 73 93 94
     00010:   D3 19 42 C6 A1 66 58 E9

   ---------------------------Client---------------------------
   Alert message:
   level:                   01
   description:             00

   00000:   01 00

   Record payload protection:

     client_record_write_key = TLSTREE(client_write_key_ap, 10):
     00000:   B8 2D 78 25 D1 5F AE 18 A7 01 32 28 B3 1C B0 C5
     00010:   97 52 C6 40 9C 5F 78 99 EC C6 95 0F 74 63 C0 90


     seqnum:
     00000:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0A

     nonce:
     00000:   31 09 57 EF 71 31 44 33 F5 76 CC 9B 00 AD 93 5E

     additional_data:
     00000:   17 03 03 00 13

     TLSInnerPlaintext:
     00000:   01 00 15

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0013
   encrypted_record:        CB19F306C3641754BE4FC95390DF06F9
                            CD44AA

   TLSCiphertext:
     00000:   17 03 03 00 13 CB 19 F3 06 C3 64 17 54 BE 4F C9
     00010:   53 90 DF 06 F9 CD 44 AA

A.2.  Example 2

A.2.1.  Test Case

   Test examples are given for the following instance of the TLS13_GOST
   profile:

   1.  Full TLS Handshake is used.

   2.  PSK with ECDHE key exchange mode is used.  The elliptic curve
       GC256B is used for ECDHE shared secret calculation.

   3.  Authentication is used on the server and client sides.  The
       external PSK is used for the mutual authentication.

   4.  TLS_GOSTR341112_256_WITH_MAGMA_MGM_L cipher suite is negotiated.

   5.  Four Application Data records are sent during the operation of
       the Record protocol.  The sequence numbers are selected to
       demonstrate the operation of the TLSTREE function.

   6.  Alert protocol is used for closure of the connection.

A.2.2.  Test Examples

   ePSK:
     00000:   80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80
     00000:   80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80


   ---------------------------Client---------------------------

   ClientHello1 message:
   msg_type:                01
   length:                  00007B
   body:
     legacy_version:        0303
     random:                01010101010101010101010101010101
                            01010101010101010101010101010101
     legacy_session_id:
       length:              00
       vector:              --
     cipher_suites:
       length:              0002
       vector:
         CipherSuite:       C104
     compression_methods:
       length:              01
       vector:
         CompressionMethod: 00
     extensions:
       length:              0050
       vector:
         Extension: /* supported_groups */
           extension_type:  000A
           extension_data:
             length:        0006
             vector:
               named_group_list:
                 length:    0004
                 vector:
                   /* GC256B */
                            0023
                   /* GC512C */
                            0028
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0003
             vector:
               versions:
                 length:    02
                 vector:
                            0304
         Extension: /* psk_key_exchange_modes */
           extension_type:  002D
           extension_data:
             length:        0002
             vector:
               ke_modes:
                 length:    01
                 vector:
                  /* psk_dhe_ke */
                            01
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0002
             client_shares:
               length:      0000
               vector:      --
         Extension: /* pre_shared_key */
           extension_type:  0029
           extension_data:
             length:        002F
             vector:
               identities:
               length:      000A
               vector:
                 identity:
                 length:    0004
                 vector:    6550534B
                 obfuscated_ticket_age:    00000000
               binders:
               length:      0021
               vector:
                 binder:
                 length:    20
                 vector:    6F3A0B91F2945EF7056DB74302BC34B6
                            DF77A88E09C587508AB6287C6C0514AD

   Truncate(ClientHello1):
     0000:   01 00 00 7B 03 03 01 01 01 01 01 01 01 01 01 01
     0010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
     0020:   01 01 01 01 01 01 00 00 02 C1 04 01 00 00 50 00
     0030:   0A 00 06 00 04 00 23 00 28 00 2B 00 03 02 03 04
     0040:   00 2D 00 02 01 01 00 33 00 02 00 00 00 29 00 2F
     0050:   00 0A 00 04 65 50 53 4B 00 00 00 00

   Hash(Truncate(ClientHello1)):
     0000:   CC 9C A9 FC 18 DF 7A 2F 5F 63 27 D7 7B EA DC F1
     0010:   A7 3D 80 97 7F EB EA B4 F0 D3 83 39 30 00 2B 8D

   EarlySecret = HKDF-Extract(Salt: 0^Hlen, IKM: ePSK):
     00000:   42 30 7A 99 68 18 34 0D D0 56 2F 7F EB E6 2A B5
     00010:   70 F3 BC 88 9C A9 29 3A 89 0D F2 09 B9 1B BB F3

   binder_key = Derive-Secret(EarlySecret, "ext binder", "") =
     HKDF-Expand-Label(EarlySecret, "ext binder", "", 32):
       00000:   A4 37 62 C3 5E 75 54 1A 15 58 A0 8D 15 50 D3 29
       00010:   4C C3 F9 0C 73 99 EC C0 50 B9 15 37 A2 4C D5 E4

   finished_binder_key =
    HKDF-Expand-Label(binder_key, "finished", "", 32):
     00000:   F5 6F 59 C2 E2 F8 E7 7C 69 80 1F B1 7D B4 C1 8B
     00010:   ED 96 EB 32 FC D7 AB 95 AD D6 B1 CF F1 73 E6 65

   binder = HMAC(finished_binder_key, Hash(Truncate(ClientHello1))):
     00000:   6F 3A 0B 91 F2 94 5E F7 05 6D B7 43 02 BC 34 B6
     00010:   DF 77 A8 8E 09 C5 87 50 8A B6 28 7C 6C 05 14 AD

   0000:   01 00 00 7B 03 03 01 01 01 01 01 01 01 01 01 01
   0010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
   0020:   01 01 01 01 01 01 00 00 02 C1 04 01 00 00 50 00
   0030:   0A 00 06 00 04 00 23 00 28 00 2B 00 03 02 03 04
   0040:   0A 07 0B 07 0C 07 0D 07 0E 07 0F 00 2B 00 03 02
   0050:   00 2D 00 02 01 01 00 33 00 02 00 00 00 29 00 2F
   0060:   00 0A 00 04 65 50 53 4B 00 00 00 00 00 21 20 6F
   0070:   3A 0B 91 F2 94 5E F7 05 6D B7 43 02 BC 34 B6 DF
   0080:   77 A8 8E 09 C5 87 50 8A B6 28 7C 6C 05 14 AD

   Record layer message:
   type:                    16
   legacy_record_version:   0301
   length:                  007F
   fragment:                0100007B030301010101010101010101
                            01010101010101010101010101010101
                            010101010101000002C1040100005000
                            0A0006000400230028002B0003020304
                            0A070B070C070D070E070F002B000302
                            002D000201010033000200000029002F
                            000A00046550534B000000000021206F
                            3A0B91F2945EF7056DB74302BC34B6DF
                            77A88E09C587508AB6287C6C0514AD

