Hi, I've got a packet capture from one of my interfaces and I'm trying to investigate some problems with enterprise authentication. As part of this, I thought it'd be useful to be able to decrypt the TLS messages within EAP.
I've managed to modify my network manager to spit out the correct secrets in the same format as browsers do with SSLKEYLOGFILE, however when I add this to wireshark it doesn't actually decrypt the TLS messages. Is there any way to get wireshark to do this? Kind regards, Rhys ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users@wireshark.org> Archives: https://www.wireshark.org/lists/wireshark-users Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe