[openssl-users] Decrypt TCP session
Short, Todd
tshort at akamai.com
Fri Feb 12 16:54:05 UTC 2016
Check out ssldump.
--
-Todd Short
// tshort at akamai.com<mailto:tshort at akamai.com>
// "One if by land, two if by sea, three if by the Internet."
On Feb 12, 2016, at 10:05 AM, Lloyd <lloydkl.tech at gmail.com<mailto:lloydkl.tech at gmail.com>> wrote:
Hi,
I have implemented a sample HTTP server/client based on openssl (boost asio) and able to send the message encrypted. Loaded the key in Wireshark and able to see the data in plaintext form.
Now I wish to write an application to decrypt the same "tcp session data" (tcp session data = the output of follow TCP stream option in Wireshark).
what should be the starting point to implement this? does open ssl have some sample code/application does this?
Any hint is greatly appreciated.
Thanks,
Lloyd
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160212/0a790080/attachment.html>
More information about the openssl-users
mailing list