   00000:   16 03 01 00 7F 01 00 00 7B 03 03 01 01 01 01 01
   00010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
   00020:   01 01 01 01 01 01 01 01 01 01 01 00 00 02 C1 04
   00030:   01 00 00 50 00 0A 00 06 00 04 00 23 00 28 00 2B
   00040:   00 03 02 03 04 0A 07 0B 07 0C 07 0D 07 0E 07 0F
   00050:   00 2B 00 03 02 00 2D 00 02 01 01 00 33 00 02 00
   00060:   00 00 29 00 2F 00 0A 00 04 65 50 53 4B 00 00 00
   00070:   00 00 21 20 6F 3A 0B 91 F2 94 5E F7 05 6D B7 43
   00080:   02 BC 34 B6 DF 77 A8 8E 09 C5 87 50 8A B6 28 7C
   00090:   6C 05 14 AD


   ---------------------------Server---------------------------

   HelloRetryRequest message:
   msg_type:                02
   length:                  000034
   body:
     legacy_version:        0303
     random:                CF21AD74E59A6111BE1D8C021E65B891
                            C2A211167ABB8C5E079E09E2C8A8339C
     legacy_session_id:
       length:              00
       vector:              --
     cipher_suite:
         CipherSuite:       C104
     compression_method:
         CompressionMethod: 00
     extensions:
       length:              000C
       vector:
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0002
             vector:
               selected_version:
                            0304
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0002
             selected_group:   0023

   00000:   02 00 00 34 03 03 CF 21 AD 74 E5 9A 61 11 BE 1D
   00010:   8C 02 1E 65 B8 91 C2 A2 11 16 7A BB 8C 5E 07 9E
   00020:   09 E2 C8 A8 33 9C 00 C1 04 00 00 0C 00 2B 00 02
   00030:   03 04 00 33 00 02 00 23

   Record layer message:
   type:                    16
   legacy_record_version:   0303
   length:                  0038
   fragment:                020000340303CF21AD74E59A6111BE1D
                            8C021E65B891C2A211167ABB8C5E079E
                            09E2C8A8339C00C10400000C002B0002
                            0304003300020023

   00000:   16 03 03 00 38 02 00 00 34 03 03 CF 21 AD 74 E5
   00010:   9A 61 11 BE 1D 8C 02 1E 65 B8 91 C2 A2 11 16 7A
   00020:   BB 8C 5E 07 9E 09 E2 C8 A8 33 9C 00 C1 04 00 00
   00030:   0C 00 2B 00 02 03 04 00 33 00 02 00 23

   ---------------------------Client---------------------------

   ClientHello2 message:
   msg_type:                01
   length:                  0000BF
   body:
     legacy_version:        0303
     random:                01010101010101010101010101010101
                            01010101010101010101010101010101
     legacy_session_id:
       length:              00
       vector:              --
     cipher_suites:
       length:              0002
       vector:
         CipherSuite:       C104
     compression_methods:
       length:              01
       vector:
         CompressionMethod: 00
     extensions:
       length:              0094
       vector:
         Extension: /* supported_groups */
           extension_type:  000A
           extension_data:
             length:        0006
             vector:
               named_group_list:
                 length:    0004
                 vector:
                   /* GC256B */
                            0023
                   /* GC512C */
                            0028
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0003
             vector:
               versions:
                 length:    02
                 vector:
                            0304
         Extension: /* psk_key_exchange_modes */
           extension_type:  002D
           extension_data:
             length:        0002
             vector:
               ke_modes:
                 length:    01
                 vector:
                  /* psk_dhe_ke */
                            01
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0046
             client_shares:
               length:      0044
               vector:
                 group:     0023
                 key_exchange:
                   length:   0040
                   vector:
                             D35AA795C452450949591D60E7D5C076
                             056D6646F3B80708CDC2E7034DE85F68
                             D1122DC32A3B986D40FF910622A06C12
                             26D9EC3A7D3A52E0A37C282C47602A43
         Extension: /* pre_shared_key */
           extension_type:  0029
           extension_data:
             length:        002F
             vector:
               identities:
               length:      000A
               vector:
                 identity:
                 length:    0004
                 vector:    6550534B
                 obfuscated_ticket_age:    00000000
               binders:
               length:      0021
               vector:
                 binder:
                 length:    20
                 vector:    0BF74AA3933B7D1A66961B6E2CFB6A28
                            04D696BB607710E3F56DDA91F56B57CB

   Truncate(ClientHello2):
     0000:   01 00 00 BF 03 03 01 01 01 01 01 01 01 01 01 01
     0010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
     0020:   01 01 01 01 01 01 00 00 02 C1 04 01 00 00 94 00
     0030:   0A 00 06 00 04 00 23 00 28 00 2B 00 03 02 03 04
     0040:   00 2D 00 02 01 01 00 33 00 46 00 44 00 23 00 40
     0050:   D3 5A A7 95 C4 52 45 09 49 59 1D 60 E7 D5 C0 76
     0060:   05 6D 66 46 F3 B8 07 08 CD C2 E7 03 4D E8 5F 68
     0070:   D1 12 2D C3 2A 3B 98 6D 40 FF 91 06 22 A0 6C 12
     0080:   26 D9 EC 3A 7D 3A 52 E0 A3 7C 28 2C 47 60 2A 43
     0090:   00 29 00 2F 00 0A 00 04 65 50 53 4B 00 00 00 00

   finished_binder_key:
     00000:   F5 6F 59 C2 E2 F8 E7 7C 69 80 1F B1 7D B4 C1 8B
     00010:   ED 96 EB 32 FC D7 AB 95 AD D6 B1 CF F1 73 E6 65

   BinderMsg = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
    Truncate(ClientHello2))

   Hash(BinderMsg) =
       73 7C 63 74 1B 3A EA DF C8 73 DF 6E EA 81 19 32
       BF CE 93 4F AA 85 84 F1 44 F8 77 13 E0 D0 CA 32

   binder = HMAC(finished_binder_key, Hash(BinderMsg)) =
       0B F7 4A A3 93 3B 7D 1A 66 96 1B 6E 2C FB 6A 28
       04 D6 96 BB 60 77 10 E3 F5 6D DA 91 F5 6B 57 CB


   0000:   01 00 00 BF 03 03 01 01 01 01 01 01 01 01 01 01
   0010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
   0020:   01 01 01 01 01 01 00 00 02 C1 04 01 00 00 94 00
   0030:   0A 00 06 00 04 00 23 00 28 00 2B 00 03 02 03 04
   0040:   00 2D 00 02 01 01 00 33 00 46 00 44 00 23 00 40
   0050:   D3 5A A7 95 C4 52 45 09 49 59 1D 60 E7 D5 C0 76
   0060:   05 6D 66 46 F3 B8 07 08 CD C2 E7 03 4D E8 5F 68
   0070:   D1 12 2D C3 2A 3B 98 6D 40 FF 91 06 22 A0 6C 12
   0080:   26 D9 EC 3A 7D 3A 52 E0 A3 7C 28 2C 47 60 2A 43
   0090:   00 29 00 2F 00 0A 00 04 65 50 53 4B 00 00 00 00
   00A0:   00 21 20 0B F7 4A A3 93 3B 7D 1A 66 96 1B 6E 2C
   00B0:   FB 6A 28 04 D6 96 BB 60 77 10 E3 F5 6D DA 91 F5
   00C0:   6B 57 CB


