[openssl-users] Decrypt TCP session

Short, Todd tshort at akamai.com
Fri Feb 12 16:54:05 UTC 2016


Check out ssldump.
--
-Todd Short
// tshort at akamai.com<mailto:tshort at akamai.com>
// "One if by land, two if by sea, three if by the Internet."

On Feb 12, 2016, at 10:05 AM, Lloyd <lloydkl.tech at gmail.com<mailto:lloydkl.tech at gmail.com>> wrote:

Hi,

I have implemented a sample HTTP server/client based on openssl (boost asio) and able to send the message encrypted. Loaded the key in Wireshark and able to see the data in plaintext form.

Now I wish to write an application to decrypt the same "tcp session data" (tcp session data = the output of follow TCP stream option in Wireshark).

what should be the starting point to implement this? does open ssl have some sample code/application does this?

Any hint is greatly appreciated.

Thanks,
  Lloyd

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160212/0a790080/attachment.html>


More information about the openssl-users mailing list