On 12/8/20 7:46 AM, Matt Caswell wrote:
>
>
> On 08/12/2020 15:28, Oren Shpigel wrote:
>> Hi, thanks for the answer.
>>
>> I know wireshark and ssldump have this capability, but I'm looking for a
>> way to do it in my own software in C++, (using OpenSSL, if possible, but
>> open to other suggesti
On 08/12/2020 15:28, Oren Shpigel wrote:
> Hi, thanks for the answer.
>
> I know wireshark and ssldump have this capability, but I'm looking for a
> way to do it in my own software in C++, (using OpenSSL, if possible, but
> open to other suggestions as well).
Unfortunately OpenSSL does not sup
;https://www.ncp-e.com/de/aktuelles/events/veranstaltungen>
> <https://www.ncp-e.com/de/aktuelles/events/veranstaltungen>
>
> *From**:* openssl-users *On Behalf Of
> *Oren Shpigel
> *Sent:* Tuesday, December 8, 2020 3:15 PM
> *To:* openssl-users@openssl.org
> *Sub
-users@openssl.org
Subject: Use OpenSSL to decrypt TLS session from PCAP files
Hi,
I generated a PCAP file with TLS session, and I have the matching private key
used by my HTTPS server.
The TLS session is not using DH for key exchange, so it should be possible to
decrypt.
I know OpenSSL can be used
Hi,
I generated a PCAP file with TLS session, and I have the matching private
key used by my HTTPS server.
The TLS session is not using DH for key exchange, so it should be possible
to decrypt.
I know OpenSSL can be used to connect to a socket to "actively" handle the
TLS session, but is there a wa