   Record layer message:
   type:                    16
   legacy_record_version:   0303
   length:                  00C3
   fragment:                010000BF030301010101010101010101
                            01010101010101010101010101010101
                            010101010101000002C1040100009400
                            0A0006000400230028002B0003020304
                            002D0002010100330046004400230040
                            D35AA795C452450949591D60E7D5C076
                            056D6646F3B80708CDC2E7034DE85F68
                            D1122DC32A3B986D40FF910622A06C12
                            26D9EC3A7D3A52E0A37C282C47602A43
                            0029002F000A00046550534B00000000
                            0021200BF74AA3933B7D1A66961B6E2C
                            FB6A2804D696BB607710E3F56DDA91F5
                            6B57CB

   00000:   16 03 03 00 C3 01 00 00 BF 03 03 01 01 01 01 01
   00010:   01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
   00020:   01 01 01 01 01 01 01 01 01 01 01 00 00 02 C1 04
   00030:   01 00 00 94 00 0A 00 06 00 04 00 23 00 28 00 2B
   00040:   00 03 02 03 04 00 2D 00 02 01 01 00 33 00 46 00
   00050:   44 00 23 00 40 D3 5A A7 95 C4 52 45 09 49 59 1D
   00060:   60 E7 D5 C0 76 05 6D 66 46 F3 B8 07 08 CD C2 E7
   00070:   03 4D E8 5F 68 D1 12 2D C3 2A 3B 98 6D 40 FF 91
   00080:   06 22 A0 6C 12 26 D9 EC 3A 7D 3A 52 E0 A3 7C 28
   00090:   2C 47 60 2A 43 00 29 00 2F 00 0A 00 04 65 50 53
   000A0:   4B 00 00 00 00 00 21 20 0B F7 4A A3 93 3B 7D 1A
   000B0:   66 96 1B 6E 2C FB 6A 28 04 D6 96 BB 60 77 10 E3
   000C0:   F5 6D DA 91 F5 6B 57 CB

   ---------------------------Server---------------------------

   ServerHello message:
   msg_type:                02
   length:                  00007C
   body:
     legacy_version:        0303
     random:                82828282828282828282828282828282
                            82828282828282828282828282828282


     legacy_session_id:
       length:              00
       vector:              --
     cipher_suite:
         CipherSuite:       C104
     compression_method:
         CompressionMethod: 00
     extensions:
       length:              0054
       vector:
         Extension: /* supported_versions */
           extension_type:  002B
           extension_data:
             length:        0002
             vector:
               selected_version:
                            0304
         Extension: /* key_share */
           extension_type:  0033
           extension_data:
             length:        0044
             vector:
               group:       0023
               key_exchange:
                 length:    0040
                 vector:
                            3D2FB067E106CC9980FB8842811164BA
                            708BBB5038D5EDFBEE1D5E5DFBE6F74F
                            1931217C67C2BDF46253DB9CE3487241
                            F2DBD84E2DABDF65455851B0B19AEFEC
         Extension: /* pre_shared_key */
           extension_type:  0029
           extension_data:
             length:        0002
             selected_identity:     0000

   00000:   02 00 00 7C 03 03 82 82 82 82 82 82 82 82 82 82
   00010:   82 82 82 82 82 82 82 82 82 82 82 82 82 82 82 82
   00020:   82 82 82 82 82 82 00 C1 04 00 00 54 00 2B 00 02
   00030:   03 04 00 33 00 44 00 23 00 40 3D 2F B0 67 E1 06
   00040:   CC 99 80 FB 88 42 81 11 64 BA 70 8B BB 50 38 D5
   00050:   ED FB EE 1D 5E 5D FB E6 F7 4F 19 31 21 7C 67 C2
   00060:   BD F4 62 53 DB 9C E3 48 72 41 F2 DB D8 4E 2D AB
   00070:   DF 65 45 58 51 B0 B1 9A EF EC 00 29 00 02 00 00


   Record layer message:
   type:                    16
   legacy_record_version:   0303
   length:                  0080
   fragment:                020000410303933EA21E49C31BC3A345
                            6165889684CAA5576CE7924A24F58113
                            808DBD9EF85610C3802A561550EC78D6
                            ED51AC2439D7E7C101000009FF010001
                            0000170000

   00000:   16 03 03 00 80 02 00 00 7C 03 03 82 82 82 82 82
   00010:   82 82 82 82 82 82 82 82 82 82 82 82 82 82 82 82
   00020:   82 82 82 82 82 82 82 82 82 82 82 00 C1 04 00 00
   00030:   54 00 2B 00 02 03 04 00 33 00 44 00 23 00 40 3D
   00040:   2F B0 67 E1 06 CC 99 80 FB 88 42 81 11 64 BA 70
   00050:   8B BB 50 38 D5 ED FB EE 1D 5E 5D FB E6 F7 4F 19
   00060:   31 21 7C 67 C2 BD F4 62 53 DB 9C E3 48 72 41 F2
   00070:   DB D8 4E 2D AB DF 65 45 58 51 B0 B1 9A EF EC 00
   00080:   29 00 02 00 00


   ---------------------------Client---------------------------

   d_C^res:
   00000:   02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
   00010:   02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02


   Q_S^res:
   00000:   3D 2F B0 67 E1 06 CC 99 80 FB 88 42 81 11 64 BA
   00010:   70 8B BB 50 38 D5 ED FB EE 1D 5E 5D FB E6 F7 4F
   00020:   19 31 21 7C 67 C2 BD F4 62 53 DB 9C E3 48 72 41
   00030:   F2 DB D8 4E 2D AB DF 65 45 58 51 B0 B1 9A EF EC



   ECDHE:
   00000:   98 5A 86 59 D5 5A 8D 48 E0 E6 77 13 96 58 0B 2C
   00010:   DC DA 37 E9 2A EE 18 14 D1 0E 1B F2 A4 4F 0D 24


   ---------------------------Server---------------------------

   d_S^res:
   00000:   83 83 83 83 83 83 83 83 83 83 83 83 83 83 83 83
   00010:   83 83 83 83 83 83 83 83 83 83 83 83 83 83 83 83


   Q_C^res:
   00000:   D3 5A A7 95 C4 52 45 09 49 59 1D 60 E7 D5 C0 76
   00010:   05 6D 66 46 F3 B8 07 08 CD C2 E7 03 4D E8 5F 68
   00020:   D1 12 2D C3 2A 3B 98 6D 40 FF 91 06 22 A0 6C 12
   00030:   26 D9 EC 3A 7D 3A 52 E0 A3 7C 28 2C 47 60 2A 43


