Hi,

I've got a packet capture from one of my interfaces and I'm trying to
investigate some problems with enterprise authentication. As part of
this, I thought it'd be useful to be able to decrypt the TLS messages
within EAP.

I've managed to modify my network manager to spit out the correct
secrets in the same format as browsers do with SSLKEYLOGFILE, however
when I add this to wireshark it doesn't actually decrypt the TLS
messages. Is there any way to get wireshark to do this?

Kind regards,
Rhys
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe

Reply via email to