Hi, I am sniffing packets over wireless of 802.11i packets, Which uses EAP-TLS, So i have two way data and private key of CA.
Client-Hello------------------> <----------------Server-Hello ClientKeyexchange--------> So now i can derive key-block, But openssl utlity for SSL3/TLS methods are built for active sessions only, I mean 1st create a socket fd=create_sock() then pass the socket descriptor to ssl_ctx is there any hack or work arround, Like i have sniffed packet so can store them in file and give file descriptor as socket descriptor ?. SSLDump changes the TLSV1 method and injects the certificate,Client and server random number of capture file and try to generate Key-block & decrypt the text, But SSLDump does not support all the TLSV1 ciphers. Can any one help me in this regard Thanks Harsha -- ಇಂತಿ ಹರ್ಷ ಕೃ ಗೌಡ