   ECDHE:
   00000:   98 5A 86 59 D5 5A 8D 48 E0 E6 77 13 96 58 0B 2C
   00010:   DC DA 37 E9 2A EE 18 14 D1 0E 1B F2 A4 4F 0D 24

   ---------------------------Server---------------------------

   EncryptedExtensions message:
   msg_type:                08
   length:                  000002
   body:
     extensions:
       length:              0000
       vector:              --

   00000:   08 00 00 02 00 00

   Record payload protection:

     EarlySecret = HKDF-Extract(Salt: 0^256, IKM: ePSK):
     00000:   42 30 7A 99 68 18 34 0D D0 56 2F 7F EB E6 2A B5
     00010:   70 F3 BC 88 9C A9 29 3A 89 0D F2 09 B9 1B BB F3

     Derived #0 = Derive-Secret(EarlySecret, "derived", "") =
     HKDF-Expand-Label(EarlySecret, "derived", "", 32):
     00000:   6B 4E 9C 49 C5 C6 F1 7F 60 B2 B8 4B 55 0A 16 38
     00010:   14 09 5B 80 88 8E C0 B0 CA 52 E4 09 0C B3 F8 BE


     HandshakeSecret = HKDF-Extract(Salt: Derived #0, IKM: ECDHE):
     00000:   A9 CB E6 58 50 2F 3F D1 18 66 51 5F D6 15 E9 88
     00010:   0D 1E 61 B5 28 34 BB FD 5F 19 C2 4C 53 C8 79 7F


     HM1 = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
      ClientHello2, ServerHello)

     TH1 = Transcript-Hash(HM1):
     00000:   88 8D 5D 1E 15 98 65 05 97 3E F2 0F 9A FA F5 71
     00010:   20 A3 66 C2 D2 19 91 D1 5E 25 07 0C 3D 07 D5 E9

     server_handshake_traffic_secret (SHTS):
     SHTS = Derive-Secret(HandshakeSecret, "s hs traffic", HM1) =
       HKDF-Expand-Label(HandshakeSecret, "s hs traffic", TH1, 32):
       00000:   4E F8 68 E5 5B 27 F8 88 8A 6F 82 DA A7 0B 01 1B
       00010:   DA B1 77 95 10 F0 88 78 A0 22 2B 3E 2C 76 E6 83

     server_write_key_hs = HKDF-Expand-Label(SHTS, "key", "", 32):
     00000:   DB 61 9B 58 F4 41 1E 33 4F 07 EA C7 7C EF EF CA
     00010:   78 41 F5 40 88 B8 D0 D5 CE 6A 62 C9 82 85 C6 81

     server_write_iv_hs = HKDF-Expand-Label(SHTS, "iv", "", 16):
     00000:   FC 9E 2A C6 63 04 C2 5B

     server_record_write_key = TLSTREE(server_write_key_hs, 0):
     00000:   3C 7D F3 5E AC F4 FE 71 EA 6A DC E0 DC 44 5D D3
     00010:   A9 29 EF CD 08 3F 18 2F BD 51 42 BA 68 6D 38 84

     seqnum:
     00000:   00 00 00 00 00 00 00 00

     nonce:
     00000:   7C 9E 2A C6 63 04 C2 5B

     additional_data:
     00000:   17 03 03 00 0F

     TLSInnerPlaintext:
     00000:   08 00 00 02 00 00 16

     TLSCiphertext:
     00000:   17 03 03 00 0F 49 67 A7 E1 AE 7B FB 37 5A 0F 4B
     00010:   25 45 91 17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  000F
   encrypted_record:        4967A7E1AE7BFB375A0F4B
                            25459117

   00000:   17 03 03 00 0F 49 67 A7 E1 AE 7B FB 37 5A 0F 4B
   00010:   25 45 91 17

   ---------------------------Server---------------------------

   server_finished_key = HKDF-Expand-Label(SHTS, "finished", "", 32):
   00000:   AF 41 F7 7A CB 18 B4 C5 9D E0 F7 8D 46 D5 AE 95
   00010:   7A A4 92 A7 D8 D8 2A 36 F4 B2 09 B8 20 7C 79 03

   HMFinished = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
    ClientHello2, ServerHello, EncryptedExtensions)

   Transcript-Hash(HMFinished):
   00000:   E0 5D D6 C9 DE BA 09 3D 72 AD 6F 4A 7D 0E 11 95
   00010:   FC E7 AE 31 93 F2 FF 5B 2D 0B F6 14 8E CB E7 B9

   FinishedHash =
   HMAC(server_finished_key,Transcript-Hash(HMFinished)):
   00000:   96 14 5B 61 68 E0 1C 4C F2 99 50 96 EE 12 C8 6B
   00010:   1F 53 1F 96 0A 48 9D E9 C3 44 2A 24 33 E9 AE EE

   Finished message:
   msg_type:                14
   length:                  000020
   body:
     verify_data:           96145B6168E01C4CF2995096EE12C86B
                            1F531F960A489DE9C3442A2433E9AEEE

   00000:   14 00 00 20 96 14 5B 61 68 E0 1C 4C F2 99 50 96
   00010:   EE 12 C8 6B 1F 53 1F 96 0A 48 9D E9 C3 44 2A 24
   00020:   33 E9 AE EE

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_hs, 1):
     00000:   3C 7D F3 5E AC F4 FE 71 EA 6A DC E0 DC 44 5D D3
     00010:   A9 29 EF CD 08 3F 18 2F BD 51 42 BA 68 6D 38 84

     seqnum:
     00000:   00 00 00 00 00 00 00 01

     nonce:
     00000:   7C 9E 2A C6 63 04 C2 5A

     additional_data:
     00000:   17 03 03 00 2D

     TLSInnerPlaintext:
     00000:   14 00 00 20 96 14 5B 61 68 E0 1C 4C F2 99 50 96
     00010:   EE 12 C8 6B 1F 53 1F 96 0A 48 9D E9 C3 44 2A 24
     00020:   33 E9 AE EE 16

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  002D
   encrypted_record:        3BFB2AEADBC349FD89AFB8E481F8426B
                            CC6B7F5D975FE05E5B28755C00BF353F
                            CA6A48E9F0145993C40CE06F37

   TLSCiphertext:
     00000:   17 03 03 00 2D 3B FB 2A EA DB C3 49 FD 89 AF B8
     00010:   E4 81 F8 42 6B CC 6B 7F 5D 97 5F E0 5E 5B 28 75
     00020:   5C 00 BF 35 3F CA 6A 48 E9 F0 14 59 93 C4 0C E0
     00030:   6F 37


   ---------------------------Client---------------------------

   EarlySecret = HKDF-Extract(Salt: 0^256, IKM: ePSK):
     00000:   42 30 7A 99 68 18 34 0D D0 56 2F 7F EB E6 2A B5
     00010:   70 F3 BC 88 9C A9 29 3A 89 0D F2 09 B9 1B BB F3

