Decrypting app payload in wireshark
Claude Robitaille
claude-robitaille at hotmail.com
Sun Jul 18 20:32:39 UTC 2021
Hi all,
I am setting up a callback using SSL_CTX_set_keylog_callback where I simply dump to a file. In wireshark, having configured it to use the filr I created, I can see the decoded TLS handshake (prior to that, the handshake was encrypted so I know that wireshark is indeed finding the data from the callback).
But the actual application data is still encrypted.... 🙁
I am doing this client side.
Any idea what is missing?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20210718/4ab2095c/attachment.html>
More information about the openssl-users
mailing list