Hi,
I am sniffing packets over wireless of 802.11i packets,
Which uses EAP-TLS,
So i have two way data and private key of CA.

Client-Hello------------------>

<----------------Server-Hello

ClientKeyexchange-------->

So now i can derive key-block,

But openssl utlity for SSL3/TLS methods are built for active sessions only,
I mean

1st create a socket

fd=create_sock()
then pass the socket descriptor to ssl_ctx

is there any hack or work arround,

Like i have sniffed packet so can store them in file and give file
descriptor as socket descriptor ?.

SSLDump changes the TLSV1 method and injects the certificate,Client and
server random number of capture file and try to generate Key-block
& decrypt the text,

But SSLDump does not support all the TLSV1 ciphers.


Can any one help me in this regard

Thanks
Harsha



-- 
ಇಂತಿ
ಹರ್ಷ ಕೃ ಗೌಡ

Reply via email to