   Derived #0 = Derive-Secret(EarlySecret, "derived", "") =
     HKDF-Expand-Label(EarlySecret, "derived", "", 32):
     00000:   6B 4E 9C 49 C5 C6 F1 7F 60 B2 B8 4B 55 0A 16 38
     00010:   14 09 5B 80 88 8E C0 B0 CA 52 E4 09 0C B3 F8 BE

   HandshakeSecret = HKDF-Extract(Salt: Derived #0, IKM: ECDHE):
   00000:   A9 CB E6 58 50 2F 3F D1 18 66 51 5F D6 15 E9 88
   00010:   0D 1E 61 B5 28 34 BB FD 5F 19 C2 4C 53 C8 79 7F

   HM1 = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
    ClientHello2, ServerHello)

   TH1 = Transcript-Hash(HM1):
   00000:   88 8D 5D 1E 15 98 65 05 97 3E F2 0F 9A FA F5 71
   00010:   20 A3 66 C2 D2 19 91 D1 5E 25 07 0C 3D 07 D5 E9

   client_handshake_traffic_secret (CHTS):
   CHTS = Derive-Secret(HandshakeSecret, "c hs traffic", HM1) =
     HKDF-Expand-Label(HandshakeSecret, "c hs traffic", TH1, 32):
     00000:    DF 00 4B 79 A1 D3 51 55 97 1B 0E 84 C8 91 99 7F
     00010:    FE E6 D0 1B 27 04 23 CC 74 64 4B 25 47 3E 78 60

   client_finished_key = HKDF-Expand-Label(CHTS, "finished", "", 32):
   00000:   1F A6 7D 28 9F F2 A6 85 C7 BE 13 FD F5 60 A6 D5
   00010:   A9 F5 EA 85 63 AD 6C C7 B4 85 30 76 59 A5 55 81

   HM2 = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
    ClientHello2, ServerHello,
     EncryptedExtensions, Server Finished)

   TH2 =Transcript-Hash(HM2):
   00000:   53 06 24 EE 07 6F FF E1 04 DC 15 EB B4 2D 78 8F
   00010:   1E 4F EB 3E 8C 2D CF A5 CB 85 D7 2F 81 D0 6D 15

   FinishedHash = HMAC(client_finished_key, TH2):
   00000:   BB 83 09 94 BE 38 A9 8F FC A3 BF D2 35 CD 80 7E
   00010:   81 82 1E 67 37 AB 98 31 43 DC A9 7B 9E E0 23 25

   Finished message:
   msg_type:                14
   length:                  000020
   body:
     verify_data:           BB830994BE38A98FFCA3BFD235CD807E
                            81821E6737AB983143DCA97B9EE02325

   00000:   14 00 00 20 BB 83 09 94 BE 38 A9 8F FC A3 BF D2
   00010:   35 CD 80 7E 81 82 1E 67 37 AB 98 31 43 DC A9 7B
   00020:   9E E0 23 25

   Record payload protection:

     client_write_key_hs = HKDF-Expand-Label(CHTS, "key", "", 32):
     00000:   DF 66 60 1E DD D6 4E 96 1D FC 7D D0 21 2E F2 25
     00010:   C0 05 33 E6 DA A4 AD 24 18 5E BE B2 24 B5 46 B8

     client_write_iv_hs = HKDF-Expand-Label(CHTS, "iv", "", 16):
     00000:   E8 94 3C 9F A2 88 56 A1

     client_record_write_key = TLSTREE(client_write_key_hs, 0):
     00000:   BD 00 9F FC 04 A0 52 9E 60 78 EB A5 A0 7A DE 74
     00010:   93 7F F3 A1 AB 75 F7 AE 05 19 04 78 51 9B 6D F3

     seqnum:
     00000:   00 00 00 00 00 00 00 00

     nonce:
     00000:   68 94 3C 9F A2 88 56 A1

     additional_data:
     00000:   17 03 03 00 2D

     TLSInnerPlaintext:
     00000:   14 00 00 20 BB 83 09 94 BE 38 A9 8F FC A3 BF D2
     00010:   35 CD 80 7E 81 82 1E 67 37 AB 98 31 43 DC A9 7B
     00020:   9E E0 23 25 16


   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  002D
   encrypted_record:        14254CA6B9EBCC4A951A3D1F1040B0B1
                            45446DF131946CEECBDB6A8EC534F194
                            223281B56532A703C492160E2C

   TLSCiphertext:
     00000:   17 03 03 00 2D 14 25 4C A6 B9 EB CC 4A 95 1A 3D
     00010:   1F 10 40 B0 B1 45 44 6D F1 31 94 6C EE CB DB 6A
     00020:   8E C5 34 F1 94 22 32 81 B5 65 32 A7 03 C4 92 16
     00030:   0E 2C


   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

   Record payload protection:
     Derived #1 = Derive-Secret(HandshakeSecret, "derived", "") =
      HKDF-Expand-Label(HandshakeSecret, "derived", "", 32):
      00000:   BC 4D 6F E3 D9 43 78 21 1D 3D 64 1C 75 92 EB AA
      00010:   7A A2 96 47 9C 57 BD D1 E1 4C 7B 04 9F 6D F1 CD

     MainSecret = HKDF-Extract(Salt: Derived #1, IKM: 0^256):
     00000:   DB FF 82 86 2E 54 A1 41 3E 6C 2E D8 2C 6D A5 AF
     00010:   FD BF DE 12 30 2E 49 75 5B 61 F2 06 32 E1 0A 42

     HM2 = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
      ClientHello2, ServerHello,
       EncryptedExtensions, Server Finished)

     TH2 = Transcript-Hash(HM2):
     00000:   53 06 24 EE 07 6F FF E1 04 DC 15 EB B4 2D 78 8F
     00010:   1E 4F EB 3E 8C 2D CF A5 CB 85 D7 2F 81 D0 6D 15

     SATS = Derive-Secret(MainSecret, "s ap traffic", HM2) =
      HKDF-Expand-Label(MainSecret, "s ap traffic", TH2, 32):
      00000:   52 91 26 2B EC B5 22 69 34 3A E8 27 9B 43 54 B1
      00010:   89 22 D5 15 04 60 8B A7 21 C4 72 46 7E EE E8 78

     server_write_key_ap = HKDF-Expand-Label(SATS, "key", "", 32):
     00000:   15 D9 2C 51 47 B2 13 10 ED ED F5 5B 3D 7A B7 76
     00000:   81 7D 6F E2 FC F2 30 D7 E3 F2 92 75 F6 E2 41 EC

     server_write_iv_ap = HKDF-Expand-Label(SATS, "iv", "", 8):
     00000:   71 2E 2F 11 CD 50 6E B9

     server_record_write_key = TLSTREE(server_write_key_ap, 0):
     00000:   7B B8 81 55 35 98 DE F5 34 FC AF 9B 77 A3 35 5B
     00010:   C3 BC A3 87 4D 67 40 F6 CB F5 C1 B6 D3 5C 65 ED

