Decrypting app payload in wireshark

Claude Robitaille claude-robitaille at hotmail.com
Sun Jul 18 20:32:39 UTC 2021


Hi all,

I am setting up a callback using SSL_CTX_set_keylog_callback where I simply dump to a file. In wireshark, having configured it to use the filr I created, I can see the decoded TLS handshake (prior to that, the handshake was encrypted so I know that wireshark is indeed finding the data from the callback).

But the actual application data is still encrypted.... 🙁

I am doing this client side.

Any idea what is missing?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20210718/4ab2095c/attachment.html>


More information about the openssl-users mailing list