Can You pass tell me the cipher suite it is using ? if the Key Exchange algo is Diffie and Helman .. then there is no way You can decrypt.
Regards, krishna. On Mon, Jun 29, 2009 at 3:30 PM, Harsha gowda <harsha.k.go...@gmail.com>wrote: > Hi, > I am sniffing packets over wireless of 802.11i packets, > Which uses EAP-TLS, > So i have two way data and private key of CA. > > Client-Hello------------------> > > <----------------Server-Hello > > ClientKeyexchange--------> > > So now i can derive key-block, > > But openssl utlity for SSL3/TLS methods are built for active sessions only, > I mean > > 1st create a socket > > fd=create_sock() > then pass the socket descriptor to ssl_ctx > > is there any hack or work arround, > > Like i have sniffed packet so can store them in file and give file > descriptor as socket descriptor ?. > > SSLDump changes the TLSV1 method and injects the certificate,Client and > server random number of capture file and try to generate Key-block > & decrypt the text, > > But SSLDump does not support all the TLSV1 ciphers. > > > Can any one help me in this regard > > Thanks > Harsha > > > > -- > ಇಂತಿ > ಹರ್ಷ ಕೃ ಗೌಡ > >