     seqnum:
     00000:   00 00 00 00 00 00 00 00

     nonce:
     00000:   71 2E 2F 11 CD 50 6E B9

     additional_data:
     00000:   17 03 03 04 09

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0409
   encrypted_record:        7CAA82039F67326C2D735EE809B57750
                            945F5CE2B0C47B8EF1ECADA3D3F1AD9E
                            3FBA5926FDB2B61197D08B8B1399167B
                            6C249C90C0A3101452FD72078FBFB057
                            31E06215019395DDCF44AA763DCB1ACA
                            8B3F47D033FBA12E7C0FBB4DFBDABD8B
                            97E996E8E36231BE8015412B90CCCFBB
                            E2BC967E597FC2E7B251A9BBEBAA245B
                            63139387203DB90BD1BF5300A5B577BF
                            46793DB1AA30FEDFD1E6A5
                            [...]
                            E1D55816BFD6BFFBF6E6FB23D86117D2
                            47441BC211D078199C1F8340BE808BA6
                            E5BE092B9E081E95D4A57672A07970A6
                            1FEF2F4B12A0F401FA30B813FE7CD1BF
                            881485157381B8489EC36296C6EE7538
                            0FB1DAA1B1473358FD87AA41D5DBA089
                            F528BD5F3B41B34002D945D7E0C49EFA
                            54A4EFB0DA4049F5F248B3F7D46FEC05
                            A25BBE0A5120106BC21C1EA25EFF3125
                            E079CA0F7FFA56FD89C1A80DA0A3

   TLSCiphertext:
     00000000:    17 03 03 04 09 7C AA 82 03 9F 67 32 6C 2D 73 5E
     00000010:    E8 09 B5 77 50 94 5F 5C E2 B0 C4 7B 8E F1 EC AD
     00000020:    A3 D3 F1 AD 9E 3F BA 59 26 FD B2 B6 11 97 D0 8B
     00000030:    8B 13 99 16 7B 6C 24 9C 90 C0 A3 10 14 52 FD 72
     00000040:    07 8F BF B0 57 31 E0 62 15 01 93 95 DD CF 44 AA
     00000050:    76 3D CB 1A CA 8B 3F 47 D0 33 FB A1 2E 7C 0F BB
     00000060:    4D FB DA BD 8B 97 E9 96 E8 E3 62 31 BE 80 15 41
     00000070:    2B 90 CC CF BB E2 BC 96 7E 59 7F C2 E7 B2 51 A9
     00000080:    BB EB AA 24 5B 63 13 93 87 20 3D B9 0B D1 BF 53
     00000090:    00 A5 B5 77 BF 46 79 3D B1 AA 30 FE DF D1 E6 A5
     [...]
     00000370:    E1 D5 58 16 BF D6 BF FB F6 E6 FB 23 D8 61 17 D2
     00000380:    47 44 1B C2 11 D0 78 19 9C 1F 83 40 BE 80 8B A6
     00000390:    E5 BE 09 2B 9E 08 1E 95 D4 A5 76 72 A0 79 70 A6
     000003A0:    1F EF 2F 4B 12 A0 F4 01 FA 30 B8 13 FE 7C D1 BF
     000003B0:    88 14 85 15 73 81 B8 48 9E C3 62 96 C6 EE 75 38
     000003C0:    0F B1 DA A1 B1 47 33 58 FD 87 AA 41 D5 DB A0 89
     000003D0:    F5 28 BD 5F 3B 41 B3 40 02 D9 45 D7 E0 C4 9E FA
     000003E0:    54 A4 EF B0 DA 40 49 F5F2 48 B3 F7 D4 6F EC 05
     000003F0:    A2 5B BE 0A 51 20 10 6B C2 1C 1E A2 5E FF 31 25
     00000400:    E0 79 CA 0F 7F FA 56 FD 89 C1 A8 0D A0 A3


   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 1):
     00000:   7B B8 81 55 35 98 DE F5 34 FC AF 9B 77 A3 35 5B
     00010:   C3 BC A3 87 4D 67 40 F6 CB F5 C1 B6 D3 5C 65 ED

     seqnum:
     00000:   00 00 00 00 00 00 00 01

     nonce:
     00000:   71 2E 2F 11 CD 50 6E B8

     additional_data:
     00000:   17 03 03 04 09

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0409
   encrypted_record:        DC593FC6FAFC5191242B632E144504A2
                            61AEF332970FF8316FA4DE507BFB471E
                            A83C713FF950791078FD9A3178D02682
                            66E12BC970FFB1EE4A56600DF32ABF9F
                            A318FF45C91CDEF42E1C1D450059729B
                            1BB6925F773A1E8F304E7AB143F0FC16
                            EF16BC4E0DF60D76DE43390F9CD257DE
                            D256209B1675378FE6822CBB19A53620
                            BD5B240282CF4977F1C572AB3B1DD6CF
                            497F2757286B7E49CF80C7 [...]
                            EE2E29D3F79640D9CA3C35181B9CE939
                            CA16A862AC460424B6AEF6B89D533406
                            7724CCF2466A804F09FAB3EBE737F99C
                            6498EFF2379CAD6596C3C352F4426876
                            95ACBC4FB44B5D069FB66605E47945FE
                            2F11509FF7B5961BE8AB43EC2060D822
                            A994D97C59C8058C951708029AE0BEDA
                            8045ECA025FE02E6D2EFAF13202012E9
                            E34358DE79E561CCEC8F549E70073EE6
                            938F4A1AAE97465970D65260604C


   TLSCiphertext:
     00000000:   17 03 03 04 09 DC 59 3F C6 FA FC 51 91 24 2B 63
     00000010:   2E 14 45 04 A2 61 AE F3 32 97 0F F8 31 6F A4 DE
     00000020:   50 7B FB 47 1E A8 3C 71 3F F9 50 79 10 78 FD 9A
     00000030:   31 78 D0 26 82 66 E1 2B C9 70 FF B1 EE 4A 56 60
     00000040:   0D F3 2A BF 9F A3 18 FF 45 C9 1C DE F4 2E 1C 1D
     00000050:   45 00 59 72 9B 1B B6 92 5F 77 3A 1E 8F 30 4E 7A
     00000060:   B1 43 F0 FC 16 EF 16 BC 4E 0D F6 0D 76 DE 43 39
     00000070:   0F 9C D2 57 DE D2 56 20 9B 16 75 37 8F E6 82 2C
     00000080:   BB 19 A5 36 20 BD 5B 24 02 82 CF 49 77 F1 C5 72
     00000090:   AB 3B 1D D6 CF 49 7F 27 57 28 6B 7E 49 CF 80 C7
     [...]
     00000370:   EE 2E 29 D3 F7 96 40 D9 CA 3C 35 18 1B 9C E9 39
     00000380:   CA 16 A8 62 AC 46 04 24 B6 AE F6 B8 9D 53 34 06
     00000390:   77 24 CC F2 46 6A 80 4F 09 FA B3 EB E7 37 F9 9C
     000003A0:   64 98 EF F2 37 9C AD 65 96 C3 C3 52 F4 42 68 76
     000003B0:   95 AC BC 4F B4 4B 5D 06 9F B6 66 05 E4 79 45 FE
     000003C0:   2F 11 50 9F F7 B5 96 1B E8 AB 43 EC 20 60 D8 22
     000003D0:   A9 94 D9 7C 59 C8 05 8C 95 17 08 02 9A E0 BE DA
     000003E0:   80 45 EC A0 25 FE 02 E6 D2 EF AF 13 20 20 12 E9
     000003F0:   E3 43 58 DE 79 E5 61 CC EC 8F 54 9E 70 07 3E E6
     00000400:   93 8F 4A 1A AE 97 46 59 70 D6 52 60 60 4C


