Can You pass tell me the cipher suite it is using ?
if the Key Exchange algo is Diffie and Helman .. then there is no way You
can decrypt.


Regards,
krishna.


On Mon, Jun 29, 2009 at 3:30 PM, Harsha gowda <harsha.k.go...@gmail.com>wrote:

> Hi,
> I am sniffing packets over wireless of 802.11i packets,
> Which uses EAP-TLS,
> So i have two way data and private key of CA.
>
> Client-Hello------------------>
>
> <----------------Server-Hello
>
> ClientKeyexchange-------->
>
> So now i can derive key-block,
>
> But openssl utlity for SSL3/TLS methods are built for active sessions only,
> I mean
>
> 1st create a socket
>
> fd=create_sock()
> then pass the socket descriptor to ssl_ctx
>
> is there any hack or work arround,
>
> Like i have sniffed packet so can store them in file and give file
> descriptor as socket descriptor ?.
>
> SSLDump changes the TLSV1 method and injects the certificate,Client and
> server random number of capture file and try to generate Key-block
> & decrypt the text,
>
> But SSLDump does not support all the TLSV1 ciphers.
>
>
> Can any one help me in this regard
>
> Thanks
> Harsha
>
>
>
> --
> ಇಂತಿ
> ಹರ್ಷ ಕೃ ಗೌಡ
>
>

Reply via email to