Decrypting app payload in wireshark
claude-robitaille at hotmail.com
Sun Jul 18 20:32:39 UTC 2021
I am setting up a callback using SSL_CTX_set_keylog_callback where I simply dump to a file. In wireshark, having configured it to use the filr I created, I can see the decoded TLS handshake (prior to that, the handshake was encrypted so I know that wireshark is indeed finding the data from the callback).
But the actual application data is still encrypted.... 🙁
I am doing this client side.
Any idea what is missing?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the openssl-users