   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 128):
     00000:   93 D5 D6 E1 03 6F DF B3 EF BF 31 E6 DA 5E EC E6
     00010:   85 17 1C 97 7F F9 CD 6C 3A 3F 67 C0 22 4A B6 EB

     seqnum:
     00000:   00 00 00 00 00 00 00 80
     nonce:
     00000:   71 2E 2F 11 CD 50 6E 39

     additional_data:
     00000:   17 03 03 04 09

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0409
   encrypted_record:        56A7E2F32541DB0EE1563F8CA79EB129
                            3192E2122BA8A89A6CF05B151D205AEC
                            EB60321D0F637A98880814BEF639FC08
                            A1E8222D95A54E5593F8BB9CF520D3FA
                            7D38D960E00665BB736A7AFF49D7A7BA
                            D092DDB1714655EDF1A9A24F4727DA7E
                            873135F2A0534FAF7825EA99401FE1F0
                            1E8C4246D2B55CEBE768FA205B3F7890
                            9827B912C6AA9FDDE3CFCA47F2D9E2E2
                            0FBEE9606D0E0105A7C97A [...]
                            A72D5F8E43ABC13984593F16DCECBE7B
                            26AF73FDC82D7BE1F913B846D2612531
                            BA0F05FF0C52DEFC8674AF3A1AE27393
                            FC092D45DCD0F71E2B54B60EC618C2A4
                            5BE72EC19B5FB263C2DC780FF3093FD5
                            D2F75185E437BE8BB3E5C26F9E0E71B3
                            C5D6CCA2E0D2F44BB1ACDA17B189F21E
                            C97C748502A2155E3ADC3CCC1BA14EEB
                            7CDAA018253FCB57D53A12F548C5456C
                            DDA00385EE1C0826AB58E964007C

   TLSCiphertext:
     00000000:   17 03 03 04 09 56 A7 E2 F3 25 41 DB 0E E1 56 3F
     00000010:   8C A7 9E B1 29 31 92 E2 12 2B A8 A8 9A 6C F0 5B
     00000020:   15 1D 20 5A EC EB 60 32 1D 0F 63 7A 98 88 08 14
     00000030:   BE F6 39 FC 08 A1 E8 22 2D 95 A5 4E 55 93 F8 BB
     00000040:   9C F5 20 D3 FA 7D 38 D9 60 E0 06 65 BB 73 6A 7A
     00000050:   FF 49 D7 A7 BA D0 92 DD B1 71 46 55 ED F1 A9 A2
     00000060:   4F 47 27 DA 7E 87 31 35 F2 A0 53 4F AF 78 25 EA
     00000070:   99 40 1F E1 F0 1E 8C 42 46 D2 B5 5C EB E7 68 FA
     00000080:   20 5B 3F 78 90 98 27 B9 12 C6 AA 9F DD E3 CF CA
     00000090:   47 F2 D9 E2 E2 0F BE E9 60 6D 0E 01 05 A7 C9 7A
     [...]
     00000370:   A7 2D 5F 8E 43 AB C1 39 84 59 3F 16 DC EC BE 7B
     00000380:   26 AF 73 FD C8 2D 7B E1 F9 13 B8 46 D2 61 25 31
     00000390:   BA 0F 05 FF 0C 52 DE FC 86 74 AF 3A 1A E2 73 93
     000003A0:   FC 09 2D 45 DC D0 F7 1E 2B 54 B6 0E C6 18 C2 A4
     000003B0:   5B E7 2E C1 9B 5F B2 63 C2 DC 78 0F F3 09 3F D5
     000003C0:   D2 F7 51 85 E4 37 BE 8B B3 E5 C2 6F 9E 0E 71 B3
     000003D0:   C5 D6 CC A2 E0 D2 F4 4B B1 AC DA 17 B1 89 F2 1E
     000003E0:   C9 7C 74 85 02 A2 15 5E 3A DC 3C CC 1B A1 4E EB
     000003F0:   7C DA A0 18 25 3F CB 57 D5 3A 12 F5 48 C5 45 6C
     00000400:  DD A0 03 85 EE 1C 08 26 AB 58 E9 64 00 7C


   ---------------------------Server---------------------------

   Application data:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

   Record payload protection:

     server_record_write_key = TLSTREE(server_write_key_ap, 129):
     00000:   93 D5 D6 E1 03 6F DF B3 EF BF 31 E6 DA 5E EC E6
     00010:   85 17 1C 97 7F F9 CD 6C 3A 3F 67 C0 22 4A B6 EB

     seqnum:
     00000:   00 00 00 00 00 00 00 81

     nonce:
     00000:   71 2E 2F 11 CD 50 6E 38

     additional_data:
     00000:   17 03 03 04 09

     TLSInnerPlaintext:
     00000000:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     [...]
     000003F0:  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     00000400:  17

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  0409
   encrypted_record:        EE73C4CAE69FD30BC4B3A66CA571CD9F
                            3C7AA2C2BA9F428A82249720F717738F
                            8C35AC7745B701F3B0CEE993EB2CFDAB
                            4468B22297A8286C2572DE366AC38B70
                            471B26A1EC4F19D68E7EDA0A231C3BD1
                            98013FA05BAC92E774A370EB10C0CBD9
                            15BACD0117A885804B9A475B44A6F3E8
                            7D7BCA40F3F52EF4AB624B6EDD3094F9
                            86269E409F8BB76CEB4BE26D4B1AF54C
                            0A14D41C291EB8E181F79A [...]
                            10C401A9423D02804B51DDBFE5925294
                            ADEE0067193FED8F66CBEED9475873B8
                            8A730496487E8E7F45FC05EEE9C628AF
                            E9236696F41A1505AA7392BF71C7EED3
                            78035013ADE1EF07DE5A0230669E133E
                            0D18B6C977A7FE94F4D22AB29CBAA6B5
                            CDDBF4B35598C0007F3BA69D3FA2730D
                            F51D867E1E47CFDE22CAEACD4C5AFD97
                            088AEB92D12CE3C685C4E517730B8339
                            4FC8514264E2F15E51CE439DED1D

   TLSCiphertext:
     00000000:   17 03 03 04 09 EE 73 C4 CA E6 9F D3 0B C4 B3 A6
     00000010:   6C A5 71 CD 9F 3C 7A A2 C2 BA 9F 42 8A 82 24 97
     00000020:   20 F7 17 73 8F 8C 35 AC 77 45 B7 01 F3 B0 CE E9
     00000030:   93 EB 2C FD AB 44 68 B2 22 97 A8 28 6C 25 72 DE
     00000040:   36 6A C3 8B 70 47 1B 26 A1 EC 4F 19 D6 8E 7E DA
     00000050:   0A 23 1C 3B D1 98 01 3F A0 5B AC 92 E7 74 A3 70
     00000060:   EB 10 C0 CB D9 15 BA CD 01 17 A8 85 80 4B 9A 47
     00000070:   5B 44 A6 F3 E8 7D 7B CA 40 F3 F5 2E F4 AB 62 4B
     00000080:   6E DD 30 94 F9 86 26 9E 40 9F 8B B7 6C EB 4B E2
     00000090:   6D 4B 1A F5 4C 0A 14 D4 1C 29 1E B8 E1 81 F7 9A
     [...]
     00000370:   10 C4 01 A9 42 3D 02 80 4B 51 DD BF E5 92 52 94
     00000380:   AD EE 00 67 19 3F ED 8F 66 CB EE D9 47 58 73 B8
     00000390:   8A 73 04 96 48 7E 8E 7F 45 FC 05 EE E9 C6 28 AF
     000003A0:   E9 23 66 96 F4 1A 15 05 AA 73 92 BF 71 C7 EE D3
     000003B0:   78 03 50 13 AD E1 EF 07 DE 5A 02 30 66 9E 13 3E
     000003C0:   0D 18 B6 C9 77 A7 FE 94 F4 D2 2A B2 9C BA A6 B5
     000003D0:   CD DB F4 B3 55 98 C0 00 7F 3B A6 9D 3F A2 73 0D
     000003E0:   F5 1D 86 7E 1E 47 CF DE 22 CA EA CD 4C 5A FD 97
     000003F0:   08 8A EB 92 D1 2C E3 C6 85 C4 E5 17 73 0B 83 39
     00000400:   4F C8 51 42 64 E2 F1 5E 51 CE 43 9D ED 1D

   ---------------------------Server---------------------------
   Alert message:
   level:                   01
   description:             00

   00000:   01 00

   Record payload protection:

    server_record_write_key = TLSTREE(server_write_key_ap, 130):
     00000:   93 D5 D6 E1 03 6F DF B3 EF BF 31 E6 DA 5E EC E6
     00010:   85 17 1C 97 7F F9 CD 6C 3A 3F 67 C0 22 4A B6 EB

     seqnum:
     00000:   00 00 00 00 00 00 00 82

     nonce:
     00000:   71 2E 2F 11 CD 50 6E 3B

     additional_data:
     00000:   17 03 03 00 0B

     TLSInnerPlaintext:
     00000:   01 00 15

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  000B
   encrypted_record:        447A3FAE8F86C135189B10

   TLSCiphertext:
     00000:   17 03 03 00 0B 44 7A 3F AE 8F 86 C1 35 18 9B 10

   ---------------------------Client---------------------------
   Alert message:
   level:                   01
   description:             00

   00000:   01 00

   Record payload protection:

     Derived #1 = Derive-Secret(HandshakeSecret, "derived", "") =
      HKDF-Expand-Label(HandshakeSecret, "derived", "", 32):
      00000:   BC 4D 6F E3 D9 43 78 21 1D 3D 64 1C 75 92 EB AA
      00010:   7A A2 96 47 9C 57 BD D1 E1 4C 7B 04 9F 6D F1 CD

     MainSecret = HKDF-Extract(Salt: Derived #1, IKM: 0^256):
     00000:   DB FF 82 86 2E 54 A1 41 3E 6C 2E D8 2C 6D A5 AF
     00010:   FD BF DE 12 30 2E 49 75 5B 61 F2 06 32 E1 0A 42

     HM2 = (FE 00 00 20 | Hash(ClientHello1), HelloRetryRequest,
        ClientHello2, ServerHello, EncryptedExtensions,
        Server Finished)

     TH2 = Transcript-Hash(HM2):
     00000:   53 06 24 EE 07 6F FF E1 04 DC 15 EB B4 2D 78 8F
     00010:   1E 4F EB 3E 8C 2D CF A5 CB 85 D7 2F 81 D0 6D 15

     client_application_traffic_secret (CATS):
     CATS = Derive-Secret(MainSecret, "c ap traffic", HM2) =
      HKDF-Expand-Label(MainSecret, "c ap traffic", TH2, 32):
      20 D9 85 D5 B8 4D 9D 8D 4E 5E CF CD BC DD 67 41
      55 F1 82 F7 28 7B 18 4D A5 53 42 5C 6C 64 57 83

     client_write_key_ap = HKDF-Expand-Label(CATS, "key", "", 32):
     00000:   EB D2 71 DE 19 FE E1 8B B1 99 8F 69 AF 5B 6A E1
     00010:   89 58 E8 D3 70 2F 12 FB B5 B0 3F 6F D6 91 FE FA

     client_write_iv_ap = HKDF-Expand-Label(CATS, "iv", "", 8):
     00000:   18 FB 03 8D BF 72 41 E6

     client_record_write_key = TLSTREE(client_write_key_ap, 0):
     00000:   86 2A 74 18 0B 4A E4 C2 D1 5F 4A 62 ED 8A 4A 75
     00010:   B0 8D 72 B0 46 AF DE CB 3A 8E F0 C2 67 F4 56 BD

     seqnum:
     00000:   00 00 00 00 00 00 00 00

     nonce:
     00000:   18 FB 03 8D BF 72 41 E6

     additional_data:
     00000:   17 03 03 00 0B

     TLSInnerPlaintext:
     00000:   01 00 15

   Record layer message:
   type:                    17
   legacy_record_version:   0303
   length:                  000B
   encrypted_record:        464AEEAD391D97987169F3

   TLSCiphertext:
     00000:   17 03 03 00 0B 46 4A EE AD 39 1D 97 98 71 69 F3

Contributors

   Lilia Akhmetzyanova
   CryptoPro
   Email: lah@cryptopro.ru


   Alexandr Sokolov
   CryptoPro
   Email: sokolov@cryptopro.ru


   Vasily Nikolaev
   CryptoPro
   Email: nikolaev@cryptopro.ru


Authors' Addresses

   Stanislav Smyshlyaev (editor)
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Phone: +7 (495) 995-48-20
   Email: svs@cryptopro.ru


   Evgeny Alekseev
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Email: alekseev@cryptopro.ru


   Ekaterina Griboedova
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Email: griboedovaekaterina@gmail.com


   Alexandra Babueva
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Email: babueva@cryptopro.ru


   Lidiia Nikiforova
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Email: nikiforova@cryptopro.ru